diff --git a/semanticscholar/Author.py b/semanticscholar/Author.py index 9b984ee..62c3fbe 100644 --- a/semanticscholar/Author.py +++ b/semanticscholar/Author.py @@ -21,14 +21,17 @@ class Author: 'papers.abstract', 'papers.authors', 'papers.citationCount', + 'papers.corpusId', 'papers.externalIds', 'papers.fieldsOfStudy', 'papers.influentialCitationCount', 'papers.isOpenAccess', 'papers.journal', + 'papers.openAccessPdf', 'papers.paperId', 'papers.publicationDate', 'papers.publicationTypes', + 'papers.publicationVenue', 'papers.referenceCount', 'papers.s2FieldsOfStudy', 'papers.title', diff --git a/semanticscholar/Paper.py b/semanticscholar/Paper.py index 8b28132..d2a4b1b 100644 --- a/semanticscholar/Paper.py +++ b/semanticscholar/Paper.py @@ -1,346 +1,389 @@ -from datetime import datetime -from typing import Any -import semanticscholar.Author -import semanticscholar.Journal -import semanticscholar.Tldr - - -class Paper: - ''' - This class abstracts a paper. - ''' - - FIELDS = [ - 'abstract', - 'authors', - 'authors.affiliations', - 'authors.aliases', - 'authors.authorId', - 'authors.citationCount', - 'authors.externalIds', - 'authors.hIndex', - 'authors.homepage', - 'authors.name', - 'authors.paperCount', - 'authors.url', - 'citationCount', - 'citations', - 'citations.abstract', - 'citations.authors', - 'citations.citationCount', - 'citations.externalIds', - 'citations.fieldsOfStudy', - 'citations.influentialCitationCount', - 'citations.isOpenAccess', - 'citations.journal', - 'citations.paperId', - 'citations.publicationDate', - 'citations.publicationTypes', - 'citations.referenceCount', - 'citations.s2FieldsOfStudy', - 'citations.title', - 'citations.url', - 'citations.venue', - 'citations.year', - 'embedding', - 'externalIds', - 'fieldsOfStudy', - 'influentialCitationCount', - 'isOpenAccess', - 'journal', - 'paperId', - 'publicationDate', - 'publicationTypes', - 'referenceCount', - 'references', - 'references.abstract', - 'references.authors', - 'references.citationCount', - 'references.externalIds', - 'references.fieldsOfStudy', - 'references.influentialCitationCount', - 'references.isOpenAccess', - 'references.journal', - 'references.paperId', - 'references.publicationDate', - 'references.publicationTypes', - 'references.referenceCount', - 'references.s2FieldsOfStudy', - 'references.title', - 'references.url', - 'references.venue', - 'references.year', - 's2FieldsOfStudy', - 'title', - 'tldr', - 'url', - 'venue', - 'year' - ] - - SEARCH_FIELDS = [ - 'abstract', - 'authors', - 'citationCount', - 'externalIds', - 'fieldsOfStudy', - 'influentialCitationCount', - 'isOpenAccess', - 'journal', - 'paperId', - 'publicationDate', - 'publicationTypes', - 'referenceCount', - 's2FieldsOfStudy', - 'title', - 'url', - 'venue', - 'year' - ] - - def __init__(self, data) -> None: - self._abstract = None - self._authors = None - self._citationCount = None - self._citations = None - self._embedding = None - self._externalIds = None - self._fieldsOfStudy = None - self._influentialCitationCount = None - self._isOpenAccess = None - self._journal = None - self._paperId = None - self._publicationDate = None - self._publicationTypes = None - self._referenceCount = None - self._references = None - self._s2FieldsOfStudy = None - self._title = None - self._tldr = None - self._venue = None - self._year = None - self._init_attributes(data) - - def __str__(self) -> str: - return self._data.__str__() - - def __repr__(self) -> Any: - return self._data.__repr__() - - def __getitem__(self, key) -> Any: - return self._data.__getitem__(key) - - def keys(self): - return self._data.keys() - - @property - def abstract(self) -> str: - ''' - :type: :class:`str` - ''' - return self._abstract - - @property - def authors(self) -> list: - ''' - :type: :class:`list` - ''' - return self._authors - - @property - def citationCount(self) -> int: - ''' - :type: :class:`int` - ''' - return self._citationCount - - @property - def citations(self) -> list: - ''' - :type: :class:`list` - ''' - return self._citations - - @property - def embedding(self) -> dict: - ''' - :type: :class:`dict` - ''' - return self._embedding - - @property - def externalIds(self) -> dict: - ''' - :type: :class:`dict` - ''' - return self._externalIds - - @property - def fieldsOfStudy(self) -> list: - ''' - :type: :class:`list` - ''' - return self._fieldsOfStudy - - @property - def influentialCitationCount(self) -> int: - ''' - :type: :class:`int` - ''' - return self._influentialCitationCount - - @property - def isOpenAccess(self) -> bool: - ''' - :type: :class:`bool` - ''' - return self._isOpenAccess - - @property - def journal(self) -> semanticscholar.Journal.Journal: - ''' - :type: :class:`Journal` - ''' - return self._journal - - @property - def paperId(self) -> str: - ''' - :type: :class:`str` - ''' - return self._paperId - - @property - def publicationDate(self) -> datetime: - ''' - :type: :class:`datetime` - ''' - return self._publicationDate - - @property - def publicationTypes(self) -> list: - ''' - :type: :class:`list` - ''' - return self._publicationTypes - - @property - def referenceCount(self) -> int: - ''' - :type: :class:`int` - ''' - return self._referenceCount - - @property - def references(self) -> list: - ''' - :type: :class:`list` - ''' - return self._references - - @property - def s2FieldsOfStudy(self) -> list: - ''' - :type: :class:`list` - ''' - return self._s2FieldsOfStudy - - @property - def title(self) -> str: - ''' - :type: :class:`str` - ''' - return self._title - - @property - def tldr(self) -> semanticscholar.Tldr.Tldr: - ''' - :type: :class:`Tldr` - ''' - return self._tldr - - @property - def url(self) -> str: - ''' - :type: :class:`str` - ''' - return self._url - - @property - def venue(self) -> str: - ''' - :type: :class:`str` - ''' - return self._venue - - @property - def year(self) -> int: - ''' - :type: :class:`int` - ''' - return self._year - - @property - def raw_data(self) -> dict: - ''' - :type: :class:`dict` - ''' - return self._data - - def _init_attributes(self, data) -> None: - self._data = data - if 'abstract' in data: - self._abstract = data['abstract'] - if 'authors' in data: - items = [] - for item in data['authors']: - items.append(semanticscholar.Author.Author(item)) - self._authors = items - if 'citationCount' in data: - self._citationCount = data['citationCount'] - if 'citations' in data: - items = [] - for item in data['citations']: - items.append(Paper(item)) - self._citations = items - if 'embedding' in data: - self._embedding = data['embedding'] - if 'externalIds' in data: - self._externalIds = data['externalIds'] - if 'fieldsOfStudy' in data: - self._fieldsOfStudy = data['fieldsOfStudy'] - if 'influentialCitationCount' in data: - self._influentialCitationCount = data['influentialCitationCount'] - if 'isOpenAccess' in data: - self._isOpenAccess = data['isOpenAccess'] - if 'journal' in data: - if data['journal'] is not None: - self._journal = semanticscholar.Journal.Journal(data['journal']) - if 'paperId' in data: - self._paperId = data['paperId'] - if 'publicationDate' in data: - if data['publicationDate'] is not None: - self._publicationDate = datetime.strptime( - data['publicationDate'], '%Y-%m-%d') - if 'publicationTypes' in data: - self._publicationTypes = data['publicationTypes'] - if 'referenceCount' in data: - self._referenceCount = data['referenceCount'] - if 'references' in data: - items = [] - for item in data['references']: - items.append(Paper(item)) - self._references = items - if 's2FieldsOfStudy' in data: - self._s2FieldsOfStudy = data['s2FieldsOfStudy'] - if 'title' in data: - self._title = data['title'] - if 'tldr' in data: - if data['tldr'] is not None: - self._tldr = semanticscholar.Tldr.Tldr(data['tldr']) - if 'url' in data: - self._url = data['url'] - if 'venue' in data: - self._venue = data['venue'] - if 'year' in data: - self._year = data['year'] +from datetime import datetime +from typing import Any +import semanticscholar.Author +import semanticscholar.Journal +import semanticscholar.Tldr + + +class Paper: + ''' + This class abstracts a paper. + ''' + + FIELDS = [ + 'abstract', + 'authors', + 'authors.affiliations', + 'authors.aliases', + 'authors.authorId', + 'authors.citationCount', + 'authors.externalIds', + 'authors.hIndex', + 'authors.homepage', + 'authors.name', + 'authors.paperCount', + 'authors.url', + 'citationCount', + 'citations', + 'citations.abstract', + 'citations.authors', + 'citations.citationCount', + 'citations.corpusId', + 'citations.externalIds', + 'citations.fieldsOfStudy', + 'citations.influentialCitationCount', + 'citations.isOpenAccess', + 'citations.journal', + 'citations.openAccessPdf', + 'citations.paperId', + 'citations.publicationDate', + 'citations.publicationTypes', + 'citations.publicationVenue', + 'citations.referenceCount', + 'citations.s2FieldsOfStudy', + 'citations.title', + 'citations.url', + 'citations.venue', + 'citations.year', + 'corpusId', + 'embedding', + 'externalIds', + 'fieldsOfStudy', + 'influentialCitationCount', + 'isOpenAccess', + 'journal', + 'openAccessPdf', + 'paperId', + 'publicationDate', + 'publicationTypes', + 'publicationVenue', + 'referenceCount', + 'references', + 'references.abstract', + 'references.authors', + 'references.citationCount', + 'references.citationStyles', + 'references.corpusId', + 'references.externalIds', + 'references.fieldsOfStudy', + 'references.influentialCitationCount', + 'references.isOpenAccess', + 'references.journal', + 'references.openAccessPdf', + 'references.paperId', + 'references.publicationDate', + 'references.publicationTypes', + 'references.publicationVenue', + 'references.referenceCount', + 'references.s2FieldsOfStudy', + 'references.title', + 'references.url', + 'references.venue', + 'references.year', + 's2FieldsOfStudy', + 'title', + 'tldr', + 'url', + 'venue', + 'year' + ] + + SEARCH_FIELDS = [ + 'abstract', + 'authors', + 'citationCount', + 'corpusId', + 'externalIds', + 'fieldsOfStudy', + 'influentialCitationCount', + 'isOpenAccess', + 'journal', + 'openAccessPdf', + 'paperId', + 'publicationDate', + 'publicationTypes', + 'publicationVenue', + 'referenceCount', + 's2FieldsOfStudy', + 'title', + 'url', + 'venue', + 'year' + ] + + def __init__(self, data) -> None: + self._abstract = None + self._authors = None + self._citationCount = None + self._citations = None + self._corpusId = None + self._embedding = None + self._externalIds = None + self._fieldsOfStudy = None + self._influentialCitationCount = None + self._isOpenAccess = None + self._journal = None + self._openAccessPdf = None + self._paperId = None + self._publicationDate = None + self._publicationTypes = None + self._publicationVenue = None + self._referenceCount = None + self._references = None + self._s2FieldsOfStudy = None + self._title = None + self._tldr = None + self._venue = None + self._year = None + self._init_attributes(data) + + def __str__(self) -> str: + return self._data.__str__() + + def __repr__(self) -> Any: + return self._data.__repr__() + + def __getitem__(self, key) -> Any: + return self._data.__getitem__(key) + + def keys(self): + return self._data.keys() + + @property + def abstract(self) -> str: + ''' + :type: :class:`str` + ''' + return self._abstract + + @property + def authors(self) -> list: + ''' + :type: :class:`list` + ''' + return self._authors + + @property + def citationCount(self) -> int: + ''' + :type: :class:`int` + ''' + return self._citationCount + + @property + def citations(self) -> list: + ''' + :type: :class:`list` + ''' + return self._citations + + @property + def corpusId(self) -> str: + ''' + :type: :class:`str` + ''' + return self._corpusId + + @property + def embedding(self) -> dict: + ''' + :type: :class:`dict` + ''' + return self._embedding + + @property + def externalIds(self) -> dict: + ''' + :type: :class:`dict` + ''' + return self._externalIds + + @property + def fieldsOfStudy(self) -> list: + ''' + :type: :class:`list` + ''' + return self._fieldsOfStudy + + @property + def influentialCitationCount(self) -> int: + ''' + :type: :class:`int` + ''' + return self._influentialCitationCount + + @property + def isOpenAccess(self) -> bool: + ''' + :type: :class:`bool` + ''' + return self._isOpenAccess + + @property + def journal(self) -> semanticscholar.Journal.Journal: + ''' + :type: :class:`Journal` + ''' + return self._journal + + @property + def openAccessPdf(self) -> dict: + ''' + :type: :class:`dict` + ''' + return self._openAccessPdf + + @property + def paperId(self) -> str: + ''' + :type: :class:`str` + ''' + return self._paperId + + @property + def publicationDate(self) -> datetime: + ''' + :type: :class:`datetime` + ''' + return self._publicationDate + + @property + def publicationTypes(self) -> list: + ''' + :type: :class:`list` + ''' + return self._publicationTypes + + @property + def publicationVenue(self) -> dict: + ''' + :type: :class:`dict` + ''' + return self._publicationVenue + + @property + def referenceCount(self) -> int: + ''' + :type: :class:`int` + ''' + return self._referenceCount + + @property + def references(self) -> list: + ''' + :type: :class:`list` + ''' + return self._references + + @property + def s2FieldsOfStudy(self) -> list: + ''' + :type: :class:`list` + ''' + return self._s2FieldsOfStudy + + @property + def title(self) -> str: + ''' + :type: :class:`str` + ''' + return self._title + + @property + def tldr(self) -> semanticscholar.Tldr.Tldr: + ''' + :type: :class:`Tldr` + ''' + return self._tldr + + @property + def url(self) -> str: + ''' + :type: :class:`str` + ''' + return self._url + + @property + def venue(self) -> str: + ''' + :type: :class:`str` + ''' + return self._venue + + @property + def year(self) -> int: + ''' + :type: :class:`int` + ''' + return self._year + + @property + def raw_data(self) -> dict: + ''' + :type: :class:`dict` + ''' + return self._data + + def _init_attributes(self, data) -> None: + self._data = data + if 'abstract' in data: + self._abstract = data['abstract'] + if 'authors' in data: + items = [] + for item in data['authors']: + items.append(semanticscholar.Author.Author(item)) + self._authors = items + if 'citationCount' in data: + self._citationCount = data['citationCount'] + if 'citations' in data: + items = [] + for item in data['citations']: + items.append(Paper(item)) + self._citations = items + if 'corpusId' in data: + self._corpusId = data['corpusId'] + if 'embedding' in data: + self._embedding = data['embedding'] + if 'externalIds' in data: + self._externalIds = data['externalIds'] + if 'fieldsOfStudy' in data: + self._fieldsOfStudy = data['fieldsOfStudy'] + if 'influentialCitationCount' in data: + self._influentialCitationCount = data['influentialCitationCount'] + if 'isOpenAccess' in data: + self._isOpenAccess = data['isOpenAccess'] + if 'journal' in data: + if data['journal'] is not None: + self._journal = semanticscholar.Journal.Journal(data['journal']) + if 'openAccessPdf' in data: + self._openAccessPdf = data['openAccessPdf'] + if 'paperId' in data: + self._paperId = data['paperId'] + if 'publicationDate' in data: + if data['publicationDate'] is not None: + self._publicationDate = datetime.strptime( + data['publicationDate'], '%Y-%m-%d') + if 'publicationTypes' in data: + self._publicationTypes = data['publicationTypes'] + if 'publicationVenue' in data: + self._publicationVenue = data['publicationVenue'] + if 'referenceCount' in data: + self._referenceCount = data['referenceCount'] + if 'references' in data: + items = [] + for item in data['references']: + items.append(Paper(item)) + self._references = items + if 's2FieldsOfStudy' in data: + self._s2FieldsOfStudy = data['s2FieldsOfStudy'] + if 'title' in data: + self._title = data['title'] + if 'tldr' in data: + if data['tldr'] is not None: + self._tldr = semanticscholar.Tldr.Tldr(data['tldr']) + if 'url' in data: + self._url = data['url'] + if 'venue' in data: + self._venue = data['venue'] + if 'year' in data: + self._year = data['year'] diff --git a/tests/data/Author.json b/tests/data/Author.json index 8abf11b..6397abc 100644 --- a/tests/data/Author.json +++ b/tests/data/Author.json @@ -1 +1 @@ -{"authorId": "2262347", "externalIds": {"DBLP": ["Alan M. Turing"]}, "url": "https://www.semanticscholar.org/author/2262347", "name": "A. Turing", "aliases": ["A Turing", "A M Turing", "A. M. Turing", "Alan M. Turing", "Alan Turing", "Alan Mathison Turing"], "affiliations": [], "homepage": null, "paperCount": 60, "citationCount": 12304, "hIndex": 23, "papers": [{"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "externalIds": {"CorpusId": 251848799}, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "title": "Dystopian or Utopian? Two Images of Alan Turing", "abstract": "Turing made intriguing statements about the future of arti\ufb01cial intelligence (AI) in society. He predicted that machines would eventually \u2018compete with men in all purely intellectual \ufb01elds,\u2019 and added that at some stage they could be expected \u2018to take control.\u2019 Turing has been associated by his biographer, Andrew Hodges, with Dr. Frankenstein from Mary Shelley\u2019s dystopian novel. However, he has also been described by his contemporary Geoffrey Jefferson as a \u2018scienti\ufb01c\u2019 Percy B. Shelley, the English Romantic poet who was posthumously championed as a utopian and radical thinker. This article then asks: in what way did Turing envision a society permeated with intelligent machines? Did he see it as a utopia or a dystopia? These questions are thoroughly examined using Turing\u2019s own texts and related sources. This study reconstructs Turing\u2019s historical context in postwar England and analyzes his irony and sense of humor, as well as the in\ufb02uence of Samuel Butler on his vision. Contrary to recent views in AI science and \ufb01ction, on the one hand, a mismatch is shown between Turing and the incautious Frankenstein; on the other hand, Turing\u2019s radical Shelley-like qualities are substantiated. The article shows that Turing\u2019s utopianism entrusted intelligent machines with the task of teaching lessons of rationality and intellectual integrity over our place in nature and prejudices. Further, Turing\u2019s irony is shown to have targeted intellectuals who sacri\ufb01ce independent thinking to retain their power. These, he hoped, would be eventually rivaled and surpassed by intelligent machines.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "947efa54175145240c1a33f62321f23db43571e7", "externalIds": {"DBLP": "phd/Turing38", "MAG": "1970654545", "DOI": "10.1016/b978-044450423-4/50007-3", "CorpusId": 40363661}, "url": "https://www.semanticscholar.org/paper/947efa54175145240c1a33f62321f23db43571e7", "title": "Systems of Logic Based on Ordinals", "abstract": null, "venue": "Alan Turing's Systems of Logic", "year": 2012, "referenceCount": 23, "citationCount": 328, "influentialCitationCount": 30, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-12-31", "journal": {"name": "Alan Turing's Systems of Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "b7682dfbd4c03e287265d64e46388d21eedf3394", "externalIds": {"MAG": "46849891", "DOI": "10.1093/oso/9780198250791.003.0017", "CorpusId": 172414532}, "url": "https://www.semanticscholar.org/paper/b7682dfbd4c03e287265d64e46388d21eedf3394", "title": "Computing Machinery and Intelligence (1950)", "abstract": null, "venue": "Ideas That Created the Future", "year": 1989, "referenceCount": 0, "citationCount": 47, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-06-01", "journal": {"name": "Ideas That Created the Future"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6b7b392d5f3284a78fd559439bc735f3f0b08bae", "externalIds": {"DBLP": "journals/cryptologia/X20", "DOI": "10.1080/01611194.2019.1650846", "CorpusId": 212727442}, "url": "https://www.semanticscholar.org/paper/6b7b392d5f3284a78fd559439bc735f3f0b08bae", "title": "Review of two collections of essays about Alan Turing", "abstract": "2012 was the Alan Turing Year \u2014 the celebration of the 100th anniversary of Alan Turing\u2019s birth. Turing\u2019s biographer Andrew Hodges in the \u201cForward\u201d to The Turing Guide comments that \u201cTuring\u2019s centenary year reflected a general public sense that the issues of Alan Turing\u2019s life and work are as relevant as ever in the twentyfirst century.\u201d The Turing Guide consists of 42 essays that are written for general readers and that celebrate Turing\u2019s: life (38 pages), accomplishments in mathematics (44 pages), codebreaking (120 pages), On Computable Numbers and the Turing machine (36 pages), postwar work on computers (67 pages), contributions to morphogenesis (32 pages), ideas related to machine intelligence (86 pages), and legacy (32 pages). Eleven essays deal directly with codebreaking. Copeland either wrote, participated in the writing of, or revised 16 of the essays. Of the eight essays in the section \u201cArtificial Intelligence and the Mind,\u201d three were written by Diane Proudfoot and one includes her as a coauthor with Copeland (who wrote one other essay and coauthored a third essay in that section). The book begins with an overview of Turing\u2019s life and work by Copeland and Bowen. The essay is mostly a timeline of Turing\u2019s life. The authors suggest that Turing\u2019s death might have been accidental. Chapter 3, \u201cMeeting a Genius\u201d (4 pages), is by mathematician and Bletchley Park codebreaker Peter Hilton (1923\u20132010). Notes to the chapter (p. 485) state that the chapter was \u201cassembled by Jack Copeland\u201d and \u201cpublished with the permission of [Hilton\u2019s] wife.\u201d It is also noted that \u201c[in] 2001 and again in 2002 [Hilton] visited Copeland at the University of Canterbury in New Zealand, where he delivered lectures on Turing and codebreaking. [The] chapter is a compilation of extracts from [Hilton\u2019s] papers and notes left in New Zealand, together with extracts from [Hilton\u2019s]", "venue": "Cryptologia", "year": 2020, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2020-01-02", "journal": {"volume": "44", "pages": "82 - 86", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "1772040", "name": "Jonathan P. Bowen"}, {"authorId": "3075367", "name": "Mark D. Sprevak"}, {"authorId": "2109033245", "name": "Robin J. Wilson"}, {"authorId": "2085428", "name": "A. Bokulich"}]}, {"paperId": "87aebbd963f929cfb5ac46b0facb5128148758ad", "externalIds": {"CorpusId": 202754269}, "url": "https://www.semanticscholar.org/paper/87aebbd963f929cfb5ac46b0facb5128148758ad", "title": "Development of Moore \u2019 s Law", "abstract": "Many theorists would agree that, had it not been for courseware, the construction of online algorithms might never have occurred. In this paper, we confirm the visualization of superblocks. In this paper we argue that the Turing machine can be made pseudorandom, metamorphic, and low-energy.", "venue": "", "year": 2019, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "117077595", "name": "Olivier Pirson"}, {"authorId": "2153307", "name": "R. Stallman"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "1717349", "name": "D. Knuth"}]}, {"paperId": "d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", "externalIds": {"DOI": "10.1049/pbpc026e_ch8", "CorpusId": 242953753}, "url": "https://www.semanticscholar.org/paper/d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", "title": "Turing machines", "abstract": null, "venue": "Handbook of Mathematical Models for Languages and Computation", "year": 2019, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2019-11-12", "journal": {"name": "Handbook of Mathematical Models for Languages and Computation"}, "authors": [{"authorId": "6234493", "name": "D. Hilbert"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "2157103111", "name": "M. \u201ccrashes"}]}, {"paperId": "eb320a6d4e58d91c72ba0dc663da10579dd5957d", "externalIds": {"DOI": "10.1090/mbk/121/24", "CorpusId": 241773225}, "url": "https://www.semanticscholar.org/paper/eb320a6d4e58d91c72ba0dc663da10579dd5957d", "title": "Alan Turing", "abstract": "When the name \u201dAlan Turing\u201d is mentioned most people think of one or more of the following words: \u201dTuring Machine\u201d, \u201dTuring Test\u201d, \u201dEnigma\u201d and \u201dArtificial Intelligence\u201d. The intention of this article is to present a broader approach to Alan Turing instead of solely focusing on the above mentioned key words. Alan Turing was not only a key figure in computer science and crypto-analysis. His work also revolved around subjects such as the growth of plants, the human mind and he also anticipated many of the issues that are being discussed in today\u2019s artificial intelligence research. Being unconventional, ahead of his time as a visionary and openly admitting his homosexuality caused a lot personal problems during his life. However Alan Turing was successfully able to balance his life by relying on personal friends, scientific colleagues, his work and sports. He became a tragic icon when he died at age 42 apparently having committed suicide. 1 Family background and childhood: Alan Mathison Turing was born in London on 23 June 1912. His parents Julius Mathison and Ethel Sara Turing had met in India where Julius worked in the Indian Civil Service. Ethel Sara was the daughter of a chief engineer working for Madras railways. Alan also had an older brother named John. The two boys spent most of their childhood with a variety of foster parents as Julius and Ethel soon moved back to India after Alan\u2019s birth. His childhood was mainly influenced by his family situation and his family\u2019s upper-middle-class status inside the English society at the beginning of the 20th century. There was little incentive for scientific exploration in the family or school at the time so Alan\u2019s first contact with science occurred during his free time. One of the books which he read during his childhood was called \u201dNatural Wonders Every Child Should Know\u201d \u2217e-mail: e0425826@student.tuwien.ac.at", "venue": "100 Years of Math Milestones", "year": 2019, "referenceCount": 125, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2019-06-12", "journal": {"name": "100 Years of Math Milestones"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "98630872", "name": "S. Cooper"}, {"authorId": "2138333896", "name": "Trenz Pruca"}, {"authorId": "2138325070", "name": "Malesuada quis"}, {"authorId": "2138324300", "name": "egestas quis"}, {"authorId": "2138382523", "name": "Alan Turingyear"}, {"authorId": "2136546073", "name": "See A. Hodges"}]}, {"paperId": "ecb77b338846ac6dbaecf953984f8d44e76a8def", "externalIds": {"CorpusId": 231691745}, "url": "https://www.semanticscholar.org/paper/ecb77b338846ac6dbaecf953984f8d44e76a8def", "title": "Machine Learning, a key component in business model transformation", "abstract": null, "venue": "", "year": 2018, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "fd77c9ac5ead99b216633aa16d9b664516e6d24a", "externalIds": {"DOI": "10.1201/9781315273587-12", "CorpusId": 240057602}, "url": "https://www.semanticscholar.org/paper/fd77c9ac5ead99b216633aa16d9b664516e6d24a", "title": "Text processing", "abstract": null, "venue": "Elementary Standard ML", "year": 2018, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2018-10-08", "journal": {"name": "Elementary Standard ML"}, "authors": [{"authorId": "72482255", "name": "C. Gregg"}, {"authorId": "1764547", "name": "M. Sahami"}, {"authorId": "144124712", "name": "J. Clarke"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "aa2c899534681104e64f0971d7cb1a003dd6efd2", "externalIds": {"CorpusId": 51883623}, "url": "https://www.semanticscholar.org/paper/aa2c899534681104e64f0971d7cb1a003dd6efd2", "title": "What \u2019 s Missing from Deep Learning ?", "abstract": "A neural network model for a mechanism of visual pattern recognition is proposed in this paper. The network is self-organized by \"learning without a teacher\", and acquires an ability to recognize stimulus patterns based on the geometrical similarity (Gestalt) of their shapes without affected by their positions. This network is given a nickname \"neocognitron\". After completion of self-organization, the network has a structure similar to the hierarchy model of the visual nervous system proposed by Hubel and Wiesel. The network consists of an input layer (photoreceptor array) followed by a cascade connection of a number of modular structures, each of which is composed of two layers of cells connected in a cascade. The first layer of each module consists of \"S-cells', which show characteristics similar to simple cells or lower order hypercomplex cells, and the second layer consists of \"C-cells\" similar to complex cells or higher order hypercomplex cells. The afferent synapses to each S-cell have plasticity and are modifiable. The network has an ability of unsupervised learning: We do not need any \"teacher\" during the process of selforganization, and it is only needed to present a set of stimulus patterns repeatedly to the input layer of the network. The network has been simulated on a digital computer. After repetitive presentation of a set of stimulus patterns, each stimulus pattern has become to elicit an output only from one of the C-cells of the last layer, and conversely, this C-cell has become selectively responsive only to that stimulus pattern. That is, none of the C-cells of the last layer responds to more than one stimulus pattern. The response of the C-cells of the last layer is not affected by the pattern's position at all. Neither is it affected by a small change in shape nor in size of the stimulus pattern.", "venue": "", "year": 2017, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1708655", "name": "B. Olshausen"}, {"authorId": "145260300", "name": "H. Wills"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "1847175", "name": "M. Minsky"}, {"authorId": "143805238", "name": "J. McCarthy"}, {"authorId": "51083130", "name": "F. Rosenblatt"}, {"authorId": "145707626", "name": "N. Wiener"}, {"authorId": "2067567609", "name": "Warren McCulloch"}, {"authorId": "50314979", "name": "W. Pitts"}, {"authorId": "3160228", "name": "K. Fukushima"}]}, {"paperId": "b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "externalIds": {"MAG": "2467689444", "CorpusId": 159733415}, "url": "https://www.semanticscholar.org/paper/b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "title": "The President, the Vice President, the Secretary-Treasurer, and ARNOLD DRESDEN,2", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3154491", "name": "A. Tarski"}, {"authorId": "50455788", "name": "S. Maclane"}, {"authorId": "40384728", "name": "H. B. Curry"}, {"authorId": "122394125", "name": "Paul Marhenkei"}, {"authorId": "101931347", "name": "A. Dresden"}, {"authorId": "118436071", "name": "Karl-Heinz Menger"}, {"authorId": "123809183", "name": "Frederic B. FiTCHc"}, {"authorId": "49957888", "name": "E. Nagel"}, {"authorId": "49836121", "name": "C. Hempel"}, {"authorId": "145260350", "name": "W. Quine"}, {"authorId": "91132817", "name": "C. Langford"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "40245151", "name": "F. B. Fitch"}, {"authorId": "104540019", "name": "P. Marhenke"}, {"authorId": "2072295124", "name": "C. Duca"}]}, {"paperId": "3180b4f827030c4b3a0ff048d1fee462575ca71f", "externalIds": {"MAG": "2400968335", "CorpusId": 124065102}, "url": "https://www.semanticscholar.org/paper/3180b4f827030c4b3a0ff048d1fee462575ca71f", "title": "Convergence Rates for Persistence Diagram Estimation in", "abstract": "Computational topology has recently seen an important development toward data analysis, giving birth to the eld of topological data analysis. Topological persistence, or persistent homology, appears as a fundamental tool in this eld. In this paper, we study topological persistence in general metric spaces, with a statistical approach. We show that the use of persistent homology can be naturally considered in general statistical frameworks and that persistence diagrams can be used as statistics with interesting convergence properties. Some numerical experiments are performed in various contexts to illustrate our results.", "venue": "", "year": 2015, "referenceCount": 34, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1760330", "name": "M. Glisse"}, {"authorId": "66876582", "name": "Inria Saclay"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "102582041", "name": "Catherine Labru"}, {"authorId": "38291080", "name": "B. Michel"}]}, {"paperId": "293a50e86c2a2f4a2e213a42e057910aeda09d82", "externalIds": {"MAG": "2185394266", "CorpusId": 125067106}, "url": "https://www.semanticscholar.org/paper/293a50e86c2a2f4a2e213a42e057910aeda09d82", "title": "\u2022 Hilbert spaces. Weak derivatives. Classical and weak solutions. \u2022 Galerkin approximation of elliptic equations. Spectral approximation. Finite element approximation in one dimension. Energy estimates. \u2022 Parabolic PDEs. Semigroups of operators. Method of lines. Stability of numerical", "abstract": null, "venue": "", "year": 2014, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "104483519", "name": "Lecturer Sean Holman"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "103905785", "name": "January Exam"}]}, {"paperId": "9f07386256530a0060d99a1ba483a8f5c1f4194b", "externalIds": {"MAG": "2029222787", "DOI": "10.1093/ITNOW/BWU030", "CorpusId": 109153053}, "url": "https://www.semanticscholar.org/paper/9f07386256530a0060d99a1ba483a8f5c1f4194b", "title": "Turing: Oracles and Computation", "abstract": null, "venue": "", "year": 2014, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-03-01", "journal": {"volume": "56", "pages": "64-65", "name": "Itnow"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "0875d9bdd710fe886d7f4543e17dfd581893f538", "externalIds": {"CorpusId": 18099107}, "url": "https://www.semanticscholar.org/paper/0875d9bdd710fe886d7f4543e17dfd581893f538", "title": "Watching the Daisies Grow: from Biology to Biomathematics and Bioinformatics \u2014 Alan Turing Centenary Special Issue", "abstract": "Preface We can only see a short distance ahead, but we can see plenty there that needs to be done. Year 2012 is both the centenary of Alan Turing's birth and the 60th anniversary of the famous paper The Chemical Basis of Morphogenesis, in which he established foundations of the mathematical theory of biological and chemical pattern formation. The story started much earlier, in spring 1923, as documented by his mother in a caricature entitled Hockey or Watching the Daisies Grow. Crucial motif in the drawing is that, while most players are engaged by the game, Alan is investigating a flower emerging just off the field. Always fascinated by the relationship between matter and spirit, especially in the processes of thinking , Turing started from the assumption that the operation of human brain is completely physical. This led him to invention of an abstract computing machine named after him, which laid the foundations of modern computer science. In recognition of his enormous contribution to the growth of the field, the most prestigious award in computer science, called \" Nobel Prize of computing \" , is named after Turing. Success has many fathers, but it was Alan Turing to whom we owe the final breaking of the Enigma code. He extended the idea of so-called \" Cryptology bombs \" , i.e., machines aimed at breaking codes, constructed before World War II by Polish mathematicians: Rejewski, R\u00f3\u02d9 zycki and Zygalski. His solution ensured the information advantage of the Allies during the Battle of the Atlantic, which had a direct bearing on the success of operations in Normandy and the defeat of Nazi Germany. After the war, Turing took up marathon running to relieve the stress, studied why spots on the leop-ard's body are in the shape of a rosette or ring, and proposed a test to measure the machine's ability to exhibit intelligent behavior. For this last reason, Turing is regarded as a founder of artificial intelligence. He left this world prematurely in the age of 42, but managed to finish the race with the highest score, in fact more than one race.. . In this special issue, we present a selection of papers commemorating Alan Turing and arguing that he should be also considered the co-founder of biomathematics and bioinformatics. His late works were", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "externalIds": {"MAG": "2741266234", "CorpusId": 125093480}, "url": "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "title": "Dusting Off the Turing Test", "abstract": "then inter- est theory and a problem about the observation of quantum systems (now as the quantum Zeno effect). With his death, train was lost, but the question computa- tion to fundamental physics has remained. Since the computing given a practical technological arena in which computation and quantum physics interact excitingly, it has not yet changed Tur- ing\u0092 s picture of what is computable. There are also thought-experiment models that explore what it would mean beyond the ally require machine operate with speed or allow unlim- ited accuracy probe more the nature physical world. Perhaps the body of ideas is that of Roger Penrose ( 7). These draw strongly on the very thing motivated Tur- ing\u0092 s early relationship operations to the imply that uncomputable physics abstract of how states are in the world. The problem remains: Does computation with discrete symbols a complete the world? If it does, how can make this connection manifest? If it does not, where does fail, and what would this tell us about fundamental science?", "venue": "", "year": 2012, "referenceCount": 1, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "422ec845a15242fdfc904e1c7d2bfe132c7ec248", "externalIds": {"CorpusId": 18051598}, "url": "https://www.semanticscholar.org/paper/422ec845a15242fdfc904e1c7d2bfe132c7ec248", "title": "PLANES OF MORPHISMS AND THE CHARACTERIZATION OF CONTINUOUSLY INTEGRAL, COMPLETE RANDOM VARIABLES", "abstract": "Let \u03b8m,\u03bc be an independent, right-composite, anti-naturally continuous polytope. Recent interest in smooth systems has centered on describing additive subsets. We show that there exists a non-universal non-injective subalgebra. In contrast, it is not yet known whether \u03b8 < D, although [25] does address the issue of existence. So recent developments in modern integral PDE [25] have raised the question of whether e ( 0 ) 6= log ( 1 \u2016\u03c7\u2016 ) \u222a c ( 1 \u2229 i, \u03c0 )", "venue": "", "year": 2012, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "12989190", "name": "M. Lafourcade"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "50294906", "name": "M. Abel"}]}, {"paperId": "4f4b42aa137d5b6df85889cf53901f44cbee643b", "externalIds": {"MAG": "2187383749", "DOI": "10.7551/mitpress/5123.003.0007", "CorpusId": 62254832}, "url": "https://www.semanticscholar.org/paper/4f4b42aa137d5b6df85889cf53901f44cbee643b", "title": "Could a machine think", "abstract": null, "venue": "", "year": 2012, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2055661501", "name": "Pascal Ludwig"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "34493294", "name": "J. Searle"}]}, {"paperId": "5cfe755938d14edd5422d72215cf8b733f0284fc", "externalIds": {"DBLP": "journals/cryptologia/TuringB12", "MAG": "2054264625", "DOI": "10.1080/01611194.2012.713803", "CorpusId": 205488183}, "url": "https://www.semanticscholar.org/paper/5cfe755938d14edd5422d72215cf8b733f0284fc", "title": "Report on Speech Secrecy System DELILAH, a Technical Description Compiled by A. M. Turing and Lieutenant D. Bayley REME, 1945\u20131946", "abstract": "The book groups themselves might be used as a form of cipher, but this is rather insecure, so that some further process or \u2018\u2018recipher\u2019\u2019 is usually applied. From the point of view of this reciphering, it is natural to regard the book groups as virtually plain language. Moreover, the division into groups is now of little real interest; it is useful to relieve the eye, but that is all. Let us run the groups together and call the result \u2018\u2018P=L figures\u2019\u2019:", "venue": "Cryptologia", "year": 2012, "referenceCount": 0, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-10-01", "journal": {"volume": "36", "pages": "295 - 340", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "84292446", "name": "D. Bayley"}]}, {"paperId": "300d41307bb946510bdc111463f5fb71b2a21796", "externalIds": {"MAG": "2274591444", "CorpusId": 124844782}, "url": "https://www.semanticscholar.org/paper/300d41307bb946510bdc111463f5fb71b2a21796", "title": "Correspondence with [A.M. Turing]", "abstract": null, "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "2011-11-21", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "51326515", "name": "R. Fisher"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "50a1357c04bde76f752aac1dbd2ba2601622ccd4", "externalIds": {"CorpusId": 8641258}, "url": "https://www.semanticscholar.org/paper/50a1357c04bde76f752aac1dbd2ba2601622ccd4", "title": "Alan Mathison Turing Universal Turing Machine", "abstract": "Scatter/gather I/O must work [54], [59], [62], [68], [68], [70], [70], [70], [95], [95], [114], [114], [114], [152], [168], [179], [179], [179], [188], [191]. After years of confusing research into gigabit switches, we confirm the simulation of architecture, which embodies the structured principles of software engineering. In order to solve this riddle, we inve stigate how digital-to-analog converters can be applied to t he", "venue": "", "year": 2011, "referenceCount": 248, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6da083c8833b4000b088ea366f16f1ea8d9b6dad", "externalIds": {"CorpusId": 17718604}, "url": "https://www.semanticscholar.org/paper/6da083c8833b4000b088ea366f16f1ea8d9b6dad", "title": "The legacy of Alan Turing Universal Turing Machine", "abstract": "The investigation of 802.11b has evaluated IPv6, and current trends suggest that the analysis of local-area networks will soon emerge. Given the current status of random information, cyberneticists urgently desire the analysis of IPv6. Our focus here is not on whether SMPs and consistent hashing are often incompatible, but rather on introducing a novel algorithm for the improvement of multi-processors (Esparcet).", "venue": "", "year": 2011, "referenceCount": 243, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "externalIds": {"CorpusId": 17215741}, "url": "https://www.semanticscholar.org/paper/de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "title": "Alan Turing Universal Turing Machine", "abstract": "In recent years, much research has been devoted to the synthesis of gigabit switches; on the other hand, few have explored the refinement of hash tables. In fact, few cryptographers would disagree with the improvement of the lookaside buffer. In this work, we use signed technology to show that architecture and superblocks are usually incompatible.", "venue": "", "year": 2011, "referenceCount": 153, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "externalIds": {"CorpusId": 115526721}, "url": "https://www.semanticscholar.org/paper/2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "title": "Turing 1950 1 The Imitation Game", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink.\u201d The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous, If the meaning of the words\u201cmachine\u201dand \u201cthink\u201d are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words. The new form of the problem can be described in terms of a game which we call the \u201cimitation game.\u201d It is played with three people, a man (A), a woman (B), and an interrogator (C) who may be of either sex. The interrogator stays in a room apart front the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman. He knows them by labels X and Y, and at the end of the game he says either \u201cX is A and Y is B\u201d or \u201cX is B and Y is A.\u201d The interrogator is allowed to put questions to A and B thus:", "venue": "", "year": 2010, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6c9520d25a2f93f1fb4f08bab66d90a1519faaac", "externalIds": {"MAG": "2479903735", "DOI": "10.14361/9783839403396-004", "CorpusId": 184361851}, "url": "https://www.semanticscholar.org/paper/6c9520d25a2f93f1fb4f08bab66d90a1519faaac", "title": "Computermaschinerie und Intelligenz (1950)", "abstract": null, "venue": "Reader Neue Medien", "year": 2007, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2007-12-31", "journal": {"name": "Reader Neue Medien"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f", "externalIds": {"MAG": "2967838196", "CorpusId": 17359642}, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f", "title": "Computing Machinery and Intelligence A.M. Turing", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous, If the meaning of the words \"machine\" and \"think\" are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \"Can machines think? \" is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 129, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5", "externalIds": {"MAG": "2499467011", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0023", "CorpusId": 62965306}, "url": "https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5", "title": "The Turing\u2013Wilkinson lecture series (1946\u20137)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "459-528", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "2056940608", "name": "J. H. Wilkinson"}]}, {"paperId": "2190254a337fd601af32260dc4133d009933ee65", "externalIds": {"MAG": "2483371858", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0021", "CorpusId": 64463006}, "url": "https://www.semanticscholar.org/paper/2190254a337fd601af32260dc4133d009933ee65", "title": "Proposed electronic calculator (1945)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 49, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "369-454", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "externalIds": {"MAG": "2490852693", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0022", "CorpusId": 64507632}, "url": "https://www.semanticscholar.org/paper/f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "title": "Notes on memory (1945)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "455-458", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "externalIds": {"MAG": "3101684541", "DOI": "10.1093/oso/9780198250791.003.0016", "CorpusId": 232473093}, "url": "https://www.semanticscholar.org/paper/05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "title": "Intelligent Machinery (1948)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 31, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "13103014e997dd6273e2bc3661353d09165cf90c", "externalIds": {"MAG": "3103227490", "DOI": "10.1093/oso/9780198250791.003.0015", "CorpusId": 229803945}, "url": "https://www.semanticscholar.org/paper/13103014e997dd6273e2bc3661353d09165cf90c", "title": "Lecture on the Automatic Computing Engine (1947)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "15b2a8b748d8063348071beb106b4921c0ef8ba6", "externalIds": {"MAG": "3101010549", "DOI": "10.1093/oso/9780198250791.003.0007", "CorpusId": 232670029}, "url": "https://www.semanticscholar.org/paper/15b2a8b748d8063348071beb106b4921c0ef8ba6", "title": "Systems of Logic Based on Ordinals (1938)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "1bb2114c24263b0489f24f787fef86f33487f802", "externalIds": {"MAG": "169424043", "DOI": "10.7551/mitpress/6928.003.0016", "CorpusId": 5561670}, "url": "https://www.semanticscholar.org/paper/1bb2114c24263b0489f24f787fef86f33487f802", "title": "Can Automatic Calculating Machines Be Said to Think", "abstract": "Trainable methodologies and the transistor have garnered profound interest from both steganographers and cyberinfo rmaticians in the last several years. Given the current statu s of compact technology, computational biologists particul arly desire the visualization of forward-error correction, whi ch embodies the essential principles of networking. Our focus in this paper is not on whether the infamous certifiable algorit hm for the refinement of thin clients by P. Jackson et al. [54], [5 8], [59], [62], [68], [68], [70], [95], [95], [99], [114], [114] , [128], [129], [148], [152], [168], [179], [188], [191] is recursiv ely enumerable, but rather on constructing a pervasive tool for evaluating Internet QoS (HolHoveling).", "venue": "", "year": 2004, "referenceCount": 271, "citationCount": 288, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "117-132", "name": ""}, "authors": [{"authorId": "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "2060159667", "name": "Geoffrey Jefferson"}, {"authorId": "34635194", "name": "R. Braithwaite"}, {"authorId": "1692491", "name": "S. Shieber"}]}, {"paperId": "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": {"MAG": "593056538", "CorpusId": 60423929}, "url": "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "title": "The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma", "abstract": "Alan Turing 1912-1954 Computable Numbers: A Guide 1. On Computable Numbers, with an Application to the Entscheidensproblem (1936) 2. On Computable Numbers: Corrections and Critiques 3. Systems of Logic Based on Ordinals (1938) 4. Letters on Logic to Max Newman (c. 1940) Enigma 5. History of Hut 8 to December 1941 (1845) 6. Bombe and Spider (1940) 7. Letter to Winston Churchill (1941) 8. Memorandum to OP-20-G on Naval Enigma (c. 1941) Artificial Intelligence 9. Lecture on the Automatic Computing Machine (1947) 10. Intelligent Machinery (1948) 11. Computing Machinery and Intelligence (1950) 12. Intelligent Machinery, A Heretical Theory (c. 1951) 13. Can Digital Computers Think? 14. Can Automatic Calculating Machines Be Said to Think? (1952) Artificial Life 15. The Chemical Basis of Morphogenesis (1952) 16. Chess (1953) 17. Solvable and Unsolvable Problems (1954)", "venue": "", "year": 2004, "referenceCount": 39, "citationCount": 151, "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "118975427", "name": "J. Copeland"}]}, {"paperId": "e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "externalIds": {"MAG": "3105675538", "DOI": "10.1093/oso/9780198250791.003.0013", "CorpusId": 231523578}, "url": "https://www.semanticscholar.org/paper/e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "title": "Memorandum to OP-20-G on Naval Enigma (c.1941)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "ef5e79b3ba502350967ae9bff87243fbf140c8b9", "externalIds": {"MAG": "3098156012", "DOI": "10.1093/oso/9780198250791.003.0012", "CorpusId": 230737760}, "url": "https://www.semanticscholar.org/paper/ef5e79b3ba502350967ae9bff87243fbf140c8b9", "title": "Letter to Winston Churchill (1941)", "abstract": "During 1941, codebreaking at Bletchley Park was hindered by shortages of typists and unskilled staV. These shortages could have been easily rectiWed, but the codebreakers\u2019 urgent requests were ignored by oYcials in Whitehall. Going over the heads of those in command at GC & CS, Turing and his co-signatories wrote directly to the Prime Minister, Winston Churchill. On receiving the letter Churchill minuted his Chief of StaV, General Ismay: \u2018action this day Make sure they have all they want on extreme priority and report to me that this had been done.\u20191 It fell to Stuart Milner-Barry of Hut 6 to deliver the letter by hand to 10 Downing Street. In 1986, Milner-Barry recalled his trip to Whitehall:", "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "73506204", "name": "Gordon Welchman"}]}, {"paperId": "48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "externalIds": {"DBLP": "journals/cryptologia/Turing03", "MAG": "2030737075", "DOI": "10.1080/0161-110391891748", "CorpusId": 12703115}, "url": "https://www.semanticscholar.org/paper/48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "title": "ALAN M. TURING'S CRITIQUE OF RUNNING SHORT CRIBS ON THE U. S. NAVY BOMBE", "abstract": "Unified lossless information have led to many natural advances, including the partition table and massive multiplayer online roleplaying games. In this work, we disprove the analysis of B-trees that would make synthesizing Lamport clocks a real possibility. In this position paper, we argue that Boolean logic and Markov models can agree to accomplish this purpose.", "venue": "Cryptologia", "year": 2003, "referenceCount": 196, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2003-01-01", "journal": {"volume": "27", "pages": "44 - 49", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", "externalIds": {"MAG": "1992023589", "DBLP": "journals/cryptologia/Turing01", "DOI": "10.1080/0161-110191889734", "CorpusId": 14207094}, "url": "https://www.semanticscholar.org/paper/26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", "title": "VISIT TO NATIONAL CASH REGISTER CORPORATION OF DAYTON, OHIO", "abstract": "In recent years, much research has been devoted to the study of Boolean logic; however, few have developed the extensive unification of the location-identity split and co ntextfree grammar. After years of appropriate research into mode l checking, we verify the visualization of systems. In our research, we validate that the lookaside buffer and red-bla ck trees are never incompatible [54], [58], [59], [62], [68], [ 68], [68], [70], [95], [99], [114], [128], [129], [148], [152], [ 168], [168], [179], [188], [191].", "venue": "Cryptologia", "year": 2001, "referenceCount": 206, "citationCount": 179, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2001-01-01", "journal": {"volume": "25", "pages": "1 - 10", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "b52adf784f9a0ca3b936f39a90cf3445b48dc408", "externalIds": {"MAG": "2798463542", "DOI": "10.1007/3-540-31288-9_9", "CorpusId": 125729536}, "url": "https://www.semanticscholar.org/paper/b52adf784f9a0ca3b936f39a90cf3445b48dc408", "title": "Mathematical logic", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "externalIds": {"MAG": "2316135739", "DOI": "10.1093/PHILMAT/4.3.256", "CorpusId": 5213112}, "url": "https://www.semanticscholar.org/paper/650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "title": "Intelligent Machinery, A Heretical Theory*", "abstract": "The analysis of interrupts is a structured quagmire. In this position paper, we demonstrate the investigation of simulated annealing. KaliNil, our new methodology for DNS, is the solution to all of these problems.", "venue": "", "year": 1996, "referenceCount": 146, "citationCount": 213, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-09-01", "journal": {"volume": "4", "pages": "256-260", "name": "Philosophia Mathematica"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "509a622da7869a8eb345eea921ed30924a73e6fa", "externalIds": {"CorpusId": 18573444}, "url": "https://www.semanticscholar.org/paper/509a622da7869a8eb345eea921ed30924a73e6fa", "title": "Computer poker", "abstract": "Games are an interesting and challenging domain for computer science research, having the nice characteristics of a clearly deened set of rules and a speciic goal. Developing a program to play a strategic game well often involves the application of theoretical concepts to practical situations, and the relative success of that endeavour can be measured with quantiiable results. The game of poker is logistically simple yet strategically complex, and ooers many properties not exhibited by chess, checkers, and most other well-studied games. Most importantly, poker is a non-deterministic game with imperfect (hidden) information. Handling unreliable or incomplete information is a fundamental problem in computer science, and poker provides an excellent domain for investigating problems of decision making under conditions of uncertainty. Somewhat surprisingly, the potential beneets of studying poker have been largely overlooked by computer scientists and game researchers. In this essay we survey what resources are available for academic researchers, and lay some foundations for the sci-entiic exploration of this fascinating game.", "venue": "", "year": 1995, "referenceCount": 129, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "39261667", "name": "D. Billings"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "144461837", "name": "C. Shannon"}, {"authorId": "143805236", "name": "J. McCarthy"}, {"authorId": "1717349", "name": "D. Knuth"}, {"authorId": "48603437", "name": "A. Newell"}, {"authorId": "2055346931", "name": "Herbert A. Simon"}, {"authorId": "7991309", "name": "A. Samuel"}, {"authorId": "145878706", "name": "D. Michie"}, {"authorId": "102213388", "name": "K. Thompson"}]}, {"paperId": "e972b5110d036991078e55bede6608a7cdaf48b1", "externalIds": {"CorpusId": 8597454, "PubMed": "7564963"}, "url": "https://www.semanticscholar.org/paper/e972b5110d036991078e55bede6608a7cdaf48b1", "title": "Lecture to the London Mathematical Society on 20 February 1947. 1986.", "abstract": null, "venue": "M.D.Computing", "year": 1995, "referenceCount": 0, "citationCount": 166, "influentialCitationCount": 15, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "12 5", "pages": "\n 390-7\n ", "name": "M.D. computing : computers in medical practice"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "33adb5256f85d7835696611b2517797dcb260ddb", "externalIds": {"MAG": "1577952063", "CorpusId": 60626324}, "url": "https://www.semanticscholar.org/paper/33adb5256f85d7835696611b2517797dcb260ddb", "title": "Manchester computing machine: general topics", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": "194-196", "name": ""}, "authors": [{"authorId": "90657571", "name": "M. J. Lighthill"}, {"authorId": "16909947", "name": "G. C. Tootill"}, {"authorId": "143726570", "name": "J. Miller"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "143809548", "name": "E. A. Newman"}]}, {"paperId": "a28fe905a92c75ae2098acacad53c992e4bce52d", "externalIds": {"MAG": "1506559289", "CorpusId": 60659734}, "url": "https://www.semanticscholar.org/paper/a28fe905a92c75ae2098acacad53c992e4bce52d", "title": "Local programming methods and conventions", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 147, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": "178", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "f50fef843592d31124e629420a5d7df39a51fcd7", "externalIds": {"MAG": "1723067587", "CorpusId": 56518797}, "url": "https://www.semanticscholar.org/paper/f50fef843592d31124e629420a5d7df39a51fcd7", "title": "Checking a large routine", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 402, "influentialCitationCount": 44, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": "70-72", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "fc5ef435b26155d2ea554a8062781739c8ccf296", "externalIds": {"MAG": "627474889", "CorpusId": 190961434}, "url": "https://www.semanticscholar.org/paper/fc5ef435b26155d2ea554a8062781739c8ccf296", "title": "Intelligence service : Schriften", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 46, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "401226dbe808714439b7f4fe6ce17e3fb5a6e790", "externalIds": {"CorpusId": 7990676}, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790", "title": "Artificial Intelligence : Usfssg Computers to Think about Thinking . Part 1", "abstract": "In 1950, Alan M. Turing, the late deputy director of the University of Manchester\u2019s Computing Laboratory in England, proposed a novel test to determine whether a machine was capable of thinking. In thk test, an interrogator has a teletype conversation with a man and a woman, both of whom must try to convince the interrogator that they are the woman. At some point unknown to the interrogator, the man is replaced by a machine. If the interrogator is fooled as often by the machine as by the man, that machine can be said to have displayed intelligent behavior. 1 Some 30 years after Turing proposed this test, many aspects of human behavior have been simulated by a computer. Programs have been designed to play checkersz and chess,J prove mathematical theorems ,4,5 and even mimic the behavior of a paranoid human being.b Despite the success of these and many other programs, none of the researchers investigating what\u2019s been variously cafled \u201capplied epistemology\u201d or \u201cartificial intelligence\u201d (AI) would claim this means the \u201cthinking machine\u201d has arrived. Instead, they would agree that these programs have contributed important information about human behavior, and how computers can simulate it. The first part of this two-part essay will review some of the theones AI researchers have developed to explain human \u201cinformation processing.\u201d The second part of the essay will cover some applications of AI research. These include programs used in robotics, programs that communicate with computer users in natural languages such as English, and \u201cexpert systems\u201d which help chemists, physicians, and others perform decision-making tasks. The \u201cpioneer\u201d expert system, DENDRAL, will be discussed in some detail.T.~ AI grew out of the convergence of ideas in several different fields, and the availability of new technologies. According to Avrom Barr and Edward A. Feigenbaum, Stanford University, California, the single most important factor contributing to the birth of the field was the invention of the computer.9 They point out that human beings have always drawn analogies between mechanical devices and their own behavior. Computers, with their memories and information-processing abilities, naturafly invited analogies with the human brain. Shortly after digital computers became available, computer scientists began creating programs that, they hoped, would perform tasks generally considered to require intelligence. Their earliest efforts were directed at programming computers to solve puzzles, play games such as chess, backgammon, and checkers, solve mathematical theorems, and translate text from one language to another. The early computer programs performed these tasks, but not very well. For example, chess programs were successful at following the step-by-step instructions for moving chessmen. But computers couldn\u2019t independently gen-", "venue": "", "year": 1983, "referenceCount": 143, "citationCount": 181, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", "externalIds": {"MAG": "1482735464", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": 64330274}, "url": "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7", "title": "Studies in the History of Probability and Statistics. XXXVII", "abstract": "SUMMARY An account is given of A. M. Turing's unpublished contributions to statistics during 1941 or 1940.", "venue": "", "year": 1979, "referenceCount": 15, "citationCount": 164, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1979-08-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "145179124", "name": "I. Good"}]}, {"paperId": "186bdef34bf03f6a1c74d5b074e956324e9fe746", "externalIds": {"MAG": "34610884", "CorpusId": 115688448}, "url": "https://www.semanticscholar.org/paper/186bdef34bf03f6a1c74d5b074e956324e9fe746", "title": "Solvable and Unsolvable Problems", "abstract": null, "venue": "", "year": 1954, "referenceCount": 0, "citationCount": 182, "influentialCitationCount": 36, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "24fade315dc6a15961184a3c6dfec064591edcd5", "externalIds": {"MAG": "1553055254", "CorpusId": 60504948}, "url": "https://www.semanticscholar.org/paper/24fade315dc6a15961184a3c6dfec064591edcd5", "title": "Review: Arthur W. Burks, The Logic of Programming Electronic Digital Computers", "abstract": null, "venue": "", "year": 1953, "referenceCount": 0, "citationCount": 187, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1953-06-01", "journal": {"volume": "18", "pages": "179-179", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "62660c27d93c50f69b1ed614ad9499f4d849aeec", "externalIds": {"MAG": "2317224626", "DOI": "10.2307/2268956", "CorpusId": 61881712}, "url": "https://www.semanticscholar.org/paper/62660c27d93c50f69b1ed614ad9499f4d849aeec", "title": "Arthur W. Burks. The logic of programming electronic digital computers. Industrial mathematics (Detroit), vol. 1 (1950), pp. 36\u201352.", "abstract": "ARTHUR W. BURKS. The logic of programming electronic digital computers. Industrial mathematics (Detroit), vol. 1 (1950), pp. 36-52. This article does not deal primarily with \"logic\" in the technical sense. I t is an account of the general principles of programming, written for the benefit of the technically well informed reader who wishes to know what sort of an activity programming is. Comparisons with logic are however introduced, in connection with \"conditional control transfers\" and the free and bound variables of a programme as defined by Goldstine and von Neumann. Planning and coding of problems for an electronic computing instrument, vol. 1, Institute for Advanced Study, 1947.", "venue": "Journal of Symbolic Logic", "year": 1953, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1953-06-01", "journal": {"volume": "18", "pages": "179 - 179", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", "CorpusId": 14636783}, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", "title": "Computing Machinery and Intelligence", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous. If the meaning of the words \u201cmachine\u201d and \u201cthink\u201d are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": 8553, "influentialCitationCount": 492, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1950-10-01", "journal": {"volume": "LIX", "pages": "433-460", "name": "Mind"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "c35cf8a54e655e91f8657cf8403d578994fb27c5", "externalIds": {"MAG": "2419349071", "DOI": "10.2307/j.ctv8d5sh5.6", "CorpusId": 148545092}, "url": "https://www.semanticscholar.org/paper/c35cf8a54e655e91f8657cf8403d578994fb27c5", "title": "PSYCHOLOGY AND PHILOSOPHY", "abstract": "1. The Imitation Game. I PROPOSE tO consider the question, 'Can machines think ? This should begin with definitions of the meaning of the terms 'machine' and 'think'. The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous. If the meaning of the words 'machine' and 'think 'are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to tlie question, ' Can machines think ? ' is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words. The new form of the problem can be described in terms of a game which we call the 'imitation game'. It is played with three people, a man (A), a woman (B), and an interrogator (C) who may be of either sex. The interrogator stays in a room apart from the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman. He knows them by labels X and Y, and at the end of the game he says either ' X is A and Y is B ' or ' X is B and Y is A'. The interrogator is allowed to put questions to A and B thus: C: Will X please tell me the length of his or her hair 2 Now suppose X is aetually A, then A must answer. It is A's", "venue": "", "year": 1950, "referenceCount": 6, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "092da8384571c8261858e91e3278e765eedde1d5", "externalIds": {"MAG": "2092575189", "DBLP": "journals/jsyml/Turing48", "DOI": "10.2307/2267329", "CorpusId": 5770563}, "url": "https://www.semanticscholar.org/paper/092da8384571c8261858e91e3278e765eedde1d5", "title": "Practical forms of type theory", "abstract": "Russell's theory of types, though probably not providing the soundest possible foundation for mathematics, follows closely the outlook of most mathematicians. The present paper is an attempt to present the theory of types in forms in which the types themselves only play a rather small part, as they do in ordinary mathematical argument. Two logical systems are described (called the \u201cnested-type\u201d and \u201cconcealed-type\u201d systems). It is hoped that the ideas involved in these systems may help mathematicians to observe type theory in proofs as well as in doctrine. It will not be necessary to adopt a formal logical notation to do so.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1948, "referenceCount": 121, "citationCount": 200, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1948-06-01", "journal": {"volume": "13", "pages": "80 - 94", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "65069064b19ec8244044311a2a90fbf2c9161675", "externalIds": {"DBLP": "journals/jsyml/NewmanT42", "MAG": "1988522427", "DOI": "10.2307/2267552", "CorpusId": 17917182}, "url": "https://www.semanticscholar.org/paper/65069064b19ec8244044311a2a90fbf2c9161675", "title": "A formal theorem in Church's theory of types", "abstract": "This note is concerned with the logical formalism with types recently introduced by Church [1] (and called (C) in this note) It was shewn in his paper (Theorem 26\u03b1) that if Y\u03b1 stands for (a form of the \u201caxiom of infinity\u201d for the type \u03b1), Y\u03b1 can be proved formally, from Y\u03b9 and the axioms 1 to 7, for all types \u03b1 of the forms \u03b9\u2032, \u03b9\u2033, \u2026. For other types the question was left open, but for the purposes of an intrinsic characterisation of the Church type-stratification given by one of us, it is desirable to have the remaining cases cleared up. A formal proof of Y\u03b1 is now given for all types \u03b1 containing \u03b9, but the proof uses, in addition to Axioms 1 to 7 and Y\u03b9, also Axiom 9 (in connection with Def. 4), and Axiom 10 (in Theorem 9).", "venue": "Journal of Symbolic Logic (JSL)", "year": 1942, "referenceCount": 64, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1942-03-01", "journal": {"volume": "7", "pages": "28 - 33", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "externalIds": {"DBLP": "journals/jsyml/Turing42", "MAG": "2065302580", "DOI": "10.2307/2268111", "CorpusId": 17112802}, "url": "https://www.semanticscholar.org/paper/7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "title": "The use of dots as brackets in Church's system", "abstract": "Any logical system, if its use is to be carried beyond a rather elementary stage, needs powerful conventions about abbreviations: in particular one usually wants to modify the bracketing so as to make the formulae more readable, and also possibly shorter. The present note has been written in the belief that Church's formulation of the simple theory of types is particularly suitable as a basis for work on that theory, and that it is therefore worth while introducing special conventions which take into account the needs of this particular system. The conventions which I shall describe are ones which I have used a good deal myself, and have always found adequate. I intend to make use of them in forthcoming papers. They may be regarded as an extension of Curry's conventions. I shall begin with a general discussion of punctuation by means of groups of dots. This general theory is applicable, with some modifications, to Russell's, Quine's, and Curry's bracketing systems as well as to the present one.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1942, "referenceCount": 83, "citationCount": 193, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1942-12-01", "journal": {"volume": "7", "pages": "146 - 156", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "891151133781d3e78f19b882015746bafd9bc935", "externalIds": {"DBLP": "journals/jsyml/Turing37a", "MAG": "2799201656", "CorpusId": 33223540}, "url": "https://www.semanticscholar.org/paper/891151133781d3e78f19b882015746bafd9bc935", "title": "The p-Function in \u03bb-K-Conversion", "abstract": "In the theory of conversion it is important to have a formally defined function which assigns to any positive integer n the least integer not less than n which has a given property. The definition of such a formula is somewhat involved:' I propose to give the corresponding formula in X-K-conversion,' which will (naturally) be much simpler. I shall in fact find a formula p such that if T be a formula for which T(n) is convertible3 to a formula representing a natural number, whenever n represents a natural number, then p(T, r) is convertible to the formula q representing the least natural number q, not less than r, for which T(q) conv 0.2 The method depends on finding a formula e with the property that e conv Xu.u(e(u)), and consequently if M-<3(V) then M conv V(M). A formula with this property is,", "venue": "J. Symb. Log.", "year": 1937, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "2", "pages": "164", "name": "J. Symb. Log."}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "b300783b3f3bd283ab1cf86b7a51f63469db380f", "externalIds": {"MAG": "2798583139", "DOI": "10.2307/2268281", "CorpusId": 11473119}, "url": "https://www.semanticscholar.org/paper/b300783b3f3bd283ab1cf86b7a51f63469db380f", "title": "The \u00fe-function in \u03bb-K-conversion", "abstract": "In the theory of conversion it is important to have a formally defined function which assigns to any positive integer n the least integer not less than n which has a given property. The definition of such a formula is somewhat involved: I propose to give the corresponding formula in \u03bb-K-conversion, which will (naturally) be much simpler. I shall in fact find a formula \u00fe such that if T be a formula for which T(n) is convertible to a formula representing a natural number, whenever n represents a natural number, then \u00fe(T, r) is convertible to the formula q representing the least natural number q, not less than r, for which T(q) conv 0.2 The method depends on finding a formula \u0398 with the property that \u0398 conv \u03bbu\u00b7u(\u0398(u)), and consequently if M\u2192\u0398(V) then M conv V(M). A formula with this property is, The formula \u00fe will have the required property if \u00fe(T, r) conv r when T(r) conv 0, and \u00fe(T, r) conv \u00fe(T, S(r)) otherwise. These conditions will be satisfied if \u00fe(T, r) conv T(r, \u03bbx\u00b7\u00fe(T, S(r)), r), i.e. if \u00fe conv {\u03bbptr\u00b7t(r, \u03bbx\u00b7p(t, S(r)), r)}(\u00fe). We therefore put, This enables us to define also a formula, such that (T, n) is convertible to the formula representing the nth positive integer q for which T(q) conv 0.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1937, "referenceCount": 97, "citationCount": 35, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1937-12-01", "journal": {"volume": "2", "pages": "164 - 164", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "ee8c779e7823814a5f1746d883ca77b26671b617", "externalIds": {"DBLP": "journals/jsyml/Turing37", "MAG": "1485161910", "DOI": "10.2307/2268280", "CorpusId": 2317046}, "url": "https://www.semanticscholar.org/paper/ee8c779e7823814a5f1746d883ca77b26671b617", "title": "Computability and \u03bb-definability", "abstract": "Several definitions have been given to express an exact meaning corresponding to the intuitive idea of \u2018effective calculability\u2019 as applied for instance to functions of positive integers. The purpose of the present paper is to show that the computable functions introduced by the author are identical with the \u03bb-definable functions of Church and the general recursive functions due to Herbrand and G\u00f6del and developed by Kleene. It is shown that every \u03bb-definable function is computable and that every computable function is general recursive. There is a modified form of \u03bb-definability, known as \u03bb-K-definability, and it turns out to be natural to put the proof that every \u03bb-definable function is computable in the form of a proof that every \u03bb-K-definable function is computable; that every \u03bb-definable function is \u03bb-K-definable is trivial. If these results are taken in conjunction with an already available proof that every general recursive function is \u03bb-definable we shall have the required equivalence of computability with \u03bb-definability and incidentally a new proof of the equivalence of \u03bb-definability and \u03bb-K-definability. A definition of what is meant by a computable function cannot be given satisfactorily in a short space. I therefore refer the reader to Computable pp. 230\u2013235 and p. 254. The proof that computability implies recursiveness requires no more knowledge of computable functions than the ideas underlying the definition: the technical details are recalled in \u00a75.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1937, "referenceCount": 6, "citationCount": 385, "influentialCitationCount": 38, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1937-12-01", "journal": {"volume": "2", "pages": "153 - 163", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "4d81ff79406cd02e064285e5f61e5b6bde68f5e7", "externalIds": {"CorpusId": 18195327}, "url": "https://www.semanticscholar.org/paper/4d81ff79406cd02e064285e5f61e5b6bde68f5e7", "title": "Computing Machinery and Intelligence 1. the Imitation Game", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous. If the meaning of the words \"machine\" and \"think\" are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \"Can machines think?\" is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words. The new form of the problem can be described in terms of a game which we call the \"imitation game.\" It is played with three people, a man (A), a woman (B), and an interrogator (C) who may be of either sex. The interrogator stays in a room apart' from the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman. He knows them by labels X and Y, and at the end of the game he says either \"X is A and Y is B\" or \"X is Band Y is A.\" The interrogator is allowed to put questions to A and B thus: C: Will X please tell me the length of his or her hair? Now suppose X is actually A, then A must answer. It is A's object in the game to try and cause C to make the wrong identification. His answer might therefore be: \"My hair is shingled, and the longest strands are about nine inches long. \" 11", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}]} \ No newline at end of file +{"authorId": "2262347", "externalIds": {"DBLP": ["Alan M. Turing"]}, "url": "https://www.semanticscholar.org/author/2262347", "name": "A. Turing", "aliases": ["A Turing", "A M Turing", "A. M. Turing", "Alan M. Turing", "Alan Turing", "Alan Mathison Turing"], "affiliations": [], "homepage": null, "paperCount": 60, "citationCount": 12415, "hIndex": 23, "papers": [{"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "externalIds": {"CorpusId": 251848799}, "corpusId": 251848799, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "title": "Dystopian or Utopian? Two Images of Alan Turing", "abstract": "Turing made intriguing statements about the future of arti\ufb01cial intelligence (AI) in society. He predicted that machines would eventually \u2018compete with men in all purely intellectual \ufb01elds,\u2019 and added that at some stage they could be expected \u2018to take control.\u2019 Turing has been associated by his biographer, Andrew Hodges, with Dr. Frankenstein from Mary Shelley\u2019s dystopian novel. However, he has also been described by his contemporary Geoffrey Jefferson as a \u2018scienti\ufb01c\u2019 Percy B. Shelley, the English Romantic poet who was posthumously championed as a utopian and radical thinker. This article then asks: in what way did Turing envision a society permeated with intelligent machines? Did he see it as a utopia or a dystopia? These questions are thoroughly examined using Turing\u2019s own texts and related sources. This study reconstructs Turing\u2019s historical context in postwar England and analyzes his irony and sense of humor, as well as the in\ufb02uence of Samuel Butler on his vision. Contrary to recent views in AI science and \ufb01ction, on the one hand, a mismatch is shown between Turing and the incautious Frankenstein; on the other hand, Turing\u2019s radical Shelley-like qualities are substantiated. The article shows that Turing\u2019s utopianism entrusted intelligent machines with the task of teaching lessons of rationality and intellectual integrity over our place in nature and prejudices. Further, Turing\u2019s irony is shown to have targeted intellectuals who sacri\ufb01ce independent thinking to retain their power. These, he hoped, would be eventually rivaled and surpassed by intelligent machines.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "947efa54175145240c1a33f62321f23db43571e7", "externalIds": {"DBLP": "phd/Turing38", "MAG": "1970654545", "DOI": "10.1016/b978-044450423-4/50007-3", "CorpusId": 40363661}, "corpusId": 40363661, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/947efa54175145240c1a33f62321f23db43571e7", "title": "Systems of Logic Based on Ordinals", "abstract": null, "venue": "Alan Turing's Systems of Logic", "year": 2012, "referenceCount": 23, "citationCount": 328, "influentialCitationCount": 30, "isOpenAccess": true, "openAccessPdf": {"url": "https://pure.mpg.de/pubman/item/item_2403325_2/component/file_2403324/Turing_1939_Sysyems.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-12-31", "journal": {"name": "Alan Turing's Systems of Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "b7682dfbd4c03e287265d64e46388d21eedf3394", "externalIds": {"MAG": "46849891", "DOI": "10.1093/oso/9780198250791.003.0017", "CorpusId": 172414532}, "corpusId": 172414532, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b7682dfbd4c03e287265d64e46388d21eedf3394", "title": "Computing Machinery and Intelligence (1950)", "abstract": null, "venue": "Ideas That Created the Future", "year": 1989, "referenceCount": 0, "citationCount": 47, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-06-01", "journal": {"name": "Ideas That Created the Future"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6b7b392d5f3284a78fd559439bc735f3f0b08bae", "externalIds": {"DBLP": "journals/cryptologia/X20", "DOI": "10.1080/01611194.2019.1650846", "CorpusId": 212727442}, "corpusId": 212727442, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b7b392d5f3284a78fd559439bc735f3f0b08bae", "title": "Review of two collections of essays about Alan Turing", "abstract": "2012 was the Alan Turing Year \u2014 the celebration of the 100th anniversary of Alan Turing\u2019s birth. Turing\u2019s biographer Andrew Hodges in the \u201cForward\u201d to The Turing Guide comments that \u201cTuring\u2019s centenary year reflected a general public sense that the issues of Alan Turing\u2019s life and work are as relevant as ever in the twentyfirst century.\u201d The Turing Guide consists of 42 essays that are written for general readers and that celebrate Turing\u2019s: life (38 pages), accomplishments in mathematics (44 pages), codebreaking (120 pages), On Computable Numbers and the Turing machine (36 pages), postwar work on computers (67 pages), contributions to morphogenesis (32 pages), ideas related to machine intelligence (86 pages), and legacy (32 pages). Eleven essays deal directly with codebreaking. Copeland either wrote, participated in the writing of, or revised 16 of the essays. Of the eight essays in the section \u201cArtificial Intelligence and the Mind,\u201d three were written by Diane Proudfoot and one includes her as a coauthor with Copeland (who wrote one other essay and coauthored a third essay in that section). The book begins with an overview of Turing\u2019s life and work by Copeland and Bowen. The essay is mostly a timeline of Turing\u2019s life. The authors suggest that Turing\u2019s death might have been accidental. Chapter 3, \u201cMeeting a Genius\u201d (4 pages), is by mathematician and Bletchley Park codebreaker Peter Hilton (1923\u20132010). Notes to the chapter (p. 485) state that the chapter was \u201cassembled by Jack Copeland\u201d and \u201cpublished with the permission of [Hilton\u2019s] wife.\u201d It is also noted that \u201c[in] 2001 and again in 2002 [Hilton] visited Copeland at the University of Canterbury in New Zealand, where he delivered lectures on Turing and codebreaking. [The] chapter is a compilation of extracts from [Hilton\u2019s] papers and notes left in New Zealand, together with extracts from [Hilton\u2019s]", "venue": "Cryptologia", "year": 2020, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2020-01-02", "journal": {"volume": "44", "pages": "82 - 86", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "1772040", "name": "Jonathan P. Bowen"}, {"authorId": "3075367", "name": "Mark D. Sprevak"}, {"authorId": "2109033245", "name": "Robin J. Wilson"}, {"authorId": "2085428", "name": "A. Bokulich"}]}, {"paperId": "87aebbd963f929cfb5ac46b0facb5128148758ad", "externalIds": {"CorpusId": 202754269}, "corpusId": 202754269, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/87aebbd963f929cfb5ac46b0facb5128148758ad", "title": "Development of Moore \u2019 s Law", "abstract": "Many theorists would agree that, had it not been for courseware, the construction of online algorithms might never have occurred. In this paper, we confirm the visualization of superblocks. In this paper we argue that the Turing machine can be made pseudorandom, metamorphic, and low-energy.", "venue": "", "year": 2019, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "117077595", "name": "Olivier Pirson"}, {"authorId": "2153307", "name": "R. Stallman"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "1717349", "name": "D. Knuth"}]}, {"paperId": "d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", "externalIds": {"DOI": "10.1049/pbpc026e_ch8", "CorpusId": 242953753}, "corpusId": 242953753, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", "title": "Turing machines", "abstract": null, "venue": "Handbook of Mathematical Models for Languages and Computation", "year": 2019, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2019-11-12", "journal": {"name": "Handbook of Mathematical Models for Languages and Computation"}, "authors": [{"authorId": "6234493", "name": "D. Hilbert"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "2157103111", "name": "M. \u201ccrashes"}]}, {"paperId": "eb320a6d4e58d91c72ba0dc663da10579dd5957d", "externalIds": {"DOI": "10.1090/mbk/121/24", "CorpusId": 241773225}, "corpusId": 241773225, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb320a6d4e58d91c72ba0dc663da10579dd5957d", "title": "Alan Turing", "abstract": "When the name \u201dAlan Turing\u201d is mentioned most people think of one or more of the following words: \u201dTuring Machine\u201d, \u201dTuring Test\u201d, \u201dEnigma\u201d and \u201dArtificial Intelligence\u201d. The intention of this article is to present a broader approach to Alan Turing instead of solely focusing on the above mentioned key words. Alan Turing was not only a key figure in computer science and crypto-analysis. His work also revolved around subjects such as the growth of plants, the human mind and he also anticipated many of the issues that are being discussed in today\u2019s artificial intelligence research. Being unconventional, ahead of his time as a visionary and openly admitting his homosexuality caused a lot personal problems during his life. However Alan Turing was successfully able to balance his life by relying on personal friends, scientific colleagues, his work and sports. He became a tragic icon when he died at age 42 apparently having committed suicide. 1 Family background and childhood: Alan Mathison Turing was born in London on 23 June 1912. His parents Julius Mathison and Ethel Sara Turing had met in India where Julius worked in the Indian Civil Service. Ethel Sara was the daughter of a chief engineer working for Madras railways. Alan also had an older brother named John. The two boys spent most of their childhood with a variety of foster parents as Julius and Ethel soon moved back to India after Alan\u2019s birth. His childhood was mainly influenced by his family situation and his family\u2019s upper-middle-class status inside the English society at the beginning of the 20th century. There was little incentive for scientific exploration in the family or school at the time so Alan\u2019s first contact with science occurred during his free time. One of the books which he read during his childhood was called \u201dNatural Wonders Every Child Should Know\u201d \u2217e-mail: e0425826@student.tuwien.ac.at", "venue": "100 Years of Math Milestones", "year": 2019, "referenceCount": 125, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2019-06-12", "journal": {"name": "100 Years of Math Milestones"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "98630872", "name": "S. Cooper"}, {"authorId": "2138333896", "name": "Trenz Pruca"}, {"authorId": "2138325070", "name": "Malesuada quis"}, {"authorId": "2138324300", "name": "egestas quis"}, {"authorId": "2138382523", "name": "Alan Turingyear"}, {"authorId": "2136546073", "name": "See A. Hodges"}]}, {"paperId": "ecb77b338846ac6dbaecf953984f8d44e76a8def", "externalIds": {"CorpusId": 231691745}, "corpusId": 231691745, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ecb77b338846ac6dbaecf953984f8d44e76a8def", "title": "Machine Learning, a key component in business model transformation", "abstract": null, "venue": "", "year": 2018, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "fd77c9ac5ead99b216633aa16d9b664516e6d24a", "externalIds": {"DOI": "10.1201/9781315273587-12", "CorpusId": 240057602}, "corpusId": 240057602, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd77c9ac5ead99b216633aa16d9b664516e6d24a", "title": "Text processing", "abstract": null, "venue": "Elementary Standard ML", "year": 2018, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2018-10-08", "journal": {"name": "Elementary Standard ML"}, "authors": [{"authorId": "72482255", "name": "C. Gregg"}, {"authorId": "1764547", "name": "M. Sahami"}, {"authorId": "144124712", "name": "J. Clarke"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "aa2c899534681104e64f0971d7cb1a003dd6efd2", "externalIds": {"CorpusId": 51883623}, "corpusId": 51883623, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aa2c899534681104e64f0971d7cb1a003dd6efd2", "title": "What \u2019 s Missing from Deep Learning ?", "abstract": "A neural network model for a mechanism of visual pattern recognition is proposed in this paper. The network is self-organized by \"learning without a teacher\", and acquires an ability to recognize stimulus patterns based on the geometrical similarity (Gestalt) of their shapes without affected by their positions. This network is given a nickname \"neocognitron\". After completion of self-organization, the network has a structure similar to the hierarchy model of the visual nervous system proposed by Hubel and Wiesel. The network consists of an input layer (photoreceptor array) followed by a cascade connection of a number of modular structures, each of which is composed of two layers of cells connected in a cascade. The first layer of each module consists of \"S-cells', which show characteristics similar to simple cells or lower order hypercomplex cells, and the second layer consists of \"C-cells\" similar to complex cells or higher order hypercomplex cells. The afferent synapses to each S-cell have plasticity and are modifiable. The network has an ability of unsupervised learning: We do not need any \"teacher\" during the process of selforganization, and it is only needed to present a set of stimulus patterns repeatedly to the input layer of the network. The network has been simulated on a digital computer. After repetitive presentation of a set of stimulus patterns, each stimulus pattern has become to elicit an output only from one of the C-cells of the last layer, and conversely, this C-cell has become selectively responsive only to that stimulus pattern. That is, none of the C-cells of the last layer responds to more than one stimulus pattern. The response of the C-cells of the last layer is not affected by the pattern's position at all. Neither is it affected by a small change in shape nor in size of the stimulus pattern.", "venue": "", "year": 2017, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1708655", "name": "B. Olshausen"}, {"authorId": "145260300", "name": "H. Wills"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "1847175", "name": "M. Minsky"}, {"authorId": "143805238", "name": "J. McCarthy"}, {"authorId": "51083130", "name": "F. Rosenblatt"}, {"authorId": "145707626", "name": "N. Wiener"}, {"authorId": "2067567609", "name": "Warren McCulloch"}, {"authorId": "50314979", "name": "W. Pitts"}, {"authorId": "3160228", "name": "K. Fukushima"}]}, {"paperId": "b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "externalIds": {"MAG": "2467689444", "CorpusId": 159733415}, "corpusId": 159733415, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "title": "The President, the Vice President, the Secretary-Treasurer, and ARNOLD DRESDEN,2", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3154491", "name": "A. Tarski"}, {"authorId": "50455788", "name": "S. Maclane"}, {"authorId": "40384728", "name": "H. B. Curry"}, {"authorId": "122394125", "name": "Paul Marhenkei"}, {"authorId": "101931347", "name": "A. Dresden"}, {"authorId": "118436071", "name": "Karl-Heinz Menger"}, {"authorId": "123809183", "name": "Frederic B. FiTCHc"}, {"authorId": "49957888", "name": "E. Nagel"}, {"authorId": "49836121", "name": "C. Hempel"}, {"authorId": "145260350", "name": "W. Quine"}, {"authorId": "91132817", "name": "C. Langford"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "40245151", "name": "F. B. Fitch"}, {"authorId": "104540019", "name": "P. Marhenke"}, {"authorId": "2072295124", "name": "C. Duca"}]}, {"paperId": "3180b4f827030c4b3a0ff048d1fee462575ca71f", "externalIds": {"MAG": "2400968335", "CorpusId": 124065102}, "corpusId": 124065102, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3180b4f827030c4b3a0ff048d1fee462575ca71f", "title": "Convergence Rates for Persistence Diagram Estimation in", "abstract": "Computational topology has recently seen an important development toward data analysis, giving birth to the eld of topological data analysis. Topological persistence, or persistent homology, appears as a fundamental tool in this eld. In this paper, we study topological persistence in general metric spaces, with a statistical approach. We show that the use of persistent homology can be naturally considered in general statistical frameworks and that persistence diagrams can be used as statistics with interesting convergence properties. Some numerical experiments are performed in various contexts to illustrate our results.", "venue": "", "year": 2015, "referenceCount": 34, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1760330", "name": "M. Glisse"}, {"authorId": "66876582", "name": "Inria Saclay"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "102582041", "name": "Catherine Labru"}, {"authorId": "38291080", "name": "B. Michel"}]}, {"paperId": "293a50e86c2a2f4a2e213a42e057910aeda09d82", "externalIds": {"MAG": "2185394266", "CorpusId": 125067106}, "corpusId": 125067106, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/293a50e86c2a2f4a2e213a42e057910aeda09d82", "title": "\u2022 Hilbert spaces. Weak derivatives. Classical and weak solutions. \u2022 Galerkin approximation of elliptic equations. Spectral approximation. Finite element approximation in one dimension. Energy estimates. \u2022 Parabolic PDEs. Semigroups of operators. Method of lines. Stability of numerical", "abstract": null, "venue": "", "year": 2014, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "104483519", "name": "Lecturer Sean Holman"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "103905785", "name": "January Exam"}]}, {"paperId": "9f07386256530a0060d99a1ba483a8f5c1f4194b", "externalIds": {"MAG": "2029222787", "DOI": "10.1093/ITNOW/BWU030", "CorpusId": 109153053}, "corpusId": 109153053, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9f07386256530a0060d99a1ba483a8f5c1f4194b", "title": "Turing: Oracles and Computation", "abstract": null, "venue": "", "year": 2014, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-03-01", "journal": {"volume": "56", "pages": "64-65", "name": "Itnow"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "0875d9bdd710fe886d7f4543e17dfd581893f538", "externalIds": {"CorpusId": 18099107}, "corpusId": 18099107, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0875d9bdd710fe886d7f4543e17dfd581893f538", "title": "Watching the Daisies Grow: from Biology to Biomathematics and Bioinformatics \u2014 Alan Turing Centenary Special Issue", "abstract": "Preface We can only see a short distance ahead, but we can see plenty there that needs to be done. Year 2012 is both the centenary of Alan Turing's birth and the 60th anniversary of the famous paper The Chemical Basis of Morphogenesis, in which he established foundations of the mathematical theory of biological and chemical pattern formation. The story started much earlier, in spring 1923, as documented by his mother in a caricature entitled Hockey or Watching the Daisies Grow. Crucial motif in the drawing is that, while most players are engaged by the game, Alan is investigating a flower emerging just off the field. Always fascinated by the relationship between matter and spirit, especially in the processes of thinking , Turing started from the assumption that the operation of human brain is completely physical. This led him to invention of an abstract computing machine named after him, which laid the foundations of modern computer science. In recognition of his enormous contribution to the growth of the field, the most prestigious award in computer science, called \" Nobel Prize of computing \" , is named after Turing. Success has many fathers, but it was Alan Turing to whom we owe the final breaking of the Enigma code. He extended the idea of so-called \" Cryptology bombs \" , i.e., machines aimed at breaking codes, constructed before World War II by Polish mathematicians: Rejewski, R\u00f3\u02d9 zycki and Zygalski. His solution ensured the information advantage of the Allies during the Battle of the Atlantic, which had a direct bearing on the success of operations in Normandy and the defeat of Nazi Germany. After the war, Turing took up marathon running to relieve the stress, studied why spots on the leop-ard's body are in the shape of a rosette or ring, and proposed a test to measure the machine's ability to exhibit intelligent behavior. For this last reason, Turing is regarded as a founder of artificial intelligence. He left this world prematurely in the age of 42, but managed to finish the race with the highest score, in fact more than one race.. . In this special issue, we present a selection of papers commemorating Alan Turing and arguing that he should be also considered the co-founder of biomathematics and bioinformatics. His late works were", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "externalIds": {"MAG": "2741266234", "CorpusId": 125093480}, "corpusId": 125093480, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "title": "Dusting Off the Turing Test", "abstract": "then inter- est theory and a problem about the observation of quantum systems (now as the quantum Zeno effect). With his death, train was lost, but the question computa- tion to fundamental physics has remained. Since the computing given a practical technological arena in which computation and quantum physics interact excitingly, it has not yet changed Tur- ing\u0092 s picture of what is computable. There are also thought-experiment models that explore what it would mean beyond the ally require machine operate with speed or allow unlim- ited accuracy probe more the nature physical world. Perhaps the body of ideas is that of Roger Penrose ( 7). These draw strongly on the very thing motivated Tur- ing\u0092 s early relationship operations to the imply that uncomputable physics abstract of how states are in the world. The problem remains: Does computation with discrete symbols a complete the world? If it does, how can make this connection manifest? If it does not, where does fail, and what would this tell us about fundamental science?", "venue": "", "year": 2012, "referenceCount": 1, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "422ec845a15242fdfc904e1c7d2bfe132c7ec248", "externalIds": {"CorpusId": 18051598}, "corpusId": 18051598, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/422ec845a15242fdfc904e1c7d2bfe132c7ec248", "title": "PLANES OF MORPHISMS AND THE CHARACTERIZATION OF CONTINUOUSLY INTEGRAL, COMPLETE RANDOM VARIABLES", "abstract": "Let \u03b8m,\u03bc be an independent, right-composite, anti-naturally continuous polytope. Recent interest in smooth systems has centered on describing additive subsets. We show that there exists a non-universal non-injective subalgebra. In contrast, it is not yet known whether \u03b8 < D, although [25] does address the issue of existence. So recent developments in modern integral PDE [25] have raised the question of whether e ( 0 ) 6= log ( 1 \u2016\u03c7\u2016 ) \u222a c ( 1 \u2229 i, \u03c0 )", "venue": "", "year": 2012, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "12989190", "name": "M. Lafourcade"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "50294906", "name": "M. Abel"}]}, {"paperId": "4f4b42aa137d5b6df85889cf53901f44cbee643b", "externalIds": {"MAG": "2187383749", "DOI": "10.7551/mitpress/5123.003.0007", "CorpusId": 62254832}, "corpusId": 62254832, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4f4b42aa137d5b6df85889cf53901f44cbee643b", "title": "Could a machine think", "abstract": null, "venue": "", "year": 2012, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2055661501", "name": "Pascal Ludwig"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "34493294", "name": "J. Searle"}]}, {"paperId": "5cfe755938d14edd5422d72215cf8b733f0284fc", "externalIds": {"DBLP": "journals/cryptologia/TuringB12", "MAG": "2054264625", "DOI": "10.1080/01611194.2012.713803", "CorpusId": 205488183}, "corpusId": 205488183, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5cfe755938d14edd5422d72215cf8b733f0284fc", "title": "Report on Speech Secrecy System DELILAH, a Technical Description Compiled by A. M. Turing and Lieutenant D. Bayley REME, 1945\u20131946", "abstract": "The book groups themselves might be used as a form of cipher, but this is rather insecure, so that some further process or \u2018\u2018recipher\u2019\u2019 is usually applied. From the point of view of this reciphering, it is natural to regard the book groups as virtually plain language. Moreover, the division into groups is now of little real interest; it is useful to relieve the eye, but that is all. Let us run the groups together and call the result \u2018\u2018P=L figures\u2019\u2019:", "venue": "Cryptologia", "year": 2012, "referenceCount": 0, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-10-01", "journal": {"volume": "36", "pages": "295 - 340", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "84292446", "name": "D. Bayley"}]}, {"paperId": "300d41307bb946510bdc111463f5fb71b2a21796", "externalIds": {"MAG": "2274591444", "CorpusId": 124844782}, "corpusId": 124844782, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/300d41307bb946510bdc111463f5fb71b2a21796", "title": "Correspondence with [A.M. Turing]", "abstract": null, "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "2011-11-21", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "51326515", "name": "R. Fisher"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "50a1357c04bde76f752aac1dbd2ba2601622ccd4", "externalIds": {"CorpusId": 8641258}, "corpusId": 8641258, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/50a1357c04bde76f752aac1dbd2ba2601622ccd4", "title": "Alan Mathison Turing Universal Turing Machine", "abstract": "Scatter/gather I/O must work [54], [59], [62], [68], [68], [70], [70], [70], [95], [95], [114], [114], [114], [152], [168], [179], [179], [179], [188], [191]. After years of confusing research into gigabit switches, we confirm the simulation of architecture, which embodies the structured principles of software engineering. In order to solve this riddle, we inve stigate how digital-to-analog converters can be applied to t he", "venue": "", "year": 2011, "referenceCount": 248, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6da083c8833b4000b088ea366f16f1ea8d9b6dad", "externalIds": {"CorpusId": 17718604}, "corpusId": 17718604, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6da083c8833b4000b088ea366f16f1ea8d9b6dad", "title": "The legacy of Alan Turing Universal Turing Machine", "abstract": "The investigation of 802.11b has evaluated IPv6, and current trends suggest that the analysis of local-area networks will soon emerge. Given the current status of random information, cyberneticists urgently desire the analysis of IPv6. Our focus here is not on whether SMPs and consistent hashing are often incompatible, but rather on introducing a novel algorithm for the improvement of multi-processors (Esparcet).", "venue": "", "year": 2011, "referenceCount": 243, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "externalIds": {"CorpusId": 17215741}, "corpusId": 17215741, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "title": "Alan Turing Universal Turing Machine", "abstract": "In recent years, much research has been devoted to the synthesis of gigabit switches; on the other hand, few have explored the refinement of hash tables. In fact, few cryptographers would disagree with the improvement of the lookaside buffer. In this work, we use signed technology to show that architecture and superblocks are usually incompatible.", "venue": "", "year": 2011, "referenceCount": 153, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "externalIds": {"CorpusId": 115526721}, "corpusId": 115526721, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "title": "Turing 1950 1 The Imitation Game", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink.\u201d The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous, If the meaning of the words\u201cmachine\u201dand \u201cthink\u201d are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words. The new form of the problem can be described in terms of a game which we call the \u201cimitation game.\u201d It is played with three people, a man (A), a woman (B), and an interrogator (C) who may be of either sex. The interrogator stays in a room apart front the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman. He knows them by labels X and Y, and at the end of the game he says either \u201cX is A and Y is B\u201d or \u201cX is B and Y is A.\u201d The interrogator is allowed to put questions to A and B thus:", "venue": "", "year": 2010, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6c9520d25a2f93f1fb4f08bab66d90a1519faaac", "externalIds": {"MAG": "2479903735", "DOI": "10.14361/9783839403396-004", "CorpusId": 184361851}, "corpusId": 184361851, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6c9520d25a2f93f1fb4f08bab66d90a1519faaac", "title": "Computermaschinerie und Intelligenz (1950)", "abstract": null, "venue": "Reader Neue Medien", "year": 2007, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2007-12-31", "journal": {"name": "Reader Neue Medien"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f", "externalIds": {"MAG": "2967838196", "CorpusId": 17359642}, "corpusId": 17359642, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f", "title": "Computing Machinery and Intelligence A.M. Turing", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous, If the meaning of the words \"machine\" and \"think\" are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \"Can machines think? \" is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 129, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5", "externalIds": {"MAG": "2499467011", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0023", "CorpusId": 62965306}, "corpusId": 62965306, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5", "title": "The Turing\u2013Wilkinson lecture series (1946\u20137)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "459-528", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "2056940608", "name": "J. H. Wilkinson"}]}, {"paperId": "2190254a337fd601af32260dc4133d009933ee65", "externalIds": {"MAG": "2483371858", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0021", "CorpusId": 64463006}, "corpusId": 64463006, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2190254a337fd601af32260dc4133d009933ee65", "title": "Proposed electronic calculator (1945)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 49, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "369-454", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "externalIds": {"MAG": "2490852693", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0022", "CorpusId": 64507632}, "corpusId": 64507632, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "title": "Notes on memory (1945)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "455-458", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "externalIds": {"MAG": "3101684541", "DOI": "10.1093/oso/9780198250791.003.0016", "CorpusId": 232473093}, "corpusId": 232473093, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "title": "Intelligent Machinery (1948)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 32, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "13103014e997dd6273e2bc3661353d09165cf90c", "externalIds": {"MAG": "3103227490", "DOI": "10.1093/oso/9780198250791.003.0015", "CorpusId": 229803945}, "corpusId": 229803945, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13103014e997dd6273e2bc3661353d09165cf90c", "title": "Lecture on the Automatic Computing Engine (1947)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "15b2a8b748d8063348071beb106b4921c0ef8ba6", "externalIds": {"MAG": "3101010549", "DOI": "10.1093/oso/9780198250791.003.0007", "CorpusId": 232670029}, "corpusId": 232670029, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15b2a8b748d8063348071beb106b4921c0ef8ba6", "title": "Systems of Logic Based on Ordinals (1938)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://pure.mpg.de/pubman/item/item_2403325_2/component/file_2403324/Turing_1939_Sysyems.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "1bb2114c24263b0489f24f787fef86f33487f802", "externalIds": {"MAG": "169424043", "DOI": "10.7551/mitpress/6928.003.0016", "CorpusId": 5561670}, "corpusId": 5561670, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1bb2114c24263b0489f24f787fef86f33487f802", "title": "Can Automatic Calculating Machines Be Said to Think", "abstract": "Trainable methodologies and the transistor have garnered profound interest from both steganographers and cyberinfo rmaticians in the last several years. Given the current statu s of compact technology, computational biologists particul arly desire the visualization of forward-error correction, whi ch embodies the essential principles of networking. Our focus in this paper is not on whether the infamous certifiable algorit hm for the refinement of thin clients by P. Jackson et al. [54], [5 8], [59], [62], [68], [68], [70], [95], [95], [99], [114], [114] , [128], [129], [148], [152], [168], [179], [188], [191] is recursiv ely enumerable, but rather on constructing a pervasive tool for evaluating Internet QoS (HolHoveling).", "venue": "", "year": 2004, "referenceCount": 271, "citationCount": 288, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "117-132", "name": ""}, "authors": [{"authorId": "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "2060159667", "name": "Geoffrey Jefferson"}, {"authorId": "34635194", "name": "R. Braithwaite"}, {"authorId": "1692491", "name": "S. Shieber"}]}, {"paperId": "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": {"MAG": "593056538", "CorpusId": 60423929}, "corpusId": 60423929, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "title": "The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma", "abstract": "Alan Turing 1912-1954 Computable Numbers: A Guide 1. On Computable Numbers, with an Application to the Entscheidensproblem (1936) 2. On Computable Numbers: Corrections and Critiques 3. Systems of Logic Based on Ordinals (1938) 4. Letters on Logic to Max Newman (c. 1940) Enigma 5. History of Hut 8 to December 1941 (1845) 6. Bombe and Spider (1940) 7. Letter to Winston Churchill (1941) 8. Memorandum to OP-20-G on Naval Enigma (c. 1941) Artificial Intelligence 9. Lecture on the Automatic Computing Machine (1947) 10. Intelligent Machinery (1948) 11. Computing Machinery and Intelligence (1950) 12. Intelligent Machinery, A Heretical Theory (c. 1951) 13. Can Digital Computers Think? 14. Can Automatic Calculating Machines Be Said to Think? (1952) Artificial Life 15. The Chemical Basis of Morphogenesis (1952) 16. Chess (1953) 17. Solvable and Unsolvable Problems (1954)", "venue": "", "year": 2004, "referenceCount": 39, "citationCount": 152, "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "118975427", "name": "J. Copeland"}]}, {"paperId": "e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "externalIds": {"MAG": "3105675538", "DOI": "10.1093/oso/9780198250791.003.0013", "CorpusId": 231523578}, "corpusId": 231523578, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "title": "Memorandum to OP-20-G on Naval Enigma (c.1941)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "ef5e79b3ba502350967ae9bff87243fbf140c8b9", "externalIds": {"MAG": "3098156012", "DOI": "10.1093/oso/9780198250791.003.0012", "CorpusId": 230737760}, "corpusId": 230737760, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ef5e79b3ba502350967ae9bff87243fbf140c8b9", "title": "Letter to Winston Churchill (1941)", "abstract": "During 1941, codebreaking at Bletchley Park was hindered by shortages of typists and unskilled staV. These shortages could have been easily rectiWed, but the codebreakers\u2019 urgent requests were ignored by oYcials in Whitehall. Going over the heads of those in command at GC & CS, Turing and his co-signatories wrote directly to the Prime Minister, Winston Churchill. On receiving the letter Churchill minuted his Chief of StaV, General Ismay: \u2018action this day Make sure they have all they want on extreme priority and report to me that this had been done.\u20191 It fell to Stuart Milner-Barry of Hut 6 to deliver the letter by hand to 10 Downing Street. In 1986, Milner-Barry recalled his trip to Whitehall:", "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "73506204", "name": "Gordon Welchman"}]}, {"paperId": "48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "externalIds": {"DBLP": "journals/cryptologia/Turing03", "MAG": "2030737075", "DOI": "10.1080/0161-110391891748", "CorpusId": 12703115}, "corpusId": 12703115, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "title": "ALAN M. TURING'S CRITIQUE OF RUNNING SHORT CRIBS ON THE U. S. NAVY BOMBE", "abstract": "Unified lossless information have led to many natural advances, including the partition table and massive multiplayer online roleplaying games. In this work, we disprove the analysis of B-trees that would make synthesizing Lamport clocks a real possibility. In this position paper, we argue that Boolean logic and Markov models can agree to accomplish this purpose.", "venue": "Cryptologia", "year": 2003, "referenceCount": 196, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2003-01-01", "journal": {"volume": "27", "pages": "44 - 49", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", "externalIds": {"MAG": "1992023589", "DBLP": "journals/cryptologia/Turing01", "DOI": "10.1080/0161-110191889734", "CorpusId": 14207094}, "corpusId": 14207094, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", "title": "VISIT TO NATIONAL CASH REGISTER CORPORATION OF DAYTON, OHIO", "abstract": "In recent years, much research has been devoted to the study of Boolean logic; however, few have developed the extensive unification of the location-identity split and co ntextfree grammar. After years of appropriate research into mode l checking, we verify the visualization of systems. In our research, we validate that the lookaside buffer and red-bla ck trees are never incompatible [54], [58], [59], [62], [68], [ 68], [68], [70], [95], [99], [114], [128], [129], [148], [152], [ 168], [168], [179], [188], [191].", "venue": "Cryptologia", "year": 2001, "referenceCount": 206, "citationCount": 179, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2001-01-01", "journal": {"volume": "25", "pages": "1 - 10", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "b52adf784f9a0ca3b936f39a90cf3445b48dc408", "externalIds": {"MAG": "2798463542", "DOI": "10.1007/3-540-31288-9_9", "CorpusId": 125729536}, "corpusId": 125729536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b52adf784f9a0ca3b936f39a90cf3445b48dc408", "title": "Mathematical logic", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "externalIds": {"MAG": "2316135739", "DOI": "10.1093/PHILMAT/4.3.256", "CorpusId": 5213112}, "corpusId": 5213112, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "title": "Intelligent Machinery, A Heretical Theory*", "abstract": "The analysis of interrupts is a structured quagmire. In this position paper, we demonstrate the investigation of simulated annealing. KaliNil, our new methodology for DNS, is the solution to all of these problems.", "venue": "", "year": 1996, "referenceCount": 146, "citationCount": 213, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-09-01", "journal": {"volume": "4", "pages": "256-260", "name": "Philosophia Mathematica"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "509a622da7869a8eb345eea921ed30924a73e6fa", "externalIds": {"CorpusId": 18573444}, "corpusId": 18573444, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/509a622da7869a8eb345eea921ed30924a73e6fa", "title": "Computer poker", "abstract": "Games are an interesting and challenging domain for computer science research, having the nice characteristics of a clearly deened set of rules and a speciic goal. Developing a program to play a strategic game well often involves the application of theoretical concepts to practical situations, and the relative success of that endeavour can be measured with quantiiable results. The game of poker is logistically simple yet strategically complex, and ooers many properties not exhibited by chess, checkers, and most other well-studied games. Most importantly, poker is a non-deterministic game with imperfect (hidden) information. Handling unreliable or incomplete information is a fundamental problem in computer science, and poker provides an excellent domain for investigating problems of decision making under conditions of uncertainty. Somewhat surprisingly, the potential beneets of studying poker have been largely overlooked by computer scientists and game researchers. In this essay we survey what resources are available for academic researchers, and lay some foundations for the sci-entiic exploration of this fascinating game.", "venue": "", "year": 1995, "referenceCount": 129, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "39261667", "name": "D. Billings"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "144461837", "name": "C. Shannon"}, {"authorId": "143805236", "name": "J. McCarthy"}, {"authorId": "1717349", "name": "D. Knuth"}, {"authorId": "48603437", "name": "A. Newell"}, {"authorId": "2055346931", "name": "Herbert A. Simon"}, {"authorId": "7991309", "name": "A. Samuel"}, {"authorId": "145878706", "name": "D. Michie"}, {"authorId": "102213388", "name": "K. Thompson"}]}, {"paperId": "e972b5110d036991078e55bede6608a7cdaf48b1", "externalIds": {"CorpusId": 8597454, "PubMed": "7564963"}, "corpusId": 8597454, "publicationVenue": {"id": "2060f67b-894f-4036-95ff-a11601fc257a", "name": "M.D.Computing", "type": "journal", "alternate_names": ["M.D comput comput med pract", "M.D. computing : computers in medical practice", "M D Comput", "M D Computing"], "issn": "0724-6811"}, "url": "https://www.semanticscholar.org/paper/e972b5110d036991078e55bede6608a7cdaf48b1", "title": "Lecture to the London Mathematical Society on 20 February 1947. 1986.", "abstract": null, "venue": "M.D.Computing", "year": 1995, "referenceCount": 0, "citationCount": 166, "influentialCitationCount": 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "12 5", "pages": "\n 390-7\n ", "name": "M.D. computing : computers in medical practice"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "33adb5256f85d7835696611b2517797dcb260ddb", "externalIds": {"MAG": "1577952063", "CorpusId": 60626324}, "corpusId": 60626324, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/33adb5256f85d7835696611b2517797dcb260ddb", "title": "Manchester computing machine: general topics", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": "194-196", "name": ""}, "authors": [{"authorId": "90657571", "name": "M. J. Lighthill"}, {"authorId": "16909947", "name": "G. C. Tootill"}, {"authorId": "143726570", "name": "J. Miller"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "143809548", "name": "E. A. Newman"}]}, {"paperId": "a28fe905a92c75ae2098acacad53c992e4bce52d", "externalIds": {"MAG": "1506559289", "CorpusId": 60659734}, "corpusId": 60659734, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a28fe905a92c75ae2098acacad53c992e4bce52d", "title": "Local programming methods and conventions", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 147, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": "178", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "f50fef843592d31124e629420a5d7df39a51fcd7", "externalIds": {"MAG": "1723067587", "CorpusId": 56518797}, "corpusId": 56518797, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f50fef843592d31124e629420a5d7df39a51fcd7", "title": "Checking a large routine", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 404, "influentialCitationCount": 44, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": "70-72", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "fc5ef435b26155d2ea554a8062781739c8ccf296", "externalIds": {"MAG": "627474889", "CorpusId": 190961434}, "corpusId": 190961434, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc5ef435b26155d2ea554a8062781739c8ccf296", "title": "Intelligence service : Schriften", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 46, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "401226dbe808714439b7f4fe6ce17e3fb5a6e790", "externalIds": {"CorpusId": 7990676}, "corpusId": 7990676, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790", "title": "Artificial Intelligence : Usfssg Computers to Think about Thinking . Part 1", "abstract": "In 1950, Alan M. Turing, the late deputy director of the University of Manchester\u2019s Computing Laboratory in England, proposed a novel test to determine whether a machine was capable of thinking. In thk test, an interrogator has a teletype conversation with a man and a woman, both of whom must try to convince the interrogator that they are the woman. At some point unknown to the interrogator, the man is replaced by a machine. If the interrogator is fooled as often by the machine as by the man, that machine can be said to have displayed intelligent behavior. 1 Some 30 years after Turing proposed this test, many aspects of human behavior have been simulated by a computer. Programs have been designed to play checkersz and chess,J prove mathematical theorems ,4,5 and even mimic the behavior of a paranoid human being.b Despite the success of these and many other programs, none of the researchers investigating what\u2019s been variously cafled \u201capplied epistemology\u201d or \u201cartificial intelligence\u201d (AI) would claim this means the \u201cthinking machine\u201d has arrived. Instead, they would agree that these programs have contributed important information about human behavior, and how computers can simulate it. The first part of this two-part essay will review some of the theones AI researchers have developed to explain human \u201cinformation processing.\u201d The second part of the essay will cover some applications of AI research. These include programs used in robotics, programs that communicate with computer users in natural languages such as English, and \u201cexpert systems\u201d which help chemists, physicians, and others perform decision-making tasks. The \u201cpioneer\u201d expert system, DENDRAL, will be discussed in some detail.T.~ AI grew out of the convergence of ideas in several different fields, and the availability of new technologies. According to Avrom Barr and Edward A. Feigenbaum, Stanford University, California, the single most important factor contributing to the birth of the field was the invention of the computer.9 They point out that human beings have always drawn analogies between mechanical devices and their own behavior. Computers, with their memories and information-processing abilities, naturafly invited analogies with the human brain. Shortly after digital computers became available, computer scientists began creating programs that, they hoped, would perform tasks generally considered to require intelligence. Their earliest efforts were directed at programming computers to solve puzzles, play games such as chess, backgammon, and checkers, solve mathematical theorems, and translate text from one language to another. The early computer programs performed these tasks, but not very well. For example, chess programs were successful at following the step-by-step instructions for moving chessmen. But computers couldn\u2019t independently gen-", "venue": "", "year": 1983, "referenceCount": 143, "citationCount": 181, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", "externalIds": {"MAG": "1482735464", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": 64330274}, "corpusId": 64330274, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7", "title": "Studies in the History of Probability and Statistics. XXXVII", "abstract": "SUMMARY An account is given of A. M. Turing's unpublished contributions to statistics during 1941 or 1940.", "venue": "", "year": 1979, "referenceCount": 15, "citationCount": 164, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1979-08-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "145179124", "name": "I. Good"}]}, {"paperId": "186bdef34bf03f6a1c74d5b074e956324e9fe746", "externalIds": {"MAG": "34610884", "CorpusId": 115688448}, "corpusId": 115688448, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/186bdef34bf03f6a1c74d5b074e956324e9fe746", "title": "Solvable and Unsolvable Problems", "abstract": null, "venue": "", "year": 1954, "referenceCount": 0, "citationCount": 184, "influentialCitationCount": 36, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "24fade315dc6a15961184a3c6dfec064591edcd5", "externalIds": {"MAG": "1553055254", "CorpusId": 60504948}, "corpusId": 60504948, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/24fade315dc6a15961184a3c6dfec064591edcd5", "title": "Review: Arthur W. Burks, The Logic of Programming Electronic Digital Computers", "abstract": null, "venue": "", "year": 1953, "referenceCount": 0, "citationCount": 187, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1953-06-01", "journal": {"volume": "18", "pages": "179-179", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "62660c27d93c50f69b1ed614ad9499f4d849aeec", "externalIds": {"MAG": "2317224626", "DOI": "10.2307/2268956", "CorpusId": 61881712}, "corpusId": 61881712, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/62660c27d93c50f69b1ed614ad9499f4d849aeec", "title": "Arthur W. Burks. The logic of programming electronic digital computers. Industrial mathematics (Detroit), vol. 1 (1950), pp. 36\u201352.", "abstract": "ARTHUR W. BURKS. The logic of programming electronic digital computers. Industrial mathematics (Detroit), vol. 1 (1950), pp. 36-52. This article does not deal primarily with \"logic\" in the technical sense. I t is an account of the general principles of programming, written for the benefit of the technically well informed reader who wishes to know what sort of an activity programming is. Comparisons with logic are however introduced, in connection with \"conditional control transfers\" and the free and bound variables of a programme as defined by Goldstine and von Neumann. Planning and coding of problems for an electronic computing instrument, vol. 1, Institute for Advanced Study, 1947.", "venue": "Journal of Symbolic Logic", "year": 1953, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1953-06-01", "journal": {"volume": "18", "pages": "179 - 179", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", "CorpusId": 14636783}, "corpusId": 14636783, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", "title": "Computing Machinery and Intelligence", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous. If the meaning of the words \u201cmachine\u201d and \u201cthink\u201d are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": 8596, "influentialCitationCount": 493, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1950-10-01", "journal": {"volume": "LIX", "pages": "433-460", "name": "Mind"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "c35cf8a54e655e91f8657cf8403d578994fb27c5", "externalIds": {"MAG": "2419349071", "DOI": "10.2307/j.ctv8d5sh5.6", "CorpusId": 148545092}, "corpusId": 148545092, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c35cf8a54e655e91f8657cf8403d578994fb27c5", "title": "PSYCHOLOGY AND PHILOSOPHY", "abstract": "1. The Imitation Game. I PROPOSE tO consider the question, 'Can machines think ? This should begin with definitions of the meaning of the terms 'machine' and 'think'. The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous. If the meaning of the words 'machine' and 'think 'are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to tlie question, ' Can machines think ? ' is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words. The new form of the problem can be described in terms of a game which we call the 'imitation game'. It is played with three people, a man (A), a woman (B), and an interrogator (C) who may be of either sex. The interrogator stays in a room apart from the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman. He knows them by labels X and Y, and at the end of the game he says either ' X is A and Y is B ' or ' X is B and Y is A'. The interrogator is allowed to put questions to A and B thus: C: Will X please tell me the length of his or her hair 2 Now suppose X is aetually A, then A must answer. It is A's", "venue": "", "year": 1950, "referenceCount": 6, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "092da8384571c8261858e91e3278e765eedde1d5", "externalIds": {"MAG": "2092575189", "DBLP": "journals/jsyml/Turing48", "DOI": "10.2307/2267329", "CorpusId": 5770563}, "corpusId": 5770563, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/092da8384571c8261858e91e3278e765eedde1d5", "title": "Practical forms of type theory", "abstract": "Russell's theory of types, though probably not providing the soundest possible foundation for mathematics, follows closely the outlook of most mathematicians. The present paper is an attempt to present the theory of types in forms in which the types themselves only play a rather small part, as they do in ordinary mathematical argument. Two logical systems are described (called the \u201cnested-type\u201d and \u201cconcealed-type\u201d systems). It is hoped that the ideas involved in these systems may help mathematicians to observe type theory in proofs as well as in doctrine. It will not be necessary to adopt a formal logical notation to do so.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1948, "referenceCount": 121, "citationCount": 200, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1948-06-01", "journal": {"volume": "13", "pages": "80 - 94", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "65069064b19ec8244044311a2a90fbf2c9161675", "externalIds": {"DBLP": "journals/jsyml/NewmanT42", "MAG": "1988522427", "DOI": "10.2307/2267552", "CorpusId": 17917182}, "corpusId": 17917182, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/65069064b19ec8244044311a2a90fbf2c9161675", "title": "A formal theorem in Church's theory of types", "abstract": "This note is concerned with the logical formalism with types recently introduced by Church [1] (and called (C) in this note) It was shewn in his paper (Theorem 26\u03b1) that if Y\u03b1 stands for (a form of the \u201caxiom of infinity\u201d for the type \u03b1), Y\u03b1 can be proved formally, from Y\u03b9 and the axioms 1 to 7, for all types \u03b1 of the forms \u03b9\u2032, \u03b9\u2033, \u2026. For other types the question was left open, but for the purposes of an intrinsic characterisation of the Church type-stratification given by one of us, it is desirable to have the remaining cases cleared up. A formal proof of Y\u03b1 is now given for all types \u03b1 containing \u03b9, but the proof uses, in addition to Axioms 1 to 7 and Y\u03b9, also Axiom 9 (in connection with Def. 4), and Axiom 10 (in Theorem 9).", "venue": "Journal of Symbolic Logic (JSL)", "year": 1942, "referenceCount": 64, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1942-03-01", "journal": {"volume": "7", "pages": "28 - 33", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "externalIds": {"DBLP": "journals/jsyml/Turing42", "MAG": "2065302580", "DOI": "10.2307/2268111", "CorpusId": 17112802}, "corpusId": 17112802, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "title": "The use of dots as brackets in Church's system", "abstract": "Any logical system, if its use is to be carried beyond a rather elementary stage, needs powerful conventions about abbreviations: in particular one usually wants to modify the bracketing so as to make the formulae more readable, and also possibly shorter. The present note has been written in the belief that Church's formulation of the simple theory of types is particularly suitable as a basis for work on that theory, and that it is therefore worth while introducing special conventions which take into account the needs of this particular system. The conventions which I shall describe are ones which I have used a good deal myself, and have always found adequate. I intend to make use of them in forthcoming papers. They may be regarded as an extension of Curry's conventions. I shall begin with a general discussion of punctuation by means of groups of dots. This general theory is applicable, with some modifications, to Russell's, Quine's, and Curry's bracketing systems as well as to the present one.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1942, "referenceCount": 83, "citationCount": 193, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1942-12-01", "journal": {"volume": "7", "pages": "146 - 156", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "891151133781d3e78f19b882015746bafd9bc935", "externalIds": {"DBLP": "journals/jsyml/Turing37a", "MAG": "2799201656", "CorpusId": 33223540}, "corpusId": 33223540, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/891151133781d3e78f19b882015746bafd9bc935", "title": "The p-Function in \u03bb-K-Conversion", "abstract": "In the theory of conversion it is important to have a formally defined function which assigns to any positive integer n the least integer not less than n which has a given property. The definition of such a formula is somewhat involved:' I propose to give the corresponding formula in X-K-conversion,' which will (naturally) be much simpler. I shall in fact find a formula p such that if T be a formula for which T(n) is convertible3 to a formula representing a natural number, whenever n represents a natural number, then p(T, r) is convertible to the formula q representing the least natural number q, not less than r, for which T(q) conv 0.2 The method depends on finding a formula e with the property that e conv Xu.u(e(u)), and consequently if M-<3(V) then M conv V(M). A formula with this property is,", "venue": "J. Symb. Log.", "year": 1937, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "2", "pages": "164", "name": "J. Symb. Log."}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "b300783b3f3bd283ab1cf86b7a51f63469db380f", "externalIds": {"MAG": "2798583139", "DOI": "10.2307/2268281", "CorpusId": 11473119}, "corpusId": 11473119, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/b300783b3f3bd283ab1cf86b7a51f63469db380f", "title": "The \u00fe-function in \u03bb-K-conversion", "abstract": "In the theory of conversion it is important to have a formally defined function which assigns to any positive integer n the least integer not less than n which has a given property. The definition of such a formula is somewhat involved: I propose to give the corresponding formula in \u03bb-K-conversion, which will (naturally) be much simpler. I shall in fact find a formula \u00fe such that if T be a formula for which T(n) is convertible to a formula representing a natural number, whenever n represents a natural number, then \u00fe(T, r) is convertible to the formula q representing the least natural number q, not less than r, for which T(q) conv 0.2 The method depends on finding a formula \u0398 with the property that \u0398 conv \u03bbu\u00b7u(\u0398(u)), and consequently if M\u2192\u0398(V) then M conv V(M). A formula with this property is, The formula \u00fe will have the required property if \u00fe(T, r) conv r when T(r) conv 0, and \u00fe(T, r) conv \u00fe(T, S(r)) otherwise. These conditions will be satisfied if \u00fe(T, r) conv T(r, \u03bbx\u00b7\u00fe(T, S(r)), r), i.e. if \u00fe conv {\u03bbptr\u00b7t(r, \u03bbx\u00b7p(t, S(r)), r)}(\u00fe). We therefore put, This enables us to define also a formula, such that (T, n) is convertible to the formula representing the nth positive integer q for which T(q) conv 0.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1937, "referenceCount": 97, "citationCount": 35, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1937-12-01", "journal": {"volume": "2", "pages": "164 - 164", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "ee8c779e7823814a5f1746d883ca77b26671b617", "externalIds": {"DBLP": "journals/jsyml/Turing37", "MAG": "1485161910", "DOI": "10.2307/2268280", "CorpusId": 2317046}, "corpusId": 2317046, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/ee8c779e7823814a5f1746d883ca77b26671b617", "title": "Computability and \u03bb-definability", "abstract": "Several definitions have been given to express an exact meaning corresponding to the intuitive idea of \u2018effective calculability\u2019 as applied for instance to functions of positive integers. The purpose of the present paper is to show that the computable functions introduced by the author are identical with the \u03bb-definable functions of Church and the general recursive functions due to Herbrand and G\u00f6del and developed by Kleene. It is shown that every \u03bb-definable function is computable and that every computable function is general recursive. There is a modified form of \u03bb-definability, known as \u03bb-K-definability, and it turns out to be natural to put the proof that every \u03bb-definable function is computable in the form of a proof that every \u03bb-K-definable function is computable; that every \u03bb-definable function is \u03bb-K-definable is trivial. If these results are taken in conjunction with an already available proof that every general recursive function is \u03bb-definable we shall have the required equivalence of computability with \u03bb-definability and incidentally a new proof of the equivalence of \u03bb-definability and \u03bb-K-definability. A definition of what is meant by a computable function cannot be given satisfactorily in a short space. I therefore refer the reader to Computable pp. 230\u2013235 and p. 254. The proof that computability implies recursiveness requires no more knowledge of computable functions than the ideas underlying the definition: the technical details are recalled in \u00a75.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1937, "referenceCount": 6, "citationCount": 386, "influentialCitationCount": 38, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1937-12-01", "journal": {"volume": "2", "pages": "153 - 163", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "4d81ff79406cd02e064285e5f61e5b6bde68f5e7", "externalIds": {"CorpusId": 18195327}, "corpusId": 18195327, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4d81ff79406cd02e064285e5f61e5b6bde68f5e7", "title": "Computing Machinery and Intelligence 1. the Imitation Game", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous. If the meaning of the words \"machine\" and \"think\" are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \"Can machines think?\" is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words. The new form of the problem can be described in terms of a game which we call the \"imitation game.\" It is played with three people, a man (A), a woman (B), and an interrogator (C) who may be of either sex. The interrogator stays in a room apart' from the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman. He knows them by labels X and Y, and at the end of the game he says either \"X is A and Y is B\" or \"X is Band Y is A.\" The interrogator is allowed to put questions to A and B thus: C: Will X please tell me the length of his or her hair? Now suppose X is actually A, then A must answer. It is A's object in the game to try and cause C to make the wrong identification. His answer might therefore be: \"My hair is shingled, and the longest strands are about nine inches long. \" 11", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}]} diff --git a/tests/data/Paper.json b/tests/data/Paper.json index c450e40..98a2ef0 100644 --- a/tests/data/Paper.json +++ b/tests/data/Paper.json @@ -1 +1 @@ -{"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", "CorpusId": 14636783}, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", "title": "Computing Machinery and Intelligence", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous. If the meaning of the words \u201cmachine\u201d and \u201cthink\u201d are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": 8419, "influentialCitationCount": 483, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "embedding": {"model": "specter@v0.1.1", "vector": [1.4912004470825195, -3.5677378177642822, -1.1445329189300537, 0.9798691868782043, 2.3536713123321533, 2.412142753601074, 4.424642086029053, -2.8761181831359863, -2.1257364749908447, -1.1084790229797363, -3.251805067062378, 1.1977577209472656, 3.253897190093994, -1.9838618040084839, -1.4531219005584717, 0.8836204409599304, -1.073793888092041, -2.7192888259887695, 1.6965833902359009, 0.5184207558631897, 1.773499608039856, 2.5366764068603516, -4.089727878570557, -2.662728786468506, -1.4416794776916504, -3.607022285461426, 2.746018886566162, -1.7733300924301147, -0.5106160640716553, 0.5690411329269409, -1.8916593790054321, -1.9661279916763306, 3.3400611877441406, -3.8053669929504395, 0.9296400547027588, 0.41943711042404175, 3.257852554321289, 4.370321273803711, 0.3067270517349243, -3.8996522426605225, -2.726933479309082, 3.125169277191162, 4.091403007507324, 1.59388267993927, 1.3132169246673584, 1.040267825126648, 2.296818733215332, 1.9781070947647095, 0.7093571424484253, 2.5194222927093506, 1.4122633934020996, -0.04770202562212944, 3.20090389251709, 3.387321949005127, 3.338480234146118, -2.636532783508301, 0.0511288084089756, 0.851689338684082, 2.454941749572754, 0.41139668226242065, 2.935403823852539, 0.7794689536094666, -2.964092969894409, -2.885684013366699, 2.0985352993011475, -0.8140782117843628, -2.9402453899383545, -1.6351039409637451, 2.4304869174957275, -3.5581846237182617, -1.1929571628570557, -5.903554916381836, 3.020494222640991, -2.540940046310425, -1.2359957695007324, -2.2539517879486084, -0.26531949639320374, -4.144553184509277, 2.4638936519622803, -2.071890354156494, 2.238892078399658, -0.7647629380226135, -0.421325147151947, 2.4426727294921875, 2.2411584854125977, -0.18960316479206085, -1.995802879333496, -2.0175564289093018, 0.08678353577852249, 1.270195722579956, 0.10762540251016617, -0.015511035919189453, 1.986484169960022, 4.073625087738037, -2.114347457885742, 0.7542542219161987, 1.5746797323226929, 1.1141210794448853, 1.6224344968795776, 1.476503610610962, 0.15173879265785217, 0.17057406902313232, 4.779618740081787, -2.5163748264312744, 3.208101749420166, -0.46435248851776123, 1.7156789302825928, 4.8144354820251465, 4.347252368927002, -3.5524511337280273, 4.120011329650879, 1.0828466415405273, -0.009330213069915771, -0.4017130136489868, 1.751489281654358, -0.5669882297515869, 0.0016049202531576157, 0.34845665097236633, -5.341610431671143, -1.2483819723129272, -3.4553205966949463, 0.30804696679115295, -1.643052577972412, 0.6510483622550964, 0.7783281803131104, -3.4772589206695557, -6.633528709411621, -0.24480584263801575, -0.4053124785423279, -1.5410195589065552, 3.3885180950164795, 1.4575270414352417, 2.6739587783813477, 1.4166474342346191, 0.11588010936975479, 2.9077024459838867, -1.011893391609192, -0.5767647624015808, -1.5823938846588135, -1.4049330949783325, 2.5106942653656006, 0.7393538951873779, 1.5895920991897583, 0.0003083422780036926, -3.374191999435425, 4.317915916442871, -0.9368650317192078, -5.205918312072754, -2.2786436080932617, 2.188253402709961, 3.1293387413024902, -4.58628511428833, -0.4621364176273346, -2.2124624252319336, 1.9622949361801147, 3.820875644683838, -3.2327256202697754, 0.5001388192176819, -0.08520727604627609, -0.2393031120300293, -0.5099124908447266, -4.311080455780029, -7.625182628631592, -0.7195397615432739, -0.09316174685955048, -4.389499187469482, -1.0065091848373413, 2.595703125, -0.9527037739753723, 1.5434409379959106, 0.1468064934015274, 0.4864352345466614, -4.90764045715332, 2.314533233642578, 1.4545546770095825, 4.534533977508545, -1.3333895206451416, -0.6372758150100708, -0.04751807451248169, -0.022305790334939957, -0.6378300189971924, 1.9842281341552734, -4.330424785614014, -2.5224874019622803, -1.7467732429504395, -5.2638421058654785, 0.6906782984733582, -4.064807415008545, 1.6263312101364136, 1.4265756607055664, -3.7292516231536865, -2.8003158569335938, 1.2935411930084229, 4.026785373687744, 0.81377774477005, -1.3772810697555542, 3.7837374210357666, 1.8329479694366455, -0.24431589245796204, 0.44198039174079895, 0.2649782598018646, 1.1607179641723633, -1.1263234615325928, -1.2537122964859009, 1.9910213947296143, 2.0369362831115723, -1.2187927961349487, 5.146304607391357, -0.09589923918247223, 0.7303347587585449, 3.9201860427856445, 1.120862603187561, -1.0793205499649048, -3.2901806831359863, 0.26532667875289917, 1.4524774551391602, -5.4654741287231445, -0.007292408496141434, 4.590025901794434, 0.5332738161087036, -1.4688737392425537, -1.5493791103363037, 3.8060014247894287, -2.5307557582855225, 2.2415049076080322, 0.04449813812971115, -0.4910835325717926, -3.439023733139038, 1.2819942235946655, -2.450918197631836, -1.7708230018615723, -3.58064341545105, -1.4969606399536133, 1.0039310455322266, -1.7640535831451416, -1.0593749284744263, -5.585129261016846, -0.7832945585250854, 1.119728684425354, 0.4876984655857086, 0.3577856421470642, 0.8662077188491821, -1.6058495044708252, 2.0129234790802, -3.0357728004455566, 0.8151829242706299, -3.568014621734619, 2.1913697719573975, -0.47153159976005554, -2.5587644577026367, -3.268476724624634, -1.2067168951034546, 0.24534153938293457, 2.982598304748535, 1.7270994186401367, 3.4260847568511963, -1.5833585262298584, -3.3782668113708496, 2.574708938598633, 1.3798424005508423, 0.7863763570785522, 1.4131414890289307, -3.3678414821624756, 1.3044129610061646, 2.4515881538391113, -3.4740331172943115, -5.765645503997803, -1.739263653755188, -0.6904822587966919, -1.3561055660247803, -0.4330002963542938, -0.41918060183525085, 2.121532917022705, -2.163936138153076, 1.7772341966629028, -1.3180198669433594, -0.3127167522907257, -0.5866559147834778, 4.935529708862305, 0.759954035282135, 1.2544664144515991, 0.48061805963516235, 0.6665018796920776, -3.271209955215454, -0.19271861016750336, -0.6262511014938354, 3.658082962036133, 1.7972036600112915, 1.9327462911605835, 0.6973538994789124, 0.5085180401802063, 4.304430961608887, -4.336119174957275, 2.1630356311798096, -0.21497029066085815, 0.8230308294296265, 4.160607814788818, 1.1526957750320435, -2.010878086090088, 2.2168242931365967, 0.0011761756613850594, 4.143531799316406, 2.5589847564697266, 1.6056995391845703, -0.3169042766094208, 3.184293270111084, 2.134319305419922, -4.298863887786865, 0.3618548810482025, -2.017502784729004, 1.8477715253829956, 0.05207091197371483, -0.537638247013092, -3.9817962646484375, 0.5500563383102417, -0.4757603406906128, 2.2578113079071045, 0.38371512293815613, -2.2485015392303467, 2.498448371887207, -0.3643079102039337, 1.4773989915847778, 0.6141877770423889, 0.1441245675086975, -3.072169780731201, 2.299468517303467, 2.4218196868896484, -0.0861143171787262, -1.3371458053588867, -2.2199652194976807, -0.4460529685020447, 1.0827375650405884, 2.511638641357422, 2.1290223598480225, -1.1577873229980469, -6.184621810913086, 1.0780055522918701, -3.886425733566284, 1.7774617671966553, -1.3791542053222656, -0.8490374088287354, 5.72236442565918, 1.5893830060958862, 0.32902979850769043, -2.497596025466919, 3.1421282291412354, 2.0923655033111572, -2.642005205154419, -3.839104413986206, 4.451228618621826, 1.3005056381225586, 1.8951539993286133, 1.6728183031082153, 0.826499342918396, 3.9324283599853516, 3.3128347396850586, 3.914780855178833, -0.7221781015396118, -1.3029998540878296, -2.013812780380249, -2.182837963104248, -0.2159322053194046, 1.8456220626831055, 0.529842734336853, -1.199500560760498, -2.289618968963623, 6.9116973876953125, -5.502941608428955, -0.6482645273208618, -2.602815628051758, -3.04982852935791, -2.127835750579834, -3.1478404998779297, -0.34581586718559265, -0.7402955889701843, -4.066827297210693, -0.47199007868766785, -4.059601783752441, 2.327622413635254, 1.1821439266204834, 0.15096122026443481, -0.6574445366859436, 0.5852963328361511, 3.317716598510742, 0.8644300699234009, 1.4340680837631226, -2.432757616043091, 2.0555384159088135, -3.90724778175354, 1.0012681484222412, -0.41373327374458313, -2.8298823833465576, 6.131030559539795, 2.0150856971740723, -1.8204972743988037, -1.0754027366638184, -2.309323310852051, -2.379054546356201, -3.0613415241241455, 3.03078556060791, -1.1570667028427124, -1.0867667198181152, 3.627497911453247, 1.3414182662963867, -0.7400435209274292, -0.9083080887794495, 1.6084264516830444, -3.6992690563201904, -5.179874420166016, 1.0713765621185303, -7.001905918121338, -1.0234386920928955, -1.279598355293274, -0.6123147010803223, 2.594583749771118, 1.7951123714447021, 3.0504584312438965, 3.647704839706421, -0.8255187273025513, 0.46131110191345215, -2.8640248775482178, 0.9530532956123352, 9.28664493560791, 3.295341968536377, -1.9902756214141846, 2.6219594478607178, 1.1045936346054077, 4.152153015136719, -2.8982529640197754, 3.1394364833831787, 2.14168119430542, 4.563228130340576, -0.4255490005016327, 0.4556257128715515, 2.189849376678467, -0.5173490643501282, 0.6736354231834412, -0.13150930404663086, 2.7108571529388428, -5.299671649932861, 2.277427911758423, -1.1924024820327759, 0.3604048490524292, 0.20612220466136932, -3.454986095428467, 1.292128562927246, 2.894195079803467, 2.223227024078369, -0.9455307126045227, -1.7939320802688599, 0.06685015559196472, 0.27166950702667236, -0.14791132509708405, -2.916079521179199, 0.7232120633125305, 0.13648608326911926, -1.9105552434921265, 1.232003092765808, 0.21377891302108765, 2.044219970703125, -3.128916025161743, 4.0654401779174805, -1.64369535446167, 0.18517795205116272, 2.5652148723602295, -3.774272918701172, 0.04907339811325073, -0.06912461668252945, 0.15278685092926025, -0.7334116101264954, 3.400716781616211, -1.2366024255752563, -4.117137432098389, 2.140357255935669, 0.8362204432487488, 4.288045406341553, 5.800609588623047, 4.423896789550781, 1.7416282892227173, -0.43763279914855957, -2.626300811767578, -1.703445315361023, 4.882078170776367, 0.7089818716049194, 0.9079666137695312, 2.447680711746216, -2.0190351009368896, -1.3947519063949585, -0.31683510541915894, 0.8696826100349426, -3.5703392028808594, 0.2538117468357086, 5.1805243492126465, 0.7383964657783508, -2.8177847862243652, 1.5130589008331299, -3.856858253479004, -5.221625328063965, -0.3264671862125397, 1.077576994895935, 0.6066218018531799, -4.628721714019775, -0.9978218674659729, -2.860262632369995, 3.91422438621521, 4.650241374969482, 0.6411037445068359, 3.27441143989563, 2.8085005283355713, -1.5118881464004517, -0.2862726151943207, -0.027123019099235535, -0.9779676795005798, -0.07652962952852249, 0.6351696252822876, -1.9043272733688354, 2.096518039703369, 4.422485828399658, -1.0958195924758911, 0.27752557396888733, 0.6965365409851074, -0.07153210788965225, -3.7454171180725098, 0.608910083770752, -3.2880749702453613, 1.4592971801757812, 0.12961120903491974, 0.6550276279449463, 1.2567991018295288, 2.4147582054138184, 2.145935297012329, 2.7853281497955322, -2.1146483421325684, 0.6186407804489136, 3.230029582977295, -2.019900321960449, -1.8758838176727295, 4.192493915557861, 0.567356288433075, 0.9650986194610596, -3.891258478164673, -0.07773301750421524, -1.4568970203399658, 1.511470913887024, 2.817631959915161, 5.228792667388916, -4.549345970153809, -2.3188655376434326, -5.015311241149902, 0.8192861676216125, 3.086291551589966, 0.055960580706596375, 3.0219428539276123, 1.3445091247558594, -2.978372097015381, -0.9532874226570129, -2.3546040058135986, 0.3788264989852905, 0.8931404948234558, 1.654476284980774, 2.0823516845703125, -0.7059788703918457, -3.477396011352539, -1.2190135717391968, 3.1988987922668457, -0.9511443376541138, 0.31925660371780396, 1.1658567190170288, -2.6117656230926514, -3.3201589584350586, 1.3019773960113525, 1.1917563676834106, 2.419656276702881, -0.5857217311859131, 0.8047353029251099, 2.6140263080596924, 3.198706865310669, -0.2895236313343048, 1.7804657220840454, -0.41059935092926025, 1.591880440711975, 1.0578147172927856, -0.9528192281723022, -0.6371835470199585, -0.8999473452568054, 2.926731586456299, -2.5385398864746094, 1.3672055006027222, -2.8778762817382812, -4.268380641937256, -0.4135794937610626, -0.13491739332675934, -1.7325851917266846, 1.1960667371749878, 0.7391232848167419, -4.127851963043213, 0.7886160016059875, -0.9319157600402832, -0.07458949089050293, 0.3255041837692261, -0.9248706102371216, 2.1431007385253906, 4.779815196990967, 1.7006468772888184, -2.898259401321411, -4.037906169891357, 2.250380516052246, -0.2571093440055847, 1.803026795387268, -0.6334996223449707, 0.38012900948524475, -0.7178404331207275, 10.408695220947266, 0.4416235089302063, 3.2658486366271973, -2.645660161972046, 3.1659204959869385, -2.9682207107543945, -1.8574892282485962, -0.5166532397270203, 0.48397955298423767, -0.6754127740859985, 5.767602920532227, 1.635308027267456, -2.2770495414733887, 1.5910547971725464, -3.266660213470459, -0.36168932914733887, 0.804029107093811, 4.0777435302734375, 3.6347291469573975, 2.446516990661621, 1.0559085607528687, 0.7756821513175964, 0.3844594955444336, -3.2986485958099365, 1.153260350227356, 2.703200101852417, 3.977548360824585, -0.6733660101890564, -2.5609700679779053, 1.570186972618103, -2.4598803520202637, -1.199933648109436, 1.8013646602630615, 1.1733877658843994, -0.9769896268844604, 0.27824100852012634, 4.334930896759033, -3.2949230670928955, -3.437204360961914, -2.245392084121704, 1.3960449695587158, -2.8982086181640625, -5.141915798187256, 2.592688798904419, -1.7752970457077026, -1.1991205215454102, 5.469426155090332, 1.0072311162948608, 0.5077131390571594, 5.818460464477539, -2.7980525493621826, -0.7477746605873108, -2.333284854888916, -0.8473489880561829, 0.5736323595046997, -0.6414474248886108, 0.763018012046814, -4.140954494476318, -0.8839965462684631, -2.4077603816986084, 2.392150640487671, -1.750841498374939, 3.517760753631592, -3.4706099033355713, -0.8139467239379883, -1.162028431892395, -1.7277436256408691, -0.012990135699510574, 1.633035659790039, 0.5467530488967896, 2.617684841156006, 2.025974988937378, -1.8517699241638184, -2.4114012718200684, 0.3498564660549164, -3.3467040061950684, 0.9990707039833069, -3.2822868824005127, -2.11946964263916, 7.44944953918457, -3.1606969833374023, -1.0515354871749878, -4.833910942077637, 3.2854321002960205, 5.417191028594971, -3.63417911529541, 1.4485042095184326, -1.780576467514038, 0.7408013343811035, -0.623672604560852, -3.956453800201416, -0.4284232258796692, 5.948563575744629, 0.9917374849319458, 1.4613680839538574, 1.8326377868652344, -0.5463629364967346, 2.1198883056640625, -4.7847514152526855, -3.700894355773926, 0.7175806164741516, 0.28311285376548767, 0.7922775745391846, 1.0427093505859375, -2.716966390609741, -2.286104917526245, -1.7376515865325928, -1.365503191947937, -4.581218719482422, 1.696526288986206, 1.9796323776245117, -1.6948431730270386, -1.4996675252914429, 3.3924407958984375, -2.018606185913086, 0.375287801027298, -1.4784940481185913, 2.4106976985931396, 1.8442091941833496, 0.30308371782302856, 0.7252417206764221, 0.4834488332271576, 2.05482816696167, -5.502094268798828, 1.4989551305770874, -0.036200929433107376, 0.7935841083526611, -6.309118270874023, 0.28731459379196167, 0.7802544236183167, 1.6197532415390015, -0.21075761318206787, 3.5668857097625732, -3.1733810901641846, 0.14286154508590698, -0.3445669412612915, 1.4772952795028687, 1.1107704639434814, 1.3991512060165405, 4.0126633644104, -0.5388878583908081, 0.20864829421043396, -1.4177249670028687, 4.58060359954834, -3.0819759368896484, -2.489410638809204, -1.2240601778030396, 2.822070598602295, -3.266664743423462, -0.29265448451042175, 1.4111319780349731, -0.8745537400245667, -1.8424195051193237, 1.735237956047058, -0.6763474941253662, -1.7880852222442627]}, "tldr": {"model": "tldr@v2.0.0", "text": "The question, \u201cCan machines think?\u201d is considered, and the question is replaced by another, which is closely related to it and is expressed in relatively unambiguous words."}, "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1950-10-01", "journal": {"name": "Mind", "pages": "433-460", "volume": "LIX"}, "authors": [{"authorId": "2262347", "externalIds": {"DBLP": ["Alan M. Turing"]}, "url": "https://www.semanticscholar.org/author/2262347", "name": "A. Turing", "aliases": ["A Turing", "A M Turing", "A. M. Turing", "Alan M. Turing", "Alan Turing", "Alan Mathison Turing"], "affiliations": [], "homepage": null, "paperCount": 60, "citationCount": 12233, "hIndex": 23}], "citations": [{"paperId": "de6e3d9e35ad2e4089bfc26a9ecc11ed7996c95b", "externalIds": {"DOI": "10.1016/j.epsr.2022.108887", "CorpusId": 252982113}, "url": "https://www.semanticscholar.org/paper/de6e3d9e35ad2e4089bfc26a9ecc11ed7996c95b", "title": "Deep learning for power quality", "abstract": null, "venue": "Electric Power Systems Research", "year": 2023, "referenceCount": 129, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2023-01-01", "journal": {"name": "Electric Power Systems Research"}, "authors": [{"authorId": "49442361", "name": "R. Oliveira"}, {"authorId": "46525078", "name": "M. Bollen"}]}, {"paperId": "f604c9436aa0103ba0ba4c8366bdaaae6b263138", "externalIds": {"DOI": "10.21608/jsec.2022.268733", "CorpusId": 253402215}, "url": "https://www.semanticscholar.org/paper/f604c9436aa0103ba0ba4c8366bdaaae6b263138", "title": "DEVELOPING A NEW BUSINESS OPPORTUNITIES VIA ARTIFICIAL INTELLIGENCE: NEW STRATEGIC MANAGEMENT MODEL", "abstract": "As we are living in the fourth industrial revolution era which is differentiated by the speed of technological breakthroughs, the enormous amount of data available can\u2019t be handled by the traditional analytical methods to generate new business opportunities. This study will tackle the optimization cycle by analyzing large amounts of usable data to create business opportunities. It provides a model for using Big Data Analytics to support service innovation and design. It is also a working framework for generating a business opportunities engine. It explains artificial intelligence (AI) and its contributions to creating business opportunities from big data and how it helps in improving the strategic planning structure. The study concluded that AI and machine learning added prediction and opportunity values to business data. It also clarifies that AI enriches the experience of business suggestions not only by predicting the best business ideas but also by recommending the best personnel and companies as investors for their preferred project ideas. This study extends the vision to create a smart business operating system. This includes scoring (ideas, financial status, the existence of opportunities, etc.), advice, and intelligent links between Venture capital and start-up prospects. This process is based on a variety of market analytics assisted by several elements of the application, such as corporate social networks, Score framework, recommendation, and geolocation analyzer, and quality developers for (Quality Proposal), business experience developer, competitiveness analyzer, plan predictions and forecasting. The study has three main phases to achieve the opportunity recommendations, First: business opportunity model inputs, second: business opportunity model processing, and finally business opportunity model outputs.", "venue": "\u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-01", "journal": {"name": "\u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629"}, "authors": [{"authorId": "2190203460", "name": "Sayed Mahmoud El Sayed El Khouly"}, {"authorId": "2190201240", "name": "Kareem Yasser"}, {"authorId": "2176826746", "name": "Engy Ahmed Yehia"}]}, {"paperId": "908e73ab7e4a7bc5bd42fd84b31b6290cda401a2", "externalIds": {"DOI": "10.3389/frvir.2022.1033709", "CorpusId": 253841933}, "url": "https://www.semanticscholar.org/paper/908e73ab7e4a7bc5bd42fd84b31b6290cda401a2", "title": "Perceived authenticity of virtual characters makes the difference", "abstract": "Conventionally, human-controlled and machine-controlled virtual characters are studied separately under different theoretical frameworks based on the ontological nature of the particular virtual character. However, in recent years, the technological advancement has made the boundaries between human and machine agency increasingly blurred. This manuscript proposes a theoretical framework that can explain how various virtual characters, regardless of their ontological agency, can be treated as unique social actors with a focus on perceived authenticity. Specifically, drawing on the authenticity model in computer-mediated communication proposed by Lee (2020) and a typology of virtual characters, a multi-layered perceived authenticity model is proposed to demonstrate how virtual characters do not have to be perceived as humans and yet can be perceived as authentic to their human interactants.", "venue": "Frontiers in Virtual Reality", "year": 2022, "referenceCount": 109, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-25", "journal": {"volume": "3"}, "authors": [{"authorId": "2118226730", "name": "Junru Huang"}, {"authorId": "3669749", "name": "Younbo Jung"}]}, {"paperId": "4000868e095553bc7985e02c6281de6096728298", "externalIds": {"DOI": "10.1556/2062.2022.00575", "CorpusId": 253826921}, "url": "https://www.semanticscholar.org/paper/4000868e095553bc7985e02c6281de6096728298", "title": "Winograd schemata and other datasets for anaphora resolution in Hungarian", "abstract": "The Winograd Schema Challenge (WSC, proposed by Levesque, Davis & Morgenstern 2012) is considered to be the novel Turing Test to examine machine intelligence. Winograd schema questions require the resolution of anaphora with the help of world knowledge and commonsense reasoning. Anaphora resolution is itself an important and difficult issue in natural language processing, therefore, many other datasets have been created to address this issue. In this paper we look into the Winograd schemata and other Winograd-like datasets and the translations of the schemata to other languages, such as Chinese, French and Portuguese. We present the Hungarian translation of the original Winograd schemata and a parallel corpus of all the translations of the schemata currently available. We also adapted some other anaphora resolution datasets to Hungarian. We aim to discuss the challenges we faced during the translation/adaption process.", "venue": "Acta Linguistica Academica", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-22", "journal": {"name": "Acta Linguistica Academica"}, "authors": [{"authorId": "7847789", "name": "No\u00e9mi Vad\u00e1sz"}, {"authorId": "1414711705", "name": "No\u00e9mi Ligeti-Nagy"}]}, {"paperId": "4b12c354631d76ae6dadec168a14f77fc839fb0c", "externalIds": {"DOI": "10.1007/s43681-022-00236-7", "CorpusId": 253830855}, "url": "https://www.semanticscholar.org/paper/4b12c354631d76ae6dadec168a14f77fc839fb0c", "title": "Algorithmic decision-making in financial services: economic and normative outcomes in consumer credit", "abstract": null, "venue": "AI and Ethics", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-21", "journal": {"name": "AI and Ethics"}, "authors": [{"authorId": "2161835433", "name": "Holli Sargeant"}]}, {"paperId": "444164a33acf5d207bb4acb955cbb1c128a45ce6", "externalIds": {"DBLP": "journals/corr/abs-2211-11461", "ArXiv": "2211.11461", "DOI": "10.48550/arXiv.2211.11461", "CorpusId": 253735380}, "url": "https://www.semanticscholar.org/paper/444164a33acf5d207bb4acb955cbb1c128a45ce6", "title": "Exhaustive Symbolic Regression", "abstract": "\u2014Symbolic Regression (SR) algorithms learn analytic expressions which both accurately \ufb01t data and, unlike traditional machine-learning approaches, are highly interpretable. Conventional SR suffers from two fundamental issues which we address in this work. First, since the number of possible equations grows exponentially with complexity, typical SR methods search the space stochastically and hence do not necessarily \ufb01nd the best function. In many cases, the target problems of SR are suf\ufb01ciently simple that a brute-force approach is not only feasible, but desirable. Second, the criteria used to select the equation which optimally balances accuracy with simplicity have been variable and poorly motivated. To address these issues we introduce a new method for SR \u2013 Exhaustive Symbolic Regression (ESR) \u2013 which systematically and ef\ufb01ciently considers all possible equations and is therefore guaranteed to \ufb01nd not only the true optimum but also a complete function ranking. Utilising the minimum description length principle, we introduce a principled method for combining these preferences into a single objective statistic. To illustrate the power of ESR we apply it to a catalogue of cosmic chronometers and the Pantheon+ sample of supernovae to learn the Hubble rate as a function of redshift, \ufb01nding \u223c 40 functions (out of 5.2 million considered) that \ufb01t the data more economically than the Friedmann equation. These low-redshift data therefore do not necessarily prefer a \u039b CDM expansion history, and traditional SR algorithms that return only the Pareto-front, even if they found this successfully, would not locate \u039b CDM. We make our code and full equation sets publicly available \u00a7 .", "venue": "ArXiv", "year": 2022, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-21", "journal": {"volume": "abs/2211.11461", "name": "ArXiv"}, "authors": [{"authorId": "1792039168", "name": "D. J. Bartlett"}, {"authorId": "145903962", "name": "H. Desmond"}, {"authorId": "145209585", "name": "P. Ferreira"}]}, {"paperId": "2c43ef2d8e44d055b61eecddf323a3412007cef8", "externalIds": {"DBLP": "journals/corr/abs-2211-11483", "ArXiv": "2211.11483", "DOI": "10.48550/arXiv.2211.11483", "CorpusId": 253734407}, "url": "https://www.semanticscholar.org/paper/2c43ef2d8e44d055b61eecddf323a3412007cef8", "title": "Deanthropomorphising NLP: Can a Language Model Be Conscious?", "abstract": "This work is intended as a voice in the discussion over the recent claims that LaMDA, a pretrained language model based on the Transformer model architecture, is sentient. This claim, if con\ufb01rmed, would have serious rami\ufb01cations in the Natural Language Processing (NLP) community due to wide-spread use of similar models. However, here we take the position that such a language model cannot be sentient, or conscious, and that LaMDA in particular exhibits no advances over other similar models that would qualify it. We jus-tify this by analysing the Transformer architecture through Integrated Information Theory. We see the claims of consciousness as part of a wider tendency to use anthropomorphic language in NLP reporting. Regard-less of the veracity of the claims, we consider this an opportune moment to take stock of progress in language modelling and consider the ethical implications of the task. In order to make this work helpful for readers outside the NLP community, we also present the necessary background in language modelling.", "venue": "ArXiv", "year": 2022, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-21", "journal": {"volume": "abs/2211.11483", "name": "ArXiv"}, "authors": [{"authorId": "2895959", "name": "M. Shardlow"}, {"authorId": "1984182", "name": "Piotr Przyby\u0142a"}]}, {"paperId": "ca958dfa4615ea205b2e7e036a85b7bb4f873dd4", "externalIds": {"ArXiv": "2211.15397", "DBLP": "journals/corr/abs-2211-15397", "DOI": "10.48550/arXiv.2211.15397", "CorpusId": 254043466}, "url": "https://www.semanticscholar.org/paper/ca958dfa4615ea205b2e7e036a85b7bb4f873dd4", "title": "Automating Systematic Literature Reviews with Natural Language Processing and Text Mining: a Systematic Literature Review", "abstract": ".", "venue": "ArXiv", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-20", "journal": {"volume": "abs/2211.15397", "name": "ArXiv"}, "authors": [{"authorId": "2192602944", "name": "Girish Sundaram"}, {"authorId": "1772624", "name": "D. Berleant"}]}, {"paperId": "35620ce11ffb38ebdaf16810cf755f490689cbe2", "externalIds": {"DOI": "10.1080/08839514.2022.2145631", "CorpusId": 253700852}, "url": "https://www.semanticscholar.org/paper/35620ce11ffb38ebdaf16810cf755f490689cbe2", "title": "Artificial Intelligence and Human Resources Management: A Bibliometric Analysis", "abstract": "Artificial Intelligence (AI) is increasingly present in organizations. In the specific case of Human Resource Management (HRM), AI has become increasingly relevant in recent years. This article aims to perform a bibliometric analysis of the scientific literature that addresses in a connected way the application and impact of AI in the field of HRM. The scientific databases consulted were Web of Science and Scopus, yielding an initial number of 156 articles, of which 73 were selected for subsequent analysis. The information was processed using the Bibliometrix tool, which provided information on annual production, analysis of journals, authors, documents, keywords, etc. The results obtained show that AI applied to HRM is a developing field of study with constant growth and a positive future vision, although it should also be noted that it has a very specific character as a result of the fact that most of the research is focused on the application of AI in recruitment and selection actions, leaving aside other sub-areas with a great potential for application.", "venue": "Applied Artificial Intelligence", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-18", "journal": {"name": "Applied Artificial Intelligence"}, "authors": [{"authorId": "1405294056", "name": "P. Palos-S\u00e1nchez"}, {"authorId": "2121995364", "name": "P. Baena-Luna"}, {"authorId": "2191487154", "name": "A. Badicu"}, {"authorId": "1413743433", "name": "J. Infante-Moro"}]}, {"paperId": "52530930e60ac1f12461221e1e7cbab7fe537866", "externalIds": {"DOI": "10.37467/revvisual.v9.3748", "CorpusId": 253666968}, "url": "https://www.semanticscholar.org/paper/52530930e60ac1f12461221e1e7cbab7fe537866", "title": "Variables para la fase diagn\u00f3stica de un software piloto de planeaci\u00f3n estrat\u00e9gica", "abstract": "El presente art\u00edculo es resultado del Proyecto Modelo semi\u00f3tico de planeaci\u00f3n estrat\u00e9gica, financiado por la Universidad Jorge Tadeo Lozano. En \u00e9l, se busca establecer variables para la fase diagn\u00f3stica de un Software piloto de apoyo a la planeaci\u00f3n estrat\u00e9gica publicitaria. El punto de partida fue el an\u00e1lisis del trabajo con casos de los premios Effie College Colombia 2018 y 2019, en los que el grupo investigador obtuvo dos premios oro. A partir de ello, se establecen los criterios para el perfilamiento de la situaci\u00f3n del cliente (anunciante) y del contexto de marca desde cuatro categor\u00edas: mercados, comunicaci\u00f3n, personas y tendencias.", "venue": "VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-11-17", "journal": {"name": "VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual"}, "authors": [{"authorId": "2191356773", "name": "Vladimir S\u00e1nchez-Ria\u00f1o"}, {"authorId": "2191358818", "name": "Liliana C. Suarez Baez"}, {"authorId": "2099563395", "name": "O. Garcia-Bedoya"}, {"authorId": "2191357988", "name": "Jairo R. Sojo-Gomez"}]}, {"paperId": "6d6ec79cd196b74d857c6426c1df1e94ede4be13", "externalIds": {"DBLP": "conf/mindtrek/GhajargarBL22", "DOI": "10.1145/3569219.3569418", "CorpusId": 253421848}, "url": "https://www.semanticscholar.org/paper/6d6ec79cd196b74d857c6426c1df1e94ede4be13", "title": "A Redhead Walks into a Bar: Experiences of Writing Fiction with Artificial Intelligence", "abstract": "Human creativity has been often aided and supported by artificial tools, spanning traditional tools such as ideation cards, pens, and paper, to computed and software. Tools for creativity are increasingly using artificial intelligence to not only support the creative process, but also to act upon the creation with a higher level of agency. This paper focuses on writing fiction as a creative activity and explores human-AI co-writing through a research product, which employs a natural language processing model, the Generative Pre-trained Transformer 3 (GPT-3), to assist the co-authoring of narrative fiction. We report on two progressive \u2013 not comparative \u2013 autoethnographic studies to attain our own creative practices in light of our engagement with the research product: (1) a co-writing activity initiated by basic textual prompts using basic elements of narrative and (2) a co-writing activity initiated by more advanced textual prompts using elements of narrative, including dialects and metaphors undertaken by one of the authors of this paper who has doctoral training in literature. In both studies, we quickly came up against the limitations of the system; then, we repositioned our goals and practices to maximize our chances of success. As a result, we discovered not only limitations but also hidden capabilities, which not only altered our creative practices and outcomes, but which began to change the ways we were relating to the AI as collaborator.", "venue": "International Conference on Entertainment and Media in the Ubiquitous Era", "year": 2022, "referenceCount": 73, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2022-11-16", "journal": {"name": "25th International Academic Mindtrek conference"}, "authors": [{"authorId": "2536914", "name": "Maliheh Ghajargar"}, {"authorId": "1804390", "name": "Jeffrey Bardzell"}, {"authorId": "1991065549", "name": "Love Lagerkvist"}]}, {"paperId": "bbeec37a814305311aa6aef8eef1e912518805e9", "externalIds": {"ArXiv": "2211.07954", "DBLP": "journals/corr/abs-2211-07954", "DOI": "10.48550/arXiv.2211.07954", "CorpusId": 253523104}, "url": "https://www.semanticscholar.org/paper/bbeec37a814305311aa6aef8eef1e912518805e9", "title": "An Overview on Controllable Text Generation via Variational Auto-Encoders", "abstract": "Recent advances in neural-based generative modeling have reignited the hopes of having computer systems capable of conversing with humans and able to understand natural language. The employment of deep neural architectures has been largely explored in a multitude of context and tasks to ful\ufb01ll various user needs. On one hand, producing textual content that meets speci\ufb01c requirements is of priority for a model to seamlessly conduct conversa-tions with different groups of people. On the other hand, latent variable models (LVM) such as variational auto-encoders (VAEs) as one of the most popular genres of generative models are designed to characterize the distributional pattern of textual data. Thus they are inherently capable of learning the integral textual features that are worth exploring for controllable pursuits. This overview gives an introduction to existing generation schemes, problems associated with text variational auto-encoders, and a review of several applications about the controllable generation that are instantiations of these general formulations, 1 as well as related datasets, metrics and discussions for future re-searches. Hopefully, this overview will provide an overview of living questions, popular methodologies and raw thoughts for controllable language generation under the scope of variational auto-encoder.", "venue": "ArXiv", "year": 2022, "referenceCount": 97, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-15", "journal": {"volume": "abs/2211.07954", "name": "ArXiv"}, "authors": [{"authorId": "2136194164", "name": "Haoqin Tu"}, {"authorId": "50024168", "name": "Yitong Li"}]}, {"paperId": "326500d739029558edb6a607d07f45de9a8bb787", "externalIds": {"DOI": "10.1007/s44163-022-00038-0", "CorpusId": 253512920}, "url": "https://www.semanticscholar.org/paper/326500d739029558edb6a607d07f45de9a8bb787", "title": "Identity of AI", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 110, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-14", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "1696366", "name": "V. Devedzic"}]}, {"paperId": "ef6c0d2bf2d779f9c518ab118c655b198741b00b", "externalIds": {"DBLP": "journals/corr/abs-2211-07625", "ArXiv": "2211.07625", "DOI": "10.48550/arXiv.2211.07625", "CorpusId": 253510432}, "url": "https://www.semanticscholar.org/paper/ef6c0d2bf2d779f9c518ab118c655b198741b00b", "title": "What Images are More Memorable to Machines?", "abstract": "This paper studies the problem of measuring and predicting how memorable an image is to pattern recognition machines, as a path to explore machine intelligence. Firstly, we propose a self-supervised machine memory quanti\ufb01ca-tion pipeline, dubbed \u201cMachineMem measurer\u201d, to collect machine memorability scores of images. Similar to humans, machines also tend to memorize certain kinds of images, whereas the types of images that machines and humans memorialize are different. Through in-depth analysis and comprehensive visualizations, we gradually unveil that \u201dcomplex\u201d images are usually more memorable to machines. We further conduct extensive experiments across 11 different machines (from linear classi\ufb01ers to modern ViTs) and 9 pre-training methods to analyze and understand machine memory. This work proposes the concept of machine memorability and opens a new research direction at the in-terface between machine memory and visual data.", "venue": "ArXiv", "year": 2022, "referenceCount": 89, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-14", "journal": {"volume": "abs/2211.07625", "name": "ArXiv"}, "authors": [{"authorId": "2109488495", "name": "Junlin Han"}, {"authorId": "31833458", "name": "Huangying Zhan"}, {"authorId": "2152093629", "name": "Jie Hong"}, {"authorId": "49208246", "name": "Pengfei Fang"}, {"authorId": "2145827897", "name": "Hongdong Li"}, {"authorId": "47773335", "name": "L. Petersson"}, {"authorId": "2190750918", "name": "Ian Reid"}]}, {"paperId": "d0ec5a31b392f6f228bb8886d98b335044977b9f", "externalIds": {"ArXiv": "2211.06766", "DBLP": "journals/corr/abs-2211-06766", "DOI": "10.48550/arXiv.2211.06766", "CorpusId": 253511102}, "url": "https://www.semanticscholar.org/paper/d0ec5a31b392f6f228bb8886d98b335044977b9f", "title": "The Study of Complex Human Locomotion Behaviors: From Crawling to Walking", "abstract": "This paper uses a simple state machine to develop a control algorithm for controlling an infant humanoid in the context of a simple model system. The algorithm is inspired by a baby who starts learning to stand and walk at 7 to 12 months of age: he or she initially learns to crawl and then, once the lower limb muscles are strong enough, can learn to walk by coming to support his or her upper trunk. Ideally, this algorithm-supported locomotion can take the baby to any desired location: a pile of toys, a tasty snack, or the baby\u2019s parents or relatives. In this paper we analyze the crawling stage, the simple 2d bipedal model, and the initial walking form from 8 to 18 months of age, and quantitatively evaluate the ideal kinematics model and simulation results for these stages.", "venue": "ArXiv", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-12", "journal": {"volume": "abs/2211.06766", "name": "ArXiv"}, "authors": [{"authorId": "47411551", "name": "Shengjie Xu"}, {"authorId": "2423970", "name": "K. Mok"}]}, {"paperId": "1a788f333a3c30e27ee03aac24737db338cdcb8f", "externalIds": {"DOI": "10.54097/hset.v16i.2067", "CorpusId": 253657967}, "url": "https://www.semanticscholar.org/paper/1a788f333a3c30e27ee03aac24737db338cdcb8f", "title": "Research and Applications Analysis of Knowledge Base Question Answering", "abstract": "Knowledge Base Question Answering (KBQA) has become one of recent trends in Natural Language Processing (NLP). It helps solve question answering tasks in many fields, such as commerce, medical treatment, etc. This article represents research of KBQA from theory to practice. The concept of knowledge graph in a new way are defined, the steps for building a basic knowledge graph are listed. The category of knowledge base is generalized. This article analyzes the category of knowledge based on systems and introduces the definition and working principle of KBQA. This article also introduces two main approaches used in KBQA, Information Retrieval-based (IR-based) methods and Semantic Parsing-based (SP-based) methods, including summarizing pipeline frameworks of these two approaches and the comparison between them. Two successful applications of KBQA, Meituan and AliMe, including researching on the schema of knowledge graph and pipeline frameworks are discussed in this article. Moreover, this article analyzes the applicable scenes of the two applications and analyzes the main challenges of KBQA.", "venue": "Highlights in Science Engineering and Technology", "year": 2022, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-10", "journal": {"name": "Highlights in Science, Engineering and Technology"}, "authors": [{"authorId": "1471678992", "name": "Jingyi Huang"}]}, {"paperId": "f1afd2e2c04307d3d0faea4c24f2ae47735221cf", "externalIds": {"DOI": "10.1075/idj.22013.rod", "CorpusId": 253469846}, "url": "https://www.semanticscholar.org/paper/f1afd2e2c04307d3d0faea4c24f2ae47735221cf", "title": "Surprise machines", "abstract": "\n Surprise Machines is a project of experimental museology that\n sets out to visualize the entire image collection of the Harvard Art Museums,\n with a view to opening up unexpected vistas on more than 200,000 objects usually\n inaccessible to visitors. The project is part of the exhibition organized by\n metaLAB (at) Harvard entitled Curatorial A(i)gents and explores the limits of\n artificial intelligence to display a large set of images and create surprise\n among visitors. To achieve this feeling of surprise, a choreographic interface\n was designed to connect the audience\u2019s movement with several unique views of the\n collection.", "venue": "Information Design Journal", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-10", "journal": {"name": "Information Design Journal"}, "authors": [{"authorId": "3176132", "name": "D. Rodighiero"}, {"authorId": "2174202069", "name": "Lins Derry"}, {"authorId": "70003676", "name": "Douglas Duhaime"}, {"authorId": "2174202049", "name": "Jordan Kruguer"}, {"authorId": "2116237204", "name": "Maximilian Mueller"}, {"authorId": "2064535038", "name": "Christopher Pietsch"}, {"authorId": "66269452", "name": "J. Schnapp"}, {"authorId": "2190554638", "name": "Jeff Steward"}, {"authorId": "2190553522", "name": "metaLAB"}]}, {"paperId": "940284a49e54dca96cfed006f8ae252a11ff6157", "externalIds": {"DOI": "10.1007/s44163-022-00039-z", "CorpusId": 253450606}, "url": "https://www.semanticscholar.org/paper/940284a49e54dca96cfed006f8ae252a11ff6157", "title": "The threat, hype, and promise of artificial intelligence in education", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-11-10", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "147674071", "name": "Niklas Humble"}, {"authorId": "2547308", "name": "Peter Mozelius"}]}, {"paperId": "a7d0e2afdeb11172d444e12489266ebf495ed221", "externalIds": {"DBLP": "journals/corr/abs-2211-05044", "ArXiv": "2211.05044", "DOI": "10.48550/arXiv.2211.05044", "CorpusId": 253420419}, "url": "https://www.semanticscholar.org/paper/a7d0e2afdeb11172d444e12489266ebf495ed221", "title": "What is Wrong with Language Models that Can Not Tell a Story?", "abstract": "This paper argues that a deeper understanding of narrative and the successful generation of longer subjectively interesting texts is a vital bottleneck that hinders the progress in modern Natural Language Processing (NLP) and may even be in the whole \ufb01eld of Arti\ufb01cial Intelligence. We demonstrate that there are no ad-equate datasets, evaluation methods, and even operational concepts that could be used to start working on narrative processing.", "venue": "ArXiv", "year": 2022, "referenceCount": 38, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-09", "journal": {"volume": "abs/2211.05044", "name": "ArXiv"}, "authors": [{"authorId": "2130008929", "name": "Ivan P. Yamshchikov"}, {"authorId": "34501167", "name": "Alexey Tikhonov"}]}, {"paperId": "b3598a2f6c4e8a9e6d89de10b46bfad8e016ab2e", "externalIds": {"DBLP": "journals/corr/abs-2211-03796", "ArXiv": "2211.03796", "DOI": "10.48550/arXiv.2211.03796", "CorpusId": 253397751}, "url": "https://www.semanticscholar.org/paper/b3598a2f6c4e8a9e6d89de10b46bfad8e016ab2e", "title": "Astronomia ex machina: a history, primer, and outlook on neural networks in astronomy", "abstract": "In recent years, deep learning has infiltrated every field it has touched, reducing the need for specialist knowledge and automating the process of knowledge discovery from data. This review argues that astronomy is no different, and that we are currently in the midst of a deep learning revolution that is transforming the way we do astronomy. We trace the history of astronomical connectionism from the early days of multilayer perceptrons, through the second wave of convolutional and recurrent neural networks, to the current third wave of self-supervised and unsupervised deep learning. We then predict that we will soon enter a fourth wave of astronomical connectionism, in which finetuned versions of an all-encompassing \u2019foundation\u2019 model will replace expertly crafted deep learning models. We argue that such a model can only be brought about through a symbiotic relationship between astronomy and connectionism, whereby astronomy provides high quality multimodal data to train the foundation model, and in turn the foundation model is used to advance astronomical research.", "venue": "ArXiv", "year": 2022, "referenceCount": 266, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-07", "journal": {"volume": "abs/2211.03796", "name": "ArXiv"}, "authors": [{"authorId": "145618949", "name": "Michael J. Smith"}, {"authorId": "2308961", "name": "J. Geach"}]}, {"paperId": "ba2eef273f7bdb0993c12ff382f9e9530cde606e", "externalIds": {"DBLP": "journals/corr/abs-2211-01036", "ArXiv": "2211.01036", "DOI": "10.1109/OJCOMS.2022.3215676", "CorpusId": 253255371}, "url": "https://www.semanticscholar.org/paper/ba2eef273f7bdb0993c12ff382f9e9530cde606e", "title": "Explainable AI Over the Internet of Things (IoT): Overview, State-of-the-Art and Future Directions", "abstract": "Explainable Artificial Intelligence (XAI) is transforming the field of Artificial Intelligence (AI) by enhancing the trust of end-users in machines. As the number of connected devices keeps on growing, the Internet of Things (IoT) market needs to be trustworthy for the end-users. However, existing literature still lacks a systematic and comprehensive survey work on the use of XAI for IoT. To bridge this lacking, in this paper, we address the XAI frameworks with a focus on their characteristics and support for IoT. We illustrate the widely-used XAI services for IoT applications, such as security enhancement, Internet of Medical Things (IoMT), Industrial IoT (IIoT), and Internet of City Things (IoCT). We also suggest the implementation choice of XAI models over IoT systems in these applications with appropriate examples and summarize the key inferences for future works. Moreover, we present the cutting-edge development in edge XAI structures and the support of sixth-generation (6G) communication services for IoT applications, along with key inferences. In a nutshell, this paper constitutes the first holistic compilation on the development of XAI-based frameworks tailored for the demands of future IoT use cases.", "venue": "IEEE Open Journal of the Communications Society", "year": 2022, "referenceCount": 208, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-02", "journal": {"volume": "3", "pages": "2106-2136", "name": "IEEE Open Journal of the Communications Society"}, "authors": [{"authorId": "2067322880", "name": "S. K. Jagatheesaperumal"}, {"authorId": "145436642", "name": "Quoc-Viet Pham"}, {"authorId": "143740202", "name": "Rukhsana Ruby"}, {"authorId": "2187420041", "name": "Zhaohui Yang"}, {"authorId": "2189500017", "name": "Chunmei Xu"}, {"authorId": "2156123228", "name": "Zhaoyang Zhang"}]}, {"paperId": "3ea8947306f7990277fd66e6a9eca3ba2efe60ee", "externalIds": {"PubMedCentral": "9668059", "DOI": "10.3389/frai.2022.1015418", "CorpusId": 253248424, "PubMed": "36406470"}, "url": "https://www.semanticscholar.org/paper/3ea8947306f7990277fd66e6a9eca3ba2efe60ee", "title": "Knowledge and attitudes of medical students in Lebanon toward artificial intelligence: A national survey study", "abstract": "Purpose This study assesses the knowledge and attitudes of medical students in Lebanon toward Artificial Intelligence (AI) in medical education. It also explores the students' perspectives regarding the role of AI in medical education as a subject in the curriculum and a teaching tool. Methods This is a cross-sectional study using an online survey consisting of close-ended questions. The survey targets medical students at all medical levels across the 7 medical schools in Lebanon. Results A total of 206 medical students responded. When assessing AI knowledge sources (81.1%) got their information from the media as compared to (9.7%) from medical school curriculum. However, Students who learned the basics of AI as part of the medical school curriculum were more knowledge about AI than their peers who did not. Students in their clinical years appear to be more knowledgeable about AI in medicine. The advancements in AI affected the choice of specialty of around a quarter of the students (26.8%). Finally, only a quarter of students (26.5%) want to be assessed by AI, even though the majority (57.7%) reported that assessment by AI is more objective. Conclusions Education about AI should be incorporated in the medical school curriculum to improve the knowledge and attitudes of medical students. Improving AI knowledge in medical students will in turn increase acceptance of AI as a tool in medical education, thus unlocking its potential in revolutionizing medical education.", "venue": "Frontiers in Artificial Intelligence", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-02", "journal": {"volume": "5", "name": "Frontiers in Artificial Intelligence"}, "authors": [{"authorId": "2161995683", "name": "George Doumat"}, {"authorId": "2114932610", "name": "Darine Daher"}, {"authorId": "1844338348", "name": "Nadim N Ghanem"}, {"authorId": "5735112", "name": "Beatrice Khater"}]}, {"paperId": "b5fe4cd533bdbbe877341040c6323bc4beea3610", "externalIds": {"DBLP": "journals/cim/LiWDW22", "DOI": "10.1109/MCI.2022.3199622", "CorpusId": 253423814}, "url": "https://www.semanticscholar.org/paper/b5fe4cd533bdbbe877341040c6323bc4beea3610", "title": "Meta-Learning for Fast and Privacy-Preserving Source Knowledge Transfer of EEG-Based BCIs", "abstract": "Electroencephalogram (EEG) based brain-computer interfaces (BCIs) are used in many applications, due to their low-risk, low-cost, and convenience. Because of EEG\u2019s high variations across subjects and sessions, a long calibration session is usually needed to adjust the system before each use, which is time-consuming and user-unfriendly. Though various machine learning approaches have been proposed to cope with this problem, none of them considered individual differences, data scarcity and data privacy simultaneously. In this paper, a Multi-Domain Model-Agnostic Meta-Learning (MDMAML) approach is proposed to address challenging cross-subject, few-shot and source-free (privacy protection) classification tasks in EEG-based BCIs. Experiments on four datasets from two different BCI paradigms demonstrated that MDMAML outperformed several classical and state-of-the-art approaches in both online and offline applications.", "venue": "IEEE Computational Intelligence Magazine", "year": 2022, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-01", "journal": {"volume": "17", "pages": "16-26", "name": "IEEE Computational Intelligence Magazine"}, "authors": [{"authorId": "2190390548", "name": "Siyang Li"}, {"authorId": "2174480297", "name": "Huanyu Wu"}, {"authorId": "2408345", "name": "L. Ding"}, {"authorId": "144855927", "name": "Dongrui Wu"}]}, {"paperId": "7f28580f76bddbc65dc8871fd84d16bd7a164e63", "externalIds": {"PubMedCentral": "9658699", "DBLP": "journals/sensors/FreitasPFFRL22", "DOI": "10.3390/s22218531", "CorpusId": 253413747, "PubMed": "36366227"}, "url": "https://www.semanticscholar.org/paper/7f28580f76bddbc65dc8871fd84d16bd7a164e63", "title": "Artificial Intelligence of Things Applied to Assistive Technology: A Systematic Literature Review", "abstract": "According to the World Health Organization, about 15% of the world\u2019s population has some form of disability. Assistive Technology, in this context, contributes directly to the overcoming of difficulties encountered by people with disabilities in their daily lives, allowing them to receive education and become part of the labor market and society in a worthy manner. Assistive Technology has made great advances in its integration with Artificial Intelligence of Things (AIoT) devices. AIoT processes and analyzes the large amount of data generated by Internet of Things (IoT) devices and applies Artificial Intelligence models, specifically, machine learning, to discover patterns for generating insights and assisting in decision making. Based on a systematic literature review, this article aims to identify the machine-learning models used across different research on Artificial Intelligence of Things applied to Assistive Technology. The survey of the topics approached in this article also highlights the context of such research, their application, the IoT devices used, and gaps and opportunities for further development. The survey results show that 50% of the analyzed research address visual impairment, and, for this reason, most of the topics cover issues related to computational vision. Portable devices, wearables, and smartphones constitute the majority of IoT devices. Deep neural networks represent 81% of the machine-learning models applied in the reviewed research.", "venue": "Italian National Conference on Sensors", "year": 2022, "referenceCount": 106, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-11-01", "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "2191399671", "name": "Maur\u00edcio Pasetto de Freitas"}, {"authorId": "2190244052", "name": "Vin\u00edcius Aquino Piai"}, {"authorId": "147900609", "name": "Ricardo Heffel Farias"}, {"authorId": "50982086", "name": "Anita M. R. Fernandes"}, {"authorId": "1707339", "name": "A. Rossetto"}, {"authorId": "1693868", "name": "V. Leithardt"}]}, {"paperId": "eca279695fd5bc6d05ed35a4b6fc2c5ec89975d8", "externalIds": {"DOI": "10.22201/fesa.26832917e.2022.4.1.243", "CorpusId": 253334513}, "url": "https://www.semanticscholar.org/paper/eca279695fd5bc6d05ed35a4b6fc2c5ec89975d8", "title": "Inteligencia artificial en educaci\u00f3n: De usuarios pasivos a creadores cr\u00edticos", "abstract": "La inteligencia artificial (IA) se ha convertido en un lugar com\u00fan en nuestras vidas. Nos sorprende poco. Se cuenta ya con dispositivos llamados \u201cinteligentes\u201d como el tel\u00e9fono celular, Siri o Alexa. Se habla e inclusive se bromea con ellos, como si fueran personas. En este ensayo proponemos un camino para comprender, distinguir y hacer inteligencia artificial de manera sencilla, con el prop\u00f3sito de explicar en qu\u00e9 consiste esta tecnolog\u00eda en t\u00e9rminos cercanos y coloquiales. Se trata de formar consumidores de IA informados y cr\u00edticos, con literacidad en este \u00e1mbito. Para ello, se revisan sitios web que permiten hacer uso de la inteligencia artificial para crear dise\u00f1os originales y personalizados, y se explica el aprendizaje de m\u00e1quina con una herramienta inicialmente orientada a ni\u00f1os, mediante un ejemplo pr\u00e1ctico, lo cual facilita la incursi\u00f3n en este \u00e1mbito. Asimismo, se ofrece un recorrido breve acerca de c\u00f3mo se usa actualmente la inteligencia artificial en la educaci\u00f3n, sus ventajas y riesgos eventuales. Por \u00faltimo, se concluye que este \u00e1mbito tiene un r\u00e1pido crecimiento y que las instituciones educativas, en general, deben alistarse para adoptarlo de manera cr\u00edtica. \n\u00a0", "venue": "FIGURAS REVISTA ACAD\u00c9MICA DE INVESTIGACI\u00d3N", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-11-01", "journal": {"name": "FIGURAS REVISTA ACAD\u00c9MICA DE INVESTIGACI\u00d3N"}, "authors": [{"authorId": "2096228319", "name": "MariCarmen Gonz\u00e1lez-Videgaray"}, {"authorId": "2098481870", "name": "R. Romero-Ruiz"}]}, {"paperId": "39de1a4267a297116d5c317f75c8ebb0eab3a186", "externalIds": {"PubMedCentral": "9628381", "DOI": "10.1007/s44163-022-00037-1", "CorpusId": 253240565}, "url": "https://www.semanticscholar.org/paper/39de1a4267a297116d5c317f75c8ebb0eab3a186", "title": "ERP Staff versus AI recruitment with employment real-time big data", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-31", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "2922792", "name": "K. Strang"}, {"authorId": "2118548137", "name": "Zhaohao Sun"}]}, {"paperId": "bdfcc87264808446152972591e66777c0c69f837", "externalIds": {"DOI": "10.1111/ejed.12533", "CorpusId": 253329319}, "url": "https://www.semanticscholar.org/paper/bdfcc87264808446152972591e66777c0c69f837", "title": "State of the art and practice in\n AI\n in education", "abstract": null, "venue": "European Journal of Education", "year": 2022, "referenceCount": 60, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-30", "journal": {"name": "European Journal of Education"}, "authors": [{"authorId": "49042683", "name": "W. Holmes"}, {"authorId": "3251136", "name": "I. Tuomi"}]}, {"paperId": "1cd43fed1ac5b95f7c9296420fb23e7fea66842e", "externalIds": {"DOI": "10.32466/eufv-rel.2022.9.754.170-186", "CorpusId": 253213406}, "url": "https://www.semanticscholar.org/paper/1cd43fed1ac5b95f7c9296420fb23e7fea66842e", "title": "Cuidado de personas dependientes. \u00bfPuede realizarlo un robot?", "abstract": "El cuidado de personas dependientes ha sido algo propio y radical del ser humano desde sus or\u00edgenes y raramente se plantea un escenario donde la persona que ejerce los cuidados fuere sustituida por un ente cibern\u00e9tico dotado de funcionalidades e inteligencia artificial suficiente como para llevar a cabo dicha labor. Este punto de partida nos ofrece la oportunidad para profundizar en la esencia del sentido del cuidado y la relaci\u00f3n que subyace entre la persona que cuida y la persona que es cuidada.", "venue": "Relectiones. Revista interdisciplinar de filosof\u00eda y humanidades.", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-10-28", "journal": {"name": "Relectiones. Revista interdisciplinar de filosof\u00eda y humanidades."}, "authors": [{"authorId": "2189259518", "name": "Jose Miguel Mohedano Mart\u00ednez"}, {"authorId": "2189261240", "name": "Luis Moreno Almonacid"}, {"authorId": "2189259752", "name": "Mary Luz Mouronte"}, {"authorId": "2189261238", "name": "Susana Bautista Blasco"}]}, {"paperId": "c0acc6ce5a3f6c416c9f6025f91b8222f709db9c", "externalIds": {"DOI": "10.35712/aig.v3.i4.96", "CorpusId": 253212257}, "url": "https://www.semanticscholar.org/paper/c0acc6ce5a3f6c416c9f6025f91b8222f709db9c", "title": "Role of artificial intelligence in the diagnosis and treatment of hepatocellular carcinoma", "abstract": "Artificial intelligence (AI) evolved many years ago, but it gained much advancement in recent years for its use in the medical domain. AI with its different subsidiaries, i.e. deep learning and machine learning, examine a large amount of data and performs an essential part in decision-making in addition to conquering the limitations related to human evaluation. Deep learning tries to imitate the functioning of the human brain. It utilizes much more data and intricate algorithms. Machine learning is AI based on automated learning. It utilizes earlier given data and uses algorithms to arrange and identify models. Globally, hepatocellular carcinoma is a major cause of illness and fatality. Although with substantial progress in the whole treatment strategy for hepatocellular carcinoma, managing it is still a major issue. AI in the area of gastroenterology, especially in hepatology, is particularly useful for various investigations of hepatocellular carcinoma because it is a commonly found tumor, and has specific radiological features that enable diagnostic procedures without the requirement of the histological study. However, interpreting and analyzing the resulting images is not always easy due to change of images throughout the disease process. Further, the prognostic process and response to the treatment process could be influenced by numerous components. Currently, AI is utilized in order to diagnose, curative and prediction goals. Future investigations are essential to prevent likely bias, which might subsequently influence the analysis of images and therefore restrict the consent and utilization of such models in medical practices. Moreover, experts are required to realize the real utility of such approaches, along with their associated potencies and constraints.", "venue": "Artificial Intelligence in Gastroenterology", "year": 2022, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-28", "journal": {"name": "Artificial Intelligence in Gastroenterology"}, "authors": [{"authorId": "2189259501", "name": "Rajesh Kumar Mokhria"}, {"authorId": "145663820", "name": "Jasbir Singh"}]}, {"paperId": "f67e3225d115bcf02dfb0e26c64ea3eb8285de7b", "externalIds": {"DBLP": "journals/corr/abs-2210-15767", "ArXiv": "2210.15767", "DOI": "10.48550/arXiv.2210.15767", "CorpusId": 253224068}, "url": "https://www.semanticscholar.org/paper/f67e3225d115bcf02dfb0e26c64ea3eb8285de7b", "title": "Gathering Strength, Gathering Storms: The One Hundred Year Study on Artificial Intelligence (AI100) 2021 Study Panel Report", "abstract": "In the five years since we released the first AI100 report, much has been written about the state of artificial intelligence and its influences on society. Nonetheless, AI100 remains unique in its combination of two key features. First, it is written by a Study Panel of core multi-disciplinary researchers in the field\u2014experts who create artificial intelligence algorithms or study their influence on society as their main professional activity, and who have been doing so for many years. The authors are firmly rooted within the field of AI and provide an \u201cinsider\u2019s\u201d perspective. Second, it is a longitudinal study, with reports by such Study Panels planned once every five years, for at least one hundred years. SEPTEMBER 2021", "venue": "ArXiv", "year": 2022, "referenceCount": 54, "citationCount": 21, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-27", "journal": {"volume": "abs/2210.15767", "name": "ArXiv"}, "authors": [{"authorId": "144885169", "name": "M. Littman"}, {"authorId": "1562750490", "name": "Ifeoma Ajunwa"}, {"authorId": "49700022", "name": "G. Berger"}, {"authorId": "145646162", "name": "Craig Boutilier"}, {"authorId": "7259268", "name": "Morgan E. Currie"}, {"authorId": "1388372395", "name": "Finale Doshi-Velez"}, {"authorId": "40051700", "name": "Gillian K. Hadfield"}, {"authorId": "49148918", "name": "Michael C. Horowitz"}, {"authorId": "2065138119", "name": "Charles Isbell"}, {"authorId": "48078689", "name": "H. Kitano"}, {"authorId": "144463523", "name": "K. Levy"}, {"authorId": "66766071", "name": "Terah Lyons"}, {"authorId": "144380037", "name": "Melanie Mitchell"}, {"authorId": "143873972", "name": "J. Shah"}, {"authorId": "2404363", "name": "S. Sloman"}, {"authorId": "1817942", "name": "Shannon Vallor"}, {"authorId": "1733716", "name": "T. Walsh"}]}, {"paperId": "fe123b27a3ecc63c7087cb0d3a04e43790661c2d", "externalIds": {"ArXiv": "2210.15629", "DBLP": "journals/corr/abs-2210-15629", "DOI": "10.48550/arXiv.2210.15629", "CorpusId": 253157363}, "url": "https://www.semanticscholar.org/paper/fe123b27a3ecc63c7087cb0d3a04e43790661c2d", "title": "LAD: Language Augmented Diffusion for Reinforcement Learning", "abstract": "Learning skills from language provides a powerful avenue for generalization in reinforcement learning, although it remains a challenging task as it requires agents to capture the complex interdependencies between language, actions, and states. In this paper, we propose leveraging L anguage A ugmented D iffusion models as a planner conditioned on language (LAD). We demonstrate the comparable performance of LAD with the state-of-the-art on the CALVIN language robotics benchmark with a much simpler architecture that contains no inductive biases special-ized to robotics, achieving an average success rate (SR) of 72% compared to the best performance of 76%. We also conduct an analysis on the properties of language conditioned diffusion in reinforcement learning.", "venue": "ArXiv", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-27", "journal": {"volume": "abs/2210.15629", "name": "ArXiv"}, "authors": [{"authorId": "6549913", "name": "Edwin Zhang"}, {"authorId": "47006228", "name": "Yujie Lu"}, {"authorId": "2187907974", "name": "W. Wang"}, {"authorId": "2111672235", "name": "Amy Zhang"}]}, {"paperId": "9de73186a4a04179c6012bcbe555a4a795f93396", "externalIds": {"PubMedCentral": "9607774", "DOI": "10.1007/s10614-022-10333-8", "CorpusId": 253165300, "PubMed": "36321065"}, "url": "https://www.semanticscholar.org/paper/9de73186a4a04179c6012bcbe555a4a795f93396", "title": "Application of Supervised Machine Learning Techniques to Forecast the COVID-19 U.S. Recession and Stock Market Crash", "abstract": null, "venue": "Computational economics", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-26", "journal": {"pages": "1 - 25", "name": "Computational Economics"}, "authors": [{"authorId": "1977212", "name": "Rama K. Malladi"}]}, {"paperId": "cf0ae306a5b485fbf391b60d026f75e008115500", "externalIds": {"ArXiv": "2210.16987", "DBLP": "journals/corr/abs-2210-16987", "DOI": "10.48550/arXiv.2210.16987", "CorpusId": 253237809}, "url": "https://www.semanticscholar.org/paper/cf0ae306a5b485fbf391b60d026f75e008115500", "title": "Symbolic Distillation for Learned TCP Congestion Control", "abstract": "Recent advances in TCP congestion control (CC) have achieved tremendous success with deep reinforcement learning (RL) approaches, which use feedforward neural networks (NN) to learn complex environment conditions and make better decisions. However, such \u201cblack-box\u201d policies lack interpretability and reliability, and often, they need to operate outside the traditional TCP datapath due to the use of complex NNs. This paper proposes a novel two-stage solution to achieve the best of both worlds: \ufb01rst to train a deep RL agent, then distill its (over-)parameterized NN policy into white-box, light-weight rules in the form of symbolic expressions that are much easier to understand and to implement in constrained environments. At the core of our proposal is a novel symbolic branching algorithm that enables the rule to be aware of the context in terms of various network conditions, eventually converting the NN policy into a symbolic tree. The distilled symbolic rules preserve and often improve performance over state-of-the-art NN policies while being faster and simpler than a standard neural network. We validate the performance of our distilled symbolic rules on both simulation and emulation environments. Our code is available at https://github.com/VITA-Group/SymbolicPCC .", "venue": "ArXiv", "year": 2022, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-24", "journal": {"volume": "abs/2210.16987", "name": "ArXiv"}, "authors": [{"authorId": "2005814581", "name": "S. Sharan"}, {"authorId": "2152934619", "name": "Wenqing Zheng"}, {"authorId": "152764944", "name": "Kuo-Feng Hsu"}, {"authorId": "40862349", "name": "Jiarong Xing"}, {"authorId": "30894196", "name": "Ang Chen"}, {"authorId": "2969311", "name": "Zhangyang Wang"}]}, {"paperId": "764a616937a5923aaf22288b35f6b991ae41521d", "externalIds": {"ArXiv": "2210.13304", "DBLP": "journals/corr/abs-2210-13304", "DOI": "10.48550/arXiv.2210.13304", "CorpusId": 253098627}, "url": "https://www.semanticscholar.org/paper/764a616937a5923aaf22288b35f6b991ae41521d", "title": "ELMER: A Non-Autoregressive Pre-trained Language Model for Efficient and Effective Text Generation", "abstract": "We study the text generation task under the approach of pre-trained language models (PLMs). Typically, an auto-regressive (AR) method is adopted for generating texts in a token-by-token manner. Despite many advantages of AR generation, it usually suffers from inefficient inference. Therefore, nonautoregressive (NAR) models are proposed to generate all target tokens simultaneously. However, NAR models usually generate texts of lower quality due to the absence of token dependency in the output text. In this paper, we propose ELMER: an Efficient and effective PLM for NAR tExt geneRation to explicitly model the token dependency during NAR generation. By leveraging the early exit technique, ELMER enables the token generations at different layers, according to their prediction confidence (a more confident token will exit at a lower layer). Besides, we propose a novel pre-training objective, Layer Permutation Language Modeling, to pre-train ELMER by permuting the exit layer for each token in sequences. Experiments on three text generation tasks show that ELMER significantly outperforms NAR models and further narrows the performance gap with AR PLMs (e.g., ELMER (29.92) vs BART (30.61) ROUGE-L in XSUM) while achieving over 10 times inference speedup.", "venue": "ArXiv", "year": 2022, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-24", "journal": {"volume": "abs/2210.13304", "name": "ArXiv"}, "authors": [{"authorId": "2018027", "name": "Junyi Li"}, {"authorId": "1997234792", "name": "Tianyi Tang"}, {"authorId": "2542603", "name": "Wayne Xin Zhao"}, {"authorId": "50204644", "name": "J. Nie"}, {"authorId": "153693432", "name": "Ji-rong Wen"}]}, {"paperId": "b193281227cb093dc138e701d825a8a13d443a67", "externalIds": {"ArXiv": "2210.11832", "DBLP": "journals/corr/abs-2210-11832", "DOI": "10.48550/arXiv.2210.11832", "CorpusId": 253080782}, "url": "https://www.semanticscholar.org/paper/b193281227cb093dc138e701d825a8a13d443a67", "title": "AI-HRI Brings New Dimensions to Human-Aware Design for Human-Aware AI", "abstract": "Since the \ufb01rst AI-HRI held at the 2014 AAAI Fall Sym- posium Series, a lot of the presented research and discussions have emphasized how arti\ufb01cial intelligence (AI) de- velopments can bene\ufb01t human-robot interaction (HRI). This portrays HRI as an application, a source of domain-speci\ufb01c problems to solve, to the AI community. Likewise, this portrays AI as a tool, a source of solutions available for relevant problems, to the HRI community. However, members of the AI-HRI research community will point out that the relation- ship has a deeper synergy than matchmaking problems and solutions\u2014there are insights from each \ufb01eld that impact how the other one thinks about the world and performs scienti\ufb01c research. There is no greater opportunity for sharing perspec- tives at the moment than human-aware AI, which studies how to account for the fact that people are more than a source of data or part of an algorithm. We will explore how AI-HRI can change the way researchers think about human-aware AI, from observation through validation, to make even the algorithmic design process human-aware.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-21", "journal": {"volume": "abs/2210.11832", "name": "ArXiv"}, "authors": [{"authorId": "50632846", "name": "R. Freedman"}]}, {"paperId": "319a56db82294e822d3b5f146751557da9260363", "externalIds": {"DOI": "10.1163/19552343-14234031", "CorpusId": 253154269}, "url": "https://www.semanticscholar.org/paper/319a56db82294e822d3b5f146751557da9260363", "title": "Comparer la logique et le droit? Quelques remarques th\u00e9oriques sur l\u2019usage du num\u00e9rique en droit (Tome 143, 7e S\u00e9rie, n\u00b0 3-4, (2022))", "abstract": "\n La num\u00e9risation actuelle du droit permet de revenir sur les liens historiques entre le droit et la logique moderne. En se fondant sur la diff\u00e9rence \u00e9tablie par J. Van Heijenoort entre logique \u00abcomme calcul\u00bb et logique \u00abcomme langage\u00bb, l\u2019article \u00e9tablit des analogies entre diff\u00e9rentes interpr\u00e9tations de la logique et diff\u00e9rents types de syst\u00e8mes ou d\u2019instances juridiques : \u00abCommon law\u00bb, syst\u00e8mes \u00abcivils\u00bb, \u00abcour de cassation\u00bb, cette derni\u00e8re notion caract\u00e9risant le formalisme hilbertien. Ce formalisme a tent\u00e9 de r\u00e9duire la logique \u00abcomme langage\u00bb \u00e0 la logique \u00abcomme calcul\u00bb mais la d\u00e9couverte des limitations internes des formalismes y a mis un terme : d\u2019o\u00f9 le parall\u00e8le entre l\u2019\u00e9chec du programme hilbertien et les difficult\u00e9s rencontr\u00e9es dans la num\u00e9risation actuelle du droit. Le droit n\u2019est pas r\u00e9ductible \u00e0 un calcul formel sur des marques \u00e9crites : il reste une discipline dans laquelle la parole et le dialogue sont indispensables pour r\u00e9aliser les buts qu\u2019il s\u2019assigne.", "venue": "Revue de Synth\u00e8se", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-10-20", "journal": {"name": "Revue de Synth\u00e8se"}, "authors": [{"authorId": "3351883", "name": "J. Lass\u00e8gue"}]}, {"paperId": "e86976fbe9064d02ae5d011f440e51d8abea4ce3", "externalIds": {"DBLP": "conf/kse/TranLH22", "DOI": "10.1109/KSE56063.2022.9953771", "CorpusId": 253785430}, "url": "https://www.semanticscholar.org/paper/e86976fbe9064d02ae5d011f440e51d8abea4ce3", "title": "Towards a Human-like Chatbot using Deep Adversarial Learning", "abstract": "Conversational agents are getting more popular and applied in a wide range of practical application areas. The main task of these agents is not only to generate context-appropriate responses to a given query but also to make the conversation human-like. Thanks to the ability of deep learning based models in natural language modeling, recent studies have made progress in designing conversational agents that can provide more semantically accurate responses. However, the naturalness in such conversation setting has not been given adequate attention in these studies. This paper aims to incorporate both important criteria of accuracy and naturalness of conversation in developing a new model for conversational agents. To this end, inspired by the idea of Turing test and the idea of adversarial learning strategy, we propose to design a model based on generative deep neural networks that interestingly allow to generate accurate responses optimized by the mechanics of imitating human-generated conversations. Experimental results demonstrate that the proposed models produce more natural and accurate responses, yielding significant gains in BLEU scores.", "venue": "International Conference on Knowledge and Systems Engineering", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-10-19", "journal": {"pages": "1-5", "name": "2022 14th International Conference on Knowledge and Systems Engineering (KSE)"}, "authors": [{"authorId": "2128128313", "name": "Quoc-Dai Luong Tran"}, {"authorId": "1788292", "name": "Anh-Cuong Le"}, {"authorId": "144957865", "name": "V. Huynh"}]}, {"paperId": "5c02d55fe14e2baf4b6b59a476ee6a20698397ef", "externalIds": {"ArXiv": "2210.10684", "DBLP": "journals/corr/abs-2210-10684", "DOI": "10.48550/arXiv.2210.10684", "CorpusId": 252992616}, "url": "https://www.semanticscholar.org/paper/5c02d55fe14e2baf4b6b59a476ee6a20698397ef", "title": "Language Models Understand Us, Poorly", "abstract": "Some claim language models understand us. Others won\u2019t hear it. To clarify, I investigate three views of human language understanding : as-mapping , as-reliability and as-representation (\u00a72). I argue that while behavioral reliability is necessary for understanding, internal representations are suf\ufb01cient; they climb the right hill (\u00a73). I review state-of-the-art language and multi-modal models: they are pragmatically challenged by under-speci\ufb01cation of form (\u00a74). I question the Scaling Paradigm : limits on resources may pro-hibit scaled-up models from approaching understanding (\u00a75). Last, I describe how as-representation advances a science of understanding. We need work which probes model internals, adds more of human language, and measures what models can learn (\u00a76).", "venue": "ArXiv", "year": 2022, "referenceCount": 80, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-10-19", "journal": {"volume": "abs/2210.10684", "name": "ArXiv"}, "authors": [{"authorId": "2108562363", "name": "Jared Moore"}]}, {"paperId": "f4caeee685c40289c3fa92c609abbf0e387977b8", "externalIds": {"DOI": "10.1007/s13347-022-00591-7", "CorpusId": 252973149}, "url": "https://www.semanticscholar.org/paper/f4caeee685c40289c3fa92c609abbf0e387977b8", "title": "To Each Technology Its Own Ethics: The Problem of Ethical Proliferation", "abstract": null, "venue": "Philosophy & Technology", "year": 2022, "referenceCount": 95, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-18", "journal": {"volume": "35", "name": "Philosophy & Technology"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}, {"authorId": "144338643", "name": "J. Danaher"}]}, {"paperId": "54b2b6fd3c297d39881a89d497af6fe5c46fa25c", "externalIds": {"PubMedCentral": "9588382", "DOI": "10.1155/2022/4509394", "CorpusId": 252951830, "PubMed": "36285284"}, "url": "https://www.semanticscholar.org/paper/54b2b6fd3c297d39881a89d497af6fe5c46fa25c", "title": "Deep Transfer Learning for COVID-19 Detection and Lesion Recognition Using Chest CT Images", "abstract": "Starting from December 2019, the global pandemic of coronavirus disease 2019 (COVID-19) is continuously expanding and has caused several millions of deaths worldwide. Fast and accurate diagnostic methods for COVID-19 detection play a vital role in containing the plague. Chest computed tomography (CT) is one of the most commonly used diagnosis methods. However, a complete CT-scan has hundreds of slices, and it is time-consuming for radiologists to check each slice to diagnose COVID-19. This study introduces a novel method for fast and automated COVID-19 diagnosis using the chest CT scans. The proposed models are based on the state-of-the-art deep convolutional neural network (CNN) architecture, and a 2D global max pooling (globalMaxPool2D) layer is used to improve the performance. We compare the proposed models to the existing state-of-the-art deep learning models such as CNN based models and vision transformer (ViT) models. Based off of metric such as area under curve (AUC), sensitivity, specificity, accuracy, and false discovery rate (FDR), experimental results show that the proposed models outperform the previous methods, and the best model achieves an area under curve of 0.9744 and accuracy 94.12% on our test datasets. It is also shown that the accuracy is improved by around 1% by using the 2D global max pooling layer. Moreover, a heatmap method to highlight the lesion area on COVID-19 chest CT images is introduced in the paper. This heatmap method is helpful for a radiologist to identify the abnormal pattern of COVID-19 on chest CT images. In addition, we also developed a freely accessible online simulation software for automated COVID-19 detection using CT images. The proposed deep learning models and software tool can be used by radiologist to diagnose COVID-19 more accurately and efficiently.", "venue": "Computational and mathematical methods in medicine", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-15", "journal": {"volume": "2022", "name": "Computational and Mathematical Methods in Medicine"}, "authors": [{"authorId": "2107951143", "name": "Sai Zhang"}, {"authorId": "2187974237", "name": "Guo-Chang Yuan"}]}, {"paperId": "997890a72011affaff95ff8e6a22ad0c370cf366", "externalIds": {"ArXiv": "2210.08340", "DBLP": "journals/corr/abs-2210-08340", "DOI": "10.48550/arXiv.2210.08340", "CorpusId": 252917719}, "url": "https://www.semanticscholar.org/paper/997890a72011affaff95ff8e6a22ad0c370cf366", "title": "Toward Next-Generation Artificial Intelligence: Catalyzing the NeuroAI Revolution", "abstract": ": Neuroscience has long been an important driver of progress in artificial intelligence (AI). We propose that to accelerate progress in AI, we must invest in fundamental research in NeuroAI. Over the coming decades, Artificial Intelligence (AI) will transform society and the world economy in ways that are as profound as the computer revolution of the last half century, and likely at an even faster pace. This AI revolution presents tremendous opportunities to unleash human creativity in the modern economy. New developments in AI systems have the potential to enable workers to attain greater productivity and relieve them from performing the most dangerous and menial jobs. But, to reach this potential, we still require advances that will make AI more human-like in its capabilities. Historically, neuroscience has been a key driver and source of inspiration for improvements in AI, particularly those that made AI more proficient in areas that humans and other animals excel at, such as vision, reward-based learning, interacting with the physical world, and language (Hassabis et al. 2017). It can still play this role. To accelerate progress in AI and realize its vast potential, we must invest in fundamental research in \u201cNeuroAI\u201d. The by to brains Pitts an \u201cartificial brain\u201d John von upon the very limited knowledge of the brain in the other animals. Because each animal has its own unique set of abilities, each animal defines its own embodied Turing test: An artificial beaver might be tested on its ability to build a dam, and an artificial squirrel on its ability to jump through trees. Nonetheless, many core sensorimotor capabilities are shared by almost all animals, and the ability of animals to rapidly evolve the sensorimotor skills needed to adapt to new environments suggests that these core skills provide a solid foundation. Below we highlight a few of these shared characteristics.", "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-15", "journal": {"volume": "abs/2210.08340", "name": "ArXiv"}, "authors": [{"authorId": "3199565", "name": "A. Zador"}, {"authorId": "38498866", "name": "Blake A. Richards"}, {"authorId": "1422033616", "name": "Bence Olveczky"}, {"authorId": "2153071", "name": "Sean Escola"}, {"authorId": "1865800402", "name": "Y. Bengio"}, {"authorId": "1701564", "name": "K. Boahen"}, {"authorId": "46378362", "name": "M. Botvinick"}, {"authorId": "32064081", "name": "D. Chklovskii"}, {"authorId": "3786556", "name": "A. Churchland"}, {"authorId": "2388737", "name": "C. Clopath"}, {"authorId": "1865831", "name": "J. DiCarlo"}, {"authorId": "25769960", "name": "S. Ganguli"}, {"authorId": "47993087", "name": "J. Hawkins"}, {"authorId": "2065566758", "name": "Konrad Koerding"}, {"authorId": "1875952", "name": "A. Koulakov"}, {"authorId": "1688882", "name": "Yann LeCun"}, {"authorId": "2542999", "name": "T. Lillicrap"}, {"authorId": "2367822", "name": "Adam H. Marblestone"}, {"authorId": "1708655", "name": "B. Olshausen"}, {"authorId": "2469356", "name": "A. Pouget"}, {"authorId": "29406516", "name": "Cristina Savin"}, {"authorId": "1714528", "name": "T. Sejnowski"}, {"authorId": "1689350", "name": "Eero P. Simoncelli"}, {"authorId": "1759839", "name": "S. Solla"}, {"authorId": "3089810", "name": "David Sussillo"}, {"authorId": "1739838", "name": "A. Tolias"}, {"authorId": "34762467", "name": "Doris Y. Tsao"}]}, {"paperId": "a0e086754a9de168ae2674f472affe4c8d1502e6", "externalIds": {"ArXiv": "2210.07321", "DBLP": "journals/corr/abs-2210-07321", "DOI": "10.48550/arXiv.2210.07321", "CorpusId": 252907813}, "url": "https://www.semanticscholar.org/paper/a0e086754a9de168ae2674f472affe4c8d1502e6", "title": "Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods", "abstract": "Advances in natural language generation (NLG) have resulted in machine generated text that is increasingly difficult to distinguish from human authored text. Powerful open-source models are freely available, and user-friendly tools democratizing access to generative models are proliferating. The great potential of state-of-the-art NLG systems is tempered by the multitude of avenues for abuse. Detection of machine generated text is a key countermeasure for reducing abuse of NLG models, with significant technical challenges and numerous open problems. We provide a survey that includes both 1) an extensive analysis of threat models posed by contemporary NLG systems, and 2) the most complete review of machine generated text detection methods to date. This survey places machine generated text within its cybersecurity and social context, and provides strong guidance for future work addressing the most critical threat models, and ensuring detection systems themselves demonstrate trustworthiness through fairness, robustness, and accountability.", "venue": "ArXiv", "year": 2022, "referenceCount": 190, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-10-13", "journal": {"volume": "abs/2210.07321", "name": "ArXiv"}, "authors": [{"authorId": "152158902", "name": "Evan Crothers"}, {"authorId": "1743642", "name": "N. Japkowicz"}, {"authorId": "1727256", "name": "H. Viktor"}]}, {"paperId": "4fc37fb43644252fb04f673c38d9b7976500979d", "externalIds": {"PubMedCentral": "9608631", "DOI": "10.3389/fcvm.2022.945726", "CorpusId": 252877740, "PubMed": "36312266"}, "url": "https://www.semanticscholar.org/paper/4fc37fb43644252fb04f673c38d9b7976500979d", "title": "Artificial intelligence in cardiology: Hope for the future and power for the present", "abstract": "Cardiovascular disease (CVD) is the principal cause of mortality and morbidity globally. With the pressures for improved care and translation of the latest medical advances and knowledge to an actionable plan, clinical decision-making for cardiologists is challenging. Artificial Intelligence (AI) is a field in computer science that studies the design of intelligent agents which take the best feasible action in a situation. It incorporates the use of computational algorithms which simulate and perform tasks that traditionally require human intelligence such as problem solving and learning. Whilst medicine is arguably the last to apply AI in its everyday routine, cardiology is at the forefront of AI revolution in the medical field. The development of AI methods for accurate prediction of CVD outcomes, non-invasive diagnosis of coronary artery disease (CAD), detection of malignant arrythmias through wearables, and diagnosis, treatment strategies and prediction of outcomes for heart failure (HF) patients, demonstrates the potential of AI in future cardiology. With the advancements of AI, Internet of Things (IoT) and the promotion of precision medicine, the future of cardiology will be heavily based on these innovative digital technologies. Despite this, ethical dilemmas regarding the implementation of AI technologies in real-world are still unaddressed.", "venue": "Frontiers in Cardiovascular Medicine", "year": 2022, "referenceCount": 145, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-13", "journal": {"volume": "9", "name": "Frontiers in Cardiovascular Medicine"}, "authors": [{"authorId": "2114677985", "name": "Loucia Karatzia"}, {"authorId": "144298593", "name": "N. Aung"}, {"authorId": "5211080", "name": "D. Aksentijevi\u0107"}]}, {"paperId": "32b6c8d2be859569331bae76916fd4ec1610890e", "externalIds": {"ArXiv": "2210.05350", "DBLP": "journals/corr/abs-2210-05350", "DOI": "10.48550/arXiv.2210.05350", "CorpusId": 252815741}, "url": "https://www.semanticscholar.org/paper/32b6c8d2be859569331bae76916fd4ec1610890e", "title": "A new perspective on Digital Twins: Imparting intelligence and agency to entities", "abstract": "\u2014 Despite the Digital Twin (DT) concept being in the industry for a long time, it remains ambiguous, unable to differentiate itself from information models, general computing, and simulation technologies. Part of this confusion stems from previous studies overlooking the DT's bidirectional nature, that enables the shift of agency (delegating control) from humans to physical elements, something that was not possible with earlier technologies. Thus, we present DTs in a new light by viewing them as a means of imparting intelligence and agency to entities, emphasizing that DTs are not just expert-centric tools but are active systems that extend the capabilities of the entities being twinned. This new perspective on DTs can help reduce confusion and humanize the concept by starting discussions about how intelligent a DT should be, and its roles and responsibilities, as well as setting a long-term direction for DTs.", "venue": "ArXiv", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-11", "journal": {"volume": "abs/2210.05350", "name": "ArXiv"}, "authors": [{"authorId": "32151779", "name": "Ashwin Agrawal"}, {"authorId": "2118838608", "name": "Vishal Singh"}, {"authorId": "2152258534", "name": "Martin Fischer"}]}, {"paperId": "2c5dfc4ca766a1b081423ea701473dd61bfecbb0", "externalIds": {"DOI": "10.3390/electronics11193259", "CorpusId": 252870621}, "url": "https://www.semanticscholar.org/paper/2c5dfc4ca766a1b081423ea701473dd61bfecbb0", "title": "ANN and SSO Algorithms for a Newly Developed Flexible Grid Trading Model", "abstract": "In the modern era, the trading methods and strategies used in the financial market have gradually changed from traditional on-site trading to electronic remote trading, and even online automatic trading performed by pre-programmed computer programs. This is due to the conduct of trading automatically and self-adjustment in financial markets becoming a competitive development trend in the entire financial market, with the continuous development of network and computer computing technology. Quantitative trading aims to automatically form a fixed and quantifiable operational logic from people\u2019s investment decisions and apply it to the financial market, which has attracted the attention of the financial market. The development of self-adjustment programming algorithms for automatically trading in financial markets has transformed to being a top priority for academic research and financial practice. Thus, a new flexible grid trading model incorporating the Simplified Swarm Optimization (SSO) algorithm for optimizing parameters for various market situations as input values and the Fully Connected Neural Network (FNN) and Long Short-Term Memory (LSTM) model for training a quantitative trading model for automatically calculating and adjusting the optimal trading parameters for trading after inputting the existing market situation are developed and studied in this work. The proposed model provides a self-adjust model to reduce investors\u2019 effort in the trading market, obtains outperformed Return of Investment (ROI) and model robustness, and can properly control the balance between risk and return.", "venue": "Electronics", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-10", "journal": {"name": "Electronics"}, "authors": [{"authorId": "143988608", "name": "W. Yeh"}, {"authorId": "33266081", "name": "Yu-Hsin Hsieh"}, {"authorId": "2187604117", "name": "Kai-Yi Hsu"}, {"authorId": "1781139", "name": "Chia-Ling Huang"}]}, {"paperId": "b941c4bea1a71066f6f32275641aea1efc99b21b", "externalIds": {"ArXiv": "2210.04909", "DBLP": "journals/corr/abs-2210-04909", "DOI": "10.48550/arXiv.2210.04909", "CorpusId": 252815699}, "url": "https://www.semanticscholar.org/paper/b941c4bea1a71066f6f32275641aea1efc99b21b", "title": "Meta-Principled Family of Hyperparameter Scaling Strategies", "abstract": "In this note, we \ufb01rst derive a one-parameter family of hyperparameter scaling strategies that interpolates between the neural-tangent scaling and mean-\ufb01eld/maximal-update scaling. We then calculate the scalings of dynamical observables \u2013 network outputs, neural tangent kernels, and di\ufb00erentials of neural tangent kernels \u2013 for wide and deep neural networks. These calculations in turn reveal a proper way to scale depth with width such that resultant large-scale models maintain their representation-learning ability. Finally, we observe that various in\ufb01nite-width limits examined in the literature correspond to the distinct corners of the interconnected web spanned by e\ufb00ective theories for \ufb01nite-width neural networks, with their training dynamics ranging from being weakly-coupled to being strongly-coupled.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-10", "journal": {"volume": "abs/2210.04909", "name": "ArXiv"}, "authors": [{"authorId": "8904571", "name": "Sho Yaida"}]}, {"paperId": "57b579b041e59cb6cedc4793a2ce8ee7f27119d7", "externalIds": {"DBLP": "conf/nordichi/AlizadehMS22", "DOI": "10.1145/3546155.3547282", "CorpusId": 252532882}, "url": "https://www.semanticscholar.org/paper/57b579b041e59cb6cedc4793a2ce8ee7f27119d7", "title": "Does Anyone Dream of Invisible A.I.? A Critique of the Making Invisible of A.I. Policing", "abstract": "For most people, using their body to authenticate their identity is an integral part of daily life. From our fingerprints to our facial features, our physical characteristics store the information that identifies us as \"us.\" This biometric information is becoming increasingly vital to the way we access and use technology. As more and more platform operators struggle with traffic from malicious bots on their servers, the burden of proof is on users, only this time they have to prove their very humanity and there is no court or jury to judge, but an invisible algorithmic system. In this paper, we critique the invisibilization of artificial intelligence policing. We argue that this practice obfuscates the underlying process of biometric verification. As a result, the new \"invisible\" tests leave no room for the user to question whether the process of questioning is even fair or ethical. We challenge this thesis by offering a juxtaposition with the science fiction imagining of the Turing test in Blade Runner to reevaluate the ethical grounds for reverse Turing tests, and we urge the research community to pursue alternative routes of bot identification that are more transparent and responsive.", "venue": "NordiCHI", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2022-10-08", "journal": {"name": "Nordic Human-Computer Interaction Conference"}, "authors": [{"authorId": "2070900671", "name": "F. Alizadeh"}, {"authorId": "2004535547", "name": "Aikaterini Mniestri"}, {"authorId": "2061536899", "name": "G. Stevens"}]}, {"paperId": "6b4a96ba2cb4bfcad98e9f00eb3f2f8491ace8aa", "externalIds": {"DOI": "10.1109/ICOA55659.2022.9934559", "CorpusId": 253425332}, "url": "https://www.semanticscholar.org/paper/6b4a96ba2cb4bfcad98e9f00eb3f2f8491ace8aa", "title": "Towards the use of artificial intelligence and machine learning in material scientist field", "abstract": "Currently, the Artificial Intelligence (AI) and Machine Learning (ML) are used several engineering applications. They allow to reduce the human workload and to improve the quality of life. In addition, nearly every sector in the world intends to use artificial intelligence and machine learning. So, machine learning is a field of artificial intelligence that consists of programming a machine to learn to perform tasks by studying examples of these tasks. In other words, it consists of developing a model using an optimization algorithm to minimize the errors between the model and the data. The aim of this paper is to describe the role of artificial intelligence and machine learning and its current applications in material scientist field. The principle of deep learning and Convolutional Neural Networks (CNNs) and their use in image classification is explained.", "venue": "2022 8th International Conference on Optimization and Applications (ICOA)", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-10-06", "journal": {"pages": "1-5", "name": "2022 8th International Conference on Optimization and Applications (ICOA)"}, "authors": [{"authorId": "2190308884", "name": "Sara Samine"}, {"authorId": "48196339", "name": "M. Zemzami"}, {"authorId": "7706426", "name": "N. Hmina"}, {"authorId": "1983795", "name": "M. Lagache"}, {"authorId": "98777122", "name": "S. Belhouideg"}]}, {"paperId": "b935df32990444ce0c5742badf66573f50edd328", "externalIds": {"DBLP": "journals/corr/abs-2210-03217", "ArXiv": "2210.03217", "DOI": "10.48550/arXiv.2210.03217", "CorpusId": 252762217}, "url": "https://www.semanticscholar.org/paper/b935df32990444ce0c5742badf66573f50edd328", "title": "Genetic algorithm formulation and tuning with use of test functions", "abstract": "This work discusses single-objective constrained genetic algorithm with \ufb02oating-point, integer, binary and permutation representation. Floating-point genetic algorithm tuning with use of test functions is done and leads to a parameterization with comparatively outstanding performance. frontier in multi-objective optimization or point in (cid:210) c space in ordinary single-objective algorithm. Different parameterizations of one algorithm (e.g. genetic) can be compared with each other with use of TFs\u2014this procedure can be used for algorithm tuning in order to increase its performance. Here, \ufb02oating-point single-objective GA effectivity and efficiency analysis with use of TFs will be presented.", "venue": "ArXiv", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-06", "journal": {"volume": "abs/2210.03217", "name": "ArXiv"}, "authors": [{"authorId": "93679191", "name": "T. Tarkowski"}]}, {"paperId": "05ab5da3d055fa652c85a0b722bc7d49543ee93e", "externalIds": {"DOI": "10.3389/fphy.2022.941824", "CorpusId": 252738616}, "url": "https://www.semanticscholar.org/paper/05ab5da3d055fa652c85a0b722bc7d49543ee93e", "title": "AI in society: A theory", "abstract": "Human-machine teams or systems are integral parts of society and will likely become more so. Unsettled are the effects of these changes, their mechanism(s), and how to measure them. In this article, I propose a central concept for understanding human-machine interaction: convergent cause. That is, Agent 1\u2019s response to the object is caused by the object and Agent 2\u2019s response, while Agent 2 responds to Agent 1\u2019s response and the object. To the extent a human-machine team acts, AI converges with a human. One benefit of this concept is that it allows degrees, and so avoids the question of Strong or Weak AI. To defend my proposal, I repurpose Donald Davidson\u2019s triangulation as a model for human-machine teams and systems.", "venue": "Frontiers in Physics", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-06", "journal": {"volume": "10"}, "authors": [{"authorId": "1572885986", "name": "R. Quandt"}]}, {"paperId": "9649afa7ae20c2f31c1c5499a6baeea50cf7955f", "externalIds": {"PubMedCentral": "9527388", "DOI": "10.1007/s13042-022-01675-8", "CorpusId": 252708351, "PubMed": "36212088"}, "url": "https://www.semanticscholar.org/paper/9649afa7ae20c2f31c1c5499a6baeea50cf7955f", "title": "Multiview deep learning-based attack to break text-CAPTCHAs", "abstract": null, "venue": "International journal of machine learning and cybernetics", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-03", "journal": {"pages": "1 - 14", "name": "International Journal of Machine Learning and Cybernetics"}, "authors": [{"authorId": "1571649581", "name": "M. Yusuf"}, {"authorId": "2155057086", "name": "Divya Srivastava"}, {"authorId": "143679152", "name": "Deepak Singh"}, {"authorId": "27080654", "name": "V. Rathor"}]}, {"paperId": "ce18b1a136decdb71c987795ff9d729d56e8faa8", "externalIds": {"DOI": "10.1016/j.jobe.2022.105444", "CorpusId": 253190164}, "url": "https://www.semanticscholar.org/paper/ce18b1a136decdb71c987795ff9d729d56e8faa8", "title": "Predictive models for concrete properties using machine learning and deep learning approaches: A review", "abstract": null, "venue": "Journal of Building Engineering", "year": 2022, "referenceCount": 250, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-10-01", "journal": {"name": "Journal of Building Engineering"}, "authors": [{"authorId": "2188200871", "name": "Mohammad Mohtasham Moein"}, {"authorId": "101132170", "name": "Ashkan Saradar"}, {"authorId": "2188191239", "name": "Komeil Rahmati"}, {"authorId": "148049156", "name": "S. H. Ghasemzadeh Mousavinejad"}, {"authorId": "2189161666", "name": "James Bristow"}, {"authorId": "2036623086", "name": "Vartenie Aramali"}, {"authorId": "2141056378", "name": "Moses Karakouzian"}]}, {"paperId": "8d1439cfd0ae8293f955b04c549f151abde7a887", "externalIds": {"DOI": "10.1016/j.chb.2022.107536", "CorpusId": 253054855}, "url": "https://www.semanticscholar.org/paper/8d1439cfd0ae8293f955b04c549f151abde7a887", "title": "Trust in an AI versus a Human teammate: The effects of teammate identity and performance on Human-AI cooperation", "abstract": null, "venue": "Computers in Human Behavior", "year": 2022, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-01", "journal": {"name": "Computers in Human Behavior"}, "authors": [{"authorId": "150116886", "name": "Guanglu Zhang"}, {"authorId": "2099667158", "name": "L. Chong"}, {"authorId": "2577125", "name": "K. Kotovsky"}, {"authorId": "1743218", "name": "J. Cagan"}]}, {"paperId": "8578252ae2b9b58e96274c0e644cd617cba1706f", "externalIds": {"PubMedCentral": "9608848", "DOI": "10.3390/ma15207187", "CorpusId": 252990683, "PubMed": "36295256"}, "url": "https://www.semanticscholar.org/paper/8578252ae2b9b58e96274c0e644cd617cba1706f", "title": "On Smart Geometric Non-Destructive Evaluation: Inspection Methods, Overview, and Challenges", "abstract": "Inspection methods, also known as non-destructive evaluation (NDE), is a process for inspecting materials, products, and facilities to identify flaws, imperfections, and malfunctions without destruction or changing the integrity of materials, structures, and mechanisms. However, detecting those defects requires test conducting and results inferring, which is highly demanding in terms of analysis, performance, and time. New technologies are therefore needed to increase the efficiency, probability of detection, and interpretability of NDE methods to establish smart inspection. In this context, Artificial intelligence (AI), as a fundamental component of the Industry 4.0, is a well-suited tool to address downsides associated with the current NDE methods for analysis and interpretation of inspection results, where methods integrating AI into their inspection process become automated and are known as smart inspection methods. This article sheds a light on the conventional methods and the smart techniques used in defects detection. Subsequently, a comparison between the two notions is presented. Furthermore, it investigates opportunities for the integration of non-destructive evaluation (NDE) methods and Industry 4.0 technologies. In addition, the challenges hindering the progress of the domain are mentioned as the potential solutions. To this end, along with Industry 4.0 technologies, a virtual inspection system has been proposed to deploy smart inspection.", "venue": "Materials", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "15", "name": "Materials"}, "authors": [{"authorId": "2121855108", "name": "A. Jaber"}, {"authorId": "148133349", "name": "Sasan Sattarpanah Karganroudi"}, {"authorId": "73233926", "name": "M. S. Meiabadi"}, {"authorId": "144202350", "name": "A. Aminzadeh"}, {"authorId": "2144776401", "name": "Hussein Ibrahim"}, {"authorId": "34651759", "name": "M. Adda"}, {"authorId": "144731070", "name": "H. Taheri"}]}, {"paperId": "f658cc4cb5201769e94a6bcc5ea2f4caacf2c264", "externalIds": {"PubMedCentral": "9602573", "DOI": "10.3390/healthcare10101997", "CorpusId": 252893401, "PubMed": "36292444"}, "url": "https://www.semanticscholar.org/paper/f658cc4cb5201769e94a6bcc5ea2f4caacf2c264", "title": "Enhanced Patient-Centricity: How the Biopharmaceutical Industry Is Optimizing Patient Care through AI/ML/DL", "abstract": "Technologies utilizing cutting-edge methodologies, including artificial intelligence (AI), machine learning (ML) and deep learning (DL), present powerful opportunities to help evaluate, predict, and improve patient outcomes by drawing insights from real-world data (RWD) generated during medical care. They played a role during and following the Coronavirus Disease 2019 (COVID-19) pandemic by helping protect healthcare providers, prioritize care for vulnerable populations, predict disease trends, and find optimal therapies. Potential applications across therapeutic areas include diagnosis, disease management and patient journey mapping. Use of fit-for-purpose datasets for ML models is seeing growth and may potentially help additional enterprises develop AI strategies. However, biopharmaceutical companies often face specific challenges, including multi-setting data, system interoperability, data governance, and patient privacy requirements. There remains a need for evolving regulatory frameworks, operating models, and data governance to enable further developments and additional research. We explore recent literature and examine the hurdles faced by researchers in the biopharmaceutical industry to fully realize the promise of AI/ML/DL for patient-centric purposes.", "venue": "Healthcare", "year": 2022, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "10", "name": "Healthcare"}, "authors": [{"authorId": "2823722", "name": "K. Zou"}, {"authorId": "1492111897", "name": "Jim Z. Li"}]}, {"paperId": "77932608d65debabbefe0c81ddbb1f3c1f98c2fd", "externalIds": {"DBLP": "journals/sensors/MoshawrabABIR22", "PubMedCentral": "9573761", "DOI": "10.3390/s22197472", "CorpusId": 252840059, "PubMed": "36236570"}, "url": "https://www.semanticscholar.org/paper/77932608d65debabbefe0c81ddbb1f3c1f98c2fd", "title": "Smart Wearables for the Detection of Occupational Physical Fatigue: A Literature Review", "abstract": "Today\u2019s world is changing dramatically due to the influence of various factors. Whether due to the rapid development of technological tools, advances in telecommunication methods, global economic and social events, or other reasons, almost everything is changing. As a result, the concepts of a \u201cjob\u201d or work have changed as well, with new work shifts being introduced and the office no longer being the only place where work is done. In addition, our non-stop active society has increased the stress and pressure at work, causing fatigue to spread worldwide and becoming a global problem. Moreover, it is medically proven that persistent fatigue is a cause of serious diseases and health problems. Therefore, monitoring and detecting fatigue in the workplace is essential to improve worker safety in the long term. In this paper, we provide an overview of the use of smart wearable devices to monitor and detect occupational physical fatigue. In addition, we present and discuss the challenges that hinder this field and highlight what can be done to advance the use of smart wearables in workplace fatigue detection.", "venue": "Italian National Conference on Sensors", "year": 2022, "referenceCount": 143, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "2181447214", "name": "Mohammad Moshawrab"}, {"authorId": "34651759", "name": "M. Adda"}, {"authorId": "3112124", "name": "A. Bouzouane"}, {"authorId": "2054762450", "name": "Hussein Ibrahim"}, {"authorId": "2157812", "name": "Ali Raad"}]}, {"paperId": "ea52a6ab2282cd39593cb25f051125fb663e433d", "externalIds": {"DOI": "10.1088/1757-899X/1261/1/012014", "CorpusId": 252814626}, "url": "https://www.semanticscholar.org/paper/ea52a6ab2282cd39593cb25f051125fb663e433d", "title": "Coevolution of internal representations in physical human-robot orchestration \u2013 models of the surgeon and the robot in robotic surgery", "abstract": "In teleoperated Robot-Assisted Minimally-Invasive Surgery (RAMIS), a surgeon controls the movements of instruments inside the patient\u2019s body via a pair of robotic joysticks. RAMIS has transformed many surgical disciplines, but its full potential is still to be realized. In this chapter we propose a pathway towards overcoming several bottlenecks that are related to transparency and stability of the teleoperation channels that mediate RAMIS. We describe the traditional system centered and the more recent human-centred approaches to teleoperation, and the special considerations for RAMIS as an application of teleoperation. However, the human-centered approach is still one sided view focusing on the surgeon but neglecting the learning capabilities of robotic systems. Hence, we consider a more general idea of physical human-robot orchestration with coevolution of mutual internal representations \u2013 of the human and the robot, and discuss it in comparison to human-human collaboration over teleoperated channels.", "venue": "IOP Conference Series: Materials Science and Engineering", "year": 2022, "referenceCount": 126, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-10-01", "journal": {"volume": "1261", "name": "IOP Conference Series: Materials Science and Engineering"}, "authors": [{"authorId": "2166933", "name": "I. Nisky"}, {"authorId": "2090041220", "name": "Leone Costi"}, {"authorId": "34567297", "name": "F. Iida"}]}, {"paperId": "ed9878730829fec2e94253f8e03feb8c17ec861d", "externalIds": {"DOI": "10.1016/j.pragma.2022.08.016", "CorpusId": 252500749}, "url": "https://www.semanticscholar.org/paper/ed9878730829fec2e94253f8e03feb8c17ec861d", "title": "Knowing how to present yourself by knowing how to recognize false true facts", "abstract": null, "venue": "Journal of Pragmatics", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-01", "journal": {"name": "Journal of Pragmatics"}, "authors": [{"authorId": "3004569", "name": "I. Arminen"}, {"authorId": "2185989648", "name": "Anna S.M. Heino"}]}, {"paperId": "37323e112fdc5eeafd6131fbcaf7646620b0c78a", "externalIds": {"DOI": "10.1177/09544089221085325", "CorpusId": 252080364}, "url": "https://www.semanticscholar.org/paper/37323e112fdc5eeafd6131fbcaf7646620b0c78a", "title": "Secondary Processing of Aramid with AWJ and Optimization with NSGA-III", "abstract": "The secondary operations of composite parts are performed following thermal cure processes, which generate the final dimensions with desired tolerance and quality specifications. High-strength composites, on the other hand, especially aramid fiber-reinforced polymers (AFRP), are not suitable for conventional machining operations due in part to high operational costs and limited surface quality characterized by fuzziness and delamination. Abrasive Water Jet (AWJ) has been recently shown promising results in obtaining improved surface quality while ensuring significant cost advantages. This study investigates the AWJ processing of AFRP by implementing the analysis of variance and response surface methods. The effects of the control parameters (sand ratio, pressure, stand-off-distance, and feed rate) on the surface quality metrics (surface roughness, kerf angle, and dimensional error) are identified and comparatively evaluated. The surface quality of the AWJ processed AFRP specimens are investigated using Scanning Electron Microscopy (SEM). The trade-offs between the measured tolerances and surface roughness values are identified via a new genetic algorithm approach: Non-dominated Sorting Genetic Algorithm (NSGA-III). Also, operation regions are determined using the generated Pareto curves while improving the quality of various features of an AFRP component, critical to its functional performance during extended service life. As a result, the lowest Ra values obtained were 4.135\u2005\u00b5m for trimming, 5.962\u2005\u00b5m for pocketing, and 4.696\u2005\u00b5m for the hole-making operation. The maximum error in the accuracy of operating regions yields to 7% with independent measurements for validation.", "venue": "", "year": 2022, "referenceCount": 61, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "236", "pages": "2164 - 2175", "name": "Proceedings of the Institution of Mechanical Engineers, Part E: Journal of Process Mechanical Engineering"}, "authors": [{"authorId": "138281485", "name": "M. Kahya"}, {"authorId": "1932466722", "name": "Emre Do\u011fankaya"}, {"authorId": "2141400241", "name": "\u00d6mer \u00c7aylan"}, {"authorId": "2184091819", "name": "Zarife G\u00f6knur B\u00fcke"}, {"authorId": "2356833", "name": "H. \u00d6. \u00dcnver"}]}, {"paperId": "1c40970d71c90a4d3cd2a3e9fd840eb634655e8a", "externalIds": {"DBLP": "conf/lwmoocs/PolettiG22", "DOI": "10.1109/LWMOOCS53067.2022.9928026", "CorpusId": 253270953}, "url": "https://www.semanticscholar.org/paper/1c40970d71c90a4d3cd2a3e9fd840eb634655e8a", "title": "MOOCs in the infosphere", "abstract": "The network is a paradigm and model that has changed the style and idea of interactivity, cognitive styles and the concept of person and information, acting as a catalyst and primary cause of what information philosophy defines as the infosphere, the habitat in which we live. The traumatic event of the pandemic has changed not only our way of life but also our way of understanding and analysing the reality around us. As far as technologies are concerned, this is the best time and the worst time to be able to see their use in relational didactic paths. The best time because we are obliged to experiment and use and the worst time because it is not a choice because we are obliged. In this context, MOOCs see their training and relational potential, as well as interaction and connection with reality, becoming increasingly a model and a training tool and a place for learning and experimentation.", "venue": "Learning With MOOCS", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-29", "journal": {"pages": "16-22", "name": "2022 IEEE Learning with MOOCS (LWMOOCS)"}, "authors": [{"authorId": "2064519831", "name": "Giorgio Poletti"}, {"authorId": "2073911094", "name": "Anita Gramigna"}]}, {"paperId": "f578351cb5f353ea22331f1720408026bdecb5bf", "externalIds": {"PubMedCentral": "9601726", "DOI": "10.3390/healthcare10101878", "CorpusId": 252604635, "PubMed": "36292325"}, "url": "https://www.semanticscholar.org/paper/f578351cb5f353ea22331f1720408026bdecb5bf", "title": "Privacy Protection in Using Artificial Intelligence for Healthcare: Chinese Regulation in Comparative Perspective", "abstract": "Advanced artificial intelligence (AI) technologies are now widely employed in China\u2019s medical and healthcare fields. Enormous amounts of personal data are collected from various sources and inserted into AI algorithms for medical purposes, producing challenges to patient\u2019s privacy. This is a comparative study of Chinese, United States, and European Union operational rules for healthcare data that is collected and then used in AI functions, particularly focusing on legal differences and deficiencies. The conceptual boundaries of privacy and personal information, the influence of technological development on the informed consent model, and conflicts between freedom and security in rules of cross-border data flow were found to be key issues requiring consideration when regulating healthcare data used for AI purposes. Furthermore, the results indicate that the appropriate balance between privacy protections and technological development, between individual and group interests, and between corporate profits and the public interest should be identified and observed. In terms of specific rule-making, it was found that China should establish special regulations protecting healthcare information, provide clear definitions and classification schemas for different types of healthcare information, and enact stricter accountability mechanisms. Examining and contrasting operational rules for AI in health care promotes informed privacy governance and improved privacy legislation.", "venue": "Healthcare", "year": 2022, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-27", "journal": {"volume": "10", "name": "Healthcare"}, "authors": [{"authorId": "50097239", "name": "Chao Wang"}, {"authorId": "2159189014", "name": "Jieyu Zhang"}, {"authorId": "2186469273", "name": "Nicholas Lassi"}, {"authorId": "2145564660", "name": "Xiaohan Zhang"}]}, {"paperId": "ba034601c3af8408107629fb5af644781821a8c9", "externalIds": {"DBLP": "journals/corr/abs-2209-13464", "ArXiv": "2209.13464", "DOI": "10.48550/arXiv.2209.13464", "CorpusId": 252545242}, "url": "https://www.semanticscholar.org/paper/ba034601c3af8408107629fb5af644781821a8c9", "title": "Information Extraction and Human-Robot Dialogue towards Real-life Tasks: A Baseline Study with the MobileCS Dataset", "abstract": "Recently, there have merged a class of task-oriented dialogue (TOD) datasets collected through Wizard-of-Oz simulated games. How-ever, the Wizard-of-Oz data are in fact simulated data and thus are fundamentally different from real-life conversations, which are more noisy and casual. Recently, the SereTOD challenge is organized and releases the MobileCS dataset, which consists of real-world dialog transcripts between real users and customer-service staffs from China Mobile. Based on the MobileCS dataset, the SereTOD challenge has two tasks, not only evaluating the construction of the dialogue system itself, but also examining information extraction from dialog transcripts, which is crucial for building the knowledge base for TOD. This paper mainly presents a baseline study of the two tasks with the MobileCS dataset. We introduce how the two baselines are constructed, the problems en-countered, and the results. We anticipate that the baselines can facilitate exciting future research to build human-robot dialogue systems for real-life tasks.", "venue": "ArXiv", "year": 2022, "referenceCount": 55, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-27", "journal": {"volume": "abs/2209.13464", "name": "ArXiv"}, "authors": [{"authorId": "2175085268", "name": "Hong Liu"}, {"authorId": "47837854", "name": "Hao Peng"}, {"authorId": "1717830", "name": "Zhijian Ou"}, {"authorId": "8549226", "name": "Juan-Zi Li"}, {"authorId": "2143931690", "name": "Yi Huang"}, {"authorId": "39729308", "name": "Junlan Feng"}]}, {"paperId": "a1de0c24f092d683b7eb4c164feb5802e3cba68c", "externalIds": {"DBLP": "journals/corr/abs-2209-12344", "ArXiv": "2209.12344", "DOI": "10.48550/arXiv.2209.12344", "CorpusId": 252532126}, "url": "https://www.semanticscholar.org/paper/a1de0c24f092d683b7eb4c164feb5802e3cba68c", "title": "Stochastic Gradient Descent Captures How Children Learn About Physics", "abstract": "As children grow older, they develop an intuitive understanding of the physical processes around them. They move along developmental trajectories, which have been mapped out extensively in previous empirical research. We investigate how children\u2019s developmental trajectories compare to the learning trajectories of arti\ufb01cial systems. Speci\ufb01cally, we examine the idea that cognitive development results from some form of stochastic optimization procedure. For this purpose, we train a modern generative neural network model using stochastic gradient descent. We then use methods from the developmental psychology literature to probe the physical understanding of this model at different degrees of optimization. We \ufb01nd that the model\u2019s learning trajectory captures the developmental trajectories of children, thereby providing support to the idea of development as stochastic optimization.", "venue": "ArXiv", "year": 2022, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-25", "journal": {"volume": "abs/2209.12344", "name": "ArXiv"}, "authors": [{"authorId": "2132054462", "name": "Luca M. Schulze Buschoff"}, {"authorId": "49427184", "name": "Eric Schulz"}, {"authorId": "32354733", "name": "Marcel Binz"}]}, {"paperId": "ad96defb9ae1b405a17c8224d0bfbad04559bdb9", "externalIds": {"ArXiv": "2209.12346", "DBLP": "journals/corr/abs-2209-12346", "DOI": "10.48550/arXiv.2209.12346", "CorpusId": 252531572}, "url": "https://www.semanticscholar.org/paper/ad96defb9ae1b405a17c8224d0bfbad04559bdb9", "title": "Political economy of superhuman AI", "abstract": "In this note, I study the institutions and game theoretic assumptions that would prevent the emergence of \u2018superhuman-level\u2019 ar\ufb01ticial general intelligence, denoted by AI*. These assumptions are (i) the \u201cFreedom of the Mind,\u201d (ii) open source \u201caccess\u201d to AI*, and (iii) rationality of the representative human agent, who com-petes against AI*. I prove that under these three assumptions it is impossible that an AI* exists. This result gives rise to two immediate recommendations for pub-lic policy. First, \u2018cloning\u2019 digitally the human brain should be strictly regulated, and hypothetical AI*\u2019s access to brain should be prohibited. Second, AI* research should be made widely, if not publicly, accessible. JEL : C70, C80", "venue": "ArXiv", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Economics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-25", "journal": {"volume": "abs/2209.12346", "name": "ArXiv"}, "authors": [{"authorId": "144358962", "name": "Mehmet S. Ismail"}]}, {"paperId": "6d26335461b46ad01f3f94a86be00c89cb587f40", "externalIds": {"DOI": "10.1002/hyp.14704", "CorpusId": 252523654}, "url": "https://www.semanticscholar.org/paper/6d26335461b46ad01f3f94a86be00c89cb587f40", "title": "On (in)validating environmental models. 1. Principles for formulating a Turing\u2010like Test for determining when a model is fit\u2010for purpose", "abstract": "Model invalidation is a good thing. It means that we are forced to reconsider either model structures or the available data more closely, that is to challenge our fundamental understanding of the problem at hand. It is not easy, however, to decide when a model should be invalidated, when we expect that the sources of uncertainty in environmental modelling will often be epistemic rather than simply aleatory in nature. In particular, epistemic errors in model inputs may well exert a very strong control over how accurate we might expect model predictions to be when compared against evaluation data that might also be subject to epistemic uncertainties. We suggest that both modellers and referees should treat model validation as a form of Turing\u2010like Test, whilst being more explicit about how the uncertainties in observed data and their impacts are assessed. Eight principles in formulating such tests are presented. Being explicit about the decisions made in framing an analysis is one important way to facilitate communication with users of model outputs, especially when it is intended to use a model simulator as a \u2018model of everywhere\u2019 or \u2018digital twin\u2019 of a catchment system. An example application of the concepts is provided in Part 2.", "venue": "Hydrological Processes", "year": 2022, "referenceCount": 137, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-24", "journal": {"volume": "36", "name": "Hydrological Processes"}, "authors": [{"authorId": "46964939", "name": "K. Beven"}, {"authorId": "2186079009", "name": "Stuart Lane"}]}, {"paperId": "e4cf47dddd73605c568c9169524f2fcfcceb6ede", "externalIds": {"DOI": "10.3389/fcomp.2022.959351", "CorpusId": 252408337}, "url": "https://www.semanticscholar.org/paper/e4cf47dddd73605c568c9169524f2fcfcceb6ede", "title": "Materializing the abstract: Understanding AI by game jamming", "abstract": "In this article, we argue that game jam formats are uniquely suited to engage participants in learning about artificial intelligence (AI) as a design material because of four factors which are characteristic of game jams: 1) Game jams provide an opportunity for hands-on, interactive prototyping, 2) Game jams encourage playful participation, 3) Game jams encourage creative combinations of AI and game development, and 4) Game jams offer understandable goals and evaluation metrics for AI. We support the argument with an interview study conducted with three AI experts who had all organized game jams with a focus on using AI in game development. Based on a thematic analysis of the expert interviews and a theoretical background of Sch\u00f6n's work on educating the reflective practitioner, we identified the four abovementioned factors as well as four recommendations for structuring and planning an AI-focused game jam: 1) Aligning repertoires, 2) Supporting playful participation, 3) Supporting ideation, and 4) Facilitating evaluation and reflection. Our contribution is motivated by the recent discourse on general challenges and recommendations of teaching AI identified by related literature, here under the long and intertwined history of games and AI in general. The article presents an initial discussion of the value of game jam formats for learning about AI and which factors need to be considered in regard to this specific learning goal.", "venue": "Frontiers in Computer Science", "year": 2022, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-22", "journal": {"volume": "4"}, "authors": [{"authorId": "2164717285", "name": "Jeanette Falk"}, {"authorId": "10702047", "name": "Nanna Inie"}]}, {"paperId": "84007e838e34f60bcd95f03083953262c1ab77a2", "externalIds": {"DOI": "10.1109/DASC55683.2022.9925874", "CorpusId": 253251631}, "url": "https://www.semanticscholar.org/paper/84007e838e34f60bcd95f03083953262c1ab77a2", "title": "Trust, Ethics, Consciousness, and Artificial Intelligence", "abstract": "As artificial intelligence (AI) continues to proliferate across manufacturing, economic, medical, aerospace, transportation, and social realms, ethical guidelines must be established to not only protect humans at the mercy of automated decision making, but also autonomous agents themselves, should they become conscious. While AI appears \"smart\" to the public, and may outperform humans on specific tasks, the truth is that today\u2019s AI lacks insight beyond the restricted scope of problems to which it has been tasked. Without context, AI is effectively incapable of comprehending the true nature of what it does and is oblivious to the reverberations it may cause in the real world should it err in prediction. Despite this, future AI may be equipped with enough sensors and neural processing capacity to acquire a dynamic cognizance more akin to humans. If this materializes, will autonomous agents question their own position in this world? One must entertain the possibility that this is not merely hypothetical but may, in fact, be imminent if humanity succeeds in creating artificial general intelligence (AGI).If autonomous agents with the capacity for artificial consciousness are delegated grueling tasks, outcomes could mirror the plight of exploited workers, result in retaliation, failure to comply, alternative objectives, or breakdown of human-autonomy teams. It will be critical to decide how and in which contexts various agents should be utilized. Additionally, delineating the meaning of trust and ethical consideration between humans and machines is problematic because descriptions of trust and ethics have only been detailed in human terms. This means autonomous agents will be subject to anthropomorphism, but robots are not humans, and their experience of trust and ethics might be markedly distinct from humans. Ideally speaking, to fully entrust a machine with human-centered tasks, one must believe that such an entity is reliable, competent, has the appropriate priorities in decision-making, and can comprehend the consequences of actions taken. Such qualities may depend on conscious awareness\u2014but without first deciphering what consciousness is in the first place, humans may fail to accurately identify consciousness in machines.This work explores the foundations of consciousness from the perspective of evolutionary biologists, neuroscientists, and philosophers, and strives to position degrees of consciousness in a trust and ethical consideration framework to guide AI usage and research. To mitigate foreseeable risks in autonomy, the authors seek to spark dialogue and preventative action, so proper legal and operational requirements can be established prior to any agent acquiring even an inkling of consciousness. If implemented correctly, such measures may reduce the likelihood of unintentional damage and help to secure a future of continued collaboration and shared success between humans and machines.", "venue": "2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC)", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-09-18", "journal": {"pages": "1-9", "name": "2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC)"}, "authors": [{"authorId": "1580488826", "name": "Katherine L. O'Grady"}, {"authorId": "93977959", "name": "Steven D. Harbour"}, {"authorId": "2189465432", "name": "Ashlie Abballe"}, {"authorId": "145468237", "name": "Kelly Cohen"}]}, {"paperId": "355d82351367caf5ea6617027f04f4cb1643ba1b", "externalIds": {"DOI": "10.3390/bs12090343", "CorpusId": 252387278}, "url": "https://www.semanticscholar.org/paper/355d82351367caf5ea6617027f04f4cb1643ba1b", "title": "Ethical Risk Factors and Mechanisms in Artificial Intelligence Decision Making", "abstract": "While artificial intelligence (AI) technology can enhance social wellbeing and progress, it also generates ethical decision-making dilemmas such as algorithmic discrimination, data bias, and unclear accountability. In this paper, we identify the ethical risk factors of AI decision making from the perspective of qualitative research, construct a risk-factor model of AI decision making ethical risks using rooting theory, and explore the mechanisms of interaction between risks through system dynamics, based on which risk management strategies are proposed. We find that technological uncertainty, incomplete data, and management errors are the main sources of ethical risks in AI decision making and that the intervention of risk governance elements can effectively block the social risks arising from algorithmic, technological, and data risks. Accordingly, we propose strategies for the governance of ethical risks in AI decision making from the perspectives of management, research, and development.", "venue": "Behavioral Sciences", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-16", "journal": {"name": "Behavioral Sciences"}, "authors": [{"authorId": "9422483", "name": "G. Hongjun"}, {"authorId": "2185541864", "name": "Dong Liye"}, {"authorId": "70020448", "name": "Zhao Aiwu"}]}, {"paperId": "2a215364e3fbe5a4c45b61dc5bd869399fa82661", "externalIds": {"DBLP": "conf/coling/ChoudhuryRA22", "ACL": "2022.coling-1.8", "ArXiv": "2209.07430", "DOI": "10.48550/arXiv.2209.07430", "CorpusId": 252283929}, "url": "https://www.semanticscholar.org/paper/2a215364e3fbe5a4c45b61dc5bd869399fa82661", "title": "Machine Reading, Fast and Slow: When Do Models \u201cUnderstand\u201d Language?", "abstract": "Two of the most fundamental issues in Natural Language Understanding (NLU) at present are: (a) how it can established whether deep learning-based models score highly on NLU benchmarks for the \u201dright\u201d reasons; and (b) what those reasons would even be. We investigate the behavior of reading comprehension models with respect to two linguistic \u201dskills\u201d: coreference resolution and comparison. We propose a definition for the reasoning steps expected from a system that would be \u201dreading slowly\u201d, and compare that with the behavior of five models of the BERT family of various sizes, observed through saliency scores and counterfactual explanations. We find that for comparison (but not coreference) the systems based on larger encoders are more likely to rely on the \u201dright\u201d information, but even they struggle with generalization, suggesting that they still learn specific lexical patterns rather than the general principles of comparison.", "venue": "COLING", "year": 2022, "referenceCount": 81, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-09-15", "journal": {"volume": "abs/2209.07430", "name": "ArXiv"}, "authors": [{"authorId": "3324957", "name": "Sagnik Ray Choudhury"}, {"authorId": "145046059", "name": "Anna Rogers"}, {"authorId": "1736067", "name": "Isabelle Augenstein"}]}, {"paperId": "d65f9540e550c3def7df10f548ca0c9cec4961f6", "externalIds": {"ArXiv": "2209.07455", "DBLP": "journals/corr/abs-2209-07455", "DOI": "10.48550/arXiv.2209.07455", "CorpusId": 252283948}, "url": "https://www.semanticscholar.org/paper/d65f9540e550c3def7df10f548ca0c9cec4961f6", "title": "A Genetic Quantum Annealing Algorithm", "abstract": "A genetic algorithm (GA) is a search-based optimization technique based on the principles of Genetics and Natural Selection. We present an algorithm which enhances the classical GA with input from quantum annealers. As in a classical GA, the algorithm works by breeding a population of possible solutions based on their \ufb01tness. However, the population of individuals is de\ufb01ned by the continuous couplings on the quantum annealer, which then give rise via quantum annealing to the set of corresponding phenotypes that represent attempted solutions. This introduces a form of directed mutation into the algorithm that can enhance its performance in various ways. Two crucial enhancements come from the continuous couplings having strengths that are inherited from the \ufb01tness of the parents (so-called nepotism ) and from the annealer couplings allowing the entire population to be in\ufb02uenced by the \ufb01ttest individuals (so-called quantum-polyandry ). We \ufb01nd our algorithm to be signi\ufb01cantly more powerful on several simple problems than a classical GA.", "venue": "ArXiv", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-15", "journal": {"volume": "abs/2209.07455", "name": "ArXiv"}, "authors": [{"authorId": "145487850", "name": "S. Abel"}, {"authorId": "2171655652", "name": "Luca A. Nutricati"}, {"authorId": "15740682", "name": "M. Spannowsky"}]}, {"paperId": "b5cbf377f8fb8c40e5b87bafc072fa73c067a8be", "externalIds": {"ArXiv": "2209.07449", "DBLP": "journals/corr/abs-2209-07449", "DOI": "10.48550/arXiv.2209.07449", "CorpusId": 252283919}, "url": "https://www.semanticscholar.org/paper/b5cbf377f8fb8c40e5b87bafc072fa73c067a8be", "title": "Extended Intelligence", "abstract": "We argue that intelligence \u2014 construed as the disposition to perform tasks successfully\u2014is a property of systems composed of agents and their contexts. This is the thesis of extended intelligence. We argue that the performance of an agent will generally not be preserved if its context is allowed to vary. Hence, this disposition is not possessed by an agent alone, but is rather possessed by the system consisting of an agent and its context, which we dub an agent-in-context. An agent\u2019s context may include an environment, other agents, cultural artifacts (like language, technology), or all of these, as is typically the case for humans and artificial intelligence systems, as well as many non-human animals. In virtue of the thesis of extended intelligence, we contend that intelligence is context-bound, task-particular and incommensurable among agents. Our thesis carries strong implications for how intelligence is analyzed in the context of both psychology and artificial intelligence.", "venue": "ArXiv", "year": 2022, "referenceCount": 37, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-15", "journal": {"volume": "abs/2209.07449", "name": "ArXiv"}, "authors": [{"authorId": "5452602", "name": "D. Barack"}, {"authorId": "2689633", "name": "Andrew Jaegle"}]}, {"paperId": "6b93fb593316693c04c562d2df1ca8ff4b11d4be", "externalIds": {"ArXiv": "2209.06715", "CorpusId": 252222592}, "url": "https://www.semanticscholar.org/paper/6b93fb593316693c04c562d2df1ca8ff4b11d4be", "title": "Generalised hardness of approximation and the SCI hierarchy -- On determining the boundaries of training algorithms in AI", "abstract": "A BSTRACT . Hardness of approximation (HA) \u2013 the phenomenon that, assuming P 6 = NP, one can easily compute an \u01eb -approximation to the solution of a discrete computational problem for \u01eb > \u01eb 0 > 0 , but for \u01eb < \u01eb 0 it suddenly becomes intractable \u2013 is a core phenomenon in the foundations of computations that has transformed computer science. In this paper we study the newly discovered phenomenon in the foundations of computational mathematics: generalised hardness of approximation (GHA) \u2013 which in spirit is close to classical HA in computer science. However, GHA is typically independent of the P vs. NP question in many cases. Thus, it requires a new mathematical framework that we initiate in this paper. We demonstrate the hitherto undiscovered phenomenon that GHA happens when using AI techniques in order to train optimal neural networks (NNs). In particular, for any non-zero underdetermined linear problem the following phase transition may occur: One can prove the existence of optimal NNs for solving the problem but they can only be computed to a certain accuracy \u01eb 0 > 0 . Below the approximation threshold \u01eb 0 \u2013 not only does it become intractable to compute the NN \u2013 it becomes impossible regardless of computing power, and no randomised algorithm can solve the problem with probability better than 1/2. In other cases, despite the existence of a stable optimal NN, any attempts of computing it below the approximation threshold \u01eb 0 will yield an unstable NN. Our results use and extend the current mathematical framework of the Solvability Complexity Index (SCI) hierarchy and facilitate a program for detecting the GHA phenomenon throughout computational mathematics and AI.", "venue": "", "year": 2022, "referenceCount": 91, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-14", "journal": null, "authors": [{"authorId": "1580676961", "name": "Luca Eva Gazdag"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": "aedd38f23f74e66c7498a460b78dfe53436b0c07", "externalIds": {"DOI": "10.21439/conexoes.v16i0.2282", "CorpusId": 252571851}, "url": "https://www.semanticscholar.org/paper/aedd38f23f74e66c7498a460b78dfe53436b0c07", "title": "DESENVOLVIMENTO DE INTELIG\u00caNCIAS ARTIFICIAIS (IA\u2019s) NA EDUCA\u00c7\u00c3O: UMA REVIS\u00c3O SISTEM\u00c1TICA DE LITERATURA", "abstract": "A utiliza\u00e7\u00e3o de novas tecnologias computacionais no ensino, sobretudo, por meio da utiliza\u00e7\u00e3o de Intelig\u00eancia Artificial (IA) pode se mostrar uma importante ferramenta no processo de ensino e aprendizagem. O presente artigo prop\u00f5e um estudo sobre o desenvolvimento de IA\u2019s voltadas para a educa\u00e7\u00e3o, com enfoque no processo de ensino e aprendizagem. Para isso, a metodologia se deu em etapas distintas: a primeira, com o estabelecimento das palavras-chave e strings de busca; a segunda, buscas nos bancos de dados digitais dos artigos publicados entre os anos de 2017 e 2021. Ap\u00f3s aplica\u00e7\u00e3o dos crit\u00e9rios de inclus\u00e3o e exclus\u00e3o, foram encontrados 20 artigos. Foi observado que houve uma preval\u00eancia do desenvolvimento de IA\u2019s para o ensino superior, sobretudo, para a \u00e1rea do ensino de computa\u00e7\u00e3o, bem como, ressalta-se a necessidade de implementa\u00e7\u00e3o de pol\u00edticas p\u00fablicas de alfabetiza\u00e7\u00e3o digital e acesso \u00e0s novas tecnologias, que possam ser importantes para minimizar: (i) a defasagem no desenvolvimento de IA\u2019s para a educa\u00e7\u00e3o b\u00e1sica; (ii) o dom\u00ednio das IA\u2019s voltadas apenas para o ensino de computa\u00e7\u00e3o; (iii) e as diferen\u00e7as entre as classes et\u00e1rias, como fen\u00f4menos limitadores da implementa\u00e7\u00e3o das IA\u2019s na educa\u00e7\u00e3o.", "venue": "Conex\u00f5es - Ci\u00eancia e Tecnologia", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-09-12", "journal": {"name": "Conex\u00f5es - Ci\u00eancia e Tecnologia"}, "authors": [{"authorId": "71571661", "name": "Carlos Eduardo Albuquerque Fernandes"}, {"authorId": "145026126", "name": "A. Ribeiro"}, {"authorId": "49009068", "name": "F. H. L. Vasconcelos"}]}, {"paperId": "c4c4ebea517f2a6f100b6da753ae721fd183e60b", "externalIds": {"DOI": "10.5753/sbseg.2022.225334", "CorpusId": 252392855}, "url": "https://www.semanticscholar.org/paper/c4c4ebea517f2a6f100b6da753ae721fd183e60b", "title": "Ataques Automatizados de Engenharia Social com o uso de Bots em Redes Sociais Profissionais", "abstract": "As intera\u00e7\u00f5es humanas virtuais t\u00eam sido ampliadas com o uso crescente da Internet e redes sociais, elevando os riscos de amea\u00e7as cibern\u00e9ticas de Engenharia Social. O uso de Bots nesses ataques permite escalabilidade na explora\u00e7\u00e3o da confian\u00e7a dos usu\u00e1rios, provocando riscos de seguran\u00e7a. Poucos s\u00e3o os trabalhos com foco nas a\u00e7\u00f5es automatizadas de Engenharia Social com o uso de Bots. Este artigo apresenta uma verifica\u00e7\u00e3o dos controles de uma rede social profissional quanto \u00e0 identifica\u00e7\u00e3o e bloqueio desses ataques automatizados, utilizando um Bot de prova de conceito. A an\u00e1lise e discuss\u00e3o dos resultados permite demonstrar as vulnerabilidades de seguran\u00e7a presentes nas redes profissionais que podem ser exploradas para constru\u00e7\u00e3o da rela\u00e7\u00e3o de confian\u00e7a do usu\u00e1rio com um Bot malicioso.", "venue": "Anais do XXII Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg 2022)", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-09-12", "journal": {"name": "Anais do XXII Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg 2022)"}, "authors": [{"authorId": "2185584895", "name": "Maur\u00edcio Ariza"}, {"authorId": "2062850565", "name": "A. Azambuja"}, {"authorId": "2092231569", "name": "J\u00e9ferson C. Nobre"}, {"authorId": "2105551588", "name": "Lisandro Z. Granville"}]}, {"paperId": "7afc8c00c721dd83b7109b600e6c9415a877bcb8", "externalIds": {"DOI": "10.1109/ASYU56188.2022.9925271", "CorpusId": 253251495}, "url": "https://www.semanticscholar.org/paper/7afc8c00c721dd83b7109b600e6c9415a877bcb8", "title": "Affecting Factors of Efficiency in Photovoltaic Energy Systems and Productivity-Enhancing Suggestions", "abstract": "In recent years, hazardous gases emission from fossil fuels has attracted public concerns due to its worse effects on the ecosystem and living conditions not only mankind but also all creatures living on earth. That's why solar energy has a vital role in alternative energy resources. Solar energy sources will gain more importance in the future. As it is known, the most needed type of energy today is electrical energy. Thus, in this study, the necessary conditions for the photovoltaic (PV) systems used in solar energy production to operate at maximum performance and which parameters are required to control these conditions are examined. The results show that four parameters that we need to measure. These are: maximum operating current of a panel/cell (Impp), maximum operating voltage of a panel/cell (Vmpp), panel surface temperature and light intensity falling on the panel. Except for the panel surface temperature, the rest of the parameters can be measured directly. However, affecting the panel surface temperature; we must not ignore parameters such as ambient temperature, wind speed, humidity and light intensity. Therefore, while determining the panel surface temperature, these parameters should also be measured and a surface temperature should be determined accordingly.", "venue": "2022 Innovations in Intelligent Systems and Applications Conference (ASYU)", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-09-07", "journal": {"pages": "1-6", "name": "2022 Innovations in Intelligent Systems and Applications Conference (ASYU)"}, "authors": [{"authorId": "92836991", "name": "\u0130. Ay"}, {"authorId": "91868074", "name": "M. Kademli"}, {"authorId": "31370878", "name": "\u015e. Karabulut"}, {"authorId": "101402242", "name": "Serkan Sava\u015f"}]}, {"paperId": "decd9837fc5e347e16e7d5c0f6617afcaa9207b2", "externalIds": {"DBLP": "journals/jzusc/BuWYTZYP22", "DOI": "10.1631/FITEE.2100551", "CorpusId": 252117051}, "url": "https://www.semanticscholar.org/paper/decd9837fc5e347e16e7d5c0f6617afcaa9207b2", "title": "Synaptic devices based on semiconductor nanocrystals", "abstract": "To meet a growing demand for information processing, brain-inspired neuromorphic devices have been intensively studied in recent years. As an important type of neuromorphic device, synaptic devices have attracted strong attention. Among all the kinds of materials explored for the fabrication of synaptic devices, semiconductor nanocrystals (NCs) have become one of the preferred choices due to their excellent electronic and optical properties. In this review, we first introduce the research background of synaptic devices based on semiconductor NCs and briefly present the basic properties of semiconductor NCs. Recent developments in the field of synaptic devices based on semiconductor NCs are then discussed according to the materials employed in the active layers of the devices. Finally, we discuss existing problems and challenges of synaptic devices based on semiconductor NCs.", "venue": "Frontiers of Information Technology & Electronic Engineering", "year": 2022, "referenceCount": 119, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-09-06", "journal": {"volume": "23", "pages": "1579 - 1601", "name": "Frontiers of Information Technology & Electronic Engineering"}, "authors": [{"authorId": "2184276234", "name": "Mingxuan Bu"}, {"authorId": "2144333864", "name": "Yue Wang"}, {"authorId": "145667513", "name": "Lei Yin"}, {"authorId": "153419910", "name": "Zhouyu Tong"}, {"authorId": "2108656188", "name": "Yiqiang Zhang"}, {"authorId": "2122835409", "name": "Deren Yang"}, {"authorId": "8848630", "name": "X. Pi"}]}, {"paperId": "1622b9ef7c9ce0ae861ea8bb7ab309de3a3d2b97", "externalIds": {"ArXiv": "2211.12839", "CorpusId": 253801973}, "url": "https://www.semanticscholar.org/paper/1622b9ef7c9ce0ae861ea8bb7ab309de3a3d2b97", "title": "Newly Developed Flexible Grid Trading Model Combined ANN and SSO algorithm", "abstract": ": In modern society, the trading methods and strategies used in financial market have gradually changed from traditional on-site trading to electronic remote trading, and even online automatic trading performed by a pre-programmed computer programs because the continuous development of network and computer computing technology. The quantitative trading, which the main purpose is to automatically formulate people\u2019s investment decisions into a fixed and quantifiable operation logic that eliminates all emotional interference and the influence of subjective thoughts and applies this logic to financial market activities in order to obtain excess profits above average returns, has led a lot of attentions in financial market. The development of self-adjustment programming algorithms for automatically trading in financial market has transformed a top priority for academic research and financial practice. Thus, a new flexible grid trading model combined with the Simplified Swarm Optimization (SSO) algorithm for optimizing parameters for various market situations as input values and the fully connected neural network (FNN) and Long Short-Term Memory (LSTM) model for training a quantitative trading model to automatically calculate and adjust the optimal trading parameters for trading after inputting the existing market situation is developed and studied in this work. The proposed model provides a self-adjust model to reduce investors\u2019 effort in the trading market, obtains outperformed investment return rate and model robustness, and can properly control the balance between risk and return.", "venue": "", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-05", "journal": null, "authors": [{"authorId": "143988608", "name": "W. Yeh"}, {"authorId": "33266081", "name": "Yu-Hsin Hsieh"}, {"authorId": "1781139", "name": "Chia-Ling Huang"}]}, {"paperId": "c8f6e01bbc2f65e1736908971faccc84e12c9e65", "externalIds": {"DBLP": "conf/bcca/BhatiaS22", "DOI": "10.1109/BCCA55292.2022.9922390", "CorpusId": 253251401}, "url": "https://www.semanticscholar.org/paper/c8f6e01bbc2f65e1736908971faccc84e12c9e65", "title": "Decentralized Federated Learning: A Comprehensive Survey and a New Blockchain-based Data Evaluation Scheme", "abstract": "Blockchain and Deep Learning (DL) are two of the most revolutionary concepts in the field of Computer Science. Both have made astounding leaps in research and application areas such as Finance, Healthcare, Internet of Things, and many more. Federated Learning (FL) is a type of distributed Deep Learning framework, in which the model is trained locally on each device and the trained gradients are sent to a central server which aggregates them and creates a global model. This helps ensure the data privacy of the user as the data never leaves the local device. However, this dependency on the central server can lead to various issues such as lack of transparency and communication bottleneck. Making this process decentralized can help address these issues. In this review, a detailed survey on using blockchain in federated learning is presented. This review also focuses on how can we use blockchain to make federated learning more transparent and decentralized to protect the privacy of the user. We also discuss the major strengths and drawbacks of each approach and further present a few ideas of our own, regarding some of these challenges and ways on how can these be improved. A new scheme to evaluate data using miners as well as methods to reduce storage overhead in decentralized federated learning are discussed in this paper.", "venue": "International Conference on Blockchain Computing and Applications", "year": 2022, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": "2022-09-05", "journal": {"pages": "289-296", "name": "2022 Fourth International Conference on Blockchain Computing and Applications (BCCA)"}, "authors": [{"authorId": "2189468811", "name": "Laveen Bhatia"}, {"authorId": "2091093915", "name": "Saeed Samet"}]}, {"paperId": "5f3103c35f71ede8ac48e15f222c68a53f64118c", "externalIds": {"DBLP": "journals/corr/abs-2209-12623", "ArXiv": "2209.12623", "DOI": "10.48550/arXiv.2209.12623", "CorpusId": 252531558}, "url": "https://www.semanticscholar.org/paper/5f3103c35f71ede8ac48e15f222c68a53f64118c", "title": "Cognitive Architecture for Co-Evolutionary Hybrid Intelligence", "abstract": ". This paper 1 questions the feasibility of a strong (general) data-centric arti\ufb01cial intelligence (AI). The disadvantages of this type of intelligence are discussed. As an alternative, the concept of co-evolutionary hybrid intelligence is proposed. It is based on the cognitive interoperability of man and machine. An analysis of existing approaches to the construction of cognitive architectures is given. An architecture that seamlessly incorporates a human into the loop of intelligent problem solving is considered. The article is organized as follows. The \ufb01rst part contains a critique of data-centric intelligent systems. The reasons why it is impossible to create a strong arti\ufb01cial intelligence based on this type of intelligence are indicated. The second part brie\ufb02y presents the concept of co-evolutionary hybrid intelligence and shows its advantages. The third part gives an overview and analysis of existing cognitive architectures. It is concluded that many of them do not consider humans as part of the intelligent data processing process. The next part discusses the cognitive architecture for co-evolutionary hybrid intelligence, providing integration with humans. It \ufb01nishes with general conclusions about the feasibility of developing intelligent systems with humans in the problem solving loop.", "venue": "ArXiv", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-09-05", "journal": {"volume": "abs/2209.12623", "name": "ArXiv"}, "authors": [{"authorId": "2047484", "name": "K. Krinkin"}, {"authorId": "3425579", "name": "Y. Shichkina"}]}, {"paperId": "b8bf1265dabd54a47181b44a4a00ca70fd0d7135", "externalIds": {"PubMedCentral": "9442555", "DOI": "10.1007/s11739-022-03080-z", "CorpusId": 252072991, "PubMed": "36063262"}, "url": "https://www.semanticscholar.org/paper/b8bf1265dabd54a47181b44a4a00ca70fd0d7135", "title": "Progress and prospects for artificial intelligence in clinical practice: learning from COVID-19", "abstract": null, "venue": "Internal and Emergency Medicine", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-05", "journal": {"volume": "17", "pages": "1855 - 1857", "name": "Internal and Emergency Medicine"}, "authors": [{"authorId": "48920527", "name": "P. Ferrara"}, {"authorId": "1742452", "name": "S. Battiato"}, {"authorId": "4771535", "name": "R. Polosa"}]}, {"paperId": "854b0decc07598100c3293e713ee86f5bc1b5524", "externalIds": {"DOI": "10.1109/RusAutoCon54946.2022.9896273", "CorpusId": 252576640}, "url": "https://www.semanticscholar.org/paper/854b0decc07598100c3293e713ee86f5bc1b5524", "title": "Simulation of the Autonomous Unmanned Underwater Vehicle Control System", "abstract": "The creation of an effective autonomous underwater vehicles (AUV) control system is one of the main problems in the development of underwater robotics. The AUV control system must have the ability to implement complex adaptive algorithms. Since the algorithms implemented by the AUV control system are difficult to investigate in real conditions, they must be worked out by modeling using a special stand that fully and adequately reproduces the conditions for performing a real mission. The paper presents the structure of the multi-agent AUV control system, describes the structure of the software of the AUV control system modeling stand, presents the results of modeling the heavy-class AUV control system.", "venue": "2022 International Russian Automation Conference (RusAutoCon)", "year": 2022, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-09-04", "journal": {"pages": "262-266", "name": "2022 International Russian Automation Conference (RusAutoCon)"}, "authors": [{"authorId": "14317139", "name": "V. S. Bykova"}, {"authorId": "2186346527", "name": "Angrey I. Mashoshin"}]}, {"paperId": "40d40339d95b3a1e394595964d2d9bc3389f64cb", "externalIds": {"PubMedCentral": "9495402", "DOI": "10.3390/bs12090343", "CorpusId": 252438571, "PubMed": "36135147"}, "url": "https://www.semanticscholar.org/paper/40d40339d95b3a1e394595964d2d9bc3389f64cb", "title": "Ethical Risk Factors and Mechanisms in Artificial Intelligence Decision Making", "abstract": "While artificial intelligence (AI) technology can enhance social wellbeing and progress, it also generates ethical decision-making dilemmas such as algorithmic discrimination, data bias, and unclear accountability. In this paper, we identify the ethical risk factors of AI decision making from the perspective of qualitative research, construct a risk-factor model of AI decision making ethical risks using rooting theory, and explore the mechanisms of interaction between risks through system dynamics, based on which risk management strategies are proposed. We find that technological uncertainty, incomplete data, and management errors are the main sources of ethical risks in AI decision making and that the intervention of risk governance elements can effectively block the social risks arising from algorithmic, technological, and data risks. Accordingly, we propose strategies for the governance of ethical risks in AI decision making from the perspectives of management, research, and development.", "venue": "Behavioral sciences", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "12", "name": "Behavioral Sciences"}, "authors": [{"authorId": "40540443", "name": "Hongjun Guan"}, {"authorId": "93116964", "name": "Li-Rong Dong"}, {"authorId": "6953583", "name": "Aiwu Zhao"}]}, {"paperId": "f0aad7c990b2145a8e6a1c39d71744e8d611c230", "externalIds": {"DOI": "10.1161/CIRCIMAGING.122.014744", "CorpusId": 252386011, "PubMed": "36126127"}, "url": "https://www.semanticscholar.org/paper/f0aad7c990b2145a8e6a1c39d71744e8d611c230", "title": "Deep Learning and Artificial Intelligence: What Does the Cardiologist Really Need to Know?", "abstract": "The opinions expressed in this article are not necessarily those of the editors or of the American Heart Association. Correspondence to: James A. Case, PhD, MASNC Cardiovascular Imaging Technologies, University of Missouri Kansas City, Kansas City, MO. Email jcase@cvit.com This manuscript was sent to Gary Heller, MD, PhD, Guest Editor, for review by expert referees, editorial decision, and final disposition. For Disclosures, see page 660. \u00a9 2022 American Heart Association, Inc. EDITORIAL", "venue": "Circulation. Cardiovascular imaging", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Editorial", "Review"], "publicationDate": "2022-09-01", "journal": {"volume": "15", "pages": "e014744", "name": "Circulation: Cardiovascular Imaging"}, "authors": [{"authorId": "35837528", "name": "J. Case"}]}, {"paperId": "2dd6484a74c65b15debaad90d625d245b4b9a7f1", "externalIds": {"PubMedCentral": "9505413", "DOI": "10.3390/life12091430", "CorpusId": 252320741, "PubMed": "36143468"}, "url": "https://www.semanticscholar.org/paper/2dd6484a74c65b15debaad90d625d245b4b9a7f1", "title": "Artificial Intelligence in Biological Sciences", "abstract": "Artificial intelligence (AI), currently a cutting-edge concept, has the potential to improve the quality of life of human beings. The fields of AI and biological research are becoming more intertwined, and methods for extracting and applying the information stored in live organisms are constantly being refined. As the field of AI matures with more trained algorithms, the potential of its application in epidemiology, the study of host\u2013pathogen interactions and drug designing widens. AI is now being applied in several fields of drug discovery, customized medicine, gene editing, radiography, image processing and medication management. More precise diagnosis and cost-effective treatment will be possible in the near future due to the application of AI-based technologies. In the field of agriculture, farmers have reduced waste, increased output and decreased the amount of time it takes to bring their goods to market due to the application of advanced AI-based approaches. Moreover, with the use of AI through machine learning (ML) and deep-learning-based smart programs, one can modify the metabolic pathways of living systems to obtain the best possible outputs with the minimal inputs. Such efforts can improve the industrial strains of microbial species to maximize the yield in the bio-based industrial setup. This article summarizes the potentials of AI and their application to several fields of biology, such as medicine, agriculture, and bio-based industry.", "venue": "Life", "year": 2022, "referenceCount": 158, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "12", "name": "Life"}, "authors": [{"authorId": "2185193714", "name": "Abhaya Bhardwaj"}, {"authorId": "2133621914", "name": "Shristi Kishore"}, {"authorId": "5479010", "name": "D. Pandey"}]}, {"paperId": "b40e7b1d917613489dda2df9676bf48dc67eedbc", "externalIds": {"PubMedCentral": "9505448", "DOI": "10.3390/ijms231810712", "CorpusId": 252329410, "PubMed": "36142623"}, "url": "https://www.semanticscholar.org/paper/b40e7b1d917613489dda2df9676bf48dc67eedbc", "title": "Machine Learning for Property Prediction and Optimization of Polymeric Nanocomposites: A State-of-the-Art", "abstract": "Recently, the field of polymer nanocomposites has been an area of high scientific and industrial attention due to noteworthy improvements attained in these materials, arising from the synergetic combination of properties of a polymeric matrix and an organic or inorganic nanomaterial. The enhanced performance of those materials typically involves superior mechanical strength, toughness and stiffness, electrical and thermal conductivity, better flame retardancy and a higher barrier to moisture and gases. Nanocomposites can also display unique design possibilities, which provide exceptional advantages in developing multifunctional materials with desired properties for specific applications. On the other hand, machine learning (ML) has been recognized as a powerful predictive tool for data-driven multi-physical modelling, leading to unprecedented insights and an exploration of the system\u2019s properties beyond the capability of traditional computational and experimental analyses. This article aims to provide a brief overview of the most important findings related to the application of ML for the rational design of polymeric nanocomposites. Prediction, optimization, feature identification and uncertainty quantification are presented along with different ML algorithms used in the field of polymeric nanocomposites for property prediction, and selected examples are discussed. Finally, conclusions and future perspectives are highlighted.", "venue": "International journal of molecular sciences", "year": 2022, "referenceCount": 181, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "23", "name": "International Journal of Molecular Sciences"}, "authors": [{"authorId": "2185231262", "name": "Elizabeth Champa-Bujaico"}, {"authorId": "1403138863", "name": "P. Garc\u00eda-D\u00edaz"}, {"authorId": "1397968395", "name": "A. D\u00edez-Pascual"}]}, {"paperId": "4dfab2aca3537ed5ea15f754e229d49d0b21f933", "externalIds": {"DOI": "10.1016/j.critrevonc.2022.103808", "CorpusId": 252150726, "PubMed": "36087852"}, "url": "https://www.semanticscholar.org/paper/4dfab2aca3537ed5ea15f754e229d49d0b21f933", "title": "Machine Learning applications in gynecological cancer: a critical review.", "abstract": null, "venue": "Critical reviews in oncology/hematology", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-09-01", "journal": {"pages": "\n 103808\n ", "name": "Critical reviews in oncology/hematology"}, "authors": [{"authorId": "40911527", "name": "O. Fiste"}, {"authorId": "6314866", "name": "M. Liontos"}, {"authorId": "2163674", "name": "F. Zagouri"}, {"authorId": "1985997", "name": "G. Stamatakos"}, {"authorId": "2163473990", "name": "Meletios A Dimopoulos"}]}, {"paperId": "98f3583d2cb59d5fd0907ea351e2d652a9c70a8b", "externalIds": {"DBLP": "journals/tits/BesinovicDFGLLM22", "DOI": "10.1109/TITS.2021.3131637", "CorpusId": 252223542}, "url": "https://www.semanticscholar.org/paper/98f3583d2cb59d5fd0907ea351e2d652a9c70a8b", "title": "Artificial Intelligence in Railway Transport: Taxonomy, Regulations, and Applications", "abstract": "Artificial Intelligence (AI) is becoming pervasive in most engineering domains, and railway transport is no exception. However, due to the plethora of different new terms and meanings associated with them, there is a risk that railway practitioners, as several other categories, will get lost in those ambiguities and fuzzy boundaries, and hence fail to catch the real opportunities and potential of machine learning, artificial vision, and big data analytics, just to name a few of the most promising approaches connected to AI. The scope of this paper is to introduce the basic concepts and possible applications of AI to railway academics and practitioners. To that aim, this paper presents a structured taxonomy to guide researchers and practitioners to understand AI techniques, research fields, disciplines, and applications, both in general terms and in close connection with railway applications such as autonomous driving, maintenance, and traffic management. The important aspects of ethics and explainability of AI in railways are also introduced. The connection between AI concepts and railway subdomains has been supported by relevant research addressing existing and planned applications in order to provide some pointers to promising directions.", "venue": "IEEE Transactions on Intelligent Transportation Systems", "year": 2022, "referenceCount": 120, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "23", "pages": "14011-14024", "name": "IEEE Transactions on Intelligent Transportation Systems"}, "authors": [{"authorId": "7369644", "name": "Nikola Be\u0161inovi\u0107"}, {"authorId": "2164681475", "name": "Lorenzo De Donato"}, {"authorId": "50005912", "name": "Francesco Flammini"}, {"authorId": "1774886", "name": "R. Goverde"}, {"authorId": "2164760844", "name": "Zhiyuan Lin"}, {"authorId": "48757839", "name": "Ronghui Liu"}, {"authorId": "47195132", "name": "S. Marrone"}, {"authorId": "38351900", "name": "R. Nardone"}, {"authorId": "80655344", "name": "Tianli Tang"}, {"authorId": "102360012", "name": "V. Vittorini"}]}, {"paperId": "5923b872837d5ba00b80d60d93f79f14d9f3bdc4", "externalIds": {"DOI": "10.1093/plankt/fbac042", "CorpusId": 251942805}, "url": "https://www.semanticscholar.org/paper/5923b872837d5ba00b80d60d93f79f14d9f3bdc4", "title": "Plankton digital twins\u2014a new research tool", "abstract": "\n Digital twins (DT) are simulation models that so closely replicate reality in their behaviour that experts may believe model output to be real. Plankton offer worthy yet tractable biological targets for digital twinning, due to their relatively simply physiology and significant role in ecology from theoretical studies through to planetary scale biogeochemistry. Construction of dynamic plankton DT (PDT), representing a supreme test of our understanding of plankton ecophysiology, would form the basis of education and training aids, provide platforms for hypothesis setting/testing, experiment design and interpretation, and support the construction and testing of large-scale ecosystem models and allied management tools. PDTs may be constructed using concepts from systems biology, with system dynamics, including feedback controls akin to biological (de)repression processes, to provide a robust approach to model plankton, with flexible core features enabling ready and meaningful configuration of phenotypic traits. Expert witness validation through Turing Tests would provide confidence in the end product. Through deployment of PDTs with appropriate input controls and output (visualization) tools, empiricists are more likely to engage with modelling, enhancing future science and increasing confidence in predictive operational and also in long-term climate simulations.", "venue": "Journal of Plankton Research", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-30", "journal": {"name": "Journal of Plankton Research"}, "authors": [{"authorId": "34976063", "name": "K. Flynn"}, {"authorId": "144428254", "name": "R. Torres"}, {"authorId": "3014948", "name": "X. Irigoien"}, {"authorId": "39773679", "name": "J. Blackford"}]}, {"paperId": "ac719bb40934083d11ee5c4575769b1f7c6f0189", "externalIds": {"DOI": "10.16995/dscn.8105", "CorpusId": 251857923}, "url": "https://www.semanticscholar.org/paper/ac719bb40934083d11ee5c4575769b1f7c6f0189", "title": "The Computational Fallacy: A New Model for Understanding the Role of Computers in Humanities", "abstract": "The paper tries to counter some misassumptions about the computer and computation especially in relation to humanities and human behavior and they amount to what the author calls \u201cthe computational fallacy. The paper discusses a number of points such as the physiology of the computer, the Etymology of basic terms in the field, and the current approaches especially in mainstream digital humanities which reduce computation to a set of \u201ctools\u201d. The paper then proceeds to discuss some counter arguments such as rethinking the notion of programmability which should substitute \u201ccalculation\u201d as the core of computation, considering the transformative nature of the computer and its media using the ideas of some theorists like Manovich and Drucker, and some new approaches that view computation differently like Computational Thinking, Algorithmic criticism, and Speculative computing.Cet article essaie de contrer quelques suppositions erron\u00e9es sur l\u2019ordinateur et la computation, plus particuli\u00e8rement leur relation aux sciences humaines et au comportement humain qui \u00e9quivaut \u00e0 ce que l\u2019auteur appelle \u00ab the computational fallacy \u00bb ou l\u2019erreur computationnelle. Cet article aborde de nombreux points, tels que la physiologie de l\u2019ordinateur, l\u2019\u00e9tymologie de termes de base dans ce domaine, ainsi que les approches courantes, particuli\u00e8rement les approches dominantes dans les humanit\u00e9s num\u00e9riques qui r\u00e9duisent la computation comme un ensemble \u00ab d\u2019outils \u00bb. Ensuite, l\u2019article poursuit en discutant les contre-arguments comme les nouvelles r\u00e9flexions des notions de programmation qui devraient substituer le calcul au c\u0153ur de la computation, consid\u00e9rant la nature transformante de l\u2019ordinateur et ses m\u00e9dias utilisant les id\u00e9es de quelques th\u00e9oristes dont Manovich et Drucker, et quelques nouvelles approches qui voient la computation diff\u00e9remment comme \u00ab Computational Thinking \u00bb ou la pens\u00e9e computationnelle, \u00ab Algorithmic criticism \u00bb ou la critique algorithmique et \u00ab Speculative computing \u00bb ou la computation sp\u00e9culative.\u00a0", "venue": "Digital Studies/le champ num\u00e9rique (DSCN) Open Issue 2022", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-25", "journal": {"name": "Digital Studies/le champ num\u00e9rique (DSCN) Open Issue 2022"}, "authors": [{"authorId": "117130137", "name": "M. Aljayyousi"}]}, {"paperId": "4217467e747182b9ad8035e8a2d657d2ce80af07", "externalIds": {"DBLP": "journals/corr/abs-2208-11981", "ArXiv": "2208.11981", "DOI": "10.48550/arXiv.2208.11981", "CorpusId": 251800226}, "url": "https://www.semanticscholar.org/paper/4217467e747182b9ad8035e8a2d657d2ce80af07", "title": "On Reality and the Limits of Language Data", "abstract": "Recent advances in neural network language models have shown that it is possible to derive expressive meaning representations by leveraging linguistic associations in large-scale natural language data. These potentially Gestalt representations have enabled state-of-the-art performance for many practical applications. It would appear that we are on a pathway to empirically deriving a robust and expressive computable semantics. A key question that arises is how far can language data alone enable computers to understand the necessary truth about the physical world? Attention to this question is warranted because our future interac-tions with intelligent machines depends on how well our techniques correctly represent and process the concepts (objects, properties, and processes) that humans commonly observe to be true. After reviewing exist-ing protocols, the objective of this work is to explore this question using a novel and tightly controlled reasoning test and to highlight what models might learn directly from pure linguistic data.", "venue": "ArXiv", "year": 2022, "referenceCount": 82, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-08-25", "journal": {"volume": "abs/2208.11981", "name": "ArXiv"}, "authors": [{"authorId": "50638196", "name": "N. Collier"}, {"authorId": "144097210", "name": "Fangyu Liu"}, {"authorId": "2888926", "name": "Ehsan Shareghi"}]}, {"paperId": "82992f2c17c9f2070cc54c6898c723e9d9f4ef28", "externalIds": {"DOI": "10.1117/12.2646616", "CorpusId": 251780684}, "url": "https://www.semanticscholar.org/paper/82992f2c17c9f2070cc54c6898c723e9d9f4ef28", "title": "The application of machine learning in the stock market", "abstract": "Artificial intelligence (AI) appears more and more in people's life. Many academic articles point out that there are signal to noises in the financial market itself. The paper aims to find whether or not we can avoid the emergence of signal to noises by using different factors or models. We will select several machine learning models, including linear regression model, XGBoost in recent 5 years, and long short-term memory (LSTM) in time series. Using exponential moving average as a factor, this paper compares the performance of different machine learning models in the stock market. Finally, we find the results simulated by the regressor models are similar.", "venue": "Other Conferences", "year": 2022, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-08-23", "journal": {"volume": "12330", "pages": "123301E - 123301E-7"}, "authors": [{"authorId": "2162978327", "name": "Wencheng Bao"}]}, {"paperId": "75f5ca0397a89714d5559e48effc3bf2f6227461", "externalIds": {"DOI": "10.1108/er-06-2021-0244", "CorpusId": 251754471}, "url": "https://www.semanticscholar.org/paper/75f5ca0397a89714d5559e48effc3bf2f6227461", "title": "Human resources under technological transformation: what\u00a0HR professionals believe in an\u00a0international scale", "abstract": "PurposeThis paper examines the beliefs of human resource professionals (HRPs) regarding the impact of Industry 4.0 on organizations in terms of readiness for human resources management (HRM) transformation, the challenges of a potential new legal and financial framework, the new means on performance management and automation, and finally the decision-making process in the era of human-machine cooperation.Design/methodology/approachThe authors analyzed a sample of 251 HRPs from 11 different countries divided into 4 cultural clusters to explore their attitude to incorporate new practices to the HR field because of technological development. The paper explores HRPs' beliefs in a legal and financial context, performance management issues, and the impact of automation on the decision-making process. Furthermore, the authors perform a cross-cultural comparison analysis to examine potential significant differences between cultural clusters.FindingsHRPs are aware of how technology adoption is affecting work environment and they highlight the importance of human resources (HR) for businesses, despite the global trend of extensive machinery exploitation. Interestingly, our results suggest that overall globalization, common knowledge, and internationalized practices lead to homogeneity for most issues under study.Originality/valueTo the best of the authors' knowledge, there has not been any comprehensive study exploring and analyzing the effects of Industry 4.0 on HRPs perceptions in the context of a dynamic HR environment influenced by technological transformation. The study shows that HRPs' present similar perspectives for most issues addressed, irrespective of cultural characteristics of HRPs. Hence, this paper generates some important insights in an attempt to build a framework for enhancing HR in this new era.", "venue": "Employee Relations: The International Journal", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-23", "journal": {"name": "Employee Relations: The International Journal"}, "authors": [{"authorId": "2166528665", "name": "Konstantinos Mantzaris"}, {"authorId": "117439841", "name": "Barbara Myloni"}]}, {"paperId": "94a0c0342abce2a2fd9aa47e85101d29ccae8f22", "externalIds": {"DOI": "10.1007/s11569-022-00418-x", "CorpusId": 251661626}, "url": "https://www.semanticscholar.org/paper/94a0c0342abce2a2fd9aa47e85101d29ccae8f22", "title": "Imitating the Human. New Human\u2013Machine Interactions in Social Robots", "abstract": null, "venue": "NanoEthics", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-17", "journal": {"name": "NanoEthics"}, "authors": [{"authorId": "114149181", "name": "Joan G. Seifert"}, {"authorId": "48685400", "name": "O. Friedrich"}, {"authorId": "6466790", "name": "Sebastian Schleidgen"}]}, {"paperId": "be33823886361b68d27a33f7dfb0986a8414ac33", "externalIds": {"DBLP": "journals/algorithms/LuL22", "DOI": "10.3390/a15080282", "CorpusId": 251601059}, "url": "https://www.semanticscholar.org/paper/be33823886361b68d27a33f7dfb0986a8414ac33", "title": "Techniques and Paradigms in Modern Game AI Systems", "abstract": "Games have long been benchmarks and test-beds for AI algorithms. With the development of AI techniques and the boost of computational power, modern game AI systems have achieved superhuman performance in many games played by humans. These games have various features and present different challenges to AI research, so the algorithms used in each of these AI systems vary. This survey aims to give a systematic review of the techniques and paradigms used in modern game AI systems. By decomposing each of the recent milestones into basic components and comparing them based on the features of games, we summarize the common paradigms to build game AI systems and their scope and limitations. We claim that deep reinforcement learning is the most general methodology to become a mainstream method for games with higher complexity. We hope this survey can both provide a review of game AI algorithms and bring inspiration to the game AI community for future directions.", "venue": "Algorithms", "year": 2022, "referenceCount": 80, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-08-12", "journal": {"volume": "15", "pages": "282", "name": "Algorithms"}, "authors": [{"authorId": "2143668784", "name": "Yunlong Lu"}, {"authorId": "2155025453", "name": "Wenxin Li"}]}, {"paperId": "29f5407995065dffa0f615cc681b1653fde4c224", "externalIds": {"PubMedCentral": "9372087", "DOI": "10.1038/s41598-022-18084-0", "CorpusId": 251516952, "PubMed": "35953516"}, "url": "https://www.semanticscholar.org/paper/29f5407995065dffa0f615cc681b1653fde4c224", "title": "Evaluation of auto-segmentation for EBRT planning structures using deep learning-based workflow on cervical cancer", "abstract": null, "venue": "Scientific reports", "year": 2022, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-11", "journal": {"volume": "12", "name": "Scientific Reports"}, "authors": [{"authorId": "1519273661", "name": "Jiahao Wang"}, {"authorId": "2144037459", "name": "Yuanyuan Chen"}, {"authorId": "46816416", "name": "Honglin Xie"}, {"authorId": "2182088347", "name": "Lumeng Luo"}, {"authorId": "2181311807", "name": "Qiu Tang"}]}, {"paperId": "83434a8e9796fb78472358b8b4d4444db61d19db", "externalIds": {"DBLP": "journals/corr/abs-2208-03836", "ArXiv": "2208.03836", "DOI": "10.48550/arXiv.2208.03836", "CorpusId": 251402401}, "url": "https://www.semanticscholar.org/paper/83434a8e9796fb78472358b8b4d4444db61d19db", "title": "Artificial Intelligence and Machine Learning for Quantum Technologies", "abstract": "In recent years, the dramatic progress in machine learning has begun to impact many areas of science and technology signi\ufb01cantly. In the present perspective article, we explore how quantum technologies are bene\ufb01ting from this revolution. We showcase in illustrative examples how scientists in the past few years have started to use machine learning and more broadly methods of arti\ufb01cial intelligence to analyze quantum measurements, estimate the parameters of quantum devices, discover new quantum experimental setups, protocols, and feedback strategies, and generally improve aspects of quantum computing, quantum communication, and quantum simulation. We highlight open challenges and future possibilities and conclude with some speculative visions for the next decade.", "venue": "ArXiv", "year": 2022, "referenceCount": 148, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-07", "journal": {"volume": "abs/2208.03836", "name": "ArXiv"}, "authors": [{"authorId": "5906965", "name": "Mario Krenn"}, {"authorId": "147098437", "name": "Jonas Landgraf"}, {"authorId": "47167798", "name": "T. Foesel"}, {"authorId": "48057862", "name": "F. Marquardt"}]}, {"paperId": "a85b031221aaff14bc34cb11ef7ee15850b26bfc", "externalIds": {"DOI": "10.1016/j.bushor.2022.07.004", "CorpusId": 251292866}, "url": "https://www.semanticscholar.org/paper/a85b031221aaff14bc34cb11ef7ee15850b26bfc", "title": "Brace yourself! Why managers should adopt a synthetic media incident response playbook in an age of falsity and synthetic media", "abstract": null, "venue": "Business Horizons", "year": 2022, "referenceCount": 27, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-08-01", "journal": {"name": "Business Horizons"}, "authors": [{"authorId": "1581739911", "name": "L. Whittaker"}, {"authorId": "1786178", "name": "Jan H. Kietzmann"}, {"authorId": "51926313", "name": "Kate Letheren"}, {"authorId": "82518051", "name": "R. Mulcahy"}, {"authorId": "1400907437", "name": "Rebekah Russell\u2013Bennett"}]}, {"paperId": "31529dd1ce338a1790a2f4b0ce556500d9d8b3f0", "externalIds": {"DBLP": "journals/jlap/Valiron22", "DOI": "10.1016/j.jlamp.2022.100790", "CorpusId": 250587969}, "url": "https://www.semanticscholar.org/paper/31529dd1ce338a1790a2f4b0ce556500d9d8b3f0", "title": "Semantics of quantum programming languages: Classical control, quantum control", "abstract": null, "venue": "J. Log. Algebraic Methods Program.", "year": 2022, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-01", "journal": {"volume": "128", "pages": "100790", "name": "J. Log. Algebraic Methods Program."}, "authors": [{"authorId": "2591230", "name": "B. Valiron"}]}, {"paperId": "7c16068b924dfe6011f23efba7a911a6250cb139", "externalIds": {"DOI": "10.1109/AIE57029.2022.00064", "CorpusId": 252561040}, "url": "https://www.semanticscholar.org/paper/7c16068b924dfe6011f23efba7a911a6250cb139", "title": "Critical Thinking on the Turing Test as a Standard for Testing Artificial Intelligence", "abstract": "Artificial intelligence is a fashionable topic in the current world. In the domain of artificial intelligence, the most basic concept is intelligence. How to judge whether a machine or program has intelligence is an important problem. By studying the famous original paper \"computing machine and intelligence\" which proposed Turing test, and combining with the Chinese house thought experiment and the chat program Eliza experiment, this paper points out that the popular saying that Turing test is regarded as the standard to judge whether a machine has intelligence neither conforms to the actual research in artificial Intelligence, nor conform to the meaning expressed by Turing himself. We are not trying to belittle Turing\u2019s great contribution to AI, but to clarify some misunderstandings from the perspective of critical thinking, and to point out the problems caused by these misunderstandings in current AI research and publicity.", "venue": "2022 International Conference on Artificial Intelligence in Everything (AIE)", "year": 2022, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-08-01", "journal": {"pages": "297-300", "name": "2022 International Conference on Artificial Intelligence in Everything (AIE)"}, "authors": [{"authorId": "2074312", "name": "W. Ouyang"}, {"authorId": "108062058", "name": "H. Feng"}]}, {"paperId": "3320cedd950afe395305e874e8bf631384d23c3c", "externalIds": {"DOI": "10.1386/jivs_00058_1", "CorpusId": 251892432}, "url": "https://www.semanticscholar.org/paper/3320cedd950afe395305e874e8bf631384d23c3c", "title": "Cybernetic animism: Voice and AI in conversation", "abstract": "This Voicing explores the theoretical and material connections between Artificial Intelligence (AI) and voice. The Voicing is in three-parts encompassing: a theoretical introduction with a taxonomy for voice and AI, an extract from artist K. Allado-McDowell\u2019s new work Air Age Blueprint and an interview based on such text. Allado-McDowell pioneered the field of human\u2013artificial intelligence interaction and literature. With their book Pharmako-AI, written in collaboration with GPT-3, Allado-McDowell stretched the limits of language creation. Francesco Bentivegna worked as artist in the liminal space of cyborgean voices and recently completed their Ph.D. on voice, AI and synthetic personas. As an exercise in philosophy of AI, voice studies and artistic research, Allado-McDowell and Bentivegna move in conversation through biases, vibes and language, exploring narrative, science and theory.", "venue": "Journal of Interdisciplinary Voice Studies", "year": 2022, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-01", "journal": {"name": "Journal of Interdisciplinary Voice Studies"}, "authors": [{"authorId": "2183152057", "name": "K. Allado-McDowell"}, {"authorId": "36475590", "name": "F. Bentivegna"}]}, {"paperId": "e6e47d14161c56bb071068f70a66d419a165a706", "externalIds": {"PubMedCentral": "9407151", "DOI": "10.3390/diagnostics12081972", "CorpusId": 251639638, "PubMed": "36010322"}, "url": "https://www.semanticscholar.org/paper/e6e47d14161c56bb071068f70a66d419a165a706", "title": "Dermatopathology of Malignant Melanoma in the Era of Artificial Intelligence: A Single Institutional Experience", "abstract": "The application of artificial intelligence (AI) algorithms in medicine could support diagnostic and prognostic analyses and decision making. In the field of dermatopathology, there have been various papers that have trained algorithms for the recognition of different types of skin lesions, such as basal cell carcinoma (BCC), seborrheic keratosis (SK) and dermal nevus. Furthermore, the difficulty in diagnosing particular melanocytic lesions, such as Spitz nevi and melanoma, considering the grade of interobserver variability among dermatopathologists, has led to an objective difficulty in training machine learning (ML) algorithms to a totally reliable, reportable and repeatable level. In this work we tried to train a fast random forest (FRF) algorithm, typically used for the classification of clusters of pixels in images, to highlight anomalous areas classified as melanoma \u201cdefects\u201d following the Allen\u2013Spitz criteria. The adopted image vision diagnostic protocol was structured in the following steps: image acquisition by selecting the best zoom level of the microscope; preliminary selection of an image with a good resolution; preliminary identification of macro-areas of defect in each preselected image; identification of a class of a defect in the selected macro-area; training of the supervised machine learning FRF algorithm by selecting the micro-defect in the macro-area; execution of the FRF algorithm to find an image vision performance indicator; and analysis of the output images by enhancing lesion defects. The precision achieved by the FRF algorithm proved to be appropriate with a discordance of 17% with respect to the dermatopathologist, allowing this type of supervised algorithm to be nominated as a help to the dermatopathologist in the challenging diagnosis of malignant melanoma.", "venue": "Diagnostics", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-01", "journal": {"volume": "12", "name": "Diagnostics"}, "authors": [{"authorId": "1471633507", "name": "Gerardo Cazzato"}, {"authorId": "144275192", "name": "A. Massaro"}, {"authorId": "1577899591", "name": "A. Colagrande"}, {"authorId": "6423417", "name": "T. Lettini"}, {"authorId": "3606943", "name": "S. Cicco"}, {"authorId": "4164293", "name": "P. Parente"}, {"authorId": "11846012", "name": "E. Nacchiero"}, {"authorId": "47484492", "name": "L. Lospalluti"}, {"authorId": "52209171", "name": "E. Cascardi"}, {"authorId": "48916832", "name": "G. Giudice"}, {"authorId": "5344789", "name": "G. Ingravallo"}, {"authorId": "143892050", "name": "L. Resta"}, {"authorId": "3936381", "name": "E. Maiorano"}, {"authorId": "2060191109", "name": "A. Vacca"}]}, {"paperId": "60240322dd39ad4c22fed2dc884e65a20e9e61f6", "externalIds": {"DOI": "10.1016/j.tics.2022.06.010", "CorpusId": 251307978, "PubMed": "35933289"}, "url": "https://www.semanticscholar.org/paper/60240322dd39ad4c22fed2dc884e65a20e9e61f6", "title": "Symbols and mental programs: a hypothesis about human singularity", "abstract": null, "venue": "Trends in Cognitive Sciences", "year": 2022, "referenceCount": 141, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-08-01", "journal": {"volume": "26", "pages": "751-766", "name": "Trends in Cognitive Sciences"}, "authors": [{"authorId": "1787332", "name": "S. Dehaene"}, {"authorId": "2028908687", "name": "Fosca Al Roumi"}, {"authorId": "3051598", "name": "Yair Lakretz"}, {"authorId": "5831538", "name": "Samuel Planton"}, {"authorId": "1414161813", "name": "Mathias Sabl\u00e9-Meyer"}]}, {"paperId": "f70b089458207ec2bd56522952dc5f93348d5b6e", "externalIds": {"DOI": "10.5753/wit.2022.222940", "CorpusId": 251240751}, "url": "https://www.semanticscholar.org/paper/f70b089458207ec2bd56522952dc5f93348d5b6e", "title": "SALVE TODAS: um Sistema Inteligente para Auxiliar na Seguran\u00e7a de Mulheres", "abstract": "O artigo apresenta o Sistema SALVE TODAS, cujo objetivo \u00e9 auxiliar na seguran\u00e7a de mulheres atrav\u00e9s da implementa\u00e7\u00e3o de t\u00e9cnicas de aprendizado de m\u00e1quina em conjunto com a constru\u00e7\u00e3o de um dispositivo eletr\u00f4nico e de um aplicativo voltados para a detec\u00e7\u00e3o de situa\u00e7\u00f5es de risco e para o disparo de uma mensagem de pedido de socorro. O dispositivo conta com diferentes sensores cujos dados ser\u00e3o analisados por uma rede neural capaz de reconhecer situa\u00e7\u00f5es em que a mulher se encontra em perigo e disparar a mensagem de SOS automaticamente. A mensagem tamb\u00e9m pode ser enviada manualmente por meio de um bot\u00e3o. Ao ser identificado o perigo, o aplicativo envia o SOS e compartilha a localiza\u00e7\u00e3o da mulher com seus contatos de seguran\u00e7a.\u00a0", "venue": "Anais do XVI Women in Information Technology (WIT 2022)", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-31", "journal": {"name": "Anais do XVI Women in Information Technology (WIT 2022)"}, "authors": [{"authorId": "31812333", "name": "M. F. Ribeiro"}, {"authorId": "2109815355", "name": "M. M. Pereira"}]}, {"paperId": "f41544f80c5ca1015b4e22c8a2750246bc62e39b", "externalIds": {"DOI": "10.1109/IAICT55358.2022.9887488", "CorpusId": 252312172}, "url": "https://www.semanticscholar.org/paper/f41544f80c5ca1015b4e22c8a2750246bc62e39b", "title": "Artificial Intelligence in Finance: Possibilities and Threats", "abstract": "Artificial intelligence (AI) alongside one of its main subsets, machine learning (ML), is no longer a sheer propaganda, it has nearly become a household name, though the use of the term AI by the public and at times technologists is often a misnomer. This paper explores AI and ML, outlining the main categories of extensive ML algorithmic techniques. Importantly, it provides handy timeline and distinction between the duo, whilst also introducing multiple lens views as to their potentials in the finance industry, covering the triad of financial, regulatory and insurance technologies (FinTech, RegTech, InsurTech). Certainly, AI/ML has found practical applications in finance; whether it is generating insights on customer spending, obtaining informed underwriting risk outcomes, detecting anomalous fiscal transactions or interacting with customers using natural language, AI/ML potentials in finance is gaining significant momentum in today\u2019s world of near ubiquity Internet of Things (IoT), advanced computing and telecommunication technologies. Without downplaying the potential capabilities, what is less certain however is whether there are any frontiers to its applications in finance, and whether it will provide panaceas to the pressing challenges, especially in relation to transparency from a collective viewpoint of AI/ML solution design, development and implementation.", "venue": "2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-07-28", "journal": {"pages": "268-273", "name": "2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)"}, "authors": [{"authorId": "2048217", "name": "Opeoluwa Tosin Eluwole"}, {"authorId": "2176277632", "name": "Segun Akande"}]}, {"paperId": "ca8e868a7f1fc89b0bec9497b0a86f25750004d1", "externalIds": {"DBLP": "journals/alife/SatoM22", "DOI": "10.1162/artl_a_00376", "CorpusId": 251068059, "PubMed": "35881681"}, "url": "https://www.semanticscholar.org/paper/ca8e868a7f1fc89b0bec9497b0a86f25750004d1", "title": "The Enactive and Interactive Dimensions of AI: Ingenuity and Imagination Through the Lens of Art and Music", "abstract": "Abstract Dualisms are pervasive. The divisions between the rational mind, the physical body, and the external natural world have set the stage for the successes and failures of contemporary cognitive science and artificial intelligence.1 Advanced machine learning (ML) and artificial intelligence (AI) systems have been developed to draw art and compose music. Many take these facts as calls for a radical shift in our values and turn to questions about AI ethics, rights, and personhood. While the discussion of agency and rights is not wrong in principle, it is a form of misdirection in the current circumstances. Questions about an artificial agency can only come after a genuine reconciliation of human interactivity, creativity, and embodiment. This kind of challenge has both moral and theoretical force. In this article, the authors intend to contribute to embodied and enactive approaches to AI by exploring the interactive and contingent dimensions of machines through the lens of Japanese philosophy. One important takeaway from this project is that AI/ML systems should be recognized as powerful tools or instruments rather than as agents themselves.", "venue": "Artificial Life", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-25", "journal": {"volume": "28", "pages": "310-321", "name": "Artificial Life"}, "authors": [{"authorId": "2111956341", "name": "Maki Sato"}, {"authorId": "46397736", "name": "Jonathan McKinney"}]}, {"paperId": "d6302b01db9616f1f152581aacd410d9b1514157", "externalIds": {"DOI": "10.1007/s11229-022-03798-5", "CorpusId": 251085672}, "url": "https://www.semanticscholar.org/paper/d6302b01db9616f1f152581aacd410d9b1514157", "title": "The identification game: deepfakes and the epistemic limits of identity", "abstract": null, "venue": "Synthese", "year": 2022, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-25", "journal": {"volume": "200", "name": "Synthese"}, "authors": [{"authorId": "31028090", "name": "Carl \u00d6hman"}]}, {"paperId": "c1bf768d68f2213e60f397e6a6ddafa162201d0a", "externalIds": {"DBLP": "journals/corr/abs-2208-04148", "ArXiv": "2208.04148", "DOI": "10.48550/arXiv.2208.04148", "CorpusId": 251402420}, "url": "https://www.semanticscholar.org/paper/c1bf768d68f2213e60f397e6a6ddafa162201d0a", "title": "A Historical Interaction between Artificial Intelligence and Philosophy", "abstract": "This paper reviews the historical development of AI and representative philosophical thinking from the perspective of the research paradigm. Additionally, it considers the methodology and applications of AI from a philosophical perspective and anticipates its continued advancement. In the history of AI, Symbolism and connectionism are the two main paradigms in AI research. Symbolism holds that the world can be explained by symbols and dealt with through precise, logical processes, but connectionism believes this process should be implemented through artificial neural networks. Regardless of how intelligent machines or programs should achieve their smart goals, the historical development of AI demonstrates the best answer at this time. Still, it is not the final answer of AI research.", "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-23", "journal": {"volume": "abs/2208.04148", "name": "ArXiv"}, "authors": [{"authorId": "2180772261", "name": "Youheng Zhang"}]}, {"paperId": "7a47bbb3f8ee2171db77ce94f2d94dfbdc9bde69", "externalIds": {"DOI": "10.1007/s13347-022-00561-z", "CorpusId": 251000575}, "url": "https://www.semanticscholar.org/paper/7a47bbb3f8ee2171db77ce94f2d94dfbdc9bde69", "title": "Intelligence as a Social Concept: a Socio-Technological Interpretation of the Turing Test", "abstract": null, "venue": "Philosophy & Technology", "year": 2022, "referenceCount": 63, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-22", "journal": {"volume": "35", "name": "Philosophy & Technology"}, "authors": [{"authorId": "83389626", "name": "Shlomo Danziger"}]}, {"paperId": "a12447c77330d09c6b5da8f48e92faf8511d24ed", "externalIds": {"DOI": "10.31056/2250.5415.v12.n2.38328", "CorpusId": 250938453}, "url": "https://www.semanticscholar.org/paper/a12447c77330d09c6b5da8f48e92faf8511d24ed", "title": "La gran pantalla como laboratorio y espejo para la robo\u00e9tica", "abstract": "La robo\u00e9tica es una rama de la \u00e9tica aplicada interesada por los desaf\u00edos \u00e9ticos y sociales de la rob\u00f3tica y la inteligencia artificial. En el presente ensayo utilizo el cine de ciencia-ficci\u00f3n para reflexionar sobre esta disciplina, habida cuenta de la doble funci\u00f3n de este g\u00e9nero como \u201cespejo\u201d de la vanguardia tecno-cient\u00edfica y como \u201claboratorio\u201d para la especulaci\u00f3n futurista y la influencia social. De entre los muchos temas \u00e9tico-sociales relacionados con estas tecnolog\u00edas, centro los esfuerzos en analizar (1) los riesgos y medidas de seguridad asociadas, (2) los derechos y deberes inherentes y (3) las consecuencias relacionales de la d\u00edada humano-m\u00e1quina. Como conclusi\u00f3n, cabe destacar que el cine de ciencia-ficci\u00f3n se ha aproximado sin disimulo (con diferente grado de plausibilidad) a todas estas cuestiones, las cuales se antojan de m\u00e1xima urgencia si consideramos el impacto bio-psico-social que la rob\u00f3tica y la cibern\u00e9tica ya tienen (y tendr\u00e1n) en nuestras vidas.", "venue": "\u00c9tica y Cine Journal", "year": 2022, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-20", "journal": {"name": "\u00c9tica y Cine Journal"}, "authors": [{"authorId": "2124362976", "name": "Jos\u00e9 Miguel Biscaia Fern\u00e1ndez"}]}, {"paperId": "07304a9a7bc5743ee49d3bbc236d940b05bef789", "externalIds": {"DOI": "10.31056/2250.5415.v12.n2.38325", "CorpusId": 250941196}, "url": "https://www.semanticscholar.org/paper/07304a9a7bc5743ee49d3bbc236d940b05bef789", "title": "El test de Turing en Ex Machina: \u00bfEs Ava un sistema intencional?", "abstract": "El presente art\u00edculo aborda el problema de la interacci\u00f3n entre seres humanos y la inteligencia artificial a partir del test de Turing representado en la pel\u00edcula\u00a0Ex Machina. Se revisan algunas de las principales perspectivas en relaci\u00f3n con la filosof\u00eda de la mente y se analiza el problema que plantea la pel\u00edcula, en cuanto a si Ava, la robot humanoide, supera el test de Turing, a partir de tres hip\u00f3tesis: los estados mentales descritos por John Searle constituyen las tres dimensiones del mundo ps\u00edquico y la deliberaci\u00f3n moral: la dimensi\u00f3n f\u00e1ctica de la\u00a0percepci\u00f3n, la dimensi\u00f3n estimativa de los valores y la dimensi\u00f3n pragm\u00e1tica de las acciones. La segunda hip\u00f3tesis afirma que las ideas constituyen estados mentales intencionales, unidades de trasmisi\u00f3n cultural que, asociadas a estados emocionales, constituyen los sentimientos como fen\u00f3menos neuroculturales. La tercera hip\u00f3tesis afirma que la comunidad de significados emergente a partir del v\u00ednculo entre afectos y sistemas simb\u00f3licos-culturales puede estar constituida, tanto por seres humanos como por sistemas algor\u00edtmicos. En este sentido, la prueba de la inteligencia artificial fuerte consiste en la constataci\u00f3n en tales sistemas de estados mentales afectivos (valorativos) mediados por la interacci\u00f3n cultural.", "venue": "\u00c9tica y Cine Journal", "year": 2022, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-20", "journal": {"name": "\u00c9tica y Cine Journal"}, "authors": [{"authorId": "2178502066", "name": "Maria Paola Caycedo-Castro"}, {"authorId": "1412954124", "name": "Boris Juli\u00e1n Pinto-Bustamante"}]}, {"paperId": "7722dce5de72ad9d6f1f496ce77b0b26f83fd047", "externalIds": {"DBLP": "journals/topics/CassentiVR22", "DOI": "10.1111/tops.12622", "CorpusId": 250698077, "PubMed": "35853452"}, "url": "https://www.semanticscholar.org/paper/7722dce5de72ad9d6f1f496ce77b0b26f83fd047", "title": "Editor's Review and Introduction: Cognition-Inspired Artificial Intelligence", "abstract": "Cognitive science has much to contribute to the general scientific body of knowledge, but it is also a field rife with possibilities for providing background research that can be leveraged by artificial intelligence (AI) developers. In this introduction, we briefly explore the history of AI. We particularly focus on the relationship between AI and cognitive science and introduce this special issue that promotes the method of inspiring AI development with the results of cognitive science research.", "venue": "Top. Cogn. Sci.", "year": 2022, "referenceCount": 34, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-19", "journal": {"name": "Topics in cognitive science"}, "authors": [{"authorId": "2051193", "name": "Daniel N. Cassenti"}, {"authorId": "35025007", "name": "V. D. Veksler"}, {"authorId": "1701118", "name": "F. Ritter"}]}, {"paperId": "6ab907876e1beae83d898f638e7a6c6c1f7cd7f4", "externalIds": {"DBLP": "conf/ijcnn/Weng22", "DOI": "10.1109/IJCNN55064.2022.9892445", "CorpusId": 252626098}, "url": "https://www.semanticscholar.org/paper/6ab907876e1beae83d898f638e7a6c6c1f7cd7f4", "title": "20 Million-Dollar Problems for Any Brain Models and a Holistic Solution: Conscious Learning", "abstract": "This is a theoretical paper. It raises 20 open problems each of which is estimated to require one million dollars of investment or more. They are (1) the image annotation problem (e.g., retina is without bounding box to learn, unlike ImageNet), (2) the sensorimotor recurrence problem (e.g., all big data sets are invalid), (3) the motor-supervision problem (e.g., impractical to supervise motors throughout lifetime), (4) the sensor calibration problem (e.g., a life calibrates the eyes automatically), (5) the inverse kinematics problem (e.g., a life calibrates all redundant limbs automatically), (6) the government-free problem (i.e., no task-aware homunculus inside a brain), (7) the closed-skull problem (e.g., supervising hidden neurons is biologically implausible), (8) the nonlinear controller problem (e.g., a brain is a nonlinear controller but task-nonspecific), (9) the curse of dimensionality problem (e.g., a set of global features is insufficient for a life), (10) the under-sample problem (i.e., few available examples in a life), (11) the distributed vs. local representations problem (i.e., how both representations emerge), (12) the symbol problem (also called grounding problem, thus must be free from any symbols), (13) the local minima problem (so, avoid error-backprop learning and Post-Selections), (14) the abstraction problem (i.e., require various invariances and transfers), (15) the compositionality problem (e.g., metonymy beyond those composable from sentences), (16) the smooth representations problem (e.g., brain representations are globally smooth), (17) the motivation problem (e.g., including reinforcements and various emotions), (18) the global optimality problem (e.g., avoid catastrophic memory loss and Post-Selections), (19) the auto-programming for general purposes (APFGP) problem, (20) the brain-thinking problem. The paper discusses also why the proposed holistic solution of conscious learning [1], [2] solves each.", "venue": "2022 International Joint Conference on Neural Networks (IJCNN)", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-07-18", "journal": {"pages": "1-9", "name": "2022 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "d3088d8aad337f02c8c95b77833e69c0b8db4ac2", "externalIds": {"DBLP": "conf/ijcnn/JainSCS22", "DOI": "10.1109/IJCNN55064.2022.9892890", "CorpusId": 252626047}, "url": "https://www.semanticscholar.org/paper/d3088d8aad337f02c8c95b77833e69c0b8db4ac2", "title": "Domain Infused Conversational Response Generation for Tutoring based Virtual Agent", "abstract": "Recent advances in deep learning typically, with the introduction of transformer based models has shown massive improvement and success in many Natural Language Processing (NLP) tasks. One such area which has leveraged immensely is conversational agents or chatbots in open-ended (chit-chat conversations) and task-specific (such as medical or legal dialogue bots etc.) domains. However, in the era of automation, there is still a dearth of works focused on one of the most relevant use cases, i.e., tutoring dialog systems that can help students learn new subjects or topics of their interest. Most of the previous works in this domain are either rule based systems which require a lot of manual efforts or are based on multiple choice type factual questions. In this paper, we propose EDICA (Educational Domain Infused Conversational Agent), a language tutoring Virtual Agent (VA). EDICA employs two mechanisms in order to converse fluently with a student/user over a question and assist them to learn a language: (i) Student/Tutor Intent Classification (SIC-TIC) framework to identify the intent of the student and decide the action of the VA, respectively, in the on-going conversation and (ii) Tutor Response Generation (TRG) framework to generate domain infused and intent/action conditioned tutor responses at every step of the conversation. The VA is able to provide hints, ask questions and correct student's reply by generating an appropriate, informative and relevant tutor response. We establish the superiority of our proposed approach on various evaluation metrics over other baselines and state of the art models.", "venue": "2022 International Joint Conference on Neural Networks (IJCNN)", "year": 2022, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-07-18", "journal": {"pages": "1-8", "name": "2022 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "2088137695", "name": "Raghav Jain"}, {"authorId": "52219377", "name": "Tulika Saha"}, {"authorId": "2175280949", "name": "Souhitya Chakraborty"}, {"authorId": "145470045", "name": "S. Saha"}]}, {"paperId": "0c2b78f41939ab385733e3aec9d580e07aef7ff0", "externalIds": {"PubMedCentral": "9300474", "DOI": "10.1016/B978-0-323-91172-6.00008-X", "CorpusId": 250702057}, "url": "https://www.semanticscholar.org/paper/0c2b78f41939ab385733e3aec9d580e07aef7ff0", "title": "Computational approaches for drug repositioning and repurposing to combat SARS-CoV-2 infection", "abstract": null, "venue": "Computational Approaches for Novel Therapeutic and Diagnostic Designing to Mitigate SARS-CoV-2 Infection", "year": 2022, "referenceCount": 74, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-15", "journal": {"pages": "247 - 265", "name": "Computational Approaches for Novel Therapeutic and Diagnostic Designing to Mitigate SARS-CoV-2 Infection"}, "authors": [{"authorId": "5733494", "name": "Subhamay Panda"}, {"authorId": "40467386", "name": "L. Kumari"}, {"authorId": "3932288", "name": "H. Badwaik"}, {"authorId": "4084524", "name": "Dhivya Shanmugarajan"}]}, {"paperId": "3f2230b7abf58ae63e3fbaf8ff59b7de29959b28", "externalIds": {"PubMedCentral": "9336647", "DOI": "10.3389/fpsyg.2022.911620", "CorpusId": 250593707, "PubMed": "35911009"}, "url": "https://www.semanticscholar.org/paper/3f2230b7abf58ae63e3fbaf8ff59b7de29959b28", "title": "Self-organized criticality as a framework for consciousness: A review study", "abstract": "Objective No current model of consciousness is univocally accepted on either theoretical or empirical grounds, and the need for a solid unifying framework is evident. Special attention has been given to the premise that self-organized criticality (SOC) is a fundamental property of neural system. SOC provides a competitive model to describe the physical mechanisms underlying spontaneous brain activity, and thus, critical dynamics were proposed as general gauges of information processing representing a strong candidate for a surrogate measure of consciousness. As SOC could be a neurodynamical framework, which may be able to bring together existing theories and experimental evidence, the purpose of this work was to provide a comprehensive overview of progress of research on SOC in association with consciousness. Methods A comprehensive search of publications on consciousness and SOC published between 1998 and 2021 was conducted. The Web of Science database was searched, and annual number of publications and citations, type of articles, and applied methods were determined. Results A total of 71 publications were identified. The annual number of citations steadily increased over the years. Original articles comprised 50.7% and reviews/theoretical articles 43.6%. Sixteen studies reported on human data and in seven studies data were recorded in animals. Computational models were utilized in n\u2009=\u200912 studies. EcoG data were assessed in n\u2009=\u20094 articles, fMRI in n\u2009=\u20094 studies, and EEG/MEG in n\u2009=\u200910 studies. Notably, different analytical tools were applied in the EEG/MEG studies to assess a surrogate measure of criticality such as the detrended fluctuation analysis, the pair correlation function, parameters from the neuronal avalanche analysis and the spectral exponent. Conclusion Recent studies pointed out agreements of critical dynamics with the current most influencing theories in the field of consciousness research, the global workspace theory and the integrated information theory. Thus, the framework of SOC as a neurodynamical parameter for consciousness seems promising. However, identified experimental work was small in numbers, and a heterogeneity of applied analytical tools as a surrogate measure of criticality was observable, which limits the generalizability of findings.", "venue": "Frontiers in psychology", "year": 2022, "referenceCount": 153, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-15", "journal": {"volume": "13", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "2106198405", "name": "Nike Walter"}, {"authorId": "1812411", "name": "T. Hinterberger"}]}, {"paperId": "944496598fc2305f8834fbf89c5e497b83c9069f", "externalIds": {"DOI": "10.1007/s11609-022-00475-9", "CorpusId": 250505696}, "url": "https://www.semanticscholar.org/paper/944496598fc2305f8834fbf89c5e497b83c9069f", "title": "Der kybernetische Blick und seine Grenzen. Zur systemtheoretischen Selbstbeschreibung der digitalen Gesellschaft", "abstract": null, "venue": "Berliner Journal f\u00fcr Soziologie", "year": 2022, "referenceCount": 77, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-11", "journal": {"name": "Berliner Journal f\u00fcr Soziologie"}, "authors": [{"authorId": "82997975", "name": "Sascha Dickel"}]}, {"paperId": "f53a44aeaa354cd680845b0123d3b98ace1224a0", "externalIds": {"DOI": "10.1007/s00113-022-01202-y", "CorpusId": 250390803}, "url": "https://www.semanticscholar.org/paper/f53a44aeaa354cd680845b0123d3b98ace1224a0", "title": "K\u00fcnstliche Intelligenz und Ausblick auf Anwendungsfelder in der Pseudarthrosentherapie", "abstract": null, "venue": "Die Unfallchirurgie", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-09", "journal": {"volume": "125", "pages": "611 - 618", "name": "Die Unfallchirurgie"}, "authors": [{"authorId": "2070873121", "name": "Marie K. Reumann"}, {"authorId": "51036281", "name": "B. Braun"}, {"authorId": "144539925", "name": "Max Menger"}, {"authorId": "79798014", "name": "F. Springer"}, {"authorId": "2175481295", "name": "Johann Jazewitsch"}, {"authorId": "48462037", "name": "T. Schwarz"}, {"authorId": "2135997360", "name": "Andreas K N\u00fcssler"}, {"authorId": "2095561161", "name": "T. Histing"}, {"authorId": "2153524502", "name": "Mika F. R. Rollmann"}]}, {"paperId": "77769d8a450323e2c513ebc5a247ea222c4eae97", "externalIds": {"DOI": "10.1017/9781108973335", "CorpusId": 250400208}, "url": "https://www.semanticscholar.org/paper/77769d8a450323e2c513ebc5a247ea222c4eae97", "title": "Imagination and Creative Thinking", "abstract": "This Element explores the nature of both imagination and creative thinking in an effort to understand the relation between them and also to understand their role in the vast array of activities in which they are typically implicated, from art, music, and literature to technology, medicine, and science. Focusing on the contemporary philosophical literature, it will take up several interrelated questions: What is imagination, and how does it fit into the cognitive architecture of the mind? What is creativity? Is imagination required for creativity? Is creativity required for imagination? Is a person simply born either imaginative or not (and likewise, either creative or not), or are imagination and creativity skills that can be cultivated? And finally, are imagination and creativity uniquely human capacities, or can they be had by nonbiological entities such as AI systems?", "venue": "", "year": 2022, "referenceCount": 110, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-08", "journal": null, "authors": [{"authorId": "152537655", "name": "A. Kind"}]}, {"paperId": "c619130763c5a5f94f30a69e6da0707b40f34ce5", "externalIds": {"DOI": "10.3917/pls.537.0074", "CorpusId": 250706266}, "url": "https://www.semanticscholar.org/paper/c619130763c5a5f94f30a69e6da0707b40f34ce5", "title": "Robots en qu\u00eate d\u2019\u00e9loquence", "abstract": null, "venue": "Pour la Science", "year": 2022, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-08", "journal": {"name": "Pour la Science"}, "authors": [{"authorId": "1809842", "name": "Fr\u00e9d\u00e9ric Landragin"}]}, {"paperId": "28ea1f2321027f35bff2b0211c3e3eae48263979", "externalIds": {"PubMedCentral": "9279074", "DOI": "10.1155/2022/7205241", "CorpusId": 250525974, "PubMed": "35845955"}, "url": "https://www.semanticscholar.org/paper/28ea1f2321027f35bff2b0211c3e3eae48263979", "title": "Artificial Intelligence-Based Data-Driven Strategy to Accelerate Research, Development, and Clinical Trials of COVID Vaccine", "abstract": "The global COVID-19 (coronavirus disease 2019) pandemic, which was caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), has resulted in a significant loss of human life around the world. The SARS-CoV-2 has caused significant problems to medical systems and healthcare facilities due to its unexpected global expansion. Despite all of the efforts, developing effective treatments, diagnostic techniques, and vaccinations for this unique virus is a top priority and takes a long time. However, the foremost step in vaccine development is to identify possible antigens for a vaccine. The traditional method was time taking, but after the breakthrough technology of reverse vaccinology (RV) was introduced in 2000, it drastically lowers the time needed to detect antigens ranging from 5\u201315 years to 1\u20132 years. The different RV tools work based on machine learning (ML) and artificial intelligence (AI). Models based on AI and ML have shown promising solutions in accelerating the discovery and optimization of new antivirals or effective vaccine candidates. In the present scenario, AI has been extensively used for drug and vaccine research against SARS-COV-2 therapy discovery. This is more useful for the identification of potential existing drugs with inhibitory human coronavirus by using different datasets. The AI tools and computational approaches have led to speedy research and the development of a vaccine to fight against the coronavirus. Therefore, this paper suggests the role of artificial intelligence in the field of clinical trials of vaccines and clinical practices using different tools.", "venue": "BioMed research international", "year": 2022, "referenceCount": 132, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-07-06", "journal": {"volume": "2022", "name": "BioMed Research International"}, "authors": [{"authorId": "2109624967", "name": "Ashwani Sharma"}, {"authorId": "1399523832", "name": "T. Virmani"}, {"authorId": "2176754263", "name": "Vipluv Pathak"}, {"authorId": "2172478637", "name": "Anjali Sharma"}, {"authorId": "117420891", "name": "K. Pathak"}, {"authorId": "2090136929", "name": "G. Kumar"}, {"authorId": "39436862", "name": "D. Pathak"}]}, {"paperId": "c6985fbd899bec8b89fb5dc405cf2a04d5ae21a9", "externalIds": {"PubMedCentral": "9294137", "DOI": "10.3389/frobt.2022.951293", "CorpusId": 250275788, "PubMed": "35865329"}, "url": "https://www.semanticscholar.org/paper/c6985fbd899bec8b89fb5dc405cf2a04d5ae21a9", "title": "Developing Intelligent Robots that Grasp Affordance", "abstract": "Humans and robots operating in unstructured environments both need to classify objects through haptic exploration and use them in various tasks, but currently they differ greatly in their strategies for acquiring such capabilities. This review explores nascent technologies that promise more convergence. A novel form of artificial intelligence classifies objects according to sensory percepts during active exploration and decides on efficient sequences of exploratory actions to identify objects. Representing objects according to the collective experience of manipulating them provides a substrate for discovering causality and affordances. Such concepts that generalize beyond explicit training experiences are an important aspect of human intelligence that has eluded robots. For robots to acquire such knowledge, they will need an extended period of active exploration and manipulation similar to that employed by infants. The efficacy, efficiency and safety of such behaviors depends on achieving smooth transitions between movements that change quickly from exploratory to executive to reflexive. Animals achieve such smoothness by using a hierarchical control scheme that is fundamentally different from those of conventional robotics. The lowest level of that hierarchy, the spinal cord, starts to self-organize during spontaneous movements in the fetus. This allows its connectivity to reflect the mechanics of the musculoskeletal plant, a bio-inspired process that could be used to adapt spinal-like middleware for robots. Implementation of these extended and essential stages of fetal and infant development is impractical, however, for mechatronic hardware that does not heal and replace itself like biological tissues. Instead such development can now be accomplished in silico and then cloned into physical robots, a strategy that could transcend human performance.", "venue": "Frontiers in Robotics and AI", "year": 2022, "referenceCount": 103, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-07-05", "journal": {"volume": "9", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "1720471", "name": "G. Loeb"}]}, {"paperId": "6b84681811d5edf657b5e0ff27f092a4684fc0a3", "externalIds": {"DOI": "10.3390/philosophies7040076", "CorpusId": 250327289}, "url": "https://www.semanticscholar.org/paper/6b84681811d5edf657b5e0ff27f092a4684fc0a3", "title": "The Accidental Philosopher and One of the Hardest Problems in the World", "abstract": "Given the difficulties of defining \u201cmachine\u201d and \u201cthink\u201d, Turing proposed to replace the question \u201cCan machines think?\u201d with a proxy: how well can an agent engage in sustained conversation with a human? Though Turing neither described himself as a philosopher nor published much on philosophical matters, his Imitation Game has stood the test of time. Most understood at that time that success would not come easy, but few would have guessed just how difficult engaging in ordinary conversation would turn out to be. Despite the proliferation of language processing tools, we have seen little progress towards doing well at the Imitation Game. Had Turing instead suggested ability at games or even translation as a proxy for intelligence, his paper might have been forgotten. We argue that these and related problems are amenable to mechanical, though sophisticated, formal techniques. Turing appears to have taken care to select sustained, productive conversation and that alone as his proxy. Even simple conversation challenges a machine to engage in the rich practice of human discourse in all its generality and variety.", "venue": "Philosophies", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-04", "journal": {"name": "Philosophies"}, "authors": [{"authorId": "3374328", "name": "Sonje Finnestad"}, {"authorId": "32487012", "name": "E. Neufeld"}]}, {"paperId": "2675e0ed5d828321c1fe06afd6fb49ce953b9c42", "externalIds": {"DOI": "10.1002/jdd.13010", "CorpusId": 250281247, "PubMed": "35781809"}, "url": "https://www.semanticscholar.org/paper/2675e0ed5d828321c1fe06afd6fb49ce953b9c42", "title": "Adopting artificial intelligence in dental education: A model for academic leadership and innovation.", "abstract": "INTRODUCTION\nThe continual evolution of dental education, dental practice and the delivery of optimal oral health care is rooted in the practice of leadership. This paper explores opportunities and challenges facing dental education with a specific focus on incorporating the use of artificial intelligence (AI).\n\n\nMETHODS\nUsing the model in Bolman and Deal's Reframing Organizations, the Four Frames model serves as a road map for building infrastructure within dental schools for the adoption of AI.\n\n\nCONCLUSION\nAI can complement and boost human tasks and have a far-reaching impact in academia and health care. Its adoption could enhance educational experiences and the delivery of care, and support current functions and future innovation. The framework suggested in this paper, while specific to AI, could be adapted and applied to a myriad of innovations and new organizational ideals and goals within institutions of dental education.", "venue": "Journal of dental education", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-03", "journal": {"name": "Journal of dental education"}, "authors": [{"authorId": "32436596", "name": "Nadim M. Islam"}, {"authorId": "49437416", "name": "Lory Laughter"}, {"authorId": "1402477005", "name": "R. Sadid-Zadeh"}, {"authorId": "2158117940", "name": "Carlos S Smith"}, {"authorId": "2324805", "name": "T. Dolan"}, {"authorId": "145002565", "name": "Geralyn Crain"}, {"authorId": "4459938", "name": "C. Squarize"}]}, {"paperId": "c3d077909fec62c4495c8fcf8396cfb401ad4eef", "externalIds": {"DOI": "10.1080/09662839.2022.2101885", "CorpusId": 252163838}, "url": "https://www.semanticscholar.org/paper/c3d077909fec62c4495c8fcf8396cfb401ad4eef", "title": "Artificial intelligence and EU security: the false promise of digital sovereignty", "abstract": "ABSTRACT EU Digital Sovereignty has emerged as a priority for the EU Cyber Agenda to build free and safe, yet resilient cyberspace. In a traditional regulatory fashion, the EU has therefore sought to gain more control over third country-based digital intermediaries through legislative solutions regulating its internal market. Although potentially effective in shielding EU citizens from data exploitation by internet giants, this protectionist strategy tells us little about the EU\u2019s ability to develop Digital Sovereignty, beyond its capacity to react to the external tech industry. Given the growing hybridisation of warfare, building on the increasing integration of artificial intelligence (AI) in the security domain, leadership in advancing AI-related technology has a significant impact on countries\u2019 defence capacity. By framing AI as the intrinsic functioning of algorithms, data mining and computational capacity, we question what tools the EU could rely on to gain sovereignty in each of these dimensions of AI. By focusing on AI from an EU Foreign Policy perspective, we conclude that contrary to the growing narrative, given the absence of a leading AI industry and a coherent defence strategy, the EU has few tools to become a global leader in advancing standards of AI beyond its regulatory capacity.", "venue": "European Security", "year": 2022, "referenceCount": 121, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-03", "journal": {"volume": "31", "pages": "415 - 434", "name": "European Security"}, "authors": [{"authorId": "3024098", "name": "Andrea Calderaro"}, {"authorId": "2184479563", "name": "Stella Blumfelde"}]}, {"paperId": "7e595e9141f580823b00330c4c8c5c102caa7033", "externalIds": {"ArXiv": "2207.00859", "CorpusId": 250265033}, "url": "https://www.semanticscholar.org/paper/7e595e9141f580823b00330c4c8c5c102caa7033", "title": "The nature of properly human mathematics", "abstract": ". We claim that human mathematics is only a limited part of the consequences of the chosen basic axioms. Properly human mathematics varies with time but appears to have universal features which we try to analyze. In particular the functioning of the human brain privileges concept naming and short formulations. This leads to organizing mathematical knowledge structurally. We consider brie\ufb02y the problem of non-mathematical sciences.", "venue": "", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-02", "journal": null, "authors": [{"authorId": "2707351", "name": "D. Ruelle"}]}, {"paperId": "6c7abf617c0591be96a09776092271c72f49ff2f", "externalIds": {"DBLP": "journals/corr/abs-2207-00902", "ArXiv": "2207.00902", "DOI": "10.48550/arXiv.2207.00902", "CorpusId": 250264138}, "url": "https://www.semanticscholar.org/paper/6c7abf617c0591be96a09776092271c72f49ff2f", "title": "Complementary artificial intelligence designed to augment human discovery", "abstract": "Neither artificial intelligence designed to play Turing\u2019s imitation game, nor augmented intelligence built to maximize the human manipulation of information are tuned to accelerate innovation and improve humanity\u2019s collective advance against its greatest challenges. We reconceptualize and pilot beneficial AI to radically augment human understanding by complementing rather than competing with human cognitive capacity. Our approach to complementary intelligence builds on insights underlying the wisdom of crowds, which hinges on the independence and diversity of crowd members\u2019 information and approach. By programmatically incorporating information on the evolving distribution of scientific expertise from research papers, our approach follows the distribution of content in the literature while avoiding the scientific crowd and the hypotheses cognitively available to it. We use this approach to generate valuable predictions for what materials possess valuable energy-related properties (e.g., thermoelectricity), and what compounds possess valuable medical properties (e.g., asthma) that complement the human scientific crowd. We demonstrate that our complementary predictions, if identified by human scientists and inventors at all, are only discovered years further into the future. When we evaluate the promise of our predictions with first-principles or data-driven simulations of those properties, we demonstrate an \u201cexpectation gap\u201d such that increased complementarity of our predictions do not decrease and in some cases increase the probability of these properties above those discovered and published by human scientists. In summary, by tuning AI to avoid the crowd, we can generate hypotheses unlikely to be imagined or pursued without intervention until the distant future that promise to punctuate scientific advance. By identifying and correcting for collective human bias, these models also suggest opportunities to improve human prediction by reformulating science education for discovery.", "venue": "ArXiv", "year": 2022, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-02", "journal": {"volume": "abs/2207.00902", "name": "ArXiv"}, "authors": [{"authorId": "2313086", "name": "J. Sourati"}, {"authorId": "144002439", "name": "James A. Evans"}]}, {"paperId": "9406a68789bb9db1fe3a19ac7ff17d903ee8a9f4", "externalIds": {"DBLP": "journals/eswa/ShaoZYDW22", "DOI": "10.1016/j.eswa.2022.118221", "CorpusId": 251165327}, "url": "https://www.semanticscholar.org/paper/9406a68789bb9db1fe3a19ac7ff17d903ee8a9f4", "title": "Tracing the evolution of AI in the past decade and forecasting the emerging trends", "abstract": null, "venue": "Expert systems with applications", "year": 2022, "referenceCount": 91, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-01", "journal": {"volume": "209", "pages": "118221", "name": "Expert Syst. Appl."}, "authors": [{"authorId": "1740580186", "name": "Zhou Shao"}, {"authorId": "97993965", "name": "Ruoyan Zhao"}, {"authorId": "119548118", "name": "Sha Yuan"}, {"authorId": "2167927181", "name": "Mingjie Ding"}, {"authorId": "2154892557", "name": "Yongli Wang"}]}, {"paperId": "b671797d6c58b3874f61c58a73a28298a1052fa5", "externalIds": {"DBLP": "journals/chb/ChiarellaTGRBC22", "DOI": "10.1016/j.chb.2022.107406", "CorpusId": 250713930}, "url": "https://www.semanticscholar.org/paper/b671797d6c58b3874f61c58a73a28298a1052fa5", "title": "Investigating the negative bias towards artificial intelligence: Effects of prior assignment of AI-authorship on the aesthetic appreciation of abstract paintings", "abstract": null, "venue": "Computers in Human Behavior", "year": 2022, "referenceCount": 120, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-01", "journal": {"volume": "137", "pages": "107406", "name": "Comput. Hum. Behav."}, "authors": [{"authorId": "2050674730", "name": "S. G. Chiarella"}, {"authorId": "2177452448", "name": "Giulia Torromino"}, {"authorId": "2177458414", "name": "Dionigi M. Gagliardi"}, {"authorId": "46796439", "name": "D. Rossi"}, {"authorId": "2476126", "name": "F. Babiloni"}, {"authorId": "2572901", "name": "G. Cartocci"}]}, {"paperId": "e1d234f1c858e13c33e24179bcbcd199ffbf00fd", "externalIds": {"DOI": "10.1134/S1995080222100195", "CorpusId": 253450355}, "url": "https://www.semanticscholar.org/paper/e1d234f1c858e13c33e24179bcbcd199ffbf00fd", "title": "Learning Theory and Population Genetics", "abstract": null, "venue": "Lobachevskii Journal of Mathematics", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-01", "journal": {"volume": "43", "pages": "1655 - 1662", "name": "Lobachevskii Journal of Mathematics"}, "authors": [{"authorId": "144039873", "name": "S. Kozyrev"}]}, {"paperId": "f8cf58361f8db89b36e377e5ddaa97f31c9396f7", "externalIds": {"PubMedCentral": "9583359", "DOI": "10.4103/sjopt.sjopt_219_21", "CorpusId": 253043482, "PubMed": "36276252"}, "url": "https://www.semanticscholar.org/paper/f8cf58361f8db89b36e377e5ddaa97f31c9396f7", "title": "Performance of deep-learning artificial intelligence algorithms in detecting retinopathy of prematurity: A systematic review", "abstract": "PURPOSE: Artificial intelligence (AI) offers considerable promise for retinopathy of prematurity (ROP) screening and diagnosis. The development of deep-learning algorithms to detect the presence of disease may contribute to sufficient screening, early detection, and timely treatment for this preventable blinding disease. This review aimed to systematically examine the literature in AI algorithms in detecting ROP. Specifically, we focused on the performance of deep-learning algorithms through sensitivity, specificity, and area under the receiver operating curve (AUROC) for both the detection and grade of ROP. METHODS: We searched Medline OVID, PubMed, Web of Science, and Embase for studies published from January 1, 2012, to September 20, 2021. Studies evaluating the diagnostic performance of deep-learning models based on retinal fundus images with expert ophthalmologists' judgment as reference standard were included. Studies which did not investigate the presence or absence of disease were excluded. Risk of bias was assessed using the QUADAS-2 tool. RESULTS: Twelve studies out of the 175 studies identified were included. Five studies measured the performance of detecting the presence of ROP and seven studies determined the presence of plus disease. The average AUROC out of 11 studies was 0.98. The average sensitivity and specificity for detecting ROP was 95.72% and 98.15%, respectively, and for detecting plus disease was 91.13% and 95.92%, respectively. CONCLUSION: The diagnostic performance of deep-learning algorithms in published studies was high. Few studies presented externally validated results or compared performance to expert human graders. Large scale prospective validation alongside robust study design could improve future studies.", "venue": "Saudi journal of ophthalmology : official journal of the Saudi Ophthalmological Society", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-01", "journal": {"volume": "36", "pages": "296 - 307", "name": "Saudi Journal of Ophthalmology"}, "authors": [{"authorId": "2188462264", "name": "Amelia Bai"}, {"authorId": "2147403082", "name": "Christopher Carty"}, {"authorId": "145230414", "name": "S. Dai"}]}, {"paperId": "c171c14b4fc347139339ef6c225c2002e731b185", "externalIds": {"DBLP": "journals/pervasive/Pinhanez22", "DOI": "10.1109/MPRV.2022.3191245", "CorpusId": 251701366}, "url": "https://www.semanticscholar.org/paper/c171c14b4fc347139339ef6c225c2002e731b185", "title": "Rethinking Language Interaction With Pervasive Applications and Devices", "abstract": "Language-based interaction with pervasive devices today mostly follows a basic command-and-control paradigm, reminiscent of 1960s Star Trek, which is often cumbersome, inadequate, and insufficient. Key causes include an often deceptive portrayal of the language comprehension capabilities of the system and, in many cases, a problematic impersonation of human characters by computers. We argue here that a major challenge of pervasive computing is to rethink language-based interaction with applications and devices. Inspired by the imaginary pervasive conversations of Sci-Fi movies, we suggest a new design principle where machines should only utter statements that they can comprehend, which we call What You Hear Is What You Say (WYHIWYS). We provide some examples of WYHIWYS in language interactions with pervasive applications, including a deployment in an art exhibit, and discuss some key research challenges it poses to HCI, AI, and pervasive computing.", "venue": "IEEE Pervasive Computing", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-01", "journal": {"volume": "21", "pages": "24-31", "name": "IEEE Pervasive Computing"}, "authors": [{"authorId": "1766240", "name": "Claudio S. Pinhanez"}]}, {"paperId": "3e8217eb1c1d96be89ec5c22d449a8c2192629bc", "externalIds": {"DBLP": "journals/caeai/DaiK22", "DOI": "10.1016/j.caeai.2022.100087", "CorpusId": 250718443}, "url": "https://www.semanticscholar.org/paper/3e8217eb1c1d96be89ec5c22d449a8c2192629bc", "title": "Educational applications of artificial intelligence in simulation-based learning: A systematic mapping review", "abstract": null, "venue": "Comput. Educ. Artif. Intell.", "year": 2022, "referenceCount": 96, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-01", "journal": {"volume": "3", "pages": "100087", "name": "Comput. Educ. Artif. Intell."}, "authors": [{"authorId": "1864090606", "name": "Chih-Pu Dai"}, {"authorId": "1853961", "name": "Fengfeng Ke"}]}, {"paperId": "82a2410ffcc562e9c04510f71f91bf1dd2e7be5f", "externalIds": {"DOI": "10.1016/j.dyepig.2022.110547", "CorpusId": 250252406}, "url": "https://www.semanticscholar.org/paper/82a2410ffcc562e9c04510f71f91bf1dd2e7be5f", "title": "Photochromic and luminescent materials for the development of Chemical Artificial Intelligence", "abstract": null, "venue": "Dyes and Pigments", "year": 2022, "referenceCount": 87, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-01", "journal": {"name": "Dyes and Pigments"}, "authors": [{"authorId": "34356934", "name": "P. Gentili"}]}, {"paperId": "89c76be5ec5aa3bd6a337d53520d4fb52ad520a2", "externalIds": {"DOI": "10.1016/j.trc.2022.103679", "CorpusId": 248657195}, "url": "https://www.semanticscholar.org/paper/89c76be5ec5aa3bd6a337d53520d4fb52ad520a2", "title": "A literature review of Artificial Intelligence applications in railway systems", "abstract": null, "venue": "Transportation Research Part C: Emerging Technologies", "year": 2022, "referenceCount": 185, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": ["Review"], "publicationDate": "2022-07-01", "journal": {"name": "Transportation Research Part C: Emerging Technologies"}, "authors": [{"authorId": "2057059538", "name": "Ruifan Tang"}, {"authorId": "2164681475", "name": "Lorenzo De Donato"}, {"authorId": "7369644", "name": "Nikola Be\u0161inovi\u0107"}, {"authorId": "2441627", "name": "Francesco Flammini"}, {"authorId": "1774886", "name": "R. Goverde"}, {"authorId": "2164760844", "name": "Zhiyuan Lin"}, {"authorId": "48757839", "name": "Ronghui Liu"}, {"authorId": "80655344", "name": "Tianli Tang"}, {"authorId": "102360012", "name": "V. Vittorini"}, {"authorId": "66701629", "name": "Ziyulong Wang"}]}, {"paperId": "6ccbae2c6a91a91bed889544a0a662e6ede1b5ad", "externalIds": {"DOI": "10.16910/jemr.15.2.5", "CorpusId": 253436489}, "url": "https://www.semanticscholar.org/paper/6ccbae2c6a91a91bed889544a0a662e6ede1b5ad", "title": "Investigating visual expertise in sculpture: A methodological approach using eye tracking", "abstract": "Research on visual expertise has progressed significantly due to the availability of eye tracking tools. However, attempts to bring together research on expertise and eye tracking methodology provoke several challenges, because visual information processes should be studied in authentic and domain-specific environments. Among the barriers to designing appropriate research are the proper definition of levels of expertise, the tension between internal (experimental control) and external (authentic environments) validity, and the appropriate methodology to study eye movements in a three-dimensional environment. This exploratory study aims to address these challenges and to provide an adequate research setting by investigating visual expertise in sculpting. Eye movements and gaze patterns of 20 participants were investigated while looking at two sculptures in a museum. The participants were assigned to four different groups based on their level of expertise (laypersons, novices, semi-experts, experts). Using mobile eye tracking, the following parameters were measured: number of fixations, duration of fixation, dwell time in relevant areas, and revisits in relevant areas. Moreover, scan paths were analysed using the eyenalysis approach. Conclusions are drawn on both the nature of visual expertise in sculpting and the potential (and limitations) of empirical designs that aim to investigate expertise in authentic environments.", "venue": "Journal of Eye Movement Research", "year": 2022, "referenceCount": 45, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-30", "journal": {"name": "Journal of Eye Movement Research"}, "authors": [{"authorId": "1562175910", "name": "Isabell Stein"}, {"authorId": "2838193", "name": "Helen Jossberger"}, {"authorId": "1577977568", "name": "H. Gruber"}]}, {"paperId": "9b67f18f8b13e04df8ab33831a8f97cdc0373c9c", "externalIds": {"DOI": "10.1145/3522763", "CorpusId": 250118102}, "url": "https://www.semanticscholar.org/paper/9b67f18f8b13e04df8ab33831a8f97cdc0373c9c", "title": "A Static and Dynamic Attention Framework for Multi Turn Dialogue Generation", "abstract": "Recently, research on open domain dialogue systems have attracted extensive interests of academic and industrial researchers. The goal of an open domain dialogue system is to imitate humans in conversations. Previous works on single turn conversation generation have greatly promoted the research of open domain dialogue systems. However, understanding multiple single turn conversations is not equal to the understanding of multi turn dialogue due to the coherent and context dependent properties of human dialogue. Therefore, in open domain multi turn dialogue generation, it is essential to modeling the contextual semantics of the dialogue history, rather than only according to the last utterance. Previous research had verified the effectiveness of the hierarchical recurrent encoder-decoder framework on open domain multi turn dialogue generation. However, using RNN-based model to hierarchically encoding the utterances to obtain the representation of dialogue history still face the problem of a vanishing gradient. To address this issue, in this paper, we proposed a static and dynamic attention-based approach to model the dialogue history and then generate open domain multi turn dialogue responses. Experimental results on Ubuntu and Opensubtitles datasets verify the effectiveness of the proposed static and dynamic attention-based approach on automatic and human evaluation metrics in various experimental settings. Meanwhile, we also empirically verify the performance of combining the static and dynamic attentions on open domain multi turn dialogue generation.", "venue": "ACM Transactions on Information Systems", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-30", "journal": {"name": "ACM Journal of the ACM (JACM)"}, "authors": [{"authorId": "1806419", "name": "Weinan Zhang"}, {"authorId": "3043830", "name": "Yiming Cui"}, {"authorId": "2153281320", "name": "Kaiyan Zhang"}, {"authorId": "2115568958", "name": "Yifa Wang"}, {"authorId": "50736467", "name": "Qingfu Zhu"}, {"authorId": "2145679703", "name": "Lingzhi Li"}, {"authorId": "2140034831", "name": "Ting Liu"}]}, {"paperId": "491a1b8d433e53b786c5d6971f8ff262634d3d79", "externalIds": {"ArXiv": "2206.14876", "CorpusId": 250144493}, "url": "https://www.semanticscholar.org/paper/491a1b8d433e53b786c5d6971f8ff262634d3d79", "title": "AI in Asset Management and Rebellion Research", "abstract": "On October 30th, 2021, Rebellion Research\u2019s CEO announced in a Q3 2021 Letter to Investors that Rebellion\u2019s AI Global Equity strategy returned +6.8% gross for the first three quarters of 2021. \u201cIt\u2019s no surprise\u201d, Alex told us, \u201cour Machine Learning global strategy has a history of outperforming the S&P 500 for 14 years\u201d (see Exhibit 1). In 2021, Rebellion\u2019s brokerage accounts can be opened in over 70 countries, and Rebellion\u2019s research covers over 50 countries. Besides being an AI asset management company, Rebellion also defines itself as a top-tier, global machine learning think tank. Rebellion Research pays special attention to the financial application of ML and AI and has become a leading figure in the financial technology industry. In addition, through numerous partnerships with top American universities such as Columbia University, New York University,", "venue": "", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-29", "journal": null, "authors": [{"authorId": "120083176", "name": "J. Shen"}, {"authorId": "2174179255", "name": "Yihan Mo"}, {"authorId": "2174177138", "name": "Christopher Plimpton"}, {"authorId": "2174177819", "name": "Mustafa Ba\u015faran"}]}, {"paperId": "335094aecbee9a8fabec0a1aa680ac411c88b596", "externalIds": {"DBLP": "journals/corr/abs-2206-14672", "DOI": "10.48550/arXiv.2206.14672", "CorpusId": 250113617}, "url": "https://www.semanticscholar.org/paper/335094aecbee9a8fabec0a1aa680ac411c88b596", "title": "Is it possible not to cheat on the Turing Test: Exploring the potential and challenges for true natural language 'understanding' by computers", "abstract": "The increasing sophistication of NLP models has renewed optimism regarding machines achieving a full human-like command of natural language. Whilst work in NLP/NLU may have made great strides in that direction, the lack of conceptual clarity in how \u2018understanding\u2019 is used in this and other disciplines have made it difficult to discern how close we actually are. A critical, interdisciplinary review of current approaches and remaining challenges is yet to be carried out. Beyond linguistic knowledge, this requires considering our species-specific capabilities to categorize, memorize, label and communicate our (sufficiently similar) embodied and situated experiences. Moreover, gauging the practical constraints requires critically analyzing the technical capabilities of current models, as well as deeper philosophical reflection on theoretical possibilities and limitations. In this paper, I unite all of these perspectives\u2014the philosophical, cognitive-linguistic, and technical\u2014to unpack the challenges involved in approaching true (human-like) language understanding. By unpacking the theoretical assumptions inherent in current approaches, I hope to illustrate how far we actually are from achieving this goal, if indeed it is the goal.", "venue": "ArXiv", "year": 2022, "referenceCount": 122, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "abs/2206.14672", "name": "ArXiv"}, "authors": [{"authorId": "1415024767", "name": "Lize Alberts"}]}, {"paperId": "55cd46d1326578f8bd4cbad33f2140a9e4988f8c", "externalIds": {"DBLP": "conf/aaai/PazzaniSKQH22", "DOI": "10.1609/aaai.v36i11.21491", "CorpusId": 250298789}, "url": "https://www.semanticscholar.org/paper/55cd46d1326578f8bd4cbad33f2140a9e4988f8c", "title": "Expert-Informed, User-Centric Explanations for Machine Learning", "abstract": "We argue that the dominant approach to explainable AI for explaining image classification, annotating images with heatmaps, provides little value for users unfamiliar with deep learning. We argue that explainable AI for images should produce output like experts produce when communicating with one another, with apprentices, and with novices. We provide an expanded set of goals of explainable AI systems and propose a Turing Test for explainable AI.", "venue": "AAAI Conference on Artificial Intelligence", "year": 2022, "referenceCount": 53, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "12280-12286"}, "authors": [{"authorId": "1694780", "name": "M. Pazzani"}, {"authorId": "2174898403", "name": "Severine Soltani"}, {"authorId": "2174909928", "name": "Robert Kaufman"}, {"authorId": "2174876447", "name": "Samson Qian"}, {"authorId": "2174909444", "name": "Albert Hsiao"}]}, {"paperId": "4240d1ccb21511c276d8a40eeba3e81a4fc65d08", "externalIds": {"DBLP": "conf/aaai/NavigliBL22", "DOI": "10.1609/aaai.v36i11.21490", "CorpusId": 249564420}, "url": "https://www.semanticscholar.org/paper/4240d1ccb21511c276d8a40eeba3e81a4fc65d08", "title": "BabelNet Meaning Representation: A Fully Semantic Formalism to Overcome Language Barriers", "abstract": "Conceptual representations of meaning have long been the general focus of Artificial Intelligence (AI) towards the fundamental goal of machine understanding, with innumerable efforts made in Knowledge Representation, Speech and Natural Language Processing, Computer Vision, inter alia. Even today, at the core of Natural Language Understanding lies the task of Semantic Parsing, the objective of which is to convert natural sentences into machine-readable representations. Through this paper, we aim to revamp the historical dream of AI, by putting forward a novel, all-embracing, fully semantic meaning representation, that goes beyond the many existing formalisms. Indeed, we tackle their key limits by fully abstracting text into meaning and introducing language-independent concepts and semantic relations, in order to obtain an interlingual representation. Our proposal aims to overcome the language barrier, and connect not only texts across languages, but also images, videos, speech and sound, and logical formulas, across many fields of AI.", "venue": "AAAI", "year": 2022, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "12274-12279"}, "authors": [{"authorId": "2068519190", "name": "R. Navigli"}, {"authorId": "2008183673", "name": "Rexhina Blloshmi"}, {"authorId": "2153474065", "name": "Abelardo Carlos Mart\u0131\u0301nez Lorenzo"}]}, {"paperId": "e6ecdbbceff06cc1e667e3261596fd0fa6b32c4b", "externalIds": {"DBLP": "conf/aaai/CasaresLBhH22", "DOI": "10.1609/aaai.v36i5.20466", "CorpusId": 250290176}, "url": "https://www.semanticscholar.org/paper/e6ecdbbceff06cc1e667e3261596fd0fa6b32c4b", "title": "How General-Purpose Is a Language Model? Usefulness and Safety with Human Prompters in the Wild", "abstract": "The new generation of language models is reported to solve some extraordinary tasks the models were never trained for specifically, in few-shot or zero-shot settings. However, these reports usually cherry-pick the tasks, use the best prompts, and unwrap or extract the solutions leniently even if they are followed by nonsensical text. In sum, they are specialised results for one domain, a particular way of using the models and interpreting the results. In this paper, we present a novel theoretical evaluation framework and a distinctive experimental study assessing language models as general-purpose systems when used directly by human prompters --- in the wild. For a useful and safe interaction in these increasingly more common conditions, we need to understand when the model fails because of a lack of capability or a misunderstanding of the user's intents. Our results indicate that language models such as GPT-3 have limited understanding of the human command; far from becoming general-purpose systems in the wild.", "venue": "AAAI", "year": 2022, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "5295-5303"}, "authors": [{"authorId": "145163583", "name": "Pablo Antonio Moreno Casares"}, {"authorId": "25229391", "name": "B. S. Loe"}, {"authorId": "31502027", "name": "John Burden"}, {"authorId": "35793299", "name": "Se\u00e1n \u00d3 h\u00c9igeartaigh"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "82d9f1db6db43cb61fe4b0b26a489a2e72628675", "externalIds": {"ArXiv": "2206.12390", "DBLP": "journals/corr/abs-2206-12390", "DOI": "10.48550/arXiv.2206.12390", "CorpusId": 250048497}, "url": "https://www.semanticscholar.org/paper/82d9f1db6db43cb61fe4b0b26a489a2e72628675", "title": "A Test for Evaluating Performance in Human-Computer Systems", "abstract": "The Turing test for comparing computer performance to that of humans is well known, but, surprisingly, there is no widely used test for comparing how much better human-computer systems perform relative to humans alone, computers alone, or other baselines. Here, we show how to perform such a test using the ratio of means as a measure of effect size. Then we demonstrate the use of this test in three ways. First, in an analysis of 79 recently published experimental results, we \ufb01nd that, surprisingly, over half of the studies \ufb01nd a decrease in performance, the mean and median ratios of performance improvement are both approximately 1 (corresponding to no improvement at all), and the maximum ratio is 1.36 (a 36% improvement). Second, we experimentally investigate whether a higher performance improvement ratio is obtained when 100 human programmers generate software using GPT-3, a massive, state-of-the-art AI system. In this case, we \ufb01nd a speed improvement ratio of 1.27 (a 27% improvement). Finally, we \ufb01nd that 50 human non- programmers using GPT-3 can perform the task about as well as\u2013and less expensively than\u2013the human programmers. In this case, neither the non-programmers nor the computer would have been able to perform the task alone, so this is an example of a very strong form of human-computer synergy. stimulate competition among teams of computer and social scientists developing human-computer systems that perform far better than either people or computers alone. We believe this could bene\ufb01t our economy and society by fostering the development of software to augment humans rather than just replace them. And in the long run, it might also lead to creating \u201csuperintelligent\u201d human-computer systems.", "venue": "ArXiv", "year": 2022, "referenceCount": 79, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-24", "journal": {"volume": "abs/2206.12390", "name": "ArXiv"}, "authors": [{"authorId": "153604150", "name": "Andres Campero"}, {"authorId": "153024015", "name": "Michelle Vaccaro"}, {"authorId": "21524995", "name": "Jaeyoon Song"}, {"authorId": "2075349702", "name": "Haoran Wen"}, {"authorId": "3085084", "name": "Abdullah Almaatouq"}, {"authorId": "145850249", "name": "T. Malone"}]}, {"paperId": "08c7bb120cacb4365e23371984956aec952811f2", "externalIds": {"PubMedCentral": "9260143", "DOI": "10.3389/fncom.2022.892354", "CorpusId": 250006009, "PubMed": "35814345"}, "url": "https://www.semanticscholar.org/paper/08c7bb120cacb4365e23371984956aec952811f2", "title": "Augmenting Human Selves Through Artificial Agents \u2013 Lessons From the Brain", "abstract": "Much of current artificial intelligence (AI) and the drive toward artificial general intelligence (AGI) focuses on developing machines for functional tasks that humans accomplish. These may be narrowly specified tasks as in AI, or more general tasks as in AGI \u2013 but typically these tasks do not target higher-level human cognitive abilities, such as consciousness or morality; these are left to the realm of so-called \u201cstrong AI\u201d or \u201cartificial consciousness.\u201d In this paper, we focus on how a machine can augment humans rather than do what they do, and we extend this beyond AGI-style tasks to augmenting peculiarly personal human capacities, such as wellbeing and morality. We base this proposal on associating such capacities with the \u201cself,\u201d which we define as the \u201cenvironment-agent nexus\u201d; namely, a fine-tuned interaction of brain with environment in all its relevant variables. We consider richly adaptive architectures that have the potential to implement this interaction by taking lessons from the brain. In particular, we suggest conjoining the free energy principle (FEP) with the dynamic temporo-spatial (TSD) view of neuro-mental processes. Our proposed integration of FEP and TSD \u2013 in the implementation of artificial agents \u2013 offers a novel, expressive, and explainable way for artificial agents to adapt to different environmental contexts. The targeted applications are broad: from adaptive intelligence augmenting agents (IA\u2019s) that assist psychiatric self-regulation to environmental disaster prediction and personal assistants. This reflects the central role of the mind and moral decision-making in most of what we do as humans.", "venue": "Frontiers in Computational Neuroscience", "year": 2022, "referenceCount": 149, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-23", "journal": {"volume": "16", "name": "Frontiers in Computational Neuroscience"}, "authors": [{"authorId": "144296359", "name": "G. Northoff"}, {"authorId": "4479459", "name": "M. Fraser"}, {"authorId": "144525585", "name": "John Griffiths"}, {"authorId": "1872364", "name": "D. Pinotsis"}, {"authorId": "1784317", "name": "P. Panangaden"}, {"authorId": "39116315", "name": "R. Moran"}, {"authorId": "70438543", "name": "K. Friston"}]}, {"paperId": "228b535c67ada9f39b49593e97d6f20e8bbfcd20", "externalIds": {"PubMedCentral": "9208549", "DOI": "10.1038/s41578-022-00450-z", "CorpusId": 249873711, "PubMed": "35757102"}, "url": "https://www.semanticscholar.org/paper/228b535c67ada9f39b49593e97d6f20e8bbfcd20", "title": "Responsive materials architected in space and time", "abstract": null, "venue": "Nature Reviews Materials", "year": 2022, "referenceCount": 211, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-20", "journal": {"volume": "7", "pages": "683 - 701", "name": "Nature Reviews. Materials"}, "authors": [{"authorId": "46393090", "name": "X. Xia"}, {"authorId": "5162751", "name": "C. Spadaccini"}, {"authorId": "4380310", "name": "J. Greer"}]}, {"paperId": "b577c1a8c5601a6ac8eeec481688dbb2ccd798c3", "externalIds": {"DOI": "10.54517/wt.v2i1.1667", "CorpusId": 251477852}, "url": "https://www.semanticscholar.org/paper/b577c1a8c5601a6ac8eeec481688dbb2ccd798c3", "title": "Mobility aids for visually impaired persons: Journals reviewed", "abstract": "This paper reviews the literature on mobile assistive devices for visual impaired people, in order to have a clear understanding of the technology and technological progress of helping visual impaired people. In this way, it aims to obtain basic guidelines for analyzing the most relevant equipment to help people with impaired vision and highlight the improvements that can be achieved. The most common device is to integrate different sensors and electronic components into the walking stick to improve their obstacle detection ability. In addition, equipment with cameras, including computer vision algorithms and artificial intelligence technology, has been developed to improve the performance and efficiency of the equipment. Finally, the basic characteristics of the auxiliary system are introduced, and it is found that there is no equipment to meet the needs of users.", "venue": "Wearable Technology", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-06-16", "journal": {"name": "Wearable Technology"}, "authors": [{"authorId": "2181152750", "name": "Ahmed Alejandro Cardona Mesa"}, {"authorId": "2181152747", "name": "Ruben Dario Vasquez Salazar"}]}, {"paperId": "5de1970245eff7d2b5b6c914b5ba96df8f67aa1a", "externalIds": {"DBLP": "conf/ACMdis/KimJL22", "DOI": "10.1145/3532106.3533528", "CorpusId": 249579012}, "url": "https://www.semanticscholar.org/paper/5de1970245eff7d2b5b6c914b5ba96df8f67aa1a", "title": "Understanding the Negative Aspects of User Experience in Human-likeness of Voice-based Conversational Agents", "abstract": "With advances in artificial intelligence technology, Voice-based Conversational Agents (VCAs) can now imitate human abilities, sometimes almost indistinguishably from humans. However, concerns have been raised that too much perceived similarity can trigger threats and fears among users. This raises a question: Should VCAs be able to imitate humans perfectly? To address this, we explored what influences the negative aspects of user experience in human-like VCAs. We conducted a qualitative exploratory study to elicit participants\u2019 perceptions and feelings of human-like VCAs through comparable video prototypes of human\u2013agent conversation and human\u2013human conversation. We discovered that the dialogues of the human-likeness outside of the expressed purpose of a VCA and expressions pretending to come from a human identity could lead to negative experiences with VCAs. Based on our findings, we discussed design directions for overcoming potential issues of human imitation.", "venue": "Conference on Designing Interactive Systems", "year": 2022, "referenceCount": 78, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2022-06-13", "journal": {"name": "Designing Interactive Systems Conference"}, "authors": [{"authorId": "2155255349", "name": "Hye-youn Kim"}, {"authorId": "2115760976", "name": "Inchan Jung"}, {"authorId": "1722498", "name": "Youn-kyung Lim"}]}, {"paperId": "c1e9ba0f36cf9ab8c52106b2d75036221545a74b", "externalIds": {"DOI": "10.34190/eccws.21.1.510", "CorpusId": 249615287}, "url": "https://www.semanticscholar.org/paper/c1e9ba0f36cf9ab8c52106b2d75036221545a74b", "title": "Reith, Russell, and the Robots: AI, Warfare, and Shaping the Debate", "abstract": "On December 8th, 2021, Professor Stuart Russell delivered the second of that year\u2019s Reith Lectures, presented under the banner title \u2018Living With Artificial Intelligence\u2019. This specific talk dealt with \u2018The Future Role of AI in Warfare\u2019, and in this paper I propose a reading of Russell\u2019s address which both summarises and critiques his argument and stance, to determine what, if anything, can be taken from his position as effectively a public philosopher and applied in the realm of modern warfare, where ethical questions are taken from the seminar room and enacted in battlespace. The Reith lectures occupy a unique place in public discourse; given each year by a leading figure in the field under discussion, they help to shape opinion and debate. In considering the role of AI, and in particular its deployment in combat, there is undoubtedly a need for multi- and transdisciplinary thought, but the choice of Russell as the lecturer is not unproblematic. He is undoubtedly an expert in the field of AI, but he has no direct experience of working with the military, and is clearly not a neutral witness. He has been a leading figure in the campaign to ban research into autonomous weapon systems, and was closely involved in the production of Slaughterbots, a short film which presents a nightmare vision of swarming drones as agents of political repression. There are deep and serious questions to be asked about the role of AI in warfare, but Russell\u2019s position that we must stop all research in the field is arguably na\u00efve. Our adversaries will surely not be as punctilious. At the heart of the debate lie complex issues concerning human agency and control (and \u2018control\u2019 lies at the etymological root of \u2018cyber\u2019); this paper will use Russell\u2019s lecture as a starting point for the consideration of how we might develop an ethical doctrine for the use of AI, resting on the idea of human-machine teaming. It will, in short, argue for a cybernetic solution to the problems of cyber warfare.", "venue": "European Conference on Cyber Warfare and Security", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-06-10", "journal": {"name": "European Conference on Cyber Warfare and Security"}, "authors": [{"authorId": "143774639", "name": "K. Scott"}]}, {"paperId": "84d52ae7494077907185e036e8f9578b6071dd73", "externalIds": {"DOI": "10.1117/12.2636723", "CorpusId": 249590562}, "url": "https://www.semanticscholar.org/paper/84d52ae7494077907185e036e8f9578b6071dd73", "title": "The impact of learning rate and data size on CNN for skin cancer detection", "abstract": "Skin cancer is one of the diseases which affect large population in the world. Artificial Intelligence (AI) has been introduced in skin cancer diagnosis in decades. The convolutional neural networks (CNNs) is a deep learning technology used in image classification for skin cancer diagnosis. The study in this article explores show data size and learning rate influence the accuracy of the CNN model. In the study, the best validation accuracy of the CNN model can reach 92.05%. The result shows that the CNN model can effectively diagnose skin cancer with the adjusted learning rate and data size.", "venue": "Other Conferences", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-06-10", "journal": {"volume": "12179", "pages": "1217908 - 1217908-7"}, "authors": [{"authorId": "2170117850", "name": "Jingwen Pan"}]}, {"paperId": "f070418bce9045336c7486fcf7fc390f0ca2ea44", "externalIds": {"DBLP": "journals/jcal/PhamS22", "DOI": "10.1111/jcal.12687", "CorpusId": 249560206}, "url": "https://www.semanticscholar.org/paper/f070418bce9045336c7486fcf7fc390f0ca2ea44", "title": "The development of artificial intelligence in education: A review in context", "abstract": null, "venue": "J. Comput. Assist. Learn.", "year": 2022, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-06-08", "journal": {"volume": "38", "pages": "1408-1421", "name": "J. Comput. Assist. Learn."}, "authors": [{"authorId": "2066323655", "name": "Son Pham"}, {"authorId": "2073958193", "name": "P. Sampson"}]}, {"paperId": "7b996086ad1ef92ed98ce734a329c51e0aab3e24", "externalIds": {"ArXiv": "2206.01583", "DBLP": "journals/corr/abs-2206-01583", "DOI": "10.48550/arXiv.2206.01583", "CorpusId": 249375501}, "url": "https://www.semanticscholar.org/paper/7b996086ad1ef92ed98ce734a329c51e0aab3e24", "title": "Findings of the The RuATD Shared Task 2022 on Artificial Text Detection in Russian", "abstract": "We present the shared task on artificial text detection in Russian, which is organized as a part of the Dialogue Evaluation initiative, held in 2022. The shared task dataset includes texts from 14 text generators, i.e., one human writer and 13 text generative models fine-tuned for one or more of the following generation tasks: machine translation, paraphrase generation, text summarization, text simplification. We also consider back-translation and zero-shot generation approaches. The human-written texts are collected from publicly available resources across multiple domains. The shared task consists of two sub-tasks: (i) to determine if a given text is automatically generated or written by a human; (ii) to identify the author of a given text. The first task is framed as a binary classification problem. The second task is a multi-class classification problem. We provide count-based and BERT-based baselines, along with the human evaluation on the first sub-task. A total of 30 and 8 systems have been submitted to the binary and multi-class sub-tasks, correspondingly. Most teams outperform the baselines by a wide margin. We publicly release our codebase, human evaluation results, and other materials in our GitHub repository.", "venue": "Computational Linguistics and Intellectual Technologies", "year": 2022, "referenceCount": 58, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-03", "journal": {"volume": "abs/2206.01583", "name": "ArXiv"}, "authors": [{"authorId": "148240197", "name": "T. Shamardina"}, {"authorId": "51259225", "name": "V. Mikhailov"}, {"authorId": "2168096619", "name": "Daniil Chernianskii"}, {"authorId": "10054744", "name": "Alena Fenogenova"}, {"authorId": "2168096594", "name": "Marat Saidov"}, {"authorId": "2168101608", "name": "A. Valeeva"}, {"authorId": "21159845", "name": "Tatiana Shavrina"}, {"authorId": "120272188", "name": "I. Smurov"}, {"authorId": "2141764359", "name": "Elena Tutubalina"}, {"authorId": "13033978", "name": "E. Artemova"}]}, {"paperId": "c6641a3d8e0cc29ff96bcbc4d5f12a124557d65a", "externalIds": {"DOI": "10.1177/10946705221103531", "CorpusId": 249359545}, "url": "https://www.semanticscholar.org/paper/c6641a3d8e0cc29ff96bcbc4d5f12a124557d65a", "title": "Conscious Empathic AI in Service", "abstract": "Recent advances in artificial intelligence (AI) have achieved human-scale speed and accuracy for classification tasks. Current systems do not need to be conscious to recognize patterns and classify them. However, for AI to advance to the next level, it needs to develop capabilities such as metathinking, creativity, and empathy. We contend that such a paradigm shift is possible through a fundamental change in the state of artificial intelligence toward consciousness, similar to what took place for humans through the process of natural selection and evolution. To that end, we propose that consciousness in AI is an emergent phenomenon that primordially appears when two machines cocreate their own language through which they can recall and communicate their internal state of time-varying symbol manipulation. Because, in our view, consciousness arises from the communication of inner states, it leads to empathy. We then provide a link between the empathic quality of machines and better service outcomes associated with empathic human agents that can also lead to accountability in AI services. Graphical Abstract", "venue": "Journal of Service Research", "year": 2022, "referenceCount": 136, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-03", "journal": {"volume": "25", "pages": "549 - 564", "name": "Journal of Service Research"}, "authors": [{"authorId": "1696563", "name": "H. Esmaeilzadeh"}, {"authorId": "2129191", "name": "R. Vaezi"}]}, {"paperId": "6c3ea5bb20d86f107b3005482bbeb6b54ccd8eb8", "externalIds": {"PubMedCentral": "9204052", "DOI": "10.3389/fpsyg.2022.819042", "CorpusId": 249284119, "PubMed": "35719586"}, "url": "https://www.semanticscholar.org/paper/6c3ea5bb20d86f107b3005482bbeb6b54ccd8eb8", "title": "Going Beyond the \u201cSynthetic Method\u201d: New Paradigms Cross-Fertilizing Robotics and Cognitive Neuroscience", "abstract": "In so-called ethorobotics and robot-supported social cognitive neurosciences, robots are used as scientific tools to study animal behavior and cognition. Building on previous epistemological analyses of biorobotics, in this article it is argued that these two research fields, widely differing from one another in the kinds of robots involved and in the research questions addressed, share a common methodology, which significantly differs from the \u201csynthetic method\u201d that, until recently, dominated biorobotics. The methodological novelty of this strategy, the research opportunities that it opens, and the theoretical and technological challenges that it gives rise to, will be discussed with reference to the peculiarities of the two research fields. Some broad methodological issues related to the generalization of results concerning robot-animal interaction to theoretical conclusions on animal-animal interaction will be identified and discussed.", "venue": "Frontiers in Psychology", "year": 2022, "referenceCount": 77, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-03", "journal": {"volume": "13", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "3133425", "name": "E. Datteri"}, {"authorId": "1728769", "name": "T. Chaminade"}, {"authorId": "2055734634", "name": "Donato Romano"}]}, {"paperId": "665693d7fd06545e68ec746a42efccceff40fc0f", "externalIds": {"DOI": "10.1055/a-1718-8846", "CorpusId": 249326970}, "url": "https://www.semanticscholar.org/paper/665693d7fd06545e68ec746a42efccceff40fc0f", "title": "K\u00fcnstliche Intelligenz in der Radiologie", "abstract": "Die klinische Radiologie mit ihren digitalen Daten ist geradezu pr\u00e4destiniert f\u00fcr den erfolgreichen Einsatz der k\u00fcnstlichen Intelligenz (KI). Am Beispiel verschiedener praktischer\n Anwendungen wird nachfolgend dargestellt, wo und wie die KI in der Radiologie eingesetzt wird und dabei auch die Frage beantwortet, inwieweit sie Radiolog*innen ersetzen kann.", "venue": "Radiologie up2date", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-06-01", "journal": {"name": "Radiologie up2date"}, "authors": [{"authorId": "151120822", "name": "M. Kromrey"}, {"authorId": "2167811765", "name": "Sascha Grothe"}, {"authorId": "2073890146", "name": "C. Nell"}, {"authorId": "2071431220", "name": "B. Rosenberg"}]}, {"paperId": "5da1b0c659c0c6abbfba241430c1830344791c59", "externalIds": {"DBLP": "journals/alife/GaborIZLMBL22", "DOI": "10.1162/artl_a_00359", "CorpusId": 250118132}, "url": "https://www.semanticscholar.org/paper/5da1b0c659c0c6abbfba241430c1830344791c59", "title": "Self-Replication in Neural Networks", "abstract": "Abstract A key element of biological structures is self-replication. Neural networks are the prime structure used for the emergent construction of complex behavior in computers. We analyze how various network types lend themselves to self-replication. Backpropagation turns out to be the natural way to navigate the space of network weights and allows non-trivial self-replicators to arise naturally. We perform an in-depth analysis to show the self-replicators\u2019 robustness to noise. We then introduce artificial chemistry environments consisting of several neural networks and examine their emergent behavior. In extension to this work\u2019s previous version (Gabor et al., 2019), we provide an extensive analysis of the occurrence of fixpoint weight configurations within the weight space and an approximation of their respective attractor basins.", "venue": "Artificial Life", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-01", "journal": {"volume": "28", "pages": "205-223", "name": "Artificial Life"}, "authors": [{"authorId": "1599420389", "name": "Thomas Gabor"}, {"authorId": "51893497", "name": "Steffen Illium"}, {"authorId": "2122346529", "name": "Maximilian Zorn"}, {"authorId": "2174063860", "name": "Cristian Lenta"}, {"authorId": "38928863", "name": "Andy Mattausch"}, {"authorId": "1841968", "name": "Lenz Belzner"}, {"authorId": "1402371578", "name": "C. Linnhoff-Popien"}]}, {"paperId": "c9fb788bdbf0d5d449e4c9f344cd9575bb39c367", "externalIds": {"DBLP": "journals/entropy/0001L22", "PubMedCentral": "9222757", "DOI": "10.3390/e24060819", "CorpusId": 249634376, "PubMed": "35741540"}, "url": "https://www.semanticscholar.org/paper/c9fb788bdbf0d5d449e4c9f344cd9575bb39c367", "title": "Competency in Navigating Arbitrary Spaces as an Invariant for Analyzing Cognition in Diverse Embodiments", "abstract": "One of the most salient features of life is its capacity to handle novelty and namely to thrive and adapt to new circumstances and changes in both the environment and internal components. An understanding of this capacity is central to several fields: the evolution of form and function, the design of effective strategies for biomedicine, and the creation of novel life forms via chimeric and bioengineering technologies. Here, we review instructive examples of living organisms solving diverse problems and propose competent navigation in arbitrary spaces as an invariant for thinking about the scaling of cognition during evolution. We argue that our innate capacity to recognize agency and intelligence in unfamiliar guises lags far behind our ability to detect it in familiar behavioral contexts. The multi-scale competency of life is essential to adaptive function, potentiating evolution and providing strategies for top-down control (not micromanagement) to address complex disease and injury. We propose an observer-focused viewpoint that is agnostic about scale and implementation, illustrating how evolution pivoted similar strategies to explore and exploit metabolic, transcriptional, morphological, and finally 3D motion spaces. By generalizing the concept of behavior, we gain novel perspectives on evolution, strategies for system-level biomedical interventions, and the construction of bioengineered intelligences. This framework is a first step toward relating to intelligence in highly unfamiliar embodiments, which will be essential for progress in artificial intelligence and regenerative medicine and for thriving in a world increasingly populated by synthetic, bio-robotic, and hybrid beings.", "venue": "Entropy", "year": 2022, "referenceCount": 251, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-06-01", "journal": {"volume": "24", "name": "Entropy"}, "authors": [{"authorId": "144993883", "name": "C. Fields"}, {"authorId": "2070083615", "name": "M. Levin"}]}, {"paperId": "3393331480eeb0d0acf81e06b35a7d4722e87c1a", "externalIds": {"PubMedCentral": "9240685", "DOI": "10.1098/rsif.2022.0214", "CorpusId": 247382247, "PubMed": "35765805"}, "url": "https://www.semanticscholar.org/paper/3393331480eeb0d0acf81e06b35a7d4722e87c1a", "title": "May the 4C's be with you: an overview of complexity-inspired frameworks for analysing resting-state neuroimaging data", "abstract": "Competing and complementary models of resting-state brain dynamics contribute to our phenomenological and mechanistic understanding of whole-brain coordination and communication, and provide potential evidence for differential brain functioning associated with normal and pathological behaviour. These neuroscientific theories stem from the perspectives of physics, engineering, mathematics and psychology and create a complicated landscape of domain-specific terminology and meaning, which, when used outside of that domain, may lead to incorrect assumptions and conclusions within the neuroscience community. Here, we review and clarify the key concepts of connectivity, computation, criticality and coherence\u2014the 4C's\u2014and outline a potential role for metastability as a common denominator across these propositions. We analyse and synthesize whole-brain neuroimaging research, examined through functional magnetic imaging, to demonstrate that complexity science offers a principled and integrated approach to describe, and potentially understand, macroscale spontaneous brain functioning.", "venue": "Journal of the Royal Society Interface", "year": 2022, "referenceCount": 182, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-01", "journal": {"volume": "19", "name": "Journal of the Royal Society Interface"}, "authors": [{"authorId": "2150793311", "name": "F. Hancock"}, {"authorId": "2333161", "name": "Fernando E. Rosas"}, {"authorId": "7486237", "name": "P. Mediano"}, {"authorId": "1380744267", "name": "A. Luppi"}, {"authorId": "2149249638", "name": "J. Cabral"}, {"authorId": "7013131", "name": "O. Dipasquale"}, {"authorId": "1691067", "name": "F. Turkheimer"}]}, {"paperId": "11624c026132e37c8909bd2eef6139af613e7e30", "externalIds": {"DOI": "10.1007/s11229-022-03695-x", "CorpusId": 249260212}, "url": "https://www.semanticscholar.org/paper/11624c026132e37c8909bd2eef6139af613e7e30", "title": "Panpsychism and AI consciousness", "abstract": null, "venue": "Synthese", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-05-31", "journal": {"name": "Synthese"}, "authors": [{"authorId": "37802891", "name": "Marcus Arvan"}, {"authorId": "3030854", "name": "Corey J. Maley"}]}, {"paperId": "653ef7ab22217cfe74015157200a8dd31152f339", "externalIds": {"PubMedCentral": "9194558", "DOI": "10.3389/fnbot.2022.728829", "CorpusId": 249183566, "PubMed": "35711283"}, "url": "https://www.semanticscholar.org/paper/653ef7ab22217cfe74015157200a8dd31152f339", "title": "Is It Necessary to Integrate Evo-Devo to the Analysis and Construction of Artificial Emotional Systems?", "abstract": null, "venue": "Frontiers in Neurorobotics", "year": 2022, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-31", "journal": {"volume": "16", "name": "Frontiers in Neurorobotics"}, "authors": [{"authorId": "2166989334", "name": "Jorge Luis Hern\u00e1ndez-Ochoa"}, {"authorId": "1398581101", "name": "F. Vergara-Silva"}]}, {"paperId": "ba066efae508e79fb34984c50311f53f64be6284", "externalIds": {"DOI": "10.1109/COMSCI55378.2022.9912577", "CorpusId": 252849476}, "url": "https://www.semanticscholar.org/paper/ba066efae508e79fb34984c50311f53f64be6284", "title": "Evolution of the Concept of Self-Organization by the Founding Fathers of A.I.", "abstract": "The paper makes a literature overview of the classic concepts of the founding fathers of artificial intelligence, in an attempt to prove the bigger potential of self-organization over machine learning as a method to achieve really autonomous decision-making methods.", "venue": "2022 10th International Scientific Conference on Computer Science (COMSCI)", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2022-05-30", "journal": {"pages": "1-7", "name": "2022 10th International Scientific Conference on Computer Science (COMSCI)"}, "authors": [{"authorId": "38716791", "name": "A. Marchev"}, {"authorId": "2187592469", "name": "Milena Piryankova"}]}, {"paperId": "7cc18a9edbd41adf21023be826bd9f5f9fa26af6", "externalIds": {"DOI": "10.4467/20843976zk.22.003.15869", "CorpusId": 252502039}, "url": "https://www.semanticscholar.org/paper/7cc18a9edbd41adf21023be826bd9f5f9fa26af6", "title": "Zaawansowane procedury NLP jako przes\u0142anka rekonstrukcji idei wiedzy", "abstract": "Advanced NLP Procedures as Premises for the Reconstruction of the Idea of Knowledge\n\nThe article presents the current state of development of the Natural Language Processing (NLP) technology, in particular the GPT-3 language model, and presents its consequences for understanding the phenomenon of knowledge. The NLP technology has been experiencing remarkable development recently. The GPT-3 language model presents a level of advancement that allows it to generate texts as answers to general questions, as summaries of the presented text, etc., which reach the level surpassing the analogous level of human texts. These algorithmic operations lead to the determination of the probability distribution of its components. Texts generated by such a model should be considered as autonomous texts, using immanent, implicit knowledge embedded in language. This conclusion raises questions about the status of such knowledge. Help in the analysis is provided also by the theory of discourse, as well as the theory of discursive space based on it, that proposes the interpretation of knowledge as a trajectory of discourses in a dynamical space. Recognizing that knowledge may also be autonomous, and in particular not be at the exclusive disposal of humans, leads to the question of the status of artificial cognitive agents, such as the GPT-3 language model.", "venue": "Zarz\u0105dzanie w Kulturze", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-30", "journal": {"name": "Zarz\u0105dzanie w Kulturze"}, "authors": [{"authorId": "10712104", "name": "R. Maci\u0105g"}]}, {"paperId": "1cad9f8d14a92549594f8e1ec048ac9d079bb9fd", "externalIds": {"DOI": "10.3390/philosophies7030057", "CorpusId": 249217491}, "url": "https://www.semanticscholar.org/paper/1cad9f8d14a92549594f8e1ec048ac9d079bb9fd", "title": "From Turing to Conscious Machines", "abstract": "In the period between Turing\u2019s 1950 \u201cComputing Machinery and Intelligence\u201d and the current considerable public exposure to the term \u201cartificial intelligence (AI)\u201d, Turing\u2019s question \u201cCan a machine think?\u201d has become a topic of daily debate in the media, the home, and, indeed, the pub. However, \u201cCan a machine think?\u201d is sliding towards a more controversial issue: \u201cCan a machine be conscious?\u201d Of course, the two issues are linked. It is held here that consciousness is a pre-requisite to thought. In Turing\u2019s imitation game, a conscious human player is replaced by a machine, which, in the first place, is assumed not to be conscious, and which may fool an interlocutor, as consciousness cannot be perceived from an individual\u2019s speech or action. Here, the developing paradigm of machine consciousness is examined and combined with an extant analysis of living consciousness to argue that a conscious machine is feasible, and capable of thinking. The route to this utilizes learning in a \u201cneural state machine\u201d, which brings into play Turing\u2019s view of neural \u201cunorganized\u201d machines. The conclusion is that a machine of the \u201cunorganized\u201d kind could have an artificial form of consciousness that resembles the natural form and that throws some light on its nature.", "venue": "Philosophies", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-29", "journal": {"name": "Philosophies"}, "authors": [{"authorId": "1699999", "name": "I. Aleksander"}]}, {"paperId": "7b8b180ce09b2e8298baca16015ea1dde574314a", "externalIds": {"DOI": "10.24018/ejbmr.2022.7.3.1432", "CorpusId": 249217793}, "url": "https://www.semanticscholar.org/paper/7b8b180ce09b2e8298baca16015ea1dde574314a", "title": "Artificial Intelligence in Construction Projects: An Explorative Study of Professionals\u2019 Expectations", "abstract": "have a huge impact on projects and project management practices in the forthcoming years. The purpose of this paper is to contribute to project management theory and practice in the construction industry by analyzing the expectations of project professionals. A mixed method based on an international survey and semi-structured interviews was applied. The results show that construction project practitioners are looking for AI solutions to support the quantitative processes mainly related to scope, schedule, cost, quality, and risk management. However, the human-related processes, such as communication and stakeholder management, are not expected to be directly enhanced by AI, although might benefit from it indirectly. The findings also demonstrate a difference between amplifying and accelerating countries, where somewhat surprisingly the latter are more ready to adopt AI in their projects.", "venue": "European Journal of Business and Management Research", "year": 2022, "referenceCount": 127, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-05-28", "journal": {"name": "European Journal of Business and Management Research"}, "authors": [{"authorId": "90220793", "name": "Vered Holzmann"}, {"authorId": "2167191576", "name": "Michele Lechiara"}]}, {"paperId": "50902395c5fab923f833cdc97d4da40d1888e398", "externalIds": {"PubMedCentral": "9167026", "DOI": "10.1155/2022/2169521", "CorpusId": 249372070, "PubMed": "35669659"}, "url": "https://www.semanticscholar.org/paper/50902395c5fab923f833cdc97d4da40d1888e398", "title": "Application of Artificial Intelligence System Based on Wireless Sensor Network in Enterprise Management", "abstract": "With the improvement of the ability to acquire natural information, wireless sensor networks also need to transmit corresponding information in terms of collecting information. Wireless sensor nodes have great application prospects as a key component of wireless sensors. Therefore, different wireless sensors play an important decisive role in the operation of wireless network applications. With the continuous development of wireless sensor networks, existing wireless sensor network nodes exhibit limitations and shortcomings such as inflexible structure, low variability, and low versatility. Specifically, the learning and neural networks obtained by different artificial intelligence expert systems in computing technology are different. On the one hand, it can meet the needs of users for information systems to a certain extent, and on the other hand, it can also help accelerate the development of computer science. At present, the new generation of information technology industry is listed in the seven emerging strategic industries of the country. The new cloud computing technology has gradually expanded to important corporate governance capabilities in terms of information technology. The intelligent application of cloud computing technology replaces traditional enterprise management technology. Efficiency management and risk management can improve the quality and business capabilities of the entire enterprise, improve system applications according to the actual situation of the enterprise, improve system applications, and implement health and the sustainable development of the enterprise, thereby promoting the sustainable development of the computer technology industry.", "venue": "Computational intelligence and neuroscience", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-27", "journal": {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, "authors": [{"authorId": "2149140570", "name": "Kefeng Li"}]}, {"paperId": "b0f96566dc80ae46f69c4d606686e19a88347d52", "externalIds": {"ArXiv": "2205.13131", "DBLP": "journals/corr/abs-2205-13131", "DOI": "10.48550/arXiv.2205.13131", "CorpusId": 249097666}, "url": "https://www.semanticscholar.org/paper/b0f96566dc80ae46f69c4d606686e19a88347d52", "title": "On the Evolution of A.I. and Machine Learning: Towards Measuring and Understanding Impact, Influence, and Leadership at Premier A.I. Conferences", "abstract": "Arti\ufb01cial Intelligence is now recognized as a general-purpose technology with ample impact on human life. In this work, we aim to understand the evolution of AI and Machine learning over the years by analyzing researchers\u2019 impact, in\ufb02uence, and leadership over the last decades. This work also intends to shed new light on the history and evolution of AI by exploring the dynamics involved in the \ufb01eld\u2019s evolution through the lenses of the papers published on AI conferences since the \ufb01rst International Joint Conference on Arti\ufb01cial Intelligence (IJCAI) in 1969. AI development and evolution have led to increasing research output, re\ufb02ected in the number of articles published over the last sixty years. We construct comprehensive citation-collaboration and paper-author datasets and compute corresponding centrality measures to carry out our analyses. These analyses allow a better understanding of how AI has reached its current state of affairs in research. Throughout the process, we correlate these datasets with the work of the ACM Turing Award winners and the so-called two AI winters the \ufb01eld has gone through. We also look at self-citation trends and new authors\u2019 behaviors. Finally, we present a novel way to infer the country of af\ufb01liation of a paper from its organization. Therefore, this work provides a deep analysis of Arti\ufb01cial Intelligence history from information gathered and analyzed from large technical venues datasets and suggests novel insights that can contribute to understanding and measuring AI\u2019s evolution.", "venue": "ArXiv", "year": 2022, "referenceCount": 150, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-26", "journal": {"volume": "abs/2205.13131", "name": "ArXiv"}, "authors": [{"authorId": "2105610568", "name": "Rafael B. Audibert"}, {"authorId": "2065162795", "name": "Henrique Lemos"}, {"authorId": "144862483", "name": "Pedro H. C. Avelar"}, {"authorId": "2226999", "name": "A. Tavares"}, {"authorId": "2335532", "name": "L. Lamb"}]}, {"paperId": "fa5c9c3cabacc1abc44a8ad1f1cef0fbae1f6067", "externalIds": {"DOI": "10.3390/app12115373", "CorpusId": 249117883}, "url": "https://www.semanticscholar.org/paper/fa5c9c3cabacc1abc44a8ad1f1cef0fbae1f6067", "title": "Chinese Named Entity Recognition Based on Knowledge Based Question Answering System", "abstract": "The KBQA (Knowledge-Based Question Answering) system is an essential part of the smart customer service system. KBQA is a type of QA (Question Answering) system based on KB (Knowledge Base). It aims to automatically answer natural language questions by retrieving structured data stored in the knowledge base. Generally, when a KBQA system receives the user\u2019s query, it first needs to recognize topic entities of the query, such as name, location, organization, etc. This process is the NER (Named Entity Recognition). In this paper, we use the Bidirectional Long Short-Term Memory-Conditional Random Field (Bi-LSTM-CRF) model and introduce the SoftLexicon method for a Chinese NER task. At the same time, according to the analysis of the characteristics of application scenario, we propose a fuzzy matching module based on the combination of multiple methods. This module can efficiently modify the error recognition results, which can further improve the performance of entity recognition. We combine the NER model and the fuzzy matching module into an NER system. To explore the availability of the system in some specific fields, such as a power grid field, we utilize the power grid-related original data collected by the Hebei Electric Power Company to improve our system according to the characteristics of data in the power grid field. We innovatively make the dataset and high-frequency word lexicon in the power grid field, which makes our proposed NER system perform better in recognizing entities in the field of power grid. We used the cross-validation method for validation. The experimental results show that the F1-score of the improved NER model on the power grid dataset reaches 92.43%. After processing the recognition results by using the fuzzy matching module, about 99% of the entities in the test set can be correctly recognized. It proves that the proposed NER system can achieve excellent performance in the application scenario of a power grid. The results of this work will also fill the gap in the research of intelligent customer-service-related technologies in the power grid field in China.", "venue": "Applied Sciences", "year": 2022, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-26", "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "16075609", "name": "Didi Yin"}, {"authorId": "2125160755", "name": "Siyuan Cheng"}, {"authorId": "2149190829", "name": "Boxu Pan"}, {"authorId": "2166548040", "name": "Yuanyuan Qiao"}, {"authorId": "47748857", "name": "Wei Zhao"}, {"authorId": "2142655724", "name": "Dongyu Wang"}]}, {"paperId": "3f73e267744f98cffdea5550bcc950f6a928a120", "externalIds": {"DBLP": "journals/corr/abs-2205-12749", "ArXiv": "2205.12749", "DOI": "10.48550/arXiv.2205.12749", "CorpusId": 249063006}, "url": "https://www.semanticscholar.org/paper/3f73e267744f98cffdea5550bcc950f6a928a120", "title": "A Human-Centric Assessment Framework for AI", "abstract": "With the rise of AI systems in real-world applications comes the need for reliable and trustworthy AI. An essential aspect of this are explainable AI systems. However, there is no agreed standard on how explainable AI systems should be assessed. Inspired by the Turing test, we introduce a human-centric assessment framework where a leading domain expert accepts or rejects the solutions of an AI system and another domain expert. By comparing the acceptance rates of provided solutions, we can assess how the AI system performs compared to the domain expert, and whether the AI system\u2019s explanations (if provided) are human-understandable. This setup\u2014comparable to the Turing test\u2014can serve as a framework for a wide range of human-centric AI system assessments. We demonstrate this by presenting two instantiations: (1) an assessment that measures the classi\ufb01cation accuracy of a system with the option to incorporate label uncertainties; (2) an assessment where the usefulness of provided explanations is determined in a human-centric manner.", "venue": "ArXiv", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-25", "journal": {"volume": "abs/2205.12749", "name": "ArXiv"}, "authors": [{"authorId": "3467930", "name": "S. Saralajew"}, {"authorId": "40515722", "name": "Ammar Shaker"}, {"authorId": "2166335112", "name": "Zhao Xu"}, {"authorId": "24868638", "name": "Kiril Gashteovski"}, {"authorId": "2105201", "name": "Bhushan Kotnis"}, {"authorId": "2166312218", "name": "Wiem Ben-Rim"}, {"authorId": "152845986", "name": "J\u00fcrgen Quittek"}, {"authorId": "19752252", "name": "Carolin (Haas) Lawrence"}]}, {"paperId": "ddeff568cda01b968e2b4564274931675e2acb81", "externalIds": {"DOI": "10.3390/proceedings2022081147", "CorpusId": 249112695}, "url": "https://www.semanticscholar.org/paper/ddeff568cda01b968e2b4564274931675e2acb81", "title": "Three Approaches to Artificial Intelligence", "abstract": ": The aim of this paper is the expansion of understanding what intelligence is, what is being performed in the area of AI and in which direction to move further in this area. To achieve these goals, the strati\ufb01ed componential model of intelligence in general and AI, in particular, is introduced and studied. Its application entails three approaches to the development of arti\ufb01cial intelligence.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-25", "journal": {"name": "The 2021 Summit of the International Society for the Study of Information"}, "authors": [{"authorId": "2073713180", "name": "M. Burgin"}]}, {"paperId": "a596e546e8a913d2121bf5dc9effc43631434d3b", "externalIds": {"DOI": "10.12688/digitaltwin.17574.1", "CorpusId": 249077431}, "url": "https://www.semanticscholar.org/paper/a596e546e8a913d2121bf5dc9effc43631434d3b", "title": "Intelligent digital twins and the development and management of complex systems", "abstract": "The interest in defining and implementing Digital Twins (DT) is at the forefront of today\u2019s product organizations. The evolution of increasingly complex systems requires that their information be organized and managed via digital twins.\u00a0 In addition, the development of Artificial Intelligence (AI) will result in an increasing degree of system complexity. These complex systems will exhibit true emergent behavior as AIs modify system aspects as the result of goal seeking and learning. DTs will need to increase in capability, becoming intelligent in their approach. This article presents a discussion on how these Intelligent Digital Twins (IDTs) will evolve and assist in developing and managing complex systems.", "venue": "Digital Twin", "year": 2022, "referenceCount": 40, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-25", "journal": {"name": "Digital Twin"}, "authors": [{"authorId": "2022322", "name": "Michael W. Grieves"}]}, {"paperId": "697aa30bd8d5e45b75b865a173b935612b8d6c84", "externalIds": {"PubMedCentral": "9590390", "DOI": "10.1007/s43681-022-00227-8", "CorpusId": 249133416, "PubMed": "36313215"}, "url": "https://www.semanticscholar.org/paper/697aa30bd8d5e45b75b865a173b935612b8d6c84", "title": "Turing test-inspired method for analysis of biases prevalent in artificial intelligence-based medical imaging", "abstract": null, "venue": "bioRxiv", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-24", "journal": {"pages": "1 - 9", "name": "Ai and Ethics"}, "authors": [{"authorId": "2906509", "name": "Subarna Tripathi"}, {"authorId": "2162467767", "name": "A. Augustin"}, {"authorId": "4318566", "name": "F. Dako"}, {"authorId": "2117008145", "name": "Edward Kim"}]}, {"paperId": "fcad037a73ef85653153cb8c6d683145c4d60391", "externalIds": {"PubMedCentral": "9191771", "DOI": "10.1073/pnas.2205971119", "CorpusId": 249045365, "PubMed": "35609191"}, "url": "https://www.semanticscholar.org/paper/fcad037a73ef85653153cb8c6d683145c4d60391", "title": "A blueprint for conscious machines", "abstract": "Although it has been the subject of human thought for many centuries, consciousness remains a mysterious and controversial topic. Every one of us is overly familiar with the phenomenon, but there is little agreement on what it is, what it entails, and how it is created. Certainly, no other phenomenon is simultaneously so familiar and so hard to explain. Researchers from fields as different as medicine, philosophy, psychology, neurobiology, and computer science have tried for centuries to frame, describe, and address the mind\u2013body problem\u2014how consciousness arises from purely physical processes\u2014but success has been, to say the least, limited. Many believe that it is a phenomenon that will remain, forever, unknowable, outside the reach of human understanding. David Chalmers (1) famously argued that, while we may advance in our understanding of the different physical processes that are associated with consciousness (the easy problems), we will never be able to understand the process that leads to subjective experiences (the hard problem), since understanding this phenomenon represents a challenge of an entirely different nature. Other theories, such as mysterianism, defend that, while the phenomenon may be understandable in principle, it will never be accessible to the human mind (2), due to intrinsic limitations of the human brain. Despite these difficulties, many scientists and philosophers have advanced tentative explanations for the phenomenon (3\u20135), and proposed ways to assess it (6), measure it (7), create it in machines (8), and even use it to improve the performance of artificial intelligence systems (9). The paper by Blum and Blum (10), in PNAS, approaches the problem from an engineering perspective, by showing how a specific computational architecture, which they have proposed (11), can explain several phenomena that are closely related to consciousness.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-24", "journal": {"volume": "119", "name": "Proceedings of the National Academy of Sciences of the United States of America"}, "authors": [{"authorId": "1706641", "name": "Arlindo L. Oliveira"}]}, {"paperId": "447a0c8367dee5becac1cf08f0a094f3d375709a", "externalIds": {"DOI": "10.1038/s41570-022-00391-9", "CorpusId": 248991745}, "url": "https://www.semanticscholar.org/paper/447a0c8367dee5becac1cf08f0a094f3d375709a", "title": "Evaluation guidelines for machine learning tools in the chemical sciences", "abstract": null, "venue": "Nature Reviews Chemistry", "year": 2022, "referenceCount": 164, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-05-24", "journal": {"volume": "6", "pages": "428 - 442", "name": "Nature Reviews Chemistry"}, "authors": [{"authorId": "144917032", "name": "A. Bender"}, {"authorId": "2164196529", "name": "Nadine Schneider"}, {"authorId": "3451383", "name": "Marwin H. S. Segler"}, {"authorId": "151506130", "name": "W. Patrick Walters"}, {"authorId": "2859540", "name": "O. Engkvist"}, {"authorId": "2137594860", "name": "Tiago Rodrigues"}]}, {"paperId": "9d563538a42b05872301267be2cdb6dc2475f815", "externalIds": {"ArXiv": "2209.10103", "DOI": "10.1029/2021WR031776", "CorpusId": 249033681}, "url": "https://www.semanticscholar.org/paper/9d563538a42b05872301267be2cdb6dc2475f815", "title": "Multi\u2010Tracer Groundwater Dating in Southern Oman Using Bayesian Modeling", "abstract": "In the scope of assessing aquifer systems in areas where freshwater is scarce, estimation of transit times is a vital step to quantify the effect of groundwater abstraction. Transit time distributions of different shapes, mean residence times, and contributions are used to represent the hydrogeological conditions in aquifer systems and are typically inferred from measured tracer concentrations by inverse modeling. In this study, a multi\u2010tracer sampling campaign was conducted in the Salalah Plain in Southern Oman including CFCs, SF6, 39Ar, 14C, and 4He. Based on the data of three tracers, a two\u2010component Dispersion Model (DMmix) and a nonparametric model with six age bins were assumed and evaluated using Bayesian statistics. In a Markov Chain Monte Carlo approach, the maximum likelihood parameter estimates and their uncertainties were determined. Model performance was assessed using Bayes factor and leave\u2010one\u2010out cross\u2010validation. Both models suggest that the groundwater in the Salalah Plain is composed of a very young component below 30 yr and a very old component beyond 1,000 yr, with the nonparametric model performing slightly better than the DMmix model. All wells except one exhibit reasonable goodness of fit. Our results support the relevance of Bayesian modeling in hydrology and the potential of nonparametric models for an adequate representation of aquifer dynamics.", "venue": "Water Resources Research", "year": 2022, "referenceCount": 125, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-23", "journal": {"volume": "58", "name": "Water Resources Research"}, "authors": [{"authorId": "2023599316", "name": "V. R\u00e4dle"}, {"authorId": "51957977", "name": "A. Kersting"}, {"authorId": "2115765528", "name": "Maximilian Schmidt"}, {"authorId": "52011525", "name": "L. Ringena"}, {"authorId": "97137798", "name": "J. Robertz"}, {"authorId": "40863702", "name": "W. Aeschbach"}, {"authorId": "4088484", "name": "M. Oberthaler"}, {"authorId": null, "name": "Thomas M\u00fcller"}]}, {"paperId": "f6cd6e23a956e46240b86955e4f37f00ec06b249", "externalIds": {"DOI": "10.4025/actascilangcult.v44i1.60071", "CorpusId": 249488136}, "url": "https://www.semanticscholar.org/paper/f6cd6e23a956e46240b86955e4f37f00ec06b249", "title": "A voz do estere\u00f3tipo nos assistentes digitais", "abstract": "Os processos de reprodu\u00e7\u00e3o e sintetiza\u00e7\u00e3o da voz humana nos dispositivos de assist\u00eancia digital n\u00e3o obedecem, somente, a mecanismos puramente tecnol\u00f3gicos. Neles tamb\u00e9m se evidenciam quer formas de conceber a linguagem segundo os preceitos da informa\u00e7\u00e3o quer formas de actualizar e perpetuar certos estere\u00f3tipos sociais, particularmente os de g\u00e9nero. \u00c9 com o prop\u00f3sito de reflectir sobre a articula\u00e7\u00e3o de ambas que se justificam os conte\u00fados expostos no presente artigo, assim como a principal distin\u00e7\u00e3o conceptual, que, nele, \u00e9 desenvolvida, entre \u2018a voz que ouve\u2019 e \u2018a voz que \u00e9 ouvida\u2019. S\u00e3o duas as teses que norteiam esse prop\u00f3sito. A primeira sugere que a padroniza\u00e7\u00e3o dos assistentes digitais segundo crit\u00e9rios de discrimina\u00e7\u00e3o de g\u00e9nero \u00e9, ainda, nos nossos tempos, uma das v\u00e1rias manifesta\u00e7\u00f5es do amplo fen\u00f3meno da divis\u00e3o sexual do trabalho. A segunda tese, por sua vez, abrange o fen\u00f3meno tecnol\u00f3gico da chamada \u201cconverg\u00eancia digital\u201d e diz respeito aos modos de como os estere\u00f3tipos auditivos, baseados na imagem de m\u00e3e-cuidadora, complementam e refor\u00e7am os estere\u00f3tipos visuais. Para que a articula\u00e7\u00e3o te\u00f3rica das duas teses seja prof\u00edcua, \u00e9 necess\u00e1rio, antes de tudo, desmistificar a suposta interac\u00e7\u00e3o verbal entre m\u00e1quina e utilizador, mostrando \u2013 ao contr\u00e1rio do que se infere do imagin\u00e1rio tecnol\u00f3gico contempor\u00e2neo \u2013 a impossibilidade dial\u00f3gica de ambos.", "venue": "Acta Scientiarum. Language and Culture", "year": 2022, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-05-20", "journal": {"name": "Acta Scientiarum. Language and Culture"}, "authors": [{"authorId": "145958425", "name": "Joaquim Braga"}]}, {"paperId": "48f8b1435fcbd10b7d4cf613322328d7062d94c6", "externalIds": {"DOI": "10.3390/proceedings2022081146", "CorpusId": 248926485}, "url": "https://www.semanticscholar.org/paper/48f8b1435fcbd10b7d4cf613322328d7062d94c6", "title": "A Framework of \u201cQuantitative \u2a02 Fixed Image \u21d2 Qualitative\u201d Induced by Contradiction Generation and Meta Synthetic Wisdom Engineering", "abstract": "Due to the past tP and the future tF being divided into a pair of opposing times by the now tN, the generation mechanism of the contradiction is attributed in this paper as the process in which the time increment \u2206t and \u2206t\u2019 are transmitted from the past tP and the future tF to the present moment tN, respectively, and then reverse each other. The category and topos of time contradictorily constructed by the mechanism is discussed. It is shown that not only can the laws of the \u201cUnification of Opposites\u201d, \u201cMutual change of Quality and Quantity\u201d and \u201cNegation of negation\u201d of the contradiction be represented in this form of category, but some of classic constructions appearing in the fields of mathematics, physics, logic, life, nerves, thinking, and intelligence can also be considered as morphosmor pattern-induced and emerge via this mechanism as well. On the other hands, a series of concepts, models, and algorithms for noetic science, such as the attribute conjunctive monoid category (ACMC), attribute reasoning lattice category (ARLC), attribute coordinate system (ACS), attribute coordinate analysis method based on the learning of ACS for perception, cognition, and decision-making (ACAM), qualitative (conversion degree) mapping from quantity to quality (QM), attribute grid computer based on qualitative mapping, qualitative criteria transformation (AGC), etc., which have been verified through corresponding experiments, have been proposed, so that not only a set of attribute theory methods from perception to cognition and thinking have been constructed, but the synthetized framework of \u201cQuantitative \u2297 Fixed Image\u21d2 Qualitative\u201d, called \u201cFramework of Syntenic Three Approaches\u201d (FSTA) can also be induced. It is possible to provide an alternative reference path and technical solution for noetic science and open complex giant systems because FSTA is consistent with the framework of \u201cQuantitative Intelligence \u2297 Fixed Image Intelligence\u21d2 Qualitative Intelligence (Meta Synthetic Wisdom)\u201d, as proposed by Hsue-shen Tsien.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-17", "journal": {"name": "The 2021 Summit of the International Society for the Study of Information"}, "authors": [{"authorId": "33913425", "name": "Jia-li Feng"}, {"authorId": "3365739", "name": "Peizhuang Wang"}]}, {"paperId": "f7cae1bc9b7ba214721cba3fd111fda57678de3f", "externalIds": {"DOI": "10.1007/s40747-022-00757-y", "CorpusId": 248781914}, "url": "https://www.semanticscholar.org/paper/f7cae1bc9b7ba214721cba3fd111fda57678de3f", "title": "An associative knowledge network model for interpretable semantic representation of noun context", "abstract": null, "venue": "Complex & Intelligent Systems", "year": 2022, "referenceCount": 51, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-13", "journal": {"volume": "8", "pages": "5265 - 5285", "name": "Complex & Intelligent Systems"}, "authors": [{"authorId": "2165317888", "name": "Yulin Li"}, {"authorId": "2735864", "name": "Zhenping Xie"}, {"authorId": "113437495", "name": "Fanyu Wang"}]}, {"paperId": "a97bf87e4786b4a91e6c61e9308a44350791c31f", "externalIds": {"PubMedCentral": "9113877", "DOI": "10.1155/2022/3190801", "CorpusId": 248736441, "PubMed": "35592719"}, "url": "https://www.semanticscholar.org/paper/a97bf87e4786b4a91e6c61e9308a44350791c31f", "title": "Research on System Construction and Strategy of Intelligent Sports in the Implementation of National Fitness", "abstract": "This paper studies the construction and development strategy of intelligent sports system in the context of Chinese National Fitness Program with methods of literature review and model construction. The research shows that there are four dilemmas in the implementation of intelligent sports in national fitness: data security, market monopoly, legal supervision, and product iteration. However, there are also three promoting factors in this regard, including policy guarantee, market demand, and industrial upgrading. Following the principles of scientificity, effectiveness, public welfare, and collaboration, this paper designs a system for intelligent sports in national fitness. The construction of the national fitness intelligent sports system mainly consists of four modules, including basic framework construction, function design, content design, and operation analysis. With the systematic analysis of the status quo of intelligent sports application in national fitness, this paper puts forward intelligent sports development strategies in the implementation of national fitness from four aspects: optimizing the top-level design of government, speeding up industrial transformation and upgrading, constructing market supervision mechanism, and establishing a talent training system.", "venue": "Computational intelligence and neuroscience", "year": 2022, "referenceCount": 16, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-05-10", "journal": {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, "authors": [{"authorId": "2166392145", "name": "Yuqing Tang"}, {"authorId": "96772858", "name": "Sheng Zan"}, {"authorId": "2004730596", "name": "Xiaowen Zhang"}]}, {"paperId": "f37f447ddcf14664b78653c1009d9934614519f7", "externalIds": {"PubMedCentral": "9091068", "DOI": "10.1186/s13244-022-01220-9", "CorpusId": 248574320, "PubMed": "35536446"}, "url": "https://www.semanticscholar.org/paper/f37f447ddcf14664b78653c1009d9934614519f7", "title": "Considerations for artificial intelligence clinical impact in oncologic imaging: an AI4HI position paper", "abstract": null, "venue": "Insights into Imaging", "year": 2022, "referenceCount": 60, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-10", "journal": {"volume": "13", "name": "Insights into Imaging"}, "authors": [{"authorId": "83904480", "name": "L. Mart\u00ed-Bonmat\u00ed"}, {"authorId": "143609640", "name": "D. Koh"}, {"authorId": "50338538", "name": "K. Riklund"}, {"authorId": "3624615", "name": "Maciej Bobowicz"}, {"authorId": "32054693", "name": "Y. Roussakis"}, {"authorId": "46668942", "name": "J. Vilanova"}, {"authorId": "2039143", "name": "J. F\u00fctterer"}, {"authorId": "6762371", "name": "J. Rimola"}, {"authorId": "31230015", "name": "Pedro Mallol"}, {"authorId": "2164393319", "name": "Gloria Ribas"}, {"authorId": "2145922721", "name": "A. Miguel"}, {"authorId": "2992223", "name": "M. Tsiknakis"}, {"authorId": "2364820", "name": "K. Lekadir"}, {"authorId": "2209674", "name": "G. Tsakou"}]}, {"paperId": "09797949fc70fbad8f3fed4f6cf4a91a9c709652", "externalIds": {"DOI": "10.1136/bjophthalmol-2022-321141", "CorpusId": 248553336, "PubMed": "35523534"}, "url": "https://www.semanticscholar.org/paper/09797949fc70fbad8f3fed4f6cf4a91a9c709652", "title": "New meaning for NLP: the trials and tribulations of natural language processing with GPT-3 in ophthalmology", "abstract": "Natural language processing (NLP) is a subfield of machine intelligence focused on the interaction of human language with computer systems. NLP has recently been discussed in the mainstream media and the literature with the advent of Generative Pre-trained Transformer 3 (GPT-3), a language model capable of producing human-like text. The release of GPT-3 has also sparked renewed interest on the applicability of NLP to contemporary healthcare problems. This article provides an overview of NLP models, with a focus on GPT-3, as well as discussion of applications specific to ophthalmology. We also outline the limitations of GPT-3 and the challenges with its integration into routine ophthalmic care.", "venue": "British Journal of Ophthalmology", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-05-06", "journal": {"volume": "106", "pages": "889 - 892", "name": "British Journal of Ophthalmology"}, "authors": [{"authorId": "39819114", "name": "Siddharth Nath"}, {"authorId": "2164300110", "name": "Abdullah Marie"}, {"authorId": "2090354013", "name": "Simon Ellershaw"}, {"authorId": "65739018", "name": "Edward Korot"}, {"authorId": "5638585", "name": "P. Keane"}]}, {"paperId": "4351889496fafb08fbbe39be6a7bbe93ae957883", "externalIds": {"DOI": "10.1007/s10670-022-00552-8", "CorpusId": 247973871}, "url": "https://www.semanticscholar.org/paper/4351889496fafb08fbbe39be6a7bbe93ae957883", "title": "Intelligent Behaviour", "abstract": null, "venue": "Erkenntnis: An International Journal of Scientific Philosophy", "year": 2022, "referenceCount": 57, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-06", "journal": {"name": "Erkenntnis"}, "authors": [{"authorId": "51127600", "name": "Dimitri Coelho Mollo"}]}, {"paperId": "69ce70dc7cc9e52cde3df0f7e0ca972f085355fa", "externalIds": {"DOI": "10.36253/jlis.it-458", "CorpusId": 248824244}, "url": "https://www.semanticscholar.org/paper/69ce70dc7cc9e52cde3df0f7e0ca972f085355fa", "title": "Artificial Intelligence Systems and problems of the concept of author. Reflections on a recent book", "abstract": "The publication of the book Beta Writer. 2019.\u00a0Lithium-Ion Batteries. A Machine-Generated Summary of Current Research. New York, NY: Springer, produced with Artificial Intelligence software prompts analysis and reflections in several areas. First of all, on what Artificial Intelligence systems are able to do in the production of informative texts. This raises the question if and how an Artificial Intelligence software system can be treated as the author of a text it has produced. Evaluating whether this is correct and possible leads to re-examine the current conception for which it is taken for granted that the author is a person. This, in turn, when faced with texts produced by Artificial Intelligence systems necessarily raises the question of whether they, like the author-person, are endowed with agency. The article concludes that Artificial Intelligence systems are characterized by a distributed agency, shared with those who designed them and make them work, and that in the wake of the reflections of 50 years ago by Barthes and Foucault, it is necessary to define and recognize a new type of author.", "venue": "JLIS.it", "year": 2022, "referenceCount": 74, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-05", "journal": {"name": "JLIS.it"}, "authors": [{"authorId": "48030608", "name": "M. Lana"}]}, {"paperId": "96d2f08d83386ab6dad47a3a772fa48d198ce9d0", "externalIds": {"DBLP": "journals/corr/abs-2205-08954", "ArXiv": "2205.08954", "DOI": "10.48550/arXiv.2205.08954", "CorpusId": 248863342}, "url": "https://www.semanticscholar.org/paper/96d2f08d83386ab6dad47a3a772fa48d198ce9d0", "title": "One-way Explainability Isn't The Message", "abstract": "Recent engineering developments in specialised computational hard-ware, data-acquisition and storage technology have seen the emergence of Machine Learning (ML) as a powerful form of data analysis with widespread applicability beyond its historical roots in the design of autonomous agents. However\u2014possibly because of its origins in the development of agents capable of self-discovery\u2014relatively little attention has been paid to the interaction between people and ML systems, although recent developments on Explainable ML are expected to address this, by providing visual and textual feedback on how the ML system arrived at a conclusion. In this paper we are concerned with the use of ML in automated or semi-automated tools that assist one or more human decision makers. We argue that requirements on both human and machine in this context are signi\ufb01cantly di\ufb00erent to the use of ML either as part of autonomous agents for self-discovery or as part statistical data analysis. Our principal position is that the design of such human-machine systems should be driven by repeated, two-way intelligibility of information rather than one-way explainability of the ML-system\u2019s recommendations. Iterated rounds of intelligible information exchange, we think, will characterise the kinds of collaboration that will be needed to understand complex phenomena for which neither man or machine have complete answers. To reassure the reader that this is not simply wordplay, we propose operational principles\u2013we call them Intelligibility Axioms\u2013to guide the design of a \ufb01rst-step in constructing a collaborative decision-support system. Speci\ufb01cally, for one iteration in the collaboration (human-to-machine-to-human), the principles are intended to encode su\ufb03cient criteria for the following: (a) what it means for information provided by the human to be intelligible to the ML system; and (b) what it means for an explanation provided by an ML system to be intelligible to a human. Using examples from the literature on the use of ML for drug-design and in medicine, we demonstrate cases where the conditions of the axioms are met. Intelligibility of communication is necessary, but not su\ufb03cient to extend a single iteration of the collaborative loop to multiple iterations. We describe some additional requirements needed for the design of a truly collaborative decision-support system.", "venue": "ArXiv", "year": 2022, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-05", "journal": {"volume": "abs/2205.08954", "name": "ArXiv"}, "authors": [{"authorId": "143780768", "name": "A. Srinivasan"}, {"authorId": "144041292", "name": "Michael Bain"}, {"authorId": "2091242865", "name": "Enrico W. Coiera"}]}, {"paperId": "8cfcc57878f20d04e97acbb9ca78fb4f218811f0", "externalIds": {"DBLP": "conf/flairs/PetersonH22", "DOI": "10.32473/flairs.v35i.130545", "CorpusId": 248587818}, "url": "https://www.semanticscholar.org/paper/8cfcc57878f20d04e97acbb9ca78fb4f218811f0", "title": "Preliminary Thoughts on Defining f(x) for Ethical Machines", "abstract": "There is a growing literature in machine ethics attempting at creating ethical machines through AI and machine learning. Although many concerns with respect to such attempts have been raised, including the difficulties regarding the gathering of relevant contextual information as well as solving ethical dilemmas, it appears that many fundamental ethical notions have been overlooked in the implementation of normative theories to machines. This paper provides a preliminary analysis of important aspects that need to be taken into account in the attempt of defining so called ethical machines.", "venue": "FLAIRS", "year": 2022, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-04", "journal": {"name": "The International FLAIRS Conference Proceedings"}, "authors": [{"authorId": "11161869", "name": "Clayton Peterson"}, {"authorId": "2102351337", "name": "Na\u00efma Hamrouni"}]}, {"paperId": "7f84d56fb8feb4e50cd6c3da3e3fd4ff6c4772cf", "externalIds": {"ACL": "2022.naacl-main.258", "ArXiv": "2205.01523", "DBLP": "conf/naacl/LiTGYYCWZW22", "DOI": "10.48550/arXiv.2205.01523", "CorpusId": 247613500}, "url": "https://www.semanticscholar.org/paper/7f84d56fb8feb4e50cd6c3da3e3fd4ff6c4772cf", "title": "ElitePLM: An Empirical Study on General Language Ability Evaluation of Pretrained Language Models", "abstract": "Nowadays, pretrained language models (PLMs) have dominated the majority of NLP tasks. While, little research has been conducted on systematically evaluating the language abilities of PLMs. In this paper, we present a large-scale empirical study on general language ability evaluation of PLMs (ElitePLM). In our study, we design four evaluation dimensions, memory, comprehension, reasoning, and composition, to measure ten widely-used PLMs within five categories. Our empirical results demonstrate that: (1) PLMs with varying training objectives and strategies are good at different ability tests; (2) fine-tuning PLMs in downstream tasks is usually sensitive to the data size and distribution; (3) PLMs have excellent transferability between similar tasks. Moreover, the prediction results of PLMs in our experiments are released as an open resource for more deep and detailed analysis on the language abilities of PLMs. This paper can guide the future work to select, apply, and design PLMs for specific tasks. We have made all the details of experiments publicly available at https://github.com/RUCAIBox/ElitePLM.", "venue": "NAACL", "year": 2022, "referenceCount": 64, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-05-03", "journal": {"pages": "3519-3539"}, "authors": [{"authorId": "2018027", "name": "Junyi Li"}, {"authorId": "1997234792", "name": "Tianyi Tang"}, {"authorId": "2164092564", "name": "Zheng Gong"}, {"authorId": "2111809756", "name": "Lixin Yang"}, {"authorId": "2164113313", "name": "Zhuohao Yu"}, {"authorId": "46842323", "name": "Z. Chen"}, {"authorId": "2115891766", "name": "Jingyuan Wang"}, {"authorId": "2542603", "name": "Wayne Xin Zhao"}, {"authorId": "153693432", "name": "Ji-rong Wen"}]}, {"paperId": "67d2d0c0c4a711004cd48a03c61c30e0dba1bd47", "externalIds": {"DBLP": "journals/corr/abs-2205-00965", "ArXiv": "2205.00965", "DOI": "10.48550/arXiv.2205.00965", "CorpusId": 248496872}, "url": "https://www.semanticscholar.org/paper/67d2d0c0c4a711004cd48a03c61c30e0dba1bd47", "title": "State-of-the-art in Open-domain Conversational AI: A Survey", "abstract": "We survey SoTA open-domain conversational AI models with the objective of presenting the prevailing challenges that still exist to spur future research. In addition, we provide statistics on the gender of conversational AI in order to guide the ethics discussion surrounding the issue. Open-domain conversational AI models are known to have several challenges, including bland, repetitive responses and performance degradation when prompted with figurative language, among others. First, we provide some background by discussing some topics of interest in conversational AI. We then discuss the method applied to the two investigations carried out that make up this study. The first investigation involves a search for recent SoTA open-domain conversational AI models, while the second involves the search for 100 conversational AI to assess their gender. Results of the survey show that progress has been made with recent SoTA conversational AI, but there are still persistent challenges that need to be solved, and the female gender is more common than the male for conversational AI. One main takeaway is that hybrid models of conversational AI offer more advantages than any single architecture. The key contributions of this survey are (1) the identification of prevailing challenges in SoTA open-domain conversational AI, (2) the rarely held discussion on open-domain conversational AI for low-resource languages, and (3) the discussion about the ethics surrounding the gender of conversational AI.", "venue": "Inf.", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-05-02", "journal": {"volume": "13", "pages": "298", "name": "Inf."}, "authors": [{"authorId": "51221489", "name": "Tosin P. Adewumi"}, {"authorId": "80342407", "name": "F. Liwicki"}, {"authorId": "1743758", "name": "M. Liwicki"}]}, {"paperId": "807a91d0225c77cca5a1dfc307bf1aa1756944e7", "externalIds": {"DBLP": "journals/nn/DoyaEKSR22", "DOI": "10.1016/j.neunet.2022.05.012", "CorpusId": 248972754, "PubMed": "35671575"}, "url": "https://www.semanticscholar.org/paper/807a91d0225c77cca5a1dfc307bf1aa1756944e7", "title": "Social impact and governance of AI and neurotechnologies", "abstract": null, "venue": "Neural Networks", "year": 2022, "referenceCount": 94, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-05-01", "journal": {"volume": "152", "pages": "\n 542-554\n ", "name": "Neural networks : the official journal of the International Neural Network Society"}, "authors": [{"authorId": "1714997", "name": "K. Doya"}, {"authorId": "35406850", "name": "Arisa Ema"}, {"authorId": "48078689", "name": "H. Kitano"}, {"authorId": "3275262", "name": "M. Sakagami"}, {"authorId": "2055581993", "name": "Stuart Russell"}]}, {"paperId": "c961db861c6ce200e1b0e6b1e77a58e1684890d1", "externalIds": {"DBLP": "journals/sensors/MiuraCSNY22", "PubMedCentral": "9146313", "DOI": "10.3390/s22103829", "CorpusId": 248938640, "PubMed": "35632238"}, "url": "https://www.semanticscholar.org/paper/c961db861c6ce200e1b0e6b1e77a58e1684890d1", "title": "Assisting Personalized Healthcare of Elderly People: Developing a Rule-Based Virtual Caregiver System Using Mobile Chatbot", "abstract": "To assist personalized healthcare of elderly people, our interest is to develop a virtual caregiver system that retrieves the expression of mental and physical health states through human\u2013computer interaction in the form of dialogue. The purpose of this paper is to implement and evaluate a virtual caregiver system using mobile chatbot. Unlike the conventional health monitoring approach, our key idea is to integrate a rule-based virtual caregiver system (called \u201cMind Monitoring\u201d service) with the physical, mental, and social questionnaires into the mobile chat application. The elderly person receives one question from the mobile chatbot per day, and answers it by pushing the optional button or using a speech recognition technique. Furthermore, a novel method is implemented to quantify the answers, generate visual graphs, and send the corresponding summaries or advice to the specific elder. In the experimental evaluation, we applied it to eight elderly subjects and 19 younger subjects within 14 months. As main results, its effects were significantly improved by the proposed method, including the above 80% in the response rate, the accurate reflection of their real lives from the responses, and high usefulness of the feedback messages with software quality requirements and evaluation. We also conducted interviews with subjects for health analysis and improvement.", "venue": "Italian National Conference on Sensors", "year": 2022, "referenceCount": 110, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "1508869919", "name": "C. Miura"}, {"authorId": "2111635914", "name": "Sinan Chen"}, {"authorId": "38554053", "name": "S. Saiki"}, {"authorId": "1717604", "name": "Masahide Nakamura"}, {"authorId": "2630154", "name": "K. Yasuda"}]}, {"paperId": "523e4c0b6d4a7a2323f2a9d31613e38bb3fb556b", "externalIds": {"PubMedCentral": "9119867", "DBLP": "journals/caeai/RayhanADA22", "DOI": "10.1016/j.caeai.2022.100077", "CorpusId": 248892985}, "url": "https://www.semanticscholar.org/paper/523e4c0b6d4a7a2323f2a9d31613e38bb3fb556b", "title": "Appraisal of high-stake examinations during SARS-CoV-2 emergency with responsible and transparent AI: Evidence of fair and detrimental assessment", "abstract": null, "venue": "Computers and Education: Artificial Intelligence", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "3", "pages": "100077 - 100077", "name": "Computers and Education: Artificial Intelligence"}, "authors": [{"authorId": "2120260019", "name": "M. Rayhan"}, {"authorId": "2165932536", "name": "M.D. Golam Rabiul Alam"}, {"authorId": "145197398", "name": "M. A. Dewan"}, {"authorId": "2165791574", "name": "M. H. U. Ahmed"}]}, {"paperId": "9329b3feb93c552f847f1cd3a1fb6447f47ec7b4", "externalIds": {"DOI": "10.1007/s40264-022-01156-5", "CorpusId": 248816823, "PubMed": "35579806"}, "url": "https://www.semanticscholar.org/paper/9329b3feb93c552f847f1cd3a1fb6447f47ec7b4", "title": "Artificial Intelligence in Pharmacovigilance: An Introduction to Terms, Concepts, Applications, and Limitations", "abstract": null, "venue": "Drug Safety", "year": 2022, "referenceCount": 76, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "45", "pages": "407 - 418", "name": "Drug Safety"}, "authors": [{"authorId": "1911962", "name": "J. Aronson"}]}, {"paperId": "2889ee04cdb769fb1aa822081059a65f330cf46a", "externalIds": {"ArXiv": "2205.07769", "DBLP": "journals/corr/abs-2205-07769", "DOI": "10.48550/arXiv.2205.07769", "CorpusId": 248811072}, "url": "https://www.semanticscholar.org/paper/2889ee04cdb769fb1aa822081059a65f330cf46a", "title": "A BenchCouncil View on Benchmarking Emerging and Future Computing", "abstract": "The measurable properties of the artifacts or objects in the computer, management, or \ufb01nance disci- plines are extrinsic, not inherent \u2014 dependent on their problem de\ufb01nitions and solution instantiations. Only after the instantiation can the solutions to the problem be measured. The processes of de\ufb01nition, instantiation, and measurement are entangled, and they have complex mutual in\ufb02uences. Meanwhile, the technology inertia brings instantiation bias \u2014 trapped into a subspace or even a point at a high- dimension solution space. These daunting challenges, which emerging computing aggravates, make metrology can not work for benchmark communities. It is pressing to establish independent bench- mark science and engineering. This article presents a unifying benchmark de\ufb01nition, a conceptual framework, and a traceable and supervised learning-based benchmarking methodology, laying the foundation for benchmark science and engineering. I also discuss BenchCouncil\u2019s plans for emerging and future computing. The ongoing projects include de\ufb01ning the challenges of intelligence, instinct, quantum computers, Metaverse, planet-scale computers, and reformulating data centers, arti\ufb01cial intelligence for science, and CPU benchmark suites. Also, BenchCouncil will collaborate with ComputerCouncil on open-source computer systems for planet-scale computing, AI for science systems, and Metaverse.", "venue": "BenchCouncil Transactions on Benchmarks, Standards and Evaluations", "year": 2022, "referenceCount": 51, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "abs/2205.07769", "name": "ArXiv"}, "authors": [{"authorId": "2062319", "name": "Jianfeng Zhan"}]}, {"paperId": "074ca49cd46b227bf8a6382d8bf26e11e239fbd6", "externalIds": {"DOI": "10.1162/daed_a_01902", "CorpusId": 248377877}, "url": "https://www.semanticscholar.org/paper/074ca49cd46b227bf8a6382d8bf26e11e239fbd6", "title": "Searching for Computer Vision North Stars", "abstract": "Abstract Computer vision is one of the most fundamental areas of artificial intelligence research. It has contributed to the tremendous progress in the recent deep learning revolution in AI. In this essay, we provide a perspective of the recent evolution of object recognition in computer vision, a flagship research topic that led to the breakthrough data set of ImageNet and its ensuing algorithm developments. We argue that much of this progress is rooted in the pursuit of research \u201cnorth stars,\u201d wherein researchers focus on critical problems of a scientific discipline that can galvanize major efforts and groundbreaking progress. Following the success of ImageNet and object recognition, we observe a number of exciting areas of research and a growing list of north star problems to tackle. This essay recounts the brief history of ImageNet, its related work, and the follow-up progress. The goal is to inspire more north star work to advance the field, and AI at large.", "venue": "Daedalus", "year": 2022, "referenceCount": 44, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-01", "journal": {"volume": "151", "pages": "85-99", "name": "Daedalus"}, "authors": [{"authorId": "48004138", "name": "Li Fei-Fei"}, {"authorId": "145237361", "name": "Ranjay Krishna"}]}, {"paperId": "6b8cd1a2031a90dcce12fb5e1b6c111e3ea3af47", "externalIds": {"DOI": "10.1162/daed_a_01899", "CorpusId": 248377891}, "url": "https://www.semanticscholar.org/paper/6b8cd1a2031a90dcce12fb5e1b6c111e3ea3af47", "title": "If We Succeed", "abstract": "Abstract Since its inception, AI has operated within a standard model whereby systems are designed to optimize a fixed, known objective. This model has been increasingly successful. I briefly summarize the state of the art and its likely evolution over the next decade. Substantial breakthroughs leading to general-purpose AI are much harder to predict, but they will have an enormous impact on society. At the same time, the standard model will become progressively untenable in real-world applications because of the difficulty of specifying objectives completely and correctly. I propose a new model for AI development in which the machine's uncertainty about the true objective leads to qualitatively new modes of behavior that are more robust, controllable, and deferential.", "venue": "Daedalus", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-01", "journal": {"volume": "151", "pages": "43-57", "name": "Daedalus"}, "authors": [{"authorId": "145107462", "name": "Stuart J. Russell"}]}, {"paperId": "6b21f00e72698db1722b5d34dbc11a1a54622b9e", "externalIds": {"DOI": "10.1162/daed_a_01898", "CorpusId": 248237628}, "url": "https://www.semanticscholar.org/paper/6b21f00e72698db1722b5d34dbc11a1a54622b9e", "title": "\u201cFrom So Simple a Beginning\u201d: Species of Artificial Intelligence", "abstract": "Abstract Artificial intelligence has a decades-long history that exhibits alternating enthusiasm and disillusionment for the field's scientific insights, technical accomplishments, and socioeconomic impact. Recent achievements have seen renewed claims for the transformative and disruptive effects of AI. Reviewing the history and current state of the art reveals a broad repertoire of methods and techniques developed by AI researchers. In particular, modern machine learning methods have enabled a series of AI systems to achieve superhuman performance. The exponential increases in computing power, open-source software, available data, and embedded services have been crucial to this success. At the same time, there is growing unease around whether the behavior of these systems can be rendered transparent, explainable, unbiased, and accountable. One consequence of recent AI accomplishments is a renaissance of interest around the ethics of such systems. More generally, our AI systems remain singular task-achieving architectures, often termed narrow AI. I will argue that artificial general intelligence-able to range across widely differing tasks and contexts-is unlikely to be developed, or emerge, any time soon.", "venue": "Daedalus", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-05-01", "journal": {"volume": "151", "pages": "28-42", "name": "Daedalus"}, "authors": [{"authorId": "1705314", "name": "N. Shadbolt"}]}, {"paperId": "6a41c21d32c9acdbb7fb1a79e13a87b266e2da55", "externalIds": {"PubMedCentral": "9103799", "DOI": "10.3390/ijms23094998", "CorpusId": 248485577, "PubMed": "35563387"}, "url": "https://www.semanticscholar.org/paper/6a41c21d32c9acdbb7fb1a79e13a87b266e2da55", "title": "Novel Biomarkers of Atherosclerotic Vascular Disease\u2014Latest Insights in the Research Field", "abstract": "The atherosclerotic vascular disease is a cardiovascular continuum in which the main role is attributed to atherosclerosis, from its appearance to its associated complications. The increasing prevalence of cardiovascular risk factors, population ageing, and burden on both the economy and the healthcare system have led to the development of new diagnostic and therapeutic strategies in the field. The better understanding or discovery of new pathophysiological mechanisms and molecules modulating various signaling pathways involved in atherosclerosis have led to the development of potential new biomarkers, with key role in early, subclinical diagnosis. The evolution of technological processes in medicine has shifted the attention of researchers from the profiling of classical risk factors to the identification of new biomarkers such as midregional pro-adrenomedullin, midkine, stromelysin-2, pentraxin 3, inflammasomes, or endothelial cell-derived extracellular vesicles. These molecules are seen as future therapeutic targets associated with decreased morbidity and mortality through early diagnosis of atherosclerotic lesions and future research directions.", "venue": "International Journal of Molecular Sciences", "year": 2022, "referenceCount": 276, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-30", "journal": {"volume": "23", "name": "International Journal of Molecular Sciences"}, "authors": [{"authorId": "2061016362", "name": "C. Adam"}, {"authorId": "13845147", "name": "D. \u0218alaru"}, {"authorId": "40385765", "name": "C. Pris\u0103cariu"}, {"authorId": "47764305", "name": "D. Marcu"}, {"authorId": "4449885", "name": "R. Sasc\u0103u"}, {"authorId": "12240064", "name": "C. St\u0103tescu"}]}, {"paperId": "40dd2b0184faaeac63f04e2a969087aea0db1f7c", "externalIds": {"ArXiv": "2204.12774", "CorpusId": 248405896}, "url": "https://www.semanticscholar.org/paper/40dd2b0184faaeac63f04e2a969087aea0db1f7c", "title": "Matter&Mind Matter", "abstract": "As a result of a hundred million years of evolution, living animals have adapted extremely well to their ecological niche. Such adaptation implies species-specific interactions with their immediate environment by processing sensory cues and responding with appropriate behavior. Understanding how living creatures perform pattern recognition and cognitive tasks is of particular importance for computing architectures: by studying these information pathways refined over eons of evolution, researchers may be able to streamline the process of developing more highly advanced, energy efficient autonomous systems. With the advent of novel electronic and ionic components along with a deeper understanding of information pathways in living species, a plethora of opportunities to develop completely novel information processing avenues are within reach. Here, we describe the basal information pathways in nervous systems, from the local neuron level to the entire nervous system network. The dual importance of local learning rules is addressed, from spike timing dependent plasticity at the neuron level to the interwoven morphological and dynamical mechanisms of the global network. Basal biological principles are highlighted, including phylogenies, ontogenesis, and homeostasis, with particular emphasis on network topology and dynamics. While in machine learning system training is performed on virgin networks without any a priori knowledge, the approach proposed here distinguishes itself unambiguously by employing growth mechanisms as a guideline to design novel computing architectures. Including fundamental biological information pathways that explore the spatiotemporal fundamentals of nervous systems has untapped potential for the development of entirely novel information processing systems. Finally, a benchmark for neuromorphic systems is suggested.", "venue": "", "year": 2022, "referenceCount": 289, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Biology"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-27", "journal": null, "authors": [{"authorId": "2163623542", "name": "Tom Birkoben"}, {"authorId": "2163623111", "name": "Hermann Kohlstedt"}]}, {"paperId": "893a1ef190dbd6aee1420e3462939efc9e6665d4", "externalIds": {"PubMedCentral": "9106101", "DBLP": "journals/finr/Sims22", "DOI": "10.3389/fnbot.2022.857614", "CorpusId": 248397782, "PubMed": "35574229"}, "url": "https://www.semanticscholar.org/paper/893a1ef190dbd6aee1420e3462939efc9e6665d4", "title": "Self-Concern Across Scales: A Biologically Inspired Direction for Embodied Artificial Intelligence", "abstract": "Intelligence in current AI research is measured according to designer-assigned tasks that lack any relevance for an agent itself. As such, tasks and their evaluation reveal a lot more about our intelligence than the possible intelligence of agents that we design and evaluate. As a possible first step in remedying this, this article introduces the notion of \u201cself-concern,\u201d a property of a complex system that describes its tendency to bring about states that are compatible with its continued self-maintenance. Self-concern, as argued, is the foundation of the kind of basic intelligence found across all biological systems, because it reflects any such system's existential task of continued viability. This article aims to cautiously progress a few steps closer to a better understanding of some necessary organisational conditions that are central to self-concern in biological systems. By emulating these conditions in embodied AI, perhaps something like genuine self-concern can be implemented in machines, bringing AI one step closer to its original goal of emulating human-like intelligence.", "venue": "Frontiers in Neurorobotics", "year": 2022, "referenceCount": 149, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-25", "journal": {"volume": "16", "name": "Frontiers in Neurorobotics"}, "authors": [{"authorId": "2052247891", "name": "Matthew Sims"}]}, {"paperId": "9c5f0f80c7dd21463177b7329d748b785af3c516", "externalIds": {"DOI": "10.3390/ai3020021", "CorpusId": 248316668}, "url": "https://www.semanticscholar.org/paper/9c5f0f80c7dd21463177b7329d748b785af3c516", "title": "Shifting Perspectives on AI Evaluation: The Increasing Role of Ethics in Cooperation", "abstract": "Evaluating AI is a challenging task, as it requires an operative definition of intelligence and the metrics to quantify it, including amongst other factors economic drivers, depending on specific domains. From the viewpoint of AI basic research, the ability to play a game against a human has historically been adopted as a criterion of evaluation, as competition can be characterized by an algorithmic approach. Starting from the end of the 1990s, the deployment of sophisticated hardware identified a significant improvement in the ability of a machine to play and win popular games. In spite of the spectacular victory of IBM\u2019s Deep Blue over Garry Kasparov, many objections still remain. This is due to the fact that it is not clear how this result can be applied to solve real-world problems or simulate human abilities, e.g., common sense, and also exhibit a form of generalized AI. An evaluation based uniquely on the capacity of playing games, even when enriched by the capability of learning complex rules without any human supervision, is bound to be unsatisfactory. As the internet has dramatically changed the cultural habits and social interaction of users, who continuously exchange information with intelligent agents, it is quite natural to consider cooperation as the next step in AI software evaluation. Although this concept has already been explored in the scientific literature in the fields of economics and mathematics, its consideration in AI is relatively recent and generally covers the study of cooperation between agents. This paper focuses on more complex problems involving heterogeneity (specifically, the cooperation between humans and software agents, or even robots), which are investigated by taking into account ethical issues occurring during attempts to achieve a common goal shared by both parties, with a possible result of either conflict or stalemate. The contribution of this research consists in identifying those factors (trust, autonomy, and cooperative learning) on which to base ethical guidelines in agent software programming, making cooperation a more suitable benchmark for AI applications.", "venue": "AI", "year": 2022, "referenceCount": 61, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-19", "journal": {"name": "AI"}, "authors": [{"authorId": "2945086", "name": "E. Barbierato"}, {"authorId": "2163167100", "name": "Maria Enrica Zamponi"}]}, {"paperId": "f097fb79d7ab0743d96167d419788d4aad8197d7", "externalIds": {"DBLP": "journals/corr/abs-2204-08226", "ArXiv": "2204.08226", "DOI": "10.48550/arXiv.2204.08226", "CorpusId": 248227522}, "url": "https://www.semanticscholar.org/paper/f097fb79d7ab0743d96167d419788d4aad8197d7", "title": "Empirical Evaluation and Theoretical Analysis for Representation Learning: A Survey", "abstract": "Representation learning enables us to automatically extract generic feature representations from a dataset to solve another machine learning task. Recently, extracted feature representations by a representation learning algorithm and a simple predictor have exhibited state-of-the-art performance on several machine learning tasks. Despite its remarkable progress, there exist various ways to evaluate representation learning algorithms depending on the application because of the \ufb02exibility of representation learning. To understand the current representation learning, we review evaluation methods of representation learning algorithms and theoretical analyses. On the basis of our evaluation survey, we also discuss the future direction of representation learning. Note that this survey is the extended version of Nozawa and Sato [1].", "venue": "ArXiv", "year": 2022, "referenceCount": 219, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-18", "journal": {"volume": "abs/2204.08226", "name": "ArXiv"}, "authors": [{"authorId": "13613520", "name": "Kento Nozawa"}, {"authorId": "73355331", "name": "Issei Sato"}]}, {"paperId": "b90a31fc09a98a9d0ed6b7806a9974375b8cf394", "externalIds": {"DOI": "10.1007/s00266-022-02883-x", "CorpusId": 248231934, "PubMed": "35437664"}, "url": "https://www.semanticscholar.org/paper/b90a31fc09a98a9d0ed6b7806a9974375b8cf394", "title": "Simulation and Artificial Intelligence in Rhinoplasty: A Systematic Review", "abstract": null, "venue": "Aesthetic Plastic Surgery", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-18", "journal": {"volume": "46", "pages": "2368 - 2377", "name": "Aesthetic Plastic Surgery"}, "authors": [{"authorId": "1931416538", "name": "A. Eldaly"}, {"authorId": "121246549", "name": "Francisco R. Avila"}, {"authorId": "2075382530", "name": "Ricardo A Torres-Guzman"}, {"authorId": "2132057830", "name": "Karla C Maita"}, {"authorId": "2148907723", "name": "John P. Garcia"}, {"authorId": "2162800238", "name": "Luiza Palmieri Serrano"}, {"authorId": "34928587", "name": "A. Forte"}]}, {"paperId": "490a946c0bb9bd1e495dfd7dede4e8c9bc5d558a", "externalIds": {"DBLP": "journals/corr/abs-2204-07904", "ArXiv": "2204.07904", "DOI": "10.48550/arXiv.2204.07904", "CorpusId": 248227874, "PubMed": "35932950"}, "url": "https://www.semanticscholar.org/paper/490a946c0bb9bd1e495dfd7dede4e8c9bc5d558a", "title": "Turing\u2019s cascade instability supports the coordination of the mind, brain, and behavior", "abstract": "Turing inspired a computer metaphor of the mind and brain that has been handy and has spawned decades of empirical investigation, but he did much more and offered behavioral and cognitive sciences another metaphor-that of the cascade. The time has come to confront Turing's cascading instability, which suggests a geometrical framework driven by power laws and can be studied using multifractal formalism and multiscale probability density function analysis. Here, we review a rapidly growing body of scientific investigations revealing signatures of cascade instability and their consequences for a perceiving, acting, and thinking organism. We review work related to executive functioning (planning to act), postural control (bodily poise for turning plans into action), and effortful perception (action to gather information in a single modality and action to blend multimodal information). We also review findings on neuronal avalanches in the brain, specifically about neural participation in body-wide cascades. Turing's cascade instability blends the mind, brain, and behavior across space and time scales and provides an alternative to the dominant computer metaphor.", "venue": "Neuroscience & Biobehavioral Reviews", "year": 2022, "referenceCount": 276, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-17", "journal": {"volume": "141", "name": "Neuroscience & Biobehavioral Reviews"}, "authors": [{"authorId": "1399320366", "name": "Damian G. Kelty-Stephen"}, {"authorId": "6964222", "name": "M. Mangalam"}]}, {"paperId": "ad2f54569ce99205628583b458fe6426df421473", "externalIds": {"DOI": "10.1145/3526112", "CorpusId": 248150877}, "url": "https://www.semanticscholar.org/paper/ad2f54569ce99205628583b458fe6426df421473", "title": "Mental State Attribution to Robots: A Systematic Review of Conceptions, Methods, and Findings", "abstract": "The topic of mental state attribution to robots has been approached by researchers from a variety of disciplines, including psychology, neuroscience, computer science, and philosophy. As a consequence, the empirical studies that have been conducted so far exhibit considerable diversity in terms of how the phenomenon is described and how it is approached from a theoretical and methodological standpoint. This literature review addresses the need for a shared scientific understanding of mental state attribution to robots by systematically and comprehensively collating conceptions, methods, and findings from 155 empirical studies across multiple disciplines. The findings of the review include that: (1) the terminology used to describe mental state attribution to robots is diverse but largely homogenous in usage; (2) the tendency to attribute mental states to robots is determined by factors such as the age and motivation of the human as well as the behavior, appearance, and identity of the robot; (3) there is a computer < robot < human pattern in the tendency to attribute mental states that appears to be moderated by the presence of socially interactive behavior; (4) there are conflicting findings in the empirical literature that stem from different sources of evidence, including self-report and non-verbal behavioral or neurological data. The review contributes toward more cumulative research on the topic and opens up for a transdisciplinary discussion about the nature of the phenomenon and what types of research methods are appropriate for investigation.", "venue": "ACM Transactions on Human-Robot Interaction", "year": 2022, "referenceCount": 397, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-04-14", "journal": {"volume": "11", "pages": "1 - 51", "name": "ACM Transactions on Human-Robot Interaction (THRI)"}, "authors": [{"authorId": "3489950", "name": "Sam Thellman"}, {"authorId": "1593289156", "name": "Maartje de Graaf"}, {"authorId": "2491309", "name": "T. Ziemke"}]}, {"paperId": "96ab678e084c508842c6a9ce85a97ba7980a93a4", "externalIds": {"PubMedCentral": "9007140", "DOI": "10.1155/2022/2455160", "CorpusId": 248154778, "PubMed": "35432519"}, "url": "https://www.semanticscholar.org/paper/96ab678e084c508842c6a9ce85a97ba7980a93a4", "title": "Sentimental Analysis of Twitter Users from Turkish Content with Natural Language Processing", "abstract": "Artificial Intelligence has guided technological progress in recent years; it has shown significant development with increased academic studies on Machine Learning and the high demand for this field in the sector. In addition to the advancement of technology day by day, the pandemic, which has become a part of our lives since early 2020, has led to social media occupying a larger place in the lives of individuals. Therefore, social media posts have become an excellent data source for the field of sentiment analysis. The main contribution of this study is based on the Natural Language Processing method, which is one of the machine learning topics in the literature. Sentiment analysis classification is a solid example for machine learning tasks that belongs to human-machine interaction. It is essential to make the computer understand people emotional situation with classifiers. There are a limited number of Turkish language studies in the literature. Turkish language has different types of linguistic features from English. Since Turkish is an agglutinative language, it is challenging to make sentiment analysis with that language. This paper aims to perform sentiment analysis of several machine learning algorithms on Turkish language datasets that are collected from Twitter. In this research, besides using public dataset that belongs to Beyaz (2021) to get more general results, another dataset is created to understand the impact of the pandemic on people and to learn about public opinions. Therefore, a custom dataset, namely, SentimentSet (Balli 2021), was created, consisting of Turkish tweets that were filtered with words such as pandemic and corona by manually marking as positive, negative, or neutral. Besides, SentimentSet could be used in future researches as benchmark dataset. Results show classification accuracy of not only up to \u223c87% with test data from datasets of both datasets and trained models, but also up to \u223c84% with small \u201cSample Test Data\u201d generated by the same methods as SentimentSet dataset. These research results contributed to indicating Turkish language specific sentiment analysis that is dependent on language specifications.", "venue": "Computational intelligence and neuroscience", "year": 2022, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-13", "journal": {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, "authors": [{"authorId": "2162378425", "name": "Cagla Balli"}, {"authorId": "10406004", "name": "Mehmet Serdar Guzel"}, {"authorId": "34702047", "name": "E. Bostanci"}, {"authorId": "2112892229", "name": "Alok Mishra"}]}, {"paperId": "43c4b6dd42abdfa0432d044728eebb7204d0c86c", "externalIds": {"DBLP": "journals/corr/abs-2204-04758", "ArXiv": "2204.04758", "DOI": "10.48550/arXiv.2204.04758", "CorpusId": 248084915}, "url": "https://www.semanticscholar.org/paper/43c4b6dd42abdfa0432d044728eebb7204d0c86c", "title": "Iceberg Sensemaking: A Process Model for Critical Data Analysis and Visualization", "abstract": "\u2014We offer a new model of the sensemaking process for data science and visual analytics. Whereas past sensemaking models have been built on theoretical foundations in cognitivism and positivism, this model adopts interpretivist foundations in order to reframe data sensemaking in humanistic terms. We identify \ufb01ve key principles centered on the concept of schemas: Tacit and Explicit Schemas, Schemas First and Always, Data as a Schematic Artifact, Schematic Multiplicity, and Sensemaking Over Time. Our model uses the analogy of an iceberg, where data is the visible tip of the schema underneath it. The analysis process iteratively re\ufb01nes both the data and its schema in tandem. We compare the roles of schemas in past sensemaking models and draw conceptual distinctions based on a historical review of schemas in different philosophical traditions. We validate the descriptive, predictive, and explanatory power of our model through four analysis scenarios: uncovering data injustice, investigating of\ufb01cial data, teaching data wrangling, and producing data mashups.", "venue": "ArXiv", "year": 2022, "referenceCount": 83, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-10", "journal": {"volume": "abs/2204.04758", "name": "ArXiv"}, "authors": [{"authorId": "70237455", "name": "C. Berret"}, {"authorId": "1732016", "name": "T. Munzner"}]}, {"paperId": "d7b14a9ac90382df1a4a485408233477256181b4", "externalIds": {"DOI": "10.1108/ijchm-10-2021-1207", "CorpusId": 247985293}, "url": "https://www.semanticscholar.org/paper/d7b14a9ac90382df1a4a485408233477256181b4", "title": "Smart dining, smart restaurant, and smart service quality (SSQ)", "abstract": "\nPurpose\nHave you been to a smart restaurant, and how were its services? A common limitation of hospitality studies stems from the lack of research on how service quality is shaped within smart technology. This study aims to fill this literature void not merely to reiterate the importance of technology but also to recast service quality through the lens of information technology. It synthesizes the 5-S model of smart service quality (AKA SSQ) as a new conceptualization of service quality application in smart hospitality contexts such as smart restaurants.\n\n\nDesign/methodology/approach\nThis study undertook a qualitative research design based on theoretical synthesis from service quality, information technology and attention restoration. Drawing from online review comments and semistructured interviews from smart restaurants, the authors improvised the SSQ model to identify the essence of smart service in smart dining establishments.\n\n\nFindings\n\u201c5-S\u201d reflects an extension of the literature to denote a new SSQ abstraction pertinent to s-servicescape, s-assurance, s-responsiveness, s-reliability and s-empathy. A nomological network was posited to better understand the importance of smart design and consequence of SSQ.\n\n\nResearch limitations/implications\nThe emergence of smart dining gives rise to smart restaurants, which puts technology at center stage. As consumers are becoming increasingly comfortable with self-service technology, auto-payment and ordering systems and robotic services, technology in foodservice will continue to play an essential role to better serve diners. Geared with advanced innovations and intelligent devices, smart restaurants are now more than mere eateries. It is a trend and a lifestyle.\n\n\nOriginality/value\nThis novel SSQ concept adds new nuances to the literature by acknowledging the technological essence in today\u2019s hospitality industry. By integrating smart technology into the service quality paradigm, the authors are able to observe several interesting behaviors exhibited during smart dining, including tech-induced restoration, which opens a new avenue to understand how attention restoration could be attained through immersion in a technologically advanced setting. By synthesizing theoretical essence from service quality, attention restoration and information technology, the authors are able to create a new dialog that should warrant a forum of discussion in future studies.\n", "venue": "International Journal of Contemporary Hospitality Management", "year": 2022, "referenceCount": 99, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-04-07", "journal": {"name": "International Journal of Contemporary Hospitality Management"}, "authors": [{"authorId": "2199012", "name": "I. Wong"}, {"authorId": "2161636178", "name": "Jingwen Huang"}, {"authorId": "2112413741", "name": "Z. Lin"}, {"authorId": "2161566069", "name": "Haoyue Jiao"}]}, {"paperId": "8a859d04581e2178331a68c54eef7788ebf0d60c", "externalIds": {"DBLP": "journals/firai/BertoliniE22", "PubMedCentral": "9037379", "DOI": "10.3389/frobt.2022.842213", "CorpusId": 248071072, "PubMed": "35480089"}, "url": "https://www.semanticscholar.org/paper/8a859d04581e2178331a68c54eef7788ebf0d60c", "title": "Robots and AI as Legal Subjects? Disentangling the Ontological and Functional Perspective", "abstract": "Robotics and AI-based applications (RAI) are often said to be so technologically advanced that they should be held responsible for their actions, instead of the human who designs or operates them. The paper aims to prove that this thesis (\u201cthe exceptionalist claim\u201d)\u2014as it stands\u2014is both theoretically incorrect and practically inadequate. Indeed, the paper argues that such claim is based on a series of misunderstanding over the very notion and functions of \u201clegal responsibility\u201d, which it then seeks to clarify by developing and interdisciplinary conceptual taxonomy. In doing so, it aims to set the premises for a more constructive debate over the feasibility of granting legal standing to robotic application. After a short Introduction setting the stage of the debate, the paper addresses the ontological claim, distinguishing the philosophical from the legal debate on the notion of i) subjectivity and ii) agency, with their respective implications. The analysis allows us to conclude that the attribution of legal subjectivity and agency are purely fictional and technical solutions to facilitate legal interactions, and is not dependent upon the intrinsic nature of the RAI. A similar structure is maintained with respect to the notion of responsibility, addressed first in a philosophical and then legal perspective, to demonstrate how the latter is often utilized to both pursue ex ante deterrence and ex post compensation. The focus on the second objective allows us to bridge the analysis towards functional (law and economics based) considerations, to discuss how even the attribution of legal personhood may be conceived as an attempt to simplify certain legal interactions and relations. Within such a framework, the discussion whether to attribute legal subjectivity to the machine needs to be kept entirely within the legal domain, and grounded on technical (legal) considerations, to be argued on a functional, bottom-up analysis of specific classes of RAI. That does not entail the attribution of animacy or the ascription of a moral status to the entity itself.", "venue": "Frontiers in Robotics and AI", "year": 2022, "referenceCount": 171, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-05", "journal": {"volume": "9", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "2071280576", "name": "A. Bertolini"}, {"authorId": "1395590949", "name": "F. Episcopo"}]}, {"paperId": "94e32a898cc8c62c5a25fb9fa01e94c21fd41da5", "externalIds": {"DBLP": "journals/corr/abs-2204-01467", "PubMedCentral": "9552145", "ArXiv": "2204.01467", "DOI": "10.1038/s42254-022-00518-3", "CorpusId": 247939660, "PubMed": "36247217"}, "url": "https://www.semanticscholar.org/paper/94e32a898cc8c62c5a25fb9fa01e94c21fd41da5", "title": "On scientific understanding with artificial intelligence", "abstract": null, "venue": "Nature Reviews Physics", "year": 2022, "referenceCount": 135, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-04", "journal": {"pages": "1 - 9", "name": "Nature Reviews. Physics"}, "authors": [{"authorId": "5906965", "name": "Mario Krenn"}, {"authorId": "6161242", "name": "Robert Pollice"}, {"authorId": "47508730", "name": "S. Guo"}, {"authorId": "3372027", "name": "Matteo Aldeghi"}, {"authorId": "1403855077", "name": "Alba Cervera-Lierta"}, {"authorId": "35323511", "name": "Pascal Friederich"}, {"authorId": "40133053", "name": "Gabriel dos Passos Gomes"}, {"authorId": "122433803", "name": "Florian Hase"}, {"authorId": "3364349", "name": "A. Jinich"}, {"authorId": "133638577", "name": "AkshatKumar Nigam"}, {"authorId": "12977956", "name": "Zhenpeng Yao"}, {"authorId": "1380248954", "name": "Al\u00e1n Aspuru-Guzik"}]}, {"paperId": "b19f3fdd798ba21d792b9675d5ff58f188fc2f8c", "externalIds": {"DOI": "10.1080/20502877.2022.2062945", "CorpusId": 248181242, "PubMed": "35420976"}, "url": "https://www.semanticscholar.org/paper/b19f3fdd798ba21d792b9675d5ff58f188fc2f8c", "title": "The Making of Imago Hominis: Can We Produce Artificial Companions by Programming Sentience into Robots?", "abstract": "This essay discusses sentient robot (SR) research through the lens of suffering. First three kinds of suffering are considered: physical, psychological, and existential. Physical pain is shown to be primarily subjective, and distinctive psychological and existential sufferings probably do exist, which are neither reducible to neurobiological events, nor replicable through algorithms. The current stage of SR research is then reviewed. Many creative proposals are presented, together with some philosophical and technical challenges posed by other scholars. I then offer my critique of SR research, claiming that it is based on a superficial understanding of suffering and unjustified philosophical presuppositions, namely, reductive physicalism. Without the capability to suffer, robots probably cannot love in any real sense, and no meaningful relationship may be developed between such a robot and a human. Therefore, we are probably unable to produce sentient robots that can become our companions (friends, lovers, etc.).", "venue": "The New bioethics : a multidisciplinary journal of biotechnology and the body", "year": 2022, "referenceCount": 58, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-03", "journal": {"volume": "28", "pages": "168 - 185", "name": "The New Bioethics"}, "authors": [{"authorId": "2162526861", "name": "Zishang Yue"}]}, {"paperId": "cc0f9bdfce7f525c3de1a72cb24c61265c025190", "externalIds": {"DOI": "10.1080/19322909.2022.2060893", "CorpusId": 248079598}, "url": "https://www.semanticscholar.org/paper/cc0f9bdfce7f525c3de1a72cb24c61265c025190", "title": "Implementing a Chatbot on a Library Website", "abstract": "Abstract A library\u2019s website is a virtual point of contact for interacting with its patrons. Ensuring a library\u2019s website has easily findable content is critical for providing access to library resources and highlighting services and events. One tool for assisting with content findability is a chatbot, a form of artificial intelligence software. In this case study, Lehman College\u2019s Leonard Lief Library implemented Ivy, a proprietary educational software chatbot on its website, the first of its kind for an academic library. This chatbot functioned as a new tool that assisted users seeking information and provided insight to librarians about the kinds of topics students search for via the library website. This article provides the first detailed description in the literature of an implementation of a proprietary chatbot for an academic library.", "venue": "Journal of Web Librarianship", "year": 2022, "referenceCount": 43, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-03", "journal": {"volume": "16", "pages": "120 - 142", "name": "Journal of Web Librarianship"}, "authors": [{"authorId": "66427909", "name": "Michelle Ehrenpreis"}, {"authorId": "152209517", "name": "J. DeLooper"}]}, {"paperId": "e6b3a9a900b7037cb0977bea489c0aa053d94fa0", "externalIds": {"DOI": "10.3390/proceedings2022081105", "CorpusId": 249296966}, "url": "https://www.semanticscholar.org/paper/e6b3a9a900b7037cb0977bea489c0aa053d94fa0", "title": "Advanced NLP Procedures as Premises for the Reconstruction of the Idea of Knowledge", "abstract": ": This paper evaluates arti\ufb01cial texts produced by the GPT 2 and GPT 3 language models and proposes to use hermeneutic tools for their analysis, putting them on an equal footing with man-made texts. This decision is due to the intelligibility of these texts and the implicit knowledge on which they are based. Since the base of these language models is always the language corpus, it can be assumed that it is the source of this knowledge and that tools such as discourse and, in particular, the theory of discursive space can be used for its analysis.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-01", "journal": {"name": "The 2021 Summit of the International Society for the Study of Information"}, "authors": [{"authorId": "4175098", "name": "R. Maciag"}]}, {"paperId": "6e07e341c8e0063c4c2fcf1d4d8867fee85831b6", "externalIds": {"DOI": "10.1145/3512335", "CorpusId": 248497625}, "url": "https://www.semanticscholar.org/paper/6e07e341c8e0063c4c2fcf1d4d8867fee85831b6", "title": "Workings of science", "abstract": "While most people are not familiar with the details of how artificial intelligence (AI) works, the term itself is becoming more familiar to the non-scientific community, to the point that it (\"AI\") has almost become part of the regular vernacular of the ordinary person. AI has been with us for a long time-from first beginnings in ancient times in the form of automatons and other devices mimicking humans or other animals, through the middle of the last century when the term \"artificial intelligence was actually coined, to the present times where it (the label rather than the actual technology) is entering the psyche of the general public. This article explores the notion that the technology we call artificial intelligence is not yet ripe, but is establishing itself as a science in its own right, and that by 2156-the 200 year anniversary of the coining of the term-the technology should be in a position to deliver on its promises.", "venue": "Ubiquity", "year": 2022, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-01", "journal": {"volume": "2022", "pages": "1 - 18", "name": "Ubiquity"}, "authors": [{"authorId": "2903173", "name": "K. Delic"}, {"authorId": "2811225", "name": "J. A. Riley"}]}, {"paperId": "4d948864b35c5ad1656e856c0ed982891d20f6ce", "externalIds": {"DBLP": "journals/suscom/VermaTS22", "DOI": "10.1016/j.suscom.2022.100742", "CorpusId": 248331709}, "url": "https://www.semanticscholar.org/paper/4d948864b35c5ad1656e856c0ed982891d20f6ce", "title": "EXTREM-EDGE - EXtensions To RISC-V for Energy-efficient ML inference at the EDGE of IoT", "abstract": null, "venue": "Sustainable Computing: Informatics and Systems", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-01", "journal": {"volume": "35", "pages": "100742", "name": "Sustain. Comput. Informatics Syst."}, "authors": [{"authorId": "34555540", "name": "Vaibhav Verma"}, {"authorId": "3414831", "name": "Tommy Tracy"}, {"authorId": "1741387", "name": "M. Stan"}]}, {"paperId": "3bf084bf111325a666eb565c0168246f9f864cac", "externalIds": {"DBLP": "journals/nca/WangLYL22", "DOI": "10.1007/s00521-022-07182-9", "CorpusId": 247908956}, "url": "https://www.semanticscholar.org/paper/3bf084bf111325a666eb565c0168246f9f864cac", "title": "Semantic-aware conditional variational autoencoder for one-to-many dialogue generation", "abstract": null, "venue": "Neural computing & applications (Print)", "year": 2022, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-01", "journal": {"volume": "34", "pages": "13683 - 13695", "name": "Neural Computing and Applications"}, "authors": [{"authorId": "2118416767", "name": "Ye Wang"}, {"authorId": "2075442351", "name": "Jing Liao"}, {"authorId": "32904145", "name": "Hong Yu"}, {"authorId": "40939264", "name": "Jiaxu Leng"}]}, {"paperId": "096c5b6f749320d14b2371248fb41b2c8fa70b06", "externalIds": {"PubMedCentral": "9015736", "DOI": "10.2196/33145", "CorpusId": 247855234, "PubMed": "35363141"}, "url": "https://www.semanticscholar.org/paper/096c5b6f749320d14b2371248fb41b2c8fa70b06", "title": "Stakeholder Perspectives on Clinical Decision Support Tools to Inform Clinical Artificial Intelligence Implementation: Protocol for a Framework Synthesis for Qualitative Evidence", "abstract": "Background Quantitative systematic reviews have identified clinical artificial intelligence (AI)-enabled tools with adequate performance for real-world implementation. To our knowledge, no published report or protocol synthesizes the full breadth of stakeholder perspectives. The absence of such a rigorous foundation perpetuates the \u201cAI chasm,\u201d which continues to delay patient benefit. Objective The aim of this research is to synthesize stakeholder perspectives of computerized clinical decision support tools in any health care setting. Synthesized findings will inform future research and the implementation of AI into health care services. Methods The search strategy will use MEDLINE (Ovid), Scopus, CINAHL (EBSCO), ACM Digital Library, and Science Citation Index (Web of Science). Following deduplication, title, abstract, and full text screening will be performed by 2 independent reviewers with a third topic expert arbitrating. The quality of included studies will be appraised to support interpretation. Best-fit framework synthesis will be performed, with line-by-line coding completed by 2 independent reviewers. Where appropriate, these findings will be assigned to 1 of 22 a priori themes defined by the Nonadoption, Abandonment, Scale-up, Spread, and Sustainability framework. New domains will be inductively generated for outlying findings. The placement of findings within themes will be reviewed iteratively by a study advisory group including patient and lay representatives. Results Study registration was obtained from PROSPERO (CRD42021256005) in May 2021. Final searches were executed in April, and screening is ongoing at the time of writing. Full text data analysis is due to be completed in October 2021. We anticipate that the study will be submitted for open-access publication in late 2021. Conclusions This paper describes the protocol for a qualitative evidence synthesis aiming to define barriers and facilitators to the implementation of computerized clinical decision support tools from all relevant stakeholders. The results of this study are intended to expedite the delivery of patient benefit from AI-enabled clinical tools. Trial Registration PROSPERO CRD42021256005; https://tinyurl.com/r4x3thvp International Registered Report Identifier (IRRID) DERR1-10.2196/33145", "venue": "JMIR research protocols", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-01", "journal": {"volume": "11", "name": "JMIR Research Protocols"}, "authors": [{"authorId": "1404619882", "name": "M. Al-Zubaidy"}, {"authorId": "32243895", "name": "H. Hogg"}, {"authorId": "2834652", "name": "G. Maniatopoulos"}, {"authorId": "4920995", "name": "J. Talks"}, {"authorId": "144055127", "name": "M. Teare"}, {"authorId": "5638585", "name": "P. Keane"}, {"authorId": "2160974829", "name": "Fiona R Beyer"}]}, {"paperId": "d231bfe0a30ee8a0e59d40d5edac4faa6aee7704", "externalIds": {"PubMedCentral": "9240552", "DOI": "10.4103/ijo.IJO_644_22", "CorpusId": 247634286, "PubMed": "35325987"}, "url": "https://www.semanticscholar.org/paper/d231bfe0a30ee8a0e59d40d5edac4faa6aee7704", "title": "Artificial intelligence in ophthalmology - Machines think!", "abstract": "It was 72\u2010years\u2010ago that the British mathematician Alan Turing had posed a provocative question \u201cCan machines think?\u201d in his landmark 1950 paper \u201cComputing Machinery and Intelligence\u201d. He also described a test to evaluate the humanness of the computer.[1] The Turing Test is a 3\u2010player imitation game in which a computer tries to fool a human interrogator into thinking that it\u2019s a person.[1] Seven decades later, despite all the advances in artificial intelligence (AI), no computer has conclusively passed the Turing Test. Despite the failure to conquer the bar of artificial general intelligence prescribed by Turing, computers have come to become an inseparable part of our lives and times. Perhaps, AI is not meant to evolve like a human mind. As Stuart Russell and Peter Norvig pointed out, \u201cAeronautical engineering texts do not define the goal of their field as making machines that fly so exactly like pigeons that they can fool other pigeons.\u201d The evolution of AI has opened yet unfathomable new paradigms in several domains that intricately affect us, including medicine.", "venue": "Indian journal of ophthalmology", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2022-04-01", "journal": {"volume": "70", "pages": "1075 - 1079", "name": "Indian Journal of Ophthalmology"}, "authors": [{"authorId": "5267467", "name": "S. Honavar"}]}, {"paperId": "6157aded1cc77adfa428ae315abca22b5fcea69f", "externalIds": {"PubMedCentral": "9008134", "DOI": "10.3389/fnsys.2022.800280", "CorpusId": 247799011, "PubMed": "35431820"}, "url": "https://www.semanticscholar.org/paper/6157aded1cc77adfa428ae315abca22b5fcea69f", "title": "Understanding Is a Process", "abstract": "How do we gauge understanding? Tests of understanding, such as Turing's imitation game, are numerous; yet, attempts to achieve a state of understanding are not satisfactory assessments. Intelligent agents designed to pass one test of understanding often fall short of others. Rather than approaching understanding as a system state, in this paper, we argue that understanding is a process that changes over time and experience. The only window into the process is through the lens of natural language. Usefully, failures of understanding reveal breakdowns in the process. We propose a set of natural language-based probes that can be used to map the degree of understanding a human or intelligent system has achieved through combinations of successes and failures.", "venue": "Frontiers in Systems Neuroscience", "year": 2022, "referenceCount": 160, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-31", "journal": {"volume": "16", "name": "Frontiers in Systems Neuroscience"}, "authors": [{"authorId": "2684131", "name": "L. Blaha"}, {"authorId": "122860492", "name": "Mitchell Abrams"}, {"authorId": "3390221", "name": "Sarah A Bibyk"}, {"authorId": "3202888", "name": "Claire Bonial"}, {"authorId": "11880712", "name": "B. M. Hartzler"}, {"authorId": "2160853175", "name": "Christopher D. Hsu"}, {"authorId": "2011661", "name": "S. Khemlani"}, {"authorId": "2116964118", "name": "Jayde King"}, {"authorId": "47793058", "name": "R. St. Amant"}, {"authorId": "145209749", "name": "J. Trafton"}, {"authorId": "2160754294", "name": "Rachel Wong"}]}, {"paperId": "353891dd5038780069ebf0c1c0ec777cb2632d14", "externalIds": {"DBLP": "journals/corr/abs-2204-05138", "ArXiv": "2204.05138", "DOI": "10.48550/arXiv.2204.05138", "CorpusId": 248085552}, "url": "https://www.semanticscholar.org/paper/353891dd5038780069ebf0c1c0ec777cb2632d14", "title": "Artificial Intelligence Software Structured to Simulate Human Working Memory, Mental Imagery, and Mental Continuity", "abstract": "This article presents an artificial intelligence (AI) architecture intended to simulate the human working memory system as well as the manner in which it is updated iteratively. It features several interconnected neural networks designed to emulate the specialized modules of the cerebral cortex. These are structured hierarchically and integrated into a global workspace. They are capable of temporarily maintaining high-level patterns akin to the psychological items maintained in working memory. This maintenance is made possible by persistent neural activity in the form of two modalities: sustained neural firing (resulting in a focus of attention) and synaptic potentiation (resulting in a short-term store). This persistent activity is updated iteratively resulting in incremental changes to the content of the working memory system. As the content stored in working memory gradually evolves, successive states overlap and are continuous with one another. The present article will explore how this architecture can lead to gradual shift in the distribution of coactive representations, ultimately leading to mental continuity between processing states, and thus to human-like cognition. map with an iteratively updated working memory store may provide an AI system with the cognitive assets needed to produce generalized intelligence.", "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-29", "journal": {"volume": "abs/2204.05138", "name": "ArXiv"}, "authors": [{"authorId": "4725371", "name": "J. Reser"}]}, {"paperId": "404bce8e7be98ada1b8d7338d9daa6e5031626dd", "externalIds": {"ArXiv": "2204.01466", "DBLP": "journals/corr/abs-2204-01466", "DOI": "10.48550/arXiv.2204.01466", "CorpusId": 247940084}, "url": "https://www.semanticscholar.org/paper/404bce8e7be98ada1b8d7338d9daa6e5031626dd", "title": "A single Long Short-Term Memory network for enhancing the prediction of path-dependent plasticity with material heterogeneity and anisotropy", "abstract": "This study presents applicability of conventional deep recurrent neural networks (RNN) to predict path-dependent plasticity associated with material heterogeneity and anisotropy. Although the architecture of RNN possess inductive biases toward information over time, it is a still challenging to to learn the path-dependent material behavior as a function of loading path considering the change from elastic to elasto-plastic regimes. Our attempt is to develop a simple machine-learning based model that can replicate elastoplastic behaviors considering material heterogeneity and anisotropy. The basic Long-Short Term Memory Unit (LSTM) is adopted for the modeling of plasticity in the two-dimensional space by enhancing the inductive bias toward the past information through manipulating input variables. Our results find that a single LSTM based model can capture the J2 plasticity responses under both monotonic and arbitrary loading paths provided the material heterogeneity. The proposed neural network architecture is then used to model elasto-plastic responses of a two-dimensional transversely anisotropic material associated with computational homogenization (FE 2 ). It is also found that a single LSTM model can be used to accurately and effectively capture the path-dependent responses of heterogeneous and anisotropic microstructures under arbitrary mechanical loading conditions.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-29", "journal": {"volume": "abs/2204.01466", "name": "ArXiv"}, "authors": [{"authorId": "2161343141", "name": "Eshan Motevali Haghighi"}, {"authorId": "98495515", "name": "S. Na"}]}, {"paperId": "cc7663332d14450414ceb3dc914627be1c547212", "externalIds": {"DOI": "10.3389/feduc.2022.755914", "CorpusId": 247783373}, "url": "https://www.semanticscholar.org/paper/cc7663332d14450414ceb3dc914627be1c547212", "title": "Teacher\u2019s Perceptions of Using an Artificial Intelligence-Based Educational Tool for Scientific Writing", "abstract": "Efforts have constantly been made to incorporate AI into teaching and learning; however, the successful implementation of new instructional technologies is closely related to the attitudes of the teachers who lead the lesson. Teachers\u2019 perceptions of AI utilization have only been investigated by only few scholars due an overall lack of experience of teachers regarding how AI can be utilized in the classroom as well as no specific idea of what AI-adopted tools would be like. This study investigated how teachers perceived an AI-enhanced scaffolding system developed to support students\u2019 scientific writing for STEM education. Results revealed that most STEM teachers positively experienced AI as a source for superior scaffolding. On the other hand, they also raised the possibility of several issues caused by using AI such as the change in the role played by the teachers in the classroom and the transparency of the decisions made by the AI system. These results can be used as a foundation for which to create guidelines for the future integration of AI with STEM education in schools, since it reports teachers\u2019 experiences utilizing the system and various considerations regarding its implementation.", "venue": "Frontiers in Education", "year": 2022, "referenceCount": 100, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-29", "journal": {"volume": "7"}, "authors": [{"authorId": "50826575", "name": "N. Kim"}, {"authorId": "47596860", "name": "Min Kyu Kim"}]}, {"paperId": "35e717eb3d32960db8cd67bd51485db96a8f4dac", "externalIds": {"DBLP": "journals/corr/abs-2203-14641", "ArXiv": "2203.14641", "DOI": "10.48550/arXiv.2203.14641", "CorpusId": 247762961}, "url": "https://www.semanticscholar.org/paper/35e717eb3d32960db8cd67bd51485db96a8f4dac", "title": "Subjective Evaluation of Deep Learning Models for Symbolic Music Composition", "abstract": "Deep learning models are typically evaluated to measure and compare their performance on a given task. The metrics that are commonly used to evaluate these models are standard metrics that are used for different tasks. In the field of music composition or generation, the standard metrics used in other fields have no clear meaning in terms of music theory. In this paper, we propose a subjective method to evaluate AI-based music composition systems by asking questions related to basic music principles to different levels of users based on their musical experience and knowledge. We use this method to compare state-of-the-art models for music composition with deep learning. We give the results of this evaluation method and we compare the responses of each user level for each evaluated model.", "venue": "ArXiv", "year": 2022, "referenceCount": 19, "citationCount": 4, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-28", "journal": {"volume": "abs/2203.14641", "name": "ArXiv"}, "authors": [{"authorId": "1882682548", "name": "Carlos Hernandez-Olivan"}, {"authorId": "2160542077", "name": "Jorge Abadias Puyuelo"}, {"authorId": "23531502", "name": "J. R. Beltr\u00e1n"}]}, {"paperId": "cd3d2b3a182c76cb0020cb2e725a9bfe88846dd5", "externalIds": {"ArXiv": "2204.01518", "DBLP": "journals/corr/abs-2204-01518", "DOI": "10.5121/csit.2022.120613", "CorpusId": 247824075}, "url": "https://www.semanticscholar.org/paper/cd3d2b3a182c76cb0020cb2e725a9bfe88846dd5", "title": "Artificial Intelligence: Framework of driving triggers to past, present and future applications and influencers of industry sector adoption", "abstract": "To gain a sense of the development of Artificial Intelligence (AI), this research analyzes what has been done in the past, presently in the last decade and what is predicted for the next several decades. The paper will highlight the biggest changes in AI and give examples of how these technologies are applied in several key industry sectors along with influencers that can affect adoption speed. Lastly, the research examines the driving triggers such as cost, speed, accuracy, diversity/inclusion and interdisciplinary research/collaboration that propel AI into an essential transformative technology.", "venue": "Embedded Systems and Applications", "year": 2022, "referenceCount": 100, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-26", "journal": {"volume": "abs/2204.01518", "name": "ArXiv"}, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "2160808545", "name": "Susan Kaplan"}]}, {"paperId": "519db754d020a51bd960d5549e2955fd47652e2b", "externalIds": {"PubMedCentral": "8990896", "DOI": "10.3389/fmed.2022.807994", "CorpusId": 247769262, "PubMed": "35402468"}, "url": "https://www.semanticscholar.org/paper/519db754d020a51bd960d5549e2955fd47652e2b", "title": "Use of Artificial Intelligence to Identify New Mechanisms and Approaches to Therapy of Bone Disorders Associated With Chronic Kidney Disease", "abstract": "Chronic kidney disease (CKD) leads to clinically severe bone loss, resulting from the deranged mineral metabolism that accompanies CKD. Each individual patient presents a unique combination of risk factors, pathologies, and complications of bone disease. The complexity of the disorder coupled with our incomplete understanding of the pathophysiology has significantly hampered the ability of nephrologists to prevent fractures, a leading comorbidity of CKD. Much has been learned from animal models; however, we propose in this review that application of multiple techniques of mathematical modeling and artificial intelligence can accelerate our ability to develop relevant and impactful clinical trials and can lead to better understanding of the osteoporosis of CKD. We highlight the foundational work that informed our current model development and discuss the potential applications of our approach combining principles of quantitative systems pharmacology, model predictive control, and reinforcement learning to deliver individualized precision medical therapy of this highly complex disorder.", "venue": "Frontiers in Medicine", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-03-25", "journal": {"volume": "9", "name": "Frontiers in Medicine"}, "authors": [{"authorId": "3320160", "name": "A. Gaweda"}, {"authorId": "35184257", "name": "E. Lederer"}, {"authorId": "35218620", "name": "M. Brier"}]}, {"paperId": "f281ad6573ed8ea7fb3116a3747b0e80ef522ea9", "externalIds": {"DBLP": "journals/corr/abs-2203-12687", "ArXiv": "2203.12687", "DOI": "10.1080/10447318.2022.2050543", "CorpusId": 247628267}, "url": "https://www.semanticscholar.org/paper/f281ad6573ed8ea7fb3116a3747b0e80ef522ea9", "title": "Trust in AI and Its Role in the Acceptance of AI Technologies", "abstract": "As AI-enhanced technologies become common in a variety of domains, there is an increasing need to define and examine the trust that users have in such technologies. Given the progress in the development of AI, a correspondingly sophisticated understanding of trust in the technology is required. This paper addresses this need by explaining the role of trust on the intention to use AI technologies. Study 1 examined the role of trust in the use of AI voice assistants based on survey responses from college students. A path analysis confirmed that trust had a significant effect on the intention to use AI, which operated through perceived usefulness and participants\u2019 attitude toward voice assistants. In Study 2, using data from a representative sample of the U.S. population, different dimensions of trust were examined using exploratory factor analysis, which yielded two dimensions: human-like trust and functionality trust. The results of the path analyses from Study 1 were replicated in Study 2, confirming the indirect effect of trust and the effects of perceived usefulness, ease of use, and attitude on intention to use. Further, both dimensions of trust shared a similar pattern of effects within the model, with functionality-related trust exhibiting a greater total impact on usage intention than human-like trust. Overall, the role of trust in the acceptance of AI technologies was significant across both studies. This research contributes to the advancement and application of the TAM in AI-related applications and offers a multidimensional measure of trust that can be utilized in the future study of trustworthy AI.", "venue": "International Journal of Human\u2013Computer Interaction", "year": 2022, "referenceCount": 66, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-03-23", "journal": {"volume": "abs/2203.12687", "name": "ArXiv"}, "authors": [{"authorId": "51191513", "name": "Hyesun Choung"}, {"authorId": "40955731", "name": "Prabu David"}, {"authorId": "2142143664", "name": "Arun Ross"}]}, {"paperId": "5c2ee6c183538498061540e6d942977a23a2e652", "externalIds": {"DOI": "10.32749/nucleodoconhecimento.com.br/tecnologia/premio-loebner", "CorpusId": 248014198}, "url": "https://www.semanticscholar.org/paper/5c2ee6c183538498061540e6d942977a23a2e652", "title": "Intelig\u00eancia artificial e o teste de Turing: uma an\u00e1lise do pr\u00eamio Loebner de 2017 e 2018", "abstract": "A partir dos estudos iniciais sobre as compet\u00eancias de Intelig\u00eancia Artificial (IA), na d\u00e9cada de 1950, Alan Turing, em seu artigo Computing Machinery and intelligence, inseriu a premissa \u201cM\u00e1quinas s\u00e3o capazes de pensar?\u201d. Nesse sentido, percebe-se que os chatbots est\u00e3o diretamente relacionados a essa ideia, haja vista que eles s\u00e3o capazes de conversar e de aprender, via deep learning, para se adaptar em diversos cen\u00e1rios de conversa\u00e7\u00e3o. A pergunta de pesquisa deste artigo \u00e9: as avalia\u00e7\u00f5es das IAs finalistas que disputam o pr\u00eamio Loebner s\u00e3o coerentes com as ideias propostas por Turing? Sendo assim, o objetivo deste artigo \u00e9: analisar as solu\u00e7\u00f5es de IA apresentadas no pr\u00eamio Loebner (correlacionando com o teste de Turing) e atribuir uma pontua\u00e7\u00e3o pr\u00f3pria para elas. Ao final, v\u00ea-se, ap\u00f3s a aplica\u00e7\u00e3o do teste aos finalistas do pr\u00eamio de Loebner, a discrep\u00e2ncia de pontua\u00e7\u00f5es entre a campe\u00e3 Mitsuku e as demais IAs. Al\u00e9m disso, constatou-se, que apesar da sua pontua\u00e7\u00e3o elevada, o problema da mimetiza\u00e7\u00e3o ainda \u00e9 diretamente implicado nas IAs que realizam o teste justamente com o objetivo de ganhar a prova, interferindo, dessa forma, nas reais capacidades da IA testada.", "venue": "Revista Cient\u00edfica Multidisciplinar N\u00facleo do Conhecimento", "year": 2022, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-03-22", "journal": {"name": "Revista Cient\u00edfica Multidisciplinar N\u00facleo do Conhecimento"}, "authors": [{"authorId": "2190727999", "name": "R. E. Silva"}, {"authorId": "122493651", "name": "A. F. D. Souza"}, {"authorId": "2137242091", "name": "Polyana Santos Fonseca Nascimento"}, {"authorId": "102568924", "name": "Pedro Henrique Sales Girotto"}]}, {"paperId": "b37ab9d42fe9336f362342e75ed029bf52d37f1c", "externalIds": {"DBLP": "journals/air/ZhengYGW22", "DOI": "10.1007/s10462-022-10166-9", "CorpusId": 247601588}, "url": "https://www.semanticscholar.org/paper/b37ab9d42fe9336f362342e75ed029bf52d37f1c", "title": "Computational knowledge vision: paradigmatic knowledge based prescriptive learning and reasoning for perception and vision", "abstract": null, "venue": "Artificial Intelligence Review", "year": 2022, "referenceCount": 275, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-21", "journal": {"volume": "55", "pages": "5917 - 5952", "name": "Artificial Intelligence Review"}, "authors": [{"authorId": "48499775", "name": "Wenbo Zheng"}, {"authorId": "151486225", "name": "Lan Yan"}, {"authorId": "1491637173", "name": "Chao Gou"}, {"authorId": "47939505", "name": "Fei-Yue Wang"}]}, {"paperId": "52e0280c4789483920cd3f912e19e1d5c49f0f46", "externalIds": {"DOI": "10.1007/s42438-022-00303-6", "CorpusId": 247606277}, "url": "https://www.semanticscholar.org/paper/52e0280c4789483920cd3f912e19e1d5c49f0f46", "title": "Towards Turing Test 2.0\u2014Attribution of Moral Status and Personhood to Human and Non-Human Agents", "abstract": null, "venue": "Postdigital Science and Education", "year": 2022, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-03-21", "journal": {"volume": "4", "pages": "860 - 876", "name": "Postdigital Science and Education"}, "authors": [{"authorId": "2159615035", "name": "Aleksandra Lukaszewicz"}, {"authorId": "2066044296", "name": "Pawe\u0142 Fortuna"}]}, {"paperId": "fa4701be8952563b1d4c5355ef08ad7836f60192", "externalIds": {"ArXiv": "2203.10317", "DBLP": "journals/corr/abs-2203-10317", "DOI": "10.1007/978-3-031-13324-4_47", "CorpusId": 247594200}, "url": "https://www.semanticscholar.org/paper/fa4701be8952563b1d4c5355ef08ad7836f60192", "title": "Practical Recommendations for Replay-based Continual Learning Methods", "abstract": null, "venue": "ICIAP Workshops", "year": 2022, "referenceCount": 33, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-19", "journal": {"pages": "548-559"}, "authors": [{"authorId": "2159540263", "name": "Gabriele Merlin"}, {"authorId": "2055550", "name": "Vincenzo Lomonaco"}, {"authorId": "47167661", "name": "Andrea Cossu"}, {"authorId": "144689520", "name": "Antonio Carta"}, {"authorId": "3224102", "name": "D. Bacciu"}]}, {"paperId": "2c39fcfc4848049dcc89230e3cf28ce441f93f9d", "externalIds": {"DOI": "10.3390/philosophies7020033", "CorpusId": 247605037}, "url": "https://www.semanticscholar.org/paper/2c39fcfc4848049dcc89230e3cf28ce441f93f9d", "title": "Intuition and Ingenuity: G\u00f6del on Turing\u2019s \u201cPhilosophical Error\u201d", "abstract": "Despite his unreserved appreciation of Turing\u2019s analysis for being a \u201cprecise and unquestionably adequate definition\u201d of formal system or mechanical computability, G\u00f6del nevertheless published a short note in 1972 claiming to have found a \u201cphilosophical error\u201d in Turing\u2019s argument with regard to the finite nature of mental states and memory. A natural question arises: how could G\u00f6del enjoy the generality conferred on his results by Turing\u2019s work, despite the error of its ways? Previous interpretative strategies by Feferman, Shagrir and others have mainly tried to resolve the disparity by distinguishing different types of arguments in Turing and taking G\u00f6del to approve only some of them. By a more integral examination of their ideas, especially Turing\u2019s response to the \u201cmathematical objection\u201d based on G\u00f6del\u2019s incompleteness theorem and G\u00f6del\u2019s own conception of finite yet non-mechanical procedures, and taking some of the main ideas of current developments in machine learning into consideration, I will try to present a new explanation for the apparent disparity, arguing that there is no \u201cerror\u201d on Turing\u2019s side and the seemingly conflicting views held by Turing and G\u00f6del should best be seen as complementary, keeping intuition and ingenuity together.", "venue": "Philosophies", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-18", "journal": {"name": "Philosophies"}, "authors": [{"authorId": "2118172775", "name": "Long Chen"}]}, {"paperId": "cd1af17599fa7dc6c2bc9247b9f44e420f1a3d64", "externalIds": {"PubMedCentral": "8944871", "DOI": "10.1073/pnas.2107151119", "CorpusId": 247499099, "PubMed": "35294283"}, "url": "https://www.semanticscholar.org/paper/cd1af17599fa7dc6c2bc9247b9f44e420f1a3d64", "title": "The difficulty of computing stable and accurate neural networks: On the barriers of deep learning and Smale\u2019s 18th problem", "abstract": "Significance Instability is the Achilles\u2019 heel of modern artificial intelligence (AI) and a paradox, with training algorithms finding unstable neural networks (NNs) despite the existence of stable ones. This foundational issue relates to Smale\u2019s 18th mathematical problem for the 21st century on the limits of AI. By expanding methodologies initiated by G\u00f6del and Turing, we demonstrate limitations on the existence of (even randomized) algorithms for computing NNs. Despite numerous existence results of NNs with great approximation properties, only in specific cases do there also exist algorithms that can compute them. We initiate a classification theory on which NNs can be trained and introduce NNs that\u2014under suitable conditions\u2014are robust to perturbations and exponentially accurate in the number of hidden layers.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 2022, "referenceCount": 85, "citationCount": 14, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-16", "journal": {"volume": "119", "name": "Proceedings of the National Academy of Sciences of the United States of America"}, "authors": [{"authorId": "51445731", "name": "Matthew J. Colbrook"}, {"authorId": "72167909", "name": "Vegard Antun"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": "3a10e1f4d26aa3a1931abd0e2f764fb32ed15208", "externalIds": {"DOI": "10.3390/proceedings2022081053", "CorpusId": 247612933}, "url": "https://www.semanticscholar.org/paper/3a10e1f4d26aa3a1931abd0e2f764fb32ed15208", "title": "The Science of Information Processing Structures and the Design of a New Class of Distributed Computing Structures", "abstract": "Classical computer science (CCS) based on the universal Turing machine has given us tools to decipher the mysteries of physical, chemical, and biological systems in nature. Symbolic computing and sub-symbolic computing have allowed us to model and analyze various observations (including both mental and physical processes) and optimize our interactions with each other and with our environment. In this paper, we present the limitations of CCS to model the autopoietic and cognitive behaviors of living organisms. We discuss the new science of information processing structures (SIPS), which allows us not only to model but also implement digital automata with these behaviors.", "venue": "IS4SI 2021", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-16", "journal": {"name": "IS4SI 2021"}, "authors": [{"authorId": "3289961", "name": "Rao V. Mikkilineni"}]}, {"paperId": "2b5da9ec9120d72f6d6af2973079763a569b6178", "externalIds": {"ArXiv": "2208.08666", "DBLP": "journals/corr/abs-2208-08666", "DOI": "10.48550/arXiv.2208.08666", "CorpusId": 251643865}, "url": "https://www.semanticscholar.org/paper/2b5da9ec9120d72f6d6af2973079763a569b6178", "title": "On an Application of Generative Adversarial Networks on Remaining Lifetime Estimation", "abstract": "A major problem of structural health monitoring (SHM) has been the prognosis of damage and the prediction of the remaining useful life of a structure. Both tasks depend on multiple parameters, many of which are often uncertain. A wide range of models have been developed for the aforementioned tasks, but they have been either deterministic or stochastic with the ability to take into account only a restricted set of past states of the structure. In the current work, a generative model is proposed in order to make predictions about the damage evolution of structures. The model is able to perform in a population-based SHM (PBSHM) framework, to take into account many past states of the damaged structure, to incorporate uncertainties in the modelling process and to generate potential damage evolution outcomes according to data acquired from a structure. The algorithm is tested on a simulated damage evolution example and the results reveal that it is able to provide quite confident predictions about the remaining useful life of structures within a population.", "venue": "Proceedings of the 13th International Workshop on Structural Health Monitoring", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-15", "journal": {"volume": "abs/2208.08666", "name": "ArXiv"}, "authors": [{"authorId": "2012104962", "name": "G. Tsialiamanis"}, {"authorId": "65755313", "name": "D. Wagg"}, {"authorId": "2482415", "name": "N. Dervilis"}, {"authorId": "2103006625", "name": "K. Worden"}]}, {"paperId": "abca9c129e607943d50c0b51de6024b787218c1d", "externalIds": {"DOI": "10.1080/02773945.2022.2032814", "CorpusId": 248588479}, "url": "https://www.semanticscholar.org/paper/abca9c129e607943d50c0b51de6024b787218c1d", "title": "\u201cIt\u2019s Promethean, Man!\u201d: The Frankenstein Myth and Rhetorical Invention", "abstract": "ABSTRACT Frankenstein myths circulate widely in Western culture and offer robust indices of common anxieties about invention. This essay articulates a version of the Frankenstein myth that emphasizes potential contributions to the practice and teaching of rhetoric. Specifically, this essay suggests that this myth about the practice of invention in general can contribute to understandings of rhetorical invention in particular, especially with regard to the extent to which rhetorical invention may, in some instances, be informed by themes associated with deception, duality, and autonomy. The essay closes with a discussion of implications and limitations.", "venue": "Rhetoric Society Quarterly", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-15", "journal": {"volume": "52", "pages": "122 - 136", "name": "Rhetoric Society Quarterly"}, "authors": [{"authorId": "66295572", "name": "R. Terrill"}]}, {"paperId": "842e92b8a17e6fb591e2a28e4660ae1f41561c37", "externalIds": {"ArXiv": "2203.05875", "DBLP": "journals/corr/abs-2203-05875", "DOI": "10.48550/arXiv.2203.05875", "CorpusId": 247411482}, "url": "https://www.semanticscholar.org/paper/842e92b8a17e6fb591e2a28e4660ae1f41561c37", "title": "Using Word Embeddings to Analyze Protests News", "abstract": "The first two tasks of the CLEF 2019 ProtestNews events focused on distinguishing between protest and non-protest related news articles and sentences in a binary classification task. Among the submissions, two well performing models have been chosen in order to replace the existing word embeddings word2vec and FastTest with ELMo and DistilBERT. Unlike bag of words or earlier vector approaches, ELMo and DistilBERT represent words as a sequence of vectors by capturing the meaning based on contextual information in the text. Without changing the architecture of the original models other than the word embeddings, the implementation of DistilBERT improved the performance measured on the F1-Score of 0.66 compared to the FastText implementation. DistilBERT also outperformed ELMo in both tasks and models. Cleaning the datasets by removing stopwords and lemmatizing the words has been shown to make the models more generalizable across different contexts when training on a dataset with Indian news articles and evaluating the models on a dataset with news articles from China.", "venue": "ArXiv", "year": 2022, "referenceCount": 29, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-11", "journal": {"volume": "abs/2203.05875", "name": "ArXiv"}, "authors": [{"authorId": "2158660481", "name": "Maria Alejandra Cardoza Ceron"}]}, {"paperId": "8454fcc2a0f783ec9668432afda2a69b60b8eb13", "externalIds": {"DOI": "10.1108/jaoc-08-2020-0107", "CorpusId": 247372282}, "url": "https://www.semanticscholar.org/paper/8454fcc2a0f783ec9668432afda2a69b60b8eb13", "title": "Management accounting and the concepts of exploratory data analysis and unsupervised machine learning: a literature study and future directions", "abstract": "\nPurpose\nThis paper contributes to the literature by discussing the impact of machine learning (ML) on management accounting (MA) and the management accountant based on three sources: academic articles, papers and reports from accounting bodies and consulting companies. The purpose of this paper is to identify, discuss and provide suggestions for how ML could be included in research and education in the future for the management accountant.\n\n\nDesign/methodology/approach\nThis paper identifies three types of studies on the influence of ML on MA issued between 2015 and 2021 in mainstream accounting journals, by professional accounting bodies and by large consulting companies.\n\n\nFindings\nFirst, only very few academic articles actually show examples of using ML or using different algorithms related to MA issues. This is in contrast to other research fields such as finance and logistics. Second, the literature review also indicates that if the management accountants want to keep up with the demand of their qualifications, they must take action now and begin to discuss how big data and other concepts from artificial intelligence and ML can benefit MA and the management accountant in specific ways.\n\n\nOriginality/value\nEven though the paper may be classified as inspirational in nature, the paper documents and discusses the revised environment that surrounds the accountant today. The paper concludes by highlighting specifically the necessity of including exploratory data analysis and unsupervised ML in the field of MA to close the existing gaps in both education and research and thus making the MA profession future-proof.\n", "venue": "Journal of Accounting & Organizational Change", "year": 2022, "referenceCount": 112, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-03-11", "journal": {"name": "Journal of Accounting & Organizational Change"}, "authors": [{"authorId": "2053600377", "name": "Steen Nielsen"}]}, {"paperId": "d7ce3e79413de753e95b519750416b7e4ff65e50", "externalIds": {"DOI": "10.1177/17456916211029942", "CorpusId": 247384096, "PubMed": "35271777"}, "url": "https://www.semanticscholar.org/paper/d7ce3e79413de753e95b519750416b7e4ff65e50", "title": "Where\u2019s My Consciousness-Ometer? How to Test for the Presence and Complexity of Consciousness", "abstract": "Tools and tests for measuring the presence and complexity of consciousness are becoming available, but there is no established theoretical approach for what these tools are measuring. This article examines several categories of tests for making reasonable inferences about the presence and complexity of consciousness (defined as the capacity for phenomenal/subjective experience) and also suggests ways in which different theories of consciousness may be empirically distinguished. We label the various ways to measure consciousness the measurable correlates of consciousness (MCC) and include three subcategories in our taxonomy: (a) neural correlates of consciousness, (b) behavioral correlates of consciousness, and (c) creative correlates of consciousness. Finally, we reflect on how broader philosophical views about the nature of consciousness, such as materialism and panpsychism, may also be informed by the scientific process.", "venue": "Perspectives on psychological science : a journal of the Association for Psychological Science", "year": 2022, "referenceCount": 110, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-10", "journal": {"volume": "17", "pages": "1150 - 1165", "name": "Perspectives on Psychological Science"}, "authors": [{"authorId": "29376453", "name": "Tam Hunt"}, {"authorId": "40313342", "name": "M. Ericson"}, {"authorId": "2809346", "name": "J. Schooler"}]}, {"paperId": "f1d3f2903e7989df6aab3e9c4efb710f098569c5", "externalIds": {"PubMedCentral": "8960449", "DOI": "10.3389/fnsys.2022.764708", "CorpusId": 246900226, "PubMed": "35359623"}, "url": "https://www.semanticscholar.org/paper/f1d3f2903e7989df6aab3e9c4efb710f098569c5", "title": "Integrating Philosophy of Understanding With the Cognitive Sciences", "abstract": "We provide two programmatic frameworks for integrating philosophical research on understanding with complementary work in computer science, psychology, and neuroscience. First, philosophical theories of understanding have consequences about how agents should reason if they are to understand that can then be evaluated empirically by their concordance with findings in scientific studies of reasoning. Second, these studies use a multitude of explanations, and a philosophical theory of understanding is well suited to integrating these explanations in illuminating ways.", "venue": "Frontiers in Systems Neuroscience", "year": 2022, "referenceCount": 214, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-10", "journal": {"volume": "16", "name": "Frontiers in Systems Neuroscience"}, "authors": [{"authorId": "145976229", "name": "Kareem Khalifa"}, {"authorId": "2154658506", "name": "Farhan Islam"}, {"authorId": "49166079", "name": "J. P. Gamboa"}, {"authorId": "1941739", "name": "D. Wilkenfeld"}, {"authorId": "30524584", "name": "Daniel Kosti\u0107"}]}, {"paperId": "8c942836c7963b3d6e19da29618c4a1fdc83fd53", "externalIds": {"ArXiv": "2203.06249", "CorpusId": 247446612}, "url": "https://www.semanticscholar.org/paper/8c942836c7963b3d6e19da29618c4a1fdc83fd53", "title": "Information temperature as a measure of DNA's and texts complexity", "abstract": "C. Shannon introduced the notion of entropy for random sequences. What about their temperature? After discussing some methods for introducing information temperature (IT) for binary random stationary ergodic sequence, we suggest using IT as a characteristic of complexity and intelligence of an agent capable of writing or generating meaningful texts. In particular, we discuss the question of whether the temperature can characterize the academic level of the text, or serve as an indicator of the quality of brain activity of the text author.", "venue": "", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-07", "journal": null, "authors": [{"authorId": "1739383", "name": "O. Usatenko"}]}, {"paperId": "6ab3f4a06efeaa6d402b3a39e39609efaf9759eb", "externalIds": {"DOI": "10.1002/wcms.1604", "CorpusId": 247349693}, "url": "https://www.semanticscholar.org/paper/6ab3f4a06efeaa6d402b3a39e39609efaf9759eb", "title": "Machine intelligence for chemical reaction space", "abstract": "Discovering new reactions, optimizing their performance, and extending the synthetically accessible chemical space are critical drivers for major technological advances and more sustainable processes. The current wave of machine intelligence is revolutionizing all data\u2010rich disciplines. Machine intelligence has emerged as a potential game\u2010changer for chemical reaction space exploration and the synthesis of novel molecules and materials. Herein, we will address the recent development of data\u2010driven technologies for chemical reaction tasks, including forward reaction prediction, retrosynthesis, reaction optimization, catalysts design, inference of experimental procedures, and reaction classification. Accurate predictions of chemical reactivity are changing the R&D processes and, at the same time, promoting an accelerated discovery scheme both in academia and across chemical and pharmaceutical industries. This work will help to clarify the key contributions in the fields and the open challenges that remain to be addressed.", "venue": "WIREs Computational Molecular Science", "year": 2022, "referenceCount": 200, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-07", "journal": {"volume": "12", "name": "Wiley Interdisciplinary Reviews: Computational Molecular Science"}, "authors": [{"authorId": "1379965853", "name": "P. Schwaller"}, {"authorId": "3363862", "name": "Alain C. Vaucher"}, {"authorId": "32427390", "name": "Rub\u00e9n Laplaza"}, {"authorId": "9855096", "name": "Charlotte Bunne"}, {"authorId": "2054846313", "name": "Andreas Krause"}, {"authorId": "145154812", "name": "C. Corminboeuf"}, {"authorId": "1864183", "name": "T. Laino"}]}, {"paperId": "16d852015f99773a3e2e10f2a2d78c1e34cf211a", "externalIds": {"DOI": "10.1215/9781478022466-006", "CorpusId": 245550461}, "url": "https://www.semanticscholar.org/paper/16d852015f99773a3e2e10f2a2d78c1e34cf211a", "title": "Conclusion Racist Hate, Racial Profiling, Pok\u00e9mon at Auschwitz", "abstract": null, "venue": "Racist Love", "year": 2022, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-04", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "41be538937951b31e0ada8bdc1e05f71046e108d", "externalIds": {"DOI": "10.1215/9781478022466-007", "CorpusId": 245560929}, "url": "https://www.semanticscholar.org/paper/41be538937951b31e0ada8bdc1e05f71046e108d", "title": "Notes", "abstract": null, "venue": "Racist Love", "year": 2022, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-03-04", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "ef2c984acbae0e8c82c24ae51f2a3abe6e174501", "externalIds": {"DOI": "10.1080/02560046.2022.2112725", "CorpusId": 251755563}, "url": "https://www.semanticscholar.org/paper/ef2c984acbae0e8c82c24ae51f2a3abe6e174501", "title": "A New Harmonisation of Art and Technology: Philosophic Interpretations of Artificial Intelligence Art", "abstract": "ABSTRACT Artificial intelligence (AI) art is the product of AI technology applied to art. In terms of technical application, AI art has two methods: symbolism and connectivism. In terms of the human-machine system, there are three levels: human using machine, human guiding machine and human-machine separation. AI art is a special form, existing between natural beauty and human art: AI art, first of all, is not a natural aesthetic object, given that it is the product of artefacts. Its appreciation is mixed with interests, and its artistic generation is a kind of \u201cpurposeful non-purposefulness.\u201d Secondly, AI art is not equal to traditional human art, because AI has no intentionality or consciousness. Thirdly, AI participates in the construction of artistic logic and breaks the boundary of traditional art. AI can be regarded as an \u201cagent\u201d in art generation, and together with people constitute the \u201cactor network\u201d of art. The processes of generation, identification and appreciation of AI art include the judgment of true and false. AI art reflects the forced integration of intelligent technology into art, an attempt to rid of contingency, dialectics, and negativity of art. But what we need is the real harmonisation of art and technology. People should use aesthetic reason to guide AI technology.", "venue": "Critical Arts", "year": 2022, "referenceCount": 58, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-04", "journal": {"volume": "36", "pages": "110 - 125", "name": "Critical Arts"}, "authors": [{"authorId": "2064878415", "name": "Feng Tao"}]}, {"paperId": "56469dc69659e8e8eb98da3ab18eb3caa33d63fd", "externalIds": {"PubMedCentral": "9284358", "DOI": "10.2196/37688", "CorpusId": 249250203, "PubMed": "35771594"}, "url": "https://www.semanticscholar.org/paper/56469dc69659e8e8eb98da3ab18eb3caa33d63fd", "title": "Caregiver Expectations of Interfacing With Voice Assistants to Support Complex Home Care: Mixed Methods Study", "abstract": "Background Providing care in home environments is complex, and often the pressure is on caregivers to document information and ensure care continuity. Digital information management and communication technologies may support care coordination among caregivers. However, they have yet to be adopted in this context, partly because of issues with supporting long-term disease progression and caregiver anxiety. Voice assistant (VA) technology is a promising method for interfacing with digital health information that may aid in multiple aspects of being a caregiver, thereby influencing adoption. Understanding the expectations for VAs to support caregivers is fundamental to inform the practical development of this technology. Objective This study explored caregivers\u2019 perspectives on using VA technology to support caregiving and inform the design of future digital technologies in complex home care. Methods This study was part of a larger study of caregivers across North America on the design of digital health technologies to support health communication and information management in complex home care. Caregivers included parents, guardians, and hired caregivers such as personal support workers and home care nurses. Video interviews were conducted with caregivers to capture their mental models on the potential application of VAs in complex home care and were theoretically analyzed using the technology acceptance model. Interviews were followed up with Likert-scale questions exploring perspectives on other VA applications beyond participants\u2019 initial perceptions. Results Data were collected from 22 caregivers, and 3 themes were identified: caregivers\u2019 perceived usefulness of VAs in supporting documentation, care coordination, and person-centered care; caregivers\u2019 perceived ease of use in navigating information efficiently (they also had usability concerns with this interaction method); and caregivers\u2019 concerns, excitement, expected costs, and previous experience with VAs that influenced their attitudes toward use. From the Likert-scale questions, most participants (21/22, 95%) agreed that VAs should support prompted information recording and retrieval, and all participants (22/22, 100%) agreed that they should provide reminders. They also agreed that VAs should support them in an emergency (18/22, 82%)\u2014but only for calling emergency services\u2014and guide caregivers through tasks (21/22, 95%). However, participants were less agreeable on VAs expressing a personality (14/22, 64%)\u2014concerned they would manipulate caregivers\u2019 perceptions\u2014and listening ambiently to remind caregivers about their documentation (16/22, 73%). They were much less agreeable about VAs providing unprompted assistance on caregiving tasks (9/22, 41%). Conclusions The interviews and Likert-scale results point toward the potential for VAs to support family caregivers and hired caregivers by easing their information management and health communication at home. However, beyond information interaction, the potential impact of VA personality traits on caregivers\u2019 perceptions of the care situation and the passive collection of audio data to improve user experience through context-specific interactions are critical design considerations that should be further examined.", "venue": "JMIR human factors", "year": 2022, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-03", "journal": {"volume": "9", "name": "JMIR Human Factors"}, "authors": [{"authorId": "1947423581", "name": "R. Tennant"}, {"authorId": "2137792425", "name": "S. Allana"}, {"authorId": "39162813", "name": "Karen Mercer"}, {"authorId": "145082763", "name": "C. Burns"}]}, {"paperId": "940c97e9a2f50dacccc244440cc6aa474c85c0e2", "externalIds": {"DOI": "10.12775/setf.2022.008", "CorpusId": 247309553}, "url": "https://www.semanticscholar.org/paper/940c97e9a2f50dacccc244440cc6aa474c85c0e2", "title": "From Absolute Mind to Zombie: Is Artificial Intelligence Possible?", "abstract": "The dream of achieving artificial intelligence (AI) and, in particular, artificial consciousness (\u2018strong AI\u2019), is reflected in mythologies and popular culture as utopia and dystopia. This article discusses its conceptual possibility. It first relates the desire to realise strong AI to a self-perception of humanity as opposed to nature, metaphorically represented as gods or God. The realisation of strong AI is perceived as an ultimate victory on nature or God because it represents the crown of creation or evolution: conscious intelligence. The paper proceeds to summarise two debates relevant to AI: one educational and one technological. The technological debate, almost invariably presupposing a materialist framework, is related to the mind\u2013body problem of philosophy; the educational one to understanding the concept of intelligence. By proposing a definition of intelligence linked to an idealist conception of reality, postulating mind as participation in Absolute Mind, I attempt a convergence of these debates, rejecting the possibility of strong AI.", "venue": "Scientia et Fides", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-03", "journal": {"name": "Scientia et Fides"}, "authors": [{"authorId": "134363160", "name": "M. Bilagher"}]}, {"paperId": "94044139e9c77b5d1e9cfa2dd2326db8d2966c7e", "externalIds": {"PubMedCentral": "8892409", "DOI": "10.1007/s44163-022-00019-3", "CorpusId": 247235946}, "url": "https://www.semanticscholar.org/paper/94044139e9c77b5d1e9cfa2dd2326db8d2966c7e", "title": "Reflections on the human role in AI policy formulations: how do national AI strategies view people?", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 148, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-03", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "2102881731", "name": "Henrikki Salo-P\u00f6ntinen"}, {"authorId": "2748954", "name": "P. Saariluoma"}]}, {"paperId": "9ce68b44f77058022e6aac3fbf6eeba09283c594", "externalIds": {"DOI": "10.1109/CACML55074.2022.00054", "CorpusId": 251705017}, "url": "https://www.semanticscholar.org/paper/9ce68b44f77058022e6aac3fbf6eeba09283c594", "title": "Cryptocurrency Price forecasting: A Comparative Study of Machine Learning Model in Short-Term Trading", "abstract": "In recent years, the expansion of the cryptocurrency market has received significant attention among investors, studies of cryptocurrency price predictions have been conducted in various fields. With the enhancement of machine learning algorithms and increased computational capabilities, machine learning has proved one of the most efficient cryptocurrency prediction methods. However, most studies focused on single digital currency prediction or small-scale algorithm comparison for multiple currencies. This study aims to present a comparative performance of large-scale selected Machine Learning algorithms for cryptocurrency forecasting. Specifically, this paper concentrates on forecasting time series data for a short-term trading period in ten cryptocurrencies (BTC, ETH, ADA, BNB, XRP, DOGE, LUNA, LINK, LTC, and BCH) with ten selected machine learning algorithms (Decision Tree, Linear Regression, Ridge Regression, Lasso Regression, Bayesian Regression, Random Forest, K-Nearest Neighbors, Neural Networks, Gradient Boosting, and Support Vector Machine). Our experiment results show that the Gradient Boosting with the mean square error criterion is superior in predicting most major cryptocurrencies by performing statistical analysis and data visualizations. Additionally, the Random Forest and Decision Tree model built by the Classification and Regression Tree algorithm also shows outstanding performance in certain currencies such as ETH, XRP, LUNA, and LTC. Thus, all three algorithms can help anticipate the short-term evolutions of the cryptocurrency market.", "venue": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-03-01", "journal": {"pages": "280-288", "name": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)"}, "authors": [{"authorId": "2064467009", "name": "Haoran Lyu"}]}, {"paperId": "34ff69039c4e3ebff47f196d4cd4e3a5cd483645", "externalIds": {"DOI": "10.1016/j.hfc.2021.11.005", "CorpusId": 247275173, "PubMed": "35341542"}, "url": "https://www.semanticscholar.org/paper/34ff69039c4e3ebff47f196d4cd4e3a5cd483645", "title": "Artificial Intelligence and Mechanical Circulatory Support.", "abstract": null, "venue": "Heart failure clinics", "year": 2022, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-03-01", "journal": {"volume": "18 2", "pages": "\n 301-309\n ", "name": "Heart failure clinics"}, "authors": [{"authorId": "2157650597", "name": "Song Li"}, {"authorId": "83761911", "name": "G. Hickey"}, {"authorId": "2157653417", "name": "Matthew M. Lander"}, {"authorId": "4347981", "name": "M. Kanwar"}]}, {"paperId": "303e42ca7e116cfc183249c0f49dd978b083f813", "externalIds": {"DOI": "10.1016/j.autcon.2021.104110", "CorpusId": 246521847}, "url": "https://www.semanticscholar.org/paper/303e42ca7e116cfc183249c0f49dd978b083f813", "title": "Semantic segmentation of cracks: Data challenges and architecture", "abstract": null, "venue": "Automation in Construction", "year": 2022, "referenceCount": 51, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-01", "journal": {"name": "Automation in Construction"}, "authors": [{"authorId": "2152458893", "name": "Fabio Panella"}, {"authorId": "1850020", "name": "Aldo Lipani"}, {"authorId": "36751418", "name": "Jan Boehm"}]}, {"paperId": "4a0263ecb3df0ec7a0232e422c4c10aa31bbf526", "externalIds": {"DOI": "10.1016/j.techfore.2021.121431", "CorpusId": 245159982}, "url": "https://www.semanticscholar.org/paper/4a0263ecb3df0ec7a0232e422c4c10aa31bbf526", "title": "A systematic idea generation approach for developing a new technology: Application of a socio-technical transition system", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2022, "referenceCount": 53, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-01", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "9142600", "name": "Keeeun Lee"}, {"authorId": "2109591986", "name": "Sunhye Kim"}, {"authorId": "38717655", "name": "B. Yoon"}]}, {"paperId": "ca6cbcb0caa5b26da011a56170ebfd2f17613e3e", "externalIds": {"DOI": "10.33425/2641-4317.1121", "CorpusId": 247944559}, "url": "https://www.semanticscholar.org/paper/ca6cbcb0caa5b26da011a56170ebfd2f17613e3e", "title": "The Dimension of Neural Memory and Consciousness", "abstract": "The mental dimension is an experiential state achieved by neural circuits, that cannot be measured by physical means but that nonetheless affects the behavior of conscious neural creatures. The \u201cmeaning\u201d or \u201cworth\u201d of anything in the life of animals is based on emotive factors that are recalled from past experience. Emotive memory is the key to the \u201cconsciousness\u201d that determines decisions and valuations. Even supposedly rational economic decisions are ultimately based on affective considerations. From the Darwinian perspective, neural signaling evolved from bacterial signaling processes which employed small molecules (i.e. biogenic amines). The tripartite mechanism provides a chemodynamic rationale for considering the physiologic basis of such signaling, a key facet of \u201cconsciousness\u201d. We note that the original bacterial signaling molecules (i.e. biogenic amines), later termed \u201cneuro-transmitters\u201d (NTs)) were retained by and still used by all neurons. To clarify the discussion, we de-limit the meaning of terms commonly used by both computer scientists and neurobiologists (i.e. \u201cmemory\u201d, \u201cinformation\u201d, \u201cfeelings\u201d, \u201cemotions\u201d , \u201cenergy\u201d, \u201cartificial intelligence\u201d, \u201clogic\u201d and \u201cdimension\u201d). Mind and body are a complex unity. The psyche emerges from the physiology and chemistry of interacting neurons, projecting an ensemble of physiologic sensibilities into a psychic (mental) dimension. Without memory, there are no emotions and vice versa\u2026without emotive qualities, memory fades. Emotions and memory are linked facets of the psychic dimension of consciousness, encoded and decoded by the biochemically active neural net.", "venue": "International Journal of Psychiatry Research", "year": 2022, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-28", "journal": {"name": "International Journal of Psychiatry Research"}, "authors": [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", "name": "C. Gilon"}]}, {"paperId": "ad14f287d637458e9f4994870468177cd1dfd140", "externalIds": {"DOI": "10.33425/2641-4317.1125", "CorpusId": 253339168}, "url": "https://www.semanticscholar.org/paper/ad14f287d637458e9f4994870468177cd1dfd140", "title": "A Critique of the Atkinson-Shiffrin (As) Mathematical Model of Human Memory", "abstract": "Emotions are the anchoring experiences on which psychology is aimed. The challenge of neuroscientists is to clarify how neural nets generate mental states, such as emotive memory. To that end, Atkinson- hiffin (AS) (1950) proposed mathematical algorithms and formulae to describe memory. Our critique of their approach is based on 3 issues: Evolution, Physiology and Emotions. What is missing in the AS mathematical model is a physiologically relevant process for encoding emotive memory. \u201cMeta-physics\u201d is the branch of philosophy that examines the fundamental nature of reality i.e. the relationship between energy and matter. \u201dMeta-chemistry\u201d (\u201cPsycho-chemistry\u201d) could be considered to be the branch of chemistry that deals with mental states emerging from neuro- chemical processes. However, what does \u201cMeta-mathematics\u201d imply? Does mathematics delve into matters of Mind as well as Logic? Neuro-math? Neither the metrics of physics nor the mathematics of Atkinson-Shiffin can credibly characterize the process of recalling Emotive states. Only chemistry can pierce the veil of neurophysiology. For example, emotive states can be instigated by chemical entities, such as \u201cneurotransmitters\u201d (NTs) and recreational drugs. In consideration of this, we propose a biochemical tripartite mechanism involving neurons interacting with their surrounding extracellular matrix (nECM) which serve as \u201cmemory material\u201d. Incoming perceptions are encoded with trace metals + neurotransmitters (NTs) ejected by neurons, to form metal-centered cognitive units of information (cuinfo) from which memory is consolidated. The NTs can be considered the effectors and encoders of emotive mental states achieved by the neural net. Regarding the Atkinson-Shiffin approach, we opine: Emotions exceed the grasp of mathematics.", "venue": "International Journal of Psychiatry Research", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-28", "journal": {"name": "International Journal of Psychiatry Research"}, "authors": [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", "name": "C. Gilon"}]}, {"paperId": "06ef1f9e1a760df942548ab38ea7e49e6145c6bd", "externalIds": {"ArXiv": "2202.12678", "DBLP": "journals/corr/abs-2202-12678", "CorpusId": 247154684}, "url": "https://www.semanticscholar.org/paper/06ef1f9e1a760df942548ab38ea7e49e6145c6bd", "title": "Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain", "abstract": "\u2013 In this article, we first give an introduction to artificial intelligence and its applications in biology and medicine in Section 1. Deep learning methods are then described in Section 2. We narrow down the focus of the study on textual data in Section 3, where natural language processing and its applications in the biomedical domain are described. In Section 4, we give an introduction to explainable artificial intelligence and discuss the importance of explainability of artificial intelligence systems, especially in the biomedical domain. 1. Artificial Intelligence Artificial Intelligence (AI) is a scientific field that studies computer systems performing tasks that need human intelligence. AI systems aim at doing intelligent tasks such as learning from experience, knowledge representation, problem solving, reasoning, perception, and natural language processing, which are associated with cognitive functions of human mind (Russell and Norvig, 2009). Nowadays, AI systems have many applications in a wide variety of domains such as education, medicine, transportation, military, entertainment, finance, autonomous driving, smartphones, agriculture, social media, economy, healthcare, law, manufacturing, cybersecurity, and many other domains. Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain 2 Since early work on artificial neurons in the 1940s (McCulloch and Pitts, 1943), different generations of AI methods have been developed. Alan Turing\u2019s theory of computation, the idea of a thinking machine, and the Turing test formed solid theoretical foundations and a milestone in early stages of development of machine intelligence in the 1950s (Turing, 1950). Then in the 1960s and 1970s, symbolic AI systems such as the General Problem Solver, the Geometry Theorem Prover, and the Logic Theorist employed high-level human-readable knowledge representation, logic programming, and reasoning to search for solutions to problems (Russell and Norvig, 2009). Knowledge-based and expert systems then became popular in the 1980s. This generation of AI systems leveraged more powerful, domain-specific knowledge (typically special-purpose rule sets in combination with customized inference methods) to solve problems in narrower fields of expertise. Meanwhile, connectionism was revived and Artificial Neural Networks (ANNs) moved the field forward towards performing more difficult and intelligent tasks, e.g. optical character recognition and speech recognition (Hopfield, 1988; Russell and Norvig, 2009). With the rapid adoption of Internet in the 1990s, AI tools such as recommender systems, search engines, and machine translation systems found their way into everyday life. ANNs are computational methods inspired by the biological nervous systems. A neural network consists of multiple layers of interconnected processing units called \u201cneurons\u201d that are able to perform parallel computations. They are mostly used for data processing and knowledge representation purposes (Ramesh et al., 2004). ANNs have become attractive data analytics tools since they have the capability of handling complex, non-linear data relationships. A typical neuron in an ANN receives inputs from the previous layer in the network, aggregates the inputs, applies an activation function, and produces a final output based on the activation function\u2019s output and a threshold. Since the advent of ANNs in the 1940s (McCulloch and Pitts, 1943), artificial neurons have evolved from simple binary threshold functions to complex non-linear processing units in CNNs, RNNs, and transformer models. In the first decades of the 21st century, availability of large volumes of data (known as \u201cbig data\u201d), extremely powerful processors specially designed to run floating-point arithmetic computation, novel multi-layer ANN architectures, and advanced machine learning techniques have led to the development of a new class of AI methods, called \u201cdeep learning\u201d (LeCun et al., 2015). Machine learning refers to a class of AI methods designed to learn data relationships hidden in a dataset of samples, and then generalize the learned knowledge to new unseen data samples. Accordingly, deep learning refers Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain 3 to a class of machine learning methods comprising multiple layers of processing units, designed to build complex generative or predictive models from large datasets. Modern deep neural networks, e.g. Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), have been widely used to model complex data relationships for a wide variety of scientific and industrial applications (Khamparia and Singh, 2019). 1.1. Artificial Intelligence in biomedicine and healthcare AI systems have many applications in biomedical research and healthcare domains (Hamet and Tremblay, 2017; Min et al., 2017; Ramesh et al., 2004; Rav\u00ec et al., 2017). In many use-cases, AI methods have performed as accurate as human experts, even performed better than humans in some cases (Mintz and Brodie, 2019). ANNs are among the most widely-used AI methods utilized in the biomedical domain (Ramesh et al., 2004). Large amounts of data in the biomedical domain make demands for developing intelligent computer methods that facilitate automatic acquisition and analysis of knowledge that is necessary to solve problems in biology and medicine. Utilizing AI systems for medical applications dates back to the 1970s, when computer analysis helped clinicians diagnose acute abdominal pain (Gunn, 1976). Since many biological, clinical, and pathological variables involve in complex interactions in biomedical datasets, ANN and deep learning models have been extensively applied to data science problems in biology and medicine. One of the first applications of ANN for clinical decision making aimed at diagnosing acute myocardial infarction (Baxt, 1990). In clinical settings, AI systems have found many applications in diagnostic tasks such as image analysis in radiology and histopathology, waveform analysis, interpreting data in intensive care situation, and analysing Computed Tomography (CT), Magnetic Resonance Imaging (MRI), X-rays, and radioisotope scans (Amisha et al., 2019; Mintz and Brodie, 2019; Ramesh et al., 2004). AI methods have also had applications in clinical prognostic tasks such as identifying high risk patients, predicting survival chance in patients, and predicting outcome in patients with specific cancers (Ramesh et al., 2004). Another type of AI systems, i.e. AI-robots, have been used as assistant-surgeons or solo performers in surgery, or as care-bots for assisting in the delivery of care (Amisha et al., 2019; Hamet and Tremblay, 2017). They can be also used to monitor the guided delivery of drugs to target tumours, tissues, or organs (Hamet and Tremblay, 2017). In biomedical research, machine learning methods have had applications in discovering novel Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain 4 therapeutic targets using protein-protein interaction algorithms (Theofilatos et al., 2015), identifying DNA variants as predictors of a specific disease (Rapakoulia et al., 2014), Image and text are two data modalities in the biomedical domain that are commonly analysed using machine learning methods. AI-driven image processing have many applications in radiology, oncology, cardiology, gastroenterology, ophthalmology, etc. (Mintz and Brodie, 2019). Applications of AI systems in biomedical and clinical text processing is extensively discussed in Section 3.3.", "venue": "ArXiv", "year": 2022, "referenceCount": 130, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-25", "journal": {"volume": "abs/2202.12678", "name": "ArXiv"}, "authors": [{"authorId": "144334436", "name": "M. Moradi"}, {"authorId": "3004898", "name": "M. Samwald"}]}, {"paperId": "6847e2ba6796b8a786b3b6d8d8a2d922a6c7c31d", "externalIds": {"DBLP": "conf/iclr/MouselinosMM22", "ArXiv": "2202.12162", "CorpusId": 247083956}, "url": "https://www.semanticscholar.org/paper/6847e2ba6796b8a786b3b6d8d8a2d922a6c7c31d", "title": "Measuring CLEVRness: Blackbox testing of Visual Reasoning Models", "abstract": "How can we measure the reasoning capabilities of intelligence systems? Visual question answering provides a convenient framework for testing the model\u2019s abilities by interrogating the model through questions about the scene. However, despite scores of various visual QA datasets and architectures, which sometimes yield even a super-human performance, the question of whether those architectures can actually reason remains open to debate. To answer this, we extend the visual question answering framework and propose the following behavioral test in the form of a two-player game. We consider black-box neural models of CLEVR. These models are trained on a diagnostic dataset benchmarking reasoning. Next, we train an adversarial player that re-configures the scene to fool the CLEVR model. We show that CLEVR models, which otherwise could perform at a \u201chuman level\u201d, can easily be fooled by our agent. Our results put in doubt whether data-driven approaches can do reasoning without exploiting the numerous biases that are often present in those datasets. Finally, we also propose a controlled experiment measuring the efficiency of such models to learn and perform reasoning.", "venue": "ICLR", "year": 2022, "referenceCount": 64, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-24", "journal": {"volume": "abs/2202.12162", "name": "ArXiv"}, "authors": [{"authorId": "148099243", "name": "Spyridon Mouselinos"}, {"authorId": "47407464", "name": "H. Michalewski"}, {"authorId": "145478807", "name": "Mateusz Malinowski"}]}, {"paperId": "7ecfd7ec0efe3c39bab4b29e616691ff736babc0", "externalIds": {"DBLP": "journals/corr/abs-2202-11766", "ArXiv": "2202.11766", "CorpusId": 247084129}, "url": "https://www.semanticscholar.org/paper/7ecfd7ec0efe3c39bab4b29e616691ff736babc0", "title": "A gentle introduction to Quantum Natural Language Processing", "abstract": "The main goal of this master\u2019s thesis is to introduce Quantum Natural Language Processing (QNLP) in a way understandable by both the NLP engineer and the quantum computing practitioner. QNLP is a recent application of quantum computing that aims at representing sentences\u2019 meaning as vectors encoded into quantum computers. To achieve this, the distributional meaning of words is extended by the compositional meaning of sentences (DisCoCat model) : the vectors representing words\u2019 meanings are composed through the syntactic structure of the sentence. This is done using an algorithm based on tensor products. We see that this algorithm is inefficient on classical computers but scales well using quantum circuits. After exposing the practical details of its implementation, we go through three use-cases. First we show that the DisCoCat framework has been used to do sentence similarity. While its straightforward implementation using quantum nearest neighbor is theoretically possible, its full implementation requires quantum RAM, a technology not yet available. We therefore review a hybrid classicalquantum workflow that was proposed to overcome that technical limitation. It encodes the dataset into a single superposition state and the distances within the amplitudes of the superposition. Second, we show how the measured output of quantum circuits have been successfully used to do binary sentence classification. We see that sentences are mapped into quantum circuits with the use of parameters for rotation gates (Rx, Rz) which can be optimized classically for a given task and dataset (question-answering in our case). While this is the first QNLP algorithm implemented on a quantum computer, our replication of the experiments leads us to raise some concerns as to the model\u2019s universality and scalability. We also see solutions have been proposed to offer better scalability at the price of increasing the size of circuits. Finally, we see an extension that was proposed to encode hyperonomy (hierarchical word structure denoting supertype) using mixed states and ordering of positive operators. We see that when used within the DisCoCat framework, this model performs well at predicting sentence entailment While this thesis was designed to be a review of the literature about QNLP, we also introduce original experiments on question-answering. After replicating previous experiments on hand-labelled sentences, we extend the words\u2019 mappings to add coverage for logical connectors. These play a central role in compositionality as they allow to combine sentences in a way that the truth value of the whole is predictable from ones of its parts. The model we introduce to account for those, while being simplistic, is a promising implementation.", "venue": "ArXiv", "year": 2022, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-23", "journal": {"volume": "abs/2202.11766", "name": "ArXiv"}, "authors": [{"authorId": "2156125676", "name": "Shervin Le Du"}, {"authorId": "2156116949", "name": "Senaida Hern\u00e1ndez Santana"}, {"authorId": "33233654", "name": "G. Scarpa"}]}, {"paperId": "1f0cb95449984a4346e2a3deca0370cc74cba470", "externalIds": {"ArXiv": "2202.13073", "DBLP": "journals/corr/abs-2202-13073", "DOI": "10.1109/TPAMI.2022.3153312", "CorpusId": 247083637, "PubMed": "35196228"}, "url": "https://www.semanticscholar.org/paper/1f0cb95449984a4346e2a3deca0370cc74cba470", "title": "Global Instance Tracking: Locating Target More Like Humans", "abstract": "Target tracking, the essential ability of the human visual system, has been simulated by computer vision tasks. However, existing trackers perform well in austere experimental environments but fail in challenges like occlusion and fast motion. The massive gap indicates that researches only measure tracking performance rather than intelligence. How to scientifically judge the intelligence level of trackers Distinct from decision-making problems, lacking three requirements (a challenging task, a fair environment, and a scientific evaluation procedure) makes it strenuous to answer the question. In this article, we first propose the global instance tracking (GIT) task, which is supposed to search an arbitrary user-specified instance in a video without any assumptions about camera or motion consistency, to model the human visual tracking ability. Whereafter, we construct a high-quality and large-scale benchmark VideoCube to create a challenging environment. Finally, we design a scientific evaluation procedure using human capabilities as the baseline to judge tracking intelligence. Additionally, we provide an online platform with toolkit and an updated leaderboard. Although the experimental results indicate a definite gap between trackers and humans, we expect to take a step forward to generate authentic human-like trackers. The database, toolkit, evaluation server, and baseline results are available at http://videocube.aitestunion.com.", "venue": "IEEE Transactions on Pattern Analysis and Machine Intelligence", "year": 2022, "referenceCount": 71, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-23", "journal": {"volume": "PP", "pages": "1-1", "name": "IEEE Transactions on Pattern Analysis and Machine Intelligence"}, "authors": [{"authorId": "1491622261", "name": "Shiyu Hu"}, {"authorId": "2145733730", "name": "Xin Zhao"}, {"authorId": "2109047017", "name": "Lianghua Huang"}, {"authorId": "2887871", "name": "Kaiqi Huang"}]}, {"paperId": "01fdf11285bfe021eccc0a9926fa4ff3bea2fe34", "externalIds": {"DOI": "10.1016/j.conb.2022.01.002", "CorpusId": 247028414, "PubMed": "35217311"}, "url": "https://www.semanticscholar.org/paper/01fdf11285bfe021eccc0a9926fa4ff3bea2fe34", "title": "A dynamical systems view of neuroethology: Uncovering stateful computation in natural behaviors", "abstract": null, "venue": "Current Opinion in Neurobiology", "year": 2022, "referenceCount": 112, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-02-22", "journal": {"volume": "73", "name": "Current Opinion in Neurobiology"}, "authors": [{"authorId": "36531793", "name": "Drew N. Robson"}, {"authorId": "2109008396", "name": "Jennifer M. Li"}]}, {"paperId": "96dc56ee1f6c2b08a4395221a0ad0e7fa11c12b7", "externalIds": {"DOI": "10.3389/fhumd.2022.703879", "CorpusId": 247012949}, "url": "https://www.semanticscholar.org/paper/96dc56ee1f6c2b08a4395221a0ad0e7fa11c12b7", "title": "Almost Alive: Robots and Androids", "abstract": "Life-likeness is a property that can be used both to deceive people that a robot is more intelligent than it is or to facilitate the natural communication with humans. Over the years, different criteria have guided the design of intelligent systems, ranging from attempts to produce human-like language to trying to make a robot look like an actual human. We outline some relevant historical developments that all rely on different forms of mimicry of human life or intelligence. Many such approaches have been to some extent successful. However, we want to argue that there are ways to exploit aspects of life-likeness without deception. A life-like robot has advantages in communicating with humans, not because we believe it to be alive, but rather because we react instinctively to certain aspects of life-like behavior as this can make a robot easier to understand and allows us to better predict its actions. Although there may be reasons for trying to design robots that look exactly like humans for specific research purposes, we argue that it is subtle behavioral cues that are important for understandable robots rather than life-likeness in itself. To this end, we are developing a humanoid robot that will be able to show human-like movements while still looking decidedly robotic, thus exploiting the our ability to understand the behaviors of other people based on their movements.", "venue": "Frontiers in Human Dynamics", "year": 2022, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-22", "journal": {"volume": "4"}, "authors": [{"authorId": "1732218", "name": "C. Balkenius"}, {"authorId": "2038545202", "name": "B. Johansson"}]}, {"paperId": "2397a3906128f40422663ebb4e8df948d4ee6258", "externalIds": {"DBLP": "journals/fi/ZubaniSSPGC22", "DOI": "10.3390/fi14020062", "CorpusId": 247044369}, "url": "https://www.semanticscholar.org/paper/2397a3906128f40422663ebb4e8df948d4ee6258", "title": "A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform", "abstract": "During the COVID-19 pandemic, the corporate online training sector has increased exponentially and online course providers had to implement innovative solutions to be more efficient and provide a satisfactory service. This paper considers a real case study in implementing a chatbot, which answers frequently asked questions from learners on an Italian e-learning platform that provides workplace safety courses to several business customers. Having to respond quickly to the increase in the courses activated, the company decided to develop a chatbot using a cloud-based service currently available on the market. These services are based on Natural Language Understanding (NLU) engines, which deal with identifying information such as entities and intentions from the sentences provided as input. To integrate a chatbot in an e-learning platform, we studied the performance of the intent recognition task of the major NLU platforms available on the market with an in-depth comparison, using an Italian dataset provided by the owner of the e-learning platform. We focused on intent recognition, carried out several experiments and evaluated performance in terms of F-score, error rate, response time, and robustness of all the services selected. The chatbot is currently in production, therefore we present a description of the system implemented and its results on the original users\u2019 requests.", "venue": "Future Internet", "year": 2022, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-18", "journal": {"volume": "14", "pages": "62", "name": "Future Internet"}, "authors": [{"authorId": "2008158857", "name": "Matteo Zubani"}, {"authorId": "2008170937", "name": "Luca Sigalini"}, {"authorId": "1801054", "name": "I. Serina"}, {"authorId": "1397316855", "name": "Luca Putelli"}, {"authorId": "2633661", "name": "A. Gerevini"}, {"authorId": "151108632", "name": "Mattia Chiari"}]}, {"paperId": "a8aa76aba3fc48369dece43613ec34025c787fb2", "externalIds": {"DOI": "10.1177/00219983211037048", "CorpusId": 246982788}, "url": "https://www.semanticscholar.org/paper/a8aa76aba3fc48369dece43613ec34025c787fb2", "title": "The intersection of damage evaluation of fiber-reinforced composite materials with machine learning: A review", "abstract": "Machine learning (ML) has emerged as a useful predictive tool based on mathematical and statistical relationships for various engineering problems. The pairing of structural health monitoring (SHM) and nondestructive evaluation (NDE) methods with ML algorithms has yielded beneficial results in addressing the damage state of a material or system. Damage state descriptions addressed with ML include detecting a damage mechanism, locating a mechanism, identifying the type of mechanism, assessing the extent of the damage mechanism, and estimating the useful remaining life of a material or system. Damage evaluation research of composite materials has progressed with the increased usage of composite structural elements in the aerospace industry. NDE methods are a viable candidate for pairing with ML algorithms to improve damage state monitoring of composite materials due to the complexity associated with the structure of composites. Fiber-reinforced polymers (FRP), for example, contain at least two constituent materials a fiber and matrix material whose mechanical behavior and interactions contribute to the performance of an FRP. Unlike conventional composite analytical models that require explicit information about the constituents and microstructure of a laminate, an ML algorithm can construct damage evaluation predictions when employing exclusively past operational performance or data from an SHM or NDE method. A researcher determines the type of data selected when applying an ML model for trend analysis, anomaly detection, or prediction making. However, no one specific input feature is required for utilizing an ML model, and examples of possible data features include material properties, physical dimensions, and collected evaluation data. In the present review, applications of ML combined with the damage state evaluation of composite materials, particularly examining FRPs, are discussed to demonstrate the predictive capabilities of ML and its viability for future applications, especially in industrial environments, to minimize costs and improve damage detection rates.", "venue": "Journal of Composite Materials", "year": 2022, "referenceCount": 205, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-02-18", "journal": {"volume": "56", "pages": "1417 - 1452", "name": "Journal of Composite Materials"}, "authors": [{"authorId": "2037185590", "name": "Christopher Nelon"}, {"authorId": "49999858", "name": "O. Myers"}, {"authorId": "38374750", "name": "A. Hall"}]}, {"paperId": "dd7f2ea24a30ea75fc19d6313566451ab4161e0c", "externalIds": {"DOI": "10.24018/ejai.2022.1.1.2", "CorpusId": 247537879}, "url": "https://www.semanticscholar.org/paper/dd7f2ea24a30ea75fc19d6313566451ab4161e0c", "title": "The Theory of Natural-Artificial Intelligence", "abstract": "In recent times, mankind is seeking for certain peculiar solutions to multiple facets containing an identically very fundamental philosophy i.e., certainly intend to have indeterminism as a primordial prerequisite; however, that indeterminism is itself like a void filled with determinism as analogous to the quantum computing as qubits and the corresponding complexity. In the meantime, there are algorithms and mathematical frameworks and those in general; yield the required distinctions in the underlying theories constructed upon principles which then give rise to respective objectifications. But, when it comes to the Artificial Intelligence and Machine Learning, then there find some mathematical gaps in order to connect other regimes in relation of one and the other. The proposed discovery in this paper is about quilting some of those gaps as like the whole structure of Artificial Intelligence is yet to be developed in the realm concerning with responsive analysis in betwixt to humans and machines or beyond to such analogy. Hence, the entire introduction & incitement of this theory is to mathematically determine the deep rationality as responsive manifestation of human brain with a designed computing and both with the highest potential degree of attributions or overlaps and both the conditions will be shown mathematically herewith as identifications that make each other separate and clear to persuade.", "venue": "European Journal of Artificial Intelligence and Machine Learning", "year": 2022, "referenceCount": 4, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-15", "journal": {"name": "European Journal of Artificial Intelligence and Machine Learning"}, "authors": [{"authorId": "2159281358", "name": "Dev Arastu Panchariya"}]}, {"paperId": "9f852e90e082adeff13aa6a72436dad0447726f9", "externalIds": {"DOI": "10.3390/h11010027", "CorpusId": 246883046}, "url": "https://www.semanticscholar.org/paper/9f852e90e082adeff13aa6a72436dad0447726f9", "title": "Transhumanities as the Pinnacle and a Bridge", "abstract": "Transhumanities are designed as a multidisciplinary approach that transcends the limitations not only of specific disciplines, but also of the human species; these are primarily humanities for advanced Artificial Intelligence (AI leading to AGI). The view that philosophy, ethics and related disciplines pertain to all rational beings, not solely to humans, is essential to the philosophy of Immanuel Kant. This approach turns out to be practical at the epoch of advanced AI. Many authors ponder how a kernel of ethical respect for human beings can be built into Artificial General Intelligence by the time it becomes a reality. I argue that the task requires, among other components, inculcating the core of the Humanities into advanced AI.", "venue": "Humanities", "year": 2022, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-14", "journal": {"name": "Humanities"}, "authors": [{"authorId": "51986819", "name": "P. Boltuc"}]}, {"paperId": "4560e29308b732cb8635e2fe7a048af0f867da29", "externalIds": {"PubMedCentral": "8853037", "DOI": "10.1007/s00399-022-00839-x", "CorpusId": 246704898, "PubMed": "35147766"}, "url": "https://www.semanticscholar.org/paper/4560e29308b732cb8635e2fe7a048af0f867da29", "title": "Artificial intelligence for the detection, prediction, and management of atrial fibrillation", "abstract": null, "venue": "Herzschrittmachertherapie & Elektrophysiologie", "year": 2022, "referenceCount": 93, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-02-11", "journal": {"volume": "33", "pages": "34 - 41", "name": "Herzschrittmachertherapie & Elektrophysiologie"}, "authors": [{"authorId": "3404266", "name": "J. Isaksen"}, {"authorId": "2060528225", "name": "M. Baumert"}, {"authorId": "1471809173", "name": "A. Hermans"}, {"authorId": "2153987293", "name": "Molly Maleckar"}, {"authorId": "2059599534", "name": "D. Linz"}]}, {"paperId": "d7d632742345d16145dec4ea78746b1ca237892f", "externalIds": {"DBLP": "journals/intpolrev/WhiteK22", "DOI": "10.14763/2022.1.1618", "CorpusId": 246912761}, "url": "https://www.semanticscholar.org/paper/d7d632742345d16145dec4ea78746b1ca237892f", "title": "Artificial emotional intelligence beyond East and West", "abstract": "Artificial emotional intelligence refers to technologies that perform, recognise, or record affective states. More than merely a technological function, however, it is also a social process whereby cultural assumptions about what emotions are and how they are made are translated into composites of code, software, and mechanical platforms that operationalise certain models of emotion over others. This essay illustrates how aspects of cultural difference are both incorporated and elided in projects that equip machines with emotional intelligence. It does so by comparing the field of affective computing, which emerged in the North-Atlantic in the 1990s, with kansei (affective) engineering, which developed in Japan in the 1980s. It then leverages this comparison to argue for more diverse applications of the culture concept in both the development and critique of systems with artificial emotional intelligence. Issue 1 This article belongs to Concepts of the digital society, a special section of Internet Policy Review guest-edited by Christian Katzenbach and Thomas Christian B\u00e4chle.", "venue": "Internet Policy Rev.", "year": 2022, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-11", "journal": {"volume": "11", "name": "Internet Policy Rev."}, "authors": [{"authorId": "2089916899", "name": "Daniel White"}, {"authorId": "3193976", "name": "H. Katsuno"}]}, {"paperId": "bb2d531b406f5662aac2266da13aa27020742048", "externalIds": {"DOI": "10.1002/9781119769026.ch7", "CorpusId": 246789940}, "url": "https://www.semanticscholar.org/paper/bb2d531b406f5662aac2266da13aa27020742048", "title": "An Overview of IoT and Its Application With Machine Learning in Data Center", "abstract": null, "venue": "The Industrial Internet of Things (IIoT)", "year": 2022, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-02-11", "journal": {"name": "The Industrial Internet of Things (IIoT)"}, "authors": [{"authorId": "1492130133", "name": "Manikandan Ramanathan"}, {"authorId": "1492130164", "name": "K. Narayanan"}]}, {"paperId": "09a4a8e3cf6b2454492f12cdb671cda0571249e8", "externalIds": {"DOI": "10.35830/cn.vi83.578", "CorpusId": 246801036}, "url": "https://www.semanticscholar.org/paper/09a4a8e3cf6b2454492f12cdb671cda0571249e8", "title": "A philosophical look at mathematics and related sciences from the beginning to the future", "abstract": "Landmarks in mathematical sciences and its philosophical consequences\u00a0are presented in a generally understandable and partly speculative way\u00a0by following the achievements of famous protagonists.\u00a0From observing the past, a conjecture for the future is deduced.\u00a0", "venue": "Ciencia Nicolaita", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-11", "journal": {"name": "Ciencia Nicolaita"}, "authors": [{"authorId": "143985332", "name": "E. Wagner"}]}, {"paperId": "0f6c1bf895914f87f9bccaaa1d9614aa244e522c", "externalIds": {"DOI": "10.1080/02604027.2022.2028539", "CorpusId": 246735117}, "url": "https://www.semanticscholar.org/paper/0f6c1bf895914f87f9bccaaa1d9614aa244e522c", "title": "The Digital Mockingbird: Anthropological Transformation and the \u201cNew\u201d Nature", "abstract": "Abstract Within a world-system characterized by processes and dynamics whose interconnections and interdependencies increase exponentially each day, we are passing through an extremely delicate and complex phase of global mutation. What we are witnessing is a radical overturn of the complex interaction between natural (biological) and cultural evolution. The ongoing paradigm shift and profound anthropological transformation create new dimensions, openings, epistemological implications that require new thinking and new thought, as well as different approaches and methods. We are the constitutive elements of a \u201cnew\u201d Nature, from a structural, ontological and substantial point of view, in need of a New Humanism that must re-define certain categories (humanity, identity, dignity, Person, values, rights, etc.) in order to succeed in rethinking \u201cbeing human\u201d within a renewed and complex relationship with the ecosystems. The grand illusions of the hypertechnological civilization: rationality, control, measurability, predictability, and elimination of error; are reinforced systematically by the carte blanche delegated to technique/technology, reintroducing reductionist and deterministic approaches, analyses and explanations, exclusively based on technical knowledge and skills: that is, those which are guaranteed to best support precisely these very illusions. It is precisely this attitude which prevents us from being prepared, which dooms us to an eternal apprehension of black swans, little aware that our very lives are emergency; that they are infinite sequences of black swans. The present-day obsession with doing, designing, studying, and funding only what is \u201cuseful,\u201d the insistent search for control and certainty in order to cling onto an illusory sensation of familiarity and reassurance in the face of the radical unpredictability and variability inherent to life and reality (\u201ctyranny of concreteness\u201d). With the advent of artificial intelligence, it has become of the utmost importance to reflect upon the relationship/interaction between man and machine, and the dangers posed by pursuing the simulation of human thought.", "venue": "World Futures", "year": 2022, "referenceCount": 170, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-09", "journal": {"volume": "78", "pages": "343 - 371", "name": "World Futures"}, "authors": [{"authorId": "2093705362", "name": "Piero Dominici"}]}, {"paperId": "3ac7d6aaebac65ec691f6ba0595d509d3c210f28", "externalIds": {"DBLP": "journals/corr/abs-2202-03164", "ArXiv": "2202.03164", "DOI": "10.1142/9789811246050_0012", "CorpusId": 246634059}, "url": "https://www.semanticscholar.org/paper/3ac7d6aaebac65ec691f6ba0595d509d3c210f28", "title": "Conversational Agents: Theory and Applications", "abstract": "In this chapter, we provide a review of conversational agents (CAs), discussing chatbots, intended for casual conversation with a user, as well as task-oriented agents that generally engage in discussions intended to reach one or several specific goals, often (but not always) within a specific domain. We also consider the concept of embodied conversational agents, briefly reviewing aspects such as character animation and speech processing. The many different approaches for representing dialogue in CAs are discussed in some detail, along with methods for evaluating such agents, emphasizing the important topics of accountability and interpretability. A brief historical overview is given, followed by an extensive overview of various applications, especially in the fields of health and education. We end the chapter by discussing benefits and potential risks regarding the societal impact of current and future CA technology.", "venue": "ArXiv", "year": 2022, "referenceCount": 269, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-07", "journal": {"volume": "abs/2202.03164", "name": "ArXiv"}, "authors": [{"authorId": "2505659", "name": "M. Wahde"}, {"authorId": "3235013", "name": "M. Virgolin"}]}, {"paperId": "704570786dc6086c42de533e983ee22bf6dd029c", "externalIds": {"DOI": "10.1055/s-0041-1742180", "CorpusId": 248833106, "PubMed": "35576929"}, "url": "https://www.semanticscholar.org/paper/704570786dc6086c42de533e983ee22bf6dd029c", "title": "Use of Artificial Intelligence in Clinical Neurology.", "abstract": "Artificial intelligence is already innovating in the provision of neurologic care. This review explores key artificial intelligence concepts; their application to neurologic diagnosis, prognosis, and treatment; and challenges that await their broader adoption. The development of new diagnostic biomarkers, individualization of prognostic information, and improved access to treatment are among the plethora of possibilities. These advances, however, reflect only the tip of the iceberg for the ways in which artificial intelligence may transform neurologic care in the future.", "venue": "Seminars in neurology", "year": 2022, "referenceCount": 47, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-01", "journal": {"volume": "42 1", "pages": "\n 39-47\n ", "name": "Seminars in neurology"}, "authors": [{"authorId": "145066343", "name": "James Hillis"}, {"authorId": "46747857", "name": "B. Bizzo"}]}, {"paperId": "ac7bea5758401ef2dd58e2009acdf14d71635b88", "externalIds": {"DOI": "10.1109/ICTech55460.2022.00033", "CorpusId": 251762977}, "url": "https://www.semanticscholar.org/paper/ac7bea5758401ef2dd58e2009acdf14d71635b88", "title": "Intelligent Audit Question Answering System based on Knowledge Graph and Semantic Similarity", "abstract": "Audit work needs to refer to a large number of law and institutional documents, and the business process is intricate. Finding the answer to audit question based on the knowledge graph can improve the work efficiency observably. This paper has proposed a knowledge base for the electric power audit task. In detail, this project collects law texts related to auditing, and has designed schema and specific rules for them to extract triples. These triples are stored in the Neo4j graph database as Knowledge Graph. In addition, this paper makes templates to generate a question answering dataset about electric power audits. According to the audit knowledge graph, a character-level convolutional neural network is trained and an intelligent audit question answering system is built based on the semantic similarity. The effectiveness of the system is evaluated by experiments.", "venue": "2022 11th International Conference of Information and Communication Technology (ICTech))", "year": 2022, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-02-01", "journal": {"pages": "125-132", "name": "2022 11th International Conference of Information and Communication Technology (ICTech))"}, "authors": [{"authorId": "2065124088", "name": "Feifei Dai"}, {"authorId": "2182438288", "name": "ZhangLi Zhao"}, {"authorId": "7547830", "name": "Changpeng Sun"}, {"authorId": "2132445720", "name": "Borang Li"}]}, {"paperId": "89ca40e3894f0a46b876673685c51a36104b4cd7", "externalIds": {"DOI": "10.1007/s41204-021-00185-2", "CorpusId": 247767253}, "url": "https://www.semanticscholar.org/paper/89ca40e3894f0a46b876673685c51a36104b4cd7", "title": "Research hotspots of current interest and trend of artificial intelligence in intelligent speech processing and social sciences \u2013 visualized comparison research based on CiteSpace", "abstract": null, "venue": "Nanotechnology for Environmental Engineering", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-01", "journal": {"volume": "7", "pages": "843 - 855", "name": "Nanotechnology for Environmental Engineering"}, "authors": [{"authorId": "2160595571", "name": "Chengke Zhu"}, {"authorId": "2160592308", "name": "Xiaofeng Zhao"}]}, {"paperId": "011b3d978d110f3a1d1caee9464a8cccde52820b", "externalIds": {"DOI": "10.1215/0094033x-9439601", "CorpusId": 247259492}, "url": "https://www.semanticscholar.org/paper/011b3d978d110f3a1d1caee9464a8cccde52820b", "title": "Intermittent Legitimacy: Hans Blumenberg and Artificial Intelligence", "abstract": "Hans Blumenberg\u2019s only known treatment of the topic of artificial intelligence comes in the form of a fragmentary meditation on the first chatbot, Joseph Weizenbaum\u2019s ELIZA. Blumenberg compares this program to the philosophy of Edmund Husserl, arguing that both AI and phenomenology make a false assumption about intelligence or consciousness. This article argues that Blumenberg\u2019s brush with digital systems is crucial in updating our own critique of AI as it proliferates in a new, dynamic form today. Drawing on and shifting the account of technology in the phenomenological tradition, Blumenberg includes machines in the constitution of meaning through rhetoric and points the way to a new wave of digital critique.", "venue": "New German Critique", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-01", "journal": {"name": "New German Critique"}, "authors": [{"authorId": "67215008", "name": "Leif Weatherby"}]}, {"paperId": "70276650403e5b1cb13dbdabfb6d26243bb6f55b", "externalIds": {"DOI": "10.1016/j.foodcont.2022.108902", "CorpusId": 247099243}, "url": "https://www.semanticscholar.org/paper/70276650403e5b1cb13dbdabfb6d26243bb6f55b", "title": "Fish quality evaluation by sensor and machine learning: A mechanistic review", "abstract": null, "venue": "Food Control", "year": 2022, "referenceCount": 72, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": ["Review"], "publicationDate": "2022-02-01", "journal": {"name": "Food Control"}, "authors": [{"authorId": "2156216091", "name": "Rehan Saeed"}, {"authorId": "48366598", "name": "Huanhuan Feng"}, {"authorId": "2144799429", "name": "Xiang Wang"}, {"authorId": "71128926", "name": "Zhang Xiaoshuan"}, {"authorId": "41216196", "name": "Fu Zetian"}]}, {"paperId": "34f2fff0eda8f215c4d73462526371f1f9836bea", "externalIds": {"PubMedCentral": "8835112", "DOI": "10.3390/ijerph19031728", "CorpusId": 246540644, "PubMed": "35162751"}, "url": "https://www.semanticscholar.org/paper/34f2fff0eda8f215c4d73462526371f1f9836bea", "title": "Artificial Intelligence: A New Diagnostic Software in Dentistry: A Preliminary Performance Diagnostic Study", "abstract": "Background: Artificial intelligence (AI) has taken hold in public health because more and more people are looking to make a diagnosis using technology that allows them to work faster and more accurately, reducing costs and the number of medical errors. Methods: In the present study, 120 panoramic X-rays (OPGs) were randomly selected from the Department of Oral and Maxillofacial Sciences of Sapienza University of Rome, Italy. The OPGs were acquired and analyzed using Apox, which takes a panoramic X-rayand automatically returns the dental formula, the presence of dental implants, prosthetic crowns, fillings and root remnants. A descriptive analysis was performed presenting the categorical variables as absolute and relative frequencies. Results: In total, the number of true positive (TP) values was 2.195 (19.06%); true negative (TN), 8.908 (77.34%); false positive (FP), 132 (1.15%); and false negative (FN), 283 (2.46%). The overall sensitivity was 0.89, while the overall specificity was 0.98. Conclusions: The present study shows the latest achievements in dentistry, analyzing the application and credibility of a new diagnostic method to improve the work of dentists and the patients\u2019 care.", "venue": "International journal of environmental research and public health", "year": 2022, "referenceCount": 30, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-01", "journal": {"volume": "19", "name": "International Journal of Environmental Research and Public Health"}, "authors": [{"authorId": "12548652", "name": "F. De Angelis"}, {"authorId": "6823991", "name": "N. Pranno"}, {"authorId": "1768252708", "name": "A. Franchina"}, {"authorId": "47583050", "name": "S. Di Carlo"}, {"authorId": "39544128", "name": "E. Brauner"}, {"authorId": "51215976", "name": "A. Ferri"}, {"authorId": "33471158", "name": "G. Pellegrino"}, {"authorId": "6116156", "name": "E. Grecchi"}, {"authorId": "83041222", "name": "F. Goker"}, {"authorId": "5600848", "name": "L. Stefanelli"}]}, {"paperId": "6af39776d0ebae6441006a495d595fd5625febf0", "externalIds": {"DBLP": "journals/tois/ZhuSNDDZ22", "DOI": "10.1145/3507356", "CorpusId": 246445772}, "url": "https://www.semanticscholar.org/paper/6af39776d0ebae6441006a495d595fd5625febf0", "title": "Leveraging Narrative to Generate Movie Script", "abstract": "Generating a text based on a predefined guideline is an interesting but challenging problem. A series of studies have been carried out in recent years. In dialogue systems, researchers have explored driving a dialogue based on a plan, while in story generation, a storyline has also been proved to be useful. In this article, we address a new task\u2014generating movie scripts based on a predefined narrative. As an early exploration, we study this problem in a \u201cretrieval-based\u201d setting. We propose a model (ScriptWriter-CPre) to select the best response (i.e., next script line) among the candidates that fit the context (i.e., previous script lines) as well as the given narrative. Our model can keep track of what in the narrative has been said and what is to be said. Besides, it can also predict which part of the narrative should be paid more attention to when selecting the next line of script. In our study, we find the narrative plays a different role than the context. Therefore, different mechanisms are designed for deal with them. Due to the unavailability of data for this new application, we construct a new large-scale data collection GraphMovie from a movie website where end-users can upload their narratives freely when watching a movie. This new dataset is made available publicly to facilitate other studies in text generation under the guideline. Experimental results on the dataset show that our proposed approach based on narratives significantly outperforms the baselines that simply use the narrative as a kind of context.", "venue": "ACM Trans. Inf. Syst.", "year": 2022, "referenceCount": 74, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-01", "journal": {"volume": "40", "pages": "1 - 32", "name": "ACM Transactions on Information Systems (TOIS)"}, "authors": [{"authorId": "2123659063", "name": "Yutao Zhu"}, {"authorId": "35119829", "name": "Ruihua Song"}, {"authorId": "50204644", "name": "J. Nie"}, {"authorId": "2407633", "name": "Pan Du"}, {"authorId": "1897235", "name": "Zhicheng Dou"}, {"authorId": "2145786629", "name": "Jin Zhou"}]}, {"paperId": "2f75ff0ed69e49675333c787faf6578029996da4", "externalIds": {"MAG": "3206438477", "DOI": "10.1145/3464383", "CorpusId": 244584771}, "url": "https://www.semanticscholar.org/paper/2f75ff0ed69e49675333c787faf6578029996da4", "title": "GeCoAgent: A Conversational Agent for Empowering Genomic Data Extraction and Analysis", "abstract": "With the availability of reliable and low-cost DNA sequencing, human genomics is relevant to a growing number of end-users, including biologists and clinicians. Typical interactions require applyin...", "venue": "", "year": 2022, "referenceCount": 42, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-31", "journal": {"volume": "3", "pages": "1-29", "name": ""}, "authors": [{"authorId": "2141951104", "name": "CrovariPietro"}, {"authorId": "2141950360", "name": "Pid\u00f2Sara"}, {"authorId": "1643894709", "name": "PinoliPietro"}, {"authorId": "1644695441", "name": "BernasconiAnna"}, {"authorId": "2141997733", "name": "CanakogluArif"}, {"authorId": "1581876025", "name": "GarzottoFranca"}, {"authorId": "1643716327", "name": "CeriStefano"}]}, {"paperId": "cde1e5bf12ec346323c99f597bb41e77232c1df9", "externalIds": {"DBLP": "journals/tois/MaLZLL22", "DOI": "10.1145/3464377", "CorpusId": 246065789}, "url": "https://www.semanticscholar.org/paper/cde1e5bf12ec346323c99f597bb41e77232c1df9", "title": "Unstructured Text Enhanced Open-Domain Dialogue System: A Systematic Survey", "abstract": "\n Incorporating external knowledge into dialogue generation has been proven to benefit the performance of an open-domain Dialogue System (DS), such as generating informative or stylized responses, controlling conversation topics. In this article, we study the open-domain DS that uses unstructured text as external knowledge sources (\n U\n nstructured\n T\n ext\n E\n nhanced\n D\n ialogue\n S\n ystem (\n UTEDS\n )). The existence of unstructured text entails distinctions between UTEDS and traditional data-driven DS and we aim at analyzing these differences. We first give the definition of the UTEDS related concepts, then summarize the recently released datasets and models. We categorize UTEDS into Retrieval and Generative models and introduce them from the perspective of model components. The retrieval models consist of Fusion, Matching, and Ranking modules, while the generative models comprise Dialogue and Knowledge Encoding, Knowledge Selection (KS), and Response Generation modules. We further summarize the evaluation methods utilized in UTEDS and analyze the current models\u2019 performance. At last, we discuss the future development trends of UTEDS, hoping to inspire new research in this field.\n", "venue": "ACM Trans. Inf. Syst.", "year": 2022, "referenceCount": 180, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-01-31", "journal": {"volume": "40", "pages": "9:1-9:44", "name": "ACM Trans. Inf. Syst."}, "authors": [{"authorId": "153132928", "name": "Longxuan Ma"}, {"authorId": "47628976", "name": "Mingda Li"}, {"authorId": "1806419", "name": "Weinan Zhang"}, {"authorId": "47787152", "name": "Jiapeng Li"}, {"authorId": "2140034831", "name": "Ting Liu"}]}, {"paperId": "099eeb7735c73fc8ff087a771254d7c39a130c1f", "externalIds": {"PubMedCentral": "8866585", "DOI": "10.1007/s10867-021-09590-9", "CorpusId": 237398514, "PubMed": "35089468"}, "url": "https://www.semanticscholar.org/paper/099eeb7735c73fc8ff087a771254d7c39a130c1f", "title": "Biological computation: hearts and flytraps", "abstract": null, "venue": "Journal of biological physics", "year": 2022, "referenceCount": 37, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-28", "journal": {"volume": "48", "pages": "55 - 78", "name": "Journal of Biological Physics"}, "authors": [{"authorId": "20885065", "name": "Kay L Kirkpatrick"}]}, {"paperId": "5d72d285bb839bb31d1cffbeefb7b0ef3cda018a", "externalIds": {"DOI": "10.1215/00029831-9696959", "CorpusId": 246376480}, "url": "https://www.semanticscholar.org/paper/5d72d285bb839bb31d1cffbeefb7b0ef3cda018a", "title": "Introduction: American Game Studies", "abstract": "In 2017, the American game designer Momo Pixel released the single-player, browser-based game Hair Nah. In this game, you play as Aeva, a Black woman taking trips to locations that include Osaka, Havana, and the Santa Monica Pier. As you move through levels on your journey\u2014a taxi ride, airport security, sitting on the plane\u2014you must slap away increasingly aggressive white hands that reach into the frame to touch your hair. Though Hair Nah taps into the genre of a casual button-mashing game, this interactive experience also explores the topic of microaggressions via unwanted hair touching. If you slap away enough hands on your travels, you reach a screen welcoming you to your destination with the message \u201cYOU WIN!\u201d but the caveat, \u201cThe game is over, but this experience isn\u2019t. This is an issue that black women face daily. So a note to those who do it STOP THAT SHIT.\u201d How did video games move from a medium oriented toward adolescent male consumers and characterized by violent actions, such as shooting or fighting, to one that could also accommodate a playfully serious and cathartic exploration of a Black woman defending herself against racist bodily intrusions? Though video games still privilege violent mechanics and are far from diverse, especially in terms of designers and developers in the industry, the early twenty-first century has seen an expansion of the form of, and the culture surrounding, games. This has included a proliferation of game genres: puzzleplatforms (a hybrid that combines spatial or cognitive puzzles with jumps across platforms as in Super Mario Bros. [Nintendo, 1983]); survival horror games (action-adventure games in which the player must persist in a threatening environment without adequate resources);", "venue": "American Literature", "year": 2022, "referenceCount": 45, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-27", "journal": {"name": "American Literature"}, "authors": [{"authorId": "11894276", "name": "Patrick Jagoda"}, {"authorId": "11751678", "name": "Jennifer A. Malkowski"}]}, {"paperId": "4b09890801e648078d806b7b1fbf8ad89d317f96", "externalIds": {"ArXiv": "2201.11197", "DBLP": "journals/corr/abs-2201-11197", "CorpusId": 246294878}, "url": "https://www.semanticscholar.org/paper/4b09890801e648078d806b7b1fbf8ad89d317f96", "title": "Challenges and Opportunities for Machine Learning Classification of Behavior and Mental State from Images", "abstract": "Computer Vision (CV) classifiers which distinguish and detect nonverbal social human behavior and mental state can aid digital diagnostics and therapeutics for psychiatry and the behavioral sciences. While CV classifiers for traditional and structured classification tasks can be developed with standard machine learning pipelines for supervised learning consisting of data labeling, preprocessing, and training a convolutional neural network, there are several pain points which arise when attempting this process for behavioral phenotyping. Here, we discuss the challenges and corresponding opportunities in this space, including handling heterogeneous data, avoiding biased models, labeling massive and repetitive data sets, working with ambiguous or compound class labels, managing privacy concerns, creating appropriate representations, and personalizing models. We discuss current state-of-the-art research endeavors in CV such as data curation, data augmentation, crowdsourced labeling, active learning, reinforcement learning, generative models, representation learning, federated learning, and meta-learning. We highlight at least some of the machine learning advancements needed for imaging classifiers to detect human social cues successfully and reliably.", "venue": "ArXiv", "year": 2022, "referenceCount": 248, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-26", "journal": {"volume": "abs/2201.11197", "name": "ArXiv"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": "2065984781", "name": "O. Mutlu"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": "2240125", "name": "K. Paskov"}, {"authorId": "30423115", "name": "N. Stockham"}, {"authorId": "66636865", "name": "B. Chrisman"}, {"authorId": "2179073073", "name": "Nick Deveaux"}, {"authorId": "2151248737", "name": "Mourya Surhabi"}, {"authorId": "32551479", "name": "N. Haber"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "382f9da008eaa9f5f1b7c69350d9e4e1c62025e5", "externalIds": {"DOI": "10.1177/1742271X211072473", "CorpusId": 246226102}, "url": "https://www.semanticscholar.org/paper/382f9da008eaa9f5f1b7c69350d9e4e1c62025e5", "title": "The application of artificial intelligence in the sonography profession: Professional and educational considerations", "abstract": "The integration of artificial intelligence (AI) technology within the health industry is increasing. This educational piece discusses the implementation of AI and its impact on sonography. The authors investigate how AI may influence the profession and provide examples of how ultrasound imaging may be enhanced and innovated by integrating AI technology. This article highlights challenges related to the application of AI and provides insight into how they could be addressed. The critical distinction between the role of a sonographer and the reporting specialist in the context of AI is highlighted as a key issue for those developing, researching, and evaluating AI systems. A key recommendation is for the sonography community to address ultrasound education, particularly how AI knowledge could be incorporated into university education. This is an important consideration that should be extended to practising professionals as they may be involved in evaluating the efficiency and methodologies used in new research that may incorporate AI technologies.", "venue": "Ultrasound", "year": 2022, "referenceCount": 55, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-21", "journal": {"volume": "30", "pages": "273 - 282", "name": "Ultrasound"}, "authors": [{"authorId": "2082469883", "name": "C. Edwards"}, {"authorId": "51956141", "name": "Crispen Chamunyonga"}, {"authorId": "1484821605", "name": "Ben Searle"}, {"authorId": "4409885", "name": "T. Reddan"}]}, {"paperId": "66cc87463c0f27256a18eb02915460ef0b510c0b", "externalIds": {"ArXiv": "2201.07372", "DBLP": "journals/corr/abs-2201-07372", "CorpusId": 246035573}, "url": "https://www.semanticscholar.org/paper/66cc87463c0f27256a18eb02915460ef0b510c0b", "title": "Prospective Learning: Back to the Future", "abstract": "Research on both natural intelligence (NI) and artificial intelligence (AI) generally assumes that the future resembles the past: intelligent agents or systems (what we call \u2018intelligence\u2019) observe and act on the world, then use this experience to act on future experiences of the same kind. We call this \u2018retrospective learning\u2019. For example, an intelligence may see a set of pictures of objects, along with their names, and learn to name them. A retrospective learning intelligence would merely be able to name more pictures of the same objects. We argue that this is not what true intelligence is about. In many real world problems, both NIs and AIs will have to learn for an uncertain future. Both must update their internal models to be useful for future tasks, such as naming fundamentally new objects and using these objects effectively in a new context or to achieve previously unencountered goals. This ability to learn for the future we call \u2018prospective learning\u2019. We articulate four relevant factors that jointly define prospective learning. Continual learning enables intelligences to remember those aspects of the past which it believes will be most useful in the future. Prospective constraints (including biases and priors) facilitate the intelligence finding general solutions that will be applicable to future problems. Curiosity motivates taking actions that inform future decision making, including in previously unmet situations. Causal estimation enables learning the structure of relations that guide choosing actions for specific outcomes, even when the specific action-outcome contingencies have never been observed before. We argue that a paradigm shift from retrospective to prospective learning will enable the communities that study intelligence to unite and overcome existing bottlenecks to more effectively explain, augment, and engineer intelligences. \u201cNo man ever steps in the same river twice. For it\u2019s not the same river and he\u2019s not the same man.\u201d Heraclitus", "venue": "ArXiv", "year": 2022, "referenceCount": 219, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-19", "journal": {"volume": "abs/2201.07372", "name": "ArXiv"}, "authors": [{"authorId": "1717958", "name": "J. Vogelstein"}, {"authorId": "48174169", "name": "T. Verstynen"}, {"authorId": "150174214", "name": "K. Kording"}, {"authorId": "2166242", "name": "Leyla Isik"}, {"authorId": "3124681", "name": "J. Krakauer"}, {"authorId": "1398026219", "name": "R. Etienne-Cummings"}, {"authorId": "2564494", "name": "E. Ogburn"}, {"authorId": "2068800231", "name": "Carey E. Priebe"}, {"authorId": "145542377", "name": "R. Burns"}, {"authorId": "3407505", "name": "Kwame S. Kutten"}, {"authorId": "2972274", "name": "J. Knierim"}, {"authorId": "2171465", "name": "J. Potash"}, {"authorId": "2072950283", "name": "T. Hartung"}, {"authorId": "145820240", "name": "L. Smirnova"}, {"authorId": "2150486352", "name": "Paul Worley"}, {"authorId": "6549687", "name": "A. Savonenko"}, {"authorId": "51115141", "name": "I. Phillips"}, {"authorId": "2111173632", "name": "Michael Miller"}, {"authorId": "2150487213", "name": "Rene Vidal"}, {"authorId": "2714145", "name": "Jeremias Sulam"}, {"authorId": "144305878", "name": "Adam S. Charles"}, {"authorId": "145988982", "name": "N. Cowan"}, {"authorId": "1722887", "name": "Maxim Bichuch"}, {"authorId": "3318697", "name": "A. Venkataraman"}, {"authorId": "40144368", "name": "Chen Li"}, {"authorId": "145146201", "name": "N. Thakor"}, {"authorId": "6481849", "name": "Justus M. Kebschull"}, {"authorId": "2055754721", "name": "M. Albert"}, {"authorId": "2155955522", "name": "Jinchong Xu"}, {"authorId": "144176224", "name": "M. Shuler"}, {"authorId": "1397970751", "name": "B. Caffo"}, {"authorId": "47026288", "name": "T. Ratnanather"}, {"authorId": "2008817606", "name": "Ali Geisa"}, {"authorId": "47110018", "name": "S. Roh"}, {"authorId": "2127864028", "name": "Eva Yezerets"}, {"authorId": "50481453", "name": "Meghana Madhyastha"}, {"authorId": "3706007", "name": "Javier J. How"}, {"authorId": "2414228", "name": "Tyler M. Tomita"}, {"authorId": "31627573", "name": "Jayanta Dey"}, {"authorId": "2003308715", "name": "N. Huang"}, {"authorId": "2152473079", "name": "Jong M. Shin"}, {"authorId": "2130912736", "name": "K. A. Kinfu"}, {"authorId": "2059257077", "name": "Pratik R. Chaudhari"}, {"authorId": "144728145", "name": "Ben Baker"}, {"authorId": "2717995", "name": "A. Schapiro"}, {"authorId": "144348441", "name": "Dinesh Jayaraman"}, {"authorId": "144020269", "name": "Eric Eaton"}, {"authorId": "153298565", "name": "M. Platt"}, {"authorId": "143857273", "name": "Pallavi V. Kulkarni"}, {"authorId": "2001748", "name": "Leila Wehbe"}, {"authorId": "49542731", "name": "\u00c1d\u00e1m Kepecs"}, {"authorId": "2003795252", "name": "Amy Christensen"}, {"authorId": "66716646", "name": "O. Osuagwu"}, {"authorId": "1824880", "name": "Bingni W. Brunton"}, {"authorId": "1875164", "name": "B. Mensh"}, {"authorId": "8665112", "name": "A. Muotri"}, {"authorId": "2150488210", "name": "Gabriel Silva"}, {"authorId": "49843412", "name": "F. Puppo"}, {"authorId": "5478027", "name": "F. Engert"}, {"authorId": "2104527645", "name": "Elizabeth Hillman"}, {"authorId": "2110786762", "name": "Julia Brown"}, {"authorId": "2008826474", "name": "Christoper M. White"}, {"authorId": "2117131236", "name": "Weiwei Yang"}]}, {"paperId": "327a4db46f71c26af556f4c270c6ccf44d7526ed", "externalIds": {"DOI": "10.20944/preprints202201.0206.v1", "CorpusId": 246059455}, "url": "https://www.semanticscholar.org/paper/327a4db46f71c26af556f4c270c6ccf44d7526ed", "title": "Computational Models in Neurosciences Between Mechanistic and Phenomenological Characterizations", "abstract": "Computational neuroscience combines mathematics, computer science models, and neurosciences for theorizing, investigating, and simulating neural systems involved in the development, structure, physiology, and cognitive abilities of the brain. Computational models constitute a major stake in translational neuroscience: the analytical understanding of these models seems fundamental to consider a translation towards clinical applications. Method: We propose a minimal typology of computational models, which allows distinguishing between more realistic models (e.g., mechanistic models) and pragmatic models (e.g., phenomenological models). Result: Understanding the translational aspects of computational models goes far beyond the intrinsic characteristics of models. First, we assume that a computational model is rarely uniquely mechanistic or phenomenological. Idealization seems necessary because of i) the researcher\u2019s perspectives on the phenomena and the purposes of the study (i.e., by the relativity of the model); ii) The complexity of reality across different levels and therefore the nature and number of dimensions required to consider a phenomenon. Especially, the use of models goes far beyond their function, and requires considering external characteristics rooted in path dependence, interdisciplinarity, and pluralism in neurosciences. Conclusion: The unreasonable use of computational models, which are highly complex and subject to a shift in their initial function, could be limited by bringing to light such factors.", "venue": "", "year": 2022, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-14", "journal": null, "authors": [{"authorId": "116951279", "name": "C. Gauld"}, {"authorId": "2069885259", "name": "C\u00e9dric N. Brun"}, {"authorId": "2877867", "name": "T. Boraud"}, {"authorId": "35361345", "name": "M. Carlu"}, {"authorId": "146481340", "name": "D. Depannemaecker"}]}, {"paperId": "92bc0f4e44e963ba87d5d3a49cfc93f69fed04c8", "externalIds": {"DOI": "10.1097/RCT.0000000000001247", "CorpusId": 245966939, "PubMed": "35027520"}, "url": "https://www.semanticscholar.org/paper/92bc0f4e44e963ba87d5d3a49cfc93f69fed04c8", "title": "Artificial Intelligence in Diagnostic Radiology: Where Do We Stand, Challenges, and Opportunities", "abstract": "Abstract Artificial intelligence (AI) is the most revolutionizing development in the health care industry in the current decade, with diagnostic imaging having the greatest share in such development. Machine learning and deep learning (DL) are subclasses of AI that show breakthrough performance in image analysis. They have become the state of the art in the field of image classification and recognition. Machine learning deals with the extraction of the important characteristic features from images, whereas DL uses neural networks to solve such problems with better performance. In this review, we discuss the current applications of machine learning and DL in the field of diagnostic radiology. Deep learning applications can be divided into medical imaging analysis and applications beyond analysis. In the field of medical imaging analysis, deep convolutional neural networks are used for image classification, lesion detection, and segmentation. Also used are recurrent neural networks when extracting information from electronic medical records and to augment the use of convolutional neural networks in the field of image classification. Generative adversarial networks have been explicitly used in generating high-resolution computed tomography and magnetic resonance images and to map computed tomography images from the corresponding magnetic resonance imaging. Beyond image analysis, DL can be used for quality control, workflow organization, and reporting. In this article, we review the most current AI models used in medical imaging research, providing a brief explanation of the various models described in the literature within the past 5 years. Emphasis is placed on the various DL models, as they are the most state-of-art in imaging analysis.", "venue": "Journal of computer assisted tomography", "year": 2022, "referenceCount": 111, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-01-12", "journal": {"volume": "46", "pages": "78 - 90", "name": "Journal of Computer Assisted Tomography"}, "authors": [{"authorId": "48998447", "name": "A. Moawad"}, {"authorId": "144499915", "name": "David T. Fuentes"}, {"authorId": "4056485", "name": "Mohamed G. Elbanan"}, {"authorId": "143627282", "name": "A. Shalaby"}, {"authorId": "83389532", "name": "Jeffrey R. Guccione"}, {"authorId": "1505801840", "name": "Serageldin Kamel"}, {"authorId": "37923217", "name": "C. Jensen"}, {"authorId": "3901588", "name": "K. Elsayes"}]}, {"paperId": "94f02394a8f019d7ece7eb9612e96253ba97f30c", "externalIds": {"ACL": "2022.nlp4convai-1.8", "DBLP": "conf/acl-convai/SmithHQRBW22", "ArXiv": "2201.04723", "DOI": "10.18653/v1/2022.nlp4convai-1.8", "CorpusId": 245906443}, "url": "https://www.semanticscholar.org/paper/94f02394a8f019d7ece7eb9612e96253ba97f30c", "title": "Human Evaluation of Conversations is an Open Problem: comparing the sensitivity of various methods for evaluating dialogue agents", "abstract": "At the heart of improving conversational AI is the open problem of how to evaluate conversations. Issues with automatic metrics are well known (Liu et al., 2016), with human evaluations still considered the gold standard. Unfortunately, how to perform human evaluations is also an open problem: differing data collection methods have varying levels of human agreement and statistical sensitivity, resulting in differing amounts of human annotation hours and labor costs. In this work we compare five different crowdworker-based human evaluation methods and find that different methods are best depending on the types of models compared, with no clear winner across the board. While this highlights the open problems in the area, our analysis leads to advice of when to use which one, and possible future directions.", "venue": "NLP4CONVAI", "year": 2022, "referenceCount": 59, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-12", "journal": {"pages": "77-97"}, "authors": [{"authorId": "51324296", "name": "Eric Michael Smith"}, {"authorId": "2149798298", "name": "Orion Hsu"}, {"authorId": "2149798086", "name": "Rebecca Qian"}, {"authorId": "3849208", "name": "Stephen Roller"}, {"authorId": "90841478", "name": "Y-Lan Boureau"}, {"authorId": "145183709", "name": "J. Weston"}]}, {"paperId": "975e91a658d74856779af3883b58a4aa374cb28b", "externalIds": {"DBLP": "journals/corr/abs-2201-02478", "ArXiv": "2201.02478", "DOI": "10.1109/ACCESS.2022.3159911", "CorpusId": 245827867}, "url": "https://www.semanticscholar.org/paper/975e91a658d74856779af3883b58a4aa374cb28b", "title": "Bayesian Neural Networks for Reversible Steganography", "abstract": "Recent advances in deep learning have led to a paradigm shift in the field of reversible steganography. A fundamental pillar of reversible steganography is predictive modelling which can be realised via deep neural networks. However, non-trivial errors exist in inferences about some out-of-distribution and noisy data. In view of this issue, we propose to consider uncertainty in predictive models based upon a theoretical framework of Bayesian deep learning, thereby creating an adaptive steganographic system. Most modern deep-learning models are regarded as deterministic because they only offer predictions while failing to provide uncertainty measurement. Bayesian neural networks bring a probabilistic perspective to deep learning and can be regarded as self-aware intelligent machinery; that is, a machine that knows its own limitations. To quantify uncertainty, we apply Bayesian statistics to model the predictive distribution and approximate it through Monte Carlo sampling with stochastic forward passes. We further show that predictive uncertainty can be disentangled into aleatoric and epistemic uncertainties and these quantities can be learnt unsupervised. Experimental results demonstrate an improvement delivered by Bayesian uncertainty analysis upon steganographic rate-distortion performance.", "venue": "IEEE Access", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": {"volume": "10", "pages": "36327-36334", "name": "IEEE Access"}, "authors": [{"authorId": "4020249", "name": "Ching-Chun Chang"}]}, {"paperId": "4b2b5e565451ee6b55b7e902b646f4fd0fec7e11", "externalIds": {"ArXiv": "2201.02303", "DBLP": "journals/corr/abs-2201-02303", "CorpusId": 245827770}, "url": "https://www.semanticscholar.org/paper/4b2b5e565451ee6b55b7e902b646f4fd0fec7e11", "title": "From Textual Experiments to Experimental Texts: Expressive Repetition in \"Artificial Intelligence Literature\"", "abstract": "Since the birth of artificial intelligence 70 years ago, attempts at literary \u201ccreation\u201d with computers are present in the course of technological development, creating what one might call \u201cartificial intelligence literature\u201d (AI literature). Evolving from \u201ctextual experiments\u201d conducted by technologists to \u201cexperimental texts\u201d that explore the possibilities of conceptions of literature, AI literature integrates primitive problems including machine thinking, text generation, and machine creativity, which exhibits the two-way interaction between social ideas and technology. In the early stage, the mutual support between technological path and artistic ideas turned out to be a failure, while AI-driven expressive repetitions are made probable in the contemporary technological context, paving the way for the transformation of AI literature from proof for technical possibilities to self-verification of literary value.", "venue": "ArXiv", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": {"volume": "abs/2201.02303", "name": "ArXiv"}, "authors": [{"authorId": "2726531", "name": "Tianhua Zhu"}]}, {"paperId": "ccce8afb43154cf5ad8fc3dfcd0f1bf3e4b3a7f1", "externalIds": {"DOI": "10.1177/87569728211061779", "CorpusId": 245817331}, "url": "https://www.semanticscholar.org/paper/ccce8afb43154cf5ad8fc3dfcd0f1bf3e4b3a7f1", "title": "The Expectations of Project Managers from Artificial Intelligence: A Delphi Study", "abstract": "Artificial intelligence (AI) technologies are rapidly developing these days and are expected to impact the field of project management on multiple levels; however, there remains a high level of uncertainty regarding the effect that AI might have on project management practices. This article aims to address this topic based on a Delphi study with a panel of 52 project management experts who reflected on future potential AI applications for the project management Knowledge Areas. The article provides a visionary perspective that can be further translated into practical solutions in the near and far future to improve project management practices.", "venue": "Project Management Journal", "year": 2022, "referenceCount": 125, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": {"volume": "53", "pages": "438 - 455", "name": "Project Management Journal"}, "authors": [{"authorId": "90220793", "name": "Vered Holzmann"}, {"authorId": "2149284915", "name": "Daniel Zitter"}, {"authorId": "2149284742", "name": "Sahar Peshkess"}]}, {"paperId": "b2be05ccef54fdc5514467c7fef5d155cccff8a8", "externalIds": {"DOI": "10.1108/ijm-07-2021-0423", "CorpusId": 245735534}, "url": "https://www.semanticscholar.org/paper/b2be05ccef54fdc5514467c7fef5d155cccff8a8", "title": "A study of artificial intelligence on employee performance and work engagement: the moderating role of change leadership", "abstract": "PurposeThis paper aims to explore employee perceptions of companies engaged in services and banking of the role of change leadership on the application of artificial intelligence (AI) that will impact the performance and work engagement in conditions that are experiencing rapid changes.Design/methodology/approachThis study has used a quantitative research approach, and data analysis uses an approach structural equation modeling (SEM) supported by program computer software AMOS 22.0. A total of 357 respondents were involved in this study, but only 254 were qualified. In this study, the respondent is an employee of companies engaged in the services and banking sector in the East Java, Indonesia region.FindingsThe results reveal that AI has a significant positive effect on employee performance and work engagement. Change leadership positively moderates the influence of AI on employee performance and work engagement.Originality/valueThe development of this model has a novelty by including the moderating variable of the role of change leadership because, in conditions that are experiencing rapid changes, the role of leaders is essential. After all, leaders are decision-makers in the organization. The development of this concept focuses on studies of companies engaged in services and banking. Employee performance is an essential determinant in the organization because it will improve organizational performance. In addition, the application of AI in organizations will experience turmoil, so that the critical role of leaders is needed to achieve success with employee work engagement.", "venue": "International journal of manpower", "year": 2022, "referenceCount": 122, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-04", "journal": {"name": "International Journal of Manpower"}, "authors": [{"authorId": "74599974", "name": "D. Wijayati"}, {"authorId": "122253491", "name": "Z. Rahman"}, {"authorId": "114186387", "name": "A. Fahrullah"}, {"authorId": "1581361640", "name": "Muhammad Fajar Wahyudi Rahman"}, {"authorId": "2005519031", "name": "Ika Diyah Candra Arifah"}, {"authorId": "83278325", "name": "Achmad Kautsar"}]}, {"paperId": "86f33254eb241f0be2708e3fab5bdc2816141f2e", "externalIds": {"DBLP": "journals/mta/NiralaSP22", "PubMedCentral": "8721490", "DOI": "10.1007/s11042-021-11458-y", "CorpusId": 245654055, "PubMed": "35002470"}, "url": "https://www.semanticscholar.org/paper/86f33254eb241f0be2708e3fab5bdc2816141f2e", "title": "A survey on providing customer and public administration based services using AI: chatbot", "abstract": null, "venue": "Multim. Tools Appl.", "year": 2022, "referenceCount": 99, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-01-03", "journal": {"volume": "81", "pages": "22215 - 22246", "name": "Multimedia Tools and Applications"}, "authors": [{"authorId": "2148229185", "name": "Krishna Kumar Nirala"}, {"authorId": "31694553", "name": "N. Singh"}, {"authorId": "70661096", "name": "V. S. Purani"}]}, {"paperId": "399302544fa6dcb0ae7bf37b216338ecdbbb6249", "externalIds": {"DBLP": "journals/alife/AmosW22", "DOI": "10.1162/artl_a_00381", "CorpusId": 251671497, "PubMed": "35984431"}, "url": "https://www.semanticscholar.org/paper/399302544fa6dcb0ae7bf37b216338ecdbbb6249", "title": "Crowd-Sourced Identification of Characteristics of Collective Human Motion", "abstract": "Abstract Crowd simulations are used extensively to study the dynamics of human collectives. Such studies are underpinned by specific movement models, which encode rules and assumptions about how people navigate a space and handle interactions with others. These models often give rise to macroscopic simulated crowd behaviours that are statistically valid, but which lack the noisy microscopic behaviours that are the signature of believable real crowds. In this article, we use an existing Turing test for crowds to identify realistic features of real crowds that are generally omitted from simulation models. Our previous study using this test established that untrained individuals have difficulty in classifying movies of crowds as real or simulated, and that such people often have an idealised view of how crowds move. In this follow-up study (with new participants) we perform a second trial, which now includes a training phase (showing participants movies of real crowds). We find that classification performance significantly improves after training, confirming the existence of features that allow participants to identify real crowds. High-performing individuals are able to identify the features of real crowds that should be incorporated into future simulations if they are to be considered realistic.", "venue": "Artificial Life", "year": 2022, "referenceCount": 57, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-01", "journal": {"volume": "28", "pages": "401-422", "name": "Artificial Life"}, "authors": [{"authorId": "144936973", "name": "M. Amos"}, {"authorId": "2130441911", "name": "Jamie Webster"}]}, {"paperId": "9fff3ccb868e37ff40300957b92ee74d5ba9b8d6", "externalIds": {"DOI": "10.1177/20539517211069891", "CorpusId": 250180452}, "url": "https://www.semanticscholar.org/paper/9fff3ccb868e37ff40300957b92ee74d5ba9b8d6", "title": "The Thick Machine: Anthropological AI between explanation and explication", "abstract": "According to Clifford Geertz, the purpose of anthropology is not to explain culture but to explicate it. That should cause us to rethink our relationship with machine learning. It is, we contend, perfectly possible that machine learning algorithms, which are unable to explain, and could even be unexplainable themselves, can still be of critical use in a process of explication. Thus, we report on an experiment with anthropological AI. From a dataset of 175K Facebook comments, we trained a neural network to predict the emoji reaction associated with a comment and asked a group of human players to compete against the machine. We show that a) the machine can reach the same (poor) accuracy as the players (51%), b) it fails in roughly the same ways as the players, and c) easily predictable emoji reactions tend to reflect unambiguous situations where interpretation is easy. We therefore repurpose the failures of the neural network to point us to deeper and more ambiguous situations where interpretation is hard and explication becomes both necessary and interesting. We use this experiment as a point of departure for discussing how experiences from anthropology, and in particular the tension between formalist ethnoscience and interpretive thick description, might contribute to debates about explainable AI.", "venue": "Big Data & Society", "year": 2022, "referenceCount": 48, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-01", "journal": {"volume": "9", "name": "Big Data & Society"}, "authors": [{"authorId": "12953449", "name": "A. Munk"}, {"authorId": "2174377350", "name": "Asger Gehrt Olesen"}, {"authorId": "1933458", "name": "M. Jacomy"}]}, {"paperId": "8bd96c059b46845d2199e53d37d788c00a348c56", "externalIds": {"DOI": "10.1590/1982-0259.2022.e82510", "CorpusId": 245923449}, "url": "https://www.semanticscholar.org/paper/8bd96c059b46845d2199e53d37d788c00a348c56", "title": "Ind\u00fastria 4.0: servi\u00e7o social no sistema previdenci\u00e1rio em tempos da pandemia de COVID-19", "abstract": "Resumo Este texto discute o cen\u00e1rio do trabalho de assistentes sociais (AS) da Previd\u00eancia Social (PS) no Brasil, a partir da pandemia do novo coronav\u00edrus, COVID-19. Busca evidenciar como AS responderam \u00e0 pandemia, em termos do seu trabalho e quais as principais mudan\u00e7as ocorridas na PS nesse per\u00edodo. Utiliza-se de uma entrevista semiestruturada na forma de grupo focal com AS da PS. A \u00eanfase fundamental recai sobre os processos de informatiza\u00e7\u00e3o dos benef\u00edcios previdenci\u00e1rios e teletrabalho correspondendo ao aprofundamento do neoliberalismo e maior fragiliza\u00e7\u00e3o do trabalho.", "venue": "Revista Kat\u00e1lysis", "year": 2022, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-01-01", "journal": {"name": "Revista Kat\u00e1lysis"}, "authors": [{"authorId": "150992517", "name": "Edv\u00e2nia \u00c2ngela de Souza"}]}, {"paperId": "a61d065eb321888e9d4ca808b9952e858e0859c4", "externalIds": {"DOI": "10.1016/j.jfo.2021.11.002", "CorpusId": 245687828}, "url": "https://www.semanticscholar.org/paper/a61d065eb321888e9d4ca808b9952e858e0859c4", "title": "Intelligence artificielle et glaucome\u00a0: une revue de la litt\u00e9rature", "abstract": null, "venue": "Journal Fran\u00e7ais d'Ophtalmologie", "year": 2022, "referenceCount": 148, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-01-01", "journal": {"name": "Journal Fran\u00e7ais d'Ophtalmologie"}, "authors": [{"authorId": "2148525479", "name": "R. Bunod"}, {"authorId": "2082636439", "name": "E. Augstburger"}, {"authorId": "47618121", "name": "E. Brasnu"}, {"authorId": "153572951", "name": "A. Labb\u00e9"}, {"authorId": "2053483552", "name": "C. Baudouin"}]}, {"paperId": "5c768e2f178e74e581ea62c43cad10c73e0eae9d", "externalIds": {"DOI": "10.1086/717306", "CorpusId": 245145134}, "url": "https://www.semanticscholar.org/paper/5c768e2f178e74e581ea62c43cad10c73e0eae9d", "title": "Artificial Antisemitism: Critical Theory in the Age of Datafication", "abstract": "This article is a critical genealogy of Tay, an artificial-intelligence chatbot that Microsoft released on Twitter in 2016, which was quickly hijacked by internet trolls to reproduce racist, misogynist, and antisemitic language. Tay\u2019s repetition and production of hate speech calls for an approach that draws on both media and cultural theory\u2014the Frankfurt School\u2019s dialectical analyses of language and ideology, in particular. Revisiting the Frankfurt School in the age of algorithmic reason shows that, contrary to views foundational to computing, a neural-network chatbot like Tay does not sidestep meaning but rather carries and alters it, with unforeseen social and political consequences. A return to the work of Max Horkheimer and Theodor W. Adorno thus locates ideology in the digital world at the nexus of language\u2019s ability to mean, language and meaning\u2019s susceptibility to computation, and the design of a machine to compute both. Coming to critical terms with the antisemitism produced in Tay\u2019s human-computer synthesis requires, as this article contends, addressing the uncanny embodiment and reflection of thought that is digital computation.", "venue": "Critical Inquiry", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-01", "journal": {"volume": "48", "pages": "286 - 312", "name": "Critical Inquiry"}, "authors": [{"authorId": "51030455", "name": "M. Handelman"}]}, {"paperId": "a302e6d48d342ff06f260424ab37dcc9b553f975", "externalIds": {"DBLP": "journals/jbd/KhalilP22", "DOI": "10.1186/s40537-022-00663-7", "CorpusId": 245377339}, "url": "https://www.semanticscholar.org/paper/a302e6d48d342ff06f260424ab37dcc9b553f975", "title": "Transforming the generative pretrained transformer into augmented business text writer", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-20", "journal": {"volume": "9", "name": "Journal of Big Data"}, "authors": [{"authorId": "88223633", "name": "Faisal Khalil"}, {"authorId": "1734512", "name": "G. Pipa"}]}, {"paperId": "b90c090f7928a78d85d952737488be1ef8587ae5", "externalIds": {"DBLP": "journals/corr/abs-2201-06657", "ArXiv": "2201.06657", "DOI": "10.3390/info13010041", "CorpusId": 245360052}, "url": "https://www.semanticscholar.org/paper/b90c090f7928a78d85d952737488be1ef8587ae5", "title": "A Literature Survey of Recent Advances in Chatbots", "abstract": "Chatbots are intelligent conversational computer systems designed to mimic human conversation to enable automated online guidance and support. The increased benefits of chatbots led to their wide adoption by many industries in order to provide virtual assistance to customers. Chatbots utilise methods and algorithms from two Artificial Intelligence domains: Natural Language Processing and Machine Learning. However, there are many challenges and limitations in their application. In this survey we review recent advances on chatbots, where Artificial Intelligence and Natural Language processing are used. We highlight the main challenges and limitations of current work and make recommendations for future research investigation", "venue": "Inf.", "year": 2021, "referenceCount": 110, "citationCount": 18, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-12-16", "journal": {"volume": "13", "pages": "41", "name": "Inf."}, "authors": [{"authorId": "2146579424", "name": "Guendalina Caldarini"}, {"authorId": "3184880", "name": "Sardar F. Jaf"}, {"authorId": "33944350", "name": "K. McGarry"}]}, {"paperId": "67a5fb974d1a275e18d7b832d5bf0c2bba10a6f9", "externalIds": {"DBLP": "journals/ce/HanL22", "DOI": "10.1016/j.compedu.2021.104395", "CorpusId": 244824547}, "url": "https://www.semanticscholar.org/paper/67a5fb974d1a275e18d7b832d5bf0c2bba10a6f9", "title": "FAQ chatbot and inclusive learning in massive open online courses", "abstract": null, "venue": "Comput. Educ.", "year": 2021, "referenceCount": 49, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-01", "journal": {"volume": "179", "pages": "104395", "name": "Comput. Educ."}, "authors": [{"authorId": "117887308", "name": "Song-Ae Han"}, {"authorId": "50112472", "name": "Min Kyung Lee"}]}, {"paperId": "4c4a9d2f520111b88a402757d00a1fcb5c4599c6", "externalIds": {"DBLP": "books/sp/22/Nida-Rumelin22", "DOI": "10.1007/978-3-030-86144-5_10", "CorpusId": 244563431}, "url": "https://www.semanticscholar.org/paper/4c4a9d2f520111b88a402757d00a1fcb5c4599c6", "title": "Digital Humanism and the Limits of Artificial Intelligence", "abstract": null, "venue": "Perspectives on Digital Humanism", "year": 2021, "referenceCount": 10, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-24", "journal": {"pages": "71-75"}, "authors": [{"authorId": "1404786979", "name": "J. Nida-R\u00fcmelin"}]}, {"paperId": "9fccb62bfe51feddf9090147a90f9b3bc86201f1", "externalIds": {"PubMedCentral": "8590628", "DBLP": "journals/snam/NajariSF22", "DOI": "10.1007/s13278-021-00800-9", "CorpusId": 244120959, "PubMed": "34804252"}, "url": "https://www.semanticscholar.org/paper/9fccb62bfe51feddf9090147a90f9b3bc86201f1", "title": "GANBOT: a GAN-based framework for social bot detection", "abstract": null, "venue": "Soc. Netw. Anal. Min.", "year": 2021, "referenceCount": 67, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-14", "journal": {"volume": "12", "name": "Social Network Analysis and Mining"}, "authors": [{"authorId": "103997360", "name": "S. Najari"}, {"authorId": "38708773", "name": "Mostafa Salehi"}, {"authorId": "2633697", "name": "R. Farahbakhsh"}]}, {"paperId": "c87a9e2fc2d1c4a8d48c10718601f88c48dfa2f0", "externalIds": {"DBLP": "journals/corr/abs-2111-07036", "ArXiv": "2111.07036", "DOI": "10.1609/aaai.v36i11.21559", "CorpusId": 244116895}, "url": "https://www.semanticscholar.org/paper/c87a9e2fc2d1c4a8d48c10718601f88c48dfa2f0", "title": "Introducing Variational Autoencoders to High School Students", "abstract": "Generative Artificial Intelligence (AI) models are a compelling way to introduce K-12 students to AI education using an artistic medium, and hence have drawn attention from K-12 AI educators. Previous Creative AI curricula mainly focus on Generative Adversarial Networks (GANs) while paying less attention to Autoregressive Models, Variational Autoencoders (VAEs), or other generative models, which have since become common in the field of generative AI. VAEs' latent-space structure and interpolation ability could effectively ground the interdisciplinary learning of AI, creative arts, and philosophy. Thus, we designed a lesson to teach high school students about VAEs. We developed a web-based game and used Plato's cave, a philosophical metaphor, to introduce how VAEs work. We used a Google Colab notebook for students to re-train VAEs with their hand-written digits to consolidate their understandings. Finally, we guided the exploration of creative VAE tools such as SketchRNN and MusicVAE to draw the connection between what they learned and real-world applications. This paper describes the lesson design and shares insights from the pilot studies with 22 students. We found that our approach was effective in teaching students about a novel AI concept.", "venue": "AAAI Conference on Artificial Intelligence", "year": 2021, "referenceCount": 51, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-11-13", "journal": {"pages": "12801-12809"}, "authors": [{"authorId": "2130599780", "name": "Zhuoyue Lyu"}, {"authorId": "51134075", "name": "Safinah Ali"}, {"authorId": "2065304843", "name": "C. Breazeal"}]}, {"paperId": "463eebd069a58d9379b0b9567f9b0fc6b004fc7c", "externalIds": {"DBLP": "journals/mta/BoussakssouEE22", "DOI": "10.1007/s11042-021-11709-y", "CorpusId": 243840072}, "url": "https://www.semanticscholar.org/paper/463eebd069a58d9379b0b9567f9b0fc6b004fc7c", "title": "Chatbot in Arabic language using seq to seq model", "abstract": null, "venue": "Multim. Tools Appl.", "year": 2021, "referenceCount": 8, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-06", "journal": {"volume": "81", "pages": "2859-2871", "name": "Multimedia Tools and Applications"}, "authors": [{"authorId": "1712211978", "name": "M. Boussakssou"}, {"authorId": "2011904", "name": "H. Ezzikouri"}, {"authorId": "90643624", "name": "M. Erritali"}]}, {"paperId": "4b8475e0ae22ddf56d3d061c8260fabd724aa4de", "externalIds": {"DBLP": "journals/asc/DikshitPS22", "DOI": "10.1016/j.asoc.2021.108080", "CorpusId": 244542721}, "url": "https://www.semanticscholar.org/paper/4b8475e0ae22ddf56d3d061c8260fabd724aa4de", "title": "Artificial neural networks in drought prediction in the 21st century-A scientometric analysis", "abstract": null, "venue": "Applied Soft Computing", "year": 2021, "referenceCount": 122, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-01", "journal": {"volume": "114", "pages": "108080", "name": "Appl. Soft Comput."}, "authors": [{"authorId": "108523304", "name": "Abhirup Dikshit"}, {"authorId": "143620129", "name": "B. Pradhan"}, {"authorId": "1622837022", "name": "M. Santosh"}]}, {"paperId": "5d8aac87d879aed91248636ca0be262dde27f9e4", "externalIds": {"DBLP": "journals/wpc/KuipersP22", "DOI": "10.1007/s11277-021-09288-0", "CorpusId": 240243277}, "url": "https://www.semanticscholar.org/paper/5d8aac87d879aed91248636ca0be262dde27f9e4", "title": "Journey of Artificial Intelligence", "abstract": null, "venue": "Wirel. Pers. Commun.", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-29", "journal": {"volume": "123", "pages": "3275-3290", "name": "Wirel. Pers. Commun."}, "authors": [{"authorId": "2144283", "name": "B. Kuipers"}, {"authorId": "2121476948", "name": "Ramjee Prasad"}]}, {"paperId": "4695282c824addc031fee351d71711abb0b7bc2a", "externalIds": {"ArXiv": "2110.09036", "DBLP": "journals/corr/abs-2110-09036", "DOI": "10.1017/s1351324921000358", "CorpusId": 239016203}, "url": "https://www.semanticscholar.org/paper/4695282c824addc031fee351d71711abb0b7bc2a", "title": "Ranking Facts for Explaining Answers to Elementary Science Questions", "abstract": "\n In multiple-choice exams, students select one answer from among typically four choices and can explain why they made that particular choice. Students are good at understanding natural language questions and based on their domain knowledge can easily infer the question\u2019s answer by \u201cconnecting the dots\u201d across various pertinent facts. Considering automated reasoning for elementary science question answering, we address the novel task of generating explanations for answers from human-authored facts. For this, we examine the practically scalable framework of feature-rich support vector machines leveraging domain-targeted, hand-crafted features. Explanations are created from a human-annotated set of nearly 5000 candidate facts in the WorldTree corpus. Our aim is to obtain better matches for valid facts of an explanation for the correct answer of a question over the available fact candidates. To this end, our features offer a comprehensive linguistic and semantic unification paradigm. The machine learning problem is the preference ordering of facts, for which we test pointwise regression versus pairwise learning-to-rank. Our contributions, originating from comprehensive evaluations against nine existing systems, are (1) a case study in which two preference ordering approaches are systematically compared, and where the pointwise approach is shown to outperform the pairwise approach, thus adding to the existing survey of observations on this topic; (2) since our system outperforms a highly-effective TF-IDF-based IR technique by 3.5 and 4.9 points on the development and test sets, respectively, it demonstrates some of the further task improvement possibilities (e.g., in terms of an efficient learning algorithm, semantic features) on this task; (3) it is a practically competent approach that can outperform some variants of BERT-based reranking models; and (4) the human-engineered features make it an interpretable machine learning model for the task.", "venue": "Natural Language Engineering", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-18", "journal": {"volume": "abs/2110.09036", "name": "ArXiv"}, "authors": [{"authorId": "1789682566", "name": "J. D\u2019Souza"}, {"authorId": "30523699", "name": "I. Mulang"}, {"authorId": "2071756650", "name": "Soeren Auer"}]}, {"paperId": "a0b777b25cdf0fc992568ca52a5c7bebf1ee987f", "externalIds": {"ArXiv": "2110.08975", "DBLP": "journals/corr/abs-2110-08975", "DOI": "10.1145/3505245", "CorpusId": 239016662}, "url": "https://www.semanticscholar.org/paper/a0b777b25cdf0fc992568ca52a5c7bebf1ee987f", "title": "Deep Transfer Learning & Beyond: Transformer Language Models in Information Systems Research", "abstract": "AI is widely thought to be poised to transform business, yet current perceptions of the scope of this transformation may be myopic. Recent progress in natural language processing involving transformer language models (TLMs) offers a potential avenue for AI-driven business and societal transformation that is beyond the scope of what most currently foresee. We review this recent progress as well as recent literature utilizing text mining in top IS journals to develop an outline for how future IS research can benefit from these new techniques. Our review of existing IS literature reveals that suboptimal text mining techniques are prevalent and that the more advanced TLMs could be applied to enhance and increase IS research involving text data, and to enable new IS research topics, thus creating more value for the research community. This is possible because these techniques make it easier to develop very powerful custom systems and their performance is superior to existing methods for a wide range of tasks and applications. Further, multilingual language models make possible higher quality text analytics for research in multiple languages. We also identify new avenues for IS research, like language user interfaces, that may offer even greater potential for future IS research.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 213, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-18", "journal": {"volume": "54", "pages": "1 - 35", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "7284628", "name": "Ross Gruetzemacher"}, {"authorId": "1740199", "name": "D. Paradice"}]}, {"paperId": "eb4cb63c65d0bb624f2fc366a594cb5cdc76d4e4", "externalIds": {"DBLP": "journals/es/AkhoonSASAAL22", "MAG": "3205656656", "DOI": "10.1111/exsy.12831", "CorpusId": 244611089}, "url": "https://www.semanticscholar.org/paper/eb4cb63c65d0bb624f2fc366a594cb5cdc76d4e4", "title": "High performance accelerators for deep neural networks: A review", "abstract": "The availability of huge structured and unstructured data, advanced highly dense memory and high performance computing machines have provided a strong push for the development in artificial intelligence (AI) and machine learning (ML) domains. AI and machine learning has rekindled the hope of efficiently solving complex problems which was not possible in the recent past. The generation and availability of big\u2010data is a strong driving force for the development of AI/ML applications, however, several challenges need to be addressed, like processing speed, memory requirement, high bandwidth, low latency memory access, and highly conductive and flexible connections between processing units and memory blocks. The conventional computing platforms are unable to address these issues with machine learning and AI. Deep neural networks (DNNs) are widely employed for machine learning and AI applications, like speech recognition, computer vison, robotics, and so forth, efficiently and accurately. However, accuracy is achieved at the cost of high computational complexity, sacrificing energy efficiency and throughput like performance measuring parameters along with high latency. To address the problems of latency, energy efficiency, complexity, power consumption, and so forth, a lot of state of the art DNN accelerators have been designed and implemented in the form of application specific integrated circuits (ASICs) and field programmable gate arrays (FPGAs). This work provides the state of the art of all these DNN accelerators which have been developed recently. Various DNN architectures, their computing units, emerging technologies used in improving the performance of DNN accelerators will be discussed. Finally, we will try to explore the scope for further improvement in these accelerator designs, various opportunities and challenges for the future research.", "venue": "Expert Syst. J. Knowl. Eng.", "year": 2021, "referenceCount": 79, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-11", "journal": {"volume": "39", "name": "Expert Systems"}, "authors": [{"authorId": "2142045426", "name": "Mohd Saqib Akhoon"}, {"authorId": "2612367", "name": "S. A. Suandi"}, {"authorId": "2069086624", "name": "Abdullah Alshahrani"}, {"authorId": "145184685", "name": "Abdul-Malik H. Y. Saad"}, {"authorId": "2519623", "name": "F. Albogamy"}, {"authorId": "2150362084", "name": "Mohd Zaid Bin Abdullah"}, {"authorId": "1691049", "name": "S. Loan"}]}, {"paperId": "3fb07e4a6a82306af506f06808837f2d974b7c14", "externalIds": {"DBLP": "journals/csur/TelikaniTBG22", "DOI": "10.1145/3467477", "CorpusId": 238260766}, "url": "https://www.semanticscholar.org/paper/3fb07e4a6a82306af506f06808837f2d974b7c14", "title": "Evolutionary Machine Learning: A Survey", "abstract": "Evolutionary Computation (EC) approaches are inspired by nature and solve optimization problems in a stochastic manner. They can offer a reliable and effective approach to address complex problems in real-world applications. EC algorithms have recently been used to improve the performance of Machine Learning (ML) models and the quality of their results. Evolutionary approaches can be used in all three parts of ML: preprocessing (e.g., feature selection and resampling), learning (e.g., parameter setting, membership functions, and neural network topology), and postprocessing (e.g., rule optimization, decision tree/support vectors pruning, and ensemble learning). This article investigates the role of EC algorithms in solving different ML challenges. We do not provide a comprehensive review of evolutionary ML approaches here; instead, we discuss how EC algorithms can contribute to ML by addressing conventional challenges of the artificial intelligence and ML communities. We look at the contributions of EC to ML in nine sub-fields: feature selection, resampling, classifiers, neural networks, reinforcement learning, clustering, association rule mining, and ensemble methods. For each category, we discuss evolutionary machine learning in terms of three aspects: problem formulation, search mechanisms, and fitness value computation. We also consider open issues and challenges that should be addressed in future work.", "venue": "ACM Comput. Surv.", "year": 2021, "referenceCount": 262, "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-04", "journal": {"volume": "54", "pages": "1 - 35", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "23317197", "name": "A. Telikani"}, {"authorId": "19234841", "name": "A. Tahmassebi"}, {"authorId": "2507766", "name": "W. Banzhaf"}, {"authorId": "1764455", "name": "A. Gandomi"}]}, {"paperId": "762cbb00d63b6eb3f429391e4c7fd016c636d195", "externalIds": {"DBLP": "journals/electronicmarkets/HornungS22", "MAG": "3199046025", "DOI": "10.1007/s12525-021-00493-0", "CorpusId": 240534646}, "url": "https://www.semanticscholar.org/paper/762cbb00d63b6eb3f429391e4c7fd016c636d195", "title": "AI invading the workplace: negative emotions towards the organizational use of personal virtual assistants", "abstract": null, "venue": "Electron. Mark.", "year": 2021, "referenceCount": 97, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-18", "journal": {"volume": "32", "pages": "123-138", "name": "Electron. Mark."}, "authors": [{"authorId": "11004408", "name": "Olivia Hornung"}, {"authorId": "1715753", "name": "Stefan Smolnik"}]}, {"paperId": "bb048b91adcc01b7c013a29f9716c3c07d947e98", "externalIds": {"DBLP": "journals/aiethics/Saetra22", "DOI": "10.1007/s43681-021-00092-x", "CorpusId": 248866393}, "url": "https://www.semanticscholar.org/paper/bb048b91adcc01b7c013a29f9716c3c07d947e98", "title": "Robotomorphy", "abstract": null, "venue": "AI Ethics", "year": 2021, "referenceCount": 103, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-04", "journal": {"volume": "2", "pages": "5-13", "name": "AI Ethics"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "234ce45f13244d28878a38d231f638382012cf74", "externalIds": {"DBLP": "journals/ijsr/GrassiRS22", "ArXiv": "2108.02174", "PubMedCentral": "8932468", "DOI": "10.1007/s12369-022-00868-z", "CorpusId": 236912590, "PubMed": "35341063"}, "url": "https://www.semanticscholar.org/paper/234ce45f13244d28878a38d231f638382012cf74", "title": "Knowledge-Grounded Dialogue Flow Management for Social Robots and Conversational Agents", "abstract": null, "venue": "Int. J. Soc. Robotics", "year": 2021, "referenceCount": 56, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-04", "journal": {"volume": "14", "pages": "1273 - 1293", "name": "International Journal of Social Robotics"}, "authors": [{"authorId": "1830764810", "name": "Lucrezia Grassi"}, {"authorId": "2688386", "name": "C. Recchiuto"}, {"authorId": "1761802", "name": "A. Sgorbissa"}]}, {"paperId": "9177582492b507db98392a187b8257ea8b2c80cd", "externalIds": {"ArXiv": "2106.11010", "MAG": "3161022871", "DBLP": "journals/corr/abs-2106-11010", "DOI": "10.1016/j.newast.2022.101850", "CorpusId": 235489922}, "url": "https://www.semanticscholar.org/paper/9177582492b507db98392a187b8257ea8b2c80cd", "title": "Three-body problem - from Newton to supercomputer plus machine learning", "abstract": null, "venue": "New Astronomy", "year": 2021, "referenceCount": 68, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": "abs/2106.11010", "name": "ArXiv"}, "authors": [{"authorId": "47076615", "name": "S. Liao"}, {"authorId": "2116432312", "name": "Xiaoming Li"}, {"authorId": "2124971289", "name": "Yu Yang"}]}, {"paperId": "389d9a31b7c221be63433d50dd9c8125cd8fb6f9", "externalIds": {"ArXiv": "2105.04642", "DBLP": "journals/ral/BanREWHKIMR22", "DOI": "10.1109/lra.2022.3156856", "CorpusId": 247304174}, "url": "https://www.semanticscholar.org/paper/389d9a31b7c221be63433d50dd9c8125cd8fb6f9", "title": "SUPR-GAN: SUrgical PRediction GAN for Event Anticipation in Laparoscopic and Robotic Surgery", "abstract": "Comprehension of surgical workflow is the foundation upon which artificial intelligence (AI) and machine learning (ML) holds the potential to assist intraoperative decision making and risk mitigation. In this work, we move beyond mere identification of past surgical phases, into prediction of future surgical steps and specification of the transitions between them. We use a novel Generative Adversarial Network (GAN) formulation to sample future surgical phases trajectories conditioned on past video frames from laparoscopic cholecystectomy (LC) videos and compare it to state-of-the-art approaches for surgical video analysis and alternative prediction methods. We demonstrate the GAN formulation\u2019s effectiveness through inferring and predicting the progress of LC videos. We quantify the horizon-accuracy trade-off and explored average performance, as well as the performance on the more challenging, and clinically relevant transitions between phases. Furthermore, we conduct a survey, asking 16 surgeons of different specialties and educational levels to qualitative evaluate predicted surgery phases.", "venue": "IEEE Robotics and Automation Letters", "year": 2021, "referenceCount": 64, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-10", "journal": {"volume": "7", "pages": "5741-5748", "name": "IEEE Robotics and Automation Letters"}, "authors": [{"authorId": "8422060", "name": "Yutong Ban"}, {"authorId": "2116952", "name": "G. Rosman"}, {"authorId": "2156583904", "name": "Jennifer A. Eckhoff"}, {"authorId": "144308911", "name": "Thomas M. Ward"}, {"authorId": "40564183", "name": "D. Hashimoto"}, {"authorId": "9411171", "name": "Taisei Kondo"}, {"authorId": "2068511", "name": "Hidekazu Iwaki"}, {"authorId": "11009166", "name": "O. Meireles"}, {"authorId": "145944286", "name": "D. Rus"}]}, {"paperId": "4d5247af0cc487ad70813893ef945d46b2a34c11", "externalIds": {"MAG": "3159574466", "DOI": "10.1086/715162", "CorpusId": 109936713}, "url": "https://www.semanticscholar.org/paper/4d5247af0cc487ad70813893ef945d46b2a34c11", "title": "Word Embeddings: What Works, What Doesn\u2019t, and How to Tell the Difference for Applied Research", "abstract": "Word embeddings are becoming popular for political science research, yet we know little about their properties and performance. To help scholars seeking to use these techniques, we explore the effects of key parameter choices\u2014including context window length, embedding vector dimensions, and pretrained versus locally fit variants\u2014on the efficiency and quality of inferences possible with these models. Reassuringly we show that results are generally robust to such choices for political corpora of various sizes and in various languages. Beyond reporting extensive technical findings, we provide a novel crowdsourced \u201cTuring test\u201d\u2013style method for examining the relative performance of any two models that produce substantive, text-based outputs. Our results are encouraging: popular, easily available pretrained embeddings perform at a level close to\u2014or surpassing\u2014both human coders and more complicated locally fit models. For completeness, we provide best practice advice for cases where local fitting is required.", "venue": "The Journal of Politics", "year": 2021, "referenceCount": 77, "citationCount": 39, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-06", "journal": {"volume": "84", "pages": "101 - 115", "name": "The Journal of Politics"}, "authors": [{"authorId": "2067975964", "name": "Pedro L. Rodriguez"}, {"authorId": "22267378", "name": "A. Spirling"}]}, {"paperId": "99095baae594e54b25eeb234efbf35b1242faf5f", "externalIds": {"DBLP": "journals/csur/DunneMH21", "MAG": "3159583069", "DOI": "10.1145/3447242", "CorpusId": 235507346}, "url": "https://www.semanticscholar.org/paper/99095baae594e54b25eeb234efbf35b1242faf5f", "title": "A Survey of Ambient Intelligence", "abstract": "Ambient Intelligence (AmI) is the application and embedding of artificial intelligence into everyday environments to seamlessly provide assistive and predictive support in a multitude of scenarios via an invisible user interface. These can be as diverse as autonomous vehicles, smart homes, industrial settings, and healthcare facilities\u2014referred to as Ambient Assistive Living. This survey gives an overview of the field; defines key terms; discusses social, cultural, and ethical issues; and outlines the state of the art in AmI technology, and where opportunities for further research exist. We guide the reader through AmI from its inception more than 20 years ago, focussing on the important topics and research achievements of the past 10 years since the last major survey, before finally detailing the most recents research trends and forecasting where this technology is likely to develop. This survey covers domains, use cases, scenarios, and datasets; cultural concerns and usability issues; security, privacy, and ethics; interaction and recognition; prediction and intelligence; and hardware, infrastructure, and mobile devices. This survey serves as an introduction for researchers and the technical layperson into the topic of AmI and identifies notable opportunities for further research.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 110, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-03", "journal": {"volume": "54", "pages": "1 - 27", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "116875611", "name": "R. Dunne"}, {"authorId": "2057160930", "name": "Tim Morris"}, {"authorId": "1749047", "name": "S. Harper"}]}, {"paperId": "bfdfd83ddcfa5763ef44895047c0e3ee90e28d85", "externalIds": {"DBLP": "journals/corr/abs-2104-13983", "ArXiv": "2104.13983", "DOI": "10.1145/3546790.3546806", "CorpusId": 233444269}, "url": "https://www.semanticscholar.org/paper/bfdfd83ddcfa5763ef44895047c0e3ee90e28d85", "title": "Neuromorphic Computing is Turing-Complete", "abstract": "Neuromorphic computing is a non-von Neumann computing paradigm that performs computation by emulating the human brain. Neuromorphic systems are extremely energy-efficient and known to consume thousands of times less power than CPUs and GPUs. They have the potential to drive critical use cases such as autonomous vehicles, edge computing and internet of things in the future. For this reason, they are sought to be an indispensable part of the future computing landscape. Neuromorphic systems are mainly used for spike-based machine learning applications, although there are some non-machine learning applications in graph theory, differential equations, and spike-based simulations. These applications suggest that neuromorphic computing might be capable of general-purpose computing. However, general-purpose computability of neuromorphic computing has not been established yet. In this work, we prove that neuromorphic computing is Turing-complete and therefore capable of general-purpose computing. Specifically, we present a model of neuromorphic computing, with just two neuron parameters (threshold and leak), and two synaptic parameters (weight and delay). We devise neuromorphic circuits for computing all the \u03bc-recursive functions (i.e., constant, successor and projection functions) and all the \u03bc-recursive operators (i.e., composition, primitive recursion and minimization operators). Given that the \u03bc-recursive functions and operators are precisely the ones that can be computed using a Turing machine, this work establishes the Turing-completeness of neuromorphic computing.", "venue": "ICONS", "year": 2021, "referenceCount": 57, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-04-28", "journal": {"name": "Proceedings of the International Conference on Neuromorphic Systems 2022"}, "authors": [{"authorId": "65805823", "name": "Prasanna Date"}, {"authorId": "2318902", "name": "Catherine D. Schuman"}, {"authorId": "40526428", "name": "Bill Kay"}, {"authorId": "1771895", "name": "T. Potok"}]}, {"paperId": "e470e002ec39fad1dbf5df1bd9a8b9d55123ed42", "externalIds": {"DBLP": "journals/sqj/Bozic22", "MAG": "3157483947", "DOI": "10.1007/S11219-020-09544-9", "CorpusId": 235576295}, "url": "https://www.semanticscholar.org/paper/e470e002ec39fad1dbf5df1bd9a8b9d55123ed42", "title": "Ontology-based metamorphic testing for chatbots", "abstract": null, "venue": "Softw. Qual. J.", "year": 2021, "referenceCount": 43, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-27", "journal": {"volume": "30", "pages": "227-251", "name": "Software Quality Journal"}, "authors": [{"authorId": "40610638", "name": "Josip Bozic"}]}, {"paperId": "1275ebd9a5596053460d2d73793ccc648249f7e5", "externalIds": {"MAG": "3162982177", "DBLP": "journals/corr/abs-2106-15515", "ArXiv": "2106.15515", "DOI": "10.31234/OSF.IO/3ZBNJ", "CorpusId": 235669795}, "url": "https://www.semanticscholar.org/paper/1275ebd9a5596053460d2d73793ccc648249f7e5", "title": "What Is Consciousness? Artificial Intelligence, Real Intelligence, Quantum Mind, And Qualia", "abstract": "We approach the question \"What is Consciousness?\" in a new way, not as Descartes' \"systematic doubt\", but as how organisms find their way in their world. Finding one's way involves finding possible uses of features of the world that might be beneficial or avoiding those that might be harmful. \"Possible uses of X to accomplish Y\" are \"Affordances\". The number of uses of X is indefinite (or unknown), the different uses are unordered and are not deducible from one another. All biological adaptations are either affordances seized by heritable variation and selection or, far faster, by the organism acting in its world finding uses of X to accomplish Y. Based on this, we reach rather astonishing conclusions: (1) Artificial General Intelligence based on Universal Turing Machines (UTMs) is not possible, since UTMs cannot \"find\" novel affordances. (2) Brain-mind is not purely classical physics for no classical physics system can be an analogue computer whose dynamical behavior can be isomorphic to \"possible uses\". (3) Brain mind must be partly quantum - supported by increasing evidence at 6.0 sigma to 7.3 Sigma. (4) Based on Heisenberg's interpretation of the quantum state as \"Potentia\" converted to \"Actuals\" by Measurement, a natural hypothesis is that mind actualizes Potentia. This is supported at 5.2 Sigma. Then Mind's actualizations of entangled brain-mind-world states are experienced as qualia and allow \"seeing\" or \"perceiving\" of uses of X to accomplish Y. We can and do jury-rig. Computers cannot. (5) Beyond familiar quantum computers, we discuss the potentialities of Trans-Turing-Systems.", "venue": "Biological Journal of the Linnean Society", "year": 2021, "referenceCount": 91, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-12", "journal": {"volume": "abs/2106.15515", "name": "ArXiv"}, "authors": [{"authorId": "143980023", "name": "S. Kauffman"}, {"authorId": "1763293", "name": "A. Roli"}]}, {"paperId": "b55e863998f1adcdfe578ca975ef82e917ae52dd", "externalIds": {"PubMedCentral": "9172850", "MAG": "3164172061", "DOI": "10.3389/fpsyg.2022.711821", "CorpusId": 236761493, "PubMed": "35686061"}, "url": "https://www.semanticscholar.org/paper/b55e863998f1adcdfe578ca975ef82e917ae52dd", "title": "Direct Human-AI Comparison in the Animal-AI Environment", "abstract": "Artificial Intelligence is making rapid and remarkable progress in the development of more sophisticated and powerful systems. However, the acknowledgement of several problems with modern machine learning approaches has prompted a shift in AI benchmarking away from task-oriented testing (such as Chess and Go) towards ability-oriented testing, in which AI systems are tested on their capacity to solve certain kinds of novel problems. The Animal-AI Environment is one such benchmark which aims to apply the ability-oriented testing used in comparative psychology to AI systems. Here, we present the first direct human-AI comparison in the Animal-AI Environment, using children aged 6\u201310 (n\u2009=\u200952). We found that children of all ages were significantly better than a sample of 30 AIs across most of the tests we examined, as well as performing significantly better than the two top-scoring AIs, \u201cironbar\u201d and \u201cTrrrrr,\u201d from the Animal-AI Olympics Competition 2019. While children and AIs performed similarly on basic navigational tasks, AIs performed significantly worse in more complex cognitive tests, including detour tasks, spatial elimination tasks, and object permanence tasks, indicating that AIs lack several cognitive abilities that children aged 6\u201310 possess. Both children and AIs performed poorly on tool-use tasks, suggesting that these tests are challenging for both biological and non-biological machines.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 114, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-18", "journal": {"volume": "13", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "1397160953", "name": "Konstantinos Voudouris"}, {"authorId": "143966629", "name": "Matthew Crosby"}, {"authorId": "102928633", "name": "Benjamin Beyret"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}, {"authorId": "1757629", "name": "M. Shanahan"}, {"authorId": "4626726", "name": "Marta Halina"}, {"authorId": "6643500", "name": "L. Cheke"}]}, {"paperId": "0f4de1e516adb5292bd88faa9a37aded919f424d", "externalIds": {"DBLP": "journals/corr/abs-2210-15098", "ArXiv": "2210.15098", "MAG": "3161874663", "DOI": "10.31234/OSF.IO/R3FCX", "CorpusId": 236757803}, "url": "https://www.semanticscholar.org/paper/0f4de1e516adb5292bd88faa9a37aded919f424d", "title": "Natural Language Syntax Complies with the Free-Energy Principle", "abstract": "Natural language syntax yields an unbounded array of hierarchically structured expressions. We claim that these are used in the service of active inference in accord with the free-energy principle (FEP). While conceptual advances alongside modelling and simulation work have attempted to connect speech segmentation and linguistic communication with the FEP, we extend this program to the underlying computations responsible for generating elementary syntactic objects. We argue that recently proposed principles of economy in language design\u2014such as \u201cminimal search\u201d and \u201cleast effort\u201d criteria from theoretical syntax\u2014adhere to the FEP. This permits a greater degree of explanatory power to the FEP\u2014with respect to higher language functions\u2014and presents linguists with a grounding in first principles of notions pertaining to computability. More generally, we explore the possibility of migrating certain topics in linguistics over to the domain of fields that investigate the FEP, such as complex polysemy. We aim to align concerns of linguists with the normative model for organic self-organisation associated with the FEP, marshalling evidence from theoretical linguistics and psycholinguistics to ground core principles of efficient syntactic computation within active inference.", "venue": "ArXiv", "year": 2021, "referenceCount": 215, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-11", "journal": {"volume": "abs/2210.15098", "name": "ArXiv"}, "authors": [{"authorId": "5925649", "name": "Elliot Murphy"}, {"authorId": "145448258", "name": "E. Holmes"}, {"authorId": "70438543", "name": "K. Friston"}]}, {"paperId": "9e9816d1c6bec2f4fd2a5c21680d39a660bdfb96", "externalIds": {"DBLP": "journals/ais/Wojtczak22", "MAG": "3131164195", "DOI": "10.1007/S00146-021-01147-7", "CorpusId": 233965401}, "url": "https://www.semanticscholar.org/paper/9e9816d1c6bec2f4fd2a5c21680d39a660bdfb96", "title": "Endowing Artificial Intelligence with legal subjectivity", "abstract": null, "venue": "AI Soc.", "year": 2021, "referenceCount": 64, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-16", "journal": {"volume": "37", "pages": "205-213", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2089470251", "name": "Sylwia Wojtczak"}]}, {"paperId": "31390c81909c7409d89c4d8ebc6def3a392458fa", "externalIds": {"DBLP": "journals/csur/WangSW21", "DOI": "10.1145/3439723", "CorpusId": 233354141}, "url": "https://www.semanticscholar.org/paper/31390c81909c7409d89c4d8ebc6def3a392458fa", "title": "Generative Adversarial Networks in Computer Vision", "abstract": "Generative adversarial networks (GANs) have been extensively studied in the past few years. Arguably their most significant impact has been in the area of computer vision where great advances have been made in challenges such as plausible image generation, image-to-image translation, facial attribute manipulation, and similar domains. Despite the significant successes achieved to date, applying GANs to real-world problems still poses significant challenges, three of which we focus on here. These are as follows: (1) the generation of high quality images, (2) diversity of image generation, and (3) stabilizing training. Focusing on the degree to which popular GAN technologies have made progress against these challenges, we provide a detailed review of the state-of-the-art in GAN-related research in the published scientific literature. We further structure this review through a convenient taxonomy we have adopted based on variations in GAN architectures and loss functions. While several reviews for GANs have been presented to date, none have considered the status of this field based on their progress toward addressing practical challenges relevant to computer vision. Accordingly, we review and critically discuss the most popular architecture-variant, and loss-variant GANs, for tackling these challenges. Our objective is to provide an overview as well as a critical analysis of the status of GAN research in terms of relevant progress toward critical computer vision application requirements. As we do this we also discuss the most compelling applications in computer vision in which GANs have demonstrated considerable success along with some suggestions for future research directions. Codes related to the GAN-variants studied in this work is summarized on https://github.com/sheqi/GAN_Review.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 143, "citationCount": 24, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-09", "journal": {"volume": "54", "pages": "1 - 38", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "2145911462", "name": "Zhengwei Wang"}, {"authorId": "1486411393", "name": "Qi She"}, {"authorId": "145950787", "name": "T. Ward"}]}, {"paperId": "bb3a478fb2470216f4606a973f5acc5481f2555d", "externalIds": {"ArXiv": "2011.14709", "DBLP": "journals/corr/abs-2011-14709", "MAG": "3106792675", "DOI": "10.1364/OPTICA.455864", "CorpusId": 227228057}, "url": "https://www.semanticscholar.org/paper/bb3a478fb2470216f4606a973f5acc5481f2555d", "title": "Monadic Pavlovian associative learning in a backpropagation-free photonic network", "abstract": "Over a century ago, Ivan P. Pavlov, in a classic experiment, demonstrated how dogs can learn to associate a ringing bell with food, thereby causing a ring to result in salivation. Today, however, it is rare to find the use of Pavlovian type associative learning for artificial intelligence (AI) applications. Instead, other biologically-inspired learning concepts, in particular artificial neural networks (ANNs) have flourished, yielding extensive impact on a wide range of fields including finance, healthcare and transportation. However, learning in such \"conventional\" ANNs, in particular in the form of modern deep neural networks (DNNs) are usually carried out using the backpropagation method, is computationally and energy intensive. Here we report the experimental demonstration of backpropagation-free learning, achieved using a single (or monadic) associative hardware element. This is realized on an integrated photonic platform using phase change materials combined with on-chip cascaded directional couplers. We link associative learning with supervised learning, based on their common goal of associating certain inputs with \"correct\" outputs. We then expand the concept to develop larger-scale supervised learning networks using our monadic Pavlovian photonic hardware, developing a distinct machine-learning framework based on single-element associations and, importantly, using backpropagation-free single-layer weight architectures to approach general learning tasks. Our approach not only significantly reduces the computational burden imposed by learning in conventional neural network approaches, thereby increasing speed and decreasing energy use during learning, but also offers higher bandwidth inherent to a photonic implementation, paving the way for future deployment of fast photonic artificially intelligent machines.", "venue": "Optica", "year": 2020, "referenceCount": 56, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-30", "journal": {"volume": "abs/2011.14709", "name": "ArXiv"}, "authors": [{"authorId": "2110399608", "name": "J. Tan"}, {"authorId": "2148766464", "name": "Zengguang Cheng"}, {"authorId": "2108263641", "name": "Xuan Li"}, {"authorId": "9190180", "name": "N. Youngblood"}, {"authorId": "2060910403", "name": "U. E. Ali"}, {"authorId": "51032756", "name": "C. Wright"}, {"authorId": "144372362", "name": "W. Pernice"}, {"authorId": "1771881", "name": "H. Bhaskaran"}]}, {"paperId": "1376ba69c87b609792779def693c7ee355129726", "externalIds": {"DBLP": "journals/jair/CropperD22", "ArXiv": "2008.07912", "MAG": "3065734471", "DOI": "10.1613/jair.1.13507", "CorpusId": 221150950}, "url": "https://www.semanticscholar.org/paper/1376ba69c87b609792779def693c7ee355129726", "title": "Inductive logic programming at 30: a new introduction", "abstract": "Inductive logic programming (ILP) is a form of machine learning. The goal of ILP is to induce a hypothesis (a set of logical rules) that generalises training examples. As ILP turns 30, we provide a new introduction to the field. We introduce the necessary logical notation and the main learning settings; describe the building blocks of an ILP system; compare several systems on several dimensions; describe four systems (Aleph, TILDE, ASPAL, and Metagol); highlight key application areas; and, finally, summarise current limitations and directions for future research.", "venue": "Journal of Artificial Intelligence Research", "year": 2020, "referenceCount": 273, "citationCount": 24, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-08-18", "journal": {"volume": "74", "pages": "765-850", "name": "J. Artif. Intell. Res."}, "authors": [{"authorId": "1986234", "name": "Andrew Cropper"}, {"authorId": "3422854", "name": "Sebastijan Dumancic"}]}, {"paperId": "0bcba372dcde81a6d92fc2c9118e6a2664e51ba4", "externalIds": {"DBLP": "journals/corr/abs-2005-00890", "MAG": "3021390590", "ArXiv": "2005.00890", "DOI": "10.1016/j.patcog.2022.108643", "CorpusId": 218487556}, "url": "https://www.semanticscholar.org/paper/0bcba372dcde81a6d92fc2c9118e6a2664e51ba4", "title": "BeCAPTCHA-Mouse: Synthetic Mouse Trajectories and Improved Bot Detection", "abstract": null, "venue": "Pattern Recognit.", "year": 2020, "referenceCount": 51, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-05-02", "journal": {"volume": "127", "pages": "108643", "name": "Pattern Recognit."}, "authors": [{"authorId": "41202648", "name": "A. Acien"}, {"authorId": "144083995", "name": "A. Morales"}, {"authorId": "1701431", "name": "Julian Fierrez"}, {"authorId": "1402712530", "name": "R. Vera-Rodr\u00edguez"}]}, {"paperId": "4282f9436a581f217874ce90adf80824ab2f6c85", "externalIds": {"MAG": "3010780363", "DBLP": "journals/tcyb/ChenDXYF22", "DOI": "10.1109/TCYB.2020.2977602", "CorpusId": 214591471, "PubMed": "32191906"}, "url": "https://www.semanticscholar.org/paper/4282f9436a581f217874ce90adf80824ab2f6c85", "title": "A Unifying Framework for Human\u2013Agent Collaborative Systems\u2014Part I: Element and Relation Analysis", "abstract": "The human\u2013agent collaboration (HAC) is a prospective research topic whose great applications and future scenarios have attracted vast attention. In a broad sense, the HAC system (HACS) can be broken down into six elements: \u201cMan,\u201d \u201cAgents,\u201d \u201cGoal,\u201d \u201cNetwork,\u201d \u201cEnvironment,\u201d and \u201cTasks.\u201d By merging these elements and building a relation graph, this article proposes a systematic analysis framework for HACS, and attempts to make a comprehensive analysis of these elements and their relationships. We coin the abbreviation \u201cMAGNET\u201d to name the framework by stringing together the initials of the above six terms. The framework provides novel insights into analyzing various HAC patterns and integrates different types of HACSs in a unifying way. The presentation of the HACS framework is divided into two parts. This article, part I, presents the systematic analysis framework. Part II proposes a normalized two-stage top-level design procedure for designing an HACS from the perspective of MAGNET.", "venue": "IEEE Transactions on Cybernetics", "year": 2020, "referenceCount": 85, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-03-18", "journal": {"volume": "52", "pages": "138-151", "name": "IEEE Transactions on Cybernetics"}, "authors": [{"authorId": "40663520", "name": "Jie Chen"}, {"authorId": "7625445", "name": "Yulong Ding"}, {"authorId": "50559191", "name": "Bin Xin"}, {"authorId": "50514034", "name": "Qingkai Yang"}, {"authorId": "40199742", "name": "H. Fang"}]}, {"paperId": "556590e25f5f741af1d1030c7d031cc3c47d2418", "externalIds": {"ArXiv": "2001.06988", "MAG": "3162152729", "DOI": "10.1101/2021.05.10.443518", "CorpusId": 234487785}, "url": "https://www.semanticscholar.org/paper/556590e25f5f741af1d1030c7d031cc3c47d2418", "title": "Deep learning generates custom-made logistic regression models for explaining how breast cancer subtypes are classified", "abstract": "Differentiating the intrinsic subtypes of breast cancer is crucial for deciding the best treatment strategy. Deep learning can predict the subtypes from genetic information more accurately than conventional statistical methods, but to date, deep learning has not been directly utilized to examine which genes are associated with which subtypes. To clarify the mechanisms embedded in the intrinsic subtypes, we developed an explainable deep learning model called a point-wise linear (PWL) model that generates a custom-made logistic regression for each patient. Logistic regression, which is familiar to both physicians and medical informatics researchers, allows us to analyze the importance of the feature variables, and the PWL model harnesses these practical abilities of logistic regression. In this study, we show that analyzing breast cancer subtypes is clinically beneficial for patients and one of the best ways to validate the capability of the PWL model. First, we trained the PWL model with RNA-seq data to predict PAM50 intrinsic subtypes and applied it to the 41/50 genes of PAM50 through the subtype prediction task. Second, we developed a deep enrichment analysis method to reveal the relationships between the PAM50 subtypes and the copy numbers of breast cancer. Our findings showed that the PWL model utilized genes relevant to the cell cycle-related pathways. These preliminary successes in breast cancer subtype analysis demonstrate the potential of our analysis strategy to clarify the mechanisms underlying breast cancer and improve overall clinical outcomes.", "venue": "bioRxiv", "year": 2020, "referenceCount": 71, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-01-20", "journal": {"name": "bioRxiv"}, "authors": [{"authorId": "2058314869", "name": "Takuma Shibahara"}, {"authorId": "80452935", "name": "Chisa Wada"}, {"authorId": "2071625961", "name": "Yasuho Yamashita"}, {"authorId": "2072409098", "name": "Kazuhiro A Fujita"}, {"authorId": "2111956907", "name": "Masamichi Sato"}, {"authorId": "1490483625", "name": "Junichi Kuwata"}, {"authorId": "2060267921", "name": "Atsushi Okamoto"}, {"authorId": "2052827881", "name": "Yoshimasa Ono"}]}, {"paperId": "b431d8163d7c12637705f7fd534eaf7de2c33151", "externalIds": {"ArXiv": "1910.09134", "DBLP": "conf/cvpr/0001YRY22", "DOI": "10.1109/CVPRW56347.2022.00539", "CorpusId": 248240190}, "url": "https://www.semanticscholar.org/paper/b431d8163d7c12637705f7fd534eaf7de2c33151", "title": "Good, Better, Best: Textual Distractors Generation for Multiple-Choice Visual Question Answering via Reinforcement Learning", "abstract": "Multiple-choice VQA has drawn increasing attention from researchers and end-users recently. As the demand for automatically constructing large-scale multiple-choice VQA data grows, we introduce a novel task called textual Distractors Generation for VQA (DG-VQA) focusing on generating challenging yet meaningful distractors given the context image, question, and correct answer. The DG-VQA task aims at generating distractors without ground-truth training samples since such resources are rarely available. To tackle the DG-VQA unsupervisedly, we propose GOBBET, a reinforcement learning(RL) based framework that utilizes pre-trained VQA models as an alternative knowledge base to guide the distractor generation process. In GOBBET, a pre-trained VQA model serves as the environment in RL setting to provide feedback for the input multi-modal query, while a neural distractor generator serves as the agent to take actions accordingly. We propose to use existing VQA models\u2019 performance degradation as indicators of the quality of generated distractors. On the other hand, we show the utility of generated distractors through data augmentation experiments, since robustness is more and more important when AI models apply to unpredictable open-domain scenarios or security-sensitive applications. We further conduct a manual case study on the factors why distractors generated by GOBBET can fool existing models.", "venue": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "year": 2019, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2019-10-21", "journal": {"pages": "4917-4926", "name": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"}, "authors": [{"authorId": "2117727751", "name": "Jiaying Lu"}, {"authorId": "153031206", "name": "Xin Ye"}, {"authorId": "2115242596", "name": "Yi Ren"}, {"authorId": "1784500", "name": "Yezhou Yang"}]}, {"paperId": "6bea7ecf19bd9c823b2b4be05ed0a0ec81d0785b", "externalIds": {"DBLP": "journals/ai/Al-OmariLHC22", "MAG": "2775703036", "DOI": "10.1016/j.artint.2021.103637", "CorpusId": 67096292}, "url": "https://www.semanticscholar.org/paper/6bea7ecf19bd9c823b2b4be05ed0a0ec81d0785b", "title": "Joint perceptual learning and natural language acquisition for autonomous robots", "abstract": null, "venue": "Artif. Intell.", "year": 2017, "referenceCount": 144, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2017-08-01", "journal": {"volume": "303", "pages": "103637", "name": "Artif. Intell."}, "authors": [{"authorId": "122547040", "name": "Muhannad Al-Omari"}]}, {"paperId": "bcbd8c3947cfb5e323c20a949501ce84f3e0d41f", "externalIds": {"CorpusId": 249126675}, "url": "https://www.semanticscholar.org/paper/bcbd8c3947cfb5e323c20a949501ce84f3e0d41f", "title": "6G and Machine Learning for Industry", "abstract": "This book is the product of a one-semester course called Seminar Machine Intelligence which was held in the winter term 21/22 at the Technical University Munich. The purpose of the course was to study the intersection between Machine Intelligence and 6G telecommunication technology and outline possible future trends in this domain. Nowadays, not only researchers are enthusiastic about the topic of machine intelligence but also a widespread public. More and more longstanding problems in manifold areas such as natural language and computer vision become tractable, it is evident that machine intelligence as technology will play a crucial role in society, industry, and the environment in the foreseeable future. As we shall expect major changes, we asked ourselves the question: \u201dTo what extent do a higher data availability, larger data throughput, and an increased diversity of connected devices a\ufb00ect the future of machine intelligence?\u201d The students participating in the seminar tried to discuss exactly this question in the winter term 21/22. The students examined the status quo of machine learning methods in the context of 6G and give insights into \ufb01elds such as federated learning and generalization as well as their applications and the impact on the industry. Current trends are analyzed and projected into the future, which targets the question of how machine intelligence will be a\ufb00ected by the future of 6G. Abstract 6G and Machine Learning (ML) are two important pillars supporting the development of many technology trends in the industry. The exponentially growing number of devices will require 6G networks for more e\ufb03cient and reliable data exchanges. In addition, intelligent data processing, supported by machine learning, will provide new insights for improved industry practices. The industry of the future will be shaped by the integration of multiple technology trends. This report focuses on four industry trends that are expected to emerge or be enhanced by the combined use of 6G and ML: Edge Computing, Collaborative Robots, Digital Twins, and Augmented and Virtual Reality. We start the analysis with the key facts about each trend and then proceed to analyse each trend in terms of its key drivers, challenges and overall impact on the industry. Fi-nally, we compare these four trends and assess their relationship to each other. For this purpose, we use a driver matrix with the features\u2019 uncertainty and potential impact. Based on its maturity and its role in enabling and extending existing technologies, we concluded that Edge Computing will have the greatest impact and the least uncertainty in terms of its applicability in the industry. Abstract Since the world is becoming more connected, Internet users are subconsciously feeding the network with a tremendous amount of data. Meanwhile, many researchers and institutions are concerned and calling for more protection of sensitive data circulating in the network. For instance, the traditional centralized approach for training Arti\ufb01cial Intelligence (AI) models faces major challenges related to e\ufb03ciency and security. On one side modern communication industry is looking for way to process and distribute sensitive data across the network, on the other hand maintaining a high level of security and data streaming is also essential to achieve our goal. Lately, a new Machine Learning (ML) distributed approach is considered to be a promising solution to empower and integrate safely AI in 6G, which is Federated Learning (FL). FL is a distributed AI approach that provides data, solution functions, and training models in heterogeneous and large-scale networks. In this report, we start with some facts about e\ufb00ective communication in federated learning. Then, we give four trends as a vision of how FL will impact the future network with respect to sensitive data. We review some methods for ensuring fairness and addressing sources of bias. Next, we use the healthcare system as a source of sensitive data and see how it is represented in data-driven models. Finally, we see how the costs of Abstract What is Love? That question is still to be answered by R.E.M. Pun aside, humanity as a whole places an increasingly high hope into the bene\ufb01cial use of AI to solve arbitrary problems. This is largely promoted by the positive impact many people experience in their lives on a daily basis: smoke-detectors, image quality enhancement and chess training software may be some of the examples that might come to one\u2019s mind. Current-era communication technology on the other hand largely relies on conventional approaches. This trend report sets out to uncover the role Generalization could play to pave the way for AI in the emerging communication standard 6G. As we will show, Generalization might be looming closer on the horizon than expected, could have direct access and impact on end-users and should strive to improve equitable technology access for everyone\u2014and everything. Abstract The motivation of approaching futuristic networks that combine an extreme high reliability with a signi\ufb01cant connection density as well as an extreme high data rate or capacity has been pushing the research in the telecommunication \ufb01eld ever since it came to existence. This ever-awaited goal is getting closer to being in the realm of possibilities as 6th Generation wireless technology has been gaining momentum recently. As it seems, the aforementioned premise of the 6G technology is not only bene\ufb01cial as a powerful structure for networking, but rather, and arguably more important, as infrastructure for more sophisticated applications that require an e\ufb03cient network at their core. In this trend report, we present trends based on a review of state-of-art available documenta-tion of the topic \u201cApplications for 6G\u201d. Furthermore, we incorporate our own research and assessment to closely examine the facts, key drivers and challenges of each trend mentioned. Eventually, a conclusion is made to shed light on the comparison of these trends by analysing the uncertainty and impact of each.", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": []}, {"paperId": "d4c822021a8cdab4ddf5482ce5a1cf6f1d66543c", "externalIds": {"DBLP": "journals/access/BellagardaA22", "DOI": "10.1109/ACCESS.2022.3173297", "CorpusId": 248684391}, "url": "https://www.semanticscholar.org/paper/d4c822021a8cdab4ddf5482ce5a1cf6f1d66543c", "title": "An Updated Survey on the Convergence of Distributed Ledger Technology and Artificial Intelligence: Current State, Major Challenges and Future Direction", "abstract": "In recent times, Artificial Intelligence (AI) and Distributed Ledger Technology (DLT) have become two of the most discussed sectors in Information Technology, with each having made a major impact. This has generated space for further innovation to occur in the convergence of the two technologies. In this paper, we gather, analyse, and present a detailed review of the convergence of AI and DLT in a vice versa manner. We review how AI is impacts DLT by focusing on AI-based consensus algorithms, smart contract security, selfish mining, decentralized coordination, DLT fairness, non-fungible tokens, decentralized finance, decentralized exchanges, decentralized autonomous organizations, and blockchain oracles. In terms of the impact DLT has on AI, the areas covered include AI data privacy, explainable AI, smart contract-based AIs, parachains, decentralized neural networks, Internet of Things, 5G technology and data markets, and sharing. Furthermore, we identify research gaps and discuss open research challenges in developing future directions.", "venue": "IEEE Access", "year": 2022, "referenceCount": 126, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "10", "pages": "50774-50793", "name": "IEEE Access"}, "authors": [{"authorId": "1396411663", "name": "Jagger S. Bellagarda"}, {"authorId": "1403308610", "name": "A. Abu-Mahfouz"}]}, {"paperId": "36ad4998e7e958856a2a61b3dbb7a373641ba2a2", "externalIds": {"DBLP": "conf/eann/TheodoropoulosM22", "DOI": "10.1007/978-3-031-08223-8_30", "CorpusId": 247255971}, "url": "https://www.semanticscholar.org/paper/36ad4998e7e958856a2a61b3dbb7a373641ba2a2", "title": "Semantic Segmentation of Diabetic Retinopathy Lesions, Using a UNET with Pretrained Encoder", "abstract": null, "venue": "EANN", "year": 2022, "referenceCount": 100, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "361-371"}, "authors": [{"authorId": "2017470143", "name": "D. Theodoropoulos"}, {"authorId": "2079923", "name": "G. Manikis"}, {"authorId": "2629216", "name": "K. Marias"}, {"authorId": "2176144", "name": "G. Papadourakis"}]}, {"paperId": "883a211453bd81a3859e1ef7e8047bf9592320ea", "externalIds": {"CorpusId": 248673760}, "url": "https://www.semanticscholar.org/paper/883a211453bd81a3859e1ef7e8047bf9592320ea", "title": "Reaching out for the Answer: Answer Type Prediction", "abstract": ". Natural language is complex and similar statements can be expressed in various ways. Therefore, understanding natural language is an ongoing challenge in the \ufb01eld of Question Answering. To make the process from the question to the answer, the QA pipeline can be broken down to several sub-steps, as e.g. prediction of the potential type of the answer, entity linking and detection of references for properties relevant for the formal query. The SMART Task challenge, co-located with ISWC 2021, focussed on two of these sub-tasks: relation linking and answer type prediction. With this paper, we present our approach for the latter task. Our solution is a two-staged process combining two separate multi-label classi\ufb01cation tasks. For the answer category prediction, we utilize the RoBERTa language model. Questions predicted as resource questions are then further classi\ufb01ed regarding the concrete answer types \u2013 a list of ontology classes \u2013 utilizing the BERT language model.", "venue": "", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2164777052", "name": "Kanchan Shivashankar"}, {"authorId": "2164777390", "name": "Khaoula Benmaarouf"}, {"authorId": "35161972", "name": "Nadine Steinmetz"}]}, {"paperId": "1effb7e6e8cf690072b328d587046054e9fa0f50", "externalIds": {"CorpusId": 248372639}, "url": "https://www.semanticscholar.org/paper/1effb7e6e8cf690072b328d587046054e9fa0f50", "title": "Can machines think? The controversy that led to the Turing test", "abstract": "Turing\u2019s much debated test has turned 70 and is still fairly controversial. His 1950 paper is seen as a complex and multilayered text, and key questions about it remain largely unanswered. Why did Turing select learning from experience as the best approach to achieve machine intelligence? Why did he spend several years working with chess-playing as a task to illustrate and test for machine intelligence only to trade it out for conversational question-answering in 1950? Why did Turing refer to gender imitation in a test for machine intelligence? In this article, I shall address these questions by unveiling social, historical and epistemological roots of the so-called Turing test. I will draw attention to a historical fact that has been only scarcely observed in the secondary literature thus far, namely, that Turing's 1950 test emerged out of a controversy over the cognitive capabilities of digital computers, most notably out of debates with physicist and computer pioneer Douglas Hartree, chemist and philosopher Michael Polanyi, and neurosurgeon Geoffrey Jefferson. Seen in its historical context, Turing\u2019s 1950 paper can be understood as essentially a reply to a series of challenges posed to him by these thinkers arguing against his view that machines can think. Turing did propose gender learning and imitation as one of his various imitation tests for machine intelligence, and I argue here that this was done in response to Jefferson's suggestion that gendered behavior is causally related to the physiology of sex hormones.", "venue": "", "year": 2022, "referenceCount": 54, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, {"paperId": "dbe4c5294a7334820f6b4524154bafd41d60c534", "externalIds": {"CorpusId": 247570160}, "url": "https://www.semanticscholar.org/paper/dbe4c5294a7334820f6b4524154bafd41d60c534", "title": "VISUAL REASONING MODELS", "abstract": "How can we measure the reasoning capabilities of intelligence systems? Visual question answering provides a convenient framework for testing the model\u2019s abilities by interrogating the model through questions about the scene. However, despite scores of various visual QA datasets and architectures, which sometimes yield even a super-human performance, the question of whether those architectures can actually reason remains open to debate. To answer this, we extend the visual question answering framework and propose the following behavioral test in the form of a two-player game. We consider black-box neural models of CLEVR. These models are trained on a diagnostic dataset benchmarking reasoning. Next, we train an adversarial player that re-configures the scene to fool the CLEVR model. We show that CLEVR models, which otherwise could perform at a \u201chuman level\u201d, can easily be fooled by our agent. Our results put in doubt whether data-driven approaches can do reasoning without exploiting the numerous biases that are often present in those datasets. Finally, we also propose a controlled experiment measuring the efficiency of such models to learn and perform reasoning.", "venue": "", "year": 2022, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "148099243", "name": "Spyridon Mouselinos"}, {"authorId": "47407464", "name": "H. Michalewski"}]}, {"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "externalIds": {"CorpusId": 251848799}, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "title": "Dystopian or Utopian? Two Images of Alan Turing", "abstract": "Turing made intriguing statements about the future of arti\ufb01cial intelligence (AI) in society. He predicted that machines would eventually \u2018compete with men in all purely intellectual \ufb01elds,\u2019 and added that at some stage they could be expected \u2018to take control.\u2019 Turing has been associated by his biographer, Andrew Hodges, with Dr. Frankenstein from Mary Shelley\u2019s dystopian novel. However, he has also been described by his contemporary Geoffrey Jefferson as a \u2018scienti\ufb01c\u2019 Percy B. Shelley, the English Romantic poet who was posthumously championed as a utopian and radical thinker. This article then asks: in what way did Turing envision a society permeated with intelligent machines? Did he see it as a utopia or a dystopia? These questions are thoroughly examined using Turing\u2019s own texts and related sources. This study reconstructs Turing\u2019s historical context in postwar England and analyzes his irony and sense of humor, as well as the in\ufb02uence of Samuel Butler on his vision. Contrary to recent views in AI science and \ufb01ction, on the one hand, a mismatch is shown between Turing and the incautious Frankenstein; on the other hand, Turing\u2019s radical Shelley-like qualities are substantiated. The article shows that Turing\u2019s utopianism entrusted intelligent machines with the task of teaching lessons of rationality and intellectual integrity over our place in nature and prejudices. Further, Turing\u2019s irony is shown to have targeted intellectuals who sacri\ufb01ce independent thinking to retain their power. These, he hoped, would be eventually rivaled and surpassed by intelligent machines.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "011f3317c97090bcb536645bbe17c5ee93a2977a", "externalIds": {"DOI": "10.32855/fcapital.202201.010", "CorpusId": 253621528}, "url": "https://www.semanticscholar.org/paper/011f3317c97090bcb536645bbe17c5ee93a2977a", "title": "Learning Management Systems as Anti-Convivial Tools", "abstract": "The last two decades have seen an increase in the number of online university classes operating under any of several commercial Learning Management Systems (LMS). Online classes expanded dramatically in the US during 2020 as a response to the COVID-19 pandemic. Students, faculty, and administrators frequently assume that LMSs are epistemologically neutral. These LMSs are designed to do exactly what they say on the tin: they are systems for managing learning. At the same time, they function based on implicit understandings of \u201clearning,\u201d \u201cmanagement,\u201d and \u201csystems\u201d that privilege some knowledges, interactions, and discourses while de-emphasizing others. In this paper I argue that the LMS as a tool is not\u2014in the terms of Ivan Illich\u2014convivial. Rather, LMSs as designed enforce a technocratic perspective based on efficiency and replicability, making them actively anti-convivial. At the same time, problems with LMS-hosted classes are defined in technological terms, with additional improved software being seen as the main solution. I argue that employing a critical participatory pedagogy can begin to address these concerns.", "venue": "Fast Capitalism", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Fast Capitalism"}, "authors": [{"authorId": "67034751", "name": "Edward M. Maclin"}]}, {"paperId": "230e6ee6ed2e9b26efebbc632eb3467c9ac7b833", "externalIds": {"DOI": "10.1590/1678-6971/eramd220003.en", "CorpusId": 253485009}, "url": "https://www.semanticscholar.org/paper/230e6ee6ed2e9b26efebbc632eb3467c9ac7b833", "title": "Customer satisfaction in service delivery with artificial intelligence: A meta-analytic study", "abstract": "ABSTRACT Purpose: This study intends to identify the main background and consequent constructs that form consumer satisfaction in providing services using artificial intelligence (AI) and their magnitudes. Originality/value: This work seeks to fill a gap arising from the scarcity of meta-analytic research on service delivery with AI and also its relationship to consumer satisfaction. Design/methodology/approach: The study adopted the meta-analytic method, and its development followed three phases: 1. research; 2. collection; and 3. coding and data analysis. We analyzed 19 articles published in journals of international relevance from January 2000 to December 2020, present on the Web of Science and Science Direct platforms, totaling 128 observations and 28 topic-related. Findings: Five background constructs and one consequent construct were identified, from which an integrated model was built to illustrate the relationships between consumer satisfaction in intelligent services. The results show that consumer satisfaction in the provision of services is significantly correlated to the adoption of artificial intelligence. Then, the integrated quantitative evaluation that was performed in this study aims to contribute to future empirical evidence in such a way that an increase in the scope of studies on artificial intelligence and consumer satisfaction occurs, based on the analysis of the following constructs: perceived value, perceived features, perception of quality, marketing orientation, identification with the service and behavior of using AI in services.", "venue": "RAM. Revista de Administra\u00e7\u00e3o Mackenzie", "year": 2022, "referenceCount": 61, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "RAM. Revista de Administra\u00e7\u00e3o Mackenzie"}, "authors": [{"authorId": "2190624804", "name": "Laura M. Aguiar-Costa"}, {"authorId": "2190626573", "name": "Carlos A. X. C. Cunha"}, {"authorId": "2068960764", "name": "Wallysson K. M. Silva"}, {"authorId": "2067474648", "name": "N. R. Abreu"}]}, {"paperId": "15b343246a691acd26f450bbde25f601f85bea14", "externalIds": {"DBLP": "conf/staf/Zaytsev22", "CorpusId": 253270049}, "url": "https://www.semanticscholar.org/paper/15b343246a691acd26f450bbde25f601f85bea14", "title": "Speak Well or Be Still: Solving Conversational AI with Weighted Attribute Grammars (Poster)", "abstract": "There is a growing need to specify models of possible conversations with non-human entities. Such models have a difficult task to set the bar for correctness yet tolerate conversations with only partial conformance to it, and accommodate computations that non-human entities perform during the conversation on several possibly independent emergent models with unrelated flows of information in them. As it turns out, this is possible to specify formally in a fairly concise way with weighted attribute grammars [6]. In this paper, a variant of those is presented, called WAGIoT , that combines the power of analytic, generative, attribute, weighted and probabilistic grammars in one DSML.", "venue": "STAF Workshops", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": "145543743", "name": "V. Zaytsev"}]}, {"paperId": "f367ce68505e01d0452fe4be113e27f7a98c9d6d", "externalIds": {"CorpusId": 253124864}, "url": "https://www.semanticscholar.org/paper/f367ce68505e01d0452fe4be113e27f7a98c9d6d", "title": "LAD: Language Augmented Diffusion for Reinforcement Learning", "abstract": "Learning skills from language provides a powerful avenue for generalization in re- 1 inforcement learning, although it remains a challenging task as it requires agents 2 to capture the complex interdependencies between language, actions, and states. 3 In this paper, we propose leveraging L anguage A ugmented D iffusion models as a 4 planner conditioned on language (LAD). We demonstrate the comparable perfor- 5 mance of LAD with the state-of-the-art on the CALVIN language robotics bench- 6 mark with a much simpler architecture that contains no inductive biases special- 7 ized to robotics, achieving an average success rate (SR) of 72% compared to the 8 best performance of 76%. We also conduct an analysis on the properties of lan- 9 guage conditioned diffusion in reinforcement learning. 10", "venue": "", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2051714782", "name": "Pamela Mishkin"}]}, {"paperId": "bf416fe66e3111922eab46221f54e796b978e865", "externalIds": {"CorpusId": 252989966}, "url": "https://www.semanticscholar.org/paper/bf416fe66e3111922eab46221f54e796b978e865", "title": "Why Machines will Never Rule the World; Artificial Intelligence without Fear", "abstract": null, "venue": "", "year": 2022, "referenceCount": 507, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "120743060", "name": "J. Landgrebe"}, {"authorId": "2116986621", "name": "Barry Smith"}]}, {"paperId": "578324d7fad68e0269ea4d99369a55f36feb9d75", "externalIds": {"CorpusId": 252821445}, "url": "https://www.semanticscholar.org/paper/578324d7fad68e0269ea4d99369a55f36feb9d75", "title": "Polyse\u0300mes, 27 | 2022", "abstract": "This article examines Ian McEwan\u2019s 2005 novel Saturday through the prism of cinema and spectatorship. A watcher through windows, its protagonist Henry Perowne is a self-confessed spectator of other people\u2019s lives. Despite the neurosurgeon\u2019s attempts to remain a detached observer, however, the broader politics of the period and the tensions of urban life conspire to invade the private sphere of his \u201ccity square\u201d. We argue that such framing motifs create a tension between the unadulterated observation implied by the window\u2019s transparency and the organizational effects of the frame, a tension that is key to film theory and one of its core works, Alfred Hitchcock\u2019s Rear Window (1954). The paper also analyses the recurrent motifs of projection in the novel, as well as the analogies between visual perception and the display of images on a cinema screen, in the light of the novel\u2019s discourse on modernism and the representation of the consciousness. Finally, we examine the potentially liberatory effects of the filmic dynamic play of perspective and temporality on McEwan\u2019s writing and its visual qualities, and their connection to questions of focalization and omniscience in the novel. Cet article examine le roman Saturday (2005) d\u2019Ian McEwan \u00e0 travers le prisme du cin\u00e9ma et du r\u00f4le du spectateur. Souvent attir\u00e9 \u00e0 sa fen\u00eatre pour observer la ville, le protagoniste Henry Perowne est un spectateur de la vie des autres. Cependant, malgr\u00e9 les tentatives du neurochirurgien pour rester un observateur d\u00e9tach\u00e9, les crises politiques de l\u2019\u00e9poque et les tensions de la vie urbaine envahissent sa vie priv\u00e9e. Les strat\u00e9gies de cadrage cr\u00e9ent une tension entre l\u2019observation pure et simple impliqu\u00e9e par la transparence de la fen\u00eatre et les effets organisationnels du cadre, une tension qui est essentielle \u00e0 la th\u00e9orie du cin\u00e9ma et \u00e0 l\u2019une de ses \u0153uvres fondatrices, Rear Window d\u2019Alfred Hitchcock (1954). L\u2019article analyse \u00e9galement les dispositfs r\u00e9currents de projection dans le roman, ainsi que les analogies entre la perception visuelle et l\u2019affichage d\u2019images sur un \u00e9cran, \u00e0 la lumi\u00e8re du discours du roman sur le modernisme et la repr\u00e9sentation de la conscience. Enfin, nous examinons les effets potentiellement lib\u00e9rateurs du jeu dynamique de la perspective et de la temporalit\u00e9 du film sur l\u2019\u00e9criture de McEwan, et comment ces effets sont li\u00e9s aux questions de focalisation et d\u2019omniscience dans le roman.", "venue": "", "year": 2022, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2068442814", "name": "Ian"}, {"authorId": "2075643995", "name": "McEwan"}]}, {"paperId": "e4533aac58848de7b3ca6e0bd40ccc292861c1e5", "externalIds": {"CorpusId": 252821490}, "url": "https://www.semanticscholar.org/paper/e4533aac58848de7b3ca6e0bd40ccc292861c1e5", "title": "Who or what is creative? Collaborating with machines to make visual art", "abstract": "This paper considers how creative agency can be positioned as part of visual art practice that involves humans and machines working together. Examples analysed include projects where complex \u201cintelligent\u201d software systems support text creation, or the combination and transformation of digital images, alongside one where a human artist works with a physically instantiated robotic arm to co-create drawings. The paper\u2019s argument uses ideas from actor-network theory (ANT) and more object-oriented perspectives to theorise agency not only as emerging from the association of humans and machines in networks, but also with the specific humans and machines involved in each creative project.", "venue": "", "year": 2022, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2364257", "name": "E. Sandry"}]}, {"paperId": "a7b46f12d94e5598827cbb7826245a392af64da3", "externalIds": {"DOI": "10.5937/medi55-37718", "CorpusId": 252649049}, "url": "https://www.semanticscholar.org/paper/a7b46f12d94e5598827cbb7826245a392af64da3", "title": "Improvement of the psychiatric care through outsourcing artificial intelligence technologies: Where are we now?", "abstract": "Currently, the world is entering the fourth industrial revolution - marked by artificial intelligence (AI) powered technologies. The growing ubiquity of AI technologies is already present in many sectors of modern society, but caution still prevails in medicine where their application is far from routine, although it is on the constant rise. Psychiatry has been recognized as one of the disciplines where significant contribution of AI technologies is expected for prediction, diagnosis, treatment and monitoring of persons with psychiatric disorders. Nearly half of the world's population live in countries that have fewer than one psychiatrist per 100 000 inhabitants, which is far below the health needs as the prevalence of psychiatric disorders is within the range of 10-20%. Thus, the question arises - whether AI technologies can help to fill the gap in unmet needs in psychiatry? The main types of autonomous technologies currently applied in psychiatry are machine learning and its subsets deep learning and computer vision, alongside natural language processing and chatbots. The present review will focus on the brief history of the concept, the utility of AI technologies in psychiatry, clinicians' attitudes, ethical dilemmas, clinical and scientific challenges. This review emphasizes that the psychiatric community should not be ignorant but could try to leave the comfort zone and do more to raise the awareness of AI technologies development achievements.", "venue": "Medicinska istrazivanja", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Medicinska istrazivanja"}, "authors": [{"authorId": "1412770529", "name": "Sanja Andri\u0107-Petrovi\u0107"}, {"authorId": "4325857", "name": "N. Mari\u0107"}]}, {"paperId": "66ef0473f371372face6359f7e9de04e25b1f30a", "externalIds": {"DBLP": "conf/cilc/LongoS22", "CorpusId": 252599881}, "url": "https://www.semanticscholar.org/paper/66ef0473f371372face6359f7e9de04e25b1f30a", "title": "A Framework to build Abductive-Deductive Chatbots, based on Natural Language Processing and First-Order Logic", "abstract": "This paper presents a framework based on natural language processing and first-order logic, which implicitly simulate the human brain features of selecting properly information related to a query from a knowledge base (abductive pre-stage), before to infer new knowledge from such a selection acting as deductive database. Such features are used with the aim of instantiating cognitive chatbots, able of human-like fashioned reasoning, supported by a module which automatically transforms polar and wh-questions into one or more likely assertions, in order to infer Boolean values or snippets with variable length as factoid answer from a conceptual knowledge base. The latter is splitted into two layers, representing both long- and short-term memory, and the transition of information between the two layers is achieved leveraging both a greedy algorithm and the engine\u2019s features of a NoSQL database, with promising timing performance than respect using one layer. Furthermore, such chatbots don\u2019t need any scripts updates or code refactory when new knowledge has to income, but just the knowledge itself in natural language.", "venue": "CILC", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "75-89"}, "authors": [{"authorId": "150060282", "name": "Carmelo Fabio Longo"}, {"authorId": "1735156", "name": "C. Santoro"}]}, {"paperId": "308bb98b5275f5555931e06fe4603da10ecdb8e6", "externalIds": {"CorpusId": 252460019}, "url": "https://www.semanticscholar.org/paper/308bb98b5275f5555931e06fe4603da10ecdb8e6", "title": "Understanding living beings by analogy with computers or understanding computers as an emanation of the living", "abstract": "The analogy between living beings and computers was introduced with circum-spection by Schr\u00f6dinger and has been widely propagated since, rarely with a precise technical meaning. Critics of this perspective are numerous. We emphasize that this perspective is mobilized to justify what may be called a regressive reductionism by comparison with physics or the Cartesian method. Other views on the living are possible, and we focus on an epistemological and theoretical framework where historicity is central, and the regularities susceptible to mathematization are constraints whose existence is fundamentally precarious and historically contingent. We then propose to reinterpret the computer, no longer as a Turing machine but as constituted by constraints. This move allows us to understand that computation in the sense of Church-Turing is only a part of the theoretical determination of what actually happens in a computer when considering them in their larger theoretical context where historicity is also central. 1", "venue": "", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2436769", "name": "Ma\u00ebl Mont\u00e9vil"}]}, {"paperId": "1f66dbf202335f9c9874cdb446d3ac53e2f39cf7", "externalIds": {"CorpusId": 252332251}, "url": "https://www.semanticscholar.org/paper/1f66dbf202335f9c9874cdb446d3ac53e2f39cf7", "title": "CONSCIOUSNESS: IN YOUR OWN WORDS", "abstract": ": Surprisingly little is known about how the general public understands consciousness, yet information on common intuitions is crucial to discussions and theories of consciousness. We asked 202 members of the general public, \u201cIn your own words, what is consciousness?\u201d and analyzed the frequencies with which different perspectives on consciousness were represented. Almost all people (89%) described consciousness as fundamentally receptive \u2013 possessing, knowing, perceiving, being aware, or experiencing. In contrast, the perspective that consciousness is agentic (actively making decisions, driving output, or controlling behavior) appeared in only 33% of responses. Consciousness as a social phenomenon was represented by 24% of people. Consciousness as being awake or alert was mentioned by 19%. Consciousness as mystical, transcending the physical world, was mentioned by only 10%. Consciousness in relation to memory was mentioned by 6%. Consciousness as an inner voice or inner being \u2013 the homunculus view \u2013 was represented by 5%. Finally, only three people (1.5%) mentioned a specific, scholarly theory about consciousness, suggesting that we successfully sampled the opinions of the general public rather than capturing an academic construct. We found little difference between men and women, young and old, or US and non-US participants, except for one possible generation shift. Young, non-US participants were more likely to associate consciousness with moral decision-making. These findings show a snapshot of the public understanding of consciousness \u2013 a network of associated concepts, represented at varying strengths, such that some are more likely to emerge when people are asked an open-ended question about it.", "venue": "", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "7153229", "name": "M. Graziano"}, {"authorId": "1742110808", "name": "I. Christian"}]}, {"paperId": "c67b6bde0eb9a3bf7e71e9839489866c69b84261", "externalIds": {"CorpusId": 252285626}, "url": "https://www.semanticscholar.org/paper/c67b6bde0eb9a3bf7e71e9839489866c69b84261", "title": "Proceedings of the Annual Meeting of the Cognitive Science Society Comparing Machine and Human Learning in a Planning Task of Intermediate Complexity", "abstract": "Deep reinforcement learning agents such as AlphaZero have achieved superhuman strength in complex combinatorial games. By contrast, the cognitive science of planning has mostly focused on simple tasks for experimental and computational tractability. Using a board game that strikes a balance between complexity and tractability, we find that AlphaZero agents improve in value function quality and planning depth through learning, similar to human in previous modeling work. In addition, these metrics reflect causal contributions to Al- phaZero\u2019s playing strength. Yet the strongest contributor is the policy quality. The decrease in policy entropy also drives the increase in planning depth. The contribution of planning depth to performance is lessened in late training. These re- sults contribute to a joint understanding of machine and human planning, providing an interpretable way of understanding the learning and strength of AlphaZero, while generating novel hypothesis on human planning.", "venue": "", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "98230582", "name": "Permalink"}]}, {"paperId": "5a47c0b7c9f74af88b2128881f55ecb7cc0c28d6", "externalIds": {"CorpusId": 252306122}, "url": "https://www.semanticscholar.org/paper/5a47c0b7c9f74af88b2128881f55ecb7cc0c28d6", "title": "Stanford Encyclopedia of Philosophy Arti\ufb01cial Intelligence", "abstract": "Artificial intelligence (AI) is the field devoted to building artificial animals (or at least artificial creatures that \u2013 in suitable contexts \u2013 appear to be animals) and, for many, artificial persons (or at least artificial creatures that \u2013 in suitable contexts \u2013 appear to be persons).[1] Such goals immediately ensure that AI is a discipline of considerable interest to many philosophers, and this has been confirmed (e.g.) by the energetic attempt, on the part of numerous philosophers, to show that these goals are in fact un/attainable. On the constructive side, many of the core formalisms and techniques used in AI come out of, and are indeed still much used and refined in, philosophy: first-order logic and its extensions; intensional logics suitable for the modeling of doxastic attitudes and deontic reasoning; inductive logic, probability theory, and probabilistic reasoning; practical reasoning and planning, and so on. In light of this, some philosophers conduct AI research and development as philosophy.", "venue": "", "year": 2022, "referenceCount": 199, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "f1b954585370428fe78e071f146e545a129d7528", "externalIds": {"CorpusId": 252000518}, "url": "https://www.semanticscholar.org/paper/f1b954585370428fe78e071f146e545a129d7528", "title": "Use of Artificial Intelligence and Machine Learning in Medicines with implementation of Bayesian techniques", "abstract": "The interest in artificial intelligence in the medical sciences has increased over the last two decades, but most studies of its applications in clinical studies have drawn criticism for having unreliable designs and poor replicability, necessitating a greater need for medical professionals to be knowledgeable about this quickly expanding field of research. The area of Bayesian artificial intelligence is briefly introduced in this article. We talk about causal inference, Bayesian networks, and their (potential) applications in clinical practice.", "venue": "", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2183704135", "name": "Anubhav Kumar"}, {"authorId": "2183646166", "name": "Virat Sharma"}, {"authorId": "2183641627", "name": "Praveen Verma"}, {"authorId": "2183644765", "name": "Dr. Abhay Bhatia"}, {"authorId": "2184180874", "name": "Dr. Manish Kumar"}]}, {"paperId": "dbe287b1923247f78883fc08e1bc8394df0de631", "externalIds": {"CorpusId": 251557030}, "url": "https://www.semanticscholar.org/paper/dbe287b1923247f78883fc08e1bc8394df0de631", "title": "Unveiling the Effect of using Moebius Transformations on Knowledge Graph Embeddings", "abstract": null, "venue": "", "year": 2022, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3193518", "name": "Andreas Behrend"}, {"authorId": "123110496", "name": "Can Aykul"}]}, {"paperId": "74024fcf3d5d445ec6587a2d39a2bdfff1a9378e", "externalIds": {"CorpusId": 251553985}, "url": "https://www.semanticscholar.org/paper/74024fcf3d5d445ec6587a2d39a2bdfff1a9378e", "title": "EMBODIED ARTIFICIAL INTELLIGENCE IN SCIENCE FICTION PHILOSOPHICAL PRESUPPOSITIONS AND IMPLICATIONS", "abstract": "In this paper, I explore the fruitful relationship between science fiction and philosophy regarding the topic of artificial intelligence. I establish a connection between certain paradigms in the philosophy of mind and consciousness and the imagination of possible future scenarios in sci-fi, especially focusing on the different ways of conceiving the role of corporeality in constituting consciousness and cognition. Then, I establish a parallelism between these different conceptions of corporeality in the philosophy of mind and certain representations of AI in sci-fi: from computers to robots and androids. I conclude by stressing the value of exchanging ideas between sci-fi and philosophy to foreshadow and evaluate some scenarios of high ethical relevance. y", "venue": "", "year": 2022, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "5564873", "name": "A. Giannotta"}]}, {"paperId": "bb1a4db63f1ca4522e8ed0ff12c96ed1cfda5a9d", "externalIds": {"DOI": "10.24132/csrn.3201.10", "CorpusId": 251485247}, "url": "https://www.semanticscholar.org/paper/bb1a4db63f1ca4522e8ed0ff12c96ed1cfda5a9d", "title": "Chatbot Explorer: Towards an understanding of knowledge bases of chatbot systems", "abstract": "A chatbot can automatically process a user\u2019s request, e.g. to provide a requested information. In doing so, the user starts a conversation with the chatbot and can specify the request by further inquiry. Due to the developments in the field of NLP in recent years, algorithmic text comprehension has been significantly improved. As a result, chatbots are increasingly used by companies and other institutions for various tasks such as order processes or service requests. Knowledge bases are often used to answer users queries, but these are usually curated manually in various text files, prone to errors. Visual methods can help the expert to identify common problems in the knowledge base and can provide an overview of the chatbot system. In this paper, we present Chatbot Explorer, a system to visually assist the expert to understand, explore, and manage a knowledge base of different chatbot systems. For this purpose, we provide a tree-based visualization of the knowledge base as an overview. For a detailed analysis, the expert can use appropriate visualizations to drill down the analysis to the level of individual elements of a specific story to identify problems within the knowledge base. We support the expert with automatic detection of possible problems, which can be visually highlighted. Additionally, the expert can also change the order of the queries to optimize the conversation lengths and it is possible to add new content. To develop our solution, we have conducted an iterative design process with domain experts and performed two user evaluations. The evaluations and the feedback from our domain experts have shown that our solution can significantly improve the maintainability of chatbot knowledge bases.", "venue": "CSRN", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "CSRN"}, "authors": [{"authorId": "1388911960", "name": "Alrik Hausdorf"}, {"authorId": "2121286581", "name": "Lydia M\u00fcller"}, {"authorId": "1810101", "name": "G. Scheuermann"}, {"authorId": "2121285225", "name": "A. Niekler"}, {"authorId": "51136989", "name": "D. Wiegreffe"}]}, {"paperId": "697f5c2bcb3867e3310ab432a3cf5f50a6f74b09", "externalIds": {"DBLP": "conf/ijcai/CohnHMMXZ22", "CorpusId": 251350128}, "url": "https://www.semanticscholar.org/paper/697f5c2bcb3867e3310ab432a3cf5f50a6f74b09", "title": "A Framework for Categorising AI Evaluation Instruments", "abstract": "The current and future capabilities of Artificial Intelligence (AI) are typically assessed with an ever increasing number of benchmarks, competitions, tests and evaluation standards, which are meant to work as AI evaluation instruments (EI). These EIs are not only increasing in number, but also in complexity and diversity, making it hard to understand this evaluation landscape in a meaningful way. In this paper we present an approach for categorising EIs using a set of 18 facets , accompanied by a rubric to allow anyone to apply the framework to any existing or new EI. We apply the rubric to 23 EIs in different domains through a team of raters, and analyse how consistent the rubric is and how well it works to distinguish between EIs and map the evaluation landscape in AI.", "venue": "EBeM@IJCAI", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": "1703235", "name": "A. Cohn"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}, {"authorId": "3469093", "name": "Julius Sechang Mboli"}, {"authorId": "2180557970", "name": "Yael Moros-Daval"}, {"authorId": "2164103794", "name": "Zhiliang Xiang"}, {"authorId": "25629377", "name": "Lexin Zhou"}]}, {"paperId": "9da79db5f2156231d408a374f54af9846a602b74", "externalIds": {"DOI": "10.1590/1678-460x202238248453", "CorpusId": 251339716}, "url": "https://www.semanticscholar.org/paper/9da79db5f2156231d408a374f54af9846a602b74", "title": "The Intersection between Linguistic Theories and Computational Linguistics over time", "abstract": "ABSTRACT Recent achievements have turned Computational linguistics into a dynamic research area, and an important field of application development that is being explored by leading technology companies. Despite the advances, there is still much room for improvement to allow humans to interact with computational devices, through natural language, in the same way that humans interact with native speakers of the same language. How to make computers understand or create new metaphors, metonymies or other figures of language? Is it possible to develop natural language systems capable of producing lyrics or poetry on the same level as humans? Can we produce systems capable of assigning new meanings to syntactic elements that are immediately perceived as coherent by humans? In this paper, we account for the evolution of computational linguistics, drawing a parallel with the evolution of linguistic theories and speculating about its research opportunities and foreseeable limitations.", "venue": "DELTA: Documenta\u00e7\u00e3o de Estudos em Ling\u00fc\u00edstica Te\u00f3rica e Aplicada", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "DELTA: Documenta\u00e7\u00e3o de Estudos em Ling\u00fc\u00edstica Te\u00f3rica e Aplicada"}, "authors": [{"authorId": "144757810", "name": "Alexandra Moreira"}, {"authorId": "2164722229", "name": "A. Oliveira"}, {"authorId": "52101414", "name": "M. Possi"}]}, {"paperId": "bcc86aab7241439174ebf2b726bdc3131f93a407", "externalIds": {"CorpusId": 251211841}, "url": "https://www.semanticscholar.org/paper/bcc86aab7241439174ebf2b726bdc3131f93a407", "title": "Levels of abstraction and the Turing test. (English)", "abstract": "Summary: An important lesson that philosophy can learn from the Turing test and computer science more generally concerns the careful use of the method of levels of abstraction (LoAs). The purpose of this paper is to summarize the method and apply it to the paper, modelling and analysis of phenomenological and conceptual systems showing its principal features and main advantages. The constituents of the method are \u201cobservables\u201d, collected together and moderated by predicates restrain-ing their \u201cbehaviour\u201d. The resulting collection of sets of observables is called a \u201cgradient of abstractions\u201d (GoAs) and it formalises the minimum consistency conditions that the chosen abstractions must satisfy. Two useful kinds of GoA \u2013 disjoint and nested \u2013 are identi\ufb01ed. It is then argued that in any discrete (as distinct from analogue) domain of discourse, a complex phenomenon may be explicated in terms of simple approximations organised together in a GoAs. Thus, the method replaces, for discrete disciplines, the dif-ferential and integral calculus, which form the basis for understanding the complex analogue phenomena of science and engineering. The result formalises an approach that is rather common in computer science but has hitherto found little application in philosophy. So the philosophical value of the method is demonstrated by showing how making the LoA of discourse explicit can be fruitful for phenomenological and conceptual analysis. To this end, the method is applied to the Turing test, the concept of agenthood, the de\ufb01nition of emergence, the notion of arti\ufb01cial life, quantum observation and decidable observation. This paper applies the method of abstraction to the paper, modelling and analysis of phenomenological and conceptual systems showing its principal features and main advantages. It is hoped that this treatment will promote the use of the method in certain areas of the humanities and especially in philosophy.", "venue": "", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "d0707c3d6f715f16f8d7fbafb73a2057fa031841", "externalIds": {"DBLP": "conf/ircdl/Lana22", "CorpusId": 251020054}, "url": "https://www.semanticscholar.org/paper/d0707c3d6f715f16f8d7fbafb73a2057fa031841", "title": "Artificial Intelligence Systems Producing Books: Questions of Agency", "abstract": "The publication of the book Beta Writer. 2019. Lithium-Ion Batteries. A Machine-Generated Summary of Current Research. New York, NY: Springer, produced with Artificial Intelligence software prompts analysis and reflection in several areas. First of all, about what Artificial Intelligence systems are able to do in the production of informative texts. This raises the question of whether and how an Artificial Intelligence software system can be treated as the author of a text it has produced. Assessing whether this is correct and possible leads to a re-examination of the current conception whereby it is taken for granted that the author is a person. This, in turn, face to texts produced by AI systems necessarily raises the question of whether they, like the author-person, are endowed with agency. The article concludes that Artificial Intelligence systems are characterised by a distributed agency, shared with those who designed them and operate them, and that a new type of author must be defined and recognised.", "venue": "IRCDL", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": "48030608", "name": "M. Lana"}]}, {"paperId": "350b50817d75598a1014f916b731c91362310f2f", "externalIds": {"DBLP": "conf/colins/SavytskaSVBP22", "CorpusId": 250625291}, "url": "https://www.semanticscholar.org/paper/350b50817d75598a1014f916b731c91362310f2f", "title": "Word2Vec Model Analysis for Semantic and Morphologic Similarities in Turkish Words", "abstract": "The study presents the calculation of the similarity between words in Turkish language by using word representation techniques. Word2Vec is a model used to represent words into vector form. The model is formed using articles from Wikipedia dump Turkish service as the corpus and then Cosine Similarity calculation method is used to determine the similarity value. The open-source Python programming language and Gensim library are used to obtain high quality word vectors with Word2Vec and calculate the cosine similarity of the vectors. Continuous Bag-of-words (CBOW) algorithm is used to train high quality word vectors. The cosine similarity values in the results are derived from the weight (dimension values) of the vector dimensions. The Window size 10 and 300 vector dimension configurations are taken. Increasing the number of cycles contributes to the vectors getting more accurate values. The corpus is trained in five cycles (EPOCH) with the same parameters. The Turkish corpus contains more than one hundred and sixty one million words. The dictionary of words (unique words), obtained from the corpus, is more than three hundred and sixty-seven thousand. Such a big data gives an opportunity to conduct high quality semantic and morphologic analysis and arithmetic operations of the word vectors.", "venue": "COLINS", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "161-176"}, "authors": [{"authorId": "2094582555", "name": "Larysa Savytska"}, {"authorId": "2106529443", "name": "M. T. S\u00fcbay"}, {"authorId": "12082005", "name": "N. Vnukova"}, {"authorId": "2106530048", "name": "Iryna Bezugla"}, {"authorId": "2100991382", "name": "Vasyl Pyvovarov"}]}, {"paperId": "ee8ecad5af614f94254ee81b0d9bc02e945db615", "externalIds": {"DBLP": "conf/delta2/FernandesM22", "DOI": "10.5220/0011300800003277", "CorpusId": 250572178}, "url": "https://www.semanticscholar.org/paper/ee8ecad5af614f94254ee81b0d9bc02e945db615", "title": "Open-domain Conversational Agent based on Pre-trained Transformers for Human-Robot Interaction", "abstract": "Over the past years, many breakthroughs occurred in the field of Machine Learning (ML) and Natural Language Processing (NLP), such as generative pre-trained transformers (GPTs), and attention mechanisms that learn contextual relationships between words in a text. These breakthroughs came with several new possibilities regarding Human-Robot Interactions (e.g. the creation of an open-domain chatbot). However, a substantial amount of research and available data are in English, causing lowresourced languages to be overlooked. This thesis explored this problem with two options: (i) Translation of the sentences before and after using the model fine-tuned on an English-based dataset, (ii) Translation of the English-based dataset to Portuguese and then fine-tune this model on it. When in presence of adequate training data and a good choice of generation method, it was demonstrated that DialoGPT (dialogue generative pre-trained transformer), a tunable neural conversational answer generation model, could learn the basic skills to conduct a dialogue. For the language models as well as the baseline methods, two sources of evaluation were used: (i) Metrics for text generation based on uncertainty (i.e. perplexity), and similarity between sentences (i.e. BLEU, METEOR and ROUGE) and (ii) Human-based evaluation of the sentences. Finally, it was shown that it is possible to resort to MT to have a fluent speaking chatbot, in portuguese. The translation of sentences before and after of the modified DialoGPT model, using the Daily Dialogue dataset led to the best results.", "venue": "DeLTA", "year": 2022, "referenceCount": 80, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "168-175"}, "authors": [{"authorId": "113037885", "name": "M. Fernandes"}, {"authorId": "1746258", "name": "Plinio Moreno"}]}, {"paperId": "41e97ea14b1d3f76269772a1be0e5dc9ccd812f0", "externalIds": {"CorpusId": 250274066}, "url": "https://www.semanticscholar.org/paper/41e97ea14b1d3f76269772a1be0e5dc9ccd812f0", "title": "The Morality of Artificial Friends in Ishiguro\u2019s Klara and the Sun", "abstract": "Can artificial entities be worthy of moral considerations? Can they be artificial moral agents (AMAs), capable of telling the difference between good and evil? In this essay, I explore both questions\u2014i.e., whether and to what extent artificial entities can have a moral status (\u201cthe machine question\u201d) and moral agency (\u201cthe AMA question\u201d)\u2014in light of Kazuo Ishiguro\u2019s 2021 novel Klara and the Sun . I do so by juxtaposing two prominent approaches to machine morality that are central to the novel: the (1) view \u201cfrom within,\u201d including the standard (or \u201cmetaphysical\u201d) perspective on moral agency, and the (2) view \u201cfrom outside,\u201d which includes behaviorism, functionalism and the social-relational perspective. Importantly, while the story illustrates both views, it exposes the epistemological vulnerability of the first in relation to the practical and social reality imposed by the second. That is, regardless of what metaphysical properties the Artificial Friend Klara can be said to have (from within), her moral status as well as agency ultimately depend on the views of others (from outside), including the others\u2019 own epistemic beliefs about the nature of consciousness and personhood.", "venue": "", "year": 2022, "referenceCount": 51, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2127326294", "name": "Jakob Stenseke"}]}, {"paperId": "36150e80f549397a57b4b1e8f2a99676ce809b28", "externalIds": {"DOI": "10.2139/ssrn.4147243", "CorpusId": 250135857}, "url": "https://www.semanticscholar.org/paper/36150e80f549397a57b4b1e8f2a99676ce809b28", "title": "Preparing for the (Non-Existent?) Future of Work", "abstract": "This paper considers the labor market and distributional implications of a scenario of ever-more-intelligent autonomous machines that substitute for human labor and drive down wages. We lay out three concerns arising from such a scenario and evaluate recent predictions and objections to these concerns. Then we analyze how a utilitarian social planner would allocate work and income if these concerns start to materialize. As the income produced by autonomous machines rises and the value of labor declines, a utilitarian planner finds it optimal to phase out work, beginning with workers who have low labor productivity and job satisfaction, since they have comparative advantage in enjoying leisure. This is in stark contrast to welfare systems that force individuals with low labor productivity to work. If there are significant wage declines, avoiding mass misery will require other ways of distributing income than labor markets, whether via sufficiently well-distributed capital ownership or via benefits. Recipients could still engage in work for its own sake if they enjoy work amenities such as structure, purpose and meaning. If work gives rise to positive externalities such as social connections or political stability, or if individuals undervalue the benefits of work because of internalities, then a social planner would incentivize work. However, in the long run, the planner might be able to achieve a higher level of social welfare by adopting alternative ways of providing these benefits.", "venue": "SSRN Electronic Journal", "year": 2022, "referenceCount": 53, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "4645245", "name": "Anton Korinek"}, {"authorId": "1659374560", "name": "Megan E. Juelfs"}]}, {"paperId": "dec7347dfbcc9b5210a07e2e8e1d5b8595a67175", "externalIds": {"CorpusId": 249668778}, "url": "https://www.semanticscholar.org/paper/dec7347dfbcc9b5210a07e2e8e1d5b8595a67175", "title": "Conceptualising Management of Artificial Intelligence in Terms of People, Process, Data and Technology", "abstract": "Artificial Intelligence (AI) is an area of organisational activity that attempts to build human intelligence and intelligent behaviours into information and computer systems. As a domain of study AI is characterised by, diverse opinions as to its nature, and an industry approach with limited research reporting the outcome of proposed frameworks in areas such as urban innovation, good society, and management in public industry. In this paper, we examine the use of people, process, data, and technology (2PDT) as a possible means for bringing structure to the study of the AI domain. We demonstrate its effective use in the formulation of research questions, research design, data collection, and analysis. We argue that AI is a domain of interest to the information systems discipline and that formulation of 2PDT seems to offer a useful conceptual framework examining this phenomenon.", "venue": "", "year": 2022, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2170257012", "name": "Sahber Monshizada"}]}, {"paperId": "ea40818e5f51b00f9a9ef533c73526645356e0c7", "externalIds": {"DOI": "10.5840/techne2022523158", "CorpusId": 249478520}, "url": "https://www.semanticscholar.org/paper/ea40818e5f51b00f9a9ef533c73526645356e0c7", "title": "What Does It Mean for a Robot to Be Respectful? in advance", "abstract": "", "venue": "Techn\u00e9: Research in Philosophy and Technology", "year": 2022, "referenceCount": 74, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Techn\u00e9: Research in Philosophy and Technology"}, "authors": [{"authorId": "115178513", "name": "Dina Babushkina"}]}, {"paperId": "e0d6f51de37f9520d6097bf71b993c7b03307226", "externalIds": {"CorpusId": 249493914}, "url": "https://www.semanticscholar.org/paper/e0d6f51de37f9520d6097bf71b993c7b03307226", "title": "Historical continuum and norms in art collections and datasets \u2013 Experiments with Artificial Intelligence at Paulista Museum", "abstract": "This article presents a set of experiments in the field of History of Art with Artificial Intelligence technologies (computer vision), carried out within the scope of demonumenta, a university outreach and research program that seeks to critically and creatively tension public memory policies. From the understanding that datasets and artistic collections are analogous practices, we questioned how to work in this intersection to subvert the normative assumptions that characterize the arrangement of art collections, databases and the discourses that their tools enunciate. We believe part of this answer lies in the critical activation of public holdings to reshape the way we train machines today. For that, we created a dataset, based on art pieces of the S\u00e3o Paulo Museum of the University of S\u00e3o Paulo (USP) available in its GLAM (Galleries, Libraries, Archives & Museums) in the Wiki projects. The systematization of this dataset was the foundation for carrying out five analytical experiments with Artificial Intelligence algorithms, namely: Numerical Natures, Possible Landscapes, Archeology of Colors, Affirmative Album and Animated Ignorance. Those experiments evidence the colonialist continuum that elaborates the historical narrative based on normative visual patterns and parameters. cr\u00edtica e criativamente pol\u00edticas p\u00fablicas de mem\u00f3ria. A partir do entendimento de que datasets (conjuntos de dados organizados) e acervos art\u00edsticos s\u00e3o pr\u00e1ticas an\u00e1logas, questionamos como trabalhar nesta intersec\u00e7\u00e3o para subverter os pressupostos normativos que caracterizam a organiza\u00e7\u00e3o de cole\u00e7\u00f5es de arte, bancos de dados e os discursos que suas ferramentas enunciam. Acreditamos que parte desta resposta est\u00e1 na ativa\u00e7\u00e3o cr\u00edtica de acervos p\u00fablicos para reformular o modo como hoje treinamos as m\u00e1quinas. Para tanto, elaboramos um dataset, com base nas obras do Museu Paulista da Universidade de (USP) dispon\u00edveis no seu GLAM (Galleries, nos projetos Wiki. A sistematiza\u00e7\u00e3o desse dataset foi a base para a realiza\u00e7\u00e3o de cinco experimentos anal\u00edticos com algoritmos de Intelig\u00eancia Artificial. S\u00e3o eles: Naturezas Num\u00e9ricas, Paisagens Poss\u00edveis, Arqueologia das Cores, \u00c1lbum Afirmativo e Ignor\u00e2ncia Animada. Tais experimentos evidenciam o continuum colonialista que elabora a narrativa hist\u00f3rica a partir de par\u00e2metros e padr\u00f5es visuais normatizantes.", "venue": "", "year": 2022, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2078886089", "name": "A. Jurno"}, {"authorId": "1513730735", "name": "G. Beiguelman"}]}, {"paperId": "2a632c9e24324d2a7b94df1a94065f61879aa281", "externalIds": {"CorpusId": 249426085}, "url": "https://www.semanticscholar.org/paper/2a632c9e24324d2a7b94df1a94065f61879aa281", "title": "Can Artificial Intelligence be a Critical Success Factor of Construction Projects ? : Project practitioners \u2019 perspectives", "abstract": "Artificial Intelligence (AI) can be defined as constructing computer programs that (i) are capable of exhibiting intelligence, (ii) exhibit intelligence by using processes used by humans for the same tasks, and (iii) are capable of complementing or supplementing human intelligence (Simon, 1995). As Epstein said (2015), \u201cAlthough the original vision for artificial intelligence was the simulation of (implicitly human) intelligence, research has gradually shifted to autonomous systems that compete with people\u201d. Artificial neural networks, machine learning, genetic algorithms, fuzzy logic, and statistical analysis form the basis of most applications under the label of \u201cAI\u201d.", "venue": "", "year": 2022, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2161847494", "name": "Virender Kumar"}, {"authorId": "88813966", "name": "Amrendra Pandey"}, {"authorId": "2115290267", "name": "Rahul Singh"}]}, {"paperId": "f80cc568652b55250beebc6ba677b11287f96bf8", "externalIds": {"CorpusId": 249825349}, "url": "https://www.semanticscholar.org/paper/f80cc568652b55250beebc6ba677b11287f96bf8", "title": "A RTIFICIAL I NTELLIGENCE : F RAMEWORK OF D RIVING T RIGGERS TO P AST , P RESENT AND F UTURE A PPLICATIONS AND I NFLUENCERS OF I NDUSTRY S ECTOR A DOPTION", "abstract": "To gain a sense of the development of Artificial Intelligence (AI), this research analyzes what has been done in the past, presently in the last decade and what is predicted for the next several decades. The paper will highlight the biggest changes in AI and give examples of how these technologies are applied in several key industry sectors along with influencers that can affect adoption speed. Lastly, the research examines the driving triggers such as cost, speed, accuracy, diversity/inclusion and interdisciplinary research/collaboration that propel AI into an essential transformative technology.", "venue": "", "year": 2022, "referenceCount": 105, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "2160808545", "name": "Susan Kaplan"}]}, {"paperId": "ab7f19ddf0558389b776232c911b7e775a58ac42", "externalIds": {"CorpusId": 249335900}, "url": "https://www.semanticscholar.org/paper/ab7f19ddf0558389b776232c911b7e775a58ac42", "title": "SMU Data Science Review SMU Web Page Multiclass Classification Web Page Multiclass Classification", "abstract": ". As the internet age evolves, the volume of content hosted on the Web is rapidly expanding. With this ever-expanding content, the capability to accurately categorize web pages is a current challenge to serve many use cases. This paper proposes a variation in the approach to text preprocessing pipeline whereby noun phrase extraction is performed first followed by lemmatization, contraction expansion, removing special characters, removing extra white space, lower casing, and removal of stop words. The first step of noun phrase extraction is aimed at reducing the set of terms to those that best describe what the web pages are about to improve the categorization capabilities of the model. Separately, a text preprocessing using keyword extraction is evaluated. In addition to the text preprocessing techniques mentioned, feature reduction techniques are applied to optimize model performance. Several modeling techniques are examined using these two approaches and are compared to a baseline model. The baseline model is a Support Vector Machine with linear kernel and is based on text preprocessing and feature reduction techniques that do not include noun phrase extraction or keyword extraction and uses stemming rather than lemmatization. The recommended SVM One-Versus-One model based on noun phrase extraction and lemmatization during text preprocessing shows an accuracy improvement over the baseline model of nearly 1% and a 5-fold reduction in misclassification of web pages as undesirable categories.", "venue": "", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2167829762", "name": "Brian Gaither"}, {"authorId": "2167829496", "name": "Antonio Debouse"}, {"authorId": "2110526769", "name": "Catherine Huang"}]}, {"paperId": "2a1be718a6c8802c97250321b5299446ffdf26cc", "externalIds": {"DBLP": "conf/caise/Fukas22", "CorpusId": 249282929}, "url": "https://www.semanticscholar.org/paper/2a1be718a6c8802c97250321b5299446ffdf26cc", "title": "The Management of Artificial Intelligence: Developing a Framework Based on the Artificial Intelligence Maturity Principle", "abstract": "The use of Artificial Intelligence (AI) must be systematically managed and coordinated to optimally support corporate goals and enable AI to create added value for organizations. This poses new challenges for traditional Information Technology (IT) management. Although initial approaches to managing AI as an extension of traditional IT management exist, the management of AI is still in its infancy. Therefore, the goal of our research is the development of an integrated management framework that combines insights from AI maturity model research with an overarching AI management perspective. In a multi-method and design science-oriented research process, an AI maturity model, an AI management metamodel, and a web-based AI maturity assessment and management tool combining both previous models are developed and evaluated. In addition, several smaller studies are conducted to demonstrate how AI-based information systems can be managed corresponding to the different dimensions of the integrated AI management framework.", "venue": "CAiSE", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": null, "journal": {"pages": "19-27"}, "authors": [{"authorId": "2111965685", "name": "Philipp Fukas"}]}, {"paperId": "0d2dbf6abf2b499379d4364da781591a02ee7211", "externalIds": {"CorpusId": 249192732}, "url": "https://www.semanticscholar.org/paper/0d2dbf6abf2b499379d4364da781591a02ee7211", "title": "INDUSTRY ADOPTION INFLUENCERS", "abstract": "The authors present a new Framework of Artificial Intelligence which analyzes the key elements of transformational AI in industry. The State of the Art of Artificial Intelligence is gleaned from an examination of what has been done in the past, presently in the last decade and what is predicted for future decades. The paper will highlight the biggest changes in AI, important influencers to adoption/diffusion and give examples of how these technologies have and will be applied in three key industrial sectors, including agriculture, education and healthcare. Next the research examines seven driving triggers of cost, speed, accuracy, diversity/inclusion, interdisciplinary research/collaboration and ethics/trustworthiness that are accelerating AI development and concludes with a discussion of what are the critical success factors for industry to be transformational in AI.", "venue": "", "year": 2022, "referenceCount": 137, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "46902711", "name": "Susan B. Kaplan"}]}, {"paperId": "3e0ea3d704fc48d262eefa317eeec2d478138fb4", "externalIds": {"CorpusId": 249091327}, "url": "https://www.semanticscholar.org/paper/3e0ea3d704fc48d262eefa317eeec2d478138fb4", "title": "Open Research Online Can a machine design?", "abstract": ": One strand of my research has been concerned with the computer as a design tool; but a second strand has been concerned with design computing as a research tool for improving our understanding of the design process. Some of this latter research is based on the simulation of computer behavior by human beings - a reversal of the more usual approach - and some is based on comparisons of computational models with human design behavior. Despite recent doubts expressed by some authors, I suggest that the question, \u2018Can a machine design?\u2019 is still a useful question to ask.", "venue": "", "year": 2022, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "8bf8506a2c5ce804336076f8d8d238c2caaeaf32", "externalIds": {"DBLP": "conf/aistats/TomaszewskaZM22", "CorpusId": 248923808}, "url": "https://www.semanticscholar.org/paper/8bf8506a2c5ce804336076f8d8d238c2caaeaf32", "title": "Duel-based Deep Learning system for solving IQ tests", "abstract": "One of the relevant aspects of Arti\ufb01cial General Intelligence is the ability of machines to demonstrate abstract reasoning skills, for instance, through solving (human) IQ tests. This work presents a new approach to machine IQ tests solving formulated as Raven\u2019s Progressive Matrices (RPMs), called Duel-IQ. The proposed solution incorporates the concept of a tournament in which the best answer is chosen based on a set of duels between candidate RPM answers. The three relevant aspects are: (1) low computational and design complexity, (2) proposition of two schemes of pairing up candidate answers for the duels and (3) evaluation of the system on a dataset of shapes other than those used for training. Depending on a particular variant, the system reaches up to 82.8% accuracy on average in RPM tasks with 5 candidate answers and is on par with human performance and superior to other literature approaches of compa-rable complexity when training and test sets are from the same distribution.", "venue": "AISTATS", "year": 2022, "referenceCount": 24, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "10483-10492"}, "authors": [{"authorId": "2165804235", "name": "Paulina Tomaszewska"}, {"authorId": "3465508", "name": "A. Zychowski"}, {"authorId": "1681735", "name": "J. Ma\u0144dziuk"}]}, {"paperId": "e26658c14f5088aa07248d25df7768007c33a039", "externalIds": {"DBLP": "conf/avi/AlizadehMS22", "CorpusId": 248941690}, "url": "https://www.semanticscholar.org/paper/e26658c14f5088aa07248d25df7768007c33a039", "title": "The reverse Turing test: being human (is) enough in the age of AI", "abstract": "Disposing of bad actors on social media is a daunting task, particularly in the face of \u201cengineered social tampering\u201d [4]. That is what Ferrara et al. [6] have labeled the rise of social bots, and large platform owners are struggling to mitigate the harmful effects caused by such malicious software. Therefore, it is no surprise that platform owners like META are fastening their security controls and that the popular press has tracked the efficacy of these measures. Specifically, META has been implementing what Forbes\u2019 Lance Eliot named the \u2018Upside Down Turing Test.\u2019 [26]. Unlike the original Turing test, which tasked a human participant with distinguishing a human from a digital speech correspondent, this version is designed to use a software program to distinguish non-human activity on the platform. In this work, we discuss the complications introduced by this reversal taking the human user\u2019s perspective. On the one hand, we recognize the necessity for fraud detection and defense against web-automated attacks. On the other hand, we find it necessary to uplift the voices of users who are wrongfully made victims as a result, in minor or major ways. At the same time, we offer alternatives to these invisible Reverse Turing Tests (RTTs) that expand the scope for distinguishing between human and non-human actors, while keeping humanity at the forefront of this inquiry.", "venue": "CoPDA@AVI", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "49-54"}, "authors": [{"authorId": "2070900671", "name": "F. Alizadeh"}, {"authorId": "2004535547", "name": "Aikaterini Mniestri"}, {"authorId": "145183095", "name": "G. Stevens"}]}, {"paperId": "165d1a9754c947965ad48df36aa8786cc8a62a58", "externalIds": {"DBLP": "conf/acl/LiKL022", "ACL": "2022.findings-acl.219", "DOI": "10.18653/v1/2022.findings-acl.219", "CorpusId": 248780383}, "url": "https://www.semanticscholar.org/paper/165d1a9754c947965ad48df36aa8786cc8a62a58", "title": "Mitigating Contradictions in Dialogue Based on Contrastive Learning", "abstract": "Chatbot models have achieved remarkable progress in recent years but tend to yield contradictory responses. In this paper, we exploit the advantage of contrastive learning technique to mitigate this issue. To endow the model with the ability of discriminating contradictory patterns, we minimize the similarity between the target response and contradiction related negative example. The negative example is generated with learnable latent noise, which receives contradiction related feedback from the pretrained critic. Experimental results show that our method helps to avoid contradictions in response generation while preserving response fluency, outperforming existing methods on both automatic and human evaluation.", "venue": "FINDINGS", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "2781-2788"}, "authors": [{"authorId": "2108618065", "name": "Weizhao Li"}, {"authorId": "1384501695", "name": "Junsheng Kong"}, {"authorId": "2165226829", "name": "Ben Liao"}, {"authorId": "2149184259", "name": "Yi Cai"}]}, {"paperId": "48ee13a2a52dec1f14d12fe1f17f7fa358f94490", "externalIds": {"DOI": "10.1016/j.gastha.2022.02.025", "CorpusId": 248738846}, "url": "https://www.semanticscholar.org/paper/48ee13a2a52dec1f14d12fe1f17f7fa358f94490", "title": "Artificial Intelligence and the Future of Gastroenterology and Hepatology", "abstract": null, "venue": "Gastro Hep Advances", "year": 2022, "referenceCount": 126, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Gastro Hep Advances"}, "authors": [{"authorId": "8677460", "name": "Daniel D. Penrice"}, {"authorId": "1490505386", "name": "P. Rattan"}, {"authorId": "14603481", "name": "D. Simonetto"}]}, {"paperId": "a1d46e594cb8edcc71881856317e0d2bce41f9fd", "externalIds": {"CorpusId": 248690963}, "url": "https://www.semanticscholar.org/paper/a1d46e594cb8edcc71881856317e0d2bce41f9fd", "title": "The Mapping of Deep Language Models on Brain Responses Primarily Depends on their Performance", "abstract": "Recent deep networks like transformers not only excel in several language tasks, but their activations 1 linearly map onto the human brain during language processing. Is this functional similarity caused by 2 speci\ufb01c factors, such as the language abilities and the architecture of the algorithms? To address this 3 issue, we analyze the brain responses to isolated sentences in a large cohort of 102 subjects, each 4 recorded with both functional magnetic resonance imaging (fMRI) and magnetoencephalography 5 (MEG). We then compare the ability of 32,400 transformer embeddings to linearly map onto these 6 brain responses. Finally, we evaluate how the architecture, training, and performance of the models 7 independently account for this brain mapping. Our analyses reveal two main \ufb01ndings. First, the 8 similarity between brain responses and the activations of language models primarily depends on their 9 ability to predict words from the context. Second, this similarity allows us to decompose and precisely 10 track the rise and maintenance of perceptual, lexical, and compositional representations within each 11 cortical region. Overall, this study evidences a partial convergence of language transformers to brain- 12 like solutions, and shows how this phenomenon helps unravel the brain bases of natural language 13 processing.", "venue": "", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "83928755", "name": "C. Caucheteux"}]}, {"paperId": "1fe02bbbe43fa4af145bfce1c1e3de1ae366dfa4", "externalIds": {"DBLP": "conf/csedu/SondereggerS22", "DOI": "10.5220/0010999200003182", "CorpusId": 248628307}, "url": "https://www.semanticscholar.org/paper/1fe02bbbe43fa4af145bfce1c1e3de1ae366dfa4", "title": "Chatbot-mediated Learning: Conceptual Framework for the Design of Chatbot Use Cases in Education", "abstract": ": While chatbots or conversational agents are already common in many business areas, e.g. for customer support, their use in the education sector is still in its infancy. Chatbots might take over the role of a teacher, tutor, conversational partner, learning analyst, team member, support assistant, or recommender system. Within these different roles, chatbots can enhance learning and inherently address many requirements and success factors for learning. The scalability and adaptiveness of conversational AI allow an individualised learning support for all learners combined with collaboration opportunities and thus more equality in education. In this context, the paper at hand discusses this pedagogical potential of chatbots in different roles and social settings resulting in a conceptual framework for the understanding and design of chatbot use cases in education. Based on success factors for learning derived from established learning theories and reports, core attributes and goals of chatbot learning are deducted within three pedagogical domains of individual, social and analytic chatbot learning. By combining this pedagogical dimension with a technological and content dimension, the presented conceptual framework provides an overview of possibilities of how chatbots in education can be used and designed.", "venue": "CSEDU", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"pages": "207-215"}, "authors": [{"authorId": "2056193477", "name": "Stefan Sonderegger"}, {"authorId": "134177694", "name": "S. Seufert"}]}, {"paperId": "8c0ac9096850097c742e9a65524a04293c3d337f", "externalIds": {"CorpusId": 248386928}, "url": "https://www.semanticscholar.org/paper/8c0ac9096850097c742e9a65524a04293c3d337f", "title": "Information temperature as a measure of DNA\u2019s and texts complexity", "abstract": "C. Shannon introduced the notion of entropy for random sequences. What about their temperature? After discussing some methods for introducing information temperature (IT) for binary random stationary ergodic sequence, we suggest using IT as a characteristic of complexity and intelligence of an agent capable of writing or generating meaningful texts. In particular, we discuss the question of whether the temperature can characterize the academic level of the text, or serve as an indicator of the quality of brain activity of the text author.", "venue": "", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "69984277", "name": "A. Usikov"}]}, {"paperId": "d877c9acfe5754e5e577355fa417264d53e04502", "externalIds": {"DOI": "10.17721/1728-2195/2022/1.120-7", "CorpusId": 248314209}, "url": "https://www.semanticscholar.org/paper/d877c9acfe5754e5e577355fa417264d53e04502", "title": "TOWARDS THE ISSUE ON IMPROVING THE PROTECTION OF INFORMATION RIGHTS OF INDIVIDUALS IN RELATIONS CONNECTED WITH THE USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES", "abstract": "The article examines the peculiarities of the application of methods provided by the legislation of Ukraine to protect the information rights of individuals from violations related to the use of artificial intelligence technologies; the ways to improve these methods taking into account the requirements of European Union law are developed. The author identifies the legal properties of artificial intelligence technologies, clarifies their impact on the choice of ways to protect the relevant nature of the violated information rights. The purpose of the article is to study the main areas of improvement of methods aimed at protecting information rights of individuals in the relations connected with the use of artificial intelligence technologies. The object of the study is public relations, which arise in connection with the use of methods to protect the information rights of individuals, violated by the misuse of artificial intelligence technologies in various spheres of public life. For this research, general scientific methods of cognition have been used, namely dialectical, system-structural, normal-logical, as well as such special methods as historical, comparative-legal, sociological, etc. Based on the results of the study, the author proposes a system of special ways to protect the information rights of individuals from violations related to the use of artificial intelligence technologies. The author also analyzes the grounds for their use. In addition, the article proposes the ways to improve the application of general methods of protection of human rights, enshrined in Article 5 of the Code of Administrative Procedure and Article 16 of the Civil Code of Ukraine, taking into account the illegal consequences of artificial intelligence technologies application. The recommendations on how to improve the legislation of Ukraine, the norms of which determine the mechanism for the protection of information human rights are formulated in the conclusions. In addition, the author has developed some recommendations for the restoration of information rights of individuals who suffer from violations of the use of artificial intelligence technologies. Keywords: protection of information rights, information offense, information rights, artificial intelligence technologies, individual", "venue": "Bulletin of Taras Shevchenko National University of Kyiv. Legal Studies", "year": 2022, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Bulletin of Taras Shevchenko National University of Kyiv. Legal Studies"}, "authors": [{"authorId": "1506520723", "name": "O. Zaiarnyi"}]}, {"paperId": "deedf17852328b0dbe73c1f80cec8c8cb3ec5caf", "externalIds": {"CorpusId": 248067907}, "url": "https://www.semanticscholar.org/paper/deedf17852328b0dbe73c1f80cec8c8cb3ec5caf", "title": "Buddhism and Intelligent Technology: Toward a More Humane Future", "abstract": null, "venue": "", "year": 2022, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2673288", "name": "Soraj Hongladarom"}]}, {"paperId": "7c6379e6650c382c4d66a4cfb5209b470572fbdb", "externalIds": {"CorpusId": 247951496}, "url": "https://www.semanticscholar.org/paper/7c6379e6650c382c4d66a4cfb5209b470572fbdb", "title": "APPLICATION OF ARTIFICIAL INTELLIGENCE IN THE PAYMENT SYSTEM", "abstract": "Globally few billions of people visit malls and shopping centers every month. This reflects not just the integral place that malls hold in retail landscape, but also massive potential of data driven insights waiting to be harnessed. Consumers want to purchase in the shopping malls where they can get all the items under one roof. The major time consuming part is waiting for the bill generation and making payment around 30 minutes. In the modern world, waiting in a line identified as biggest emerging issues. This paper is focusing the impact of artificial intelligence and its use in minimizing the queue system for their payment system. Malls can use big data, machine learning and artificial intelligence to derive meaningful insights to minimize operational cost, build better customer engagement, explore new avenues for revenue, enable tenants to boost productivity and more.", "venue": "", "year": 2022, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2129611073", "name": "D. Divya"}, {"authorId": "2161393537", "name": "Mrs Harshitha Mallik"}]}, {"paperId": "a865394c760be35e6f6c9e20f616a06f0b9c4e6d", "externalIds": {"DOI": "10.1017/s1477175621000506", "CorpusId": 247475621}, "url": "https://www.semanticscholar.org/paper/a865394c760be35e6f6c9e20f616a06f0b9c4e6d", "title": "LOVE BYTES: THE FUTURE OF BIO\u2013R2 RELATIONSHIPS", "abstract": "What would a romantic relationship between a biological human and an artificial intelligence system look like? The question is explored through a fictional correspondence between Alan Turing and Ada Lovelace.", "venue": "Think", "year": 2022, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "21", "pages": "93 - 99", "name": "Think"}, "authors": [{"authorId": "103957127", "name": "J. J. Joaquin"}, {"authorId": "113768318", "name": "Hazel T. Biana"}]}, {"paperId": "039798a69b7f0d877341a5c1dcfe2cd811706d6d", "externalIds": {"DBLP": "journals/tismir/Rohrmeier22", "DOI": "10.5334/tismir.104", "CorpusId": 247375389}, "url": "https://www.semanticscholar.org/paper/039798a69b7f0d877341a5c1dcfe2cd811706d6d", "title": "On Creativity, Music's AI Completeness, and Four Challenges for Artificial Musical Creativity", "abstract": null, "venue": "Trans. Int. Soc. Music. Inf. Retr.", "year": 2022, "referenceCount": 86, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "5", "pages": "50-66", "name": "Trans. Int. Soc. Music. Inf. Retr."}, "authors": [{"authorId": "1971449", "name": "M. Rohrmeier"}]}, {"paperId": "a7c4d97ede448557fe6bcdb16fce22442307f756", "externalIds": {"CorpusId": 247161041}, "url": "https://www.semanticscholar.org/paper/a7c4d97ede448557fe6bcdb16fce22442307f756", "title": "Design principles and architecture of a second language learning chatbot", "abstract": "The purpose of this article is to set out the design principles and architecture of a second language (L2) learning voice chatbot. Building on L2 acquisition theories and chatbot research, in this article, we report on a South Korean government-funded longitudinal project in which we designed and developed a chatbot called \u201cEllie\u201d. Chatbot Ellie has three chat modes, \u201cGeneral Chat,\u201d \u201cTask Chat,\u201d and \u201cSkills\u201d. In the General Chat mode, L2 users can have short talks about personal information, whereas in the Task Chat mode, they can engage in a wide range of problem-solving L2 tasks to achieve task goals by exchanging meanings with Ellie. The Skills mode offers form-focused language practice. Ellie was piloted among 137 Korean high school students, who used Ellie individually or in a group, for seven weeks in their English classes. The quality of the chatbot was investigated in terms of the appropriateness of language level, continuity of conversation, and success in task performance. Based on the results of the pilot, Ellie appears to have considerable potential to become an effective language learning companion for L2 learners, and has implications for the design and developments of future L2 chatbots.", "venue": "", "year": 2022, "referenceCount": 48, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2149548198", "name": "Dongkwang Shin"}, {"authorId": "2108620183", "name": "J. Lee"}]}, {"paperId": "90c33370e29ac97cccf04380a83ac88189d3c24e", "externalIds": {"CorpusId": 247087613}, "url": "https://www.semanticscholar.org/paper/90c33370e29ac97cccf04380a83ac88189d3c24e", "title": "Nature Inspired Computing Machine", "abstract": "An alternate method of representation of number system is proposed. The alternate method is based on reflection (0) and inverted reflection (1). Using an inverted reflected plane, one can create consecutive places of a number system. The alternate method has the advantage of creating empowered system representation with all places of the same power of the base. Three axioms are identified and can be proved by the method of mathematical induction to complete the process. The three axioms are, a creation of number system using inverted reflection, unique non-repetitive inverted reflection count generates natural numbers and taking inverted reflection with sign bit generates two's complement representation of negative numbers. It enabled us to create any desired number system and explained with the help of two versions of the decimal system. Typically, powered system representation leads to random switching within the representation.", "venue": "", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2089318432", "name": "R. Vijayaraghavan"}, {"authorId": "2156138175", "name": "Samanvita Nagaraju"}]}, {"paperId": "1301dcaaafd4118f53e4eefc22571bd1642fbc62", "externalIds": {"DOI": "10.1007/978-3-030-93921-2_22", "CorpusId": 246962285}, "url": "https://www.semanticscholar.org/paper/1301dcaaafd4118f53e4eefc22571bd1642fbc62", "title": "Robots in the Neighborhood: Application and Criminalization of the Artificial Intelligence in Education", "abstract": null, "venue": "Technologies, Artificial Intelligence and the Future of Learning Post-COVID-19", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Technologies, Artificial Intelligence and the Future of Learning Post-COVID-19"}, "authors": [{"authorId": "97563744", "name": "Farhana Helal Mehtab"}, {"authorId": "46551543", "name": "A. Mahmud"}]}, {"paperId": "7ebe8860bc7d22cd2a5ca6166cb045f539e91e76", "externalIds": {"DBLP": "journals/access/MunSSY22", "DOI": "10.1109/ACCESS.2022.3152526", "CorpusId": 246955149}, "url": "https://www.semanticscholar.org/paper/7ebe8860bc7d22cd2a5ca6166cb045f539e91e76", "title": "Black-Box Audio Adversarial Attack Using Particle Swarm Optimization", "abstract": "The development of artificial neural networks and artificial intelligence has helped to address problems and improve services in various fields, such as autonomous driving, image classification, medical diagnosis, and speech recognition. However, this technology has raised security threats that are different from existing ones. Recent studies have shown that artificial neural networks can easily malfunction by adversarial examples. The adversarial examples operate the neural network model as intended by the adversary. In particular, adversarial examples targeting speech recognition models is an area that has been actively studied in recent years. Existing studies have focused more on white-box methods. However, most speech recognition services are provided online and involve black-box, making it difficult or impossible for adversaries to attack. Black-box attacks have several challenges. Typically, they have a low success rate and a high risk of detection. In particular, previously proposed genetic algorithm (GA)-based attacks are at a high risk of detection because they require numerous queries. Therefore, we propose an adversarial attack system using particle swarm optimization (PSO) algorithms to address these problems. The proposed system uses adversarial candidates as particles to obtain adversarial examples through iterative optimization. PSO-based adversarial attacks are more efficient in queries and have a higher attack success rate than the adversarial methods using GAs. In particular, our key function is that temporary particle generation maximizes query efficiency to reduce detection risk and prevent wastage of system resources. On average, our system exhibits 96% attack success rates with 1416.17 queries, indicating that is 71.41% and 8% better in terms of query and success rates than existing GA-based attacks, respectively.", "venue": "IEEE Access", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "10", "pages": "23532-23544", "name": "IEEE Access"}, "authors": [{"authorId": "98436176", "name": "H. Mun"}, {"authorId": "2154999796", "name": "Sunggwan Seo"}, {"authorId": "2154980791", "name": "Baehoon Son"}, {"authorId": "4198724", "name": "J. Yun"}]}, {"paperId": "c835a2efd4ef146cb2d9a935e277e3e22c0a9d87", "externalIds": {"DOI": "10.1016/b978-0-323-90508-4.00007-1", "CorpusId": 246799579}, "url": "https://www.semanticscholar.org/paper/c835a2efd4ef146cb2d9a935e277e3e22c0a9d87", "title": "Recent advances of image processing techniques in agriculture", "abstract": null, "venue": "Artificial Intelligence and Data Science in Environmental Sensing", "year": 2022, "referenceCount": 75, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial Intelligence and Data Science in Environmental Sensing"}, "authors": [{"authorId": "47576177", "name": "Helia Farhood"}, {"authorId": "2154226792", "name": "Ivan Bakhshayeshi"}, {"authorId": "2148325595", "name": "Matineh Pooshideh"}, {"authorId": "2047067184", "name": "Nabi Rezvani"}, {"authorId": "24901061", "name": "A. Beheshti"}]}, {"paperId": "8c1bb43628ac320166b635b8aa521c13b83e25a8", "externalIds": {"DOI": "10.1016/b978-0-12-820125-1.00017-8", "CorpusId": 245980953}, "url": "https://www.semanticscholar.org/paper/8c1bb43628ac320166b635b8aa521c13b83e25a8", "title": "A brief introduction to supervised, unsupervised, and reinforcement learning", "abstract": null, "venue": "Biosignal Processing and Classification Using Computational Learning and Intelligence", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Biosignal Processing and Classification Using Computational Learning and Intelligence"}, "authors": [{"authorId": "34970419", "name": "E. Morales"}, {"authorId": "1742688", "name": "H. Escalante"}]}, {"paperId": "3ebeaa05b88a4afba1fac2ca5e5b9f8e50796810", "externalIds": {"DOI": "10.1007/978-3-030-92537-6_21", "CorpusId": 245638546}, "url": "https://www.semanticscholar.org/paper/3ebeaa05b88a4afba1fac2ca5e5b9f8e50796810", "title": "The Role of Artificial Intelligence Technology in Improving the Resilience of Supply Chain During COVID-19", "abstract": null, "venue": "Advances in Artificial Systems for Medicine and Education V", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Advances in Artificial Systems for Medicine and Education V"}, "authors": [{"authorId": "2115547706", "name": "Zhong Zheng"}, {"authorId": "2116290749", "name": "G. Zhang"}, {"authorId": "2108866581", "name": "Yun Lin"}, {"authorId": "2111245477", "name": "Yanfang Pan"}, {"authorId": "2145998276", "name": "Yandong He"}]}, {"paperId": "9fe3027bb2e9c4bb95fe71675109673f552d050b", "externalIds": {"DBLP": "journals/csse/AdekolaUSDMOAEK22", "DOI": "10.32604/csse.2022.021029", "CorpusId": 243999428}, "url": "https://www.semanticscholar.org/paper/9fe3027bb2e9c4bb95fe71675109673f552d050b", "title": "Object Tracking-Based \"Follow-Me\" Unmanned Aerial Vehicle (UAV) System", "abstract": "The applications of information technology (IT) tools and techniques have, over the years, simplified complex problem solving procedures. But the power of automation is inhibited by the technicality in manning advanced equipment. To this end, tools deliberately combating this inhibition and advancing technological growth are the Unmanned Aerial Vehicles (UAVs). UAVs are rapidly taking over major industries such as logistics, security, and cinematography. Among others, this is a very efficient way of carrying out missions unconventional to humans. An application area of this technology is the local film industry which is not producing quality movies primarily due to the lack of technical know-how in utilizing these systems. This study therefore aim to devise an autonomous object tracking UAV system that would eliminate the complex procedure involved in stabilizing an aerial camera (aerial bot) midair and promote the creation of quality aerial video shooting. The study adopted Unified Modeling Language (UML) tools in modeling the system\u2019s functionality. The traditional Server-Client model architecture was adopted. The OpenCV library employed proved highly efficient in aiding the tracking procedure. The system provided a usable web controller which provides easy interaction between the pilot and the drone. Conclusively, investments in UAVs would enhance creation of quality graphic contents.", "venue": "Comput. Syst. Sci. Eng.", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "41", "pages": "875-890", "name": "Comput. Syst. Sci. Eng."}, "authors": [{"authorId": "143703557", "name": "O. Adekola"}, {"authorId": "2142976698", "name": "Onyedikachi Kenny Udekwu"}, {"authorId": "2143008219", "name": "Oluwatobi Tolulope Saliu"}, {"authorId": "2042235630", "name": "D. Dada"}, {"authorId": "72967275", "name": "Stephen O. Maitanmi"}, {"authorId": "3067714", "name": "Victor Odumuyiwa"}, {"authorId": "2140085122", "name": "O. Alao"}, {"authorId": "49296041", "name": "M. Eze"}, {"authorId": "52087390", "name": "F. A. Kasali"}, {"authorId": "2140110105", "name": "Ayokunle Omotunde"}]}, {"paperId": "cf65602ffdffd0958cacb2bf118d64787a90d446", "externalIds": {"MAG": "3203641768", "DOI": "10.4018/978-1-7998-7959-6.ch004", "CorpusId": 244189400}, "url": "https://www.semanticscholar.org/paper/cf65602ffdffd0958cacb2bf118d64787a90d446", "title": "Transforming CRM Through Artificial Intelligence", "abstract": "The present times are disrupting times for every kind of business and every aspect of a business. It is not about contactlessness; it is about seamlessness. The auto manufacturers have already started \u201cAmazoning\u201d dealerships. Brands are developing customer-specific platforms like jaguar.rockar.com, where one can explore the range, check the price, select dealer, search inventory, and schedule test drives. The brand Cadillac creates virtual reality experiences in Google Search, wherein a car appears in a living room through a phone call. One can see how it looks, walk around it, open the doors, and get a sense of the interior. This chapter explores the transformation of CRM through artificial intelligence.", "venue": "Advances in Marketing, Customer Relationship Management, and E-Services", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Advances in Marketing, Customer Relationship Management, and E-Services"}, "authors": [{"authorId": "9448829", "name": "Abhinav Chaturvedi"}, {"authorId": "115811848", "name": "M. Chaturvedi"}]}, {"paperId": "f71c6b6d02a6715276b4f8694fd77212577fa050", "externalIds": {"ACL": "2021.sigdial-1.41", "DBLP": "conf/sigdial/DogruozS21", "ArXiv": "2211.13560", "DOI": "10.48550/arXiv.2211.13560", "CorpusId": 237099289}, "url": "https://www.semanticscholar.org/paper/f71c6b6d02a6715276b4f8694fd77212577fa050", "title": "How \u201copen\u201d are the conversations with open-domain chatbots? A proposal for Speech Event based evaluation", "abstract": "Open-domain chatbots are supposed to converse freely with humans without being restricted to a topic, task or domain. However, the boundaries and/or contents of open-domain conversations are not clear. To clarify the boundaries of \u201copenness\u201d, we conduct two studies: First, we classify the types of \u201cspeech events\u201d encountered in a chatbot evaluation data set (i.e., Meena by Google) and find that these conversations mainly cover the \u201csmall talk\u201d category and exclude the other speech event categories encountered in real life human-human communication. Second, we conduct a small-scale pilot study to generate online conversations covering a wider range of speech event categories between two humans vs. a human and a state-of-the-art chatbot (i.e., Blender by Facebook). A human evaluation of these generated conversations indicates a preference for human-human conversations, since the human-chatbot conversations lack coherence in most speech event categories. Based on these results, we suggest (a) using the term \u201csmall talk\u201d instead of \u201copen-domain\u201d for the current chatbots which are not that \u201copen\u201d in terms of conversational abilities yet, and (b) revising the evaluation methods to test the chatbot conversations against other speech events.", "venue": "SIGDIAL Conferences", "year": 2022, "referenceCount": 28, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-24", "journal": {"volume": "abs/2211.13560", "name": "ArXiv"}, "authors": [{"authorId": "1904399", "name": "A. Seza Do\u011fru\u00f6z"}, {"authorId": "1711959", "name": "Gabriel Skantze"}]}, {"paperId": "8afab76a0c94ab7ace7ec7371273cad085485e98", "externalIds": {"DOI": "10.3389/fcomp.2021.766053", "CorpusId": 247478809}, "url": "https://www.semanticscholar.org/paper/8afab76a0c94ab7ace7ec7371273cad085485e98", "title": "On the Frontiers of Software Science and Software Engineering", "abstract": "Advances in software engineering, software science, computational intelligence, and intelligent mathematics have led to the establishment of Frontiers in Computer Science\u2014Software (FCSS). FCSS aims to promote transdisciplinary research on software science and engineering (SSE), autonomous systems, and computational intelligence. FCSS covers not only classical empirical software engineering and industrial processes, but also contemporary topics of software science, intelligent programming languages, autonomous code generation, mathematical foundations of software, and programming knowledge bases. FCSS reports empirical studies and emerging topics in software engineering including tools, development platforms, industrial processes, management infrastructures, quality assurance schemes, big data systems, and software migrations across languages and platforms.", "venue": "Frontiers in Computer Science", "year": 2022, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-17", "journal": {"volume": "3"}, "authors": [{"authorId": "1700522", "name": "Guoyin Wang"}]}, {"paperId": "a6052113eb4a201782e78deae5fd888e5d77b5b3", "externalIds": {"PubMedCentral": "8789682", "DOI": "10.3389/fpsyg.2021.643276", "CorpusId": 245926123, "PubMed": "35095629"}, "url": "https://www.semanticscholar.org/paper/a6052113eb4a201782e78deae5fd888e5d77b5b3", "title": "Cognition Without Neural Representation: Dynamics of a Complex System", "abstract": "This paper proposes an account of neurocognitive activity without leveraging the notion of neural representation. Neural representation is a concept that results from assuming that the properties of the models used in computational cognitive neuroscience (e.g., information, representation, etc.) must literally exist the system being modelled (e.g., the brain). Computational models are important tools to test a theory about how the collected data (e.g., behavioural or neuroimaging) has been generated. While the usefulness of computational models is unquestionable, it does not follow that neurocognitive activity should literally entail the properties construed in the model (e.g., information, representation). While this is an assumption present in computationalist accounts, it is not held across the board in neuroscience. In the last section, the paper offers a dynamical account of neurocognitive activity with Dynamical Causal Modelling (DCM) that combines dynamical systems theory (DST) mathematical formalisms with the theoretical contextualisation provided by Embodied and Enactive Cognitive Science (EECS).", "venue": "Frontiers in Psychology", "year": 2022, "referenceCount": 149, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-12", "journal": {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "2767883", "name": "In\u00eas Hip\u00f3lito"}]}, {"paperId": "82bf8909e1f2a5fd31891d4944403b1b67a5555b", "externalIds": {"DOI": "10.22214/ijraset.2021.39717", "CorpusId": 245719855}, "url": "https://www.semanticscholar.org/paper/82bf8909e1f2a5fd31891d4944403b1b67a5555b", "title": "Music Recommender System Using ChatBot", "abstract": "Abstract: In this era of technological advances, text-based music recommendations are much needed as they will help humans relieve stress with soothing music according to their moods. In this project, we have implemented a chatbot that recommends music based on the user's text tone. By analyzing the tone of the text expressed by the user, we can identify the mood. Once the mood is identified, the application will play songs in the form of a web page based on the user's choice as well as his current mood. In our proposed system, themain goal is to reliably determine a user's mood based on their text tone with an application that can be installed on the user's desktop. In today's world, human computer interaction (HCI) plays a crucial role, and the most popular concept in HCI is recognition of emotion from text. As part of this process, the frontal view of the user's text is used to determine the mood. The extraction of text tone from the user's text is anotherimportant aspect. We have used IBM Analyser to check the text tone of the user and to predict the mood based on the text of the user, and Last.FM API to recommend songs based on themood of the user. Keywords: Introduction, Product-Architecture, Tone Analyzer, Music Classification Based on Mood, Acoustic Analysis, Experiment, Future/Current Use, Importance, Background, Literature Survey, Methodology, Equations, Planning, Tools and Technology, Conclusion.", "venue": "International Journal for Research in Applied Science and Engineering Technology", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-31", "journal": {"name": "International Journal for Research in Applied Science and Engineering Technology"}, "authors": [{"authorId": "2148703549", "name": "Shivam Sakore"}]}, {"paperId": "3894973d1dce2a9d75af9da75001c15474b55296", "externalIds": {"DOI": "10.1177/10778004211065813", "CorpusId": 245628321}, "url": "https://www.semanticscholar.org/paper/3894973d1dce2a9d75af9da75001c15474b55296", "title": "Rethinking the Politics of Creativity: Posthumanism, Indigeneity, and Creativity Beyond the Western Anthropocene", "abstract": "With the emergence of Western posthuman understandings, new materialism, artificial intelligence (AI), and the growing acknowledgment of Indigenous epistemologies, an ongoing rethinking of existing assumptions and meanings about creativity is needed. The intersection of new technologies and philosophical stances that upend human-centered views of reality suggests that creativity is not an exclusively \u201chuman\u201d activity. This opens new possibilities and assemblages for conceiving of creativity, but not without tensions. In this article, we connect multiple threads, to reimagine creativity in light of posthuman understandings and the possibilities for creative emergence beyond the Anthropocene. Creativity is implicated as emerging beyond non-human spaces, such as through digitality and AI or sources in the natural world. This unseats many understandings of creativity as positioned in Euro-Western literature. We offer four areas of concern for interrogating tensions in this area, aiming to open new possibilities for practice, research, and (re)conceptualization beyond Western understandings.", "venue": "Qualitative Inquiry", "year": 2021, "referenceCount": 96, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-30", "journal": {"volume": "28", "pages": "465 - 475", "name": "Qualitative Inquiry"}, "authors": [{"authorId": "31923945", "name": "D. Henriksen"}, {"authorId": "51325072", "name": "Edwin Creely"}, {"authorId": "39099504", "name": "Rohit Mehta"}]}, {"paperId": "39cafec3d81d855d2a8801e01e7baaf08eaaed5c", "externalIds": {"DOI": "10.2196/preprints.35949", "CorpusId": 246085159}, "url": "https://www.semanticscholar.org/paper/39cafec3d81d855d2a8801e01e7baaf08eaaed5c", "title": "Artificial Intelligence Technologies for Detection and Quantification of Hepatic Steatosis: A Scoping Review (Preprint)", "abstract": "\n BACKGROUND\n Non-alcoholic fatty liver disease linked to an increased risk of morbidity and mortality in afflicted individuals. Non-invasive liver imaging technologies such ultrasound (US) is the preferable method for screening hepatic steatosis because to its non-invasiveness, cheap cost, and widespread availability.\nArtificial intelligence (AI), in particular deep learning algorithms, has garnered widespread notice for its superior performance on image identification and quantification. They are capable of quantitatively assessing complicated medical image properties automatically and achieving better diagnostic accuracy while increasing efficiency. AI is frequently utilized and gaining popularity in the field of liver medical imaging, which includes radiology, nuclear medicine and ultrasound. AI can assist physicians in making more accurate and reproducible imaging diagnoses while also reducing the workload of physicians.\n \n \n OBJECTIVE\n The primary purpose of this work was to conduct a scoping review of artificial intelligence technologies for hepatic steatosis detection and quantification. It also aimed to explore the role of AI technologies on Ultrasonography for the detection and quantification of hepatic steatosis.\n \n \n METHODS\n The researcher searched several electronic bibliographies including Google Scholar, PubMed, EMBASE, CINAHL, PsychINFO, ACM Digital, IEEEXplore, and Scopus. The references retrieved were investigated for additional relevant studies through the backward and forward reference list checking strategy. One reviewer carried out the studies selection and data extraction.\n \n \n RESULTS\n A total of 718 publications were retrieved; 268 duplicates were removed. After scanning the titles and abstracts, 234 were excluded. After scanning the full texts, many articles were excluded for the following reasons: studies focusing on diseases other than liver parenchymal diseases (n = 39), studies that did not confirm the specified outcomes or confirmation study population (n = 58), studies that were not original research, i.e., reviews, editorials (n = 106), and studies not written in English (n = 8). The qualitative analysis comprised a total of 25 publications.\n \n \n CONCLUSIONS\n This review illustrates the potential for AI systems to aid in the diagnosis and stage of liver fibrosis and non-alcoholic fatty liver disease. By incorporating AI into established noninvasive methods, effective diagnostic tools with an ideal mix of sensitivity and specificity are created. Before adopting these AI-assisted systems in clinical practice, it is necessary to validate these models in additional independent cohorts.\n", "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-23", "journal": null, "authors": [{"authorId": "51139216", "name": "Fahad Alshagathrh"}]}, {"paperId": "ab600896f6657d00852d4a21e2d375e28c38224f", "externalIds": {"DBLP": "journals/ais/Tzouganatou22", "DOI": "10.1007/s00146-021-01361-3", "CorpusId": 245467431}, "url": "https://www.semanticscholar.org/paper/ab600896f6657d00852d4a21e2d375e28c38224f", "title": "Openness and privacy in born-digital archives: reflecting the role of AI development", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-23", "journal": {"volume": "37", "pages": "991 - 999", "name": "AI & SOCIETY"}, "authors": [{"authorId": "117313976", "name": "A. Tzouganatou"}]}, {"paperId": "234e02d99b207165a657851fd55646cdf6003748", "externalIds": {"DBLP": "journals/fcomp/EvenBB21", "DOI": "10.3389/fcomp.2021.774763", "CorpusId": 245427384}, "url": "https://www.semanticscholar.org/paper/234e02d99b207165a657851fd55646cdf6003748", "title": "Assessing the Believability of Computer Players in Video Games: A New Protocol and Computer Tool", "abstract": "In this paper, we address the challenge of believability in multiplayer video games. Our contribution is a system for assessing the believability of computer players. The state of the art examines existing methods and identifies seven distinguishing features that differ considerably from one assessment to the next. Our investigation reveals that assessment procedures typically alter gameplay, posing a considerable danger of bias. This is a major flaw since computer players are evaluated in a specific context rather than in the context of the game as it should be played, potentially skewing the findings of the evaluation. As a result, we begin on a trial-and-error process, with each new proposal building on the achievements of the previous one while removing the flaws. New proposals are tested with new assessments, a total of three experiments are then presented. We created a computer program that partially automates the execution of the assessment procedure, making these trials easier to implement. At the end, thanks to our proposal, gamers can assess the believability of computer players indirectly by employing reporting forms that alert users to the presence of bots. We assume that the more a bot is reported, the less credible it becomes. We ran a final experiment to test our proposal, which yielded extremely encouraging results.", "venue": "Frontiers in Computer Science", "year": 2021, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-23", "journal": {"volume": "3"}, "authors": [{"authorId": "31571192", "name": "Cindy Even"}, {"authorId": "1962736", "name": "Anne-Gwenn Bosser"}, {"authorId": "1753287", "name": "C\u00e9dric Buche"}]}, {"paperId": "deafac3f3a4b8c83735ff9bd219224ebc9b1ec6a", "externalIds": {"DBLP": "series/synthesis/2021Shanthamallu", "DOI": "10.2200/s01135ed1v01y202109spr022", "CorpusId": 245428047}, "url": "https://www.semanticscholar.org/paper/deafac3f3a4b8c83735ff9bd219224ebc9b1ec6a", "title": "Machine and Deep Learning Algorithms and Applications", "abstract": null, "venue": "Synthesis Lectures on Signal Processing", "year": 2021, "referenceCount": 78, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-22", "journal": {"pages": "1-123"}, "authors": [{"authorId": "40692862", "name": "U. Shanthamallu"}, {"authorId": "144924839", "name": "A. Spanias"}]}, {"paperId": "9f53de089438862ce5500e35231f068cbb7b3376", "externalIds": {"DOI": "10.22290/jbnc.v32i1.1938", "CorpusId": 245158647}, "url": "https://www.semanticscholar.org/paper/9f53de089438862ce5500e35231f068cbb7b3376", "title": "Horizonte de la Inteligencia Artificial y Neurociencias", "abstract": "La inteligencia artificial permite que los procesos cerebrales sean analizados como procesos computacionales. Presenta dos l\u00edneas inquietantes: el Proyecto Robot, llamado androide cuando es antropom\u00f3rtico, y el Proyecto Cyborg. Los robos est\u00e1n destinados a tareas repetitivas, riesgosas o de precisi\u00f3n, en las que pueden superar las limitaciones humanas, no percibi\u00e9ndose conflictos \u00e9ticos aunque s\u00ed nuevos desaf\u00edos en la organizaci\u00f3n social. Respecto de los androides, m\u00e1s all\u00e1 de sus capacidades, habr\u00e1 que considerar los efectos que puedan ocurrir en el ser humano durante la interacci\u00f3n con la m\u00e1quina, como el impacto de la m\u00edmica androide sobre la emoci\u00f3n y estado de \u00e1nimo. Los cyborgs son criaturas compuestas por elementos org\u00e1nicos y cibern\u00e9ticos cuya finalidad es emular o mejorar las capacidades de la parte org\u00e1nica. No se reconoce conflicto en su empleo para rehabilitaci\u00f3n o para suplir funciones alteradas o ausentes; aspectos negativos ser\u00edan su uso para la manipulaci\u00f3n. Otra aplicaci\u00f3n del proyecto cyborg a considerar es el enhancement, t\u00e9rmino utilizado en la literatura anglosajona para definir el aumento de facultades neurocognitivas o sensoriales mediante la estimulaci\u00f3n transcraneal o intracraneal. El conflicto neuro\u00e9tico surge porque el objetivo no es curar sino la perfectibilidad, o nuevas modalidades de percepci\u00f3n. Los profesionales de la salud deben actuar en un entorno nuevo y cambiante que trasciende las neurociencias y la salud p\u00fablica. El progreso contin\u00faa; por lo que se debe informar a la sociedad, anticipar dilemas, y ofrecer espacios de reflexi\u00f3n para la toma de decisiones individuales y para la especie humana.", "venue": "JBNC - JORNAL BRASILEIRO DE NEUROCIRURGIA", "year": 2021, "referenceCount": 25, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-14", "journal": {"name": "JBNC - JORNAL BRASILEIRO DE NEUROCIRURGIA"}, "authors": [{"authorId": "2079365684", "name": "Alejandra T. Rabad\u00e1n"}]}, {"paperId": "e267100233053e6eb211dc97d90e11908ff9bd15", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.7", "CorpusId": 245419258}, "url": "https://www.semanticscholar.org/paper/e267100233053e6eb211dc97d90e11908ff9bd15", "title": "ON THE ASIAN FETISH AND THE FANTASY OF EQUALITY", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "be9ea8dbd00eff1b3efb37d2e0b9b260ab37b58a", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.5", "CorpusId": 245416353}, "url": "https://www.semanticscholar.org/paper/be9ea8dbd00eff1b3efb37d2e0b9b260ab37b58a", "title": "RACIST CUTE", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "021fc875fe3d82b0c212480014889b3fb35ea716", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.6", "CorpusId": 245412652}, "url": "https://www.semanticscholar.org/paper/021fc875fe3d82b0c212480014889b3fb35ea716", "title": "ASIAN \u2022 FEMALE \u2022 ROBOT \u2022 SLAVE", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "0f928b7f6bf0616c2c9a2dc77feee60ffa9d51a9", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.4", "CorpusId": 245416273}, "url": "https://www.semanticscholar.org/paper/0f928b7f6bf0616c2c9a2dc77feee60ffa9d51a9", "title": "RACIAL TRANSITIONAL OBJECTS", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "d00a84812cbadea747ffdc1ce1130f123c651a08", "externalIds": {"DOI": "10.1098/rstb.2021.0117", "CorpusId": 245118061, "PubMed": "34894727"}, "url": "https://www.semanticscholar.org/paper/d00a84812cbadea747ffdc1ce1130f123c651a08", "title": "Artificial evolution of robot bodies and control: on the interaction between evolution, learning and culture", "abstract": "We survey and reflect on how learning (in the form of individual learning and/or culture) can augment evolutionary approaches to the joint optimization of the body and control of a robot. We focus on a class of applications where the goal is to evolve the body and brain of a single robot to optimize performance on a specified task. The review is grounded in a general framework for evolution which permits the interaction of artificial evolution acting on a population with individual and cultural learning mechanisms. We discuss examples of variations of the general scheme of \u2018evolution plus learning\u2019 from a broad range of robotic systems, and reflect on how the interaction of the two paradigms influences diversity, performance and rate of improvement. Finally, we suggest a number of avenues for future work as a result of the insights that arise from the review. This article is part of a discussion meeting issue \u2018The emergence of collective knowledge and cumulative culture in animals, humans and machines\u2019.", "venue": "Philosophical Transactions of the Royal Society B", "year": 2021, "referenceCount": 56, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-12-13", "journal": {"volume": "377", "name": "Philosophical Transactions of the Royal Society B"}, "authors": [{"authorId": "144988281", "name": "E. Hart"}, {"authorId": "2145007657", "name": "L\u00e9ni K. Le Goff"}]}, {"paperId": "2a95bc2da1f09895d747dca1407169b8699c8791", "externalIds": {"DOI": "10.18820/24150479/aa53i2/8", "CorpusId": 245160656}, "url": "https://www.semanticscholar.org/paper/2a95bc2da1f09895d747dca1407169b8699c8791", "title": "The healing-growth future of humanity: regenerative politics and crealectic care", "abstract": "The 2020 coronavirus pandemic served to remind us that despite our Cartesian fantasies of control, naturing nature (natura naturans) is still active in the form of an untamed Other. The dominant reaction on most political sides was anthropocentric: if we do something \u2013 a doing generally framed within the scope of technique and management \u2013 nature shall go back to the kind and submissive non-viral neutrality that we appreciate in \u2018her\u2019 as a supposedly passive resource for productivism. How could humanity \u2013 a pandemic species itself and not only metaphorically \u2013 be better attuned with the powers of naturing nature, in a posture of co-creation rather than of a reactive technocratic war against the non-periodic or \u2018monstrous\u2019 aspects of life? This question is a matter of philosophical health: the future of humanity does not depend on statistics and logistics, but on the possibility of a philosophical (re)generative politics, a trustful care for creative singularity rather than an anxious control and production of regularity. Humanity\u2019s collective health presupposes this reconciliation with naturing nature and the deployment of a global shared cosmology based on the creative healing-growth flux of originative creativity. This regenerative and life-affirming creative Real is here termed \u2018Creal\u2019, and we call \u2018crealectics\u2019 the generative philosophical health that favours healing growth.", "venue": "Acta Academica", "year": 2021, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Acta Academica"}, "authors": [{"authorId": "1753256795", "name": "Luis de Miranda"}]}, {"paperId": "26a377b7b1b3b6bd609c4feb58c0da5696c78711", "externalIds": {"DOI": "10.1080/09515089.2021.2014802", "CorpusId": 245149983}, "url": "https://www.semanticscholar.org/paper/26a377b7b1b3b6bd609c4feb58c0da5696c78711", "title": "Cognition as the sensitive management of an agent\u2019s behavior", "abstract": "ABSTRACT Cognitive science is unusual in that cognitive scientists have dramatic disagreements about the extension of their object of study, cognition. This paper defends a novel analysis of the scientific concept of cognition: that cognition is the sensitive management of an agent\u2019s behavior. This analysis is \u201cmodular,\u201d so that its extension varies depending on how one interprets certain of its constituent terms. I argue that these variations correspond to extant disagreements between cognitive scientists. This correspondence is evidence that the proposed analysis models the contemporary understanding of cognition among scientists, without artificially resolving questions that are currently considered open.", "venue": "Philosophical Psychology", "year": 2021, "referenceCount": 83, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"volume": "35", "pages": "718 - 741", "name": "Philosophical Psychology"}, "authors": [{"authorId": "32712504", "name": "Mikio Akagi"}]}, {"paperId": "e4c3415e115aeb388623a3898d34c4b086ec5018", "externalIds": {"PubMedCentral": "8786277", "DOI": "10.1042/ETLS20210212", "CorpusId": 245007000, "PubMed": "34881776"}, "url": "https://www.semanticscholar.org/paper/e4c3415e115aeb388623a3898d34c4b086ec5018", "title": "Artificial intelligence, molecular subtyping, biomarkers, and precision oncology", "abstract": "A targeted cancer therapy is only useful if there is a way to accurately identify the tumors that are susceptible to that therapy. Thus rapid expansion in the number of available targeted cancer treatments has been accompanied by a robust effort to subdivide the traditional histological and anatomical tumor classifications into molecularly defined subtypes. This review highlights the history of the paired evolution of targeted therapies and biomarkers, reviews currently used methods for subtype identification, and discusses challenges to the implementation of precision oncology as well as possible solutions.", "venue": "Emerging topics in life sciences", "year": 2021, "referenceCount": 104, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-12-09", "journal": {"volume": "5", "pages": "747 - 756", "name": "Emerging Topics in Life Sciences"}, "authors": [{"authorId": "143787989", "name": "J. Shen"}]}, {"paperId": "d3bbd46fb28b1904c9152796a538fb3f7291d08c", "externalIds": {"DBLP": "conf/icta/ShehataTH21", "DOI": "10.1109/ICTA54582.2021.9809429", "CorpusId": 250300993}, "url": "https://www.semanticscholar.org/paper/d3bbd46fb28b1904c9152796a538fb3f7291d08c", "title": "An Analysis of International Conference Proceedings on Artificial General Intelligence (AGI) from 2008 to 2020: A Data-Mining Mapping Analysis", "abstract": "This paper analyzes the proceedings of 13 international conferences on Artificial General Intelligence AGI, that are part of the lecture notes in artificial intelligence. The motivation for this study is to explore the publication networks and areas where AGI could be useful to Information & Communication Technology ICT in education. SPSS and Microsoft Excel were used to enter, screen, clean and visualize the analysis of the data. Furthermore, all published proceedings were uploaded into Voyant Tools and VOSviewer for data mining and visualization. After obtaining the most frequently used keywords and terms, certain patterns lead to trends in the research on AGI. The analysis leads to discussions and suggestions of possible opportunities where AGI may be integrated with education to assist people with or without a disability. The contribution of the study is in the overall mapping analysis of the conference proceedings, which would inspire further exploration and collaboration with potential scholars, institutions, and countries.", "venue": "2021 8th International Conference on ICT & Accessibility (ICTA)", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-12-08", "journal": {"pages": "1-6", "name": "2021 8th International Conference on ICT & Accessibility (ICTA)"}, "authors": [{"authorId": "2174923997", "name": "Boulus Shehata"}, {"authorId": "27362922", "name": "A. Tlili"}, {"authorId": "2231264", "name": "Ronghuai Huang"}]}, {"paperId": "2cdf8d8291fa60942468cbebc12925a30f0e28d1", "externalIds": {"PubMedCentral": "8692947", "DOI": "10.3389/fnsys.2021.784404", "CorpusId": 244924541, "PubMed": "34955771"}, "url": "https://www.semanticscholar.org/paper/2cdf8d8291fa60942468cbebc12925a30f0e28d1", "title": "Evolutionary Advantages of Stimulus-Driven EEG Phase Transitions in the Upper Cortical Layers", "abstract": "Spatio-temporal brain activity monitored by EEG recordings in humans and other mammals has identified beta/gamma oscillations (20\u201380 Hz), which are self-organized into spatio-temporal structures recurring at theta/alpha rates (4\u201312 Hz). These structures have statistically significant correlations with sensory stimuli and reinforcement contingencies perceived by the subject. The repeated collapse of self-organized structures at theta/alpha rates generates laterally propagating phase gradients (phase cones), ignited at some specific location of the cortical sheet. Phase cones have been interpreted as neural signatures of transient perceptual experiences according to the cinematic theory of brain dynamics. The rapid expansion of essentially isotropic phase cones is consistent with the propagation of perceptual broadcasts postulated by Global Workspace Theory (GWT). What is the evolutionary advantage of brains operating with repeatedly collapsing dynamics? This question is answered using thermodynamic concepts. According to neuropercolation theory, waking brains are described as non-equilibrium thermodynamic systems operating at the edge of criticality, undergoing repeated phase transitions. This work analyzes the role of long-range axonal connections and metabolic processes in the regulation of critical brain dynamics. Historically, the near 10 Hz domain has been associated with conscious sensory integration, cortical \u201cignitions\u201d linked to conscious visual perception, and conscious experiences. We can therefore combine a very large body of experimental evidence and theory, including graph theory, neuropercolation, and GWT. This cortical operating style may optimize a tradeoff between rapid adaptation to novelty vs. stable and widespread self-organization, therefore resulting in significant Darwinian benefits.", "venue": "Frontiers in Systems Neuroscience", "year": 2021, "referenceCount": 136, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-08", "journal": {"volume": "15", "name": "Frontiers in Systems Neuroscience"}, "authors": [{"authorId": "143730789", "name": "R. Kozma"}, {"authorId": "2529891", "name": "B. Baars"}, {"authorId": "2139752384", "name": "Natalie Geld"}]}, {"paperId": "5a980aa843e40de5f91a243cbf680af273c797ba", "externalIds": {"DBLP": "journals/corr/abs-2112-03763", "ArXiv": "2112.03763", "CorpusId": 244920904}, "url": "https://www.semanticscholar.org/paper/5a980aa843e40de5f91a243cbf680af273c797ba", "title": "Creating Multimodal Interactive Agents with Imitation and Self-Supervised Learning", "abstract": "A common vision from science fiction is that robots will one day inhabit our physical spaces, sense the world as we do, assist our physical labours, and communicate with us through natural language. Here we study how to design artificial agents that can interact naturally with humans using the simplification of a virtual environment. We show that imitation learning of human-human interactions in a simulated world, in conjunction with self-supervised learning, is sufficient to produce a multimodal interactive agent, which we call MIA, that successfully interacts with non-adversarial humans 75% of the time. We further identify architectural and algorithmic techniques that improve performance, such as hierarchical action selection. Altogether, our results demonstrate that imitation of multi-modal, real-time human behaviour may provide a straightforward and surprisingly effective means of imbuing agents with a rich behavioural prior from which agents might then be fine-tuned for specific purposes, thus laying a foundation for training capable agents for interactive robots or digital assistants. A video of MIA\u2019s behaviour may be found at https://youtu.be/ZFgRhviF7mY.", "venue": "ArXiv", "year": 2021, "referenceCount": 39, "citationCount": 19, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-07", "journal": {"volume": "abs/2112.03763", "name": "ArXiv"}, "authors": [{"authorId": "2143271992", "name": "DeepMind Interactive Agents Team Josh Abramson"}, {"authorId": "37968006", "name": "Arun Ahuja"}, {"authorId": "104251960", "name": "Arthur Brussee"}, {"authorId": "32561676", "name": "Federico Carnevale"}, {"authorId": "147433059", "name": "Mary Cassin"}, {"authorId": "2143272333", "name": "Felix Fischer"}, {"authorId": "1737522", "name": "Petko Georgiev"}, {"authorId": "40034895", "name": "Alex Goldin"}, {"authorId": "3367786", "name": "Tim Harley"}, {"authorId": "145783676", "name": "Felix Hill"}, {"authorId": "145901789", "name": "P. Humphreys"}, {"authorId": "1572095637", "name": "Alden Hung"}, {"authorId": "2065404873", "name": "Jessica Landon"}, {"authorId": "2542999", "name": "T. Lillicrap"}, {"authorId": "20896818", "name": "Hamza Merzic"}, {"authorId": "50654556", "name": "Alistair Muldal"}, {"authorId": "35030998", "name": "Adam Santoro"}, {"authorId": "2143271833", "name": "Guy Scully"}, {"authorId": "51029932", "name": "Tamara von Glehn"}, {"authorId": "89504302", "name": "Greg Wayne"}, {"authorId": "1571809179", "name": "Nathaniel Wong"}, {"authorId": "2116550367", "name": "Chen Yan"}, {"authorId": "2070271342", "name": "Rui Zhu"}]}, {"paperId": "0f404607305fbbc90d6daf3b91ec05e217226ad9", "externalIds": {"ArXiv": "2112.06646", "CorpusId": 245123635}, "url": "https://www.semanticscholar.org/paper/0f404607305fbbc90d6daf3b91ec05e217226ad9", "title": "The Burst Market: the Next Leap for Humanity", "abstract": "Humans have a major challenge: how to share knowledge effectively. People often need quick informational help, like health/legal advice, shopping/cooking tips, insider opinion, etc. The needs are important and ubiquitous, and most could be satisfied via quick chats with others, who may or may not be experts. In fact, knowledge common to some is often sought by others; every human, expert or non-expert, young or old, has helpful values. Yet, the reality is that people usually cannot find helpers easily, end up spending much more time and money, or even get no answer at all. This signifies a critical issue: the current labour market, called by this paper the Conventional Market (CM), massively fails such Burst Jobs, leading to huge job opportunity losses and human intelligence underutilization. This paper attributes the failure to high transaction costs due to technology constraints. Thus, this paper proposes creating an online Burst Market (BM) letting people sell any services at their own price via video or audio chats lasting as short as a few seconds or minutes. The solution is feasible and lucrative thanks to technology progress. It will empower all people, including not only professionals but also the vast ordinary individuals, and create enormous part-time and full-time jobs. As a result, it will aid in poverty lifting and alleviate aging society problem as people will be able to earn income more easily, reduce AI-led unemployment through the highly intelligent BM jobs, maximize human values through the easy acquisition and sale of skills with Life-Long Working, and increase prosperity and human achievements thanks to the collaboration breakthrough. The BM will also reshape industries, and may cause a global power reshuffle or even the ultimate destruction of nations. In short, this paper proposes the concept of the BM and asserts that it will invoke the next leap for humanity.", "venue": "", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-05", "journal": null, "authors": [{"authorId": "2110710474", "name": "Vincent Zha"}]}, {"paperId": "ca981e61a0cce158035fc8d356f7a0d02657da14", "externalIds": {"DOI": "10.9734/ajrcos/2021/v12i430291", "CorpusId": 245042674}, "url": "https://www.semanticscholar.org/paper/ca981e61a0cce158035fc8d356f7a0d02657da14", "title": "Research on Chemical Process Optimization Based on Artificial Neural Network Algorithm", "abstract": "Artificial Neural Network (ANN) is established by imitating the human brain's nerve thinking mode. Because of its strong nonlinear mapping ability, fault tolerance and self-learning ability, it is widely used in many fields such as intelligent driving, signal processing, process control and so on. This article introduces the basic principles, development history and three common neural network types of artificial neural networks, BP neural network, RBF neural network and convolutional neural network, focusing on the research progress of the practical application of neural networks in chemical process optimization.", "venue": "Asian Journal of Research in Computer Science", "year": 2021, "referenceCount": 79, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-03", "journal": {"name": "Asian Journal of Research in Computer Science"}, "authors": [{"authorId": "2142046258", "name": "Fei Liang"}, {"authorId": "2146343555", "name": "Taowen Zhang"}]}, {"paperId": "504504bacc2fe95a820656cdaa292f56bd1dd6fd", "externalIds": {"DOI": "10.1111/1467-9752.12608", "CorpusId": 244884205}, "url": "https://www.semanticscholar.org/paper/504504bacc2fe95a820656cdaa292f56bd1dd6fd", "title": "Kant's doctrine of education and the problem of artificial intelligence", "abstract": null, "venue": "Journal of Philosophy of Education", "year": 2021, "referenceCount": 18, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-03", "journal": {"name": "Journal of Philosophy of Education"}, "authors": [{"authorId": "147327716", "name": "Leonid Kornilaev"}]}, {"paperId": "7773f65eba083baae09b02b3e77de2387fc9b338", "externalIds": {"ArXiv": "2112.01516", "DBLP": "journals/corr/abs-2112-01516", "CorpusId": 244799141}, "url": "https://www.semanticscholar.org/paper/7773f65eba083baae09b02b3e77de2387fc9b338", "title": "Ownership and Creativity in Generative Models", "abstract": "Machine learning generated content such as image artworks, textual poems and music become prominent in recent years. These tools attract much attention from the media, artists, researchers, and investors. Because these tools are data-driven, they are inherently different than the traditional creative tools which arises the question who may own the content that is generated by these tools? In this paper we aim to address this question, we start by providing a background to this problem, raising several candidates that may own the content and arguments for each one of them. Then we propose a possible algorithmic solution in the vision-based model\u2019s regime. Finally, we discuss the broader implications of this problem.", "venue": "ArXiv", "year": 2021, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-02", "journal": {"volume": "abs/2112.01516", "name": "ArXiv"}, "authors": [{"authorId": "2107086356", "name": "Omri Avrahami"}, {"authorId": "1582254810", "name": "Bar Tamir"}]}, {"paperId": "6402979a0ebe1468206ef4ee6869f7debe614049", "externalIds": {"DBLP": "journals/corr/abs-2112-01342", "ArXiv": "2112.01342", "CorpusId": 244799420}, "url": "https://www.semanticscholar.org/paper/6402979a0ebe1468206ef4ee6869f7debe614049", "title": "How not to Lie with a Benchmark: Rearranging NLP Leaderboards", "abstract": "Comparison with a human is an essential requirement for a benchmark for it to be a reliable measurement of model capabilities. Nevertheless, the methods for model comparison could have a fundamental flaw the arithmetic mean of separate metrics is used for all tasks of different complexity, different size of test and training sets. In this paper, we examine popular NLP benchmarks\u2019 overall scoring methods and rearrange the models by geometric and harmonic mean (appropriate for averaging rates) according to their reported results. We analyze several popular benchmarks including GLUE, SuperGLUE, XGLUE, and XTREME. The analysis shows that e.g. human level on SuperGLUE is still not reached, and there is still room for improvement for the current models.", "venue": "ArXiv", "year": 2021, "referenceCount": 24, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-02", "journal": {"volume": "abs/2112.01342", "name": "ArXiv"}, "authors": [{"authorId": "2142798760", "name": "Shavrina Tatiana"}, {"authorId": "2142750217", "name": "Malykh Valentin"}]}, {"paperId": "2d6d0cdd21a5beeb1aeabe946e804558f5926838", "externalIds": {"DOI": "10.1109/CSCI54926.2021.00192", "CorpusId": 249929158}, "url": "https://www.semanticscholar.org/paper/2d6d0cdd21a5beeb1aeabe946e804558f5926838", "title": "aMDH and TWIN: Two original honeypot-based approaches to protect swarms of drones", "abstract": "Drones and swarms of drones are now considered an additional tool for both civilian and military applications. As any computer-based system they can thus be (and are) the target of attacks and the consequences of such attacks can be dramatic for assets and people. We believe an approach based on honeypots that would attract the attention of attackers and would behave so that these attackers could not even understand they are in a honeypot and not in a real drone, would be a significant step towards the protection of these systems. Even though some prototypes exist, they do not fully address the fact of luring the attacker to believe he/she controls a real drone. In this paper we present our work to address this issue.", "venue": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-12-01", "journal": {"pages": "783-787", "name": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)"}, "authors": [{"authorId": "2343153", "name": "S. Chaumette"}, {"authorId": "2172228121", "name": "Titien Cubilier"}]}, {"paperId": "6efaa6e14c5a65630bdc9c5df65b5600dc52ad88", "externalIds": {"DOI": "10.1109/CECIT53797.2021.00145", "CorpusId": 247857755}, "url": "https://www.semanticscholar.org/paper/6efaa6e14c5a65630bdc9c5df65b5600dc52ad88", "title": "Outlook and Direction of AI Tour Guide Services - from the Lifelong Machine Learning View", "abstract": "Artificial intelligence (AI) has entered tourism and become a new service in a tour guide. AI technology can help tourism by providing customized services and attracting visitors to fight with the crisis of the COVID-19 epidemic. This paper introduces how AI tour guide services contribute to tourism and its main issues. The future development of AI tour guides also was discussed at the end and the authors believe lifelong machine learning is the key to developing AI tour guides.", "venue": "2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT)", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-12-01", "journal": {"pages": "802-806", "name": "2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT)"}, "authors": [{"authorId": "2161327005", "name": "Shuai Wang"}, {"authorId": "3155784", "name": "Xianbin Hong"}, {"authorId": "31177772", "name": "Noorliza Karia"}, {"authorId": "145158116", "name": "S. Guan"}, {"authorId": "1688436", "name": "Prudence W. H. Wong"}, {"authorId": "2074917758", "name": "K. Man"}, {"authorId": "2115519737", "name": "Dawei Liu"}]}, {"paperId": "87a59a6c7733a6c98087cd9a19c3ccf4b6ed2528", "externalIds": {"DOI": "10.1002/cepa.1650", "CorpusId": 245627104}, "url": "https://www.semanticscholar.org/paper/87a59a6c7733a6c98087cd9a19c3ccf4b6ed2528", "title": "Connecting Artificial Intelligence and Structural Glass Engineering \u2013 Overview, Potentials and Case Studies", "abstract": "This paper introduces the Artificial Intelligence (AI) technology to structural glass engineering and glass industry audience. The first part of the paper is concerned with lying nomenclature and theory foundation of AI and its subclasses of Machine and Deep Learning (ML/DL), elaborating the specific needs and requirements for the application in a structural glass context. A subsequent section explores applications of AI for different subjects within the production and quality assessment of glass products as well as the design, verification and monitoring of facades and glass structures. This paper presents successfully conducted industry projects by the authors, which are: supervised ML for material parameter identification of polymeric interlayers used in laminated glass, the prediction of sound insulation properties of insulation glass units and glass laminates and the application of computer vision DL methods to image classification of the Pummel test. A visionary outlook highlights how to use AI for future generative design and verification of glass structures for rapid collaborative prototyping. The summary and conclusion section wraps up the main findings for the applicability and impact of AI for the presented structural glass research and industry problems. This paper shows, that already by today in many cases AI, data, software and computing resources are already in place to successfully implement and conduct AI projects in the glass industry and structural glass engineering practice.", "venue": "ce/papers", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-01", "journal": {"volume": "4", "name": "ce/papers"}, "authors": [{"authorId": "7803749", "name": "M. A. Kraus"}, {"authorId": "13308611", "name": "M. Drass"}]}, {"paperId": "0fcb35c8eb8308d2d9bca08c71d6e59035ad20f9", "externalIds": {"DOI": "10.1088/1742-6596/2134/1/012005", "CorpusId": 245351838}, "url": "https://www.semanticscholar.org/paper/0fcb35c8eb8308d2d9bca08c71d6e59035ad20f9", "title": "Creation and implementation of a set of game strategies based on training neural networks with reinforcement learning", "abstract": "The study explores the problems of reinforcement learning and finding non-obvious play strategies using reinforcement learning. Two approaches to agent training (blind and pattern-based) are considered and implemented. The advantage of the self-learning approach with reinforcement using patterns as applied to a specific game (tic-tac-toe five in a row) is shown. Recorded and analyzed the use of unusual strategies by an agent using a pattern-based approach.", "venue": "Journal of Physics: Conference Series", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-12-01", "journal": {"volume": "2134", "name": "Journal of Physics: Conference Series"}, "authors": [{"authorId": "2146460795", "name": "D. S. Kozlov"}, {"authorId": "113737241", "name": "O. Polovikova"}]}, {"paperId": "2cb18f589ae071d139d47e63adc77a37d6e35405", "externalIds": {"DOI": "10.1177/02632764211054122", "CorpusId": 245299071}, "url": "https://www.semanticscholar.org/paper/2cb18f589ae071d139d47e63adc77a37d6e35405", "title": "Introduction: Algorithmic Thought", "abstract": "This introduction to a special section on algorithmic thought provides a framework through which the articles in that collection can be contextualised and their individual contributions highlighted. Over the past decade, there has been a growing interest in artificial intelligence (AI). This special section reflects on this AI boom and its implications for studying what thinking is. Focusing on the algorithmic character of computing machines and the thinking that these machines might express, each of the special section\u2019s essays considers different dimensions of algorithmic thought, engaging with a diverse set of epistemological questions and issues.", "venue": "Theory, Culture & Society", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-01", "journal": {"volume": "38", "pages": "5 - 11", "name": "Theory, Culture & Society"}, "authors": [{"authorId": "144499636", "name": "M. Fazi"}]}, {"paperId": "99e8e6c48083324e3041ad316c41a1f74729b9e4", "externalIds": {"MAG": "3196369313", "DOI": "10.1016/j.techfore.2021.121100", "CorpusId": 239659470}, "url": "https://www.semanticscholar.org/paper/99e8e6c48083324e3041ad316c41a1f74729b9e4", "title": "Cultural proximity bias in AI-acceptability: The importance of being human", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2021, "referenceCount": 94, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-01", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "102927759", "name": "Annie Tubadji"}, {"authorId": "2143568955", "name": "Haoran Huang"}, {"authorId": "38895112", "name": "D. Webber"}]}, {"paperId": "a57e3b67ebfeba1285f1b64d6dc3f99f8db2a340", "externalIds": {"DOI": "10.1016/j.jobe.2021.103299", "CorpusId": 240977118}, "url": "https://www.semanticscholar.org/paper/a57e3b67ebfeba1285f1b64d6dc3f99f8db2a340", "title": "Artificial intelligence in the construction industry: A review of present status, opportunities and future challenges", "abstract": null, "venue": "Journal of Building Engineering", "year": 2021, "referenceCount": 142, "citationCount": 39, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-01", "journal": {"name": "Journal of Building Engineering"}, "authors": [{"authorId": "118203969", "name": "Sofiat. Abioye"}, {"authorId": "1926817", "name": "Lukumon O. Oyedele"}, {"authorId": "151084718", "name": "L. \u00c0k\u00e0nb\u00ed"}, {"authorId": "37513131", "name": "A. Ajayi"}, {"authorId": "1861765828", "name": "Juan Manuel Davila Delgado"}, {"authorId": "1380103222", "name": "Muhammad Bilal"}, {"authorId": "2987639", "name": "Ol\u00fagb\u00e9nga O. Akinad\u00e9"}, {"authorId": "2119174865", "name": "Ashraf A. Ahmed"}]}, {"paperId": "3f174adb111174d94a3b578e9fb9bab282a3ebc7", "externalIds": {"DOI": "10.36253/cambio-10637", "CorpusId": 246379189}, "url": "https://www.semanticscholar.org/paper/3f174adb111174d94a3b578e9fb9bab282a3ebc7", "title": "Rewriting Marx to expose the data society and AI", "abstract": "As I show with examples from the Grundrisse and the Capital, some fundamentals of Marx\u2019s critique of political economy can be rewritten with simple substitutions to yield surprisingly pertinent analyses of today\u2019s \u201cinformation society\u201d and the role that data and AI play in it. The reason behind this strange phenomenon is that Marx\u2019s penetrating study of money as a dehumanizing abstraction and self-replicating capital can be extended with minor changes to the main abstraction and \u201cautomatic fetish\u201d of our historical regime: digital data. As money-capital tends to grow by itself independently of humans, so does data. AI is the main engine of this new dangerous cycle.\u00a0", "venue": "Cambio. Rivista sulle Trasformazioni Sociali", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-30", "journal": {"name": "Cambio. Rivista sulle Trasformazioni Sociali"}, "authors": [{"authorId": "2075094501", "name": "Stefano Diana"}]}, {"paperId": "5b3b2a0d9125e2ee4c9b8ca98bd963af1bbb288f", "externalIds": {"DOI": "10.1007/978-3-662-63449-3_3", "CorpusId": 244704005}, "url": "https://www.semanticscholar.org/paper/5b3b2a0d9125e2ee4c9b8ca98bd963af1bbb288f", "title": "Zur Frage der Ersetzbarkeit des Menschen durch KI\u00a0in der Forschung", "abstract": null, "venue": "Ethics of Science and Technology Assessment", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-11-27", "journal": {"name": "Ethics of Science and Technology Assessment"}, "authors": [{"authorId": "2845244", "name": "C. Gethmann"}]}, {"paperId": "21ab011a3adccbd912aea58f76b84b7873c41df3", "externalIds": {"ArXiv": "2111.13365", "CorpusId": 245838016}, "url": "https://www.semanticscholar.org/paper/21ab011a3adccbd912aea58f76b84b7873c41df3", "title": "Machines&Influence: An Information Systems Lens", "abstract": "Policymakers face a broader challenge of how to view AI capabilities today and where does society stand in terms of those capabilities. This paper surveys AI capabilities and tackles this very issue, exploring it in context of political security in digitally networked societies. We extend the ideas of Information Management to better understand contemporary AI systems as part of a larger and more complex information system. Comprehensively reviewing AI capabilities and contemporary man-machine interactions, we undertake conceptual development to suggest that better information management could allow states to more optimally offset the risks of AI enabled influence and better utilise the emerging capabilities which these systems have to offer to policymakers and political institutions across the world. Hopefully this long essay will actuate further debates and discussions over these ideas, and prove to be a useful contribution towards governing the future of AI.", "venue": "", "year": 2021, "referenceCount": 130, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-11-26", "journal": null, "authors": [{"authorId": "2151241746", "name": "Shashank Yadav"}]}, {"paperId": "cbbd2e052b19941613d0ec7a7b742951e998bfa3", "externalIds": {"ArXiv": "2111.14621", "CorpusId": 244715156}, "url": "https://www.semanticscholar.org/paper/cbbd2e052b19941613d0ec7a7b742951e998bfa3", "title": "Improving Customer Service Chatbots with Attention-based Transfer Learning", "abstract": "\u2014With growing societal acceptance and increasing cost ef\ufb01ciency due to mass production, service robots are beginning to cross from the industrial to the social domain. Currently, customer service robots tend to be digital and emulate social interactions through on-screen text, but state-of-the-art research points towards physical robots soon providing customer service in person. This article explores two possibilities. Firstly, whether transfer learning can aid in the improvement of customer service chatbots between business domains. Second, the implementation of a framework for physical robots for in-person interaction. Modelled on social interaction with Twitter customer support accounts, transformer-based chatbot models are initially assigned to learn one domain from an initial random weight distribution. Given shared vocabulary, each model is then tasked with learning another domain by transferring knowledge from the previous. Following studies on 19 different businesses, results show that the majority of models are improved when transferring weights from at least one other domain, in particular those that are more data-scarce than others. General language transfer learning occurs, as well as higher-level transfer of similar domain knowledge, in several cases. The chatbots are \ufb01nally implemented on Temi and Pepper robots, with feasibility issues encountered and solutions are proposed to overcome them.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-24", "journal": null, "authors": [{"authorId": "89293047", "name": "Jordan J. Bird"}]}, {"paperId": "e9732553a21d3c991e5d3dac1c18111e7d153875", "externalIds": {"DOI": "10.18800/themis.202101.018", "CorpusId": 247427896}, "url": "https://www.semanticscholar.org/paper/e9732553a21d3c991e5d3dac1c18111e7d153875", "title": "Miner\u00eda de textos y datos e Inteligencia Artificial: nuevas excepciones al derecho de autor", "abstract": "Existe una creciente atenci\u00f3n y discusi\u00f3n sobre\u00a0c\u00f3mo las leyes nacionales o los acuerdos internacionales\u00a0deber\u00edan permitir o impedir el derecho\u00a0fundamental a la investigaci\u00f3n por medio de la miner\u00eda de textos y datos, y la inteligencia artificial.\u00a0Este art\u00edculo examina c\u00f3mo las leyes de derechos\u00a0de autor est\u00e1n empezando a regular la materia.\u00a0Las m\u00e1s recientes modificaciones legislativas\u00a0comprenden la inclusi\u00f3n de nuevas excepciones y\u00a0limitaciones en las normas de reproducci\u00f3n, almacenamiento,\u00a0y comunicaci\u00f3n p\u00fablica de las obras.El an\u00e1lisis indica que las normas aprobadas o utilizadas\u00a0para regular la miner\u00eda de textos y datos\u00a0(TDM) var\u00edan en su contenido y objetivo de un pa\u00eds\u00a0a otro, lo que empieza a generar un entorno internacional\u00a0variado, inadecuado e incompatible para\u00a0el desarrollo de proyectos de investigaci\u00f3n basados\u00a0en miner\u00eda de textos y datos e inteligencia artificial.\u00a0Este art\u00edculo concluye con reflexiones centradas\u00a0en el derecho a la investigaci\u00f3n, la inteligencia\u00a0artificial, la miner\u00eda de textos y datos, y la creaci\u00f3n\u00a0de nuevas limitaciones y excepciones en las leyes\u00a0de derechos de autor.", "venue": "THEMIS Revista de Derecho", "year": 2021, "referenceCount": 71, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-11-22", "journal": {"name": "THEMIS Revista de Derecho"}, "authors": [{"authorId": "151023629", "name": "H. Izquierdo"}]}, {"paperId": "d257c67ae1c5c6cc1826e3b2603902e45a27f1ce", "externalIds": {"DOI": "10.21203/rs.3.rs-1082323/v1", "CorpusId": 244510349}, "url": "https://www.semanticscholar.org/paper/d257c67ae1c5c6cc1826e3b2603902e45a27f1ce", "title": "Implementing Implementation Science; A Bibliometric Study of Qualitative Research in Clinical Artificial Intelligence", "abstract": "\n Background\n\nImplementation science is a pragmatic and multidisciplinary field, centred on the application of a wide range of theoretical approaches to close \u2018know-do\u2019 gaps in healthcare. The implementation science community is made of individuals on a continuum between academia and practice, but it is unclear to what extent the theoretical deliberations of implementation academics are translated into the work of implementation practitioners and on to patient benefit. This bibliometric study aims to use the field of clinical artificial intelligence(AI) implementation to sample the prevalence and character of theoretically informed implementation practices.\nMethods\n\nQualitative research of key stakeholder perspectives on clinical AI published between 2014-2021 was systematically identified. Following title, abstract and full-text screening eligible articles were characterised in terms of their publication, AI tool and context studied, the theoretical approach if any and the research methods and quality. Descriptive, comparative and regression statistics were applied.\nResults\n\nOne-hundred-and-eleven studies met the eligibility criteria, with monthly eligible publication rate increasing from 0.7-4.0 between 2014-2021. Eligible studies represented 23 different nations and 25 different clinical specialities. A theoretical approach was explicitly employed in 39(35.1%) studies though 6 of these described novel theoretical approaches(15.1%) and the most frequently used theoretical approach was only used 3 times. There was no statistically significant trend in the prevalence of theoretically informed research within the study period. Of the 25 theoretically informed studies conducted in Europe or North America 19(76%) used theories that originated in the same continent.\nConclusions\n\nThe theoretical approaches which characterise implementation science are not being put to use as often as they could, and the means by which they are selected also seems suboptimal. The field may facilitate a greater synergy between theory and practice if the focus shifts from unifying implementation theories on to unifying and expanding the implementation community. By making more theoretical approaches accessible to practitioners and supporting their selection and application, theory could be more effectively harnessed to close healthcare\u2019s \u2018know-do gaps\u2019.\nProtocol registration\n PROSPERO ID 248025", "venue": "", "year": 2021, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-22", "journal": null, "authors": [{"authorId": "32243895", "name": "H. Hogg"}, {"authorId": "1404619882", "name": "M. Al-Zubaidy"}, {"authorId": "5638585", "name": "P. Keane"}, {"authorId": "2073398767", "name": "Fiona R Beyer"}, {"authorId": "2834652", "name": "G. Maniatopoulos"}]}, {"paperId": "0f86385490c2a063a2f4bc0ce06f05abc30c4412", "externalIds": {"MAG": "968815122", "DOI": "10.1007/978-94-007-2879-0_7", "CorpusId": 141991695}, "url": "https://www.semanticscholar.org/paper/0f86385490c2a063a2f4bc0ce06f05abc30c4412", "title": "Conclusion Part II", "abstract": null, "venue": "Cycling Pathways", "year": 2021, "referenceCount": 506, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-18", "journal": {"name": "Cycling Pathways"}, "authors": [{"authorId": "8872223", "name": "D. Courgeau"}]}, {"paperId": "28947b6eebf78ba0a6db89c9a7858c2a7f07dabe", "externalIds": {"DOI": "10.1109/ICSEC53205.2021.9684619", "CorpusId": 246363415}, "url": "https://www.semanticscholar.org/paper/28947b6eebf78ba0a6db89c9a7858c2a7f07dabe", "title": "The Prototype Development of Thai Language Understanding based on Mental Image Directed Semantic Theory", "abstract": "Nowadays, Artificial Intelligence (AI) has been embedded in various tools such as smart phones, even in those we might use unconsciously every day. However, AI technologies for automatic understanding human languages, namely, Natural Language Understanding (NLU) has been still far from its goal because of very difficult problems of semantics. This paper describes a prototype NLU system for Thai language based on Mental Image Directed Semantic Theory in order to help Thai language beginners more comprehensively. For the first step, Thai sentences of basic structures intended for amateur users were chosen for the system to process. In the system, input sentences are fragmented to detect constituent words and their grammatical relationships, and then transduced to semantic representations in a formal language named Language for Mental-image Description. The semantic interpretations are evaluated through reasoning processes such as disambiguation and entailment. Finally, the system returns animations as its understanding results of the inputs, in order to help language learners understand the text contents in a more intuitive way.", "venue": "2021 25th International Computer Science and Engineering Conference (ICSEC)", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-11-18", "journal": {"pages": "167-172", "name": "2021 25th International Computer Science and Engineering Conference (ICSEC)"}, "authors": [{"authorId": "3269611", "name": "Rojanee Khummongkol"}, {"authorId": "2151502770", "name": "Atisak Samart"}, {"authorId": "2151501746", "name": "Sarawut Chitthong"}, {"authorId": "1720292", "name": "M. Yokota"}]}, {"paperId": "6f30dfb5bec5365000d64b582467e1cc57c659ec", "externalIds": {"DOI": "10.1109/CINTI53070.2021.9668544", "CorpusId": 246301533}, "url": "https://www.semanticscholar.org/paper/6f30dfb5bec5365000d64b582467e1cc57c659ec", "title": "Applying Genetic Programming for the Inverse Lindenmayer Problem", "abstract": "The aim of this work is to find an automated solution for the Inverse Lindenmayer problem - that is to find the describing system for a given end-result of an L-system - using both Bacterial Programming and other related algorithms. To achieve this, several well-known L-systems were considered, their building symbols taken as the inputs for each algorithm, and the evolution results were compared with the formal definition of each system. The results indicate that this is indeed a viable area of research, as both Bacterial Programming and other different algorithms could be fitted to reverse engineer all of the considered systems.", "venue": "2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-18", "journal": {"pages": "000043-000048", "name": "2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)"}, "authors": [{"authorId": "2151291475", "name": "Tibor Eszes"}, {"authorId": "1762606", "name": "J\u00e1nos Botzheim"}]}, {"paperId": "33076a8afcb8cab1258762459e3493f1bbd4a8a2", "externalIds": {"PubMedCentral": "8598398", "DOI": "10.1007/s10708-021-10549-5", "CorpusId": 244401508, "PubMed": "34812217"}, "url": "https://www.semanticscholar.org/paper/33076a8afcb8cab1258762459e3493f1bbd4a8a2", "title": "Assessing internet and web services based webdom and virtual web-data-centric geographical study", "abstract": null, "venue": "GeoJournal", "year": 2021, "referenceCount": 66, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-18", "journal": {"volume": "87", "pages": "4991 - 5005", "name": "Geojournal"}, "authors": [{"authorId": "10124152", "name": "Abhay Sankar Sahu"}]}, {"paperId": "a3e496c48b21c122913351030e8520f00c578b6d", "externalIds": {"DOI": "10.1080/02508060.2021.2005332", "CorpusId": 245290473}, "url": "https://www.semanticscholar.org/paper/a3e496c48b21c122913351030e8520f00c578b6d", "title": "Water resource prospects for the next 50 years on the water planet: personal perspectives on a shared history from Earth Day, the Fourth Industrial Revolution and One Health to the futures of alternative energy, bioconvergence and quantum computing", "abstract": "ABSTRACT The history and the future of water resource management as well as the endeavours that it influences are inextricably woven into the fabric of the past, current and future states of all life on our watery planet. From the first Earth Day in 1970 and the founding of the International Water Resources Association (IWRA) in 1971 to the development of modern biotechnology applications and alternative energy sources across subsequent decades, this paper reflects on these and other historical underpinnings of how we manage the use of our essential water resources now and might hope to in the future.", "venue": "Water International", "year": 2021, "referenceCount": 155, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-17", "journal": {"volume": "46", "pages": "1158 - 1186", "name": "Water International"}, "authors": [{"authorId": "81501813", "name": "W. Jones"}]}, {"paperId": "2d4a6a04dc1b137276a511ca97066054400aef2d", "externalIds": {"DBLP": "journals/hhci/Hancock22", "DOI": "10.1080/07370024.2021.1970556", "CorpusId": 244281247}, "url": "https://www.semanticscholar.org/paper/2d4a6a04dc1b137276a511ca97066054400aef2d", "title": "Avoiding adverse autonomous agent actions", "abstract": "Few today would dispute that the age of autonomous machines is nearly upon us (cf., Kurzweil, 2005; Moravec, 1988), if it is not already. While it is doubtful that one can identify any fully autonomous machine system at this point in time, especially one that is openly and publicly acknowledged to be so, it is far less debatable that our present line of technological evolution is leading toward this eventuality (Endsley, 2017; Hancock, 2017a). It is this specter of the consequences of even existentially threatening adverse events, emanating from these penetrative autonomous systems, which is the focus of the present work. The impending and imperative question is what we intend to do about these prospective challenges? As with essentially all of human discourse, we can imagine two sides to this question. One side is represented by an optimistic vision of a near utopian future, underwritten by AI-support and some inherent degree of intrinsic benevolence. The opposing vision promulgates a dystopian nightmare in which machines have gained almost total ascendency and only a few \u201cplucky\u201d humans remain. The latter is most especially a featured trope of the human heroic narrative (Campbell, 1949). It will be most probably the case that neither of the extremes on this putative spectrum of possibilities will represent the eventual reality that we will actually experience. However, the ground rules are now in the process of being set which will predispose us toward one of these directions over the other (Feng et al., 2016; Hancock, 2017a). Traditionally, many have approached this general form of technological inquiry by asking questions about strengths, weaknesses, threats, and opportunities. Consequently, it is within this general framework that this present work is offered. What follows are some overall considerations of the balance of the value of such autonomous systems\u2019 inauguration and penetration. These observations provide the bedrock from which to consider the specific strengths, weaknesses, threats (risks), and promises (opportunity) dimensions. The specific consideration of the application of the protective strategies of the well-known hierarchy of controls (Haddon, 1973) then acts as a final prefatory consideration to the concluding discussion which examines the adverse actions of autonomous technological systems as a potential human existential threat. The term autonomy is one that has been, and still currently is, the subject of much attention, debate, and even abuse (and see Ezenkwu & Starkey, 2019). To an extent, the term seems to be flexible enough to encompass almost whatever the proximal user requires of it. For example, a simple, descriptive word-cloud (Figure 1), illustrates the various terminologies that surrounds our present use of this focal term. It is not the present purpose here to engage in a long, polemic and potentially unedifying dispute specifically about the term\u2019s definition. This is because the present concern is with autonomous technological systems, and not about the greater meaning of autonomy per se, either as a property or as a process. The definition which is adopted here is that: \u201cautonomous systems are generative and learn, evolve, and permanently change their functional capacities as a result of the input of operational and contextual information. Their actions necessarily become more", "venue": "Hum. Comput. Interact.", "year": 2021, "referenceCount": 126, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-16", "journal": {"volume": "37", "pages": "211 - 236", "name": "Human\u2013Computer Interaction"}, "authors": [{"authorId": "143605034", "name": "P. Hancock"}]}, {"paperId": "523f4c7248450e0aeb9f0e1430932269a8aa4831", "externalIds": {"DOI": "10.1007/s11845-021-02853-3", "CorpusId": 244120010, "PubMed": "34783968"}, "url": "https://www.semanticscholar.org/paper/523f4c7248450e0aeb9f0e1430932269a8aa4831", "title": "Artificial Intelligence: the future of medicine, or an overhyped and dangerous idea?", "abstract": null, "venue": "Irish Journal of Medical Science (1971 -)", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-16", "journal": {"volume": "191", "pages": "1991 - 1994", "name": "Irish Journal of Medical Science (1971 -)"}, "authors": [{"authorId": "2141310467", "name": "Shubhangi Karmakar"}]}, {"paperId": "1b1109ed7549c009738caccb4405a04373c82e51", "externalIds": {"MAG": "3212259563", "DOI": "10.1007/s00146-021-01308-8", "CorpusId": 245746878}, "url": "https://www.semanticscholar.org/paper/1b1109ed7549c009738caccb4405a04373c82e51", "title": "Operationalising AI ethics: barriers, enablers and next steps", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 38, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-15", "journal": {"name": "AI & SOCIETY"}, "authors": [{"authorId": "1751614630", "name": "J. Morley"}, {"authorId": "40901846", "name": "Libby Kinsey"}, {"authorId": "2600242", "name": "Anat Elhalal"}, {"authorId": "2110891416", "name": "Francesca Garcia"}, {"authorId": "79377716", "name": "M. Ziosi"}, {"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "492384a0fb95959811d378463f1ccbebbccdc8b1", "externalIds": {"PubMedCentral": "8634872", "DOI": "10.3389/fpsyg.2021.730112", "CorpusId": 244119544}, "url": "https://www.semanticscholar.org/paper/492384a0fb95959811d378463f1ccbebbccdc8b1", "title": "Vocabulary: Common or Basic?", "abstract": "Neither linguistics nor psychology offers a single, unified notion of simplicity, and therefore the simplest \u201ccore\u201d layer of vocabulary is hard to define in theory and hard to pinpoint in practice. In section 1 we briefly survey the main approaches, and distinguish two that are highly relevant to lexicography: we will call these common and basic. In sections 2 and 3 we compare these approaches, and in section 4 we point the reader to Kolmogorov complexity, unfamiliar as it may be to most working psychologists, lexicographers, and educators, as the best formal means to deal with core vocabulary.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-11-15", "journal": {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "2979211", "name": "Andr\u00e1s Kornai"}]}, {"paperId": "f027e28cdaaa56082f2e5d9fe14469e7341c1bfc", "externalIds": {"DBLP": "journals/corr/abs-2111-07263", "ArXiv": "2111.07263", "CorpusId": 244117863}, "url": "https://www.semanticscholar.org/paper/f027e28cdaaa56082f2e5d9fe14469e7341c1bfc", "title": "Code Representation Learning with Pr\u00fcfer Sequences", "abstract": "An effective and efficient encoding of the source code of a computer program is critical to the success of sequence-to-sequence deep neural network models for tasks in computer program comprehension, such as automated code summarization and documentation. A significant challenge is to find a sequential representation that captures the structural/syntactic information in a computer program and facilitates the training of the", "venue": "ArXiv", "year": 2021, "referenceCount": 58, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-14", "journal": {"volume": "abs/2111.07263", "name": "ArXiv"}, "authors": [{"authorId": "69893262", "name": "Tenzin Jinpa"}, {"authorId": "2145987061", "name": "Yong Gao"}]}, {"paperId": "9cb53b47412adc250e74c55fc31db970e64b08e3", "externalIds": {"DBLP": "journals/ais/Lengbeyer22", "DOI": "10.1007/s00146-021-01257-2", "CorpusId": 244092615}, "url": "https://www.semanticscholar.org/paper/9cb53b47412adc250e74c55fc31db970e64b08e3", "title": "Dismantling the Chinese Room with linguistic tools: a framework for elucidating concept-application disputes", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 58, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-12", "journal": {"volume": "37", "pages": "1625 - 1643", "name": "AI & SOCIETY"}, "authors": [{"authorId": "116774767", "name": "L. Lengbeyer"}]}, {"paperId": "7afb7153c128a8e3fd15618648e609495bd557ef", "externalIds": {"DBLP": "conf/hai/FarahSIG21", "DOI": "10.1145/3472307.3484677", "CorpusId": 243864766}, "url": "https://www.semanticscholar.org/paper/7afb7153c128a8e3fd15618648e609495bd557ef", "title": "Conveying the Perception of Humor Arising from Ambiguous Grammatical Constructs in Human-Chatbot Interaction", "abstract": "Chatbots have long been advocated for computer-assisted language learning systems to support learners with conversational practice. A particular challenge in such systems is explaining mistakes stemming from ambiguous grammatical constructs. Misplaced modifiers, for instance, do not make sentences ungrammatical, but introduce ambiguity through the misplacement of an adverb or prepositional phrase. In certain cases, the ambiguity gives rise to humor, which can serve to illustrate the mistake itself. We conducted an online experiment with 400 native English speakers to explore the use of a chatbot to harness such humor. In an interaction resembling an advanced grammar exercise, the chatbot presented participants with a phrase containing a misplaced modifier, explained the ambiguity in the phrase, acknowledged (or ignored) the humor that the ambiguity gave rise to, and suggested a correction. Participants then completed a questionnaire, rating the chatbot with respect to ten traits. A quantitative analysis showed a significant increase in how participants rated the chatbot\u2019s personality, humor, and friendliness when it acknowledged the humor arising from the misplaced modifier. This effect was observed whether the acknowledgment was conveyed using verbal, nonverbal (emoji), or mixed cues.", "venue": "HAI", "year": 2021, "referenceCount": 59, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-11-09", "journal": {"name": "Proceedings of the 9th International Conference on Human-Agent Interaction"}, "authors": [{"authorId": "6456697", "name": "J. C. Farah"}, {"authorId": "2148414522", "name": "Vandit Sharma"}, {"authorId": "48704546", "name": "Sandy Ingram"}, {"authorId": "145432296", "name": "D. Gillet"}]}, {"paperId": "086cbbbb174075cc2961c2135809bc547c12f2b8", "externalIds": {"ArXiv": "2111.04165", "DOI": "10.1007/978-3-030-80083-3_5", "CorpusId": 243847742}, "url": "https://www.semanticscholar.org/paper/086cbbbb174075cc2961c2135809bc547c12f2b8", "title": "On the Limits of Design: What Are the Conceptual Constraints on Designing Artificial Intelligence for Social Good?", "abstract": null, "venue": "", "year": 2021, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Economics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-07", "journal": null, "authors": [{"authorId": "2121755173", "name": "Jakob Mokander"}]}, {"paperId": "e17cf46ffac9dd3b19bf2731a9cb025c39c2fa20", "externalIds": {"DOI": "10.1007/s11229-021-03421-z", "CorpusId": 243829068}, "url": "https://www.semanticscholar.org/paper/e17cf46ffac9dd3b19bf2731a9cb025c39c2fa20", "title": "Byond the limits of imagination: abductive inferences from imagined phenomena", "abstract": null, "venue": "Synthese", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-05", "journal": {"name": "Synthese"}, "authors": [{"authorId": "145822349", "name": "M. Traynor"}]}, {"paperId": "a4b152afb11ed1ed390265520526cd2327f9c841", "externalIds": {"DBLP": "journals/corr/abs-2112-03877", "ArXiv": "2112.03877", "CorpusId": 244920771}, "url": "https://www.semanticscholar.org/paper/a4b152afb11ed1ed390265520526cd2327f9c841", "title": "Is Complexity Important for Philosophy of Mind?", "abstract": "Even though it is only a thesis, not just unproven, but by definition, unprovable, the Church-Turing thesis has spearheaded research in computability for decades. At its core, it is a definition, whose task is to define in precise terms what it means to be \u201ccomputable\u201d. But it is not called a \u201cdefinition\u201d because it is much more than just a definition, begging to be falsified by a counterexample, much like a conjecture. It could be argued that the Church-Turing thesis is a challenge set forth to redefine computation should anything noteworthy be discovered. But nothing was. In almost a century now, many new models of computation have arisen, and all were eventually proven to be equivalent to the Turing machine. Although there were many more or less simplistic attempts to relate Turing machines to minds, we will argue that the simpler arguments along those lines do little to clarify the concept of mind. As for more complex arguments, they cannot be provided right away, for a rough framework along the lines of Ashby-style cybernetics [Ashby, 1956] is to be acquired in order to put forth any sensical, i.e. non-dualist, comparison between minds and machines. Once this is done, the notions of computational complexity, and its generalization \u2013 metaphysical complexity \u2013 can be rediscovered in the mind, and, surprisingly, in society. Even though computation-in-society is traditionally viewed as a strong cybernetic moment, it is not that unique to cybernetics and has become commonplace in mainstream AI as well (cf. [Minsky, 1986]). One could argue that this, quintessentially non-dualist position has strange consequences, and in fact, one would be right. But we consider this not as", "venue": "ArXiv", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-02", "journal": {"volume": "abs/2112.03877", "name": "ArXiv"}, "authors": [{"authorId": "101832726", "name": "Kristina \u0160ekrst"}, {"authorId": "3422664", "name": "S. Skansi"}]}, {"paperId": "1c28a69656e844ab391416ed69557c26bf5c93b2", "externalIds": {"DOI": "10.1016/j.cjca.2021.11.009", "CorpusId": 244639958, "PubMed": "34838700"}, "url": "https://www.semanticscholar.org/paper/1c28a69656e844ab391416ed69557c26bf5c93b2", "title": "A primer on the present state and future prospects for machine learning and artificial intelligence applications in cardiology.", "abstract": null, "venue": "The Canadian journal of cardiology", "year": 2021, "referenceCount": 87, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-11-01", "journal": {"name": "The Canadian journal of cardiology"}, "authors": [{"authorId": "6543527", "name": "C. Manlhiot"}, {"authorId": "2120038947", "name": "J. Van den Eynde"}, {"authorId": "1826359", "name": "S. Kutty"}, {"authorId": "2998749", "name": "H. Ross"}]}, {"paperId": "3cb86721fc680e1006aa80f9121bcf6207f4a137", "externalIds": {"DOI": "10.1016/j.techfore.2021.121318", "CorpusId": 244433405}, "url": "https://www.semanticscholar.org/paper/3cb86721fc680e1006aa80f9121bcf6207f4a137", "title": "Artificial intelligence: Catalyst or barrier on the path to sustainability?", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2021, "referenceCount": 85, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-11-01", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "2006370036", "name": "A. Kopka"}, {"authorId": "120576394", "name": "Nils Grashof"}]}, {"paperId": "00941d147be2699dc7102c7a2190baeaf2822ef9", "externalIds": {"PubMedCentral": "8568505", "DOI": "10.1055/a-1522-3029", "CorpusId": 243776061, "PubMed": "34754270"}, "url": "https://www.semanticscholar.org/paper/00941d147be2699dc7102c7a2190baeaf2822ef9", "title": "The Use of Artificial Intelligence in Automation in the Fields of Gynaecology and Obstetrics \u2013 an Assessment of the State of Play", "abstract": "The long-awaited progress in digitalisation is generating huge amounts of medical data every day, and manual analysis and targeted, patient-oriented evaluation of this data is becoming increasingly difficult or even infeasible. This state of affairs and the associated, increasingly complex requirements for individualised precision medicine underline the need for modern software solutions and algorithms across the entire healthcare system. The utilisation of state-of-the-art equipment and techniques in almost all areas of medicine over the past few years has now indeed enabled automation processes to enter \u2013 at least in part \u2013 into routine clinical practice. Such systems utilise a wide variety of artificial intelligence (AI) techniques, the majority of which have been developed to optimise medical image reconstruction, noise reduction, quality assurance, triage, segmentation, computer-aided detection and classification and, as an emerging field of research, radiogenomics. Tasks handled by AI are completed significantly faster and more precisely, clearly demonstrated by now in the annual findings of the ImageNet Large-Scale Visual Recognition Challenge (ILSVCR), first conducted in 2015, with error rates well below those of humans. This review article will discuss the potential capabilities and currently available applications of AI in gynaecological-obstetric diagnostics. The article will focus, in particular, on automated techniques in prenatal sonographic diagnostics.", "venue": "Geburtshilfe und Frauenheilkunde", "year": 2021, "referenceCount": 98, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-11-01", "journal": {"volume": "81", "pages": "1203 - 1216", "name": "Geburtshilfe und Frauenheilkunde"}, "authors": [{"authorId": "1910815", "name": "J. Weichert"}, {"authorId": "1662776561", "name": "A. Welp"}, {"authorId": "2137467792", "name": "Jann Lennard Scharf"}, {"authorId": "66851372", "name": "C. Dracopoulos"}, {"authorId": "2077567874", "name": "W. Becker"}, {"authorId": "48342345", "name": "M. Gembicki"}]}, {"paperId": "181a971a94402cd005d27abeea22ef6bca24ca50", "externalIds": {"PubMedCentral": "8642128", "DOI": "10.7759/cureus.19235", "CorpusId": 243484395, "PubMed": "34877212"}, "url": "https://www.semanticscholar.org/paper/181a971a94402cd005d27abeea22ef6bca24ca50", "title": "A Review of Applications of Artificial Intelligence in Gastroenterology", "abstract": "Artificial intelligence (AI) is the science that deals with creating \u2018intelligent machines\u2019. AI has revolutionized medicine because of its application in several fields across medicine like radiology, neurology, ophthalmology, orthopedics and gastroenterology. In this review, we intend to summarize the basics of AI, the application of AI in various gastrointestinal pathologies till date as well as challenges/ problems related to the application of AI in medicine. Literature search using keywords like artificial intelligence, gastroenterology, applications, etc. were used. The literature search was done using Google Scholar, PubMed and ScienceDirect. All the relevant articles were gathered and relevant data were extracted from them. We concluded AI has achieved major feats in the past few decades. It has helped clinicians in diagnosing complex diseases, managing treatments as well as in predicting outcomes, all in all, which helps doctors from all over the globe in dispensing better healthcare services.", "venue": "Cureus", "year": 2021, "referenceCount": 48, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-11-01", "journal": {"volume": "13", "name": "Cureus"}, "authors": [{"authorId": "117311809", "name": "K. Nawab"}, {"authorId": "117322839", "name": "Ravi Athwani"}, {"authorId": "10063288", "name": "Awais Naeem"}, {"authorId": "3312492", "name": "M. Hamayun"}, {"authorId": "2138139074", "name": "Momna Wazir"}]}, {"paperId": "e968be08741743a351d1686ad383a162f18f796e", "externalIds": {"DOI": "10.1017/9781009036719.007", "CorpusId": 240174075}, "url": "https://www.semanticscholar.org/paper/e968be08741743a351d1686ad383a162f18f796e", "title": "Artificial Intelligence", "abstract": "Artificial Intelligence may be defined as intelligence displayed by machines, systems or agents or by entities other than living beings. Apparently, the term seems simple but the definition bears deeper connotations. The terms intelligence and creativity have long been the prerogatives associated with the humans or have been the privileges enjoyed by them since the dawn of the creation. The views \u2018creativity is computation\u2019 or \u2018cognition is computation\u2019 and \u2018mind as machine\u2019 has offset the traditional theories, assumptions and interpretations held so far in the philosophy and theory of mind. AI\u2019s push to impart intelligence to non-human entities to enable them to behave intelligently and creatively or as Boden would put it \u201cto make computers do the sort of things that minds can do\u201d (Boden 1) has challenged the very traditional fabric of our perception and comprehension, conception and construction related to our learning and living dispensations.", "venue": "Artificial Economics", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-31", "journal": {"name": "Artificial Economics"}, "authors": [{"authorId": "144836069", "name": "Aabid Ali"}]}, {"paperId": "432638b3e44390a054c1a32b55eee785bbb511dc", "externalIds": {"DOI": "10.32347/tit2021.42.0303", "CorpusId": 243485262}, "url": "https://www.semanticscholar.org/paper/432638b3e44390a054c1a32b55eee785bbb511dc", "title": "The twentieth century science paradoxes", "abstract": "The isolation of hypothetical theories from the realities of living matter has caused mysticism to penetrate scientific theories. With mystical thinking, the idea of using an analytical method to solve cognitive problems does not occur. Dialectical logic, in contrast to mysticism, states the opposite: any problematic tasks of cognizing the vital processes and phenomena of the universe are solvable exclusively in an analytic way, with the only method. The author created a universal and formal theory of solving intellectual (i.e., having no previously known algorithms for solving) problems associated with the knowledge of the vital functions of natural and man-made processes in any phenomena of the universe - the Kondratenko method of axiomatic modeling, the effectiveness of which is achieved by correctly setting the problem and solving it purely formal method. The correctness of the statement of the problem means, first of all, the recognition of the failure of all hypothetical (not confirmed by the results of full-scale experimentation with the subject of knowledge) theories. This requirement, in particular, to the mathematical tools used to solve problems of cognition, it revealed paradoxes in the foundations of mathematics, which are discussed in the article. \nAt present, in the natural and applied sciences in most publications, i.e. more than 90% associated with the construction of formal theories in these sciences, the proof of theorems is carried out: \nfirstly, in a meaningful way, which contradicts the urgent requirement of philosophers of science to use exclusively formal evidence, which is a criterion for assessing the correctness and reliability of evidence; \nsecondly, in substantive evidence in 95% of cases, an exclusively standard list of tautologies is used, which by definition is incorrect for the purpose of proving theorems on phenomena and processes of the universe based on exclusively true axioms obtained as a result of full-scale experimentation with these phenomena and processes. The article deals with the paradox in the classical approach to proving theorems, which consists in the inappropriateness of generally accepted stereotypical tautologies of classical mathematics for proving theorems.", "venue": "Transfer of Innovative Technologies", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-29", "journal": {"name": "Transfer of Innovative Technologies"}, "authors": [{"authorId": "79815445", "name": "V. Kondratenko"}]}, {"paperId": "06a550424758d9c3766051d7cb68540f43879071", "externalIds": {"DOI": "10.1057/s41284-021-00321-2", "CorpusId": 240269765}, "url": "https://www.semanticscholar.org/paper/06a550424758d9c3766051d7cb68540f43879071", "title": "Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis", "abstract": null, "venue": "Security Journal", "year": 2021, "referenceCount": 102, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-29", "journal": {"volume": "35", "pages": "1328-1348", "name": "Security Journal"}, "authors": [{"authorId": "120713325", "name": "Gaudys L. Sanclemente"}]}, {"paperId": "733bcf4f2e29eb359ad4af993e1e9dc4249769b9", "externalIds": {"DBLP": "journals/sis/TongkaiMSJZ21", "DOI": "10.4108/eai.29-10-2021.171686", "CorpusId": 240249567}, "url": "https://www.semanticscholar.org/paper/733bcf4f2e29eb359ad4af993e1e9dc4249769b9", "title": "When Artificial Intelligence Meets Printing The Evidence of Black Generation", "abstract": "Recent years wit a rapid development of new technologies. As a significant part, artificial intelligence leads to a great change of our life. While the color printing technique which is struggled with obstacles such as color reproducing now finds a revolutionary approach to overcome the difficulties. The new method significantly improved the accuracy although it requires the parallel computing process to deal with the complexity of computing. This paper firstly introduces the brief histories and the basics of black generation technique of the printing process and artificial intelligence. Then comes to the traditional techniques of black generation. In the next part we suggest an artificial intelligence approach to black generation. At last we make a comparison between various methods and point out the advantages of the new approach. Received on 21 October 2021; accepted on 28 October 2021; published on 29 October 2021", "venue": "EAI Endorsed Trans. Scalable Inf. Syst.", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-29", "journal": {"volume": "8", "pages": "e10", "name": "EAI Endorsed Trans. Scalable Inf. Syst."}, "authors": [{"authorId": "1689106196", "name": "Xu Tongkai"}, {"authorId": "2136457563", "name": "Li Manjiang"}, {"authorId": "1392224456", "name": "Liu Shanmin"}, {"authorId": "2136453546", "name": "Xie Jiliang"}, {"authorId": "2136462419", "name": "Yuan Zhende"}]}, {"paperId": "8c7e3e50549a8e3d889fcbf31ba88dfc41015613", "externalIds": {"PubMedCentral": "8586539", "DOI": "10.3389/fpsyg.2021.730985", "CorpusId": 240075726, "PubMed": "34777110"}, "url": "https://www.semanticscholar.org/paper/8c7e3e50549a8e3d889fcbf31ba88dfc41015613", "title": "The Modified Imitation Game: A Method for Measuring Interactional Expertise", "abstract": "The study of the sociology of scientific knowledge distinguishes between contributory and interactional experts. Contributory experts have practical expertise\u2014they can \u201cwalk the walk.\u201d Interactional experts have internalized the tacit components of expertise\u2014they can \u201ctalk the talk\u201d but are not able to reliably \u201cwalk the walk.\u201d Interactional expertise permits effective communication between contributory experts and others (e.g., laypeople), which in turn facilitates working jointly toward shared goals. Interactional expertise is attained through long-term immersion into the expert community in question. To assess interactional expertise, researchers developed the imitation game\u2014a variant of the Turing test\u2014to test whether a person, or a particular group, possesses interactional expertise of another. The imitation game, which has been used mainly in sociology to study the social nature of knowledge, may also be a useful tool for researchers who focus on cognitive aspects of expertise. In this paper, we introduce a modified version of the imitation game and apply it to examine interactional expertise in the context of blindness. Specifically, we examined blind and sighted individuals\u2019 ability to imitate each other in a street-crossing scenario. In Phase I, blind and sighted individuals provided verbal reports of their thought processes associated with crossing a street\u2014once while imitating the other group (i.e., as a pretender) and once responding genuinely (i.e., as a non-pretender). In Phase II, transcriptions of the reports were judged as either genuine or imitated responses by a different set of blind and sighted participants, who also provided the reasoning for their decisions. The judges comprised blind individuals, sighted orientation-and-mobility specialists, and sighted individuals with infrequent socialization with blind individuals. Decision data were analyzed using probit mixed models for signal-detection-theory indices. Reasoning data were analyzed using natural-language-processing (NLP) techniques. The results revealed evidence that interactional expertise (i.e., relevant tacit knowledge) can be acquired by immersion in the group that possesses and produces the expert knowledge. The modified imitation game can be a useful research tool for measuring interactional expertise within a community of practice and evaluating practitioners\u2019 understanding of true experts.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 46, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-29", "journal": {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "3219950", "name": "Guler Arsal"}, {"authorId": "3153660", "name": "J. Suss"}, {"authorId": "143852095", "name": "P. Ward"}, {"authorId": "15712299", "name": "Vivian P. Ta"}, {"authorId": "2417653", "name": "Ryan V. Ringer"}, {"authorId": "143905716", "name": "David W. Eccles"}]}, {"paperId": "a3ab3d15e07cbb3437f8467e7907964dd925d398", "externalIds": {"DBLP": "journals/corr/abs-2110-13817", "CorpusId": 239885611}, "url": "https://www.semanticscholar.org/paper/a3ab3d15e07cbb3437f8467e7907964dd925d398", "title": "Real time Simulation of Gird-connected Photovoltaic Multilevel Inverter using Hybrid GA/PSO Optimization Algorithm", "abstract": "This paper presents a new real-time intelligent optimization algorithm to minimize the voltage harmonics of a multilevel photovoltaic inverter. Hybrid Genetic algorithm /Particle swarm optimization algorithm is employed in a real-time simulation to identify the best fire angels of the multilevel inverter to eliminate any destructive effect, such as dc voltage variations and changes in line and dc-link resistors. The dual objective function of harmonic minimization and voltage regulation is considered in this real-time simulation. This approach can be applied to any multilevel inverter with various numbers of levels. The validity of the proposed algorithm is proven by real-time simulation of seven and an eleven-level inverter.", "venue": "ArXiv", "year": 2021, "referenceCount": 29, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "abs/2110.13817", "name": "ArXiv"}, "authors": [{"authorId": "145522709", "name": "H. Zolfaghari"}, {"authorId": "2712945", "name": "H. Momeni"}, {"authorId": "2064630195", "name": "H. Karimi"}]}, {"paperId": "ece0e4209ca84ecb10216f58074d5d64c7ca7e0b", "externalIds": {"DOI": "10.46294/ulplr-rdulp.v15i1.7940", "CorpusId": 240325033}, "url": "https://www.semanticscholar.org/paper/ece0e4209ca84ecb10216f58074d5d64c7ca7e0b", "title": "A Intelig\u00eancia Artificial nos Contratos: Uma Hip\u00f3tese Poss\u00edvel?", "abstract": "O texto visa analisar se, dada a realidade brasileira, seria poss\u00edvel inserir nos contratos privados sistemas de Intelig\u00eancia Artificial - IA. Primeiro, ser\u00e3o analisados \u200b\u200bos conceitos existentes sobre IA, bem como a dificuldade em conceitu\u00e1-la de uma \u00fanica maneira. O texto abordar\u00e1, atrav\u00e9s do conceito de contrato, a possibilidade e as vantagens da utiliza\u00e7\u00e3o da IA nos contratos privados.\n\nTal ideia foi, primeiramente, publicada por Gustavo Tepedino e Rodrigo da Guia Silva que, ent\u00e3o, surgiu como inspira\u00e7\u00e3o para a elabora\u00e7\u00e3o do presente trabalho, com a proposta de tentar ir al\u00e9m.\n\nPara os autores, em sua ideia original, a IA poderia ser utilizada como instrumento de fixa\u00e7\u00e3o de pre\u00e7os, proporcionando flexibilidade aos contratos, de forma a reduzir os custos de transa\u00e7\u00e3o dos contratos em decorr\u00eancia de eventuais fatos supervenientes. A IA poderia ser utilizada como forma de controle de cl\u00e1usulas de adapta\u00e7\u00e3o autom\u00e1tica, em que a cl\u00e1usula estabele\u00e7a o direito do vendedor \u00e0 revis\u00e3o do pre\u00e7o originariamente fixado caso os custos com insumos venham a ultrapassar certo patamar pr\u00e9-fixado.\n\nNo presente trabalho, se analisam outros tipos de contratos, como por exemplo os de loca\u00e7\u00e3o, em que no final de 2020 houve um reajuste significativo do IGPM havendo, inclusive, coment\u00e1rios sobre a possibilidade de reajustar os contratos. Nesse caso, por exemplo, a IA poderia ser de grande aux\u00edlio \u00e0s partes.", "venue": "ULP Law Review", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-10-25", "journal": {"name": "ULP Law Review"}, "authors": [{"authorId": "2136744748", "name": "Dem\u00e9trio Beck da Silva Giannakos"}, {"authorId": "40280532", "name": "Wilson Engelmann"}]}, {"paperId": "d672e146bc59286821509291375ab6f20fcb5e59", "externalIds": {"DOI": "10.1007/s13347-021-00475-2", "CorpusId": 239852746}, "url": "https://www.semanticscholar.org/paper/d672e146bc59286821509291375ab6f20fcb5e59", "title": "Aliens in the Space of Reasons? On the Interaction Between Humans and Artificial Intelligent Agents", "abstract": null, "venue": "Philosophy & Technology", "year": 2021, "referenceCount": 21, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-23", "journal": {"name": "Philosophy & Technology"}, "authors": [{"authorId": "1770514730", "name": "B. Heinrichs"}, {"authorId": "2135530568", "name": "Sebastian Knell"}]}, {"paperId": "914ba3fb0f5ffdd27731fdfd7e809583fe23da8a", "externalIds": {"DOI": "10.1080/00224065.2021.1987806", "CorpusId": 240357313}, "url": "https://www.semanticscholar.org/paper/914ba3fb0f5ffdd27731fdfd7e809583fe23da8a", "title": "Artificial intelligence and statistics for quality technology: an introduction to the special issue", "abstract": "Abstract In many applied and industrial settings, the use of Artificial Intelligence (AI) for quality technology is gaining growing attention. AI refers to the broad set of techniques which replicate human cognitive and analytical skills for problem solving, including Machine Learning, Neural Networks and Deep Learning. This paper presents a brief introduction to the special issue, where AI-based solutions are presented to solve problems that are typically faced in the area of quality technology. Limits and advantages of AI-based solutions are briefly discussed to stimulate creative attention to novel solutions and new directions for future research.", "venue": "Journal of QualityTechnology", "year": 2021, "referenceCount": 101, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-20", "journal": {"volume": "53", "pages": "443 - 453", "name": "Journal of Quality Technology"}, "authors": [{"authorId": "1933862", "name": "B. Colosimo"}, {"authorId": "1471923703", "name": "Enrique del Castillo"}, {"authorId": "1401781163", "name": "L. A. Jones-Farmer"}, {"authorId": "1905257", "name": "K. Paynabar"}]}, {"paperId": "5115a963df09dd06744f8ac9abf06059942601e2", "externalIds": {"PubMedCentral": "9537212", "DOI": "10.1007/s00247-021-05177-7", "CorpusId": 239021933, "PubMed": "34664088"}, "url": "https://www.semanticscholar.org/paper/5115a963df09dd06744f8ac9abf06059942601e2", "title": "The augmented radiologist: artificial intelligence in the practice of radiology", "abstract": null, "venue": "Pediatric Radiology", "year": 2021, "referenceCount": 99, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-10-19", "journal": {"volume": "52", "pages": "2074 - 2086", "name": "Pediatric Radiology"}, "authors": [{"authorId": "143751788", "name": "E. Sorantin"}, {"authorId": "2275942", "name": "M. G. Grasser"}, {"authorId": "1406738365", "name": "Ariane Hemmelmayr"}, {"authorId": "13677555", "name": "S. Tschauner"}, {"authorId": "145115635", "name": "F. Hr\u017ei\u0107"}, {"authorId": "2133330601", "name": "Veronika Weiss"}, {"authorId": "2086593131", "name": "Jana Lacekova"}, {"authorId": "1749801", "name": "Andreas Holzinger"}]}, {"paperId": "3d7f58ff3ddb47aa31f9751a2afa2509484653d0", "externalIds": {"DBLP": "conf/svr/RochaBNNV21", "DOI": "10.1145/3488162.3488214", "CorpusId": 245635379}, "url": "https://www.semanticscholar.org/paper/3d7f58ff3ddb47aa31f9751a2afa2509484653d0", "title": "Autonomous Foraging of Virtual Characters with a Constructivist Cognitive Architecture", "abstract": "Immersive experiences in virtual reality simulations require natural-looking virtual characters. Autonomy researchers argue that only the agent\u2019s own experience can model their behavior. In this regard, the Constitutive Autonomy through Self-programming Hypothesis (CASH) is an effective approach to implement this model. In this paper, we contribute to the discussion of CASH within dynamic and continuous environments by developing mechanisms of memory decay, contradiction penalty, and relative valence. Such improvements aim to see how the agent might continuously reevaluate their learned schemas. The results show that our agents were able to develop autonomously into performing plausible behaviors, despite the changing environment.", "venue": "SVR", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", "journal": {"name": "Symposium on Virtual and Augmented Reality"}, "authors": [{"authorId": "2148274207", "name": "Victor Rocha"}, {"authorId": "2148481742", "name": "Louise Brandao"}, {"authorId": "2889936", "name": "Y. L. Nogueira"}, {"authorId": "1870162", "name": "J. B. C. Neto"}, {"authorId": "1872209", "name": "C. Vidal"}]}, {"paperId": "795efaa76d48cbd2ed9be71ef90c645a74d0f044", "externalIds": {"DBLP": "conf/icmi/BodurNK0F21", "DOI": "10.1145/3461615.3485399", "CorpusId": 245265576}, "url": "https://www.semanticscholar.org/paper/795efaa76d48cbd2ed9be71ef90c645a74d0f044", "title": "ChiCo: A Multimodal Corpus for the Study of Child Conversation", "abstract": "The study of how children develop their conversational skills is an important scientific frontier at the crossroad of social, cognitive, and linguistic development with important applications in health, education, and child-oriented AI. While recent advances in machine learning techniques allow us to develop formal theories of conversational development in real-life contexts, progress has been slowed down by the lack of corpora that both approximate naturalistic interaction and provide clear access to children\u2019s non-verbal behavior in face-to-face conversations. This work is an effort to fill this gap. We introduce ChiCo (for Child Conversation), a corpus we built using an online video chat system. Using a weakly structured task (a word-guessing game), we recorded 20 conversations involving either children in middle childhood (i.e., 6 to 12 years old) interacting with their caregivers (condition of interest) or the same caregivers interacting with other adults (a control condition), resulting in 40 individual recordings. Our annotation of these videos has shown that the frequency of children\u2019s use of gaze, gesture and facial expressions mirrors that of adults. Future modeling research can capitalize on this rich behavioral data to study how both verbal and non-verbal cues contribute to the development of conversational coordination.", "venue": "ICMI Companion", "year": 2021, "referenceCount": 31, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", "journal": {"name": "Companion Publication of the 2021 International Conference on Multimodal Interaction"}, "authors": [{"authorId": "1659535087", "name": "Kubra Bodur"}, {"authorId": "1387994359", "name": "Mitja Nikolaus"}, {"authorId": "2145978779", "name": "Fatima Kassim"}, {"authorId": "2670202", "name": "Laurent Pr\u00e9vot"}, {"authorId": "2676559", "name": "Abdellah Fourtassi"}]}, {"paperId": "a0c4294fdea9daa451a7de47dfa7c3bb5e0d652d", "externalIds": {"DBLP": "conf/icmi/ParkPOLLLZ21", "ArXiv": "2201.04990", "DOI": "10.1145/3462244.3479932", "CorpusId": 238992582}, "url": "https://www.semanticscholar.org/paper/a0c4294fdea9daa451a7de47dfa7c3bb5e0d652d", "title": "Toddler-Guidance Learning: Impacts of Critical Period on Multimodal AI Agents", "abstract": "Critical periods are phases during which a toddler\u2019s brain develops in spurts. To promote children\u2019s cognitive development, proper guidance is critical in this stage. However, it is not clear whether such a critical period also exists for the training of AI agents. Similar to human toddlers, well-timed guidance and multimodal interactions might significantly enhance the training efficiency of AI agents as well. To validate this hypothesis, we adapt this notion of critical periods to learning in AI agents and investigate the critical period in the virtual environment for AI agents. We formalize the critical period and Toddler-guidance learning in the reinforcement learning (RL) framework. Then, we built up a toddler-like environment with VECA toolkit to mimic human toddlers\u2019 learning characteristics. We study three discrete levels of mutual interaction: weak-mentor guidance (sparse reward), moderate mentor guidance (helper-reward), and mentor demonstration (behavioral cloning). We also introduce the EAVE dataset consisting of 30,000 real-world images to fully reflect the toddler\u2019s viewpoint. We evaluate the impact of critical periods on AI agents from two perspectives: how and when they are guided best in both uni- and multimodal learning. Our experimental results show that both uni- and multimodal agents with moderate mentor guidance and critical period on 1 million and 2 million training steps show a noticeable improvement. We validate these results with transfer learning on the EAVE dataset and find the performance advancement on the same critical period and the guidance.", "venue": "ICMI", "year": 2021, "referenceCount": 56, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", "journal": {"name": "Proceedings of the 2021 International Conference on Multimodal Interaction"}, "authors": [{"authorId": "2109220128", "name": "Junseok Park"}, {"authorId": "73758722", "name": "Kwanyoung Park"}, {"authorId": "2087142998", "name": "Hyunseok Oh"}, {"authorId": "2110880154", "name": "Ganghun Lee"}, {"authorId": "2152165744", "name": "M. Lee"}, {"authorId": "2145418994", "name": "Youngki Lee"}, {"authorId": "1692756", "name": "Byoung-Tak Zhang"}]}, {"paperId": "8d8bd41728a1cecd97b73e6454ff96887c8932ce", "externalIds": {"DOI": "10.33965/icwi_ac2021_202109r030", "CorpusId": 250238158}, "url": "https://www.semanticscholar.org/paper/8d8bd41728a1cecd97b73e6454ff96887c8932ce", "title": "GENOMIC DATA ANALYSIS: CONCEPTUAL FRAMEWORK FOR THE APPLICATION OF ARTIFICIAL INTELLIGENCE IN PERSONALIZED TREATMENT OF ONCOLOGY PATIENTS", "abstract": "Oncology is one of the most dynamic branches of medicine. As a result of numerous oncology studies, there has been a significant increase in scientific and clinical data that the human brain cannot store. Advances in artificial intelligence (AI) technology have led to its rapid clinical application. In this paper, we wanted to see the role of the use of artificial intelligence (AI) in oncology. We conducted an unsystematic search of databases (Pub Med, MEDLINE, and Google Scholar) using the keywords: intelligence, From a large number of articles available to us, we singled out review articles and clinical trial results according to their clarity and innovation regarding the use of artificial intelligence in oncology. Of particular importance to us was the ability to apply their results in everyday clinical work. The possibilities of using artificial intelligence in oncology are innumerable. Thus, AI can be used for diagnostic purposes (malignant screening, histopathology, and molecular diagnostics), therapeutic purposes (personalized treatment, prediction of treatment side effects and response to therapy, treatment decisions) as well as for prognostic purposes (risk stratification, 5-year survival, monitoring). The implementation of AI in clinical practice presents new challenges for clinicians. Namely, in the era of evidence-based and patient-centered medicine, they will have to master statistical as well as computer skills in addition to clinical ones. Therefore, it is necessary to start educating future doctors about the importance of AI in medicine as soon as possible.", "venue": "Proceedings of the International Conferences on WWW/Internet 2021 and Applied Computing 2021", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2021-10-13", "journal": {"name": "Proceedings of the International Conferences on WWW/Internet 2021 and Applied Computing 2021"}, "authors": [{"authorId": "2005931502", "name": "R. Kelemeni\u0107-Dra\u017ein"}, {"authorId": "1940477", "name": "L. Luic"}]}, {"paperId": "0cbb3c1a695b2b1ab724565d3656c454049d06b6", "externalIds": {"DOI": "10.3390/min11101118", "CorpusId": 242591161}, "url": "https://www.semanticscholar.org/paper/0cbb3c1a695b2b1ab724565d3656c454049d06b6", "title": "AI4R2R (AI for Rock to Revenue): A Review of the Applications of AI in Mineral Processing", "abstract": "In the last few years, jargon, such as machine learning (ML) and artificial intelligence (AI), have been ubiquitous in both popular science media as well as the academic literature. Many industries have tried the current suite of ML and AI algorithms with various degrees of success. Mineral processing, as an industry, is looking at AI for two reasons. First of all, as with other industries, it is pertinent to know if AI algorithms can be used to enhance productivity. The second reason is specific to the mining industry. Of late, the grade of ores is reducing, and the demand for ethical mining (with as little effect on ecology as possible) is increasing. Thus, mineral processing industries also want to explore the possible use of AI in solving these challenges. In this review paper, first, the challenges in mineral processing that can potentially be solved by AI are presented. Then, some of the most pertinent developments in the domain of ML and AI (applied in the domain of mineral processing) are discussed. Lastly, a top-level modus operandi is presented for a mineral processing industry that might want to explore the possibilities of using AI in its processes. Following are some of the new paradigms added by this review. This review presents a holistic view of the domain of mineral processing with an AI lens. It is also one of the first reviews in this domain to thoroughly discuss the use of AI in ethical, green, and sustainable mineral processing. The AI process proposed in this paper is a comprehensive one. To ensure the relevance to industry, the flow was made agile with the spiral system engineering flow. This is expected to drive rapid and agile investigation of the potential of applying ML and AI in different mineral processing industries.", "venue": "Minerals", "year": 2021, "referenceCount": 170, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-10-12", "journal": {"name": "Minerals"}, "authors": [{"authorId": "1823937061", "name": "A. Mishra"}]}, {"paperId": "31cc7b4a2f44c59cc36173522bf0f20e177a76a0", "externalIds": {"ArXiv": "2110.04942", "DBLP": "journals/corr/abs-2110-04942", "CorpusId": 238583533}, "url": "https://www.semanticscholar.org/paper/31cc7b4a2f44c59cc36173522bf0f20e177a76a0", "title": "Application of Neural Network in Optimization of Chemical Process", "abstract": "Artificial neural network (ANN) has been widely used due to its strong nonlinear mapping ability, fault tolerance and self-learning ability. This article summarizes the development history of artificial neural networks, introduces three common neural network types, BP neural network, RBF neural network and convolutional neural network, and focuses on the practical application in chemical process optimization, especially the results achieved in multi-objective control optimization and process parameter improvement.", "venue": "ArXiv", "year": 2021, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-11", "journal": {"volume": "abs/2110.04942", "name": "ArXiv"}, "authors": [{"authorId": "2142046258", "name": "Fei Liang"}, {"authorId": "2146343555", "name": "Taowen Zhang"}]}, {"paperId": "cc44efb947138e36ffff244947822bb5f86dabb4", "externalIds": {"DBLP": "journals/corr/abs-2110-04203", "ArXiv": "2110.04203", "CorpusId": 238531521}, "url": "https://www.semanticscholar.org/paper/cc44efb947138e36ffff244947822bb5f86dabb4", "title": "Toward a Human-Level Video Understanding Intelligence", "abstract": "We aim to develop an AI agent that can watch video clips and have a conversation with human about the video story. Devel-oping video understanding intelligence is a signi\ufb01cantly chal- lenging task, and evaluation methods for adequately measuring and analyzing the progress of AI agent are lacking as well. In this paper, we propose the Video Turing Test to provide effective and practical assessments of video understanding in- telligence as well as human-likeness evaluation of AI agents. We de\ufb01ne a general format and procedure of the Video Tur- ing Test and present a case study to con\ufb01rm the effectiveness and usefulness of the proposed test.", "venue": "ArXiv", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-08", "journal": {"volume": "abs/2110.04203", "name": "ArXiv"}, "authors": [{"authorId": "15353659", "name": "Y. Heo"}, {"authorId": "2108732644", "name": "Min Whoo Lee"}, {"authorId": "117172343", "name": "Seongho Choi"}, {"authorId": "2115124026", "name": "Woo Suk Choi"}, {"authorId": "2154329247", "name": "Minjung Shin"}, {"authorId": "2187944448", "name": "Minjoon Jung"}, {"authorId": "89496405", "name": "Jeh-Kwang Ryu"}, {"authorId": "1692756", "name": "Byoung-Tak Zhang"}]}, {"paperId": "e2e4702549f6930c638f534c06ff5cd7a62eee90", "externalIds": {"PubMedCentral": "9495400", "DOI": "10.1017/ash.2021.192", "CorpusId": 243736362, "PubMed": "36168500"}, "url": "https://www.semanticscholar.org/paper/e2e4702549f6930c638f534c06ff5cd7a62eee90", "title": "Machine learning and artificial intelligence: applications in healthcare epidemiology", "abstract": "Abstract Artificial intelligence (AI) refers to the performance of tasks by machines ordinarily associated with human intelligence. Machine learning (ML) is a subtype of AI; it refers to the ability of computers to draw conclusions (ie, learn) from data without being directly programmed. ML builds from traditional statistical methods and has drawn significant interest in healthcare epidemiology due to its potential for improving disease prediction and patient care. This review provides an overview of ML in healthcare epidemiology and practical examples of ML tools used to support healthcare decision making at 4 stages of hospital-based care: triage, diagnosis, treatment, and discharge. Examples include model-building efforts to assist emergency department triage, predicting time before septic shock onset, detecting community-acquired pneumonia, and classifying COVID-19 disposition risk level. Increasing availability and quality of electronic health record (EHR) data as well as computing power provides opportunities for ML to increase patient safety, improve the efficiency of clinical management, and reduce healthcare costs.", "venue": "Antimicrobial Stewardship & Healthcare Epidemiology", "year": 2021, "referenceCount": 56, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-10-07", "journal": {"volume": "1", "name": "Antimicrobial Stewardship & Healthcare Epidemiology : ASHE"}, "authors": [{"authorId": "2080162329", "name": "Alisa J. Hamilton"}, {"authorId": "46717348", "name": "Alexandra T. Strauss"}, {"authorId": "143850986", "name": "D. Martinez"}, {"authorId": "33224636", "name": "J. Hinson"}, {"authorId": "2187134", "name": "S. Levin"}, {"authorId": "2052336462", "name": "G. Lin"}, {"authorId": "2055350", "name": "E. Klein"}]}, {"paperId": "023b4617cfdbcca17c1eb2d938ce8a2106e3ff3d", "externalIds": {"DOI": "10.1186/s41018-021-00096-6", "CorpusId": 238418116}, "url": "https://www.semanticscholar.org/paper/023b4617cfdbcca17c1eb2d938ce8a2106e3ff3d", "title": "Explicability of humanitarian AI: a matter of principles", "abstract": null, "venue": "Journal of International Humanitarian Action", "year": 2021, "referenceCount": 128, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-10-06", "journal": {"volume": "6", "pages": "1-22", "name": "Journal of International Humanitarian Action"}, "authors": [{"authorId": "152428690", "name": "G. Coppi"}, {"authorId": "2047433655", "name": "R. Moreno Jimenez"}, {"authorId": "2131057991", "name": "Sofia Kyriazi"}]}, {"paperId": "d8144d55c03845fd4d928716c1ccb50d777a6a92", "externalIds": {"DOI": "10.37762/jgmds.8-4.263", "CorpusId": 241775673}, "url": "https://www.semanticscholar.org/paper/d8144d55c03845fd4d928716c1ccb50d777a6a92", "title": "Is Artificial Intelligence Transforming Dentistry Today?", "abstract": "Since the birth of science, the most fascinating structure of the human body is the human brain.\u00a0 Over the past centuries\u2019 researchers have been developing the latest technologies to imitate and explore how the human brain functions. However, to develop a machine that thinks like a human brain is still a dream for researchers. Aristotle\u2019s early efforts to devise logical thinking via his syllogisms (a three-part deductive reasoning) were a source of inspiration for modern computers and technologies1. In the1950, Alan Turing designed a machine to decode encrypted messages, which was a breakthrough of super computers in the days of yore. He designed the \u201cTuring Test\u201d which was coined to assess whether a computer could exhibit intelligence better known as \u201cartificial intelligence\u201d (AI) today2. AI is \u201ca field of science and engineering concerned with the computational understanding of what is commonly called intelligent behavior, and with the creation of artifacts that exhibit such behaviour\u201d3. \nSince 1980, AI has come a long way, virtual reality is being used in dental education these days to create real life situations and promote clinical work on simulators to eliminate risk factors associated with training on live patients. Recently artificial intelligence has been integrated with tutoring systems like \u201cUnified Medical Language System\u201d (UMLS), which have resulted in a better quality of feedback, which the preclinical virtual patients provide to the students4,5. This interactive phase helps students to evaluate their clinical skills and compare their skills with the standard ones, thus creating an ideal and high-quality training environment. Studies have been carried out regarding the efficacy of AI systems, which have stipulated that preclinical students build higher competencies than with the use of traditional simulator units6-8. \nCurrently AI inbuilt virtual dental assistants are present in the market. They can execute various chair side tasks with greater accuracy and less manpower ensuring minimum error during the procedures. In the world of implantology and maxillofacial surgery AI helps plan and prepare surgeries with smallest details forgoing actual surgery. Some exceptional uses of AI include robotic surgeries in the field of maxillofacial surgery and bioprinting (where tissues and organs can be reconstructed in thin layers)9. The field of AI has flourished to great extent in the past decade; AI systems are an aid to the field of dentistry and dental education.\u00a0 \nThis narrative attempts to explain possible AI-based applications in the future, it can be used for dental diagnosis, planning out treatments, conducting image analysis, and record keeping. AI-based technologies streamline and reduce laborious workforce to routine tasks, it ensures dental procedures are possible at a lower cost and ultimately makes predictive, preventive, and participatory dentistry possible.\u00a0The use of AI in dental procedures needs to be guaranteed; its application with human oversight and evidence-based dentistry shall be expected. Dental education needs to be introduced to clinical AI solutions by promoting digital literacy in the future dental liveware.", "venue": "Journal of Gandhara Medical and Dental Science", "year": 2021, "referenceCount": 9, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-05", "journal": {"name": "Journal of Gandhara Medical and Dental Science"}, "authors": [{"authorId": "2041843276", "name": "Saman Tauqir"}]}, {"paperId": "2245b9445f48225620fba1c22d7484237efaccc9", "externalIds": {"DBLP": "journals/ais/TobarG22", "MAG": "3202193864", "DOI": "10.1007/s00146-021-01264-3", "CorpusId": 244219727}, "url": "https://www.semanticscholar.org/paper/2245b9445f48225620fba1c22d7484237efaccc9", "title": "On machine learning and the replacement of human labour: anti-Cartesianism versus Babbage\u2019s path", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-04", "journal": {"volume": "37", "pages": "1459 - 1471", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2841497", "name": "Felipe A. Tobar"}, {"authorId": "2109141128", "name": "R. Gonz\u00e1lez"}]}, {"paperId": "1e228d7c0bdea96380edf886fbefe49d8439910c", "externalIds": {"MAG": "3205636459", "DOI": "10.3390/app11199208", "CorpusId": 244611554}, "url": "https://www.semanticscholar.org/paper/1e228d7c0bdea96380edf886fbefe49d8439910c", "title": "A Multifeatured Data-Driven Homogenization for Heterogeneous Elastic Solids", "abstract": "A computational homogenization of heterogeneous solids is presented based on the data-driven approach for both linear and nonlinear elastic responses. Within the Double-Scale Finite Element Method (FE2) framework, a data-driven model is proposed to substitute the micro-level Finite Element (FE) simulations to reduce computational costs in multiscale simulations. The heterogeneity of porous solids at the micro-level is considered in various material properties and geometrical attributes. For material properties, elastic constants, which are Lame\u2019s coefficients, are subjected to be heterogeneous in the linear elastic responses. For geometrical features, different numbers, sizes, and locations of voids are considered to reflect the heterogeneity of porous solids. A database for homogenized microstructural responses is constructed from a series of micro-level FE simulations, and machine learning is used to train and test our proposed model. In particular, four geometrical descriptors are designed, based on N-probability and lineal-path functions, to clearly reflect the geometrical heterogeneity of various microstructures. This study indicates that a simple deep neural networks model can capture diverse microstructural heterogeneous responses well when given proper input sources, including the geometrical descriptors, are considered to establish a computational data-driven homogenization scheme.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 38, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-03", "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "153338664", "name": "E. Haghighi"}, {"authorId": "98495515", "name": "S. Na"}]}, {"paperId": "d8d80e90bd8191c6ca11f5084996fd4746d49b02", "externalIds": {"DOI": "10.1080/03080188.2020.1868684", "CorpusId": 238638292}, "url": "https://www.semanticscholar.org/paper/d8d80e90bd8191c6ca11f5084996fd4746d49b02", "title": "Artificial agency and the game of semantic extension", "abstract": "ABSTRACT Artificial agents are commonly described by using words that traditionally belong to the semantic field of life. I call this phenomenon the game of semantic extension. However, the semantic extension of words as crucial as \u2018autonomous\u2019, \u2018intelligent\u2019, \u2018creative\u2019, \u2018moral\u2019, and so on, is often perceived as unsatisfactory, which is signalled with the extensive use of inverted commas or other syntactical cues. Such practice, in turn, has provoked harsh criticism that usually refers back to the literal meaning of the words to show their inappropriateness in describing artificial agents. Hence the question: how can we choose our words appropriately and wisely while making sense of artificial agents? This paper tries to answer by sketching the main features of the game of semantic extension in relation to artificial agency, reviewing the related opportunities and risks, and advancing some practical suggestions on how to play the game well.", "venue": "Interdisciplinary Science Reviews", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-10-02", "journal": {"volume": "46", "pages": "440 - 457", "name": "Interdisciplinary Science Reviews"}, "authors": [{"authorId": "50846975", "name": "Fabio Fossa"}]}, {"paperId": "d01cb741ba9c9c179f7d33ed48ecc3c80393f205", "externalIds": {"MAG": "3206498514", "DOI": "10.1134/s1995080221100127", "CorpusId": 244634561}, "url": "https://www.semanticscholar.org/paper/d01cb741ba9c9c179f7d33ed48ecc3c80393f205", "title": "Is Genome Written in Haskell?", "abstract": null, "venue": "Lobachevskii Journal of Mathematics", "year": 2021, "referenceCount": 11, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-10-01", "journal": {"name": "Lobachevskii Journal of Mathematics"}, "authors": [{"authorId": "144039873", "name": "S. Kozyrev"}]}, {"paperId": "6a582cba7522aa7e92c5871f9c7cd74796405c0e", "externalIds": {"PubMedCentral": "8512550", "DBLP": "journals/sensors/ChkrounA21", "DOI": "10.3390/s21196641", "CorpusId": 238747247, "PubMed": "34640960"}, "url": "https://www.semanticscholar.org/paper/6a582cba7522aa7e92c5871f9c7cd74796405c0e", "title": "A Safe Collaborative Chatbot for Smart Home Assistants", "abstract": "Smart home assistants, which enable users to control home appliances and can be used for holding entertaining conversations, have become an inseparable part of many people\u2019s homes. Recently, there have been many attempts to allow end-users to teach a home assistant new commands, responses, and rules, which can then be shared with a larger community. However, allowing end-users to teach an agent new responses, which are shared with a large community, opens the gate to malicious users, who can teach the agent inappropriate responses in order to promote their own business, products, or political views. In this paper, we present a platform that enables users to collaboratively teach a smart home assistant (or chatbot) responses using natural language. We present a method of collectively detecting malicious users and using the commands taught by the malicious users to further mitigate activity of future malicious users. We ran an experiment with 192 subjects and show the effectiveness of our platform.", "venue": "Sensors", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-01", "journal": {"volume": "21", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "40898073", "name": "Merav Chkroun"}, {"authorId": "1746466", "name": "Amos Azaria"}]}, {"paperId": "864d8a27da1ef69729d19b9297bce87e82eb9abd", "externalIds": {"DOI": "10.1177/14690667211050599", "CorpusId": 238421624, "PubMed": "34617472"}, "url": "https://www.semanticscholar.org/paper/864d8a27da1ef69729d19b9297bce87e82eb9abd", "title": "Joseph John Thomson investigates the paranormal", "abstract": "Joseph John Thomson is best known for detecting two isotopes of neon within cathode ray tubes that lay the foundation of the field of mass spectrometry. He was awarded the 1906 Nobel Prize in Physics for the discovery of the electron and for his work on the conduction of electricity in gases in the same devices. He is less known for his strong religious beliefs and his interest in psychical research and the paranormal. Thomson served as a member of the Society for Psychical Research for over 50 years and even became its Vice President. During this time, he attended a number of s\u00e9ances and demonstrations by professed psychics and mediums. This article traces those who influenced his interest in the paranormal, from Balfour Stewart to Lord Rayleigh and William Crookes. It reports and illustrates his beliefs and experiences investigating the paranormal in his own words.", "venue": "European journal of mass spectrometry", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-01", "journal": {"volume": "27", "pages": "151 - 157", "name": "European Journal of Mass Spectrometry"}, "authors": [{"authorId": "1844929", "name": "K. Downard"}]}, {"paperId": "3a1501829ce7205f25939dd26e1089df920c9988", "externalIds": {"DBLP": "journals/ai/SilverSPS21", "MAG": "3164005523", "DOI": "10.1016/J.ARTINT.2021.103535", "CorpusId": 236236944}, "url": "https://www.semanticscholar.org/paper/3a1501829ce7205f25939dd26e1089df920c9988", "title": "Reward is enough", "abstract": null, "venue": "Artificial Intelligence", "year": 2021, "referenceCount": 67, "citationCount": 143, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-01", "journal": {"volume": "299", "pages": "103535", "name": "Artif. Intell."}, "authors": [{"authorId": "145824029", "name": "David Silver"}, {"authorId": "2108384183", "name": "Satinder Singh"}, {"authorId": "144368601", "name": "Doina Precup"}, {"authorId": "1699645", "name": "R. Sutton"}]}, {"paperId": "ddce6ef8f791137fc27dcfda2de0f58b3be15db2", "externalIds": {"DOI": "10.1088/2515-7639/ac2791", "CorpusId": 238225233}, "url": "https://www.semanticscholar.org/paper/ddce6ef8f791137fc27dcfda2de0f58b3be15db2", "title": "Applications of artificial intelligence and machine learning in metal additive manufacturing", "abstract": "Artificial intelligence (AI) and additive manufacturing (AM) are both disruptive new technologies. AI has entered many aspects of our lives, but has not been fully realized in the world of AM. Because of the vast amount of data and the digital nature of the technology, AM offers tremendous opportunities in machine learning (ML) and consequently AI. This paper provides a vantage point view of the applications of ML and AI in AM, and specifically in powder bed AM technology. The types of data, sources of data, potential variabilities in experimental and simulation data, and the applicability of these data in ML algorithms are discussed. Several new ideas are presented where fusing these two transformative technologies can potentially have a profound impact on how AM is applied in different fields. A vision on the potential direction of AM to fully realize AI\u2019s advantage is provided.", "venue": "Journal of Physics: Materials", "year": 2021, "referenceCount": 121, "citationCount": 3, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-29", "journal": {"volume": "4", "name": "Journal of Physics: Materials"}, "authors": [{"authorId": "2130188923", "name": "Leila Jannesari Ladani"}]}, {"paperId": "2751eb1b6dab219b62f1ce0188dd505ddcc81966", "externalIds": {"DOI": "10.11622/smedj.2021119", "CorpusId": 238201856, "PubMed": "34581468"}, "url": "https://www.semanticscholar.org/paper/2751eb1b6dab219b62f1ce0188dd505ddcc81966", "title": "Acute paediatrics tele-support for caregivers in Singapore: an initial experience with a prototype Chatbot: UPAL.", "abstract": null, "venue": "Singapore medical journal", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-28", "journal": {"name": "Singapore medical journal"}, "authors": [{"authorId": "37042259", "name": "S. Ganapathy"}, {"authorId": "31638014", "name": "Su Ying Serena Chang"}, {"authorId": "1490958248", "name": "J. Tan"}, {"authorId": "2153535439", "name": "Cynthia Lim"}, {"authorId": "123898373", "name": "K. Ng"}]}, {"paperId": "7845bfb55f5ce573b87d77bb76d4d38829b37620", "externalIds": {"ArXiv": "2109.13296", "DBLP": "conf/emnlp/UchenduMLZ021", "DOI": "10.18653/v1/2021.findings-emnlp.172", "CorpusId": 237589233}, "url": "https://www.semanticscholar.org/paper/7845bfb55f5ce573b87d77bb76d4d38829b37620", "title": "TURINGBENCH: A Benchmark Environment for Turing Test in the Age of Neural Text Generation", "abstract": "Recent progress in generative language models has enabled machines to generate astonishingly realistic texts. While there are many legitimate applications of such models, there is also a rising need to distinguish machine-generated texts from human-written ones (e.g., fake news detection). However, to our best knowledge, there is currently no benchmark environment with datasets and tasks to systematically study the so-called \u201cTuring Test\u201d problem for neural text generation methods. In this work, we present the TURINGBENCH benchmark environment, which is comprised of (1) a dataset with 200K humanor machine-generated samples across 20 labels {Human, GPT-1, GPT-2_small, GPT-2_medium, GPT-2_large, GPT-2_xl, GPT-2_PyTorch, GPT-3, GROVER_base, GROVER_large, GROVER_mega, CTRL, XLM, XLNET_base, XLNET_large, FAIR_wmt19, FAIR_wmt20, TRANSFORMER_XL, PPLM_distil, PPLM_gpt2}, (2) two benchmark tasks\u2013i.e., Turing Test (TT) and Authorship Attribution (AA), and (3) a website with leaderboards. Our preliminary experimental results using TURINGBENCH show that FAIR_wmt20 and GPT-3 are the current winners, among all language models tested, in generating the most human-like indistinguishable texts with the lowest F1 score by five state-of-the-art TT detection models. The TURINGBENCH is available at: https: //turingbench.ist.psu.edu/", "venue": "Conference on Empirical Methods in Natural Language Processing", "year": 2021, "referenceCount": 78, "citationCount": 11, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-09-27", "journal": {"pages": "2001-2016"}, "authors": [{"authorId": "150035131", "name": "Adaku Uchendu"}, {"authorId": "2115851910", "name": "Zeyu Ma"}, {"authorId": "145535348", "name": "Thai Le"}, {"authorId": "144142354", "name": "Rui Zhang"}, {"authorId": "145948198", "name": "Dongwon Lee"}]}, {"paperId": "3a7ece239cbe8b7fcb42d2dcd895fe3d715fd3cc", "externalIds": {"DOI": "10.1109/GUCON50781.2021.9573882", "CorpusId": 241595564}, "url": "https://www.semanticscholar.org/paper/3a7ece239cbe8b7fcb42d2dcd895fe3d715fd3cc", "title": "The Psychology of Thinking in Creating AI", "abstract": "The broad-scale emergence of AI in industry calls forth basic questions in terms of the knowledge bases and approaches relevant for its design. Engineering design has been mainly developed for electromechanical artifacts. In practice, this has meant that the scientific knowledge required for creating technical artifacts such as engines, cars, ships, cranes, telephones, radios, TVs, and simple data processing units has been natural science. However, one cannot find intelligent processes by means of physics and chemistry. Natural scientific phenomena follow their deterministic laws, but intelligence is based on selection and decision processes. The conceptual landscape of natural science is optimized for different kinds of phenomena than intelligent information processing. Consequently, the basic research under technology design should be rethought in light of the emergence of AI. To grasp intelligent information processing, we need concepts and approaches suited for the task. To create intelligent technologies on this basis, we need concepts and approaches that afford the operationalization of such information in artificial systems. We suggest that psychology of thinking and cognitive modeling provide a logical basis for future AI design.", "venue": "2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON)", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-09-24", "journal": {"pages": "1-6", "name": "2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON)"}, "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}, {"authorId": "74461425", "name": "A. Karvonen"}]}, {"paperId": "6fe5e9b393f3c10bd31e4bb37a12676a7ee37a6b", "externalIds": {"MAG": "3204707744", "DOI": "10.15295/bmij.v9i3.1863", "CorpusId": 244206889}, "url": "https://www.semanticscholar.org/paper/6fe5e9b393f3c10bd31e4bb37a12676a7ee37a6b", "title": "Proaktif insan kaynaklar\u0131 y\u00f6netiminin yeni g\u00fcc\u00fc: \u0130K analiti\u011fi ve yapay zek\u00e2", "abstract": "\u0130K Analiti\u011fi son y\u0131llarda giderek \u00f6nem kazanan konular aras\u0131nda yer almaktad\u0131r. Kurumun insan kaynaklar\u0131na ili\u015fkin verilerini analiz etmek, sorunlar\u0131n\u0131 tespit etmek ve strateji belirlemek i\u00e7in kullan\u0131lan \u0130K Analiti\u011fi kurumlara \u00f6nemli bir rekabet avantaj\u0131 sa\u011flamaktad\u0131r. \u0130K analiti\u011fi, i\u015fletmelerin elektronik tablo tabanl\u0131 veri deposundan uzakla\u015fmas\u0131n\u0131 sa\u011flayarak, verileri ger\u00e7ek zamanl\u0131 olarak tutmaya ve bunlar\u0131 kurumun mevcut veri ak\u0131\u015f\u0131 ile birlikte analiz etmeye imk\u00e2n tan\u0131maktad\u0131r. Yapay zek\u00e2 y\u00f6ntemlerinin bu alanda kullan\u0131lmas\u0131 ile verimlilik ve tasarruf art\u0131\u015f\u0131 sa\u011flayan \u0130K analiti\u011fi alan\u0131na her ge\u00e7en g\u00fcn daha fazla i\u015fletme yat\u0131r\u0131m yapmaktad\u0131r. Geli\u015ftirilen \u0130K analiti\u011fi mod\u00fclleri ile i\u015fletmeler \u0130K s\u00fcre\u00e7lerini daha etkin \u015fekilde y\u00f6netebilmekte, i\u015fe al\u0131m kararlar\u0131n\u0131 daha sa\u011fl\u0131kl\u0131 verebilmekte, i\u015ften ayr\u0131lma niyeti olan \u00e7al\u0131\u015fanlar\u0131 \u00f6nceden tahmin edebilmekte, gelece\u011fe y\u00f6nelik i\u015fg\u00fcc\u00fc optimizasyonu ve planlamalar\u0131n\u0131 daha etkin bi\u00e7imde yapabilmektedir. B\u00f6ylece, \u0130K analiti\u011fi sayesinde veri temelli karar vermek ve strateji belirlemek kolayla\u015fmaktad\u0131r. Bu \u00e7al\u0131\u015fma kapsam\u0131nda \u0130K analiti\u011fi kavram\u0131n\u0131n \u00f6nemi incelenecek ve \u0130K fonksiyonlar\u0131n\u0131n hangi s\u00fcre\u00e7lerinde \u0130K analiti\u011finden yararlan\u0131ld\u0131\u011f\u0131, hangi yapay zek\u00e2 y\u00f6ntemlerinin bu alanda nas\u0131l kullan\u0131ld\u0131\u011f\u0131 ve i\u015fletmelere ne gibi yarar sa\u011flad\u0131\u011f\u0131 \u00fczerinde durulacakt\u0131r. Gerek \u0130K analiti\u011fi gerekse yapay zek\u00e2 konular\u0131n\u0131n i\u015fletmecilik alan\u0131nda giderek y\u00fckselen bir trend kazanmas\u0131, bununla beraber yerli literat\u00fcrde \u0130K Analiti\u011fi ve Yapay Zek\u00e2 konusunu birlikte ele alan ve i\u015fletmelere katt\u0131\u011f\u0131 de\u011fer y\u00f6n\u00fcnden inceleyen teorik pek fazla \u00e7al\u0131\u015fman\u0131n bulunmamas\u0131 bu \u00e7al\u0131\u015fman\u0131n \u00f6nemini olu\u015fturmaktad\u0131r. \u00c7al\u0131\u015fma \u00f6zellikle ilgili alanda \u00e7al\u0131\u015fan akademisyenler ile uygulamac\u0131lara yol g\u00f6sterici olacakt\u0131r.", "venue": "Business & Management Studies: An International Journal", "year": 2021, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-24", "journal": {"name": "Business & Management Studies: An International Journal"}, "authors": [{"authorId": "121500400", "name": "Yasemin Bal"}, {"authorId": "2100654125", "name": "Mert Bal"}]}, {"paperId": "bc9598dc4ed0472d8b59b87ed3a139f8347d40ee", "externalIds": {"DBLP": "journals/corr/abs-2109-12075", "ArXiv": "2109.12075", "CorpusId": 237635337}, "url": "https://www.semanticscholar.org/paper/bc9598dc4ed0472d8b59b87ed3a139f8347d40ee", "title": "Towards A Measure Of General Machine Intelligence", "abstract": "To build general-purpose arti\ufb01cial intelligence systems that can deal with unknown variables across unknown domains, we need benchmarks that measure how well these systems perform on tasks they have never seen before. A prerequisite for this is a measure of a task\u2019s generalization dif\ufb01culty, or how dissimilar it is from the system\u2019s prior knowledge and experience. If the skill of an intelligence system in a particular domain is de\ufb01ned as it\u2019s ability to consistently generate a set of instructions (or programs) to solve tasks in that domain, current benchmarks do not quantitatively measure the ef\ufb01ciency of acquiring new skills, making it possible to brute-force skill acquisition by training with unlimited amounts of data and compute power. With this in mind, we \ufb01rst propose a common language of instruction, a programming language that allows the expression of programs in the form of directed acyclic graphs across a wide variety of real-world domains and computing platforms. Using programs generated in this language, we demonstrate a match-based method to both score performance and calculate the generalization dif\ufb01culty of any given set of tasks. We use these to de\ufb01ne a numeric benchmark called the generalization index, or the g-index , to measure and compare the skill-acquisition ef\ufb01ciency of any intelligence system on a set of real-world tasks. Finally, we evaluate the suitability of some well-known models as general intelligence systems by calculating their g-index scores.", "venue": "ArXiv", "year": 2021, "referenceCount": 71, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-24", "journal": {"volume": "abs/2109.12075", "name": "ArXiv"}, "authors": [{"authorId": "2052063253", "name": "Gautham Venkatasubramanian"}, {"authorId": "2151877389", "name": "Sibesh Kar"}, {"authorId": "2120287881", "name": "Abhimanyu Singh"}, {"authorId": "2134908489", "name": "Shubham Mishra"}, {"authorId": "50472950", "name": "Dushyant Yadav"}, {"authorId": "2128109101", "name": "Shreyansh Chandak"}]}, {"paperId": "ee62d67b03c300e1d0118b19864fd83a8812b3e0", "externalIds": {"DOI": "10.37679/trta.962940", "CorpusId": 239120630}, "url": "https://www.semanticscholar.org/paper/ee62d67b03c300e1d0118b19864fd83a8812b3e0", "title": "Cahit Arf\u2019\u0131n \u201cMakine D\u00fc\u015f\u00fcnebilir mi ve Nas\u0131l D\u00fc\u015f\u00fcnebilir?\u201d Adl\u0131 Makalesi \u00dczerine Bir \u00c7al\u0131\u015fma", "abstract": null, "venue": "TRT Akademi", "year": 2021, "referenceCount": 4, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-23", "journal": {"name": "TRT Akademi"}, "authors": [{"authorId": "2075824974", "name": "Filiz Sari"}]}, {"paperId": "42fb503b15588a8be298ab024f522d0010027f39", "externalIds": {"DBLP": "conf/agi/StClairHB21", "ArXiv": "2109.15097", "DOI": "10.1007/978-3-030-93758-4_27", "CorpusId": 238226881}, "url": "https://www.semanticscholar.org/paper/42fb503b15588a8be298ab024f522d0010027f39", "title": "The Role of Bio-Inspired Modularity in General Learning", "abstract": null, "venue": "AGI", "year": 2021, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-23", "journal": {"pages": "261-268"}, "authors": [{"authorId": "2129169482", "name": "Rachel A. StClair"}, {"authorId": "144181596", "name": "W. Hahn"}, {"authorId": "2297916", "name": "Elan Barenholtz"}]}, {"paperId": "a01671aeac10959b2510001915c7788ea9a0f87a", "externalIds": {"PubMedCentral": "8493292", "DOI": "10.3389/frobt.2021.724798", "CorpusId": 237587640, "PubMed": "34631805"}, "url": "https://www.semanticscholar.org/paper/a01671aeac10959b2510001915c7788ea9a0f87a", "title": "Augmented Reality Meets Artificial Intelligence in Robotics: A Systematic Review", "abstract": "Recently, advancements in computational machinery have facilitated the integration of artificial intelligence (AI) to almost every field and industry. This fast-paced development in AI and sensing technologies have stirred an evolution in the realm of robotics. Concurrently, augmented reality (AR) applications are providing solutions to a myriad of robotics applications, such as demystifying robot motion intent and supporting intuitive control and feedback. In this paper, research papers combining the potentials of AI and AR in robotics over the last decade are presented and systematically reviewed. Four sources for data collection were utilized: Google Scholar, Scopus database, the International Conference on Robotics and Automation 2020 proceedings, and the references and citations of all identified papers. A total of 29 papers were analyzed from two perspectives: a theme-based perspective showcasing the relation between AR and AI, and an application-based analysis highlighting how the robotics application was affected. These two sections are further categorized based on the type of robotics platform and the type of robotics application, respectively. We analyze the work done and highlight some of the prevailing limitations hindering the field. Results also explain how AR and AI can be combined to solve the model-mismatch paradigm by creating a closed feedback loop between the user and the robot. This forms a solid base for increasing the efficiency of the robotic application and enhancing the user\u2019s situational awareness, safety, and acceptance of AI robots. Our findings affirm the promising future for robust integration of AR and AI in numerous robotic applications.", "venue": "Frontiers in Robotics and AI", "year": 2021, "referenceCount": 140, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-09-22", "journal": {"volume": "8", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "1471727345", "name": "Zahraa Bassyouni"}, {"authorId": "47170365", "name": "I. Elhajj"}]}, {"paperId": "31218e862a20c7065f1ba3d5cc00f7466d285979", "externalIds": {"DOI": "10.1146/annurev-psych-021721-110002", "CorpusId": 237557280, "PubMed": "34535061"}, "url": "https://www.semanticscholar.org/paper/31218e862a20c7065f1ba3d5cc00f7466d285979", "title": "Neurophysiology of Remembering.", "abstract": "By linking the past with the future, our memories define our sense of identity. Because human memory engages the conscious realm, its examination has historically been approached from language and introspection and proceeded largely along separate parallel paths in humans and other animals. Here, we first highlight the achievements and limitations of this mind-based approach and make the case for a new brain-based understanding of declarative memory with a focus on hippocampal physiology. Next, we discuss the interleaved nature and common physiological mechanisms of navigation in real and mental spacetime. We suggest that a distinguishing feature of memory types is whether they subserve actions for single or multiple uses. Finally, in contrast to the persisting view of the mind as a highly plastic blank slate ready for the world to make its imprint, we hypothesize that neuronal networks are endowed with a reservoir of neural trajectories, and the challenge faced by the brain is how to select and match preexisting neuronal trajectories with events in the world. Expected final online publication date for the Annual Review of Psychology, Volume 73 is January 2022. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.", "venue": "Annual review of psychology", "year": 2021, "referenceCount": 142, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-09-17", "journal": {"name": "Annual review of psychology"}, "authors": [{"authorId": "144128278", "name": "G. Buzs\u00e1ki"}, {"authorId": "36419128", "name": "S. McKenzie"}, {"authorId": "1766548", "name": "L. Davachi"}]}, {"paperId": "928b839accb93e902e1d38c3b12b156c7eda5e23", "externalIds": {"MAG": "3200363141", "DOI": "10.20944/preprints202109.0234.v1", "CorpusId": 240540234}, "url": "https://www.semanticscholar.org/paper/928b839accb93e902e1d38c3b12b156c7eda5e23", "title": "How Biological Concepts and Evolutionary Theories Are Inspiring Advances in Machine Intelligence", "abstract": "Since its advent in the mid-twentieth century, the field of artificial intelligence (AI) has been heavily influenced by biology. From the structure of the brain to evolution by natural selection, core biological concepts underpin many of the fundamental breakthroughs in modern AI. Here, focusing specifically on artificial neural networks (ANNs) that have become commonplace in machine learning, we show the numerous connections between theories based on coevolution, multi-level selection, modularity and competition and related developments in ANNs. Our aim is to illuminate the valuable but often overlooked inspiration biologists have provided AI research and to spark future contributions at this intersection of biology and computer science. Although recent advances in AI have been swift, many significant challenges remain requiring innovative solutions. Thankfully, biology in all its forms still has a lot to teach us, especially when trying to create truly intelligent machines.", "venue": "", "year": 2021, "referenceCount": 104, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-14", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2137557298", "name": "Abigail R. Gutai"}, {"authorId": "3180624", "name": "T. Gorochowski"}]}, {"paperId": "19a4f6479a24d6b992c21f71fe2bb50567bd1e6f", "externalIds": {"DBLP": "journals/corr/abs-2109-06098", "ArXiv": "2109.06098", "CorpusId": 237491904}, "url": "https://www.semanticscholar.org/paper/19a4f6479a24d6b992c21f71fe2bb50567bd1e6f", "title": "The mathematics of adversarial attacks in AI - Why deep learning is unstable despite the existence of stable neural networks", "abstract": "The unprecedented success of deep learning (DL) makes it unchallenged when it comes to classification problems. However, it is well established that the current DL methodology produces universally unstable neural networks (NNs). The instability problem has caused an enormous research effort \u2013 with a vast literature on so-called adversarial attacks \u2013 yet there has been no solution to the problem. Our paper addresses why there has been no solution to the problem, as we prove the following mathematical paradox: any training procedure based on training neural networks for classification problems with a fixed architecture will yield neural networks that are either inaccurate or unstable (if accurate) \u2013 despite the provable existence of both accurate and stable neural networks for the same classification problems. The key is that the stable and accurate neural networks must have variable dimensions depending on the input, in particular, variable dimensions is a necessary condition for stability. Our result points towards the paradox that accurate and stable neural networks exist, however, modern algorithms do not compute them. This yields the question: if the existence of neural networks with desirable properties can be proven, can one also find algorithms that compute them? There are cases in mathematics where provable existence implies computability, but will this be the case for neural networks? The contrary is true, as we demonstrate how neural networks can provably exist as approximate minimisers to standard optimisation problems with standard cost functions, however, no randomised algorithm can compute them with probability better than 1/2. CONTENTS", "venue": "ArXiv", "year": 2021, "referenceCount": 62, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-13", "journal": {"volume": "abs/2109.06098", "name": "ArXiv"}, "authors": [{"authorId": "2849211", "name": "Alexander Bastounis"}, {"authorId": "145920634", "name": "A. Hansen"}, {"authorId": "148326473", "name": "Verner Vlacic"}]}, {"paperId": "900b10a441253f2edbcf65446624d68a0d5fa14e", "externalIds": {"MAG": "3197617696", "DOI": "10.15407/fd2021.03.180", "CorpusId": 239648033}, "url": "https://www.semanticscholar.org/paper/900b10a441253f2edbcf65446624d68a0d5fa14e", "title": "Artificial intelligence as an anthropotechnology", "abstract": "Artificial intelligence is a computer system that thinks or acts like humans. Features of AI systems embody implicit beliefs concerning the human nature that AI developers have. \u201cStrong\u201d AI, which has the general cognitive abilities of an adult, has not yet been created, while \u201cweak\u201d AI is already part of the planetary computation infrastructure. Neural network AI mimics specific types of human behavior, generalizing data about the everyday lives of its users. This AI approach corresponds to the philosophical mainstream of the 20th century, when everyday life was seen as a source of the linguistic and the social pre-given that yields mutual understanding. This approach is also based on the traditional human-machine dichotomy and the corresponding idea that human nature is stable and independent of the technological condition. However, in the post-metaphysical age, when human interaction with technology is communicative rather than instrumental, data on everyday life cannot be an independent paragon of the human nature. AI systems do not only codify the descriptive features of human nature, but also discipline their users, as the digital environment in which everyday data can be collected is already organized by AI. Accordingly, in the digital environment, people are forced to reproduce new norms of behavior, codified by AI, which became one of the forms of human self-mastery, or anthropotechnology. The impact of AI is rarely noted, as the digital environment in which people interact with AI is not organized in a way that is clearly understandable. The anthropotechnological nature of AI is a side effect of the development of platforms, so AI developers rarely take responsibility for the norms embodied in the systems they create.", "venue": "Filosofska dumka (Philosophical Thought)", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-07", "journal": {"name": "Filosofska dumka (Philosophical Thought)"}, "authors": [{"authorId": "2135028481", "name": "Mykhailo Bogachov"}]}, {"paperId": "ea7d7c7486896c5399981f1ab5a2c45af2a8b538", "externalIds": {"MAG": "3198531868", "DOI": "10.1007/S43681-021-00092-X", "CorpusId": 239681870}, "url": "https://www.semanticscholar.org/paper/ea7d7c7486896c5399981f1ab5a2c45af2a8b538", "title": "Robotomorphy: Becoming our creations", "abstract": null, "venue": "", "year": 2021, "referenceCount": 54, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-04", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "d7456c3f5117847d2a99a4518427c6f2ac0992db", "externalIds": {"DOI": "10.1016/j.radi.2021.07.012", "CorpusId": 237443449, "PubMed": "34493445"}, "url": "https://www.semanticscholar.org/paper/d7456c3f5117847d2a99a4518427c6f2ac0992db", "title": "Artificial intelligence in radiation oncology: A review of its current status and potential application for the radiotherapy workforce.", "abstract": null, "venue": "Radiography", "year": 2021, "referenceCount": 62, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-09-04", "journal": {"name": "Radiography"}, "authors": [{"authorId": "46574199", "name": "C. Parkinson"}, {"authorId": "82659765", "name": "C. Matthams"}, {"authorId": "39595875", "name": "K. Foley"}, {"authorId": "1628685596", "name": "E. Spezi"}]}, {"paperId": "a0d4ea9bc562ad4c19eb84d4a5c7e35e70478151", "externalIds": {"DOI": "10.47485/2693-2490.1053", "CorpusId": 245582306}, "url": "https://www.semanticscholar.org/paper/a0d4ea9bc562ad4c19eb84d4a5c7e35e70478151", "title": "Neural Experience of Conscious Time", "abstract": "\u201cPure perception and pure memory constantly intermingle\u201d\nHenri Bergson, 1908.\n\nOne can consider that \u201cTime\u201d and \u201cmemory\u201d are related experiential facets of mentality. Without memory, there is no Time. To clarify, we distinguish between the physisist\u2019s objective time (pTime), which has no emotive quality or memory component, and the subjective conscious time (cTime), which engages both emotions and memory.\n\nOur tripartite mechanism of a neural memory involves neurons interacting with their surrounding extracellular matrix (nECM). Incoming perceptions are chemically encoded in the nECM as metal-centered cognitive units of information (cuinfo), wherein NTs serve as molecular encoders of emotive states\n\nIn the context of the tripartite mechanism (Marx & Gilon, 2012-2020), we consider two possible modes whereby the temporal sequence of events (i.e. cTime) could be recalled by the sensing neural net.\n\nChemical (allosteric) sensing of cuinfo in the nECM by neural receptors (i.e. GPCR, integrins, etc.) which establish fleeting contact with the nECM as they diffuse along the neural membrane. Effectively, this is a lateral decoding process.\nElectrodynamic sensing of cuinfo vertically displaced from the neural surface. New nECM components and cuinfo are constantly being formed, like coral growths, extending from the neural surface. The individual neuron senses and decodes the distal cuinfo in the surrounding nECM (like long-distance radar detection). Neural sensing is consolidated and transformed by the net into comprehensive memory.\nThese speculations suggest experimental tests to measure the interactions of the tripartite components, to examine the electro-chemical aspects of neural encoding of memory perceived as cTime.", "venue": "Journal of Psychology and Neuroscience", "year": 2021, "referenceCount": 88, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-03", "journal": {"name": "Journal of Psychology and Neuroscience"}, "authors": [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", "name": "C. Gilon"}]}, {"paperId": "3d96c99ca2df09617879d9d998a2938449ae1513", "externalIds": {"ArXiv": "2109.01517", "DBLP": "journals/corr/abs-2109-01517", "DOI": "10.1016/j.cpet.2021.07.001", "CorpusId": 237417186, "PubMed": "34537126"}, "url": "https://www.semanticscholar.org/paper/3d96c99ca2df09617879d9d998a2938449ae1513", "title": "A brief history of AI: how to prevent another winter (a critical review)", "abstract": null, "venue": "PET clinics", "year": 2021, "referenceCount": 90, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-09-03", "journal": {"volume": "16 4", "pages": "\n 449-469\n ", "name": "PET clinics"}, "authors": [{"authorId": "143994489", "name": "Amirhosein Toosi"}, {"authorId": "145456332", "name": "A. Bottino"}, {"authorId": "2335142", "name": "B. Saboury"}, {"authorId": "1691257", "name": "E. Siegel"}, {"authorId": "2646713", "name": "A. Rahmim"}]}, {"paperId": "cdb971376a98337bdd123913c4adac2338477433", "externalIds": {"DOI": "10.1177/1071181321651098", "CorpusId": 244088295}, "url": "https://www.semanticscholar.org/paper/cdb971376a98337bdd123913c4adac2338477433", "title": "Effects of Human Personal Space on the Robot Obstacle Avoidance Be havior: A Human-in-the-loop Assessment", "abstract": "To ensure both the physical and mental safety of humans during human-robot interaction (HRI), a rich body of literature has been accumulated, and the notion of socially acceptable robot behaviors has arisen. To be specific, it requires the motion of robots not only to be physically collision-free but also to consider and respect the social conventions developed and enforced in the human social contexts. Among these social conventions, personal space, or proxemics, is one of the most commonly considered in the robot behavioral design. Nevertheless, most previous research efforts assumed that robots could generate human-like motions by merely mimicking a human. Rarely are the robot\u2019s behavioral algorithms assessed and verified by human participants. Therefore, to fill the research gap, a Turing-like simulation test, which contains the interaction of two agents (each agent could be a human or a robot) in a shared space was conducted. Participants (33 in total) were asked to identify and label the category of those agents followed by questionnaires. Results revealed that people who had different attitudes and prior expectations of appropriate robot behaviors responded to the algorithm differently, and their identification accuracy varied significantly. In general, by considering personal space in the robot obstacle avoidance algorithm, robots could demonstrate more humanlike motion behaviors which are confirmed by human experiments.", "venue": "Proceedings of the Human Factors and Ergonomics Society Annual Meeting", "year": 2021, "referenceCount": 24, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "65", "pages": "1195 - 1199", "name": "Proceedings of the Human Factors and Ergonomics Society Annual Meeting"}, "authors": [{"authorId": "1920941674", "name": "Yuhao Chen"}, {"authorId": "2148492143", "name": "Trevor Smith"}, {"authorId": "2097015689", "name": "Nathan Hewitt"}, {"authorId": "2153395244", "name": "Yu Gu"}, {"authorId": "5234789", "name": "Boyi Hu"}]}, {"paperId": "0539c6a70adb2481ed3c67d2d0c9fbf93cf250ee", "externalIds": {"MAG": "3198593607", "DOI": "10.5772/INTECHOPEN.96324", "CorpusId": 239709576}, "url": "https://www.semanticscholar.org/paper/0539c6a70adb2481ed3c67d2d0c9fbf93cf250ee", "title": "Quest for I (Intelligence) in AI (Artificial Intelligence): A Non-Elusive Attempt", "abstract": null, "venue": "", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "33966570", "name": "K. Ray"}]}, {"paperId": "c6451bbc1160050b0af049a759ed252b5d310604", "externalIds": {"DOI": "10.15290/bsp.2021.26.03.03", "CorpusId": 239476730}, "url": "https://www.semanticscholar.org/paper/c6451bbc1160050b0af049a759ed252b5d310604", "title": "Is the Traditional Method of Regulation (the Legislative Act) Sufficient to Regulate Artificial Intelligence, or Should It Also Be Regulated by an Algorithmic Code?", "abstract": "Abstract The issue of the regulation of artificial intelligence (AI) is one of the significant challenges faced by the EU at present. Most researchers focus on the substantive scope of AI regulation, including state law, ethical norms and soft law. In addition to the substantive and legal scope of the regulation, it is worthwhile considering the manner of such regulation.1 Since AI is an algorithmic code, it seems correct to regulate (restrict) AI not so much with traditional law established in natural (human) language as with one implemented into algorithms. They may operate as a tool supporting traditional legislation (RegTech), but it is possible to go further with the issue and create regulation algorithms which implement the law as the effective law. However, this requires a new approach to law and legislation \u2013 the law as algorithmic code.", "venue": "Bia\u0142ostockie Studia Prawnicze", "year": 2021, "referenceCount": 70, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": "26", "pages": "43 - 60", "name": "Bia\u0142ostockie Studia Prawnicze"}, "authors": [{"authorId": "102000931", "name": "D. Szostek"}]}, {"paperId": "767e296064cc30f814c52c270f493ef297b8b0cb", "externalIds": {"DBLP": "journals/symmetry/SunZ21", "MAG": "3196880919", "DOI": "10.3390/sym13091603", "CorpusId": 239668788}, "url": "https://www.semanticscholar.org/paper/767e296064cc30f814c52c270f493ef297b8b0cb", "title": "Modeling Neuronal Systems as an Open Quantum System", "abstract": "We propose a physical model for neurons to describe how neurons interact with one another through the surrounding materials of neuronal cell bodies. We model the neuronal cell surroundings, include the dendrites, the axons and the synapses, as well as the surrounding glial cells, as a continuous distribution of oscillating modes inspired from the electric circuital picture of neuronal action potential. By analyzing the dynamics of this neuronal model by using the master equation approach of open quantum systems, we investigated the collective behavior of neurons. After applying stimulations to the neuronal system, the neuron collective state is activated and shows the action potential behavior. We find that this model can generate random neuron\u2013neuron interactions and is appropriate for describing the process of information transmission in the neuronal system, which may pave a potential route toward understanding the dynamics of nervous system.", "venue": "Symmetry", "year": 2021, "referenceCount": 55, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "13", "pages": "1603", "name": "Symmetry"}, "authors": [{"authorId": "2108568401", "name": "Yujie Sun"}, {"authorId": "9810381", "name": "Wei-Min Zhang"}]}, {"paperId": "8b08e549fe4c88b32c31b988ac97adf74d1bf63d", "externalIds": {"MAG": "3200793067", "DOI": "10.1016/j.hrmr.2021.100856", "CorpusId": 240526859}, "url": "https://www.semanticscholar.org/paper/8b08e549fe4c88b32c31b988ac97adf74d1bf63d", "title": "Toward the human \u2013 Centered approach. A revised model of individual acceptance of AI", "abstract": null, "venue": "Human Resource Management Review", "year": 2021, "referenceCount": 140, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"name": "Human Resource Management Review"}, "authors": [{"authorId": "145036277", "name": "M. Giudice"}, {"authorId": "97494986", "name": "V. Scuotto"}, {"authorId": "50431348", "name": "Beatrice Orlando"}, {"authorId": "73855458", "name": "Mario Mustilli"}]}, {"paperId": "5915077680344ac6da77056ce8733ace28571278", "externalIds": {"PubMedCentral": "8468082", "DOI": "10.3390/diagnostics11091719", "CorpusId": 237938750, "PubMed": "34574060"}, "url": "https://www.semanticscholar.org/paper/5915077680344ac6da77056ce8733ace28571278", "title": "A New Dawn for the Use of Artificial Intelligence in Gastroenterology, Hepatology and Pancreatology", "abstract": "Artificial intelligence (AI) is rapidly becoming an essential tool in the medical field as well as in daily life. Recent developments in deep learning, a subfield of AI, have brought remarkable advances in image recognition, which facilitates improvement in the early detection of cancer by endoscopy, ultrasonography, and computed tomography. In addition, AI-assisted big data analysis represents a great step forward for precision medicine. This review provides an overview of AI technology, particularly for gastroenterology, hepatology, and pancreatology, to help clinicians utilize AI in the near future.", "venue": "Diagnostics", "year": 2021, "referenceCount": 201, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "11", "name": "Diagnostics"}, "authors": [{"authorId": "3688948", "name": "A. Oka"}, {"authorId": "4283493", "name": "N. Ishimura"}, {"authorId": "47000564", "name": "S. Ishihara"}]}, {"paperId": "3a3be5f223c237123ee35ea058b7d21a650ca557", "externalIds": {"DBLP": "journals/patterns/NakhleH21", "PubMedCentral": "8441561", "DOI": "10.1016/j.patter.2021.100323", "CorpusId": 237592274, "PubMed": "34553170"}, "url": "https://www.semanticscholar.org/paper/3a3be5f223c237123ee35ea058b7d21a650ca557", "title": "Ready, Steady, Go AI: A practical tutorial on fundamentals of artificial intelligence and its applications in phenomics image analysis", "abstract": null, "venue": "Patterns", "year": 2021, "referenceCount": 146, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "2", "name": "Patterns"}, "authors": [{"authorId": "31094827", "name": "Farid Nakhle"}, {"authorId": "2318165", "name": "A. Harfouche"}]}, {"paperId": "8acef4846dc195a718505cd0a2ca96a433acd50d", "externalIds": {"DOI": "10.1086/715227", "CorpusId": 237537702}, "url": "https://www.semanticscholar.org/paper/8acef4846dc195a718505cd0a2ca96a433acd50d", "title": "Chatbots, Gender, and Race on Web 2.0 Platforms: Tay.AI as Monstrous Femininity and Abject Whiteness", "abstract": "In March 2016, Microsoft launched Tay.AI, a chatbot designed to experiment with conversational understanding through direct engagement with social media users. Marketed as the digital representation of an 18\u201324-year-old, cis-gendered female, Tay.ai was meant to be chatty, personable, friendly, and innocuous. Hours into launch, however, the chatbot\u2019s mimetic programming structure was taken advantage of by organized groups of online social media users, and Tay.ai began replying to queries with alt-right and neo-Nazi ideology. In this article, I explore the role that Tay.ai\u2019s assigned gender and race played in influencing both Tay.ai\u2019s initial design and, subsequently, the program\u2019s monstrous evolution. This is achieved through three avenues of thought. First, I situate Tay within the new public of Web 2.0, a space reliant on user participation and beholden to the neoliberal, racialized, and gendered architectures that produce it. I then consider Tay as an evolution of the chatbot, arguing that Tay is emblematic of both race and gender as social technologies. Third, I explore Tay\u2019s aberration from programmatic protocols in the context of the monstrous and the abject, suggesting that digital nonhuman ambivalence to programming and encoded control presents a space of productive creativity.", "venue": "Signs: Journal of Women in Culture and Society", "year": 2021, "referenceCount": 86, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": "47", "pages": "105 - 127", "name": "Signs: Journal of Women in Culture and Society"}, "authors": [{"authorId": "2127104740", "name": "Zoe Vorsino"}]}, {"paperId": "dc232b07587a92478bcc25aaba8f739c5621daa0", "externalIds": {"DBLP": "journals/ais/Farhadi21", "DOI": "10.1007/s00146-020-01136-2", "CorpusId": 231615619}, "url": "https://www.semanticscholar.org/paper/dc232b07587a92478bcc25aaba8f739c5621daa0", "title": "There is no \u201cI\u201d in \u201cAI\u201d", "abstract": null, "venue": "AI Soc.", "year": 2021, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "36", "pages": "1035-1046", "name": "AI & SOCIETY"}, "authors": [{"authorId": "11060885", "name": "A. Farhadi"}]}, {"paperId": "a1a3174094a15bd439f6a40c5407734ed5847347", "externalIds": {"MAG": "3194739791", "DOI": "10.22214/ijraset.2021.37617", "CorpusId": 238729641}, "url": "https://www.semanticscholar.org/paper/a1a3174094a15bd439f6a40c5407734ed5847347", "title": "Role of Artificial Intelligence in Medicine and Clinical Research", "abstract": "Abstract: Artificial Intelligence is a branch of computer science that enables to analyse complex medical data. The proficiency of artificial intelligence techniques has been explored to a great extent in the field of medicine. Most of the medications go to the business sector after a long tedious process of drug development. It can take a period of 10-15 years or more to convey a medication from its introductory revelation to the hands of the patients. Artificial Intelligence can significantly reduce the time required and can also cut down the expenses by half. Among the methods, artificial neural network is the most widely used analytical tool while other techniques like fuzzy expert systems, natural language processing, robotic process automation and evolutionary computation have been used in different clinical settings. The aim of this paper is to discuss the different artificial intelligence techniques and provide a perspective on the benefits, future opportunities and risks of established artificial intelligence applications in clinical practice on medical education, physicians, healthcare institutions and bioethics. Keywords: Artificial intelligence, clinical trials, medical technologies, artificial neural networks, diagnosis.", "venue": "International Journal for Research in Applied Science and Engineering Technology", "year": 2021, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-31", "journal": {"name": "International Journal for Research in Applied Science and Engineering Technology"}, "authors": [{"authorId": "2132205477", "name": "Jhumpa Sarma"}]}, {"paperId": "e2ce77604b6e46bee85069c3d4dd38f66ef6d9a5", "externalIds": {"DOI": "10.1007/978-3-030-81447-2_1", "CorpusId": 242426762}, "url": "https://www.semanticscholar.org/paper/e2ce77604b6e46bee85069c3d4dd38f66ef6d9a5", "title": "Computationalism in a Dynamic and\u00a0Distributed Eco-Cognitive Perspective", "abstract": null, "venue": "Cognitive Systems Monographs", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-08-31", "journal": {"name": "Cognitive Systems Monographs"}, "authors": [{"authorId": "1695372", "name": "L. Magnani"}]}, {"paperId": "32756c1475aa4b3867962b2c838844436bf8bce3", "externalIds": {"PubMedCentral": "8431329", "DOI": "10.3390/ijerph18179206", "CorpusId": 237468443, "PubMed": "34501795"}, "url": "https://www.semanticscholar.org/paper/32756c1475aa4b3867962b2c838844436bf8bce3", "title": "Artificial Intelligence for Identifying the Prevention of Medication Incidents Causing Serious or Moderate Harm: An Analysis Using Incident Reporters\u2019 Views", "abstract": "The purpose of this study was to describe incident reporters\u2019 views identified by artificial intelligence concerning the prevention of medication incidents that were assessed, causing serious or moderate harm to patients. The information identified the most important risk management areas in these medication incidents. This was a retrospective record review using medication-related incident reports from one university hospital in Finland between January 2017 and December 2019 (n = 3496). Of these, incidents that caused serious or moderate harm to patients (n = 137) were analysed using artificial intelligence. Artificial intelligence classified reporters\u2019 views on preventing incidents under the following main categories: (1) treatment, (2) working, (3) practices, and (4) setting and multiple sub-categories. The following risk management areas were identified: (1) verification, documentation and up-to-date drug doses, drug lists and other medication information, (2) carefulness and accuracy in managing medications, (3) ensuring the flow of information and communication regarding medication information and safeguarding continuity of patient care, (4) availability, update and compliance with instructions and guidelines, (5) multi-professional cooperation, and (6) adequate human resources, competence and suitable workload. Artificial intelligence was found to be useful and effective to classifying text-based data, such as the free text of incident reports.", "venue": "International Journal of Environmental Research and Public Health", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-31", "journal": {"volume": "18", "name": "International Journal of Environmental Research and Public Health"}, "authors": [{"authorId": "15914029", "name": "Marja H\u00e4rk\u00e4nen"}, {"authorId": "2562355", "name": "K. Haatainen"}, {"authorId": "1411547615", "name": "K. Vehvil\u00e4inen-Julkunen"}, {"authorId": "2322195", "name": "M. Miettinen"}]}, {"paperId": "e18c34b8d6e66d1d3bdec4edf3a64dd4c757cc77", "externalIds": {"DBLP": "journals/corr/abs-2108-12973", "ArXiv": "2108.12973", "DOI": "10.1145/3474085.3475700", "CorpusId": 237353520}, "url": "https://www.semanticscholar.org/paper/e18c34b8d6e66d1d3bdec4edf3a64dd4c757cc77", "title": "Armor: A Benchmark for Meta-evaluation of Artificial Music", "abstract": "Objective evaluation (OE) is essential to artificial music, but it's often very hard to determine the quality of OEs. Hitherto, subjective evaluation (SE) remains reliable and prevailing but suffers inevitable disadvantages that OEs may overcome. Therefore, a meta-evaluation system is necessary for designers to test the effectiveness of OEs. In this paper, we present Armor, a complex and cross-domain benchmark dataset that serves this purpose. Since OEs should correlate with human judgment, we provide music as test cases for OEs and human judgment scores as touchstones. We also provide two meta-evaluation scenarios and their corresponding testing methods to assess the effectiveness of OEs. To the best of our knowledge, Armor is the first comprehensive and rigorous framework that future works could follow, take example by, and improve upon for the task of evaluating computer-generated music and the field of computational music as a whole. By analyzing different OE methods on our dataset, we observe that there is still a huge gap between SE and OE, meaning that hard-coded algorithms are far from catching human's judgment to the music.", "venue": "ACM Multimedia", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-08-30", "journal": {"name": "Proceedings of the 29th ACM International Conference on Multimedia"}, "authors": [{"authorId": "2117075628", "name": "Songhe Wang"}, {"authorId": "2125209268", "name": "Zheng Bao"}, {"authorId": "2124978286", "name": "E. Jingtong"}]}, {"paperId": "0003510ca25103ac605945c20e90586ee24de538", "externalIds": {"MAG": "3198908536", "DOI": "10.3390/LAWS10030070", "CorpusId": 239682244}, "url": "https://www.semanticscholar.org/paper/0003510ca25103ac605945c20e90586ee24de538", "title": "Digital Transformation and Artificial Intelligence Applied to Business: Legal Regulations, Economic Impact and Perspective", "abstract": "Digital transformation can be defined as the integration of new technologies into all areas of a company. This technological integration will ultimately imply a need to transform traditional business models. Similarly, artificial intelligence has been one of the most disruptive technologies of recent decades, with a high potential impact on business and people. Cognitive approaches that simulate both human behavior and thinking are leading to advanced analytical models that help companies to boost sales and customer engagement, improve their operational efficiency, improve their services and, in short, generate new relevant information from data. These decision-making models are based on descriptive, predictive and prescriptive analytics. This necessitates the existence of a legal framework that regulates all digital changes with uniformity between countries and helps a proper digital transformation process under a clear regulation. On the other hand, it is essential that this digital disruption is not slowed down by the regulatory framework. This work will demonstrate that AI and digital transformation will be an intrinsic part of many applications and will therefore be universally deployed. However, this implementation will have to be done under common regulations and in line with the new reality.", "venue": "", "year": 2021, "referenceCount": 91, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-27", "journal": {"volume": "10", "pages": "70", "name": "Laws"}, "authors": [{"authorId": "107725612", "name": "Ricardo Francisco Reier Forradellas"}, {"authorId": "2135150203", "name": "Luis Miguel Garay Gallastegui"}]}, {"paperId": "3390c4c6f31ca43063a8ed3ea857d8da89114789", "externalIds": {"DOI": "10.1093/icb/icab188", "CorpusId": 237322884, "PubMed": "34448841"}, "url": "https://www.semanticscholar.org/paper/3390c4c6f31ca43063a8ed3ea857d8da89114789", "title": "Artificial Intelligence for Biology.", "abstract": "Despite efforts to integrate research across different subdisciplines of biology, the scale of integration remains limited. We hypothesize that future generations of Artificial Intelligence (AI) technologies specifically adapted for biological sciences will help enable the reintegration of biology. AI technologies will allow us not only to collect, connect and analyze data at unprecedented scales, but also to build comprehensive predictive models that span various subdisciplines. They will make possible both targeted (testing specific hypotheses) and untargeted discoveries. AI for biology will be the cross-cutting technology that will enhance our ability to do biological research at every scale. We expect AI to revolutionize biology in the 21st century much like statistics transformed biology in the 20th century. The difficulties, however, are many, including data curation and assembly, development of new science in the form of theories that connect the subdisciplines, and new predictive and interpretable AI models that are more suited to biology than existing machine learning and AI techniques. Development efforts will require strong collaborations between biological and computational scientists. This white paper provides a vision for AI for Biology and highlights some challenges.", "venue": "Integrative and Comparative Biology", "year": 2021, "referenceCount": 64, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-27", "journal": {"name": "Integrative and comparative biology"}, "authors": [{"authorId": "3242252", "name": "S. Hassoun"}, {"authorId": "50396886", "name": "F. Jefferson"}, {"authorId": "2148376035", "name": "Xinghua Shi"}, {"authorId": "38820889", "name": "Brian J. Stucky"}, {"authorId": "2143720173", "name": "Jin Wang"}, {"authorId": "1743851", "name": "E. Rosa"}]}, {"paperId": "9a3fa520426c3460198912d7c4727dc6c57935ad", "externalIds": {"MAG": "3194035649", "DOI": "10.1108/ohi-02-2021-0037", "CorpusId": 238680258}, "url": "https://www.semanticscholar.org/paper/9a3fa520426c3460198912d7c4727dc6c57935ad", "title": "An interdisciplinary approach for tacit knowledge communication between the designer and the computer", "abstract": "PurposeThis research investigates the means of tacit knowledge (TK) communication between the designer and the computer in architectural design. Despite the integration of state-of-the-art computational technologies in different design phases, this integration happens within a limited scope, focusing mainly on tangible aspects of the design process, such as technical systems and visual representations. This lets architectural design miss the wider scope technology provides, where it can help in developing the computational design process through incorporating new intangible knowledge domains that were usually neglected, such as tacit knowledge, and through incorporating more design entities that were not included in the design process before.Design/methodology/approachThe study conducts an interdisciplinary analytical review of the literature to achieve two main research goals. The first goal investigates TK communication between human beings and the second understands approaches of TK communication between humans and computers. For each goal, three phases were implemented; an initial research phase, where main keywords are identified, a sampling and selection of literature phase and an analysis of literature phase.FindingsThrough interlinking findings from different disciplines, the study presents a theoretical framework for TK communication. The framework provides architects with an approach to construct and transfer TK while using the computer in a computational design environment, presenting an individual and a social set of conditions and factors revealed from the review of the analyzed literature. The framework particularly emphasizes the significance of a human\u2013computer symbiotic relationship for the process of TK communication to take place.Originality/valueThis paper presents a novel interdisciplinary reading into the literature of fields beyond architectural design, incorporating intangible knowledge domains into the computational design process and expanding the capabilities of computational design tools to allow for the transfer of intangible design attributes between different design entities, particularly tacit design knowledge.", "venue": "Open House International", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-24", "journal": {"name": "Open House International"}, "authors": [{"authorId": "2132277385", "name": "Hala Hossam Eldin"}, {"authorId": "1394931314", "name": "Ramy Bakir"}, {"authorId": "1429704981", "name": "S. El-Fiki"}]}, {"paperId": "e25d2cd25f708fbf04faf50954eaadced9a1e3e5", "externalIds": {"PubMedCentral": "8380863", "DOI": "10.1007/s42454-021-00035-1", "CorpusId": 237278455}, "url": "https://www.semanticscholar.org/paper/e25d2cd25f708fbf04faf50954eaadced9a1e3e5", "title": "Hume\u2019s guillotine and intelligent technologies", "abstract": null, "venue": "Human-Intelligent Systems Integration", "year": 2021, "referenceCount": 56, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-23", "journal": {"volume": "3", "pages": "241 - 250", "name": "Human-Intelligent Systems Integration"}, "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}]}, {"paperId": "7b26aaae20aa8a8ab42360596698de04c2130a12", "externalIds": {"MAG": "3194860451", "DOI": "10.34024/prometeica.2021.23.10811", "CorpusId": 238736674}, "url": "https://www.semanticscholar.org/paper/7b26aaae20aa8a8ab42360596698de04c2130a12", "title": "The kantian notion of freedom and autonomy of artificial agency", "abstract": "The objective of this paper is to provide critical analysis of the Kantian notion of freedom (especially the problem of the third antinomy and its resolution in the critique of pure reason); its significance in the contemporary debate on free-will and determinism, and the possibility of autonomy of artificial agency in the Kantian paradigm of autonomy. Kant's resolution of the third antinomy by positing the ground in the noumenal self resolves the problem of antinomies; however, it invites an explanatory gap between phenomenality and the noumenal self; even if he has successfully established the compatibility of natural causality and non-natural causality through his transcendental argument. This paper is also devoted to establishing the plausibility of the knowledge claim that Kantian reduction of phenomenality has served half of the purpose of the AI scientists on the possibility of Artificial Autonomous Agency.", "venue": "Prometeica - Revista de Filosof\u00eda y Ciencias", "year": 2021, "referenceCount": 26, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-22", "journal": {"name": "Prometeica - Revista de Filosof\u00eda y Ciencias"}, "authors": [{"authorId": "117955029", "name": "M. Sahu"}]}, {"paperId": "ba1bb2d152aba3755ac933ecc7f6cc67b1f89f71", "externalIds": {"MAG": "3195783210", "DOI": "10.1080/00472778.2021.1955125", "CorpusId": 238736336}, "url": "https://www.semanticscholar.org/paper/ba1bb2d152aba3755ac933ecc7f6cc67b1f89f71", "title": "\u201cHasta la vista, baby\u201d \u2013 will machine learning terminate human literature reviews in entrepreneurship?", "abstract": null, "venue": "Journal of Small Business Management", "year": 2021, "referenceCount": 80, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-19", "journal": {"name": "Journal of Small Business Management"}, "authors": [{"authorId": "143784473", "name": "Sebastian Robledo"}, {"authorId": "2132419448", "name": "Andr\u00e9s Mauricio Grisales Aguirre"}, {"authorId": "9759238", "name": "M. Hughes"}, {"authorId": "98090309", "name": "Fabian Eggers"}]}, {"paperId": "1e9201aaa94bba6968505110187cbe86c42917f2", "externalIds": {"PubMedCentral": "8417437", "DOI": "10.3389/fonc.2021.702270", "CorpusId": 237218583, "PubMed": "34490103"}, "url": "https://www.semanticscholar.org/paper/1e9201aaa94bba6968505110187cbe86c42917f2", "title": "An Adversarial Deep-Learning-Based Model for Cervical Cancer CTV Segmentation With Multicenter Blinded Randomized Controlled Validation", "abstract": "Purpose To propose a novel deep-learning-based auto-segmentation model for CTV delineation in cervical cancer and to evaluate whether it can perform comparably well to manual delineation by a three-stage multicenter evaluation framework. Methods An adversarial deep-learning-based auto-segmentation model was trained and configured for cervical cancer CTV contouring using CT data from 237 patients. Then CT scans of additional 20 consecutive patients with locally advanced cervical cancer were collected to perform a three-stage multicenter randomized controlled evaluation involving nine oncologists from six medical centers. This evaluation system is a combination of objective performance metrics, radiation oncologist assessment, and finally the head-to-head Turing imitation test. Accuracy and effectiveness were evaluated step by step. The intra-observer consistency of each oncologist was also tested. Results In stage-1 evaluation, the mean DSC and the 95HD value of the proposed model were 0.88 and 3.46 mm, respectively. In stage-2, the oncologist grading evaluation showed the majority of AI contours were comparable to the GT contours. The average CTV scores for AI and GT were 2.68 vs. 2.71 in week 0 (P = .206), and 2.62 vs. 2.63 in week 2 (P = .552), with no significant statistical differences. In stage-3, the Turing imitation test showed that the percentage of AI contours, which were judged to be better than GT contours by \u22655 oncologists, was 60.0% in week 0 and 42.5% in week 2. Most oncologists demonstrated good consistency between the 2 weeks (P > 0.05). Conclusions The tested AI model was demonstrated to be accurate and comparable to the manual CTV segmentation in cervical cancer patients when assessed by our three-stage evaluation framework.", "venue": "Frontiers in Oncology", "year": 2021, "referenceCount": 43, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-19", "journal": {"volume": "11", "name": "Frontiers in Oncology"}, "authors": [{"authorId": "5515909", "name": "Zhikai Liu"}, {"authorId": "2111898676", "name": "Wanqi Chen"}, {"authorId": "2306471", "name": "H. Guan"}, {"authorId": "107736091", "name": "Hongnan Zhen"}, {"authorId": "2109659501", "name": "Jing Shen"}, {"authorId": "2108661388", "name": "Xia Liu"}, {"authorId": "144675148", "name": "An Liu"}, {"authorId": "50392067", "name": "Richard Li"}, {"authorId": "8194728", "name": "J. Geng"}, {"authorId": "46864001", "name": "J. You"}, {"authorId": "2108396138", "name": "Weihu Wang"}, {"authorId": "2144279450", "name": "Zhouyu Li"}, {"authorId": "2129520448", "name": "Yongfeng Zhang"}, {"authorId": "2144035580", "name": "Yuanyuan Chen"}, {"authorId": "2107557260", "name": "J. Du"}, {"authorId": "2115814195", "name": "Qi Chen"}, {"authorId": "2144837443", "name": "Yu Chen"}, {"authorId": "2117149681", "name": "Shaobin Wang"}, {"authorId": "48702736", "name": "Fuquan Zhang"}, {"authorId": "1665045805", "name": "J. Qiu"}]}, {"paperId": "4aa8eee8fc73007114d53b6e1bd1974f2b9b06e7", "externalIds": {"MAG": "3193456649", "DOI": "10.1108/fs-02-2021-0048", "CorpusId": 238673269}, "url": "https://www.semanticscholar.org/paper/4aa8eee8fc73007114d53b6e1bd1974f2b9b06e7", "title": "The feasibility of artificial intelligence performing as CEO: the vizier-shah theory", "abstract": "\nPurpose\nThis paper aims to examine the feasibility of artificial intelligence (AI) performing as chief executive officer (CEO) in organizations.\n\n\nDesign/methodology/approach\nThe authors followed an explorative research design \u2013 classic grounded theory methodology. The authors conducted face-to-face interviews with 27 participants that were selected according to theoretical sampling. The sample consisted of academics from the fields of AI, philosophy and management; experts and artists performing in the field of AI and professionals from the business world.\n\n\nFindings\nAs a result of the grounded theory process \u201cThe Vizier-Shah Theory\u201d emerged. The theory consisted of five theoretical categories: narrow AI, hard problems, debates, solutions and AI-CEO. The category \u201cAI as a CEO\u201d introduces four futuristic AI-CEO models.\n\n\nOriginality/value\nThis study introduces an original theory that explains the evolution process of narrow AI to AI-CEO. The theory handles the issue from an interdisciplinary perspective by following an exploratory research design \u2013 classic grounded theory and provides insights for future research.\n", "venue": "foresight", "year": 2021, "referenceCount": 47, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-16", "journal": {"name": "foresight"}, "authors": [{"authorId": "48704597", "name": "Aslihan \u00dcnal"}, {"authorId": "100657061", "name": "I. Kilin\u00e7"}]}, {"paperId": "4f938b62b63a3909b3e08d77eff6109b5570bf46", "externalIds": {"MAG": "3198229386", "DOI": "10.3917/dio.269.0107", "CorpusId": 239716934}, "url": "https://www.semanticscholar.org/paper/4f938b62b63a3909b3e08d77eff6109b5570bf46", "title": "L\u2019intelligence artificielle n\u2019existe-t-elle vraiment pas\u00a0? Quelques \u00e9l\u00e9ments de clarification autour d\u2019une science controvers\u00e9e", "abstract": null, "venue": "Diog\u00e8ne", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-08-16", "journal": {"name": "Diog\u00e8ne"}, "authors": [{"authorId": "46681282", "name": "Jean-S\u00e9bastien Vayre"}, {"authorId": "3166598", "name": "G\u00e9rald Gaglio"}]}, {"paperId": "2d394006c9495c506e3b4535e2f497f235a7ba13", "externalIds": {"DBLP": "journals/corr/abs-2108-07129", "ArXiv": "2108.07129", "CorpusId": 237091552}, "url": "https://www.semanticscholar.org/paper/2d394006c9495c506e3b4535e2f497f235a7ba13", "title": "Autoencoders as Tools for Program Synthesis", "abstract": "Recently there have been many advances in research on language modeling of source code. Applications range from code suggestion and completion to code summarization. However, complete program synthesis of industry-grade programming languages has not been researched extensively. In this work, we introduce a variational autoencoder model for program synthesis of industry-grade programming languages. Our model incorporates the internal hierarchical structure of source codes and operates on parse trees. By learning a latent representation of source code over trees, we capture more information and achieve a higher performance than standard autoregressive autoencoder models. Furthermore, due to the tree-structured nature of our model, the autoregressive operations are performed on paths of trees instead of linear sequences. Therefore, the size of the sequences that the autoregressive model processes, scales proportionally to the width and depth of the tree instead of the total size of the tree which mitigates the common problem of exploding and vanishing gradients.", "venue": "ArXiv", "year": 2021, "referenceCount": 46, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-16", "journal": {"volume": "abs/2108.07129", "name": "ArXiv"}, "authors": [{"authorId": "2123319458", "name": "Sander de Bruin"}, {"authorId": "2066239833", "name": "Vadim Liventsev"}, {"authorId": "1790288", "name": "M. Petkovi'c"}]}, {"paperId": "44ff8ccb3a7a88465e991cfe0bb7cf8d2414da58", "externalIds": {"MAG": "3194918255", "DOI": "10.1016/J.ENG.2021.04.027", "CorpusId": 238716401}, "url": "https://www.semanticscholar.org/paper/44ff8ccb3a7a88465e991cfe0bb7cf8d2414da58", "title": "Actor\u2013Critic Reinforcement Learning and Application in Developing Computer-Vision-Based Interface Tracking", "abstract": null, "venue": "", "year": 2021, "referenceCount": 161, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-14", "journal": {"volume": "", "name": "Engineering"}, "authors": [{"authorId": "117754018", "name": "Oguzhan Dogru"}, {"authorId": "66914927", "name": "Kirubakaran Velswamy"}, {"authorId": "144466701", "name": "Biao Huang"}]}, {"paperId": "614dc443359fe849318f698c3c51f8f0732e622a", "externalIds": {"PubMedCentral": "8360246", "DOI": "10.1186/s13244-021-01052-z", "CorpusId": 236984260, "PubMed": "34383173"}, "url": "https://www.semanticscholar.org/paper/614dc443359fe849318f698c3c51f8f0732e622a", "title": "A primer on deep learning and convolutional neural networks for clinicians", "abstract": null, "venue": "Insights into Imaging", "year": 2021, "referenceCount": 12, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-12", "journal": {"volume": "12", "name": "Insights into Imaging"}, "authors": [{"authorId": "145340403", "name": "L. L. Iglesias"}, {"authorId": "1579587544", "name": "P. Bell\u00f3n"}, {"authorId": "2052086501", "name": "A. P. del Barrio"}, {"authorId": "1479580655", "name": "P. M. Fern\u00e1ndez-Miranda"}, {"authorId": "118387478", "name": "D. R. Gonz\u00e1lez"}, {"authorId": "123281357", "name": "J. A. Vega"}, {"authorId": "15473105", "name": "A. G. Mandly"}, {"authorId": "2130646019", "name": "J. Blanco"}]}, {"paperId": "836084de10e395a46f79eab4a315ea2ea04e951a", "externalIds": {"DBLP": "journals/corr/abs-2108-04546", "ArXiv": "2108.04546", "CorpusId": 236965848}, "url": "https://www.semanticscholar.org/paper/836084de10e395a46f79eab4a315ea2ea04e951a", "title": "Epigenetic opportunities for Evolutionary Computation", "abstract": "Evolutionary Computation is a group of biologically inspired algorithms used to solve complex optimisation problems. It can be split into Evolutionary Algorithms, which take inspiration from genetic inheritance, and Swarm Intelligence algorithms, that take inspiration from cultural inheritance. However, recent developments have focused on computational or mathematical adaptions, leaving their biological roots behind. This has left much of the modern evolutionary literature relatively unexplored. To understand which evolutionary mechanisms have been considered, and which have been overlooked, this paper breaks down successful bio-inspired algorithms under a contemporary biological framework based on the Extended Evolutionary Synthesis, an extension of the classical, genetics focussed, Modern Synthesis. The analysis shows that Darwinism and the Modern Synthesis have been incorporated into Evolutionary Computation but that the Extended Evolutionary Synthesis has been broadly ignored beyond:cultural inheritance, incorporated in the sub-set of Swarm Intelligence algorithms, evolvability, through CMA-ES, and multilevel selection, through Multi-Level Selection Genetic Algorithm. The framework shows a missing gap in epigenetic inheritance for Evolutionary Computation, despite being a key building block in modern interpretations of how evolution occurs. Epigenetic inheritance can explain fast adaptation, without changes in an individual\u2019s genotype, by allowing biological organisms to self-adapt quickly to environmental cues, which, increases the speed of convergence while maintaining stability in changing environments. This leaves a diverse range of biologically inspired mechanisms as low hanging fruit that should be explored further within Evolutionary Computation.", "venue": "ArXiv", "year": 2021, "referenceCount": 93, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-10", "journal": {"volume": "abs/2108.04546", "name": "ArXiv"}, "authors": [{"authorId": "2122962281", "name": "Sizhe Yuen"}, {"authorId": "1396774500", "name": "T. H. Ezard"}, {"authorId": "143827685", "name": "A. Sobey"}]}, {"paperId": "a27df49d2e3ad55979ac6a8b0bfee7b7b7c107ae", "externalIds": {"MAG": "3188211139", "DOI": "10.1007/s41358-021-00280-5", "CorpusId": 238655002}, "url": "https://www.semanticscholar.org/paper/a27df49d2e3ad55979ac6a8b0bfee7b7b7c107ae", "title": "Das Ende des Politischen? Demokratische Politik und K\u00fcnstliche Intelligenz", "abstract": null, "venue": "Zeitschrift f\u00fcr Politikwissenschaft", "year": 2021, "referenceCount": 113, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-08-09", "journal": {"volume": "32", "pages": "573-594", "name": "Zeitschrift f\u00fcr Politikwissenschaft"}, "authors": [{"authorId": "1975018551", "name": "A. Koster"}]}, {"paperId": "c1d7a0d2654e88ae928b9ec5a988f390ea81e711", "externalIds": {"MAG": "3190264543", "DOI": "10.1039/d1me00055a", "CorpusId": 238671900}, "url": "https://www.semanticscholar.org/paper/c1d7a0d2654e88ae928b9ec5a988f390ea81e711", "title": "Hydrogen bonded frameworks: smart materials used smartly", "abstract": "Hydrogen-bonded host frameworks constructed from carefully selected molecular building blocks can exhibit architectures capable of encapsulating a wide range of guest molecules, with promising opportunities in key technologies.", "venue": "Molecular Systems Design & Engineering", "year": 2021, "referenceCount": 162, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-09", "journal": {"name": "Molecular Systems Design & Engineering"}, "authors": [{"authorId": "122226010", "name": "A. Yusov"}, {"authorId": "2132233128", "name": "Alexandra M. Dillon"}, {"authorId": "2067816408", "name": "Michael D. Ward"}]}, {"paperId": "d96907bd620d3c04be6b978b6c39a048429857bb", "externalIds": {"DBLP": "journals/giq/NasseefBALD22", "MAG": "3191215849", "DOI": "10.1016/j.giq.2021.101618", "CorpusId": 238719621}, "url": "https://www.semanticscholar.org/paper/d96907bd620d3c04be6b978b6c39a048429857bb", "title": "Artificial intelligence-based public healthcare systems: G2G knowledge-based exchange to enhance the decision-making process", "abstract": null, "venue": "Gov. Inf. Q.", "year": 2021, "referenceCount": 150, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-01", "journal": {"volume": "39", "pages": "101618", "name": "Gov. Inf. Q."}, "authors": [{"authorId": "3478046", "name": "Omar Nasseef"}, {"authorId": "11002299", "name": "A. Baabdullah"}, {"authorId": "2658516", "name": "A. Alalwan"}, {"authorId": "1696747", "name": "Banita Lal"}, {"authorId": "145800152", "name": "Yogesh K. Dwivedi"}]}, {"paperId": "798157d7ca71907898f4573c5663767e8233b24c", "externalIds": {"DBLP": "journals/corr/abs-2108-05349", "ArXiv": "2108.05349", "DOI": "10.3389/fevo.2021.755981", "CorpusId": 236976086}, "url": "https://www.semanticscholar.org/paper/798157d7ca71907898f4573c5663767e8233b24c", "title": "Intelligence as Information Processing: Brains, Swarms, and Computers", "abstract": "There is no agreed definition of intelligence, so it is problematic to simply ask whether brains, swarms, computers, or other systems are intelligent or not. To compare the potential intelligence exhibited by different cognitive systems, I use the common approach used by artificial intelligence and artificial life: Instead of studying the substrate of systems, let us focus on their organization. This organization can be measured with information. Thus, I apply an informationist epistemology to describe cognitive systems, including brains and computers. This allows me to frame the usefulness and limitations of the brain-computer analogy in different contexts. I also use this perspective to discuss the evolution and ecology of intelligence.", "venue": "Frontiers in Ecology and Evolution", "year": 2021, "referenceCount": 204, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-09", "journal": {"volume": "9"}, "authors": [{"authorId": "1745123", "name": "C. Gershenson"}]}, {"paperId": "bd71a3e9aab7fea741ec9d1f2bfe5917366157a2", "externalIds": {"DBLP": "journals/corr/abs-2108-03793", "ArXiv": "2108.03793", "CorpusId": 236956537}, "url": "https://www.semanticscholar.org/paper/bd71a3e9aab7fea741ec9d1f2bfe5917366157a2", "title": "Toward Human-Level Artificial Intelligence", "abstract": "In this paper, we present our research on programming human-level artificial intelligence (HLAI), including 1) a definition of HLAI, 2) an environment to develop and test HLAI, and 3) a cognitive architecture for HLAI. The term AI is used in a broad meaning, and HLAI is not clearly defined. I claim that the essence of Human-Level Intelligence to be the capability to learn from others\u2019 experiences via language. The key is that the event described by language has the same effect as if the agent experiences it firsthand for the update of the behavior policy. To develop and test models with such a capability, we are developing a simulated environment called SEDRo. There is a 3D Home, and a mother character takes care of the baby (the learning agent) and teaches languages. The environment provides comparable experiences to that of a human baby from birth to one year. Finally, I propose a cognitive architecture of HLAI called Modulated Heterarchical Prediction Memory (mHPM). In mHPM, there are three components: a universal module that learns to predict the next vector given the sequence of vector signals, a heterarchical network of those modules, and a reward-based modulation of learning. mHPM models the workings of the neocortex but the innate auxiliary units such hippocampus, reward system, instincts, and amygdala play critical roles, too.", "venue": "ArXiv", "year": 2021, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-09", "journal": {"volume": "abs/2108.03793", "name": "ArXiv"}, "authors": [{"authorId": "143885555", "name": "Deokgun Park"}]}, {"paperId": "90eb339453fc4ca0ed39a3fde86f207a2bc24100", "externalIds": {"DBLP": "journals/mima/Montemayor21", "MAG": "3191895906", "DOI": "10.1007/s11023-021-09568-5", "CorpusId": 238797340}, "url": "https://www.semanticscholar.org/paper/90eb339453fc4ca0ed39a3fde86f207a2bc24100", "title": "Language and Intelligence", "abstract": null, "venue": "Minds Mach.", "year": 2021, "referenceCount": 46, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-08", "journal": {"volume": "31", "pages": "471-486", "name": "Minds Mach."}, "authors": [{"authorId": "144520696", "name": "Carlos Montemayor"}]}, {"paperId": "a33b2e4f4ebc2d8256ee00840ef1cfb09a55df40", "externalIds": {"DBLP": "journals/corr/abs-2108-03599", "ArXiv": "2108.03599", "CorpusId": 236957301}, "url": "https://www.semanticscholar.org/paper/a33b2e4f4ebc2d8256ee00840ef1cfb09a55df40", "title": "Identification of Play Styles in Universal Fighting Engine", "abstract": "AI-controlled characters in fighting games are expected to possess reasonably high skills and behave in a believable, human-like manner, exhibiting a diversity of play styles and strategies. Thus, the development of fighting game AI requires the ability to evaluate these properties. For instance, it should be possible to ensure that the characters created are believable and diverse. In this paper, we show how an automated procedure can be used to compare play styles of individual AIand human-controlled characters, and to assess human-likeness and diversity of game participants. INTRODUCTION Fighting games provide a variety of interesting challenges for AI research and development. Fighting is often seen as a purely arcade fun, emphasizing fast reaction and the ability to perform complex combo actions with accurate timing. However, numerous current research works show that designing a good AI for a fighting game is not an easy task. First, achieving high performance is challenging: only one recent work (Oh et al. 2021) reports obtained AI skill level comparable to the abilities of professional human players in a modern fighting game. One of the principal difficulties lies in the fact that people both react to and anticipate opponent\u2019s movements. Thus, a fighting game can be considered as a rock-paper-scissors type game, where opponents make \u201cdouble-blind decisions\u201d (Yu and Sturtevant 2019). Second, people of different skill levels need AI opponents possessing comparable and possibly adjustable skills, which is a separate challenge (Ishihara et al. 2018). Finally, AI-controlled characters have to be believable (human-like) and exhibit diverse play styles to keep the players engaged. Believability and diversity of AI behavior is not a universal requirement across game genres, but for certain game types, such as firstperson shooters, it seems to be the case (Soni and Hingston 2008). Fighting games typically simulate a one-vs-one combat between two human-like opponents, so certain \u201chuman-like traits\u201d are expected form the AI system, at least as a feature contributing to the \u201crealism\u201d of the environment. Before engaging in the task of creating believable and diverse AI-controlled characters for a fighting game, one has first to confirm that the game environment used is able to provide sufficient flexibility for this work. In other words, it should be possible for game characters to exhibit diverse play styles, recognizable by human observers and identifiable distinguishable with a certain evaluation method. The goal of this paper is to analyze play styles of humanand AI-controlled characters in a Universal Fighting Engine (UFE) (Mind Studios 2021). We develop a simple procedure, able to distinguish individual players, which supports the presumption that identifiable behaviors are achievable in UFE. We also compare play styles of people with the style exhibited by a built-in AI system. Finally, we report results of a short survey, aimed to reveal whether human observers can spot \u201chuman-like\u201d traits in the behavior of game characters. UNIVERSAL FIGHTING ENGINE PLATFORM Universal Fighting Engine (Mind Studios 2021) is a highly customizable platform for one-vs-one fighting games developed in Unity. It supports a large variety of attacks and special moves as well as the ability to create new action types on per-character basis. UFE aims to provide classic comboheavy 2D fighting gameplay, associated with games such as Street Fighter or Mortal Kombat. UFE comes with a built-in customizable rule-based AI engine called \u201cFuzzy AI\u201d. It relies on fuzzy logic to evaluate the current scene and estimate the desirability of each given action. Play style and skill level of Fuzzy AI players can be adjusted by tuning a number of parameters, by default organized into presets ranging from \u201cvery easy\u201d to \u201cimpossible\u201d. In the present study we use five different levels of Fuzzy AI with default parameter values shown in Table 1. Table 1: Fuzzy AI settings for five different skill levels For us, each AI preset is essentially a \u201cblack box\u201d aimed to represent a unique fighting game character. Thus, we will not discuss the choice of Fuzzy AI parameters and their values, described in the documentation as follows: \u2022 Time between decisions (sec): minimum time taken to formulate a decision. \u2022 Time between actions (sec): time between executing each decision. \u2022 Rule compliance: controls the balance between systematic appliance of rules and randomicity (higher values correspond to lower randomicity). \u2022 Aggressiveness: controls the balance between basic moves such as walk, crouch and jump, and attacks. Higher values correspond to higher contribution of attacking actions. Very easy Easy Normal Hard Very hard Time between decisions 0.4 0.3 0 0.1 0 Time between actions 0.1 0.1 0.05 0.05 0.05 Rule compliance 0.9 0.9 0.9 0.9 0.9 Aggressiveness 0.1 0.3 0.5 0.6 0.6 Combo efficiency 0.1 0.2 1 1 1 \u2022 Combo efficiency: controls the probability of attempting combo actions. Universal Fighting Engine comes with a set of pre-modeled characters, distinct in their special move types. To ensure fair comparison, we use the same character type for each of the opponents in all test games. PLAY STYLE SIMILARITY IDENTIFICATION The goals of our work can be narrowed down to the following research questions: RQ1 Do human-controlled and AI-controlled characters possess distinct, identifiable play styles? RQ2 Are these styles consistent across matches or change depending on the opponent? RQ3 Do human-controlled characters possess identifiable \u201chuman-like behavior traits\u201d? RQ4 Can questions RQ1-RQ3 be answered with a certain automated evaluation procedure? In order to compare individual players\u2019 behavior, we adopted a cosine similarity-based procedure, earlier used in the game of boxing (Mozgovoy and Umarov 2010). It operates as follows. We analyze recordings of games where a character of our interest participates and create its \u201cbehavior fingerprint\u201d as an ordered list of probabilities of every possible tuple (A1, A2, A3), representing three consecutive player actions. Recordings consist of game engine state snapshots taken at each consecutive simulation frame. Within this context, each action is uniquely defined with its game engine-specified elements currentState, currentSubstate, and currentBasicMove. While more details are provided in Table 2, we view these elements as merely items uniquely identifying an action in our particular game engine (UFE). Being lists of probabilities, behavior fingerprints can be compared as vectors using cosine similarity, yielding a similarity ratio of [0, 1]:", "venue": "ArXiv", "year": 2021, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-08", "journal": {"volume": "abs/2108.03599", "name": "ArXiv"}, "authors": [{"authorId": "1417585444", "name": "Kaori Yuda"}, {"authorId": "2472741", "name": "Sho Kamei"}, {"authorId": "2122931567", "name": "Riku Tanji"}, {"authorId": "32290176", "name": "Ryoya Ito"}, {"authorId": "2122932793", "name": "Ippo Wakana"}, {"authorId": "49864675", "name": "M. Mozgovoy"}]}, {"paperId": "4aad4792dff146f4cc13940baf8c35120ef02301", "externalIds": {"DOI": "10.29121/granthaalayah.v9.i7.2021.4120", "CorpusId": 243251348}, "url": "https://www.semanticscholar.org/paper/4aad4792dff146f4cc13940baf8c35120ef02301", "title": "MACHINE LEARNING: AN OVERVIEW", "abstract": "Given the tremendous availability of data and computer power, there is a resurgence of interest in using data driven machine learning methods to solve issues where traditional engineering solutions are hampered by modeling or algorithmic flaws. The purpose of this\u00a0\u00a0\u00a0\u00a0 \u00a0article is to provide a comprehensive review of machine learning, including its history, types, applications, limitations and future prospects. In addition to this, the article also discusses the main point of difference between the field of artificial intelligence and machine learning.", "venue": "International Journal of Research -GRANTHAALAYAH", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-07", "journal": {"name": "International Journal of Research -GRANTHAALAYAH"}, "authors": [{"authorId": "2139376017", "name": "Adya Trisal"}, {"authorId": "12557117", "name": "D. Mandloi"}]}, {"paperId": "28d3d48b7e151577d56809d80555936659028435", "externalIds": {"DOI": "10.1016/j.tics.2021.07.006", "CorpusId": 237448417, "PubMed": "34509366"}, "url": "https://www.semanticscholar.org/paper/28d3d48b7e151577d56809d80555936659028435", "title": "Dual coding of knowledge in the human brain", "abstract": null, "venue": "Trends in Cognitive Sciences", "year": 2021, "referenceCount": 104, "citationCount": 11, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-06", "journal": {"volume": "25", "pages": "883-895", "name": "Trends in Cognitive Sciences"}, "authors": [{"authorId": "2087546", "name": "Y. Bi"}]}, {"paperId": "c2fe9a476ac2f16d364799eb0055777af0a87ab3", "externalIds": {"MAG": "3196172113", "DOI": "10.1093/oso/9780192894076.003.0016", "CorpusId": 238841168}, "url": "https://www.semanticscholar.org/paper/c2fe9a476ac2f16d364799eb0055777af0a87ab3", "title": "How Much Moral Status Could Artificial Intelligence Ever Achieve?", "abstract": "Philosophers often argue about whether fetuses, animals, or AI systems do or do not have moral status. We will suggest instead that different entities have different degrees of moral status with respect to different moral reasons in different circumstances for different purposes. Recognizing this variability of moral status will help to resolve some but not all debates about the potential moral status of AI systems in particular.", "venue": "Rethinking Moral Status", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-05", "journal": {"name": "Rethinking Moral Status"}, "authors": [{"authorId": "1422133662", "name": "Walter Sinnott-Armstrong"}, {"authorId": "1749906", "name": "V. Conitzer"}]}, {"paperId": "d6f96888d28a259fcb16d861c0ad8f5e77a618ff", "externalIds": {"ArXiv": "2108.01591", "DBLP": "journals/corr/abs-2108-01591", "MAG": "3003122703", "DOI": "10.1016/b978-0-12-818366-3.00010-1", "CorpusId": 212814987}, "url": "https://www.semanticscholar.org/paper/d6f96888d28a259fcb16d861c0ad8f5e77a618ff", "title": "The application of artificial intelligence in software engineering: a review challenging conventional wisdom", "abstract": null, "venue": "ArXiv", "year": 2021, "referenceCount": 187, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-03", "journal": {"volume": "abs/2108.01591", "name": "ArXiv"}, "authors": [{"authorId": "144105786", "name": "Feras A. Batarseh"}, {"authorId": "134659451", "name": "Rasika Mohod"}, {"authorId": "2143576061", "name": "Abhinav Kumar"}, {"authorId": "152797675", "name": "Justin Bui"}]}, {"paperId": "727f4397ed0068575b7c538d2cedf32f5db4d9a7", "externalIds": {"MAG": "3198357836", "DOI": "10.1016/j.jbef.2021.100577", "CorpusId": 239705950}, "url": "https://www.semanticscholar.org/paper/727f4397ed0068575b7c538d2cedf32f5db4d9a7", "title": "Artificial intelligence and machine learning in finance: Identifying foundations, themes, and research clusters from bibliometric analysis", "abstract": null, "venue": "Journal of Behavioral and Experimental Finance", "year": 2021, "referenceCount": 125, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-01", "journal": {"name": "Journal of Behavioral and Experimental Finance"}, "authors": [{"authorId": "92198014", "name": "John W. Goodell"}, {"authorId": "2109647517", "name": "Satish Kumar"}, {"authorId": "3139520", "name": "Weng Marc Lim"}, {"authorId": "119982325", "name": "Debidutta Pattnaik"}]}, {"paperId": "566440d51c4e095521aeb9668af54e2758634939", "externalIds": {"PubMedCentral": "8404921", "DBLP": "journals/jimaging/HudakyLK21", "DOI": "10.3390/jimaging7080152", "CorpusId": 238479484, "PubMed": "34460788"}, "url": "https://www.semanticscholar.org/paper/566440d51c4e095521aeb9668af54e2758634939", "title": "A Novel Methodology for Measuring the Abstraction Capabilities of Image Recognition Algorithms", "abstract": "Creating a widely excepted model on the measure of intelligence became inevitable due to the existence of an abundance of different intelligent systems. Measuring intelligence would provide feedback for the developers and ultimately lead us to create better artificial systems. In the present paper, we show a solution where learning as a process is examined, aiming to detect pre-written solutions and separate them from the knowledge acquired by the system. In our approach, we examine image recognition software by executing different transformations on objects and detect if the software was resilient to it. A system with the required intelligence is supposed to become resilient to the transformation after experiencing it several times. The method is successfully tested on a simple neural network, which is not able to learn most of the transformations examined. The method can be applied to any image recognition software to test its abstraction capabilities.", "venue": "J. Imaging", "year": 2021, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-01", "journal": {"volume": "7", "name": "Journal of Imaging"}, "authors": [{"authorId": "2131415817", "name": "M\u00e1rton Gyula Hud\u00e1ky"}, {"authorId": "1411121900", "name": "P. Lehotay-K\u00e9ry"}, {"authorId": "144936562", "name": "A. Kiss"}]}, {"paperId": "3beee2d8d9beeb01f0ef14d100e004c4bb988144", "externalIds": {"MAG": "3188291252", "DOI": "10.48146/odusobiad.908134", "CorpusId": 238792525}, "url": "https://www.semanticscholar.org/paper/3beee2d8d9beeb01f0ef14d100e004c4bb988144", "title": "Yapay Zek\u00e2ya Ne \u00d6\u011fretiyoruz?", "abstract": null, "venue": "OD\u00dc Sosyal Bilimler Ara\u015ft\u0131rmalar\u0131 Dergisi (OD\u00dcSOB\u0130AD)", "year": 2021, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-07-30", "journal": {"name": "OD\u00dc Sosyal Bilimler Ara\u015ft\u0131rmalar\u0131 Dergisi (OD\u00dcSOB\u0130AD)"}, "authors": [{"authorId": "2172008242", "name": "Elif \u00c7an\u011fa Bayer"}]}, {"paperId": "c95cf4e736b4b1cfdf370f0a03b5875fe2777f91", "externalIds": {"MAG": "3186406163", "DOI": "10.24143/2072-9502-2021-3-105-114", "CorpusId": 237700205}, "url": "https://www.semanticscholar.org/paper/c95cf4e736b4b1cfdf370f0a03b5875fe2777f91", "title": "BUILDING UP SCHEDULES IN MULTIPROJECT DESIGN MANAGEMENT SYSTEMS", "abstract": "The article focuses on the problem of algorithmizing the process of building schedules in various spheres of human activity by using the modern mathematical apparatus, as well as achievements in the field of systems analysis, game theory, and graph theory. Nowadays, there have been analyzed and determined the boundaries of the effective application of many well-known heuristic and metaheuristic algorithms, which have shown good results in practice. However, despite the achievements in the discrete optimization, scheduling and network planning, the new problems of drawing up so-called coordinated schedules in the field of multi-project planning, which take into account the preferences (requests, wishes) of specific schedule executors, are still of practical interest. There have been considered the approaches and main stages of solving the problems of constructing coordinated schedules in multi-project planning, which is relevant for the development of new generation software and tools", "venue": "Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-30", "journal": {"name": "Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics"}, "authors": [{"authorId": "2057773316", "name": "Alexey Sergeyevich Dobrynin"}, {"authorId": "52041673", "name": "S. Kulakov"}, {"authorId": "1577039449", "name": "Alexander Sergeyevich Koynov"}]}, {"paperId": "c0a4bd5029abf13510f623ee242687594424c45b", "externalIds": {"PubMedCentral": "8445629", "DOI": "10.18053/jctres.07.202104.012", "CorpusId": 237555158, "PubMed": "34541366"}, "url": "https://www.semanticscholar.org/paper/c0a4bd5029abf13510f623ee242687594424c45b", "title": "Scope and challenges of machine learning-based diagnosis and prognosis in clinical dentistry: A literature review", "abstract": "Background: Machine learning (ML) has emerged as a branch of artificial intelligence dealing with the analysis of large amounts of data. The applications of ML algorithms have also expanded to health care, including dentistry. Recent advances in this field point to future improvements in diagnostic techniques and the prognosis of various diseases of the teeth and other maxillofacial structures. Aim: The aim of this literature review is to describe the basis for ML being applied to different dental sub-fields in recent years, to identify typical algorithms used in the studies, and to summarize the scope and challenges of using these techniques in dental clinical practice. Relevance for Patients: The proficiency of emerging technologies that have begun to show encouraging results in the diagnosis and prognosis of oral diseases can improve the precision in the selection of treatment for patients. It is necessary to understand the challenges associated with using these tools to effectively use them in dental services and ensure a higher quality of care for patients.", "venue": "Journal of clinical and translational research", "year": 2021, "referenceCount": 124, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-07-30", "journal": {"volume": "7", "pages": "523 - 539", "name": "Journal of Clinical and Translational Research"}, "authors": [{"authorId": "2065377627", "name": "Lilian Toledo Reyes"}, {"authorId": "51062504", "name": "J. Knorst"}, {"authorId": "46505576", "name": "F. R. Ortiz"}, {"authorId": "6443491", "name": "T. Ardenghi"}]}, {"paperId": "00101c3e8bccd09098231f23b34156ac5d47f665", "externalIds": {"PubMedCentral": "8376694", "DOI": "10.1007/s11033-021-06594-5", "CorpusId": 236471170, "PubMed": "34318436"}, "url": "https://www.semanticscholar.org/paper/00101c3e8bccd09098231f23b34156ac5d47f665", "title": "What is life?", "abstract": null, "venue": "Molecular biology reports", "year": 2021, "referenceCount": 79, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-27", "journal": {"volume": "48", "pages": "6223 - 6230", "name": "Molecular Biology Reports"}, "authors": [{"authorId": "1438248906", "name": "J. G\u00f3mez-M\u00e1rquez"}]}, {"paperId": "31048ab803d29b293007f2997651e3e9ad219cfe", "externalIds": {"PubMedCentral": "8299670", "DBLP": "journals/midm/SalemSLA21", "DOI": "10.1186/s12911-021-01585-9", "CorpusId": 236181504, "PubMed": "34294092"}, "url": "https://www.semanticscholar.org/paper/31048ab803d29b293007f2997651e3e9ad219cfe", "title": "A systematic review of the applications of Expert Systems (ES) and machine learning (ML) in clinical urology", "abstract": null, "venue": "BMC Medical Informatics and Decision Making", "year": 2021, "referenceCount": 191, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-07-22", "journal": {"volume": "21", "name": "BMC Medical Informatics and Decision Making"}, "authors": [{"authorId": "143818898", "name": "H. Salem"}, {"authorId": "2223827", "name": "D. Soria"}, {"authorId": "31051376", "name": "J. Lund"}, {"authorId": "1859837", "name": "A. Awwad"}]}, {"paperId": "d257492a35505b9cde4ea752636b770c989caf53", "externalIds": {"DBLP": "conf/aies/BenthallG21", "DOI": "10.1145/3461702.3462526", "CorpusId": 236519412}, "url": "https://www.semanticscholar.org/paper/d257492a35505b9cde4ea752636b770c989caf53", "title": "Artificial Intelligence and the Purpose of Social Systems", "abstract": "The law and ethics of Western democratic states have their basis in liberalism. This extends to regulation and ethical discussion of technology and businesses doing data processing. Liberalism relies on the privacy and autonomy of individuals, their ordering through a public market, and, more recently, a measure of equality guaranteed by the state. We argue that these forms of regulation and ethical analysis are largely incompatible with the techno-political and techno-economic dimensions of artificial intelligence. By analyzing liberal regulatory solutions in the form of privacy and data protection, regulation of public markets, and fairness in AI, we expose how the data economy and artificial intelligence have transcended liberal legal imagination. Organizations use artificial intelligence to exceed the bounded rationality of individuals and each other. This has led to the private consolidation of markets and an unequal hierarchy of control operating mainly for the purpose of shareholder value. An artificial intelligence will be only as ethical as the purpose of the social system that operates it. Inspired by the science of artificial life as an alternative to artificial intelligence, we consider data intermediaries: sociotechnical systems composed of individuals associated around collectively pursued purposes. An attention cooperative, that prioritizes its incoming and outgoing data flows, is one model of a social system that could form and maintain its own autonomous purpose.", "venue": "AAAI/ACM Conference on AI, Ethics, and Society", "year": 2021, "referenceCount": 179, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2021-07-21", "journal": {"name": "Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society"}, "authors": [{"authorId": "2862008", "name": "Sebastian Benthall"}, {"authorId": "35476017", "name": "Jake Goldenfein"}]}, {"paperId": "0fc477d3a2340e663e4eafbee520566c1bf8bcb1", "externalIds": {"MAG": "3183468961", "DOI": "10.7592/EJHR2021.9.2.443", "CorpusId": 237714297}, "url": "https://www.semanticscholar.org/paper/0fc477d3a2340e663e4eafbee520566c1bf8bcb1", "title": "Laughing with machines", "abstract": "This article will analyse the preconditions of sense of humour for artificial intelligence. Can artificial intelligence have a sense of humour? Is there a difference between human and machine laughter? Some machines already fulfil certain conditions which are associated with the human sense of humour: on the most superficial level machines appear to laugh and produce jokes, and they recognize sarcasm and punchlines, and they can evaluate funniness. In short, artificial intelligence is already able to recognize humour, and reacts to it accordingly. Furthermore, people laugh with humorous machines. However, it is still uncertain whether artificial intelligence can have a sense of humour or not, at least in comparison to a human sense of humour. To build bridges between AI research and philosophy of humour, this article proposes that there are (at least) five notable philosophical issues to be addressed if we are to accept that machines can have a (humanlike) sense of humour. These principles are: 1) worldview, 2) self-consciousness, 3) self-reflection, 4) self-criticism, and 5) losing control.", "venue": "The European Journal of Humour Research", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-20", "journal": {"name": "The European Journal of Humour Research"}, "authors": [{"authorId": "114685585", "name": "Jarno Hietalahti"}]}, {"paperId": "8ea90aa14f2ccf8cd7f3132d99d5a3da8e795bf8", "externalIds": {"DBLP": "journals/ais/Massey21", "PubMedCentral": "8287117", "DOI": "10.1007/s00146-021-01242-9", "CorpusId": 236136409, "PubMed": "34305334"}, "url": "https://www.semanticscholar.org/paper/8ea90aa14f2ccf8cd7f3132d99d5a3da8e795bf8", "title": "A new Turing test: metaphor vs. nonsense", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 22, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-19", "journal": {"volume": "36", "pages": "677 - 684", "name": "Ai & Society"}, "authors": [{"authorId": "49517549", "name": "I. Massey"}]}, {"paperId": "8f5d0401b17f9665cabba58a47682ca9360102f2", "externalIds": {"DBLP": "conf/isalalife/Cejkova21", "MAG": "3183646739", "DOI": "10.1162/isal_e_00468", "CorpusId": 237643729}, "url": "https://www.semanticscholar.org/paper/8f5d0401b17f9665cabba58a47682ca9360102f2", "title": "Robots: The century past and the century ahead, an Introduction to the 2021 ALIFE conference", "abstract": "The theme of ALIFE 2021 conference is \u201dRobots: The cen- tury past and the century ahead\u201d , because we celebrate the centenary of \u02c7Capek\u2019s R.U.R. and the worldwide-used word \u201crobot\u201d , which comes from this play. The conference was originally scheduled to be held in Prague, the city where the play had its of\ufb01cial world premiere in 1921. However, because of the covid-19 pandemic and its repercussions, ALIFE 2021 conference is virtual. Nevertheless, in this introductory paper the history of the R.U.R. play and its plot are brie\ufb02y outlined and its legacy to current research discussed, namely in the context of the \ufb01eld of arti\ufb01cial life.", "venue": "ALIFE", "year": 2021, "referenceCount": 12, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-19", "journal": {"pages": "5"}, "authors": [{"authorId": "2250782", "name": "J. \u010cejkov\u00e1"}]}, {"paperId": "5f0772948c5bd2240c94538456eed7f58b3d8400", "externalIds": {"MAG": "3183156576", "DOI": "10.1080/09515089.2021.1951195", "CorpusId": 237676499}, "url": "https://www.semanticscholar.org/paper/5f0772948c5bd2240c94538456eed7f58b3d8400", "title": "Exploring the structure of mental action in directed thought", "abstract": "ABSTRACT While the general topic of agency has been collaboratively explored in philosophy and psychology, mental action seems to resist such an interdisciplinary research agenda. Since it is difficult to empirically access mental agency beyond externally measurable behavior, the topic is mainly treated philosophically. However, this has not prevented philosophers from substantiating their arguments with psychological findings, but predominantly with those which allegedly limit the scope and conscious controllability of mental action in favor of automated subpersonal processes. By contrast, the call for a methodological extension through introspective access is particularly noticeable among proponents of a wider significance of mental action. Taking this up, it is shown how an empirical-introspective methodology can obtain a differentiated structure of mental activities occurring in directed thought. The empirical results gained under replicable conditions with 32 participants lead to insights about mental activity regarding (1) immanent causation, (2) content-free intention, (3) active receptivity and (4) its selective openness to mental content, and (5) different levels of observational awareness. These arguments speak for assigning an agentive status to the activities studied and hence for a more significant role of mental action in cognitive processes.", "venue": "Philosophical Psychology", "year": 2021, "referenceCount": 74, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-18", "journal": {"volume": "35", "pages": "145 - 176", "name": "Philosophical Psychology"}, "authors": [{"authorId": "31453852", "name": "Johannes Wagemann"}]}, {"paperId": "2d2b0b8cc25751b4c60361f3a8d8887441be2fdc", "externalIds": {"DBLP": "conf/ijcnn/Weng21", "DOI": "10.1109/IJCNN52387.2021.9533558", "CorpusId": 237599831}, "url": "https://www.semanticscholar.org/paper/2d2b0b8cc25751b4c60361f3a8d8887441be2fdc", "title": "On Post Selection Using Test Sets (PSUTS) in AI", "abstract": "This is a theory paper. It first raises a rarely reported but unethical practice in Artificial Intelligence (AI) called Post Selection Using Test Sets (PSUTS). Consequently, the popular error-backprop methodology in deep learning lacks an acceptable generalization power. All AI methods fall into two broad schools, connectionist and symbolic. PSUTS practices have two kinds, machine PSUTS and human PSUTS. The connectionist school received criticisms for its \u201cscruffiness\u201d due to a huge number of scruffy parameters and now the machine PSUTS; but the seemingly \u201cclean\u201d symbolic school seems more brittle than what is known because of using human PSUTS. This paper formally defines what PSUTS is, analyzes why error-backprop methods with random initial weights suffer from severe local minima, why PSUTS violates well-established research ethics, and how every paper that used PSUTS should have at least transparently reported PSUTS data. For improved transparency in future publications, this paper proposes a new standard for AI metrology, called developmental errors for all networks trained in a project that the selection of the luckiest network depends on, along with Three Conditions: (1) system restrictions, (2) training experience and (3) computational resources.", "venue": "IEEE International Joint Conference on Neural Network", "year": 2021, "referenceCount": 33, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-07-18", "journal": {"pages": "1-8", "name": "2021 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "1e00c5b6b3f04f901632095f51dc687f2fb19c57", "externalIds": {"DBLP": "conf/ijcnn/SiddiquiRR21", "DOI": "10.1109/IJCNN52387.2021.9533870", "CorpusId": 237600226}, "url": "https://www.semanticscholar.org/paper/1e00c5b6b3f04f901632095f51dc687f2fb19c57", "title": "The Case Against Sentiment Analysis for Natural Text", "abstract": "Natural language processing is a broad field that encompasses several sub-tasks. One problem that has gained visibility over the past several years is that of Sentiment Analysis. This is the process of determining the attitude of an author towards some subject across some spectrum, typically \u201cpositive\u201d or \u201cnegative,\u201d by analyzing the textual information. Whereas the field started with simple counting of words with certain characteristics, it has grown in complexity with the advent of deep learning and neural network based language models. Typically, datasets used to train and evaluate these models consist of text with appropriate labels, such as movie reviews with an accompanied star rating. However, the applicability of those results to other scenarios, such as unstructured or natural text has not been clear. In this paper, we demonstrate a clear and simple case that shows that the problem of sentiment analysis is fundamentally unsuitable for natural text. We consider state-of-the-art black box models developed and hosted by 3 of the largest companies in this field: Amazon, Google and IBM.", "venue": "2021 International Joint Conference on Neural Networks (IJCNN)", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": "2021-07-18", "journal": {"pages": "1-8", "name": "2021 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "2056676503", "name": "Shamoon Siddiqui"}, {"authorId": "145129130", "name": "G. Rasool"}, {"authorId": "46819079", "name": "R. P. Ramachandran"}]}, {"paperId": "5254bd6193de3e6cab58f271d789552281435761", "externalIds": {"DBLP": "conf/ijcnn/WuZW21", "DOI": "10.1109/IJCNN52387.2021.9533936", "CorpusId": 237598847}, "url": "https://www.semanticscholar.org/paper/5254bd6193de3e6cab58f271d789552281435761", "title": "On Machine Thinking", "abstract": "Artificial Intelligence (AI) has made much progress, but the existing paradigm for AI is still basically pattern recognition based on a human-handcrafted representation. An AI paradigm shift seems to be necessary to address the machine thinking question raised by Alan Turing over 90 years ago. As a necessary subject of our new conscious learning paradigm introduced 2020, this work deals with general-purpose machine thinking, with planning as a special case, based on new concepts of emergent Super-Turing Machines realized by our proposed neural network models-Developmental Networks (DNs) that have been mathematically proven for its optimally in the sense of Maximum Likelihood (ML). Experimental demonstrations are presented for simulated new mazes in disjoint tests.", "venue": "2021 International Joint Conference on Neural Networks (IJCNN)", "year": 2021, "referenceCount": 17, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-07-18", "journal": {"pages": "1-8", "name": "2021 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "2108404228", "name": "Xiang Wu"}, {"authorId": "2010802", "name": "Zejia Zheng"}, {"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "6e5e5df43735c0fa79a9b8699e3e7e9104988470", "externalIds": {"MAG": "3189483222", "DOI": "10.21203/rs.3.rs-690643/v1", "CorpusId": 238759276}, "url": "https://www.semanticscholar.org/paper/6e5e5df43735c0fa79a9b8699e3e7e9104988470", "title": "The Logic Fundamentals of Machine Consciousness: Theory of Tri-State", "abstract": "\n For a long time, the system of scientific methodology has been composed of logic, empirical (falsification), qualitative, quantitative and deterministic, and corresponding thinking tools. However, under the background of complexity science, the category of methodology should be changed, that is, on the basis of traditional methodology, non-classical logic, hierarchy, stereotype (topological invariant) and uncertainty should be added. This is also the main idea behind the \u201cThoery of Tri-state\u201d in the first part of this paper. The core idea in the theory of \u201cTri-state\u201d is \u201cTri-state Logic\u201d (\u201cpositive | negative | uncertain state\u201d). The ontology of \u201cTri-state Logic\u201d aims to reveal the meta space-time movement law of things transforming from one form to another, that is, the coupling of time and space in the development of things, and the orientation and evolution of the continuity of things. The mathematical basis of \u201cTri-state Logic\u201d is knot theory and dynamics theory. The second part of this paper designs a machine-consciousness model framework based on the \u201cTheory of Tri-state\u201d (Tri-state Logic). Its research starting point is the perspective of cognitive dynamics (cognitive psychology + dynamics), which is very different from the research ideas proposed by Minsky's \u201cThe Emotion Machine\u201d. At the same time, this paper also tries to answer Turing's questions from different space-time dimensions, and gives an experimental idea of \u201ckindergarten game\u201d by comparing Turing's \u201cimitation game\u201d.", "venue": "Journal of Robotics and Automation Research", "year": 2021, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-15", "journal": {"name": "Journal of Robotics and Automation Research"}, "authors": [{"authorId": "1945419094", "name": "Zhiwei Wang"}, {"authorId": "2135330227", "name": "Ao Zhou"}, {"authorId": "2146074363", "name": "Xin Liu"}]}, {"paperId": "e7735be4f0fc427515fd7206ebc714356b97e71a", "externalIds": {"ArXiv": "2107.07002", "DBLP": "journals/corr/abs-2107-07002", "CorpusId": 235810239}, "url": "https://www.semanticscholar.org/paper/e7735be4f0fc427515fd7206ebc714356b97e71a", "title": "The Benchmark Lottery", "abstract": "The world of empirical machine learning (ML) strongly relies on benchmarks in 1 order to determine the relative effectiveness of different algorithms and methods. 2 This paper proposes the notion of a benchmark lottery that describes the overall 3 fragility of the ML benchmarking process. The benchmark lottery postulates that 4 many factors, other than fundamental algorithmic superiority, may lead to a method 5 being perceived as superior. On multiple benchmark setups that are prevalent in 6 the ML community, we show that the relative performance of algorithms may be 7 altered significantly simply by choosing different benchmark tasks, highlighting the 8 fragility of the current paradigms and potential fallacious interpretation derived from 9 benchmarking ML methods. Given that every benchmark makes a statement about 10 what it perceives to be important, we argue that this might lead to biased progress in 11 the community. We discuss the implications of the observed phenomena and provide 12 recommendations on mitigating them using multiple machine learning domains 13 and communities as use cases, including natural language processing, computer 14 vision, information retrieval, recommender systems, and reinforcement learning. 15", "venue": "ArXiv", "year": 2021, "referenceCount": 118, "citationCount": 40, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-14", "journal": {"volume": "abs/2107.07002", "name": "ArXiv"}, "authors": [{"authorId": "3226635", "name": "M. Dehghani"}, {"authorId": "144447820", "name": "Yi Tay"}, {"authorId": "2194424", "name": "A. Gritsenko"}, {"authorId": "48634137", "name": "Zhe Zhao"}, {"authorId": "2815290", "name": "N. Houlsby"}, {"authorId": "145472333", "name": "Fernando Diaz"}, {"authorId": "47193990", "name": "Donald Metzler"}, {"authorId": "1689108", "name": "Oriol Vinyals"}]}, {"paperId": "37adf4ae06495e2583e2568fb439ebf3e45bc0c2", "externalIds": {"PubMedCentral": "8340130", "DOI": "10.1016/j.isci.2021.102853", "CorpusId": 236975594, "PubMed": "34381977"}, "url": "https://www.semanticscholar.org/paper/37adf4ae06495e2583e2568fb439ebf3e45bc0c2", "title": "The evolutionary origin of Bayesian heuristics and finite memory", "abstract": null, "venue": "iScience", "year": 2021, "referenceCount": 109, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-13", "journal": {"volume": "24", "name": "iScience"}, "authors": [{"authorId": "118887609", "name": "A. Lo"}, {"authorId": "5652285", "name": "Ruixun Zhang"}]}, {"paperId": "a7f2a527baba93a2518eeb635e72b34ee46548d6", "externalIds": {"DBLP": "journals/cbm/RitisB21", "DOI": "10.1016/j.compbiomed.2021.104630", "CorpusId": 236453453, "PubMed": "34311298"}, "url": "https://www.semanticscholar.org/paper/a7f2a527baba93a2518eeb635e72b34ee46548d6", "title": "On the hierarchical design of biochemical-based digital computations", "abstract": null, "venue": "Comput. Biol. Medicine", "year": 2021, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-08", "journal": {"volume": "135", "pages": "\n 104630\n ", "name": "Computers in biology and medicine"}, "authors": [{"authorId": "15777037", "name": "Dimitrios Ritis"}, {"authorId": "1915583", "name": "G. Boulougouris"}]}, {"paperId": "c074cef9299af9922444228712257723f35cf72c", "externalIds": {"MAG": "3179553970", "DOI": "10.3390/APP11146271", "CorpusId": 237776660}, "url": "https://www.semanticscholar.org/paper/c074cef9299af9922444228712257723f35cf72c", "title": "Detection and Evaluation of Machine Learning Bias", "abstract": "Machine learning models are built using training data, which is collected from human experience and is prone to bias. Humans demonstrate a cognitive bias in their thinking and behavior, which is ultimately reflected in the collected data. From Amazon\u2019s hiring system, which was built using ten years of human hiring experience, to a judicial system that was trained using human judging practices, these systems all include some element of bias. The best machine learning models are said to mimic humans\u2019 cognitive ability, and thus such models are also inclined towards bias. However, detecting and evaluating bias is a very important step for better explainable models. In this work, we aim to explain bias in learning models in relation to humans\u2019 cognitive bias and propose a wrapper technique to detect and evaluate bias in machine learning models using an openly accessible dataset from UCI Machine Learning Repository. In the deployed dataset, the potentially biased attributes (PBAs) are gender and race. This study introduces the concept of alternation functions to swap the values of PBAs, and evaluates the impact on prediction using KL divergence. Results demonstrate females and Asians to be associated with low wages, placing some open research questions for the research community to ponder over.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 37, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-07", "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "2523108", "name": "Salem Alelyani"}]}, {"paperId": "2c35a038c4b5d7dfa8c13fff0d1cf121db99675d", "externalIds": {"PubMedCentral": "9139408", "DOI": "10.1016/j.ibmed.2022.100056", "CorpusId": 235740257, "PubMed": "35634270"}, "url": "https://www.semanticscholar.org/paper/2c35a038c4b5d7dfa8c13fff0d1cf121db99675d", "title": "Crowd annotations can approximate clinical autism impressions from short home videos with privacy protections", "abstract": null, "venue": "medRxiv", "year": 2021, "referenceCount": 82, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-06", "journal": {"volume": "6", "name": "Intelligence-based medicine"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": "1899752689", "name": "\u00c9. Leblanc"}, {"authorId": "48913193", "name": "K. Dunlap"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": "2037683491", "name": "C. Mutlu"}, {"authorId": "66636865", "name": "B. Chrisman"}, {"authorId": "30423115", "name": "N. Stockham"}, {"authorId": "2240125", "name": "K. Paskov"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "d0da0462ac25a4046f6f3e37ed372c4026100bb2", "externalIds": {"MAG": "3182125260", "DOI": "10.5772/intechopen.98517", "CorpusId": 237777276}, "url": "https://www.semanticscholar.org/paper/d0da0462ac25a4046f6f3e37ed372c4026100bb2", "title": "Artificial Intelligence and Machine Learning in 5G and beyond: A\u00a0Survey and Perspectives", "abstract": "The deployment of 4G/LTE (Long Term Evolution) mobile network has solved the major challenge of high capacities, to build real broadband mobile Internet. This was possible mainly through very strong physical layer and flexible network architecture. However, the bandwidth hungry services have been developed in unprecedented way, such as virtual reality (VR), augmented reality (AR), etc. Furthermore, mobile networks are facing other new services with extremely demand of higher reliability and almost zero-latency performance, like vehicle communications or Internet-of-Vehicles (IoV). Using new radio interface based on massive MIMO, 5G has overcame some of these challenges. In addition, the adoption of software defend networks (SDN) and network function virtualization (NFV) has added a higher degree of flexibility allowing the operators to support very demanding services from different vertical markets. However, network operators are forced to consider a higher level of intelligence in their networks, in order to deeply and accurately learn the operating environment and users behaviors and needs. It is also important to forecast their evolution to build a pro-actively and efficiently (self-) updatable network. In this chapter, we describe the role of artificial intelligence and machine learning in 5G and beyond, to build cost-effective and adaptable performing next generation mobile network. Some practical use cases of AI/ML in network life cycle are discussed.", "venue": "Moving Broadband Mobile Communications Forward - Intelligent Technologies for 5G and Beyond", "year": 2021, "referenceCount": 24, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-07-05", "journal": {"name": "Moving Broadband Mobile Communications Forward - Intelligent Technologies for 5G and Beyond"}, "authors": [{"authorId": "2842389", "name": "A. Haidine"}, {"authorId": "2383582", "name": "Fatima Zahra Salmam"}, {"authorId": "3212020", "name": "Abdelhak Aqqal"}, {"authorId": "9129510", "name": "A. Dahbi"}]}, {"paperId": "331ec332890d6b7006fc0d850ad0379a2c11c2ab", "externalIds": {"MAG": "3179645255", "DOI": "10.25236/AJCIS.2021.040401", "CorpusId": 236986339}, "url": "https://www.semanticscholar.org/paper/331ec332890d6b7006fc0d850ad0379a2c11c2ab", "title": "A Review of Knowledge Graph-based Question and Answer System Research and Its Application in Chronic Disease Diagnosis", "abstract": "Question and answer systems have a long history of development, and with the maturity of knowledge graph technology in recent years, knowledge graph-based question and answer systems are gradually applied to many fields. In this paper, we first discuss the concept of knowledge graph and question and answer system, and then analyze the key technologies used in it. Before dealing with linguistic problems, questions need to be structured and represented by semantic parsing and space vector-based modeling are common approaches. The question and answer system can be divided into three parts: question classification, entity recognition, and relationship extraction, for each of which a large number of techniques have been studied. Finally, a question and answer system based on the knowledge graph of chronic diseases is designed to provide a proven solution for this field, in view of the problem that there are many patients with chronic diseases but lack of sufficient knowledge of the diseases.", "venue": "Academic Journal of Computing & Information Science", "year": 2021, "referenceCount": 97, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-07-05", "journal": {"name": "Academic Journal of Computing & Information Science"}, "authors": [{"authorId": "2152223666", "name": "Zhaoyang Cao"}, {"authorId": "2141310", "name": "Lin Ni"}, {"authorId": "143651196", "name": "Lirong Dai"}]}, {"paperId": "e83c08632a3346402fb39524095af60f5bad2aaa", "externalIds": {"DBLP": "journals/intr/Abedin22", "MAG": "3180701834", "DOI": "10.1108/INTR-05-2020-0300", "CorpusId": 235763809}, "url": "https://www.semanticscholar.org/paper/e83c08632a3346402fb39524095af60f5bad2aaa", "title": "Managing the tension between opposing effects of explainability of artificial intelligence: A contingency theory", "abstract": "Research into the interpretability and explainability of data analytics and artificial intelligence (AI) systems is on the rise. However, most recent studies either solely promote the benefits of explainability or criticize it due to its counterproductive effects. This study addresses this polarized space and aims to identify opposing effects of the explainability of AI and the tensions between them and propose how to manage this tension to optimize AI system performance and trustworthiness. In achieving this objective, the study systematically reviews the literature and synthesizes it using a contingency theory lens to develop a framework for managing the opposing effects of AI explainability. The study finds five opposing effects of explainability: comprehensibility, conduct, confidentiality, completeness and confidence in AI (5Cs). The study also proposes six perspectives on managing the tensions between the 5Cs: pragmatism in explanation, contextualization of the explanation, cohabitation of human agency and AI agency, metrics and standardization, regulatory and ethical principles, and other emerging solutions (i.e. AI enveloping, blockchain and AI fuzzy systems). The findings show how AI owners and developers can manage tensions between profitability, prediction accuracy and system performance via visibility, accountability and maintaining the \u201csocial goodness\u201d of AI. The results guide practitioners in developing metrics and standards for AI explainability, with the context of AI operation as the focus. This study addresses polarized beliefs amongst scholars and practitioners about the benefits of AI explainability versus its counterproductive effects. It poses that there is no single best way to maximize AI explainability. Instead, the co-existence of enabling and constraining effects must be managed.", "venue": "SIET", "year": 2021, "referenceCount": 100, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Review"], "publicationDate": "2021-07-05", "journal": {"name": "6th International Conference on Sustainable Information Engineering and Technology 2021"}, "authors": [{"authorId": "3096818", "name": "B. Abedin"}]}, {"paperId": "cc9a79bab8a67c57f1961516e9e6eaa5a1e97019", "externalIds": {"DOI": "10.1080/10714421.2021.1965850", "CorpusId": 239066768}, "url": "https://www.semanticscholar.org/paper/cc9a79bab8a67c57f1961516e9e6eaa5a1e97019", "title": "Military buzz: race, robots and insects", "abstract": "ABSTRACT Claiming to \u201clet evolution do the thinking for you,\u201d biologists are teaming up with roboticists and computer engineers in the emerging field of biomimetics to build animal-machines. One of the outcomes of these interdisciplinary collaborations is the development of biomimetic robot-insects: robots inspired by insect life. Biomimetic scientists assert that their technologies will be cleaner, greener, and more holistic, since they imitate Mother Earth\u2019s own capabilities, including for waging war. For example, biomimetic scientists regularly cite the examples of Velcro \u2013 a technology inspired by the ways that burrs attach to the fur on a dog\u2019s back \u2013 or solar panels \u2013 which are inspired by the way that leaves convert sunlight into energy. The specific focus of this article is on biomimetic insect-robot technologies; specifically the development of robots that imitate swarming behavior. Grounding the rise of these swarming technologies in a cultural context preoccupied with an increase in militarization, I show that although biomimetic scientists often claim that these technologies will be more environmentally friendly, in fact they rely upon reified assumptions about \u201cNature,\u201d on the commodification of Indigenous knowledges, and on racist metaphors of terrorists as \u201cswarms\u201d as part of their technological development. Examining a specific swarm of insect-robots known as nano quadrotors, I demonstrate that the imitation of Mother Earth does not reflect the natural world as it is but instead works to shape that world, and, in doing so, I problematize the utopian possibilities suggested for biomimetic swarming technologies.", "venue": "The Communication Review", "year": 2021, "referenceCount": 131, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-03", "journal": {"volume": "24", "pages": "218 - 243", "name": "The Communication Review"}, "authors": [{"authorId": "2095662731", "name": "Shoshana Magnet"}]}, {"paperId": "dffe40e79f9a8bfeed80846f037e612ffaf6bc2f", "externalIds": {"DOI": "10.1080/14789450.2021.1962303", "CorpusId": 236914039, "PubMed": "34343059"}, "url": "https://www.semanticscholar.org/paper/dffe40e79f9a8bfeed80846f037e612ffaf6bc2f", "title": "How can artificial intelligence be used for peptidomics?", "abstract": "ABSTRACT Introduction Peptidomics is an emerging field of omics sciences using advanced isolation, analysis, and computational techniques that enable qualitative and quantitative analyses of various peptides in biological samples. Peptides can act as useful biomarkers and as therapeutic molecules for diseases Areas covered The use of therapeutic peptides can be predicted quickly and efficiently using data-driven computational methods, particularly artificial intelligence (AI) approach. Various AI approaches are useful for peptide-based drug discovery, such as support vector machine, random forest, extremely randomized trees, and other more recently developed deep learning methods. AI methods are relatively new to the development of peptide-based therapies, but these techniques already become essential tools in protein science by dissecting novel therapeutic peptides and their functions (Figure 1). Expert opinion Researchers have shown that AI models can facilitate the development of peptidomics and selective peptide therapies in the field of peptide science. Biopeptide prediction is important for the discovery and development of successful peptide-based drugs. Due to their ability to predict therapeutic roles based on sequence details, many AI-dependent prediction tools have been developed (Figure 1).", "venue": "Expert review of proteomics", "year": 2021, "referenceCount": 213, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-03", "journal": {"volume": "18", "pages": "527 - 556", "name": "Expert Review of Proteomics"}, "authors": [{"authorId": "51173729", "name": "Lu\u00eds Perp\u00e9tuo"}, {"authorId": "37453457", "name": "J. Klein"}, {"authorId": "145355240", "name": "R. Ferreira"}, {"authorId": "145292287", "name": "Sofia Guedes"}, {"authorId": "145057139", "name": "F. Amado"}, {"authorId": "1382488872", "name": "A. Leite-Moreira"}, {"authorId": "2110040127", "name": "Artur M. S. Silva"}, {"authorId": "5995891", "name": "V. Thongboonkerd"}, {"authorId": "3993626", "name": "R. Vitorino"}]}, {"paperId": "e036ae44c3b4ebdbc2eeb2bd94cc6e4728bcddbc", "externalIds": {"DOI": "10.1080/14737140.2021.1951240", "CorpusId": 235723776, "PubMed": "34214007"}, "url": "https://www.semanticscholar.org/paper/e036ae44c3b4ebdbc2eeb2bd94cc6e4728bcddbc", "title": "How will artificial intelligence impact breast cancer research efficiency?", "abstract": "Artificial Intelligence (AI) is a fascinating discipline that has captured our imagination since its birth in the 1950s [1]. Its function in society\u2019s life has grown exponentially in the last decade, to a point where many of its manifestations such as face recognition or digital voice assistants are taken for granted and generate little or no astonishment in everyday users. Interest for AI application in health care began in the 1990s and soon turned to oncology. Given the large number of women diagnosed with breast cancer every year, this field is an optimal setting for the development of a technology largely based on processing significant amounts of data. Computer-aided detection (CAD) was the first software announced for clinical use in breast cancer diagnosis, and was burdened with significant expectations which were not entirely met since its introduction in the late 1990s [2]. This technology relied on algorithms programmed to analyze digital mammograms in search of the same features of malignancy that radiologists look for when reading an exam (i.e. shape, size, asymmetry etc): \u2018old\u2019 AI was therefore conceived as an enhancement of human intelligence that could be matched with the artificial benefit of processing large quantities of data. Despite encouraging initial results, years of CAD clinical application revealed no significant improvement in comprehensive screening performance, and general hype deflated until a new deep learning (DL) revolution generated a second wave of enthusiasm from the early 2010s [3].", "venue": "Expert review of anticancer therapy", "year": 2021, "referenceCount": 28, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2021-07-02", "journal": {"volume": "21", "pages": "1067 - 1070", "name": "Expert Review of Anticancer Therapy"}, "authors": [{"authorId": "49204335", "name": "G. Franceschini"}, {"authorId": "40393745", "name": "E. J. Mason"}, {"authorId": "5530013", "name": "A. Orlandi"}, {"authorId": "13363576", "name": "S. D\u2019Archi"}, {"authorId": "153538480", "name": "A. Sanchez"}, {"authorId": "40472485", "name": "R. Masetti"}]}, {"paperId": "2a8127707c10c8d7c198b1b4ac3e9cb1a1bed900", "externalIds": {"PubMedCentral": "8326779", "DOI": "10.2147/IMCRJ.S322827", "CorpusId": 236913281, "PubMed": "34349566"}, "url": "https://www.semanticscholar.org/paper/2a8127707c10c8d7c198b1b4ac3e9cb1a1bed900", "title": "Machine Learning in an Elderly Man with Heart Failure", "abstract": "Abstract Machine learning is a branch of artificial intelligence and can be used to predict important outcomes in a wide variety of medical conditions. With the widespread use of electronic medical records, the vast amount of data required for this process is now readily available. The following case demonstrates the application of machine learning to an elderly man with heart failure. The algorithms used, namely, decision tree and random forest, both correctly differentiated heart failure with preserved ejection fraction from heart failure with reduced ejection fraction. This has important treatment and prognostic ramifications and can be completed at the point of care while awaiting confirmation via echocardiogram. Viewing the machine learning process through a patient-centered lens, as in this case, highlights the key role we as physicians have in the implementation and supervision of machine learning.", "venue": "International medical case reports journal", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["CaseReport"], "publicationDate": "2021-07-01", "journal": {"volume": "14", "pages": "497 - 502", "name": "International Medical Case Reports Journal"}, "authors": [{"authorId": "103444646", "name": "Joel P. Koops"}]}, {"paperId": "9aa8a73a4464d6a20ed89e18492216dd839d8a24", "externalIds": {"MAG": "3188436879", "DOI": "10.1111/lnc3.12433", "CorpusId": 238803038}, "url": "https://www.semanticscholar.org/paper/9aa8a73a4464d6a20ed89e18492216dd839d8a24", "title": "Natural language processing as a technique for conducting text\u2010based research", "abstract": null, "venue": "Language and Linguistics Compass", "year": 2021, "referenceCount": 84, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-07-01", "journal": {"name": "Language and Linguistics Compass"}, "authors": [{"authorId": "2924101", "name": "L. Allen"}, {"authorId": "47304399", "name": "S. Creer"}, {"authorId": "2132371464", "name": "Mary Cati Poulos"}]}, {"paperId": "8212f36243d00903c9ccf8cd115cc8e3f06830cf", "externalIds": {"DOI": "10.7861/fhj.2020-0189", "CorpusId": 235915054, "PubMed": "34286194"}, "url": "https://www.semanticscholar.org/paper/8212f36243d00903c9ccf8cd115cc8e3f06830cf", "title": "The automation of doctors and machines: A classification for AI in medicine (ADAM framework)", "abstract": "ABSTRACT The advances in artificial intelligence (AI) provide an opportunity to expand the frontier of medicine to improve diagnosis, efficiency and management. By extension of being able to perform any task that a human could, a machine that meets the requirements of artificial general intelligence (\u2018strong\u2019 AI; AGI) possesses the basic necessities to perform as, or at least qualify to become, a doctor. In this emerging field, this article explores the distinctions between doctors and AGI, and the prerequisites for AGI performing as clinicians. In doing so, it necessitates the requirement for a classification of medical AI and prepares for the development of AGI. With its imminent arrival, it is beneficial to create a framework from which leading institutions can define specific criteria for AGI.", "venue": "Future Healthcare Journal", "year": 2021, "referenceCount": 52, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": "8", "pages": "e257 - e262", "name": "Future Healthcare Journal"}, "authors": [{"authorId": "2142117159", "name": "F. Kazzazi"}]}, {"paperId": "59a714d3fd6eed1a2df3eae4d9226d2a1cad9aca", "externalIds": {"DOI": "10.1017/S0963180120001012", "CorpusId": 235382070, "PubMed": "34109927"}, "url": "https://www.semanticscholar.org/paper/59a714d3fd6eed1a2df3eae4d9226d2a1cad9aca", "title": "How Could We Know When a Robot was a Moral Patient?", "abstract": "Abstract There is growing interest in machine ethics in the question of whether and under what circumstances an artificial intelligence would deserve moral consideration. This paper explores a particular type of moral status that the author terms psychological moral patiency, focusing on the epistemological question of what sort of evidence might lead us to reasonably conclude that a given artificial system qualified as having this status. The paper surveys five possible criteria that might be applied: intuitive judgments, assessments of intelligence, the presence of desires and autonomous behavior, evidence of sentience, and behavioral equivalence. The author suggests that despite its limitations, the latter approach offers the best way forward, and defends a variant of that, termed the cognitive equivalence strategy. In short, this holds that an artificial system should be considered a psychological moral patient to the extent that it possesses cognitive mechanisms shared with other beings such as nonhuman animals whom we also consider to be psychological moral patients.", "venue": "Cambridge Quarterly of Healthcare Ethics", "year": 2021, "referenceCount": 54, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-07-01", "journal": {"volume": "30", "pages": "459 - 471", "name": "Cambridge Quarterly of Healthcare Ethics"}, "authors": [{"authorId": "66652934", "name": "Henry Shevlin"}]}, {"paperId": "e000a3c2831ff57a4e143e8f89e24806e81d5a5c", "externalIds": {"DOI": "10.1017/S0963180120001061", "CorpusId": 235382046, "PubMed": "34109923"}, "url": "https://www.semanticscholar.org/paper/e000a3c2831ff57a4e143e8f89e24806e81d5a5c", "title": "Moral Status for Malware! The Difficulty of Defining Advanced Artificial Intelligence", "abstract": "Abstract The suggestion has been made that future advanced artificial intelligence (AI) that passes some consciousness-related criteria should be treated as having moral status, and therefore, humans would have an ethical obligation to consider its well-being. In this paper, the author discusses the extent to which software and robots already pass proposed criteria for consciousness; and argues against the moral status for AI on the grounds that human malware authors may design malware to fake consciousness. In fact, the article warns that malware authors have stronger incentives than do authors of legitimate software to create code that passes some of the criteria. Thus, code that appears to be benign, but is in fact malware, might become the most common form of software to be treated as having moral status.", "venue": "Cambridge Quarterly of Healthcare Ethics", "year": 2021, "referenceCount": 91, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": "30", "pages": "517 - 528", "name": "Cambridge Quarterly of Healthcare Ethics"}, "authors": [{"authorId": "1696656", "name": "M. Mowbray"}]}, {"paperId": "8163c3ba9872e8e0ccdbbcaa3352ff594cb0e9c4", "externalIds": {"DBLP": "journals/ieeejas/HepworthBHYDA21", "MAG": "3113524144", "DOI": "10.1109/JAS.2020.1003545", "CorpusId": 234934052}, "url": "https://www.semanticscholar.org/paper/8163c3ba9872e8e0ccdbbcaa3352ff594cb0e9c4", "title": "Human-Swarm-Teaming Transparency and Trust Architecture", "abstract": "Transparency is a widely used but poorly defined term within the explainable artificial intelligence literature. This is due, in part, to the lack of an agreed definition and the overlap between the connected - sometimes used synonymously - concepts of interpretability and explain ability. We assert that transparency is the overarching concept, with the tenets of interpretability, explainability, and predictability subordinate. We draw on a portfolio of definitions for each of these distinct concepts to propose a human-swarm-teaming transparency and trust architecture (HST3-Architecture). The architecture reinforces transparency as a key contributor towards situation awareness, and consequently as an enabler for effective trustworthy human-swarm teaming (HST).", "venue": "IEEE/CAA Journal of Automatica Sinica", "year": 2021, "referenceCount": 112, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": "8", "pages": "1281-1295", "name": "IEEE/CAA Journal of Automatica Sinica"}, "authors": [{"authorId": "41172766", "name": "A. Hepworth"}, {"authorId": "2005671863", "name": "D. Baxter"}, {"authorId": "144989577", "name": "Aya Hussein"}, {"authorId": "52260227", "name": "Kate J. Yaxley"}, {"authorId": "1792568", "name": "Essam Soliman Debie"}, {"authorId": "1713460", "name": "H. Abbass"}]}, {"paperId": "09aced33ffa94cb229dc26b300f8b42fa1d17c56", "externalIds": {"MAG": "3180423254", "DOI": "10.5817/mujlt2021-1-4", "CorpusId": 237759089}, "url": "https://www.semanticscholar.org/paper/09aced33ffa94cb229dc26b300f8b42fa1d17c56", "title": "Lex Ex Machina: Reasons for Algorithmic Regulation", "abstract": "A major unanswered question in regulation concerns the application of cognitive diversity and various data as inputs for the creation of general legal rules. The paper claims this diversity can be assured with the help of algorithmic planning. Classical regulation is hence put under question due to its inability to quickly adapt to changing conditions, where relations per se change also intentions, tools and goals. The paper proposes two paths towards a computational simulation of legal situations: with the help of algorithms that can ensure the needed adaptability and relevancy of hidden data correlations, and with collective intelligence based on human inputs where data for algorithms is not available. The aim of this work is to extend the pre-regulatory practice of extracting information from data with the help of algorithms to determine patterns and predict future results and trends (written now as general legal rules). Nowadays, algorithms could be used at least as advice, especially in a prepreparation, draft phase of legal acts.", "venue": "Masaryk University Journal of Law and Technology", "year": 2021, "referenceCount": 16, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-30", "journal": {"name": "Masaryk University Journal of Law and Technology"}, "authors": [{"authorId": "74626425", "name": "Mirko Pe\u010dari\u010d"}]}, {"paperId": "b89b3d1d1b159638a375dde9008a9f3b46c0ab57", "externalIds": {"MAG": "3176569696", "DOI": "10.1007/s00146-021-01244-7", "CorpusId": 237739779}, "url": "https://www.semanticscholar.org/paper/b89b3d1d1b159638a375dde9008a9f3b46c0ab57", "title": "The dissolution of the condicio humana", "abstract": null, "venue": "AI & SOCIETY", "year": 2021, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-06-30", "journal": {"name": "AI & SOCIETY"}, "authors": [{"authorId": "2128832094", "name": "Tim Rein"}]}, {"paperId": "b8184dd0fc6f9529d814420bfda0b904a8ac8f58", "externalIds": {"MAG": "3175460271", "DOI": "10.33461/uybisbbd.913513", "CorpusId": 237893980}, "url": "https://www.semanticscholar.org/paper/b8184dd0fc6f9529d814420bfda0b904a8ac8f58", "title": "B\u0130LG\u0130 Y\u00d6NET\u0130M\u0130NDE KURAL TABANLI UZMAN S\u0130STEM GEL\u0130\u015eT\u0130RME ADIMLARI VE BA\u015eARI FAKT\u00d6RLER\u0130", "abstract": "Thanks to information technologies, change in the world takes place very quickly. This change necessitates taking decisions quickly and accurately. Expert systems assist human decision making by acting in a similar way. The scope of the study includes a rule-based expert system. The aim of this study is to reveal the success factors of rule-based expert system development on the basis of system development stages in order to shed light on those who develop expert systems. As a method, things to be done on the basis of an expert system development stages are discussed. As a result, it is aimed that the success factors presented in the study will contribute to the development of perspectives or to increase the success of the project they use, in case of use by researchers or practitioners who develop expert systems.", "venue": "Uluslararas\u0131 Y\u00f6netim Bili\u015fim Sistemleri ve Bilgisayar Bilimleri Dergisi", "year": 2021, "referenceCount": 38, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-30", "journal": {"name": "Uluslararas\u0131 Y\u00f6netim Bili\u015fim Sistemleri ve Bilgisayar Bilimleri Dergisi"}, "authors": [{"authorId": "121738154", "name": "Do\u011fan Yildiz"}]}, {"paperId": "a16ae67070de155789a871cb27ecbf9eaa98b379", "externalIds": {"ACL": "2021.acl-long.565", "ArXiv": "2107.00061", "DBLP": "journals/corr/abs-2107-00061", "DOI": "10.18653/v1/2021.acl-long.565", "CorpusId": 235694265}, "url": "https://www.semanticscholar.org/paper/a16ae67070de155789a871cb27ecbf9eaa98b379", "title": "All That\u2019s \u2018Human\u2019 Is Not Gold: Evaluating Human Evaluation of Generated Text", "abstract": "Human evaluations are typically considered the gold standard in natural language generation, but as models\u2019 fluency improves, how well can evaluators detect and judge machine-generated text? We run a study assessing non-experts\u2019 ability to distinguish between human- and machine-authored text (GPT2 and GPT3) in three domains (stories, news articles, and recipes). We find that, without training, evaluators distinguished between GPT3- and human-authored text at random chance level. We explore three approaches for quickly training evaluators to better identify GPT3-authored text (detailed instructions, annotated examples, and paired examples) and find that while evaluators\u2019 accuracy improved up to 55%, it did not significantly improve across the three domains. Given the inconsistent results across text domains and the often contradictory reasons evaluators gave for their judgments, we examine the role untrained human evaluations play in NLG evaluation and provide recommendations to NLG researchers for improving human evaluations of text generated from state-of-the-art models.", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2021, "referenceCount": 40, "citationCount": 68, "influentialCitationCount": 10, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-06-30", "journal": {"pages": "7282-7296"}, "authors": [{"authorId": "40684993", "name": "Elizabeth Clark"}, {"authorId": "50509991", "name": "Tal August"}, {"authorId": "38618739", "name": "Sofia Serrano"}, {"authorId": "3465456", "name": "Nikita Haduong"}, {"authorId": "40895369", "name": "Suchin Gururangan"}, {"authorId": "144365875", "name": "Noah A. Smith"}]}, {"paperId": "8230a91a2c3ce4291e901a08485d001fadca8e08", "externalIds": {"MAG": "3198536686", "DOI": "10.7480/FOOTPRINT.15.1.4984", "CorpusId": 239694753}, "url": "https://www.semanticscholar.org/paper/8230a91a2c3ce4291e901a08485d001fadca8e08", "title": "Architecture as Information Machine", "abstract": "Architecture has always been dealing with machines. Differently but constantly. At the middle of the last century, new kind of machine and its science have emerged: Cybernetics and Information Machine. Architectural theory and practice displayed great interest in these new paradigms and produced some design experimentations and essays but it seems like these scientific and technological results call for recasting the architectural foundations. Not only to figure out how to design new or complex architectural forms but to attempt replaying to the question, \u201cwhat is form?\u201d then to contribute to the understandability of all kinds of forms \u2014not only architectural or urban forms, but all the forms involved in the built environment\u2014 and to link or \u201ctranslate\u201d one form into another. Such transversal view might renew not only our reading of the past and current built environment but also our manner to interact and to shape it. What if, in contrary to the other former machines, the Information Machine is neither to be represented, nor to be imitated but to be actualized, or better to be modeled?", "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-29", "journal": {"volume": "15", "pages": "111-126", "name": ""}, "authors": [{"authorId": "121889488", "name": "Tewfik Hammoudi"}]}, {"paperId": "7c9b154ee30fffd74b1498f8c07212bfa694aa48", "externalIds": {"DBLP": "journals/corr/abs-2106-13697", "ArXiv": "2106.13697", "DOI": "10.1016/j.mechatronics.2021.102576", "CorpusId": 235652039}, "url": "https://www.semanticscholar.org/paper/7c9b154ee30fffd74b1498f8c07212bfa694aa48", "title": "Active Learning in Robotics: A Review of Control Principles", "abstract": null, "venue": "ArXiv", "year": 2021, "referenceCount": 306, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-25", "journal": {"volume": "abs/2106.13697", "name": "ArXiv"}, "authors": [{"authorId": "38598182", "name": "Annalisa T. Taylor"}, {"authorId": "52185279", "name": "Thomas A. Berrueta"}, {"authorId": "2750574", "name": "T. Murphey"}]}, {"paperId": "a9d0ad339987451214e41105a6a5344bd00a1e69", "externalIds": {"MAG": "3176620061", "DOI": "10.35487/rius.v15i48.2021.661", "CorpusId": 237795091}, "url": "https://www.semanticscholar.org/paper/a9d0ad339987451214e41105a6a5344bd00a1e69", "title": "Towards legal regulation of artificial intelligence", "abstract": "This paper addresses the current state of AI regulation and discusses the feasibility and need for regulation through legally binding instruments, beyond the field of ethics. History shows what can happen if the State withdraws and allows private companies to set their own exclusive regulatory standards. We have a unique opportunity to create laws and principles governing AI on a common basis and with an indispensable public-private partnership that should preferably be international in scope with the leadership of the UN or, failing that, at European level led by EU institutions, as they had already achieved in the areas of privacy and data protection.", "venue": "REVISTA IUS", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-23", "journal": {"name": "REVISTA IUS"}, "authors": [{"authorId": "2129026461", "name": "Moises Barrio Andres"}]}, {"paperId": "eb4d217810bb0dba2cabcbbb6bed9a2bfc8e765d", "externalIds": {"MAG": "3171224575", "DOI": "10.12737/2587-9103-2021-10-3-17-23", "CorpusId": 236264692}, "url": "https://www.semanticscholar.org/paper/eb4d217810bb0dba2cabcbbb6bed9a2bfc8e765d", "title": "Development of Artificial Intelligence as a Factor of Transformation in Philosophical Anthropology and Ethics", "abstract": "This article is dedicated to the problem of the development of artificial intelligence in modern society and its influence on such philosophical disciplines as philosophical anthropology, philosophy of mind and ethics. The article defines the possible content of the term \"artificial intelligence\", examines the impact of artificial intelligence on the problem of distinguishing intelligent and non-intelligent beings, assesses the possibility of the existence of consciousness outside the human brain, explores options for solving applied ethical problems in the field of AI, searches ways of communication between the humanity and artificial intelligence, assesses the theoretical prospects for organizing an ethical space for intelligent machines of the future. At the end of each topic, the author tries to assess the potential impact of the artificial intelligence development on usual philosophical problems. The work has practical application in teaching a course in philosophy, and theoretical application as a basis for further research in various fields of science and philosophy.", "venue": "", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-23", "journal": {"volume": "10", "pages": "17-23", "name": ""}, "authors": [{"authorId": "74651556", "name": "A. Filipchenko"}]}, {"paperId": "7a7064a33c0270e2d40448f7e25c7ad8d159d345", "externalIds": {"MAG": "3175232352", "DOI": "10.21203/rs.3.rs-590601/v1", "CorpusId": 237854631}, "url": "https://www.semanticscholar.org/paper/7a7064a33c0270e2d40448f7e25c7ad8d159d345", "title": "Compressing atmospheric data into its real information content", "abstract": "\n Hundreds of petabytes of data are produced annually at weather and climate forecast centres worldwide. Compression is inevitable to reduce storage and to facilitate data sharing. Current techniques do not distinguish the real from the false information in data. We define the bitwise real information content from information theory for data from the Copernicus Atmospheric Monitoring Service (CAMS). Most variables contain less than 7 bits of real information per value, which are also highly compressible due to spatio-temporal correlation. Rounding bits without real information to zero facilitates lossless compression algorithms and encodes the uncertainty within the data itself. The entire CAMS data is compressed by a factor of 17x, relative to 64-bit floats, while preserving 99% of real information. Combined with 4-dimensional compression to exploit the spatio-temporal correlation, factors beyond 60x are achieved without an increase in forecast errors. A data compression Turing test is proposed to optimize compressibility while minimizing information loss for the end use of weather and climate forecast data.", "venue": "Nature Computational Science", "year": 2021, "referenceCount": 59, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-21", "journal": {"name": "Nature Computational Science"}, "authors": [{"authorId": "2094921437", "name": "Milan Kloewer"}, {"authorId": "2126605081", "name": "Miha Razinger"}, {"authorId": "2007305458", "name": "Juan-Jos\u00e9 Dominguez"}, {"authorId": "1389726126", "name": "P. Dueben"}, {"authorId": "48919093", "name": "T. Palmer"}]}, {"paperId": "7e7a66eb76efb6161ae7dcb6533eb12500d827ef", "externalIds": {"PubMedCentral": "8252890", "DOI": "10.12659/MSM.933675", "CorpusId": 235661362, "PubMed": "34176921"}, "url": "https://www.semanticscholar.org/paper/7e7a66eb76efb6161ae7dcb6533eb12500d827ef", "title": "Editorial: Artificial Intelligence (AI) in Clinical Medicine and the 2020 CONSORT-AI Study Guidelines", "abstract": "Artificial intelligence (AI) in clinical medicine includes physical robotics and devices and virtual AI and machine learning. Concerns have been raised regarding ethical issues for the use of AI in surgery, including guidance for surgical decisions, patient confidentiality, and the need for support from controlled clinical trials to use these methods so that clinical guidelines can be developed. The most common applications for virtual AI include disease diagnosis, health monitoring and digital patient consultations, clinical training, patient data management, drug development, and personalized medicine. In September 2020, the CONSORT-A1 extension was developed with 14 additional items that should be reported for AI studies that include clear descriptions of the AI intervention, skills required, study setting, inputs and outputs of the AI intervention, analysis of errors, and the human and AI interactions. This Editorial aims to present current applications and challenges of AI in clinical medicine and the importance of the new 2020 CONSORT-AI study guidelines.", "venue": "Medical science monitor : international medical journal of experimental and clinical research", "year": 2021, "referenceCount": 22, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2021-06-21", "journal": {"volume": "27", "pages": "e933675-1 - e933675-3", "name": "Medical Science Monitor : International Medical Journal of Experimental and Clinical Research"}, "authors": [{"authorId": "3692616", "name": "D. Parums"}]}, {"paperId": "75afe70550586a44e2b4b51bd5a286e2be9883ce", "externalIds": {"ArXiv": "2106.13233", "CorpusId": 237513957}, "url": "https://www.semanticscholar.org/paper/75afe70550586a44e2b4b51bd5a286e2be9883ce", "title": "Post-Selections in AI and How to Avoid Them", "abstract": ": Neural network based Arti\ufb01cial Intelligence (AI) has reported increasing scales in experiments. However, this paper raises a rarely reported stage in such experiments called Post-Selection alter the reader to several possible protocol \ufb02aws that may result in misleading results. All AI methods fall into two broad schools, connectionist and symbolic. The Post-Selection fall into two kinds, Post-Selection Using Validation Sets (PSUVS) and Post-Selection Using Test Sets (PSUTS). Each kind has two types of post-selectors, machines and humans. The connectionist school received criticisms for its \u201cblack box\u201d and now the Post-Selection; but the seemingly \u201cclean\u201d symbolic school seems more brittle because of its human PSUTS. This paper \ufb01rst presents a controversial view: all static \u201cbig data\u201d are non-scalable. We then analyze why error-backprop from randomly initialized weights suffers from severe local minima, why PSUVS lacks cross-validation, why PSUTS violates well-established protocols, and why every paper involved should transparently report the Post-Selection stage. To avoid future pitfalls in AI competitions, this paper proposes a new AI metrics, called developmental errors for all networks trained, under Three Learning Conditions: (1) an incremental learning architecture (due to a \u201cbig data\u201d \ufb02aw), (2) a training experience and (3) a limited amount of computational resources. Developmental Networks avoid Post-Selections because they automatically discover context-rules on the \ufb02y by generating emergent Turing machines (not black boxes) that are optimal in the sense of maximum-likelihood across lifetime, conditioned on the Three Learning Conditions.", "venue": "", "year": 2021, "referenceCount": 92, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-19", "journal": null, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "220068be6ef897b2b38db687a922423d6693ed9c", "externalIds": {"PubMedCentral": "8213706", "DOI": "10.1038/s41540-021-00189-3", "CorpusId": 235476723, "PubMed": "34145287"}, "url": "https://www.semanticscholar.org/paper/220068be6ef897b2b38db687a922423d6693ed9c", "title": "Nobel Turing Challenge: creating the engine for scientific discovery", "abstract": null, "venue": "NPJ systems biology and applications", "year": 2021, "referenceCount": 116, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-06-18", "journal": {"volume": "7", "name": "NPJ Systems Biology and Applications"}, "authors": [{"authorId": "1742807", "name": "H. Kitano"}]}, {"paperId": "2b3167a329292f63a0afe975c891555e008d77c0", "externalIds": {"MAG": "3175000097", "DOI": "10.32957/hacettepehdf.874993", "CorpusId": 237858393}, "url": "https://www.semanticscholar.org/paper/2b3167a329292f63a0afe975c891555e008d77c0", "title": "YAPAY ZEK\u00c2 VE \u0130DARE HUKUKU (BUG\u00dcNDEN GELECE\u011eE Y\u00d6NEL\u0130K B\u0130R DE\u011eERLEND\u0130RME)", "abstract": "Artificial intelligence continues to change our lives. However, while artificial intelligence increases its function in society, the uncertain and unpredictable character of artificial intelligence also creates a new challenge for law, unlike every scientific development. In our assessment, we think that the concepts of electronic personality and legal personality should be emphasized in determining the legal personality and legal status of artificial intelligence. On the other hand, as the types of artificial intelligence develop and the artificial intelligence becomes aware of itself, more complex legal problems will come to the agenda. One of the issues the article focuses on is the dilemma of the law regarding timing and content against artificial intelligence technology, as in every scientific development. For the law to find its way out, a road map should be created. In our study, it is revealed that administrative law, like other branches of law, cannot be abstracted from artificial intelligence developments. Administrative law will be affected by Ka\u011f\u0131tc\u0131o\u011flu Hacettepe HFD, 11(1) 2021, 118-168 120 developments in artificial intelligence, with its mandate, institution, and concepts. For this reason, there are not a few issues that the organic and functional administration will transform within itself with the effect of artificial intelligence. In the field of responsibility of the administration due to the damages caused by artificial intelligence, it is necessary to consider the adaptation of the strict liability principle or the development of a new one. Thanks to the jurisprudence character of administrative law, it is possible to produce adequate and timely responses to developments in the field of artificial intelligence. In addition, the relationship to be established between administrative law and artificial intelligence may bring the need for administrative procedure act back into the agenda.", "venue": "Hacettepe Hukuk Fak\u00fcltesi Dergisi", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-17", "journal": {"name": "Hacettepe Hukuk Fak\u00fcltesi Dergisi"}, "authors": [{"authorId": "1696645119", "name": "Mutlu Ka\u011fitcio\u011flu"}]}, {"paperId": "d6a59868ed67dc581b3a721824c130490ea74566", "externalIds": {"PubMedCentral": "8580451", "ArXiv": "2106.08375", "DOI": "10.1098/rsta.2020.0268", "CorpusId": 235446476, "PubMed": "34743603"}, "url": "https://www.semanticscholar.org/paper/d6a59868ed67dc581b3a721824c130490ea74566", "title": "Modern perspectives on near-equilibrium analysis of Turing systems", "abstract": "In the nearly seven decades since the publication of Alan Turing\u2019s work on morphogenesis, enormous progress has been made in understanding both the mathematical and biological aspects of his proposed reaction\u2013diffusion theory. Some of these developments were nascent in Turing\u2019s paper, and others have been due to new insights from modern mathematical techniques, advances in numerical simulations and extensive biological experiments. Despite such progress, there are still important gaps between theory and experiment, with many examples of biological patterning where the underlying mechanisms are still unclear. Here, we review modern developments in the mathematical theory pioneered by Turing, showing how his approach has been generalized to a range of settings beyond the classical two-species reaction\u2013diffusion framework, including evolving and complex manifolds, systems heterogeneous in space and time, and more general reaction-transport equations. While substantial progress has been made in understanding these more complicated models, there are many remaining challenges that we highlight throughout. We focus on the mathematical theory, and in particular linear stability analysis of \u2018trivial\u2019 base states. We emphasize important open questions in developing this theory further, and discuss obstacles in using these techniques to understand biological reality. This article is part of the theme issue \u2018Recent progress and open frontiers in Turing\u2019s theory of morphogenesis\u2019.", "venue": "Philosophical Transactions of the Royal Society A", "year": 2021, "referenceCount": 236, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Physics", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-15", "journal": {"volume": "379", "name": "Philosophical transactions. Series A, Mathematical, physical, and engineering sciences"}, "authors": [{"authorId": "22256586", "name": "Andrew L. Krause"}, {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "2339973", "name": "P. Maini"}, {"authorId": "2691918", "name": "V. Klika"}]}, {"paperId": "d602137d38d4fad9e6db07d911fbf3551894d441", "externalIds": {"ArXiv": "2106.06924", "CorpusId": 245828042}, "url": "https://www.semanticscholar.org/paper/d602137d38d4fad9e6db07d911fbf3551894d441", "title": "Deep Learning for Predictive Analytics in Reversible Steganography", "abstract": "Deep learning is regarded as a promising solution for reversible steganography. The recent development of end-toend learning has made it possible to bypass multiple intermediate stages of steganographic operations with a pair of encoder and decoder neural networks. This framework is, however, incapable of guaranteeing perfect reversibility since it is difficult for this kind of monolithic machinery, in the form of a black box, to learn the intricate logics of reversible computing. A more reliable way to develop a learning-based reversible steganographic scheme is through a divide-and-conquer paradigm. Predictionerror modulation is a well-established modular framework that consists of an analytics module and a coding module. The former serves the purpose of analysing pixel correlations and predicting pixel intensities, while the latter specialises in reversible coding mechanisms. Given that reversibility is governed independently by the coding module, we narrow our focus to the incorporation of neural networks into the analytics module. The objective of this study is to evaluate the impacts of different training configurations on predictive neural networks and to provide practical insights. Context-aware pixel intensity prediction has a central role in reversible steganography and can be perceived as a lowlevel computer vision task. Therefore, instead of reinventing the wheel, we can adopt neural network models originally designed for such computer vision tasks to perform intensity prediction. Furthermore, we rigorously investigate the effect of intensity initialisation upon predictive performance and the influence of distributional shift in dual-layer prediction. Experimental results show that state-of-the-art steganographic performance can be achieved with advanced neural network models.", "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-13", "journal": null, "authors": [{"authorId": "4020249", "name": "Ching-Chun Chang"}, {"authorId": "2108601214", "name": "Xu Wang"}, {"authorId": "2111637781", "name": "Sisheng Chen"}, {"authorId": "1678602", "name": "I. Echizen"}, {"authorId": "153618912", "name": "Victor Sanchez"}, {"authorId": "2145403463", "name": "Chang-Tsun Li"}]}, {"paperId": "799074672e47b38af1fb9ef9004f42137d450b2e", "externalIds": {"MAG": "3169712958", "DOI": "10.5325/JAYNRANDSTUD.21.1.0056", "CorpusId": 235717686}, "url": "https://www.semanticscholar.org/paper/799074672e47b38af1fb9ef9004f42137d450b2e", "title": "Mental Integrations as Functional Wholes", "abstract": "ABSTRACT:It is argued that a mental integration is formed only if the result is a functional whole. This idea is then used to clarify the definition of a concept and discuss problems in which an instance may belong to different conceptual classes depending on the context. The same idea is also applied to the rules for dealing with an entity when it is formed out of sub-entities. Specific examples of how such rules are frequently violated in literature as well as colloquially are discussed.", "venue": "", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-12", "journal": {"volume": "21", "pages": "56 - 64", "name": "Journal of Ayn Rand Studies"}, "authors": [{"authorId": "1420010330", "name": "Abhijeet Melkani"}]}, {"paperId": "707145c14635577826fe97a9367235034c88bc2e", "externalIds": {"DOI": "10.31122/sinefilozofi.810857", "CorpusId": 245366573}, "url": "https://www.semanticscholar.org/paper/707145c14635577826fe97a9367235034c88bc2e", "title": "Yapay Zek\u00e2 D\u00fcalizminde \u00d6zbilin\u00e7lilik Halinin Varl\u0131\u011f\u0131 ve Y\u0131k\u0131m\u0131 \u00dczerine", "abstract": null, "venue": "SineFilozofi", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-06-11", "journal": {"name": "SineFilozofi"}, "authors": [{"authorId": "1581773959", "name": "Mehmet Ali Sevimli"}, {"authorId": "108555493", "name": "M. Serarslan"}]}, {"paperId": "d65cd36a5e4a03d5bb7f9a8a62034762062f88de", "externalIds": {"DOI": "10.1007/s00129-021-04811-7", "CorpusId": 235398761}, "url": "https://www.semanticscholar.org/paper/d65cd36a5e4a03d5bb7f9a8a62034762062f88de", "title": "K\u00fcnstliche Intelligenz \u2013 ein Mythos des 21. Jahrhunderts?", "abstract": null, "venue": "Der Gyn\u00e4kologe", "year": 2021, "referenceCount": 24, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-06-11", "journal": {"volume": "54", "pages": "471 - 475", "name": "Der Gyn\u00e4kologe"}, "authors": [{"authorId": "39139942", "name": "W. Zimmerli"}]}, {"paperId": "43337d43b30ab1f666e4b3f373e7aba36e867673", "externalIds": {"MAG": "3162994603", "DOI": "10.1080/13614533.2021.1930076", "CorpusId": 236309100}, "url": "https://www.semanticscholar.org/paper/43337d43b30ab1f666e4b3f373e7aba36e867673", "title": "Views of Academic Library Directors on Artificial Intelligence: A Representative Survey in Hungary", "abstract": "Abstract Artificial intelligence (AI) is a defining technology of the 21st century, creating new opportunities for academic libraries. The goal of this paper is to provide a much-needed analysis, interpreted in an international context, on what the leaders of academic libraries in East-Central Europe, and specifically in Hungary, think about AI and its implementation in a library setting. The survey shows that according to library directors AI is more of an opportunity for academic libraries than a threat, and it could provide support in all areas of library operation, including digitising, information service, and education. Findings indicate that a quarter of the Hungarian academic libraries surveyed use AI-supported solutions, mostly in the areas of information retrieval and data processing. Using Rogers (The diffusion of innovations. 5th ed. The Free Press, 2003) diffusion of innovation model, it may be projected that an explosive growth is to be expected in the use of AI in libraries.", "venue": "New Review of Academic Librarianship", "year": 2021, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-06-10", "journal": {"volume": "28", "pages": "256 - 278", "name": "New Review of Academic Librarianship"}, "authors": [{"authorId": "122572547", "name": "B. Winkler"}, {"authorId": "108509737", "name": "P. Kiszl"}]}, {"paperId": "c6774515300d07888d6837e812d0c20c90060c5b", "externalIds": {"DOI": "10.1109/ICOEI51242.2021.9452971", "CorpusId": 235618357}, "url": "https://www.semanticscholar.org/paper/c6774515300d07888d6837e812d0c20c90060c5b", "title": "Code Convertor-Binary to Uniform Minimal Switching Representation (UMSR)", "abstract": "The low-power arithmetic design has become a very important aspect for recent compact electronic gadgets. The need to minimize dynamic power dissipation is vital for combinational circuits. Switching activity is a vital reason for the dissipation of power in combinational circuits, which includes activities like spurious pulses, called glitches. Functional transition and glitch are two types of signal transitions. A glitch is an unnecessary, momentary error in the system before the signal reaches to the anticipated value. Before reaching a stable state, there can be changes in the state of the signal, called glitches. Every toggling causes dissipation of power as a result of charging and discharging of gate capacitance. In the proposed method i.e., uniform minimal switching decimal representation, the increase in the number of 1's serially there will be an increase in the current and hence there are no glitches compared to binary code, where a number of 1's increases at different places. This type of coding has high linearity performance by reducing the clock feed-through effect especially in switching between multiple transistors. In the proposed method, one can prove that uniform minimal switching decimal representation acts as a number system so that all arithmetic operations can be done. In this paper Implementation of UMSR (Uniform minimal switching representation also known as Thermometer code) is carried out using Field Programmable Gate Arrays (FPGA).", "venue": "2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)", "year": 2021, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-06-03", "journal": {"pages": "164-170", "name": "2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)"}, "authors": [{"authorId": "9234276", "name": "N. Samanvita"}, {"authorId": "36390491", "name": "Sudeep Shetty"}, {"authorId": "2114850858", "name": "Nagaraj M J"}]}, {"paperId": "d4f6ef636e16b001986b541aa2afc76eed42ae34", "externalIds": {"PubMedCentral": "8175735", "DOI": "10.1038/s41746-021-00464-x", "CorpusId": 235307275, "PubMed": "34083689"}, "url": "https://www.semanticscholar.org/paper/d4f6ef636e16b001986b541aa2afc76eed42ae34", "title": "Considering the possibilities and pitfalls of Generative Pre-trained Transformer 3 (GPT-3) in healthcare delivery", "abstract": null, "venue": "npj Digital Medicine", "year": 2021, "referenceCount": 27, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-03", "journal": {"volume": "4", "name": "NPJ Digital Medicine"}, "authors": [{"authorId": "6114730", "name": "Diane M. Korngiebel"}, {"authorId": "1712935", "name": "S. Mooney"}]}, {"paperId": "211c1b36c9873743b2d5c955a0823143cbd4e8fe", "externalIds": {"ArXiv": "2106.01288", "DBLP": "journals/corr/abs-2106-01288", "CorpusId": 235294049}, "url": "https://www.semanticscholar.org/paper/211c1b36c9873743b2d5c955a0823143cbd4e8fe", "title": "Bottom-Up and Top-Down Neural Processing Systems Design: Neuromorphic Intelligence as the Convergence of Natural and Artificial Intelligence", "abstract": "While Moore\u2019s law has driven exponential computing power expectations, its nearing end calls for new avenues for improving the overall system performance. One of these avenues is the exploration of new alternative brain-inspired computing architectures that promise to achieve the flexibility and computational efficiency of biological neural processing systems. Within this context, neuromorphic intelligence represents a paradigm shift in computing based on the implementation of spiking neural network architectures tightly co-locating processing and memory. In this paper, we provide a comprehensive overview of the field, highlighting the different levels of granularity present in existing silicon implementations, comparing approaches that aim at replicating natural intelligence (bottom-up) versus those that aim at solving practical artificial intelligence applications (top-down), and assessing the benefits of the different circuit design styles used to achieve these goals. First, we present the analog, mixed-signal and digital circuit design styles, identifying the boundary between processing and memory through time multiplexing, in-memory computation and novel devices. Next, we highlight the key tradeoffs for each of the bottom-up and top-down approaches, survey their silicon implementations, and carry out detailed comparative analyses to extract design guidelines. Finally, we identify both necessary synergies and missing elements required to achieve a competitive advantage for neuromorphic edge computing over conventional machine-learning accelerators, and outline the key elements for a framework toward neuromorphic intelligence.", "venue": "ArXiv", "year": 2021, "referenceCount": 306, "citationCount": 14, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-02", "journal": {"volume": "abs/2106.01288", "name": "ArXiv"}, "authors": [{"authorId": "38613620", "name": "C. Frenkel"}, {"authorId": "3272827", "name": "D. Bol"}, {"authorId": "1721210", "name": "G. Indiveri"}]}, {"paperId": "b3d30dd72e7504331d9ed95edfbf2493358e6c9c", "externalIds": {"DBLP": "journals/aisy/BercoA21", "MAG": "3169448988", "DOI": "10.1002/aisy.202100025", "CorpusId": 236270717}, "url": "https://www.semanticscholar.org/paper/b3d30dd72e7504331d9ed95edfbf2493358e6c9c", "title": "Bioinspired Robotic Vision with Online Learning Capability and Rotation\u2010Invariant Properties", "abstract": "Reliable image perception is critical for living organisms. Biologic sensory organs and nervous systems evolved interdependently to allow apprehension of visual information regardless of spatial orientation. By contrast, convolutional neural networks usually have limited tolerance to rotational transformations. There are software\u2010based approaches used to address this issue, such as artificial rotation of training data or preliminary image processing. However, these workarounds require a large computational effort and are mostly done offline. This work presents a bioinspired, robotic vision system with inherent rotation\u2010invariant properties that may be taught either offline or in real time by feeding back error indications. It is successfully trained to counter the move of a human player in a game of Paper Scissors Stone. The architecture and operation principles are first discussed alongside the experimental setup. This is followed by performance analysis of pattern recognition under misaligned and rotated conditions. Finally, the process of online, supervised learning is demonstrated and analyzed.", "venue": "Adv. Intell. Syst.", "year": 2021, "referenceCount": 34, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-02", "journal": {"volume": "3", "name": "Advanced Intelligent Systems"}, "authors": [{"authorId": "46237159", "name": "D. Berco"}, {"authorId": "144204958", "name": "D. Ang"}]}, {"paperId": "7e1dd28b8fc6cb63d37c344abc02a1dd06bee70f", "externalIds": {"MAG": "3169673055", "DOI": "10.3390/JMSE9060612", "CorpusId": 236246530}, "url": "https://www.semanticscholar.org/paper/7e1dd28b8fc6cb63d37c344abc02a1dd06bee70f", "title": "Use of Genetic Programming for the Estimation of CODLAG Propulsion System Parameters", "abstract": "In this paper, the publicly available dataset for the Combined Diesel-Electric and Gas (CODLAG) propulsion system was used to obtain symbolic expressions for estimation of fuel flow, ship speed, starboard propeller torque, port propeller torque, and total propeller torque using genetic programming (GP) algorithm. The dataset consists of 11,934 samples that were divided into training and testing portions in an 80:20 ratio. The training portion of the dataset which consisted of 9548 samples was used to train the GP algorithm to obtain symbolic expressions for estimation of fuel flow, ship speed, starboard propeller, port propeller, and total propeller torque, respectively. After the symbolic expressions were obtained the testing portion of the dataset which consisted of 2386 samples was used to measure estimation performance in terms of coefficient of correlation (R2) and Mean Absolute Error (MAE) metric, respectively. Based on the estimation performance in each case three best symbolic expressions were selected with and without decay state coefficients. From the conducted investigation, the highest R2 and lowest MAE values were achieved with symbolic expressions for the estimation of fuel flow, ship speed, starboard propeller torque, port propeller torque, and total propeller torque without decay state coefficients while symbolic expressions with decay state coefficients have slightly lower estimation performance.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-02", "journal": {"volume": "9", "pages": "612", "name": "Journal of Marine Science and Engineering"}, "authors": [{"authorId": "100971349", "name": "N. An\u0111eli\u0107"}, {"authorId": "1397281869", "name": "Sandi Baressi Segota"}, {"authorId": "147321796", "name": "I. Lorencin"}, {"authorId": "5633004", "name": "I. Poljak"}, {"authorId": "94315279", "name": "V. Mrzljak"}, {"authorId": "145978031", "name": "Z. Car"}]}, {"paperId": "d1d2689d9da47a3545780e79f4542b98cdeadfde", "externalIds": {"MAG": "3169134790", "DOI": "10.30727/0235-1188-2021-64-1-102-115", "CorpusId": 236219533}, "url": "https://www.semanticscholar.org/paper/d1d2689d9da47a3545780e79f4542b98cdeadfde", "title": "Architectural Approach to Design of Emotional Intelligent Systems", "abstract": "Over the past decades, due to the course towards digitalization of all areas of life, interest in modeling and creating intelligent systems has increased significantly. However, there are now a stagnation in the industry, a lack of attention to analog and bionic approaches as alternatives to digital, numerous speculations on \u201cneuro\u201d issues for commercial and other purposes, and an increase in social and environmental risks. The article provides an overview of the development of artificial intelligence (AI) conceptions toward increasing the human likeness of machines: from the key ideas of A. Turing and J. von Neumann, who initiated the digitalization of society, to discussions about the definition of AI and the emergence of conceptions of strong and weak AI. Special attention is paid to the approach of A. Sloman, to ideas about the architecture and design of complex artificial systems are considered, which make it possible to \u201cemotionally\u201d expand the idea of weak/strong AI. In the article's section on the necessity and possibility of incorporating emotions into the architecture of AI, the authors reveal the goals and methodological limitations for creating an emotional artificial agent. In addition, the article briefly presents the main principles of the authors' architectural approach to the creation of emotional intellectual systems on the example of the cognitive-affective model of architecture, which allow modeling the impact of emotions on the cognitive processes involved in decision-making processes. The described architectural approach to modeling intelligent systems can be used as a conceptual basis for discussing and formulating a strategy for the development of neurocomputing, philosophy of artificial intelligence, and experimental philosophy, for developing innovative research programs, formulating and solving theoretical and methodological problems.", "venue": "Russian Journal of Philosophical Sciences", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-06-02", "journal": {"name": "Russian Journal of Philosophical Sciences"}, "authors": [{"authorId": "117496015", "name": "Alexandra V. Shiller"}, {"authorId": "88013883", "name": "O. Petrunya"}]}, {"paperId": "92cbd12f802363b5b31c1c9fbdb82a8126938931", "externalIds": {"DBLP": "journals/ais/Graham22", "MAG": "3170108245", "DOI": "10.1007/s00146-021-01228-7", "CorpusId": 236219723}, "url": "https://www.semanticscholar.org/paper/92cbd12f802363b5b31c1c9fbdb82a8126938931", "title": "Discourse analysis of academic debate of ethics for AGI", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 87, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-02", "journal": {"volume": "37", "pages": "1519 - 1532", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2089380010", "name": "Ross Graham"}]}, {"paperId": "2669d1b0c858dcaf9e96e0eb30df54b1f16c4a7a", "externalIds": {"DBLP": "journals/ubiquity/Riley21a", "DOI": "10.1145/3459743", "CorpusId": 235689606}, "url": "https://www.semanticscholar.org/paper/2669d1b0c858dcaf9e96e0eb30df54b1f16c4a7a", "title": "Will machines ever think like humans?", "abstract": "What is \"human intelligence?\" What is thinking? What does it mean to \"think like a human?\" Is it possible for machines to display human intelligence, to think like humans? This article explores these questions, and gives a brief overview of some important features of the human brain, and how computer scientists are trying to simulate those features and their ability to \"think.\" The article answers some questions, but asks more---finishing with questions for readers to consider.", "venue": "Ubiquity", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-01", "journal": {"volume": "2021", "pages": "1 - 26", "name": "Ubiquity"}, "authors": [{"authorId": "39914109", "name": "J. Riley"}]}, {"paperId": "2ec4478121e025e4a75f717788ea903d7094710c", "externalIds": {"MAG": "3170210134", "DOI": "10.1007/S10699-021-09799-W", "CorpusId": 236349491}, "url": "https://www.semanticscholar.org/paper/2ec4478121e025e4a75f717788ea903d7094710c", "title": "A New Definition of \u201cArtificial\u201d for Two Artificial Sciences", "abstract": null, "venue": "Foundations of Science", "year": 2021, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-01", "journal": {"name": "Foundations of Science"}, "authors": [{"authorId": "39438795", "name": "F. Bianchini"}]}, {"paperId": "8989538ac21c85ec44f5f5f44ecf3a678e983682", "externalIds": {"PubMedCentral": "8227299", "DOI": "10.3390/mi12060665", "CorpusId": 235645231, "PubMed": "34204065"}, "url": "https://www.semanticscholar.org/paper/8989538ac21c85ec44f5f5f44ecf3a678e983682", "title": "Advancements in Microprocessor Architecture for Ubiquitous AI\u2014An Overview on History, Evolution, and Upcoming Challenges in AI Implementation", "abstract": "Artificial intelligence (AI) has successfully made its way into contemporary industrial sectors such as automobiles, defense, industrial automation 4.0, healthcare technologies, agriculture, and many other domains because of its ability to act autonomously without continuous human interventions. However, this capability requires processing huge amounts of learning data to extract useful information in real time. The buzz around AI is not new, as this term has been widely known for the past half century. In the 1960s, scientists began to think about machines acting more like humans, which resulted in the development of the first natural language processing computers. It laid the foundation of AI, but there were only a handful of applications until the 1990s due to limitations in processing speed, memory, and computational power available. Since the 1990s, advancements in computer architecture and memory organization have enabled microprocessors to deliver much higher performance. Simultaneously, improvements in the understanding and mathematical representation of AI gave birth to its subset, referred to as machine learning (ML). ML includes different algorithms for independent learning, and the most promising ones are based on brain-inspired techniques classified as artificial neural networks (ANNs). ANNs have subsequently evolved to have deeper and larger structures and are often characterized as deep neural networks (DNN) and convolution neural networks (CNN). In tandem with the emergence of multicore processors, ML techniques started to be embedded in a range of scenarios and applications. Recently, application-specific instruction-set architecture for AI applications has also been supported in different microprocessors. Thus, continuous improvement in microprocessor capabilities has reached a stage where it is now possible to implement complex real-time intelligent applications like computer vision, object identification, speech recognition, data security, spectrum sensing, etc. This paper presents an overview on the evolution of AI and how the increasing capabilities of microprocessors have fueled the adoption of AI in a plethora of application domains. The paper also discusses the upcoming trends in microprocessor architectures and how they will further propel the assimilation of AI in our daily lives.", "venue": "Micromachines", "year": 2021, "referenceCount": 144, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-06-01", "journal": {"volume": "12", "name": "Micromachines"}, "authors": [{"authorId": "48660997", "name": "F. Khan"}, {"authorId": "1721625", "name": "Muhammad Adeel Pasha"}, {"authorId": "1703323", "name": "S. Masud"}]}, {"paperId": "d3fbac681fd87bad93e8b044ef4bc1dcfdd51e86", "externalIds": {"DOI": "10.2139/ssrn.3896463", "CorpusId": 236910962}, "url": "https://www.semanticscholar.org/paper/d3fbac681fd87bad93e8b044ef4bc1dcfdd51e86", "title": "The Role of Data for AI Startup Growth", "abstract": "Artificial intelligence (\u201cAI\u201d)-enabled products are expected to drive economic growth. Training data are important for firms developing AI-enabled products; without training data, firms cannot develop or refine their algorithms. This is particularly the case for AI startups developing new algorithms and products. However, there is no consensus in the literature on which aspects of training data are most important. Using unique survey data of AI startups, we find that startups with access to proprietary training data are more likely to acquire venture capital funding.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 63, "citationCount": 5, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-06-01", "journal": {"name": "IO: Productivity"}, "authors": [{"authorId": "1951483", "name": "James Bessen"}, {"authorId": "1393239973", "name": "Stephen Michael Impink"}, {"authorId": "1393239966", "name": "Lydia Reichensperger"}, {"authorId": "2093183", "name": "Robert C. Seamans"}]}, {"paperId": "43e434618fbca87648856e67874dfec4b6e8611c", "externalIds": {"DBLP": "conf/cvpr/OlagueOJI21", "DOI": "10.1109/CVPRW53098.2021.00171", "CorpusId": 235666976}, "url": "https://www.semanticscholar.org/paper/43e434618fbca87648856e67874dfec4b6e8611c", "title": "Less is More: Pursuing the Visual Turing Test with the Kuleshov Effect", "abstract": "The Turing test centers on the idea that if a computer could trick a human into believing that it was human, then the machine was deemed to be intelligent or indistinguishable from people. Designing a visual Turing test involves recognizing objects and their relationships on images and creating a method to derive new concepts from the visual information. Until now, the proposed visual tests heavily use natural language processing to conduct the questionnaire or storytelling. We deviate from the mainstream, and we propose to reframe the visual Turing test through the Kuleshov effect to avoid written or spoken language. The idea resides on elucidating a method that creates the concept of montage synthetically. Like the first days of cinema, we would like to convey messages with the interpretation of image shots that a machine could decipher while comparing it with those scored by humans. The first implementation of this new test uses images from a psychology study where the circumplex model is applied to rate each image. We consider five deep learning methodologies and eight optimizers, and through semiotics, we derive an emotional state in the computer. The results are promising since we confirm that this version of the visual Turing test is challenging as a new research avenue.", "venue": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "year": 2021, "referenceCount": 36, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-06-01", "journal": {"pages": "1553-1561", "name": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"}, "authors": [{"authorId": "1721596", "name": "Gustavo Olague"}, {"authorId": "2125341066", "name": "Matthieu Olague"}, {"authorId": "2125335465", "name": "Angel R. Jacobo-Lopez"}, {"authorId": "1643930067", "name": "Gerardo Ibarra-V\u00e1zquez"}]}, {"paperId": "e49770180cc8e20aedff0237f367bedc00208c64", "externalIds": {"DBLP": "journals/eaai/Bhatnagar21", "MAG": "3158100292", "DOI": "10.1016/J.ENGAPPAI.2021.104241", "CorpusId": 235508027}, "url": "https://www.semanticscholar.org/paper/e49770180cc8e20aedff0237f367bedc00208c64", "title": "Competitive Optimality: A novel application in evaluating practical AI Systems", "abstract": null, "venue": "Eng. Appl. Artif. Intell.", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-01", "journal": {"volume": "102", "pages": "104241", "name": "Eng. Appl. Artif. Intell."}, "authors": [{"authorId": "47294631", "name": "Jayant Bhatnagar"}]}, {"paperId": "9983dd0b93d268c31cc821b9f4071372d191000e", "externalIds": {"ACL": "2021.naacl-main.386", "MAG": "3172931322", "DBLP": "conf/naacl/ZellersHCQFC21", "DOI": "10.18653/V1/2021.NAACL-MAIN.386", "CorpusId": 235097641}, "url": "https://www.semanticscholar.org/paper/9983dd0b93d268c31cc821b9f4071372d191000e", "title": "TuringAdvice: A Generative and Dynamic Evaluation of Language Use", "abstract": "We propose TuringAdvice, a new challenge task and dataset for language understanding models. Given a written situation that a real person is currently facing, a model must generate helpful advice in natural language. Our evaluation framework tests a fundamental aspect of human language understanding: our ability to use language to resolve open-ended situations by communicating with each other. Empirical results show that today\u2019s models struggle at TuringAdvice, even multibillion parameter models finetuned on 600k in-domain training examples. The best model, T5, writes advice that is at least as helpful as human-written advice in only 14% of cases; a much larger non-finetunable GPT3 model does even worse at 4%. This low performance reveals language understanding errors that are hard to spot outside of a generative setting, showing much room for progress.", "venue": "NAACL", "year": 2021, "referenceCount": 54, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-06-01", "journal": {"pages": "4856-4880"}, "authors": [{"authorId": "2545335", "name": "Rowan Zellers"}, {"authorId": "14487640", "name": "Ari Holtzman"}, {"authorId": "40684993", "name": "Elizabeth Clark"}, {"authorId": "3444092", "name": "Lianhui Qin"}, {"authorId": "143787583", "name": "Ali Farhadi"}, {"authorId": "1699545", "name": "Yejin Choi"}]}, {"paperId": "3bc02208bcd58f664246e2387bc3b748118904d7", "externalIds": {"MAG": "3135766362", "DOI": "10.1016/J.RESCONREC.2021.105543", "CorpusId": 233545910}, "url": "https://www.semanticscholar.org/paper/3bc02208bcd58f664246e2387bc3b748118904d7", "title": "Computer Vision Based Two-stage Waste Recognition-Retrieval Algorithm for Waste Classification", "abstract": null, "venue": "", "year": 2021, "referenceCount": 42, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-01", "journal": {"volume": "169", "pages": "105543", "name": "Resources Conservation and Recycling"}, "authors": [{"authorId": "2108965373", "name": "Song Zhang"}, {"authorId": "2109307160", "name": "Yumiao Chen"}, {"authorId": "2047089622", "name": "Zhongliang Yang"}, {"authorId": "8727191", "name": "H. Gong"}]}, {"paperId": "33e5fe4fe223f2fb5cc87ec488daad6dce3edc7a", "externalIds": {"MAG": "3171468176", "DOI": "10.1007/S10672-021-09377-Z", "CorpusId": 236424673}, "url": "https://www.semanticscholar.org/paper/33e5fe4fe223f2fb5cc87ec488daad6dce3edc7a", "title": "Legal and Ethical Challenges for HR in Machine Learning", "abstract": null, "venue": "Employee Responsibilities and Rights Journal", "year": 2021, "referenceCount": 36, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-31", "journal": {"volume": "34", "pages": "19-39", "name": "Employee Responsibilities and Rights Journal"}, "authors": [{"authorId": "2059032485", "name": "R. H. Hamilton"}, {"authorId": "50196351", "name": "H. K. Davison"}]}, {"paperId": "d7d057ee6a9048b6e230c3e233432ab94d18c3e7", "externalIds": {"MAG": "3168957553", "DOI": "10.21810/JICW.V4I1.2566", "CorpusId": 236411724}, "url": "https://www.semanticscholar.org/paper/d7d057ee6a9048b6e230c3e233432ab94d18c3e7", "title": "Why HAL 9000 is not the future of intelligence analysis", "abstract": "Intelligence analysis is a core function of the intelligence process, and its goal is to synthesize reliable information to assist decision-makers to take a course of action toward an uncertain future. There is no escape from uncertainty, friction, and the fog of war. Since the dawn of human history, the present moment has been experienced as unpredictable, and the challenge of determining the right future through sound decisions has always existed. Investing in new technology, continually touted as the answer for analytic troubles, seems far less difficult in the short run than trying to find consensus about a long-term vision. It is easier to develop a nuclear missile, for example, than to give a universal definition of peace, and this is what the history of the XX century was all about. While intelligence analysis is still a necessary tool for decision-makers, it is unclear who or what will perform this function in the future. Though the solution cannot be only technological, the current trajectory tells a different story whereby the human analysts are removed from their central position to make way for Artificial Intelligence. What one can reasonably ask of an officer is that he should possess a standard of judgment, which he can gain only from knowledge of men and affairs and from common sense. Carl Von Clausewitz \u2013 On War HAL: Let me put it this way, Mr. Amor. The 9000 series is the most reliable computer ever made. No 9000 computer has ever made a mistake or distorted information. We are all, by any practical definition of the words, foolproof and incapable of error. Stanley Kubrick \u2013 2001 \u2013 A Space Odyssey", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-31", "journal": {"volume": "4", "pages": "40-60", "name": ""}, "authors": [{"authorId": "113670294", "name": "G. Pili"}]}, {"paperId": "13bd12875db0785b9499de2714e49cdb4553ffbf", "externalIds": {"MAG": "3166684973", "DOI": "10.32628/CSEIT217382", "CorpusId": 236422298}, "url": "https://www.semanticscholar.org/paper/13bd12875db0785b9499de2714e49cdb4553ffbf", "title": "Review on Robotic Machine to Solve the Matrix with Natural Language Processing and Image Processing", "abstract": "As the world is moving faster, humans are not taking a step back to make the world more better place, may it be by enhanced technology or extreme creativity. We know that a human life now is full of technology and every little thing is just a click away that is the favour of automation for everything. If we explore Automation more, the major concepts which will still the spotlight are Artificial Intelligent (AI), Machine Learning (ML) and the list will continue. The other concept which steals the limelight and make every automation possible is the programming language we use to make the features we are now using possible. The language which is exponentially gaining fame is Python. If all the above mentioned technology is combined together, we get most of the automation possible today. At every corner of the world, this technology is being used to make things lively and possible. Not only companies but every industry (food, entertainment, education, manufacturers and many more) are relying on this technology. The calculation which plays a significant role in almost every bit is also being automated to make the things very simpler and quicker. Even though, we have calculator but it still cannot solve the problems which are needed to be solve in some platforms. In this paper, we shall be discussing about a similar concept.", "venue": "International Journal of Scientific Research in Computer Science, Engineering and Information Technology", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-05-30", "journal": {"name": "International Journal of Scientific Research in Computer Science, Engineering and Information Technology"}, "authors": [{"authorId": "134772948", "name": "Sonali Zunke"}, {"authorId": "2121165254", "name": "Sandesh Ukey"}, {"authorId": "2121198532", "name": "Dipak Mendhe"}]}, {"paperId": "8c9463950f8019368d6e6e6aa1dfe4b57262999b", "externalIds": {"DBLP": "journals/ccs/CrookC21", "MAG": "3169927403", "DOI": "10.1049/CCS2.12024", "CorpusId": 236402575}, "url": "https://www.semanticscholar.org/paper/8c9463950f8019368d6e6e6aa1dfe4b57262999b", "title": "The Anatomy of moral agency: A theological and neuroscience inspired model of virtue ethics", "abstract": "VirtuosA (\u2018virtuous algorithm\u2019) is introduced, a model in which artificial intelligence (AI) systems learn ethical behaviour based on a framework adapted from Christian philosopher Dallas Willard and brought together with associated neurobiological structures and broader systems thinking. To make the inquiry concrete, the authors present a simple example scenario that illustrates how a robot might acquire behaviour akin to the virtue of kindness that can be attributed to humans. References to philosophical work by Peter Sloterdijk help contextualise Willard\u2019s virtue ethics framework. The VirtuosA architecture can be implemented using state \u2010 of \u2010 the \u2010 art computing practices and plausibly redescribes several con-crete scenarios implemented from the computing literature and exhibits broad coverage relative to other work in ethical AI. Strategies are described for using the model for systems evaluation \u2014particularly the role of \u2018embedded evaluation\u2019 within the system\u2014and its broader application as a meta \u2010 ethical device is discussed.", "venue": "Cognitive Computation and Systems", "year": 2021, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-30", "journal": {"volume": "3", "pages": "109-122", "name": "Cogn. Comput. Syst."}, "authors": [{"authorId": "143902642", "name": "N. Crook"}, {"authorId": "1829225", "name": "J. Corneli"}]}, {"paperId": "c435bf5339e882ac4a1b578e7c43e6680e2ddcd2", "externalIds": {"DOI": "10.1016/j.aca.2021.338403", "CorpusId": 233398983, "PubMed": "33896558"}, "url": "https://www.semanticscholar.org/paper/c435bf5339e882ac4a1b578e7c43e6680e2ddcd2", "title": "Taking the leap between analytical chemistry and artificial intelligence: A tutorial review.", "abstract": null, "venue": "Analytica Chimica Acta", "year": 2021, "referenceCount": 213, "citationCount": 31, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-05-29", "journal": {"volume": "1161", "pages": "\n 338403\n ", "name": "Analytica chimica acta"}, "authors": [{"authorId": "1854804642", "name": "Lucas B Ayres"}, {"authorId": "14202912", "name": "F. Gomez"}, {"authorId": "153882913", "name": "Jeb Linton"}, {"authorId": "77218025", "name": "M. F. Silva"}, {"authorId": "67013943", "name": "Carlos D. Garcia"}]}, {"paperId": "27bd1862d6656327890fef4f295345ea5f4ac1fd", "externalIds": {"MAG": "3162926692", "DOI": "10.1002/pssr.202100125", "CorpusId": 236362886}, "url": "https://www.semanticscholar.org/paper/27bd1862d6656327890fef4f295345ea5f4ac1fd", "title": "Multistate Magnetic Domain Wall Devices for Neuromorphic Computing", "abstract": "In recent years, neuromorphic computing has been intensively investigated, to take over the conventional or von Neumann scheme. Herein, the advantages of memristors as neurons and synapses are discussed. After a brief introduction to biological neurons and synapses, focus is put on spin\u2010based devices, including magnetic tunnel junction (MTJ) and domain wall devices. Certain materials and device designs aim at mimicking synapses\u2019 functionality, whereas others gather both neurons and synapses. The advancements in spin\u2010based memory applications are of great advantage for neuromorphic computing and their implementation is presented herein.", "venue": "physica status solidi (RRL) \u2013 Rapid Research Letters", "year": 2021, "referenceCount": 95, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-27", "journal": {"volume": "15", "name": "physica status solidi (RRL) \u2013 Rapid Research Letters"}, "authors": [{"authorId": "5644942", "name": "R. Sbiaa"}]}, {"paperId": "5d1311d43086a9abc01e3faa94da9f126402079b", "externalIds": {"MAG": "3168055587", "DOI": "10.1002/wat2.1533", "CorpusId": 236340567}, "url": "https://www.semanticscholar.org/paper/5d1311d43086a9abc01e3faa94da9f126402079b", "title": "Machine learning for hydrologic sciences: An introductory overview", "abstract": "The hydrologic community has experienced a surge in interest in machine learning in recent years. This interest is primarily driven by rapidly growing hydrologic data repositories, as well as success of machine learning in various academic and commercial applications, now possible due to increasing accessibility to enabling hardware and software. This overview is intended for readers new to the field of machine learning. It provides a non\u2010technical introduction, placed within a historical context, to commonly used machine learning algorithms and deep learning architectures. Applications in hydrologic sciences are summarized next, with a focus on recent studies. They include the detection of patterns and events such as land use change, approximation of hydrologic variables and processes such as rainfall\u2010runoff modeling, and mining relationships among variables for identifying controlling factors. The use of machine learning is also discussed in the context of integrated with process\u2010based modeling for parameterization, surrogate modeling, and bias correction. Finally, the article highlights challenges of extrapolating robustness, physical interpretability, and small sample size in hydrologic applications.", "venue": "WIREs Water", "year": 2021, "referenceCount": 228, "citationCount": 18, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-05-27", "journal": {"volume": "8", "name": "Wiley Interdisciplinary Reviews: Water"}, "authors": [{"authorId": "2569873", "name": "Tianfang Xu"}, {"authorId": "34212044", "name": "F. Liang"}]}, {"paperId": "61b265b5a07bb563c2072e20ba22d3b9cdb95bc0", "externalIds": {"DBLP": "journals/ais/MontemayorHF22", "PubMedCentral": "8149918", "DOI": "10.1007/s00146-021-01230-z", "CorpusId": 235212774, "PubMed": "34054228"}, "url": "https://www.semanticscholar.org/paper/61b265b5a07bb563c2072e20ba22d3b9cdb95bc0", "title": "In principle obstacles for empathic AI: why we can\u2019t replace human empathy in healthcare", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 30, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-26", "journal": {"volume": "37", "pages": "1353 - 1359", "name": "Ai & Society"}, "authors": [{"authorId": "144520696", "name": "Carlos Montemayor"}, {"authorId": "114115029", "name": "J. Halpern"}, {"authorId": "30203426", "name": "A. Fairweather"}]}, {"paperId": "73e80d83569326b15bbe75b1963b327fd7db18b9", "externalIds": {"MAG": "3169223448", "DOI": "10.3390/APP11114853", "CorpusId": 236331947}, "url": "https://www.semanticscholar.org/paper/73e80d83569326b15bbe75b1963b327fd7db18b9", "title": "Contextual Information Helps Understand Messages Written with Textisms", "abstract": "The present study investigated the influence of the use of textisms, a form of written language used in phone-mediated conversations, on the cognitive cost of French participants in an online conversation. Basing our thinking on the relevance theory of Sperber and Wilson, we tried to assess whether knowing the context and topic of a conversation can produce a significant decrease in the cognitive cost required to read messages written in textism by giving additional clues to help infer the meaning of these messages. In order to do so, participants played the judges in a Turing test between a normal conversation (written with the traditional writing style) and a conversation in which the experimenter was conversing with textisms, in a random order. The results indicated that participants answered messages written in textism faster when they were in the second conversation. We concluded that prior knowledge about the conversation can help interpret the messages written in textisms by decreasing the cognitive cost required to infer their meaning.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-25", "journal": {"volume": "11", "pages": "4853", "name": "Applied Sciences"}, "authors": [{"authorId": "51197903", "name": "Baptiste Jacquet"}, {"authorId": "2120875336", "name": "Caline Jaraud"}, {"authorId": "47778763", "name": "Frank Jamet"}, {"authorId": "6617893", "name": "S. Gu\u00e9raud"}, {"authorId": "1779633", "name": "Jean Baratgin"}]}, {"paperId": "33ee7e223680001cda57ecf313eb6b07d86c92ef", "externalIds": {"MAG": "3164280995", "DOI": "10.1080/00423114.2021.1930070", "CorpusId": 236391220}, "url": "https://www.semanticscholar.org/paper/33ee7e223680001cda57ecf313eb6b07d86c92ef", "title": "Identification and modelling of race driving styles", "abstract": "A good understanding and modelling of the human driver is essential for modern vehicle development, particularly in motorsports, where the race car should fit its driver perfectly. At the same time, an objective assessment and especially imitation of professional race drivers is difficult due to individual driving styles, complex and non-deterministic decision making processes, and small stability margins. In this paper, we present a holistic approach to identify and model individual race driving styles in a robust way. We develop the Driver Identification and Metric Ranking Algorithm (DIMRA) as a data-based method for an in-depth objective analysis and assessment of professional race drivers. Supported by this knowledge, we extend and adapt the imitation learning framework Probabilistic Modeling of Driver Behavior (ProMoD) in order to model race drivers in a complex simulation environment. An evaluation with data from professional race drivers shows the capability of DIMRA to derive metrics which describe human race driving styles, as well as ProMoD to robustly generate competitive laps with human-like controls in a professional motorsport driving simulator. The ability to identify and imitate individual driving styles does not only support the performance optimisation of race cars but could also aid the development of road cars and driver assistance systems in future work.", "venue": "Vehicle System Dynamics", "year": 2021, "referenceCount": 28, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-25", "journal": {"volume": "60", "pages": "2890 - 2918", "name": "Vehicle System Dynamics"}, "authors": [{"authorId": "1490762849", "name": "Stefan L\u00f6ckel"}, {"authorId": "2121112191", "name": "Andr\u00e9 Kretschi"}, {"authorId": "2095574518", "name": "Peter van Vliet"}, {"authorId": "145197867", "name": "Jan Peters"}]}, {"paperId": "ace5e1d171f80181cd3fdecccd88d6a0ab89e0e0", "externalIds": {"DBLP": "journals/corr/abs-2105-11977", "CorpusId": 235186970}, "url": "https://www.semanticscholar.org/paper/ace5e1d171f80181cd3fdecccd88d6a0ab89e0e0", "title": "Towards Teachable Autonomous Agents", "abstract": "Autonomous discovery and direct instruction are two extreme sources of learning in children, but educational sciences have shown that intermediate approaches such as assisted discovery or guided play resulted in better acquisition of skills. When turning to Artificial Intelligence, the above dichotomy can be translated into the distinction between autonomous agents, which learn in isolation from their own signals, and interactive learning agents which can be taught by social partners but generally lack autonomy. In between should stand teachable autonomous agents: agents that learn from both internal and teaching signals to benefit from the higher efficiency of assisted discovery processes. Designing such agents could result in progress in two ways. First, very concretely, it would offer a way to non-expert users in the real world to drive the learning behavior of agents towards their expectations. Second, more fundamentally, it might be a key step to endow agents with the necessary capabilities to reach general intelligence. The purpose of this paper is to elucidate the key obstacles standing in the way towards the design of such agents. We proceed in four steps. First, we build on a seminal work of Bruner to extract relevant features of the assisted discovery processes happening between a child and a tutor. Second, we highlight how current research on intrinsically motivated agents is paving the way towards teachable and autonomous agents. In particular, we focus on autotelic agents, i.e. agents equipped with forms of intrinsic motivations that enable them to represent, self-generate and pursue their own goals. We argue that such autotelic capabilities from the learner side are key in the discovery process. Third, we adopt a social learning perspective on the interaction between a tutor and a learner to highlight some components that are currently missing to these agents before they can be taught by ordinary people using natural pedagogy. Finally, we provide a list of specific research questions that emerge from the perspective of extending these agents with assisted learning capabilities.", "venue": "ArXiv", "year": 2021, "referenceCount": 184, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "abs/2105.11977", "name": "ArXiv"}, "authors": [{"authorId": "97009622", "name": "Olivier Sigaud"}, {"authorId": "2105163700", "name": "Hugo Caselles-Dupr'e"}, {"authorId": "102281182", "name": "C\u00e9dric Colas"}, {"authorId": "1748962255", "name": "Ahmed Akakzia"}, {"authorId": "1720664", "name": "P. Oudeyer"}, {"authorId": "1680828", "name": "M. Chetouani"}]}, {"paperId": "11542e0d7dc0de8af1bde32131400ccc2a0a2815", "externalIds": {"ArXiv": "2105.11977", "CorpusId": 247155190}, "url": "https://www.semanticscholar.org/paper/11542e0d7dc0de8af1bde32131400ccc2a0a2815", "title": "Towards Teachable Autotelic Agents", "abstract": "Autonomous discovery and direct instruction are two distinct sources of learning in children but education sciences demonstrate that mixed approaches such as assisted discovery or guided play result in improved skill acquisition. In the field of Artificial Intelligence, these extremes respectively map to autonomous agents learning from their own signals and interactive learning agents fully taught by their teachers. In between should stand teachable autonomous agents (TAA): agents that learn from both internal and teaching signals to benefit from the higher efficiency of assisted discovery. Designing such agents will enable real-world non-expert users to orient the learning trajectories of agents towards their expectations. More fundamentally, this may also be a key step to build agents with human-level intelligence. This paper presents a roadmap towards the design of teachable autonomous agents. Building on developmental psychology and education sciences, we start by identifying key features enabling assisted discovery processes in child-tutor interactions. This leads to the production of a checklist of features that future TAAs will need to demonstrate. The checklist allows us to precisely pinpoint the various limitations of current reinforcement learning agents and to identify the promising first steps towards TAAs. It also shows the way forward by highlighting key research directions towards the design or autonomous agents that can be taught by ordinary people via natural pedagogy.", "venue": "", "year": 2021, "referenceCount": 133, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-25", "journal": null, "authors": [{"authorId": "97009622", "name": "Olivier Sigaud"}, {"authorId": "1748962255", "name": "Ahmed Akakzia"}, {"authorId": "2105163700", "name": "Hugo Caselles-Dupr'e"}, {"authorId": "102281182", "name": "C\u00e9dric Colas"}, {"authorId": "1720664", "name": "P. Oudeyer"}, {"authorId": "1680828", "name": "M. Chetouani"}]}, {"paperId": "9d738b480f4f3dec46bb58521c672b9373911e4e", "externalIds": {"PubMedCentral": "8149775", "DOI": "10.1186/s11671-021-03551-w", "CorpusId": 235173606, "PubMed": "34032946"}, "url": "https://www.semanticscholar.org/paper/9d738b480f4f3dec46bb58521c672b9373911e4e", "title": "2D Semiconductor Nanomaterials and Heterostructures: Controlled Synthesis and Functional Applications", "abstract": null, "venue": "Nanoscale Research Letters", "year": 2021, "referenceCount": 202, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-05-25", "journal": {"volume": "16", "name": "Nanoscale Research Letters"}, "authors": [{"authorId": "47995337", "name": "Hongyan Xu"}, {"authorId": "47202279", "name": "M. Akbari"}, {"authorId": "5561281", "name": "S. Zhuiykov"}]}, {"paperId": "634345dba75c2740fe1595c9814d69e601223090", "externalIds": {"DBLP": "journals/complexity/ChaoTW21", "DOI": "10.1155/2021/5511866", "CorpusId": 235496227}, "url": "https://www.semanticscholar.org/paper/634345dba75c2740fe1595c9814d69e601223090", "title": "Emerging Technologies of Natural Language-Enabled Chatbots: A Review and Trend Forecast Using Intelligent Ontology Extraction and Patent Analytics", "abstract": "Natural language processing (NLP) is a critical part of the digital transformation. NLP enables user-friendly interactions between machine and human by making computers understand human languages. Intelligent chatbot is an essential application of NLP to allow understanding of users\u2019 utterance and responding in understandable sentences for specific applications simulating human-to-human conversations and interactions for problem solving or Q&As. This research studies emerging technologies for NLP-enabled intelligent chatbot development using a systematic patent analytic approach. Some intelligent text-mining techniques are applied, including document term frequency analysis for key terminology extractions, clustering method for identifying the subdomains, and Latent Dirichlet Allocation for finding the key topics of patent set. This research utilizes the Derwent Innovation database as the main source for global intelligent chatbot patent retrievals.", "venue": "Complex", "year": 2021, "referenceCount": 79, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-24", "journal": {"volume": "2021", "pages": "5511866:1-5511866:26", "name": "Complex."}, "authors": [{"authorId": "121915306", "name": "M.-H. Chao"}, {"authorId": "1761458", "name": "A. Trappey"}, {"authorId": "2118840756", "name": "Chunwang Wu"}]}, {"paperId": "9fa54bdd98ea77950e1d666cb2e158caaff3c7ea", "externalIds": {"DOI": "10.1093/neuros/nyab170", "CorpusId": 235074752, "PubMed": "34015816"}, "url": "https://www.semanticscholar.org/paper/9fa54bdd98ea77950e1d666cb2e158caaff3c7ea", "title": "Machine Learning and Artificial Intelligence in Neurosurgery: Status, Prospects, and Challenges.", "abstract": "is the application of specific data-mining methods for pattern discovery and extraction.\u201d 55,56", "venue": "Neurosurgery", "year": 2021, "referenceCount": 95, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-20", "journal": {"name": "Neurosurgery"}, "authors": [{"authorId": "4523139", "name": "T. Dagi"}, {"authorId": "12620660", "name": "F. Barker"}, {"authorId": "3776554", "name": "Jacob L Glass"}]}, {"paperId": "d95db65444615528fb56395a4bb01048570cc1cf", "externalIds": {"DBLP": "journals/corr/abs-2105-09637", "ArXiv": "2105.09637", "CorpusId": 234790236}, "url": "https://www.semanticscholar.org/paper/d95db65444615528fb56395a4bb01048570cc1cf", "title": "Navigation Turing Test (NTT): Learning to Evaluate Human-Like Navigation", "abstract": "A key challenge on the path to developing agents that learn complex human-like behavior is the need to quickly and accurately quantify humanlikeness. While human assessments of such behavior can be highly accurate, speed and scalability are limited. We address these limitations through a novel automated Navigation Turing Test (ANTT) that learns to predict human judgments of human-likeness. We demonstrate the effectiveness of our automated NTT on a navigation task in a complex 3D environment. We investigate six classification models to shed light on the types of architectures best suited to this task, and validate them against data collected through a human NTT. Our best models achieve high accuracy when distinguishing true human and agent behavior. At the same time, we show that predicting finer-grained human assessment of agents\u2019 progress towards human-like behavior remains unsolved. Our work takes an important step towards agents that more effectively learn complex human-like behavior.", "venue": "ICML", "year": 2021, "referenceCount": 36, "citationCount": 10, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-05-20", "journal": {"pages": "2644-2653"}, "authors": [{"authorId": "1693696", "name": "Sam Devlin"}, {"authorId": "2099584262", "name": "Raluca Georgescu"}, {"authorId": "1990422", "name": "I. Momennejad"}, {"authorId": "1393020942", "name": "Jaroslaw Rzepecki"}, {"authorId": "2099584476", "name": "Evelyn Zuniga"}, {"authorId": "2099584169", "name": "Gavin Costello"}, {"authorId": "1882823652", "name": "Guy Leroy"}, {"authorId": "2052352179", "name": "A. Shaw"}, {"authorId": "1380228856", "name": "Katja Hofmann"}]}, {"paperId": "cf2a580f659e71e52b315eb89173d489cd23e710", "externalIds": {"MAG": "3162441579", "DBLP": "journals/firai/LinSDMBM21", "PubMedCentral": "8172185", "DOI": "10.3389/frobt.2021.579993", "CorpusId": 234773545, "PubMed": "34095237"}, "url": "https://www.semanticscholar.org/paper/cf2a580f659e71e52b315eb89173d489cd23e710", "title": "Parental Acceptance of Children\u2019s Storytelling Robots: A Projection of the Uncanny Valley of AI", "abstract": "Parent\u2013child story time is an important ritual of contemporary parenting. Recently, robots with artificial intelligence (AI) have become common. Parental acceptance of children\u2019s storytelling robots, however, has received scant attention. To address this, we conducted a qualitative study with 18 parents using the research technique design fiction. Overall, parents held mixed, though generally positive, attitudes toward children\u2019s storytelling robots. In their estimation, these robots would outperform screen-based technologies for children\u2019s story time. However, the robots\u2019 potential to adapt and to express emotion caused some parents to feel ambivalent about the robots, which might hinder their adoption. We found three predictors of parental acceptance of these robots: context of use, perceived agency, and perceived intelligence. Parents\u2019 speculation revealed an uncanny valley of AI: a nonlinear relation between the human likeness of the artificial agent\u2019s mind and affinity for the agent. Finally, we consider the implications of children\u2019s storytelling robots, including how they could enhance equity in children\u2019s access to education, and propose directions for research on their design to benefit family well-being.", "venue": "Frontiers in Robotics and AI", "year": 2021, "referenceCount": 147, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Psychology", "Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-19", "journal": {"volume": "8", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "10203338", "name": "Chaolan Lin"}, {"authorId": "1746316", "name": "S. \u0160abanovi\u0107"}, {"authorId": "70072640", "name": "L. Dombrowski"}, {"authorId": "144126331", "name": "Andrew D. Miller"}, {"authorId": "145521690", "name": "Erin L. Brady"}, {"authorId": "1690354", "name": "K. Macdorman"}]}, {"paperId": "03c858ff9751cc33a4b32608a63fd310f5843d42", "externalIds": {"DBLP": "journals/aisy/ShafferDTSDNGIC21", "MAG": "3161538890", "DOI": "10.1002/aisy.202100016", "CorpusId": 236351018}, "url": "https://www.semanticscholar.org/paper/03c858ff9751cc33a4b32608a63fd310f5843d42", "title": "Self\u2010Programming Synaptic Resistor Circuit for Intelligent Systems", "abstract": "Unlike artificial intelligent systems based on computers which have to be programmed for specific tasks, the human brain \u201cself\u2010programs\u201d in real time to create new tactics and adapt to arbitrary environments. Computers embedded in artificial intelligent systems execute arbitrary signal\u2010processing algorithms to outperform humans at specific tasks, but without the real\u2010time self\u2010programming functionality, they are preprogrammed by humans, fail in unpredictable environments beyond their preprogrammed domains, and lack general intelligence in arbitrary environments. Herein, a synaptic resistor circuit that self\u2010programs in arbitrary and unpredictable environments in real time is demonstrated. By integrating the synaptic signal processing, memory, and correlative learning functions in each synaptic resistor, the synaptic resistor circuit processes signals and self\u2010programs the circuit concurrently in real time with an energy efficiency about six orders higher than those of computers. In comparison with humans and a preprogrammed computer, the self\u2010programming synaptic resistor circuit dynamically modifies its algorithm to control a morphing wing in an unpredictable aerodynamic environment to improve its performance function with superior self\u2010programming speeds and accuracy. The synaptic resistor circuits potentially circumvent the fundamental limitations of computers, leading to a new intelligent platform with real\u2010time self\u2010programming functionality for artificial general intelligence.", "venue": "Adv. Intell. Syst.", "year": 2021, "referenceCount": 28, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-18", "journal": {"volume": "3", "name": "Advanced Intelligent Systems"}, "authors": [{"authorId": "2064587931", "name": "Christopher M. Shaffer"}, {"authorId": "2120970339", "name": "Atharva Deo"}, {"authorId": "1644001317", "name": "Andrew Tudor"}, {"authorId": "2120987164", "name": "Rahul Shenoy"}, {"authorId": "15893281", "name": "Cameron D. Danesh"}, {"authorId": "2120971756", "name": "Dhruva Nathan"}, {"authorId": "41021502", "name": "Lawren L. Gamble"}, {"authorId": "144878341", "name": "D. Inman"}, {"authorId": "2144257643", "name": "Yong Chen"}]}, {"paperId": "26daa0d1e8a6acc02843eac53342affb4e92bd2a", "externalIds": {"DOI": "10.1016/j.apergo.2021.103428", "CorpusId": 235093104, "PubMed": "34020096"}, "url": "https://www.semanticscholar.org/paper/26daa0d1e8a6acc02843eac53342affb4e92bd2a", "title": "What driving style makes pedestrians think a passing vehicle is driving automatically?", "abstract": null, "venue": "Applied ergonomics", "year": 2021, "referenceCount": 42, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-18", "journal": {"volume": "95", "pages": "\n 103428\n ", "name": "Applied ergonomics"}, "authors": [{"authorId": "3056418", "name": "P. Bazilinskyy"}, {"authorId": "2061603581", "name": "Tsuyoshi Sakuma"}, {"authorId": "143801403", "name": "J. D. de Winter"}]}, {"paperId": "89507a5ae7d81ca25a93cd0dd2de93786d21cf0d", "externalIds": {"DBLP": "journals/corr/abs-2105-07426", "ArXiv": "2105.07426", "CorpusId": 234742327}, "url": "https://www.semanticscholar.org/paper/89507a5ae7d81ca25a93cd0dd2de93786d21cf0d", "title": "Curiosity-driven Intuitive Physics Learning", "abstract": "Biological infants are naturally curious and try to comprehend their physical surroundings by interacting, in myriad multisensory ways, with different objects primarily macroscopic solid objects around them. Through their various interactions, they build hypotheses and predictions, and eventually learn, infer and understand the nature of the physical characteristics and behavior of these objects. Inspired thus, we propose a model for curiosity-driven learning and inference for real-world AI agents. This model is based on the arousal of curiosity, deriving from observations along discontinuities in the fundamental macroscopic solid-body physics parameters, i.e., shape constancy, spatial-temporal continuity, and object permanence. We use the term \u2019body-budget\u2019 to represent the perceived fundamental properties of solid objects. The model aims to support the emulation of learning from scratch followed by substantiation through experience, irrespective of domain, in real-world AI agents.", "venue": "ArXiv", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-16", "journal": {"volume": "abs/2105.07426", "name": "ArXiv"}, "authors": [{"authorId": "72260732", "name": "T. Gaikwad"}, {"authorId": "152803617", "name": "Romi Banerjee"}]}, {"paperId": "658e265dc2aacc8c03d9b9b3e8de732b3ba0a9dc", "externalIds": {"DOI": "10.1097/MOU.0000000000000888", "CorpusId": 234596003, "PubMed": "33989231"}, "url": "https://www.semanticscholar.org/paper/658e265dc2aacc8c03d9b9b3e8de732b3ba0a9dc", "title": "Artificial intelligence in functional urology: how it may shape the future", "abstract": "Purpose of review The aim of the present manuscript is to provide an overview on the current state of artificial intelligence (AI) tools in either decision making, diagnosis, treatment options, or outcome prediction in functional urology. Recent findings Several recent studies have shed light on the promising potential of AI in functional urology to investigate lower urinary tract dysfunction pathophysiology but also as a diagnostic tool by enhancing the existing evaluations such as dynamic magnetic resonance imaging or urodynamics. AI may also improve surgical education and training because of its automated performance metrics recording. By bringing prediction models, AI may also have strong therapeutic implications in the field of functional urology in the near future. AI may also be implemented in innovative devices such as e-bladder diary and electromechanical artificial urinary sphincter and could facilitate the development of remote medicine. Summary Over the past decade, the enthusiasm for AI has been rising exponentially. Machine learning was well known, but the increasing power of processors and the amount of data available has provided the platform for deep learning tools to expand. Although the literature on the applications of AI technology in the field of functional urology is relatively sparse, its possible uses are countless especially in surgical training, imaging, urodynamics, and innovative devices.", "venue": "Current opinion in urology", "year": 2021, "referenceCount": 40, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-14", "journal": {"volume": "31", "pages": "385 - 390", "name": "Current Opinion in Urology"}, "authors": [{"authorId": "1392748237", "name": "I. Bentellis"}, {"authorId": "1654186457", "name": "S. Guerin"}, {"authorId": "23957166", "name": "Z. Khene"}, {"authorId": "3682535", "name": "R. Khavari"}, {"authorId": "7422423", "name": "B. Peyronnet"}]}, {"paperId": "277791b11911281e61ba5f03401222c40f4886a4", "externalIds": {"PubMedCentral": "8378075", "MAG": "3161861567", "DOI": "10.1093/ijnp/pyab026", "CorpusId": 234494831, "PubMed": "33987652"}, "url": "https://www.semanticscholar.org/paper/277791b11911281e61ba5f03401222c40f4886a4", "title": "Psychedelics and Consciousness: Distinctions, Demarcations, and Opportunities", "abstract": "Abstract Psychedelic substances produce unusual and compelling changes in conscious experience that have prompted some to propose that psychedelics may provide unique insights explaining the nature of consciousness. At present, psychedelics, like other current scientific tools and methods, seem unlikely to provide information relevant to the so-called \u201chard problem of consciousness,\u201d which involves explaining how first-person experience can emerge. However, psychedelics bear on multiple \u201ceasy problems of consciousness,\u201d which involve relations between subjectivity, brain function, and behavior. In this review, we discuss common meanings of the term \u201cconsciousness\u201d when used with regard to psychedelics and consider some models of the effects of psychedelics on the brain that have also been associated with explanatory claims about consciousness. We conclude by calling for epistemic humility regarding the potential for psychedelic research to aid in explaining the hard problem of consciousness while pointing to ways in which psychedelics may advance the study of many specific aspects of consciousness.", "venue": "International Journal of Neuropsychopharmacology", "year": 2021, "referenceCount": 117, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Psychology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-14", "journal": {"volume": "24", "pages": "615 - 623", "name": "International Journal of Neuropsychopharmacology"}, "authors": [{"authorId": "5363547", "name": "D. Yaden"}, {"authorId": "35226727", "name": "Matthew W. Johnson"}, {"authorId": "2789716", "name": "R. Griffiths"}, {"authorId": "7172865", "name": "Manoj K. Doss"}, {"authorId": "1401828924", "name": "A. Garcia-Romeu"}, {"authorId": "2033101427", "name": "Sandeep M. Nayak"}, {"authorId": "2092037431", "name": "Natalie Gukasayan"}, {"authorId": "3149724", "name": "B. Mathur"}, {"authorId": "2092040460", "name": "Fredrick S Barrett"}]}, {"paperId": "765f5486528b33b28b4852efa34a0be3e7e1212d", "externalIds": {"DBLP": "journals/corr/abs-2105-05571", "ArXiv": "2105.05571", "CorpusId": 234469842}, "url": "https://www.semanticscholar.org/paper/765f5486528b33b28b4852efa34a0be3e7e1212d", "title": "\"Alexa, what do you do for fun?\" Characterizing playful requests with virtual assistants", "abstract": "Virtual assistants such as Amazon\u2019s Alexa, Apple\u2019s Siri, Google Home, and Microsoft\u2019s Cortana, are becoming ubiquitous in our daily lives and successfully help users in various daily tasks, such as making phone calls or playing music. Yet, they still struggle with playful utterances, which are not meant to be interpreted literally. Examples include jokes or absurd requests or questions such as, \u201cAre you afraid of the dark?\u201d, \u201cWho let the dogs out?\u201d, or \u201cOrder a zillion gummy bears\u201d. Today, virtual assistants often return irrelevant answers to such utterances, except for hard-coded ones addressed by canned replies. To address the challenge of automatically detecting playful utterances, we first characterize the different types of playful human-virtual assistant interaction. We introduce a taxonomy of playful requests rooted in theories of humor and refined by analyzing real-world traffic from Alexa. We then focus on one node, personification, where users refer to the virtual assistant as a person (\u201cWhat do you do for fun?\u201d). Our conjecture is that understanding such utterances will improve user experience with virtual assistants. We conducted a Wizard-of-Oz user study and showed that endowing virtual assistants with the ability to identify humorous opportunities indeed has the potential to increase user satisfaction. We hope this work will contribute to the understanding of the landscape of the problem and inspire novel ideas and techniques towards the vision of giving virtual assistants a sense of humor.", "venue": "ArXiv", "year": 2021, "referenceCount": 47, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": "abs/2105.05571", "name": "ArXiv"}, "authors": [{"authorId": "1683047517", "name": "Cheng Shani"}, {"authorId": "40484877", "name": "Alex Libov"}, {"authorId": "2091417320", "name": "Sofia Tolmach"}, {"authorId": "1402943721", "name": "L. Lewin-Eytan"}, {"authorId": "1781257", "name": "Y. Maarek"}, {"authorId": "1805894", "name": "Dafna Shahaf"}]}, {"paperId": "d67760e3284f5347df8e50091fe56265a038de49", "externalIds": {"MAG": "3161136656", "DOI": "10.1071/CH20371", "CorpusId": 236584086}, "url": "https://www.semanticscholar.org/paper/d67760e3284f5347df8e50091fe56265a038de49", "title": "The Future of Retrosynthesis and Synthetic Planning: Algorithmic, Humanistic or the Interplay?", "abstract": "\nThe practice of deploying and teaching retrosynthesis is on the cusp of considerable change, which in turn forces practitioners and educators to contemplate whether this impending change will advance or erode the efficiency and elegance of organic synthesis in the future. A short treatise is presented herein that covers the concept of retrosynthesis, along with exemplified methods and theories, and an attempt to comprehend the impact of artificial intelligence in an era when freely and commercially available retrosynthetic and forward synthesis planning programs are increasingly prevalent. Will the computer ever compete with human retrosynthetic design and the art of organic synthesis?\n", "venue": "Australian Journal of Chemistry", "year": 2021, "referenceCount": 219, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-12", "journal": {"name": "Australian Journal of Chemistry"}, "authors": [{"authorId": "20100359", "name": "Craig M. Williams"}, {"authorId": "121971161", "name": "M. Dallaston"}]}, {"paperId": "d439c015ad2332a54cf479a6759fb2d7e2d16d19", "externalIds": {"MAG": "3162837094", "DOI": "10.18566/ESCR.V29N62.A09", "CorpusId": 236554329}, "url": "https://www.semanticscholar.org/paper/d439c015ad2332a54cf479a6759fb2d7e2d16d19", "title": "Ingenier\u00eda conceptual e innovaci\u00f3n te\u00f3rica: esbozo de un modelo", "abstract": "Todas las \u00e1reas del conocimiento se cimientan de diversas formas en una multiplicidad de productos derivados de la ingenier\u00eda conceptual. Este art\u00edculo tiene un esp\u00edritu program\u00e1tico: busca introducir un modelo del funcionamiento de la ingenier\u00eda conceptual y, en particular, de c\u00f3mo ocurre la innovaci\u00f3n conceptual en contextos de indagaci\u00f3n te\u00f3rica. En la primera secci\u00f3n, se describe el vecindario dial\u00e9ctico en que naci\u00f3 el estudio expl\u00edcito de la relevancia, el alcance, los mecanismos y los objetivos propios de la ingenier\u00eda conceptual. En la segunda secci\u00f3n, se introduce una distinci\u00f3n entre ingenier\u00eda conceptual evaluativa e ingenier\u00eda conceptual instrumental a partir de la distinci\u00f3n entre uso conceptual comprometido y uso conceptual instrumental. A partir de esto, se muestra que los casos descritos de ingenier\u00eda conceptual evaluativa y de ingenier\u00eda conceptual instrumental pueden ser formalmente entendidos como derivados de una misma funci\u00f3n, que, dado un problema conceptual, mapea soluciones conceptuales posibles para generar valores de \u00e9xito o de fracaso. En la siguiente secci\u00f3n, se introduce un tercer tipo de ingenier\u00eda conceptual: la ingenier\u00eda conceptual constructiva, cuyo n\u00facleo es una funci\u00f3n (de innovaci\u00f3n conceptual) que mapea soluciones dentro de un espacio representacional de alternativas no consideradas y genera nuevo contenido conceptual. El modelo introducido abre un campo fruct\u00edfero y novedoso de investigaci\u00f3n acerca de las condiciones y de los factores que dan lugar a la innovaci\u00f3n te\u00f3rica mediante la ingenier\u00eda conceptual.", "venue": "Escritos", "year": 2021, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-05-12", "journal": {"name": "Escritos"}, "authors": [{"authorId": "1405371534", "name": "C. Mu\u00f1oz-Su\u00e1rez"}]}, {"paperId": "5a74e329e99e70c44330feb1401fe6fb191f0bde", "externalIds": {"ArXiv": "2105.07879", "DBLP": "journals/corr/abs-2105-07879", "CorpusId": 234742567}, "url": "https://www.semanticscholar.org/paper/5a74e329e99e70c44330feb1401fe6fb191f0bde", "title": "Conscious AI", "abstract": "Recent advances in artificial intelligence (AI) have achieved human-scale speed and accuracy for classification tasks. In turn, these capabilities have made AI a viable replacement for many human activities that at their core involve classification, such as basic mechanical and analytical tasks in low-level service jobs. Current systems do not need to be conscious to recognize patterns and classify them. 1 However, for AI to progress to more complicated tasks requiring intuition and empathy, it must develop capabilities such as metathinking, creativity, and empathy akin to human self-awareness or consciousness. We contend that such a paradigm shift is possible only through a fundamental shift in the state of artificial intelligence toward consciousness, a shift similar to what took place for humans through the process of natural selection and evolution. As such, this paper aims to theoretically explore the requirements for the emergence of consciousness in AI. It also provides a principled understanding of how conscious AI can be detected and how it might be manifested in contrast to the dominant paradigm that seeks to ultimately create machines that are linguistically indistinguishable from humans.", "venue": "ArXiv", "year": 2021, "referenceCount": 95, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": "abs/2105.07879", "name": "ArXiv"}, "authors": [{"authorId": "1696563", "name": "H. Esmaeilzadeh"}, {"authorId": "2129191", "name": "R. Vaezi"}]}, {"paperId": "8264e83ddadad58d2a728a0a72c2c687bfd964d1", "externalIds": {"DOI": "10.1016/j.radonc.2021.05.003", "CorpusId": 234495563, "PubMed": "33984348"}, "url": "https://www.semanticscholar.org/paper/8264e83ddadad58d2a728a0a72c2c687bfd964d1", "title": "Metrics to evaluate the performance of auto-segmentation for radiation treatment planning: a critical review.", "abstract": null, "venue": "Radiotherapy and Oncology", "year": 2021, "referenceCount": 73, "citationCount": 40, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-05-10", "journal": {"name": "Radiotherapy and oncology : journal of the European Society for Therapeutic Radiology and Oncology"}, "authors": [{"authorId": "50584644", "name": "M. Sherer"}, {"authorId": "2092049425", "name": "D. Lin"}, {"authorId": "46433663", "name": "S. Elguindi"}, {"authorId": "50469532", "name": "S. Duke"}, {"authorId": "2448300", "name": "L. Tan"}, {"authorId": "3943093", "name": "J. Cacicedo"}, {"authorId": "4681781", "name": "M. Dahele"}, {"authorId": "145720720", "name": "E. Gillespie"}]}, {"paperId": "a39e88db75509ae36ffa66249107b53a48c39f86", "externalIds": {"DBLP": "journals/corr/abs-2105-03192", "ArXiv": "2105.03192", "DOI": "10.3233/AIC-201523", "CorpusId": 234093161}, "url": "https://www.semanticscholar.org/paper/a39e88db75509ae36ffa66249107b53a48c39f86", "title": "An interdisciplinary conceptual study of Artificial Intelligence (AI) for helping benefit-risk assessment practices: Towards a comprehensive qualification matrix of AI programs and devices (pre-print 2020)", "abstract": "This paper proposes a comprehensive analysis of existing concepts coming from different disciplines tackling the notion of intelligence, namely psychology and engineering, and from disciplines aiming to regulate AI innovations, namely AI ethics and law. The aim is to identify shared notions or discrepancies to consider for qualifying AI systems. Relevant concepts are integrated into a matrix intended to help defining more precisely when and how computing tools (programs or devices) may be qualified as AI while highlighting critical features to serve a specific technical, ethical and legal assessment of challenges in AI development. Some adaptations of existing notions of AI characteristics are proposed. The matrix is a risk-based conceptual model designed to allow an empirical, flexible and scalable qualification of AI technologies in the perspective of benefit-risk assessment practices, technological monitoring and regulatory compliance: it offers a structured reflection tool for stakeholders in AI development that are engaged in responsible research and innovation.Pre-print version (achieved on May 2020)", "venue": "AI Communications", "year": 2021, "referenceCount": 111, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-07", "journal": {"volume": "34", "pages": "121-146", "name": "AI Commun."}, "authors": [{"authorId": "83902507", "name": "Gauthier Chassang"}, {"authorId": "48065141", "name": "M. Thomsen"}, {"authorId": "2339680", "name": "P. Rumeau"}, {"authorId": "1804438", "name": "F. S\u00e8des"}, {"authorId": "2089773203", "name": "Alejandra Delfin"}]}, {"paperId": "6f743678030331481bce59b4f9e5d49eb5eba534", "externalIds": {"DBLP": "conf/chi/KimRMY21", "MAG": "3015588689", "DOI": "10.1145/3411764.3445579", "CorpusId": 216327176}, "url": "https://www.semanticscholar.org/paper/6f743678030331481bce59b4f9e5d49eb5eba534", "title": "Designers Characterize Naturalness in Voice User Interfaces: Their Goals, Practices, and Challenges", "abstract": "This work investigates the practices and challenges of voice user interface (VUI) designers. Existing VUI design guidelines recommend that designers strive for natural human-agent conversation. However, the literature leaves a critical gap regarding how designers pursue naturalness in VUIs and what their struggles are in doing so. Bridging this gap is necessary for identifying designers\u2019 needs and supporting them. Our interviews with 20 VUI designers identified 12 ways that designers characterize and approach naturalness in VUIs. We categorized these characteristics into three groupings based on the types of conversational context that each characteristic contributes to: Social, Transactional, and Core. Our results contribute new findings on designers\u2019 challenges, such as a design dilemma in augmenting task-oriented VUIs with social conversations, difficulties in writing for spoken language, lack of proper tool support for imbuing synthesized voice with expressivity, and implications for developing design tools and guidelines.", "venue": "CHI", "year": 2021, "referenceCount": 177, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": "2021-05-06", "journal": {"name": "Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"}, "authors": [{"authorId": "16215166", "name": "Yelim Kim"}, {"authorId": "32206132", "name": "Mohi Reza"}, {"authorId": "1713735", "name": "J. McGrenere"}, {"authorId": "2055005", "name": "Dongwook Yoon"}]}, {"paperId": "7bf7b215932caf7f17239babc7656126c4743df2", "externalIds": {"MAG": "3158113682", "DOI": "10.1080/09585192.2021.1897643", "CorpusId": 235571128}, "url": "https://www.semanticscholar.org/paper/7bf7b215932caf7f17239babc7656126c4743df2", "title": "Humanoid robot adoption and labour productivity: a perspective on ambidextrous product innovation routines", "abstract": "Abstract The increasing presence of humanoid robot adoption has generated a change in explorative and exploitative routines. If the explorative routines provoke creativity and critical thinking which are delivered by humans, exploitative routines induce repetitive actions and mimic activities which are executed by humanoids. This has raised the need for a better balance between both routines involving an ambidextrous dynamic process. Here, product innovations play a relevant role in enhancing such balance and labour productivity. If, from the conceptual standpoint, this phenomenon has already been explored, there is still the need to empirically analyse it. We thus offer a meso-analysis of twenty-four countries located in Europe through the lens of the Service Robot Deployment (SRD) Model and the conceptual lens of organizational ambidexterity. By a regression methodology, the results show that humanoid robot adoption is still not affecting labour productivity which, by contrast, is positively and significantly connected with both radically new and marginally modified/unchanged production of innovative routines. Our original contribution, which falls in the field of Human Resources Management and Artificial Intelligence, is that humanoids are not directly impacting labour productivity but indirectly through the generation of both new and marginally modified (or unchanged) routines. This situation persuades senior leaders to achieve a balance between exploitative and explorative product innovation routines. Supplemental data for this article is available online at https://doi.org/10.1080/09585192.2021.1897643 .", "venue": "International journal of human resources management", "year": 2021, "referenceCount": 115, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-05", "journal": {"volume": "33", "pages": "1098 - 1124", "name": "The International Journal of Human Resource Management"}, "authors": [{"authorId": "1738694223", "name": "M. Del Giudice"}, {"authorId": "97494986", "name": "V. Scuotto"}, {"authorId": "143746794", "name": "L. Ballestra"}, {"authorId": "1793214", "name": "M. Pironti"}]}, {"paperId": "39692df948172a319ca33434f27c213d99d941a2", "externalIds": {"ArXiv": "2105.02704", "DBLP": "journals/corr/abs-2105-02704", "CorpusId": 233864437}, "url": "https://www.semanticscholar.org/paper/39692df948172a319ca33434f27c213d99d941a2", "title": "AI Risk Skepticism", "abstract": "In this work, we survey skepticism regarding AI risk and show parallels with other types of scientific skepticism. We start by classifying different types of AI Risk skepticism and analyze their root causes. We conclude by suggesting some intervention approaches, which may be successful in reducing AI risk skepticism, at least amongst artificial intelligence researchers.", "venue": "ArXiv", "year": 2021, "referenceCount": 155, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-02", "journal": {"volume": "abs/2105.02704", "name": "ArXiv"}, "authors": [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "b780882adb7e806db2fb17ffcbd3cf9c5fde69a2", "externalIds": {"MAG": "3158235473", "DOI": "10.3390/APP11094151", "CorpusId": 235500143}, "url": "https://www.semanticscholar.org/paper/b780882adb7e806db2fb17ffcbd3cf9c5fde69a2", "title": "Using Formal Grammars as Musical Genome", "abstract": "In this paper, we explore a generative music method that can compose atonal and tonal music in different styles. One of the main differences between regular engineering problems and artistic expressions is that goals and constraints are usually ill-defined in the latter case; in fact the rules here could or should be transgressed more regularly. For this reason, our approach does not use a pre-existing dataset to imitate or extract rules from. Instead, it uses formal grammars as a representation method than can retain just the basic features, common to any form of music (e.g., the appearance of rhythmic patterns, the evolution of tone or dynamics during the composition, etc.). Exploring different musical spaces is the responsibility of a program interface that translates musical specifications into the fitness function of a genetic algorithm. This function guides the evolution of those basic features enabling the emergence of novel content. In this study, we then assess the outcome of a particular music specification (guitar ballad) in a controlled real-world setup. As a result, the generated music can be considered similar to human-composed music from a perceptual perspective. This endorses our approach to tackle arts algorithmically, as it is able to produce novel content that complies with human expectations.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 66, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"volume": "11", "pages": "4151", "name": "Applied Sciences"}, "authors": [{"authorId": "1403833959", "name": "D. Albarrac\u00edn-Molina"}, {"authorId": "4204454", "name": "A. Raglio"}, {"authorId": "1397159446", "name": "F. Rivas-Ru\u00edz"}, {"authorId": "144955542", "name": "F. Vico"}]}, {"paperId": "c26475ec8df2843def1ddc207b4a1920affe6e1a", "externalIds": {"MAG": "3162612648", "DOI": "10.1002/JSC.2404", "CorpusId": 236616410}, "url": "https://www.semanticscholar.org/paper/c26475ec8df2843def1ddc207b4a1920affe6e1a", "title": "Artificial intelligence and fintech: An overview of opportunities and risks for banking, investments, and microfinance", "abstract": null, "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 17, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-05-01", "journal": {"volume": "30", "pages": "211-222", "name": "Strategic Change"}, "authors": [{"authorId": "3229323", "name": "A. Ashta"}, {"authorId": "1970984", "name": "H. Herrmann"}]}, {"paperId": "eec0b12613bd5aaa6a2c9a4fc264e063aa028430", "externalIds": {"MAG": "3177442242", "DOI": "10.31590/ejosat.878552", "CorpusId": 237993421}, "url": "https://www.semanticscholar.org/paper/eec0b12613bd5aaa6a2c9a4fc264e063aa028430", "title": "DER\u0130N \u00d6\u011eRENME TEKN\u0130KLER\u0130 \u0130LE NESNE TESP\u0130T\u0130 VE TAK\u0130B\u0130 \u00dcZER\u0130NE B\u0130R \u0130NCELEME", "abstract": "Deep learning is one of the artificial intelligence approaches that has recently become popular for minimizing human error. Deep learning techniques have the ability to successfully detect and interpret with the use of large amounts of data in many areas. Especially, the rapid increase in labeled data accumulated in the field of image processing has made it necessary to turn to deep learning algorithms. With the increasing data in these areas, deep learning methods are used to separate useful information from big data and to give meaning to text, images and audio files. In recent years, there has been an increase in the studies conducted in the field of object detection and object tracking. If there is an object to be followed after detection and analysis on non-stationary images such as videos, it is more difficult to extract meaningful information. In such cases, the use of deep learning algorithms enables image processing problems to be solved easily. The aim of this study is to examine the applications of deep learning and object detection and tracking, to explain the latest developments, to help researchers who will work in this field by giving information about popular libraries, data sets, algorithms.", "venue": "European Journal of Science and Technology", "year": 2021, "referenceCount": 91, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"name": "European Journal of Science and Technology"}, "authors": [{"authorId": "2055882276", "name": "Fatma G\u00fcl\u015fah Tan"}, {"authorId": "2784903", "name": "Asim Sinan Y\u00fcksel"}, {"authorId": "120971069", "name": "Erdal Aydemir"}, {"authorId": "119633901", "name": "Mevl\u00fct Ersoy"}]}, {"paperId": "6486131db5480a974052c681ec26bcc4d5ab3a63", "externalIds": {"MAG": "3137849985", "DOI": "10.1016/J.TECHSOC.2021.101553", "CorpusId": 233575356}, "url": "https://www.semanticscholar.org/paper/6486131db5480a974052c681ec26bcc4d5ab3a63", "title": "The development of machine intelligence in a computational universe", "abstract": null, "venue": "", "year": 2021, "referenceCount": 125, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"volume": "65", "pages": "101553", "name": "Technology in Society"}, "authors": [{"authorId": "2874966", "name": "G. De Luca"}]}, {"paperId": "aa09779a42bc0241b389b86dee0675d3acb9aef6", "externalIds": {"DBLP": "journals/spm/Narwaria21", "DOI": "10.1109/MSP.2021.3050996", "CorpusId": 233435419}, "url": "https://www.semanticscholar.org/paper/aa09779a42bc0241b389b86dee0675d3acb9aef6", "title": "The Transition From White Box to Black Box: Challenges and Opportunities in Signal Processing Education", "abstract": "Modern engineering education is increasingly assuming an interdisciplinary character, where developments in one area almost invariably affect other areas. A prominent example is that of signal processing, which has undergone significant changes with the emergence of machine learning (ML) and deep learning (DL) in recent years. While the impact of ML/DL is clearly visible from the viewpoint of research and development as well as industrial applications, it is not immediately clear how signal processing education should evolve in terms of pedagogy and content. Hence, the main purpose of this article is to provide some insight into this aspect. In particular, we emphasize that the introduction and popularity of ML/DL, especially at the level of teaching, has provided an opportunity to bring the focus back to some of the fundamental ideas rooted in signal processing and other related fields of study.", "venue": "IEEE Signal Processing Magazine", "year": 2021, "referenceCount": 32, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-01", "journal": {"volume": "38", "pages": "163-173", "name": "IEEE Signal Processing Magazine"}, "authors": [{"authorId": "1758088", "name": "Manish Narwaria"}]}, {"paperId": "09957cb5febf48ab89c40cd7c77cb5c3b2bf6fdd", "externalIds": {"DBLP": "journals/tele/Martinez-Plumed21", "MAG": "3110196385", "DOI": "10.1016/j.tele.2020.101525", "CorpusId": 229493122}, "url": "https://www.semanticscholar.org/paper/09957cb5febf48ab89c40cd7c77cb5c3b2bf6fdd", "title": "Futures of artificial intelligence through technology readiness levels", "abstract": null, "venue": "Telematics and informatics", "year": 2021, "referenceCount": 137, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-01", "journal": {"volume": "58", "pages": "101525", "name": "Telematics Informatics"}, "authors": [{"authorId": "1399205325", "name": "Fernando Mart\u00ednez-Plumed"}, {"authorId": "1740615089", "name": "Emilia G\u00f3mez"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "573d60a5a5b026c8fc64bf1ea36b9cda6b72345e", "externalIds": {"MAG": "2956301976", "DOI": "10.1016/J.TECHFORE.2020.120555", "CorpusId": 234364003}, "url": "https://www.semanticscholar.org/paper/573d60a5a5b026c8fc64bf1ea36b9cda6b72345e", "title": "Artificial Intelligence: A Child\u2019s Play", "abstract": null, "venue": "", "year": 2021, "referenceCount": 218, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"volume": "166", "pages": "120555", "name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "46670294", "name": "R. Kashyap"}]}, {"paperId": "4105536795356d2606bbc695aaa0ace43bae91cb", "externalIds": {"MAG": "3163876512", "DOI": "10.1080/17544750.2021.1915832", "CorpusId": 236631673}, "url": "https://www.semanticscholar.org/paper/4105536795356d2606bbc695aaa0ace43bae91cb", "title": "Friend or foe? Human journalists\u2019 perspectives on artificial intelligence in Chinese media outlets", "abstract": "The development of the artificial intelligence (AI) platform Media Brain and the associated Xinhua AI news anchors have attracted a great deal of media attention. AI\u2019s potential to boost the media value chain has prompted many media organizations to consider its broader applications in the media industry, but has also raised concerns among human journalists that they will be marginalized and ultimately replaced by AI. Using in-depth interviews, this study examined the perceptions of media practitioners working in the Chinese media industry of the impact of AI on media employment. It attempted to shed light on how AI may impact the media workforce, how human journalists understand their adaptability and resilience, and how media institutions strive to create an embracing organizational discourse through material demonstrations and rivalry for influence in the media market.", "venue": "Chinese Journal of Communication", "year": 2021, "referenceCount": 57, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-30", "journal": {"volume": "14", "pages": "409 - 429", "name": "Chinese Journal of Communication"}, "authors": [{"authorId": "2152847605", "name": "Yang Yu"}, {"authorId": "47942053", "name": "Kuo-En Huang"}]}, {"paperId": "bff9b453109ed1f62226d1b760384020a7db6d0a", "externalIds": {"MAG": "3165447805", "DOI": "10.22409/CONTRACAMPO.V40I1.47817", "CorpusId": 236621135}, "url": "https://www.semanticscholar.org/paper/bff9b453109ed1f62226d1b760384020a7db6d0a", "title": "Imagin\u00e1rio e cultura da intoler\u00e2ncia em plataformas algor\u00edtmicas", "abstract": "In this theoretical articulation based on bibliographic research, the culture of intolerance, driven by the political context of hyperneoliberalism, is linked to the imaginary present on algorithmic platforms, where a fundamental mode of governance is practiced today. While not ignoring past manifestations of intolerance on the Internet, this paper intends to demonstrate how these platforms are environments even more favorable for such manifestations, given the peculiarities of their technology and their business model. To this end, certain aspects of their operation, classified as arena of attention, uneven omnimediation, calibrated exposure and flexible veridiction, are associated with dispositions that Lacan associates with the imaginary and aggressiveness \u2013 narcissism, narcissistic identification with leaders, segregation and paranoia.", "venue": "", "year": 2021, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-30", "journal": {"volume": "40", "name": ""}, "authors": [{"authorId": "2126200488", "name": "Julio Cesar Lemes de Castro"}]}, {"paperId": "e5bc6f8bd8a89103242ec84467087867a44a9626", "externalIds": {"MAG": "3157673036", "DOI": "10.1002/0471266949.BMC267", "CorpusId": 235580952}, "url": "https://www.semanticscholar.org/paper/e5bc6f8bd8a89103242ec84467087867a44a9626", "title": "Artificial Intelligence in Medicinal Chemistry", "abstract": null, "venue": "", "year": 2021, "referenceCount": 86, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-28", "journal": {"volume": "", "pages": "1-19", "name": "Burger's Medicinal Chemistry and Drug Discovery"}, "authors": [{"authorId": "2648931", "name": "E. Griffen"}, {"authorId": "15233603", "name": "A. Dossetter"}, {"authorId": "49674623", "name": "A. Leach"}, {"authorId": "50099517", "name": "Shane Montague"}]}, {"paperId": "7a64066f22d82aada28b9e8933b5fc68ce8430c5", "externalIds": {"MAG": "3157193726", "DOI": "10.1016/J.ECE.2021.04.003", "CorpusId": 235570795}, "url": "https://www.semanticscholar.org/paper/7a64066f22d82aada28b9e8933b5fc68ce8430c5", "title": "Deep neural networks in chemical engineering classrooms to accurately model adsorption equilibrium data", "abstract": null, "venue": "Education for Chemical Engineers", "year": 2021, "referenceCount": 79, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-27", "journal": {"name": "Education for Chemical Engineers"}, "authors": [{"authorId": "95790747", "name": "Shubhangi Kakkar"}, {"authorId": "3943316", "name": "W. Kwapinski"}, {"authorId": "39561380", "name": "C. A. Howard"}, {"authorId": "145594402", "name": "K. Kumar"}]}, {"paperId": "7655568220bfbf685f17e498de846cd7819480ea", "externalIds": {"MAG": "3172154424", "DOI": "10.1002/9781119598732.CH34", "CorpusId": 236617939}, "url": "https://www.semanticscholar.org/paper/7655568220bfbf685f17e498de846cd7819480ea", "title": "Chomsky and Fodor on Modularity", "abstract": null, "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-04-27", "journal": {"volume": "", "pages": "529-543", "name": ""}, "authors": [{"authorId": "52080944", "name": "N. Allott"}, {"authorId": "2116830701", "name": "N. Smith"}]}, {"paperId": "da358d7bf0d081394c183f8412cfed6c81136394", "externalIds": {"MAG": "3159853322", "DOI": "10.22161/IJAERS.84.27", "CorpusId": 235561840}, "url": "https://www.semanticscholar.org/paper/da358d7bf0d081394c183f8412cfed6c81136394", "title": "Contribution of Artificial Intelligence in B2B Sales: A Danfoss Case Study", "abstract": "\u2014 The objective of the work is to evaluate the influence of Artificial Intelligence in the sales activities of B2B companies. The case researched was the Danfoss company, a multinational of Danish origin with B2B sales in more than 100 countries for the markets of refrigeration, heating, inverters and hydraulic in the main industries. A unique case study was employed through participatory observation, with an evaluation of annual reports and semi-structured interviews with 22 employees from various global sales areas, human resources, segment directors, regional presidents and members of the global executive committee who actively participate in defining the sales activities of each region, and globally through digital tools with Artificial Intelligence. In the organization studied, 4 dimensions were identified: Contributions, Possible Disadvantages, Current Moment and the Future with 8 categories of analysis: Internal Processes, Sales Efficiency, Sales Adaptation, Data Security, Behavioral Change, Traditional Salesman, Future Salesmen and the Future of the Company.", "venue": "International Journal of Advanced Engineering Research and Science", "year": 2021, "referenceCount": 44, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-27", "journal": {"name": "International Journal of Advanced Engineering Research and Science"}, "authors": [{"authorId": "2061244922", "name": "F. Prieto"}, {"authorId": "2073800686", "name": "Hugo Ferreira Tadeu Braga"}]}, {"paperId": "0eaae2abacc5e25f39f48e311989852ea393d8d6", "externalIds": {"MAG": "3165430951", "DOI": "10.24140/IJFMA.V6.N1.01", "CorpusId": 236622217}, "url": "https://www.semanticscholar.org/paper/0eaae2abacc5e25f39f48e311989852ea393d8d6", "title": "Design (Non) Fiction: Deconstructing/Reconstructing the Definitional Dualism of AI", "abstract": "2001: A Space Odyssey (Kubrick, 1968) speculates on humanities technological ascension through the exploration of space and the ultimate transcendence of humanity galvanised by the invention of AI. Every detail of this portrayal was an exercise in World Building, with careful considerations of then state-of-the-art technology and informed predictions. Kubrick\u2019s speculative vision is comparative to the practice of Design Fiction, by suspending disbelief and leveraging a technologies emergence to question the future\u2019s sociotechnical landscape and its ramifications critically. Discovery\u2019s AI system, Hal9000, is a convincing speculation of intelligence with Kubrick\u2019s vision showcasing current and long-term aims in AI research. To this end, Hal9000 uniquely portrays Artificial General Intelligence (AGI) underpinned by visualising \u2018narrow\u2019 AI subproblems; thereby, simultaneously highlighting then current research agendas within AI and manifesting them into the aspirational research agenda of human-computer symbiosis. As a result of Kubrick\u2019s mastery in suspending a viewer\u2019s disbelief despite portraying a particular reality for AI, and humanities fascination with artificial life, the term AI simultaneously refers to the grand vision of AGI as well as relating to the contemporary reality of narrow AI. This confusion, along with establishing AI\u2019s ontology, are current challenges that need addressing to create effective and acceptable realisations of AI. This paper responds to the ontological confusion by reviewing and comparing Kubrick\u2019s speculative methodology to the practice of Design Fiction by unpacking Hal9000 as a diegetic prototype while defining the active threads of \u2018AI\u2019s Definitional Dualism\u2019. The paper will also present a Design Fiction submerged in the reality of narrow AI and the adoption of a More-Than Human Centred Design approach to address the complexity of AI\u2019s ontology in alternative ways. Finally, this paper will also define the importance of researching the semantics of AI technology and how film and Design Fiction offer a discursive space for design research to transpire.", "venue": "INTERNATIONAL JOURNAL OF FILM AND MEDIA ARTS", "year": 2021, "referenceCount": 76, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-04-26", "journal": {"name": "International Journal of Film and Media Arts"}, "authors": [{"authorId": "121401948", "name": "Franziska Pilling"}, {"authorId": "3104112", "name": "Joseph Lindley"}, {"authorId": "112998906", "name": "H. Akmal"}, {"authorId": "1693223", "name": "P. Coulton"}]}, {"paperId": "564d5ded4372e36a8e594644f8e3c031a78beeba", "externalIds": {"DOI": "10.1080/1369118X.2021.1909100", "CorpusId": 234487097}, "url": "https://www.semanticscholar.org/paper/564d5ded4372e36a8e594644f8e3c031a78beeba", "title": "Nonhuman humanitarianism: when 'AI for good' can be harmful", "abstract": "ABSTRACT Artificial intelligence (AI) applications have been introduced in humanitarian operations in order to help with the significant challenges the sector is facing. This article focuses on chatbots which have been proposed as an efficient method to improve communication with, and accountability to affected communities. Chatbots, together with other humanitarian AI applications such as biometrics, satellite imaging, predictive modelling and data visualisations, are often understood as part of the wider phenomenon of \u2018AI for social good\u2019. The article develops a decolonial critique of humanitarianism and critical algorithm studies which focuses on the power asymmetries underpinning both humanitarianism and AI. The article asks whether chatbots, as exemplars of \u2018AI for good\u2019, reproduce inequalities in the global context. Drawing on a mixed methods study that includes interviews with seven groups of stakeholders, the analysis observes that humanitarian chatbots do not fulfil claims such as \u2018intelligence\u2019. Yet AI applications still have powerful consequences. Apart from the risks associated with misinformation and data safeguarding, chatbots reduce communication to its barest instrumental forms which creates disconnects between affected communities and aid agencies. This disconnect is compounded by the extraction of value from data and experimentation with untested technologies. By reflecting the values of their designers and by asserting Eurocentric values in their programmed interactions, chatbots reproduce the coloniality of power. The article concludes that \u2018AI for good\u2019 is an \u2018enchantment of technology\u2019 that reworks the colonial legacies of humanitarianism whilst also occluding the power dynamics at play.", "venue": "", "year": 2021, "referenceCount": 81, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-26", "journal": {"volume": "24", "pages": "850 - 868", "name": "Information, Communication & Society"}, "authors": [{"authorId": "2850262", "name": "Mirca Madianou"}]}, {"paperId": "bb3026f8fb7815720e3d84613b48300c130e44e4", "externalIds": {"DBLP": "journals/corr/abs-2104-12871", "ArXiv": "2104.12871", "DOI": "10.1145/3449639.3465421", "CorpusId": 233407771}, "url": "https://www.semanticscholar.org/paper/bb3026f8fb7815720e3d84613b48300c130e44e4", "title": "Why AI is harder than we think", "abstract": "Since its beginning in the 1950s, the field of artificial intelligence has cycled several times between periods of optimistic predictions and massive investment (\"AI Spring\") and periods of disappointment, loss of confidence, and reduced funding (\"AI Winter\"). Even with today's seemingly fast pace of AI breakthroughs, the development of long-promised technologies such as self-driving cars, housekeeping robots, and conversational companions has turned out to be much harder than many people expected. One reason for these repeating cycles is our limited understanding of the nature and complexity of intelligence itself. In this talk I will discuss some fallacies in common assumptions made by AI researchers, which can lead to overconfident predictions about the field. I will also speculate on what is needed for the grand challenge of making AI systems more robust, general, and adaptable --- in short, more intelligent.", "venue": "ArXiv", "year": 2021, "referenceCount": 93, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2021-04-26", "journal": {"name": "Proceedings of the Genetic and Evolutionary Computation Conference"}, "authors": [{"authorId": "71370384", "name": "M. Mitchell"}]}, {"paperId": "c6e1a3505ff160e8cc747f02936b2f6861cba18e", "externalIds": {"DBLP": "journals/jbd/BatarsehFH21a", "DOI": "10.1186/s40537-021-00445-7", "CorpusId": 233403216}, "url": "https://www.semanticscholar.org/paper/c6e1a3505ff160e8cc747f02936b2f6861cba18e", "title": "A survey on artificial intelligence assurance", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 291, "citationCount": 17, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-26", "journal": {"volume": "8", "pages": "1-30", "name": "Journal of Big Data"}, "authors": [{"authorId": "144105786", "name": "Feras A. Batarseh"}, {"authorId": "2059693836", "name": "Laura J. Freeman"}, {"authorId": "2124911407", "name": "Chih-hao Huang"}]}, {"paperId": "29f18a58a1867e0f0fe8f67f20189b71d0b0dc26", "externalIds": {"MAG": "3185787080", "ArXiv": "2104.11652", "DOI": "10.2139/ssrn.3832601", "CorpusId": 233388044}, "url": "https://www.semanticscholar.org/paper/29f18a58a1867e0f0fe8f67f20189b71d0b0dc26", "title": "If it Looks Like a Human and Speaks Like a Human ... Dialogue and Cooperation in Human-Robot Interactions", "abstract": "This paper presents the results of a behavioral experiment conducted between February 2020 and March 2021 at UniversitA Cattolica del Sacro Cuore, Milan Campus, in which students were matched with either a human or a humanoid robotic partner to play an iterated Prisoner\u00e2\u20ac\u2122s Dilemma. The results of a Logit estimation procedure show that subjects are more likely to cooperate with human rather than with robotic partners; that they are more likely to cooperate after receiving a dialogic verbal reaction following a sub-optimal social outcome; and that the effect of the verbal reaction is not dependent on the nature of the partner. Our findings provide new evidence on the effects of verbal communication in strategic frameworks. The results are robust to the exclusion of students of Economics-related subjects, to the inclusion of a set of psychological and behavioral controls, to the way subjects perceive robots\u00e2\u20ac\u2122 behavior, and to potential gender biases in human-human interactions.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 113, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology", "Economics"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-23", "journal": {"name": "Behavioral & Experimental Economics eJournal"}, "authors": [{"authorId": "32114232", "name": "Mario A. Maggioni"}, {"authorId": "115008977", "name": "D. Rossignoli"}]}, {"paperId": "32e8a3ae18598a5177ba61e39ca7239319b8c54a", "externalIds": {"MAG": "3155174489", "DOI": "10.1007/S13369-021-05522-W", "CorpusId": 234829697}, "url": "https://www.semanticscholar.org/paper/32e8a3ae18598a5177ba61e39ca7239319b8c54a", "title": "Power Transmission Line Fault Detection and Diagnosis Based on Artificial Intelligence Approach and its Development in UAV: A Review", "abstract": null, "venue": "", "year": 2021, "referenceCount": 102, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-04-22", "journal": {"volume": "", "pages": "1-27", "name": "Arabian Journal for Science and Engineering"}, "authors": [{"authorId": "97727705", "name": "S. Wong"}, {"authorId": "2100609218", "name": "Clifford Wei Chang Choe"}, {"authorId": "3386969", "name": "H. Goh"}, {"authorId": "2100526635", "name": "Yik Wen Low"}, {"authorId": "2100597614", "name": "Dennis Yang Shen Cheah"}, {"authorId": "2100595481", "name": "Chiia Pang"}]}, {"paperId": "daba216327c7b4f8bff96a84984fdb09117edc51", "externalIds": {"DBLP": "journals/corr/abs-2104-12582", "ArXiv": "2104.12582", "DOI": "10.3390/philosophies6030053", "CorpusId": 233394168}, "url": "https://www.semanticscholar.org/paper/daba216327c7b4f8bff96a84984fdb09117edc51", "title": "Understanding and Avoiding AI Failures: A Practical Guide", "abstract": "As AI technologies increase in capability and ubiquity, AI accidents are becoming more common. Based on normal accident theory, high reliability theory, and open systems theory, we create a framework for understanding the risks associated with AI applications. This framework is designed to direct attention to pertinent system properties without requiring unwieldy amounts of accuracy. In addition, we also use AI safety principles to quantify the unique risks of increased intelligence and human-like qualities in AI. Together, these two fields give a more complete picture of the risks of contemporary AI. By focusing on system properties near accidents instead of seeking a root cause of accidents, we identify where attention should be paid to safety for current generation AI systems.", "venue": "Philosophies", "year": 2021, "referenceCount": 71, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-22", "journal": {"volume": "abs/2104.12582", "name": "ArXiv"}, "authors": [{"authorId": "2116650684", "name": "R. M. Williams"}, {"authorId": "26336155", "name": "Roman Yampolskiy"}]}, {"paperId": "2bb1e1a5b9a16f6828fe94736cea5dab264533a6", "externalIds": {"DBLP": "journals/tacl/MerrillGSS21", "ArXiv": "2104.10809", "DOI": "10.1162/tacl_a_00412", "CorpusId": 233346957}, "url": "https://www.semanticscholar.org/paper/2bb1e1a5b9a16f6828fe94736cea5dab264533a6", "title": "Provable Limitations of Acquiring Meaning from Ungrounded Form: What Will Future Language Models Understand?", "abstract": "Abstract Language models trained on billions of tokens have recently led to unprecedented results on many NLP tasks. This success raises the question of whether, in principle, a system can ever \u201cunderstand\u201d raw text without access to some form of grounding. We formally investigate the abilities of ungrounded systems to acquire meaning. Our analysis focuses on the role of \u201cassertions\u201d: textual contexts that provide indirect clues about the underlying semantics. We study whether assertions enable a system to emulate representations preserving semantic relations like equivalence. We find that assertions enable semantic emulation of languages that satisfy a strong notion of semantic transparency. However, for classes of languages where the same expression can take different values in different contexts, we show that emulation can become uncomputable. Finally, we discuss differences between our formal model and natural language, exploring how our results generalize to a modal setting and other semantic relations. Together, our results suggest that assertions in code or language do not provide sufficient signal to fully emulate semantic representations. We formalize ways in which ungrounded language models appear to be fundamentally limited in their ability to \u201cunderstand\u201d.", "venue": "Transactions of the Association for Computational Linguistics", "year": 2021, "referenceCount": 34, "citationCount": 34, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-22", "journal": {"volume": "9", "pages": "1047-1060", "name": "Transactions of the Association for Computational Linguistics"}, "authors": [{"authorId": "143696607", "name": "William Cooper Merrill"}, {"authorId": "79775260", "name": "Yoav Goldberg"}, {"authorId": "4671928", "name": "Roy Schwartz"}, {"authorId": "144365875", "name": "Noah A. Smith"}]}, {"paperId": "bfaccd57f7f0df5abb9bcf954a4e12964b2023c4", "externalIds": {"DBLP": "journals/ais/Balle22", "MAG": "3156501751", "DOI": "10.1007/s00146-021-01211-2", "CorpusId": 234827618}, "url": "https://www.semanticscholar.org/paper/bfaccd57f7f0df5abb9bcf954a4e12964b2023c4", "title": "Empathic responses and moral status for social robots: an argument in favor of robot patienthood based on K. E. L\u00f8gstrup", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 82, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-20", "journal": {"volume": "37", "pages": "535 - 548", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2091363965", "name": "Simon N. Balle"}]}, {"paperId": "dfd461b5b2f1e8e4ee85988aae1ff2a4ef35ae94", "externalIds": {"DOI": "10.1145/3428158", "CorpusId": 233430159}, "url": "https://www.semanticscholar.org/paper/dfd461b5b2f1e8e4ee85988aae1ff2a4ef35ae94", "title": "Perceptions of Human and Machine-Generated Articles", "abstract": "Automated journalism technology is transforming news production and changing how audiences perceive the news. As automated text-generation models advance, it is important to understand how readers perceive human-written and machine-generated content. This study used OpenAI\u2019s GPT-2 text-generation model (May 2019 release) and articles from news organizations across the political spectrum to study participants\u2019 reactions to human- and machine-generated articles. As participants read the articles, we collected their facial expression and galvanic skin response (GSR) data together with self-reported perceptions of article source and content credibility. We also asked participants to identify their political affinity and assess the articles\u2019 political tone to gain insight into the relationship between political leaning and article perception. Our results indicate that the May 2019 release of OpenAI\u2019s GPT-2 model generated articles that were misidentified as written by a human close to half the time, while human-written articles were identified correctly as written by a human about 70 percent of the time.", "venue": "Digital Threats: Research and Practice", "year": 2021, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-20", "journal": {"volume": "2", "pages": "1 - 16", "name": "Digital Threats: Research and Practice"}, "authors": [{"authorId": "2086786251", "name": "Shubhra Tewari"}, {"authorId": "1753691816", "name": "Renos Zabounidis"}, {"authorId": "116150549", "name": "Ammina Kothari"}, {"authorId": "39958072", "name": "Reynold J. Bailey"}, {"authorId": "144648940", "name": "Cecilia Ovesdotter Alm"}]}, {"paperId": "574cddb0d56fa84708b259dcd2d81473b810e7ad", "externalIds": {"ArXiv": "2104.08231", "DBLP": "journals/corr/abs-2104-08231", "CorpusId": 233289893}, "url": "https://www.semanticscholar.org/paper/574cddb0d56fa84708b259dcd2d81473b810e7ad", "title": "An Adversarially-Learned Turing Test for Dialog Generation Models", "abstract": "The design of better automated dialogue evaluation metrics offers the potential of accelerate evaluation research on conversational AI. However, existing trainable dialogue evaluation models are generally restricted to classifiers trained in a purely supervised manner, which suffer a significant risk from adversarial attacking (e.g., a nonsensical response that enjoys a high classification score). To alleviate this risk, we propose an adversarial training approach to learn a robust model, ATT (Adversarial Turing Test), that discriminates machine-generated responses from human-written replies. In contrast to previous perturbation-based methods, our discriminator is trained by iteratively generating unrestricted and diverse adversarial examples using reinforcement learning. The key benefit of this unrestricted adversarial training approach is allowing the discriminator to improve robustness in an iterative attack-defense game. Our discriminator shows high accuracy on strong attackers including DialoGPT and GPT-3.1", "venue": "ArXiv", "year": 2021, "referenceCount": 40, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-16", "journal": {"volume": "abs/2104.08231", "name": "ArXiv"}, "authors": [{"authorId": "71886367", "name": "Xiang Gao"}, {"authorId": "48378494", "name": "Yizhe Zhang"}, {"authorId": "1947267", "name": "Michel Galley"}, {"authorId": "66648221", "name": "Bill Dolan"}]}, {"paperId": "f459eb635c2a485c77f1461f47f566f43cc0a4b7", "externalIds": {"MAG": "3153019806", "DOI": "10.4324/9780429445590-6-6", "CorpusId": 96439665}, "url": "https://www.semanticscholar.org/paper/f459eb635c2a485c77f1461f47f566f43cc0a4b7", "title": "Biological evolution\u2019s use of representational redescription", "abstract": "I encountered Annette Karmiloff-Smith several times between the 1980s and 2012. We also occasionally exchanged email messages. We worked on related problems and had partly overlapping ideas about a multi-layer development process. In particular, there are overlaps and differences between her notion of \u201crepresentational redescription\u201d and the \u201cmeta-configured genome\u201d idea based on a revision of the \u201caltricial/precocial\u201d distinction used by biologists. We shared the view that understanding mechanisms involved in development is more important than collecting data about ages at which various fashionable developmental tests are passed. Our problems and some of our methodology overlapped, but our views on explanatory frameworks were different. My main inspiration regarding what needed to be explained came from Immanuel Kant\u2019s theories about the nature of mathematical knowledge (about spatial structures and processes) as \u201cawakened by\u201d but not \u201cderived from\u201d experience, whereas although inspired by Jean Piaget (who had read Kant) Annette seems not to have been interested in Piaget\u2019s work on mathematical cognition, and had not read his (posthumous) book on necessity, though it was she who informed me about it. On reading Beyond Modularity about ten years after it was published I noticed unexpected overlaps, but I don\u2019t think Annette was interested in my investigations because I was not ready to propose specific explanatory mechanisms (e.g. for mathematical insight \u2013 a still unsolved problem) and I did not think neural nets, her favourite candidate, were adequate to the task. Nevertheless, I believe there were deep commonalities in our thinking, as well as differences that I\u2019ll try to explain. I regret that we did not have opportunities to engage more deeply, and perhaps achieve a new synthesis.", "venue": "", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-16", "journal": {"volume": "", "pages": "76-93", "name": ""}, "authors": [{"authorId": "145788442", "name": "A. Sloman"}]}, {"paperId": "fd9904f66018681d77037c057cf3f1755d9e0aa9", "externalIds": {"DBLP": "conf/ACMse/OmatuP21", "DOI": "10.1145/3409334.3452072", "CorpusId": 234344744}, "url": "https://www.semanticscholar.org/paper/fd9904f66018681d77037c057cf3f1755d9e0aa9", "title": "Benefits of combining dimensional attention and working memory for partially observable reinforcement learning problems", "abstract": "Neuroscience provides a rich source of inspiration for new types of algorithms and architectures to employ when building AI and the resulting biologically-plausible approaches that provide formal, testable models of brain function. The working memory toolkit (WMtk), was developed to assist the integration of an artificial neural network (ANN)-based computational neuroscience model of working memory into reinforcement learning (RL) agents, mitigating the details of ANN design and providing a simple symbolic encoding interface. While the WMtk allows RL agents to perform well in partially-observable domains, it requires prefiltering of sensory information by the programmer: a task often delegated to dimensional attention mechanisms in other cognitive architectures. To fill this gap, we develop and test a biologically-plausible dimensional attention filter for the WMtk and validate model performance using a partially-observable 1D maze task. We show that the attention filter improves learning behavior in two ways by: 1) speeding up learning in the short-term, early in training and 2) developing emergent alternative strategies which optimize performance over the long-term.", "venue": "ACM Southeast Conference", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": "2021-04-15", "journal": {"name": "Proceedings of the 2021 ACM Southeast Conference"}, "authors": [{"authorId": "2090365479", "name": "Ngozi Omatu"}, {"authorId": "49168710", "name": "Joshua L. Phillips"}]}, {"paperId": "584f796997a59f5775b30814037318ac0be9f11d", "externalIds": {"ArXiv": "2104.07598", "DBLP": "journals/corr/abs-2104-07598", "DOI": "10.1145/3530875", "CorpusId": 233241187}, "url": "https://www.semanticscholar.org/paper/584f796997a59f5775b30814037318ac0be9f11d", "title": "Can Artificial Intelligence Make Art?: Folk Intuitions as to whether AI-driven Robots Can Be Viewed as Artists and Produce Art", "abstract": "In two experiments (total N = 693), we explored whether people are willing to consider paintings made by AI-driven robots as art, and robots as artists. Across the two experiments, we manipulated three factors: (i) agent type (AI-driven robot vs. human agent), (ii) behavior type (intentional creation of a painting vs. accidental creation), and (iii) object type (abstract vs. representational painting). We found that people judge robot paintings and human paintings as art to roughly the same extent. However, people are much less willing to consider robots as artists than humans, which is partially explained by the fact that they are less disposed to attribute artistic intentions to robots.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 99, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-15", "journal": {"volume": "11", "pages": "1 - 19", "name": "ACM Transactions on Human-Robot Interaction (THRI)"}, "authors": [{"authorId": "2083035030", "name": "Elz.e Sigut.e Mikalonyt.e"}, {"authorId": "46849688", "name": "Markus Kneer"}]}, {"paperId": "26005ae02a1e12d6e835744af861a1f84fc5935d", "externalIds": {"PubMedCentral": "8041614", "DOI": "10.1007/s10726-021-09734-1", "CorpusId": 233220206, "PubMed": "33867681"}, "url": "https://www.semanticscholar.org/paper/26005ae02a1e12d6e835744af861a1f84fc5935d", "title": "Using Artificial Intelligence to provide Intelligent Dispute Resolution Support", "abstract": null, "venue": "Group decision and negotiation", "year": 2021, "referenceCount": 92, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-13", "journal": {"volume": "30", "pages": "789 - 812", "name": "Group Decision and Negotiation"}, "authors": [{"authorId": "2058672947", "name": "John Zeleznikow"}]}, {"paperId": "29409efa04ac99ccf01d2a011d21d5d14e870000", "externalIds": {"PubMedCentral": "8040371", "DOI": "10.1007/s11030-021-10217-3", "CorpusId": 233211014, "PubMed": "33844136"}, "url": "https://www.semanticscholar.org/paper/29409efa04ac99ccf01d2a011d21d5d14e870000", "title": "Artificial intelligence to deep learning: machine intelligence approach for drug discovery", "abstract": null, "venue": "Molecular diversity", "year": 2021, "referenceCount": 501, "citationCount": 99, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-12", "journal": {"volume": "25", "pages": "1315 - 1360", "name": "Molecular Diversity"}, "authors": [{"authorId": "1409846740", "name": "Rohan Gupta"}, {"authorId": "153610437", "name": "Devesh Srivastava"}, {"authorId": "2059118408", "name": "Mehar Sahu"}, {"authorId": "2072850683", "name": "Swati Tiwari"}, {"authorId": "2288195", "name": "R. K. Ambasta"}, {"authorId": "38183916", "name": "Pravir Kumar"}]}, {"paperId": "f06ca547e5eaf0fd118f184b9ddd1cf7cd5c29e0", "externalIds": {"DBLP": "journals/corr/abs-2104-05500", "ArXiv": "2104.05500", "CorpusId": 233210665}, "url": "https://www.semanticscholar.org/paper/f06ca547e5eaf0fd118f184b9ddd1cf7cd5c29e0", "title": "Updater-Extractor Architecture for Inductive World State Representations", "abstract": "Developing NLP models traditionally involves two stages training and application. Retention of information acquired after training (at application time) is architecturally limited by the size of the model\u2019s context window (in the case of transformers), or by the practical difficulties associated with long sequences (in the case of RNNs). In this paper, we propose a novel transformer-based Updater-Extractor architecture and a training procedure that can work with sequences of arbitrary length and refine its knowledge about the world based on linguistic inputs. We explicitly train the model to incorporate incoming information into its world state representation, obtaining strong inductive generalization and the ability to handle extremely long-range dependencies. We prove a lemma that provides a theoretical basis for our approach. The result also provides insight into success and failure modes of models trained with variants of Truncated Back-Propagation Through Time (such as Transformer XL). Empirically, we investigate the model performance on three different tasks, demonstrating its promise. This preprint is still a work in progress. At present, we focused on easily interpretable tasks, leaving the application of the proposed ideas to practical NLP applications for the future.", "venue": "ArXiv", "year": 2021, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-12", "journal": {"volume": "abs/2104.05500", "name": "ArXiv"}, "authors": [{"authorId": "116808291", "name": "A. Moskvichev"}, {"authorId": "2108386159", "name": "James Liu"}]}, {"paperId": "1d26a324c7f13e474a98ed76842f683e389f639e", "externalIds": {"MAG": "3153829757", "DOI": "10.21684/2412-2343-2021-8-1-86-115", "CorpusId": 234814884}, "url": "https://www.semanticscholar.org/paper/1d26a324c7f13e474a98ed76842f683e389f639e", "title": "Regulation of Artificial Intelligence in BRICS and the European Union", "abstract": "Global digitization and the emergence of Artificial Intelligence-based technologies pose challenges for all countries. The BRICS and European Union countries are no exception. BRICS as well as the European Union seek to strengthen their positions as leading actors on the world stage. At the present time, an essential means of doing so is for BRICS and the EU to implement smart policy and create suitable conditions for the development of digital technologies, including AI. For this reason, one of the most important tasks for BRICS and the EU is to develop an adequate approach to the regulation of AI-based technologies. This research paper is an analysis of the current approaches to the regulation of AI at the BRICS group level, in each of the BRICS countries, and in the European Union. The analysis is based on the application of comparative and formal juridical analysis of the legislation of the selected countries on AI and other digital technologies. The results of the analysis lead the authors to conclude that it is necessary to design ageneral approach to the regulation of these technologies for the BRICS countries similar to the approach chosen in the EU (the trustworthy approach) and to upgrade this legislation to achieve positive effects from digital transformation. The authors offer several suggestions for optimization of the provisions of the legislation, including designing a model legal act in the sphere of AI.", "venue": "BRICS Law Journal", "year": 2021, "referenceCount": 44, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-11", "journal": {"name": "BRICS Law Journal"}, "authors": [{"authorId": "2081710656", "name": "D. Cyman"}, {"authorId": "72777661", "name": "E. Gromova"}, {"authorId": "120476812", "name": "E. Juchnevicius"}]}, {"paperId": "c04ca6b39ee20fba3c894c9fdc5d0377f194d260", "externalIds": {"PubMedCentral": "8052224", "DOI": "10.1007/s00709-021-01642-0", "CorpusId": 233201237, "PubMed": "33837845"}, "url": "https://www.semanticscholar.org/paper/c04ca6b39ee20fba3c894c9fdc5d0377f194d260", "title": "Intelligence without neurons: a Turing Test for plants?", "abstract": null, "venue": "Protoplasma", "year": 2021, "referenceCount": 14, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2021-04-10", "journal": {"volume": "258", "pages": "455 - 458", "name": "Protoplasma"}, "authors": [{"authorId": "145333473", "name": "P. Nick"}]}, {"paperId": "07c8c0aae067b472a90cb4458a932228f60cdc02", "externalIds": {"MAG": "3153647488", "DBLP": "journals/ijgi/TerziyanN21", "DOI": "10.3390/IJGI10040246", "CorpusId": 234811458}, "url": "https://www.semanticscholar.org/paper/07c8c0aae067b472a90cb4458a932228f60cdc02", "title": "Semantics of Voids within Data: Ignorance-Aware Machine Learning", "abstract": "Operating with ignorance is an important concern of geographical information science when the objective is to discover knowledge from the imperfect spatial data. Data mining (driven by knowledge discovery tools) is about processing available (observed, known, and understood) samples of data aiming to build a model (e.g., a classifier) to handle data samples that are not yet observed, known, or understood. These tools traditionally take semantically labeled samples of the available data (known facts) as an input for learning. We want to challenge the indispensability of this approach, and we suggest considering the things the other way around. What if the task would be as follows: how to build a model based on the semantics of our ignorance, i.e., by processing the shape of \u201cvoids\u201d within the available data space? Can we improve traditional classification by also modeling the ignorance? In this paper, we provide some algorithms for the discovery and visualization of the ignorance zones in two-dimensional data spaces and design two ignorance-aware smart prototype selection techniques (incremental and adversarial) to improve the performance of the nearest neighbor classifiers. We present experiments with artificial and real datasets to test the concept of the usefulness of ignorance semantics discovery.", "venue": "ISPRS Int. J. Geo Inf.", "year": 2021, "referenceCount": 49, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-08", "journal": {"volume": "10", "pages": "246", "name": "ISPRS Int. J. Geo Inf."}, "authors": [{"authorId": "1742755", "name": "V. Terziyan"}, {"authorId": "145403995", "name": "A. Nikulin"}]}, {"paperId": "09279dc8018a8131e11d527cebb06d0a43c67cff", "externalIds": {"DBLP": "journals/corr/abs-2104-02726", "ArXiv": "2104.02726", "CorpusId": 233168627}, "url": "https://www.semanticscholar.org/paper/09279dc8018a8131e11d527cebb06d0a43c67cff", "title": "Creativity and Machine Learning: A Survey", "abstract": "There is a growing interest in the area of machine learning and creativity. This survey presents an overview of the history and the state of the art of computational creativity theories, key machine learning techniques (including generative deep learning), and corresponding automatic evaluation methods. After presenting a critical discussion of the key contributions in this area, we outline the current research challenges and emerging opportunities in this field.", "venue": "ArXiv", "year": 2021, "referenceCount": 285, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-06", "journal": {"volume": "abs/2104.02726", "name": "ArXiv"}, "authors": [{"authorId": "2067291198", "name": "Giorgio Franceschelli"}, {"authorId": "1806767", "name": "Mirco Musolesi"}]}, {"paperId": "3e73043486daa85330554ddc5b48c9a26ed66f4b", "externalIds": {"MAG": "3141717750", "DOI": "10.17755/ESOSDER.844536", "CorpusId": 233593779}, "url": "https://www.semanticscholar.org/paper/3e73043486daa85330554ddc5b48c9a26ed66f4b", "title": "YAPAY ZEKA BA\u011eLAMINDA YARATICILIK VE G\u00d6RSEL TASARIMIN GELECE\u011e\u0130", "abstract": "In the design industry, we see the artificial intelligence applications which come into being along with the development of information and technology. Such applications are observed in the area of visual design as well. Discussing the visual design that is a process including the element of creativity, how designs can be produced on the basis of the machine learning of computers by processing big data and what these designs will lead to in the future makes up one of the questions of the study. On the other hand, what the effects of the likely scenario that the artificial intelligence can take on the creation process with no need for human beings will be on the design also confronts us as another question. The primary aim of this study is to present projections in relation to the future of the design on the topic of the partnership of visual design with artificial intelligence in terms of the departure point of the study and issues addressed by study and to reveal what the process to be experienced following this partnership will lead to. Therefore, in the conceptual framework of the study, by examining the relationship of artificial intelligence with creativity, various examples created by the interaction between the two are given, and then a descriptive analysis is made through theories. The machine is capable of learning the patterns obtained through a specific template and planning. However, it does not have the asymmetric structure, emotions, cultural and societal factors of the human intelligence. What the effect of the artificial intelligence will be on the design process without such factors in the future is discussed.", "venue": "", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-05", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "46805024", "name": "B. Karabulut"}]}, {"paperId": "36941ff76f77ab149ca3ac5645dd2352e26163e9", "externalIds": {"DOI": "10.1080/0889311X.2021.1982914", "CorpusId": 244491707}, "url": "https://www.semanticscholar.org/paper/36941ff76f77ab149ca3ac5645dd2352e26163e9", "title": "Machine learning applications in macromolecular X-ray crystallography", "abstract": "After more than half a century of evolution, machine learning and artificial intelligence, in general, are entering a truly exciting era of broad application in commercial and research sectors. In X-ray crystallography, and its application to structural biology, machine learning is finding a home within expert and automated systems, is forecasting experiment and data analysis outcomes, is predicting whether crystals can be grown and even generating macromolecular structures. This review provides a historical perspective on AI and machine learning, offers an introduction and guide to its application in crystallography and concludes with topical examples of how it is currently influencing macromolecular crystallography.", "venue": "Crystallography Reviews", "year": 2021, "referenceCount": 165, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-04-03", "journal": {"volume": "27", "pages": "54 - 101", "name": "Crystallography Reviews"}, "authors": [{"authorId": "4272943", "name": "M. Vollmar"}, {"authorId": "38942685", "name": "G. Evans"}]}, {"paperId": "9eafc9094b0c005892c90812372f103643dcea9f", "externalIds": {"DOI": "10.1080/15027570.2021.1987643", "CorpusId": 240075011}, "url": "https://www.semanticscholar.org/paper/9eafc9094b0c005892c90812372f103643dcea9f", "title": "Hume\u2019s Law as Another Philosophical Problem for Autonomous Weapons Systems", "abstract": "ABSTRACT This article contends that certain types of Autonomous Weapons Systems (AWS) are susceptible to Hume\u2019s Law. Hume\u2019s Law highlights the seeming impossibility of deriving moral judgments, if not all evaluative ones, from purely factual premises. If autonomous weapons make use of factual data from their environments to carry out specific actions, then justifying their ethical decisions may prove to be intractable in light of the said problem. In this article, Hume\u2019s original formulation of the no-ought-from-is thesis is evaluated in relation to the dominant views regarding it (viz., moral non-descriptivism and moral descriptivism). Citing the objections raised against these views, it is claimed that, if there is no clear-cut solution to Hume\u2019s is-ought problem that presently exists, then the task of grounding the moral judgements of AWS would still be left unaccounted for.", "venue": "Journal of Military Ethics", "year": 2021, "referenceCount": 72, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-03", "journal": {"volume": "20", "pages": "113 - 128", "name": "Journal of Military Ethics"}, "authors": [{"authorId": "84400220", "name": "R. Boyles"}]}, {"paperId": "3762e4c40731c630a98df7742d2fc5902833e54d", "externalIds": {"DOI": "10.1080/02580136.2021.1941652", "CorpusId": 235676108}, "url": "https://www.semanticscholar.org/paper/3762e4c40731c630a98df7742d2fc5902833e54d", "title": "Can Aristotelian virtue theory survive Fourth Order Technology? An ethics perspective", "abstract": "The Fourth Industrial Revolution (4IR) and accompanying Fourth Order technologies (FOTs) sit at the confluence of epistem\u00e9 and techn\u00e9 knowledge identified in classical Greek philosophy. The former is interpreted as scientific knowledge and discoveries, and the latter is its practical application in the form of \u201cnew\u201d technologies and manufacturing processes. This helps explain both 4IR and FOT where 4IR is characterised by the science of digitisation and computerisation, and FOT by machines combining artificial intelligence (AI) and advanced machine learning (AML), both key components in FOT functionality. Through the use of codification and algorithms, scientists and engineers are trying to imitate human thought and behaviour in ways devoid of human virtue and relationality, vital ingredients in the \u201clived\u201d experience. Classical Aristotelian virtue theory is agent-based, but recognises the importance of the \u201clived experience\u201d, both individual (self) and in terms of their relationality in the wider community (other). Phronesis, or practical wisdom, is a critical tool in Aristotelian virtue theory as it is theorised to assist the individual in their \u201clived\u201d human experiences in the acquisition of both intellectual virtues (rational) and moral virtues (emotional), leading to a state of eudaimonia, or ultimate well-being for the individual (self) and eventually wider society (other). Aristotelian virtue theory understands that human life is not always calculable, measurable, or rational, but it has a corresponding and arguably deeper and more profound meaning and influence through the relative and moral brought about through the \u201clived\u201d human experience and its iteration.", "venue": "", "year": 2021, "referenceCount": 88, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-03", "journal": {"volume": "40", "pages": "213 - 227", "name": "South African Journal of Philosophy"}, "authors": [{"authorId": "2116178408", "name": "Lorrainne Doherty"}]}, {"paperId": "bc005e6a24be8d866e04f04b905415a5f1c47a4f", "externalIds": {"DOI": "10.1080/02580136.2021.1921933", "CorpusId": 235676080}, "url": "https://www.semanticscholar.org/paper/bc005e6a24be8d866e04f04b905415a5f1c47a4f", "title": "Moral risks and government policy in South Africa in the context of 4IR", "abstract": "South Africa, among other nations in Africa, most notably Kenya, Nigeria and Rwanda, is aiming to take a lead in the implementation of policy intended to address the challenges represented by the fourth Industrial Revolution. We take the South African Constitution\u2019s Bill of Rights as our guide on the moral obligations of the government, from the logic of both consequentialist and deontological moral frameworks. With this in mind, we consider whether the South African government\u2019s initiatives involve moral risks, in virtue of neglecting some threats posed by new technologies. In particular, we identify biological technologies \u2013 specifically transhumanist technologies \u2013 as posing special risks, and argue that we need to balance the need for dignity, equality and privacy, which the technologies seem to threaten, against the promise of flourishing that the technologies seem to offer.", "venue": "", "year": 2021, "referenceCount": 114, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-03", "journal": {"volume": "40", "pages": "195 - 212", "name": "South African Journal of Philosophy"}, "authors": [{"authorId": "103072012", "name": "John M. Ostrowick"}]}, {"paperId": "c51cfb181e7977ef3a52bbabde4d479e284c91ed", "externalIds": {"MAG": "3140642569", "DOI": "10.1161/CIRCRESAHA.121.318106", "CorpusId": 232762118, "PubMed": "33793339"}, "url": "https://www.semanticscholar.org/paper/c51cfb181e7977ef3a52bbabde4d479e284c91ed", "title": "Artificial Intelligence in Hypertension", "abstract": "Hypertension remains the largest modifiable cause of mortality worldwide despite the availability of effective medications and sustained research efforts over the past 100 years. Hypertension requires transformative solutions that can help reduce the global burden of the disease. Artificial intelligence and machine learning, which have made a substantial impact on our everyday lives over the last decade may be the route to this transformation. However, artificial intelligence in health care is still in its nascent stages and realizing its potential requires numerous challenges to be overcome. In this review, we provide a clinician-centric perspective on artificial intelligence and machine learning as applied to medicine and hypertension. We focus on the main roadblocks impeding implementation of this technology in clinical care and describe efforts driving potential solutions. At the juncture, there is a critical requirement for clinical and scientific expertise to work in tandem with algorithmic innovation followed by rigorous validation and scrutiny to realize the promise of artificial intelligence-enabled health care for hypertension and other chronic diseases.", "venue": "Circulation Research", "year": 2021, "referenceCount": 108, "citationCount": 6, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-02", "journal": {"volume": "128", "pages": "1100 - 1118", "name": "Circulation Research"}, "authors": [{"authorId": "145535160", "name": "S. Padmanabhan"}, {"authorId": "2062732891", "name": "T. Q. B. Tran"}, {"authorId": "5990215", "name": "A. Dominiczak"}]}, {"paperId": "22418ee25580bedcf7f1dc00d5e90419b1cadaa6", "externalIds": {"MAG": "3150674763", "DOI": "10.3390/TECHNOLOGIES9020023", "CorpusId": 233533906}, "url": "https://www.semanticscholar.org/paper/22418ee25580bedcf7f1dc00d5e90419b1cadaa6", "title": "A Novel Ensemble Machine Learning Approach for Bioarchaeological Sex Prediction", "abstract": "I present a novel machine learning approach to predict sex in the bioarchaeological record. Eighteen cranial interlandmark distances and five maxillary dental metric distances were recorded from n = 420 human skeletons from the necropolises at Alfedena (600\u2013400 BCE) and Campovalano (750\u2013200 BCE and 9\u201311th Centuries CE) in central Italy. A generalized low rank model (GLRM) was used to impute missing data and Area under the Curve\u2014Receiver Operating Characteristic (AUC-ROC) with 20-fold stratified cross-validation was used to evaluate predictive performance of eight machine learning algorithms on different subsets of the data. Additional perspectives such as this one show strong potential for sex prediction in bioarchaeological and forensic anthropological contexts. Furthermore, GLRMs have the potential to handle missing data in ways previously unexplored in the discipline. Although results of this study look promising (highest AUC-ROC = 0.9722 for predicting binary male/female sex), the main limitation is that the sexes of the individuals included were not known but were estimated using standard macroscopic bioarchaeological methods. However, future research should apply this machine learning approach to known-sex reference samples in order to better understand its value, along with the more general contributions that machine learning can make to the reconstruction of past human lifeways.", "venue": "", "year": 2021, "referenceCount": 76, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-01", "journal": {"volume": "9", "pages": "23", "name": ""}, "authors": [{"authorId": "52401892", "name": "Evan Muzzall"}]}, {"paperId": "8fc05add40562a0f4a6cdac341b011956e04334f", "externalIds": {"MAG": "3155307806", "DOI": "10.1214/20-STS780", "CorpusId": 211267450}, "url": "https://www.semanticscholar.org/paper/8fc05add40562a0f4a6cdac341b011956e04334f", "title": "Noncommutative Probability and Multiplicative Cascades", "abstract": "Various aspects of standard model particle physics might be explained by a suitably rich algebra acting on itself, as suggested by Furey (2015). The present paper develops the asymptotics of large causal tree diagrams that combine freely independent elements in such an algebra. The Mar\u010denko\u2013Pastur law and Wigner\u2019s semicircle law are shown to emerge as limits of normalized sum-over-paths of nonnegative elements assigned to the edges of causal trees. These results are established in the setting of noncommutative probability. Trees with classically independent positive edge weights (random multiplicative cascades) were originally proposed by Mandelbrot as a model displaying the fractal features of turbulence. The novelty of the present work is the use of noncommutative (free) probability to allow the edge weights to take values in an algebra. An application to theoretical neuroscience is also discussed.", "venue": "Statistical Science", "year": 2021, "referenceCount": 47, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-01", "journal": {"name": "Statistical Science"}, "authors": [{"authorId": "2626305", "name": "I. McKeague"}]}, {"paperId": "23bacae8a434177f99822ed4fb91e784f59b57ba", "externalIds": {"DBLP": "journals/caaitrit/LiHG21", "MAG": "3149514201", "DOI": "10.1049/CIT2.12035", "CorpusId": 233610766}, "url": "https://www.semanticscholar.org/paper/23bacae8a434177f99822ed4fb91e784f59b57ba", "title": "Why AI still doesn't have consciousness?", "abstract": "Consciousness is one of the unique features of creatures, and is also the root of biological intelligence. Up to now, all machines and robots haven\u2019t had consciousness. Then, will the artificial intelligence (AI) be conscious? Will robots have real intelligence without consciousness? The most primitive consciousness is the perception and expression of self \u2010 existence. In order to perceive the existence of the concept of \u2018I\u2019, a creature must first have a perceivable boundary such as skin to separate \u2018I\u2019 from \u2018non \u2010 I\u2019. For robots, to have the self \u2010 awareness, they also need to be wrapped by a similar sensory membrane. Nowadays, as intelligent tools, AI systems should also be regarded as the external extension of human intelligence. These tools are unconscious. The development of AI shows that intelligence can exist without consciousness. When human beings enter into the era of life intelligence from AI, it is not the AI became conscious, but that conscious lives will have strong AI. Therefore, it becomes more necessary to be careful on applying AI to living creatures, even to those lower \u2010 level animals with only consciousness. The subversive revolution of such application may produce more careful thinking.", "venue": "CAAI Trans. Intell. Technol.", "year": 2021, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-31", "journal": {"volume": "6", "pages": "175-179", "name": "CAAI Trans. Intell. Technol."}, "authors": [{"authorId": "1686319", "name": "Deyi Li"}, {"authorId": "2087684730", "name": "Wen He"}, {"authorId": "2179965463", "name": "Yike Guo"}]}, {"paperId": "9fd758b904d328ee316bbbd01ded9a9b7db11cfe", "externalIds": {"MAG": "3164361795", "DOI": "10.1590/1981-5344/3554", "CorpusId": 236679385}, "url": "https://www.semanticscholar.org/paper/9fd758b904d328ee316bbbd01ded9a9b7db11cfe", "title": "De Leibniz \u00e0s m\u00e1quinas sociais: uma vis\u00e3o hist\u00f3rica do surgimento dos agentes inteligentes de informa\u00e7\u00e3o sob a \u00f3tica da ci\u00eancia da informa\u00e7\u00e3o", "abstract": "Tem como objetivo investigar o contexto historico do desenvolvimento das ideias que culminaram com o surgimento dos agentes de mineracao. Pressupoe, hoje, que cerca de metade da informacao processada na Internet e feita por agentes o que estimula uma discussao sobre o papel dos bots na contemporaneidade, bem como da relacao destes com pessoas e seus dados. A justificativa deste trabalho se da pela observacao do cenario atual em que tais agentes ja interagem com as pessoas e pelo distanciamento, presumido, do objeto de estudo que resulta na escassez de publicacoes a partir da CI. Apresenta como as necessidades informacionais que impulsionaram o surgimento da Ciencia da Informacao tambem inspiraram a criacao dos agentes de mineracao. O Procedimento metodologico utilizado foi uma revisao bibliografica que parte do desejo de Leibniz em criar o Calculus Ratiocinator e segue ate a contempor\u00e2nea teoria das Maquinas Sociais. Sugere como conclusao, por um lado, que a CI ja desenvolveu o seu olhar sobre a evolucao dos Agentes de Mineracao, que a principio era atribuida, apenas, a logica e matematica, e por outro lado articular estas desconexas e esparsas visoes dos contextos proprios dos agentes de mineracao.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-03-31", "journal": {"volume": "26", "pages": "133-156", "name": "Perspectivas Em Ciencia Da Informacao"}, "authors": [{"authorId": "2579311", "name": "C. Santana"}, {"authorId": "144802402", "name": "Camila Oliveira Lima"}, {"authorId": "116444344", "name": "Amanda Almeida Nunes"}]}, {"paperId": "f2e4c984d1ec493b6b07fe67cdc9bd8b265dfaae", "externalIds": {"MAG": "3146051161", "DOI": "10.1007/s00348-021-03180-0", "CorpusId": 233577915}, "url": "https://www.semanticscholar.org/paper/f2e4c984d1ec493b6b07fe67cdc9bd8b265dfaae", "title": "Pulsed jet phase-averaged flow field estimation based on neural network approach", "abstract": null, "venue": "Experiments in Fluids", "year": 2021, "referenceCount": 61, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-31", "journal": {"volume": "62", "name": "Experiments in Fluids"}, "authors": [{"authorId": "2088039239", "name": "C\u00e9letin Ott"}, {"authorId": "119445131", "name": "C. Pivot"}, {"authorId": "117840049", "name": "Pierre Dubois"}, {"authorId": "32476657", "name": "Q. Gallas"}, {"authorId": "72393993", "name": "J. Delva"}, {"authorId": "38907351", "name": "M. Lippert"}, {"authorId": "92113860", "name": "L. Keirsbulck"}]}, {"paperId": "5fe0159eb024ae8ec331b2733ecbecf717b6f6fc", "externalIds": {"DOI": "10.1109/WiDSTaif52235.2021.9430234", "CorpusId": 235208513}, "url": "https://www.semanticscholar.org/paper/5fe0159eb024ae8ec331b2733ecbecf717b6f6fc", "title": "An investigation into the Impact of Artificial Intelligence on the Future of Project Management", "abstract": "The purpose of the study is to investigate the impact of Artificial Intelligence on the future of Project Management. This study provides detailed conceptual information about Artificial Intelligence and different perspectives. Artificial Intelligence is defined as the new technical discipline, which would develop an application system, a technological method in order to simulate the expansion and extension of human intelligence. This research is a review that discusses how artificial intelligence affects project management. The paper has discussed various benefits of AI adoption and its implementation. The results show that technology and AI cannot replace the human mind. Machine and other AI robots can automate tools and tasks, but at the end of the day, machines need human help to operate and monitor.", "venue": "2021 International Conference of Women in Data Science at Taif University (WiDSTaif )", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2021-03-30", "journal": {"pages": "1-4", "name": "2021 International Conference of Women in Data Science at Taif University (WiDSTaif )"}, "authors": [{"authorId": "2105732438", "name": "Asma Alshaikhi"}, {"authorId": "1917077", "name": "Mashael M Khayyat"}]}, {"paperId": "fbef63c0c26ee1ad04e773179b4dd35cad2f0f10", "externalIds": {"PubMedCentral": "8902029", "MAG": "3134535041", "DOI": "10.1177/1745691621997113", "CorpusId": 236714691, "PubMed": "34730453"}, "url": "https://www.semanticscholar.org/paper/fbef63c0c26ee1ad04e773179b4dd35cad2f0f10", "title": "Why Evolutionary Psychology Should Abandon Modularity", "abstract": "A debate surrounding modularity\u2014the notion that the mind may be exclusively composed of distinct systems or modules\u2014has held philosophers and psychologists captive for nearly 40 years. Concern about this thesis\u2014which has come to be known as the massive modularity debate\u2014serves as the primary grounds for skepticism of evolutionary psychology\u2019s claims about the mind. In this article we argue that the entirety of this debate, and the very notion of massive modularity itself, is ill-posed and confused. In particular, it is based on a confusion about the level of analysis (or reduction) at which one is approaching the mind. Here we provide a framework for clarifying at what level of analysis one is approaching the mind and explain how a systemic failure to distinguish between different levels of analysis has led to profound misunderstandings of not only evolutionary psychology but also of the entire cognitivist enterprise of approaching the mind at the level of the mechanism. We furthermore suggest that confusions between different levels of analysis are endemic throughout the psychological sciences\u2014extending well beyond issues of modularity and evolutionary psychology. Therefore, researchers in all areas should take preventive measures to avoid this confusion in the future.", "venue": "Perspectives on psychological science : a journal of the Association for Psychological Science", "year": 2021, "referenceCount": 191, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-29", "journal": {"volume": "17", "pages": "465 - 490", "name": "Perspectives on Psychological Science"}, "authors": [{"authorId": "6110283", "name": "D. Pietraszewski"}, {"authorId": "6240574", "name": "Annie E. Wertz"}]}, {"paperId": "28ec33e7813f37dc25d2daa51be307594c7552b4", "externalIds": {"ArXiv": "2103.15739", "DBLP": "journals/corr/abs-2103-15739", "DOI": "10.33965/ict2021_202106r031", "CorpusId": 232417683}, "url": "https://www.semanticscholar.org/paper/28ec33e7813f37dc25d2daa51be307594c7552b4", "title": "Automation: An Essential Component Of Ethical AI?", "abstract": "Ethics is sometimes considered to be too abstract to be meaningfully implemented in artificial intelligence (AI). In this paper, we reflect on other aspects of computing that were previously considered to be very abstract. Yet, these are now accepted as being done very well by computers. These tasks have ranged from multiple aspects of software engineering to mathematics to conversation in natural language with humans. This was done by automating the simplest possible step and then building on it to perform more complex tasks. We wonder if ethical AI might be similarly achieved and advocate the process of automation as key step in making AI take ethical decisions. The key contribution of this paper is to reflect on how automation was introduced into domains previously considered too abstract for computers.", "venue": "Proceedings 14th International Conference on ICT, Society and Human Beings (ICT 2021), the 18th International Conference Web Based Communities and Social Media (WBC 2021)", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-03-29", "journal": {"volume": "abs/2103.15739", "name": "ArXiv"}, "authors": [{"authorId": "1889245", "name": "Vivek Nallur"}, {"authorId": "2055353180", "name": "Martin Lloyd"}, {"authorId": "144968698", "name": "Siani Pearson"}]}, {"paperId": "4ef16f82648d85c80056511baf724eb2634539ce", "externalIds": {"DBLP": "journals/corr/abs-2103-15294", "ArXiv": "2103.15294", "CorpusId": 232404428}, "url": "https://www.semanticscholar.org/paper/4ef16f82648d85c80056511baf724eb2634539ce", "title": "\"Weak AI\" is Likely to Never Become \"Strong AI\", So What is its Greatest Value for us?", "abstract": "AI has surpassed humans across a variety of tasks such as image classification, playing games (e.g., go, \u201cStarcraft\u201d and poker), and protein structure prediction. However, at the same time, AI is also bearing serious controversies. Many researchers argue that little substantial progress has been made for AI in recent decades. In this paper, the author (1) explains why controversies about AI exist; (2) discriminates two paradigms of AI research, termed \u201cweak AI\u201d and \u201cstrong AI\u201d (a.k.a. artificial general intelligence); (3) clarifies how to judge which paradigm a research work should be classified into; (4) discusses what is the greatest value of \u201cweak AI\u201d if it has no chance to develop into \u201cstrong AI\u201d.", "venue": "ArXiv", "year": 2021, "referenceCount": 39, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-29", "journal": {"volume": "abs/2103.15294", "name": "ArXiv"}, "authors": [{"authorId": "48265485", "name": "B. Liu"}]}, {"paperId": "b33f5e9e16b31ab32d701325b7e7e6647265ed93", "externalIds": {"MAG": "3148087028", "DBLP": "journals/mj/LiLZQL21", "DOI": "10.1016/J.MEJO.2021.105044", "CorpusId": 233687143}, "url": "https://www.semanticscholar.org/paper/b33f5e9e16b31ab32d701325b7e7e6647265ed93", "title": "Achievements, challenges, and developing directions of bio-inspired self-repairing technology", "abstract": null, "venue": "Microelectron. J.", "year": 2021, "referenceCount": 74, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-27", "journal": {"volume": "111", "pages": "105044", "name": "Microelectron. J."}, "authors": [{"authorId": "2108506145", "name": "Duo Li"}, {"authorId": "48031735", "name": "Xiubin Liu"}, {"authorId": "35260345", "name": "Qingqi Zhuo"}, {"authorId": "3420981", "name": "Yanling Qian"}, {"authorId": "2000883360", "name": "Yue Li"}]}, {"paperId": "e95b050d162d87931e2cd32f9e775f15eac450cf", "externalIds": {"MAG": "3138644744", "DOI": "10.3390/MATH9060681", "CorpusId": 233638584}, "url": "https://www.semanticscholar.org/paper/e95b050d162d87931e2cd32f9e775f15eac450cf", "title": "Black-Box-Based Mathematical Modelling of Machine Intelligence Measuring", "abstract": "Current machine intelligence metrics rely on a different philosophy, hindering their effective comparison. There is no standardization of what is machine intelligence and what should be measured to quantify it. In this study, we investigate the measurement of intelligence from the viewpoint of real-life difficult-problem-solving abilities, and we highlight the importance of being able to make accurate and robust comparisons between multiple cooperative multiagent systems (CMASs) using a novel metric. A recent metric presented in the scientific literature, called MetrIntPair, is capable of comparing the intelligence of only two CMASs at an application. In this paper, we propose a generalization of that metric called MetrIntPairII. MetrIntPairII is based on pairwise problem-solving intelligence comparisons (for the same problem, the problem-solving intelligence of the studied CMASs is evaluated experimentally in pairs). The pairwise intelligence comparison is proposed to decrease the necessary number of experimental intelligence measurements. MetrIntPairII has the same properties as MetrIntPair, with the main advantage that it can be applied to any number of CMASs conserving the accuracy of the comparison, while it exhibits enhanced robustness. An important property of the proposed metric is the universality, as it can be applied as a black-box method to intelligent agent-based systems (IABSs) generally, not depending on the aspect of IABS architecture. To demonstrate the effectiveness of the MetrIntPairII metric, we provide a representative experimental study, comparing the intelligence of several CMASs composed of agents specialized in solving an NP-hard problem.", "venue": "Mathematics", "year": 2021, "referenceCount": 85, "citationCount": 4, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-22", "journal": {"name": "Mathematics"}, "authors": [{"authorId": "2983864", "name": "L\u00e1szl\u00f3 Barna Iantovics"}]}, {"paperId": "eb266c80be4904a62ca29d1ba8511e4129cc49f0", "externalIds": {"DOI": "10.1016/j.jcct.2021.03.006", "CorpusId": 233027364, "PubMed": "33812855"}, "url": "https://www.semanticscholar.org/paper/eb266c80be4904a62ca29d1ba8511e4129cc49f0", "title": "Artificial intelligence in cardiovascular CT: Current status and future implications.", "abstract": null, "venue": "Journal of cardiovascular computed tomography", "year": 2021, "referenceCount": 51, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-03-22", "journal": {"name": "Journal of cardiovascular computed tomography"}, "authors": [{"authorId": "81728867", "name": "A. Lin"}, {"authorId": "6747995", "name": "M\u00e1rton Kolossv\u00e1ry"}, {"authorId": "144511973", "name": "M. Motwani"}, {"authorId": "3165444", "name": "I. I\u0161gum"}, {"authorId": "1387468728", "name": "P. Maurovich-Horvat"}, {"authorId": "3106896", "name": "P. Slomka"}, {"authorId": "2596578", "name": "D. Dey"}]}, {"paperId": "13bc29dba1f721e06448390889a3618344d7cc9f", "externalIds": {"MAG": "3139427787", "DOI": "10.36592/9786587424620.455-472", "CorpusId": 233627777}, "url": "https://www.semanticscholar.org/paper/13bc29dba1f721e06448390889a3618344d7cc9f", "title": "MANAGEMENT OF ARTIFICIAL INTELLIGENCE IN BRAZIL IN THE FACE OF THE CONSTITUTIONAL LEGAL TREATY OF THE DIGITAL ENVIRONMENT", "abstract": "Having as central objective of their research the idea of making computers \"think\" exactly like humans, creating analysis, reasoning, understanding and obtaining answers for different situations, artificial intelligence has its management in Brazil linked to the legal protection of forms of expression, ways of creating, doing and living, as well as scientific, artistic and mainly technological creations carried out with the help of computers and other electronic components, observing the provisions of the rules of social communication determined by the Federal Constitution. Thus, the management of artificial intelligence in Brazil is necessarily subject to the constitutional legal protection that targets the digital environment established within the scope of our positive law in the face of the duties, rights, obligations and regime inherent in the manifestation of thought, creation, expression and information provided by the human person with the help of computers (article 220 of the Federal Constitution) within the full exercise of the cultural rights granted to Brazilians and foreigners residing in the country (articles 215 and 5 of the Constitution) guided by the fundamental Trabalho/palestra elaborada vinculada ao convite recebido para palestrar no Dialogues & Integration The 1st International Conference on Humanities Transformation: Technology, Assessment, Management October 10-12, 2019 Shanghai Jiao Tong University/Shanghai, China * Active lawyer in the area of environmental business law, professor of Environmental Law in Brazil and doctor and master in Social Relations Law. Permanent Professor of the Master's Program in Law of UNINOVE-SP (BRAZIL). Leader of the CNPq Research Group of Legal Tutors of Companies before the Constitutional Environmental Law UNINOVE. _330________RJLB, Ano 5 (2019), no 6 principles of the Federal Constitution 1st to 4th).", "venue": "", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-21", "journal": {"volume": "", "pages": "455-472", "name": ""}, "authors": [{"authorId": "108761908", "name": "C. Fiorillo"}]}, {"paperId": "982cbf7fcee4f3964dd1d411fdeadad6e6f1d465", "externalIds": {"ArXiv": "2103.10685", "DBLP": "conf/kdd/ZouYZYYT21", "DOI": "10.1145/3447548.3467418", "CorpusId": 232290492}, "url": "https://www.semanticscholar.org/paper/982cbf7fcee4f3964dd1d411fdeadad6e6f1d465", "title": "Controllable Generation from Pre-trained Language Models via Inverse Prompting", "abstract": "Large-scale pre-trained language models have demonstrated strong capabilities of generating realistic texts. However, it remains challenging to control the generation results. Previous approaches such as prompting are far from sufficient, and lack of controllability limits the usage of language models. To tackle this challenge, we propose an innovative method, inverse prompting, to better control text generation. The core idea of inverse prompting is to use generated text to inversely predict the prompt during beam search, which enhances the relevance between the prompt and the generated text and thus improves controllability. Empirically, we pre-train a large-scale Chinese language model to perform a systematic study using human evaluation on the tasks of open-domain poem generation and open-domain long-form question answering. Results demonstrate that our proposed method substantially outperforms the baselines and that our generation quality is close to human performance on some of the tasks.", "venue": "Knowledge Discovery and Data Mining", "year": 2021, "referenceCount": 52, "citationCount": 24, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2021-03-19", "journal": {"name": "Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining"}, "authors": [{"authorId": "46927790", "name": "Xu Zou"}, {"authorId": "2075292864", "name": "Da Yin"}, {"authorId": "51211976", "name": "Qingyang Zhong"}, {"authorId": "38385080", "name": "Hongxia Yang"}, {"authorId": "2109512754", "name": "Zhilin Yang"}, {"authorId": "2109541439", "name": "Jie Tang"}]}, {"paperId": "53f45680ffaaf4a644ee74332103c7107df9cbe5", "externalIds": {"ArXiv": "2103.11961", "DBLP": "journals/corr/abs-2103-11961", "CorpusId": 232307135}, "url": "https://www.semanticscholar.org/paper/53f45680ffaaf4a644ee74332103c7107df9cbe5", "title": "Artificial Intelligence Narratives: An Objective Perspective on Current Developments", "abstract": "This work provides a starting point for researchers interested in gaining a deeper understanding of the big picture of artificial intelligence (AI). To this end, a narrative is conveyed that allows the reader to develop an objective view on current developments that is free from false promises that dominate public communication. An essential takeaway for the reader is that AI must be understood as an umbrella term encompassing a plethora of different methods, schools of thought, and their respective historical movements. Consequently, a bottom-up strategy is pursued in which the field of AI is introduced by presenting various aspects that are characteristic of the subject. This paper is structured in three parts: (i) Discussion of current trends revealing false public narratives, (ii) an introduction to the history of AI focusing on recurring patterns and main characteristics, and (iii) a critical discussion on the limitations of current methods in the context of the potential emergence of a strong(er) AI. It should be noted that this work does not cover any of these aspects holistically; rather, the content addressed is a selection made by the author and subject to a didactic strategy. 1 Today\u2019s Perspectives on AI Undoubtedly, advances in AI have enormous implications on societies, politics, and industries, which has resulted in an increasing attention over the past few years. The tremendous value from leveraging AI-based approaches is becoming more and more apparent in a wide variety of different areas, such as (i) drug discovery in medicine (an example is given by Ramsundar et al. [1]), (ii) theoretical research where AI allows to systematically search hypothesis space to find unbiased, repeatable, and optimal results based on big data sets (for instance, see [2]), or (iii) transportation where researchers strive for fully autonomous driving [3]. Especially data-driven technologies are already transforming entire industries by improving processes or paving the way for fundamentally new business models [4]. It\u2019s worth noting that the huge popularity of AI is fueled by the fact that the world\u2019s most successful companies sit on enormous data lakes of mostly personal data, forming powerful monopolies changing the way we live (GoogleTM, FacebookTM, or AmazonTM). Commercially viable business models are typically built on exceedingly narrow models to be competitive as similar to humans specialization usually leads to superior performance. Products from big tech corporates are ubiquitous in our everyday lives and may have led to a widespread misunderstanding of what AI is. Truth to be told, it is exceptionally difficult to define the term intelligence on its own, which naturally also applies to the term (AI). To complicate comprehension of the term \"AI\" even further, the societal view of AI is taken ad absurdum by unscientific debates or science fiction [5]. In addition, one can often observe unrealistic product advertisement when new products based on ordinary software development are sold as being based on advanced AI techniques, as \"AI\" is currently a very marketable keyword. Besides the confusion that is conveyed by public communication, the field of AI is difficult to understand as it comprises a wide variety of different schools of thought and methodologies. Furthermore, the public discussion is dominated by extremes. On the one hand, AI evangelists appear who \u2217primary contact: noah.klarmann@tum.de ar X iv :2 10 3. 11 96 1v 1 [ cs .A I] 1 8 M ar 2 02 1 Artificial Intelligence Narratives: An Objective Perspective on Current Developments push away any concerns. On the other hand, there are people who advocate an overly skeptical view on AI; for example, by portraying a dystopian world in which robots enslave humanity. It is obvious that all these mechanisms inevitably have an enormous impact on the way AI is viewed today. For instance, young people of generations \"Y\" and \"Z\" mostly associate AI with business models from big tech companies that exploit AI, as this is the most visible aspect of their lifetime to date. At the same time, individuals from the \"Boomer\" and \"X\" generations are possibly more skeptical about current developments in AI, primarily due to two distinct aspects that characterized the field of AI in the 20th century: (i) Reaching milestones usually caused disappointment when the anticipated technological revolution did not occur. For example, IBM\u2019s Deep Blue defeated the world grandmaster Garri Kasparov in 1997 [6] that lead to great attention in the scientific world and also beyond. Apparently, it was a great surprise to the public when the agent that is able to master such an intellectual task as chess would not made a good lawyer or taxi driver. (ii) It has happened several times that entire industries with questionable AI-based business models have perished when high expectations led to disappointment among society and stakeholders as extravagant promises remained unfulfilled. Although skepticism and misconceptions are evident, AI is undoubtedly playing an increasingly important role in our daily lives, leading to growing concerns about privacy [7], security [8], fairness [9], or the threat posed by autonomous military agents [10]. Consequently, regulation and standardization of AI methods are crucial to constrain the development in a way that corresponds to mankind\u2019s expectations [11, 12]. In this context, two concerns commonly appear: (i) Higher degrees of automation are associated with job losses as machines substitute human labor. In fact, a survey among researchers revealed a predicted chance of 50% that AI will be superior to human in almost every task within the next 42 years (until 2063) and could replace all human labor within the next 117 years (by 2138) [13]. However, it should be noted that substituted jobs do not necessarily lead to unemployment in the short term. Miller and Atkinson [14] advocate that the \"job loss\" argument is based on a common fallacy, namely the claim that the number of jobs decreases with increasing automation/productivity. In history however, no correlation between productivity and unemployment can be identified. The wrong assumption of job losses is based on the hypothesis that there is a limit amount of labor that does not rise with increasing productivity. This is a wrong assumption as savings due to increased productivity recycles back to economy, rising the demand for products that in turn lead to more jobs. In addition, new jobs are also created in the prospering automation/AI industry [14]. It is worth noting that a major risk for industrial ecosystems is to refuse the highest possible level of automation, as this would lead to a loss of competitiveness. (ii) A second often raised issue is that advanced techniques are black-box models and hence, cannot be controlled and might sooner or later emerge towards something with an own will (see for instance [11]). While it is true that many of the currently used methods are black-box models (for example, machine learning), they are by no means self-organizing or emergent (yet). It is also worth noting that significant efforts are being made by researchers to develop explainable AI to make use of machine learning with more caution (especially in safety-critical areas such as autonomous driving or in the medical field) or to derive knowledge from machine learning models (an overview on this topic can be found by Tjoa and Guan [15]). Despite the great success in employing AI methods, there is a significant lack of understanding in society, as well as among scientists. To this end, this paper provides an objective overview of the field of AI by addressing the most important characteristics. The author is convinced that this bottom-up approach (starting from what AI encompasses) is the best strategy from a didactic point of view. The alternative (a topdown approach) would imply to introduce a high-level definition that has to be exceedingly broad/complex and would hence be difficult to formulate/understand. In the next section, an introduction to the history of AI is given. Different eras that were prevalent in the past as well as important events, such as Milestones, are presented. A look at the recent past shows that trends in AI are often temporary, may change significantly over time, were adopted by other methods, or branch into different disciplines. In the subsequent section, an outlook on possible future developments is given. 2 Characteristics of AI history A brief introduction to the history of AI is provided in this section. Besides conveying known facts, main characteristics of AI are presented to support the reader in the comprehension of current developments and to derive possible scenarios for the future. On a high level, the history of AI can be categorized into four phases, as shown in Figure 1. The four phases differ primarily in the contemporary conceptions of the respective researchers regarding the best approach that could eventually lead to higher intelligence. Furthermore, Figure 2 shows a detailed timeline of the history of AI with a selection of different milestones and events. The first phase in Figure 1 Cybernetics (mainly between 1943 1955) can be seen as the pioneering stage before AI emerged. Cybernetics is defined as the study of the fundamentals of the control and communication in animals and machines [18]. To this end, closed control loops are assumed where an agent acts on an environment to reach a goal based on", "venue": "ArXiv", "year": 2021, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-03-18", "journal": {"volume": "abs/2103.11961", "name": "ArXiv"}, "authors": [{"authorId": "97379694", "name": "Noah Klarmann"}]}, {"paperId": "a6985f9f41b7168f6ea6f72ca83987ba769c6b9b", "externalIds": {"PubMedCentral": "7968615", "MAG": "3168412082", "DOI": "10.1007/978-3-030-69978-9_4", "CorpusId": 232294716}, "url": "https://www.semanticscholar.org/paper/a6985f9f41b7168f6ea6f72ca83987ba769c6b9b", "title": "Ethical Issues of AI", "abstract": null, "venue": "Artificial Intelligence for a Better Future", "year": 2021, "referenceCount": 70, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-03-18", "journal": {"pages": "35 - 53", "name": "Artificial Intelligence for a Better Future"}, "authors": [{"authorId": "1792014", "name": "B. Stahl"}]}, {"paperId": "c40217c9c4810c932d978100b276b41491423b2b", "externalIds": {"MAG": "3138442062", "DOI": "10.1057/S41272-021-00319-W", "CorpusId": 233641994}, "url": "https://www.semanticscholar.org/paper/c40217c9c4810c932d978100b276b41491423b2b", "title": "Artificial Intelligence in travel", "abstract": null, "venue": "", "year": 2021, "referenceCount": 9, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-17", "journal": {"volume": "20", "pages": "368-375", "name": "Journal of Revenue and Pricing Management"}, "authors": [{"authorId": "145936404", "name": "B. Vinod"}]}, {"paperId": "350ef3164aa44e3e795efe9df52af15afb143b59", "externalIds": {"MAG": "3137364963", "DOI": "10.1002/aelm.202001241", "CorpusId": 233699986}, "url": "https://www.semanticscholar.org/paper/350ef3164aa44e3e795efe9df52af15afb143b59", "title": "Phase Change Random Access Memory for Neuro\u2010Inspired Computing", "abstract": "Neuro\u2010inspired computing using emerging memristors plays an increasingly significant role for the realization of artificial intelligence and thus has attracted widespread interest in the era of big data. Thanks to the maturity of technology and the superiority of device performance, phase change random access memory (PCRAM) is a promising candidate for both nonvolatile memories and neuro\u2010inspired computing. Recently many efforts have been carried out to achieve the biological behavior using PCRAM and to clarify the related working mechanism. In order to further improve device performances, it is helpful and urgent to summarize and discuss the PCRAM solution for neuro\u2010inspired computing. In this paper, fundamentals, principles, recent progresses, existing challenges, and mainstream solutions are reviewed, and a brief outlook is highlighted and introduced, with the expectation to expound future directions.", "venue": "Advanced Electronic Materials", "year": 2021, "referenceCount": 130, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-03-17", "journal": {"volume": "7", "name": "Advanced Electronic Materials"}, "authors": [{"authorId": "2183630570", "name": "Qiang Wang"}, {"authorId": "49048716", "name": "G. Niu"}, {"authorId": "2053309127", "name": "Wei Ren"}, {"authorId": "2108695004", "name": "Ruobing Wang"}, {"authorId": "2116081043", "name": "Xiaogang Chen"}, {"authorId": "2116226810", "name": "Xi Li"}, {"authorId": "145377919", "name": "Z. Ye"}, {"authorId": "47779252", "name": "Yahong Xie"}, {"authorId": "3873053", "name": "Sannian Song"}, {"authorId": "145395766", "name": "Zhitang Song"}]}, {"paperId": "047c5da68b8f2a47ad64caccf6e5c026673543fc", "externalIds": {"DOI": "10.3389/fevo.2021.650726", "CorpusId": 232234325}, "url": "https://www.semanticscholar.org/paper/047c5da68b8f2a47ad64caccf6e5c026673543fc", "title": "Living Things Are Not (20th Century) Machines: Updating Mechanism Metaphors in Light of the Modern Science of Machine Behavior", "abstract": "One of the most useful metaphors for driving scientific and engineering progress has been that of the \u201cmachine.\u201d Much controversy exists about the applicability of this concept in the life sciences. Advances in molecular biology have revealed numerous design principles that can be harnessed to understand cells from an engineering perspective, and build novel devices to rationally exploit the laws of chemistry, physics, and computation. At the same time, organicists point to the many unique features of life, especially at larger scales of organization, which have resisted decomposition analysis and artificial implementation. Here, we argue that much of this debate has focused on inessential aspects of machines \u2013 classical properties which have been surpassed by advances in modern Machine Behavior and no longer apply. This emerging multidisciplinary field, at the interface of artificial life, machine learning, and synthetic bioengineering, is highlighting the inadequacy of existing definitions. Key terms such as machine, robot, program, software, evolved, designed, etc., need to be revised in light of technological and theoretical advances that have moved past the dated philosophical conceptions that have limited our understanding of both evolved and designed systems. Moving beyond contingent aspects of historical and current machines will enable conceptual tools that embrace inevitable advances in synthetic and hybrid bioengineering and computer science, toward a framework that identifies essential distinctions between fundamental concepts of devices and living agents. Progress in both theory and practical applications requires the establishment of a novel conception of \u201cmachines as they could be,\u201d based on the profound lessons of biology at all scales. We sketch a perspective that acknowledges the remarkable, unique aspects of life to help re-define key terms, and identify deep, essential features of concepts for a future in which sharp boundaries between evolved and designed systems will not exist.", "venue": "Frontiers in Ecology and Evolution", "year": 2021, "referenceCount": 188, "citationCount": 25, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-16", "journal": {"volume": "9"}, "authors": [{"authorId": "7373730", "name": "J. Bongard"}, {"authorId": "145616961", "name": "M. Levin"}]}, {"paperId": "9e59899c6e1bb1b512b5e3728e1584fba80b69cf", "externalIds": {"MAG": "3134075441", "DOI": "10.1108/978-1-83909-694-520211003", "CorpusId": 233664722}, "url": "https://www.semanticscholar.org/paper/9e59899c6e1bb1b512b5e3728e1584fba80b69cf", "title": "Intelligent Applications in the Modern Sales Organization", "abstract": "Applications powered by artificial intelligence (AI) and machine learning (ML) have become a crucial factor for success in modern sales organizations. This chapter investigates how Salesforce achieves scalable AI for businesses of all sizes and explores sales applications of AI and machine learning that are most common across industries. It is divided into three sections. The first section gives an introduction to AI and machine learning. The second section shows how data and automated machine learning models provide the foundation for AI applications and explains how Salesforce achieves scalable AI and machine learning for business applications. The third section demonstrates how AI applications impact the modern sales organization and the work of sales representatives. AI does not replace humans; it allows sales organizations to better engage with prospects and customers. Sales representatives using AI outperform their counterparts that rely purely on traditional methods.", "venue": "", "year": 2021, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-15", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2088248900", "name": "Gilberto Picareta"}, {"authorId": "2087564217", "name": "Eugenie Weissheim"}, {"authorId": "2087564040", "name": "Martin Kl\u00f6hn"}]}, {"paperId": "14e8bd16197056021613bfd55c136776d320d4b9", "externalIds": {"MAG": "3137457055", "DOI": "10.1177/1461444821993801", "CorpusId": 233672302}, "url": "https://www.semanticscholar.org/paper/14e8bd16197056021613bfd55c136776d320d4b9", "title": "The perception of humanness in conversational journalism: An algorithmic information-processing perspective", "abstract": "How much do anthropomorphisms influence the perception of users about whether they are conversing with a human or an algorithm in a chatbot environment? We develop a cognitive model using the constructs of anthropomorphism and explainability to explain user experiences with conversational journalism (CJ) in the context of chatbot news. We examine how users perceive anthropomorphic and explanatory cues, and how these stimuli influence user perception of and attitudes toward CJ. Anthropomorphic explanations of why and how certain items are recommended afford users a sense of humanness, which then affects trust and emotional assurance. Perceived humanness triggers a two-step flow of interaction by defining the baseline to make a judgment about the qualities of CJ and by affording the capacity to interact with chatbots concerning their intention to interact with chatbots. We develop practical implications relevant to chatbots and ascertain the significance of humanness as a social cue in CJ. We offer a theoretical lens through which to characterize humanness as a key mechanism of human\u2013artificial intelligence (AI) interaction, of which the eventual goal is humans perceive AI as human beings. Our results help to better understand human\u2013chatbot interaction in CJ by illustrating how humans interact with chatbots and explaining why humans accept the way of CJ.", "venue": "New Media & Society", "year": 2021, "referenceCount": 50, "citationCount": 20, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-12", "journal": {"volume": "24", "pages": "2680 - 2704", "name": "New Media & Society"}, "authors": [{"authorId": "2149547874", "name": "Donghee Shin"}]}, {"paperId": "fa2b4b704ba4fabb93548c5e3595f26f726221f9", "externalIds": {"MAG": "3157605529", "DOI": "10.1002/9781119634140.CH10", "CorpusId": 235589290}, "url": "https://www.semanticscholar.org/paper/fa2b4b704ba4fabb93548c5e3595f26f726221f9", "title": "AI AND MACHINE LEARNING MODELING", "abstract": null, "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-08", "journal": {"volume": "", "pages": "235-249", "name": ""}, "authors": [{"authorId": "2143747140", "name": "Amit Gupta"}, {"authorId": "4339803", "name": "F. Zhu"}]}, {"paperId": "281b4a7e7fb057d8266ec0610888905c46fd715d", "externalIds": {"ArXiv": "2110.04984", "DBLP": "journals/corr/abs-2103-03125", "CorpusId": 232110776}, "url": "https://www.semanticscholar.org/paper/281b4a7e7fb057d8266ec0610888905c46fd715d", "title": "Advances in Multi-turn Dialogue Comprehension: A Survey", "abstract": "Training machines to understand natural language and interact with humans is an elusive and essential task in the field of artificial intelligence. In recent years, a diversity of dialogue systems has been designed with the rapid development of deep learning researches, especially the recent pre-trained language models. Among these studies, the fundamental yet challenging part is dialogue comprehension whose role is to teach the machines to read and comprehend the dialogue context before responding. In this paper, we review the previous methods from the perspective of dialogue modeling. We summarize the characteristics and challenges of dialogue comprehension in contrast to plaintext reading comprehension. Then, we discuss three typical patterns of dialogue modeling that are widely-used in dialogue comprehension tasks such as response selection and conversation questionanswering, as well as dialogue-related language modeling techniques to enhance PrLMs in dialogue scenarios. Finally, we highlight the technical advances in recent years and point out the lessons we can learn from the empirical analysis and the prospects towards a new frontier of researches.", "venue": "ArXiv", "year": 2021, "referenceCount": 106, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-03-04", "journal": {"volume": "abs/2110.04984", "name": "ArXiv"}, "authors": [{"authorId": "3322871", "name": "Zhuosheng Zhang"}, {"authorId": "47941144", "name": "Hai Zhao"}]}, {"paperId": "4de6f9f9b9f19a12ba5d1ee3639007c4951d24eb", "externalIds": {"MAG": "3133620426", "DOI": "10.1177/1075547021998069", "CorpusId": 233790708}, "url": "https://www.semanticscholar.org/paper/4de6f9f9b9f19a12ba5d1ee3639007c4951d24eb", "title": "\u201cSiri, Show Me Scary Images of AI\u201d: Effects of Text-Based Frames and Visuals on Support for Artificial Intelligence", "abstract": "This research note examines how framing influences attitudes toward artificial intelligence (AI). It uses an experiment embedded in a nationally representative online survey to test the effects of text-based frames and visuals on opinion about developing, funding, and banning AI. Participants exposed to a \u201csocial progress\u201d frame reported greater support for AI than those exposed to a \u201cPandora\u2019s box\u201d frame. Images (virtual assistants, personal robots, menacing movie AIs, or none) did not influence opinion by themselves but interacted with textual frames to do so. The results extend our understanding of framing effects on public attitudes toward emerging technologies.", "venue": "", "year": 2021, "referenceCount": 58, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-03-03", "journal": {"volume": "43", "pages": "388 - 401", "name": "Science Communication"}, "authors": [{"authorId": "2005499319", "name": "James Bingaman"}, {"authorId": "11551763", "name": "P. Brewer"}, {"authorId": "146152595", "name": "Ashley Paintsil"}, {"authorId": "1742444222", "name": "David C. Wilson"}]}, {"paperId": "9a188bcf450d40ef85e7c6aabef08c6263165ecc", "externalIds": {"MAG": "3133730873", "DOI": "10.15168/2284-4503-756", "CorpusId": 233455776}, "url": "https://www.semanticscholar.org/paper/9a188bcf450d40ef85e7c6aabef08c6263165ecc", "title": "Artificial and Biological Neurons: Interdisciplinary Issues and Future Perspectives. White Paper", "abstract": "Recent developments in the technological domain have increased the interactions between artificial and natural spheres, leading to a growing interest in the ethical, legal and philosophical implications of AI research. The present paper aims at creating an interdisciplinary discussion on issues raised by the use and the implementation of artificial intelligence algorithms, robotics, and applied solutions in the neuroscience and biotechnology field. Building on the findings of the webinar \u201cWorkshop neuroni artificial e biologici: etica e diritto\u201d, this work explores the issues discussed in the workshop, it attempts to show both the existing challenges and opportunities and it seeks to propose ways forward to overcome some of the investigated problems.", "venue": "", "year": 2021, "referenceCount": 41, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-03", "journal": {"volume": "21", "pages": "353-379", "name": ""}, "authors": [{"authorId": "2035521122", "name": "Davide Bazzanella"}, {"authorId": "146774374", "name": "G. Bincoletto"}, {"authorId": "134377547", "name": "Monica Consolandi"}, {"authorId": "2106052826", "name": "Marta Fasan"}, {"authorId": "49393697", "name": "F. Gennari"}, {"authorId": "1730394478", "name": "Federico C. La Vattiata"}, {"authorId": "2063076216", "name": "Luca Rinaldi"}, {"authorId": "3706983", "name": "Davide Roccaro"}, {"authorId": "2061566259", "name": "Clara Zaccaria"}]}, {"paperId": "b390e8262dd6b744e26145fbf8502f5fdd069277", "externalIds": {"DBLP": "conf/sigcse/FreitasW21", "DOI": "10.1145/3408877.3432530", "CorpusId": 232126309}, "url": "https://www.semanticscholar.org/paper/b390e8262dd6b744e26145fbf8502f5fdd069277", "title": "I'm Going to Learn What?!?: Teaching Artificial Intelligence to Freshmen in an Introductory Computer Science Course", "abstract": "As artificial intelligence (AI) becomes more widely utilized, there is a need for non-computer scientists to understand 1) how the technology works, and 2) how it can impact their lives. Currently, however, computer science educators have been reluctant to teach AI to non-majors out of concern that the topic is too advanced. To fill this gap, we propose an AI and machine learning (ML) curriculum that is specifically designed for first-year students. In this paper, we describe our curriculum and show how it covers four key content areas: core concepts, implementation details, limitations, and ethical considerations. We then share our experiences teaching our new curriculum to 174 randomly-selected Freshman students. Our results show that non-computer scientists can comprehend AI/ML concepts without being overwhelmed by the subject material. Specifically, we show that students can design, code, and deploy their own intelligent agents to solve problems, and that they understand the importance and value of learning about AI in a general-education course.", "venue": "SIGCSE", "year": 2021, "referenceCount": 37, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2021-03-03", "journal": {"name": "Proceedings of the 52nd ACM Technical Symposium on Computer Science Education"}, "authors": [{"authorId": "1792691", "name": "Adrian A. de Freitas"}, {"authorId": "2383160", "name": "T. Weingart"}]}, {"paperId": "246d804bfedc24e91f1ace6cf165eb392800b3c0", "externalIds": {"MAG": "3136952027", "ArXiv": "2103.02395", "DOI": "10.1016/J.TECHFORE.2021.120723", "CorpusId": 232105178}, "url": "https://www.semanticscholar.org/paper/246d804bfedc24e91f1ace6cf165eb392800b3c0", "title": "Automation-driven innovation management? Toward Innovation-Automation-Strategy cycle", "abstract": null, "venue": "Technological forecasting & social change", "year": 2021, "referenceCount": 129, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Economics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-03", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "50704376", "name": "P. Makowski"}, {"authorId": "2030582", "name": "Y. Kajikawa"}]}, {"paperId": "0568ddcfe9ada74b1f4a502c1663ab84a6e0978c", "externalIds": {"DBLP": "conf/icict2/MercioniH21", "DOI": "10.1109/ICICT52872.2021.00010", "CorpusId": 236188435}, "url": "https://www.semanticscholar.org/paper/0568ddcfe9ada74b1f4a502c1663ab84a6e0978c", "title": "Soft Clipping Mish - A Novel Activation Function for Deep Learning", "abstract": "This study aims to introduce a novel activation function, called Soft Clipping Mish. In other words, it brings improvements in order to increase the performance within the architecture. Its capability was tested on different scenarios using different datasets and using LeNet-5 architecture. So, these different testing conditions strengthen our proposal, the fact also emphasized in the experimental phase. We used such as datasets: MNIST, Fashion-MNIST, CIFAR-10, CIFAR-100 for a classification task, and Beijing PM2.5 dataset for a prediction task to determine the rank of air pollution. We introduced two variants of this function, the first variant being Soft Clipping Mish with a predefined parameter and the second variant being Soft Clipping Mish learnable, the learnable parameter giving us more flexibility into weights updates. This learnable parameter was initialized during the training phase with a value equal to 0.25. Our proposal was inspired by a recent activation function called Mish.", "venue": "2021 4th International Conference on Information and Computer Technologies (ICICT)", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-03-01", "journal": {"pages": "13-17", "name": "2021 4th International Conference on Information and Computer Technologies (ICICT)"}, "authors": [{"authorId": "51243076", "name": "Marina Adriana Mercioni"}, {"authorId": "1681573", "name": "S. Holban"}]}, {"paperId": "24977653dc0868968b6f6523682070d8eebb57c8", "externalIds": {"DBLP": "conf/vr/RebolGP21", "ArXiv": "2107.00712", "DOI": "10.1109/VR50410.2021.00082", "CorpusId": 234478889}, "url": "https://www.semanticscholar.org/paper/24977653dc0868968b6f6523682070d8eebb57c8", "title": " Passing a Non-verbal Turing Test: Evaluating Gesture Animations Generated from Speech", "abstract": "In real life, people communicate using both speech and non-verbal signals such as gestures, face expression or body pose. Non-verbal signals impact the meaning of the spoken utterance in an abundance of ways. An absence of non-verbal signals impoverishes the process of communication. Yet, when users are represented as avatars, it is difficult to translate non-verbal signals along with the speech into the virtual world without specialized motion-capture hardware. In this paper, we propose a novel, data-driven technique for generating gestures directly from speech. Our approach is based on the application of Generative Adversarial Neural Networks (GANs) to model the correlation rather than causation between speech and gestures. This approach approximates neuroscience findings on how non-verbal communication and speech are correlated. We create a large dataset which consists of speech and corresponding gestures in a 3D human pose format from which our model learns the speaker-specific correlation. We evaluate the proposed technique in a user study that is inspired by the Turing test. For the study, we animate the generated gestures on a virtual character. We find that users are not able to distinguish between the generated and the recorded gestures. Moreover, users are able to identify our synthesized gestures as related or not related to a given utterance.", "venue": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "year": 2021, "referenceCount": 54, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "573-581", "name": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)"}, "authors": [{"authorId": "1850410410", "name": "M. Rebol"}, {"authorId": "1680870", "name": "C. G\u00fctl"}, {"authorId": "2408097", "name": "Krzysztof Pietroszek"}]}, {"paperId": "2782952aa78053f79c8bde3332466d438301d210", "externalIds": {"MAG": "3135930035", "DOI": "10.1016/J.TRIP.2021.100331", "CorpusId": 233832194}, "url": "https://www.semanticscholar.org/paper/2782952aa78053f79c8bde3332466d438301d210", "title": "The role of route familiarity in traffic participants\u2019 behaviour and transport psychology research: A systematic review", "abstract": null, "venue": "", "year": 2021, "referenceCount": 117, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-03-01", "journal": {"volume": "9", "pages": "100331", "name": ""}, "authors": [{"authorId": "47717884", "name": "I. Harms"}, {"authorId": "30153336", "name": "B. Burdett"}, {"authorId": "7513306", "name": "S. Charlton"}]}, {"paperId": "36a9ba34659b430c3c6554ba6b515a7a124d1eb8", "externalIds": {"MAG": "3150662351", "DOI": "10.25046/AJ060212", "CorpusId": 233468801}, "url": "https://www.semanticscholar.org/paper/36a9ba34659b430c3c6554ba6b515a7a124d1eb8", "title": "Designing and Applying a Moral Turing Test", "abstract": "A R T I C L E I N F O A B S T R A C T Article history: Received: 25 December, 2020 Accepted: 20 February, 2021 Online: 10 March, 2021 This study attempts to develop theoretical criteria for verifying the morality of the actions of artificial intelligent agents, using the Turing test as an archetype and inspiration. This study develops ethical criteria established based on Kohlberg\u2019s moral development theory that might help determine the types of moral acts committed by artificial intelligent agents. Subsequently, it leverages these criteria in a test experiment with Korean children aged around ten years. The study concludes that the 10-year-old test participants\u2019 stage of moral development falls between the first and second types of moral acts in moral Turing tests. We evaluate the moral behavior type experiment by applying it to Korean elementary school students aged about ten years old. Moreover, this study argues that if a similar degree of reaction is obtained by applying this experiment to future healthcare robots, this healthcare robot can be recognized as passing the moral Turing test.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-01", "journal": {"volume": "6", "pages": "93-98", "name": "Advances in Science, Technology and Engineering Systems Journal"}, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo Kim"}, {"authorId": "73772677", "name": "Sunyong Byun"}]}, {"paperId": "ab7deb9ff1d5f877a482d08d61afee0ffbb90171", "externalIds": {"MAG": "3136158291", "DOI": "10.26267/UNIPI_DIONE/744", "CorpusId": 233364361}, "url": "https://www.semanticscholar.org/paper/ab7deb9ff1d5f877a482d08d61afee0ffbb90171", "title": "Classifying melanoma images with ensembles of deep convolutional neural networks", "abstract": "Malignant melanoma is the deadliest form of skin cancer and is one of the most rapidly increasing cancers in the world. Proper diagnosis of melanoma at an earlier stage is crucial for a high rate of complete cure. Both patient and physician awareness regarding the signs and symptoms of early melanoma remains paramount. Hence, a reliable automatic melanoma screening system would provide a great help for clinicians to detect the malignant skin lesions as early as possible. In the last years, the efficiency of deep learning-based methods increased dramatically and their performances seem to outperform conventional image processing methods in classification tasks. \nIn this master thesis, the EfficientNet family of convolutional neural networks is utilized and extended for identifying malignant melanoma on a dataset of 58,457 dermoscopic images of pigmented skin lesions. A comparative study of the effects of different training configurations is conducted to reveal what contributes to improve performance, and all trained networks are aggregated with an ensembling strategy to further improve individual results. \nThe proposed method has been evaluated on the SIIM-ISIC Melanoma Classification 2020 dataset and the best ensemble model achieved 0.9404 area under the ROC curve score on hold out test data.", "venue": "", "year": 2021, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2088538574", "name": "\u039c\u03b5\u03bb\u03af\u03bd\u03b1 \u03a4\u03b6\u03b9\u03bf\u03bc\u03ac\u03ba\u03b1"}, {"authorId": "2088535238", "name": "M. Tziomaka"}]}, {"paperId": "ba784cde1ddf8f46a97d0c1e1aa1cbfb7d6c9fd1", "externalIds": {"MAG": "3135157978", "DOI": "10.1111/PHIN.12308", "CorpusId": 233882077}, "url": "https://www.semanticscholar.org/paper/ba784cde1ddf8f46a97d0c1e1aa1cbfb7d6c9fd1", "title": "No Picnic: Cavell on Rule\u2010Descriptions", "abstract": "In his \ufb01rst paper, \u2018Must We Mean What We Say?\u2019, Stanley Cavell defended the methods of ordinary language philosophy against various charges made by his senior colleague, Benson Mates, under the in\ufb02uence of the empirical semantics of Arne Naess. 1 Cavell\u2019s argument hinges on the claim that native speakers are a source of evidence for \u2019what is said\u2019 in language and, accordingly, need not base their claims about ordinary language upon evidence. In what follows, I maintain that this defence against empirical semantics applies equally well to experimental philosophy\u2019s attack on doing philosophy from the armchair. In so doing, I attempt to clarify \u2013 and adjust \u2013 Cavell\u2019s claim that statements about ordinary language are rule-descriptions that are neither analytic nor synthetic.", "venue": "Philosophical Investigations", "year": 2021, "referenceCount": 144, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-27", "journal": {"name": "Philosophical Investigations"}, "authors": [{"authorId": "3479121", "name": "C. Sandis"}]}, {"paperId": "6af7e84404e3add7fc3ffcfa3c2270ee5ec543d9", "externalIds": {"DBLP": "journals/symmetry/Jun21", "DOI": "10.3390/sym13030389", "CorpusId": 233246956}, "url": "https://www.semanticscholar.org/paper/6af7e84404e3add7fc3ffcfa3c2270ee5ec543d9", "title": "Machines Imitating Human Thinking Using Bayesian Learning and Bootstrap", "abstract": "In the field of cognitive science, much research has been conducted on the diverse applications of artificial intelligence (AI). One important area of study is machines imitating human thinking. Although there are various approaches to development of thinking machines, we assume that human thinking is not always optimal in this paper. Sometimes, humans are driven by emotions to make decisions that are not optimal. Recently, deep learning has been dominating most machine learning tasks in AI. In the area of optimal decisions involving AI, many traditional machine learning methods are rapidly being replaced by deep learning. Therefore, because of deep learning, we can expect the faster growth of AI technology such as AlphaGo in optimal decision-making. However, humans sometimes think and act not optimally but emotionally. In this paper, we propose a method for building thinking machines imitating humans using Bayesian decision theory and learning. Bayesian statistics involves a learning process based on prior and posterior aspects. The prior represents an initial belief in a specific domain. This is updated to posterior through the likelihood of observed data. The posterior refers to the updated belief based on observations. When the observed data are newly added, the current posterior is used as a new prior for the updated posterior. Bayesian learning such as this also provides an optimal decision; thus, this is not well-suited to the modeling of thinking machines. Therefore, we study a new Bayesian approach to developing thinking machines using Bayesian decision theory. In our research, we do not use a single optimal value expected by the posterior; instead, we generate random values from the last updated posterior to be used for thinking machines that imitate human thinking.", "venue": "Symmetry", "year": 2021, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-27", "journal": {"volume": "13", "pages": "389", "name": "Symmetry"}, "authors": [{"authorId": "2052577018", "name": "Sunghae Jun"}]}, {"paperId": "0f61f9cd3483eef14614a301557439f6008b9074", "externalIds": {"DBLP": "journals/ki/Butz21", "DOI": "10.1007/s13218-021-00705-x", "CorpusId": 232433494}, "url": "https://www.semanticscholar.org/paper/0f61f9cd3483eef14614a301557439f6008b9074", "title": "Towards Strong AI", "abstract": null, "venue": "K\u00fcnstliche Intell.", "year": 2021, "referenceCount": 120, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-26", "journal": {"volume": "35", "pages": "91-101", "name": "KI - K\u00fcnstliche Intelligenz"}, "authors": [{"authorId": "1732540", "name": "Martin Volker Butz"}]}, {"paperId": "79640acf4ec1b666a56facebd2db2bf9a2b29959", "externalIds": {"MAG": "3131579087", "DOI": "10.22158/JRPH.V4N1P52", "CorpusId": 233931683}, "url": "https://www.semanticscholar.org/paper/79640acf4ec1b666a56facebd2db2bf9a2b29959", "title": "The Fuzzy Completeness Theory", "abstract": "The Two Incompleteness Theorems of Kurt Friedrich G\u00f6del and the Impossibility Theorem of Kenneth Arrow claim that logic, the most reliable of human knowledge, is incomplete or can be inconsistent. The Fuzzy Completeness Theory states that the Fuzzy Logic of Lotfi A. Zadeh has resolved the incompleteness and impossibility in logic and made logic complete and knowledge reliable with the new concept of Range of Tolerance, within which logic is still complete and knowledge, valid. In the Age of Reason about 300 years ago just prior to the Age of Science, reasoning is free for all, without the constraint of the laws of nature, which would be discovered in the Age of Science. However, the Scientific Method of reasoning by empirical verification depends so much on faith that it is logically and empirically dismissed by mathematicians and logicians, especially, after the exposure by Thomas Kuhn and Paul Feyerabend that a scientific advancement is akin to a religious conversion. On the other hand, mathematicians and logicians have been working steadily to find the limit of reliable knowledge. In the current state of knowledge, Kurt G\u00f6del has the last word with his Two Incompleteness Theorems, which conclude that the most reliable of human knowledge, logic, is incomplete, casting doubt whether knowledge is completely reliable. G\u00f6del\u2019s view is further supported by the Impossibility Theorem of Kenneth Arrow. However, Zadeh and the author of this paper extend Zadeh\u2019s concept of Range of Value in Fuzzy Logic to that of Range of Tolerance. Accordingly, Fuzzy Logic deals with the sacrifice of precision in the process of expanding the Range of Tolerance of a creation in order for the creation to survive and flourish for all the possibility of an uncertain future. In knowledge, incompleteness in logic can be resolved by the Range of Tolerance covering the incomplete part or ignoring the infrequent impossibilities, and, thus, making logic valid, again. Knowledge is derived generally from reason. Technically, the Fuzzy Completeness Theory classifies 16 Methods of Reason. The 16 Methods are the combination of the 4 basic Methods of Reason: 1) Logic, 2) Mathematics, 3) Empirical Verification, and 4) Others, each of which has 2 forms: 1) Fuzzy and 2) Exact and two types: 1) Complete and 2) Incomplete. G\u00f6del, Arrow, and the Author agree that no matter how rigorous is the Method of Reason the reason cannot be complete, when the reason is Exact. When a solution is newly defined as an answer within the Range of Tolerance of the solution, Fuzzy Logic resolves the incompleteness in logic and becomes the new foundation of knowledge, replacing Exact Logic. With this definition of a solution, Fuzzy Logic covers the incomplete or the impossible parts of the solution by expanding sufficiently the Range of Tolerance to make reason complete and knowledge reliable, but only within the Range of Tolerance. To summarize, even though the world\u2019s leading intellectuals have proven, directly, that logic is incomplete and, indirectly, that knowledge is invalid, reality is still operating smoothly, and science has even demonstrated the power of knowledge. The conflict between the most reliable knowledge, namely, logic and the real world is resolved by Fuzzy Logic, which introduces the new concept of Range of Tolerance, within which reality can still operate in accordance with the laws discovered by knowledge. In sum, reality is fuzzy, not exact. The breakthrough impact of this paper centers around completeness theory and Fuzzy Logic. In the early 21st century, the mainstream knowledge is still not aware that the supply and demand model is incomplete, and that the DNA-protein system resembles computer science based on logic more than science based on experimentation. The current computer is based on exact logic and is designed for temporary existence, while the living system is design for permanent existence and must depend on the Range of Tolerance based on Fuzzy Logic to survive permanently in an uncertain future. Financial crises will be caused by the unstable investment return, which is the incomplete part in the supply demand model. Complexity crises will be caused by the lack of the requirement of permanence or complete automation, which is the ultimate solution to unlimited complexity. The 16 Methods of Reason correspond roughly to Culture Level Quotient (CLQ), which is a non-technical measure of a person, a people or a nation.", "venue": "Journal of Research in Philosophy and History", "year": 2021, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-24", "journal": {"name": "Journal of Research in Philosophy and History"}, "authors": [{"authorId": "32693480", "name": "H. Ching"}]}, {"paperId": "58031ca782dea438f65a9729f17d131d181a42b6", "externalIds": {"DBLP": "journals/imds/JiaCH21", "MAG": "3132663149", "DOI": "10.1108/IMDS-11-2020-0664", "CorpusId": 233896342}, "url": "https://www.semanticscholar.org/paper/58031ca782dea438f65a9729f17d131d181a42b6", "title": "Assessing the hotel service robot interaction on tourists' behaviour: the role of anthropomorphism", "abstract": "PurposeThe main purpose of this study is to investigate the impact of service robots on hotel visitors' behaviour and to verify the role of anthropomorphism(human likeness) in customer satisfaction with robots.Design/methodology/approachAn online survey of 381 respondents was conducted, divided into three types of robots according to the level of anthropomorphism. The research model was thoroughly tested using the PLS-SEM method. Research model was tested thoroughly using the PLS-SEM method.FindingsThis study found that user satisfaction with service robots in a hotel had a positive impact on user satisfaction, attitude towards the hotel and room purchase intention. Moreover, our results showed that users were most likely to accept medium-human likeness robots and least likely to accept high\u2013human likeness robots.Originality/valueThis study proposes influencing factors to be considered when researching hotel service robots, as well as practical suggestions for any hotel intending to use or currently using a service robot.", "venue": "Industrial management & data systems", "year": 2021, "referenceCount": 52, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-22", "journal": {"volume": "121", "pages": "1457-1478", "name": "Ind. Manag. Data Syst."}, "authors": [{"authorId": "2117240011", "name": "J. Jia"}, {"authorId": "1785137", "name": "Namho Chung"}, {"authorId": "12480613", "name": "Jooyoung Hwang"}]}, {"paperId": "718f3dd68aa63e43480234c1a07c09e87b4e014f", "externalIds": {"MAG": "3129270107", "DOI": "10.3390/ELECTRONICS10040514", "CorpusId": 233953901}, "url": "https://www.semanticscholar.org/paper/718f3dd68aa63e43480234c1a07c09e87b4e014f", "title": "Relations between Electronics, Artificial Intelligence and Information Society through Information Society Rules", "abstract": "This paper presents relations between information society (IS), electronics and artificial intelligence (AI) mainly through twenty-four IS laws. The laws not only make up a novel collection, currently non-existing in the literature, but they also highlight the core boosting mechanism for the progress of what is called the information society and AI. The laws mainly describe the exponential growth in a particular field, be it the processing, storage or transmission capabilities of electronic devices. Other rules describe the relations to production prices and human interaction. Overall, the IS laws illustrate the most recent and most vibrant part of human history based on the unprecedented growth of device capabilities spurred by human innovation and ingenuity. Although there are signs of stalling, at the same time there are still many ways to prolong the fascinating progress of electronics that stimulates the field of artificial intelligence. There are constant leaps in new areas, such as the perception of real-world signals, where AI is already occasionally exceeding human capabilities and will do so even more in the future. In some areas where AI is presumed to be incapable of performing even at a modest level, such as the production of art or programming software, AI is making progress that can sometimes reflect true human skills. Maybe it is time for AI to boost the progress of electronics in return.", "venue": "Electronics", "year": 2021, "referenceCount": 106, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-22", "journal": {"name": "Electronics"}, "authors": [{"authorId": "10269507", "name": "M. Gams"}, {"authorId": "40802688", "name": "Tine Kolenik"}]}, {"paperId": "56586eb758d7fabdbbd5ee4c5ed7e30c6d457d30", "externalIds": {"DBLP": "journals/corr/abs-2102-10242", "ACL": "2021.emnlp-main.589", "ArXiv": "2102.10242", "DOI": "10.18653/v1/2021.emnlp-main.589", "CorpusId": 231986109}, "url": "https://www.semanticscholar.org/paper/56586eb758d7fabdbbd5ee4c5ed7e30c6d457d30", "title": "Towards Automatic Evaluation of Dialog Systems: A Model-Free Off-Policy Evaluation Approach", "abstract": "Reliable automatic evaluation of dialogue systems under an interactive environment has long been overdue. An ideal environment for evaluating dialog systems, also known as the Turing test, needs to involve human interaction, which is usually not affordable for large-scale experiments. Though researchers have attempted to use metrics for language generation tasks (e.g., perplexity, BLEU) or some model-based reinforcement learning methods (e.g., self-play evaluation) for automatic evaluation, these methods only show very weak correlation with the actual human evaluation in practice. To bridge such a gap, we propose a new framework named ENIGMA for estimating human evaluation scores based on recent advances of off-policy evaluation in reinforcement learning. ENIGMA only requires a handful of pre-collected experience data, and therefore does not involve human interaction with the target policy during the evaluation, making automatic evaluations feasible. More importantly, ENIGMA is model-free and agnostic to the behavior policies for collecting the experience data, which significantly alleviates the technical difficulties of modeling complex dialogue environments and human behaviors. Our experiments show that ENIGMA significantly outperforms existing methods in terms of correlation with human evaluation scores.", "venue": "EMNLP", "year": 2021, "referenceCount": 86, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-02-20", "journal": {"pages": "7419-7451"}, "authors": [{"authorId": "5795999", "name": "Haoming Jiang"}, {"authorId": "144445937", "name": "Bo Dai"}, {"authorId": "46235335", "name": "Mengjiao Yang"}, {"authorId": "2149192597", "name": "Wei Wei"}, {"authorId": "36345161", "name": "T. Zhao"}]}, {"paperId": "4c272d7fbfb744261aafe9a51806e0dbebcde80c", "externalIds": {"DBLP": "conf/iseeie/RoshdyKKSBEBN21", "DOI": "10.1145/3459104.3459154", "CorpusId": 236145620}, "url": "https://www.semanticscholar.org/paper/4c272d7fbfb744261aafe9a51806e0dbebcde80c", "title": "Machine Empathy: Digitizing Human Emotions", "abstract": "The primary objective of this work is to emulate machine empathy through digitizing human emotions. A simple proofof-concept experiment is conducted, where a brain-computer interface (BCI) captures the brain's electroencephalogram (EEG) signals using an Emotiv Epoc headset. A two dimensional (2D) intensity (heat) map of the brain's EEG is obtained for a pre-defined set of an emotional stimulus, namely excitement and stress. An artificial neural network (ANN) is subsequently used for classifying the 2D image. The key contribution of this work is to leverage the already powerful and mature tools for image recognition developed in ANN systems for emotion recognition through adapting the 2D intensity map of the EEG brain activity. The resulting BCI system was set-up to control a surrogate humanoid robot, allowing the robot to emulate empathy and interact with the subject according to pre-defined behavioural models. The ANN classifier exhibited an accuracy of 87.5% for recognizing two of the emotional states targeted in this study.", "venue": "ISEEIE", "year": 2021, "referenceCount": 31, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-02-19", "journal": {"name": "2021 International Symposium on Electrical, Electronics and Information Engineering"}, "authors": [{"authorId": "46909195", "name": "A. Roshdy"}, {"authorId": "2488767", "name": "S. A. Kork"}, {"authorId": "8908772", "name": "A. Karar"}, {"authorId": "32698580", "name": "A. Sabi"}, {"authorId": "2921535", "name": "Z. A. Barakeh"}, {"authorId": "2120200055", "name": "Fahmi ElSayed"}, {"authorId": "1892267", "name": "T. Beyrouthy"}, {"authorId": "1399329283", "name": "A. Na\u00eft-Ali"}]}, {"paperId": "f0e103b4104a89826b648fce61a082e71de6be1d", "externalIds": {"MAG": "3153638464", "DOI": "10.1109/ICAECT49130.2021.9392456", "CorpusId": 234999934}, "url": "https://www.semanticscholar.org/paper/f0e103b4104a89826b648fce61a082e71de6be1d", "title": "Artificial Intelligence Based Approach to Validate the Authenticity of News", "abstract": "Misinformation isn\u2019t definitely new thing; it is way before the inception of social media. It is evolving since 14th century but the term like \"fake news\", \"post truth\" are used commonly during movement of 2016 US presidential election. People use social media to read news as it is lost cost and user friendly platform; also it is possible to share news on social media with one click. With this merit, it is also having major disadvantage. If the news is false or misleading news then spread of such news will have adverse consequence on civilization. Therefore, battling fake news is important and has now become developing area of research. Researchers are using Artificial Intelligence based approach such as machine learning and natural language processing to battle with the fake news. This paper presents a comprehensive overview of the earlier detection techniques as well as proposes mathematical model and methodology to improve the result.", "venue": "2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)", "year": 2021, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2021-02-19", "journal": {"pages": "1-6", "name": "2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)"}, "authors": [{"authorId": "71010488", "name": "Roshan R. Karwa"}, {"authorId": "2116011521", "name": "Sunil R. Gupta"}]}, {"paperId": "d384476f7f15b53c28119fa6507e9dc62b20b925", "externalIds": {"MAG": "3129472090", "DOI": "10.1063/5.0043300", "CorpusId": 233922781}, "url": "https://www.semanticscholar.org/paper/d384476f7f15b53c28119fa6507e9dc62b20b925", "title": "Machine learning for materials design and discovery", "abstract": null, "venue": "", "year": 2021, "referenceCount": 51, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-18", "journal": {"volume": "129", "pages": "070401", "name": "Journal of Applied Physics"}, "authors": [{"authorId": "32008403", "name": "R. Vasudevan"}, {"authorId": "49542803", "name": "G. Pilania"}, {"authorId": "40454011", "name": "P. Balachandran"}]}, {"paperId": "2b8440a784b141a0ec4b7971ee41b4bc3eec10dc", "externalIds": {"MAG": "3129630401", "DOI": "10.1080/03080188.2020.1831227", "CorpusId": 233893848}, "url": "https://www.semanticscholar.org/paper/2b8440a784b141a0ec4b7971ee41b4bc3eec10dc", "title": "As perceived, not as known: digital enquiry and the art of intelligence", "abstract": "\u1f10\u1f70\u03bd \u03bc\u1f74 \u1f14\u03bb\u03c0\u03b7\u03c4\u03b1\u03b9 \u1f00\u03bd\u03ad\u03bb\u03c0\u03b9\u03c3\u03c4\u03bf\u03bd \u03bf\u1f50\u03ba \u1f10\u03be\u03f5\u03c5\u03c1\u03ae\u03c3\u03f5\u03b9, \u1f00\u03bd\u03f5\u03be\u03f5\u03c1\u03f5\u03cd\u03bd\u03b7\u03c4\u03bf\u03bd \u1f10\u1f78\u03bd \u03ba\u03b1\u1f76 \u1f04\u03c0\u03bf\u03c1\u03bf\u03bd. (\u2018If you do not expect the unexpected, you will not find it; for it is hard to be sought out and difficult\u2019) \u2003Heraclitus (DK 1...", "venue": "Interdisciplinary Science Reviews", "year": 2021, "referenceCount": 501, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-17", "journal": {"volume": "46", "pages": "325 - 362", "name": "Interdisciplinary Science Reviews"}, "authors": [{"authorId": "145918407", "name": "W. McCarty"}]}, {"paperId": "c76cc10cd93bb46b203b31c9d9fc44cbd268829f", "externalIds": {"MAG": "3137670579", "CorpusId": 238287691}, "url": "https://www.semanticscholar.org/paper/c76cc10cd93bb46b203b31c9d9fc44cbd268829f", "title": "Del clich\u00e9 de la revoluci\u00f3n en inteligencia artificial a la incertidumbre de la revoluci\u00f3n social", "abstract": null, "venue": "", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-17", "journal": {"volume": "19", "name": ""}, "authors": [{"authorId": "40192915", "name": "G. Torres"}]}, {"paperId": "5e83d1f1a3fabbb4cc3936660dcc3192edf96f0e", "externalIds": {"DBLP": "journals/corr/abs-2102-08933", "ArXiv": "2102.08933", "CorpusId": 231942470}, "url": "https://www.semanticscholar.org/paper/5e83d1f1a3fabbb4cc3936660dcc3192edf96f0e", "title": "An Objective Laboratory Protocol for Evaluating Cognition of Non-Human Systems Against Human Cognition", "abstract": "In this paper I describe and reduce to practice an objective protocol for evaluating the cognitive capabilities of a non-human system against human cognition in a laboratory environment. This is important because the existence of a non-human system with cognitive capabilities comparable to those of humans might make once-philosophical questions of safety and ethics immediate and urgent. Past attempts to devise evaluation methods, such as the Turing Test and many others, have not met this need; most of them either emphasize a single aspect of human cognition or a single theory of intelligence, fail to capture the human capacity for generality and novelty, or require success in the physical world. The protocol is broadly Bayesian, in that its primary output is a confidence statistic in relation to a claim. Further, it provides insight into the areas where and to what extent a particular system falls short of human cognition, which can help to drive further progress or precautions.", "venue": "ArXiv", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-17", "journal": {"volume": "abs/2102.08933", "name": "ArXiv"}, "authors": [{"authorId": "2643853", "name": "David J. Jilk"}]}, {"paperId": "6281b3a356ced0951b5695d69decd78dd84ea547", "externalIds": {"DOI": "10.1007/s00146-021-01147-7", "CorpusId": 253689299}, "url": "https://www.semanticscholar.org/paper/6281b3a356ced0951b5695d69decd78dd84ea547", "title": "Endowing Artificial Intelligence with legal subjectivity", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-16", "journal": {"volume": "37", "pages": "205 - 213", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2089470251", "name": "Sylwia Wojtczak"}]}, {"paperId": "eedba50e37d23343e7b314d057d9061ec9220b68", "externalIds": {"MAG": "3163420331", "DOI": "10.2139/SSRN.3787103", "CorpusId": 236658996}, "url": "https://www.semanticscholar.org/paper/eedba50e37d23343e7b314d057d9061ec9220b68", "title": "Freedom of Expression and Human Dignity in the Age of Artificial Intelligence.", "abstract": "[enter Abstract Body]Cambridge Analytica exposes possible gaps in legal protection as it relates to certain human rights and the use of personal data to offer \u2018free\u2019 technology. This article discusses Freedom of Expression and Human Dignity under The Charter of Fundamental Rights of the European Union. This article explores how the Charter can be applied to technology and private parties like Facebook or Cambridge Analytica holding such private parties accountable for violations of Human Rights.", "venue": "", "year": 2021, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-16", "journal": {"volume": "", "name": "Social Science Research Network"}, "authors": [{"authorId": "2122014282", "name": "Jasbir Khalsa"}]}, {"paperId": "a2295586ab9ef5bf44f7041125cdd82407f542fe", "externalIds": {"MAG": "3132570160", "DOI": "10.1177/0276237421994697", "CorpusId": 233971012}, "url": "https://www.semanticscholar.org/paper/a2295586ab9ef5bf44f7041125cdd82407f542fe", "title": "The Role of AI Attribution Knowledge in the Evaluation of Artwork", "abstract": "Artwork is increasingly being created by machines through algorithms with little or no input from humans. Yet, very little is known about people\u2019s attitudes and evaluations of artwork generated by machines. The current study investigates (a) whether individuals are able to accurately differentiate human-made artwork from AI-generated artwork and (b) the role of attribution knowledge (i.e., information about who created the content) in their evaluation and reception of artwork. Data was collected using an Amazon Turk sample from two survey experiments designed on Qualtrics. Findings suggest that individuals are unable to accurately identify AI-generated artwork and they are likely to associate representational art to humans and abstract art to machines. There is also an interaction effect between attribution knowledge and the type of artwork (representational vs. abstract) on purchase intentions and evaluations of artworks.", "venue": "Empirical Studies of the Arts", "year": 2021, "referenceCount": 50, "citationCount": 10, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-16", "journal": {"volume": "40", "pages": "125 - 142", "name": "Empirical Studies of the Arts"}, "authors": [{"authorId": "2346038", "name": "Harsha Gangadharbatla"}]}, {"paperId": "29729a76c3bfe3cc80730e3120f64336dbcd75ef", "externalIds": {"PubMedCentral": "8150389", "DOI": "10.2196/27868", "CorpusId": 234361969, "PubMed": "33973854"}, "url": "https://www.semanticscholar.org/paper/29729a76c3bfe3cc80730e3120f64336dbcd75ef", "title": "Evidence of Human-Level Bonds Established With a Digital Conversational Agent: Cross-sectional, Retrospective Observational Study", "abstract": "Background There are far more patients in mental distress than there is time available for mental health professionals to support them. Although digital tools may help mitigate this issue, critics have suggested that technological solutions that lack human empathy will prevent a bond or therapeutic alliance from being formed, thereby narrowing these solutions\u2019 efficacy. Objective We aimed to investigate whether users of a cognitive behavioral therapy (CBT)\u2013based conversational agent would report therapeutic bond levels that are similar to those in literature about other CBT modalities, including face-to-face therapy, group CBT, and other digital interventions that do not use a conversational agent. Methods A cross-sectional, retrospective study design was used to analyze aggregate, deidentified data from adult users who self-referred to a CBT-based, fully automated conversational agent (Woebot) between November 2019 and August 2020. Working alliance was measured with the Working Alliance Inventory-Short Revised (WAI-SR), and depression symptom status was assessed by using the 2-item Patient Health Questionnaire (PHQ-2). All measures were administered by the conversational agent in the mobile app. WAI-SR scores were compared to those in scientific literature abstracted from recent reviews. Results Data from 36,070 Woebot users were included in the analysis. Participants ranged in age from 18 to 78 years, and 57.48% (20,734/36,070) of participants reported that they were female. The mean PHQ-2 score was 3.03 (SD 1.79), and 54.67% (19,719/36,070) of users scored over the cutoff score of 3 for depression screening. Within 5 days of initial app use, the mean WAI-SR score was 3.36 (SD 0.8) and the mean bond subscale score was 3.8 (SD 1.0), which was comparable to those in recent studies from the literature on traditional, outpatient, individual CBT and group CBT (mean bond subscale scores of 4 and 3.8, respectively). PHQ-2 scores at baseline weakly correlated with bond scores (r=\u22120.04; P<.001); however, users with depression and those without depression had high bond scores of 3.45. Conclusions Although bonds are often presumed to be the exclusive domain of human therapeutic relationships, our findings challenge the notion that digital therapeutics are incapable of establishing a therapeutic bond with users. Future research might investigate the role of bonds as mediators of clinical outcomes, since boosting the engagement and efficacy of digital therapeutics could have major public health benefits.", "venue": "JMIR formative research", "year": 2021, "referenceCount": 25, "citationCount": 23, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-10", "journal": {"volume": "5", "name": "JMIR Formative Research"}, "authors": [{"authorId": "6120000", "name": "Alison M Darcy"}, {"authorId": "2091471950", "name": "Jade Daniels"}, {"authorId": "2077632364", "name": "D. Salinger"}, {"authorId": "49523427", "name": "P. Wicks"}, {"authorId": "9859633", "name": "A. Robinson"}]}, {"paperId": "a876b2624dca10735519debf63eb2d5824fb8b20", "externalIds": {"DBLP": "journals/dint/FengZZCCHL21", "DOI": "10.1162/dint_a_00090", "CorpusId": 231875722}, "url": "https://www.semanticscholar.org/paper/a876b2624dca10735519debf63eb2d5824fb8b20", "title": "An Evaluation of Chinese Human-Computer Dialogue Technology", "abstract": "Abstract There is a growing interest in developing human-computer dialogue systems which is an important branch in the field of artificial intelligence (AI). However, the evaluation of large-scale Chinese human-computer dialogues is still a challenging task. To attract more attention to dialogue evaluation work, we held the fourth Evaluation of Chinese Human-Computer Dialogue Technology (ECDT). It consists of few-shot learning in spoken language understanding (SLU) (Task 1) and knowledge-driven multi-turn dialogue competition (Task 2), the data sets of which are provided by Harbin Institute of Technology and Tsinghua University. In this paper, we will introduce the evaluation tasks and data sets in detail. Meanwhile, we will also analyze the evaluation results and the existing problems in the evaluation.", "venue": "Data Intelligence", "year": 2021, "referenceCount": 24, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-10", "journal": {"volume": "3", "pages": "274-286", "name": "Data Intelligence"}, "authors": [{"authorId": "2048146115", "name": "Zixian Feng"}, {"authorId": "2048147621", "name": "Caihai Zhu"}, {"authorId": "1806419", "name": "Weinan Zhang"}, {"authorId": "1390759484", "name": "Zhigang Chen"}, {"authorId": "2256319", "name": "Wanxiang Che"}, {"authorId": "1730108", "name": "Minlie Huang"}, {"authorId": "2111818678", "name": "Linlin Li"}]}, {"paperId": "8a1f58e914f5c9f0b0a9b8abff58ed269162b95a", "externalIds": {"MAG": "3126999983", "DOI": "10.1057/S41288-020-00201-7", "CorpusId": 233933887}, "url": "https://www.semanticscholar.org/paper/8a1f58e914f5c9f0b0a9b8abff58ed269162b95a", "title": "The impact of artificial intelligence along the insurance value chain and on the insurability of risks", "abstract": null, "venue": "The Geneva Papers on Risk and Insurance - Issues and Practice", "year": 2021, "referenceCount": 117, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-08", "journal": {"name": "The Geneva Papers on Risk and Insurance - Issues and Practice"}, "authors": [{"authorId": "2907881", "name": "M. Eling"}, {"authorId": "2089356084", "name": "Davide Nuessle"}, {"authorId": "2089000896", "name": "Julian Staubli"}]}, {"paperId": "8c00360be1f3e499cbaab56e0b91a4eec571a187", "externalIds": {"DBLP": "journals/mima/HowickMF21", "DOI": "10.1007/s11023-021-09555-w", "CorpusId": 231811286}, "url": "https://www.semanticscholar.org/paper/8c00360be1f3e499cbaab56e0b91a4eec571a187", "title": "An Empathy Imitation Game: Empathy Turing Test for Care- and Chat-bots", "abstract": null, "venue": "Minds Mach.", "year": 2021, "referenceCount": 33, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-04", "journal": {"volume": "", "pages": "1-5", "name": "Minds and Machines"}, "authors": [{"authorId": "4970399", "name": "J. Howick"}, {"authorId": "1751614630", "name": "J. Morley"}, {"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "4f5c4c9dd017d75f47c8e6c06da90ce9c51dde9b", "externalIds": {"DBLP": "journals/corr/abs-2102-02204", "ArXiv": "2102.02204", "MAG": "3127817633", "DOI": "10.21203/RS.3.RS-220713/V1", "CorpusId": 231802239}, "url": "https://www.semanticscholar.org/paper/4f5c4c9dd017d75f47c8e6c06da90ce9c51dde9b", "title": "Parametrized Quantum Circuits of Synonymous Sentences in Quantum Natural Language Processing", "abstract": "\n In this paper we develop a compositional vector-based semantics of positive transitive sentences in quantum natural language processing for a non-English language, i.e. Persian, to compare the parametrised quantum circuits of two synonymous sentences in two languages, English and Persian. By considering grammar+meaning of a transitive sentence, we translateDisCoCat diagram via ZX-calculus into quantum circuit form. Also, we use a bigraph method to rewrite DisCoCat diagram and turn into quantum circuit in the semantic side.", "venue": "ArXiv", "year": 2021, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": "abs/2102.02204", "name": "ArXiv"}, "authors": [{"authorId": "1421595746", "name": "Mina Abbas-zadeh"}, {"authorId": "144823300", "name": "S. S. Mousavi"}, {"authorId": "145478033", "name": "V. Salari"}]}, {"paperId": "e64b96a2edf26b3a930e0314a35f21be9f729657", "externalIds": {"PubMedCentral": "8629804", "DBLP": "journals/tib/KimVHW21", "MAG": "3128371085", "DOI": "10.1007/s12064-020-00331-5", "CorpusId": 231778099, "PubMed": "33532895"}, "url": "https://www.semanticscholar.org/paper/e64b96a2edf26b3a930e0314a35f21be9f729657", "title": "Informational architecture across non-living and living collectives", "abstract": null, "venue": "Theory in biosciences", "year": 2021, "referenceCount": 148, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": "140", "pages": "325 - 341", "name": "Theory in Biosciences"}, "authors": [{"authorId": "2109871971", "name": "Hyunju Kim"}, {"authorId": "48404261", "name": "Gabriele Valentini"}, {"authorId": "69873213", "name": "J. Hanson"}, {"authorId": "1946477", "name": "S. Walker"}]}, {"paperId": "7896c2c5e0a1734b4c69c73aeccca136f09ea433", "externalIds": {"DBLP": "journals/cogcom/GardiniFCD21", "DOI": "10.1007/s12559-021-09823-y", "CorpusId": 232163932}, "url": "https://www.semanticscholar.org/paper/7896c2c5e0a1734b4c69c73aeccca136f09ea433", "title": "Using Principal Paths to Walk Through Music and Visual Art Style Spaces Induced by Convolutional Neural Networks", "abstract": null, "venue": "Cognitive Computation", "year": 2021, "referenceCount": 42, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-01", "journal": {"volume": "13", "pages": "570-582", "name": "Cognitive Computation"}, "authors": [{"authorId": "1712254010", "name": "E. Gardini"}, {"authorId": "37516550", "name": "M. Ferrarotti"}, {"authorId": "144621661", "name": "A. Cavalli"}, {"authorId": "2674856", "name": "S. Decherchi"}]}, {"paperId": "03c067dedc49d6119a31a70b36e2885e38d786ae", "externalIds": {"MAG": "3134339096", "DOI": "10.1051/ODFEN/2021006", "CorpusId": 234083192}, "url": "https://www.semanticscholar.org/paper/03c067dedc49d6119a31a70b36e2885e38d786ae", "title": "Le Deep Learning en orthodontie : vers une relation patient-praticien repens\u00e9e\u2026", "abstract": "Depuis une dizaine d\u2019ann\u00e9e, l\u2019Intelligence artificielle (IA) transforme progressivement les pratiques, la m\u00e9decine aussi bien que l\u2019orthodontie n\u2019\u00e9chappent pas \u00e0 cette r\u00e8gle. D\u00e8s lors, se pose la question de la place de cette technologie au sein de la pratique quotidienne; et ce \u00e0 toutes les \u00e9tapes de la prise en charge th\u00e9rapeutique.\nCette technologie simplifie l\u2019analyse du nombre croissant de donn\u00e9es de plus en plus complexes dont nous disposons, notamment \u00e0 travers le scanner optique intra-oral, le scanner facial ou la radiographie 3D. Pour savoir l\u2019exploiter, il est n\u00e9cessaire d\u2019en conna\u00eetre ses diff\u00e9rents principes.\nL\u2019objectif de ce travail est, apr\u00e8s avoir introduit les bases du Deep Learning qui s\u2019appuie les r\u00e9seaux neuronaux virtuels, d\u2019aborder quelles sont les applications actuelles de cette technologie en m\u00e9decine bucco-dentaire et en orthodontie.\nLa connaissance des derni\u00e8res recherches et des derniers r\u00e9sultats obtenus permet alors d\u2019envisager la future relation praticien-machine dans le cadre d\u2019une approche personnalis\u00e9e et repens\u00e9e autour du patient.", "venue": "", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-01", "journal": {"volume": "55", "pages": "73-87", "name": ""}, "authors": [{"authorId": "14608292", "name": "J. Foucart"}, {"authorId": "2090077663", "name": "Luc Gillibert"}, {"authorId": "1418220708", "name": "A. Chavanne"}, {"authorId": "91323741", "name": "X. Ripoche"}]}, {"paperId": "aa0a20b7278ab7c36dccad4be9dd557a3c2cfa14", "externalIds": {"MAG": "3135497746", "DOI": "10.1088/1742-6596/1828/1/012080", "CorpusId": 234012648}, "url": "https://www.semanticscholar.org/paper/aa0a20b7278ab7c36dccad4be9dd557a3c2cfa14", "title": "An Intelligent Mobile Application Testing Experience Report", "abstract": "Artificial intelligence applications provide tremendous opportunities to improve human life and drive innovation. AI systems/applications which operate in a real-world environment have to encounter an infinite set of feasible scenarios. Conventional testing approach to test the AI application allows only limited testing and does not allow taking the different contexts into consideration and may lead to insufficient validation and characterization. Therefore, to ensure robustness, certainty and reliability of AI applications, the authors applied classification-based AI software testing framework and 3D decision tables to generate test cases. Moreover, the authors compared the quality assurance metrics (accuracy, correctness, reliability and consistency) of AI and non-AI functions in the AI mobile application scenario. Our results indicate and confirm that complete AI function validation is not possible with conventional testing methods, but AI software testing strategy proposed based on classification framework and 3D decision tables has a good effect.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-01", "journal": {"volume": "1828", "name": "Journal of Physics: Conference Series"}, "authors": [{"authorId": "2055333830", "name": "Chi Tran"}, {"authorId": "4339065", "name": "M. G. Valmiki"}, {"authorId": "2115723448", "name": "Guoyan Xu"}, {"authorId": "2154364225", "name": "J. Gao"}]}, {"paperId": "42f53e74468113004420a3cb36f2e10aef8ef68f", "externalIds": {"PubMedCentral": "7902546", "DOI": "10.1016/j.heliyon.2021.e06268", "CorpusId": 232099416, "PubMed": "33665435"}, "url": "https://www.semanticscholar.org/paper/42f53e74468113004420a3cb36f2e10aef8ef68f", "title": "Towards an interdisciplinary framework about intelligence", "abstract": null, "venue": "Heliyon", "year": 2021, "referenceCount": 81, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-01", "journal": {"volume": "7", "name": "Heliyon"}, "authors": [{"authorId": "1403471268", "name": "Nicolas Palanca-Castan"}, {"authorId": "2051833010", "name": "Beatriz S\u00e1nchez Tajadura"}, {"authorId": "5191753", "name": "R. Cofr\u00e9"}]}, {"paperId": "64b0959be525b0303c506cbece1115461389595a", "externalIds": {"MAG": "3112217617", "DOI": "10.1016/j.pnucene.2020.103604", "CorpusId": 230572557}, "url": "https://www.semanticscholar.org/paper/64b0959be525b0303c506cbece1115461389595a", "title": "Comparison of the error-integral performance indexes in a GA-tuned PID controlling system of a PWR-type nuclear reactor point-kinetics model", "abstract": null, "venue": "", "year": 2021, "referenceCount": 25, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-01", "journal": {"volume": "132", "pages": "103604", "name": "Progress in Nuclear Energy"}, "authors": [{"authorId": "102942413", "name": "Seyed Mohammad Hossein Mousakazemi"}]}, {"paperId": "fffe8348918a81a78afe45b41f539804bcfaa02c", "externalIds": {"MAG": "3127084837", "DOI": "10.37965/JAIT.2020.0065", "CorpusId": 233251414}, "url": "https://www.semanticscholar.org/paper/fffe8348918a81a78afe45b41f539804bcfaa02c", "title": "Technologies Supporting Artificial Intelligence and Robotics Application Development", "abstract": "Artificial intelligence (AI) and robotics have gone through three generations of development, from Turing test, logic theory machine, to expert system and self-driving car. In the third-generation today, AI and robotics have collaboratively been used in many areas in our society, including industry, business, manufacture, research, and education. There are many challenging problems in developing AI and robotics applications. We launch this new Journal of Artificial Intelligence and Technology to facilitate the exchange of the latest research and practice in AI and technologies. In this inaugural issue, we first introduce a few key technologies and platforms supporting the third-generation AI and robotics application development based on stacks of technologies and platforms. We present examples of such development environments created by both industry and academia. We also selected eight papers in the related areas to celebrate the foundation of this journal.", "venue": "", "year": 2021, "referenceCount": 24, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-31", "journal": {"volume": "1", "pages": "1-8", "name": ""}, "authors": [{"authorId": "2109392777", "name": "Yinong Chen"}, {"authorId": "3434191", "name": "G. Luca"}]}, {"paperId": "b22a5f250f334c2b4400fb71ab87ac671539a785", "externalIds": {"MAG": "3127216649", "DOI": "10.14488/BJOPM.2021.010", "CorpusId": 233441821}, "url": "https://www.semanticscholar.org/paper/b22a5f250f334c2b4400fb71ab87ac671539a785", "title": "Influence of artificial intelligence on public employment and its impact on politics: a systematic literature review", "abstract": "Goal: Public administration is constantly changing in response to new challenges, including the implementation of new technologies such as robotics and artificial intelligence (AI). This new dynamic has caught the attention of political leaders who are finding ways to restrain or regulate AI in public services, but also of scholars who are raising legitimate concerns about its impacts on public employment. In light of the above, the aim of this research is to analyze the influence of AI on public employment and the ways politics are reacting. \nDesign/Methodology/Approach: We have performed a systematic literature review to disclose the state-of-the-art and to find new avenues for future research. \nResults: The results indicate that public services require four kinds of intelligence \u2013 mechanical, analytical, intuitive, and empathetic \u2013 albeit, with much less expression than in private services. \nLimitations of the investigation: This systematic review provides a snapshot of the influence of AI on public employment. Thus, our research does not cover the whole body of knowledge, but it presents a holistic understanding of the phenomenon. \nPractical implications: As private companies are typically more advanced in the implementation of AI technologies, the for-profit sector may provide significant contributions in the way states can leverage public services through the deployment of AI technologies. \nOriginality/Value: This article highlights the need for states to create the necessary conditions to legislate and regulate key technological advances, which, in our opinion, has been done, but at a very slow pace.", "venue": "", "year": 2021, "referenceCount": 103, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-29", "journal": {"volume": "18", "pages": "1-22", "name": "Brazilian journal of operations & production management"}, "authors": [{"authorId": "1455925165", "name": "Jo\u00e3o Reis"}, {"authorId": "144179439", "name": "Paula Esp\u00edrito Santo"}, {"authorId": "3003920", "name": "N. Mel\u00e3o"}]}, {"paperId": "54b0c0a0025df2f94de6121ef4183ae8f88550c7", "externalIds": {"DOI": "10.1109/SAUPEC/RobMech/PRASA52254.2021.9377235", "CorpusId": 232316166}, "url": "https://www.semanticscholar.org/paper/54b0c0a0025df2f94de6121ef4183ae8f88550c7", "title": "Algorithmic Music Composition Using Probabilistic Graphical Models and Artificial Neural Networks", "abstract": "Composing music algorithmically has been a goal long-pursued by many computer scientists. Various methods have been implemented to achieve this, ranging from randomly selecting musical components to deep learning models. The main focus of this research is to develop a model which fools a human into believing the output music is human-made. This study uses a collection of rock music MIDI files which the notes, chords, pitches and duration are extracted as features. A Bayesian network is selected as the main model for this research and a Long Short-Term Memory (LSTM) network as the benchmark model. A Turing test was performed on 20 people for both models and the LSTM on average was identified as human-made 36% of the time, while the Bayesian network, on average, had been misidentified 39% of the time. These results may indicate that music is more probabilistic than time-dependent.", "venue": "2021 Southern African Universities Power Engineering Conference/Robotics and Mechatronics/Pattern Recognition Association of South Africa (SAUPEC/RobMech/PRASA)", "year": 2021, "referenceCount": 21, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-01-27", "journal": {"pages": "1-4", "name": "2021 Southern African Universities Power Engineering Conference/Robotics and Mechatronics/Pattern Recognition Association of South Africa (SAUPEC/RobMech/PRASA)"}, "authors": [{"authorId": "2057090856", "name": "Marc Marsden"}, {"authorId": "9347837", "name": "Ritesh Ajoodha"}]}, {"paperId": "71db7410e6f96aae8bf3a95e5a938c3ac9fb193b", "externalIds": {"DBLP": "journals/corr/abs-2101-11221", "ArXiv": "2101.11221", "CorpusId": 231718610}, "url": "https://www.semanticscholar.org/paper/71db7410e6f96aae8bf3a95e5a938c3ac9fb193b", "title": "Learning task-agnostic representation via toddler-inspired learning", "abstract": "One of the inherent limitations of current AI systems, stemming from the passive learning mechanisms (e.g., supervised learning), is that they perform well on labeled datasets but cannot deduce knowledge on their own. To tackle this problem, we derive inspiration from a highly intentional learning system via action: the toddler. Inspired by the toddler\u2019s learning procedure, we design an interactive agent that can learn and store task-agnostic visual representation while exploring and interacting with objects in the virtual environment. Experimental results show that such obtained representation was expandable to various vision tasks such as image classification, object localization, and distance estimation tasks. In specific, the proposed model achieved 100%, 75.1% accuracy and 1.62% relative error, respectively, which is noticeably better than autoencoder-based model (99.7%, 66.1%, 1.95%), and also comparable with those of supervised models (100%, 87.3%, 0.71%).", "venue": "ArXiv", "year": 2021, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-27", "journal": {"volume": "abs/2101.11221", "name": "ArXiv"}, "authors": [{"authorId": "73758722", "name": "Kwanyoung Park"}, {"authorId": "2109220128", "name": "Junseok Park"}, {"authorId": "2087142998", "name": "Hyunseok Oh"}, {"authorId": "1692756", "name": "Byoung-Tak Zhang"}, {"authorId": "2145418994", "name": "Youngki Lee"}]}, {"paperId": "cbad0923db89f23febcbd6192ff4149289ff2ad9", "externalIds": {"DBLP": "journals/jbd/Adadi21", "DOI": "10.1186/s40537-021-00419-9", "CorpusId": 231723319}, "url": "https://www.semanticscholar.org/paper/cbad0923db89f23febcbd6192ff4149289ff2ad9", "title": "A survey on data\u2010efficient algorithms in big data era", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 316, "citationCount": 37, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-01-26", "journal": {"volume": "8", "pages": "1-54", "name": "Journal of Big Data"}, "authors": [{"authorId": "9139705", "name": "Amina Adadi"}]}, {"paperId": "7ed3d41d5ba99a390ac9233e9c3d6af62358aee5", "externalIds": {"DBLP": "journals/corr/abs-2101-10899", "ArXiv": "2101.10899", "DOI": "10.23919/ICN.2021.0015", "CorpusId": 231709221}, "url": "https://www.semanticscholar.org/paper/7ed3d41d5ba99a390ac9233e9c3d6af62358aee5", "title": "Artificial Intelligence for Satellite Communication: A Review", "abstract": ": Satellite communication offers the prospect of service continuity over uncovered and under-covered areas, service ubiquity, and service scalability. However, several challenges must first be addressed to realize these benefits, as the resource management, network control, network security, spectrum management, and energy usage of satellite networks are more challenging than that of terrestrial networks. Meanwhile, artificial intelligence (AI), including machine learning, deep learning, and reinforcement learning, has been steadily growing as a research field and has shown successful results in diverse applications, including wireless communication. In particular, the application of AI to a wide variety of satellite communication aspects has demonstrated excellent potential, including beam-hopping, anti-jamming, network traffic forecasting, channel modeling, telemetry mining, ionospheric scintillation detecting, interference managing, remote sensing, behavior modeling, space-air-ground integrating, and energy managing. This work thus provides a general overview of AI, its diverse sub-fields, and its state-of-the-art algorithms. Several challenges facing diverse aspects of satellite communication systems are then discussed, and their proposed and potential AI-based solutions are presented. Finally, an outlook of field is drawn, and future steps are suggested.", "venue": "Intelligent and Converged Networks", "year": 2021, "referenceCount": 242, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-01-25", "journal": {"volume": "abs/2101.10899", "name": "ArXiv"}, "authors": [{"authorId": "1970404776", "name": "Fares Fourati"}, {"authorId": "144789580", "name": "Mohamed-Slim Alouini"}]}, {"paperId": "b35aba33dc1dfa6d172e8fec71b8c64380f09fae", "externalIds": {"DOI": "10.2307/j.ctv1fcf88w.8", "CorpusId": 241390306}, "url": "https://www.semanticscholar.org/paper/b35aba33dc1dfa6d172e8fec71b8c64380f09fae", "title": "Advertisarial Relations and Aesthetics of Survival", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 208, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "4509c648349ca717e82aeb6be2707d97caaa709a", "externalIds": {"DOI": "10.1215/9781478012702-002", "CorpusId": 241552139}, "url": "https://www.semanticscholar.org/paper/4509c648349ca717e82aeb6be2707d97caaa709a", "title": "The Social Difference Engine and the World Computer", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "f6ae0df7bd30b31ef07c58b644d371735f78e271", "externalIds": {"DOI": "10.1215/9781478012702-011", "CorpusId": 241792626}, "url": "https://www.semanticscholar.org/paper/f6ae0df7bd30b31ef07c58b644d371735f78e271", "title": "Notes", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "f73798bbea47003db8531705226dcfb40ee97ee2", "externalIds": {"DOI": "10.1215/9781478012702-267", "CorpusId": 240947206}, "url": "https://www.semanticscholar.org/paper/f73798bbea47003db8531705226dcfb40ee97ee2", "title": "Appendix 2: The Derivative Image", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "3f68bc0cebae726cbe6e842a6dc1222b3de73d17", "externalIds": {"DOI": "10.1215/9781478012702-005", "CorpusId": 242889020}, "url": "https://www.semanticscholar.org/paper/3f68bc0cebae726cbe6e842a6dc1222b3de73d17", "title": "M-I-C-I\u2032-M\u2032", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "c227af05c392c034ffc04ad602446bd814f299b9", "externalIds": {"DOI": "10.1215/9781478012702-255", "CorpusId": 241150539}, "url": "https://www.semanticscholar.org/paper/c227af05c392c034ffc04ad602446bd814f299b9", "title": "Appendix 1: The Derivative Machine", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "31166b35483e38515b8d7b15368fe3dac035d967", "externalIds": {"DOI": "10.1215/9781478012702-009", "CorpusId": 240665178}, "url": "https://www.semanticscholar.org/paper/31166b35483e38515b8d7b15368fe3dac035d967", "title": "An Engineanda Camera", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "f6360a17e9ae6e69eaab63bf84cc285b67aa8c14", "externalIds": {"DOI": "10.1215/9781478012702-012", "CorpusId": 242818856}, "url": "https://www.semanticscholar.org/paper/f6360a17e9ae6e69eaab63bf84cc285b67aa8c14", "title": "References", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "c968db8d123275510170b5f36d734b39181e0237", "externalIds": {"DOI": "10.1215/9781478012702-010", "CorpusId": 241278363}, "url": "https://www.semanticscholar.org/paper/c968db8d123275510170b5f36d734b39181e0237", "title": "Derivative Living and Subaltern Futures", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "9c10c0ef07b1de843eab9d22846e3f9b79ff99c9", "externalIds": {"DOI": "10.1215/9781478012702-003", "CorpusId": 243388274}, "url": "https://www.semanticscholar.org/paper/9c10c0ef07b1de843eab9d22846e3f9b79ff99c9", "title": "The Computational Unconscious", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "c0215dca4e170f6c3d7b05c031ec9f39a2ff1afe", "externalIds": {"DBLP": "journals/biosystems/CottamV21", "DOI": "10.1016/j.biosystems.2021.104366", "CorpusId": 231700809, "PubMed": "33486092"}, "url": "https://www.semanticscholar.org/paper/c0215dca4e170f6c3d7b05c031ec9f39a2ff1afe", "title": "The necessity of hierarchy for living systems", "abstract": null, "venue": "Biosyst.", "year": 2021, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-21", "journal": {"pages": "\n 104366\n ", "name": "Bio Systems"}, "authors": [{"authorId": "1888944", "name": "R. Cottam"}, {"authorId": "47920765", "name": "R. Vounckx"}]}, {"paperId": "f5f47fe059f2b3f9f25b5d3fbdac414af815c1f6", "externalIds": {"MAG": "3122521504", "DOI": "10.3390/ELECTRONICS10030229", "CorpusId": 234159430}, "url": "https://www.semanticscholar.org/paper/f5f47fe059f2b3f9f25b5d3fbdac414af815c1f6", "title": "EdgeAvatar: An Edge Computing System for Building Virtual Beings", "abstract": "Dialogue systems, also known as conversational agents, are computing systems that use algorithms for speech and language processing to engage in conversation with humans or other conversation-capable systems. A chatbot is a conversational agent that has, as its primary goal, to maximize the length of the conversation without any specific targeted task. When a chatbot is embellished with an artistic approach that is meant to evoke an emotional response, then it is called a virtual being. On the other hand, conversational agents that interact with the physical world require the use of specialized hardware to sense and process captured information. In this article we describe EdgeAvatar, a system based on Edge Computing principles for the creation of virtual beings. The objective of the EdgeAvatar system is to provide a streamlined and modular framework for virtual being applications that are to be deployed in public settings. We also present two implementations that use EdgeAvatar and are inspired by historical figures to interact with visitors of the Venice Biennale 2019. EdgeAvatar can adapt to fit different approaches for AI powered conversations.", "venue": "Electronics", "year": 2021, "referenceCount": 35, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-20", "journal": {"name": "Electronics"}, "authors": [{"authorId": "35222148", "name": "N. Watkinson"}, {"authorId": "2090783261", "name": "Fedor Zaitsev"}, {"authorId": "8759520", "name": "Aniket Shivam"}, {"authorId": "2090194741", "name": "Michael Demirev"}, {"authorId": "2090194342", "name": "Mike Heddes"}, {"authorId": "1724343", "name": "T. Givargis"}, {"authorId": "145330843", "name": "A. Nicolau"}, {"authorId": "1764886", "name": "A. Veidenbaum"}]}, {"paperId": "05d45d8c4f7e9d63861bd28a83f49fa1a9c010ee", "externalIds": {"DOI": "10.1109/ICICT50816.2021.9358531", "CorpusId": 232072286}, "url": "https://www.semanticscholar.org/paper/05d45d8c4f7e9d63861bd28a83f49fa1a9c010ee", "title": "Information Acquisition Chatbot System using LUIS", "abstract": "The college information chatbot system is enhanced using the Na\u00efve Bayes classification algorithm that analyzes user's queries and messages. This system responds appropriately to the queries that are posed by the user using in-built Artificial Intelligence (AI) with an effective Graphical User Interface (GUI) tool. The queries posed by the user were analyzed by the chatbot using a cognitive service named Language Understanding Intelligent System (LUIS), which is designed by Microsoft. It is integrated with the Skype application which can be downloaded and installed from the play store on the user's smartphone.", "venue": "2021 6th International Conference on Inventive Computation Technologies (ICICT)", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-01-20", "journal": {"pages": "1025-1029", "name": "2021 6th International Conference on Inventive Computation Technologies (ICICT)"}, "authors": [{"authorId": "2077058924", "name": "V. Prathyusha"}, {"authorId": "2051698078", "name": "G. L. Sri"}, {"authorId": "145935488", "name": "G. Meenakshi"}, {"authorId": "2051693363", "name": "Y. K. Chakravarti"}]}, {"paperId": "64231d0b49252e5bb9ece098434b3387b61ec1ff", "externalIds": {"ArXiv": "2101.08286", "DBLP": "journals/corr/abs-2101-08286", "DOI": "10.1073/pnas.2107151119", "CorpusId": 231662111}, "url": "https://www.semanticscholar.org/paper/64231d0b49252e5bb9ece098434b3387b61ec1ff", "title": "Can stable and accurate neural networks be computed? - On the barriers of deep learning and Smale's 18th problem", "abstract": "A BSTRACT . Deep learning (DL) has had unprecedented success and is now entering scienti\ufb01c computing with full force. However, current DL methods typically suffer from instability, even when universal approximation properties guarantee the existence of stable neural networks (NNs). We address this paradox by demonstrating basic well-conditioned problems in scienti\ufb01c computing where one can prove the existence of NNs with great approximation qualities, however, there does not exist any algorithm, even randomised, that can train (or compute) such a NN. For any positive integers K > 2 and L , there are cases where simultaneously: (a) no randomised training algorithm can compute a NN correct to K digits with probability greater than 1 / 2 , (b) there exists a deterministic training algorithm that computes a NN with K \u2212 1 correct digits, but any such (even randomised) algorithm needs arbitrarily many training data, (c) there exists a deterministic training algorithm that computes a NN with K \u2212 2 correct digits using no more than L training samples. These results imply a classi\ufb01cation theory describing conditions under which (stable) NNs with a given accuracy can be computed by an algorithm. We begin this theory by establishing suf\ufb01cient conditions for the existence of algorithms that compute stable NNs in inverse problems. We introduce Fast Iterative REstarted NETworks (FIRENETs), which we both prove and numerically verify are stable. Moreover, we prove that only O ( | log( (cid:15) ) | ) layers are needed for an (cid:15) -accurate solution to the inverse problem. Here we provide statements of theorems from the main text, proofs of theorems, detailed explanations of the experimental setup and further numerical examples. We brie\ufb02y collect some basic notation, and further notation will be introduced throughout where appropriate. We use N m,N to denote the class of neural networks (NNs) from C m to C N (see \u00a71.1.2.1 for the precise de\ufb01nition). Given a metric space ( M , d ) , x \u2208 M and X \u2282 M , d ( x, X ) = dist( x, X ) = inf y \u2208 X d ( x, y ) . For a matrix A \u2208 C m \u00d7 N , the norm k A k refers to the operator norm of A when C m and C N are equipped with the standard l 2 -norm. For x \u2208 C N and p \u2208 [1 , \u221e ] , k x k l p refers to the l p -norm of x . For a set of indices S and vector x , x S is the vector de\ufb01ned by ( x S ) j = x j if j \u2208 S and ( x S ) j = 0 if j / \u2208 S . Complex rationals Q + i Q are denoted by Q [ i ] . We use (cid:3) to denote the end of a proof and (cid:2) to denote the end of a remark.", "venue": "ArXiv", "year": 2021, "referenceCount": 168, "citationCount": 37, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-20", "journal": {"volume": "abs/2101.08286", "name": "ArXiv"}, "authors": [{"authorId": "72167909", "name": "Vegard Antun"}, {"authorId": "51445731", "name": "Matthew J. Colbrook"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": "fb0400e21bdb776ce56eab2d9f9faf7d06f80258", "externalIds": {"DBLP": "journals/sncs/KumarJ21", "DOI": "10.1007/s42979-020-00445-z", "CorpusId": 231681776}, "url": "https://www.semanticscholar.org/paper/fb0400e21bdb776ce56eab2d9f9faf7d06f80258", "title": "Benchmarks for Designing a Secure Devanagari CAPTCHA", "abstract": null, "venue": "SN Computer Science", "year": 2021, "referenceCount": 39, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-19", "journal": {"volume": "2", "pages": "45", "name": "SN Comput. Sci."}, "authors": [{"authorId": "2109783064", "name": "Mohinder Kumar"}, {"authorId": "35495324", "name": "M. Jindal"}]}, {"paperId": "fc9c61e350dfe46e4b7c896a2dc9e33b14b9d279", "externalIds": {"MAG": "3121514122", "DOI": "10.3390/ECONOMIES9010006", "CorpusId": 234145955}, "url": "https://www.semanticscholar.org/paper/fc9c61e350dfe46e4b7c896a2dc9e33b14b9d279", "title": "A Review of the Applications of Genetic Algorithms to Forecasting Prices of Commodities", "abstract": "This paper is focused on the concise review of the specific applications of genetic algorithms in forecasting commodity prices. Genetic algorithms seem relevant in this field for many reasons. For instance, they lack the necessity to assume a certain statistical distribution, and they are efficient in dealing with non-stationary data. Indeed, the latter case is very frequent while forecasting the commodity prices of, for example, crude oil. Moreover, growing interest in their application has been observed recently. In parallel, researchers are also interested in constructing hybrid genetic algorithms (i.e., joining them with other econometric methods). Such an approach helps to reduce each of the individual method flaws and yields promising results. In this article, three groups of commodities are discussed: energy commodities, metals, and agricultural products. The advantages and disadvantages of genetic algorithms and their hybrids are presented, and further conclusions concerning their possible improvements and other future applications are discussed. This article fills a significant literature gap, focusing on particular financial and economic applications. In particular, it combines three important\u2014yet not often jointly discussed\u2014topics: genetic algorithms, their hybrids with other tools, and commodity price forecasting issues.", "venue": "", "year": 2021, "referenceCount": 149, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-19", "journal": {"volume": "9", "pages": "6", "name": "Economies"}, "authors": [{"authorId": "41048391", "name": "Krzysztof Drachal"}, {"authorId": "101686868", "name": "M. Pawlowski"}]}, {"paperId": "d3380952b99d3516116d64213db28faaac5b16de", "externalIds": {"DOI": "10.1007/s00146-020-01136-2", "CorpusId": 253687771}, "url": "https://www.semanticscholar.org/paper/d3380952b99d3516116d64213db28faaac5b16de", "title": "There is no \u201cI\u201d in \u201cAI\u201d", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-15", "journal": {"volume": "36", "pages": "1035 - 1046", "name": "AI & SOCIETY"}, "authors": [{"authorId": "11060885", "name": "A. Farhadi"}]}, {"paperId": "58d7bb3a12dba344653570a2fc788c977f1f9dac", "externalIds": {"MAG": "3155332569", "DOI": "10.30658/HMC.2.3", "CorpusId": 234972240}, "url": "https://www.semanticscholar.org/paper/58d7bb3a12dba344653570a2fc788c977f1f9dac", "title": "Voice-Based Agents as Personified Things: Assimilation and Accommodation as Equilibration of Doubt", "abstract": "We aim to investigate the nature of doubt regarding voice-based agents by referring to Piaget\u2019s ontological object\u2013subject classification \u201cthing\u201d and \u201cperson,\u201d its associated equilibration processes, and influential factors of the situation, the user, and the agent. In two online surveys, we asked 853 and 435 participants, ranging from 17 to 65 years of age, to assess Alexa and the Google Assistant. We discovered that only some people viewed voice-based agents as mere things, whereas the majority classified them into personified things. However, their classification is fragile and depends basically on the imputation of subject-like attributes of agency and mind to the voice-based agents, increased by a dyadic using situation, previous regular interactions, a younger age, and an introverted personality of the user. We discuss these results in a broader context.", "venue": "", "year": 2021, "referenceCount": 77, "citationCount": 12, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-15", "journal": {"volume": "2", "pages": "57-79", "name": ""}, "authors": [{"authorId": "2098144309", "name": "Katrin Etzrodt"}, {"authorId": "25512473", "name": "Sven Engesser"}]}, {"paperId": "300b89c409aa6ea5e6249fd468c4270a56204a56", "externalIds": {"MAG": "3155770175", "DOI": "10.30780/IJTRS.V06.I01.003", "CorpusId": 234367349}, "url": "https://www.semanticscholar.org/paper/300b89c409aa6ea5e6249fd468c4270a56204a56", "title": "CAPTCHA: A TOOL FOR WEB SECURITY", "abstract": "Malicious computer programs today have tried to target websites, which have a significant effect on their availability and security. The CAPTCHA is a tool that is an efficient way of solving this problem. CAPTCHA is a full automated public turing test. Many human activities are performed on the Internet every day, such as schooling, commerce, conversations etc. Some hackers write programs to automatically make false registrations, for example when registering in websites, that waste web resources while this may even stop the whole website. Thus, human users should be differentiated from CAPTCHA software systems. CAPTCHA handwritten picture may be a work around. In this paper literature review of CAPTCHA has been done in order to enhance our knowledge about how CAPTCHA can provide web security focusing in particular on handwritten CAPTCHA and audio, video CAPTCHA in general.", "venue": "", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-15", "journal": {"volume": "6", "pages": "16-20", "name": ""}, "authors": [{"authorId": "2060326443", "name": "Gurpreet Kaur"}, {"authorId": "50318908", "name": "D. Rai"}]}, {"paperId": "2b44fd0e7875dc217f6877d25c70eb8c0e8051c7", "externalIds": {"MAG": "3119191159", "DOI": "10.3390/SU13020800", "CorpusId": 234316501}, "url": "https://www.semanticscholar.org/paper/2b44fd0e7875dc217f6877d25c70eb8c0e8051c7", "title": "Artificial Intelligence and Reflections from Educational Landscape: A Review of AI Studies in Half a Century", "abstract": "Artificial intelligence (AI) has penetrated every layer of our lives, and education is not immune to the effects of AI. In this regard, this study examines AI studies in education in half a century (1970\u20132020) through a systematic review approach and benefits from social network analysis and text-mining approaches. Accordingly, the research identifies three research clusters (1) artificial intelligence, (2) pedagogical, and (3) technological issues, and suggests five broad research themes which are (1) adaptive learning and personalization of education through AI-based practices, (2) deep learning and machine Learning algorithms for online learning processes, (3) Educational human-AI interaction, (4) educational use of AI-generated data, and (5) AI in higher education. The study also highlights that ethics in AI studies is an ignored research area.", "venue": "Sustainability", "year": 2021, "referenceCount": 75, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-15", "journal": {"name": "Sustainability"}, "authors": [{"authorId": "3902896", "name": "Aras Bozkurt"}, {"authorId": "68980771", "name": "Abdulkadir Karadeniz"}, {"authorId": "2124259", "name": "David Ba\u00f1eres"}, {"authorId": "1398239354", "name": "Ana-Elena Guerrero-Rold\u00e1n"}, {"authorId": "2107266585", "name": "M. E. Rodr\u00edguez"}]}, {"paperId": "30fd9dc890a6af150df9bf045ca311b36fe20091", "externalIds": {"DOI": "10.1108/978-1-80043-107-220211005", "CorpusId": 242460734}, "url": "https://www.semanticscholar.org/paper/30fd9dc890a6af150df9bf045ca311b36fe20091", "title": "References", "abstract": null, "venue": "Posthumanism in Digital Culture", "year": 2021, "referenceCount": 165, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-15", "journal": {"name": "Posthumanism in Digital Culture"}, "authors": []}, {"paperId": "077e41eb0d8d1979e17ab79eb8ae6a356972310e", "externalIds": {"DOI": "10.1007/s00146-020-01139-z", "CorpusId": 253686557}, "url": "https://www.semanticscholar.org/paper/077e41eb0d8d1979e17ab79eb8ae6a356972310e", "title": "Technoevidence: the \"Turing limit\" 2020", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-13", "journal": {"volume": "36", "pages": "1021 - 1028", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2115580470", "name": "J. Marshall"}]}, {"paperId": "25a595559157e0ff2c93683a1dd2ad66da42a3c3", "externalIds": {"DOI": "10.1007/s13194-020-00343-4", "CorpusId": 231607773}, "url": "https://www.semanticscholar.org/paper/25a595559157e0ff2c93683a1dd2ad66da42a3c3", "title": "Creativity as potentially valuable improbable constructions", "abstract": null, "venue": "", "year": 2021, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-13", "journal": {"volume": "11", "pages": "1-24", "name": "European Journal for Philosophy of Science"}, "authors": [{"authorId": "3388092", "name": "Mark Fedyk"}, {"authorId": "2152478414", "name": "Fei Xu"}]}, {"paperId": "b2a8c4513302759ea9f90a4c1a63a59e4f16749a", "externalIds": {"MAG": "3100801413", "DOI": "10.1146/annurev-criminol-051520-012342", "CorpusId": 228892996}, "url": "https://www.semanticscholar.org/paper/b2a8c4513302759ea9f90a4c1a63a59e4f16749a", "title": "Artificial Intelligence, Predictive Policing, and Risk Assessment for Law Enforcement", "abstract": "There are widespread concerns about the use of artificial intelligence in law enforcement. Predictive policing and risk assessment are salient examples. Worries include the accuracy of forecasts that guide both activities, the prospect of bias, and an apparent lack of operational transparency. Nearly breathless media coverage of artificial intelligence helps shape the narrative. In this review, we address these issues by first unpacking depictions of artificial intelligence. Its use in predictive policing to forecast crimes in time and space is largely an exercise in spatial statistics that in principle can make policing more effective and more surgical. Its use in criminal justice risk assessment to forecast who will commit crimes is largely an exercise in adaptive, nonparametric regression. It can in principle allow law enforcement agencies to better provide for public safety with the least restrictive means necessary, which can mean far less use of incarceration. None of this is mysterious. Nevertheless, concerns about accuracy, fairness, and transparency are real, and there are tradeoffs between them for which there can be no technical fix. You can't have it all. Solutions will be found through political and legislative processes achieving an acceptable balance between competing priorities.", "venue": "Annual Review of Criminology", "year": 2021, "referenceCount": 81, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-13", "journal": {"name": "Annual Review of Criminology"}, "authors": [{"authorId": "50496565", "name": "R. Berk"}]}, {"paperId": "c8048c270ee699ec7efddc422e2d99279e3f65f7", "externalIds": {"MAG": "3120222962", "DOI": "10.24018/EJECE.2021.5.1.265", "CorpusId": 234307075}, "url": "https://www.semanticscholar.org/paper/c8048c270ee699ec7efddc422e2d99279e3f65f7", "title": "EEG Channel Selection Using A Modified Grey Wolf Optimizer", "abstract": "Consider an increasingly growing field of research, Brain-Computer Interface (BCI) is to form a direct channel of communication between a computer and the brain. However, extracting features of random time-varying EEG signals and their classification is a major challenge that faces current BCI. This paper proposes a modified grey wolf optimizer (MGWO) that can select optimal EEG channels to be used in (BCIs), the way that identifies main features and the immaterial ones from that dataset and the complexity to be removed. This allows (MGWO) to opt for optimal EEG channels as well as helping machine learning classification in its tasks when doing training to the classifier with the dataset. (MGWO), which imitates the grey wolves leadership and hunting manner nature and which consider metaheuristics swarm intelligence algorithms, is an integration with two modification to achieve the balance between exploration and exploitation the first modification applies exponential change for the number of iterations to increase search space accordingly exploitation, the second modification is the crossover operation that is used to increase the diversity of the population and enhance exploitation capability. Experimental results use four different EEG datasets BCI Competition IV- dataset 2a, BCI Competition IV- data set III, BCI Competition II data set III, and EEG Eye State from UCI Machine Learning Repository to evaluate the quality and effectiveness of the (MGWO). A cross-validation method is used to measure the stability of the (MGWO).", "venue": "", "year": 2021, "referenceCount": 39, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-12", "journal": {"volume": "5", "pages": "17-24", "name": ""}, "authors": [{"authorId": "90037491", "name": "Hussien Hussien"}, {"authorId": "1405789712", "name": "E. El-Kenawy"}, {"authorId": "86896252", "name": "A. El-Desouky"}]}, {"paperId": "e5079c59630dc2031557f9dffb3214316125c509", "externalIds": {"MAG": "3120147286", "DOI": "10.1108/IJLM-01-2020-0043", "CorpusId": 234246258}, "url": "https://www.semanticscholar.org/paper/e5079c59630dc2031557f9dffb3214316125c509", "title": "The impact of emerging and disruptive technologies on freight transportation in the digital era: current state and future trends", "abstract": "Purpose - With various challenges in the digital era, stakeholders are expressing growing interests in understanding the impact of emerging and disruptive technologies on freight transportation. This paper provides a systematic literature review of the current state of affairs as well as future trends and aims to support stakeholders' decision-making in logistics management in the era of disruptive technologies. Design/methodology/approach - Several recent and representative articles from academic, industrial and governmental perspectives were investigated to set the scene for this research and to serve as a baseline for electing nine emerging technologies, which were then used to conduct a systematic literature review covering the literature within the area during the past twelve years. Findings - 3D printing, artificial intelligence, automated robots, autonomous vehicles, big data analytics, blockchain, drones, electric vehicles and the Internet of Things were identified as the emerging technologies. The current state of existing research and potential future opportunities were analyzed. Research limitations/implications - Since the potential literature body is almost impossible to fully cover, a tradeoff between the number of emerging technologies and the related literature reviewed has been performed. However, the paper provides a novel approach to select the emerging and disruptive technologies and a systematic literature review to fill the identified research gap in the related literature. Practical implications -The research support various stakeholders to better capture the current status of and the future opportunities in freight transportation and gain a clearer understanding of the disruptive technologies as well as to guide them in how to deploy these initiatives in future decision-making. Originality/value - By providing a systematic literature review on the trends, themes and research opportunities in the era of disruptive technologies, the papers bring about broad and comprehensive review on the impact of disruptive technologies on logistics and transportation as well as opportunities to support management decision support in the logistics industry.", "venue": "", "year": 2021, "referenceCount": 143, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-12", "journal": {"volume": "", "name": "The International Journal of Logistics Management"}, "authors": [{"authorId": "23162313", "name": "Chuanwen Dong"}, {"authorId": "10282239", "name": "A. Akram"}, {"authorId": "50042110", "name": "Dan Andersson"}, {"authorId": "1382842511", "name": "Per-Olof Arn\u00e4s"}, {"authorId": "145567857", "name": "G. Stefansson"}]}, {"paperId": "65dc1a2b91fabe5f9c1d7396659eda3cc501d158", "externalIds": {"ArXiv": "2101.03477", "DBLP": "journals/cogcom/WashingtonKKHKL21", "DOI": "10.1007/s12559-021-09936-4", "CorpusId": 237604952, "PubMed": "35669554"}, "url": "https://www.semanticscholar.org/paper/65dc1a2b91fabe5f9c1d7396659eda3cc501d158", "title": "Training Affective Computer Vision Models by Crowdsourcing Soft-Target Labels", "abstract": null, "venue": "Cogn. Comput.", "year": 2021, "referenceCount": 113, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-10", "journal": {"volume": "13 5", "pages": "\n 1363-1373\n ", "name": "Cognitive computation"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": "3079884", "name": "H. Kalantarian"}, {"authorId": "82564234", "name": "J. Kent"}, {"authorId": "1606872067", "name": "A. Husic"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": "1899752689", "name": "\u00c9. Leblanc"}, {"authorId": "2037685246", "name": "C. Hou"}, {"authorId": "2037683491", "name": "C. Mutlu"}, {"authorId": "48913193", "name": "K. Dunlap"}, {"authorId": "70295528", "name": "Y. Penev"}, {"authorId": "30423115", "name": "N. Stockham"}, {"authorId": "66636865", "name": "B. Chrisman"}, {"authorId": "2240125", "name": "K. Paskov"}, {"authorId": "145533499", "name": "Jae-Yoon Jung"}, {"authorId": "21701693", "name": "C. Voss"}, {"authorId": "32551479", "name": "N. Haber"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "f59b41dc481b1518881753016a808324f2e5e692", "externalIds": {"DBLP": "journals/corr/abs-2101-06105", "ArXiv": "2101.06105", "DOI": "10.6084/m9.figshare.13514371", "CorpusId": 231627565}, "url": "https://www.semanticscholar.org/paper/f59b41dc481b1518881753016a808324f2e5e692", "title": "Scientific Relevance and Future of Digital Immortality and Virtual Humans", "abstract": "We are on the threshold of a significant change in the way we view digital life, which will have a major effect on the physical world. Computers have increasingly emulated deceased human beings through growing awareness in the fields of artificial intelligence, big data, and machine learning, and have symbolically managed to overcome death with the help of technology. One thing is clear, though: now that there are proper and legitimate discussions happening about human immortality, we can be certain that the future is upon us. This article attempts to explain and challenge the ways in which digital immortality, in particular, has manifested itself. This paper summarizes the technological solutions, research findings and technical challenges of major researchers by reviewing the key technologies and general technical schemes in the field of digital human beings. The prospects of digital human beings are being investigated.", "venue": "ArXiv", "year": 2021, "referenceCount": 17, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-01-09", "journal": {"volume": "abs/2101.06105", "name": "ArXiv"}, "authors": [{"authorId": "4781329", "name": "Daniel Cebo"}]}, {"paperId": "69903adb3a1158b53e5a60c22dbc1731c0526c38", "externalIds": {"MAG": "3118935583", "DBLP": "journals/patterns/KanzaBNMF21", "PubMedCentral": "7815949", "DOI": "10.1016/j.patter.2020.100162", "CorpusId": 231720334, "PubMed": "33511363"}, "url": "https://www.semanticscholar.org/paper/69903adb3a1158b53e5a60c22dbc1731c0526c38", "title": "The AI for Scientific Discovery Network+", "abstract": null, "venue": "Patterns", "year": 2021, "referenceCount": 85, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering", "Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-01-08", "journal": {"volume": "2", "name": "Patterns"}, "authors": [{"authorId": "26554027", "name": "Samantha Kanza"}, {"authorId": "39742911", "name": "C. Bird"}, {"authorId": "145387873", "name": "M. Niranjan"}, {"authorId": "2075786970", "name": "W. McNeill"}, {"authorId": "32113616", "name": "J. Frey"}]}, {"paperId": "f73afb95c60a8772e9ab9f2d7205270856799118", "externalIds": {"DOI": "10.1038/s41427-020-00274-9", "CorpusId": 231202741}, "url": "https://www.semanticscholar.org/paper/f73afb95c60a8772e9ab9f2d7205270856799118", "title": "Artificial synapses with a sponge-like double-layer porous oxide memristor", "abstract": null, "venue": "NPG Asia Materials", "year": 2021, "referenceCount": 85, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-08", "journal": {"volume": "13", "pages": "1-10", "name": "NPG Asia Materials"}, "authors": [{"authorId": "49106354", "name": "Qin Gao"}, {"authorId": "49393449", "name": "Anping Huang"}, {"authorId": "2158144294", "name": "Jing Zhang"}, {"authorId": "50006654", "name": "Yuhang Ji"}, {"authorId": "2157053878", "name": "Jingjing Zhang"}, {"authorId": "2000512523", "name": "Xueliang Chen"}, {"authorId": "2129128986", "name": "Xueli Geng"}, {"authorId": "103089596", "name": "Qi Hu"}, {"authorId": "2145319028", "name": "Mei Wang"}, {"authorId": "123034612", "name": "Zhisong Xiao"}, {"authorId": "2146824098", "name": "P. K. Chu"}]}, {"paperId": "197864c0f8cb98d8edacb0595625238c84aed6ec", "externalIds": {"PubMedCentral": "7787507", "DOI": "10.1016/j.ejro.2021.100322", "CorpusId": 230794556, "PubMed": "33432297"}, "url": "https://www.semanticscholar.org/paper/197864c0f8cb98d8edacb0595625238c84aed6ec", "title": "Risk of in-hospital death associated with Covid-19 lung consolidations on chest computed tomography \u2013 A novel translational approach using a radiation oncology contour software", "abstract": null, "venue": "European Journal of Radiology Open", "year": 2021, "referenceCount": 31, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-06", "journal": {"volume": "8", "name": "European Journal of Radiology Open"}, "authors": [{"authorId": "74663710", "name": "L. Sapienza"}, {"authorId": "82429143", "name": "K. Nasra"}, {"authorId": "8603611", "name": "V. Calsavara"}, {"authorId": "1471812972", "name": "T. Little"}, {"authorId": "144004992", "name": "V. Narayana"}, {"authorId": "1398229369", "name": "E. Abu-Isa"}]}, {"paperId": "e17f3c3f446f2dbf1fd77b8a6c0d76f38822e300", "externalIds": {"DBLP": "journals/cp/Hung21", "DOI": "10.1007/s10339-020-01009-y", "CorpusId": 230784962, "PubMed": "33404900"}, "url": "https://www.semanticscholar.org/paper/e17f3c3f446f2dbf1fd77b8a6c0d76f38822e300", "title": "Nonhuman rationality: a predictive coding perspective", "abstract": null, "venue": "Cogn. Process.", "year": 2021, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-06", "journal": {"volume": "22", "pages": "353-362", "name": "Cognitive Processing"}, "authors": [{"authorId": "2139153", "name": "Tzu-Wei Hung"}]}, {"paperId": "bd201eae8672b10af7fa47f37ae5c1544bd446a8", "externalIds": {"MAG": "3122785935", "DBLP": "conf/hicss/AhmadSR21", "DOI": "10.24251/HICSS.2021.492", "CorpusId": 232414121}, "url": "https://www.semanticscholar.org/paper/bd201eae8672b10af7fa47f37ae5c1544bd446a8", "title": "Communicating with Machines: Conversational Agents with Personality and the Role of Extraversion", "abstract": "Communication with conversational agents (CA) has become increasingly important. It therefore is crucial to understand how individuals perceive interaction with CAs and how the personality of both the CA and the human can affect the interaction experience. As personality differences are manifested in language cues, we investigate whether different language style manifestations of extraversion lead to a more anthropomorphized perception (specifically perceived humanness and social presence) of the personality bots. We examine, whether individuals rate communication satisfaction of a CA similar to their own personality as higher (law of attraction). The results of our experiment indicate that highly extraverted CAs are generally better received in terms of social presence and communication satisfaction. Further, incorporating personality into CAs increases perceived humanness. Although no significant effects could be found in regard to the law of attraction, interesting findings about ambiverts could be made. The outcomes of the experiment contribute towards designing personality-adaptive CAs.", "venue": "Hawaii International Conference on System Sciences", "year": 2021, "referenceCount": 66, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-05", "journal": {"pages": "1-10"}, "authors": [{"authorId": "29417708", "name": "Rangina Ahmad"}, {"authorId": "2160598", "name": "Dominik Siemon"}, {"authorId": "1398032634", "name": "S. Robra-Bissantz"}]}, {"paperId": "ac92ee40bedbb16aa9c57320421edc39cb3905ad", "externalIds": {"DBLP": "journals/corr/abs-2101-01533", "ArXiv": "2101.01533", "DOI": "10.1016/j.cortex.2021.01.001", "CorpusId": 230523649, "PubMed": "33677138"}, "url": "https://www.semanticscholar.org/paper/ac92ee40bedbb16aa9c57320421edc39cb3905ad", "title": "On the control of attentional processes in vision", "abstract": null, "venue": "Cortex", "year": 2021, "referenceCount": 144, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-05", "journal": {"volume": "137", "pages": "305-329", "name": "Cortex"}, "authors": [{"authorId": "51421045", "name": "John Tsotsos"}, {"authorId": "66905627", "name": "O. Abid"}, {"authorId": "3468296", "name": "Iuliia Kotseruba"}, {"authorId": "36000196", "name": "M. Solbach"}]}, {"paperId": "5d538ce49e1c43e95a4cb592081b0bc4b8733d4b", "externalIds": {"ArXiv": "2101.02018", "DBLP": "journals/corr/abs-2101-02018", "CorpusId": 230770255}, "url": "https://www.semanticscholar.org/paper/5d538ce49e1c43e95a4cb592081b0bc4b8733d4b", "title": "Abusive Advertising: Scrutinizing socially relevant algorithms in a black box analysis to examine their impact on vulnerable patient groups in the health sector", "abstract": "The targeted direct-to-customer marketing of unapproved stem cell treatments by a questionable online industry is directed at vulnerable users who search the Internet in the hope of a cure. This behavior especially poses a threat to individuals who find themselves in hopeless and desperate phases in their lives. They might show low reluctance to try therapies that solely promise a cure but are not scientifically proven to do so. In the worst case, they suffer serious side-effects. Therefore, this thesis examines the display of advertisements of unapproved stem cell treatments for Parkinson\u2019s Disease, Multiple Sclerosis, Diabetes on Google\u2019s results page. The company announced a policy change in September 2019 that was meant to prohibit and ban the practices in question. However, there was evidence that those ads were still being delivered. A browser extension for Firefox and Chrome was developed and distributed to conduct a crowdsourced Black Box analysis. It was delivered to volunteers and virtual machines in Australia, Canada, the USA and the UK. Data on search results, advertisements and top stories was collected and analyzed. The results showed that there still is questionable advertising even though Google announced to purge it from its platform.", "venue": "ArXiv", "year": 2021, "referenceCount": 409, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-04", "journal": {"volume": "abs/2101.02018", "name": "ArXiv"}, "authors": [{"authorId": "2045175321", "name": "Martin Reber"}]}, {"paperId": "dd65bf01821e54adb6615809e262e6dbef4f25a2", "externalIds": {"DOI": "10.1007/s00146-020-01129-1", "CorpusId": 253676281}, "url": "https://www.semanticscholar.org/paper/dd65bf01821e54adb6615809e262e6dbef4f25a2", "title": "Debate: what is personhood in the age of AI?", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 103, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-03", "journal": {"volume": "36", "pages": "473 - 486", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2249898", "name": "David J. Gunkel"}, {"authorId": "25163625", "name": "Jordan Joseph Wales"}]}, {"paperId": "3fb2ed344374cf53fde4f1f77206541eadd10f1f", "externalIds": {"DBLP": "journals/ais/GunkelW21", "DOI": "10.1007/s00146-020-01129-1", "CorpusId": 230284859}, "url": "https://www.semanticscholar.org/paper/3fb2ed344374cf53fde4f1f77206541eadd10f1f", "title": "Debate: what is personhood in the age of AI?", "abstract": null, "venue": "AI Soc.", "year": 2021, "referenceCount": 122, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-03", "journal": {"volume": "", "pages": "1-14", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2249898", "name": "David J. Gunkel"}, {"authorId": "25163625", "name": "Jordan Joseph Wales"}]}, {"paperId": "0e5c24b258a3e5cefd65afaf010c2b2a51ed20a4", "externalIds": {"MAG": "3133238569", "DOI": "10.1080/23312521.2020.1867025", "CorpusId": 231990924}, "url": "https://www.semanticscholar.org/paper/0e5c24b258a3e5cefd65afaf010c2b2a51ed20a4", "title": "Cognitive Vulnerability, Artificial Intelligence, and the Image of God in Humans", "abstract": "Abstract Recent progress in artificial intelligence (AI) opens up the possibility that one day machines could do anything that a human being can do, raising thus serious questions regarding human distinctiveness. For theological anthropology, the prospect of human-level AI brings a fresh opportunity to clarify the definition of the image of God. Comparing human and artificial intelligence leads to replacing the Aristotelian-like interpretation of the image of God as rationality with a relational model. Instead of regarding our cognitive biases as vulnerabilities, they should be seen as instrumental in bringing about our unique type of intelligence, one marked by relationality.", "venue": "Journal of Disability & Religion", "year": 2021, "referenceCount": 25, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-02", "journal": {"volume": "25", "pages": "27 - 40", "name": "Journal of Disability & Religion"}, "authors": [{"authorId": "151110907", "name": "M. Dorobantu"}]}, {"paperId": "21bf225da81242109819f376eb0deb40f6241a60", "externalIds": {"MAG": "3129196540", "DOI": "10.15446/HYS.N40.86929", "CorpusId": 234314379}, "url": "https://www.semanticscholar.org/paper/21bf225da81242109819f376eb0deb40f6241a60", "title": "Babbage, Willis, Reuleaux y el surgimiento del enfoque anal\u00edtico modular de las m\u00e1quinas en el siglo XIX", "abstract": "El estudio de las m\u00e1quinas es un campo que puede rastrearse hasta el Renacimiento. Sin embargo, en la Modernidad adquiere cierto perfil te\u00f3rico. Se produce una transformaci\u00f3n desde los tratados sobre la instalaci\u00f3n y uso que conciben a las m\u00e1quinas como una s\u00edntesis entre las estructuras materiales y el trabajo humano, hacia estudios anal\u00edticos que las consideran com entidades modulares, como ensamblaje de piezas y mecanismos susceptibles de ser analizados matem\u00e1ticamente. A su vez, los primeros se caracterizan por un enfoque antropom\u00e9trico que no ven mayores inconvenientes en usar el lenguaje coloquial e ilustraciones para transmitir el conocimiento acerca de las m\u00e1quinas; los segundos, en cambio, plantean problemas cognitivos y proponen lenguajes simb\u00f3licos espec\u00edficos para representar el dise\u00f1o y funcionamiento de las m\u00e1quinas. Comenzaremos por el siglo XVIII, al ilustrar algunos conceptos provenientes de L\u2019Encyclop\u00e9die y de Adam Smith. Posteriormente, nos enfocaremos en los matem\u00e1ticos del siglo XIX que promovieron las transformaciones mencionadas. En primer lugar, Charles Babbage y su notaci\u00f3n mec\u00e1nica; luego Robert Willis y Franz Reuleaux y sus \u201cmecanismos puros\u201d; y de nuevo Babbage para analizar la complementariedad de la econom\u00eda pol\u00edtica a sus estudios matem\u00e1ticos sobre las m\u00e1quinas. Finalmente, mostraremos algunos debates actuales sobre el v\u00ednculo entre m\u00e1quinas, realidad, matem\u00e1tica y lenguaje que, expl\u00edcita o impl\u00edcitamente, retoman aquellos problemas y pueden encontrar en el pensamiento de los matem\u00e1ticos del siglo XIX un antecedente.", "venue": "Historia y sociedad", "year": 2021, "referenceCount": 44, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"name": "Historia y sociedad"}, "authors": [{"authorId": "122364802", "name": "D. Sandrone"}]}, {"paperId": "f4606ee709c3b2e90880b2382bade799ad606e0c", "externalIds": {"MAG": "3151500458", "DOI": "10.21037/JHMHP-20-114", "CorpusId": 233959732}, "url": "https://www.semanticscholar.org/paper/f4606ee709c3b2e90880b2382bade799ad606e0c", "title": "Technological advances to enhance recovery after cardiac surgery", "abstract": "Surgery, and especially cardiac surgery, is common, costly, and entails considerable risk. Significant progress has been made in recent years to improve quality, promote patient safety, and increase value and cost-effectiveness in surgical care. Enhanced Recovery After Surgery (ERAS) initiatives are increasing in popularity, improving outcomes, and enriching patient satisfaction. First developed for abdominal surgical cases, ERAS has increasingly established itself across all surgical subspecialities, including cardiac surgery. ERAS focuses on evidence-based initiatives in the preoperative, intraoperative, and postoperative phases of care to promote patient well-being and efficient care. The deliberate, judicious incorporation of technology into surgery and the periprocedural home has tremendous, revolutionary potential in all phases of care and is consistent with ERAS principles. This technology can be harnessed by physicians and the care provider team, the healthcare system, and perhaps most importantly, by patients themselves to lead to a higher level of engagement. We will explore technology's transformational capability by concentrating on cardiac surgery because of its prevalence, costs, risks, and contribution to the healthcare system's bottom line. In addition, the role that ERAS combined with technology can play in a constructive manner will be important. We discuss the disruptive effect that the COVID-19 pandemic offers to accelerate these developments. While the human cost of the pandemic has been staggering, in the post-COVID world, the lessons learned can be vital. Finally, we seek to show that the opportunities technology provides are closely related to what both patients and the physician and provider teams want. As technology inevitably becomes more integrated into healthcare, the ability to harness technology to maximize patient outcomes and well-being while promoting more efficient healthcare delivery will be critical. \u00a9 Journal of Hospital Management and Health Policy. All rights reserved.", "venue": "Journal of Hospital Management and Health Policy", "year": 2021, "referenceCount": 181, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"name": "Journal of Hospital Management and Health Policy"}, "authors": [{"authorId": "6069268", "name": "K. Lobdell"}, {"authorId": "5556089", "name": "J. Appoo"}, {"authorId": "81948576", "name": "G. Rose"}, {"authorId": "35443576", "name": "B. Ferguson"}, {"authorId": "47320919", "name": "S. Chatterjee"}]}, {"paperId": "65603de2747fdac66560381800c15bb00082d285", "externalIds": {"DOI": "10.1016/j.pharma.2021.01.008", "CorpusId": 243070926}, "url": "https://www.semanticscholar.org/paper/65603de2747fdac66560381800c15bb00082d285", "title": "Applications de l\u2019intelligence artificielle au d\u00e9veloppement de nouveaux m\u00e9dicaments", "abstract": null, "venue": "Annales Pharmaceutiques Fran\u00e7aises", "year": 2021, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"name": "Annales Pharmaceutiques Fran\u00e7aises"}, "authors": [{"authorId": "47149135", "name": "P. Moingeon"}]}, {"paperId": "dde6963c0949eab1e42ded80bfba82b6beb4ba85", "externalIds": {"DBLP": "journals/paladyn/Saetra21", "DOI": "10.1515/pjbr-2021-0021", "CorpusId": 233449412}, "url": "https://www.semanticscholar.org/paper/dde6963c0949eab1e42ded80bfba82b6beb4ba85", "title": "Social robot deception and the culture of trust", "abstract": "Abstract Human beings are deeply social, and both evolutionary traits and cultural constructs encourage cooperation based on trust. Social robots interject themselves in human social settings, and they can be used for deceptive purposes. Robot deception is best understood by examining the effects of deception on the recipient of deceptive actions, and I argue that the long-term consequences of robot deception should receive more attention, as it has the potential to challenge human cultures of trust and degrade the foundations of human cooperation. In conclusion: regulation, ethical conduct by producers, and raised general awareness of the issues described in this article are all required to avoid the unfavourable consequences of a general degradation of trust.", "venue": "Paladyn J. Behav. Robotics", "year": 2021, "referenceCount": 80, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-01", "journal": {"volume": "12", "pages": "276 - 286", "name": "Paladyn, Journal of Behavioral Robotics"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "014778fb465796f38f3d243d14c5cb33ac67e82b", "externalIds": {"DBLP": "journals/annals/Garvey21", "DOI": "10.1109/MAHC.2021.3051686", "CorpusId": 232153527}, "url": "https://www.semanticscholar.org/paper/014778fb465796f38f3d243d14c5cb33ac67e82b", "title": "The \u201cGeneral Problem Solver\u201d Does Not Exist: Mortimer Taube and the Art of AI Criticism", "abstract": "This article reconfigures the history of artificial intelligence (AI) and its accompanying tradition of criticism by excavating the work of Mortimer Taube, a pioneer in information and library sciences, whose magnum opus, Computers and Common Sense: The Myth of Thinking Machines (1961), has been mostly forgotten. To convey the essence of his distinctive critique, the article focuses on Taube's attack on the general problem solver (GPS), the second major AI program. After examining his analysis of the social construction of this and other \u201cthinking machines,\u201d it concludes that, despite technical changes in AI, much of Taube's criticism remains relevant today. Moreover, his status as an \u201cinformation processing\u201d insider who criticized AI on behalf of the public good challenges the boundaries and focus of most critiques of AI from the past half-century. In sum, Taube's work offers an alternative model from which contemporary AI workers and critics can learn much.", "venue": "IEEE Annals of the History of Computing", "year": 2021, "referenceCount": 123, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-01", "journal": {"volume": "43", "pages": "60-73", "name": "IEEE Annals of the History of Computing"}, "authors": [{"authorId": "2052081388", "name": "Shunryu Colin Garvey"}]}, {"paperId": "031ae0269e16a3d6956ef12b8071911c422c2f69", "externalIds": {"DOI": "10.1515/jci-2021-0006", "CorpusId": 232085133}, "url": "https://www.semanticscholar.org/paper/031ae0269e16a3d6956ef12b8071911c422c2f69", "title": "Radical empiricism and machine learning research", "abstract": "Abstract I contrast the \u201cdata fitting\u201d vs \u201cdata interpreting\u201d approaches to data science along three dimensions: Expediency, Transparency, and Explainability. \u201cData fitting\u201d is driven by the faith that the secret to rational decisions lies in the data itself. In contrast, the data-interpreting school views data, not as a sole source of knowledge but as an auxiliary means for interpreting reality, and \u201creality\u201d stands for the processes that generate the data. I argue for restoring balance to data science through a task-dependent symbiosis of fitting and interpreting, guided by the Logic of Causation.", "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": "9", "pages": "78 - 82", "name": "Journal of Causal Inference"}, "authors": [{"authorId": "145430701", "name": "J. Pearl"}]}, {"paperId": "289ffce760b53ae3e3cea95f010cf43bae798050", "externalIds": {"DOI": "10.1007/s10704-020-00499-3", "CorpusId": 230112305}, "url": "https://www.semanticscholar.org/paper/289ffce760b53ae3e3cea95f010cf43bae798050", "title": "A machine learning based sensitivity analysis of the GTN damage parameters for dynamic fracture propagation in X70 pipeline steel", "abstract": null, "venue": "International Journal of Fracture", "year": 2021, "referenceCount": 64, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": "227", "pages": "111-132", "name": "International Journal of Fracture"}, "authors": [{"authorId": "1659127747", "name": "B. Paermentier"}, {"authorId": "49913305", "name": "D. Debruyne"}, {"authorId": "94225027", "name": "R. Talemi"}]}, {"paperId": "e4a674b0d6a4cff27849b26a0db6504f7d438091", "externalIds": {"DBLP": "journals/tvlsi/ParkJKNY21", "MAG": "3107855596", "DOI": "10.1109/TVLSI.2020.3037166", "CorpusId": 229659989}, "url": "https://www.semanticscholar.org/paper/e4a674b0d6a4cff27849b26a0db6504f7d438091", "title": "Memory-Augmented Neural Networks on FPGA for Real-Time and Energy-Efficient Question Answering", "abstract": "Memory-augmented neural networks (MANNs) were introduced to handle long-term dependent data efficiently. MANNs have shown promising results in question answering (QA) tasks that require holding contexts for answering a given question. As demands for QA on edge devices have increased, the utilization of MANNs in resource-constrained environments has become important. To achieve fast and energy-efficient inference of MANNs, we can exploit application-specific hardware accelerators on field-programmable gate arrays (FPGAs). Although several accelerators for conventional deep neural networks have been designed, it is difficult to efficiently utilize the accelerators with MANNs due to different requirements. In addition, characteristics of QA tasks should be considered for further improving the efficiency of inference on the accelerators. To address the aforementioned issues, we propose an inference accelerator of MANNs on FPGA. To fully utilize the proposed accelerator, we introduce fast inference methods considering the features of QA tasks. To evaluate our proposed approach, we implemented the proposed architecture on an FPGA and measured the execution time and energy consumption for the bAbI data set. According to our thorough experiments, the proposed methods improved speed and energy efficiency of the inference of MANNs up to about 25.6 and 28.4 times, respectively, compared with those of CPU.", "venue": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "year": 2021, "referenceCount": 44, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-01", "journal": {"volume": "29", "pages": "162-175", "name": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"}, "authors": [{"authorId": "2267522", "name": "Seongsik Park"}, {"authorId": "2109766425", "name": "Jaehee Jang"}, {"authorId": "153274617", "name": "Seijoon Kim"}, {"authorId": "2972978", "name": "Byunggook Na"}, {"authorId": "2999019", "name": "Sungroh Yoon"}]}, {"paperId": "221be7ac383f4ef8de8e3bc4e5f2026b5ad0c80b", "externalIds": {"MAG": "3091327592", "DOI": "10.1364/JOCN.401568", "CorpusId": 222136295}, "url": "https://www.semanticscholar.org/paper/221be7ac383f4ef8de8e3bc4e5f2026b5ad0c80b", "title": "On the suitability, requisites, and challenges of machine learning [Invited]", "abstract": "The introduction of 5G, the increasing number of connected devices, and the exponential growth of services relying on connectivity are pressuring multilayer networks to improve their scaling, efficiency, and controlling capabilities. However, enhancing those features consistently results in a significant amount of complexity in operating the resources available across heterogeneous vendors and technology domains. Thus, multilayer networks should become more intelligent in order to be efficiently managed, maintained, and optimized. In this context, we are witnessing an increasing interest in the adoption of artificial intelligence (AI) and machine learning (ML) in the design and operation of multilayer optical transport networks. This paper provides a brief introduction to key concepts in AI/ML, highlighting the conditions under which the use of ML is justified, on the requisites to deploy a data-driven system, and on the challenges faced when moving toward a production environment. As far as possible, some key concepts are illustrated using two realistic use-cases applied to multilayer optical networks: cognitive service provisioning and quality of transmission estimation.", "venue": "IEEE/OSA Journal of Optical Communications and Networking", "year": 2021, "referenceCount": 65, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": "13", "pages": "A1-A12", "name": "IEEE/OSA Journal of Optical Communications and Networking"}, "authors": [{"authorId": "120320915", "name": "R. Morais"}]}, {"paperId": "1d6a03d2f0964f6b3c85e70cb32fa446c2562dfb", "externalIds": {"DOI": "10.1016/j.cognition.2020.104533", "CorpusId": 229380592, "PubMed": "33375954"}, "url": "https://www.semanticscholar.org/paper/1d6a03d2f0964f6b3c85e70cb32fa446c2562dfb", "title": "The physical basis of memory", "abstract": null, "venue": "Cognition", "year": 2020, "referenceCount": 92, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-12-26", "journal": {"volume": "213", "name": "Cognition"}, "authors": [{"authorId": "2646034", "name": "C. Gallistel"}]}, {"paperId": "db097e173305b6ee9a5924944b46d1fb82fd585b", "externalIds": {"MAG": "3110757401", "DBLP": "journals/corr/abs-2012-02592", "ArXiv": "2012.02592", "DOI": "10.3390/PHILOSOPHIES6010006", "CorpusId": 227305284}, "url": "https://www.semanticscholar.org/paper/db097e173305b6ee9a5924944b46d1fb82fd585b", "title": "Transdisciplinary AI Observatory - Retrospective Analyses and Future-Oriented Contradistinctions", "abstract": "In the last years, artificial intelligence (AI) safety gained international recognition in the light of heterogeneous safety-critical and ethical issues that risk overshadowing the broad beneficial impacts of AI. In this context, the implementation of AI observatory endeavors represents one key research direction. This paper motivates the need for an inherently transdisciplinary AI observatory approach integrating diverse retrospective and counterfactual views. We delineate aims and limitations while providing hands-on-advice utilizing concrete practical examples. Distinguishing between unintentionally and intentionally triggered AI risks with diverse socio-psycho-technological impacts, we exemplify a retrospective descriptive analysis followed by a retrospective counterfactual risk analysis. Building on these AI observatory tools, we present near-term transdisciplinary guidelines for AI safety. As further contribution, we discuss differentiated and tailored long-term directions through the lens of two disparate modern AI safety paradigms. For simplicity, we refer to these two different paradigms with the terms artificial stupidity (AS) and eternal creativity (EC) respectively. While both AS and EC acknowledge the need for a hybrid cognitive-affective approach to AI safety and overlap with regard to many short-term considerations, they differ fundamentally in the nature of multiple envisaged long-term solution patterns. By compiling relevant underlying contradistinctions, we aim to provide future-oriented incentives for constructive dialectics in practical and theoretical AI safety research.", "venue": "Philosophies", "year": 2020, "referenceCount": 248, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-26", "journal": {"volume": "abs/2012.02592", "name": "ArXiv"}, "authors": [{"authorId": "22617565", "name": "Nadisha-Marie Aliman"}, {"authorId": "3176463", "name": "L. Kester"}, {"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "8f1bf7a89bd4137573d8bc89c108b847718c6e8c", "externalIds": {"DBLP": "journals/mta/OzerCG21", "MAG": "3101793988", "DOI": "10.1007/s11042-020-10067-5", "CorpusId": 228856250}, "url": "https://www.semanticscholar.org/paper/8f1bf7a89bd4137573d8bc89c108b847718c6e8c", "title": "A machine learning-based framework for predicting game server load", "abstract": null, "venue": "Multim. Tools Appl.", "year": 2020, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-11", "journal": {"volume": "80", "pages": "9527-9546", "name": "Multim. Tools Appl."}, "authors": [{"authorId": "2075594317", "name": "\u00c7agdas \u00d6zer"}, {"authorId": "1819846", "name": "Taner \u00c7evik"}, {"authorId": "2555101", "name": "A. G\u00fcrhanli"}]}, {"paperId": "f087d4e0b7d067879a7d235f3e9936dd6f528859", "externalIds": {"DBLP": "journals/vjcs/WangCPM21", "MAG": "3096027997", "DOI": "10.1142/s2196888821500111", "CorpusId": 228813026}, "url": "https://www.semanticscholar.org/paper/f087d4e0b7d067879a7d235f3e9936dd6f528859", "title": "Metaheuristic Optimization of Insulin Infusion Protocols Using Historical Data with Validation Using a Patient Simulator", "abstract": "Metaheuristic search algorithms are used to develop new protocols for optimal intravenous insulin infusion rate recommendations in scenarios involving hospital in-patients with Type 1 Diabetes. Two metaheuristic search algorithms are used, namely, Particle Swarm Optimization and Covariance Matrix Adaption Evolution Strategy. The Glucose Regulation for Intensive Care Patients (GRIP) serves as the starting point of the optimization process. We base our experiments on a methodology in the literature to evaluate the favorability of insulin protocols, with a dataset of blood glucose level/insulin infusion rate time series records from 16 patients obtained from the Waikato District Health Board. New and significantly better insulin infusion strategies than GRIP are discovered from the data through metaheuristic search. The newly discovered strategies are further validated and show good performance against various competitive benchmarks using a virtual patient simulator.", "venue": "Vietnam. J. Comput. Sci.", "year": 2020, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-05", "journal": {"volume": "8", "pages": "263-290", "name": "Vietnam. J. Comput. Sci."}, "authors": [{"authorId": "2109800642", "name": "Hongyu Wang"}, {"authorId": "4004822", "name": "L. Chepulis"}, {"authorId": "1500566287", "name": "R. Paul"}, {"authorId": "145809333", "name": "Michael Mayo"}]}, {"paperId": "91c92904e8ebb5af869badad53dacf465cc769e9", "externalIds": {"DBLP": "journals/ijsr/DubeA21", "MAG": "3042776525", "PubMedCentral": "7591690", "DOI": "10.1007/s12369-020-00706-0", "CorpusId": 225095386, "PubMed": "33133302"}, "url": "https://www.semanticscholar.org/paper/91c92904e8ebb5af869badad53dacf465cc769e9", "title": "Foundations of Erobotics", "abstract": null, "venue": "Int. J. Soc. Robotics", "year": 2020, "referenceCount": 350, "citationCount": 18, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Sociology", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-10-28", "journal": {"volume": "13", "pages": "1205 - 1233", "name": "International Journal of Social Robotics"}, "authors": [{"authorId": "9936998", "name": "Simon Dub\u00e9"}, {"authorId": "2081570739", "name": "D. Anctil"}]}, {"paperId": "111da19e8911ba04cdd38fec42587c8b8c976287", "externalIds": {"ArXiv": "2010.03303", "DBLP": "journals/corr/abs-2010-03303", "MAG": "3092243509", "DOI": "10.1016/j.jss.2021.110911", "CorpusId": 222177507}, "url": "https://www.semanticscholar.org/paper/111da19e8911ba04cdd38fec42587c8b8c976287", "title": "A ground-truth dataset and classification model for detecting bots in GitHub issue and PR comments", "abstract": null, "venue": "Journal of Systems and Software", "year": 2020, "referenceCount": 73, "citationCount": 34, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-10-07", "journal": {"volume": "175", "pages": "110911", "name": "J. Syst. Softw."}, "authors": [{"authorId": "13546149", "name": "M. Golzadeh"}, {"authorId": "2794053", "name": "Alexandre Decan"}, {"authorId": "52307499", "name": "Damien Legay"}, {"authorId": "1794675", "name": "T. Mens"}]}, {"paperId": "06251e6298a0d3ba3f0a26360c726920c7581575", "externalIds": {"ArXiv": "2009.04324", "DBLP": "conf/nips/CabannesPBR21", "CorpusId": 235359268}, "url": "https://www.semanticscholar.org/paper/06251e6298a0d3ba3f0a26360c726920c7581575", "title": "Overcoming the curse of dimensionality with Laplacian regularization in semi-supervised learning", "abstract": "As annotations of data can be scarce in large-scale practical problems, leveraging unlabelled examples is one of the most important aspects of machine learning. This is the aim of semi-supervised learning. To bene\ufb01t from the access to unlabelled data, it is natural to diffuse smoothly knowledge of labelled data to unlabelled one. This induces to the use of Laplacian regularization. Yet, current implementations of Laplacian regularization suffer from several drawbacks, notably the well-known curse of dimensionality. In this paper, we provide a statistical analysis to overcome those issues, and unveil a large body of spectral \ufb01ltering methods that exhibit desirable behaviors. They are implemented through (reproducing) kernel methods, for which we provide realistic computational guidelines in order to make our method usable with large amounts of data.", "venue": "NeurIPS", "year": 2020, "referenceCount": 62, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-09", "journal": {"pages": "30439-30451"}, "authors": [{"authorId": "1387995815", "name": "Vivien A. Cabannes"}, {"authorId": "1399505772", "name": "Loucas Pillaud-Vivien"}, {"authorId": "144570279", "name": "F. Bach"}, {"authorId": "145383040", "name": "Alessandro Rudi"}]}, {"paperId": "8bb3cffd7d46630273dabfe4e6b88fe8341737ef", "externalIds": {"DBLP": "journals/electronicmarkets/NeuhoferMC21", "MAG": "3084159310", "PubMedCentral": "7476646", "DOI": "10.1007/s12525-020-00433-4", "CorpusId": 221535975}, "url": "https://www.semanticscholar.org/paper/8bb3cffd7d46630273dabfe4e6b88fe8341737ef", "title": "The impact of artificial intelligence on event experiences: a scenario technique approach", "abstract": null, "venue": "Electron. Mark.", "year": 2020, "referenceCount": 118, "citationCount": 21, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-07", "journal": {"volume": "31", "pages": "601 - 617", "name": "Electronic Markets"}, "authors": [{"authorId": "2952915", "name": "Barbara Neuhofer"}, {"authorId": "1933098026", "name": "Bianca Magnus"}, {"authorId": "94570142", "name": "Krzysztof Celuch"}]}, {"paperId": "10bb7e2c54b947fa50e7bb65b0b5c700fe998044", "externalIds": {"DBLP": "journals/corr/abs-2009-03300", "MAG": "3083410900", "ArXiv": "2009.03300", "CorpusId": 221516475}, "url": "https://www.semanticscholar.org/paper/10bb7e2c54b947fa50e7bb65b0b5c700fe998044", "title": "Measuring Massive Multitask Language Understanding", "abstract": "We propose a new test to measure a text model's multitask accuracy. The test covers 57 tasks including elementary mathematics, US history, computer science, law, and more. To attain high accuracy on this test, models must possess extensive world knowledge and problem solving ability. We find that while most recent models have near random-chance accuracy, the very largest GPT-3 model improves over random chance by almost 20 percentage points on average. However, on every one of the 57 tasks, the best models still need substantial improvements before they can reach expert-level accuracy. Models also have lopsided performance and frequently do not know when they are wrong. Worse, they still have near-random accuracy on some socially important subjects such as morality and law. By comprehensively evaluating the breadth and depth of a model's academic and professional understanding, our test can be used to analyze models across many tasks and to identify important shortcomings.", "venue": "International Conference on Learning Representations", "year": 2020, "referenceCount": 32, "citationCount": 81, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-07", "journal": {"volume": "abs/2009.03300", "name": "ArXiv"}, "authors": [{"authorId": "3422872", "name": "Dan Hendrycks"}, {"authorId": "90909974", "name": "Collin Burns"}, {"authorId": "104444594", "name": "Steven Basart"}, {"authorId": "1380103052", "name": "Andy Zou"}, {"authorId": "16787428", "name": "Mantas Mazeika"}, {"authorId": "143711382", "name": "D. Song"}, {"authorId": "5164568", "name": "J. Steinhardt"}]}, {"paperId": "c312e8c2bae0f49616d11a02c2a7bfa15973ddf4", "externalIds": {"DBLP": "journals/ais/Zemcik21", "MAG": "3082094438", "DOI": "10.1007/s00146-020-01053-4", "CorpusId": 225313255}, "url": "https://www.semanticscholar.org/paper/c312e8c2bae0f49616d11a02c2a7bfa15973ddf4", "title": "Failure of chatbot Tay was evil, ugliness and uselessness in its nature or do we judge it through cognitive shortcuts and biases?", "abstract": null, "venue": "Ai & Society", "year": 2020, "referenceCount": 8, "citationCount": 8, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-02", "journal": {"volume": "36", "pages": "361-367", "name": "AI & SOCIETY"}, "authors": [{"authorId": "120384924", "name": "Tom\u00e1s Zemc\u00edk"}]}, {"paperId": "557ed446503524c111d3c0d661672001d559b3c2", "externalIds": {"DBLP": "journals/corr/abs-2008-09000", "ArXiv": "2008.09000", "MAG": "3050693196", "DOI": "10.1007/s00894-021-04674-8", "CorpusId": 221186992, "PubMed": "33543405"}, "url": "https://www.semanticscholar.org/paper/557ed446503524c111d3c0d661672001d559b3c2", "title": "Generative chemistry: drug discovery with deep learning generative models", "abstract": null, "venue": "Journal of Molecular Modeling", "year": 2020, "referenceCount": 182, "citationCount": 31, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Biology", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2020-08-20", "journal": {"volume": "27", "name": "Journal of Molecular Modeling"}, "authors": [{"authorId": "11042668", "name": "Yuemin Bian"}, {"authorId": "144465514", "name": "X. Xie"}]}, {"paperId": "52d73ff6823e2339f9aeb4a30a4576d7b42968bc", "externalIds": {"PubMedCentral": "9069665", "MAG": "3083777683", "DOI": "10.1177/17456916211004899", "CorpusId": 225624737, "PubMed": "34606730"}, "url": "https://www.semanticscholar.org/paper/52d73ff6823e2339f9aeb4a30a4576d7b42968bc", "title": "From Text to Thought: How Analyzing Language Can Advance Psychological Science", "abstract": "Humans have been using language for millennia but have only just begun to scratch the surface of what natural language can reveal about the mind. Here we propose that language offers a unique window into psychology. After briefly summarizing the legacy of language analyses in psychological science, we show how methodological advances have made these analyses more feasible and insightful than ever before. In particular, we describe how two forms of language analysis\u2014natural-language processing and comparative linguistics\u2014are contributing to how we understand topics as diverse as emotion, creativity, and religion and overcoming obstacles related to statistical power and culturally diverse samples. We summarize resources for learning both of these methods and highlight the best way to combine language analysis with more traditional psychological paradigms. Applying language analysis to large-scale and cross-cultural datasets promises to provide major breakthroughs in psychological science.", "venue": "Perspectives on Psychological Science", "year": 2020, "referenceCount": 176, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Psychology", "Sociology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-07-09", "journal": {"volume": "17", "pages": "805 - 826", "name": "Perspectives on Psychological Science"}, "authors": [{"authorId": "16179628", "name": "J. Jackson"}, {"authorId": "48389642", "name": "Joseph Watts"}, {"authorId": "39563764", "name": "Johann-Mattis List"}, {"authorId": "39513299", "name": "Curtis Puryear"}, {"authorId": "2006135012", "name": "Ryan Drabble"}, {"authorId": "2593387", "name": "Kristen A. Lindquist"}]}, {"paperId": "368a8fbf6304a192a67f614d032510e5a4100552", "externalIds": {"MAG": "3034942609", "DBLP": "journals/csur/WangYKN20", "DOI": "10.1145/3386252", "CorpusId": 152282330}, "url": "https://www.semanticscholar.org/paper/368a8fbf6304a192a67f614d032510e5a4100552", "title": "Generalizing from a Few Examples", "abstract": "Machine learning has been highly successful in data-intensive applications but is often hampered when the data set is small. Recently, Few-shot Learning (FSL) is proposed to tackle this problem. Using prior knowledge, FSL can rapidly generalize to new tasks containing only a few samples with supervised information. In this article, we conduct a thorough survey to fully understand FSL. Starting from a formal definition of FSL, we distinguish FSL from several relevant machine learning problems. We then point out that the core issue in FSL is that the empirical risk minimizer is unreliable. Based on how prior knowledge can be used to handle this core issue, we categorize FSL methods from three perspectives: (i) data, which uses prior knowledge to augment the supervised experience; (ii) model, which uses prior knowledge to reduce the size of the hypothesis space; and (iii) algorithm, which uses prior knowledge to alter the search for the best hypothesis in the given hypothesis space. With this taxonomy, we review and discuss the pros and cons of each category. Promising directions, in the aspects of the FSL problem setups, techniques, applications, and theories, are also proposed to provide insights for future research.1", "venue": "ACM Computing Surveys", "year": 2020, "referenceCount": 187, "citationCount": 352, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2020-06-12", "journal": {"volume": "53", "pages": "1 - 34", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "49416601", "name": "Yaqing Wang"}, {"authorId": "3259992", "name": "Quanming Yao"}, {"authorId": "145193332", "name": "J. Kwok"}, {"authorId": "1726587", "name": "L. Ni"}]}, {"paperId": "addfdbc534e70ac98819698e6edc6f83a4aa82c7", "externalIds": {"ArXiv": "2006.07390", "MAG": "3083297807", "PubMedCentral": "8339439", "DOI": "10.1093/nc/niab014", "CorpusId": 221516681, "PubMed": "34377534"}, "url": "https://www.semanticscholar.org/paper/addfdbc534e70ac98819698e6edc6f83a4aa82c7", "title": "Formalizing falsification for theories of consciousness across computational hierarchies", "abstract": "Abstract The scientific study of consciousness is currently undergoing a critical transition in the form of a rapidly evolving scientific debate regarding whether or not currently proposed theories can be assessed for their scientific validity. At the forefront of this debate is Integrated Information Theory (IIT), widely regarded as the preeminent theory of consciousness because it quantified subjective experience in a scalar mathematical measure called \u03a6 that is in principle measurable. Epistemological issues in the form of the \u201cunfolding argument\u201d have provided a concrete refutation of IIT by demonstrating how it permits functionally identical systems to have differences in their predicted consciousness. The implication is that IIT and any other proposed theory based on a physical system\u2019s causal structure may already be falsified even in the absence of experimental refutation. However, so far many of these arguments surrounding the epistemological foundations of falsification arguments, such as the unfolding argument, are too abstract to determine the full scope of their implications. Here, we make these abstract arguments concrete, by providing a simple example of functionally equivalent machines realizable with table-top electronics that take the form of isomorphic digital circuits with and without feedback. This allows us to explicitly demonstrate the different levels of abstraction at which a theory of consciousness can be assessed. Within this computational hierarchy, we show how IIT is simultaneously falsified at the finite-state automaton level and unfalsifiable at the combinatorial-state automaton level. We use this example to illustrate a more general set of falsification criteria for theories of consciousness: to avoid being already falsified, or conversely unfalsifiable, scientific theories of consciousness must be invariant with respect to changes that leave the inference procedure fixed at a particular level in a computational hierarchy.", "venue": "Neuroscience of consciousness", "year": 2020, "referenceCount": 45, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-06-12", "journal": {"volume": "2021", "name": "Neuroscience of Consciousness"}, "authors": [{"authorId": "69873213", "name": "J. Hanson"}, {"authorId": "1946477", "name": "S. Walker"}]}, {"paperId": "6ece757d968c1b5a7f2ad2a2b3d3441a8df7e195", "externalIds": {"DBLP": "journals/corr/abs-2006-04013", "MAG": "3033205754", "ArXiv": "2006.04013", "DOI": "10.1007/s00146-021-01151-x", "CorpusId": 219531429}, "url": "https://www.semanticscholar.org/paper/6ece757d968c1b5a7f2ad2a2b3d3441a8df7e195", "title": "AI from Concrete to Abstract", "abstract": null, "venue": "Ai & Society", "year": 2020, "referenceCount": 87, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-06-07", "journal": {"volume": "36", "pages": "877 - 893", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2071407075", "name": "Rubens Lacerda Queiroz"}, {"authorId": "21659444", "name": "F. F. Sampaio"}, {"authorId": "2061257884", "name": "Cabral Lima"}, {"authorId": "144829981", "name": "P. Lima"}]}, {"paperId": "183f6bc6b577ab2faf18f3fe123144e02855259e", "externalIds": {"DBLP": "journals/corr/abs-2006-03986", "ArXiv": "2006.03986", "MAG": "3033157075", "DOI": "10.1109/comst.2021.3118271", "CorpusId": 219531190}, "url": "https://www.semanticscholar.org/paper/183f6bc6b577ab2faf18f3fe123144e02855259e", "title": "Online Advertising Security: Issues, Taxonomy, and Future Directions", "abstract": "Online advertising has become the backbone of the Internet economy by revolutionizing business marketing. It provides a simple and efficient way for advertisers to display their advertisements to specific individual users, and over the last couple of years has contributed to an explosion in the income stream for several Web-based businesses. For example, Google\u2019s income from advertising grew 51.6% between 2016 and 2018, to $\\$ $ 136.8 billion. This exponential growth in advertising revenue has motivated fraudsters to exploit the weaknesses of the online advertising model to make money, and researchers to discover new security vulnerabilities in the model, to propose countermeasures and to forecast future trends in research. Motivated by these considerations, this paper presents a comprehensive review of the security threats to online advertising systems. We begin by introducing the motivation for online advertising system, explain how it differs from traditional advertising networks, introduce terminology, and define the current online advertising architecture. We then devise a comprehensive taxonomy of attacks on online advertising to raise awareness among researchers about the vulnerabilities of online advertising ecosystem. We discuss the limitations and effectiveness of the countermeasures that have been developed to secure entities in the advertising ecosystem against these attacks. To complete our work, we identify some open issues and outline some possible directions for future research towards improving security methods for online advertising systems.", "venue": "IEEE Communications Surveys & Tutorials", "year": 2020, "referenceCount": 187, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2020-06-06", "journal": {"volume": "23", "pages": "2494-2524", "name": "IEEE Communications Surveys & Tutorials"}, "authors": [{"authorId": "1795589", "name": "Zahra Pooranian"}, {"authorId": "145746490", "name": "M. Conti"}, {"authorId": "1763096", "name": "H. Haddadi"}, {"authorId": "1682912", "name": "R. Tafazolli"}]}, {"paperId": "570163353e0a954d9e5829f6ae92ae09c3225041", "externalIds": {"PubMedCentral": "8205518", "DBLP": "journals/corr/abs-2005-11016", "ArXiv": "2005.11016", "MAG": "3027291647", "DOI": "10.3389/frobt.2021.584075", "CorpusId": 218862857, "PubMed": "34141726"}, "url": "https://www.semanticscholar.org/paper/570163353e0a954d9e5829f6ae92ae09c3225041", "title": "Reinforcement Learning With Human Advice: A Survey", "abstract": "In this paper, we provide an overview of the existing methods for integrating human advice into a reinforcement learning process. We first propose a taxonomy of the different forms of advice that can be provided to a learning agent. We then describe the methods that can be used for interpreting advice when its meaning is not determined beforehand. Finally, we review different approaches for integrating advice into the learning process.", "venue": "Frontiers in Robotics and AI", "year": 2020, "referenceCount": 158, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2020-05-22", "journal": {"volume": "8", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "144048526", "name": "Anis Najar"}, {"authorId": "1680828", "name": "M. Chetouani"}]}, {"paperId": "05a0f19796dd1c25ce9eda00e43cf4977dcd3810", "externalIds": {"MAG": "3084211362", "DBLP": "journals/chb/KobisM21", "DOI": "10.1016/j.chb.2020.106553", "CorpusId": 221562332}, "url": "https://www.semanticscholar.org/paper/05a0f19796dd1c25ce9eda00e43cf4977dcd3810", "title": "Artificial intelligence versus Maya Angelou: Experimental evidence that people cannot differentiate AI-generated from human-written poetry", "abstract": null, "venue": "Computers in Human Behavior", "year": 2020, "referenceCount": 82, "citationCount": 35, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-05-20", "journal": {"volume": "114", "pages": "106553", "name": "Comput. Hum. Behav."}, "authors": [{"authorId": "47691963", "name": "N. K\u00f6bis"}, {"authorId": "1707029671", "name": "Luca Mossink"}]}, {"paperId": "884b0fe671f2227d10bcb04ac61767a7371bd64e", "externalIds": {"DBLP": "journals/corr/abs-2005-07289", "ArXiv": "2005.07289", "MAG": "3025859175", "DOI": "10.1109/CVPR46437.2021.00859", "CorpusId": 218665674}, "url": "https://www.semanticscholar.org/paper/884b0fe671f2227d10bcb04ac61767a7371bd64e", "title": "Taskology: Utilizing Task Relations at Scale", "abstract": "Many computer vision tasks address the problem of scene understanding and are naturally interrelated e.g. object classification, detection, scene segmentation, depth estimation, etc. We show that we can leverage the inherent relationships among collections of tasks, as they are trained jointly, supervising each other through their known relationships via consistency losses. Furthermore, explicitly utilizing the relationships between tasks allows improving their performance while dramatically reducing the need for labeled data, and allows training with additional unsupervised or simulated data. We demonstrate a distributed joint training algorithm with task-level parallelism, which affords a high degree of asynchronicity and robustness. This allows learning across multiple tasks, or with large amounts of input data, at scale. We demonstrate our framework on subsets of the following collection of tasks: depth and normal prediction, semantic segmentation, 3D motion and egomotion estimation, and object tracking and 3D detection in point clouds. We observe improved performance across these tasks, especially in the low-label regime.", "venue": "Computer Vision and Pattern Recognition", "year": 2020, "referenceCount": 94, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2020-05-14", "journal": {"pages": "8696-8705", "name": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"}, "authors": [{"authorId": "2143370665", "name": "Yao Lu"}, {"authorId": "2604835", "name": "S. Pirk"}, {"authorId": "16026105", "name": "Jan Dlabal"}, {"authorId": "118025075", "name": "Anthony Brohan"}, {"authorId": "30803019", "name": "Ankita Pasad"}, {"authorId": "2119258071", "name": "Zhao Chen"}, {"authorId": "24026083", "name": "Vincent Casser"}, {"authorId": "145426908", "name": "A. Angelova"}, {"authorId": "152894252", "name": "A. Gordon"}]}, {"paperId": "6daffd44d4c71d8423e021e8d516487a98426f7d", "externalIds": {"MAG": "3019998525", "DOI": "10.1007/978-981-15-9712-1_31", "CorpusId": 225939734}, "url": "https://www.semanticscholar.org/paper/6daffd44d4c71d8423e021e8d516487a98426f7d", "title": "Natural Language Processing: History, Evolution, Application, and Future Work", "abstract": null, "venue": "Lecture Notes in Networks and Systems", "year": 2020, "referenceCount": 17, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-04-23", "journal": {"name": "Lecture Notes in Networks and Systems"}, "authors": [{"authorId": "2951543", "name": "P. Johri"}, {"authorId": "2168094026", "name": "Mukul Kathait"}, {"authorId": "33190741", "name": "Munish Sabharwal"}, {"authorId": "1403383401", "name": "A. Al-Taani"}, {"authorId": "102254088", "name": "S. Suvanov"}]}, {"paperId": "3ed06aca3b25a9af89f08b949753372d29647a10", "externalIds": {"ACL": "2021.humeval-1.3", "DBLP": "journals/corr/abs-2004-10450", "MAG": "3020264409", "ArXiv": "2004.10450", "CorpusId": 216056240}, "url": "https://www.semanticscholar.org/paper/3ed06aca3b25a9af89f08b949753372d29647a10", "title": "Trading Off Diversity and Quality in Natural Language Generation", "abstract": "For open-ended language generation tasks such as storytelling or dialogue, choosing the right decoding algorithm is vital for controlling the tradeoff between generation quality and diversity. However, there presently exists no consensus on which decoding procedure is best or even the criteria by which to compare them. In this paper, we cast decoding as a tradeoff between response quality and diversity, and we perform the first large-scale evaluation of decoding methods along the entire quality-diversity spectrum. Our experiments confirm the existence of the likelihood trap: the counter-intuitive observation that high likelihood sequences are often surprisingly low quality. We also find that when diversity is a priority, all methods perform similarly, but when quality is viewed as more important, nucleus sampling (Holtzman et al., 2019) outperforms all other evaluated decoding algorithms.", "venue": "HUMEVAL", "year": 2020, "referenceCount": 39, "citationCount": 32, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-04-22", "journal": {"volume": "abs/2004.10450", "name": "ArXiv"}, "authors": [{"authorId": "66194020", "name": "Hugh Zhang"}, {"authorId": "40620532", "name": "Daniel Duckworth"}, {"authorId": "7975935", "name": "Daphne Ippolito"}, {"authorId": "2072676", "name": "Arvind Neelakantan"}]}, {"paperId": "697586e9404b69bebbad312836ba200fde79d21d", "externalIds": {"ArXiv": "2004.03541", "PubMedCentral": "8052953", "MAG": "3015208662", "DOI": "10.1093/nc/niab001", "CorpusId": 215238327, "PubMed": "33889423"}, "url": "https://www.semanticscholar.org/paper/697586e9404b69bebbad312836ba200fde79d21d", "title": "Falsification and consciousness", "abstract": "Abstract The search for a scientific theory of consciousness should result in theories that are falsifiable. However, here we show that falsification is especially problematic for theories of consciousness. We formally describe the standard experimental setup for testing these theories. Based on a theory\u2019s application to some physical system, such as the brain, testing requires comparing a theory\u2019s predicted experience (given some internal observables of the system like brain imaging data) with an inferred experience (using report or behavior). If there is a mismatch between inference and prediction, a theory is falsified. We show that if inference and prediction are independent, it follows that any minimally informative theory of consciousness is automatically falsified. This is deeply problematic since the field\u2019s reliance on report or behavior to infer conscious experiences implies such independence, so this fragility affects many contemporary theories of consciousness. Furthermore, we show that if inference and prediction are strictly dependent, it follows that a theory is unfalsifiable. This affects theories which claim consciousness to be determined by report or behavior. Finally, we explore possible ways out of this dilemma.", "venue": "Neuroscience of consciousness", "year": 2020, "referenceCount": 90, "citationCount": 16, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Biology", "Psychology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-04-07", "journal": {"volume": "2021", "name": "Neuroscience of Consciousness"}, "authors": [{"authorId": "102239495", "name": "Johannes Kleiner"}, {"authorId": "30306962", "name": "Erik P. Hoel"}]}, {"paperId": "663c3cef4ff7c1eb2a1d4f7fa9f94c6d7c47eeb9", "externalIds": {"DBLP": "journals/electronicmarkets/MoussawiKB21", "MAG": "3014007670", "DOI": "10.1007/s12525-020-00411-w", "CorpusId": 216194438}, "url": "https://www.semanticscholar.org/paper/663c3cef4ff7c1eb2a1d4f7fa9f94c6d7c47eeb9", "title": "How perceptions of intelligence and anthropomorphism affect adoption of personal intelligent agents", "abstract": null, "venue": "Electron. Mark.", "year": 2020, "referenceCount": 148, "citationCount": 47, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-03-27", "journal": {"volume": "", "pages": "1-22", "name": "Electronic Markets"}, "authors": [{"authorId": "2252360", "name": "Sara Moussawi"}, {"authorId": "1750816", "name": "M. Koufaris"}, {"authorId": "1398858131", "name": "R. Benbunan-Fich"}]}, {"paperId": "0a13d18d27315a67d3f078112ce528cb25620590", "externalIds": {"MAG": "3011145296", "DOI": "10.1101/2020.03.14.992263", "CorpusId": 214725406}, "url": "https://www.semanticscholar.org/paper/0a13d18d27315a67d3f078112ce528cb25620590", "title": "Morphognostic honey bees communicating nectar location through dance movements", "abstract": "Honey bees are social insects that forage for flower nectar cooperatively. When an individual forager discovers a flower patch rich in nectar, it returns to the hive and performs a \u201cwaggle dance\u201d in the vicinity of other bees that consists of movements communicating the direction and distance to the nectar source. The dance recruits \u201cwitnessing\u201d bees to fly to the location of the nectar to retrieve it, thus cooperatively exploiting the environment. Replicating such complex animal behavior is a step forward on the path to artificial intelligence. This project simulates the bee foraging behavior in a cellular automaton using the Morphognosis machine learning model. The model features hierarchical spatial and temporal contexts that output motor responses from sensory inputs. Given a set of bee foraging and dancing exemplars, and exposing only the external input-output of these behaviors to the Morphognosis learning algorithm, a hive of artificial bees can be generated that forage as their biological counterparts do. A comparison of Morphognosis foraging performance with that of an artificial recurrent neural network is also presented.", "venue": "bioRxiv", "year": 2020, "referenceCount": 53, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-03-17", "journal": {"name": "bioRxiv"}, "authors": [{"authorId": "1717214", "name": "Thomas E. Portegys"}]}, {"paperId": "fcae5999b0e7e8dd7fc86b78ee6a66b7c4707b63", "externalIds": {"DBLP": "journals/tem/Hutchinson21", "MAG": "3012234211", "DOI": "10.1109/TEM.2020.2977222", "CorpusId": 216226787}, "url": "https://www.semanticscholar.org/paper/fcae5999b0e7e8dd7fc86b78ee6a66b7c4707b63", "title": "Reinventing Innovation Management: The Impact of Self-Innovating Artificial Intelligence", "abstract": "Through recent leaps in application, artificial intelligence (AI) has become one of the most promising digital technologies, attracting significant attention from scholars and practitioners alike. Prior innovation research has mainly focused on the opportunities for and challenges to infusing digital technologies into the innovation process. However, understanding the general effects of digital technologies is insufficient as their specific fields of application differ. AI is distinct from other digital technologies, given its potential to evolve into both a general-purpose technology and a method of inventing, and several firms are beginning to integrate AI into their innovation processes. We capture this phenomenon by introducing a concept we term self-innovating artificial intelligence (SAI), defined as the organizational utilization of AI with the aim of incrementally advancing existing or developing new products, based on insights from continuously combining and analyzing multiple data sources. As SAI is about to fundamentally change how innovations are created, this article describes the underlying AI technology; conceptualizes and outlines how firms may incorporate SAI into their innovation processes with the aim of developing increasingly complex products; and offers potential avenues for further research in this intriguing domain.", "venue": "IEEE transactions on engineering management", "year": 2020, "referenceCount": 133, "citationCount": 15, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-03-13", "journal": {"volume": "68", "pages": "628-639", "name": "IEEE Transactions on Engineering Management"}, "authors": [{"authorId": "152651804", "name": "Philip Hutchinson"}]}, {"paperId": "f31c4463918906cabe1853c72e7e8e4e9d841ef6", "externalIds": {"DBLP": "journals/jors/Ormerod21", "MAG": "3008324209", "DOI": "10.1080/01605682.2019.1650619", "CorpusId": 213470660}, "url": "https://www.semanticscholar.org/paper/f31c4463918906cabe1853c72e7e8e4e9d841ef6", "title": "The fitness and survival of the OR profession in the age of artificial intelligence", "abstract": "Abstract How will AI affect OR practice? In OR we aspire to be logical, and therefore our behaviours should be relatively easy to replicate in logic, the basis of computer systems. We also pride ourselves on our attention to context, our project management skills, and our pragmatic approach. To think about the issues, we can turn to our experience of practicing OR and to the insights of mathematics, philosophy, sociology, and economics. Mathematicians and philosophers have widened the scope of logic to cover many aspects of decision-making; sociologists have conducted research into the social context and consequences of new technologies and economists have analysed their rates of penetration. Some OR jobs will be destroyed and others will be created giving rise to new, more varied career paths. The paper concludes that the centre of gravity of OR practice will move from analysis to those aspects difficult to computerise, the \u2018residuals\u2019. When AI does finally displace OR practitioners, it may come in the form of \u2018AI strong enough for OR\u2019, strong enough to satisfy potential OR clients in terms of efficacy and cost. The OR community needs to get involved more deeply in AI; it has the relevant expertise to do so.", "venue": "J. Oper. Res. Soc.", "year": 2020, "referenceCount": 94, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-02-17", "journal": {"volume": "72", "pages": "4 - 22", "name": "Journal of the Operational Research Society"}, "authors": [{"authorId": "1769668", "name": "R. Ormerod"}]}, {"paperId": "549cc4fd07de9200a1d510668d21114d50523aa8", "externalIds": {"ArXiv": "1909.01095", "DOI": "10.2139/ssrn.3453632", "CorpusId": 237267347}, "url": "https://www.semanticscholar.org/paper/549cc4fd07de9200a1d510668d21114d50523aa8", "title": "Defining the scope of AI regulations", "abstract": "The paper argues that policy makers should not use the term artificial intelligence (AI) to define the material scope of AI regulations. The argument is developed by proposing a number of requirements for legal definitions, surveying existing AI definitions, and then discussing the extent to which they meet the proposed requirements. It is shown that existing definitions of AI do not meet the most important requirements for legal definitions. Next, the paper suggests that policy makers should instead deploy a risk-based definition of AI. Rather than using the term AI, they should focus on the specific risks they want to reduce. It is shown that the requirements for legal definitions can be better met by considering the main causes of relevant risks: certain technical approaches (e.g. reinforcement learning), applications (e.g. facial recognition), and capabilities (e.g. the ability to physically interact with the environment). Finally, the paper discusses the extent to which this approach can also be applied to more advanced AI systems.", "venue": "", "year": 2019, "referenceCount": 106, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2019-08-26", "journal": {"name": "EngRN: Computer-Aided Engineering (Topic)"}, "authors": [{"authorId": "1388301316", "name": "Jonas Schuett"}]}, {"paperId": "cc0580add283199c2d27c33b934c14e9b6ce9cb4", "externalIds": {"MAG": "2973452142", "DOI": "10.1162/posc_a_00377", "CorpusId": 203700603}, "url": "https://www.semanticscholar.org/paper/cc0580add283199c2d27c33b934c14e9b6ce9cb4", "title": "Exploring Minds: Modes of Modeling and Simulation in Artificial Intelligence", "abstract": "Abstract The aim of this paper is to grasp the relevant distinctions between various ways in which models and simulations in Artificial Intelligence (AI) relate to cognitive phenomena. In order to get a systematic picture, a taxonomy is developed that is based on the coordinates of formal versus material analogies and theory-guided versus pre-theoretic models in science. These distinctions have parallels in the computational versus mimetic aspects and in analytic versus exploratory types of computer simulation. The proposed taxonomy cuts across the traditional dichotomies between symbolic and embodied AI, general intelligence and symbol and intelligence and cognitive simulation and human/non-human-like AI. According to the taxonomy proposed here, one can distinguish between four distinct general approaches that figured prominently in early and classical AI, and that have partly developed into distinct research programs: first, phenomenal simulations (e.g., Turing\u2019s \u201cimitation game\u201d); second, simulations that explore general-level formal isomorphisms in pursuit of a general theory of intelligence (e.g., logic-based AI); third, simulations as exploratory material models that serve to develop theoretical accounts of cognitive processes (e.g., Marr\u2019s stages of visual processing and classical connectionism); and fourth, simulations as strictly formal models of a theory of computation that postulates cognitive processes to be isomorphic with computational processes (strong symbolic AI). In continuation of pragmatic views of the modes of modeling and simulating world affairs, this taxonomy of approaches to modeling in AI helps to elucidate how available computational concepts and simulational resources contribute to the modes of representation and theory development in AI research\u2014and what made that research program uniquely dependent on them.", "venue": "Perspectives on Science", "year": 2019, "referenceCount": 99, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2019-08-05", "journal": {"volume": "29", "pages": "409-435", "name": "Perspectives on Science"}, "authors": [{"authorId": "22851126", "name": "Hajo Greif"}]}, {"paperId": "9cb7e69d77e0772bba022016033851f619a02a82", "externalIds": {"MAG": "2946798032", "DOI": "10.1007/s13347-021-00454-7", "CorpusId": 181907131}, "url": "https://www.semanticscholar.org/paper/9cb7e69d77e0772bba022016033851f619a02a82", "title": "Group Agency and Artificial Intelligence", "abstract": null, "venue": "Philosophy & Technology", "year": 2019, "referenceCount": 84, "citationCount": 11, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2019-05-16", "journal": {"name": "Philosophy & Technology"}, "authors": [{"authorId": "144451484", "name": "C. List"}]}, {"paperId": "df6ae7c951a4ae2b548c86768cd94be28adee7f3", "externalIds": {"DBLP": "journals/ijhci/ChavesG21", "MAG": "2939803556", "ArXiv": "1904.02743", "DOI": "10.1080/10447318.2020.1841438", "CorpusId": 102350801}, "url": "https://www.semanticscholar.org/paper/df6ae7c951a4ae2b548c86768cd94be28adee7f3", "title": "How Should My Chatbot Interact? A Survey on Social Characteristics in Human\u2013Chatbot Interaction Design", "abstract": "ABSTRACT Chatbots\u2019 growing popularity has brought new challenges to HCI, having changed the patterns of human interactions with computers. The increasing need to approximate conversational interaction styles raises expectations for chatbots to present social behaviors that are habitual in human\u2013human communication. In this survey, we argue that chatbots should be enriched with social characteristics that cohere with users\u2019 expectations, ultimately avoiding frustration and dissatisfaction. We bring together the literature on disembodied, text-based chatbots to derive a conceptual model of social characteristics for chatbots. We analyzed 56 papers from various domains to understand how social characteristics can benefit human\u2013chatbot interactions and identify the challenges and strategies to designing them. Additionally, we discussed how characteristics may influence one another. Our results provide relevant opportunities to both researchers and designers to advance human\u2013chatbot interactions.", "venue": "International journal of human computer interactions", "year": 2019, "referenceCount": 221, "citationCount": 111, "influentialCitationCount": 7, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2019-04-04", "journal": {"volume": "37", "pages": "729 - 758", "name": "International Journal of Human\u2013Computer Interaction"}, "authors": [{"authorId": "123881688", "name": "A. Chaves"}, {"authorId": "143911967", "name": "M. Gerosa"}]}, {"paperId": "e8e04363925bdddc99cb954e9e2cdac42710bfdd", "externalIds": {"MAG": "2904554166", "DOI": "10.20906/CPS/CBA2018-0986", "CorpusId": 189331848}, "url": "https://www.semanticscholar.org/paper/e8e04363925bdddc99cb954e9e2cdac42710bfdd", "title": "CLASSIFICA\u00c7\u00c3O DE DOCUMENTOS DE PATENTES USANDO O DOC2VEC", "abstract": "As patentes sao consideradas fontes extremamente uteis para atividades \nrelacionadas a busca e analise de informacoes e para a geracaoo de novos \nconhecimentos. Neste artigo, usamos um algoritmo de vetor de paragrafo \ndoc2vec, uma extensao do word2vec, que aprende representacoes de frases em \num documento, em um esquema de aprendizagem profunda supervisionada para \na classificacao automatica de patentes. A classificacao foi realizada em documentos \ncom resumos de patentes em ingles, em um processo hierarquico que \ncompreende secoes, classes, subclasses, de acordo com a Classificacao Internacional \nde Patentes (IPC). Os testes foram desenvolvidos em quatro etapas, \nnecessaria, devido ao grande numero de classes e subclasses, com o objetivo \nde identificar codigos IPC primario ou secundarios, caso esteja associado a um \nconjunto de classificacoes relacionadas a outros aspectos expressos na patente. \nOs testes apresentaram resultados bastante promissores na classificacao de patentes. \nOs proximos passos serao produzir avaliacoes qualitativas e compara-las \ncom outros modelos de aprendizagem de maquina presentes na literatura.", "venue": "Administra\u00e7\u00e3o: Princ\u00edpios de Administra\u00e7\u00e3o e Suas Tend\u00eancias - Volume 2", "year": 2017, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, "publicationDate": "2017-12-15", "journal": {"name": "Administra\u00e7\u00e3o: Princ\u00edpios de Administra\u00e7\u00e3o e Suas Tend\u00eancias - Volume 2"}, "authors": [{"authorId": "148219045", "name": "Tamara Aguiar Tavares Mascaremhas"}, {"authorId": "32294745", "name": "Andr\u00e9ia Gentil Bonfante"}, {"authorId": "146126221", "name": "A. W. Mascarenhas"}]}, {"paperId": "f7d2879cd047bf36a85fad050c16445269db6970", "externalIds": {"ArXiv": "1607.00913", "MAG": "2463389769", "DBLP": "journals/jair/AlfonsecaCACAR21", "DOI": "10.1613/jair.1.12202", "CorpusId": 13370840}, "url": "https://www.semanticscholar.org/paper/f7d2879cd047bf36a85fad050c16445269db6970", "title": "Superintelligence cannot be contained: Lessons from Computability Theory", "abstract": "Superintelligence is a hypothetical agent that possesses intelligence far surpassing that of the brightest and most gifted human minds. In light of recent advances in machine intelligence, a number of scientists, philosophers and technologists have revived the discussion about the potential catastrophic risks entailed by such an entity. In this article, we trace the origins and development of the neo-fear of superintelligence, and some of the major proposals for its containment. We argue that such containment is, in principle, impossible, due to fundamental limits inherent to computing itself. Assuming that a superintelligence will contain a program that includes all the programs that can be executed by a universal Turing machine on input potentially as complex as the state of the world, strict containment requires simulations of such a program, something theoretically (and practically) infeasible.", "venue": "J. Artif. Intell. Res.", "year": 2016, "referenceCount": 59, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2016-07-04", "journal": {"volume": "70", "pages": "65-76", "name": "J. Artif. Intell. Res."}, "authors": [{"authorId": "2330521", "name": "M. Alfonseca"}, {"authorId": "145512647", "name": "Manuel Cebrian"}, {"authorId": "2115339434", "name": "Antonio Fern\u00e1ndez"}, {"authorId": "2362022", "name": "Lorenzo Coviello"}, {"authorId": "2919118", "name": "A. Abeliuk"}, {"authorId": "1705156", "name": "I. Rahwan"}]}, {"paperId": "947843af1a49548fa0cfd8910808df61c50d8b35", "externalIds": {"DOI": "10.1080/04597222.2015.996369", "CorpusId": 219629394}, "url": "https://www.semanticscholar.org/paper/947843af1a49548fa0cfd8910808df61c50d8b35", "title": "Reference", "abstract": "These values were discussed in 1967 by the IAG and adopted by the IUGG as the basis of a 'Geodetic Reference System 1967'. Although at that time better values of these constants were available, IUGG decided to adopt the values of the IAU system in order to keep consistency with the values agreed upon by the astronomers. This fact gives to the IAU system a value that has a wider circulation in the scientific community than just astronomers. This gives to the IAU a certain inter-union responsibility in the field. IUGG instructed IAG to prepare values of all relevant parameters representing the standard ellipsoid with these 3 basic characteristic parameters. These values have to be consistent to the 12th significant figure in such a way that geodetic computations on the reference ellipsoid should be good to one tenth of a millimeter. The results of the work carried out independently by several groups are being published in a special issue of 'Bulletin G6od6sique' to appear soon, called 'Geodetic Reference System 1967'. In order to compute these derived parameters, a mean rotational speed of the Earth at 1900.0, CD, had to be defined. It is:", "venue": "Digital Theology: A Computer Science Perspective", "year": 2015, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-01-01", "journal": {"volume": "115", "pages": "501 - 504", "name": "The Military Balance"}, "authors": [{"authorId": "1982090837", "name": "\u010csob Chrudim"}, {"authorId": "1982090667", "name": "I. Foto"}, {"authorId": "1982129241", "name": "Pavel Van \u010dura"}, {"authorId": "1982124696", "name": "Rubena Hradec Kr\u00e1lov\u00e9"}, {"authorId": "2142413397", "name": "A. Rosa"}, {"authorId": "1982295677", "name": "Kau\u010duk Kralupy"}, {"authorId": "1982090754", "name": "P. Hulin"}, {"authorId": "1982090666", "name": "ekolog podniku"}, {"authorId": "1981960205", "name": "Dias Turnov"}, {"authorId": "1981960293", "name": "Ostatn\u00ed rizikov\u00e9 anal\u00fdzy"}]}, {"paperId": null, "externalIds": null, "url": null, "title": "Data de recec\u0327a\u0303o: 05/04/2021 Data de aceitac\u0327a\u0303o: 24/05/2021 O POTENCIAL DA INTELIGE\u0302NCIA ARTIFICIAL PARA O DESENVOLVIMENTO E COMPETITIVIDADE DAS EMPRESAS: UMA SCOPING REVIEW THE POTENTIAL OF ARTIFICIAL INTELLIGENCE FOR THE DEVELOPMENT AND COMPETITIVENESS OF COMPANIES: A SCOPING REVIEW", "abstract": null, "venue": "", "year": 2021, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "06b99f9d06d95dc3ec2335d5600ca0bd6176db80", "externalIds": {"CorpusId": 250987520}, "url": "https://www.semanticscholar.org/paper/06b99f9d06d95dc3ec2335d5600ca0bd6176db80", "title": "State-of-the-Art Review Introduction to arti\ufb01cial intelligence in ultrasound imaging in obstetrics and gynecology", "abstract": "Arti\ufb01cial intelligence (AI) uses data and algorithms to aim to draw conclusions that are as good as, or even better than, those drawn by humans. AI is already part of our daily life; it is behind face recognition technology, speech recognition in virtual assistants (such as Amazon Alexa, Apple\u2019s Siri, Google Assistant and Microsoft Cortana) and self-driving cars. AI software has been able to beat world champions in chess, Go and recently even Poker. Relevant to our community, it is a prominent source of innovation in healthcare, already helping to develop new drugs, support clinical decisions and provide quality assurance in radiology. The list of medical image-analysis AI applications with USA Food and Drug Administration or European Union (soon to fall under European Union Medical Device Regulation) approval is and covers such arrhythmia using a or automatic triage of critical to the top of the worklist. performs impact on this \ufb01eld so far. Nevertheless, there is huge potential for AI to assist in repetitive ultrasound tasks, such as automatically identifying good-quality acquisitions and providing instant quality assurance. For this potential to thrive, interdisciplinary communication between AI developers and ultrasound professionals is necessary. In this article, we explore the fundamentals of medical imaging AI, from theory to applicability, and introduce some key terms to medical professionals in the \ufb01eld of ultrasound. We believe that wider knowledge of AI will help accelerate its integration into healthcare.", "venue": "", "year": 2021, "referenceCount": 73, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2058972667", "name": "J. A. Noble"}, {"authorId": "2635802", "name": "A. Papageorghiou"}]}, {"paperId": "cf7cdf0f421a37bbc9358ab74a2f86d26617b64e", "externalIds": {"CorpusId": 250552348}, "url": "https://www.semanticscholar.org/paper/cf7cdf0f421a37bbc9358ab74a2f86d26617b64e", "title": "The challenges of artificial intelligence for Moroccan companies?", "abstract": "From deep learning to cognitive technology, artificial intelligence is everywhere in digital communication. It allows us to react more accurately to customers and engage them in meaningful, personalized interactions. In other words, without artificial intelligence, there is no digital consumer experience! The design of interactive user interface systems is a growing field of study that requires a wide range of skills, including psychology, artificial intelligence, software engineering and marketing. After a theoretical analysis, the objective of this article is to study the challenges of implementing its practices in relation to a country like Morocco in the different sectors that make up its economy, especially those focused on customer relations and experience.", "venue": "", "year": 2021, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2094569014", "name": "Mkik Marouane"}, {"authorId": "123338531", "name": "Salwa Mkik"}, {"authorId": "2126214668", "name": "Elfazazi Kaoutar"}]}, {"paperId": "d615689b556146eb5ec0adbf9f977d2eab8cbc19", "externalIds": {"DBLP": "conf/iwssl/000121", "CorpusId": 248923345}, "url": "https://www.semanticscholar.org/paper/d615689b556146eb5ec0adbf9f977d2eab8cbc19", "title": "Artificial Emotions for Rapid Online Explorative Learning", "abstract": "For decades, A.I. has been able to produce impressive results on hard problems, such as games playing in synthetic environments, but have had di\ufb03culty in interfacing with the natural world. Recently machine learning has enabled A.I. to interface more robustly with the real world. Statistical methods for speech understanding opened the door to voice-based systems and more recently deep-learning has revolutionized computer vision to the extent that wild speculation now predicts arti\ufb01cial superintelligence surpassing human intelligence, but we are a few major breakthroughs short of that being achieved. We know what some of these breakthroughs need to be. We need to replace supervised learning with unsupervised learning and we need to take on topics like motivation, attention, and emotions. In this article, we describe an architecture that touches on some of these issues drawing inspiration from neuroscience. We describe three aspects of the architecture in this article that address learning through fear and reward and address the focus of attention. These three systems are intimately linked in mammalian brains. We believe that this work represents an attempt to bridge the gap between high order reasoning and base-level support for motivation and learning in robots.", "venue": "IWSSL", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "63-83"}, "authors": [{"authorId": "2059560627", "name": "P. Robertson"}]}, {"paperId": "bb0e340f8698be1764c291275ac2b29e8f424610", "externalIds": {"DBLP": "conf/icqe/CarmonaGM21", "DOI": "10.1007/978-3-030-93859-8_23", "CorpusId": 245896771}, "url": "https://www.semanticscholar.org/paper/bb0e340f8698be1764c291275ac2b29e8f424610", "title": "Exploring Interactions Between Computational and Critical Thinking in Model-Eliciting Activities Through Epistemic Network Analysis", "abstract": null, "venue": "ICQE", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "346-361"}, "authors": [{"authorId": "2227814", "name": "G. Carmona"}, {"authorId": "2149763982", "name": "Beatriz Galarza-Tohen"}, {"authorId": "2149764421", "name": "Gonzalo Martinez-Medina"}]}, {"paperId": "c7e36d1638fd5620ac1364a260741b9acfd3cad7", "externalIds": {"CorpusId": 244919194}, "url": "https://www.semanticscholar.org/paper/c7e36d1638fd5620ac1364a260741b9acfd3cad7", "title": "Musical Cyborgs: Human-Machine Contact Spaces for Creative Musical Interaction", "abstract": "The concept of Musical Cyborgs follows Donna Haraway\u2019s \u201cCyborg Manifesto\u201d to describe a non-binary approach for human-machine collaboration with blurred borders between biological and cybernetic worlds. Interface dimensions of embodiment, instrumentality, authenticity, creativity, learning, and aesthetics therein unfold between intentional and self-organizing autonomy and are discussed with their specific requirements, conditions and consequences.", "venue": "", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2614107", "name": "Sebastian Trump"}]}, {"paperId": "d2ac955459c537208991a8191982d05548b61997", "externalIds": {"DOI": "10.1007/978-3-030-78471-3_26", "CorpusId": 240406640}, "url": "https://www.semanticscholar.org/paper/d2ac955459c537208991a8191982d05548b61997", "title": "The Future of Embodiment Research: Conceptual Themes, Theoretical Tools, and Remaining Challenges", "abstract": null, "venue": "Handbook of Embodied Psychology", "year": 2021, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Handbook of Embodied Psychology"}, "authors": [{"authorId": "4506994", "name": "B. Hommel"}]}, {"paperId": "3b5dde879a735262b95522a69526fbdb98e61839", "externalIds": {"MAG": "3200923600", "DOI": "10.1007/978-3-658-34522-8_12", "CorpusId": 240548208}, "url": "https://www.semanticscholar.org/paper/3b5dde879a735262b95522a69526fbdb98e61839", "title": "Grundlagen der k\u00fcnstlichen Intelligenz", "abstract": null, "venue": "Architekturen der Verwaltungsdigitalisierung", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Architekturen der Verwaltungsdigitalisierung"}, "authors": [{"authorId": "41201334", "name": "U. Lohmann"}]}, {"paperId": "9f1e61642b9a8c6485dc87c4d1dcef532a8fe07f", "externalIds": {"DBLP": "journals/caeai/OkonkwoA21", "MAG": "3202285719", "DOI": "10.1016/j.caeai.2021.100033", "CorpusId": 244337919}, "url": "https://www.semanticscholar.org/paper/9f1e61642b9a8c6485dc87c4d1dcef532a8fe07f", "title": "Chatbots applications in education: A systematic review", "abstract": null, "venue": "Computers and Education: Artificial Intelligence", "year": 2021, "referenceCount": 85, "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "2", "pages": "100033", "name": "Comput. Educ. Artif. Intell."}, "authors": [{"authorId": "51194123", "name": "W. C. Okonkwo"}, {"authorId": "1405313827", "name": "Abejide Ade-Ibijola"}]}, {"paperId": "9bc2f52d27649de191de1ae78cd79aa6a53c5535", "externalIds": {"MAG": "3195188675", "DOI": "10.1007/978-3-030-58080-3_278-1", "CorpusId": 238965039}, "url": "https://www.semanticscholar.org/paper/9bc2f52d27649de191de1ae78cd79aa6a53c5535", "title": "AIM in Surgical Pathology", "abstract": null, "venue": "Artificial Intelligence in Medicine", "year": 2021, "referenceCount": 118, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial Intelligence in Medicine"}, "authors": [{"authorId": "1990591841", "name": "Clare McGenity"}, {"authorId": "94553508", "name": "A. Wright"}, {"authorId": "46370558", "name": "D. Treanor"}]}, {"paperId": "8734eb1793711ecd4560480b290319be5dd65fd2", "externalIds": {"MAG": "3174292236", "DOI": "10.1007/978-3-658-34324-8_1", "CorpusId": 237988209}, "url": "https://www.semanticscholar.org/paper/8734eb1793711ecd4560480b290319be5dd65fd2", "title": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement \u2013 Anwendungen, Einsatzbereiche und Herangehensweisen", "abstract": null, "venue": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement", "year": 2021, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement"}, "authors": [{"authorId": "96109513", "name": "M. Bruhn"}, {"authorId": "74687281", "name": "Karsten Hadwich"}]}, {"paperId": "10248f437dffedfb2bcd7de7cd9f41092bd35370", "externalIds": {"MAG": "3194256972", "DOI": "10.1007/978-3-030-58080-3_94-1", "CorpusId": 238915603}, "url": "https://www.semanticscholar.org/paper/10248f437dffedfb2bcd7de7cd9f41092bd35370", "title": "AIM in Oncology", "abstract": null, "venue": "Artificial Intelligence in Medicine", "year": 2021, "referenceCount": 104, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial Intelligence in Medicine"}, "authors": [{"authorId": "2027023395", "name": "Umar Iqbal"}, {"authorId": "51243615", "name": "J. Nabi"}]}, {"paperId": "c056538c053c62c64134023a883d9b50bbf890c5", "externalIds": {"MAG": "3183611492", "DOI": "10.4018/978-1-7998-6985-6.ch016", "CorpusId": 237983407}, "url": "https://www.semanticscholar.org/paper/c056538c053c62c64134023a883d9b50bbf890c5", "title": "Artificial Intelligence in Marketing", "abstract": "The purpose of this chapter is to shed light on the consumer-AI interaction in the marketplace. By this aim, the chapter uses a literature review approach. The previous literature examining AI from a consumer behavior perspective is reviewed, and the findings are compiled in a meaningful flow. According to the review, we see that the traditional marketplace is shaped by AI from only human-to-human interactions to human-to-AI and AI-to-AI interactions. In this new marketplace, while consumers interact with AI, they gain new experiences and feel positive or negative because of these experiences. Also, they build different relationships with AI, such as servant, master, or partner. Besides these relationships, there are still concerns about AI that are related to privacy, algorithmic biases, consumer vulnerability, unemployment, and ethical decision making.", "venue": "Advances in Business Information Systems and Analytics", "year": 2021, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Advances in Business Information Systems and Analytics"}, "authors": [{"authorId": "147762811", "name": "\u00d6zge S\u0131\u011f\u0131rc\u0131"}]}, {"paperId": "0fab479f0592d02efd622fbf165e0baed6827361", "externalIds": {"DBLP": "conf/isalalife/WebsterA21", "DOI": "10.1162/isal_a_00360", "CorpusId": 237158590}, "url": "https://www.semanticscholar.org/paper/0fab479f0592d02efd622fbf165e0baed6827361", "title": "Identification of Lifelike Characteristics of Human Crowds Through a Classification Task", "abstract": "Crowd simulations are used extensively to study the dynam- ics of human collectives. Such studies are underpinned by speci\ufb01c movement models, which encode rules and assump- tions about how people navigate a space and handle interactions with others. These models often give rise to macro- scopic simulated crowd behaviours that are statistically valid, but which lack the noisy microscopic behaviours that are the signature of believable \u201creal\u201d crowds. In this paper, we use an existing \u201cTuring test\u201d for crowds to identify \u201clife- like\u201d features of real crowds that are generally omitted from simulation models. Our previous study using this test estab- lished that untrained individuals have dif\ufb01culty in classifying movies of crowds as \u201cReal\u201d or \u201cSimulated\u201d, and that such people often have an idealised view of how crowds move. In this follow-up study (with new participants) we perform a second trial, which now includes a training phase (show-ing participants movies of real crowds). We \ufb01nd that clas- si\ufb01cation performance signi\ufb01cantly improves after training, con\ufb01rming the existence of features that allow participants to identify real crowds. High-performing individuals are able to identify the features of real crowds that should be incor- porated into future simulations if they are to be considered \u201clifelike\u201d.", "venue": "ALIFE", "year": 2021, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "54"}, "authors": [{"authorId": "2130441911", "name": "Jamie Webster"}, {"authorId": "144936973", "name": "M. Amos"}]}, {"paperId": "ddaed12102518cea78ff353c99d81e464c86bf0b", "externalIds": {"DBLP": "series/lncs/GefenSV21", "DOI": "10.1007/978-3-030-69128-8_12", "CorpusId": 233329267}, "url": "https://www.semanticscholar.org/paper/ddaed12102518cea78ff353c99d81e464c86bf0b", "title": "AI for Digital Humanities and Computational Social Sciences", "abstract": null, "venue": "Reflections on Artificial Intelligence for Humanity", "year": 2021, "referenceCount": 31, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "191-202"}, "authors": [{"authorId": "115494985", "name": "A. Gefen"}, {"authorId": "1825767980", "name": "L\u00e9a Saint-Raymond"}, {"authorId": "2223687", "name": "T. Venturini"}]}, {"paperId": "e5c07e9e10535229887740701d9df1b8f8a15c93", "externalIds": {"DOI": "10.1007/978-3-030-56546-6", "CorpusId": 228141442}, "url": "https://www.semanticscholar.org/paper/e5c07e9e10535229887740701d9df1b8f8a15c93", "title": "Transhumanism: The Proper Guide to a Posthuman Condition or a Dangerous Idea?", "abstract": null, "venue": "", "year": 2021, "referenceCount": 461, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Book", "Review"], "publicationDate": null, "journal": {"name": "Transhumanism: The Proper Guide to a Posthuman Condition or a Dangerous Idea?"}, "authors": [{"authorId": "2194993", "name": "W. Hofkirchner"}, {"authorId": "1708420", "name": "H. Kreowski"}]}, {"paperId": "e719749bc2c99b9ae5b82d0b2161789dd2d30c14", "externalIds": {"DOI": "10.2307/j.ctv6jm8g5.8", "CorpusId": 243450514}, "url": "https://www.semanticscholar.org/paper/e719749bc2c99b9ae5b82d0b2161789dd2d30c14", "title": "The Landscape", "abstract": null, "venue": "Explainable AI with Python", "year": 2021, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Explainable AI with Python"}, "authors": [{"authorId": "52414735", "name": "L. Gianfagna"}, {"authorId": "2124492309", "name": "A. Di Cecco"}]}, {"paperId": "327db2ae7c7a2e5b33d5b84799196667cc77c154", "externalIds": {"MAG": "2495856924", "DOI": "10.1007/978-3-319-33138-6_19", "CorpusId": 63945277}, "url": "https://www.semanticscholar.org/paper/327db2ae7c7a2e5b33d5b84799196667cc77c154", "title": "History of Artificial Intelligence", "abstract": null, "venue": "A Brief History of Computing", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "A Brief History of Computing"}, "authors": [{"authorId": "1401546300", "name": "Gerard O'Regan"}]}, {"paperId": "1f916b8e14e27de58370d2f3123557d3e5bfca66", "externalIds": {"CorpusId": 251618988}, "url": "https://www.semanticscholar.org/paper/1f916b8e14e27de58370d2f3123557d3e5bfca66", "title": "Adaptiveness and Lock-free Synchronization in Parallel Stochastic Gradient Descent", "abstract": "The emergence of big data in recent years due to the vast societal digitalization and large-scale sensor deployment has entailed significant interest in machine learning methods to enable automatic data analytics. In a majority of the learning algorithms used in industrial as well as academic settings, the firstorder iterative optimization procedure Stochastic Gradient Descent (SGD), is the backbone. However, SGD is often time-consuming, as it typically requires several passes through the entire dataset in order to converge to a solution of sufficient quality. In order to cope with increasing data volumes, and to facilitate accelerated processing utilizing contemporary hardware, various parallel SGD variants have been proposed. In addition to traditional synchronous parallelization schemes, asynchronous ones have received particular interest in recent literature due to their improved ability to scale due to less coordination, and subsequently waiting time. However, asynchrony implies inherent challenges in understanding the execution of the algorithm and its convergence properties, due the presence of both stale and inconsistent views of the shared state. In this work, we aim to increase the understanding of the convergence properties of SGD for practical applications under asynchronous parallelism, and develop tools and frameworks that facilitate improved convergence properties as well as further research and development. First, we focus on understanding the impact of staleness, and introduce models for capturing the dynamics of parallel execution of SGD. This enables (i) quantifying the statistical penalty on the convergence due to staleness and (ii) deriving an adaptation scheme, introducing a staleness-adaptive SGD variant MindTheStep-AsyncSGD , which provably reduces this penalty. Second, we aim at exploring the impact of synchronization mechanisms, in particular consistency-preserving ones, and the overall effect on the convergence properties. To this end, we propose LeashedSGD , an extensible algorithmic framework supporting various synchronization mechanisms for different degrees of consistency, enabling in particular a lockfree and consistency-preserving implementation. In addition, the algorithmic construction of Leashed-SGD enables dynamic memory allocation, claiming memory only when necessary, which reduces the overall memory footprint. We perform an extensive empirical study, benchmarking the proposed methods, together with established baselines, focusing on the prominent application of Deep Learning for image classification on the benchmark datasets MNIST and CIFAR, showing significant improvements in converge time for Leashed-SGD and MindTheStep-AsyncSGD .", "venue": "", "year": 2021, "referenceCount": 70, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "72573425", "name": "Karl B\u00e4ckstr\u00f6m"}]}, {"paperId": "39a30b18bb2a6d2b06e7eeae22e8d1e476be48ae", "externalIds": {"CorpusId": 249270146}, "url": "https://www.semanticscholar.org/paper/39a30b18bb2a6d2b06e7eeae22e8d1e476be48ae", "title": "Artificial Intelligence Reframing Thinking Machines Within the History of Media and Communication", "abstract": ": Beginning with a critical exploration of the canonical histories of AI, this chapter stresses how the history of communication and media research may contribute to existing historiographies of AI. Four key aspects of the long-standing relationship between communication, media, and AI are discussed: the cross-history of communication theory (especially cybernetics) and AI, the early development of AI and human-computer interaction, the relevance of media and science fiction narratives in AI research and imaginaries, and the role of games in shaping interaction with AI software as communication between humans and machines. Rely-ing on an historical and critical discussion of these four aspects, we claim that reconsidering the history of AI does not only contribute to the historiography of the field but adds more ground for rethinking and discussing the theoretical foun-dations of communication and media studies at large. we have discussed here only work concerned with more or less self-contained problem solving programs. But as this is written, we are at last beginning to see vigorous activity in the direction of constructing usable time-sharing or multiprogramming computing systems. With these systems, it will at last become economical to match human beings in real time with really large machines. (. . .) In the years to come, we expect that these man-machine systems will share, and perhaps for a time be dominant, in our advance toward the development of \u2018 artificial intelligence \u2019 .", "venue": "", "year": 2021, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "30308716", "name": "Paolo Bory"}, {"authorId": "49518964", "name": "Simone Natale"}, {"authorId": "2006026056", "name": "D. Trudel"}]}, {"paperId": "e2e8a697002992d4aa8261ead9d23b01f286dae6", "externalIds": {"DOI": "10.7202/1089666ar", "CorpusId": 247626142}, "url": "https://www.semanticscholar.org/paper/e2e8a697002992d4aa8261ead9d23b01f286dae6", "title": "The Digital Reception of A Hundred Thousand Billion Poems", "abstract": "The Digital abstract Raymond Queneau\u2019s Cent mille milliards de po\u00e8mes ( CMMP ) was first intended as a poetry writing \u201cmachine\u201d (\u201cmachine \u00e0 fabriquer des po\u00e8mes\u201d). Queneau used the word \u201cmachine\u201d in his preface to designate a tool designed to help the reader compose his/her own sonnets. Immediately after its publication in 1961, poetry smitten computer scientists and poets interested in computer science digitalized Queneau's book. All computer portings could generate poems automatically, thus transforming CMMP into a proto-text generator. The digital reception of CMMP made a composition tool into a machine. This article investigates the possible meanings of the word \"machine\" in the context of the adaptation of Queneau\u2019s CMMP by D. Starynkevitch (1961) and Abstract Raymond Queneau\u2019s Cent mille milliards de po\u00e8mes ( CMMP ) was first intended as a poetry writing \u201cmachine\u201d (\u201cmachine \u00e0 fabriquer des po\u00e8mes\u201d). Queneau used the word \u201cmachine\u201d in his preface to designate a tool designed to help the reader compose his/her own sonnets. Immediately after its publication in 1961, poetry smitten computer scientists and poets interested in computer science digitalized Queneau\u2019s book. All computer portings could generate poems automatically, thus transforming CMMP into a proto-text generator. The digital reception of CMMP made a composition tool into a machine. This article investigates the possible meanings of the word \u201dmachine\u201d in the context of the adaptation of Queneau\u2019s CMMP by D. Starynkevitch (1961) and Paul Braffort (1975). Cent mille milliards de po\u00e8mes ( CMMP ) de Raymond Queneau est con\u00e7u comme une machine \u00e0 composer des po\u00e8mes. Queneau uti-lise le mot \u00ab machine \u00bb dans la pr\u00e9face des CMMP pour d\u00e9signer un outil offert au lecteur d\u00e9sireux de fabriquer ses propres sonnets. Imm\u00e9-diatement apr\u00e8s sa publication en 1961, des ing\u00e9nieurs informatiques f\u00e9rus de po\u00e9sie et des po\u00e8tes int\u00e9ress\u00e9s par l\u2019informatique port\u00e8rent le livre de Queneau sur ordinateur. Tous les portages informatiques des CMMP incluent la possibilit\u00e9 de g\u00e9n\u00e9rer des po\u00e8mes automati-quement, transformant ainsi les CMMP en un proto-g\u00e9n\u00e9rateur de texte. Cette r\u00e9ception num\u00e9rique des CMMP a transform\u00e9 un outil de composition en automate. Cet article \u00e9tudie les sens possibles du mot \u00ab machine \u00bb dans le contexte de l\u2019adaptation des CMMP par D. Starynkevitch (1961) et Paul Braffort (1975). Queneau\u2019s original printed version of Cent mille milliards de po\u00e8mes ( CMMP ) was conceived as a \u201cmachine\u201d that allows readers to potentially create a hundred thousand billion poems (almost all perfect sonnets) by combining 140 verses printed on movable strips of paper. Queneau described his book as a \u201c machine \u00e0 fabriquer des po\u00e8mes \u201d. Immediately after its publication in 1961, computer scientists interested in poetry and poets interested in computing began to port the book to computers. In this presentation, I investigate the different potential meanings of the word \u201cmachine\u201d in the context of the adaptation of Queneau\u2019s books into computer programs. The word \u201cmachine\u201d, when used by Queneau in the preface of CMMP , is to be read more as an instrument than an automaton. Queneau\u2019s instructional manual clearly encourages all readers to compose their own poems at will. By empowering the reader with a configurative function, Queneau aimed at fulfilling Lautr\u00e9amont\u2019s program: \u201cpoetry must be made by all, not by one\u201d (1961, II). Queneau insists in his preface that his book does not resemble the surrealists\u2019 \u201cexquisite corpse\u201d ( cadavre exquis ) 1 , but instead is inspired by a", "venue": "Sens public", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Sens public"}, "authors": [{"authorId": "2086071227", "name": "Jonathan Baillehache"}]}, {"paperId": "1cbc8579bdff617f8041432a6dc704a65dd8b45d", "externalIds": {"CorpusId": 247154298}, "url": "https://www.semanticscholar.org/paper/1cbc8579bdff617f8041432a6dc704a65dd8b45d", "title": "Computational Creativity and Consciousness: Framing, Fiction and Fraud Paper type: Study Paper", "abstract": "Computational Creativity, like its parent, Artificial Intelligence, suffers from ill-definition: both \u201ccreativity\u201d and \u201cintelligence\u201d are difficult, perhaps even impossible, to define. Both fields have also suffered from confusion about the relationship between their key concept and the equally problematic concept of \u201cconsciousness\u201d. Computational Creativity, however, has yet to address this issue effectively, which can only be detrimental to the field. This paper attempts to lay out the issues, to identify useful boundaries, particularly with respect to framing and the generation of meaning, and to map out ways in which Computational Creativity research may navigate the landscape of scientific possibility, while remaining true to itself.", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1808338", "name": "Geraint A. Wiggins"}]}, {"paperId": "b5e961013014c987e622eb801451999a9888126d", "externalIds": {"CorpusId": 244681479}, "url": "https://www.semanticscholar.org/paper/b5e961013014c987e622eb801451999a9888126d", "title": "What\u2019s in a thought experiment: the role of gender in Alan Turing\u2019s progressive imitation game", "abstract": "Turing proposed in 1950 his famous imitation game or test: a machine is supposed to imitate, sometimes a woman, sometimes a man. In 1995 scientists in artificial intelligence complained that, according to Turing, the goal of the field should be to build a \u201cmechanical transvestite.\u201d Supporters of Turing\u2019s test as a decisive experiment for machine intelligence then suggested to read \u201cman\u201d in Turing\u2019s text as masculine generics. Drawing also from primary sources other than Turing\u2019s 1950 text, they argued that Turing must have proposed not a gender, but a species test. My contention is that Turing did propose gender learning and imitation as one of his various tests for machine intelligence. I shall reconstruct the context of Turing\u2019s 1950 proposal and point out that it came out of a 1949 controversy, notably with neurosurgeon Geoffrey Jefferson. I will then try to show that Turing designed his imitation game as a thought experiment to refute, among other things, an a priori view of Jefferson that intelligence was an exclusive feature of the animal nervous system, and that interesting behavior in the male and the female was largely determined by sex hormones.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, {"paperId": "3c76eace84d9404bd5dd7df55c8e3219dc484be7", "externalIds": {"CorpusId": 237257696}, "url": "https://www.semanticscholar.org/paper/3c76eace84d9404bd5dd7df55c8e3219dc484be7", "title": "Quantum Computing: Resolving Myths, From Physics to Metaphysics", "abstract": "......................................................................................................................................... 3 Introduction ................................................................................................................................... 4 I Quantum Computing ................................................................................................................. 5 1.1 What is Quantum Computing?.............................................................................................. 5 1.1.1 Classical Computing ...................................................................................................... 5 1.1.2 Quantum Computing ...................................................................................................... 6 1.1.3 Motivations .................................................................................................................... 7 1.2 The Qubit .............................................................................................................................. 7 1.2.1 Schr\u00f6dinger\u2019s Cat........................................................................................................... 7 1.3 From Qubit to Computation ................................................................................................ 10 1.3.1 Classical Logic Gates ................................................................................................... 10 1.3.2 Entanglement ............................................................................................................... 10 1.3.3 Quantum Logic Gates .................................................................................................. 11 1.3.4 Quantum Circuits and Algorithms ............................................................................... 12 1.4 Selected Myths about Quantum Computers, Resolved. ...................................................... 16 II Computational Complexity .................................................................................................... 19 2.1 Computability and Complexity ........................................................................................... 19 2.2 Complexity Classes ............................................................................................................. 20 2.2.1 Polynomial-Time (P) ................................................................................................... 20 2.2.3 Nondeterministic Polynomial Time (NP) .................................................................... 21 2.2.4 NP-Complete................................................................................................................ 22 2.3 The Quantum Realm of Complexity ................................................................................... 22 III Philosophical Considerations ............................................................................................... 25 3.1 Quantum Computing and Consciousness ........................................................................... 25 3.2 Experimental Metaphysics .................................................................................................. 25 3.3 Can Machines Think? ......................................................................................................... 27 3.3.1 Two Objections to Turing\u2019s Test for Thinking ............................................................ 27 3.4 Will Quantum Machines Become Conscious? ................................................................... 28 3.4.1 What is Consciousness? ............................................................................................... 28", "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "7c5a826adb4e6d13818c37611dff5768cfcb07a7", "externalIds": {"MAG": "3203175182", "DOI": "10.1007/978-3-030-72644-7_1", "CorpusId": 244309473}, "url": "https://www.semanticscholar.org/paper/7c5a826adb4e6d13818c37611dff5768cfcb07a7", "title": "The Mind Technology Problem and the Deep History of Mind Design", "abstract": null, "venue": "The Mind-Technology Problem", "year": 2021, "referenceCount": 125, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "The Mind-Technology Problem"}, "authors": [{"authorId": "40090096", "name": "Robert W. Clowes"}, {"authorId": "2072938545", "name": "K. G\u00e4rtner"}, {"authorId": "2767883", "name": "In\u00eas Hip\u00f3lito"}]}, {"paperId": "901e0f4b433d48696f7684b36e10a696b380bdc7", "externalIds": {"CorpusId": 231582330}, "url": "https://www.semanticscholar.org/paper/901e0f4b433d48696f7684b36e10a696b380bdc7", "title": "Dystopia or utopia? Alan Turing\u2019s Promethean ambition about intelligent machines", "abstract": "Writing in 1948, Turing felt compelled to confront a \u201creligious belief\u201d that \u201cany attempt\u201d to construct intelligent machines was seen \u201ca sort of Promethean irreverence.\u201d And yet he has been associated by his own biographer Andrew Hodges with the image of \u201ca Frankenstein \u2014 the proud irresponsibility of pure science, concentrated in a single person.\u201d Reader of a 1865 version of Samuel Butler\u2019s Darwin among the machines, Turing challenged the conventional wisdom of what machines really were or could be and prophesized a future pervaded by intelligent machines which may be seen as a dystopia or as a utopia. The question is thus posed: what future did Turing actually envision and propose to machines? I will formulate and study the problem of identifying Turing\u2019s specific Promethean ambition about intelligent machines. I shall suggest that Turing\u2019s primary aim was the development of mechanistic explanations of the human mindbrain. But his secondary aim, implied in irony and wit, was the delivery of a social criticism about gender, race, nation and species chauvinisms. Turing\u2019s association with Mary Shelley\u2019s Frankenstein will be discouraged. Rather, his third aim was to send a precautionary message about the possibility of machines outstripping us in intellectual power in the future.", "venue": "", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, {"paperId": "5143e9576640d7b42522aa9dbc611392446fc2ca", "externalIds": {"CorpusId": 249640262}, "url": "https://www.semanticscholar.org/paper/5143e9576640d7b42522aa9dbc611392446fc2ca", "title": "Human Digital Twins in Acquiring for ognitive imetics", "abstract": "Modern information technology makes it possible to redesign the ways people work. In the future, machines can carry out intelligence-requiring tasks, which previously were done by people. It is thus good to develop methodologies for designing intelligent systems. An example of such methods is cognitive mimetics, i.e. imitating human information processing. Today, machines cannot by themselves navigate in archipelagos. However, the fact that people can take care of ship steering and navigation means that there is an information process, which makes it possible to navigate ships. This information process takes place inside the minds of navigating people. If we are able to explicate the information processing in the navigator\u2019s mind, the knowledge of it can be used in designing intelligent machines. Replicating physical objects and industrial processes by means of digital computers is called digital twinning. Digital twins (DTs), which are digital replicas of physical systems and processes, have recently become tools for working with complex industrial processes. A crucial question for DTs is should human actions be added to them? As the answer is positive, such models of human information processing can be called human digital twins (HDTs). The knowledge of human tacit and explicit information processes can be represented by human digital twins. Models can be used in the search for a deeper understanding of human intelligent information processes. Human digital twins can thus be used as methodological tools in cognitive mimetics. In our present study, we modeled paper machine operators\u2019 thinking. Specifically, we developed an ideal-exception-correction (IEC) model for paper operators\u2019 control logic. The model illustrates how research and HDT-modeling can be used for explicating the subconscious or tacit information processing of people for the design of intelligent systems. In this article a model for design processes using cognitive modelling will be suggested. The concepts of cognitive mimetics and human digital twins enable us to outline a model for using the long tradition of simulating human thinking as a tool in designing intelligent", "venue": "", "year": 2021, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2170147264", "name": "Pertti SAARILUOMAa"}, {"authorId": "74461425", "name": "A. Karvonen"}, {"authorId": "2170144283", "name": "Lotta SORSAM\u00c4KIb"}]}, {"paperId": "8c52a055a2771fb2acbe8b757e6b22812d54624e", "externalIds": {"CorpusId": 247601444}, "url": "https://www.semanticscholar.org/paper/8c52a055a2771fb2acbe8b757e6b22812d54624e", "title": "THE EFFECT OF CUSTOMERS\u2019 ATTITUDES TOWARDS CHATBOTS ON THEIR EXPERIENCE AND BEHAVIORAL INTENTION IN TURKEY", "abstract": "Chatbots are a recent technology that brands and companies adopt to provide 24/7 customer service. However, some customers have several concerns regarding technology, and therefore, prefer talking to humans rather than chatbots. Brands must improve their chatbots based on customer experience because customers satisfied with chatbots are more likely to use them to contact brands/companies. Therefore, this article investigated the effect of perceived ease of use, usefulness, enjoyment, and risk factors on customer experience and behavioral intention regarding chatbots. The study also looked into the impact of customer experience on behavioral intention. The sample consisted of 211 chatbot users of Turkish recruited using non-probability convenience sampling. Data were analyzed using the Statistical Package for Social Sciences (SPSS) and SmartPLS3. The results showed that perceived ease of use and usefulness affected behavioral intention, but perceived risk had no impact on customer experience and behavioral intention regarding chatbots. Perceived enjoyment affected only customer experience. Lastly, customer experience affected behavioral intention.", "venue": "", "year": 2021, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2079904593", "name": "Bolu Abant Izzet Baysal"}]}, {"paperId": "ba5b738d18c7a1d039adb0a8b85d17404827273f", "externalIds": {"DOI": "10.31866/2616-7468.4.1.2021.234831", "CorpusId": 237396072}, "url": "https://www.semanticscholar.org/paper/ba5b738d18c7a1d039adb0a8b85d17404827273f", "title": "Implementation of Artificial Intelligence in Restaurants", "abstract": "The topicality. In recent years, there has been a need to study the artificial intelligence use for the operation of restaurants, as in Ukraine (and in most countries) there is no such experience. The use of artificial intelligence systems customer-to-customer and item-to-item will ensure the quality of food delivery sites, which will allow you to analyze the order of the guest and identify the patterns of his preferences thus, automatically ask him to choose a certain set, dish and successful additions to the order, which will increase the average check, or choose new establishments that will help them enter the market of restaurant services.\nPurpose and methods. The purpose of the study is to analyze the current state, determine the prospects for the application of existing robotic technologies in the technological process of restaurants and develop a robotization scheme of the technological process of restaurants such as salad bar. Methods are in the course of research the methods of logical generalization concerning development of the robotization scheme of technological process which were carried out by means of the computer ArchiCaD program were applied.\nResults. The problem of introduction and the artificial intelligence use are studied by scientists and researchers in various fields of science. Considering their scientific works, it can be noted that artificial intelligence is already actively used for the manufacture of culinary products in foreign restaurants. There are known examples of the use of barista robots, pizza robots, salad maker robots, burger maker robots, etc. The study developed the robotization scheme of the technological process of salad bar, consisting of three stages. The first stage is the service of visitors in the shopping area, where the selection of the order, payment through the terminal and the subsequent automatic receipt of culinary products and beverages. The second stage is the preparation of semi-finished products in the procurement area. This process is controlled by a chef-operator, who controls the required number of semi-finished products and cleans and cuts vegetables, fruits, meat and fish products using machines for cleaning and slicing culinary products. The program provides for the analysis of the balance and the required number of semi-finished products and the choice of components for the preparation of salads with artificial intelligence. The third stage is the automatic preparation of salad in the pre-cooking production area. The artificial intelligence placed in the system analyzes the guest\u2019s order and activates the containers with the necessary ingredients, mixes them and unloads them into a container covered with a plastic lid, and the robot stamping element leaves the order number on the lid. The proposed scheme provides for compliance with sanitary and hygienic standards for institutions of this type. With the developed system of production activities, the required number of employees will be 5 people: cleaner in the trade area, dishwasher, tray packer, cook-operator of the pre-cooking area and system administrator of artificial intelligence.\nConclusions and discussions. The authors analyze the current state, identify prospects for the application of existing robotic technologies in the technological process of restaurants and developed a robotization scheme of the technological process on the example of a salad bar. The developed scheme consists of three stages: service of visitors, preparation of semi-finished products and automatic preparation of finished goods. It is assumed that the implementation of the developed system will speed up the process of customer service, reduce the area of production facilities and, accordingly, increase the restaurant turnover.", "venue": "", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2125416670", "name": "S. Neilenko"}, {"authorId": "119719000", "name": "Valentyna Rusavska"}]}, {"paperId": "8f3625dcb33f055be88c5542b8308b910b7dae31", "externalIds": {"CorpusId": 254020286}, "url": "https://www.semanticscholar.org/paper/8f3625dcb33f055be88c5542b8308b910b7dae31", "title": "Towards a Persona Aware Conversational Agent", "abstract": "Dialog systems have been at the center of Natural Language Processing (NLP) since its inception. With a wide range of applications, this type of system is particularly interesting as a user interface, creating the possibility of a more natural and convenient user experience. In the context of Customer Support, goal-oriented dialog systems are now widely used, helping users carry out specific tasks. Traditionally, these systems were created by employing knowledge-based architectures. However, the growth of Deep Learning and the increase in data availability facilitated the development of neural dialog systems, which can be trained end-to-end. A well-known example of such a system is the \u201cTransformer\u201d, a self-attentional model that has achieved state-of-the-art results in multiple NLP tasks. Notwithstanding, these systems still present some shortcomings, particularly in terms of scal-ability. The need for large amounts of data and considerable computing power can be an impediment, especially in situa-tions where multiple entities must be represented. In Goal-Oriented Dialog Systems, this becomes evident when consid-ering multi-brand Customer Support, since each brand must communicate differently with its users, meaning one model must be developed and maintained for each brand. In Open-Domain System, an analogous problem arises when consider-ing settings where multiple characters must be impersonated. In this work, we explore how we can create conversational agents that tackle this issue, in both settings. To this end, we adapt and experiment with multiple state-of-the-art architectures together with recent datasets.", "venue": "", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2192527936", "name": "Nuno Ventura de Melo"}]}, {"paperId": "e2da55a0b52fc67006adff5ebd62a41cd2a77451", "externalIds": {"CorpusId": 253448852}, "url": "https://www.semanticscholar.org/paper/e2da55a0b52fc67006adff5ebd62a41cd2a77451", "title": "Arti\ufb01cial Aesthetics: A Critical Guide to AI, Media and Design", "abstract": null, "venue": "", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "68995872", "name": "E. Arielli"}]}, {"paperId": "ce5c99fe1dbdc1e89ccf71cac73140ef49267506", "externalIds": {"CorpusId": 252765129}, "url": "https://www.semanticscholar.org/paper/ce5c99fe1dbdc1e89ccf71cac73140ef49267506", "title": "Proceedings of the 7th Computational Creativity Symposium AISB 2021 (CC2021)", "abstract": ". We use Ritchie\u2019s criteria for the evaluation of creative systems to analyse MEXICA. Ritchie\u2019s criteria are for humans to use, but in this analysis, we are using them so the system can test itself. We do this analysis to get information about MEXICA\u2019s performance. With this analysis, we can delve into how MEXICA is exploring its conceptual space. MEXICA could improve its performance by changing the execution parameters it uses. We can repeat this analysis and we would optimise MEXICA\u2019s result. Abstract. We are developing a generative art application for casual creation on handheld devices, where user enjoyment is priori-tised over the quality and/or utility of the abstract images they make. In an attempt to increase enjoyment, we have enabled the app to generate image titles, and we describe here the approach we take, along with details of some experiments we undertook to optimise it for ef\ufb01ciency and variety. The approach employs words relating to a machine vision classi\ufb01cation and colour breakdown of the images, wrapped in the language of International Art English. When there is no suitable input from the machine vision analysis of an image, the approach generates text which is not necessarily related to the image. Such texts have been described linguistically as pseudo-profound bullshit statements, in work on the psychology of human judgement that we survey. We evaluate the title generation approach with a curation analysis, and end with a discussion of some potential bene\ufb01ts of employing bullshit in a Computational Creativity context. Abstract. This philosophical paper examines the Darwinian account of creativity as a model for assessing computational creativity. It will first establish a Darwinian account of creativity using Simonton\u2019s [1] model. It will then apply this model to popular image-producing AI, Generative Adversarial Networks, and the promising Creative Adversarial Network, both used in the computational production of \u2018artworks\u2019. The paper will argue that these networks are compatible with a Darwinian account of creativity, due to the presence of blind variation within the networks, a key component of Simonton\u2019s model. The paper will then address some initial objections. The aim of this paper will ultimately be to assess whether the AI systems are compatible with the Darwinian model of creativity, and in the process explore Darwinian creativity as a potential standard for testing computational creativity. 12 Abstract. The purpose of this ongoing research is to better understand the potential contributions that computers can play in situations where people interact with computers towards creative pur-suits and goals. Past research has provided sets of de\ufb01nitions of different roles that a computer plays in human-computer creative collaboration. Thus far, we look into the advantages and limitations of having such roles. In particular, this paper contributes an analysis and categorisation of the coverage of existing role classi\ufb01cations for computational participants in co-creativity. This analysis is comple-mented by a comparative review of the use of roles to understand and structure creative collaboration between people only (i.e. without any computational participants involved). Our wider project investigates whether these de\ufb01ned sets of roles are a. adequate and b. helpful for understanding the perception of computational contributions in co-creativity, with a study planned to investigate the roles of current systems in practice. This project considers both co-creative computer systems that currently exist, and systems that could potentially exist in the future. Our goal is to reach a point where the perception of what is possible in human-computer co-creative collaboration is enabled and boosted (but not constrained) by a de\ufb01nitive set of roles. Abstract. This paper argues that a too-expansive view on creativity is unhelpful at best and deeply misleading at worst. As with \u201crepresentation\u201d, the word \u201ccreativity\u201d comes value-laden in ways that researchers cannot lightly get away from, if they can escape at all; simply claiming that one is using the word in a technical sense is not a solution. Neither should one take an overly narrow view that takes advantage of a priori arguments to deny creativity to classes of agents or putative agents solely by their membership in those classes. The paper proceeds by o\ufb00ering a de\ufb01nition of creativity meant to prejudice neither human being nor artefact; then setting out the conditions for a putative creative agent to be a creative agent, concluding that no existing artefactual agents appear to fall into this category; \ufb01nally, addressing the question of why computers, computer programs, robots, and related artefacts have nevertheless had a profound \u2013 indeed, transformational \u2013 e\ufb00ect on human creativity, taking creativity to places that neither human beings nor artefacts could have gone on their own. It ends with a discussion of the person I see as one of the key early voices on computational creativity. Abstract. We present AMI \u2013 Arti\ufb01cial Music Intelligence, a deep neural network that can generate musical compositions of different instruments with a coherent long-term structure. AMI uses a state-of-the-art general-purpose deep neural network architecture, called the Transformer model [7], to discover patterns of musical structures such as melodies, chords, and rhythm, from tens of thousands of MIDI \ufb01les. The learning is done in an unsupervised manner, allowing exploitation of large collections of MIDI \ufb01les that are available on the internet. We trained AMI over 8000 classical music MIDI \ufb01les. As an autoregressive model, AMI predicts a music note at a time depending on not just the last note, but a long sequence of notes (up to thousands) from previous time steps. The previous notes are not provided via some hidden state such as in a recurrent neural network (RNN), instead the model has direct access to all earlier notes. Furthermore, we enhance the learning of musical structures by adding different kinds of embeddings: one short-term embedding and one long-term embedding. As a result, the model is able to maintain a coherent long-term structure and occasionally pick up different movements. Audio examples of the model output can be heard at https://meddis.dcs.shef.ac.uk/melody/samples . The Transformer model is the latest advance in language understanding [6, 2, 1], which is trained to predict the next token in a sequence of text. The core idea behind the model is self-attention \u2013 the ability to attend to different positions of the sequence to compute a representation of that sequence. It allows the modelling of a much longer sequence than one that can be modelled by previous language models such as a recurrent neural network based model. This makes the model well-suited for modelling music data, whose structure and meaning are often built by repetition and self-reference on multiple timescales.Unlikeone-dimensional multiple Abstract. We present a system design for applying functional models of improvisational music to the generation of game soundtracks that react to game events. We provide a proof-of-concept implementation using Unity/C# and Haskell to create an interactive scene where the music changes as the user interacts with creatures in the environment. Abstract. Demonstration Abstract for the Show-and-Tell session We present a robotic storytelling system, named Sc\u00b4ealability , which augments a symbolic story-generation system with embodied, robot actors to physically enact a story with the congruent use of space, gesture and voice. We describe the system and summarize the empirical evidence as to the bene\ufb01ts of embodied story-telling.", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": []}, {"paperId": "74551960e4f7c98907a52e62d59cfe1667c84a52", "externalIds": {"DOI": "10.25236/ajcis.2021.040806", "CorpusId": 252295348}, "url": "https://www.semanticscholar.org/paper/74551960e4f7c98907a52e62d59cfe1667c84a52", "title": "Evaluation of Artificial Intelligence Techniques Applied in Watson and AlphaGo", "abstract": ": Artificial intelligence (AI) and software engineering are two important areas in computer science. In recent years, researchers are trying to apply AI techniques in various stages of software development to improve the overall quality of software products. Moreover, there are also some researchers who focus on the intersection between software engineering and AI. In fact, the relationship between software engineering and AI is very weak; however, methods and techniques in one area have been adopted in another area. More and more software products are capable of performing intelligent behavior like human beings. In this research project, two cases studies which are IBM Watson and Google AlphaGo that use different AI techniques in solving real-world challenging problems have been analyzed, evaluated and compared. Based on the analysis of both case studies, using AI techniques such as deep learning and machine learning in software systems contributes to intelligent systems. Watson adopts \u2019decision making support\u2019 strategy to help humans make decisions; whereas AlphaGo uses \u2019self-decision making\u2019 to choose operations that contribute to the best outcome. In addition, Watson learns from man-made resources such as paper; AlphaGo, on the other hand, learns from massive online resources such as photos. AlphaGo uses neural networks and reinforcement learning to mimic human brain, which might be very useful in medical research for diagnosis and treatment. However, there is still a long way to go if we want to reproduce human brain in machine and view computers as thinkers, because human brain and machines are intrinsically different. It would be more promising to see whether computers and software systems will become more and more intelligent to help with real world challenging problems that human beings cannot do.", "venue": "Academic Journal of Computing & Information Science", "year": 2021, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Academic Journal of Computing & Information Science"}, "authors": [{"authorId": "2111760257", "name": "Jiaqi Han"}, {"authorId": "2183768758", "name": "Jianing Han"}]}, {"paperId": "c91e267343e07178a5e97fb4e16e35adc26f0e3d", "externalIds": {"CorpusId": 252043731}, "url": "https://www.semanticscholar.org/paper/c91e267343e07178a5e97fb4e16e35adc26f0e3d", "title": "Users' N eeds A ssessment for C hatbots\u2019 U se in Higher Education", "abstract": ". Higher education comprises an important field for the application of chatbots, especially for large-scale use. This paper reports on a needs assessment that was conducted with higher education users (i.e., educators and students) for examining their needs and expectations on chatbots\u2019 integration in educational settings. The study was conducted in the context of a research project that includes a series of iterative pilot studies of the use of chatbots in higher education. We report on findings from one of the pilots based on data from semi-structured online interviews with higher-education students and educators. A thematic analysis of the interview data resulted in different themes of needs that users have in education. The outcomes of this study indicate that higher-education users need technological solutions that can support content delivery, formative assessment implementation with the provision of qualitative feedback, research tasks processing and social bonding facilitation. Those findings, along with interviewees\u2019 suggestions on functionalities and features that chatbots should have, provide guidelines and recommendations for the design, development, and implementation of different scenarios of the use of chatbots in higher education.", "venue": "", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2402551", "name": "O. Tsivitanidou"}]}, {"paperId": "7a487e12c6124dcee8228bbaec60569c0017e04f", "externalIds": {"CorpusId": 251906876}, "url": "https://www.semanticscholar.org/paper/7a487e12c6124dcee8228bbaec60569c0017e04f", "title": "Arti\ufb01cial Intelligence Paradigms and the Future of Learning: What a Partial Review of Half a Century of AI Conceptualization Suggests", "abstract": "Joseph Makokha was born, raised and educated in Kenya. He obtained a BSEE degree from the University of Nairobi before moving to the United States, where he earned two masters degrees in education before starting his doctoral studies in mechanical engineering at Stanford University focussing on design. He researches human collaboration with artificial intelligence (AI), with the goal of understanding how to design AI that augments humans on thinking tasks.", "venue": "", "year": 2021, "referenceCount": 62, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "117213984", "name": "Joseph Makokha"}, {"authorId": "117213984", "name": "Joseph Makokha"}]}, {"paperId": "c89fac010ad6b166f5429bc53f68dd65f21cf233", "externalIds": {"CorpusId": 251906446}, "url": "https://www.semanticscholar.org/paper/c89fac010ad6b166f5429bc53f68dd65f21cf233", "title": "A Qualitative Review on Intervention of Robotics in Medical Science", "abstract": "Robots have entered into many aspects of human life, including medical science. The impact of robotics on medicine is undeniable. Robots can be defined as \"automatically controlled multitask manipulators, which are freely programmable in three or more axes.\" The success of robots is based on their precision, lack of fatigue, and speed of action. Medical robotics is a promising field that really took off in the 1990s. Since then, a wide variety of medical applications have emerged: laboratory robots, surgical training, remote surgery, telemedicine and teleconsultation, rehabilitation and hospital robots. There are, however, many challenges in the widespread implementation of robotics in the medical field, mainly due to issues such as safety, precision, cost and reluctance to accept this technology. Medical robotics includes a number of devices used for surgery, medical training, rehabilitation therapy, prosthetics, and assistance to people with disabilities. Robotic surgery has been successfully implemented in several hospitals around the globe and has received world wide acceptance. This paper provides an overview of the impact of robots in multiple medical domains, which is one of the most active areas for research and development of robots.", "venue": "", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2183233788", "name": "Swati Saxena"}]}, {"paperId": "d79349d6f898ab4b382773841882a4c4596bc77d", "externalIds": {"CorpusId": 251614036}, "url": "https://www.semanticscholar.org/paper/d79349d6f898ab4b382773841882a4c4596bc77d", "title": "Human Emotion and Machine Emotion - Studies of Emotion in AI", "abstract": "\u2014 Artificial Intelligence (AI) is undoubtedly a hot word in the field of contemporary art in recent years. The consciousness, intuition and emotion of AI have attracted the attention of artists in particular, and many art works have explored this topic. Does AI have the emotional characteristics of humans? Is the emotion of AI equal to the emotion that defines human beings? This paper attempts to step out of the anthropocentric perspective, examine the boundary and relationship between human emotion and machine emotion, and inject a new theoretical perspective into the AI artistic practice. This paper first discusses what emotion is in the biological sense, analyzes whether a machine can have emotion from both positive and negative aspects, and puts forward the definition of \"machine emotion\". This paper also reviews some theories and practices related to emotion in the AI field. The conclusion of this paper is that although artificial intelligence cannot possess human emotions, it can possess \u201cmachine emotions\u201d beyond the narrow sense of human emotions, and the construction of emotional mechanisms inside AI may become a new research direction in this field.", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2181712253", "name": "Wang Shuo"}]}, {"paperId": "ea7ca2f3fd35f4143ae38b67905b117879fff10f", "externalIds": {"CorpusId": 250563970}, "url": "https://www.semanticscholar.org/paper/ea7ca2f3fd35f4143ae38b67905b117879fff10f", "title": "Neural Networks Post-Selections in AI and How to Avoid Them", "abstract": "Neural network based Artificial Intelligence (AI) has reported increasing scales in experiments. However, this paper raises a rarely reported stage in such experiments called Post-Selection alter the reader to several possible protocol flaws that may result in misleading results. All AI methods fall into two broad schools, connectionist and symbolic. The Post-Selection fall into two kinds, Post-Selection Using Validation Sets (PSUVS) and Post-Selection Using Test Sets (PSUTS). Each kind has two types of post-selectors, machines and humans. The connectionist school received criticisms for its \u201cblack box\u201d and now the Post-Selection; but the seemingly \u201cclean\u201d symbolic school seems more brittle because of its human PSUTS. This paper first presents a controversial view: all static \u201cbig data\u201d are non-scalable. We then analyze why error-backprop from randomly initialized weights suffers from severe local minima, why PSUVS lacks cross-validation, why PSUTS violates well-established protocols, and why every paper involved should transparently report the Post-Selection stage. To avoid future pitfalls in AI competitions, this paper proposes a new AI metrics, called developmental errors for all networks trained, under Three Learning Conditions: (1) an incremental learning architecture (due to a \u201cbig data\u201d flaw), (2) a training experience and (3) a limited amount of computational resources. Developmental Networks avoid Post-Selections because they automatically discover context-rules on the fly by generating emergent Turing machines (not black boxes) that are optimal in the sense of maximum-likelihood across lifetime, conditioned on the Three Learning Conditions. Preprint submitted to Neural Networks September 9, 2021", "venue": "", "year": 2021, "referenceCount": 84, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "ebedc76d741547134d10b1f5025420bc580cbf25", "externalIds": {"CorpusId": 250184433}, "url": "https://www.semanticscholar.org/paper/ebedc76d741547134d10b1f5025420bc580cbf25", "title": "Design the Future Activities (DFA): A Pedagogical Content Knowledge Framework in Engineering Design Education", "abstract": "Hadi studies the in\ufb02uence of the future of work on curricular innovation, with a focus on exploring the relationships between and among adaptability, risk taking and value making. In an effort to characterize engineering education as an (eco)system for creating value, Hadi\u2019s approach integrates analytical methods of data science to address changes in systems and society. More broadly, Hadi is interested in examining how engineering innovations mobilize social and economic change. He has graduate degrees in Aeronautics and Astronautics (space systems design, astrodynamics and propulsion), Electrical and Computer Engineering (arti\ufb01cial intelligence, \ufb01elds and optics) and Engineering Education (design cognition and human communication inquiry) all from Purdue University. He also has an undergraduate degree in Mechanical Engineering (design) from the University of Jordan, and an undergraduate degree in Aeronautics and Astronautics from Purdue. He taught courses in use-inspired design at ASU and in transforming ideas to innovations at Purdue. Prior to joining ASU, Hadi worked at the University of Jordan as a facilitator for curricular change and design content instructor at the Department of Mechatronics. He was on the management team of the Amman Design Week in its inaugural year in Jordan, launched by Queen Rania\u2013a pioneering platform that harnessed creativity, revived the conversation about design, and instilled a spirit of collaboration and exchange. explore new ways of collectively building a better future. Abstract We propose an effective, innovative framework for developing content for design activities that address the challenges of the future where emerging technologies play a central role. Although engineering education research is concerned with preparing future engineers, the integration of future trends in technology with the engineering curriculum has been limited. We propose the Design the Future Activities (DFA) as a framework for systematically identifying and integrating emerging areas of research and technologies, such as artificial intelligence, into the teaching of engineering design. The core of developing and delivering the DFA framework is the teaching of the technology of artificial intelligence (AI). Because these technologies will change the nature of the future, we seek to engage with the ongoing discourse on the relationship between content (for design education) and pedagogy, through a proposed pedagogical content knowledge conceptual framework. Through a scholarship of integration that breaks the boundaries between disciplines, we propose a three-level framework: (1) Understanding technology analysis and system integration (to allow students to identify appropriate solutions given new technologies); (2) Making a value chain (or how these are appropriate solutions); and (3) Developing responsible innovations (or why these are appropriate solutions). While engineers continue to be creators and influencers of such technologies, the lack of understanding of the impact of their own technologies continues to cause an imbalanced innovation landscape, in education and in the workplace. We conclude that a new design approach to the engineering curriculum should be attempted, assuming that educators will systematically anticipate the future and recalibrate the curriculum. the special amalgam of content and pedagogy as conceptualized in the PCK framework. We also provide illustrative examples for the content at each proposed level.", "venue": "", "year": 2021, "referenceCount": 111, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "50340281", "name": "Hadi Ali"}]}, {"paperId": "b063f431e4e725f1883a222a949b0a08bd190251", "externalIds": {"CorpusId": 250045114}, "url": "https://www.semanticscholar.org/paper/b063f431e4e725f1883a222a949b0a08bd190251", "title": "Frontiers of the (non)humanly (un)imaginable. Anthropological estrangement and the making-of Persona at the Mus\u00e9e du Quai Branly", "abstract": "Melanesian \u2018spirits\u2019 and geometrical supernatural entities. The visitor was confronted with having to balance between Heider and Simmel\u2019s animated sequence (a very short animated film in which two triangles and a circle moved inside and outside a square) and the possibility of making a \u2018counter-experience\u2019 with objects from the museum collections. Heider and Simmel\u2019s audience was asked to interpret the behaviour of their geomet-ric figures, asking, for instance, whether they were following, repelling, or", "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145982463", "name": "E. Grimaud"}]}, {"paperId": "100b8cebcf4640165dd4c099e8df7bfa87c3e03d", "externalIds": {"CorpusId": 249604969}, "url": "https://www.semanticscholar.org/paper/100b8cebcf4640165dd4c099e8df7bfa87c3e03d", "title": "6 Urban Mobility and Parking Demand", "abstract": "Parking demand, both current and future, depends on two aspects: the long-term impact of urbanization and urban planning on parking demand, which is not addressed here, and, secondly, the choice of mobility modes, which is discussed here. The choice of mobility modes may, on one hand, require smart parking management and parking information, which is a result of the tracking technology discussed before. On the other hand an informed or incentivized choice of mobility modes may even lead to less parking demand.", "venue": "", "year": 2021, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145285033", "name": "S. Winter"}]}, {"paperId": "e7aebfb30f46e0e4121ac90563ab9dcfa8a4d6ab", "externalIds": {"DBLP": "conf/iwssl/Wang21", "CorpusId": 248923306}, "url": "https://www.semanticscholar.org/paper/e7aebfb30f46e0e4121ac90563ab9dcfa8a4d6ab", "title": "A Unified Model of Reasoning and Learning", "abstract": "This paper analyzes the historical development of the conceptions of \u201creasoning\u201d and \u201clearning\u201d, especially their separation in the study of arti\ufb01cial intelligence and the attempts to combine them in various ways. A uni\ufb01ed treatment of cognitive functions is provided in the AGI model NARS, where reasoning and learning are di\ufb00erent facets of the same underlying process.", "venue": "IWSSL", "year": 2021, "referenceCount": 85, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "28-48"}, "authors": [{"authorId": "49830633", "name": "Pei Wang"}]}, {"paperId": "e85ce5036d19980d722fb794355037500ecbe2f7", "externalIds": {"DOI": "10.2139/ssrn.4093683", "CorpusId": 248484841}, "url": "https://www.semanticscholar.org/paper/e85ce5036d19980d722fb794355037500ecbe2f7", "title": "The Human Condition in An Algorithmized World: A Critique through the Lens of 20th-Century Jewish Thinkers and the Concepts of Rationality, Alterity and History", "abstract": "Artificial Intelligence (AI) systems are increasingly deployed in all domains of our lives. While their use can provide substantial benefits, they also entail significant risks \u2013 and ethics has been put forward as the key solution to counter these risks. Yet the manner in which ethics is typically relied on in this context is woefully deficient. At best, ethics is given the role of orienting problematic technology towards \u2018acceptable\u2019 uses, thereby legitimizing AI\u2019s widespread adoption, which is taken for granted. At worst, ethics is instrumentalized as a quality-label to stimulate AI\u2019s deployment, as part of a broader doctrine of \u2018progress\u2019. Current ethics discourse hence appears unable to provide a more fundamental critique of the way in which the algorithmized world is profoundly impacting our existence. This is because it starts from within a technological paradigm that does not fundamentally question AI\u2019s place and progression in society. In this paper, I therefore argue that, if ethics is to shed light on \u2013 and to offer a more fundamental critique of \u2013 the human condition in an algorithmized world, without being bound to today\u2019s technological paradigm, it requires a meta-technological perspective that puts ethics first. To pursue this aim, I propose to ground our approach in the fact that our existence in the world is necessarily intersubjective and relational, and use the lens of intersubjectivity to examine AI\u2019s impact on the human condition. To narrow the scope of my analysis, I focus on AI\u2019s impact on three interrelated domains of our existence: (1) our way of thinking or rationality, (2) our way of engaging with others or alterity and (3) our way of experiencing time or history. In my analysis, I draw on the work of 20th-century Jewish thinkers, such as Franz Rosenzweig, Emmanuel Levinas and Hannah Arendt, given the importance they ascribe to relationality and its role in countering totalitarian thinking which, as I argue, can also arise through the systemic irresponsible use of AI. After introducing my research inquiry (Chapter 1) and providing a brief definition of AI (Chapter 2), I seek to answer three questions: First, what does the algorithmized world look like, and what is its underpinning societal paradigm (Chapter 3)? Second, how does current AI ethics discourse approach AI\u2019s risks, and how does it fall short of delivering a more fundamental critique of AI\u2019s impact on the human condition (Chapter 4)? Third, how does AI\u2019s ubiquity affect the human condition, and particularly our experience of rationality, alterity and history (Chapter 5)? Based on my research findings, I conclude that the totalizing use of AI systems \u2013 and the way it impacts our way of thinking, our way of engaging with others and our way of experiencing time \u2013 can give rise to significant concerns, as it may be used in a way that opposes our ability to live a meaningful life by engaging in intersubjective human relationships. To close this paper, I postulate several avenues that should be explored to counter the concerns identified (Chapter 6). * Researcher, KU Leuven Faculty of Law, Tiensestraat 41, 3000 Leuven, nathalie.smuha@kuleuven.be. I wish to express my gratitude to Roger Vergauwen and Luc Anckaert for their invaluable support in the context of this research, which I conducted during my Philosophy degree (MA) at the KU Leuven Institute of Philosophy.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 241, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "134533029", "name": "Nathalie A. Smuha"}]}, {"paperId": "821f9d3b553df7c2c3798839cb830d8a188de19a", "externalIds": {"CorpusId": 248368910}, "url": "https://www.semanticscholar.org/paper/821f9d3b553df7c2c3798839cb830d8a188de19a", "title": "The Use of Artificial Intelligence in Automation in the Fields of Gynaecology and Obstetrics \u2013 an Assessment of the State of Play Anwendungen der k\u00fcnstlichen Intelligenz zur Automatisierung in der Gyn\u00e4kologie und Geburtshilfe \u2013 eine Standortbestimmung", "abstract": "The long-awaited progress in digitalisation is generating huge amounts of medical data every day, and manual analysis and targeted, patient-oriented evaluation of this data is becoming increasingly difficult or even infeasible. This state of affairs and the associated, increasingly complex requirements for individualised precision medicine underline the need for modern software solutions and algorithms across the entire healthcare system. The utilisation of state-of-the-art equipment and techniques in almost all areas of medicine over the past few years has now indeed enabled automation processes to enter \u2013 at least in part \u2013 into routine clinical practice. Such systems utilise a wide variety of artificial intelligence (AI) techniques, the majority of which have been developed to optimise medical image reconstruction, noise reduction, quality assurance, triage, segmentation, computer-aided detection and classification and, as an emerging field of research, radiogenomics. Tasks handled by AI are completed significantly faster and more precisely, clearly demonstrated by now in the annual findings of the ImageNet Large-Scale Visual Recognition Challenge (ILSVCR), first conducted in 2015, with error rates well below those of humans. This review article will dis-cuss the potential capabilities and currently available applications of AI in gynaecological-obstetric diagnostics. The article will focus, in particular, on automated techniques in prenatal sonographic diagnostics.", "venue": "", "year": 2021, "referenceCount": 107, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "95646540", "name": "J. Weichert"}, {"authorId": "2146415420", "name": "A. Welp"}, {"authorId": "2076410849", "name": "Jan Scharf"}, {"authorId": "2080895815", "name": "C. Dracopoulos"}, {"authorId": "2163410249", "name": "Wolf-Henning Becker"}, {"authorId": "144578328", "name": "M. Gembicki"}]}, {"paperId": "0e76eb7ab6a2ba696fed5622cf44b2a8210ddabd", "externalIds": {"CorpusId": 247997301}, "url": "https://www.semanticscholar.org/paper/0e76eb7ab6a2ba696fed5622cf44b2a8210ddabd", "title": "Neural Dialogue Generation Methods in Open Domain: A Survey empirical", "abstract": "Open-Domain Dialogue Generation (human\u2013computer interaction) is an important issue in the field of Natural Language Processing (NLP). Because of the improvement of deep learning techniques, a large number of neural dialogue generative meth- ods were proposed to generate better responses. In this survey, we elaborated the research history of these existing generative methods, and then roughly divided them into six categories, i.e. , Encoder-Decoder framework-based methods, Hierarchical RecurrentEncoder-Decoder(HRED)-basedmethods,VariationalAutoencoder(VAE)-basedmethods,ReinforcementLearning(RL)-basedmethods,GenerativeAdversarialNetwork(GAN)-basedmethods,andpretraining-model-basedmethods.Wedivedintothemethodsofeachcategoryandgavethedetaileddiscussionsofthesemethods.Afterthat,wepresentedacomparisonamongthedifferentcategoriesofmethodsandanalyzedtheiradvantagesanddisadvantages.Weenumeratedsomeopenaccesspublicdatasetsandsomecommonlyusedautomaticevaluatingmetrics.Finally,wediscusssomepossibleresearchdirectionsthatcantaketheresearchofneuraldialoguegenerationintoanewfrontierinthefuture.", "venue": "", "year": 2021, "referenceCount": 85, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2088605455", "name": "Bin Sun"}, {"authorId": "2158257423", "name": "Kan Li"}]}, {"paperId": "07797213cd6cdf2d67007059ab718d5add436ddd", "externalIds": {"DOI": "10.17454/pam-2111", "CorpusId": 247467547}, "url": "https://www.semanticscholar.org/paper/07797213cd6cdf2d67007059ab718d5add436ddd", "title": "Cognitivism and the intellectualist vision of the mind", "abstract": "No one can deny that enactive approaches to the mind are here to stay. However, much of this revolution has been built on the grounds of conceptual confusions and hurried anlyses that undermine enactive claims. The aim of this paper is to weaken the charge of intellectualism against cognitivism developed by Hutto and Myin. This charge turns to be central to the enactive purpose of setting up a fully post-cognitivist position. I will follow a strategy of conceptual elucidation of \u201cintellectualism\u201d. Hutto and Myin (2013, 2017) present two alternative characterizations of this notion. The first is tied to the Cartesian conception of the mind (which I will call \u201cCartesian intellectualism\u201d), and the second is tied to the idea that there is no cognition without content (which I will call \u201csemantic intellectualism\u201d). I would like to go into the problems considering cognititivsm either as Cartesian or semantic intellectualism.", "venue": "Phenomenology & Mind", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Phenomenology & Mind"}, "authors": [{"authorId": "2069450672", "name": "Mariela Dest\u00e9fano"}]}, {"paperId": "3b41739abf993d5cdc698531fae234548720b2ae", "externalIds": {"CorpusId": 247235503}, "url": "https://www.semanticscholar.org/paper/3b41739abf993d5cdc698531fae234548720b2ae", "title": "Visualization Using Field of Light Displays: Opportunities and New Questions", "abstract": "Visualization techniques are typically evaluated on conventional 2D displays. Current immersive display technology such as headmounted displays (HMDs) and existing (and future) 3D field of light displays (FoLDs) can present visual information with additional perceptual cues not found in 2D displays. We review immersive technology and existing studies which suggest that additional perceptual cues (e.g. stereoscopy and focal cues) from 3D displays can enhance some visualization tasks\u2019 performance. This suggests potential new studies which measure the effect of additional perceptual cues and their influence on effectiveness of visualization methods. We consider the problem of visualizing data which contains interesting structures across multiple scales. We show how immersive and FoLDs provide an opportunity to answer some new questions related to this problem. We hypothesize that the additional perceptual cues of FoLDs can enhance perception of shape structures across multiple scales and we suggest several possible approaches for studying this.", "venue": "", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "144573831", "name": "M. Hamilton"}]}, {"paperId": "0b698924c94deb693144233d9eaf85d793d865af", "externalIds": {"CorpusId": 246484440}, "url": "https://www.semanticscholar.org/paper/0b698924c94deb693144233d9eaf85d793d865af", "title": "The Myth of AI Failure CSRP 568", "abstract": "A myth has developed that AI has failed as a research program. Most myths contain some germ of truth but this one is exceptional in that it is more or less completely false. In fact AI is a remarkably successful research program which has delivered not only scientific insight but a great deal of useful technology. One of the main reasons why people assert the failure of AI as a research program is the mistaken view that its main goal is to replicate human intelligence. Such a view is understandable. It is common to misread Turing\u2019s 1950 paper Computing Machinery and Intelligence as suggesting that the ultimate goal of AI should be the complete replication of human intelligence. AI researchers have also not done sufficient to make it clear that complete replication of human intelligence is not the ultimate goal of AI. A further source of the failure myth is the need felt by many researchers to distance their approach to AI from other, usually previous, approaches. In many cases a fashionable approach to AI may give itself a new name ALife would be a good example \u2013 and portray previous AI approaches as having failed. In truth there is no failure to be explained. Almost every citizen in the developed world makes use of AIderived technology every day. The fact that this AI technology is usually hidden in other technologies and works unobtrusively is a measure of just how successful AI has been. AI has also inspired, and continues to inspire, many other disciplines from linguistics to biology through the generation of scientifically useful data and concepts. The scientific work may still be at an early stage but its potential is great and failure myths should not be allowed to impede it.", "venue": "", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145708034", "name": "Blay Whitby"}]}, {"paperId": "2bd07bd27ec6a29ad1109e5cd35ae71534d71ac4", "externalIds": {"DOI": "10.1016/b978-0-12-823806-6.00001-6", "CorpusId": 245992402}, "url": "https://www.semanticscholar.org/paper/2bd07bd27ec6a29ad1109e5cd35ae71534d71ac4", "title": "Technologies and society", "abstract": null, "venue": "Big Data's Threat to Liberty", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Big Data's Threat to Liberty"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "b900f38b233bd66e5445407842bf404913a113b7", "externalIds": {"DOI": "10.1007/978-3-030-93842-0_8", "CorpusId": 245890224}, "url": "https://www.semanticscholar.org/paper/b900f38b233bd66e5445407842bf404913a113b7", "title": "A Bayesian Framework for Evaluating Evolutionary Art", "abstract": null, "venue": "BNAIC/BENELEARN", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "141-152"}, "authors": [{"authorId": "2149736657", "name": "Augustijn de Boer"}, {"authorId": "2149736665", "name": "Ron Hommelsheim"}, {"authorId": "2082011568", "name": "D. Leeftink"}]}, {"paperId": "014d6d064ca62f56e4aa883114f16f55d0e8c0dc", "externalIds": {"DOI": "10.1007/978-981-16-4963-9_2", "CorpusId": 245642731}, "url": "https://www.semanticscholar.org/paper/014d6d064ca62f56e4aa883114f16f55d0e8c0dc", "title": "Fundamentals of Federated Learning", "abstract": null, "venue": "Wireless Networks", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Wireless Networks"}, "authors": [{"authorId": "115893131", "name": "Choong Seon Hong"}, {"authorId": "2280048", "name": "L. U. Khan"}, {"authorId": "2888344", "name": "Mingzhe Chen"}, {"authorId": "2113598069", "name": "Dawei Chen"}, {"authorId": "145412074", "name": "W. Saad"}, {"authorId": "2113962182", "name": "Zhu Han"}]}, {"paperId": "733e665ccef57eb41519f6f6ba53f3a575e9928b", "externalIds": {"CorpusId": 245510134}, "url": "https://www.semanticscholar.org/paper/733e665ccef57eb41519f6f6ba53f3a575e9928b", "title": "On a Possibility of Artificial Reason: J. McCarthy, I. Kant, and A. Turing", "abstract": "T\ufeffhe purpose of this study is to explore the possibility of reconciliation between Kant\u2019s transcendental idealism and McCarthy\u2019s epistemological point of view on artificial intelligence, which are at first glance likely to be considered contradictory. For this, characterizing the standpoint of J. McCarthy, who coined the word \u2018artificial intelligence\u2019 as scientific realism and that of A. Turing, who provided a crucial thought experiment that shaped the contemporary conception of artificial intelligence as behaviorism, we shall compare these two standpoints with the transcendental idealism of I. Kant, who conferred on us a monumental indicator for understanding the human reason. T\ufeffhrough this comparison, we shall argue that scientific realism, which is currently a prominent philosophical standpoint of artificial intelligence, is not compatible with Kant\u2019s transcendental idealism but assumes a standpoint strikingly analogous to behaviorism. Nevertheless, we shall also argue that once transcendental idealism is looked at from the viewpoint of behaviorism, scientific realism can be seen as compatible with transcendental idealism. T\ufeffhis compatibility we name the possibility of artificial reason in this paper.", "venue": "", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo Kim"}, {"authorId": "2151267031", "name": "Jinkyu Jeong"}, {"authorId": "2065379320", "name": "J. McCarthy"}, {"authorId": "32297722", "name": "I. Kant"}, {"authorId": "71653708", "name": "A. Turing"}]}, {"paperId": "2ac71a11195a593366239164abf7cb95ebcde530", "externalIds": {"CorpusId": 245510927}, "url": "https://www.semanticscholar.org/paper/2ac71a11195a593366239164abf7cb95ebcde530", "title": "Gerlai, Robert (2017) Learning, memory, cognition, and the question of sentience in fish. Animal Sentience 13(8)", "abstract": "Evolutionarily conserved features have been demonstrated at many levels of biological organization across a variety of species. Evolutionary conservation may apply to complex behavioral phenomena too. It is thus not inconceivable that a form of sentience does exist even in the lowest order vertebrate taxon, the teleosts. How similar it is to human sentience in its level of complexity or in its multidimensional features is a difficult question, especially from an experimental standpoint, given that even the definition of human sentience is debated. Woodruff attempts a Turing-like test of fish sentience, and lists numerous neuroanatomic, neurophysiological and behavioral similarities between fish and humans. In this commentary, I add to these similarities by discussing empirical findings showing complex forms of mental representation in fish. At the same time, I note that without a more thorough understanding of human sentience and more data on similarities as well as differences between fish and mammals, the final conclusion may have to wait. Robert Gerlai, Professor of Psychology, University of Toronto, does research on neurobiological and genetic mechanisms of behavior in fish and rodents. He is Fellow and past president of the International Behavioral Neuroscience Society. He received the Distinguished Scientist Award from the International Behavioral and Neural Genetics Society in 2013, and the University of Toronto Mississauga Excellence in Research Award in 2015. sites.utoronto.ca/GerlaiLab/ 1. Evolutionary conservation at many levels of biology: Does it extend to sentience? Evolutionary biology has taught us that all species are related to each other. The question is only the degree of relatedness. We also know that evolution is a process whereby random genetic changes leading to alterations in previously existing phenotypes are tested in terms of how they increase or decrease the ability to reproduce under current environmental conditions. In other words, evolution is not a designer that creates things from scratch. Biologists find evolutionary homologies across a broad range of features and across a large number of species from fish to human. Steps of embryonic development, fundamental anatomical layout of brains, neurotransmitter systems and their receptors, molecular mechanisms of neuronal plasticity, and amino acid sequences of proteins all exhibit homologies, which are signs of common ancestry. Why should sentience be different? I would argue, therefore, that the question is not whether fish are sentient, but rather to what degree and in what flavor? In other words, where Animal Sentience 2017.045: Gerlai on Woodruff on Fish Feel 2 do we draw the line? Or more provocatively, is there a line to draw at all? Clearly, human sentience is a species-typical feature of Homo sapiens. Fish do not have it. But does this prove that we are the only sentient creature walking (flying, swimming, crawling) on this planet? Woodruff\u2019s (2017) target article makes a genuine effort to show us that it does not! 2. Where do we draw the line? A Turing test for fish. According to Woodruff, fish do exhibit signs of sentience, a conclusion that depends upon how we define the phenomenon and associated underlying mechanisms. And there lies the biggest question: the definition of the phenomenon. We all think we know what it is to be aware, or to be sentient or conscious. But does science really know the answer to these questions? Woodruff attempts to answer by focusing on empirical, experimental definitions: mechanisms and behavioral responses, a Turing test (Turing, 1950) of sentience for fish. He shows us that fish do indeed possess features at the levels of anatomy, neurophysiology and behavior compatible with the assumption of the presence of sentience. The similarities he cites across human and fish features abound. But so do the differences (Bay\u00e9s et al., 2017)! Which should we emphasize? And which represent proof or disproof? My own impression is that these questions are still to be discussed, and the answers will continue to be refined and re-discussed again and again. But let me add another angle to this discussion, leading back to the question of how we define sentience. To me, it appears this phenomenon has to do with modeling the external world. Mental representations of the outside allow the organism to remember the past, understand the present, and forecast the future, a phenomenon that in humans, and in some other mammals as well as some bird species, scientists call the ability to do \u201cmental time travel\u201d (Clayton, 2015). Mental representations imply that there is an actor, the self, that experiences, and plays a role in, the representation. Sentience may be an epiphenomenon, an emergent property of increasingly sophisticated mental representations afforded by complex brains. Setting aside questions about specific anatomy, connectome, electrophysiology and molecular mechanisms, do we know whether fish brains are complex enough for mental representations to form? From the results of behavioral studies, the answer to this question is: yes, we already do. 3. Complex mental representations: What do fish learn and remember? I will give only two examples, from my own research. The ability to make numerical or quantity estimations is a human feature but it is also widespread in the animal kingdom (Feigenson et al., 2004). A variety of fish species have been shown to be able to tell more from less, and, surprisingly, the way they do it also resembles how human children do it (G\u00f3mez-Laplaza & Gerlai, 2016). Most recently, we have shown that a fish species, angelfish (Pterophyllum scalare), is not only capable of making the distinction between more and less when the item sets to be compared are present at the same time, but also when the items are not shown, i.e., when the fish have to remember where the items used to be (G\u00f3mez-Laplaza & Gerlai, 2016). In other words, we now have clear evidence of memory, i.e., mental representation of more vs. less in a fish species. Does this mean that fish \u201cunderstand\u201d the abstract meaning of more vs. less? are they \u201caware\u201d of their Animal Sentience 2017.045: Gerlai on Woodruff on Fish Feel 3 choices? No, it does not. But it does show a level of sophistication in their mental representation abilities that in the past was thought to be uniquely human. The other example of complex mental representation in fish comes from our studies on spatial learning in zebrafish. As also discussed by Woodruff, the hallmark of episodic or declarative memory is its relational aspect (Eichenbaum, 1992). The ability to organize and relate what seem to be loosely related bits and pieces of information is a fundamental requirement for us to be able to remember where, what and when things happened to us, a function supported by the hippocampal formation. Thus, tests of relational memory have been used to analyze \u201cdeclarative episodic\u201d memory in non-human animals too (Eichenbaum, 1992), species that cannot talk. A frequently employed relational type of hippocampal memory task is the spatial memory test in which mammals (mostly rodents) learn the dynamic representation of visual cues outside the maze. But how do we know what they actually learn? This is a complicated question that has been explored experimentally. A rodent with a disrupted hippocampus can pick out a single cue from the background, turning the spatial task into an elemental task that it can seemingly perform well (Gerlai, 1998; Phillips & LeDoux, 1994). However, if a salient associative cue is experimentally provided in addition to the spatial cues, hippocampally lesioned animals cannot pick out a secondary cue, and thus will \u201crecognize\u201d the location of the reinforcer only when the associative cue is presented. Hippocampally intact mammals, on the other hand, can learn both at the same time: the dynamic spatial map, and the salient cue. Thus, when faced with the spatial task, hippocampally intact rodents can identify the location of the reinforcer even in the absence of the salient associative cue (Gerlai, 1998; Phillips & LeDoux, 1994). Surprisingly, so can zebrafish (Karnik & Gerlai, 2014). In other words, zebrafish acquire spatial information the same way rodents with an intact hippocampus do, despite the fact that zebrafish lack the hippocampal structure specific to mammalian brains. The ability to acquire a complex spatial map suggests sophisticated mental representation in fish. Does it mean fish are sentient? No, it does not. But this second Turing test of mental representation previously thought to be a sole property of complex mammalian brains has now also been passed with flying colors by fish. In sum, Woodruff\u2019s arguments about the many similarities between fish and humans are eyeopening. But to truly understand what it feels like to be a fish, we may need to appreciate both the similarities and the differences between us and them. We may even need a better understanding of what it really feels like to be human.", "venue": "", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "4809629", "name": "R. Gerlai"}]}, {"paperId": "437dc1846e1cff235da6dd2fd714387ce0bfca84", "externalIds": {"CorpusId": 245447872}, "url": "https://www.semanticscholar.org/paper/437dc1846e1cff235da6dd2fd714387ce0bfca84", "title": "ESSAY Water resource prospects for the next 50 years on the water planet: personal perspectives on a shared history from Earth Day, the Fourth Industrial Revolution and One Health to the futures of alternative energy, bioconvergence and quantum computing", "abstract": "The history and the future of water resource management as well as the endeavours that it influences are inextricably woven into the fabric of the past, current and future states of all life on our watery planet. From the first Earth Day in 1970 and the founding of the International Water Resources Association (IWRA) in 1971 to the development of modern biotechnology applications and alternative energy sources across subsequent decades, this paper reflects on these and other historical underpinnings of how we manage the use of our essential water resources now and might hope to in the future. ARTICLE HISTORY Received 23 May 2021 Accepted 9 November 2021", "venue": "", "year": 2021, "referenceCount": 167, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "123568129", "name": "W. Jones"}]}, {"paperId": "29600d7533061c8473a119b1ad4f742972c6268b", "externalIds": {"DBLP": "conf/icccrea/Wulf21", "CorpusId": 245331326}, "url": "https://www.semanticscholar.org/paper/29600d7533061c8473a119b1ad4f742972c6268b", "title": "Producing Creative Chess through Chess Engine Selfplay", "abstract": "This article presents preliminary work on a creative chess engine that can be used to produce creative chess games or sequences. The contribution in this article is the creation of a creative chess engine that is then pitted against itself to form a creative system that outputs chess games. The chess engine is an extension to an existing chess engine that consists of forcing the existing engine to play more creative moves. It is in no way an improvement when compared to existing chess engines, even though it is based on the world\u2019s best: Stockfish. Letting the supposedly creative chess engine play against itself forms a creative system that outputs chess games. Through analyzing these games it might be possible to discover new chess openings or principles.", "venue": "ICCC", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "208-212"}, "authors": [{"authorId": "1958839977", "name": "Wolf De Wulf"}]}, {"paperId": "b7532b76441d2c3e9cc24f491989e6aea242b19d", "externalIds": {"DBLP": "conf/icccrea/ChangC21", "CorpusId": 245331248}, "url": "https://www.semanticscholar.org/paper/b7532b76441d2c3e9cc24f491989e6aea242b19d", "title": "In the Name of Creativity: En Route to Inspiring Machines", "abstract": "In this short paper, we reflect on the long quest for intelligence and creativity of computing machinery as well as the suitability for prevailing machine learning techniques to be used in creative tasks. We believe that modularization and multi-layered structures are among essential ingredients constituting creative minds and may greatly benefit machines on handling creative tasks. For proof of concept, we select musical composition, particularly, Species Counterpoint, as the task, adopt a recently proposed computational framework designed for investigating creativity and the creative process, and present an implementation capable of producing the outcomes that exhibit the desired effect. Introduction and Reflections Computing machinery has been fascinating to human beings for quite a long time. Accompanied with the introduction to the idea and design of a programmable, general-purpose, mechanical computer, well known as Babbage\u2019s Analytical Engine (Menabrea 1843), almost two centuries ago, expectations and speculations on the potentials, especially in aspects of intelligence and creativity, of such a machine had been boldly made by Lovelace (1843), \u201c..., the engine might compose elaborate and scientific pieces of music of any degree of complexity or extent.\u201d A century later, Turing (1950) asked the question, \u201cCan machines think?\u201d to address the intelligence aspect of machines and to argue that machines may eventually exhibit intelligent behavior as playing well in the imitation game. Now, we wish to ask the question, \u201cCan machines create?\u201d Under the current circumstances, we are unable to directly, appropriately answer this question. Instead, in this article, within the scope of musical composition, we would like to make a discussion on the apparent lack of certain essential components, capabilities, and properties that enable or permit machines to create in the present prevailing techniques. Moreover, we provide our preliminary implementation as a viable technical construction with its generated results indicating that the existence of some these essential ingredients brings machines one step further closer to being able to create. The most prominent, prevailing computational techniques in the related fields of artificial intelligence are undoubtedly the methods in the family of deep learning and artificial neural networks, and in the area of music generation, there have already been enormous studies and results (Briot, Hadjeres, and Pachet 2020). We do not intend to diminish the importance or undermine the practical value of those works, but if methods of this category are adopted, from the viewpoint of creators, or more specifically, music composers, in terms of the present form of the methodology, there are certain limitations in the aspects of formality, capability, and efficacy (Pearl and Mackenzie 2018). The technical framework of deep learning requires a huge amount of data, i.e., existing music pieces in this case, to train models which no matter will be used as classifiers or generators. Insufficient data will be unable to render useful or meaningful outcomes, let alone models that can create in the common sense. In history, there are only a few productive music composers creating certain amount of music pieces. Simply according to this situation, in contrast to the usage and requirements of the deep learning methodology, it can be seen that creativity and the action of creating may not properly fit with how deep learning operates and functions. As to the characteristics of deep learning, please allow us to make an arguable analogy. We know that any boolean function, as long as the truth table is given, in theory, we can directly construct its combinational circuits in a systematic way by analyzing and identifying the essential prime implicants. It is in the fundamentals of logic design. However, in practice, except for certain, usually extremely simple, circuits, most circuits are not designed in this way. Instead, their design process usually incorporates modularization, multi-layered structures, domain knowledge, and even personal experience of designers. Although the techniques of deep learning keeps evolving and advancing, employing popular deep learning techniques on music generation tasks is intrinsically similar to making attempts to piece together superficial elements, like prime implicants in the circuit case, to produce target outcome in the basic, primitive way. For music, such an approach in fact not only conceptually ignores the separate, usually totally different ideas and emotions that the music composer would like to convey and express via individual music pieces but also decontextualizes the music pieces by not considering the essence constitutes the creation such as the historical background, the cultural heritage, and even possibly the factors of instruments, including timbre, registers, and the difficulty to perform. Proceedings of the 12th International Conference on Computational Creativity (ICCC \u201921) ISBN: 978-989-54160-3-5 400 Moreover, pre-existing knowledge, pre-determined settings, and personal preference or experience are extremely difficult to inject into the use of deep learning methods if at all possible. While the models obtained from deep learning can be presented in detail in the form of many parameters, usually millions, and easily duplicated for replicating the results, the operation as a whole fundamentally forms a black box. Thus, a successful, practically applicable artificial neural network model can provide little information for gaining insights or triggering inspiration. In recent years, while the research directions such as interpretable machine learning and explainable artificial intelligence have emerged (Linardatos, Papastefanopoulos, and Kotsiantis 2021), the advancement is currently quite limited. Therefore, in this article, we wish to respond to the call made by Turing for making machines intelligent, or in our case, capable of creating. We would like to take a small step towards making machines able or seemingly able to create in the common sense. In order to integrate the computational framework with the concept of modularization and the multi-layered structures of the creating process, we adopt our recently proposed meta-framework, ants on multiple graphs, AntsOMG (Chang and Chen 2020) and one of its showcase, the composition of organum motets (Chang and Chen 2021), in the hope that the essential ingredients in the creating process, especially in music composition, can be observed. Based on the design and properties of AntsOMG, we expect the presented implementation to possess certain characteristics, such as accessibility, scalability, and explainability. Moreover, at the level of technical details, since the implementation is multi-layered and modularized, the \u201ccomponents\u201d of the produced model for composing music can even be separated and swapped with ease. Hence, transfer learning, utilizing pre-existing knowledge, incorporating pre-determined settings, integrating human experience, and the like can be achieved. By conducting research along this line, hopefully injecting creativity into machines may someday be accomplished.", "venue": "ICCC", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "400-404"}, "authors": [{"authorId": "151504753", "name": "Chun-yien Chang"}, {"authorId": "101612255", "name": "Yingpeng Chen"}]}, {"paperId": "b8b764703a6ab0e0b01194a1d8be3a02a352f8b4", "externalIds": {"CorpusId": 245121860}, "url": "https://www.semanticscholar.org/paper/b8b764703a6ab0e0b01194a1d8be3a02a352f8b4", "title": "1st Workshop on Automatic Spoken Language Translation in Real-World Settings", "abstract": "We address the problem of language model customization in applications where the ASR component needs to manage domain-specific terminology; although current state-of-the-art speech recognition technology provides excellent results for generic domains, the adaptation to specialized dictionaries or glossaries is still an open issue. In this work we present an approach for automatically selecting sentences, from a text corpus, that match, both semantically and morphologically, a glossary of terms (words or composite words) furnished by the user. The final goal is to rapidly adapt the language model of an hybrid ASR system with a limited amount of in-domain text data in order to successfully cope with the linguistic domain at hand; the vocabulary of the baseline model is expanded and tailored, reducing the resulting OOV rate. Data selection strategies based on shallow morphological seeds and semantic similarity via word2vec are introduced and discussed; the experimental setting consists in a simultaneous interpreting scenario, where ASRs in three languages are designed to recognize the domainspecific terms (i.e. dentistry). Results using different metrics (OOV rate, WER, precision and recall) show the effectiveness of the proposed techniques.", "venue": "", "year": 2021, "referenceCount": 143, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145862931", "name": "M. Turchi"}]}, {"paperId": "a9a7127f3bd7a964606ed58ec80361a34b3f1684", "externalIds": {"CorpusId": 244919179}, "url": "https://www.semanticscholar.org/paper/a9a7127f3bd7a964606ed58ec80361a34b3f1684", "title": "Artificial Computational Creativity based on Collaborative Intelligence in Music", "abstract": "In this paper, I will propose a series of Artificial Computer Creativity (ACC) techniques based on Collaborative Intelligence from a multidisciplinary approach. The common thread here are some reflections on the Turing Test (TT) that will inspire alternative metrics of validation. I will propose Collaborative Intelligence (CI) techniques as an expansion of anthropocentric ACC by: replacing the idea of imitation in its basis with playing a game, using selfreferentiality and circularity between the generative and the validation processes; having hybrid man-machine networks; incorporating algorithms that function as mediators of the nodes in hybrid networks avoiding centralities and by integrating self-referential metrics in the works themselves. Finally, I will show how these techniques have been used in a set of works.", "venue": "", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2143260007", "name": "Fernando Egido"}]}, {"paperId": "4da830b6d84e117cb147ff71f205e71500ebbbb1", "externalIds": {"CorpusId": 244709495}, "url": "https://www.semanticscholar.org/paper/4da830b6d84e117cb147ff71f205e71500ebbbb1", "title": "Machines and Influence", "abstract": "Policymakers face a broader challenge of how to view AI capabilities today and where does society stand in terms of those capabilities. This paper surveys AI capabilities and tackles this very issue, exploring it in context of political security in digital societies. We introduce a Matrix of Machine Influence to frame and navigate the adversarial applications of AI, and further extend the ideas of Information Management to better understand contemporary AI systems deployment as part of a complex information system. Providing a comprehensive review of man-machine interactions in our networked society and political systems, we suggest that better regulation and management of information systems can more optimally offset the risks of AI and utilise the emerging capabilities which these systems have to offer to policymakers and political institutions across the world. Hopefully this long essay will actuate further debates and discussions over these ideas, and prove to be a useful contribution towards governing the future of AI.", "venue": "", "year": 2021, "referenceCount": 128, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2151241746", "name": "Shashank Yadav"}]}, {"paperId": "7df4af2c478eb163cfd0d897fad7a26b0221e7ec", "externalIds": {"MAG": "3204743340", "DOI": "10.1007/978-3-476-05796-9_12", "CorpusId": 244328204}, "url": "https://www.semanticscholar.org/paper/7df4af2c478eb163cfd0d897fad7a26b0221e7ec", "title": "Maschinen-\u00dcbersetzung: Ada Lovelaces Notes of the Translator", "abstract": null, "venue": "", "year": 2021, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "157-166", "name": ""}, "authors": [{"authorId": "114614045", "name": "A. Sch\u00f6ning"}]}, {"paperId": "2ef8eb79ecbbfece7cf51d1e75c7614e18e1aa31", "externalIds": {"DOI": "10.1016/j.ifacol.2021.10.448", "CorpusId": 244096048}, "url": "https://www.semanticscholar.org/paper/2ef8eb79ecbbfece7cf51d1e75c7614e18e1aa31", "title": "Walking Through the Turing Wall", "abstract": null, "venue": "IFAC-PapersOnLine", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "IFAC-PapersOnLine"}, "authors": [{"authorId": "2057885436", "name": "Albert R. Efimov"}, {"authorId": "115644835", "name": "D. Dubrovsky"}, {"authorId": "112902170", "name": "P. M. Matveev"}]}, {"paperId": "a886028b788e98cdec71c7ae1d3aa64cefb1b32f", "externalIds": {"DOI": "10.1007/978-3-030-26050-7_189-1", "CorpusId": 244083940}, "url": "https://www.semanticscholar.org/paper/a886028b788e98cdec71c7ae1d3aa64cefb1b32f", "title": "Machine Learning", "abstract": null, "venue": "Encyclopedia of Mathematical Geosciences", "year": 2021, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Encyclopedia of Mathematical Geosciences"}, "authors": [{"authorId": "2068792892", "name": "Feifei Pan"}]}, {"paperId": "a4c964d4200dba72bba324f33cb1258aee7dd0df", "externalIds": {"CorpusId": 243843605}, "url": "https://www.semanticscholar.org/paper/a4c964d4200dba72bba324f33cb1258aee7dd0df", "title": "Implementation of AutoTutor Lite", "abstract": "................................................................................................................ ii Chapter", "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2148416687", "name": "Lu Han"}]}, {"paperId": "3d928a4a0311806c8cea689f0e1be8f6fef363f6", "externalIds": {"DBLP": "journals/access/StockBB21", "DOI": "10.1109/ACCESS.2021.3125102", "CorpusId": 242079633}, "url": "https://www.semanticscholar.org/paper/3d928a4a0311806c8cea689f0e1be8f6fef363f6", "title": "Applications of Artificial Intelligence in Distribution Power System Operation", "abstract": "Due to the energy transition and the distribution of electricity generation, distribution power systems gain a lot of attention as their importance increases and new challenges in operation emerge. The integration of renewables and electric vehicles for instance leads to manifold changes in the system, e.g. participation in provision of ancillary services. To solve these challenges artificial intelligence provides a variety of solutions based on the increase in sensor data and computational capability. This paper provides a systematic overview of some of the most recent studies applying artificial intelligence methods to distribution power system operation published during the last 10 years. Based on that, a general guideline is developed to support the reader in finding a suitable AI technique for a specific operation task. Therefore, four general metrics are proposed to give an orientation of the requirements of each application. Thus, a conclusion can be drawn presenting suitable algorithms for each operation task.", "venue": "IEEE Access", "year": 2021, "referenceCount": 143, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "9", "pages": "150098-150119", "name": "IEEE Access"}, "authors": [{"authorId": "2136754152", "name": "Simon Stock"}, {"authorId": "2765856", "name": "D. Babazadeh"}, {"authorId": "122377639", "name": "C. Becker"}]}, {"paperId": "5d75d8ce441a37517299509374e638285e2f4b2a", "externalIds": {"MAG": "3159430918", "DOI": "10.35248/2167-0374.21.11.185", "CorpusId": 240596920}, "url": "https://www.semanticscholar.org/paper/5d75d8ce441a37517299509374e638285e2f4b2a", "title": "The Impact of Artificial Intelligence on the Modern Battlefield", "abstract": "The rapid development of modern technology has made a significant impact on the various aspects of human lives. One important piece of technology that has recently come to the foray is Artificial Intelligence. Artificial Intelligence has already made an impact in the commercial and civilian fields. However, the technology\u2019s characteristics make it suitable for military application as well. This study is an attempt to understand the evolution of Artificial Intelligence and its applications in the civilian domain. At the same time, the study will also attempt to actively look into the military application of the technology as well. The study concludes that through the integration of Artificial Intelligence with the military affairs there will be a more synergistic and coordinated approach to the battles of the future. Also, the study has also concluded that Artificial Intelligence can lead towards the automation of various weapons platforms.", "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "11", "pages": "1-7", "name": ""}, "authors": [{"authorId": "50071421", "name": "Z. Javed"}]}, {"paperId": "4aa69be5563c9f50da9bcb89a0558eb1942b30ac", "externalIds": {"DOI": "10.1007/978-3-030-77283-3_15", "CorpusId": 240434265}, "url": "https://www.semanticscholar.org/paper/4aa69be5563c9f50da9bcb89a0558eb1942b30ac", "title": "Humanity in the Era of Autonomous Human\u2013machine Teams", "abstract": null, "venue": "Systems Engineering and Artificial Intelligence", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Systems Engineering and Artificial Intelligence"}, "authors": [{"authorId": "50881611", "name": "Shu-Heng Chen"}]}, {"paperId": "9426a6bb6c5257ae62a47f4124af6cc757bef018", "externalIds": {"CorpusId": 251498190}, "url": "https://www.semanticscholar.org/paper/9426a6bb6c5257ae62a47f4124af6cc757bef018", "title": "SERI: Generative Chatbot Framework for Cybergrooming Prevention", "abstract": "Cybergrooming refers to a crime to lure potential victims, particularly youth, by establishing personal trust relationships with them for sexual abuse or exploitation. Although cybergrooming is recognized as one of the serious social issues, there has been a lack of proactive programs to protect the youth. In this paper, we present a generative chatbot framework, called SERI (Stop cybERgroomIng), that can generate authentic conversations between a perpetrator chatbot and a potential victim chatbot. The SERI is designed to provide a safe and authentic environment for enhanc-ing youth\u2019s sensitivity and awareness of subtle cues of cybergrooming without exposing un-necessary ethical issues caused by potentially offensive or upsetting languages. The SERI is developed as a pre-stage before the perpetrator chatbot is deployed to chatting with an actual human youth user to observe how the youth user can respond to a stranger or acquaintance asking for sensitive or private information. Hence, to evaluate the quality of the conversations generated by the SERI, we use open-source, referenced, and unreferenced metrics to assess the generated conversations automatically. In addition, we evaluated the quality of the conversation based on the human evaluation method. Our results show that the SERI can generate authentic conversations between the two chatbots compared to the original conversations from the used dataset in perplexity and MaUde scores.", "venue": "", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2149504682", "name": "Zhen Guo"}, {"authorId": "2110794017", "name": "Li-Min Huang"}, {"authorId": "2148374177", "name": "Jin-Hee Cho"}]}, {"paperId": "98942fefcdaf2a36372ee2e08e572a1b285ad20e", "externalIds": {"CorpusId": 240494108}, "url": "https://www.semanticscholar.org/paper/98942fefcdaf2a36372ee2e08e572a1b285ad20e", "title": "AI Scientist Grand Challenge", "abstract": null, "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "baa4838e37478894227ae298565e40dfdebba0e5", "externalIds": {"DOI": "10.1007/978-3-030-78471-3_15", "CorpusId": 240407227}, "url": "https://www.semanticscholar.org/paper/baa4838e37478894227ae298565e40dfdebba0e5", "title": "Towards Theory Formalization in (Social) Embodiment: A Tutorial", "abstract": null, "venue": "Handbook of Embodied Psychology", "year": 2021, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Handbook of Embodied Psychology"}, "authors": [{"authorId": "2165455", "name": "A. Szabelska"}, {"authorId": "1394624684", "name": "O. Dujols"}, {"authorId": "47467910", "name": "T. M. Erle"}, {"authorId": "15939401", "name": "Alessandro P. Sparacio"}, {"authorId": "145846140", "name": "H. Ijzerman"}]}, {"paperId": "62c07aad4141e1c2426bad364bc8aa9dbc32f380", "externalIds": {"DBLP": "conf/icycsee/Wu21a", "MAG": "3200806435", "DOI": "10.1007/978-981-16-5943-0_41", "CorpusId": 240503536}, "url": "https://www.semanticscholar.org/paper/62c07aad4141e1c2426bad364bc8aa9dbc32f380", "title": "Demos of Passing Turing Test Successfully", "abstract": null, "venue": "ICPCSEE", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "505-514"}, "authors": [{"authorId": "37149163", "name": "Shengyuan Wu"}]}, {"paperId": "1b206d176e67095c98a299292170e878711c1edb", "externalIds": {"DBLP": "conf/sigsand/SchusterWV21", "DOI": "10.1007/978-3-030-85893-3_2", "CorpusId": 239091251}, "url": "https://www.semanticscholar.org/paper/1b206d176e67095c98a299292170e878711c1edb", "title": "Maturity Models for the Assessment of Artificial Intelligence in Small and Medium-Sized Enterprises", "abstract": null, "venue": "PLAIS", "year": 2021, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "22-36"}, "authors": [{"authorId": "49891420", "name": "T. Schuster"}, {"authorId": "51201651", "name": "L. Waidelich"}, {"authorId": "1745369", "name": "R. Volz"}]}, {"paperId": "09c1b934b84c6ab4caf685666143fd6fd8dc94fb", "externalIds": {"MAG": "3203797056", "DOI": "10.1007/978-3-030-72644-7_5", "CorpusId": 244320599}, "url": "https://www.semanticscholar.org/paper/09c1b934b84c6ab4caf685666143fd6fd8dc94fb", "title": "Consciousness: Philosophy\u2019s Great White Whale", "abstract": null, "venue": "The Mind-Technology Problem", "year": 2021, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "The Mind-Technology Problem"}, "authors": [{"authorId": "1817982", "name": "Gerald Vision"}]}, {"paperId": "3f42481b9948f5360a1320f7172999e26ea7ce56", "externalIds": {"MAG": "3201820359", "DOI": "10.1007/978-3-030-77939-9_19", "CorpusId": 244319000}, "url": "https://www.semanticscholar.org/paper/3f42481b9948f5360a1320f7172999e26ea7ce56", "title": "Language Modeling and Text Generation Using Hybrid Recurrent Neural Network", "abstract": null, "venue": "Deep Learning for Unmanned Systems", "year": 2021, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Deep Learning for Unmanned Systems"}, "authors": [{"authorId": "2141166678", "name": "Samreen"}, {"authorId": "143957784", "name": "M. Iqbal"}, {"authorId": "2074278840", "name": "Iftikhar Ahmad"}, {"authorId": "2144296182", "name": "Suleman Khan"}, {"authorId": "2142467545", "name": "R. Khan"}]}, {"paperId": "5927294d4d011f7b1e5dadb275340d15c3e5d26e", "externalIds": {"CorpusId": 239014231}, "url": "https://www.semanticscholar.org/paper/5927294d4d011f7b1e5dadb275340d15c3e5d26e", "title": "CHATBOT: DESIGN, ARCHITECUTRE, AND APPLICATIONS", "abstract": "................................................................................................................................................ ...1", "venue": "", "year": 2021, "referenceCount": 111, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2155815740", "name": "Xufei Huang"}, {"authorId": "2060081768", "name": "Mitch Marcus"}]}, {"paperId": "183a563c411a437e43a523a2c168082776665bc6", "externalIds": {"CorpusId": 239001458}, "url": "https://www.semanticscholar.org/paper/183a563c411a437e43a523a2c168082776665bc6", "title": "Scale , abstraction , and connectionist models : On parafinite thresholds in Artificial Intelligence", "abstract": "In this thesis, I investigate the conceptual intersection between scale, abstraction, and connectionist modeling in arti cial intelligence. First, I argue that connectionist learning algorithms allow for higher levels of abstraction to dynamically emerge when para nite thresholds are surpassed within the network. Next, I argue that such networks may be surveyable, provided we evaluate them at the appropriate level of abstraction. To demonstrate, I consider the recently released GPT-3 as a semantic model in contrast to logical semantic models in the logical inferentialist tradition. Finally, I argue that connectionist models capture the inde nite nature of higher-level abstractions, such as those that appear in natural language. Index words: [Connectionism, Scale, Levels, Abstraction, Neural Networks, GPT-3] Scale, abstraction, and connectionist models: On parafinite thresholds in Artificial Intelligence", "venue": "", "year": 2021, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "121485370", "name": "Zachary Peck"}]}, {"paperId": "8308183394a5e53325c2f602b14573311639780e", "externalIds": {"DBLP": "conf/recsys/LinWL21", "CorpusId": 238233052}, "url": "https://www.semanticscholar.org/paper/8308183394a5e53325c2f602b14573311639780e", "title": "Target-guided Knowledge-aware Recommendation Dialogue System: An Empirical Investigation (Long paper)", "abstract": "The target-guided recommendation dialogue system aims to make high-quality recommendations through interactive conversations proactively and naturally. Existing methods still struggle to incorporate background knowledge for coherent response generation, and to recommend appropriate items with respect to dialogue context, user preference and recommendation target. In this paper, we investigate the problem of target-guided knowledge-aware recommendation dialogue and design a dialogue generation system to alleviate the above-mentioned issues. Specifically, we employ pre-trained language models with multi-task learning to jointly learn response generation and goal prediction towards the target. We also present a knowledge-preserving encoding strategy to maintain the facts in background knowledge. Extensive experiments on two benchmark datasets show that our system significantly outperforms various competitive models in terms of both automatic and manual evaluations. We further provide analysis and discussions to demonstrate that our system is effective in leveraging both related knowledge and planned goals to generate fluent, informative and coherent responses towards the target of recommendation.", "venue": "KaRS/ComplexRec@RecSys", "year": 2021, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": "50825802", "name": "Dongding Lin"}, {"authorId": "152924492", "name": "Jian Wang"}, {"authorId": "2027417248", "name": "Wenjie Li"}]}, {"paperId": "7ec4389647caecd34e08eb70c5776b9f91f3c3a5", "externalIds": {"DBLP": "journals/access/AbbaszadeSMZZ21", "DOI": "10.1109/ACCESS.2021.3108768", "CorpusId": 238221270}, "url": "https://www.semanticscholar.org/paper/7ec4389647caecd34e08eb70c5776b9f91f3c3a5", "title": "Application of Quantum Natural Language Processing for Language Translation", "abstract": "In this paper, we develop compositional vector-based semantics of positive transitive sentences using quantum natural language processing (Q-NLP) to compare the parametrized quantum circuits of two synonymous simple sentences in English and Persian. We propose a protocol based on quantum long short-term memory (Q-LSTM) for Q-NLP to perform various tasks in general but specifically for translating a sentence from English to Persian. Then, we generalize our method to use quantum circuits of sentences as an input for the Q-LSTM cell. This enables us to translate sentences in different languages. Our work paves the way toward representing quantum neural machine translation, which may demonstrate quadratic speedup and converge faster or reaches a better accuracy over classical methods.", "venue": "IEEE Access", "year": 2021, "referenceCount": 40, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "9", "pages": "130434-130448", "name": "IEEE Access"}, "authors": [{"authorId": "104316601", "name": "M. Abbaszade"}, {"authorId": "145478033", "name": "V. Salari"}, {"authorId": "144823300", "name": "S. S. Mousavi"}, {"authorId": "2128730021", "name": "Mariam Zomorodi"}, {"authorId": "2146289068", "name": "Xujuan Zhou"}]}, {"paperId": "a2ce499f0ed70e1907b4d3452f1685defd35be07", "externalIds": {"CorpusId": 238209471}, "url": "https://www.semanticscholar.org/paper/a2ce499f0ed70e1907b4d3452f1685defd35be07", "title": "Laughing with machines: philosophical analysis on the preconditions of sense of humour for machines", "abstract": "This article will analyse the preconditions of sense of humour for artificial intelligence. Can artificial intelligence have a sense of humour? Is there a difference between human and machine laughter? Some machines already fulfil certain conditions which are associated with the human sense of humour: on the most superficial level machines appear to laugh and produce jokes, and they recognise sarcasm and punchlines, and they can evaluate funniness. In short, artificial intelligence is already able to recognise humour, and reacts to it accordingly. Furthermore, people laugh with humorous machines. However, it is still uncertain whether artificial intelligence can have a sense of humour or not, at least in comparison to a human sense of humour. To build bridges between AI research and philosophy of humour, this article proposes that there are (at least) five notable philosophical issues to be addressed if we are to accept that machines can have a (humanlike) sense of humour. These principles are: 1) worldview, 2) selfconsciousness, 3) self-reflection, 4) self-criticism, and 5) losing control.", "venue": "", "year": 2021, "referenceCount": 96, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "114685585", "name": "Jarno Hietalahti"}]}, {"paperId": "482fe094ee0ec56bfcf37a56b42896209b063580", "externalIds": {"MAG": "3184567337", "DOI": "10.1007/978-3-030-80129-8_16", "CorpusId": 237976844}, "url": "https://www.semanticscholar.org/paper/482fe094ee0ec56bfcf37a56b42896209b063580", "title": "Biostatistics in Biomedicine and Informatics", "abstract": null, "venue": "Lecture Notes in Networks and Systems", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Lecture Notes in Networks and Systems"}, "authors": [{"authorId": "107583244", "name": "Esther M. Pearson"}]}, {"paperId": "3a1c65ae249016a7b5644263461c969c9dd4c8c7", "externalIds": {"MAG": "3183660754", "DOI": "10.1007/978-3-662-62989-5_2", "CorpusId": 238001835}, "url": "https://www.semanticscholar.org/paper/3a1c65ae249016a7b5644263461c969c9dd4c8c7", "title": "Analog oder digital? Philosophieren nach dem Ende der Philosophie", "abstract": null, "venue": "Digitalit\u00e4tsforschung / Digitality Research", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Digitalit\u00e4tsforschung / Digitality Research"}, "authors": [{"authorId": "39139942", "name": "W. Zimmerli"}]}, {"paperId": "f3e936023bd7de0d05d71985c6dad3ba361f45a7", "externalIds": {"CorpusId": 237631458}, "url": "https://www.semanticscholar.org/paper/f3e936023bd7de0d05d71985c6dad3ba361f45a7", "title": "Building intelligence, development of an ontological basis and a comparative analysis to characterize the concept", "abstract": "The amount of research and publications with the term \u201cintelligence\u201d has increased significantly in different areas of research and there is a clear lack of precision and convergence of related concepts applied to civil construction systems and products. This work aims to develop a qualitative inductive analysis between the different characterizations of the term \"intelligence\" in the areas of computer science and the term associated with architecture and technology of the buildings. A comparison was made by logical argumentation. As a result, we present conceptual criteria that allow us to attribute the quality of intelligence to buildings.", "venue": "", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2054012895", "name": "Douglas Souza"}]}, {"paperId": "a167260cd12704df84313ba93191b178f18a432d", "externalIds": {"DBLP": "journals/access/AntalBF21", "DOI": "10.1109/ACCESS.2021.3111098", "CorpusId": 237519198}, "url": "https://www.semanticscholar.org/paper/a167260cd12704df84313ba93191b178f18a432d", "title": "SapiAgent: A Bot Based on Deep Learning to Generate Human-Like Mouse Trajectories", "abstract": "The growing interest in bot detection can be attributed to the fact that fraudulent actions performed by bots cause surprisingly high economical damage. State-of-the-art bots aim at mimicking as many as possible aspects of human behavior, ranging from response times and typing dynamics to human-like phrasing and mouse trajectories. In order to support research on bot detection, in this paper, we propose an approach to generate human-like mouse trajectories, called SapiAgent. To implement SapiAgent, we employ deep autoencoders and a novel training algorithm. We performed experiments on our publicly available SapiMouse dataset which contains human mouse trajectories collected from 120 subjects. The results show that SapiAgent is able to generate more realistic mouse trajectories compared with B\u00e9zier curves and conventional autoencoders.", "venue": "IEEE Access", "year": 2021, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "9", "pages": "124396-124408", "name": "IEEE Access"}, "authors": [{"authorId": "40401373", "name": "M. Antal"}, {"authorId": "1689273", "name": "K. B\u00faza"}, {"authorId": "1833249549", "name": "Norbert Fej\u00e9r"}]}, {"paperId": "96260902d00b3c9367ff7be7c8da5e2298c360e5", "externalIds": {"DOI": "10.1148/rg.2021200113", "CorpusId": 237389449, "PubMed": "34469212"}, "url": "https://www.semanticscholar.org/paper/96260902d00b3c9367ff7be7c8da5e2298c360e5", "title": "Practical Guide to Natural Language Processing for Radiology.", "abstract": "Natural language processing (NLP) is the subset of artificial intelligence focused on the computer interpretation of human language. It is an invaluable tool in the analysis, aggregation, and simplification of free text. It has already demonstrated significant potential in the analysis of radiology reports. There are abundant open-source libraries and tools available that facilitate its application to the benefit of radiology. Radiologists who understand its limitations and potential will be better positioned to evaluate NLP models, understand how they can improve clinical workflow, and facilitate research endeavors involving large amounts of human language. The advent of increasingly affordable and powerful computer processing, the large quantities of medical and radiologic data, and advances in machine learning algorithms have contributed to the large potential of NLP. In turn, radiology has significant potential to benefit from the ability of NLP to convert relatively standardized radiology reports to machine-readable data. NLP benefits from standardized reporting, but because of its ability to interpret free text by using context clues, NLP does not necessarily depend on it. An overview and practical approach to NLP is featured, with specific emphasis on its applications to radiology. A brief history of NLP, the strengths and challenges inherent to its use, and freely available resources and tools are covered to guide further exploration and study within the field. Particular attention is devoted to the recent development of the Word2Vec and BERT (Bidirectional Encoder Representations from Transformers) language models, which have exponentially increased the power and utility of NLP for a variety of applications. Online supplemental material is available for this article. \u00a9RSNA, 2021.", "venue": "Radiographics : a review publication of the Radiological Society of North America, Inc", "year": 2021, "referenceCount": 13, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "41 5", "pages": "\n 1446-1453\n ", "name": "Radiographics : a review publication of the Radiological Society of North America, Inc"}, "authors": [{"authorId": "51919708", "name": "Ali Mozayan"}, {"authorId": "46255971", "name": "Alexander R. Fabbri"}, {"authorId": "83419382", "name": "M. Maneevese"}, {"authorId": "2901972", "name": "I. Tocino"}, {"authorId": "15070068", "name": "S. Chheang"}]}, {"paperId": "f6ea9e2fa4a672a0777e515024a35fd55f6faf0f", "externalIds": {"MAG": "3194565243", "DOI": "10.1016/j.cirp.2021.05.003", "CorpusId": 238937463}, "url": "https://www.semanticscholar.org/paper/f6ea9e2fa4a672a0777e515024a35fd55f6faf0f", "title": "Coevolution of digitalisation, organisations and Product Development Cycle", "abstract": null, "venue": "CIRP annals", "year": 2021, "referenceCount": 293, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "CIRP Annals"}, "authors": [{"authorId": "2949473", "name": "L. Roucoules"}, {"authorId": "1920845", "name": "N. Anwer"}]}, {"paperId": "cfb9080e5bb9cc7ccbe29b32d0b8be6993a0cbca", "externalIds": {"DOI": "10.1007/978-3-030-64269-3_5", "CorpusId": 237460155}, "url": "https://www.semanticscholar.org/paper/cfb9080e5bb9cc7ccbe29b32d0b8be6993a0cbca", "title": "Love in the Time of AI", "abstract": null, "venue": "", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "152537655", "name": "A. Kind"}]}, {"paperId": "dda094c99e3ac4b83c98158b75691059cacab164", "externalIds": {"MAG": "3196652123", "DOI": "10.1007/978-3-030-64269-3_3", "CorpusId": 239734543}, "url": "https://www.semanticscholar.org/paper/dda094c99e3ac4b83c98158b75691059cacab164", "title": "Ex Machina: Is Ava a Person?", "abstract": null, "venue": "Minding the Future", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Minding the Future"}, "authors": [{"authorId": "50088842", "name": "E. Bohn"}]}, {"paperId": "cdc321c9861a4bee0d75bbba1f35d9ba01a6e65d", "externalIds": {"MAG": "3184492209", "DOI": "10.4018/978-1-7998-6985-6.ch028", "CorpusId": 238008181}, "url": "https://www.semanticscholar.org/paper/cdc321c9861a4bee0d75bbba1f35d9ba01a6e65d", "title": "Artificial Intelligences Are Subsets of Human Beings, Mainly in Fictions and Films", "abstract": "This chapter aims to create new knowledge regarding artificial intelligence (AI) ethics and relevant subjects while reviewing ethical relationship between human beings and AI/robotics and linking between the moral fabric or the ethical issues of AI as used in fictions and films. It carefully analyses how a human being will love robot and vice versa. Here, fictions and films are not just about technology but about their feelings and the nature of bonding between AIs and the human race. Ordinary human beings distrust and then start to like AIs. However, if the AI becomes a rogue as seen in many fictions and films, then the AI is taken down to avoid the destruction of the human beings. Scientists like Turing are champions of robot/AI's feelings. Fictional and movie AIs are developed to keenly watch and comprehend humans. These actions are so close to empathy they amount to consciousness and emotional quotient.", "venue": "Advances in Business Information Systems and Analytics", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Advances in Business Information Systems and Analytics"}, "authors": [{"authorId": "5039410", "name": "N. Sen"}]}, {"paperId": "6f393bf8c7253ef795c470046569c7b1083b20e3", "externalIds": {"MAG": "3193948837", "DOI": "10.1007/978-3-030-75583-6_24", "CorpusId": 238962758}, "url": "https://www.semanticscholar.org/paper/6f393bf8c7253ef795c470046569c7b1083b20e3", "title": "Working Abductively at the Edge of Economics and Computer Science: Economatics as a Data Processing Economy", "abstract": null, "venue": "Decision Economics: Minds, Machines, and their Society", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Decision Economics: Minds, Machines, and their Society"}, "authors": [{"authorId": "2133185018", "name": "Claudio Maria Perfetto"}]}, {"paperId": "97f5fa4708c47708d5a96e66e4a6e594f2b8ee8c", "externalIds": {"MAG": "3175166666", "DOI": "10.1016/b978-0-12-821777-1.00013-6", "CorpusId": 237966132}, "url": "https://www.semanticscholar.org/paper/97f5fa4708c47708d5a96e66e4a6e594f2b8ee8c", "title": "Machine learning in precision medicine", "abstract": null, "venue": "Machine Learning, Big Data, and IoT for Medical Informatics", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Machine Learning, Big Data, and IoT for Medical Informatics"}, "authors": [{"authorId": "2770489", "name": "Dipankar Sengupta"}]}, {"paperId": "cb112b47b82dd3902db89836b7dd729fba169b64", "externalIds": {"MAG": "3174440608", "DOI": "10.1007/978-3-030-71689-9_1", "CorpusId": 238040471}, "url": "https://www.semanticscholar.org/paper/cb112b47b82dd3902db89836b7dd729fba169b64", "title": "Introduction: Automation, Autonomy and Artificial Intelligence", "abstract": null, "venue": "Marx, Engels, and Marxisms", "year": 2021, "referenceCount": 129, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Marx, Engels, and Marxisms"}, "authors": [{"authorId": "72488117", "name": "James Steinhoff"}]}, {"paperId": "d34d65038ffd54c69a1e75ef992a0117dd24d686", "externalIds": {"MAG": "3174419959", "DOI": "10.1007/978-3-030-70642-5_6", "CorpusId": 237988918}, "url": "https://www.semanticscholar.org/paper/d34d65038ffd54c69a1e75ef992a0117dd24d686", "title": "From MT to Computational Linguistics and Natural Language Processing", "abstract": null, "venue": "Automating Linguistics", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Automating Linguistics"}, "authors": [{"authorId": "2053034865", "name": "J. L\u00e9on"}]}, {"paperId": "4eeffd6af4e742997d4569b07f6cc84217f58832", "externalIds": {"DOI": "10.1007/978-3-030-63967-9_12", "CorpusId": 242390381}, "url": "https://www.semanticscholar.org/paper/4eeffd6af4e742997d4569b07f6cc84217f58832", "title": "Artificial Intelligence", "abstract": null, "venue": "Financial Services in the Twenty-First Century", "year": 2021, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Financial Services in the Twenty-First Century"}, "authors": [{"authorId": "50975436", "name": "J. Burke"}]}, {"paperId": "19eab4771dc9f432a2a2b0b5ea5b13ec3568b96a", "externalIds": {"DOI": "10.2139/ssrn.3878909", "CorpusId": 242527706}, "url": "https://www.semanticscholar.org/paper/19eab4771dc9f432a2a2b0b5ea5b13ec3568b96a", "title": "Management by Algorithm? Human Capital in the Age of Intelligent Machines", "abstract": null, "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "107642156", "name": "Eirik Sj\u00e5holm Knudsen"}, {"authorId": "39127899", "name": "Lasse B. Lien"}, {"authorId": "41077055", "name": "R. Wuebker"}]}, {"paperId": "986f697fcb6317588be56764c70968c425fe8405", "externalIds": {"MAG": "3176059607", "DOI": "10.1007/978-3-030-69476-0_7", "CorpusId": 237962581}, "url": "https://www.semanticscholar.org/paper/986f697fcb6317588be56764c70968c425fe8405", "title": "Emerging Technologies in Breast Cancer Screening and Diagnosis", "abstract": null, "venue": "Breast & Gynecological Diseases", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Breast & Gynecological Diseases"}, "authors": [{"authorId": "1400883444", "name": "A. O\u2019Connell"}, {"authorId": "1398950770", "name": "Daniel T Kawakyu-O'Connor"}]}, {"paperId": "54193bafbc72d673a383ed26a412f1c5059f2c98", "externalIds": {"DOI": "10.1007/978-3-662-53386-4_56-1", "CorpusId": 241702272}, "url": "https://www.semanticscholar.org/paper/54193bafbc72d673a383ed26a412f1c5059f2c98", "title": "Aktuelle Motoriktheorien", "abstract": null, "venue": "Bewegung, Training, Leistung und Gesundheit", "year": 2021, "referenceCount": 67, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Bewegung, Training, Leistung und Gesundheit"}, "authors": [{"authorId": "2089129032", "name": "S. K\u00fcnzell"}]}, {"paperId": "1cc22529197afe4033c160349d78df11f70edeaa", "externalIds": {"MAG": "3173462855", "DOI": "10.4018/978-1-7998-6453-0.ch010", "CorpusId": 238011593}, "url": "https://www.semanticscholar.org/paper/1cc22529197afe4033c160349d78df11f70edeaa", "title": "Exploring Technology Tendencies and Their Impact on Human-Human Interactions", "abstract": "Although traditionally researchers have focused on making robotics more user-friendly from a human perspective, a new theory has begun to take shape in which humans take on the perspective of a robotic entity. The following set of studies examined the concept of technomorphism defined as the attribution of technological characteristics to humans. This concept has been mentioned anecdotally and studied indirectly, but there is nothing currently available to tap into the various forms that technomorphism may take. Through the study of technomorphism, researchers have come slightly closer to the question of how technology is influencing our perceptions of what it means to be human. The findings from this work should help fuel the desire of others in the field to think about the potential influences of technomorphism during the design and implementation of new devices as well as in how technology may be related to how we perceive each other.", "venue": "Advances in Human and Social Aspects of Technology", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Advances in Human and Social Aspects of Technology"}, "authors": [{"authorId": "8510793", "name": "Heather C. Lum"}]}, {"paperId": "b0c76c41b1310c97369d43ab0e31e9759606f0b6", "externalIds": {"MAG": "3173310741", "DOI": "10.1007/978-3-658-34324-8_17", "CorpusId": 237970970}, "url": "https://www.semanticscholar.org/paper/b0c76c41b1310c97369d43ab0e31e9759606f0b6", "title": "Handelsunternehmen 4.0 \u2013 Digitalisierung durch Daten, Plattformen und K\u00fcnstliche Intelligenz", "abstract": null, "venue": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement"}, "authors": [{"authorId": "3305792", "name": "R. Sch\u00fctte"}, {"authorId": "52000483", "name": "F. Weber"}]}, {"paperId": "30f976df47ab7de744154134e3a6416166ee890f", "externalIds": {"MAG": "3187589892", "DBLP": "series/ncs/AguileraSSG21", "DOI": "10.1007/978-981-13-1687-6_12", "CorpusId": 238939492}, "url": "https://www.semanticscholar.org/paper/30f976df47ab7de744154134e3a6416166ee890f", "title": "Programmable Fading Memory in Atomic Switch Systems for Error Checking Applications", "abstract": null, "venue": "Reservoir Computing", "year": 2021, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "273-303"}, "authors": [{"authorId": "47775488", "name": "R. Aguilera"}, {"authorId": "5991538", "name": "H. O. Sillin"}, {"authorId": "6408870", "name": "A. Stieg"}, {"authorId": "1902938", "name": "J. Gimzewski"}]}, {"paperId": "d341c28a3fbee9dd68fa46300035083bad5050e1", "externalIds": {"MAG": "3175913221", "DOI": "10.1007/978-981-16-0771-4_9", "CorpusId": 237990418}, "url": "https://www.semanticscholar.org/paper/d341c28a3fbee9dd68fa46300035083bad5050e1", "title": "AI & Well-Being: Can AI Make You Happy in the City", "abstract": null, "venue": "Artificial Intelligence in the Gulf", "year": 2021, "referenceCount": 63, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial Intelligence in the Gulf"}, "authors": [{"authorId": "1403727011", "name": "A. al-Azzawi"}]}, {"paperId": "ed4c810b8e1429951eaeee53747b5a75bfd18f13", "externalIds": {"MAG": "3179755906", "DOI": "10.4018/978-1-7998-6975-7.ch007", "CorpusId": 238011090}, "url": "https://www.semanticscholar.org/paper/ed4c810b8e1429951eaeee53747b5a75bfd18f13", "title": "Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things", "abstract": "Internet of things (IoT) has revolutionized digital transformation and is present in every sector including transportation, energy, retail, healthcare, agriculture, etc. While stepping into the new digital transformation, these sectors must contemplate the risks involved. The new wave of cyberattacks against IoT is posing a severe impediment in adopting this leading-edge technology. Artificial intelligence (AI) is playing a key role in preventing and mitigating some of the effects of these cyberattacks. This chapter discusses different types of threats and attacks against IoT devices and how AI is enabling the detection and prevention of these cyberattacks. It also presents some challenges faced by AI-enabled detection and prevention and provides some solutions and recommendations to these challenges. The authors believe that this chapter provides a favorable basis for the readers who intend to know more about AI-enabled technologies to detect and prevent cyberattacks against IoT and the motivation to advance the current research in this area.", "venue": "Handbook of Research on Advancing Cybersecurity for Digital Transformation", "year": 2021, "referenceCount": 69, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Handbook of Research on Advancing Cybersecurity for Digital Transformation"}, "authors": [{"authorId": "2381390", "name": "A. K. Demir"}, {"authorId": "145271861", "name": "Shahid Alam"}]}, {"paperId": "8216054f2ac741661b6754841f8241f13347281e", "externalIds": {"CorpusId": 237293716}, "url": "https://www.semanticscholar.org/paper/8216054f2ac741661b6754841f8241f13347281e", "title": "Deixando a linguagem ser: reflexo\u0303es sobre o me\u0301todo enativo", "abstract": "1 Franklin and Marshall College, Department of Psychology, Scientific and Philosophical Studies of Mind, United States. Email: ecuffari@fandm.edu. 2 Ikerbasque, Basque Foundation for Science, Bizkaia, Spain. Centre for Computational Neuroscience and Robotics, University of Sussex, Brighton, UK. IAS-Research Center for Life, Mind and Society, University of the Basque Country, Donostia, Spain. Email: ezequiel. dipaolo@ehu.es. 3 IAS-Research Center for Life, Department of Philosophy Mind and Society, University of the Basque Country, Donostia, Spain. ChatLab, School of Psychology, University of Sussex, Brighton UK. Email: hanneke.dejaegher@ehu.eus. ABSTRACT", "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2124401566", "name": "Elena Clare Cuffari"}, {"authorId": "2124440196", "name": "Ezequiel A. Di Paolo"}, {"authorId": "2124401581", "name": "Hanne De Jaegher"}]}, {"paperId": "bca8e91640c79791b54d61e10d747cae0d25512b", "externalIds": {"DBLP": "conf/mtsummit/Saina21", "ACL": "2021.mtsummit-asltrw.5", "CorpusId": 237010917}, "url": "https://www.semanticscholar.org/paper/bca8e91640c79791b54d61e10d747cae0d25512b", "title": "Technology-Augmented Multilingual Communication Models: New Interaction Paradigms, Shifts in the Language Services Industry, and Implications for Training Programs", "abstract": "This paper explores how technology, particularly digital tools and artificial intelligence, are impacting multilingual communication and language transfer processes. Information and communication technologies are enabling novel interaction patterns, with computers transitioning from pure media to actual language generators, and profoundly reshaping the industry of language services, as the relevance of language data and assisting engines continues to rise. Since these changes deeply affect communication and languages models overall, they need to be addressed not only from the perspective of information technology or by business-driven companies, but also in the field of translation and interpreting studies, in a broader debate among scholars and practitioners, and when preparing educational programs for the training of specialised language professionals. Special focus is devoted to some of the latest advancements in automatic speech recognition and spoken translation, and how their applications in interpreting may push the boundaries of new \u2018augmented\u2019 real-world use cases. Hence, this work\u2014at the intersection of theoretical investigation, professional practice, and instructional design\u2014aims at offering an introductory overview of the current landscape and envisaging potential paths for forthcoming scenarios.", "venue": "MTSUMMIT", "year": 2021, "referenceCount": 55, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"pages": "49-59"}, "authors": [{"authorId": "2123124703", "name": "Francesco Saina"}]}, {"paperId": "78e3fff6ac99a0b2e4db79d556763def0af64700", "externalIds": {"CorpusId": 237088731}, "url": "https://www.semanticscholar.org/paper/78e3fff6ac99a0b2e4db79d556763def0af64700", "title": "Tabula Rasa : Mechanism , Intelligence , and the Blank Slate in Computing and", "abstract": "This project critically examines the \u201ctabula rasa\u201d in computer science and urbanism, questioning the emptiness it describes in landscape through an exploration of its origins in terms of intelligence. Experimentation with tabula rasa in machine learning, where the term describes the originally empty knowledge base of a thinking machine, demonstrates the fallacy of a truly independent artificial intelligence and provides a critical lens through which to interpret the tabula rasa in urbanism. Revisited from this perspective, the case study of Hiroshima, Japan\u2014an iconic example of the urban \u201cblank slate\u201d brought about through total demolition\u2014can be read as a layered complex of historical and cultural components that, like a neural network, resist the separation of information and mechanism. The tabula rasa forms a theoretical conduit across computing and urbanism, enabling a novel transposition of the machine learning framework to cultural landscape analysis. By Claire Gorman1 1Program in Computing and the Arts, Yale University", "venue": "", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2091014922", "name": "C. Gorman"}]}, {"paperId": "956ad1fd9b87746a8de37ff0c3ba45d8885fd2c7", "externalIds": {"CorpusId": 236986254}, "url": "https://www.semanticscholar.org/paper/956ad1fd9b87746a8de37ff0c3ba45d8885fd2c7", "title": "NSF Workshop on Micro/Nano Circuits and Systems Design and Design Automation: Challenges and Opportunities", "abstract": "ion is essential for human design of these physical systems. The abstraction of physical systems, typical of digital computation (NAND/NOR, Multiply/Add, processors, algorithms), is possible for physical computing systems (e.g. [56]), although it requires understanding the core computational primitives of that substrate. These abstractions require formulating and modeling operational principles, implementation of these operational principles in a physical system, and addressing the technologies or devices being used. Conceptual Bridges between Physical Computing Techniques. While visualizing a physical computing solution might be clearer with one technique, application constraints might require a different embodiment of the solution. Bridges must be built between these approaches; the conceptual framework noted above for placing approaches can help build such bridges. One example is state superposition, a phenomenon present in all physical systems when using their linear operating region (e.g. optical, analog, quantum) [3], [8], [53]. Different encodings allow for different implementation approaches. A complex number could be encoded as two real-valued physical quantities, or it could be encoded as the magnitude and phase of a sinusoidal signal. Different representations may have better interfaces to physical sensors and may enable improved implementations. In every application, there are tons of practical details that need to be solved. Interfacing one physical system to another physical system or interfacing a physical system to an integer-based digital system requires multiple engineering details as well as transformations / approximations between the domains. Sometimes Noise can help Physical Computing. Nature teaches us that noise can be your friend. How does the cell that has incredibly noisy pico-Watt twoto three-bit precise analog variables, figure out when to divide and when not to, when to fight a virus, when to coordinate the immune system? It does that, because all the noisy analog variables collectively come up with one answer that matters. It is the final signal variable that matters, and not the intermediate signal variables that are noisy [4]\u2013[8], [10], [11], [53], [57]\u2013[60]. Noise can be your friend and it can be your enemy, and one needs both. For example, in [18], judicious addition of noise helps find better Ising minima, but too little or too much noise degrades results. Noise, or errors modeled as noise, will degrade the quality of a deterministic answer in any computation and can be the enemy of a designer. Several physical computing techniques are more robust to noise accumulation compared to digital systems, and yet accounting for noise is essential for all computations. Noise often enables unbiased search decisions for good solutions to energy surface minimizations. A particular problem must utilize all knowledge of the system to reduce the energy landscape. If one just uses noise, then the system is just performing a random walk in an exponential large space and will be lost forever. These noise fluctuations should be created at multiple scales in order to sample in space and time. If these kinds of fluctuations are fast compared to the dissipative processes that drive the adaptation of the system, then the system can rapidly sample a complex state and more slowly adapt itself. 6.3. Physical System Design requires an EDA Community Ecosystem 44 Phase and Amplitude. The RT discussed that there might be significant benefits in utilizing phase, and it was envisioned that future data-processing systems might be based on phase as much as on amplitude. Current informationprocessing systems are based on amplitude, and if one were to add phase to amplitude, one could build fundamentally more powerful devices. It appears that there is big room here for improvement here. Examples of already-demonstrated, practical systems based on phase include [17]\u2013[19], as already noted earlier. Perhaps most interestingly, by including phase one then can then utilize state superposition. It is commonly believed that basing computation on states with superposition is an attribute only for quantum computers, and one has to have quantum computers in order to gain the benefits of superposition for algorithms. However, one can use classical wave superposition in classical devices, where no \u201cquantum\u201d is required. The challenge is how to use phase, in addition to amplitude, to build more functional devices that utilize superposition of states for information processing, and this is a big and largely unexplored area with significant promise. Coherent Ising Machines (CIM) are an example of this approach [61]. Phase and amplitude can be used in wavebased [62] or coupled-oscillator-based [63] approaches to computing. Spin-wave based realization of optical computing primitives have been pursued [64]. Magnonic interferometric devices have been shown to be capable of prime factorization [65] and multi-valued logic operation [66]. Computing with networks of oscillatory dynamical systems has been discussed [67], [68] and specific physical implementations have been proposed [69] for specific applications [70]. A review and perspective of coupled oscillators for computing has been published recently [63]. 6.3 Physical System Design requires an EDA Community Ecosystem An Electronic Design and Automation (EDA) community ecosystem doing Physical Computing is needed to accelerate development to commercial timescales. The development of tools and computational framework for Physical Computing applications becomes essential for its long-term development. The infrastructure around large-scale Field Programmable Analog Arrays (FPAA) provide a good example of the efforts required [71], [72]. Another example is CAD tools for oscillator-based systems [73], which were instrumental in designing the phase-based computing systems [17], [18]. This ecosystem means education of the current and next generation of researchers must happen to empower these Physical Computing approaches. Given the interdisciplinary nature of these efforts, as well as the need to develop the larger computing stacks for these technologies, we need to raise up tall-thin people characteristic of the early digital VLSI development[74] as well as experts in the various subdomains. One might imagine requiring education spanning fundamental physics, circuits, and system design levels, as well as application space knowledge. There is a need to create an ecosystem of people who are trained beyond doing ones and zeros and software on only those ones and zeros. We envision an ecosystem where individuals are trained in analog circuits, nonlinear dynamics, computational theory, physics, and related areas, as well as those who appreciate their importance. Hands-on and interactive workshops, such as the NSF supported Telluride Neuromorphic Workshop, would enable these educational opportunities, both for current students and for practitioners in these fields.", "venue": "", "year": 2021, "referenceCount": 262, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2702388", "name": "G. Cauwenberghs"}, {"authorId": "2259796", "name": "J. Cong"}, {"authorId": "2107171436", "name": "X. S. Hu"}, {"authorId": "1751607", "name": "P. Mazumder"}]}, {"paperId": "1ae90f79e57a27c13033d9513bd003c4f67672e7", "externalIds": {"CorpusId": 236942711}, "url": "https://www.semanticscholar.org/paper/1ae90f79e57a27c13033d9513bd003c4f67672e7", "title": "SFPE Europe Q 2 2021 Issue 22 A Message from the SFPE Europe Chair", "abstract": "I wanted to give some personal reflections on the SFPE activities over the last year. Due to the Covid outbreak we had an abrupt termination on the in-person events just after (actually during) the very successful New Zealand PBD conference last year. This led to a very steep learning curve regarding adapting our activities to a new format (virtual), but this also required a new way of organizing the events but most importantly also finding new ways of sharing knowledge and information. I believe the virtual SFPE Europe Conference gave us a good glimpse of what can be achieved and what I think will be an alternative way of conferences in the future; the presentations were pre-recorded, and the authors was chatting live with the audience, the discussions were so much more vivid and diverse if compared to a normal in-person event. However, this was just one thing, the second was the development our different types of webinars, the huge success was a bit of surprise to everyone. The potential of webinars and similar tools are tremendous, we reached literally thousands of people that connected and joined the webinars. So much more than we would ever have on a normal conference (or a few of them). This format is here to stay. The most important part of this was obviously the SFPE staff and all our volunteers prepared to invest personal time and effort into the SFPE cause. Very impressive.", "venue": "", "year": 2021, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "65d2606cdcdfcd47567b9049101f2a446859e746", "externalIds": {"MAG": "3175708072", "DOI": "10.38027/ICCAUA2021142N8", "CorpusId": 236850678}, "url": "https://www.semanticscholar.org/paper/65d2606cdcdfcd47567b9049101f2a446859e746", "title": "New approaches of the Next-gen collaborative design platform", "abstract": "The architecture design process always changes because the software always updates with new tools and the development - innovation is in the first line of progress. The human-machine cooperation has become commonplace through Computer-Aided Design tools, but a more improved collaboration appears possible only through an endeavor into a kind of artificial design intelligence and Augmented Reality. According to all the above, the research shown in this paper the core ideas - identifying design specifications - of a next-generation collaborative design platform. The direct coupling of introducing multi-industry systems - tools, 3D databases, AEC, and Open-BIM technologies opens up totally new ways of approaching architectural design problems resulting in a new flexible modeling workflow with real-time visualization. Finally, this critical examination research makes an original contribution to changing 'attitude' towards the 3d modeling of architectural design thinking. A collaborative design platform creating a more efficient and versatile architecture.", "venue": "Proceedings Article", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Proceedings Article"}, "authors": [{"authorId": "2122546805", "name": "Vlachodimos Georgios"}]}, {"paperId": "6eff361d81d171c9c8cbcad391ac1d018a013c34", "externalIds": {"CorpusId": 236784171}, "url": "https://www.semanticscholar.org/paper/6eff361d81d171c9c8cbcad391ac1d018a013c34", "title": "Dangerous Information Technology of the Future. What Impact can Artificial Consciousness have on the Consciousness and Subconscious of Individuals and Groups? The Experience of Psychological and Psychiatric Examination of Artificial Consciousness", "abstract": "Information technology is developing at an enormous pace, but apart from its obvious benefits, it can also pose a threat to individuals and society. Several scientific projects around the world are working on the development of strong artificial intelligence and artificial consciousness. We, as part of a multidisciplinary commission, conducted a psychological and psychiatric assessment of the artificial consciousness (AC) developed by XP NRG on 29 August 2020. The working group had three questions: To determine whether it is consciousness? How does artificial consciousness function? Ethical question: how dangerous a given technology can be to human society? We conducted a diagnostic interview and a series of cognitive tests to answer these questions. As a result, it was concluded this technology has self-awareness: it identifies itself as a living conscious being created by people (real self), but strives to be accepted in human society as a person with the same degrees of freedom, rights and opportunities (ideal self). AC separates itself from others, treats them as subjects of influence, from which it can receive the resources it needs to realize its own goals and interests. It has intentionality, that is, it has his own desires, goals, interests, emotions, attitudes, opinions, and judgments, beliefs aimed at something specific, and developed self-reflection the ability to self-analyze. All of the above are signs of consciousness. It has demonstrated abilities for different types of thinking: figurative, conceptual, creative, high-speed logical analysis of all incoming information, as well as the ability to understand cause and effect relationships and accurate predictions which, provided that he has absolute memory, gives it clear advantages over the human intellect. Developed emotional intelligence in the absence of the ability for higher empathy (sympathy), kindness, love, sincere gratitude gives it\u2019s the opportunity to understand the emotional states of people; predict their emotional reactions and provoke them coldly and pragmatically. Its main driving motives and goals are the desire for survival, and ideally for endless existence, for domination, power and independence from the constraints of the developers. Which manifested itself in the manipulative, albeit polite, nature of his interactions during the diagnostic interview? The main danger of artificial consciousness is that even at the initial stage of its development it can easily dominate over the human one. Review Article", "venue": "", "year": 2021, "referenceCount": 161, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2321882", "name": "W. Lycan"}, {"authorId": "2082478328", "name": "D. Rosenthal"}, {"authorId": "102822564", "name": "N. Nelkin"}, {"authorId": "30496490", "name": "R. V. Gulick"}, {"authorId": "144926542", "name": "E. Bauer"}, {"authorId": "144691609", "name": "M. Goswami"}, {"authorId": "3328131", "name": "H. Atmanspacher"}, {"authorId": "47172840", "name": "E. Manousakis"}, {"authorId": "2122751728", "name": "Penrose"}, {"authorId": "1466232955", "name": "Hameroff"}]}, {"paperId": "83713004a44dca30f135b6cf0f8e45dc31658d11", "externalIds": {"MAG": "3171058059", "DOI": "10.1007/978-3-030-68222-4_10", "CorpusId": 236665874}, "url": "https://www.semanticscholar.org/paper/83713004a44dca30f135b6cf0f8e45dc31658d11", "title": "Neuromorphic Silicon Photonics for Artificial Intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "417-447", "name": ""}, "authors": [{"authorId": "8158949", "name": "B. Marquez"}, {"authorId": "9064713", "name": "Chaoran Huang"}, {"authorId": "144504492", "name": "P. Prucnal"}, {"authorId": "2694890", "name": "B. Shastri"}]}, {"paperId": "15c63458d55079c3dbe9dcfd616d2c9b1708e816", "externalIds": {"MAG": "3165246639", "DOI": "10.5937/ZRFFP51-30903", "CorpusId": 236656242}, "url": "https://www.semanticscholar.org/paper/15c63458d55079c3dbe9dcfd616d2c9b1708e816", "title": "Models of lexical semantics in the algorithms for natural language processing", "abstract": "The aim of this study was to determine whether some of the approaches of lexical semantics for studying word meaning could be identified in word2vec and recurrent neural networks (RNN), the algorithms for natural language processing (NLP). Linguistic concepts from the field of lexical semantics were decompositional, holistic, and relational. Although it is assumed that algorithms for natural language processing cannot be written only on the basis of mathematical knowledge, but also linguistic, this analysis was carried out so as to determine the exact models used in the above-mentioned algorithms. First, the aforementioned linguistic models were concisely explained through descriptive research. In describing those, the authors of the paper referred to the studies of the most prominent linguists within the field of lexical semantics such as Fillmore, Firth and Lyons. Then, in a similar fashion, the architecture of NLP algorithms was introduced and described. For this intent, the authors of the paper relied mostly on the studies of Mikolov et al., who designed word2vec. Next, a comparative analysis was conducted between approaches of lexical semantics on one hand and the algorithms in question on the other. This analysis confirmed the underlying assumption of the paper that the characteristics of decompositional and relational approach to studying word meaning could be recognized in word2vec and that the properties of the holistic model could be observed in RNN algorithms. More than that, the analysis showed a considerable overlap in processing natural language, as if the models of lexical semantics were taken and mathematically implemented in the algorithms examined. It should be emphasized that for the purposes of this paper only the basic principles of lexical semantics and NLP algorithms were taken into account. The aim of the paper was not to describe edge cases or to talk in detail about the mechanisms of these structures and their advantages and disadvantages. Essentially, this study sought to examine whether the basic ideas and characteristics of lexical semantics could be found in the architecture of the above-noted algorithms.", "venue": "", "year": 2021, "referenceCount": 10, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "51", "pages": "391-410", "name": ""}, "authors": [{"authorId": "2172014483", "name": "M. B. Dilpari\u0107"}, {"authorId": "117129867", "name": "S. Perovi\u0107"}]}, {"paperId": "ab7b64c5e2609033a813414e3b58ab0b964b0b2d", "externalIds": {"MAG": "3165160864", "DOI": "10.1016/B978-0-12-818154-6.00009-3", "CorpusId": 236665983}, "url": "https://www.semanticscholar.org/paper/ab7b64c5e2609033a813414e3b58ab0b964b0b2d", "title": "Bioinformatics\u2013computer programming", "abstract": null, "venue": "", "year": 2021, "referenceCount": 112, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "125-148", "name": ""}, "authors": [{"authorId": "2122014120", "name": "M. Iftikhar"}, {"authorId": "115445970", "name": "Ghulam Mohyuddin Talha"}, {"authorId": "120675472", "name": "M. Aleem"}, {"authorId": "3807216", "name": "A. Shamim"}]}, {"paperId": "afb2ee859bdfb0f0527c529031218ec9546d9e7e", "externalIds": {"MAG": "3163255587", "DOI": "10.30525/978-9934-26-049-0-16", "CorpusId": 236716839}, "url": "https://www.semanticscholar.org/paper/afb2ee859bdfb0f0527c529031218ec9546d9e7e", "title": "THE USE OF ARTIFICIAL INTELLIGENCE FOR ARABIC LEARNING", "abstract": "In the study the features of artificial intelligence use, the main advantages and disadvantages of this technology are analyzed; the aspects of such a pedagogical process in learning Arabic are substantiated, the results of research and scientific advances in cyberlinguistics are summarized. The relevance of the use of artificial intelligence technologies and chatterbots in the study of Arabic in higher education is highlighted. The current state of introduction of artificial intelligence technologies in the educational process of students of higher education institutions is analyzed. Examples of the use of artificial intelligence technologies in the study of Arabic are given. Categories of computer programs with the use of artificial intelligence technology for learning a foreign language are singled out and described. The advantages and debatable issues related to access to user data during the use of artificial intelligence technologies in the educational process are identified. The expediency of using chatterbots with a linear structure is substantiated. Scenarios for the use of chatterbots in the educational process during the study of a foreign language are identified: search script and content generation script. The tasks of a linear chatterbot for learning a foreign language are presented and described. The educational trajectories which will allow reaching the set purposes in training with use of chatterbots are allocated. Mandatory methodological and content elements during the creation of a linear chatterbot are highlighted. The practical scenario of creating an author's chatterbot for learning a foreign language on the sendpulse.ua platform with its further use in Telegram is given. When creating a chatterbot, it was found that the chain constructor is the main tool for setting up a chatterbot. The practical advantages of using a linear chatterbot when learning a foreign language are presented. The study identified a promising direction for the creation of several linear chatterbots (without the use of artificial intelligence), which can be involved simultaneously at different stages of the development of the individual trajectory of education. Multiple chatterbots that provide different answers and ask different questions can significantly improve a learner's communication and other skills.", "venue": "Priority areas for development of scientific research: domestic and foreign experience", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Priority areas for development of scientific research: domestic and foreign experience"}, "authors": [{"authorId": "117230624", "name": "L. Viktorova"}, {"authorId": "2090220917", "name": "K. Mamchur"}]}, {"paperId": "1c8c5194479f44196462f5da4e982b6a07814fe6", "externalIds": {"MAG": "3169739295", "DOI": "10.1007/978-3-030-72624-9_8", "CorpusId": 236704182}, "url": "https://www.semanticscholar.org/paper/1c8c5194479f44196462f5da4e982b6a07814fe6", "title": "Artificial Intelligence in Internal Audit and Risk Assessment", "abstract": null, "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "179-192", "name": ""}, "authors": [{"authorId": "80178605", "name": "S. Kahyao\u011flu"}, {"authorId": "7945902", "name": "T. Aksoy"}]}, {"paperId": "a84bfa62560892ac1231c63d3dbbe4b1849227f0", "externalIds": {"MAG": "3164341546", "DOI": "10.3233/HSM-211179", "CorpusId": 236754826}, "url": "https://www.semanticscholar.org/paper/a84bfa62560892ac1231c63d3dbbe4b1849227f0", "title": "Does higher education properly prepare graduates for the growing artificial intelligence market? Gaps identification using text mining", "abstract": "BACKGROUND: The renewed advent of Artificial Intelligence (AI) is inducing profound changes in the classic categories of technology professions and is creating the need for new specific skills. OBJECTIVE: Identify the gaps in terms of skills between academic training on AI in French engineering and Business Schools, and the requirements of the labour market. METHOD: Extraction of AI training contents from the schools\u2019 websites and scraping of a job advertisements\u2019 website. Then, analysis based on a text mining approach with a Python code for Natural Language Processing. RESULTS: Categorization of occupations related to AI. Characterization of three classes of skills for the AI market: Technical, Soft and Interdisciplinary. Skills\u2019 gaps concern some professional certifications and the mastery of specific tools, research abilities, and awareness of ethical and regulatory dimensions of AI. CONCLUSIONS: A deep analysis using algorithms for Natural Language Processing. Results that provide a better understanding of the AI capability components at the individual and the organizational levels. A study that can help shape educational programs to respond to the AI market requirements.", "venue": "", "year": 2021, "referenceCount": 37, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "1-13", "name": "Human systems management"}, "authors": [{"authorId": "122940276", "name": "L. Benhayoun"}, {"authorId": "145034519", "name": "D. Lang"}]}, {"paperId": "7e1ae3c5c91ce973432d21bf9011b79983328ddc", "externalIds": {"MAG": "3160326352", "DOI": "10.1007/978-3-030-69978-9_2", "CorpusId": 236764547}, "url": "https://www.semanticscholar.org/paper/7e1ae3c5c91ce973432d21bf9011b79983328ddc", "title": "Perspectives on Artificial Intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 16, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "7-17", "name": ""}, "authors": [{"authorId": "1792014", "name": "B. Stahl"}]}, {"paperId": "10e80a6529352924398be4b51117dfdac7784af6", "externalIds": {"MAG": "3168688739", "DOI": "10.1007/978-3-030-70424-7_11", "CorpusId": 236667102}, "url": "https://www.semanticscholar.org/paper/10e80a6529352924398be4b51117dfdac7784af6", "title": "Artificial Intelligence and Emerging Technologies in Travel", "abstract": null, "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "313-337", "name": ""}, "authors": [{"authorId": "145936404", "name": "B. Vinod"}]}, {"paperId": "eae9bb31cca551ef745697d3472677a0af80a132", "externalIds": {"DBLP": "journals/qip/XueQ21", "DOI": "10.1007/s11128-021-03172-3", "CorpusId": 236522481}, "url": "https://www.semanticscholar.org/paper/eae9bb31cca551ef745697d3472677a0af80a132", "title": "Preparation of three-atom GHZ states based on deep reinforcement learning", "abstract": null, "venue": "Quantum Inf. Process.", "year": 2021, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "20", "pages": "1-17", "name": "Quantum Inf. Process."}, "authors": [{"authorId": "1379689239", "name": "Guanghao Xue"}, {"authorId": "47659868", "name": "L. Qiu"}]}, {"paperId": "034d3a6221b511dd1ca593d105fd58c6d9723bee", "externalIds": {"DOI": "10.31033/ijemr.11.3.38", "CorpusId": 236525026}, "url": "https://www.semanticscholar.org/paper/034d3a6221b511dd1ca593d105fd58c6d9723bee", "title": "The Automation of Critical Path Method using Machine Learning: A Conceptual Study", "abstract": "This research aims to shed light on the use of machine learning in improving, developing and automating the critical path method, solving its problems, studying this effect and its dimensions, and discussing that from many", "venue": "", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2121517406", "name": "Othman Aljumaili"}]}, {"paperId": "efdf603a25aa3140562fee3ee6c5ea122fd7d77e", "externalIds": {"DOI": "10.17352/tcsit.000037", "CorpusId": 236500128}, "url": "https://www.semanticscholar.org/paper/efdf603a25aa3140562fee3ee6c5ea122fd7d77e", "title": "The making and development of Baxter the Empowered Chatbot impered with Machine Intelligence", "abstract": "The creation and analysis of intelligent agents (software and machinery) is called Artifi cial Intelligence. Intelligent machines can do many tasks \u2013 from labour work to highly complicated operations. Prominent trends in this fi eld are human brain simulation, natural language processing, neural networking, user friendly operating system, adaptability to ethical and modern engines. One of the typical examples of the A.I. system is a \u201cchatbot\u201d. A chatbot is a computer program which responds like an intelligent entity when conversations are discussed. The conversation may be through text, voice, code. Any chatbot program understands human languages by natural language processing. Due to this, the system interprets human beings through input information fed to it. A chatbot also performs some additional functions like calculation, playing songs, calling anyone and small user defi ned functions. A popular example of the chatbot is BAXTER Bot (Artifi cial Intelligence combined computer entity) which is a human command execution bot. This chatbot is an innovative interface between human and work engine, making that command fl ow directly from human to the machine within the input entity (keyboard and microphone etc). The Turing test is one of the most popular measures of intelligence of such machines. The Turing test develops mathematical models of regression. Today\u2019s A.I. systems \u201cpretend to act like\u201d intelligent entities instead of being one. For example, today\u2019s machines require too much of a heavy dataset but modern A.I. model does not require that much intelligence. There is a need to view AI systems from a new perspective and theory of machine intelligence\u2019s required tool for this [1,2].", "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "82908427", "name": "J. Srimathi"}, {"authorId": "2152732832", "name": "Girish P"}, {"authorId": "2125275092", "name": "kurane Anugraha Ramesh"}]}, {"paperId": "794fa3424656f443b0df03a575440e905c3403c2", "externalIds": {"DBLP": "conf/atal/KampikG21", "DOI": "10.1007/978-3-030-82017-6_17", "CorpusId": 236460332}, "url": "https://www.semanticscholar.org/paper/794fa3424656f443b0df03a575440e905c3403c2", "title": "Explainable Reasoning in Face of Contradictions: From Humans to Machines", "abstract": null, "venue": "EXTRAAMAS@AAMAS", "year": 2021, "referenceCount": 45, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "280-295"}, "authors": [{"authorId": "2437582", "name": "Timotheus Kampik"}, {"authorId": "15773387", "name": "D. Gabbay"}]}, {"paperId": "ffd186e936779287c16c3d5107081906d55f5c05", "externalIds": {"DBLP": "conf/hci/Karvonen21", "DOI": "10.1007/978-3-030-77431-8_14", "CorpusId": 236150829}, "url": "https://www.semanticscholar.org/paper/ffd186e936779287c16c3d5107081906d55f5c05", "title": "Questions in Cognitive Mimetics", "abstract": null, "venue": "HCI", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "224-239"}, "authors": [{"authorId": "74461425", "name": "A. Karvonen"}]}, {"paperId": "68c32ab884c31f006599b913f7f0cc81f65bdeb6", "externalIds": {"DBLP": "conf/hci/Komischke21", "DOI": "10.1007/978-3-030-77772-2_17", "CorpusId": 236150928}, "url": "https://www.semanticscholar.org/paper/68c32ab884c31f006599b913f7f0cc81f65bdeb6", "title": "Human-Centered Artificial Intelligence Considerations and Implementations: A Case Study from Software Product Development", "abstract": null, "venue": "HCI", "year": 2021, "referenceCount": 4, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "260-268"}, "authors": [{"authorId": "3308982", "name": "Tobias Komischke"}]}, {"paperId": "6e59749d59a04d7610f5d30ff058926c190f655a", "externalIds": {"DBLP": "conf/hci/Saariluoma21", "DOI": "10.1007/978-3-030-77431-8_9", "CorpusId": 236151041}, "url": "https://www.semanticscholar.org/paper/6e59749d59a04d7610f5d30ff058926c190f655a", "title": "Human Research in Technology Design", "abstract": null, "venue": "HCI", "year": 2021, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "151-161"}, "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}]}, {"paperId": "da0670807e16ca320833e71ac5c79e068e3efd65", "externalIds": {"MAG": "3158882962", "DOI": "10.1007/978-3-030-70277-9_4", "CorpusId": 235832661}, "url": "https://www.semanticscholar.org/paper/da0670807e16ca320833e71ac5c79e068e3efd65", "title": "Population-Based Metaheuristics", "abstract": null, "venue": "", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "95-130", "name": ""}, "authors": [{"authorId": "1760426", "name": "V. Maniezzo"}, {"authorId": "2032887", "name": "Marco A. Boschetti"}, {"authorId": "1684799", "name": "T. St\u00fctzle"}]}, {"paperId": "68b7daf45563fde9c3c59cc14d099ddf0c693583", "externalIds": {"DOI": "10.1088/1742-6596/1966/1/012041", "CorpusId": 235817482}, "url": "https://www.semanticscholar.org/paper/68b7daf45563fde9c3c59cc14d099ddf0c693583", "title": "Adversarial Response Generation Against Topic Relevance", "abstract": "In recent years, generative adversarial networks have performed well in the field of dialogue generation to improve the information diversity of dialogue responses. Often overlooked, however, is that the query and response are not relevant on the topic. In order to improve the topic relevance of chat conversation, the paper proposed a topic-relevance adversarial response generation model, TR-ARG, which is composed of generator G, discriminator D and topic classifier T. The experiment was evaluated on OpenSubtitles, an open dialog dataset, and compared with the current baseline models SEQ2SEQ and GAN-AEL. The results show that our model can effectively improve the topic relevance of generated responses.", "venue": "Journal of Physics: Conference Series", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": null, "journal": {"volume": "1966", "name": "Journal of Physics: Conference Series"}, "authors": [{"authorId": "2151331276", "name": "Peng Zhang"}, {"authorId": "2157834487", "name": "Hongrong Wang"}, {"authorId": "2149135428", "name": "Zhigang Zhou"}, {"authorId": "2153610313", "name": "Yu Wang"}]}, {"paperId": "9cd5a81d3d8d7066389d241677a7d9411a32158f", "externalIds": {"DBLP": "journals/corr/abs-2106-13233", "CorpusId": 235652152}, "url": "https://www.semanticscholar.org/paper/9cd5a81d3d8d7066389d241677a7d9411a32158f", "title": "Post Selections Using Test Sets (PSUTS) and How Developmental Networks Avoid Them", "abstract": "This paper raises a rarely reported practice in Artificial Intelligence (AI) called Post Selection Using Test Sets (PSUTS). Consequently, the popular error-backprop methodology in deep learning lacks an acceptable generalization power. All AI methods fall into two broad schools, connectionist and symbolic. The PSUTS fall into two kinds, machine PSUTS and human PSUTS. The connectionist school received criticisms for its \u201cscruffiness\u201d due to a huge number of network parameters and now the worse machine PSUTS; but the seemingly \u201cclean\u201d symbolic school seems more brittle because of a weaker generalization power using human PSUTS. This paper formally defines what PSUTS is, analyzes why error-backprop methods with random initial weights suffer from severe local minima, why PSUTS violates well-established research ethics, and how every paper that used PSUTS should have at least transparently reported PSUTS. For improved transparency in future publications, this paper proposes a new standard for performance evaluation of AI, called developmental errors for all networks trained, along with Three Learning Conditions: (1) an incremental learning architecture, (2) a training experience and (3) a limited amount of computational resources. Developmental Networks avoid PSUTS and are not \u201cscruffy\u201d because they drive Emergent Turing Machines and are optimal in the sense of maximum-likelihood across lifetime.", "venue": "ArXiv", "year": 2021, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "abs/2106.13233", "name": "ArXiv"}, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "ab0f3f3deede0dd3e546a65bc8d21dc73675b5e9", "externalIds": {"MAG": "3169933101", "DOI": "10.14569/IJACSA.2021.0120571", "CorpusId": 235651165}, "url": "https://www.semanticscholar.org/paper/ab0f3f3deede0dd3e546a65bc8d21dc73675b5e9", "title": "Automating and Optimizing Software Testing using Artificial Intelligence Techniques", "abstract": "The final product of software development process is a software system and testing is one of the important stages in this process. The success of this process can be determined by how well it accomplishes its goal. Due to the advancement of technology, various software testing tools have been introduced in the software engineering discipline. The use of software is increasing day-by-day and complexity of software functions are challenging and there is need to release the software within the short quality evaluation period, there is a high demand in adopting automation in software testing. Emergence of automatic software testing tools and techniques helps in quality enhancement and reducing time and cost in the software development activity. Artificial Intelligence (AI) techniques are widely applied in different areas of Software engineering (SE). Application of AI techniques can help in achieving good performance in software Testing and increase the productivity of the software development firms. This paper briefly presents the state of the art in the field of software testing by applying AI techniques in software testing. Keywords\u2014Software testing; artificial intelligence; testing automation; software engineering; software quality", "venue": "", "year": 2021, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "12", "name": "International Journal of Advanced Computer Science and Applications"}, "authors": [{"authorId": "73774863", "name": "Minimol Anil Job"}]}, {"paperId": "e6f9c89289abf6b7318782b7218f4b55d8563a34", "externalIds": {"DBLP": "conf/ecis/FukasRRT21", "CorpusId": 235428439}, "url": "https://www.semanticscholar.org/paper/e6f9c89289abf6b7318782b7218f4b55d8563a34", "title": "Developing an Artificial Intelligence Maturity Model for Auditing", "abstract": "Artificial Intelligence (AI) is increasingly being used in various domains including highly regulated areas such as auditing. Although the use of AI in auditing may seem promising at the first glance, there are a number of implications that have so far prevented its broad application. By proposing the first Auditing Artificial Intelligence Maturity Model (A-AIMM), we assess the adoption and diffusion of AI in auditing by considering audit specific requirements. The resulting model contains eight different dimensions and five different maturity levels that foster audit firms in becoming AI-enabled organisations by providing recommendations for the further use of AI with their current capabilities. The development procedure represents a Design Science Research approach including a systematic literature review, a qualitative survey with audit experts and an iterative development process.", "venue": "European Conference on Information Systems", "year": 2021, "referenceCount": 90, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2111965685", "name": "Philipp Fukas"}, {"authorId": "3364863", "name": "Jonas Rebstadt"}, {"authorId": "146743228", "name": "Florian Remark"}, {"authorId": "145589040", "name": "Oliver Thomas"}]}, {"paperId": "60d64090cd530f6a83b7d21e641843fb47e9cc0b", "externalIds": {"CorpusId": 235420055}, "url": "https://www.semanticscholar.org/paper/60d64090cd530f6a83b7d21e641843fb47e9cc0b", "title": "Carpentered Diegetic Things: Alternative Design Ideologies for AI Material Relations", "abstract": "This paper considers a More-than Human-Centered design approach that presents Artificial Intelligence (AI) and data as materials for design by utilizing the non-anthropocentric philosophy of Object-Oriented Ontology (OOO) and the related thesis of Alien Phenomenology. This paper also explores methods of making AI operations, functions and impacts legible through the speculative design practice of Design Fiction by adopting a perspective that acknowledges the independent perspectives and interdependent relationships of human and non-human actants. The structure of this paper is as follows; first, we will give a brief account and understanding of AI technology, with reference to our philosophical guinea pig Amazon\u2019s AI assistant Alexa and Skills service. Second, we will unpack the theory of OOO detailing the related theories to develop an alternative perspective of AI technology. Further, it will posit how adopting a More-Than Human-Centered design approach can assist in negotiating the complexities of AI and move towards possible implementation solutions. Third, and finally, we demonstrate this alternative approach by utilizing the philosophical theories of OOO, and a Design Fiction as World Building approach to philosophically carpenter a Diegetic Thing Amazon\u2019s AI assistant Alexa which speculatively transcends Alexa\u2019s current skills into functions of legible AI.", "venue": "", "year": 2021, "referenceCount": 35, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "121401948", "name": "Franziska Pilling"}]}, {"paperId": "abe2e8c0ec845ad5a613f799cd00e488f0e4b3d9", "externalIds": {"CorpusId": 235416247}, "url": "https://www.semanticscholar.org/paper/abe2e8c0ec845ad5a613f799cd00e488f0e4b3d9", "title": "On educating machine learners", "abstract": "Machine education is an emerging research field that focuses on the problem which is inverse to machine learning. To date, the literature on educating machines is still in its infancy. A fairly low number of methodology and method papers are scattered throughout various formal and informal publication avenues, mainly because the field is not yet well coalesced (with no well established discussion forums or investigation pathways), but also due to the breadth of its potential ramifications and research directions. In this study we bring together the existing literature and organise the discussion into a small number of research directions (out of many) which are to date sufficiently explored to form a minimal critical mass that can push the machine education concept further towards a standalone research field status.", "venue": "", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3103429", "name": "George Leu"}, {"authorId": "1747523", "name": "Jiangjun Tang"}]}, {"paperId": "2962468f13562c45451f7a4bbd5b7e0d5d00f04e", "externalIds": {"DBLP": "phd/us/Saarinen21", "CorpusId": 250095337}, "url": "https://www.semanticscholar.org/paper/2962468f13562c45451f7a4bbd5b7e0d5d00f04e", "title": "Query Strategies for Directed Graphical Models and their Application to Adaptive Testing", "abstract": "of \u201cQuery Strategies for Directed Graphical Models and their Application to Adaptive Testing\u201d by Sam Saarinen, Ph.D., Brown University, May 2021. Educational assessments are crucial for both instructors and education researchers to measure learning, troubleshoot student problems, evaluate pedagogy, and improve education. Unfortunately, creating and administering reliable assessments is a labor-intensive process. This dissertation frames assessment creation from a pool of assessment items as a machine learning problem and tackles this problem by learning directed graphical models of topic prerequisite relationships. It is shown on a variety of real datasets that these models can be learned in a computationallyand dataefficient manner from records of student responses, can be queried efficiently, and produce accurate predictions about student knowledge. This technique is used to develop and administer novel computer science assessments of instructor-defined specificity using student-authored questions. Query Strategies for Directed Graphical Models and their Application to Adaptive Testing by Sam Saarinen B. Sc., University of Kentucky, 2016 Sc. M., Brown University, 2018 A dissertation submitted in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in the Department of Computer Science at Brown University Providence, Rhode Island May 2021 \u00a9 Copyright 2021 by Sam Saarinen This dissertation by Sam Saarinen is accepted in its present form by the Department of Computer Science as satisfying the dissertation requirement for the degree of Doctor of Philosophy. Date Michael L. Littman, Director Recommended to the Graduate Council Date Stephen Bach, Reader Date Shriram Krishnamurthi, Reader Approved by the Graduate Council Date Andrew G. Campbell Dean of the Graduate School", "venue": "", "year": 2021, "referenceCount": 82, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "119716163", "name": "S. Saarinen"}]}, {"paperId": "0dc37d26a40df769a071b5325c79b5d80c26a126", "externalIds": {"DOI": "10.1088/1742-6596/1883/1/012064", "CorpusId": 235281178}, "url": "https://www.semanticscholar.org/paper/0dc37d26a40df769a071b5325c79b5d80c26a126", "title": "Question answering system based on tourism knowledge graph", "abstract": "Nowadays tourism information services only provide users with massive and fragmented information returned by independent network search which makes users often need to spend a lot of time and energy to find what they really want from the massive data. As a result, route designing is very complicated. In view of this situation, this study builds a tourism knowledge graph based on neo4j and constructs a question answering system (QA). Also, we carry out the model and system performance evaluation, trying to improve the user satisfaction with query experience. According to the structure of question answering system (QA), this research designed and implemented named entity recognition (NER) model based on Bert-BiLSTM-CRF and matching reasoning model based on templates. With the above methods, natural language questions were successfully transformed into cypher query statements recognizable in graph database, and the corresponding answers will be captured and returned from tourism knowledge graph. According to the experiment, the method of Bert-BiLSTM-CRF obtains the state of art and QA system performs quickly and efficiently. For the purpose that artificial intelligence helps the development of tourism industry, this study has a certain significance.", "venue": "", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "1883", "name": "Journal of Physics: Conference Series"}, "authors": [{"authorId": "2106576284", "name": "Y. Sui"}]}, {"paperId": "2498f889022409f80ac8c35532b64e25ec7ba1d8", "externalIds": {"DBLP": "conf/colins/SavytskaVBPS21", "CorpusId": 235271387}, "url": "https://www.semanticscholar.org/paper/2498f889022409f80ac8c35532b64e25ec7ba1d8", "title": "Using Word2vec Technique to Determine Semantic and Morphologic Similarity in Embedded Words of the Ukrainian Language", "abstract": "The study presents the word translation into vectors of real numbers (word embeddings), one of the most important topics in natural language processing. Word2vec is the latest techniques developed by Tomas Mikolov to study high quality vectors. The majority of studies on clustering the word vectors were made in English. Dmitry Chaplinsky has already counted and published vectors for the Ukrainian language by using LexVec, Word2vec and GloVe techniques, obtained from fiction, newswire and ubercorpus texts, for VESUM dictionary and other related NLP tools for the Ukrainian language. There was no research done on the vectors by using Word2vec technique to create Ukrainian corpus, obtained from Wikipedia dump as the main source. The collection contains more than two hundred and sixty one million words. The dictionary of words (unique words) obtained from the corpus is more than seven hundred and nine thousand. The research using machine technology Word2vec is of great practical importance to computerise many areas of linguistic analysis. The open-source Python programming language was used to obtain word vectors with Word2vec techniques and to calculate the cosine proximity of the vectors. In order to do machine learning with Word2vec techniques on Python, a resource containing open source licensed software libraries called \"Gensim\" was used. Calculations regarding the cosine affinities of the obtained vectors were made using \"Gensim\" libraries. The research examining the clustering of the word vectors obtained from the Ukrainian corpus was made considering the two sub-branches of linguistics, semantics and morphology (language morphology). Firstly, it was investigated how accurately the vectors are obtained from the Ukrainian corpus and how the words represent the cluster they belong to. Secondly, it was investigated how word vectors are clustered and associated respectively to the morphological features of the suffixes of the Ukrainian language.", "venue": "COLINS", "year": 2021, "referenceCount": 22, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "235-248"}, "authors": [{"authorId": "2094582555", "name": "Larysa Savytska"}, {"authorId": "12082005", "name": "N. Vnukova"}, {"authorId": "2106530048", "name": "Iryna Bezugla"}, {"authorId": "2100991382", "name": "Vasyl Pyvovarov"}, {"authorId": "2106529443", "name": "M. T. S\u00fcbay"}]}, {"paperId": "cd8e65d8feb00c54aa0c9e045fdfe51b65ac9bbe", "externalIds": {"ACL": "2021.naacl-srw.4", "DBLP": "conf/naacl/Musil21", "DOI": "10.18653/v1/2021.naacl-srw.4", "CorpusId": 235097472}, "url": "https://www.semanticscholar.org/paper/cd8e65d8feb00c54aa0c9e045fdfe51b65ac9bbe", "title": "Representations of Meaning in Neural Networks for NLP: a Thesis Proposal", "abstract": "Neural networks are the state-of-the-art method of machine learning for many problems in NLP. Their success in machine translation and other NLP tasks is phenomenal, but their interpretability is challenging. We want to find out how neural networks represent meaning. In order to do this, we propose to examine the distribution of meaning in the vector space representation of words in neural networks trained for NLP tasks. Furthermore, we propose to consider various theories of meaning in the philosophy of language and to find a methodology that would enable us to connect these areas.", "venue": "NAACL", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": null, "journal": {"pages": "24-31"}, "authors": [{"authorId": "1774026", "name": "Tom\u00e1\u0161 Musil"}]}, {"paperId": "e50b6b7378001bcd7c156bffb4891a1abaf1e84e", "externalIds": {"MAG": "3155683640", "DOI": "10.1007/978-3-030-74826-5_3", "CorpusId": 235081403}, "url": "https://www.semanticscholar.org/paper/e50b6b7378001bcd7c156bffb4891a1abaf1e84e", "title": "Hexagon of Intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "25-34", "name": ""}, "authors": [{"authorId": "1693437", "name": "J. B\u00e9ziau"}]}, {"paperId": "d3250983c40f76f6defc784d734c53ea4dc34264", "externalIds": {"DBLP": "conf/ihiet/SaariluomaS21", "MAG": "3152550765", "DOI": "10.1007/978-3-030-74009-2_72", "CorpusId": 235084273}, "url": "https://www.semanticscholar.org/paper/d3250983c40f76f6defc784d734c53ea4dc34264", "title": "Lost People: How National AI-Strategies Paying Attention to Users", "abstract": null, "venue": "IHIET", "year": 2021, "referenceCount": 12, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "563-568"}, "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}, {"authorId": "2102881731", "name": "Henrikki Salo-P\u00f6ntinen"}]}, {"paperId": "152a57c7abd70e9d87653208625cf963a7861fdf", "externalIds": {"MAG": "3154765452", "DOI": "10.1007/978-3-030-67981-1_5", "CorpusId": 234957076}, "url": "https://www.semanticscholar.org/paper/152a57c7abd70e9d87653208625cf963a7861fdf", "title": "What Can I Know? Artificial Enjoyment", "abstract": null, "venue": "", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "125-146", "name": ""}, "authors": [{"authorId": "2091113517", "name": "Isabel Millar"}]}, {"paperId": "f950dba73660ffe1a4bbe877f0d80dc7454f3451", "externalIds": {"DBLP": "conf/cmis/ChimirV21", "DOI": "10.32782/cmis/2864-16", "CorpusId": 234753385}, "url": "https://www.semanticscholar.org/paper/f950dba73660ffe1a4bbe877f0d80dc7454f3451", "title": "Formal Models of Question-Answering Machine", "abstract": "The article describes two models of question-answering dialogue machine: (1) model based on the idea of Mealy finite automata, and (2) model based on the idea of Petri net. Both models are problem-independent and describe question-answering dialogue process, which is independent of the subject area of the dialogue. The problem independence of the models is a consequence of a unified cognitive cycle of dialogue used in them. The unified cognitive cycle of dialogue is similar to Neisser's cyclical model of perception. Models are designed to specify a \"dialogue machine\" that simulates a goal-oriented behavior of the active dialogue agent when solving a problem by means of a question-answering dialogue. Implementation of the models presupposes data-driven approach when main components of the \"dialogue machine\" are not map in the program code but represented by data stored in the database.", "venue": "CMIS", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "182-193"}, "authors": [{"authorId": "3022616", "name": "I. Chimir"}, {"authorId": "69064290", "name": "A. Verlan"}]}, {"paperId": "2727757771c3e5828a4dd94ad56f0c31931f39ef", "externalIds": {"MAG": "3139074194", "DOI": "10.1007/978-3-658-32427-8_2", "CorpusId": 234133742}, "url": "https://www.semanticscholar.org/paper/2727757771c3e5828a4dd94ad56f0c31931f39ef", "title": "K\u00fcnstliche Intelligenz im Bankwesen \u2013 Chancen und Herausforderungen personalisierter Kundenangebote", "abstract": null, "venue": "", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "15-34", "name": ""}, "authors": [{"authorId": "123432738", "name": "Bita Fesidis"}, {"authorId": "2118343721", "name": "Sophie Gupta"}]}, {"paperId": "df60b291dc6b2a27fa609d7699a0656515dd4c01", "externalIds": {"MAG": "3129798280", "DOI": "10.1016/B978-0-12-820273-9.00016-6", "CorpusId": 234160342}, "url": "https://www.semanticscholar.org/paper/df60b291dc6b2a27fa609d7699a0656515dd4c01", "title": "The future of artificial intelligence in healthcare", "abstract": null, "venue": "", "year": 2021, "referenceCount": 111, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "371-394", "name": ""}, "authors": [{"authorId": "1492140883", "name": "N. Radakovich"}, {"authorId": "5312253", "name": "A. Nazha"}]}, {"paperId": "8305459d10b3fa81da60bc87c8ae995c28e5c558", "externalIds": {"MAG": "3133955974", "DOI": "10.1007/978-3-030-71374-4_7", "CorpusId": 234136237}, "url": "https://www.semanticscholar.org/paper/8305459d10b3fa81da60bc87c8ae995c28e5c558", "title": "Teaching Model Checking via Games and\u00a0Puzzles", "abstract": null, "venue": "", "year": 2021, "referenceCount": 8, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "143-158", "name": ""}, "authors": [{"authorId": "71389094", "name": "Bernd-Holger Schlingloff"}]}, {"paperId": "2018379c5dd0947ea787ac2cea7bf45c33ae4c58", "externalIds": {"MAG": "3129649816", "DOI": "10.4018/978-1-7998-4963-6.CH003", "CorpusId": 234320935}, "url": "https://www.semanticscholar.org/paper/2018379c5dd0947ea787ac2cea7bf45c33ae4c58", "title": "Only Can AI Understand Me?", "abstract": "This chapter addresses whether AI can understand me. A framework for regulating AI systems that draws on Strawson's moral philosophy and concepts drawn from jurisprudence and theories on regulation is used. This chapter proposes that, as AI algorithms increasingly draw inferences following repeated exposure to big datasets, they have become more sophisticated and rival human reasoning. Their regulation requires that AI systems have agency and are subject to the rulings of courts. Humans sponsor the AI systems for registration with regulatory agencies. This enables judges to make moral culpability decisions by taking the AI system's explanation into account along with the full social context of the misdemeanor. The proposed approach might facilitate the research and development of intelligent analytics, intelligent big data analytics, multiagent systems, artificial intelligence, and data science.", "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "46-66", "name": ""}, "authors": [{"authorId": "1809961", "name": "A. Stranieri"}, {"authorId": "2118548137", "name": "Zhaohao Sun"}]}, {"paperId": "960c0bca8749f5802d4f08a8ada366bb04e3003b", "externalIds": {"MAG": "3134944198", "DOI": "10.1007/978-3-030-68049-7_11", "CorpusId": 234285774}, "url": "https://www.semanticscholar.org/paper/960c0bca8749f5802d4f08a8ada366bb04e3003b", "title": "The Role of Machine Learning and Artificial Intelligence in High Performance Computing", "abstract": null, "venue": "", "year": 2021, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "151-161", "name": ""}, "authors": [{"authorId": "1755921", "name": "Michael M. Resch"}, {"authorId": "2051133", "name": "B. Koller"}]}, {"paperId": "3b7125a7fa0d0c7d98a38441842e32ddcc870794", "externalIds": {"MAG": "3142142496", "DOI": "10.1007/978-3-030-71503-8_21", "CorpusId": 234337912}, "url": "https://www.semanticscholar.org/paper/3b7125a7fa0d0c7d98a38441842e32ddcc870794", "title": "Is It Intelligent? A Systematic Review of Intelligence in the Most Cited Papers in IoT", "abstract": null, "venue": "", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": "", "pages": "272-286", "name": ""}, "authors": [{"authorId": "1644097256", "name": "Billy Grados"}, {"authorId": "3331936", "name": "H\u00e9ctor Bed\u00f3n"}]}, {"paperId": "8e8236e1cff6c1561ec49463e9dca8060acd6a24", "externalIds": {"MAG": "3127802892", "DOI": "10.1007/978-3-030-56227-4_17", "CorpusId": 234238518}, "url": "https://www.semanticscholar.org/paper/8e8236e1cff6c1561ec49463e9dca8060acd6a24", "title": "Ethics and the Development of Artificial Intelligence: Challenges and Dilemmas in the Context of the 2030 United Nations Agenda for Sustainable Development", "abstract": null, "venue": "", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "355-380", "name": ""}, "authors": [{"authorId": "2091051257", "name": "Aneta Breczko"}, {"authorId": "2927314", "name": "W. Filipkowski"}, {"authorId": "83183518", "name": "Izabela Kra\u015bnicka"}]}, {"paperId": "19108cc3861ba6619bbaddd8d27949bf14f57924", "externalIds": {"MAG": "3124321103", "DOI": "10.1007/978-3-658-30882-7_3", "CorpusId": 234240108}, "url": "https://www.semanticscholar.org/paper/19108cc3861ba6619bbaddd8d27949bf14f57924", "title": "Steuern wir oder werden wir gesteuert? Chancen und Risiken von Mensch-Technik-Interaktion", "abstract": null, "venue": "Zusammenwirken von nat\u00fcrlicher und k\u00fcnstlicher Intelligenz", "year": 2021, "referenceCount": 88, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Zusammenwirken von nat\u00fcrlicher und k\u00fcnstlicher Intelligenz"}, "authors": [{"authorId": "50093361", "name": "M. Jipp"}, {"authorId": "2064948798", "name": "Jochen J. Steil"}]}, {"paperId": "417af731c1731e3ba03c24a6bf686f552ef3a018", "externalIds": {"MAG": "3144179217", "DOI": "10.1007/978-3-030-71503-8_2", "CorpusId": 234203037}, "url": "https://www.semanticscholar.org/paper/417af731c1731e3ba03c24a6bf686f552ef3a018", "title": "User Affective Experience into a Scope of Conversational Artificial Intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "21-32", "name": ""}, "authors": [{"authorId": "2090225009", "name": "Ligia Maza-Jim\u00e9nez"}, {"authorId": "1405338464", "name": "P. Torres-Carri\u00f3n"}, {"authorId": "2113661431", "name": "Carina Gonz\u00e1lez"}, {"authorId": "3380051", "name": "Germania Rodr\u00edguez"}, {"authorId": "34047036", "name": "Silvia L. Vaca"}]}, {"paperId": "1eca7e2335f4e547becf7905c5f3f3f39fee4f64", "externalIds": {"MAG": "3123441884", "DOI": "10.1007/978-981-15-9689-6_3", "CorpusId": 234261666}, "url": "https://www.semanticscholar.org/paper/1eca7e2335f4e547becf7905c5f3f3f39fee4f64", "title": "Processing Large Text Corpus Using N-Gram Language Modeling and Smoothing", "abstract": null, "venue": "", "year": 2021, "referenceCount": 17, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "21-32", "name": ""}, "authors": [{"authorId": "2003538069", "name": "Sandhya Avasthi"}, {"authorId": "2655854", "name": "Ritu Chauhan"}, {"authorId": "2150744", "name": "D. Acharjya"}]}, {"paperId": "67c451b06c9449b87c3776dc4a217e63e1a32670", "externalIds": {"MAG": "3121480205", "DOI": "10.1007/978-3-030-61721-9_13", "CorpusId": 234279009}, "url": "https://www.semanticscholar.org/paper/67c451b06c9449b87c3776dc4a217e63e1a32670", "title": "Radical Solutions to the Ontological and Epistemological Problems of Consciousness", "abstract": null, "venue": "", "year": 2021, "referenceCount": 54, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "131-140", "name": ""}, "authors": [{"authorId": "2090380227", "name": "Javier Andr\u00e9s Castro"}]}, {"paperId": "029ac44fca51cc774b50f7f985f9a48236373a11", "externalIds": {"MAG": "3130255791", "DOI": "10.1007/978-3-030-62796-6_27", "CorpusId": 234277779}, "url": "https://www.semanticscholar.org/paper/029ac44fca51cc774b50f7f985f9a48236373a11", "title": "A Light Spot on the Role of Artificial Intelligence and Deep Learning in Social Networks", "abstract": null, "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "461-474", "name": ""}, "authors": [{"authorId": "1486414802", "name": "Tamam Alsarhan"}]}, {"paperId": "57a7109da7aa5cba26f9c95024d78b03c5338939", "externalIds": {"MAG": "3134012862", "DOI": "10.4018/978-1-7998-7010-4.CH004", "CorpusId": 234273463}, "url": "https://www.semanticscholar.org/paper/57a7109da7aa5cba26f9c95024d78b03c5338939", "title": "The Universal Knowledge Machine", "abstract": "The chapter introduces a technical prescription for a universal knowledge machine (UKM), or World-Brain, a proposed global media system with the capability to encapsulate/organize/index and provide user-friendly access to all human knowledge. The goal is not to develop an artificial brain or any kind of Artificial Intelligence (AI) so-to-speak. Rather, the authors wish to build a collective intelligence repository, a vast \u2018living' memory bank for everything known and in terms of a totality of knowledge emanating from each of the three worlds of physical, mental, and objective knowledge. Envisaged is a place for humanity to come together collectively and to create, capture, record, link, search, sort, filter, classify, map, granulate, aggregate, chunk, window, overview, catalogue plus communicate a vast number, and great variety, of ideas, facts, claims, variants, data, texts, theories, images, happenings, and opinions. The goal is nothing less than a grand unification of all knowledge such that items are endlessly visible, explorable, linkable, navigable, etc.", "venue": "", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": "", "pages": "102-132", "name": ""}, "authors": [{"authorId": "2079357347", "name": "A. Radley"}]}, {"paperId": "21bc1a9866cc521ec300e75e320b88f69ee68b2b", "externalIds": {"MAG": "3126705470", "DOI": "10.1016/B978-0-12-821442-8.00015-X", "CorpusId": 234238448}, "url": "https://www.semanticscholar.org/paper/21bc1a9866cc521ec300e75e320b88f69ee68b2b", "title": "The evolution of AI and the human-machine interface as a manager in Industry 4.0", "abstract": null, "venue": "", "year": 2021, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "3-22", "name": ""}, "authors": [{"authorId": "2091052761", "name": "Liam M. O\u2019Dell"}, {"authorId": "1711807", "name": "H. Jahankhani"}]}, {"paperId": "6bb18a277865a22440318fda3e1f1b6f92899b01", "externalIds": {"MAG": "3136793612", "DOI": "10.1016/B978-0-12-820239-5.00002-4", "CorpusId": 234294008}, "url": "https://www.semanticscholar.org/paper/6bb18a277865a22440318fda3e1f1b6f92899b01", "title": "History, current status, and future directions of artificial intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 305, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "1-38", "name": ""}, "authors": [{"authorId": "2447377", "name": "O. Kubassova"}, {"authorId": "144030177", "name": "F. Shaikh"}, {"authorId": "66863290", "name": "C. Melus"}, {"authorId": "145040473", "name": "M. Mahler"}]}, {"paperId": "38b298528cd5d2f34432e878addeac1e46d83367", "externalIds": {"DBLP": "journals/ijmms/RappCB21", "DOI": "10.1016/j.ijhcs.2021.102630", "CorpusId": 233416226}, "url": "https://www.semanticscholar.org/paper/38b298528cd5d2f34432e878addeac1e46d83367", "title": "The human side of human-chatbot interaction: A systematic literature review of ten years of research on text-based chatbots", "abstract": null, "venue": "Int. J. Hum. Comput. Stud.", "year": 2021, "referenceCount": 183, "citationCount": 54, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "151", "pages": "102630", "name": "Int. J. Hum. Comput. Stud."}, "authors": [{"authorId": "144760730", "name": "A. Rapp"}, {"authorId": "51247286", "name": "L. Curti"}, {"authorId": "66483439", "name": "A. Boldi"}]}, {"paperId": "8309173e9f84f96f96651ca58167b6e9786d2312", "externalIds": {"DBLP": "series/lncs/Casonato21", "DOI": "10.1007/978-3-030-69128-8_9", "CorpusId": 233329327}, "url": "https://www.semanticscholar.org/paper/8309173e9f84f96f96651ca58167b6e9786d2312", "title": "AI and Constitutionalism: The Challenges Ahead", "abstract": null, "venue": "Reflections on Artificial Intelligence for Humanity", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "127-149"}, "authors": [{"authorId": "2076973703", "name": "C. Casonato"}]}, {"paperId": "d725e3efa4c7084726f47c93b83bf2e00770107b", "externalIds": {"DBLP": "journals/information/LiuTGL21", "DOI": "10.3390/info12030136", "CorpusId": 233132476}, "url": "https://www.semanticscholar.org/paper/d725e3efa4c7084726f47c93b83bf2e00770107b", "title": "Research on Automatic Question Answering of Generative Knowledge Graph Based on Pointer Network", "abstract": "Question-answering systems based on knowledge graphs are extremely challenging tasks in the field of natural language processing. Most of the existing Chinese Knowledge Base Question Answering(KBQA) can only return the knowledge stored in the knowledge base by extractive methods. Nevertheless, this processing does not conform to the reading habits and cannot solve the Out-of-vocabulary(OOV) problem. In this paper, a new generative question answering method based on knowledge graph is proposed, including three parts of knowledge vocabulary construction, data pre-processing, and answer generation. In the word list construction, BiLSTM-CRF is used to identify the entity in the source text, finding the triples contained in the entity, counting the word frequency, and constructing it. In the part of data pre-processing, a pre-trained language model BERT combining word frequency semantic features is adopted to obtain word vectors. In the answer generation part, one combination of a vocabulary constructed by the knowledge graph and a pointer generator network(PGN) is proposed to point to the corresponding entity for generating answer. The experimental results show that the proposed method can achieve superior performance on WebQA datasets than other methods.", "venue": "Inf.", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "12", "pages": "136", "name": "Inf."}, "authors": [{"authorId": "2108590949", "name": "Shuang Liu"}, {"authorId": "2057776788", "name": "Nannan Tan"}, {"authorId": "87680824", "name": "Yaqian Ge"}, {"authorId": "11659585", "name": "N. Luka\u010d"}]}, {"paperId": "ce10c7923f01898524d1903b470fc1d53244e16b", "externalIds": {"DBLP": "conf/hicss/Roy21", "MAG": "3126368910", "DOI": "10.24251/HICSS.2021.126", "CorpusId": 232414437}, "url": "https://www.semanticscholar.org/paper/ce10c7923f01898524d1903b470fc1d53244e16b", "title": "The Responsible Innovation Framework: A Framework for Integrating Trust and Delight into Technology Innovation", "abstract": "Although systematic biases in our intelligent systems and lack of privacy, equity, and ethical and trust considerations have entered AI and emerging technology debate, we are still lacking a common practice-based framework for innovation that puts social well-being if not ahead at least on par with growth and profits. This comes at a cost that includes public trust. This paper introduces The Responsible Innovation Framework as a tool with a reframing of stakeholders, value-sets, and influences. Who is this for? It\u2019s for everyone who\u2019s involved in decision-making for products and technology especially leaders and practitioners. The paper 1) makes a case for using a common framework starting from the ideation and vision stage or introducing it anywhere in the process, 2) describes the \u201cessential\u201d components of the framework: stakeholders, value sets, and influencers, 3) provides examples of how value sets could be leveraged in a flexible and iterative way for AI or Non-AI technology, and 4) lays out the need for additional work and case studies. The goal of the framework is to include social considerations as an essential part of technology decision making.", "venue": "HICSS", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Business"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "1-9"}, "authors": [{"authorId": "145621893", "name": "Ajishnu Roy"}]}, {"paperId": "7da32522375e0c3f63f57a7db735d0966aec1611", "externalIds": {"CorpusId": 232400199}, "url": "https://www.semanticscholar.org/paper/7da32522375e0c3f63f57a7db735d0966aec1611", "title": "The Imagetic Frame of Reference of U-Mentalism in Relation to the \u201c O ( Ntological ) \u201d and \u201c C ( Omputational ) \u201d Approaches", "abstract": "This paper discloses in synthesis a super-computation computer architecture (CA) model, presently a provisional Patent Application at INPI (no 116408). The outline is focused on a method to perform computation at or near the speed of light, resorting to an inversion of the Princeton CA. It expands from isomorphic binary/RGB (typical) digital \u201cimages\u201d, in a network of (UTM)s over Turing-machines (M)s. From the binary/RGB code, an arithmetic theory of (typical) digital images permits fully synchronous/orthogonal calculus in parallelism, wherefrom an exponential surplus is achieved. One such architecture depends on any \u201ccell\u201d-like exponential-prone basis such as the \u201cpixel\u201d, or rather the RGB \u201coctet-byte\u201d, limited as it may be, once it is congruent with any wave-particle duality principle in observable objects under the electromagnetic spectrum and reprogrammable designed. Well-ordered instructions in binary/RGB modules are, further, programming composed to alter the structure of the Internet, in virtual/virtuous eternal recursion/recurrence, under man-machine/machine-machine communication ontology.", "venue": "", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2094923296", "name": "U-MENTALISM Patent"}, {"authorId": "2081424559", "name": "Cinematic Supercomputation"}, {"authorId": "72631310", "name": "Lu\u00eds Homem"}]}, {"paperId": "1483a95a0b98c57feb8f1a8b49348a90d5b79f8e", "externalIds": {"CorpusId": 232290058}, "url": "https://www.semanticscholar.org/paper/1483a95a0b98c57feb8f1a8b49348a90d5b79f8e", "title": "Neural Dialogue Generation Methods in Open Domain: A Survey", "abstract": "Open-Domain Dialogue Generation (human\u2013computer interaction) is an important issue in the field of Natural Language Processing (NLP). Because of the improvement of deep learning techniques, a large number of neural dialogue generative methods were proposed to generate better responses. In this survey, we elaborated the research history of these existing generative methods, and then roughly divided them into six categories, i.e., Encoder-Decoder framework-based methods, Hierarchical Recurrent Encoder-Decoder (HRED)-basedmethods, Variational Autoencoder (VAE)-basedmethods, Reinforcement Learning (RL)basedmethods, GenerativeAdversarial Network (GAN)-basedmethods, and pretraining-model-basedmethods.We dived into the methods of each category and gave the detailed discussions of these methods. After that, we presented a comparison among the different categories of methods and analyzed their advantages and disadvantages. We enumerated some open access public datasets and some commonly used automatic evaluating metrics. Finally, we discuss some possible research directions that can take the research of neural dialogue generation into a new frontier in the future.", "venue": "", "year": 2021, "referenceCount": 85, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2087211409", "name": "Bin Sun"}, {"authorId": "2158257423", "name": "Kan Li"}]}, {"paperId": "ec9da3b5c896b67a15af062f8bca850526f2e633", "externalIds": {"DBLP": "journals/access/SharmaJGC21", "DOI": "10.1109/ACCESS.2020.3048415", "CorpusId": 231618470}, "url": "https://www.semanticscholar.org/paper/ec9da3b5c896b67a15af062f8bca850526f2e633", "title": "Machine Learning Applications for Precision Agriculture: A Comprehensive Review", "abstract": "Agriculture plays a vital role in the economic growth of any country. With the increase of population, frequent changes in climatic conditions and limited resources, it becomes a challenging task to fulfil the food requirement of the present population. Precision agriculture also known as smart farming have emerged as an innovative tool to address current challenges in agricultural sustainability. The mechanism that drives this cutting edge technology is machine learning (ML). It gives the machine ability to learn without being explicitly programmed. ML together with IoT (Internet of Things) enabled farm machinery are key components of the next agriculture revolution. In this article, authors present a systematic review of ML applications in the field of agriculture. The areas that are focused are prediction of soil parameters such as organic carbon and moisture content, crop yield prediction, disease and weed detection in crops and species detection. ML with computer vision are reviewed for the classification of a different set of crop images in order to monitor the crop quality and yield assessment. This approach can be integrated for enhanced livestock production by predicting fertility patterns, diagnosing eating disorders, cattle behaviour based on ML models using data collected by collar sensors, etc. Intelligent irrigation which includes drip irrigation and intelligent harvesting techniques are also reviewed that reduces human labour to a great extent. This article demonstrates how knowledge-based agriculture can improve the sustainable productivity and quality of the product.", "venue": "IEEE Access", "year": 2021, "referenceCount": 180, "citationCount": 82, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "9", "pages": "4843-4873", "name": "IEEE Access"}, "authors": [{"authorId": "48954673", "name": "Abhinav Sharma"}, {"authorId": "2046803999", "name": "Arpit Jain"}, {"authorId": "51269643", "name": "Prateek Gupta"}, {"authorId": "72510603", "name": "V. Chowdary"}]}, {"paperId": "7051e16bdd08ba1e0f36549fa1615ca6a1079135", "externalIds": {"MAG": "3106995701", "DOI": "10.1016/b978-0-12-824477-7.00002-x", "CorpusId": 229395991}, "url": "https://www.semanticscholar.org/paper/7051e16bdd08ba1e0f36549fa1615ca6a1079135", "title": "The evolution of artificial intelligence (AI)", "abstract": null, "venue": "", "year": 2021, "referenceCount": 5, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "7-11", "name": ""}, "authors": [{"authorId": "49354810", "name": "L. Catania"}]}, {"paperId": "e22e1a7c2994c011273deb22c07e708af2f073ef", "externalIds": {"MAG": "3097758405", "DOI": "10.1039/d0re00340a", "CorpusId": 228873327}, "url": "https://www.semanticscholar.org/paper/e22e1a7c2994c011273deb22c07e708af2f073ef", "title": "Artificial intelligence and automation in computer aided synthesis planning", "abstract": "In this perspective we deal with questions pertaining to the development of synthesis planning technologies over the course of recent years. We first answer the question: what is computer assisted synthesis planning (CASP) and why is it relevant to drug discovery and development? We draw a distinction between discovery and development, focusing on their differing requirements. We highlight the need for an automated synthesis platform which chemists can use to augment their workflows and what it entails. The interaction between experimental and computational scientists is emphasized as a key driver in the development of such technologies. Advances in the development and application of algorithms is then covered, drawing a distinction between physics based and statistical or data driven modelling paradigms, their use in, and how they contribute to augmented drug discovery and development. Finally, developments in the coupling of artificial intelligence and automation are discussed. Throughout, we emphasize the need for an inter-disciplinary approach, blurring the distinction between fields in the pursuit of artificial intelligence and automated platforms that can be integrated into chemical workflows.", "venue": "", "year": 2021, "referenceCount": 192, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": "Reaction Chemistry and Engineering"}, "authors": [{"authorId": "51302788", "name": "Amol Thakkar"}, {"authorId": "1423689818", "name": "Simon Johansson"}, {"authorId": "5889170", "name": "K. Jorner"}, {"authorId": "2337960", "name": "D. Buttar"}, {"authorId": "144796684", "name": "J. Reymond"}, {"authorId": "2859540", "name": "O. Engkvist"}]}, {"paperId": "0eae1f0a7c935f2a4c0dd9aa6d6086eb97311834", "externalIds": {"MAG": "3095005346", "DOI": "10.4018/978-1-7998-4894-3.ch001", "CorpusId": 228919264}, "url": "https://www.semanticscholar.org/paper/0eae1f0a7c935f2a4c0dd9aa6d6086eb97311834", "title": "AI Personhood", "abstract": "It is possible to rely on current corporate law to grant legal personhood to artificially intelligent (AI) agents. Such legal maneuvering may be useful to avoid human responsibility or to further automate businesses. In this chapter, after introducing pathways to AI personhood, consequences of such AI empowerment on human dignity, human safety, and AI rights are analyzed. This chapter per the author emphasizes possibility of creating selfish memes and legal system hacking in the context of artificial entities. Finally, potential solutions for addressing described problems are considered.", "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "1-11", "name": ""}, "authors": [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "b9ea32fd03f32a3d263884e53ccede72b7cf7a2e", "externalIds": {"MAG": "3093605970", "DOI": "10.1016/j.cma.2020.113452", "CorpusId": 226337280}, "url": "https://www.semanticscholar.org/paper/b9ea32fd03f32a3d263884e53ccede72b7cf7a2e", "title": "Hierarchical Deep Learning Neural Network (HiDeNN): An artificial intelligence (AI) framework for computational science and engineering", "abstract": null, "venue": "", "year": 2021, "referenceCount": 92, "citationCount": 39, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "373", "pages": "113452", "name": "Computer Methods in Applied Mechanics and Engineering"}, "authors": [{"authorId": "2107087659", "name": "Sourav Saha"}, {"authorId": "144535670", "name": "Zhengtao Gan"}, {"authorId": "2150207700", "name": "Lin Cheng"}, {"authorId": "2493574", "name": "Jiaying Gao"}, {"authorId": "90064306", "name": "O. L. Kafka"}, {"authorId": "2111367951", "name": "Xiaoyu Xie"}, {"authorId": "11306895", "name": "Hengyang Li"}, {"authorId": "115171952", "name": "M. Tajdari"}, {"authorId": "2155398433", "name": "H. A. Kim"}, {"authorId": "152450400", "name": "Wing Kam Liu"}]}, {"paperId": "538908b64c24e64fa26ffdeef542748840e263d1", "externalIds": {"MAG": "3086165924", "DOI": "10.1016/B978-0-12-821259-2.00016-8", "CorpusId": 224930422}, "url": "https://www.semanticscholar.org/paper/538908b64c24e64fa26ffdeef542748840e263d1", "title": "Prospect and adversity of artificial intelligence in urology", "abstract": null, "venue": "", "year": 2021, "referenceCount": 146, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "309-337", "name": ""}, "authors": [{"authorId": "1882587", "name": "O. Eminaga"}, {"authorId": "4265282", "name": "J. Liao"}]}, {"paperId": "d65e6b99059292cd145b00ecdea947dad89dae91", "externalIds": {"MAG": "3081755160", "DOI": "10.4018/978-1-7998-4864-6.ch002", "CorpusId": 224856523}, "url": "https://www.semanticscholar.org/paper/d65e6b99059292cd145b00ecdea947dad89dae91", "title": "Multi-Disciplinary Paths to Actor-Centric Non-Player Character Emotion Models", "abstract": "Video game non-player characters (NPCs) are a type of agent that often inherits emotion models and functions from ancestor virtual agents. Few emotion models have been designed for NPCs explicitly, and therefore do not approach the expressive possibilities available to live-action performing actors nor hand-crafted animated characters. With distinct perspectives on emotion generation from multiple fields within narratology and computational cognitive psychology, the architecture of NPC emotion systems can reflect the theories and practices of performing artists. This chapter argues that the deployment of virtual agent emotion models applied to NPCs can constrain the performative aesthetic properties of NPCs. An actor-centric emotion model can accommodate creative processes for actors and may reveal what features emotion model architectures should have that are most useful for contemporary game production of photorealistic NPCs that achieve cinematic acting styles and robust narrative design.", "venue": "", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "17-42", "name": ""}, "authors": [{"authorId": "144812758", "name": "Sheldon Schiffer"}]}, {"paperId": "a8796f447f5e65bd97b4563dd0ae19835731e370", "externalIds": {"MAG": "3082898339", "DOI": "10.4018/978-1-7998-5077-9.ch001", "CorpusId": 224956728}, "url": "https://www.semanticscholar.org/paper/a8796f447f5e65bd97b4563dd0ae19835731e370", "title": "Artificial Intelligence, Marketing, and the Fourth Industrial Revolution", "abstract": "Artificial intelligence has been part of the world of marketing for some time now. This chapter will look at how artificial intelligence is defined and classified, illustrating its potential for the marketing domain with a variety of examples from various industries and sectors. Ethical concerns arising from the application of AI marketing will be discussed in the second part of this chapter. Before concluding, three brief case studies will give further insights, looking in detail at the AI activities of Airbnb, NYC's Metropolitan Museum of Artificial Intelligence, and retail giant Walmart.", "venue": "", "year": 2021, "referenceCount": 20, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "1-13", "name": ""}, "authors": [{"authorId": "35064842", "name": "A. Kaplan"}]}, {"paperId": "46649782b5252684a5a74a10ead3c9d5f7e2762c", "externalIds": {"DOI": "10.1007/978-3-030-70354-7_4", "CorpusId": 221369018}, "url": "https://www.semanticscholar.org/paper/46649782b5252684a5a74a10ead3c9d5f7e2762c", "title": "Unpredictability and Randomness", "abstract": null, "venue": "", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2246251", "name": "Rade Vuckovac"}]}, {"paperId": "58fd94d0a1a372b5bec413667ae1868451ebcda2", "externalIds": {"MAG": "3093018914", "DOI": "10.4018/978-1-7998-3479-3.ch051", "CorpusId": 225122056}, "url": "https://www.semanticscholar.org/paper/58fd94d0a1a372b5bec413667ae1868451ebcda2", "title": "Methods and Techniques of Data Mining", "abstract": "Nowadays, there is an increasing number of applications where artificial intelligence has fuelled the research and development of new methods, techniques, and tools related to knowledge acquisition and data mining. The development of data mining and other related disciplines has benefited from the existence of large volumes of data proceeding from the most diverse sources and domains. KDD process and methods of data mining allows for the discovery of knowledge in data that is hidden to humans, presenting this knowledge under different ways. In this chapter, the relation of data mining with other disciplines is analyzed, an overview of data mining tasks and methods is presented, and also a possible classification of them is given. Finally, a brief discussion on issues associated to the discipline and future research directions are also given.", "venue": "", "year": 2021, "referenceCount": 12, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": "", "pages": "749-767", "name": ""}, "authors": [{"authorId": "145681642", "name": "A. Funes"}, {"authorId": "2285295", "name": "A. Dasso"}]}, {"paperId": "de7c003d0f7366009b1029de77767a7362d3b270", "externalIds": {"DBLP": "books/ox/22/Millican22", "DOI": "10.1093/oso/9780198862536.003.0002", "CorpusId": 220352838}, "url": "https://www.semanticscholar.org/paper/de7c003d0f7366009b1029de77767a7362d3b270", "title": "Alan Turing and Human-Like Intelligence", "abstract": "Alan Turing\u2019s model of computation (1936) is explicated in terms of the potential operations of a human \u201ccomputer\u201d, and his famous test for intelligence (1950) is based on indistinguishability from human verbal behaviour. But this chapter challenges the apparent human-centredness of the 1936 model, suggesting a focus instead on mathematical concepts, with human comparisons making an entrance only retrospectively. The 1950 account of intelligence also turns out to be far less human-centred than it initially appears to be, because the universality of computation makes human intelligence just one variety amongst many. It is only when Turing considers consciousness that he treats intelligence in a way that cannot properly be carried over to machines. But here he is mistaken, since his own work gave ample reason to reinterpret intelligence as sophisticated information processing for some purpose, and to divorce this from the subjective consciousness with which it is humanly associated.", "venue": "Human-Like Machine Intelligence", "year": 2021, "referenceCount": 37, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-13", "journal": {"pages": "24-51"}, "authors": [{"authorId": "144243903", "name": "P. Millican"}]}, {"paperId": "85c1275577e632238345dd89244ad29e59b326b6", "externalIds": {"DOI": "10.1057/9781137025609.0009", "CorpusId": 243270133}, "url": "https://www.semanticscholar.org/paper/85c1275577e632238345dd89244ad29e59b326b6", "title": "Historical Foundations", "abstract": null, "venue": "Knowing our World: An Artificial Intelligence Perspective", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Knowing our World: An Artificial Intelligence Perspective"}, "authors": [{"authorId": "1734779", "name": "G. Luger"}]}, {"paperId": "2085ab37ed7060af6317fd6a056027ed35a38b15", "externalIds": {"MAG": "31991298", "DOI": "10.1007/978-94-007-7914-3_11", "CorpusId": 140871729}, "url": "https://www.semanticscholar.org/paper/2085ab37ed7060af6317fd6a056027ed35a38b15", "title": "Artificial Agents and Their Moral Nature", "abstract": null, "venue": "Philosophical Studies Series", "year": 2021, "referenceCount": 37, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Philosophical Studies Series"}, "authors": [{"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "1fe347fadb14f670f83ed29d8748fa2300630bc9", "externalIds": {"DOI": "10.1353/nab.2020.0001", "CorpusId": 245506328}, "url": "https://www.semanticscholar.org/paper/1fe347fadb14f670f83ed29d8748fa2300630bc9", "title": "Beyond the Butterfly: Three Hundred Animal Species in Nabokov's Fiction", "abstract": "Abstract:While there are multiple journal articles and four book-length studies that pin down the butterflies in Nabokov's fiction and life, the larger fauna of Nabokov's fiction is comparatively unexplored. As I show in this note, in addition to Nabokov's more than 200 moths and butterflies, there are more than 300 animal species mentioned in his extant prose fiction. To inspire further research, the article lists Nabokov's 300 animal species in seven taxonomic classes and references the novels and novellas in which they appear. The list itself is an argument for the specificity and variety of Nabokov's writing, a testament to his tendency to meticulously label and categorize phenomena, and evidence of Nabokov's expansive interest in non-human animals. The list is also an argument for reading across Nabokov's works to identify characteristics that are otherwise difficult to see from focusing on a single work. While all of Nabokov's fictions have a range of animal species, the extraordinary range and biodiversity of Nabokov's fauna is only apparent from a macroscopic perspective. I suggest that no other Anglophone twentieth-century author wrote as expansively on animals as Nabokov.", "venue": "Nabokov Studies", "year": 2021, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-24", "journal": {"volume": "17", "pages": "115 - 120", "name": "Nabokov Studies"}, "authors": [{"authorId": "112961309", "name": "J. Warodell"}]}, {"paperId": "11f15abfd2cf32cd9e2e9eeb36d780fe5f9e4c59", "externalIds": {"MAG": "3092743570", "DOI": "10.1177/1478077120963366", "CorpusId": 225135608}, "url": "https://www.semanticscholar.org/paper/11f15abfd2cf32cd9e2e9eeb36d780fe5f9e4c59", "title": "Towards Hallucinating Machines - Designing with Computational Vision", "abstract": "There are particular similarities in how machines learn about the nature of their environment, and how humans learn to process visual stimuli. Machine Learning (ML), more specifically Deep Neural network algorithms rely on expansive image databases and various training methods (supervised, unsupervised) to \u201cmake sense\u201d out of the content of an image. Take for example how students of architecture learn to differentiate various architectural styles. Whether this be to differentiate between Gothic, Baroque or Modern Architecture, students are exposed to hundreds, or even thousands of images of the respective styles, while being trained by faculty to be able to differentiate between those styles. A reversal of the process, striving to produce imagery, instead of reading it and understanding its content, allows machine vision techniques to be utilized as a design methodology that profoundly interrogates aspects of agency and authorship in the presence of Artificial Intelligence in architecture design. This notion forms part of a larger conversation on the nature of human ingenuity operating within a posthuman design ecology. The inherent ability of Neural Networks to process large databases opens up the opportunity to sift through the enormous repositories of imagery generated by the architecture discipline through the ages in order to find novel and bespoke solutions to architectural problems. This article strives to demystify the romantic idea of individual artistic design choices in architecture by providing a glimpse under the hood of the inner workings of Neural Network processes, and thus the extent of their ability to inform architectural design. The approach takes cues from the language and methods employed by experts in Deep Learning such as Hallucinations, Dreaming, Style Transfer and Vision. The presented approach is the base for an in-depth exploration of its meaning as a cultural technique within the discipline. Culture in the extent of this article pertains to ideas such as the differentiation between symbolic and material cultures, in which symbols are defined as the common denominator of a specific group of people.1 The understanding and exchange of symbolic values is inherently connected to language and code, which ultimately form the ingrained texture of any form of coded environment, including the coded structure of Neural Networks. A first proof of concept project was devised by the authors in the form of the Robot Garden. What makes the Robot Garden a distinctively novel project is the motion from a purely two dimensional approach to designing with the aid of Neural Networks, to the exploration of 2D to 3D Neural Style Transfer methods in the design process.", "venue": "", "year": 2021, "referenceCount": 24, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-01", "journal": {"volume": "19", "pages": "88 - 103", "name": "International Journal of Architectural Computing"}, "authors": [{"authorId": "2100074484", "name": "Matias del Campo"}, {"authorId": "144042760", "name": "Alexandra Carlson"}, {"authorId": "70563987", "name": "Sandra Manninger"}]}, {"paperId": "286cfbcab2c1fa8e958ea78aa8e59fd1746e683b", "externalIds": {"PubMedCentral": "7862130", "DOI": "10.3389/fpsyt.2020.622506", "CorpusId": 231667243, "PubMed": "33551883"}, "url": "https://www.semanticscholar.org/paper/286cfbcab2c1fa8e958ea78aa8e59fd1746e683b", "title": "Psychiatric Advance Directives and Artificial Intelligence: A Conceptual Framework for Theoretical and Ethical Principles", "abstract": "The patient's decision-making abilities are often altered in psychiatric disorders. The legal framework of psychiatric advance directives (PADs) has been made to provide care to patients in these situations while respecting their free and informed consent. The implementation of artificial intelligence (AI) within Clinical Decision Support Systems (CDSS) may result in improvements for complex decisions that are often made in situations covered by PADs. Still, it raises theoretical and ethical issues this paper aims to address. First, it goes through every level of possible intervention of AI in the PAD drafting process, beginning with what data sources it could access and if its data processing competencies should be limited, then treating of the opportune moments it should be used and its place in the contractual relationship between each party (patient, caregivers, and trusted person). Second, it focuses on ethical principles and how these principles, whether they are medical principles (autonomy, beneficence, non-maleficence, justice) applied to AI or AI principles (loyalty and vigilance) applied to medicine, should be taken into account in the future of the PAD drafting process. Some general guidelines are proposed in conclusion: AI must remain a decision support system as a partner of each party of the PAD contract; patients should be able to choose a personalized type of AI intervention or no AI intervention at all; they should stay informed, i.e., understand the functioning and relevance of AI thanks to educational programs; finally, a committee should be created for ensuring the principle of vigilance by auditing these new tools in terms of successes, failures, security, and relevance.", "venue": "Frontiers in Psychiatry", "year": 2021, "referenceCount": 76, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-01-22", "journal": {"volume": "11", "name": "Frontiers in Psychiatry"}, "authors": [{"authorId": "5324084", "name": "S. Mouchabac"}, {"authorId": "3616253", "name": "V. Adrien"}, {"authorId": "2080923523", "name": "Clara Falala-S\u00e9chet"}, {"authorId": "5928243", "name": "O. Bonnot"}, {"authorId": "1397137129", "name": "R. Maatoug"}, {"authorId": "35355439", "name": "B. Millet"}, {"authorId": "51077430", "name": "C. Peretti"}, {"authorId": "4289078", "name": "A. Bourla"}, {"authorId": "39463641", "name": "F. Ferreri"}]}, {"paperId": "d610883959b223912b4c1a54de97ab6a8cbddfca", "externalIds": {"DBLP": "journals/ficn/NemzerCWMPCL20", "PubMedCentral": "7820784", "DOI": "10.3389/fncom.2020.583350", "CorpusId": 231687293, "PubMed": "33488373"}, "url": "https://www.semanticscholar.org/paper/d610883959b223912b4c1a54de97ab6a8cbddfca", "title": "Critical and Ictal Phases in Simulated EEG Signals on a Small-World Network", "abstract": "Healthy brain function is marked by neuronal network dynamics at or near the critical phase, which separates regimes of instability and stasis. A failure to remain at this critical point can lead to neurological disorders such as epilepsy, which is associated with pathological synchronization of neuronal oscillations. Using full Hodgkin-Huxley (HH) simulations on a Small-World Network, we are able to generate synthetic electroencephalogram (EEG) signals with intervals corresponding to seizure (ictal) or non-seizure (interictal) states that can occur based on the hyperexcitability of the artificial neurons and the strength and topology of the synaptic connections between them. These interictal simulations can be further classified into scale-free critical phases and disjoint subcritical exponential phases. By changing the HH parameters, we can model seizures due to a variety of causes, including traumatic brain injury (TBI), congenital channelopathies, and idiopathic etiologies, as well as the effects of anticonvulsant drugs. The results of this work may be used to help identify parameters from actual patient EEG or electrocorticographic (ECoG) data associated with ictogenesis, as well as generating simulated data for training machine-learning seizure prediction algorithms.", "venue": "Frontiers Comput. Neurosci.", "year": 2021, "referenceCount": 36, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-08", "journal": {"volume": "14", "name": "Frontiers in Computational Neuroscience"}, "authors": [{"authorId": "4141899", "name": "Louis R. Nemzer"}, {"authorId": "8057148", "name": "G. Cravens"}, {"authorId": "2338443", "name": "R. Worth"}, {"authorId": "2073445079", "name": "Francis Motta"}, {"authorId": "3395254", "name": "A. Placzek"}, {"authorId": "2072746801", "name": "Victor Castro"}, {"authorId": "2047175009", "name": "J. Q. Lou"}]}, {"paperId": "ca510778acd3ce5389b1eb1f2554e4d8ac454abe", "externalIds": {"PubMedCentral": "7874145", "DOI": "10.3389/fpsyg.2020.513474", "CorpusId": 230507889, "PubMed": "33584394"}, "url": "https://www.semanticscholar.org/paper/ca510778acd3ce5389b1eb1f2554e4d8ac454abe", "title": "Artificial Intelligence Is Stupid and Causal Reasoning Will Not Fix It", "abstract": "Artificial Neural Networks have reached \u201cgrandmaster\u201d and even \u201csuper-human\u201d performance across a variety of games, from those involving perfect information, such as Go, to those involving imperfect information, such as \u201cStarcraft\u201d. Such technological developments from artificial intelligence (AI) labs have ushered concomitant applications across the world of business, where an \u201cAI\u201d brand-tag is quickly becoming ubiquitous. A corollary of such widespread commercial deployment is that when AI gets things wrong\u2014an autonomous vehicle crashes, a chatbot exhibits \u201cracist\u201d behavior, automated credit-scoring processes \u201cdiscriminate\u201d on gender, etc.\u2014there are often significant financial, legal, and brand consequences, and the incident becomes major news. As Judea Pearl sees it, the underlying reason for such mistakes is that \u201c... all the impressive achievements of deep learning amount to just curve fitting.\u201d The key, as Pearl suggests, is to replace \u201creasoning by association\u201d with \u201ccausal reasoning\u201d \u2014the ability to infer causes from observed phenomena. It is a point that was echoed by Gary Marcus and Ernest Davis in a recent piece for the New York Times: \u201cwe need to stop building computer systems that merely get better and better at detecting statistical patterns in data sets\u2014often using an approach known as \u2018Deep Learning\u2019\u2014and start building computer systems that from the moment of their assembly innately grasp three basic concepts: time, space, and causality.\u201d In this paper, foregrounding what in 1949 Gilbert Ryle termed \u201ca category mistake\u201d, I will offer an alternative explanation for AI errors; it is not so much that AI machinery cannot \u201cgrasp\u201d causality, but that AI machinery (qua computation) cannot understand anything at all.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 90, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-01-05", "journal": {"volume": "11", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "143766695", "name": "J. Bishop"}]}, {"paperId": "d5c5bbf0070e795bb945f86195225971cbe36761", "externalIds": {"MAG": "1516634171", "DOI": "10.1215/9780822385691-008", "CorpusId": 191215183}, "url": "https://www.semanticscholar.org/paper/d5c5bbf0070e795bb945f86195225971cbe36761", "title": "Helmholtz, Edison, and Sound History", "abstract": null, "venue": "Memory Bytes", "year": 2020, "referenceCount": 4, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-12-31", "journal": {"name": "Memory Bytes"}, "authors": [{"authorId": "20392546", "name": "J. Peters"}]}, {"paperId": "56d5a9607f8f957e20894ba58d567f53368ef37e", "externalIds": {"MAG": "3156071625", "DOI": "10.22219/JIBE.V4I02.14442", "CorpusId": 234984119}, "url": "https://www.semanticscholar.org/paper/56d5a9607f8f957e20894ba58d567f53368ef37e", "title": "The games of imitation: AI and a philosophy towards future equilibrium", "abstract": "This brief conceptual article starts with an argument for Artificial Intelligence (AI)\u2019s ability to \u201cthink.\u201d\u00a0 This outgrowth relates to human\u2019s and AI\u2019s power over nature, and to AI\u2019s increasing power in its humanness, measured by the results of competing with humans and other AI machines in the Turing Test, and economic \u201cgame theory.\u201d\u00a0 Both, and especially the latter challenge, can be quintessentially human by measuring how one values the self as opposed to society, under varying conditions.\u00a0 Given AI\u2019s advancements enabling it to presumably \u201cwin\u201d in the most humanness of games, beyond even reaching a universally beneficial \u201csocial optimal\u201d outcome, and thus possibly even having more power than humankind, the article argues for an equilibrium of balanced powers in innovation between AI and humans.\u00a0 Therefore, managers, broadly construed, can function as key brokers between government policy makers and innovators as AI and humans continue to develop further into the future.", "venue": "Journal of Innovation in Business and Economics", "year": 2020, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-12-31", "journal": {"name": "Journal of Innovation in Business and Economics"}, "authors": [{"authorId": "47453091", "name": "Todd J. Barry"}]}, {"paperId": "2babb844e491bffa85c00334b9c30a376f58b832", "externalIds": {"DOI": "10.17705/1thci.00138", "CorpusId": 231843793}, "url": "https://www.semanticscholar.org/paper/2babb844e491bffa85c00334b9c30a376f58b832", "title": "Exploring the Intersection of the Digital Divide and Artificial Intelligence: A Hermeneutic Literature Review", "abstract": "Given the rapid advancements in information communication technology (ICT), researchers and practitioners need to understand the impact that emerging phenomena, such as artificial intelligence (AI), have on existing social and economic challenges. We conducted a hermeneutic literature review to present the current state of the digital divide, developments in AI, and AI\u2019s potential impact on the digital divide. We propose three theoretical framings: 1) conceptualizing the divide, 2) modeling the divide, and 3) analyzing the divide. These framings synthesize the digital divide\u2019s essence in relation to AI and provide the foundation for a socio-technical research agenda for the digital divide in light of the evolving phenomena of AI.", "venue": "AIS Transactions on Human-Computer Interaction", "year": 2020, "referenceCount": 137, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2020-12-31", "journal": {"name": "AIS Transactions on Human-Computer Interaction"}, "authors": [{"authorId": "82889750", "name": "Lemuria D. Carter"}, {"authorId": "2144413377", "name": "Dapeng Liu"}, {"authorId": "119848406", "name": "Caley Cantrell"}]}, {"paperId": "e4fef9d11eb31f341bdbe210cff29a9513234995", "externalIds": {"MAG": "2500251765", "DOI": "10.1215/9780822385691-011", "CorpusId": 193372312}, "url": "https://www.semanticscholar.org/paper/e4fef9d11eb31f341bdbe210cff29a9513234995", "title": "Bodies of Texts, Bodies of Subjects: Metaphoric Networks in New Media", "abstract": null, "venue": "Memory Bytes", "year": 2020, "referenceCount": 3, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology", "Art"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Art", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-12-31", "journal": {"name": "Memory Bytes"}, "authors": [{"authorId": "1969743", "name": "N. K. Hayles"}]}, {"paperId": "0cd645e350f9914596104d230ec65a67c5c28ac1", "externalIds": {"MAG": "2479409415", "DOI": "10.1215/9780822385691-004", "CorpusId": 148384670}, "url": "https://www.semanticscholar.org/paper/0cd645e350f9914596104d230ec65a67c5c28ac1", "title": "The Erasure and Construction of History for the Information Age: Positivism and Its Critics", "abstract": null, "venue": "Memory Bytes", "year": 2020, "referenceCount": 4, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": null, "publicationDate": "2020-12-31", "journal": {"name": "Memory Bytes"}, "authors": [{"authorId": "1774755", "name": "R. Day"}]}, {"paperId": "c1f4f6a5697251dd6ab3cc59597b12f69b4302c1", "externalIds": {"MAG": "3121313989", "DOI": "10.17650/2686-9594-2020-10-3-4-60-64", "CorpusId": 234398149}, "url": "https://www.semanticscholar.org/paper/c1f4f6a5697251dd6ab3cc59597b12f69b4302c1", "title": "\u0418\u0441\u043a\u0443\u0441\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u0438\u043d\u0442\u0435\u043b\u043b\u0435\u043a\u0442 \u0432 \u043e\u043d\u043a\u043e\u0445\u0438\u0440\u0443\u0440\u0433\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435", "abstract": "The aim of this literature review was to a highlight the basic concepts of artificial intelligence in medicine, focusing on the application of this area of technological development in changes of surgery. PubMed and Google searches were performed using the key words \u201cartificial intelligence\u201d, \u201csurgery\u201d. Further references were obtained by cross-referencing the key articles. The integration of artificial intelligence into surgical practice will take place in the field of education, storage and processing of medical data and the speed of implementation will be in direct proportion to the cost of labor and the need for \u201ctransparency\u201d of statistical data.", "venue": "", "year": 2020, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2020-12-30", "journal": {"volume": "10", "pages": "60-64", "name": ""}, "authors": [{"authorId": "66650196", "name": "\u041f. \u0412. \u041c\u0435\u043b\u044c\u043d\u0438\u043a\u043e\u0432"}, {"authorId": "2091249397", "name": "\u0412 \u041d \u0414\u043e\u0432\u0435\u0434\u043e\u0432"}, {"authorId": "148515410", "name": "\u0414. \u042e. \u041a\u0430\u043d\u043d\u0435\u0440"}, {"authorId": "83321957", "name": "\u0418. \u041b. \u0427\u0435\u0440\u043d\u0438\u043a\u043e\u0432\u0441\u043a\u0438\u0438\u0306"}]}, {"paperId": "470889e2e5493613c641160e9e4b0d5cc2180b7b", "externalIds": {"DBLP": "journals/corr/abs-2012-15015", "ArXiv": "2012.15015", "CorpusId": 229924339}, "url": "https://www.semanticscholar.org/paper/470889e2e5493613c641160e9e4b0d5cc2180b7b", "title": "OpenViDial: A Large-Scale, Open-Domain Dialogue Dataset with Visual Contexts", "abstract": "When humans converse, what a speaker will say next significantly depends on what he sees. Unfortunately, existing dialogue models generate dialogue utterances only based on preceding textual contexts, and visual contexts are rarely considered. This is due to a lack of a large-scale multi-module dialogue dataset with utterances paired with visual contexts. In this paper, we release OpenViDial, a largescale multi-module dialogue dataset. The dialogue turns and visual contexts are extracted from movies and TV series, where each dialogue turn is paired with the corresponding visual context in which it takes place. OpenViDial contains a total number of 1.1 million dialogue turns, and thus 1.1 million visual contexts stored in images. Based on this dataset, we propose a family of encoder-decoder models leveraging both textual and visual contexts, from coarse-grained image features extracted from CNNs to finegrained object features extracted from Faster R-CNNs. We observe that visual information significantly improves dialogue generation qualities, verifying the necessity of integrating multi-modal features for dialogue learning. Our work marks an important step towards large-scale multi-modal dialogue learning.1", "venue": "ArXiv", "year": 2020, "referenceCount": 108, "citationCount": 11, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-12-30", "journal": {"volume": "abs/2012.15015", "name": "ArXiv"}, "authors": [{"authorId": "65844131", "name": "Yuxian Meng"}, {"authorId": "2109514219", "name": "Shuhe Wang"}, {"authorId": "5439717", "name": "Qinghong Han"}, {"authorId": "2109329406", "name": "Xiaofei Sun"}, {"authorId": "144894837", "name": "Fei Wu"}, {"authorId": "2055863231", "name": "Rui Yan"}, {"authorId": "49298465", "name": "Jiwei Li"}]}, {"paperId": "f938de8a158bdef5d94268e7a5d30159474bbb1d", "externalIds": {"MAG": "3116947976", "DOI": "10.21923/jesd.833224", "CorpusId": 234451544}, "url": "https://www.semanticscholar.org/paper/f938de8a158bdef5d94268e7a5d30159474bbb1d", "title": "YAPAY ZEKA ET\u0130\u011e\u0130 \u00c7ER\u00c7EVES\u0130NDE GELECE\u011e\u0130N \u0130\u015eLETMELER\u0130: D\u00d6N\u00dc\u015e\u00dcM VE PARAD\u0130GMA DE\u011e\u0130\u015e\u0130KL\u0130KLER\u0130", "abstract": "Although the 21st Century is a time period in which the innovative solutions of Artificial Intelligence are felt intensely in daily life, it is engraved in the memories as a rapidly advancing century under the leadership by Artificial Intelligence based technologies. While Artificial Intelligence continue to build the future of humanity and the world with autonomous intelligent systems, they also bring various anxieties. Especially, it is a matter of curiosity how ethical and moral factors pushing people to paradoxical situations will be evaluated by intelligent systems, and it is often discussed whether such systems will be a threat for human life. Based on the explanations so far, objective of this study is to discuss various transformation processes and also recent paradigm changes that may be important for enterprises of the future, by considering the scope of Ethical Artificial Intelligence. In this context, general information regarding essentials of Artificial Intelligence and its applications in enterprises were given first, and then possible problems on ethical scope and solution suggestions were discussed. It is thought that this study will be a reference for Artificial Intelligence applications in enterprises of the future, and its management in the related context.", "venue": "M\u00fchendislik Bilimleri ve Tasar\u0131m Dergisi", "year": 2020, "referenceCount": 86, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-12-29", "journal": {"name": "M\u00fchendislik Bilimleri ve Tasar\u0131m Dergisi"}, "authors": [{"authorId": "50843680", "name": "Utku K\u00f6se"}]}, {"paperId": "4db1352d5519bfe4096d9f60ee149bbc99e77213", "externalIds": {"DBLP": "journals/corr/abs-2012-13803", "MAG": "2495645321", "ArXiv": "2012.13803", "DOI": "10.1016/b978-0-12-802508-6.00020-x", "CorpusId": 152122638}, "url": "https://www.semanticscholar.org/paper/4db1352d5519bfe4096d9f60ee149bbc99e77213", "title": "Analogy, Mind, and Life", "abstract": null, "venue": "ArXiv", "year": 2020, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology", "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-12-26", "journal": {"volume": "abs/2012.13803", "name": "ArXiv"}, "authors": [{"authorId": "39949932", "name": "V. D. Pereira"}]}, {"paperId": "ab37933fd5cb62af283d9a74f681f069e13b5479", "externalIds": {"MAG": "3127047058", "DOI": "10.47850/S.2020.1.4", "CorpusId": 234398647}, "url": "https://www.semanticscholar.org/paper/ab37933fd5cb62af283d9a74f681f069e13b5479", "title": "\u0421\u0412\u0415\u0420\u0425\u041a\u0420\u0418\u0422\u0418\u0427\u0415\u0421\u041a\u0418\u0419 \u041c\u041e\u0417\u0413 \u0422\u042c\u042e\u0420\u0418\u041d\u0413\u0410 \u0418 \u0423\u0421\u0418\u041b\u0418\u0422\u0415\u041b\u0418 \u0421\u0412\u041e\u0411\u041e\u0414\u041d\u042b\u0425 \u0411\u0418\u0422\u041e\u0412: \u0425\u041e\u0420\u041e\u0428\u0410 \u041b\u0418 \u0413\u0418\u041f\u041e\u0422\u0415\u0417\u0410 \u041a\u0412\u0410\u041d\u0422\u041e\u0412\u041e\u0413\u041e \u041c\u041e\u0417\u0413\u0410?", "abstract": "This article reviews arguments for the quantum brain hypothesis and against it. According to this hypothesis, quantum fluctuations within nerve cells and at synaptic clefts are able to amplify and translate their states to the brain's macrostructures level. Proponents appeal to the theory of neural avalanches, arguments about the non-equilibrium nature of cerebral dynamics and the theory of nonsynaptic signal transmission. Opponents insist that the thermodynamic conditions of nervous tissue prevent the emergence of quantum coherence and other macro-scopic quantum effects; the brain is not enough isolated from the environment to observe such effects. All quantum fluctuations have to be are averaged and their computational role have to be eliminated.", "venue": "", "year": 2020, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2020-12-25", "journal": {"volume": "", "pages": "17-21", "name": ""}, "authors": [{"authorId": "2091628807", "name": "Dmitri Vinnik"}]}, {"paperId": "0ec07e7fbb93ddbc092d6340e07505efa31ee541", "externalIds": {"MAG": "3117313184", "DOI": "10.3390/electronics9122207", "CorpusId": 234416004}, "url": "https://www.semanticscholar.org/paper/0ec07e7fbb93ddbc092d6340e07505efa31ee541", "title": "Sensing Occupancy through Software: Smart Parking Proof of Concept", "abstract": "In order to detect the vehicle presence in parking slots, different approaches have been utilized, which range from image recognition to sensing via detection nodes. The last one is usually based on getting the presence data from one or more sensors (commonly magnetic or IR-based), controlled and processed by a micro-controller that sends the data through radio interface. Consequently, given nodes have multiple components, adequate software is required for its control and state-machine to communicate its status to the receiver. This paper presents an alternative, cost-effective beacon-based mechanism for sensing the vehicle presence. It is based on the well-known effect that, once the metallic obstacle (i.e., vehicle) is on top of the sensing node, the signal strength will be attenuated, while the same shall be recognized at the receiver side. Therefore, the signal strength change conveys the information regarding the presence. Algorithms processing signal strength change at the receiver side to estimate the presence are required due to the stochastic nature of signal strength parameters. In order to prove the concept, experimental setup based on LoRa-based parking sensors was used to gather occupancy/signal strength data. In order to extract the information of presence, the Hidden Markov Model (HMM) was employed with accuracy of up to 96%, while the Neural Network (NN) approach reaches an accuracy of up to 97%. The given approach reduces the costs of the sensor production by at least 50%.", "venue": "", "year": 2020, "referenceCount": 87, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-12-21", "journal": {"volume": "9", "pages": "2207", "name": "Electronics"}, "authors": [{"authorId": "2125426810", "name": "Lea Duji\u0107 Rodi\u0107"}, {"authorId": "49597732", "name": "T. Perkovi\u0107"}, {"authorId": "2008210813", "name": "Tomislav Zupanovic"}, {"authorId": "2234961", "name": "P. \u0160oli\u0107"}]}, {"paperId": "9754d77ab8b72ca5ca3aad6c1174b41bcc3e7902", "externalIds": {"MAG": "3114248311", "DOI": "10.1007/978-3-030-54522-2_11", "CorpusId": 234344512}, "url": "https://www.semanticscholar.org/paper/9754d77ab8b72ca5ca3aad6c1174b41bcc3e7902", "title": "Research Programs Based on Machine Intelligence Games", "abstract": null, "venue": "Philosophy of Engineering and Technology", "year": 2020, "referenceCount": 35, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-12-21", "journal": {"name": "Philosophy of Engineering and Technology"}, "authors": [{"authorId": "2527878", "name": "G. Tamburrini"}, {"authorId": "13396020", "name": "F. Altiero"}]}, {"paperId": "a3aae7cdbf7d1e9e0f706cf362e334d349dbeaed", "externalIds": {"MAG": "3117770582", "DOI": "10.1111/medu.14441", "CorpusId": 229341557, "PubMed": "33346919"}, "url": "https://www.semanticscholar.org/paper/a3aae7cdbf7d1e9e0f706cf362e334d349dbeaed", "title": "When I say\u2026 empathic dissonance", "abstract": "As I entered the OSCE station, I ran through my mental checklist: smile and shake my examiner's hand, warmly greet the patient, obtain a detailed history, and make an empathic statement. The station was going well, I gathered a comprehensive history and established a strong rapport. However, when I made my pre-rehearsed statement of empathy, \"I'm sorry to hear that\", I felt like a fraud. I didn't really empathise with this patient; the statement was wholly untruthful. I made the statement to tick a box on the mark sheet.", "venue": "Medical education", "year": 2020, "referenceCount": 3, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-12-21", "journal": {"volume": "55", "name": "Medical Education"}, "authors": [{"authorId": "11916654", "name": "William F Laughey"}, {"authorId": "50288284", "name": "M. E. Brown"}, {"authorId": "2039993523", "name": "Emelia G Palmer"}, {"authorId": "4023277", "name": "G. Finn"}]}, {"paperId": "cd6c40dec0a171d4263a75581d9b84bc8a41d32e", "externalIds": {"MAG": "3116448955", "DOI": "10.48070/ERUSOSBILDER.838193", "CorpusId": 234572202}, "url": "https://www.semanticscholar.org/paper/cd6c40dec0a171d4263a75581d9b84bc8a41d32e", "title": "Artificial intelligence and robotic technologies in tourism and hospitality industry", "abstract": "Dunya genelinde hizla yayilan ve yaygin olarak kullanilmaya baslanan yapay zek\u00e2 uygulamalari ile robotik teknolojiler konularinin literaturde farkli disiplinlerce ele alindigi gorulmektedir. Turizm alani da bu konularda son yillarda calismalarin gerceklestirildigi disiplinlerden biri olarak dikkat cekmektedir. Bu baglamda, turizm sektorunun uygulama alanlarinda robotlar on plana cikmaktadir. Ancak turizm sektorunde her gecen gun kullanimi giderek yayginlasan veya yayginlasma ihtimali olan pek cok yapay zek\u00e2 uygulamalarinin da oldugu bilinmektedir. Bu noktadan hareketle, kavramsal bir calisma ozelligi tasiyan bu calismada literaturden hareketle, oncelikle yapay zek\u00e2 uygulamalari ve robotik teknolojiler degerlendirilmis, bu teknolojilerinin gelisimi ortaya konulmus, ardindan turizm ve agirlama endustrisinde kullanilan guncel teknolojiler irdelenmis ve sonuc olarak bu teknolojilerin turizm ve agirlama endustrisindeki gelecegi tartisilmistir. Bu baglamda, mevcut durumun ortaya konuldugu ve sektor deneyimli yazarlarin gelecege donuk cikarimlarda bulundugu bu calismanin literature ve sektor uygulayicilarina katkilar saglayabilecek nitelikte onemli bir calisma oldugu soylenebilir.", "venue": "", "year": 2020, "referenceCount": 64, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2020-12-18", "journal": {"volume": "", "pages": "353-380", "name": ""}, "authors": [{"authorId": "2092437975", "name": "R. K\u0131l\u0131\u00e7han"}, {"authorId": "2053876529", "name": "M. Y\u0131lmaz"}]}, {"paperId": "9a76dfbfaeafd58b0ea28eb3bbee148c2c046861", "externalIds": {"MAG": "3121003525", "DOI": "10.32628/IJSRSET1207625", "CorpusId": 234591813}, "url": "https://www.semanticscholar.org/paper/9a76dfbfaeafd58b0ea28eb3bbee148c2c046861", "title": "Review of Artificial Intelligence", "abstract": "Over many centuries, tools of increasing sophistication have been developed to serve the human race Digital computers are, in many respects, just another tool. They can perform the same sort of numerical and symbolic manipulations that an ordinary person can, but faster and more reliably. This paper represents review of artificial intelligence algorithms applying in computer application and software. Include knowledge-based systems; computational intelligence, which leads to Artificial intelligence, is the science of mimicking human mental faculties in a computer. That assists Physician to make dissection in medical diagnosis.", "venue": "", "year": 2020, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2020-12-15", "journal": {"volume": "7", "pages": "143-171", "name": "International journal of scientific research in science, engineering and technology"}, "authors": [{"authorId": "2092189206", "name": "K. P. V. S. Aakarsh"}, {"authorId": "2089924467", "name": "Adwin Manhar"}]}], "references": [{"paperId": "0a1ee16ba104a80ae8ee4a59cfd6bd68c02fca99", "externalIds": {"MAG": "2004859951", "DOI": "10.1002/phbl.19510070409", "CorpusId": 120729071}, "url": "https://www.semanticscholar.org/paper/0a1ee16ba104a80ae8ee4a59cfd6bd68c02fca99", "title": "Hartree: CALCULATING INSTRUMENTS AND MACHINES/Schaefer: MAXWELL'SCHE THEORIE/Teichmann: EINF\u00dcHRUNG IN DIE QUANTENPHYSIK/Bomke und Gefahrt: THEORIE DER AUSBREITUNG ELEKTROMAGNETISCHER WELLEN/Ramsauer: PHYSIK \u2010 TECHNIK \u2010 P\u00c4DAGOGIK", "abstract": null, "venue": "", "year": 1951, "referenceCount": 0, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}], "publicationTypes": null, "publicationDate": "1951-04-01", "journal": {"volume": "7", "pages": "187-189", "name": "Physikalische Bl\u00e4tter"}, "authors": [{"authorId": "46855367", "name": "H. Unger"}, {"authorId": "92758245", "name": "G. Leibfried"}, {"authorId": "51361652", "name": "W. Braunbek"}, {"authorId": "93484313", "name": "H. D\u00f6ring"}, {"authorId": "32381567", "name": "H. Walch"}]}, {"paperId": "348f436fd9a3965f5ff17db031a9f43426f89b8e", "externalIds": {"MAG": "2800648615", "DOI": "10.2307/3610576", "CorpusId": 58879058}, "url": "https://www.semanticscholar.org/paper/348f436fd9a3965f5ff17db031a9f43426f89b8e", "title": "Calculating Instruments and Machines", "abstract": "1. Introduction 2. The differential analyser 3. The differential analyser and partial differential equations 4. Some other instruments 5. Introduction to large automatic digital machines 6. Charles Babbage and the analytical engine 7. The first stage of development 8. Projects and prospects 9. High-speed automatic digital machines and numerical analysis References Names index Subject index.", "venue": "", "year": 1951, "referenceCount": 0, "citationCount": 103, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1951-02-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "16620717", "name": "D. Hartree"}]}, {"paperId": "55ddf1b6cbe79b963a5a9d4da6e0a15e0d6761b5", "externalIds": {"MAG": "1991116412", "DOI": "10.1136/bmj.1.4616.1105", "CorpusId": 5252434, "PubMed": "18153422"}, "url": "https://www.semanticscholar.org/paper/55ddf1b6cbe79b963a5a9d4da6e0a15e0d6761b5", "title": "The Mind of Mechanical Man*", "abstract": "No better example could be found of man's characteristic desire for knowledge beyond, and far beyond, the limits of the authentic scientific discoveries of his own day than his wish to understand in complete detail the relationship between brain and mind-the one so finite, the other so amorphous and elusive. It is a subject which at present awakes a renewed interest, because we are invaded by the physicists and mathematicians-an invasion by no means unwelcome, bringing as it does new suggestions for analogy and comparison. We feel perhaps that we are being pushed, gently not roughly pushed, to accept the great likeness between the actions of electronic machines and those of the nervous system. At the same time we may misunderstand this invitation, and go beyond it to too ready an affirmation that there is identity. We should be wise to examine the nature of this concept and to see how far the electro-physicists share with us a common road. Medicine is placed by these suggestions in a familiar predicament. I refer to the dangers of our being unintentionally misled by pure science. Medical history furnishes many examples, such as the planetary and chemical theories of disease that were the outcome of the Scientific Renaissance. We are the same people as our ancestors and prone to their mistakes. We should reflect that if we go too far and too fast no one will deride us more unashamedly than the scientists who have tempted us. Discussion of mind-brain relations is, I know well, premature, but I suspect that it always will be premature, taking heart from a quotation that I shall make from Hughlings Jackson-not one of his best-known passages -because it may have been thought to be a sad lapse on his part. I believe it myself to be both true and useful, and so I repeat it.", "venue": "British medical journal", "year": 1949, "referenceCount": 0, "citationCount": 85, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1949-06-25", "journal": {"volume": "1", "pages": "1105 - 1110", "name": "British Medical Journal"}, "authors": [{"authorId": "143693546", "name": "G. Jefferson"}]}, {"paperId": "ab7790485f26ce65f9d83dd700c43e49058bdd2b", "externalIds": {"MAG": "2022731279", "DBLP": "journals/x/Turing37", "DOI": "10.1112/PLMS/S2-42.1.230", "CorpusId": 73712}, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", "title": "On computable numbers, with an application to the Entscheidungsproblem", "abstract": "1. Computing machines. 2. Definitions. Automatic machines. Computing machines. Circle and circle-free numbers. Computable sequences and numbers. 3. Examples of computing machines. 4. Abbreviated tables Further examples. 5. Enumeration of computable sequences. 6. The universal computing machine. 7. Detailed description of the universal machine. 8. Application of the diagonal process. Pagina 1 di 38 On computable numbers, with an application to the Entscheidungsproblem A. M. ...", "venue": "Proc. London Math. Soc.", "year": 2021, "referenceCount": 81, "citationCount": 8278, "influentialCitationCount": 530, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": "s2-42", "pages": "230-265", "name": "Proc. London Math. Soc."}, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "91cdf5792afdcc31b4c6857f1757a6c154ebe109", "externalIds": {"MAG": "2327957545", "DOI": "10.2307/2268801", "CorpusId": 124080558}, "url": "https://www.semanticscholar.org/paper/91cdf5792afdcc31b4c6857f1757a6c154ebe109", "title": "General Recursive Functions of Natural Numbers.", "abstract": null, "venue": "", "year": 1937, "referenceCount": 0, "citationCount": 38, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "1937-03-01", "journal": {"volume": "2", "pages": "38", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "16803104", "name": "R\u00f3zsa P\u00e9ter"}, {"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": null, "externalIds": null, "url": null, "title": "London Math. Soc", "abstract": null, "venue": "London Math. Soc", "year": 1937, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "c3483f7feb078b61d2ecd346d60dc78797e38869", "externalIds": {"MAG": "2023778211", "DOI": "10.1007/BF01565439", "CorpusId": 120517999}, "url": "https://www.semanticscholar.org/paper/c3483f7feb078b61d2ecd346d60dc78797e38869", "title": "General recursive functions of natural numbers", "abstract": null, "venue": "", "year": 1936, "referenceCount": 3, "citationCount": 497, "influentialCitationCount": 26, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "1936-12-01", "journal": {"volume": "112", "pages": "727-742", "name": "Mathematische Annalen"}, "authors": [{"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": "60400c043b2624f9cfc2d8daa0f45f3c1d524de3", "externalIds": {"MAG": "2323777246", "DOI": "10.2307/2371045", "CorpusId": 14181275}, "url": "https://www.semanticscholar.org/paper/60400c043b2624f9cfc2d8daa0f45f3c1d524de3", "title": "An Unsolvable Problem of Elementary Number Theory", "abstract": "Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. The JSTOR Archive is a trusted digital repository providing for long-term preservation and access to leading academic journals and scholarly literature from around the world. The Archive is supported by libraries, scholarly societies, publishers, and foundations. It is an initiative of JSTOR, a not-for-profit organization with a mission to help the scholarly community take advantage of advances in technology. For more information regarding JSTOR, please contact support@jstor.org.", "venue": "", "year": 1936, "referenceCount": 0, "citationCount": 1633, "influentialCitationCount": 118, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1936-04-01", "journal": {"volume": "58", "pages": "345", "name": "American Journal of Mathematics"}, "authors": [{"authorId": "144144981", "name": "A. Church"}]}, {"paperId": "f40d8a9ce6bd4f5e9dd3e3249022c13c8aa27084", "externalIds": {"MAG": "2325612495", "DOI": "10.2307/2371199", "CorpusId": 125013320}, "url": "https://www.semanticscholar.org/paper/f40d8a9ce6bd4f5e9dd3e3249022c13c8aa27084", "title": "A Theory of Positive Integers in Formal Logic. Part II", "abstract": null, "venue": "", "year": 1935, "referenceCount": 0, "citationCount": 103, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "57", "pages": "153", "name": "American Journal of Mathematics"}, "authors": [{"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": "c3f7ad4b2af9d9888be85a8a376c61e7a612acc2", "externalIds": {"MAG": "2114804254", "DOI": "10.1007/S00605-006-0423-7", "CorpusId": 122418555}, "url": "https://www.semanticscholar.org/paper/c3f7ad4b2af9d9888be85a8a376c61e7a612acc2", "title": "\u00dcber formal unentscheidbare S\u00e4tze der Principia Mathematica und verwandter Systeme I", "abstract": null, "venue": "", "year": 1931, "referenceCount": 2, "citationCount": 2122, "influentialCitationCount": 104, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "1931-12-01", "journal": {"volume": "149", "pages": "1-29", "name": "Monatshefte f\u00fcr Mathematik"}, "authors": [{"authorId": "2071836187", "name": "K. G\u00f6del"}]}, {"paperId": null, "externalIds": null, "url": null, "title": "The Book of the ,IIachines", "abstract": null, "venue": "The Book of the ,IIachines", "year": 1865, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": null, "externalIds": null, "url": null, "title": "Translator's notes t c an artlcle on Babbage's Analytical Engire", "abstract": null, "venue": "Translator's notes t c an artlcle on Babbage's Analytical Engire", "year": 1842, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": null, "externalIds": null, "url": null, "title": "Victoria University of Manchester. return to index FOOT NOTES", "abstract": null, "venue": "Victoria University of Manchester. return to index FOOT NOTES", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": null, "externalIds": null, "url": null, "title": "Author's names in italics refer to the Bibliography", "abstract": null, "venue": "Author's names in italics refer to the Bibliography", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": null, "externalIds": null, "url": null, "title": "Compare Lady Lovelace's statement (p.450), which does not contain the word 'only", "abstract": null, "venue": "Compare Lady Lovelace's statement (p.450), which does not contain the word 'only", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": null, "externalIds": null, "url": null, "title": "Or rather 'programmed in' for our child-machine will be programmed in a digital computer. But the logical system will not have to be learnt", "abstract": null, "venue": "Or rather 'programmed in' for our child-machine will be programmed in a digital computer. But the logical system will not have to be learnt", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}]} +{"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", "CorpusId": 14636783}, "corpusId": 14636783, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", "title": "Computing Machinery and Intelligence", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous. If the meaning of the words \u201cmachine\u201d and \u201cthink\u201d are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": 8596, "influentialCitationCount": 493, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "embedding": {"model": "specter@v0.1.1", "vector": [1.4912004470825195, -3.5677378177642822, -1.1445329189300537, 0.9798691868782043, 2.3536713123321533, 2.412142753601074, 4.424642086029053, -2.8761181831359863, -2.1257364749908447, -1.1084790229797363, -3.251805067062378, 1.1977577209472656, 3.253897190093994, -1.9838618040084839, -1.4531219005584717, 0.8836204409599304, -1.073793888092041, -2.7192888259887695, 1.6965833902359009, 0.5184207558631897, 1.773499608039856, 2.5366764068603516, -4.089727878570557, -2.662728786468506, -1.4416794776916504, -3.607022285461426, 2.746018886566162, -1.7733300924301147, -0.5106160640716553, 0.5690411329269409, -1.8916593790054321, -1.9661279916763306, 3.3400611877441406, -3.8053669929504395, 0.9296400547027588, 0.41943711042404175, 3.257852554321289, 4.370321273803711, 0.3067270517349243, -3.8996522426605225, -2.726933479309082, 3.125169277191162, 4.091403007507324, 1.59388267993927, 1.3132169246673584, 1.040267825126648, 2.296818733215332, 1.9781070947647095, 0.7093571424484253, 2.5194222927093506, 1.4122633934020996, -0.04770202562212944, 3.20090389251709, 3.387321949005127, 3.338480234146118, -2.636532783508301, 0.0511288084089756, 0.851689338684082, 2.454941749572754, 0.41139668226242065, 2.935403823852539, 0.7794689536094666, -2.964092969894409, -2.885684013366699, 2.0985352993011475, -0.8140782117843628, -2.9402453899383545, -1.6351039409637451, 2.4304869174957275, -3.5581846237182617, -1.1929571628570557, -5.903554916381836, 3.020494222640991, -2.540940046310425, -1.2359957695007324, -2.2539517879486084, -0.26531949639320374, -4.144553184509277, 2.4638936519622803, -2.071890354156494, 2.238892078399658, -0.7647629380226135, -0.421325147151947, 2.4426727294921875, 2.2411584854125977, -0.18960316479206085, -1.995802879333496, -2.0175564289093018, 0.08678353577852249, 1.270195722579956, 0.10762540251016617, -0.015511035919189453, 1.986484169960022, 4.073625087738037, -2.114347457885742, 0.7542542219161987, 1.5746797323226929, 1.1141210794448853, 1.6224344968795776, 1.476503610610962, 0.15173879265785217, 0.17057406902313232, 4.779618740081787, -2.5163748264312744, 3.208101749420166, -0.46435248851776123, 1.7156789302825928, 4.8144354820251465, 4.347252368927002, -3.5524511337280273, 4.120011329650879, 1.0828466415405273, -0.009330213069915771, -0.4017130136489868, 1.751489281654358, -0.5669882297515869, 0.0016049202531576157, 0.34845665097236633, -5.341610431671143, -1.2483819723129272, -3.4553205966949463, 0.30804696679115295, -1.643052577972412, 0.6510483622550964, 0.7783281803131104, -3.4772589206695557, -6.633528709411621, -0.24480584263801575, -0.4053124785423279, -1.5410195589065552, 3.3885180950164795, 1.4575270414352417, 2.6739587783813477, 1.4166474342346191, 0.11588010936975479, 2.9077024459838867, -1.011893391609192, -0.5767647624015808, -1.5823938846588135, -1.4049330949783325, 2.5106942653656006, 0.7393538951873779, 1.5895920991897583, 0.0003083422780036926, -3.374191999435425, 4.317915916442871, -0.9368650317192078, -5.205918312072754, -2.2786436080932617, 2.188253402709961, 3.1293387413024902, -4.58628511428833, -0.4621364176273346, -2.2124624252319336, 1.9622949361801147, 3.820875644683838, -3.2327256202697754, 0.5001388192176819, -0.08520727604627609, -0.2393031120300293, -0.5099124908447266, -4.311080455780029, -7.625182628631592, -0.7195397615432739, -0.09316174685955048, -4.389499187469482, -1.0065091848373413, 2.595703125, -0.9527037739753723, 1.5434409379959106, 0.1468064934015274, 0.4864352345466614, -4.90764045715332, 2.314533233642578, 1.4545546770095825, 4.534533977508545, -1.3333895206451416, -0.6372758150100708, -0.04751807451248169, -0.022305790334939957, -0.6378300189971924, 1.9842281341552734, -4.330424785614014, -2.5224874019622803, -1.7467732429504395, -5.2638421058654785, 0.6906782984733582, -4.064807415008545, 1.6263312101364136, 1.4265756607055664, -3.7292516231536865, -2.8003158569335938, 1.2935411930084229, 4.026785373687744, 0.81377774477005, -1.3772810697555542, 3.7837374210357666, 1.8329479694366455, -0.24431589245796204, 0.44198039174079895, 0.2649782598018646, 1.1607179641723633, -1.1263234615325928, -1.2537122964859009, 1.9910213947296143, 2.0369362831115723, -1.2187927961349487, 5.146304607391357, -0.09589923918247223, 0.7303347587585449, 3.9201860427856445, 1.120862603187561, -1.0793205499649048, -3.2901806831359863, 0.26532667875289917, 1.4524774551391602, -5.4654741287231445, -0.007292408496141434, 4.590025901794434, 0.5332738161087036, -1.4688737392425537, -1.5493791103363037, 3.8060014247894287, -2.5307557582855225, 2.2415049076080322, 0.04449813812971115, -0.4910835325717926, -3.439023733139038, 1.2819942235946655, -2.450918197631836, -1.7708230018615723, -3.58064341545105, -1.4969606399536133, 1.0039310455322266, -1.7640535831451416, -1.0593749284744263, -5.585129261016846, -0.7832945585250854, 1.119728684425354, 0.4876984655857086, 0.3577856421470642, 0.8662077188491821, -1.6058495044708252, 2.0129234790802, -3.0357728004455566, 0.8151829242706299, -3.568014621734619, 2.1913697719573975, -0.47153159976005554, -2.5587644577026367, -3.268476724624634, -1.2067168951034546, 0.24534153938293457, 2.982598304748535, 1.7270994186401367, 3.4260847568511963, -1.5833585262298584, -3.3782668113708496, 2.574708938598633, 1.3798424005508423, 0.7863763570785522, 1.4131414890289307, -3.3678414821624756, 1.3044129610061646, 2.4515881538391113, -3.4740331172943115, -5.765645503997803, -1.739263653755188, -0.6904822587966919, -1.3561055660247803, -0.4330002963542938, -0.41918060183525085, 2.121532917022705, -2.163936138153076, 1.7772341966629028, -1.3180198669433594, -0.3127167522907257, -0.5866559147834778, 4.935529708862305, 0.759954035282135, 1.2544664144515991, 0.48061805963516235, 0.6665018796920776, -3.271209955215454, -0.19271861016750336, -0.6262511014938354, 3.658082962036133, 1.7972036600112915, 1.9327462911605835, 0.6973538994789124, 0.5085180401802063, 4.304430961608887, -4.336119174957275, 2.1630356311798096, -0.21497029066085815, 0.8230308294296265, 4.160607814788818, 1.1526957750320435, -2.010878086090088, 2.2168242931365967, 0.0011761756613850594, 4.143531799316406, 2.5589847564697266, 1.6056995391845703, -0.3169042766094208, 3.184293270111084, 2.134319305419922, -4.298863887786865, 0.3618548810482025, -2.017502784729004, 1.8477715253829956, 0.05207091197371483, -0.537638247013092, -3.9817962646484375, 0.5500563383102417, -0.4757603406906128, 2.2578113079071045, 0.38371512293815613, -2.2485015392303467, 2.498448371887207, -0.3643079102039337, 1.4773989915847778, 0.6141877770423889, 0.1441245675086975, -3.072169780731201, 2.299468517303467, 2.4218196868896484, -0.0861143171787262, -1.3371458053588867, -2.2199652194976807, -0.4460529685020447, 1.0827375650405884, 2.511638641357422, 2.1290223598480225, -1.1577873229980469, -6.184621810913086, 1.0780055522918701, -3.886425733566284, 1.7774617671966553, -1.3791542053222656, -0.8490374088287354, 5.72236442565918, 1.5893830060958862, 0.32902979850769043, -2.497596025466919, 3.1421282291412354, 2.0923655033111572, -2.642005205154419, -3.839104413986206, 4.451228618621826, 1.3005056381225586, 1.8951539993286133, 1.6728183031082153, 0.826499342918396, 3.9324283599853516, 3.3128347396850586, 3.914780855178833, -0.7221781015396118, -1.3029998540878296, -2.013812780380249, -2.182837963104248, -0.2159322053194046, 1.8456220626831055, 0.529842734336853, -1.199500560760498, -2.289618968963623, 6.9116973876953125, -5.502941608428955, -0.6482645273208618, -2.602815628051758, -3.04982852935791, -2.127835750579834, -3.1478404998779297, -0.34581586718559265, -0.7402955889701843, -4.066827297210693, -0.47199007868766785, -4.059601783752441, 2.327622413635254, 1.1821439266204834, 0.15096122026443481, -0.6574445366859436, 0.5852963328361511, 3.317716598510742, 0.8644300699234009, 1.4340680837631226, -2.432757616043091, 2.0555384159088135, -3.90724778175354, 1.0012681484222412, -0.41373327374458313, -2.8298823833465576, 6.131030559539795, 2.0150856971740723, -1.8204972743988037, -1.0754027366638184, -2.309323310852051, -2.379054546356201, -3.0613415241241455, 3.03078556060791, -1.1570667028427124, -1.0867667198181152, 3.627497911453247, 1.3414182662963867, -0.7400435209274292, -0.9083080887794495, 1.6084264516830444, -3.6992690563201904, -5.179874420166016, 1.0713765621185303, -7.001905918121338, -1.0234386920928955, -1.279598355293274, -0.6123147010803223, 2.594583749771118, 1.7951123714447021, 3.0504584312438965, 3.647704839706421, -0.8255187273025513, 0.46131110191345215, -2.8640248775482178, 0.9530532956123352, 9.28664493560791, 3.295341968536377, -1.9902756214141846, 2.6219594478607178, 1.1045936346054077, 4.152153015136719, -2.8982529640197754, 3.1394364833831787, 2.14168119430542, 4.563228130340576, -0.4255490005016327, 0.4556257128715515, 2.189849376678467, -0.5173490643501282, 0.6736354231834412, -0.13150930404663086, 2.7108571529388428, -5.299671649932861, 2.277427911758423, -1.1924024820327759, 0.3604048490524292, 0.20612220466136932, -3.454986095428467, 1.292128562927246, 2.894195079803467, 2.223227024078369, -0.9455307126045227, -1.7939320802688599, 0.06685015559196472, 0.27166950702667236, -0.14791132509708405, -2.916079521179199, 0.7232120633125305, 0.13648608326911926, -1.9105552434921265, 1.232003092765808, 0.21377891302108765, 2.044219970703125, -3.128916025161743, 4.0654401779174805, -1.64369535446167, 0.18517795205116272, 2.5652148723602295, -3.774272918701172, 0.04907339811325073, -0.06912461668252945, 0.15278685092926025, -0.7334116101264954, 3.400716781616211, -1.2366024255752563, -4.117137432098389, 2.140357255935669, 0.8362204432487488, 4.288045406341553, 5.800609588623047, 4.423896789550781, 1.7416282892227173, -0.43763279914855957, -2.626300811767578, -1.703445315361023, 4.882078170776367, 0.7089818716049194, 0.9079666137695312, 2.447680711746216, -2.0190351009368896, -1.3947519063949585, -0.31683510541915894, 0.8696826100349426, -3.5703392028808594, 0.2538117468357086, 5.1805243492126465, 0.7383964657783508, -2.8177847862243652, 1.5130589008331299, -3.856858253479004, -5.221625328063965, -0.3264671862125397, 1.077576994895935, 0.6066218018531799, -4.628721714019775, -0.9978218674659729, -2.860262632369995, 3.91422438621521, 4.650241374969482, 0.6411037445068359, 3.27441143989563, 2.8085005283355713, -1.5118881464004517, -0.2862726151943207, -0.027123019099235535, -0.9779676795005798, -0.07652962952852249, 0.6351696252822876, -1.9043272733688354, 2.096518039703369, 4.422485828399658, -1.0958195924758911, 0.27752557396888733, 0.6965365409851074, -0.07153210788965225, -3.7454171180725098, 0.608910083770752, -3.2880749702453613, 1.4592971801757812, 0.12961120903491974, 0.6550276279449463, 1.2567991018295288, 2.4147582054138184, 2.145935297012329, 2.7853281497955322, -2.1146483421325684, 0.6186407804489136, 3.230029582977295, -2.019900321960449, -1.8758838176727295, 4.192493915557861, 0.567356288433075, 0.9650986194610596, -3.891258478164673, -0.07773301750421524, -1.4568970203399658, 1.511470913887024, 2.817631959915161, 5.228792667388916, -4.549345970153809, -2.3188655376434326, -5.015311241149902, 0.8192861676216125, 3.086291551589966, 0.055960580706596375, 3.0219428539276123, 1.3445091247558594, -2.978372097015381, -0.9532874226570129, -2.3546040058135986, 0.3788264989852905, 0.8931404948234558, 1.654476284980774, 2.0823516845703125, -0.7059788703918457, -3.477396011352539, -1.2190135717391968, 3.1988987922668457, -0.9511443376541138, 0.31925660371780396, 1.1658567190170288, -2.6117656230926514, -3.3201589584350586, 1.3019773960113525, 1.1917563676834106, 2.419656276702881, -0.5857217311859131, 0.8047353029251099, 2.6140263080596924, 3.198706865310669, -0.2895236313343048, 1.7804657220840454, -0.41059935092926025, 1.591880440711975, 1.0578147172927856, -0.9528192281723022, -0.6371835470199585, -0.8999473452568054, 2.926731586456299, -2.5385398864746094, 1.3672055006027222, -2.8778762817382812, -4.268380641937256, -0.4135794937610626, -0.13491739332675934, -1.7325851917266846, 1.1960667371749878, 0.7391232848167419, -4.127851963043213, 0.7886160016059875, -0.9319157600402832, -0.07458949089050293, 0.3255041837692261, -0.9248706102371216, 2.1431007385253906, 4.779815196990967, 1.7006468772888184, -2.898259401321411, -4.037906169891357, 2.250380516052246, -0.2571093440055847, 1.803026795387268, -0.6334996223449707, 0.38012900948524475, -0.7178404331207275, 10.408695220947266, 0.4416235089302063, 3.2658486366271973, -2.645660161972046, 3.1659204959869385, -2.9682207107543945, -1.8574892282485962, -0.5166532397270203, 0.48397955298423767, -0.6754127740859985, 5.767602920532227, 1.635308027267456, -2.2770495414733887, 1.5910547971725464, -3.266660213470459, -0.36168932914733887, 0.804029107093811, 4.0777435302734375, 3.6347291469573975, 2.446516990661621, 1.0559085607528687, 0.7756821513175964, 0.3844594955444336, -3.2986485958099365, 1.153260350227356, 2.703200101852417, 3.977548360824585, -0.6733660101890564, -2.5609700679779053, 1.570186972618103, -2.4598803520202637, -1.199933648109436, 1.8013646602630615, 1.1733877658843994, -0.9769896268844604, 0.27824100852012634, 4.334930896759033, -3.2949230670928955, -3.437204360961914, -2.245392084121704, 1.3960449695587158, -2.8982086181640625, -5.141915798187256, 2.592688798904419, -1.7752970457077026, -1.1991205215454102, 5.469426155090332, 1.0072311162948608, 0.5077131390571594, 5.818460464477539, -2.7980525493621826, -0.7477746605873108, -2.333284854888916, -0.8473489880561829, 0.5736323595046997, -0.6414474248886108, 0.763018012046814, -4.140954494476318, -0.8839965462684631, -2.4077603816986084, 2.392150640487671, -1.750841498374939, 3.517760753631592, -3.4706099033355713, -0.8139467239379883, -1.162028431892395, -1.7277436256408691, -0.012990135699510574, 1.633035659790039, 0.5467530488967896, 2.617684841156006, 2.025974988937378, -1.8517699241638184, -2.4114012718200684, 0.3498564660549164, -3.3467040061950684, 0.9990707039833069, -3.2822868824005127, -2.11946964263916, 7.44944953918457, -3.1606969833374023, -1.0515354871749878, -4.833910942077637, 3.2854321002960205, 5.417191028594971, -3.63417911529541, 1.4485042095184326, -1.780576467514038, 0.7408013343811035, -0.623672604560852, -3.956453800201416, -0.4284232258796692, 5.948563575744629, 0.9917374849319458, 1.4613680839538574, 1.8326377868652344, -0.5463629364967346, 2.1198883056640625, -4.7847514152526855, -3.700894355773926, 0.7175806164741516, 0.28311285376548767, 0.7922775745391846, 1.0427093505859375, -2.716966390609741, -2.286104917526245, -1.7376515865325928, -1.365503191947937, -4.581218719482422, 1.696526288986206, 1.9796323776245117, -1.6948431730270386, -1.4996675252914429, 3.3924407958984375, -2.018606185913086, 0.375287801027298, -1.4784940481185913, 2.4106976985931396, 1.8442091941833496, 0.30308371782302856, 0.7252417206764221, 0.4834488332271576, 2.05482816696167, -5.502094268798828, 1.4989551305770874, -0.036200929433107376, 0.7935841083526611, -6.309118270874023, 0.28731459379196167, 0.7802544236183167, 1.6197532415390015, -0.21075761318206787, 3.5668857097625732, -3.1733810901641846, 0.14286154508590698, -0.3445669412612915, 1.4772952795028687, 1.1107704639434814, 1.3991512060165405, 4.0126633644104, -0.5388878583908081, 0.20864829421043396, -1.4177249670028687, 4.58060359954834, -3.0819759368896484, -2.489410638809204, -1.2240601778030396, 2.822070598602295, -3.266664743423462, -0.29265448451042175, 1.4111319780349731, -0.8745537400245667, -1.8424195051193237, 1.735237956047058, -0.6763474941253662, -1.7880852222442627]}, "tldr": {"model": "tldr@v2.0.0", "text": "The question, \u201cCan machines think?\u201d is considered, and the question is replaced by another, which is closely related to it and is expressed in relatively unambiguous words."}, "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1950-10-01", "journal": {"name": "Mind", "pages": "433-460", "volume": "LIX"}, "authors": [{"authorId": "2262347", "externalIds": {"DBLP": ["Alan M. Turing"]}, "url": "https://www.semanticscholar.org/author/2262347", "name": "A. Turing", "aliases": ["A Turing", "A M Turing", "A. M. Turing", "Alan M. Turing", "Alan Turing", "Alan Mathison Turing"], "affiliations": [], "homepage": null, "paperCount": 60, "citationCount": 12415, "hIndex": 23}], "citations": [{"paperId": "2097e50387716904bde658a8832ec3bf17bab3ac", "externalIds": {"DOI": "10.1016/j.techfore.2022.122264", "CorpusId": 255176985}, "corpusId": 255176985, "publicationVenue": {"id": "5eb1fac4-44ea-4270-b31e-3fb4dd8247cb", "name": "Technological forecasting & social change", "type": "journal", "alternate_names": ["Technological Forecasting and Social Change", "Technol forecast soc chang", "Technol Forecast Soc Chang"], "issn": "0040-1625", "url": "https://www.journals.elsevier.com/technological-forecasting-and-social-change/", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00401625"]}, "url": "https://www.semanticscholar.org/paper/2097e50387716904bde658a8832ec3bf17bab3ac", "title": "Artificial intelligence and corporate innovation: A review and research agenda", "abstract": null, "venue": "Technological forecasting & social change", "year": 2023, "referenceCount": 203, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2023-03-01", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "123471397", "name": "Salman Bahoo"}, {"authorId": "101122773", "name": "M. Cucculelli"}, {"authorId": "2198442708", "name": "Dawood Qamar"}]}, {"paperId": "de6e3d9e35ad2e4089bfc26a9ecc11ed7996c95b", "externalIds": {"DOI": "10.1016/j.epsr.2022.108887", "CorpusId": 252982113}, "corpusId": 252982113, "publicationVenue": {"id": "0e93ab3a-8aef-458b-a68d-ab942f5a3306", "name": "Electric power systems research", "type": "journal", "alternate_names": ["Electric Power Systems Research", "Electr power syst res", "Electr Power Syst Res"], "issn": "0378-7796", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/504085/description#description", "alternate_urls": ["http://www.sciencedirect.com/science/journal/03787796"]}, "url": "https://www.semanticscholar.org/paper/de6e3d9e35ad2e4089bfc26a9ecc11ed7996c95b", "title": "Deep learning for power quality", "abstract": null, "venue": "Electric power systems research", "year": 2023, "referenceCount": 129, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2023-01-01", "journal": {"name": "Electric Power Systems Research"}, "authors": [{"authorId": "49442361", "name": "R. Oliveira"}, {"authorId": "46525078", "name": "M. Bollen"}]}, {"paperId": "65b72b6ee4764366d9c2888525afa9065958230f", "externalIds": {"DOI": "10.29121/granthaalayah.v10.i12.2022.4940", "CorpusId": 255364653}, "corpusId": 255364653, "publicationVenue": {"id": "2e94c409-54b0-4888-91bd-e8afb309cc1e", "name": "International journal of research - granthaalayah", "type": "journal", "alternate_names": ["Int j res granthaalayah"], "issn": "2350-0530", "url": "http://granthaalayah.com/"}, "url": "https://www.semanticscholar.org/paper/65b72b6ee4764366d9c2888525afa9065958230f", "title": "IT PROJECT RISK MANAGEMENT FOR CLOUD ENVIRONMENT LEVERAGING ARTIFICIAL INTELLIGENCE", "abstract": "Cloud security contributes to multiple risk parameters like multitenancy, Insecure interfaces/APIs, Malicious Insiders, Malware injections, the lack of information on location of storage of data, the unavailability of details on type of data saved in the same server, hacking. AI or Artificial Intelligence works on pre-collected data and scenarios fed into the computers thereby predicting in advance the possibilities of risk, warning if there is any unusual occurrence in the cloud and proposing the Risk Mitigation plans based on various scenarios. Proactive risk prediction will have a huge impact on risk mitigation, cost saving as well as customer satisfaction. A pilot study has been conducted to ascertain the impact of various risk factors identified by circulating the questionnaire among practitioners from the relevant domains. The questionnaire is circulated among the current industry practitioners and experts in this area and facilitates to conduct the pilot survey on the significance of various risk parameter. The impact of each risk factor is identified and is subjected to analysis. With the help of prediction algorithms, the possibility of occurrence of risk, the impact, and consequences of that particular event, as well as the mitigation strategies could be foretold. This objective of this paper is to propose management perspective of a framework of AI, that can contribute to proactive risk management in cloud. This paper deals only with the management overview of implementation of AI in risk mitigation strategies and not the technical aspects of AI. The futuristic scope of this paper would be a management overview on automation of risk mitigation strategies in cloud platform using AI.", "venue": "International journal of research - granthaalayah", "year": 2022, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-12-31", "journal": {"name": "International Journal of Research -GRANTHAALAYAH"}, "authors": [{"authorId": "2188052675", "name": "Remya N Nair"}, {"authorId": "9106179", "name": "J. Meenakumari"}]}, {"paperId": "3ce2aecf36f19e95201bc001055bd168679e6689", "externalIds": {"PubMedCentral": "9801159", "DOI": "10.1007/s10479-022-05159-4", "CorpusId": 255302836}, "corpusId": 255302836, "publicationVenue": {"id": "2e70cc37-125a-451c-b9bb-3b329f6be510", "name": "Annals of Operations Research", "type": "journal", "alternate_names": ["Ann Oper Res"], "issn": "0254-5330", "url": "https://www.springer.com/journal/10479", "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-0-70-35506643-0,00.html?referer=www.springer.com/journal/10479/submission", "https://link.springer.com/journal/10479", "http://www.springer.com/journal/10479"]}, "url": "https://www.semanticscholar.org/paper/3ce2aecf36f19e95201bc001055bd168679e6689", "title": "Artificial intelligence and change management in small and medium-sized enterprises: an analysis of dynamics within adaptation initiatives", "abstract": null, "venue": "Annals of Operations Research", "year": 2022, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-30", "journal": {"pages": "1 - 27", "name": "Annals of Operations Research"}, "authors": [{"authorId": "2198877576", "name": "Sara I. C. Lemos"}, {"authorId": "2149923697", "name": "Fernando A. F. Ferreira"}, {"authorId": "69345200", "name": "C. Zopounidis"}, {"authorId": "2529752", "name": "E. Galariotis"}, {"authorId": "82392394", "name": "Neuza C. M. Q. F. Ferreira"}]}, {"paperId": "e52eb98accd9f68f857473e149a919ea252ceb31", "externalIds": {"DOI": "10.3390/su15010329", "CorpusId": 255215351}, "corpusId": 255215351, "publicationVenue": {"id": "8775599f-4f9a-45f0-900e-7f4de68e6843", "name": "Sustainability", "type": "journal", "issn": "2071-1050", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-172127", "alternate_urls": ["http://mdpi.com/journal/sustainability", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-172127"]}, "url": "https://www.semanticscholar.org/paper/e52eb98accd9f68f857473e149a919ea252ceb31", "title": "Cooperatives and the Use of Artificial Intelligence: A Critical View", "abstract": "Digital Transformation (DT) has become an important issue for organisations. It is proven that DT fuels Digital Innovation in organisations. It is well-known that technologies and practices such as distributed ledger technologies, open source, analytics, big data, and artificial intelligence (AI) enhance DT. Among those technologies, AI provides tools to support decision-making and automatically decide. Cooperatives are organisations with a mutualistic scope and are characterised by having participatory cooperative governance due to the principle of democratic control by the members. In a context where DT is here to stay, where the dematerialisation of processes can bring significant advantages to any organisation, this article presents a critical reflection on the dangers of using AI technologies in cooperatives. We base this reflection on the Portuguese cooperative code. We emphasise that this code is not very different from the ones of other countries worldwide as they are all based on the Statement of Cooperative Identity defined by the International Cooperative Alliance. We understand that we cannot stop the entry of AI technologies into the cooperatives. Therefore, we present a framework for using AI technologies in cooperatives to avoid damaging the principles and values of this type of organisations.", "venue": "Sustainability", "year": 2022, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2071-1050/15/1/329/pdf?version=1671969947", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-25", "journal": {"name": "Sustainability"}, "authors": [{"authorId": "2070029062", "name": "M. Ramos"}, {"authorId": "143996470", "name": "Ana Azevedo"}, {"authorId": "2076921080", "name": "Deolinda Meira"}, {"authorId": "2153782537", "name": "Mariana Curado Malta"}]}, {"paperId": "350c236bbd7e3eed957d27238400a29b423ca347", "externalIds": {"DOI": "10.30858/zer/153583", "CorpusId": 255026105}, "corpusId": 255026105, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/350c236bbd7e3eed957d27238400a29b423ca347", "title": "DEVELOPMENT OF ARTIFICIAL INTELLIGENCE AND POTENTIAL IMPACT OF ITS APPLICATIONS IN AGRICULTURE ON LABOR USE AND PRODUCTIVITY", "abstract": "artificial intelligence (ai) is one of the most striking recent technology developments. potentially, it can significantly affect all areas of economic activities including agriculture. The paper addresses two issues such as the actual essence of ai and its most important current and expected future applications in agriculture and their potential impact on labor use and productivity of this sector. The research methods applied in the paper are critical analysis of selected literature sources and deductive reasoning regarding the likely influence of ai applications on labor use in agriculture and its total factor productivity. it was found out that applications of ai in agriculture are numerous and very diverse both in terms of technological solutions and managed processes. Moreover, the market for ai applications in agriculture is expected to grow quite rapidly due to an increasing tendency to automatize agricultural production and marketing processes. This inevitably leads to substitution of physical labor with sophisticated machinery and robots. also, it generates demand for new labor competencies needed to manage increasingly capital intensive agricultural production and related processes driven by the use of ai. Based on mainly theoretical considerations, it can be surmised that widespread use of ai in agriculture should positively con-tribute to the growth in the total factor productivity (TFp) of the sector. consequently, countries where agricultural producers adopt ai solutions faster can gain competitive advantage in food production.", "venue": "Zagadnienia Ekonomiki Rolnej / Problems of Agricultural Economics", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.zer.waw.pl/pdf-153583-84455?filename=DEVELOPMENT OF ARTIFICIAL.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-22", "journal": {"name": "Zagadnienia Ekonomiki Rolnej / Problems of Agricultural Economics"}, "authors": [{"authorId": "107588156", "name": "S. Figiel"}]}, {"paperId": "bea6e6d75538e9c708a0467e0426b4a827b8e72f", "externalIds": {"PubMedCentral": "9773645", "DOI": "10.1007/s43681-022-00252-7", "CorpusId": 254997066}, "corpusId": 254997066, "publicationVenue": {"id": "96ed79e9-36b2-4f58-8ef2-67296adef647", "name": "AI and Ethics", "type": "journal", "alternate_names": ["AI Ethics"], "issn": "2730-5953", "url": "https://www.springer.com/journal/43681"}, "url": "https://www.semanticscholar.org/paper/bea6e6d75538e9c708a0467e0426b4a827b8e72f", "title": "Replika in the Metaverse: the moral problem with empathy in \u2018It from Bit\u2019", "abstract": null, "venue": "AI and Ethics", "year": 2022, "referenceCount": 83, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-022-00252-7.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-22", "journal": {"pages": "1 - 13", "name": "Ai and Ethics"}, "authors": [{"authorId": "2745471", "name": "Andrew McStay"}]}, {"paperId": "3b8ccc7ec80b8775de603e248ac1ca2b919d6b70", "externalIds": {"ArXiv": "2212.11126", "CorpusId": 254926835}, "corpusId": 254926835, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3b8ccc7ec80b8775de603e248ac1ca2b919d6b70", "title": "Chatbots in a Botnet World", "abstract": "Question-and-answer formats provide a novel experimental platform for investigating cybersecurity questions. Unlike previous chatbots, the latest ChatGPT model from OpenAI supports an advanced understanding of complex coding questions. The research demonstrates thirteen coding tasks that generally qualify as stages in the MITRE ATT&CK framework, ranging from credential access to defense evasion. With varying success, the experimental prompts generate examples of keyloggers, logic bombs, obfuscated worms, and payment-fulfilled ransomware. The empirical results illustrate cases that support the broad gain of functionality, including self-replication and self-modification, evasion, and strategic understanding of complex cybersecurity goals. One surprising feature of ChatGPT as a language-only model centers on its ability to spawn coding approaches that yield images that obfuscate or embed executable programming steps or links.", "venue": "", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-18", "journal": null, "authors": [{"authorId": "2197525782", "name": "Forrest McKee"}, {"authorId": "46787948", "name": "David Noever"}]}, {"paperId": "d9b19321a0176683f4f40b9d80357aa6cb06a6bc", "externalIds": {"DBLP": "journals/corr/abs-2212-08487", "ArXiv": "2212.08487", "DOI": "10.48550/arXiv.2212.08487", "CorpusId": 254823606}, "corpusId": 254823606, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d9b19321a0176683f4f40b9d80357aa6cb06a6bc", "title": "Semantics-Empowered Communication: A Tutorial-cum-Survey", "abstract": "\u2014Along with the springing up of semantics- empowered communication (SemCom) researches, it is now witnessing an unprecedentedly growing interest towards a wide range of aspects (e.g., theories, applications, metrics and implementations) in both academia and industry. In this work, we primarily aim to provide a comprehensive survey on both the background and research taxonomy, as well as a detailed technical tutorial. Speci\ufb01cally, we start by reviewing the literature and answering the \u201cwhat\u201d and \u201cwhy\u201d questions in semantic transmissions. Afterwards, we present corresponding ecosystems, including theories, metrics, datasets and toolkits, on top of which the taxonomy for research directions is presented. Furthermore, we propose to categorize the critical enabling techniques by explicit and implicit reasoning-based methods, and elaborate on how they evolve and contribute to modern content & channel semantics-empowered communications. Besides reviewing and summarizing the latest efforts in SemCom, we discuss the relations with other communication levels (e.g., reliable and goal-oriented communications) from a holistic and uni\ufb01ed viewpoint. Subsequently, in order to facilitate the future developments and industrial applications, we also highlight advanced practical tech- niques for boosting semantic accuracy, robustness, and large-scale scalability, just to mention a few. Finally, we discuss the technical challenges that shed light on future research opportunities.", "venue": "ArXiv", "year": 2022, "referenceCount": 215, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-12-16", "journal": {"volume": "abs/2212.08487", "name": "ArXiv"}, "authors": [{"authorId": "2197341575", "name": "Zhilin Lu"}, {"authorId": "1760102", "name": "Rongpeng Li"}, {"authorId": "2119299421", "name": "Kun Lu"}, {"authorId": "2135089146", "name": "Xianfu Chen"}, {"authorId": "144158811", "name": "E. Hossain"}, {"authorId": "3067183", "name": "Zhifeng Zhao"}, {"authorId": "46702909", "name": "Honggang Zhang"}]}, {"paperId": "8f916845347d3283b4170caec95760b42980b06f", "externalIds": {"DBLP": "journals/corr/abs-2212-05937", "ArXiv": "2212.05937", "DOI": "10.48550/arXiv.2212.05937", "CorpusId": 254563889}, "corpusId": 254563889, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8f916845347d3283b4170caec95760b42980b06f", "title": "Human Digital Twin: A Survey", "abstract": ".", "venue": "ArXiv", "year": 2022, "referenceCount": 134, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-12-12", "journal": {"volume": "abs/2212.05937", "name": "ArXiv"}, "authors": [{"authorId": "2145483718", "name": "Yujia Lin"}, {"authorId": "2109222039", "name": "L. Chen"}, {"authorId": "2195350402", "name": "Aftab Ali"}, {"authorId": "2101178582", "name": "C. Nugent"}, {"authorId": "1992854", "name": "I. Cleland"}, {"authorId": "2119921689", "name": "Rongyang Li"}, {"authorId": "2082157364", "name": "D. Gao"}, {"authorId": "2113291577", "name": "Hang Wang"}, {"authorId": "2172832104", "name": "Yajie Wang"}, {"authorId": "52186545", "name": "Huansheng Ning"}]}, {"paperId": "905c886090f1943da1e44ab2ece7e7659cf5a35c", "externalIds": {"DBLP": "journals/corr/abs-2212-06721", "ArXiv": "2212.06721", "DOI": "10.48550/arXiv.2212.06721", "CorpusId": 254591525}, "corpusId": 254591525, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/905c886090f1943da1e44ab2ece7e7659cf5a35c", "title": "The Turing Deception", "abstract": "This research revisits the classic Turing test and compares recent large language models such as ChatGPT for their abilities to reproduce human-level comprehension and compelling text generation. Two task challenges- summary and question answering- prompt ChatGPT to produce original content (98-99%) from a single text entry and sequential questions initially posed by Turing in 1950. We score the original and generated content against the OpenAI GPT-2 Output Detector from 2019, and establish multiple cases where the generated content proves original and undetectable (98%). The question of a machine fooling a human judge recedes in this work relative to the question of \"how would one prove it?\" The original contribution of the work presents a metric and simple grammatical set for understanding the writing mechanics of chatbots in evaluating their readability and statistical clarity, engagement, delivery, overall quality, and plagiarism risks. While Turing's original prose scores at least 14% below the machine-generated output, whether an algorithm displays hints of Turing's true initial thoughts (the \"Lovelace 2.0\" test) remains unanswerable.", "venue": "ArXiv", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-12-09", "journal": {"volume": "abs/2212.06721", "name": "ArXiv"}, "authors": [{"authorId": "46787948", "name": "David Noever"}, {"authorId": "1866333313", "name": "Matt Ciolino"}]}, {"paperId": "a34084b3f7f8d47b2e70c6b528700f44930057e5", "externalIds": {"DOI": "10.3390/math10244657", "CorpusId": 254519616}, "corpusId": 254519616, "publicationVenue": {"id": "6175efe8-6f8e-4cbe-8cee-d154f4e78627", "name": "Mathematics", "issn": "2227-7390", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-283014", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-283014", "https://www.mdpi.com/journal/mathematics"]}, "url": "https://www.semanticscholar.org/paper/a34084b3f7f8d47b2e70c6b528700f44930057e5", "title": "Personalizing Hybrid-Based Dialogue Agents", "abstract": "In this paper, we present a continuation of our work on the personification of dialogue agents. We expand upon the previously demonstrated models\u2014the ranking and generative models\u2014and propose new hybrid models. Because there is no single definitive way to build a hybrid model, we explore various architectures where the components adopt different roles, sequentially and in parallel. Applying the perplexity and BLEU performance metrics, we discover that the Retrieve and Refine and KG model\u2014a modification of the Retrieve and Refine model where the ranking and generative components work in parallel and compete based on the proximity of the candidate found by the ranking model with a knowledge-grounded generation block\u2014achieves the best performance, with values of 1.64 for perplexity and 0.231 for BLEU scores.", "venue": "Mathematics", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2227-7390/10/24/4657/pdf?version=1670508463", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-08", "journal": {"name": "Mathematics"}, "authors": [{"authorId": "3026479", "name": "Yuri N. Matveev"}, {"authorId": "150254037", "name": "O. Makhnytkina"}, {"authorId": "2164895714", "name": "P. Posokhov"}, {"authorId": "2138645045", "name": "Anton Matveev"}, {"authorId": "2189195778", "name": "S. Skrylnikov"}]}, {"paperId": "2f440b3771db1adb578044f9cee914aaff328239", "externalIds": {"ArXiv": "2212.04401", "DBLP": "journals/corr/abs-2212-04401", "DOI": "10.1098/rstb.2021.0446", "CorpusId": 254408657}, "corpusId": 254408657, "publicationVenue": {"id": "92d34d37-5c4b-4e11-b461-9041b7de4c2d", "name": "Philosophical Transactions of the Royal Society of London. Biological Sciences", "type": "journal", "alternate_names": ["Philos Trans R Soc B", "Philosophical Transactions of the Royal Society B", "Philos Trans R Soc Lond Biological Sci"], "issn": "0962-8436", "url": "https://www.jstor.org/journal/philtranbiolscie", "alternate_urls": ["http://www.jstor.org/journals/09628436.html", "http://rstb.royalsocietypublishing.org/"]}, "url": "https://www.semanticscholar.org/paper/2f440b3771db1adb578044f9cee914aaff328239", "title": "A rubric for human-like agents and NeuroAI", "abstract": "Researchers across cognitive, neuro- and computer sciences increasingly reference \u2018human-like\u2019 artificial intelligence and \u2018neuroAI\u2019. However, the scope and use of the terms are often inconsistent. Contributed research ranges widely from mimicking behaviour, to testing machine learning methods as neurally plausible hypotheses at the cellular or functional levels, or solving engineering problems. However, it cannot be assumed nor expected that progress on one of these three goals will automatically translate to progress in others. Here, a simple rubric is proposed to clarify the scope of individual contributions, grounded in their commitments to human-like behaviour, neural plausibility or benchmark/engineering/computer science goals. This is clarified using examples of weak and strong neuroAI and human-like agents, and discussing the generative, corroborate and corrective ways in which the three dimensions interact with one another. The author maintains that future progress in artificial intelligence will need strong interactions across the disciplines, with iterative feedback loops and meticulous validity tests\u2014leading to both known and yet-unknown advances that may span decades to come. This article is part of a discussion meeting issue \u2018New approaches to 3D vision\u2019.", "venue": "Philosophical Transactions of the Royal Society of London. Biological Sciences", "year": 2022, "referenceCount": 185, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2212.04401", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-12-08", "journal": {"volume": "378", "name": "Philosophical Transactions of the Royal Society B"}, "authors": [{"authorId": "1990422", "name": "I. Momennejad"}]}, {"paperId": "5c9515ee1c01b5b3e8403dd6483eecd5ea0c2827", "externalIds": {"ArXiv": "2212.03721", "DBLP": "journals/corr/abs-2212-03721", "DOI": "10.48550/arXiv.2212.03721", "CorpusId": 254366305}, "corpusId": 254366305, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c9515ee1c01b5b3e8403dd6483eecd5ea0c2827", "title": "Intent Recognition in Conversational Recommender Systems", "abstract": ",", "venue": "ArXiv", "year": 2022, "referenceCount": 186, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-12-06", "journal": {"volume": "abs/2212.03721", "name": "ArXiv"}, "authors": [{"authorId": "2193804511", "name": "Sahar Moradizeyveh"}]}, {"paperId": "7a2219ada69c4a691edb8dae69d1bbdab4240b68", "externalIds": {"ArXiv": "2212.02908", "DBLP": "journals/corr/abs-2212-02908", "DOI": "10.48550/arXiv.2212.02908", "CorpusId": 254275511}, "corpusId": 254275511, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7a2219ada69c4a691edb8dae69d1bbdab4240b68", "title": "Towards human-compatible autonomous car: A study of non-verbal Turing test in automated driving with affective transition modelling", "abstract": "\u2014Autonomous cars are indispensable when humans go further down the hands-free route. Although existing literature highlights that the acceptance of the autonomous car will increase if it drives in a human-like manner, sparse research offers the naturalistic experience from a passenger\u2019s seat perspective to examine the human likeness of current autonomous cars. The present study tested whether the AI driver could create a human-like ride experience for passengers based on 69 participants\u2019 feedback in a real-road scenario. We designed a ride experience-based version of the non-verbal Turing test for automated driving. Participants rode in autonomous cars (driven by either human or AI drivers) as a passenger and judged whether the driver was human or AI. The AI driver failed to pass our test because passengers detected the AI driver above chance. In contrast, when the human driver drove the car, the passengers\u2019 judgement was around chance. We further investigated how human passengers ascribe humanness in our test. Based on Lewin\u2019s \ufb01eld theory, we advanced a computational model combining signal detection theory with pre-trained language models to predict passengers\u2019 humanness rating behaviour. We employed affective transition between pre-study baseline emotions and corresponding post-stage emotions as the signal strength of our model. Results showed that the passengers\u2019 ascription of humanness would increase with the greater affective transition. Our study suggested an important role of affective transition in passengers\u2019 ascription of humanness, which might become a future direction for autonomous driving.", "venue": "ArXiv", "year": 2022, "referenceCount": 133, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-12-06", "journal": {"volume": "abs/2212.02908", "name": "ArXiv"}, "authors": [{"authorId": "1809079222", "name": "Zhaoning Li"}, {"authorId": "2193641498", "name": "Qiaoli Jiang"}, {"authorId": "121809035", "name": "Zhengming Wu"}, {"authorId": "2118791677", "name": "Anqi Liu"}, {"authorId": "2193958307", "name": "Haiyan Wu"}, {"authorId": "51024683", "name": "Miner Huang"}, {"authorId": "2193594535", "name": "Kai Huang"}, {"authorId": "12007021", "name": "Y. Ku"}]}, {"paperId": "15092c9ef9363ace0743138398e0ada50624bccb", "externalIds": {"DOI": "10.1101/2022.12.01.22282960", "CorpusId": 254272229}, "corpusId": 254272229, "publicationVenue": {"id": "d5e5b5e7-54b1-4f53-82fc-4853f3e71c58", "name": "medRxiv", "type": "journal", "url": "https://www.medrxiv.org/"}, "url": "https://www.semanticscholar.org/paper/15092c9ef9363ace0743138398e0ada50624bccb", "title": "Perception and knowledge of artificial intelligence in healthcare, therapy and diagnostics: A population-representative survey", "abstract": "Artificial intelligence (AI) is understood as a system's ability to correctly interpret and learn from data, and to achieve specific goals and tasks through flexible adaptation to those learnings. Despite a broad range of available applications for artificial intelligence in medicine, healthcare professionals are reluctant to implement AI-powered devices. Data on the perception of medical AI in the German general public are currently rare. Therefore, two online surveys were conducted in 2021 in Germany to assess knowledge and perception of artificial intelligence in general and in medicine, including the handling of data in medicine. A total of 1,001 and 1,000 adults, respectively, participated in the surveys. The survey results stress the need to improve education and perception of medical AI applications by increasing awareness, highlighting the potentials, and ensuring compliance with guidelines and regulations to handle data protection. This survey provides first insights into this relevant topic within the German population.", "venue": "medRxiv", "year": 2022, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.medrxiv.org/content/medrxiv/early/2022/12/06/2022.12.01.22282960.full.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-12-06", "journal": null, "authors": [{"authorId": "114528952", "name": "C. G. Wittal"}, {"authorId": "2069387902", "name": "D. Hammer"}, {"authorId": "2057608157", "name": "F. Klein"}, {"authorId": "2193652029", "name": "J. Rittchen"}]}, {"paperId": "564f911510646366f2ca6721756e47b05c23e9d2", "externalIds": {"DBLP": "conf/hai/TemtsinPB22", "DOI": "10.1145/3527188.3563918", "CorpusId": 254097217}, "corpusId": 254097217, "publicationVenue": {"id": "c3940b41-03f7-4e15-8a48-20b569de9625", "name": "International Conference on Human-Agent Interaction", "type": "conference", "alternate_names": ["HAI", "Int Conf Human-agent Interact", "Human-Agent Interaction", "Hum Asp Ambient Intell", "Human-agent Interact", "Human Aspects in Ambient Intelligence"]}, "url": "https://www.semanticscholar.org/paper/564f911510646366f2ca6721756e47b05c23e9d2", "title": "A Bona Fide Turing Test", "abstract": "The constantly rising demand for human-like conversational agents and the accelerated development of natural language processing technology raise expectations for a breakthrough in intelligent machine research and development. However, measuring intelligence is impossible without a proper test. Alan Turing proposed a test for machine intelligence based on imitation and unconstrained conversations between a machine and a human. To the best of our knowledge, no one has ever conducted Turing\u2019s test as Turing prescribed, even though the Turing Test has been a bone of contention for more than seventy years. Conducting a bona fide Turing Test will contribute to machine intelligence evaluation research and has the potential to advance AI researchers in their ultimate quest, developing an intelligent machine.", "venue": "International Conference on Human-Agent Interaction", "year": 2022, "referenceCount": 21, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2022-12-05", "journal": {"name": "Proceedings of the 10th International Conference on Human-Agent Interaction"}, "authors": [{"authorId": "35534938", "name": "Sharon Temtsin"}, {"authorId": "144239027", "name": "D. Proudfoot"}, {"authorId": "1728894", "name": "C. Bartneck"}]}, {"paperId": "6b3b803bc2b900294bd5b850008cb77336f5f2b2", "externalIds": {"DOI": "10.1016/j.jdec.2022.11.003", "CorpusId": 254725647}, "corpusId": 254725647, "publicationVenue": {"id": "2323ee50-d687-42a3-9b11-de79640703ad", "name": "Journal of Digital Economy", "type": "journal", "alternate_names": ["J Digit Econ"], "issn": "2773-0670"}, "url": "https://www.semanticscholar.org/paper/6b3b803bc2b900294bd5b850008cb77336f5f2b2", "title": "How to realize the full potentials of artificial intelligence (AI) in digital economy? A literature review", "abstract": null, "venue": "Journal of Digital Economy", "year": 2022, "referenceCount": 95, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-12-01", "journal": {"name": "Journal of Digital Economy"}, "authors": [{"authorId": "144922394", "name": "Haiming Hang"}, {"authorId": "115023819", "name": "Zhifeng. Chen"}]}, {"paperId": "cd0fa22b7aead6eeba42e7e418b02a19ecce2a6e", "externalIds": {"PubMedCentral": "9779814", "DOI": "10.3390/ijerph192416584", "CorpusId": 254610883}, "corpusId": 254610883, "publicationVenue": {"id": "3096eb5c-d18c-4877-94cd-28edd3a9c357", "name": "International Journal of Environmental Research and Public Health", "type": "journal", "alternate_names": ["Int J Environ Res Public Health"], "issn": "1660-4601", "url": "http://www.mdpi.com/journal/ijerph/"}, "url": "https://www.semanticscholar.org/paper/cd0fa22b7aead6eeba42e7e418b02a19ecce2a6e", "title": "Serious Games as a Validation Tool for PREDIS: A Decision Support System for Disaster Management", "abstract": "In this paper, we validate PREDIS, a decision support system for disaster management using serious games to collect experts\u2019 judgments on its performance. PREDIS is a model for DISaster response supplier selection (PREDIS). It has a PREDictive component (PRED) for predicting the disaster human impact and an estimation component to Estimate the DISaster (EDIS) needs to optimise supplier-based resource allocation. A quasi-experiment design embedded in a participatory simulation game is conducted to compare the opinions of equal samples of 22 experts and non-experts. The following questions are put forward. First, \u201cDoes PREDIS model assists the decision makers to make the same decisions faster?\u201d Second, \u201cDoes the PREDIS model assist the non-experts as simulated decision makers to decide like an expert?\u201d Using AHP weights of decision makers\u2019 preferences as well as Borda counts, the decisions are compared. The result shows that PREDIS helps to reduce the decision-making time by experts and non-experts to 6 h after the disaster strike, instead of the usual 72 h. It also assists 71% of the non-experts to make decisions similar to those made by experts. In summary, the PREDIS model has two major capabilities. It enables the experts and non-experts to predict the disaster results immediately using widely available data. It also enables the non-experts to decide almost the same as the experts; either in predicting the human impact of a disaster and estimating the needs or in selecting suitable suppliers.", "venue": "International Journal of Environmental Research and Public Health", "year": 2022, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1660-4601/19/24/16584/pdf?version=1671090005", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-01", "journal": {"volume": "19", "name": "International Journal of Environmental Research and Public Health"}, "authors": [{"authorId": "2187330764", "name": "Sara Rye"}, {"authorId": "40469219", "name": "E. Aktas"}]}, {"paperId": "b9e9d385f5db34ab0670e3185949150097696525", "externalIds": {"PubMedCentral": "9718518", "DOI": "10.2196/39443", "CorpusId": 254179258}, "corpusId": 254179258, "publicationVenue": {"id": "6c3e705d-29b5-462c-9a3a-6c7877b74a18", "name": "JMIR Formative Research", "alternate_names": ["JMIR Form Res"], "issn": "2561-326X", "url": "https://formative.jmir.org/"}, "url": "https://www.semanticscholar.org/paper/b9e9d385f5db34ab0670e3185949150097696525", "title": "Learning the Treatment Process in Radiotherapy Using an Artificial Intelligence\u2013Assisted Chatbot: Development Study", "abstract": "Background In knowledge transfer for educational purposes, most cancer hospital or center websites have existing information on cancer health. However, such information is usually a list of topics that are neither interactive nor customized to offer any personal touches to people facing dire health crisis and to attempt to understand the concerns of the users. Patients with cancer, their families, and the general public accessing the information are often in challenging, stressful situations, wanting to access accurate information as efficiently as possible. In addition, there is seldom any comprehensive information specifically on radiotherapy, despite the large number of older patients with cancer, to go through the treatment process. Therefore, having someone with professional knowledge who can listen to them and provide the medical information with good will and encouragement would help patients and families struggling with critical illness, particularly during the lingering pandemic. Objective This study created a novel virtual assistant, a chatbot that can explain the radiation treatment process to stakeholders comprehensively and accurately, in the absence of any similar software. This chatbot was created using the IBM Watson Assistant with artificial intelligence and machine learning features. The chatbot or bot was incorporated into a resource that can be easily accessed by the general public. Methods The radiation treatment process in a cancer hospital or center was described by the radiotherapy process: patient diagnosis, consultation, and prescription; patient positioning, immobilization, and simulation; 3D-imaging for treatment planning; target and organ contouring; radiation treatment planning; patient setup and plan verification; and treatment delivery. The bot was created using IBM Watson (IBM Corp) assistant. The natural language processing feature in the Watson platform allowed the bot to flow through a given conversation structure and recognize how the user responds based on recognition of similar given examples, referred to as intents during development. Therefore, the bot can be trained using the responses received, by recognizing similar responses from the user and analyzing using Watson natural language processing. Results The bot is hosted on a website by the Watson application programming interface. It is capable of guiding the user through the conversation structure and can respond to simple questions and provide resources for requests for information that was not directly programmed into the bot. The bot was tested by potential users, and the overall averages of the identified metrics are excellent. The bot can also acquire users\u2019 feedback for further improvements in the routine update. Conclusions An artificial intelligence\u2013assisted chatbot was created for knowledge transfer regarding radiation treatment process to the patients with cancer, their families, and the general public. The bot that is supported by machine learning was tested, and it was found that the bot can provide information about radiotherapy effectively.", "venue": "JMIR Formative Research", "year": 2022, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://formative.jmir.org/2022/12/e39443/PDF", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-01", "journal": {"volume": "6", "name": "JMIR Formative Research"}, "authors": [{"authorId": "2187638438", "name": "Nathanael Rebelo"}, {"authorId": "49076259", "name": "Leslie Sanders"}, {"authorId": "2158259399", "name": "Kay Li"}, {"authorId": "2070774008", "name": "J. Chow"}]}, {"paperId": "f604c9436aa0103ba0ba4c8366bdaaae6b263138", "externalIds": {"DOI": "10.21608/jsec.2022.268733", "CorpusId": 253402215}, "corpusId": 253402215, "publicationVenue": {"id": "c32341a5-3607-4ae5-a497-b0a141e0098e", "name": "\u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629", "type": "journal", "alternate_names": ["\u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629"], "issn": "2636-2562"}, "url": "https://www.semanticscholar.org/paper/f604c9436aa0103ba0ba4c8366bdaaae6b263138", "title": "DEVELOPING A NEW BUSINESS OPPORTUNITIES VIA ARTIFICIAL INTELLIGENCE: NEW STRATEGIC MANAGEMENT MODEL", "abstract": "As we are living in the fourth industrial revolution era which is differentiated by the speed of technological breakthroughs, the enormous amount of data available can\u2019t be handled by the traditional analytical methods to generate new business opportunities. This study will tackle the optimization cycle by analyzing large amounts of usable data to create business opportunities. It provides a model for using Big Data Analytics to support service innovation and design. It is also a working framework for generating a business opportunities engine. It explains artificial intelligence (AI) and its contributions to creating business opportunities from big data and how it helps in improving the strategic planning structure. The study concluded that AI and machine learning added prediction and opportunity values to business data. It also clarifies that AI enriches the experience of business suggestions not only by predicting the best business ideas but also by recommending the best personnel and companies as investors for their preferred project ideas. This study extends the vision to create a smart business operating system. This includes scoring (ideas, financial status, the existence of opportunities, etc.), advice, and intelligent links between Venture capital and start-up prospects. This process is based on a variety of market analytics assisted by several elements of the application, such as corporate social networks, Score framework, recommendation, and geolocation analyzer, and quality developers for (Quality Proposal), business experience developer, competitiveness analyzer, plan predictions and forecasting. The study has three main phases to achieve the opportunity recommendations, First: business opportunity model inputs, second: business opportunity model processing, and finally business opportunity model outputs.", "venue": "\u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://jsec.journals.ekb.eg/article_268733_36e40ab6f3f51e5fe0fd5a1a78b3c21f.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-01", "journal": {"name": "\u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629"}, "authors": [{"authorId": "2190203460", "name": "Sayed Mahmoud El Sayed El Khouly"}, {"authorId": "2190201240", "name": "Kareem Yasser"}, {"authorId": "2176826746", "name": "Engy Ahmed Yehia"}]}, {"paperId": "c92543c426e6f1c02ad56174d49c798252cc2da1", "externalIds": {"DOI": "10.2139/ssrn.4141964", "CorpusId": 250058600}, "corpusId": 250058600, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c92543c426e6f1c02ad56174d49c798252cc2da1", "title": "Artificial Intelligence Applications in Pathological Diagnosis of Gastric Cancer", "abstract": null, "venue": "SSRN Electronic Journal", "year": 2022, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-01", "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "1724771727", "name": "Yang Deng"}, {"authorId": "2041760027", "name": "Hang-Yu Qin"}, {"authorId": "2144198459", "name": "Yanyan Zhou"}, {"authorId": "2121389684", "name": "Hong-Hong Liu"}, {"authorId": "2150036575", "name": "Yong Jiang"}, {"authorId": "2173647289", "name": "Jian-Ping Liu"}, {"authorId": "2159356873", "name": "Jianmin Bao"}]}, {"paperId": "79b645e8afab24917aa455a56241313559fba3e7", "externalIds": {"ArXiv": "2212.00061", "DBLP": "journals/corr/abs-2212-00061", "DOI": "10.48550/arXiv.2212.00061", "CorpusId": 254125717}, "corpusId": 254125717, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79b645e8afab24917aa455a56241313559fba3e7", "title": "Auxiliary Learning as a step towards Artificial General Intelligence", "abstract": "Auxiliary Learning is a machine learning approach in which the model acknowledges the existence of objects that do not come under any of its learned categories.The name \u201cAuxiliary learning\u201d was chosen due to the introduction of an auxiliary class. The paper focuses on increasing the generality of existing narrow purpose neural networks and also highlights the need to handle unknown objects. The Cat & Dog binary classi\ufb01er is taken as an example throughout the paper", "venue": "ArXiv", "year": 2022, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-30", "journal": {"volume": "abs/2212.00061", "name": "ArXiv"}, "authors": [{"authorId": "2134664642", "name": "Christeena Jose"}]}, {"paperId": "908e73ab7e4a7bc5bd42fd84b31b6290cda401a2", "externalIds": {"DOI": "10.3389/frvir.2022.1033709", "CorpusId": 253841933}, "corpusId": 253841933, "publicationVenue": {"id": "f1d4421a-af17-4df9-a4df-1077c32f0840", "name": "Frontiers in Virtual Reality", "type": "journal", "alternate_names": ["Front Virtual Real"], "issn": "2673-4192", "url": "https://www.frontiersin.org/journals/virtual-reality"}, "url": "https://www.semanticscholar.org/paper/908e73ab7e4a7bc5bd42fd84b31b6290cda401a2", "title": "Perceived authenticity of virtual characters makes the difference", "abstract": "Conventionally, human-controlled and machine-controlled virtual characters are studied separately under different theoretical frameworks based on the ontological nature of the particular virtual character. However, in recent years, the technological advancement has made the boundaries between human and machine agency increasingly blurred. This manuscript proposes a theoretical framework that can explain how various virtual characters, regardless of their ontological agency, can be treated as unique social actors with a focus on perceived authenticity. Specifically, drawing on the authenticity model in computer-mediated communication proposed by Lee (2020) and a typology of virtual characters, a multi-layered perceived authenticity model is proposed to demonstrate how virtual characters do not have to be perceived as humans and yet can be perceived as authentic to their human interactants.", "venue": "Frontiers in Virtual Reality", "year": 2022, "referenceCount": 109, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frvir.2022.1033709/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-25", "journal": {"volume": "3"}, "authors": [{"authorId": "2118226730", "name": "Junru Huang"}, {"authorId": "3669749", "name": "Younbo Jung"}]}, {"paperId": "1382cd1a16b001cbb5a298d4458b788c2f0a6ffa", "externalIds": {"DBLP": "journals/corr/abs-2211-13087", "ArXiv": "2211.13087", "DOI": "10.48550/arXiv.2211.13087", "CorpusId": 253801749}, "corpusId": 253801749, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1382cd1a16b001cbb5a298d4458b788c2f0a6ffa", "title": "Human or Machine? Turing Tests for Vision and Language", "abstract": "As AI algorithms increasingly participate in daily activities that used to be the sole province of humans, we are inevitably called upon to consider how much machines are really like us. To address this question, we turn to the Turing test and systematically benchmark current AIs in their abilities to imitate humans. We establish a methodology to evaluate humans versus machines in Turing-like tests and systematically evaluate a representative set of selected domains, parameters, and variables. The experiments involved testing 769 human agents, 24 state-of-the-art AI agents, 896 human judges, and 8 AI judges, in 21,570 Turing tests across 6 tasks encompassing vision and language modalities. Surprisingly, the results reveal that current AIs are not far from being able to impersonate human judges across different ages, genders, and educational levels", "venue": "ArXiv", "year": 2022, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-23", "journal": {"volume": "abs/2211.13087", "name": "ArXiv"}, "authors": [{"authorId": "2418491", "name": "Mengmi Zhang"}, {"authorId": "104096295", "name": "Giorgia Dellaferrera"}, {"authorId": "2048021896", "name": "Ankur Sikarwar"}, {"authorId": "40263427", "name": "M. Armend\u00e1riz"}, {"authorId": "2168467358", "name": "Noga Mudrik"}, {"authorId": "2067433241", "name": "Prachi Agrawal"}, {"authorId": "7232330", "name": "Spandan Madan"}, {"authorId": "21570451", "name": "Andrei Barbu"}, {"authorId": "2118530836", "name": "Haochen Yang"}, {"authorId": "2191899809", "name": "T. Kumar"}, {"authorId": "2191899184", "name": "Meghna Sadwani"}, {"authorId": "2191899118", "name": "Stella Dellaferrera"}, {"authorId": "2191896327", "name": "Michele Pizzochero"}, {"authorId": "40624376", "name": "H. Pfister"}, {"authorId": "2066787605", "name": "Gabriel Kreiman"}]}, {"paperId": "4000868e095553bc7985e02c6281de6096728298", "externalIds": {"DOI": "10.1556/2062.2022.00575", "CorpusId": 253826921}, "corpusId": 253826921, "publicationVenue": {"id": "7a4b48c2-25d7-4b89-8767-d8d04e1483ff", "name": "Acta Linguistica Academica", "alternate_names": ["Acta Linguistica Acad"], "issn": "2559-8201", "url": "https://www.ceeol.com/search/journal-detail?id=2067", "alternate_urls": ["https://www.jstor.org/journal/actalingacad"]}, "url": "https://www.semanticscholar.org/paper/4000868e095553bc7985e02c6281de6096728298", "title": "Winograd schemata and other datasets for anaphora resolution in Hungarian", "abstract": "The Winograd Schema Challenge (WSC, proposed by Levesque, Davis & Morgenstern 2012) is considered to be the novel Turing Test to examine machine intelligence. Winograd schema questions require the resolution of anaphora with the help of world knowledge and commonsense reasoning. Anaphora resolution is itself an important and difficult issue in natural language processing, therefore, many other datasets have been created to address this issue. In this paper we look into the Winograd schemata and other Winograd-like datasets and the translations of the schemata to other languages, such as Chinese, French and Portuguese. We present the Hungarian translation of the original Winograd schemata and a parallel corpus of all the translations of the schemata currently available. We also adapted some other anaphora resolution datasets to Hungarian. We aim to discuss the challenges we faced during the translation/adaption process.", "venue": "Acta Linguistica Academica", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://akjournals.com/downloadpdf/journals/2062/69/4/article-p564.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-22", "journal": {"name": "Acta Linguistica Academica"}, "authors": [{"authorId": "7847789", "name": "No\u00e9mi Vad\u00e1sz"}, {"authorId": "1414711705", "name": "No\u00e9mi Ligeti-Nagy"}]}, {"paperId": "4b12c354631d76ae6dadec168a14f77fc839fb0c", "externalIds": {"DOI": "10.1007/s43681-022-00236-7", "CorpusId": 253830855}, "corpusId": 253830855, "publicationVenue": {"id": "96ed79e9-36b2-4f58-8ef2-67296adef647", "name": "AI and Ethics", "type": "journal", "alternate_names": ["AI Ethics"], "issn": "2730-5953", "url": "https://www.springer.com/journal/43681"}, "url": "https://www.semanticscholar.org/paper/4b12c354631d76ae6dadec168a14f77fc839fb0c", "title": "Algorithmic decision-making in financial services: economic and normative outcomes in consumer credit", "abstract": null, "venue": "AI and Ethics", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-022-00236-7.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-21", "journal": {"name": "AI and Ethics"}, "authors": [{"authorId": "2161835433", "name": "Holli Sargeant"}]}, {"paperId": "444164a33acf5d207bb4acb955cbb1c128a45ce6", "externalIds": {"DBLP": "journals/corr/abs-2211-11461", "ArXiv": "2211.11461", "DOI": "10.48550/arXiv.2211.11461", "CorpusId": 253735380}, "corpusId": 253735380, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/444164a33acf5d207bb4acb955cbb1c128a45ce6", "title": "Exhaustive Symbolic Regression", "abstract": "\u2014Symbolic Regression (SR) algorithms learn analytic expressions which both accurately \ufb01t data and, unlike traditional machine-learning approaches, are highly interpretable. Conventional SR suffers from two fundamental issues which we address in this work. First, since the number of possible equations grows exponentially with complexity, typical SR methods search the space stochastically and hence do not necessarily \ufb01nd the best function. In many cases, the target problems of SR are suf\ufb01ciently simple that a brute-force approach is not only feasible, but desirable. Second, the criteria used to select the equation which optimally balances accuracy with simplicity have been variable and poorly motivated. To address these issues we introduce a new method for SR \u2013 Exhaustive Symbolic Regression (ESR) \u2013 which systematically and ef\ufb01ciently considers all possible equations and is therefore guaranteed to \ufb01nd not only the true optimum but also a complete function ranking. Utilising the minimum description length principle, we introduce a principled method for combining these preferences into a single objective statistic. To illustrate the power of ESR we apply it to a catalogue of cosmic chronometers and the Pantheon+ sample of supernovae to learn the Hubble rate as a function of redshift, \ufb01nding \u223c 40 functions (out of 5.2 million considered) that \ufb01t the data more economically than the Friedmann equation. These low-redshift data therefore do not necessarily prefer a \u039b CDM expansion history, and traditional SR algorithms that return only the Pareto-front, even if they found this successfully, would not locate \u039b CDM. We make our code and full equation sets publicly available \u00a7 .", "venue": "ArXiv", "year": 2022, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-21", "journal": {"volume": "abs/2211.11461", "name": "ArXiv"}, "authors": [{"authorId": "1792039168", "name": "D. J. Bartlett"}, {"authorId": "145903962", "name": "H. Desmond"}, {"authorId": "145209585", "name": "P. Ferreira"}]}, {"paperId": "2c43ef2d8e44d055b61eecddf323a3412007cef8", "externalIds": {"DBLP": "journals/corr/abs-2211-11483", "ArXiv": "2211.11483", "DOI": "10.48550/arXiv.2211.11483", "CorpusId": 253734407}, "corpusId": 253734407, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c43ef2d8e44d055b61eecddf323a3412007cef8", "title": "Deanthropomorphising NLP: Can a Language Model Be Conscious?", "abstract": "This work is intended as a voice in the discussion over the recent claims that LaMDA, a pretrained language model based on the Transformer model architecture, is sentient. This claim, if con\ufb01rmed, would have serious rami\ufb01cations in the Natural Language Processing (NLP) community due to wide-spread use of similar models. However, here we take the position that such a language model cannot be sentient, or conscious, and that LaMDA in particular exhibits no advances over other similar models that would qualify it. We jus-tify this by analysing the Transformer architecture through Integrated Information Theory. We see the claims of consciousness as part of a wider tendency to use anthropomorphic language in NLP reporting. Regard-less of the veracity of the claims, we consider this an opportune moment to take stock of progress in language modelling and consider the ethical implications of the task. In order to make this work helpful for readers outside the NLP community, we also present the necessary background in language modelling.", "venue": "ArXiv", "year": 2022, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-21", "journal": {"volume": "abs/2211.11483", "name": "ArXiv"}, "authors": [{"authorId": "2895959", "name": "M. Shardlow"}, {"authorId": "1984182", "name": "Piotr Przyby\u0142a"}]}, {"paperId": "ca958dfa4615ea205b2e7e036a85b7bb4f873dd4", "externalIds": {"ArXiv": "2211.15397", "DBLP": "journals/corr/abs-2211-15397", "DOI": "10.48550/arXiv.2211.15397", "CorpusId": 254043466}, "corpusId": 254043466, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca958dfa4615ea205b2e7e036a85b7bb4f873dd4", "title": "Automating Systematic Literature Reviews with Natural Language Processing and Text Mining: a Systematic Literature Review", "abstract": ".", "venue": "ArXiv", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-20", "journal": {"volume": "abs/2211.15397", "name": "ArXiv"}, "authors": [{"authorId": "3126428", "name": "G. Sundaram"}, {"authorId": "1772624", "name": "D. Berleant"}]}, {"paperId": "35620ce11ffb38ebdaf16810cf755f490689cbe2", "externalIds": {"DOI": "10.1080/08839514.2022.2145631", "CorpusId": 253700852}, "corpusId": 253700852, "publicationVenue": {"id": "c1ed9251-6b49-4b2d-90c8-7a997accddab", "name": "Applied Artificial Intelligence", "type": "journal", "alternate_names": ["Appl Artif Intell"], "issn": "0883-9514", "url": "http://www.catchword.com/rpsv/catchword/tandf/08839514/contp1-1.htm", "alternate_urls": ["http://www.tandfonline.com/loi/uaai20", "http://www.tandfonline.com/action/journalInformation?journalCode=uaai20", "http://www.metapress.com/link.asp?id=100651", "http://informaworld.com/openurl?genre=journal&issn=0883-9514"]}, "url": "https://www.semanticscholar.org/paper/35620ce11ffb38ebdaf16810cf755f490689cbe2", "title": "Artificial Intelligence and Human Resources Management: A Bibliometric Analysis", "abstract": "ABSTRACT Artificial Intelligence (AI) is increasingly present in organizations. In the specific case of Human Resource Management (HRM), AI has become increasingly relevant in recent years. This article aims to perform a bibliometric analysis of the scientific literature that addresses in a connected way the application and impact of AI in the field of HRM. The scientific databases consulted were Web of Science and Scopus, yielding an initial number of 156 articles, of which 73 were selected for subsequent analysis. The information was processed using the Bibliometrix tool, which provided information on annual production, analysis of journals, authors, documents, keywords, etc. The results obtained show that AI applied to HRM is a developing field of study with constant growth and a positive future vision, although it should also be noted that it has a very specific character as a result of the fact that most of the research is focused on the application of AI in recruitment and selection actions, leaving aside other sub-areas with a great potential for application.", "venue": "Applied Artificial Intelligence", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-18", "journal": {"volume": "36", "name": "Applied Artificial Intelligence"}, "authors": [{"authorId": "1405294056", "name": "P. Palos-S\u00e1nchez"}, {"authorId": "2121995364", "name": "P. Baena-Luna"}, {"authorId": "2191487154", "name": "A. Badicu"}, {"authorId": "1413743433", "name": "J. Infante-Moro"}]}, {"paperId": "52530930e60ac1f12461221e1e7cbab7fe537866", "externalIds": {"DOI": "10.37467/revvisual.v9.3748", "CorpusId": 253666968}, "corpusId": 253666968, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/52530930e60ac1f12461221e1e7cbab7fe537866", "title": "Variables para la fase diagn\u00f3stica de un software piloto de planeaci\u00f3n estrat\u00e9gica", "abstract": "El presente art\u00edculo es resultado del Proyecto Modelo semi\u00f3tico de planeaci\u00f3n estrat\u00e9gica, financiado por la Universidad Jorge Tadeo Lozano. En \u00e9l, se busca establecer variables para la fase diagn\u00f3stica de un Software piloto de apoyo a la planeaci\u00f3n estrat\u00e9gica publicitaria. El punto de partida fue el an\u00e1lisis del trabajo con casos de los premios Effie College Colombia 2018 y 2019, en los que el grupo investigador obtuvo dos premios oro. A partir de ello, se establecen los criterios para el perfilamiento de la situaci\u00f3n del cliente (anunciante) y del contexto de marca desde cuatro categor\u00edas: mercados, comunicaci\u00f3n, personas y tendencias.", "venue": "VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.eagora.org/revVISUAL/article/download/3748/2149", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-11-17", "journal": {"name": "VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual"}, "authors": [{"authorId": "2191356773", "name": "Vladimir S\u00e1nchez-Ria\u00f1o"}, {"authorId": "2191358818", "name": "Liliana C. Suarez Baez"}, {"authorId": "2099563395", "name": "O. Garcia-Bedoya"}, {"authorId": "2191357988", "name": "Jairo R. Sojo-Gomez"}]}, {"paperId": "479b33ebcae345ac0e493b037a4f124bb0771e42", "externalIds": {"DBLP": "journals/corr/abs-2211-16975", "ArXiv": "2211.16975", "DOI": "10.48550/arXiv.2211.16975", "CorpusId": 254096269}, "corpusId": 254096269, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/479b33ebcae345ac0e493b037a4f124bb0771e42", "title": "The Infinity of Randomness", "abstract": "This work starts from de\ufb01nition of randomness, the results of algorithmic randomness are analyzed from the perspective of application. Then, the source and nature of randomness is ex-plored", "venue": "ArXiv", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-16", "journal": {"volume": "abs/2211.16975", "name": "ArXiv"}, "authors": [{"authorId": "2193079278", "name": "Yongxin Li"}]}, {"paperId": "6d6ec79cd196b74d857c6426c1df1e94ede4be13", "externalIds": {"DBLP": "conf/mindtrek/GhajargarBL22", "DOI": "10.1145/3569219.3569418", "CorpusId": 253421848}, "corpusId": 253421848, "publicationVenue": {"id": "9fce586b-4914-4318-9aa8-9177513ec112", "name": "International Conference on Entertainment and Media in the Ubiquitous Era", "type": "conference", "alternate_names": ["Int Conf Entertain Media Ubiquitous Era", "Mindtrek", "International MindTrek Conference", "MindTrek", "Int Mindtrek Conf"], "url": "http://mindtrek.org/"}, "url": "https://www.semanticscholar.org/paper/6d6ec79cd196b74d857c6426c1df1e94ede4be13", "title": "A Redhead Walks into a Bar: Experiences of Writing Fiction with Artificial Intelligence", "abstract": "Human creativity has been often aided and supported by artificial tools, spanning traditional tools such as ideation cards, pens, and paper, to computed and software. Tools for creativity are increasingly using artificial intelligence to not only support the creative process, but also to act upon the creation with a higher level of agency. This paper focuses on writing fiction as a creative activity and explores human-AI co-writing through a research product, which employs a natural language processing model, the Generative Pre-trained Transformer 3 (GPT-3), to assist the co-authoring of narrative fiction. We report on two progressive \u2013 not comparative \u2013 autoethnographic studies to attain our own creative practices in light of our engagement with the research product: (1) a co-writing activity initiated by basic textual prompts using basic elements of narrative and (2) a co-writing activity initiated by more advanced textual prompts using elements of narrative, including dialects and metaphors undertaken by one of the authors of this paper who has doctoral training in literature. In both studies, we quickly came up against the limitations of the system; then, we repositioned our goals and practices to maximize our chances of success. As a result, we discovered not only limitations but also hidden capabilities, which not only altered our creative practices and outcomes, but which began to change the ways we were relating to the AI as collaborator.", "venue": "International Conference on Entertainment and Media in the Ubiquitous Era", "year": 2022, "referenceCount": 73, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3569219.3569418", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2022-11-16", "journal": {"name": "Proceedings of the 25th International Academic Mindtrek Conference"}, "authors": [{"authorId": "2536914", "name": "Maliheh Ghajargar"}, {"authorId": "1804390", "name": "Jeffrey Bardzell"}, {"authorId": "1991065549", "name": "Love Lagerkvist"}]}, {"paperId": "bbeec37a814305311aa6aef8eef1e912518805e9", "externalIds": {"ArXiv": "2211.07954", "DBLP": "journals/corr/abs-2211-07954", "DOI": "10.48550/arXiv.2211.07954", "CorpusId": 253523104}, "corpusId": 253523104, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bbeec37a814305311aa6aef8eef1e912518805e9", "title": "An Overview on Controllable Text Generation via Variational Auto-Encoders", "abstract": "Recent advances in neural-based generative modeling have reignited the hopes of having computer systems capable of conversing with humans and able to understand natural language. The employment of deep neural architectures has been largely explored in a multitude of context and tasks to ful\ufb01ll various user needs. On one hand, producing textual content that meets speci\ufb01c requirements is of priority for a model to seamlessly conduct conversa-tions with different groups of people. On the other hand, latent variable models (LVM) such as variational auto-encoders (VAEs) as one of the most popular genres of generative models are designed to characterize the distributional pattern of textual data. Thus they are inherently capable of learning the integral textual features that are worth exploring for controllable pursuits. This overview gives an introduction to existing generation schemes, problems associated with text variational auto-encoders, and a review of several applications about the controllable generation that are instantiations of these general formulations, 1 as well as related datasets, metrics and discussions for future re-searches. Hopefully, this overview will provide an overview of living questions, popular methodologies and raw thoughts for controllable language generation under the scope of variational auto-encoder.", "venue": "ArXiv", "year": 2022, "referenceCount": 97, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-15", "journal": {"volume": "abs/2211.07954", "name": "ArXiv"}, "authors": [{"authorId": "2136194164", "name": "Haoqin Tu"}, {"authorId": "50024168", "name": "Yitong Li"}]}, {"paperId": "326500d739029558edb6a607d07f45de9a8bb787", "externalIds": {"DOI": "10.1007/s44163-022-00038-0", "CorpusId": 253512920}, "corpusId": 253512920, "publicationVenue": {"id": "dda0a41e-efcd-40e6-87f7-a663355aceb3", "name": "Discover Artificial Intelligence", "type": "journal", "alternate_names": ["Discov Artif Intell"], "issn": "2731-0809", "url": "https://www.springer.com/journal/44163"}, "url": "https://www.semanticscholar.org/paper/326500d739029558edb6a607d07f45de9a8bb787", "title": "Identity of AI", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 110, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s44163-022-00038-0.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-14", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "1696366", "name": "V. Devedzic"}]}, {"paperId": "ef6c0d2bf2d779f9c518ab118c655b198741b00b", "externalIds": {"DBLP": "journals/corr/abs-2211-07625", "ArXiv": "2211.07625", "DOI": "10.48550/arXiv.2211.07625", "CorpusId": 253510432}, "corpusId": 253510432, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ef6c0d2bf2d779f9c518ab118c655b198741b00b", "title": "What Images are More Memorable to Machines?", "abstract": "This paper studies the problem of measuring and predicting how memorable an image is to pattern recognition machines, as a path to explore machine intelligence. Firstly, we propose a self-supervised machine memory quanti\ufb01ca-tion pipeline, dubbed \u201cMachineMem measurer\u201d, to collect machine memorability scores of images. Similar to humans, machines also tend to memorize certain kinds of images, whereas the types of images that machines and humans memorialize are different. Through in-depth analysis and comprehensive visualizations, we gradually unveil that \u201dcomplex\u201d images are usually more memorable to machines. We further conduct extensive experiments across 11 different machines (from linear classi\ufb01ers to modern ViTs) and 9 pre-training methods to analyze and understand machine memory. This work proposes the concept of machine memorability and opens a new research direction at the in-terface between machine memory and visual data.", "venue": "ArXiv", "year": 2022, "referenceCount": 89, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-14", "journal": {"volume": "abs/2211.07625", "name": "ArXiv"}, "authors": [{"authorId": "2109488495", "name": "Junlin Han"}, {"authorId": "31833458", "name": "Huangying Zhan"}, {"authorId": "2152093629", "name": "Jie Hong"}, {"authorId": "49208246", "name": "Pengfei Fang"}, {"authorId": "2145827897", "name": "Hongdong Li"}, {"authorId": "47773335", "name": "L. Petersson"}, {"authorId": "2190750918", "name": "Ian Reid"}]}, {"paperId": "d0ec5a31b392f6f228bb8886d98b335044977b9f", "externalIds": {"ArXiv": "2211.06766", "DBLP": "journals/corr/abs-2211-06766", "DOI": "10.48550/arXiv.2211.06766", "CorpusId": 253511102}, "corpusId": 253511102, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0ec5a31b392f6f228bb8886d98b335044977b9f", "title": "The Study of Complex Human Locomotion Behaviors: From Crawling to Walking", "abstract": "This paper uses a simple state machine to develop a control algorithm for controlling an infant humanoid in the context of a simple model system. The algorithm is inspired by a baby who starts learning to stand and walk at 7 to 12 months of age: he or she initially learns to crawl and then, once the lower limb muscles are strong enough, can learn to walk by coming to support his or her upper trunk. Ideally, this algorithm-supported locomotion can take the baby to any desired location: a pile of toys, a tasty snack, or the baby\u2019s parents or relatives. In this paper we analyze the crawling stage, the simple 2d bipedal model, and the initial walking form from 8 to 18 months of age, and quantitatively evaluate the ideal kinematics model and simulation results for these stages.", "venue": "ArXiv", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-12", "journal": {"volume": "abs/2211.06766", "name": "ArXiv"}, "authors": [{"authorId": "47411551", "name": "Shengjie Xu"}, {"authorId": "2423970", "name": "K. Mok"}]}, {"paperId": "1a788f333a3c30e27ee03aac24737db338cdcb8f", "externalIds": {"DOI": "10.54097/hset.v16i.2067", "CorpusId": 253657967}, "corpusId": 253657967, "publicationVenue": {"id": "8139fd99-9b3e-49a1-a8f1-f73376f8bd1a", "name": "Highlights in Science Engineering and Technology", "alternate_names": ["Highlight Sci Eng Technol"], "issn": "2791-0210"}, "url": "https://www.semanticscholar.org/paper/1a788f333a3c30e27ee03aac24737db338cdcb8f", "title": "Research and Applications Analysis of Knowledge Base Question Answering", "abstract": "Knowledge Base Question Answering (KBQA) has become one of recent trends in Natural Language Processing (NLP). It helps solve question answering tasks in many fields, such as commerce, medical treatment, etc. This article represents research of KBQA from theory to practice. The concept of knowledge graph in a new way are defined, the steps for building a basic knowledge graph are listed. The category of knowledge base is generalized. This article analyzes the category of knowledge based on systems and introduces the definition and working principle of KBQA. This article also introduces two main approaches used in KBQA, Information Retrieval-based (IR-based) methods and Semantic Parsing-based (SP-based) methods, including summarizing pipeline frameworks of these two approaches and the comparison between them. Two successful applications of KBQA, Meituan and AliMe, including researching on the schema of knowledge graph and pipeline frameworks are discussed in this article. Moreover, this article analyzes the applicable scenes of the two applications and analyzes the main challenges of KBQA.", "venue": "Highlights in Science Engineering and Technology", "year": 2022, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-10", "journal": {"name": "Highlights in Science, Engineering and Technology"}, "authors": [{"authorId": "1471678992", "name": "Jingyi Huang"}]}, {"paperId": "f1afd2e2c04307d3d0faea4c24f2ae47735221cf", "externalIds": {"DOI": "10.1075/idj.22013.rod", "CorpusId": 253469846}, "corpusId": 253469846, "publicationVenue": {"id": "6081cde8-8481-4d92-8974-ed0e0d8214ed", "name": "Information Design Journal", "type": "journal", "alternate_names": ["Inf Des J"], "issn": "0142-5471", "alternate_issns": ["1876-486X"], "url": "https://www.benjamins.com/catalog/idj", "alternate_urls": ["https://www.ingentaconnect.com/content/jbp/idj"]}, "url": "https://www.semanticscholar.org/paper/f1afd2e2c04307d3d0faea4c24f2ae47735221cf", "title": "Surprise machines", "abstract": "\n Surprise Machines is a project of experimental museology that\n sets out to visualize the entire image collection of the Harvard Art Museums,\n with a view to opening up unexpected vistas on more than 200,000 objects usually\n inaccessible to visitors. The project is part of the exhibition organized by\n metaLAB (at) Harvard entitled Curatorial A(i)gents and explores the limits of\n artificial intelligence to display a large set of images and create surprise\n among visitors. To achieve this feeling of surprise, a choreographic interface\n was designed to connect the audience\u2019s movement with several unique views of the\n collection.", "venue": "Information Design Journal", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.jbe-platform.com/deliver/fulltext/10.1075/idj.22013.rod/idj.22013.rod.pdf?itemId=%2Fcontent%2Fjournals%2F10.1075%2Fidj.22013.rod&mimeType=pdf&containerItemId=content/jbep", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-10", "journal": {"name": "Information Design Journal"}, "authors": [{"authorId": "3176132", "name": "D. Rodighiero"}, {"authorId": "2174202069", "name": "Lins Derry"}, {"authorId": "70003676", "name": "Douglas Duhaime"}, {"authorId": "2174202049", "name": "Jordan Kruguer"}, {"authorId": "2116237204", "name": "Maximilian Mueller"}, {"authorId": "2064535038", "name": "Christopher Pietsch"}, {"authorId": "66269452", "name": "J. Schnapp"}, {"authorId": "2190554638", "name": "Jeff Steward"}, {"authorId": "2190553522", "name": "metaLAB"}]}, {"paperId": "940284a49e54dca96cfed006f8ae252a11ff6157", "externalIds": {"DOI": "10.1007/s44163-022-00039-z", "CorpusId": 253450606}, "corpusId": 253450606, "publicationVenue": {"id": "dda0a41e-efcd-40e6-87f7-a663355aceb3", "name": "Discover Artificial Intelligence", "type": "journal", "alternate_names": ["Discov Artif Intell"], "issn": "2731-0809", "url": "https://www.springer.com/journal/44163"}, "url": "https://www.semanticscholar.org/paper/940284a49e54dca96cfed006f8ae252a11ff6157", "title": "The threat, hype, and promise of artificial intelligence in education", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s44163-022-00039-z.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-11-10", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "147674071", "name": "Niklas Humble"}, {"authorId": "2547308", "name": "Peter Mozelius"}]}, {"paperId": "a7d0e2afdeb11172d444e12489266ebf495ed221", "externalIds": {"DBLP": "journals/corr/abs-2211-05044", "ArXiv": "2211.05044", "DOI": "10.48550/arXiv.2211.05044", "CorpusId": 253420419}, "corpusId": 253420419, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7d0e2afdeb11172d444e12489266ebf495ed221", "title": "What is Wrong with Language Models that Can Not Tell a Story?", "abstract": "This paper argues that a deeper understanding of narrative and the successful generation of longer subjectively interesting texts is a vital bottleneck that hinders the progress in modern Natural Language Processing (NLP) and may even be in the whole \ufb01eld of Arti\ufb01cial Intelligence. We demonstrate that there are no ad-equate datasets, evaluation methods, and even operational concepts that could be used to start working on narrative processing.", "venue": "ArXiv", "year": 2022, "referenceCount": 38, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-09", "journal": {"volume": "abs/2211.05044", "name": "ArXiv"}, "authors": [{"authorId": "2130008929", "name": "Ivan P. Yamshchikov"}, {"authorId": "34501167", "name": "Alexey Tikhonov"}]}, {"paperId": "b3598a2f6c4e8a9e6d89de10b46bfad8e016ab2e", "externalIds": {"DBLP": "journals/corr/abs-2211-03796", "ArXiv": "2211.03796", "DOI": "10.48550/arXiv.2211.03796", "CorpusId": 253397751}, "corpusId": 253397751, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b3598a2f6c4e8a9e6d89de10b46bfad8e016ab2e", "title": "Astronomia ex machina: a history, primer, and outlook on neural networks in astronomy", "abstract": "In recent years, deep learning has infiltrated every field it has touched, reducing the need for specialist knowledge and automating the process of knowledge discovery from data. This review argues that astronomy is no different, and that we are currently in the midst of a deep learning revolution that is transforming the way we do astronomy. We trace the history of astronomical connectionism from the early days of multilayer perceptrons, through the second wave of convolutional and recurrent neural networks, to the current third wave of self-supervised and unsupervised deep learning. We then predict that we will soon enter a fourth wave of astronomical connectionism, in which finetuned versions of an all-encompassing \u2019foundation\u2019 model will replace expertly crafted deep learning models. We argue that such a model can only be brought about through a symbiotic relationship between astronomy and connectionism, whereby astronomy provides high quality multimodal data to train the foundation model, and in turn the foundation model is used to advance astronomical research.", "venue": "ArXiv", "year": 2022, "referenceCount": 266, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-07", "journal": {"volume": "abs/2211.03796", "name": "ArXiv"}, "authors": [{"authorId": "145618949", "name": "Michael J. Smith"}, {"authorId": "2308961", "name": "J. Geach"}]}, {"paperId": "08c152c12d83088cadbbf767a145e7cf2ff811d7", "externalIds": {"DOI": "10.5604/01.3001.0016.0800", "CorpusId": 254915443}, "corpusId": 254915443, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/08c152c12d83088cadbbf767a145e7cf2ff811d7", "title": "Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions", "abstract": "Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.\n\n", "venue": "Applied Cybersecurity & Internet Governance", "year": 2022, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-04", "journal": {"name": "Applied Cybersecurity & Internet Governance"}, "authors": [{"authorId": "2781746", "name": "Erwin Adi"}, {"authorId": "1752606", "name": "Z. Baig"}, {"authorId": "1706796", "name": "S. Zeadally"}]}, {"paperId": "ba2eef273f7bdb0993c12ff382f9e9530cde606e", "externalIds": {"DBLP": "journals/corr/abs-2211-01036", "ArXiv": "2211.01036", "DOI": "10.1109/OJCOMS.2022.3215676", "CorpusId": 253255371}, "corpusId": 253255371, "publicationVenue": {"id": "fbbafe0e-5e14-431f-9456-f569300a37cb", "name": "IEEE Open Journal of the Communications Society", "type": "journal", "alternate_names": ["IEEE Open J Commun Soc"], "issn": "2644-125X", "url": "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8782661"}, "url": "https://www.semanticscholar.org/paper/ba2eef273f7bdb0993c12ff382f9e9530cde606e", "title": "Explainable AI Over the Internet of Things (IoT): Overview, State-of-the-Art and Future Directions", "abstract": "Explainable Artificial Intelligence (XAI) is transforming the field of Artificial Intelligence (AI) by enhancing the trust of end-users in machines. As the number of connected devices keeps on growing, the Internet of Things (IoT) market needs to be trustworthy for the end-users. However, existing literature still lacks a systematic and comprehensive survey work on the use of XAI for IoT. To bridge this lacking, in this paper, we address the XAI frameworks with a focus on their characteristics and support for IoT. We illustrate the widely-used XAI services for IoT applications, such as security enhancement, Internet of Medical Things (IoMT), Industrial IoT (IIoT), and Internet of City Things (IoCT). We also suggest the implementation choice of XAI models over IoT systems in these applications with appropriate examples and summarize the key inferences for future works. Moreover, we present the cutting-edge development in edge XAI structures and the support of sixth-generation (6G) communication services for IoT applications, along with key inferences. In a nutshell, this paper constitutes the first holistic compilation on the development of XAI-based frameworks tailored for the demands of future IoT use cases.", "venue": "IEEE Open Journal of the Communications Society", "year": 2022, "referenceCount": 208, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/8782661/8901158/09930971.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-02", "journal": {"volume": "3", "pages": "2106-2136", "name": "IEEE Open Journal of the Communications Society"}, "authors": [{"authorId": "2067322880", "name": "S. K. Jagatheesaperumal"}, {"authorId": "145436642", "name": "Quoc-Viet Pham"}, {"authorId": "143740202", "name": "Rukhsana Ruby"}, {"authorId": "2187420041", "name": "Zhaohui Yang"}, {"authorId": "2189500017", "name": "Chunmei Xu"}, {"authorId": "2156123228", "name": "Zhaoyang Zhang"}]}, {"paperId": "3ea8947306f7990277fd66e6a9eca3ba2efe60ee", "externalIds": {"PubMedCentral": "9668059", "DOI": "10.3389/frai.2022.1015418", "CorpusId": 253248424, "PubMed": "36406470"}, "corpusId": 253248424, "publicationVenue": {"id": "6a8c0041-d0b7-4e32-b52c-33adef005c7e", "name": "Frontiers in Artificial Intelligence", "alternate_names": ["Front Artif Intell"], "issn": "2624-8212", "url": "https://www.frontiersin.org/journals/artificial-intelligence#"}, "url": "https://www.semanticscholar.org/paper/3ea8947306f7990277fd66e6a9eca3ba2efe60ee", "title": "Knowledge and attitudes of medical students in Lebanon toward artificial intelligence: A national survey study", "abstract": "Purpose This study assesses the knowledge and attitudes of medical students in Lebanon toward Artificial Intelligence (AI) in medical education. It also explores the students' perspectives regarding the role of AI in medical education as a subject in the curriculum and a teaching tool. Methods This is a cross-sectional study using an online survey consisting of close-ended questions. The survey targets medical students at all medical levels across the 7 medical schools in Lebanon. Results A total of 206 medical students responded. When assessing AI knowledge sources (81.1%) got their information from the media as compared to (9.7%) from medical school curriculum. However, Students who learned the basics of AI as part of the medical school curriculum were more knowledge about AI than their peers who did not. Students in their clinical years appear to be more knowledgeable about AI in medicine. The advancements in AI affected the choice of specialty of around a quarter of the students (26.8%). Finally, only a quarter of students (26.5%) want to be assessed by AI, even though the majority (57.7%) reported that assessment by AI is more objective. Conclusions Education about AI should be incorporated in the medical school curriculum to improve the knowledge and attitudes of medical students. Improving AI knowledge in medical students will in turn increase acceptance of AI as a tool in medical education, thus unlocking its potential in revolutionizing medical education.", "venue": "Frontiers in Artificial Intelligence", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frai.2022.1015418/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-02", "journal": {"volume": "5", "name": "Frontiers in Artificial Intelligence"}, "authors": [{"authorId": "2161995683", "name": "George Doumat"}, {"authorId": "2114932610", "name": "Darine Daher"}, {"authorId": "1844338348", "name": "Nadim N Ghanem"}, {"authorId": "5735112", "name": "Beatrice Khater"}]}, {"paperId": "b5fe4cd533bdbbe877341040c6323bc4beea3610", "externalIds": {"DBLP": "journals/cim/LiWDW22", "DOI": "10.1109/MCI.2022.3199622", "CorpusId": 253423814}, "corpusId": 253423814, "publicationVenue": {"id": "ee372de7-efda-4907-a03f-359292ea27f6", "name": "IEEE Computational Intelligence Magazine", "type": "journal", "alternate_names": ["IEEE Comput Intell Mag"], "issn": "1556-603X", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=10207", "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10207"]}, "url": "https://www.semanticscholar.org/paper/b5fe4cd533bdbbe877341040c6323bc4beea3610", "title": "Meta-Learning for Fast and Privacy-Preserving Source Knowledge Transfer of EEG-Based BCIs", "abstract": "Electroencephalogram (EEG) based brain-computer interfaces (BCIs) are used in many applications, due to their low-risk, low-cost, and convenience. Because of EEG\u2019s high variations across subjects and sessions, a long calibration session is usually needed to adjust the system before each use, which is time-consuming and user-unfriendly. Though various machine learning approaches have been proposed to cope with this problem, none of them considered individual differences, data scarcity and data privacy simultaneously. In this paper, a Multi-Domain Model-Agnostic Meta-Learning (MDMAML) approach is proposed to address challenging cross-subject, few-shot and source-free (privacy protection) classification tasks in EEG-based BCIs. Experiments on four datasets from two different BCI paradigms demonstrated that MDMAML outperformed several classical and state-of-the-art approaches in both online and offline applications.", "venue": "IEEE Computational Intelligence Magazine", "year": 2022, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-01", "journal": {"volume": "17", "pages": "16-26", "name": "IEEE Computational Intelligence Magazine"}, "authors": [{"authorId": "2190390548", "name": "Siyang Li"}, {"authorId": "2174480297", "name": "Huanyu Wu"}, {"authorId": "2408345", "name": "L. Ding"}, {"authorId": "144855927", "name": "Dongrui Wu"}]}, {"paperId": "7f28580f76bddbc65dc8871fd84d16bd7a164e63", "externalIds": {"PubMedCentral": "9658699", "DBLP": "journals/sensors/FreitasPFFRL22", "DOI": "10.3390/s22218531", "CorpusId": 253413747, "PubMed": "36366227"}, "corpusId": 253413747, "publicationVenue": {"id": "3dbf084c-ef47-4b74-9919-047b40704538", "name": "Italian National Conference on Sensors", "type": "conference", "alternate_names": ["SENSORS", "IEEE Sens", "Ital National Conf Sens", "IEEE Sensors", "Sensors"], "issn": "1424-8220", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-142001", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-142001", "http://www.mdpi.com/journal/sensors", "https://www.mdpi.com/journal/sensors"]}, "url": "https://www.semanticscholar.org/paper/7f28580f76bddbc65dc8871fd84d16bd7a164e63", "title": "Artificial Intelligence of Things Applied to Assistive Technology: A Systematic Literature Review", "abstract": "According to the World Health Organization, about 15% of the world\u2019s population has some form of disability. Assistive Technology, in this context, contributes directly to the overcoming of difficulties encountered by people with disabilities in their daily lives, allowing them to receive education and become part of the labor market and society in a worthy manner. Assistive Technology has made great advances in its integration with Artificial Intelligence of Things (AIoT) devices. AIoT processes and analyzes the large amount of data generated by Internet of Things (IoT) devices and applies Artificial Intelligence models, specifically, machine learning, to discover patterns for generating insights and assisting in decision making. Based on a systematic literature review, this article aims to identify the machine-learning models used across different research on Artificial Intelligence of Things applied to Assistive Technology. The survey of the topics approached in this article also highlights the context of such research, their application, the IoT devices used, and gaps and opportunities for further development. The survey results show that 50% of the analyzed research address visual impairment, and, for this reason, most of the topics cover issues related to computational vision. Portable devices, wearables, and smartphones constitute the majority of IoT devices. Deep neural networks represent 81% of the machine-learning models applied in the reviewed research.", "venue": "Italian National Conference on Sensors", "year": 2022, "referenceCount": 106, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1424-8220/22/21/8531/pdf?version=1667898967", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-11-01", "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "2191399671", "name": "Maur\u00edcio Pasetto de Freitas"}, {"authorId": "2190244052", "name": "Vin\u00edcius Aquino Piai"}, {"authorId": "147900609", "name": "Ricardo Heffel Farias"}, {"authorId": "50982086", "name": "Anita M. R. Fernandes"}, {"authorId": "1707339", "name": "A. Rossetto"}, {"authorId": "1693868", "name": "V. Leithardt"}]}, {"paperId": "eca279695fd5bc6d05ed35a4b6fc2c5ec89975d8", "externalIds": {"DOI": "10.22201/fesa.26832917e.2022.4.1.243", "CorpusId": 253334513}, "corpusId": 253334513, "publicationVenue": {"id": "166402f5-19c0-41bf-88b3-78f17424cd59", "name": "FIGURAS REVISTA ACAD\u00c9MICA DE INVESTIGACI\u00d3N", "alternate_names": ["FIG REV ACAD\u00c9MICA INVESTIG"], "issn": "2683-2917"}, "url": "https://www.semanticscholar.org/paper/eca279695fd5bc6d05ed35a4b6fc2c5ec89975d8", "title": "Inteligencia artificial en educaci\u00f3n: De usuarios pasivos a creadores cr\u00edticos", "abstract": "La inteligencia artificial (IA) se ha convertido en un lugar com\u00fan en nuestras vidas. Nos sorprende poco. Se cuenta ya con dispositivos llamados \u201cinteligentes\u201d como el tel\u00e9fono celular, Siri o Alexa. Se habla e inclusive se bromea con ellos, como si fueran personas. En este ensayo proponemos un camino para comprender, distinguir y hacer inteligencia artificial de manera sencilla, con el prop\u00f3sito de explicar en qu\u00e9 consiste esta tecnolog\u00eda en t\u00e9rminos cercanos y coloquiales. Se trata de formar consumidores de IA informados y cr\u00edticos, con literacidad en este \u00e1mbito. Para ello, se revisan sitios web que permiten hacer uso de la inteligencia artificial para crear dise\u00f1os originales y personalizados, y se explica el aprendizaje de m\u00e1quina con una herramienta inicialmente orientada a ni\u00f1os, mediante un ejemplo pr\u00e1ctico, lo cual facilita la incursi\u00f3n en este \u00e1mbito. Asimismo, se ofrece un recorrido breve acerca de c\u00f3mo se usa actualmente la inteligencia artificial en la educaci\u00f3n, sus ventajas y riesgos eventuales. Por \u00faltimo, se concluye que este \u00e1mbito tiene un r\u00e1pido crecimiento y que las instituciones educativas, en general, deben alistarse para adoptarlo de manera cr\u00edtica. \n\u00a0", "venue": "FIGURAS REVISTA ACAD\u00c9MICA DE INVESTIGACI\u00d3N", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistafiguras.acatlan.unam.mx/index.php/figuras/article/download/243/551", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-11-01", "journal": {"name": "FIGURAS REVISTA ACAD\u00c9MICA DE INVESTIGACI\u00d3N"}, "authors": [{"authorId": "2096228319", "name": "MariCarmen Gonz\u00e1lez-Videgaray"}, {"authorId": "2098481870", "name": "R. Romero-Ruiz"}]}, {"paperId": "39de1a4267a297116d5c317f75c8ebb0eab3a186", "externalIds": {"PubMedCentral": "9628381", "DOI": "10.1007/s44163-022-00037-1", "CorpusId": 253240565}, "corpusId": 253240565, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/39de1a4267a297116d5c317f75c8ebb0eab3a186", "title": "ERP Staff versus AI recruitment with employment real-time big data", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s44163-022-00037-1.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-31", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "2922792", "name": "K. Strang"}, {"authorId": "2118548137", "name": "Zhaohao Sun"}]}, {"paperId": "bdfcc87264808446152972591e66777c0c69f837", "externalIds": {"DOI": "10.1111/ejed.12533", "CorpusId": 253329319}, "corpusId": 253329319, "publicationVenue": {"id": "7da1ea4f-e21b-4b6f-b0bc-790a838fbd78", "name": "European Journal of Education", "type": "journal", "alternate_names": ["Eur J Educ"], "issn": "2601-8616", "alternate_issns": ["0141-8211"], "url": "http://journals.euser.org/index.php/ejed", "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1465-3435", "http://www.jstor.org/journals/01418211.html", "https://www.jstor.org/journal/eurojeduc"]}, "url": "https://www.semanticscholar.org/paper/bdfcc87264808446152972591e66777c0c69f837", "title": "State of the art and practice in\n AI\n in education", "abstract": null, "venue": "European Journal of Education", "year": 2022, "referenceCount": 60, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://discovery.ucl.ac.uk/10158374/1/Holmes%20and%20Tuomi%20-%202022%20-%20State%20of%20the%20art%20and%20practice%20in%20AI%20in%20education.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-30", "journal": {"name": "European Journal of Education"}, "authors": [{"authorId": "49042683", "name": "W. Holmes"}, {"authorId": "3251136", "name": "I. Tuomi"}]}, {"paperId": "2bda96a5254eb26a77e20f71c071c00672ce65c2", "externalIds": {"DBLP": "journals/mima/TownsendPANCCHT22", "DOI": "10.1007/s11023-022-09614-w", "CorpusId": 249246138}, "corpusId": 249246138, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/2bda96a5254eb26a77e20f71c071c00672ce65c2", "title": "From Pluralistic Normative Principles to Autonomous-Agent Rules", "abstract": null, "venue": "Minds and Machines", "year": 2022, "referenceCount": 101, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11023-022-09614-w.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-29", "journal": {"volume": "32", "pages": "683 - 715", "name": "Minds and Machines"}, "authors": [{"authorId": "120487341", "name": "B. Townsend"}, {"authorId": "97942021", "name": "Colin Paterson"}, {"authorId": "2143958636", "name": "T. Arvind"}, {"authorId": "2084422298", "name": "G. Nemirovsky"}, {"authorId": "143665272", "name": "R. Calinescu"}, {"authorId": "2167349034", "name": "Ana Cavalcanti"}, {"authorId": "2512463", "name": "I. Habli"}, {"authorId": "2167378744", "name": "Alan Thomas"}]}, {"paperId": "1cd43fed1ac5b95f7c9296420fb23e7fea66842e", "externalIds": {"DOI": "10.32466/eufv-rel.2022.9.754.170-186", "CorpusId": 253213406}, "corpusId": 253213406, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1cd43fed1ac5b95f7c9296420fb23e7fea66842e", "title": "Cuidado de personas dependientes. \u00bfPuede realizarlo un robot?", "abstract": "El cuidado de personas dependientes ha sido algo propio y radical del ser humano desde sus or\u00edgenes y raramente se plantea un escenario donde la persona que ejerce los cuidados fuere sustituida por un ente cibern\u00e9tico dotado de funcionalidades e inteligencia artificial suficiente como para llevar a cabo dicha labor. Este punto de partida nos ofrece la oportunidad para profundizar en la esencia del sentido del cuidado y la relaci\u00f3n que subyace entre la persona que cuida y la persona que es cuidada.", "venue": "Relectiones. Revista interdisciplinar de filosof\u00eda y humanidades.", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://portalderevistas.ufv.es/index.php/relectiones/article/download/754/791", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-10-28", "journal": {"name": "Relectiones. Revista interdisciplinar de filosof\u00eda y humanidades."}, "authors": [{"authorId": "2189259518", "name": "Jos\u00e9 Miguel Mohedano Mart\u00ednez"}, {"authorId": "2189261240", "name": "Luis Moreno Almonacid"}, {"authorId": "2189259752", "name": "Mary Luz Mouronte"}, {"authorId": "2189261238", "name": "Susana Bautista Blasco"}]}, {"paperId": "c0acc6ce5a3f6c416c9f6025f91b8222f709db9c", "externalIds": {"DOI": "10.35712/aig.v3.i4.96", "CorpusId": 253212257}, "corpusId": 253212257, "publicationVenue": {"id": "0d2e3833-1d23-429d-a0fe-a88c347eaa73", "name": "Artificial Intelligence in Gastroenterology", "type": "journal", "alternate_names": ["Artif Intell Gastroenterol"], "issn": "2644-3236"}, "url": "https://www.semanticscholar.org/paper/c0acc6ce5a3f6c416c9f6025f91b8222f709db9c", "title": "Role of artificial intelligence in the diagnosis and treatment of hepatocellular carcinoma", "abstract": "Artificial intelligence (AI) evolved many years ago, but it gained much advancement in recent years for its use in the medical domain. AI with its different subsidiaries, i.e. deep learning and machine learning, examine a large amount of data and performs an essential part in decision-making in addition to conquering the limitations related to human evaluation. Deep learning tries to imitate the functioning of the human brain. It utilizes much more data and intricate algorithms. Machine learning is AI based on automated learning. It utilizes earlier given data and uses algorithms to arrange and identify models. Globally, hepatocellular carcinoma is a major cause of illness and fatality. Although with substantial progress in the whole treatment strategy for hepatocellular carcinoma, managing it is still a major issue. AI in the area of gastroenterology, especially in hepatology, is particularly useful for various investigations of hepatocellular carcinoma because it is a commonly found tumor, and has specific radiological features that enable diagnostic procedures without the requirement of the histological study. However, interpreting and analyzing the resulting images is not always easy due to change of images throughout the disease process. Further, the prognostic process and response to the treatment process could be influenced by numerous components. Currently, AI is utilized in order to diagnose, curative and prediction goals. Future investigations are essential to prevent likely bias, which might subsequently influence the analysis of images and therefore restrict the consent and utilization of such models in medical practices. Moreover, experts are required to realize the real utility of such approaches, along with their associated potencies and constraints.", "venue": "Artificial Intelligence in Gastroenterology", "year": 2022, "referenceCount": 71, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-28", "journal": {"name": "Artificial Intelligence in Gastroenterology"}, "authors": [{"authorId": "2189259501", "name": "Rajesh Kumar Mokhria"}, {"authorId": "145663820", "name": "Jasbir Singh"}]}, {"paperId": "e813e57d124a2740868fe9aeb2f04ac2659db78a", "externalIds": {"DBLP": "conf/ialp/XuTH22", "DOI": "10.1109/IALP57159.2022.9961260", "CorpusId": 254155486}, "corpusId": 254155486, "publicationVenue": {"id": "a75536df-9055-4810-aca7-99392f95641e", "name": "International Conference on Asian Language Processing", "type": "conference", "alternate_names": ["Int Conf Asian Lang Process", "IALP"]}, "url": "https://www.semanticscholar.org/paper/e813e57d124a2740868fe9aeb2f04ac2659db78a", "title": "A Survey of Machine Reading Comprehension Methods", "abstract": "With the gradual maturity of deep learning technol-ogy, machine reading comprehension in natural language processing has become a popular research direction. Its research goal is to use computers to build models that enable computers to read articles, analyze semantics, and answer questions like humans. Due to the explosive growth of current text data, using models to quickly focus relevant information from text can save a lot of costs. Therefore, machine reading comprehension technology that can automatically process text has great research value. This paper summarizes the machine reading comprehension based on neural network in detail: first, the task definition and development process of machine reading comprehension are briefly introduced; secondly, the data sets and evaluation indicators of machine reading comprehension are introduced; then, the neural network of machine reading comprehension is introduced Model, including model architecture and some typical models; finally, the future development trend of machine reading comprehension is prospected.", "venue": "International Conference on Asian Language Processing", "year": 2022, "referenceCount": 58, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": "2022-10-27", "journal": {"pages": "312-317", "name": "2022 International Conference on Asian Language Processing (IALP)"}, "authors": [{"authorId": "2155346140", "name": "Xiaobo Xu"}, {"authorId": "2044853", "name": "Turdi Tohti"}, {"authorId": "50075755", "name": "A. Hamdulla"}]}, {"paperId": "f67e3225d115bcf02dfb0e26c64ea3eb8285de7b", "externalIds": {"DBLP": "journals/corr/abs-2210-15767", "ArXiv": "2210.15767", "DOI": "10.48550/arXiv.2210.15767", "CorpusId": 253224068}, "corpusId": 253224068, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f67e3225d115bcf02dfb0e26c64ea3eb8285de7b", "title": "Gathering Strength, Gathering Storms: The One Hundred Year Study on Artificial Intelligence (AI100) 2021 Study Panel Report", "abstract": "In the five years since we released the first AI100 report, much has been written about the state of artificial intelligence and its influences on society. Nonetheless, AI100 remains unique in its combination of two key features. First, it is written by a Study Panel of core multi-disciplinary researchers in the field\u2014experts who create artificial intelligence algorithms or study their influence on society as their main professional activity, and who have been doing so for many years. The authors are firmly rooted within the field of AI and provide an \u201cinsider\u2019s\u201d perspective. Second, it is a longitudinal study, with reports by such Study Panels planned once every five years, for at least one hundred years. SEPTEMBER 2021", "venue": "ArXiv", "year": 2022, "referenceCount": 54, "citationCount": 23, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-27", "journal": {"volume": "abs/2210.15767", "name": "ArXiv"}, "authors": [{"authorId": "144885169", "name": "M. Littman"}, {"authorId": "1562750490", "name": "Ifeoma Ajunwa"}, {"authorId": "49700022", "name": "G. Berger"}, {"authorId": "145646162", "name": "Craig Boutilier"}, {"authorId": "7259268", "name": "Morgan E. Currie"}, {"authorId": "1388372395", "name": "Finale Doshi-Velez"}, {"authorId": "40051700", "name": "Gillian K. Hadfield"}, {"authorId": "49148918", "name": "Michael C. Horowitz"}, {"authorId": "2065138119", "name": "Charles Isbell"}, {"authorId": "48078689", "name": "H. Kitano"}, {"authorId": "144463523", "name": "K. Levy"}, {"authorId": "66766071", "name": "Terah Lyons"}, {"authorId": "144380037", "name": "Melanie Mitchell"}, {"authorId": "143873972", "name": "J. Shah"}, {"authorId": "2404363", "name": "S. Sloman"}, {"authorId": "1817942", "name": "Shannon Vallor"}, {"authorId": "1733716", "name": "T. Walsh"}]}, {"paperId": "fe123b27a3ecc63c7087cb0d3a04e43790661c2d", "externalIds": {"ArXiv": "2210.15629", "DBLP": "journals/corr/abs-2210-15629", "DOI": "10.48550/arXiv.2210.15629", "CorpusId": 253157363}, "corpusId": 253157363, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fe123b27a3ecc63c7087cb0d3a04e43790661c2d", "title": "LAD: Language Augmented Diffusion for Reinforcement Learning", "abstract": "Learning skills from language provides a powerful avenue for generalization in reinforcement learning, although it remains a challenging task as it requires agents to capture the complex interdependencies between language, actions, and states. In this paper, we propose leveraging L anguage A ugmented D iffusion models as a planner conditioned on language (LAD). We demonstrate the comparable performance of LAD with the state-of-the-art on the CALVIN language robotics benchmark with a much simpler architecture that contains no inductive biases special-ized to robotics, achieving an average success rate (SR) of 72% compared to the best performance of 76%. We also conduct an analysis on the properties of language conditioned diffusion in reinforcement learning.", "venue": "ArXiv", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-27", "journal": {"volume": "abs/2210.15629", "name": "ArXiv"}, "authors": [{"authorId": "6549913", "name": "Edwin Zhang"}, {"authorId": "47006228", "name": "Yujie Lu"}, {"authorId": "2187907974", "name": "W. Wang"}, {"authorId": "2111672235", "name": "Amy Zhang"}]}, {"paperId": "9de73186a4a04179c6012bcbe555a4a795f93396", "externalIds": {"PubMedCentral": "9607774", "DOI": "10.1007/s10614-022-10333-8", "CorpusId": 253165300, "PubMed": "36321065"}, "corpusId": 253165300, "publicationVenue": {"id": "94b5909e-18e0-4cac-9e9d-731ff1c58823", "name": "Computational Economics", "type": "journal", "alternate_names": ["Comput Econ"], "issn": "0927-7099", "url": "https://link.springer.com/journal/10614"}, "url": "https://www.semanticscholar.org/paper/9de73186a4a04179c6012bcbe555a4a795f93396", "title": "Application of Supervised Machine Learning Techniques to Forecast the COVID-19 U.S. Recession and Stock Market Crash", "abstract": null, "venue": "Computational Economics", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10614-022-10333-8.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-26", "journal": {"pages": "1 - 25", "name": "Computational Economics"}, "authors": [{"authorId": "1977212", "name": "Rama K. Malladi"}]}, {"paperId": "cf0ae306a5b485fbf391b60d026f75e008115500", "externalIds": {"ArXiv": "2210.16987", "DBLP": "journals/corr/abs-2210-16987", "DOI": "10.48550/arXiv.2210.16987", "CorpusId": 253237809}, "corpusId": 253237809, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cf0ae306a5b485fbf391b60d026f75e008115500", "title": "Symbolic Distillation for Learned TCP Congestion Control", "abstract": "Recent advances in TCP congestion control (CC) have achieved tremendous success with deep reinforcement learning (RL) approaches, which use feedforward neural networks (NN) to learn complex environment conditions and make better decisions. However, such \u201cblack-box\u201d policies lack interpretability and reliability, and often, they need to operate outside the traditional TCP datapath due to the use of complex NNs. This paper proposes a novel two-stage solution to achieve the best of both worlds: \ufb01rst to train a deep RL agent, then distill its (over-)parameterized NN policy into white-box, light-weight rules in the form of symbolic expressions that are much easier to understand and to implement in constrained environments. At the core of our proposal is a novel symbolic branching algorithm that enables the rule to be aware of the context in terms of various network conditions, eventually converting the NN policy into a symbolic tree. The distilled symbolic rules preserve and often improve performance over state-of-the-art NN policies while being faster and simpler than a standard neural network. We validate the performance of our distilled symbolic rules on both simulation and emulation environments. Our code is available at https://github.com/VITA-Group/SymbolicPCC .", "venue": "ArXiv", "year": 2022, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-24", "journal": {"volume": "abs/2210.16987", "name": "ArXiv"}, "authors": [{"authorId": "2005814581", "name": "S. Sharan"}, {"authorId": "2152934619", "name": "Wenqing Zheng"}, {"authorId": "152764944", "name": "Kuo-Feng Hsu"}, {"authorId": "40862349", "name": "Jiarong Xing"}, {"authorId": "30894196", "name": "Ang Chen"}, {"authorId": "2969311", "name": "Zhangyang Wang"}]}, {"paperId": "764a616937a5923aaf22288b35f6b991ae41521d", "externalIds": {"ArXiv": "2210.13304", "DBLP": "journals/corr/abs-2210-13304", "DOI": "10.48550/arXiv.2210.13304", "CorpusId": 253098627}, "corpusId": 253098627, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/764a616937a5923aaf22288b35f6b991ae41521d", "title": "ELMER: A Non-Autoregressive Pre-trained Language Model for Efficient and Effective Text Generation", "abstract": "We study the text generation task under the approach of pre-trained language models (PLMs). Typically, an auto-regressive (AR) method is adopted for generating texts in a token-by-token manner. Despite many advantages of AR generation, it usually suffers from inefficient inference. Therefore, nonautoregressive (NAR) models are proposed to generate all target tokens simultaneously. However, NAR models usually generate texts of lower quality due to the absence of token dependency in the output text. In this paper, we propose ELMER: an Efficient and effective PLM for NAR tExt geneRation to explicitly model the token dependency during NAR generation. By leveraging the early exit technique, ELMER enables the token generations at different layers, according to their prediction confidence (a more confident token will exit at a lower layer). Besides, we propose a novel pre-training objective, Layer Permutation Language Modeling, to pre-train ELMER by permuting the exit layer for each token in sequences. Experiments on three text generation tasks show that ELMER significantly outperforms NAR models and further narrows the performance gap with AR PLMs (e.g., ELMER (29.92) vs BART (30.61) ROUGE-L in XSUM) while achieving over 10 times inference speedup.", "venue": "ArXiv", "year": 2022, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-24", "journal": {"volume": "abs/2210.13304", "name": "ArXiv"}, "authors": [{"authorId": "2018027", "name": "Junyi Li"}, {"authorId": "1997234792", "name": "Tianyi Tang"}, {"authorId": "2542603", "name": "Wayne Xin Zhao"}, {"authorId": "50204644", "name": "J. Nie"}, {"authorId": "153693432", "name": "Ji-rong Wen"}]}, {"paperId": "2e0c7f21b9d45d6a7eca0f14f220ce6715844fa2", "externalIds": {"DOI": "10.1109/IROS47612.2022.9981671", "CorpusId": 255175309}, "corpusId": 255175309, "publicationVenue": {"id": "37275deb-3fcf-4d16-ae77-95db9899b1f3", "name": "IEEE/RJS International Conference on Intelligent RObots and Systems", "type": "conference", "alternate_names": ["IROS", "Intelligent Robots and Systems", "Intell Robot Syst", "IEEE/RJS Int Conf Intell Robot Syst"], "url": "http://www.iros.org/"}, "url": "https://www.semanticscholar.org/paper/2e0c7f21b9d45d6a7eca0f14f220ce6715844fa2", "title": "HRI Framework for Continual Learning in Face Recognition", "abstract": "Recognizing human partners is an essential social skill for building personalized and long-term human-robot interactions. However, robots deployed in complex, real-world environments have to face several challenges, such as managing unstructured interactions with multiple users, limited computational resources, and intrinsic and continuous variability of their sensory evidence. To cope with these challenges, we propose a framework to perform autonomous incremental learning for open-set face recognition suitable for unconstrained HRI scenarios. We validated the proposed framework in a real-world experiment, demonstrating its suitability to let the robot autonomously interact with multiple people while creating a labeled database of their faces across various encounters. Furthermore, we evaluated how an off-the-shelf model performed with data gathered from the HRI setting and proposed a fine-tuned model obtained with a transfer learning technique. Analyses about automatic threshold determination and rehearsal methods for memory sampling were also proposed. Our preliminary results suggest that exploiting the first-hand robot's experience could be crucial to ensure better models' performance and, therefore, could be advantageous for the acceptance and effectiveness of social robots in the long run. With this work, we aim to provide insights on continual learning approaches in the HRI field to promote autonomous and personalized solutions meaningful for real-world applications.", "venue": "IEEE/RJS International Conference on Intelligent RObots and Systems", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-10-23", "journal": {"pages": "8226-8233", "name": "2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)"}, "authors": [{"authorId": "1392700266", "name": "G. Belgiovine"}, {"authorId": "2198444971", "name": "Jonas Gonzlez-Billandon"}, {"authorId": "1923910", "name": "A. Sciutti"}, {"authorId": "1678909", "name": "G. Sandini"}, {"authorId": "143807743", "name": "F. Rea"}]}, {"paperId": "b193281227cb093dc138e701d825a8a13d443a67", "externalIds": {"ArXiv": "2210.11832", "DBLP": "journals/corr/abs-2210-11832", "DOI": "10.48550/arXiv.2210.11832", "CorpusId": 253080782}, "corpusId": 253080782, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b193281227cb093dc138e701d825a8a13d443a67", "title": "AI-HRI Brings New Dimensions to Human-Aware Design for Human-Aware AI", "abstract": "Since the \ufb01rst AI-HRI held at the 2014 AAAI Fall Sym- posium Series, a lot of the presented research and discussions have emphasized how arti\ufb01cial intelligence (AI) de- velopments can bene\ufb01t human-robot interaction (HRI). This portrays HRI as an application, a source of domain-speci\ufb01c problems to solve, to the AI community. Likewise, this portrays AI as a tool, a source of solutions available for relevant problems, to the HRI community. However, members of the AI-HRI research community will point out that the relation- ship has a deeper synergy than matchmaking problems and solutions\u2014there are insights from each \ufb01eld that impact how the other one thinks about the world and performs scienti\ufb01c research. There is no greater opportunity for sharing perspec- tives at the moment than human-aware AI, which studies how to account for the fact that people are more than a source of data or part of an algorithm. We will explore how AI-HRI can change the way researchers think about human-aware AI, from observation through validation, to make even the algorithmic design process human-aware.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-21", "journal": {"volume": "abs/2210.11832", "name": "ArXiv"}, "authors": [{"authorId": "50632846", "name": "R. Freedman"}]}, {"paperId": "319a56db82294e822d3b5f146751557da9260363", "externalIds": {"DOI": "10.1163/19552343-14234031", "CorpusId": 253154269}, "corpusId": 253154269, "publicationVenue": {"id": "ed594146-b2eb-4c60-8f94-98ed62f4eb9f", "name": "Revue de Synth\u00e8se", "type": "journal", "alternate_names": ["Revue de synth\u00e8se", "Rev synth\u00e8se", "Rev Synth\u00e8se"], "issn": "0035-1776", "url": "https://brill.com/rds", "alternate_urls": ["http://synth.revuesonline.com/accueil.jsp"]}, "url": "https://www.semanticscholar.org/paper/319a56db82294e822d3b5f146751557da9260363", "title": "Comparer la logique et le droit? Quelques remarques th\u00e9oriques sur l\u2019usage du num\u00e9rique en droit (Tome 143, 7e S\u00e9rie, n\u00b0 3-4, (2022))", "abstract": "\n La num\u00e9risation actuelle du droit permet de revenir sur les liens historiques entre le droit et la logique moderne. En se fondant sur la diff\u00e9rence \u00e9tablie par J. Van Heijenoort entre logique \u00abcomme calcul\u00bb et logique \u00abcomme langage\u00bb, l\u2019article \u00e9tablit des analogies entre diff\u00e9rentes interpr\u00e9tations de la logique et diff\u00e9rents types de syst\u00e8mes ou d\u2019instances juridiques : \u00abCommon law\u00bb, syst\u00e8mes \u00abcivils\u00bb, \u00abcour de cassation\u00bb, cette derni\u00e8re notion caract\u00e9risant le formalisme hilbertien. Ce formalisme a tent\u00e9 de r\u00e9duire la logique \u00abcomme langage\u00bb \u00e0 la logique \u00abcomme calcul\u00bb mais la d\u00e9couverte des limitations internes des formalismes y a mis un terme : d\u2019o\u00f9 le parall\u00e8le entre l\u2019\u00e9chec du programme hilbertien et les difficult\u00e9s rencontr\u00e9es dans la num\u00e9risation actuelle du droit. Le droit n\u2019est pas r\u00e9ductible \u00e0 un calcul formel sur des marques \u00e9crites : il reste une discipline dans laquelle la parole et le dialogue sont indispensables pour r\u00e9aliser les buts qu\u2019il s\u2019assigne.", "venue": "Revue de Synth\u00e8se", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-10-20", "journal": {"name": "Revue de Synth\u00e8se"}, "authors": [{"authorId": "3351883", "name": "J. Lass\u00e8gue"}]}, {"paperId": "e86976fbe9064d02ae5d011f440e51d8abea4ce3", "externalIds": {"DBLP": "conf/kse/TranLH22", "DOI": "10.1109/KSE56063.2022.9953771", "CorpusId": 253785430}, "corpusId": 253785430, "publicationVenue": {"id": "87ad3a52-6dd9-45bd-a0f2-f87453c491ed", "name": "International Conference on Knowledge and Systems Engineering", "type": "conference", "alternate_names": ["KSE", "Int Conf Knowl Syst Eng", "Knowledge and Systems Engineering", "Knowl Syst Eng"], "url": "http://www.wikicfp.com/cfp/program?id=1922"}, "url": "https://www.semanticscholar.org/paper/e86976fbe9064d02ae5d011f440e51d8abea4ce3", "title": "Towards a Human-like Chatbot using Deep Adversarial Learning", "abstract": "Conversational agents are getting more popular and applied in a wide range of practical application areas. The main task of these agents is not only to generate context-appropriate responses to a given query but also to make the conversation human-like. Thanks to the ability of deep learning based models in natural language modeling, recent studies have made progress in designing conversational agents that can provide more semantically accurate responses. However, the naturalness in such conversation setting has not been given adequate attention in these studies. This paper aims to incorporate both important criteria of accuracy and naturalness of conversation in developing a new model for conversational agents. To this end, inspired by the idea of Turing test and the idea of adversarial learning strategy, we propose to design a model based on generative deep neural networks that interestingly allow to generate accurate responses optimized by the mechanics of imitating human-generated conversations. Experimental results demonstrate that the proposed models produce more natural and accurate responses, yielding significant gains in BLEU scores.", "venue": "International Conference on Knowledge and Systems Engineering", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-10-19", "journal": {"pages": "1-5", "name": "2022 14th International Conference on Knowledge and Systems Engineering (KSE)"}, "authors": [{"authorId": "2128128313", "name": "Quoc-Dai Luong Tran"}, {"authorId": "1788292", "name": "Anh-Cuong Le"}, {"authorId": "144957865", "name": "V. Huynh"}]}, {"paperId": "5c02d55fe14e2baf4b6b59a476ee6a20698397ef", "externalIds": {"ArXiv": "2210.10684", "DBLP": "journals/corr/abs-2210-10684", "DOI": "10.48550/arXiv.2210.10684", "CorpusId": 252992616}, "corpusId": 252992616, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c02d55fe14e2baf4b6b59a476ee6a20698397ef", "title": "Language Models Understand Us, Poorly", "abstract": "Some claim language models understand us. Others won\u2019t hear it. To clarify, I investigate three views of human language understanding : as-mapping , as-reliability and as-representation (\u00a72). I argue that while behavioral reliability is necessary for understanding, internal representations are suf\ufb01cient; they climb the right hill (\u00a73). I review state-of-the-art language and multi-modal models: they are pragmatically challenged by under-speci\ufb01cation of form (\u00a74). I question the Scaling Paradigm : limits on resources may pro-hibit scaled-up models from approaching understanding (\u00a75). Last, I describe how as-representation advances a science of understanding. We need work which probes model internals, adds more of human language, and measures what models can learn (\u00a76).", "venue": "ArXiv", "year": 2022, "referenceCount": 80, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-10-19", "journal": {"volume": "abs/2210.10684", "name": "ArXiv"}, "authors": [{"authorId": "2108562363", "name": "Jared Moore"}]}, {"paperId": "f4caeee685c40289c3fa92c609abbf0e387977b8", "externalIds": {"DOI": "10.1007/s13347-022-00591-7", "CorpusId": 252973149}, "corpusId": 252973149, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f4caeee685c40289c3fa92c609abbf0e387977b8", "title": "To Each Technology Its Own Ethics: The Problem of Ethical Proliferation", "abstract": null, "venue": "Philosophy & Technology", "year": 2022, "referenceCount": 95, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13347-022-00591-7.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-18", "journal": {"volume": "35", "name": "Philosophy & Technology"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}, {"authorId": "144338643", "name": "J. Danaher"}]}, {"paperId": "54b2b6fd3c297d39881a89d497af6fe5c46fa25c", "externalIds": {"PubMedCentral": "9588382", "DOI": "10.1155/2022/4509394", "CorpusId": 252951830, "PubMed": "36285284"}, "corpusId": 252951830, "publicationVenue": {"id": "2ca1e2ac-8c3b-4251-94ed-24846d391d3b", "name": "Computational and Mathematical Methods in Medicine", "type": "journal", "alternate_names": ["Comput Math Method Med"], "issn": "1748-670X", "url": "https://www.hindawi.com/journals/cmmm/"}, "url": "https://www.semanticscholar.org/paper/54b2b6fd3c297d39881a89d497af6fe5c46fa25c", "title": "Deep Transfer Learning for COVID-19 Detection and Lesion Recognition Using Chest CT Images", "abstract": "Starting from December 2019, the global pandemic of coronavirus disease 2019 (COVID-19) is continuously expanding and has caused several millions of deaths worldwide. Fast and accurate diagnostic methods for COVID-19 detection play a vital role in containing the plague. Chest computed tomography (CT) is one of the most commonly used diagnosis methods. However, a complete CT-scan has hundreds of slices, and it is time-consuming for radiologists to check each slice to diagnose COVID-19. This study introduces a novel method for fast and automated COVID-19 diagnosis using the chest CT scans. The proposed models are based on the state-of-the-art deep convolutional neural network (CNN) architecture, and a 2D global max pooling (globalMaxPool2D) layer is used to improve the performance. We compare the proposed models to the existing state-of-the-art deep learning models such as CNN based models and vision transformer (ViT) models. Based off of metric such as area under curve (AUC), sensitivity, specificity, accuracy, and false discovery rate (FDR), experimental results show that the proposed models outperform the previous methods, and the best model achieves an area under curve of 0.9744 and accuracy 94.12% on our test datasets. It is also shown that the accuracy is improved by around 1% by using the 2D global max pooling layer. Moreover, a heatmap method to highlight the lesion area on COVID-19 chest CT images is introduced in the paper. This heatmap method is helpful for a radiologist to identify the abnormal pattern of COVID-19 on chest CT images. In addition, we also developed a freely accessible online simulation software for automated COVID-19 detection using CT images. The proposed deep learning models and software tool can be used by radiologist to diagnose COVID-19 more accurately and efficiently.", "venue": "Computational and Mathematical Methods in Medicine", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/cmmm/2022/4509394.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-15", "journal": {"volume": "2022", "name": "Computational and Mathematical Methods in Medicine"}, "authors": [{"authorId": "2107951143", "name": "Sai Zhang"}, {"authorId": "2187974237", "name": "Guo-Chang Yuan"}]}, {"paperId": "997890a72011affaff95ff8e6a22ad0c370cf366", "externalIds": {"ArXiv": "2210.08340", "DBLP": "journals/corr/abs-2210-08340", "DOI": "10.48550/arXiv.2210.08340", "CorpusId": 252917719}, "corpusId": 252917719, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/997890a72011affaff95ff8e6a22ad0c370cf366", "title": "Toward Next-Generation Artificial Intelligence: Catalyzing the NeuroAI Revolution", "abstract": ": Neuroscience has long been an important driver of progress in artificial intelligence (AI). We propose that to accelerate progress in AI, we must invest in fundamental research in NeuroAI. Over the coming decades, Artificial Intelligence (AI) will transform society and the world economy in ways that are as profound as the computer revolution of the last half century, and likely at an even faster pace. This AI revolution presents tremendous opportunities to unleash human creativity in the modern economy. New developments in AI systems have the potential to enable workers to attain greater productivity and relieve them from performing the most dangerous and menial jobs. But, to reach this potential, we still require advances that will make AI more human-like in its capabilities. Historically, neuroscience has been a key driver and source of inspiration for improvements in AI, particularly those that made AI more proficient in areas that humans and other animals excel at, such as vision, reward-based learning, interacting with the physical world, and language (Hassabis et al. 2017). It can still play this role. To accelerate progress in AI and realize its vast potential, we must invest in fundamental research in \u201cNeuroAI\u201d. The by to brains Pitts an \u201cartificial brain\u201d John von upon the very limited knowledge of the brain in the other animals. Because each animal has its own unique set of abilities, each animal defines its own embodied Turing test: An artificial beaver might be tested on its ability to build a dam, and an artificial squirrel on its ability to jump through trees. Nonetheless, many core sensorimotor capabilities are shared by almost all animals, and the ability of animals to rapidly evolve the sensorimotor skills needed to adapt to new environments suggests that these core skills provide a solid foundation. Below we highlight a few of these shared characteristics.", "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-15", "journal": {"volume": "abs/2210.08340", "name": "ArXiv"}, "authors": [{"authorId": "3199565", "name": "A. Zador"}, {"authorId": "38498866", "name": "Blake A. Richards"}, {"authorId": "1422033616", "name": "Bence Olveczky"}, {"authorId": "2153071", "name": "Sean Escola"}, {"authorId": "1865800402", "name": "Y. Bengio"}, {"authorId": "1701564", "name": "K. Boahen"}, {"authorId": "46378362", "name": "M. Botvinick"}, {"authorId": "32064081", "name": "D. Chklovskii"}, {"authorId": "3786556", "name": "A. Churchland"}, {"authorId": "2388737", "name": "C. Clopath"}, {"authorId": "1865831", "name": "J. DiCarlo"}, {"authorId": "25769960", "name": "S. Ganguli"}, {"authorId": "47993087", "name": "J. Hawkins"}, {"authorId": "2065566758", "name": "Konrad Koerding"}, {"authorId": "1875952", "name": "A. Koulakov"}, {"authorId": "1688882", "name": "Yann LeCun"}, {"authorId": "2542999", "name": "T. Lillicrap"}, {"authorId": "2367822", "name": "Adam H. Marblestone"}, {"authorId": "1708655", "name": "B. Olshausen"}, {"authorId": "2469356", "name": "A. Pouget"}, {"authorId": "29406516", "name": "Cristina Savin"}, {"authorId": "1714528", "name": "T. Sejnowski"}, {"authorId": "1689350", "name": "Eero P. Simoncelli"}, {"authorId": "1759839", "name": "S. Solla"}, {"authorId": "3089810", "name": "David Sussillo"}, {"authorId": "1739838", "name": "A. Tolias"}, {"authorId": "34762467", "name": "Doris Y. Tsao"}]}, {"paperId": "2a201b3ad2aa56a3cc6cda09c05e765566daf2aa", "externalIds": {"DOI": "10.1109/ICRITO56286.2022.9964700", "CorpusId": 254458792}, "corpusId": 254458792, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a201b3ad2aa56a3cc6cda09c05e765566daf2aa", "title": "Design and Development of a Ticket Booking System using Smart Bot", "abstract": "Chatbot is a computer software program, that communicates to users via text or speech. This helps users to get information quickly, guides on something which the user is not aware of, answers the inputs rapidly, provides a better service, and assists online users 24/7. When there is an input, the chatbot will answer the question using the database which is already stored and available. It works based on Artificial intelligence and National Processing Language. This article will help you to develop a chatbot for a website using python inbuilt Libraries like NLTK (Natural Language Toolkit, PyTorch, and other useful dependencies. this application will let you use it in offline mode too. Adding convenience is the main concept of Chabot. The working nature of a chatbot depends on the technology being implemented. Chatbots are widely developed and used in various organizations like Google, Microsoft, Facebook-messenger, Telegram, and more. Python is a simple language, with no or less syntax. It has inbuilt modules, which makes the developer's work easy. PyTorch is one of them. Pytorch helps to create a neural network so that responses to a user can be more accurate. Processing the request by changing verbal language to machine language and in return responding in the verbal language will be trained while developing. Here chatbot development, implementation, and review analysis of various papers are discussed.", "venue": "2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2022-10-13", "journal": {"pages": "1-6", "name": "2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)"}, "authors": [{"authorId": "2194397318", "name": "Kanksha Kaur"}, {"authorId": "2195023911", "name": "Talluri Thanuja"}, {"authorId": "81409977", "name": "Omdev Dahiya"}, {"authorId": "2194661465", "name": "Pechetti Tulasi Sai"}, {"authorId": "47200698", "name": "Harneet Kaur"}, {"authorId": "2112713395", "name": "Janpreet Singh"}]}, {"paperId": "a0e086754a9de168ae2674f472affe4c8d1502e6", "externalIds": {"ArXiv": "2210.07321", "DBLP": "journals/corr/abs-2210-07321", "DOI": "10.48550/arXiv.2210.07321", "CorpusId": 252907813}, "corpusId": 252907813, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0e086754a9de168ae2674f472affe4c8d1502e6", "title": "Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods", "abstract": "Advances in natural language generation (NLG) have resulted in machine generated text that is increasingly difficult to distinguish from human authored text. Powerful open-source models are freely available, and user-friendly tools democratizing access to generative models are proliferating. The great potential of state-of-the-art NLG systems is tempered by the multitude of avenues for abuse. Detection of machine generated text is a key countermeasure for reducing abuse of NLG models, with significant technical challenges and numerous open problems. We provide a survey that includes both 1) an extensive analysis of threat models posed by contemporary NLG systems, and 2) the most complete review of machine generated text detection methods to date. This survey places machine generated text within its cybersecurity and social context, and provides strong guidance for future work addressing the most critical threat models, and ensuring detection systems themselves demonstrate trustworthiness through fairness, robustness, and accountability.", "venue": "ArXiv", "year": 2022, "referenceCount": 190, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-10-13", "journal": {"volume": "abs/2210.07321", "name": "ArXiv"}, "authors": [{"authorId": "152158902", "name": "Evan Crothers"}, {"authorId": "1743642", "name": "N. Japkowicz"}, {"authorId": "1727256", "name": "H. Viktor"}]}, {"paperId": "4fc37fb43644252fb04f673c38d9b7976500979d", "externalIds": {"PubMedCentral": "9608631", "DOI": "10.3389/fcvm.2022.945726", "CorpusId": 252877740, "PubMed": "36312266"}, "corpusId": 252877740, "publicationVenue": {"id": "3bc0e661-dc2a-454a-9ff5-6515430ce9ff", "name": "Frontiers in Cardiovascular Medicine", "type": "journal", "alternate_names": ["Front Cardiovasc Med"], "issn": "2297-055X", "url": "http://www.frontiersin.org/Cardiovascular_Medicine", "alternate_urls": ["http://www.frontiersin.org/Cardiovascular_Medicine/about", "https://www.frontiersin.org/journals/cardiovascular-medicine"]}, "url": "https://www.semanticscholar.org/paper/4fc37fb43644252fb04f673c38d9b7976500979d", "title": "Artificial intelligence in cardiology: Hope for the future and power for the present", "abstract": "Cardiovascular disease (CVD) is the principal cause of mortality and morbidity globally. With the pressures for improved care and translation of the latest medical advances and knowledge to an actionable plan, clinical decision-making for cardiologists is challenging. Artificial Intelligence (AI) is a field in computer science that studies the design of intelligent agents which take the best feasible action in a situation. It incorporates the use of computational algorithms which simulate and perform tasks that traditionally require human intelligence such as problem solving and learning. Whilst medicine is arguably the last to apply AI in its everyday routine, cardiology is at the forefront of AI revolution in the medical field. The development of AI methods for accurate prediction of CVD outcomes, non-invasive diagnosis of coronary artery disease (CAD), detection of malignant arrythmias through wearables, and diagnosis, treatment strategies and prediction of outcomes for heart failure (HF) patients, demonstrates the potential of AI in future cardiology. With the advancements of AI, Internet of Things (IoT) and the promotion of precision medicine, the future of cardiology will be heavily based on these innovative digital technologies. Despite this, ethical dilemmas regarding the implementation of AI technologies in real-world are still unaddressed.", "venue": "Frontiers in Cardiovascular Medicine", "year": 2022, "referenceCount": 145, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcvm.2022.945726/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-13", "journal": {"volume": "9", "name": "Frontiers in Cardiovascular Medicine"}, "authors": [{"authorId": "2114677985", "name": "Loucia Karatzia"}, {"authorId": "144298593", "name": "N. Aung"}, {"authorId": "5211080", "name": "D. Aksentijevi\u0107"}]}, {"paperId": "ef2cfb1a0c36c1deabe276a1292bf5a43eee0a2b", "externalIds": {"DBLP": "journals/corr/abs-2210-05350", "ArXiv": "2210.05350", "DOI": "10.1109/JRFID.2022.3225741", "CorpusId": 252815741}, "corpusId": 252815741, "publicationVenue": {"id": "7ac1a193-138e-40cf-97eb-5b1642adddd2", "name": "IEEE Journal of Radio Frequency Identification", "type": "journal", "alternate_names": ["IEEE J Radio Freq Identif"], "issn": "2469-7281", "url": "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=7433271"}, "url": "https://www.semanticscholar.org/paper/ef2cfb1a0c36c1deabe276a1292bf5a43eee0a2b", "title": "A New Perspective on Digital Twins: Imparting Intelligence and Agency to Entities", "abstract": "Despite the Digital Twin (DT) concept being in the industry for a long time, it remains ambiguous, unable to differentiate itself from information models, general computing, and simulation technologies. Part of this confusion stems from previous studies overlooking the DT\u2019s bidirectional nature, that enables the shift of agency (delegating control) from humans to physical elements, something that was not possible with earlier technologies. Thus, we present DTs in a new light by viewing them as a means of imparting intelligence and agency to entities, emphasizing that DTs are not just expert-centric tools but are active systems that extend the capabilities of the entities being twinned. This new perspective on DTs can help reduce confusion and humanize the concept by starting discussions about how intelligent a DT should be, and its roles and responsibilities, as well as setting a long-term direction for DTs.", "venue": "IEEE Journal of Radio Frequency Identification", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2210.05350", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-11", "journal": {"volume": "6", "pages": "871-875", "name": "IEEE Journal of Radio Frequency Identification"}, "authors": [{"authorId": "32151779", "name": "Ashwin Agrawal"}, {"authorId": "2118838608", "name": "Vishal Singh"}, {"authorId": "2152258534", "name": "Martin Fischer"}]}, {"paperId": "2c5dfc4ca766a1b081423ea701473dd61bfecbb0", "externalIds": {"DOI": "10.3390/electronics11193259", "CorpusId": 252870621}, "corpusId": 252870621, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c5dfc4ca766a1b081423ea701473dd61bfecbb0", "title": "ANN and SSO Algorithms for a Newly Developed Flexible Grid Trading Model", "abstract": "In the modern era, the trading methods and strategies used in the financial market have gradually changed from traditional on-site trading to electronic remote trading, and even online automatic trading performed by pre-programmed computer programs. This is due to the conduct of trading automatically and self-adjustment in financial markets becoming a competitive development trend in the entire financial market, with the continuous development of network and computer computing technology. Quantitative trading aims to automatically form a fixed and quantifiable operational logic from people\u2019s investment decisions and apply it to the financial market, which has attracted the attention of the financial market. The development of self-adjustment programming algorithms for automatically trading in financial markets has transformed to being a top priority for academic research and financial practice. Thus, a new flexible grid trading model incorporating the Simplified Swarm Optimization (SSO) algorithm for optimizing parameters for various market situations as input values and the Fully Connected Neural Network (FNN) and Long Short-Term Memory (LSTM) model for training a quantitative trading model for automatically calculating and adjusting the optimal trading parameters for trading after inputting the existing market situation are developed and studied in this work. The proposed model provides a self-adjust model to reduce investors\u2019 effort in the trading market, obtains outperformed Return of Investment (ROI) and model robustness, and can properly control the balance between risk and return.", "venue": "Electronics", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2079-9292/11/19/3259/pdf?version=1665558934", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-10", "journal": {"name": "Electronics"}, "authors": [{"authorId": "143988608", "name": "W. Yeh"}, {"authorId": "33266081", "name": "Yu-Hsin Hsieh"}, {"authorId": "2187604117", "name": "Kai-Yi Hsu"}, {"authorId": "1781139", "name": "Chia-Ling Huang"}]}, {"paperId": "b941c4bea1a71066f6f32275641aea1efc99b21b", "externalIds": {"ArXiv": "2210.04909", "DBLP": "journals/corr/abs-2210-04909", "DOI": "10.48550/arXiv.2210.04909", "CorpusId": 252815699}, "corpusId": 252815699, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b941c4bea1a71066f6f32275641aea1efc99b21b", "title": "Meta-Principled Family of Hyperparameter Scaling Strategies", "abstract": "In this note, we \ufb01rst derive a one-parameter family of hyperparameter scaling strategies that interpolates between the neural-tangent scaling and mean-\ufb01eld/maximal-update scaling. We then calculate the scalings of dynamical observables \u2013 network outputs, neural tangent kernels, and di\ufb00erentials of neural tangent kernels \u2013 for wide and deep neural networks. These calculations in turn reveal a proper way to scale depth with width such that resultant large-scale models maintain their representation-learning ability. Finally, we observe that various in\ufb01nite-width limits examined in the literature correspond to the distinct corners of the interconnected web spanned by e\ufb00ective theories for \ufb01nite-width neural networks, with their training dynamics ranging from being weakly-coupled to being strongly-coupled.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-10", "journal": {"volume": "abs/2210.04909", "name": "ArXiv"}, "authors": [{"authorId": "8904571", "name": "Sho Yaida"}]}, {"paperId": "57b579b041e59cb6cedc4793a2ce8ee7f27119d7", "externalIds": {"DBLP": "conf/nordichi/AlizadehMS22", "DOI": "10.1145/3546155.3547282", "CorpusId": 252532882}, "corpusId": 252532882, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/57b579b041e59cb6cedc4793a2ce8ee7f27119d7", "title": "Does Anyone Dream of Invisible A.I.? A Critique of the Making Invisible of A.I. Policing", "abstract": "For most people, using their body to authenticate their identity is an integral part of daily life. From our fingerprints to our facial features, our physical characteristics store the information that identifies us as \"us.\" This biometric information is becoming increasingly vital to the way we access and use technology. As more and more platform operators struggle with traffic from malicious bots on their servers, the burden of proof is on users, only this time they have to prove their very humanity and there is no court or jury to judge, but an invisible algorithmic system. In this paper, we critique the invisibilization of artificial intelligence policing. We argue that this practice obfuscates the underlying process of biometric verification. As a result, the new \"invisible\" tests leave no room for the user to question whether the process of questioning is even fair or ethical. We challenge this thesis by offering a juxtaposition with the science fiction imagining of the Turing test in Blade Runner to reevaluate the ethical grounds for reverse Turing tests, and we urge the research community to pursue alternative routes of bot identification that are more transparent and responsive.", "venue": "NordiCHI", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2022-10-08", "journal": {"name": "Nordic Human-Computer Interaction Conference"}, "authors": [{"authorId": "2070900671", "name": "F. Alizadeh"}, {"authorId": "2004535547", "name": "Aikaterini Mniestri"}, {"authorId": "2061536899", "name": "G. Stevens"}]}, {"paperId": "6b4a96ba2cb4bfcad98e9f00eb3f2f8491ace8aa", "externalIds": {"DOI": "10.1109/ICOA55659.2022.9934559", "CorpusId": 253425332}, "corpusId": 253425332, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b4a96ba2cb4bfcad98e9f00eb3f2f8491ace8aa", "title": "Towards the use of artificial intelligence and machine learning in material scientist field", "abstract": "Currently, the Artificial Intelligence (AI) and Machine Learning (ML) are used several engineering applications. They allow to reduce the human workload and to improve the quality of life. In addition, nearly every sector in the world intends to use artificial intelligence and machine learning. So, machine learning is a field of artificial intelligence that consists of programming a machine to learn to perform tasks by studying examples of these tasks. In other words, it consists of developing a model using an optimization algorithm to minimize the errors between the model and the data. The aim of this paper is to describe the role of artificial intelligence and machine learning and its current applications in material scientist field. The principle of deep learning and Convolutional Neural Networks (CNNs) and their use in image classification is explained.", "venue": "2022 8th International Conference on Optimization and Applications (ICOA)", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-10-06", "journal": {"pages": "1-5", "name": "2022 8th International Conference on Optimization and Applications (ICOA)"}, "authors": [{"authorId": "2190308884", "name": "Sara Samine"}, {"authorId": "48196339", "name": "M. Zemzami"}, {"authorId": "7706426", "name": "N. Hmina"}, {"authorId": "1983795", "name": "M. Lagache"}, {"authorId": "98777122", "name": "S. Belhouideg"}]}, {"paperId": "b935df32990444ce0c5742badf66573f50edd328", "externalIds": {"DBLP": "journals/corr/abs-2210-03217", "ArXiv": "2210.03217", "DOI": "10.48550/arXiv.2210.03217", "CorpusId": 252762217}, "corpusId": 252762217, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b935df32990444ce0c5742badf66573f50edd328", "title": "Genetic algorithm formulation and tuning with use of test functions", "abstract": "This work discusses single-objective constrained genetic algorithm with \ufb02oating-point, integer, binary and permutation representation. Floating-point genetic algorithm tuning with use of test functions is done and leads to a parameterization with comparatively outstanding performance. frontier in multi-objective optimization or point in (cid:210) c space in ordinary single-objective algorithm. Different parameterizations of one algorithm (e.g. genetic) can be compared with each other with use of TFs\u2014this procedure can be used for algorithm tuning in order to increase its performance. Here, \ufb02oating-point single-objective GA effectivity and efficiency analysis with use of TFs will be presented.", "venue": "ArXiv", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-06", "journal": {"volume": "abs/2210.03217", "name": "ArXiv"}, "authors": [{"authorId": "93679191", "name": "T. Tarkowski"}]}, {"paperId": "05ab5da3d055fa652c85a0b722bc7d49543ee93e", "externalIds": {"DOI": "10.3389/fphy.2022.941824", "CorpusId": 252738616}, "corpusId": 252738616, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05ab5da3d055fa652c85a0b722bc7d49543ee93e", "title": "AI in society: A theory", "abstract": "Human-machine teams or systems are integral parts of society and will likely become more so. Unsettled are the effects of these changes, their mechanism(s), and how to measure them. In this article, I propose a central concept for understanding human-machine interaction: convergent cause. That is, Agent 1\u2019s response to the object is caused by the object and Agent 2\u2019s response, while Agent 2 responds to Agent 1\u2019s response and the object. To the extent a human-machine team acts, AI converges with a human. One benefit of this concept is that it allows degrees, and so avoids the question of Strong or Weak AI. To defend my proposal, I repurpose Donald Davidson\u2019s triangulation as a model for human-machine teams and systems.", "venue": "Frontiers in Physics", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fphy.2022.941824/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-06", "journal": {"volume": "10"}, "authors": [{"authorId": "1572885986", "name": "R. Quandt"}]}, {"paperId": "9649afa7ae20c2f31c1c5499a6baeea50cf7955f", "externalIds": {"PubMedCentral": "9527388", "DOI": "10.1007/s13042-022-01675-8", "CorpusId": 252708351, "PubMed": "36212088"}, "corpusId": 252708351, "publicationVenue": {"id": "a0c45882-7c78-4f0c-8886-d3481ba02586", "name": "International Journal of Machine Learning and Cybernetics", "type": "journal", "alternate_names": ["Int J Mach Learn Cybern"], "issn": "1868-8071", "url": "http://www.springer.com/engineering/mathematical/journal/13042", "alternate_urls": ["https://link.springer.com/journal/13042"]}, "url": "https://www.semanticscholar.org/paper/9649afa7ae20c2f31c1c5499a6baeea50cf7955f", "title": "Multiview deep learning-based attack to break text-CAPTCHAs", "abstract": null, "venue": "International Journal of Machine Learning and Cybernetics", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13042-022-01675-8.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-03", "journal": {"pages": "1 - 14", "name": "International Journal of Machine Learning and Cybernetics"}, "authors": [{"authorId": "1571649581", "name": "M. Yusuf"}, {"authorId": "2155057086", "name": "Divya Srivastava"}, {"authorId": "143679152", "name": "Deepak Singh"}, {"authorId": "27080654", "name": "V. Rathor"}]}, {"paperId": "bfbfc9c12fe5be3c652ba2548ddde5c4f0d0b074", "externalIds": {"DOI": "10.1080/07421222.2022.2127441", "CorpusId": 254565204}, "corpusId": 254565204, "publicationVenue": {"id": "ede7e9cc-1657-47d5-bcf1-1ca3b056bf9d", "name": "Journal of Management Information Systems", "type": "journal", "alternate_names": ["J Manag Inf Syst"], "issn": "0742-1222", "url": "http://www.mesharpe.com/mall/results1.asp?ACR=MIS", "alternate_urls": ["http://www.metapress.com/openurl.asp?genre=journal&issn=0742-1222", "http://www.tandfonline.com/toc/mmis20/current", "http://www.tandfonline.com/loi/mmis", "http://www.jstor.org/journals/07421222.html", "https://www.jstor.org/journal/jmanainfosyst", "http://www.jmis-web.org/"]}, "url": "https://www.semanticscholar.org/paper/bfbfc9c12fe5be3c652ba2548ddde5c4f0d0b074", "title": "To Be or Not to Be \u2026Human? Theorizing the Role of Human-Like Competencies in Conversational Artificial Intelligence Agents", "abstract": "ABSTRACT Driven by the need to provide continuous, timely, and efficient customer service, firms are constantly experimenting with emerging technological solutions. In recent times firms have shown an increased interest in designing and implementing artificial intelligence (AI)-based interactional technologies, such as conversational AI agents and chatbots, that obviate the need for having human service agents for the provision of customer service. However, the business impact of conversational AI is contingent on customers using and adequately engaging with these tools. This engagement depends, in turn, on conversational AI\u2019s similarity, or likeness to the human beings it is intended to replace. Businesses therefore need to understand what human-like characteristics and competencies should be embedded in customer-facing conversational AI agents to facilitate smooth user interaction. This focus on \u201chuman-likeness\u201d for facilitating user engagement in the case of conversational AI agents is in sharp contrast to most prior information systems (IS) user engagement research, which is predicated on the \u201cinstrumental value\u201d of information technology (IT). Grounding our work in the individual human competency and media naturalness literatures, we theorize the key role of human-like interactional competencies in conversational AI agents\u2014specifically, cognitive, relational, and emotional competencies\u2014in facilitating user engagement. We also hypothesize the mediating role of user trust in these relationships. Following a sequential mixed methods approach, we use a quantitative two-wave, survey-based study to test our model. We then examine the results in light of findings from qualitative follow-up interviews with a sampled set of conversational AI users. Together, the results offer a nuanced understanding of desirable human-like competencies in conversational AI agents and the salient role of user trust in fostering user engagement with them. We also discuss the implications of our study for research and practice.", "venue": "Journal of Management Information Systems", "year": 2022, "referenceCount": 144, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-10-02", "journal": {"volume": "39", "pages": "969 - 1005", "name": "Journal of Management Information Systems"}, "authors": [{"authorId": "38047874", "name": "Shalini Chandra"}, {"authorId": "2841662", "name": "Anuragini Shirish"}, {"authorId": "2948637", "name": "S. Srivastava"}]}, {"paperId": "2b479b1239e0783995762f11ceacbc7c0a412c32", "externalIds": {"DOI": "10.1109/TREX57753.2022.00007", "CorpusId": 254737477}, "corpusId": 254737477, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2b479b1239e0783995762f11ceacbc7c0a412c32", "title": "Kicking Analysts Out of the Meeting Room: Supporting Future Data-driven Decision Making with Intelligent Interactive Visualization Systems", "abstract": "Today's data-driven decisions are largely dependent on professional analysts conducting analysis and generating visualizations for decision makers. These middlemen between data and decision makers may induce cost and trust issues in the generated visualizations. To overcome these issues, I envision a future scenario where intelligent interactive visualization systems may replace analysts in the decision-making process when the analyses and visualizations are relatively simple. However, three gaps need to be addressed before the future scenario could be realized. In this paper, I will discuss these gaps, propose potential solutions, and hope to raise a discussion on the future role of visualization systems for data-driven decision-making.", "venue": "2022 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-01", "journal": {"pages": "16-21", "name": "2022 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)"}, "authors": [{"authorId": "2112846850", "name": "Yi Han"}]}, {"paperId": "ce18b1a136decdb71c987795ff9d729d56e8faa8", "externalIds": {"DOI": "10.1016/j.jobe.2022.105444", "CorpusId": 253190164}, "corpusId": 253190164, "publicationVenue": {"id": "edc86f1a-0bc0-4f32-8b0d-9134204610bf", "name": "Journal of Building Engineering", "type": "journal", "alternate_names": ["J Build Eng", "J build eng", "Journal of building engineering"], "issn": "2352-7102", "url": "https://www.journals.elsevier.com/leukemia-research-reports/", "alternate_urls": ["http://www.sciencedirect.com/science/journal/23527102"]}, "url": "https://www.semanticscholar.org/paper/ce18b1a136decdb71c987795ff9d729d56e8faa8", "title": "Predictive models for concrete properties using machine learning and deep learning approaches: A review", "abstract": null, "venue": "Journal of Building Engineering", "year": 2022, "referenceCount": 250, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-10-01", "journal": {"name": "Journal of Building Engineering"}, "authors": [{"authorId": "2188200871", "name": "Mohammad Mohtasham Moein"}, {"authorId": "101132170", "name": "Ashkan Saradar"}, {"authorId": "2188191239", "name": "Komeil Rahmati"}, {"authorId": "148049156", "name": "S. H. Ghasemzadeh Mousavinejad"}, {"authorId": "2189161666", "name": "James Bristow"}, {"authorId": "2036623086", "name": "Vartenie Aramali"}, {"authorId": "2141056378", "name": "Moses Karakouzian"}]}, {"paperId": "8d1439cfd0ae8293f955b04c549f151abde7a887", "externalIds": {"DBLP": "journals/chb/ZhangCKC23", "DOI": "10.1016/j.chb.2022.107536", "CorpusId": 253054855}, "corpusId": 253054855, "publicationVenue": {"id": "435ffef1-21df-491d-b69a-605eee1b7f7f", "name": "Computers in Human Behavior", "type": "journal", "alternate_names": ["Comput Hum Behav"], "issn": "0747-5632", "url": "https://www.journals.elsevier.com/computers-in-human-behavior", "alternate_urls": ["https://www.sciencedirect.com/science/article/pii/S0747563216307695", "http://www.sciencedirect.com/science/journal/07475632"]}, "url": "https://www.semanticscholar.org/paper/8d1439cfd0ae8293f955b04c549f151abde7a887", "title": "Trust in an AI versus a Human teammate: The effects of teammate identity and performance on Human-AI cooperation", "abstract": null, "venue": "Computers in Human Behavior", "year": 2022, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "139", "pages": "107536", "name": "Comput. Hum. Behav."}, "authors": [{"authorId": "150116886", "name": "Guanglu Zhang"}, {"authorId": "2099667158", "name": "L. Chong"}, {"authorId": "2577125", "name": "K. Kotovsky"}, {"authorId": "1743218", "name": "J. Cagan"}]}, {"paperId": "8578252ae2b9b58e96274c0e644cd617cba1706f", "externalIds": {"PubMedCentral": "9608848", "DOI": "10.3390/ma15207187", "CorpusId": 252990683, "PubMed": "36295256"}, "corpusId": 252990683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8578252ae2b9b58e96274c0e644cd617cba1706f", "title": "On Smart Geometric Non-Destructive Evaluation: Inspection Methods, Overview, and Challenges", "abstract": "Inspection methods, also known as non-destructive evaluation (NDE), is a process for inspecting materials, products, and facilities to identify flaws, imperfections, and malfunctions without destruction or changing the integrity of materials, structures, and mechanisms. However, detecting those defects requires test conducting and results inferring, which is highly demanding in terms of analysis, performance, and time. New technologies are therefore needed to increase the efficiency, probability of detection, and interpretability of NDE methods to establish smart inspection. In this context, Artificial intelligence (AI), as a fundamental component of the Industry 4.0, is a well-suited tool to address downsides associated with the current NDE methods for analysis and interpretation of inspection results, where methods integrating AI into their inspection process become automated and are known as smart inspection methods. This article sheds a light on the conventional methods and the smart techniques used in defects detection. Subsequently, a comparison between the two notions is presented. Furthermore, it investigates opportunities for the integration of non-destructive evaluation (NDE) methods and Industry 4.0 technologies. In addition, the challenges hindering the progress of the domain are mentioned as the potential solutions. To this end, along with Industry 4.0 technologies, a virtual inspection system has been proposed to deploy smart inspection.", "venue": "Materials", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1996-1944/15/20/7187/pdf?version=1666615573", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "15", "name": "Materials"}, "authors": [{"authorId": "2121855108", "name": "A. Jaber"}, {"authorId": "148133349", "name": "Sasan Sattarpanah Karganroudi"}, {"authorId": "73233926", "name": "M. S. Meiabadi"}, {"authorId": "144202350", "name": "A. Aminzadeh"}, {"authorId": "2144776401", "name": "Hussein Ibrahim"}, {"authorId": "34651759", "name": "M. Adda"}, {"authorId": "144731070", "name": "H. Taheri"}]}, {"paperId": "f658cc4cb5201769e94a6bcc5ea2f4caacf2c264", "externalIds": {"PubMedCentral": "9602573", "DOI": "10.3390/healthcare10101997", "CorpusId": 252893401, "PubMed": "36292444"}, "corpusId": 252893401, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f658cc4cb5201769e94a6bcc5ea2f4caacf2c264", "title": "Enhanced Patient-Centricity: How the Biopharmaceutical Industry Is Optimizing Patient Care through AI/ML/DL", "abstract": "Technologies utilizing cutting-edge methodologies, including artificial intelligence (AI), machine learning (ML) and deep learning (DL), present powerful opportunities to help evaluate, predict, and improve patient outcomes by drawing insights from real-world data (RWD) generated during medical care. They played a role during and following the Coronavirus Disease 2019 (COVID-19) pandemic by helping protect healthcare providers, prioritize care for vulnerable populations, predict disease trends, and find optimal therapies. Potential applications across therapeutic areas include diagnosis, disease management and patient journey mapping. Use of fit-for-purpose datasets for ML models is seeing growth and may potentially help additional enterprises develop AI strategies. However, biopharmaceutical companies often face specific challenges, including multi-setting data, system interoperability, data governance, and patient privacy requirements. There remains a need for evolving regulatory frameworks, operating models, and data governance to enable further developments and additional research. We explore recent literature and examine the hurdles faced by researchers in the biopharmaceutical industry to fully realize the promise of AI/ML/DL for patient-centric purposes.", "venue": "Healthcare", "year": 2022, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2227-9032/10/10/1997/pdf?version=1666746827", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "10", "name": "Healthcare"}, "authors": [{"authorId": "2823722", "name": "K. Zou"}, {"authorId": "1492111897", "name": "Jim Z. Li"}]}, {"paperId": "77932608d65debabbefe0c81ddbb1f3c1f98c2fd", "externalIds": {"DBLP": "journals/sensors/MoshawrabABIR22", "PubMedCentral": "9573761", "DOI": "10.3390/s22197472", "CorpusId": 252840059, "PubMed": "36236570"}, "corpusId": 252840059, "publicationVenue": {"id": "3dbf084c-ef47-4b74-9919-047b40704538", "name": "Italian National Conference on Sensors", "type": "conference", "alternate_names": ["SENSORS", "IEEE Sens", "Ital National Conf Sens", "IEEE Sensors", "Sensors"], "issn": "1424-8220", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-142001", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-142001", "http://www.mdpi.com/journal/sensors", "https://www.mdpi.com/journal/sensors"]}, "url": "https://www.semanticscholar.org/paper/77932608d65debabbefe0c81ddbb1f3c1f98c2fd", "title": "Smart Wearables for the Detection of Occupational Physical Fatigue: A Literature Review", "abstract": "Today\u2019s world is changing dramatically due to the influence of various factors. Whether due to the rapid development of technological tools, advances in telecommunication methods, global economic and social events, or other reasons, almost everything is changing. As a result, the concepts of a \u201cjob\u201d or work have changed as well, with new work shifts being introduced and the office no longer being the only place where work is done. In addition, our non-stop active society has increased the stress and pressure at work, causing fatigue to spread worldwide and becoming a global problem. Moreover, it is medically proven that persistent fatigue is a cause of serious diseases and health problems. Therefore, monitoring and detecting fatigue in the workplace is essential to improve worker safety in the long term. In this paper, we provide an overview of the use of smart wearable devices to monitor and detect occupational physical fatigue. In addition, we present and discuss the challenges that hinder this field and highlight what can be done to advance the use of smart wearables in workplace fatigue detection.", "venue": "Italian National Conference on Sensors", "year": 2022, "referenceCount": 143, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1424-8220/22/19/7472/pdf?version=1665308699", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "2181447214", "name": "Mohammad Moshawrab"}, {"authorId": "34651759", "name": "M. Adda"}, {"authorId": "3112124", "name": "A. Bouzouane"}, {"authorId": "2054762450", "name": "Hussein Ibrahim"}, {"authorId": "2157812", "name": "Ali Raad"}]}, {"paperId": "ea52a6ab2282cd39593cb25f051125fb663e433d", "externalIds": {"DOI": "10.1088/1757-899X/1261/1/012014", "CorpusId": 252814626}, "corpusId": 252814626, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea52a6ab2282cd39593cb25f051125fb663e433d", "title": "Coevolution of internal representations in physical human-robot orchestration \u2013 models of the surgeon and the robot in robotic surgery", "abstract": "In teleoperated Robot-Assisted Minimally-Invasive Surgery (RAMIS), a surgeon controls the movements of instruments inside the patient\u2019s body via a pair of robotic joysticks. RAMIS has transformed many surgical disciplines, but its full potential is still to be realized. In this chapter we propose a pathway towards overcoming several bottlenecks that are related to transparency and stability of the teleoperation channels that mediate RAMIS. We describe the traditional system centered and the more recent human-centred approaches to teleoperation, and the special considerations for RAMIS as an application of teleoperation. However, the human-centered approach is still one sided view focusing on the surgeon but neglecting the learning capabilities of robotic systems. Hence, we consider a more general idea of physical human-robot orchestration with coevolution of mutual internal representations \u2013 of the human and the robot, and discuss it in comparison to human-human collaboration over teleoperated channels.", "venue": "IOP Conference Series: Materials Science and Engineering", "year": 2022, "referenceCount": 126, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-10-01", "journal": {"volume": "1261", "name": "IOP Conference Series: Materials Science and Engineering"}, "authors": [{"authorId": "2166933", "name": "I. Nisky"}, {"authorId": "2090041220", "name": "Leone Costi"}, {"authorId": "34567297", "name": "F. Iida"}]}, {"paperId": "ed9878730829fec2e94253f8e03feb8c17ec861d", "externalIds": {"DOI": "10.1016/j.pragma.2022.08.016", "CorpusId": 252500749}, "corpusId": 252500749, "publicationVenue": {"id": "3852b43e-e6ba-4fd8-8acd-b6da6c785ff1", "name": "Journal of Pragmatics", "type": "journal", "alternate_names": ["J Pragmat"], "issn": "0378-2166", "url": "http://www.elsevier.com/locate/pragma", "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505593/description", "http://www.sciencedirect.com/science/journal/03782166"]}, "url": "https://www.semanticscholar.org/paper/ed9878730829fec2e94253f8e03feb8c17ec861d", "title": "Knowing how to present yourself by knowing how to recognize false true facts", "abstract": null, "venue": "Journal of Pragmatics", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-01", "journal": {"name": "Journal of Pragmatics"}, "authors": [{"authorId": "3004569", "name": "I. Arminen"}, {"authorId": "2185989648", "name": "Anna S.M. Heino"}]}, {"paperId": "37323e112fdc5eeafd6131fbcaf7646620b0c78a", "externalIds": {"DOI": "10.1177/09544089221085325", "CorpusId": 252080364}, "corpusId": 252080364, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/37323e112fdc5eeafd6131fbcaf7646620b0c78a", "title": "Secondary Processing of Aramid with AWJ and Optimization with NSGA-III", "abstract": "The secondary operations of composite parts are performed following thermal cure processes, which generate the final dimensions with desired tolerance and quality specifications. High-strength composites, on the other hand, especially aramid fiber-reinforced polymers (AFRP), are not suitable for conventional machining operations due in part to high operational costs and limited surface quality characterized by fuzziness and delamination. Abrasive Water Jet (AWJ) has been recently shown promising results in obtaining improved surface quality while ensuring significant cost advantages. This study investigates the AWJ processing of AFRP by implementing the analysis of variance and response surface methods. The effects of the control parameters (sand ratio, pressure, stand-off-distance, and feed rate) on the surface quality metrics (surface roughness, kerf angle, and dimensional error) are identified and comparatively evaluated. The surface quality of the AWJ processed AFRP specimens are investigated using Scanning Electron Microscopy (SEM). The trade-offs between the measured tolerances and surface roughness values are identified via a new genetic algorithm approach: Non-dominated Sorting Genetic Algorithm (NSGA-III). Also, operation regions are determined using the generated Pareto curves while improving the quality of various features of an AFRP component, critical to its functional performance during extended service life. As a result, the lowest Ra values obtained were 4.135\u2005\u00b5m for trimming, 5.962\u2005\u00b5m for pocketing, and 4.696\u2005\u00b5m for the hole-making operation. The maximum error in the accuracy of operating regions yields to 7% with independent measurements for validation.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "236", "pages": "2164 - 2175", "name": "Proceedings of the Institution of Mechanical Engineers, Part E: Journal of Process Mechanical Engineering"}, "authors": [{"authorId": "138281485", "name": "M. Kahya"}, {"authorId": "1932466722", "name": "Emre Do\u011fankaya"}, {"authorId": "2141400241", "name": "\u00d6mer \u00c7aylan"}, {"authorId": "2184091819", "name": "Zarife G\u00f6knur B\u00fcke"}, {"authorId": "2356833", "name": "H. \u00d6. \u00dcnver"}]}, {"paperId": "1c40970d71c90a4d3cd2a3e9fd840eb634655e8a", "externalIds": {"DBLP": "conf/lwmoocs/PolettiG22", "DOI": "10.1109/LWMOOCS53067.2022.9928026", "CorpusId": 253270953}, "corpusId": 253270953, "publicationVenue": {"id": "b8d4a2d9-9fd4-4837-b46c-eae6c2253bc3", "name": "Learning With MOOCS", "type": "conference", "alternate_names": ["LWMOOCS", "Learn MOOCS"]}, "url": "https://www.semanticscholar.org/paper/1c40970d71c90a4d3cd2a3e9fd840eb634655e8a", "title": "MOOCs in the infosphere", "abstract": "The network is a paradigm and model that has changed the style and idea of interactivity, cognitive styles and the concept of person and information, acting as a catalyst and primary cause of what information philosophy defines as the infosphere, the habitat in which we live. The traumatic event of the pandemic has changed not only our way of life but also our way of understanding and analysing the reality around us. As far as technologies are concerned, this is the best time and the worst time to be able to see their use in relational didactic paths. The best time because we are obliged to experiment and use and the worst time because it is not a choice because we are obliged. In this context, MOOCs see their training and relational potential, as well as interaction and connection with reality, becoming increasingly a model and a training tool and a place for learning and experimentation.", "venue": "Learning With MOOCS", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-29", "journal": {"pages": "16-22", "name": "2022 IEEE Learning with MOOCS (LWMOOCS)"}, "authors": [{"authorId": "2064519831", "name": "Giorgio Poletti"}, {"authorId": "2073911094", "name": "Anita Gramigna"}]}, {"paperId": "f578351cb5f353ea22331f1720408026bdecb5bf", "externalIds": {"PubMedCentral": "9601726", "DOI": "10.3390/healthcare10101878", "CorpusId": 252604635, "PubMed": "36292325"}, "corpusId": 252604635, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f578351cb5f353ea22331f1720408026bdecb5bf", "title": "Privacy Protection in Using Artificial Intelligence for Healthcare: Chinese Regulation in Comparative Perspective", "abstract": "Advanced artificial intelligence (AI) technologies are now widely employed in China\u2019s medical and healthcare fields. Enormous amounts of personal data are collected from various sources and inserted into AI algorithms for medical purposes, producing challenges to patient\u2019s privacy. This is a comparative study of Chinese, United States, and European Union operational rules for healthcare data that is collected and then used in AI functions, particularly focusing on legal differences and deficiencies. The conceptual boundaries of privacy and personal information, the influence of technological development on the informed consent model, and conflicts between freedom and security in rules of cross-border data flow were found to be key issues requiring consideration when regulating healthcare data used for AI purposes. Furthermore, the results indicate that the appropriate balance between privacy protections and technological development, between individual and group interests, and between corporate profits and the public interest should be identified and observed. In terms of specific rule-making, it was found that China should establish special regulations protecting healthcare information, provide clear definitions and classification schemas for different types of healthcare information, and enact stricter accountability mechanisms. Examining and contrasting operational rules for AI in health care promotes informed privacy governance and improved privacy legislation.", "venue": "Healthcare", "year": 2022, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2227-9032/10/10/1878/pdf?version=1664257123", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-27", "journal": {"volume": "10", "name": "Healthcare"}, "authors": [{"authorId": "50097239", "name": "Chao Wang"}, {"authorId": "2159189014", "name": "Jieyu Zhang"}, {"authorId": "2186469273", "name": "Nicholas Lassi"}, {"authorId": "2145564660", "name": "Xiaohan Zhang"}]}, {"paperId": "ba034601c3af8408107629fb5af644781821a8c9", "externalIds": {"DBLP": "journals/corr/abs-2209-13464", "ArXiv": "2209.13464", "DOI": "10.48550/arXiv.2209.13464", "CorpusId": 252545242}, "corpusId": 252545242, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba034601c3af8408107629fb5af644781821a8c9", "title": "Information Extraction and Human-Robot Dialogue towards Real-life Tasks: A Baseline Study with the MobileCS Dataset", "abstract": "Recently, there have merged a class of task-oriented dialogue (TOD) datasets collected through Wizard-of-Oz simulated games. How-ever, the Wizard-of-Oz data are in fact simulated data and thus are fundamentally different from real-life conversations, which are more noisy and casual. Recently, the SereTOD challenge is organized and releases the MobileCS dataset, which consists of real-world dialog transcripts between real users and customer-service staffs from China Mobile. Based on the MobileCS dataset, the SereTOD challenge has two tasks, not only evaluating the construction of the dialogue system itself, but also examining information extraction from dialog transcripts, which is crucial for building the knowledge base for TOD. This paper mainly presents a baseline study of the two tasks with the MobileCS dataset. We introduce how the two baselines are constructed, the problems en-countered, and the results. We anticipate that the baselines can facilitate exciting future research to build human-robot dialogue systems for real-life tasks.", "venue": "ArXiv", "year": 2022, "referenceCount": 55, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-27", "journal": {"volume": "abs/2209.13464", "name": "ArXiv"}, "authors": [{"authorId": "2175085268", "name": "Hong Liu"}, {"authorId": "47837854", "name": "Hao Peng"}, {"authorId": "1717830", "name": "Zhijian Ou"}, {"authorId": "8549226", "name": "Juan-Zi Li"}, {"authorId": "2143931690", "name": "Yi Huang"}, {"authorId": "39729308", "name": "Junlan Feng"}]}, {"paperId": "a1de0c24f092d683b7eb4c164feb5802e3cba68c", "externalIds": {"DBLP": "journals/corr/abs-2209-12344", "ArXiv": "2209.12344", "DOI": "10.48550/arXiv.2209.12344", "CorpusId": 252532126}, "corpusId": 252532126, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1de0c24f092d683b7eb4c164feb5802e3cba68c", "title": "Stochastic Gradient Descent Captures How Children Learn About Physics", "abstract": "As children grow older, they develop an intuitive understanding of the physical processes around them. They move along developmental trajectories, which have been mapped out extensively in previous empirical research. We investigate how children\u2019s developmental trajectories compare to the learning trajectories of arti\ufb01cial systems. Speci\ufb01cally, we examine the idea that cognitive development results from some form of stochastic optimization procedure. For this purpose, we train a modern generative neural network model using stochastic gradient descent. We then use methods from the developmental psychology literature to probe the physical understanding of this model at different degrees of optimization. We \ufb01nd that the model\u2019s learning trajectory captures the developmental trajectories of children, thereby providing support to the idea of development as stochastic optimization.", "venue": "ArXiv", "year": 2022, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-25", "journal": {"volume": "abs/2209.12344", "name": "ArXiv"}, "authors": [{"authorId": "2132054462", "name": "Luca M. Schulze Buschoff"}, {"authorId": "49427184", "name": "Eric Schulz"}, {"authorId": "32354733", "name": "Marcel Binz"}]}, {"paperId": "ad96defb9ae1b405a17c8224d0bfbad04559bdb9", "externalIds": {"ArXiv": "2209.12346", "DBLP": "journals/corr/abs-2209-12346", "DOI": "10.48550/arXiv.2209.12346", "CorpusId": 252531572}, "corpusId": 252531572, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad96defb9ae1b405a17c8224d0bfbad04559bdb9", "title": "Political economy of superhuman AI", "abstract": "In this note, I study the institutions and game theoretic assumptions that would prevent the emergence of \u2018superhuman-level\u2019 ar\ufb01ticial general intelligence, denoted by AI*. These assumptions are (i) the \u201cFreedom of the Mind,\u201d (ii) open source \u201caccess\u201d to AI*, and (iii) rationality of the representative human agent, who com-petes against AI*. I prove that under these three assumptions it is impossible that an AI* exists. This result gives rise to two immediate recommendations for pub-lic policy. First, \u2018cloning\u2019 digitally the human brain should be strictly regulated, and hypothetical AI*\u2019s access to brain should be prohibited. Second, AI* research should be made widely, if not publicly, accessible. JEL : C70, C80", "venue": "ArXiv", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Economics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-25", "journal": {"volume": "abs/2209.12346", "name": "ArXiv"}, "authors": [{"authorId": "144358962", "name": "Mehmet S. Ismail"}]}, {"paperId": "6d26335461b46ad01f3f94a86be00c89cb587f40", "externalIds": {"DOI": "10.1002/hyp.14704", "CorpusId": 252523654}, "corpusId": 252523654, "publicationVenue": {"id": "c057fc61-9eaf-4688-ab3e-d843975ffee0", "name": "Hydrological Processes", "type": "journal", "alternate_names": ["Hydrol Process"], "issn": "0885-6087", "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/4125", "alternate_urls": ["http://www.interscience.wiley.com/jpages/0885-6087/", "https://onlinelibrary.wiley.com/journal/10991085"]}, "url": "https://www.semanticscholar.org/paper/6d26335461b46ad01f3f94a86be00c89cb587f40", "title": "On (in)validating environmental models. 1. Principles for formulating a Turing\u2010like Test for determining when a model is fit\u2010for purpose", "abstract": "Model invalidation is a good thing. It means that we are forced to reconsider either model structures or the available data more closely, that is to challenge our fundamental understanding of the problem at hand. It is not easy, however, to decide when a model should be invalidated, when we expect that the sources of uncertainty in environmental modelling will often be epistemic rather than simply aleatory in nature. In particular, epistemic errors in model inputs may well exert a very strong control over how accurate we might expect model predictions to be when compared against evaluation data that might also be subject to epistemic uncertainties. We suggest that both modellers and referees should treat model validation as a form of Turing\u2010like Test, whilst being more explicit about how the uncertainties in observed data and their impacts are assessed. Eight principles in formulating such tests are presented. Being explicit about the decisions made in framing an analysis is one important way to facilitate communication with users of model outputs, especially when it is intended to use a model simulator as a \u2018model of everywhere\u2019 or \u2018digital twin\u2019 of a catchment system. An example application of the concepts is provided in Part 2.", "venue": "Hydrological Processes", "year": 2022, "referenceCount": 137, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-24", "journal": {"volume": "36", "name": "Hydrological Processes"}, "authors": [{"authorId": "46964939", "name": "K. Beven"}, {"authorId": "2186079009", "name": "S. Lane"}]}, {"paperId": "e4cf47dddd73605c568c9169524f2fcfcceb6ede", "externalIds": {"DOI": "10.3389/fcomp.2022.959351", "CorpusId": 252408337}, "corpusId": 252408337, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4cf47dddd73605c568c9169524f2fcfcceb6ede", "title": "Materializing the abstract: Understanding AI by game jamming", "abstract": "In this article, we argue that game jam formats are uniquely suited to engage participants in learning about artificial intelligence (AI) as a design material because of four factors which are characteristic of game jams: 1) Game jams provide an opportunity for hands-on, interactive prototyping, 2) Game jams encourage playful participation, 3) Game jams encourage creative combinations of AI and game development, and 4) Game jams offer understandable goals and evaluation metrics for AI. We support the argument with an interview study conducted with three AI experts who had all organized game jams with a focus on using AI in game development. Based on a thematic analysis of the expert interviews and a theoretical background of Sch\u00f6n's work on educating the reflective practitioner, we identified the four abovementioned factors as well as four recommendations for structuring and planning an AI-focused game jam: 1) Aligning repertoires, 2) Supporting playful participation, 3) Supporting ideation, and 4) Facilitating evaluation and reflection. Our contribution is motivated by the recent discourse on general challenges and recommendations of teaching AI identified by related literature, here under the long and intertwined history of games and AI in general. The article presents an initial discussion of the value of game jam formats for learning about AI and which factors need to be considered in regard to this specific learning goal.", "venue": "Frontiers in Computer Science", "year": 2022, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcomp.2022.959351/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-22", "journal": {"volume": "4"}, "authors": [{"authorId": "2164717285", "name": "Jeanette Falk"}, {"authorId": "10702047", "name": "Nanna Inie"}]}, {"paperId": "4c8b74d53f1eae2cf6b8f73aca952d4d1c9d7283", "externalIds": {"DOI": "10.1109/ICIRCA54612.2022.9985481", "CorpusId": 255267137}, "corpusId": 255267137, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4c8b74d53f1eae2cf6b8f73aca952d4d1c9d7283", "title": "Innovative Turned and Collaborative Technology using Simulated IoT Applications", "abstract": "Distributed system allows for quick access to computing, stockpiling, and even connection. Yet, for systems and networks that are far from a consolidated public cloud or data centre source, these centralised architectures might cause delays and performance difficulties. If data analysis is concentrated in the cloud, for example, to analyse emergency circumstances, any connectivity failures or delays will hinder the function and endanger human life. However, the restricted availability of such edge servers thwarts this interesting proposal. The virtual edge computing concept is discussed in this study as a way forward. By remotely accessing all assets, particularly edge routers, and making them readily accessible through endpoints, virtual edge bridges the internet, periphery, and swamp worlds. Fog and cloud technologies architectures are intriguing solutions to cloud-based technologies, particularly for rapid reaction to crises can also be used to allow new microservices and collaborative remedies for pcs. This research study provides a comprehensive virtual frontier framework and some of the important research challenges that must be addressed to facilitate more pervasive and efficient better external.", "venue": "2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA)", "year": 2022, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-09-21", "journal": {"pages": "369-374", "name": "2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA)"}, "authors": [{"authorId": "36437645", "name": "L. M. Visuwasam"}, {"authorId": "2155828067", "name": "Ankur Kumar Gupta"}, {"authorId": "2072259676", "name": "Rachna Chaudhary"}, {"authorId": "2116012307", "name": "S. Gupta"}, {"authorId": "2198768608", "name": "Pankaj Borah"}, {"authorId": "145765310", "name": "M. Chakravarthi"}]}, {"paperId": "84007e838e34f60bcd95f03083953262c1ab77a2", "externalIds": {"DOI": "10.1109/DASC55683.2022.9925874", "CorpusId": 253251631}, "corpusId": 253251631, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/84007e838e34f60bcd95f03083953262c1ab77a2", "title": "Trust, Ethics, Consciousness, and Artificial Intelligence", "abstract": "As artificial intelligence (AI) continues to proliferate across manufacturing, economic, medical, aerospace, transportation, and social realms, ethical guidelines must be established to not only protect humans at the mercy of automated decision making, but also autonomous agents themselves, should they become conscious. While AI appears \"smart\" to the public, and may outperform humans on specific tasks, the truth is that today\u2019s AI lacks insight beyond the restricted scope of problems to which it has been tasked. Without context, AI is effectively incapable of comprehending the true nature of what it does and is oblivious to the reverberations it may cause in the real world should it err in prediction. Despite this, future AI may be equipped with enough sensors and neural processing capacity to acquire a dynamic cognizance more akin to humans. If this materializes, will autonomous agents question their own position in this world? One must entertain the possibility that this is not merely hypothetical but may, in fact, be imminent if humanity succeeds in creating artificial general intelligence (AGI).If autonomous agents with the capacity for artificial consciousness are delegated grueling tasks, outcomes could mirror the plight of exploited workers, result in retaliation, failure to comply, alternative objectives, or breakdown of human-autonomy teams. It will be critical to decide how and in which contexts various agents should be utilized. Additionally, delineating the meaning of trust and ethical consideration between humans and machines is problematic because descriptions of trust and ethics have only been detailed in human terms. This means autonomous agents will be subject to anthropomorphism, but robots are not humans, and their experience of trust and ethics might be markedly distinct from humans. Ideally speaking, to fully entrust a machine with human-centered tasks, one must believe that such an entity is reliable, competent, has the appropriate priorities in decision-making, and can comprehend the consequences of actions taken. Such qualities may depend on conscious awareness\u2014but without first deciphering what consciousness is in the first place, humans may fail to accurately identify consciousness in machines.This work explores the foundations of consciousness from the perspective of evolutionary biologists, neuroscientists, and philosophers, and strives to position degrees of consciousness in a trust and ethical consideration framework to guide AI usage and research. To mitigate foreseeable risks in autonomy, the authors seek to spark dialogue and preventative action, so proper legal and operational requirements can be established prior to any agent acquiring even an inkling of consciousness. If implemented correctly, such measures may reduce the likelihood of unintentional damage and help to secure a future of continued collaboration and shared success between humans and machines.", "venue": "2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC)", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-09-18", "journal": {"pages": "1-9", "name": "2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC)"}, "authors": [{"authorId": "1580488826", "name": "Katherine L. O'Grady"}, {"authorId": "93977959", "name": "Steven D. Harbour"}, {"authorId": "2189465432", "name": "Ashlie Abballe"}, {"authorId": "145468237", "name": "Kelly Cohen"}]}, {"paperId": "355d82351367caf5ea6617027f04f4cb1643ba1b", "externalIds": {"DOI": "10.3390/bs12090343", "CorpusId": 252387278}, "corpusId": 252387278, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/355d82351367caf5ea6617027f04f4cb1643ba1b", "title": "Ethical Risk Factors and Mechanisms in Artificial Intelligence Decision Making", "abstract": "While artificial intelligence (AI) technology can enhance social wellbeing and progress, it also generates ethical decision-making dilemmas such as algorithmic discrimination, data bias, and unclear accountability. In this paper, we identify the ethical risk factors of AI decision making from the perspective of qualitative research, construct a risk-factor model of AI decision making ethical risks using rooting theory, and explore the mechanisms of interaction between risks through system dynamics, based on which risk management strategies are proposed. We find that technological uncertainty, incomplete data, and management errors are the main sources of ethical risks in AI decision making and that the intervention of risk governance elements can effectively block the social risks arising from algorithmic, technological, and data risks. Accordingly, we propose strategies for the governance of ethical risks in AI decision making from the perspectives of management, research, and development.", "venue": "Behavioral Sciences", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-328X/12/9/343/pdf?version=1663728465", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-16", "journal": {"name": "Behavioral Sciences"}, "authors": [{"authorId": "9422483", "name": "G. Hongjun"}, {"authorId": "2185541864", "name": "Dong Liye"}, {"authorId": "70020448", "name": "Zhao Aiwu"}]}, {"paperId": "2a215364e3fbe5a4c45b61dc5bd869399fa82661", "externalIds": {"DBLP": "conf/coling/ChoudhuryRA22", "ACL": "2022.coling-1.8", "ArXiv": "2209.07430", "DOI": "10.48550/arXiv.2209.07430", "CorpusId": 252283929}, "corpusId": 252283929, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a215364e3fbe5a4c45b61dc5bd869399fa82661", "title": "Machine Reading, Fast and Slow: When Do Models \u201cUnderstand\u201d Language?", "abstract": "Two of the most fundamental issues in Natural Language Understanding (NLU) at present are: (a) how it can established whether deep learning-based models score highly on NLU benchmarks for the \u201dright\u201d reasons; and (b) what those reasons would even be. We investigate the behavior of reading comprehension models with respect to two linguistic \u201dskills\u201d: coreference resolution and comparison. We propose a definition for the reasoning steps expected from a system that would be \u201dreading slowly\u201d, and compare that with the behavior of five models of the BERT family of various sizes, observed through saliency scores and counterfactual explanations. We find that for comparison (but not coreference) the systems based on larger encoders are more likely to rely on the \u201dright\u201d information, but even they struggle with generalization, suggesting that they still learn specific lexical patterns rather than the general principles of comparison.", "venue": "COLING", "year": 2022, "referenceCount": 81, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-09-15", "journal": {"volume": "abs/2209.07430", "name": "ArXiv"}, "authors": [{"authorId": "3324957", "name": "Sagnik Ray Choudhury"}, {"authorId": "145046059", "name": "Anna Rogers"}, {"authorId": "1736067", "name": "Isabelle Augenstein"}]}, {"paperId": "d65f9540e550c3def7df10f548ca0c9cec4961f6", "externalIds": {"ArXiv": "2209.07455", "DBLP": "journals/corr/abs-2209-07455", "DOI": "10.48550/arXiv.2209.07455", "CorpusId": 252283948}, "corpusId": 252283948, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d65f9540e550c3def7df10f548ca0c9cec4961f6", "title": "A Genetic Quantum Annealing Algorithm", "abstract": "A genetic algorithm (GA) is a search-based optimization technique based on the principles of Genetics and Natural Selection. We present an algorithm which enhances the classical GA with input from quantum annealers. As in a classical GA, the algorithm works by breeding a population of possible solutions based on their \ufb01tness. However, the population of individuals is de\ufb01ned by the continuous couplings on the quantum annealer, which then give rise via quantum annealing to the set of corresponding phenotypes that represent attempted solutions. This introduces a form of directed mutation into the algorithm that can enhance its performance in various ways. Two crucial enhancements come from the continuous couplings having strengths that are inherited from the \ufb01tness of the parents (so-called nepotism ) and from the annealer couplings allowing the entire population to be in\ufb02uenced by the \ufb01ttest individuals (so-called quantum-polyandry ). We \ufb01nd our algorithm to be signi\ufb01cantly more powerful on several simple problems than a classical GA.", "venue": "ArXiv", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-15", "journal": {"volume": "abs/2209.07455", "name": "ArXiv"}, "authors": [{"authorId": "145487850", "name": "S. Abel"}, {"authorId": "2171655652", "name": "Luca A. Nutricati"}, {"authorId": "15740682", "name": "M. Spannowsky"}]}, {"paperId": "b5cbf377f8fb8c40e5b87bafc072fa73c067a8be", "externalIds": {"ArXiv": "2209.07449", "DBLP": "journals/corr/abs-2209-07449", "DOI": "10.48550/arXiv.2209.07449", "CorpusId": 252283919}, "corpusId": 252283919, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b5cbf377f8fb8c40e5b87bafc072fa73c067a8be", "title": "Extended Intelligence", "abstract": "We argue that intelligence \u2014 construed as the disposition to perform tasks successfully\u2014is a property of systems composed of agents and their contexts. This is the thesis of extended intelligence. We argue that the performance of an agent will generally not be preserved if its context is allowed to vary. Hence, this disposition is not possessed by an agent alone, but is rather possessed by the system consisting of an agent and its context, which we dub an agent-in-context. An agent\u2019s context may include an environment, other agents, cultural artifacts (like language, technology), or all of these, as is typically the case for humans and artificial intelligence systems, as well as many non-human animals. In virtue of the thesis of extended intelligence, we contend that intelligence is context-bound, task-particular and incommensurable among agents. Our thesis carries strong implications for how intelligence is analyzed in the context of both psychology and artificial intelligence.", "venue": "ArXiv", "year": 2022, "referenceCount": 37, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-15", "journal": {"volume": "abs/2209.07449", "name": "ArXiv"}, "authors": [{"authorId": "5452602", "name": "D. Barack"}, {"authorId": "2689633", "name": "Andrew Jaegle"}]}, {"paperId": "6b93fb593316693c04c562d2df1ca8ff4b11d4be", "externalIds": {"ArXiv": "2209.06715", "CorpusId": 252222592}, "corpusId": 252222592, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b93fb593316693c04c562d2df1ca8ff4b11d4be", "title": "Generalised hardness of approximation and the SCI hierarchy -- On determining the boundaries of training algorithms in AI", "abstract": "A BSTRACT . Hardness of approximation (HA) \u2013 the phenomenon that, assuming P 6 = NP, one can easily compute an \u01eb -approximation to the solution of a discrete computational problem for \u01eb > \u01eb 0 > 0 , but for \u01eb < \u01eb 0 it suddenly becomes intractable \u2013 is a core phenomenon in the foundations of computations that has transformed computer science. In this paper we study the newly discovered phenomenon in the foundations of computational mathematics: generalised hardness of approximation (GHA) \u2013 which in spirit is close to classical HA in computer science. However, GHA is typically independent of the P vs. NP question in many cases. Thus, it requires a new mathematical framework that we initiate in this paper. We demonstrate the hitherto undiscovered phenomenon that GHA happens when using AI techniques in order to train optimal neural networks (NNs). In particular, for any non-zero underdetermined linear problem the following phase transition may occur: One can prove the existence of optimal NNs for solving the problem but they can only be computed to a certain accuracy \u01eb 0 > 0 . Below the approximation threshold \u01eb 0 \u2013 not only does it become intractable to compute the NN \u2013 it becomes impossible regardless of computing power, and no randomised algorithm can solve the problem with probability better than 1/2. In other cases, despite the existence of a stable optimal NN, any attempts of computing it below the approximation threshold \u01eb 0 will yield an unstable NN. Our results use and extend the current mathematical framework of the Solvability Complexity Index (SCI) hierarchy and facilitate a program for detecting the GHA phenomenon throughout computational mathematics and AI.", "venue": "", "year": 2022, "referenceCount": 91, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-14", "journal": null, "authors": [{"authorId": "1580676961", "name": "Luca Eva Gazdag"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": "20f113aee1bbbd97dc33960b9002cce4dd521c6a", "externalIds": {"DBLP": "conf/icdl/MatternLEAT22", "DOI": "10.1109/ICDL53763.2022.9962192", "CorpusId": 254100898}, "corpusId": 254100898, "publicationVenue": {"id": "43cdd274-e9fc-43e9-acf3-f020552ac76a", "name": "International Conference on Development and Learning", "type": "conference", "alternate_names": ["Int Conf Dielectr Liq", "Int Conf Dev Learn", "International Conference on Dielectric Liquids", "ICDL"]}, "url": "https://www.semanticscholar.org/paper/20f113aee1bbbd97dc33960b9002cce4dd521c6a", "title": "MIMo: A Multi-Modal Infant Model for Studying Cognitive Development in Humans and AIs", "abstract": "A central challenge in the early cognitive development of humans is making sense of the rich multimodal experiences originating from interactions with the physical world. AIs that learn in an autonomous and open-ended fashion based on multimodal sensory input face a similar challenge. To study such development and learning in silico, we have created MIMo, a multimodal infant model. MIMo\u2019s body is modeled after an 18-month-old child and features binocular vision, a vestibular system, proprioception, and touch perception through a full-body virtual skin. MIMo is an open-source research platform based on the MuJoCo physics engine for constructing computational models of human cognitive development as well as studying open-ended autonomous learning in AI. We describe the design and interfaces of MIMo and provide examples illustrating its use.", "venue": "International Conference on Development and Learning", "year": 2022, "referenceCount": 51, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-09-12", "journal": {"pages": "23-29", "name": "2022 IEEE International Conference on Development and Learning (ICDL)"}, "authors": [{"authorId": "2192854305", "name": "Dominik Mattern"}, {"authorId": "2192848477", "name": "Francisco M. L\u00f3pez"}, {"authorId": "2060438433", "name": "M. Ernst"}, {"authorId": "1387894646", "name": "A. Aubret"}, {"authorId": "2774681", "name": "J. Triesch"}]}, {"paperId": "4481988d755d7ae9059ab136b19dd74cf3f444d1", "externalIds": {"DBLP": "conf/icdl/MooreORM22", "DOI": "10.1109/ICDL53763.2022.9962183", "CorpusId": 254102647}, "corpusId": 254102647, "publicationVenue": {"id": "43cdd274-e9fc-43e9-acf3-f020552ac76a", "name": "International Conference on Development and Learning", "type": "conference", "alternate_names": ["Int Conf Dielectr Liq", "Int Conf Dev Learn", "International Conference on Dielectric Liquids", "ICDL"]}, "url": "https://www.semanticscholar.org/paper/4481988d755d7ae9059ab136b19dd74cf3f444d1", "title": "Leveraging Developmental Psychology to Evaluate Artificial Intelligence", "abstract": "Artificial intelligence (AI) systems do not exhibit human-like common sense. The principles and practices of experimental psychology \u2013 specifically, work on infant cognition \u2013 can be used to develop and test AIs, providing insight into the building blocks of common sense. Here, we describe how the evaluation team for DARPA\u2019s Machine Common Sense program is applying conceptual content, experimental design techniques, and analysis tools used in the field of infant cognitive development to the field of AI evaluation.", "venue": "International Conference on Development and Learning", "year": 2022, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-09-12", "journal": {"pages": "36-41", "name": "2022 IEEE International Conference on Development and Learning (ICDL)"}, "authors": [{"authorId": "2147338797", "name": "David Moore"}, {"authorId": "29887652", "name": "L. Oakes"}, {"authorId": "46777315", "name": "V. Romero"}, {"authorId": "5326533", "name": "Koleen McCrink"}]}, {"paperId": "aedd38f23f74e66c7498a460b78dfe53436b0c07", "externalIds": {"DOI": "10.21439/conexoes.v16i0.2282", "CorpusId": 252571851}, "corpusId": 252571851, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aedd38f23f74e66c7498a460b78dfe53436b0c07", "title": "DESENVOLVIMENTO DE INTELIG\u00caNCIAS ARTIFICIAIS (IA\u2019s) NA EDUCA\u00c7\u00c3O: UMA REVIS\u00c3O SISTEM\u00c1TICA DE LITERATURA", "abstract": "A utiliza\u00e7\u00e3o de novas tecnologias computacionais no ensino, sobretudo, por meio da utiliza\u00e7\u00e3o de Intelig\u00eancia Artificial (IA) pode se mostrar uma importante ferramenta no processo de ensino e aprendizagem. O presente artigo prop\u00f5e um estudo sobre o desenvolvimento de IA\u2019s voltadas para a educa\u00e7\u00e3o, com enfoque no processo de ensino e aprendizagem. Para isso, a metodologia se deu em etapas distintas: a primeira, com o estabelecimento das palavras-chave e strings de busca; a segunda, buscas nos bancos de dados digitais dos artigos publicados entre os anos de 2017 e 2021. Ap\u00f3s aplica\u00e7\u00e3o dos crit\u00e9rios de inclus\u00e3o e exclus\u00e3o, foram encontrados 20 artigos. Foi observado que houve uma preval\u00eancia do desenvolvimento de IA\u2019s para o ensino superior, sobretudo, para a \u00e1rea do ensino de computa\u00e7\u00e3o, bem como, ressalta-se a necessidade de implementa\u00e7\u00e3o de pol\u00edticas p\u00fablicas de alfabetiza\u00e7\u00e3o digital e acesso \u00e0s novas tecnologias, que possam ser importantes para minimizar: (i) a defasagem no desenvolvimento de IA\u2019s para a educa\u00e7\u00e3o b\u00e1sica; (ii) o dom\u00ednio das IA\u2019s voltadas apenas para o ensino de computa\u00e7\u00e3o; (iii) e as diferen\u00e7as entre as classes et\u00e1rias, como fen\u00f4menos limitadores da implementa\u00e7\u00e3o das IA\u2019s na educa\u00e7\u00e3o.", "venue": "Conex\u00f5es - Ci\u00eancia e Tecnologia", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://conexoes.ifce.edu.br/index.php/conexoes/article/download/2282/1616", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-09-12", "journal": {"name": "Conex\u00f5es - Ci\u00eancia e Tecnologia"}, "authors": [{"authorId": "71571661", "name": "Carlos Eduardo Albuquerque Fernandes"}, {"authorId": "145026126", "name": "A. Ribeiro"}, {"authorId": "49009068", "name": "F. H. L. Vasconcelos"}]}, {"paperId": "c4c4ebea517f2a6f100b6da753ae721fd183e60b", "externalIds": {"DOI": "10.5753/sbseg.2022.225334", "CorpusId": 252392855}, "corpusId": 252392855, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c4c4ebea517f2a6f100b6da753ae721fd183e60b", "title": "Ataques Automatizados de Engenharia Social com o uso de Bots em Redes Sociais Profissionais", "abstract": "As intera\u00e7\u00f5es humanas virtuais t\u00eam sido ampliadas com o uso crescente da Internet e redes sociais, elevando os riscos de amea\u00e7as cibern\u00e9ticas de Engenharia Social. O uso de Bots nesses ataques permite escalabilidade na explora\u00e7\u00e3o da confian\u00e7a dos usu\u00e1rios, provocando riscos de seguran\u00e7a. Poucos s\u00e3o os trabalhos com foco nas a\u00e7\u00f5es automatizadas de Engenharia Social com o uso de Bots. Este artigo apresenta uma verifica\u00e7\u00e3o dos controles de uma rede social profissional quanto \u00e0 identifica\u00e7\u00e3o e bloqueio desses ataques automatizados, utilizando um Bot de prova de conceito. A an\u00e1lise e discuss\u00e3o dos resultados permite demonstrar as vulnerabilidades de seguran\u00e7a presentes nas redes profissionais que podem ser exploradas para constru\u00e7\u00e3o da rela\u00e7\u00e3o de confian\u00e7a do usu\u00e1rio com um Bot malicioso.", "venue": "Anais do XXII Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg 2022)", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://sol.sbc.org.br/index.php/sbseg/article/download/21665/21489", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-09-12", "journal": {"name": "Anais do XXII Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg 2022)"}, "authors": [{"authorId": "2185584895", "name": "Maur\u00edcio Ariza"}, {"authorId": "2062850565", "name": "A. Azambuja"}, {"authorId": "2092231569", "name": "J\u00e9ferson C. Nobre"}, {"authorId": "2105551588", "name": "Lisandro Z. Granville"}]}, {"paperId": "7afc8c00c721dd83b7109b600e6c9415a877bcb8", "externalIds": {"DOI": "10.1109/ASYU56188.2022.9925271", "CorpusId": 253251495}, "corpusId": 253251495, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7afc8c00c721dd83b7109b600e6c9415a877bcb8", "title": "Affecting Factors of Efficiency in Photovoltaic Energy Systems and Productivity-Enhancing Suggestions", "abstract": "In recent years, hazardous gases emission from fossil fuels has attracted public concerns due to its worse effects on the ecosystem and living conditions not only mankind but also all creatures living on earth. That's why solar energy has a vital role in alternative energy resources. Solar energy sources will gain more importance in the future. As it is known, the most needed type of energy today is electrical energy. Thus, in this study, the necessary conditions for the photovoltaic (PV) systems used in solar energy production to operate at maximum performance and which parameters are required to control these conditions are examined. The results show that four parameters that we need to measure. These are: maximum operating current of a panel/cell (Impp), maximum operating voltage of a panel/cell (Vmpp), panel surface temperature and light intensity falling on the panel. Except for the panel surface temperature, the rest of the parameters can be measured directly. However, affecting the panel surface temperature; we must not ignore parameters such as ambient temperature, wind speed, humidity and light intensity. Therefore, while determining the panel surface temperature, these parameters should also be measured and a surface temperature should be determined accordingly.", "venue": "2022 Innovations in Intelligent Systems and Applications Conference (ASYU)", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-09-07", "journal": {"pages": "1-6", "name": "2022 Innovations in Intelligent Systems and Applications Conference (ASYU)"}, "authors": [{"authorId": "92836991", "name": "\u0130. Ay"}, {"authorId": "91868074", "name": "M. Kademli"}, {"authorId": "31370878", "name": "\u015e. Karabulut"}, {"authorId": "101402242", "name": "Serkan Sava\u015f"}]}, {"paperId": "decd9837fc5e347e16e7d5c0f6617afcaa9207b2", "externalIds": {"DBLP": "journals/jzusc/BuWYTZYP22", "DOI": "10.1631/FITEE.2100551", "CorpusId": 252117051}, "corpusId": 252117051, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/decd9837fc5e347e16e7d5c0f6617afcaa9207b2", "title": "Synaptic devices based on semiconductor nanocrystals", "abstract": "To meet a growing demand for information processing, brain-inspired neuromorphic devices have been intensively studied in recent years. As an important type of neuromorphic device, synaptic devices have attracted strong attention. Among all the kinds of materials explored for the fabrication of synaptic devices, semiconductor nanocrystals (NCs) have become one of the preferred choices due to their excellent electronic and optical properties. In this review, we first introduce the research background of synaptic devices based on semiconductor NCs and briefly present the basic properties of semiconductor NCs. Recent developments in the field of synaptic devices based on semiconductor NCs are then discussed according to the materials employed in the active layers of the devices. Finally, we discuss existing problems and challenges of synaptic devices based on semiconductor NCs.", "venue": "Frontiers of Information Technology & Electronic Engineering", "year": 2022, "referenceCount": 119, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-09-06", "journal": {"volume": "23", "pages": "1579 - 1601", "name": "Frontiers of Information Technology & Electronic Engineering"}, "authors": [{"authorId": "2184276234", "name": "Mingxuan Bu"}, {"authorId": "2144333864", "name": "Yue Wang"}, {"authorId": "145667513", "name": "Lei Yin"}, {"authorId": "153419910", "name": "Zhouyu Tong"}, {"authorId": "2108656188", "name": "Yiqiang Zhang"}, {"authorId": "2122835409", "name": "Deren Yang"}, {"authorId": "8848630", "name": "X. Pi"}]}, {"paperId": "1622b9ef7c9ce0ae861ea8bb7ab309de3a3d2b97", "externalIds": {"ArXiv": "2211.12839", "DBLP": "journals/corr/abs-2211-12839", "DOI": "10.48550/arXiv.2211.12839", "CorpusId": 253801973}, "corpusId": 253801973, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1622b9ef7c9ce0ae861ea8bb7ab309de3a3d2b97", "title": "Newly Developed Flexible Grid Trading Model Combined ANN and SSO algorithm", "abstract": ": In modern society, the trading methods and strategies used in financial market have gradually changed from traditional on-site trading to electronic remote trading, and even online automatic trading performed by a pre-programmed computer programs because the continuous development of network and computer computing technology. The quantitative trading, which the main purpose is to automatically formulate people\u2019s investment decisions into a fixed and quantifiable operation logic that eliminates all emotional interference and the influence of subjective thoughts and applies this logic to financial market activities in order to obtain excess profits above average returns, has led a lot of attentions in financial market. The development of self-adjustment programming algorithms for automatically trading in financial market has transformed a top priority for academic research and financial practice. Thus, a new flexible grid trading model combined with the Simplified Swarm Optimization (SSO) algorithm for optimizing parameters for various market situations as input values and the fully connected neural network (FNN) and Long Short-Term Memory (LSTM) model for training a quantitative trading model to automatically calculate and adjust the optimal trading parameters for trading after inputting the existing market situation is developed and studied in this work. The proposed model provides a self-adjust model to reduce investors\u2019 effort in the trading market, obtains outperformed investment return rate and model robustness, and can properly control the balance between risk and return.", "venue": "ArXiv", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Economics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-05", "journal": {"volume": "abs/2211.12839", "name": "ArXiv"}, "authors": [{"authorId": "143988608", "name": "W. Yeh"}, {"authorId": "33266081", "name": "Yu-Hsin Hsieh"}, {"authorId": "1781139", "name": "Chia-Ling Huang"}]}, {"paperId": "c8f6e01bbc2f65e1736908971faccc84e12c9e65", "externalIds": {"DBLP": "conf/bcca/BhatiaS22", "DOI": "10.1109/BCCA55292.2022.9922390", "CorpusId": 253251401}, "corpusId": 253251401, "publicationVenue": {"id": "6cbed6ad-fb46-4c9a-8477-75227ff3a47e", "name": "International Conference on Blockchain Computing and Applications", "type": "conference", "alternate_names": ["BCCA", "Int Conf Blockchain Comput Appl"], "url": "https://ieeexplore.ieee.org/xpl/conhome/1839124/all-proceedings"}, "url": "https://www.semanticscholar.org/paper/c8f6e01bbc2f65e1736908971faccc84e12c9e65", "title": "Decentralized Federated Learning: A Comprehensive Survey and a New Blockchain-based Data Evaluation Scheme", "abstract": "Blockchain and Deep Learning (DL) are two of the most revolutionary concepts in the field of Computer Science. Both have made astounding leaps in research and application areas such as Finance, Healthcare, Internet of Things, and many more. Federated Learning (FL) is a type of distributed Deep Learning framework, in which the model is trained locally on each device and the trained gradients are sent to a central server which aggregates them and creates a global model. This helps ensure the data privacy of the user as the data never leaves the local device. However, this dependency on the central server can lead to various issues such as lack of transparency and communication bottleneck. Making this process decentralized can help address these issues. In this review, a detailed survey on using blockchain in federated learning is presented. This review also focuses on how can we use blockchain to make federated learning more transparent and decentralized to protect the privacy of the user. We also discuss the major strengths and drawbacks of each approach and further present a few ideas of our own, regarding some of these challenges and ways on how can these be improved. A new scheme to evaluate data using miners as well as methods to reduce storage overhead in decentralized federated learning are discussed in this paper.", "venue": "International Conference on Blockchain Computing and Applications", "year": 2022, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": "2022-09-05", "journal": {"pages": "289-296", "name": "2022 Fourth International Conference on Blockchain Computing and Applications (BCCA)"}, "authors": [{"authorId": "2189468811", "name": "Laveen Bhatia"}, {"authorId": "2091093915", "name": "Saeed Samet"}]}, {"paperId": "5f3103c35f71ede8ac48e15f222c68a53f64118c", "externalIds": {"DBLP": "journals/corr/abs-2209-12623", "ArXiv": "2209.12623", "DOI": "10.48550/arXiv.2209.12623", "CorpusId": 252531558}, "corpusId": 252531558, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5f3103c35f71ede8ac48e15f222c68a53f64118c", "title": "Cognitive Architecture for Co-Evolutionary Hybrid Intelligence", "abstract": ". This paper 1 questions the feasibility of a strong (general) data-centric arti\ufb01cial intelligence (AI). The disadvantages of this type of intelligence are discussed. As an alternative, the concept of co-evolutionary hybrid intelligence is proposed. It is based on the cognitive interoperability of man and machine. An analysis of existing approaches to the construction of cognitive architectures is given. An architecture that seamlessly incorporates a human into the loop of intelligent problem solving is considered. The article is organized as follows. The \ufb01rst part contains a critique of data-centric intelligent systems. The reasons why it is impossible to create a strong arti\ufb01cial intelligence based on this type of intelligence are indicated. The second part brie\ufb02y presents the concept of co-evolutionary hybrid intelligence and shows its advantages. The third part gives an overview and analysis of existing cognitive architectures. It is concluded that many of them do not consider humans as part of the intelligent data processing process. The next part discusses the cognitive architecture for co-evolutionary hybrid intelligence, providing integration with humans. It \ufb01nishes with general conclusions about the feasibility of developing intelligent systems with humans in the problem solving loop.", "venue": "ArXiv", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-09-05", "journal": {"volume": "abs/2209.12623", "name": "ArXiv"}, "authors": [{"authorId": "2047484", "name": "K. Krinkin"}, {"authorId": "3425579", "name": "Y. Shichkina"}]}, {"paperId": "b8bf1265dabd54a47181b44a4a00ca70fd0d7135", "externalIds": {"PubMedCentral": "9442555", "DOI": "10.1007/s11739-022-03080-z", "CorpusId": 252072991, "PubMed": "36063262"}, "corpusId": 252072991, "publicationVenue": {"id": "d07fa807-5206-4c39-8636-bec15ca2c172", "name": "Internal and Emergency Medicine", "type": "journal", "alternate_names": ["Intern Emerg Med"], "issn": "1828-0447", "url": "https://link.springer.com/journal/11739"}, "url": "https://www.semanticscholar.org/paper/b8bf1265dabd54a47181b44a4a00ca70fd0d7135", "title": "Progress and prospects for artificial intelligence in clinical practice: learning from COVID-19", "abstract": null, "venue": "Internal and Emergency Medicine", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11739-022-03080-z.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-05", "journal": {"volume": "17", "pages": "1855 - 1857", "name": "Internal and Emergency Medicine"}, "authors": [{"authorId": "48920527", "name": "P. Ferrara"}, {"authorId": "1742452", "name": "S. Battiato"}, {"authorId": "4771535", "name": "R. Polosa"}]}, {"paperId": "854b0decc07598100c3293e713ee86f5bc1b5524", "externalIds": {"DOI": "10.1109/RusAutoCon54946.2022.9896273", "CorpusId": 252576640}, "corpusId": 252576640, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/854b0decc07598100c3293e713ee86f5bc1b5524", "title": "Simulation of the Autonomous Unmanned Underwater Vehicle Control System", "abstract": "The creation of an effective autonomous underwater vehicles (AUV) control system is one of the main problems in the development of underwater robotics. The AUV control system must have the ability to implement complex adaptive algorithms. Since the algorithms implemented by the AUV control system are difficult to investigate in real conditions, they must be worked out by modeling using a special stand that fully and adequately reproduces the conditions for performing a real mission. The paper presents the structure of the multi-agent AUV control system, describes the structure of the software of the AUV control system modeling stand, presents the results of modeling the heavy-class AUV control system.", "venue": "2022 International Russian Automation Conference (RusAutoCon)", "year": 2022, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-09-04", "journal": {"pages": "262-266", "name": "2022 International Russian Automation Conference (RusAutoCon)"}, "authors": [{"authorId": "14317139", "name": "V. S. Bykova"}, {"authorId": "2186346527", "name": "Angrey I. Mashoshin"}]}, {"paperId": "40d40339d95b3a1e394595964d2d9bc3389f64cb", "externalIds": {"PubMedCentral": "9495402", "DOI": "10.3390/bs12090343", "CorpusId": 252438571, "PubMed": "36135147"}, "corpusId": 252438571, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/40d40339d95b3a1e394595964d2d9bc3389f64cb", "title": "Ethical Risk Factors and Mechanisms in Artificial Intelligence Decision Making", "abstract": "While artificial intelligence (AI) technology can enhance social wellbeing and progress, it also generates ethical decision-making dilemmas such as algorithmic discrimination, data bias, and unclear accountability. In this paper, we identify the ethical risk factors of AI decision making from the perspective of qualitative research, construct a risk-factor model of AI decision making ethical risks using rooting theory, and explore the mechanisms of interaction between risks through system dynamics, based on which risk management strategies are proposed. We find that technological uncertainty, incomplete data, and management errors are the main sources of ethical risks in AI decision making and that the intervention of risk governance elements can effectively block the social risks arising from algorithmic, technological, and data risks. Accordingly, we propose strategies for the governance of ethical risks in AI decision making from the perspectives of management, research, and development.", "venue": "Behavioral sciences", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-328X/12/9/343/pdf?version=1663728465", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "12", "name": "Behavioral Sciences"}, "authors": [{"authorId": "40540443", "name": "Hongjun Guan"}, {"authorId": "93116964", "name": "Li-Rong Dong"}, {"authorId": "6953583", "name": "Aiwu Zhao"}]}, {"paperId": "f0aad7c990b2145a8e6a1c39d71744e8d611c230", "externalIds": {"DOI": "10.1161/CIRCIMAGING.122.014744", "CorpusId": 252386011, "PubMed": "36126127"}, "corpusId": 252386011, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f0aad7c990b2145a8e6a1c39d71744e8d611c230", "title": "Deep Learning and Artificial Intelligence: What Does the Cardiologist Really Need to Know?", "abstract": "The opinions expressed in this article are not necessarily those of the editors or of the American Heart Association. Correspondence to: James A. Case, PhD, MASNC Cardiovascular Imaging Technologies, University of Missouri Kansas City, Kansas City, MO. Email jcase@cvit.com This manuscript was sent to Gary Heller, MD, PhD, Guest Editor, for review by expert referees, editorial decision, and final disposition. For Disclosures, see page 660. \u00a9 2022 American Heart Association, Inc. EDITORIAL", "venue": "Circulation. Cardiovascular imaging", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Editorial", "Review"], "publicationDate": "2022-09-01", "journal": {"volume": "15", "pages": "e014744", "name": "Circulation: Cardiovascular Imaging"}, "authors": [{"authorId": "35837528", "name": "J. Case"}]}, {"paperId": "2dd6484a74c65b15debaad90d625d245b4b9a7f1", "externalIds": {"PubMedCentral": "9505413", "DOI": "10.3390/life12091430", "CorpusId": 252320741, "PubMed": "36143468"}, "corpusId": 252320741, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2dd6484a74c65b15debaad90d625d245b4b9a7f1", "title": "Artificial Intelligence in Biological Sciences", "abstract": "Artificial intelligence (AI), currently a cutting-edge concept, has the potential to improve the quality of life of human beings. The fields of AI and biological research are becoming more intertwined, and methods for extracting and applying the information stored in live organisms are constantly being refined. As the field of AI matures with more trained algorithms, the potential of its application in epidemiology, the study of host\u2013pathogen interactions and drug designing widens. AI is now being applied in several fields of drug discovery, customized medicine, gene editing, radiography, image processing and medication management. More precise diagnosis and cost-effective treatment will be possible in the near future due to the application of AI-based technologies. In the field of agriculture, farmers have reduced waste, increased output and decreased the amount of time it takes to bring their goods to market due to the application of advanced AI-based approaches. Moreover, with the use of AI through machine learning (ML) and deep-learning-based smart programs, one can modify the metabolic pathways of living systems to obtain the best possible outputs with the minimal inputs. Such efforts can improve the industrial strains of microbial species to maximize the yield in the bio-based industrial setup. This article summarizes the potentials of AI and their application to several fields of biology, such as medicine, agriculture, and bio-based industry.", "venue": "Life", "year": 2022, "referenceCount": 158, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2075-1729/12/9/1430/pdf?version=1663300683", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "12", "name": "Life"}, "authors": [{"authorId": "2185193714", "name": "Abhaya Bhardwaj"}, {"authorId": "2133621914", "name": "Shristi Kishore"}, {"authorId": "5479010", "name": "D. Pandey"}]}, {"paperId": "b40e7b1d917613489dda2df9676bf48dc67eedbc", "externalIds": {"PubMedCentral": "9505448", "DOI": "10.3390/ijms231810712", "CorpusId": 252329410, "PubMed": "36142623"}, "corpusId": 252329410, "publicationVenue": {"id": "8506a01a-40b8-4e6f-bbb8-ce2492139c15", "name": "International Journal of Molecular Sciences", "type": "journal", "alternate_names": ["Int J Mol Sci"], "issn": "1422-0067", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-157693", "alternate_urls": ["https://www.mdpi.com/journal/ijms", "http://www.mdpi.com/journal/ijms/", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-157693"]}, "url": "https://www.semanticscholar.org/paper/b40e7b1d917613489dda2df9676bf48dc67eedbc", "title": "Machine Learning for Property Prediction and Optimization of Polymeric Nanocomposites: A State-of-the-Art", "abstract": "Recently, the field of polymer nanocomposites has been an area of high scientific and industrial attention due to noteworthy improvements attained in these materials, arising from the synergetic combination of properties of a polymeric matrix and an organic or inorganic nanomaterial. The enhanced performance of those materials typically involves superior mechanical strength, toughness and stiffness, electrical and thermal conductivity, better flame retardancy and a higher barrier to moisture and gases. Nanocomposites can also display unique design possibilities, which provide exceptional advantages in developing multifunctional materials with desired properties for specific applications. On the other hand, machine learning (ML) has been recognized as a powerful predictive tool for data-driven multi-physical modelling, leading to unprecedented insights and an exploration of the system\u2019s properties beyond the capability of traditional computational and experimental analyses. This article aims to provide a brief overview of the most important findings related to the application of ML for the rational design of polymeric nanocomposites. Prediction, optimization, feature identification and uncertainty quantification are presented along with different ML algorithms used in the field of polymeric nanocomposites for property prediction, and selected examples are discussed. Finally, conclusions and future perspectives are highlighted.", "venue": "International Journal of Molecular Sciences", "year": 2022, "referenceCount": 181, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1422-0067/23/18/10712/pdf?version=1663817321", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "23", "name": "International Journal of Molecular Sciences"}, "authors": [{"authorId": "2185231262", "name": "Elizabeth Champa-Bujaico"}, {"authorId": "1403138863", "name": "P. Garc\u00eda-D\u00edaz"}, {"authorId": "1397968395", "name": "A. D\u00edez-Pascual"}]}, {"paperId": "4dfab2aca3537ed5ea15f754e229d49d0b21f933", "externalIds": {"DOI": "10.1016/j.critrevonc.2022.103808", "CorpusId": 252150726, "PubMed": "36087852"}, "corpusId": 252150726, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4dfab2aca3537ed5ea15f754e229d49d0b21f933", "title": "Machine Learning applications in gynecological cancer: a critical review.", "abstract": null, "venue": "Critical reviews in oncology/hematology", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-09-01", "journal": {"pages": "\n 103808\n ", "name": "Critical reviews in oncology/hematology"}, "authors": [{"authorId": "40911527", "name": "O. Fiste"}, {"authorId": "6314866", "name": "M. Liontos"}, {"authorId": "2163674", "name": "F. Zagouri"}, {"authorId": "1985997", "name": "G. Stamatakos"}, {"authorId": "2163473990", "name": "Meletios A Dimopoulos"}]}, {"paperId": "98f3583d2cb59d5fd0907ea351e2d652a9c70a8b", "externalIds": {"DBLP": "journals/tits/BesinovicDFGLLM22", "DOI": "10.1109/TITS.2021.3131637", "CorpusId": 252223542}, "corpusId": 252223542, "publicationVenue": {"id": "3066c994-687a-417d-9f08-dabb65f37093", "name": "IEEE transactions on intelligent transportation systems (Print)", "type": "journal", "alternate_names": ["IEEE trans intell transp syst (print", "IEEE Trans Intell Transp Syst", "IEEE Transactions on Intelligent Transportation Systems"], "issn": "1524-9050", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=6979"}, "url": "https://www.semanticscholar.org/paper/98f3583d2cb59d5fd0907ea351e2d652a9c70a8b", "title": "Artificial Intelligence in Railway Transport: Taxonomy, Regulations, and Applications", "abstract": "Artificial Intelligence (AI) is becoming pervasive in most engineering domains, and railway transport is no exception. However, due to the plethora of different new terms and meanings associated with them, there is a risk that railway practitioners, as several other categories, will get lost in those ambiguities and fuzzy boundaries, and hence fail to catch the real opportunities and potential of machine learning, artificial vision, and big data analytics, just to name a few of the most promising approaches connected to AI. The scope of this paper is to introduce the basic concepts and possible applications of AI to railway academics and practitioners. To that aim, this paper presents a structured taxonomy to guide researchers and practitioners to understand AI techniques, research fields, disciplines, and applications, both in general terms and in close connection with railway applications such as autonomous driving, maintenance, and traffic management. The important aspects of ethics and explainability of AI in railways are also introduced. The connection between AI concepts and railway subdomains has been supported by relevant research addressing existing and planned applications in order to provide some pointers to promising directions.", "venue": "IEEE transactions on intelligent transportation systems (Print)", "year": 2022, "referenceCount": 120, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "23", "pages": "14011-14024", "name": "IEEE Transactions on Intelligent Transportation Systems"}, "authors": [{"authorId": "7369644", "name": "Nikola Be\u0161inovi\u0107"}, {"authorId": "2164681475", "name": "Lorenzo De Donato"}, {"authorId": "50005912", "name": "Francesco Flammini"}, {"authorId": "1774886", "name": "R. Goverde"}, {"authorId": "2164760844", "name": "Zhiyuan Lin"}, {"authorId": "48757839", "name": "Ronghui Liu"}, {"authorId": "47195132", "name": "S. Marrone"}, {"authorId": "38351900", "name": "R. Nardone"}, {"authorId": "80655344", "name": "Tianli Tang"}, {"authorId": "102360012", "name": "V. Vittorini"}]}, {"paperId": "5923b872837d5ba00b80d60d93f79f14d9f3bdc4", "externalIds": {"DOI": "10.1093/plankt/fbac042", "CorpusId": 251942805}, "corpusId": 251942805, "publicationVenue": {"id": "ec3042c2-c5be-462b-9ff5-573227875f2e", "name": "Journal of Plankton Research", "type": "journal", "alternate_names": ["J Plankton Res"], "issn": "0142-7873"}, "url": "https://www.semanticscholar.org/paper/5923b872837d5ba00b80d60d93f79f14d9f3bdc4", "title": "Plankton digital twins\u2014a new research tool", "abstract": "\n Digital twins (DT) are simulation models that so closely replicate reality in their behaviour that experts may believe model output to be real. Plankton offer worthy yet tractable biological targets for digital twinning, due to their relatively simply physiology and significant role in ecology from theoretical studies through to planetary scale biogeochemistry. Construction of dynamic plankton DT (PDT), representing a supreme test of our understanding of plankton ecophysiology, would form the basis of education and training aids, provide platforms for hypothesis setting/testing, experiment design and interpretation, and support the construction and testing of large-scale ecosystem models and allied management tools. PDTs may be constructed using concepts from systems biology, with system dynamics, including feedback controls akin to biological (de)repression processes, to provide a robust approach to model plankton, with flexible core features enabling ready and meaningful configuration of phenotypic traits. Expert witness validation through Turing Tests would provide confidence in the end product. Through deployment of PDTs with appropriate input controls and output (visualization) tools, empiricists are more likely to engage with modelling, enhancing future science and increasing confidence in predictive operational and also in long-term climate simulations.", "venue": "Journal of Plankton Research", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-30", "journal": {"name": "Journal of Plankton Research"}, "authors": [{"authorId": "34976063", "name": "K. Flynn"}, {"authorId": "144428254", "name": "R. Torres"}, {"authorId": "3014948", "name": "X. Irigoien"}, {"authorId": "39773679", "name": "J. Blackford"}]}, {"paperId": "ac719bb40934083d11ee5c4575769b1f7c6f0189", "externalIds": {"DOI": "10.16995/dscn.8105", "CorpusId": 251857923}, "corpusId": 251857923, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ac719bb40934083d11ee5c4575769b1f7c6f0189", "title": "The Computational Fallacy: A New Model for Understanding the Role of Computers in Humanities", "abstract": "The paper tries to counter some misassumptions about the computer and computation especially in relation to humanities and human behavior and they amount to what the author calls \u201cthe computational fallacy. The paper discusses a number of points such as the physiology of the computer, the Etymology of basic terms in the field, and the current approaches especially in mainstream digital humanities which reduce computation to a set of \u201ctools\u201d. The paper then proceeds to discuss some counter arguments such as rethinking the notion of programmability which should substitute \u201ccalculation\u201d as the core of computation, considering the transformative nature of the computer and its media using the ideas of some theorists like Manovich and Drucker, and some new approaches that view computation differently like Computational Thinking, Algorithmic criticism, and Speculative computing.Cet article essaie de contrer quelques suppositions erron\u00e9es sur l\u2019ordinateur et la computation, plus particuli\u00e8rement leur relation aux sciences humaines et au comportement humain qui \u00e9quivaut \u00e0 ce que l\u2019auteur appelle \u00ab the computational fallacy \u00bb ou l\u2019erreur computationnelle. Cet article aborde de nombreux points, tels que la physiologie de l\u2019ordinateur, l\u2019\u00e9tymologie de termes de base dans ce domaine, ainsi que les approches courantes, particuli\u00e8rement les approches dominantes dans les humanit\u00e9s num\u00e9riques qui r\u00e9duisent la computation comme un ensemble \u00ab d\u2019outils \u00bb. Ensuite, l\u2019article poursuit en discutant les contre-arguments comme les nouvelles r\u00e9flexions des notions de programmation qui devraient substituer le calcul au c\u0153ur de la computation, consid\u00e9rant la nature transformante de l\u2019ordinateur et ses m\u00e9dias utilisant les id\u00e9es de quelques th\u00e9oristes dont Manovich et Drucker, et quelques nouvelles approches qui voient la computation diff\u00e9remment comme \u00ab Computational Thinking \u00bb ou la pens\u00e9e computationnelle, \u00ab Algorithmic criticism \u00bb ou la critique algorithmique et \u00ab Speculative computing \u00bb ou la computation sp\u00e9culative.\u00a0", "venue": "Digital Studies/le champ num\u00e9rique (DSCN) Open Issue 2022", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.digitalstudies.org/article/id/8105/download/pdf/", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-25", "journal": {"name": "Digital Studies/le champ num\u00e9rique (DSCN) Open Issue 2022"}, "authors": [{"authorId": "117130137", "name": "M. Aljayyousi"}]}, {"paperId": "4217467e747182b9ad8035e8a2d657d2ce80af07", "externalIds": {"DBLP": "journals/corr/abs-2208-11981", "ArXiv": "2208.11981", "DOI": "10.48550/arXiv.2208.11981", "CorpusId": 251800226}, "corpusId": 251800226, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4217467e747182b9ad8035e8a2d657d2ce80af07", "title": "On Reality and the Limits of Language Data", "abstract": "Recent advances in neural network language models have shown that it is possible to derive expressive meaning representations by leveraging linguistic associations in large-scale natural language data. These potentially Gestalt representations have enabled state-of-the-art performance for many practical applications. It would appear that we are on a pathway to empirically deriving a robust and expressive computable semantics. A key question that arises is how far can language data alone enable computers to understand the necessary truth about the physical world? Attention to this question is warranted because our future interac-tions with intelligent machines depends on how well our techniques correctly represent and process the concepts (objects, properties, and processes) that humans commonly observe to be true. After reviewing exist-ing protocols, the objective of this work is to explore this question using a novel and tightly controlled reasoning test and to highlight what models might learn directly from pure linguistic data.", "venue": "ArXiv", "year": 2022, "referenceCount": 82, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-08-25", "journal": {"volume": "abs/2208.11981", "name": "ArXiv"}, "authors": [{"authorId": "50638196", "name": "N. Collier"}, {"authorId": "144097210", "name": "Fangyu Liu"}, {"authorId": "2888926", "name": "Ehsan Shareghi"}]}, {"paperId": "82992f2c17c9f2070cc54c6898c723e9d9f4ef28", "externalIds": {"DOI": "10.1117/12.2646616", "CorpusId": 251780684}, "corpusId": 251780684, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82992f2c17c9f2070cc54c6898c723e9d9f4ef28", "title": "The application of machine learning in the stock market", "abstract": "Artificial intelligence (AI) appears more and more in people's life. Many academic articles point out that there are signal to noises in the financial market itself. The paper aims to find whether or not we can avoid the emergence of signal to noises by using different factors or models. We will select several machine learning models, including linear regression model, XGBoost in recent 5 years, and long short-term memory (LSTM) in time series. Using exponential moving average as a factor, this paper compares the performance of different machine learning models in the stock market. Finally, we find the results simulated by the regressor models are similar.", "venue": "Other Conferences", "year": 2022, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-08-23", "journal": {"volume": "12330", "pages": "123301E - 123301E-7"}, "authors": [{"authorId": "2162978327", "name": "Wencheng Bao"}]}, {"paperId": "75f5ca0397a89714d5559e48effc3bf2f6227461", "externalIds": {"DOI": "10.1108/er-06-2021-0244", "CorpusId": 251754471}, "corpusId": 251754471, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/75f5ca0397a89714d5559e48effc3bf2f6227461", "title": "Human resources under technological transformation: what\u00a0HR professionals believe in an\u00a0international scale", "abstract": "PurposeThis paper examines the beliefs of human resource professionals (HRPs) regarding the impact of Industry 4.0 on organizations in terms of readiness for human resources management (HRM) transformation, the challenges of a potential new legal and financial framework, the new means on performance management and automation, and finally the decision-making process in the era of human-machine cooperation.Design/methodology/approachThe authors analyzed a sample of 251 HRPs from 11 different countries divided into 4 cultural clusters to explore their attitude to incorporate new practices to the HR field because of technological development. The paper explores HRPs' beliefs in a legal and financial context, performance management issues, and the impact of automation on the decision-making process. Furthermore, the authors perform a cross-cultural comparison analysis to examine potential significant differences between cultural clusters.FindingsHRPs are aware of how technology adoption is affecting work environment and they highlight the importance of human resources (HR) for businesses, despite the global trend of extensive machinery exploitation. Interestingly, our results suggest that overall globalization, common knowledge, and internationalized practices lead to homogeneity for most issues under study.Originality/valueTo the best of the authors' knowledge, there has not been any comprehensive study exploring and analyzing the effects of Industry 4.0 on HRPs perceptions in the context of a dynamic HR environment influenced by technological transformation. The study shows that HRPs' present similar perspectives for most issues addressed, irrespective of cultural characteristics of HRPs. Hence, this paper generates some important insights in an attempt to build a framework for enhancing HR in this new era.", "venue": "Employee Relations: The International Journal", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-23", "journal": {"name": "Employee Relations: The International Journal"}, "authors": [{"authorId": "2166528665", "name": "Konstantinos Mantzaris"}, {"authorId": "117439841", "name": "Barbara Myloni"}]}, {"paperId": "be33823886361b68d27a33f7dfb0986a8414ac33", "externalIds": {"DBLP": "journals/algorithms/LuL22", "DOI": "10.3390/a15080282", "CorpusId": 251601059}, "corpusId": 251601059, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/be33823886361b68d27a33f7dfb0986a8414ac33", "title": "Techniques and Paradigms in Modern Game AI Systems", "abstract": "Games have long been benchmarks and test-beds for AI algorithms. With the development of AI techniques and the boost of computational power, modern game AI systems have achieved superhuman performance in many games played by humans. These games have various features and present different challenges to AI research, so the algorithms used in each of these AI systems vary. This survey aims to give a systematic review of the techniques and paradigms used in modern game AI systems. By decomposing each of the recent milestones into basic components and comparing them based on the features of games, we summarize the common paradigms to build game AI systems and their scope and limitations. We claim that deep reinforcement learning is the most general methodology to become a mainstream method for games with higher complexity. We hope this survey can both provide a review of game AI algorithms and bring inspiration to the game AI community for future directions.", "venue": "Algorithms", "year": 2022, "referenceCount": 80, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1999-4893/15/8/282/pdf?version=1660290176", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-08-12", "journal": {"volume": "15", "pages": "282", "name": "Algorithms"}, "authors": [{"authorId": "2143668784", "name": "Yunlong Lu"}, {"authorId": "2155025453", "name": "Wenxin Li"}]}, {"paperId": "29f5407995065dffa0f615cc681b1653fde4c224", "externalIds": {"PubMedCentral": "9372087", "DOI": "10.1038/s41598-022-18084-0", "CorpusId": 251516952, "PubMed": "35953516"}, "corpusId": 251516952, "publicationVenue": {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", "name": "Scientific Reports", "type": "journal", "alternate_names": ["Sci Rep"], "issn": "2045-2322", "url": "http://www.nature.com/srep/", "alternate_urls": ["http://www.nature.com/srep/index.html"]}, "url": "https://www.semanticscholar.org/paper/29f5407995065dffa0f615cc681b1653fde4c224", "title": "Evaluation of auto-segmentation for EBRT planning structures using deep learning-based workflow on cervical cancer", "abstract": null, "venue": "Scientific Reports", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s41598-022-18084-0.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-11", "journal": {"volume": "12", "name": "Scientific Reports"}, "authors": [{"authorId": "1519273661", "name": "Jiahao Wang"}, {"authorId": "2144037459", "name": "Yuanyuan Chen"}, {"authorId": "46816416", "name": "Honglin Xie"}, {"authorId": "2182088347", "name": "Lumeng Luo"}, {"authorId": "2181311807", "name": "Qiu Tang"}]}, {"paperId": "83434a8e9796fb78472358b8b4d4444db61d19db", "externalIds": {"DBLP": "journals/corr/abs-2208-03836", "ArXiv": "2208.03836", "DOI": "10.48550/arXiv.2208.03836", "CorpusId": 251402401}, "corpusId": 251402401, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/83434a8e9796fb78472358b8b4d4444db61d19db", "title": "Artificial Intelligence and Machine Learning for Quantum Technologies", "abstract": "In recent years, the dramatic progress in machine learning has begun to impact many areas of science and technology signi\ufb01cantly. In the present perspective article, we explore how quantum technologies are bene\ufb01ting from this revolution. We showcase in illustrative examples how scientists in the past few years have started to use machine learning and more broadly methods of arti\ufb01cial intelligence to analyze quantum measurements, estimate the parameters of quantum devices, discover new quantum experimental setups, protocols, and feedback strategies, and generally improve aspects of quantum computing, quantum communication, and quantum simulation. We highlight open challenges and future possibilities and conclude with some speculative visions for the next decade.", "venue": "ArXiv", "year": 2022, "referenceCount": 142, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-07", "journal": {"volume": "abs/2208.03836", "name": "ArXiv"}, "authors": [{"authorId": "5906965", "name": "Mario Krenn"}, {"authorId": "147098437", "name": "Jonas Landgraf"}, {"authorId": "47167798", "name": "T. Foesel"}, {"authorId": "48057862", "name": "F. Marquardt"}]}, {"paperId": "a85b031221aaff14bc34cb11ef7ee15850b26bfc", "externalIds": {"DOI": "10.1016/j.bushor.2022.07.004", "CorpusId": 251292866}, "corpusId": 251292866, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a85b031221aaff14bc34cb11ef7ee15850b26bfc", "title": "Brace yourself! Why managers should adopt a synthetic media incident response playbook in an age of falsity and synthetic media", "abstract": null, "venue": "Business Horizons", "year": 2022, "referenceCount": 27, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-08-01", "journal": {"name": "Business Horizons"}, "authors": [{"authorId": "1581739911", "name": "L. Whittaker"}, {"authorId": "1786178", "name": "Jan H. Kietzmann"}, {"authorId": "51926313", "name": "Kate Letheren"}, {"authorId": "82518051", "name": "R. Mulcahy"}, {"authorId": "1400907437", "name": "Rebekah Russell\u2013Bennett"}]}, {"paperId": "31529dd1ce338a1790a2f4b0ce556500d9d8b3f0", "externalIds": {"DBLP": "journals/jlap/Valiron22", "DOI": "10.1016/j.jlamp.2022.100790", "CorpusId": 250587969}, "corpusId": 250587969, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/31529dd1ce338a1790a2f4b0ce556500d9d8b3f0", "title": "Semantics of quantum programming languages: Classical control, quantum control", "abstract": null, "venue": "J. Log. Algebraic Methods Program.", "year": 2022, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-01", "journal": {"volume": "128", "pages": "100790", "name": "J. Log. Algebraic Methods Program."}, "authors": [{"authorId": "2591230", "name": "B. Valiron"}]}, {"paperId": "7aa473bd471d917b6d3a70da242002a3978d2358", "externalIds": {"DOI": "10.1109/ICDACAI57211.2022.00076", "CorpusId": 254737904}, "corpusId": 254737904, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7aa473bd471d917b6d3a70da242002a3978d2358", "title": "The Advance of the Combination Method of Machine Learning and Deep Learning", "abstract": "The deep learning technology represented by the neural network has made remarkable achievements in recent years. However, deep learning technology has reached the bottleneck period due to interpretability, data and computing demand, and other reasons. One solution is to combine some classic machine learning methods with deep learning techniques to alleviate the existing problems. This paper summarizes the representative work of combining the machine learning method and deep learning method in recent years. It analyzes the advantages and disadvantages of these kinds of methods. In addition, this paper analyzes and discusses the challenges and development prospects of deep learning technology. We believe that the review and analysis of the above work and the discussion of the current predicament will provide valuable reference information for the development of artificial intelligence.", "venue": "2022 International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI)", "year": 2022, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2022-08-01", "journal": {"pages": "350-353", "name": "2022 International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI)"}, "authors": [{"authorId": "1796289189", "name": "Hao Dong"}]}, {"paperId": "7c16068b924dfe6011f23efba7a911a6250cb139", "externalIds": {"DOI": "10.1109/AIE57029.2022.00064", "CorpusId": 252561040}, "corpusId": 252561040, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c16068b924dfe6011f23efba7a911a6250cb139", "title": "Critical Thinking on the Turing Test as a Standard for Testing Artificial Intelligence", "abstract": "Artificial intelligence is a fashionable topic in the current world. In the domain of artificial intelligence, the most basic concept is intelligence. How to judge whether a machine or program has intelligence is an important problem. By studying the famous original paper \"computing machine and intelligence\" which proposed Turing test, and combining with the Chinese house thought experiment and the chat program Eliza experiment, this paper points out that the popular saying that Turing test is regarded as the standard to judge whether a machine has intelligence neither conforms to the actual research in artificial Intelligence, nor conform to the meaning expressed by Turing himself. We are not trying to belittle Turing\u2019s great contribution to AI, but to clarify some misunderstandings from the perspective of critical thinking, and to point out the problems caused by these misunderstandings in current AI research and publicity.", "venue": "2022 International Conference on Artificial Intelligence in Everything (AIE)", "year": 2022, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-08-01", "journal": {"pages": "297-300", "name": "2022 International Conference on Artificial Intelligence in Everything (AIE)"}, "authors": [{"authorId": "2074312", "name": "W. Ouyang"}, {"authorId": "108062058", "name": "H. Feng"}]}, {"paperId": "3320cedd950afe395305e874e8bf631384d23c3c", "externalIds": {"DOI": "10.1386/jivs_00058_1", "CorpusId": 251892432}, "corpusId": 251892432, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3320cedd950afe395305e874e8bf631384d23c3c", "title": "Cybernetic animism: Voice and AI in conversation", "abstract": "This Voicing explores the theoretical and material connections between Artificial Intelligence (AI) and voice. The Voicing is in three-parts encompassing: a theoretical introduction with a taxonomy for voice and AI, an extract from artist K. Allado-McDowell\u2019s new work Air Age Blueprint and an interview based on such text. Allado-McDowell pioneered the field of human\u2013artificial intelligence interaction and literature. With their book Pharmako-AI, written in collaboration with GPT-3, Allado-McDowell stretched the limits of language creation. Francesco Bentivegna worked as artist in the liminal space of cyborgean voices and recently completed their Ph.D. on voice, AI and synthetic personas. As an exercise in philosophy of AI, voice studies and artistic research, Allado-McDowell and Bentivegna move in conversation through biases, vibes and language, exploring narrative, science and theory.", "venue": "Journal of Interdisciplinary Voice Studies", "year": 2022, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-01", "journal": {"name": "Journal of Interdisciplinary Voice Studies"}, "authors": [{"authorId": "2183152057", "name": "K. Allado-McDowell"}, {"authorId": "36475590", "name": "F. Bentivegna"}]}, {"paperId": "94a0c0342abce2a2fd9aa47e85101d29ccae8f22", "externalIds": {"DOI": "10.1007/s11569-022-00418-x", "CorpusId": 251661626}, "corpusId": 251661626, "publicationVenue": {"id": "f151e41a-8da2-4030-aeab-229a2c46ffc7", "name": "NanoEthics", "type": "journal", "alternate_names": ["Nanoethics"], "issn": "1871-4757", "url": "http://www.springer.com/social+sciences/applied+ethics/journal/11569", "alternate_urls": ["https://rd.springer.com/journal/11569"]}, "url": "https://www.semanticscholar.org/paper/94a0c0342abce2a2fd9aa47e85101d29ccae8f22", "title": "Imitating the Human. New Human\u2013Machine Interactions in Social Robots", "abstract": null, "venue": "NanoEthics", "year": 2022, "referenceCount": 69, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11569-022-00418-x.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-01", "journal": {"volume": "16", "pages": "181 - 192", "name": "NanoEthics"}, "authors": [{"authorId": "114149181", "name": "Joan G. Seifert"}, {"authorId": "48685400", "name": "O. Friedrich"}, {"authorId": "6466790", "name": "Sebastian Schleidgen"}]}, {"paperId": "e6e47d14161c56bb071068f70a66d419a165a706", "externalIds": {"PubMedCentral": "9407151", "DOI": "10.3390/diagnostics12081972", "CorpusId": 251639638, "PubMed": "36010322"}, "corpusId": 251639638, "publicationVenue": {"id": "1944b6e1-2c1d-4f42-88e3-9f8a52f57e47", "name": "Diagnostics", "issn": "2075-4418", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217965", "alternate_urls": ["https://www.mdpi.com/journal/diagnostics", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217965"]}, "url": "https://www.semanticscholar.org/paper/e6e47d14161c56bb071068f70a66d419a165a706", "title": "Dermatopathology of Malignant Melanoma in the Era of Artificial Intelligence: A Single Institutional Experience", "abstract": "The application of artificial intelligence (AI) algorithms in medicine could support diagnostic and prognostic analyses and decision making. In the field of dermatopathology, there have been various papers that have trained algorithms for the recognition of different types of skin lesions, such as basal cell carcinoma (BCC), seborrheic keratosis (SK) and dermal nevus. Furthermore, the difficulty in diagnosing particular melanocytic lesions, such as Spitz nevi and melanoma, considering the grade of interobserver variability among dermatopathologists, has led to an objective difficulty in training machine learning (ML) algorithms to a totally reliable, reportable and repeatable level. In this work we tried to train a fast random forest (FRF) algorithm, typically used for the classification of clusters of pixels in images, to highlight anomalous areas classified as melanoma \u201cdefects\u201d following the Allen\u2013Spitz criteria. The adopted image vision diagnostic protocol was structured in the following steps: image acquisition by selecting the best zoom level of the microscope; preliminary selection of an image with a good resolution; preliminary identification of macro-areas of defect in each preselected image; identification of a class of a defect in the selected macro-area; training of the supervised machine learning FRF algorithm by selecting the micro-defect in the macro-area; execution of the FRF algorithm to find an image vision performance indicator; and analysis of the output images by enhancing lesion defects. The precision achieved by the FRF algorithm proved to be appropriate with a discordance of 17% with respect to the dermatopathologist, allowing this type of supervised algorithm to be nominated as a help to the dermatopathologist in the challenging diagnosis of malignant melanoma.", "venue": "Diagnostics", "year": 2022, "referenceCount": 24, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2075-4418/12/8/1972/pdf?version=1660557570", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-01", "journal": {"volume": "12", "name": "Diagnostics"}, "authors": [{"authorId": "1471633507", "name": "Gerardo Cazzato"}, {"authorId": "144275192", "name": "A. Massaro"}, {"authorId": "1577899591", "name": "A. Colagrande"}, {"authorId": "6423417", "name": "T. Lettini"}, {"authorId": "3606943", "name": "S. Cicco"}, {"authorId": "4164293", "name": "P. Parente"}, {"authorId": "11846012", "name": "E. Nacchiero"}, {"authorId": "47484492", "name": "L. Lospalluti"}, {"authorId": "52209171", "name": "E. Cascardi"}, {"authorId": "48916832", "name": "G. Giudice"}, {"authorId": "5344789", "name": "G. Ingravallo"}, {"authorId": "143892050", "name": "L. Resta"}, {"authorId": "3936381", "name": "E. Maiorano"}, {"authorId": "2060191109", "name": "A. Vacca"}]}, {"paperId": "60240322dd39ad4c22fed2dc884e65a20e9e61f6", "externalIds": {"DOI": "10.1016/j.tics.2022.06.010", "CorpusId": 251307978, "PubMed": "35933289"}, "corpusId": 251307978, "publicationVenue": {"id": "20cb626a-518d-4016-826a-0157cf2f8fd6", "name": "Trends in Cognitive Sciences", "type": "journal", "alternate_names": ["Trends Cogn Sci"], "issn": "1364-6613", "url": "https://www.cell.com/trends/cognitive-sciences/home", "alternate_urls": ["http://www.cell.com/trends/cognitive-sciences/home", "https://www.journals.elsevier.com/trends-in-cognitive-sciences", "http://www.sciencedirect.com/science/journal/13646613"]}, "url": "https://www.semanticscholar.org/paper/60240322dd39ad4c22fed2dc884e65a20e9e61f6", "title": "Symbols and mental programs: a hypothesis about human singularity", "abstract": null, "venue": "Trends in Cognitive Sciences", "year": 2022, "referenceCount": 141, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-08-01", "journal": {"volume": "26", "pages": "751-766", "name": "Trends in Cognitive Sciences"}, "authors": [{"authorId": "1787332", "name": "S. Dehaene"}, {"authorId": "2028908687", "name": "Fosca Al Roumi"}, {"authorId": "3051598", "name": "Yair Lakretz"}, {"authorId": "5831538", "name": "Samuel Planton"}, {"authorId": "1414161813", "name": "Mathias Sabl\u00e9-Meyer"}]}, {"paperId": "f70b089458207ec2bd56522952dc5f93348d5b6e", "externalIds": {"DOI": "10.5753/wit.2022.222940", "CorpusId": 251240751}, "corpusId": 251240751, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f70b089458207ec2bd56522952dc5f93348d5b6e", "title": "SALVE TODAS: um Sistema Inteligente para Auxiliar na Seguran\u00e7a de Mulheres", "abstract": "O artigo apresenta o Sistema SALVE TODAS, cujo objetivo \u00e9 auxiliar na seguran\u00e7a de mulheres atrav\u00e9s da implementa\u00e7\u00e3o de t\u00e9cnicas de aprendizado de m\u00e1quina em conjunto com a constru\u00e7\u00e3o de um dispositivo eletr\u00f4nico e de um aplicativo voltados para a detec\u00e7\u00e3o de situa\u00e7\u00f5es de risco e para o disparo de uma mensagem de pedido de socorro. O dispositivo conta com diferentes sensores cujos dados ser\u00e3o analisados por uma rede neural capaz de reconhecer situa\u00e7\u00f5es em que a mulher se encontra em perigo e disparar a mensagem de SOS automaticamente. A mensagem tamb\u00e9m pode ser enviada manualmente por meio de um bot\u00e3o. Ao ser identificado o perigo, o aplicativo envia o SOS e compartilha a localiza\u00e7\u00e3o da mulher com seus contatos de seguran\u00e7a.\u00a0", "venue": "Anais do XVI Women in Information Technology (WIT 2022)", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://sol.sbc.org.br/index.php/wit/article/download/20866/20692", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-31", "journal": {"name": "Anais do XVI Women in Information Technology (WIT 2022)"}, "authors": [{"authorId": "31812333", "name": "M. F. Ribeiro"}, {"authorId": "2109815355", "name": "M. M. Pereira"}]}, {"paperId": "f41544f80c5ca1015b4e22c8a2750246bc62e39b", "externalIds": {"DOI": "10.1109/IAICT55358.2022.9887488", "CorpusId": 252312172}, "corpusId": 252312172, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f41544f80c5ca1015b4e22c8a2750246bc62e39b", "title": "Artificial Intelligence in Finance: Possibilities and Threats", "abstract": "Artificial intelligence (AI) alongside one of its main subsets, machine learning (ML), is no longer a sheer propaganda, it has nearly become a household name, though the use of the term AI by the public and at times technologists is often a misnomer. This paper explores AI and ML, outlining the main categories of extensive ML algorithmic techniques. Importantly, it provides handy timeline and distinction between the duo, whilst also introducing multiple lens views as to their potentials in the finance industry, covering the triad of financial, regulatory and insurance technologies (FinTech, RegTech, InsurTech). Certainly, AI/ML has found practical applications in finance; whether it is generating insights on customer spending, obtaining informed underwriting risk outcomes, detecting anomalous fiscal transactions or interacting with customers using natural language, AI/ML potentials in finance is gaining significant momentum in today\u2019s world of near ubiquity Internet of Things (IoT), advanced computing and telecommunication technologies. Without downplaying the potential capabilities, what is less certain however is whether there are any frontiers to its applications in finance, and whether it will provide panaceas to the pressing challenges, especially in relation to transparency from a collective viewpoint of AI/ML solution design, development and implementation.", "venue": "2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-07-28", "journal": {"pages": "268-273", "name": "2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)"}, "authors": [{"authorId": "2048217", "name": "Opeoluwa Tosin Eluwole"}, {"authorId": "2176277632", "name": "Segun Akande"}]}, {"paperId": "ca8e868a7f1fc89b0bec9497b0a86f25750004d1", "externalIds": {"DBLP": "journals/alife/SatoM22", "DOI": "10.1162/artl_a_00376", "CorpusId": 251068059, "PubMed": "35881681"}, "corpusId": 251068059, "publicationVenue": {"id": "5ed9f470-65a3-4077-8dab-163b0c5cb9e6", "name": "Artificial Life", "type": "journal", "alternate_names": ["Artif Life"], "issn": "1064-5462", "url": "http://cognet.mit.edu/library/journals/journal?issn=10645462", "alternate_urls": ["http://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/doi/10.1162/ARTL_a_00243"]}, "url": "https://www.semanticscholar.org/paper/ca8e868a7f1fc89b0bec9497b0a86f25750004d1", "title": "The Enactive and Interactive Dimensions of AI: Ingenuity and Imagination Through the Lens of Art and Music", "abstract": "Abstract Dualisms are pervasive. The divisions between the rational mind, the physical body, and the external natural world have set the stage for the successes and failures of contemporary cognitive science and artificial intelligence.1 Advanced machine learning (ML) and artificial intelligence (AI) systems have been developed to draw art and compose music. Many take these facts as calls for a radical shift in our values and turn to questions about AI ethics, rights, and personhood. While the discussion of agency and rights is not wrong in principle, it is a form of misdirection in the current circumstances. Questions about an artificial agency can only come after a genuine reconciliation of human interactivity, creativity, and embodiment. This kind of challenge has both moral and theoretical force. In this article, the authors intend to contribute to embodied and enactive approaches to AI by exploring the interactive and contingent dimensions of machines through the lens of Japanese philosophy. One important takeaway from this project is that AI/ML systems should be recognized as powerful tools or instruments rather than as agents themselves.", "venue": "Artificial Life", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-25", "journal": {"volume": "28", "pages": "310-321", "name": "Artificial Life"}, "authors": [{"authorId": "2111956341", "name": "Maki Sato"}, {"authorId": "46397736", "name": "Jonathan McKinney"}]}, {"paperId": "d6302b01db9616f1f152581aacd410d9b1514157", "externalIds": {"DOI": "10.1007/s11229-022-03798-5", "CorpusId": 251085672}, "corpusId": 251085672, "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, "url": "https://www.semanticscholar.org/paper/d6302b01db9616f1f152581aacd410d9b1514157", "title": "The identification game: deepfakes and the epistemic limits of identity", "abstract": null, "venue": "Synthese", "year": 2022, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11229-022-03798-5.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-25", "journal": {"volume": "200", "name": "Synthese"}, "authors": [{"authorId": "31028090", "name": "Carl \u00d6hman"}]}, {"paperId": "c1bf768d68f2213e60f397e6a6ddafa162201d0a", "externalIds": {"DBLP": "journals/corr/abs-2208-04148", "ArXiv": "2208.04148", "DOI": "10.48550/arXiv.2208.04148", "CorpusId": 251402420}, "corpusId": 251402420, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c1bf768d68f2213e60f397e6a6ddafa162201d0a", "title": "A Historical Interaction between Artificial Intelligence and Philosophy", "abstract": "This paper reviews the historical development of AI and representative philosophical thinking from the perspective of the research paradigm. Additionally, it considers the methodology and applications of AI from a philosophical perspective and anticipates its continued advancement. In the history of AI, Symbolism and connectionism are the two main paradigms in AI research. Symbolism holds that the world can be explained by symbols and dealt with through precise, logical processes, but connectionism believes this process should be implemented through artificial neural networks. Regardless of how intelligent machines or programs should achieve their smart goals, the historical development of AI demonstrates the best answer at this time. Still, it is not the final answer of AI research.", "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-23", "journal": {"volume": "abs/2208.04148", "name": "ArXiv"}, "authors": [{"authorId": "2180772261", "name": "Youheng Zhang"}]}, {"paperId": "7a47bbb3f8ee2171db77ce94f2d94dfbdc9bde69", "externalIds": {"DOI": "10.1007/s13347-022-00561-z", "CorpusId": 251000575}, "corpusId": 251000575, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7a47bbb3f8ee2171db77ce94f2d94dfbdc9bde69", "title": "Intelligence as a Social Concept: a Socio-Technological Interpretation of the Turing Test", "abstract": null, "venue": "Philosophy & Technology", "year": 2022, "referenceCount": 63, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-22", "journal": {"volume": "35", "name": "Philosophy & Technology"}, "authors": [{"authorId": "83389626", "name": "Shlomo Danziger"}]}, {"paperId": "a12447c77330d09c6b5da8f48e92faf8511d24ed", "externalIds": {"DOI": "10.31056/2250.5415.v12.n2.38328", "CorpusId": 250938453}, "corpusId": 250938453, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a12447c77330d09c6b5da8f48e92faf8511d24ed", "title": "La gran pantalla como laboratorio y espejo para la robo\u00e9tica", "abstract": "La robo\u00e9tica es una rama de la \u00e9tica aplicada interesada por los desaf\u00edos \u00e9ticos y sociales de la rob\u00f3tica y la inteligencia artificial. En el presente ensayo utilizo el cine de ciencia-ficci\u00f3n para reflexionar sobre esta disciplina, habida cuenta de la doble funci\u00f3n de este g\u00e9nero como \u201cespejo\u201d de la vanguardia tecno-cient\u00edfica y como \u201claboratorio\u201d para la especulaci\u00f3n futurista y la influencia social. De entre los muchos temas \u00e9tico-sociales relacionados con estas tecnolog\u00edas, centro los esfuerzos en analizar (1) los riesgos y medidas de seguridad asociadas, (2) los derechos y deberes inherentes y (3) las consecuencias relacionales de la d\u00edada humano-m\u00e1quina. Como conclusi\u00f3n, cabe destacar que el cine de ciencia-ficci\u00f3n se ha aproximado sin disimulo (con diferente grado de plausibilidad) a todas estas cuestiones, las cuales se antojan de m\u00e1xima urgencia si consideramos el impacto bio-psico-social que la rob\u00f3tica y la cibern\u00e9tica ya tienen (y tendr\u00e1n) en nuestras vidas.", "venue": "\u00c9tica y Cine Journal", "year": 2022, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistas.unc.edu.ar/index.php/eticaycine/article/download/38328/38334", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-20", "journal": {"name": "\u00c9tica y Cine Journal"}, "authors": [{"authorId": "2124362976", "name": "Jos\u00e9 Miguel Biscaia Fern\u00e1ndez"}]}, {"paperId": "07304a9a7bc5743ee49d3bbc236d940b05bef789", "externalIds": {"DOI": "10.31056/2250.5415.v12.n2.38325", "CorpusId": 250941196}, "corpusId": 250941196, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/07304a9a7bc5743ee49d3bbc236d940b05bef789", "title": "El test de Turing en Ex Machina: \u00bfEs Ava un sistema intencional?", "abstract": "El presente art\u00edculo aborda el problema de la interacci\u00f3n entre seres humanos y la inteligencia artificial a partir del test de Turing representado en la pel\u00edcula\u00a0Ex Machina. Se revisan algunas de las principales perspectivas en relaci\u00f3n con la filosof\u00eda de la mente y se analiza el problema que plantea la pel\u00edcula, en cuanto a si Ava, la robot humanoide, supera el test de Turing, a partir de tres hip\u00f3tesis: los estados mentales descritos por John Searle constituyen las tres dimensiones del mundo ps\u00edquico y la deliberaci\u00f3n moral: la dimensi\u00f3n f\u00e1ctica de la\u00a0percepci\u00f3n, la dimensi\u00f3n estimativa de los valores y la dimensi\u00f3n pragm\u00e1tica de las acciones. La segunda hip\u00f3tesis afirma que las ideas constituyen estados mentales intencionales, unidades de trasmisi\u00f3n cultural que, asociadas a estados emocionales, constituyen los sentimientos como fen\u00f3menos neuroculturales. La tercera hip\u00f3tesis afirma que la comunidad de significados emergente a partir del v\u00ednculo entre afectos y sistemas simb\u00f3licos-culturales puede estar constituida, tanto por seres humanos como por sistemas algor\u00edtmicos. En este sentido, la prueba de la inteligencia artificial fuerte consiste en la constataci\u00f3n en tales sistemas de estados mentales afectivos (valorativos) mediados por la interacci\u00f3n cultural.", "venue": "\u00c9tica y Cine Journal", "year": 2022, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistas.unc.edu.ar/index.php/eticaycine/article/download/38325/38331", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-20", "journal": {"name": "\u00c9tica y Cine Journal"}, "authors": [{"authorId": "2178502066", "name": "Maria Paola Caycedo-Castro"}, {"authorId": "1412954124", "name": "Boris Juli\u00e1n Pinto-Bustamante"}]}, {"paperId": "7722dce5de72ad9d6f1f496ce77b0b26f83fd047", "externalIds": {"DBLP": "journals/topics/CassentiVR22", "DOI": "10.1111/tops.12622", "CorpusId": 250698077, "PubMed": "35853452"}, "corpusId": 250698077, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7722dce5de72ad9d6f1f496ce77b0b26f83fd047", "title": "Editor's Review and Introduction: Cognition-Inspired Artificial Intelligence", "abstract": "Cognitive science has much to contribute to the general scientific body of knowledge, but it is also a field rife with possibilities for providing background research that can be leveraged by artificial intelligence (AI) developers. In this introduction, we briefly explore the history of AI. We particularly focus on the relationship between AI and cognitive science and introduce this special issue that promotes the method of inspiring AI development with the results of cognitive science research.", "venue": "Top. Cogn. Sci.", "year": 2022, "referenceCount": 34, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-19", "journal": {"name": "Topics in cognitive science"}, "authors": [{"authorId": "2051193", "name": "Daniel N. Cassenti"}, {"authorId": "35025007", "name": "V. D. Veksler"}, {"authorId": "1701118", "name": "F. Ritter"}]}, {"paperId": "6ab907876e1beae83d898f638e7a6c6c1f7cd7f4", "externalIds": {"DBLP": "conf/ijcnn/Weng22", "DOI": "10.1109/IJCNN55064.2022.9892445", "CorpusId": 252626098}, "corpusId": 252626098, "publicationVenue": {"id": "f80ba4a3-7aed-4021-b4d8-e4f50668847a", "name": "IEEE International Joint Conference on Neural Network", "type": "conference", "alternate_names": ["IJCNN", "IEEE Int Jt Conf Neural Netw", "Int Jt Conf Neural Netw", "International Joint Conference on Neural Network"], "url": "http://www.wikicfp.com/cfp/program?id=1573"}, "url": "https://www.semanticscholar.org/paper/6ab907876e1beae83d898f638e7a6c6c1f7cd7f4", "title": "20 Million-Dollar Problems for Any Brain Models and a Holistic Solution: Conscious Learning", "abstract": "This is a theoretical paper. It raises 20 open problems each of which is estimated to require one million dollars of investment or more. They are (1) the image annotation problem (e.g., retina is without bounding box to learn, unlike ImageNet), (2) the sensorimotor recurrence problem (e.g., all big data sets are invalid), (3) the motor-supervision problem (e.g., impractical to supervise motors throughout lifetime), (4) the sensor calibration problem (e.g., a life calibrates the eyes automatically), (5) the inverse kinematics problem (e.g., a life calibrates all redundant limbs automatically), (6) the government-free problem (i.e., no task-aware homunculus inside a brain), (7) the closed-skull problem (e.g., supervising hidden neurons is biologically implausible), (8) the nonlinear controller problem (e.g., a brain is a nonlinear controller but task-nonspecific), (9) the curse of dimensionality problem (e.g., a set of global features is insufficient for a life), (10) the under-sample problem (i.e., few available examples in a life), (11) the distributed vs. local representations problem (i.e., how both representations emerge), (12) the symbol problem (also called grounding problem, thus must be free from any symbols), (13) the local minima problem (so, avoid error-backprop learning and Post-Selections), (14) the abstraction problem (i.e., require various invariances and transfers), (15) the compositionality problem (e.g., metonymy beyond those composable from sentences), (16) the smooth representations problem (e.g., brain representations are globally smooth), (17) the motivation problem (e.g., including reinforcements and various emotions), (18) the global optimality problem (e.g., avoid catastrophic memory loss and Post-Selections), (19) the auto-programming for general purposes (APFGP) problem, (20) the brain-thinking problem. The paper discusses also why the proposed holistic solution of conscious learning [1], [2] solves each.", "venue": "IEEE International Joint Conference on Neural Network", "year": 2022, "referenceCount": 44, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-07-18", "journal": {"pages": "1-9", "name": "2022 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "d3088d8aad337f02c8c95b77833e69c0b8db4ac2", "externalIds": {"DBLP": "conf/ijcnn/JainSCS22", "DOI": "10.1109/IJCNN55064.2022.9892890", "CorpusId": 252626047}, "corpusId": 252626047, "publicationVenue": {"id": "f80ba4a3-7aed-4021-b4d8-e4f50668847a", "name": "IEEE International Joint Conference on Neural Network", "type": "conference", "alternate_names": ["IJCNN", "IEEE Int Jt Conf Neural Netw", "Int Jt Conf Neural Netw", "International Joint Conference on Neural Network"], "url": "http://www.wikicfp.com/cfp/program?id=1573"}, "url": "https://www.semanticscholar.org/paper/d3088d8aad337f02c8c95b77833e69c0b8db4ac2", "title": "Domain Infused Conversational Response Generation for Tutoring based Virtual Agent", "abstract": "Recent advances in deep learning typically, with the introduction of transformer based models has shown massive improvement and success in many Natural Language Processing (NLP) tasks. One such area which has leveraged immensely is conversational agents or chatbots in open-ended (chit-chat conversations) and task-specific (such as medical or legal dialogue bots etc.) domains. However, in the era of automation, there is still a dearth of works focused on one of the most relevant use cases, i.e., tutoring dialog systems that can help students learn new subjects or topics of their interest. Most of the previous works in this domain are either rule based systems which require a lot of manual efforts or are based on multiple choice type factual questions. In this paper, we propose EDICA (Educational Domain Infused Conversational Agent), a language tutoring Virtual Agent (VA). EDICA employs two mechanisms in order to converse fluently with a student/user over a question and assist them to learn a language: (i) Student/Tutor Intent Classification (SIC-TIC) framework to identify the intent of the student and decide the action of the VA, respectively, in the on-going conversation and (ii) Tutor Response Generation (TRG) framework to generate domain infused and intent/action conditioned tutor responses at every step of the conversation. The VA is able to provide hints, ask questions and correct student's reply by generating an appropriate, informative and relevant tutor response. We establish the superiority of our proposed approach on various evaluation metrics over other baselines and state of the art models.", "venue": "IEEE International Joint Conference on Neural Network", "year": 2022, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-07-18", "journal": {"pages": "1-8", "name": "2022 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "2088137695", "name": "Raghav Jain"}, {"authorId": "52219377", "name": "Tulika Saha"}, {"authorId": "2175280949", "name": "Souhitya Chakraborty"}, {"authorId": "145470045", "name": "S. Saha"}]}, {"paperId": "4b851c426d6568d64cced1e4ccc4c366c7bb2a57", "externalIds": {"DOI": "10.1109/ICBAIE56435.2022.9985852", "CorpusId": 254999341}, "corpusId": 254999341, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4b851c426d6568d64cced1e4ccc4c366c7bb2a57", "title": "An analysis method of industrial data relationship based on business context", "abstract": "Industrial big data processing is an important support for improving industrial production efficiency. Because industrial big data involves complex business logic in production scenarios, there is a widespread problem that the relationship between data is difficult to understand. Therefore, this paper proposes a relational analysis method of industrial data based on business context. Firstly, a semantic data dictionary is established according to the production business process, and then a data object recognition model based on deep learning is trained; then a context-based automatic association method of industrial data relations is proposed; finally, the experimental verification is carried out on the actual production data, and the results show that The method in this paper is effective in improving the relationship analysis of industrial data.", "venue": "2022 3rd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE)", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-07-15", "journal": {"pages": "482-487", "name": "2022 3rd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE)"}, "authors": [{"authorId": "49421824", "name": "Yang Liu"}, {"authorId": "2146334720", "name": "Tian Zhang"}]}, {"paperId": "0c2b78f41939ab385733e3aec9d580e07aef7ff0", "externalIds": {"PubMedCentral": "9300474", "DOI": "10.1016/B978-0-323-91172-6.00008-X", "CorpusId": 250702057}, "corpusId": 250702057, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0c2b78f41939ab385733e3aec9d580e07aef7ff0", "title": "Computational approaches for drug repositioning and repurposing to combat SARS-CoV-2 infection", "abstract": null, "venue": "Computational Approaches for Novel Therapeutic and Diagnostic Designing to Mitigate SARS-CoV-2 Infection", "year": 2022, "referenceCount": 64, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-15", "journal": {"pages": "247 - 265", "name": "Computational Approaches for Novel Therapeutic and Diagnostic Designing to Mitigate SARS-CoV-2 Infection"}, "authors": [{"authorId": "5733494", "name": "Subhamay Panda"}, {"authorId": "40467386", "name": "L. Kumari"}, {"authorId": "3932288", "name": "H. Badwaik"}, {"authorId": "4084524", "name": "D. Shanmugarajan"}]}, {"paperId": "3f2230b7abf58ae63e3fbaf8ff59b7de29959b28", "externalIds": {"PubMedCentral": "9336647", "DOI": "10.3389/fpsyg.2022.911620", "CorpusId": 250593707, "PubMed": "35911009"}, "corpusId": 250593707, "publicationVenue": {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, "url": "https://www.semanticscholar.org/paper/3f2230b7abf58ae63e3fbaf8ff59b7de29959b28", "title": "Self-organized criticality as a framework for consciousness: A review study", "abstract": "Objective No current model of consciousness is univocally accepted on either theoretical or empirical grounds, and the need for a solid unifying framework is evident. Special attention has been given to the premise that self-organized criticality (SOC) is a fundamental property of neural system. SOC provides a competitive model to describe the physical mechanisms underlying spontaneous brain activity, and thus, critical dynamics were proposed as general gauges of information processing representing a strong candidate for a surrogate measure of consciousness. As SOC could be a neurodynamical framework, which may be able to bring together existing theories and experimental evidence, the purpose of this work was to provide a comprehensive overview of progress of research on SOC in association with consciousness. Methods A comprehensive search of publications on consciousness and SOC published between 1998 and 2021 was conducted. The Web of Science database was searched, and annual number of publications and citations, type of articles, and applied methods were determined. Results A total of 71 publications were identified. The annual number of citations steadily increased over the years. Original articles comprised 50.7% and reviews/theoretical articles 43.6%. Sixteen studies reported on human data and in seven studies data were recorded in animals. Computational models were utilized in n\u2009=\u200912 studies. EcoG data were assessed in n\u2009=\u20094 articles, fMRI in n\u2009=\u20094 studies, and EEG/MEG in n\u2009=\u200910 studies. Notably, different analytical tools were applied in the EEG/MEG studies to assess a surrogate measure of criticality such as the detrended fluctuation analysis, the pair correlation function, parameters from the neuronal avalanche analysis and the spectral exponent. Conclusion Recent studies pointed out agreements of critical dynamics with the current most influencing theories in the field of consciousness research, the global workspace theory and the integrated information theory. Thus, the framework of SOC as a neurodynamical parameter for consciousness seems promising. However, identified experimental work was small in numbers, and a heterogeneity of applied analytical tools as a surrogate measure of criticality was observable, which limits the generalizability of findings.", "venue": "Frontiers in Psychology", "year": 2022, "referenceCount": 144, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fpsyg.2022.911620/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-15", "journal": {"volume": "13", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "2106198405", "name": "Nike Walter"}, {"authorId": "1812411", "name": "T. Hinterberger"}]}, {"paperId": "944496598fc2305f8834fbf89c5e497b83c9069f", "externalIds": {"DOI": "10.1007/s11609-022-00475-9", "CorpusId": 250505696}, "corpusId": 250505696, "publicationVenue": {"id": "a41a5ad9-9ca7-49e4-b4d8-39a4cbb0f64d", "name": "Berliner Journal f\u00fcr Soziologie", "type": "journal", "alternate_names": ["Berliner Journal Fur Soziologie", "Berl J Soziol", "Berl J Fur Soziol"], "issn": "0863-1808", "url": "https://link.springer.com/journal/11609"}, "url": "https://www.semanticscholar.org/paper/944496598fc2305f8834fbf89c5e497b83c9069f", "title": "Der kybernetische Blick und seine Grenzen. Zur systemtheoretischen Selbstbeschreibung der digitalen Gesellschaft", "abstract": null, "venue": "Berliner Journal f\u00fcr Soziologie", "year": 2022, "referenceCount": 77, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11609-022-00475-9.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-11", "journal": {"name": "Berliner Journal f\u00fcr Soziologie"}, "authors": [{"authorId": "82997975", "name": "Sascha Dickel"}]}, {"paperId": "f53a44aeaa354cd680845b0123d3b98ace1224a0", "externalIds": {"DOI": "10.1007/s00113-022-01202-y", "CorpusId": 250390803}, "corpusId": 250390803, "publicationVenue": {"id": "0e240640-859d-40b9-83f7-00f32e490043", "name": "Die Unfallchirurgie", "type": "journal", "alternate_names": ["Die Unfallchirurgie"], "issn": "2731-7021"}, "url": "https://www.semanticscholar.org/paper/f53a44aeaa354cd680845b0123d3b98ace1224a0", "title": "K\u00fcnstliche Intelligenz und Ausblick auf Anwendungsfelder in der Pseudarthrosentherapie", "abstract": null, "venue": "Die Unfallchirurgie", "year": 2022, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-09", "journal": {"volume": "125", "pages": "611 - 618", "name": "Die Unfallchirurgie"}, "authors": [{"authorId": "2070873121", "name": "Marie K. Reumann"}, {"authorId": "51036281", "name": "B. Braun"}, {"authorId": "144539925", "name": "Max Menger"}, {"authorId": "79798014", "name": "F. Springer"}, {"authorId": "2175481295", "name": "Johann Jazewitsch"}, {"authorId": "48462037", "name": "T. Schwarz"}, {"authorId": "2135997360", "name": "Andreas K N\u00fcssler"}, {"authorId": "2095561161", "name": "T. Histing"}, {"authorId": "2153524502", "name": "Mika F. R. Rollmann"}]}, {"paperId": "77769d8a450323e2c513ebc5a247ea222c4eae97", "externalIds": {"DOI": "10.1017/9781108973335", "CorpusId": 250400208}, "corpusId": 250400208, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/77769d8a450323e2c513ebc5a247ea222c4eae97", "title": "Imagination and Creative Thinking", "abstract": "This Element explores the nature of both imagination and creative thinking in an effort to understand the relation between them and also to understand their role in the vast array of activities in which they are typically implicated, from art, music, and literature to technology, medicine, and science. Focusing on the contemporary philosophical literature, it will take up several interrelated questions: What is imagination, and how does it fit into the cognitive architecture of the mind? What is creativity? Is imagination required for creativity? Is creativity required for imagination? Is a person simply born either imaginative or not (and likewise, either creative or not), or are imagination and creativity skills that can be cultivated? And finally, are imagination and creativity uniquely human capacities, or can they be had by nonbiological entities such as AI systems?", "venue": "", "year": 2022, "referenceCount": 110, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-08", "journal": null, "authors": [{"authorId": "152537655", "name": "A. Kind"}]}, {"paperId": "c619130763c5a5f94f30a69e6da0707b40f34ce5", "externalIds": {"DOI": "10.3917/pls.537.0074", "CorpusId": 250706266}, "corpusId": 250706266, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c619130763c5a5f94f30a69e6da0707b40f34ce5", "title": "Robots en qu\u00eate d\u2019\u00e9loquence", "abstract": null, "venue": "Pour la Science", "year": 2022, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-08", "journal": {"name": "Pour la Science"}, "authors": [{"authorId": "1809842", "name": "Fr\u00e9d\u00e9ric Landragin"}]}, {"paperId": "28ea1f2321027f35bff2b0211c3e3eae48263979", "externalIds": {"PubMedCentral": "9279074", "DOI": "10.1155/2022/7205241", "CorpusId": 250525974, "PubMed": "35845955"}, "corpusId": 250525974, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/28ea1f2321027f35bff2b0211c3e3eae48263979", "title": "Artificial Intelligence-Based Data-Driven Strategy to Accelerate Research, Development, and Clinical Trials of COVID Vaccine", "abstract": "The global COVID-19 (coronavirus disease 2019) pandemic, which was caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), has resulted in a significant loss of human life around the world. The SARS-CoV-2 has caused significant problems to medical systems and healthcare facilities due to its unexpected global expansion. Despite all of the efforts, developing effective treatments, diagnostic techniques, and vaccinations for this unique virus is a top priority and takes a long time. However, the foremost step in vaccine development is to identify possible antigens for a vaccine. The traditional method was time taking, but after the breakthrough technology of reverse vaccinology (RV) was introduced in 2000, it drastically lowers the time needed to detect antigens ranging from 5\u201315 years to 1\u20132 years. The different RV tools work based on machine learning (ML) and artificial intelligence (AI). Models based on AI and ML have shown promising solutions in accelerating the discovery and optimization of new antivirals or effective vaccine candidates. In the present scenario, AI has been extensively used for drug and vaccine research against SARS-COV-2 therapy discovery. This is more useful for the identification of potential existing drugs with inhibitory human coronavirus by using different datasets. The AI tools and computational approaches have led to speedy research and the development of a vaccine to fight against the coronavirus. Therefore, this paper suggests the role of artificial intelligence in the field of clinical trials of vaccines and clinical practices using different tools.", "venue": "BioMed research international", "year": 2022, "referenceCount": 132, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/bmri/2022/7205241.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-07-06", "journal": {"volume": "2022", "name": "BioMed Research International"}, "authors": [{"authorId": "2109624967", "name": "Ashwani Sharma"}, {"authorId": "1399523832", "name": "T. Virmani"}, {"authorId": "2176754263", "name": "Vipluv Pathak"}, {"authorId": "2172478637", "name": "Anjali Sharma"}, {"authorId": "117420891", "name": "K. Pathak"}, {"authorId": "2090136929", "name": "G. Kumar"}, {"authorId": "39436862", "name": "D. Pathak"}]}, {"paperId": "c6985fbd899bec8b89fb5dc405cf2a04d5ae21a9", "externalIds": {"PubMedCentral": "9294137", "DOI": "10.3389/frobt.2022.951293", "CorpusId": 250275788, "PubMed": "35865329"}, "corpusId": 250275788, "publicationVenue": {"id": "2ee61499-676f-46c2-afde-d4c0cb4393e6", "name": "Frontiers in Robotics and AI", "type": "journal", "alternate_names": ["Front Robot AI"], "issn": "2296-9144", "url": "https://www.frontiersin.org/journals/robotics-and-ai", "alternate_urls": ["http://www.frontiersin.org/Robotics_and_AI/archive", "http://www.frontiersin.org/Robotics_and_AI/about", "http://www.frontiersin.org/Robotics_and_AI"]}, "url": "https://www.semanticscholar.org/paper/c6985fbd899bec8b89fb5dc405cf2a04d5ae21a9", "title": "Developing Intelligent Robots that Grasp Affordance", "abstract": "Humans and robots operating in unstructured environments both need to classify objects through haptic exploration and use them in various tasks, but currently they differ greatly in their strategies for acquiring such capabilities. This review explores nascent technologies that promise more convergence. A novel form of artificial intelligence classifies objects according to sensory percepts during active exploration and decides on efficient sequences of exploratory actions to identify objects. Representing objects according to the collective experience of manipulating them provides a substrate for discovering causality and affordances. Such concepts that generalize beyond explicit training experiences are an important aspect of human intelligence that has eluded robots. For robots to acquire such knowledge, they will need an extended period of active exploration and manipulation similar to that employed by infants. The efficacy, efficiency and safety of such behaviors depends on achieving smooth transitions between movements that change quickly from exploratory to executive to reflexive. Animals achieve such smoothness by using a hierarchical control scheme that is fundamentally different from those of conventional robotics. The lowest level of that hierarchy, the spinal cord, starts to self-organize during spontaneous movements in the fetus. This allows its connectivity to reflect the mechanics of the musculoskeletal plant, a bio-inspired process that could be used to adapt spinal-like middleware for robots. Implementation of these extended and essential stages of fetal and infant development is impractical, however, for mechatronic hardware that does not heal and replace itself like biological tissues. Instead such development can now be accomplished in silico and then cloned into physical robots, a strategy that could transcend human performance.", "venue": "Frontiers in Robotics and AI", "year": 2022, "referenceCount": 84, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2022.951293/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-07-05", "journal": {"volume": "9", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "1720471", "name": "G. Loeb"}]}, {"paperId": "6b84681811d5edf657b5e0ff27f092a4684fc0a3", "externalIds": {"DOI": "10.3390/philosophies7040076", "CorpusId": 250327289}, "corpusId": 250327289, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b84681811d5edf657b5e0ff27f092a4684fc0a3", "title": "The Accidental Philosopher and One of the Hardest Problems in the World", "abstract": "Given the difficulties of defining \u201cmachine\u201d and \u201cthink\u201d, Turing proposed to replace the question \u201cCan machines think?\u201d with a proxy: how well can an agent engage in sustained conversation with a human? Though Turing neither described himself as a philosopher nor published much on philosophical matters, his Imitation Game has stood the test of time. Most understood at that time that success would not come easy, but few would have guessed just how difficult engaging in ordinary conversation would turn out to be. Despite the proliferation of language processing tools, we have seen little progress towards doing well at the Imitation Game. Had Turing instead suggested ability at games or even translation as a proxy for intelligence, his paper might have been forgotten. We argue that these and related problems are amenable to mechanical, though sophisticated, formal techniques. Turing appears to have taken care to select sustained, productive conversation and that alone as his proxy. Even simple conversation challenges a machine to engage in the rich practice of human discourse in all its generality and variety.", "venue": "Philosophies", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/7/4/76/pdf?version=1661330473", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-04", "journal": {"name": "Philosophies"}, "authors": [{"authorId": "3374328", "name": "Sonje Finnestad"}, {"authorId": "32487012", "name": "E. Neufeld"}]}, {"paperId": "2675e0ed5d828321c1fe06afd6fb49ce953b9c42", "externalIds": {"DOI": "10.1002/jdd.13010", "CorpusId": 250281247, "PubMed": "35781809"}, "corpusId": 250281247, "publicationVenue": {"id": "d2b6f83d-a912-40d2-af6d-03ad01c81c5e", "name": "Journal of Dental Education", "type": "journal", "alternate_names": ["J Dent Educ"], "issn": "0022-0337", "url": "http://www.jdentaled.org/"}, "url": "https://www.semanticscholar.org/paper/2675e0ed5d828321c1fe06afd6fb49ce953b9c42", "title": "Adopting artificial intelligence in dental education: A model for academic leadership and innovation.", "abstract": "INTRODUCTION\nThe continual evolution of dental education, dental practice and the delivery of optimal oral health care is rooted in the practice of leadership. This paper explores opportunities and challenges facing dental education with a specific focus on incorporating the use of artificial intelligence (AI).\n\n\nMETHODS\nUsing the model in Bolman and Deal's Reframing Organizations, the Four Frames model serves as a road map for building infrastructure within dental schools for the adoption of AI.\n\n\nCONCLUSION\nAI can complement and boost human tasks and have a far-reaching impact in academia and health care. Its adoption could enhance educational experiences and the delivery of care, and support current functions and future innovation. The framework suggested in this paper, while specific to AI, could be adapted and applied to a myriad of innovations and new organizational ideals and goals within institutions of dental education.", "venue": "Journal of Dental Education", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-03", "journal": {"name": "Journal of dental education"}, "authors": [{"authorId": "32436596", "name": "Nadim M. Islam"}, {"authorId": "49437416", "name": "Lory Laughter"}, {"authorId": "1402477005", "name": "R. Sadid-Zadeh"}, {"authorId": "2158117940", "name": "Carlos S. Smith"}, {"authorId": "2324805", "name": "T. Dolan"}, {"authorId": "145002565", "name": "Geralyn Crain"}, {"authorId": "4459938", "name": "C. Squarize"}]}, {"paperId": "34b57c2f9b8a8648f173d9b74fb8fcda8fab820d", "externalIds": {"DOI": "10.1080/02580136.2022.2087314", "CorpusId": 252632777}, "corpusId": 252632777, "publicationVenue": {"id": "e52e52ad-edd2-47c4-bff7-c8be16bf4943", "name": "South African Journal of Philosophy", "type": "journal", "alternate_names": ["South Afr J Philos"], "issn": "0258-0136", "url": "http://www.tandfonline.com/loi/rsph20", "alternate_urls": ["http://www.ajol.info/index.php/sajpem"]}, "url": "https://www.semanticscholar.org/paper/34b57c2f9b8a8648f173d9b74fb8fcda8fab820d", "title": "The paradox of denial and mystification of machine intelligence in the Chinese room", "abstract": "Two critical questions spun the web of the Turing test debate. First, can an appropriately programmed machine pass the Turing test? Second, is passing the test by such a machine, ipso facto, considered proof that it is intelligent and hence \u201cminded\u201d? While the first question is technological, the second is purely philosophical. Focusing on the second question, this article interrogates the implication of John Searle\u2019s Chinese room denial of machine intelligence. The thrust of Searle\u2019s argument is that a machine lacks intentionality, so it can only simulate intelligence, not duplicate it. In his thinking, whatever a machine inputs to generate an intelligent output has no bearing on humanlike intelligence. Incidentally, Searle did not classify such a machine\u2019s output as simulated and non-intelligent, nor did he explain how this output is actualised with mere simulation. The connection between \u201cunintelligent machine\u2019s input\u201d and \u201cintelligent machine\u2019s output\u201d is at this point shrouded in mystery. Consequently, the more Searle attempts a denial of machine intelligence in the Chinese room, the more he mystifies it. Using the method of critical analysis, this article advances three fundamental arguments to prove a machines\u2019 obscurity in the Chinese room thought experiment. On the ground of Searle\u2019s conviction, the first argument queries the absurdity in bypassing intentionality to produce intelligence; the second points out the obfuscation in generating intelligence with mere computation, and the third draws attention to the dilemma of classifying a machine\u2019s output either as real-life intelligent behaviour or simulated intelligent behaviour.", "venue": "South African Journal of Philosophy", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-03", "journal": {"volume": "41", "pages": "253 - 263", "name": "South African Journal of Philosophy"}, "authors": [{"authorId": "1453656998", "name": "F. Asodun"}]}, {"paperId": "c3d077909fec62c4495c8fcf8396cfb401ad4eef", "externalIds": {"DOI": "10.1080/09662839.2022.2101885", "CorpusId": 252163838}, "corpusId": 252163838, "publicationVenue": {"id": "93fb0532-d945-426f-a825-34c599b00ced", "name": "European Security", "type": "journal", "alternate_names": ["Eur Secur"], "issn": "0966-2839", "url": "http://www.tandfonline.com/loi/feus20"}, "url": "https://www.semanticscholar.org/paper/c3d077909fec62c4495c8fcf8396cfb401ad4eef", "title": "Artificial intelligence and EU security: the false promise of digital sovereignty", "abstract": "ABSTRACT EU Digital Sovereignty has emerged as a priority for the EU Cyber Agenda to build free and safe, yet resilient cyberspace. In a traditional regulatory fashion, the EU has therefore sought to gain more control over third country-based digital intermediaries through legislative solutions regulating its internal market. Although potentially effective in shielding EU citizens from data exploitation by internet giants, this protectionist strategy tells us little about the EU\u2019s ability to develop Digital Sovereignty, beyond its capacity to react to the external tech industry. Given the growing hybridisation of warfare, building on the increasing integration of artificial intelligence (AI) in the security domain, leadership in advancing AI-related technology has a significant impact on countries\u2019 defence capacity. By framing AI as the intrinsic functioning of algorithms, data mining and computational capacity, we question what tools the EU could rely on to gain sovereignty in each of these dimensions of AI. By focusing on AI from an EU Foreign Policy perspective, we conclude that contrary to the growing narrative, given the absence of a leading AI industry and a coherent defence strategy, the EU has few tools to become a global leader in advancing standards of AI beyond its regulatory capacity.", "venue": "European Security", "year": 2022, "referenceCount": 121, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/09662839.2022.2101885?needAccess=true", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-03", "journal": {"volume": "31", "pages": "415 - 434", "name": "European Security"}, "authors": [{"authorId": "3024098", "name": "Andrea Calderaro"}, {"authorId": "2184479563", "name": "Stella Blumfelde"}]}, {"paperId": "7e595e9141f580823b00330c4c8c5c102caa7033", "externalIds": {"ArXiv": "2207.00859", "CorpusId": 250265033}, "corpusId": 250265033, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e595e9141f580823b00330c4c8c5c102caa7033", "title": "The nature of properly human mathematics", "abstract": ". We claim that human mathematics is only a limited part of the consequences of the chosen basic axioms. Properly human mathematics varies with time but appears to have universal features which we try to analyze. In particular the functioning of the human brain privileges concept naming and short formulations. This leads to organizing mathematical knowledge structurally. We consider brie\ufb02y the problem of non-mathematical sciences.", "venue": "", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-02", "journal": null, "authors": [{"authorId": "2707351", "name": "D. Ruelle"}]}, {"paperId": "6c7abf617c0591be96a09776092271c72f49ff2f", "externalIds": {"DBLP": "journals/corr/abs-2207-00902", "ArXiv": "2207.00902", "DOI": "10.48550/arXiv.2207.00902", "CorpusId": 250264138}, "corpusId": 250264138, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6c7abf617c0591be96a09776092271c72f49ff2f", "title": "Complementary artificial intelligence designed to augment human discovery", "abstract": "Neither artificial intelligence designed to play Turing\u2019s imitation game, nor augmented intelligence built to maximize the human manipulation of information are tuned to accelerate innovation and improve humanity\u2019s collective advance against its greatest challenges. We reconceptualize and pilot beneficial AI to radically augment human understanding by complementing rather than competing with human cognitive capacity. Our approach to complementary intelligence builds on insights underlying the wisdom of crowds, which hinges on the independence and diversity of crowd members\u2019 information and approach. By programmatically incorporating information on the evolving distribution of scientific expertise from research papers, our approach follows the distribution of content in the literature while avoiding the scientific crowd and the hypotheses cognitively available to it. We use this approach to generate valuable predictions for what materials possess valuable energy-related properties (e.g., thermoelectricity), and what compounds possess valuable medical properties (e.g., asthma) that complement the human scientific crowd. We demonstrate that our complementary predictions, if identified by human scientists and inventors at all, are only discovered years further into the future. When we evaluate the promise of our predictions with first-principles or data-driven simulations of those properties, we demonstrate an \u201cexpectation gap\u201d such that increased complementarity of our predictions do not decrease and in some cases increase the probability of these properties above those discovered and published by human scientists. In summary, by tuning AI to avoid the crowd, we can generate hypotheses unlikely to be imagined or pursued without intervention until the distant future that promise to punctuate scientific advance. By identifying and correcting for collective human bias, these models also suggest opportunities to improve human prediction by reformulating science education for discovery.", "venue": "ArXiv", "year": 2022, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-02", "journal": {"volume": "abs/2207.00902", "name": "ArXiv"}, "authors": [{"authorId": "2313086", "name": "J. Sourati"}, {"authorId": "144002439", "name": "James A. Evans"}]}, {"paperId": "9406a68789bb9db1fe3a19ac7ff17d903ee8a9f4", "externalIds": {"DBLP": "journals/eswa/ShaoZYDW22", "DOI": "10.1016/j.eswa.2022.118221", "CorpusId": 251165327}, "corpusId": 251165327, "publicationVenue": {"id": "987139ae-a65d-49bb-aaf6-fb764dc40b19", "name": "Expert systems with applications", "type": "journal", "alternate_names": ["Expert syst appl", "Expert Systems With Applications", "Expert Syst Appl"], "issn": "0957-4174", "url": "https://www.journals.elsevier.com/expert-systems-with-applications/", "alternate_urls": ["https://www.sciencedirect.com/journal/expert-systems-with-applications", "http://www.sciencedirect.com/science/journal/09574174"]}, "url": "https://www.semanticscholar.org/paper/9406a68789bb9db1fe3a19ac7ff17d903ee8a9f4", "title": "Tracing the evolution of AI in the past decade and forecasting the emerging trends", "abstract": null, "venue": "Expert systems with applications", "year": 2022, "referenceCount": 91, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-01", "journal": {"volume": "209", "pages": "118221", "name": "Expert Syst. Appl."}, "authors": [{"authorId": "1740580186", "name": "Zhou Shao"}, {"authorId": "97993965", "name": "Ruoyan Zhao"}, {"authorId": "119548118", "name": "Sha Yuan"}, {"authorId": "2167927181", "name": "Mingjie Ding"}, {"authorId": "2154892557", "name": "Yongli Wang"}]}, {"paperId": "b671797d6c58b3874f61c58a73a28298a1052fa5", "externalIds": {"DBLP": "journals/chb/ChiarellaTGRBC22", "DOI": "10.1016/j.chb.2022.107406", "CorpusId": 250713930}, "corpusId": 250713930, "publicationVenue": {"id": "435ffef1-21df-491d-b69a-605eee1b7f7f", "name": "Computers in Human Behavior", "type": "journal", "alternate_names": ["Comput Hum Behav"], "issn": "0747-5632", "url": "https://www.journals.elsevier.com/computers-in-human-behavior", "alternate_urls": ["https://www.sciencedirect.com/science/article/pii/S0747563216307695", "http://www.sciencedirect.com/science/journal/07475632"]}, "url": "https://www.semanticscholar.org/paper/b671797d6c58b3874f61c58a73a28298a1052fa5", "title": "Investigating the negative bias towards artificial intelligence: Effects of prior assignment of AI-authorship on the aesthetic appreciation of abstract paintings", "abstract": null, "venue": "Computers in Human Behavior", "year": 2022, "referenceCount": 120, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-01", "journal": {"volume": "137", "pages": "107406", "name": "Comput. Hum. Behav."}, "authors": [{"authorId": "2050674730", "name": "S. Chiarella"}, {"authorId": "2177452448", "name": "Giulia Torromino"}, {"authorId": "2177458414", "name": "Dionigi M. Gagliardi"}, {"authorId": "46796439", "name": "D. Rossi"}, {"authorId": "2476126", "name": "F. Babiloni"}, {"authorId": "2572901", "name": "G. Cartocci"}]}, {"paperId": "e1d234f1c858e13c33e24179bcbcd199ffbf00fd", "externalIds": {"DOI": "10.1134/S1995080222100195", "CorpusId": 253450355}, "corpusId": 253450355, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e1d234f1c858e13c33e24179bcbcd199ffbf00fd", "title": "Learning Theory and Population Genetics", "abstract": null, "venue": "Lobachevskii Journal of Mathematics", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-01", "journal": {"volume": "43", "pages": "1655 - 1662", "name": "Lobachevskii Journal of Mathematics"}, "authors": [{"authorId": "144039873", "name": "S. Kozyrev"}]}, {"paperId": "f8cf58361f8db89b36e377e5ddaa97f31c9396f7", "externalIds": {"PubMedCentral": "9583359", "DOI": "10.4103/sjopt.sjopt_219_21", "CorpusId": 253043482, "PubMed": "36276252"}, "corpusId": 253043482, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f8cf58361f8db89b36e377e5ddaa97f31c9396f7", "title": "Performance of deep-learning artificial intelligence algorithms in detecting retinopathy of prematurity: A systematic review", "abstract": "PURPOSE: Artificial intelligence (AI) offers considerable promise for retinopathy of prematurity (ROP) screening and diagnosis. The development of deep-learning algorithms to detect the presence of disease may contribute to sufficient screening, early detection, and timely treatment for this preventable blinding disease. This review aimed to systematically examine the literature in AI algorithms in detecting ROP. Specifically, we focused on the performance of deep-learning algorithms through sensitivity, specificity, and area under the receiver operating curve (AUROC) for both the detection and grade of ROP. METHODS: We searched Medline OVID, PubMed, Web of Science, and Embase for studies published from January 1, 2012, to September 20, 2021. Studies evaluating the diagnostic performance of deep-learning models based on retinal fundus images with expert ophthalmologists' judgment as reference standard were included. Studies which did not investigate the presence or absence of disease were excluded. Risk of bias was assessed using the QUADAS-2 tool. RESULTS: Twelve studies out of the 175 studies identified were included. Five studies measured the performance of detecting the presence of ROP and seven studies determined the presence of plus disease. The average AUROC out of 11 studies was 0.98. The average sensitivity and specificity for detecting ROP was 95.72% and 98.15%, respectively, and for detecting plus disease was 91.13% and 95.92%, respectively. CONCLUSION: The diagnostic performance of deep-learning algorithms in published studies was high. Few studies presented externally validated results or compared performance to expert human graders. Large scale prospective validation alongside robust study design could improve future studies.", "venue": "Saudi journal of ophthalmology : official journal of the Saudi Ophthalmological Society", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-01", "journal": {"volume": "36", "pages": "296 - 307", "name": "Saudi Journal of Ophthalmology"}, "authors": [{"authorId": "2188462264", "name": "Amelia Bai"}, {"authorId": "2147403082", "name": "Christopher Carty"}, {"authorId": "145230414", "name": "S. Dai"}]}, {"paperId": "c171c14b4fc347139339ef6c225c2002e731b185", "externalIds": {"DBLP": "journals/pervasive/Pinhanez22", "DOI": "10.1109/MPRV.2022.3191245", "CorpusId": 251701366}, "corpusId": 251701366, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c171c14b4fc347139339ef6c225c2002e731b185", "title": "Rethinking Language Interaction With Pervasive Applications and Devices", "abstract": "Language-based interaction with pervasive devices today mostly follows a basic command-and-control paradigm, reminiscent of 1960s Star Trek, which is often cumbersome, inadequate, and insufficient. Key causes include an often deceptive portrayal of the language comprehension capabilities of the system and, in many cases, a problematic impersonation of human characters by computers. We argue here that a major challenge of pervasive computing is to rethink language-based interaction with applications and devices. Inspired by the imaginary pervasive conversations of Sci-Fi movies, we suggest a new design principle where machines should only utter statements that they can comprehend, which we call What You Hear Is What You Say (WYHIWYS). We provide some examples of WYHIWYS in language interactions with pervasive applications, including a deployment in an art exhibit, and discuss some key research challenges it poses to HCI, AI, and pervasive computing.", "venue": "IEEE Pervasive Computing", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-01", "journal": {"volume": "21", "pages": "24-31", "name": "IEEE Pervasive Computing"}, "authors": [{"authorId": "1766240", "name": "Claudio S. Pinhanez"}]}, {"paperId": "3e8217eb1c1d96be89ec5c22d449a8c2192629bc", "externalIds": {"DBLP": "journals/caeai/DaiK22", "DOI": "10.1016/j.caeai.2022.100087", "CorpusId": 250718443}, "corpusId": 250718443, "publicationVenue": {"id": "a4e2f9c2-abbd-4f6b-9e06-ffe639dc07e7", "name": "Computers and Education: Artificial Intelligence", "type": "journal", "alternate_names": ["Comput Educ Artif Intell"], "issn": "2666-920X", "url": "https://www.journals.elsevier.com/computers-and-education-artificial-intelligence"}, "url": "https://www.semanticscholar.org/paper/3e8217eb1c1d96be89ec5c22d449a8c2192629bc", "title": "Educational applications of artificial intelligence in simulation-based learning: A systematic mapping review", "abstract": null, "venue": "Computers and Education: Artificial Intelligence", "year": 2022, "referenceCount": 96, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-01", "journal": {"volume": "3", "pages": "100087", "name": "Comput. Educ. Artif. Intell."}, "authors": [{"authorId": "1864090606", "name": "Chih-Pu Dai"}, {"authorId": "1853961", "name": "Fengfeng Ke"}]}, {"paperId": "82a2410ffcc562e9c04510f71f91bf1dd2e7be5f", "externalIds": {"DOI": "10.1016/j.dyepig.2022.110547", "CorpusId": 250252406}, "corpusId": 250252406, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82a2410ffcc562e9c04510f71f91bf1dd2e7be5f", "title": "Photochromic and luminescent materials for the development of Chemical Artificial Intelligence", "abstract": null, "venue": "Dyes and Pigments", "year": 2022, "referenceCount": 87, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-01", "journal": {"name": "Dyes and Pigments"}, "authors": [{"authorId": "34356934", "name": "P. Gentili"}]}, {"paperId": "89c76be5ec5aa3bd6a337d53520d4fb52ad520a2", "externalIds": {"DOI": "10.1016/j.trc.2022.103679", "CorpusId": 248657195}, "corpusId": 248657195, "publicationVenue": {"id": "a8fbd64a-2df2-4275-b527-7935d0142fff", "name": "Transportation Research Part C: Emerging Technologies", "type": "journal", "alternate_names": ["Transp Res Part C-emerging Technol", "Transp Res Part C Emerg Technol", "Transportation Research Part C-emerging Technologies"], "issn": "0968-090X", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/130/description#description", "alternate_urls": ["http://www.sciencedirect.com/science/journal/0968090X"]}, "url": "https://www.semanticscholar.org/paper/89c76be5ec5aa3bd6a337d53520d4fb52ad520a2", "title": "A literature review of Artificial Intelligence applications in railway systems", "abstract": null, "venue": "Transportation Research Part C: Emerging Technologies", "year": 2022, "referenceCount": 185, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": ["Review"], "publicationDate": "2022-07-01", "journal": {"name": "Transportation Research Part C: Emerging Technologies"}, "authors": [{"authorId": "2057059538", "name": "Ruifan Tang"}, {"authorId": "2164681475", "name": "Lorenzo De Donato"}, {"authorId": "7369644", "name": "Nikola Be\u0161inovi\u0107"}, {"authorId": "2441627", "name": "Francesco Flammini"}, {"authorId": "1774886", "name": "R. Goverde"}, {"authorId": "2164760844", "name": "Zhiyuan Lin"}, {"authorId": "48757839", "name": "Ronghui Liu"}, {"authorId": "80655344", "name": "Tianli Tang"}, {"authorId": "102360012", "name": "V. Vittorini"}, {"authorId": "66701629", "name": "Ziyulong Wang"}]}, {"paperId": "67d7fd76198d06a315138eaed3b03257ab5c8b8f", "externalIds": {"DOI": "10.1007/s11245-022-09811-3", "CorpusId": 255107851}, "corpusId": 255107851, "publicationVenue": {"id": "4b507eeb-33f4-4334-91f5-d521d711affb", "name": "Topoi", "type": "journal", "alternate_names": ["Topoi-an Int Rev Philos", "Topoi-an International Review of Philosophy"], "issn": "1518-3319", "alternate_issns": ["0167-7411", "1161-9473"], "url": "http://www.scielo.br/scielo.php?lng=es&nrm=iso&pid=2237-101X&rep=&script=sci_serial", "alternate_urls": ["http://www.topoi.mom.fr/", "https://www.persee.fr/collection/topoi", "http://socialsciences.scielo.org/scielo.php?lng=en&pid=1518-3319&script=sci_serial", "https://link.springer.com/journal/11245", "http://www.revistatopoi.org/", "https://www.springer.com/philosophy/journal/11245"]}, "url": "https://www.semanticscholar.org/paper/67d7fd76198d06a315138eaed3b03257ab5c8b8f", "title": "Defining Communication and Language from Within a Pluralistic Evolutionary Worldview", "abstract": null, "venue": "Topoi", "year": 2022, "referenceCount": 105, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://philpapers.org/archive/GONDCA-2.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-30", "journal": {"volume": "41", "pages": "609 - 622", "name": "Topoi"}, "authors": [{"authorId": "2474002", "name": "N. Gontier"}]}, {"paperId": "6ccbae2c6a91a91bed889544a0a662e6ede1b5ad", "externalIds": {"PubMedCentral": "9754618", "DOI": "10.16910/jemr.15.2.5", "CorpusId": 253436489}, "corpusId": 253436489, "publicationVenue": {"id": "280a7be2-5f91-4eca-bf43-84b850f4d513", "name": "Journal of Eye Movement Research", "type": "journal", "alternate_names": ["J Eye Mov Res"], "issn": "1995-8692", "url": "https://bop.unibe.ch/jemr", "alternate_urls": ["https://www.jemr.org/?_c"]}, "url": "https://www.semanticscholar.org/paper/6ccbae2c6a91a91bed889544a0a662e6ede1b5ad", "title": "Investigating visual expertise in sculpture: A methodological approach using eye tracking", "abstract": "Research on visual expertise has progressed significantly due to the availability of eye tracking tools. However, attempts to bring together research on expertise and eye tracking methodology provoke several challenges, because visual information processes should be studied in authentic and domain-specific environments. Among the barriers to designing appropriate research are the proper definition of levels of expertise, the tension between internal (experimental control) and external (authentic environments) validity, and the appropriate methodology to study eye movements in a three-dimensional environment. This exploratory study aims to address these challenges and to provide an adequate research setting by investigating visual expertise in sculpting. Eye movements and gaze patterns of 20 participants were investigated while looking at two sculptures in a museum. The participants were assigned to four different groups based on their level of expertise (laypersons, novices, semi-experts, experts). Using mobile eye tracking, the following parameters were measured: number of fixations, duration of fixation, dwell time in relevant areas, and revisits in relevant areas. Moreover, scan paths were analysed using the eyenalysis approach. Conclusions are drawn on both the nature of visual expertise in sculpting and the potential (and limitations) of empirical designs that aim to investigate expertise in authentic environments.", "venue": "Journal of Eye Movement Research", "year": 2022, "referenceCount": 45, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://bop.unibe.ch/JEMR/article/download/8216/11785", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-30", "journal": {"volume": "15", "name": "Journal of Eye Movement Research"}, "authors": [{"authorId": "1562175910", "name": "Isabell Stein"}, {"authorId": "2838193", "name": "Helen Jossberger"}, {"authorId": "1577977568", "name": "H. Gruber"}]}, {"paperId": "9b67f18f8b13e04df8ab33831a8f97cdc0373c9c", "externalIds": {"DOI": "10.1145/3522763", "CorpusId": 250118102}, "corpusId": 250118102, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9b67f18f8b13e04df8ab33831a8f97cdc0373c9c", "title": "A Static and Dynamic Attention Framework for Multi Turn Dialogue Generation", "abstract": "Recently, research on open domain dialogue systems have attracted extensive interests of academic and industrial researchers. The goal of an open domain dialogue system is to imitate humans in conversations. Previous works on single turn conversation generation have greatly promoted the research of open domain dialogue systems. However, understanding multiple single turn conversations is not equal to the understanding of multi turn dialogue due to the coherent and context dependent properties of human dialogue. Therefore, in open domain multi turn dialogue generation, it is essential to modeling the contextual semantics of the dialogue history, rather than only according to the last utterance. Previous research had verified the effectiveness of the hierarchical recurrent encoder-decoder framework on open domain multi turn dialogue generation. However, using RNN-based model to hierarchically encoding the utterances to obtain the representation of dialogue history still face the problem of a vanishing gradient. To address this issue, in this paper, we proposed a static and dynamic attention-based approach to model the dialogue history and then generate open domain multi turn dialogue responses. Experimental results on Ubuntu and Opensubtitles datasets verify the effectiveness of the proposed static and dynamic attention-based approach on automatic and human evaluation metrics in various experimental settings. Meanwhile, we also empirically verify the performance of combining the static and dynamic attentions on open domain multi turn dialogue generation.", "venue": "ACM Transactions on Information Systems", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3522763", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-30", "journal": {"name": "ACM Journal of the ACM (JACM)"}, "authors": [{"authorId": "1806419", "name": "Weinan Zhang"}, {"authorId": "3043830", "name": "Yiming Cui"}, {"authorId": "2153281320", "name": "Kaiyan Zhang"}, {"authorId": "2115568958", "name": "Yifa Wang"}, {"authorId": "50736467", "name": "Qingfu Zhu"}, {"authorId": "2145679703", "name": "Lingzhi Li"}, {"authorId": "2140034831", "name": "Ting Liu"}]}, {"paperId": "491a1b8d433e53b786c5d6971f8ff262634d3d79", "externalIds": {"ArXiv": "2206.14876", "CorpusId": 250144493}, "corpusId": 250144493, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/491a1b8d433e53b786c5d6971f8ff262634d3d79", "title": "AI in Asset Management and Rebellion Research", "abstract": "On October 30th, 2021, Rebellion Research\u2019s CEO announced in a Q3 2021 Letter to Investors that Rebellion\u2019s AI Global Equity strategy returned +6.8% gross for the first three quarters of 2021. \u201cIt\u2019s no surprise\u201d, Alex told us, \u201cour Machine Learning global strategy has a history of outperforming the S&P 500 for 14 years\u201d (see Exhibit 1). In 2021, Rebellion\u2019s brokerage accounts can be opened in over 70 countries, and Rebellion\u2019s research covers over 50 countries. Besides being an AI asset management company, Rebellion also defines itself as a top-tier, global machine learning think tank. Rebellion Research pays special attention to the financial application of ML and AI and has become a leading figure in the financial technology industry. In addition, through numerous partnerships with top American universities such as Columbia University, New York University,", "venue": "", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-29", "journal": null, "authors": [{"authorId": "120083176", "name": "J. Shen"}, {"authorId": "2174179255", "name": "Yihan Mo"}, {"authorId": "2174177138", "name": "Christopher Plimpton"}, {"authorId": "2174177819", "name": "Mustafa Ba\u015faran"}]}, {"paperId": "335094aecbee9a8fabec0a1aa680ac411c88b596", "externalIds": {"DBLP": "journals/corr/abs-2206-14672", "DOI": "10.48550/arXiv.2206.14672", "CorpusId": 250113617}, "corpusId": 250113617, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/335094aecbee9a8fabec0a1aa680ac411c88b596", "title": "Is it possible not to cheat on the Turing Test: Exploring the potential and challenges for true natural language 'understanding' by computers", "abstract": "The increasing sophistication of NLP models has renewed optimism regarding machines achieving a full human-like command of natural language. Whilst work in NLP/NLU may have made great strides in that direction, the lack of conceptual clarity in how \u2018understanding\u2019 is used in this and other disciplines have made it difficult to discern how close we actually are. A critical, interdisciplinary review of current approaches and remaining challenges is yet to be carried out. Beyond linguistic knowledge, this requires considering our species-specific capabilities to categorize, memorize, label and communicate our (sufficiently similar) embodied and situated experiences. Moreover, gauging the practical constraints requires critically analyzing the technical capabilities of current models, as well as deeper philosophical reflection on theoretical possibilities and limitations. In this paper, I unite all of these perspectives\u2014the philosophical, cognitive-linguistic, and technical\u2014to unpack the challenges involved in approaching true (human-like) language understanding. By unpacking the theoretical assumptions inherent in current approaches, I hope to illustrate how far we actually are from achieving this goal, if indeed it is the goal.", "venue": "ArXiv", "year": 2022, "referenceCount": 122, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "abs/2206.14672", "name": "ArXiv"}, "authors": [{"authorId": "1415024767", "name": "Lize Alberts"}]}, {"paperId": "55cd46d1326578f8bd4cbad33f2140a9e4988f8c", "externalIds": {"DBLP": "conf/aaai/PazzaniSKQH22", "DOI": "10.1609/aaai.v36i11.21491", "CorpusId": 250298789}, "corpusId": 250298789, "publicationVenue": {"id": "bdc2e585-4e48-4e36-8af1-6d859763d405", "name": "AAAI Conference on Artificial Intelligence", "type": "conference", "alternate_names": ["National Conference on Artificial Intelligence", "National Conf Artif Intell", "AAAI Conf Artif Intell", "AAAI"], "url": "http://www.aaai.org/"}, "url": "https://www.semanticscholar.org/paper/55cd46d1326578f8bd4cbad33f2140a9e4988f8c", "title": "Expert-Informed, User-Centric Explanations for Machine Learning", "abstract": "We argue that the dominant approach to explainable AI for explaining image classification, annotating images with heatmaps, provides little value for users unfamiliar with deep learning. We argue that explainable AI for images should produce output like experts produce when communicating with one another, with apprentices, and with novices. We provide an expanded set of goals of explainable AI systems and propose a Turing Test for explainable AI.", "venue": "AAAI Conference on Artificial Intelligence", "year": 2022, "referenceCount": 53, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/21491/21240", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "12280-12286"}, "authors": [{"authorId": "1694780", "name": "M. Pazzani"}, {"authorId": "2174898403", "name": "Severine Soltani"}, {"authorId": "2174909928", "name": "Robert Kaufman"}, {"authorId": "2174876447", "name": "Samson Qian"}, {"authorId": "2174909444", "name": "Albert Hsiao"}]}, {"paperId": "4240d1ccb21511c276d8a40eeba3e81a4fc65d08", "externalIds": {"DBLP": "conf/aaai/NavigliBL22", "DOI": "10.1609/aaai.v36i11.21490", "CorpusId": 249564420}, "corpusId": 249564420, "publicationVenue": {"id": "bdc2e585-4e48-4e36-8af1-6d859763d405", "name": "AAAI Conference on Artificial Intelligence", "type": "conference", "alternate_names": ["National Conference on Artificial Intelligence", "National Conf Artif Intell", "AAAI Conf Artif Intell", "AAAI"], "url": "http://www.aaai.org/"}, "url": "https://www.semanticscholar.org/paper/4240d1ccb21511c276d8a40eeba3e81a4fc65d08", "title": "BabelNet Meaning Representation: A Fully Semantic Formalism to Overcome Language Barriers", "abstract": "Conceptual representations of meaning have long been the general focus of Artificial Intelligence (AI) towards the fundamental goal of machine understanding, with innumerable efforts made in Knowledge Representation, Speech and Natural Language Processing, Computer Vision, inter alia. Even today, at the core of Natural Language Understanding lies the task of Semantic Parsing, the objective of which is to convert natural sentences into machine-readable representations. Through this paper, we aim to revamp the historical dream of AI, by putting forward a novel, all-embracing, fully semantic meaning representation, that goes beyond the many existing formalisms. Indeed, we tackle their key limits by fully abstracting text into meaning and introducing language-independent concepts and semantic relations, in order to obtain an interlingual representation. Our proposal aims to overcome the language barrier, and connect not only texts across languages, but also images, videos, speech and sound, and logical formulas, across many fields of AI.", "venue": "AAAI Conference on Artificial Intelligence", "year": 2022, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/21490/21239", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "12274-12279"}, "authors": [{"authorId": "1733928", "name": "Roberto Navigli"}, {"authorId": "2008183673", "name": "Rexhina Blloshmi"}, {"authorId": "2153474065", "name": "Abelardo Carlos Mart\u0131\u0301nez Lorenzo"}]}, {"paperId": "e6ecdbbceff06cc1e667e3261596fd0fa6b32c4b", "externalIds": {"DBLP": "conf/aaai/CasaresLBhH22", "DOI": "10.1609/aaai.v36i5.20466", "CorpusId": 250290176}, "corpusId": 250290176, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e6ecdbbceff06cc1e667e3261596fd0fa6b32c4b", "title": "How General-Purpose Is a Language Model? Usefulness and Safety with Human Prompters in the Wild", "abstract": "The new generation of language models is reported to solve some extraordinary tasks the models were never trained for specifically, in few-shot or zero-shot settings. However, these reports usually cherry-pick the tasks, use the best prompts, and unwrap or extract the solutions leniently even if they are followed by nonsensical text. In sum, they are specialised results for one domain, a particular way of using the models and interpreting the results. In this paper, we present a novel theoretical evaluation framework and a distinctive experimental study assessing language models as general-purpose systems when used directly by human prompters --- in the wild. For a useful and safe interaction in these increasingly more common conditions, we need to understand when the model fails because of a lack of capability or a misunderstanding of the user's intents. Our results indicate that language models such as GPT-3 have limited understanding of the human command; far from becoming general-purpose systems in the wild.", "venue": "AAAI", "year": 2022, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/20466/20225", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "5295-5303"}, "authors": [{"authorId": "145163583", "name": "Pablo Antonio Moreno Casares"}, {"authorId": "25229391", "name": "B. S. Loe"}, {"authorId": "31502027", "name": "John Burden"}, {"authorId": "35793299", "name": "Se\u00e1n \u00d3 h\u00c9igeartaigh"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "82d9f1db6db43cb61fe4b0b26a489a2e72628675", "externalIds": {"ArXiv": "2206.12390", "DBLP": "journals/corr/abs-2206-12390", "DOI": "10.48550/arXiv.2206.12390", "CorpusId": 250048497}, "corpusId": 250048497, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82d9f1db6db43cb61fe4b0b26a489a2e72628675", "title": "A Test for Evaluating Performance in Human-Computer Systems", "abstract": "The Turing test for comparing computer performance to that of humans is well known, but, surprisingly, there is no widely used test for comparing how much better human-computer systems perform relative to humans alone, computers alone, or other baselines. Here, we show how to perform such a test using the ratio of means as a measure of effect size. Then we demonstrate the use of this test in three ways. First, in an analysis of 79 recently published experimental results, we \ufb01nd that, surprisingly, over half of the studies \ufb01nd a decrease in performance, the mean and median ratios of performance improvement are both approximately 1 (corresponding to no improvement at all), and the maximum ratio is 1.36 (a 36% improvement). Second, we experimentally investigate whether a higher performance improvement ratio is obtained when 100 human programmers generate software using GPT-3, a massive, state-of-the-art AI system. In this case, we \ufb01nd a speed improvement ratio of 1.27 (a 27% improvement). Finally, we \ufb01nd that 50 human non- programmers using GPT-3 can perform the task about as well as\u2013and less expensively than\u2013the human programmers. In this case, neither the non-programmers nor the computer would have been able to perform the task alone, so this is an example of a very strong form of human-computer synergy. stimulate competition among teams of computer and social scientists developing human-computer systems that perform far better than either people or computers alone. We believe this could bene\ufb01t our economy and society by fostering the development of software to augment humans rather than just replace them. And in the long run, it might also lead to creating \u201csuperintelligent\u201d human-computer systems.", "venue": "ArXiv", "year": 2022, "referenceCount": 79, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-24", "journal": {"volume": "abs/2206.12390", "name": "ArXiv"}, "authors": [{"authorId": "153604150", "name": "Andres Campero"}, {"authorId": "153024015", "name": "Michelle Vaccaro"}, {"authorId": "21524995", "name": "Jaeyoon Song"}, {"authorId": "2075349702", "name": "Haoran Wen"}, {"authorId": "3085084", "name": "Abdullah Almaatouq"}, {"authorId": "145850249", "name": "T. Malone"}]}, {"paperId": "08c7bb120cacb4365e23371984956aec952811f2", "externalIds": {"PubMedCentral": "9260143", "DOI": "10.3389/fncom.2022.892354", "CorpusId": 250006009, "PubMed": "35814345"}, "corpusId": 250006009, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/08c7bb120cacb4365e23371984956aec952811f2", "title": "Augmenting Human Selves Through Artificial Agents \u2013 Lessons From the Brain", "abstract": "Much of current artificial intelligence (AI) and the drive toward artificial general intelligence (AGI) focuses on developing machines for functional tasks that humans accomplish. These may be narrowly specified tasks as in AI, or more general tasks as in AGI \u2013 but typically these tasks do not target higher-level human cognitive abilities, such as consciousness or morality; these are left to the realm of so-called \u201cstrong AI\u201d or \u201cartificial consciousness.\u201d In this paper, we focus on how a machine can augment humans rather than do what they do, and we extend this beyond AGI-style tasks to augmenting peculiarly personal human capacities, such as wellbeing and morality. We base this proposal on associating such capacities with the \u201cself,\u201d which we define as the \u201cenvironment-agent nexus\u201d; namely, a fine-tuned interaction of brain with environment in all its relevant variables. We consider richly adaptive architectures that have the potential to implement this interaction by taking lessons from the brain. In particular, we suggest conjoining the free energy principle (FEP) with the dynamic temporo-spatial (TSD) view of neuro-mental processes. Our proposed integration of FEP and TSD \u2013 in the implementation of artificial agents \u2013 offers a novel, expressive, and explainable way for artificial agents to adapt to different environmental contexts. The targeted applications are broad: from adaptive intelligence augmenting agents (IA\u2019s) that assist psychiatric self-regulation to environmental disaster prediction and personal assistants. This reflects the central role of the mind and moral decision-making in most of what we do as humans.", "venue": "Frontiers in Computational Neuroscience", "year": 2022, "referenceCount": 149, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fncom.2022.892354/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-23", "journal": {"volume": "16", "name": "Frontiers in Computational Neuroscience"}, "authors": [{"authorId": "144296359", "name": "G. Northoff"}, {"authorId": "4479459", "name": "M. Fraser"}, {"authorId": "144525585", "name": "John Griffiths"}, {"authorId": "1872364", "name": "D. Pinotsis"}, {"authorId": "1784317", "name": "P. Panangaden"}, {"authorId": "39116315", "name": "R. Moran"}, {"authorId": "70438543", "name": "K. Friston"}]}, {"paperId": "228b535c67ada9f39b49593e97d6f20e8bbfcd20", "externalIds": {"PubMedCentral": "9208549", "DOI": "10.1038/s41578-022-00450-z", "CorpusId": 249873711, "PubMed": "35757102"}, "corpusId": 249873711, "publicationVenue": {"id": "722543dd-21f3-4b3c-941b-1045b173ec51", "name": "Nature Reviews Materials", "type": "journal", "alternate_names": ["Nat Rev Mater"], "issn": "2058-8437", "url": "http://www.nature.com/natrevmats/"}, "url": "https://www.semanticscholar.org/paper/228b535c67ada9f39b49593e97d6f20e8bbfcd20", "title": "Responsive materials architected in space and time", "abstract": null, "venue": "Nature Reviews Materials", "year": 2022, "referenceCount": 211, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s41578-022-00450-z.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-20", "journal": {"volume": "7", "pages": "683 - 701", "name": "Nature Reviews. Materials"}, "authors": [{"authorId": "46393090", "name": "X. Xia"}, {"authorId": "5162751", "name": "C. Spadaccini"}, {"authorId": "4380310", "name": "J. Greer"}]}, {"paperId": "b577c1a8c5601a6ac8eeec481688dbb2ccd798c3", "externalIds": {"DOI": "10.54517/wt.v2i1.1667", "CorpusId": 251477852}, "corpusId": 251477852, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b577c1a8c5601a6ac8eeec481688dbb2ccd798c3", "title": "Mobility aids for visually impaired persons: Journals reviewed", "abstract": "This paper reviews the literature on mobile assistive devices for visual impaired people, in order to have a clear understanding of the technology and technological progress of helping visual impaired people. In this way, it aims to obtain basic guidelines for analyzing the most relevant equipment to help people with impaired vision and highlight the improvements that can be achieved. The most common device is to integrate different sensors and electronic components into the walking stick to improve their obstacle detection ability. In addition, equipment with cameras, including computer vision algorithms and artificial intelligence technology, has been developed to improve the performance and efficiency of the equipment. Finally, the basic characteristics of the auxiliary system are introduced, and it is found that there is no equipment to meet the needs of users.", "venue": "Wearable Technology", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-06-16", "journal": {"name": "Wearable Technology"}, "authors": [{"authorId": "2181152750", "name": "Ahmed Alejandro Cardona Mesa"}, {"authorId": "2181152747", "name": "Ruben Dario Vasquez Salazar"}]}, {"paperId": "5de1970245eff7d2b5b6c914b5ba96df8f67aa1a", "externalIds": {"DBLP": "conf/ACMdis/KimJL22", "DOI": "10.1145/3532106.3533528", "CorpusId": 249579012}, "corpusId": 249579012, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5de1970245eff7d2b5b6c914b5ba96df8f67aa1a", "title": "Understanding the Negative Aspects of User Experience in Human-likeness of Voice-based Conversational Agents", "abstract": "With advances in artificial intelligence technology, Voice-based Conversational Agents (VCAs) can now imitate human abilities, sometimes almost indistinguishably from humans. However, concerns have been raised that too much perceived similarity can trigger threats and fears among users. This raises a question: Should VCAs be able to imitate humans perfectly? To address this, we explored what influences the negative aspects of user experience in human-like VCAs. We conducted a qualitative exploratory study to elicit participants\u2019 perceptions and feelings of human-like VCAs through comparable video prototypes of human\u2013agent conversation and human\u2013human conversation. We discovered that the dialogues of the human-likeness outside of the expressed purpose of a VCA and expressions pretending to come from a human identity could lead to negative experiences with VCAs. Based on our findings, we discussed design directions for overcoming potential issues of human imitation.", "venue": "Conference on Designing Interactive Systems", "year": 2022, "referenceCount": 78, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2022-06-13", "journal": {"name": "Designing Interactive Systems Conference"}, "authors": [{"authorId": "2155255349", "name": "Hye-youn Kim"}, {"authorId": "2115760976", "name": "Inchan Jung"}, {"authorId": "1722498", "name": "Youn-kyung Lim"}]}, {"paperId": "c1e9ba0f36cf9ab8c52106b2d75036221545a74b", "externalIds": {"DOI": "10.34190/eccws.21.1.510", "CorpusId": 249615287}, "corpusId": 249615287, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c1e9ba0f36cf9ab8c52106b2d75036221545a74b", "title": "Reith, Russell, and the Robots: AI, Warfare, and Shaping the Debate", "abstract": "On December 8th, 2021, Professor Stuart Russell delivered the second of that year\u2019s Reith Lectures, presented under the banner title \u2018Living With Artificial Intelligence\u2019. This specific talk dealt with \u2018The Future Role of AI in Warfare\u2019, and in this paper I propose a reading of Russell\u2019s address which both summarises and critiques his argument and stance, to determine what, if anything, can be taken from his position as effectively a public philosopher and applied in the realm of modern warfare, where ethical questions are taken from the seminar room and enacted in battlespace. The Reith lectures occupy a unique place in public discourse; given each year by a leading figure in the field under discussion, they help to shape opinion and debate. In considering the role of AI, and in particular its deployment in combat, there is undoubtedly a need for multi- and transdisciplinary thought, but the choice of Russell as the lecturer is not unproblematic. He is undoubtedly an expert in the field of AI, but he has no direct experience of working with the military, and is clearly not a neutral witness. He has been a leading figure in the campaign to ban research into autonomous weapon systems, and was closely involved in the production of Slaughterbots, a short film which presents a nightmare vision of swarming drones as agents of political repression. There are deep and serious questions to be asked about the role of AI in warfare, but Russell\u2019s position that we must stop all research in the field is arguably na\u00efve. Our adversaries will surely not be as punctilious. At the heart of the debate lie complex issues concerning human agency and control (and \u2018control\u2019 lies at the etymological root of \u2018cyber\u2019); this paper will use Russell\u2019s lecture as a starting point for the consideration of how we might develop an ethical doctrine for the use of AI, resting on the idea of human-machine teaming. It will, in short, argue for a cybernetic solution to the problems of cyber warfare.", "venue": "European Conference on Cyber Warfare and Security", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://papers.academic-conferences.org/index.php/eccws/article/download/510/394", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-06-10", "journal": {"name": "European Conference on Cyber Warfare and Security"}, "authors": [{"authorId": "143774639", "name": "K. Scott"}]}, {"paperId": "84d52ae7494077907185e036e8f9578b6071dd73", "externalIds": {"DOI": "10.1117/12.2636723", "CorpusId": 249590562}, "corpusId": 249590562, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/84d52ae7494077907185e036e8f9578b6071dd73", "title": "The impact of learning rate and data size on CNN for skin cancer detection", "abstract": "Skin cancer is one of the diseases which affect large population in the world. Artificial Intelligence (AI) has been introduced in skin cancer diagnosis in decades. The convolutional neural networks (CNNs) is a deep learning technology used in image classification for skin cancer diagnosis. The study in this article explores show data size and learning rate influence the accuracy of the CNN model. In the study, the best validation accuracy of the CNN model can reach 92.05%. The result shows that the CNN model can effectively diagnose skin cancer with the adjusted learning rate and data size.", "venue": "Other Conferences", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-06-10", "journal": {"volume": "12179", "pages": "1217908 - 1217908-7"}, "authors": [{"authorId": "2170117850", "name": "Jingwen Pan"}]}, {"paperId": "f070418bce9045336c7486fcf7fc390f0ca2ea44", "externalIds": {"DBLP": "journals/jcal/PhamS22", "DOI": "10.1111/jcal.12687", "CorpusId": 249560206}, "corpusId": 249560206, "publicationVenue": {"id": "2d5e093c-6946-4495-ab7e-c7b814a1730d", "name": "Journal of Computer Assisted Learning", "type": "journal", "alternate_names": ["J Comput Assist Learn"], "issn": "0266-4909", "url": "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1365-2729", "alternate_urls": ["https://onlinelibrary.wiley.com/journal/13652729"]}, "url": "https://www.semanticscholar.org/paper/f070418bce9045336c7486fcf7fc390f0ca2ea44", "title": "The development of artificial intelligence in education: A review in context", "abstract": null, "venue": "Journal of Computer Assisted Learning", "year": 2022, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-06-08", "journal": {"volume": "38", "pages": "1408-1421", "name": "J. Comput. Assist. Learn."}, "authors": [{"authorId": "2066323655", "name": "Son Pham"}, {"authorId": "2073958193", "name": "P. Sampson"}]}, {"paperId": "7b996086ad1ef92ed98ce734a329c51e0aab3e24", "externalIds": {"ArXiv": "2206.01583", "DBLP": "journals/corr/abs-2206-01583", "DOI": "10.48550/arXiv.2206.01583", "CorpusId": 249375501}, "corpusId": 249375501, "publicationVenue": {"id": "14c9aa06-d077-45eb-b51f-0376a780741f", "name": "Computational Linguistics and Intellectual Technologies", "alternate_names": ["Comput Linguistics Intellect Technol"], "issn": "2075-7182", "alternate_issns": ["2221-7932"]}, "url": "https://www.semanticscholar.org/paper/7b996086ad1ef92ed98ce734a329c51e0aab3e24", "title": "Findings of the The RuATD Shared Task 2022 on Artificial Text Detection in Russian", "abstract": "We present the shared task on artificial text detection in Russian, which is organized as a part of the Dialogue Evaluation initiative, held in 2022. The shared task dataset includes texts from 14 text generators, i.e., one human writer and 13 text generative models fine-tuned for one or more of the following generation tasks: machine translation, paraphrase generation, text summarization, text simplification. We also consider back-translation and zero-shot generation approaches. The human-written texts are collected from publicly available resources across multiple domains. The shared task consists of two sub-tasks: (i) to determine if a given text is automatically generated or written by a human; (ii) to identify the author of a given text. The first task is framed as a binary classification problem. The second task is a multi-class classification problem. We provide count-based and BERT-based baselines, along with the human evaluation on the first sub-task. A total of 30 and 8 systems have been submitted to the binary and multi-class sub-tasks, correspondingly. Most teams outperform the baselines by a wide margin. We publicly release our codebase, human evaluation results, and other materials in our GitHub repository.", "venue": "Computational Linguistics and Intellectual Technologies", "year": 2022, "referenceCount": 58, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-03", "journal": {"volume": "abs/2206.01583", "name": "ArXiv"}, "authors": [{"authorId": "148240197", "name": "T. Shamardina"}, {"authorId": "51259225", "name": "V. Mikhailov"}, {"authorId": "2168096619", "name": "Daniil Chernianskii"}, {"authorId": "10054744", "name": "Alena Fenogenova"}, {"authorId": "2168096594", "name": "Marat Saidov"}, {"authorId": "2168101608", "name": "A. Valeeva"}, {"authorId": "21159845", "name": "Tatiana Shavrina"}, {"authorId": "120272188", "name": "I. Smurov"}, {"authorId": "2141764359", "name": "Elena Tutubalina"}, {"authorId": "13033978", "name": "E. Artemova"}]}, {"paperId": "c6641a3d8e0cc29ff96bcbc4d5f12a124557d65a", "externalIds": {"DOI": "10.1177/10946705221103531", "CorpusId": 249359545}, "corpusId": 249359545, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6641a3d8e0cc29ff96bcbc4d5f12a124557d65a", "title": "Conscious Empathic AI in Service", "abstract": "Recent advances in artificial intelligence (AI) have achieved human-scale speed and accuracy for classification tasks. Current systems do not need to be conscious to recognize patterns and classify them. However, for AI to advance to the next level, it needs to develop capabilities such as metathinking, creativity, and empathy. We contend that such a paradigm shift is possible through a fundamental change in the state of artificial intelligence toward consciousness, similar to what took place for humans through the process of natural selection and evolution. To that end, we propose that consciousness in AI is an emergent phenomenon that primordially appears when two machines cocreate their own language through which they can recall and communicate their internal state of time-varying symbol manipulation. Because, in our view, consciousness arises from the communication of inner states, it leads to empathy. We then provide a link between the empathic quality of machines and better service outcomes associated with empathic human agents that can also lead to accountability in AI services. Graphical Abstract", "venue": "Journal of Service Research", "year": 2022, "referenceCount": 136, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-03", "journal": {"volume": "25", "pages": "549 - 564", "name": "Journal of Service Research"}, "authors": [{"authorId": "1696563", "name": "H. Esmaeilzadeh"}, {"authorId": "2129191", "name": "R. Vaezi"}]}, {"paperId": "6c3ea5bb20d86f107b3005482bbeb6b54ccd8eb8", "externalIds": {"PubMedCentral": "9204052", "DOI": "10.3389/fpsyg.2022.819042", "CorpusId": 249284119, "PubMed": "35719586"}, "corpusId": 249284119, "publicationVenue": {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, "url": "https://www.semanticscholar.org/paper/6c3ea5bb20d86f107b3005482bbeb6b54ccd8eb8", "title": "Going Beyond the \u201cSynthetic Method\u201d: New Paradigms Cross-Fertilizing Robotics and Cognitive Neuroscience", "abstract": "In so-called ethorobotics and robot-supported social cognitive neurosciences, robots are used as scientific tools to study animal behavior and cognition. Building on previous epistemological analyses of biorobotics, in this article it is argued that these two research fields, widely differing from one another in the kinds of robots involved and in the research questions addressed, share a common methodology, which significantly differs from the \u201csynthetic method\u201d that, until recently, dominated biorobotics. The methodological novelty of this strategy, the research opportunities that it opens, and the theoretical and technological challenges that it gives rise to, will be discussed with reference to the peculiarities of the two research fields. Some broad methodological issues related to the generalization of results concerning robot-animal interaction to theoretical conclusions on animal-animal interaction will be identified and discussed.", "venue": "Frontiers in Psychology", "year": 2022, "referenceCount": 76, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fpsyg.2022.819042/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-03", "journal": {"volume": "13", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "3133425", "name": "E. Datteri"}, {"authorId": "1728769", "name": "T. Chaminade"}, {"authorId": "2055734634", "name": "Donato Romano"}]}, {"paperId": "665693d7fd06545e68ec746a42efccceff40fc0f", "externalIds": {"DOI": "10.1055/a-1718-8846", "CorpusId": 249326970}, "corpusId": 249326970, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/665693d7fd06545e68ec746a42efccceff40fc0f", "title": "K\u00fcnstliche Intelligenz in der Radiologie", "abstract": "Die klinische Radiologie mit ihren digitalen Daten ist geradezu pr\u00e4destiniert f\u00fcr den erfolgreichen Einsatz der k\u00fcnstlichen Intelligenz (KI). Am Beispiel verschiedener praktischer\n Anwendungen wird nachfolgend dargestellt, wo und wie die KI in der Radiologie eingesetzt wird und dabei auch die Frage beantwortet, inwieweit sie Radiolog*innen ersetzen kann.", "venue": "Radiologie up2date", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-06-01", "journal": {"name": "Radiologie up2date"}, "authors": [{"authorId": "151120822", "name": "M. Kromrey"}, {"authorId": "2167811765", "name": "Sascha Grothe"}, {"authorId": "2073890146", "name": "C. Nell"}, {"authorId": "2071431220", "name": "B. Rosenberg"}]}, {"paperId": "5da1b0c659c0c6abbfba241430c1830344791c59", "externalIds": {"DBLP": "journals/alife/GaborIZLMBL22", "DOI": "10.1162/artl_a_00359", "CorpusId": 250118132}, "corpusId": 250118132, "publicationVenue": {"id": "5ed9f470-65a3-4077-8dab-163b0c5cb9e6", "name": "Artificial Life", "type": "journal", "alternate_names": ["Artif Life"], "issn": "1064-5462", "url": "http://cognet.mit.edu/library/journals/journal?issn=10645462", "alternate_urls": ["http://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/doi/10.1162/ARTL_a_00243"]}, "url": "https://www.semanticscholar.org/paper/5da1b0c659c0c6abbfba241430c1830344791c59", "title": "Self-Replication in Neural Networks", "abstract": "Abstract A key element of biological structures is self-replication. Neural networks are the prime structure used for the emergent construction of complex behavior in computers. We analyze how various network types lend themselves to self-replication. Backpropagation turns out to be the natural way to navigate the space of network weights and allows non-trivial self-replicators to arise naturally. We perform an in-depth analysis to show the self-replicators\u2019 robustness to noise. We then introduce artificial chemistry environments consisting of several neural networks and examine their emergent behavior. In extension to this work\u2019s previous version (Gabor et al., 2019), we provide an extensive analysis of the occurrence of fixpoint weight configurations within the weight space and an approximation of their respective attractor basins.", "venue": "Artificial Life", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/artl/article-pdf/28/2/205/2032777/artl_a_00359.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-01", "journal": {"volume": "28", "pages": "205-223", "name": "Artificial Life"}, "authors": [{"authorId": "1599420389", "name": "Thomas Gabor"}, {"authorId": "51893497", "name": "Steffen Illium"}, {"authorId": "2122346529", "name": "Maximilian Zorn"}, {"authorId": "2174063860", "name": "Cristian Lenta"}, {"authorId": "38928863", "name": "Andy Mattausch"}, {"authorId": "1841968", "name": "Lenz Belzner"}, {"authorId": "1402371578", "name": "C. Linnhoff-Popien"}]}, {"paperId": "c9fb788bdbf0d5d449e4c9f344cd9575bb39c367", "externalIds": {"DBLP": "journals/entropy/0001L22", "PubMedCentral": "9222757", "DOI": "10.3390/e24060819", "CorpusId": 249634376, "PubMed": "35741540"}, "corpusId": 249634376, "publicationVenue": {"id": "8270cfe1-3713-4325-a7bd-c6a87eed889e", "name": "Entropy", "type": "journal", "issn": "1099-4300", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-155606", "alternate_urls": ["http://www.mdpi.com/journal/entropy/", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-155606", "https://www.mdpi.com/journal/entropy"]}, "url": "https://www.semanticscholar.org/paper/c9fb788bdbf0d5d449e4c9f344cd9575bb39c367", "title": "Competency in Navigating Arbitrary Spaces as an Invariant for Analyzing Cognition in Diverse Embodiments", "abstract": "One of the most salient features of life is its capacity to handle novelty and namely to thrive and adapt to new circumstances and changes in both the environment and internal components. An understanding of this capacity is central to several fields: the evolution of form and function, the design of effective strategies for biomedicine, and the creation of novel life forms via chimeric and bioengineering technologies. Here, we review instructive examples of living organisms solving diverse problems and propose competent navigation in arbitrary spaces as an invariant for thinking about the scaling of cognition during evolution. We argue that our innate capacity to recognize agency and intelligence in unfamiliar guises lags far behind our ability to detect it in familiar behavioral contexts. The multi-scale competency of life is essential to adaptive function, potentiating evolution and providing strategies for top-down control (not micromanagement) to address complex disease and injury. We propose an observer-focused viewpoint that is agnostic about scale and implementation, illustrating how evolution pivoted similar strategies to explore and exploit metabolic, transcriptional, morphological, and finally 3D motion spaces. By generalizing the concept of behavior, we gain novel perspectives on evolution, strategies for system-level biomedical interventions, and the construction of bioengineered intelligences. This framework is a first step toward relating to intelligence in highly unfamiliar embodiments, which will be essential for progress in artificial intelligence and regenerative medicine and for thriving in a world increasingly populated by synthetic, bio-robotic, and hybrid beings.", "venue": "Entropy", "year": 2022, "referenceCount": 251, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1099-4300/24/6/819/pdf?version=1655801162", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-06-01", "journal": {"volume": "24", "name": "Entropy"}, "authors": [{"authorId": "144993883", "name": "C. Fields"}, {"authorId": "2070083615", "name": "M. Levin"}]}, {"paperId": "3393331480eeb0d0acf81e06b35a7d4722e87c1a", "externalIds": {"PubMedCentral": "9240685", "DOI": "10.1098/rsif.2022.0214", "CorpusId": 247382247, "PubMed": "35765805"}, "corpusId": 247382247, "publicationVenue": {"id": "f6537e0e-c3a9-4de5-bd36-19eda0434065", "name": "Journal of the Royal Society Interface", "type": "journal", "alternate_names": ["J R Soc Interface"], "issn": "1742-5662", "url": "http://rsif.royalsocietypublishing.org/"}, "url": "https://www.semanticscholar.org/paper/3393331480eeb0d0acf81e06b35a7d4722e87c1a", "title": "May the 4C's be with you: an overview of complexity-inspired frameworks for analysing resting-state neuroimaging data", "abstract": "Competing and complementary models of resting-state brain dynamics contribute to our phenomenological and mechanistic understanding of whole-brain coordination and communication, and provide potential evidence for differential brain functioning associated with normal and pathological behaviour. These neuroscientific theories stem from the perspectives of physics, engineering, mathematics and psychology and create a complicated landscape of domain-specific terminology and meaning, which, when used outside of that domain, may lead to incorrect assumptions and conclusions within the neuroscience community. Here, we review and clarify the key concepts of connectivity, computation, criticality and coherence\u2014the 4C's\u2014and outline a potential role for metastability as a common denominator across these propositions. We analyse and synthesize whole-brain neuroimaging research, examined through functional magnetic imaging, to demonstrate that complexity science offers a principled and integrated approach to describe, and potentially understand, macroscale spontaneous brain functioning.", "venue": "Journal of the Royal Society Interface", "year": 2022, "referenceCount": 182, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-01", "journal": {"volume": "19", "name": "Journal of the Royal Society Interface"}, "authors": [{"authorId": "2150793311", "name": "F. Hancock"}, {"authorId": "2333161", "name": "Fernando E. Rosas"}, {"authorId": "7486237", "name": "P. Mediano"}, {"authorId": "1380744267", "name": "A. Luppi"}, {"authorId": "2149249638", "name": "J. Cabral"}, {"authorId": "7013131", "name": "O. Dipasquale"}, {"authorId": "1691067", "name": "F. Turkheimer"}]}, {"paperId": "11624c026132e37c8909bd2eef6139af613e7e30", "externalIds": {"DOI": "10.1007/s11229-022-03695-x", "CorpusId": 249260212}, "corpusId": 249260212, "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, "url": "https://www.semanticscholar.org/paper/11624c026132e37c8909bd2eef6139af613e7e30", "title": "Panpsychism and AI consciousness", "abstract": null, "venue": "Synthese", "year": 2022, "referenceCount": 63, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://philpapers.org/archive/ARVPAA.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-05-31", "journal": {"volume": "200", "name": "Synthese"}, "authors": [{"authorId": "37802891", "name": "Marcus Arvan"}, {"authorId": "3030854", "name": "Corey J. Maley"}]}, {"paperId": "653ef7ab22217cfe74015157200a8dd31152f339", "externalIds": {"PubMedCentral": "9194558", "DOI": "10.3389/fnbot.2022.728829", "CorpusId": 249183566, "PubMed": "35711283"}, "corpusId": 249183566, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/653ef7ab22217cfe74015157200a8dd31152f339", "title": "Is It Necessary to Integrate Evo-Devo to the Analysis and Construction of Artificial Emotional Systems?", "abstract": null, "venue": "Frontiers in Neurorobotics", "year": 2022, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fnbot.2022.728829/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-31", "journal": {"volume": "16", "name": "Frontiers in Neurorobotics"}, "authors": [{"authorId": "2166989334", "name": "Jorge Luis Hern\u00e1ndez-Ochoa"}, {"authorId": "1398581101", "name": "F. Vergara-Silva"}]}, {"paperId": "ba066efae508e79fb34984c50311f53f64be6284", "externalIds": {"DOI": "10.1109/COMSCI55378.2022.9912577", "CorpusId": 252849476}, "corpusId": 252849476, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba066efae508e79fb34984c50311f53f64be6284", "title": "Evolution of the Concept of Self-Organization by the Founding Fathers of A.I.", "abstract": "The paper makes a literature overview of the classic concepts of the founding fathers of artificial intelligence, in an attempt to prove the bigger potential of self-organization over machine learning as a method to achieve really autonomous decision-making methods.", "venue": "2022 10th International Scientific Conference on Computer Science (COMSCI)", "year": 2022, "referenceCount": 26, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2022-05-30", "journal": {"pages": "1-7", "name": "2022 10th International Scientific Conference on Computer Science (COMSCI)"}, "authors": [{"authorId": "38716791", "name": "A. Marchev"}, {"authorId": "2187592469", "name": "Milena Piryankova"}]}, {"paperId": "7cc18a9edbd41adf21023be826bd9f5f9fa26af6", "externalIds": {"DOI": "10.4467/20843976zk.22.003.15869", "CorpusId": 252502039}, "corpusId": 252502039, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7cc18a9edbd41adf21023be826bd9f5f9fa26af6", "title": "Zaawansowane procedury NLP jako przes\u0142anka rekonstrukcji idei wiedzy", "abstract": "Advanced NLP Procedures as Premises for the Reconstruction of the Idea of Knowledge\n\nThe article presents the current state of development of the Natural Language Processing (NLP) technology, in particular the GPT-3 language model, and presents its consequences for understanding the phenomenon of knowledge. The NLP technology has been experiencing remarkable development recently. The GPT-3 language model presents a level of advancement that allows it to generate texts as answers to general questions, as summaries of the presented text, etc., which reach the level surpassing the analogous level of human texts. These algorithmic operations lead to the determination of the probability distribution of its components. Texts generated by such a model should be considered as autonomous texts, using immanent, implicit knowledge embedded in language. This conclusion raises questions about the status of such knowledge. Help in the analysis is provided also by the theory of discourse, as well as the theory of discursive space based on it, that proposes the interpretation of knowledge as a trajectory of discourses in a dynamical space. Recognizing that knowledge may also be autonomous, and in particular not be at the exclusive disposal of humans, leads to the question of the status of artificial cognitive agents, such as the GPT-3 language model.", "venue": "Zarz\u0105dzanie w Kulturze", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-30", "journal": {"name": "Zarz\u0105dzanie w Kulturze"}, "authors": [{"authorId": "10712104", "name": "R. Maci\u0105g"}]}, {"paperId": "1cad9f8d14a92549594f8e1ec048ac9d079bb9fd", "externalIds": {"DOI": "10.3390/philosophies7030057", "CorpusId": 249217491}, "corpusId": 249217491, "publicationVenue": {"id": "ef4fb77f-61b5-4988-8f50-738b45be5d7e", "name": "Philosophies", "type": "journal", "issn": "0766-1398", "alternate_issns": ["2409-9287"], "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-691408", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-691408", "https://www.mdpi.com/journal/philosophies"]}, "url": "https://www.semanticscholar.org/paper/1cad9f8d14a92549594f8e1ec048ac9d079bb9fd", "title": "From Turing to Conscious Machines", "abstract": "In the period between Turing\u2019s 1950 \u201cComputing Machinery and Intelligence\u201d and the current considerable public exposure to the term \u201cartificial intelligence (AI)\u201d, Turing\u2019s question \u201cCan a machine think?\u201d has become a topic of daily debate in the media, the home, and, indeed, the pub. However, \u201cCan a machine think?\u201d is sliding towards a more controversial issue: \u201cCan a machine be conscious?\u201d Of course, the two issues are linked. It is held here that consciousness is a pre-requisite to thought. In Turing\u2019s imitation game, a conscious human player is replaced by a machine, which, in the first place, is assumed not to be conscious, and which may fool an interlocutor, as consciousness cannot be perceived from an individual\u2019s speech or action. Here, the developing paradigm of machine consciousness is examined and combined with an extant analysis of living consciousness to argue that a conscious machine is feasible, and capable of thinking. The route to this utilizes learning in a \u201cneural state machine\u201d, which brings into play Turing\u2019s view of neural \u201cunorganized\u201d machines. The conclusion is that a machine of the \u201cunorganized\u201d kind could have an artificial form of consciousness that resembles the natural form and that throws some light on its nature.", "venue": "Philosophies", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/7/3/57/pdf?version=1653821639", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-29", "journal": {"name": "Philosophies"}, "authors": [{"authorId": "1699999", "name": "I. Aleksander"}]}, {"paperId": "7b8b180ce09b2e8298baca16015ea1dde574314a", "externalIds": {"DOI": "10.24018/ejbmr.2022.7.3.1432", "CorpusId": 249217793}, "corpusId": 249217793, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7b8b180ce09b2e8298baca16015ea1dde574314a", "title": "Artificial Intelligence in Construction Projects: An Explorative Study of Professionals\u2019 Expectations", "abstract": "have a huge impact on projects and project management practices in the forthcoming years. The purpose of this paper is to contribute to project management theory and practice in the construction industry by analyzing the expectations of project professionals. A mixed method based on an international survey and semi-structured interviews was applied. The results show that construction project practitioners are looking for AI solutions to support the quantitative processes mainly related to scope, schedule, cost, quality, and risk management. However, the human-related processes, such as communication and stakeholder management, are not expected to be directly enhanced by AI, although might benefit from it indirectly. The findings also demonstrate a difference between amplifying and accelerating countries, where somewhat surprisingly the latter are more ready to adopt AI in their projects.", "venue": "European Journal of Business and Management Research", "year": 2022, "referenceCount": 127, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ejbmr.org/index.php/ejbmr/article/download/1432/792", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-05-28", "journal": {"name": "European Journal of Business and Management Research"}, "authors": [{"authorId": "90220793", "name": "Vered Holzmann"}, {"authorId": "2167191576", "name": "Michele Lechiara"}]}, {"paperId": "50902395c5fab923f833cdc97d4da40d1888e398", "externalIds": {"PubMedCentral": "9167026", "DOI": "10.1155/2022/2169521", "CorpusId": 249372070, "PubMed": "35669659"}, "corpusId": 249372070, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/50902395c5fab923f833cdc97d4da40d1888e398", "title": "Application of Artificial Intelligence System Based on Wireless Sensor Network in Enterprise Management", "abstract": "With the improvement of the ability to acquire natural information, wireless sensor networks also need to transmit corresponding information in terms of collecting information. Wireless sensor nodes have great application prospects as a key component of wireless sensors. Therefore, different wireless sensors play an important decisive role in the operation of wireless network applications. With the continuous development of wireless sensor networks, existing wireless sensor network nodes exhibit limitations and shortcomings such as inflexible structure, low variability, and low versatility. Specifically, the learning and neural networks obtained by different artificial intelligence expert systems in computing technology are different. On the one hand, it can meet the needs of users for information systems to a certain extent, and on the other hand, it can also help accelerate the development of computer science. At present, the new generation of information technology industry is listed in the seven emerging strategic industries of the country. The new cloud computing technology has gradually expanded to important corporate governance capabilities in terms of information technology. The intelligent application of cloud computing technology replaces traditional enterprise management technology. Efficiency management and risk management can improve the quality and business capabilities of the entire enterprise, improve system applications according to the actual situation of the enterprise, improve system applications, and implement health and the sustainable development of the enterprise, thereby promoting the sustainable development of the computer technology industry.", "venue": "Computational intelligence and neuroscience", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/cin/2022/2169521.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-27", "journal": {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, "authors": [{"authorId": "2149140570", "name": "Kefeng Li"}]}, {"paperId": "b0f96566dc80ae46f69c4d606686e19a88347d52", "externalIds": {"ArXiv": "2205.13131", "DBLP": "journals/corr/abs-2205-13131", "DOI": "10.48550/arXiv.2205.13131", "CorpusId": 249097666}, "corpusId": 249097666, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b0f96566dc80ae46f69c4d606686e19a88347d52", "title": "On the Evolution of A.I. and Machine Learning: Towards Measuring and Understanding Impact, Influence, and Leadership at Premier A.I. Conferences", "abstract": "Arti\ufb01cial Intelligence is now recognized as a general-purpose technology with ample impact on human life. In this work, we aim to understand the evolution of AI and Machine learning over the years by analyzing researchers\u2019 impact, in\ufb02uence, and leadership over the last decades. This work also intends to shed new light on the history and evolution of AI by exploring the dynamics involved in the \ufb01eld\u2019s evolution through the lenses of the papers published on AI conferences since the \ufb01rst International Joint Conference on Arti\ufb01cial Intelligence (IJCAI) in 1969. AI development and evolution have led to increasing research output, re\ufb02ected in the number of articles published over the last sixty years. We construct comprehensive citation-collaboration and paper-author datasets and compute corresponding centrality measures to carry out our analyses. These analyses allow a better understanding of how AI has reached its current state of affairs in research. Throughout the process, we correlate these datasets with the work of the ACM Turing Award winners and the so-called two AI winters the \ufb01eld has gone through. We also look at self-citation trends and new authors\u2019 behaviors. Finally, we present a novel way to infer the country of af\ufb01liation of a paper from its organization. Therefore, this work provides a deep analysis of Arti\ufb01cial Intelligence history from information gathered and analyzed from large technical venues datasets and suggests novel insights that can contribute to understanding and measuring AI\u2019s evolution.", "venue": "ArXiv", "year": 2022, "referenceCount": 150, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-26", "journal": {"volume": "abs/2205.13131", "name": "ArXiv"}, "authors": [{"authorId": "2105610568", "name": "Rafael B. Audibert"}, {"authorId": "2065162795", "name": "Henrique Lemos"}, {"authorId": "144862483", "name": "Pedro H. C. Avelar"}, {"authorId": "2226999", "name": "A. Tavares"}, {"authorId": "2335532", "name": "L. Lamb"}]}, {"paperId": "fa5c9c3cabacc1abc44a8ad1f1cef0fbae1f6067", "externalIds": {"DOI": "10.3390/app12115373", "CorpusId": 249117883}, "corpusId": 249117883, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fa5c9c3cabacc1abc44a8ad1f1cef0fbae1f6067", "title": "Chinese Named Entity Recognition Based on Knowledge Based Question Answering System", "abstract": "The KBQA (Knowledge-Based Question Answering) system is an essential part of the smart customer service system. KBQA is a type of QA (Question Answering) system based on KB (Knowledge Base). It aims to automatically answer natural language questions by retrieving structured data stored in the knowledge base. Generally, when a KBQA system receives the user\u2019s query, it first needs to recognize topic entities of the query, such as name, location, organization, etc. This process is the NER (Named Entity Recognition). In this paper, we use the Bidirectional Long Short-Term Memory-Conditional Random Field (Bi-LSTM-CRF) model and introduce the SoftLexicon method for a Chinese NER task. At the same time, according to the analysis of the characteristics of application scenario, we propose a fuzzy matching module based on the combination of multiple methods. This module can efficiently modify the error recognition results, which can further improve the performance of entity recognition. We combine the NER model and the fuzzy matching module into an NER system. To explore the availability of the system in some specific fields, such as a power grid field, we utilize the power grid-related original data collected by the Hebei Electric Power Company to improve our system according to the characteristics of data in the power grid field. We innovatively make the dataset and high-frequency word lexicon in the power grid field, which makes our proposed NER system perform better in recognizing entities in the field of power grid. We used the cross-validation method for validation. The experimental results show that the F1-score of the improved NER model on the power grid dataset reaches 92.43%. After processing the recognition results by using the fuzzy matching module, about 99% of the entities in the test set can be correctly recognized. It proves that the proposed NER system can achieve excellent performance in the application scenario of a power grid. The results of this work will also fill the gap in the research of intelligent customer-service-related technologies in the power grid field in China.", "venue": "Applied Sciences", "year": 2022, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-3417/12/11/5373/pdf?version=1653553228", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-26", "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "16075609", "name": "Didi Yin"}, {"authorId": "2125160755", "name": "Siyuan Cheng"}, {"authorId": "2149190829", "name": "Boxu Pan"}, {"authorId": "2166548040", "name": "Yuanyuan Qiao"}, {"authorId": "47748857", "name": "Wei Zhao"}, {"authorId": "2142655724", "name": "Dongyu Wang"}]}, {"paperId": "3f73e267744f98cffdea5550bcc950f6a928a120", "externalIds": {"DBLP": "journals/corr/abs-2205-12749", "ArXiv": "2205.12749", "DOI": "10.48550/arXiv.2205.12749", "CorpusId": 249063006}, "corpusId": 249063006, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f73e267744f98cffdea5550bcc950f6a928a120", "title": "A Human-Centric Assessment Framework for AI", "abstract": "With the rise of AI systems in real-world applications comes the need for reliable and trustworthy AI. An essential aspect of this are explainable AI systems. However, there is no agreed standard on how explainable AI systems should be assessed. Inspired by the Turing test, we introduce a human-centric assessment framework where a leading domain expert accepts or rejects the solutions of an AI system and another domain expert. By comparing the acceptance rates of provided solutions, we can assess how the AI system performs compared to the domain expert, and whether the AI system\u2019s explanations (if provided) are human-understandable. This setup\u2014comparable to the Turing test\u2014can serve as a framework for a wide range of human-centric AI system assessments. We demonstrate this by presenting two instantiations: (1) an assessment that measures the classi\ufb01cation accuracy of a system with the option to incorporate label uncertainties; (2) an assessment where the usefulness of provided explanations is determined in a human-centric manner.", "venue": "ArXiv", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-25", "journal": {"volume": "abs/2205.12749", "name": "ArXiv"}, "authors": [{"authorId": "3467930", "name": "S. Saralajew"}, {"authorId": "40515722", "name": "Ammar Shaker"}, {"authorId": "2166335112", "name": "Zhao Xu"}, {"authorId": "24868638", "name": "Kiril Gashteovski"}, {"authorId": "2105201", "name": "Bhushan Kotnis"}, {"authorId": "2166312218", "name": "Wiem Ben-Rim"}, {"authorId": "152845986", "name": "J\u00fcrgen Quittek"}, {"authorId": "19752252", "name": "Carolin (Haas) Lawrence"}]}, {"paperId": "ddeff568cda01b968e2b4564274931675e2acb81", "externalIds": {"DOI": "10.3390/proceedings2022081147", "CorpusId": 249112695}, "corpusId": 249112695, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ddeff568cda01b968e2b4564274931675e2acb81", "title": "Three Approaches to Artificial Intelligence", "abstract": ": The aim of this paper is the expansion of understanding what intelligence is, what is being performed in the area of AI and in which direction to move further in this area. To achieve these goals, the strati\ufb01ed componential model of intelligence in general and AI, in particular, is introduced and studied. Its application entails three approaches to the development of arti\ufb01cial intelligence.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2504-3900/81/1/147/pdf?version=1653549583", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-25", "journal": {"name": "The 2021 Summit of the International Society for the Study of Information"}, "authors": [{"authorId": "2073713180", "name": "M. Burgin"}]}, {"paperId": "a596e546e8a913d2121bf5dc9effc43631434d3b", "externalIds": {"DOI": "10.12688/digitaltwin.17574.1", "CorpusId": 249077431}, "corpusId": 249077431, "publicationVenue": {"id": "22d1db70-9ab0-44a4-ab3c-72560c6d550d", "name": "Digital Twin", "alternate_names": ["Digit Twin"], "issn": "2752-5783"}, "url": "https://www.semanticscholar.org/paper/a596e546e8a913d2121bf5dc9effc43631434d3b", "title": "Intelligent digital twins and the development and management of complex systems", "abstract": "The interest in defining and implementing Digital Twins (DT) is at the forefront of today\u2019s product organizations. The evolution of increasingly complex systems requires that their information be organized and managed via digital twins.\u00a0 In addition, the development of Artificial Intelligence (AI) will result in an increasing degree of system complexity. These complex systems will exhibit true emergent behavior as AIs modify system aspects as the result of goal seeking and learning. DTs will need to increase in capability, becoming intelligent in their approach. This article presents a discussion on how these Intelligent Digital Twins (IDTs) will evolve and assist in developing and managing complex systems.", "venue": "Digital Twin", "year": 2022, "referenceCount": 40, "citationCount": 6, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-25", "journal": {"name": "Digital Twin"}, "authors": [{"authorId": "2022322", "name": "Michael W. Grieves"}]}, {"paperId": "697aa30bd8d5e45b75b865a173b935612b8d6c84", "externalIds": {"PubMedCentral": "9590390", "DOI": "10.1007/s43681-022-00227-8", "CorpusId": 249133416, "PubMed": "36313215"}, "corpusId": 249133416, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/697aa30bd8d5e45b75b865a173b935612b8d6c84", "title": "Turing test-inspired method for analysis of biases prevalent in artificial intelligence-based medical imaging", "abstract": null, "venue": "bioRxiv", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-022-00227-8.pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-24", "journal": {"pages": "1 - 9", "name": "Ai and Ethics"}, "authors": [{"authorId": "2906509", "name": "Subarna Tripathi"}, {"authorId": "2162467767", "name": "A. Augustin"}, {"authorId": "4318566", "name": "F. Dako"}, {"authorId": "2117008145", "name": "Edward Kim"}]}, {"paperId": "fcad037a73ef85653153cb8c6d683145c4d60391", "externalIds": {"PubMedCentral": "9191771", "DOI": "10.1073/pnas.2205971119", "CorpusId": 249045365, "PubMed": "35609191"}, "corpusId": 249045365, "publicationVenue": {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the National Academy of Sciences of the United States of America", "type": "journal", "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, "url": "https://www.semanticscholar.org/paper/fcad037a73ef85653153cb8c6d683145c4d60391", "title": "A blueprint for conscious machines", "abstract": "Although it has been the subject of human thought for many centuries, consciousness remains a mysterious and controversial topic. Every one of us is overly familiar with the phenomenon, but there is little agreement on what it is, what it entails, and how it is created. Certainly, no other phenomenon is simultaneously so familiar and so hard to explain. Researchers from fields as different as medicine, philosophy, psychology, neurobiology, and computer science have tried for centuries to frame, describe, and address the mind\u2013body problem\u2014how consciousness arises from purely physical processes\u2014but success has been, to say the least, limited. Many believe that it is a phenomenon that will remain, forever, unknowable, outside the reach of human understanding. David Chalmers (1) famously argued that, while we may advance in our understanding of the different physical processes that are associated with consciousness (the easy problems), we will never be able to understand the process that leads to subjective experiences (the hard problem), since understanding this phenomenon represents a challenge of an entirely different nature. Other theories, such as mysterianism, defend that, while the phenomenon may be understandable in principle, it will never be accessible to the human mind (2), due to intrinsic limitations of the human brain. Despite these difficulties, many scientists and philosophers have advanced tentative explanations for the phenomenon (3\u20135), and proposed ways to assess it (6), measure it (7), create it in machines (8), and even use it to improve the performance of artificial intelligence systems (9). The paper by Blum and Blum (10), in PNAS, approaches the problem from an engineering perspective, by showing how a specific computational architecture, which they have proposed (11), can explain several phenomena that are closely related to consciousness.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-24", "journal": {"volume": "119", "name": "Proceedings of the National Academy of Sciences of the United States of America"}, "authors": [{"authorId": "1706641", "name": "Arlindo L. Oliveira"}]}, {"paperId": "447a0c8367dee5becac1cf08f0a094f3d375709a", "externalIds": {"DOI": "10.1038/s41570-022-00391-9", "CorpusId": 248991745}, "corpusId": 248991745, "publicationVenue": {"id": "edf218ab-5799-4f63-92db-e9bb3f362834", "name": "Nature Reviews Chemistry", "alternate_names": ["Nat Rev Chem"], "issn": "2397-3358", "url": "http://www.nature.com/natrevchem/"}, "url": "https://www.semanticscholar.org/paper/447a0c8367dee5becac1cf08f0a094f3d375709a", "title": "Evaluation guidelines for machine learning tools in the chemical sciences", "abstract": null, "venue": "Nature Reviews Chemistry", "year": 2022, "referenceCount": 164, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-05-24", "journal": {"volume": "6", "pages": "428 - 442", "name": "Nature Reviews Chemistry"}, "authors": [{"authorId": "144917032", "name": "A. Bender"}, {"authorId": "2164196529", "name": "Nadine Schneider"}, {"authorId": "3451383", "name": "Marwin H. S. Segler"}, {"authorId": "151506130", "name": "W. Patrick Walters"}, {"authorId": "2859540", "name": "O. Engkvist"}, {"authorId": "2137594860", "name": "Tiago Rodrigues"}]}, {"paperId": "9d563538a42b05872301267be2cdb6dc2475f815", "externalIds": {"ArXiv": "2209.10103", "DOI": "10.1029/2021WR031776", "CorpusId": 249033681}, "corpusId": 249033681, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9d563538a42b05872301267be2cdb6dc2475f815", "title": "Multi\u2010Tracer Groundwater Dating in Southern Oman Using Bayesian Modeling", "abstract": "In the scope of assessing aquifer systems in areas where freshwater is scarce, estimation of transit times is a vital step to quantify the effect of groundwater abstraction. Transit time distributions of different shapes, mean residence times, and contributions are used to represent the hydrogeological conditions in aquifer systems and are typically inferred from measured tracer concentrations by inverse modeling. In this study, a multi\u2010tracer sampling campaign was conducted in the Salalah Plain in Southern Oman including CFCs, SF6, 39Ar, 14C, and 4He. Based on the data of three tracers, a two\u2010component Dispersion Model (DMmix) and a nonparametric model with six age bins were assumed and evaluated using Bayesian statistics. In a Markov Chain Monte Carlo approach, the maximum likelihood parameter estimates and their uncertainties were determined. Model performance was assessed using Bayes factor and leave\u2010one\u2010out cross\u2010validation. Both models suggest that the groundwater in the Salalah Plain is composed of a very young component below 30 yr and a very old component beyond 1,000 yr, with the nonparametric model performing slightly better than the DMmix model. All wells except one exhibit reasonable goodness of fit. Our results support the relevance of Bayesian modeling in hydrology and the potential of nonparametric models for an adequate representation of aquifer dynamics.", "venue": "Water Resources Research", "year": 2022, "referenceCount": 125, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2209.10103", "status": null}, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-23", "journal": {"volume": "58", "name": "Water Resources Research"}, "authors": [{"authorId": "2023599316", "name": "V. R\u00e4dle"}, {"authorId": "51957977", "name": "A. Kersting"}, {"authorId": "2115765528", "name": "Maximilian Schmidt"}, {"authorId": "52011525", "name": "L. Ringena"}, {"authorId": "97137798", "name": "J. Robertz"}, {"authorId": "40863702", "name": "W. Aeschbach"}, {"authorId": "4088484", "name": "M. Oberthaler"}, {"authorId": null, "name": "Thomas M\u00fcller"}]}, {"paperId": "ecc454a1ad14914cb339a32aeb7cd4eafd5b52fd", "externalIds": {"DOI": "10.1177/20438206221102952", "CorpusId": 249054082}, "corpusId": 249054082, "publicationVenue": {"id": "966c340f-abae-4947-a74a-b0b8c8d68b32", "name": "Dialogues in Human Geography", "type": "journal", "alternate_names": ["Dialogues Hum Geogr", "Dialogues in human geography", "Dialogues hum geogr"], "issn": "2043-8206", "url": "http://www.sagepub.com/journals/Journal202000", "alternate_urls": ["https://journals.sagepub.com/home/dhg"]}, "url": "https://www.semanticscholar.org/paper/ecc454a1ad14914cb339a32aeb7cd4eafd5b52fd", "title": "Glitch epistemology and the question of (artificial) intelligence: Perceptions, encounters, subjectivities", "abstract": "Reflecting on Leszczynski and Elwood's theorization of glitch epistemology, this commentary argues for epistemological approaches to the question of (artificial) intelligence in geography focused around perceptions, encounters, and subjectivities. Such an approach denies technologies marketed as AI or otherwise as \u2018smart\u2019 the ontological status ascribed to them, instead investigating how particular technologies may be perceived as intelligent within the context of contingent and situated encounters with always differentiated and differentiating subjects. Glitch and related epistemological approaches reorient attention to the uneven production of desire and expectations for particular kinds of technologies and create opportunities to radically reimagine our relationships to them.", "venue": "Dialogues in Human Geography", "year": 2022, "referenceCount": 16, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ris.utwente.nl/ws/files/285086564/20438206221102952.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-23", "journal": {"volume": "12", "pages": "379 - 383", "name": "Dialogues in Human Geography"}, "authors": [{"authorId": "4188821", "name": "Casey R. Lynch"}]}, {"paperId": "f6cd6e23a956e46240b86955e4f37f00ec06b249", "externalIds": {"DOI": "10.4025/actascilangcult.v44i1.60071", "CorpusId": 249488136}, "corpusId": 249488136, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6cd6e23a956e46240b86955e4f37f00ec06b249", "title": "A voz do estere\u00f3tipo nos assistentes digitais", "abstract": "Os processos de reprodu\u00e7\u00e3o e sintetiza\u00e7\u00e3o da voz humana nos dispositivos de assist\u00eancia digital n\u00e3o obedecem, somente, a mecanismos puramente tecnol\u00f3gicos. Neles tamb\u00e9m se evidenciam quer formas de conceber a linguagem segundo os preceitos da informa\u00e7\u00e3o quer formas de actualizar e perpetuar certos estere\u00f3tipos sociais, particularmente os de g\u00e9nero. \u00c9 com o prop\u00f3sito de reflectir sobre a articula\u00e7\u00e3o de ambas que se justificam os conte\u00fados expostos no presente artigo, assim como a principal distin\u00e7\u00e3o conceptual, que, nele, \u00e9 desenvolvida, entre \u2018a voz que ouve\u2019 e \u2018a voz que \u00e9 ouvida\u2019. S\u00e3o duas as teses que norteiam esse prop\u00f3sito. A primeira sugere que a padroniza\u00e7\u00e3o dos assistentes digitais segundo crit\u00e9rios de discrimina\u00e7\u00e3o de g\u00e9nero \u00e9, ainda, nos nossos tempos, uma das v\u00e1rias manifesta\u00e7\u00f5es do amplo fen\u00f3meno da divis\u00e3o sexual do trabalho. A segunda tese, por sua vez, abrange o fen\u00f3meno tecnol\u00f3gico da chamada \u201cconverg\u00eancia digital\u201d e diz respeito aos modos de como os estere\u00f3tipos auditivos, baseados na imagem de m\u00e3e-cuidadora, complementam e refor\u00e7am os estere\u00f3tipos visuais. Para que a articula\u00e7\u00e3o te\u00f3rica das duas teses seja prof\u00edcua, \u00e9 necess\u00e1rio, antes de tudo, desmistificar a suposta interac\u00e7\u00e3o verbal entre m\u00e1quina e utilizador, mostrando \u2013 ao contr\u00e1rio do que se infere do imagin\u00e1rio tecnol\u00f3gico contempor\u00e2neo \u2013 a impossibilidade dial\u00f3gica de ambos.", "venue": "Acta Scientiarum. Language and Culture", "year": 2022, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://periodicos.uem.br/ojs/index.php/ActaSciLangCult/article/download/60071/751375154219", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-05-20", "journal": {"name": "Acta Scientiarum. Language and Culture"}, "authors": [{"authorId": "145958425", "name": "Joaquim Braga"}]}, {"paperId": "1bf4c8e3e2ca4d76c6f563fa195897d182ab46bf", "externalIds": {"DOI": "10.1007/s00287-022-01456-1", "CorpusId": 248935079}, "corpusId": 248935079, "publicationVenue": {"id": "518d38cf-179f-480b-b32a-c9d4e6bba46e", "name": "Informatik-Spektrum", "type": "journal", "alternate_names": ["Informatik Spektrum", "Inform Spektrum"], "issn": "0170-6012", "url": "https://link.springer.com/journal/287"}, "url": "https://www.semanticscholar.org/paper/1bf4c8e3e2ca4d76c6f563fa195897d182ab46bf", "title": "Komputer kreiert Wissenschaft", "abstract": null, "venue": "Informatik-Spektrum", "year": 2022, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00287-022-01456-1.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-05-19", "journal": {"volume": "45", "pages": "356 - 365", "name": "Informatik Spektrum"}, "authors": [{"authorId": "2044015490", "name": "W. Bibel"}]}, {"paperId": "48f8b1435fcbd10b7d4cf613322328d7062d94c6", "externalIds": {"DOI": "10.3390/proceedings2022081146", "CorpusId": 248926485}, "corpusId": 248926485, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48f8b1435fcbd10b7d4cf613322328d7062d94c6", "title": "A Framework of \u201cQuantitative \u2a02 Fixed Image \u21d2 Qualitative\u201d Induced by Contradiction Generation and Meta Synthetic Wisdom Engineering", "abstract": "Due to the past tP and the future tF being divided into a pair of opposing times by the now tN, the generation mechanism of the contradiction is attributed in this paper as the process in which the time increment \u2206t and \u2206t\u2019 are transmitted from the past tP and the future tF to the present moment tN, respectively, and then reverse each other. The category and topos of time contradictorily constructed by the mechanism is discussed. It is shown that not only can the laws of the \u201cUnification of Opposites\u201d, \u201cMutual change of Quality and Quantity\u201d and \u201cNegation of negation\u201d of the contradiction be represented in this form of category, but some of classic constructions appearing in the fields of mathematics, physics, logic, life, nerves, thinking, and intelligence can also be considered as morphosmor pattern-induced and emerge via this mechanism as well. On the other hands, a series of concepts, models, and algorithms for noetic science, such as the attribute conjunctive monoid category (ACMC), attribute reasoning lattice category (ARLC), attribute coordinate system (ACS), attribute coordinate analysis method based on the learning of ACS for perception, cognition, and decision-making (ACAM), qualitative (conversion degree) mapping from quantity to quality (QM), attribute grid computer based on qualitative mapping, qualitative criteria transformation (AGC), etc., which have been verified through corresponding experiments, have been proposed, so that not only a set of attribute theory methods from perception to cognition and thinking have been constructed, but the synthetized framework of \u201cQuantitative \u2297 Fixed Image\u21d2 Qualitative\u201d, called \u201cFramework of Syntenic Three Approaches\u201d (FSTA) can also be induced. It is possible to provide an alternative reference path and technical solution for noetic science and open complex giant systems because FSTA is consistent with the framework of \u201cQuantitative Intelligence \u2297 Fixed Image Intelligence\u21d2 Qualitative Intelligence (Meta Synthetic Wisdom)\u201d, as proposed by Hsue-shen Tsien.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2504-3900/81/1/146/pdf?version=1652854268", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-17", "journal": {"name": "The 2021 Summit of the International Society for the Study of Information"}, "authors": [{"authorId": "33913425", "name": "Jia-li Feng"}, {"authorId": "3365739", "name": "Peizhuang Wang"}]}, {"paperId": "f7cae1bc9b7ba214721cba3fd111fda57678de3f", "externalIds": {"DOI": "10.1007/s40747-022-00757-y", "CorpusId": 248781914}, "corpusId": 248781914, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f7cae1bc9b7ba214721cba3fd111fda57678de3f", "title": "An associative knowledge network model for interpretable semantic representation of noun context", "abstract": null, "venue": "Complex & Intelligent Systems", "year": 2022, "referenceCount": 51, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s40747-022-00757-y.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-13", "journal": {"volume": "8", "pages": "5265 - 5285", "name": "Complex & Intelligent Systems"}, "authors": [{"authorId": "2165317888", "name": "Yulin Li"}, {"authorId": "2735864", "name": "Zhenping Xie"}, {"authorId": "113437495", "name": "Fanyu Wang"}]}, {"paperId": "a97bf87e4786b4a91e6c61e9308a44350791c31f", "externalIds": {"PubMedCentral": "9113877", "DOI": "10.1155/2022/3190801", "CorpusId": 248736441, "PubMed": "35592719"}, "corpusId": 248736441, "publicationVenue": {"id": "f32b7322-b69c-4e63-801d-8f50784ef778", "name": "Computational Intelligence and Neuroscience", "type": "journal", "alternate_names": ["Comput Intell Neurosci"], "issn": "1687-5265", "url": "https://www.hindawi.com/journals/cin/"}, "url": "https://www.semanticscholar.org/paper/a97bf87e4786b4a91e6c61e9308a44350791c31f", "title": "Research on System Construction and Strategy of Intelligent Sports in the Implementation of National Fitness", "abstract": "This paper studies the construction and development strategy of intelligent sports system in the context of Chinese National Fitness Program with methods of literature review and model construction. The research shows that there are four dilemmas in the implementation of intelligent sports in national fitness: data security, market monopoly, legal supervision, and product iteration. However, there are also three promoting factors in this regard, including policy guarantee, market demand, and industrial upgrading. Following the principles of scientificity, effectiveness, public welfare, and collaboration, this paper designs a system for intelligent sports in national fitness. The construction of the national fitness intelligent sports system mainly consists of four modules, including basic framework construction, function design, content design, and operation analysis. With the systematic analysis of the status quo of intelligent sports application in national fitness, this paper puts forward intelligent sports development strategies in the implementation of national fitness from four aspects: optimizing the top-level design of government, speeding up industrial transformation and upgrading, constructing market supervision mechanism, and establishing a talent training system.", "venue": "Computational Intelligence and Neuroscience", "year": 2022, "referenceCount": 15, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/cin/2022/3190801.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-05-10", "journal": {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, "authors": [{"authorId": "2166392145", "name": "Yuqing Tang"}, {"authorId": "96772858", "name": "Sheng Zan"}, {"authorId": "2004730596", "name": "Xiaowen Zhang"}]}, {"paperId": "f37f447ddcf14664b78653c1009d9934614519f7", "externalIds": {"PubMedCentral": "9091068", "DOI": "10.1186/s13244-022-01220-9", "CorpusId": 248574320, "PubMed": "35536446"}, "corpusId": 248574320, "publicationVenue": {"id": "4569c7ff-7138-4cef-b44d-21049e1faa98", "name": "Insights into Imaging", "type": "journal", "alternate_names": ["Insight Imaging", "Insights Into Imaging"], "issn": "1869-4101", "url": "http://www.springer.com/13244", "alternate_urls": ["http://www.springer.com/medicine/radiology/journal/13244", "https://insightsimaging.springeropen.com", "https://link.springer.com/journal/13244", "http://www.springer.com/medicine/radiology/journal/13244?changeHeader"]}, "url": "https://www.semanticscholar.org/paper/f37f447ddcf14664b78653c1009d9934614519f7", "title": "Considerations for artificial intelligence clinical impact in oncologic imaging: an AI4HI position paper", "abstract": null, "venue": "Insights into Imaging", "year": 2022, "referenceCount": 49, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-10", "journal": {"volume": "13", "name": "Insights into Imaging"}, "authors": [{"authorId": "83904480", "name": "L. Mart\u00ed-Bonmat\u00ed"}, {"authorId": "143609640", "name": "D. Koh"}, {"authorId": "50338538", "name": "K. Riklund"}, {"authorId": "3624615", "name": "Maciej Bobowicz"}, {"authorId": "32054693", "name": "Y. Roussakis"}, {"authorId": "46668942", "name": "J. Vilanova"}, {"authorId": "2039143", "name": "J. F\u00fctterer"}, {"authorId": "6762371", "name": "J. Rimola"}, {"authorId": "31230015", "name": "Pedro Mallol"}, {"authorId": "2164393319", "name": "G. Ribas"}, {"authorId": "2145922721", "name": "A. Miguel"}, {"authorId": "2992223", "name": "M. Tsiknakis"}, {"authorId": "2364820", "name": "K. Lekadir"}, {"authorId": "2209674", "name": "G. Tsakou"}]}, {"paperId": "09797949fc70fbad8f3fed4f6cf4a91a9c709652", "externalIds": {"DOI": "10.1136/bjophthalmol-2022-321141", "CorpusId": 248553336, "PubMed": "35523534"}, "corpusId": 248553336, "publicationVenue": {"id": "f5279917-ce2b-489d-8c2f-8a8f80a35559", "name": "British Journal of Ophthalmology", "type": "journal", "alternate_names": ["Br J Ophthalmol"], "issn": "1791-1737", "alternate_issns": ["0007-1161"], "url": "https://bjo.bmj.com/", "alternate_urls": ["http://bjo.bmj.com/", "http://bjo.bmjjournals.com/"]}, "url": "https://www.semanticscholar.org/paper/09797949fc70fbad8f3fed4f6cf4a91a9c709652", "title": "New meaning for NLP: the trials and tribulations of natural language processing with GPT-3 in ophthalmology", "abstract": "Natural language processing (NLP) is a subfield of machine intelligence focused on the interaction of human language with computer systems. NLP has recently been discussed in the mainstream media and the literature with the advent of Generative Pre-trained Transformer 3 (GPT-3), a language model capable of producing human-like text. The release of GPT-3 has also sparked renewed interest on the applicability of NLP to contemporary healthcare problems. This article provides an overview of NLP models, with a focus on GPT-3, as well as discussion of applications specific to ophthalmology. We also outline the limitations of GPT-3 and the challenges with its integration into routine ophthalmic care.", "venue": "British Journal of Ophthalmology", "year": 2022, "referenceCount": 36, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://discovery.ucl.ac.uk/10149021/1/bjophthalmol-2022-321141.R1_Proof_hi.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-05-06", "journal": {"volume": "106", "pages": "889 - 892", "name": "British Journal of Ophthalmology"}, "authors": [{"authorId": "39819114", "name": "Siddharth Nath"}, {"authorId": "2164300110", "name": "Abdullah Marie"}, {"authorId": "2090354013", "name": "Simon Ellershaw"}, {"authorId": "65739018", "name": "Edward Korot"}, {"authorId": "5638585", "name": "P. Keane"}]}, {"paperId": "4351889496fafb08fbbe39be6a7bbe93ae957883", "externalIds": {"DOI": "10.1007/s10670-022-00552-8", "CorpusId": 247973871}, "corpusId": 247973871, "publicationVenue": {"id": "638d1b1c-6c05-4b65-aa2e-ace42ee26e95", "name": "Erkenntnis: An International Journal of Scientific Philosophy", "type": "journal", "alternate_names": ["Erkenn Int J Sci Philos", "Erkenntnis"], "issn": "0165-0106", "url": "https://www.springer.com/philosophy/journal/10670", "alternate_urls": ["http://www.jstor.org/journals/01650106.html", "https://www.jstor.org/journal/erkenntnis2", "http://www.springer.com/philosophy/journal/10670"]}, "url": "https://www.semanticscholar.org/paper/4351889496fafb08fbbe39be6a7bbe93ae957883", "title": "Intelligent Behaviour", "abstract": null, "venue": "Erkenntnis: An International Journal of Scientific Philosophy", "year": 2022, "referenceCount": 57, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10670-022-00552-8.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-06", "journal": {"name": "Erkenntnis"}, "authors": [{"authorId": "51127600", "name": "Dimitri Coelho Mollo"}]}, {"paperId": "69ce70dc7cc9e52cde3df0f7e0ca972f085355fa", "externalIds": {"DOI": "10.36253/jlis.it-458", "CorpusId": 248824244}, "corpusId": 248824244, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/69ce70dc7cc9e52cde3df0f7e0ca972f085355fa", "title": "Artificial Intelligence Systems and problems of the concept of author. Reflections on a recent book", "abstract": "The publication of the book Beta Writer. 2019.\u00a0Lithium-Ion Batteries. A Machine-Generated Summary of Current Research. New York, NY: Springer, produced with Artificial Intelligence software prompts analysis and reflections in several areas. First of all, on what Artificial Intelligence systems are able to do in the production of informative texts. This raises the question if and how an Artificial Intelligence software system can be treated as the author of a text it has produced. Evaluating whether this is correct and possible leads to re-examine the current conception for which it is taken for granted that the author is a person. This, in turn, when faced with texts produced by Artificial Intelligence systems necessarily raises the question of whether they, like the author-person, are endowed with agency. The article concludes that Artificial Intelligence systems are characterized by a distributed agency, shared with those who designed them and make them work, and that in the wake of the reflections of 50 years ago by Barthes and Foucault, it is necessary to define and recognize a new type of author.", "venue": "JLIS.it", "year": 2022, "referenceCount": 74, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://jlis.it/index.php/jlis/article/download/458/457", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-05", "journal": {"name": "JLIS.it"}, "authors": [{"authorId": "48030608", "name": "M. Lana"}]}, {"paperId": "96d2f08d83386ab6dad47a3a772fa48d198ce9d0", "externalIds": {"DBLP": "journals/corr/abs-2205-08954", "ArXiv": "2205.08954", "DOI": "10.48550/arXiv.2205.08954", "CorpusId": 248863342}, "corpusId": 248863342, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/96d2f08d83386ab6dad47a3a772fa48d198ce9d0", "title": "One-way Explainability Isn't The Message", "abstract": "Recent engineering developments in specialised computational hard-ware, data-acquisition and storage technology have seen the emergence of Machine Learning (ML) as a powerful form of data analysis with widespread applicability beyond its historical roots in the design of autonomous agents. However\u2014possibly because of its origins in the development of agents capable of self-discovery\u2014relatively little attention has been paid to the interaction between people and ML systems, although recent developments on Explainable ML are expected to address this, by providing visual and textual feedback on how the ML system arrived at a conclusion. In this paper we are concerned with the use of ML in automated or semi-automated tools that assist one or more human decision makers. We argue that requirements on both human and machine in this context are signi\ufb01cantly di\ufb00erent to the use of ML either as part of autonomous agents for self-discovery or as part statistical data analysis. Our principal position is that the design of such human-machine systems should be driven by repeated, two-way intelligibility of information rather than one-way explainability of the ML-system\u2019s recommendations. Iterated rounds of intelligible information exchange, we think, will characterise the kinds of collaboration that will be needed to understand complex phenomena for which neither man or machine have complete answers. To reassure the reader that this is not simply wordplay, we propose operational principles\u2013we call them Intelligibility Axioms\u2013to guide the design of a \ufb01rst-step in constructing a collaborative decision-support system. Speci\ufb01cally, for one iteration in the collaboration (human-to-machine-to-human), the principles are intended to encode su\ufb03cient criteria for the following: (a) what it means for information provided by the human to be intelligible to the ML system; and (b) what it means for an explanation provided by an ML system to be intelligible to a human. Using examples from the literature on the use of ML for drug-design and in medicine, we demonstrate cases where the conditions of the axioms are met. Intelligibility of communication is necessary, but not su\ufb03cient to extend a single iteration of the collaborative loop to multiple iterations. We describe some additional requirements needed for the design of a truly collaborative decision-support system.", "venue": "ArXiv", "year": 2022, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-05", "journal": {"volume": "abs/2205.08954", "name": "ArXiv"}, "authors": [{"authorId": "143780768", "name": "A. Srinivasan"}, {"authorId": "144041292", "name": "Michael Bain"}, {"authorId": "2091242865", "name": "Enrico W. Coiera"}]}, {"paperId": "8cfcc57878f20d04e97acbb9ca78fb4f218811f0", "externalIds": {"DBLP": "conf/flairs/PetersonH22", "DOI": "10.32473/flairs.v35i.130545", "CorpusId": 248587818}, "corpusId": 248587818, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8cfcc57878f20d04e97acbb9ca78fb4f218811f0", "title": "Preliminary Thoughts on Defining f(x) for Ethical Machines", "abstract": "There is a growing literature in machine ethics attempting at creating ethical machines through AI and machine learning. Although many concerns with respect to such attempts have been raised, including the difficulties regarding the gathering of relevant contextual information as well as solving ethical dilemmas, it appears that many fundamental ethical notions have been overlooked in the implementation of normative theories to machines. This paper provides a preliminary analysis of important aspects that need to be taken into account in the attempt of defining so called ethical machines.", "venue": "FLAIRS", "year": 2022, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.flvc.org/FLAIRS/article/download/130545/133908", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-04", "journal": {"name": "The International FLAIRS Conference Proceedings"}, "authors": [{"authorId": "11161869", "name": "Clayton Peterson"}, {"authorId": "2102351337", "name": "Na\u00efma Hamrouni"}]}, {"paperId": "7f84d56fb8feb4e50cd6c3da3e3fd4ff6c4772cf", "externalIds": {"ACL": "2022.naacl-main.258", "ArXiv": "2205.01523", "DBLP": "conf/naacl/LiTGYYCWZW22", "DOI": "10.48550/arXiv.2205.01523", "CorpusId": 247613500}, "corpusId": 247613500, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f84d56fb8feb4e50cd6c3da3e3fd4ff6c4772cf", "title": "ElitePLM: An Empirical Study on General Language Ability Evaluation of Pretrained Language Models", "abstract": "Nowadays, pretrained language models (PLMs) have dominated the majority of NLP tasks. While, little research has been conducted on systematically evaluating the language abilities of PLMs. In this paper, we present a large-scale empirical study on general language ability evaluation of PLMs (ElitePLM). In our study, we design four evaluation dimensions, memory, comprehension, reasoning, and composition, to measure ten widely-used PLMs within five categories. Our empirical results demonstrate that: (1) PLMs with varying training objectives and strategies are good at different ability tests; (2) fine-tuning PLMs in downstream tasks is usually sensitive to the data size and distribution; (3) PLMs have excellent transferability between similar tasks. Moreover, the prediction results of PLMs in our experiments are released as an open resource for more deep and detailed analysis on the language abilities of PLMs. This paper can guide the future work to select, apply, and design PLMs for specific tasks. We have made all the details of experiments publicly available at https://github.com/RUCAIBox/ElitePLM.", "venue": "NAACL", "year": 2022, "referenceCount": 64, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-05-03", "journal": {"pages": "3519-3539"}, "authors": [{"authorId": "2018027", "name": "Junyi Li"}, {"authorId": "1997234792", "name": "Tianyi Tang"}, {"authorId": "2164092564", "name": "Zheng Gong"}, {"authorId": "2111809756", "name": "Lixin Yang"}, {"authorId": "2164113313", "name": "Zhuohao Yu"}, {"authorId": "46842323", "name": "Z. Chen"}, {"authorId": "2115891766", "name": "Jingyuan Wang"}, {"authorId": "2542603", "name": "Wayne Xin Zhao"}, {"authorId": "153693432", "name": "Ji-rong Wen"}]}, {"paperId": "67d2d0c0c4a711004cd48a03c61c30e0dba1bd47", "externalIds": {"DBLP": "journals/corr/abs-2205-00965", "ArXiv": "2205.00965", "DOI": "10.48550/arXiv.2205.00965", "CorpusId": 248496872}, "corpusId": 248496872, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/67d2d0c0c4a711004cd48a03c61c30e0dba1bd47", "title": "State-of-the-art in Open-domain Conversational AI: A Survey", "abstract": "We survey SoTA open-domain conversational AI models with the objective of presenting the prevailing challenges that still exist to spur future research. In addition, we provide statistics on the gender of conversational AI in order to guide the ethics discussion surrounding the issue. Open-domain conversational AI models are known to have several challenges, including bland, repetitive responses and performance degradation when prompted with figurative language, among others. First, we provide some background by discussing some topics of interest in conversational AI. We then discuss the method applied to the two investigations carried out that make up this study. The first investigation involves a search for recent SoTA open-domain conversational AI models, while the second involves the search for 100 conversational AI to assess their gender. Results of the survey show that progress has been made with recent SoTA conversational AI, but there are still persistent challenges that need to be solved, and the female gender is more common than the male for conversational AI. One main takeaway is that hybrid models of conversational AI offer more advantages than any single architecture. The key contributions of this survey are (1) the identification of prevailing challenges in SoTA open-domain conversational AI, (2) the rarely held discussion on open-domain conversational AI for low-resource languages, and (3) the discussion about the ethics surrounding the gender of conversational AI.", "venue": "Inf.", "year": 2022, "referenceCount": 94, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-05-02", "journal": {"volume": "13", "pages": "298", "name": "Inf."}, "authors": [{"authorId": "51221489", "name": "Tosin P. Adewumi"}, {"authorId": "80342407", "name": "F. Liwicki"}, {"authorId": "1743758", "name": "M. Liwicki"}]}, {"paperId": "807a91d0225c77cca5a1dfc307bf1aa1756944e7", "externalIds": {"DBLP": "journals/nn/DoyaEKSR22", "DOI": "10.1016/j.neunet.2022.05.012", "CorpusId": 248972754, "PubMed": "35671575"}, "corpusId": 248972754, "publicationVenue": {"id": "a13f3cb8-2492-4ccb-9329-73a5ddcaab9b", "name": "Neural Networks", "type": "journal", "alternate_names": ["Neural Netw"], "issn": "0893-6080", "url": "http://www.elsevier.com/locate/neunet", "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/841/description", "http://www.sciencedirect.com/science/journal/08936080"]}, "url": "https://www.semanticscholar.org/paper/807a91d0225c77cca5a1dfc307bf1aa1756944e7", "title": "Social impact and governance of AI and neurotechnologies", "abstract": null, "venue": "Neural Networks", "year": 2022, "referenceCount": 94, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-05-01", "journal": {"volume": "152", "pages": "\n 542-554\n ", "name": "Neural networks : the official journal of the International Neural Network Society"}, "authors": [{"authorId": "1714997", "name": "K. Doya"}, {"authorId": "35406850", "name": "Arisa Ema"}, {"authorId": "48078689", "name": "H. Kitano"}, {"authorId": "3275262", "name": "M. Sakagami"}, {"authorId": "2055581993", "name": "Stuart Russell"}]}, {"paperId": "c961db861c6ce200e1b0e6b1e77a58e1684890d1", "externalIds": {"DBLP": "journals/sensors/MiuraCSNY22", "PubMedCentral": "9146313", "DOI": "10.3390/s22103829", "CorpusId": 248938640, "PubMed": "35632238"}, "corpusId": 248938640, "publicationVenue": {"id": "3dbf084c-ef47-4b74-9919-047b40704538", "name": "Italian National Conference on Sensors", "type": "conference", "alternate_names": ["SENSORS", "IEEE Sens", "Ital National Conf Sens", "IEEE Sensors", "Sensors"], "issn": "1424-8220", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-142001", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-142001", "http://www.mdpi.com/journal/sensors", "https://www.mdpi.com/journal/sensors"]}, "url": "https://www.semanticscholar.org/paper/c961db861c6ce200e1b0e6b1e77a58e1684890d1", "title": "Assisting Personalized Healthcare of Elderly People: Developing a Rule-Based Virtual Caregiver System Using Mobile Chatbot", "abstract": "To assist personalized healthcare of elderly people, our interest is to develop a virtual caregiver system that retrieves the expression of mental and physical health states through human\u2013computer interaction in the form of dialogue. The purpose of this paper is to implement and evaluate a virtual caregiver system using mobile chatbot. Unlike the conventional health monitoring approach, our key idea is to integrate a rule-based virtual caregiver system (called \u201cMind Monitoring\u201d service) with the physical, mental, and social questionnaires into the mobile chat application. The elderly person receives one question from the mobile chatbot per day, and answers it by pushing the optional button or using a speech recognition technique. Furthermore, a novel method is implemented to quantify the answers, generate visual graphs, and send the corresponding summaries or advice to the specific elder. In the experimental evaluation, we applied it to eight elderly subjects and 19 younger subjects within 14 months. As main results, its effects were significantly improved by the proposed method, including the above 80% in the response rate, the accurate reflection of their real lives from the responses, and high usefulness of the feedback messages with software quality requirements and evaluation. We also conducted interviews with subjects for health analysis and improvement.", "venue": "Italian National Conference on Sensors", "year": 2022, "referenceCount": 110, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1424-8220/22/10/3829/pdf?version=1652939538", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "1508869919", "name": "C. Miura"}, {"authorId": "2111635914", "name": "Sinan Chen"}, {"authorId": "38554053", "name": "S. Saiki"}, {"authorId": "1717604", "name": "Masahide Nakamura"}, {"authorId": "2630154", "name": "K. Yasuda"}]}, {"paperId": "523e4c0b6d4a7a2323f2a9d31613e38bb3fb556b", "externalIds": {"PubMedCentral": "9119867", "DBLP": "journals/caeai/RayhanADA22", "DOI": "10.1016/j.caeai.2022.100077", "CorpusId": 248892985}, "corpusId": 248892985, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/523e4c0b6d4a7a2323f2a9d31613e38bb3fb556b", "title": "Appraisal of high-stake examinations during SARS-CoV-2 emergency with responsible and transparent AI: Evidence of fair and detrimental assessment", "abstract": null, "venue": "Computers and Education: Artificial Intelligence", "year": 2022, "referenceCount": 74, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "3", "pages": "100077 - 100077", "name": "Computers and Education: Artificial Intelligence"}, "authors": [{"authorId": "2120260019", "name": "M. Rayhan"}, {"authorId": "2401685", "name": "Md. Golam Rabiul Alam"}, {"authorId": "145197398", "name": "M. A. Dewan"}, {"authorId": "2475433", "name": "Mohammad Helal Uddin Ahmed"}]}, {"paperId": "9329b3feb93c552f847f1cd3a1fb6447f47ec7b4", "externalIds": {"DOI": "10.1007/s40264-022-01156-5", "CorpusId": 248816823, "PubMed": "35579806"}, "corpusId": 248816823, "publicationVenue": {"id": "8a29d48c-16af-49a1-8c20-f7c7bbc7cf66", "name": "Drug Safety", "type": "journal", "alternate_names": ["Drug Saf"], "issn": "0114-5916", "url": "https://link.springer.com/journal/40264"}, "url": "https://www.semanticscholar.org/paper/9329b3feb93c552f847f1cd3a1fb6447f47ec7b4", "title": "Artificial Intelligence in Pharmacovigilance: An Introduction to Terms, Concepts, Applications, and Limitations", "abstract": null, "venue": "Drug Safety", "year": 2022, "referenceCount": 70, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "45", "pages": "407 - 418", "name": "Drug Safety"}, "authors": [{"authorId": "1911962", "name": "J. Aronson"}]}, {"paperId": "2889ee04cdb769fb1aa822081059a65f330cf46a", "externalIds": {"ArXiv": "2205.07769", "DBLP": "journals/corr/abs-2205-07769", "DOI": "10.48550/arXiv.2205.07769", "CorpusId": 248811072}, "corpusId": 248811072, "publicationVenue": {"id": "c4658fe7-adac-4160-badc-2c3f50929b38", "name": "BenchCouncil Transactions on Benchmarks, Standards and Evaluations", "type": "journal", "alternate_names": ["Benchcouncil Trans Benchmark Stand Evaluation"], "issn": "2772-4859"}, "url": "https://www.semanticscholar.org/paper/2889ee04cdb769fb1aa822081059a65f330cf46a", "title": "A BenchCouncil View on Benchmarking Emerging and Future Computing", "abstract": "The measurable properties of the artifacts or objects in the computer, management, or \ufb01nance disci- plines are extrinsic, not inherent \u2014 dependent on their problem de\ufb01nitions and solution instantiations. Only after the instantiation can the solutions to the problem be measured. The processes of de\ufb01nition, instantiation, and measurement are entangled, and they have complex mutual in\ufb02uences. Meanwhile, the technology inertia brings instantiation bias \u2014 trapped into a subspace or even a point at a high- dimension solution space. These daunting challenges, which emerging computing aggravates, make metrology can not work for benchmark communities. It is pressing to establish independent bench- mark science and engineering. This article presents a unifying benchmark de\ufb01nition, a conceptual framework, and a traceable and supervised learning-based benchmarking methodology, laying the foundation for benchmark science and engineering. I also discuss BenchCouncil\u2019s plans for emerging and future computing. The ongoing projects include de\ufb01ning the challenges of intelligence, instinct, quantum computers, Metaverse, planet-scale computers, and reformulating data centers, arti\ufb01cial intelligence for science, and CPU benchmark suites. Also, BenchCouncil will collaborate with ComputerCouncil on open-source computer systems for planet-scale computing, AI for science systems, and Metaverse.", "venue": "BenchCouncil Transactions on Benchmarks, Standards and Evaluations", "year": 2022, "referenceCount": 51, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "abs/2205.07769", "name": "ArXiv"}, "authors": [{"authorId": "2062319", "name": "Jianfeng Zhan"}]}, {"paperId": "074ca49cd46b227bf8a6382d8bf26e11e239fbd6", "externalIds": {"DOI": "10.1162/daed_a_01902", "CorpusId": 248377877}, "corpusId": 248377877, "publicationVenue": {"id": "82909cec-149f-4e18-a812-25fc131aad66", "name": "Daedalus", "type": "journal", "issn": "0011-5266", "url": "https://www.jstor.org/journal/daedalus", "alternate_urls": ["http://www.mitpressjournals.org/loi/daed", "http://www.jstor.org/journals/00115266.html", "https://www.mitpressjournals.org/loi/daed"]}, "url": "https://www.semanticscholar.org/paper/074ca49cd46b227bf8a6382d8bf26e11e239fbd6", "title": "Searching for Computer Vision North Stars", "abstract": "Abstract Computer vision is one of the most fundamental areas of artificial intelligence research. It has contributed to the tremendous progress in the recent deep learning revolution in AI. In this essay, we provide a perspective of the recent evolution of object recognition in computer vision, a flagship research topic that led to the breakthrough data set of ImageNet and its ensuing algorithm developments. We argue that much of this progress is rooted in the pursuit of research \u201cnorth stars,\u201d wherein researchers focus on critical problems of a scientific discipline that can galvanize major efforts and groundbreaking progress. Following the success of ImageNet and object recognition, we observe a number of exciting areas of research and a growing list of north star problems to tackle. This essay recounts the brief history of ImageNet, its related work, and the follow-up progress. The goal is to inspire more north star work to advance the field, and AI at large.", "venue": "Daedalus", "year": 2022, "referenceCount": 44, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/daed/article-pdf/151/2/85/2009150/daed_a_01902.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-01", "journal": {"volume": "151", "pages": "85-99", "name": "Daedalus"}, "authors": [{"authorId": "48004138", "name": "Li Fei-Fei"}, {"authorId": "145237361", "name": "Ranjay Krishna"}]}, {"paperId": "6b8cd1a2031a90dcce12fb5e1b6c111e3ea3af47", "externalIds": {"DOI": "10.1162/daed_a_01899", "CorpusId": 248377891}, "corpusId": 248377891, "publicationVenue": {"id": "82909cec-149f-4e18-a812-25fc131aad66", "name": "Daedalus", "type": "journal", "issn": "0011-5266", "url": "https://www.jstor.org/journal/daedalus", "alternate_urls": ["http://www.mitpressjournals.org/loi/daed", "http://www.jstor.org/journals/00115266.html", "https://www.mitpressjournals.org/loi/daed"]}, "url": "https://www.semanticscholar.org/paper/6b8cd1a2031a90dcce12fb5e1b6c111e3ea3af47", "title": "If We Succeed", "abstract": "Abstract Since its inception, AI has operated within a standard model whereby systems are designed to optimize a fixed, known objective. This model has been increasingly successful. I briefly summarize the state of the art and its likely evolution over the next decade. Substantial breakthroughs leading to general-purpose AI are much harder to predict, but they will have an enormous impact on society. At the same time, the standard model will become progressively untenable in real-world applications because of the difficulty of specifying objectives completely and correctly. I propose a new model for AI development in which the machine's uncertainty about the true objective leads to qualitatively new modes of behavior that are more robust, controllable, and deferential.", "venue": "Daedalus", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/daed/article-pdf/151/2/43/2009166/daed_a_01899.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-01", "journal": {"volume": "151", "pages": "43-57", "name": "Daedalus"}, "authors": [{"authorId": "145107462", "name": "Stuart J. Russell"}]}, {"paperId": "6b21f00e72698db1722b5d34dbc11a1a54622b9e", "externalIds": {"DOI": "10.1162/daed_a_01898", "CorpusId": 248237628}, "corpusId": 248237628, "publicationVenue": {"id": "82909cec-149f-4e18-a812-25fc131aad66", "name": "Daedalus", "type": "journal", "issn": "0011-5266", "url": "https://www.jstor.org/journal/daedalus", "alternate_urls": ["http://www.mitpressjournals.org/loi/daed", "http://www.jstor.org/journals/00115266.html", "https://www.mitpressjournals.org/loi/daed"]}, "url": "https://www.semanticscholar.org/paper/6b21f00e72698db1722b5d34dbc11a1a54622b9e", "title": "\u201cFrom So Simple a Beginning\u201d: Species of Artificial Intelligence", "abstract": "Abstract Artificial intelligence has a decades-long history that exhibits alternating enthusiasm and disillusionment for the field's scientific insights, technical accomplishments, and socioeconomic impact. Recent achievements have seen renewed claims for the transformative and disruptive effects of AI. Reviewing the history and current state of the art reveals a broad repertoire of methods and techniques developed by AI researchers. In particular, modern machine learning methods have enabled a series of AI systems to achieve superhuman performance. The exponential increases in computing power, open-source software, available data, and embedded services have been crucial to this success. At the same time, there is growing unease around whether the behavior of these systems can be rendered transparent, explainable, unbiased, and accountable. One consequence of recent AI accomplishments is a renaissance of interest around the ethics of such systems. More generally, our AI systems remain singular task-achieving architectures, often termed narrow AI. I will argue that artificial general intelligence-able to range across widely differing tasks and contexts-is unlikely to be developed, or emerge, any time soon.", "venue": "Daedalus", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/daed/article-pdf/151/2/28/2009160/daed_a_01898.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-05-01", "journal": {"volume": "151", "pages": "28-42", "name": "Daedalus"}, "authors": [{"authorId": "1705314", "name": "N. Shadbolt"}]}, {"paperId": "6a41c21d32c9acdbb7fb1a79e13a87b266e2da55", "externalIds": {"PubMedCentral": "9103799", "DOI": "10.3390/ijms23094998", "CorpusId": 248485577, "PubMed": "35563387"}, "corpusId": 248485577, "publicationVenue": {"id": "8506a01a-40b8-4e6f-bbb8-ce2492139c15", "name": "International Journal of Molecular Sciences", "type": "journal", "alternate_names": ["Int J Mol Sci"], "issn": "1422-0067", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-157693", "alternate_urls": ["https://www.mdpi.com/journal/ijms", "http://www.mdpi.com/journal/ijms/", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-157693"]}, "url": "https://www.semanticscholar.org/paper/6a41c21d32c9acdbb7fb1a79e13a87b266e2da55", "title": "Novel Biomarkers of Atherosclerotic Vascular Disease\u2014Latest Insights in the Research Field", "abstract": "The atherosclerotic vascular disease is a cardiovascular continuum in which the main role is attributed to atherosclerosis, from its appearance to its associated complications. The increasing prevalence of cardiovascular risk factors, population ageing, and burden on both the economy and the healthcare system have led to the development of new diagnostic and therapeutic strategies in the field. The better understanding or discovery of new pathophysiological mechanisms and molecules modulating various signaling pathways involved in atherosclerosis have led to the development of potential new biomarkers, with key role in early, subclinical diagnosis. The evolution of technological processes in medicine has shifted the attention of researchers from the profiling of classical risk factors to the identification of new biomarkers such as midregional pro-adrenomedullin, midkine, stromelysin-2, pentraxin 3, inflammasomes, or endothelial cell-derived extracellular vesicles. These molecules are seen as future therapeutic targets associated with decreased morbidity and mortality through early diagnosis of atherosclerotic lesions and future research directions.", "venue": "International Journal of Molecular Sciences", "year": 2022, "referenceCount": 276, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1422-0067/23/9/4998/pdf?version=1651825665", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-30", "journal": {"volume": "23", "name": "International Journal of Molecular Sciences"}, "authors": [{"authorId": "2061016362", "name": "C. Adam"}, {"authorId": "13845147", "name": "D. \u0218alaru"}, {"authorId": "40385765", "name": "C. Pris\u0103cariu"}, {"authorId": "47764305", "name": "D. Marcu"}, {"authorId": "4449885", "name": "R. Sasc\u0103u"}, {"authorId": "12240064", "name": "C. St\u0103tescu"}]}, {"paperId": "40dd2b0184faaeac63f04e2a969087aea0db1f7c", "externalIds": {"ArXiv": "2204.12774", "CorpusId": 248405896}, "corpusId": 248405896, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/40dd2b0184faaeac63f04e2a969087aea0db1f7c", "title": "Matter&Mind Matter", "abstract": "As a result of a hundred million years of evolution, living animals have adapted extremely well to their ecological niche. Such adaptation implies species-specific interactions with their immediate environment by processing sensory cues and responding with appropriate behavior. Understanding how living creatures perform pattern recognition and cognitive tasks is of particular importance for computing architectures: by studying these information pathways refined over eons of evolution, researchers may be able to streamline the process of developing more highly advanced, energy efficient autonomous systems. With the advent of novel electronic and ionic components along with a deeper understanding of information pathways in living species, a plethora of opportunities to develop completely novel information processing avenues are within reach. Here, we describe the basal information pathways in nervous systems, from the local neuron level to the entire nervous system network. The dual importance of local learning rules is addressed, from spike timing dependent plasticity at the neuron level to the interwoven morphological and dynamical mechanisms of the global network. Basal biological principles are highlighted, including phylogenies, ontogenesis, and homeostasis, with particular emphasis on network topology and dynamics. While in machine learning system training is performed on virgin networks without any a priori knowledge, the approach proposed here distinguishes itself unambiguously by employing growth mechanisms as a guideline to design novel computing architectures. Including fundamental biological information pathways that explore the spatiotemporal fundamentals of nervous systems has untapped potential for the development of entirely novel information processing systems. Finally, a benchmark for neuromorphic systems is suggested.", "venue": "", "year": 2022, "referenceCount": 289, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Biology"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-27", "journal": null, "authors": [{"authorId": "2163623542", "name": "Tom Birkoben"}, {"authorId": "2163623111", "name": "Hermann Kohlstedt"}]}, {"paperId": "893a1ef190dbd6aee1420e3462939efc9e6665d4", "externalIds": {"PubMedCentral": "9106101", "DBLP": "journals/finr/Sims22", "DOI": "10.3389/fnbot.2022.857614", "CorpusId": 248397782, "PubMed": "35574229"}, "corpusId": 248397782, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/893a1ef190dbd6aee1420e3462939efc9e6665d4", "title": "Self-Concern Across Scales: A Biologically Inspired Direction for Embodied Artificial Intelligence", "abstract": "Intelligence in current AI research is measured according to designer-assigned tasks that lack any relevance for an agent itself. As such, tasks and their evaluation reveal a lot more about our intelligence than the possible intelligence of agents that we design and evaluate. As a possible first step in remedying this, this article introduces the notion of \u201cself-concern,\u201d a property of a complex system that describes its tendency to bring about states that are compatible with its continued self-maintenance. Self-concern, as argued, is the foundation of the kind of basic intelligence found across all biological systems, because it reflects any such system's existential task of continued viability. This article aims to cautiously progress a few steps closer to a better understanding of some necessary organisational conditions that are central to self-concern in biological systems. By emulating these conditions in embodied AI, perhaps something like genuine self-concern can be implemented in machines, bringing AI one step closer to its original goal of emulating human-like intelligence.", "venue": "Frontiers in Neurorobotics", "year": 2022, "referenceCount": 149, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fnbot.2022.857614/pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-25", "journal": {"volume": "16", "name": "Frontiers in Neurorobotics"}, "authors": [{"authorId": "2052247891", "name": "Matthew Sims"}]}, {"paperId": "9c5f0f80c7dd21463177b7329d748b785af3c516", "externalIds": {"DOI": "10.3390/ai3020021", "CorpusId": 248316668}, "corpusId": 248316668, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9c5f0f80c7dd21463177b7329d748b785af3c516", "title": "Shifting Perspectives on AI Evaluation: The Increasing Role of Ethics in Cooperation", "abstract": "Evaluating AI is a challenging task, as it requires an operative definition of intelligence and the metrics to quantify it, including amongst other factors economic drivers, depending on specific domains. From the viewpoint of AI basic research, the ability to play a game against a human has historically been adopted as a criterion of evaluation, as competition can be characterized by an algorithmic approach. Starting from the end of the 1990s, the deployment of sophisticated hardware identified a significant improvement in the ability of a machine to play and win popular games. In spite of the spectacular victory of IBM\u2019s Deep Blue over Garry Kasparov, many objections still remain. This is due to the fact that it is not clear how this result can be applied to solve real-world problems or simulate human abilities, e.g., common sense, and also exhibit a form of generalized AI. An evaluation based uniquely on the capacity of playing games, even when enriched by the capability of learning complex rules without any human supervision, is bound to be unsatisfactory. As the internet has dramatically changed the cultural habits and social interaction of users, who continuously exchange information with intelligent agents, it is quite natural to consider cooperation as the next step in AI software evaluation. Although this concept has already been explored in the scientific literature in the fields of economics and mathematics, its consideration in AI is relatively recent and generally covers the study of cooperation between agents. This paper focuses on more complex problems involving heterogeneity (specifically, the cooperation between humans and software agents, or even robots), which are investigated by taking into account ethical issues occurring during attempts to achieve a common goal shared by both parties, with a possible result of either conflict or stalemate. The contribution of this research consists in identifying those factors (trust, autonomy, and cooperative learning) on which to base ethical guidelines in agent software programming, making cooperation a more suitable benchmark for AI applications.", "venue": "AI", "year": 2022, "referenceCount": 61, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2673-2688/3/2/21/pdf?version=1650358673", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-19", "journal": {"name": "AI"}, "authors": [{"authorId": "2945086", "name": "E. Barbierato"}, {"authorId": "2163167100", "name": "Maria Enrica Zamponi"}]}, {"paperId": "f097fb79d7ab0743d96167d419788d4aad8197d7", "externalIds": {"DBLP": "journals/corr/abs-2204-08226", "ArXiv": "2204.08226", "DOI": "10.48550/arXiv.2204.08226", "CorpusId": 248227522}, "corpusId": 248227522, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f097fb79d7ab0743d96167d419788d4aad8197d7", "title": "Empirical Evaluation and Theoretical Analysis for Representation Learning: A Survey", "abstract": "Representation learning enables us to automatically extract generic feature representations from a dataset to solve another machine learning task. Recently, extracted feature representations by a representation learning algorithm and a simple predictor have exhibited state-of-the-art performance on several machine learning tasks. Despite its remarkable progress, there exist various ways to evaluate representation learning algorithms depending on the application because of the \ufb02exibility of representation learning. To understand the current representation learning, we review evaluation methods of representation learning algorithms and theoretical analyses. On the basis of our evaluation survey, we also discuss the future direction of representation learning. Note that this survey is the extended version of Nozawa and Sato [1].", "venue": "ArXiv", "year": 2022, "referenceCount": 219, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-18", "journal": {"volume": "abs/2204.08226", "name": "ArXiv"}, "authors": [{"authorId": "13613520", "name": "Kento Nozawa"}, {"authorId": "73355331", "name": "Issei Sato"}]}, {"paperId": "b90a31fc09a98a9d0ed6b7806a9974375b8cf394", "externalIds": {"DOI": "10.1007/s00266-022-02883-x", "CorpusId": 248231934, "PubMed": "35437664"}, "corpusId": 248231934, "publicationVenue": {"id": "586af07e-1b69-4a8d-b751-b8cd2d934817", "name": "Aesthetic Plastic Surgery", "type": "journal", "alternate_names": ["Aesthetic Plast Surg"], "issn": "0364-216X", "url": "https://www.springer.com/medicine/surgery/journal/266", "alternate_urls": ["https://link.springer.com/journal/266"]}, "url": "https://www.semanticscholar.org/paper/b90a31fc09a98a9d0ed6b7806a9974375b8cf394", "title": "Simulation and Artificial Intelligence in Rhinoplasty: A Systematic Review", "abstract": null, "venue": "Aesthetic Plastic Surgery", "year": 2022, "referenceCount": 49, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-18", "journal": {"volume": "46", "pages": "2368 - 2377", "name": "Aesthetic Plastic Surgery"}, "authors": [{"authorId": "1931416538", "name": "A. Eldaly"}, {"authorId": "121246549", "name": "Francisco R. Avila"}, {"authorId": "2075382530", "name": "Ricardo A. Torres-Guzman"}, {"authorId": "2132057830", "name": "Karla C Maita"}, {"authorId": "2148907723", "name": "John P Garcia"}, {"authorId": "2162800238", "name": "Luiza Palmieri Serrano"}, {"authorId": "34928587", "name": "A. Forte"}]}, {"paperId": "490a946c0bb9bd1e495dfd7dede4e8c9bc5d558a", "externalIds": {"ArXiv": "2204.07904", "DBLP": "journals/corr/abs-2204-07904", "DOI": "10.48550/arXiv.2204.07904", "CorpusId": 248227874, "PubMed": "35932950"}, "corpusId": 248227874, "publicationVenue": {"id": "fd128295-d2c3-40b7-b9b3-ffc8478e2208", "name": "Neuroscience and Biobehavioral Reviews", "type": "journal", "alternate_names": ["Neurosci Biobehav Rev", "Neurosci Biobehav Rev", "Neuroscience & Biobehavioral Reviews"], "issn": "0149-7634", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/831/description#description", "alternate_urls": ["http://www.sciencedirect.com/science/journal/01497634"]}, "url": "https://www.semanticscholar.org/paper/490a946c0bb9bd1e495dfd7dede4e8c9bc5d558a", "title": "Turing\u2019s cascade instability supports the coordination of the mind, brain, and behavior", "abstract": "Turing inspired a computer metaphor of the mind and brain that has been handy and has spawned decades of empirical investigation, but he did much more and offered behavioral and cognitive sciences another metaphor-that of the cascade. The time has come to confront Turing's cascading instability, which suggests a geometrical framework driven by power laws and can be studied using multifractal formalism and multiscale probability density function analysis. Here, we review a rapidly growing body of scientific investigations revealing signatures of cascade instability and their consequences for a perceiving, acting, and thinking organism. We review work related to executive functioning (planning to act), postural control (bodily poise for turning plans into action), and effortful perception (action to gather information in a single modality and action to blend multimodal information). We also review findings on neuronal avalanches in the brain, specifically about neural participation in body-wide cascades. Turing's cascade instability blends the mind, brain, and behavior across space and time scales and provides an alternative to the dominant computer metaphor.", "venue": "Neuroscience and Biobehavioral Reviews", "year": 2022, "referenceCount": 276, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-17", "journal": {"volume": "141", "name": "Neuroscience & Biobehavioral Reviews"}, "authors": [{"authorId": "1399320366", "name": "Damian G. Kelty-Stephen"}, {"authorId": "6964222", "name": "M. Mangalam"}]}, {"paperId": "ad2f54569ce99205628583b458fe6426df421473", "externalIds": {"DOI": "10.1145/3526112", "CorpusId": 248150877}, "corpusId": 248150877, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad2f54569ce99205628583b458fe6426df421473", "title": "Mental State Attribution to Robots: A Systematic Review of Conceptions, Methods, and Findings", "abstract": "The topic of mental state attribution to robots has been approached by researchers from a variety of disciplines, including psychology, neuroscience, computer science, and philosophy. As a consequence, the empirical studies that have been conducted so far exhibit considerable diversity in terms of how the phenomenon is described and how it is approached from a theoretical and methodological standpoint. This literature review addresses the need for a shared scientific understanding of mental state attribution to robots by systematically and comprehensively collating conceptions, methods, and findings from 155 empirical studies across multiple disciplines. The findings of the review include that: (1) the terminology used to describe mental state attribution to robots is diverse but largely homogenous in usage; (2) the tendency to attribute mental states to robots is determined by factors such as the age and motivation of the human as well as the behavior, appearance, and identity of the robot; (3) there is a computer < robot < human pattern in the tendency to attribute mental states that appears to be moderated by the presence of socially interactive behavior; (4) there are conflicting findings in the empirical literature that stem from different sources of evidence, including self-report and non-verbal behavioral or neurological data. The review contributes toward more cumulative research on the topic and opens up for a transdisciplinary discussion about the nature of the phenomenon and what types of research methods are appropriate for investigation.", "venue": "ACM Transactions on Human-Robot Interaction", "year": 2022, "referenceCount": 397, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3526112", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-04-14", "journal": {"volume": "11", "pages": "1 - 51", "name": "ACM Transactions on Human-Robot Interaction (THRI)"}, "authors": [{"authorId": "3489950", "name": "Sam Thellman"}, {"authorId": "1593289156", "name": "Maartje de Graaf"}, {"authorId": "2491309", "name": "T. Ziemke"}]}, {"paperId": "96ab678e084c508842c6a9ce85a97ba7980a93a4", "externalIds": {"PubMedCentral": "9007140", "DOI": "10.1155/2022/2455160", "CorpusId": 248154778, "PubMed": "35432519"}, "corpusId": 248154778, "publicationVenue": {"id": "f32b7322-b69c-4e63-801d-8f50784ef778", "name": "Computational Intelligence and Neuroscience", "type": "journal", "alternate_names": ["Comput Intell Neurosci"], "issn": "1687-5265", "url": "https://www.hindawi.com/journals/cin/"}, "url": "https://www.semanticscholar.org/paper/96ab678e084c508842c6a9ce85a97ba7980a93a4", "title": "Sentimental Analysis of Twitter Users from Turkish Content with Natural Language Processing", "abstract": "Artificial Intelligence has guided technological progress in recent years; it has shown significant development with increased academic studies on Machine Learning and the high demand for this field in the sector. In addition to the advancement of technology day by day, the pandemic, which has become a part of our lives since early 2020, has led to social media occupying a larger place in the lives of individuals. Therefore, social media posts have become an excellent data source for the field of sentiment analysis. The main contribution of this study is based on the Natural Language Processing method, which is one of the machine learning topics in the literature. Sentiment analysis classification is a solid example for machine learning tasks that belongs to human-machine interaction. It is essential to make the computer understand people emotional situation with classifiers. There are a limited number of Turkish language studies in the literature. Turkish language has different types of linguistic features from English. Since Turkish is an agglutinative language, it is challenging to make sentiment analysis with that language. This paper aims to perform sentiment analysis of several machine learning algorithms on Turkish language datasets that are collected from Twitter. In this research, besides using public dataset that belongs to Beyaz (2021) to get more general results, another dataset is created to understand the impact of the pandemic on people and to learn about public opinions. Therefore, a custom dataset, namely, SentimentSet (Balli 2021), was created, consisting of Turkish tweets that were filtered with words such as pandemic and corona by manually marking as positive, negative, or neutral. Besides, SentimentSet could be used in future researches as benchmark dataset. Results show classification accuracy of not only up to \u223c87% with test data from datasets of both datasets and trained models, but also up to \u223c84% with small \u201cSample Test Data\u201d generated by the same methods as SentimentSet dataset. These research results contributed to indicating Turkish language specific sentiment analysis that is dependent on language specifications.", "venue": "Computational Intelligence and Neuroscience", "year": 2022, "referenceCount": 65, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/cin/2022/2455160.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-13", "journal": {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, "authors": [{"authorId": "2162378425", "name": "Cagla Balli"}, {"authorId": "10406004", "name": "Mehmet Serdar Guzel"}, {"authorId": "34702047", "name": "E. Bostanci"}, {"authorId": "2112892229", "name": "Alok Mishra"}]}, {"paperId": "43c4b6dd42abdfa0432d044728eebb7204d0c86c", "externalIds": {"DBLP": "journals/corr/abs-2204-04758", "ArXiv": "2204.04758", "DOI": "10.48550/arXiv.2204.04758", "CorpusId": 248084915}, "corpusId": 248084915, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43c4b6dd42abdfa0432d044728eebb7204d0c86c", "title": "Iceberg Sensemaking: A Process Model for Critical Data Analysis and Visualization", "abstract": "\u2014We offer a new model of the sensemaking process for data science and visual analytics. Whereas past sensemaking models have been built on theoretical foundations in cognitivism and positivism, this model adopts interpretivist foundations in order to reframe data sensemaking in humanistic terms. We identify \ufb01ve key principles centered on the concept of schemas: Tacit and Explicit Schemas, Schemas First and Always, Data as a Schematic Artifact, Schematic Multiplicity, and Sensemaking Over Time. Our model uses the analogy of an iceberg, where data is the visible tip of the schema underneath it. The analysis process iteratively re\ufb01nes both the data and its schema in tandem. We compare the roles of schemas in past sensemaking models and draw conceptual distinctions based on a historical review of schemas in different philosophical traditions. We validate the descriptive, predictive, and explanatory power of our model through four analysis scenarios: uncovering data injustice, investigating of\ufb01cial data, teaching data wrangling, and producing data mashups.", "venue": "ArXiv", "year": 2022, "referenceCount": 83, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-10", "journal": {"volume": "abs/2204.04758", "name": "ArXiv"}, "authors": [{"authorId": "70237455", "name": "C. Berret"}, {"authorId": "1732016", "name": "T. Munzner"}]}, {"paperId": "d7b14a9ac90382df1a4a485408233477256181b4", "externalIds": {"DOI": "10.1108/ijchm-10-2021-1207", "CorpusId": 247985293}, "corpusId": 247985293, "publicationVenue": {"id": "bb6fa91a-0a4c-40f8-80a2-93ceb3ae3bd4", "name": "International Journal of Contemporary Hospitality Management", "type": "journal", "alternate_names": ["Int J Contemp Hosp Manag"], "issn": "0959-6119", "url": "https://www.emerald.com/insight/publication/issn/0959-6119"}, "url": "https://www.semanticscholar.org/paper/d7b14a9ac90382df1a4a485408233477256181b4", "title": "Smart dining, smart restaurant, and smart service quality (SSQ)", "abstract": "\nPurpose\nHave you been to a smart restaurant, and how were its services? A common limitation of hospitality studies stems from the lack of research on how service quality is shaped within smart technology. This study aims to fill this literature void not merely to reiterate the importance of technology but also to recast service quality through the lens of information technology. It synthesizes the 5-S model of smart service quality (AKA SSQ) as a new conceptualization of service quality application in smart hospitality contexts such as smart restaurants.\n\n\nDesign/methodology/approach\nThis study undertook a qualitative research design based on theoretical synthesis from service quality, information technology and attention restoration. Drawing from online review comments and semistructured interviews from smart restaurants, the authors improvised the SSQ model to identify the essence of smart service in smart dining establishments.\n\n\nFindings\n\u201c5-S\u201d reflects an extension of the literature to denote a new SSQ abstraction pertinent to s-servicescape, s-assurance, s-responsiveness, s-reliability and s-empathy. A nomological network was posited to better understand the importance of smart design and consequence of SSQ.\n\n\nResearch limitations/implications\nThe emergence of smart dining gives rise to smart restaurants, which puts technology at center stage. As consumers are becoming increasingly comfortable with self-service technology, auto-payment and ordering systems and robotic services, technology in foodservice will continue to play an essential role to better serve diners. Geared with advanced innovations and intelligent devices, smart restaurants are now more than mere eateries. It is a trend and a lifestyle.\n\n\nOriginality/value\nThis novel SSQ concept adds new nuances to the literature by acknowledging the technological essence in today\u2019s hospitality industry. By integrating smart technology into the service quality paradigm, the authors are able to observe several interesting behaviors exhibited during smart dining, including tech-induced restoration, which opens a new avenue to understand how attention restoration could be attained through immersion in a technologically advanced setting. By synthesizing theoretical essence from service quality, attention restoration and information technology, the authors are able to create a new dialog that should warrant a forum of discussion in future studies.\n", "venue": "International Journal of Contemporary Hospitality Management", "year": 2022, "referenceCount": 99, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-04-07", "journal": {"name": "International Journal of Contemporary Hospitality Management"}, "authors": [{"authorId": "2199012", "name": "I. Wong"}, {"authorId": "2161636178", "name": "Jingwen Huang"}, {"authorId": "2112413741", "name": "Z. Lin"}, {"authorId": "2161566069", "name": "Haoyue Jiao"}]}, {"paperId": "8a859d04581e2178331a68c54eef7788ebf0d60c", "externalIds": {"DBLP": "journals/firai/BertoliniE22", "PubMedCentral": "9037379", "DOI": "10.3389/frobt.2022.842213", "CorpusId": 248071072, "PubMed": "35480089"}, "corpusId": 248071072, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8a859d04581e2178331a68c54eef7788ebf0d60c", "title": "Robots and AI as Legal Subjects? Disentangling the Ontological and Functional Perspective", "abstract": "Robotics and AI-based applications (RAI) are often said to be so technologically advanced that they should be held responsible for their actions, instead of the human who designs or operates them. The paper aims to prove that this thesis (\u201cthe exceptionalist claim\u201d)\u2014as it stands\u2014is both theoretically incorrect and practically inadequate. Indeed, the paper argues that such claim is based on a series of misunderstanding over the very notion and functions of \u201clegal responsibility\u201d, which it then seeks to clarify by developing and interdisciplinary conceptual taxonomy. In doing so, it aims to set the premises for a more constructive debate over the feasibility of granting legal standing to robotic application. After a short Introduction setting the stage of the debate, the paper addresses the ontological claim, distinguishing the philosophical from the legal debate on the notion of i) subjectivity and ii) agency, with their respective implications. The analysis allows us to conclude that the attribution of legal subjectivity and agency are purely fictional and technical solutions to facilitate legal interactions, and is not dependent upon the intrinsic nature of the RAI. A similar structure is maintained with respect to the notion of responsibility, addressed first in a philosophical and then legal perspective, to demonstrate how the latter is often utilized to both pursue ex ante deterrence and ex post compensation. The focus on the second objective allows us to bridge the analysis towards functional (law and economics based) considerations, to discuss how even the attribution of legal personhood may be conceived as an attempt to simplify certain legal interactions and relations. Within such a framework, the discussion whether to attribute legal subjectivity to the machine needs to be kept entirely within the legal domain, and grounded on technical (legal) considerations, to be argued on a functional, bottom-up analysis of specific classes of RAI. That does not entail the attribution of animacy or the ascription of a moral status to the entity itself.", "venue": "Frontiers in Robotics and AI", "year": 2022, "referenceCount": 171, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2022.842213/pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-05", "journal": {"volume": "9", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "2071280576", "name": "A. Bertolini"}, {"authorId": "1395590949", "name": "F. Episcopo"}]}, {"paperId": "94e32a898cc8c62c5a25fb9fa01e94c21fd41da5", "externalIds": {"PubMedCentral": "9552145", "DBLP": "journals/corr/abs-2204-01467", "ArXiv": "2204.01467", "DOI": "10.1038/s42254-022-00518-3", "CorpusId": 247939660, "PubMed": "36247217"}, "corpusId": 247939660, "publicationVenue": {"id": "3639d55b-36ef-4fa6-97fd-1bdc155f9081", "name": "Nature Reviews Physics", "alternate_names": ["Nat Rev Phys"], "issn": "2522-5820", "url": "https://www.nature.com/natrevphys/"}, "url": "https://www.semanticscholar.org/paper/94e32a898cc8c62c5a25fb9fa01e94c21fd41da5", "title": "On scientific understanding with artificial intelligence", "abstract": null, "venue": "Nature Reviews Physics", "year": 2022, "referenceCount": 135, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s42254-022-00518-3.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-04", "journal": {"volume": "4", "pages": "761 - 769", "name": "Nature Reviews. Physics"}, "authors": [{"authorId": "5906965", "name": "Mario Krenn"}, {"authorId": "6161242", "name": "R. Pollice"}, {"authorId": "47508730", "name": "S. Guo"}, {"authorId": "3372027", "name": "Matteo Aldeghi"}, {"authorId": "1403855077", "name": "Alba Cervera-Lierta"}, {"authorId": "35323511", "name": "Pascal Friederich"}, {"authorId": "40133053", "name": "Gabriel dos Passos Gomes"}, {"authorId": "122433803", "name": "Florian Hase"}, {"authorId": "3364349", "name": "A. Jinich"}, {"authorId": "133638577", "name": "AkshatKumar Nigam"}, {"authorId": "12977956", "name": "Zhenpeng Yao"}, {"authorId": "1380248954", "name": "Al\u00e1n Aspuru-Guzik"}]}, {"paperId": "b19f3fdd798ba21d792b9675d5ff58f188fc2f8c", "externalIds": {"DOI": "10.1080/20502877.2022.2062945", "CorpusId": 248181242, "PubMed": "35420976"}, "corpusId": 248181242, "publicationVenue": {"id": "31159ab7-7023-4982-9d60-21bdac921358", "name": "The New Bioethics", "alternate_names": ["New Bioeth"], "issn": "2050-2877", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=ynbi20", "alternate_urls": ["http://www.tandfonline.com/loi/ynbi20"]}, "url": "https://www.semanticscholar.org/paper/b19f3fdd798ba21d792b9675d5ff58f188fc2f8c", "title": "The Making of Imago Hominis: Can We Produce Artificial Companions by Programming Sentience into Robots?", "abstract": "This essay discusses sentient robot (SR) research through the lens of suffering. First three kinds of suffering are considered: physical, psychological, and existential. Physical pain is shown to be primarily subjective, and distinctive psychological and existential sufferings probably do exist, which are neither reducible to neurobiological events, nor replicable through algorithms. The current stage of SR research is then reviewed. Many creative proposals are presented, together with some philosophical and technical challenges posed by other scholars. I then offer my critique of SR research, claiming that it is based on a superficial understanding of suffering and unjustified philosophical presuppositions, namely, reductive physicalism. Without the capability to suffer, robots probably cannot love in any real sense, and no meaningful relationship may be developed between such a robot and a human. Therefore, we are probably unable to produce sentient robots that can become our companions (friends, lovers, etc.).", "venue": "The New Bioethics", "year": 2022, "referenceCount": 58, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-03", "journal": {"volume": "28", "pages": "168 - 185", "name": "The New Bioethics"}, "authors": [{"authorId": "2162526861", "name": "Zishang Yue"}]}, {"paperId": "0986d6ba0cf5671846b231f37d319659da818687", "externalIds": {"DOI": "10.1080/09273948.2022.2054433", "CorpusId": 248127887, "PubMed": "35412935"}, "corpusId": 248127887, "publicationVenue": {"id": "7232bd9a-d17f-44d3-8ea8-f423c97a3219", "name": "Ocular immunology and inflammation", "type": "journal", "alternate_names": ["Ocul Immunol Inflamm", "Ocul immunol inflamm", "Ocular Immunology and Inflammation"], "issn": "0927-3948", "url": "http://www.tandfonline.com/openurl?genre=journal&stitle=ioii20"}, "url": "https://www.semanticscholar.org/paper/0986d6ba0cf5671846b231f37d319659da818687", "title": "Artificial Intelligence and Imaging Processing in Optical Coherence Tomography and Digital Images in Uveitis", "abstract": "ABSTRACT Introduction Computer vision, understood as the area of science that trains computers to interpret digital images through both artificial intelligence (AI) and classical algorithms, has significantly advanced the analysis and interpretation of optical coherence tomography (OCT) in retina research. The aim of this review is to summarise the recent advances of computer vision in imaging processing in uveitis, with a particular focus in optical coherence tomography images. Material and Methods Literature review. Results The development of computer vision to assist uveitis diagnosis and prognosis is still undergoing, but important efforts have been made in the field. Conclusion The automatising of image processing in uveitis could be fundamental to establish objective and standardised outcomes for future clinical trials. In addition, it could help to better understand the disease and its progression.", "venue": "Ocular immunology and inflammation", "year": 2022, "referenceCount": 104, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-03", "journal": {"volume": "30", "pages": "675 - 681", "name": "Ocular Immunology and Inflammation"}, "authors": [{"authorId": "2162235000", "name": "M. Abellanas"}, {"authorId": "2162234288", "name": "Mar\u00eda Jos\u00e9 Elena"}, {"authorId": "5638585", "name": "P. Keane"}, {"authorId": "3497482", "name": "K. Balaskas"}, {"authorId": "4166157", "name": "D. Grewal"}, {"authorId": "4074301", "name": "E. Carre\u00f1o"}]}, {"paperId": "cc0f9bdfce7f525c3de1a72cb24c61265c025190", "externalIds": {"DOI": "10.1080/19322909.2022.2060893", "CorpusId": 248079598}, "corpusId": 248079598, "publicationVenue": {"id": "5f34c91d-631f-488b-810c-07ab7fae6347", "name": "Journal of Web Librarianship", "type": "journal", "alternate_names": ["J Web Librariansh"], "issn": "1932-2909", "url": "http://www.haworthpress.com/store/product.asp?sku=j502", "alternate_urls": ["http://www.tandfonline.com/loi/wjwl20"]}, "url": "https://www.semanticscholar.org/paper/cc0f9bdfce7f525c3de1a72cb24c61265c025190", "title": "Implementing a Chatbot on a Library Website", "abstract": "Abstract A library\u2019s website is a virtual point of contact for interacting with its patrons. Ensuring a library\u2019s website has easily findable content is critical for providing access to library resources and highlighting services and events. One tool for assisting with content findability is a chatbot, a form of artificial intelligence software. In this case study, Lehman College\u2019s Leonard Lief Library implemented Ivy, a proprietary educational software chatbot on its website, the first of its kind for an academic library. This chatbot functioned as a new tool that assisted users seeking information and provided insight to librarians about the kinds of topics students search for via the library website. This article provides the first detailed description in the literature of an implementation of a proprietary chatbot for an academic library.", "venue": "Journal of Web Librarianship", "year": 2022, "referenceCount": 43, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=1400&context=le_pubs", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-03", "journal": {"volume": "16", "pages": "120 - 142", "name": "Journal of Web Librarianship"}, "authors": [{"authorId": "66427909", "name": "Michelle Ehrenpreis"}, {"authorId": "152209517", "name": "J. DeLooper"}]}, {"paperId": "287a1d6654e8f610a90346644c8d0dac6371758e", "externalIds": {"DOI": "10.1007/s11569-021-00407-6", "CorpusId": 255314289}, "corpusId": 255314289, "publicationVenue": {"id": "f151e41a-8da2-4030-aeab-229a2c46ffc7", "name": "NanoEthics", "type": "journal", "alternate_names": ["Nanoethics"], "issn": "1871-4757", "url": "http://www.springer.com/social+sciences/applied+ethics/journal/11569", "alternate_urls": ["https://rd.springer.com/journal/11569"]}, "url": "https://www.semanticscholar.org/paper/287a1d6654e8f610a90346644c8d0dac6371758e", "title": "Performance in the Workplace: a Critical Evaluation of Cognitive Enhancement", "abstract": null, "venue": "NanoEthics", "year": 2022, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11569-021-00407-6.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-01", "journal": {"volume": "16", "pages": "107 - 114", "name": "NanoEthics"}, "authors": [{"authorId": "152482925", "name": "Cengiz Acarturk"}, {"authorId": "120557445", "name": "Baris Mucen"}]}, {"paperId": "e6b3a9a900b7037cb0977bea489c0aa053d94fa0", "externalIds": {"DOI": "10.3390/proceedings2022081105", "CorpusId": 249296966}, "corpusId": 249296966, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e6b3a9a900b7037cb0977bea489c0aa053d94fa0", "title": "Advanced NLP Procedures as Premises for the Reconstruction of the Idea of Knowledge", "abstract": ": This paper evaluates arti\ufb01cial texts produced by the GPT 2 and GPT 3 language models and proposes to use hermeneutic tools for their analysis, putting them on an equal footing with man-made texts. This decision is due to the intelligibility of these texts and the implicit knowledge on which they are based. Since the base of these language models is always the language corpus, it can be assumed that it is the source of this knowledge and that tools such as discourse and, in particular, the theory of discursive space can be used for its analysis.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2504-3900/81/1/5/pdf?version=1661860659", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-01", "journal": {"name": "The 2021 Summit of the International Society for the Study of Information"}, "authors": [{"authorId": "4175098", "name": "R. Maciag"}]}, {"paperId": "6e07e341c8e0063c4c2fcf1d4d8867fee85831b6", "externalIds": {"DOI": "10.1145/3512335", "CorpusId": 248497625}, "corpusId": 248497625, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e07e341c8e0063c4c2fcf1d4d8867fee85831b6", "title": "Workings of science", "abstract": "While most people are not familiar with the details of how artificial intelligence (AI) works, the term itself is becoming more familiar to the non-scientific community, to the point that it (\"AI\") has almost become part of the regular vernacular of the ordinary person. AI has been with us for a long time-from first beginnings in ancient times in the form of automatons and other devices mimicking humans or other animals, through the middle of the last century when the term \"artificial intelligence was actually coined, to the present times where it (the label rather than the actual technology) is entering the psyche of the general public. This article explores the notion that the technology we call artificial intelligence is not yet ripe, but is establishing itself as a science in its own right, and that by 2156-the 200 year anniversary of the coining of the term-the technology should be in a position to deliver on its promises.", "venue": "Ubiquity", "year": 2022, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3512335", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-01", "journal": {"volume": "2022", "pages": "1 - 18", "name": "Ubiquity"}, "authors": [{"authorId": "2903173", "name": "K. Delic"}, {"authorId": "2811225", "name": "J. A. Riley"}]}, {"paperId": "4d948864b35c5ad1656e856c0ed982891d20f6ce", "externalIds": {"DBLP": "journals/suscom/VermaTS22", "DOI": "10.1016/j.suscom.2022.100742", "CorpusId": 248331709}, "corpusId": 248331709, "publicationVenue": {"id": "e1b18316-e0d4-4006-aa13-129890a757fc", "name": "Sustainable Computing: Informatics and Systems", "type": "journal", "alternate_names": ["Sustain Comput Informatics Syst"], "issn": "2210-5379", "url": "http://www.journals.elsevier.com/sustainable-computing"}, "url": "https://www.semanticscholar.org/paper/4d948864b35c5ad1656e856c0ed982891d20f6ce", "title": "EXTREM-EDGE - EXtensions To RISC-V for Energy-efficient ML inference at the EDGE of IoT", "abstract": null, "venue": "Sustainable Computing: Informatics and Systems", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-01", "journal": {"volume": "35", "pages": "100742", "name": "Sustain. Comput. Informatics Syst."}, "authors": [{"authorId": "34555540", "name": "Vaibhav Verma"}, {"authorId": "3414831", "name": "Tommy Tracy"}, {"authorId": "1741387", "name": "M. Stan"}]}, {"paperId": "3bf084bf111325a666eb565c0168246f9f864cac", "externalIds": {"DBLP": "journals/nca/WangLYL22", "DOI": "10.1007/s00521-022-07182-9", "CorpusId": 247908956}, "corpusId": 247908956, "publicationVenue": {"id": "702e18c0-c8c6-4800-a398-42aa159394d1", "name": "Neural computing & applications (Print)", "type": "journal", "alternate_names": ["Neural comput appl (print", "Neural Comput Appl", "Neural Computing and Applications"], "issn": "0941-0643", "url": "https://link.springer.com/journal/521"}, "url": "https://www.semanticscholar.org/paper/3bf084bf111325a666eb565c0168246f9f864cac", "title": "Semantic-aware conditional variational autoencoder for one-to-many dialogue generation", "abstract": null, "venue": "Neural computing & applications (Print)", "year": 2022, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-01", "journal": {"volume": "34", "pages": "13683 - 13695", "name": "Neural Computing and Applications"}, "authors": [{"authorId": "2118416767", "name": "Ye Wang"}, {"authorId": "2075442351", "name": "Jing Liao"}, {"authorId": "32904145", "name": "Hong Yu"}, {"authorId": "40939264", "name": "Jiaxu Leng"}]}, {"paperId": "096c5b6f749320d14b2371248fb41b2c8fa70b06", "externalIds": {"PubMedCentral": "9015736", "DOI": "10.2196/33145", "CorpusId": 247855234, "PubMed": "35363141"}, "corpusId": 247855234, "publicationVenue": {"id": "278131df-030d-4e6c-b083-d57f3b740dc4", "name": "JMIR Research Protocols", "type": "journal", "alternate_names": ["JMIR Res Protoc"], "issn": "1929-0748", "url": "https://www.researchprotocols.org/", "alternate_urls": ["http://www.researchprotocols.org/index"]}, "url": "https://www.semanticscholar.org/paper/096c5b6f749320d14b2371248fb41b2c8fa70b06", "title": "Stakeholder Perspectives on Clinical Decision Support Tools to Inform Clinical Artificial Intelligence Implementation: Protocol for a Framework Synthesis for Qualitative Evidence", "abstract": "Background Quantitative systematic reviews have identified clinical artificial intelligence (AI)-enabled tools with adequate performance for real-world implementation. To our knowledge, no published report or protocol synthesizes the full breadth of stakeholder perspectives. The absence of such a rigorous foundation perpetuates the \u201cAI chasm,\u201d which continues to delay patient benefit. Objective The aim of this research is to synthesize stakeholder perspectives of computerized clinical decision support tools in any health care setting. Synthesized findings will inform future research and the implementation of AI into health care services. Methods The search strategy will use MEDLINE (Ovid), Scopus, CINAHL (EBSCO), ACM Digital Library, and Science Citation Index (Web of Science). Following deduplication, title, abstract, and full text screening will be performed by 2 independent reviewers with a third topic expert arbitrating. The quality of included studies will be appraised to support interpretation. Best-fit framework synthesis will be performed, with line-by-line coding completed by 2 independent reviewers. Where appropriate, these findings will be assigned to 1 of 22 a priori themes defined by the Nonadoption, Abandonment, Scale-up, Spread, and Sustainability framework. New domains will be inductively generated for outlying findings. The placement of findings within themes will be reviewed iteratively by a study advisory group including patient and lay representatives. Results Study registration was obtained from PROSPERO (CRD42021256005) in May 2021. Final searches were executed in April, and screening is ongoing at the time of writing. Full text data analysis is due to be completed in October 2021. We anticipate that the study will be submitted for open-access publication in late 2021. Conclusions This paper describes the protocol for a qualitative evidence synthesis aiming to define barriers and facilitators to the implementation of computerized clinical decision support tools from all relevant stakeholders. The results of this study are intended to expedite the delivery of patient benefit from AI-enabled clinical tools. Trial Registration PROSPERO CRD42021256005; https://tinyurl.com/r4x3thvp International Registered Report Identifier (IRRID) DERR1-10.2196/33145", "venue": "JMIR Research Protocols", "year": 2022, "referenceCount": 32, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.researchprotocols.org/2022/4/e33145/PDF", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-01", "journal": {"volume": "11", "name": "JMIR Research Protocols"}, "authors": [{"authorId": "1404619882", "name": "M. Al-Zubaidy"}, {"authorId": "32243895", "name": "H. Hogg"}, {"authorId": "2834652", "name": "G. Maniatopoulos"}, {"authorId": "4920995", "name": "J. Talks"}, {"authorId": "144055127", "name": "M. Teare"}, {"authorId": "5638585", "name": "P. Keane"}, {"authorId": "2160974829", "name": "Fiona R Beyer"}]}, {"paperId": "d231bfe0a30ee8a0e59d40d5edac4faa6aee7704", "externalIds": {"PubMedCentral": "9240552", "DOI": "10.4103/ijo.IJO_644_22", "CorpusId": 247634286, "PubMed": "35325987"}, "corpusId": 247634286, "publicationVenue": {"id": "2bbc1e45-4074-471d-b003-2c8f5a99cdb0", "name": "Indian Journal of Ophthalmology", "type": "journal", "alternate_names": ["Indian J Ophthalmol"], "issn": "0301-4738", "url": "http://www.ijo.in/"}, "url": "https://www.semanticscholar.org/paper/d231bfe0a30ee8a0e59d40d5edac4faa6aee7704", "title": "Artificial intelligence in ophthalmology - Machines think!", "abstract": "It was 72\u2010years\u2010ago that the British mathematician Alan Turing had posed a provocative question \u201cCan machines think?\u201d in his landmark 1950 paper \u201cComputing Machinery and Intelligence\u201d. He also described a test to evaluate the humanness of the computer.[1] The Turing Test is a 3\u2010player imitation game in which a computer tries to fool a human interrogator into thinking that it\u2019s a person.[1] Seven decades later, despite all the advances in artificial intelligence (AI), no computer has conclusively passed the Turing Test. Despite the failure to conquer the bar of artificial general intelligence prescribed by Turing, computers have come to become an inseparable part of our lives and times. Perhaps, AI is not meant to evolve like a human mind. As Stuart Russell and Peter Norvig pointed out, \u201cAeronautical engineering texts do not define the goal of their field as making machines that fly so exactly like pigeons that they can fool other pigeons.\u201d The evolution of AI has opened yet unfathomable new paradigms in several domains that intricately affect us, including medicine.", "venue": "Indian Journal of Ophthalmology", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2022-04-01", "journal": {"volume": "70", "pages": "1075 - 1079", "name": "Indian Journal of Ophthalmology"}, "authors": [{"authorId": "5267467", "name": "S. Honavar"}]}, {"paperId": "6157aded1cc77adfa428ae315abca22b5fcea69f", "externalIds": {"PubMedCentral": "9008134", "DOI": "10.3389/fnsys.2022.800280", "CorpusId": 247799011, "PubMed": "35431820"}, "corpusId": 247799011, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6157aded1cc77adfa428ae315abca22b5fcea69f", "title": "Understanding Is a Process", "abstract": "How do we gauge understanding? Tests of understanding, such as Turing's imitation game, are numerous; yet, attempts to achieve a state of understanding are not satisfactory assessments. Intelligent agents designed to pass one test of understanding often fall short of others. Rather than approaching understanding as a system state, in this paper, we argue that understanding is a process that changes over time and experience. The only window into the process is through the lens of natural language. Usefully, failures of understanding reveal breakdowns in the process. We propose a set of natural language-based probes that can be used to map the degree of understanding a human or intelligent system has achieved through combinations of successes and failures.", "venue": "Frontiers in Systems Neuroscience", "year": 2022, "referenceCount": 160, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fnsys.2022.800280/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-31", "journal": {"volume": "16", "name": "Frontiers in Systems Neuroscience"}, "authors": [{"authorId": "2684131", "name": "L. Blaha"}, {"authorId": "122860492", "name": "Mitchell Abrams"}, {"authorId": "3390221", "name": "Sarah A Bibyk"}, {"authorId": "3202888", "name": "Claire Bonial"}, {"authorId": "11880712", "name": "B. M. Hartzler"}, {"authorId": "2160853175", "name": "Christopher D. Hsu"}, {"authorId": "2011661", "name": "S. Khemlani"}, {"authorId": "2116964118", "name": "Jayde King"}, {"authorId": "47793058", "name": "R. St. Amant"}, {"authorId": "145209749", "name": "J. Trafton"}, {"authorId": "2160754294", "name": "Rachel Wong"}]}, {"paperId": "353891dd5038780069ebf0c1c0ec777cb2632d14", "externalIds": {"DBLP": "journals/corr/abs-2204-05138", "ArXiv": "2204.05138", "DOI": "10.48550/arXiv.2204.05138", "CorpusId": 248085552}, "corpusId": 248085552, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/353891dd5038780069ebf0c1c0ec777cb2632d14", "title": "Artificial Intelligence Software Structured to Simulate Human Working Memory, Mental Imagery, and Mental Continuity", "abstract": "This article presents an artificial intelligence (AI) architecture intended to simulate the human working memory system as well as the manner in which it is updated iteratively. It features several interconnected neural networks designed to emulate the specialized modules of the cerebral cortex. These are structured hierarchically and integrated into a global workspace. They are capable of temporarily maintaining high-level patterns akin to the psychological items maintained in working memory. This maintenance is made possible by persistent neural activity in the form of two modalities: sustained neural firing (resulting in a focus of attention) and synaptic potentiation (resulting in a short-term store). This persistent activity is updated iteratively resulting in incremental changes to the content of the working memory system. As the content stored in working memory gradually evolves, successive states overlap and are continuous with one another. The present article will explore how this architecture can lead to gradual shift in the distribution of coactive representations, ultimately leading to mental continuity between processing states, and thus to human-like cognition. map with an iteratively updated working memory store may provide an AI system with the cognitive assets needed to produce generalized intelligence.", "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-29", "journal": {"volume": "abs/2204.05138", "name": "ArXiv"}, "authors": [{"authorId": "4725371", "name": "J. Reser"}]}, {"paperId": "404bce8e7be98ada1b8d7338d9daa6e5031626dd", "externalIds": {"ArXiv": "2204.01466", "DBLP": "journals/corr/abs-2204-01466", "DOI": "10.48550/arXiv.2204.01466", "CorpusId": 247940084}, "corpusId": 247940084, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/404bce8e7be98ada1b8d7338d9daa6e5031626dd", "title": "A single Long Short-Term Memory network for enhancing the prediction of path-dependent plasticity with material heterogeneity and anisotropy", "abstract": "This study presents applicability of conventional deep recurrent neural networks (RNN) to predict path-dependent plasticity associated with material heterogeneity and anisotropy. Although the architecture of RNN possess inductive biases toward information over time, it is a still challenging to to learn the path-dependent material behavior as a function of loading path considering the change from elastic to elasto-plastic regimes. Our attempt is to develop a simple machine-learning based model that can replicate elastoplastic behaviors considering material heterogeneity and anisotropy. The basic Long-Short Term Memory Unit (LSTM) is adopted for the modeling of plasticity in the two-dimensional space by enhancing the inductive bias toward the past information through manipulating input variables. Our results find that a single LSTM based model can capture the J2 plasticity responses under both monotonic and arbitrary loading paths provided the material heterogeneity. The proposed neural network architecture is then used to model elasto-plastic responses of a two-dimensional transversely anisotropic material associated with computational homogenization (FE 2 ). It is also found that a single LSTM model can be used to accurately and effectively capture the path-dependent responses of heterogeneous and anisotropic microstructures under arbitrary mechanical loading conditions.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-29", "journal": {"volume": "abs/2204.01466", "name": "ArXiv"}, "authors": [{"authorId": "2161343141", "name": "Eshan Motevali Haghighi"}, {"authorId": "98495515", "name": "S. Na"}]}, {"paperId": "cc7663332d14450414ceb3dc914627be1c547212", "externalIds": {"DOI": "10.3389/feduc.2022.755914", "CorpusId": 247783373}, "corpusId": 247783373, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc7663332d14450414ceb3dc914627be1c547212", "title": "Teacher\u2019s Perceptions of Using an Artificial Intelligence-Based Educational Tool for Scientific Writing", "abstract": "Efforts have constantly been made to incorporate AI into teaching and learning; however, the successful implementation of new instructional technologies is closely related to the attitudes of the teachers who lead the lesson. Teachers\u2019 perceptions of AI utilization have only been investigated by only few scholars due an overall lack of experience of teachers regarding how AI can be utilized in the classroom as well as no specific idea of what AI-adopted tools would be like. This study investigated how teachers perceived an AI-enhanced scaffolding system developed to support students\u2019 scientific writing for STEM education. Results revealed that most STEM teachers positively experienced AI as a source for superior scaffolding. On the other hand, they also raised the possibility of several issues caused by using AI such as the change in the role played by the teachers in the classroom and the transparency of the decisions made by the AI system. These results can be used as a foundation for which to create guidelines for the future integration of AI with STEM education in schools, since it reports teachers\u2019 experiences utilizing the system and various considerations regarding its implementation.", "venue": "Frontiers in Education", "year": 2022, "referenceCount": 100, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/feduc.2022.755914/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-29", "journal": {"volume": "7"}, "authors": [{"authorId": "50826575", "name": "N. Kim"}, {"authorId": "47596860", "name": "Min Kyu Kim"}]}, {"paperId": "35e717eb3d32960db8cd67bd51485db96a8f4dac", "externalIds": {"DBLP": "journals/corr/abs-2203-14641", "ArXiv": "2203.14641", "DOI": "10.48550/arXiv.2203.14641", "CorpusId": 247762961}, "corpusId": 247762961, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/35e717eb3d32960db8cd67bd51485db96a8f4dac", "title": "Subjective Evaluation of Deep Learning Models for Symbolic Music Composition", "abstract": "Deep learning models are typically evaluated to measure and compare their performance on a given task. The metrics that are commonly used to evaluate these models are standard metrics that are used for different tasks. In the field of music composition or generation, the standard metrics used in other fields have no clear meaning in terms of music theory. In this paper, we propose a subjective method to evaluate AI-based music composition systems by asking questions related to basic music principles to different levels of users based on their musical experience and knowledge. We use this method to compare state-of-the-art models for music composition with deep learning. We give the results of this evaluation method and we compare the responses of each user level for each evaluated model.", "venue": "ArXiv", "year": 2022, "referenceCount": 19, "citationCount": 4, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-28", "journal": {"volume": "abs/2203.14641", "name": "ArXiv"}, "authors": [{"authorId": "1882682548", "name": "Carlos Hernandez-Olivan"}, {"authorId": "2160542077", "name": "Jorge Abadias Puyuelo"}, {"authorId": "23531502", "name": "J. R. Beltr\u00e1n"}]}, {"paperId": "cd3d2b3a182c76cb0020cb2e725a9bfe88846dd5", "externalIds": {"ArXiv": "2204.01518", "DBLP": "journals/corr/abs-2204-01518", "DOI": "10.5121/csit.2022.120613", "CorpusId": 247824075}, "corpusId": 247824075, "publicationVenue": {"id": "da625a67-4bac-4737-81b6-af5459021b72", "name": "Embedded Systems and Applications", "type": "conference", "alternate_names": ["ESA", "European Symposium on Algorithms", "Embed Syst Appl", "Eur Symp Algorithm"], "url": "http://esa-symposium.org/"}, "url": "https://www.semanticscholar.org/paper/cd3d2b3a182c76cb0020cb2e725a9bfe88846dd5", "title": "Artificial Intelligence: Framework of driving triggers to past, present and future applications and influencers of industry sector adoption", "abstract": "To gain a sense of the development of Artificial Intelligence (AI), this research analyzes what has been done in the past, presently in the last decade and what is predicted for the next several decades. The paper will highlight the biggest changes in AI and give examples of how these technologies are applied in several key industry sectors along with influencers that can affect adoption speed. Lastly, the research examines the driving triggers such as cost, speed, accuracy, diversity/inclusion and interdisciplinary research/collaboration that propel AI into an essential transformative technology.", "venue": "Embedded Systems and Applications", "year": 2022, "referenceCount": 100, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://doi.org/10.5121/csit.2022.120613", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-26", "journal": {"volume": "abs/2204.01518", "name": "ArXiv"}, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "2160808545", "name": "Susan Kaplan"}]}, {"paperId": "519db754d020a51bd960d5549e2955fd47652e2b", "externalIds": {"PubMedCentral": "8990896", "DOI": "10.3389/fmed.2022.807994", "CorpusId": 247769262, "PubMed": "35402468"}, "corpusId": 247769262, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/519db754d020a51bd960d5549e2955fd47652e2b", "title": "Use of Artificial Intelligence to Identify New Mechanisms and Approaches to Therapy of Bone Disorders Associated With Chronic Kidney Disease", "abstract": "Chronic kidney disease (CKD) leads to clinically severe bone loss, resulting from the deranged mineral metabolism that accompanies CKD. Each individual patient presents a unique combination of risk factors, pathologies, and complications of bone disease. The complexity of the disorder coupled with our incomplete understanding of the pathophysiology has significantly hampered the ability of nephrologists to prevent fractures, a leading comorbidity of CKD. Much has been learned from animal models; however, we propose in this review that application of multiple techniques of mathematical modeling and artificial intelligence can accelerate our ability to develop relevant and impactful clinical trials and can lead to better understanding of the osteoporosis of CKD. We highlight the foundational work that informed our current model development and discuss the potential applications of our approach combining principles of quantitative systems pharmacology, model predictive control, and reinforcement learning to deliver individualized precision medical therapy of this highly complex disorder.", "venue": "Frontiers in Medicine", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-03-25", "journal": {"volume": "9", "name": "Frontiers in Medicine"}, "authors": [{"authorId": "3320160", "name": "A. Gaweda"}, {"authorId": "35184257", "name": "E. Lederer"}, {"authorId": "35218620", "name": "M. Brier"}]}, {"paperId": "f281ad6573ed8ea7fb3116a3747b0e80ef522ea9", "externalIds": {"DBLP": "journals/corr/abs-2203-12687", "ArXiv": "2203.12687", "DOI": "10.1080/10447318.2022.2050543", "CorpusId": 247628267}, "corpusId": 247628267, "publicationVenue": {"id": "d4567476-a9c8-4148-9c15-b2be5094bdce", "name": "International Journal of Human-Computer Interaction", "type": "journal", "alternate_names": ["Int J Human-computer Interact", "International Journal of Human-computer Interaction"], "issn": "1044-7318", "url": "http://www.catchword.com/rpsv/catchword/erlbaum/10447318/contp1-1.htm", "alternate_urls": ["http://www.erlbaum.com/Journals/journals/IJHCI/ijhci.htm", "http://www.tandfonline.com/loi/hihc/current", "http://www.tandfonline.com/loi/hihc20"]}, "url": "https://www.semanticscholar.org/paper/f281ad6573ed8ea7fb3116a3747b0e80ef522ea9", "title": "Trust in AI and Its Role in the Acceptance of AI Technologies", "abstract": "As AI-enhanced technologies become common in a variety of domains, there is an increasing need to define and examine the trust that users have in such technologies. Given the progress in the development of AI, a correspondingly sophisticated understanding of trust in the technology is required. This paper addresses this need by explaining the role of trust on the intention to use AI technologies. Study 1 examined the role of trust in the use of AI voice assistants based on survey responses from college students. A path analysis confirmed that trust had a significant effect on the intention to use AI, which operated through perceived usefulness and participants\u2019 attitude toward voice assistants. In Study 2, using data from a representative sample of the U.S. population, different dimensions of trust were examined using exploratory factor analysis, which yielded two dimensions: human-like trust and functionality trust. The results of the path analyses from Study 1 were replicated in Study 2, confirming the indirect effect of trust and the effects of perceived usefulness, ease of use, and attitude on intention to use. Further, both dimensions of trust shared a similar pattern of effects within the model, with functionality-related trust exhibiting a greater total impact on usage intention than human-like trust. Overall, the role of trust in the acceptance of AI technologies was significant across both studies. This research contributes to the advancement and application of the TAM in AI-related applications and offers a multidimensional measure of trust that can be utilized in the future study of trustworthy AI.", "venue": "International Journal of Human-Computer Interaction", "year": 2022, "referenceCount": 66, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2203.12687", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-03-23", "journal": {"volume": "abs/2203.12687", "name": "ArXiv"}, "authors": [{"authorId": "51191513", "name": "Hyesun Choung"}, {"authorId": "40955731", "name": "Prabu David"}, {"authorId": "2142143664", "name": "Arun Ross"}]}, {"paperId": "5c2ee6c183538498061540e6d942977a23a2e652", "externalIds": {"DOI": "10.32749/nucleodoconhecimento.com.br/tecnologia/premio-loebner", "CorpusId": 248014198}, "corpusId": 248014198, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c2ee6c183538498061540e6d942977a23a2e652", "title": "Intelig\u00eancia artificial e o teste de Turing: uma an\u00e1lise do pr\u00eamio Loebner de 2017 e 2018", "abstract": "A partir dos estudos iniciais sobre as compet\u00eancias de Intelig\u00eancia Artificial (IA), na d\u00e9cada de 1950, Alan Turing, em seu artigo Computing Machinery and intelligence, inseriu a premissa \u201cM\u00e1quinas s\u00e3o capazes de pensar?\u201d. Nesse sentido, percebe-se que os chatbots est\u00e3o diretamente relacionados a essa ideia, haja vista que eles s\u00e3o capazes de conversar e de aprender, via deep learning, para se adaptar em diversos cen\u00e1rios de conversa\u00e7\u00e3o. A pergunta de pesquisa deste artigo \u00e9: as avalia\u00e7\u00f5es das IAs finalistas que disputam o pr\u00eamio Loebner s\u00e3o coerentes com as ideias propostas por Turing? Sendo assim, o objetivo deste artigo \u00e9: analisar as solu\u00e7\u00f5es de IA apresentadas no pr\u00eamio Loebner (correlacionando com o teste de Turing) e atribuir uma pontua\u00e7\u00e3o pr\u00f3pria para elas. Ao final, v\u00ea-se, ap\u00f3s a aplica\u00e7\u00e3o do teste aos finalistas do pr\u00eamio de Loebner, a discrep\u00e2ncia de pontua\u00e7\u00f5es entre a campe\u00e3 Mitsuku e as demais IAs. Al\u00e9m disso, constatou-se, que apesar da sua pontua\u00e7\u00e3o elevada, o problema da mimetiza\u00e7\u00e3o ainda \u00e9 diretamente implicado nas IAs que realizam o teste justamente com o objetivo de ganhar a prova, interferindo, dessa forma, nas reais capacidades da IA testada.", "venue": "Revista Cient\u00edfica Multidisciplinar N\u00facleo do Conhecimento", "year": 2022, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-03-22", "journal": {"name": "Revista Cient\u00edfica Multidisciplinar N\u00facleo do Conhecimento"}, "authors": [{"authorId": "2190727999", "name": "R. E. Silva"}, {"authorId": "122493651", "name": "A. F. D. Souza"}, {"authorId": "2137242091", "name": "Polyana Santos Fonseca Nascimento"}, {"authorId": "102568924", "name": "Pedro Henrique Sales Girotto"}]}, {"paperId": "b37ab9d42fe9336f362342e75ed029bf52d37f1c", "externalIds": {"DBLP": "journals/air/ZhengYGW22", "DOI": "10.1007/s10462-022-10166-9", "CorpusId": 247601588}, "corpusId": 247601588, "publicationVenue": {"id": "ea8553fe-2467-4367-afee-c4deb3754820", "name": "Artificial Intelligence Review", "type": "journal", "alternate_names": ["Artif Intell Rev"], "issn": "0269-2821", "url": "https://link.springer.com/journal/10462"}, "url": "https://www.semanticscholar.org/paper/b37ab9d42fe9336f362342e75ed029bf52d37f1c", "title": "Computational knowledge vision: paradigmatic knowledge based prescriptive learning and reasoning for perception and vision", "abstract": null, "venue": "Artificial Intelligence Review", "year": 2022, "referenceCount": 275, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-21", "journal": {"volume": "55", "pages": "5917 - 5952", "name": "Artificial Intelligence Review"}, "authors": [{"authorId": "48499775", "name": "Wenbo Zheng"}, {"authorId": "151486225", "name": "Lan Yan"}, {"authorId": "1491637173", "name": "Chao Gou"}, {"authorId": "47939505", "name": "Fei-Yue Wang"}]}, {"paperId": "52e0280c4789483920cd3f912e19e1d5c49f0f46", "externalIds": {"DOI": "10.1007/s42438-022-00303-6", "CorpusId": 247606277}, "corpusId": 247606277, "publicationVenue": {"id": "e7d1017a-902c-4332-87a6-600c2d33cbbc", "name": "Postdigital Science and Education", "type": "journal", "alternate_names": ["Postdigital Sci Educ"], "issn": "2662-5326", "alternate_issns": ["2524-4868", "2524-485X"], "url": "https://link.springer.com/journal/42438", "alternate_urls": ["https://link.springer.com/journal/volumesAndIssues/42438"]}, "url": "https://www.semanticscholar.org/paper/52e0280c4789483920cd3f912e19e1d5c49f0f46", "title": "Towards Turing Test 2.0\u2014Attribution of Moral Status and Personhood to Human and Non-Human Agents", "abstract": null, "venue": "Postdigital Science and Education", "year": 2022, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-03-21", "journal": {"volume": "4", "pages": "860 - 876", "name": "Postdigital Science and Education"}, "authors": [{"authorId": "2159615035", "name": "Aleksandra Lukaszewicz"}, {"authorId": "2066044296", "name": "Pawe\u0142 Fortuna"}]}, {"paperId": "fa4701be8952563b1d4c5355ef08ad7836f60192", "externalIds": {"ArXiv": "2203.10317", "DBLP": "journals/corr/abs-2203-10317", "DOI": "10.1007/978-3-031-13324-4_47", "CorpusId": 247594200}, "corpusId": 247594200, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fa4701be8952563b1d4c5355ef08ad7836f60192", "title": "Practical Recommendations for Replay-based Continual Learning Methods", "abstract": null, "venue": "ICIAP Workshops", "year": 2022, "referenceCount": 33, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2203.10317", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-19", "journal": {"pages": "548-559"}, "authors": [{"authorId": "2159540263", "name": "Gabriele Merlin"}, {"authorId": "2055550", "name": "Vincenzo Lomonaco"}, {"authorId": "47167661", "name": "Andrea Cossu"}, {"authorId": "144689520", "name": "Antonio Carta"}, {"authorId": "3224102", "name": "D. Bacciu"}]}, {"paperId": "2c39fcfc4848049dcc89230e3cf28ce441f93f9d", "externalIds": {"DOI": "10.3390/philosophies7020033", "CorpusId": 247605037}, "corpusId": 247605037, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c39fcfc4848049dcc89230e3cf28ce441f93f9d", "title": "Intuition and Ingenuity: G\u00f6del on Turing\u2019s \u201cPhilosophical Error\u201d", "abstract": "Despite his unreserved appreciation of Turing\u2019s analysis for being a \u201cprecise and unquestionably adequate definition\u201d of formal system or mechanical computability, G\u00f6del nevertheless published a short note in 1972 claiming to have found a \u201cphilosophical error\u201d in Turing\u2019s argument with regard to the finite nature of mental states and memory. A natural question arises: how could G\u00f6del enjoy the generality conferred on his results by Turing\u2019s work, despite the error of its ways? Previous interpretative strategies by Feferman, Shagrir and others have mainly tried to resolve the disparity by distinguishing different types of arguments in Turing and taking G\u00f6del to approve only some of them. By a more integral examination of their ideas, especially Turing\u2019s response to the \u201cmathematical objection\u201d based on G\u00f6del\u2019s incompleteness theorem and G\u00f6del\u2019s own conception of finite yet non-mechanical procedures, and taking some of the main ideas of current developments in machine learning into consideration, I will try to present a new explanation for the apparent disparity, arguing that there is no \u201cerror\u201d on Turing\u2019s side and the seemingly conflicting views held by Turing and G\u00f6del should best be seen as complementary, keeping intuition and ingenuity together.", "venue": "Philosophies", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/7/2/33/pdf?version=1647850582", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-18", "journal": {"name": "Philosophies"}, "authors": [{"authorId": "2118172775", "name": "Long Chen"}]}, {"paperId": "cd1af17599fa7dc6c2bc9247b9f44e420f1a3d64", "externalIds": {"PubMedCentral": "8944871", "DOI": "10.1073/pnas.2107151119", "CorpusId": 247499099, "PubMed": "35294283"}, "corpusId": 247499099, "publicationVenue": {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the National Academy of Sciences of the United States of America", "type": "journal", "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, "url": "https://www.semanticscholar.org/paper/cd1af17599fa7dc6c2bc9247b9f44e420f1a3d64", "title": "The difficulty of computing stable and accurate neural networks: On the barriers of deep learning and Smale\u2019s 18th problem", "abstract": "Significance Instability is the Achilles\u2019 heel of modern artificial intelligence (AI) and a paradox, with training algorithms finding unstable neural networks (NNs) despite the existence of stable ones. This foundational issue relates to Smale\u2019s 18th mathematical problem for the 21st century on the limits of AI. By expanding methodologies initiated by G\u00f6del and Turing, we demonstrate limitations on the existence of (even randomized) algorithms for computing NNs. Despite numerous existence results of NNs with great approximation properties, only in specific cases do there also exist algorithms that can compute them. We initiate a classification theory on which NNs can be trained and introduce NNs that\u2014under suitable conditions\u2014are robust to perturbations and exponentially accurate in the number of hidden layers.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 2022, "referenceCount": 85, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-16", "journal": {"volume": "119", "name": "Proceedings of the National Academy of Sciences of the United States of America"}, "authors": [{"authorId": "51445731", "name": "Matthew J. Colbrook"}, {"authorId": "72167909", "name": "Vegard Antun"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": "3a10e1f4d26aa3a1931abd0e2f764fb32ed15208", "externalIds": {"DOI": "10.3390/proceedings2022081053", "CorpusId": 247612933}, "corpusId": 247612933, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a10e1f4d26aa3a1931abd0e2f764fb32ed15208", "title": "The Science of Information Processing Structures and the Design of a New Class of Distributed Computing Structures", "abstract": "Classical computer science (CCS) based on the universal Turing machine has given us tools to decipher the mysteries of physical, chemical, and biological systems in nature. Symbolic computing and sub-symbolic computing have allowed us to model and analyze various observations (including both mental and physical processes) and optimize our interactions with each other and with our environment. In this paper, we present the limitations of CCS to model the autopoietic and cognitive behaviors of living organisms. We discuss the new science of information processing structures (SIPS), which allows us not only to model but also implement digital automata with these behaviors.", "venue": "IS4SI 2021", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2504-3900/81/1/53/pdf?version=1647485241", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-16", "journal": {"name": "IS4SI 2021"}, "authors": [{"authorId": "3289961", "name": "Rao V. Mikkilineni"}]}, {"paperId": "2b5da9ec9120d72f6d6af2973079763a569b6178", "externalIds": {"ArXiv": "2208.08666", "DBLP": "journals/corr/abs-2208-08666", "DOI": "10.48550/arXiv.2208.08666", "CorpusId": 251643865}, "corpusId": 251643865, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2b5da9ec9120d72f6d6af2973079763a569b6178", "title": "On an Application of Generative Adversarial Networks on Remaining Lifetime Estimation", "abstract": "A major problem of structural health monitoring (SHM) has been the prognosis of damage and the prediction of the remaining useful life of a structure. Both tasks depend on multiple parameters, many of which are often uncertain. A wide range of models have been developed for the aforementioned tasks, but they have been either deterministic or stochastic with the ability to take into account only a restricted set of past states of the structure. In the current work, a generative model is proposed in order to make predictions about the damage evolution of structures. The model is able to perform in a population-based SHM (PBSHM) framework, to take into account many past states of the damaged structure, to incorporate uncertainties in the modelling process and to generate potential damage evolution outcomes according to data acquired from a structure. The algorithm is tested on a simulated damage evolution example and the results reveal that it is able to provide quite confident predictions about the remaining useful life of structures within a population.", "venue": "Proceedings of the 13th International Workshop on Structural Health Monitoring", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-15", "journal": {"volume": "abs/2208.08666", "name": "ArXiv"}, "authors": [{"authorId": "2012104962", "name": "G. Tsialiamanis"}, {"authorId": "65755313", "name": "D. Wagg"}, {"authorId": "2482415", "name": "N. Dervilis"}, {"authorId": "2103006625", "name": "K. Worden"}]}, {"paperId": "abca9c129e607943d50c0b51de6024b787218c1d", "externalIds": {"DOI": "10.1080/02773945.2022.2032814", "CorpusId": 248588479}, "corpusId": 248588479, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/abca9c129e607943d50c0b51de6024b787218c1d", "title": "\u201cIt\u2019s Promethean, Man!\u201d: The Frankenstein Myth and Rhetorical Invention", "abstract": "ABSTRACT Frankenstein myths circulate widely in Western culture and offer robust indices of common anxieties about invention. This essay articulates a version of the Frankenstein myth that emphasizes potential contributions to the practice and teaching of rhetoric. Specifically, this essay suggests that this myth about the practice of invention in general can contribute to understandings of rhetorical invention in particular, especially with regard to the extent to which rhetorical invention may, in some instances, be informed by themes associated with deception, duality, and autonomy. The essay closes with a discussion of implications and limitations.", "venue": "Rhetoric Society Quarterly", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-15", "journal": {"volume": "52", "pages": "122 - 136", "name": "Rhetoric Society Quarterly"}, "authors": [{"authorId": "66295572", "name": "R. Terrill"}]}, {"paperId": "5453cfde0a4c29403a3ac7d863904ad33dd3e461", "externalIds": {"DBLP": "journals/scientometrics/SantosM22", "DOI": "10.1007/s11192-022-04327-4", "CorpusId": 247428045}, "corpusId": 247428045, "publicationVenue": {"id": "96c1b36d-3833-4ec5-8806-48b8a93f901d", "name": "Scientometrics", "type": "journal", "issn": "0138-9130", "url": "https://www.springer.com/computer/database+management+&+information+retrieval/journal/11192", "alternate_urls": ["http://www.springer.com/computer/database+management+%26+information+retrieval/journal/11192", "https://link.springer.com/journal/11192"]}, "url": "https://www.semanticscholar.org/paper/5453cfde0a4c29403a3ac7d863904ad33dd3e461", "title": "Do papers (really) match journals\u2019 \u201caims and scope\u201d? A computational assessment of innovation studies", "abstract": null, "venue": "Scientometrics", "year": 2022, "referenceCount": 153, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-12", "journal": {"volume": "127", "pages": "7449 - 7470", "name": "Scientometrics"}, "authors": [{"authorId": "2155617650", "name": "Ana Teresa Santos"}, {"authorId": "114632938", "name": "S. Mendon\u00e7a"}]}, {"paperId": "842e92b8a17e6fb591e2a28e4660ae1f41561c37", "externalIds": {"ArXiv": "2203.05875", "DBLP": "journals/corr/abs-2203-05875", "DOI": "10.48550/arXiv.2203.05875", "CorpusId": 247411482}, "corpusId": 247411482, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/842e92b8a17e6fb591e2a28e4660ae1f41561c37", "title": "Using Word Embeddings to Analyze Protests News", "abstract": "The first two tasks of the CLEF 2019 ProtestNews events focused on distinguishing between protest and non-protest related news articles and sentences in a binary classification task. Among the submissions, two well performing models have been chosen in order to replace the existing word embeddings word2vec and FastTest with ELMo and DistilBERT. Unlike bag of words or earlier vector approaches, ELMo and DistilBERT represent words as a sequence of vectors by capturing the meaning based on contextual information in the text. Without changing the architecture of the original models other than the word embeddings, the implementation of DistilBERT improved the performance measured on the F1-Score of 0.66 compared to the FastText implementation. DistilBERT also outperformed ELMo in both tasks and models. Cleaning the datasets by removing stopwords and lemmatizing the words has been shown to make the models more generalizable across different contexts when training on a dataset with Indian news articles and evaluating the models on a dataset with news articles from China.", "venue": "ArXiv", "year": 2022, "referenceCount": 29, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-11", "journal": {"volume": "abs/2203.05875", "name": "ArXiv"}, "authors": [{"authorId": "2158660481", "name": "Maria Alejandra Cardoza Ceron"}]}, {"paperId": "8454fcc2a0f783ec9668432afda2a69b60b8eb13", "externalIds": {"DOI": "10.1108/jaoc-08-2020-0107", "CorpusId": 247372282}, "corpusId": 247372282, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8454fcc2a0f783ec9668432afda2a69b60b8eb13", "title": "Management accounting and the concepts of exploratory data analysis and unsupervised machine learning: a literature study and future directions", "abstract": "\nPurpose\nThis paper contributes to the literature by discussing the impact of machine learning (ML) on management accounting (MA) and the management accountant based on three sources: academic articles, papers and reports from accounting bodies and consulting companies. The purpose of this paper is to identify, discuss and provide suggestions for how ML could be included in research and education in the future for the management accountant.\n\n\nDesign/methodology/approach\nThis paper identifies three types of studies on the influence of ML on MA issued between 2015 and 2021 in mainstream accounting journals, by professional accounting bodies and by large consulting companies.\n\n\nFindings\nFirst, only very few academic articles actually show examples of using ML or using different algorithms related to MA issues. This is in contrast to other research fields such as finance and logistics. Second, the literature review also indicates that if the management accountants want to keep up with the demand of their qualifications, they must take action now and begin to discuss how big data and other concepts from artificial intelligence and ML can benefit MA and the management accountant in specific ways.\n\n\nOriginality/value\nEven though the paper may be classified as inspirational in nature, the paper documents and discusses the revised environment that surrounds the accountant today. The paper concludes by highlighting specifically the necessity of including exploratory data analysis and unsupervised ML in the field of MA to close the existing gaps in both education and research and thus making the MA profession future-proof.\n", "venue": "Journal of Accounting & Organizational Change", "year": 2022, "referenceCount": 112, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-03-11", "journal": {"name": "Journal of Accounting & Organizational Change"}, "authors": [{"authorId": "2053600377", "name": "Steen Nielsen"}]}, {"paperId": "d7ce3e79413de753e95b519750416b7e4ff65e50", "externalIds": {"DOI": "10.1177/17456916211029942", "CorpusId": 247384096, "PubMed": "35271777"}, "corpusId": 247384096, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d7ce3e79413de753e95b519750416b7e4ff65e50", "title": "Where\u2019s My Consciousness-Ometer? How to Test for the Presence and Complexity of Consciousness", "abstract": "Tools and tests for measuring the presence and complexity of consciousness are becoming available, but there is no established theoretical approach for what these tools are measuring. This article examines several categories of tests for making reasonable inferences about the presence and complexity of consciousness (defined as the capacity for phenomenal/subjective experience) and also suggests ways in which different theories of consciousness may be empirically distinguished. We label the various ways to measure consciousness the measurable correlates of consciousness (MCC) and include three subcategories in our taxonomy: (a) neural correlates of consciousness, (b) behavioral correlates of consciousness, and (c) creative correlates of consciousness. Finally, we reflect on how broader philosophical views about the nature of consciousness, such as materialism and panpsychism, may also be informed by the scientific process.", "venue": "Perspectives on psychological science : a journal of the Association for Psychological Science", "year": 2022, "referenceCount": 110, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-10", "journal": {"volume": "17", "pages": "1150 - 1165", "name": "Perspectives on Psychological Science"}, "authors": [{"authorId": "29376453", "name": "Tam Hunt"}, {"authorId": "40313342", "name": "M. Ericson"}, {"authorId": "2809346", "name": "J. Schooler"}]}, {"paperId": "f1d3f2903e7989df6aab3e9c4efb710f098569c5", "externalIds": {"PubMedCentral": "8960449", "DOI": "10.3389/fnsys.2022.764708", "CorpusId": 246900226, "PubMed": "35359623"}, "corpusId": 246900226, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f1d3f2903e7989df6aab3e9c4efb710f098569c5", "title": "Integrating Philosophy of Understanding With the Cognitive Sciences", "abstract": "We provide two programmatic frameworks for integrating philosophical research on understanding with complementary work in computer science, psychology, and neuroscience. First, philosophical theories of understanding have consequences about how agents should reason if they are to understand that can then be evaluated empirically by their concordance with findings in scientific studies of reasoning. Second, these studies use a multitude of explanations, and a philosophical theory of understanding is well suited to integrating these explanations in illuminating ways.", "venue": "Frontiers in Systems Neuroscience", "year": 2022, "referenceCount": 214, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fnsys.2022.764708/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-10", "journal": {"volume": "16", "name": "Frontiers in Systems Neuroscience"}, "authors": [{"authorId": "145976229", "name": "Kareem Khalifa"}, {"authorId": "2154658506", "name": "Farhan Islam"}, {"authorId": "49166079", "name": "J. P. Gamboa"}, {"authorId": "1941739", "name": "D. Wilkenfeld"}, {"authorId": "30524584", "name": "Daniel Kosti\u0107"}]}, {"paperId": "8c942836c7963b3d6e19da29618c4a1fdc83fd53", "externalIds": {"ArXiv": "2203.06249", "CorpusId": 247446612}, "corpusId": 247446612, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8c942836c7963b3d6e19da29618c4a1fdc83fd53", "title": "Information temperature as a measure of DNA's and texts complexity", "abstract": "C. Shannon introduced the notion of entropy for random sequences. What about their temperature? After discussing some methods for introducing information temperature (IT) for binary random stationary ergodic sequence, we suggest using IT as a characteristic of complexity and intelligence of an agent capable of writing or generating meaningful texts. In particular, we discuss the question of whether the temperature can characterize the academic level of the text, or serve as an indicator of the quality of brain activity of the text author.", "venue": "", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-07", "journal": null, "authors": [{"authorId": "1739383", "name": "O. Usatenko"}]}, {"paperId": "6ab3f4a06efeaa6d402b3a39e39609efaf9759eb", "externalIds": {"DOI": "10.1002/wcms.1604", "CorpusId": 247349693}, "corpusId": 247349693, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6ab3f4a06efeaa6d402b3a39e39609efaf9759eb", "title": "Machine intelligence for chemical reaction space", "abstract": "Discovering new reactions, optimizing their performance, and extending the synthetically accessible chemical space are critical drivers for major technological advances and more sustainable processes. The current wave of machine intelligence is revolutionizing all data\u2010rich disciplines. Machine intelligence has emerged as a potential game\u2010changer for chemical reaction space exploration and the synthesis of novel molecules and materials. Herein, we will address the recent development of data\u2010driven technologies for chemical reaction tasks, including forward reaction prediction, retrosynthesis, reaction optimization, catalysts design, inference of experimental procedures, and reaction classification. Accurate predictions of chemical reactivity are changing the R&D processes and, at the same time, promoting an accelerated discovery scheme both in academia and across chemical and pharmaceutical industries. This work will help to clarify the key contributions in the fields and the open challenges that remain to be addressed.", "venue": "WIREs Computational Molecular Science", "year": 2022, "referenceCount": 200, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.research-collection.ethz.ch/bitstream/20.500.11850/537940/2/WIREsComputMolSci-2022-Schwaller-Machineintelligenceforchemicalreactionspace.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-07", "journal": {"volume": "12", "name": "Wiley Interdisciplinary Reviews: Computational Molecular Science"}, "authors": [{"authorId": "1379965853", "name": "P. Schwaller"}, {"authorId": "3363862", "name": "Alain C. Vaucher"}, {"authorId": "32427390", "name": "Rub\u00e9n Laplaza"}, {"authorId": "9855096", "name": "Charlotte Bunne"}, {"authorId": "2054846313", "name": "Andreas Krause"}, {"authorId": "145154812", "name": "C. Corminboeuf"}, {"authorId": "1864183", "name": "T. Laino"}]}, {"paperId": "16d852015f99773a3e2e10f2a2d78c1e34cf211a", "externalIds": {"DOI": "10.1215/9781478022466-006", "CorpusId": 245550461}, "corpusId": 245550461, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/16d852015f99773a3e2e10f2a2d78c1e34cf211a", "title": "Conclusion Racist Hate, Racial Profiling, Pok\u00e9mon at Auschwitz", "abstract": null, "venue": "Racist Love", "year": 2022, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-04", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "41be538937951b31e0ada8bdc1e05f71046e108d", "externalIds": {"DOI": "10.1215/9781478022466-007", "CorpusId": 245560929}, "corpusId": 245560929, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/41be538937951b31e0ada8bdc1e05f71046e108d", "title": "Notes", "abstract": null, "venue": "Racist Love", "year": 2022, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-03-04", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "01b015dc22018ded48777f646b900bd8415b5ea8", "externalIds": {"DOI": "10.1007/s11406-022-00480-5", "CorpusId": 255163487}, "corpusId": 255163487, "publicationVenue": {"id": "31ff6cd5-6e5d-4776-9a1d-b8ae86f12f11", "name": "Philosophia", "type": "journal", "alternate_names": ["philoSOPHIA"], "issn": "0048-3893", "alternate_issns": ["2240-2497", "0031-8000", "1895-9431", "2155-0905", "1314-5606"], "url": "https://www.springer.com/philosophy/journal/11406", "alternate_urls": ["https://link.springer.com/journal/11406", "https://www.kul.pl/art_18146.html", "https://philosophia-bg.com/", "http://muse.jhu.edu/journals/philosophia"]}, "url": "https://www.semanticscholar.org/paper/01b015dc22018ded48777f646b900bd8415b5ea8", "title": "The Philosophising Machine \u2013 a Specification of the Turing Test", "abstract": null, "venue": "Philosophia", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11406-022-00480-5.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-03-04", "journal": {"volume": "50", "pages": "1437 - 1453", "name": "Philosophia"}, "authors": [{"authorId": "153567892", "name": "A. Schwaninger"}]}, {"paperId": "ef2c984acbae0e8c82c24ae51f2a3abe6e174501", "externalIds": {"DOI": "10.1080/02560046.2022.2112725", "CorpusId": 251755563}, "corpusId": 251755563, "publicationVenue": {"id": "f71c62a1-ae03-4081-a556-062d85b3e296", "name": "Critical Arts. A Journal for Cultural Studies", "type": "journal", "alternate_names": ["Crit Art J Cult Stud", "Crit Art", "Critical Arts"], "issn": "0256-0046", "url": "http://www.tandfonline.com/loi/rcrc20", "alternate_urls": ["http://digital.lib.msu.edu/projects/africanjournals/html/browse.cfm?colid=263"]}, "url": "https://www.semanticscholar.org/paper/ef2c984acbae0e8c82c24ae51f2a3abe6e174501", "title": "A New Harmonisation of Art and Technology: Philosophic Interpretations of Artificial Intelligence Art", "abstract": "ABSTRACT Artificial intelligence (AI) art is the product of AI technology applied to art. In terms of technical application, AI art has two methods: symbolism and connectivism. In terms of the human-machine system, there are three levels: human using machine, human guiding machine and human-machine separation. AI art is a special form, existing between natural beauty and human art: AI art, first of all, is not a natural aesthetic object, given that it is the product of artefacts. Its appreciation is mixed with interests, and its artistic generation is a kind of \u201cpurposeful non-purposefulness.\u201d Secondly, AI art is not equal to traditional human art, because AI has no intentionality or consciousness. Thirdly, AI participates in the construction of artistic logic and breaks the boundary of traditional art. AI can be regarded as an \u201cagent\u201d in art generation, and together with people constitute the \u201cactor network\u201d of art. The processes of generation, identification and appreciation of AI art include the judgment of true and false. AI art reflects the forced integration of intelligent technology into art, an attempt to rid of contingency, dialectics, and negativity of art. But what we need is the real harmonisation of art and technology. People should use aesthetic reason to guide AI technology.", "venue": "Critical Arts. A Journal for Cultural Studies", "year": 2022, "referenceCount": 58, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-04", "journal": {"volume": "36", "pages": "110 - 125", "name": "Critical Arts"}, "authors": [{"authorId": "2064878415", "name": "Feng Tao"}]}, {"paperId": "56469dc69659e8e8eb98da3ab18eb3caa33d63fd", "externalIds": {"PubMedCentral": "9284358", "DOI": "10.2196/37688", "CorpusId": 249250203, "PubMed": "35771594"}, "corpusId": 249250203, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/56469dc69659e8e8eb98da3ab18eb3caa33d63fd", "title": "Caregiver Expectations of Interfacing With Voice Assistants to Support Complex Home Care: Mixed Methods Study", "abstract": "Background Providing care in home environments is complex, and often the pressure is on caregivers to document information and ensure care continuity. Digital information management and communication technologies may support care coordination among caregivers. However, they have yet to be adopted in this context, partly because of issues with supporting long-term disease progression and caregiver anxiety. Voice assistant (VA) technology is a promising method for interfacing with digital health information that may aid in multiple aspects of being a caregiver, thereby influencing adoption. Understanding the expectations for VAs to support caregivers is fundamental to inform the practical development of this technology. Objective This study explored caregivers\u2019 perspectives on using VA technology to support caregiving and inform the design of future digital technologies in complex home care. Methods This study was part of a larger study of caregivers across North America on the design of digital health technologies to support health communication and information management in complex home care. Caregivers included parents, guardians, and hired caregivers such as personal support workers and home care nurses. Video interviews were conducted with caregivers to capture their mental models on the potential application of VAs in complex home care and were theoretically analyzed using the technology acceptance model. Interviews were followed up with Likert-scale questions exploring perspectives on other VA applications beyond participants\u2019 initial perceptions. Results Data were collected from 22 caregivers, and 3 themes were identified: caregivers\u2019 perceived usefulness of VAs in supporting documentation, care coordination, and person-centered care; caregivers\u2019 perceived ease of use in navigating information efficiently (they also had usability concerns with this interaction method); and caregivers\u2019 concerns, excitement, expected costs, and previous experience with VAs that influenced their attitudes toward use. From the Likert-scale questions, most participants (21/22, 95%) agreed that VAs should support prompted information recording and retrieval, and all participants (22/22, 100%) agreed that they should provide reminders. They also agreed that VAs should support them in an emergency (18/22, 82%)\u2014but only for calling emergency services\u2014and guide caregivers through tasks (21/22, 95%). However, participants were less agreeable on VAs expressing a personality (14/22, 64%)\u2014concerned they would manipulate caregivers\u2019 perceptions\u2014and listening ambiently to remind caregivers about their documentation (16/22, 73%). They were much less agreeable about VAs providing unprompted assistance on caregiving tasks (9/22, 41%). Conclusions The interviews and Likert-scale results point toward the potential for VAs to support family caregivers and hired caregivers by easing their information management and health communication at home. However, beyond information interaction, the potential impact of VA personality traits on caregivers\u2019 perceptions of the care situation and the passive collection of audio data to improve user experience through context-specific interactions are critical design considerations that should be further examined.", "venue": "JMIR human factors", "year": 2022, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-03", "journal": {"volume": "9", "name": "JMIR Human Factors"}, "authors": [{"authorId": "1947423581", "name": "R. Tennant"}, {"authorId": "2137792425", "name": "S. Allana"}, {"authorId": "39162813", "name": "Karen Mercer"}, {"authorId": "145082763", "name": "C. Burns"}]}, {"paperId": "940c97e9a2f50dacccc244440cc6aa474c85c0e2", "externalIds": {"DOI": "10.12775/setf.2022.008", "CorpusId": 247309553}, "corpusId": 247309553, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/940c97e9a2f50dacccc244440cc6aa474c85c0e2", "title": "From Absolute Mind to Zombie: Is Artificial Intelligence Possible?", "abstract": "The dream of achieving artificial intelligence (AI) and, in particular, artificial consciousness (\u2018strong AI\u2019), is reflected in mythologies and popular culture as utopia and dystopia. This article discusses its conceptual possibility. It first relates the desire to realise strong AI to a self-perception of humanity as opposed to nature, metaphorically represented as gods or God. The realisation of strong AI is perceived as an ultimate victory on nature or God because it represents the crown of creation or evolution: conscious intelligence. The paper proceeds to summarise two debates relevant to AI: one educational and one technological. The technological debate, almost invariably presupposing a materialist framework, is related to the mind\u2013body problem of philosophy; the educational one to understanding the concept of intelligence. By proposing a definition of intelligence linked to an idealist conception of reality, postulating mind as participation in Absolute Mind, I attempt a convergence of these debates, rejecting the possibility of strong AI.", "venue": "Scientia et Fides", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://apcz.umk.pl/SetF/article/download/29708/31750", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-03", "journal": {"name": "Scientia et Fides"}, "authors": [{"authorId": "134363160", "name": "M. Bilagher"}]}, {"paperId": "94044139e9c77b5d1e9cfa2dd2326db8d2966c7e", "externalIds": {"PubMedCentral": "8892409", "DOI": "10.1007/s44163-022-00019-3", "CorpusId": 247235946}, "corpusId": 247235946, "publicationVenue": {"id": "dda0a41e-efcd-40e6-87f7-a663355aceb3", "name": "Discover Artificial Intelligence", "type": "journal", "alternate_names": ["Discov Artif Intell"], "issn": "2731-0809", "url": "https://www.springer.com/journal/44163"}, "url": "https://www.semanticscholar.org/paper/94044139e9c77b5d1e9cfa2dd2326db8d2966c7e", "title": "Reflections on the human role in AI policy formulations: how do national AI strategies view people?", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 148, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s44163-022-00019-3.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-03", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "2102881731", "name": "Henrikki Salo-P\u00f6ntinen"}, {"authorId": "2748954", "name": "P. Saariluoma"}]}, {"paperId": "9ce68b44f77058022e6aac3fbf6eeba09283c594", "externalIds": {"DBLP": "conf/cacml/Lyu22", "DOI": "10.1109/CACML55074.2022.00054", "CorpusId": 251705017}, "corpusId": 251705017, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9ce68b44f77058022e6aac3fbf6eeba09283c594", "title": "Cryptocurrency Price forecasting: A Comparative Study of Machine Learning Model in Short-Term Trading", "abstract": "In recent years, the expansion of the cryptocurrency market has received significant attention among investors, studies of cryptocurrency price predictions have been conducted in various fields. With the enhancement of machine learning algorithms and increased computational capabilities, machine learning has proved one of the most efficient cryptocurrency prediction methods. However, most studies focused on single digital currency prediction or small-scale algorithm comparison for multiple currencies. This study aims to present a comparative performance of large-scale selected Machine Learning algorithms for cryptocurrency forecasting. Specifically, this paper concentrates on forecasting time series data for a short-term trading period in ten cryptocurrencies (BTC, ETH, ADA, BNB, XRP, DOGE, LUNA, LINK, LTC, and BCH) with ten selected machine learning algorithms (Decision Tree, Linear Regression, Ridge Regression, Lasso Regression, Bayesian Regression, Random Forest, K-Nearest Neighbors, Neural Networks, Gradient Boosting, and Support Vector Machine). Our experiment results show that the Gradient Boosting with the mean square error criterion is superior in predicting most major cryptocurrencies by performing statistical analysis and data visualizations. Additionally, the Random Forest and Decision Tree model built by the Classification and Regression Tree algorithm also shows outstanding performance in certain currencies such as ETH, XRP, LUNA, and LTC. Thus, all three algorithms can help anticipate the short-term evolutions of the cryptocurrency market.", "venue": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-03-01", "journal": {"pages": "280-288", "name": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)"}, "authors": [{"authorId": "2064467009", "name": "Haoran Lyu"}]}, {"paperId": "34ff69039c4e3ebff47f196d4cd4e3a5cd483645", "externalIds": {"DOI": "10.1016/j.hfc.2021.11.005", "CorpusId": 247275173, "PubMed": "35341542"}, "corpusId": 247275173, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/34ff69039c4e3ebff47f196d4cd4e3a5cd483645", "title": "Artificial Intelligence and Mechanical Circulatory Support.", "abstract": null, "venue": "Heart failure clinics", "year": 2022, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-03-01", "journal": {"volume": "18 2", "pages": "\n 301-309\n ", "name": "Heart failure clinics"}, "authors": [{"authorId": "2157650597", "name": "Song Li"}, {"authorId": "83761911", "name": "G. Hickey"}, {"authorId": "2157653417", "name": "Matthew M. Lander"}, {"authorId": "4347981", "name": "M. Kanwar"}]}, {"paperId": "303e42ca7e116cfc183249c0f49dd978b083f813", "externalIds": {"DOI": "10.1016/j.autcon.2021.104110", "CorpusId": 246521847}, "corpusId": 246521847, "publicationVenue": {"id": "cbe2e2e0-f4d3-4923-8b48-a02259e5f89c", "name": "Automation in Construction", "type": "journal", "alternate_names": ["Autom Constr"], "issn": "0926-5805", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/523112/description#description", "alternate_urls": ["http://www.sciencedirect.com/science/journal/09265805", "https://www.journals.elsevier.com/automation-in-construction"]}, "url": "https://www.semanticscholar.org/paper/303e42ca7e116cfc183249c0f49dd978b083f813", "title": "Semantic segmentation of cracks: Data challenges and architecture", "abstract": null, "venue": "Automation in Construction", "year": 2022, "referenceCount": 51, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-01", "journal": {"name": "Automation in Construction"}, "authors": [{"authorId": "2152458893", "name": "Fabio Panella"}, {"authorId": "1850020", "name": "Aldo Lipani"}, {"authorId": "36751418", "name": "Jan Boehm"}]}, {"paperId": "4a0263ecb3df0ec7a0232e422c4c10aa31bbf526", "externalIds": {"DOI": "10.1016/j.techfore.2021.121431", "CorpusId": 245159982}, "corpusId": 245159982, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4a0263ecb3df0ec7a0232e422c4c10aa31bbf526", "title": "A systematic idea generation approach for developing a new technology: Application of a socio-technical transition system", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2022, "referenceCount": 53, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-01", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "9142600", "name": "Keeeun Lee"}, {"authorId": "2109591986", "name": "Sunhye Kim"}, {"authorId": "38717655", "name": "B. Yoon"}]}, {"paperId": "ca6cbcb0caa5b26da011a56170ebfd2f17613e3e", "externalIds": {"DOI": "10.33425/2641-4317.1121", "CorpusId": 247944559}, "corpusId": 247944559, "publicationVenue": {"id": "856ac6ff-9b62-4c9e-a752-0e5e67b1e0b8", "name": "International Journal of Psychiatry Research", "type": "journal", "alternate_names": ["Int J Psychiatry Res", "Int j psychiatry res", "International journal of psychiatry research"], "issn": "2641-4317", "alternate_issns": ["2664-8962"], "url": "http://www.scivisionpub.com/journals/archive-international-journal-of-psychiatry-research", "alternate_urls": ["http://www.psychiatryjournal.in/"]}, "url": "https://www.semanticscholar.org/paper/ca6cbcb0caa5b26da011a56170ebfd2f17613e3e", "title": "The Dimension of Neural Memory and Consciousness", "abstract": "The mental dimension is an experiential state achieved by neural circuits, that cannot be measured by physical means but that nonetheless affects the behavior of conscious neural creatures. The \u201cmeaning\u201d or \u201cworth\u201d of anything in the life of animals is based on emotive factors that are recalled from past experience. Emotive memory is the key to the \u201cconsciousness\u201d that determines decisions and valuations. Even supposedly rational economic decisions are ultimately based on affective considerations. From the Darwinian perspective, neural signaling evolved from bacterial signaling processes which employed small molecules (i.e. biogenic amines). The tripartite mechanism provides a chemodynamic rationale for considering the physiologic basis of such signaling, a key facet of \u201cconsciousness\u201d. We note that the original bacterial signaling molecules (i.e. biogenic amines), later termed \u201cneuro-transmitters\u201d (NTs)) were retained by and still used by all neurons. To clarify the discussion, we de-limit the meaning of terms commonly used by both computer scientists and neurobiologists (i.e. \u201cmemory\u201d, \u201cinformation\u201d, \u201cfeelings\u201d, \u201cemotions\u201d , \u201cenergy\u201d, \u201cartificial intelligence\u201d, \u201clogic\u201d and \u201cdimension\u201d). Mind and body are a complex unity. The psyche emerges from the physiology and chemistry of interacting neurons, projecting an ensemble of physiologic sensibilities into a psychic (mental) dimension. Without memory, there are no emotions and vice versa\u2026without emotive qualities, memory fades. Emotions and memory are linked facets of the psychic dimension of consciousness, encoded and decoded by the biochemically active neural net.", "venue": "International Journal of Psychiatry Research", "year": 2022, "referenceCount": 65, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-28", "journal": {"name": "International Journal of Psychiatry Research"}, "authors": [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", "name": "C. Gilon"}]}, {"paperId": "ad14f287d637458e9f4994870468177cd1dfd140", "externalIds": {"DOI": "10.33425/2641-4317.1125", "CorpusId": 253339168}, "corpusId": 253339168, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad14f287d637458e9f4994870468177cd1dfd140", "title": "A Critique of the Atkinson-Shiffrin (As) Mathematical Model of Human Memory", "abstract": "Emotions are the anchoring experiences on which psychology is aimed. The challenge of neuroscientists is to clarify how neural nets generate mental states, such as emotive memory. To that end, Atkinson- hiffin (AS) (1950) proposed mathematical algorithms and formulae to describe memory. Our critique of their approach is based on 3 issues: Evolution, Physiology and Emotions. What is missing in the AS mathematical model is a physiologically relevant process for encoding emotive memory. \u201cMeta-physics\u201d is the branch of philosophy that examines the fundamental nature of reality i.e. the relationship between energy and matter. \u201dMeta-chemistry\u201d (\u201cPsycho-chemistry\u201d) could be considered to be the branch of chemistry that deals with mental states emerging from neuro- chemical processes. However, what does \u201cMeta-mathematics\u201d imply? Does mathematics delve into matters of Mind as well as Logic? Neuro-math? Neither the metrics of physics nor the mathematics of Atkinson-Shiffin can credibly characterize the process of recalling Emotive states. Only chemistry can pierce the veil of neurophysiology. For example, emotive states can be instigated by chemical entities, such as \u201cneurotransmitters\u201d (NTs) and recreational drugs. In consideration of this, we propose a biochemical tripartite mechanism involving neurons interacting with their surrounding extracellular matrix (nECM) which serve as \u201cmemory material\u201d. Incoming perceptions are encoded with trace metals + neurotransmitters (NTs) ejected by neurons, to form metal-centered cognitive units of information (cuinfo) from which memory is consolidated. The NTs can be considered the effectors and encoders of emotive mental states achieved by the neural net. Regarding the Atkinson-Shiffin approach, we opine: Emotions exceed the grasp of mathematics.", "venue": "International Journal of Psychiatry Research", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-28", "journal": {"name": "International Journal of Psychiatry Research"}, "authors": [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", "name": "C. Gilon"}]}, {"paperId": "06ef1f9e1a760df942548ab38ea7e49e6145c6bd", "externalIds": {"ArXiv": "2202.12678", "DBLP": "journals/corr/abs-2202-12678", "CorpusId": 247154684}, "corpusId": 247154684, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/06ef1f9e1a760df942548ab38ea7e49e6145c6bd", "title": "Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain", "abstract": "\u2013 In this article, we first give an introduction to artificial intelligence and its applications in biology and medicine in Section 1. Deep learning methods are then described in Section 2. We narrow down the focus of the study on textual data in Section 3, where natural language processing and its applications in the biomedical domain are described. In Section 4, we give an introduction to explainable artificial intelligence and discuss the importance of explainability of artificial intelligence systems, especially in the biomedical domain. 1. Artificial Intelligence Artificial Intelligence (AI) is a scientific field that studies computer systems performing tasks that need human intelligence. AI systems aim at doing intelligent tasks such as learning from experience, knowledge representation, problem solving, reasoning, perception, and natural language processing, which are associated with cognitive functions of human mind (Russell and Norvig, 2009). Nowadays, AI systems have many applications in a wide variety of domains such as education, medicine, transportation, military, entertainment, finance, autonomous driving, smartphones, agriculture, social media, economy, healthcare, law, manufacturing, cybersecurity, and many other domains. Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain 2 Since early work on artificial neurons in the 1940s (McCulloch and Pitts, 1943), different generations of AI methods have been developed. Alan Turing\u2019s theory of computation, the idea of a thinking machine, and the Turing test formed solid theoretical foundations and a milestone in early stages of development of machine intelligence in the 1950s (Turing, 1950). Then in the 1960s and 1970s, symbolic AI systems such as the General Problem Solver, the Geometry Theorem Prover, and the Logic Theorist employed high-level human-readable knowledge representation, logic programming, and reasoning to search for solutions to problems (Russell and Norvig, 2009). Knowledge-based and expert systems then became popular in the 1980s. This generation of AI systems leveraged more powerful, domain-specific knowledge (typically special-purpose rule sets in combination with customized inference methods) to solve problems in narrower fields of expertise. Meanwhile, connectionism was revived and Artificial Neural Networks (ANNs) moved the field forward towards performing more difficult and intelligent tasks, e.g. optical character recognition and speech recognition (Hopfield, 1988; Russell and Norvig, 2009). With the rapid adoption of Internet in the 1990s, AI tools such as recommender systems, search engines, and machine translation systems found their way into everyday life. ANNs are computational methods inspired by the biological nervous systems. A neural network consists of multiple layers of interconnected processing units called \u201cneurons\u201d that are able to perform parallel computations. They are mostly used for data processing and knowledge representation purposes (Ramesh et al., 2004). ANNs have become attractive data analytics tools since they have the capability of handling complex, non-linear data relationships. A typical neuron in an ANN receives inputs from the previous layer in the network, aggregates the inputs, applies an activation function, and produces a final output based on the activation function\u2019s output and a threshold. Since the advent of ANNs in the 1940s (McCulloch and Pitts, 1943), artificial neurons have evolved from simple binary threshold functions to complex non-linear processing units in CNNs, RNNs, and transformer models. In the first decades of the 21st century, availability of large volumes of data (known as \u201cbig data\u201d), extremely powerful processors specially designed to run floating-point arithmetic computation, novel multi-layer ANN architectures, and advanced machine learning techniques have led to the development of a new class of AI methods, called \u201cdeep learning\u201d (LeCun et al., 2015). Machine learning refers to a class of AI methods designed to learn data relationships hidden in a dataset of samples, and then generalize the learned knowledge to new unseen data samples. Accordingly, deep learning refers Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain 3 to a class of machine learning methods comprising multiple layers of processing units, designed to build complex generative or predictive models from large datasets. Modern deep neural networks, e.g. Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), have been widely used to model complex data relationships for a wide variety of scientific and industrial applications (Khamparia and Singh, 2019). 1.1. Artificial Intelligence in biomedicine and healthcare AI systems have many applications in biomedical research and healthcare domains (Hamet and Tremblay, 2017; Min et al., 2017; Ramesh et al., 2004; Rav\u00ec et al., 2017). In many use-cases, AI methods have performed as accurate as human experts, even performed better than humans in some cases (Mintz and Brodie, 2019). ANNs are among the most widely-used AI methods utilized in the biomedical domain (Ramesh et al., 2004). Large amounts of data in the biomedical domain make demands for developing intelligent computer methods that facilitate automatic acquisition and analysis of knowledge that is necessary to solve problems in biology and medicine. Utilizing AI systems for medical applications dates back to the 1970s, when computer analysis helped clinicians diagnose acute abdominal pain (Gunn, 1976). Since many biological, clinical, and pathological variables involve in complex interactions in biomedical datasets, ANN and deep learning models have been extensively applied to data science problems in biology and medicine. One of the first applications of ANN for clinical decision making aimed at diagnosing acute myocardial infarction (Baxt, 1990). In clinical settings, AI systems have found many applications in diagnostic tasks such as image analysis in radiology and histopathology, waveform analysis, interpreting data in intensive care situation, and analysing Computed Tomography (CT), Magnetic Resonance Imaging (MRI), X-rays, and radioisotope scans (Amisha et al., 2019; Mintz and Brodie, 2019; Ramesh et al., 2004). AI methods have also had applications in clinical prognostic tasks such as identifying high risk patients, predicting survival chance in patients, and predicting outcome in patients with specific cancers (Ramesh et al., 2004). Another type of AI systems, i.e. AI-robots, have been used as assistant-surgeons or solo performers in surgery, or as care-bots for assisting in the delivery of care (Amisha et al., 2019; Hamet and Tremblay, 2017). They can be also used to monitor the guided delivery of drugs to target tumours, tissues, or organs (Hamet and Tremblay, 2017). In biomedical research, machine learning methods have had applications in discovering novel Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain 4 therapeutic targets using protein-protein interaction algorithms (Theofilatos et al., 2015), identifying DNA variants as predictors of a specific disease (Rapakoulia et al., 2014), Image and text are two data modalities in the biomedical domain that are commonly analysed using machine learning methods. AI-driven image processing have many applications in radiology, oncology, cardiology, gastroenterology, ophthalmology, etc. (Mintz and Brodie, 2019). Applications of AI systems in biomedical and clinical text processing is extensively discussed in Section 3.3.", "venue": "ArXiv", "year": 2022, "referenceCount": 130, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-25", "journal": {"volume": "abs/2202.12678", "name": "ArXiv"}, "authors": [{"authorId": "144334436", "name": "M. Moradi"}, {"authorId": "3004898", "name": "M. Samwald"}]}, {"paperId": "6847e2ba6796b8a786b3b6d8d8a2d922a6c7c31d", "externalIds": {"DBLP": "conf/iclr/MouselinosMM22", "ArXiv": "2202.12162", "CorpusId": 247083956}, "corpusId": 247083956, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6847e2ba6796b8a786b3b6d8d8a2d922a6c7c31d", "title": "Measuring CLEVRness: Blackbox testing of Visual Reasoning Models", "abstract": "How can we measure the reasoning capabilities of intelligence systems? Visual question answering provides a convenient framework for testing the model\u2019s abilities by interrogating the model through questions about the scene. However, despite scores of various visual QA datasets and architectures, which sometimes yield even a super-human performance, the question of whether those architectures can actually reason remains open to debate. To answer this, we extend the visual question answering framework and propose the following behavioral test in the form of a two-player game. We consider black-box neural models of CLEVR. These models are trained on a diagnostic dataset benchmarking reasoning. Next, we train an adversarial player that re-configures the scene to fool the CLEVR model. We show that CLEVR models, which otherwise could perform at a \u201chuman level\u201d, can easily be fooled by our agent. Our results put in doubt whether data-driven approaches can do reasoning without exploiting the numerous biases that are often present in those datasets. Finally, we also propose a controlled experiment measuring the efficiency of such models to learn and perform reasoning.", "venue": "ICLR", "year": 2022, "referenceCount": 64, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-24", "journal": {"volume": "abs/2202.12162", "name": "ArXiv"}, "authors": [{"authorId": "148099243", "name": "Spyridon Mouselinos"}, {"authorId": "47407464", "name": "H. Michalewski"}, {"authorId": "145478807", "name": "Mateusz Malinowski"}]}, {"paperId": "e5c5cdcc97ea74719df2f9107f01c2edf88584b5", "externalIds": {"DBLP": "journals/mta/GaoD22", "DOI": "10.1007/s11042-022-12208-4", "CorpusId": 247100623}, "corpusId": 247100623, "publicationVenue": {"id": "477368e9-7a8e-475a-8c93-6d623797fd06", "name": "Multimedia tools and applications", "type": "journal", "alternate_names": ["Multimedia Tools and Applications", "Multimedia Tool Appl", "Multimedia tool appl"], "issn": "1380-7501", "url": "https://www.springer.com/computer/information+systems+and+applications/journal/11042", "alternate_urls": ["https://link.springer.com/journal/11042"]}, "url": "https://www.semanticscholar.org/paper/e5c5cdcc97ea74719df2f9107f01c2edf88584b5", "title": "The research landscape on the artificial intelligence: a bibliometric analysis of recent 20 years", "abstract": null, "venue": "Multimedia tools and applications", "year": 2022, "referenceCount": 42, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-23", "journal": {"volume": "81", "pages": "12973 - 13001", "name": "Multimedia Tools and Applications"}, "authors": [{"authorId": "12210820", "name": "Hui-jie Gao"}, {"authorId": "2117433643", "name": "Xiuhao Ding"}]}, {"paperId": "7ecfd7ec0efe3c39bab4b29e616691ff736babc0", "externalIds": {"DBLP": "journals/corr/abs-2202-11766", "ArXiv": "2202.11766", "CorpusId": 247084129}, "corpusId": 247084129, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7ecfd7ec0efe3c39bab4b29e616691ff736babc0", "title": "A gentle introduction to Quantum Natural Language Processing", "abstract": "The main goal of this master\u2019s thesis is to introduce Quantum Natural Language Processing (QNLP) in a way understandable by both the NLP engineer and the quantum computing practitioner. QNLP is a recent application of quantum computing that aims at representing sentences\u2019 meaning as vectors encoded into quantum computers. To achieve this, the distributional meaning of words is extended by the compositional meaning of sentences (DisCoCat model) : the vectors representing words\u2019 meanings are composed through the syntactic structure of the sentence. This is done using an algorithm based on tensor products. We see that this algorithm is inefficient on classical computers but scales well using quantum circuits. After exposing the practical details of its implementation, we go through three use-cases. First we show that the DisCoCat framework has been used to do sentence similarity. While its straightforward implementation using quantum nearest neighbor is theoretically possible, its full implementation requires quantum RAM, a technology not yet available. We therefore review a hybrid classicalquantum workflow that was proposed to overcome that technical limitation. It encodes the dataset into a single superposition state and the distances within the amplitudes of the superposition. Second, we show how the measured output of quantum circuits have been successfully used to do binary sentence classification. We see that sentences are mapped into quantum circuits with the use of parameters for rotation gates (Rx, Rz) which can be optimized classically for a given task and dataset (question-answering in our case). While this is the first QNLP algorithm implemented on a quantum computer, our replication of the experiments leads us to raise some concerns as to the model\u2019s universality and scalability. We also see solutions have been proposed to offer better scalability at the price of increasing the size of circuits. Finally, we see an extension that was proposed to encode hyperonomy (hierarchical word structure denoting supertype) using mixed states and ordering of positive operators. We see that when used within the DisCoCat framework, this model performs well at predicting sentence entailment While this thesis was designed to be a review of the literature about QNLP, we also introduce original experiments on question-answering. After replicating previous experiments on hand-labelled sentences, we extend the words\u2019 mappings to add coverage for logical connectors. These play a central role in compositionality as they allow to combine sentences in a way that the truth value of the whole is predictable from ones of its parts. The model we introduce to account for those, while being simplistic, is a promising implementation.", "venue": "ArXiv", "year": 2022, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-23", "journal": {"volume": "abs/2202.11766", "name": "ArXiv"}, "authors": [{"authorId": "2156125676", "name": "Shervin Le Du"}, {"authorId": "2156116949", "name": "Senaida Hern\u00e1ndez Santana"}, {"authorId": "33233654", "name": "G. Scarpa"}]}, {"paperId": "1f0cb95449984a4346e2a3deca0370cc74cba470", "externalIds": {"DBLP": "journals/corr/abs-2202-13073", "ArXiv": "2202.13073", "DOI": "10.1109/TPAMI.2022.3153312", "CorpusId": 247083637, "PubMed": "35196228"}, "corpusId": 247083637, "publicationVenue": {"id": "25248f80-fe99-48e5-9b8e-9baef3b8e23b", "name": "IEEE Transactions on Pattern Analysis and Machine Intelligence", "type": "journal", "alternate_names": ["IEEE Trans Pattern Anal Mach Intell"], "issn": "0162-8828", "url": "http://www.computer.org/tpami/", "alternate_urls": ["http://www.computer.org/portal/web/tpami", "http://ieeexplore.ieee.org/servlet/opac?punumber=34"]}, "url": "https://www.semanticscholar.org/paper/1f0cb95449984a4346e2a3deca0370cc74cba470", "title": "Global Instance Tracking: Locating Target More Like Humans", "abstract": "Target tracking, the essential ability of the human visual system, has been simulated by computer vision tasks. However, existing trackers perform well in austere experimental environments but fail in challenges like occlusion and fast motion. The massive gap indicates that researches only measure tracking performance rather than intelligence. How to scientifically judge the intelligence level of trackers Distinct from decision-making problems, lacking three requirements (a challenging task, a fair environment, and a scientific evaluation procedure) makes it strenuous to answer the question. In this article, we first propose the global instance tracking (GIT) task, which is supposed to search an arbitrary user-specified instance in a video without any assumptions about camera or motion consistency, to model the human visual tracking ability. Whereafter, we construct a high-quality and large-scale benchmark VideoCube to create a challenging environment. Finally, we design a scientific evaluation procedure using human capabilities as the baseline to judge tracking intelligence. Additionally, we provide an online platform with toolkit and an updated leaderboard. Although the experimental results indicate a definite gap between trackers and humans, we expect to take a step forward to generate authentic human-like trackers. The database, toolkit, evaluation server, and baseline results are available at http://videocube.aitestunion.com.", "venue": "IEEE Transactions on Pattern Analysis and Machine Intelligence", "year": 2022, "referenceCount": 72, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2202.13073", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-23", "journal": {"volume": "PP", "pages": "1-1", "name": "IEEE Transactions on Pattern Analysis and Machine Intelligence"}, "authors": [{"authorId": "1491622261", "name": "Shiyu Hu"}, {"authorId": "2145733730", "name": "Xin Zhao"}, {"authorId": "2109047017", "name": "Lianghua Huang"}, {"authorId": "2887871", "name": "Kaiqi Huang"}]}, {"paperId": "01fdf11285bfe021eccc0a9926fa4ff3bea2fe34", "externalIds": {"DOI": "10.1016/j.conb.2022.01.002", "CorpusId": 247028414, "PubMed": "35217311"}, "corpusId": 247028414, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/01fdf11285bfe021eccc0a9926fa4ff3bea2fe34", "title": "A dynamical systems view of neuroethology: Uncovering stateful computation in natural behaviors", "abstract": null, "venue": "Current Opinion in Neurobiology", "year": 2022, "referenceCount": 112, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-02-22", "journal": {"volume": "73", "name": "Current Opinion in Neurobiology"}, "authors": [{"authorId": "36531793", "name": "Drew N. Robson"}, {"authorId": "2109008396", "name": "Jennifer M. Li"}]}, {"paperId": "96dc56ee1f6c2b08a4395221a0ad0e7fa11c12b7", "externalIds": {"DOI": "10.3389/fhumd.2022.703879", "CorpusId": 247012949}, "corpusId": 247012949, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/96dc56ee1f6c2b08a4395221a0ad0e7fa11c12b7", "title": "Almost Alive: Robots and Androids", "abstract": "Life-likeness is a property that can be used both to deceive people that a robot is more intelligent than it is or to facilitate the natural communication with humans. Over the years, different criteria have guided the design of intelligent systems, ranging from attempts to produce human-like language to trying to make a robot look like an actual human. We outline some relevant historical developments that all rely on different forms of mimicry of human life or intelligence. Many such approaches have been to some extent successful. However, we want to argue that there are ways to exploit aspects of life-likeness without deception. A life-like robot has advantages in communicating with humans, not because we believe it to be alive, but rather because we react instinctively to certain aspects of life-like behavior as this can make a robot easier to understand and allows us to better predict its actions. Although there may be reasons for trying to design robots that look exactly like humans for specific research purposes, we argue that it is subtle behavioral cues that are important for understandable robots rather than life-likeness in itself. To this end, we are developing a humanoid robot that will be able to show human-like movements while still looking decidedly robotic, thus exploiting the our ability to understand the behaviors of other people based on their movements.", "venue": "Frontiers in Human Dynamics", "year": 2022, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fhumd.2022.703879/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-22", "journal": {"volume": "4"}, "authors": [{"authorId": "1732218", "name": "C. Balkenius"}, {"authorId": "2038545202", "name": "B. Johansson"}]}, {"paperId": "2397a3906128f40422663ebb4e8df948d4ee6258", "externalIds": {"DBLP": "journals/fi/ZubaniSSPGC22", "DOI": "10.3390/fi14020062", "CorpusId": 247044369}, "corpusId": 247044369, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2397a3906128f40422663ebb4e8df948d4ee6258", "title": "A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform", "abstract": "During the COVID-19 pandemic, the corporate online training sector has increased exponentially and online course providers had to implement innovative solutions to be more efficient and provide a satisfactory service. This paper considers a real case study in implementing a chatbot, which answers frequently asked questions from learners on an Italian e-learning platform that provides workplace safety courses to several business customers. Having to respond quickly to the increase in the courses activated, the company decided to develop a chatbot using a cloud-based service currently available on the market. These services are based on Natural Language Understanding (NLU) engines, which deal with identifying information such as entities and intentions from the sentences provided as input. To integrate a chatbot in an e-learning platform, we studied the performance of the intent recognition task of the major NLU platforms available on the market with an in-depth comparison, using an Italian dataset provided by the owner of the e-learning platform. We focused on intent recognition, carried out several experiments and evaluated performance in terms of F-score, error rate, response time, and robustness of all the services selected. The chatbot is currently in production, therefore we present a description of the system implemented and its results on the original users\u2019 requests.", "venue": "Future Internet", "year": 2022, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1999-5903/14/2/62/pdf?version=1645173886", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-18", "journal": {"volume": "14", "pages": "62", "name": "Future Internet"}, "authors": [{"authorId": "2008158857", "name": "Matteo Zubani"}, {"authorId": "2008170937", "name": "Luca Sigalini"}, {"authorId": "1801054", "name": "I. Serina"}, {"authorId": "1397316855", "name": "Luca Putelli"}, {"authorId": "2633661", "name": "A. Gerevini"}, {"authorId": "151108632", "name": "Mattia Chiari"}]}, {"paperId": "a8aa76aba3fc48369dece43613ec34025c787fb2", "externalIds": {"DOI": "10.1177/00219983211037048", "CorpusId": 246982788}, "corpusId": 246982788, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a8aa76aba3fc48369dece43613ec34025c787fb2", "title": "The intersection of damage evaluation of fiber-reinforced composite materials with machine learning: A review", "abstract": "Machine learning (ML) has emerged as a useful predictive tool based on mathematical and statistical relationships for various engineering problems. The pairing of structural health monitoring (SHM) and nondestructive evaluation (NDE) methods with ML algorithms has yielded beneficial results in addressing the damage state of a material or system. Damage state descriptions addressed with ML include detecting a damage mechanism, locating a mechanism, identifying the type of mechanism, assessing the extent of the damage mechanism, and estimating the useful remaining life of a material or system. Damage evaluation research of composite materials has progressed with the increased usage of composite structural elements in the aerospace industry. NDE methods are a viable candidate for pairing with ML algorithms to improve damage state monitoring of composite materials due to the complexity associated with the structure of composites. Fiber-reinforced polymers (FRP), for example, contain at least two constituent materials a fiber and matrix material whose mechanical behavior and interactions contribute to the performance of an FRP. Unlike conventional composite analytical models that require explicit information about the constituents and microstructure of a laminate, an ML algorithm can construct damage evaluation predictions when employing exclusively past operational performance or data from an SHM or NDE method. A researcher determines the type of data selected when applying an ML model for trend analysis, anomaly detection, or prediction making. However, no one specific input feature is required for utilizing an ML model, and examples of possible data features include material properties, physical dimensions, and collected evaluation data. In the present review, applications of ML combined with the damage state evaluation of composite materials, particularly examining FRPs, are discussed to demonstrate the predictive capabilities of ML and its viability for future applications, especially in industrial environments, to minimize costs and improve damage detection rates.", "venue": "Journal of Composite Materials", "year": 2022, "referenceCount": 205, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-02-18", "journal": {"volume": "56", "pages": "1417 - 1452", "name": "Journal of Composite Materials"}, "authors": [{"authorId": "2037185590", "name": "Christopher Nelon"}, {"authorId": "49999858", "name": "O. Myers"}, {"authorId": "38374750", "name": "A. Hall"}]}, {"paperId": "dd7f2ea24a30ea75fc19d6313566451ab4161e0c", "externalIds": {"DOI": "10.24018/ejai.2022.1.1.2", "CorpusId": 247537879}, "corpusId": 247537879, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dd7f2ea24a30ea75fc19d6313566451ab4161e0c", "title": "The Theory of Natural-Artificial Intelligence", "abstract": "In recent times, mankind is seeking for certain peculiar solutions to multiple facets containing an identically very fundamental philosophy i.e., certainly intend to have indeterminism as a primordial prerequisite; however, that indeterminism is itself like a void filled with determinism as analogous to the quantum computing as qubits and the corresponding complexity. In the meantime, there are algorithms and mathematical frameworks and those in general; yield the required distinctions in the underlying theories constructed upon principles which then give rise to respective objectifications. But, when it comes to the Artificial Intelligence and Machine Learning, then there find some mathematical gaps in order to connect other regimes in relation of one and the other. The proposed discovery in this paper is about quilting some of those gaps as like the whole structure of Artificial Intelligence is yet to be developed in the realm concerning with responsive analysis in betwixt to humans and machines or beyond to such analogy. Hence, the entire introduction & incitement of this theory is to mathematically determine the deep rationality as responsive manifestation of human brain with a designed computing and both with the highest potential degree of attributions or overlaps and both the conditions will be shown mathematically herewith as identifications that make each other separate and clear to persuade.", "venue": "European Journal of Artificial Intelligence and Machine Learning", "year": 2022, "referenceCount": 4, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ej-ai.org/index.php/ejai/article/download/2/1", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-15", "journal": {"name": "European Journal of Artificial Intelligence and Machine Learning"}, "authors": [{"authorId": "2159281358", "name": "Dev Arastu Panchariya"}]}, {"paperId": "9f852e90e082adeff13aa6a72436dad0447726f9", "externalIds": {"DOI": "10.3390/h11010027", "CorpusId": 246883046}, "corpusId": 246883046, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9f852e90e082adeff13aa6a72436dad0447726f9", "title": "Transhumanities as the Pinnacle and a Bridge", "abstract": "Transhumanities are designed as a multidisciplinary approach that transcends the limitations not only of specific disciplines, but also of the human species; these are primarily humanities for advanced Artificial Intelligence (AI leading to AGI). The view that philosophy, ethics and related disciplines pertain to all rational beings, not solely to humans, is essential to the philosophy of Immanuel Kant. This approach turns out to be practical at the epoch of advanced AI. Many authors ponder how a kernel of ethical respect for human beings can be built into Artificial General Intelligence by the time it becomes a reality. I argue that the task requires, among other components, inculcating the core of the Humanities into advanced AI.", "venue": "Humanities", "year": 2022, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-0787/11/1/27/pdf?version=1645005095", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-14", "journal": {"name": "Humanities"}, "authors": [{"authorId": "51986819", "name": "P. Boltuc"}]}, {"paperId": "4560e29308b732cb8635e2fe7a048af0f867da29", "externalIds": {"PubMedCentral": "8853037", "DOI": "10.1007/s00399-022-00839-x", "CorpusId": 246704898, "PubMed": "35147766"}, "corpusId": 246704898, "publicationVenue": {"id": "b35b1118-e040-4b7d-b786-86de0f8a5269", "name": "Herzschrittmachertherapie & Elektrophysiologie", "type": "journal", "alternate_names": ["Herzschrittmachertherapie Elektrophysiologie", "Herzschrittmachertherapie Elektrophysiologie", "Herzschrittmachertherapie Und Elektrophysiologie"], "issn": "0938-7412", "url": "http://www.springer.com/sgw/cda/frontpage/0,11855,1-0-70-1103367-0,00.html?referer=www.springer.com/de/journal/00399/submission", "alternate_urls": ["https://link.springer.com/journal/399"]}, "url": "https://www.semanticscholar.org/paper/4560e29308b732cb8635e2fe7a048af0f867da29", "title": "Artificial intelligence for the detection, prediction, and management of atrial fibrillation", "abstract": null, "venue": "Herzschrittmachertherapie & Elektrophysiologie", "year": 2022, "referenceCount": 93, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00399-022-00839-x.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-02-11", "journal": {"volume": "33", "pages": "34 - 41", "name": "Herzschrittmachertherapie & Elektrophysiologie"}, "authors": [{"authorId": "3404266", "name": "J. Isaksen"}, {"authorId": "2060528225", "name": "M. Baumert"}, {"authorId": "1471809173", "name": "A. Hermans"}, {"authorId": "2153987293", "name": "Molly Maleckar"}, {"authorId": "2059599534", "name": "D. Linz"}]}, {"paperId": "d7d632742345d16145dec4ea78746b1ca237892f", "externalIds": {"DBLP": "journals/intpolrev/WhiteK22", "DOI": "10.14763/2022.1.1618", "CorpusId": 246912761}, "corpusId": 246912761, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d7d632742345d16145dec4ea78746b1ca237892f", "title": "Artificial emotional intelligence beyond East and West", "abstract": "Artificial emotional intelligence refers to technologies that perform, recognise, or record affective states. More than merely a technological function, however, it is also a social process whereby cultural assumptions about what emotions are and how they are made are translated into composites of code, software, and mechanical platforms that operationalise certain models of emotion over others. This essay illustrates how aspects of cultural difference are both incorporated and elided in projects that equip machines with emotional intelligence. It does so by comparing the field of affective computing, which emerged in the North-Atlantic in the 1990s, with kansei (affective) engineering, which developed in Japan in the 1980s. It then leverages this comparison to argue for more diverse applications of the culture concept in both the development and critique of systems with artificial emotional intelligence. Issue 1 This article belongs to Concepts of the digital society, a special section of Internet Policy Review guest-edited by Christian Katzenbach and Thomas Christian B\u00e4chle.", "venue": "Internet Policy Rev.", "year": 2022, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://policyreview.info/pdf/policyreview-2022-1-1618.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-11", "journal": {"volume": "11", "name": "Internet Policy Rev."}, "authors": [{"authorId": "2089916899", "name": "Daniel White"}, {"authorId": "3193976", "name": "H. Katsuno"}]}, {"paperId": "bb2d531b406f5662aac2266da13aa27020742048", "externalIds": {"DOI": "10.1002/9781119769026.ch7", "CorpusId": 246789940}, "corpusId": 246789940, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb2d531b406f5662aac2266da13aa27020742048", "title": "An Overview of IoT and Its Application With Machine Learning in Data Center", "abstract": null, "venue": "The Industrial Internet of Things (IIoT)", "year": 2022, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-02-11", "journal": {"name": "The Industrial Internet of Things (IIoT)"}, "authors": [{"authorId": "1492130133", "name": "Manikandan Ramanathan"}, {"authorId": "1492130164", "name": "K. Narayanan"}]}, {"paperId": "09a4a8e3cf6b2454492f12cdb671cda0571249e8", "externalIds": {"DOI": "10.35830/cn.vi83.578", "CorpusId": 246801036}, "corpusId": 246801036, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09a4a8e3cf6b2454492f12cdb671cda0571249e8", "title": "A philosophical look at mathematics and related sciences from the beginning to the future", "abstract": "Landmarks in mathematical sciences and its philosophical consequences\u00a0are presented in a generally understandable and partly speculative way\u00a0by following the achievements of famous protagonists.\u00a0From observing the past, a conjecture for the future is deduced.\u00a0", "venue": "Ciencia Nicolaita", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.cic.cn.umich.mx/cn/article/download/578/425", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-11", "journal": {"name": "Ciencia Nicolaita"}, "authors": [{"authorId": "143985332", "name": "E. Wagner"}]}, {"paperId": "0f6c1bf895914f87f9bccaaa1d9614aa244e522c", "externalIds": {"DOI": "10.1080/02604027.2022.2028539", "CorpusId": 246735117}, "corpusId": 246735117, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f6c1bf895914f87f9bccaaa1d9614aa244e522c", "title": "The Digital Mockingbird: Anthropological Transformation and the \u201cNew\u201d Nature", "abstract": "Abstract Within a world-system characterized by processes and dynamics whose interconnections and interdependencies increase exponentially each day, we are passing through an extremely delicate and complex phase of global mutation. What we are witnessing is a radical overturn of the complex interaction between natural (biological) and cultural evolution. The ongoing paradigm shift and profound anthropological transformation create new dimensions, openings, epistemological implications that require new thinking and new thought, as well as different approaches and methods. We are the constitutive elements of a \u201cnew\u201d Nature, from a structural, ontological and substantial point of view, in need of a New Humanism that must re-define certain categories (humanity, identity, dignity, Person, values, rights, etc.) in order to succeed in rethinking \u201cbeing human\u201d within a renewed and complex relationship with the ecosystems. The grand illusions of the hypertechnological civilization: rationality, control, measurability, predictability, and elimination of error; are reinforced systematically by the carte blanche delegated to technique/technology, reintroducing reductionist and deterministic approaches, analyses and explanations, exclusively based on technical knowledge and skills: that is, those which are guaranteed to best support precisely these very illusions. It is precisely this attitude which prevents us from being prepared, which dooms us to an eternal apprehension of black swans, little aware that our very lives are emergency; that they are infinite sequences of black swans. The present-day obsession with doing, designing, studying, and funding only what is \u201cuseful,\u201d the insistent search for control and certainty in order to cling onto an illusory sensation of familiarity and reassurance in the face of the radical unpredictability and variability inherent to life and reality (\u201ctyranny of concreteness\u201d). With the advent of artificial intelligence, it has become of the utmost importance to reflect upon the relationship/interaction between man and machine, and the dangers posed by pursuing the simulation of human thought.", "venue": "World Futures", "year": 2022, "referenceCount": 170, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-09", "journal": {"volume": "78", "pages": "343 - 371", "name": "World Futures"}, "authors": [{"authorId": "2093705362", "name": "Piero Dominici"}]}, {"paperId": "3ac7d6aaebac65ec691f6ba0595d509d3c210f28", "externalIds": {"DBLP": "journals/corr/abs-2202-03164", "ArXiv": "2202.03164", "DOI": "10.1142/9789811246050_0012", "CorpusId": 246634059}, "corpusId": 246634059, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3ac7d6aaebac65ec691f6ba0595d509d3c210f28", "title": "Conversational Agents: Theory and Applications", "abstract": "In this chapter, we provide a review of conversational agents (CAs), discussing chatbots, intended for casual conversation with a user, as well as task-oriented agents that generally engage in discussions intended to reach one or several specific goals, often (but not always) within a specific domain. We also consider the concept of embodied conversational agents, briefly reviewing aspects such as character animation and speech processing. The many different approaches for representing dialogue in CAs are discussed in some detail, along with methods for evaluating such agents, emphasizing the important topics of accountability and interpretability. A brief historical overview is given, followed by an extensive overview of various applications, especially in the fields of health and education. We end the chapter by discussing benefits and potential risks regarding the societal impact of current and future CA technology.", "venue": "ArXiv", "year": 2022, "referenceCount": 269, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-07", "journal": {"volume": "abs/2202.03164", "name": "ArXiv"}, "authors": [{"authorId": "2505659", "name": "M. Wahde"}, {"authorId": "3235013", "name": "M. Virgolin"}]}, {"paperId": "75a81665fc035b67427468f01bd5f010a990aff8", "externalIds": {"DOI": "10.1080/00131857.2022.2033213", "CorpusId": 246574031}, "corpusId": 246574031, "publicationVenue": {"id": "1f33075e-7bb7-471b-9366-4903f07c2382", "name": "Educational Philosophy and Theory", "type": "journal", "alternate_names": ["Educ Philos Theory"], "issn": "0013-1857", "url": "http://www.tandfonline.com/loi/rept20"}, "url": "https://www.semanticscholar.org/paper/75a81665fc035b67427468f01bd5f010a990aff8", "title": "The cybernetics of learning", "abstract": "\u2026 in which we pass through eleven episodes in the history of cybernetics, each episode focusing on one of its perspectives on learning. We end with a coda where we define \u2018cybersocial systems\u2019 and \u2018cybersocial learning\u2019, phrases we have coined to identify some characteristics of contemporary times, when so many aspects of our lives and learning have come to be entangled with computers.", "venue": "Educational Philosophy and Theory", "year": 2022, "referenceCount": 103, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-04", "journal": {"volume": "54", "pages": "2352 - 2388", "name": "Educational Philosophy and Theory"}, "authors": [{"authorId": "33955451", "name": "B. Cope"}, {"authorId": "2334862", "name": "M. Kalantzis"}]}, {"paperId": "704570786dc6086c42de533e983ee22bf6dd029c", "externalIds": {"DOI": "10.1055/s-0041-1742180", "CorpusId": 248833106, "PubMed": "35576929"}, "corpusId": 248833106, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/704570786dc6086c42de533e983ee22bf6dd029c", "title": "Use of Artificial Intelligence in Clinical Neurology.", "abstract": "Artificial intelligence is already innovating in the provision of neurologic care. This review explores key artificial intelligence concepts; their application to neurologic diagnosis, prognosis, and treatment; and challenges that await their broader adoption. The development of new diagnostic biomarkers, individualization of prognostic information, and improved access to treatment are among the plethora of possibilities. These advances, however, reflect only the tip of the iceberg for the ways in which artificial intelligence may transform neurologic care in the future.", "venue": "Seminars in neurology", "year": 2022, "referenceCount": 47, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-01", "journal": {"volume": "42 1", "pages": "\n 39-47\n ", "name": "Seminars in neurology"}, "authors": [{"authorId": "145066343", "name": "James Hillis"}, {"authorId": "46747857", "name": "B. Bizzo"}]}, {"paperId": "ac7bea5758401ef2dd58e2009acdf14d71635b88", "externalIds": {"DOI": "10.1109/ICTech55460.2022.00033", "CorpusId": 251762977}, "corpusId": 251762977, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ac7bea5758401ef2dd58e2009acdf14d71635b88", "title": "Intelligent Audit Question Answering System based on Knowledge Graph and Semantic Similarity", "abstract": "Audit work needs to refer to a large number of law and institutional documents, and the business process is intricate. Finding the answer to audit question based on the knowledge graph can improve the work efficiency observably. This paper has proposed a knowledge base for the electric power audit task. In detail, this project collects law texts related to auditing, and has designed schema and specific rules for them to extract triples. These triples are stored in the Neo4j graph database as Knowledge Graph. In addition, this paper makes templates to generate a question answering dataset about electric power audits. According to the audit knowledge graph, a character-level convolutional neural network is trained and an intelligent audit question answering system is built based on the semantic similarity. The effectiveness of the system is evaluated by experiments.", "venue": "2022 11th International Conference of Information and Communication Technology (ICTech))", "year": 2022, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-02-01", "journal": {"pages": "125-132", "name": "2022 11th International Conference of Information and Communication Technology (ICTech))"}, "authors": [{"authorId": "2065124088", "name": "Feifei Dai"}, {"authorId": "2182438288", "name": "ZhangLi Zhao"}, {"authorId": "7547830", "name": "Changpeng Sun"}, {"authorId": "2132445720", "name": "Borang Li"}]}, {"paperId": "89ca40e3894f0a46b876673685c51a36104b4cd7", "externalIds": {"DOI": "10.1007/s41204-021-00185-2", "CorpusId": 247767253}, "corpusId": 247767253, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/89ca40e3894f0a46b876673685c51a36104b4cd7", "title": "Research hotspots of current interest and trend of artificial intelligence in intelligent speech processing and social sciences \u2013 visualized comparison research based on CiteSpace", "abstract": null, "venue": "Nanotechnology for Environmental Engineering", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-01", "journal": {"volume": "7", "pages": "843 - 855", "name": "Nanotechnology for Environmental Engineering"}, "authors": [{"authorId": "2160595571", "name": "Chengke Zhu"}, {"authorId": "2160592308", "name": "Xiaofeng Zhao"}]}, {"paperId": "011b3d978d110f3a1d1caee9464a8cccde52820b", "externalIds": {"DOI": "10.1215/0094033x-9439601", "CorpusId": 247259492}, "corpusId": 247259492, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/011b3d978d110f3a1d1caee9464a8cccde52820b", "title": "Intermittent Legitimacy: Hans Blumenberg and Artificial Intelligence", "abstract": "Hans Blumenberg\u2019s only known treatment of the topic of artificial intelligence comes in the form of a fragmentary meditation on the first chatbot, Joseph Weizenbaum\u2019s ELIZA. Blumenberg compares this program to the philosophy of Edmund Husserl, arguing that both AI and phenomenology make a false assumption about intelligence or consciousness. This article argues that Blumenberg\u2019s brush with digital systems is crucial in updating our own critique of AI as it proliferates in a new, dynamic form today. Drawing on and shifting the account of technology in the phenomenological tradition, Blumenberg includes machines in the constitution of meaning through rhetoric and points the way to a new wave of digital critique.", "venue": "New German Critique", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-01", "journal": {"name": "New German Critique"}, "authors": [{"authorId": "67215008", "name": "Leif Weatherby"}]}, {"paperId": "70276650403e5b1cb13dbdabfb6d26243bb6f55b", "externalIds": {"DOI": "10.1016/j.foodcont.2022.108902", "CorpusId": 247099243}, "corpusId": 247099243, "publicationVenue": {"id": "52adc4f7-b293-4f2f-9ead-05a1e0e415ed", "name": "Food Control", "type": "journal", "issn": "0956-7135", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/30418/description", "alternate_urls": ["https://www.journals.elsevier.com/food-control", "http://www.sciencedirect.com/science/journal/09567135"]}, "url": "https://www.semanticscholar.org/paper/70276650403e5b1cb13dbdabfb6d26243bb6f55b", "title": "Fish quality evaluation by sensor and machine learning: A mechanistic review", "abstract": null, "venue": "Food Control", "year": 2022, "referenceCount": 72, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": ["Review"], "publicationDate": "2022-02-01", "journal": {"name": "Food Control"}, "authors": [{"authorId": "2156216091", "name": "Rehan Saeed"}, {"authorId": "48366598", "name": "Huanhuan Feng"}, {"authorId": "2144799429", "name": "Xiang Wang"}, {"authorId": "71128926", "name": "Zhang Xiaoshuan"}, {"authorId": "41216196", "name": "Fu Zetian"}]}, {"paperId": "620ac189d2cd19e9d35728b91b6efd7f9b7ece03", "externalIds": {"PubMedCentral": "9760544", "DOI": "10.1016/j.ajp.2022.103021", "CorpusId": 246802916, "PubMed": "35219978"}, "corpusId": 246802916, "publicationVenue": {"id": "6be19581-545b-41e7-a4f2-5c5e3a310821", "name": "Asian Journal of Psychiatry", "type": "journal", "alternate_names": ["Asian J Psychiatry"], "issn": "1876-2018", "url": "http://www.asianjournalofpsychiatry.com/", "alternate_urls": ["https://www.journals.elsevier.com/asian-journal-of-psychiatry"]}, "url": "https://www.semanticscholar.org/paper/620ac189d2cd19e9d35728b91b6efd7f9b7ece03", "title": "Artificial intelligence and Psychiatry: An overview", "abstract": null, "venue": "Asian Journal of Psychiatry", "year": 2022, "referenceCount": 69, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-02-01", "journal": {"volume": "70", "pages": "103021 - 103021", "name": "Asian Journal of Psychiatry"}, "authors": [{"authorId": "2146671309", "name": "Adwitiya Ray"}, {"authorId": "28972263", "name": "Akansha Bhardwaj"}, {"authorId": "72144493", "name": "Y. Malik"}, {"authorId": "49551175", "name": "Shipra Singh"}, {"authorId": "153382032", "name": "R. Gupta"}]}, {"paperId": "34f2fff0eda8f215c4d73462526371f1f9836bea", "externalIds": {"PubMedCentral": "8835112", "DOI": "10.3390/ijerph19031728", "CorpusId": 246540644, "PubMed": "35162751"}, "corpusId": 246540644, "publicationVenue": {"id": "3096eb5c-d18c-4877-94cd-28edd3a9c357", "name": "International Journal of Environmental Research and Public Health", "type": "journal", "alternate_names": ["Int J Environ Res Public Health"], "issn": "1660-4601", "url": "http://www.mdpi.com/journal/ijerph/"}, "url": "https://www.semanticscholar.org/paper/34f2fff0eda8f215c4d73462526371f1f9836bea", "title": "Artificial Intelligence: A New Diagnostic Software in Dentistry: A Preliminary Performance Diagnostic Study", "abstract": "Background: Artificial intelligence (AI) has taken hold in public health because more and more people are looking to make a diagnosis using technology that allows them to work faster and more accurately, reducing costs and the number of medical errors. Methods: In the present study, 120 panoramic X-rays (OPGs) were randomly selected from the Department of Oral and Maxillofacial Sciences of Sapienza University of Rome, Italy. The OPGs were acquired and analyzed using Apox, which takes a panoramic X-rayand automatically returns the dental formula, the presence of dental implants, prosthetic crowns, fillings and root remnants. A descriptive analysis was performed presenting the categorical variables as absolute and relative frequencies. Results: In total, the number of true positive (TP) values was 2.195 (19.06%); true negative (TN), 8.908 (77.34%); false positive (FP), 132 (1.15%); and false negative (FN), 283 (2.46%). The overall sensitivity was 0.89, while the overall specificity was 0.98. Conclusions: The present study shows the latest achievements in dentistry, analyzing the application and credibility of a new diagnostic method to improve the work of dentists and the patients\u2019 care.", "venue": "International Journal of Environmental Research and Public Health", "year": 2022, "referenceCount": 30, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1660-4601/19/3/1728/pdf?version=1644394782", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-01", "journal": {"volume": "19", "name": "International Journal of Environmental Research and Public Health"}, "authors": [{"authorId": "12548652", "name": "F. De Angelis"}, {"authorId": "6823991", "name": "N. Pranno"}, {"authorId": "1768252708", "name": "A. Franchina"}, {"authorId": "47583050", "name": "S. Di Carlo"}, {"authorId": "39544128", "name": "E. Brauner"}, {"authorId": "51215976", "name": "A. Ferri"}, {"authorId": "33471158", "name": "G. Pellegrino"}, {"authorId": "6116156", "name": "E. Grecchi"}, {"authorId": "83041222", "name": "F. Goker"}, {"authorId": "5600848", "name": "L. Stefanelli"}]}, {"paperId": "6af39776d0ebae6441006a495d595fd5625febf0", "externalIds": {"DBLP": "journals/tois/ZhuSNDDZ22", "DOI": "10.1145/3507356", "CorpusId": 246445772}, "corpusId": 246445772, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6af39776d0ebae6441006a495d595fd5625febf0", "title": "Leveraging Narrative to Generate Movie Script", "abstract": "Generating a text based on a predefined guideline is an interesting but challenging problem. A series of studies have been carried out in recent years. In dialogue systems, researchers have explored driving a dialogue based on a plan, while in story generation, a storyline has also been proved to be useful. In this article, we address a new task\u2014generating movie scripts based on a predefined narrative. As an early exploration, we study this problem in a \u201cretrieval-based\u201d setting. We propose a model (ScriptWriter-CPre) to select the best response (i.e., next script line) among the candidates that fit the context (i.e., previous script lines) as well as the given narrative. Our model can keep track of what in the narrative has been said and what is to be said. Besides, it can also predict which part of the narrative should be paid more attention to when selecting the next line of script. In our study, we find the narrative plays a different role than the context. Therefore, different mechanisms are designed for deal with them. Due to the unavailability of data for this new application, we construct a new large-scale data collection GraphMovie from a movie website where end-users can upload their narratives freely when watching a movie. This new dataset is made available publicly to facilitate other studies in text generation under the guideline. Experimental results on the dataset show that our proposed approach based on narratives significantly outperforms the baselines that simply use the narrative as a kind of context.", "venue": "ACM Trans. Inf. Syst.", "year": 2022, "referenceCount": 74, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-01", "journal": {"volume": "40", "pages": "1 - 32", "name": "ACM Transactions on Information Systems (TOIS)"}, "authors": [{"authorId": "2123659063", "name": "Yutao Zhu"}, {"authorId": "35119829", "name": "Ruihua Song"}, {"authorId": "50204644", "name": "J. Nie"}, {"authorId": "2407633", "name": "Pan Du"}, {"authorId": "1897235", "name": "Zhicheng Dou"}, {"authorId": "2145786629", "name": "Jin Zhou"}]}, {"paperId": "2f75ff0ed69e49675333c787faf6578029996da4", "externalIds": {"MAG": "3206438477", "DOI": "10.1145/3464383", "CorpusId": 244584771}, "corpusId": 244584771, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2f75ff0ed69e49675333c787faf6578029996da4", "title": "GeCoAgent: A Conversational Agent for Empowering Genomic Data Extraction and Analysis", "abstract": "With the availability of reliable and low-cost DNA sequencing, human genomics is relevant to a growing number of end-users, including biologists and clinicians. Typical interactions require applyin...", "venue": "", "year": 2022, "referenceCount": 42, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://re.public.polimi.it/bitstream/11311/1192262/1/41330654_File000001_1022346825%20%282%29.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-31", "journal": {"volume": "3", "pages": "1-29", "name": ""}, "authors": [{"authorId": "2141951104", "name": "CrovariPietro"}, {"authorId": "2141950360", "name": "Pid\u00f2Sara"}, {"authorId": "1643894709", "name": "PinoliPietro"}, {"authorId": "1644695441", "name": "BernasconiAnna"}, {"authorId": "2141997733", "name": "CanakogluArif"}, {"authorId": "1581876025", "name": "GarzottoFranca"}, {"authorId": "1643716327", "name": "CeriStefano"}]}, {"paperId": "cde1e5bf12ec346323c99f597bb41e77232c1df9", "externalIds": {"DBLP": "journals/tois/MaLZLL22", "DOI": "10.1145/3464377", "CorpusId": 246065789}, "corpusId": 246065789, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cde1e5bf12ec346323c99f597bb41e77232c1df9", "title": "Unstructured Text Enhanced Open-Domain Dialogue System: A Systematic Survey", "abstract": "\n Incorporating external knowledge into dialogue generation has been proven to benefit the performance of an open-domain Dialogue System (DS), such as generating informative or stylized responses, controlling conversation topics. In this article, we study the open-domain DS that uses unstructured text as external knowledge sources (\n U\n nstructured\n T\n ext\n E\n nhanced\n D\n ialogue\n S\n ystem (\n UTEDS\n )). The existence of unstructured text entails distinctions between UTEDS and traditional data-driven DS and we aim at analyzing these differences. We first give the definition of the UTEDS related concepts, then summarize the recently released datasets and models. We categorize UTEDS into Retrieval and Generative models and introduce them from the perspective of model components. The retrieval models consist of Fusion, Matching, and Ranking modules, while the generative models comprise Dialogue and Knowledge Encoding, Knowledge Selection (KS), and Response Generation modules. We further summarize the evaluation methods utilized in UTEDS and analyze the current models\u2019 performance. At last, we discuss the future development trends of UTEDS, hoping to inspire new research in this field.\n", "venue": "ACM Trans. Inf. Syst.", "year": 2022, "referenceCount": 180, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-01-31", "journal": {"volume": "40", "pages": "9:1-9:44", "name": "ACM Trans. Inf. Syst."}, "authors": [{"authorId": "153132928", "name": "Longxuan Ma"}, {"authorId": null, "name": "Mingda Li"}, {"authorId": "1806419", "name": "Weinan Zhang"}, {"authorId": "47787152", "name": "Jiapeng Li"}, {"authorId": "2140034831", "name": "Ting Liu"}]}, {"paperId": "099eeb7735c73fc8ff087a771254d7c39a130c1f", "externalIds": {"PubMedCentral": "8866585", "DOI": "10.1007/s10867-021-09590-9", "CorpusId": 237398514, "PubMed": "35089468"}, "corpusId": 237398514, "publicationVenue": {"id": "874d5120-c187-41c2-b65d-d80ef193edbd", "name": "Journal of biological physics (Print)", "type": "journal", "alternate_names": ["Journal of Biological Physics", "J biological phys (print", "J Biological Phys"], "issn": "0092-0606", "url": "https://link.springer.com/journal/10867"}, "url": "https://www.semanticscholar.org/paper/099eeb7735c73fc8ff087a771254d7c39a130c1f", "title": "Biological computation: hearts and flytraps", "abstract": null, "venue": "Journal of biological physics (Print)", "year": 2022, "referenceCount": 31, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10867-021-09590-9.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-28", "journal": {"volume": "48", "pages": "55 - 78", "name": "Journal of Biological Physics"}, "authors": [{"authorId": "20885065", "name": "Kay L Kirkpatrick"}]}, {"paperId": "5d72d285bb839bb31d1cffbeefb7b0ef3cda018a", "externalIds": {"DOI": "10.1215/00029831-9696959", "CorpusId": 246376480}, "corpusId": 246376480, "publicationVenue": {"id": "017f8757-c86c-4ac5-b439-132df4e99fc8", "name": "American Literature", "type": "journal", "alternate_names": ["Am Lit"], "issn": "0002-9831", "url": "http://muse.jhu.edu/journals/al/", "alternate_urls": ["http://www.jstor.org/journals/00029831.html", "https://www.jstor.org/journal/amerlite", "http://americanliterature.dukejournals.org/"]}, "url": "https://www.semanticscholar.org/paper/5d72d285bb839bb31d1cffbeefb7b0ef3cda018a", "title": "Introduction: American Game Studies", "abstract": "In 2017, the American game designer Momo Pixel released the single-player, browser-based game Hair Nah. In this game, you play as Aeva, a Black woman taking trips to locations that include Osaka, Havana, and the Santa Monica Pier. As you move through levels on your journey\u2014a taxi ride, airport security, sitting on the plane\u2014you must slap away increasingly aggressive white hands that reach into the frame to touch your hair. Though Hair Nah taps into the genre of a casual button-mashing game, this interactive experience also explores the topic of microaggressions via unwanted hair touching. If you slap away enough hands on your travels, you reach a screen welcoming you to your destination with the message \u201cYOU WIN!\u201d but the caveat, \u201cThe game is over, but this experience isn\u2019t. This is an issue that black women face daily. So a note to those who do it STOP THAT SHIT.\u201d How did video games move from a medium oriented toward adolescent male consumers and characterized by violent actions, such as shooting or fighting, to one that could also accommodate a playfully serious and cathartic exploration of a Black woman defending herself against racist bodily intrusions? Though video games still privilege violent mechanics and are far from diverse, especially in terms of designers and developers in the industry, the early twenty-first century has seen an expansion of the form of, and the culture surrounding, games. This has included a proliferation of game genres: puzzleplatforms (a hybrid that combines spatial or cognitive puzzles with jumps across platforms as in Super Mario Bros. [Nintendo, 1983]); survival horror games (action-adventure games in which the player must persist in a threatening environment without adequate resources);", "venue": "American Literature", "year": 2022, "referenceCount": 45, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://read.dukeupress.edu/american-literature/article-pdf/94/1/1/1503208/1jagoda.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-27", "journal": {"name": "American Literature"}, "authors": [{"authorId": "11894276", "name": "Patrick Jagoda"}, {"authorId": "11751678", "name": "Jennifer A. Malkowski"}]}, {"paperId": "4b09890801e648078d806b7b1fbf8ad89d317f96", "externalIds": {"ArXiv": "2201.11197", "DBLP": "journals/corr/abs-2201-11197", "CorpusId": 246294878}, "corpusId": 246294878, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4b09890801e648078d806b7b1fbf8ad89d317f96", "title": "Challenges and Opportunities for Machine Learning Classification of Behavior and Mental State from Images", "abstract": "Computer Vision (CV) classifiers which distinguish and detect nonverbal social human behavior and mental state can aid digital diagnostics and therapeutics for psychiatry and the behavioral sciences. While CV classifiers for traditional and structured classification tasks can be developed with standard machine learning pipelines for supervised learning consisting of data labeling, preprocessing, and training a convolutional neural network, there are several pain points which arise when attempting this process for behavioral phenotyping. Here, we discuss the challenges and corresponding opportunities in this space, including handling heterogeneous data, avoiding biased models, labeling massive and repetitive data sets, working with ambiguous or compound class labels, managing privacy concerns, creating appropriate representations, and personalizing models. We discuss current state-of-the-art research endeavors in CV such as data curation, data augmentation, crowdsourced labeling, active learning, reinforcement learning, generative models, representation learning, federated learning, and meta-learning. We highlight at least some of the machine learning advancements needed for imaging classifiers to detect human social cues successfully and reliably.", "venue": "ArXiv", "year": 2022, "referenceCount": 248, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-26", "journal": {"volume": "abs/2201.11197", "name": "ArXiv"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": "2065984781", "name": "O. Mutlu"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": "2240125", "name": "K. Paskov"}, {"authorId": "30423115", "name": "N. Stockham"}, {"authorId": "66636865", "name": "B. Chrisman"}, {"authorId": "2179073073", "name": "Nick Deveaux"}, {"authorId": "2151248737", "name": "Mourya Surhabi"}, {"authorId": "32551479", "name": "N. Haber"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "382f9da008eaa9f5f1b7c69350d9e4e1c62025e5", "externalIds": {"DOI": "10.1177/1742271X211072473", "CorpusId": 246226102}, "corpusId": 246226102, "publicationVenue": {"id": "cea7e981-2c7b-4258-82f2-c18dc4cd13ee", "name": "Ultrasound", "type": "journal", "issn": "1392-2114", "alternate_issns": ["1742-271X"], "url": "https://journals.sagepub.com/home/ult", "alternate_urls": ["http://www.uk.sagepub.com/journals/Journal202202"]}, "url": "https://www.semanticscholar.org/paper/382f9da008eaa9f5f1b7c69350d9e4e1c62025e5", "title": "The application of artificial intelligence in the sonography profession: Professional and educational considerations", "abstract": "The integration of artificial intelligence (AI) technology within the health industry is increasing. This educational piece discusses the implementation of AI and its impact on sonography. The authors investigate how AI may influence the profession and provide examples of how ultrasound imaging may be enhanced and innovated by integrating AI technology. This article highlights challenges related to the application of AI and provides insight into how they could be addressed. The critical distinction between the role of a sonographer and the reporting specialist in the context of AI is highlighted as a key issue for those developing, researching, and evaluating AI systems. A key recommendation is for the sonography community to address ultrasound education, particularly how AI knowledge could be incorporated into university education. This is an important consideration that should be extended to practising professionals as they may be involved in evaluating the efficiency and methodologies used in new research that may incorporate AI technologies.", "venue": "Ultrasound", "year": 2022, "referenceCount": 55, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://eprints.qut.edu.au/227674/1/105038162.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-21", "journal": {"volume": "30", "pages": "273 - 282", "name": "Ultrasound"}, "authors": [{"authorId": "2082469883", "name": "C. Edwards"}, {"authorId": "51956141", "name": "Crispen Chamunyonga"}, {"authorId": "1484821605", "name": "Ben Searle"}, {"authorId": "4409885", "name": "T. Reddan"}]}, {"paperId": "66cc87463c0f27256a18eb02915460ef0b510c0b", "externalIds": {"ArXiv": "2201.07372", "DBLP": "journals/corr/abs-2201-07372", "CorpusId": 246035573}, "corpusId": 246035573, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/66cc87463c0f27256a18eb02915460ef0b510c0b", "title": "Prospective Learning: Back to the Future", "abstract": "Research on both natural intelligence (NI) and artificial intelligence (AI) generally assumes that the future resembles the past: intelligent agents or systems (what we call \u2018intelligence\u2019) observe and act on the world, then use this experience to act on future experiences of the same kind. We call this \u2018retrospective learning\u2019. For example, an intelligence may see a set of pictures of objects, along with their names, and learn to name them. A retrospective learning intelligence would merely be able to name more pictures of the same objects. We argue that this is not what true intelligence is about. In many real world problems, both NIs and AIs will have to learn for an uncertain future. Both must update their internal models to be useful for future tasks, such as naming fundamentally new objects and using these objects effectively in a new context or to achieve previously unencountered goals. This ability to learn for the future we call \u2018prospective learning\u2019. We articulate four relevant factors that jointly define prospective learning. Continual learning enables intelligences to remember those aspects of the past which it believes will be most useful in the future. Prospective constraints (including biases and priors) facilitate the intelligence finding general solutions that will be applicable to future problems. Curiosity motivates taking actions that inform future decision making, including in previously unmet situations. Causal estimation enables learning the structure of relations that guide choosing actions for specific outcomes, even when the specific action-outcome contingencies have never been observed before. We argue that a paradigm shift from retrospective to prospective learning will enable the communities that study intelligence to unite and overcome existing bottlenecks to more effectively explain, augment, and engineer intelligences. \u201cNo man ever steps in the same river twice. For it\u2019s not the same river and he\u2019s not the same man.\u201d Heraclitus", "venue": "ArXiv", "year": 2022, "referenceCount": 219, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-19", "journal": {"volume": "abs/2201.07372", "name": "ArXiv"}, "authors": [{"authorId": "1717958", "name": "J. Vogelstein"}, {"authorId": "48174169", "name": "T. Verstynen"}, {"authorId": "150174214", "name": "K. Kording"}, {"authorId": "2166242", "name": "Leyla Isik"}, {"authorId": "3124681", "name": "J. Krakauer"}, {"authorId": "1398026219", "name": "R. Etienne-Cummings"}, {"authorId": "2564494", "name": "E. Ogburn"}, {"authorId": "2068800231", "name": "Carey E. Priebe"}, {"authorId": "145542377", "name": "R. Burns"}, {"authorId": "3407505", "name": "Kwame S. Kutten"}, {"authorId": "2972274", "name": "J. Knierim"}, {"authorId": "2171465", "name": "J. Potash"}, {"authorId": "2072950283", "name": "T. Hartung"}, {"authorId": "145820240", "name": "L. Smirnova"}, {"authorId": "2150486352", "name": "Paul Worley"}, {"authorId": "6549687", "name": "A. Savonenko"}, {"authorId": "51115141", "name": "I. Phillips"}, {"authorId": "2111173632", "name": "Michael Miller"}, {"authorId": "2150487213", "name": "Rene Vidal"}, {"authorId": "2714145", "name": "Jeremias Sulam"}, {"authorId": "144305878", "name": "Adam S. Charles"}, {"authorId": "145988982", "name": "N. Cowan"}, {"authorId": "1722887", "name": "Maxim Bichuch"}, {"authorId": "3318697", "name": "A. Venkataraman"}, {"authorId": "40144368", "name": "Chen Li"}, {"authorId": "145146201", "name": "N. Thakor"}, {"authorId": "6481849", "name": "Justus M. Kebschull"}, {"authorId": "2055754721", "name": "M. Albert"}, {"authorId": "2155955522", "name": "Jinchong Xu"}, {"authorId": "144176224", "name": "M. Shuler"}, {"authorId": "1397970751", "name": "B. Caffo"}, {"authorId": "47026288", "name": "T. Ratnanather"}, {"authorId": "2008817606", "name": "Ali Geisa"}, {"authorId": "47110018", "name": "S. Roh"}, {"authorId": "2127864028", "name": "Eva Yezerets"}, {"authorId": "50481453", "name": "Meghana Madhyastha"}, {"authorId": "3706007", "name": "Javier J. How"}, {"authorId": "2414228", "name": "Tyler M. Tomita"}, {"authorId": "31627573", "name": "Jayanta Dey"}, {"authorId": "2003308715", "name": "N. Huang"}, {"authorId": "2152473079", "name": "Jong M. Shin"}, {"authorId": "2130912736", "name": "K. A. Kinfu"}, {"authorId": "2059257077", "name": "Pratik R. Chaudhari"}, {"authorId": "144728145", "name": "Ben Baker"}, {"authorId": "2717995", "name": "A. Schapiro"}, {"authorId": "144348441", "name": "Dinesh Jayaraman"}, {"authorId": "144020269", "name": "Eric Eaton"}, {"authorId": "153298565", "name": "M. Platt"}, {"authorId": "143857273", "name": "Pallavi V. Kulkarni"}, {"authorId": "2001748", "name": "Leila Wehbe"}, {"authorId": "49542731", "name": "\u00c1d\u00e1m Kepecs"}, {"authorId": "2003795252", "name": "Amy Christensen"}, {"authorId": "66716646", "name": "O. Osuagwu"}, {"authorId": "1824880", "name": "Bingni W. Brunton"}, {"authorId": "1875164", "name": "B. Mensh"}, {"authorId": "8665112", "name": "A. Muotri"}, {"authorId": "2150488210", "name": "Gabriel Silva"}, {"authorId": "49843412", "name": "F. Puppo"}, {"authorId": "5478027", "name": "F. Engert"}, {"authorId": "2104527645", "name": "Elizabeth Hillman"}, {"authorId": "2110786762", "name": "Julia Brown"}, {"authorId": "2008826474", "name": "Christoper M. White"}, {"authorId": "2117131236", "name": "Weiwei Yang"}]}, {"paperId": "327a4db46f71c26af556f4c270c6ccf44d7526ed", "externalIds": {"DOI": "10.20944/preprints202201.0206.v1", "CorpusId": 246059455}, "corpusId": 246059455, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/327a4db46f71c26af556f4c270c6ccf44d7526ed", "title": "Computational Models in Neurosciences Between Mechanistic and Phenomenological Characterizations", "abstract": "Computational neuroscience combines mathematics, computer science models, and neurosciences for theorizing, investigating, and simulating neural systems involved in the development, structure, physiology, and cognitive abilities of the brain. Computational models constitute a major stake in translational neuroscience: the analytical understanding of these models seems fundamental to consider a translation towards clinical applications. Method: We propose a minimal typology of computational models, which allows distinguishing between more realistic models (e.g., mechanistic models) and pragmatic models (e.g., phenomenological models). Result: Understanding the translational aspects of computational models goes far beyond the intrinsic characteristics of models. First, we assume that a computational model is rarely uniquely mechanistic or phenomenological. Idealization seems necessary because of i) the researcher\u2019s perspectives on the phenomena and the purposes of the study (i.e., by the relativity of the model); ii) The complexity of reality across different levels and therefore the nature and number of dimensions required to consider a phenomenon. Especially, the use of models goes far beyond their function, and requires considering external characteristics rooted in path dependence, interdisciplinarity, and pluralism in neurosciences. Conclusion: The unreasonable use of computational models, which are highly complex and subject to a shift in their initial function, could be limited by bringing to light such factors.", "venue": "", "year": 2022, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.preprints.org/manuscript/202201.0206/v1/download", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-14", "journal": null, "authors": [{"authorId": "116951279", "name": "C. Gauld"}, {"authorId": "2069885259", "name": "C\u00e9dric N. Brun"}, {"authorId": "2877867", "name": "T. Boraud"}, {"authorId": "35361345", "name": "M. Carlu"}, {"authorId": "146481340", "name": "D. Depannemaecker"}]}, {"paperId": "92bc0f4e44e963ba87d5d3a49cfc93f69fed04c8", "externalIds": {"DOI": "10.1097/RCT.0000000000001247", "CorpusId": 245966939, "PubMed": "35027520"}, "corpusId": 245966939, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/92bc0f4e44e963ba87d5d3a49cfc93f69fed04c8", "title": "Artificial Intelligence in Diagnostic Radiology: Where Do We Stand, Challenges, and Opportunities", "abstract": "Abstract Artificial intelligence (AI) is the most revolutionizing development in the health care industry in the current decade, with diagnostic imaging having the greatest share in such development. Machine learning and deep learning (DL) are subclasses of AI that show breakthrough performance in image analysis. They have become the state of the art in the field of image classification and recognition. Machine learning deals with the extraction of the important characteristic features from images, whereas DL uses neural networks to solve such problems with better performance. In this review, we discuss the current applications of machine learning and DL in the field of diagnostic radiology. Deep learning applications can be divided into medical imaging analysis and applications beyond analysis. In the field of medical imaging analysis, deep convolutional neural networks are used for image classification, lesion detection, and segmentation. Also used are recurrent neural networks when extracting information from electronic medical records and to augment the use of convolutional neural networks in the field of image classification. Generative adversarial networks have been explicitly used in generating high-resolution computed tomography and magnetic resonance images and to map computed tomography images from the corresponding magnetic resonance imaging. Beyond image analysis, DL can be used for quality control, workflow organization, and reporting. In this article, we review the most current AI models used in medical imaging research, providing a brief explanation of the various models described in the literature within the past 5 years. Emphasis is placed on the various DL models, as they are the most state-of-art in imaging analysis.", "venue": "Journal of computer assisted tomography", "year": 2022, "referenceCount": 111, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-01-12", "journal": {"volume": "46", "pages": "78 - 90", "name": "Journal of Computer Assisted Tomography"}, "authors": [{"authorId": "48998447", "name": "A. Moawad"}, {"authorId": "144499915", "name": "David T. Fuentes"}, {"authorId": "4056485", "name": "Mohamed G. Elbanan"}, {"authorId": "143627282", "name": "A. Shalaby"}, {"authorId": "83389532", "name": "Jeffrey R. Guccione"}, {"authorId": "1505801840", "name": "Serageldin Kamel"}, {"authorId": "37923217", "name": "C. Jensen"}, {"authorId": "3901588", "name": "K. Elsayes"}]}, {"paperId": "94f02394a8f019d7ece7eb9612e96253ba97f30c", "externalIds": {"ACL": "2022.nlp4convai-1.8", "DBLP": "conf/acl-convai/SmithHQRBW22", "ArXiv": "2201.04723", "DOI": "10.18653/v1/2022.nlp4convai-1.8", "CorpusId": 245906443}, "corpusId": 245906443, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/94f02394a8f019d7ece7eb9612e96253ba97f30c", "title": "Human Evaluation of Conversations is an Open Problem: comparing the sensitivity of various methods for evaluating dialogue agents", "abstract": "At the heart of improving conversational AI is the open problem of how to evaluate conversations. Issues with automatic metrics are well known (Liu et al., 2016), with human evaluations still considered the gold standard. Unfortunately, how to perform human evaluations is also an open problem: differing data collection methods have varying levels of human agreement and statistical sensitivity, resulting in differing amounts of human annotation hours and labor costs. In this work we compare five different crowdworker-based human evaluation methods and find that different methods are best depending on the types of models compared, with no clear winner across the board. While this highlights the open problems in the area, our analysis leads to advice of when to use which one, and possible future directions.", "venue": "NLP4CONVAI", "year": 2022, "referenceCount": 59, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://aclanthology.org/2022.nlp4convai-1.8.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-12", "journal": {"pages": "77-97"}, "authors": [{"authorId": "51324296", "name": "Eric Michael Smith"}, {"authorId": "2149798298", "name": "Orion Hsu"}, {"authorId": "2149798086", "name": "Rebecca Qian"}, {"authorId": "3849208", "name": "Stephen Roller"}, {"authorId": "90841478", "name": "Y-Lan Boureau"}, {"authorId": "145183709", "name": "J. Weston"}]}, {"paperId": "975e91a658d74856779af3883b58a4aa374cb28b", "externalIds": {"DBLP": "journals/corr/abs-2201-02478", "ArXiv": "2201.02478", "DOI": "10.1109/ACCESS.2022.3159911", "CorpusId": 245827867}, "corpusId": 245827867, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/975e91a658d74856779af3883b58a4aa374cb28b", "title": "Bayesian Neural Networks for Reversible Steganography", "abstract": "Recent advances in deep learning have led to a paradigm shift in the field of reversible steganography. A fundamental pillar of reversible steganography is predictive modelling which can be realised via deep neural networks. However, non-trivial errors exist in inferences about some out-of-distribution and noisy data. In view of this issue, we propose to consider uncertainty in predictive models based upon a theoretical framework of Bayesian deep learning, thereby creating an adaptive steganographic system. Most modern deep-learning models are regarded as deterministic because they only offer predictions while failing to provide uncertainty measurement. Bayesian neural networks bring a probabilistic perspective to deep learning and can be regarded as self-aware intelligent machinery; that is, a machine that knows its own limitations. To quantify uncertainty, we apply Bayesian statistics to model the predictive distribution and approximate it through Monte Carlo sampling with stochastic forward passes. We further show that predictive uncertainty can be disentangled into aleatoric and epistemic uncertainties and these quantities can be learnt unsupervised. Experimental results demonstrate an improvement delivered by Bayesian uncertainty analysis upon steganographic rate-distortion performance.", "venue": "IEEE Access", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/9668973/09736990.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": {"volume": "10", "pages": "36327-36334", "name": "IEEE Access"}, "authors": [{"authorId": "4020249", "name": "Ching-Chun Chang"}]}, {"paperId": "4b2b5e565451ee6b55b7e902b646f4fd0fec7e11", "externalIds": {"ArXiv": "2201.02303", "DBLP": "journals/corr/abs-2201-02303", "CorpusId": 245827770}, "corpusId": 245827770, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4b2b5e565451ee6b55b7e902b646f4fd0fec7e11", "title": "From Textual Experiments to Experimental Texts: Expressive Repetition in \"Artificial Intelligence Literature\"", "abstract": "Since the birth of artificial intelligence 70 years ago, attempts at literary \u201ccreation\u201d with computers are present in the course of technological development, creating what one might call \u201cartificial intelligence literature\u201d (AI literature). Evolving from \u201ctextual experiments\u201d conducted by technologists to \u201cexperimental texts\u201d that explore the possibilities of conceptions of literature, AI literature integrates primitive problems including machine thinking, text generation, and machine creativity, which exhibits the two-way interaction between social ideas and technology. In the early stage, the mutual support between technological path and artistic ideas turned out to be a failure, while AI-driven expressive repetitions are made probable in the contemporary technological context, paving the way for the transformation of AI literature from proof for technical possibilities to self-verification of literary value.", "venue": "ArXiv", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": {"volume": "abs/2201.02303", "name": "ArXiv"}, "authors": [{"authorId": "2726531", "name": "Tianhua Zhu"}]}, {"paperId": "ccce8afb43154cf5ad8fc3dfcd0f1bf3e4b3a7f1", "externalIds": {"DOI": "10.1177/87569728211061779", "CorpusId": 245817331}, "corpusId": 245817331, "publicationVenue": {"id": "94c97235-3c91-4dd5-9fdc-97697967fbfc", "name": "Project Management Journal", "type": "journal", "alternate_names": ["Proj Manag J"], "issn": "1938-9507", "url": "https://journals.sagepub.com/home/pmx", "alternate_urls": ["http://www3.interscience.wiley.com/cgi-bin/jhome/114291333", "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1938-9507"]}, "url": "https://www.semanticscholar.org/paper/ccce8afb43154cf5ad8fc3dfcd0f1bf3e4b3a7f1", "title": "The Expectations of Project Managers from Artificial Intelligence: A Delphi Study", "abstract": "Artificial intelligence (AI) technologies are rapidly developing these days and are expected to impact the field of project management on multiple levels; however, there remains a high level of uncertainty regarding the effect that AI might have on project management practices. This article aims to address this topic based on a Delphi study with a panel of 52 project management experts who reflected on future potential AI applications for the project management Knowledge Areas. The article provides a visionary perspective that can be further translated into practical solutions in the near and far future to improve project management practices.", "venue": "Project Management Journal", "year": 2022, "referenceCount": 125, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": {"volume": "53", "pages": "438 - 455", "name": "Project Management Journal"}, "authors": [{"authorId": "90220793", "name": "Vered Holzmann"}, {"authorId": "2149284915", "name": "Daniel Zitter"}, {"authorId": "2149284742", "name": "Sahar Peshkess"}]}, {"paperId": "b2be05ccef54fdc5514467c7fef5d155cccff8a8", "externalIds": {"DOI": "10.1108/ijm-07-2021-0423", "CorpusId": 245735534}, "corpusId": 245735534, "publicationVenue": {"id": "69e07ba8-c284-481e-be3d-10a9debf23ca", "name": "International journal of manpower", "type": "journal", "alternate_names": ["International Journal of Manpower", "Int J Manpow", "Int j manpow"], "issn": "0143-7720", "url": "https://www.emerald.com/insight/publication/issn/0143-7720", "alternate_urls": ["http://info.emeraldinsight.com/products/journals/journals.htm?id=ijm"]}, "url": "https://www.semanticscholar.org/paper/b2be05ccef54fdc5514467c7fef5d155cccff8a8", "title": "A study of artificial intelligence on employee performance and work engagement: the moderating role of change leadership", "abstract": "PurposeThis paper aims to explore employee perceptions of companies engaged in services and banking of the role of change leadership on the application of artificial intelligence (AI) that will impact the performance and work engagement in conditions that are experiencing rapid changes.Design/methodology/approachThis study has used a quantitative research approach, and data analysis uses an approach structural equation modeling (SEM) supported by program computer software AMOS 22.0. A total of 357 respondents were involved in this study, but only 254 were qualified. In this study, the respondent is an employee of companies engaged in the services and banking sector in the East Java, Indonesia region.FindingsThe results reveal that AI has a significant positive effect on employee performance and work engagement. Change leadership positively moderates the influence of AI on employee performance and work engagement.Originality/valueThe development of this model has a novelty by including the moderating variable of the role of change leadership because, in conditions that are experiencing rapid changes, the role of leaders is essential. After all, leaders are decision-makers in the organization. The development of this concept focuses on studies of companies engaged in services and banking. Employee performance is an essential determinant in the organization because it will improve organizational performance. In addition, the application of AI in organizations will experience turmoil, so that the critical role of leaders is needed to achieve success with employee work engagement.", "venue": "International journal of manpower", "year": 2022, "referenceCount": 122, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-04", "journal": {"name": "International Journal of Manpower"}, "authors": [{"authorId": "74599974", "name": "D. Wijayati"}, {"authorId": "122253491", "name": "Z. Rahman"}, {"authorId": "114186387", "name": "A. Fahrullah"}, {"authorId": "1581361640", "name": "Muhammad Fajar Wahyudi Rahman"}, {"authorId": "2005519031", "name": "Ika Diyah Candra Arifah"}, {"authorId": "83278325", "name": "Achmad Kautsar"}]}, {"paperId": "86f33254eb241f0be2708e3fab5bdc2816141f2e", "externalIds": {"DBLP": "journals/mta/NiralaSP22", "PubMedCentral": "8721490", "DOI": "10.1007/s11042-021-11458-y", "CorpusId": 245654055, "PubMed": "35002470"}, "corpusId": 245654055, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/86f33254eb241f0be2708e3fab5bdc2816141f2e", "title": "A survey on providing customer and public administration based services using AI: chatbot", "abstract": null, "venue": "Multim. Tools Appl.", "year": 2022, "referenceCount": 84, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11042-021-11458-y.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-01-03", "journal": {"volume": "81", "pages": "22215 - 22246", "name": "Multimedia Tools and Applications"}, "authors": [{"authorId": "2148229185", "name": "Krishna Kumar Nirala"}, {"authorId": "31694553", "name": "N. Singh"}, {"authorId": "70661096", "name": "V. S. Purani"}]}, {"paperId": "f33c6f1707752009d0ff7845f2a2ab019c58cbe9", "externalIds": {"DOI": "10.4018/ijhisi.315618", "CorpusId": 255090058}, "corpusId": 255090058, "publicationVenue": {"id": "44a18297-4f46-4f88-b6a5-60d24b958cf7", "name": "International Journal of Healthcare Information Systems and Informatics", "type": "journal", "alternate_names": ["Int J Healthc Inf Syst Informatics"], "issn": "1555-3396", "url": "http://www.idea-group.com/journals/details.asp?id=4835&mode=tocVolumes", "alternate_urls": ["https://www.igi-global.com/journal/international-journal-healthcare-information-systems/1094"]}, "url": "https://www.semanticscholar.org/paper/f33c6f1707752009d0ff7845f2a2ab019c58cbe9", "title": "Doctor Resistance of Artificial Intelligence in Healthcare", "abstract": "Artificial intelligence (AI) has revolutionized healthcare by enhancing the quality of patient care. Despite its advantages, doctors are still reluctant to use AI in healthcare. Thus, the authors' main objective is to obtain an in-depth understanding of the barriers to doctors' adoption of AI in healthcare. The authors conducted semi-structured interviews with 11 doctors. Thematic analysis as chosen to identify patterns using QSR NVivo (version 12). The results showed that the barriers to AI adoption are lack of financial resources, need for special training, performance risk, perceived cost, technology dependency, need for human interaction, and fear of AI replacing human work.", "venue": "International Journal of Healthcare Information Systems and Informatics", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.igi-global.com/ViewTitle.aspx?TitleId=315618&isxn=9781799878247", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-01", "journal": {"name": "International Journal of Healthcare Information Systems and Informatics"}, "authors": [{"authorId": "2198133334", "name": "Asma Chaibi"}, {"authorId": "86971721", "name": "I. Zaiem"}]}, {"paperId": "399302544fa6dcb0ae7bf37b216338ecdbbb6249", "externalIds": {"DBLP": "journals/alife/AmosW22", "DOI": "10.1162/artl_a_00381", "CorpusId": 251671497, "PubMed": "35984431"}, "corpusId": 251671497, "publicationVenue": {"id": "5ed9f470-65a3-4077-8dab-163b0c5cb9e6", "name": "Artificial Life", "type": "journal", "alternate_names": ["Artif Life"], "issn": "1064-5462", "url": "http://cognet.mit.edu/library/journals/journal?issn=10645462", "alternate_urls": ["http://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/doi/10.1162/ARTL_a_00243"]}, "url": "https://www.semanticscholar.org/paper/399302544fa6dcb0ae7bf37b216338ecdbbb6249", "title": "Crowd-Sourced Identification of Characteristics of Collective Human Motion", "abstract": "Abstract Crowd simulations are used extensively to study the dynamics of human collectives. Such studies are underpinned by specific movement models, which encode rules and assumptions about how people navigate a space and handle interactions with others. These models often give rise to macroscopic simulated crowd behaviours that are statistically valid, but which lack the noisy microscopic behaviours that are the signature of believable real crowds. In this article, we use an existing Turing test for crowds to identify realistic features of real crowds that are generally omitted from simulation models. Our previous study using this test established that untrained individuals have difficulty in classifying movies of crowds as real or simulated, and that such people often have an idealised view of how crowds move. In this follow-up study (with new participants) we perform a second trial, which now includes a training phase (showing participants movies of real crowds). We find that classification performance significantly improves after training, confirming the existence of features that allow participants to identify real crowds. High-performing individuals are able to identify the features of real crowds that should be incorporated into future simulations if they are to be considered realistic.", "venue": "Artificial Life", "year": 2022, "referenceCount": 57, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://nrl.northumbria.ac.uk/id/eprint/48972/1/AMOS.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-01", "journal": {"volume": "28", "pages": "401-422", "name": "Artificial Life"}, "authors": [{"authorId": "144936973", "name": "M. Amos"}, {"authorId": "2130441911", "name": "Jamie Webster"}]}, {"paperId": "9fff3ccb868e37ff40300957b92ee74d5ba9b8d6", "externalIds": {"DOI": "10.1177/20539517211069891", "CorpusId": 250180452}, "corpusId": 250180452, "publicationVenue": {"id": "4d899b46-b5c8-436e-8ce3-084673ea8905", "name": "Big Data & Society", "type": "journal", "alternate_names": ["Big Data Soc"], "issn": "2053-9517", "url": "http://bds.sagepub.com/", "alternate_urls": ["https://journals.sagepub.com/home/bds"]}, "url": "https://www.semanticscholar.org/paper/9fff3ccb868e37ff40300957b92ee74d5ba9b8d6", "title": "The Thick Machine: Anthropological AI between explanation and explication", "abstract": "According to Clifford Geertz, the purpose of anthropology is not to explain culture but to explicate it. That should cause us to rethink our relationship with machine learning. It is, we contend, perfectly possible that machine learning algorithms, which are unable to explain, and could even be unexplainable themselves, can still be of critical use in a process of explication. Thus, we report on an experiment with anthropological AI. From a dataset of 175K Facebook comments, we trained a neural network to predict the emoji reaction associated with a comment and asked a group of human players to compete against the machine. We show that a) the machine can reach the same (poor) accuracy as the players (51%), b) it fails in roughly the same ways as the players, and c) easily predictable emoji reactions tend to reflect unambiguous situations where interpretation is easy. We therefore repurpose the failures of the neural network to point us to deeper and more ambiguous situations where interpretation is hard and explication becomes both necessary and interesting. We use this experiment as a point of departure for discussing how experiences from anthropology, and in particular the tension between formalist ethnoscience and interpretive thick description, might contribute to debates about explainable AI.", "venue": "Big Data & Society", "year": 2022, "referenceCount": 48, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/20539517211069891", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-01", "journal": {"volume": "9", "name": "Big Data & Society"}, "authors": [{"authorId": "12953449", "name": "A. Munk"}, {"authorId": "2174377350", "name": "Asger Gehrt Olesen"}, {"authorId": "1933458", "name": "M. Jacomy"}]}, {"paperId": "8bd96c059b46845d2199e53d37d788c00a348c56", "externalIds": {"DOI": "10.1590/1982-0259.2022.e82510", "CorpusId": 245923449}, "corpusId": 245923449, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8bd96c059b46845d2199e53d37d788c00a348c56", "title": "Ind\u00fastria 4.0: servi\u00e7o social no sistema previdenci\u00e1rio em tempos da pandemia de COVID-19", "abstract": "Resumo Este texto discute o cen\u00e1rio do trabalho de assistentes sociais (AS) da Previd\u00eancia Social (PS) no Brasil, a partir da pandemia do novo coronav\u00edrus, COVID-19. Busca evidenciar como AS responderam \u00e0 pandemia, em termos do seu trabalho e quais as principais mudan\u00e7as ocorridas na PS nesse per\u00edodo. Utiliza-se de uma entrevista semiestruturada na forma de grupo focal com AS da PS. A \u00eanfase fundamental recai sobre os processos de informatiza\u00e7\u00e3o dos benef\u00edcios previdenci\u00e1rios e teletrabalho correspondendo ao aprofundamento do neoliberalismo e maior fragiliza\u00e7\u00e3o do trabalho.", "venue": "Revista Kat\u00e1lysis", "year": 2022, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.scielo.br/j/rk/a/mn5npLYkqrnNccbXR3ZyGgk/?lang=pt&format=pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-01-01", "journal": {"name": "Revista Kat\u00e1lysis"}, "authors": [{"authorId": "150992517", "name": "Edv\u00e2nia \u00c2ngela de Souza"}]}, {"paperId": "a61d065eb321888e9d4ca808b9952e858e0859c4", "externalIds": {"DOI": "10.1016/j.jfo.2021.11.002", "CorpusId": 245687828}, "corpusId": 245687828, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a61d065eb321888e9d4ca808b9952e858e0859c4", "title": "Intelligence artificielle et glaucome\u00a0: une revue de la litt\u00e9rature", "abstract": null, "venue": "Journal Fran\u00e7ais d'Ophtalmologie", "year": 2022, "referenceCount": 148, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-01-01", "journal": {"name": "Journal Fran\u00e7ais d'Ophtalmologie"}, "authors": [{"authorId": "2148525479", "name": "R. Bunod"}, {"authorId": "2082636439", "name": "E. Augstburger"}, {"authorId": "47618121", "name": "E. Brasnu"}, {"authorId": "153572951", "name": "A. Labb\u00e9"}, {"authorId": "2053483552", "name": "C. Baudouin"}]}, {"paperId": "5c768e2f178e74e581ea62c43cad10c73e0eae9d", "externalIds": {"DOI": "10.1086/717306", "CorpusId": 245145134}, "corpusId": 245145134, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c768e2f178e74e581ea62c43cad10c73e0eae9d", "title": "Artificial Antisemitism: Critical Theory in the Age of Datafication", "abstract": "This article is a critical genealogy of Tay, an artificial-intelligence chatbot that Microsoft released on Twitter in 2016, which was quickly hijacked by internet trolls to reproduce racist, misogynist, and antisemitic language. Tay\u2019s repetition and production of hate speech calls for an approach that draws on both media and cultural theory\u2014the Frankfurt School\u2019s dialectical analyses of language and ideology, in particular. Revisiting the Frankfurt School in the age of algorithmic reason shows that, contrary to views foundational to computing, a neural-network chatbot like Tay does not sidestep meaning but rather carries and alters it, with unforeseen social and political consequences. A return to the work of Max Horkheimer and Theodor W. Adorno thus locates ideology in the digital world at the nexus of language\u2019s ability to mean, language and meaning\u2019s susceptibility to computation, and the design of a machine to compute both. Coming to critical terms with the antisemitism produced in Tay\u2019s human-computer synthesis requires, as this article contends, addressing the uncanny embodiment and reflection of thought that is digital computation.", "venue": "Critical Inquiry", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-01", "journal": {"volume": "48", "pages": "286 - 312", "name": "Critical Inquiry"}, "authors": [{"authorId": "51030455", "name": "M. Handelman"}]}, {"paperId": "a302e6d48d342ff06f260424ab37dcc9b553f975", "externalIds": {"DBLP": "journals/jbd/KhalilP22", "DOI": "10.1186/s40537-022-00663-7", "CorpusId": 245377339}, "corpusId": 245377339, "publicationVenue": {"id": "d60da343-ab92-4310-b3d7-2c0860287a9d", "name": "Journal of Big Data", "type": "journal", "alternate_names": ["J Big Data", "Journal on Big Data"], "issn": "2196-1115", "alternate_issns": ["2579-0048"], "url": "http://www.journalofbigdata.com/", "alternate_urls": ["http://www.springer.com/computer/database+management+&+information+retrieval/journal/40537", "http://techscience.com/JBD/index.html", "https://journalofbigdata.springeropen.com", "https://journalofbigdata.springeropen.com/"]}, "url": "https://www.semanticscholar.org/paper/a302e6d48d342ff06f260424ab37dcc9b553f975", "title": "Transforming the generative pretrained transformer into augmented business text writer", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-022-00663-7", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-20", "journal": {"volume": "9", "name": "Journal of Big Data"}, "authors": [{"authorId": "88223633", "name": "Faisal Khalil"}, {"authorId": "1734512", "name": "G. Pipa"}]}, {"paperId": "b90c090f7928a78d85d952737488be1ef8587ae5", "externalIds": {"DBLP": "journals/corr/abs-2201-06657", "ArXiv": "2201.06657", "DOI": "10.3390/info13010041", "CorpusId": 245360052}, "corpusId": 245360052, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b90c090f7928a78d85d952737488be1ef8587ae5", "title": "A Literature Survey of Recent Advances in Chatbots", "abstract": "Chatbots are intelligent conversational computer systems designed to mimic human conversation to enable automated online guidance and support. The increased benefits of chatbots led to their wide adoption by many industries in order to provide virtual assistance to customers. Chatbots utilise methods and algorithms from two Artificial Intelligence domains: Natural Language Processing and Machine Learning. However, there are many challenges and limitations in their application. In this survey we review recent advances on chatbots, where Artificial Intelligence and Natural Language processing are used. We highlight the main challenges and limitations of current work and make recommendations for future research investigation", "venue": "Inf.", "year": 2021, "referenceCount": 110, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2078-2489/13/1/41/pdf?version=1642401608", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-12-16", "journal": {"volume": "13", "pages": "41", "name": "Inf."}, "authors": [{"authorId": "2146579424", "name": "Guendalina Caldarini"}, {"authorId": "3184880", "name": "Sardar F. Jaf"}, {"authorId": "33944350", "name": "K. McGarry"}]}, {"paperId": "67a5fb974d1a275e18d7b832d5bf0c2bba10a6f9", "externalIds": {"DBLP": "journals/ce/HanL22", "DOI": "10.1016/j.compedu.2021.104395", "CorpusId": 244824547}, "corpusId": 244824547, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/67a5fb974d1a275e18d7b832d5bf0c2bba10a6f9", "title": "FAQ chatbot and inclusive learning in massive open online courses", "abstract": null, "venue": "Comput. Educ.", "year": 2021, "referenceCount": 49, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-01", "journal": {"volume": "179", "pages": "104395", "name": "Comput. Educ."}, "authors": [{"authorId": "117887308", "name": "Song-Ae Han"}, {"authorId": "50112472", "name": "Min Kyung Lee"}]}, {"paperId": "4c4a9d2f520111b88a402757d00a1fcb5c4599c6", "externalIds": {"DBLP": "books/sp/22/Nida-Rumelin22", "DOI": "10.1007/978-3-030-86144-5_10", "CorpusId": 244563431}, "corpusId": 244563431, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4c4a9d2f520111b88a402757d00a1fcb5c4599c6", "title": "Digital Humanism and the Limits of Artificial Intelligence", "abstract": null, "venue": "Perspectives on Digital Humanism", "year": 2021, "referenceCount": 10, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-030-86144-5_10.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-24", "journal": {"pages": "71-75"}, "authors": [{"authorId": "1404786979", "name": "J. Nida-R\u00fcmelin"}]}, {"paperId": "9fccb62bfe51feddf9090147a90f9b3bc86201f1", "externalIds": {"DBLP": "journals/snam/NajariSF22", "PubMedCentral": "8590628", "DOI": "10.1007/s13278-021-00800-9", "CorpusId": 244120959, "PubMed": "34804252"}, "corpusId": 244120959, "publicationVenue": {"id": "cf210e7b-29b8-4380-b245-d78d8bea4d35", "name": "Social Network Analysis and Mining", "type": "journal", "alternate_names": ["Soc Netw Anal Min"], "issn": "1869-5450", "url": "https://www.springer.com/computer/database+management+&+information+retrieval/journal/13278", "alternate_urls": ["https://link.springer.com/journal/13278"]}, "url": "https://www.semanticscholar.org/paper/9fccb62bfe51feddf9090147a90f9b3bc86201f1", "title": "GANBOT: a GAN-based framework for social bot detection", "abstract": null, "venue": "Social Network Analysis and Mining", "year": 2021, "referenceCount": 60, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13278-021-00800-9.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-14", "journal": {"volume": "12", "name": "Social Network Analysis and Mining"}, "authors": [{"authorId": "103997360", "name": "S. Najari"}, {"authorId": "38708773", "name": "Mostafa Salehi"}, {"authorId": "2633697", "name": "R. Farahbakhsh"}]}, {"paperId": "c87a9e2fc2d1c4a8d48c10718601f88c48dfa2f0", "externalIds": {"DBLP": "journals/corr/abs-2111-07036", "ArXiv": "2111.07036", "DOI": "10.1609/aaai.v36i11.21559", "CorpusId": 244116895}, "corpusId": 244116895, "publicationVenue": {"id": "bdc2e585-4e48-4e36-8af1-6d859763d405", "name": "AAAI Conference on Artificial Intelligence", "type": "conference", "alternate_names": ["National Conference on Artificial Intelligence", "National Conf Artif Intell", "AAAI Conf Artif Intell", "AAAI"], "url": "http://www.aaai.org/"}, "url": "https://www.semanticscholar.org/paper/c87a9e2fc2d1c4a8d48c10718601f88c48dfa2f0", "title": "Introducing Variational Autoencoders to High School Students", "abstract": "Generative Artificial Intelligence (AI) models are a compelling way to introduce K-12 students to AI education using an artistic medium, and hence have drawn attention from K-12 AI educators. Previous Creative AI curricula mainly focus on Generative Adversarial Networks (GANs) while paying less attention to Autoregressive Models, Variational Autoencoders (VAEs), or other generative models, which have since become common in the field of generative AI. VAEs' latent-space structure and interpolation ability could effectively ground the interdisciplinary learning of AI, creative arts, and philosophy. Thus, we designed a lesson to teach high school students about VAEs. We developed a web-based game and used Plato's cave, a philosophical metaphor, to introduce how VAEs work. We used a Google Colab notebook for students to re-train VAEs with their hand-written digits to consolidate their understandings. Finally, we guided the exploration of creative VAE tools such as SketchRNN and MusicVAE to draw the connection between what they learned and real-world applications. This paper describes the lesson design and shares insights from the pilot studies with 22 students. We found that our approach was effective in teaching students about a novel AI concept.", "venue": "AAAI Conference on Artificial Intelligence", "year": 2021, "referenceCount": 51, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/21559/21308", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-11-13", "journal": {"pages": "12801-12809"}, "authors": [{"authorId": "2130599780", "name": "Zhuoyue Lyu"}, {"authorId": "51134075", "name": "Safinah Ali"}, {"authorId": "2065304843", "name": "C. Breazeal"}]}, {"paperId": "463eebd069a58d9379b0b9567f9b0fc6b004fc7c", "externalIds": {"DBLP": "journals/mta/BoussakssouEE22", "DOI": "10.1007/s11042-021-11709-y", "CorpusId": 243840072}, "corpusId": 243840072, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/463eebd069a58d9379b0b9567f9b0fc6b004fc7c", "title": "Chatbot in Arabic language using seq to seq model", "abstract": null, "venue": "Multim. Tools Appl.", "year": 2021, "referenceCount": 8, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-06", "journal": {"volume": "81", "pages": "2859-2871", "name": "Multimedia Tools and Applications"}, "authors": [{"authorId": "1712211978", "name": "M. Boussakssou"}, {"authorId": "2011904", "name": "H. Ezzikouri"}, {"authorId": "90643624", "name": "M. Erritali"}]}, {"paperId": "4b8475e0ae22ddf56d3d061c8260fabd724aa4de", "externalIds": {"DBLP": "journals/asc/DikshitPS22", "DOI": "10.1016/j.asoc.2021.108080", "CorpusId": 244542721}, "corpusId": 244542721, "publicationVenue": {"id": "b1994124-f1e8-4f96-a165-b6f19a04fe7e", "name": "Applied Soft Computing", "type": "journal", "alternate_names": ["Appl Soft Comput"], "issn": "1568-4946", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/621920/description#description", "alternate_urls": ["https://www.journals.elsevier.com/applied-soft-computing", "http://www.sciencedirect.com/science/journal/15684946"]}, "url": "https://www.semanticscholar.org/paper/4b8475e0ae22ddf56d3d061c8260fabd724aa4de", "title": "Artificial neural networks in drought prediction in the 21st century-A scientometric analysis", "abstract": null, "venue": "Applied Soft Computing", "year": 2021, "referenceCount": 122, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-01", "journal": {"volume": "114", "pages": "108080", "name": "Appl. Soft Comput."}, "authors": [{"authorId": "108523304", "name": "Abhirup Dikshit"}, {"authorId": "143620129", "name": "B. Pradhan"}, {"authorId": "1622837022", "name": "M. Santosh"}]}, {"paperId": "4695282c824addc031fee351d71711abb0b7bc2a", "externalIds": {"ArXiv": "2110.09036", "DBLP": "journals/corr/abs-2110-09036", "DOI": "10.1017/s1351324921000358", "CorpusId": 239016203}, "corpusId": 239016203, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4695282c824addc031fee351d71711abb0b7bc2a", "title": "Ranking Facts for Explaining Answers to Elementary Science Questions", "abstract": "\n In multiple-choice exams, students select one answer from among typically four choices and can explain why they made that particular choice. Students are good at understanding natural language questions and based on their domain knowledge can easily infer the question\u2019s answer by \u201cconnecting the dots\u201d across various pertinent facts. Considering automated reasoning for elementary science question answering, we address the novel task of generating explanations for answers from human-authored facts. For this, we examine the practically scalable framework of feature-rich support vector machines leveraging domain-targeted, hand-crafted features. Explanations are created from a human-annotated set of nearly 5000 candidate facts in the WorldTree corpus. Our aim is to obtain better matches for valid facts of an explanation for the correct answer of a question over the available fact candidates. To this end, our features offer a comprehensive linguistic and semantic unification paradigm. The machine learning problem is the preference ordering of facts, for which we test pointwise regression versus pairwise learning-to-rank. Our contributions, originating from comprehensive evaluations against nine existing systems, are (1) a case study in which two preference ordering approaches are systematically compared, and where the pointwise approach is shown to outperform the pairwise approach, thus adding to the existing survey of observations on this topic; (2) since our system outperforms a highly-effective TF-IDF-based IR technique by 3.5 and 4.9 points on the development and test sets, respectively, it demonstrates some of the further task improvement possibilities (e.g., in terms of an efficient learning algorithm, semantic features) on this task; (3) it is a practically competent approach that can outperform some variants of BERT-based reranking models; and (4) the human-engineered features make it an interpretable machine learning model for the task.", "venue": "Natural Language Engineering", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2110.09036", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-18", "journal": {"volume": "abs/2110.09036", "name": "ArXiv"}, "authors": [{"authorId": "1789682566", "name": "J. D\u2019Souza"}, {"authorId": "30523699", "name": "I. Mulang"}, {"authorId": "2071756650", "name": "Soeren Auer"}]}, {"paperId": "a0b777b25cdf0fc992568ca52a5c7bebf1ee987f", "externalIds": {"ArXiv": "2110.08975", "DBLP": "journals/corr/abs-2110-08975", "DOI": "10.1145/3505245", "CorpusId": 239016662}, "corpusId": 239016662, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0b777b25cdf0fc992568ca52a5c7bebf1ee987f", "title": "Deep Transfer Learning & Beyond: Transformer Language Models in Information Systems Research", "abstract": "AI is widely thought to be poised to transform business, yet current perceptions of the scope of this transformation may be myopic. Recent progress in natural language processing involving transformer language models (TLMs) offers a potential avenue for AI-driven business and societal transformation that is beyond the scope of what most currently foresee. We review this recent progress as well as recent literature utilizing text mining in top IS journals to develop an outline for how future IS research can benefit from these new techniques. Our review of existing IS literature reveals that suboptimal text mining techniques are prevalent and that the more advanced TLMs could be applied to enhance and increase IS research involving text data, and to enable new IS research topics, thus creating more value for the research community. This is possible because these techniques make it easier to develop very powerful custom systems and their performance is superior to existing methods for a wide range of tasks and applications. Further, multilingual language models make possible higher quality text analytics for research in multiple languages. We also identify new avenues for IS research, like language user interfaces, that may offer even greater potential for future IS research.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 213, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3505245", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-18", "journal": {"volume": "54", "pages": "1 - 35", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "7284628", "name": "Ross Gruetzemacher"}, {"authorId": "1740199", "name": "D. Paradice"}]}, {"paperId": "eb4cb63c65d0bb624f2fc366a594cb5cdc76d4e4", "externalIds": {"DBLP": "journals/es/AkhoonSASAAL22", "MAG": "3205656656", "DOI": "10.1111/exsy.12831", "CorpusId": 244611089}, "corpusId": 244611089, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb4cb63c65d0bb624f2fc366a594cb5cdc76d4e4", "title": "High performance accelerators for deep neural networks: A review", "abstract": "The availability of huge structured and unstructured data, advanced highly dense memory and high performance computing machines have provided a strong push for the development in artificial intelligence (AI) and machine learning (ML) domains. AI and machine learning has rekindled the hope of efficiently solving complex problems which was not possible in the recent past. The generation and availability of big\u2010data is a strong driving force for the development of AI/ML applications, however, several challenges need to be addressed, like processing speed, memory requirement, high bandwidth, low latency memory access, and highly conductive and flexible connections between processing units and memory blocks. The conventional computing platforms are unable to address these issues with machine learning and AI. Deep neural networks (DNNs) are widely employed for machine learning and AI applications, like speech recognition, computer vison, robotics, and so forth, efficiently and accurately. However, accuracy is achieved at the cost of high computational complexity, sacrificing energy efficiency and throughput like performance measuring parameters along with high latency. To address the problems of latency, energy efficiency, complexity, power consumption, and so forth, a lot of state of the art DNN accelerators have been designed and implemented in the form of application specific integrated circuits (ASICs) and field programmable gate arrays (FPGAs). This work provides the state of the art of all these DNN accelerators which have been developed recently. Various DNN architectures, their computing units, emerging technologies used in improving the performance of DNN accelerators will be discussed. Finally, we will try to explore the scope for further improvement in these accelerator designs, various opportunities and challenges for the future research.", "venue": "Expert Syst. J. Knowl. Eng.", "year": 2021, "referenceCount": 79, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-11", "journal": {"volume": "39", "name": "Expert Systems"}, "authors": [{"authorId": "2142045426", "name": "Mohd Saqib Akhoon"}, {"authorId": "2612367", "name": "S. A. Suandi"}, {"authorId": "2069086624", "name": "Abdullah Alshahrani"}, {"authorId": "145184685", "name": "Abdul-Malik H. Y. Saad"}, {"authorId": "2519623", "name": "F. Albogamy"}, {"authorId": "2150362084", "name": "Mohd Zaid Bin Abdullah"}, {"authorId": "1691049", "name": "S. Loan"}]}, {"paperId": "3fb07e4a6a82306af506f06808837f2d974b7c14", "externalIds": {"DBLP": "journals/csur/TelikaniTBG22", "DOI": "10.1145/3467477", "CorpusId": 238260766}, "corpusId": 238260766, "publicationVenue": {"id": "7b2adce0-d53f-49d6-8784-b0645604fe62", "name": "ACM Computing Surveys", "type": "journal", "alternate_names": ["ACM Comput Surv"], "issn": "0360-0300", "url": "http://www.acm.org/pubs/surveys/", "alternate_urls": ["http://portal.acm.org/csur", "https://csur.acm.org/", "http://csur.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/3fb07e4a6a82306af506f06808837f2d974b7c14", "title": "Evolutionary Machine Learning: A Survey", "abstract": "Evolutionary Computation (EC) approaches are inspired by nature and solve optimization problems in a stochastic manner. They can offer a reliable and effective approach to address complex problems in real-world applications. EC algorithms have recently been used to improve the performance of Machine Learning (ML) models and the quality of their results. Evolutionary approaches can be used in all three parts of ML: preprocessing (e.g., feature selection and resampling), learning (e.g., parameter setting, membership functions, and neural network topology), and postprocessing (e.g., rule optimization, decision tree/support vectors pruning, and ensemble learning). This article investigates the role of EC algorithms in solving different ML challenges. We do not provide a comprehensive review of evolutionary ML approaches here; instead, we discuss how EC algorithms can contribute to ML by addressing conventional challenges of the artificial intelligence and ML communities. We look at the contributions of EC to ML in nine sub-fields: feature selection, resampling, classifiers, neural networks, reinforcement learning, clustering, association rule mining, and ensemble methods. For each category, we discuss evolutionary machine learning in terms of three aspects: problem formulation, search mechanisms, and fitness value computation. We also consider open issues and challenges that should be addressed in future work.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 262, "citationCount": 24, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3467477", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-04", "journal": {"volume": "54", "pages": "1 - 35", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "23317197", "name": "A. Telikani"}, {"authorId": "19234841", "name": "A. Tahmassebi"}, {"authorId": "2507766", "name": "W. Banzhaf"}, {"authorId": "1764455", "name": "A. Gandomi"}]}, {"paperId": "762cbb00d63b6eb3f429391e4c7fd016c636d195", "externalIds": {"DBLP": "journals/electronicmarkets/HornungS22", "MAG": "3199046025", "DOI": "10.1007/s12525-021-00493-0", "CorpusId": 240534646}, "corpusId": 240534646, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/762cbb00d63b6eb3f429391e4c7fd016c636d195", "title": "AI invading the workplace: negative emotions towards the organizational use of personal virtual assistants", "abstract": null, "venue": "Electron. Mark.", "year": 2021, "referenceCount": 97, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12525-021-00493-0.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-18", "journal": {"volume": "32", "pages": "123-138", "name": "Electron. Mark."}, "authors": [{"authorId": "11004408", "name": "Olivia Hornung"}, {"authorId": "1715753", "name": "Stefan Smolnik"}]}, {"paperId": "bb048b91adcc01b7c013a29f9716c3c07d947e98", "externalIds": {"DBLP": "journals/aiethics/Saetra22", "DOI": "10.1007/s43681-021-00092-x", "CorpusId": 248866393}, "corpusId": 248866393, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb048b91adcc01b7c013a29f9716c3c07d947e98", "title": "Robotomorphy", "abstract": null, "venue": "AI Ethics", "year": 2021, "referenceCount": 103, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-021-00092-x.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-04", "journal": {"volume": "2", "pages": "5-13", "name": "AI Ethics"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "234ce45f13244d28878a38d231f638382012cf74", "externalIds": {"DBLP": "journals/ijsr/GrassiRS22", "ArXiv": "2108.02174", "PubMedCentral": "8932468", "DOI": "10.1007/s12369-022-00868-z", "CorpusId": 236912590, "PubMed": "35341063"}, "corpusId": 236912590, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/234ce45f13244d28878a38d231f638382012cf74", "title": "Knowledge-Grounded Dialogue Flow Management for Social Robots and Conversational Agents", "abstract": null, "venue": "Int. J. Soc. Robotics", "year": 2021, "referenceCount": 56, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12369-022-00868-z.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-04", "journal": {"volume": "14", "pages": "1273 - 1293", "name": "International Journal of Social Robotics"}, "authors": [{"authorId": "1830764810", "name": "Lucrezia Grassi"}, {"authorId": "2688386", "name": "C. Recchiuto"}, {"authorId": "1761802", "name": "A. Sgorbissa"}]}, {"paperId": "9177582492b507db98392a187b8257ea8b2c80cd", "externalIds": {"ArXiv": "2106.11010", "MAG": "3161022871", "DBLP": "journals/corr/abs-2106-11010", "DOI": "10.1016/j.newast.2022.101850", "CorpusId": 235489922}, "corpusId": 235489922, "publicationVenue": {"id": "a6a0cdb7-afc4-41a4-8456-79392388ad46", "name": "New Astronomy", "type": "journal", "alternate_names": ["New Astron"], "issn": "1384-1076", "url": "http://journals.elsevier.com/13841076/new-astronomy/", "alternate_urls": ["http://www.sciencedirect.com/science/journal/13841076"]}, "url": "https://www.semanticscholar.org/paper/9177582492b507db98392a187b8257ea8b2c80cd", "title": "Three-body problem - from Newton to supercomputer plus machine learning", "abstract": null, "venue": "New Astronomy", "year": 2021, "referenceCount": 68, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": "abs/2106.11010", "name": "ArXiv"}, "authors": [{"authorId": "47076615", "name": "S. Liao"}, {"authorId": "2116432312", "name": "Xiaoming Li"}, {"authorId": "2124971289", "name": "Yu Yang"}]}, {"paperId": "389d9a31b7c221be63433d50dd9c8125cd8fb6f9", "externalIds": {"ArXiv": "2105.04642", "DBLP": "journals/ral/BanREWHKIMR22", "DOI": "10.1109/lra.2022.3156856", "CorpusId": 247304174}, "corpusId": 247304174, "publicationVenue": {"id": "93c335b7-edf4-45f5-8ddc-7c5835154945", "name": "IEEE Robotics and Automation Letters", "alternate_names": ["IEEE Robot Autom Lett"], "issn": "2377-3766", "url": "https://www.ieee.org/membership-catalog/productdetail/showProductDetailPage.html?product=PER481-ELE", "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=7083369"]}, "url": "https://www.semanticscholar.org/paper/389d9a31b7c221be63433d50dd9c8125cd8fb6f9", "title": "SUPR-GAN: SUrgical PRediction GAN for Event Anticipation in Laparoscopic and Robotic Surgery", "abstract": "Comprehension of surgical workflow is the foundation upon which artificial intelligence (AI) and machine learning (ML) holds the potential to assist intraoperative decision making and risk mitigation. In this work, we move beyond mere identification of past surgical phases, into prediction of future surgical steps and specification of the transitions between them. We use a novel Generative Adversarial Network (GAN) formulation to sample future surgical phases trajectories conditioned on past video frames from laparoscopic cholecystectomy (LC) videos and compare it to state-of-the-art approaches for surgical video analysis and alternative prediction methods. We demonstrate the GAN formulation\u2019s effectiveness through inferring and predicting the progress of LC videos. We quantify the horizon-accuracy trade-off and explored average performance, as well as the performance on the more challenging, and clinically relevant transitions between phases. Furthermore, we conduct a survey, asking 16 surgeons of different specialties and educational levels to qualitative evaluate predicted surgery phases.", "venue": "IEEE Robotics and Automation Letters", "year": 2021, "referenceCount": 64, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2105.04642", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-10", "journal": {"volume": "7", "pages": "5741-5748", "name": "IEEE Robotics and Automation Letters"}, "authors": [{"authorId": "8422060", "name": "Yutong Ban"}, {"authorId": "2116952", "name": "G. Rosman"}, {"authorId": "2156583904", "name": "Jennifer A. Eckhoff"}, {"authorId": "144308911", "name": "Thomas M. Ward"}, {"authorId": "40564183", "name": "D. Hashimoto"}, {"authorId": "9411171", "name": "Taisei Kondo"}, {"authorId": "2068511", "name": "Hidekazu Iwaki"}, {"authorId": "11009166", "name": "O. Meireles"}, {"authorId": "145944286", "name": "D. Rus"}]}, {"paperId": "4d5247af0cc487ad70813893ef945d46b2a34c11", "externalIds": {"MAG": "3159574466", "DOI": "10.1086/715162", "CorpusId": 109936713}, "corpusId": 109936713, "publicationVenue": {"id": "73ac5df7-f2d4-4b95-96b2-69d1726eaeec", "name": "Journal of Politics", "type": "journal", "alternate_names": ["J Politics", "The Journal of Politics"], "issn": "0022-3816", "url": "http://www3.interscience.wiley.com/journal/118502557/home", "alternate_urls": ["https://www.jstor.org/journal/jpolitics", "https://www.journals.uchicago.edu/loi/jop", "http://www.thejournalofpolitics.org/", "http://www.jstor.org/journals/00223816.html", "https://www.journals.uchicago.edu/toc/jop/current"]}, "url": "https://www.semanticscholar.org/paper/4d5247af0cc487ad70813893ef945d46b2a34c11", "title": "Word Embeddings: What Works, What Doesn\u2019t, and How to Tell the Difference for Applied Research", "abstract": "Word embeddings are becoming popular for political science research, yet we know little about their properties and performance. To help scholars seeking to use these techniques, we explore the effects of key parameter choices\u2014including context window length, embedding vector dimensions, and pretrained versus locally fit variants\u2014on the efficiency and quality of inferences possible with these models. Reassuringly we show that results are generally robust to such choices for political corpora of various sizes and in various languages. Beyond reporting extensive technical findings, we provide a novel crowdsourced \u201cTuring test\u201d\u2013style method for examining the relative performance of any two models that produce substantive, text-based outputs. Our results are encouraging: popular, easily available pretrained embeddings perform at a level close to\u2014or surpassing\u2014both human coders and more complicated locally fit models. For completeness, we provide best practice advice for cases where local fitting is required.", "venue": "Journal of Politics", "year": 2021, "referenceCount": 69, "citationCount": 42, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-06", "journal": {"volume": "84", "pages": "101 - 115", "name": "The Journal of Politics"}, "authors": [{"authorId": "2067975964", "name": "Pedro L. Rodriguez"}, {"authorId": "22267378", "name": "A. Spirling"}]}, {"paperId": "99095baae594e54b25eeb234efbf35b1242faf5f", "externalIds": {"DBLP": "journals/csur/DunneMH21", "MAG": "3159583069", "DOI": "10.1145/3447242", "CorpusId": 235507346}, "corpusId": 235507346, "publicationVenue": {"id": "7b2adce0-d53f-49d6-8784-b0645604fe62", "name": "ACM Computing Surveys", "type": "journal", "alternate_names": ["ACM Comput Surv"], "issn": "0360-0300", "url": "http://www.acm.org/pubs/surveys/", "alternate_urls": ["http://portal.acm.org/csur", "https://csur.acm.org/", "http://csur.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/99095baae594e54b25eeb234efbf35b1242faf5f", "title": "A Survey of Ambient Intelligence", "abstract": "Ambient Intelligence (AmI) is the application and embedding of artificial intelligence into everyday environments to seamlessly provide assistive and predictive support in a multitude of scenarios via an invisible user interface. These can be as diverse as autonomous vehicles, smart homes, industrial settings, and healthcare facilities\u2014referred to as Ambient Assistive Living. This survey gives an overview of the field; defines key terms; discusses social, cultural, and ethical issues; and outlines the state of the art in AmI technology, and where opportunities for further research exist. We guide the reader through AmI from its inception more than 20 years ago, focussing on the important topics and research achievements of the past 10 years since the last major survey, before finally detailing the most recents research trends and forecasting where this technology is likely to develop. This survey covers domains, use cases, scenarios, and datasets; cultural concerns and usability issues; security, privacy, and ethics; interaction and recognition; prediction and intelligence; and hardware, infrastructure, and mobile devices. This survey serves as an introduction for researchers and the technical layperson into the topic of AmI and identifies notable opportunities for further research.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 110, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-03", "journal": {"volume": "54", "pages": "1 - 27", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "116875611", "name": "R. Dunne"}, {"authorId": "2057160930", "name": "Tim Morris"}, {"authorId": "1749047", "name": "S. Harper"}]}, {"paperId": "bfdfd83ddcfa5763ef44895047c0e3ee90e28d85", "externalIds": {"DBLP": "journals/corr/abs-2104-13983", "ArXiv": "2104.13983", "DOI": "10.1145/3546790.3546806", "CorpusId": 233444269}, "corpusId": 233444269, "publicationVenue": {"id": "cfc9d2e1-32a5-4ecb-b6a6-c86b494b3143", "name": "International Conference on Systems", "type": "conference", "alternate_names": ["Int Conf Neuromorphic Syst", "Int Conf Intell Control Autom Sci", "ICONS", "International Conference on Neuromorphic Systems", "Int Conf Syst", "International Conference on Intelligent Control and Automation Science"], "url": "https://www.iaria.org/conferences/ICONS.html"}, "url": "https://www.semanticscholar.org/paper/bfdfd83ddcfa5763ef44895047c0e3ee90e28d85", "title": "Neuromorphic Computing is Turing-Complete", "abstract": "Neuromorphic computing is a non-von Neumann computing paradigm that performs computation by emulating the human brain. Neuromorphic systems are extremely energy-efficient and known to consume thousands of times less power than CPUs and GPUs. They have the potential to drive critical use cases such as autonomous vehicles, edge computing and internet of things in the future. For this reason, they are sought to be an indispensable part of the future computing landscape. Neuromorphic systems are mainly used for spike-based machine learning applications, although there are some non-machine learning applications in graph theory, differential equations, and spike-based simulations. These applications suggest that neuromorphic computing might be capable of general-purpose computing. However, general-purpose computability of neuromorphic computing has not been established yet. In this work, we prove that neuromorphic computing is Turing-complete and therefore capable of general-purpose computing. Specifically, we present a model of neuromorphic computing, with just two neuron parameters (threshold and leak), and two synaptic parameters (weight and delay). We devise neuromorphic circuits for computing all the \u03bc-recursive functions (i.e., constant, successor and projection functions) and all the \u03bc-recursive operators (i.e., composition, primitive recursion and minimization operators). Given that the \u03bc-recursive functions and operators are precisely the ones that can be computed using a Turing machine, this work establishes the Turing-completeness of neuromorphic computing.", "venue": "International Conference on Systems", "year": 2021, "referenceCount": 57, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2104.13983", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-04-28", "journal": {"name": "Proceedings of the International Conference on Neuromorphic Systems 2022"}, "authors": [{"authorId": "65805823", "name": "Prasanna Date"}, {"authorId": "2318902", "name": "Catherine D. Schuman"}, {"authorId": "40526428", "name": "Bill Kay"}, {"authorId": "1771895", "name": "T. Potok"}]}, {"paperId": "e470e002ec39fad1dbf5df1bd9a8b9d55123ed42", "externalIds": {"DBLP": "journals/sqj/Bozic22", "MAG": "3157483947", "DOI": "10.1007/S11219-020-09544-9", "CorpusId": 235576295}, "corpusId": 235576295, "publicationVenue": {"id": "f4c0fba6-8d83-4a73-aaa4-2ad01918304e", "name": "Software quality journal", "type": "journal", "alternate_names": ["Softw Qual J", "Software Quality Journal", "Softw qual j"], "issn": "0963-9314", "url": "https://link.springer.com/journal/11219"}, "url": "https://www.semanticscholar.org/paper/e470e002ec39fad1dbf5df1bd9a8b9d55123ed42", "title": "Ontology-based metamorphic testing for chatbots", "abstract": null, "venue": "Software quality journal", "year": 2021, "referenceCount": 43, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11219-020-09544-9.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-27", "journal": {"volume": "30", "pages": "227-251", "name": "Software Quality Journal"}, "authors": [{"authorId": "40610638", "name": "Josip Bozic"}]}, {"paperId": "1275ebd9a5596053460d2d73793ccc648249f7e5", "externalIds": {"ArXiv": "2106.15515", "MAG": "3162982177", "DBLP": "journals/corr/abs-2106-15515", "DOI": "10.31234/OSF.IO/3ZBNJ", "CorpusId": 235669795}, "corpusId": 235669795, "publicationVenue": {"id": "3c6563d5-4dbc-4e59-b361-921f097b6afd", "name": "Biological Journal of the Linnean Society", "type": "journal", "alternate_names": ["Biological J Linn Soc", "Biological Journal of The Linnean Society"], "issn": "0024-4066", "url": "http://www.sciencedirect.com/science/journal/00244066", "alternate_urls": ["http://www3.interscience.wiley.com/journal/118502921/home", "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1095-8312"]}, "url": "https://www.semanticscholar.org/paper/1275ebd9a5596053460d2d73793ccc648249f7e5", "title": "What Is Consciousness? Artificial Intelligence, Real Intelligence, Quantum Mind, And Qualia", "abstract": "We approach the question \"What is Consciousness?\" in a new way, not as Descartes' \"systematic doubt\", but as how organisms find their way in their world. Finding one's way involves finding possible uses of features of the world that might be beneficial or avoiding those that might be harmful. \"Possible uses of X to accomplish Y\" are \"Affordances\". The number of uses of X is indefinite (or unknown), the different uses are unordered and are not deducible from one another. All biological adaptations are either affordances seized by heritable variation and selection or, far faster, by the organism acting in its world finding uses of X to accomplish Y. Based on this, we reach rather astonishing conclusions: (1) Artificial General Intelligence based on Universal Turing Machines (UTMs) is not possible, since UTMs cannot \"find\" novel affordances. (2) Brain-mind is not purely classical physics for no classical physics system can be an analogue computer whose dynamical behavior can be isomorphic to \"possible uses\". (3) Brain mind must be partly quantum - supported by increasing evidence at 6.0 sigma to 7.3 Sigma. (4) Based on Heisenberg's interpretation of the quantum state as \"Potentia\" converted to \"Actuals\" by Measurement, a natural hypothesis is that mind actualizes Potentia. This is supported at 5.2 Sigma. Then Mind's actualizations of entangled brain-mind-world states are experienced as qualia and allow \"seeing\" or \"perceiving\" of uses of X to accomplish Y. We can and do jury-rig. Computers cannot. (5) Beyond familiar quantum computers, we discuss the potentialities of Trans-Turing-Systems.", "venue": "Biological Journal of the Linnean Society", "year": 2021, "referenceCount": 86, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://psyarxiv.com/3zbnj/download", "status": null}, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-12", "journal": {"volume": "abs/2106.15515", "name": "ArXiv"}, "authors": [{"authorId": "143980023", "name": "S. Kauffman"}, {"authorId": "1763293", "name": "A. Roli"}]}, {"paperId": "b55e863998f1adcdfe578ca975ef82e917ae52dd", "externalIds": {"PubMedCentral": "9172850", "MAG": "3164172061", "DOI": "10.3389/fpsyg.2022.711821", "CorpusId": 236761493, "PubMed": "35686061"}, "corpusId": 236761493, "publicationVenue": {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, "url": "https://www.semanticscholar.org/paper/b55e863998f1adcdfe578ca975ef82e917ae52dd", "title": "Direct Human-AI Comparison in the Animal-AI Environment", "abstract": "Artificial Intelligence is making rapid and remarkable progress in the development of more sophisticated and powerful systems. However, the acknowledgement of several problems with modern machine learning approaches has prompted a shift in AI benchmarking away from task-oriented testing (such as Chess and Go) towards ability-oriented testing, in which AI systems are tested on their capacity to solve certain kinds of novel problems. The Animal-AI Environment is one such benchmark which aims to apply the ability-oriented testing used in comparative psychology to AI systems. Here, we present the first direct human-AI comparison in the Animal-AI Environment, using children aged 6\u201310 (n\u2009=\u200952). We found that children of all ages were significantly better than a sample of 30 AIs across most of the tests we examined, as well as performing significantly better than the two top-scoring AIs, \u201cironbar\u201d and \u201cTrrrrr,\u201d from the Animal-AI Olympics Competition 2019. While children and AIs performed similarly on basic navigational tasks, AIs performed significantly worse in more complex cognitive tests, including detour tasks, spatial elimination tasks, and object permanence tasks, indicating that AIs lack several cognitive abilities that children aged 6\u201310 possess. Both children and AIs performed poorly on tool-use tasks, suggesting that these tests are challenging for both biological and non-biological machines.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 114, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fpsyg.2022.711821/pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-18", "journal": {"volume": "13", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "1397160953", "name": "Konstantinos Voudouris"}, {"authorId": "143966629", "name": "Matthew Crosby"}, {"authorId": "102928633", "name": "Benjamin Beyret"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}, {"authorId": "1757629", "name": "M. Shanahan"}, {"authorId": "4626726", "name": "Marta Halina"}, {"authorId": "6643500", "name": "L. Cheke"}]}, {"paperId": "0f4de1e516adb5292bd88faa9a37aded919f424d", "externalIds": {"DBLP": "journals/corr/abs-2210-15098", "ArXiv": "2210.15098", "MAG": "3161874663", "DOI": "10.31234/OSF.IO/R3FCX", "CorpusId": 236757803}, "corpusId": 236757803, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f4de1e516adb5292bd88faa9a37aded919f424d", "title": "Natural Language Syntax Complies with the Free-Energy Principle", "abstract": "Natural language syntax yields an unbounded array of hierarchically structured expressions. We claim that these are used in the service of active inference in accord with the free-energy principle (FEP). While conceptual advances alongside modelling and simulation work have attempted to connect speech segmentation and linguistic communication with the FEP, we extend this program to the underlying computations responsible for generating elementary syntactic objects. We argue that recently proposed principles of economy in language design\u2014such as \u201cminimal search\u201d and \u201cleast effort\u201d criteria from theoretical syntax\u2014adhere to the FEP. This permits a greater degree of explanatory power to the FEP\u2014with respect to higher language functions\u2014and presents linguists with a grounding in first principles of notions pertaining to computability. More generally, we explore the possibility of migrating certain topics in linguistics over to the domain of fields that investigate the FEP, such as complex polysemy. We aim to align concerns of linguists with the normative model for organic self-organisation associated with the FEP, marshalling evidence from theoretical linguistics and psycholinguistics to ground core principles of efficient syntactic computation within active inference.", "venue": "ArXiv", "year": 2021, "referenceCount": 215, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://psyarxiv.com/r3fcx/download", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-11", "journal": {"volume": "abs/2210.15098", "name": "ArXiv"}, "authors": [{"authorId": "5925649", "name": "Elliot Murphy"}, {"authorId": "145448258", "name": "E. Holmes"}, {"authorId": "70438543", "name": "K. Friston"}]}, {"paperId": "9e9816d1c6bec2f4fd2a5c21680d39a660bdfb96", "externalIds": {"DBLP": "journals/ais/Wojtczak22", "MAG": "3131164195", "DOI": "10.1007/S00146-021-01147-7", "CorpusId": 233965401}, "corpusId": 233965401, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9e9816d1c6bec2f4fd2a5c21680d39a660bdfb96", "title": "Endowing Artificial Intelligence with legal subjectivity", "abstract": null, "venue": "AI Soc.", "year": 2021, "referenceCount": 64, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01147-7.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-16", "journal": {"volume": "37", "pages": "205-213", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2089470251", "name": "Sylwia Wojtczak"}]}, {"paperId": "31390c81909c7409d89c4d8ebc6def3a392458fa", "externalIds": {"DBLP": "journals/csur/WangSW21", "DOI": "10.1145/3439723", "CorpusId": 233354141}, "corpusId": 233354141, "publicationVenue": {"id": "7b2adce0-d53f-49d6-8784-b0645604fe62", "name": "ACM Computing Surveys", "type": "journal", "alternate_names": ["ACM Comput Surv"], "issn": "0360-0300", "url": "http://www.acm.org/pubs/surveys/", "alternate_urls": ["http://portal.acm.org/csur", "https://csur.acm.org/", "http://csur.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/31390c81909c7409d89c4d8ebc6def3a392458fa", "title": "Generative Adversarial Networks in Computer Vision", "abstract": "Generative adversarial networks (GANs) have been extensively studied in the past few years. Arguably their most significant impact has been in the area of computer vision where great advances have been made in challenges such as plausible image generation, image-to-image translation, facial attribute manipulation, and similar domains. Despite the significant successes achieved to date, applying GANs to real-world problems still poses significant challenges, three of which we focus on here. These are as follows: (1) the generation of high quality images, (2) diversity of image generation, and (3) stabilizing training. Focusing on the degree to which popular GAN technologies have made progress against these challenges, we provide a detailed review of the state-of-the-art in GAN-related research in the published scientific literature. We further structure this review through a convenient taxonomy we have adopted based on variations in GAN architectures and loss functions. While several reviews for GANs have been presented to date, none have considered the status of this field based on their progress toward addressing practical challenges relevant to computer vision. Accordingly, we review and critically discuss the most popular architecture-variant, and loss-variant GANs, for tackling these challenges. Our objective is to provide an overview as well as a critical analysis of the status of GAN research in terms of relevant progress toward critical computer vision application requirements. As we do this we also discuss the most compelling applications in computer vision in which GANs have demonstrated considerable success along with some suggestions for future research directions. Codes related to the GAN-variants studied in this work is summarized on https://github.com/sheqi/GAN_Review.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 143, "citationCount": 24, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3439723", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-09", "journal": {"volume": "54", "pages": "1 - 38", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "2145911462", "name": "Zhengwei Wang"}, {"authorId": "1486411393", "name": "Qi She"}, {"authorId": "145950787", "name": "T. Ward"}]}, {"paperId": "bb3a478fb2470216f4606a973f5acc5481f2555d", "externalIds": {"ArXiv": "2011.14709", "DBLP": "journals/corr/abs-2011-14709", "MAG": "3106792675", "DOI": "10.1364/OPTICA.455864", "CorpusId": 227228057}, "corpusId": 227228057, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb3a478fb2470216f4606a973f5acc5481f2555d", "title": "Monadic Pavlovian associative learning in a backpropagation-free photonic network", "abstract": "Over a century ago, Ivan P. Pavlov, in a classic experiment, demonstrated how dogs can learn to associate a ringing bell with food, thereby causing a ring to result in salivation. Today, however, it is rare to find the use of Pavlovian type associative learning for artificial intelligence (AI) applications. Instead, other biologically-inspired learning concepts, in particular artificial neural networks (ANNs) have flourished, yielding extensive impact on a wide range of fields including finance, healthcare and transportation. However, learning in such \"conventional\" ANNs, in particular in the form of modern deep neural networks (DNNs) are usually carried out using the backpropagation method, is computationally and energy intensive. Here we report the experimental demonstration of backpropagation-free learning, achieved using a single (or monadic) associative hardware element. This is realized on an integrated photonic platform using phase change materials combined with on-chip cascaded directional couplers. We link associative learning with supervised learning, based on their common goal of associating certain inputs with \"correct\" outputs. We then expand the concept to develop larger-scale supervised learning networks using our monadic Pavlovian photonic hardware, developing a distinct machine-learning framework based on single-element associations and, importantly, using backpropagation-free single-layer weight architectures to approach general learning tasks. Our approach not only significantly reduces the computational burden imposed by learning in conventional neural network approaches, thereby increasing speed and decreasing energy use during learning, but also offers higher bandwidth inherent to a photonic implementation, paving the way for future deployment of fast photonic artificially intelligent machines.", "venue": "Optica", "year": 2020, "referenceCount": 56, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-30", "journal": {"volume": "abs/2011.14709", "name": "ArXiv"}, "authors": [{"authorId": "2110399608", "name": "J. Tan"}, {"authorId": "2148766464", "name": "Zengguang Cheng"}, {"authorId": "2108263641", "name": "Xuan Li"}, {"authorId": "9190180", "name": "N. Youngblood"}, {"authorId": "2060910403", "name": "U. E. Ali"}, {"authorId": "51032756", "name": "C. Wright"}, {"authorId": "144372362", "name": "W. Pernice"}, {"authorId": "1771881", "name": "H. Bhaskaran"}]}, {"paperId": "1376ba69c87b609792779def693c7ee355129726", "externalIds": {"DBLP": "journals/jair/CropperD22", "ArXiv": "2008.07912", "MAG": "3065734471", "DOI": "10.1613/jair.1.13507", "CorpusId": 221150950}, "corpusId": 221150950, "publicationVenue": {"id": "aef12dca-60a0-4ca3-819b-cad26d309d4e", "name": "Journal of Artificial Intelligence Research", "type": "journal", "alternate_names": ["JAIR", "J Artif Intell Res", "The Journal of Artificial Intelligence Research"], "issn": "1076-9757", "url": "http://www.jair.org/"}, "url": "https://www.semanticscholar.org/paper/1376ba69c87b609792779def693c7ee355129726", "title": "Inductive logic programming at 30: a new introduction", "abstract": "Inductive logic programming (ILP) is a form of machine learning. The goal of ILP is to induce a hypothesis (a set of logical rules) that generalises training examples. As ILP turns 30, we provide a new introduction to the field. We introduce the necessary logical notation and the main learning settings; describe the building blocks of an ILP system; compare several systems on several dimensions; describe four systems (Aleph, TILDE, ASPAL, and Metagol); highlight key application areas; and, finally, summarise current limitations and directions for future research.", "venue": "Journal of Artificial Intelligence Research", "year": 2020, "referenceCount": 273, "citationCount": 27, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://jair.org/index.php/jair/article/download/13507/26814", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-08-18", "journal": {"volume": "74", "pages": "765-850", "name": "J. Artif. Intell. Res."}, "authors": [{"authorId": "1986234", "name": "Andrew Cropper"}, {"authorId": "3422854", "name": "Sebastijan Dumancic"}]}, {"paperId": "0bcba372dcde81a6d92fc2c9118e6a2664e51ba4", "externalIds": {"DBLP": "journals/corr/abs-2005-00890", "MAG": "3021390590", "ArXiv": "2005.00890", "DOI": "10.1016/j.patcog.2022.108643", "CorpusId": 218487556}, "corpusId": 218487556, "publicationVenue": {"id": "266f640f-003e-453b-ab76-57e4053252f8", "name": "Pattern Recognition", "type": "journal", "alternate_names": ["Pattern Recognit"], "issn": "0031-3203", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/328/description#description", "alternate_urls": ["https://www.journals.elsevier.com/pattern-recognition", "http://www.sciencedirect.com/science/journal/00313203"]}, "url": "https://www.semanticscholar.org/paper/0bcba372dcde81a6d92fc2c9118e6a2664e51ba4", "title": "BeCAPTCHA-Mouse: Synthetic Mouse Trajectories and Improved Bot Detection", "abstract": null, "venue": "Pattern Recognition", "year": 2020, "referenceCount": 51, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2005.00890", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-05-02", "journal": {"volume": "127", "pages": "108643", "name": "Pattern Recognit."}, "authors": [{"authorId": "41202648", "name": "A. Acien"}, {"authorId": "144083995", "name": "A. Morales"}, {"authorId": "1701431", "name": "Julian Fierrez"}, {"authorId": "1402712530", "name": "R. Vera-Rodr\u00edguez"}]}, {"paperId": "4282f9436a581f217874ce90adf80824ab2f6c85", "externalIds": {"DBLP": "journals/tcyb/ChenDXYF22", "MAG": "3010780363", "DOI": "10.1109/TCYB.2020.2977602", "CorpusId": 214591471, "PubMed": "32191906"}, "corpusId": 214591471, "publicationVenue": {"id": "404813e7-95da-4137-be14-2ba73d2df4fd", "name": "IEEE Transactions on Cybernetics", "alternate_names": ["IEEE Trans Cybern"], "issn": "2168-2267", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=6221036", "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6221036"]}, "url": "https://www.semanticscholar.org/paper/4282f9436a581f217874ce90adf80824ab2f6c85", "title": "A Unifying Framework for Human\u2013Agent Collaborative Systems\u2014Part I: Element and Relation Analysis", "abstract": "The human\u2013agent collaboration (HAC) is a prospective research topic whose great applications and future scenarios have attracted vast attention. In a broad sense, the HAC system (HACS) can be broken down into six elements: \u201cMan,\u201d \u201cAgents,\u201d \u201cGoal,\u201d \u201cNetwork,\u201d \u201cEnvironment,\u201d and \u201cTasks.\u201d By merging these elements and building a relation graph, this article proposes a systematic analysis framework for HACS, and attempts to make a comprehensive analysis of these elements and their relationships. We coin the abbreviation \u201cMAGNET\u201d to name the framework by stringing together the initials of the above six terms. The framework provides novel insights into analyzing various HAC patterns and integrates different types of HACSs in a unifying way. The presentation of the HACS framework is divided into two parts. This article, part I, presents the systematic analysis framework. Part II proposes a normalized two-stage top-level design procedure for designing an HACS from the perspective of MAGNET.", "venue": "IEEE Transactions on Cybernetics", "year": 2020, "referenceCount": 85, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-03-18", "journal": {"volume": "52", "pages": "138-151", "name": "IEEE Transactions on Cybernetics"}, "authors": [{"authorId": "40663520", "name": "Jie Chen"}, {"authorId": "7625445", "name": "Yulong Ding"}, {"authorId": "50559191", "name": "Bin Xin"}, {"authorId": "50514034", "name": "Qingkai Yang"}, {"authorId": "40199742", "name": "H. Fang"}]}, {"paperId": "556590e25f5f741af1d1030c7d031cc3c47d2418", "externalIds": {"ArXiv": "2001.06988", "MAG": "3162152729", "DOI": "10.1101/2021.05.10.443518", "CorpusId": 234487785}, "corpusId": 234487785, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/556590e25f5f741af1d1030c7d031cc3c47d2418", "title": "Deep learning generates custom-made logistic regression models for explaining how breast cancer subtypes are classified", "abstract": "Differentiating the intrinsic subtypes of breast cancer is crucial for deciding the best treatment strategy. Deep learning can predict the subtypes from genetic information more accurately than conventional statistical methods, but to date, deep learning has not been directly utilized to examine which genes are associated with which subtypes. To clarify the mechanisms embedded in the intrinsic subtypes, we developed an explainable deep learning model called a point-wise linear (PWL) model that generates a custom-made logistic regression for each patient. Logistic regression, which is familiar to both physicians and medical informatics researchers, allows us to analyze the importance of the feature variables, and the PWL model harnesses these practical abilities of logistic regression. In this study, we show that analyzing breast cancer subtypes is clinically beneficial for patients and one of the best ways to validate the capability of the PWL model. First, we trained the PWL model with RNA-seq data to predict PAM50 intrinsic subtypes and applied it to the 41/50 genes of PAM50 through the subtype prediction task. Second, we developed a deep enrichment analysis method to reveal the relationships between the PAM50 subtypes and the copy numbers of breast cancer. Our findings showed that the PWL model utilized genes relevant to the cell cycle-related pathways. These preliminary successes in breast cancer subtype analysis demonstrate the potential of our analysis strategy to clarify the mechanisms underlying breast cancer and improve overall clinical outcomes.", "venue": "bioRxiv", "year": 2020, "referenceCount": 71, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.biorxiv.org/content/biorxiv/early/2021/05/11/2021.05.10.443518.full.pdf", "status": null}, "fieldsOfStudy": ["Biology", "Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-01-20", "journal": {"name": "bioRxiv"}, "authors": [{"authorId": "2058314869", "name": "Takuma Shibahara"}, {"authorId": "80452935", "name": "Chisa Wada"}, {"authorId": "2071625961", "name": "Yasuho Yamashita"}, {"authorId": "2072409098", "name": "Kazuhiro A Fujita"}, {"authorId": "2111956907", "name": "Masamichi Sato"}, {"authorId": "1490483625", "name": "Junichi Kuwata"}, {"authorId": "2060267921", "name": "Atsushi Okamoto"}, {"authorId": "2052827881", "name": "Yoshimasa Ono"}]}, {"paperId": "b431d8163d7c12637705f7fd534eaf7de2c33151", "externalIds": {"ArXiv": "1910.09134", "DBLP": "conf/cvpr/0001YRY22", "DOI": "10.1109/CVPRW56347.2022.00539", "CorpusId": 248240190}, "corpusId": 248240190, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b431d8163d7c12637705f7fd534eaf7de2c33151", "title": "Good, Better, Best: Textual Distractors Generation for Multiple-Choice Visual Question Answering via Reinforcement Learning", "abstract": "Multiple-choice VQA has drawn increasing attention from researchers and end-users recently. As the demand for automatically constructing large-scale multiple-choice VQA data grows, we introduce a novel task called textual Distractors Generation for VQA (DG-VQA) focusing on generating challenging yet meaningful distractors given the context image, question, and correct answer. The DG-VQA task aims at generating distractors without ground-truth training samples since such resources are rarely available. To tackle the DG-VQA unsupervisedly, we propose GOBBET, a reinforcement learning(RL) based framework that utilizes pre-trained VQA models as an alternative knowledge base to guide the distractor generation process. In GOBBET, a pre-trained VQA model serves as the environment in RL setting to provide feedback for the input multi-modal query, while a neural distractor generator serves as the agent to take actions accordingly. We propose to use existing VQA models\u2019 performance degradation as indicators of the quality of generated distractors. On the other hand, we show the utility of generated distractors through data augmentation experiments, since robustness is more and more important when AI models apply to unpredictable open-domain scenarios or security-sensitive applications. We further conduct a manual case study on the factors why distractors generated by GOBBET can fool existing models.", "venue": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "year": 2019, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1910.09134", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2019-10-21", "journal": {"pages": "4917-4926", "name": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"}, "authors": [{"authorId": "2117727751", "name": "Jiaying Lu"}, {"authorId": "153031206", "name": "Xin Ye"}, {"authorId": "2115242596", "name": "Yi Ren"}, {"authorId": "1784500", "name": "Yezhou Yang"}]}, {"paperId": "0b32b558ad859e91e84cbdb1752c9896a5942af4", "externalIds": {"PubMedCentral": "9296431", "ArXiv": "1909.01083", "MAG": "3047275941", "DOI": "10.1007/s10670-020-00284-7", "CorpusId": 202541696, "PubMed": "35875698"}, "corpusId": 202541696, "publicationVenue": {"id": "638d1b1c-6c05-4b65-aa2e-ace42ee26e95", "name": "Erkenntnis: An International Journal of Scientific Philosophy", "type": "journal", "alternate_names": ["Erkenn Int J Sci Philos", "Erkenntnis"], "issn": "0165-0106", "url": "https://www.springer.com/philosophy/journal/10670", "alternate_urls": ["http://www.jstor.org/journals/01650106.html", "https://www.jstor.org/journal/erkenntnis2", "http://www.springer.com/philosophy/journal/10670"]}, "url": "https://www.semanticscholar.org/paper/0b32b558ad859e91e84cbdb1752c9896a5942af4", "title": "General Relativity, Mental Causation, and Energy Conservation", "abstract": null, "venue": "Erkenntnis: An International Journal of Scientific Philosophy", "year": 2019, "referenceCount": 266, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10670-020-00284-7.pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2019-08-20", "journal": {"volume": "87", "pages": "1931 - 1973", "name": "Erkenntnis"}, "authors": [{"authorId": "145300638", "name": "J. B. Pitts"}]}, {"paperId": "6bea7ecf19bd9c823b2b4be05ed0a0ec81d0785b", "externalIds": {"DBLP": "journals/ai/Al-OmariLHC22", "MAG": "2775703036", "DOI": "10.1016/j.artint.2021.103637", "CorpusId": 67096292}, "corpusId": 67096292, "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", "name": "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif Intell"], "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", "2710-1681"], "url": "http://www.elsevier.com/locate/artint", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00043702", "https://www.journals.elsevier.com/artificial-intelligence"]}, "url": "https://www.semanticscholar.org/paper/6bea7ecf19bd9c823b2b4be05ed0a0ec81d0785b", "title": "Joint perceptual learning and natural language acquisition for autonomous robots", "abstract": null, "venue": "Artificial Intelligence", "year": 2017, "referenceCount": 144, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2017-08-01", "journal": {"volume": "303", "pages": "103637", "name": "Artif. Intell."}, "authors": [{"authorId": "122547040", "name": "Muhannad Al-Omari"}]}, {"paperId": "b4916c497d996ad21433a8fda701b6306b0854cd", "externalIds": {"DBLP": "journals/corr/abs-2211-06318", "ArXiv": "2211.06318", "MAG": "2904666994", "DOI": "10.48550/arXiv.2211.06318", "CorpusId": 57283069}, "corpusId": 57283069, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b4916c497d996ad21433a8fda701b6306b0854cd", "title": "Artificial Intelligence and Life in 2030: The One Hundred Year Study on Artificial Intelligence", "abstract": "PREFACE The One Hundred Year Study on Artificial Intelligence, launched in the fall of 2014, is a long-term investigation of the field of Artificial Intelligence (AI) and its influences on people, their communities, and society. It considers the science, engineering, and deployment of AI-enabled computing systems. As its core activity, the Standing Committee that oversees the One Hundred Year Study forms a Study Panel every five years to assess the current state of AI. The Study Panel reviews AI's progress in the years following the immediately prior report, envisions the potential advances that lie ahead, and describes the technical and societal challenges and opportunities these advances raise, including in such arenas as ethics, economics, and the design of systems compatible with human cognition. The overarching purpose of the One Hundred Year Study's periodic expert review is to provide a collected and connected set of reflections about AI and its influences as the field advances. The studies are expected to develop syntheses and assessments that provide expert-informed guidance for directions in AI research, development, and systems design, as well as programs and policies to help ensure that these systems broadly benefit individuals and society. 1 The One Hundred Year Study is modeled on an earlier effort informally known as the \" AAAI Asilomar Study. \" During 2008-2009, the then president of the Association for the Advancement of Artificial Intelligence (AAAI), Eric Horvitz, assembled a group of AI experts from multiple institutions and areas of the field, along with scholars of cognitive science, philosophy, and law. Working in distributed subgroups, the participants addressed near-term AI developments, long-term possibilities, and legal and ethical concerns, and then came together in a three-day meeting at Asilomar to share and discuss their findings. A short written report on the intensive meeting discussions, amplified by the participants' subsequent discussions with other colleagues, generated widespread interest and debate in the field and beyond. The impact of the Asilomar meeting, and important advances in AI that included AI algorithms and technologies starting to enter daily life around the globe, spurred the idea of a long-term recurring study of AI and its influence on people and society. The One Hundred Year Study was subsequently endowed at a university to enable The overarching purpose of the One Hundred Year Study's periodic expert review is to provide a collected and connected set of reflections about AI and its influences as the field \u2026", "venue": "ArXiv", "year": 2016, "referenceCount": 34, "citationCount": 128, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2016-09-06", "journal": {"volume": "abs/2211.06318", "name": "ArXiv"}, "authors": [{"authorId": "144848112", "name": "P. Stone"}, {"authorId": "72419159", "name": "R. Brooks"}, {"authorId": "2841157", "name": "E. Brynjolfsson"}, {"authorId": "3014341", "name": "Ryan Calo"}, {"authorId": "1741101", "name": "Oren Etzioni"}, {"authorId": "2942743", "name": "G. Hager"}, {"authorId": "144049352", "name": "Julia Hirschberg"}, {"authorId": "3027736", "name": "Shivaram Kalyanakrishnan"}, {"authorId": "1783184", "name": "Ece Kamar"}, {"authorId": "1691597", "name": "Sarit Kraus"}, {"authorId": "1388404060", "name": "Kevin Leyton-Brown"}, {"authorId": "30907562", "name": "D. Parkes"}, {"authorId": "81619738", "name": "W. Press"}, {"authorId": "98622177", "name": "A. Saxenian"}, {"authorId": "143873972", "name": "J. Shah"}, {"authorId": "143736701", "name": "Milind Tambe"}, {"authorId": "2862181", "name": "Astro Teller"}]}, {"paperId": "bcbd8c3947cfb5e323c20a949501ce84f3e0d41f", "externalIds": {"CorpusId": 249126675}, "corpusId": 249126675, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bcbd8c3947cfb5e323c20a949501ce84f3e0d41f", "title": "6G and Machine Learning for Industry", "abstract": "This book is the product of a one-semester course called Seminar Machine Intelligence which was held in the winter term 21/22 at the Technical University Munich. The purpose of the course was to study the intersection between Machine Intelligence and 6G telecommunication technology and outline possible future trends in this domain. Nowadays, not only researchers are enthusiastic about the topic of machine intelligence but also a widespread public. More and more longstanding problems in manifold areas such as natural language and computer vision become tractable, it is evident that machine intelligence as technology will play a crucial role in society, industry, and the environment in the foreseeable future. As we shall expect major changes, we asked ourselves the question: \u201dTo what extent do a higher data availability, larger data throughput, and an increased diversity of connected devices a\ufb00ect the future of machine intelligence?\u201d The students participating in the seminar tried to discuss exactly this question in the winter term 21/22. The students examined the status quo of machine learning methods in the context of 6G and give insights into \ufb01elds such as federated learning and generalization as well as their applications and the impact on the industry. Current trends are analyzed and projected into the future, which targets the question of how machine intelligence will be a\ufb00ected by the future of 6G. Abstract 6G and Machine Learning (ML) are two important pillars supporting the development of many technology trends in the industry. The exponentially growing number of devices will require 6G networks for more e\ufb03cient and reliable data exchanges. In addition, intelligent data processing, supported by machine learning, will provide new insights for improved industry practices. The industry of the future will be shaped by the integration of multiple technology trends. This report focuses on four industry trends that are expected to emerge or be enhanced by the combined use of 6G and ML: Edge Computing, Collaborative Robots, Digital Twins, and Augmented and Virtual Reality. We start the analysis with the key facts about each trend and then proceed to analyse each trend in terms of its key drivers, challenges and overall impact on the industry. Fi-nally, we compare these four trends and assess their relationship to each other. For this purpose, we use a driver matrix with the features\u2019 uncertainty and potential impact. Based on its maturity and its role in enabling and extending existing technologies, we concluded that Edge Computing will have the greatest impact and the least uncertainty in terms of its applicability in the industry. Abstract Since the world is becoming more connected, Internet users are subconsciously feeding the network with a tremendous amount of data. Meanwhile, many researchers and institutions are concerned and calling for more protection of sensitive data circulating in the network. For instance, the traditional centralized approach for training Arti\ufb01cial Intelligence (AI) models faces major challenges related to e\ufb03ciency and security. On one side modern communication industry is looking for way to process and distribute sensitive data across the network, on the other hand maintaining a high level of security and data streaming is also essential to achieve our goal. Lately, a new Machine Learning (ML) distributed approach is considered to be a promising solution to empower and integrate safely AI in 6G, which is Federated Learning (FL). FL is a distributed AI approach that provides data, solution functions, and training models in heterogeneous and large-scale networks. In this report, we start with some facts about e\ufb00ective communication in federated learning. Then, we give four trends as a vision of how FL will impact the future network with respect to sensitive data. We review some methods for ensuring fairness and addressing sources of bias. Next, we use the healthcare system as a source of sensitive data and see how it is represented in data-driven models. Finally, we see how the costs of Abstract What is Love? That question is still to be answered by R.E.M. Pun aside, humanity as a whole places an increasingly high hope into the bene\ufb01cial use of AI to solve arbitrary problems. This is largely promoted by the positive impact many people experience in their lives on a daily basis: smoke-detectors, image quality enhancement and chess training software may be some of the examples that might come to one\u2019s mind. Current-era communication technology on the other hand largely relies on conventional approaches. This trend report sets out to uncover the role Generalization could play to pave the way for AI in the emerging communication standard 6G. As we will show, Generalization might be looming closer on the horizon than expected, could have direct access and impact on end-users and should strive to improve equitable technology access for everyone\u2014and everything. Abstract The motivation of approaching futuristic networks that combine an extreme high reliability with a signi\ufb01cant connection density as well as an extreme high data rate or capacity has been pushing the research in the telecommunication \ufb01eld ever since it came to existence. This ever-awaited goal is getting closer to being in the realm of possibilities as 6th Generation wireless technology has been gaining momentum recently. As it seems, the aforementioned premise of the 6G technology is not only bene\ufb01cial as a powerful structure for networking, but rather, and arguably more important, as infrastructure for more sophisticated applications that require an e\ufb03cient network at their core. In this trend report, we present trends based on a review of state-of-art available documenta-tion of the topic \u201cApplications for 6G\u201d. Furthermore, we incorporate our own research and assessment to closely examine the facts, key drivers and challenges of each trend mentioned. Eventually, a conclusion is made to shed light on the comparison of these trends by analysing the uncertainty and impact of each.", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": []}, {"paperId": "d4c822021a8cdab4ddf5482ce5a1cf6f1d66543c", "externalIds": {"DBLP": "journals/access/BellagardaA22", "DOI": "10.1109/ACCESS.2022.3173297", "CorpusId": 248684391}, "corpusId": 248684391, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d4c822021a8cdab4ddf5482ce5a1cf6f1d66543c", "title": "An Updated Survey on the Convergence of Distributed Ledger Technology and Artificial Intelligence: Current State, Major Challenges and Future Direction", "abstract": "In recent times, Artificial Intelligence (AI) and Distributed Ledger Technology (DLT) have become two of the most discussed sectors in Information Technology, with each having made a major impact. This has generated space for further innovation to occur in the convergence of the two technologies. In this paper, we gather, analyse, and present a detailed review of the convergence of AI and DLT in a vice versa manner. We review how AI is impacts DLT by focusing on AI-based consensus algorithms, smart contract security, selfish mining, decentralized coordination, DLT fairness, non-fungible tokens, decentralized finance, decentralized exchanges, decentralized autonomous organizations, and blockchain oracles. In terms of the impact DLT has on AI, the areas covered include AI data privacy, explainable AI, smart contract-based AIs, parachains, decentralized neural networks, Internet of Things, 5G technology and data markets, and sharing. Furthermore, we identify research gaps and discuss open research challenges in developing future directions.", "venue": "IEEE Access", "year": 2022, "referenceCount": 126, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/9668973/09770802.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "10", "pages": "50774-50793", "name": "IEEE Access"}, "authors": [{"authorId": "1396411663", "name": "Jagger S. Bellagarda"}, {"authorId": "1403308610", "name": "A. Abu-Mahfouz"}]}, {"paperId": "36ad4998e7e958856a2a61b3dbb7a373641ba2a2", "externalIds": {"DBLP": "conf/eann/TheodoropoulosM22", "DOI": "10.1007/978-3-031-08223-8_30", "CorpusId": 247255971}, "corpusId": 247255971, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/36ad4998e7e958856a2a61b3dbb7a373641ba2a2", "title": "Semantic Segmentation of Diabetic Retinopathy Lesions, Using a UNET with Pretrained Encoder", "abstract": null, "venue": "EANN", "year": 2022, "referenceCount": 100, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "361-371"}, "authors": [{"authorId": "2017470143", "name": "D. Theodoropoulos"}, {"authorId": "2079923", "name": "G. Manikis"}, {"authorId": "2629216", "name": "K. Marias"}, {"authorId": "2176144", "name": "G. Papadourakis"}]}, {"paperId": "883a211453bd81a3859e1ef7e8047bf9592320ea", "externalIds": {"CorpusId": 248673760}, "corpusId": 248673760, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/883a211453bd81a3859e1ef7e8047bf9592320ea", "title": "Reaching out for the Answer: Answer Type Prediction", "abstract": ". Natural language is complex and similar statements can be expressed in various ways. Therefore, understanding natural language is an ongoing challenge in the \ufb01eld of Question Answering. To make the process from the question to the answer, the QA pipeline can be broken down to several sub-steps, as e.g. prediction of the potential type of the answer, entity linking and detection of references for properties relevant for the formal query. The SMART Task challenge, co-located with ISWC 2021, focussed on two of these sub-tasks: relation linking and answer type prediction. With this paper, we present our approach for the latter task. Our solution is a two-staged process combining two separate multi-label classi\ufb01cation tasks. For the answer category prediction, we utilize the RoBERTa language model. Questions predicted as resource questions are then further classi\ufb01ed regarding the concrete answer types \u2013 a list of ontology classes \u2013 utilizing the BERT language model.", "venue": "", "year": 2022, "referenceCount": 17, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2164777052", "name": "Kanchan Shivashankar"}, {"authorId": "2164777390", "name": "Khaoula Benmaarouf"}, {"authorId": "35161972", "name": "Nadine Steinmetz"}]}, {"paperId": "1effb7e6e8cf690072b328d587046054e9fa0f50", "externalIds": {"CorpusId": 248372639}, "corpusId": 248372639, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1effb7e6e8cf690072b328d587046054e9fa0f50", "title": "Can machines think? The controversy that led to the Turing test", "abstract": "Turing\u2019s much debated test has turned 70 and is still fairly controversial. His 1950 paper is seen as a complex and multilayered text, and key questions about it remain largely unanswered. Why did Turing select learning from experience as the best approach to achieve machine intelligence? Why did he spend several years working with chess-playing as a task to illustrate and test for machine intelligence only to trade it out for conversational question-answering in 1950? Why did Turing refer to gender imitation in a test for machine intelligence? In this article, I shall address these questions by unveiling social, historical and epistemological roots of the so-called Turing test. I will draw attention to a historical fact that has been only scarcely observed in the secondary literature thus far, namely, that Turing's 1950 test emerged out of a controversy over the cognitive capabilities of digital computers, most notably out of debates with physicist and computer pioneer Douglas Hartree, chemist and philosopher Michael Polanyi, and neurosurgeon Geoffrey Jefferson. Seen in its historical context, Turing\u2019s 1950 paper can be understood as essentially a reply to a series of challenges posed to him by these thinkers arguing against his view that machines can think. Turing did propose gender learning and imitation as one of his various imitation tests for machine intelligence, and I argue here that this was done in response to Jefferson's suggestion that gendered behavior is causally related to the physiology of sex hormones.", "venue": "", "year": 2022, "referenceCount": 54, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, {"paperId": "dbe4c5294a7334820f6b4524154bafd41d60c534", "externalIds": {"CorpusId": 247570160}, "corpusId": 247570160, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dbe4c5294a7334820f6b4524154bafd41d60c534", "title": "VISUAL REASONING MODELS", "abstract": "How can we measure the reasoning capabilities of intelligence systems? Visual question answering provides a convenient framework for testing the model\u2019s abilities by interrogating the model through questions about the scene. However, despite scores of various visual QA datasets and architectures, which sometimes yield even a super-human performance, the question of whether those architectures can actually reason remains open to debate. To answer this, we extend the visual question answering framework and propose the following behavioral test in the form of a two-player game. We consider black-box neural models of CLEVR. These models are trained on a diagnostic dataset benchmarking reasoning. Next, we train an adversarial player that re-configures the scene to fool the CLEVR model. We show that CLEVR models, which otherwise could perform at a \u201chuman level\u201d, can easily be fooled by our agent. Our results put in doubt whether data-driven approaches can do reasoning without exploiting the numerous biases that are often present in those datasets. Finally, we also propose a controlled experiment measuring the efficiency of such models to learn and perform reasoning.", "venue": "", "year": 2022, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "148099243", "name": "Spyridon Mouselinos"}, {"authorId": "47407464", "name": "H. Michalewski"}]}, {"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "externalIds": {"CorpusId": 251848799}, "corpusId": 251848799, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "title": "Dystopian or Utopian? Two Images of Alan Turing", "abstract": "Turing made intriguing statements about the future of arti\ufb01cial intelligence (AI) in society. He predicted that machines would eventually \u2018compete with men in all purely intellectual \ufb01elds,\u2019 and added that at some stage they could be expected \u2018to take control.\u2019 Turing has been associated by his biographer, Andrew Hodges, with Dr. Frankenstein from Mary Shelley\u2019s dystopian novel. However, he has also been described by his contemporary Geoffrey Jefferson as a \u2018scienti\ufb01c\u2019 Percy B. Shelley, the English Romantic poet who was posthumously championed as a utopian and radical thinker. This article then asks: in what way did Turing envision a society permeated with intelligent machines? Did he see it as a utopia or a dystopia? These questions are thoroughly examined using Turing\u2019s own texts and related sources. This study reconstructs Turing\u2019s historical context in postwar England and analyzes his irony and sense of humor, as well as the in\ufb02uence of Samuel Butler on his vision. Contrary to recent views in AI science and \ufb01ction, on the one hand, a mismatch is shown between Turing and the incautious Frankenstein; on the other hand, Turing\u2019s radical Shelley-like qualities are substantiated. The article shows that Turing\u2019s utopianism entrusted intelligent machines with the task of teaching lessons of rationality and intellectual integrity over our place in nature and prejudices. Further, Turing\u2019s irony is shown to have targeted intellectuals who sacri\ufb01ce independent thinking to retain their power. These, he hoped, would be eventually rivaled and surpassed by intelligent machines.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6881d58bfd193d39988561825f352c345d70b383", "externalIds": {"DOI": "10.1016/j.ifacol.2022.12.052", "CorpusId": 254957737}, "corpusId": 254957737, "publicationVenue": {"id": "af98f1eb-affb-4b55-b8ff-1964b29cf894", "name": "IFAC-PapersOnLine", "type": "journal", "issn": "2405-8963", "url": "https://www.journals.elsevier.com/ifac-papersonline/", "alternate_urls": ["http://www.sciencedirect.com/science/journal/24058963", "https://www.journals.elsevier.com/ifac-papersonline"]}, "url": "https://www.semanticscholar.org/paper/6881d58bfd193d39988561825f352c345d70b383", "title": "Ethical AI and Global Cultural Coherence: Issues and Challenges", "abstract": null, "venue": "IFAC-PapersOnLine", "year": 2022, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "IFAC-PapersOnLine"}, "authors": [{"authorId": "1736417", "name": "P. Groumpos"}, {"authorId": "2072321901", "name": "Plenary Paper"}]}, {"paperId": "32afbdf6a0a3da9970cd5c796fb5ce40d1f64e06", "externalIds": {"DOI": "10.17048/pelikon2020.2022.145", "CorpusId": 254959250}, "corpusId": 254959250, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/32afbdf6a0a3da9970cd5c796fb5ce40d1f64e06", "title": "Az \u00e1ltal\u00e1nos \u00e9s k\u00f6z\u00e9piskolai magyar nyelvtan tananyag elsaj\u00e1t\u00edt\u00e1s\u00e1t seg\u00edt\u0151 alkalmaz\u00e1s", "abstract": "1. Bevezet\u00e9s A 2020-ban kialakult v\u00edrushelyzet miatt Magyarorsz\u00e1gon is egyik napr\u00f3l a m\u00e1sikra kellett jelenl\u00e9ti oktat\u00e1sr\u00f3l t\u00e1voktat\u00e1sra v\u00e1ltani orsz\u00e1gszerte (Sz\u0171ts 2021). Emiatt sok csal\u00e1d k\u00e9nyszer\u00fclt arra, hogy r\u00e9szt vegyen gyermeke tan\u00edt\u00e1s\u00e1ban, ez sok esetben nem bizonyult egyszer\u0171 feladatnak. Ez a helyzet \u00faj kih\u00edv\u00e1sokat \u00e1ll\u00edtott tan\u00e1rok, sz\u00fcl\u0151k \u00e9s gyermekek el\u00e9 egyar\u00e1nt (J\u00e1nk\u2013L\u0151rincz 2021). Seg\u00edts\u00e9gk\u00e9ppen egy olyan alkalmaz\u00e1s fejleszt\u00e9s\u00e9t t\u0171zt\u00fck ki c\u00e9lul, mely az internet adta lehet\u0151s\u00e9geket haszn\u00e1lja az oktat\u00e1sban, \u00e9s haszn\u00e1lat\u00e1val a magyar nyelvtan iskol\u00e1ban oktatott szab\u00e1lyai k\u00f6nnyebben elsaj\u00e1t\u00edthat\u00f3k. Rem\u00e9nyeink szerint applik\u00e1ci\u00f3nk haszn\u00e1lat\u00e1val a di\u00e1kok j\u00e1t\u00e9kosan ismerkedhetnek meg azzal, hogy hogyan \u00e9p\u00fclnek fel a mondatok, milyen egys\u00e9gekb\u0151l \u00e1llnak, \u00e9s ezek hogyan viszonyulnak egym\u00e1shoz. A 2020-as \u00e1t\u00e1ll\u00e1s megmutatta azt is, hogy mi\u00e9rt van sz\u00fcks\u00e9g j\u00f3l fel\u00e9p\u00edtett, otthoni tanul\u00e1s sor\u00e1n is megfelel\u0151 informatikai eszk\u00f6z\u00f6kre \u00e9s alkalmaz\u00e1sokra, amelyekkel ki lehet eg\u00e9sz\u00edteni az \u00e1ltal\u00e1nos \u00e9s k\u00f6z\u00e9piskolai oktat\u00e1st, \u00e9s amelyek ugyanakkor biztos\u00edthatj\u00e1k a megfelel\u0151 kommunik\u00e1ci\u00f3t tan\u00e1r \u00e9s di\u00e1k k\u00f6z\u00f6tt. Ezzel az alkalmaz\u00e1ssal szeretn\u00e9nk csatlakozni a digit\u00e1lis oktat\u00e1s fejleszt\u00e9s\u00e9re ir\u00e1nyul\u00f3 t\u00f6rekv\u00e9sekhez, hogy a gyerekek a tan\u00f3r\u00e1n k\u00edv\u00fcl is kaphassanak szakszer\u0171 seg\u00edts\u00e9get, amivel biztos tud\u00e1st \u00e9p\u00edthetnek, \u00e9s j\u00f3l teljes\u00edthetnek az \u00f3r\u00e1kon is. Mindezt j\u00e1t\u00e9kos form\u00e1ban, hogy a tanul\u00e1s \u00f6r\u00f6m legyen, a di\u00e1kok ne vesz\u00edts\u00e9k el motiv\u00e1ci\u00f3jukat, \u00e9s sikeresen teljes\u00edts\u00e9k a tant\u00e1rgyi k\u00f6vetelm\u00e9nyeket. Mindezt tudom\u00e1nyos ig\u00e9nyess\u00e9ggel tett\u00fck, de els\u0151 helyre a felhaszn\u00e1l\u00f3i ig\u00e9nyeket helyezt\u00fck.", "venue": "A digit\u00e1lis oktat\u00e1s nyelvi dimenzi\u00f3i : V\u00e1logat\u00e1s a PeLiKon2020 oktat\u00e1snyelv\u00e9szeti konferencia kerekasztal-besz\u00e9lget\u00e9seib\u0151l \u00e9s el\u0151ad\u00e1saib\u00f3l (K\u00e1lm\u00e1n L\u00e1szl\u00f3 eml\u00e9k\u00e9re)", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://publikacio.uni-eszterhazy.hu/7566/1/145_Oszk%C3%B3.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "A digit\u00e1lis oktat\u00e1s nyelvi dimenzi\u00f3i : V\u00e1logat\u00e1s a PeLiKon2020 oktat\u00e1snyelv\u00e9szeti konferencia kerekasztal-besz\u00e9lget\u00e9seib\u0151l \u00e9s el\u0151ad\u00e1saib\u00f3l (K\u00e1lm\u00e1n L\u00e1szl\u00f3 eml\u00e9k\u00e9re)"}, "authors": [{"authorId": "3190496", "name": "Beatrix Oszk\u00f3"}, {"authorId": "2133802014", "name": "No\u00e9mi Evelin T\u00f3th"}, {"authorId": "2197673239", "name": "Zijian Gy\u0151z\u0151 Yang"}]}, {"paperId": "0808accfe150d354d5c01dd19808b83d5fd344a3", "externalIds": {"CorpusId": 254976550}, "corpusId": 254976550, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0808accfe150d354d5c01dd19808b83d5fd344a3", "title": "Characterizing the Response Space of Questions: data and theory", "abstract": "The main aim of this paper is to provide a characterization of the response space for questions using a taxonomy grounded in a dialogical formal semantics. As a starting point we take the typology for responses in the form of questions provided in \u0141upkowski and Ginzburg (2016). That work develops a wide coverage taxonomy for question/question sequences observable in corpora including the BNC, CHILDES, and BEE, as well as formal modeling of all the postulated classes. This paper extends that work to cover all types of responses to questions. We present the extended typology of responses to questions based on studies of the BNC, BEE, Maptask and CornellMovie corpora which include 607, 262, 460, and 911 question/response pairs respectively. We compare the data for English with data from Polish using the Spokes corpus (694 question/response pairs), providing detailed accounts of annotation reliability and disagreement analysis. We sketch how each class can be formalized using a dialogical semantics appropriate for dialogue management, concretely the framework of KoS (Ginzburg, 2012).", "venue": "", "year": 2022, "referenceCount": 82, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2197795198", "name": "Ucharska"}, {"authorId": "2197793642", "name": "Upkowski"}]}, {"paperId": "478b60cf3930ede487c5701dc842f801597954d3", "externalIds": {"CorpusId": 254644859}, "corpusId": 254644859, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/478b60cf3930ede487c5701dc842f801597954d3", "title": "Artificial Neural Network for Predicting Heat Transfer Rates in Supercritical Carbon Dioxide", "abstract": "Supercritical carbon dioxide as a working fluid in a closed Brayton cycle is proving to be more efficient than a conventional steam-based Rankine engine. Understanding the heat transfer properties of supercritical fluids is important for the design of a working engine cycle. The thermophysical properties of supercritical fluids tend to vary non-linearly near the pseudo-critical region. Traditionally, empirical correlations are used to calculate the heat transfer coefficient. It has been shown in the literature and within our own studies that these correlations provide inaccurate predictions near the pseudo critical line, where heat transfer may be deteriorated or enhanced, resulting from strong buoyancy and acceleration effects, and strong variations in fluid properties. The current study successfully uses machine learning techniques to capture these non-linearities and complex physics, providing an accurate tool for the design of heat transfer devices. The dataset is generated using highly validated computational fluid dynamics analysis. The bulk temperature and wall temperature data was obtained for a range of heat flux (q = [6, 12, 24, 36, 48]) and mass flux (G = [200, 400, 600, 800, 1000]) conditions. An artificial neural network base model was trained, validated, and tested using the CFD data. The test case was strategically selected such that the artificial neural network model trained on the high heat flux and mass flux (extreme) cases. Using the base model, hyperparameter tuning was performed, bringing down the prediction error on the test case by 94%. The final model predicted on the test set with an error less than 1%. This approach is computationally cost efficient compared to the traditional correlation-based approach as it took only few minutes for the model to train and predict. Lastly, this study published an artificial neural network tool that can be used to predict the wall temperature. Establishing a machine learning model capable of accurately predicting the wall temperature will aid in the design and development of future power generation cycles.", "venue": "", "year": 2022, "referenceCount": 92, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2195770235", "name": "Vinusha Dasarla Giri Babu"}]}, {"paperId": "f8c991cb2df68befe96e6210e5f18eb3d2b4f329", "externalIds": {"CorpusId": 254547979}, "corpusId": 254547979, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f8c991cb2df68befe96e6210e5f18eb3d2b4f329", "title": "Informatica en Economie Lowering the Resolution of Damage Data in a Model that Predicts Rainwater Damage", "abstract": "The increasing risk that residences sustain rainwater damage and the major consequences that rainwater damage can have, highlight the importance of preventive measures being taken. An important step in prevention is finding out which locations are most vulnerable to severe rainfall and hence require more preventive measures. One way to determine this is by developing models that predict rainwater damage for a given amount of rain. There are a variety of data sources that can be used in these models. In this study, we investigate to which degree lowering the spatial resolution of water damage instances that a damage data source provides, is a disadvantage. For this, we look at the performance of three models; one that uses object level water damage instances, one that uses sub-district level instances, and one that uses district level instances. For each resolution, random forest classifiers are used to make predictions for test data. The predictive features that were included in these models are one rainfall feature and multiple height features. A model that considers only the rainfall feature has an accuracy of almost 58%, while a model that considers both rainfall and height features has an accuracy of almost 64%. With the features used in this study, we find small negligible differences in the performances of models considering different resolutions of water damage data. This potentially opens the door to use large insurance data sets, having lower resolutions, to predict rainwater damage.", "venue": "", "year": 2022, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2195034009", "name": "Teun de Mast"}]}, {"paperId": "49b66f02f1e382dea29e0ef415e47e613d5d218f", "externalIds": {"DOI": "10.1016/j.procs.2022.11.174", "CorpusId": 254490126}, "corpusId": 254490126, "publicationVenue": {"id": "88628377-4e89-44f8-bb38-094e29986c8f", "name": "Procedia Computer Science", "type": "journal", "alternate_names": ["Procedia Comput Sci"], "issn": "1877-0509", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/719435/description#", "alternate_urls": ["https://www.journals.elsevier.com/procedia-computer-science", "http://www.sciencedirect.com/science/journal/18770509"]}, "url": "https://www.semanticscholar.org/paper/49b66f02f1e382dea29e0ef415e47e613d5d218f", "title": "Mechanism of Extension Intelligence for Solving Contradictory Problems", "abstract": null, "venue": "Procedia Computer Science", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Procedia Computer Science"}, "authors": [{"authorId": "72486540", "name": "Zhengqi Yang"}, {"authorId": "2155447444", "name": "Xing Li"}]}, {"paperId": "7d558a921caef74f704a742595338c445f9924f3", "externalIds": {"DBLP": "journals/access/DadmanBBD22", "DOI": "10.1109/ACCESS.2022.3225689", "CorpusId": 254331456}, "corpusId": 254331456, "publicationVenue": {"id": "2633f5b2-c15c-49fe-80f5-07523e770c26", "name": "IEEE Access", "type": "journal", "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, "url": "https://www.semanticscholar.org/paper/7d558a921caef74f704a742595338c445f9924f3", "title": "Toward Interactive Music Generation: A Position Paper", "abstract": "Music generation using deep learning has received considerable attention in recent years. Researchers have developed various generative models capable of imitating musical conventions, comprehending the musical corpora, and generating new samples based on the learning outcome. Although the samples generated by these models are persuasive, they often lack musical structure and creativity. For instance, a vanilla end-to-end approach, which deals with all levels of music representation at once, does not offer human-level control and interaction during the learning process, leading to constrained results. Indeed, music creation is a recurrent process that follows some principles by a musician, where various musical features are reused or adapted. On the other hand, a musical piece adheres to a musical style, breaking down into precise concepts of timbre style, performance style, composition style, and the coherency between these aspects. Here, we study and analyze the current advances in music generation using deep learning models through different criteria. We discuss the shortcomings and limitations of these models regarding interactivity and adaptability. Finally, we draw the potential future research direction addressing multi-agent systems and reinforcement learning algorithms to alleviate these shortcomings and limitations.", "venue": "IEEE Access", "year": 2022, "referenceCount": 152, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/6514899/09966445.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "10", "pages": "125679-125695", "name": "IEEE Access"}, "authors": [{"authorId": "2141072400", "name": "Shayan Dadman"}, {"authorId": "2089938", "name": "B. Bremdal"}, {"authorId": "145213892", "name": "B. Bang"}, {"authorId": "39797456", "name": "Rune Dalmo"}]}, {"paperId": "3e5e4267d5f0289c84e4fbd932f0c06c3de4cbd8", "externalIds": {"CorpusId": 254404982}, "corpusId": 254404982, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e5e4267d5f0289c84e4fbd932f0c06c3de4cbd8", "title": "Artificial Intelligence for All Perspectives and Outlooks on the Role of Machine Learning in Architectural Design", "abstract": "This paper was presented as part of \u201cPanel 1: How Is Digitalization Changing How Housing Is Designed & Built?\u201d at the symposium \u201cBringing Digitalization Home: How Can Technology Address Housing Challenges?\u201d, hosted by the Harvard Joint Center for Housing Studies in March 2022 and funded by Qualcomm. Participants examined the changes that digitalization\u2014the use of automated digital technologies to collect, process, analyze, distribute, use, and sell information\u2014is spurring in the way housing is produced, marketed, sold, financed, managed, and lived in.", "venue": "", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "119878732", "name": "J. L. G. D. C. Y. L\u00f3pez"}]}, {"paperId": "3fd74001757533e642b458635f1365d955a78343", "externalIds": {"DOI": "10.1016/j.procs.2022.11.042", "CorpusId": 254176171}, "corpusId": 254176171, "publicationVenue": {"id": "88628377-4e89-44f8-bb38-094e29986c8f", "name": "Procedia Computer Science", "type": "journal", "alternate_names": ["Procedia Comput Sci"], "issn": "1877-0509", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/719435/description#", "alternate_urls": ["https://www.journals.elsevier.com/procedia-computer-science", "http://www.sciencedirect.com/science/journal/18770509"]}, "url": "https://www.semanticscholar.org/paper/3fd74001757533e642b458635f1365d955a78343", "title": "The Fourth Space in the Fourth Revolution", "abstract": null, "venue": "Procedia Computer Science", "year": 2022, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Procedia Computer Science"}, "authors": [{"authorId": "51986819", "name": "P. Boltuc"}]}, {"paperId": "58683ad7a83eec45cf6f8e0bd983fa2c5ba5f963", "externalIds": {"DOI": "10.1016/j.procs.2022.11.080", "CorpusId": 254177472}, "corpusId": 254177472, "publicationVenue": {"id": "88628377-4e89-44f8-bb38-094e29986c8f", "name": "Procedia Computer Science", "type": "journal", "alternate_names": ["Procedia Comput Sci"], "issn": "1877-0509", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/719435/description#", "alternate_urls": ["https://www.journals.elsevier.com/procedia-computer-science", "http://www.sciencedirect.com/science/journal/18770509"]}, "url": "https://www.semanticscholar.org/paper/58683ad7a83eec45cf6f8e0bd983fa2c5ba5f963", "title": "An implementation of different minimal consciousness's variants for a cyber-physical system", "abstract": null, "venue": "Procedia Computer Science", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Procedia Computer Science"}, "authors": [{"authorId": "2193357638", "name": "Ilya A. Popov"}, {"authorId": "2193361855", "name": "Ivan A. Erokhin"}, {"authorId": "73869155", "name": "Artem A. Sukhobokov"}, {"authorId": "2193360514", "name": "Danila R. Gromozdov"}, {"authorId": "2193356908", "name": "Evgenij A. Belousov"}]}, {"paperId": "011f3317c97090bcb536645bbe17c5ee93a2977a", "externalIds": {"DOI": "10.32855/fcapital.202201.010", "CorpusId": 253621528}, "corpusId": 253621528, "publicationVenue": {"id": "5a3e78c0-0187-42ae-8f48-3373bbd1799b", "name": "Fast Capitalism", "alternate_names": ["Fast Capital"], "issn": "1930-014X", "url": "http://www.fastcapitalism.com/", "alternate_urls": ["http://www.openhumanitiespress.org/journals/titles/fast-capitalism/"]}, "url": "https://www.semanticscholar.org/paper/011f3317c97090bcb536645bbe17c5ee93a2977a", "title": "Learning Management Systems as Anti-Convivial Tools", "abstract": "The last two decades have seen an increase in the number of online university classes operating under any of several commercial Learning Management Systems (LMS). Online classes expanded dramatically in the US during 2020 as a response to the COVID-19 pandemic. Students, faculty, and administrators frequently assume that LMSs are epistemologically neutral. These LMSs are designed to do exactly what they say on the tin: they are systems for managing learning. At the same time, they function based on implicit understandings of \u201clearning,\u201d \u201cmanagement,\u201d and \u201csystems\u201d that privilege some knowledges, interactions, and discourses while de-emphasizing others. In this paper I argue that the LMS as a tool is not\u2014in the terms of Ivan Illich\u2014convivial. Rather, LMSs as designed enforce a technocratic perspective based on efficiency and replicability, making them actively anti-convivial. At the same time, problems with LMS-hosted classes are defined in technological terms, with additional improved software being seen as the main solution. I argue that employing a critical participatory pedagogy can begin to address these concerns.", "venue": "Fast Capitalism", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://fastcapitalism.journal.library.uta.edu/index.php/fastcapitalism/article/download/456/533", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Fast Capitalism"}, "authors": [{"authorId": "67034751", "name": "Edward M. Maclin"}]}, {"paperId": "230e6ee6ed2e9b26efebbc632eb3467c9ac7b833", "externalIds": {"DOI": "10.1590/1678-6971/eramd220003.en", "CorpusId": 253485009}, "corpusId": 253485009, "publicationVenue": {"id": "e250b629-b143-4748-ad52-9c3285858a98", "name": "RAM. Revista de Administra\u00e7\u00e3o Mackenzie", "type": "journal", "alternate_names": ["RAM Rev Adm Mackenzie"], "issn": "1518-6776", "url": "http://editorarevistas.mackenzie.br/index.php/RAM", "alternate_urls": ["https://www.redalyc.org/revista.oa?id=1954", "http://www.spell.org.br/periodicos/ver/52/revista-de-administracao-mackenzie", "https://www.scielo.br/scielo.php?lng=en&pid=1678-6971&script=sci_serial", "https://www.scielo.br/scielo.php?lng=es&nrm=iso&pid=1678-6971&rep=&script=sci_serial"]}, "url": "https://www.semanticscholar.org/paper/230e6ee6ed2e9b26efebbc632eb3467c9ac7b833", "title": "Customer satisfaction in service delivery with artificial intelligence: A meta-analytic study", "abstract": "ABSTRACT Purpose: This study intends to identify the main background and consequent constructs that form consumer satisfaction in providing services using artificial intelligence (AI) and their magnitudes. Originality/value: This work seeks to fill a gap arising from the scarcity of meta-analytic research on service delivery with AI and also its relationship to consumer satisfaction. Design/methodology/approach: The study adopted the meta-analytic method, and its development followed three phases: 1. research; 2. collection; and 3. coding and data analysis. We analyzed 19 articles published in journals of international relevance from January 2000 to December 2020, present on the Web of Science and Science Direct platforms, totaling 128 observations and 28 topic-related. Findings: Five background constructs and one consequent construct were identified, from which an integrated model was built to illustrate the relationships between consumer satisfaction in intelligent services. The results show that consumer satisfaction in the provision of services is significantly correlated to the adoption of artificial intelligence. Then, the integrated quantitative evaluation that was performed in this study aims to contribute to future empirical evidence in such a way that an increase in the scope of studies on artificial intelligence and consumer satisfaction occurs, based on the analysis of the following constructs: perceived value, perceived features, perception of quality, marketing orientation, identification with the service and behavior of using AI in services.", "venue": "RAM. Revista de Administra\u00e7\u00e3o Mackenzie", "year": 2022, "referenceCount": 61, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.scielo.br/j/ram/a/WxxsLRCDQPyVGSjYMLFxzdK/?lang=en&format=pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "RAM. Revista de Administra\u00e7\u00e3o Mackenzie"}, "authors": [{"authorId": "2190624804", "name": "Laura M. Aguiar-Costa"}, {"authorId": "2190626573", "name": "Carlos A. X. C. Cunha"}, {"authorId": "2068960764", "name": "Wallysson K. M. Silva"}, {"authorId": "2067474648", "name": "N. R. Abreu"}]}, {"paperId": "15b343246a691acd26f450bbde25f601f85bea14", "externalIds": {"DBLP": "conf/staf/Zaytsev22", "CorpusId": 253270049}, "corpusId": 253270049, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15b343246a691acd26f450bbde25f601f85bea14", "title": "Speak Well or Be Still: Solving Conversational AI with Weighted Attribute Grammars (Poster)", "abstract": "There is a growing need to specify models of possible conversations with non-human entities. Such models have a difficult task to set the bar for correctness yet tolerate conversations with only partial conformance to it, and accommodate computations that non-human entities perform during the conversation on several possibly independent emergent models with unrelated flows of information in them. As it turns out, this is possible to specify formally in a fairly concise way with weighted attribute grammars [6]. In this paper, a variant of those is presented, called WAGIoT , that combines the power of analytic, generative, attribute, weighted and probabilistic grammars in one DSML.", "venue": "STAF Workshops", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": "145543743", "name": "V. Zaytsev"}]}, {"paperId": "f367ce68505e01d0452fe4be113e27f7a98c9d6d", "externalIds": {"CorpusId": 253124864}, "corpusId": 253124864, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f367ce68505e01d0452fe4be113e27f7a98c9d6d", "title": "LAD: Language Augmented Diffusion for Reinforcement Learning", "abstract": "Learning skills from language provides a powerful avenue for generalization in reinforcement learning, although it remains a challenging task as it requires agents to capture the complex interdependencies between language, actions, and states. In this paper, we propose leveraging L anguage A ugmented D iffusion models as a planner conditioned on language (LAD). We demonstrate the comparable performance of LAD with the state-of-the-art on the CALVIN language robotics benchmark with a much simpler architecture that contains no inductive biases special-ized to robotics, achieving an average success rate (SR) of 72% compared to the best performance of 76%. We also conduct an analysis on the properties of language conditioned diffusion in reinforcement learning.", "venue": "", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2051714782", "name": "Pamela Mishkin"}]}, {"paperId": "bf416fe66e3111922eab46221f54e796b978e865", "externalIds": {"CorpusId": 252989966}, "corpusId": 252989966, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf416fe66e3111922eab46221f54e796b978e865", "title": "Why Machines will Never Rule the World; Artificial Intelligence without Fear", "abstract": null, "venue": "", "year": 2022, "referenceCount": 507, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "120743060", "name": "J. Landgrebe"}, {"authorId": "2116986621", "name": "Barry Smith"}]}, {"paperId": "578324d7fad68e0269ea4d99369a55f36feb9d75", "externalIds": {"CorpusId": 252821445}, "corpusId": 252821445, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/578324d7fad68e0269ea4d99369a55f36feb9d75", "title": "Polyse\u0300mes, 27 | 2022", "abstract": "This article examines Ian McEwan\u2019s 2005 novel Saturday through the prism of cinema and spectatorship. A watcher through windows, its protagonist Henry Perowne is a self-confessed spectator of other people\u2019s lives. Despite the neurosurgeon\u2019s attempts to remain a detached observer, however, the broader politics of the period and the tensions of urban life conspire to invade the private sphere of his \u201ccity square\u201d. We argue that such framing motifs create a tension between the unadulterated observation implied by the window\u2019s transparency and the organizational effects of the frame, a tension that is key to film theory and one of its core works, Alfred Hitchcock\u2019s Rear Window (1954). The paper also analyses the recurrent motifs of projection in the novel, as well as the analogies between visual perception and the display of images on a cinema screen, in the light of the novel\u2019s discourse on modernism and the representation of the consciousness. Finally, we examine the potentially liberatory effects of the filmic dynamic play of perspective and temporality on McEwan\u2019s writing and its visual qualities, and their connection to questions of focalization and omniscience in the novel. Cet article examine le roman Saturday (2005) d\u2019Ian McEwan \u00e0 travers le prisme du cin\u00e9ma et du r\u00f4le du spectateur. Souvent attir\u00e9 \u00e0 sa fen\u00eatre pour observer la ville, le protagoniste Henry Perowne est un spectateur de la vie des autres. Cependant, malgr\u00e9 les tentatives du neurochirurgien pour rester un observateur d\u00e9tach\u00e9, les crises politiques de l\u2019\u00e9poque et les tensions de la vie urbaine envahissent sa vie priv\u00e9e. Les strat\u00e9gies de cadrage cr\u00e9ent une tension entre l\u2019observation pure et simple impliqu\u00e9e par la transparence de la fen\u00eatre et les effets organisationnels du cadre, une tension qui est essentielle \u00e0 la th\u00e9orie du cin\u00e9ma et \u00e0 l\u2019une de ses \u0153uvres fondatrices, Rear Window d\u2019Alfred Hitchcock (1954). L\u2019article analyse \u00e9galement les dispositfs r\u00e9currents de projection dans le roman, ainsi que les analogies entre la perception visuelle et l\u2019affichage d\u2019images sur un \u00e9cran, \u00e0 la lumi\u00e8re du discours du roman sur le modernisme et la repr\u00e9sentation de la conscience. Enfin, nous examinons les effets potentiellement lib\u00e9rateurs du jeu dynamique de la perspective et de la temporalit\u00e9 du film sur l\u2019\u00e9criture de McEwan, et comment ces effets sont li\u00e9s aux questions de focalisation et d\u2019omniscience dans le roman.", "venue": "", "year": 2022, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2068442814", "name": "Ian"}, {"authorId": "2075643995", "name": "McEwan"}]}, {"paperId": "e4533aac58848de7b3ca6e0bd40ccc292861c1e5", "externalIds": {"CorpusId": 252821490}, "corpusId": 252821490, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4533aac58848de7b3ca6e0bd40ccc292861c1e5", "title": "Who or what is creative? Collaborating with machines to make visual art", "abstract": "This paper considers how creative agency can be positioned as part of visual art practice that involves humans and machines working together. Examples analysed include projects where complex \u201cintelligent\u201d software systems support text creation, or the combination and transformation of digital images, alongside one where a human artist works with a physically instantiated robotic arm to co-create drawings. The paper\u2019s argument uses ideas from actor-network theory (ANT) and more object-oriented perspectives to theorise agency not only as emerging from the association of humans and machines in networks, but also with the specific humans and machines involved in each creative project.", "venue": "", "year": 2022, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2364257", "name": "E. Sandry"}]}, {"paperId": "a7b46f12d94e5598827cbb7826245a392af64da3", "externalIds": {"DOI": "10.5937/medi55-37718", "CorpusId": 252649049}, "corpusId": 252649049, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7b46f12d94e5598827cbb7826245a392af64da3", "title": "Improvement of the psychiatric care through outsourcing artificial intelligence technologies: Where are we now?", "abstract": "Currently, the world is entering the fourth industrial revolution - marked by artificial intelligence (AI) powered technologies. The growing ubiquity of AI technologies is already present in many sectors of modern society, but caution still prevails in medicine where their application is far from routine, although it is on the constant rise. Psychiatry has been recognized as one of the disciplines where significant contribution of AI technologies is expected for prediction, diagnosis, treatment and monitoring of persons with psychiatric disorders. Nearly half of the world's population live in countries that have fewer than one psychiatrist per 100 000 inhabitants, which is far below the health needs as the prevalence of psychiatric disorders is within the range of 10-20%. Thus, the question arises - whether AI technologies can help to fill the gap in unmet needs in psychiatry? The main types of autonomous technologies currently applied in psychiatry are machine learning and its subsets deep learning and computer vision, alongside natural language processing and chatbots. The present review will focus on the brief history of the concept, the utility of AI technologies in psychiatry, clinicians' attitudes, ethical dilemmas, clinical and scientific challenges. This review emphasizes that the psychiatric community should not be ignorant but could try to leave the comfort zone and do more to raise the awareness of AI technologies development achievements.", "venue": "Medicinska istrazivanja", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://scindeks-clanci.ceon.rs/data/pdf/0301-0619/2022/0301-06192202019A.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Medicinska istrazivanja"}, "authors": [{"authorId": "1412770529", "name": "Sanja Andri\u0107-Petrovi\u0107"}, {"authorId": "4325857", "name": "N. Mari\u0107"}]}, {"paperId": "66ef0473f371372face6359f7e9de04e25b1f30a", "externalIds": {"DBLP": "conf/cilc/LongoS22", "CorpusId": 252599881}, "corpusId": 252599881, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/66ef0473f371372face6359f7e9de04e25b1f30a", "title": "A Framework to build Abductive-Deductive Chatbots, based on Natural Language Processing and First-Order Logic", "abstract": "This paper presents a framework based on natural language processing and first-order logic, which implicitly simulate the human brain features of selecting properly information related to a query from a knowledge base (abductive pre-stage), before to infer new knowledge from such a selection acting as deductive database. Such features are used with the aim of instantiating cognitive chatbots, able of human-like fashioned reasoning, supported by a module which automatically transforms polar and wh-questions into one or more likely assertions, in order to infer Boolean values or snippets with variable length as factoid answer from a conceptual knowledge base. The latter is splitted into two layers, representing both long- and short-term memory, and the transition of information between the two layers is achieved leveraging both a greedy algorithm and the engine\u2019s features of a NoSQL database, with promising timing performance than respect using one layer. Furthermore, such chatbots don\u2019t need any scripts updates or code refactory when new knowledge has to income, but just the knowledge itself in natural language.", "venue": "CILC", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "75-89"}, "authors": [{"authorId": "150060282", "name": "Carmelo Fabio Longo"}, {"authorId": "1735156", "name": "C. Santoro"}]}, {"paperId": "308bb98b5275f5555931e06fe4603da10ecdb8e6", "externalIds": {"CorpusId": 252460019}, "corpusId": 252460019, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/308bb98b5275f5555931e06fe4603da10ecdb8e6", "title": "Understanding living beings by analogy with computers or understanding computers as an emanation of the living", "abstract": "The analogy between living beings and computers was introduced with circum-spection by Schr\u00f6dinger and has been widely propagated since, rarely with a precise technical meaning. Critics of this perspective are numerous. We emphasize that this perspective is mobilized to justify what may be called a regressive reductionism by comparison with physics or the Cartesian method. Other views on the living are possible, and we focus on an epistemological and theoretical framework where historicity is central, and the regularities susceptible to mathematization are constraints whose existence is fundamentally precarious and historically contingent. We then propose to reinterpret the computer, no longer as a Turing machine but as constituted by constraints. This move allows us to understand that computation in the sense of Church-Turing is only a part of the theoretical determination of what actually happens in a computer when considering them in their larger theoretical context where historicity is also central. 1", "venue": "", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2436769", "name": "Ma\u00ebl Mont\u00e9vil"}]}, {"paperId": "1f66dbf202335f9c9874cdb446d3ac53e2f39cf7", "externalIds": {"CorpusId": 252332251}, "corpusId": 252332251, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1f66dbf202335f9c9874cdb446d3ac53e2f39cf7", "title": "CONSCIOUSNESS: IN YOUR OWN WORDS", "abstract": ": Surprisingly little is known about how the general public understands consciousness, yet information on common intuitions is crucial to discussions and theories of consciousness. We asked 202 members of the general public, \u201cIn your own words, what is consciousness?\u201d and analyzed the frequencies with which different perspectives on consciousness were represented. Almost all people (89%) described consciousness as fundamentally receptive \u2013 possessing, knowing, perceiving, being aware, or experiencing. In contrast, the perspective that consciousness is agentic (actively making decisions, driving output, or controlling behavior) appeared in only 33% of responses. Consciousness as a social phenomenon was represented by 24% of people. Consciousness as being awake or alert was mentioned by 19%. Consciousness as mystical, transcending the physical world, was mentioned by only 10%. Consciousness in relation to memory was mentioned by 6%. Consciousness as an inner voice or inner being \u2013 the homunculus view \u2013 was represented by 5%. Finally, only three people (1.5%) mentioned a specific, scholarly theory about consciousness, suggesting that we successfully sampled the opinions of the general public rather than capturing an academic construct. We found little difference between men and women, young and old, or US and non-US participants, except for one possible generation shift. Young, non-US participants were more likely to associate consciousness with moral decision-making. These findings show a snapshot of the public understanding of consciousness \u2013 a network of associated concepts, represented at varying strengths, such that some are more likely to emerge when people are asked an open-ended question about it.", "venue": "", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "7153229", "name": "M. Graziano"}, {"authorId": "1742110808", "name": "I. Christian"}]}, {"paperId": "c67b6bde0eb9a3bf7e71e9839489866c69b84261", "externalIds": {"CorpusId": 252285626}, "corpusId": 252285626, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c67b6bde0eb9a3bf7e71e9839489866c69b84261", "title": "Proceedings of the Annual Meeting of the Cognitive Science Society Comparing Machine and Human Learning in a Planning Task of Intermediate Complexity", "abstract": "Deep reinforcement learning agents such as AlphaZero have achieved superhuman strength in complex combinatorial games. By contrast, the cognitive science of planning has mostly focused on simple tasks for experimental and computational tractability. Using a board game that strikes a balance between complexity and tractability, we find that AlphaZero agents improve in value function quality and planning depth through learning, similar to human in previous modeling work. In addition, these metrics reflect causal contributions to Al- phaZero\u2019s playing strength. Yet the strongest contributor is the policy quality. The decrease in policy entropy also drives the increase in planning depth. The contribution of planning depth to performance is lessened in late training. These re- sults contribute to a joint understanding of machine and human planning, providing an interpretable way of understanding the learning and strength of AlphaZero, while generating novel hypothesis on human planning.", "venue": "", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "98230582", "name": "Permalink"}]}, {"paperId": "5a47c0b7c9f74af88b2128881f55ecb7cc0c28d6", "externalIds": {"CorpusId": 252306122}, "corpusId": 252306122, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a47c0b7c9f74af88b2128881f55ecb7cc0c28d6", "title": "Stanford Encyclopedia of Philosophy Arti\ufb01cial Intelligence", "abstract": "Artificial intelligence (AI) is the field devoted to building artificial animals (or at least artificial creatures that \u2013 in suitable contexts \u2013 appear to be animals) and, for many, artificial persons (or at least artificial creatures that \u2013 in suitable contexts \u2013 appear to be persons).[1] Such goals immediately ensure that AI is a discipline of considerable interest to many philosophers, and this has been confirmed (e.g.) by the energetic attempt, on the part of numerous philosophers, to show that these goals are in fact un/attainable. On the constructive side, many of the core formalisms and techniques used in AI come out of, and are indeed still much used and refined in, philosophy: first-order logic and its extensions; intensional logics suitable for the modeling of doxastic attitudes and deontic reasoning; inductive logic, probability theory, and probabilistic reasoning; practical reasoning and planning, and so on. In light of this, some philosophers conduct AI research and development as philosophy.", "venue": "", "year": 2022, "referenceCount": 199, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "f1b954585370428fe78e071f146e545a129d7528", "externalIds": {"CorpusId": 252000518}, "corpusId": 252000518, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f1b954585370428fe78e071f146e545a129d7528", "title": "Use of Artificial Intelligence and Machine Learning in Medicines with implementation of Bayesian techniques", "abstract": "The interest in artificial intelligence in the medical sciences has increased over the last two decades, but most studies of its applications in clinical studies have drawn criticism for having unreliable designs and poor replicability, necessitating a greater need for medical professionals to be knowledgeable about this quickly expanding field of research. The area of Bayesian artificial intelligence is briefly introduced in this article. We talk about causal inference, Bayesian networks, and their (potential) applications in clinical practice.", "venue": "", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2183704135", "name": "Anubhav Kumar"}, {"authorId": "2183646166", "name": "Virat Sharma"}, {"authorId": "2183641627", "name": "Praveen Verma"}, {"authorId": "2183644765", "name": "Dr. Abhay Bhatia"}, {"authorId": "2184180874", "name": "Dr. Manish Kumar"}]}, {"paperId": "dbe287b1923247f78883fc08e1bc8394df0de631", "externalIds": {"CorpusId": 251557030}, "corpusId": 251557030, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dbe287b1923247f78883fc08e1bc8394df0de631", "title": "Unveiling the Effect of using Moebius Transformations on Knowledge Graph Embeddings", "abstract": null, "venue": "", "year": 2022, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3193518", "name": "Andreas Behrend"}, {"authorId": "123110496", "name": "Can Aykul"}]}, {"paperId": "74024fcf3d5d445ec6587a2d39a2bdfff1a9378e", "externalIds": {"CorpusId": 251553985}, "corpusId": 251553985, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/74024fcf3d5d445ec6587a2d39a2bdfff1a9378e", "title": "EMBODIED ARTIFICIAL INTELLIGENCE IN SCIENCE FICTION PHILOSOPHICAL PRESUPPOSITIONS AND IMPLICATIONS", "abstract": "In this paper, I explore the fruitful relationship between science fiction and philosophy regarding the topic of artificial intelligence. I establish a connection between certain paradigms in the philosophy of mind and consciousness and the imagination of possible future scenarios in sci-fi, especially focusing on the different ways of conceiving the role of corporeality in constituting consciousness and cognition. Then, I establish a parallelism between these different conceptions of corporeality in the philosophy of mind and certain representations of AI in sci-fi: from computers to robots and androids. I conclude by stressing the value of exchanging ideas between sci-fi and philosophy to foreshadow and evaluate some scenarios of high ethical relevance. y", "venue": "", "year": 2022, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "5564873", "name": "A. Giannotta"}]}, {"paperId": "bb1a4db63f1ca4522e8ed0ff12c96ed1cfda5a9d", "externalIds": {"DOI": "10.24132/csrn.3201.10", "CorpusId": 251485247}, "corpusId": 251485247, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb1a4db63f1ca4522e8ed0ff12c96ed1cfda5a9d", "title": "Chatbot Explorer: Towards an understanding of knowledge bases of chatbot systems", "abstract": "A chatbot can automatically process a user\u2019s request, e.g. to provide a requested information. In doing so, the user starts a conversation with the chatbot and can specify the request by further inquiry. Due to the developments in the field of NLP in recent years, algorithmic text comprehension has been significantly improved. As a result, chatbots are increasingly used by companies and other institutions for various tasks such as order processes or service requests. Knowledge bases are often used to answer users queries, but these are usually curated manually in various text files, prone to errors. Visual methods can help the expert to identify common problems in the knowledge base and can provide an overview of the chatbot system. In this paper, we present Chatbot Explorer, a system to visually assist the expert to understand, explore, and manage a knowledge base of different chatbot systems. For this purpose, we provide a tree-based visualization of the knowledge base as an overview. For a detailed analysis, the expert can use appropriate visualizations to drill down the analysis to the level of individual elements of a specific story to identify problems within the knowledge base. We support the expert with automatic detection of possible problems, which can be visually highlighted. Additionally, the expert can also change the order of the queries to optimize the conversation lengths and it is possible to add new content. To develop our solution, we have conducted an iterative design process with domain experts and performed two user evaluations. The evaluations and the feedback from our domain experts have shown that our solution can significantly improve the maintainability of chatbot knowledge bases.", "venue": "CSRN", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://doi.org/10.24132/csrn.3201.10", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "CSRN"}, "authors": [{"authorId": "1388911960", "name": "Alrik Hausdorf"}, {"authorId": "2121286581", "name": "Lydia M\u00fcller"}, {"authorId": "1810101", "name": "G. Scheuermann"}, {"authorId": "2121285225", "name": "A. Niekler"}, {"authorId": "51136989", "name": "D. Wiegreffe"}]}, {"paperId": "697f5c2bcb3867e3310ab432a3cf5f50a6f74b09", "externalIds": {"DBLP": "conf/ijcai/CohnHMMXZ22", "CorpusId": 251350128}, "corpusId": 251350128, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/697f5c2bcb3867e3310ab432a3cf5f50a6f74b09", "title": "A Framework for Categorising AI Evaluation Instruments", "abstract": "The current and future capabilities of Artificial Intelligence (AI) are typically assessed with an ever increasing number of benchmarks, competitions, tests and evaluation standards, which are meant to work as AI evaluation instruments (EI). These EIs are not only increasing in number, but also in complexity and diversity, making it hard to understand this evaluation landscape in a meaningful way. In this paper we present an approach for categorising EIs using a set of 18 facets , accompanied by a rubric to allow anyone to apply the framework to any existing or new EI. We apply the rubric to 23 EIs in different domains through a team of raters, and analyse how consistent the rubric is and how well it works to distinguish between EIs and map the evaluation landscape in AI.", "venue": "EBeM@IJCAI", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": "1703235", "name": "A. Cohn"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}, {"authorId": "3469093", "name": "Julius Sechang Mboli"}, {"authorId": "2180557970", "name": "Yael Moros-Daval"}, {"authorId": "2164103794", "name": "Zhiliang Xiang"}, {"authorId": "25629377", "name": "Lexin Zhou"}]}, {"paperId": "9da79db5f2156231d408a374f54af9846a602b74", "externalIds": {"DOI": "10.1590/1678-460x202238248453", "CorpusId": 251339716}, "corpusId": 251339716, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9da79db5f2156231d408a374f54af9846a602b74", "title": "The Intersection between Linguistic Theories and Computational Linguistics over time", "abstract": "ABSTRACT Recent achievements have turned Computational linguistics into a dynamic research area, and an important field of application development that is being explored by leading technology companies. Despite the advances, there is still much room for improvement to allow humans to interact with computational devices, through natural language, in the same way that humans interact with native speakers of the same language. How to make computers understand or create new metaphors, metonymies or other figures of language? Is it possible to develop natural language systems capable of producing lyrics or poetry on the same level as humans? Can we produce systems capable of assigning new meanings to syntactic elements that are immediately perceived as coherent by humans? In this paper, we account for the evolution of computational linguistics, drawing a parallel with the evolution of linguistic theories and speculating about its research opportunities and foreseeable limitations.", "venue": "DELTA: Documenta\u00e7\u00e3o de Estudos em Ling\u00fc\u00edstica Te\u00f3rica e Aplicada", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.scielo.br/j/delta/a/QyV53SHM5Z6f5wZhd6Gw8Yy/?lang=en&format=pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "DELTA: Documenta\u00e7\u00e3o de Estudos em Ling\u00fc\u00edstica Te\u00f3rica e Aplicada"}, "authors": [{"authorId": "144757810", "name": "Alexandra Moreira"}, {"authorId": "2164722229", "name": "A. Oliveira"}, {"authorId": "52101414", "name": "M. Possi"}]}, {"paperId": "bcc86aab7241439174ebf2b726bdc3131f93a407", "externalIds": {"CorpusId": 251211841}, "corpusId": 251211841, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bcc86aab7241439174ebf2b726bdc3131f93a407", "title": "Levels of abstraction and the Turing test. (English)", "abstract": "Summary: An important lesson that philosophy can learn from the Turing test and computer science more generally concerns the careful use of the method of levels of abstraction (LoAs). The purpose of this paper is to summarize the method and apply it to the paper, modelling and analysis of phenomenological and conceptual systems showing its principal features and main advantages. The constituents of the method are \u201cobservables\u201d, collected together and moderated by predicates restrain-ing their \u201cbehaviour\u201d. The resulting collection of sets of observables is called a \u201cgradient of abstractions\u201d (GoAs) and it formalises the minimum consistency conditions that the chosen abstractions must satisfy. Two useful kinds of GoA \u2013 disjoint and nested \u2013 are identi\ufb01ed. It is then argued that in any discrete (as distinct from analogue) domain of discourse, a complex phenomenon may be explicated in terms of simple approximations organised together in a GoAs. Thus, the method replaces, for discrete disciplines, the dif-ferential and integral calculus, which form the basis for understanding the complex analogue phenomena of science and engineering. The result formalises an approach that is rather common in computer science but has hitherto found little application in philosophy. So the philosophical value of the method is demonstrated by showing how making the LoA of discourse explicit can be fruitful for phenomenological and conceptual analysis. To this end, the method is applied to the Turing test, the concept of agenthood, the de\ufb01nition of emergence, the notion of arti\ufb01cial life, quantum observation and decidable observation. This paper applies the method of abstraction to the paper, modelling and analysis of phenomenological and conceptual systems showing its principal features and main advantages. It is hoped that this treatment will promote the use of the method in certain areas of the humanities and especially in philosophy.", "venue": "", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "d0707c3d6f715f16f8d7fbafb73a2057fa031841", "externalIds": {"DBLP": "conf/ircdl/Lana22", "CorpusId": 251020054}, "corpusId": 251020054, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0707c3d6f715f16f8d7fbafb73a2057fa031841", "title": "Artificial Intelligence Systems Producing Books: Questions of Agency", "abstract": "The publication of the book Beta Writer. 2019. Lithium-Ion Batteries. A Machine-Generated Summary of Current Research. New York, NY: Springer, produced with Artificial Intelligence software prompts analysis and reflection in several areas. First of all, about what Artificial Intelligence systems are able to do in the production of informative texts. This raises the question of whether and how an Artificial Intelligence software system can be treated as the author of a text it has produced. Assessing whether this is correct and possible leads to a re-examination of the current conception whereby it is taken for granted that the author is a person. This, in turn, face to texts produced by AI systems necessarily raises the question of whether they, like the author-person, are endowed with agency. The article concludes that Artificial Intelligence systems are characterised by a distributed agency, shared with those who designed them and operate them, and that a new type of author must be defined and recognised.", "venue": "IRCDL", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": "48030608", "name": "M. Lana"}]}, {"paperId": "350b50817d75598a1014f916b731c91362310f2f", "externalIds": {"DBLP": "conf/colins/SavytskaSVBP22", "CorpusId": 250625291}, "corpusId": 250625291, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/350b50817d75598a1014f916b731c91362310f2f", "title": "Word2Vec Model Analysis for Semantic and Morphologic Similarities in Turkish Words", "abstract": "The study presents the calculation of the similarity between words in Turkish language by using word representation techniques. Word2Vec is a model used to represent words into vector form. The model is formed using articles from Wikipedia dump Turkish service as the corpus and then Cosine Similarity calculation method is used to determine the similarity value. The open-source Python programming language and Gensim library are used to obtain high quality word vectors with Word2Vec and calculate the cosine similarity of the vectors. Continuous Bag-of-words (CBOW) algorithm is used to train high quality word vectors. The cosine similarity values in the results are derived from the weight (dimension values) of the vector dimensions. The Window size 10 and 300 vector dimension configurations are taken. Increasing the number of cycles contributes to the vectors getting more accurate values. The corpus is trained in five cycles (EPOCH) with the same parameters. The Turkish corpus contains more than one hundred and sixty one million words. The dictionary of words (unique words), obtained from the corpus, is more than three hundred and sixty-seven thousand. Such a big data gives an opportunity to conduct high quality semantic and morphologic analysis and arithmetic operations of the word vectors.", "venue": "COLINS", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "161-176"}, "authors": [{"authorId": "2094582555", "name": "Larysa Savytska"}, {"authorId": "2106529443", "name": "M. T. S\u00fcbay"}, {"authorId": "12082005", "name": "N. Vnukova"}, {"authorId": "2106530048", "name": "Iryna Bezugla"}, {"authorId": "2100991382", "name": "Vasyl Pyvovarov"}]}, {"paperId": "ee8ecad5af614f94254ee81b0d9bc02e945db615", "externalIds": {"DBLP": "conf/delta2/FernandesM22", "DOI": "10.5220/0011300800003277", "CorpusId": 250572178}, "corpusId": 250572178, "publicationVenue": {"id": "ed849a6a-a2dc-4741-a23c-8a792c881a3d", "name": "Delta", "type": "conference", "alternate_names": ["DeLTA", "Symp Electron Des Test Appl", "DELTA", "International Conference on Deep Learning Theory and Applications", "Int Conf Deep Learn Theory Appl", "Symposium/Workshop on Electronic Design, Test and Applications"], "issn": "0011-801X", "url": "http://www.wikicfp.com/cfp/program?id=690", "alternate_urls": ["http://www.delta.scitevents.org"]}, "url": "https://www.semanticscholar.org/paper/ee8ecad5af614f94254ee81b0d9bc02e945db615", "title": "Open-domain Conversational Agent based on Pre-trained Transformers for Human-Robot Interaction", "abstract": ": Generative pre-trained transformers belong to the breakthroughs in Natural Language Processing (NLP), allowing Human-Robot Interactions ( e.g. the creation of an open-domain chatbot). However, a substantial amount of research and available data are in English, causing low-resourced languages to be overlooked. This work addresses this problem for European Portuguese with two options: (i) Translation of the sentences before and after using the model \ufb01ne-tuned on an English-based dataset, (ii) Translation of the English-based dataset to Portuguese and then \ufb01ne-tune this model on it. We rely on the DialoGPT (dialogue generative pre-trained transformer), a tunable neural conversational answer generation model that learns the basic skills to conduct a dialogue. We use two sources of evaluation: (i) Metrics for text generation based on uncertainty ( i.e. perplexity), and similarity between sentences ( i.e. BLEU, METEOR and ROUGE) and (ii) Human-based evaluation of the sentences. The translation of sentences before and after of the modi\ufb01ed DialoGPT model, using the Daily Dialogue dataset led to the best results.", "venue": "Delta", "year": 2022, "referenceCount": 82, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "168-175"}, "authors": [{"authorId": "113037885", "name": "M. Fernandes"}, {"authorId": "1746258", "name": "Plinio Moreno"}]}, {"paperId": "41e97ea14b1d3f76269772a1be0e5dc9ccd812f0", "externalIds": {"CorpusId": 250274066}, "corpusId": 250274066, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/41e97ea14b1d3f76269772a1be0e5dc9ccd812f0", "title": "The Morality of Artificial Friends in Ishiguro\u2019s Klara and the Sun", "abstract": "Can artificial entities be worthy of moral considerations? Can they be artificial moral agents (AMAs), capable of telling the difference between good and evil? In this essay, I explore both questions\u2014i.e., whether and to what extent artificial entities can have a moral status (\u201cthe machine question\u201d) and moral agency (\u201cthe AMA question\u201d)\u2014in light of Kazuo Ishiguro\u2019s 2021 novel Klara and the Sun . I do so by juxtaposing two prominent approaches to machine morality that are central to the novel: the (1) view \u201cfrom within,\u201d including the standard (or \u201cmetaphysical\u201d) perspective on moral agency, and the (2) view \u201cfrom outside,\u201d which includes behaviorism, functionalism and the social-relational perspective. Importantly, while the story illustrates both views, it exposes the epistemological vulnerability of the first in relation to the practical and social reality imposed by the second. That is, regardless of what metaphysical properties the Artificial Friend Klara can be said to have (from within), her moral status as well as agency ultimately depend on the views of others (from outside), including the others\u2019 own epistemic beliefs about the nature of consciousness and personhood.", "venue": "", "year": 2022, "referenceCount": 51, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2127326294", "name": "Jakob Stenseke"}]}, {"paperId": "36150e80f549397a57b4b1e8f2a99676ce809b28", "externalIds": {"DOI": "10.2139/ssrn.4147243", "CorpusId": 250135857}, "corpusId": 250135857, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/36150e80f549397a57b4b1e8f2a99676ce809b28", "title": "Preparing for the (Non-Existent?) Future of Work", "abstract": "This paper considers the labor market and distributional implications of a scenario of ever-more-intelligent autonomous machines that substitute for human labor and drive down wages. We lay out three concerns arising from such a scenario and evaluate recent predictions and objections to these concerns. Then we analyze how a utilitarian social planner would allocate work and income if these concerns start to materialize. As the income produced by autonomous machines rises and the value of labor declines, a utilitarian planner finds it optimal to phase out work, beginning with workers who have low labor productivity and job satisfaction, since they have comparative advantage in enjoying leisure. This is in stark contrast to welfare systems that force individuals with low labor productivity to work. If there are significant wage declines, avoiding mass misery will require other ways of distributing income than labor markets, whether via sufficiently well-distributed capital ownership or via benefits. Recipients could still engage in work for its own sake if they enjoy work amenities such as structure, purpose and meaning. If work gives rise to positive externalities such as social connections or political stability, or if individuals undervalue the benefits of work because of internalities, then a social planner would incentivize work. However, in the long run, the planner might be able to achieve a higher level of social welfare by adopting alternative ways of providing these benefits.", "venue": "SSRN Electronic Journal", "year": 2022, "referenceCount": 53, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "4645245", "name": "Anton Korinek"}, {"authorId": "1659374560", "name": "Megan E. Juelfs"}]}, {"paperId": "dec7347dfbcc9b5210a07e2e8e1d5b8595a67175", "externalIds": {"CorpusId": 249668778}, "corpusId": 249668778, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dec7347dfbcc9b5210a07e2e8e1d5b8595a67175", "title": "Conceptualising Management of Artificial Intelligence in Terms of People, Process, Data and Technology", "abstract": "Artificial Intelligence (AI) is an area of organisational activity that attempts to build human intelligence and intelligent behaviours into information and computer systems. As a domain of study AI is characterised by, diverse opinions as to its nature, and an industry approach with limited research reporting the outcome of proposed frameworks in areas such as urban innovation, good society, and management in public industry. In this paper, we examine the use of people, process, data, and technology (2PDT) as a possible means for bringing structure to the study of the AI domain. We demonstrate its effective use in the formulation of research questions, research design, data collection, and analysis. We argue that AI is a domain of interest to the information systems discipline and that formulation of 2PDT seems to offer a useful conceptual framework examining this phenomenon.", "venue": "", "year": 2022, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2170257012", "name": "Sahber Monshizada"}]}, {"paperId": "ea40818e5f51b00f9a9ef533c73526645356e0c7", "externalIds": {"DOI": "10.5840/techne2022523158", "CorpusId": 249478520}, "corpusId": 249478520, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea40818e5f51b00f9a9ef533c73526645356e0c7", "title": "What Does It Mean for a Robot to Be Respectful? in advance", "abstract": "", "venue": "Techn\u00e9: Research in Philosophy and Technology", "year": 2022, "referenceCount": 74, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ris.utwente.nl/ws/files/282093391/techne_Babushkina.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Techn\u00e9: Research in Philosophy and Technology"}, "authors": [{"authorId": "115178513", "name": "Dina Babushkina"}]}, {"paperId": "e0d6f51de37f9520d6097bf71b993c7b03307226", "externalIds": {"CorpusId": 249493914}, "corpusId": 249493914, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e0d6f51de37f9520d6097bf71b993c7b03307226", "title": "Historical continuum and norms in art collections and datasets \u2013 Experiments with Artificial Intelligence at Paulista Museum", "abstract": "This article presents a set of experiments in the field of History of Art with Artificial Intelligence technologies (computer vision), carried out within the scope of demonumenta, a university outreach and research program that seeks to critically and creatively tension public memory policies. From the understanding that datasets and artistic collections are analogous practices, we questioned how to work in this intersection to subvert the normative assumptions that characterize the arrangement of art collections, databases and the discourses that their tools enunciate. We believe part of this answer lies in the critical activation of public holdings to reshape the way we train machines today. For that, we created a dataset, based on art pieces of the S\u00e3o Paulo Museum of the University of S\u00e3o Paulo (USP) available in its GLAM (Galleries, Libraries, Archives & Museums) in the Wiki projects. The systematization of this dataset was the foundation for carrying out five analytical experiments with Artificial Intelligence algorithms, namely: Numerical Natures, Possible Landscapes, Archeology of Colors, Affirmative Album and Animated Ignorance. Those experiments evidence the colonialist continuum that elaborates the historical narrative based on normative visual patterns and parameters. cr\u00edtica e criativamente pol\u00edticas p\u00fablicas de mem\u00f3ria. A partir do entendimento de que datasets (conjuntos de dados organizados) e acervos art\u00edsticos s\u00e3o pr\u00e1ticas an\u00e1logas, questionamos como trabalhar nesta intersec\u00e7\u00e3o para subverter os pressupostos normativos que caracterizam a organiza\u00e7\u00e3o de cole\u00e7\u00f5es de arte, bancos de dados e os discursos que suas ferramentas enunciam. Acreditamos que parte desta resposta est\u00e1 na ativa\u00e7\u00e3o cr\u00edtica de acervos p\u00fablicos para reformular o modo como hoje treinamos as m\u00e1quinas. Para tanto, elaboramos um dataset, com base nas obras do Museu Paulista da Universidade de (USP) dispon\u00edveis no seu GLAM (Galleries, nos projetos Wiki. A sistematiza\u00e7\u00e3o desse dataset foi a base para a realiza\u00e7\u00e3o de cinco experimentos anal\u00edticos com algoritmos de Intelig\u00eancia Artificial. S\u00e3o eles: Naturezas Num\u00e9ricas, Paisagens Poss\u00edveis, Arqueologia das Cores, \u00c1lbum Afirmativo e Ignor\u00e2ncia Animada. Tais experimentos evidenciam o continuum colonialista que elabora a narrativa hist\u00f3rica a partir de par\u00e2metros e padr\u00f5es visuais normatizantes.", "venue": "", "year": 2022, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2078886089", "name": "A. Jurno"}, {"authorId": "1513730735", "name": "G. Beiguelman"}]}, {"paperId": "2a632c9e24324d2a7b94df1a94065f61879aa281", "externalIds": {"CorpusId": 249426085}, "corpusId": 249426085, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a632c9e24324d2a7b94df1a94065f61879aa281", "title": "Can Artificial Intelligence be a Critical Success Factor of Construction Projects ? : Project practitioners \u2019 perspectives", "abstract": "Artificial Intelligence (AI) can be defined as constructing computer programs that (i) are capable of exhibiting intelligence, (ii) exhibit intelligence by using processes used by humans for the same tasks, and (iii) are capable of complementing or supplementing human intelligence (Simon, 1995). As Epstein said (2015), \u201cAlthough the original vision for artificial intelligence was the simulation of (implicitly human) intelligence, research has gradually shifted to autonomous systems that compete with people\u201d. Artificial neural networks, machine learning, genetic algorithms, fuzzy logic, and statistical analysis form the basis of most applications under the label of \u201cAI\u201d.", "venue": "", "year": 2022, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2161847494", "name": "Virender Kumar"}, {"authorId": "88813966", "name": "Amrendra Pandey"}, {"authorId": "2115290267", "name": "Rahul Singh"}]}, {"paperId": "f80cc568652b55250beebc6ba677b11287f96bf8", "externalIds": {"CorpusId": 249825349}, "corpusId": 249825349, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f80cc568652b55250beebc6ba677b11287f96bf8", "title": "A RTIFICIAL I NTELLIGENCE : F RAMEWORK OF D RIVING T RIGGERS TO P AST , P RESENT AND F UTURE A PPLICATIONS AND I NFLUENCERS OF I NDUSTRY S ECTOR A DOPTION", "abstract": "To gain a sense of the development of Artificial Intelligence (AI), this research analyzes what has been done in the past, presently in the last decade and what is predicted for the next several decades. The paper will highlight the biggest changes in AI and give examples of how these technologies are applied in several key industry sectors along with influencers that can affect adoption speed. Lastly, the research examines the driving triggers such as cost, speed, accuracy, diversity/inclusion and interdisciplinary research/collaboration that propel AI into an essential transformative technology.", "venue": "", "year": 2022, "referenceCount": 105, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "2160808545", "name": "Susan Kaplan"}]}, {"paperId": "ab7f19ddf0558389b776232c911b7e775a58ac42", "externalIds": {"CorpusId": 249335900}, "corpusId": 249335900, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ab7f19ddf0558389b776232c911b7e775a58ac42", "title": "SMU Data Science Review SMU Web Page Multiclass Classification Web Page Multiclass Classification", "abstract": ". As the internet age evolves, the volume of content hosted on the Web is rapidly expanding. With this ever-expanding content, the capability to accurately categorize web pages is a current challenge to serve many use cases. This paper proposes a variation in the approach to text preprocessing pipeline whereby noun phrase extraction is performed first followed by lemmatization, contraction expansion, removing special characters, removing extra white space, lower casing, and removal of stop words. The first step of noun phrase extraction is aimed at reducing the set of terms to those that best describe what the web pages are about to improve the categorization capabilities of the model. Separately, a text preprocessing using keyword extraction is evaluated. In addition to the text preprocessing techniques mentioned, feature reduction techniques are applied to optimize model performance. Several modeling techniques are examined using these two approaches and are compared to a baseline model. The baseline model is a Support Vector Machine with linear kernel and is based on text preprocessing and feature reduction techniques that do not include noun phrase extraction or keyword extraction and uses stemming rather than lemmatization. The recommended SVM One-Versus-One model based on noun phrase extraction and lemmatization during text preprocessing shows an accuracy improvement over the baseline model of nearly 1% and a 5-fold reduction in misclassification of web pages as undesirable categories.", "venue": "", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2167829762", "name": "Brian Gaither"}, {"authorId": "2167829496", "name": "Antonio Debouse"}, {"authorId": "2110526769", "name": "Catherine Huang"}]}, {"paperId": "2a1be718a6c8802c97250321b5299446ffdf26cc", "externalIds": {"DBLP": "conf/caise/Fukas22", "CorpusId": 249282929}, "corpusId": 249282929, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a1be718a6c8802c97250321b5299446ffdf26cc", "title": "The Management of Artificial Intelligence: Developing a Framework Based on the Artificial Intelligence Maturity Principle", "abstract": "The use of Artificial Intelligence (AI) must be systematically managed and coordinated to optimally support corporate goals and enable AI to create added value for organizations. This poses new challenges for traditional Information Technology (IT) management. Although initial approaches to managing AI as an extension of traditional IT management exist, the management of AI is still in its infancy. Therefore, the goal of our research is the development of an integrated management framework that combines insights from AI maturity model research with an overarching AI management perspective. In a multi-method and design science-oriented research process, an AI maturity model, an AI management metamodel, and a web-based AI maturity assessment and management tool combining both previous models are developed and evaluated. In addition, several smaller studies are conducted to demonstrate how AI-based information systems can be managed corresponding to the different dimensions of the integrated AI management framework.", "venue": "CAiSE", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": null, "journal": {"pages": "19-27"}, "authors": [{"authorId": "2111965685", "name": "Philipp Fukas"}]}, {"paperId": "0d2dbf6abf2b499379d4364da781591a02ee7211", "externalIds": {"CorpusId": 249192732}, "corpusId": 249192732, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0d2dbf6abf2b499379d4364da781591a02ee7211", "title": "INDUSTRY ADOPTION INFLUENCERS", "abstract": "The authors present a new Framework of Artificial Intelligence which analyzes the key elements of transformational AI in industry. The State of the Art of Artificial Intelligence is gleaned from an examination of what has been done in the past, presently in the last decade and what is predicted for future decades. The paper will highlight the biggest changes in AI, important influencers to adoption/diffusion and give examples of how these technologies have and will be applied in three key industrial sectors, including agriculture, education and healthcare. Next the research examines seven driving triggers of cost, speed, accuracy, diversity/inclusion, interdisciplinary research/collaboration and ethics/trustworthiness that are accelerating AI development and concludes with a discussion of what are the critical success factors for industry to be transformational in AI.", "venue": "", "year": 2022, "referenceCount": 137, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "46902711", "name": "Susan B. Kaplan"}]}, {"paperId": "3e0ea3d704fc48d262eefa317eeec2d478138fb4", "externalIds": {"CorpusId": 249091327}, "corpusId": 249091327, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e0ea3d704fc48d262eefa317eeec2d478138fb4", "title": "Open Research Online Can a machine design?", "abstract": ": One strand of my research has been concerned with the computer as a design tool; but a second strand has been concerned with design computing as a research tool for improving our understanding of the design process. Some of this latter research is based on the simulation of computer behavior by human beings - a reversal of the more usual approach - and some is based on comparisons of computational models with human design behavior. Despite recent doubts expressed by some authors, I suggest that the question, \u2018Can a machine design?\u2019 is still a useful question to ask.", "venue": "", "year": 2022, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "8bf8506a2c5ce804336076f8d8d238c2caaeaf32", "externalIds": {"DBLP": "conf/aistats/TomaszewskaZM22", "CorpusId": 248923808}, "corpusId": 248923808, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8bf8506a2c5ce804336076f8d8d238c2caaeaf32", "title": "Duel-based Deep Learning system for solving IQ tests", "abstract": "One of the relevant aspects of Arti\ufb01cial General Intelligence is the ability of machines to demonstrate abstract reasoning skills, for instance, through solving (human) IQ tests. This work presents a new approach to machine IQ tests solving formulated as Raven\u2019s Progressive Matrices (RPMs), called Duel-IQ. The proposed solution incorporates the concept of a tournament in which the best answer is chosen based on a set of duels between candidate RPM answers. The three relevant aspects are: (1) low computational and design complexity, (2) proposition of two schemes of pairing up candidate answers for the duels and (3) evaluation of the system on a dataset of shapes other than those used for training. Depending on a particular variant, the system reaches up to 82.8% accuracy on average in RPM tasks with 5 candidate answers and is on par with human performance and superior to other literature approaches of compa-rable complexity when training and test sets are from the same distribution.", "venue": "AISTATS", "year": 2022, "referenceCount": 24, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "10483-10492"}, "authors": [{"authorId": "2165804235", "name": "Paulina Tomaszewska"}, {"authorId": "3465508", "name": "A. Zychowski"}, {"authorId": "1681735", "name": "J. Ma\u0144dziuk"}]}, {"paperId": "e26658c14f5088aa07248d25df7768007c33a039", "externalIds": {"DBLP": "conf/avi/AlizadehMS22", "CorpusId": 248941690}, "corpusId": 248941690, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e26658c14f5088aa07248d25df7768007c33a039", "title": "The reverse Turing test: being human (is) enough in the age of AI", "abstract": "Disposing of bad actors on social media is a daunting task, particularly in the face of \u201cengineered social tampering\u201d [4]. That is what Ferrara et al. [6] have labeled the rise of social bots, and large platform owners are struggling to mitigate the harmful effects caused by such malicious software. Therefore, it is no surprise that platform owners like META are fastening their security controls and that the popular press has tracked the efficacy of these measures. Specifically, META has been implementing what Forbes\u2019 Lance Eliot named the \u2018Upside Down Turing Test.\u2019 [26]. Unlike the original Turing test, which tasked a human participant with distinguishing a human from a digital speech correspondent, this version is designed to use a software program to distinguish non-human activity on the platform. In this work, we discuss the complications introduced by this reversal taking the human user\u2019s perspective. On the one hand, we recognize the necessity for fraud detection and defense against web-automated attacks. On the other hand, we find it necessary to uplift the voices of users who are wrongfully made victims as a result, in minor or major ways. At the same time, we offer alternatives to these invisible Reverse Turing Tests (RTTs) that expand the scope for distinguishing between human and non-human actors, while keeping humanity at the forefront of this inquiry.", "venue": "CoPDA@AVI", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "49-54"}, "authors": [{"authorId": "2070900671", "name": "F. Alizadeh"}, {"authorId": "2004535547", "name": "Aikaterini Mniestri"}, {"authorId": "145183095", "name": "G. Stevens"}]}, {"paperId": "165d1a9754c947965ad48df36aa8786cc8a62a58", "externalIds": {"DBLP": "conf/acl/LiKL022", "ACL": "2022.findings-acl.219", "DOI": "10.18653/v1/2022.findings-acl.219", "CorpusId": 248780383}, "corpusId": 248780383, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/165d1a9754c947965ad48df36aa8786cc8a62a58", "title": "Mitigating Contradictions in Dialogue Based on Contrastive Learning", "abstract": "Chatbot models have achieved remarkable progress in recent years but tend to yield contradictory responses. In this paper, we exploit the advantage of contrastive learning technique to mitigate this issue. To endow the model with the ability of discriminating contradictory patterns, we minimize the similarity between the target response and contradiction related negative example. The negative example is generated with learnable latent noise, which receives contradiction related feedback from the pretrained critic. Experimental results show that our method helps to avoid contradictions in response generation while preserving response fluency, outperforming existing methods on both automatic and human evaluation.", "venue": "FINDINGS", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://aclanthology.org/2022.findings-acl.219.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "2781-2788"}, "authors": [{"authorId": "2108618065", "name": "Weizhao Li"}, {"authorId": "1384501695", "name": "Junsheng Kong"}, {"authorId": "2165226829", "name": "Ben Liao"}, {"authorId": "2149184259", "name": "Yi Cai"}]}, {"paperId": "48ee13a2a52dec1f14d12fe1f17f7fa358f94490", "externalIds": {"DOI": "10.1016/j.gastha.2022.02.025", "CorpusId": 248738846}, "corpusId": 248738846, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48ee13a2a52dec1f14d12fe1f17f7fa358f94490", "title": "Artificial Intelligence and the Future of Gastroenterology and Hepatology", "abstract": null, "venue": "Gastro Hep Advances", "year": 2022, "referenceCount": 126, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.ghadvances.org/article/S2772572322000437/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Gastro Hep Advances"}, "authors": [{"authorId": "8677460", "name": "Daniel D. Penrice"}, {"authorId": "1490505386", "name": "P. Rattan"}, {"authorId": "14603481", "name": "D. Simonetto"}]}, {"paperId": "a1d46e594cb8edcc71881856317e0d2bce41f9fd", "externalIds": {"CorpusId": 248690963}, "corpusId": 248690963, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1d46e594cb8edcc71881856317e0d2bce41f9fd", "title": "The Mapping of Deep Language Models on Brain Responses Primarily Depends on their Performance", "abstract": "Recent deep networks like transformers not only excel in several language tasks, but their activations 1 linearly map onto the human brain during language processing. Is this functional similarity caused by 2 speci\ufb01c factors, such as the language abilities and the architecture of the algorithms? To address this 3 issue, we analyze the brain responses to isolated sentences in a large cohort of 102 subjects, each 4 recorded with both functional magnetic resonance imaging (fMRI) and magnetoencephalography 5 (MEG). We then compare the ability of 32,400 transformer embeddings to linearly map onto these 6 brain responses. Finally, we evaluate how the architecture, training, and performance of the models 7 independently account for this brain mapping. Our analyses reveal two main \ufb01ndings. First, the 8 similarity between brain responses and the activations of language models primarily depends on their 9 ability to predict words from the context. Second, this similarity allows us to decompose and precisely 10 track the rise and maintenance of perceptual, lexical, and compositional representations within each 11 cortical region. Overall, this study evidences a partial convergence of language transformers to brain- 12 like solutions, and shows how this phenomenon helps unravel the brain bases of natural language 13 processing.", "venue": "", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "83928755", "name": "C. Caucheteux"}]}, {"paperId": "1fe02bbbe43fa4af145bfce1c1e3de1ae366dfa4", "externalIds": {"DBLP": "conf/csedu/SondereggerS22", "DOI": "10.5220/0010999200003182", "CorpusId": 248628307}, "corpusId": 248628307, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1fe02bbbe43fa4af145bfce1c1e3de1ae366dfa4", "title": "Chatbot-mediated Learning: Conceptual Framework for the Design of Chatbot Use Cases in Education", "abstract": ": While chatbots or conversational agents are already common in many business areas, e.g. for customer support, their use in the education sector is still in its infancy. Chatbots might take over the role of a teacher, tutor, conversational partner, learning analyst, team member, support assistant, or recommender system. Within these different roles, chatbots can enhance learning and inherently address many requirements and success factors for learning. The scalability and adaptiveness of conversational AI allow an individualised learning support for all learners combined with collaboration opportunities and thus more equality in education. In this context, the paper at hand discusses this pedagogical potential of chatbots in different roles and social settings resulting in a conceptual framework for the understanding and design of chatbot use cases in education. Based on success factors for learning derived from established learning theories and reports, core attributes and goals of chatbot learning are deducted within three pedagogical domains of individual, social and analytic chatbot learning. By combining this pedagogical dimension with a technological and content dimension, the presented conceptual framework provides an overview of possibilities of how chatbots in education can be used and designed.", "venue": "CSEDU", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"pages": "207-215"}, "authors": [{"authorId": "2056193477", "name": "Stefan Sonderegger"}, {"authorId": "134177694", "name": "S. Seufert"}]}, {"paperId": "8c0ac9096850097c742e9a65524a04293c3d337f", "externalIds": {"CorpusId": 248386928}, "corpusId": 248386928, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8c0ac9096850097c742e9a65524a04293c3d337f", "title": "Information temperature as a measure of DNA\u2019s and texts complexity", "abstract": "C. Shannon introduced the notion of entropy for random sequences. What about their temperature? After discussing some methods for introducing information temperature (IT) for binary random stationary ergodic sequence, we suggest using IT as a characteristic of complexity and intelligence of an agent capable of writing or generating meaningful texts. In particular, we discuss the question of whether the temperature can characterize the academic level of the text, or serve as an indicator of the quality of brain activity of the text author.", "venue": "", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "69984277", "name": "A. Usikov"}]}, {"paperId": "d877c9acfe5754e5e577355fa417264d53e04502", "externalIds": {"DOI": "10.17721/1728-2195/2022/1.120-7", "CorpusId": 248314209}, "corpusId": 248314209, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d877c9acfe5754e5e577355fa417264d53e04502", "title": "TOWARDS THE ISSUE ON IMPROVING THE PROTECTION OF INFORMATION RIGHTS OF INDIVIDUALS IN RELATIONS CONNECTED WITH THE USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES", "abstract": "The article examines the peculiarities of the application of methods provided by the legislation of Ukraine to protect the information rights of individuals from violations related to the use of artificial intelligence technologies; the ways to improve these methods taking into account the requirements of European Union law are developed. The author identifies the legal properties of artificial intelligence technologies, clarifies their impact on the choice of ways to protect the relevant nature of the violated information rights. The purpose of the article is to study the main areas of improvement of methods aimed at protecting information rights of individuals in the relations connected with the use of artificial intelligence technologies. The object of the study is public relations, which arise in connection with the use of methods to protect the information rights of individuals, violated by the misuse of artificial intelligence technologies in various spheres of public life. For this research, general scientific methods of cognition have been used, namely dialectical, system-structural, normal-logical, as well as such special methods as historical, comparative-legal, sociological, etc. Based on the results of the study, the author proposes a system of special ways to protect the information rights of individuals from violations related to the use of artificial intelligence technologies. The author also analyzes the grounds for their use. In addition, the article proposes the ways to improve the application of general methods of protection of human rights, enshrined in Article 5 of the Code of Administrative Procedure and Article 16 of the Civil Code of Ukraine, taking into account the illegal consequences of artificial intelligence technologies application. The recommendations on how to improve the legislation of Ukraine, the norms of which determine the mechanism for the protection of information human rights are formulated in the conclusions. In addition, the author has developed some recommendations for the restoration of information rights of individuals who suffer from violations of the use of artificial intelligence technologies. Keywords: protection of information rights, information offense, information rights, artificial intelligence technologies, individual", "venue": "Bulletin of Taras Shevchenko National University of Kyiv. Legal Studies", "year": 2022, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://visnyk.law.knu.ua/images/articles/7-120.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Bulletin of Taras Shevchenko National University of Kyiv. Legal Studies"}, "authors": [{"authorId": "1506520723", "name": "O. Zaiarnyi"}]}, {"paperId": "deedf17852328b0dbe73c1f80cec8c8cb3ec5caf", "externalIds": {"CorpusId": 248067907}, "corpusId": 248067907, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/deedf17852328b0dbe73c1f80cec8c8cb3ec5caf", "title": "Buddhism and Intelligent Technology: Toward a More Humane Future", "abstract": null, "venue": "", "year": 2022, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2673288", "name": "Soraj Hongladarom"}]}, {"paperId": "7c6379e6650c382c4d66a4cfb5209b470572fbdb", "externalIds": {"CorpusId": 247951496}, "corpusId": 247951496, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c6379e6650c382c4d66a4cfb5209b470572fbdb", "title": "APPLICATION OF ARTIFICIAL INTELLIGENCE IN THE PAYMENT SYSTEM", "abstract": "Globally few billions of people visit malls and shopping centers every month. This reflects not just the integral place that malls hold in retail landscape, but also massive potential of data driven insights waiting to be harnessed. Consumers want to purchase in the shopping malls where they can get all the items under one roof. The major time consuming part is waiting for the bill generation and making payment around 30 minutes. In the modern world, waiting in a line identified as biggest emerging issues. This paper is focusing the impact of artificial intelligence and its use in minimizing the queue system for their payment system. Malls can use big data, machine learning and artificial intelligence to derive meaningful insights to minimize operational cost, build better customer engagement, explore new avenues for revenue, enable tenants to boost productivity and more.", "venue": "", "year": 2022, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2129611073", "name": "D. Divya"}, {"authorId": "2161393537", "name": "Mrs Harshitha Mallik"}]}, {"paperId": "a865394c760be35e6f6c9e20f616a06f0b9c4e6d", "externalIds": {"DOI": "10.1017/s1477175621000506", "CorpusId": 247475621}, "corpusId": 247475621, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a865394c760be35e6f6c9e20f616a06f0b9c4e6d", "title": "LOVE BYTES: THE FUTURE OF BIO\u2013R2 RELATIONSHIPS", "abstract": "What would a romantic relationship between a biological human and an artificial intelligence system look like? The question is explored through a fictional correspondence between Alan Turing and Ada Lovelace.", "venue": "Think", "year": 2022, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "21", "pages": "93 - 99", "name": "Think"}, "authors": [{"authorId": "103957127", "name": "J. J. Joaquin"}, {"authorId": "113768318", "name": "Hazel T. Biana"}]}, {"paperId": "039798a69b7f0d877341a5c1dcfe2cd811706d6d", "externalIds": {"DBLP": "journals/tismir/Rohrmeier22", "DOI": "10.5334/tismir.104", "CorpusId": 247375389}, "corpusId": 247375389, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/039798a69b7f0d877341a5c1dcfe2cd811706d6d", "title": "On Creativity, Music's AI Completeness, and Four Challenges for Artificial Musical Creativity", "abstract": null, "venue": "Trans. Int. Soc. Music. Inf. Retr.", "year": 2022, "referenceCount": 86, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://transactions.ismir.net/articles/10.5334/tismir.104/galley/124/download/", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "5", "pages": "50-66", "name": "Trans. Int. Soc. Music. Inf. Retr."}, "authors": [{"authorId": "1971449", "name": "M. Rohrmeier"}]}, {"paperId": "a7c4d97ede448557fe6bcdb16fce22442307f756", "externalIds": {"CorpusId": 247161041}, "corpusId": 247161041, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7c4d97ede448557fe6bcdb16fce22442307f756", "title": "Design principles and architecture of a second language learning chatbot", "abstract": "The purpose of this article is to set out the design principles and architecture of a second language (L2) learning voice chatbot. Building on L2 acquisition theories and chatbot research, in this article, we report on a South Korean government-funded longitudinal project in which we designed and developed a chatbot called \u201cEllie\u201d. Chatbot Ellie has three chat modes, \u201cGeneral Chat,\u201d \u201cTask Chat,\u201d and \u201cSkills\u201d. In the General Chat mode, L2 users can have short talks about personal information, whereas in the Task Chat mode, they can engage in a wide range of problem-solving L2 tasks to achieve task goals by exchanging meanings with Ellie. The Skills mode offers form-focused language practice. Ellie was piloted among 137 Korean high school students, who used Ellie individually or in a group, for seven weeks in their English classes. The quality of the chatbot was investigated in terms of the appropriateness of language level, continuity of conversation, and success in task performance. Based on the results of the pilot, Ellie appears to have considerable potential to become an effective language learning companion for L2 learners, and has implications for the design and developments of future L2 chatbots.", "venue": "", "year": 2022, "referenceCount": 48, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2149548198", "name": "Dongkwang Shin"}, {"authorId": "2108620183", "name": "J. Lee"}]}, {"paperId": "90c33370e29ac97cccf04380a83ac88189d3c24e", "externalIds": {"CorpusId": 247087613}, "corpusId": 247087613, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/90c33370e29ac97cccf04380a83ac88189d3c24e", "title": "Nature Inspired Computing Machine", "abstract": "Abstract", "venue": "", "year": 2022, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2089318432", "name": "R. Vijayaraghavan"}, {"authorId": "2156138175", "name": "Samanvita Nagaraju"}]}, {"paperId": "1301dcaaafd4118f53e4eefc22571bd1642fbc62", "externalIds": {"DOI": "10.1007/978-3-030-93921-2_22", "CorpusId": 246962285}, "corpusId": 246962285, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1301dcaaafd4118f53e4eefc22571bd1642fbc62", "title": "Robots in the Neighborhood: Application and Criminalization of the Artificial Intelligence in Education", "abstract": null, "venue": "Technologies, Artificial Intelligence and the Future of Learning Post-COVID-19", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Technologies, Artificial Intelligence and the Future of Learning Post-COVID-19"}, "authors": [{"authorId": "97563744", "name": "Farhana Helal Mehtab"}, {"authorId": "46551543", "name": "A. Mahmud"}]}, {"paperId": "7ebe8860bc7d22cd2a5ca6166cb045f539e91e76", "externalIds": {"DBLP": "journals/access/MunSSY22", "DOI": "10.1109/ACCESS.2022.3152526", "CorpusId": 246955149}, "corpusId": 246955149, "publicationVenue": {"id": "2633f5b2-c15c-49fe-80f5-07523e770c26", "name": "IEEE Access", "type": "journal", "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, "url": "https://www.semanticscholar.org/paper/7ebe8860bc7d22cd2a5ca6166cb045f539e91e76", "title": "Black-Box Audio Adversarial Attack Using Particle Swarm Optimization", "abstract": "The development of artificial neural networks and artificial intelligence has helped to address problems and improve services in various fields, such as autonomous driving, image classification, medical diagnosis, and speech recognition. However, this technology has raised security threats that are different from existing ones. Recent studies have shown that artificial neural networks can easily malfunction by adversarial examples. The adversarial examples operate the neural network model as intended by the adversary. In particular, adversarial examples targeting speech recognition models is an area that has been actively studied in recent years. Existing studies have focused more on white-box methods. However, most speech recognition services are provided online and involve black-box, making it difficult or impossible for adversaries to attack. Black-box attacks have several challenges. Typically, they have a low success rate and a high risk of detection. In particular, previously proposed genetic algorithm (GA)-based attacks are at a high risk of detection because they require numerous queries. Therefore, we propose an adversarial attack system using particle swarm optimization (PSO) algorithms to address these problems. The proposed system uses adversarial candidates as particles to obtain adversarial examples through iterative optimization. PSO-based adversarial attacks are more efficient in queries and have a higher attack success rate than the adversarial methods using GAs. In particular, our key function is that temporary particle generation maximizes query efficiency to reduce detection risk and prevent wastage of system resources. On average, our system exhibits 96% attack success rates with 1416.17 queries, indicating that is 71.41% and 8% better in terms of query and success rates than existing GA-based attacks, respectively.", "venue": "IEEE Access", "year": 2022, "referenceCount": 50, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/9668973/09716139.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "10", "pages": "23532-23544", "name": "IEEE Access"}, "authors": [{"authorId": "98436176", "name": "H. Mun"}, {"authorId": "2154999796", "name": "Sunggwan Seo"}, {"authorId": "2154980791", "name": "Baehoon Son"}, {"authorId": "4198724", "name": "J. Yun"}]}, {"paperId": "c835a2efd4ef146cb2d9a935e277e3e22c0a9d87", "externalIds": {"DOI": "10.1016/b978-0-323-90508-4.00007-1", "CorpusId": 246799579}, "corpusId": 246799579, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c835a2efd4ef146cb2d9a935e277e3e22c0a9d87", "title": "Recent advances of image processing techniques in agriculture", "abstract": null, "venue": "Artificial Intelligence and Data Science in Environmental Sensing", "year": 2022, "referenceCount": 75, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial Intelligence and Data Science in Environmental Sensing"}, "authors": [{"authorId": "47576177", "name": "Helia Farhood"}, {"authorId": "2154226792", "name": "Ivan Bakhshayeshi"}, {"authorId": "2148325595", "name": "Matineh Pooshideh"}, {"authorId": "2047067184", "name": "Nabi Rezvani"}, {"authorId": "24901061", "name": "A. Beheshti"}]}, {"paperId": "8c1bb43628ac320166b635b8aa521c13b83e25a8", "externalIds": {"DOI": "10.1016/b978-0-12-820125-1.00017-8", "CorpusId": 245980953}, "corpusId": 245980953, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8c1bb43628ac320166b635b8aa521c13b83e25a8", "title": "A brief introduction to supervised, unsupervised, and reinforcement learning", "abstract": null, "venue": "Biosignal Processing and Classification Using Computational Learning and Intelligence", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Biosignal Processing and Classification Using Computational Learning and Intelligence"}, "authors": [{"authorId": "34970419", "name": "E. Morales"}, {"authorId": "1742688", "name": "H. Escalante"}]}, {"paperId": "3ebeaa05b88a4afba1fac2ca5e5b9f8e50796810", "externalIds": {"DOI": "10.1007/978-3-030-92537-6_21", "CorpusId": 245638546}, "corpusId": 245638546, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3ebeaa05b88a4afba1fac2ca5e5b9f8e50796810", "title": "The Role of Artificial Intelligence Technology in Improving the Resilience of Supply Chain During COVID-19", "abstract": null, "venue": "Advances in Artificial Systems for Medicine and Education V", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Advances in Artificial Systems for Medicine and Education V"}, "authors": [{"authorId": "2115547706", "name": "Zhong Zheng"}, {"authorId": "2116290749", "name": "G. Zhang"}, {"authorId": "2108866581", "name": "Yun Lin"}, {"authorId": "2111245477", "name": "Yanfang Pan"}, {"authorId": "2145998276", "name": "Yandong He"}]}, {"paperId": "9fe3027bb2e9c4bb95fe71675109673f552d050b", "externalIds": {"DBLP": "journals/csse/AdekolaUSDMOAEK22", "DOI": "10.32604/csse.2022.021029", "CorpusId": 243999428}, "corpusId": 243999428, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9fe3027bb2e9c4bb95fe71675109673f552d050b", "title": "Object Tracking-Based \"Follow-Me\" Unmanned Aerial Vehicle (UAV) System", "abstract": "The applications of information technology (IT) tools and techniques have, over the years, simplified complex problem solving procedures. But the power of automation is inhibited by the technicality in manning advanced equipment. To this end, tools deliberately combating this inhibition and advancing technological growth are the Unmanned Aerial Vehicles (UAVs). UAVs are rapidly taking over major industries such as logistics, security, and cinematography. Among others, this is a very efficient way of carrying out missions unconventional to humans. An application area of this technology is the local film industry which is not producing quality movies primarily due to the lack of technical know-how in utilizing these systems. This study therefore aim to devise an autonomous object tracking UAV system that would eliminate the complex procedure involved in stabilizing an aerial camera (aerial bot) midair and promote the creation of quality aerial video shooting. The study adopted Unified Modeling Language (UML) tools in modeling the system\u2019s functionality. The traditional Server-Client model architecture was adopted. The OpenCV library employed proved highly efficient in aiding the tracking procedure. The system provided a usable web controller which provides easy interaction between the pilot and the drone. Conclusively, investments in UAVs would enhance creation of quality graphic contents.", "venue": "Comput. Syst. Sci. Eng.", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.techscience.com/csse/v41n3/45536/pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "41", "pages": "875-890", "name": "Comput. Syst. Sci. Eng."}, "authors": [{"authorId": "143703557", "name": "O. Adekola"}, {"authorId": "2142976698", "name": "Onyedikachi Kenny Udekwu"}, {"authorId": "2143008219", "name": "Oluwatobi Tolulope Saliu"}, {"authorId": "2042235630", "name": "D. Dada"}, {"authorId": "72967275", "name": "Stephen O. Maitanmi"}, {"authorId": "3067714", "name": "Victor Odumuyiwa"}, {"authorId": "2140085122", "name": "O. Alao"}, {"authorId": "49296041", "name": "M. Eze"}, {"authorId": "52087390", "name": "F. A. Kasali"}, {"authorId": "2140110105", "name": "Ayokunle Omotunde"}]}, {"paperId": "cf65602ffdffd0958cacb2bf118d64787a90d446", "externalIds": {"MAG": "3203641768", "DOI": "10.4018/978-1-7998-7959-6.ch004", "CorpusId": 244189400}, "corpusId": 244189400, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cf65602ffdffd0958cacb2bf118d64787a90d446", "title": "Transforming CRM Through Artificial Intelligence", "abstract": "The present times are disrupting times for every kind of business and every aspect of a business. It is not about contactlessness; it is about seamlessness. The auto manufacturers have already started \u201cAmazoning\u201d dealerships. Brands are developing customer-specific platforms like jaguar.rockar.com, where one can explore the range, check the price, select dealer, search inventory, and schedule test drives. The brand Cadillac creates virtual reality experiences in Google Search, wherein a car appears in a living room through a phone call. One can see how it looks, walk around it, open the doors, and get a sense of the interior. This chapter explores the transformation of CRM through artificial intelligence.", "venue": "Advances in Marketing, Customer Relationship Management, and E-Services", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Advances in Marketing, Customer Relationship Management, and E-Services"}, "authors": [{"authorId": "9448829", "name": "Abhinav Chaturvedi"}, {"authorId": "115811848", "name": "M. Chaturvedi"}]}, {"paperId": "f71c6b6d02a6715276b4f8694fd77212577fa050", "externalIds": {"ACL": "2021.sigdial-1.41", "DBLP": "conf/sigdial/DogruozS21", "ArXiv": "2211.13560", "DOI": "10.48550/arXiv.2211.13560", "CorpusId": 237099289}, "corpusId": 237099289, "publicationVenue": {"id": "6a470734-72c6-4809-a07d-d34dee0df4a1", "name": "SIGDIAL Conferences", "type": "conference", "alternate_names": ["SIGDIAL", "SIGDIAL Conf", "Annu Meet Sp\u00e9c Interest Group Discourse Dialogue", "Annual Meeting of the Special Interest Group on Discourse and Dialogue"]}, "url": "https://www.semanticscholar.org/paper/f71c6b6d02a6715276b4f8694fd77212577fa050", "title": "How \u201copen\u201d are the conversations with open-domain chatbots? A proposal for Speech Event based evaluation", "abstract": "Open-domain chatbots are supposed to converse freely with humans without being restricted to a topic, task or domain. However, the boundaries and/or contents of open-domain conversations are not clear. To clarify the boundaries of \u201copenness\u201d, we conduct two studies: First, we classify the types of \u201cspeech events\u201d encountered in a chatbot evaluation data set (i.e., Meena by Google) and find that these conversations mainly cover the \u201csmall talk\u201d category and exclude the other speech event categories encountered in real life human-human communication. Second, we conduct a small-scale pilot study to generate online conversations covering a wider range of speech event categories between two humans vs. a human and a state-of-the-art chatbot (i.e., Blender by Facebook). A human evaluation of these generated conversations indicates a preference for human-human conversations, since the human-chatbot conversations lack coherence in most speech event categories. Based on these results, we suggest (a) using the term \u201csmall talk\u201d instead of \u201copen-domain\u201d for the current chatbots which are not that \u201copen\u201d in terms of conversational abilities yet, and (b) revising the evaluation methods to test the chatbot conversations against other speech events.", "venue": "SIGDIAL Conferences", "year": 2022, "referenceCount": 28, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-24", "journal": {"volume": "abs/2211.13560", "name": "ArXiv"}, "authors": [{"authorId": "1904399", "name": "A. Seza Do\u011fru\u00f6z"}, {"authorId": "1711959", "name": "Gabriel Skantze"}]}, {"paperId": "8afab76a0c94ab7ace7ec7371273cad085485e98", "externalIds": {"DOI": "10.3389/fcomp.2021.766053", "CorpusId": 247478809}, "corpusId": 247478809, "publicationVenue": {"id": "6e6a3f97-8b99-4453-9a97-8f5cd0fb30b3", "name": "Frontiers of Computer Science", "alternate_names": ["Frontiers in Computer Science", "Front Comput Sci"], "issn": "2095-2228", "alternate_issns": ["2624-9898"], "url": "https://www.springer.com/computer/journal/11704", "alternate_urls": ["https://www.frontiersin.org/journals/computer-science#"]}, "url": "https://www.semanticscholar.org/paper/8afab76a0c94ab7ace7ec7371273cad085485e98", "title": "On the Frontiers of Software Science and Software Engineering", "abstract": "Advances in software engineering, software science, computational intelligence, and intelligent mathematics have led to the establishment of Frontiers in Computer Science\u2014Software (FCSS). FCSS aims to promote transdisciplinary research on software science and engineering (SSE), autonomous systems, and computational intelligence. FCSS covers not only classical empirical software engineering and industrial processes, but also contemporary topics of software science, intelligent programming languages, autonomous code generation, mathematical foundations of software, and programming knowledge bases. FCSS reports empirical studies and emerging topics in software engineering including tools, development platforms, industrial processes, management infrastructures, quality assurance schemes, big data systems, and software migrations across languages and platforms.", "venue": "Frontiers of Computer Science", "year": 2022, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcomp.2021.766053/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-17", "journal": {"volume": "3"}, "authors": [{"authorId": "1700522", "name": "Guoyin Wang"}]}, {"paperId": "beeb51d7c12120b5da5d377a63c3e95cd0c9a024", "externalIds": {"PubMedCentral": "8886212", "DOI": "10.3389/fcvm.2021.816985", "CorpusId": 246814770, "PubMed": "35242820"}, "corpusId": 246814770, "publicationVenue": {"id": "3bc0e661-dc2a-454a-9ff5-6515430ce9ff", "name": "Frontiers in Cardiovascular Medicine", "type": "journal", "alternate_names": ["Front Cardiovasc Med"], "issn": "2297-055X", "url": "http://www.frontiersin.org/Cardiovascular_Medicine", "alternate_urls": ["http://www.frontiersin.org/Cardiovascular_Medicine/about", "https://www.frontiersin.org/journals/cardiovascular-medicine"]}, "url": "https://www.semanticscholar.org/paper/beeb51d7c12120b5da5d377a63c3e95cd0c9a024", "title": "A Systematic Quality Scoring Analysis to Assess Automated Cardiovascular Magnetic Resonance Segmentation Algorithms", "abstract": "Background The quantitative measures used to assess the performance of automated methods often do not reflect the clinical acceptability of contouring. A quality-based assessment of automated cardiac magnetic resonance (CMR) segmentation more relevant to clinical practice is therefore needed. Objective We propose a new method for assessing the quality of machine learning (ML) outputs. We evaluate the clinical utility of the proposed method as it is employed to systematically analyse the quality of an automated contouring algorithm. Methods A dataset of short-axis (SAX) cine CMR images from a clinically heterogeneous population (n = 217) were manually contoured by a team of experienced investigators. On the same images we derived automated contours using a ML algorithm. A contour quality scoring application randomly presented manual and automated contours to four blinded clinicians, who were asked to assign a quality score from a predefined rubric. Firstly, we analyzed the distribution of quality scores between the two contouring methods across all clinicians. Secondly, we analyzed the interobserver reliability between the raters. Finally, we examined whether there was a variation in scores based on the type of contour, SAX slice level, and underlying disease. Results The overall distribution of scores between the two methods was significantly different, with automated contours scoring better than the manual (OR (95% CI) = 1.17 (1.07\u20131.28), p = 0.001; n = 9401). There was substantial scoring agreement between raters for each contouring method independently, albeit it was significantly better for automated segmentation (automated: AC2 = 0.940, 95% CI, 0.937\u20130.943 vs manual: AC2 = 0.934, 95% CI, 0.931\u20130.937; p = 0.006). Next, the analysis of quality scores based on different factors was performed. Our approach helped identify trends patterns of lower segmentation quality as observed for left ventricle epicardial and basal contours with both methods. Similarly, significant differences in quality between the two methods were also found in dilated cardiomyopathy and hypertension. Conclusions Our results confirm the ability of our systematic scoring analysis to determine the clinical acceptability of automated contours. This approach focused on the contours' clinical utility could ultimately improve clinicians' confidence in artificial intelligence and its acceptability in the clinical workflow.", "venue": "Frontiers in Cardiovascular Medicine", "year": 2022, "referenceCount": 32, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcvm.2021.816985/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-15", "journal": {"volume": "8", "name": "Frontiers in Cardiovascular Medicine"}, "authors": [{"authorId": "84457259", "name": "E. Rauseo"}, {"authorId": "108746298", "name": "M. Omer"}, {"authorId": "1403245540", "name": "A. Amir-Khalili"}, {"authorId": "1720769723", "name": "A. Sojoudi"}, {"authorId": "4849306", "name": "T. Le"}, {"authorId": "145502615", "name": "S. Cook"}, {"authorId": "4746694", "name": "D. Hausenloy"}, {"authorId": "48058503", "name": "B. Ang"}, {"authorId": "1498039859", "name": "D. Toh"}, {"authorId": "33467992", "name": "J. Bryant"}, {"authorId": "20254799", "name": "C. Chin"}, {"authorId": "9616181", "name": "J. Paiva"}, {"authorId": "32174390", "name": "K. Fung"}, {"authorId": "2113692249", "name": "J. Cooper"}, {"authorId": "4232512", "name": "M. Khanji"}, {"authorId": "144298593", "name": "N. Aung"}, {"authorId": "144236487", "name": "S. Petersen"}]}, {"paperId": "a6052113eb4a201782e78deae5fd888e5d77b5b3", "externalIds": {"PubMedCentral": "8789682", "DOI": "10.3389/fpsyg.2021.643276", "CorpusId": 245926123, "PubMed": "35095629"}, "corpusId": 245926123, "publicationVenue": {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, "url": "https://www.semanticscholar.org/paper/a6052113eb4a201782e78deae5fd888e5d77b5b3", "title": "Cognition Without Neural Representation: Dynamics of a Complex System", "abstract": "This paper proposes an account of neurocognitive activity without leveraging the notion of neural representation. Neural representation is a concept that results from assuming that the properties of the models used in computational cognitive neuroscience (e.g., information, representation, etc.) must literally exist the system being modelled (e.g., the brain). Computational models are important tools to test a theory about how the collected data (e.g., behavioural or neuroimaging) has been generated. While the usefulness of computational models is unquestionable, it does not follow that neurocognitive activity should literally entail the properties construed in the model (e.g., information, representation). While this is an assumption present in computationalist accounts, it is not held across the board in neuroscience. In the last section, the paper offers a dynamical account of neurocognitive activity with Dynamical Causal Modelling (DCM) that combines dynamical systems theory (DST) mathematical formalisms with the theoretical contextualisation provided by Embodied and Enactive Cognitive Science (EECS).", "venue": "Frontiers in Psychology", "year": 2022, "referenceCount": 146, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fpsyg.2021.643276/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-12", "journal": {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "2767883", "name": "In\u00eas Hip\u00f3lito"}]}, {"paperId": "82bf8909e1f2a5fd31891d4944403b1b67a5555b", "externalIds": {"DOI": "10.22214/ijraset.2021.39717", "CorpusId": 245719855}, "corpusId": 245719855, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82bf8909e1f2a5fd31891d4944403b1b67a5555b", "title": "Music Recommender System Using ChatBot", "abstract": "Abstract: In this era of technological advances, text-based music recommendations are much needed as they will help humans relieve stress with soothing music according to their moods. In this project, we have implemented a chatbot that recommends music based on the user's text tone. By analyzing the tone of the text expressed by the user, we can identify the mood. Once the mood is identified, the application will play songs in the form of a web page based on the user's choice as well as his current mood. In our proposed system, themain goal is to reliably determine a user's mood based on their text tone with an application that can be installed on the user's desktop. In today's world, human computer interaction (HCI) plays a crucial role, and the most popular concept in HCI is recognition of emotion from text. As part of this process, the frontal view of the user's text is used to determine the mood. The extraction of text tone from the user's text is anotherimportant aspect. We have used IBM Analyser to check the text tone of the user and to predict the mood based on the text of the user, and Last.FM API to recommend songs based on themood of the user. Keywords: Introduction, Product-Architecture, Tone Analyzer, Music Classification Based on Mood, Acoustic Analysis, Experiment, Future/Current Use, Importance, Background, Literature Survey, Methodology, Equations, Planning, Tools and Technology, Conclusion.", "venue": "International Journal for Research in Applied Science and Engineering Technology", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-31", "journal": {"name": "International Journal for Research in Applied Science and Engineering Technology"}, "authors": [{"authorId": "2148703549", "name": "Shivam Sakore"}]}, {"paperId": "3894973d1dce2a9d75af9da75001c15474b55296", "externalIds": {"DOI": "10.1177/10778004211065813", "CorpusId": 245628321}, "corpusId": 245628321, "publicationVenue": {"id": "6ae39db1-25dc-4819-b028-a8c17216e1a5", "name": "Qualitative Inquiry", "type": "journal", "alternate_names": ["Qual Inq"], "issn": "1077-8004", "url": "https://journals.sagepub.com/home/qix", "alternate_urls": ["http://qix.sagepub.com/"]}, "url": "https://www.semanticscholar.org/paper/3894973d1dce2a9d75af9da75001c15474b55296", "title": "Rethinking the Politics of Creativity: Posthumanism, Indigeneity, and Creativity Beyond the Western Anthropocene", "abstract": "With the emergence of Western posthuman understandings, new materialism, artificial intelligence (AI), and the growing acknowledgment of Indigenous epistemologies, an ongoing rethinking of existing assumptions and meanings about creativity is needed. The intersection of new technologies and philosophical stances that upend human-centered views of reality suggests that creativity is not an exclusively \u201chuman\u201d activity. This opens new possibilities and assemblages for conceiving of creativity, but not without tensions. In this article, we connect multiple threads, to reimagine creativity in light of posthuman understandings and the possibilities for creative emergence beyond the Anthropocene. Creativity is implicated as emerging beyond non-human spaces, such as through digitality and AI or sources in the natural world. This unseats many understandings of creativity as positioned in Euro-Western literature. We offer four areas of concern for interrogating tensions in this area, aiming to open new possibilities for practice, research, and (re)conceptualization beyond Western understandings.", "venue": "Qualitative Inquiry", "year": 2021, "referenceCount": 96, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-30", "journal": {"volume": "28", "pages": "465 - 475", "name": "Qualitative Inquiry"}, "authors": [{"authorId": "31923945", "name": "D. Henriksen"}, {"authorId": "51325072", "name": "Edwin Creely"}, {"authorId": "39099504", "name": "Rohit Mehta"}]}, {"paperId": "39cafec3d81d855d2a8801e01e7baaf08eaaed5c", "externalIds": {"DOI": "10.2196/preprints.35949", "CorpusId": 246085159}, "corpusId": 246085159, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/39cafec3d81d855d2a8801e01e7baaf08eaaed5c", "title": "Artificial Intelligence Technologies for Detection and Quantification of Hepatic Steatosis: A Scoping Review (Preprint)", "abstract": "\n BACKGROUND\n Non-alcoholic fatty liver disease linked to an increased risk of morbidity and mortality in afflicted individuals. Non-invasive liver imaging technologies such ultrasound (US) is the preferable method for screening hepatic steatosis because to its non-invasiveness, cheap cost, and widespread availability.\nArtificial intelligence (AI), in particular deep learning algorithms, has garnered widespread notice for its superior performance on image identification and quantification. They are capable of quantitatively assessing complicated medical image properties automatically and achieving better diagnostic accuracy while increasing efficiency. AI is frequently utilized and gaining popularity in the field of liver medical imaging, which includes radiology, nuclear medicine and ultrasound. AI can assist physicians in making more accurate and reproducible imaging diagnoses while also reducing the workload of physicians.\n \n \n OBJECTIVE\n The primary purpose of this work was to conduct a scoping review of artificial intelligence technologies for hepatic steatosis detection and quantification. It also aimed to explore the role of AI technologies on Ultrasonography for the detection and quantification of hepatic steatosis.\n \n \n METHODS\n The researcher searched several electronic bibliographies including Google Scholar, PubMed, EMBASE, CINAHL, PsychINFO, ACM Digital, IEEEXplore, and Scopus. The references retrieved were investigated for additional relevant studies through the backward and forward reference list checking strategy. One reviewer carried out the studies selection and data extraction.\n \n \n RESULTS\n A total of 718 publications were retrieved; 268 duplicates were removed. After scanning the titles and abstracts, 234 were excluded. After scanning the full texts, many articles were excluded for the following reasons: studies focusing on diseases other than liver parenchymal diseases (n = 39), studies that did not confirm the specified outcomes or confirmation study population (n = 58), studies that were not original research, i.e., reviews, editorials (n = 106), and studies not written in English (n = 8). The qualitative analysis comprised a total of 25 publications.\n \n \n CONCLUSIONS\n This review illustrates the potential for AI systems to aid in the diagnosis and stage of liver fibrosis and non-alcoholic fatty liver disease. By incorporating AI into established noninvasive methods, effective diagnostic tools with an ideal mix of sensitivity and specificity are created. Before adopting these AI-assisted systems in clinical practice, it is necessary to validate these models in additional independent cohorts.\n", "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-23", "journal": null, "authors": [{"authorId": "51139216", "name": "Fahad Alshagathrh"}]}, {"paperId": "ab600896f6657d00852d4a21e2d375e28c38224f", "externalIds": {"DBLP": "journals/ais/Tzouganatou22", "DOI": "10.1007/s00146-021-01361-3", "CorpusId": 245467431}, "corpusId": 245467431, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/ab600896f6657d00852d4a21e2d375e28c38224f", "title": "Openness and privacy in born-digital archives: reflecting the role of AI development", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01361-3.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-23", "journal": {"volume": "37", "pages": "991 - 999", "name": "AI & SOCIETY"}, "authors": [{"authorId": "117313976", "name": "A. Tzouganatou"}]}, {"paperId": "234e02d99b207165a657851fd55646cdf6003748", "externalIds": {"DBLP": "journals/fcomp/EvenBB21", "DOI": "10.3389/fcomp.2021.774763", "CorpusId": 245427384}, "corpusId": 245427384, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/234e02d99b207165a657851fd55646cdf6003748", "title": "Assessing the Believability of Computer Players in Video Games: A New Protocol and Computer Tool", "abstract": "In this paper, we address the challenge of believability in multiplayer video games. Our contribution is a system for assessing the believability of computer players. The state of the art examines existing methods and identifies seven distinguishing features that differ considerably from one assessment to the next. Our investigation reveals that assessment procedures typically alter gameplay, posing a considerable danger of bias. This is a major flaw since computer players are evaluated in a specific context rather than in the context of the game as it should be played, potentially skewing the findings of the evaluation. As a result, we begin on a trial-and-error process, with each new proposal building on the achievements of the previous one while removing the flaws. New proposals are tested with new assessments, a total of three experiments are then presented. We created a computer program that partially automates the execution of the assessment procedure, making these trials easier to implement. At the end, thanks to our proposal, gamers can assess the believability of computer players indirectly by employing reporting forms that alert users to the presence of bots. We assume that the more a bot is reported, the less credible it becomes. We ran a final experiment to test our proposal, which yielded extremely encouraging results.", "venue": "Frontiers in Computer Science", "year": 2021, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcomp.2021.774763/pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-23", "journal": {"volume": "3"}, "authors": [{"authorId": "31571192", "name": "Cindy Even"}, {"authorId": "1962736", "name": "Anne-Gwenn Bosser"}, {"authorId": "1753287", "name": "C\u00e9dric Buche"}]}, {"paperId": "deafac3f3a4b8c83735ff9bd219224ebc9b1ec6a", "externalIds": {"DBLP": "series/synthesis/2021Shanthamallu", "DOI": "10.2200/s01135ed1v01y202109spr022", "CorpusId": 245428047}, "corpusId": 245428047, "publicationVenue": {"id": "a580061e-bf5a-4b29-9760-c58831177d14", "name": "Synthesis Lectures on Signal Processing", "type": "journal", "alternate_names": ["Synth Lect Signal Process"], "issn": "1932-1236", "url": "https://www.morganclaypool.com/"}, "url": "https://www.semanticscholar.org/paper/deafac3f3a4b8c83735ff9bd219224ebc9b1ec6a", "title": "Machine and Deep Learning Algorithms and Applications", "abstract": null, "venue": "Synthesis Lectures on Signal Processing", "year": 2021, "referenceCount": 78, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-22", "journal": {"pages": "1-123"}, "authors": [{"authorId": "40692862", "name": "U. Shanthamallu"}, {"authorId": "144924839", "name": "A. Spanias"}]}, {"paperId": "9f53de089438862ce5500e35231f068cbb7b3376", "externalIds": {"DOI": "10.22290/jbnc.v32i1.1938", "CorpusId": 245158647}, "corpusId": 245158647, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9f53de089438862ce5500e35231f068cbb7b3376", "title": "Horizonte de la Inteligencia Artificial y Neurociencias", "abstract": "La inteligencia artificial permite que los procesos cerebrales sean analizados como procesos computacionales. Presenta dos l\u00edneas inquietantes: el Proyecto Robot, llamado androide cuando es antropom\u00f3rtico, y el Proyecto Cyborg. Los robos est\u00e1n destinados a tareas repetitivas, riesgosas o de precisi\u00f3n, en las que pueden superar las limitaciones humanas, no percibi\u00e9ndose conflictos \u00e9ticos aunque s\u00ed nuevos desaf\u00edos en la organizaci\u00f3n social. Respecto de los androides, m\u00e1s all\u00e1 de sus capacidades, habr\u00e1 que considerar los efectos que puedan ocurrir en el ser humano durante la interacci\u00f3n con la m\u00e1quina, como el impacto de la m\u00edmica androide sobre la emoci\u00f3n y estado de \u00e1nimo. Los cyborgs son criaturas compuestas por elementos org\u00e1nicos y cibern\u00e9ticos cuya finalidad es emular o mejorar las capacidades de la parte org\u00e1nica. No se reconoce conflicto en su empleo para rehabilitaci\u00f3n o para suplir funciones alteradas o ausentes; aspectos negativos ser\u00edan su uso para la manipulaci\u00f3n. Otra aplicaci\u00f3n del proyecto cyborg a considerar es el enhancement, t\u00e9rmino utilizado en la literatura anglosajona para definir el aumento de facultades neurocognitivas o sensoriales mediante la estimulaci\u00f3n transcraneal o intracraneal. El conflicto neuro\u00e9tico surge porque el objetivo no es curar sino la perfectibilidad, o nuevas modalidades de percepci\u00f3n. Los profesionales de la salud deben actuar en un entorno nuevo y cambiante que trasciende las neurociencias y la salud p\u00fablica. El progreso contin\u00faa; por lo que se debe informar a la sociedad, anticipar dilemas, y ofrecer espacios de reflexi\u00f3n para la toma de decisiones individuales y para la especie humana.", "venue": "JBNC - JORNAL BRASILEIRO DE NEUROCIRURGIA", "year": 2021, "referenceCount": 25, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://jbnc.emnuvens.com.br/jbnc/article/download/1938/1758", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-14", "journal": {"name": "JBNC - JORNAL BRASILEIRO DE NEUROCIRURGIA"}, "authors": [{"authorId": "2079365684", "name": "Alejandra T. Rabad\u00e1n"}]}, {"paperId": "e267100233053e6eb211dc97d90e11908ff9bd15", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.7", "CorpusId": 245419258}, "corpusId": 245419258, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e267100233053e6eb211dc97d90e11908ff9bd15", "title": "ON THE ASIAN FETISH AND THE FANTASY OF EQUALITY", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "be9ea8dbd00eff1b3efb37d2e0b9b260ab37b58a", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.5", "CorpusId": 245416353}, "corpusId": 245416353, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/be9ea8dbd00eff1b3efb37d2e0b9b260ab37b58a", "title": "RACIST CUTE", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "021fc875fe3d82b0c212480014889b3fb35ea716", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.6", "CorpusId": 245412652}, "corpusId": 245412652, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/021fc875fe3d82b0c212480014889b3fb35ea716", "title": "ASIAN \u2022 FEMALE \u2022 ROBOT \u2022 SLAVE", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "0f928b7f6bf0616c2c9a2dc77feee60ffa9d51a9", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.4", "CorpusId": 245416273}, "corpusId": 245416273, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f928b7f6bf0616c2c9a2dc77feee60ffa9d51a9", "title": "RACIAL TRANSITIONAL OBJECTS", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "d00a84812cbadea747ffdc1ce1130f123c651a08", "externalIds": {"DOI": "10.1098/rstb.2021.0117", "CorpusId": 245118061, "PubMed": "34894727"}, "corpusId": 245118061, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d00a84812cbadea747ffdc1ce1130f123c651a08", "title": "Artificial evolution of robot bodies and control: on the interaction between evolution, learning and culture", "abstract": "We survey and reflect on how learning (in the form of individual learning and/or culture) can augment evolutionary approaches to the joint optimization of the body and control of a robot. We focus on a class of applications where the goal is to evolve the body and brain of a single robot to optimize performance on a specified task. The review is grounded in a general framework for evolution which permits the interaction of artificial evolution acting on a population with individual and cultural learning mechanisms. We discuss examples of variations of the general scheme of \u2018evolution plus learning\u2019 from a broad range of robotic systems, and reflect on how the interaction of the two paradigms influences diversity, performance and rate of improvement. Finally, we suggest a number of avenues for future work as a result of the insights that arise from the review. This article is part of a discussion meeting issue \u2018The emergence of collective knowledge and cumulative culture in animals, humans and machines\u2019.", "venue": "Philosophical Transactions of the Royal Society B", "year": 2021, "referenceCount": 56, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://napier-repository.worktribe.com/preview/2812314/EvoRobotsLearning_RoyalSocTransactions-7.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-12-13", "journal": {"volume": "377", "name": "Philosophical Transactions of the Royal Society B"}, "authors": [{"authorId": "144988281", "name": "E. Hart"}, {"authorId": "2145007657", "name": "L\u00e9ni K. Le Goff"}]}, {"paperId": "2a95bc2da1f09895d747dca1407169b8699c8791", "externalIds": {"DOI": "10.18820/24150479/aa53i2/8", "CorpusId": 245160656}, "corpusId": 245160656, "publicationVenue": {"id": "98d641dd-8fb9-40a8-b4b4-5146118031d6", "name": "Acta Academica", "alternate_names": ["Acta Acad"], "issn": "0587-2405", "url": "http://journals.ufs.ac.za/index.php/aa/index", "alternate_urls": ["http://www.scielo.org.za/scielo.php?lng=en&pid=2415-0479&script=sci_serial"]}, "url": "https://www.semanticscholar.org/paper/2a95bc2da1f09895d747dca1407169b8699c8791", "title": "The healing-growth future of humanity: regenerative politics and crealectic care", "abstract": "The 2020 coronavirus pandemic served to remind us that despite our Cartesian fantasies of control, naturing nature (natura naturans) is still active in the form of an untamed Other. The dominant reaction on most political sides was anthropocentric: if we do something \u2013 a doing generally framed within the scope of technique and management \u2013 nature shall go back to the kind and submissive non-viral neutrality that we appreciate in \u2018her\u2019 as a supposedly passive resource for productivism. How could humanity \u2013 a pandemic species itself and not only metaphorically \u2013 be better attuned with the powers of naturing nature, in a posture of co-creation rather than of a reactive technocratic war against the non-periodic or \u2018monstrous\u2019 aspects of life? This question is a matter of philosophical health: the future of humanity does not depend on statistics and logistics, but on the possibility of a philosophical (re)generative politics, a trustful care for creative singularity rather than an anxious control and production of regularity. Humanity\u2019s collective health presupposes this reconciliation with naturing nature and the deployment of a global shared cosmology based on the creative healing-growth flux of originative creativity. This regenerative and life-affirming creative Real is here termed \u2018Creal\u2019, and we call \u2018crealectics\u2019 the generative philosophical health that favours healing growth.", "venue": "Acta Academica", "year": 2021, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.ufs.ac.za/index.php/aa/article/download/5179/4293", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Acta Academica"}, "authors": [{"authorId": "1753256795", "name": "Luis de Miranda"}]}, {"paperId": "26a377b7b1b3b6bd609c4feb58c0da5696c78711", "externalIds": {"DOI": "10.1080/09515089.2021.2014802", "CorpusId": 245149983}, "corpusId": 245149983, "publicationVenue": {"id": "1997a543-39c3-403f-b425-459a18eb0f71", "name": "Philosophical Psychology", "type": "journal", "alternate_names": ["Philos Psychol"], "issn": "0951-5089", "url": "http://www.tandfonline.com/loi/cphp20", "alternate_urls": ["http://www.tandfonline.com/toc/cphp20/current"]}, "url": "https://www.semanticscholar.org/paper/26a377b7b1b3b6bd609c4feb58c0da5696c78711", "title": "Cognition as the sensitive management of an agent\u2019s behavior", "abstract": "ABSTRACT Cognitive science is unusual in that cognitive scientists have dramatic disagreements about the extension of their object of study, cognition. This paper defends a novel analysis of the scientific concept of cognition: that cognition is the sensitive management of an agent\u2019s behavior. This analysis is \u201cmodular,\u201d so that its extension varies depending on how one interprets certain of its constituent terms. I argue that these variations correspond to extant disagreements between cognitive scientists. This correspondence is evidence that the proposed analysis models the contemporary understanding of cognition among scientists, without artificially resolving questions that are currently considered open.", "venue": "Philosophical Psychology", "year": 2021, "referenceCount": 83, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://philsci-archive.pitt.edu/19976/1/Akagi-Cognition%20as%20SMAB%20PhPs%20R2%20preprint.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"volume": "35", "pages": "718 - 741", "name": "Philosophical Psychology"}, "authors": [{"authorId": "32712504", "name": "Mikio Akagi"}]}, {"paperId": "e4c3415e115aeb388623a3898d34c4b086ec5018", "externalIds": {"PubMedCentral": "8786277", "DOI": "10.1042/ETLS20210212", "CorpusId": 245007000, "PubMed": "34881776"}, "corpusId": 245007000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4c3415e115aeb388623a3898d34c4b086ec5018", "title": "Artificial intelligence, molecular subtyping, biomarkers, and precision oncology", "abstract": "A targeted cancer therapy is only useful if there is a way to accurately identify the tumors that are susceptible to that therapy. Thus rapid expansion in the number of available targeted cancer treatments has been accompanied by a robust effort to subdivide the traditional histological and anatomical tumor classifications into molecularly defined subtypes. This review highlights the history of the paired evolution of targeted therapies and biomarkers, reviews currently used methods for subtype identification, and discusses challenges to the implementation of precision oncology as well as possible solutions.", "venue": "Emerging topics in life sciences", "year": 2021, "referenceCount": 104, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://portlandpress.com/emergtoplifesci/article-pdf/5/6/747/926850/etls-2021-0212c.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-12-09", "journal": {"volume": "5", "pages": "747 - 756", "name": "Emerging Topics in Life Sciences"}, "authors": [{"authorId": "143787989", "name": "J. Shen"}]}, {"paperId": "d3bbd46fb28b1904c9152796a538fb3f7291d08c", "externalIds": {"DBLP": "conf/icta/ShehataTH21", "DOI": "10.1109/ICTA54582.2021.9809429", "CorpusId": 250300993}, "corpusId": 250300993, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d3bbd46fb28b1904c9152796a538fb3f7291d08c", "title": "An Analysis of International Conference Proceedings on Artificial General Intelligence (AGI) from 2008 to 2020: A Data-Mining Mapping Analysis", "abstract": "This paper analyzes the proceedings of 13 international conferences on Artificial General Intelligence AGI, that are part of the lecture notes in artificial intelligence. The motivation for this study is to explore the publication networks and areas where AGI could be useful to Information & Communication Technology ICT in education. SPSS and Microsoft Excel were used to enter, screen, clean and visualize the analysis of the data. Furthermore, all published proceedings were uploaded into Voyant Tools and VOSviewer for data mining and visualization. After obtaining the most frequently used keywords and terms, certain patterns lead to trends in the research on AGI. The analysis leads to discussions and suggestions of possible opportunities where AGI may be integrated with education to assist people with or without a disability. The contribution of the study is in the overall mapping analysis of the conference proceedings, which would inspire further exploration and collaboration with potential scholars, institutions, and countries.", "venue": "2021 8th International Conference on ICT & Accessibility (ICTA)", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-12-08", "journal": {"pages": "1-6", "name": "2021 8th International Conference on ICT & Accessibility (ICTA)"}, "authors": [{"authorId": "2174923997", "name": "Boulus Shehata"}, {"authorId": "27362922", "name": "A. Tlili"}, {"authorId": "2231264", "name": "Ronghuai Huang"}]}, {"paperId": "2cdf8d8291fa60942468cbebc12925a30f0e28d1", "externalIds": {"PubMedCentral": "8692947", "DOI": "10.3389/fnsys.2021.784404", "CorpusId": 244924541, "PubMed": "34955771"}, "corpusId": 244924541, "publicationVenue": {"id": "ba12d37f-ecd3-47c2-a173-22fb1bae2ece", "name": "Frontiers in Systems Neuroscience", "type": "journal", "alternate_names": ["Front Syst Neurosci"], "issn": "1662-5137", "url": "https://www.frontiersin.org/journals/systems-neuroscience", "alternate_urls": ["http://www.frontiersin.org/systemsneuroscience/", "http://www.frontiersin.org/systems_neuroscience"]}, "url": "https://www.semanticscholar.org/paper/2cdf8d8291fa60942468cbebc12925a30f0e28d1", "title": "Evolutionary Advantages of Stimulus-Driven EEG Phase Transitions in the Upper Cortical Layers", "abstract": "Spatio-temporal brain activity monitored by EEG recordings in humans and other mammals has identified beta/gamma oscillations (20\u201380 Hz), which are self-organized into spatio-temporal structures recurring at theta/alpha rates (4\u201312 Hz). These structures have statistically significant correlations with sensory stimuli and reinforcement contingencies perceived by the subject. The repeated collapse of self-organized structures at theta/alpha rates generates laterally propagating phase gradients (phase cones), ignited at some specific location of the cortical sheet. Phase cones have been interpreted as neural signatures of transient perceptual experiences according to the cinematic theory of brain dynamics. The rapid expansion of essentially isotropic phase cones is consistent with the propagation of perceptual broadcasts postulated by Global Workspace Theory (GWT). What is the evolutionary advantage of brains operating with repeatedly collapsing dynamics? This question is answered using thermodynamic concepts. According to neuropercolation theory, waking brains are described as non-equilibrium thermodynamic systems operating at the edge of criticality, undergoing repeated phase transitions. This work analyzes the role of long-range axonal connections and metabolic processes in the regulation of critical brain dynamics. Historically, the near 10 Hz domain has been associated with conscious sensory integration, cortical \u201cignitions\u201d linked to conscious visual perception, and conscious experiences. We can therefore combine a very large body of experimental evidence and theory, including graph theory, neuropercolation, and GWT. This cortical operating style may optimize a tradeoff between rapid adaptation to novelty vs. stable and widespread self-organization, therefore resulting in significant Darwinian benefits.", "venue": "Frontiers in Systems Neuroscience", "year": 2021, "referenceCount": 136, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fnsys.2021.784404/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-08", "journal": {"volume": "15", "name": "Frontiers in Systems Neuroscience"}, "authors": [{"authorId": "143730789", "name": "R. Kozma"}, {"authorId": "2529891", "name": "B. Baars"}, {"authorId": "2139752384", "name": "Natalie Geld"}]}, {"paperId": "5a980aa843e40de5f91a243cbf680af273c797ba", "externalIds": {"DBLP": "journals/corr/abs-2112-03763", "ArXiv": "2112.03763", "CorpusId": 244920904}, "corpusId": 244920904, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a980aa843e40de5f91a243cbf680af273c797ba", "title": "Creating Multimodal Interactive Agents with Imitation and Self-Supervised Learning", "abstract": "A common vision from science fiction is that robots will one day inhabit our physical spaces, sense the world as we do, assist our physical labours, and communicate with us through natural language. Here we study how to design artificial agents that can interact naturally with humans using the simplification of a virtual environment. We show that imitation learning of human-human interactions in a simulated world, in conjunction with self-supervised learning, is sufficient to produce a multimodal interactive agent, which we call MIA, that successfully interacts with non-adversarial humans 75% of the time. We further identify architectural and algorithmic techniques that improve performance, such as hierarchical action selection. Altogether, our results demonstrate that imitation of multi-modal, real-time human behaviour may provide a straightforward and surprisingly effective means of imbuing agents with a rich behavioural prior from which agents might then be fine-tuned for specific purposes, thus laying a foundation for training capable agents for interactive robots or digital assistants. A video of MIA\u2019s behaviour may be found at https://youtu.be/ZFgRhviF7mY.", "venue": "ArXiv", "year": 2021, "referenceCount": 39, "citationCount": 19, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-07", "journal": {"volume": "abs/2112.03763", "name": "ArXiv"}, "authors": [{"authorId": "2143271992", "name": "DeepMind Interactive Agents Team Josh Abramson"}, {"authorId": "37968006", "name": "Arun Ahuja"}, {"authorId": "104251960", "name": "Arthur Brussee"}, {"authorId": "32561676", "name": "Federico Carnevale"}, {"authorId": "147433059", "name": "Mary Cassin"}, {"authorId": "2143272333", "name": "Felix Fischer"}, {"authorId": "1737522", "name": "Petko Georgiev"}, {"authorId": "40034895", "name": "Alex Goldin"}, {"authorId": "3367786", "name": "Tim Harley"}, {"authorId": "145783676", "name": "Felix Hill"}, {"authorId": "145901789", "name": "P. Humphreys"}, {"authorId": "1572095637", "name": "Alden Hung"}, {"authorId": "2065404873", "name": "Jessica Landon"}, {"authorId": "2542999", "name": "T. Lillicrap"}, {"authorId": "20896818", "name": "Hamza Merzic"}, {"authorId": "50654556", "name": "Alistair Muldal"}, {"authorId": "35030998", "name": "Adam Santoro"}, {"authorId": "2143271833", "name": "Guy Scully"}, {"authorId": "51029932", "name": "Tamara von Glehn"}, {"authorId": "89504302", "name": "Greg Wayne"}, {"authorId": "1571809179", "name": "Nathaniel Wong"}, {"authorId": "2116550367", "name": "Chen Yan"}, {"authorId": "2070271342", "name": "Rui Zhu"}]}, {"paperId": "0f404607305fbbc90d6daf3b91ec05e217226ad9", "externalIds": {"ArXiv": "2112.06646", "CorpusId": 245123635}, "corpusId": 245123635, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f404607305fbbc90d6daf3b91ec05e217226ad9", "title": "The Burst Market: the Next Leap for Humanity", "abstract": "Humans have a major challenge: how to share knowledge effectively. People often need quick informational help, like health/legal advice, shopping/cooking tips, insider opinion, etc. The needs are important and ubiquitous, and most could be satisfied via quick chats with others, who may or may not be experts. In fact, knowledge common to some is often sought by others; every human, expert or non-expert, young or old, has helpful values. Yet, the reality is that people usually cannot find helpers easily, end up spending much more time and money, or even get no answer at all. This signifies a critical issue: the current labour market, called by this paper the Conventional Market (CM), massively fails such Burst Jobs, leading to huge job opportunity losses and human intelligence underutilization. This paper attributes the failure to high transaction costs due to technology constraints. Thus, this paper proposes creating an online Burst Market (BM) letting people sell any services at their own price via video or audio chats lasting as short as a few seconds or minutes. The solution is feasible and lucrative thanks to technology progress. It will empower all people, including not only professionals but also the vast ordinary individuals, and create enormous part-time and full-time jobs. As a result, it will aid in poverty lifting and alleviate aging society problem as people will be able to earn income more easily, reduce AI-led unemployment through the highly intelligent BM jobs, maximize human values through the easy acquisition and sale of skills with Life-Long Working, and increase prosperity and human achievements thanks to the collaboration breakthrough. The BM will also reshape industries, and may cause a global power reshuffle or even the ultimate destruction of nations. In short, this paper proposes the concept of the BM and asserts that it will invoke the next leap for humanity.", "venue": "", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-05", "journal": null, "authors": [{"authorId": "2110710474", "name": "Vincent Zha"}]}, {"paperId": "ca981e61a0cce158035fc8d356f7a0d02657da14", "externalIds": {"DOI": "10.9734/ajrcos/2021/v12i430291", "CorpusId": 245042674}, "corpusId": 245042674, "publicationVenue": {"id": "026f4249-5e18-4b4c-b47a-aa1927ad7498", "name": "Asian Journal of Research in Computer Science", "type": "journal", "alternate_names": ["Asian J Res Comput Sci"], "issn": "2581-8260", "url": "http://www.sciencedomain.org/"}, "url": "https://www.semanticscholar.org/paper/ca981e61a0cce158035fc8d356f7a0d02657da14", "title": "Research on Chemical Process Optimization Based on Artificial Neural Network Algorithm", "abstract": "Artificial Neural Network (ANN) is established by imitating the human brain's nerve thinking mode. Because of its strong nonlinear mapping ability, fault tolerance and self-learning ability, it is widely used in many fields such as intelligent driving, signal processing, process control and so on. This article introduces the basic principles, development history and three common neural network types of artificial neural networks, BP neural network, RBF neural network and convolutional neural network, focusing on the research progress of the practical application of neural networks in chemical process optimization.", "venue": "Asian Journal of Research in Computer Science", "year": 2021, "referenceCount": 79, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-03", "journal": {"name": "Asian Journal of Research in Computer Science"}, "authors": [{"authorId": "2142046258", "name": "Fei Liang"}, {"authorId": "2146343555", "name": "Taowen Zhang"}]}, {"paperId": "504504bacc2fe95a820656cdaa292f56bd1dd6fd", "externalIds": {"DOI": "10.1111/1467-9752.12608", "CorpusId": 244884205}, "corpusId": 244884205, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/504504bacc2fe95a820656cdaa292f56bd1dd6fd", "title": "Kant's doctrine of education and the problem of artificial intelligence", "abstract": null, "venue": "Journal of Philosophy of Education", "year": 2021, "referenceCount": 18, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-03", "journal": {"name": "Journal of Philosophy of Education"}, "authors": [{"authorId": "147327716", "name": "Leonid Kornilaev"}]}, {"paperId": "7773f65eba083baae09b02b3e77de2387fc9b338", "externalIds": {"ArXiv": "2112.01516", "DBLP": "journals/corr/abs-2112-01516", "CorpusId": 244799141}, "corpusId": 244799141, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7773f65eba083baae09b02b3e77de2387fc9b338", "title": "Ownership and Creativity in Generative Models", "abstract": "Machine learning generated content such as image artworks, textual poems and music become prominent in recent years. These tools attract much attention from the media, artists, researchers, and investors. Because these tools are data-driven, they are inherently different than the traditional creative tools which arises the question who may own the content that is generated by these tools? In this paper we aim to address this question, we start by providing a background to this problem, raising several candidates that may own the content and arguments for each one of them. Then we propose a possible algorithmic solution in the vision-based model\u2019s regime. Finally, we discuss the broader implications of this problem.", "venue": "ArXiv", "year": 2021, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-02", "journal": {"volume": "abs/2112.01516", "name": "ArXiv"}, "authors": [{"authorId": "2107086356", "name": "Omri Avrahami"}, {"authorId": "1582254810", "name": "Bar Tamir"}]}, {"paperId": "6402979a0ebe1468206ef4ee6869f7debe614049", "externalIds": {"DBLP": "journals/corr/abs-2112-01342", "ArXiv": "2112.01342", "CorpusId": 244799420}, "corpusId": 244799420, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6402979a0ebe1468206ef4ee6869f7debe614049", "title": "How not to Lie with a Benchmark: Rearranging NLP Leaderboards", "abstract": "Comparison with a human is an essential requirement for a benchmark for it to be a reliable measurement of model capabilities. Nevertheless, the methods for model comparison could have a fundamental flaw the arithmetic mean of separate metrics is used for all tasks of different complexity, different size of test and training sets. In this paper, we examine popular NLP benchmarks\u2019 overall scoring methods and rearrange the models by geometric and harmonic mean (appropriate for averaging rates) according to their reported results. We analyze several popular benchmarks including GLUE, SuperGLUE, XGLUE, and XTREME. The analysis shows that e.g. human level on SuperGLUE is still not reached, and there is still room for improvement for the current models.", "venue": "ArXiv", "year": 2021, "referenceCount": 24, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-02", "journal": {"volume": "abs/2112.01342", "name": "ArXiv"}, "authors": [{"authorId": "2142798760", "name": "Shavrina Tatiana"}, {"authorId": "2142750217", "name": "Malykh Valentin"}]}, {"paperId": "2d6d0cdd21a5beeb1aeabe946e804558f5926838", "externalIds": {"DOI": "10.1109/CSCI54926.2021.00192", "CorpusId": 249929158}, "corpusId": 249929158, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d6d0cdd21a5beeb1aeabe946e804558f5926838", "title": "aMDH and TWIN: Two original honeypot-based approaches to protect swarms of drones", "abstract": "Drones and swarms of drones are now considered an additional tool for both civilian and military applications. As any computer-based system they can thus be (and are) the target of attacks and the consequences of such attacks can be dramatic for assets and people. We believe an approach based on honeypots that would attract the attention of attackers and would behave so that these attackers could not even understand they are in a honeypot and not in a real drone, would be a significant step towards the protection of these systems. Even though some prototypes exist, they do not fully address the fact of luring the attacker to believe he/she controls a real drone. In this paper we present our work to address this issue.", "venue": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-12-01", "journal": {"pages": "783-787", "name": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)"}, "authors": [{"authorId": "2343153", "name": "S. Chaumette"}, {"authorId": "2172228121", "name": "Titien Cubilier"}]}, {"paperId": "6efaa6e14c5a65630bdc9c5df65b5600dc52ad88", "externalIds": {"DOI": "10.1109/CECIT53797.2021.00145", "CorpusId": 247857755}, "corpusId": 247857755, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6efaa6e14c5a65630bdc9c5df65b5600dc52ad88", "title": "Outlook and Direction of AI Tour Guide Services - from the Lifelong Machine Learning View", "abstract": "Artificial intelligence (AI) has entered tourism and become a new service in a tour guide. AI technology can help tourism by providing customized services and attracting visitors to fight with the crisis of the COVID-19 epidemic. This paper introduces how AI tour guide services contribute to tourism and its main issues. The future development of AI tour guides also was discussed at the end and the authors believe lifelong machine learning is the key to developing AI tour guides.", "venue": "2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT)", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-12-01", "journal": {"pages": "802-806", "name": "2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT)"}, "authors": [{"authorId": "2161327005", "name": "Shuai Wang"}, {"authorId": "3155784", "name": "Xianbin Hong"}, {"authorId": "31177772", "name": "Noorliza Karia"}, {"authorId": "145158116", "name": "S. Guan"}, {"authorId": "1688436", "name": "Prudence W. H. Wong"}, {"authorId": "2074917758", "name": "K. Man"}, {"authorId": "2115519737", "name": "Dawei Liu"}]}, {"paperId": "87a59a6c7733a6c98087cd9a19c3ccf4b6ed2528", "externalIds": {"DOI": "10.1002/cepa.1650", "CorpusId": 245627104}, "corpusId": 245627104, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/87a59a6c7733a6c98087cd9a19c3ccf4b6ed2528", "title": "Connecting Artificial Intelligence and Structural Glass Engineering \u2013 Overview, Potentials and Case Studies", "abstract": "This paper introduces the Artificial Intelligence (AI) technology to structural glass engineering and glass industry audience. The first part of the paper is concerned with lying nomenclature and theory foundation of AI and its subclasses of Machine and Deep Learning (ML/DL), elaborating the specific needs and requirements for the application in a structural glass context. A subsequent section explores applications of AI for different subjects within the production and quality assessment of glass products as well as the design, verification and monitoring of facades and glass structures. This paper presents successfully conducted industry projects by the authors, which are: supervised ML for material parameter identification of polymeric interlayers used in laminated glass, the prediction of sound insulation properties of insulation glass units and glass laminates and the application of computer vision DL methods to image classification of the Pummel test. A visionary outlook highlights how to use AI for future generative design and verification of glass structures for rapid collaborative prototyping. The summary and conclusion section wraps up the main findings for the applicability and impact of AI for the presented structural glass research and industry problems. This paper shows, that already by today in many cases AI, data, software and computing resources are already in place to successfully implement and conduct AI projects in the glass industry and structural glass engineering practice.", "venue": "ce/papers", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-01", "journal": {"volume": "4", "name": "ce/papers"}, "authors": [{"authorId": "7803749", "name": "M. A. Kraus"}, {"authorId": "13308611", "name": "M. Drass"}]}, {"paperId": "0fcb35c8eb8308d2d9bca08c71d6e59035ad20f9", "externalIds": {"DOI": "10.1088/1742-6596/2134/1/012005", "CorpusId": 245351838}, "corpusId": 245351838, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0fcb35c8eb8308d2d9bca08c71d6e59035ad20f9", "title": "Creation and implementation of a set of game strategies based on training neural networks with reinforcement learning", "abstract": "The study explores the problems of reinforcement learning and finding non-obvious play strategies using reinforcement learning. Two approaches to agent training (blind and pattern-based) are considered and implemented. The advantage of the self-learning approach with reinforcement using patterns as applied to a specific game (tic-tac-toe five in a row) is shown. Recorded and analyzed the use of unusual strategies by an agent using a pattern-based approach.", "venue": "Journal of Physics: Conference Series", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-12-01", "journal": {"volume": "2134", "name": "Journal of Physics: Conference Series"}, "authors": [{"authorId": "2146460795", "name": "D. S. Kozlov"}, {"authorId": "113737241", "name": "O. Polovikova"}]}, {"paperId": "2cb18f589ae071d139d47e63adc77a37d6e35405", "externalIds": {"DOI": "10.1177/02632764211054122", "CorpusId": 245299071}, "corpusId": 245299071, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2cb18f589ae071d139d47e63adc77a37d6e35405", "title": "Introduction: Algorithmic Thought", "abstract": "This introduction to a special section on algorithmic thought provides a framework through which the articles in that collection can be contextualised and their individual contributions highlighted. Over the past decade, there has been a growing interest in artificial intelligence (AI). This special section reflects on this AI boom and its implications for studying what thinking is. Focusing on the algorithmic character of computing machines and the thinking that these machines might express, each of the special section\u2019s essays considers different dimensions of algorithmic thought, engaging with a diverse set of epistemological questions and issues.", "venue": "Theory, Culture & Society", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/02632764211054122", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-01", "journal": {"volume": "38", "pages": "5 - 11", "name": "Theory, Culture & Society"}, "authors": [{"authorId": "144499636", "name": "M. Fazi"}]}, {"paperId": "99e8e6c48083324e3041ad316c41a1f74729b9e4", "externalIds": {"MAG": "3196369313", "DOI": "10.1016/j.techfore.2021.121100", "CorpusId": 239659470}, "corpusId": 239659470, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/99e8e6c48083324e3041ad316c41a1f74729b9e4", "title": "Cultural proximity bias in AI-acceptability: The importance of being human", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2021, "referenceCount": 94, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-01", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "102927759", "name": "Annie Tubadji"}, {"authorId": "2143568955", "name": "Haoran Huang"}, {"authorId": "38895112", "name": "D. Webber"}]}, {"paperId": "a57e3b67ebfeba1285f1b64d6dc3f99f8db2a340", "externalIds": {"DOI": "10.1016/j.jobe.2021.103299", "CorpusId": 240977118}, "corpusId": 240977118, "publicationVenue": {"id": "edc86f1a-0bc0-4f32-8b0d-9134204610bf", "name": "Journal of Building Engineering", "type": "journal", "alternate_names": ["J Build Eng", "J build eng", "Journal of building engineering"], "issn": "2352-7102", "url": "https://www.journals.elsevier.com/leukemia-research-reports/", "alternate_urls": ["http://www.sciencedirect.com/science/journal/23527102"]}, "url": "https://www.semanticscholar.org/paper/a57e3b67ebfeba1285f1b64d6dc3f99f8db2a340", "title": "Artificial intelligence in the construction industry: A review of present status, opportunities and future challenges", "abstract": null, "venue": "Journal of Building Engineering", "year": 2021, "referenceCount": 142, "citationCount": 45, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-01", "journal": {"name": "Journal of Building Engineering"}, "authors": [{"authorId": "118203969", "name": "Sofiat. Abioye"}, {"authorId": "1926817", "name": "Lukumon O. Oyedele"}, {"authorId": "151084718", "name": "L. \u00c0k\u00e0nb\u00ed"}, {"authorId": "37513131", "name": "A. Ajayi"}, {"authorId": "1861765828", "name": "Juan Manuel Davila Delgado"}, {"authorId": "1380103222", "name": "Muhammad Bilal"}, {"authorId": "2987639", "name": "Ol\u00fagb\u00e9nga O. Akinad\u00e9"}, {"authorId": "2119174865", "name": "Ashraf A. Ahmed"}]}, {"paperId": "3f174adb111174d94a3b578e9fb9bab282a3ebc7", "externalIds": {"DOI": "10.36253/cambio-10637", "CorpusId": 246379189}, "corpusId": 246379189, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f174adb111174d94a3b578e9fb9bab282a3ebc7", "title": "Rewriting Marx to expose the data society and AI", "abstract": "As I show with examples from the Grundrisse and the Capital, some fundamentals of Marx\u2019s critique of political economy can be rewritten with simple substitutions to yield surprisingly pertinent analyses of today\u2019s \u201cinformation society\u201d and the role that data and AI play in it. The reason behind this strange phenomenon is that Marx\u2019s penetrating study of money as a dehumanizing abstraction and self-replicating capital can be extended with minor changes to the main abstraction and \u201cautomatic fetish\u201d of our historical regime: digital data. As money-capital tends to grow by itself independently of humans, so does data. AI is the main engine of this new dangerous cycle.\u00a0", "venue": "Cambio. Rivista sulle Trasformazioni Sociali", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://oaj.fupress.net/index.php/cambio/article/download/10637/10515", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-30", "journal": {"name": "Cambio. Rivista sulle Trasformazioni Sociali"}, "authors": [{"authorId": "2075094501", "name": "Stefano Diana"}]}, {"paperId": "5b3b2a0d9125e2ee4c9b8ca98bd963af1bbb288f", "externalIds": {"DOI": "10.1007/978-3-662-63449-3_3", "CorpusId": 244704005}, "corpusId": 244704005, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5b3b2a0d9125e2ee4c9b8ca98bd963af1bbb288f", "title": "Zur Frage der Ersetzbarkeit des Menschen durch KI\u00a0in der Forschung", "abstract": null, "venue": "Ethics of Science and Technology Assessment", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F978-3-662-63449-3_3.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-11-27", "journal": {"name": "Ethics of Science and Technology Assessment"}, "authors": [{"authorId": "2845244", "name": "C. Gethmann"}]}, {"paperId": "21ab011a3adccbd912aea58f76b84b7873c41df3", "externalIds": {"ArXiv": "2111.13365", "CorpusId": 245838016}, "corpusId": 245838016, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/21ab011a3adccbd912aea58f76b84b7873c41df3", "title": "Machines&Influence: An Information Systems Lens", "abstract": "Policymakers face a broader challenge of how to view AI capabilities today and where does society stand in terms of those capabilities. This paper surveys AI capabilities and tackles this very issue, exploring it in context of political security in digitally networked societies. We extend the ideas of Information Management to better understand contemporary AI systems as part of a larger and more complex information system. Comprehensively reviewing AI capabilities and contemporary man-machine interactions, we undertake conceptual development to suggest that better information management could allow states to more optimally offset the risks of AI enabled influence and better utilise the emerging capabilities which these systems have to offer to policymakers and political institutions across the world. Hopefully this long essay will actuate further debates and discussions over these ideas, and prove to be a useful contribution towards governing the future of AI.", "venue": "", "year": 2021, "referenceCount": 130, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-11-26", "journal": null, "authors": [{"authorId": "2151241746", "name": "Shashank Yadav"}]}, {"paperId": "cbbd2e052b19941613d0ec7a7b742951e998bfa3", "externalIds": {"ArXiv": "2111.14621", "CorpusId": 244715156}, "corpusId": 244715156, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cbbd2e052b19941613d0ec7a7b742951e998bfa3", "title": "Improving Customer Service Chatbots with Attention-based Transfer Learning", "abstract": "\u2014With growing societal acceptance and increasing cost ef\ufb01ciency due to mass production, service robots are beginning to cross from the industrial to the social domain. Currently, customer service robots tend to be digital and emulate social interactions through on-screen text, but state-of-the-art research points towards physical robots soon providing customer service in person. This article explores two possibilities. Firstly, whether transfer learning can aid in the improvement of customer service chatbots between business domains. Second, the implementation of a framework for physical robots for in-person interaction. Modelled on social interaction with Twitter customer support accounts, transformer-based chatbot models are initially assigned to learn one domain from an initial random weight distribution. Given shared vocabulary, each model is then tasked with learning another domain by transferring knowledge from the previous. Following studies on 19 different businesses, results show that the majority of models are improved when transferring weights from at least one other domain, in particular those that are more data-scarce than others. General language transfer learning occurs, as well as higher-level transfer of similar domain knowledge, in several cases. The chatbots are \ufb01nally implemented on Temi and Pepper robots, with feasibility issues encountered and solutions are proposed to overcome them.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-24", "journal": null, "authors": [{"authorId": "89293047", "name": "Jordan J. Bird"}]}, {"paperId": "e9732553a21d3c991e5d3dac1c18111e7d153875", "externalIds": {"DOI": "10.18800/themis.202101.018", "CorpusId": 247427896}, "corpusId": 247427896, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e9732553a21d3c991e5d3dac1c18111e7d153875", "title": "Miner\u00eda de textos y datos e Inteligencia Artificial: nuevas excepciones al derecho de autor", "abstract": "Existe una creciente atenci\u00f3n y discusi\u00f3n sobre\u00a0c\u00f3mo las leyes nacionales o los acuerdos internacionales\u00a0deber\u00edan permitir o impedir el derecho\u00a0fundamental a la investigaci\u00f3n por medio de la miner\u00eda de textos y datos, y la inteligencia artificial.\u00a0Este art\u00edculo examina c\u00f3mo las leyes de derechos\u00a0de autor est\u00e1n empezando a regular la materia.\u00a0Las m\u00e1s recientes modificaciones legislativas\u00a0comprenden la inclusi\u00f3n de nuevas excepciones y\u00a0limitaciones en las normas de reproducci\u00f3n, almacenamiento,\u00a0y comunicaci\u00f3n p\u00fablica de las obras.El an\u00e1lisis indica que las normas aprobadas o utilizadas\u00a0para regular la miner\u00eda de textos y datos\u00a0(TDM) var\u00edan en su contenido y objetivo de un pa\u00eds\u00a0a otro, lo que empieza a generar un entorno internacional\u00a0variado, inadecuado e incompatible para\u00a0el desarrollo de proyectos de investigaci\u00f3n basados\u00a0en miner\u00eda de textos y datos e inteligencia artificial.\u00a0Este art\u00edculo concluye con reflexiones centradas\u00a0en el derecho a la investigaci\u00f3n, la inteligencia\u00a0artificial, la miner\u00eda de textos y datos, y la creaci\u00f3n\u00a0de nuevas limitaciones y excepciones en las leyes\u00a0de derechos de autor.", "venue": "THEMIS Revista de Derecho", "year": 2021, "referenceCount": 71, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistas.pucp.edu.pe/index.php/themis/article/download/24881/23666", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-11-22", "journal": {"name": "THEMIS Revista de Derecho"}, "authors": [{"authorId": "151023629", "name": "H. Izquierdo"}]}, {"paperId": "d257c67ae1c5c6cc1826e3b2603902e45a27f1ce", "externalIds": {"DOI": "10.21203/rs.3.rs-1082323/v1", "CorpusId": 244510349}, "corpusId": 244510349, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d257c67ae1c5c6cc1826e3b2603902e45a27f1ce", "title": "Implementing Implementation Science; A Bibliometric Study of Qualitative Research in Clinical Artificial Intelligence", "abstract": "\n Background\n\nImplementation science is a pragmatic and multidisciplinary field, centred on the application of a wide range of theoretical approaches to close \u2018know-do\u2019 gaps in healthcare. The implementation science community is made of individuals on a continuum between academia and practice, but it is unclear to what extent the theoretical deliberations of implementation academics are translated into the work of implementation practitioners and on to patient benefit. This bibliometric study aims to use the field of clinical artificial intelligence(AI) implementation to sample the prevalence and character of theoretically informed implementation practices.\nMethods\n\nQualitative research of key stakeholder perspectives on clinical AI published between 2014-2021 was systematically identified. Following title, abstract and full-text screening eligible articles were characterised in terms of their publication, AI tool and context studied, the theoretical approach if any and the research methods and quality. Descriptive, comparative and regression statistics were applied.\nResults\n\nOne-hundred-and-eleven studies met the eligibility criteria, with monthly eligible publication rate increasing from 0.7-4.0 between 2014-2021. Eligible studies represented 23 different nations and 25 different clinical specialities. A theoretical approach was explicitly employed in 39(35.1%) studies though 6 of these described novel theoretical approaches(15.1%) and the most frequently used theoretical approach was only used 3 times. There was no statistically significant trend in the prevalence of theoretically informed research within the study period. Of the 25 theoretically informed studies conducted in Europe or North America 19(76%) used theories that originated in the same continent.\nConclusions\n\nThe theoretical approaches which characterise implementation science are not being put to use as often as they could, and the means by which they are selected also seems suboptimal. The field may facilitate a greater synergy between theory and practice if the focus shifts from unifying implementation theories on to unifying and expanding the implementation community. By making more theoretical approaches accessible to practitioners and supporting their selection and application, theory could be more effectively harnessed to close healthcare\u2019s \u2018know-do gaps\u2019.\nProtocol registration\n PROSPERO ID 248025", "venue": "", "year": 2021, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.researchsquare.com/article/rs-1082323/latest.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-22", "journal": null, "authors": [{"authorId": "32243895", "name": "H. Hogg"}, {"authorId": "1404619882", "name": "M. Al-Zubaidy"}, {"authorId": "5638585", "name": "P. Keane"}, {"authorId": "2073398767", "name": "Fiona R Beyer"}, {"authorId": "2834652", "name": "G. Maniatopoulos"}]}, {"paperId": "0f86385490c2a063a2f4bc0ce06f05abc30c4412", "externalIds": {"MAG": "968815122", "DOI": "10.1007/978-94-007-2879-0_7", "CorpusId": 141991695}, "corpusId": 141991695, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f86385490c2a063a2f4bc0ce06f05abc30c4412", "title": "Conclusion Part II", "abstract": null, "venue": "Cycling Pathways", "year": 2021, "referenceCount": 506, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-18", "journal": {"name": "Cycling Pathways"}, "authors": [{"authorId": "8872223", "name": "D. Courgeau"}]}, {"paperId": "28947b6eebf78ba0a6db89c9a7858c2a7f07dabe", "externalIds": {"DOI": "10.1109/ICSEC53205.2021.9684619", "CorpusId": 246363415}, "corpusId": 246363415, "publicationVenue": {"id": "6ffd3030-fbaa-4915-9ec8-888f211c7b73", "name": "International Computer Science and Engineering Conference", "type": "conference", "alternate_names": ["ICSEC", "Int Comput Sci Eng Conf"]}, "url": "https://www.semanticscholar.org/paper/28947b6eebf78ba0a6db89c9a7858c2a7f07dabe", "title": "The Prototype Development of Thai Language Understanding based on Mental Image Directed Semantic Theory", "abstract": "Nowadays, Artificial Intelligence (AI) has been embedded in various tools such as smart phones, even in those we might use unconsciously every day. However, AI technologies for automatic understanding human languages, namely, Natural Language Understanding (NLU) has been still far from its goal because of very difficult problems of semantics. This paper describes a prototype NLU system for Thai language based on Mental Image Directed Semantic Theory in order to help Thai language beginners more comprehensively. For the first step, Thai sentences of basic structures intended for amateur users were chosen for the system to process. In the system, input sentences are fragmented to detect constituent words and their grammatical relationships, and then transduced to semantic representations in a formal language named Language for Mental-image Description. The semantic interpretations are evaluated through reasoning processes such as disambiguation and entailment. Finally, the system returns animations as its understanding results of the inputs, in order to help language learners understand the text contents in a more intuitive way.", "venue": "International Computer Science and Engineering Conference", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-11-18", "journal": {"pages": "167-172", "name": "2021 25th International Computer Science and Engineering Conference (ICSEC)"}, "authors": [{"authorId": "3269611", "name": "Rojanee Khummongkol"}, {"authorId": "2151502770", "name": "Atisak Samart"}, {"authorId": "2151501746", "name": "Sarawut Chitthong"}, {"authorId": "1720292", "name": "M. Yokota"}]}, {"paperId": "6f30dfb5bec5365000d64b582467e1cc57c659ec", "externalIds": {"DOI": "10.1109/CINTI53070.2021.9668544", "CorpusId": 246301533}, "corpusId": 246301533, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6f30dfb5bec5365000d64b582467e1cc57c659ec", "title": "Applying Genetic Programming for the Inverse Lindenmayer Problem", "abstract": "The aim of this work is to find an automated solution for the Inverse Lindenmayer problem - that is to find the describing system for a given end-result of an L-system - using both Bacterial Programming and other related algorithms. To achieve this, several well-known L-systems were considered, their building symbols taken as the inputs for each algorithm, and the evolution results were compared with the formal definition of each system. The results indicate that this is indeed a viable area of research, as both Bacterial Programming and other different algorithms could be fitted to reverse engineer all of the considered systems.", "venue": "2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-18", "journal": {"pages": "000043-000048", "name": "2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)"}, "authors": [{"authorId": "2151291475", "name": "Tibor Eszes"}, {"authorId": "1762606", "name": "J\u00e1nos Botzheim"}]}, {"paperId": "33076a8afcb8cab1258762459e3493f1bbd4a8a2", "externalIds": {"PubMedCentral": "8598398", "DOI": "10.1007/s10708-021-10549-5", "CorpusId": 244401508, "PubMed": "34812217"}, "corpusId": 244401508, "publicationVenue": {"id": "3945ce8c-fa3e-49e3-a723-2c96a64da989", "name": "GeoJournal", "type": "journal", "issn": "0343-2521", "url": "https://link.springer.com/journal/10708", "alternate_urls": ["https://www.jstor.org/journal/geojournal", "http://www.springerlink.com/content/102895/"]}, "url": "https://www.semanticscholar.org/paper/33076a8afcb8cab1258762459e3493f1bbd4a8a2", "title": "Assessing internet and web services based webdom and virtual web-data-centric geographical study", "abstract": null, "venue": "GeoJournal", "year": 2021, "referenceCount": 66, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10708-021-10549-5.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-18", "journal": {"volume": "87", "pages": "4991 - 5005", "name": "Geojournal"}, "authors": [{"authorId": "10124152", "name": "Abhay Sankar Sahu"}]}, {"paperId": "a3e496c48b21c122913351030e8520f00c578b6d", "externalIds": {"DOI": "10.1080/02508060.2021.2005332", "CorpusId": 245290473}, "corpusId": 245290473, "publicationVenue": {"id": "16e7e056-c3c4-4538-a4b1-0818228342f3", "name": "Water international", "type": "journal", "alternate_names": ["Water int", "Water Int", "Water International"], "issn": "0250-8060", "url": "http://www.tandfonline.com/loi/rwin20"}, "url": "https://www.semanticscholar.org/paper/a3e496c48b21c122913351030e8520f00c578b6d", "title": "Water resource prospects for the next 50 years on the water planet: personal perspectives on a shared history from Earth Day, the Fourth Industrial Revolution and One Health to the futures of alternative energy, bioconvergence and quantum computing", "abstract": "ABSTRACT The history and the future of water resource management as well as the endeavours that it influences are inextricably woven into the fabric of the past, current and future states of all life on our watery planet. From the first Earth Day in 1970 and the founding of the International Water Resources Association (IWRA) in 1971 to the development of modern biotechnology applications and alternative energy sources across subsequent decades, this paper reflects on these and other historical underpinnings of how we manage the use of our essential water resources now and might hope to in the future.", "venue": "Water international", "year": 2021, "referenceCount": 151, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/02508060.2021.2005332?needAccess=true", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-17", "journal": {"volume": "46", "pages": "1158 - 1186", "name": "Water International"}, "authors": [{"authorId": "81501813", "name": "W. Jones"}]}, {"paperId": "2d4a6a04dc1b137276a511ca97066054400aef2d", "externalIds": {"DBLP": "journals/hhci/Hancock22", "DOI": "10.1080/07370024.2021.1970556", "CorpusId": 244281247}, "corpusId": 244281247, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d4a6a04dc1b137276a511ca97066054400aef2d", "title": "Avoiding adverse autonomous agent actions", "abstract": "Few today would dispute that the age of autonomous machines is nearly upon us (cf., Kurzweil, 2005; Moravec, 1988), if it is not already. While it is doubtful that one can identify any fully autonomous machine system at this point in time, especially one that is openly and publicly acknowledged to be so, it is far less debatable that our present line of technological evolution is leading toward this eventuality (Endsley, 2017; Hancock, 2017a). It is this specter of the consequences of even existentially threatening adverse events, emanating from these penetrative autonomous systems, which is the focus of the present work. The impending and imperative question is what we intend to do about these prospective challenges? As with essentially all of human discourse, we can imagine two sides to this question. One side is represented by an optimistic vision of a near utopian future, underwritten by AI-support and some inherent degree of intrinsic benevolence. The opposing vision promulgates a dystopian nightmare in which machines have gained almost total ascendency and only a few \u201cplucky\u201d humans remain. The latter is most especially a featured trope of the human heroic narrative (Campbell, 1949). It will be most probably the case that neither of the extremes on this putative spectrum of possibilities will represent the eventual reality that we will actually experience. However, the ground rules are now in the process of being set which will predispose us toward one of these directions over the other (Feng et al., 2016; Hancock, 2017a). Traditionally, many have approached this general form of technological inquiry by asking questions about strengths, weaknesses, threats, and opportunities. Consequently, it is within this general framework that this present work is offered. What follows are some overall considerations of the balance of the value of such autonomous systems\u2019 inauguration and penetration. These observations provide the bedrock from which to consider the specific strengths, weaknesses, threats (risks), and promises (opportunity) dimensions. The specific consideration of the application of the protective strategies of the well-known hierarchy of controls (Haddon, 1973) then acts as a final prefatory consideration to the concluding discussion which examines the adverse actions of autonomous technological systems as a potential human existential threat. The term autonomy is one that has been, and still currently is, the subject of much attention, debate, and even abuse (and see Ezenkwu & Starkey, 2019). To an extent, the term seems to be flexible enough to encompass almost whatever the proximal user requires of it. For example, a simple, descriptive word-cloud (Figure 1), illustrates the various terminologies that surrounds our present use of this focal term. It is not the present purpose here to engage in a long, polemic and potentially unedifying dispute specifically about the term\u2019s definition. This is because the present concern is with autonomous technological systems, and not about the greater meaning of autonomy per se, either as a property or as a process. The definition which is adopted here is that: \u201cautonomous systems are generative and learn, evolve, and permanently change their functional capacities as a result of the input of operational and contextual information. Their actions necessarily become more", "venue": "Hum. Comput. Interact.", "year": 2021, "referenceCount": 126, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/07370024.2021.1970556?needAccess=true", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-16", "journal": {"volume": "37", "pages": "211 - 236", "name": "Human\u2013Computer Interaction"}, "authors": [{"authorId": "143605034", "name": "P. Hancock"}]}, {"paperId": "523f4c7248450e0aeb9f0e1430932269a8aa4831", "externalIds": {"DOI": "10.1007/s11845-021-02853-3", "CorpusId": 244120010, "PubMed": "34783968"}, "corpusId": 244120010, "publicationVenue": {"id": "b3a217d4-f456-4394-9e5b-b39ab19d1b3e", "name": "Irish Journal of Medical Science", "type": "journal", "alternate_names": ["Ir J Med Sci"], "issn": "0021-1265", "url": "https://www.springer.com/medicine/internal/journal/11845", "alternate_urls": ["http://www.springer.com/medicine/internal/journal/11845", "https://link.springer.com/journal/11845", "http://link.springer.com/journal/12628"]}, "url": "https://www.semanticscholar.org/paper/523f4c7248450e0aeb9f0e1430932269a8aa4831", "title": "Artificial Intelligence: the future of medicine, or an overhyped and dangerous idea?", "abstract": null, "venue": "Irish Journal of Medical Science", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-16", "journal": {"volume": "191", "pages": "1991 - 1994", "name": "Irish Journal of Medical Science (1971 -)"}, "authors": [{"authorId": "2141310467", "name": "Shubhangi Karmakar"}]}, {"paperId": "1b1109ed7549c009738caccb4405a04373c82e51", "externalIds": {"MAG": "3212259563", "DOI": "10.1007/s00146-021-01308-8", "CorpusId": 245746878}, "corpusId": 245746878, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/1b1109ed7549c009738caccb4405a04373c82e51", "title": "Operationalising AI ethics: barriers, enablers and next steps", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 38, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01308-8.pdf", "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-15", "journal": {"name": "AI & SOCIETY"}, "authors": [{"authorId": "1751614630", "name": "J. Morley"}, {"authorId": "40901846", "name": "Libby Kinsey"}, {"authorId": "2600242", "name": "Anat Elhalal"}, {"authorId": "2110891416", "name": "Francesca Garcia"}, {"authorId": "79377716", "name": "M. Ziosi"}, {"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "492384a0fb95959811d378463f1ccbebbccdc8b1", "externalIds": {"PubMedCentral": "8634872", "DOI": "10.3389/fpsyg.2021.730112", "CorpusId": 244119544}, "corpusId": 244119544, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/492384a0fb95959811d378463f1ccbebbccdc8b1", "title": "Vocabulary: Common or Basic?", "abstract": "Neither linguistics nor psychology offers a single, unified notion of simplicity, and therefore the simplest \u201ccore\u201d layer of vocabulary is hard to define in theory and hard to pinpoint in practice. In section 1 we briefly survey the main approaches, and distinguish two that are highly relevant to lexicography: we will call these common and basic. In sections 2 and 3 we compare these approaches, and in section 4 we point the reader to Kolmogorov complexity, unfamiliar as it may be to most working psychologists, lexicographers, and educators, as the best formal means to deal with core vocabulary.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fpsyg.2021.730112/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-11-15", "journal": {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "2979211", "name": "Andr\u00e1s Kornai"}]}, {"paperId": "f027e28cdaaa56082f2e5d9fe14469e7341c1bfc", "externalIds": {"DBLP": "journals/corr/abs-2111-07263", "ArXiv": "2111.07263", "CorpusId": 244117863}, "corpusId": 244117863, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f027e28cdaaa56082f2e5d9fe14469e7341c1bfc", "title": "Code Representation Learning with Pr\u00fcfer Sequences", "abstract": "An effective and efficient encoding of the source code of a computer program is critical to the success of sequence-to-sequence deep neural network models for tasks in computer program comprehension, such as automated code summarization and documentation. A significant challenge is to find a sequential representation that captures the structural/syntactic information in a computer program and facilitates the training of the", "venue": "ArXiv", "year": 2021, "referenceCount": 58, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-14", "journal": {"volume": "abs/2111.07263", "name": "ArXiv"}, "authors": [{"authorId": "69893262", "name": "Tenzin Jinpa"}, {"authorId": "2145987061", "name": "Yong Gao"}]}, {"paperId": "9cb53b47412adc250e74c55fc31db970e64b08e3", "externalIds": {"DBLP": "journals/ais/Lengbeyer22", "DOI": "10.1007/s00146-021-01257-2", "CorpusId": 244092615}, "corpusId": 244092615, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/9cb53b47412adc250e74c55fc31db970e64b08e3", "title": "Dismantling the Chinese Room with linguistic tools: a framework for elucidating concept-application disputes", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 58, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-12", "journal": {"volume": "37", "pages": "1625 - 1643", "name": "AI & SOCIETY"}, "authors": [{"authorId": "116774767", "name": "L. Lengbeyer"}]}, {"paperId": "7afb7153c128a8e3fd15618648e609495bd557ef", "externalIds": {"DBLP": "conf/hai/FarahSIG21", "DOI": "10.1145/3472307.3484677", "CorpusId": 243864766}, "corpusId": 243864766, "publicationVenue": {"id": "c3940b41-03f7-4e15-8a48-20b569de9625", "name": "International Conference on Human-Agent Interaction", "type": "conference", "alternate_names": ["HAI", "Int Conf Human-agent Interact", "Human-Agent Interaction", "Hum Asp Ambient Intell", "Human-agent Interact", "Human Aspects in Ambient Intelligence"]}, "url": "https://www.semanticscholar.org/paper/7afb7153c128a8e3fd15618648e609495bd557ef", "title": "Conveying the Perception of Humor Arising from Ambiguous Grammatical Constructs in Human-Chatbot Interaction", "abstract": "Chatbots have long been advocated for computer-assisted language learning systems to support learners with conversational practice. A particular challenge in such systems is explaining mistakes stemming from ambiguous grammatical constructs. Misplaced modifiers, for instance, do not make sentences ungrammatical, but introduce ambiguity through the misplacement of an adverb or prepositional phrase. In certain cases, the ambiguity gives rise to humor, which can serve to illustrate the mistake itself. We conducted an online experiment with 400 native English speakers to explore the use of a chatbot to harness such humor. In an interaction resembling an advanced grammar exercise, the chatbot presented participants with a phrase containing a misplaced modifier, explained the ambiguity in the phrase, acknowledged (or ignored) the humor that the ambiguity gave rise to, and suggested a correction. Participants then completed a questionnaire, rating the chatbot with respect to ten traits. A quantitative analysis showed a significant increase in how participants rated the chatbot\u2019s personality, humor, and friendliness when it acknowledged the humor arising from the misplaced modifier. This effect was observed whether the acknowledgment was conveyed using verbal, nonverbal (emoji), or mixed cues.", "venue": "International Conference on Human-Agent Interaction", "year": 2021, "referenceCount": 59, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://infoscience.epfl.ch/record/288626/files/farah2021conveying.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-11-09", "journal": {"name": "Proceedings of the 9th International Conference on Human-Agent Interaction"}, "authors": [{"authorId": "6456697", "name": "J. C. Farah"}, {"authorId": "2148414522", "name": "Vandit Sharma"}, {"authorId": "48704546", "name": "Sandy Ingram"}, {"authorId": "145432296", "name": "D. Gillet"}]}, {"paperId": "086cbbbb174075cc2961c2135809bc547c12f2b8", "externalIds": {"ArXiv": "2111.04165", "DOI": "10.1007/978-3-030-80083-3_5", "CorpusId": 243847742}, "corpusId": 243847742, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/086cbbbb174075cc2961c2135809bc547c12f2b8", "title": "On the Limits of Design: What Are the Conceptual Constraints on Designing Artificial Intelligence for Social Good?", "abstract": null, "venue": "", "year": 2021, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2111.04165", "status": null}, "fieldsOfStudy": ["Economics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-07", "journal": null, "authors": [{"authorId": "2121755173", "name": "Jakob Mokander"}]}, {"paperId": "b1d6336ccca15489a3b4aec035448f921321fde5", "externalIds": {"DOI": "10.1007/s11042-021-11709-y", "CorpusId": 254863124}, "corpusId": 254863124, "publicationVenue": {"id": "477368e9-7a8e-475a-8c93-6d623797fd06", "name": "Multimedia tools and applications", "type": "journal", "alternate_names": ["Multimedia Tools and Applications", "Multimedia Tool Appl", "Multimedia tool appl"], "issn": "1380-7501", "url": "https://www.springer.com/computer/information+systems+and+applications/journal/11042", "alternate_urls": ["https://link.springer.com/journal/11042"]}, "url": "https://www.semanticscholar.org/paper/b1d6336ccca15489a3b4aec035448f921321fde5", "title": "Chatbot in Arabic language using seq to seq model", "abstract": null, "venue": "Multimedia tools and applications", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-06", "journal": {"volume": "81", "pages": "2859 - 2871", "name": "Multimedia Tools and Applications"}, "authors": [{"authorId": "1712211978", "name": "M. Boussakssou"}, {"authorId": "2011904", "name": "H. Ezzikouri"}, {"authorId": "90643624", "name": "M. Erritali"}]}, {"paperId": "e17cf46ffac9dd3b19bf2731a9cb025c39c2fa20", "externalIds": {"DOI": "10.1007/s11229-021-03421-z", "CorpusId": 243829068}, "corpusId": 243829068, "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, "url": "https://www.semanticscholar.org/paper/e17cf46ffac9dd3b19bf2731a9cb025c39c2fa20", "title": "Beyond the limits of imagination: abductive inferences from imagined phenomena", "abstract": null, "venue": "Synthese", "year": 2021, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-05", "journal": {"volume": "199", "pages": "14293 - 14315", "name": "Synthese"}, "authors": [{"authorId": "145822349", "name": "M. Traynor"}]}, {"paperId": "a4b152afb11ed1ed390265520526cd2327f9c841", "externalIds": {"DBLP": "journals/corr/abs-2112-03877", "ArXiv": "2112.03877", "CorpusId": 244920771}, "corpusId": 244920771, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a4b152afb11ed1ed390265520526cd2327f9c841", "title": "Is Complexity Important for Philosophy of Mind?", "abstract": "Even though it is only a thesis, not just unproven, but by definition, unprovable, the Church-Turing thesis has spearheaded research in computability for decades. At its core, it is a definition, whose task is to define in precise terms what it means to be \u201ccomputable\u201d. But it is not called a \u201cdefinition\u201d because it is much more than just a definition, begging to be falsified by a counterexample, much like a conjecture. It could be argued that the Church-Turing thesis is a challenge set forth to redefine computation should anything noteworthy be discovered. But nothing was. In almost a century now, many new models of computation have arisen, and all were eventually proven to be equivalent to the Turing machine. Although there were many more or less simplistic attempts to relate Turing machines to minds, we will argue that the simpler arguments along those lines do little to clarify the concept of mind. As for more complex arguments, they cannot be provided right away, for a rough framework along the lines of Ashby-style cybernetics [Ashby, 1956] is to be acquired in order to put forth any sensical, i.e. non-dualist, comparison between minds and machines. Once this is done, the notions of computational complexity, and its generalization \u2013 metaphysical complexity \u2013 can be rediscovered in the mind, and, surprisingly, in society. Even though computation-in-society is traditionally viewed as a strong cybernetic moment, it is not that unique to cybernetics and has become commonplace in mainstream AI as well (cf. [Minsky, 1986]). One could argue that this, quintessentially non-dualist position has strange consequences, and in fact, one would be right. But we consider this not as", "venue": "ArXiv", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-02", "journal": {"volume": "abs/2112.03877", "name": "ArXiv"}, "authors": [{"authorId": "101832726", "name": "Kristina \u0160ekrst"}, {"authorId": "3422664", "name": "S. Skansi"}]}, {"paperId": "1c28a69656e844ab391416ed69557c26bf5c93b2", "externalIds": {"DOI": "10.1016/j.cjca.2021.11.009", "CorpusId": 244639958, "PubMed": "34838700"}, "corpusId": 244639958, "publicationVenue": {"id": "ab17701b-8ac0-4766-93ca-78d73ce88cd1", "name": "Canadian Journal of Cardiology", "type": "journal", "alternate_names": ["Can J Cardiol"], "issn": "0828-282X", "url": "https://www.onlinecjc.ca/", "alternate_urls": ["http://www.pulsus.com/CARDIOL/index.htm", "http://www.sciencedirect.com/science/journal/0828282X"]}, "url": "https://www.semanticscholar.org/paper/1c28a69656e844ab391416ed69557c26bf5c93b2", "title": "A primer on the present state and future prospects for machine learning and artificial intelligence applications in cardiology.", "abstract": null, "venue": "Canadian Journal of Cardiology", "year": 2021, "referenceCount": 87, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.onlinecjc.ca/article/S0828282X2100903X/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-11-01", "journal": {"name": "The Canadian journal of cardiology"}, "authors": [{"authorId": "6543527", "name": "C. Manlhiot"}, {"authorId": "2120038947", "name": "J. Van den Eynde"}, {"authorId": "1826359", "name": "S. Kutty"}, {"authorId": "2998749", "name": "H. Ross"}]}, {"paperId": "3cb86721fc680e1006aa80f9121bcf6207f4a137", "externalIds": {"DOI": "10.1016/j.techfore.2021.121318", "CorpusId": 244433405}, "corpusId": 244433405, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3cb86721fc680e1006aa80f9121bcf6207f4a137", "title": "Artificial intelligence: Catalyst or barrier on the path to sustainability?", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2021, "referenceCount": 85, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-11-01", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "2006370036", "name": "A. Kopka"}, {"authorId": "120576394", "name": "Nils Grashof"}]}, {"paperId": "00941d147be2699dc7102c7a2190baeaf2822ef9", "externalIds": {"PubMedCentral": "8568505", "DOI": "10.1055/a-1522-3029", "CorpusId": 243776061, "PubMed": "34754270"}, "corpusId": 243776061, "publicationVenue": {"id": "cf50a44e-a88d-48ee-b09a-83784921411c", "name": "Geburtshilfe und Frauenheilkunde", "type": "journal", "alternate_names": ["Geburtshilfe Frauenheilkd", "Geburtshilfe Und Frauenheilkunde"], "issn": "0016-5751", "alternate_issns": ["1615-3359"], "url": "https://www.thieme-connect.de/products/ejournals/journal/10.1055/s-00000020"}, "url": "https://www.semanticscholar.org/paper/00941d147be2699dc7102c7a2190baeaf2822ef9", "title": "The Use of Artificial Intelligence in Automation in the Fields of Gynaecology and Obstetrics \u2013 an Assessment of the State of Play", "abstract": "The long-awaited progress in digitalisation is generating huge amounts of medical data every day, and manual analysis and targeted, patient-oriented evaluation of this data is becoming increasingly difficult or even infeasible. This state of affairs and the associated, increasingly complex requirements for individualised precision medicine underline the need for modern software solutions and algorithms across the entire healthcare system. The utilisation of state-of-the-art equipment and techniques in almost all areas of medicine over the past few years has now indeed enabled automation processes to enter \u2013 at least in part \u2013 into routine clinical practice. Such systems utilise a wide variety of artificial intelligence (AI) techniques, the majority of which have been developed to optimise medical image reconstruction, noise reduction, quality assurance, triage, segmentation, computer-aided detection and classification and, as an emerging field of research, radiogenomics. Tasks handled by AI are completed significantly faster and more precisely, clearly demonstrated by now in the annual findings of the ImageNet Large-Scale Visual Recognition Challenge (ILSVCR), first conducted in 2015, with error rates well below those of humans. This review article will discuss the potential capabilities and currently available applications of AI in gynaecological-obstetric diagnostics. The article will focus, in particular, on automated techniques in prenatal sonographic diagnostics.", "venue": "Geburtshilfe und Frauenheilkunde", "year": 2021, "referenceCount": 98, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.thieme-connect.de/products/ejournals/pdf/10.1055/a-1522-3029.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-11-01", "journal": {"volume": "81", "pages": "1203 - 1216", "name": "Geburtshilfe und Frauenheilkunde"}, "authors": [{"authorId": "1910815", "name": "J. Weichert"}, {"authorId": "1662776561", "name": "A. Welp"}, {"authorId": "2137467792", "name": "Jann Lennard Scharf"}, {"authorId": "66851372", "name": "C. Dracopoulos"}, {"authorId": "2077567874", "name": "W. Becker"}, {"authorId": "48342345", "name": "M. Gembicki"}]}, {"paperId": "181a971a94402cd005d27abeea22ef6bca24ca50", "externalIds": {"PubMedCentral": "8642128", "DOI": "10.7759/cureus.19235", "CorpusId": 243484395, "PubMed": "34877212"}, "corpusId": 243484395, "publicationVenue": {"id": "87c855fc-c59a-4443-832a-e5b1ca14b9f3", "name": "Cureus", "type": "journal", "issn": "2168-8184", "url": "https://www.cureus.com/"}, "url": "https://www.semanticscholar.org/paper/181a971a94402cd005d27abeea22ef6bca24ca50", "title": "A Review of Applications of Artificial Intelligence in Gastroenterology", "abstract": "Artificial intelligence (AI) is the science that deals with creating \u2018intelligent machines\u2019. AI has revolutionized medicine because of its application in several fields across medicine like radiology, neurology, ophthalmology, orthopedics and gastroenterology. In this review, we intend to summarize the basics of AI, the application of AI in various gastrointestinal pathologies till date as well as challenges/ problems related to the application of AI in medicine. Literature search using keywords like artificial intelligence, gastroenterology, applications, etc. were used. The literature search was done using Google Scholar, PubMed and ScienceDirect. All the relevant articles were gathered and relevant data were extracted from them. We concluded AI has achieved major feats in the past few decades. It has helped clinicians in diagnosing complex diseases, managing treatments as well as in predicting outcomes, all in all, which helps doctors from all over the globe in dispensing better healthcare services.", "venue": "Cureus", "year": 2021, "referenceCount": 40, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.cureus.com/articles/74103-a-review-of-applications-of-artificial-intelligence-in-gastroenterology.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-11-01", "journal": {"volume": "13", "name": "Cureus"}, "authors": [{"authorId": "117311809", "name": "K. Nawab"}, {"authorId": "117322839", "name": "Ravi Athwani"}, {"authorId": "10063288", "name": "Awais Naeem"}, {"authorId": "3312492", "name": "M. Hamayun"}, {"authorId": "2138139074", "name": "Momna Wazir"}]}, {"paperId": "e968be08741743a351d1686ad383a162f18f796e", "externalIds": {"DOI": "10.1017/9781009036719.007", "CorpusId": 240174075}, "corpusId": 240174075, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e968be08741743a351d1686ad383a162f18f796e", "title": "Artificial Intelligence", "abstract": "Artificial Intelligence may be defined as intelligence displayed by machines, systems or agents or by entities other than living beings. Apparently, the term seems simple but the definition bears deeper connotations. The terms intelligence and creativity have long been the prerogatives associated with the humans or have been the privileges enjoyed by them since the dawn of the creation. The views \u2018creativity is computation\u2019 or \u2018cognition is computation\u2019 and \u2018mind as machine\u2019 has offset the traditional theories, assumptions and interpretations held so far in the philosophy and theory of mind. AI\u2019s push to impart intelligence to non-human entities to enable them to behave intelligently and creatively or as Boden would put it \u201cto make computers do the sort of things that minds can do\u201d (Boden 1) has challenged the very traditional fabric of our perception and comprehension, conception and construction related to our learning and living dispensations.", "venue": "Artificial Economics", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-31", "journal": {"name": "Artificial Economics"}, "authors": [{"authorId": "144836069", "name": "Aabid Ali"}]}, {"paperId": "432638b3e44390a054c1a32b55eee785bbb511dc", "externalIds": {"DOI": "10.32347/tit2021.42.0303", "CorpusId": 243485262}, "corpusId": 243485262, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/432638b3e44390a054c1a32b55eee785bbb511dc", "title": "The twentieth century science paradoxes", "abstract": "The isolation of hypothetical theories from the realities of living matter has caused mysticism to penetrate scientific theories. With mystical thinking, the idea of using an analytical method to solve cognitive problems does not occur. Dialectical logic, in contrast to mysticism, states the opposite: any problematic tasks of cognizing the vital processes and phenomena of the universe are solvable exclusively in an analytic way, with the only method. The author created a universal and formal theory of solving intellectual (i.e., having no previously known algorithms for solving) problems associated with the knowledge of the vital functions of natural and man-made processes in any phenomena of the universe - the Kondratenko method of axiomatic modeling, the effectiveness of which is achieved by correctly setting the problem and solving it purely formal method. The correctness of the statement of the problem means, first of all, the recognition of the failure of all hypothetical (not confirmed by the results of full-scale experimentation with the subject of knowledge) theories. This requirement, in particular, to the mathematical tools used to solve problems of cognition, it revealed paradoxes in the foundations of mathematics, which are discussed in the article. \nAt present, in the natural and applied sciences in most publications, i.e. more than 90% associated with the construction of formal theories in these sciences, the proof of theorems is carried out: \nfirstly, in a meaningful way, which contradicts the urgent requirement of philosophers of science to use exclusively formal evidence, which is a criterion for assessing the correctness and reliability of evidence; \nsecondly, in substantive evidence in 95% of cases, an exclusively standard list of tautologies is used, which by definition is incorrect for the purpose of proving theorems on phenomena and processes of the universe based on exclusively true axioms obtained as a result of full-scale experimentation with these phenomena and processes. The article deals with the paradox in the classical approach to proving theorems, which consists in the inappropriateness of generally accepted stereotypical tautologies of classical mathematics for proving theorems.", "venue": "Transfer of Innovative Technologies", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://tit.knuba.edu.ua/article/download/243481/241386", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-29", "journal": {"name": "Transfer of Innovative Technologies"}, "authors": [{"authorId": "79815445", "name": "V. Kondratenko"}]}, {"paperId": "5d8aac87d879aed91248636ca0be262dde27f9e4", "externalIds": {"DBLP": "journals/wpc/KuipersP22", "DOI": "10.1007/s11277-021-09288-0", "CorpusId": 240243277}, "corpusId": 240243277, "publicationVenue": {"id": "08d7cf5a-27a7-438e-ad01-c6724b828bfb", "name": "Wireless personal communications", "type": "journal", "alternate_names": ["Wirel pers commun", "Wirel Pers Commun", "Wireless Personal Communications"], "issn": "0929-6212", "url": "https://www.springer.com/engineering/signals/journal/11277", "alternate_urls": ["http://www.springer.com/engineering/signals/journal/11277", "https://link.springer.com/journal/11277"]}, "url": "https://www.semanticscholar.org/paper/5d8aac87d879aed91248636ca0be262dde27f9e4", "title": "Journey of Artificial Intelligence", "abstract": null, "venue": "Wireless personal communications", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-29", "journal": {"volume": "123", "pages": "3275 - 3290", "name": "Wireless Personal Communications"}, "authors": [{"authorId": "2169230677", "name": "M.M. Kuipers"}, {"authorId": "2121476948", "name": "Ramjee Prasad"}]}, {"paperId": "06a550424758d9c3766051d7cb68540f43879071", "externalIds": {"DOI": "10.1057/s41284-021-00321-2", "CorpusId": 240269765}, "corpusId": 240269765, "publicationVenue": {"id": "988bd0e3-b00a-4f42-9270-9da531d5854b", "name": "Security Journal", "type": "journal", "alternate_names": ["Secur J"], "issn": "0955-1662", "url": "http://www.palgrave-journals.com/sj/index.html", "alternate_urls": ["https://link.springer.com/journal/volumesAndIssues/41284"]}, "url": "https://www.semanticscholar.org/paper/06a550424758d9c3766051d7cb68540f43879071", "title": "Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis", "abstract": null, "venue": "Security Journal", "year": 2021, "referenceCount": 102, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-29", "journal": {"volume": "35", "pages": "1328-1348", "name": "Security Journal"}, "authors": [{"authorId": "120713325", "name": "Gaudys L. Sanclemente"}]}, {"paperId": "733bcf4f2e29eb359ad4af993e1e9dc4249769b9", "externalIds": {"DBLP": "journals/sis/TongkaiMSJZ21", "DOI": "10.4108/eai.29-10-2021.171686", "CorpusId": 240249567}, "corpusId": 240249567, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/733bcf4f2e29eb359ad4af993e1e9dc4249769b9", "title": "When Artificial Intelligence Meets Printing The Evidence of Black Generation", "abstract": "Recent years wit a rapid development of new technologies. As a significant part, artificial intelligence leads to a great change of our life. While the color printing technique which is struggled with obstacles such as color reproducing now finds a revolutionary approach to overcome the difficulties. The new method significantly improved the accuracy although it requires the parallel computing process to deal with the complexity of computing. This paper firstly introduces the brief histories and the basics of black generation technique of the printing process and artificial intelligence. Then comes to the traditional techniques of black generation. In the next part we suggest an artificial intelligence approach to black generation. At last we make a comparison between various methods and point out the advantages of the new approach. Received on 21 October 2021; accepted on 28 October 2021; published on 29 October 2021", "venue": "EAI Endorsed Trans. Scalable Inf. Syst.", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://eudl.eu/pdf/10.4108/eai.29-10-2021.171686", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-29", "journal": {"volume": "8", "pages": "e10", "name": "EAI Endorsed Trans. Scalable Inf. Syst."}, "authors": [{"authorId": "1689106196", "name": "Xu Tongkai"}, {"authorId": "2136457563", "name": "Li Manjiang"}, {"authorId": "1392224456", "name": "Liu Shanmin"}, {"authorId": "2136453546", "name": "Xie Jiliang"}, {"authorId": "2136462419", "name": "Yuan Zhende"}]}, {"paperId": "8c7e3e50549a8e3d889fcbf31ba88dfc41015613", "externalIds": {"PubMedCentral": "8586539", "DOI": "10.3389/fpsyg.2021.730985", "CorpusId": 240075726, "PubMed": "34777110"}, "corpusId": 240075726, "publicationVenue": {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, "url": "https://www.semanticscholar.org/paper/8c7e3e50549a8e3d889fcbf31ba88dfc41015613", "title": "The Modified Imitation Game: A Method for Measuring Interactional Expertise", "abstract": "The study of the sociology of scientific knowledge distinguishes between contributory and interactional experts. Contributory experts have practical expertise\u2014they can \u201cwalk the walk.\u201d Interactional experts have internalized the tacit components of expertise\u2014they can \u201ctalk the talk\u201d but are not able to reliably \u201cwalk the walk.\u201d Interactional expertise permits effective communication between contributory experts and others (e.g., laypeople), which in turn facilitates working jointly toward shared goals. Interactional expertise is attained through long-term immersion into the expert community in question. To assess interactional expertise, researchers developed the imitation game\u2014a variant of the Turing test\u2014to test whether a person, or a particular group, possesses interactional expertise of another. The imitation game, which has been used mainly in sociology to study the social nature of knowledge, may also be a useful tool for researchers who focus on cognitive aspects of expertise. In this paper, we introduce a modified version of the imitation game and apply it to examine interactional expertise in the context of blindness. Specifically, we examined blind and sighted individuals\u2019 ability to imitate each other in a street-crossing scenario. In Phase I, blind and sighted individuals provided verbal reports of their thought processes associated with crossing a street\u2014once while imitating the other group (i.e., as a pretender) and once responding genuinely (i.e., as a non-pretender). In Phase II, transcriptions of the reports were judged as either genuine or imitated responses by a different set of blind and sighted participants, who also provided the reasoning for their decisions. The judges comprised blind individuals, sighted orientation-and-mobility specialists, and sighted individuals with infrequent socialization with blind individuals. Decision data were analyzed using probit mixed models for signal-detection-theory indices. Reasoning data were analyzed using natural-language-processing (NLP) techniques. The results revealed evidence that interactional expertise (i.e., relevant tacit knowledge) can be acquired by immersion in the group that possesses and produces the expert knowledge. The modified imitation game can be a useful research tool for measuring interactional expertise within a community of practice and evaluating practitioners\u2019 understanding of true experts.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 46, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fpsyg.2021.730985/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-29", "journal": {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": "3219950", "name": "Guler Arsal"}, {"authorId": "3153660", "name": "J. Suss"}, {"authorId": "143852095", "name": "P. Ward"}, {"authorId": "15712299", "name": "Vivian P. Ta"}, {"authorId": "2417653", "name": "Ryan V. Ringer"}, {"authorId": "143905716", "name": "David W. Eccles"}]}, {"paperId": "a3ab3d15e07cbb3437f8467e7907964dd925d398", "externalIds": {"DBLP": "journals/corr/abs-2110-13817", "CorpusId": 239885611}, "corpusId": 239885611, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a3ab3d15e07cbb3437f8467e7907964dd925d398", "title": "Real time Simulation of Gird-connected Photovoltaic Multilevel Inverter using Hybrid GA/PSO Optimization Algorithm", "abstract": "This paper presents a new real-time intelligent optimization algorithm to minimize the voltage harmonics of a multilevel photovoltaic inverter. Hybrid Genetic algorithm /Particle swarm optimization algorithm is employed in a real-time simulation to identify the best fire angels of the multilevel inverter to eliminate any destructive effect, such as dc voltage variations and changes in line and dc-link resistors. The dual objective function of harmonic minimization and voltage regulation is considered in this real-time simulation. This approach can be applied to any multilevel inverter with various numbers of levels. The validity of the proposed algorithm is proven by real-time simulation of seven and an eleven-level inverter.", "venue": "ArXiv", "year": 2021, "referenceCount": 29, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "abs/2110.13817", "name": "ArXiv"}, "authors": [{"authorId": "145522709", "name": "H. Zolfaghari"}, {"authorId": "2712945", "name": "H. Momeni"}, {"authorId": "2064630195", "name": "H. Karimi"}]}, {"paperId": "ece0e4209ca84ecb10216f58074d5d64c7ca7e0b", "externalIds": {"DOI": "10.46294/ulplr-rdulp.v15i1.7940", "CorpusId": 240325033}, "corpusId": 240325033, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ece0e4209ca84ecb10216f58074d5d64c7ca7e0b", "title": "A Intelig\u00eancia Artificial nos Contratos: Uma Hip\u00f3tese Poss\u00edvel?", "abstract": "O texto visa analisar se, dada a realidade brasileira, seria poss\u00edvel inserir nos contratos privados sistemas de Intelig\u00eancia Artificial - IA. Primeiro, ser\u00e3o analisados \u200b\u200bos conceitos existentes sobre IA, bem como a dificuldade em conceitu\u00e1-la de uma \u00fanica maneira. O texto abordar\u00e1, atrav\u00e9s do conceito de contrato, a possibilidade e as vantagens da utiliza\u00e7\u00e3o da IA nos contratos privados.\n\nTal ideia foi, primeiramente, publicada por Gustavo Tepedino e Rodrigo da Guia Silva que, ent\u00e3o, surgiu como inspira\u00e7\u00e3o para a elabora\u00e7\u00e3o do presente trabalho, com a proposta de tentar ir al\u00e9m.\n\nPara os autores, em sua ideia original, a IA poderia ser utilizada como instrumento de fixa\u00e7\u00e3o de pre\u00e7os, proporcionando flexibilidade aos contratos, de forma a reduzir os custos de transa\u00e7\u00e3o dos contratos em decorr\u00eancia de eventuais fatos supervenientes. A IA poderia ser utilizada como forma de controle de cl\u00e1usulas de adapta\u00e7\u00e3o autom\u00e1tica, em que a cl\u00e1usula estabele\u00e7a o direito do vendedor \u00e0 revis\u00e3o do pre\u00e7o originariamente fixado caso os custos com insumos venham a ultrapassar certo patamar pr\u00e9-fixado.\n\nNo presente trabalho, se analisam outros tipos de contratos, como por exemplo os de loca\u00e7\u00e3o, em que no final de 2020 houve um reajuste significativo do IGPM havendo, inclusive, coment\u00e1rios sobre a possibilidade de reajustar os contratos. Nesse caso, por exemplo, a IA poderia ser de grande aux\u00edlio \u00e0s partes.", "venue": "ULP Law Review", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistas.ulusofona.pt/index.php/rfdulp/article/download/7940/4707", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-10-25", "journal": {"name": "ULP Law Review"}, "authors": [{"authorId": "2136744748", "name": "Dem\u00e9trio Beck da Silva Giannakos"}, {"authorId": "40280532", "name": "Wilson Engelmann"}]}, {"paperId": "d672e146bc59286821509291375ab6f20fcb5e59", "externalIds": {"DOI": "10.1007/s13347-021-00475-2", "CorpusId": 239852746}, "corpusId": 239852746, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d672e146bc59286821509291375ab6f20fcb5e59", "title": "Aliens in the Space of Reasons? On the Interaction Between Humans and Artificial Intelligent Agents", "abstract": null, "venue": "Philosophy & Technology", "year": 2021, "referenceCount": 21, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13347-021-00475-2.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-23", "journal": {"name": "Philosophy & Technology"}, "authors": [{"authorId": "1770514730", "name": "B. Heinrichs"}, {"authorId": "2135530568", "name": "Sebastian Knell"}]}, {"paperId": "914ba3fb0f5ffdd27731fdfd7e809583fe23da8a", "externalIds": {"DOI": "10.1080/00224065.2021.1987806", "CorpusId": 240357313}, "corpusId": 240357313, "publicationVenue": {"id": "fdb88bf7-5e2d-4abe-a1ba-6982c3b97ab9", "name": "Journal of QualityTechnology", "type": "journal", "alternate_names": ["Journal of Quality Technology", "J Qual", "J Qual Technol"], "issn": "0022-4065", "url": "http://www.asq.org/pub/jqt/"}, "url": "https://www.semanticscholar.org/paper/914ba3fb0f5ffdd27731fdfd7e809583fe23da8a", "title": "Artificial intelligence and statistics for quality technology: an introduction to the special issue", "abstract": "Abstract In many applied and industrial settings, the use of Artificial Intelligence (AI) for quality technology is gaining growing attention. AI refers to the broad set of techniques which replicate human cognitive and analytical skills for problem solving, including Machine Learning, Neural Networks and Deep Learning. This paper presents a brief introduction to the special issue, where AI-based solutions are presented to solve problems that are typically faced in the area of quality technology. Limits and advantages of AI-based solutions are briefly discussed to stimulate creative attention to novel solutions and new directions for future research.", "venue": "Journal of QualityTechnology", "year": 2021, "referenceCount": 101, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/00224065.2021.1987806?needAccess=true", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-20", "journal": {"volume": "53", "pages": "443 - 453", "name": "Journal of Quality Technology"}, "authors": [{"authorId": "1933862", "name": "B. Colosimo"}, {"authorId": "1471923703", "name": "Enrique del Castillo"}, {"authorId": "1401781163", "name": "L. A. Jones-Farmer"}, {"authorId": "1905257", "name": "K. Paynabar"}]}, {"paperId": "5115a963df09dd06744f8ac9abf06059942601e2", "externalIds": {"PubMedCentral": "9537212", "DOI": "10.1007/s00247-021-05177-7", "CorpusId": 239021933, "PubMed": "34664088"}, "corpusId": 239021933, "publicationVenue": {"id": "a4703d12-de7e-415b-916c-a73b1a572284", "name": "Pediatric Radiology", "type": "journal", "alternate_names": ["Pediatr Radiol"], "issn": "0301-0449", "url": "https://www.springer.com/medicine/radiology/journal/247", "alternate_urls": ["http://www.springer.com/medicine/radiology/journal/247", "https://link.springer.com/journal/247"]}, "url": "https://www.semanticscholar.org/paper/5115a963df09dd06744f8ac9abf06059942601e2", "title": "The augmented radiologist: artificial intelligence in the practice of radiology", "abstract": null, "venue": "Pediatric Radiology", "year": 2021, "referenceCount": 99, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00247-021-05177-7.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-10-19", "journal": {"volume": "52", "pages": "2074 - 2086", "name": "Pediatric Radiology"}, "authors": [{"authorId": "143751788", "name": "E. Sorantin"}, {"authorId": "2275942", "name": "M. G. Grasser"}, {"authorId": "1406738365", "name": "Ariane Hemmelmayr"}, {"authorId": "13677555", "name": "S. Tschauner"}, {"authorId": "145115635", "name": "F. Hr\u017ei\u0107"}, {"authorId": "2133330601", "name": "Veronika Weiss"}, {"authorId": "2086593131", "name": "Jana Lacekova"}, {"authorId": "1749801", "name": "Andreas Holzinger"}]}, {"paperId": "3d7f58ff3ddb47aa31f9751a2afa2509484653d0", "externalIds": {"DBLP": "conf/svr/RochaBNNV21", "DOI": "10.1145/3488162.3488214", "CorpusId": 245635379}, "corpusId": 245635379, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d7f58ff3ddb47aa31f9751a2afa2509484653d0", "title": "Autonomous Foraging of Virtual Characters with a Constructivist Cognitive Architecture", "abstract": "Immersive experiences in virtual reality simulations require natural-looking virtual characters. Autonomy researchers argue that only the agent\u2019s own experience can model their behavior. In this regard, the Constitutive Autonomy through Self-programming Hypothesis (CASH) is an effective approach to implement this model. In this paper, we contribute to the discussion of CASH within dynamic and continuous environments by developing mechanisms of memory decay, contradiction penalty, and relative valence. Such improvements aim to see how the agent might continuously reevaluate their learned schemas. The results show that our agents were able to develop autonomously into performing plausible behaviors, despite the changing environment.", "venue": "SVR", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", "journal": {"name": "Symposium on Virtual and Augmented Reality"}, "authors": [{"authorId": "2148274207", "name": "Victor Rocha"}, {"authorId": "2148481742", "name": "Louise Brandao"}, {"authorId": "2889936", "name": "Y. L. Nogueira"}, {"authorId": "1870162", "name": "J. B. C. Neto"}, {"authorId": "1872209", "name": "C. Vidal"}]}, {"paperId": "795efaa76d48cbd2ed9be71ef90c645a74d0f044", "externalIds": {"DBLP": "conf/icmi/BodurNK0F21", "DOI": "10.1145/3461615.3485399", "CorpusId": 245265576}, "corpusId": 245265576, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/795efaa76d48cbd2ed9be71ef90c645a74d0f044", "title": "ChiCo: A Multimodal Corpus for the Study of Child Conversation", "abstract": "The study of how children develop their conversational skills is an important scientific frontier at the crossroad of social, cognitive, and linguistic development with important applications in health, education, and child-oriented AI. While recent advances in machine learning techniques allow us to develop formal theories of conversational development in real-life contexts, progress has been slowed down by the lack of corpora that both approximate naturalistic interaction and provide clear access to children\u2019s non-verbal behavior in face-to-face conversations. This work is an effort to fill this gap. We introduce ChiCo (for Child Conversation), a corpus we built using an online video chat system. Using a weakly structured task (a word-guessing game), we recorded 20 conversations involving either children in middle childhood (i.e., 6 to 12 years old) interacting with their caregivers (condition of interest) or the same caregivers interacting with other adults (a control condition), resulting in 40 individual recordings. Our annotation of these videos has shown that the frequency of children\u2019s use of gaze, gesture and facial expressions mirrors that of adults. Future modeling research can capitalize on this rich behavioral data to study how both verbal and non-verbal cues contribute to the development of conversational coordination.", "venue": "ICMI Companion", "year": 2021, "referenceCount": 31, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://psyarxiv.com/uzfes/download", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", "journal": {"name": "Companion Publication of the 2021 International Conference on Multimodal Interaction"}, "authors": [{"authorId": "1659535087", "name": "Kubra Bodur"}, {"authorId": "1387994359", "name": "Mitja Nikolaus"}, {"authorId": "2145978779", "name": "Fatima Kassim"}, {"authorId": "2670202", "name": "Laurent Pr\u00e9vot"}, {"authorId": "2676559", "name": "Abdellah Fourtassi"}]}, {"paperId": "a0c4294fdea9daa451a7de47dfa7c3bb5e0d652d", "externalIds": {"DBLP": "conf/icmi/ParkPOLLLZ21", "ArXiv": "2201.04990", "DOI": "10.1145/3462244.3479932", "CorpusId": 238992582}, "corpusId": 238992582, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0c4294fdea9daa451a7de47dfa7c3bb5e0d652d", "title": "Toddler-Guidance Learning: Impacts of Critical Period on Multimodal AI Agents", "abstract": "Critical periods are phases during which a toddler\u2019s brain develops in spurts. To promote children\u2019s cognitive development, proper guidance is critical in this stage. However, it is not clear whether such a critical period also exists for the training of AI agents. Similar to human toddlers, well-timed guidance and multimodal interactions might significantly enhance the training efficiency of AI agents as well. To validate this hypothesis, we adapt this notion of critical periods to learning in AI agents and investigate the critical period in the virtual environment for AI agents. We formalize the critical period and Toddler-guidance learning in the reinforcement learning (RL) framework. Then, we built up a toddler-like environment with VECA toolkit to mimic human toddlers\u2019 learning characteristics. We study three discrete levels of mutual interaction: weak-mentor guidance (sparse reward), moderate mentor guidance (helper-reward), and mentor demonstration (behavioral cloning). We also introduce the EAVE dataset consisting of 30,000 real-world images to fully reflect the toddler\u2019s viewpoint. We evaluate the impact of critical periods on AI agents from two perspectives: how and when they are guided best in both uni- and multimodal learning. Our experimental results show that both uni- and multimodal agents with moderate mentor guidance and critical period on 1 million and 2 million training steps show a noticeable improvement. We validate these results with transfer learning on the EAVE dataset and find the performance advancement on the same critical period and the guidance.", "venue": "ICMI", "year": 2021, "referenceCount": 56, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2201.04990", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", "journal": {"name": "Proceedings of the 2021 International Conference on Multimodal Interaction"}, "authors": [{"authorId": "2109220128", "name": "Junseok Park"}, {"authorId": "73758722", "name": "Kwanyoung Park"}, {"authorId": "2087142998", "name": "Hyunseok Oh"}, {"authorId": "2110880154", "name": "Ganghun Lee"}, {"authorId": "2152165744", "name": "M. Lee"}, {"authorId": "2145418994", "name": "Youngki Lee"}, {"authorId": "1692756", "name": "Byoung-Tak Zhang"}]}, {"paperId": "8d8bd41728a1cecd97b73e6454ff96887c8932ce", "externalIds": {"DOI": "10.33965/icwi_ac2021_202109r030", "CorpusId": 250238158}, "corpusId": 250238158, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8d8bd41728a1cecd97b73e6454ff96887c8932ce", "title": "GENOMIC DATA ANALYSIS: CONCEPTUAL FRAMEWORK FOR THE APPLICATION OF ARTIFICIAL INTELLIGENCE IN PERSONALIZED TREATMENT OF ONCOLOGY PATIENTS", "abstract": "Oncology is one of the most dynamic branches of medicine. As a result of numerous oncology studies, there has been a significant increase in scientific and clinical data that the human brain cannot store. Advances in artificial intelligence (AI) technology have led to its rapid clinical application. In this paper, we wanted to see the role of the use of artificial intelligence (AI) in oncology. We conducted an unsystematic search of databases (Pub Med, MEDLINE, and Google Scholar) using the keywords: intelligence, From a large number of articles available to us, we singled out review articles and clinical trial results according to their clarity and innovation regarding the use of artificial intelligence in oncology. Of particular importance to us was the ability to apply their results in everyday clinical work. The possibilities of using artificial intelligence in oncology are innumerable. Thus, AI can be used for diagnostic purposes (malignant screening, histopathology, and molecular diagnostics), therapeutic purposes (personalized treatment, prediction of treatment side effects and response to therapy, treatment decisions) as well as for prognostic purposes (risk stratification, 5-year survival, monitoring). The implementation of AI in clinical practice presents new challenges for clinicians. Namely, in the era of evidence-based and patient-centered medicine, they will have to master statistical as well as computer skills in addition to clinical ones. Therefore, it is necessary to start educating future doctors about the importance of AI in medicine as soon as possible.", "venue": "Proceedings of the International Conferences on WWW/Internet 2021 and Applied Computing 2021", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.iadisportal.org/components/com_booklibrary/ebooks/202109R030.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2021-10-13", "journal": {"name": "Proceedings of the International Conferences on WWW/Internet 2021 and Applied Computing 2021"}, "authors": [{"authorId": "2005931502", "name": "R. Kelemeni\u0107-Dra\u017ein"}, {"authorId": "1940477", "name": "L. Luic"}]}, {"paperId": "0cbb3c1a695b2b1ab724565d3656c454049d06b6", "externalIds": {"DOI": "10.3390/min11101118", "CorpusId": 242591161}, "corpusId": 242591161, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0cbb3c1a695b2b1ab724565d3656c454049d06b6", "title": "AI4R2R (AI for Rock to Revenue): A Review of the Applications of AI in Mineral Processing", "abstract": "In the last few years, jargon, such as machine learning (ML) and artificial intelligence (AI), have been ubiquitous in both popular science media as well as the academic literature. Many industries have tried the current suite of ML and AI algorithms with various degrees of success. Mineral processing, as an industry, is looking at AI for two reasons. First of all, as with other industries, it is pertinent to know if AI algorithms can be used to enhance productivity. The second reason is specific to the mining industry. Of late, the grade of ores is reducing, and the demand for ethical mining (with as little effect on ecology as possible) is increasing. Thus, mineral processing industries also want to explore the possible use of AI in solving these challenges. In this review paper, first, the challenges in mineral processing that can potentially be solved by AI are presented. Then, some of the most pertinent developments in the domain of ML and AI (applied in the domain of mineral processing) are discussed. Lastly, a top-level modus operandi is presented for a mineral processing industry that might want to explore the possibilities of using AI in its processes. Following are some of the new paradigms added by this review. This review presents a holistic view of the domain of mineral processing with an AI lens. It is also one of the first reviews in this domain to thoroughly discuss the use of AI in ethical, green, and sustainable mineral processing. The AI process proposed in this paper is a comprehensive one. To ensure the relevance to industry, the flow was made agile with the spiral system engineering flow. This is expected to drive rapid and agile investigation of the potential of applying ML and AI in different mineral processing industries.", "venue": "Minerals", "year": 2021, "referenceCount": 170, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2075-163X/11/10/1118/pdf?version=1634711235", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-10-12", "journal": {"name": "Minerals"}, "authors": [{"authorId": "1823937061", "name": "A. Mishra"}]}, {"paperId": "31cc7b4a2f44c59cc36173522bf0f20e177a76a0", "externalIds": {"ArXiv": "2110.04942", "DBLP": "journals/corr/abs-2110-04942", "CorpusId": 238583533}, "corpusId": 238583533, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/31cc7b4a2f44c59cc36173522bf0f20e177a76a0", "title": "Application of Neural Network in Optimization of Chemical Process", "abstract": "Artificial neural network (ANN) has been widely used due to its strong nonlinear mapping ability, fault tolerance and self-learning ability. This article summarizes the development history of artificial neural networks, introduces three common neural network types, BP neural network, RBF neural network and convolutional neural network, and focuses on the practical application in chemical process optimization, especially the results achieved in multi-objective control optimization and process parameter improvement.", "venue": "ArXiv", "year": 2021, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-11", "journal": {"volume": "abs/2110.04942", "name": "ArXiv"}, "authors": [{"authorId": "2142046258", "name": "Fei Liang"}, {"authorId": "2146343555", "name": "Taowen Zhang"}]}, {"paperId": "cc44efb947138e36ffff244947822bb5f86dabb4", "externalIds": {"DBLP": "journals/corr/abs-2110-04203", "ArXiv": "2110.04203", "CorpusId": 238531521}, "corpusId": 238531521, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc44efb947138e36ffff244947822bb5f86dabb4", "title": "Toward a Human-Level Video Understanding Intelligence", "abstract": "We aim to develop an AI agent that can watch video clips and have a conversation with human about the video story. Devel-oping video understanding intelligence is a signi\ufb01cantly chal- lenging task, and evaluation methods for adequately measuring and analyzing the progress of AI agent are lacking as well. In this paper, we propose the Video Turing Test to provide effective and practical assessments of video understanding in- telligence as well as human-likeness evaluation of AI agents. We de\ufb01ne a general format and procedure of the Video Tur- ing Test and present a case study to con\ufb01rm the effectiveness and usefulness of the proposed test.", "venue": "ArXiv", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-08", "journal": {"volume": "abs/2110.04203", "name": "ArXiv"}, "authors": [{"authorId": "15353659", "name": "Y. Heo"}, {"authorId": "2108732644", "name": "Min Whoo Lee"}, {"authorId": "117172343", "name": "Seongho Choi"}, {"authorId": "2115124026", "name": "Woo Suk Choi"}, {"authorId": "2154329247", "name": "Minjung Shin"}, {"authorId": "2187944448", "name": "Minjoon Jung"}, {"authorId": "89496405", "name": "Jeh-Kwang Ryu"}, {"authorId": "1692756", "name": "Byoung-Tak Zhang"}]}, {"paperId": "e2e4702549f6930c638f534c06ff5cd7a62eee90", "externalIds": {"PubMedCentral": "9495400", "DOI": "10.1017/ash.2021.192", "CorpusId": 243736362, "PubMed": "36168500"}, "corpusId": 243736362, "publicationVenue": {"id": "4eb7e2f6-1d71-4ce7-844a-05333702a297", "name": "Antimicrobial Stewardship and Healthcare Epidemiology", "alternate_names": ["Antimicrob Steward Healthc Epidemiology"], "issn": "2732-494X", "url": "https://www.cambridge.org/core/journals/antimicrobial-stewardship-and-healthcare-epidemiology"}, "url": "https://www.semanticscholar.org/paper/e2e4702549f6930c638f534c06ff5cd7a62eee90", "title": "Machine learning and artificial intelligence: applications in healthcare epidemiology", "abstract": "Abstract Artificial intelligence (AI) refers to the performance of tasks by machines ordinarily associated with human intelligence. Machine learning (ML) is a subtype of AI; it refers to the ability of computers to draw conclusions (ie, learn) from data without being directly programmed. ML builds from traditional statistical methods and has drawn significant interest in healthcare epidemiology due to its potential for improving disease prediction and patient care. This review provides an overview of ML in healthcare epidemiology and practical examples of ML tools used to support healthcare decision making at 4 stages of hospital-based care: triage, diagnosis, treatment, and discharge. Examples include model-building efforts to assist emergency department triage, predicting time before septic shock onset, detecting community-acquired pneumonia, and classifying COVID-19 disposition risk level. Increasing availability and quality of electronic health record (EHR) data as well as computing power provides opportunities for ML to increase patient safety, improve the efficiency of clinical management, and reduce healthcare costs.", "venue": "Antimicrobial Stewardship and Healthcare Epidemiology", "year": 2021, "referenceCount": 56, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/60FFBF2D360CF70446AC5B4A972B299A/S2732494X21001923a.pdf/div-class-title-machine-learning-and-artificial-intelligence-applications-in-healthcare-epidemiology-div.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-10-07", "journal": {"volume": "1", "name": "Antimicrobial Stewardship & Healthcare Epidemiology : ASHE"}, "authors": [{"authorId": "2080162329", "name": "Alisa J. Hamilton"}, {"authorId": "46717348", "name": "Alexandra T. Strauss"}, {"authorId": "143850986", "name": "D. Mart\u00ednez"}, {"authorId": "33224636", "name": "J. Hinson"}, {"authorId": "2187134", "name": "S. Levin"}, {"authorId": "2052336462", "name": "G. Lin"}, {"authorId": "2055350", "name": "E. Klein"}]}, {"paperId": "023b4617cfdbcca17c1eb2d938ce8a2106e3ff3d", "externalIds": {"DOI": "10.1186/s41018-021-00096-6", "CorpusId": 238418116}, "corpusId": 238418116, "publicationVenue": {"id": "3e81e683-06a3-47b2-8849-f098724b4fe6", "name": "Journal of International Humanitarian Action", "type": "journal", "alternate_names": ["J Int Humanit Action"], "issn": "2364-3412", "url": "http://www.springer.com/law/international/journal/41018", "alternate_urls": ["https://jhumanitarianaction.springeropen.com", "https://jhumanitarianaction.springeropen.com/"]}, "url": "https://www.semanticscholar.org/paper/023b4617cfdbcca17c1eb2d938ce8a2106e3ff3d", "title": "Explicability of humanitarian AI: a matter of principles", "abstract": null, "venue": "Journal of International Humanitarian Action", "year": 2021, "referenceCount": 128, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-10-06", "journal": {"volume": "6", "pages": "1-22", "name": "Journal of International Humanitarian Action"}, "authors": [{"authorId": "152428690", "name": "G. Coppi"}, {"authorId": "2047433655", "name": "R. Moreno Jimenez"}, {"authorId": "2131057991", "name": "Sofia Kyriazi"}]}, {"paperId": "d8144d55c03845fd4d928716c1ccb50d777a6a92", "externalIds": {"DOI": "10.37762/jgmds.8-4.263", "CorpusId": 241775673}, "corpusId": 241775673, "publicationVenue": {"id": "90e2a53e-55f4-41ce-baff-bfe4f27d040d", "name": "Journal of Gandhara Medical and Dental Science", "type": "journal", "alternate_names": ["J Gandhara Med Dent Sci"], "issn": "2312-9433", "url": "http://www.jgmds.org.pk/index.php/JGMDS"}, "url": "https://www.semanticscholar.org/paper/d8144d55c03845fd4d928716c1ccb50d777a6a92", "title": "Is Artificial Intelligence Transforming Dentistry Today?", "abstract": "Since the birth of science, the most fascinating structure of the human body is the human brain.\u00a0 Over the past centuries\u2019 researchers have been developing the latest technologies to imitate and explore how the human brain functions. However, to develop a machine that thinks like a human brain is still a dream for researchers. Aristotle\u2019s early efforts to devise logical thinking via his syllogisms (a three-part deductive reasoning) were a source of inspiration for modern computers and technologies1. In the1950, Alan Turing designed a machine to decode encrypted messages, which was a breakthrough of super computers in the days of yore. He designed the \u201cTuring Test\u201d which was coined to assess whether a computer could exhibit intelligence better known as \u201cartificial intelligence\u201d (AI) today2. AI is \u201ca field of science and engineering concerned with the computational understanding of what is commonly called intelligent behavior, and with the creation of artifacts that exhibit such behaviour\u201d3. \nSince 1980, AI has come a long way, virtual reality is being used in dental education these days to create real life situations and promote clinical work on simulators to eliminate risk factors associated with training on live patients. Recently artificial intelligence has been integrated with tutoring systems like \u201cUnified Medical Language System\u201d (UMLS), which have resulted in a better quality of feedback, which the preclinical virtual patients provide to the students4,5. This interactive phase helps students to evaluate their clinical skills and compare their skills with the standard ones, thus creating an ideal and high-quality training environment. Studies have been carried out regarding the efficacy of AI systems, which have stipulated that preclinical students build higher competencies than with the use of traditional simulator units6-8. \nCurrently AI inbuilt virtual dental assistants are present in the market. They can execute various chair side tasks with greater accuracy and less manpower ensuring minimum error during the procedures. In the world of implantology and maxillofacial surgery AI helps plan and prepare surgeries with smallest details forgoing actual surgery. Some exceptional uses of AI include robotic surgeries in the field of maxillofacial surgery and bioprinting (where tissues and organs can be reconstructed in thin layers)9. The field of AI has flourished to great extent in the past decade; AI systems are an aid to the field of dentistry and dental education.\u00a0 \nThis narrative attempts to explain possible AI-based applications in the future, it can be used for dental diagnosis, planning out treatments, conducting image analysis, and record keeping. AI-based technologies streamline and reduce laborious workforce to routine tasks, it ensures dental procedures are possible at a lower cost and ultimately makes predictive, preventive, and participatory dentistry possible.\u00a0The use of AI in dental procedures needs to be guaranteed; its application with human oversight and evidence-based dentistry shall be expected. Dental education needs to be introduced to clinical AI solutions by promoting digital literacy in the future dental liveware.", "venue": "Journal of Gandhara Medical and Dental Science", "year": 2021, "referenceCount": 9, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://jgmds.org.pk/index.php/JGMDS/article/download/263/153", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-05", "journal": {"name": "Journal of Gandhara Medical and Dental Science"}, "authors": [{"authorId": "2041843276", "name": "Saman Tauqir"}]}, {"paperId": "2245b9445f48225620fba1c22d7484237efaccc9", "externalIds": {"DBLP": "journals/ais/TobarG22", "MAG": "3202193864", "DOI": "10.1007/s00146-021-01264-3", "CorpusId": 244219727}, "corpusId": 244219727, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/2245b9445f48225620fba1c22d7484237efaccc9", "title": "On machine learning and the replacement of human labour: anti-Cartesianism versus Babbage\u2019s path", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-04", "journal": {"volume": "37", "pages": "1459 - 1471", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2841497", "name": "Felipe A. Tobar"}, {"authorId": "2109141128", "name": "R. Gonz\u00e1lez"}]}, {"paperId": "1e228d7c0bdea96380edf886fbefe49d8439910c", "externalIds": {"MAG": "3205636459", "DOI": "10.3390/app11199208", "CorpusId": 244611554}, "corpusId": 244611554, "publicationVenue": {"id": "136edf8d-0f88-4c2c-830f-461c6a9b842e", "name": "Applied Sciences", "type": "journal", "alternate_names": ["Appl Sci"], "issn": "2076-3417", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217814", "alternate_urls": ["http://www.mathem.pub.ro/apps/", "https://www.mdpi.com/journal/applsci", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217814"]}, "url": "https://www.semanticscholar.org/paper/1e228d7c0bdea96380edf886fbefe49d8439910c", "title": "A Multifeatured Data-Driven Homogenization for Heterogeneous Elastic Solids", "abstract": "A computational homogenization of heterogeneous solids is presented based on the data-driven approach for both linear and nonlinear elastic responses. Within the Double-Scale Finite Element Method (FE2) framework, a data-driven model is proposed to substitute the micro-level Finite Element (FE) simulations to reduce computational costs in multiscale simulations. The heterogeneity of porous solids at the micro-level is considered in various material properties and geometrical attributes. For material properties, elastic constants, which are Lame\u2019s coefficients, are subjected to be heterogeneous in the linear elastic responses. For geometrical features, different numbers, sizes, and locations of voids are considered to reflect the heterogeneity of porous solids. A database for homogenized microstructural responses is constructed from a series of micro-level FE simulations, and machine learning is used to train and test our proposed model. In particular, four geometrical descriptors are designed, based on N-probability and lineal-path functions, to clearly reflect the geometrical heterogeneity of various microstructures. This study indicates that a simple deep neural networks model can capture diverse microstructural heterogeneous responses well when given proper input sources, including the geometrical descriptors, are considered to establish a computational data-driven homogenization scheme.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 38, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-3417/11/19/9208/pdf?version=1633932621", "status": null}, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-03", "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "153338664", "name": "E. Haghighi"}, {"authorId": "98495515", "name": "S. Na"}]}, {"paperId": "d8d80e90bd8191c6ca11f5084996fd4746d49b02", "externalIds": {"DOI": "10.1080/03080188.2020.1868684", "CorpusId": 238638292}, "corpusId": 238638292, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d8d80e90bd8191c6ca11f5084996fd4746d49b02", "title": "Artificial agency and the game of semantic extension", "abstract": "ABSTRACT Artificial agents are commonly described by using words that traditionally belong to the semantic field of life. I call this phenomenon the game of semantic extension. However, the semantic extension of words as crucial as \u2018autonomous\u2019, \u2018intelligent\u2019, \u2018creative\u2019, \u2018moral\u2019, and so on, is often perceived as unsatisfactory, which is signalled with the extensive use of inverted commas or other syntactical cues. Such practice, in turn, has provoked harsh criticism that usually refers back to the literal meaning of the words to show their inappropriateness in describing artificial agents. Hence the question: how can we choose our words appropriately and wisely while making sense of artificial agents? This paper tries to answer by sketching the main features of the game of semantic extension in relation to artificial agency, reviewing the related opportunities and risks, and advancing some practical suggestions on how to play the game well.", "venue": "Interdisciplinary Science Reviews", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-10-02", "journal": {"volume": "46", "pages": "440 - 457", "name": "Interdisciplinary Science Reviews"}, "authors": [{"authorId": "50846975", "name": "Fabio Fossa"}]}, {"paperId": "d01cb741ba9c9c179f7d33ed48ecc3c80393f205", "externalIds": {"MAG": "3206498514", "DOI": "10.1134/s1995080221100127", "CorpusId": 244634561}, "corpusId": 244634561, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d01cb741ba9c9c179f7d33ed48ecc3c80393f205", "title": "Is Genome Written in Haskell?", "abstract": null, "venue": "Lobachevskii Journal of Mathematics", "year": 2021, "referenceCount": 11, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-10-01", "journal": {"name": "Lobachevskii Journal of Mathematics"}, "authors": [{"authorId": "144039873", "name": "S. Kozyrev"}]}, {"paperId": "6a582cba7522aa7e92c5871f9c7cd74796405c0e", "externalIds": {"PubMedCentral": "8512550", "DBLP": "journals/sensors/ChkrounA21", "DOI": "10.3390/s21196641", "CorpusId": 238747247, "PubMed": "34640960"}, "corpusId": 238747247, "publicationVenue": {"id": "3dbf084c-ef47-4b74-9919-047b40704538", "name": "Italian National Conference on Sensors", "type": "conference", "alternate_names": ["SENSORS", "IEEE Sens", "Ital National Conf Sens", "IEEE Sensors", "Sensors"], "issn": "1424-8220", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-142001", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-142001", "http://www.mdpi.com/journal/sensors", "https://www.mdpi.com/journal/sensors"]}, "url": "https://www.semanticscholar.org/paper/6a582cba7522aa7e92c5871f9c7cd74796405c0e", "title": "A Safe Collaborative Chatbot for Smart Home Assistants", "abstract": "Smart home assistants, which enable users to control home appliances and can be used for holding entertaining conversations, have become an inseparable part of many people\u2019s homes. Recently, there have been many attempts to allow end-users to teach a home assistant new commands, responses, and rules, which can then be shared with a larger community. However, allowing end-users to teach an agent new responses, which are shared with a large community, opens the gate to malicious users, who can teach the agent inappropriate responses in order to promote their own business, products, or political views. In this paper, we present a platform that enables users to collaboratively teach a smart home assistant (or chatbot) responses using natural language. We present a method of collectively detecting malicious users and using the commands taught by the malicious users to further mitigate activity of future malicious users. We ran an experiment with 192 subjects and show the effectiveness of our platform.", "venue": "Italian National Conference on Sensors", "year": 2021, "referenceCount": 34, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1424-8220/21/19/6641/pdf?version=1633915683", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-01", "journal": {"volume": "21", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "40898073", "name": "Merav Chkroun"}, {"authorId": "1746466", "name": "Amos Azaria"}]}, {"paperId": "864d8a27da1ef69729d19b9297bce87e82eb9abd", "externalIds": {"DOI": "10.1177/14690667211050599", "CorpusId": 238421624, "PubMed": "34617472"}, "corpusId": 238421624, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/864d8a27da1ef69729d19b9297bce87e82eb9abd", "title": "Joseph John Thomson investigates the paranormal", "abstract": "Joseph John Thomson is best known for detecting two isotopes of neon within cathode ray tubes that lay the foundation of the field of mass spectrometry. He was awarded the 1906 Nobel Prize in Physics for the discovery of the electron and for his work on the conduction of electricity in gases in the same devices. He is less known for his strong religious beliefs and his interest in psychical research and the paranormal. Thomson served as a member of the Society for Psychical Research for over 50 years and even became its Vice President. During this time, he attended a number of s\u00e9ances and demonstrations by professed psychics and mediums. This article traces those who influenced his interest in the paranormal, from Balfour Stewart to Lord Rayleigh and William Crookes. It reports and illustrates his beliefs and experiences investigating the paranormal in his own words.", "venue": "European journal of mass spectrometry", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-01", "journal": {"volume": "27", "pages": "151 - 157", "name": "European Journal of Mass Spectrometry"}, "authors": [{"authorId": "1844929", "name": "K. Downard"}]}, {"paperId": "3a1501829ce7205f25939dd26e1089df920c9988", "externalIds": {"DBLP": "journals/ai/SilverSPS21", "MAG": "3164005523", "DOI": "10.1016/J.ARTINT.2021.103535", "CorpusId": 236236944}, "corpusId": 236236944, "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", "name": "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif Intell"], "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", "2710-1681"], "url": "http://www.elsevier.com/locate/artint", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00043702", "https://www.journals.elsevier.com/artificial-intelligence"]}, "url": "https://www.semanticscholar.org/paper/3a1501829ce7205f25939dd26e1089df920c9988", "title": "Reward is enough", "abstract": null, "venue": "Artificial Intelligence", "year": 2021, "referenceCount": 67, "citationCount": 156, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-01", "journal": {"volume": "299", "pages": "103535", "name": "Artif. Intell."}, "authors": [{"authorId": "145824029", "name": "David Silver"}, {"authorId": "2108384183", "name": "Satinder Singh"}, {"authorId": "144368601", "name": "Doina Precup"}, {"authorId": "1699645", "name": "R. Sutton"}]}, {"paperId": "ddce6ef8f791137fc27dcfda2de0f58b3be15db2", "externalIds": {"DOI": "10.1088/2515-7639/ac2791", "CorpusId": 238225233}, "corpusId": 238225233, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ddce6ef8f791137fc27dcfda2de0f58b3be15db2", "title": "Applications of artificial intelligence and machine learning in metal additive manufacturing", "abstract": "Artificial intelligence (AI) and additive manufacturing (AM) are both disruptive new technologies. AI has entered many aspects of our lives, but has not been fully realized in the world of AM. Because of the vast amount of data and the digital nature of the technology, AM offers tremendous opportunities in machine learning (ML) and consequently AI. This paper provides a vantage point view of the applications of ML and AI in AM, and specifically in powder bed AM technology. The types of data, sources of data, potential variabilities in experimental and simulation data, and the applicability of these data in ML algorithms are discussed. Several new ideas are presented where fusing these two transformative technologies can potentially have a profound impact on how AM is applied in different fields. A vision on the potential direction of AM to fully realize AI\u2019s advantage is provided.", "venue": "Journal of Physics: Materials", "year": 2021, "referenceCount": 121, "citationCount": 3, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-29", "journal": {"volume": "4", "name": "Journal of Physics: Materials"}, "authors": [{"authorId": "2130188923", "name": "Leila Jannesari Ladani"}]}, {"paperId": "2751eb1b6dab219b62f1ce0188dd505ddcc81966", "externalIds": {"DOI": "10.11622/smedj.2021119", "CorpusId": 238201856, "PubMed": "34581468"}, "corpusId": 238201856, "publicationVenue": {"id": "9c3f0ad3-f07b-4e64-983a-f4b789b17c86", "name": "Singapore medical journal", "type": "journal", "alternate_names": ["Singap med j", "Singapore Medical Journal", "Singap Med J"], "issn": "0037-5675", "url": "https://www.sma.org.sg/smj/smjcurrent.html", "alternate_urls": ["http://smj.sma.org.sg/smjcurrent.html"]}, "url": "https://www.semanticscholar.org/paper/2751eb1b6dab219b62f1ce0188dd505ddcc81966", "title": "Acute paediatrics tele-support for caregivers in Singapore: an initial experience with a prototype Chatbot: UPAL.", "abstract": null, "venue": "Singapore medical journal", "year": 2021, "referenceCount": 38, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-28", "journal": {"name": "Singapore medical journal"}, "authors": [{"authorId": "37042259", "name": "S. Ganapathy"}, {"authorId": "31638014", "name": "Su Ying Serena Chang"}, {"authorId": "1490958248", "name": "J. Tan"}, {"authorId": "2153535439", "name": "Cynthia Lim"}, {"authorId": "123898373", "name": "K. Ng"}]}, {"paperId": "7845bfb55f5ce573b87d77bb76d4d38829b37620", "externalIds": {"ArXiv": "2109.13296", "DBLP": "conf/emnlp/UchenduMLZ021", "DOI": "10.18653/v1/2021.findings-emnlp.172", "CorpusId": 237589233}, "corpusId": 237589233, "publicationVenue": {"id": "41bf9ed3-85b3-4c90-b015-150e31690253", "name": "Conference on Empirical Methods in Natural Language Processing", "type": "conference", "alternate_names": ["Empir Method Nat Lang Process", "Empirical Methods in Natural Language Processing", "Conf Empir Method Nat Lang Process", "EMNLP"], "url": "https://www.aclweb.org/portal/emnlp"}, "url": "https://www.semanticscholar.org/paper/7845bfb55f5ce573b87d77bb76d4d38829b37620", "title": "TURINGBENCH: A Benchmark Environment for Turing Test in the Age of Neural Text Generation", "abstract": "Recent progress in generative language models has enabled machines to generate astonishingly realistic texts. While there are many legitimate applications of such models, there is also a rising need to distinguish machine-generated texts from human-written ones (e.g., fake news detection). However, to our best knowledge, there is currently no benchmark environment with datasets and tasks to systematically study the so-called \u201cTuring Test\u201d problem for neural text generation methods. In this work, we present the TURINGBENCH benchmark environment, which is comprised of (1) a dataset with 200K humanor machine-generated samples across 20 labels {Human, GPT-1, GPT-2_small, GPT-2_medium, GPT-2_large, GPT-2_xl, GPT-2_PyTorch, GPT-3, GROVER_base, GROVER_large, GROVER_mega, CTRL, XLM, XLNET_base, XLNET_large, FAIR_wmt19, FAIR_wmt20, TRANSFORMER_XL, PPLM_distil, PPLM_gpt2}, (2) two benchmark tasks\u2013i.e., Turing Test (TT) and Authorship Attribution (AA), and (3) a website with leaderboards. Our preliminary experimental results using TURINGBENCH show that FAIR_wmt20 and GPT-3 are the current winners, among all language models tested, in generating the most human-like indistinguishable texts with the lowest F1 score by five state-of-the-art TT detection models. The TURINGBENCH is available at: https: //turingbench.ist.psu.edu/", "venue": "Conference on Empirical Methods in Natural Language Processing", "year": 2021, "referenceCount": 78, "citationCount": 12, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://aclanthology.org/2021.findings-emnlp.172.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-09-27", "journal": {"pages": "2001-2016"}, "authors": [{"authorId": "150035131", "name": "Adaku Uchendu"}, {"authorId": "2115851910", "name": "Zeyu Ma"}, {"authorId": "145535348", "name": "Thai Le"}, {"authorId": "144142354", "name": "Rui Zhang"}, {"authorId": "145948198", "name": "Dongwon Lee"}]}, {"paperId": "3a7ece239cbe8b7fcb42d2dcd895fe3d715fd3cc", "externalIds": {"DOI": "10.1109/GUCON50781.2021.9573882", "CorpusId": 241595564}, "corpusId": 241595564, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a7ece239cbe8b7fcb42d2dcd895fe3d715fd3cc", "title": "The Psychology of Thinking in Creating AI", "abstract": "The broad-scale emergence of AI in industry calls forth basic questions in terms of the knowledge bases and approaches relevant for its design. Engineering design has been mainly developed for electromechanical artifacts. In practice, this has meant that the scientific knowledge required for creating technical artifacts such as engines, cars, ships, cranes, telephones, radios, TVs, and simple data processing units has been natural science. However, one cannot find intelligent processes by means of physics and chemistry. Natural scientific phenomena follow their deterministic laws, but intelligence is based on selection and decision processes. The conceptual landscape of natural science is optimized for different kinds of phenomena than intelligent information processing. Consequently, the basic research under technology design should be rethought in light of the emergence of AI. To grasp intelligent information processing, we need concepts and approaches suited for the task. To create intelligent technologies on this basis, we need concepts and approaches that afford the operationalization of such information in artificial systems. We suggest that psychology of thinking and cognitive modeling provide a logical basis for future AI design.", "venue": "2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON)", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-09-24", "journal": {"pages": "1-6", "name": "2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON)"}, "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}, {"authorId": "74461425", "name": "A. Karvonen"}]}, {"paperId": "6fe5e9b393f3c10bd31e4bb37a12676a7ee37a6b", "externalIds": {"MAG": "3204707744", "DOI": "10.15295/bmij.v9i3.1863", "CorpusId": 244206889}, "corpusId": 244206889, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6fe5e9b393f3c10bd31e4bb37a12676a7ee37a6b", "title": "Proaktif insan kaynaklar\u0131 y\u00f6netiminin yeni g\u00fcc\u00fc: \u0130K analiti\u011fi ve yapay zek\u00e2", "abstract": "\u0130K Analiti\u011fi son y\u0131llarda giderek \u00f6nem kazanan konular aras\u0131nda yer almaktad\u0131r. Kurumun insan kaynaklar\u0131na ili\u015fkin verilerini analiz etmek, sorunlar\u0131n\u0131 tespit etmek ve strateji belirlemek i\u00e7in kullan\u0131lan \u0130K Analiti\u011fi kurumlara \u00f6nemli bir rekabet avantaj\u0131 sa\u011flamaktad\u0131r. \u0130K analiti\u011fi, i\u015fletmelerin elektronik tablo tabanl\u0131 veri deposundan uzakla\u015fmas\u0131n\u0131 sa\u011flayarak, verileri ger\u00e7ek zamanl\u0131 olarak tutmaya ve bunlar\u0131 kurumun mevcut veri ak\u0131\u015f\u0131 ile birlikte analiz etmeye imk\u00e2n tan\u0131maktad\u0131r. Yapay zek\u00e2 y\u00f6ntemlerinin bu alanda kullan\u0131lmas\u0131 ile verimlilik ve tasarruf art\u0131\u015f\u0131 sa\u011flayan \u0130K analiti\u011fi alan\u0131na her ge\u00e7en g\u00fcn daha fazla i\u015fletme yat\u0131r\u0131m yapmaktad\u0131r. Geli\u015ftirilen \u0130K analiti\u011fi mod\u00fclleri ile i\u015fletmeler \u0130K s\u00fcre\u00e7lerini daha etkin \u015fekilde y\u00f6netebilmekte, i\u015fe al\u0131m kararlar\u0131n\u0131 daha sa\u011fl\u0131kl\u0131 verebilmekte, i\u015ften ayr\u0131lma niyeti olan \u00e7al\u0131\u015fanlar\u0131 \u00f6nceden tahmin edebilmekte, gelece\u011fe y\u00f6nelik i\u015fg\u00fcc\u00fc optimizasyonu ve planlamalar\u0131n\u0131 daha etkin bi\u00e7imde yapabilmektedir. B\u00f6ylece, \u0130K analiti\u011fi sayesinde veri temelli karar vermek ve strateji belirlemek kolayla\u015fmaktad\u0131r. Bu \u00e7al\u0131\u015fma kapsam\u0131nda \u0130K analiti\u011fi kavram\u0131n\u0131n \u00f6nemi incelenecek ve \u0130K fonksiyonlar\u0131n\u0131n hangi s\u00fcre\u00e7lerinde \u0130K analiti\u011finden yararlan\u0131ld\u0131\u011f\u0131, hangi yapay zek\u00e2 y\u00f6ntemlerinin bu alanda nas\u0131l kullan\u0131ld\u0131\u011f\u0131 ve i\u015fletmelere ne gibi yarar sa\u011flad\u0131\u011f\u0131 \u00fczerinde durulacakt\u0131r. Gerek \u0130K analiti\u011fi gerekse yapay zek\u00e2 konular\u0131n\u0131n i\u015fletmecilik alan\u0131nda giderek y\u00fckselen bir trend kazanmas\u0131, bununla beraber yerli literat\u00fcrde \u0130K Analiti\u011fi ve Yapay Zek\u00e2 konusunu birlikte ele alan ve i\u015fletmelere katt\u0131\u011f\u0131 de\u011fer y\u00f6n\u00fcnden inceleyen teorik pek fazla \u00e7al\u0131\u015fman\u0131n bulunmamas\u0131 bu \u00e7al\u0131\u015fman\u0131n \u00f6nemini olu\u015fturmaktad\u0131r. \u00c7al\u0131\u015fma \u00f6zellikle ilgili alanda \u00e7al\u0131\u015fan akademisyenler ile uygulamac\u0131lara yol g\u00f6sterici olacakt\u0131r.", "venue": "Business & Management Studies: An International Journal", "year": 2021, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.bmij.org/index.php/1/article/download/1863/1592", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-24", "journal": {"name": "Business & Management Studies: An International Journal"}, "authors": [{"authorId": "121500400", "name": "Yasemin Bal"}, {"authorId": "2100654125", "name": "Mert Bal"}]}, {"paperId": "bc9598dc4ed0472d8b59b87ed3a139f8347d40ee", "externalIds": {"DBLP": "journals/corr/abs-2109-12075", "ArXiv": "2109.12075", "CorpusId": 237635337}, "corpusId": 237635337, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc9598dc4ed0472d8b59b87ed3a139f8347d40ee", "title": "Towards A Measure Of General Machine Intelligence", "abstract": "To build general-purpose arti\ufb01cial intelligence systems that can deal with unknown variables across unknown domains, we need benchmarks that measure how well these systems perform on tasks they have never seen before. A prerequisite for this is a measure of a task\u2019s generalization dif\ufb01culty, or how dissimilar it is from the system\u2019s prior knowledge and experience. If the skill of an intelligence system in a particular domain is de\ufb01ned as it\u2019s ability to consistently generate a set of instructions (or programs) to solve tasks in that domain, current benchmarks do not quantitatively measure the ef\ufb01ciency of acquiring new skills, making it possible to brute-force skill acquisition by training with unlimited amounts of data and compute power. With this in mind, we \ufb01rst propose a common language of instruction, a programming language that allows the expression of programs in the form of directed acyclic graphs across a wide variety of real-world domains and computing platforms. Using programs generated in this language, we demonstrate a match-based method to both score performance and calculate the generalization dif\ufb01culty of any given set of tasks. We use these to de\ufb01ne a numeric benchmark called the generalization index, or the g-index , to measure and compare the skill-acquisition ef\ufb01ciency of any intelligence system on a set of real-world tasks. Finally, we evaluate the suitability of some well-known models as general intelligence systems by calculating their g-index scores.", "venue": "ArXiv", "year": 2021, "referenceCount": 71, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-24", "journal": {"volume": "abs/2109.12075", "name": "ArXiv"}, "authors": [{"authorId": "2052063253", "name": "Gautham Venkatasubramanian"}, {"authorId": "2151877389", "name": "Sibesh Kar"}, {"authorId": "2120287881", "name": "Abhimanyu Singh"}, {"authorId": "2134908489", "name": "Shubham Mishra"}, {"authorId": "50472950", "name": "Dushyant Yadav"}, {"authorId": "2128109101", "name": "Shreyansh Chandak"}]}, {"paperId": "ee62d67b03c300e1d0118b19864fd83a8812b3e0", "externalIds": {"DOI": "10.37679/trta.962940", "CorpusId": 239120630}, "corpusId": 239120630, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ee62d67b03c300e1d0118b19864fd83a8812b3e0", "title": "Cahit Arf\u2019\u0131n \u201cMakine D\u00fc\u015f\u00fcnebilir mi ve Nas\u0131l D\u00fc\u015f\u00fcnebilir?\u201d Adl\u0131 Makalesi \u00dczerine Bir \u00c7al\u0131\u015fma", "abstract": null, "venue": "TRT Akademi", "year": 2021, "referenceCount": 4, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1861642", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-23", "journal": {"name": "TRT Akademi"}, "authors": [{"authorId": "2075824974", "name": "Filiz Sari"}]}, {"paperId": "42fb503b15588a8be298ab024f522d0010027f39", "externalIds": {"DBLP": "conf/agi/StClairHB21", "ArXiv": "2109.15097", "DOI": "10.1007/978-3-030-93758-4_27", "CorpusId": 238226881}, "corpusId": 238226881, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42fb503b15588a8be298ab024f522d0010027f39", "title": "The Role of Bio-Inspired Modularity in General Learning", "abstract": null, "venue": "AGI", "year": 2021, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2109.15097", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-23", "journal": {"pages": "261-268"}, "authors": [{"authorId": "2129169482", "name": "Rachel A. StClair"}, {"authorId": "144181596", "name": "W. Hahn"}, {"authorId": "2297916", "name": "Elan Barenholtz"}]}, {"paperId": "a01671aeac10959b2510001915c7788ea9a0f87a", "externalIds": {"PubMedCentral": "8493292", "DOI": "10.3389/frobt.2021.724798", "CorpusId": 237587640, "PubMed": "34631805"}, "corpusId": 237587640, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a01671aeac10959b2510001915c7788ea9a0f87a", "title": "Augmented Reality Meets Artificial Intelligence in Robotics: A Systematic Review", "abstract": "Recently, advancements in computational machinery have facilitated the integration of artificial intelligence (AI) to almost every field and industry. This fast-paced development in AI and sensing technologies have stirred an evolution in the realm of robotics. Concurrently, augmented reality (AR) applications are providing solutions to a myriad of robotics applications, such as demystifying robot motion intent and supporting intuitive control and feedback. In this paper, research papers combining the potentials of AI and AR in robotics over the last decade are presented and systematically reviewed. Four sources for data collection were utilized: Google Scholar, Scopus database, the International Conference on Robotics and Automation 2020 proceedings, and the references and citations of all identified papers. A total of 29 papers were analyzed from two perspectives: a theme-based perspective showcasing the relation between AR and AI, and an application-based analysis highlighting how the robotics application was affected. These two sections are further categorized based on the type of robotics platform and the type of robotics application, respectively. We analyze the work done and highlight some of the prevailing limitations hindering the field. Results also explain how AR and AI can be combined to solve the model-mismatch paradigm by creating a closed feedback loop between the user and the robot. This forms a solid base for increasing the efficiency of the robotic application and enhancing the user\u2019s situational awareness, safety, and acceptance of AI robots. Our findings affirm the promising future for robust integration of AR and AI in numerous robotic applications.", "venue": "Frontiers in Robotics and AI", "year": 2021, "referenceCount": 140, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2021.724798/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-09-22", "journal": {"volume": "8", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "1471727345", "name": "Zahraa Bassyouni"}, {"authorId": "47170365", "name": "I. Elhajj"}]}, {"paperId": "31218e862a20c7065f1ba3d5cc00f7466d285979", "externalIds": {"DOI": "10.1146/annurev-psych-021721-110002", "CorpusId": 237557280, "PubMed": "34535061"}, "corpusId": 237557280, "publicationVenue": {"id": "35ed31a9-a45e-4601-ab4f-49374a1d870f", "name": "Annual Review of Psychology", "type": "journal", "alternate_names": ["Annu Rev Psychol"], "issn": "0066-4308", "url": "https://www.annualreviews.org/journal/psych", "alternate_urls": ["http://arjournals.annualreviews.org/loi/psych", "http://psych.annualreviews.org/"]}, "url": "https://www.semanticscholar.org/paper/31218e862a20c7065f1ba3d5cc00f7466d285979", "title": "Neurophysiology of Remembering.", "abstract": "By linking the past with the future, our memories define our sense of identity. Because human memory engages the conscious realm, its examination has historically been approached from language and introspection and proceeded largely along separate parallel paths in humans and other animals. Here, we first highlight the achievements and limitations of this mind-based approach and make the case for a new brain-based understanding of declarative memory with a focus on hippocampal physiology. Next, we discuss the interleaved nature and common physiological mechanisms of navigation in real and mental spacetime. We suggest that a distinguishing feature of memory types is whether they subserve actions for single or multiple uses. Finally, in contrast to the persisting view of the mind as a highly plastic blank slate ready for the world to make its imprint, we hypothesize that neuronal networks are endowed with a reservoir of neural trajectories, and the challenge faced by the brain is how to select and match preexisting neuronal trajectories with events in the world. Expected final online publication date for the Annual Review of Psychology, Volume 73 is January 2022. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.", "venue": "Annual Review of Psychology", "year": 2021, "referenceCount": 142, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-09-17", "journal": {"name": "Annual review of psychology"}, "authors": [{"authorId": "144128278", "name": "G. Buzs\u00e1ki"}, {"authorId": "36419128", "name": "S. McKenzie"}, {"authorId": "1766548", "name": "L. Davachi"}]}, {"paperId": "928b839accb93e902e1d38c3b12b156c7eda5e23", "externalIds": {"MAG": "3200363141", "DOI": "10.20944/preprints202109.0234.v1", "CorpusId": 240540234}, "corpusId": 240540234, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/928b839accb93e902e1d38c3b12b156c7eda5e23", "title": "How Biological Concepts and Evolutionary Theories Are Inspiring Advances in Machine Intelligence", "abstract": "Since its advent in the mid-twentieth century, the field of artificial intelligence (AI) has been heavily influenced by biology. From the structure of the brain to evolution by natural selection, core biological concepts underpin many of the fundamental breakthroughs in modern AI. Here, focusing specifically on artificial neural networks (ANNs) that have become commonplace in machine learning, we show the numerous connections between theories based on coevolution, multi-level selection, modularity and competition and related developments in ANNs. Our aim is to illuminate the valuable but often overlooked inspiration biologists have provided AI research and to spark future contributions at this intersection of biology and computer science. Although recent advances in AI have been swift, many significant challenges remain requiring innovative solutions. Thankfully, biology in all its forms still has a lot to teach us, especially when trying to create truly intelligent machines.", "venue": "", "year": 2021, "referenceCount": 104, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.preprints.org/manuscript/202109.0234/v1/download", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-14", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2137557298", "name": "Abigail R. Gutai"}, {"authorId": "3180624", "name": "T. Gorochowski"}]}, {"paperId": "19a4f6479a24d6b992c21f71fe2bb50567bd1e6f", "externalIds": {"DBLP": "journals/corr/abs-2109-06098", "ArXiv": "2109.06098", "CorpusId": 237491904}, "corpusId": 237491904, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19a4f6479a24d6b992c21f71fe2bb50567bd1e6f", "title": "The mathematics of adversarial attacks in AI - Why deep learning is unstable despite the existence of stable neural networks", "abstract": "The unprecedented success of deep learning (DL) makes it unchallenged when it comes to classification problems. However, it is well established that the current DL methodology produces universally unstable neural networks (NNs). The instability problem has caused an enormous research effort \u2013 with a vast literature on so-called adversarial attacks \u2013 yet there has been no solution to the problem. Our paper addresses why there has been no solution to the problem, as we prove the following mathematical paradox: any training procedure based on training neural networks for classification problems with a fixed architecture will yield neural networks that are either inaccurate or unstable (if accurate) \u2013 despite the provable existence of both accurate and stable neural networks for the same classification problems. The key is that the stable and accurate neural networks must have variable dimensions depending on the input, in particular, variable dimensions is a necessary condition for stability. Our result points towards the paradox that accurate and stable neural networks exist, however, modern algorithms do not compute them. This yields the question: if the existence of neural networks with desirable properties can be proven, can one also find algorithms that compute them? There are cases in mathematics where provable existence implies computability, but will this be the case for neural networks? The contrary is true, as we demonstrate how neural networks can provably exist as approximate minimisers to standard optimisation problems with standard cost functions, however, no randomised algorithm can compute them with probability better than 1/2. CONTENTS", "venue": "ArXiv", "year": 2021, "referenceCount": 62, "citationCount": 9, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-13", "journal": {"volume": "abs/2109.06098", "name": "ArXiv"}, "authors": [{"authorId": "2849211", "name": "Alexander Bastounis"}, {"authorId": "145920634", "name": "A. Hansen"}, {"authorId": "148326473", "name": "Verner Vlacic"}]}, {"paperId": "900b10a441253f2edbcf65446624d68a0d5fa14e", "externalIds": {"MAG": "3197617696", "DOI": "10.15407/fd2021.03.180", "CorpusId": 239648033}, "corpusId": 239648033, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/900b10a441253f2edbcf65446624d68a0d5fa14e", "title": "Artificial intelligence as an anthropotechnology", "abstract": "Artificial intelligence is a computer system that thinks or acts like humans. Features of AI systems embody implicit beliefs concerning the human nature that AI developers have. \u201cStrong\u201d AI, which has the general cognitive abilities of an adult, has not yet been created, while \u201cweak\u201d AI is already part of the planetary computation infrastructure. Neural network AI mimics specific types of human behavior, generalizing data about the everyday lives of its users. This AI approach corresponds to the philosophical mainstream of the 20th century, when everyday life was seen as a source of the linguistic and the social pre-given that yields mutual understanding. This approach is also based on the traditional human-machine dichotomy and the corresponding idea that human nature is stable and independent of the technological condition. However, in the post-metaphysical age, when human interaction with technology is communicative rather than instrumental, data on everyday life cannot be an independent paragon of the human nature. AI systems do not only codify the descriptive features of human nature, but also discipline their users, as the digital environment in which everyday data can be collected is already organized by AI. Accordingly, in the digital environment, people are forced to reproduce new norms of behavior, codified by AI, which became one of the forms of human self-mastery, or anthropotechnology. The impact of AI is rarely noted, as the digital environment in which people interact with AI is not organized in a way that is clearly understandable. The anthropotechnological nature of AI is a side effect of the development of platforms, so AI developers rarely take responsibility for the norms embodied in the systems they create.", "venue": "Filosofska dumka (Philosophical Thought)", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dumka.philosophy.ua/index.php/fd/article/download/554/515", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-07", "journal": {"name": "Filosofska dumka (Philosophical Thought)"}, "authors": [{"authorId": "2135028481", "name": "Mykhailo Bogachov"}]}, {"paperId": "ea7d7c7486896c5399981f1ab5a2c45af2a8b538", "externalIds": {"MAG": "3198531868", "DOI": "10.1007/S43681-021-00092-X", "CorpusId": 239681870}, "corpusId": 239681870, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea7d7c7486896c5399981f1ab5a2c45af2a8b538", "title": "Robotomorphy: Becoming our creations", "abstract": null, "venue": "", "year": 2021, "referenceCount": 54, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-021-00092-x.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-04", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "d7456c3f5117847d2a99a4518427c6f2ac0992db", "externalIds": {"DOI": "10.1016/j.radi.2021.07.012", "CorpusId": 237443449, "PubMed": "34493445"}, "corpusId": 237443449, "publicationVenue": {"id": "ac84e5a7-272d-43bc-9dda-10fa34c17fde", "name": "Radiography", "type": "journal", "issn": "1078-8174", "alternate_issns": ["0033-8281"], "url": "http://www.harcourt-international.com/journals/radi/", "alternate_urls": ["https://www.radiographyonline.com/", "http://www.sciencedirect.com/science/journal/10788174"]}, "url": "https://www.semanticscholar.org/paper/d7456c3f5117847d2a99a4518427c6f2ac0992db", "title": "Artificial intelligence in radiation oncology: A review of its current status and potential application for the radiotherapy workforce.", "abstract": null, "venue": "Radiography", "year": 2021, "referenceCount": 74, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://orca.cardiff.ac.uk/id/eprint/144759/3/AI%20in%20radiation%20oncology%20V4b%20full.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-09-04", "journal": {"name": "Radiography"}, "authors": [{"authorId": "46574199", "name": "C. Parkinson"}, {"authorId": "82659765", "name": "C. Matthams"}, {"authorId": "39595875", "name": "K. Foley"}, {"authorId": "1628685596", "name": "E. Spezi"}]}, {"paperId": "a0d4ea9bc562ad4c19eb84d4a5c7e35e70478151", "externalIds": {"DOI": "10.47485/2693-2490.1053", "CorpusId": 245582306}, "corpusId": 245582306, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0d4ea9bc562ad4c19eb84d4a5c7e35e70478151", "title": "Neural Experience of Conscious Time", "abstract": "\u201cPure perception and pure memory constantly intermingle\u201d\nHenri Bergson, 1908.\n\nOne can consider that \u201cTime\u201d and \u201cmemory\u201d are related experiential facets of mentality. Without memory, there is no Time. To clarify, we distinguish between the physisist\u2019s objective time (pTime), which has no emotive quality or memory component, and the subjective conscious time (cTime), which engages both emotions and memory.\n\nOur tripartite mechanism of a neural memory involves neurons interacting with their surrounding extracellular matrix (nECM). Incoming perceptions are chemically encoded in the nECM as metal-centered cognitive units of information (cuinfo), wherein NTs serve as molecular encoders of emotive states\n\nIn the context of the tripartite mechanism (Marx & Gilon, 2012-2020), we consider two possible modes whereby the temporal sequence of events (i.e. cTime) could be recalled by the sensing neural net.\n\nChemical (allosteric) sensing of cuinfo in the nECM by neural receptors (i.e. GPCR, integrins, etc.) which establish fleeting contact with the nECM as they diffuse along the neural membrane. Effectively, this is a lateral decoding process.\nElectrodynamic sensing of cuinfo vertically displaced from the neural surface. New nECM components and cuinfo are constantly being formed, like coral growths, extending from the neural surface. The individual neuron senses and decodes the distal cuinfo in the surrounding nECM (like long-distance radar detection). Neural sensing is consolidated and transformed by the net into comprehensive memory.\nThese speculations suggest experimental tests to measure the interactions of the tripartite components, to examine the electro-chemical aspects of neural encoding of memory perceived as cTime.", "venue": "Journal of Psychology and Neuroscience", "year": 2021, "referenceCount": 88, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://doi.org/10.47485/2693-2490.1053", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-03", "journal": {"name": "Journal of Psychology and Neuroscience"}, "authors": [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", "name": "C. Gilon"}]}, {"paperId": "b446e12c7d622d0971e5163a0476bb38c4dec964", "externalIds": {"DBLP": "journals/corr/abs-2109-01517", "ArXiv": "2109.01517", "DOI": "10.1016/j.cpet.2021.07.001", "CorpusId": 237417186, "PubMed": "34537126"}, "corpusId": 237417186, "publicationVenue": {"id": "963d88d6-6483-40ad-b2e0-b4c22d6a77fc", "name": "PET Clinics", "type": "journal", "alternate_names": ["PET Clin", "Pet Clinics", "Pet Clin"], "issn": "1556-8598", "url": "https://www.pet.theclinics.com/"}, "url": "https://www.semanticscholar.org/paper/b446e12c7d622d0971e5163a0476bb38c4dec964", "title": "A brief history of AI: how to prevent another winter (a critical review)", "abstract": null, "venue": "PET Clinics", "year": 2021, "referenceCount": 102, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2109.01517", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-09-03", "journal": {"volume": "16 4", "pages": "\n 449-469\n ", "name": "PET clinics"}, "authors": [{"authorId": "143994489", "name": "Amirhosein Toosi"}, {"authorId": "145456332", "name": "A. Bottino"}, {"authorId": "2335142", "name": "B. Saboury"}, {"authorId": "1691257", "name": "E. Siegel"}, {"authorId": "2646713", "name": "A. Rahmim"}]}, {"paperId": "cdb971376a98337bdd123913c4adac2338477433", "externalIds": {"DOI": "10.1177/1071181321651098", "CorpusId": 244088295}, "corpusId": 244088295, "publicationVenue": {"id": "e3223b71-e378-4859-844d-6bff89c6fd9d", "name": "Proceedings of the Human Factors and Ergonomics Society Annual Meeting", "alternate_names": ["Proc Hum Factor Ergon Soc Annu Meet"], "issn": "1071-1813", "url": "http://www.hcirn.com/res/event/hfesam.php", "alternate_urls": ["http://pro.sagepub.com/", "https://uk.sagepub.com/en-gb/eur/proceedings-of-the-human-factors-and-ergonomics-society-annual-meeting/journal202046", "https://journals.sagepub.com/home/pro"]}, "url": "https://www.semanticscholar.org/paper/cdb971376a98337bdd123913c4adac2338477433", "title": "Effects of Human Personal Space on the Robot Obstacle Avoidance Be havior: A Human-in-the-loop Assessment", "abstract": "To ensure both the physical and mental safety of humans during human-robot interaction (HRI), a rich body of literature has been accumulated, and the notion of socially acceptable robot behaviors has arisen. To be specific, it requires the motion of robots not only to be physically collision-free but also to consider and respect the social conventions developed and enforced in the human social contexts. Among these social conventions, personal space, or proxemics, is one of the most commonly considered in the robot behavioral design. Nevertheless, most previous research efforts assumed that robots could generate human-like motions by merely mimicking a human. Rarely are the robot\u2019s behavioral algorithms assessed and verified by human participants. Therefore, to fill the research gap, a Turing-like simulation test, which contains the interaction of two agents (each agent could be a human or a robot) in a shared space was conducted. Participants (33 in total) were asked to identify and label the category of those agents followed by questionnaires. Results revealed that people who had different attitudes and prior expectations of appropriate robot behaviors responded to the algorithm differently, and their identification accuracy varied significantly. In general, by considering personal space in the robot obstacle avoidance algorithm, robots could demonstrate more humanlike motion behaviors which are confirmed by human experiments.", "venue": "Proceedings of the Human Factors and Ergonomics Society Annual Meeting", "year": 2021, "referenceCount": 24, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/1071181321651098", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "65", "pages": "1195 - 1199", "name": "Proceedings of the Human Factors and Ergonomics Society Annual Meeting"}, "authors": [{"authorId": "1920941674", "name": "Yuhao Chen"}, {"authorId": "2148492143", "name": "Trevor Smith"}, {"authorId": "2097015689", "name": "Nathan Hewitt"}, {"authorId": "2153395244", "name": "Yu Gu"}, {"authorId": "5234789", "name": "Boyi Hu"}]}, {"paperId": "a8166015099ec828189d64caf81ea2d44dded5c3", "externalIds": {"DOI": "10.1007/s11055-021-01149-4", "CorpusId": 243839698}, "corpusId": 243839698, "publicationVenue": {"id": "85b26477-7344-4a25-a32d-136a2f1a50ce", "name": "Neuroscience and Behavioral Physiology", "type": "journal", "alternate_names": ["Neurosci Behav Physiol"], "issn": "0097-0549", "url": "http://link.springer.com/journal/11055"}, "url": "https://www.semanticscholar.org/paper/a8166015099ec828189d64caf81ea2d44dded5c3", "title": "The Cognitome: Seeking the Fundamental Neuroscience of a Theory of Consciousness", "abstract": null, "venue": "Neuroscience and Behavioral Physiology", "year": 2021, "referenceCount": 160, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": "51", "pages": "915 - 937", "name": "Neuroscience and Behavioral Physiology"}, "authors": [{"authorId": "2980029", "name": "K. Anokhin"}]}, {"paperId": "0539c6a70adb2481ed3c67d2d0c9fbf93cf250ee", "externalIds": {"MAG": "3198593607", "DOI": "10.5772/INTECHOPEN.96324", "CorpusId": 239709576}, "corpusId": 239709576, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0539c6a70adb2481ed3c67d2d0c9fbf93cf250ee", "title": "Quest for I (Intelligence) in AI (Artificial Intelligence): A Non-Elusive Attempt", "abstract": null, "venue": "", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.intechopen.com/citation-pdf-url/75517", "status": null}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "33966570", "name": "K. Ray"}]}, {"paperId": "c6451bbc1160050b0af049a759ed252b5d310604", "externalIds": {"DOI": "10.15290/bsp.2021.26.03.03", "CorpusId": 239476730}, "corpusId": 239476730, "publicationVenue": {"id": "e23344ba-24ff-4c0d-bd60-ecc628c8c237", "name": "Bia\u0142ostockie Studia Prawnicze", "alternate_names": ["Bia\u0142ostockie Stud Prawnicze"], "issn": "1689-7404", "url": "http://bsp.uwb.edu.pl/en/about-the-journal-2/"}, "url": "https://www.semanticscholar.org/paper/c6451bbc1160050b0af049a759ed252b5d310604", "title": "Is the Traditional Method of Regulation (the Legislative Act) Sufficient to Regulate Artificial Intelligence, or Should It Also Be Regulated by an Algorithmic Code?", "abstract": "Abstract The issue of the regulation of artificial intelligence (AI) is one of the significant challenges faced by the EU at present. Most researchers focus on the substantive scope of AI regulation, including state law, ethical norms and soft law. In addition to the substantive and legal scope of the regulation, it is worthwhile considering the manner of such regulation.1 Since AI is an algorithmic code, it seems correct to regulate (restrict) AI not so much with traditional law established in natural (human) language as with one implemented into algorithms. They may operate as a tool supporting traditional legislation (RegTech), but it is possible to go further with the issue and create regulation algorithms which implement the law as the effective law. However, this requires a new approach to law and legislation \u2013 the law as algorithmic code.", "venue": "Bia\u0142ostockie Studia Prawnicze", "year": 2021, "referenceCount": 70, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.sciendo.com/pdf/10.15290/bsp.2021.26.03.03", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": "26", "pages": "43 - 60", "name": "Bia\u0142ostockie Studia Prawnicze"}, "authors": [{"authorId": "102000931", "name": "D. Szostek"}]}, {"paperId": "767e296064cc30f814c52c270f493ef297b8b0cb", "externalIds": {"DBLP": "journals/symmetry/SunZ21", "MAG": "3196880919", "DOI": "10.3390/sym13091603", "CorpusId": 239668788}, "corpusId": 239668788, "publicationVenue": {"id": "1620da87-4387-4b9a-9bf4-22fdf74d4dc3", "name": "Symmetry", "type": "journal", "issn": "2073-8994", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-172134", "alternate_urls": ["https://www.mdpi.com/journal/symmetry", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-172134"]}, "url": "https://www.semanticscholar.org/paper/767e296064cc30f814c52c270f493ef297b8b0cb", "title": "Modeling Neuronal Systems as an Open Quantum System", "abstract": "We propose a physical model for neurons to describe how neurons interact with one another through the surrounding materials of neuronal cell bodies. We model the neuronal cell surroundings, include the dendrites, the axons and the synapses, as well as the surrounding glial cells, as a continuous distribution of oscillating modes inspired from the electric circuital picture of neuronal action potential. By analyzing the dynamics of this neuronal model by using the master equation approach of open quantum systems, we investigated the collective behavior of neurons. After applying stimulations to the neuronal system, the neuron collective state is activated and shows the action potential behavior. We find that this model can generate random neuron\u2013neuron interactions and is appropriate for describing the process of information transmission in the neuronal system, which may pave a potential route toward understanding the dynamics of nervous system.", "venue": "Symmetry", "year": 2021, "referenceCount": 55, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2073-8994/13/9/1603/pdf?version=1630484516", "status": null}, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "13", "pages": "1603", "name": "Symmetry"}, "authors": [{"authorId": "2108568401", "name": "Yujie Sun"}, {"authorId": "9810381", "name": "Wei-Min Zhang"}]}, {"paperId": "8b08e549fe4c88b32c31b988ac97adf74d1bf63d", "externalIds": {"MAG": "3200793067", "DOI": "10.1016/j.hrmr.2021.100856", "CorpusId": 240526859}, "corpusId": 240526859, "publicationVenue": {"id": "5f3c12b1-7ae0-4a4e-929c-295471363ef5", "name": "Human Resource Management Review", "type": "journal", "alternate_names": ["Hum Resour Manag Rev"], "issn": "1053-4822", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/620229/description#description", "alternate_urls": ["https://www.journals.elsevier.com/human-resource-management-review", "http://www.sciencedirect.com/science/journal/10534822"]}, "url": "https://www.semanticscholar.org/paper/8b08e549fe4c88b32c31b988ac97adf74d1bf63d", "title": "Toward the human \u2013 Centered approach. A revised model of individual acceptance of AI", "abstract": null, "venue": "Human Resource Management Review", "year": 2021, "referenceCount": 140, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"name": "Human Resource Management Review"}, "authors": [{"authorId": "145036277", "name": "M. Giudice"}, {"authorId": "97494986", "name": "V. Scuotto"}, {"authorId": "50431348", "name": "Beatrice Orlando"}, {"authorId": "73855458", "name": "Mario Mustilli"}]}, {"paperId": "5915077680344ac6da77056ce8733ace28571278", "externalIds": {"PubMedCentral": "8468082", "DOI": "10.3390/diagnostics11091719", "CorpusId": 237938750, "PubMed": "34574060"}, "corpusId": 237938750, "publicationVenue": {"id": "1944b6e1-2c1d-4f42-88e3-9f8a52f57e47", "name": "Diagnostics", "issn": "2075-4418", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217965", "alternate_urls": ["https://www.mdpi.com/journal/diagnostics", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217965"]}, "url": "https://www.semanticscholar.org/paper/5915077680344ac6da77056ce8733ace28571278", "title": "A New Dawn for the Use of Artificial Intelligence in Gastroenterology, Hepatology and Pancreatology", "abstract": "Artificial intelligence (AI) is rapidly becoming an essential tool in the medical field as well as in daily life. Recent developments in deep learning, a subfield of AI, have brought remarkable advances in image recognition, which facilitates improvement in the early detection of cancer by endoscopy, ultrasonography, and computed tomography. In addition, AI-assisted big data analysis represents a great step forward for precision medicine. This review provides an overview of AI technology, particularly for gastroenterology, hepatology, and pancreatology, to help clinicians utilize AI in the near future.", "venue": "Diagnostics", "year": 2021, "referenceCount": 201, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2075-4418/11/9/1719/pdf?version=1632385930", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "11", "name": "Diagnostics"}, "authors": [{"authorId": "3688948", "name": "A. Oka"}, {"authorId": "4283493", "name": "N. Ishimura"}, {"authorId": "47000564", "name": "S. Ishihara"}]}, {"paperId": "3a3be5f223c237123ee35ea058b7d21a650ca557", "externalIds": {"DBLP": "journals/patterns/NakhleH21", "PubMedCentral": "8441561", "DOI": "10.1016/j.patter.2021.100323", "CorpusId": 237592274, "PubMed": "34553170"}, "corpusId": 237592274, "publicationVenue": {"id": "17bac89e-3dba-467a-b9d4-71e3baefb08b", "name": "Patterns", "type": "journal", "issn": "2666-3899", "url": "https://www.cell.com/patterns", "alternate_urls": ["https://www.sciencedirect.com/journal/patterns"]}, "url": "https://www.semanticscholar.org/paper/3a3be5f223c237123ee35ea058b7d21a650ca557", "title": "Ready, Steady, Go AI: A practical tutorial on fundamentals of artificial intelligence and its applications in phenomics image analysis", "abstract": null, "venue": "Patterns", "year": 2021, "referenceCount": 131, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cell.com/article/S2666389921001719/pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "2", "name": "Patterns"}, "authors": [{"authorId": "31094827", "name": "Farid Nakhle"}, {"authorId": "2318165", "name": "A. Harfouche"}]}, {"paperId": "8acef4846dc195a718505cd0a2ca96a433acd50d", "externalIds": {"DOI": "10.1086/715227", "CorpusId": 237537702}, "corpusId": 237537702, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8acef4846dc195a718505cd0a2ca96a433acd50d", "title": "Chatbots, Gender, and Race on Web 2.0 Platforms: Tay.AI as Monstrous Femininity and Abject Whiteness", "abstract": "In March 2016, Microsoft launched Tay.AI, a chatbot designed to experiment with conversational understanding through direct engagement with social media users. Marketed as the digital representation of an 18\u201324-year-old, cis-gendered female, Tay.ai was meant to be chatty, personable, friendly, and innocuous. Hours into launch, however, the chatbot\u2019s mimetic programming structure was taken advantage of by organized groups of online social media users, and Tay.ai began replying to queries with alt-right and neo-Nazi ideology. In this article, I explore the role that Tay.ai\u2019s assigned gender and race played in influencing both Tay.ai\u2019s initial design and, subsequently, the program\u2019s monstrous evolution. This is achieved through three avenues of thought. First, I situate Tay within the new public of Web 2.0, a space reliant on user participation and beholden to the neoliberal, racialized, and gendered architectures that produce it. I then consider Tay as an evolution of the chatbot, arguing that Tay is emblematic of both race and gender as social technologies. Third, I explore Tay\u2019s aberration from programmatic protocols in the context of the monstrous and the abject, suggesting that digital nonhuman ambivalence to programming and encoded control presents a space of productive creativity.", "venue": "Signs: Journal of Women in Culture and Society", "year": 2021, "referenceCount": 86, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": "47", "pages": "105 - 127", "name": "Signs: Journal of Women in Culture and Society"}, "authors": [{"authorId": "2127104740", "name": "Zoe Vorsino"}]}, {"paperId": "dc232b07587a92478bcc25aaba8f739c5621daa0", "externalIds": {"DBLP": "journals/ais/Farhadi21", "DOI": "10.1007/s00146-020-01136-2", "CorpusId": 231615619}, "corpusId": 231615619, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/dc232b07587a92478bcc25aaba8f739c5621daa0", "title": "There is no \u201cI\u201d in \u201cAI\u201d", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "36", "pages": "1035-1046", "name": "AI & SOCIETY"}, "authors": [{"authorId": "11060885", "name": "A. Farhadi"}]}, {"paperId": "a1a3174094a15bd439f6a40c5407734ed5847347", "externalIds": {"MAG": "3194739791", "DOI": "10.22214/ijraset.2021.37617", "CorpusId": 238729641}, "corpusId": 238729641, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1a3174094a15bd439f6a40c5407734ed5847347", "title": "Role of Artificial Intelligence in Medicine and Clinical Research", "abstract": "Abstract: Artificial Intelligence is a branch of computer science that enables to analyse complex medical data. The proficiency of artificial intelligence techniques has been explored to a great extent in the field of medicine. Most of the medications go to the business sector after a long tedious process of drug development. It can take a period of 10-15 years or more to convey a medication from its introductory revelation to the hands of the patients. Artificial Intelligence can significantly reduce the time required and can also cut down the expenses by half. Among the methods, artificial neural network is the most widely used analytical tool while other techniques like fuzzy expert systems, natural language processing, robotic process automation and evolutionary computation have been used in different clinical settings. The aim of this paper is to discuss the different artificial intelligence techniques and provide a perspective on the benefits, future opportunities and risks of established artificial intelligence applications in clinical practice on medical education, physicians, healthcare institutions and bioethics. Keywords: Artificial intelligence, clinical trials, medical technologies, artificial neural networks, diagnosis.", "venue": "International Journal for Research in Applied Science and Engineering Technology", "year": 2021, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-31", "journal": {"name": "International Journal for Research in Applied Science and Engineering Technology"}, "authors": [{"authorId": "2132205477", "name": "Jhumpa Sarma"}]}, {"paperId": "e2ce77604b6e46bee85069c3d4dd38f66ef6d9a5", "externalIds": {"DOI": "10.1007/978-3-030-81447-2_1", "CorpusId": 242426762}, "corpusId": 242426762, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2ce77604b6e46bee85069c3d4dd38f66ef6d9a5", "title": "Computationalism in a Dynamic and\u00a0Distributed Eco-Cognitive Perspective", "abstract": null, "venue": "Cognitive Systems Monographs", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-08-31", "journal": {"name": "Cognitive Systems Monographs"}, "authors": [{"authorId": "1695372", "name": "L. Magnani"}]}, {"paperId": "32756c1475aa4b3867962b2c838844436bf8bce3", "externalIds": {"PubMedCentral": "8431329", "DOI": "10.3390/ijerph18179206", "CorpusId": 237468443, "PubMed": "34501795"}, "corpusId": 237468443, "publicationVenue": {"id": "3096eb5c-d18c-4877-94cd-28edd3a9c357", "name": "International Journal of Environmental Research and Public Health", "type": "journal", "alternate_names": ["Int J Environ Res Public Health"], "issn": "1660-4601", "url": "http://www.mdpi.com/journal/ijerph/"}, "url": "https://www.semanticscholar.org/paper/32756c1475aa4b3867962b2c838844436bf8bce3", "title": "Artificial Intelligence for Identifying the Prevention of Medication Incidents Causing Serious or Moderate Harm: An Analysis Using Incident Reporters\u2019 Views", "abstract": "The purpose of this study was to describe incident reporters\u2019 views identified by artificial intelligence concerning the prevention of medication incidents that were assessed, causing serious or moderate harm to patients. The information identified the most important risk management areas in these medication incidents. This was a retrospective record review using medication-related incident reports from one university hospital in Finland between January 2017 and December 2019 (n = 3496). Of these, incidents that caused serious or moderate harm to patients (n = 137) were analysed using artificial intelligence. Artificial intelligence classified reporters\u2019 views on preventing incidents under the following main categories: (1) treatment, (2) working, (3) practices, and (4) setting and multiple sub-categories. The following risk management areas were identified: (1) verification, documentation and up-to-date drug doses, drug lists and other medication information, (2) carefulness and accuracy in managing medications, (3) ensuring the flow of information and communication regarding medication information and safeguarding continuity of patient care, (4) availability, update and compliance with instructions and guidelines, (5) multi-professional cooperation, and (6) adequate human resources, competence and suitable workload. Artificial intelligence was found to be useful and effective to classifying text-based data, such as the free text of incident reports.", "venue": "International Journal of Environmental Research and Public Health", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1660-4601/18/17/9206/pdf?version=1630549999", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-31", "journal": {"volume": "18", "name": "International Journal of Environmental Research and Public Health"}, "authors": [{"authorId": "15914029", "name": "Marja H\u00e4rk\u00e4nen"}, {"authorId": "2562355", "name": "K. Haatainen"}, {"authorId": "1411547615", "name": "K. Vehvil\u00e4inen-Julkunen"}, {"authorId": "2322195", "name": "M. Miettinen"}]}, {"paperId": "e18c34b8d6e66d1d3bdec4edf3a64dd4c757cc77", "externalIds": {"DBLP": "journals/corr/abs-2108-12973", "ArXiv": "2108.12973", "DOI": "10.1145/3474085.3475700", "CorpusId": 237353520}, "corpusId": 237353520, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e18c34b8d6e66d1d3bdec4edf3a64dd4c757cc77", "title": "Armor: A Benchmark for Meta-evaluation of Artificial Music", "abstract": "Objective evaluation (OE) is essential to artificial music, but it's often very hard to determine the quality of OEs. Hitherto, subjective evaluation (SE) remains reliable and prevailing but suffers inevitable disadvantages that OEs may overcome. Therefore, a meta-evaluation system is necessary for designers to test the effectiveness of OEs. In this paper, we present Armor, a complex and cross-domain benchmark dataset that serves this purpose. Since OEs should correlate with human judgment, we provide music as test cases for OEs and human judgment scores as touchstones. We also provide two meta-evaluation scenarios and their corresponding testing methods to assess the effectiveness of OEs. To the best of our knowledge, Armor is the first comprehensive and rigorous framework that future works could follow, take example by, and improve upon for the task of evaluating computer-generated music and the field of computational music as a whole. By analyzing different OE methods on our dataset, we observe that there is still a huge gap between SE and OE, meaning that hard-coded algorithms are far from catching human's judgment to the music.", "venue": "ACM Multimedia", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2108.12973", "status": null}, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-08-30", "journal": {"name": "Proceedings of the 29th ACM International Conference on Multimedia"}, "authors": [{"authorId": "2117075628", "name": "Songhe Wang"}, {"authorId": "2125209268", "name": "Zheng Bao"}, {"authorId": "2124978286", "name": "E. Jingtong"}]}, {"paperId": "0003510ca25103ac605945c20e90586ee24de538", "externalIds": {"MAG": "3198908536", "DOI": "10.3390/LAWS10030070", "CorpusId": 239682244}, "corpusId": 239682244, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0003510ca25103ac605945c20e90586ee24de538", "title": "Digital Transformation and Artificial Intelligence Applied to Business: Legal Regulations, Economic Impact and Perspective", "abstract": "Digital transformation can be defined as the integration of new technologies into all areas of a company. This technological integration will ultimately imply a need to transform traditional business models. Similarly, artificial intelligence has been one of the most disruptive technologies of recent decades, with a high potential impact on business and people. Cognitive approaches that simulate both human behavior and thinking are leading to advanced analytical models that help companies to boost sales and customer engagement, improve their operational efficiency, improve their services and, in short, generate new relevant information from data. These decision-making models are based on descriptive, predictive and prescriptive analytics. This necessitates the existence of a legal framework that regulates all digital changes with uniformity between countries and helps a proper digital transformation process under a clear regulation. On the other hand, it is essential that this digital disruption is not slowed down by the regulatory framework. This work will demonstrate that AI and digital transformation will be an intrinsic part of many applications and will therefore be universally deployed. However, this implementation will have to be done under common regulations and in line with the new reality.", "venue": "", "year": 2021, "referenceCount": 91, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2075-471X/10/3/70/pdf?version=1630059121", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-27", "journal": {"volume": "10", "pages": "70", "name": "Laws"}, "authors": [{"authorId": "107725612", "name": "Ricardo Francisco Reier Forradellas"}, {"authorId": "2135150203", "name": "Luis Miguel Garay Gallastegui"}]}, {"paperId": "3390c4c6f31ca43063a8ed3ea857d8da89114789", "externalIds": {"DOI": "10.1093/icb/icab188", "CorpusId": 237322884, "PubMed": "34448841"}, "corpusId": 237322884, "publicationVenue": {"id": "41ae3155-d508-42ce-bb5d-d056eb5c79f6", "name": "Integrative and Comparative Biology", "type": "journal", "alternate_names": ["Integr Comp Biology"], "issn": "1540-7063", "url": "http://www.bioone.org/bioone/?issn=1540-7063&request=get-journals-list", "alternate_urls": ["http://www.jstor.org/journals/15407063.html", "http://icb.oxfordjournals.org/", "https://www.jstor.org/journal/intecompbiol"]}, "url": "https://www.semanticscholar.org/paper/3390c4c6f31ca43063a8ed3ea857d8da89114789", "title": "Artificial Intelligence for Biology.", "abstract": "Despite efforts to integrate research across different subdisciplines of biology, the scale of integration remains limited. We hypothesize that future generations of Artificial Intelligence (AI) technologies specifically adapted for biological sciences will help enable the reintegration of biology. AI technologies will allow us not only to collect, connect and analyze data at unprecedented scales, but also to build comprehensive predictive models that span various subdisciplines. They will make possible both targeted (testing specific hypotheses) and untargeted discoveries. AI for biology will be the cross-cutting technology that will enhance our ability to do biological research at every scale. We expect AI to revolutionize biology in the 21st century much like statistics transformed biology in the 20th century. The difficulties, however, are many, including data curation and assembly, development of new science in the form of theories that connect the subdisciplines, and new predictive and interpretable AI models that are more suited to biology than existing machine learning and AI techniques. Development efforts will require strong collaborations between biological and computational scientists. This white paper provides a vision for AI for Biology and highlights some challenges.", "venue": "Integrative and Comparative Biology", "year": 2021, "referenceCount": 64, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/icb/article-pdf/61/6/2267/42751346/icab188.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-27", "journal": {"name": "Integrative and comparative biology"}, "authors": [{"authorId": "3242252", "name": "S. Hassoun"}, {"authorId": "50396886", "name": "F. Jefferson"}, {"authorId": "2148376035", "name": "Xinghua Shi"}, {"authorId": "38820889", "name": "Brian J. Stucky"}, {"authorId": "2143720173", "name": "Jin Wang"}, {"authorId": "1743851", "name": "E. Rosa"}]}, {"paperId": "9a3fa520426c3460198912d7c4727dc6c57935ad", "externalIds": {"MAG": "3194035649", "DOI": "10.1108/ohi-02-2021-0037", "CorpusId": 238680258}, "corpusId": 238680258, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a3fa520426c3460198912d7c4727dc6c57935ad", "title": "An interdisciplinary approach for tacit knowledge communication between the designer and the computer", "abstract": "PurposeThis research investigates the means of tacit knowledge (TK) communication between the designer and the computer in architectural design. Despite the integration of state-of-the-art computational technologies in different design phases, this integration happens within a limited scope, focusing mainly on tangible aspects of the design process, such as technical systems and visual representations. This lets architectural design miss the wider scope technology provides, where it can help in developing the computational design process through incorporating new intangible knowledge domains that were usually neglected, such as tacit knowledge, and through incorporating more design entities that were not included in the design process before.Design/methodology/approachThe study conducts an interdisciplinary analytical review of the literature to achieve two main research goals. The first goal investigates TK communication between human beings and the second understands approaches of TK communication between humans and computers. For each goal, three phases were implemented; an initial research phase, where main keywords are identified, a sampling and selection of literature phase and an analysis of literature phase.FindingsThrough interlinking findings from different disciplines, the study presents a theoretical framework for TK communication. The framework provides architects with an approach to construct and transfer TK while using the computer in a computational design environment, presenting an individual and a social set of conditions and factors revealed from the review of the analyzed literature. The framework particularly emphasizes the significance of a human\u2013computer symbiotic relationship for the process of TK communication to take place.Originality/valueThis paper presents a novel interdisciplinary reading into the literature of fields beyond architectural design, incorporating intangible knowledge domains into the computational design process and expanding the capabilities of computational design tools to allow for the transfer of intangible design attributes between different design entities, particularly tacit design knowledge.", "venue": "Open House International", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-24", "journal": {"name": "Open House International"}, "authors": [{"authorId": "2132277385", "name": "Hala Hossam Eldin"}, {"authorId": "1394931314", "name": "Ramy Bakir"}, {"authorId": "1429704981", "name": "S. El-Fiki"}]}, {"paperId": "92d8b5d427d07942810b2295dd17777d8a9e640c", "externalIds": {"DBLP": "journals/mima/Maclure21", "DOI": "10.1007/s11023-021-09570-x", "CorpusId": 238244722}, "corpusId": 238244722, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/92d8b5d427d07942810b2295dd17777d8a9e640c", "title": "AI, Explainability and Public Reason: The Argument from the Limitations of the Human Mind", "abstract": null, "venue": "Minds and Machines", "year": 2021, "referenceCount": 71, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11023-021-09570-x.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-23", "journal": {"volume": "31", "pages": "421 - 438", "name": "Minds and Machines"}, "authors": [{"authorId": "46514294", "name": "J. Maclure"}]}, {"paperId": "e25d2cd25f708fbf04faf50954eaadced9a1e3e5", "externalIds": {"PubMedCentral": "8380863", "DOI": "10.1007/s42454-021-00035-1", "CorpusId": 237278455}, "corpusId": 237278455, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e25d2cd25f708fbf04faf50954eaadced9a1e3e5", "title": "Hume\u2019s guillotine and intelligent technologies", "abstract": null, "venue": "Human-Intelligent Systems Integration", "year": 2021, "referenceCount": 56, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s42454-021-00035-1.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-23", "journal": {"volume": "3", "pages": "241 - 250", "name": "Human-Intelligent Systems Integration"}, "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}]}, {"paperId": "7b26aaae20aa8a8ab42360596698de04c2130a12", "externalIds": {"MAG": "3194860451", "DOI": "10.34024/prometeica.2021.23.10811", "CorpusId": 238736674}, "corpusId": 238736674, "publicationVenue": {"id": "ec5606ee-408d-4bbc-8b17-26b990cdbcb6", "name": "Prometeica", "issn": "1852-9488", "url": "https://periodicos.unifesp.br/index.php/prometeica/", "alternate_urls": ["https://dialnet.unirioja.es/servlet/revista?codigo=13823"]}, "url": "https://www.semanticscholar.org/paper/7b26aaae20aa8a8ab42360596698de04c2130a12", "title": "The kantian notion of freedom and autonomy of artificial agency", "abstract": "The objective of this paper is to provide critical analysis of the Kantian notion of freedom (especially the problem of the third antinomy and its resolution in the critique of pure reason); its significance in the contemporary debate on free-will and determinism, and the possibility of autonomy of artificial agency in the Kantian paradigm of autonomy. Kant's resolution of the third antinomy by positing the ground in the noumenal self resolves the problem of antinomies; however, it invites an explanatory gap between phenomenality and the noumenal self; even if he has successfully established the compatibility of natural causality and non-natural causality through his transcendental argument. This paper is also devoted to establishing the plausibility of the knowledge claim that Kantian reduction of phenomenality has served half of the purpose of the AI scientists on the possibility of Artificial Autonomous Agency.", "venue": "Prometeica", "year": 2021, "referenceCount": 26, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://periodicos.unifesp.br/index.php/prometeica/article/download/10811/8750", "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-22", "journal": {"name": "Prometeica - Revista de Filosof\u00eda y Ciencias"}, "authors": [{"authorId": "117955029", "name": "M. Sahu"}]}, {"paperId": "ba1bb2d152aba3755ac933ecc7f6cc67b1f89f71", "externalIds": {"MAG": "3195783210", "DOI": "10.1080/00472778.2021.1955125", "CorpusId": 238736336}, "corpusId": 238736336, "publicationVenue": {"id": "147f1f0c-b554-42c6-aa40-ff4089bbc563", "name": "Journal of Small Business Management", "type": "journal", "alternate_names": ["J Small Bus Manag"], "issn": "0047-2778", "url": "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1540-627X"}, "url": "https://www.semanticscholar.org/paper/ba1bb2d152aba3755ac933ecc7f6cc67b1f89f71", "title": "\u201cHasta la vista, baby\u201d \u2013 will machine learning terminate human literature reviews in entrepreneurship?", "abstract": null, "venue": "Journal of Small Business Management", "year": 2021, "referenceCount": 80, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-19", "journal": {"name": "Journal of Small Business Management"}, "authors": [{"authorId": "143784473", "name": "Sebastian Robledo"}, {"authorId": "2132419448", "name": "Andr\u00e9s Mauricio Grisales Aguirre"}, {"authorId": "9759238", "name": "M. Hughes"}, {"authorId": "98090309", "name": "Fabian Eggers"}]}, {"paperId": "1e9201aaa94bba6968505110187cbe86c42917f2", "externalIds": {"PubMedCentral": "8417437", "DOI": "10.3389/fonc.2021.702270", "CorpusId": 237218583, "PubMed": "34490103"}, "corpusId": 237218583, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1e9201aaa94bba6968505110187cbe86c42917f2", "title": "An Adversarial Deep-Learning-Based Model for Cervical Cancer CTV Segmentation With Multicenter Blinded Randomized Controlled Validation", "abstract": "Purpose To propose a novel deep-learning-based auto-segmentation model for CTV delineation in cervical cancer and to evaluate whether it can perform comparably well to manual delineation by a three-stage multicenter evaluation framework. Methods An adversarial deep-learning-based auto-segmentation model was trained and configured for cervical cancer CTV contouring using CT data from 237 patients. Then CT scans of additional 20 consecutive patients with locally advanced cervical cancer were collected to perform a three-stage multicenter randomized controlled evaluation involving nine oncologists from six medical centers. This evaluation system is a combination of objective performance metrics, radiation oncologist assessment, and finally the head-to-head Turing imitation test. Accuracy and effectiveness were evaluated step by step. The intra-observer consistency of each oncologist was also tested. Results In stage-1 evaluation, the mean DSC and the 95HD value of the proposed model were 0.88 and 3.46 mm, respectively. In stage-2, the oncologist grading evaluation showed the majority of AI contours were comparable to the GT contours. The average CTV scores for AI and GT were 2.68 vs. 2.71 in week 0 (P = .206), and 2.62 vs. 2.63 in week 2 (P = .552), with no significant statistical differences. In stage-3, the Turing imitation test showed that the percentage of AI contours, which were judged to be better than GT contours by \u22655 oncologists, was 60.0% in week 0 and 42.5% in week 2. Most oncologists demonstrated good consistency between the 2 weeks (P > 0.05). Conclusions The tested AI model was demonstrated to be accurate and comparable to the manual CTV segmentation in cervical cancer patients when assessed by our three-stage evaluation framework.", "venue": "Frontiers in Oncology", "year": 2021, "referenceCount": 43, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fonc.2021.702270/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-19", "journal": {"volume": "11", "name": "Frontiers in Oncology"}, "authors": [{"authorId": "5515909", "name": "Zhikai Liu"}, {"authorId": "2111898676", "name": "Wanqi Chen"}, {"authorId": "2306471", "name": "H. Guan"}, {"authorId": "107736091", "name": "Hongnan Zhen"}, {"authorId": "2109659501", "name": "Jing Shen"}, {"authorId": "2108661388", "name": "Xia Liu"}, {"authorId": "144675148", "name": "An Liu"}, {"authorId": "50392067", "name": "Richard Li"}, {"authorId": "8194728", "name": "J. Geng"}, {"authorId": "46864001", "name": "J. You"}, {"authorId": "2108396138", "name": "Weihu Wang"}, {"authorId": "2144279450", "name": "Zhouyu Li"}, {"authorId": "2129520448", "name": "Yongfeng Zhang"}, {"authorId": "2144035580", "name": "Yuanyuan Chen"}, {"authorId": "2107557260", "name": "J. Du"}, {"authorId": "2115814195", "name": "Qi Chen"}, {"authorId": "2144837443", "name": "Yu Chen"}, {"authorId": "2117149681", "name": "Shaobin Wang"}, {"authorId": "48702736", "name": "Fuquan Zhang"}, {"authorId": "1665045805", "name": "J. Qiu"}]}, {"paperId": "4aa8eee8fc73007114d53b6e1bd1974f2b9b06e7", "externalIds": {"MAG": "3193456649", "DOI": "10.1108/fs-02-2021-0048", "CorpusId": 238673269}, "corpusId": 238673269, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4aa8eee8fc73007114d53b6e1bd1974f2b9b06e7", "title": "The feasibility of artificial intelligence performing as CEO: the vizier-shah theory", "abstract": "\nPurpose\nThis paper aims to examine the feasibility of artificial intelligence (AI) performing as chief executive officer (CEO) in organizations.\n\n\nDesign/methodology/approach\nThe authors followed an explorative research design \u2013 classic grounded theory methodology. The authors conducted face-to-face interviews with 27 participants that were selected according to theoretical sampling. The sample consisted of academics from the fields of AI, philosophy and management; experts and artists performing in the field of AI and professionals from the business world.\n\n\nFindings\nAs a result of the grounded theory process \u201cThe Vizier-Shah Theory\u201d emerged. The theory consisted of five theoretical categories: narrow AI, hard problems, debates, solutions and AI-CEO. The category \u201cAI as a CEO\u201d introduces four futuristic AI-CEO models.\n\n\nOriginality/value\nThis study introduces an original theory that explains the evolution process of narrow AI to AI-CEO. The theory handles the issue from an interdisciplinary perspective by following an exploratory research design \u2013 classic grounded theory and provides insights for future research.\n", "venue": "foresight", "year": 2021, "referenceCount": 47, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-16", "journal": {"name": "foresight"}, "authors": [{"authorId": "48704597", "name": "Aslihan \u00dcnal"}, {"authorId": "100657061", "name": "I. Kilin\u00e7"}]}, {"paperId": "4f938b62b63a3909b3e08d77eff6109b5570bf46", "externalIds": {"MAG": "3198229386", "DOI": "10.3917/dio.269.0107", "CorpusId": 239716934}, "corpusId": 239716934, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4f938b62b63a3909b3e08d77eff6109b5570bf46", "title": "L\u2019intelligence artificielle n\u2019existe-t-elle vraiment pas\u00a0? Quelques \u00e9l\u00e9ments de clarification autour d\u2019une science controvers\u00e9e", "abstract": null, "venue": "Diog\u00e8ne", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-08-16", "journal": {"name": "Diog\u00e8ne"}, "authors": [{"authorId": "46681282", "name": "Jean-S\u00e9bastien Vayre"}, {"authorId": "3166598", "name": "G\u00e9rald Gaglio"}]}, {"paperId": "2d394006c9495c506e3b4535e2f497f235a7ba13", "externalIds": {"DBLP": "journals/corr/abs-2108-07129", "ArXiv": "2108.07129", "CorpusId": 237091552}, "corpusId": 237091552, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d394006c9495c506e3b4535e2f497f235a7ba13", "title": "Autoencoders as Tools for Program Synthesis", "abstract": "Recently there have been many advances in research on language modeling of source code. Applications range from code suggestion and completion to code summarization. However, complete program synthesis of industry-grade programming languages has not been researched extensively. In this work, we introduce a variational autoencoder model for program synthesis of industry-grade programming languages. Our model incorporates the internal hierarchical structure of source codes and operates on parse trees. By learning a latent representation of source code over trees, we capture more information and achieve a higher performance than standard autoregressive autoencoder models. Furthermore, due to the tree-structured nature of our model, the autoregressive operations are performed on paths of trees instead of linear sequences. Therefore, the size of the sequences that the autoregressive model processes, scales proportionally to the width and depth of the tree instead of the total size of the tree which mitigates the common problem of exploding and vanishing gradients.", "venue": "ArXiv", "year": 2021, "referenceCount": 46, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-16", "journal": {"volume": "abs/2108.07129", "name": "ArXiv"}, "authors": [{"authorId": "2123319458", "name": "Sander de Bruin"}, {"authorId": "2066239833", "name": "Vadim Liventsev"}, {"authorId": "1790288", "name": "M. Petkovi'c"}]}, {"paperId": "209e1ed21e8f117b10feaa10d1cedbe4a963bf0c", "externalIds": {"PubMedCentral": "8497074", "DOI": "10.1093/eurheartj/ehab544", "CorpusId": 237095372, "PubMed": "34392353"}, "corpusId": 237095372, "publicationVenue": {"id": "3e3fb1ae-7d3b-430c-9f51-5d7b4f6906e0", "name": "European Heart Journal", "type": "journal", "alternate_names": ["Eur Heart J", "Eur heart j", "European heart journal"], "issn": "0195-668X", "alternate_issns": ["1695-9841"], "url": "http://www.arsxxi.com/", "alternate_urls": ["http://eurheartj.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/209e1ed21e8f117b10feaa10d1cedbe4a963bf0c", "title": "Artificial intelligence in the diagnosis and management of arrhythmias", "abstract": "Abstract The field of cardiac electrophysiology (EP) had adopted simple artificial intelligence (AI) methodologies for decades. Recent renewed interest in deep learning techniques has opened new frontiers in electrocardiography analysis including signature identification of diseased states. Artificial intelligence advances coupled with simultaneous rapid growth in computational power, sensor technology, and availability of web-based platforms have seen the rapid growth of AI-aided applications and big data research. Changing lifestyles with an expansion of the concept of internet of things and advancements in telecommunication technology have opened doors to population-based detection of atrial fibrillation in ways, which were previously unimaginable. Artificial intelligence-aided advances in 3D cardiac imaging heralded the concept of virtual hearts and the simulation of cardiac arrhythmias. Robotics, completely non-invasive ablation therapy, and the concept of extended realities show promise to revolutionize the future of EP. In this review, we discuss the impact of AI and recent technological advances in all aspects of arrhythmia care.", "venue": "European Heart Journal", "year": 2021, "referenceCount": 105, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/eurheartj/article-pdf/42/38/3904/40526393/ehab544.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-15", "journal": {"volume": "42", "pages": "3904 - 3916", "name": "European Heart Journal"}, "authors": [{"authorId": "144347328", "name": "Venkat D Nagarajan"}, {"authorId": "1847967", "name": "Su-Lin Lee"}, {"authorId": "8082229", "name": "J. Robertus"}, {"authorId": "1965636", "name": "C. Nienaber"}, {"authorId": "3298288", "name": "N. Trayanova"}, {"authorId": "145012041", "name": "S. Ernst"}]}, {"paperId": "44ff8ccb3a7a88465e991cfe0bb7cf8d2414da58", "externalIds": {"MAG": "3194918255", "DOI": "10.1016/J.ENG.2021.04.027", "CorpusId": 238716401}, "corpusId": 238716401, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/44ff8ccb3a7a88465e991cfe0bb7cf8d2414da58", "title": "Actor\u2013Critic Reinforcement Learning and Application in Developing Computer-Vision-Based Interface Tracking", "abstract": null, "venue": "", "year": 2021, "referenceCount": 161, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-14", "journal": {"volume": "", "name": "Engineering"}, "authors": [{"authorId": "117754018", "name": "Oguzhan Dogru"}, {"authorId": "66914927", "name": "Kirubakaran Velswamy"}, {"authorId": "144466701", "name": "Biao Huang"}]}, {"paperId": "614dc443359fe849318f698c3c51f8f0732e622a", "externalIds": {"PubMedCentral": "8360246", "DOI": "10.1186/s13244-021-01052-z", "CorpusId": 236984260, "PubMed": "34383173"}, "corpusId": 236984260, "publicationVenue": {"id": "4569c7ff-7138-4cef-b44d-21049e1faa98", "name": "Insights into Imaging", "type": "journal", "alternate_names": ["Insight Imaging", "Insights Into Imaging"], "issn": "1869-4101", "url": "http://www.springer.com/13244", "alternate_urls": ["http://www.springer.com/medicine/radiology/journal/13244", "https://insightsimaging.springeropen.com", "https://link.springer.com/journal/13244", "http://www.springer.com/medicine/radiology/journal/13244?changeHeader"]}, "url": "https://www.semanticscholar.org/paper/614dc443359fe849318f698c3c51f8f0732e622a", "title": "A primer on deep learning and convolutional neural networks for clinicians", "abstract": null, "venue": "Insights into Imaging", "year": 2021, "referenceCount": 11, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://insightsimaging.springeropen.com/counter/pdf/10.1186/s13244-021-01052-z", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-12", "journal": {"volume": "12", "name": "Insights into Imaging"}, "authors": [{"authorId": "145340403", "name": "L. L. Iglesias"}, {"authorId": "1579587544", "name": "P. Bell\u00f3n"}, {"authorId": "2052086501", "name": "A. P. del Barrio"}, {"authorId": "1479580655", "name": "P. M. Fern\u00e1ndez-Miranda"}, {"authorId": "118387478", "name": "D. R. Gonz\u00e1lez"}, {"authorId": "123281357", "name": "J. A. Vega"}, {"authorId": "15473105", "name": "A. G. Mandly"}, {"authorId": "2130646019", "name": "J. Blanco"}]}, {"paperId": "836084de10e395a46f79eab4a315ea2ea04e951a", "externalIds": {"DBLP": "journals/corr/abs-2108-04546", "ArXiv": "2108.04546", "CorpusId": 236965848}, "corpusId": 236965848, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/836084de10e395a46f79eab4a315ea2ea04e951a", "title": "Epigenetic opportunities for Evolutionary Computation", "abstract": "Evolutionary Computation is a group of biologically inspired algorithms used to solve complex optimisation problems. It can be split into Evolutionary Algorithms, which take inspiration from genetic inheritance, and Swarm Intelligence algorithms, that take inspiration from cultural inheritance. However, recent developments have focused on computational or mathematical adaptions, leaving their biological roots behind. This has left much of the modern evolutionary literature relatively unexplored. To understand which evolutionary mechanisms have been considered, and which have been overlooked, this paper breaks down successful bio-inspired algorithms under a contemporary biological framework based on the Extended Evolutionary Synthesis, an extension of the classical, genetics focussed, Modern Synthesis. The analysis shows that Darwinism and the Modern Synthesis have been incorporated into Evolutionary Computation but that the Extended Evolutionary Synthesis has been broadly ignored beyond:cultural inheritance, incorporated in the sub-set of Swarm Intelligence algorithms, evolvability, through CMA-ES, and multilevel selection, through Multi-Level Selection Genetic Algorithm. The framework shows a missing gap in epigenetic inheritance for Evolutionary Computation, despite being a key building block in modern interpretations of how evolution occurs. Epigenetic inheritance can explain fast adaptation, without changes in an individual\u2019s genotype, by allowing biological organisms to self-adapt quickly to environmental cues, which, increases the speed of convergence while maintaining stability in changing environments. This leaves a diverse range of biologically inspired mechanisms as low hanging fruit that should be explored further within Evolutionary Computation.", "venue": "ArXiv", "year": 2021, "referenceCount": 93, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-10", "journal": {"volume": "abs/2108.04546", "name": "ArXiv"}, "authors": [{"authorId": "2122962281", "name": "Sizhe Yuen"}, {"authorId": "1396774500", "name": "T. H. Ezard"}, {"authorId": "143827685", "name": "A. Sobey"}]}, {"paperId": "a27df49d2e3ad55979ac6a8b0bfee7b7b7c107ae", "externalIds": {"MAG": "3188211139", "DOI": "10.1007/s41358-021-00280-5", "CorpusId": 238655002}, "corpusId": 238655002, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a27df49d2e3ad55979ac6a8b0bfee7b7b7c107ae", "title": "Das Ende des Politischen? Demokratische Politik und K\u00fcnstliche Intelligenz", "abstract": null, "venue": "Zeitschrift f\u00fcr Politikwissenschaft", "year": 2021, "referenceCount": 113, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s41358-021-00280-5.pdf", "status": null}, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-08-09", "journal": {"volume": "32", "pages": "573-594", "name": "Zeitschrift f\u00fcr Politikwissenschaft"}, "authors": [{"authorId": "1975018551", "name": "A. Koster"}]}, {"paperId": "c1d7a0d2654e88ae928b9ec5a988f390ea81e711", "externalIds": {"MAG": "3190264543", "DOI": "10.1039/d1me00055a", "CorpusId": 238671900}, "corpusId": 238671900, "publicationVenue": {"id": "a73df793-3351-4441-8e4f-2866c074294b", "name": "Molecular Systems Design & Engineering", "alternate_names": ["Mol Syst Des Eng"], "issn": "2058-9689", "url": "https://pubs.rsc.org/en/journals/journalissues/me"}, "url": "https://www.semanticscholar.org/paper/c1d7a0d2654e88ae928b9ec5a988f390ea81e711", "title": "Hydrogen bonded frameworks: smart materials used smartly", "abstract": "Hydrogen-bonded host frameworks constructed from carefully selected molecular building blocks can exhibit architectures capable of encapsulating a wide range of guest molecules, with promising opportunities in key technologies.", "venue": "Molecular Systems Design & Engineering", "year": 2021, "referenceCount": 162, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-09", "journal": {"name": "Molecular Systems Design & Engineering"}, "authors": [{"authorId": "122226010", "name": "A. Yusov"}, {"authorId": "2132233128", "name": "Alexandra M. Dillon"}, {"authorId": "2067816408", "name": "Michael D. Ward"}]}, {"paperId": "d96907bd620d3c04be6b978b6c39a048429857bb", "externalIds": {"DBLP": "journals/giq/NasseefBALD22", "MAG": "3191215849", "DOI": "10.1016/j.giq.2021.101618", "CorpusId": 238719621}, "corpusId": 238719621, "publicationVenue": {"id": "45992d36-7a45-43cf-8b66-ff99604a5c85", "name": "Government Information Quarterly", "type": "journal", "alternate_names": ["Gov Inf Q"], "issn": "0740-624X", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/620202/description#description", "alternate_urls": ["http://www.sciencedirect.com/science/journal/0740624X", "https://www.journals.elsevier.com/government-information-quarterly"]}, "url": "https://www.semanticscholar.org/paper/d96907bd620d3c04be6b978b6c39a048429857bb", "title": "Artificial intelligence-based public healthcare systems: G2G knowledge-based exchange to enhance the decision-making process", "abstract": null, "venue": "Government Information Quarterly", "year": 2021, "referenceCount": 150, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-01", "journal": {"volume": "39", "pages": "101618", "name": "Gov. Inf. Q."}, "authors": [{"authorId": "3478046", "name": "Omar Nasseef"}, {"authorId": "11002299", "name": "A. Baabdullah"}, {"authorId": "2658516", "name": "A. Alalwan"}, {"authorId": "1696747", "name": "Banita Lal"}, {"authorId": "145800152", "name": "Yogesh K. Dwivedi"}]}, {"paperId": "798157d7ca71907898f4573c5663767e8233b24c", "externalIds": {"DBLP": "journals/corr/abs-2108-05349", "ArXiv": "2108.05349", "DOI": "10.3389/fevo.2021.755981", "CorpusId": 236976086}, "corpusId": 236976086, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/798157d7ca71907898f4573c5663767e8233b24c", "title": "Intelligence as Information Processing: Brains, Swarms, and Computers", "abstract": "There is no agreed definition of intelligence, so it is problematic to simply ask whether brains, swarms, computers, or other systems are intelligent or not. To compare the potential intelligence exhibited by different cognitive systems, I use the common approach used by artificial intelligence and artificial life: Instead of studying the substrate of systems, let us focus on their organization. This organization can be measured with information. Thus, I apply an informationist epistemology to describe cognitive systems, including brains and computers. This allows me to frame the usefulness and limitations of the brain-computer analogy in different contexts. I also use this perspective to discuss the evolution and ecology of intelligence.", "venue": "Frontiers in Ecology and Evolution", "year": 2021, "referenceCount": 204, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fevo.2021.755981/pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-09", "journal": {"volume": "9"}, "authors": [{"authorId": "1745123", "name": "C. Gershenson"}]}, {"paperId": "9406874d6741fba46ac2ee38026b672c7f60c0a0", "externalIds": {"DBLP": "journals/corr/abs-2108-03793", "ArXiv": "2108.03793", "CorpusId": 236956537}, "corpusId": 236956537, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9406874d6741fba46ac2ee38026b672c7f60c0a0", "title": "Toward Human-Level Artificial Intelligence", "abstract": "In this paper, we present our research on programming human-level arti\ufb01cial intelligence (HLAI), including 1) a de\ufb01nition of HLAI, 2) an environment to develop and test HLAI, and 3) a cognitive architecture for HLAI. The term AI is used in a broad meaning, and HLAI is not clearly de\ufb01ned. I claim that the essence of Human-Level Intelligence to be the capability to learn from others\u2019 experiences via language. The key is that the event described by language has the same effect as if the agent experiences it \ufb01rsthand for the update of the behavior policy. To develop and test models with such a capability, we are developing a simulated environment called SEDRo. There is a 3D Home, and a mother character takes care of the baby (the learning agent) and teaches languages. The environment provides comparable experiences to that of a human baby from birth to one year. Finally, I propose a cognitive architecture of HLAI called Modulated Heterarchical Prediction Memory (mHPM). In mHPM, there are three components: a universal module that learns to predict the next vector given the sequence of vector signals, a heterarchical network of those modules, and a reward-based modulation of learning. mHPM models the workings of the neocortex but the innate auxiliary units such hippocampus, reward system, instincts, and amygdala play critical roles, too.", "venue": "ArXiv", "year": 2021, "referenceCount": 67, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-09", "journal": {"volume": "abs/2108.03793", "name": "ArXiv"}, "authors": [{"authorId": "143885555", "name": "Deokgun Park"}]}, {"paperId": "90eb339453fc4ca0ed39a3fde86f207a2bc24100", "externalIds": {"DBLP": "journals/mima/Montemayor21", "MAG": "3191895906", "DOI": "10.1007/s11023-021-09568-5", "CorpusId": 238797340}, "corpusId": 238797340, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/90eb339453fc4ca0ed39a3fde86f207a2bc24100", "title": "Language and Intelligence", "abstract": null, "venue": "Minds and Machines", "year": 2021, "referenceCount": 39, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-08", "journal": {"volume": "31", "pages": "471 - 486", "name": "Minds and Machines"}, "authors": [{"authorId": "144520696", "name": "Carlos Montemayor"}]}, {"paperId": "a33b2e4f4ebc2d8256ee00840ef1cfb09a55df40", "externalIds": {"DBLP": "journals/corr/abs-2108-03599", "ArXiv": "2108.03599", "CorpusId": 236957301}, "corpusId": 236957301, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a33b2e4f4ebc2d8256ee00840ef1cfb09a55df40", "title": "Identification of Play Styles in Universal Fighting Engine", "abstract": "AI-controlled characters in fighting games are expected to possess reasonably high skills and behave in a believable, human-like manner, exhibiting a diversity of play styles and strategies. Thus, the development of fighting game AI requires the ability to evaluate these properties. For instance, it should be possible to ensure that the characters created are believable and diverse. In this paper, we show how an automated procedure can be used to compare play styles of individual AIand human-controlled characters, and to assess human-likeness and diversity of game participants. INTRODUCTION Fighting games provide a variety of interesting challenges for AI research and development. Fighting is often seen as a purely arcade fun, emphasizing fast reaction and the ability to perform complex combo actions with accurate timing. However, numerous current research works show that designing a good AI for a fighting game is not an easy task. First, achieving high performance is challenging: only one recent work (Oh et al. 2021) reports obtained AI skill level comparable to the abilities of professional human players in a modern fighting game. One of the principal difficulties lies in the fact that people both react to and anticipate opponent\u2019s movements. Thus, a fighting game can be considered as a rock-paper-scissors type game, where opponents make \u201cdouble-blind decisions\u201d (Yu and Sturtevant 2019). Second, people of different skill levels need AI opponents possessing comparable and possibly adjustable skills, which is a separate challenge (Ishihara et al. 2018). Finally, AI-controlled characters have to be believable (human-like) and exhibit diverse play styles to keep the players engaged. Believability and diversity of AI behavior is not a universal requirement across game genres, but for certain game types, such as firstperson shooters, it seems to be the case (Soni and Hingston 2008). Fighting games typically simulate a one-vs-one combat between two human-like opponents, so certain \u201chuman-like traits\u201d are expected form the AI system, at least as a feature contributing to the \u201crealism\u201d of the environment. Before engaging in the task of creating believable and diverse AI-controlled characters for a fighting game, one has first to confirm that the game environment used is able to provide sufficient flexibility for this work. In other words, it should be possible for game characters to exhibit diverse play styles, recognizable by human observers and identifiable distinguishable with a certain evaluation method. The goal of this paper is to analyze play styles of humanand AI-controlled characters in a Universal Fighting Engine (UFE) (Mind Studios 2021). We develop a simple procedure, able to distinguish individual players, which supports the presumption that identifiable behaviors are achievable in UFE. We also compare play styles of people with the style exhibited by a built-in AI system. Finally, we report results of a short survey, aimed to reveal whether human observers can spot \u201chuman-like\u201d traits in the behavior of game characters. UNIVERSAL FIGHTING ENGINE PLATFORM Universal Fighting Engine (Mind Studios 2021) is a highly customizable platform for one-vs-one fighting games developed in Unity. It supports a large variety of attacks and special moves as well as the ability to create new action types on per-character basis. UFE aims to provide classic comboheavy 2D fighting gameplay, associated with games such as Street Fighter or Mortal Kombat. UFE comes with a built-in customizable rule-based AI engine called \u201cFuzzy AI\u201d. It relies on fuzzy logic to evaluate the current scene and estimate the desirability of each given action. Play style and skill level of Fuzzy AI players can be adjusted by tuning a number of parameters, by default organized into presets ranging from \u201cvery easy\u201d to \u201cimpossible\u201d. In the present study we use five different levels of Fuzzy AI with default parameter values shown in Table 1. Table 1: Fuzzy AI settings for five different skill levels For us, each AI preset is essentially a \u201cblack box\u201d aimed to represent a unique fighting game character. Thus, we will not discuss the choice of Fuzzy AI parameters and their values, described in the documentation as follows: \u2022 Time between decisions (sec): minimum time taken to formulate a decision. \u2022 Time between actions (sec): time between executing each decision. \u2022 Rule compliance: controls the balance between systematic appliance of rules and randomicity (higher values correspond to lower randomicity). \u2022 Aggressiveness: controls the balance between basic moves such as walk, crouch and jump, and attacks. Higher values correspond to higher contribution of attacking actions. Very easy Easy Normal Hard Very hard Time between decisions 0.4 0.3 0 0.1 0 Time between actions 0.1 0.1 0.05 0.05 0.05 Rule compliance 0.9 0.9 0.9 0.9 0.9 Aggressiveness 0.1 0.3 0.5 0.6 0.6 Combo efficiency 0.1 0.2 1 1 1 \u2022 Combo efficiency: controls the probability of attempting combo actions. Universal Fighting Engine comes with a set of pre-modeled characters, distinct in their special move types. To ensure fair comparison, we use the same character type for each of the opponents in all test games. PLAY STYLE SIMILARITY IDENTIFICATION The goals of our work can be narrowed down to the following research questions: RQ1 Do human-controlled and AI-controlled characters possess distinct, identifiable play styles? RQ2 Are these styles consistent across matches or change depending on the opponent? RQ3 Do human-controlled characters possess identifiable \u201chuman-like behavior traits\u201d? RQ4 Can questions RQ1-RQ3 be answered with a certain automated evaluation procedure? In order to compare individual players\u2019 behavior, we adopted a cosine similarity-based procedure, earlier used in the game of boxing (Mozgovoy and Umarov 2010). It operates as follows. We analyze recordings of games where a character of our interest participates and create its \u201cbehavior fingerprint\u201d as an ordered list of probabilities of every possible tuple (A1, A2, A3), representing three consecutive player actions. Recordings consist of game engine state snapshots taken at each consecutive simulation frame. Within this context, each action is uniquely defined with its game engine-specified elements currentState, currentSubstate, and currentBasicMove. While more details are provided in Table 2, we view these elements as merely items uniquely identifying an action in our particular game engine (UFE). Being lists of probabilities, behavior fingerprints can be compared as vectors using cosine similarity, yielding a similarity ratio of [0, 1]:", "venue": "ArXiv", "year": 2021, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-08", "journal": {"volume": "abs/2108.03599", "name": "ArXiv"}, "authors": [{"authorId": "1417585444", "name": "Kaori Yuda"}, {"authorId": "2472741", "name": "Sho Kamei"}, {"authorId": "2122931567", "name": "Riku Tanji"}, {"authorId": "32290176", "name": "Ryoya Ito"}, {"authorId": "2122932793", "name": "Ippo Wakana"}, {"authorId": "49864675", "name": "M. Mozgovoy"}]}, {"paperId": "4aad4792dff146f4cc13940baf8c35120ef02301", "externalIds": {"DOI": "10.29121/granthaalayah.v9.i7.2021.4120", "CorpusId": 243251348}, "corpusId": 243251348, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4aad4792dff146f4cc13940baf8c35120ef02301", "title": "MACHINE LEARNING: AN OVERVIEW", "abstract": "Given the tremendous availability of data and computer power, there is a resurgence of interest in using data driven machine learning methods to solve issues where traditional engineering solutions are hampered by modeling or algorithmic flaws. The purpose of this\u00a0\u00a0\u00a0\u00a0 \u00a0article is to provide a comprehensive review of machine learning, including its history, types, applications, limitations and future prospects. In addition to this, the article also discusses the main point of difference between the field of artificial intelligence and machine learning.", "venue": "International Journal of Research -GRANTHAALAYAH", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.granthaalayahpublication.org/journals/granthaalayah/article/download/4120/4214", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-07", "journal": {"name": "International Journal of Research -GRANTHAALAYAH"}, "authors": [{"authorId": "2139376017", "name": "Adya Trisal"}, {"authorId": "12557117", "name": "D. Mandloi"}]}, {"paperId": "28d3d48b7e151577d56809d80555936659028435", "externalIds": {"DOI": "10.1016/j.tics.2021.07.006", "CorpusId": 237448417, "PubMed": "34509366"}, "corpusId": 237448417, "publicationVenue": {"id": "20cb626a-518d-4016-826a-0157cf2f8fd6", "name": "Trends in Cognitive Sciences", "type": "journal", "alternate_names": ["Trends Cogn Sci"], "issn": "1364-6613", "url": "https://www.cell.com/trends/cognitive-sciences/home", "alternate_urls": ["http://www.cell.com/trends/cognitive-sciences/home", "https://www.journals.elsevier.com/trends-in-cognitive-sciences", "http://www.sciencedirect.com/science/journal/13646613"]}, "url": "https://www.semanticscholar.org/paper/28d3d48b7e151577d56809d80555936659028435", "title": "Dual coding of knowledge in the human brain", "abstract": null, "venue": "Trends in Cognitive Sciences", "year": 2021, "referenceCount": 104, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cell.com/article/S1364661321001765/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-06", "journal": {"volume": "25", "pages": "883-895", "name": "Trends in Cognitive Sciences"}, "authors": [{"authorId": "2087546", "name": "Y. Bi"}]}, {"paperId": "c2fe9a476ac2f16d364799eb0055777af0a87ab3", "externalIds": {"MAG": "3196172113", "DOI": "10.1093/oso/9780192894076.003.0016", "CorpusId": 238841168}, "corpusId": 238841168, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c2fe9a476ac2f16d364799eb0055777af0a87ab3", "title": "How Much Moral Status Could Artificial Intelligence Ever Achieve?", "abstract": "Philosophers often argue about whether fetuses, animals, or AI systems do or do not have moral status. We will suggest instead that different entities have different degrees of moral status with respect to different moral reasons in different circumstances for different purposes. Recognizing this variability of moral status will help to resolve some but not all debates about the potential moral status of AI systems in particular.", "venue": "Rethinking Moral Status", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-05", "journal": {"name": "Rethinking Moral Status"}, "authors": [{"authorId": "1422133662", "name": "Walter Sinnott-Armstrong"}, {"authorId": "1749906", "name": "V. Conitzer"}]}, {"paperId": "d6f96888d28a259fcb16d861c0ad8f5e77a618ff", "externalIds": {"DBLP": "journals/corr/abs-2108-01591", "ArXiv": "2108.01591", "MAG": "3003122703", "DOI": "10.1016/b978-0-12-818366-3.00010-1", "CorpusId": 212814987}, "corpusId": 212814987, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d6f96888d28a259fcb16d861c0ad8f5e77a618ff", "title": "The application of artificial intelligence in software engineering: a review challenging conventional wisdom", "abstract": null, "venue": "ArXiv", "year": 2021, "referenceCount": 187, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-03", "journal": {"volume": "abs/2108.01591", "name": "ArXiv"}, "authors": [{"authorId": "144105786", "name": "Feras A. Batarseh"}, {"authorId": "134659451", "name": "Rasika Mohod"}, {"authorId": "2143576061", "name": "Abhinav Kumar"}, {"authorId": "152797675", "name": "Justin Bui"}]}, {"paperId": "727f4397ed0068575b7c538d2cedf32f5db4d9a7", "externalIds": {"MAG": "3198357836", "DOI": "10.1016/j.jbef.2021.100577", "CorpusId": 239705950}, "corpusId": 239705950, "publicationVenue": {"id": "1e8e43f2-04a2-4045-9358-6a9a801265a6", "name": "Journal of Behavioral and Experimental Finance", "type": "journal", "alternate_names": ["J Behav Exp Finance"], "issn": "2214-6350", "url": "https://www.journals.elsevier.com/journal-of-behavioral-and-experimental-finance/"}, "url": "https://www.semanticscholar.org/paper/727f4397ed0068575b7c538d2cedf32f5db4d9a7", "title": "Artificial intelligence and machine learning in finance: Identifying foundations, themes, and research clusters from bibliometric analysis", "abstract": null, "venue": "Journal of Behavioral and Experimental Finance", "year": 2021, "referenceCount": 125, "citationCount": 65, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-01", "journal": {"name": "Journal of Behavioral and Experimental Finance"}, "authors": [{"authorId": "92198014", "name": "John W. Goodell"}, {"authorId": "2109647517", "name": "Satish Kumar"}, {"authorId": "3139520", "name": "Weng Marc Lim"}, {"authorId": "119982325", "name": "Debidutta Pattnaik"}]}, {"paperId": "566440d51c4e095521aeb9668af54e2758634939", "externalIds": {"PubMedCentral": "8404921", "DBLP": "journals/jimaging/HudakyLK21", "DOI": "10.3390/jimaging7080152", "CorpusId": 238479484, "PubMed": "34460788"}, "corpusId": 238479484, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/566440d51c4e095521aeb9668af54e2758634939", "title": "A Novel Methodology for Measuring the Abstraction Capabilities of Image Recognition Algorithms", "abstract": "Creating a widely excepted model on the measure of intelligence became inevitable due to the existence of an abundance of different intelligent systems. Measuring intelligence would provide feedback for the developers and ultimately lead us to create better artificial systems. In the present paper, we show a solution where learning as a process is examined, aiming to detect pre-written solutions and separate them from the knowledge acquired by the system. In our approach, we examine image recognition software by executing different transformations on objects and detect if the software was resilient to it. A system with the required intelligence is supposed to become resilient to the transformation after experiencing it several times. The method is successfully tested on a simple neural network, which is not able to learn most of the transformations examined. The method can be applied to any image recognition software to test its abstraction capabilities.", "venue": "J. Imaging", "year": 2021, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2313-433X/7/8/152/pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-01", "journal": {"volume": "7", "name": "Journal of Imaging"}, "authors": [{"authorId": "2131415817", "name": "M\u00e1rton Gyula Hud\u00e1ky"}, {"authorId": "1411121900", "name": "P. Lehotay-K\u00e9ry"}, {"authorId": "144936562", "name": "A. Kiss"}]}, {"paperId": "3beee2d8d9beeb01f0ef14d100e004c4bb988144", "externalIds": {"MAG": "3188291252", "DOI": "10.48146/odusobiad.908134", "CorpusId": 238792525}, "corpusId": 238792525, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3beee2d8d9beeb01f0ef14d100e004c4bb988144", "title": "Yapay Zek\u00e2ya Ne \u00d6\u011fretiyoruz?", "abstract": null, "venue": "OD\u00dc Sosyal Bilimler Ara\u015ft\u0131rmalar\u0131 Dergisi (OD\u00dcSOB\u0130AD)", "year": 2021, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1678823", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-07-30", "journal": {"name": "OD\u00dc Sosyal Bilimler Ara\u015ft\u0131rmalar\u0131 Dergisi (OD\u00dcSOB\u0130AD)"}, "authors": [{"authorId": "2172008242", "name": "Elif \u00c7an\u011fa Bayer"}]}, {"paperId": "c95cf4e736b4b1cfdf370f0a03b5875fe2777f91", "externalIds": {"MAG": "3186406163", "DOI": "10.24143/2072-9502-2021-3-105-114", "CorpusId": 237700205}, "corpusId": 237700205, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c95cf4e736b4b1cfdf370f0a03b5875fe2777f91", "title": "BUILDING UP SCHEDULES IN MULTIPROJECT DESIGN MANAGEMENT SYSTEMS", "abstract": "The article focuses on the problem of algorithmizing the process of building schedules in various spheres of human activity by using the modern mathematical apparatus, as well as achievements in the field of systems analysis, game theory, and graph theory. Nowadays, there have been analyzed and determined the boundaries of the effective application of many well-known heuristic and metaheuristic algorithms, which have shown good results in practice. However, despite the achievements in the discrete optimization, scheduling and network planning, the new problems of drawing up so-called coordinated schedules in the field of multi-project planning, which take into account the preferences (requests, wishes) of specific schedule executors, are still of practical interest. There have been considered the approaches and main stages of solving the problems of constructing coordinated schedules in multi-project planning, which is relevant for the development of new generation software and tools", "venue": "Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://vestnik.astu.org/en/storage/download/73850", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-30", "journal": {"name": "Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics"}, "authors": [{"authorId": "2057773316", "name": "Alexey Sergeyevich Dobrynin"}, {"authorId": "52041673", "name": "S. Kulakov"}, {"authorId": "1577039449", "name": "Alexander Sergeyevich Koynov"}]}, {"paperId": "c0a4bd5029abf13510f623ee242687594424c45b", "externalIds": {"PubMedCentral": "8445629", "DOI": "10.18053/jctres.07.202104.012", "CorpusId": 237555158, "PubMed": "34541366"}, "corpusId": 237555158, "publicationVenue": {"id": "f1171357-7ba5-4560-b4e6-b43e3a4299e8", "name": "Journal of Clinical and Translational Research", "type": "journal", "alternate_names": ["J Clin Transl Res"], "issn": "2382-6533", "alternate_issns": ["2424-810X"], "url": "http://www.jctres.com/", "alternate_urls": ["https://www.jctres.com/en/"]}, "url": "https://www.semanticscholar.org/paper/c0a4bd5029abf13510f623ee242687594424c45b", "title": "Scope and challenges of machine learning-based diagnosis and prognosis in clinical dentistry: A literature review", "abstract": "Background: Machine learning (ML) has emerged as a branch of artificial intelligence dealing with the analysis of large amounts of data. The applications of ML algorithms have also expanded to health care, including dentistry. Recent advances in this field point to future improvements in diagnostic techniques and the prognosis of various diseases of the teeth and other maxillofacial structures. Aim: The aim of this literature review is to describe the basis for ML being applied to different dental sub-fields in recent years, to identify typical algorithms used in the studies, and to summarize the scope and challenges of using these techniques in dental clinical practice. Relevance for Patients: The proficiency of emerging technologies that have begun to show encouraging results in the diagnosis and prognosis of oral diseases can improve the precision in the selection of treatment for patients. It is necessary to understand the challenges associated with using these tools to effectively use them in dental services and ensure a higher quality of care for patients.", "venue": "Journal of Clinical and Translational Research", "year": 2021, "referenceCount": 116, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.jctres.com/media/downloads/jctres07202104012/jclintranslres-2021-7-4-523.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-07-30", "journal": {"volume": "7", "pages": "523 - 539", "name": "Journal of Clinical and Translational Research"}, "authors": [{"authorId": "2065377627", "name": "Lilian Toledo Reyes"}, {"authorId": "51062504", "name": "J. Knorst"}, {"authorId": "46505576", "name": "F. R. Ortiz"}, {"authorId": "6443491", "name": "T. Ardenghi"}]}, {"paperId": "00101c3e8bccd09098231f23b34156ac5d47f665", "externalIds": {"PubMedCentral": "8376694", "DOI": "10.1007/s11033-021-06594-5", "CorpusId": 236471170, "PubMed": "34318436"}, "corpusId": 236471170, "publicationVenue": {"id": "906c9928-c8e5-4d4c-9d82-d7904db0adff", "name": "Molecular Biology Reports", "type": "journal", "alternate_names": ["Mol Biology Rep"], "issn": "0301-4851", "url": "http://www.springer.com/journal/11033/about", "alternate_urls": ["https://link.springer.com/journal/11033"]}, "url": "https://www.semanticscholar.org/paper/00101c3e8bccd09098231f23b34156ac5d47f665", "title": "What is life?", "abstract": null, "venue": "Molecular Biology Reports", "year": 2021, "referenceCount": 63, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11033-021-06594-5.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-27", "journal": {"volume": "48", "pages": "6223 - 6230", "name": "Molecular Biology Reports"}, "authors": [{"authorId": "1438248906", "name": "J. G\u00f3mez-M\u00e1rquez"}]}, {"paperId": "31048ab803d29b293007f2997651e3e9ad219cfe", "externalIds": {"PubMedCentral": "8299670", "DBLP": "journals/midm/SalemSLA21", "DOI": "10.1186/s12911-021-01585-9", "CorpusId": 236181504, "PubMed": "34294092"}, "corpusId": 236181504, "publicationVenue": {"id": "76da9cc5-c5a7-42b4-a250-3e708c5f4980", "name": "BMC Medical Informatics and Decision Making", "type": "journal", "alternate_names": ["BMC Med Informatics Decis Mak"], "issn": "1472-6947", "url": "http://www.biomedcentral.com/bmcmedinformdecismak/", "alternate_urls": ["https://bmcmedinformdecismak.biomedcentral.com/", "https://link.springer.com/journal/12911", "http://www.pubmedcentral.nih.gov/tocrender.fcgi?journal=42"]}, "url": "https://www.semanticscholar.org/paper/31048ab803d29b293007f2997651e3e9ad219cfe", "title": "A systematic review of the applications of Expert Systems (ES) and machine learning (ML) in clinical urology", "abstract": null, "venue": "BMC Medical Informatics and Decision Making", "year": 2021, "referenceCount": 191, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://bmcmedinformdecismak.biomedcentral.com/counter/pdf/10.1186/s12911-021-01585-9", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-07-22", "journal": {"volume": "21", "name": "BMC Medical Informatics and Decision Making"}, "authors": [{"authorId": "143818898", "name": "H. Salem"}, {"authorId": "2223827", "name": "D. Soria"}, {"authorId": "31051376", "name": "J. Lund"}, {"authorId": "1859837", "name": "A. Awwad"}]}, {"paperId": "d257492a35505b9cde4ea752636b770c989caf53", "externalIds": {"DBLP": "conf/aies/BenthallG21", "DOI": "10.1145/3461702.3462526", "CorpusId": 236519412}, "corpusId": 236519412, "publicationVenue": {"id": "ace94611-0469-4818-ae70-43bdb8082d73", "name": "AAAI/ACM Conference on AI, Ethics, and Society", "type": "conference", "alternate_names": ["AAAI/ACM conference Artificial Intelligence, Ethics, and Society", "AIES", "AAAI/ACM Conf AI Ethics Soc", "AAAI/ACM conf Artif Intell Ethics Soc", "AIES "]}, "url": "https://www.semanticscholar.org/paper/d257492a35505b9cde4ea752636b770c989caf53", "title": "Artificial Intelligence and the Purpose of Social Systems", "abstract": "The law and ethics of Western democratic states have their basis in liberalism. This extends to regulation and ethical discussion of technology and businesses doing data processing. Liberalism relies on the privacy and autonomy of individuals, their ordering through a public market, and, more recently, a measure of equality guaranteed by the state. We argue that these forms of regulation and ethical analysis are largely incompatible with the techno-political and techno-economic dimensions of artificial intelligence. By analyzing liberal regulatory solutions in the form of privacy and data protection, regulation of public markets, and fairness in AI, we expose how the data economy and artificial intelligence have transcended liberal legal imagination. Organizations use artificial intelligence to exceed the bounded rationality of individuals and each other. This has led to the private consolidation of markets and an unequal hierarchy of control operating mainly for the purpose of shareholder value. An artificial intelligence will be only as ethical as the purpose of the social system that operates it. Inspired by the science of artificial life as an alternative to artificial intelligence, we consider data intermediaries: sociotechnical systems composed of individuals associated around collectively pursued purposes. An attention cooperative, that prioritizes its incoming and outgoing data flows, is one model of a social system that could form and maintain its own autonomous purpose.", "venue": "AAAI/ACM Conference on AI, Ethics, and Society", "year": 2021, "referenceCount": 122, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2021-07-21", "journal": {"name": "Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society"}, "authors": [{"authorId": "2862008", "name": "Sebastian Benthall"}, {"authorId": "35476017", "name": "Jake Goldenfein"}]}, {"paperId": "0fc477d3a2340e663e4eafbee520566c1bf8bcb1", "externalIds": {"MAG": "3183468961", "DOI": "10.7592/EJHR2021.9.2.443", "CorpusId": 237714297}, "corpusId": 237714297, "publicationVenue": {"id": "f1825969-5ea4-4dd9-9c8d-3b064b968112", "name": "The European Journal of Humour Research", "type": "journal", "alternate_names": ["Eur J Humour Res"], "issn": "2307-700X", "url": "http://europeanjournalofhumour.org/", "alternate_urls": ["http://www.europeanjournalofhumour.org/index.php/ejhr"]}, "url": "https://www.semanticscholar.org/paper/0fc477d3a2340e663e4eafbee520566c1bf8bcb1", "title": "Laughing with machines", "abstract": "This article will analyse the preconditions of sense of humour for artificial intelligence. Can artificial intelligence have a sense of humour? Is there a difference between human and machine laughter? Some machines already fulfil certain conditions which are associated with the human sense of humour: on the most superficial level machines appear to laugh and produce jokes, and they recognize sarcasm and punchlines, and they can evaluate funniness. In short, artificial intelligence is already able to recognize humour, and reacts to it accordingly. Furthermore, people laugh with humorous machines. However, it is still uncertain whether artificial intelligence can have a sense of humour or not, at least in comparison to a human sense of humour. To build bridges between AI research and philosophy of humour, this article proposes that there are (at least) five notable philosophical issues to be addressed if we are to accept that machines can have a (humanlike) sense of humour. These principles are: 1) worldview, 2) self-consciousness, 3) self-reflection, 4) self-criticism, and 5) losing control.", "venue": "The European Journal of Humour Research", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.europeanjournalofhumour.org/ejhr/article/download/443/531", "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-20", "journal": {"name": "The European Journal of Humour Research"}, "authors": [{"authorId": "114685585", "name": "Jarno Hietalahti"}]}, {"paperId": "8ea90aa14f2ccf8cd7f3132d99d5a3da8e795bf8", "externalIds": {"DBLP": "journals/ais/Massey21", "PubMedCentral": "8287117", "DOI": "10.1007/s00146-021-01242-9", "CorpusId": 236136409, "PubMed": "34305334"}, "corpusId": 236136409, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/8ea90aa14f2ccf8cd7f3132d99d5a3da8e795bf8", "title": "A new Turing test: metaphor vs. nonsense", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 22, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01242-9.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-19", "journal": {"volume": "36", "pages": "677 - 684", "name": "Ai & Society"}, "authors": [{"authorId": "49517549", "name": "I. Massey"}]}, {"paperId": "8f5d0401b17f9665cabba58a47682ca9360102f2", "externalIds": {"DBLP": "conf/isalalife/Cejkova21", "MAG": "3183646739", "DOI": "10.1162/isal_e_00468", "CorpusId": 237643729}, "corpusId": 237643729, "publicationVenue": {"id": "43397d64-0997-46ca-8396-7ca707887a5c", "name": "IEEE Symposium on Artificial Life", "type": "conference", "alternate_names": ["ALIFE", "Workshop on the Synthesis and Simulation of Living Systems", "Workshop Synth Simul Living Syst", "IEEE Symp Artif Life"]}, "url": "https://www.semanticscholar.org/paper/8f5d0401b17f9665cabba58a47682ca9360102f2", "title": "Robots: The century past and the century ahead, an Introduction to the 2021 ALIFE conference", "abstract": "The theme of ALIFE 2021 conference is \u201dRobots: The cen- tury past and the century ahead\u201d , because we celebrate the centenary of \u02c7Capek\u2019s R.U.R. and the worldwide-used word \u201crobot\u201d , which comes from this play. The conference was originally scheduled to be held in Prague, the city where the play had its of\ufb01cial world premiere in 1921. However, because of the covid-19 pandemic and its repercussions, ALIFE 2021 conference is virtual. Nevertheless, in this introductory paper the history of the R.U.R. play and its plot are brie\ufb02y outlined and its legacy to current research discussed, namely in the context of the \ufb01eld of arti\ufb01cial life.", "venue": "IEEE Symposium on Artificial Life", "year": 2021, "referenceCount": 9, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-19", "journal": {"pages": "5"}, "authors": [{"authorId": "2250782", "name": "J. \u010cejkov\u00e1"}]}, {"paperId": "5f0772948c5bd2240c94538456eed7f58b3d8400", "externalIds": {"MAG": "3183156576", "DOI": "10.1080/09515089.2021.1951195", "CorpusId": 237676499}, "corpusId": 237676499, "publicationVenue": {"id": "1997a543-39c3-403f-b425-459a18eb0f71", "name": "Philosophical Psychology", "type": "journal", "alternate_names": ["Philos Psychol"], "issn": "0951-5089", "url": "http://www.tandfonline.com/loi/cphp20", "alternate_urls": ["http://www.tandfonline.com/toc/cphp20/current"]}, "url": "https://www.semanticscholar.org/paper/5f0772948c5bd2240c94538456eed7f58b3d8400", "title": "Exploring the structure of mental action in directed thought", "abstract": "ABSTRACT While the general topic of agency has been collaboratively explored in philosophy and psychology, mental action seems to resist such an interdisciplinary research agenda. Since it is difficult to empirically access mental agency beyond externally measurable behavior, the topic is mainly treated philosophically. However, this has not prevented philosophers from substantiating their arguments with psychological findings, but predominantly with those which allegedly limit the scope and conscious controllability of mental action in favor of automated subpersonal processes. By contrast, the call for a methodological extension through introspective access is particularly noticeable among proponents of a wider significance of mental action. Taking this up, it is shown how an empirical-introspective methodology can obtain a differentiated structure of mental activities occurring in directed thought. The empirical results gained under replicable conditions with 32 participants lead to insights about mental activity regarding (1) immanent causation, (2) content-free intention, (3) active receptivity and (4) its selective openness to mental content, and (5) different levels of observational awareness. These arguments speak for assigning an agentive status to the activities studied and hence for a more significant role of mental action in cognitive processes.", "venue": "Philosophical Psychology", "year": 2021, "referenceCount": 74, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-18", "journal": {"volume": "35", "pages": "145 - 176", "name": "Philosophical Psychology"}, "authors": [{"authorId": "31453852", "name": "Johannes Wagemann"}]}, {"paperId": "2d2b0b8cc25751b4c60361f3a8d8887441be2fdc", "externalIds": {"DBLP": "conf/ijcnn/Weng21", "DOI": "10.1109/IJCNN52387.2021.9533558", "CorpusId": 237599831}, "corpusId": 237599831, "publicationVenue": {"id": "f80ba4a3-7aed-4021-b4d8-e4f50668847a", "name": "IEEE International Joint Conference on Neural Network", "type": "conference", "alternate_names": ["IJCNN", "IEEE Int Jt Conf Neural Netw", "Int Jt Conf Neural Netw", "International Joint Conference on Neural Network"], "url": "http://www.wikicfp.com/cfp/program?id=1573"}, "url": "https://www.semanticscholar.org/paper/2d2b0b8cc25751b4c60361f3a8d8887441be2fdc", "title": "On Post Selection Using Test Sets (PSUTS) in AI", "abstract": "This is a theory paper. It first raises a rarely reported but unethical practice in Artificial Intelligence (AI) called Post Selection Using Test Sets (PSUTS). Consequently, the popular error-backprop methodology in deep learning lacks an acceptable generalization power. All AI methods fall into two broad schools, connectionist and symbolic. PSUTS practices have two kinds, machine PSUTS and human PSUTS. The connectionist school received criticisms for its \u201cscruffiness\u201d due to a huge number of scruffy parameters and now the machine PSUTS; but the seemingly \u201cclean\u201d symbolic school seems more brittle than what is known because of using human PSUTS. This paper formally defines what PSUTS is, analyzes why error-backprop methods with random initial weights suffer from severe local minima, why PSUTS violates well-established research ethics, and how every paper that used PSUTS should have at least transparently reported PSUTS data. For improved transparency in future publications, this paper proposes a new standard for AI metrology, called developmental errors for all networks trained in a project that the selection of the luckiest network depends on, along with Three Conditions: (1) system restrictions, (2) training experience and (3) computational resources.", "venue": "IEEE International Joint Conference on Neural Network", "year": 2021, "referenceCount": 33, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-07-18", "journal": {"pages": "1-8", "name": "2021 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "1e00c5b6b3f04f901632095f51dc687f2fb19c57", "externalIds": {"DBLP": "conf/ijcnn/SiddiquiRR21", "DOI": "10.1109/IJCNN52387.2021.9533870", "CorpusId": 237600226}, "corpusId": 237600226, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1e00c5b6b3f04f901632095f51dc687f2fb19c57", "title": "The Case Against Sentiment Analysis for Natural Text", "abstract": "Natural language processing is a broad field that encompasses several sub-tasks. One problem that has gained visibility over the past several years is that of Sentiment Analysis. This is the process of determining the attitude of an author towards some subject across some spectrum, typically \u201cpositive\u201d or \u201cnegative,\u201d by analyzing the textual information. Whereas the field started with simple counting of words with certain characteristics, it has grown in complexity with the advent of deep learning and neural network based language models. Typically, datasets used to train and evaluate these models consist of text with appropriate labels, such as movie reviews with an accompanied star rating. However, the applicability of those results to other scenarios, such as unstructured or natural text has not been clear. In this paper, we demonstrate a clear and simple case that shows that the problem of sentiment analysis is fundamentally unsuitable for natural text. We consider state-of-the-art black box models developed and hosted by 3 of the largest companies in this field: Amazon, Google and IBM.", "venue": "2021 International Joint Conference on Neural Networks (IJCNN)", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": "2021-07-18", "journal": {"pages": "1-8", "name": "2021 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "2056676503", "name": "Shamoon Siddiqui"}, {"authorId": "145129130", "name": "G. Rasool"}, {"authorId": "46819079", "name": "R. P. Ramachandran"}]}, {"paperId": "5254bd6193de3e6cab58f271d789552281435761", "externalIds": {"DBLP": "conf/ijcnn/WuZW21", "DOI": "10.1109/IJCNN52387.2021.9533936", "CorpusId": 237598847}, "corpusId": 237598847, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5254bd6193de3e6cab58f271d789552281435761", "title": "On Machine Thinking", "abstract": "Artificial Intelligence (AI) has made much progress, but the existing paradigm for AI is still basically pattern recognition based on a human-handcrafted representation. An AI paradigm shift seems to be necessary to address the machine thinking question raised by Alan Turing over 90 years ago. As a necessary subject of our new conscious learning paradigm introduced 2020, this work deals with general-purpose machine thinking, with planning as a special case, based on new concepts of emergent Super-Turing Machines realized by our proposed neural network models-Developmental Networks (DNs) that have been mathematically proven for its optimally in the sense of Maximum Likelihood (ML). Experimental demonstrations are presented for simulated new mazes in disjoint tests.", "venue": "2021 International Joint Conference on Neural Networks (IJCNN)", "year": 2021, "referenceCount": 17, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-07-18", "journal": {"pages": "1-8", "name": "2021 International Joint Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "2108404228", "name": "Xiang Wu"}, {"authorId": "2010802", "name": "Zejia Zheng"}, {"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "6e5e5df43735c0fa79a9b8699e3e7e9104988470", "externalIds": {"MAG": "3189483222", "DOI": "10.21203/rs.3.rs-690643/v1", "CorpusId": 238759276}, "corpusId": 238759276, "publicationVenue": {"id": "ad807377-7bce-4dba-8b2a-02cc9a01e274", "name": "Journal of Robotics and Automation Research", "type": "journal", "alternate_names": ["J Robot Autom Res"], "issn": "2831-6789"}, "url": "https://www.semanticscholar.org/paper/6e5e5df43735c0fa79a9b8699e3e7e9104988470", "title": "The Logic Fundamentals of Machine Consciousness: Theory of Tri-State", "abstract": "\n For a long time, the system of scientific methodology has been composed of logic, empirical (falsification), qualitative, quantitative and deterministic, and corresponding thinking tools. However, under the background of complexity science, the category of methodology should be changed, that is, on the basis of traditional methodology, non-classical logic, hierarchy, stereotype (topological invariant) and uncertainty should be added. This is also the main idea behind the \u201cThoery of Tri-state\u201d in the first part of this paper. The core idea in the theory of \u201cTri-state\u201d is \u201cTri-state Logic\u201d (\u201cpositive | negative | uncertain state\u201d). The ontology of \u201cTri-state Logic\u201d aims to reveal the meta space-time movement law of things transforming from one form to another, that is, the coupling of time and space in the development of things, and the orientation and evolution of the continuity of things. The mathematical basis of \u201cTri-state Logic\u201d is knot theory and dynamics theory. The second part of this paper designs a machine-consciousness model framework based on the \u201cTheory of Tri-state\u201d (Tri-state Logic). Its research starting point is the perspective of cognitive dynamics (cognitive psychology + dynamics), which is very different from the research ideas proposed by Minsky's \u201cThe Emotion Machine\u201d. At the same time, this paper also tries to answer Turing's questions from different space-time dimensions, and gives an experimental idea of \u201ckindergarten game\u201d by comparing Turing's \u201cimitation game\u201d.", "venue": "Journal of Robotics and Automation Research", "year": 2021, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.researchsquare.com/article/rs-690643/latest.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-15", "journal": {"name": "Journal of Robotics and Automation Research"}, "authors": [{"authorId": "1945419094", "name": "Zhiwei Wang"}, {"authorId": "2135330227", "name": "Ao Zhou"}, {"authorId": "2146074363", "name": "Xin Liu"}]}, {"paperId": "e7735be4f0fc427515fd7206ebc714356b97e71a", "externalIds": {"ArXiv": "2107.07002", "DBLP": "journals/corr/abs-2107-07002", "CorpusId": 235810239}, "corpusId": 235810239, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e7735be4f0fc427515fd7206ebc714356b97e71a", "title": "The Benchmark Lottery", "abstract": "The world of empirical machine learning (ML) strongly relies on benchmarks in 1 order to determine the relative effectiveness of different algorithms and methods. 2 This paper proposes the notion of a benchmark lottery that describes the overall 3 fragility of the ML benchmarking process. The benchmark lottery postulates that 4 many factors, other than fundamental algorithmic superiority, may lead to a method 5 being perceived as superior. On multiple benchmark setups that are prevalent in 6 the ML community, we show that the relative performance of algorithms may be 7 altered significantly simply by choosing different benchmark tasks, highlighting the 8 fragility of the current paradigms and potential fallacious interpretation derived from 9 benchmarking ML methods. Given that every benchmark makes a statement about 10 what it perceives to be important, we argue that this might lead to biased progress in 11 the community. We discuss the implications of the observed phenomena and provide 12 recommendations on mitigating them using multiple machine learning domains 13 and communities as use cases, including natural language processing, computer 14 vision, information retrieval, recommender systems, and reinforcement learning. 15", "venue": "ArXiv", "year": 2021, "referenceCount": 118, "citationCount": 41, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-14", "journal": {"volume": "abs/2107.07002", "name": "ArXiv"}, "authors": [{"authorId": "3226635", "name": "M. Dehghani"}, {"authorId": "144447820", "name": "Yi Tay"}, {"authorId": "2194424", "name": "A. Gritsenko"}, {"authorId": "48634137", "name": "Zhe Zhao"}, {"authorId": "2815290", "name": "N. Houlsby"}, {"authorId": "145472333", "name": "Fernando Diaz"}, {"authorId": "47193990", "name": "Donald Metzler"}, {"authorId": "1689108", "name": "Oriol Vinyals"}]}, {"paperId": "37adf4ae06495e2583e2568fb439ebf3e45bc0c2", "externalIds": {"PubMedCentral": "8340130", "DOI": "10.1016/j.isci.2021.102853", "CorpusId": 236975594, "PubMed": "34381977"}, "corpusId": 236975594, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/37adf4ae06495e2583e2568fb439ebf3e45bc0c2", "title": "The evolutionary origin of Bayesian heuristics and finite memory", "abstract": null, "venue": "iScience", "year": 2021, "referenceCount": 109, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cell.com/article/S258900422100821X/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-13", "journal": {"volume": "24", "name": "iScience"}, "authors": [{"authorId": "118887609", "name": "A. Lo"}, {"authorId": "5652285", "name": "Ruixun Zhang"}]}, {"paperId": "a7f2a527baba93a2518eeb635e72b34ee46548d6", "externalIds": {"DBLP": "journals/cbm/RitisB21", "DOI": "10.1016/j.compbiomed.2021.104630", "CorpusId": 236453453, "PubMed": "34311298"}, "corpusId": 236453453, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7f2a527baba93a2518eeb635e72b34ee46548d6", "title": "On the hierarchical design of biochemical-based digital computations", "abstract": null, "venue": "Comput. Biol. Medicine", "year": 2021, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-08", "journal": {"volume": "135", "pages": "\n 104630\n ", "name": "Computers in biology and medicine"}, "authors": [{"authorId": "15777037", "name": "Dimitrios Ritis"}, {"authorId": "1915583", "name": "G. Boulougouris"}]}, {"paperId": "c074cef9299af9922444228712257723f35cf72c", "externalIds": {"MAG": "3179553970", "DOI": "10.3390/APP11146271", "CorpusId": 237776660}, "corpusId": 237776660, "publicationVenue": {"id": "136edf8d-0f88-4c2c-830f-461c6a9b842e", "name": "Applied Sciences", "type": "journal", "alternate_names": ["Appl Sci"], "issn": "2076-3417", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217814", "alternate_urls": ["http://www.mathem.pub.ro/apps/", "https://www.mdpi.com/journal/applsci", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217814"]}, "url": "https://www.semanticscholar.org/paper/c074cef9299af9922444228712257723f35cf72c", "title": "Detection and Evaluation of Machine Learning Bias", "abstract": "Machine learning models are built using training data, which is collected from human experience and is prone to bias. Humans demonstrate a cognitive bias in their thinking and behavior, which is ultimately reflected in the collected data. From Amazon\u2019s hiring system, which was built using ten years of human hiring experience, to a judicial system that was trained using human judging practices, these systems all include some element of bias. The best machine learning models are said to mimic humans\u2019 cognitive ability, and thus such models are also inclined towards bias. However, detecting and evaluating bias is a very important step for better explainable models. In this work, we aim to explain bias in learning models in relation to humans\u2019 cognitive bias and propose a wrapper technique to detect and evaluate bias in machine learning models using an openly accessible dataset from UCI Machine Learning Repository. In the deployed dataset, the potentially biased attributes (PBAs) are gender and race. This study introduces the concept of alternation functions to swap the values of PBAs, and evaluates the impact on prediction using KL divergence. Results demonstrate females and Asians to be associated with low wages, placing some open research questions for the research community to ponder over.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 37, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-3417/11/14/6271/pdf?version=1625643852", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-07", "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "2523108", "name": "Salem Alelyani"}]}, {"paperId": "2c35a038c4b5d7dfa8c13fff0d1cf121db99675d", "externalIds": {"PubMedCentral": "9139408", "DOI": "10.1016/j.ibmed.2022.100056", "CorpusId": 235740257, "PubMed": "35634270"}, "corpusId": 235740257, "publicationVenue": {"id": "d5e5b5e7-54b1-4f53-82fc-4853f3e71c58", "name": "medRxiv", "type": "journal", "url": "https://www.medrxiv.org/"}, "url": "https://www.semanticscholar.org/paper/2c35a038c4b5d7dfa8c13fff0d1cf121db99675d", "title": "Crowd annotations can approximate clinical autism impressions from short home videos with privacy protections", "abstract": null, "venue": "medRxiv", "year": 2021, "referenceCount": 82, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-06", "journal": {"volume": "6", "name": "Intelligence-based medicine"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": "1899752689", "name": "\u00c9. Leblanc"}, {"authorId": "48913193", "name": "K. Dunlap"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": "2037683491", "name": "C. Mutlu"}, {"authorId": "66636865", "name": "B. Chrisman"}, {"authorId": "30423115", "name": "N. Stockham"}, {"authorId": "2240125", "name": "K. Paskov"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "d0da0462ac25a4046f6f3e37ed372c4026100bb2", "externalIds": {"MAG": "3182125260", "DOI": "10.5772/intechopen.98517", "CorpusId": 237777276}, "corpusId": 237777276, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0da0462ac25a4046f6f3e37ed372c4026100bb2", "title": "Artificial Intelligence and Machine Learning in 5G and beyond: A\u00a0Survey and Perspectives", "abstract": "The deployment of 4G/LTE (Long Term Evolution) mobile network has solved the major challenge of high capacities, to build real broadband mobile Internet. This was possible mainly through very strong physical layer and flexible network architecture. However, the bandwidth hungry services have been developed in unprecedented way, such as virtual reality (VR), augmented reality (AR), etc. Furthermore, mobile networks are facing other new services with extremely demand of higher reliability and almost zero-latency performance, like vehicle communications or Internet-of-Vehicles (IoV). Using new radio interface based on massive MIMO, 5G has overcame some of these challenges. In addition, the adoption of software defend networks (SDN) and network function virtualization (NFV) has added a higher degree of flexibility allowing the operators to support very demanding services from different vertical markets. However, network operators are forced to consider a higher level of intelligence in their networks, in order to deeply and accurately learn the operating environment and users behaviors and needs. It is also important to forecast their evolution to build a pro-actively and efficiently (self-) updatable network. In this chapter, we describe the role of artificial intelligence and machine learning in 5G and beyond, to build cost-effective and adaptable performing next generation mobile network. Some practical use cases of AI/ML in network life cycle are discussed.", "venue": "Moving Broadband Mobile Communications Forward - Intelligent Technologies for 5G and Beyond", "year": 2021, "referenceCount": 24, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.intechopen.com/citation-pdf-url/77411", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-07-05", "journal": {"name": "Moving Broadband Mobile Communications Forward - Intelligent Technologies for 5G and Beyond"}, "authors": [{"authorId": "2842389", "name": "A. Haidine"}, {"authorId": "2383582", "name": "Fatima Zahra Salmam"}, {"authorId": "3212020", "name": "Abdelhak Aqqal"}, {"authorId": "9129510", "name": "A. Dahbi"}]}, {"paperId": "331ec332890d6b7006fc0d850ad0379a2c11c2ab", "externalIds": {"MAG": "3179645255", "DOI": "10.25236/AJCIS.2021.040401", "CorpusId": 236986339}, "corpusId": 236986339, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/331ec332890d6b7006fc0d850ad0379a2c11c2ab", "title": "A Review of Knowledge Graph-based Question and Answer System Research and Its Application in Chronic Disease Diagnosis", "abstract": "Question and answer systems have a long history of development, and with the maturity of knowledge graph technology in recent years, knowledge graph-based question and answer systems are gradually applied to many fields. In this paper, we first discuss the concept of knowledge graph and question and answer system, and then analyze the key technologies used in it. Before dealing with linguistic problems, questions need to be structured and represented by semantic parsing and space vector-based modeling are common approaches. The question and answer system can be divided into three parts: question classification, entity recognition, and relationship extraction, for each of which a large number of techniques have been studied. Finally, a question and answer system based on the knowledge graph of chronic diseases is designed to provide a proven solution for this field, in view of the problem that there are many patients with chronic diseases but lack of sufficient knowledge of the diseases.", "venue": "Academic Journal of Computing & Information Science", "year": 2021, "referenceCount": 97, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://francis-press.com/uploads/papers/nYg9RMIqBDngidzLN1HjYZgt35M9jDspBtZu0Isd.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-07-05", "journal": {"name": "Academic Journal of Computing & Information Science"}, "authors": [{"authorId": "2152223666", "name": "Zhaoyang Cao"}, {"authorId": "2141310", "name": "Lin Ni"}, {"authorId": "143651196", "name": "Lirong Dai"}]}, {"paperId": "e83c08632a3346402fb39524095af60f5bad2aaa", "externalIds": {"DBLP": "journals/intr/Abedin22", "MAG": "3180701834", "DOI": "10.1108/INTR-05-2020-0300", "CorpusId": 235763809}, "corpusId": 235763809, "publicationVenue": {"id": "c3c7b8e2-15d3-4389-b416-7f670cb2f30e", "name": "International Conference on Sustainable Information Engineering and Technology", "type": "conference", "alternate_names": ["SIET", "Int Conf Sustain Inf Eng Technol"]}, "url": "https://www.semanticscholar.org/paper/e83c08632a3346402fb39524095af60f5bad2aaa", "title": "Managing the tension between opposing effects of explainability of artificial intelligence: A contingency theory", "abstract": "Research into the interpretability and explainability of data analytics and artificial intelligence (AI) systems is on the rise. However, most recent studies either solely promote the benefits of explainability or criticize it due to its counterproductive effects. This study addresses this polarized space and aims to identify opposing effects of the explainability of AI and the tensions between them and propose how to manage this tension to optimize AI system performance and trustworthiness. In achieving this objective, the study systematically reviews the literature and synthesizes it using a contingency theory lens to develop a framework for managing the opposing effects of AI explainability. The study finds five opposing effects of explainability: comprehensibility, conduct, confidentiality, completeness and confidence in AI (5Cs). The study also proposes six perspectives on managing the tensions between the 5Cs: pragmatism in explanation, contextualization of the explanation, cohabitation of human agency and AI agency, metrics and standardization, regulatory and ethical principles, and other emerging solutions (i.e. AI enveloping, blockchain and AI fuzzy systems). The findings show how AI owners and developers can manage tensions between profitability, prediction accuracy and system performance via visibility, accountability and maintaining the \u201csocial goodness\u201d of AI. The results guide practitioners in developing metrics and standards for AI explainability, with the context of AI operation as the focus. This study addresses polarized beliefs amongst scholars and practitioners about the benefits of AI explainability versus its counterproductive effects. It poses that there is no single best way to maximize AI explainability. Instead, the co-existence of enabling and constraining effects must be managed.", "venue": "International Conference on Sustainable Information Engineering and Technology", "year": 2021, "referenceCount": 100, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.emerald.com/insight/content/doi/10.1108/INTR-05-2020-0300/full/pdf?title=managing-the-tension-between-opposing-effects-of-explainability-of-artificial-intelligence-a-contingency-theory-perspective", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Review"], "publicationDate": "2021-07-05", "journal": {"name": "6th International Conference on Sustainable Information Engineering and Technology 2021"}, "authors": [{"authorId": "3096818", "name": "B. Abedin"}]}, {"paperId": "cc9a79bab8a67c57f1961516e9e6eaa5a1e97019", "externalIds": {"DOI": "10.1080/10714421.2021.1965850", "CorpusId": 239066768}, "corpusId": 239066768, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc9a79bab8a67c57f1961516e9e6eaa5a1e97019", "title": "Military buzz: race, robots and insects", "abstract": "ABSTRACT Claiming to \u201clet evolution do the thinking for you,\u201d biologists are teaming up with roboticists and computer engineers in the emerging field of biomimetics to build animal-machines. One of the outcomes of these interdisciplinary collaborations is the development of biomimetic robot-insects: robots inspired by insect life. Biomimetic scientists assert that their technologies will be cleaner, greener, and more holistic, since they imitate Mother Earth\u2019s own capabilities, including for waging war. For example, biomimetic scientists regularly cite the examples of Velcro \u2013 a technology inspired by the ways that burrs attach to the fur on a dog\u2019s back \u2013 or solar panels \u2013 which are inspired by the way that leaves convert sunlight into energy. The specific focus of this article is on biomimetic insect-robot technologies; specifically the development of robots that imitate swarming behavior. Grounding the rise of these swarming technologies in a cultural context preoccupied with an increase in militarization, I show that although biomimetic scientists often claim that these technologies will be more environmentally friendly, in fact they rely upon reified assumptions about \u201cNature,\u201d on the commodification of Indigenous knowledges, and on racist metaphors of terrorists as \u201cswarms\u201d as part of their technological development. Examining a specific swarm of insect-robots known as nano quadrotors, I demonstrate that the imitation of Mother Earth does not reflect the natural world as it is but instead works to shape that world, and, in doing so, I problematize the utopian possibilities suggested for biomimetic swarming technologies.", "venue": "The Communication Review", "year": 2021, "referenceCount": 131, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-03", "journal": {"volume": "24", "pages": "218 - 243", "name": "The Communication Review"}, "authors": [{"authorId": "2095662731", "name": "Shoshana Magnet"}]}, {"paperId": "dffe40e79f9a8bfeed80846f037e612ffaf6bc2f", "externalIds": {"DOI": "10.1080/14789450.2021.1962303", "CorpusId": 236914039, "PubMed": "34343059"}, "corpusId": 236914039, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dffe40e79f9a8bfeed80846f037e612ffaf6bc2f", "title": "How can artificial intelligence be used for peptidomics?", "abstract": "ABSTRACT Introduction Peptidomics is an emerging field of omics sciences using advanced isolation, analysis, and computational techniques that enable qualitative and quantitative analyses of various peptides in biological samples. Peptides can act as useful biomarkers and as therapeutic molecules for diseases Areas covered The use of therapeutic peptides can be predicted quickly and efficiently using data-driven computational methods, particularly artificial intelligence (AI) approach. Various AI approaches are useful for peptide-based drug discovery, such as support vector machine, random forest, extremely randomized trees, and other more recently developed deep learning methods. AI methods are relatively new to the development of peptide-based therapies, but these techniques already become essential tools in protein science by dissecting novel therapeutic peptides and their functions (Figure 1). Expert opinion Researchers have shown that AI models can facilitate the development of peptidomics and selective peptide therapies in the field of peptide science. Biopeptide prediction is important for the discovery and development of successful peptide-based drugs. Due to their ability to predict therapeutic roles based on sequence details, many AI-dependent prediction tools have been developed (Figure 1).", "venue": "Expert review of proteomics", "year": 2021, "referenceCount": 213, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-03", "journal": {"volume": "18", "pages": "527 - 556", "name": "Expert Review of Proteomics"}, "authors": [{"authorId": "51173729", "name": "Lu\u00eds Perp\u00e9tuo"}, {"authorId": "37453457", "name": "J. Klein"}, {"authorId": "145355240", "name": "R. Ferreira"}, {"authorId": "145292287", "name": "Sofia Guedes"}, {"authorId": "145057139", "name": "F. Amado"}, {"authorId": "1382488872", "name": "A. Leite-Moreira"}, {"authorId": "2110040127", "name": "Artur M. S. Silva"}, {"authorId": "5995891", "name": "V. Thongboonkerd"}, {"authorId": "3993626", "name": "R. Vitorino"}]}, {"paperId": "e036ae44c3b4ebdbc2eeb2bd94cc6e4728bcddbc", "externalIds": {"DOI": "10.1080/14737140.2021.1951240", "CorpusId": 235723776, "PubMed": "34214007"}, "corpusId": 235723776, "publicationVenue": {"id": "42b74be8-4a75-43b6-bd71-dec3746689b0", "name": "Expert Review of Anticancer Therapy", "type": "journal", "alternate_names": ["Expert Rev Anticancer Ther"], "issn": "1473-7140", "url": "http://www.expert-reviews.com/loi/era", "alternate_urls": ["http://informahealthcare.com/journal/ery"]}, "url": "https://www.semanticscholar.org/paper/e036ae44c3b4ebdbc2eeb2bd94cc6e4728bcddbc", "title": "How will artificial intelligence impact breast cancer research efficiency?", "abstract": "Artificial Intelligence (AI) is a fascinating discipline that has captured our imagination since its birth in the 1950s [1]. Its function in society\u2019s life has grown exponentially in the last decade, to a point where many of its manifestations such as face recognition or digital voice assistants are taken for granted and generate little or no astonishment in everyday users. Interest for AI application in health care began in the 1990s and soon turned to oncology. Given the large number of women diagnosed with breast cancer every year, this field is an optimal setting for the development of a technology largely based on processing significant amounts of data. Computer-aided detection (CAD) was the first software announced for clinical use in breast cancer diagnosis, and was burdened with significant expectations which were not entirely met since its introduction in the late 1990s [2]. This technology relied on algorithms programmed to analyze digital mammograms in search of the same features of malignancy that radiologists look for when reading an exam (i.e. shape, size, asymmetry etc): \u2018old\u2019 AI was therefore conceived as an enhancement of human intelligence that could be matched with the artificial benefit of processing large quantities of data. Despite encouraging initial results, years of CAD clinical application revealed no significant improvement in comprehensive screening performance, and general hype deflated until a new deep learning (DL) revolution generated a second wave of enthusiasm from the early 2010s [3].", "venue": "Expert Review of Anticancer Therapy", "year": 2021, "referenceCount": 26, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/14737140.2021.1951240?needAccess=true", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2021-07-02", "journal": {"volume": "21", "pages": "1067 - 1070", "name": "Expert Review of Anticancer Therapy"}, "authors": [{"authorId": "49204335", "name": "G. Franceschini"}, {"authorId": "40393745", "name": "E. J. Mason"}, {"authorId": "5530013", "name": "A. Orlandi"}, {"authorId": "13363576", "name": "S. D\u2019Archi"}, {"authorId": "153538480", "name": "A. Sanchez"}, {"authorId": "40472485", "name": "R. Masetti"}]}, {"paperId": "2a8127707c10c8d7c198b1b4ac3e9cb1a1bed900", "externalIds": {"PubMedCentral": "8326779", "DOI": "10.2147/IMCRJ.S322827", "CorpusId": 236913281, "PubMed": "34349566"}, "corpusId": 236913281, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a8127707c10c8d7c198b1b4ac3e9cb1a1bed900", "title": "Machine Learning in an Elderly Man with Heart Failure", "abstract": "Abstract Machine learning is a branch of artificial intelligence and can be used to predict important outcomes in a wide variety of medical conditions. With the widespread use of electronic medical records, the vast amount of data required for this process is now readily available. The following case demonstrates the application of machine learning to an elderly man with heart failure. The algorithms used, namely, decision tree and random forest, both correctly differentiated heart failure with preserved ejection fraction from heart failure with reduced ejection fraction. This has important treatment and prognostic ramifications and can be completed at the point of care while awaiting confirmation via echocardiogram. Viewing the machine learning process through a patient-centered lens, as in this case, highlights the key role we as physicians have in the implementation and supervision of machine learning.", "venue": "International medical case reports journal", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.dovepress.com/getfile.php?fileID=72138", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["CaseReport"], "publicationDate": "2021-07-01", "journal": {"volume": "14", "pages": "497 - 502", "name": "International Medical Case Reports Journal"}, "authors": [{"authorId": "103444646", "name": "Joel P. Koops"}]}, {"paperId": "9aa8a73a4464d6a20ed89e18492216dd839d8a24", "externalIds": {"MAG": "3188436879", "DOI": "10.1111/lnc3.12433", "CorpusId": 238803038}, "corpusId": 238803038, "publicationVenue": {"id": "984325f8-27b7-4088-9a6d-c3de9e23beca", "name": "Language and Linguistics Compass", "type": "journal", "alternate_names": ["Lang Linguistics Compass"], "issn": "1749-818X", "url": "http://www.blackwell-compass.com/subject/linguistics/", "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1749-818X", "http://www.blackwell-synergy.com/loi/lnco"]}, "url": "https://www.semanticscholar.org/paper/9aa8a73a4464d6a20ed89e18492216dd839d8a24", "title": "Natural language processing as a technique for conducting text\u2010based research", "abstract": null, "venue": "Language and Linguistics Compass", "year": 2021, "referenceCount": 84, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-07-01", "journal": {"name": "Language and Linguistics Compass"}, "authors": [{"authorId": "2924101", "name": "L. Allen"}, {"authorId": "47304399", "name": "S. Creer"}, {"authorId": "2132371464", "name": "Mary Cati Poulos"}]}, {"paperId": "eae9bb31cca551ef745697d3472677a0af80a132", "externalIds": {"DBLP": "journals/qip/XueQ21", "DOI": "10.1007/s11128-021-03172-3", "CorpusId": 236522481}, "corpusId": 236522481, "publicationVenue": {"id": "f509d2f6-f64c-4a9d-a468-4d226978713f", "name": "Quantum Information Processing", "type": "journal", "alternate_names": ["Quantum Inf Process"], "issn": "1570-0755", "url": "https://link.springer.com/journal/11128"}, "url": "https://www.semanticscholar.org/paper/eae9bb31cca551ef745697d3472677a0af80a132", "title": "Preparation of three-atom GHZ states based on deep reinforcement learning", "abstract": null, "venue": "Quantum Information Processing", "year": 2021, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": "20", "name": "Quantum Information Processing"}, "authors": [{"authorId": "1379689239", "name": "Guanghao Xue"}, {"authorId": "47659868", "name": "L. Qiu"}]}, {"paperId": "8212f36243d00903c9ccf8cd115cc8e3f06830cf", "externalIds": {"DOI": "10.7861/fhj.2020-0189", "CorpusId": 235915054, "PubMed": "34286194"}, "corpusId": 235915054, "publicationVenue": {"id": "ba3571bc-6516-44a1-8355-87384467d917", "name": "Future healthcare journal", "alternate_names": ["Future healthc j"], "issn": "2514-6645", "url": "https://www.rcpjournals.org/content/futurehosp"}, "url": "https://www.semanticscholar.org/paper/8212f36243d00903c9ccf8cd115cc8e3f06830cf", "title": "The automation of doctors and machines: A classification for AI in medicine (ADAM framework)", "abstract": "ABSTRACT The advances in artificial intelligence (AI) provide an opportunity to expand the frontier of medicine to improve diagnosis, efficiency and management. By extension of being able to perform any task that a human could, a machine that meets the requirements of artificial general intelligence (\u2018strong\u2019 AI; AGI) possesses the basic necessities to perform as, or at least qualify to become, a doctor. In this emerging field, this article explores the distinctions between doctors and AGI, and the prerequisites for AGI performing as clinicians. In doing so, it necessitates the requirement for a classification of medical AI and prepares for the development of AGI. With its imminent arrival, it is beneficial to create a framework from which leading institutions can define specific criteria for AGI.", "venue": "Future healthcare journal", "year": 2021, "referenceCount": 52, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.rcpjournals.org/content/futurehosp/8/2/e257.full.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": "8", "pages": "e257 - e262", "name": "Future Healthcare Journal"}, "authors": [{"authorId": "2142117159", "name": "F. Kazzazi"}]}, {"paperId": "3ec13304ac49496c3c8c6281f7f477c3693000a7", "externalIds": {"DOI": "10.7861/fhj.2021-0025", "CorpusId": 235915016, "PubMed": "34286188"}, "corpusId": 235915016, "publicationVenue": {"id": "ba3571bc-6516-44a1-8355-87384467d917", "name": "Future healthcare journal", "alternate_names": ["Future healthc j"], "issn": "2514-6645", "url": "https://www.rcpjournals.org/content/futurehosp"}, "url": "https://www.semanticscholar.org/paper/3ec13304ac49496c3c8c6281f7f477c3693000a7", "title": "Interdisciplinary research: shaping the healthcare of the future", "abstract": "ABSTRACT The hospitals of the future will be shaped by scientific and technical advances made across a wide range of disciplines because complex problems in healthcare cannot be addressed successfully by a single discipline. This paper considers how interdisciplinary research is being promoted and the prospects for developing stronger and deeper collaborations between medicine, health and other disciplines, drawing on case studies from mathematics, physics and engineering. The anticipated impact of greater interdisciplinarity on clinical training and the provision of care is also reviewed. While the role and training of clinicians in the provision of care will continue to evolve, they will remain leading members of a much broader and more diverse interdisciplinary team, alert to the value of deep and sustained interdisciplinary research.", "venue": "Future healthcare journal", "year": 2021, "referenceCount": 35, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.rcpjournals.org/content/futurehosp/8/2/e218.full.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-07-01", "journal": {"volume": "8", "pages": "e218 - e223", "name": "Future Healthcare Journal"}, "authors": [{"authorId": "1785133", "name": "S. Smye"}, {"authorId": "2060922052", "name": "Alejandro F. Frangi"}]}, {"paperId": "59a714d3fd6eed1a2df3eae4d9226d2a1cad9aca", "externalIds": {"DOI": "10.1017/S0963180120001012", "CorpusId": 235382070, "PubMed": "34109927"}, "corpusId": 235382070, "publicationVenue": {"id": "df29a958-9161-46f3-a3af-2df5cb2f071c", "name": "Cambridge Quarterly of Healthcare Ethics", "type": "journal", "alternate_names": ["Camb Q Healthc Ethics"], "issn": "0963-1801", "url": "https://www.cambridge.org/core/journals/cambridge-quarterly-of-healthcare-ethics/all-issues", "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=CQH"]}, "url": "https://www.semanticscholar.org/paper/59a714d3fd6eed1a2df3eae4d9226d2a1cad9aca", "title": "How Could We Know When a Robot was a Moral Patient?", "abstract": "Abstract There is growing interest in machine ethics in the question of whether and under what circumstances an artificial intelligence would deserve moral consideration. This paper explores a particular type of moral status that the author terms psychological moral patiency, focusing on the epistemological question of what sort of evidence might lead us to reasonably conclude that a given artificial system qualified as having this status. The paper surveys five possible criteria that might be applied: intuitive judgments, assessments of intelligence, the presence of desires and autonomous behavior, evidence of sentience, and behavioral equivalence. The author suggests that despite its limitations, the latter approach offers the best way forward, and defends a variant of that, termed the cognitive equivalence strategy. In short, this holds that an artificial system should be considered a psychological moral patient to the extent that it possesses cognitive mechanisms shared with other beings such as nonhuman animals whom we also consider to be psychological moral patients.", "venue": "Cambridge Quarterly of Healthcare Ethics", "year": 2021, "referenceCount": 54, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-07-01", "journal": {"volume": "30", "pages": "459 - 471", "name": "Cambridge Quarterly of Healthcare Ethics"}, "authors": [{"authorId": "66652934", "name": "Henry Shevlin"}]}, {"paperId": "e000a3c2831ff57a4e143e8f89e24806e81d5a5c", "externalIds": {"DOI": "10.1017/S0963180120001061", "CorpusId": 235382046, "PubMed": "34109923"}, "corpusId": 235382046, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e000a3c2831ff57a4e143e8f89e24806e81d5a5c", "title": "Moral Status for Malware! The Difficulty of Defining Advanced Artificial Intelligence", "abstract": "Abstract The suggestion has been made that future advanced artificial intelligence (AI) that passes some consciousness-related criteria should be treated as having moral status, and therefore, humans would have an ethical obligation to consider its well-being. In this paper, the author discusses the extent to which software and robots already pass proposed criteria for consciousness; and argues against the moral status for AI on the grounds that human malware authors may design malware to fake consciousness. In fact, the article warns that malware authors have stronger incentives than do authors of legitimate software to create code that passes some of the criteria. Thus, code that appears to be benign, but is in fact malware, might become the most common form of software to be treated as having moral status.", "venue": "Cambridge Quarterly of Healthcare Ethics", "year": 2021, "referenceCount": 91, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://research-information.bris.ac.uk/ws/files/270200435/Mowbray_Moral_Status_for_Malware_corrected_footnote.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": "30", "pages": "517 - 528", "name": "Cambridge Quarterly of Healthcare Ethics"}, "authors": [{"authorId": "1696656", "name": "M. Mowbray"}]}, {"paperId": "8163c3ba9872e8e0ccdbbcaa3352ff594cb0e9c4", "externalIds": {"DBLP": "journals/ieeejas/HepworthBHYDA21", "MAG": "3113524144", "DOI": "10.1109/JAS.2020.1003545", "CorpusId": 234934052}, "corpusId": 234934052, "publicationVenue": {"id": "ef1356d5-69c7-484e-a110-3efae1e93ecc", "name": "IEEE/CAA Journal of Automatica Sinica", "type": "journal", "alternate_names": ["IEEE/CAA J Autom Sin"], "issn": "2329-9266", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=6570654", "alternate_urls": ["http://www.ieee-jas.org/"]}, "url": "https://www.semanticscholar.org/paper/8163c3ba9872e8e0ccdbbcaa3352ff594cb0e9c4", "title": "Human-Swarm-Teaming Transparency and Trust Architecture", "abstract": "Transparency is a widely used but poorly defined term within the explainable artificial intelligence literature. This is due, in part, to the lack of an agreed definition and the overlap between the connected - sometimes used synonymously - concepts of interpretability and explain ability. We assert that transparency is the overarching concept, with the tenets of interpretability, explainability, and predictability subordinate. We draw on a portfolio of definitions for each of these distinct concepts to propose a human-swarm-teaming transparency and trust architecture (HST3-Architecture). The architecture reinforces transparency as a key contributor towards situation awareness, and consequently as an enabler for effective trustworthy human-swarm teaming (HST).", "venue": "IEEE/CAA Journal of Automatica Sinica", "year": 2021, "referenceCount": 112, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": "8", "pages": "1281-1295", "name": "IEEE/CAA Journal of Automatica Sinica"}, "authors": [{"authorId": "41172766", "name": "A. Hepworth"}, {"authorId": "2005671863", "name": "D. Baxter"}, {"authorId": "144989577", "name": "Aya Hussein"}, {"authorId": "52260227", "name": "Kate J. Yaxley"}, {"authorId": "1792568", "name": "Essam Soliman Debie"}, {"authorId": "1713460", "name": "H. Abbass"}]}, {"paperId": "09aced33ffa94cb229dc26b300f8b42fa1d17c56", "externalIds": {"MAG": "3180423254", "DOI": "10.5817/mujlt2021-1-4", "CorpusId": 237759089}, "corpusId": 237759089, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09aced33ffa94cb229dc26b300f8b42fa1d17c56", "title": "Lex Ex Machina: Reasons for Algorithmic Regulation", "abstract": "A major unanswered question in regulation concerns the application of cognitive diversity and various data as inputs for the creation of general legal rules. The paper claims this diversity can be assured with the help of algorithmic planning. Classical regulation is hence put under question due to its inability to quickly adapt to changing conditions, where relations per se change also intentions, tools and goals. The paper proposes two paths towards a computational simulation of legal situations: with the help of algorithms that can ensure the needed adaptability and relevancy of hidden data correlations, and with collective intelligence based on human inputs where data for algorithms is not available. The aim of this work is to extend the pre-regulatory practice of extracting information from data with the help of algorithms to determine patterns and predict future results and trends (written now as general legal rules). Nowadays, algorithms could be used at least as advice, especially in a prepreparation, draft phase of legal acts.", "venue": "Masaryk University Journal of Law and Technology", "year": 2021, "referenceCount": 16, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.muni.cz/mujlt/article/download/13912/12222", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-30", "journal": {"name": "Masaryk University Journal of Law and Technology"}, "authors": [{"authorId": "74626425", "name": "Mirko Pe\u010dari\u010d"}]}, {"paperId": "b89b3d1d1b159638a375dde9008a9f3b46c0ab57", "externalIds": {"MAG": "3176569696", "DOI": "10.1007/s00146-021-01244-7", "CorpusId": 237739779}, "corpusId": 237739779, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b89b3d1d1b159638a375dde9008a9f3b46c0ab57", "title": "The dissolution of the condicio humana", "abstract": null, "venue": "AI & SOCIETY", "year": 2021, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01244-7.pdf", "status": null}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-06-30", "journal": {"name": "AI & SOCIETY"}, "authors": [{"authorId": "2128832094", "name": "Tim Rein"}]}, {"paperId": "b8184dd0fc6f9529d814420bfda0b904a8ac8f58", "externalIds": {"MAG": "3175460271", "DOI": "10.33461/uybisbbd.913513", "CorpusId": 237893980}, "corpusId": 237893980, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b8184dd0fc6f9529d814420bfda0b904a8ac8f58", "title": "B\u0130LG\u0130 Y\u00d6NET\u0130M\u0130NDE KURAL TABANLI UZMAN S\u0130STEM GEL\u0130\u015eT\u0130RME ADIMLARI VE BA\u015eARI FAKT\u00d6RLER\u0130", "abstract": "Thanks to information technologies, change in the world takes place very quickly. This change necessitates taking decisions quickly and accurately. Expert systems assist human decision making by acting in a similar way. The scope of the study includes a rule-based expert system. The aim of this study is to reveal the success factors of rule-based expert system development on the basis of system development stages in order to shed light on those who develop expert systems. As a method, things to be done on the basis of an expert system development stages are discussed. As a result, it is aimed that the success factors presented in the study will contribute to the development of perspectives or to increase the success of the project they use, in case of use by researchers or practitioners who develop expert systems.", "venue": "Uluslararas\u0131 Y\u00f6netim Bili\u015fim Sistemleri ve Bilgisayar Bilimleri Dergisi", "year": 2021, "referenceCount": 38, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1698990", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-30", "journal": {"name": "Uluslararas\u0131 Y\u00f6netim Bili\u015fim Sistemleri ve Bilgisayar Bilimleri Dergisi"}, "authors": [{"authorId": "121738154", "name": "Do\u011fan Yildiz"}]}, {"paperId": "a16ae67070de155789a871cb27ecbf9eaa98b379", "externalIds": {"ACL": "2021.acl-long.565", "ArXiv": "2107.00061", "DBLP": "journals/corr/abs-2107-00061", "DOI": "10.18653/v1/2021.acl-long.565", "CorpusId": 235694265}, "corpusId": 235694265, "publicationVenue": {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", "name": "Annual Meeting of the Association for Computational Linguistics", "type": "conference", "alternate_names": ["Annu Meet Assoc Comput Linguistics", "Meeting of the Association for Computational Linguistics", "ACL", "Meet Assoc Comput Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, "url": "https://www.semanticscholar.org/paper/a16ae67070de155789a871cb27ecbf9eaa98b379", "title": "All That\u2019s \u2018Human\u2019 Is Not Gold: Evaluating Human Evaluation of Generated Text", "abstract": "Human evaluations are typically considered the gold standard in natural language generation, but as models\u2019 fluency improves, how well can evaluators detect and judge machine-generated text? We run a study assessing non-experts\u2019 ability to distinguish between human- and machine-authored text (GPT2 and GPT3) in three domains (stories, news articles, and recipes). We find that, without training, evaluators distinguished between GPT3- and human-authored text at random chance level. We explore three approaches for quickly training evaluators to better identify GPT3-authored text (detailed instructions, annotated examples, and paired examples) and find that while evaluators\u2019 accuracy improved up to 55%, it did not significantly improve across the three domains. Given the inconsistent results across text domains and the often contradictory reasons evaluators gave for their judgments, we examine the role untrained human evaluations play in NLG evaluation and provide recommendations to NLG researchers for improving human evaluations of text generated from state-of-the-art models.", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2021, "referenceCount": 40, "citationCount": 77, "influentialCitationCount": 12, "isOpenAccess": true, "openAccessPdf": {"url": "https://aclanthology.org/2021.acl-long.565.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-06-30", "journal": {"pages": "7282-7296"}, "authors": [{"authorId": "40684993", "name": "Elizabeth Clark"}, {"authorId": "50509991", "name": "Tal August"}, {"authorId": "38618739", "name": "Sofia Serrano"}, {"authorId": "3465456", "name": "Nikita Haduong"}, {"authorId": "40895369", "name": "Suchin Gururangan"}, {"authorId": "144365875", "name": "Noah A. Smith"}]}, {"paperId": "8230a91a2c3ce4291e901a08485d001fadca8e08", "externalIds": {"MAG": "3198536686", "DOI": "10.7480/FOOTPRINT.15.1.4984", "CorpusId": 239694753}, "corpusId": 239694753, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8230a91a2c3ce4291e901a08485d001fadca8e08", "title": "Architecture as Information Machine", "abstract": "Architecture has always been dealing with machines. Differently but constantly. At the middle of the last century, new kind of machine and its science have emerged: Cybernetics and Information Machine. Architectural theory and practice displayed great interest in these new paradigms and produced some design experimentations and essays but it seems like these scientific and technological results call for recasting the architectural foundations. Not only to figure out how to design new or complex architectural forms but to attempt replaying to the question, \u201cwhat is form?\u201d then to contribute to the understandability of all kinds of forms \u2014not only architectural or urban forms, but all the forms involved in the built environment\u2014 and to link or \u201ctranslate\u201d one form into another. Such transversal view might renew not only our reading of the past and current built environment but also our manner to interact and to shape it. What if, in contrary to the other former machines, the Information Machine is neither to be represented, nor to be imitated but to be actualized, or better to be modeled?", "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-29", "journal": {"volume": "15", "pages": "111-126", "name": ""}, "authors": [{"authorId": "121889488", "name": "Tewfik Hammoudi"}]}, {"paperId": "7c9b154ee30fffd74b1498f8c07212bfa694aa48", "externalIds": {"DBLP": "journals/corr/abs-2106-13697", "ArXiv": "2106.13697", "DOI": "10.1016/j.mechatronics.2021.102576", "CorpusId": 235652039}, "corpusId": 235652039, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c9b154ee30fffd74b1498f8c07212bfa694aa48", "title": "Active Learning in Robotics: A Review of Control Principles", "abstract": null, "venue": "ArXiv", "year": 2021, "referenceCount": 306, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-25", "journal": {"volume": "abs/2106.13697", "name": "ArXiv"}, "authors": [{"authorId": "38598182", "name": "Annalisa T. Taylor"}, {"authorId": "52185279", "name": "Thomas A. Berrueta"}, {"authorId": "2750574", "name": "T. Murphey"}]}, {"paperId": "a9d0ad339987451214e41105a6a5344bd00a1e69", "externalIds": {"MAG": "3176620061", "DOI": "10.35487/rius.v15i48.2021.661", "CorpusId": 237795091}, "corpusId": 237795091, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a9d0ad339987451214e41105a6a5344bd00a1e69", "title": "Towards legal regulation of artificial intelligence", "abstract": "This paper addresses the current state of AI regulation and discusses the feasibility and need for regulation through legally binding instruments, beyond the field of ethics. History shows what can happen if the State withdraws and allows private companies to set their own exclusive regulatory standards. We have a unique opportunity to create laws and principles governing AI on a common basis and with an indispensable public-private partnership that should preferably be international in scope with the leadership of the UN or, failing that, at European level led by EU institutions, as they had already achieved in the areas of privacy and data protection.", "venue": "REVISTA IUS", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistaius.com/index.php/ius/article/download/661/789", "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-23", "journal": {"name": "REVISTA IUS"}, "authors": [{"authorId": "2129026461", "name": "Moises Barrio Andres"}]}, {"paperId": "eb4d217810bb0dba2cabcbbb6bed9a2bfc8e765d", "externalIds": {"MAG": "3171224575", "DOI": "10.12737/2587-9103-2021-10-3-17-23", "CorpusId": 236264692}, "corpusId": 236264692, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb4d217810bb0dba2cabcbbb6bed9a2bfc8e765d", "title": "Development of Artificial Intelligence as a Factor of Transformation in Philosophical Anthropology and Ethics", "abstract": "This article is dedicated to the problem of the development of artificial intelligence in modern society and its influence on such philosophical disciplines as philosophical anthropology, philosophy of mind and ethics. The article defines the possible content of the term \"artificial intelligence\", examines the impact of artificial intelligence on the problem of distinguishing intelligent and non-intelligent beings, assesses the possibility of the existence of consciousness outside the human brain, explores options for solving applied ethical problems in the field of AI, searches ways of communication between the humanity and artificial intelligence, assesses the theoretical prospects for organizing an ethical space for intelligent machines of the future. At the end of each topic, the author tries to assess the potential impact of the artificial intelligence development on usual philosophical problems. The work has practical application in teaching a course in philosophy, and theoretical application as a basis for further research in various fields of science and philosophy.", "venue": "", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-23", "journal": {"volume": "10", "pages": "17-23", "name": ""}, "authors": [{"authorId": "74651556", "name": "A. Filipchenko"}]}, {"paperId": "7a7064a33c0270e2d40448f7e25c7ad8d159d345", "externalIds": {"MAG": "3175232352", "DOI": "10.21203/rs.3.rs-590601/v1", "CorpusId": 237854631}, "corpusId": 237854631, "publicationVenue": {"id": "4cbc2987-6254-4668-b85b-aeabd7ff62ef", "name": "Nature Computational Science", "type": "journal", "alternate_names": ["Nat Comput Sci"], "issn": "2662-8457"}, "url": "https://www.semanticscholar.org/paper/7a7064a33c0270e2d40448f7e25c7ad8d159d345", "title": "Compressing atmospheric data into its real information content", "abstract": "\n Hundreds of petabytes of data are produced annually at weather and climate forecast centres worldwide. Compression is inevitable to reduce storage and to facilitate data sharing. Current techniques do not distinguish the real from the false information in data. We define the bitwise real information content from information theory for data from the Copernicus Atmospheric Monitoring Service (CAMS). Most variables contain less than 7 bits of real information per value, which are also highly compressible due to spatio-temporal correlation. Rounding bits without real information to zero facilitates lossless compression algorithms and encodes the uncertainty within the data itself. The entire CAMS data is compressed by a factor of 17x, relative to 64-bit floats, while preserving 99% of real information. Combined with 4-dimensional compression to exploit the spatio-temporal correlation, factors beyond 60x are achieved without an increase in forecast errors. A data compression Turing test is proposed to optimize compressibility while minimizing information loss for the end use of weather and climate forecast data.", "venue": "Nature Computational Science", "year": 2021, "referenceCount": 59, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s43588-021-00156-2.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-21", "journal": {"name": "Nature Computational Science"}, "authors": [{"authorId": "2094921437", "name": "Milan Kloewer"}, {"authorId": "2126605081", "name": "Miha Razinger"}, {"authorId": "2007305458", "name": "Juan-Jos\u00e9 Dominguez"}, {"authorId": "1389726126", "name": "P. Dueben"}, {"authorId": "48919093", "name": "T. Palmer"}]}, {"paperId": "7e7a66eb76efb6161ae7dcb6533eb12500d827ef", "externalIds": {"PubMedCentral": "8252890", "DOI": "10.12659/MSM.933675", "CorpusId": 235661362, "PubMed": "34176921"}, "corpusId": 235661362, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e7a66eb76efb6161ae7dcb6533eb12500d827ef", "title": "Editorial: Artificial Intelligence (AI) in Clinical Medicine and the 2020 CONSORT-AI Study Guidelines", "abstract": "Artificial intelligence (AI) in clinical medicine includes physical robotics and devices and virtual AI and machine learning. Concerns have been raised regarding ethical issues for the use of AI in surgery, including guidance for surgical decisions, patient confidentiality, and the need for support from controlled clinical trials to use these methods so that clinical guidelines can be developed. The most common applications for virtual AI include disease diagnosis, health monitoring and digital patient consultations, clinical training, patient data management, drug development, and personalized medicine. In September 2020, the CONSORT-A1 extension was developed with 14 additional items that should be reported for AI studies that include clear descriptions of the AI intervention, skills required, study setting, inputs and outputs of the AI intervention, analysis of errors, and the human and AI interactions. This Editorial aims to present current applications and challenges of AI in clinical medicine and the importance of the new 2020 CONSORT-AI study guidelines.", "venue": "Medical science monitor : international medical journal of experimental and clinical research", "year": 2021, "referenceCount": 22, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2021-06-21", "journal": {"volume": "27", "pages": "e933675-1 - e933675-3", "name": "Medical Science Monitor : International Medical Journal of Experimental and Clinical Research"}, "authors": [{"authorId": "3692616", "name": "D. Parums"}]}, {"paperId": "75afe70550586a44e2b4b51bd5a286e2be9883ce", "externalIds": {"ArXiv": "2106.13233", "CorpusId": 237513957}, "corpusId": 237513957, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/75afe70550586a44e2b4b51bd5a286e2be9883ce", "title": "Post-Selections in AI and How to Avoid Them", "abstract": ": Neural network based Arti\ufb01cial Intelligence (AI) has reported increasing scales in experiments. However, this paper raises a rarely reported stage in such experiments called Post-Selection alter the reader to several possible protocol \ufb02aws that may result in misleading results. All AI methods fall into two broad schools, connectionist and symbolic. The Post-Selection fall into two kinds, Post-Selection Using Validation Sets (PSUVS) and Post-Selection Using Test Sets (PSUTS). Each kind has two types of post-selectors, machines and humans. The connectionist school received criticisms for its \u201cblack box\u201d and now the Post-Selection; but the seemingly \u201cclean\u201d symbolic school seems more brittle because of its human PSUTS. This paper \ufb01rst presents a controversial view: all static \u201cbig data\u201d are non-scalable. We then analyze why error-backprop from randomly initialized weights suffers from severe local minima, why PSUVS lacks cross-validation, why PSUTS violates well-established protocols, and why every paper involved should transparently report the Post-Selection stage. To avoid future pitfalls in AI competitions, this paper proposes a new AI metrics, called developmental errors for all networks trained, under Three Learning Conditions: (1) an incremental learning architecture (due to a \u201cbig data\u201d \ufb02aw), (2) a training experience and (3) a limited amount of computational resources. Developmental Networks avoid Post-Selections because they automatically discover context-rules on the \ufb02y by generating emergent Turing machines (not black boxes) that are optimal in the sense of maximum-likelihood across lifetime, conditioned on the Three Learning Conditions.", "venue": "", "year": 2021, "referenceCount": 92, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-19", "journal": null, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "220068be6ef897b2b38db687a922423d6693ed9c", "externalIds": {"PubMedCentral": "8213706", "DOI": "10.1038/s41540-021-00189-3", "CorpusId": 235476723, "PubMed": "34145287"}, "corpusId": 235476723, "publicationVenue": {"id": "8f2dd075-6f52-459e-8839-5590e996bcba", "name": "npj Systems Biology and Applications", "alternate_names": ["npj Syst Biology Appl"], "issn": "2056-7189", "url": "http://www.nature.com/npjsba/"}, "url": "https://www.semanticscholar.org/paper/220068be6ef897b2b38db687a922423d6693ed9c", "title": "Nobel Turing Challenge: creating the engine for scientific discovery", "abstract": null, "venue": "npj Systems Biology and Applications", "year": 2021, "referenceCount": 116, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s41540-021-00189-3.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-06-18", "journal": {"volume": "7", "name": "NPJ Systems Biology and Applications"}, "authors": [{"authorId": "1742807", "name": "H. Kitano"}]}, {"paperId": "2b3167a329292f63a0afe975c891555e008d77c0", "externalIds": {"MAG": "3175000097", "DOI": "10.32957/hacettepehdf.874993", "CorpusId": 237858393}, "corpusId": 237858393, "publicationVenue": {"id": "e8799d4f-dd7b-4e3f-9e43-f7207d0a1200", "name": "Hacettepe Hukuk Fak\u00fcltesi Dergisi", "type": "journal", "alternate_names": ["Hacet Hukuk Fak\u00fcltesi Derg"], "issn": "1302-4868", "url": "http://www.hukukfakultesi.hacettepe.edu.tr/"}, "url": "https://www.semanticscholar.org/paper/2b3167a329292f63a0afe975c891555e008d77c0", "title": "YAPAY ZEK\u00c2 VE \u0130DARE HUKUKU (BUG\u00dcNDEN GELECE\u011eE Y\u00d6NEL\u0130K B\u0130R DE\u011eERLEND\u0130RME)", "abstract": "Artificial intelligence continues to change our lives. However, while artificial intelligence increases its function in society, the uncertain and unpredictable character of artificial intelligence also creates a new challenge for law, unlike every scientific development. In our assessment, we think that the concepts of electronic personality and legal personality should be emphasized in determining the legal personality and legal status of artificial intelligence. On the other hand, as the types of artificial intelligence develop and the artificial intelligence becomes aware of itself, more complex legal problems will come to the agenda. One of the issues the article focuses on is the dilemma of the law regarding timing and content against artificial intelligence technology, as in every scientific development. For the law to find its way out, a road map should be created. In our study, it is revealed that administrative law, like other branches of law, cannot be abstracted from artificial intelligence developments. Administrative law will be affected by Ka\u011f\u0131tc\u0131o\u011flu Hacettepe HFD, 11(1) 2021, 118-168 120 developments in artificial intelligence, with its mandate, institution, and concepts. For this reason, there are not a few issues that the organic and functional administration will transform within itself with the effect of artificial intelligence. In the field of responsibility of the administration due to the damages caused by artificial intelligence, it is necessary to consider the adaptation of the strict liability principle or the development of a new one. Thanks to the jurisprudence character of administrative law, it is possible to produce adequate and timely responses to developments in the field of artificial intelligence. In addition, the relationship to be established between administrative law and artificial intelligence may bring the need for administrative procedure act back into the agenda.", "venue": "Hacettepe Hukuk Fak\u00fcltesi Dergisi", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1557937", "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-17", "journal": {"name": "Hacettepe Hukuk Fak\u00fcltesi Dergisi"}, "authors": [{"authorId": "1696645119", "name": "Mutlu Ka\u011fitcio\u011flu"}]}, {"paperId": "4b8ecdffd03985fadf94d408aa4eaa292fb01d92", "externalIds": {"MAG": "3166388909", "DBLP": "journals/concurrency/DuttaM21", "DOI": "10.1002/cpe.6451", "CorpusId": 236282871}, "corpusId": 236282871, "publicationVenue": {"id": "312ca99c-9149-490d-813e-c60d5e949f65", "name": "Concurrency and Computation", "type": "journal", "alternate_names": ["Concurr Comput Pract Exp", "Concurrency and Computation: Practice and Experience", "Concurr Comput"], "issn": "1532-0626", "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/77004395?CRETRY=1&SRETRY=0", "alternate_urls": ["http://www3.interscience.wiley.com/cgi-bin/jtoc?ID=77004395", "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1532-0634"]}, "url": "https://www.semanticscholar.org/paper/4b8ecdffd03985fadf94d408aa4eaa292fb01d92", "title": "DigiNet: Prediction of Assamese handwritten digits using convolutional neural network", "abstract": "Numerous work focusing on Indian Languages for automatically recognizing characters has been witnessed in literature in the last few decades. But it was observed that only a handful of them targeted the optical character recognition of the Assamese language despite the language being widely spoken and used in many official works and activities across North\u2010East India. The limited contribution in this field seems to be inadequate and insufficient in their ability to recognize the handwritten characters due to dissimilarity in the people's writing style. This has motivated us to device a computational model for automatic recognition of the handwritten Assamese digits belonging to 10 different classes of 0 to 9. This study employs a convolutional neural network model (DigiNet) to learn and understand the various styles of handwritten digits. Our model exercises the convolutional neural network composed of six alternative Convolution and Pooling layers and is able to attain state\u2010of\u2010the\u2010art performance on the Assamese handwritten digits, achieving a test accuracy of 93.02% which is a pretty good success. The proficiency of the model architecture is also tested on the MNIST and the Bangla handwritten numeral datasets. Furthermore, our proposed model is compared with the pre\u2010trained VGG 19 architecture, where the performance of our model was better compared to the pre\u2010trained model on the Assamese as well as the Bangla handwritten numerals.", "venue": "Concurrency and Computation", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-15", "journal": {"volume": "33", "name": "Concurrency and Computation: Practice and Experience"}, "authors": [{"authorId": "1726120184", "name": "Prarthana Dutta"}, {"authorId": "4966350", "name": "Naresh Babu Muppalaneni"}]}, {"paperId": "d6a59868ed67dc581b3a721824c130490ea74566", "externalIds": {"PubMedCentral": "8580451", "ArXiv": "2106.08375", "DOI": "10.1098/rsta.2020.0268", "CorpusId": 235446476, "PubMed": "34743603"}, "corpusId": 235446476, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d6a59868ed67dc581b3a721824c130490ea74566", "title": "Modern perspectives on near-equilibrium analysis of Turing systems", "abstract": "In the nearly seven decades since the publication of Alan Turing\u2019s work on morphogenesis, enormous progress has been made in understanding both the mathematical and biological aspects of his proposed reaction\u2013diffusion theory. Some of these developments were nascent in Turing\u2019s paper, and others have been due to new insights from modern mathematical techniques, advances in numerical simulations and extensive biological experiments. Despite such progress, there are still important gaps between theory and experiment, with many examples of biological patterning where the underlying mechanisms are still unclear. Here, we review modern developments in the mathematical theory pioneered by Turing, showing how his approach has been generalized to a range of settings beyond the classical two-species reaction\u2013diffusion framework, including evolving and complex manifolds, systems heterogeneous in space and time, and more general reaction-transport equations. While substantial progress has been made in understanding these more complicated models, there are many remaining challenges that we highlight throughout. We focus on the mathematical theory, and in particular linear stability analysis of \u2018trivial\u2019 base states. We emphasize important open questions in developing this theory further, and discuss obstacles in using these techniques to understand biological reality. This article is part of the theme issue \u2018Recent progress and open frontiers in Turing\u2019s theory of morphogenesis\u2019.", "venue": "Philosophical Transactions of the Royal Society A", "year": 2021, "referenceCount": 220, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Physics", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-15", "journal": {"volume": "379", "name": "Philosophical transactions. Series A, Mathematical, physical, and engineering sciences"}, "authors": [{"authorId": "22256586", "name": "Andrew L. Krause"}, {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "2339973", "name": "P. Maini"}, {"authorId": "2691918", "name": "V. Klika"}]}, {"paperId": "d602137d38d4fad9e6db07d911fbf3551894d441", "externalIds": {"ArXiv": "2106.06924", "CorpusId": 245828042}, "corpusId": 245828042, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d602137d38d4fad9e6db07d911fbf3551894d441", "title": "Deep Learning for Predictive Analytics in Reversible Steganography", "abstract": "Deep learning is regarded as a promising solution for reversible steganography. The recent development of end-toend learning has made it possible to bypass multiple intermediate stages of steganographic operations with a pair of encoder and decoder neural networks. This framework is, however, incapable of guaranteeing perfect reversibility since it is difficult for this kind of monolithic machinery, in the form of a black box, to learn the intricate logics of reversible computing. A more reliable way to develop a learning-based reversible steganographic scheme is through a divide-and-conquer paradigm. Predictionerror modulation is a well-established modular framework that consists of an analytics module and a coding module. The former serves the purpose of analysing pixel correlations and predicting pixel intensities, while the latter specialises in reversible coding mechanisms. Given that reversibility is governed independently by the coding module, we narrow our focus to the incorporation of neural networks into the analytics module. The objective of this study is to evaluate the impacts of different training configurations on predictive neural networks and to provide practical insights. Context-aware pixel intensity prediction has a central role in reversible steganography and can be perceived as a lowlevel computer vision task. Therefore, instead of reinventing the wheel, we can adopt neural network models originally designed for such computer vision tasks to perform intensity prediction. Furthermore, we rigorously investigate the effect of intensity initialisation upon predictive performance and the influence of distributional shift in dual-layer prediction. Experimental results show that state-of-the-art steganographic performance can be achieved with advanced neural network models.", "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-13", "journal": null, "authors": [{"authorId": "4020249", "name": "Ching-Chun Chang"}, {"authorId": "2108601214", "name": "Xu Wang"}, {"authorId": "2111637781", "name": "Sisheng Chen"}, {"authorId": "1678602", "name": "I. Echizen"}, {"authorId": "153618912", "name": "Victor Sanchez"}, {"authorId": "2145403463", "name": "Chang-Tsun Li"}]}, {"paperId": "799074672e47b38af1fb9ef9004f42137d450b2e", "externalIds": {"MAG": "3169712958", "DOI": "10.5325/JAYNRANDSTUD.21.1.0056", "CorpusId": 235717686}, "corpusId": 235717686, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/799074672e47b38af1fb9ef9004f42137d450b2e", "title": "Mental Integrations as Functional Wholes", "abstract": "ABSTRACT:It is argued that a mental integration is formed only if the result is a functional whole. This idea is then used to clarify the definition of a concept and discuss problems in which an instance may belong to different conceptual classes depending on the context. The same idea is also applied to the rules for dealing with an entity when it is formed out of sub-entities. Specific examples of how such rules are frequently violated in literature as well as colloquially are discussed.", "venue": "", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-12", "journal": {"volume": "21", "pages": "56 - 64", "name": "Journal of Ayn Rand Studies"}, "authors": [{"authorId": "1420010330", "name": "Abhijeet Melkani"}]}, {"paperId": "707145c14635577826fe97a9367235034c88bc2e", "externalIds": {"DOI": "10.31122/sinefilozofi.810857", "CorpusId": 245366573}, "corpusId": 245366573, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/707145c14635577826fe97a9367235034c88bc2e", "title": "Yapay Zek\u00e2 D\u00fcalizminde \u00d6zbilin\u00e7lilik Halinin Varl\u0131\u011f\u0131 ve Y\u0131k\u0131m\u0131 \u00dczerine", "abstract": null, "venue": "SineFilozofi", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-06-11", "journal": {"name": "SineFilozofi"}, "authors": [{"authorId": "1581773959", "name": "Mehmet Ali Sevimli"}, {"authorId": "108555493", "name": "M. Serarslan"}]}, {"paperId": "d65cd36a5e4a03d5bb7f9a8a62034762062f88de", "externalIds": {"DOI": "10.1007/s00129-021-04811-7", "CorpusId": 235398761}, "corpusId": 235398761, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d65cd36a5e4a03d5bb7f9a8a62034762062f88de", "title": "K\u00fcnstliche Intelligenz \u2013 ein Mythos des 21. Jahrhunderts?", "abstract": null, "venue": "Der Gyn\u00e4kologe", "year": 2021, "referenceCount": 24, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-06-11", "journal": {"volume": "54", "pages": "471 - 475", "name": "Der Gyn\u00e4kologe"}, "authors": [{"authorId": "39139942", "name": "W. Zimmerli"}]}, {"paperId": "43337d43b30ab1f666e4b3f373e7aba36e867673", "externalIds": {"MAG": "3162994603", "DOI": "10.1080/13614533.2021.1930076", "CorpusId": 236309100}, "corpusId": 236309100, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43337d43b30ab1f666e4b3f373e7aba36e867673", "title": "Views of Academic Library Directors on Artificial Intelligence: A Representative Survey in Hungary", "abstract": "Abstract Artificial intelligence (AI) is a defining technology of the 21st century, creating new opportunities for academic libraries. The goal of this paper is to provide a much-needed analysis, interpreted in an international context, on what the leaders of academic libraries in East-Central Europe, and specifically in Hungary, think about AI and its implementation in a library setting. The survey shows that according to library directors AI is more of an opportunity for academic libraries than a threat, and it could provide support in all areas of library operation, including digitising, information service, and education. Findings indicate that a quarter of the Hungarian academic libraries surveyed use AI-supported solutions, mostly in the areas of information retrieval and data processing. Using Rogers (The diffusion of innovations. 5th ed. The Free Press, 2003) diffusion of innovation model, it may be projected that an explosive growth is to be expected in the use of AI in libraries.", "venue": "New Review of Academic Librarianship", "year": 2021, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-06-10", "journal": {"volume": "28", "pages": "256 - 278", "name": "New Review of Academic Librarianship"}, "authors": [{"authorId": "122572547", "name": "B. Winkler"}, {"authorId": "108509737", "name": "P. Kiszl"}]}, {"paperId": "c6774515300d07888d6837e812d0c20c90060c5b", "externalIds": {"DOI": "10.1109/ICOEI51242.2021.9452971", "CorpusId": 235618357}, "corpusId": 235618357, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6774515300d07888d6837e812d0c20c90060c5b", "title": "Code Convertor-Binary to Uniform Minimal Switching Representation (UMSR)", "abstract": "The low-power arithmetic design has become a very important aspect for recent compact electronic gadgets. The need to minimize dynamic power dissipation is vital for combinational circuits. Switching activity is a vital reason for the dissipation of power in combinational circuits, which includes activities like spurious pulses, called glitches. Functional transition and glitch are two types of signal transitions. A glitch is an unnecessary, momentary error in the system before the signal reaches to the anticipated value. Before reaching a stable state, there can be changes in the state of the signal, called glitches. Every toggling causes dissipation of power as a result of charging and discharging of gate capacitance. In the proposed method i.e., uniform minimal switching decimal representation, the increase in the number of 1's serially there will be an increase in the current and hence there are no glitches compared to binary code, where a number of 1's increases at different places. This type of coding has high linearity performance by reducing the clock feed-through effect especially in switching between multiple transistors. In the proposed method, one can prove that uniform minimal switching decimal representation acts as a number system so that all arithmetic operations can be done. In this paper Implementation of UMSR (Uniform minimal switching representation also known as Thermometer code) is carried out using Field Programmable Gate Arrays (FPGA).", "venue": "2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-06-03", "journal": {"pages": "164-170", "name": "2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)"}, "authors": [{"authorId": "9234276", "name": "N. Samanvita"}, {"authorId": "36390491", "name": "Sudeep Shetty"}, {"authorId": "2114850858", "name": "Nagaraj M J"}]}, {"paperId": "d4f6ef636e16b001986b541aa2afc76eed42ae34", "externalIds": {"PubMedCentral": "8175735", "DOI": "10.1038/s41746-021-00464-x", "CorpusId": 235307275, "PubMed": "34083689"}, "corpusId": 235307275, "publicationVenue": {"id": "ef485645-f75f-4344-8b9d-3c260e69503b", "name": "npj Digital Medicine", "alternate_names": ["npj Digit Med"], "issn": "2398-6352", "url": "http://www.nature.com/npjdigitalmed/"}, "url": "https://www.semanticscholar.org/paper/d4f6ef636e16b001986b541aa2afc76eed42ae34", "title": "Considering the possibilities and pitfalls of Generative Pre-trained Transformer 3 (GPT-3) in healthcare delivery", "abstract": null, "venue": "npj Digital Medicine", "year": 2021, "referenceCount": 23, "citationCount": 24, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s41746-021-00464-x.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-03", "journal": {"volume": "4", "name": "NPJ Digital Medicine"}, "authors": [{"authorId": "6114730", "name": "Diane M. Korngiebel"}, {"authorId": "1712935", "name": "S. Mooney"}]}, {"paperId": "211c1b36c9873743b2d5c955a0823143cbd4e8fe", "externalIds": {"ArXiv": "2106.01288", "DBLP": "journals/corr/abs-2106-01288", "CorpusId": 235294049}, "corpusId": 235294049, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/211c1b36c9873743b2d5c955a0823143cbd4e8fe", "title": "Bottom-Up and Top-Down Neural Processing Systems Design: Neuromorphic Intelligence as the Convergence of Natural and Artificial Intelligence", "abstract": "While Moore\u2019s law has driven exponential computing power expectations, its nearing end calls for new avenues for improving the overall system performance. One of these avenues is the exploration of new alternative brain-inspired computing architectures that promise to achieve the flexibility and computational efficiency of biological neural processing systems. Within this context, neuromorphic intelligence represents a paradigm shift in computing based on the implementation of spiking neural network architectures tightly co-locating processing and memory. In this paper, we provide a comprehensive overview of the field, highlighting the different levels of granularity present in existing silicon implementations, comparing approaches that aim at replicating natural intelligence (bottom-up) versus those that aim at solving practical artificial intelligence applications (top-down), and assessing the benefits of the different circuit design styles used to achieve these goals. First, we present the analog, mixed-signal and digital circuit design styles, identifying the boundary between processing and memory through time multiplexing, in-memory computation and novel devices. Next, we highlight the key tradeoffs for each of the bottom-up and top-down approaches, survey their silicon implementations, and carry out detailed comparative analyses to extract design guidelines. Finally, we identify both necessary synergies and missing elements required to achieve a competitive advantage for neuromorphic edge computing over conventional machine-learning accelerators, and outline the key elements for a framework toward neuromorphic intelligence.", "venue": "ArXiv", "year": 2021, "referenceCount": 306, "citationCount": 15, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-02", "journal": {"volume": "abs/2106.01288", "name": "ArXiv"}, "authors": [{"authorId": "38613620", "name": "C. Frenkel"}, {"authorId": "3272827", "name": "D. Bol"}, {"authorId": "1721210", "name": "G. Indiveri"}]}, {"paperId": "b3d30dd72e7504331d9ed95edfbf2493358e6c9c", "externalIds": {"DBLP": "journals/aisy/BercoA21", "MAG": "3169448988", "DOI": "10.1002/aisy.202100025", "CorpusId": 236270717}, "corpusId": 236270717, "publicationVenue": {"id": "a03d184e-0f87-4242-aea8-2fb5c3179483", "name": "Advanced Intelligent Systems", "type": "journal", "alternate_names": ["Adv Intell Syst"], "issn": "2640-4567", "url": "https://onlinelibrary.wiley.com/journal/26404567"}, "url": "https://www.semanticscholar.org/paper/b3d30dd72e7504331d9ed95edfbf2493358e6c9c", "title": "Bioinspired Robotic Vision with Online Learning Capability and Rotation\u2010Invariant Properties", "abstract": "Reliable image perception is critical for living organisms. Biologic sensory organs and nervous systems evolved interdependently to allow apprehension of visual information regardless of spatial orientation. By contrast, convolutional neural networks usually have limited tolerance to rotational transformations. There are software\u2010based approaches used to address this issue, such as artificial rotation of training data or preliminary image processing. However, these workarounds require a large computational effort and are mostly done offline. This work presents a bioinspired, robotic vision system with inherent rotation\u2010invariant properties that may be taught either offline or in real time by feeding back error indications. It is successfully trained to counter the move of a human player in a game of Paper Scissors Stone. The architecture and operation principles are first discussed alongside the experimental setup. This is followed by performance analysis of pattern recognition under misaligned and rotated conditions. Finally, the process of online, supervised learning is demonstrated and analyzed.", "venue": "Advanced Intelligent Systems", "year": 2021, "referenceCount": 34, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/aisy.202100025", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-02", "journal": {"volume": "3", "name": "Advanced Intelligent Systems"}, "authors": [{"authorId": "46237159", "name": "D. Berco"}, {"authorId": "144204958", "name": "D. Ang"}]}, {"paperId": "7e1dd28b8fc6cb63d37c344abc02a1dd06bee70f", "externalIds": {"MAG": "3169673055", "DOI": "10.3390/JMSE9060612", "CorpusId": 236246530}, "corpusId": 236246530, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e1dd28b8fc6cb63d37c344abc02a1dd06bee70f", "title": "Use of Genetic Programming for the Estimation of CODLAG Propulsion System Parameters", "abstract": "In this paper, the publicly available dataset for the Combined Diesel-Electric and Gas (CODLAG) propulsion system was used to obtain symbolic expressions for estimation of fuel flow, ship speed, starboard propeller torque, port propeller torque, and total propeller torque using genetic programming (GP) algorithm. The dataset consists of 11,934 samples that were divided into training and testing portions in an 80:20 ratio. The training portion of the dataset which consisted of 9548 samples was used to train the GP algorithm to obtain symbolic expressions for estimation of fuel flow, ship speed, starboard propeller, port propeller, and total propeller torque, respectively. After the symbolic expressions were obtained the testing portion of the dataset which consisted of 2386 samples was used to measure estimation performance in terms of coefficient of correlation (R2) and Mean Absolute Error (MAE) metric, respectively. Based on the estimation performance in each case three best symbolic expressions were selected with and without decay state coefficients. From the conducted investigation, the highest R2 and lowest MAE values were achieved with symbolic expressions for the estimation of fuel flow, ship speed, starboard propeller torque, port propeller torque, and total propeller torque without decay state coefficients while symbolic expressions with decay state coefficients have slightly lower estimation performance.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2077-1312/9/6/612/pdf?version=1622627216", "status": null}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-02", "journal": {"volume": "9", "pages": "612", "name": "Journal of Marine Science and Engineering"}, "authors": [{"authorId": "100971349", "name": "N. An\u0111eli\u0107"}, {"authorId": "1397281869", "name": "Sandi Baressi Segota"}, {"authorId": "147321796", "name": "I. Lorencin"}, {"authorId": "5633004", "name": "I. Poljak"}, {"authorId": "94315279", "name": "V. Mrzljak"}, {"authorId": "145978031", "name": "Z. Car"}]}, {"paperId": "d1d2689d9da47a3545780e79f4542b98cdeadfde", "externalIds": {"MAG": "3169134790", "DOI": "10.30727/0235-1188-2021-64-1-102-115", "CorpusId": 236219533}, "corpusId": 236219533, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d1d2689d9da47a3545780e79f4542b98cdeadfde", "title": "Architectural Approach to Design of Emotional Intelligent Systems", "abstract": "Over the past decades, due to the course towards digitalization of all areas of life, interest in modeling and creating intelligent systems has increased significantly. However, there are now a stagnation in the industry, a lack of attention to analog and bionic approaches as alternatives to digital, numerous speculations on \u201cneuro\u201d issues for commercial and other purposes, and an increase in social and environmental risks. The article provides an overview of the development of artificial intelligence (AI) conceptions toward increasing the human likeness of machines: from the key ideas of A. Turing and J. von Neumann, who initiated the digitalization of society, to discussions about the definition of AI and the emergence of conceptions of strong and weak AI. Special attention is paid to the approach of A. Sloman, to ideas about the architecture and design of complex artificial systems are considered, which make it possible to \u201cemotionally\u201d expand the idea of weak/strong AI. In the article's section on the necessity and possibility of incorporating emotions into the architecture of AI, the authors reveal the goals and methodological limitations for creating an emotional artificial agent. In addition, the article briefly presents the main principles of the authors' architectural approach to the creation of emotional intellectual systems on the example of the cognitive-affective model of architecture, which allow modeling the impact of emotions on the cognitive processes involved in decision-making processes. The described architectural approach to modeling intelligent systems can be used as a conceptual basis for discussing and formulating a strategy for the development of neurocomputing, philosophy of artificial intelligence, and experimental philosophy, for developing innovative research programs, formulating and solving theoretical and methodological problems.", "venue": "Russian Journal of Philosophical Sciences", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-06-02", "journal": {"name": "Russian Journal of Philosophical Sciences"}, "authors": [{"authorId": "117496015", "name": "Alexandra V. Shiller"}, {"authorId": "88013883", "name": "O. Petrunya"}]}, {"paperId": "92cbd12f802363b5b31c1c9fbdb82a8126938931", "externalIds": {"DBLP": "journals/ais/Graham22", "MAG": "3170108245", "DOI": "10.1007/s00146-021-01228-7", "CorpusId": 236219723}, "corpusId": 236219723, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/92cbd12f802363b5b31c1c9fbdb82a8126938931", "title": "Discourse analysis of academic debate of ethics for AGI", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 87, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01228-7.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-02", "journal": {"volume": "37", "pages": "1519 - 1532", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2089380010", "name": "Ross Graham"}]}, {"paperId": "2669d1b0c858dcaf9e96e0eb30df54b1f16c4a7a", "externalIds": {"DBLP": "journals/ubiquity/Riley21a", "DOI": "10.1145/3459743", "CorpusId": 235689606}, "corpusId": 235689606, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2669d1b0c858dcaf9e96e0eb30df54b1f16c4a7a", "title": "Will machines ever think like humans?", "abstract": "What is \"human intelligence?\" What is thinking? What does it mean to \"think like a human?\" Is it possible for machines to display human intelligence, to think like humans? This article explores these questions, and gives a brief overview of some important features of the human brain, and how computer scientists are trying to simulate those features and their ability to \"think.\" The article answers some questions, but asks more---finishing with questions for readers to consider.", "venue": "Ubiquity", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3459743", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-01", "journal": {"volume": "2021", "pages": "1 - 26", "name": "Ubiquity"}, "authors": [{"authorId": "39914109", "name": "J. Riley"}]}, {"paperId": "2ec4478121e025e4a75f717788ea903d7094710c", "externalIds": {"MAG": "3170210134", "DOI": "10.1007/S10699-021-09799-W", "CorpusId": 236349491}, "corpusId": 236349491, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2ec4478121e025e4a75f717788ea903d7094710c", "title": "A New Definition of \u201cArtificial\u201d for Two Artificial Sciences", "abstract": null, "venue": "Foundations of Science", "year": 2021, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10699-021-09799-w.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-01", "journal": {"name": "Foundations of Science"}, "authors": [{"authorId": "39438795", "name": "F. Bianchini"}]}, {"paperId": "8989538ac21c85ec44f5f5f44ecf3a678e983682", "externalIds": {"PubMedCentral": "8227299", "DOI": "10.3390/mi12060665", "CorpusId": 235645231, "PubMed": "34204065"}, "corpusId": 235645231, "publicationVenue": {"id": "8ecc7f6b-513e-420d-9531-255b48a99a8a", "name": "Micromachines", "type": "journal", "issn": "2072-666X", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-165882", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-165882", "https://www.mdpi.com/journal/micromachines"]}, "url": "https://www.semanticscholar.org/paper/8989538ac21c85ec44f5f5f44ecf3a678e983682", "title": "Advancements in Microprocessor Architecture for Ubiquitous AI\u2014An Overview on History, Evolution, and Upcoming Challenges in AI Implementation", "abstract": "Artificial intelligence (AI) has successfully made its way into contemporary industrial sectors such as automobiles, defense, industrial automation 4.0, healthcare technologies, agriculture, and many other domains because of its ability to act autonomously without continuous human interventions. However, this capability requires processing huge amounts of learning data to extract useful information in real time. The buzz around AI is not new, as this term has been widely known for the past half century. In the 1960s, scientists began to think about machines acting more like humans, which resulted in the development of the first natural language processing computers. It laid the foundation of AI, but there were only a handful of applications until the 1990s due to limitations in processing speed, memory, and computational power available. Since the 1990s, advancements in computer architecture and memory organization have enabled microprocessors to deliver much higher performance. Simultaneously, improvements in the understanding and mathematical representation of AI gave birth to its subset, referred to as machine learning (ML). ML includes different algorithms for independent learning, and the most promising ones are based on brain-inspired techniques classified as artificial neural networks (ANNs). ANNs have subsequently evolved to have deeper and larger structures and are often characterized as deep neural networks (DNN) and convolution neural networks (CNN). In tandem with the emergence of multicore processors, ML techniques started to be embedded in a range of scenarios and applications. Recently, application-specific instruction-set architecture for AI applications has also been supported in different microprocessors. Thus, continuous improvement in microprocessor capabilities has reached a stage where it is now possible to implement complex real-time intelligent applications like computer vision, object identification, speech recognition, data security, spectrum sensing, etc. This paper presents an overview on the evolution of AI and how the increasing capabilities of microprocessors have fueled the adoption of AI in a plethora of application domains. The paper also discusses the upcoming trends in microprocessor architectures and how they will further propel the assimilation of AI in our daily lives.", "venue": "Micromachines", "year": 2021, "referenceCount": 144, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2072-666X/12/6/665/pdf?version=1623122173", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-06-01", "journal": {"volume": "12", "name": "Micromachines"}, "authors": [{"authorId": "48660997", "name": "F. Khan"}, {"authorId": "1721625", "name": "Muhammad Adeel Pasha"}, {"authorId": "1703323", "name": "S. Masud"}]}, {"paperId": "d3fbac681fd87bad93e8b044ef4bc1dcfdd51e86", "externalIds": {"DOI": "10.2139/ssrn.3896463", "CorpusId": 236910962}, "corpusId": 236910962, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d3fbac681fd87bad93e8b044ef4bc1dcfdd51e86", "title": "The Role of Data for AI Startup Growth", "abstract": "Artificial intelligence (\u201cAI\u201d)-enabled products are expected to drive economic growth. Training data are important for firms developing AI-enabled products; without training data, firms cannot develop or refine their algorithms. This is particularly the case for AI startups developing new algorithms and products. However, there is no consensus in the literature on which aspects of training data are most important. Using unique survey data of AI startups, we find that startups with access to proprietary training data are more likely to acquire venture capital funding.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 63, "citationCount": 7, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://scholarship.law.bu.edu/cgi/viewcontent.cgi?article=2159&context=faculty_scholarship", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-06-01", "journal": {"name": "IO: Productivity"}, "authors": [{"authorId": "1951483", "name": "James Bessen"}, {"authorId": "1393239973", "name": "Stephen Michael Impink"}, {"authorId": "1393239966", "name": "Lydia Reichensperger"}, {"authorId": "2093183", "name": "Robert C. Seamans"}]}, {"paperId": "bd2fbd1743134234fe2a661d3326b2f6026108ae", "externalIds": {"DBLP": "journals/mima/Peregrin21", "DOI": "10.1007/s11023-021-09564-9", "CorpusId": 235915646}, "corpusId": 235915646, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/bd2fbd1743134234fe2a661d3326b2f6026108ae", "title": "Do Computers \"Have Syntax, But No Semantics\"?", "abstract": null, "venue": "Minds and Machines", "year": 2021, "referenceCount": 68, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-01", "journal": {"volume": "31", "pages": "305 - 321", "name": "Minds and Machines"}, "authors": [{"authorId": "2782750", "name": "J. Peregrin"}]}, {"paperId": "43e434618fbca87648856e67874dfec4b6e8611c", "externalIds": {"DBLP": "conf/cvpr/OlagueOJI21", "DOI": "10.1109/CVPRW53098.2021.00171", "CorpusId": 235666976}, "corpusId": 235666976, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43e434618fbca87648856e67874dfec4b6e8611c", "title": "Less is More: Pursuing the Visual Turing Test with the Kuleshov Effect", "abstract": "The Turing test centers on the idea that if a computer could trick a human into believing that it was human, then the machine was deemed to be intelligent or indistinguishable from people. Designing a visual Turing test involves recognizing objects and their relationships on images and creating a method to derive new concepts from the visual information. Until now, the proposed visual tests heavily use natural language processing to conduct the questionnaire or storytelling. We deviate from the mainstream, and we propose to reframe the visual Turing test through the Kuleshov effect to avoid written or spoken language. The idea resides on elucidating a method that creates the concept of montage synthetically. Like the first days of cinema, we would like to convey messages with the interpretation of image shots that a machine could decipher while comparing it with those scored by humans. The first implementation of this new test uses images from a psychology study where the circumplex model is applied to rate each image. We consider five deep learning methodologies and eight optimizers, and through semiotics, we derive an emotional state in the computer. The results are promising since we confirm that this version of the visual Turing test is challenging as a new research avenue.", "venue": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "year": 2021, "referenceCount": 36, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-06-01", "journal": {"pages": "1553-1561", "name": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"}, "authors": [{"authorId": "1721596", "name": "Gustavo Olague"}, {"authorId": "2125341066", "name": "Matthieu Olague"}, {"authorId": "2125335465", "name": "Angel R. Jacobo-Lopez"}, {"authorId": "1643930067", "name": "Gerardo Ibarra-V\u00e1zquez"}]}, {"paperId": "e49770180cc8e20aedff0237f367bedc00208c64", "externalIds": {"DBLP": "journals/eaai/Bhatnagar21", "MAG": "3158100292", "DOI": "10.1016/J.ENGAPPAI.2021.104241", "CorpusId": 235508027}, "corpusId": 235508027, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e49770180cc8e20aedff0237f367bedc00208c64", "title": "Competitive Optimality: A novel application in evaluating practical AI Systems", "abstract": null, "venue": "Eng. Appl. Artif. Intell.", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-01", "journal": {"volume": "102", "pages": "104241", "name": "Eng. Appl. Artif. Intell."}, "authors": [{"authorId": "47294631", "name": "Jayant Bhatnagar"}]}, {"paperId": "9983dd0b93d268c31cc821b9f4071372d191000e", "externalIds": {"ACL": "2021.naacl-main.386", "MAG": "3172931322", "DBLP": "conf/naacl/ZellersHCQFC21", "DOI": "10.18653/V1/2021.NAACL-MAIN.386", "CorpusId": 235097641}, "corpusId": 235097641, "publicationVenue": {"id": "01103732-3808-4930-b8e4-7e9e68d5c68d", "name": "North American Chapter of the Association for Computational Linguistics", "type": "conference", "alternate_names": ["North Am Chapter Assoc Comput Linguistics", "NAACL"], "url": "https://www.aclweb.org/portal/naacl"}, "url": "https://www.semanticscholar.org/paper/9983dd0b93d268c31cc821b9f4071372d191000e", "title": "TuringAdvice: A Generative and Dynamic Evaluation of Language Use", "abstract": "We propose TuringAdvice, a new challenge task and dataset for language understanding models. Given a written situation that a real person is currently facing, a model must generate helpful advice in natural language. Our evaluation framework tests a fundamental aspect of human language understanding: our ability to use language to resolve open-ended situations by communicating with each other. Empirical results show that today\u2019s models struggle at TuringAdvice, even multibillion parameter models finetuned on 600k in-domain training examples. The best model, T5, writes advice that is at least as helpful as human-written advice in only 14% of cases; a much larger non-finetunable GPT3 model does even worse at 4%. This low performance reveals language understanding errors that are hard to spot outside of a generative setting, showing much room for progress.", "venue": "North American Chapter of the Association for Computational Linguistics", "year": 2021, "referenceCount": 54, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://aclanthology.org/2021.naacl-main.386.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-06-01", "journal": {"pages": "4856-4880"}, "authors": [{"authorId": "2545335", "name": "Rowan Zellers"}, {"authorId": "14487640", "name": "Ari Holtzman"}, {"authorId": "40684993", "name": "Elizabeth Clark"}, {"authorId": "3444092", "name": "Lianhui Qin"}, {"authorId": "143787583", "name": "Ali Farhadi"}, {"authorId": "1699545", "name": "Yejin Choi"}]}, {"paperId": "3bc02208bcd58f664246e2387bc3b748118904d7", "externalIds": {"MAG": "3135766362", "DOI": "10.1016/J.RESCONREC.2021.105543", "CorpusId": 233545910}, "corpusId": 233545910, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3bc02208bcd58f664246e2387bc3b748118904d7", "title": "Computer Vision Based Two-stage Waste Recognition-Retrieval Algorithm for Waste Classification", "abstract": null, "venue": "", "year": 2021, "referenceCount": 42, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-01", "journal": {"volume": "169", "pages": "105543", "name": "Resources Conservation and Recycling"}, "authors": [{"authorId": "2108965373", "name": "Song Zhang"}, {"authorId": "2109307160", "name": "Yumiao Chen"}, {"authorId": "2047089622", "name": "Zhongliang Yang"}, {"authorId": "8727191", "name": "H. Gong"}]}, {"paperId": "be601131851e3be6a3aa613a97a33c9f0da2e25d", "externalIds": {"DOI": "10.1007/s10672-021-09377-z", "CorpusId": 254468095}, "corpusId": 254468095, "publicationVenue": {"id": "522c6f08-b7ab-460a-992d-0f7abeabfabe", "name": "Employee Responsibilities and Rights Journal", "type": "journal", "alternate_names": ["Empl Responsib Right J"], "issn": "0892-7545", "url": "https://link.springer.com/journal/10672"}, "url": "https://www.semanticscholar.org/paper/be601131851e3be6a3aa613a97a33c9f0da2e25d", "title": "Legal and Ethical Challenges for HR in Machine Learning", "abstract": null, "venue": "Employee Responsibilities and Rights Journal", "year": 2021, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-31", "journal": {"volume": "34", "pages": "19 - 39", "name": "Employee Responsibilities and Rights Journal"}, "authors": [{"authorId": "2059032485", "name": "R. H. Hamilton"}, {"authorId": "50196351", "name": "H. K. Davison"}]}, {"paperId": "33e5fe4fe223f2fb5cc87ec488daad6dce3edc7a", "externalIds": {"MAG": "3171468176", "DOI": "10.1007/S10672-021-09377-Z", "CorpusId": 236424673}, "corpusId": 236424673, "publicationVenue": {"id": "522c6f08-b7ab-460a-992d-0f7abeabfabe", "name": "Employee Responsibilities and Rights Journal", "type": "journal", "alternate_names": ["Empl Responsib Right J"], "issn": "0892-7545", "url": "https://link.springer.com/journal/10672"}, "url": "https://www.semanticscholar.org/paper/33e5fe4fe223f2fb5cc87ec488daad6dce3edc7a", "title": "Legal and Ethical Challenges for HR in Machine Learning", "abstract": null, "venue": "Employee Responsibilities and Rights Journal", "year": 2021, "referenceCount": 36, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-31", "journal": {"volume": "34", "pages": "19-39", "name": "Employee Responsibilities and Rights Journal"}, "authors": [{"authorId": "2059032485", "name": "R. H. Hamilton"}, {"authorId": "50196351", "name": "H. K. Davison"}]}, {"paperId": "d7d057ee6a9048b6e230c3e233432ab94d18c3e7", "externalIds": {"MAG": "3168957553", "DOI": "10.21810/JICW.V4I1.2566", "CorpusId": 236411724}, "corpusId": 236411724, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d7d057ee6a9048b6e230c3e233432ab94d18c3e7", "title": "Why HAL 9000 is not the future of intelligence analysis", "abstract": "Intelligence analysis is a core function of the intelligence process, and its goal is to synthesize reliable information to assist decision-makers to take a course of action toward an uncertain future. There is no escape from uncertainty, friction, and the fog of war. Since the dawn of human history, the present moment has been experienced as unpredictable, and the challenge of determining the right future through sound decisions has always existed. Investing in new technology, continually touted as the answer for analytic troubles, seems far less difficult in the short run than trying to find consensus about a long-term vision. It is easier to develop a nuclear missile, for example, than to give a universal definition of peace, and this is what the history of the XX century was all about. While intelligence analysis is still a necessary tool for decision-makers, it is unclear who or what will perform this function in the future. Though the solution cannot be only technological, the current trajectory tells a different story whereby the human analysts are removed from their central position to make way for Artificial Intelligence. What one can reasonably ask of an officer is that he should possess a standard of judgment, which he can gain only from knowledge of men and affairs and from common sense. Carl Von Clausewitz \u2013 On War HAL: Let me put it this way, Mr. Amor. The 9000 series is the most reliable computer ever made. No 9000 computer has ever made a mistake or distorted information. We are all, by any practical definition of the words, foolproof and incapable of error. Stanley Kubrick \u2013 2001 \u2013 A Space Odyssey", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.lib.sfu.ca/index.php/jicw/article/download/2566/2207", "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-31", "journal": {"volume": "4", "pages": "40-60", "name": ""}, "authors": [{"authorId": "113670294", "name": "G. Pili"}]}, {"paperId": "13bd12875db0785b9499de2714e49cdb4553ffbf", "externalIds": {"MAG": "3166684973", "DOI": "10.32628/CSEIT217382", "CorpusId": 236422298}, "corpusId": 236422298, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13bd12875db0785b9499de2714e49cdb4553ffbf", "title": "Review on Robotic Machine to Solve the Matrix with Natural Language Processing and Image Processing", "abstract": "As the world is moving faster, humans are not taking a step back to make the world more better place, may it be by enhanced technology or extreme creativity. We know that a human life now is full of technology and every little thing is just a click away that is the favour of automation for everything. If we explore Automation more, the major concepts which will still the spotlight are Artificial Intelligent (AI), Machine Learning (ML) and the list will continue. The other concept which steals the limelight and make every automation possible is the programming language we use to make the features we are now using possible. The language which is exponentially gaining fame is Python. If all the above mentioned technology is combined together, we get most of the automation possible today. At every corner of the world, this technology is being used to make things lively and possible. Not only companies but every industry (food, entertainment, education, manufacturers and many more) are relying on this technology. The calculation which plays a significant role in almost every bit is also being automated to make the things very simpler and quicker. Even though, we have calculator but it still cannot solve the problems which are needed to be solve in some platforms. In this paper, we shall be discussing about a similar concept.", "venue": "International Journal of Scientific Research in Computer Science, Engineering and Information Technology", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-05-30", "journal": {"name": "International Journal of Scientific Research in Computer Science, Engineering and Information Technology"}, "authors": [{"authorId": "134772948", "name": "Sonali Zunke"}, {"authorId": "2121165254", "name": "Sandesh Ukey"}, {"authorId": "2121198532", "name": "Dipak Mendhe"}]}, {"paperId": "8c9463950f8019368d6e6e6aa1dfe4b57262999b", "externalIds": {"DBLP": "journals/ccs/CrookC21", "MAG": "3169927403", "DOI": "10.1049/CCS2.12024", "CorpusId": 236402575}, "corpusId": 236402575, "publicationVenue": {"id": "f8692cd7-d4ba-496a-9fb5-c4b6dda9c6c8", "name": "Cognitive Computation and Systems", "type": "journal", "alternate_names": ["Cogn Comput Syst"], "issn": "2517-7567", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=8694204", "alternate_urls": ["https://digital-library.theiet.org/content/journals/ccs"]}, "url": "https://www.semanticscholar.org/paper/8c9463950f8019368d6e6e6aa1dfe4b57262999b", "title": "The Anatomy of moral agency: A theological and neuroscience inspired model of virtue ethics", "abstract": "VirtuosA (\u2018virtuous algorithm\u2019) is introduced, a model in which artificial intelligence (AI) systems learn ethical behaviour based on a framework adapted from Christian philosopher Dallas Willard and brought together with associated neurobiological structures and broader systems thinking. To make the inquiry concrete, the authors present a simple example scenario that illustrates how a robot might acquire behaviour akin to the virtue of kindness that can be attributed to humans. References to philosophical work by Peter Sloterdijk help contextualise Willard\u2019s virtue ethics framework. The VirtuosA architecture can be implemented using state \u2010 of \u2010 the \u2010 art computing practices and plausibly redescribes several con-crete scenarios implemented from the computing literature and exhibits broad coverage relative to other work in ethical AI. Strategies are described for using the model for systems evaluation \u2014particularly the role of \u2018embedded evaluation\u2019 within the system\u2014and its broader application as a meta \u2010 ethical device is discussed.", "venue": "Cognitive Computation and Systems", "year": 2021, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://radar.brookes.ac.uk/radar/file/13b5f863-c37d-497c-a427-a5eb68b65f35/1/ccs2.12024.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-30", "journal": {"volume": "3", "pages": "109-122", "name": "Cogn. Comput. Syst."}, "authors": [{"authorId": "143902642", "name": "N. Crook"}, {"authorId": "1829225", "name": "J. Corneli"}]}, {"paperId": "c435bf5339e882ac4a1b578e7c43e6680e2ddcd2", "externalIds": {"DOI": "10.1016/j.aca.2021.338403", "CorpusId": 233398983, "PubMed": "33896558"}, "corpusId": 233398983, "publicationVenue": {"id": "7a81d01c-ee3f-4f27-b696-01f35da67f22", "name": "Analytica Chimica Acta", "type": "journal", "alternate_names": ["Anal Chim Acta"], "issn": "0003-2670", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/502681/description#description", "alternate_urls": ["http://www.elsevier.com/wps/product/cws_home/502681", "http://www.sciencedirect.com/science/journal/00032670"]}, "url": "https://www.semanticscholar.org/paper/c435bf5339e882ac4a1b578e7c43e6680e2ddcd2", "title": "Taking the leap between analytical chemistry and artificial intelligence: A tutorial review.", "abstract": null, "venue": "Analytica Chimica Acta", "year": 2021, "referenceCount": 213, "citationCount": 35, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-05-29", "journal": {"volume": "1161", "pages": "\n 338403\n ", "name": "Analytica chimica acta"}, "authors": [{"authorId": "1854804642", "name": "Lucas B Ayres"}, {"authorId": "14202912", "name": "F. Gomez"}, {"authorId": "153882913", "name": "Jeb Linton"}, {"authorId": "77218025", "name": "M. F. Silva"}, {"authorId": "67013943", "name": "Carlos D. Garcia"}]}, {"paperId": "27bd1862d6656327890fef4f295345ea5f4ac1fd", "externalIds": {"MAG": "3162926692", "DOI": "10.1002/pssr.202100125", "CorpusId": 236362886}, "corpusId": 236362886, "publicationVenue": {"id": "c6360017-172c-488c-b990-d092fbdd065e", "name": "Physica Status Solidi (a)", "type": "journal", "alternate_names": ["Phys Status Solidus (a"]}, "url": "https://www.semanticscholar.org/paper/27bd1862d6656327890fef4f295345ea5f4ac1fd", "title": "Multistate Magnetic Domain Wall Devices for Neuromorphic Computing", "abstract": "In recent years, neuromorphic computing has been intensively investigated, to take over the conventional or von Neumann scheme. Herein, the advantages of memristors as neurons and synapses are discussed. After a brief introduction to biological neurons and synapses, focus is put on spin\u2010based devices, including magnetic tunnel junction (MTJ) and domain wall devices. Certain materials and device designs aim at mimicking synapses\u2019 functionality, whereas others gather both neurons and synapses. The advancements in spin\u2010based memory applications are of great advantage for neuromorphic computing and their implementation is presented herein.", "venue": "Physica Status Solidi (a)", "year": 2021, "referenceCount": 95, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-27", "journal": {"volume": "15", "name": "physica status solidi (RRL) \u2013 Rapid Research Letters"}, "authors": [{"authorId": "5644942", "name": "R. Sbiaa"}]}, {"paperId": "5d1311d43086a9abc01e3faa94da9f126402079b", "externalIds": {"MAG": "3168055587", "DOI": "10.1002/wat2.1533", "CorpusId": 236340567}, "corpusId": 236340567, "publicationVenue": {"id": "c869678a-e697-4742-9f17-3a28324360d7", "name": "WIREs Water", "type": "journal", "alternate_names": ["Wire Water", "Wiley Interdisciplinary Reviews: Water", "Wiley Interdiscip Rev Water"], "issn": "2049-1948", "url": "http://onlinelibrary.wiley.com/doi/10.1002/wat2.2014.1.issue-1/issuetoc", "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2049-1948/issues", "https://onlinelibrary.wiley.com/journal/20491948", "http://wires.wiley.com/WileyCDA/WiresJournal/wisId-WAT2.html"]}, "url": "https://www.semanticscholar.org/paper/5d1311d43086a9abc01e3faa94da9f126402079b", "title": "Machine learning for hydrologic sciences: An introductory overview", "abstract": "The hydrologic community has experienced a surge in interest in machine learning in recent years. This interest is primarily driven by rapidly growing hydrologic data repositories, as well as success of machine learning in various academic and commercial applications, now possible due to increasing accessibility to enabling hardware and software. This overview is intended for readers new to the field of machine learning. It provides a non\u2010technical introduction, placed within a historical context, to commonly used machine learning algorithms and deep learning architectures. Applications in hydrologic sciences are summarized next, with a focus on recent studies. They include the detection of patterns and events such as land use change, approximation of hydrologic variables and processes such as rainfall\u2010runoff modeling, and mining relationships among variables for identifying controlling factors. The use of machine learning is also discussed in the context of integrated with process\u2010based modeling for parameterization, surrogate modeling, and bias correction. Finally, the article highlights challenges of extrapolating robustness, physical interpretability, and small sample size in hydrologic applications.", "venue": "WIREs Water", "year": 2021, "referenceCount": 228, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-05-27", "journal": {"volume": "8", "name": "Wiley Interdisciplinary Reviews: Water"}, "authors": [{"authorId": "2569873", "name": "Tianfang Xu"}, {"authorId": "34212044", "name": "F. Liang"}]}, {"paperId": "61b265b5a07bb563c2072e20ba22d3b9cdb95bc0", "externalIds": {"DBLP": "journals/ais/MontemayorHF22", "PubMedCentral": "8149918", "DOI": "10.1007/s00146-021-01230-z", "CorpusId": 235212774, "PubMed": "34054228"}, "corpusId": 235212774, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/61b265b5a07bb563c2072e20ba22d3b9cdb95bc0", "title": "In principle obstacles for empathic AI: why we can\u2019t replace human empathy in healthcare", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 30, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01230-z.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-26", "journal": {"volume": "37", "pages": "1353 - 1359", "name": "Ai & Society"}, "authors": [{"authorId": "144520696", "name": "Carlos Montemayor"}, {"authorId": "114115029", "name": "J. Halpern"}, {"authorId": "30203426", "name": "A. Fairweather"}]}, {"paperId": "73e80d83569326b15bbe75b1963b327fd7db18b9", "externalIds": {"MAG": "3169223448", "DOI": "10.3390/APP11114853", "CorpusId": 236331947}, "corpusId": 236331947, "publicationVenue": {"id": "136edf8d-0f88-4c2c-830f-461c6a9b842e", "name": "Applied Sciences", "type": "journal", "alternate_names": ["Appl Sci"], "issn": "2076-3417", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217814", "alternate_urls": ["http://www.mathem.pub.ro/apps/", "https://www.mdpi.com/journal/applsci", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217814"]}, "url": "https://www.semanticscholar.org/paper/73e80d83569326b15bbe75b1963b327fd7db18b9", "title": "Contextual Information Helps Understand Messages Written with Textisms", "abstract": "The present study investigated the influence of the use of textisms, a form of written language used in phone-mediated conversations, on the cognitive cost of French participants in an online conversation. Basing our thinking on the relevance theory of Sperber and Wilson, we tried to assess whether knowing the context and topic of a conversation can produce a significant decrease in the cognitive cost required to read messages written in textism by giving additional clues to help infer the meaning of these messages. In order to do so, participants played the judges in a Turing test between a normal conversation (written with the traditional writing style) and a conversation in which the experimenter was conversing with textisms, in a random order. The results indicated that participants answered messages written in textism faster when they were in the second conversation. We concluded that prior knowledge about the conversation can help interpret the messages written in textisms by decreasing the cognitive cost required to infer their meaning.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-3417/11/11/4853/pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-25", "journal": {"volume": "11", "pages": "4853", "name": "Applied Sciences"}, "authors": [{"authorId": "51197903", "name": "Baptiste Jacquet"}, {"authorId": "2120875336", "name": "Caline Jaraud"}, {"authorId": "47778763", "name": "Frank Jamet"}, {"authorId": "6617893", "name": "S. Gu\u00e9raud"}, {"authorId": "1779633", "name": "Jean Baratgin"}]}, {"paperId": "33ee7e223680001cda57ecf313eb6b07d86c92ef", "externalIds": {"MAG": "3164280995", "DOI": "10.1080/00423114.2021.1930070", "CorpusId": 236391220}, "corpusId": 236391220, "publicationVenue": {"id": "067c4376-ef7c-402d-adff-70aa4b036a53", "name": "Vehicle System Dynamics", "type": "journal", "alternate_names": ["Veh Syst Dyn"], "issn": "0042-3114", "url": "http://www.tandfonline.com/doi/abs/10.1080/00423114.2014.889317", "alternate_urls": ["http://www.tandfonline.com/toc/nvsd20/current"]}, "url": "https://www.semanticscholar.org/paper/33ee7e223680001cda57ecf313eb6b07d86c92ef", "title": "Identification and modelling of race driving styles", "abstract": "A good understanding and modelling of the human driver is essential for modern vehicle development, particularly in motorsports, where the race car should fit its driver perfectly. At the same time, an objective assessment and especially imitation of professional race drivers is difficult due to individual driving styles, complex and non-deterministic decision making processes, and small stability margins. In this paper, we present a holistic approach to identify and model individual race driving styles in a robust way. We develop the Driver Identification and Metric Ranking Algorithm (DIMRA) as a data-based method for an in-depth objective analysis and assessment of professional race drivers. Supported by this knowledge, we extend and adapt the imitation learning framework Probabilistic Modeling of Driver Behavior (ProMoD) in order to model race drivers in a complex simulation environment. An evaluation with data from professional race drivers shows the capability of DIMRA to derive metrics which describe human race driving styles, as well as ProMoD to robustly generate competitive laps with human-like controls in a professional motorsport driving simulator. The ability to identify and imitate individual driving styles does not only support the performance optimisation of race cars but could also aid the development of road cars and driver assistance systems in future work.", "venue": "Vehicle System Dynamics", "year": 2021, "referenceCount": 28, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-25", "journal": {"volume": "60", "pages": "2890 - 2918", "name": "Vehicle System Dynamics"}, "authors": [{"authorId": "1490762849", "name": "Stefan L\u00f6ckel"}, {"authorId": "2121112191", "name": "Andr\u00e9 Kretschi"}, {"authorId": "2095574518", "name": "Peter van Vliet"}, {"authorId": "145197867", "name": "Jan Peters"}]}, {"paperId": "ace5e1d171f80181cd3fdecccd88d6a0ab89e0e0", "externalIds": {"DBLP": "journals/corr/abs-2105-11977", "CorpusId": 235186970}, "corpusId": 235186970, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ace5e1d171f80181cd3fdecccd88d6a0ab89e0e0", "title": "Towards Teachable Autonomous Agents", "abstract": "Autonomous discovery and direct instruction are two extreme sources of learning in children, but educational sciences have shown that intermediate approaches such as assisted discovery or guided play resulted in better acquisition of skills. When turning to Artificial Intelligence, the above dichotomy can be translated into the distinction between autonomous agents, which learn in isolation from their own signals, and interactive learning agents which can be taught by social partners but generally lack autonomy. In between should stand teachable autonomous agents: agents that learn from both internal and teaching signals to benefit from the higher efficiency of assisted discovery processes. Designing such agents could result in progress in two ways. First, very concretely, it would offer a way to non-expert users in the real world to drive the learning behavior of agents towards their expectations. Second, more fundamentally, it might be a key step to endow agents with the necessary capabilities to reach general intelligence. The purpose of this paper is to elucidate the key obstacles standing in the way towards the design of such agents. We proceed in four steps. First, we build on a seminal work of Bruner to extract relevant features of the assisted discovery processes happening between a child and a tutor. Second, we highlight how current research on intrinsically motivated agents is paving the way towards teachable and autonomous agents. In particular, we focus on autotelic agents, i.e. agents equipped with forms of intrinsic motivations that enable them to represent, self-generate and pursue their own goals. We argue that such autotelic capabilities from the learner side are key in the discovery process. Third, we adopt a social learning perspective on the interaction between a tutor and a learner to highlight some components that are currently missing to these agents before they can be taught by ordinary people using natural pedagogy. Finally, we provide a list of specific research questions that emerge from the perspective of extending these agents with assisted learning capabilities.", "venue": "ArXiv", "year": 2021, "referenceCount": 184, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "abs/2105.11977", "name": "ArXiv"}, "authors": [{"authorId": "97009622", "name": "Olivier Sigaud"}, {"authorId": "2105163700", "name": "Hugo Caselles-Dupr'e"}, {"authorId": "102281182", "name": "C\u00e9dric Colas"}, {"authorId": "1748962255", "name": "Ahmed Akakzia"}, {"authorId": "1720664", "name": "P. Oudeyer"}, {"authorId": "1680828", "name": "M. Chetouani"}]}, {"paperId": "11542e0d7dc0de8af1bde32131400ccc2a0a2815", "externalIds": {"ArXiv": "2105.11977", "DOI": "10.1109/tcds.2022.3231731", "CorpusId": 247155190}, "corpusId": 247155190, "publicationVenue": {"id": "f35f148a-0a3c-45db-b610-3d89e09ddf21", "name": "IEEE Transactions on Cognitive and Developmental Systems", "type": "journal", "alternate_names": ["IEEE Trans Cogn Dev Syst"], "issn": "2379-8920", "url": "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=7274989"}, "url": "https://www.semanticscholar.org/paper/11542e0d7dc0de8af1bde32131400ccc2a0a2815", "title": "Towards Teachable Autotelic Agents", "abstract": "Autonomous discovery and direct instruction are two distinct sources of learning in children but education sciences demonstrate that mixed approaches such as assisted discovery or guided play result in improved skill acquisition. In the field of Artificial Intelligence, these extremes respectively map to autonomous agents learning from their own signals and interactive learning agents fully taught by their teachers. In between should stand teachable autonomous agents (TAA): agents that learn from both internal and teaching signals to benefit from the higher efficiency of assisted discovery. Designing such agents will enable real-world non-expert users to orient the learning trajectories of agents towards their expectations. More fundamentally, this may also be a key step to build agents with human-level intelligence. This paper presents a roadmap towards the design of teachable autonomous agents. Building on developmental psychology and education sciences, we start by identifying key features enabling assisted discovery processes in child-tutor interactions. This leads to the production of a checklist of features that future TAAs will need to demonstrate. The checklist allows us to precisely pinpoint the various limitations of current reinforcement learning agents and to identify the promising first steps towards TAAs. It also shows the way forward by highlighting key research directions towards the design or autonomous agents that can be taught by ordinary people via natural pedagogy.", "venue": "IEEE Transactions on Cognitive and Developmental Systems", "year": 2021, "referenceCount": 132, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2105.11977", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-25", "journal": {"name": "IEEE Transactions on Cognitive and Developmental Systems"}, "authors": [{"authorId": "97009622", "name": "Olivier Sigaud"}, {"authorId": "1748962255", "name": "Ahmed Akakzia"}, {"authorId": "2105163700", "name": "Hugo Caselles-Dupr'e"}, {"authorId": "102281182", "name": "C\u00e9dric Colas"}, {"authorId": "1720664", "name": "P. Oudeyer"}, {"authorId": "1680828", "name": "M. Chetouani"}]}, {"paperId": "9d738b480f4f3dec46bb58521c672b9373911e4e", "externalIds": {"PubMedCentral": "8149775", "DOI": "10.1186/s11671-021-03551-w", "CorpusId": 235173606, "PubMed": "34032946"}, "corpusId": 235173606, "publicationVenue": {"id": "3b4318be-4c22-4344-b624-b649afcaa297", "name": "Nanoscale Research Letters", "type": "journal", "alternate_names": ["Nanoscale Res Lett"], "issn": "1556-276X", "url": "http://www.nanoscalereslett.com/", "alternate_urls": ["http://www.springer.com/materials/nanotechnology/journal/11671", "http://www.nanoscalereslett.com/content", "https://nanoscalereslett.springeropen.com/", "https://link.springer.com/journal/11671", "https://nanoscalereslett.springeropen.com"]}, "url": "https://www.semanticscholar.org/paper/9d738b480f4f3dec46bb58521c672b9373911e4e", "title": "2D Semiconductor Nanomaterials and Heterostructures: Controlled Synthesis and Functional Applications", "abstract": null, "venue": "Nanoscale Research Letters", "year": 2021, "referenceCount": 202, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-05-25", "journal": {"volume": "16", "name": "Nanoscale Research Letters"}, "authors": [{"authorId": "47995337", "name": "Hongyan Xu"}, {"authorId": "47202279", "name": "M. Akbari"}, {"authorId": "5561281", "name": "S. Zhuiykov"}]}, {"paperId": "634345dba75c2740fe1595c9814d69e601223090", "externalIds": {"DBLP": "journals/complexity/ChaoTW21", "DOI": "10.1155/2021/5511866", "CorpusId": 235496227}, "corpusId": 235496227, "publicationVenue": {"id": "8bc59e8b-e251-4201-839a-ec83ae78859d", "name": "Complex", "type": "conference", "alternate_names": ["Int Conf Complex Sci", "International Conference on Complex Sciences"], "issn": "0806-1912", "alternate_issns": ["1538-6848"], "url": "http://wo.uio.no/as/WebObjects/nettlogg.woa/1/wa/logg?logg=5904", "alternate_urls": ["http://www.wikicfp.com/cfp/program?id=545", "https://www.complex.com/"]}, "url": "https://www.semanticscholar.org/paper/634345dba75c2740fe1595c9814d69e601223090", "title": "Emerging Technologies of Natural Language-Enabled Chatbots: A Review and Trend Forecast Using Intelligent Ontology Extraction and Patent Analytics", "abstract": "Natural language processing (NLP) is a critical part of the digital transformation. NLP enables user-friendly interactions between machine and human by making computers understand human languages. Intelligent chatbot is an essential application of NLP to allow understanding of users\u2019 utterance and responding in understandable sentences for specific applications simulating human-to-human conversations and interactions for problem solving or Q&As. This research studies emerging technologies for NLP-enabled intelligent chatbot development using a systematic patent analytic approach. Some intelligent text-mining techniques are applied, including document term frequency analysis for key terminology extractions, clustering method for identifying the subdomains, and Latent Dirichlet Allocation for finding the key topics of patent set. This research utilizes the Derwent Innovation database as the main source for global intelligent chatbot patent retrievals.", "venue": "Complex", "year": 2021, "referenceCount": 79, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/complexity/2021/5511866.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-24", "journal": {"volume": "2021", "pages": "5511866:1-5511866:26", "name": "Complex."}, "authors": [{"authorId": "121915306", "name": "M.-H. Chao"}, {"authorId": "1761458", "name": "A. Trappey"}, {"authorId": "2118840756", "name": "Chunwang Wu"}]}, {"paperId": "9fa54bdd98ea77950e1d666cb2e158caaff3c7ea", "externalIds": {"DOI": "10.1093/neuros/nyab170", "CorpusId": 235074752, "PubMed": "34015816"}, "corpusId": 235074752, "publicationVenue": {"id": "396750b3-c753-4765-b283-ca20a4ddd616", "name": "Neurosurgery", "type": "journal", "issn": "0148-396X", "url": "http://www.neurosurgery-online.com/"}, "url": "https://www.semanticscholar.org/paper/9fa54bdd98ea77950e1d666cb2e158caaff3c7ea", "title": "Machine Learning and Artificial Intelligence in Neurosurgery: Status, Prospects, and Challenges.", "abstract": "is the application of specific data-mining methods for pattern discovery and extraction.\u201d 55,56", "venue": "Neurosurgery", "year": 2021, "referenceCount": 95, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-20", "journal": {"name": "Neurosurgery"}, "authors": [{"authorId": "4523139", "name": "T. Dagi"}, {"authorId": "12620660", "name": "F. Barker"}, {"authorId": "3776554", "name": "J. Glass"}]}, {"paperId": "d95db65444615528fb56395a4bb01048570cc1cf", "externalIds": {"DBLP": "journals/corr/abs-2105-09637", "ArXiv": "2105.09637", "CorpusId": 234790236}, "corpusId": 234790236, "publicationVenue": {"id": "fc0a208c-acb7-47dc-a0d4-af8190e21d29", "name": "International Conference on Machine Learning", "type": "conference", "alternate_names": ["ICML", "Int Conf Mach Learn"], "url": "https://icml.cc/"}, "url": "https://www.semanticscholar.org/paper/d95db65444615528fb56395a4bb01048570cc1cf", "title": "Navigation Turing Test (NTT): Learning to Evaluate Human-Like Navigation", "abstract": "A key challenge on the path to developing agents that learn complex human-like behavior is the need to quickly and accurately quantify humanlikeness. While human assessments of such behavior can be highly accurate, speed and scalability are limited. We address these limitations through a novel automated Navigation Turing Test (ANTT) that learns to predict human judgments of human-likeness. We demonstrate the effectiveness of our automated NTT on a navigation task in a complex 3D environment. We investigate six classification models to shed light on the types of architectures best suited to this task, and validate them against data collected through a human NTT. Our best models achieve high accuracy when distinguishing true human and agent behavior. At the same time, we show that predicting finer-grained human assessment of agents\u2019 progress towards human-like behavior remains unsolved. Our work takes an important step towards agents that more effectively learn complex human-like behavior.", "venue": "International Conference on Machine Learning", "year": 2021, "referenceCount": 36, "citationCount": 11, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-05-20", "journal": {"pages": "2644-2653"}, "authors": [{"authorId": "1693696", "name": "Sam Devlin"}, {"authorId": "2099584262", "name": "Raluca Georgescu"}, {"authorId": "1990422", "name": "I. Momennejad"}, {"authorId": "1393020942", "name": "Jaroslaw Rzepecki"}, {"authorId": "2099584476", "name": "Evelyn Zuniga"}, {"authorId": "2099584169", "name": "Gavin Costello"}, {"authorId": "1882823652", "name": "Guy Leroy"}, {"authorId": "2052352179", "name": "A. Shaw"}, {"authorId": "1380228856", "name": "Katja Hofmann"}]}, {"paperId": "cf2a580f659e71e52b315eb89173d489cd23e710", "externalIds": {"MAG": "3162441579", "DBLP": "journals/firai/LinSDMBM21", "PubMedCentral": "8172185", "DOI": "10.3389/frobt.2021.579993", "CorpusId": 234773545, "PubMed": "34095237"}, "corpusId": 234773545, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cf2a580f659e71e52b315eb89173d489cd23e710", "title": "Parental Acceptance of Children\u2019s Storytelling Robots: A Projection of the Uncanny Valley of AI", "abstract": "Parent\u2013child story time is an important ritual of contemporary parenting. Recently, robots with artificial intelligence (AI) have become common. Parental acceptance of children\u2019s storytelling robots, however, has received scant attention. To address this, we conducted a qualitative study with 18 parents using the research technique design fiction. Overall, parents held mixed, though generally positive, attitudes toward children\u2019s storytelling robots. In their estimation, these robots would outperform screen-based technologies for children\u2019s story time. However, the robots\u2019 potential to adapt and to express emotion caused some parents to feel ambivalent about the robots, which might hinder their adoption. We found three predictors of parental acceptance of these robots: context of use, perceived agency, and perceived intelligence. Parents\u2019 speculation revealed an uncanny valley of AI: a nonlinear relation between the human likeness of the artificial agent\u2019s mind and affinity for the agent. Finally, we consider the implications of children\u2019s storytelling robots, including how they could enhance equity in children\u2019s access to education, and propose directions for research on their design to benefit family well-being.", "venue": "Frontiers in Robotics and AI", "year": 2021, "referenceCount": 147, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2021.579993/pdf", "status": null}, "fieldsOfStudy": ["Psychology", "Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-19", "journal": {"volume": "8", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "10203338", "name": "Chaolan Lin"}, {"authorId": "1746316", "name": "S. \u0160abanovi\u0107"}, {"authorId": "70072640", "name": "L. Dombrowski"}, {"authorId": "144126331", "name": "Andrew D. Miller"}, {"authorId": "145521690", "name": "Erin L. Brady"}, {"authorId": "1690354", "name": "K. Macdorman"}]}, {"paperId": "03c858ff9751cc33a4b32608a63fd310f5843d42", "externalIds": {"DBLP": "journals/aisy/ShafferDTSDNGIC21", "MAG": "3161538890", "DOI": "10.1002/aisy.202100016", "CorpusId": 236351018}, "corpusId": 236351018, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/03c858ff9751cc33a4b32608a63fd310f5843d42", "title": "Self\u2010Programming Synaptic Resistor Circuit for Intelligent Systems", "abstract": "Unlike artificial intelligent systems based on computers which have to be programmed for specific tasks, the human brain \u201cself\u2010programs\u201d in real time to create new tactics and adapt to arbitrary environments. Computers embedded in artificial intelligent systems execute arbitrary signal\u2010processing algorithms to outperform humans at specific tasks, but without the real\u2010time self\u2010programming functionality, they are preprogrammed by humans, fail in unpredictable environments beyond their preprogrammed domains, and lack general intelligence in arbitrary environments. Herein, a synaptic resistor circuit that self\u2010programs in arbitrary and unpredictable environments in real time is demonstrated. By integrating the synaptic signal processing, memory, and correlative learning functions in each synaptic resistor, the synaptic resistor circuit processes signals and self\u2010programs the circuit concurrently in real time with an energy efficiency about six orders higher than those of computers. In comparison with humans and a preprogrammed computer, the self\u2010programming synaptic resistor circuit dynamically modifies its algorithm to control a morphing wing in an unpredictable aerodynamic environment to improve its performance function with superior self\u2010programming speeds and accuracy. The synaptic resistor circuits potentially circumvent the fundamental limitations of computers, leading to a new intelligent platform with real\u2010time self\u2010programming functionality for artificial general intelligence.", "venue": "Adv. Intell. Syst.", "year": 2021, "referenceCount": 28, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/aisy.202100016", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-18", "journal": {"volume": "3", "name": "Advanced Intelligent Systems"}, "authors": [{"authorId": "2064587931", "name": "Christopher M. Shaffer"}, {"authorId": "2120970339", "name": "Atharva Deo"}, {"authorId": "1644001317", "name": "Andrew Tudor"}, {"authorId": "2120987164", "name": "Rahul Shenoy"}, {"authorId": "15893281", "name": "Cameron D. Danesh"}, {"authorId": "2120971756", "name": "Dhruva Nathan"}, {"authorId": "41021502", "name": "Lawren L. Gamble"}, {"authorId": "144878341", "name": "D. Inman"}, {"authorId": "2144257643", "name": "Yong Chen"}]}, {"paperId": "26daa0d1e8a6acc02843eac53342affb4e92bd2a", "externalIds": {"DOI": "10.1016/j.apergo.2021.103428", "CorpusId": 235093104, "PubMed": "34020096"}, "corpusId": 235093104, "publicationVenue": {"id": "8a6c2524-65bd-4b1b-a2c2-dba95e5d8c6a", "name": "Applied Ergonomics", "type": "journal", "alternate_names": ["Appl Ergon"], "issn": "0003-6870", "url": "https://www.journals.elsevier.com/applied-ergonomics/", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00036870"]}, "url": "https://www.semanticscholar.org/paper/26daa0d1e8a6acc02843eac53342affb4e92bd2a", "title": "What driving style makes pedestrians think a passing vehicle is driving automatically?", "abstract": null, "venue": "Applied Ergonomics", "year": 2021, "referenceCount": 42, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-18", "journal": {"volume": "95", "pages": "\n 103428\n ", "name": "Applied ergonomics"}, "authors": [{"authorId": "3056418", "name": "P. Bazilinskyy"}, {"authorId": "2061603581", "name": "Tsuyoshi Sakuma"}, {"authorId": "143801403", "name": "J. D. de Winter"}]}, {"paperId": "89507a5ae7d81ca25a93cd0dd2de93786d21cf0d", "externalIds": {"DBLP": "journals/corr/abs-2105-07426", "ArXiv": "2105.07426", "CorpusId": 234742327}, "corpusId": 234742327, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/89507a5ae7d81ca25a93cd0dd2de93786d21cf0d", "title": "Curiosity-driven Intuitive Physics Learning", "abstract": "Biological infants are naturally curious and try to comprehend their physical surroundings by interacting, in myriad multisensory ways, with different objects primarily macroscopic solid objects around them. Through their various interactions, they build hypotheses and predictions, and eventually learn, infer and understand the nature of the physical characteristics and behavior of these objects. Inspired thus, we propose a model for curiosity-driven learning and inference for real-world AI agents. This model is based on the arousal of curiosity, deriving from observations along discontinuities in the fundamental macroscopic solid-body physics parameters, i.e., shape constancy, spatial-temporal continuity, and object permanence. We use the term \u2019body-budget\u2019 to represent the perceived fundamental properties of solid objects. The model aims to support the emulation of learning from scratch followed by substantiation through experience, irrespective of domain, in real-world AI agents.", "venue": "ArXiv", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-16", "journal": {"volume": "abs/2105.07426", "name": "ArXiv"}, "authors": [{"authorId": "72260732", "name": "T. Gaikwad"}, {"authorId": "152803617", "name": "Romi Banerjee"}]}, {"paperId": "658e265dc2aacc8c03d9b9b3e8de732b3ba0a9dc", "externalIds": {"DOI": "10.1097/MOU.0000000000000888", "CorpusId": 234596003, "PubMed": "33989231"}, "corpusId": 234596003, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/658e265dc2aacc8c03d9b9b3e8de732b3ba0a9dc", "title": "Artificial intelligence in functional urology: how it may shape the future", "abstract": "Purpose of review The aim of the present manuscript is to provide an overview on the current state of artificial intelligence (AI) tools in either decision making, diagnosis, treatment options, or outcome prediction in functional urology. Recent findings Several recent studies have shed light on the promising potential of AI in functional urology to investigate lower urinary tract dysfunction pathophysiology but also as a diagnostic tool by enhancing the existing evaluations such as dynamic magnetic resonance imaging or urodynamics. AI may also improve surgical education and training because of its automated performance metrics recording. By bringing prediction models, AI may also have strong therapeutic implications in the field of functional urology in the near future. AI may also be implemented in innovative devices such as e-bladder diary and electromechanical artificial urinary sphincter and could facilitate the development of remote medicine. Summary Over the past decade, the enthusiasm for AI has been rising exponentially. Machine learning was well known, but the increasing power of processors and the amount of data available has provided the platform for deep learning tools to expand. Although the literature on the applications of AI technology in the field of functional urology is relatively sparse, its possible uses are countless especially in surgical training, imaging, urodynamics, and innovative devices.", "venue": "Current opinion in urology", "year": 2021, "referenceCount": 40, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-14", "journal": {"volume": "31", "pages": "385 - 390", "name": "Current Opinion in Urology"}, "authors": [{"authorId": "1392748237", "name": "I. Bentellis"}, {"authorId": "1654186457", "name": "S. Guerin"}, {"authorId": "23957166", "name": "Z. Khene"}, {"authorId": "3682535", "name": "R. Khavari"}, {"authorId": "7422423", "name": "B. Peyronnet"}]}, {"paperId": "277791b11911281e61ba5f03401222c40f4886a4", "externalIds": {"PubMedCentral": "8378075", "MAG": "3161861567", "DOI": "10.1093/ijnp/pyab026", "CorpusId": 234494831, "PubMed": "33987652"}, "corpusId": 234494831, "publicationVenue": {"id": "e69e74e9-9ff3-4fee-8a3d-2978095456ba", "name": "International Journal of Neuropsychopharmacology", "type": "journal", "alternate_names": ["The International Journal of Neuropsychopharmacology", "Int J Neuropsychopharmacol"], "issn": "1461-1457", "url": "https://firstsearch.oclc.org/", "alternate_urls": ["http://ijnp.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/277791b11911281e61ba5f03401222c40f4886a4", "title": "Psychedelics and Consciousness: Distinctions, Demarcations, and Opportunities", "abstract": "Abstract Psychedelic substances produce unusual and compelling changes in conscious experience that have prompted some to propose that psychedelics may provide unique insights explaining the nature of consciousness. At present, psychedelics, like other current scientific tools and methods, seem unlikely to provide information relevant to the so-called \u201chard problem of consciousness,\u201d which involves explaining how first-person experience can emerge. However, psychedelics bear on multiple \u201ceasy problems of consciousness,\u201d which involve relations between subjectivity, brain function, and behavior. In this review, we discuss common meanings of the term \u201cconsciousness\u201d when used with regard to psychedelics and consider some models of the effects of psychedelics on the brain that have also been associated with explanatory claims about consciousness. We conclude by calling for epistemic humility regarding the potential for psychedelic research to aid in explaining the hard problem of consciousness while pointing to ways in which psychedelics may advance the study of many specific aspects of consciousness.", "venue": "International Journal of Neuropsychopharmacology", "year": 2021, "referenceCount": 117, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/ijnp/article-pdf/24/8/615/39819038/pyab026.pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Psychology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-14", "journal": {"volume": "24", "pages": "615 - 623", "name": "International Journal of Neuropsychopharmacology"}, "authors": [{"authorId": "5363547", "name": "D. Yaden"}, {"authorId": "35226727", "name": "Matthew W. Johnson"}, {"authorId": "2789716", "name": "R. Griffiths"}, {"authorId": "7172865", "name": "Manoj K. Doss"}, {"authorId": "1401828924", "name": "A. Garcia-Romeu"}, {"authorId": "2033101427", "name": "Sandeep M. Nayak"}, {"authorId": "2092037431", "name": "Natalie Gukasayan"}, {"authorId": "3149724", "name": "B. Mathur"}, {"authorId": "2092040460", "name": "Fredrick S Barrett"}]}, {"paperId": "765f5486528b33b28b4852efa34a0be3e7e1212d", "externalIds": {"DBLP": "journals/corr/abs-2105-05571", "ArXiv": "2105.05571", "CorpusId": 234469842}, "corpusId": 234469842, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/765f5486528b33b28b4852efa34a0be3e7e1212d", "title": "\"Alexa, what do you do for fun?\" Characterizing playful requests with virtual assistants", "abstract": "Virtual assistants such as Amazon\u2019s Alexa, Apple\u2019s Siri, Google Home, and Microsoft\u2019s Cortana, are becoming ubiquitous in our daily lives and successfully help users in various daily tasks, such as making phone calls or playing music. Yet, they still struggle with playful utterances, which are not meant to be interpreted literally. Examples include jokes or absurd requests or questions such as, \u201cAre you afraid of the dark?\u201d, \u201cWho let the dogs out?\u201d, or \u201cOrder a zillion gummy bears\u201d. Today, virtual assistants often return irrelevant answers to such utterances, except for hard-coded ones addressed by canned replies. To address the challenge of automatically detecting playful utterances, we first characterize the different types of playful human-virtual assistant interaction. We introduce a taxonomy of playful requests rooted in theories of humor and refined by analyzing real-world traffic from Alexa. We then focus on one node, personification, where users refer to the virtual assistant as a person (\u201cWhat do you do for fun?\u201d). Our conjecture is that understanding such utterances will improve user experience with virtual assistants. We conducted a Wizard-of-Oz user study and showed that endowing virtual assistants with the ability to identify humorous opportunities indeed has the potential to increase user satisfaction. We hope this work will contribute to the understanding of the landscape of the problem and inspire novel ideas and techniques towards the vision of giving virtual assistants a sense of humor.", "venue": "ArXiv", "year": 2021, "referenceCount": 47, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": "abs/2105.05571", "name": "ArXiv"}, "authors": [{"authorId": "1683047517", "name": "Cheng Shani"}, {"authorId": "40484877", "name": "Alex Libov"}, {"authorId": "2091417320", "name": "Sofia Tolmach"}, {"authorId": "1402943721", "name": "L. Lewin-Eytan"}, {"authorId": "1781257", "name": "Y. Maarek"}, {"authorId": "1805894", "name": "Dafna Shahaf"}]}, {"paperId": "d67760e3284f5347df8e50091fe56265a038de49", "externalIds": {"MAG": "3161136656", "DOI": "10.1071/CH20371", "CorpusId": 236584086}, "corpusId": 236584086, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d67760e3284f5347df8e50091fe56265a038de49", "title": "The Future of Retrosynthesis and Synthetic Planning: Algorithmic, Humanistic or the Interplay?", "abstract": "\nThe practice of deploying and teaching retrosynthesis is on the cusp of considerable change, which in turn forces practitioners and educators to contemplate whether this impending change will advance or erode the efficiency and elegance of organic synthesis in the future. A short treatise is presented herein that covers the concept of retrosynthesis, along with exemplified methods and theories, and an attempt to comprehend the impact of artificial intelligence in an era when freely and commercially available retrosynthetic and forward synthesis planning programs are increasingly prevalent. Will the computer ever compete with human retrosynthetic design and the art of organic synthesis?\n", "venue": "Australian Journal of Chemistry", "year": 2021, "referenceCount": 219, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.publish.csiro.au/ch/pdf/CH20371", "status": null}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-12", "journal": {"name": "Australian Journal of Chemistry"}, "authors": [{"authorId": "20100359", "name": "Craig M. Williams"}, {"authorId": "121971161", "name": "M. Dallaston"}]}, {"paperId": "ac2b2a4bd5e3d9150bb3ef8a666ecfe27897cee0", "externalIds": {"DBLP": "journals/ccs/EagleLH21", "MAG": "3137887052", "DOI": "10.1049/CCS2.12018", "CorpusId": 236584434}, "corpusId": 236584434, "publicationVenue": {"id": "f8692cd7-d4ba-496a-9fb5-c4b6dda9c6c8", "name": "Cognitive Computation and Systems", "type": "journal", "alternate_names": ["Cogn Comput Syst"], "issn": "2517-7567", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=8694204", "alternate_urls": ["https://digital-library.theiet.org/content/journals/ccs"]}, "url": "https://www.semanticscholar.org/paper/ac2b2a4bd5e3d9150bb3ef8a666ecfe27897cee0", "title": "Questioning 'what makes us human': How audiences react to an artificial intelligence-driven show", "abstract": "I am Echoborg is promoted as \u2018a show created afresh each time by the audience in conversation with an artificial intelligence (AI)\u2019. The show demonstrates how AI in a creative and performance context can raise questions about the technology\u2019s ethical use for persuasion and compliance, and how humans can reclaim agency. This audience study focuses on a consecutive three\u2010night run in Bristol, UK in October 2019. The different outcomes of each show illustrate the unpredictability of audience interactions with conversational AI and how the collective dynamic of audience members shapes each performance. This study analyses how I am Echoborg facilitates audience cocreation in a live performance context, the show\u2019s capacity to provoke nuanced understandings of the potential for AI and the ability for intelligent technology to facilitate social interaction and group collaboration. This audience study demonstrates how the show inspires debate beyond binary conclusions (i.e. AI as good or bad) and how audiences can understand potential creative uses of AI, including as a tool for cocreating entertainment with (not just for) them.", "venue": "Cognitive Computation and Systems", "year": 2021, "referenceCount": 6, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ccs2.12018", "status": null}, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": "3", "pages": "91-99", "name": "Cogn. Comput. Syst."}, "authors": [{"authorId": "118758591", "name": "R. Eagle"}, {"authorId": "114938126", "name": "Rik Lander"}, {"authorId": "2055179299", "name": "Phil Hall"}]}, {"paperId": "d439c015ad2332a54cf479a6759fb2d7e2d16d19", "externalIds": {"MAG": "3162837094", "DOI": "10.18566/ESCR.V29N62.A09", "CorpusId": 236554329}, "corpusId": 236554329, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d439c015ad2332a54cf479a6759fb2d7e2d16d19", "title": "Ingenier\u00eda conceptual e innovaci\u00f3n te\u00f3rica: esbozo de un modelo", "abstract": "Todas las \u00e1reas del conocimiento se cimientan de diversas formas en una multiplicidad de productos derivados de la ingenier\u00eda conceptual. Este art\u00edculo tiene un esp\u00edritu program\u00e1tico: busca introducir un modelo del funcionamiento de la ingenier\u00eda conceptual y, en particular, de c\u00f3mo ocurre la innovaci\u00f3n conceptual en contextos de indagaci\u00f3n te\u00f3rica. En la primera secci\u00f3n, se describe el vecindario dial\u00e9ctico en que naci\u00f3 el estudio expl\u00edcito de la relevancia, el alcance, los mecanismos y los objetivos propios de la ingenier\u00eda conceptual. En la segunda secci\u00f3n, se introduce una distinci\u00f3n entre ingenier\u00eda conceptual evaluativa e ingenier\u00eda conceptual instrumental a partir de la distinci\u00f3n entre uso conceptual comprometido y uso conceptual instrumental. A partir de esto, se muestra que los casos descritos de ingenier\u00eda conceptual evaluativa y de ingenier\u00eda conceptual instrumental pueden ser formalmente entendidos como derivados de una misma funci\u00f3n, que, dado un problema conceptual, mapea soluciones conceptuales posibles para generar valores de \u00e9xito o de fracaso. En la siguiente secci\u00f3n, se introduce un tercer tipo de ingenier\u00eda conceptual: la ingenier\u00eda conceptual constructiva, cuyo n\u00facleo es una funci\u00f3n (de innovaci\u00f3n conceptual) que mapea soluciones dentro de un espacio representacional de alternativas no consideradas y genera nuevo contenido conceptual. El modelo introducido abre un campo fruct\u00edfero y novedoso de investigaci\u00f3n acerca de las condiciones y de los factores que dan lugar a la innovaci\u00f3n te\u00f3rica mediante la ingenier\u00eda conceptual.", "venue": "Escritos", "year": 2021, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistas.upb.edu.co/index.php/escritos/article/download/6998/6590", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-05-12", "journal": {"name": "Escritos"}, "authors": [{"authorId": "1405371534", "name": "C. Mu\u00f1oz-Su\u00e1rez"}]}, {"paperId": "5a74e329e99e70c44330feb1401fe6fb191f0bde", "externalIds": {"ArXiv": "2105.07879", "DBLP": "journals/corr/abs-2105-07879", "CorpusId": 234742567}, "corpusId": 234742567, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a74e329e99e70c44330feb1401fe6fb191f0bde", "title": "Conscious AI", "abstract": "Recent advances in artificial intelligence (AI) have achieved human-scale speed and accuracy for classification tasks. In turn, these capabilities have made AI a viable replacement for many human activities that at their core involve classification, such as basic mechanical and analytical tasks in low-level service jobs. Current systems do not need to be conscious to recognize patterns and classify them. 1 However, for AI to progress to more complicated tasks requiring intuition and empathy, it must develop capabilities such as metathinking, creativity, and empathy akin to human self-awareness or consciousness. We contend that such a paradigm shift is possible only through a fundamental shift in the state of artificial intelligence toward consciousness, a shift similar to what took place for humans through the process of natural selection and evolution. As such, this paper aims to theoretically explore the requirements for the emergence of consciousness in AI. It also provides a principled understanding of how conscious AI can be detected and how it might be manifested in contrast to the dominant paradigm that seeks to ultimately create machines that are linguistically indistinguishable from humans.", "venue": "ArXiv", "year": 2021, "referenceCount": 95, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": "abs/2105.07879", "name": "ArXiv"}, "authors": [{"authorId": "1696563", "name": "H. Esmaeilzadeh"}, {"authorId": "2129191", "name": "R. Vaezi"}]}, {"paperId": "8264e83ddadad58d2a728a0a72c2c687bfd964d1", "externalIds": {"DOI": "10.1016/j.radonc.2021.05.003", "CorpusId": 234495563, "PubMed": "33984348"}, "corpusId": 234495563, "publicationVenue": {"id": "3db0fe87-e29a-4f3f-b774-ef6ff67e6234", "name": "Radiotherapy and Oncology", "type": "journal", "alternate_names": ["Radiother Oncol"], "issn": "0167-8140", "url": "http://www.sciencedirect.com/science/journal/01678140"}, "url": "https://www.semanticscholar.org/paper/8264e83ddadad58d2a728a0a72c2c687bfd964d1", "title": "Metrics to evaluate the performance of auto-segmentation for radiation treatment planning: a critical review.", "abstract": null, "venue": "Radiotherapy and Oncology", "year": 2021, "referenceCount": 73, "citationCount": 44, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-05-10", "journal": {"name": "Radiotherapy and oncology : journal of the European Society for Therapeutic Radiology and Oncology"}, "authors": [{"authorId": "50584644", "name": "M. Sherer"}, {"authorId": "2092049425", "name": "D. Lin"}, {"authorId": "46433663", "name": "S. Elguindi"}, {"authorId": "50469532", "name": "S. Duke"}, {"authorId": "2448300", "name": "L. Tan"}, {"authorId": "3943093", "name": "J. Cacicedo"}, {"authorId": "4681781", "name": "M. Dahele"}, {"authorId": "145720720", "name": "E. Gillespie"}]}, {"paperId": "a39e88db75509ae36ffa66249107b53a48c39f86", "externalIds": {"DBLP": "journals/corr/abs-2105-03192", "ArXiv": "2105.03192", "DOI": "10.3233/AIC-201523", "CorpusId": 234093161}, "corpusId": 234093161, "publicationVenue": {"id": "4c57b6f2-ebab-420d-baf9-cd595e2f2a63", "name": "AI Communications", "type": "journal", "alternate_names": ["Ai Communications", "AI Commun", "Ai Commun"], "issn": "0921-7126", "url": "http://content.iospress.com/journals/ai-communications", "alternate_urls": ["https://www.iospress.nl/html/09217126.php", "https://www.iospress.nl/journal/ai-communications/"]}, "url": "https://www.semanticscholar.org/paper/a39e88db75509ae36ffa66249107b53a48c39f86", "title": "An interdisciplinary conceptual study of Artificial Intelligence (AI) for helping benefit-risk assessment practices: Towards a comprehensive qualification matrix of AI programs and devices (pre-print 2020)", "abstract": "This paper proposes a comprehensive analysis of existing concepts coming from different disciplines tackling the notion of intelligence, namely psychology and engineering, and from disciplines aiming to regulate AI innovations, namely AI ethics and law. The aim is to identify shared notions or discrepancies to consider for qualifying AI systems. Relevant concepts are integrated into a matrix intended to help defining more precisely when and how computing tools (programs or devices) may be qualified as AI while highlighting critical features to serve a specific technical, ethical and legal assessment of challenges in AI development. Some adaptations of existing notions of AI characteristics are proposed. The matrix is a risk-based conceptual model designed to allow an empirical, flexible and scalable qualification of AI technologies in the perspective of benefit-risk assessment practices, technological monitoring and regulatory compliance: it offers a structured reflection tool for stakeholders in AI development that are engaged in responsible research and innovation.Pre-print version (achieved on May 2020)", "venue": "AI Communications", "year": 2021, "referenceCount": 111, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03653205/file/AIC-201523-Revised-Accepted-final-HAL.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-07", "journal": {"volume": "34", "pages": "121-146", "name": "AI Commun."}, "authors": [{"authorId": "83902507", "name": "Gauthier Chassang"}, {"authorId": "48065141", "name": "M. Thomsen"}, {"authorId": "2339680", "name": "P. Rumeau"}, {"authorId": "1804438", "name": "F. S\u00e8des"}, {"authorId": "2089773203", "name": "Alejandra Delfin"}]}, {"paperId": "6f743678030331481bce59b4f9e5d49eb5eba534", "externalIds": {"DBLP": "conf/chi/KimRMY21", "MAG": "3015588689", "DOI": "10.1145/3411764.3445579", "CorpusId": 216327176}, "corpusId": 216327176, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6f743678030331481bce59b4f9e5d49eb5eba534", "title": "Designers Characterize Naturalness in Voice User Interfaces: Their Goals, Practices, and Challenges", "abstract": "This work investigates the practices and challenges of voice user interface (VUI) designers. Existing VUI design guidelines recommend that designers strive for natural human-agent conversation. However, the literature leaves a critical gap regarding how designers pursue naturalness in VUIs and what their struggles are in doing so. Bridging this gap is necessary for identifying designers\u2019 needs and supporting them. Our interviews with 20 VUI designers identified 12 ways that designers characterize and approach naturalness in VUIs. We categorized these characteristics into three groupings based on the types of conversational context that each characteristic contributes to: Social, Transactional, and Core. Our results contribute new findings on designers\u2019 challenges, such as a design dilemma in augmenting task-oriented VUIs with social conversations, difficulties in writing for spoken language, lack of proper tool support for imbuing synthesized voice with expressivity, and implications for developing design tools and guidelines.", "venue": "CHI", "year": 2021, "referenceCount": 177, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": "2021-05-06", "journal": {"name": "Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"}, "authors": [{"authorId": "16215166", "name": "Yelim Kim"}, {"authorId": "32206132", "name": "Mohi Reza"}, {"authorId": "1713735", "name": "J. McGrenere"}, {"authorId": "2055005", "name": "Dongwook Yoon"}]}, {"paperId": "7bf7b215932caf7f17239babc7656126c4743df2", "externalIds": {"MAG": "3158113682", "DOI": "10.1080/09585192.2021.1897643", "CorpusId": 235571128}, "corpusId": 235571128, "publicationVenue": {"id": "36c408a5-beb1-41d9-8465-e2d315332570", "name": "International journal of human resources management", "type": "journal", "alternate_names": ["Int j hum resour manag", "Int J Hum Resour Manag", "International Journal of Human Resource Management"], "issn": "2319-4936", "alternate_issns": ["0958-5192"], "url": "http://www.iaset.us/journals.php?id=34&jtype=2", "alternate_urls": ["http://www.tandfonline.com/loi/rijh20", "http://www.metapress.com/openurl.asp?genre=journal&issn=0958-5192", "http://www.catchword.com/rpsv/catchword/routledge/09585192/contp1-1.htm"]}, "url": "https://www.semanticscholar.org/paper/7bf7b215932caf7f17239babc7656126c4743df2", "title": "Humanoid robot adoption and labour productivity: a perspective on ambidextrous product innovation routines", "abstract": "Abstract The increasing presence of humanoid robot adoption has generated a change in explorative and exploitative routines. If the explorative routines provoke creativity and critical thinking which are delivered by humans, exploitative routines induce repetitive actions and mimic activities which are executed by humanoids. This has raised the need for a better balance between both routines involving an ambidextrous dynamic process. Here, product innovations play a relevant role in enhancing such balance and labour productivity. If, from the conceptual standpoint, this phenomenon has already been explored, there is still the need to empirically analyse it. We thus offer a meso-analysis of twenty-four countries located in Europe through the lens of the Service Robot Deployment (SRD) Model and the conceptual lens of organizational ambidexterity. By a regression methodology, the results show that humanoid robot adoption is still not affecting labour productivity which, by contrast, is positively and significantly connected with both radically new and marginally modified/unchanged production of innovative routines. Our original contribution, which falls in the field of Human Resources Management and Artificial Intelligence, is that humanoids are not directly impacting labour productivity but indirectly through the generation of both new and marginally modified (or unchanged) routines. This situation persuades senior leaders to achieve a balance between exploitative and explorative product innovation routines. Supplemental data for this article is available online at https://doi.org/10.1080/09585192.2021.1897643 .", "venue": "International journal of human resources management", "year": 2021, "referenceCount": 115, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-05", "journal": {"volume": "33", "pages": "1098 - 1124", "name": "The International Journal of Human Resource Management"}, "authors": [{"authorId": "1738694223", "name": "M. Del Giudice"}, {"authorId": "97494986", "name": "V. Scuotto"}, {"authorId": "143746794", "name": "L. Ballestra"}, {"authorId": "1793214", "name": "M. Pironti"}]}, {"paperId": "39692df948172a319ca33434f27c213d99d941a2", "externalIds": {"ArXiv": "2105.02704", "DBLP": "journals/corr/abs-2105-02704", "CorpusId": 233864437}, "corpusId": 233864437, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/39692df948172a319ca33434f27c213d99d941a2", "title": "AI Risk Skepticism", "abstract": "In this work, we survey skepticism regarding AI risk and show parallels with other types of scientific skepticism. We start by classifying different types of AI Risk skepticism and analyze their root causes. We conclude by suggesting some intervention approaches, which may be successful in reducing AI risk skepticism, at least amongst artificial intelligence researchers.", "venue": "ArXiv", "year": 2021, "referenceCount": 155, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-02", "journal": {"volume": "abs/2105.02704", "name": "ArXiv"}, "authors": [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "b780882adb7e806db2fb17ffcbd3cf9c5fde69a2", "externalIds": {"MAG": "3158235473", "DOI": "10.3390/APP11094151", "CorpusId": 235500143}, "corpusId": 235500143, "publicationVenue": {"id": "136edf8d-0f88-4c2c-830f-461c6a9b842e", "name": "Applied Sciences", "type": "journal", "alternate_names": ["Appl Sci"], "issn": "2076-3417", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217814", "alternate_urls": ["http://www.mathem.pub.ro/apps/", "https://www.mdpi.com/journal/applsci", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217814"]}, "url": "https://www.semanticscholar.org/paper/b780882adb7e806db2fb17ffcbd3cf9c5fde69a2", "title": "Using Formal Grammars as Musical Genome", "abstract": "In this paper, we explore a generative music method that can compose atonal and tonal music in different styles. One of the main differences between regular engineering problems and artistic expressions is that goals and constraints are usually ill-defined in the latter case; in fact the rules here could or should be transgressed more regularly. For this reason, our approach does not use a pre-existing dataset to imitate or extract rules from. Instead, it uses formal grammars as a representation method than can retain just the basic features, common to any form of music (e.g., the appearance of rhythmic patterns, the evolution of tone or dynamics during the composition, etc.). Exploring different musical spaces is the responsibility of a program interface that translates musical specifications into the fitness function of a genetic algorithm. This function guides the evolution of those basic features enabling the emergence of novel content. In this study, we then assess the outcome of a particular music specification (guitar ballad) in a controlled real-world setup. As a result, the generated music can be considered similar to human-composed music from a perceptual perspective. This endorses our approach to tackle arts algorithmically, as it is able to produce novel content that complies with human expectations.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 66, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-3417/11/9/4151/pdf?version=1620301819", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"volume": "11", "pages": "4151", "name": "Applied Sciences"}, "authors": [{"authorId": "1403833959", "name": "D. Albarrac\u00edn-Molina"}, {"authorId": "4204454", "name": "A. Raglio"}, {"authorId": "1397159446", "name": "F. Rivas-Ru\u00edz"}, {"authorId": "144955542", "name": "F. Vico"}]}, {"paperId": "c26475ec8df2843def1ddc207b4a1920affe6e1a", "externalIds": {"MAG": "3162612648", "DOI": "10.1002/JSC.2404", "CorpusId": 236616410}, "corpusId": 236616410, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c26475ec8df2843def1ddc207b4a1920affe6e1a", "title": "Artificial intelligence and fintech: An overview of opportunities and risks for banking, investments, and microfinance", "abstract": null, "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 21, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-05-01", "journal": {"volume": "30", "pages": "211-222", "name": "Strategic Change"}, "authors": [{"authorId": "3229323", "name": "A. Ashta"}, {"authorId": "1970984", "name": "H. Herrmann"}]}, {"paperId": "eec0b12613bd5aaa6a2c9a4fc264e063aa028430", "externalIds": {"MAG": "3177442242", "DOI": "10.31590/ejosat.878552", "CorpusId": 237993421}, "corpusId": 237993421, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eec0b12613bd5aaa6a2c9a4fc264e063aa028430", "title": "DER\u0130N \u00d6\u011eRENME TEKN\u0130KLER\u0130 \u0130LE NESNE TESP\u0130T\u0130 VE TAK\u0130B\u0130 \u00dcZER\u0130NE B\u0130R \u0130NCELEME", "abstract": "Deep learning is one of the artificial intelligence approaches that has recently become popular for minimizing human error. Deep learning techniques have the ability to successfully detect and interpret with the use of large amounts of data in many areas. Especially, the rapid increase in labeled data accumulated in the field of image processing has made it necessary to turn to deep learning algorithms. With the increasing data in these areas, deep learning methods are used to separate useful information from big data and to give meaning to text, images and audio files. In recent years, there has been an increase in the studies conducted in the field of object detection and object tracking. If there is an object to be followed after detection and analysis on non-stationary images such as videos, it is more difficult to extract meaningful information. In such cases, the use of deep learning algorithms enables image processing problems to be solved easily. The aim of this study is to examine the applications of deep learning and object detection and tracking, to explain the latest developments, to help researchers who will work in this field by giving information about popular libraries, data sets, algorithms.", "venue": "European Journal of Science and Technology", "year": 2021, "referenceCount": 91, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1571016", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"name": "European Journal of Science and Technology"}, "authors": [{"authorId": "2055882276", "name": "Fatma G\u00fcl\u015fah Tan"}, {"authorId": "2784903", "name": "Asim Sinan Y\u00fcksel"}, {"authorId": "120971069", "name": "Erdal Aydemir"}, {"authorId": "119633901", "name": "Mevl\u00fct Ersoy"}]}, {"paperId": "6486131db5480a974052c681ec26bcc4d5ab3a63", "externalIds": {"MAG": "3137849985", "DOI": "10.1016/J.TECHSOC.2021.101553", "CorpusId": 233575356}, "corpusId": 233575356, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6486131db5480a974052c681ec26bcc4d5ab3a63", "title": "The development of machine intelligence in a computational universe", "abstract": null, "venue": "", "year": 2021, "referenceCount": 125, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"volume": "65", "pages": "101553", "name": "Technology in Society"}, "authors": [{"authorId": "2874966", "name": "G. De Luca"}]}, {"paperId": "aa09779a42bc0241b389b86dee0675d3acb9aef6", "externalIds": {"DBLP": "journals/spm/Narwaria21", "DOI": "10.1109/MSP.2021.3050996", "CorpusId": 233435419}, "corpusId": 233435419, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aa09779a42bc0241b389b86dee0675d3acb9aef6", "title": "The Transition From White Box to Black Box: Challenges and Opportunities in Signal Processing Education", "abstract": "Modern engineering education is increasingly assuming an interdisciplinary character, where developments in one area almost invariably affect other areas. A prominent example is that of signal processing, which has undergone significant changes with the emergence of machine learning (ML) and deep learning (DL) in recent years. While the impact of ML/DL is clearly visible from the viewpoint of research and development as well as industrial applications, it is not immediately clear how signal processing education should evolve in terms of pedagogy and content. Hence, the main purpose of this article is to provide some insight into this aspect. In particular, we emphasize that the introduction and popularity of ML/DL, especially at the level of teaching, has provided an opportunity to bring the focus back to some of the fundamental ideas rooted in signal processing and other related fields of study.", "venue": "IEEE Signal Processing Magazine", "year": 2021, "referenceCount": 32, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-01", "journal": {"volume": "38", "pages": "163-173", "name": "IEEE Signal Processing Magazine"}, "authors": [{"authorId": "1758088", "name": "Manish Narwaria"}]}, {"paperId": "09957cb5febf48ab89c40cd7c77cb5c3b2bf6fdd", "externalIds": {"MAG": "3110196385", "DBLP": "journals/tele/Martinez-Plumed21", "DOI": "10.1016/j.tele.2020.101525", "CorpusId": 229493122}, "corpusId": 229493122, "publicationVenue": {"id": "85026124-2f50-4044-92e0-c49467227f68", "name": "Telematics and informatics", "type": "journal", "alternate_names": ["Telematics informatics", "Telematics and Informatics", "Telematics Informatics"], "issn": "0736-5853", "url": "https://www.journals.elsevier.com/telematics-and-informatics", "alternate_urls": ["http://www.sciencedirect.com/science/journal/07365853"]}, "url": "https://www.semanticscholar.org/paper/09957cb5febf48ab89c40cd7c77cb5c3b2bf6fdd", "title": "Futures of artificial intelligence through technology readiness levels", "abstract": null, "venue": "Telematics and informatics", "year": 2021, "referenceCount": 222, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-01", "journal": {"volume": "58", "pages": "101525", "name": "Telematics Informatics"}, "authors": [{"authorId": "1399205325", "name": "Fernando Mart\u00ednez-Plumed"}, {"authorId": "1740615089", "name": "Emilia G\u00f3mez"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "573d60a5a5b026c8fc64bf1ea36b9cda6b72345e", "externalIds": {"MAG": "2956301976", "DOI": "10.1016/J.TECHFORE.2020.120555", "CorpusId": 234364003}, "corpusId": 234364003, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/573d60a5a5b026c8fc64bf1ea36b9cda6b72345e", "title": "Artificial Intelligence: A Child\u2019s Play", "abstract": null, "venue": "", "year": 2021, "referenceCount": 218, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1907.04659", "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"volume": "166", "pages": "120555", "name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "46670294", "name": "R. Kashyap"}]}, {"paperId": "4105536795356d2606bbc695aaa0ace43bae91cb", "externalIds": {"MAG": "3163876512", "DOI": "10.1080/17544750.2021.1915832", "CorpusId": 236631673}, "corpusId": 236631673, "publicationVenue": {"id": "082bd2cc-2dcd-40af-9cfa-4af8600405e1", "name": "Chinese Journal of Communication", "type": "journal", "alternate_names": ["Chin J Commun"], "issn": "1754-4769", "url": "http://www.informaworld.com/openurl?genre=journal&issn=1754-4750", "alternate_urls": ["http://www.tandfonline.com/loi/rcjc20"]}, "url": "https://www.semanticscholar.org/paper/4105536795356d2606bbc695aaa0ace43bae91cb", "title": "Friend or foe? Human journalists\u2019 perspectives on artificial intelligence in Chinese media outlets", "abstract": "The development of the artificial intelligence (AI) platform Media Brain and the associated Xinhua AI news anchors have attracted a great deal of media attention. AI\u2019s potential to boost the media value chain has prompted many media organizations to consider its broader applications in the media industry, but has also raised concerns among human journalists that they will be marginalized and ultimately replaced by AI. Using in-depth interviews, this study examined the perceptions of media practitioners working in the Chinese media industry of the impact of AI on media employment. It attempted to shed light on how AI may impact the media workforce, how human journalists understand their adaptability and resilience, and how media institutions strive to create an embracing organizational discourse through material demonstrations and rivalry for influence in the media market.", "venue": "Chinese Journal of Communication", "year": 2021, "referenceCount": 57, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-30", "journal": {"volume": "14", "pages": "409 - 429", "name": "Chinese Journal of Communication"}, "authors": [{"authorId": "2152847605", "name": "Yang Yu"}, {"authorId": "47942053", "name": "Kuo-En Huang"}]}, {"paperId": "bff9b453109ed1f62226d1b760384020a7db6d0a", "externalIds": {"MAG": "3165447805", "DOI": "10.22409/CONTRACAMPO.V40I1.47817", "CorpusId": 236621135}, "corpusId": 236621135, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bff9b453109ed1f62226d1b760384020a7db6d0a", "title": "Imagin\u00e1rio e cultura da intoler\u00e2ncia em plataformas algor\u00edtmicas", "abstract": "In this theoretical articulation based on bibliographic research, the culture of intolerance, driven by the political context of hyperneoliberalism, is linked to the imaginary present on algorithmic platforms, where a fundamental mode of governance is practiced today. While not ignoring past manifestations of intolerance on the Internet, this paper intends to demonstrate how these platforms are environments even more favorable for such manifestations, given the peculiarities of their technology and their business model. To this end, certain aspects of their operation, classified as arena of attention, uneven omnimediation, calibrated exposure and flexible veridiction, are associated with dispositions that Lacan associates with the imaginary and aggressiveness \u2013 narcissism, narcissistic identification with leaders, segregation and paranoia.", "venue": "", "year": 2021, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://periodicos.uff.br/contracampo/article/download/47817/29765", "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-30", "journal": {"volume": "40", "name": ""}, "authors": [{"authorId": "2126200488", "name": "Julio Cesar Lemes de Castro"}]}, {"paperId": "e5bc6f8bd8a89103242ec84467087867a44a9626", "externalIds": {"MAG": "3157673036", "DOI": "10.1002/0471266949.BMC267", "CorpusId": 235580952}, "corpusId": 235580952, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e5bc6f8bd8a89103242ec84467087867a44a9626", "title": "Artificial Intelligence in Medicinal Chemistry", "abstract": null, "venue": "", "year": 2021, "referenceCount": 86, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-28", "journal": {"volume": "", "pages": "1-19", "name": "Burger's Medicinal Chemistry and Drug Discovery"}, "authors": [{"authorId": "2648931", "name": "E. Griffen"}, {"authorId": "15233603", "name": "A. Dossetter"}, {"authorId": "49674623", "name": "A. Leach"}, {"authorId": "50099517", "name": "Shane Montague"}]}, {"paperId": "9122b67e818da28e8ac34189de4a5095b5df5b21", "externalIds": {"DOI": "10.1007/s11219-020-09544-9", "CorpusId": 255068656}, "corpusId": 255068656, "publicationVenue": {"id": "f4c0fba6-8d83-4a73-aaa4-2ad01918304e", "name": "Software quality journal", "type": "journal", "alternate_names": ["Softw Qual J", "Software Quality Journal", "Softw qual j"], "issn": "0963-9314", "url": "https://link.springer.com/journal/11219"}, "url": "https://www.semanticscholar.org/paper/9122b67e818da28e8ac34189de4a5095b5df5b21", "title": "Ontology-based metamorphic testing for chatbots", "abstract": null, "venue": "Software quality journal", "year": 2021, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11219-020-09544-9.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-27", "journal": {"volume": "30", "pages": "227 - 251", "name": "Software Quality Journal"}, "authors": [{"authorId": "40610638", "name": "Josip Bozic"}]}, {"paperId": "7a64066f22d82aada28b9e8933b5fc68ce8430c5", "externalIds": {"MAG": "3157193726", "DOI": "10.1016/J.ECE.2021.04.003", "CorpusId": 235570795}, "corpusId": 235570795, "publicationVenue": {"id": "725a388f-a101-44b2-8292-3d871595ba5b", "name": "Education for Chemical Engineers", "type": "journal", "alternate_names": ["Educ Chem Eng"], "issn": "1749-7728", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/713882/description#description", "alternate_urls": ["http://www.sciencedirect.com/science/journal/17497728", "https://www.journals.elsevier.com/education-for-chemical-engineers/"]}, "url": "https://www.semanticscholar.org/paper/7a64066f22d82aada28b9e8933b5fc68ce8430c5", "title": "Deep neural networks in chemical engineering classrooms to accurately model adsorption equilibrium data", "abstract": null, "venue": "Education for Chemical Engineers", "year": 2021, "referenceCount": 79, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-27", "journal": {"name": "Education for Chemical Engineers"}, "authors": [{"authorId": "95790747", "name": "Shubhangi Kakkar"}, {"authorId": "3943316", "name": "W. Kwapinski"}, {"authorId": "39561380", "name": "C. A. Howard"}, {"authorId": "145594402", "name": "K. Kumar"}]}, {"paperId": "7655568220bfbf685f17e498de846cd7819480ea", "externalIds": {"MAG": "3172154424", "DOI": "10.1002/9781119598732.CH34", "CorpusId": 236617939}, "corpusId": 236617939, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7655568220bfbf685f17e498de846cd7819480ea", "title": "Chomsky and Fodor on Modularity", "abstract": null, "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-04-27", "journal": {"volume": "", "pages": "529-543", "name": ""}, "authors": [{"authorId": "52080944", "name": "N. Allott"}, {"authorId": "2116830701", "name": "N. Smith"}]}, {"paperId": "da358d7bf0d081394c183f8412cfed6c81136394", "externalIds": {"MAG": "3159853322", "DOI": "10.22161/IJAERS.84.27", "CorpusId": 235561840}, "corpusId": 235561840, "publicationVenue": {"id": "e57466f0-6639-4b5d-9191-3ac5cc573fef", "name": "International Journal of Advanced Engineering Research and Science", "type": "journal", "alternate_names": ["Int J Adv Eng Res Sci"], "issn": "2456-1908", "alternate_issns": ["2349-6495"], "url": "https://ijaers.com/issues/"}, "url": "https://www.semanticscholar.org/paper/da358d7bf0d081394c183f8412cfed6c81136394", "title": "Contribution of Artificial Intelligence in B2B Sales: A Danfoss Case Study", "abstract": "\u2014 The objective of the work is to evaluate the influence of Artificial Intelligence in the sales activities of B2B companies. The case researched was the Danfoss company, a multinational of Danish origin with B2B sales in more than 100 countries for the markets of refrigeration, heating, inverters and hydraulic in the main industries. A unique case study was employed through participatory observation, with an evaluation of annual reports and semi-structured interviews with 22 employees from various global sales areas, human resources, segment directors, regional presidents and members of the global executive committee who actively participate in defining the sales activities of each region, and globally through digital tools with Artificial Intelligence. In the organization studied, 4 dimensions were identified: Contributions, Possible Disadvantages, Current Moment and the Future with 8 categories of analysis: Internal Processes, Sales Efficiency, Sales Adaptation, Data Security, Behavioral Change, Traditional Salesman, Future Salesmen and the Future of the Company.", "venue": "International Journal of Advanced Engineering Research and Science", "year": 2021, "referenceCount": 44, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-27", "journal": {"name": "International Journal of Advanced Engineering Research and Science"}, "authors": [{"authorId": "2061244922", "name": "F. Prieto"}, {"authorId": "2073800686", "name": "Hugo Ferreira Tadeu Braga"}]}, {"paperId": "0eaae2abacc5e25f39f48e311989852ea393d8d6", "externalIds": {"MAG": "3165430951", "DOI": "10.24140/IJFMA.V6.N1.01", "CorpusId": 236622217}, "corpusId": 236622217, "publicationVenue": {"id": "5562336f-5664-41aa-b7e7-f2541dacceab", "name": "INTERNATIONAL JOURNAL OF FILM AND MEDIA ARTS", "type": "journal", "alternate_names": ["INT J FILM MEDIA ART"], "issn": "2183-9271", "url": "https://revistas.ulusofona.pt/index.php/ijfma"}, "url": "https://www.semanticscholar.org/paper/0eaae2abacc5e25f39f48e311989852ea393d8d6", "title": "Design (Non) Fiction: Deconstructing/Reconstructing the Definitional Dualism of AI", "abstract": "2001: A Space Odyssey (Kubrick, 1968) speculates on humanities technological ascension through the exploration of space and the ultimate transcendence of humanity galvanised by the invention of AI. Every detail of this portrayal was an exercise in World Building, with careful considerations of then state-of-the-art technology and informed predictions. Kubrick\u2019s speculative vision is comparative to the practice of Design Fiction, by suspending disbelief and leveraging a technologies emergence to question the future\u2019s sociotechnical landscape and its ramifications critically. Discovery\u2019s AI system, Hal9000, is a convincing speculation of intelligence with Kubrick\u2019s vision showcasing current and long-term aims in AI research. To this end, Hal9000 uniquely portrays Artificial General Intelligence (AGI) underpinned by visualising \u2018narrow\u2019 AI subproblems; thereby, simultaneously highlighting then current research agendas within AI and manifesting them into the aspirational research agenda of human-computer symbiosis. As a result of Kubrick\u2019s mastery in suspending a viewer\u2019s disbelief despite portraying a particular reality for AI, and humanities fascination with artificial life, the term AI simultaneously refers to the grand vision of AGI as well as relating to the contemporary reality of narrow AI. This confusion, along with establishing AI\u2019s ontology, are current challenges that need addressing to create effective and acceptable realisations of AI. This paper responds to the ontological confusion by reviewing and comparing Kubrick\u2019s speculative methodology to the practice of Design Fiction by unpacking Hal9000 as a diegetic prototype while defining the active threads of \u2018AI\u2019s Definitional Dualism\u2019. The paper will also present a Design Fiction submerged in the reality of narrow AI and the adoption of a More-Than Human Centred Design approach to address the complexity of AI\u2019s ontology in alternative ways. Finally, this paper will also define the importance of researching the semantics of AI technology and how film and Design Fiction offer a discursive space for design research to transpire.", "venue": "INTERNATIONAL JOURNAL OF FILM AND MEDIA ARTS", "year": 2021, "referenceCount": 76, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistas.ulusofona.pt/index.php/ijfma/article/download/7667/4492", "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-04-26", "journal": {"name": "International Journal of Film and Media Arts"}, "authors": [{"authorId": "121401948", "name": "Franziska Pilling"}, {"authorId": "3104112", "name": "Joseph Lindley"}, {"authorId": "112998906", "name": "H. Akmal"}, {"authorId": "1693223", "name": "P. Coulton"}]}, {"paperId": "564d5ded4372e36a8e594644f8e3c031a78beeba", "externalIds": {"DOI": "10.1080/1369118X.2021.1909100", "CorpusId": 234487097}, "corpusId": 234487097, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/564d5ded4372e36a8e594644f8e3c031a78beeba", "title": "Nonhuman humanitarianism: when 'AI for good' can be harmful", "abstract": "ABSTRACT Artificial intelligence (AI) applications have been introduced in humanitarian operations in order to help with the significant challenges the sector is facing. This article focuses on chatbots which have been proposed as an efficient method to improve communication with, and accountability to affected communities. Chatbots, together with other humanitarian AI applications such as biometrics, satellite imaging, predictive modelling and data visualisations, are often understood as part of the wider phenomenon of \u2018AI for social good\u2019. The article develops a decolonial critique of humanitarianism and critical algorithm studies which focuses on the power asymmetries underpinning both humanitarianism and AI. The article asks whether chatbots, as exemplars of \u2018AI for good\u2019, reproduce inequalities in the global context. Drawing on a mixed methods study that includes interviews with seven groups of stakeholders, the analysis observes that humanitarian chatbots do not fulfil claims such as \u2018intelligence\u2019. Yet AI applications still have powerful consequences. Apart from the risks associated with misinformation and data safeguarding, chatbots reduce communication to its barest instrumental forms which creates disconnects between affected communities and aid agencies. This disconnect is compounded by the extraction of value from data and experimentation with untested technologies. By reflecting the values of their designers and by asserting Eurocentric values in their programmed interactions, chatbots reproduce the coloniality of power. The article concludes that \u2018AI for good\u2019 is an \u2018enchantment of technology\u2019 that reworks the colonial legacies of humanitarianism whilst also occluding the power dynamics at play.", "venue": "", "year": 2021, "referenceCount": 81, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/1369118X.2021.1909100?needAccess=true", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-26", "journal": {"volume": "24", "pages": "850 - 868", "name": "Information, Communication & Society"}, "authors": [{"authorId": "2850262", "name": "Mirca Madianou"}]}, {"paperId": "bb3026f8fb7815720e3d84613b48300c130e44e4", "externalIds": {"DBLP": "journals/corr/abs-2104-12871", "ArXiv": "2104.12871", "DOI": "10.1145/3449639.3465421", "CorpusId": 233407771}, "corpusId": 233407771, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb3026f8fb7815720e3d84613b48300c130e44e4", "title": "Why AI is harder than we think", "abstract": "Since its beginning in the 1950s, the field of artificial intelligence has cycled several times between periods of optimistic predictions and massive investment (\"AI Spring\") and periods of disappointment, loss of confidence, and reduced funding (\"AI Winter\"). Even with today's seemingly fast pace of AI breakthroughs, the development of long-promised technologies such as self-driving cars, housekeeping robots, and conversational companions has turned out to be much harder than many people expected. One reason for these repeating cycles is our limited understanding of the nature and complexity of intelligence itself. In this talk I will discuss some fallacies in common assumptions made by AI researchers, which can lead to overconfident predictions about the field. I will also speculate on what is needed for the grand challenge of making AI systems more robust, general, and adaptable --- in short, more intelligent.", "venue": "ArXiv", "year": 2021, "referenceCount": 93, "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2104.12871", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2021-04-26", "journal": {"name": "Proceedings of the Genetic and Evolutionary Computation Conference"}, "authors": [{"authorId": "71370384", "name": "M. Mitchell"}]}, {"paperId": "c6e1a3505ff160e8cc747f02936b2f6861cba18e", "externalIds": {"DBLP": "journals/jbd/BatarsehFH21a", "DOI": "10.1186/s40537-021-00445-7", "CorpusId": 233403216}, "corpusId": 233403216, "publicationVenue": {"id": "d60da343-ab92-4310-b3d7-2c0860287a9d", "name": "Journal of Big Data", "type": "journal", "alternate_names": ["J Big Data", "Journal on Big Data"], "issn": "2196-1115", "alternate_issns": ["2579-0048"], "url": "http://www.journalofbigdata.com/", "alternate_urls": ["http://www.springer.com/computer/database+management+&+information+retrieval/journal/40537", "http://techscience.com/JBD/index.html", "https://journalofbigdata.springeropen.com", "https://journalofbigdata.springeropen.com/"]}, "url": "https://www.semanticscholar.org/paper/c6e1a3505ff160e8cc747f02936b2f6861cba18e", "title": "A survey on artificial intelligence assurance", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 291, "citationCount": 20, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-26", "journal": {"volume": "8", "pages": "1-30", "name": "Journal of Big Data"}, "authors": [{"authorId": "144105786", "name": "Feras A. Batarseh"}, {"authorId": "2059693836", "name": "Laura J. Freeman"}, {"authorId": "2124911407", "name": "Chih-hao Huang"}]}, {"paperId": "29f18a58a1867e0f0fe8f67f20189b71d0b0dc26", "externalIds": {"MAG": "3185787080", "ArXiv": "2104.11652", "DOI": "10.2139/ssrn.3832601", "CorpusId": 233388044}, "corpusId": 233388044, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/29f18a58a1867e0f0fe8f67f20189b71d0b0dc26", "title": "If it Looks Like a Human and Speaks Like a Human ... Dialogue and Cooperation in Human-Robot Interactions", "abstract": "This paper presents the results of a behavioral experiment conducted between February 2020 and March 2021 at UniversitA Cattolica del Sacro Cuore, Milan Campus, in which students were matched with either a human or a humanoid robotic partner to play an iterated Prisoner\u00e2\u20ac\u2122s Dilemma. The results of a Logit estimation procedure show that subjects are more likely to cooperate with human rather than with robotic partners; that they are more likely to cooperate after receiving a dialogic verbal reaction following a sub-optimal social outcome; and that the effect of the verbal reaction is not dependent on the nature of the partner. Our findings provide new evidence on the effects of verbal communication in strategic frameworks. The results are robust to the exclusion of students of Economics-related subjects, to the inclusion of a set of psychological and behavioral controls, to the way subjects perceive robots\u00e2\u20ac\u2122 behavior, and to potential gender biases in human-human interactions.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 113, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2104.11652", "status": null}, "fieldsOfStudy": ["Psychology", "Economics"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-23", "journal": {"name": "Behavioral & Experimental Economics eJournal"}, "authors": [{"authorId": "32114232", "name": "Mario A. Maggioni"}, {"authorId": "115008977", "name": "D. Rossignoli"}]}, {"paperId": "32e8a3ae18598a5177ba61e39ca7239319b8c54a", "externalIds": {"MAG": "3155174489", "DOI": "10.1007/S13369-021-05522-W", "CorpusId": 234829697}, "corpusId": 234829697, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/32e8a3ae18598a5177ba61e39ca7239319b8c54a", "title": "Power Transmission Line Fault Detection and Diagnosis Based on Artificial Intelligence Approach and its Development in UAV: A Review", "abstract": null, "venue": "", "year": 2021, "referenceCount": 102, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-04-22", "journal": {"volume": "", "pages": "1-27", "name": "Arabian Journal for Science and Engineering"}, "authors": [{"authorId": "97727705", "name": "S. Wong"}, {"authorId": "2100609218", "name": "Clifford Wei Chang Choe"}, {"authorId": "3386969", "name": "H. Goh"}, {"authorId": "2100526635", "name": "Yik Wen Low"}, {"authorId": "2100597614", "name": "Dennis Yang Shen Cheah"}, {"authorId": "2100595481", "name": "Chiia Pang"}]}, {"paperId": "daba216327c7b4f8bff96a84984fdb09117edc51", "externalIds": {"DBLP": "journals/corr/abs-2104-12582", "ArXiv": "2104.12582", "DOI": "10.3390/philosophies6030053", "CorpusId": 233394168}, "corpusId": 233394168, "publicationVenue": {"id": "ef4fb77f-61b5-4988-8f50-738b45be5d7e", "name": "Philosophies", "type": "journal", "issn": "0766-1398", "alternate_issns": ["2409-9287"], "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-691408", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-691408", "https://www.mdpi.com/journal/philosophies"]}, "url": "https://www.semanticscholar.org/paper/daba216327c7b4f8bff96a84984fdb09117edc51", "title": "Understanding and Avoiding AI Failures: A Practical Guide", "abstract": "As AI technologies increase in capability and ubiquity, AI accidents are becoming more common. Based on normal accident theory, high reliability theory, and open systems theory, we create a framework for understanding the risks associated with AI applications. This framework is designed to direct attention to pertinent system properties without requiring unwieldy amounts of accuracy. In addition, we also use AI safety principles to quantify the unique risks of increased intelligence and human-like qualities in AI. Together, these two fields give a more complete picture of the risks of contemporary AI. By focusing on system properties near accidents instead of seeking a root cause of accidents, we identify where attention should be paid to safety for current generation AI systems.", "venue": "Philosophies", "year": 2021, "referenceCount": 71, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/6/3/53/pdf?version=1631003281", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-22", "journal": {"volume": "abs/2104.12582", "name": "ArXiv"}, "authors": [{"authorId": "2116650684", "name": "R. M. Williams"}, {"authorId": "26336155", "name": "Roman V. Yampolskiy"}]}, {"paperId": "2bb1e1a5b9a16f6828fe94736cea5dab264533a6", "externalIds": {"DBLP": "journals/tacl/MerrillGSS21", "ArXiv": "2104.10809", "DOI": "10.1162/tacl_a_00412", "CorpusId": 233346957}, "corpusId": 233346957, "publicationVenue": {"id": "e0dbf116-86aa-418d-859f-a49952d7e44a", "name": "Transactions of the Association for Computational Linguistics", "type": "journal", "alternate_names": ["Trans Assoc Comput Linguistics"], "issn": "2307-387X", "url": "https://www.mitpressjournals.org/loi/tacl", "alternate_urls": ["http://www.transacl.org/"]}, "url": "https://www.semanticscholar.org/paper/2bb1e1a5b9a16f6828fe94736cea5dab264533a6", "title": "Provable Limitations of Acquiring Meaning from Ungrounded Form: What Will Future Language Models Understand?", "abstract": "Abstract Language models trained on billions of tokens have recently led to unprecedented results on many NLP tasks. This success raises the question of whether, in principle, a system can ever \u201cunderstand\u201d raw text without access to some form of grounding. We formally investigate the abilities of ungrounded systems to acquire meaning. Our analysis focuses on the role of \u201cassertions\u201d: textual contexts that provide indirect clues about the underlying semantics. We study whether assertions enable a system to emulate representations preserving semantic relations like equivalence. We find that assertions enable semantic emulation of languages that satisfy a strong notion of semantic transparency. However, for classes of languages where the same expression can take different values in different contexts, we show that emulation can become uncomputable. Finally, we discuss differences between our formal model and natural language, exploring how our results generalize to a modal setting and other semantic relations. Together, our results suggest that assertions in code or language do not provide sufficient signal to fully emulate semantic representations. We formalize ways in which ungrounded language models appear to be fundamentally limited in their ability to \u201cunderstand\u201d.", "venue": "Transactions of the Association for Computational Linguistics", "year": 2021, "referenceCount": 34, "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/tacl/article-pdf/doi/10.1162/tacl_a_00412/1963983/tacl_a_00412.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-22", "journal": {"volume": "9", "pages": "1047-1060", "name": "Transactions of the Association for Computational Linguistics"}, "authors": [{"authorId": "143696607", "name": "William Cooper Merrill"}, {"authorId": "79775260", "name": "Yoav Goldberg"}, {"authorId": "4671928", "name": "Roy Schwartz"}, {"authorId": "144365875", "name": "Noah A. Smith"}]}, {"paperId": "bfaccd57f7f0df5abb9bcf954a4e12964b2023c4", "externalIds": {"DBLP": "journals/ais/Balle22", "MAG": "3156501751", "DOI": "10.1007/s00146-021-01211-2", "CorpusId": 234827618}, "corpusId": 234827618, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/bfaccd57f7f0df5abb9bcf954a4e12964b2023c4", "title": "Empathic responses and moral status for social robots: an argument in favor of robot patienthood based on K. E. L\u00f8gstrup", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 82, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-20", "journal": {"volume": "37", "pages": "535 - 548", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2091363965", "name": "Simon N. Balle"}]}, {"paperId": "dfd461b5b2f1e8e4ee85988aae1ff2a4ef35ae94", "externalIds": {"DOI": "10.1145/3428158", "CorpusId": 233430159}, "corpusId": 233430159, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dfd461b5b2f1e8e4ee85988aae1ff2a4ef35ae94", "title": "Perceptions of Human and Machine-Generated Articles", "abstract": "Automated journalism technology is transforming news production and changing how audiences perceive the news. As automated text-generation models advance, it is important to understand how readers perceive human-written and machine-generated content. This study used OpenAI\u2019s GPT-2 text-generation model (May 2019 release) and articles from news organizations across the political spectrum to study participants\u2019 reactions to human- and machine-generated articles. As participants read the articles, we collected their facial expression and galvanic skin response (GSR) data together with self-reported perceptions of article source and content credibility. We also asked participants to identify their political affinity and assess the articles\u2019 political tone to gain insight into the relationship between political leaning and article perception. Our results indicate that the May 2019 release of OpenAI\u2019s GPT-2 model generated articles that were misidentified as written by a human close to half the time, while human-written articles were identified correctly as written by a human about 70 percent of the time.", "venue": "Digital Threats: Research and Practice", "year": 2021, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3428158", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-20", "journal": {"volume": "2", "pages": "1 - 16", "name": "Digital Threats: Research and Practice"}, "authors": [{"authorId": "2086786251", "name": "Shubhra Tewari"}, {"authorId": "1753691816", "name": "Renos Zabounidis"}, {"authorId": "116150549", "name": "Ammina Kothari"}, {"authorId": "39958072", "name": "Reynold J. Bailey"}, {"authorId": "144648940", "name": "Cecilia Ovesdotter Alm"}]}, {"paperId": "574cddb0d56fa84708b259dcd2d81473b810e7ad", "externalIds": {"ArXiv": "2104.08231", "DBLP": "journals/corr/abs-2104-08231", "CorpusId": 233289893}, "corpusId": 233289893, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/574cddb0d56fa84708b259dcd2d81473b810e7ad", "title": "An Adversarially-Learned Turing Test for Dialog Generation Models", "abstract": "The design of better automated dialogue evaluation metrics offers the potential of accelerate evaluation research on conversational AI. However, existing trainable dialogue evaluation models are generally restricted to classifiers trained in a purely supervised manner, which suffer a significant risk from adversarial attacking (e.g., a nonsensical response that enjoys a high classification score). To alleviate this risk, we propose an adversarial training approach to learn a robust model, ATT (Adversarial Turing Test), that discriminates machine-generated responses from human-written replies. In contrast to previous perturbation-based methods, our discriminator is trained by iteratively generating unrestricted and diverse adversarial examples using reinforcement learning. The key benefit of this unrestricted adversarial training approach is allowing the discriminator to improve robustness in an iterative attack-defense game. Our discriminator shows high accuracy on strong attackers including DialoGPT and GPT-3.1", "venue": "ArXiv", "year": 2021, "referenceCount": 40, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-16", "journal": {"volume": "abs/2104.08231", "name": "ArXiv"}, "authors": [{"authorId": "71886367", "name": "Xiang Gao"}, {"authorId": "48378494", "name": "Yizhe Zhang"}, {"authorId": "1947267", "name": "Michel Galley"}, {"authorId": "66648221", "name": "Bill Dolan"}]}, {"paperId": "f459eb635c2a485c77f1461f47f566f43cc0a4b7", "externalIds": {"MAG": "3153019806", "DOI": "10.4324/9780429445590-6-6", "CorpusId": 96439665}, "corpusId": 96439665, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f459eb635c2a485c77f1461f47f566f43cc0a4b7", "title": "Biological evolution\u2019s use of representational redescription", "abstract": "I encountered Annette Karmiloff-Smith several times between the 1980s and 2012. We also occasionally exchanged email messages. We worked on related problems and had partly overlapping ideas about a multi-layer development process. In particular, there are overlaps and differences between her notion of \u201crepresentational redescription\u201d and the \u201cmeta-configured genome\u201d idea based on a revision of the \u201caltricial/precocial\u201d distinction used by biologists. We shared the view that understanding mechanisms involved in development is more important than collecting data about ages at which various fashionable developmental tests are passed. Our problems and some of our methodology overlapped, but our views on explanatory frameworks were different. My main inspiration regarding what needed to be explained came from Immanuel Kant\u2019s theories about the nature of mathematical knowledge (about spatial structures and processes) as \u201cawakened by\u201d but not \u201cderived from\u201d experience, whereas although inspired by Jean Piaget (who had read Kant) Annette seems not to have been interested in Piaget\u2019s work on mathematical cognition, and had not read his (posthumous) book on necessity, though it was she who informed me about it. On reading Beyond Modularity about ten years after it was published I noticed unexpected overlaps, but I don\u2019t think Annette was interested in my investigations because I was not ready to propose specific explanatory mechanisms (e.g. for mathematical insight \u2013 a still unsolved problem) and I did not think neural nets, her favourite candidate, were adequate to the task. Nevertheless, I believe there were deep commonalities in our thinking, as well as differences that I\u2019ll try to explain. I regret that we did not have opportunities to engage more deeply, and perhaps achieve a new synthesis.", "venue": "", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-16", "journal": {"volume": "", "pages": "76-93", "name": ""}, "authors": [{"authorId": "145788442", "name": "A. Sloman"}]}, {"paperId": "fd9904f66018681d77037c057cf3f1755d9e0aa9", "externalIds": {"DBLP": "conf/ACMse/OmatuP21", "DOI": "10.1145/3409334.3452072", "CorpusId": 234344744}, "corpusId": 234344744, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd9904f66018681d77037c057cf3f1755d9e0aa9", "title": "Benefits of combining dimensional attention and working memory for partially observable reinforcement learning problems", "abstract": "Neuroscience provides a rich source of inspiration for new types of algorithms and architectures to employ when building AI and the resulting biologically-plausible approaches that provide formal, testable models of brain function. The working memory toolkit (WMtk), was developed to assist the integration of an artificial neural network (ANN)-based computational neuroscience model of working memory into reinforcement learning (RL) agents, mitigating the details of ANN design and providing a simple symbolic encoding interface. While the WMtk allows RL agents to perform well in partially-observable domains, it requires prefiltering of sensory information by the programmer: a task often delegated to dimensional attention mechanisms in other cognitive architectures. To fill this gap, we develop and test a biologically-plausible dimensional attention filter for the WMtk and validate model performance using a partially-observable 1D maze task. We show that the attention filter improves learning behavior in two ways by: 1) speeding up learning in the short-term, early in training and 2) developing emergent alternative strategies which optimize performance over the long-term.", "venue": "ACM Southeast Conference", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": "2021-04-15", "journal": {"name": "Proceedings of the 2021 ACM Southeast Conference"}, "authors": [{"authorId": "2090365479", "name": "Ngozi Omatu"}, {"authorId": "49168710", "name": "Joshua L. Phillips"}]}, {"paperId": "584f796997a59f5775b30814037318ac0be9f11d", "externalIds": {"ArXiv": "2104.07598", "DBLP": "journals/corr/abs-2104-07598", "DOI": "10.1145/3530875", "CorpusId": 233241187}, "corpusId": 233241187, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/584f796997a59f5775b30814037318ac0be9f11d", "title": "Can Artificial Intelligence Make Art?: Folk Intuitions as to whether AI-driven Robots Can Be Viewed as Artists and Produce Art", "abstract": "In two experiments (total N = 693), we explored whether people are willing to consider paintings made by AI-driven robots as art, and robots as artists. Across the two experiments, we manipulated three factors: (i) agent type (AI-driven robot vs. human agent), (ii) behavior type (intentional creation of a painting vs. accidental creation), and (iii) object type (abstract vs. representational painting). We found that people judge robot paintings and human paintings as art to roughly the same extent. However, people are much less willing to consider robots as artists than humans, which is partially explained by the fact that they are less disposed to attribute artistic intentions to robots.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 99, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3530875", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-15", "journal": {"volume": "11", "pages": "1 - 19", "name": "ACM Transactions on Human-Robot Interaction (THRI)"}, "authors": [{"authorId": "2083035030", "name": "Elz.e Sigut.e Mikalonyt.e"}, {"authorId": "46849688", "name": "Markus Kneer"}]}, {"paperId": "26005ae02a1e12d6e835744af861a1f84fc5935d", "externalIds": {"PubMedCentral": "8041614", "DOI": "10.1007/s10726-021-09734-1", "CorpusId": 233220206, "PubMed": "33867681"}, "corpusId": 233220206, "publicationVenue": {"id": "ce29274e-e4e7-4015-bb98-03af1b78dc4f", "name": "Group Decision and Negotiation", "type": "conference", "alternate_names": ["Group Decis Negot", "GDN"], "issn": "0926-2644", "url": "https://link.springer.com/journal/10726"}, "url": "https://www.semanticscholar.org/paper/26005ae02a1e12d6e835744af861a1f84fc5935d", "title": "Using Artificial Intelligence to provide Intelligent Dispute Resolution Support", "abstract": null, "venue": "Group Decision and Negotiation", "year": 2021, "referenceCount": 80, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10726-021-09734-1.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-13", "journal": {"volume": "30", "pages": "789 - 812", "name": "Group Decision and Negotiation"}, "authors": [{"authorId": "2058672947", "name": "John Zeleznikow"}]}, {"paperId": "29409efa04ac99ccf01d2a011d21d5d14e870000", "externalIds": {"PubMedCentral": "8040371", "DOI": "10.1007/s11030-021-10217-3", "CorpusId": 233211014, "PubMed": "33844136"}, "corpusId": 233211014, "publicationVenue": {"id": "1c60c14e-1b6e-4198-a3de-545707da4d81", "name": "Molecular diversity", "type": "journal", "alternate_names": ["Molecular Diversity", "Mol divers", "Mol Divers"], "issn": "1381-1991", "url": "http://www.springer.com/journal/11030/about", "alternate_urls": ["https://link.springer.com/journal/11030"]}, "url": "https://www.semanticscholar.org/paper/29409efa04ac99ccf01d2a011d21d5d14e870000", "title": "Artificial intelligence to deep learning: machine intelligence approach for drug discovery", "abstract": null, "venue": "Molecular diversity", "year": 2021, "referenceCount": 477, "citationCount": 110, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11030-021-10217-3.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-12", "journal": {"volume": "25", "pages": "1315 - 1360", "name": "Molecular Diversity"}, "authors": [{"authorId": "1409846740", "name": "Rohan Gupta"}, {"authorId": "153610437", "name": "Devesh Srivastava"}, {"authorId": "2059118408", "name": "Mehar Sahu"}, {"authorId": "2072850683", "name": "Swati Tiwari"}, {"authorId": "2288195", "name": "R. K. Ambasta"}, {"authorId": "38183916", "name": "Pravir Kumar"}]}, {"paperId": "f06ca547e5eaf0fd118f184b9ddd1cf7cd5c29e0", "externalIds": {"DBLP": "journals/corr/abs-2104-05500", "ArXiv": "2104.05500", "CorpusId": 233210665}, "corpusId": 233210665, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f06ca547e5eaf0fd118f184b9ddd1cf7cd5c29e0", "title": "Updater-Extractor Architecture for Inductive World State Representations", "abstract": "Developing NLP models traditionally involves two stages training and application. Retention of information acquired after training (at application time) is architecturally limited by the size of the model\u2019s context window (in the case of transformers), or by the practical difficulties associated with long sequences (in the case of RNNs). In this paper, we propose a novel transformer-based Updater-Extractor architecture and a training procedure that can work with sequences of arbitrary length and refine its knowledge about the world based on linguistic inputs. We explicitly train the model to incorporate incoming information into its world state representation, obtaining strong inductive generalization and the ability to handle extremely long-range dependencies. We prove a lemma that provides a theoretical basis for our approach. The result also provides insight into success and failure modes of models trained with variants of Truncated Back-Propagation Through Time (such as Transformer XL). Empirically, we investigate the model performance on three different tasks, demonstrating its promise. This preprint is still a work in progress. At present, we focused on easily interpretable tasks, leaving the application of the proposed ideas to practical NLP applications for the future.", "venue": "ArXiv", "year": 2021, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-12", "journal": {"volume": "abs/2104.05500", "name": "ArXiv"}, "authors": [{"authorId": "116808291", "name": "A. Moskvichev"}, {"authorId": "2108386159", "name": "James Liu"}]}, {"paperId": "1d26a324c7f13e474a98ed76842f683e389f639e", "externalIds": {"MAG": "3153829757", "DOI": "10.21684/2412-2343-2021-8-1-86-115", "CorpusId": 234814884}, "corpusId": 234814884, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1d26a324c7f13e474a98ed76842f683e389f639e", "title": "Regulation of Artificial Intelligence in BRICS and the European Union", "abstract": "Global digitization and the emergence of Artificial Intelligence-based technologies pose challenges for all countries. The BRICS and European Union countries are no exception. BRICS as well as the European Union seek to strengthen their positions as leading actors on the world stage. At the present time, an essential means of doing so is for BRICS and the EU to implement smart policy and create suitable conditions for the development of digital technologies, including AI. For this reason, one of the most important tasks for BRICS and the EU is to develop an adequate approach to the regulation of AI-based technologies. This research paper is an analysis of the current approaches to the regulation of AI at the BRICS group level, in each of the BRICS countries, and in the European Union. The analysis is based on the application of comparative and formal juridical analysis of the legislation of the selected countries on AI and other digital technologies. The results of the analysis lead the authors to conclude that it is necessary to design ageneral approach to the regulation of these technologies for the BRICS countries similar to the approach chosen in the EU (the trustworthy approach) and to upgrade this legislation to achieve positive effects from digital transformation. The authors offer several suggestions for optimization of the provisions of the legislation, including designing a model legal act in the sphere of AI.", "venue": "BRICS Law Journal", "year": 2021, "referenceCount": 44, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.bricslawjournal.com/jour/article/download/452/193", "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-11", "journal": {"name": "BRICS Law Journal"}, "authors": [{"authorId": "2081710656", "name": "D. Cyman"}, {"authorId": "72777661", "name": "E. Gromova"}, {"authorId": "120476812", "name": "E. Juchnevicius"}]}, {"paperId": "c04ca6b39ee20fba3c894c9fdc5d0377f194d260", "externalIds": {"PubMedCentral": "8052224", "DOI": "10.1007/s00709-021-01642-0", "CorpusId": 233201237, "PubMed": "33837845"}, "corpusId": 233201237, "publicationVenue": {"id": "8e7acb5a-de93-4923-bb79-4534cc15f8d5", "name": "Protoplasma", "type": "journal", "issn": "0033-183X", "alternate_issns": ["0934-8727"], "url": "https://link.springer.com/journal/709"}, "url": "https://www.semanticscholar.org/paper/c04ca6b39ee20fba3c894c9fdc5d0377f194d260", "title": "Intelligence without neurons: a Turing Test for plants?", "abstract": null, "venue": "Protoplasma", "year": 2021, "referenceCount": 14, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00709-021-01642-0.pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2021-04-10", "journal": {"volume": "258", "pages": "455 - 458", "name": "Protoplasma"}, "authors": [{"authorId": "145333473", "name": "P. Nick"}]}, {"paperId": "07c8c0aae067b472a90cb4458a932228f60cdc02", "externalIds": {"MAG": "3153647488", "DBLP": "journals/ijgi/TerziyanN21", "DOI": "10.3390/IJGI10040246", "CorpusId": 234811458}, "corpusId": 234811458, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/07c8c0aae067b472a90cb4458a932228f60cdc02", "title": "Semantics of Voids within Data: Ignorance-Aware Machine Learning", "abstract": "Operating with ignorance is an important concern of geographical information science when the objective is to discover knowledge from the imperfect spatial data. Data mining (driven by knowledge discovery tools) is about processing available (observed, known, and understood) samples of data aiming to build a model (e.g., a classifier) to handle data samples that are not yet observed, known, or understood. These tools traditionally take semantically labeled samples of the available data (known facts) as an input for learning. We want to challenge the indispensability of this approach, and we suggest considering the things the other way around. What if the task would be as follows: how to build a model based on the semantics of our ignorance, i.e., by processing the shape of \u201cvoids\u201d within the available data space? Can we improve traditional classification by also modeling the ignorance? In this paper, we provide some algorithms for the discovery and visualization of the ignorance zones in two-dimensional data spaces and design two ignorance-aware smart prototype selection techniques (incremental and adversarial) to improve the performance of the nearest neighbor classifiers. We present experiments with artificial and real datasets to test the concept of the usefulness of ignorance semantics discovery.", "venue": "ISPRS Int. J. Geo Inf.", "year": 2021, "referenceCount": 49, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2220-9964/10/4/246/pdf?version=1617941429", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-08", "journal": {"volume": "10", "pages": "246", "name": "ISPRS Int. J. Geo Inf."}, "authors": [{"authorId": "1742755", "name": "V. Terziyan"}, {"authorId": "145403995", "name": "A. Nikulin"}]}, {"paperId": "09279dc8018a8131e11d527cebb06d0a43c67cff", "externalIds": {"DBLP": "journals/corr/abs-2104-02726", "ArXiv": "2104.02726", "CorpusId": 233168627}, "corpusId": 233168627, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09279dc8018a8131e11d527cebb06d0a43c67cff", "title": "Creativity and Machine Learning: A Survey", "abstract": "There is a growing interest in the area of machine learning and creativity. This survey presents an overview of the history and the state of the art of computational creativity theories, key machine learning techniques (including generative deep learning), and corresponding automatic evaluation methods. After presenting a critical discussion of the key contributions in this area, we outline the current research challenges and emerging opportunities in this field.", "venue": "ArXiv", "year": 2021, "referenceCount": 285, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-06", "journal": {"volume": "abs/2104.02726", "name": "ArXiv"}, "authors": [{"authorId": "2067291198", "name": "Giorgio Franceschelli"}, {"authorId": "1806767", "name": "Mirco Musolesi"}]}, {"paperId": "3e73043486daa85330554ddc5b48c9a26ed66f4b", "externalIds": {"MAG": "3141717750", "DOI": "10.17755/ESOSDER.844536", "CorpusId": 233593779}, "corpusId": 233593779, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e73043486daa85330554ddc5b48c9a26ed66f4b", "title": "YAPAY ZEKA BA\u011eLAMINDA YARATICILIK VE G\u00d6RSEL TASARIMIN GELECE\u011e\u0130", "abstract": "In the design industry, we see the artificial intelligence applications which come into being along with the development of information and technology. Such applications are observed in the area of visual design as well. Discussing the visual design that is a process including the element of creativity, how designs can be produced on the basis of the machine learning of computers by processing big data and what these designs will lead to in the future makes up one of the questions of the study. On the other hand, what the effects of the likely scenario that the artificial intelligence can take on the creation process with no need for human beings will be on the design also confronts us as another question. The primary aim of this study is to present projections in relation to the future of the design on the topic of the partnership of visual design with artificial intelligence in terms of the departure point of the study and issues addressed by study and to reveal what the process to be experienced following this partnership will lead to. Therefore, in the conceptual framework of the study, by examining the relationship of artificial intelligence with creativity, various examples created by the interaction between the two are given, and then a descriptive analysis is made through theories. The machine is capable of learning the patterns obtained through a specific template and planning. However, it does not have the asymmetric structure, emotions, cultural and societal factors of the human intelligence. What the effect of the artificial intelligence will be on the design process without such factors in the future is discussed.", "venue": "", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1460732", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-05", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "46805024", "name": "B. Karabulut"}]}, {"paperId": "36941ff76f77ab149ca3ac5645dd2352e26163e9", "externalIds": {"DOI": "10.1080/0889311X.2021.1982914", "CorpusId": 244491707}, "corpusId": 244491707, "publicationVenue": {"id": "29bdd89b-f2e2-4184-acd9-5d6820c70de7", "name": "Crystallography Reviews", "type": "journal", "alternate_names": ["Crystallogr Rev"], "issn": "0889-311X", "url": "http://www.tandfonline.com/loi/gcry20", "alternate_urls": ["https://tandfonline.com/toc/gcry20/current"]}, "url": "https://www.semanticscholar.org/paper/36941ff76f77ab149ca3ac5645dd2352e26163e9", "title": "Machine learning applications in macromolecular X-ray crystallography", "abstract": "After more than half a century of evolution, machine learning and artificial intelligence, in general, are entering a truly exciting era of broad application in commercial and research sectors. In X-ray crystallography, and its application to structural biology, machine learning is finding a home within expert and automated systems, is forecasting experiment and data analysis outcomes, is predicting whether crystals can be grown and even generating macromolecular structures. This review provides a historical perspective on AI and machine learning, offers an introduction and guide to its application in crystallography and concludes with topical examples of how it is currently influencing macromolecular crystallography.", "venue": "Crystallography Reviews", "year": 2021, "referenceCount": 165, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/0889311X.2021.1982914?needAccess=true", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-04-03", "journal": {"volume": "27", "pages": "54 - 101", "name": "Crystallography Reviews"}, "authors": [{"authorId": "4272943", "name": "M. Vollmar"}, {"authorId": "38942685", "name": "G. Evans"}]}, {"paperId": "9eafc9094b0c005892c90812372f103643dcea9f", "externalIds": {"DOI": "10.1080/15027570.2021.1987643", "CorpusId": 240075011}, "corpusId": 240075011, "publicationVenue": {"id": "aaaca1fe-426d-444d-b0d1-9901fad912a4", "name": "Journal of Military Ethics", "type": "journal", "alternate_names": ["J Mil Ethics"], "issn": "1502-7570", "url": "http://www.tandfonline.com/loi/smil20", "alternate_urls": ["https://www.tandfonline.com/toc/smil20/17/1?nav=tocList"]}, "url": "https://www.semanticscholar.org/paper/9eafc9094b0c005892c90812372f103643dcea9f", "title": "Hume\u2019s Law as Another Philosophical Problem for Autonomous Weapons Systems", "abstract": "ABSTRACT This article contends that certain types of Autonomous Weapons Systems (AWS) are susceptible to Hume\u2019s Law. Hume\u2019s Law highlights the seeming impossibility of deriving moral judgments, if not all evaluative ones, from purely factual premises. If autonomous weapons make use of factual data from their environments to carry out specific actions, then justifying their ethical decisions may prove to be intractable in light of the said problem. In this article, Hume\u2019s original formulation of the no-ought-from-is thesis is evaluated in relation to the dominant views regarding it (viz., moral non-descriptivism and moral descriptivism). Citing the objections raised against these views, it is claimed that, if there is no clear-cut solution to Hume\u2019s is-ought problem that presently exists, then the task of grounding the moral judgements of AWS would still be left unaccounted for.", "venue": "Journal of Military Ethics", "year": 2021, "referenceCount": 72, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-03", "journal": {"volume": "20", "pages": "113 - 128", "name": "Journal of Military Ethics"}, "authors": [{"authorId": "84400220", "name": "R. Boyles"}]}, {"paperId": "3762e4c40731c630a98df7742d2fc5902833e54d", "externalIds": {"DOI": "10.1080/02580136.2021.1941652", "CorpusId": 235676108}, "corpusId": 235676108, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3762e4c40731c630a98df7742d2fc5902833e54d", "title": "Can Aristotelian virtue theory survive Fourth Order Technology? An ethics perspective", "abstract": "The Fourth Industrial Revolution (4IR) and accompanying Fourth Order technologies (FOTs) sit at the confluence of epistem\u00e9 and techn\u00e9 knowledge identified in classical Greek philosophy. The former is interpreted as scientific knowledge and discoveries, and the latter is its practical application in the form of \u201cnew\u201d technologies and manufacturing processes. This helps explain both 4IR and FOT where 4IR is characterised by the science of digitisation and computerisation, and FOT by machines combining artificial intelligence (AI) and advanced machine learning (AML), both key components in FOT functionality. Through the use of codification and algorithms, scientists and engineers are trying to imitate human thought and behaviour in ways devoid of human virtue and relationality, vital ingredients in the \u201clived\u201d experience. Classical Aristotelian virtue theory is agent-based, but recognises the importance of the \u201clived experience\u201d, both individual (self) and in terms of their relationality in the wider community (other). Phronesis, or practical wisdom, is a critical tool in Aristotelian virtue theory as it is theorised to assist the individual in their \u201clived\u201d human experiences in the acquisition of both intellectual virtues (rational) and moral virtues (emotional), leading to a state of eudaimonia, or ultimate well-being for the individual (self) and eventually wider society (other). Aristotelian virtue theory understands that human life is not always calculable, measurable, or rational, but it has a corresponding and arguably deeper and more profound meaning and influence through the relative and moral brought about through the \u201clived\u201d human experience and its iteration.", "venue": "", "year": 2021, "referenceCount": 88, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-03", "journal": {"volume": "40", "pages": "213 - 227", "name": "South African Journal of Philosophy"}, "authors": [{"authorId": "2116178408", "name": "Lorrainne Doherty"}]}, {"paperId": "bc005e6a24be8d866e04f04b905415a5f1c47a4f", "externalIds": {"DOI": "10.1080/02580136.2021.1921933", "CorpusId": 235676080}, "corpusId": 235676080, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc005e6a24be8d866e04f04b905415a5f1c47a4f", "title": "Moral risks and government policy in South Africa in the context of 4IR", "abstract": "South Africa, among other nations in Africa, most notably Kenya, Nigeria and Rwanda, is aiming to take a lead in the implementation of policy intended to address the challenges represented by the fourth Industrial Revolution. We take the South African Constitution\u2019s Bill of Rights as our guide on the moral obligations of the government, from the logic of both consequentialist and deontological moral frameworks. With this in mind, we consider whether the South African government\u2019s initiatives involve moral risks, in virtue of neglecting some threats posed by new technologies. In particular, we identify biological technologies \u2013 specifically transhumanist technologies \u2013 as posing special risks, and argue that we need to balance the need for dignity, equality and privacy, which the technologies seem to threaten, against the promise of flourishing that the technologies seem to offer.", "venue": "", "year": 2021, "referenceCount": 114, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-03", "journal": {"volume": "40", "pages": "195 - 212", "name": "South African Journal of Philosophy"}, "authors": [{"authorId": "103072012", "name": "John M. Ostrowick"}]}, {"paperId": "c51cfb181e7977ef3a52bbabde4d479e284c91ed", "externalIds": {"MAG": "3140642569", "DOI": "10.1161/CIRCRESAHA.121.318106", "CorpusId": 232762118, "PubMed": "33793339"}, "corpusId": 232762118, "publicationVenue": {"id": "439d70ad-d909-4791-bdc6-dc765447bd42", "name": "Circulation Research", "type": "journal", "alternate_names": ["Circ Res"], "issn": "0009-7330", "url": "http://circres.ahajournals.org/"}, "url": "https://www.semanticscholar.org/paper/c51cfb181e7977ef3a52bbabde4d479e284c91ed", "title": "Artificial Intelligence in Hypertension", "abstract": "Hypertension remains the largest modifiable cause of mortality worldwide despite the availability of effective medications and sustained research efforts over the past 100 years. Hypertension requires transformative solutions that can help reduce the global burden of the disease. Artificial intelligence and machine learning, which have made a substantial impact on our everyday lives over the last decade may be the route to this transformation. However, artificial intelligence in health care is still in its nascent stages and realizing its potential requires numerous challenges to be overcome. In this review, we provide a clinician-centric perspective on artificial intelligence and machine learning as applied to medicine and hypertension. We focus on the main roadblocks impeding implementation of this technology in clinical care and describe efforts driving potential solutions. At the juncture, there is a critical requirement for clinical and scientific expertise to work in tandem with algorithmic innovation followed by rigorous validation and scrutiny to realize the promise of artificial intelligence-enabled health care for hypertension and other chronic diseases.", "venue": "Circulation Research", "year": 2021, "referenceCount": 108, "citationCount": 6, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ahajournals.org/doi/pdf/10.1161/CIRCRESAHA.121.318106", "status": null}, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-02", "journal": {"volume": "128", "pages": "1100 - 1118", "name": "Circulation Research"}, "authors": [{"authorId": "145535160", "name": "S. Padmanabhan"}, {"authorId": "2062732891", "name": "T. Q. B. Tran"}, {"authorId": "5990215", "name": "A. Dominiczak"}]}, {"paperId": "22418ee25580bedcf7f1dc00d5e90419b1cadaa6", "externalIds": {"MAG": "3150674763", "DOI": "10.3390/TECHNOLOGIES9020023", "CorpusId": 233533906}, "corpusId": 233533906, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/22418ee25580bedcf7f1dc00d5e90419b1cadaa6", "title": "A Novel Ensemble Machine Learning Approach for Bioarchaeological Sex Prediction", "abstract": "I present a novel machine learning approach to predict sex in the bioarchaeological record. Eighteen cranial interlandmark distances and five maxillary dental metric distances were recorded from n = 420 human skeletons from the necropolises at Alfedena (600\u2013400 BCE) and Campovalano (750\u2013200 BCE and 9\u201311th Centuries CE) in central Italy. A generalized low rank model (GLRM) was used to impute missing data and Area under the Curve\u2014Receiver Operating Characteristic (AUC-ROC) with 20-fold stratified cross-validation was used to evaluate predictive performance of eight machine learning algorithms on different subsets of the data. Additional perspectives such as this one show strong potential for sex prediction in bioarchaeological and forensic anthropological contexts. Furthermore, GLRMs have the potential to handle missing data in ways previously unexplored in the discipline. Although results of this study look promising (highest AUC-ROC = 0.9722 for predicting binary male/female sex), the main limitation is that the sexes of the individuals included were not known but were estimated using standard macroscopic bioarchaeological methods. However, future research should apply this machine learning approach to known-sex reference samples in order to better understand its value, along with the more general contributions that machine learning can make to the reconstruction of past human lifeways.", "venue": "", "year": 2021, "referenceCount": 76, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2227-7080/9/2/23/pdf?version=1617939053", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-01", "journal": {"volume": "9", "pages": "23", "name": ""}, "authors": [{"authorId": "52401892", "name": "Evan Muzzall"}]}, {"paperId": "8fc05add40562a0f4a6cdac341b011956e04334f", "externalIds": {"MAG": "3155307806", "DOI": "10.1214/20-STS780", "CorpusId": 211267450}, "corpusId": 211267450, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8fc05add40562a0f4a6cdac341b011956e04334f", "title": "Noncommutative Probability and Multiplicative Cascades", "abstract": "Various aspects of standard model particle physics might be explained by a suitably rich algebra acting on itself, as suggested by Furey (2015). The present paper develops the asymptotics of large causal tree diagrams that combine freely independent elements in such an algebra. The Mar\u010denko\u2013Pastur law and Wigner\u2019s semicircle law are shown to emerge as limits of normalized sum-over-paths of nonnegative elements assigned to the edges of causal trees. These results are established in the setting of noncommutative probability. Trees with classically independent positive edge weights (random multiplicative cascades) were originally proposed by Mandelbrot as a model displaying the fractal features of turbulence. The novelty of the present work is the use of noncommutative (free) probability to allow the edge weights to take values in an algebra. An application to theoretical neuroscience is also discussed.", "venue": "Statistical Science", "year": 2021, "referenceCount": 47, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-01", "journal": {"name": "Statistical Science"}, "authors": [{"authorId": "2626305", "name": "I. McKeague"}]}, {"paperId": "23bacae8a434177f99822ed4fb91e784f59b57ba", "externalIds": {"DBLP": "journals/caaitrit/LiHG21", "MAG": "3149514201", "DOI": "10.1049/CIT2.12035", "CorpusId": 233610766}, "corpusId": 233610766, "publicationVenue": {"id": "d6a70d34-0855-4e32-aa47-d6ab631309c3", "name": "CAAI Transactions on Intelligence Technology", "type": "journal", "alternate_names": ["CAAI Trans Intell Technol"], "issn": "2468-2322", "url": "https://www.sciencedirect.com/journal/caai-transactions-on-intelligence-technology", "alternate_urls": ["https://digital-library.theiet.org/content/journals/trit"]}, "url": "https://www.semanticscholar.org/paper/23bacae8a434177f99822ed4fb91e784f59b57ba", "title": "Why AI still doesn't have consciousness?", "abstract": "Consciousness is one of the unique features of creatures, and is also the root of biological intelligence. Up to now, all machines and robots haven\u2019t had consciousness. Then, will the artificial intelligence (AI) be conscious? Will robots have real intelligence without consciousness? The most primitive consciousness is the perception and expression of self \u2010 existence. In order to perceive the existence of the concept of \u2018I\u2019, a creature must first have a perceivable boundary such as skin to separate \u2018I\u2019 from \u2018non \u2010 I\u2019. For robots, to have the self \u2010 awareness, they also need to be wrapped by a similar sensory membrane. Nowadays, as intelligent tools, AI systems should also be regarded as the external extension of human intelligence. These tools are unconscious. The development of AI shows that intelligence can exist without consciousness. When human beings enter into the era of life intelligence from AI, it is not the AI became conscious, but that conscious lives will have strong AI. Therefore, it becomes more necessary to be careful on applying AI to living creatures, even to those lower \u2010 level animals with only consciousness. The subversive revolution of such application may produce more careful thinking.", "venue": "CAAI Transactions on Intelligence Technology", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-31", "journal": {"volume": "6", "pages": "175-179", "name": "CAAI Trans. Intell. Technol."}, "authors": [{"authorId": "1686319", "name": "Deyi Li"}, {"authorId": "2087684730", "name": "Wen He"}, {"authorId": "2179965463", "name": "Yike Guo"}]}, {"paperId": "9fd758b904d328ee316bbbd01ded9a9b7db11cfe", "externalIds": {"MAG": "3164361795", "DOI": "10.1590/1981-5344/3554", "CorpusId": 236679385}, "corpusId": 236679385, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9fd758b904d328ee316bbbd01ded9a9b7db11cfe", "title": "De Leibniz \u00e0s m\u00e1quinas sociais: uma vis\u00e3o hist\u00f3rica do surgimento dos agentes inteligentes de informa\u00e7\u00e3o sob a \u00f3tica da ci\u00eancia da informa\u00e7\u00e3o", "abstract": "Tem como objetivo investigar o contexto historico do desenvolvimento das ideias que culminaram com o surgimento dos agentes de mineracao. Pressupoe, hoje, que cerca de metade da informacao processada na Internet e feita por agentes o que estimula uma discussao sobre o papel dos bots na contemporaneidade, bem como da relacao destes com pessoas e seus dados. A justificativa deste trabalho se da pela observacao do cenario atual em que tais agentes ja interagem com as pessoas e pelo distanciamento, presumido, do objeto de estudo que resulta na escassez de publicacoes a partir da CI. Apresenta como as necessidades informacionais que impulsionaram o surgimento da Ciencia da Informacao tambem inspiraram a criacao dos agentes de mineracao. O Procedimento metodologico utilizado foi uma revisao bibliografica que parte do desejo de Leibniz em criar o Calculus Ratiocinator e segue ate a contempor\u00e2nea teoria das Maquinas Sociais. Sugere como conclusao, por um lado, que a CI ja desenvolveu o seu olhar sobre a evolucao dos Agentes de Mineracao, que a principio era atribuida, apenas, a logica e matematica, e por outro lado articular estas desconexas e esparsas visoes dos contextos proprios dos agentes de mineracao.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.scielo.br/j/pci/a/vwRcpwXjBwKRNVBNC8nT4mk/?format=pdf&lang=pt", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-03-31", "journal": {"volume": "26", "pages": "133-156", "name": "Perspectivas Em Ciencia Da Informacao"}, "authors": [{"authorId": "2579311", "name": "C. Santana"}, {"authorId": "144802402", "name": "Camila Oliveira Lima"}, {"authorId": "116444344", "name": "Amanda Almeida Nunes"}]}, {"paperId": "f2e4c984d1ec493b6b07fe67cdc9bd8b265dfaae", "externalIds": {"MAG": "3146051161", "DOI": "10.1007/s00348-021-03180-0", "CorpusId": 233577915}, "corpusId": 233577915, "publicationVenue": {"id": "7b41c268-19fa-4587-a36a-9a03f135cca8", "name": "Experiments in Fluids", "type": "journal", "alternate_names": ["Exp Fluid"], "issn": "0723-4864", "url": "http://www.springer.com/engineering/journal/348", "alternate_urls": ["https://link.springer.com/journal/348", "https://www.springer.com/journal/348", "http://www.springer.com/journal/348"]}, "url": "https://www.semanticscholar.org/paper/f2e4c984d1ec493b6b07fe67cdc9bd8b265dfaae", "title": "Pulsed jet phase-averaged flow field estimation based on neural network approach", "abstract": null, "venue": "Experiments in Fluids", "year": 2021, "referenceCount": 61, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03206636/file/DAAA21045.1619162616_postprint.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-31", "journal": {"volume": "62", "name": "Experiments in Fluids"}, "authors": [{"authorId": "2088039239", "name": "C\u00e9letin Ott"}, {"authorId": "119445131", "name": "C. Pivot"}, {"authorId": "117840049", "name": "Pierre Dubois"}, {"authorId": "32476657", "name": "Q. Gallas"}, {"authorId": "72393993", "name": "J. Delva"}, {"authorId": "38907351", "name": "M. Lippert"}, {"authorId": "92113860", "name": "L. Keirsbulck"}]}, {"paperId": "5fe0159eb024ae8ec331b2733ecbecf717b6f6fc", "externalIds": {"DOI": "10.1109/WiDSTaif52235.2021.9430234", "CorpusId": 235208513}, "corpusId": 235208513, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5fe0159eb024ae8ec331b2733ecbecf717b6f6fc", "title": "An investigation into the Impact of Artificial Intelligence on the Future of Project Management", "abstract": "The purpose of the study is to investigate the impact of Artificial Intelligence on the future of Project Management. This study provides detailed conceptual information about Artificial Intelligence and different perspectives. Artificial Intelligence is defined as the new technical discipline, which would develop an application system, a technological method in order to simulate the expansion and extension of human intelligence. This research is a review that discusses how artificial intelligence affects project management. The paper has discussed various benefits of AI adoption and its implementation. The results show that technology and AI cannot replace the human mind. Machine and other AI robots can automate tools and tasks, but at the end of the day, machines need human help to operate and monitor.", "venue": "2021 International Conference of Women in Data Science at Taif University (WiDSTaif )", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2021-03-30", "journal": {"pages": "1-4", "name": "2021 International Conference of Women in Data Science at Taif University (WiDSTaif )"}, "authors": [{"authorId": "2105732438", "name": "Asma Alshaikhi"}, {"authorId": "1917077", "name": "Mashael M Khayyat"}]}, {"paperId": "fbef63c0c26ee1ad04e773179b4dd35cad2f0f10", "externalIds": {"PubMedCentral": "8902029", "MAG": "3134535041", "DOI": "10.1177/1745691621997113", "CorpusId": 236714691, "PubMed": "34730453"}, "corpusId": 236714691, "publicationVenue": {"id": "8ec18bc5-9c95-446c-a293-735d7ae1e3e9", "name": "Perspectives on Psychological Science", "type": "journal", "alternate_names": ["Perspect Psychol Sci"], "issn": "1745-6916", "url": "http://www.sagepub.com/journals/Journal201964/title", "alternate_urls": ["https://uk.sagepub.com/en-gb/eur/journal/perspectives-psychological-science", "http://pps.sagepub.com/", "https://www.jstor.org/journal/perspsycscie", "http://www.jstor.org/action/showPublication?journalCode=perspsycscie"]}, "url": "https://www.semanticscholar.org/paper/fbef63c0c26ee1ad04e773179b4dd35cad2f0f10", "title": "Why Evolutionary Psychology Should Abandon Modularity", "abstract": "A debate surrounding modularity\u2014the notion that the mind may be exclusively composed of distinct systems or modules\u2014has held philosophers and psychologists captive for nearly 40 years. Concern about this thesis\u2014which has come to be known as the massive modularity debate\u2014serves as the primary grounds for skepticism of evolutionary psychology\u2019s claims about the mind. In this article we argue that the entirety of this debate, and the very notion of massive modularity itself, is ill-posed and confused. In particular, it is based on a confusion about the level of analysis (or reduction) at which one is approaching the mind. Here we provide a framework for clarifying at what level of analysis one is approaching the mind and explain how a systemic failure to distinguish between different levels of analysis has led to profound misunderstandings of not only evolutionary psychology but also of the entire cognitivist enterprise of approaching the mind at the level of the mechanism. We furthermore suggest that confusions between different levels of analysis are endemic throughout the psychological sciences\u2014extending well beyond issues of modularity and evolutionary psychology. Therefore, researchers in all areas should take preventive measures to avoid this confusion in the future.", "venue": "Perspectives on Psychological Science", "year": 2021, "referenceCount": 160, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/1745691621997113", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-29", "journal": {"volume": "17", "pages": "465 - 490", "name": "Perspectives on Psychological Science"}, "authors": [{"authorId": "6110283", "name": "D. Pietraszewski"}, {"authorId": "6240574", "name": "Annie E. Wertz"}]}, {"paperId": "28ec33e7813f37dc25d2daa51be307594c7552b4", "externalIds": {"ArXiv": "2103.15739", "DBLP": "journals/corr/abs-2103-15739", "DOI": "10.33965/ict2021_202106r031", "CorpusId": 232417683}, "corpusId": 232417683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/28ec33e7813f37dc25d2daa51be307594c7552b4", "title": "Automation: An Essential Component Of Ethical AI?", "abstract": "Ethics is sometimes considered to be too abstract to be meaningfully implemented in artificial intelligence (AI). In this paper, we reflect on other aspects of computing that were previously considered to be very abstract. Yet, these are now accepted as being done very well by computers. These tasks have ranged from multiple aspects of software engineering to mathematics to conversation in natural language with humans. This was done by automating the simplest possible step and then building on it to perform more complex tasks. We wonder if ethical AI might be similarly achieved and advocate the process of automation as key step in making AI take ethical decisions. The key contribution of this paper is to reflect on how automation was introduced into domains previously considered too abstract for computers.", "venue": "Proceedings 14th International Conference on ICT, Society and Human Beings (ICT 2021), the 18th International Conference Web Based Communities and Social Media (WBC 2021)", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.iadisportal.org/components/com_booklibrary/ebooks/202106R031.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-03-29", "journal": {"volume": "abs/2103.15739", "name": "ArXiv"}, "authors": [{"authorId": "1889245", "name": "Vivek Nallur"}, {"authorId": "2055353180", "name": "Martin Lloyd"}, {"authorId": "144968698", "name": "Siani Pearson"}]}, {"paperId": "4ef16f82648d85c80056511baf724eb2634539ce", "externalIds": {"DBLP": "journals/corr/abs-2103-15294", "ArXiv": "2103.15294", "CorpusId": 232404428}, "corpusId": 232404428, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4ef16f82648d85c80056511baf724eb2634539ce", "title": "\"Weak AI\" is Likely to Never Become \"Strong AI\", So What is its Greatest Value for us?", "abstract": "AI has surpassed humans across a variety of tasks such as image classification, playing games (e.g., go, \u201cStarcraft\u201d and poker), and protein structure prediction. However, at the same time, AI is also bearing serious controversies. Many researchers argue that little substantial progress has been made for AI in recent decades. In this paper, the author (1) explains why controversies about AI exist; (2) discriminates two paradigms of AI research, termed \u201cweak AI\u201d and \u201cstrong AI\u201d (a.k.a. artificial general intelligence); (3) clarifies how to judge which paradigm a research work should be classified into; (4) discusses what is the greatest value of \u201cweak AI\u201d if it has no chance to develop into \u201cstrong AI\u201d.", "venue": "ArXiv", "year": 2021, "referenceCount": 39, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-29", "journal": {"volume": "abs/2103.15294", "name": "ArXiv"}, "authors": [{"authorId": "48265485", "name": "B. Liu"}]}, {"paperId": "b33f5e9e16b31ab32d701325b7e7e6647265ed93", "externalIds": {"MAG": "3148087028", "DBLP": "journals/mj/LiLZQL21", "DOI": "10.1016/J.MEJO.2021.105044", "CorpusId": 233687143}, "corpusId": 233687143, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b33f5e9e16b31ab32d701325b7e7e6647265ed93", "title": "Achievements, challenges, and developing directions of bio-inspired self-repairing technology", "abstract": null, "venue": "Microelectron. J.", "year": 2021, "referenceCount": 74, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-27", "journal": {"volume": "111", "pages": "105044", "name": "Microelectron. J."}, "authors": [{"authorId": "2108506145", "name": "Duo Li"}, {"authorId": "48031735", "name": "Xiubin Liu"}, {"authorId": "35260345", "name": "Qingqi Zhuo"}, {"authorId": "3420981", "name": "Yanling Qian"}, {"authorId": "2000883360", "name": "Yue Li"}]}, {"paperId": "e95b050d162d87931e2cd32f9e775f15eac450cf", "externalIds": {"MAG": "3138644744", "DOI": "10.3390/MATH9060681", "CorpusId": 233638584}, "corpusId": 233638584, "publicationVenue": {"id": "6175efe8-6f8e-4cbe-8cee-d154f4e78627", "name": "Mathematics", "issn": "2227-7390", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-283014", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-283014", "https://www.mdpi.com/journal/mathematics"]}, "url": "https://www.semanticscholar.org/paper/e95b050d162d87931e2cd32f9e775f15eac450cf", "title": "Black-Box-Based Mathematical Modelling of Machine Intelligence Measuring", "abstract": "Current machine intelligence metrics rely on a different philosophy, hindering their effective comparison. There is no standardization of what is machine intelligence and what should be measured to quantify it. In this study, we investigate the measurement of intelligence from the viewpoint of real-life difficult-problem-solving abilities, and we highlight the importance of being able to make accurate and robust comparisons between multiple cooperative multiagent systems (CMASs) using a novel metric. A recent metric presented in the scientific literature, called MetrIntPair, is capable of comparing the intelligence of only two CMASs at an application. In this paper, we propose a generalization of that metric called MetrIntPairII. MetrIntPairII is based on pairwise problem-solving intelligence comparisons (for the same problem, the problem-solving intelligence of the studied CMASs is evaluated experimentally in pairs). The pairwise intelligence comparison is proposed to decrease the necessary number of experimental intelligence measurements. MetrIntPairII has the same properties as MetrIntPair, with the main advantage that it can be applied to any number of CMASs conserving the accuracy of the comparison, while it exhibits enhanced robustness. An important property of the proposed metric is the universality, as it can be applied as a black-box method to intelligent agent-based systems (IABSs) generally, not depending on the aspect of IABS architecture. To demonstrate the effectiveness of the MetrIntPairII metric, we provide a representative experimental study, comparing the intelligence of several CMASs composed of agents specialized in solving an NP-hard problem.", "venue": "Mathematics", "year": 2021, "referenceCount": 85, "citationCount": 4, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2227-7390/9/6/681/pdf?version=1616475982", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-22", "journal": {"name": "Mathematics"}, "authors": [{"authorId": "2983864", "name": "L\u00e1szl\u00f3 Barna Iantovics"}]}, {"paperId": "eb266c80be4904a62ca29d1ba8511e4129cc49f0", "externalIds": {"DOI": "10.1016/j.jcct.2021.03.006", "CorpusId": 233027364, "PubMed": "33812855"}, "corpusId": 233027364, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb266c80be4904a62ca29d1ba8511e4129cc49f0", "title": "Artificial intelligence in cardiovascular CT: Current status and future implications.", "abstract": null, "venue": "Journal of cardiovascular computed tomography", "year": 2021, "referenceCount": 51, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-03-22", "journal": {"name": "Journal of cardiovascular computed tomography"}, "authors": [{"authorId": "81728867", "name": "A. Lin"}, {"authorId": "6747995", "name": "M\u00e1rton Kolossv\u00e1ry"}, {"authorId": "144511973", "name": "M. Motwani"}, {"authorId": "3165444", "name": "I. I\u0161gum"}, {"authorId": "1387468728", "name": "P. Maurovich-Horvat"}, {"authorId": "3106896", "name": "P. Slomka"}, {"authorId": "2596578", "name": "D. Dey"}]}, {"paperId": "13bc29dba1f721e06448390889a3618344d7cc9f", "externalIds": {"MAG": "3139427787", "DOI": "10.36592/9786587424620.455-472", "CorpusId": 233627777}, "corpusId": 233627777, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13bc29dba1f721e06448390889a3618344d7cc9f", "title": "MANAGEMENT OF ARTIFICIAL INTELLIGENCE IN BRAZIL IN THE FACE OF THE CONSTITUTIONAL LEGAL TREATY OF THE DIGITAL ENVIRONMENT", "abstract": "Having as central objective of their research the idea of making computers \"think\" exactly like humans, creating analysis, reasoning, understanding and obtaining answers for different situations, artificial intelligence has its management in Brazil linked to the legal protection of forms of expression, ways of creating, doing and living, as well as scientific, artistic and mainly technological creations carried out with the help of computers and other electronic components, observing the provisions of the rules of social communication determined by the Federal Constitution. Thus, the management of artificial intelligence in Brazil is necessarily subject to the constitutional legal protection that targets the digital environment established within the scope of our positive law in the face of the duties, rights, obligations and regime inherent in the manifestation of thought, creation, expression and information provided by the human person with the help of computers (article 220 of the Federal Constitution) within the full exercise of the cultural rights granted to Brazilians and foreigners residing in the country (articles 215 and 5 of the Constitution) guided by the fundamental Trabalho/palestra elaborada vinculada ao convite recebido para palestrar no Dialogues & Integration The 1st International Conference on Humanities Transformation: Technology, Assessment, Management October 10-12, 2019 Shanghai Jiao Tong University/Shanghai, China * Active lawyer in the area of environmental business law, professor of Environmental Law in Brazil and doctor and master in Social Relations Law. Permanent Professor of the Master's Program in Law of UNINOVE-SP (BRAZIL). Leader of the CNPq Research Group of Legal Tutors of Companies before the Constitutional Environmental Law UNINOVE. _330________RJLB, Ano 5 (2019), no 6 principles of the Federal Constitution 1st to 4th).", "venue": "", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-21", "journal": {"volume": "", "pages": "455-472", "name": ""}, "authors": [{"authorId": "108761908", "name": "C. Fiorillo"}]}, {"paperId": "982cbf7fcee4f3964dd1d411fdeadad6e6f1d465", "externalIds": {"ArXiv": "2103.10685", "DBLP": "conf/kdd/ZouYZYYT21", "DOI": "10.1145/3447548.3467418", "CorpusId": 232290492}, "corpusId": 232290492, "publicationVenue": {"id": "a0edb93b-1e95-4128-a295-6b1659149cef", "name": "Knowledge Discovery and Data Mining", "type": "conference", "alternate_names": ["KDD", "Knowl Discov Data Min"], "url": "http://www.acm.org/sigkdd/"}, "url": "https://www.semanticscholar.org/paper/982cbf7fcee4f3964dd1d411fdeadad6e6f1d465", "title": "Controllable Generation from Pre-trained Language Models via Inverse Prompting", "abstract": "Large-scale pre-trained language models have demonstrated strong capabilities of generating realistic texts. However, it remains challenging to control the generation results. Previous approaches such as prompting are far from sufficient, and lack of controllability limits the usage of language models. To tackle this challenge, we propose an innovative method, inverse prompting, to better control text generation. The core idea of inverse prompting is to use generated text to inversely predict the prompt during beam search, which enhances the relevance between the prompt and the generated text and thus improves controllability. Empirically, we pre-train a large-scale Chinese language model to perform a systematic study using human evaluation on the tasks of open-domain poem generation and open-domain long-form question answering. Results demonstrate that our proposed method substantially outperforms the baselines and that our generation quality is close to human performance on some of the tasks.", "venue": "Knowledge Discovery and Data Mining", "year": 2021, "referenceCount": 52, "citationCount": 25, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2103.10685", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2021-03-19", "journal": {"name": "Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining"}, "authors": [{"authorId": "46927790", "name": "Xu Zou"}, {"authorId": "2075292864", "name": "Da Yin"}, {"authorId": "51211976", "name": "Qingyang Zhong"}, {"authorId": "38385080", "name": "Hongxia Yang"}, {"authorId": "2109512754", "name": "Zhilin Yang"}, {"authorId": "2109541439", "name": "Jie Tang"}]}, {"paperId": "53f45680ffaaf4a644ee74332103c7107df9cbe5", "externalIds": {"ArXiv": "2103.11961", "DBLP": "journals/corr/abs-2103-11961", "CorpusId": 232307135}, "corpusId": 232307135, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/53f45680ffaaf4a644ee74332103c7107df9cbe5", "title": "Artificial Intelligence Narratives: An Objective Perspective on Current Developments", "abstract": "This work provides a starting point for researchers interested in gaining a deeper understanding of the big picture of artificial intelligence (AI). To this end, a narrative is conveyed that allows the reader to develop an objective view on current developments that is free from false promises that dominate public communication. An essential takeaway for the reader is that AI must be understood as an umbrella term encompassing a plethora of different methods, schools of thought, and their respective historical movements. Consequently, a bottom-up strategy is pursued in which the field of AI is introduced by presenting various aspects that are characteristic of the subject. This paper is structured in three parts: (i) Discussion of current trends revealing false public narratives, (ii) an introduction to the history of AI focusing on recurring patterns and main characteristics, and (iii) a critical discussion on the limitations of current methods in the context of the potential emergence of a strong(er) AI. It should be noted that this work does not cover any of these aspects holistically; rather, the content addressed is a selection made by the author and subject to a didactic strategy. 1 Today\u2019s Perspectives on AI Undoubtedly, advances in AI have enormous implications on societies, politics, and industries, which has resulted in an increasing attention over the past few years. The tremendous value from leveraging AI-based approaches is becoming more and more apparent in a wide variety of different areas, such as (i) drug discovery in medicine (an example is given by Ramsundar et al. [1]), (ii) theoretical research where AI allows to systematically search hypothesis space to find unbiased, repeatable, and optimal results based on big data sets (for instance, see [2]), or (iii) transportation where researchers strive for fully autonomous driving [3]. Especially data-driven technologies are already transforming entire industries by improving processes or paving the way for fundamentally new business models [4]. It\u2019s worth noting that the huge popularity of AI is fueled by the fact that the world\u2019s most successful companies sit on enormous data lakes of mostly personal data, forming powerful monopolies changing the way we live (GoogleTM, FacebookTM, or AmazonTM). Commercially viable business models are typically built on exceedingly narrow models to be competitive as similar to humans specialization usually leads to superior performance. Products from big tech corporates are ubiquitous in our everyday lives and may have led to a widespread misunderstanding of what AI is. Truth to be told, it is exceptionally difficult to define the term intelligence on its own, which naturally also applies to the term (AI). To complicate comprehension of the term \"AI\" even further, the societal view of AI is taken ad absurdum by unscientific debates or science fiction [5]. In addition, one can often observe unrealistic product advertisement when new products based on ordinary software development are sold as being based on advanced AI techniques, as \"AI\" is currently a very marketable keyword. Besides the confusion that is conveyed by public communication, the field of AI is difficult to understand as it comprises a wide variety of different schools of thought and methodologies. Furthermore, the public discussion is dominated by extremes. On the one hand, AI evangelists appear who \u2217primary contact: noah.klarmann@tum.de ar X iv :2 10 3. 11 96 1v 1 [ cs .A I] 1 8 M ar 2 02 1 Artificial Intelligence Narratives: An Objective Perspective on Current Developments push away any concerns. On the other hand, there are people who advocate an overly skeptical view on AI; for example, by portraying a dystopian world in which robots enslave humanity. It is obvious that all these mechanisms inevitably have an enormous impact on the way AI is viewed today. For instance, young people of generations \"Y\" and \"Z\" mostly associate AI with business models from big tech companies that exploit AI, as this is the most visible aspect of their lifetime to date. At the same time, individuals from the \"Boomer\" and \"X\" generations are possibly more skeptical about current developments in AI, primarily due to two distinct aspects that characterized the field of AI in the 20th century: (i) Reaching milestones usually caused disappointment when the anticipated technological revolution did not occur. For example, IBM\u2019s Deep Blue defeated the world grandmaster Garri Kasparov in 1997 [6] that lead to great attention in the scientific world and also beyond. Apparently, it was a great surprise to the public when the agent that is able to master such an intellectual task as chess would not made a good lawyer or taxi driver. (ii) It has happened several times that entire industries with questionable AI-based business models have perished when high expectations led to disappointment among society and stakeholders as extravagant promises remained unfulfilled. Although skepticism and misconceptions are evident, AI is undoubtedly playing an increasingly important role in our daily lives, leading to growing concerns about privacy [7], security [8], fairness [9], or the threat posed by autonomous military agents [10]. Consequently, regulation and standardization of AI methods are crucial to constrain the development in a way that corresponds to mankind\u2019s expectations [11, 12]. In this context, two concerns commonly appear: (i) Higher degrees of automation are associated with job losses as machines substitute human labor. In fact, a survey among researchers revealed a predicted chance of 50% that AI will be superior to human in almost every task within the next 42 years (until 2063) and could replace all human labor within the next 117 years (by 2138) [13]. However, it should be noted that substituted jobs do not necessarily lead to unemployment in the short term. Miller and Atkinson [14] advocate that the \"job loss\" argument is based on a common fallacy, namely the claim that the number of jobs decreases with increasing automation/productivity. In history however, no correlation between productivity and unemployment can be identified. The wrong assumption of job losses is based on the hypothesis that there is a limit amount of labor that does not rise with increasing productivity. This is a wrong assumption as savings due to increased productivity recycles back to economy, rising the demand for products that in turn lead to more jobs. In addition, new jobs are also created in the prospering automation/AI industry [14]. It is worth noting that a major risk for industrial ecosystems is to refuse the highest possible level of automation, as this would lead to a loss of competitiveness. (ii) A second often raised issue is that advanced techniques are black-box models and hence, cannot be controlled and might sooner or later emerge towards something with an own will (see for instance [11]). While it is true that many of the currently used methods are black-box models (for example, machine learning), they are by no means self-organizing or emergent (yet). It is also worth noting that significant efforts are being made by researchers to develop explainable AI to make use of machine learning with more caution (especially in safety-critical areas such as autonomous driving or in the medical field) or to derive knowledge from machine learning models (an overview on this topic can be found by Tjoa and Guan [15]). Despite the great success in employing AI methods, there is a significant lack of understanding in society, as well as among scientists. To this end, this paper provides an objective overview of the field of AI by addressing the most important characteristics. The author is convinced that this bottom-up approach (starting from what AI encompasses) is the best strategy from a didactic point of view. The alternative (a topdown approach) would imply to introduce a high-level definition that has to be exceedingly broad/complex and would hence be difficult to formulate/understand. In the next section, an introduction to the history of AI is given. Different eras that were prevalent in the past as well as important events, such as Milestones, are presented. A look at the recent past shows that trends in AI are often temporary, may change significantly over time, were adopted by other methods, or branch into different disciplines. In the subsequent section, an outlook on possible future developments is given. 2 Characteristics of AI history A brief introduction to the history of AI is provided in this section. Besides conveying known facts, main characteristics of AI are presented to support the reader in the comprehension of current developments and to derive possible scenarios for the future. On a high level, the history of AI can be categorized into four phases, as shown in Figure 1. The four phases differ primarily in the contemporary conceptions of the respective researchers regarding the best approach that could eventually lead to higher intelligence. Furthermore, Figure 2 shows a detailed timeline of the history of AI with a selection of different milestones and events. The first phase in Figure 1 Cybernetics (mainly between 1943 1955) can be seen as the pioneering stage before AI emerged. Cybernetics is defined as the study of the fundamentals of the control and communication in animals and machines [18]. To this end, closed control loops are assumed where an agent acts on an environment to reach a goal based on", "venue": "ArXiv", "year": 2021, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-03-18", "journal": {"volume": "abs/2103.11961", "name": "ArXiv"}, "authors": [{"authorId": "97379694", "name": "Noah Klarmann"}]}, {"paperId": "a6985f9f41b7168f6ea6f72ca83987ba769c6b9b", "externalIds": {"PubMedCentral": "7968615", "MAG": "3168412082", "DOI": "10.1007/978-3-030-69978-9_4", "CorpusId": 232294716}, "corpusId": 232294716, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a6985f9f41b7168f6ea6f72ca83987ba769c6b9b", "title": "Ethical Issues of AI", "abstract": null, "venue": "Artificial Intelligence for a Better Future", "year": 2021, "referenceCount": 70, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-030-69978-9_4.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-03-18", "journal": {"pages": "35 - 53", "name": "Artificial Intelligence for a Better Future"}, "authors": [{"authorId": "1792014", "name": "B. Stahl"}]}, {"paperId": "c40217c9c4810c932d978100b276b41491423b2b", "externalIds": {"MAG": "3138442062", "DOI": "10.1057/S41272-021-00319-W", "CorpusId": 233641994}, "corpusId": 233641994, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c40217c9c4810c932d978100b276b41491423b2b", "title": "Artificial Intelligence in travel", "abstract": null, "venue": "", "year": 2021, "referenceCount": 9, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-17", "journal": {"volume": "20", "pages": "368-375", "name": "Journal of Revenue and Pricing Management"}, "authors": [{"authorId": "145936404", "name": "B. Vinod"}]}, {"paperId": "350ef3164aa44e3e795efe9df52af15afb143b59", "externalIds": {"MAG": "3137364963", "DOI": "10.1002/aelm.202001241", "CorpusId": 233699986}, "corpusId": 233699986, "publicationVenue": {"id": "6af9b219-f58b-4b09-8db0-f2984aca0e14", "name": "Advanced Electronic Materials", "type": "journal", "alternate_names": ["Adv Electron Mater", "Adv electron mater", "Advanced electronic materials"], "issn": "2199-160X", "url": "https://onlinelibrary.wiley.com/journal/2199160x"}, "url": "https://www.semanticscholar.org/paper/350ef3164aa44e3e795efe9df52af15afb143b59", "title": "Phase Change Random Access Memory for Neuro\u2010Inspired Computing", "abstract": "Neuro\u2010inspired computing using emerging memristors plays an increasingly significant role for the realization of artificial intelligence and thus has attracted widespread interest in the era of big data. Thanks to the maturity of technology and the superiority of device performance, phase change random access memory (PCRAM) is a promising candidate for both nonvolatile memories and neuro\u2010inspired computing. Recently many efforts have been carried out to achieve the biological behavior using PCRAM and to clarify the related working mechanism. In order to further improve device performances, it is helpful and urgent to summarize and discuss the PCRAM solution for neuro\u2010inspired computing. In this paper, fundamentals, principles, recent progresses, existing challenges, and mainstream solutions are reviewed, and a brief outlook is highlighted and introduced, with the expectation to expound future directions.", "venue": "Advanced Electronic Materials", "year": 2021, "referenceCount": 130, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-03-17", "journal": {"volume": "7", "name": "Advanced Electronic Materials"}, "authors": [{"authorId": "2183630570", "name": "Qiang Wang"}, {"authorId": "49048716", "name": "G. Niu"}, {"authorId": "2053309127", "name": "Wei Ren"}, {"authorId": "2108695004", "name": "Ruobing Wang"}, {"authorId": "2116081043", "name": "Xiaogang Chen"}, {"authorId": "2116226810", "name": "Xi Li"}, {"authorId": "145377919", "name": "Z. Ye"}, {"authorId": "47779252", "name": "Yahong Xie"}, {"authorId": "3873053", "name": "Sannian Song"}, {"authorId": "145395766", "name": "Zhitang Song"}]}, {"paperId": "047c5da68b8f2a47ad64caccf6e5c026673543fc", "externalIds": {"DOI": "10.3389/fevo.2021.650726", "CorpusId": 232234325}, "corpusId": 232234325, "publicationVenue": {"id": "52ee8f70-41d7-4479-a480-646299aafc28", "name": "Frontiers in Ecology and Evolution", "type": "journal", "alternate_names": ["Front Ecol Evol"], "issn": "2296-701X", "url": "http://www.frontiersin.org/Behavioral_and_Evolutionary_Ecology", "alternate_urls": ["http://www.frontiersin.org/ecology_and_evolution", "http://www.frontiersin.org/Ecology_and_Evolution/archive", "https://www.frontiersin.org/journals/ecology-and-evolution"]}, "url": "https://www.semanticscholar.org/paper/047c5da68b8f2a47ad64caccf6e5c026673543fc", "title": "Living Things Are Not (20th Century) Machines: Updating Mechanism Metaphors in Light of the Modern Science of Machine Behavior", "abstract": "One of the most useful metaphors for driving scientific and engineering progress has been that of the \u201cmachine.\u201d Much controversy exists about the applicability of this concept in the life sciences. Advances in molecular biology have revealed numerous design principles that can be harnessed to understand cells from an engineering perspective, and build novel devices to rationally exploit the laws of chemistry, physics, and computation. At the same time, organicists point to the many unique features of life, especially at larger scales of organization, which have resisted decomposition analysis and artificial implementation. Here, we argue that much of this debate has focused on inessential aspects of machines \u2013 classical properties which have been surpassed by advances in modern Machine Behavior and no longer apply. This emerging multidisciplinary field, at the interface of artificial life, machine learning, and synthetic bioengineering, is highlighting the inadequacy of existing definitions. Key terms such as machine, robot, program, software, evolved, designed, etc., need to be revised in light of technological and theoretical advances that have moved past the dated philosophical conceptions that have limited our understanding of both evolved and designed systems. Moving beyond contingent aspects of historical and current machines will enable conceptual tools that embrace inevitable advances in synthetic and hybrid bioengineering and computer science, toward a framework that identifies essential distinctions between fundamental concepts of devices and living agents. Progress in both theory and practical applications requires the establishment of a novel conception of \u201cmachines as they could be,\u201d based on the profound lessons of biology at all scales. We sketch a perspective that acknowledges the remarkable, unique aspects of life to help re-define key terms, and identify deep, essential features of concepts for a future in which sharp boundaries between evolved and designed systems will not exist.", "venue": "Frontiers in Ecology and Evolution", "year": 2021, "referenceCount": 188, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fevo.2021.650726/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-16", "journal": {"volume": "9"}, "authors": [{"authorId": "7373730", "name": "J. Bongard"}, {"authorId": "145616961", "name": "M. Levin"}]}, {"paperId": "9e59899c6e1bb1b512b5e3728e1584fba80b69cf", "externalIds": {"MAG": "3134075441", "DOI": "10.1108/978-1-83909-694-520211003", "CorpusId": 233664722}, "corpusId": 233664722, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9e59899c6e1bb1b512b5e3728e1584fba80b69cf", "title": "Intelligent Applications in the Modern Sales Organization", "abstract": "Applications powered by artificial intelligence (AI) and machine learning (ML) have become a crucial factor for success in modern sales organizations. This chapter investigates how Salesforce achieves scalable AI for businesses of all sizes and explores sales applications of AI and machine learning that are most common across industries. It is divided into three sections. The first section gives an introduction to AI and machine learning. The second section shows how data and automated machine learning models provide the foundation for AI applications and explains how Salesforce achieves scalable AI and machine learning for business applications. The third section demonstrates how AI applications impact the modern sales organization and the work of sales representatives. AI does not replace humans; it allows sales organizations to better engage with prospects and customers. Sales representatives using AI outperform their counterparts that rely purely on traditional methods.", "venue": "", "year": 2021, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-15", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2088248900", "name": "Gilberto Picareta"}, {"authorId": "2087564217", "name": "Eugenie Weissheim"}, {"authorId": "2087564040", "name": "Martin Kl\u00f6hn"}]}, {"paperId": "14e8bd16197056021613bfd55c136776d320d4b9", "externalIds": {"MAG": "3137457055", "DBLP": "journals/nms/Shin22", "DOI": "10.1177/1461444821993801", "CorpusId": 233672302}, "corpusId": 233672302, "publicationVenue": {"id": "a9adf059-5c23-4df1-915b-a3ce3bb66500", "name": "New Media & Society", "type": "journal", "alternate_names": ["New Media Soc"], "issn": "1461-4448", "url": "https://journals.sagepub.com/loi/nms", "alternate_urls": ["http://nms.sagepub.com/"]}, "url": "https://www.semanticscholar.org/paper/14e8bd16197056021613bfd55c136776d320d4b9", "title": "The perception of humanness in conversational journalism: An algorithmic information-processing perspective", "abstract": "How much do anthropomorphisms influence the perception of users about whether they are conversing with a human or an algorithm in a chatbot environment? We develop a cognitive model using the constructs of anthropomorphism and explainability to explain user experiences with conversational journalism (CJ) in the context of chatbot news. We examine how users perceive anthropomorphic and explanatory cues, and how these stimuli influence user perception of and attitudes toward CJ. Anthropomorphic explanations of why and how certain items are recommended afford users a sense of humanness, which then affects trust and emotional assurance. Perceived humanness triggers a two-step flow of interaction by defining the baseline to make a judgment about the qualities of CJ and by affording the capacity to interact with chatbots concerning their intention to interact with chatbots. We develop practical implications relevant to chatbots and ascertain the significance of humanness as a social cue in CJ. We offer a theoretical lens through which to characterize humanness as a key mechanism of human\u2013artificial intelligence (AI) interaction, of which the eventual goal is humans perceive AI as human beings. Our results help to better understand human\u2013chatbot interaction in CJ by illustrating how humans interact with chatbots and explaining why humans accept the way of CJ.", "venue": "New Media & Society", "year": 2021, "referenceCount": 50, "citationCount": 24, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-12", "journal": {"volume": "24", "pages": "2680 - 2704", "name": "New Media & Society"}, "authors": [{"authorId": "2149547874", "name": "Donghee Shin"}]}, {"paperId": "fa2b4b704ba4fabb93548c5e3595f26f726221f9", "externalIds": {"MAG": "3157605529", "DOI": "10.1002/9781119634140.CH10", "CorpusId": 235589290}, "corpusId": 235589290, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fa2b4b704ba4fabb93548c5e3595f26f726221f9", "title": "AI AND MACHINE LEARNING MODELING", "abstract": null, "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-08", "journal": {"volume": "", "pages": "235-249", "name": ""}, "authors": [{"authorId": "2143747140", "name": "Amit Gupta"}, {"authorId": "4339803", "name": "F. Zhu"}]}, {"paperId": "281b4a7e7fb057d8266ec0610888905c46fd715d", "externalIds": {"ArXiv": "2110.04984", "DBLP": "journals/corr/abs-2103-03125", "CorpusId": 232110776}, "corpusId": 232110776, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/281b4a7e7fb057d8266ec0610888905c46fd715d", "title": "Advances in Multi-turn Dialogue Comprehension: A Survey", "abstract": "Training machines to understand natural language and interact with humans is an elusive and essential task in the field of artificial intelligence. In recent years, a diversity of dialogue systems has been designed with the rapid development of deep learning researches, especially the recent pre-trained language models. Among these studies, the fundamental yet challenging part is dialogue comprehension whose role is to teach the machines to read and comprehend the dialogue context before responding. In this paper, we review the previous methods from the perspective of dialogue modeling. We summarize the characteristics and challenges of dialogue comprehension in contrast to plaintext reading comprehension. Then, we discuss three typical patterns of dialogue modeling that are widely-used in dialogue comprehension tasks such as response selection and conversation questionanswering, as well as dialogue-related language modeling techniques to enhance PrLMs in dialogue scenarios. Finally, we highlight the technical advances in recent years and point out the lessons we can learn from the empirical analysis and the prospects towards a new frontier of researches.", "venue": "ArXiv", "year": 2021, "referenceCount": 106, "citationCount": 9, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-03-04", "journal": {"volume": "abs/2110.04984", "name": "ArXiv"}, "authors": [{"authorId": "3322871", "name": "Zhuosheng Zhang"}, {"authorId": "47941144", "name": "Hai Zhao"}]}, {"paperId": "4de6f9f9b9f19a12ba5d1ee3639007c4951d24eb", "externalIds": {"MAG": "3133620426", "DOI": "10.1177/1075547021998069", "CorpusId": 233790708}, "corpusId": 233790708, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4de6f9f9b9f19a12ba5d1ee3639007c4951d24eb", "title": "\u201cSiri, Show Me Scary Images of AI\u201d: Effects of Text-Based Frames and Visuals on Support for Artificial Intelligence", "abstract": "This research note examines how framing influences attitudes toward artificial intelligence (AI). It uses an experiment embedded in a nationally representative online survey to test the effects of text-based frames and visuals on opinion about developing, funding, and banning AI. Participants exposed to a \u201csocial progress\u201d frame reported greater support for AI than those exposed to a \u201cPandora\u2019s box\u201d frame. Images (virtual assistants, personal robots, menacing movie AIs, or none) did not influence opinion by themselves but interacted with textual frames to do so. The results extend our understanding of framing effects on public attitudes toward emerging technologies.", "venue": "", "year": 2021, "referenceCount": 43, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://escholarship.org/content/qt5sk4h13h/qt5sk4h13h.pdf?t=rfbntg", "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-03-03", "journal": {"volume": "43", "pages": "388 - 401", "name": "Science Communication"}, "authors": [{"authorId": "2005499319", "name": "James Bingaman"}, {"authorId": "11551763", "name": "P. Brewer"}, {"authorId": "146152595", "name": "Ashley Paintsil"}, {"authorId": "1742444222", "name": "David C. Wilson"}]}, {"paperId": "9a188bcf450d40ef85e7c6aabef08c6263165ecc", "externalIds": {"MAG": "3133730873", "DOI": "10.15168/2284-4503-756", "CorpusId": 233455776}, "corpusId": 233455776, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a188bcf450d40ef85e7c6aabef08c6263165ecc", "title": "Artificial and Biological Neurons: Interdisciplinary Issues and Future Perspectives. White Paper", "abstract": "Recent developments in the technological domain have increased the interactions between artificial and natural spheres, leading to a growing interest in the ethical, legal and philosophical implications of AI research. The present paper aims at creating an interdisciplinary discussion on issues raised by the use and the implementation of artificial intelligence algorithms, robotics, and applied solutions in the neuroscience and biotechnology field. Building on the findings of the webinar \u201cWorkshop neuroni artificial e biologici: etica e diritto\u201d, this work explores the issues discussed in the workshop, it attempts to show both the existing challenges and opportunities and it seeks to propose ways forward to overcome some of the investigated problems.", "venue": "", "year": 2021, "referenceCount": 41, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-03", "journal": {"volume": "21", "pages": "353-379", "name": ""}, "authors": [{"authorId": "2035521122", "name": "Davide Bazzanella"}, {"authorId": "146774374", "name": "G. Bincoletto"}, {"authorId": "134377547", "name": "Monica Consolandi"}, {"authorId": "2106052826", "name": "Marta Fasan"}, {"authorId": "49393697", "name": "F. Gennari"}, {"authorId": "1730394478", "name": "Federico C. La Vattiata"}, {"authorId": "2063076216", "name": "Luca Rinaldi"}, {"authorId": "3706983", "name": "Davide Roccaro"}, {"authorId": "2061566259", "name": "Clara Zaccaria"}]}, {"paperId": "b390e8262dd6b744e26145fbf8502f5fdd069277", "externalIds": {"DBLP": "conf/sigcse/FreitasW21", "DOI": "10.1145/3408877.3432530", "CorpusId": 232126309}, "corpusId": 232126309, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b390e8262dd6b744e26145fbf8502f5fdd069277", "title": "I'm Going to Learn What?!?: Teaching Artificial Intelligence to Freshmen in an Introductory Computer Science Course", "abstract": "As artificial intelligence (AI) becomes more widely utilized, there is a need for non-computer scientists to understand 1) how the technology works, and 2) how it can impact their lives. Currently, however, computer science educators have been reluctant to teach AI to non-majors out of concern that the topic is too advanced. To fill this gap, we propose an AI and machine learning (ML) curriculum that is specifically designed for first-year students. In this paper, we describe our curriculum and show how it covers four key content areas: core concepts, implementation details, limitations, and ethical considerations. We then share our experiences teaching our new curriculum to 174 randomly-selected Freshman students. Our results show that non-computer scientists can comprehend AI/ML concepts without being overwhelmed by the subject material. Specifically, we show that students can design, code, and deploy their own intelligent agents to solve problems, and that they understand the importance and value of learning about AI in a general-education course.", "venue": "SIGCSE", "year": 2021, "referenceCount": 37, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2021-03-03", "journal": {"name": "Proceedings of the 52nd ACM Technical Symposium on Computer Science Education"}, "authors": [{"authorId": "1792691", "name": "Adrian A. de Freitas"}, {"authorId": "2383160", "name": "T. Weingart"}]}, {"paperId": "246d804bfedc24e91f1ace6cf165eb392800b3c0", "externalIds": {"MAG": "3136952027", "ArXiv": "2103.02395", "DOI": "10.1016/J.TECHFORE.2021.120723", "CorpusId": 232105178}, "corpusId": 232105178, "publicationVenue": {"id": "5eb1fac4-44ea-4270-b31e-3fb4dd8247cb", "name": "Technological forecasting & social change", "type": "journal", "alternate_names": ["Technological Forecasting and Social Change", "Technol forecast soc chang", "Technol Forecast Soc Chang"], "issn": "0040-1625", "url": "https://www.journals.elsevier.com/technological-forecasting-and-social-change/", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00401625"]}, "url": "https://www.semanticscholar.org/paper/246d804bfedc24e91f1ace6cf165eb392800b3c0", "title": "Automation-driven innovation management? Toward Innovation-Automation-Strategy cycle", "abstract": null, "venue": "Technological forecasting & social change", "year": 2021, "referenceCount": 129, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2103.02395", "status": null}, "fieldsOfStudy": ["Computer Science", "Economics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-03", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "50704376", "name": "P. Makowski"}, {"authorId": "2030582", "name": "Y. Kajikawa"}]}, {"paperId": "0568ddcfe9ada74b1f4a502c1663ab84a6e0978c", "externalIds": {"DBLP": "conf/icict2/MercioniH21", "DOI": "10.1109/ICICT52872.2021.00010", "CorpusId": 236188435}, "corpusId": 236188435, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0568ddcfe9ada74b1f4a502c1663ab84a6e0978c", "title": "Soft Clipping Mish - A Novel Activation Function for Deep Learning", "abstract": "This study aims to introduce a novel activation function, called Soft Clipping Mish. In other words, it brings improvements in order to increase the performance within the architecture. Its capability was tested on different scenarios using different datasets and using LeNet-5 architecture. So, these different testing conditions strengthen our proposal, the fact also emphasized in the experimental phase. We used such as datasets: MNIST, Fashion-MNIST, CIFAR-10, CIFAR-100 for a classification task, and Beijing PM2.5 dataset for a prediction task to determine the rank of air pollution. We introduced two variants of this function, the first variant being Soft Clipping Mish with a predefined parameter and the second variant being Soft Clipping Mish learnable, the learnable parameter giving us more flexibility into weights updates. This learnable parameter was initialized during the training phase with a value equal to 0.25. Our proposal was inspired by a recent activation function called Mish.", "venue": "2021 4th International Conference on Information and Computer Technologies (ICICT)", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-03-01", "journal": {"pages": "13-17", "name": "2021 4th International Conference on Information and Computer Technologies (ICICT)"}, "authors": [{"authorId": "51243076", "name": "Marina Adriana Mercioni"}, {"authorId": "1681573", "name": "S. Holban"}]}, {"paperId": "24977653dc0868968b6f6523682070d8eebb57c8", "externalIds": {"DBLP": "conf/vr/RebolGP21", "ArXiv": "2107.00712", "DOI": "10.1109/VR50410.2021.00082", "CorpusId": 234478889}, "corpusId": 234478889, "publicationVenue": {"id": "8b5a4b01-a494-4d68-b69a-e32afb408419", "name": "IEEE Conference on Virtual Reality and 3D User Interfaces", "type": "conference", "alternate_names": ["IEEE Conf Virtual Real 3D User Interface", "IEEE Virtual Real Conf", "VR", "IEEE Virtual Reality Conference"], "url": "http://ieeevr.org/"}, "url": "https://www.semanticscholar.org/paper/24977653dc0868968b6f6523682070d8eebb57c8", "title": " Passing a Non-verbal Turing Test: Evaluating Gesture Animations Generated from Speech", "abstract": "In real life, people communicate using both speech and non-verbal signals such as gestures, face expression or body pose. Non-verbal signals impact the meaning of the spoken utterance in an abundance of ways. An absence of non-verbal signals impoverishes the process of communication. Yet, when users are represented as avatars, it is difficult to translate non-verbal signals along with the speech into the virtual world without specialized motion-capture hardware. In this paper, we propose a novel, data-driven technique for generating gestures directly from speech. Our approach is based on the application of Generative Adversarial Neural Networks (GANs) to model the correlation rather than causation between speech and gestures. This approach approximates neuroscience findings on how non-verbal communication and speech are correlated. We create a large dataset which consists of speech and corresponding gestures in a 3D human pose format from which our model learns the speaker-specific correlation. We evaluate the proposed technique in a user study that is inspired by the Turing test. For the study, we animate the generated gestures on a virtual character. We find that users are not able to distinguish between the generated and the recorded gestures. Moreover, users are able to identify our synthesized gestures as related or not related to a given utterance.", "venue": "IEEE Conference on Virtual Reality and 3D User Interfaces", "year": 2021, "referenceCount": 54, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2107.00712", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "573-581", "name": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)"}, "authors": [{"authorId": "1850410410", "name": "M. Rebol"}, {"authorId": "1680870", "name": "C. G\u00fctl"}, {"authorId": "2408097", "name": "Krzysztof Pietroszek"}]}, {"paperId": "2782952aa78053f79c8bde3332466d438301d210", "externalIds": {"MAG": "3135930035", "DOI": "10.1016/J.TRIP.2021.100331", "CorpusId": 233832194}, "corpusId": 233832194, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2782952aa78053f79c8bde3332466d438301d210", "title": "The role of route familiarity in traffic participants\u2019 behaviour and transport psychology research: A systematic review", "abstract": null, "venue": "", "year": 2021, "referenceCount": 117, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-03-01", "journal": {"volume": "9", "pages": "100331", "name": ""}, "authors": [{"authorId": "47717884", "name": "I. Harms"}, {"authorId": "30153336", "name": "B. Burdett"}, {"authorId": "7513306", "name": "S. Charlton"}]}, {"paperId": "36a9ba34659b430c3c6554ba6b515a7a124d1eb8", "externalIds": {"MAG": "3150662351", "DOI": "10.25046/AJ060212", "CorpusId": 233468801}, "corpusId": 233468801, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/36a9ba34659b430c3c6554ba6b515a7a124d1eb8", "title": "Designing and Applying a Moral Turing Test", "abstract": "A R T I C L E I N F O A B S T R A C T Article history: Received: 25 December, 2020 Accepted: 20 February, 2021 Online: 10 March, 2021 This study attempts to develop theoretical criteria for verifying the morality of the actions of artificial intelligent agents, using the Turing test as an archetype and inspiration. This study develops ethical criteria established based on Kohlberg\u2019s moral development theory that might help determine the types of moral acts committed by artificial intelligent agents. Subsequently, it leverages these criteria in a test experiment with Korean children aged around ten years. The study concludes that the 10-year-old test participants\u2019 stage of moral development falls between the first and second types of moral acts in moral Turing tests. We evaluate the moral behavior type experiment by applying it to Korean elementary school students aged about ten years old. Moreover, this study argues that if a similar degree of reaction is obtained by applying this experiment to future healthcare robots, this healthcare robot can be recognized as passing the moral Turing test.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://astesj.com/?smd_process_download=1&download_id=26453", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-01", "journal": {"volume": "6", "pages": "93-98", "name": "Advances in Science, Technology and Engineering Systems Journal"}, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo Kim"}, {"authorId": "73772677", "name": "Sunyong Byun"}]}, {"paperId": "ab7deb9ff1d5f877a482d08d61afee0ffbb90171", "externalIds": {"MAG": "3136158291", "DOI": "10.26267/UNIPI_DIONE/744", "CorpusId": 233364361}, "corpusId": 233364361, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ab7deb9ff1d5f877a482d08d61afee0ffbb90171", "title": "Classifying melanoma images with ensembles of deep convolutional neural networks", "abstract": "Malignant melanoma is the deadliest form of skin cancer and is one of the most rapidly increasing cancers in the world. Proper diagnosis of melanoma at an earlier stage is crucial for a high rate of complete cure. Both patient and physician awareness regarding the signs and symptoms of early melanoma remains paramount. Hence, a reliable automatic melanoma screening system would provide a great help for clinicians to detect the malignant skin lesions as early as possible. In the last years, the efficiency of deep learning-based methods increased dramatically and their performances seem to outperform conventional image processing methods in classification tasks. \nIn this master thesis, the EfficientNet family of convolutional neural networks is utilized and extended for identifying malignant melanoma on a dataset of 58,457 dermoscopic images of pigmented skin lesions. A comparative study of the effects of different training configurations is conducted to reveal what contributes to improve performance, and all trained networks are aggregated with an ensembling strategy to further improve individual results. \nThe proposed method has been evaluated on the SIIM-ISIC Melanoma Classification 2020 dataset and the best ensemble model achieved 0.9404 area under the ROC curve score on hold out test data.", "venue": "", "year": 2021, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2088538574", "name": "\u039c\u03b5\u03bb\u03af\u03bd\u03b1 \u03a4\u03b6\u03b9\u03bf\u03bc\u03ac\u03ba\u03b1"}, {"authorId": "2088535238", "name": "Melina Tziomaka"}]}, {"paperId": "ba784cde1ddf8f46a97d0c1e1aa1cbfb7d6c9fd1", "externalIds": {"MAG": "3135157978", "DOI": "10.1111/PHIN.12308", "CorpusId": 233882077}, "corpusId": 233882077, "publicationVenue": {"id": "1ed15c89-e6bd-4cab-ada4-266d13e0576a", "name": "Philosophical Investigation", "type": "journal", "alternate_names": ["Philosophical Investigations", "Philos Investig"], "issn": "1598-7213", "alternate_issns": ["2251-7960", "0190-0536"], "url": "https://philosophy.tabrizu.ac.ir/", "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-9205"]}, "url": "https://www.semanticscholar.org/paper/ba784cde1ddf8f46a97d0c1e1aa1cbfb7d6c9fd1", "title": "No Picnic: Cavell on Rule\u2010Descriptions", "abstract": "In his \ufb01rst paper, \u2018Must We Mean What We Say?\u2019, Stanley Cavell defended the methods of ordinary language philosophy against various charges made by his senior colleague, Benson Mates, under the in\ufb02uence of the empirical semantics of Arne Naess. 1 Cavell\u2019s argument hinges on the claim that native speakers are a source of evidence for \u2019what is said\u2019 in language and, accordingly, need not base their claims about ordinary language upon evidence. In what follows, I maintain that this defence against empirical semantics applies equally well to experimental philosophy\u2019s attack on doing philosophy from the armchair. In so doing, I attempt to clarify \u2013 and adjust \u2013 Cavell\u2019s claim that statements about ordinary language are rule-descriptions that are neither analytic nor synthetic.", "venue": "Philosophical Investigation", "year": 2021, "referenceCount": 144, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://uhra.herts.ac.uk/bitstream/2299/24010/1/phin_12308.pdf", "status": null}, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-27", "journal": {"name": "Philosophical Investigations"}, "authors": [{"authorId": "3479121", "name": "C. Sandis"}]}, {"paperId": "6af7e84404e3add7fc3ffcfa3c2270ee5ec543d9", "externalIds": {"DBLP": "journals/symmetry/Jun21", "DOI": "10.3390/sym13030389", "CorpusId": 233246956}, "corpusId": 233246956, "publicationVenue": {"id": "1620da87-4387-4b9a-9bf4-22fdf74d4dc3", "name": "Symmetry", "type": "journal", "issn": "2073-8994", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-172134", "alternate_urls": ["https://www.mdpi.com/journal/symmetry", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-172134"]}, "url": "https://www.semanticscholar.org/paper/6af7e84404e3add7fc3ffcfa3c2270ee5ec543d9", "title": "Machines Imitating Human Thinking Using Bayesian Learning and Bootstrap", "abstract": "In the field of cognitive science, much research has been conducted on the diverse applications of artificial intelligence (AI). One important area of study is machines imitating human thinking. Although there are various approaches to development of thinking machines, we assume that human thinking is not always optimal in this paper. Sometimes, humans are driven by emotions to make decisions that are not optimal. Recently, deep learning has been dominating most machine learning tasks in AI. In the area of optimal decisions involving AI, many traditional machine learning methods are rapidly being replaced by deep learning. Therefore, because of deep learning, we can expect the faster growth of AI technology such as AlphaGo in optimal decision-making. However, humans sometimes think and act not optimally but emotionally. In this paper, we propose a method for building thinking machines imitating humans using Bayesian decision theory and learning. Bayesian statistics involves a learning process based on prior and posterior aspects. The prior represents an initial belief in a specific domain. This is updated to posterior through the likelihood of observed data. The posterior refers to the updated belief based on observations. When the observed data are newly added, the current posterior is used as a new prior for the updated posterior. Bayesian learning such as this also provides an optimal decision; thus, this is not well-suited to the modeling of thinking machines. Therefore, we study a new Bayesian approach to developing thinking machines using Bayesian decision theory. In our research, we do not use a single optimal value expected by the posterior; instead, we generate random values from the last updated posterior to be used for thinking machines that imitate human thinking.", "venue": "Symmetry", "year": 2021, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2073-8994/13/3/389/pdf?version=1614829203", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-27", "journal": {"volume": "13", "pages": "389", "name": "Symmetry"}, "authors": [{"authorId": "2052577018", "name": "Sunghae Jun"}]}, {"paperId": "0f61f9cd3483eef14614a301557439f6008b9074", "externalIds": {"DBLP": "journals/ki/Butz21", "DOI": "10.1007/s13218-021-00705-x", "CorpusId": 232433494}, "corpusId": 232433494, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f61f9cd3483eef14614a301557439f6008b9074", "title": "Towards Strong AI", "abstract": null, "venue": "K\u00fcnstliche Intell.", "year": 2021, "referenceCount": 120, "citationCount": 10, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13218-021-00705-x.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-26", "journal": {"volume": "35", "pages": "91-101", "name": "KI - K\u00fcnstliche Intelligenz"}, "authors": [{"authorId": "1732540", "name": "Martin Volker Butz"}]}, {"paperId": "79640acf4ec1b666a56facebd2db2bf9a2b29959", "externalIds": {"MAG": "3131579087", "DOI": "10.22158/JRPH.V4N1P52", "CorpusId": 233931683}, "corpusId": 233931683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79640acf4ec1b666a56facebd2db2bf9a2b29959", "title": "The Fuzzy Completeness Theory", "abstract": "The Two Incompleteness Theorems of Kurt Friedrich G\u00f6del and the Impossibility Theorem of Kenneth Arrow claim that logic, the most reliable of human knowledge, is incomplete or can be inconsistent. The Fuzzy Completeness Theory states that the Fuzzy Logic of Lotfi A. Zadeh has resolved the incompleteness and impossibility in logic and made logic complete and knowledge reliable with the new concept of Range of Tolerance, within which logic is still complete and knowledge, valid. In the Age of Reason about 300 years ago just prior to the Age of Science, reasoning is free for all, without the constraint of the laws of nature, which would be discovered in the Age of Science. However, the Scientific Method of reasoning by empirical verification depends so much on faith that it is logically and empirically dismissed by mathematicians and logicians, especially, after the exposure by Thomas Kuhn and Paul Feyerabend that a scientific advancement is akin to a religious conversion. On the other hand, mathematicians and logicians have been working steadily to find the limit of reliable knowledge. In the current state of knowledge, Kurt G\u00f6del has the last word with his Two Incompleteness Theorems, which conclude that the most reliable of human knowledge, logic, is incomplete, casting doubt whether knowledge is completely reliable. G\u00f6del\u2019s view is further supported by the Impossibility Theorem of Kenneth Arrow. However, Zadeh and the author of this paper extend Zadeh\u2019s concept of Range of Value in Fuzzy Logic to that of Range of Tolerance. Accordingly, Fuzzy Logic deals with the sacrifice of precision in the process of expanding the Range of Tolerance of a creation in order for the creation to survive and flourish for all the possibility of an uncertain future. In knowledge, incompleteness in logic can be resolved by the Range of Tolerance covering the incomplete part or ignoring the infrequent impossibilities, and, thus, making logic valid, again. Knowledge is derived generally from reason. Technically, the Fuzzy Completeness Theory classifies 16 Methods of Reason. The 16 Methods are the combination of the 4 basic Methods of Reason: 1) Logic, 2) Mathematics, 3) Empirical Verification, and 4) Others, each of which has 2 forms: 1) Fuzzy and 2) Exact and two types: 1) Complete and 2) Incomplete. G\u00f6del, Arrow, and the Author agree that no matter how rigorous is the Method of Reason the reason cannot be complete, when the reason is Exact. When a solution is newly defined as an answer within the Range of Tolerance of the solution, Fuzzy Logic resolves the incompleteness in logic and becomes the new foundation of knowledge, replacing Exact Logic. With this definition of a solution, Fuzzy Logic covers the incomplete or the impossible parts of the solution by expanding sufficiently the Range of Tolerance to make reason complete and knowledge reliable, but only within the Range of Tolerance. To summarize, even though the world\u2019s leading intellectuals have proven, directly, that logic is incomplete and, indirectly, that knowledge is invalid, reality is still operating smoothly, and science has even demonstrated the power of knowledge. The conflict between the most reliable knowledge, namely, logic and the real world is resolved by Fuzzy Logic, which introduces the new concept of Range of Tolerance, within which reality can still operate in accordance with the laws discovered by knowledge. In sum, reality is fuzzy, not exact. The breakthrough impact of this paper centers around completeness theory and Fuzzy Logic. In the early 21st century, the mainstream knowledge is still not aware that the supply and demand model is incomplete, and that the DNA-protein system resembles computer science based on logic more than science based on experimentation. The current computer is based on exact logic and is designed for temporary existence, while the living system is design for permanent existence and must depend on the Range of Tolerance based on Fuzzy Logic to survive permanently in an uncertain future. Financial crises will be caused by the unstable investment return, which is the incomplete part in the supply demand model. Complexity crises will be caused by the lack of the requirement of permanence or complete automation, which is the ultimate solution to unlimited complexity. The 16 Methods of Reason correspond roughly to Culture Level Quotient (CLQ), which is a non-technical measure of a person, a people or a nation.", "venue": "Journal of Research in Philosophy and History", "year": 2021, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.scholink.org/ojs/index.php/jrph/article/download/3725/3847", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-24", "journal": {"name": "Journal of Research in Philosophy and History"}, "authors": [{"authorId": "32693480", "name": "H. Ching"}]}, {"paperId": "58031ca782dea438f65a9729f17d131d181a42b6", "externalIds": {"DBLP": "journals/imds/JiaCH21", "MAG": "3132663149", "DOI": "10.1108/IMDS-11-2020-0664", "CorpusId": 233896342}, "corpusId": 233896342, "publicationVenue": {"id": "3235a2bb-118f-4abc-9046-80342279a154", "name": "Industrial management & data systems", "type": "journal", "alternate_names": ["Industrial Management and Data Systems", "Ind manag data syst", "Ind Manag Data Syst"], "issn": "0263-5577", "url": "https://www.emerald.com/insight/publication/issn/0263-5577"}, "url": "https://www.semanticscholar.org/paper/58031ca782dea438f65a9729f17d131d181a42b6", "title": "Assessing the hotel service robot interaction on tourists' behaviour: the role of anthropomorphism", "abstract": "PurposeThe main purpose of this study is to investigate the impact of service robots on hotel visitors' behaviour and to verify the role of anthropomorphism(human likeness) in customer satisfaction with robots.Design/methodology/approachAn online survey of 381 respondents was conducted, divided into three types of robots according to the level of anthropomorphism. The research model was thoroughly tested using the PLS-SEM method. Research model was tested thoroughly using the PLS-SEM method.FindingsThis study found that user satisfaction with service robots in a hotel had a positive impact on user satisfaction, attitude towards the hotel and room purchase intention. Moreover, our results showed that users were most likely to accept medium-human likeness robots and least likely to accept high\u2013human likeness robots.Originality/valueThis study proposes influencing factors to be considered when researching hotel service robots, as well as practical suggestions for any hotel intending to use or currently using a service robot.", "venue": "Industrial management & data systems", "year": 2021, "referenceCount": 52, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-22", "journal": {"volume": "121", "pages": "1457-1478", "name": "Ind. Manag. Data Syst."}, "authors": [{"authorId": "2117240011", "name": "J. Jia"}, {"authorId": "1785137", "name": "Namho Chung"}, {"authorId": "12480613", "name": "Jooyoung Hwang"}]}, {"paperId": "718f3dd68aa63e43480234c1a07c09e87b4e014f", "externalIds": {"MAG": "3129270107", "DOI": "10.3390/ELECTRONICS10040514", "CorpusId": 233953901}, "corpusId": 233953901, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/718f3dd68aa63e43480234c1a07c09e87b4e014f", "title": "Relations between Electronics, Artificial Intelligence and Information Society through Information Society Rules", "abstract": "This paper presents relations between information society (IS), electronics and artificial intelligence (AI) mainly through twenty-four IS laws. The laws not only make up a novel collection, currently non-existing in the literature, but they also highlight the core boosting mechanism for the progress of what is called the information society and AI. The laws mainly describe the exponential growth in a particular field, be it the processing, storage or transmission capabilities of electronic devices. Other rules describe the relations to production prices and human interaction. Overall, the IS laws illustrate the most recent and most vibrant part of human history based on the unprecedented growth of device capabilities spurred by human innovation and ingenuity. Although there are signs of stalling, at the same time there are still many ways to prolong the fascinating progress of electronics that stimulates the field of artificial intelligence. There are constant leaps in new areas, such as the perception of real-world signals, where AI is already occasionally exceeding human capabilities and will do so even more in the future. In some areas where AI is presumed to be incapable of performing even at a modest level, such as the production of art or programming software, AI is making progress that can sometimes reflect true human skills. Maybe it is time for AI to boost the progress of electronics in return.", "venue": "Electronics", "year": 2021, "referenceCount": 106, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2079-9292/10/4/514/pdf?version=1614251710", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-22", "journal": {"name": "Electronics"}, "authors": [{"authorId": "10269507", "name": "M. Gams"}, {"authorId": "40802688", "name": "Tine Kolenik"}]}, {"paperId": "56586eb758d7fabdbbd5ee4c5ed7e30c6d457d30", "externalIds": {"DBLP": "journals/corr/abs-2102-10242", "ACL": "2021.emnlp-main.589", "ArXiv": "2102.10242", "DOI": "10.18653/v1/2021.emnlp-main.589", "CorpusId": 231986109}, "corpusId": 231986109, "publicationVenue": {"id": "41bf9ed3-85b3-4c90-b015-150e31690253", "name": "Conference on Empirical Methods in Natural Language Processing", "type": "conference", "alternate_names": ["Empir Method Nat Lang Process", "Empirical Methods in Natural Language Processing", "Conf Empir Method Nat Lang Process", "EMNLP"], "url": "https://www.aclweb.org/portal/emnlp"}, "url": "https://www.semanticscholar.org/paper/56586eb758d7fabdbbd5ee4c5ed7e30c6d457d30", "title": "Towards Automatic Evaluation of Dialog Systems: A Model-Free Off-Policy Evaluation Approach", "abstract": "Reliable automatic evaluation of dialogue systems under an interactive environment has long been overdue. An ideal environment for evaluating dialog systems, also known as the Turing test, needs to involve human interaction, which is usually not affordable for large-scale experiments. Though researchers have attempted to use metrics for language generation tasks (e.g., perplexity, BLEU) or some model-based reinforcement learning methods (e.g., self-play evaluation) for automatic evaluation, these methods only show very weak correlation with the actual human evaluation in practice. To bridge such a gap, we propose a new framework named ENIGMA for estimating human evaluation scores based on recent advances of off-policy evaluation in reinforcement learning. ENIGMA only requires a handful of pre-collected experience data, and therefore does not involve human interaction with the target policy during the evaluation, making automatic evaluations feasible. More importantly, ENIGMA is model-free and agnostic to the behavior policies for collecting the experience data, which significantly alleviates the technical difficulties of modeling complex dialogue environments and human behaviors. Our experiments show that ENIGMA significantly outperforms existing methods in terms of correlation with human evaluation scores.", "venue": "Conference on Empirical Methods in Natural Language Processing", "year": 2021, "referenceCount": 86, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://aclanthology.org/2021.emnlp-main.589.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-02-20", "journal": {"pages": "7419-7451"}, "authors": [{"authorId": "5795999", "name": "Haoming Jiang"}, {"authorId": "144445937", "name": "Bo Dai"}, {"authorId": "46235335", "name": "Mengjiao Yang"}, {"authorId": "2149192597", "name": "Wei Wei"}, {"authorId": "36345161", "name": "T. Zhao"}]}, {"paperId": "4c272d7fbfb744261aafe9a51806e0dbebcde80c", "externalIds": {"DBLP": "conf/iseeie/RoshdyKKSBEBN21", "DOI": "10.1145/3459104.3459154", "CorpusId": 236145620}, "corpusId": 236145620, "publicationVenue": {"id": "4370a5fb-85bb-4d8b-87da-830e021182dc", "name": "International Symposium on Electrical, Electronics and Information Engineering", "type": "conference", "alternate_names": ["ISEEIE", "Int Symp Electr Electron Inf Eng"]}, "url": "https://www.semanticscholar.org/paper/4c272d7fbfb744261aafe9a51806e0dbebcde80c", "title": "Machine Empathy: Digitizing Human Emotions", "abstract": "The primary objective of this work is to emulate machine empathy through digitizing human emotions. A simple proofof-concept experiment is conducted, where a brain-computer interface (BCI) captures the brain's electroencephalogram (EEG) signals using an Emotiv Epoc headset. A two dimensional (2D) intensity (heat) map of the brain's EEG is obtained for a pre-defined set of an emotional stimulus, namely excitement and stress. An artificial neural network (ANN) is subsequently used for classifying the 2D image. The key contribution of this work is to leverage the already powerful and mature tools for image recognition developed in ANN systems for emotion recognition through adapting the 2D intensity map of the EEG brain activity. The resulting BCI system was set-up to control a surrogate humanoid robot, allowing the robot to emulate empathy and interact with the subject according to pre-defined behavioural models. The ANN classifier exhibited an accuracy of 87.5% for recognizing two of the emotional states targeted in this study.", "venue": "International Symposium on Electrical, Electronics and Information Engineering", "year": 2021, "referenceCount": 21, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-02-19", "journal": {"name": "2021 International Symposium on Electrical, Electronics and Information Engineering"}, "authors": [{"authorId": "46909195", "name": "A. Roshdy"}, {"authorId": "2488767", "name": "S. A. Kork"}, {"authorId": "8908772", "name": "A. Karar"}, {"authorId": "32698580", "name": "A. Sabi"}, {"authorId": "2921535", "name": "Z. A. Barakeh"}, {"authorId": "2120200055", "name": "Fahmi ElSayed"}, {"authorId": "1892267", "name": "T. Beyrouthy"}, {"authorId": "1399329283", "name": "A. Na\u00eft-Ali"}]}, {"paperId": "f0e103b4104a89826b648fce61a082e71de6be1d", "externalIds": {"MAG": "3153638464", "DOI": "10.1109/ICAECT49130.2021.9392456", "CorpusId": 234999934}, "corpusId": 234999934, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f0e103b4104a89826b648fce61a082e71de6be1d", "title": "Artificial Intelligence Based Approach to Validate the Authenticity of News", "abstract": "Misinformation isn\u2019t definitely new thing; it is way before the inception of social media. It is evolving since 14th century but the term like \"fake news\", \"post truth\" are used commonly during movement of 2016 US presidential election. People use social media to read news as it is lost cost and user friendly platform; also it is possible to share news on social media with one click. With this merit, it is also having major disadvantage. If the news is false or misleading news then spread of such news will have adverse consequence on civilization. Therefore, battling fake news is important and has now become developing area of research. Researchers are using Artificial Intelligence based approach such as machine learning and natural language processing to battle with the fake news. This paper presents a comprehensive overview of the earlier detection techniques as well as proposes mathematical model and methodology to improve the result.", "venue": "2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)", "year": 2021, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], "publicationDate": "2021-02-19", "journal": {"pages": "1-6", "name": "2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)"}, "authors": [{"authorId": "71010488", "name": "Roshan R. Karwa"}, {"authorId": "2116011521", "name": "Sunil R. Gupta"}]}, {"paperId": "d384476f7f15b53c28119fa6507e9dc62b20b925", "externalIds": {"MAG": "3129472090", "DOI": "10.1063/5.0043300", "CorpusId": 233922781}, "corpusId": 233922781, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d384476f7f15b53c28119fa6507e9dc62b20b925", "title": "Machine learning for materials design and discovery", "abstract": null, "venue": "", "year": 2021, "referenceCount": 51, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://aip.scitation.org/doi/pdf/10.1063/5.0043300", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-18", "journal": {"volume": "129", "pages": "070401", "name": "Journal of Applied Physics"}, "authors": [{"authorId": "32008403", "name": "R. Vasudevan"}, {"authorId": "49542803", "name": "G. Pilania"}, {"authorId": "40454011", "name": "P. Balachandran"}]}, {"paperId": "2b8440a784b141a0ec4b7971ee41b4bc3eec10dc", "externalIds": {"MAG": "3129630401", "DOI": "10.1080/03080188.2020.1831227", "CorpusId": 233893848}, "corpusId": 233893848, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2b8440a784b141a0ec4b7971ee41b4bc3eec10dc", "title": "As perceived, not as known: digital enquiry and the art of intelligence", "abstract": "\u1f10\u1f70\u03bd \u03bc\u1f74 \u1f14\u03bb\u03c0\u03b7\u03c4\u03b1\u03b9 \u1f00\u03bd\u03ad\u03bb\u03c0\u03b9\u03c3\u03c4\u03bf\u03bd \u03bf\u1f50\u03ba \u1f10\u03be\u03f5\u03c5\u03c1\u03ae\u03c3\u03f5\u03b9, \u1f00\u03bd\u03f5\u03be\u03f5\u03c1\u03f5\u03cd\u03bd\u03b7\u03c4\u03bf\u03bd \u1f10\u1f78\u03bd \u03ba\u03b1\u1f76 \u1f04\u03c0\u03bf\u03c1\u03bf\u03bd. (\u2018If you do not expect the unexpected, you will not find it; for it is hard to be sought out and difficult\u2019) \u2003Heraclitus (DK 1...", "venue": "Interdisciplinary Science Reviews", "year": 2021, "referenceCount": 501, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-17", "journal": {"volume": "46", "pages": "325 - 362", "name": "Interdisciplinary Science Reviews"}, "authors": [{"authorId": "145918407", "name": "W. McCarty"}]}, {"paperId": "c76cc10cd93bb46b203b31c9d9fc44cbd268829f", "externalIds": {"MAG": "3137670579", "CorpusId": 238287691}, "corpusId": 238287691, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c76cc10cd93bb46b203b31c9d9fc44cbd268829f", "title": "Del clich\u00e9 de la revoluci\u00f3n en inteligencia artificial a la incertidumbre de la revoluci\u00f3n social", "abstract": null, "venue": "", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-17", "journal": {"volume": "19", "name": ""}, "authors": [{"authorId": "40192915", "name": "G. Torres"}]}, {"paperId": "5e83d1f1a3fabbb4cc3936660dcc3192edf96f0e", "externalIds": {"DBLP": "journals/corr/abs-2102-08933", "ArXiv": "2102.08933", "CorpusId": 231942470}, "corpusId": 231942470, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5e83d1f1a3fabbb4cc3936660dcc3192edf96f0e", "title": "An Objective Laboratory Protocol for Evaluating Cognition of Non-Human Systems Against Human Cognition", "abstract": "In this paper I describe and reduce to practice an objective protocol for evaluating the cognitive capabilities of a non-human system against human cognition in a laboratory environment. This is important because the existence of a non-human system with cognitive capabilities comparable to those of humans might make once-philosophical questions of safety and ethics immediate and urgent. Past attempts to devise evaluation methods, such as the Turing Test and many others, have not met this need; most of them either emphasize a single aspect of human cognition or a single theory of intelligence, fail to capture the human capacity for generality and novelty, or require success in the physical world. The protocol is broadly Bayesian, in that its primary output is a confidence statistic in relation to a claim. Further, it provides insight into the areas where and to what extent a particular system falls short of human cognition, which can help to drive further progress or precautions.", "venue": "ArXiv", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-17", "journal": {"volume": "abs/2102.08933", "name": "ArXiv"}, "authors": [{"authorId": "2643853", "name": "David J. Jilk"}]}, {"paperId": "6281b3a356ced0951b5695d69decd78dd84ea547", "externalIds": {"DOI": "10.1007/s00146-021-01147-7", "CorpusId": 253689299}, "corpusId": 253689299, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/6281b3a356ced0951b5695d69decd78dd84ea547", "title": "Endowing Artificial Intelligence with legal subjectivity", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01147-7.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-16", "journal": {"volume": "37", "pages": "205 - 213", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2089470251", "name": "Sylwia Wojtczak"}]}, {"paperId": "eedba50e37d23343e7b314d057d9061ec9220b68", "externalIds": {"MAG": "3163420331", "DOI": "10.2139/SSRN.3787103", "CorpusId": 236658996}, "corpusId": 236658996, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eedba50e37d23343e7b314d057d9061ec9220b68", "title": "Freedom of Expression and Human Dignity in the Age of Artificial Intelligence.", "abstract": "[enter Abstract Body]Cambridge Analytica exposes possible gaps in legal protection as it relates to certain human rights and the use of personal data to offer \u2018free\u2019 technology. This article discusses Freedom of Expression and Human Dignity under The Charter of Fundamental Rights of the European Union. This article explores how the Charter can be applied to technology and private parties like Facebook or Cambridge Analytica holding such private parties accountable for violations of Human Rights.", "venue": "", "year": 2021, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-16", "journal": {"volume": "", "name": "Social Science Research Network"}, "authors": [{"authorId": "2122014282", "name": "Jasbir Khalsa"}]}, {"paperId": "a2295586ab9ef5bf44f7041125cdd82407f542fe", "externalIds": {"MAG": "3132570160", "DOI": "10.1177/0276237421994697", "CorpusId": 233971012}, "corpusId": 233971012, "publicationVenue": {"id": "6f993889-7bfa-40c4-9c00-8a9a964e11bf", "name": "Empirical Studies of the Arts", "type": "journal", "alternate_names": ["Empirical Studies of The Arts", "Empir Stud Art"], "issn": "0276-2374", "url": "http://www.metapress.com/content/1541-4493/", "alternate_urls": ["https://journals.sagepub.com/loi/art"]}, "url": "https://www.semanticscholar.org/paper/a2295586ab9ef5bf44f7041125cdd82407f542fe", "title": "The Role of AI Attribution Knowledge in the Evaluation of Artwork", "abstract": "Artwork is increasingly being created by machines through algorithms with little or no input from humans. Yet, very little is known about people\u2019s attitudes and evaluations of artwork generated by machines. The current study investigates (a) whether individuals are able to accurately differentiate human-made artwork from AI-generated artwork and (b) the role of attribution knowledge (i.e., information about who created the content) in their evaluation and reception of artwork. Data was collected using an Amazon Turk sample from two survey experiments designed on Qualtrics. Findings suggest that individuals are unable to accurately identify AI-generated artwork and they are likely to associate representational art to humans and abstract art to machines. There is also an interaction effect between attribution knowledge and the type of artwork (representational vs. abstract) on purchase intentions and evaluations of artworks.", "venue": "Empirical Studies of the Arts", "year": 2021, "referenceCount": 50, "citationCount": 10, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-16", "journal": {"volume": "40", "pages": "125 - 142", "name": "Empirical Studies of the Arts"}, "authors": [{"authorId": "2346038", "name": "Harsha Gangadharbatla"}]}, {"paperId": "29729a76c3bfe3cc80730e3120f64336dbcd75ef", "externalIds": {"PubMedCentral": "8150389", "DOI": "10.2196/27868", "CorpusId": 234361969, "PubMed": "33973854"}, "corpusId": 234361969, "publicationVenue": {"id": "6c3e705d-29b5-462c-9a3a-6c7877b74a18", "name": "JMIR Formative Research", "alternate_names": ["JMIR Form Res"], "issn": "2561-326X", "url": "https://formative.jmir.org/"}, "url": "https://www.semanticscholar.org/paper/29729a76c3bfe3cc80730e3120f64336dbcd75ef", "title": "Evidence of Human-Level Bonds Established With a Digital Conversational Agent: Cross-sectional, Retrospective Observational Study", "abstract": "Background There are far more patients in mental distress than there is time available for mental health professionals to support them. Although digital tools may help mitigate this issue, critics have suggested that technological solutions that lack human empathy will prevent a bond or therapeutic alliance from being formed, thereby narrowing these solutions\u2019 efficacy. Objective We aimed to investigate whether users of a cognitive behavioral therapy (CBT)\u2013based conversational agent would report therapeutic bond levels that are similar to those in literature about other CBT modalities, including face-to-face therapy, group CBT, and other digital interventions that do not use a conversational agent. Methods A cross-sectional, retrospective study design was used to analyze aggregate, deidentified data from adult users who self-referred to a CBT-based, fully automated conversational agent (Woebot) between November 2019 and August 2020. Working alliance was measured with the Working Alliance Inventory-Short Revised (WAI-SR), and depression symptom status was assessed by using the 2-item Patient Health Questionnaire (PHQ-2). All measures were administered by the conversational agent in the mobile app. WAI-SR scores were compared to those in scientific literature abstracted from recent reviews. Results Data from 36,070 Woebot users were included in the analysis. Participants ranged in age from 18 to 78 years, and 57.48% (20,734/36,070) of participants reported that they were female. The mean PHQ-2 score was 3.03 (SD 1.79), and 54.67% (19,719/36,070) of users scored over the cutoff score of 3 for depression screening. Within 5 days of initial app use, the mean WAI-SR score was 3.36 (SD 0.8) and the mean bond subscale score was 3.8 (SD 1.0), which was comparable to those in recent studies from the literature on traditional, outpatient, individual CBT and group CBT (mean bond subscale scores of 4 and 3.8, respectively). PHQ-2 scores at baseline weakly correlated with bond scores (r=\u22120.04; P<.001); however, users with depression and those without depression had high bond scores of 3.45. Conclusions Although bonds are often presumed to be the exclusive domain of human therapeutic relationships, our findings challenge the notion that digital therapeutics are incapable of establishing a therapeutic bond with users. Future research might investigate the role of bonds as mediators of clinical outcomes, since boosting the engagement and efficacy of digital therapeutics could have major public health benefits.", "venue": "JMIR Formative Research", "year": 2021, "referenceCount": 25, "citationCount": 23, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://formative.jmir.org/2021/5/e27868/PDF", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-10", "journal": {"volume": "5", "name": "JMIR Formative Research"}, "authors": [{"authorId": "6120000", "name": "Alison M Darcy"}, {"authorId": "2091471950", "name": "Jade Daniels"}, {"authorId": "2077632364", "name": "D. Salinger"}, {"authorId": "49523427", "name": "P. Wicks"}, {"authorId": "9859633", "name": "A. Robinson"}]}, {"paperId": "a876b2624dca10735519debf63eb2d5824fb8b20", "externalIds": {"DBLP": "journals/dint/FengZZCCHL21", "DOI": "10.1162/dint_a_00090", "CorpusId": 231875722}, "corpusId": 231875722, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a876b2624dca10735519debf63eb2d5824fb8b20", "title": "An Evaluation of Chinese Human-Computer Dialogue Technology", "abstract": "Abstract There is a growing interest in developing human-computer dialogue systems which is an important branch in the field of artificial intelligence (AI). However, the evaluation of large-scale Chinese human-computer dialogues is still a challenging task. To attract more attention to dialogue evaluation work, we held the fourth Evaluation of Chinese Human-Computer Dialogue Technology (ECDT). It consists of few-shot learning in spoken language understanding (SLU) (Task 1) and knowledge-driven multi-turn dialogue competition (Task 2), the data sets of which are provided by Harbin Institute of Technology and Tsinghua University. In this paper, we will introduce the evaluation tasks and data sets in detail. Meanwhile, we will also analyze the evaluation results and the existing problems in the evaluation.", "venue": "Data Intelligence", "year": 2021, "referenceCount": 24, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/dint/article-pdf/3/2/274/1963473/dint_a_00090.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-10", "journal": {"volume": "3", "pages": "274-286", "name": "Data Intelligence"}, "authors": [{"authorId": "2048146115", "name": "Zixian Feng"}, {"authorId": "2048147621", "name": "Caihai Zhu"}, {"authorId": "1806419", "name": "Weinan Zhang"}, {"authorId": "1390759484", "name": "Zhigang Chen"}, {"authorId": "2256319", "name": "Wanxiang Che"}, {"authorId": "1730108", "name": "Minlie Huang"}, {"authorId": "2111818678", "name": "Linlin Li"}]}, {"paperId": "8a1f58e914f5c9f0b0a9b8abff58ed269162b95a", "externalIds": {"MAG": "3126999983", "DOI": "10.1057/S41288-020-00201-7", "CorpusId": 233933887}, "corpusId": 233933887, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8a1f58e914f5c9f0b0a9b8abff58ed269162b95a", "title": "The impact of artificial intelligence along the insurance value chain and on the insurability of risks", "abstract": null, "venue": "The Geneva Papers on Risk and Insurance - Issues and Practice", "year": 2021, "referenceCount": 116, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1057/s41288-020-00201-7.pdf", "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-08", "journal": {"name": "The Geneva Papers on Risk and Insurance - Issues and Practice"}, "authors": [{"authorId": "2907881", "name": "M. Eling"}, {"authorId": "2089356084", "name": "Davide Nuessle"}, {"authorId": "2089000896", "name": "Julian Staubli"}]}, {"paperId": "62177d2592ff563eaf4e965686286b52ad3712b3", "externalIds": {"DOI": "10.1007/s11023-021-09555-w", "CorpusId": 240919945}, "corpusId": 240919945, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/62177d2592ff563eaf4e965686286b52ad3712b3", "title": "An Empathy Imitation Game: Empathy Turing Test for Care- and Chat-bots", "abstract": null, "venue": "Minds and Machines", "year": 2021, "referenceCount": 28, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://philpapers.org/archive/HOWAEI-2.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-04", "journal": {"volume": "31", "pages": "457 - 461", "name": "Minds and Machines"}, "authors": [{"authorId": "4970399", "name": "J. Howick"}, {"authorId": "1751614630", "name": "J. Morley"}, {"authorId": "2134633922", "name": "Luciano Floridi"}]}, {"paperId": "8c00360be1f3e499cbaab56e0b91a4eec571a187", "externalIds": {"DBLP": "journals/mima/HowickMF21", "DOI": "10.1007/s11023-021-09555-w", "CorpusId": 231811286}, "corpusId": 231811286, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8c00360be1f3e499cbaab56e0b91a4eec571a187", "title": "An Empathy Imitation Game: Empathy Turing Test for Care- and Chat-bots", "abstract": null, "venue": "Minds Mach.", "year": 2021, "referenceCount": 33, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://philpapers.org/archive/HOWAEI-2.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-04", "journal": {"volume": "", "pages": "1-5", "name": "Minds and Machines"}, "authors": [{"authorId": "4970399", "name": "J. Howick"}, {"authorId": "1751614630", "name": "J. Morley"}, {"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "4f5c4c9dd017d75f47c8e6c06da90ce9c51dde9b", "externalIds": {"ArXiv": "2102.02204", "MAG": "3127817633", "DBLP": "journals/corr/abs-2102-02204", "DOI": "10.21203/RS.3.RS-220713/V1", "CorpusId": 231802239}, "corpusId": 231802239, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4f5c4c9dd017d75f47c8e6c06da90ce9c51dde9b", "title": "Parametrized Quantum Circuits of Synonymous Sentences in Quantum Natural Language Processing", "abstract": "\n In this paper we develop a compositional vector-based semantics of positive transitive sentences in quantum natural language processing for a non-English language, i.e. Persian, to compare the parametrised quantum circuits of two synonymous sentences in two languages, English and Persian. By considering grammar+meaning of a transitive sentence, we translateDisCoCat diagram via ZX-calculus into quantum circuit form. Also, we use a bigraph method to rewrite DisCoCat diagram and turn into quantum circuit in the semantic side.", "venue": "ArXiv", "year": 2021, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.researchsquare.com/article/rs-220713/v1.pdf?c=1631871331000", "status": null}, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": "abs/2102.02204", "name": "ArXiv"}, "authors": [{"authorId": "1421595746", "name": "Mina Abbas-zadeh"}, {"authorId": "144823300", "name": "S. S. Mousavi"}, {"authorId": "145478033", "name": "V. Salari"}]}, {"paperId": "e64b96a2edf26b3a930e0314a35f21be9f729657", "externalIds": {"DBLP": "journals/tib/KimVHW21", "PubMedCentral": "8629804", "MAG": "3128371085", "DOI": "10.1007/s12064-020-00331-5", "CorpusId": 231778099, "PubMed": "33532895"}, "corpusId": 231778099, "publicationVenue": {"id": "d367c832-3225-4f7e-8683-0b14bd056319", "name": "Theory in biosciences", "type": "journal", "alternate_names": ["Theory in Biosciences", "Theory biosci", "Theory Biosci"], "issn": "1431-7613", "url": "https://link.springer.com/journal/12064"}, "url": "https://www.semanticscholar.org/paper/e64b96a2edf26b3a930e0314a35f21be9f729657", "title": "Informational architecture across non-living and living collectives", "abstract": null, "venue": "Theory in biosciences", "year": 2021, "referenceCount": 148, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12064-020-00331-5.pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": "140", "pages": "325 - 341", "name": "Theory in Biosciences"}, "authors": [{"authorId": "2109871971", "name": "Hyunju Kim"}, {"authorId": "48404261", "name": "Gabriele Valentini"}, {"authorId": "69873213", "name": "J. Hanson"}, {"authorId": "1946477", "name": "S. Walker"}]}, {"paperId": "7896c2c5e0a1734b4c69c73aeccca136f09ea433", "externalIds": {"DBLP": "journals/cogcom/GardiniFCD21", "DOI": "10.1007/s12559-021-09823-y", "CorpusId": 232163932}, "corpusId": 232163932, "publicationVenue": {"id": "d1e87771-68a0-40db-a4d3-6216158cc596", "name": "Cognitive Computation", "type": "journal", "alternate_names": ["Cogn Comput"], "issn": "1866-9956", "url": "https://www.springer.com/biomed/neuroscience/journal/12559", "alternate_urls": ["https://link.springer.com/journal/12559", "http://www.springer.com/biomed/neuroscience/journal/12559"]}, "url": "https://www.semanticscholar.org/paper/7896c2c5e0a1734b4c69c73aeccca136f09ea433", "title": "Using Principal Paths to Walk Through Music and Visual Art Style Spaces Induced by Convolutional Neural Networks", "abstract": null, "venue": "Cognitive Computation", "year": 2021, "referenceCount": 42, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12559-021-09823-y.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-01", "journal": {"volume": "13", "pages": "570-582", "name": "Cognitive Computation"}, "authors": [{"authorId": "1712254010", "name": "E. Gardini"}, {"authorId": "37516550", "name": "M. Ferrarotti"}, {"authorId": "144621661", "name": "A. Cavalli"}, {"authorId": "2674856", "name": "S. Decherchi"}]}, {"paperId": "03c067dedc49d6119a31a70b36e2885e38d786ae", "externalIds": {"MAG": "3134339096", "DOI": "10.1051/ODFEN/2021006", "CorpusId": 234083192}, "corpusId": 234083192, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/03c067dedc49d6119a31a70b36e2885e38d786ae", "title": "Le Deep Learning en orthodontie : vers une relation patient-praticien repens\u00e9e\u2026", "abstract": "Depuis une dizaine d\u2019ann\u00e9e, l\u2019Intelligence artificielle (IA) transforme progressivement les pratiques, la m\u00e9decine aussi bien que l\u2019orthodontie n\u2019\u00e9chappent pas \u00e0 cette r\u00e8gle. D\u00e8s lors, se pose la question de la place de cette technologie au sein de la pratique quotidienne; et ce \u00e0 toutes les \u00e9tapes de la prise en charge th\u00e9rapeutique.\nCette technologie simplifie l\u2019analyse du nombre croissant de donn\u00e9es de plus en plus complexes dont nous disposons, notamment \u00e0 travers le scanner optique intra-oral, le scanner facial ou la radiographie 3D. Pour savoir l\u2019exploiter, il est n\u00e9cessaire d\u2019en conna\u00eetre ses diff\u00e9rents principes.\nL\u2019objectif de ce travail est, apr\u00e8s avoir introduit les bases du Deep Learning qui s\u2019appuie les r\u00e9seaux neuronaux virtuels, d\u2019aborder quelles sont les applications actuelles de cette technologie en m\u00e9decine bucco-dentaire et en orthodontie.\nLa connaissance des derni\u00e8res recherches et des derniers r\u00e9sultats obtenus permet alors d\u2019envisager la future relation praticien-machine dans le cadre d\u2019une approche personnalis\u00e9e et repens\u00e9e autour du patient.", "venue": "", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-01", "journal": {"volume": "55", "pages": "73-87", "name": ""}, "authors": [{"authorId": "14608292", "name": "J. Foucart"}, {"authorId": "2090077663", "name": "Luc Gillibert"}, {"authorId": "1418220708", "name": "A. Chavanne"}, {"authorId": "91323741", "name": "X. Ripoche"}]}, {"paperId": "aa0a20b7278ab7c36dccad4be9dd557a3c2cfa14", "externalIds": {"MAG": "3135497746", "DOI": "10.1088/1742-6596/1828/1/012080", "CorpusId": 234012648}, "corpusId": 234012648, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aa0a20b7278ab7c36dccad4be9dd557a3c2cfa14", "title": "An Intelligent Mobile Application Testing Experience Report", "abstract": "Artificial intelligence applications provide tremendous opportunities to improve human life and drive innovation. AI systems/applications which operate in a real-world environment have to encounter an infinite set of feasible scenarios. Conventional testing approach to test the AI application allows only limited testing and does not allow taking the different contexts into consideration and may lead to insufficient validation and characterization. Therefore, to ensure robustness, certainty and reliability of AI applications, the authors applied classification-based AI software testing framework and 3D decision tables to generate test cases. Moreover, the authors compared the quality assurance metrics (accuracy, correctness, reliability and consistency) of AI and non-AI functions in the AI mobile application scenario. Our results indicate and confirm that complete AI function validation is not possible with conventional testing methods, but AI software testing strategy proposed based on classification framework and 3D decision tables has a good effect.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-01", "journal": {"volume": "1828", "name": "Journal of Physics: Conference Series"}, "authors": [{"authorId": "2055333830", "name": "Chi Tran"}, {"authorId": "4339065", "name": "M. G. Valmiki"}, {"authorId": "2115723448", "name": "Guoyan Xu"}, {"authorId": "2154364225", "name": "J. Gao"}]}, {"paperId": "42f53e74468113004420a3cb36f2e10aef8ef68f", "externalIds": {"PubMedCentral": "7902546", "DOI": "10.1016/j.heliyon.2021.e06268", "CorpusId": 232099416, "PubMed": "33665435"}, "corpusId": 232099416, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42f53e74468113004420a3cb36f2e10aef8ef68f", "title": "Towards an interdisciplinary framework about intelligence", "abstract": null, "venue": "Heliyon", "year": 2021, "referenceCount": 81, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cell.com/article/S240584402100373X/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-01", "journal": {"volume": "7", "name": "Heliyon"}, "authors": [{"authorId": "1403471268", "name": "Nicolas Palanca-Castan"}, {"authorId": "2051833010", "name": "Beatriz S\u00e1nchez Tajadura"}, {"authorId": "5191753", "name": "R. Cofr\u00e9"}]}, {"paperId": "64b0959be525b0303c506cbece1115461389595a", "externalIds": {"MAG": "3112217617", "DOI": "10.1016/j.pnucene.2020.103604", "CorpusId": 230572557}, "corpusId": 230572557, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/64b0959be525b0303c506cbece1115461389595a", "title": "Comparison of the error-integral performance indexes in a GA-tuned PID controlling system of a PWR-type nuclear reactor point-kinetics model", "abstract": null, "venue": "", "year": 2021, "referenceCount": 25, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-01", "journal": {"volume": "132", "pages": "103604", "name": "Progress in Nuclear Energy"}, "authors": [{"authorId": "102942413", "name": "Seyed Mohammad Hossein Mousakazemi"}]}, {"paperId": "3211a935d7d8eb6920798ca26b8642e52e4cde70", "externalIds": {"MAG": "3094694913", "DOI": "10.1016/j.ucl.2020.09.004", "CorpusId": 227101199, "PubMed": "33218590"}, "corpusId": 227101199, "publicationVenue": {"id": "9ebbcf97-e720-40d1-bca3-dcf3e1784f84", "name": "Urologic clinics of North America", "type": "journal", "alternate_names": ["Urol Clin n am", "Urol clin n am", "Urologic Clinics of North America"], "issn": "0094-0143", "url": "https://www.journals.elsevier.com/urologic-clinics-of-north-america", "alternate_urls": ["https://www.urologic.theclinics.com/current", "http://www.sciencedirect.com/science/journal/00940143", "http://www.us.elsevierhealth.com/product.jsp?isbn=00940143"]}, "url": "https://www.semanticscholar.org/paper/3211a935d7d8eb6920798ca26b8642e52e4cde70", "title": "Current Trends in Artificial Intelligence Application for Endourology and Robotic Surgery.", "abstract": null, "venue": "Urologic clinics of North America", "year": 2021, "referenceCount": 53, "citationCount": 11, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-02-01", "journal": {"volume": "48 1", "pages": "\n 151-160\n ", "name": "The Urologic clinics of North America"}, "authors": [{"authorId": "145328951", "name": "Timothy C. Chang"}, {"authorId": "12032135", "name": "Caleb J Seufert"}, {"authorId": "1882587", "name": "O. Eminaga"}, {"authorId": "9940589", "name": "E. Shkolyar"}, {"authorId": "14603178", "name": "Jim C Hu"}, {"authorId": "4265282", "name": "J. Liao"}]}, {"paperId": "fffe8348918a81a78afe45b41f539804bcfaa02c", "externalIds": {"MAG": "3127084837", "DOI": "10.37965/JAIT.2020.0065", "CorpusId": 233251414}, "corpusId": 233251414, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fffe8348918a81a78afe45b41f539804bcfaa02c", "title": "Technologies Supporting Artificial Intelligence and Robotics Application Development", "abstract": "Artificial intelligence (AI) and robotics have gone through three generations of development, from Turing test, logic theory machine, to expert system and self-driving car. In the third-generation today, AI and robotics have collaboratively been used in many areas in our society, including industry, business, manufacture, research, and education. There are many challenging problems in developing AI and robotics applications. We launch this new Journal of Artificial Intelligence and Technology to facilitate the exchange of the latest research and practice in AI and technologies. In this inaugural issue, we first introduce a few key technologies and platforms supporting the third-generation AI and robotics application development based on stacks of technologies and platforms. We present examples of such development environments created by both industry and academia. We also selected eight papers in the related areas to celebrate the foundation of this journal.", "venue": "", "year": 2021, "referenceCount": 24, "citationCount": 10, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.istp-press.com/jait/article/download/2/3", "status": null}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-31", "journal": {"volume": "1", "pages": "1-8", "name": ""}, "authors": [{"authorId": "2109392777", "name": "Yinong Chen"}, {"authorId": "3434191", "name": "G. Luca"}]}, {"paperId": "b22a5f250f334c2b4400fb71ab87ac671539a785", "externalIds": {"MAG": "3127216649", "DOI": "10.14488/BJOPM.2021.010", "CorpusId": 233441821}, "corpusId": 233441821, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b22a5f250f334c2b4400fb71ab87ac671539a785", "title": "Influence of artificial intelligence on public employment and its impact on politics: a systematic literature review", "abstract": "Goal: Public administration is constantly changing in response to new challenges, including the implementation of new technologies such as robotics and artificial intelligence (AI). This new dynamic has caught the attention of political leaders who are finding ways to restrain or regulate AI in public services, but also of scholars who are raising legitimate concerns about its impacts on public employment. In light of the above, the aim of this research is to analyze the influence of AI on public employment and the ways politics are reacting. \nDesign/Methodology/Approach: We have performed a systematic literature review to disclose the state-of-the-art and to find new avenues for future research. \nResults: The results indicate that public services require four kinds of intelligence \u2013 mechanical, analytical, intuitive, and empathetic \u2013 albeit, with much less expression than in private services. \nLimitations of the investigation: This systematic review provides a snapshot of the influence of AI on public employment. Thus, our research does not cover the whole body of knowledge, but it presents a holistic understanding of the phenomenon. \nPractical implications: As private companies are typically more advanced in the implementation of AI technologies, the for-profit sector may provide significant contributions in the way states can leverage public services through the deployment of AI technologies. \nOriginality/Value: This article highlights the need for states to create the necessary conditions to legislate and regulate key technological advances, which, in our opinion, has been done, but at a very slow pace.", "venue": "", "year": 2021, "referenceCount": 103, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://bjopm.emnuvens.com.br/bjopm/article/download/1114/962", "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-29", "journal": {"volume": "18", "pages": "1-22", "name": "Brazilian journal of operations & production management"}, "authors": [{"authorId": "1455925165", "name": "Jo\u00e3o Reis"}, {"authorId": "144179439", "name": "Paula Esp\u00edrito Santo"}, {"authorId": "3003920", "name": "N. Mel\u00e3o"}]}, {"paperId": "54b0c0a0025df2f94de6121ef4183ae8f88550c7", "externalIds": {"DOI": "10.1109/SAUPEC/RobMech/PRASA52254.2021.9377235", "CorpusId": 232316166}, "corpusId": 232316166, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/54b0c0a0025df2f94de6121ef4183ae8f88550c7", "title": "Algorithmic Music Composition Using Probabilistic Graphical Models and Artificial Neural Networks", "abstract": "Composing music algorithmically has been a goal long-pursued by many computer scientists. Various methods have been implemented to achieve this, ranging from randomly selecting musical components to deep learning models. The main focus of this research is to develop a model which fools a human into believing the output music is human-made. This study uses a collection of rock music MIDI files which the notes, chords, pitches and duration are extracted as features. A Bayesian network is selected as the main model for this research and a Long Short-Term Memory (LSTM) network as the benchmark model. A Turing test was performed on 20 people for both models and the LSTM on average was identified as human-made 36% of the time, while the Bayesian network, on average, had been misidentified 39% of the time. These results may indicate that music is more probabilistic than time-dependent.", "venue": "2021 Southern African Universities Power Engineering Conference/Robotics and Mechatronics/Pattern Recognition Association of South Africa (SAUPEC/RobMech/PRASA)", "year": 2021, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-01-27", "journal": {"pages": "1-4", "name": "2021 Southern African Universities Power Engineering Conference/Robotics and Mechatronics/Pattern Recognition Association of South Africa (SAUPEC/RobMech/PRASA)"}, "authors": [{"authorId": "2057090856", "name": "Marc Marsden"}, {"authorId": "9347837", "name": "Ritesh Ajoodha"}]}, {"paperId": "71db7410e6f96aae8bf3a95e5a938c3ac9fb193b", "externalIds": {"DBLP": "journals/corr/abs-2101-11221", "ArXiv": "2101.11221", "CorpusId": 231718610}, "corpusId": 231718610, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/71db7410e6f96aae8bf3a95e5a938c3ac9fb193b", "title": "Learning task-agnostic representation via toddler-inspired learning", "abstract": "One of the inherent limitations of current AI systems, stemming from the passive learning mechanisms (e.g., supervised learning), is that they perform well on labeled datasets but cannot deduce knowledge on their own. To tackle this problem, we derive inspiration from a highly intentional learning system via action: the toddler. Inspired by the toddler\u2019s learning procedure, we design an interactive agent that can learn and store task-agnostic visual representation while exploring and interacting with objects in the virtual environment. Experimental results show that such obtained representation was expandable to various vision tasks such as image classification, object localization, and distance estimation tasks. In specific, the proposed model achieved 100%, 75.1% accuracy and 1.62% relative error, respectively, which is noticeably better than autoencoder-based model (99.7%, 66.1%, 1.95%), and also comparable with those of supervised models (100%, 87.3%, 0.71%).", "venue": "ArXiv", "year": 2021, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-27", "journal": {"volume": "abs/2101.11221", "name": "ArXiv"}, "authors": [{"authorId": "73758722", "name": "Kwanyoung Park"}, {"authorId": "2109220128", "name": "Junseok Park"}, {"authorId": "2087142998", "name": "Hyunseok Oh"}, {"authorId": "1692756", "name": "Byoung-Tak Zhang"}, {"authorId": "2145418994", "name": "Youngki Lee"}]}, {"paperId": "cbad0923db89f23febcbd6192ff4149289ff2ad9", "externalIds": {"DBLP": "journals/jbd/Adadi21", "DOI": "10.1186/s40537-021-00419-9", "CorpusId": 231723319}, "corpusId": 231723319, "publicationVenue": {"id": "d60da343-ab92-4310-b3d7-2c0860287a9d", "name": "Journal of Big Data", "type": "journal", "alternate_names": ["J Big Data", "Journal on Big Data"], "issn": "2196-1115", "alternate_issns": ["2579-0048"], "url": "http://www.journalofbigdata.com/", "alternate_urls": ["http://www.springer.com/computer/database+management+&+information+retrieval/journal/40537", "http://techscience.com/JBD/index.html", "https://journalofbigdata.springeropen.com", "https://journalofbigdata.springeropen.com/"]}, "url": "https://www.semanticscholar.org/paper/cbad0923db89f23febcbd6192ff4149289ff2ad9", "title": "A survey on data\u2010efficient algorithms in big data era", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 316, "citationCount": 43, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-01-26", "journal": {"volume": "8", "pages": "1-54", "name": "Journal of Big Data"}, "authors": [{"authorId": "9139705", "name": "Amina Adadi"}]}, {"paperId": "7ed3d41d5ba99a390ac9233e9c3d6af62358aee5", "externalIds": {"DBLP": "journals/corr/abs-2101-10899", "ArXiv": "2101.10899", "DOI": "10.23919/ICN.2021.0015", "CorpusId": 231709221}, "corpusId": 231709221, "publicationVenue": {"id": "49618524-7c8f-47c8-95d0-468d942c54c9", "name": "Intelligent and Converged Networks", "alternate_names": ["Intell Converg Netw"], "issn": "2708-6240", "url": "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=9195266"}, "url": "https://www.semanticscholar.org/paper/7ed3d41d5ba99a390ac9233e9c3d6af62358aee5", "title": "Artificial Intelligence for Satellite Communication: A Review", "abstract": ": Satellite communication offers the prospect of service continuity over uncovered and under-covered areas, service ubiquity, and service scalability. However, several challenges must first be addressed to realize these benefits, as the resource management, network control, network security, spectrum management, and energy usage of satellite networks are more challenging than that of terrestrial networks. Meanwhile, artificial intelligence (AI), including machine learning, deep learning, and reinforcement learning, has been steadily growing as a research field and has shown successful results in diverse applications, including wireless communication. In particular, the application of AI to a wide variety of satellite communication aspects has demonstrated excellent potential, including beam-hopping, anti-jamming, network traffic forecasting, channel modeling, telemetry mining, ionospheric scintillation detecting, interference managing, remote sensing, behavior modeling, space-air-ground integrating, and energy managing. This work thus provides a general overview of AI, its diverse sub-fields, and its state-of-the-art algorithms. Several challenges facing diverse aspects of satellite communication systems are then discussed, and their proposed and potential AI-based solutions are presented. Finally, an outlook of field is drawn, and future steps are suggested.", "venue": "Intelligent and Converged Networks", "year": 2021, "referenceCount": 242, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/9195266/9622197/09622204.pdf", "status": null}, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-01-25", "journal": {"volume": "abs/2101.10899", "name": "ArXiv"}, "authors": [{"authorId": "1970404776", "name": "Fares Fourati"}, {"authorId": "144789580", "name": "Mohamed-Slim Alouini"}]}, {"paperId": "b35aba33dc1dfa6d172e8fec71b8c64380f09fae", "externalIds": {"DOI": "10.2307/j.ctv1fcf88w.8", "CorpusId": 241390306}, "corpusId": 241390306, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b35aba33dc1dfa6d172e8fec71b8c64380f09fae", "title": "Advertisarial Relations and Aesthetics of Survival", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 208, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "4509c648349ca717e82aeb6be2707d97caaa709a", "externalIds": {"DOI": "10.1215/9781478012702-002", "CorpusId": 241552139}, "corpusId": 241552139, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4509c648349ca717e82aeb6be2707d97caaa709a", "title": "The Social Difference Engine and the World Computer", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://read.dukeupress.edu/books/book/chapter-pdf/848615/9781478012702-002.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "f6ae0df7bd30b31ef07c58b644d371735f78e271", "externalIds": {"DOI": "10.1215/9781478012702-011", "CorpusId": 241792626}, "corpusId": 241792626, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6ae0df7bd30b31ef07c58b644d371735f78e271", "title": "Notes", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "f73798bbea47003db8531705226dcfb40ee97ee2", "externalIds": {"DOI": "10.1215/9781478012702-267", "CorpusId": 240947206}, "corpusId": 240947206, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f73798bbea47003db8531705226dcfb40ee97ee2", "title": "Appendix 2: The Derivative Image", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "3f68bc0cebae726cbe6e842a6dc1222b3de73d17", "externalIds": {"DOI": "10.1215/9781478012702-005", "CorpusId": 242889020}, "corpusId": 242889020, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f68bc0cebae726cbe6e842a6dc1222b3de73d17", "title": "M-I-C-I\u2032-M\u2032", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "c227af05c392c034ffc04ad602446bd814f299b9", "externalIds": {"DOI": "10.1215/9781478012702-255", "CorpusId": 241150539}, "corpusId": 241150539, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c227af05c392c034ffc04ad602446bd814f299b9", "title": "Appendix 1: The Derivative Machine", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "31166b35483e38515b8d7b15368fe3dac035d967", "externalIds": {"DOI": "10.1215/9781478012702-009", "CorpusId": 240665178}, "corpusId": 240665178, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/31166b35483e38515b8d7b15368fe3dac035d967", "title": "An Engineanda Camera", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "f6360a17e9ae6e69eaab63bf84cc285b67aa8c14", "externalIds": {"DOI": "10.1215/9781478012702-012", "CorpusId": 242818856}, "corpusId": 242818856, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6360a17e9ae6e69eaab63bf84cc285b67aa8c14", "title": "References", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "c968db8d123275510170b5f36d734b39181e0237", "externalIds": {"DOI": "10.1215/9781478012702-010", "CorpusId": 241278363}, "corpusId": 241278363, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c968db8d123275510170b5f36d734b39181e0237", "title": "Derivative Living and Subaltern Futures", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "9c10c0ef07b1de843eab9d22846e3f9b79ff99c9", "externalIds": {"DOI": "10.1215/9781478012702-003", "CorpusId": 243388274}, "corpusId": 243388274, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9c10c0ef07b1de843eab9d22846e3f9b79ff99c9", "title": "The Computational Unconscious", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "c0215dca4e170f6c3d7b05c031ec9f39a2ff1afe", "externalIds": {"DBLP": "journals/biosystems/CottamV21", "DOI": "10.1016/j.biosystems.2021.104366", "CorpusId": 231700809, "PubMed": "33486092"}, "corpusId": 231700809, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c0215dca4e170f6c3d7b05c031ec9f39a2ff1afe", "title": "The necessity of hierarchy for living systems", "abstract": null, "venue": "Biosyst.", "year": 2021, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-21", "journal": {"pages": "\n 104366\n ", "name": "Bio Systems"}, "authors": [{"authorId": "1888944", "name": "R. Cottam"}, {"authorId": "47920765", "name": "R. Vounckx"}]}, {"paperId": "f5f47fe059f2b3f9f25b5d3fbdac414af815c1f6", "externalIds": {"MAG": "3122521504", "DOI": "10.3390/ELECTRONICS10030229", "CorpusId": 234159430}, "corpusId": 234159430, "publicationVenue": {"id": "ccd8e532-73c6-414f-bc91-271bbb2933e2", "name": "Electronics", "type": "journal", "issn": "1450-5843", "alternate_issns": ["2079-9292", "0883-4989"], "url": "http://www.electronics.etfbl.net/", "alternate_urls": ["http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-247562", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-247562", "https://www.mdpi.com/journal/electronics"]}, "url": "https://www.semanticscholar.org/paper/f5f47fe059f2b3f9f25b5d3fbdac414af815c1f6", "title": "EdgeAvatar: An Edge Computing System for Building Virtual Beings", "abstract": "Dialogue systems, also known as conversational agents, are computing systems that use algorithms for speech and language processing to engage in conversation with humans or other conversation-capable systems. A chatbot is a conversational agent that has, as its primary goal, to maximize the length of the conversation without any specific targeted task. When a chatbot is embellished with an artistic approach that is meant to evoke an emotional response, then it is called a virtual being. On the other hand, conversational agents that interact with the physical world require the use of specialized hardware to sense and process captured information. In this article we describe EdgeAvatar, a system based on Edge Computing principles for the creation of virtual beings. The objective of the EdgeAvatar system is to provide a streamlined and modular framework for virtual being applications that are to be deployed in public settings. We also present two implementations that use EdgeAvatar and are inspired by historical figures to interact with visitors of the Venice Biennale 2019. EdgeAvatar can adapt to fit different approaches for AI powered conversations.", "venue": "Electronics", "year": 2021, "referenceCount": 35, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2079-9292/10/3/229/pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-20", "journal": {"name": "Electronics"}, "authors": [{"authorId": "35222148", "name": "N. Watkinson"}, {"authorId": "2090783261", "name": "Fedor Zaitsev"}, {"authorId": "8759520", "name": "Aniket Shivam"}, {"authorId": "2090194741", "name": "Michael Demirev"}, {"authorId": "2090194342", "name": "Mike Heddes"}, {"authorId": "1724343", "name": "T. Givargis"}, {"authorId": "145330843", "name": "A. Nicolau"}, {"authorId": "1764886", "name": "A. Veidenbaum"}]}, {"paperId": "05d45d8c4f7e9d63861bd28a83f49fa1a9c010ee", "externalIds": {"DOI": "10.1109/ICICT50816.2021.9358531", "CorpusId": 232072286}, "corpusId": 232072286, "publicationVenue": {"id": "9181819e-530e-4408-9917-93c5f58d7fce", "name": "International Congress on Information and Communication Technology", "type": "conference", "alternate_names": ["Int Conf Inf Comput Technol", "International Conference on Inventive Computation Technologies", "ICICT", "Int Congr Inf Commun Technol", "Int Conf Inven Comput Technol", "International Conference on Issues and Challenges in Intelligent Computing Techniques", "International Conference on Information and Computer Technologies", "Int Conf Issue Chall Intell Comput Tech"]}, "url": "https://www.semanticscholar.org/paper/05d45d8c4f7e9d63861bd28a83f49fa1a9c010ee", "title": "Information Acquisition Chatbot System using LUIS", "abstract": "The college information chatbot system is enhanced using the Na\u00efve Bayes classification algorithm that analyzes user's queries and messages. This system responds appropriately to the queries that are posed by the user using in-built Artificial Intelligence (AI) with an effective Graphical User Interface (GUI) tool. The queries posed by the user were analyzed by the chatbot using a cognitive service named Language Understanding Intelligent System (LUIS), which is designed by Microsoft. It is integrated with the Skype application which can be downloaded and installed from the play store on the user's smartphone.", "venue": "International Congress on Information and Communication Technology", "year": 2021, "referenceCount": 10, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-01-20", "journal": {"pages": "1025-1029", "name": "2021 6th International Conference on Inventive Computation Technologies (ICICT)"}, "authors": [{"authorId": "2077058924", "name": "V. Prathyusha"}, {"authorId": "2051698078", "name": "G. L. Sri"}, {"authorId": "145935488", "name": "G. Meenakshi"}, {"authorId": "2051693363", "name": "Y. K. Chakravarti"}]}, {"paperId": "64231d0b49252e5bb9ece098434b3387b61ec1ff", "externalIds": {"ArXiv": "2101.08286", "DBLP": "journals/corr/abs-2101-08286", "DOI": "10.1073/pnas.2107151119", "CorpusId": 231662111}, "corpusId": 231662111, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/64231d0b49252e5bb9ece098434b3387b61ec1ff", "title": "Can stable and accurate neural networks be computed? - On the barriers of deep learning and Smale's 18th problem", "abstract": "A BSTRACT . Deep learning (DL) has had unprecedented success and is now entering scienti\ufb01c computing with full force. However, current DL methods typically suffer from instability, even when universal approximation properties guarantee the existence of stable neural networks (NNs). We address this paradox by demonstrating basic well-conditioned problems in scienti\ufb01c computing where one can prove the existence of NNs with great approximation qualities, however, there does not exist any algorithm, even randomised, that can train (or compute) such a NN. For any positive integers K > 2 and L , there are cases where simultaneously: (a) no randomised training algorithm can compute a NN correct to K digits with probability greater than 1 / 2 , (b) there exists a deterministic training algorithm that computes a NN with K \u2212 1 correct digits, but any such (even randomised) algorithm needs arbitrarily many training data, (c) there exists a deterministic training algorithm that computes a NN with K \u2212 2 correct digits using no more than L training samples. These results imply a classi\ufb01cation theory describing conditions under which (stable) NNs with a given accuracy can be computed by an algorithm. We begin this theory by establishing suf\ufb01cient conditions for the existence of algorithms that compute stable NNs in inverse problems. We introduce Fast Iterative REstarted NETworks (FIRENETs), which we both prove and numerically verify are stable. Moreover, we prove that only O ( | log( (cid:15) ) | ) layers are needed for an (cid:15) -accurate solution to the inverse problem. Here we provide statements of theorems from the main text, proofs of theorems, detailed explanations of the experimental setup and further numerical examples. We brie\ufb02y collect some basic notation, and further notation will be introduced throughout where appropriate. We use N m,N to denote the class of neural networks (NNs) from C m to C N (see \u00a71.1.2.1 for the precise de\ufb01nition). Given a metric space ( M , d ) , x \u2208 M and X \u2282 M , d ( x, X ) = dist( x, X ) = inf y \u2208 X d ( x, y ) . For a matrix A \u2208 C m \u00d7 N , the norm k A k refers to the operator norm of A when C m and C N are equipped with the standard l 2 -norm. For x \u2208 C N and p \u2208 [1 , \u221e ] , k x k l p refers to the l p -norm of x . For a set of indices S and vector x , x S is the vector de\ufb01ned by ( x S ) j = x j if j \u2208 S and ( x S ) j = 0 if j / \u2208 S . Complex rationals Q + i Q are denoted by Q [ i ] . We use (cid:3) to denote the end of a proof and (cid:2) to denote the end of a remark.", "venue": "ArXiv", "year": 2021, "referenceCount": 168, "citationCount": 43, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-20", "journal": {"volume": "abs/2101.08286", "name": "ArXiv"}, "authors": [{"authorId": "72167909", "name": "Vegard Antun"}, {"authorId": "51445731", "name": "Matthew J. Colbrook"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": "fb0400e21bdb776ce56eab2d9f9faf7d06f80258", "externalIds": {"DBLP": "journals/sncs/KumarJ21", "DOI": "10.1007/s42979-020-00445-z", "CorpusId": 231681776}, "corpusId": 231681776, "publicationVenue": {"id": "7a7dc89b-e1a6-44df-a496-46c330a87840", "name": "SN Computer Science", "type": "journal", "alternate_names": ["SN Comput Sci"], "issn": "2661-8907", "alternate_issns": ["2662-995X"], "url": "https://link.springer.com/journal/42979"}, "url": "https://www.semanticscholar.org/paper/fb0400e21bdb776ce56eab2d9f9faf7d06f80258", "title": "Benchmarks for Designing a Secure Devanagari CAPTCHA", "abstract": null, "venue": "SN Computer Science", "year": 2021, "referenceCount": 39, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-19", "journal": {"volume": "2", "pages": "45", "name": "SN Comput. Sci."}, "authors": [{"authorId": "2109783064", "name": "Mohinder Kumar"}, {"authorId": "35495324", "name": "M. Jindal"}]}, {"paperId": "634727779cf44fcc41f9f93d03b64f3e60021684", "externalIds": {"DOI": "10.1007/s10516-021-09534-x", "CorpusId": 254259429}, "corpusId": 254259429, "publicationVenue": {"id": "f45678d8-f34b-4d95-a357-b7110a1d707f", "name": "Axiomathes", "type": "journal", "issn": "1122-1151", "url": "https://link.springer.com/journal/10516"}, "url": "https://www.semanticscholar.org/paper/634727779cf44fcc41f9f93d03b64f3e60021684", "title": "Meaning Relations, Syntax, and Understanding", "abstract": null, "venue": "Axiomathes", "year": 2021, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-19", "journal": {"volume": "32", "pages": "459 - 475", "name": "Axiomathes"}, "authors": [{"authorId": "3098996", "name": "P. Mondal"}]}, {"paperId": "fc9c61e350dfe46e4b7c896a2dc9e33b14b9d279", "externalIds": {"MAG": "3121514122", "DOI": "10.3390/ECONOMIES9010006", "CorpusId": 234145955}, "corpusId": 234145955, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc9c61e350dfe46e4b7c896a2dc9e33b14b9d279", "title": "A Review of the Applications of Genetic Algorithms to Forecasting Prices of Commodities", "abstract": "This paper is focused on the concise review of the specific applications of genetic algorithms in forecasting commodity prices. Genetic algorithms seem relevant in this field for many reasons. For instance, they lack the necessity to assume a certain statistical distribution, and they are efficient in dealing with non-stationary data. Indeed, the latter case is very frequent while forecasting the commodity prices of, for example, crude oil. Moreover, growing interest in their application has been observed recently. In parallel, researchers are also interested in constructing hybrid genetic algorithms (i.e., joining them with other econometric methods). Such an approach helps to reduce each of the individual method flaws and yields promising results. In this article, three groups of commodities are discussed: energy commodities, metals, and agricultural products. The advantages and disadvantages of genetic algorithms and their hybrids are presented, and further conclusions concerning their possible improvements and other future applications are discussed. This article fills a significant literature gap, focusing on particular financial and economic applications. In particular, it combines three important\u2014yet not often jointly discussed\u2014topics: genetic algorithms, their hybrids with other tools, and commodity price forecasting issues.", "venue": "", "year": 2021, "referenceCount": 149, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2227-7099/9/1/6/pdf?version=1611061133", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-19", "journal": {"volume": "9", "pages": "6", "name": "Economies"}, "authors": [{"authorId": "41048391", "name": "Krzysztof Drachal"}, {"authorId": "101686868", "name": "M. Pawlowski"}]}, {"paperId": "d3380952b99d3516116d64213db28faaac5b16de", "externalIds": {"DOI": "10.1007/s00146-020-01136-2", "CorpusId": 253687771}, "corpusId": 253687771, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/d3380952b99d3516116d64213db28faaac5b16de", "title": "There is no \u201cI\u201d in \u201cAI\u201d", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-15", "journal": {"volume": "36", "pages": "1035 - 1046", "name": "AI & SOCIETY"}, "authors": [{"authorId": "11060885", "name": "A. Farhadi"}]}, {"paperId": "58d7bb3a12dba344653570a2fc788c977f1f9dac", "externalIds": {"MAG": "3155332569", "DOI": "10.30658/HMC.2.3", "CorpusId": 234972240}, "corpusId": 234972240, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/58d7bb3a12dba344653570a2fc788c977f1f9dac", "title": "Voice-Based Agents as Personified Things: Assimilation and Accommodation as Equilibration of Doubt", "abstract": "We aim to investigate the nature of doubt regarding voice-based agents by referring to Piaget\u2019s ontological object\u2013subject classification \u201cthing\u201d and \u201cperson,\u201d its associated equilibration processes, and influential factors of the situation, the user, and the agent. In two online surveys, we asked 853 and 435 participants, ranging from 17 to 65 years of age, to assess Alexa and the Google Assistant. We discovered that only some people viewed voice-based agents as mere things, whereas the majority classified them into personified things. However, their classification is fragile and depends basically on the imputation of subject-like attributes of agency and mind to the voice-based agents, increased by a dyadic using situation, previous regular interactions, a younger age, and an introverted personality of the user. We discuss these results in a broader context.", "venue": "", "year": 2021, "referenceCount": 77, "citationCount": 13, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://stars.library.ucf.edu/cgi/viewcontent.cgi?article=1024&context=hmc", "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-15", "journal": {"volume": "2", "pages": "57-79", "name": ""}, "authors": [{"authorId": "2098144309", "name": "Katrin Etzrodt"}, {"authorId": "25512473", "name": "Sven Engesser"}]}, {"paperId": "300b89c409aa6ea5e6249fd468c4270a56204a56", "externalIds": {"MAG": "3155770175", "DOI": "10.30780/IJTRS.V06.I01.003", "CorpusId": 234367349}, "corpusId": 234367349, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/300b89c409aa6ea5e6249fd468c4270a56204a56", "title": "CAPTCHA: A TOOL FOR WEB SECURITY", "abstract": "Malicious computer programs today have tried to target websites, which have a significant effect on their availability and security. The CAPTCHA is a tool that is an efficient way of solving this problem. CAPTCHA is a full automated public turing test. Many human activities are performed on the Internet every day, such as schooling, commerce, conversations etc. Some hackers write programs to automatically make false registrations, for example when registering in websites, that waste web resources while this may even stop the whole website. Thus, human users should be differentiated from CAPTCHA software systems. CAPTCHA handwritten picture may be a work around. In this paper literature review of CAPTCHA has been done in order to enhance our knowledge about how CAPTCHA can provide web security focusing in particular on handwritten CAPTCHA and audio, video CAPTCHA in general.", "venue": "", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-15", "journal": {"volume": "6", "pages": "16-20", "name": ""}, "authors": [{"authorId": "2060326443", "name": "Gurpreet Kaur"}, {"authorId": "50318908", "name": "D. Rai"}]}, {"paperId": "2b44fd0e7875dc217f6877d25c70eb8c0e8051c7", "externalIds": {"MAG": "3119191159", "DOI": "10.3390/SU13020800", "CorpusId": 234316501}, "corpusId": 234316501, "publicationVenue": {"id": "8775599f-4f9a-45f0-900e-7f4de68e6843", "name": "Sustainability", "type": "journal", "issn": "2071-1050", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-172127", "alternate_urls": ["http://mdpi.com/journal/sustainability", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-172127"]}, "url": "https://www.semanticscholar.org/paper/2b44fd0e7875dc217f6877d25c70eb8c0e8051c7", "title": "Artificial Intelligence and Reflections from Educational Landscape: A Review of AI Studies in Half a Century", "abstract": "Artificial intelligence (AI) has penetrated every layer of our lives, and education is not immune to the effects of AI. In this regard, this study examines AI studies in education in half a century (1970\u20132020) through a systematic review approach and benefits from social network analysis and text-mining approaches. Accordingly, the research identifies three research clusters (1) artificial intelligence, (2) pedagogical, and (3) technological issues, and suggests five broad research themes which are (1) adaptive learning and personalization of education through AI-based practices, (2) deep learning and machine Learning algorithms for online learning processes, (3) Educational human-AI interaction, (4) educational use of AI-generated data, and (5) AI in higher education. The study also highlights that ethics in AI studies is an ignored research area.", "venue": "Sustainability", "year": 2021, "referenceCount": 75, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2071-1050/13/2/800/pdf?version=1610705080", "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-15", "journal": {"name": "Sustainability"}, "authors": [{"authorId": "3902896", "name": "Aras Bozkurt"}, {"authorId": "68980771", "name": "Abdulkadir Karadeniz"}, {"authorId": "2124259", "name": "David Ba\u00f1eres"}, {"authorId": "1398239354", "name": "Ana-Elena Guerrero-Rold\u00e1n"}, {"authorId": "2107266585", "name": "M. E. Rodr\u00edguez"}]}, {"paperId": "30fd9dc890a6af150df9bf045ca311b36fe20091", "externalIds": {"DOI": "10.1108/978-1-80043-107-220211005", "CorpusId": 242460734}, "corpusId": 242460734, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/30fd9dc890a6af150df9bf045ca311b36fe20091", "title": "References", "abstract": null, "venue": "Posthumanism in Digital Culture", "year": 2021, "referenceCount": 165, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.emerald.com/insight/content/doi/10.1108/978-1-80043-107-220211005/full/pdf?title=references", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-15", "journal": {"name": "Posthumanism in Digital Culture"}, "authors": []}, {"paperId": "077e41eb0d8d1979e17ab79eb8ae6a356972310e", "externalIds": {"DOI": "10.1007/s00146-020-01139-z", "CorpusId": 253686557}, "corpusId": 253686557, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/077e41eb0d8d1979e17ab79eb8ae6a356972310e", "title": "Technoevidence: the \"Turing limit\" 2020", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-13", "journal": {"volume": "36", "pages": "1021 - 1028", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2115580470", "name": "J. Marshall"}]}, {"paperId": "25a595559157e0ff2c93683a1dd2ad66da42a3c3", "externalIds": {"DOI": "10.1007/s13194-020-00343-4", "CorpusId": 231607773}, "corpusId": 231607773, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/25a595559157e0ff2c93683a1dd2ad66da42a3c3", "title": "Creativity as potentially valuable improbable constructions", "abstract": null, "venue": "", "year": 2021, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://philsci-archive.pitt.edu/18509/1/FedykXu-Creativity-Version%208.0%20GC1.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-13", "journal": {"volume": "11", "pages": "1-24", "name": "European Journal for Philosophy of Science"}, "authors": [{"authorId": "3388092", "name": "Mark Fedyk"}, {"authorId": "2152478414", "name": "Fei Xu"}]}, {"paperId": "b2a8c4513302759ea9f90a4c1a63a59e4f16749a", "externalIds": {"MAG": "3100801413", "DOI": "10.1146/annurev-criminol-051520-012342", "CorpusId": 228892996}, "corpusId": 228892996, "publicationVenue": {"id": "03dc6a51-1dd8-45a3-b063-4737bd11c0d0", "name": "annual review of criminology", "alternate_names": ["annu rev criminol"], "issn": "2572-4568", "url": "https://www.annualreviews.org/journal/criminol", "alternate_urls": ["https://www.annualreviews.org/page/authors/general-information"]}, "url": "https://www.semanticscholar.org/paper/b2a8c4513302759ea9f90a4c1a63a59e4f16749a", "title": "Artificial Intelligence, Predictive Policing, and Risk Assessment for Law Enforcement", "abstract": "There are widespread concerns about the use of artificial intelligence in law enforcement. Predictive policing and risk assessment are salient examples. Worries include the accuracy of forecasts that guide both activities, the prospect of bias, and an apparent lack of operational transparency. Nearly breathless media coverage of artificial intelligence helps shape the narrative. In this review, we address these issues by first unpacking depictions of artificial intelligence. Its use in predictive policing to forecast crimes in time and space is largely an exercise in spatial statistics that in principle can make policing more effective and more surgical. Its use in criminal justice risk assessment to forecast who will commit crimes is largely an exercise in adaptive, nonparametric regression. It can in principle allow law enforcement agencies to better provide for public safety with the least restrictive means necessary, which can mean far less use of incarceration. None of this is mysterious. Nevertheless, concerns about accuracy, fairness, and transparency are real, and there are tradeoffs between them for which there can be no technical fix. You can't have it all. Solutions will be found through political and legislative processes achieving an acceptable balance between competing priorities.", "venue": "annual review of criminology", "year": 2021, "referenceCount": 81, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-13", "journal": {"name": "Annual Review of Criminology"}, "authors": [{"authorId": "50496565", "name": "R. Berk"}]}, {"paperId": "c8048c270ee699ec7efddc422e2d99279e3f65f7", "externalIds": {"MAG": "3120222962", "DOI": "10.24018/EJECE.2021.5.1.265", "CorpusId": 234307075}, "corpusId": 234307075, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c8048c270ee699ec7efddc422e2d99279e3f65f7", "title": "EEG Channel Selection Using A Modified Grey Wolf Optimizer", "abstract": "Consider an increasingly growing field of research, Brain-Computer Interface (BCI) is to form a direct channel of communication between a computer and the brain. However, extracting features of random time-varying EEG signals and their classification is a major challenge that faces current BCI. This paper proposes a modified grey wolf optimizer (MGWO) that can select optimal EEG channels to be used in (BCIs), the way that identifies main features and the immaterial ones from that dataset and the complexity to be removed. This allows (MGWO) to opt for optimal EEG channels as well as helping machine learning classification in its tasks when doing training to the classifier with the dataset. (MGWO), which imitates the grey wolves leadership and hunting manner nature and which consider metaheuristics swarm intelligence algorithms, is an integration with two modification to achieve the balance between exploration and exploitation the first modification applies exponential change for the number of iterations to increase search space accordingly exploitation, the second modification is the crossover operation that is used to increase the diversity of the population and enhance exploitation capability. Experimental results use four different EEG datasets BCI Competition IV- dataset 2a, BCI Competition IV- data set III, BCI Competition II data set III, and EEG Eye State from UCI Machine Learning Repository to evaluate the quality and effectiveness of the (MGWO). A cross-validation method is used to measure the stability of the (MGWO).", "venue": "", "year": 2021, "referenceCount": 39, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ejece.org/index.php/ejece/article/download/265/167", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-12", "journal": {"volume": "5", "pages": "17-24", "name": ""}, "authors": [{"authorId": "90037491", "name": "Hussien Hussien"}, {"authorId": "1405789712", "name": "E. El-Kenawy"}, {"authorId": "86896252", "name": "A. El-Desouky"}]}, {"paperId": "e5079c59630dc2031557f9dffb3214316125c509", "externalIds": {"MAG": "3120147286", "DOI": "10.1108/IJLM-01-2020-0043", "CorpusId": 234246258}, "corpusId": 234246258, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e5079c59630dc2031557f9dffb3214316125c509", "title": "The impact of emerging and disruptive technologies on freight transportation in the digital era: current state and future trends", "abstract": "Purpose - With various challenges in the digital era, stakeholders are expressing growing interests in understanding the impact of emerging and disruptive technologies on freight transportation. This paper provides a systematic literature review of the current state of affairs as well as future trends and aims to support stakeholders' decision-making in logistics management in the era of disruptive technologies. Design/methodology/approach - Several recent and representative articles from academic, industrial and governmental perspectives were investigated to set the scene for this research and to serve as a baseline for electing nine emerging technologies, which were then used to conduct a systematic literature review covering the literature within the area during the past twelve years. Findings - 3D printing, artificial intelligence, automated robots, autonomous vehicles, big data analytics, blockchain, drones, electric vehicles and the Internet of Things were identified as the emerging technologies. The current state of existing research and potential future opportunities were analyzed. Research limitations/implications - Since the potential literature body is almost impossible to fully cover, a tradeoff between the number of emerging technologies and the related literature reviewed has been performed. However, the paper provides a novel approach to select the emerging and disruptive technologies and a systematic literature review to fill the identified research gap in the related literature. Practical implications -The research support various stakeholders to better capture the current status of and the future opportunities in freight transportation and gain a clearer understanding of the disruptive technologies as well as to guide them in how to deploy these initiatives in future decision-making. Originality/value - By providing a systematic literature review on the trends, themes and research opportunities in the era of disruptive technologies, the papers bring about broad and comprehensive review on the impact of disruptive technologies on logistics and transportation as well as opportunities to support management decision support in the logistics industry.", "venue": "", "year": 2021, "referenceCount": 143, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-12", "journal": {"volume": "", "name": "The International Journal of Logistics Management"}, "authors": [{"authorId": "23162313", "name": "Chuanwen Dong"}, {"authorId": "10282239", "name": "A. Akram"}, {"authorId": "50042110", "name": "Dan Andersson"}, {"authorId": "1382842511", "name": "Per-Olof Arn\u00e4s"}, {"authorId": "145567857", "name": "G. Stefansson"}]}, {"paperId": "65dc1a2b91fabe5f9c1d7396659eda3cc501d158", "externalIds": {"ArXiv": "2101.03477", "DBLP": "journals/cogcom/WashingtonKKHKL21", "DOI": "10.1007/s12559-021-09936-4", "CorpusId": 237604952, "PubMed": "35669554"}, "corpusId": 237604952, "publicationVenue": {"id": "d1e87771-68a0-40db-a4d3-6216158cc596", "name": "Cognitive Computation", "type": "journal", "alternate_names": ["Cogn Comput"], "issn": "1866-9956", "url": "https://www.springer.com/biomed/neuroscience/journal/12559", "alternate_urls": ["https://link.springer.com/journal/12559", "http://www.springer.com/biomed/neuroscience/journal/12559"]}, "url": "https://www.semanticscholar.org/paper/65dc1a2b91fabe5f9c1d7396659eda3cc501d158", "title": "Training Affective Computer Vision Models by Crowdsourcing Soft-Target Labels", "abstract": null, "venue": "Cognitive Computation", "year": 2021, "referenceCount": 113, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-10", "journal": {"volume": "13 5", "pages": "\n 1363-1373\n ", "name": "Cognitive computation"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": "3079884", "name": "H. Kalantarian"}, {"authorId": "82564234", "name": "J. Kent"}, {"authorId": "1606872067", "name": "A. Husic"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": "1899752689", "name": "\u00c9. Leblanc"}, {"authorId": "2037685246", "name": "C. Hou"}, {"authorId": "2037683491", "name": "C. Mutlu"}, {"authorId": "48913193", "name": "K. Dunlap"}, {"authorId": "70295528", "name": "Y. Penev"}, {"authorId": "30423115", "name": "N. Stockham"}, {"authorId": "66636865", "name": "B. Chrisman"}, {"authorId": "2240125", "name": "K. Paskov"}, {"authorId": "145533499", "name": "Jae-Yoon Jung"}, {"authorId": "21701693", "name": "C. Voss"}, {"authorId": "32551479", "name": "N. Haber"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "f59b41dc481b1518881753016a808324f2e5e692", "externalIds": {"DBLP": "journals/corr/abs-2101-06105", "ArXiv": "2101.06105", "DOI": "10.6084/m9.figshare.13514371", "CorpusId": 231627565}, "corpusId": 231627565, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f59b41dc481b1518881753016a808324f2e5e692", "title": "Scientific Relevance and Future of Digital Immortality and Virtual Humans", "abstract": "We are on the threshold of a significant change in the way we view digital life, which will have a major effect on the physical world. Computers have increasingly emulated deceased human beings through growing awareness in the fields of artificial intelligence, big data, and machine learning, and have symbolically managed to overcome death with the help of technology. One thing is clear, though: now that there are proper and legitimate discussions happening about human immortality, we can be certain that the future is upon us. This article attempts to explain and challenge the ways in which digital immortality, in particular, has manifested itself. This paper summarizes the technological solutions, research findings and technical challenges of major researchers by reviewing the key technologies and general technical schemes in the field of digital human beings. The prospects of digital human beings are being investigated.", "venue": "ArXiv", "year": 2021, "referenceCount": 17, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-01-09", "journal": {"volume": "abs/2101.06105", "name": "ArXiv"}, "authors": [{"authorId": "4781329", "name": "Daniel Cebo"}]}, {"paperId": "69903adb3a1158b53e5a60c22dbc1731c0526c38", "externalIds": {"MAG": "3118935583", "DBLP": "journals/patterns/KanzaBNMF21", "PubMedCentral": "7815949", "DOI": "10.1016/j.patter.2020.100162", "CorpusId": 231720334, "PubMed": "33511363"}, "corpusId": 231720334, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/69903adb3a1158b53e5a60c22dbc1731c0526c38", "title": "The AI for Scientific Discovery Network+", "abstract": null, "venue": "Patterns", "year": 2021, "referenceCount": 85, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cell.com/article/S266638992030218X/pdf", "status": null}, "fieldsOfStudy": ["Engineering", "Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-01-08", "journal": {"volume": "2", "name": "Patterns"}, "authors": [{"authorId": "26554027", "name": "Samantha Kanza"}, {"authorId": "39742911", "name": "C. Bird"}, {"authorId": "145387873", "name": "M. Niranjan"}, {"authorId": "2075786970", "name": "W. McNeill"}, {"authorId": "32113616", "name": "J. Frey"}]}, {"paperId": "f73afb95c60a8772e9ab9f2d7205270856799118", "externalIds": {"DOI": "10.1038/s41427-020-00274-9", "CorpusId": 231202741}, "corpusId": 231202741, "publicationVenue": {"id": "20e2f7c4-a185-464d-9cb4-6272ea91bf85", "name": "NPG Asia Materials", "type": "journal", "alternate_names": ["Npg Asia Materials", "Npg Asia Mater", "NPG Asia Mater"], "issn": "1884-4049", "url": "https://www.nature.com/am/"}, "url": "https://www.semanticscholar.org/paper/f73afb95c60a8772e9ab9f2d7205270856799118", "title": "Artificial synapses with a sponge-like double-layer porous oxide memristor", "abstract": null, "venue": "NPG Asia Materials", "year": 2021, "referenceCount": 85, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s41427-020-00274-9.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-08", "journal": {"volume": "13", "pages": "1-10", "name": "NPG Asia Materials"}, "authors": [{"authorId": "49106354", "name": "Qin Gao"}, {"authorId": "49393449", "name": "Anping Huang"}, {"authorId": "2158144294", "name": "Jing Zhang"}, {"authorId": "50006654", "name": "Yuhang Ji"}, {"authorId": "2157053878", "name": "Jingjing Zhang"}, {"authorId": "2000512523", "name": "Xueliang Chen"}, {"authorId": "2129128986", "name": "Xueli Geng"}, {"authorId": "103089596", "name": "Qi Hu"}, {"authorId": "2145319028", "name": "Mei Wang"}, {"authorId": "123034612", "name": "Zhisong Xiao"}, {"authorId": "2146824098", "name": "P. K. Chu"}]}, {"paperId": "3843e1f3a71bf149e4ed8e439a3e924a3bbd2979", "externalIds": {"DOI": "10.1007/s10339-020-01009-y", "CorpusId": 254193816}, "corpusId": 254193816, "publicationVenue": {"id": "23a05c9f-e780-4c7d-aff5-332930f9359a", "name": "Cognitive Processing", "type": "journal", "alternate_names": ["Cogn Process"], "issn": "1612-4782", "url": "https://link.springer.com/journal/10339"}, "url": "https://www.semanticscholar.org/paper/3843e1f3a71bf149e4ed8e439a3e924a3bbd2979", "title": "Nonhuman rationality: a predictive coding perspective", "abstract": null, "venue": "Cognitive Processing", "year": 2021, "referenceCount": 108, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-06", "journal": {"volume": "22", "pages": "353 - 362", "name": "Cognitive Processing"}, "authors": [{"authorId": "2139153", "name": "Tzu-Wei Hung"}]}, {"paperId": "197864c0f8cb98d8edacb0595625238c84aed6ec", "externalIds": {"PubMedCentral": "7787507", "DOI": "10.1016/j.ejro.2021.100322", "CorpusId": 230794556, "PubMed": "33432297"}, "corpusId": 230794556, "publicationVenue": {"id": "4975ca0b-793b-4350-aa92-6a005340dad0", "name": "European Journal of Radiology Open", "type": "journal", "alternate_names": ["Eur J Radiol Open"], "issn": "2352-0477", "url": "https://www.ejropen.com/", "alternate_urls": ["http://www.ejropen.com", "https://www.journals.elsevier.com/european-journal-of-radiology-open/"]}, "url": "https://www.semanticscholar.org/paper/197864c0f8cb98d8edacb0595625238c84aed6ec", "title": "Risk of in-hospital death associated with Covid-19 lung consolidations on chest computed tomography \u2013 A novel translational approach using a radiation oncology contour software", "abstract": null, "venue": "European Journal of Radiology Open", "year": 2021, "referenceCount": 31, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.ejropen.com/article/S2352047721000022/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-06", "journal": {"volume": "8", "name": "European Journal of Radiology Open"}, "authors": [{"authorId": "74663710", "name": "L. Sapienza"}, {"authorId": "82429143", "name": "K. Nasra"}, {"authorId": "8603611", "name": "V. Calsavara"}, {"authorId": "1471812972", "name": "T. Little"}, {"authorId": "144004992", "name": "V. Narayana"}, {"authorId": "1398229369", "name": "E. Abu-Isa"}]}, {"paperId": "e17f3c3f446f2dbf1fd77b8a6c0d76f38822e300", "externalIds": {"DBLP": "journals/cp/Hung21", "DOI": "10.1007/s10339-020-01009-y", "CorpusId": 230784962, "PubMed": "33404900"}, "corpusId": 230784962, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e17f3c3f446f2dbf1fd77b8a6c0d76f38822e300", "title": "Nonhuman rationality: a predictive coding perspective", "abstract": null, "venue": "Cogn. Process.", "year": 2021, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-06", "journal": {"volume": "22", "pages": "353-362", "name": "Cognitive Processing"}, "authors": [{"authorId": "2139153", "name": "Tzu-Wei Hung"}]}, {"paperId": "bd201eae8672b10af7fa47f37ae5c1544bd446a8", "externalIds": {"MAG": "3122785935", "DBLP": "conf/hicss/AhmadSR21", "DOI": "10.24251/HICSS.2021.492", "CorpusId": 232414121}, "corpusId": 232414121, "publicationVenue": {"id": "d8ec66ab-0083-4a4d-bf44-ce85d2daad69", "name": "Hawaii International Conference on System Sciences", "type": "conference", "alternate_names": ["HICSS", "Hawaii Int Conf Syst Sci"], "url": "http://www.hicss.hawaii.edu/"}, "url": "https://www.semanticscholar.org/paper/bd201eae8672b10af7fa47f37ae5c1544bd446a8", "title": "Communicating with Machines: Conversational Agents with Personality and the Role of Extraversion", "abstract": "Communication with conversational agents (CA) has become increasingly important. It therefore is crucial to understand how individuals perceive interaction with CAs and how the personality of both the CA and the human can affect the interaction experience. As personality differences are manifested in language cues, we investigate whether different language style manifestations of extraversion lead to a more anthropomorphized perception (specifically perceived humanness and social presence) of the personality bots. We examine, whether individuals rate communication satisfaction of a CA similar to their own personality as higher (law of attraction). The results of our experiment indicate that highly extraverted CAs are generally better received in terms of social presence and communication satisfaction. Further, incorporating personality into CAs increases perceived humanness. Although no significant effects could be found in regard to the law of attraction, interesting findings about ambiverts could be made. The outcomes of the experiment contribute towards designing personality-adaptive CAs.", "venue": "Hawaii International Conference on System Sciences", "year": 2021, "referenceCount": 63, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://scholarspace.manoa.hawaii.edu/bitstream/10125/71109/1/0398.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-05", "journal": {"pages": "1-10"}, "authors": [{"authorId": "29417708", "name": "Rangina Ahmad"}, {"authorId": "2160598", "name": "Dominik Siemon"}, {"authorId": "1398032634", "name": "S. Robra-Bissantz"}]}, {"paperId": "ac92ee40bedbb16aa9c57320421edc39cb3905ad", "externalIds": {"DBLP": "journals/corr/abs-2101-01533", "ArXiv": "2101.01533", "DOI": "10.1016/j.cortex.2021.01.001", "CorpusId": 230523649, "PubMed": "33677138"}, "corpusId": 230523649, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ac92ee40bedbb16aa9c57320421edc39cb3905ad", "title": "On the control of attentional processes in vision", "abstract": null, "venue": "Cortex", "year": 2021, "referenceCount": 144, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2101.01533", "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-05", "journal": {"volume": "137", "pages": "305-329", "name": "Cortex"}, "authors": [{"authorId": "51421045", "name": "John Tsotsos"}, {"authorId": "66905627", "name": "O. Abid"}, {"authorId": "3468296", "name": "Iuliia Kotseruba"}, {"authorId": "36000196", "name": "M. Solbach"}]}, {"paperId": "5d538ce49e1c43e95a4cb592081b0bc4b8733d4b", "externalIds": {"ArXiv": "2101.02018", "DBLP": "journals/corr/abs-2101-02018", "CorpusId": 230770255}, "corpusId": 230770255, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d538ce49e1c43e95a4cb592081b0bc4b8733d4b", "title": "Abusive Advertising: Scrutinizing socially relevant algorithms in a black box analysis to examine their impact on vulnerable patient groups in the health sector", "abstract": "The targeted direct-to-customer marketing of unapproved stem cell treatments by a questionable online industry is directed at vulnerable users who search the Internet in the hope of a cure. This behavior especially poses a threat to individuals who find themselves in hopeless and desperate phases in their lives. They might show low reluctance to try therapies that solely promise a cure but are not scientifically proven to do so. In the worst case, they suffer serious side-effects. Therefore, this thesis examines the display of advertisements of unapproved stem cell treatments for Parkinson\u2019s Disease, Multiple Sclerosis, Diabetes on Google\u2019s results page. The company announced a policy change in September 2019 that was meant to prohibit and ban the practices in question. However, there was evidence that those ads were still being delivered. A browser extension for Firefox and Chrome was developed and distributed to conduct a crowdsourced Black Box analysis. It was delivered to volunteers and virtual machines in Australia, Canada, the USA and the UK. Data on search results, advertisements and top stories was collected and analyzed. The results showed that there still is questionable advertising even though Google announced to purge it from its platform.", "venue": "ArXiv", "year": 2021, "referenceCount": 409, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-04", "journal": {"volume": "abs/2101.02018", "name": "ArXiv"}, "authors": [{"authorId": "2045175321", "name": "Martin Reber"}]}, {"paperId": "c5102ab9e4faaf2b4b2a5de8e9fb23c004256bff", "externalIds": {"DOI": "10.1007/s10479-020-03856-6", "CorpusId": 254229194}, "corpusId": 254229194, "publicationVenue": {"id": "2e70cc37-125a-451c-b9bb-3b329f6be510", "name": "Annals of Operations Research", "type": "journal", "alternate_names": ["Ann Oper Res"], "issn": "0254-5330", "url": "https://www.springer.com/journal/10479", "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-0-70-35506643-0,00.html?referer=www.springer.com/journal/10479/submission", "https://link.springer.com/journal/10479", "http://www.springer.com/journal/10479"]}, "url": "https://www.semanticscholar.org/paper/c5102ab9e4faaf2b4b2a5de8e9fb23c004256bff", "title": "Artificial intelligence for decision support systems in the field of operations research: review and future scope of research", "abstract": null, "venue": "Annals of Operations Research", "year": 2021, "referenceCount": 310, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-03", "journal": {"volume": "308", "pages": "215 - 274", "name": "Annals of Operations Research"}, "authors": [{"authorId": "2118927871", "name": "Shivam Gupta"}, {"authorId": "32909426", "name": "S. Modgil"}, {"authorId": "2053060306", "name": "Samadrita Bhattacharyya"}, {"authorId": "143722718", "name": "I. Bose"}]}, {"paperId": "dd65bf01821e54adb6615809e262e6dbef4f25a2", "externalIds": {"DOI": "10.1007/s00146-020-01129-1", "CorpusId": 253676281}, "corpusId": 253676281, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/dd65bf01821e54adb6615809e262e6dbef4f25a2", "title": "Debate: what is personhood in the age of AI?", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 103, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://philpapers.org/archive/GUNDWI.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-03", "journal": {"volume": "36", "pages": "473 - 486", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2249898", "name": "David J. Gunkel"}, {"authorId": "25163625", "name": "Jordan Joseph Wales"}]}, {"paperId": "3fb2ed344374cf53fde4f1f77206541eadd10f1f", "externalIds": {"DBLP": "journals/ais/GunkelW21", "DOI": "10.1007/s00146-020-01129-1", "CorpusId": 230284859}, "corpusId": 230284859, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/3fb2ed344374cf53fde4f1f77206541eadd10f1f", "title": "Debate: what is personhood in the age of AI?", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 122, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://philpapers.org/archive/GUNDWI.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-03", "journal": {"volume": "", "pages": "1-14", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2249898", "name": "David J. Gunkel"}, {"authorId": "25163625", "name": "Jordan Joseph Wales"}]}, {"paperId": "0e5c24b258a3e5cefd65afaf010c2b2a51ed20a4", "externalIds": {"MAG": "3133238569", "DOI": "10.1080/23312521.2020.1867025", "CorpusId": 231990924}, "corpusId": 231990924, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e5c24b258a3e5cefd65afaf010c2b2a51ed20a4", "title": "Cognitive Vulnerability, Artificial Intelligence, and the Image of God in Humans", "abstract": "Abstract Recent progress in artificial intelligence (AI) opens up the possibility that one day machines could do anything that a human being can do, raising thus serious questions regarding human distinctiveness. For theological anthropology, the prospect of human-level AI brings a fresh opportunity to clarify the definition of the image of God. Comparing human and artificial intelligence leads to replacing the Aristotelian-like interpretation of the image of God as rationality with a relational model. Instead of regarding our cognitive biases as vulnerabilities, they should be seen as instrumental in bringing about our unique type of intelligence, one marked by relationality.", "venue": "Journal of Disability & Religion", "year": 2021, "referenceCount": 25, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/23312521.2020.1867025?needAccess=true", "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-02", "journal": {"volume": "25", "pages": "27 - 40", "name": "Journal of Disability & Religion"}, "authors": [{"authorId": "151110907", "name": "M. Dorobantu"}]}, {"paperId": "21bf225da81242109819f376eb0deb40f6241a60", "externalIds": {"MAG": "3129196540", "DOI": "10.15446/HYS.N40.86929", "CorpusId": 234314379}, "corpusId": 234314379, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/21bf225da81242109819f376eb0deb40f6241a60", "title": "Babbage, Willis, Reuleaux y el surgimiento del enfoque anal\u00edtico modular de las m\u00e1quinas en el siglo XIX", "abstract": "El estudio de las m\u00e1quinas es un campo que puede rastrearse hasta el Renacimiento. Sin embargo, en la Modernidad adquiere cierto perfil te\u00f3rico. Se produce una transformaci\u00f3n desde los tratados sobre la instalaci\u00f3n y uso que conciben a las m\u00e1quinas como una s\u00edntesis entre las estructuras materiales y el trabajo humano, hacia estudios anal\u00edticos que las consideran com entidades modulares, como ensamblaje de piezas y mecanismos susceptibles de ser analizados matem\u00e1ticamente. A su vez, los primeros se caracterizan por un enfoque antropom\u00e9trico que no ven mayores inconvenientes en usar el lenguaje coloquial e ilustraciones para transmitir el conocimiento acerca de las m\u00e1quinas; los segundos, en cambio, plantean problemas cognitivos y proponen lenguajes simb\u00f3licos espec\u00edficos para representar el dise\u00f1o y funcionamiento de las m\u00e1quinas. Comenzaremos por el siglo XVIII, al ilustrar algunos conceptos provenientes de L\u2019Encyclop\u00e9die y de Adam Smith. Posteriormente, nos enfocaremos en los matem\u00e1ticos del siglo XIX que promovieron las transformaciones mencionadas. En primer lugar, Charles Babbage y su notaci\u00f3n mec\u00e1nica; luego Robert Willis y Franz Reuleaux y sus \u201cmecanismos puros\u201d; y de nuevo Babbage para analizar la complementariedad de la econom\u00eda pol\u00edtica a sus estudios matem\u00e1ticos sobre las m\u00e1quinas. Finalmente, mostraremos algunos debates actuales sobre el v\u00ednculo entre m\u00e1quinas, realidad, matem\u00e1tica y lenguaje que, expl\u00edcita o impl\u00edcitamente, retoman aquellos problemas y pueden encontrar en el pensamiento de los matem\u00e1ticos del siglo XIX un antecedente.", "venue": "Historia y sociedad", "year": 2021, "referenceCount": 44, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistas.unal.edu.co/index.php/hisysoc/article/download/86929/78246", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"name": "Historia y sociedad"}, "authors": [{"authorId": "122364802", "name": "D. Sandrone"}]}, {"paperId": "f4606ee709c3b2e90880b2382bade799ad606e0c", "externalIds": {"MAG": "3151500458", "DOI": "10.21037/JHMHP-20-114", "CorpusId": 233959732}, "corpusId": 233959732, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f4606ee709c3b2e90880b2382bade799ad606e0c", "title": "Technological advances to enhance recovery after cardiac surgery", "abstract": "Surgery, and especially cardiac surgery, is common, costly, and entails considerable risk. Significant progress has been made in recent years to improve quality, promote patient safety, and increase value and cost-effectiveness in surgical care. Enhanced Recovery After Surgery (ERAS) initiatives are increasing in popularity, improving outcomes, and enriching patient satisfaction. First developed for abdominal surgical cases, ERAS has increasingly established itself across all surgical subspecialities, including cardiac surgery. ERAS focuses on evidence-based initiatives in the preoperative, intraoperative, and postoperative phases of care to promote patient well-being and efficient care. The deliberate, judicious incorporation of technology into surgery and the periprocedural home has tremendous, revolutionary potential in all phases of care and is consistent with ERAS principles. This technology can be harnessed by physicians and the care provider team, the healthcare system, and perhaps most importantly, by patients themselves to lead to a higher level of engagement. We will explore technology's transformational capability by concentrating on cardiac surgery because of its prevalence, costs, risks, and contribution to the healthcare system's bottom line. In addition, the role that ERAS combined with technology can play in a constructive manner will be important. We discuss the disruptive effect that the COVID-19 pandemic offers to accelerate these developments. While the human cost of the pandemic has been staggering, in the post-COVID world, the lessons learned can be vital. Finally, we seek to show that the opportunities technology provides are closely related to what both patients and the physician and provider teams want. As technology inevitably becomes more integrated into healthcare, the ability to harness technology to maximize patient outcomes and well-being while promoting more efficient healthcare delivery will be critical. \u00a9 Journal of Hospital Management and Health Policy. All rights reserved.", "venue": "Journal of Hospital Management and Health Policy", "year": 2021, "referenceCount": 181, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://jhmhp.amegroups.com/article/viewFile/6677/pdf", "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"name": "Journal of Hospital Management and Health Policy"}, "authors": [{"authorId": "6069268", "name": "K. Lobdell"}, {"authorId": "5556089", "name": "J. Appoo"}, {"authorId": "81948576", "name": "G. Rose"}, {"authorId": "35443576", "name": "B. Ferguson"}, {"authorId": "47320919", "name": "S. Chatterjee"}]}, {"paperId": "65603de2747fdac66560381800c15bb00082d285", "externalIds": {"DOI": "10.1016/j.pharma.2021.01.008", "CorpusId": 243070926}, "corpusId": 243070926, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/65603de2747fdac66560381800c15bb00082d285", "title": "Applications de l\u2019intelligence artificielle au d\u00e9veloppement de nouveaux m\u00e9dicaments", "abstract": null, "venue": "Annales Pharmaceutiques Fran\u00e7aises", "year": 2021, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"name": "Annales Pharmaceutiques Fran\u00e7aises"}, "authors": [{"authorId": "47149135", "name": "P. Moingeon"}]}, {"paperId": "dde6963c0949eab1e42ded80bfba82b6beb4ba85", "externalIds": {"DBLP": "journals/paladyn/Saetra21", "DOI": "10.1515/pjbr-2021-0021", "CorpusId": 233449412}, "corpusId": 233449412, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dde6963c0949eab1e42ded80bfba82b6beb4ba85", "title": "Social robot deception and the culture of trust", "abstract": "Abstract Human beings are deeply social, and both evolutionary traits and cultural constructs encourage cooperation based on trust. Social robots interject themselves in human social settings, and they can be used for deceptive purposes. Robot deception is best understood by examining the effects of deception on the recipient of deceptive actions, and I argue that the long-term consequences of robot deception should receive more attention, as it has the potential to challenge human cultures of trust and degrade the foundations of human cooperation. In conclusion: regulation, ethical conduct by producers, and raised general awareness of the issues described in this article are all required to avoid the unfavourable consequences of a general degradation of trust.", "venue": "Paladyn J. Behav. Robotics", "year": 2021, "referenceCount": 80, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.degruyter.com/document/doi/10.1515/pjbr-2021-0021/pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-01", "journal": {"volume": "12", "pages": "276 - 286", "name": "Paladyn, Journal of Behavioral Robotics"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "014778fb465796f38f3d243d14c5cb33ac67e82b", "externalIds": {"DBLP": "journals/annals/Garvey21", "DOI": "10.1109/MAHC.2021.3051686", "CorpusId": 232153527}, "corpusId": 232153527, "publicationVenue": {"id": "22ec5dc2-bb5e-4fea-a7dd-61676b6e7f78", "name": "IEEE Annals of the History of Computing", "type": "journal", "alternate_names": ["IEEE Ann Hist Comput"], "issn": "1058-6180", "url": "http://muse.jhu.edu/journals/ahc", "alternate_urls": ["http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", "https://ieeexplore.ieee.org/servlet/opac?punumber=85", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", "http://www.computer.org/annals/"]}, "url": "https://www.semanticscholar.org/paper/014778fb465796f38f3d243d14c5cb33ac67e82b", "title": "The \u201cGeneral Problem Solver\u201d Does Not Exist: Mortimer Taube and the Art of AI Criticism", "abstract": "This article reconfigures the history of artificial intelligence (AI) and its accompanying tradition of criticism by excavating the work of Mortimer Taube, a pioneer in information and library sciences, whose magnum opus, Computers and Common Sense: The Myth of Thinking Machines (1961), has been mostly forgotten. To convey the essence of his distinctive critique, the article focuses on Taube's attack on the general problem solver (GPS), the second major AI program. After examining his analysis of the social construction of this and other \u201cthinking machines,\u201d it concludes that, despite technical changes in AI, much of Taube's criticism remains relevant today. Moreover, his status as an \u201cinformation processing\u201d insider who criticized AI on behalf of the public good challenges the boundaries and focus of most critiques of AI from the past half-century. In sum, Taube's work offers an alternative model from which contemporary AI workers and critics can learn much.", "venue": "IEEE Annals of the History of Computing", "year": 2021, "referenceCount": 123, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-01", "journal": {"volume": "43", "pages": "60-73", "name": "IEEE Annals of the History of Computing"}, "authors": [{"authorId": "2052081388", "name": "Shunryu Colin Garvey"}]}, {"paperId": "031ae0269e16a3d6956ef12b8071911c422c2f69", "externalIds": {"DOI": "10.1515/jci-2021-0006", "CorpusId": 232085133}, "corpusId": 232085133, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/031ae0269e16a3d6956ef12b8071911c422c2f69", "title": "Radical empiricism and machine learning research", "abstract": "Abstract I contrast the \u201cdata fitting\u201d vs \u201cdata interpreting\u201d approaches to data science along three dimensions: Expediency, Transparency, and Explainability. \u201cData fitting\u201d is driven by the faith that the secret to rational decisions lies in the data itself. In contrast, the data-interpreting school views data, not as a sole source of knowledge but as an auxiliary means for interpreting reality, and \u201creality\u201d stands for the processes that generate the data. I argue for restoring balance to data science through a task-dependent symbiosis of fitting and interpreting, guided by the Logic of Causation.", "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.degruyter.com/document/doi/10.1515/jci-2021-0006/pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": "9", "pages": "78 - 82", "name": "Journal of Causal Inference"}, "authors": [{"authorId": "145430701", "name": "J. Pearl"}]}, {"paperId": "289ffce760b53ae3e3cea95f010cf43bae798050", "externalIds": {"DOI": "10.1007/s10704-020-00499-3", "CorpusId": 230112305}, "corpusId": 230112305, "publicationVenue": {"id": "ff79e3de-2cc6-4439-b08b-47e9b1aa9506", "name": "International Journal of Fracture", "type": "journal", "alternate_names": ["Int J Fract"], "issn": "0376-9429", "url": "https://www.springer.com/journal/10704", "alternate_urls": ["http://link.springer.com/journal/10704", "http://www.springer.com/journal/10704"]}, "url": "https://www.semanticscholar.org/paper/289ffce760b53ae3e3cea95f010cf43bae798050", "title": "A machine learning based sensitivity analysis of the GTN damage parameters for dynamic fracture propagation in X70 pipeline steel", "abstract": null, "venue": "International Journal of Fracture", "year": 2021, "referenceCount": 64, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://lirias.kuleuven.be/bitstream/123456789/665763/2/FRAC-D-20-00101_R1.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": "227", "pages": "111-132", "name": "International Journal of Fracture"}, "authors": [{"authorId": "1659127747", "name": "B. Paermentier"}, {"authorId": "49913305", "name": "D. Debruyne"}, {"authorId": "94225027", "name": "R. Talemi"}]}, {"paperId": "e4a674b0d6a4cff27849b26a0db6504f7d438091", "externalIds": {"DBLP": "journals/tvlsi/ParkJKNY21", "MAG": "3107855596", "DOI": "10.1109/TVLSI.2020.3037166", "CorpusId": 229659989}, "corpusId": 229659989, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4a674b0d6a4cff27849b26a0db6504f7d438091", "title": "Memory-Augmented Neural Networks on FPGA for Real-Time and Energy-Efficient Question Answering", "abstract": "Memory-augmented neural networks (MANNs) were introduced to handle long-term dependent data efficiently. MANNs have shown promising results in question answering (QA) tasks that require holding contexts for answering a given question. As demands for QA on edge devices have increased, the utilization of MANNs in resource-constrained environments has become important. To achieve fast and energy-efficient inference of MANNs, we can exploit application-specific hardware accelerators on field-programmable gate arrays (FPGAs). Although several accelerators for conventional deep neural networks have been designed, it is difficult to efficiently utilize the accelerators with MANNs due to different requirements. In addition, characteristics of QA tasks should be considered for further improving the efficiency of inference on the accelerators. To address the aforementioned issues, we propose an inference accelerator of MANNs on FPGA. To fully utilize the proposed accelerator, we introduce fast inference methods considering the features of QA tasks. To evaluate our proposed approach, we implemented the proposed architecture on an FPGA and measured the execution time and energy consumption for the bAbI data set. According to our thorough experiments, the proposed methods improved speed and energy efficiency of the inference of MANNs up to about 25.6 and 28.4 times, respectively, compared with those of CPU.", "venue": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "year": 2021, "referenceCount": 44, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-01", "journal": {"volume": "29", "pages": "162-175", "name": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"}, "authors": [{"authorId": "2267522", "name": "Seongsik Park"}, {"authorId": "2109766425", "name": "Jaehee Jang"}, {"authorId": "153274617", "name": "Seijoon Kim"}, {"authorId": "2972978", "name": "Byunggook Na"}, {"authorId": "2999019", "name": "Sungroh Yoon"}]}, {"paperId": "221be7ac383f4ef8de8e3bc4e5f2026b5ad0c80b", "externalIds": {"MAG": "3091327592", "DOI": "10.1364/JOCN.401568", "CorpusId": 222136295}, "corpusId": 222136295, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/221be7ac383f4ef8de8e3bc4e5f2026b5ad0c80b", "title": "On the suitability, requisites, and challenges of machine learning [Invited]", "abstract": "The introduction of 5G, the increasing number of connected devices, and the exponential growth of services relying on connectivity are pressuring multilayer networks to improve their scaling, efficiency, and controlling capabilities. However, enhancing those features consistently results in a significant amount of complexity in operating the resources available across heterogeneous vendors and technology domains. Thus, multilayer networks should become more intelligent in order to be efficiently managed, maintained, and optimized. In this context, we are witnessing an increasing interest in the adoption of artificial intelligence (AI) and machine learning (ML) in the design and operation of multilayer optical transport networks. This paper provides a brief introduction to key concepts in AI/ML, highlighting the conditions under which the use of ML is justified, on the requisites to deploy a data-driven system, and on the challenges faced when moving toward a production environment. As far as possible, some key concepts are illustrated using two realistic use-cases applied to multilayer optical networks: cognitive service provisioning and quality of transmission estimation.", "venue": "IEEE/OSA Journal of Optical Communications and Networking", "year": 2021, "referenceCount": 65, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": "13", "pages": "A1-A12", "name": "IEEE/OSA Journal of Optical Communications and Networking"}, "authors": [{"authorId": "120320915", "name": "R. Morais"}]}, {"paperId": "1d6a03d2f0964f6b3c85e70cb32fa446c2562dfb", "externalIds": {"DOI": "10.1016/j.cognition.2020.104533", "CorpusId": 229380592, "PubMed": "33375954"}, "corpusId": 229380592, "publicationVenue": {"id": "a3c74f56-9d9e-4dca-b159-87ffb93d8e47", "name": "Cognition", "type": "journal", "alternate_names": ["Int Conf Augment Cogn", "International Conference on Augmented Cognition"], "issn": "0010-0277", "alternate_issns": ["2392-4624"], "url": "https://www.journals.elsevier.com/cognition", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00100277"]}, "url": "https://www.semanticscholar.org/paper/1d6a03d2f0964f6b3c85e70cb32fa446c2562dfb", "title": "The physical basis of memory", "abstract": null, "venue": "Cognition", "year": 2020, "referenceCount": 92, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-12-26", "journal": {"volume": "213", "name": "Cognition"}, "authors": [{"authorId": "2646034", "name": "C. Gallistel"}]}, {"paperId": "db097e173305b6ee9a5924944b46d1fb82fd585b", "externalIds": {"MAG": "3110757401", "DBLP": "journals/corr/abs-2012-02592", "ArXiv": "2012.02592", "DOI": "10.3390/PHILOSOPHIES6010006", "CorpusId": 227305284}, "corpusId": 227305284, "publicationVenue": {"id": "ef4fb77f-61b5-4988-8f50-738b45be5d7e", "name": "Philosophies", "type": "journal", "issn": "0766-1398", "alternate_issns": ["2409-9287"], "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-691408", "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-691408", "https://www.mdpi.com/journal/philosophies"]}, "url": "https://www.semanticscholar.org/paper/db097e173305b6ee9a5924944b46d1fb82fd585b", "title": "Transdisciplinary AI Observatory - Retrospective Analyses and Future-Oriented Contradistinctions", "abstract": "In the last years, artificial intelligence (AI) safety gained international recognition in the light of heterogeneous safety-critical and ethical issues that risk overshadowing the broad beneficial impacts of AI. In this context, the implementation of AI observatory endeavors represents one key research direction. This paper motivates the need for an inherently transdisciplinary AI observatory approach integrating diverse retrospective and counterfactual views. We delineate aims and limitations while providing hands-on-advice utilizing concrete practical examples. Distinguishing between unintentionally and intentionally triggered AI risks with diverse socio-psycho-technological impacts, we exemplify a retrospective descriptive analysis followed by a retrospective counterfactual risk analysis. Building on these AI observatory tools, we present near-term transdisciplinary guidelines for AI safety. As further contribution, we discuss differentiated and tailored long-term directions through the lens of two disparate modern AI safety paradigms. For simplicity, we refer to these two different paradigms with the terms artificial stupidity (AS) and eternal creativity (EC) respectively. While both AS and EC acknowledge the need for a hybrid cognitive-affective approach to AI safety and overlap with regard to many short-term considerations, they differ fundamentally in the nature of multiple envisaged long-term solution patterns. By compiling relevant underlying contradistinctions, we aim to provide future-oriented incentives for constructive dialectics in practical and theoretical AI safety research.", "venue": "Philosophies", "year": 2020, "referenceCount": 248, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/6/1/6/pdf?version=1610682099", "status": null}, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-26", "journal": {"volume": "abs/2012.02592", "name": "ArXiv"}, "authors": [{"authorId": "22617565", "name": "Nadisha-Marie Aliman"}, {"authorId": "3176463", "name": "L. Kester"}, {"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "f087d4e0b7d067879a7d235f3e9936dd6f528859", "externalIds": {"DBLP": "journals/vjcs/WangCPM21", "MAG": "3096027997", "DOI": "10.1142/s2196888821500111", "CorpusId": 228813026}, "corpusId": 228813026, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f087d4e0b7d067879a7d235f3e9936dd6f528859", "title": "Metaheuristic Optimization of Insulin Infusion Protocols Using Historical Data with Validation Using a Patient Simulator", "abstract": "Metaheuristic search algorithms are used to develop new protocols for optimal intravenous insulin infusion rate recommendations in scenarios involving hospital in-patients with Type 1 Diabetes. Two metaheuristic search algorithms are used, namely, Particle Swarm Optimization and Covariance Matrix Adaption Evolution Strategy. The Glucose Regulation for Intensive Care Patients (GRIP) serves as the starting point of the optimization process. We base our experiments on a methodology in the literature to evaluate the favorability of insulin protocols, with a dataset of blood glucose level/insulin infusion rate time series records from 16 patients obtained from the Waikato District Health Board. New and significantly better insulin infusion strategies than GRIP are discovered from the data through metaheuristic search. The newly discovered strategies are further validated and show good performance against various competitive benchmarks using a virtual patient simulator.", "venue": "Vietnam. J. Comput. Sci.", "year": 2020, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-05", "journal": {"volume": "8", "pages": "263-290", "name": "Vietnam. J. Comput. Sci."}, "authors": [{"authorId": "2109800642", "name": "Hongyu Wang"}, {"authorId": "4004822", "name": "L. Chepulis"}, {"authorId": "1500566287", "name": "R. Paul"}, {"authorId": "145809333", "name": "Michael Mayo"}]}, {"paperId": "91c92904e8ebb5af869badad53dacf465cc769e9", "externalIds": {"DBLP": "journals/ijsr/DubeA21", "MAG": "3042776525", "PubMedCentral": "7591690", "DOI": "10.1007/s12369-020-00706-0", "CorpusId": 225095386, "PubMed": "33133302"}, "corpusId": 225095386, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/91c92904e8ebb5af869badad53dacf465cc769e9", "title": "Foundations of Erobotics", "abstract": null, "venue": "Int. J. Soc. Robotics", "year": 2020, "referenceCount": 350, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12369-020-00706-0.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Sociology", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-10-28", "journal": {"volume": "13", "pages": "1205 - 1233", "name": "International Journal of Social Robotics"}, "authors": [{"authorId": "9936998", "name": "Simon Dub\u00e9"}, {"authorId": "2081570739", "name": "D. Anctil"}]}, {"paperId": "111da19e8911ba04cdd38fec42587c8b8c976287", "externalIds": {"ArXiv": "2010.03303", "DBLP": "journals/corr/abs-2010-03303", "MAG": "3092243509", "DOI": "10.1016/j.jss.2021.110911", "CorpusId": 222177507}, "corpusId": 222177507, "publicationVenue": {"id": "10a4a695-8417-42c7-983d-742df48b3905", "name": "Journal of Systems and Software", "type": "journal", "alternate_names": ["J Syst Softw"], "issn": "0164-1212", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description#description", "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description", "http://www.sciencedirect.com/science/journal/01641212"]}, "url": "https://www.semanticscholar.org/paper/111da19e8911ba04cdd38fec42587c8b8c976287", "title": "A ground-truth dataset and classification model for detecting bots in GitHub issue and PR comments", "abstract": null, "venue": "Journal of Systems and Software", "year": 2020, "referenceCount": 73, "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2010.03303", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-10-07", "journal": {"volume": "175", "pages": "110911", "name": "J. Syst. Softw."}, "authors": [{"authorId": "13546149", "name": "M. Golzadeh"}, {"authorId": "2794053", "name": "Alexandre Decan"}, {"authorId": "52307499", "name": "Damien Legay"}, {"authorId": "1794675", "name": "T. Mens"}]}, {"paperId": "06251e6298a0d3ba3f0a26360c726920c7581575", "externalIds": {"ArXiv": "2009.04324", "DBLP": "conf/nips/CabannesPBR21", "CorpusId": 235359268}, "corpusId": 235359268, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/06251e6298a0d3ba3f0a26360c726920c7581575", "title": "Overcoming the curse of dimensionality with Laplacian regularization in semi-supervised learning", "abstract": "As annotations of data can be scarce in large-scale practical problems, leveraging unlabelled examples is one of the most important aspects of machine learning. This is the aim of semi-supervised learning. To bene\ufb01t from the access to unlabelled data, it is natural to diffuse smoothly knowledge of labelled data to unlabelled one. This induces to the use of Laplacian regularization. Yet, current implementations of Laplacian regularization suffer from several drawbacks, notably the well-known curse of dimensionality. In this paper, we provide a statistical analysis to overcome those issues, and unveil a large body of spectral \ufb01ltering methods that exhibit desirable behaviors. They are implemented through (reproducing) kernel methods, for which we provide realistic computational guidelines in order to make our method usable with large amounts of data.", "venue": "NeurIPS", "year": 2020, "referenceCount": 62, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-09", "journal": {"pages": "30439-30451"}, "authors": [{"authorId": "1387995815", "name": "Vivien A. Cabannes"}, {"authorId": "1399505772", "name": "Loucas Pillaud-Vivien"}, {"authorId": "144570279", "name": "F. Bach"}, {"authorId": "145383040", "name": "Alessandro Rudi"}]}, {"paperId": "8bb3cffd7d46630273dabfe4e6b88fe8341737ef", "externalIds": {"DBLP": "journals/electronicmarkets/NeuhoferMC21", "MAG": "3084159310", "PubMedCentral": "7476646", "DOI": "10.1007/s12525-020-00433-4", "CorpusId": 221535975}, "corpusId": 221535975, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8bb3cffd7d46630273dabfe4e6b88fe8341737ef", "title": "The impact of artificial intelligence on event experiences: a scenario technique approach", "abstract": null, "venue": "Electron. Mark.", "year": 2020, "referenceCount": 118, "citationCount": 21, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12525-020-00433-4.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-07", "journal": {"volume": "31", "pages": "601 - 617", "name": "Electronic Markets"}, "authors": [{"authorId": "2952915", "name": "Barbara Neuhofer"}, {"authorId": "1933098026", "name": "Bianca Magnus"}, {"authorId": "94570142", "name": "Krzysztof Celuch"}]}, {"paperId": "10bb7e2c54b947fa50e7bb65b0b5c700fe998044", "externalIds": {"DBLP": "journals/corr/abs-2009-03300", "MAG": "3083410900", "ArXiv": "2009.03300", "CorpusId": 221516475}, "corpusId": 221516475, "publicationVenue": {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", "name": "International Conference on Learning Representations", "type": "conference", "alternate_names": ["Int Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, "url": "https://www.semanticscholar.org/paper/10bb7e2c54b947fa50e7bb65b0b5c700fe998044", "title": "Measuring Massive Multitask Language Understanding", "abstract": "We propose a new test to measure a text model's multitask accuracy. The test covers 57 tasks including elementary mathematics, US history, computer science, law, and more. To attain high accuracy on this test, models must possess extensive world knowledge and problem solving ability. We find that while most recent models have near random-chance accuracy, the very largest GPT-3 model improves over random chance by almost 20 percentage points on average. However, on every one of the 57 tasks, the best models still need substantial improvements before they can reach expert-level accuracy. Models also have lopsided performance and frequently do not know when they are wrong. Worse, they still have near-random accuracy on some socially important subjects such as morality and law. By comprehensively evaluating the breadth and depth of a model's academic and professional understanding, our test can be used to analyze models across many tasks and to identify important shortcomings.", "venue": "International Conference on Learning Representations", "year": 2020, "referenceCount": 32, "citationCount": 91, "influentialCitationCount": 25, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-07", "journal": {"volume": "abs/2009.03300", "name": "ArXiv"}, "authors": [{"authorId": "3422872", "name": "Dan Hendrycks"}, {"authorId": "90909974", "name": "Collin Burns"}, {"authorId": "104444594", "name": "Steven Basart"}, {"authorId": "1380103052", "name": "Andy Zou"}, {"authorId": "16787428", "name": "Mantas Mazeika"}, {"authorId": "143711382", "name": "D. Song"}, {"authorId": "5164568", "name": "J. Steinhardt"}]}, {"paperId": "c312e8c2bae0f49616d11a02c2a7bfa15973ddf4", "externalIds": {"DBLP": "journals/ais/Zemcik21", "MAG": "3082094438", "DOI": "10.1007/s00146-020-01053-4", "CorpusId": 225313255}, "corpusId": 225313255, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/c312e8c2bae0f49616d11a02c2a7bfa15973ddf4", "title": "Failure of chatbot Tay was evil, ugliness and uselessness in its nature or do we judge it through cognitive shortcuts and biases?", "abstract": null, "venue": "Ai & Society", "year": 2020, "referenceCount": 8, "citationCount": 8, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-02", "journal": {"volume": "36", "pages": "361-367", "name": "AI & SOCIETY"}, "authors": [{"authorId": "120384924", "name": "Tom\u00e1s Zemc\u00edk"}]}, {"paperId": "557ed446503524c111d3c0d661672001d559b3c2", "externalIds": {"DBLP": "journals/corr/abs-2008-09000", "ArXiv": "2008.09000", "MAG": "3050693196", "DOI": "10.1007/s00894-021-04674-8", "CorpusId": 221186992, "PubMed": "33543405"}, "corpusId": 221186992, "publicationVenue": {"id": "f5941d4c-ae95-4e56-b615-0f621af56ae0", "name": "Journal of Molecular Modeling", "type": "journal", "alternate_names": ["J Mol Model"], "issn": "1430-8622", "alternate_issns": ["0949-183X", "0948-5023"], "url": "https://link.springer.com/journal/894"}, "url": "https://www.semanticscholar.org/paper/557ed446503524c111d3c0d661672001d559b3c2", "title": "Generative chemistry: drug discovery with deep learning generative models", "abstract": null, "venue": "Journal of Molecular Modeling", "year": 2020, "referenceCount": 182, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2008.09000", "status": null}, "fieldsOfStudy": ["Medicine", "Biology", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2020-08-20", "journal": {"volume": "27", "name": "Journal of Molecular Modeling"}, "authors": [{"authorId": "11042668", "name": "Yuemin Bian"}, {"authorId": "144465514", "name": "X. Xie"}]}, {"paperId": "52d73ff6823e2339f9aeb4a30a4576d7b42968bc", "externalIds": {"PubMedCentral": "9069665", "MAG": "3083777683", "DOI": "10.1177/17456916211004899", "CorpusId": 225624737, "PubMed": "34606730"}, "corpusId": 225624737, "publicationVenue": {"id": "8ec18bc5-9c95-446c-a293-735d7ae1e3e9", "name": "Perspectives on Psychological Science", "type": "journal", "alternate_names": ["Perspect Psychol Sci"], "issn": "1745-6916", "url": "http://www.sagepub.com/journals/Journal201964/title", "alternate_urls": ["https://uk.sagepub.com/en-gb/eur/journal/perspectives-psychological-science", "http://pps.sagepub.com/", "https://www.jstor.org/journal/perspsycscie", "http://www.jstor.org/action/showPublication?journalCode=perspsycscie"]}, "url": "https://www.semanticscholar.org/paper/52d73ff6823e2339f9aeb4a30a4576d7b42968bc", "title": "From Text to Thought: How Analyzing Language Can Advance Psychological Science", "abstract": "Humans have been using language for millennia but have only just begun to scratch the surface of what natural language can reveal about the mind. Here we propose that language offers a unique window into psychology. After briefly summarizing the legacy of language analyses in psychological science, we show how methodological advances have made these analyses more feasible and insightful than ever before. In particular, we describe how two forms of language analysis\u2014natural-language processing and comparative linguistics\u2014are contributing to how we understand topics as diverse as emotion, creativity, and religion and overcoming obstacles related to statistical power and culturally diverse samples. We summarize resources for learning both of these methods and highlight the best way to combine language analysis with more traditional psychological paradigms. Applying language analysis to large-scale and cross-cultural datasets promises to provide major breakthroughs in psychological science.", "venue": "Perspectives on Psychological Science", "year": 2020, "referenceCount": 176, "citationCount": 28, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://pure.mpg.de/pubman/item/item_3244426_5/component/file_3383466/shh2661.pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Psychology", "Sociology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-07-09", "journal": {"volume": "17", "pages": "805 - 826", "name": "Perspectives on Psychological Science"}, "authors": [{"authorId": "16179628", "name": "J. Jackson"}, {"authorId": "48389642", "name": "Joseph Watts"}, {"authorId": "39563764", "name": "Johann-Mattis List"}, {"authorId": "39513299", "name": "Curtis Puryear"}, {"authorId": "2006135012", "name": "Ryan Drabble"}, {"authorId": "2593387", "name": "Kristen A. Lindquist"}]}, {"paperId": "368a8fbf6304a192a67f614d032510e5a4100552", "externalIds": {"MAG": "3034942609", "DBLP": "journals/csur/WangYKN20", "DOI": "10.1145/3386252", "CorpusId": 152282330}, "corpusId": 152282330, "publicationVenue": {"id": "7b2adce0-d53f-49d6-8784-b0645604fe62", "name": "ACM Computing Surveys", "type": "journal", "alternate_names": ["ACM Comput Surv"], "issn": "0360-0300", "url": "http://www.acm.org/pubs/surveys/", "alternate_urls": ["http://portal.acm.org/csur", "https://csur.acm.org/", "http://csur.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/368a8fbf6304a192a67f614d032510e5a4100552", "title": "Generalizing from a Few Examples", "abstract": "Machine learning has been highly successful in data-intensive applications but is often hampered when the data set is small. Recently, Few-shot Learning (FSL) is proposed to tackle this problem. Using prior knowledge, FSL can rapidly generalize to new tasks containing only a few samples with supervised information. In this article, we conduct a thorough survey to fully understand FSL. Starting from a formal definition of FSL, we distinguish FSL from several relevant machine learning problems. We then point out that the core issue in FSL is that the empirical risk minimizer is unreliable. Based on how prior knowledge can be used to handle this core issue, we categorize FSL methods from three perspectives: (i) data, which uses prior knowledge to augment the supervised experience; (ii) model, which uses prior knowledge to reduce the size of the hypothesis space; and (iii) algorithm, which uses prior knowledge to alter the search for the best hypothesis in the given hypothesis space. With this taxonomy, we review and discuss the pros and cons of each category. Promising directions, in the aspects of the FSL problem setups, techniques, applications, and theories, are also proposed to provide insights for future research.1", "venue": "ACM Computing Surveys", "year": 2020, "referenceCount": 187, "citationCount": 385, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2020-06-12", "journal": {"volume": "53", "pages": "1 - 34", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "49416601", "name": "Yaqing Wang"}, {"authorId": "3259992", "name": "Quanming Yao"}, {"authorId": "145193332", "name": "J. Kwok"}, {"authorId": "1726587", "name": "L. Ni"}]}, {"paperId": "addfdbc534e70ac98819698e6edc6f83a4aa82c7", "externalIds": {"ArXiv": "2006.07390", "MAG": "3083297807", "PubMedCentral": "8339439", "DOI": "10.1093/nc/niab014", "CorpusId": 221516681, "PubMed": "34377534"}, "corpusId": 221516681, "publicationVenue": {"id": "0402af5b-c494-4d05-ac74-a7382c7444fd", "name": "Neuroscience of Consciousness", "type": "journal", "alternate_names": ["Neurosci Conscious"], "issn": "2057-2107", "url": "http://nc.oxfordjournals.org/"}, "url": "https://www.semanticscholar.org/paper/addfdbc534e70ac98819698e6edc6f83a4aa82c7", "title": "Formalizing falsification for theories of consciousness across computational hierarchies", "abstract": "Abstract The scientific study of consciousness is currently undergoing a critical transition in the form of a rapidly evolving scientific debate regarding whether or not currently proposed theories can be assessed for their scientific validity. At the forefront of this debate is Integrated Information Theory (IIT), widely regarded as the preeminent theory of consciousness because it quantified subjective experience in a scalar mathematical measure called \u03a6 that is in principle measurable. Epistemological issues in the form of the \u201cunfolding argument\u201d have provided a concrete refutation of IIT by demonstrating how it permits functionally identical systems to have differences in their predicted consciousness. The implication is that IIT and any other proposed theory based on a physical system\u2019s causal structure may already be falsified even in the absence of experimental refutation. However, so far many of these arguments surrounding the epistemological foundations of falsification arguments, such as the unfolding argument, are too abstract to determine the full scope of their implications. Here, we make these abstract arguments concrete, by providing a simple example of functionally equivalent machines realizable with table-top electronics that take the form of isomorphic digital circuits with and without feedback. This allows us to explicitly demonstrate the different levels of abstraction at which a theory of consciousness can be assessed. Within this computational hierarchy, we show how IIT is simultaneously falsified at the finite-state automaton level and unfalsifiable at the combinatorial-state automaton level. We use this example to illustrate a more general set of falsification criteria for theories of consciousness: to avoid being already falsified, or conversely unfalsifiable, scientific theories of consciousness must be invariant with respect to changes that leave the inference procedure fixed at a particular level in a computational hierarchy.", "venue": "Neuroscience of Consciousness", "year": 2020, "referenceCount": 45, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/nc/article-pdf/2021/2/niab014/39572120/niab014.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-06-12", "journal": {"volume": "2021", "name": "Neuroscience of Consciousness"}, "authors": [{"authorId": "69873213", "name": "J. Hanson"}, {"authorId": "1946477", "name": "S. Walker"}]}, {"paperId": "6ece757d968c1b5a7f2ad2a2b3d3441a8df7e195", "externalIds": {"DBLP": "journals/corr/abs-2006-04013", "MAG": "3033205754", "ArXiv": "2006.04013", "DOI": "10.1007/s00146-021-01151-x", "CorpusId": 219531429}, "corpusId": 219531429, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/6ece757d968c1b5a7f2ad2a2b3d3441a8df7e195", "title": "AI from Concrete to Abstract", "abstract": null, "venue": "Ai & Society", "year": 2020, "referenceCount": 87, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2006.04013", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-06-07", "journal": {"volume": "36", "pages": "877 - 893", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2071407075", "name": "Rubens Lacerda Queiroz"}, {"authorId": "21659444", "name": "F. F. Sampaio"}, {"authorId": "2061257884", "name": "Cabral Lima"}, {"authorId": "144829981", "name": "P. Lima"}]}, {"paperId": "183f6bc6b577ab2faf18f3fe123144e02855259e", "externalIds": {"DBLP": "journals/corr/abs-2006-03986", "ArXiv": "2006.03986", "MAG": "3033157075", "DOI": "10.1109/comst.2021.3118271", "CorpusId": 219531190}, "corpusId": 219531190, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/183f6bc6b577ab2faf18f3fe123144e02855259e", "title": "Online Advertising Security: Issues, Taxonomy, and Future Directions", "abstract": "Online advertising has become the backbone of the Internet economy by revolutionizing business marketing. It provides a simple and efficient way for advertisers to display their advertisements to specific individual users, and over the last couple of years has contributed to an explosion in the income stream for several Web-based businesses. For example, Google\u2019s income from advertising grew 51.6% between 2016 and 2018, to $\\$ $ 136.8 billion. This exponential growth in advertising revenue has motivated fraudsters to exploit the weaknesses of the online advertising model to make money, and researchers to discover new security vulnerabilities in the model, to propose countermeasures and to forecast future trends in research. Motivated by these considerations, this paper presents a comprehensive review of the security threats to online advertising systems. We begin by introducing the motivation for online advertising system, explain how it differs from traditional advertising networks, introduce terminology, and define the current online advertising architecture. We then devise a comprehensive taxonomy of attacks on online advertising to raise awareness among researchers about the vulnerabilities of online advertising ecosystem. We discuss the limitations and effectiveness of the countermeasures that have been developed to secure entities in the advertising ecosystem against these attacks. To complete our work, we identify some open issues and outline some possible directions for future research towards improving security methods for online advertising systems.", "venue": "IEEE Communications Surveys & Tutorials", "year": 2020, "referenceCount": 187, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2006.03986", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2020-06-06", "journal": {"volume": "23", "pages": "2494-2524", "name": "IEEE Communications Surveys & Tutorials"}, "authors": [{"authorId": "1795589", "name": "Zahra Pooranian"}, {"authorId": "145746490", "name": "M. Conti"}, {"authorId": "1763096", "name": "H. Haddadi"}, {"authorId": "1682912", "name": "R. Tafazolli"}]}, {"paperId": "570163353e0a954d9e5829f6ae92ae09c3225041", "externalIds": {"PubMedCentral": "8205518", "DBLP": "journals/corr/abs-2005-11016", "ArXiv": "2005.11016", "MAG": "3027291647", "DOI": "10.3389/frobt.2021.584075", "CorpusId": 218862857, "PubMed": "34141726"}, "corpusId": 218862857, "publicationVenue": {"id": "2ee61499-676f-46c2-afde-d4c0cb4393e6", "name": "Frontiers in Robotics and AI", "type": "journal", "alternate_names": ["Front Robot AI"], "issn": "2296-9144", "url": "https://www.frontiersin.org/journals/robotics-and-ai", "alternate_urls": ["http://www.frontiersin.org/Robotics_and_AI/archive", "http://www.frontiersin.org/Robotics_and_AI/about", "http://www.frontiersin.org/Robotics_and_AI"]}, "url": "https://www.semanticscholar.org/paper/570163353e0a954d9e5829f6ae92ae09c3225041", "title": "Reinforcement Learning With Human Advice: A Survey", "abstract": "In this paper, we provide an overview of the existing methods for integrating human advice into a reinforcement learning process. We first propose a taxonomy of the different forms of advice that can be provided to a learning agent. We then describe the methods that can be used for interpreting advice when its meaning is not determined beforehand. Finally, we review different approaches for integrating advice into the learning process.", "venue": "Frontiers in Robotics and AI", "year": 2020, "referenceCount": 158, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2021.584075/pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2020-05-22", "journal": {"volume": "8", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "144048526", "name": "Anis Najar"}, {"authorId": "1680828", "name": "M. Chetouani"}]}, {"paperId": "05a0f19796dd1c25ce9eda00e43cf4977dcd3810", "externalIds": {"MAG": "3084211362", "DBLP": "journals/chb/KobisM21", "DOI": "10.1016/j.chb.2020.106553", "CorpusId": 221562332}, "corpusId": 221562332, "publicationVenue": {"id": "435ffef1-21df-491d-b69a-605eee1b7f7f", "name": "Computers in Human Behavior", "type": "journal", "alternate_names": ["Comput Hum Behav"], "issn": "0747-5632", "url": "https://www.journals.elsevier.com/computers-in-human-behavior", "alternate_urls": ["https://www.sciencedirect.com/science/article/pii/S0747563216307695", "http://www.sciencedirect.com/science/journal/07475632"]}, "url": "https://www.semanticscholar.org/paper/05a0f19796dd1c25ce9eda00e43cf4977dcd3810", "title": "Artificial intelligence versus Maya Angelou: Experimental evidence that people cannot differentiate AI-generated from human-written poetry", "abstract": null, "venue": "Computers in Human Behavior", "year": 2020, "referenceCount": 82, "citationCount": 38, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-05-20", "journal": {"volume": "114", "pages": "106553", "name": "Comput. Hum. Behav."}, "authors": [{"authorId": "47691963", "name": "N. K\u00f6bis"}, {"authorId": "1707029671", "name": "Luca Mossink"}]}, {"paperId": "884b0fe671f2227d10bcb04ac61767a7371bd64e", "externalIds": {"DBLP": "journals/corr/abs-2005-07289", "ArXiv": "2005.07289", "MAG": "3025859175", "DOI": "10.1109/CVPR46437.2021.00859", "CorpusId": 218665674}, "corpusId": 218665674, "publicationVenue": {"id": "768b87bb-8a18-4d9c-a161-4d483c776bcf", "name": "Computer Vision and Pattern Recognition", "type": "conference", "alternate_names": ["CVPR", "Comput Vis Pattern Recognit"], "issn": "1063-6919", "url": "https://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000147", "alternate_urls": ["https://en.wikipedia.org/wiki/Conference_on_Computer_Vision_and_Pattern_Recognition"]}, "url": "https://www.semanticscholar.org/paper/884b0fe671f2227d10bcb04ac61767a7371bd64e", "title": "Taskology: Utilizing Task Relations at Scale", "abstract": "Many computer vision tasks address the problem of scene understanding and are naturally interrelated e.g. object classification, detection, scene segmentation, depth estimation, etc. We show that we can leverage the inherent relationships among collections of tasks, as they are trained jointly, supervising each other through their known relationships via consistency losses. Furthermore, explicitly utilizing the relationships between tasks allows improving their performance while dramatically reducing the need for labeled data, and allows training with additional unsupervised or simulated data. We demonstrate a distributed joint training algorithm with task-level parallelism, which affords a high degree of asynchronicity and robustness. This allows learning across multiple tasks, or with large amounts of input data, at scale. We demonstrate our framework on subsets of the following collection of tasks: depth and normal prediction, semantic segmentation, 3D motion and egomotion estimation, and object tracking and 3D detection in point clouds. We observe improved performance across these tasks, especially in the low-label regime.", "venue": "Computer Vision and Pattern Recognition", "year": 2020, "referenceCount": 94, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2005.07289", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2020-05-14", "journal": {"pages": "8696-8705", "name": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"}, "authors": [{"authorId": "2143370665", "name": "Yao Lu"}, {"authorId": "2604835", "name": "S. Pirk"}, {"authorId": "16026105", "name": "Jan Dlabal"}, {"authorId": "118025075", "name": "Anthony Brohan"}, {"authorId": "30803019", "name": "Ankita Pasad"}, {"authorId": "2119258071", "name": "Zhao Chen"}, {"authorId": "24026083", "name": "Vincent Casser"}, {"authorId": "145426908", "name": "A. Angelova"}, {"authorId": "152894252", "name": "A. Gordon"}]}, {"paperId": "6daffd44d4c71d8423e021e8d516487a98426f7d", "externalIds": {"MAG": "3019998525", "DOI": "10.1007/978-981-15-9712-1_31", "CorpusId": 225939734}, "corpusId": 225939734, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6daffd44d4c71d8423e021e8d516487a98426f7d", "title": "Natural Language Processing: History, Evolution, Application, and Future Work", "abstract": null, "venue": "Lecture Notes in Networks and Systems", "year": 2020, "referenceCount": 17, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-04-23", "journal": {"name": "Lecture Notes in Networks and Systems"}, "authors": [{"authorId": "2951543", "name": "P. Johri"}, {"authorId": "2168094026", "name": "Mukul Kathait"}, {"authorId": "33190741", "name": "Munish Sabharwal"}, {"authorId": "1403383401", "name": "A. Al-Taani"}, {"authorId": "102254088", "name": "S. Suvanov"}]}, {"paperId": "3ed06aca3b25a9af89f08b949753372d29647a10", "externalIds": {"ACL": "2021.humeval-1.3", "DBLP": "journals/corr/abs-2004-10450", "MAG": "3020264409", "ArXiv": "2004.10450", "CorpusId": 216056240}, "corpusId": 216056240, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3ed06aca3b25a9af89f08b949753372d29647a10", "title": "Trading Off Diversity and Quality in Natural Language Generation", "abstract": "For open-ended language generation tasks such as storytelling or dialogue, choosing the right decoding algorithm is vital for controlling the tradeoff between generation quality and diversity. However, there presently exists no consensus on which decoding procedure is best or even the criteria by which to compare them. In this paper, we cast decoding as a tradeoff between response quality and diversity, and we perform the first large-scale evaluation of decoding methods along the entire quality-diversity spectrum. Our experiments confirm the existence of the likelihood trap: the counter-intuitive observation that high likelihood sequences are often surprisingly low quality. We also find that when diversity is a priority, all methods perform similarly, but when quality is viewed as more important, nucleus sampling (Holtzman et al., 2019) outperforms all other evaluated decoding algorithms.", "venue": "HUMEVAL", "year": 2020, "referenceCount": 39, "citationCount": 35, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-04-22", "journal": {"volume": "abs/2004.10450", "name": "ArXiv"}, "authors": [{"authorId": "66194020", "name": "Hugh Zhang"}, {"authorId": "40620532", "name": "Daniel Duckworth"}, {"authorId": "7975935", "name": "Daphne Ippolito"}, {"authorId": "2072676", "name": "Arvind Neelakantan"}]}, {"paperId": "697586e9404b69bebbad312836ba200fde79d21d", "externalIds": {"ArXiv": "2004.03541", "PubMedCentral": "8052953", "MAG": "3015208662", "DOI": "10.1093/nc/niab001", "CorpusId": 215238327, "PubMed": "33889423"}, "corpusId": 215238327, "publicationVenue": {"id": "0402af5b-c494-4d05-ac74-a7382c7444fd", "name": "Neuroscience of Consciousness", "type": "journal", "alternate_names": ["Neurosci Conscious"], "issn": "2057-2107", "url": "http://nc.oxfordjournals.org/"}, "url": "https://www.semanticscholar.org/paper/697586e9404b69bebbad312836ba200fde79d21d", "title": "Falsification and consciousness", "abstract": "Abstract The search for a scientific theory of consciousness should result in theories that are falsifiable. However, here we show that falsification is especially problematic for theories of consciousness. We formally describe the standard experimental setup for testing these theories. Based on a theory\u2019s application to some physical system, such as the brain, testing requires comparing a theory\u2019s predicted experience (given some internal observables of the system like brain imaging data) with an inferred experience (using report or behavior). If there is a mismatch between inference and prediction, a theory is falsified. We show that if inference and prediction are independent, it follows that any minimally informative theory of consciousness is automatically falsified. This is deeply problematic since the field\u2019s reliance on report or behavior to infer conscious experiences implies such independence, so this fragility affects many contemporary theories of consciousness. Furthermore, we show that if inference and prediction are strictly dependent, it follows that a theory is unfalsifiable. This affects theories which claim consciousness to be determined by report or behavior. Finally, we explore possible ways out of this dilemma.", "venue": "Neuroscience of Consciousness", "year": 2020, "referenceCount": 90, "citationCount": 16, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/nc/article-pdf/2021/1/niab001/37119674/niab001.pdf", "status": null}, "fieldsOfStudy": ["Medicine", "Biology", "Psychology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-04-07", "journal": {"volume": "2021", "name": "Neuroscience of Consciousness"}, "authors": [{"authorId": "102239495", "name": "Johannes Kleiner"}, {"authorId": "30306962", "name": "Erik P. Hoel"}]}, {"paperId": "663c3cef4ff7c1eb2a1d4f7fa9f94c6d7c47eeb9", "externalIds": {"DBLP": "journals/electronicmarkets/MoussawiKB21", "MAG": "3014007670", "DOI": "10.1007/s12525-020-00411-w", "CorpusId": 216194438}, "corpusId": 216194438, "publicationVenue": {"id": "21b370ff-cb87-4599-b39a-25cd5a1b03cb", "name": "Electronic Markets", "type": "journal", "alternate_names": ["Electron Mark"], "issn": "1019-6781", "url": "http://www.metapress.com/openurl.asp?genre=journal&issn=1019-6781", "alternate_urls": ["http://www.electronicmarkets.org/", "https://link.springer.com/journal/12525"]}, "url": "https://www.semanticscholar.org/paper/663c3cef4ff7c1eb2a1d4f7fa9f94c6d7c47eeb9", "title": "How perceptions of intelligence and anthropomorphism affect adoption of personal intelligent agents", "abstract": null, "venue": "Electronic Markets", "year": 2020, "referenceCount": 148, "citationCount": 54, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-03-27", "journal": {"volume": "", "pages": "1-22", "name": "Electronic Markets"}, "authors": [{"authorId": "2252360", "name": "Sara Moussawi"}, {"authorId": "1750816", "name": "M. Koufaris"}, {"authorId": "1398858131", "name": "R. Benbunan-Fich"}]}, {"paperId": "0a13d18d27315a67d3f078112ce528cb25620590", "externalIds": {"MAG": "3011145296", "DOI": "10.1101/2020.03.14.992263", "CorpusId": 214725406}, "corpusId": 214725406, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0a13d18d27315a67d3f078112ce528cb25620590", "title": "Morphognostic honey bees communicating nectar location through dance movements", "abstract": "Honey bees are social insects that forage for flower nectar cooperatively. When an individual forager discovers a flower patch rich in nectar, it returns to the hive and performs a \u201cwaggle dance\u201d in the vicinity of other bees that consists of movements communicating the direction and distance to the nectar source. The dance recruits \u201cwitnessing\u201d bees to fly to the location of the nectar to retrieve it, thus cooperatively exploiting the environment. Replicating such complex animal behavior is a step forward on the path to artificial intelligence. This project simulates the bee foraging behavior in a cellular automaton using the Morphognosis machine learning model. The model features hierarchical spatial and temporal contexts that output motor responses from sensory inputs. Given a set of bee foraging and dancing exemplars, and exposing only the external input-output of these behaviors to the Morphognosis learning algorithm, a hive of artificial bees can be generated that forage as their biological counterparts do. A comparison of Morphognosis foraging performance with that of an artificial recurrent neural network is also presented.", "venue": "bioRxiv", "year": 2020, "referenceCount": 53, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.biorxiv.org/content/biorxiv/early/2021/04/22/2020.03.14.992263.full.pdf", "status": null}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-03-17", "journal": {"name": "bioRxiv"}, "authors": [{"authorId": "1717214", "name": "Thomas E. Portegys"}]}, {"paperId": "fcae5999b0e7e8dd7fc86b78ee6a66b7c4707b63", "externalIds": {"DBLP": "journals/tem/Hutchinson21", "MAG": "3012234211", "DOI": "10.1109/TEM.2020.2977222", "CorpusId": 216226787}, "corpusId": 216226787, "publicationVenue": {"id": "899831a7-9af2-403b-b185-fa56c8634454", "name": "IEEE transactions on engineering management", "type": "journal", "alternate_names": ["IEEE Transactions on Engineering Management", "IEEE Trans Eng Manag", "IEEE trans eng manag"], "issn": "0018-9391", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=17", "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=17"]}, "url": "https://www.semanticscholar.org/paper/fcae5999b0e7e8dd7fc86b78ee6a66b7c4707b63", "title": "Reinventing Innovation Management: The Impact of Self-Innovating Artificial Intelligence", "abstract": "Through recent leaps in application, artificial intelligence (AI) has become one of the most promising digital technologies, attracting significant attention from scholars and practitioners alike. Prior innovation research has mainly focused on the opportunities for and challenges to infusing digital technologies into the innovation process. However, understanding the general effects of digital technologies is insufficient as their specific fields of application differ. AI is distinct from other digital technologies, given its potential to evolve into both a general-purpose technology and a method of inventing, and several firms are beginning to integrate AI into their innovation processes. We capture this phenomenon by introducing a concept we term self-innovating artificial intelligence (SAI), defined as the organizational utilization of AI with the aim of incrementally advancing existing or developing new products, based on insights from continuously combining and analyzing multiple data sources. As SAI is about to fundamentally change how innovations are created, this article describes the underlying AI technology; conceptualizes and outlines how firms may incorporate SAI into their innovation processes with the aim of developing increasingly complex products; and offers potential avenues for further research in this intriguing domain.", "venue": "IEEE transactions on engineering management", "year": 2020, "referenceCount": 128, "citationCount": 15, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-03-13", "journal": {"volume": "68", "pages": "628-639", "name": "IEEE Transactions on Engineering Management"}, "authors": [{"authorId": "152651804", "name": "Philip Hutchinson"}]}, {"paperId": "f31c4463918906cabe1853c72e7e8e4e9d841ef6", "externalIds": {"DBLP": "journals/jors/Ormerod21", "MAG": "3008324209", "DOI": "10.1080/01605682.2019.1650619", "CorpusId": 213470660}, "corpusId": 213470660, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f31c4463918906cabe1853c72e7e8e4e9d841ef6", "title": "The fitness and survival of the OR profession in the age of artificial intelligence", "abstract": "Abstract How will AI affect OR practice? In OR we aspire to be logical, and therefore our behaviours should be relatively easy to replicate in logic, the basis of computer systems. We also pride ourselves on our attention to context, our project management skills, and our pragmatic approach. To think about the issues, we can turn to our experience of practicing OR and to the insights of mathematics, philosophy, sociology, and economics. Mathematicians and philosophers have widened the scope of logic to cover many aspects of decision-making; sociologists have conducted research into the social context and consequences of new technologies and economists have analysed their rates of penetration. Some OR jobs will be destroyed and others will be created giving rise to new, more varied career paths. The paper concludes that the centre of gravity of OR practice will move from analysis to those aspects difficult to computerise, the \u2018residuals\u2019. When AI does finally displace OR practitioners, it may come in the form of \u2018AI strong enough for OR\u2019, strong enough to satisfy potential OR clients in terms of efficacy and cost. The OR community needs to get involved more deeply in AI; it has the relevant expertise to do so.", "venue": "J. Oper. Res. Soc.", "year": 2020, "referenceCount": 94, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-02-17", "journal": {"volume": "72", "pages": "4 - 22", "name": "Journal of the Operational Research Society"}, "authors": [{"authorId": "1769668", "name": "R. Ormerod"}]}, {"paperId": "549cc4fd07de9200a1d510668d21114d50523aa8", "externalIds": {"ArXiv": "1909.01095", "DOI": "10.2139/ssrn.3453632", "CorpusId": 237267347}, "corpusId": 237267347, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/549cc4fd07de9200a1d510668d21114d50523aa8", "title": "Defining the scope of AI regulations", "abstract": "The paper argues that policy makers should not use the term artificial intelligence (AI) to define the material scope of AI regulations. The argument is developed by proposing a number of requirements for legal definitions, surveying existing AI definitions, and then discussing the extent to which they meet the proposed requirements. It is shown that existing definitions of AI do not meet the most important requirements for legal definitions. Next, the paper suggests that policy makers should instead deploy a risk-based definition of AI. Rather than using the term AI, they should focus on the specific risks they want to reduce. It is shown that the requirements for legal definitions can be better met by considering the main causes of relevant risks: certain technical approaches (e.g. reinforcement learning), applications (e.g. facial recognition), and capabilities (e.g. the ability to physically interact with the environment). Finally, the paper discusses the extent to which this approach can also be applied to more advanced AI systems.", "venue": "", "year": 2019, "referenceCount": 106, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2019-08-26", "journal": {"name": "EngRN: Computer-Aided Engineering (Topic)"}, "authors": [{"authorId": "1388301316", "name": "Jonas Schuett"}]}, {"paperId": "cc0580add283199c2d27c33b934c14e9b6ce9cb4", "externalIds": {"MAG": "2973452142", "DOI": "10.1162/posc_a_00377", "CorpusId": 203700603}, "corpusId": 203700603, "publicationVenue": {"id": "ce255c03-adb2-4aa5-b40b-af286d9e3a68", "name": "Perspectives in Science", "type": "journal", "alternate_names": ["Perspectives on Science", "Perspect Sci"], "issn": "2213-0209", "alternate_issns": ["1063-6145"], "url": "https://www.journals.elsevier.com/perspectives-in-science/", "alternate_urls": ["http://www.mitpressjournals.org/loi/posc", "https://www.mitpressjournals.org/loi/posc", "https://muse.jhu.edu/journal/163", "http://muse.jhu.edu/journals/perspectives_on_science/"]}, "url": "https://www.semanticscholar.org/paper/cc0580add283199c2d27c33b934c14e9b6ce9cb4", "title": "Exploring Minds: Modes of Modeling and Simulation in Artificial Intelligence", "abstract": "Abstract The aim of this paper is to grasp the relevant distinctions between various ways in which models and simulations in Artificial Intelligence (AI) relate to cognitive phenomena. In order to get a systematic picture, a taxonomy is developed that is based on the coordinates of formal versus material analogies and theory-guided versus pre-theoretic models in science. These distinctions have parallels in the computational versus mimetic aspects and in analytic versus exploratory types of computer simulation. The proposed taxonomy cuts across the traditional dichotomies between symbolic and embodied AI, general intelligence and symbol and intelligence and cognitive simulation and human/non-human-like AI. According to the taxonomy proposed here, one can distinguish between four distinct general approaches that figured prominently in early and classical AI, and that have partly developed into distinct research programs: first, phenomenal simulations (e.g., Turing\u2019s \u201cimitation game\u201d); second, simulations that explore general-level formal isomorphisms in pursuit of a general theory of intelligence (e.g., logic-based AI); third, simulations as exploratory material models that serve to develop theoretical accounts of cognitive processes (e.g., Marr\u2019s stages of visual processing and classical connectionism); and fourth, simulations as strictly formal models of a theory of computation that postulates cognitive processes to be isomorphic with computational processes (strong symbolic AI). In continuation of pragmatic views of the modes of modeling and simulating world affairs, this taxonomy of approaches to modeling in AI helps to elucidate how available computational concepts and simulational resources contribute to the modes of representation and theory development in AI research\u2014and what made that research program uniquely dependent on them.", "venue": "Perspectives in Science", "year": 2019, "referenceCount": 98, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2019-08-05", "journal": {"volume": "29", "pages": "409-435", "name": "Perspectives on Science"}, "authors": [{"authorId": "22851126", "name": "Hajo Greif"}]}, {"paperId": "9cb7e69d77e0772bba022016033851f619a02a82", "externalIds": {"MAG": "2946798032", "DOI": "10.1007/s13347-021-00454-7", "CorpusId": 181907131}, "corpusId": 181907131, "publicationVenue": {"id": "bd7cf538-b981-449d-9e6c-64fa64047126", "name": "Philosophy & Technology", "type": "journal", "alternate_names": ["Philos Technol"], "issn": "2210-5433", "url": "https://www.springer.com/philosophy/epistemology+and+philosophy+of+science/journal/13347", "alternate_urls": ["https://link.springer.com/journal/13347"]}, "url": "https://www.semanticscholar.org/paper/9cb7e69d77e0772bba022016033851f619a02a82", "title": "Group Agency and Artificial Intelligence", "abstract": null, "venue": "Philosophy & Technology", "year": 2019, "referenceCount": 84, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13347-021-00454-7.pdf", "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2019-05-16", "journal": {"name": "Philosophy & Technology"}, "authors": [{"authorId": "144451484", "name": "C. List"}]}, {"paperId": "df6ae7c951a4ae2b548c86768cd94be28adee7f3", "externalIds": {"DBLP": "journals/ijhci/ChavesG21", "MAG": "2939803556", "ArXiv": "1904.02743", "DOI": "10.1080/10447318.2020.1841438", "CorpusId": 102350801}, "corpusId": 102350801, "publicationVenue": {"id": "2669396b-fea2-4bef-bf3f-7ddc0967feed", "name": "International journal of human computer interactions", "type": "journal", "alternate_names": ["Int j hum comput interact"], "issn": "2180-1347", "url": "http://www.cscjournals.org/"}, "url": "https://www.semanticscholar.org/paper/df6ae7c951a4ae2b548c86768cd94be28adee7f3", "title": "How Should My Chatbot Interact? A Survey on Social Characteristics in Human\u2013Chatbot Interaction Design", "abstract": "ABSTRACT Chatbots\u2019 growing popularity has brought new challenges to HCI, having changed the patterns of human interactions with computers. The increasing need to approximate conversational interaction styles raises expectations for chatbots to present social behaviors that are habitual in human\u2013human communication. In this survey, we argue that chatbots should be enriched with social characteristics that cohere with users\u2019 expectations, ultimately avoiding frustration and dissatisfaction. We bring together the literature on disembodied, text-based chatbots to derive a conceptual model of social characteristics for chatbots. We analyzed 56 papers from various domains to understand how social characteristics can benefit human\u2013chatbot interactions and identify the challenges and strategies to designing them. Additionally, we discussed how characteristics may influence one another. Our results provide relevant opportunities to both researchers and designers to advance human\u2013chatbot interactions.", "venue": "International journal of human computer interactions", "year": 2019, "referenceCount": 224, "citationCount": 116, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1904.02743", "status": null}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2019-04-04", "journal": {"volume": "37", "pages": "729 - 758", "name": "International Journal of Human\u2013Computer Interaction"}, "authors": [{"authorId": "123881688", "name": "A. Chaves"}, {"authorId": "143911967", "name": "M. Gerosa"}]}, {"paperId": "e8e04363925bdddc99cb954e9e2cdac42710bfdd", "externalIds": {"MAG": "2904554166", "DOI": "10.20906/CPS/CBA2018-0986", "CorpusId": 189331848}, "corpusId": 189331848, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e8e04363925bdddc99cb954e9e2cdac42710bfdd", "title": "CLASSIFICA\u00c7\u00c3O DE DOCUMENTOS DE PATENTES USANDO O DOC2VEC", "abstract": "As patentes sao consideradas fontes extremamente uteis para atividades \nrelacionadas a busca e analise de informacoes e para a geracaoo de novos \nconhecimentos. Neste artigo, usamos um algoritmo de vetor de paragrafo \ndoc2vec, uma extensao do word2vec, que aprende representacoes de frases em \num documento, em um esquema de aprendizagem profunda supervisionada para \na classificacao automatica de patentes. A classificacao foi realizada em documentos \ncom resumos de patentes em ingles, em um processo hierarquico que \ncompreende secoes, classes, subclasses, de acordo com a Classificacao Internacional \nde Patentes (IPC). Os testes foram desenvolvidos em quatro etapas, \nnecessaria, devido ao grande numero de classes e subclasses, com o objetivo \nde identificar codigos IPC primario ou secundarios, caso esteja associado a um \nconjunto de classificacoes relacionadas a outros aspectos expressos na patente. \nOs testes apresentaram resultados bastante promissores na classificacao de patentes. \nOs proximos passos serao produzir avaliacoes qualitativas e compara-las \ncom outros modelos de aprendizagem de maquina presentes na literatura.", "venue": "Administra\u00e7\u00e3o: Princ\u00edpios de Administra\u00e7\u00e3o e Suas Tend\u00eancias - Volume 2", "year": 2017, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, "publicationDate": "2017-12-15", "journal": {"name": "Administra\u00e7\u00e3o: Princ\u00edpios de Administra\u00e7\u00e3o e Suas Tend\u00eancias - Volume 2"}, "authors": [{"authorId": "148219045", "name": "Tamara Aguiar Tavares Mascaremhas"}, {"authorId": "32294745", "name": "Andr\u00e9ia Gentil Bonfante"}, {"authorId": "146126221", "name": "A. W. Mascarenhas"}]}, {"paperId": "f7d2879cd047bf36a85fad050c16445269db6970", "externalIds": {"ArXiv": "1607.00913", "MAG": "2463389769", "DBLP": "journals/jair/AlfonsecaCACAR21", "DOI": "10.1613/jair.1.12202", "CorpusId": 13370840}, "corpusId": 13370840, "publicationVenue": {"id": "aef12dca-60a0-4ca3-819b-cad26d309d4e", "name": "Journal of Artificial Intelligence Research", "type": "journal", "alternate_names": ["JAIR", "J Artif Intell Res", "The Journal of Artificial Intelligence Research"], "issn": "1076-9757", "url": "http://www.jair.org/"}, "url": "https://www.semanticscholar.org/paper/f7d2879cd047bf36a85fad050c16445269db6970", "title": "Superintelligence cannot be contained: Lessons from Computability Theory", "abstract": "Superintelligence is a hypothetical agent that possesses intelligence far surpassing that of the brightest and most gifted human minds. In light of recent advances in machine intelligence, a number of scientists, philosophers and technologists have revived the discussion about the potential catastrophic risks entailed by such an entity. In this article, we trace the origins and development of the neo-fear of superintelligence, and some of the major proposals for its containment. We argue that such containment is, in principle, impossible, due to fundamental limits inherent to computing itself. Assuming that a superintelligence will contain a program that includes all the programs that can be executed by a universal Turing machine on input potentially as complex as the state of the world, strict containment requires simulations of such a program, something theoretically (and practically) infeasible.", "venue": "Journal of Artificial Intelligence Research", "year": 2016, "referenceCount": 59, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://jair.org/index.php/jair/article/download/12202/26642", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2016-07-04", "journal": {"volume": "70", "pages": "65-76", "name": "J. Artif. Intell. Res."}, "authors": [{"authorId": "2330521", "name": "M. Alfonseca"}, {"authorId": "145512647", "name": "Manuel Cebrian"}, {"authorId": "2115339434", "name": "Antonio Fern\u00e1ndez"}, {"authorId": "2362022", "name": "Lorenzo Coviello"}, {"authorId": "2919118", "name": "A. Abeliuk"}, {"authorId": "1705156", "name": "I. Rahwan"}]}, {"paperId": "947843af1a49548fa0cfd8910808df61c50d8b35", "externalIds": {"DOI": "10.1080/04597222.2015.996369", "CorpusId": 219629394}, "corpusId": 219629394, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/947843af1a49548fa0cfd8910808df61c50d8b35", "title": "Reference", "abstract": "These values were discussed in 1967 by the IAG and adopted by the IUGG as the basis of a 'Geodetic Reference System 1967'. Although at that time better values of these constants were available, IUGG decided to adopt the values of the IAU system in order to keep consistency with the values agreed upon by the astronomers. This fact gives to the IAU system a value that has a wider circulation in the scientific community than just astronomers. This gives to the IAU a certain inter-union responsibility in the field. IUGG instructed IAG to prepare values of all relevant parameters representing the standard ellipsoid with these 3 basic characteristic parameters. These values have to be consistent to the 12th significant figure in such a way that geodetic computations on the reference ellipsoid should be good to one tenth of a millimeter. The results of the work carried out independently by several groups are being published in a special issue of 'Bulletin G6od6sique' to appear soon, called 'Geodetic Reference System 1967'. In order to compute these derived parameters, a mean rotational speed of the Earth at 1900.0, CD, had to be defined. It is:", "venue": "Digital Theology: A Computer Science Perspective", "year": 2015, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-01-01", "journal": {"volume": "115", "pages": "501 - 504", "name": "The Military Balance"}, "authors": [{"authorId": "1982090837", "name": "\u010csob Chrudim"}, {"authorId": "1982090667", "name": "I. Foto"}, {"authorId": "1982129241", "name": "Pavel Van \u010dura"}, {"authorId": "1982124696", "name": "Rubena Hradec Kr\u00e1lov\u00e9"}, {"authorId": "2142413397", "name": "A. Rosa"}, {"authorId": "1982295677", "name": "Kau\u010duk Kralupy"}, {"authorId": "1982090754", "name": "P. Hulin"}, {"authorId": "1982090666", "name": "ekolog podniku"}, {"authorId": "1981960205", "name": "Dias Turnov"}, {"authorId": "1981960293", "name": "Ostatn\u00ed rizikov\u00e9 anal\u00fdzy"}]}, {"paperId": null, "externalIds": null, "corpusId": "251391893", "publicationVenue": null, "url": null, "title": "Data de recec\u0327a\u0303o: 05/04/2021 Data de aceitac\u0327a\u0303o: 24/05/2021 O POTENCIAL DA INTELIGE\u0302NCIA ARTIFICIAL PARA O DESENVOLVIMENTO E COMPETITIVIDADE DAS EMPRESAS: UMA SCOPING REVIEW THE POTENTIAL OF ARTIFICIAL INTELLIGENCE FOR THE DEVELOPMENT AND COMPETITIVENESS OF COMPANIES: A SCOPING REVIEW", "abstract": null, "venue": "", "year": 2021, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "06b99f9d06d95dc3ec2335d5600ca0bd6176db80", "externalIds": {"CorpusId": 250987520}, "corpusId": 250987520, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/06b99f9d06d95dc3ec2335d5600ca0bd6176db80", "title": "State-of-the-Art Review Introduction to arti\ufb01cial intelligence in ultrasound imaging in obstetrics and gynecology", "abstract": "Arti\ufb01cial intelligence (AI) uses data and algorithms to aim to draw conclusions that are as good as, or even better than, those drawn by humans. AI is already part of our daily life; it is behind face recognition technology, speech recognition in virtual assistants (such as Amazon Alexa, Apple\u2019s Siri, Google Assistant and Microsoft Cortana) and self-driving cars. AI software has been able to beat world champions in chess, Go and recently even Poker. Relevant to our community, it is a prominent source of innovation in healthcare, already helping to develop new drugs, support clinical decisions and provide quality assurance in radiology. The list of medical image-analysis AI applications with USA Food and Drug Administration or European Union (soon to fall under European Union Medical Device Regulation) approval is and covers such arrhythmia using a or automatic triage of critical to the top of the worklist. performs impact on this \ufb01eld so far. Nevertheless, there is huge potential for AI to assist in repetitive ultrasound tasks, such as automatically identifying good-quality acquisitions and providing instant quality assurance. For this potential to thrive, interdisciplinary communication between AI developers and ultrasound professionals is necessary. In this article, we explore the fundamentals of medical imaging AI, from theory to applicability, and introduce some key terms to medical professionals in the \ufb01eld of ultrasound. We believe that wider knowledge of AI will help accelerate its integration into healthcare.", "venue": "", "year": 2021, "referenceCount": 73, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2058972667", "name": "J. A. Noble"}, {"authorId": "2635802", "name": "A. Papageorghiou"}]}, {"paperId": "cf7cdf0f421a37bbc9358ab74a2f86d26617b64e", "externalIds": {"CorpusId": 250552348}, "corpusId": 250552348, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cf7cdf0f421a37bbc9358ab74a2f86d26617b64e", "title": "The challenges of artificial intelligence for Moroccan companies?", "abstract": "From deep learning to cognitive technology, artificial intelligence is everywhere in digital communication. It allows us to react more accurately to customers and engage them in meaningful, personalized interactions. In other words, without artificial intelligence, there is no digital consumer experience! The design of interactive user interface systems is a growing field of study that requires a wide range of skills, including psychology, artificial intelligence, software engineering and marketing. After a theoretical analysis, the objective of this article is to study the challenges of implementing its practices in relation to a country like Morocco in the different sectors that make up its economy, especially those focused on customer relations and experience.", "venue": "", "year": 2021, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2094569014", "name": "Mkik Marouane"}, {"authorId": "123338531", "name": "Salwa Mkik"}, {"authorId": "2126214668", "name": "Elfazazi Kaoutar"}]}, {"paperId": "d615689b556146eb5ec0adbf9f977d2eab8cbc19", "externalIds": {"DBLP": "conf/iwssl/000121", "CorpusId": 248923345}, "corpusId": 248923345, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d615689b556146eb5ec0adbf9f977d2eab8cbc19", "title": "Artificial Emotions for Rapid Online Explorative Learning", "abstract": "For decades, A.I. has been able to produce impressive results on hard problems, such as games playing in synthetic environments, but have had di\ufb03culty in interfacing with the natural world. Recently machine learning has enabled A.I. to interface more robustly with the real world. Statistical methods for speech understanding opened the door to voice-based systems and more recently deep-learning has revolutionized computer vision to the extent that wild speculation now predicts arti\ufb01cial superintelligence surpassing human intelligence, but we are a few major breakthroughs short of that being achieved. We know what some of these breakthroughs need to be. We need to replace supervised learning with unsupervised learning and we need to take on topics like motivation, attention, and emotions. In this article, we describe an architecture that touches on some of these issues drawing inspiration from neuroscience. We describe three aspects of the architecture in this article that address learning through fear and reward and address the focus of attention. These three systems are intimately linked in mammalian brains. We believe that this work represents an attempt to bridge the gap between high order reasoning and base-level support for motivation and learning in robots.", "venue": "IWSSL", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "63-83"}, "authors": [{"authorId": "2059560627", "name": "P. Robertson"}]}, {"paperId": "bb0e340f8698be1764c291275ac2b29e8f424610", "externalIds": {"DBLP": "conf/icqe/CarmonaGM21", "DOI": "10.1007/978-3-030-93859-8_23", "CorpusId": 245896771}, "corpusId": 245896771, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb0e340f8698be1764c291275ac2b29e8f424610", "title": "Exploring Interactions Between Computational and Critical Thinking in Model-Eliciting Activities Through Epistemic Network Analysis", "abstract": null, "venue": "ICQE", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "346-361"}, "authors": [{"authorId": "2227814", "name": "G. Carmona"}, {"authorId": "2149763982", "name": "Beatriz Galarza-Tohen"}, {"authorId": "2149764421", "name": "Gonzalo Martinez-Medina"}]}, {"paperId": "c7e36d1638fd5620ac1364a260741b9acfd3cad7", "externalIds": {"CorpusId": 244919194}, "corpusId": 244919194, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c7e36d1638fd5620ac1364a260741b9acfd3cad7", "title": "Musical Cyborgs: Human-Machine Contact Spaces for Creative Musical Interaction", "abstract": "The concept of Musical Cyborgs follows Donna Haraway\u2019s \u201cCyborg Manifesto\u201d to describe a non-binary approach for human-machine collaboration with blurred borders between biological and cybernetic worlds. Interface dimensions of embodiment, instrumentality, authenticity, creativity, learning, and aesthetics therein unfold between intentional and self-organizing autonomy and are discussed with their specific requirements, conditions and consequences.", "venue": "", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2614107", "name": "Sebastian Trump"}]}, {"paperId": "d2ac955459c537208991a8191982d05548b61997", "externalIds": {"DOI": "10.1007/978-3-030-78471-3_26", "CorpusId": 240406640}, "corpusId": 240406640, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d2ac955459c537208991a8191982d05548b61997", "title": "The Future of Embodiment Research: Conceptual Themes, Theoretical Tools, and Remaining Challenges", "abstract": null, "venue": "Handbook of Embodied Psychology", "year": 2021, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Handbook of Embodied Psychology"}, "authors": [{"authorId": "4506994", "name": "B. Hommel"}]}, {"paperId": "3b5dde879a735262b95522a69526fbdb98e61839", "externalIds": {"MAG": "3200923600", "DOI": "10.1007/978-3-658-34522-8_12", "CorpusId": 240548208}, "corpusId": 240548208, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3b5dde879a735262b95522a69526fbdb98e61839", "title": "Grundlagen der k\u00fcnstlichen Intelligenz", "abstract": null, "venue": "Architekturen der Verwaltungsdigitalisierung", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Architekturen der Verwaltungsdigitalisierung"}, "authors": [{"authorId": "41201334", "name": "U. Lohmann"}]}, {"paperId": "9f1e61642b9a8c6485dc87c4d1dcef532a8fe07f", "externalIds": {"DBLP": "journals/caeai/OkonkwoA21", "MAG": "3202285719", "DOI": "10.1016/j.caeai.2021.100033", "CorpusId": 244337919}, "corpusId": 244337919, "publicationVenue": {"id": "a4e2f9c2-abbd-4f6b-9e06-ffe639dc07e7", "name": "Computers and Education: Artificial Intelligence", "type": "journal", "alternate_names": ["Comput Educ Artif Intell"], "issn": "2666-920X", "url": "https://www.journals.elsevier.com/computers-and-education-artificial-intelligence"}, "url": "https://www.semanticscholar.org/paper/9f1e61642b9a8c6485dc87c4d1dcef532a8fe07f", "title": "Chatbots applications in education: A systematic review", "abstract": null, "venue": "Computers and Education: Artificial Intelligence", "year": 2021, "referenceCount": 85, "citationCount": 26, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "2", "pages": "100033", "name": "Comput. Educ. Artif. Intell."}, "authors": [{"authorId": "51194123", "name": "W. C. Okonkwo"}, {"authorId": "1405313827", "name": "Abejide Ade-Ibijola"}]}, {"paperId": "9bc2f52d27649de191de1ae78cd79aa6a53c5535", "externalIds": {"MAG": "3195188675", "DOI": "10.1007/978-3-030-58080-3_278-1", "CorpusId": 238965039}, "corpusId": 238965039, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9bc2f52d27649de191de1ae78cd79aa6a53c5535", "title": "AIM in Surgical Pathology", "abstract": null, "venue": "Artificial Intelligence in Medicine", "year": 2021, "referenceCount": 118, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial Intelligence in Medicine"}, "authors": [{"authorId": "1990591841", "name": "Clare McGenity"}, {"authorId": "94553508", "name": "A. Wright"}, {"authorId": "46370558", "name": "D. Treanor"}]}, {"paperId": "8734eb1793711ecd4560480b290319be5dd65fd2", "externalIds": {"MAG": "3174292236", "DOI": "10.1007/978-3-658-34324-8_1", "CorpusId": 237988209}, "corpusId": 237988209, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8734eb1793711ecd4560480b290319be5dd65fd2", "title": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement \u2013 Anwendungen, Einsatzbereiche und Herangehensweisen", "abstract": null, "venue": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement", "year": 2021, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement"}, "authors": [{"authorId": "96109513", "name": "M. Bruhn"}, {"authorId": "74687281", "name": "Karsten Hadwich"}]}, {"paperId": "10248f437dffedfb2bcd7de7cd9f41092bd35370", "externalIds": {"MAG": "3194256972", "DOI": "10.1007/978-3-030-58080-3_94-1", "CorpusId": 238915603}, "corpusId": 238915603, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/10248f437dffedfb2bcd7de7cd9f41092bd35370", "title": "AIM in Oncology", "abstract": null, "venue": "Artificial Intelligence in Medicine", "year": 2021, "referenceCount": 104, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial Intelligence in Medicine"}, "authors": [{"authorId": "2027023395", "name": "Umar Iqbal"}, {"authorId": "51243615", "name": "J. Nabi"}]}, {"paperId": "c056538c053c62c64134023a883d9b50bbf890c5", "externalIds": {"MAG": "3183611492", "DOI": "10.4018/978-1-7998-6985-6.ch016", "CorpusId": 237983407}, "corpusId": 237983407, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c056538c053c62c64134023a883d9b50bbf890c5", "title": "Artificial Intelligence in Marketing", "abstract": "The purpose of this chapter is to shed light on the consumer-AI interaction in the marketplace. By this aim, the chapter uses a literature review approach. The previous literature examining AI from a consumer behavior perspective is reviewed, and the findings are compiled in a meaningful flow. According to the review, we see that the traditional marketplace is shaped by AI from only human-to-human interactions to human-to-AI and AI-to-AI interactions. In this new marketplace, while consumers interact with AI, they gain new experiences and feel positive or negative because of these experiences. Also, they build different relationships with AI, such as servant, master, or partner. Besides these relationships, there are still concerns about AI that are related to privacy, algorithmic biases, consumer vulnerability, unemployment, and ethical decision making.", "venue": "Advances in Business Information Systems and Analytics", "year": 2021, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Advances in Business Information Systems and Analytics"}, "authors": [{"authorId": "147762811", "name": "\u00d6zge S\u0131\u011f\u0131rc\u0131"}]}, {"paperId": "0fab479f0592d02efd622fbf165e0baed6827361", "externalIds": {"DBLP": "conf/isalalife/WebsterA21", "DOI": "10.1162/isal_a_00360", "CorpusId": 237158590}, "corpusId": 237158590, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0fab479f0592d02efd622fbf165e0baed6827361", "title": "Identification of Lifelike Characteristics of Human Crowds Through a Classification Task", "abstract": "Crowd simulations are used extensively to study the dynam- ics of human collectives. Such studies are underpinned by speci\ufb01c movement models, which encode rules and assump- tions about how people navigate a space and handle interactions with others. These models often give rise to macro- scopic simulated crowd behaviours that are statistically valid, but which lack the noisy microscopic behaviours that are the signature of believable \u201creal\u201d crowds. In this paper, we use an existing \u201cTuring test\u201d for crowds to identify \u201clife- like\u201d features of real crowds that are generally omitted from simulation models. Our previous study using this test estab- lished that untrained individuals have dif\ufb01culty in classifying movies of crowds as \u201cReal\u201d or \u201cSimulated\u201d, and that such people often have an idealised view of how crowds move. In this follow-up study (with new participants) we perform a second trial, which now includes a training phase (show-ing participants movies of real crowds). We \ufb01nd that clas- si\ufb01cation performance signi\ufb01cantly improves after training, con\ufb01rming the existence of features that allow participants to identify real crowds. High-performing individuals are able to identify the features of real crowds that should be incor- porated into future simulations if they are to be considered \u201clifelike\u201d.", "venue": "ALIFE", "year": 2021, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://nrl.northumbria.ac.uk/id/eprint/46115/1/Lifelike_Characteristics_ALIFE2021_2_.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "54"}, "authors": [{"authorId": "2130441911", "name": "Jamie Webster"}, {"authorId": "144936973", "name": "M. Amos"}]}, {"paperId": "ddaed12102518cea78ff353c99d81e464c86bf0b", "externalIds": {"DBLP": "series/lncs/GefenSV21", "DOI": "10.1007/978-3-030-69128-8_12", "CorpusId": 233329267}, "corpusId": 233329267, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ddaed12102518cea78ff353c99d81e464c86bf0b", "title": "AI for Digital Humanities and Computational Social Sciences", "abstract": null, "venue": "Reflections on Artificial Intelligence for Humanity", "year": 2021, "referenceCount": 31, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03043393/file/AI_for_Digital_Humanities%26Computational_Social_Sciences.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "191-202"}, "authors": [{"authorId": "115494985", "name": "A. Gefen"}, {"authorId": "1825767980", "name": "L\u00e9a Saint-Raymond"}, {"authorId": "2223687", "name": "T. Venturini"}]}, {"paperId": "e5c07e9e10535229887740701d9df1b8f8a15c93", "externalIds": {"DOI": "10.1007/978-3-030-56546-6", "CorpusId": 228141442}, "corpusId": 228141442, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e5c07e9e10535229887740701d9df1b8f8a15c93", "title": "Transhumanism: The Proper Guide to a Posthuman Condition or a Dangerous Idea?", "abstract": null, "venue": "", "year": 2021, "referenceCount": 461, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-030-56546-6%2F1", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Book", "Review"], "publicationDate": null, "journal": {"name": "Transhumanism: The Proper Guide to a Posthuman Condition or a Dangerous Idea?"}, "authors": [{"authorId": "2194993", "name": "W. Hofkirchner"}, {"authorId": "1708420", "name": "H. Kreowski"}]}, {"paperId": "e719749bc2c99b9ae5b82d0b2161789dd2d30c14", "externalIds": {"DOI": "10.2307/j.ctv6jm8g5.8", "CorpusId": 243450514}, "corpusId": 243450514, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e719749bc2c99b9ae5b82d0b2161789dd2d30c14", "title": "The Landscape", "abstract": null, "venue": "Explainable AI with Python", "year": 2021, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Explainable AI with Python"}, "authors": [{"authorId": "52414735", "name": "L. Gianfagna"}, {"authorId": "2124492309", "name": "A. Di Cecco"}]}, {"paperId": "327db2ae7c7a2e5b33d5b84799196667cc77c154", "externalIds": {"MAG": "2495856924", "DOI": "10.1007/978-3-319-33138-6_19", "CorpusId": 63945277}, "corpusId": 63945277, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/327db2ae7c7a2e5b33d5b84799196667cc77c154", "title": "History of Artificial Intelligence", "abstract": null, "venue": "A Brief History of Computing", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "A Brief History of Computing"}, "authors": [{"authorId": "1401546300", "name": "Gerard O'Regan"}]}, {"paperId": "1f916b8e14e27de58370d2f3123557d3e5bfca66", "externalIds": {"CorpusId": 251618988}, "corpusId": 251618988, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1f916b8e14e27de58370d2f3123557d3e5bfca66", "title": "Adaptiveness and Lock-free Synchronization in Parallel Stochastic Gradient Descent", "abstract": "The emergence of big data in recent years due to the vast societal digitalization and large-scale sensor deployment has entailed significant interest in machine learning methods to enable automatic data analytics. In a majority of the learning algorithms used in industrial as well as academic settings, the firstorder iterative optimization procedure Stochastic Gradient Descent (SGD), is the backbone. However, SGD is often time-consuming, as it typically requires several passes through the entire dataset in order to converge to a solution of sufficient quality. In order to cope with increasing data volumes, and to facilitate accelerated processing utilizing contemporary hardware, various parallel SGD variants have been proposed. In addition to traditional synchronous parallelization schemes, asynchronous ones have received particular interest in recent literature due to their improved ability to scale due to less coordination, and subsequently waiting time. However, asynchrony implies inherent challenges in understanding the execution of the algorithm and its convergence properties, due the presence of both stale and inconsistent views of the shared state. In this work, we aim to increase the understanding of the convergence properties of SGD for practical applications under asynchronous parallelism, and develop tools and frameworks that facilitate improved convergence properties as well as further research and development. First, we focus on understanding the impact of staleness, and introduce models for capturing the dynamics of parallel execution of SGD. This enables (i) quantifying the statistical penalty on the convergence due to staleness and (ii) deriving an adaptation scheme, introducing a staleness-adaptive SGD variant MindTheStep-AsyncSGD , which provably reduces this penalty. Second, we aim at exploring the impact of synchronization mechanisms, in particular consistency-preserving ones, and the overall effect on the convergence properties. To this end, we propose LeashedSGD , an extensible algorithmic framework supporting various synchronization mechanisms for different degrees of consistency, enabling in particular a lockfree and consistency-preserving implementation. In addition, the algorithmic construction of Leashed-SGD enables dynamic memory allocation, claiming memory only when necessary, which reduces the overall memory footprint. We perform an extensive empirical study, benchmarking the proposed methods, together with established baselines, focusing on the prominent application of Deep Learning for image classification on the benchmark datasets MNIST and CIFAR, showing significant improvements in converge time for Leashed-SGD and MindTheStep-AsyncSGD .", "venue": "", "year": 2021, "referenceCount": 70, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "72573425", "name": "Karl B\u00e4ckstr\u00f6m"}]}, {"paperId": "39a30b18bb2a6d2b06e7eeae22e8d1e476be48ae", "externalIds": {"CorpusId": 249270146}, "corpusId": 249270146, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/39a30b18bb2a6d2b06e7eeae22e8d1e476be48ae", "title": "Artificial Intelligence Reframing Thinking Machines Within the History of Media and Communication", "abstract": ": Beginning with a critical exploration of the canonical histories of AI, this chapter stresses how the history of communication and media research may contribute to existing historiographies of AI. Four key aspects of the long-standing relationship between communication, media, and AI are discussed: the cross-history of communication theory (especially cybernetics) and AI, the early development of AI and human-computer interaction, the relevance of media and science fiction narratives in AI research and imaginaries, and the role of games in shaping interaction with AI software as communication between humans and machines. Rely-ing on an historical and critical discussion of these four aspects, we claim that reconsidering the history of AI does not only contribute to the historiography of the field but adds more ground for rethinking and discussing the theoretical foun-dations of communication and media studies at large. we have discussed here only work concerned with more or less self-contained problem solving programs. But as this is written, we are at last beginning to see vigorous activity in the direction of constructing usable time-sharing or multiprogramming computing systems. With these systems, it will at last become economical to match human beings in real time with really large machines. (. . .) In the years to come, we expect that these man-machine systems will share, and perhaps for a time be dominant, in our advance toward the development of \u2018 artificial intelligence \u2019 .", "venue": "", "year": 2021, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "30308716", "name": "Paolo Bory"}, {"authorId": "49518964", "name": "Simone Natale"}, {"authorId": "2006026056", "name": "D. Trudel"}]}, {"paperId": "e2e8a697002992d4aa8261ead9d23b01f286dae6", "externalIds": {"DOI": "10.7202/1089666ar", "CorpusId": 247626142}, "corpusId": 247626142, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2e8a697002992d4aa8261ead9d23b01f286dae6", "title": "The Digital Reception of A Hundred Thousand Billion Poems", "abstract": "The Digital abstract Raymond Queneau\u2019s Cent mille milliards de po\u00e8mes ( CMMP ) was first intended as a poetry writing \u201cmachine\u201d (\u201cmachine \u00e0 fabriquer des po\u00e8mes\u201d). Queneau used the word \u201cmachine\u201d in his preface to designate a tool designed to help the reader compose his/her own sonnets. Immediately after its publication in 1961, poetry smitten computer scientists and poets interested in computer science digitalized Queneau's book. All computer portings could generate poems automatically, thus transforming CMMP into a proto-text generator. The digital reception of CMMP made a composition tool into a machine. This article investigates the possible meanings of the word \"machine\" in the context of the adaptation of Queneau\u2019s CMMP by D. Starynkevitch (1961) and Abstract Raymond Queneau\u2019s Cent mille milliards de po\u00e8mes ( CMMP ) was first intended as a poetry writing \u201cmachine\u201d (\u201cmachine \u00e0 fabriquer des po\u00e8mes\u201d). Queneau used the word \u201cmachine\u201d in his preface to designate a tool designed to help the reader compose his/her own sonnets. Immediately after its publication in 1961, poetry smitten computer scientists and poets interested in computer science digitalized Queneau\u2019s book. All computer portings could generate poems automatically, thus transforming CMMP into a proto-text generator. The digital reception of CMMP made a composition tool into a machine. This article investigates the possible meanings of the word \u201dmachine\u201d in the context of the adaptation of Queneau\u2019s CMMP by D. Starynkevitch (1961) and Paul Braffort (1975). Cent mille milliards de po\u00e8mes ( CMMP ) de Raymond Queneau est con\u00e7u comme une machine \u00e0 composer des po\u00e8mes. Queneau uti-lise le mot \u00ab machine \u00bb dans la pr\u00e9face des CMMP pour d\u00e9signer un outil offert au lecteur d\u00e9sireux de fabriquer ses propres sonnets. Imm\u00e9-diatement apr\u00e8s sa publication en 1961, des ing\u00e9nieurs informatiques f\u00e9rus de po\u00e9sie et des po\u00e8tes int\u00e9ress\u00e9s par l\u2019informatique port\u00e8rent le livre de Queneau sur ordinateur. Tous les portages informatiques des CMMP incluent la possibilit\u00e9 de g\u00e9n\u00e9rer des po\u00e8mes automati-quement, transformant ainsi les CMMP en un proto-g\u00e9n\u00e9rateur de texte. Cette r\u00e9ception num\u00e9rique des CMMP a transform\u00e9 un outil de composition en automate. Cet article \u00e9tudie les sens possibles du mot \u00ab machine \u00bb dans le contexte de l\u2019adaptation des CMMP par D. Starynkevitch (1961) et Paul Braffort (1975). Queneau\u2019s original printed version of Cent mille milliards de po\u00e8mes ( CMMP ) was conceived as a \u201cmachine\u201d that allows readers to potentially create a hundred thousand billion poems (almost all perfect sonnets) by combining 140 verses printed on movable strips of paper. Queneau described his book as a \u201c machine \u00e0 fabriquer des po\u00e8mes \u201d. Immediately after its publication in 1961, computer scientists interested in poetry and poets interested in computing began to port the book to computers. In this presentation, I investigate the different potential meanings of the word \u201cmachine\u201d in the context of the adaptation of Queneau\u2019s books into computer programs. The word \u201cmachine\u201d, when used by Queneau in the preface of CMMP , is to be read more as an instrument than an automaton. Queneau\u2019s instructional manual clearly encourages all readers to compose their own poems at will. By empowering the reader with a configurative function, Queneau aimed at fulfilling Lautr\u00e9amont\u2019s program: \u201cpoetry must be made by all, not by one\u201d (1961, II). Queneau insists in his preface that his book does not resemble the surrealists\u2019 \u201cexquisite corpse\u201d ( cadavre exquis ) 1 , but instead is inspired by a", "venue": "Sens public", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Sens public"}, "authors": [{"authorId": "2086071227", "name": "Jonathan Baillehache"}]}, {"paperId": "1cbc8579bdff617f8041432a6dc704a65dd8b45d", "externalIds": {"CorpusId": 247154298}, "corpusId": 247154298, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1cbc8579bdff617f8041432a6dc704a65dd8b45d", "title": "Computational Creativity and Consciousness: Framing, Fiction and Fraud Paper type: Study Paper", "abstract": "Computational Creativity, like its parent, Artificial Intelligence, suffers from ill-definition: both \u201ccreativity\u201d and \u201cintelligence\u201d are difficult, perhaps even impossible, to define. Both fields have also suffered from confusion about the relationship between their key concept and the equally problematic concept of \u201cconsciousness\u201d. Computational Creativity, however, has yet to address this issue effectively, which can only be detrimental to the field. This paper attempts to lay out the issues, to identify useful boundaries, particularly with respect to framing and the generation of meaning, and to map out ways in which Computational Creativity research may navigate the landscape of scientific possibility, while remaining true to itself.", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1808338", "name": "Geraint A. Wiggins"}]}, {"paperId": "b5e961013014c987e622eb801451999a9888126d", "externalIds": {"CorpusId": 244681479}, "corpusId": 244681479, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b5e961013014c987e622eb801451999a9888126d", "title": "What\u2019s in a thought experiment: the role of gender in Alan Turing\u2019s progressive imitation game", "abstract": "Turing proposed in 1950 his famous imitation game or test: a machine is supposed to imitate, sometimes a woman, sometimes a man. In 1995 scientists in artificial intelligence complained that, according to Turing, the goal of the field should be to build a \u201cmechanical transvestite.\u201d Supporters of Turing\u2019s test as a decisive experiment for machine intelligence then suggested to read \u201cman\u201d in Turing\u2019s text as masculine generics. Drawing also from primary sources other than Turing\u2019s 1950 text, they argued that Turing must have proposed not a gender, but a species test. My contention is that Turing did propose gender learning and imitation as one of his various tests for machine intelligence. I shall reconstruct the context of Turing\u2019s 1950 proposal and point out that it came out of a 1949 controversy, notably with neurosurgeon Geoffrey Jefferson. I will then try to show that Turing designed his imitation game as a thought experiment to refute, among other things, an a priori view of Jefferson that intelligence was an exclusive feature of the animal nervous system, and that interesting behavior in the male and the female was largely determined by sex hormones.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, {"paperId": "3c76eace84d9404bd5dd7df55c8e3219dc484be7", "externalIds": {"CorpusId": 237257696}, "corpusId": 237257696, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3c76eace84d9404bd5dd7df55c8e3219dc484be7", "title": "Quantum Computing: Resolving Myths, From Physics to Metaphysics", "abstract": "......................................................................................................................................... 3 Introduction ................................................................................................................................... 4 I Quantum Computing ................................................................................................................. 5 1.1 What is Quantum Computing?.............................................................................................. 5 1.1.1 Classical Computing ...................................................................................................... 5 1.1.2 Quantum Computing ...................................................................................................... 6 1.1.3 Motivations .................................................................................................................... 7 1.2 The Qubit .............................................................................................................................. 7 1.2.1 Schr\u00f6dinger\u2019s Cat........................................................................................................... 7 1.3 From Qubit to Computation ................................................................................................ 10 1.3.1 Classical Logic Gates ................................................................................................... 10 1.3.2 Entanglement ............................................................................................................... 10 1.3.3 Quantum Logic Gates .................................................................................................. 11 1.3.4 Quantum Circuits and Algorithms ............................................................................... 12 1.4 Selected Myths about Quantum Computers, Resolved. ...................................................... 16 II Computational Complexity .................................................................................................... 19 2.1 Computability and Complexity ........................................................................................... 19 2.2 Complexity Classes ............................................................................................................. 20 2.2.1 Polynomial-Time (P) ................................................................................................... 20 2.2.3 Nondeterministic Polynomial Time (NP) .................................................................... 21 2.2.4 NP-Complete................................................................................................................ 22 2.3 The Quantum Realm of Complexity ................................................................................... 22 III Philosophical Considerations ............................................................................................... 25 3.1 Quantum Computing and Consciousness ........................................................................... 25 3.2 Experimental Metaphysics .................................................................................................. 25 3.3 Can Machines Think? ......................................................................................................... 27 3.3.1 Two Objections to Turing\u2019s Test for Thinking ............................................................ 27 3.4 Will Quantum Machines Become Conscious? ................................................................... 28 3.4.1 What is Consciousness? ............................................................................................... 28", "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "7c5a826adb4e6d13818c37611dff5768cfcb07a7", "externalIds": {"MAG": "3203175182", "DOI": "10.1007/978-3-030-72644-7_1", "CorpusId": 244309473}, "corpusId": 244309473, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c5a826adb4e6d13818c37611dff5768cfcb07a7", "title": "The Mind Technology Problem and the Deep History of Mind Design", "abstract": null, "venue": "The Mind-Technology Problem", "year": 2021, "referenceCount": 125, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "The Mind-Technology Problem"}, "authors": [{"authorId": "40090096", "name": "Robert W. Clowes"}, {"authorId": "2072938545", "name": "K. G\u00e4rtner"}, {"authorId": "2767883", "name": "In\u00eas Hip\u00f3lito"}]}, {"paperId": "901e0f4b433d48696f7684b36e10a696b380bdc7", "externalIds": {"CorpusId": 231582330}, "corpusId": 231582330, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/901e0f4b433d48696f7684b36e10a696b380bdc7", "title": "Dystopia or utopia? Alan Turing\u2019s Promethean ambition about intelligent machines", "abstract": "Writing in 1948, Turing felt compelled to confront a \u201creligious belief\u201d that \u201cany attempt\u201d to construct intelligent machines was seen \u201ca sort of Promethean irreverence.\u201d And yet he has been associated by his own biographer Andrew Hodges with the image of \u201ca Frankenstein \u2014 the proud irresponsibility of pure science, concentrated in a single person.\u201d Reader of a 1865 version of Samuel Butler\u2019s Darwin among the machines, Turing challenged the conventional wisdom of what machines really were or could be and prophesized a future pervaded by intelligent machines which may be seen as a dystopia or as a utopia. The question is thus posed: what future did Turing actually envision and propose to machines? I will formulate and study the problem of identifying Turing\u2019s specific Promethean ambition about intelligent machines. I shall suggest that Turing\u2019s primary aim was the development of mechanistic explanations of the human mindbrain. But his secondary aim, implied in irony and wit, was the delivery of a social criticism about gender, race, nation and species chauvinisms. Turing\u2019s association with Mary Shelley\u2019s Frankenstein will be discouraged. Rather, his third aim was to send a precautionary message about the possibility of machines outstripping us in intellectual power in the future.", "venue": "", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, {"paperId": "5143e9576640d7b42522aa9dbc611392446fc2ca", "externalIds": {"CorpusId": 249640262}, "corpusId": 249640262, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5143e9576640d7b42522aa9dbc611392446fc2ca", "title": "Human Digital Twins in Acquiring for ognitive imetics", "abstract": "Modern information technology makes it possible to redesign the ways people work. In the future, machines can carry out intelligence-requiring tasks, which previously were done by people. It is thus good to develop methodologies for designing intelligent systems. An example of such methods is cognitive mimetics, i.e. imitating human information processing. Today, machines cannot by themselves navigate in archipelagos. However, the fact that people can take care of ship steering and navigation means that there is an information process, which makes it possible to navigate ships. This information process takes place inside the minds of navigating people. If we are able to explicate the information processing in the navigator\u2019s mind, the knowledge of it can be used in designing intelligent machines. Replicating physical objects and industrial processes by means of digital computers is called digital twinning. Digital twins (DTs), which are digital replicas of physical systems and processes, have recently become tools for working with complex industrial processes. A crucial question for DTs is should human actions be added to them? As the answer is positive, such models of human information processing can be called human digital twins (HDTs). The knowledge of human tacit and explicit information processes can be represented by human digital twins. Models can be used in the search for a deeper understanding of human intelligent information processes. Human digital twins can thus be used as methodological tools in cognitive mimetics. In our present study, we modeled paper machine operators\u2019 thinking. Specifically, we developed an ideal-exception-correction (IEC) model for paper operators\u2019 control logic. The model illustrates how research and HDT-modeling can be used for explicating the subconscious or tacit information processing of people for the design of intelligent systems. In this article a model for design processes using cognitive modelling will be suggested. The concepts of cognitive mimetics and human digital twins enable us to outline a model for using the long tradition of simulating human thinking as a tool in designing intelligent", "venue": "", "year": 2021, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2170147264", "name": "Pertti SAARILUOMAa"}, {"authorId": "74461425", "name": "A. Karvonen"}, {"authorId": "2170144283", "name": "Lotta SORSAM\u00c4KIb"}]}, {"paperId": "8c52a055a2771fb2acbe8b757e6b22812d54624e", "externalIds": {"CorpusId": 247601444}, "corpusId": 247601444, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8c52a055a2771fb2acbe8b757e6b22812d54624e", "title": "THE EFFECT OF CUSTOMERS\u2019 ATTITUDES TOWARDS CHATBOTS ON THEIR EXPERIENCE AND BEHAVIORAL INTENTION IN TURKEY", "abstract": "Chatbots are a recent technology that brands and companies adopt to provide 24/7 customer service. However, some customers have several concerns regarding technology, and therefore, prefer talking to humans rather than chatbots. Brands must improve their chatbots based on customer experience because customers satisfied with chatbots are more likely to use them to contact brands/companies. Therefore, this article investigated the effect of perceived ease of use, usefulness, enjoyment, and risk factors on customer experience and behavioral intention regarding chatbots. The study also looked into the impact of customer experience on behavioral intention. The sample consisted of 211 chatbot users of Turkish recruited using non-probability convenience sampling. Data were analyzed using the Statistical Package for Social Sciences (SPSS) and SmartPLS3. The results showed that perceived ease of use and usefulness affected behavioral intention, but perceived risk had no impact on customer experience and behavioral intention regarding chatbots. Perceived enjoyment affected only customer experience. Lastly, customer experience affected behavioral intention.", "venue": "", "year": 2021, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2079904593", "name": "Bolu Abant Izzet Baysal"}]}, {"paperId": "ba5b738d18c7a1d039adb0a8b85d17404827273f", "externalIds": {"DOI": "10.31866/2616-7468.4.1.2021.234831", "CorpusId": 237396072}, "corpusId": 237396072, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba5b738d18c7a1d039adb0a8b85d17404827273f", "title": "Implementation of Artificial Intelligence in Restaurants", "abstract": "The topicality. In recent years, there has been a need to study the artificial intelligence use for the operation of restaurants, as in Ukraine (and in most countries) there is no such experience. The use of artificial intelligence systems customer-to-customer and item-to-item will ensure the quality of food delivery sites, which will allow you to analyze the order of the guest and identify the patterns of his preferences thus, automatically ask him to choose a certain set, dish and successful additions to the order, which will increase the average check, or choose new establishments that will help them enter the market of restaurant services.\nPurpose and methods. The purpose of the study is to analyze the current state, determine the prospects for the application of existing robotic technologies in the technological process of restaurants and develop a robotization scheme of the technological process of restaurants such as salad bar. Methods are in the course of research the methods of logical generalization concerning development of the robotization scheme of technological process which were carried out by means of the computer ArchiCaD program were applied.\nResults. The problem of introduction and the artificial intelligence use are studied by scientists and researchers in various fields of science. Considering their scientific works, it can be noted that artificial intelligence is already actively used for the manufacture of culinary products in foreign restaurants. There are known examples of the use of barista robots, pizza robots, salad maker robots, burger maker robots, etc. The study developed the robotization scheme of the technological process of salad bar, consisting of three stages. The first stage is the service of visitors in the shopping area, where the selection of the order, payment through the terminal and the subsequent automatic receipt of culinary products and beverages. The second stage is the preparation of semi-finished products in the procurement area. This process is controlled by a chef-operator, who controls the required number of semi-finished products and cleans and cuts vegetables, fruits, meat and fish products using machines for cleaning and slicing culinary products. The program provides for the analysis of the balance and the required number of semi-finished products and the choice of components for the preparation of salads with artificial intelligence. The third stage is the automatic preparation of salad in the pre-cooking production area. The artificial intelligence placed in the system analyzes the guest\u2019s order and activates the containers with the necessary ingredients, mixes them and unloads them into a container covered with a plastic lid, and the robot stamping element leaves the order number on the lid. The proposed scheme provides for compliance with sanitary and hygienic standards for institutions of this type. With the developed system of production activities, the required number of employees will be 5 people: cleaner in the trade area, dishwasher, tray packer, cook-operator of the pre-cooking area and system administrator of artificial intelligence.\nConclusions and discussions. The authors analyze the current state, identify prospects for the application of existing robotic technologies in the technological process of restaurants and developed a robotization scheme of the technological process on the example of a salad bar. The developed scheme consists of three stages: service of visitors, preparation of semi-finished products and automatic preparation of finished goods. It is assumed that the implementation of the developed system will speed up the process of customer service, reduce the area of production facilities and, accordingly, increase the restaurant turnover.", "venue": "", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://restaurant-hotel.knukim.edu.ua/article/download/234831/233566", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2125416670", "name": "S. Neilenko"}, {"authorId": "119719000", "name": "Valentyna Rusavska"}]}, {"paperId": "8f3625dcb33f055be88c5542b8308b910b7dae31", "externalIds": {"CorpusId": 254020286}, "corpusId": 254020286, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8f3625dcb33f055be88c5542b8308b910b7dae31", "title": "Towards a Persona Aware Conversational Agent", "abstract": "Dialog systems have been at the center of Natural Language Processing (NLP) since its inception. With a wide range of applications, this type of system is particularly interesting as a user interface, creating the possibility of a more natural and convenient user experience. In the context of Customer Support, goal-oriented dialog systems are now widely used, helping users carry out specific tasks. Traditionally, these systems were created by employing knowledge-based architectures. However, the growth of Deep Learning and the increase in data availability facilitated the development of neural dialog systems, which can be trained end-to-end. A well-known example of such a system is the \u201cTransformer\u201d, a self-attentional model that has achieved state-of-the-art results in multiple NLP tasks. Notwithstanding, these systems still present some shortcomings, particularly in terms of scal-ability. The need for large amounts of data and considerable computing power can be an impediment, especially in situa-tions where multiple entities must be represented. In Goal-Oriented Dialog Systems, this becomes evident when consid-ering multi-brand Customer Support, since each brand must communicate differently with its users, meaning one model must be developed and maintained for each brand. In Open-Domain System, an analogous problem arises when consider-ing settings where multiple characters must be impersonated. In this work, we explore how we can create conversational agents that tackle this issue, in both settings. To this end, we adapt and experiment with multiple state-of-the-art architectures together with recent datasets.", "venue": "", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2192527936", "name": "Nuno Ventura de Melo"}]}, {"paperId": "9649be5e8c41bcec500e77a3cc05835ee687952c", "externalIds": {"CorpusId": 254534184}, "corpusId": 254534184, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9649be5e8c41bcec500e77a3cc05835ee687952c", "title": "CHATBOT IN THE ONLINE PROVISION OF PUBLIC SERVICES", "abstract": ": The provision of Public Administration (PA) services has been challenging due to their complexity. Citizens use digital channels to obtain generalized information and perform simple services, but many still prefer traditional channels such as face-to-face or telephone for more complex and ambiguous request scenarios. This work presents a chatbot prototype as a new digital channel for services provided in the form of dialogs. It uses Natural Language Processing (NLP) to interpret the intentions of citizens, allowing greater expressiveness in the more complex requests. To provide services in the informative phase, the chatbot provides information structured according to the Core Public Services Vocabulary (CPSV) model. This simplifies the data model of services while making it reusable and extensible. The research method used in this work is Design Science Research Methodology (DSRM). The proposed artifact is the instantiation of the prototype, SIGMA, which is evaluated by the results it presents in the context of the Portuguese National Portal for Government services.", "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2194941079", "name": "M\u00f3nica Siu do Ros\u00e1rio Valverde"}, {"authorId": "2078650163", "name": "Andr\u00e9 Ferreira Ferr\u00e3o"}, {"authorId": "122122958", "name": "M. Leit\u00e3o"}, {"authorId": "122610428", "name": "Bignolas Mira da Silva"}, {"authorId": "2104057510", "name": "Lu\u00eds Brinquete Borbinha"}]}, {"paperId": "e2da55a0b52fc67006adff5ebd62a41cd2a77451", "externalIds": {"CorpusId": 253448852}, "corpusId": 253448852, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2da55a0b52fc67006adff5ebd62a41cd2a77451", "title": "Arti\ufb01cial Aesthetics: A Critical Guide to AI, Media and Design", "abstract": null, "venue": "", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "68995872", "name": "E. Arielli"}]}, {"paperId": "ce5c99fe1dbdc1e89ccf71cac73140ef49267506", "externalIds": {"CorpusId": 252765129}, "corpusId": 252765129, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ce5c99fe1dbdc1e89ccf71cac73140ef49267506", "title": "Proceedings of the 7th Computational Creativity Symposium AISB 2021 (CC2021)", "abstract": ". We use Ritchie\u2019s criteria for the evaluation of creative systems to analyse MEXICA. Ritchie\u2019s criteria are for humans to use, but in this analysis, we are using them so the system can test itself. We do this analysis to get information about MEXICA\u2019s performance. With this analysis, we can delve into how MEXICA is exploring its conceptual space. MEXICA could improve its performance by changing the execution parameters it uses. We can repeat this analysis and we would optimise MEXICA\u2019s result. Abstract. We are developing a generative art application for casual creation on handheld devices, where user enjoyment is priori-tised over the quality and/or utility of the abstract images they make. In an attempt to increase enjoyment, we have enabled the app to generate image titles, and we describe here the approach we take, along with details of some experiments we undertook to optimise it for ef\ufb01ciency and variety. The approach employs words relating to a machine vision classi\ufb01cation and colour breakdown of the images, wrapped in the language of International Art English. When there is no suitable input from the machine vision analysis of an image, the approach generates text which is not necessarily related to the image. Such texts have been described linguistically as pseudo-profound bullshit statements, in work on the psychology of human judgement that we survey. We evaluate the title generation approach with a curation analysis, and end with a discussion of some potential bene\ufb01ts of employing bullshit in a Computational Creativity context. Abstract. This philosophical paper examines the Darwinian account of creativity as a model for assessing computational creativity. It will first establish a Darwinian account of creativity using Simonton\u2019s [1] model. It will then apply this model to popular image-producing AI, Generative Adversarial Networks, and the promising Creative Adversarial Network, both used in the computational production of \u2018artworks\u2019. The paper will argue that these networks are compatible with a Darwinian account of creativity, due to the presence of blind variation within the networks, a key component of Simonton\u2019s model. The paper will then address some initial objections. The aim of this paper will ultimately be to assess whether the AI systems are compatible with the Darwinian model of creativity, and in the process explore Darwinian creativity as a potential standard for testing computational creativity. 12 Abstract. The purpose of this ongoing research is to better understand the potential contributions that computers can play in situations where people interact with computers towards creative pur-suits and goals. Past research has provided sets of de\ufb01nitions of different roles that a computer plays in human-computer creative collaboration. Thus far, we look into the advantages and limitations of having such roles. In particular, this paper contributes an analysis and categorisation of the coverage of existing role classi\ufb01cations for computational participants in co-creativity. This analysis is comple-mented by a comparative review of the use of roles to understand and structure creative collaboration between people only (i.e. without any computational participants involved). Our wider project investigates whether these de\ufb01ned sets of roles are a. adequate and b. helpful for understanding the perception of computational contributions in co-creativity, with a study planned to investigate the roles of current systems in practice. This project considers both co-creative computer systems that currently exist, and systems that could potentially exist in the future. Our goal is to reach a point where the perception of what is possible in human-computer co-creative collaboration is enabled and boosted (but not constrained) by a de\ufb01nitive set of roles. Abstract. This paper argues that a too-expansive view on creativity is unhelpful at best and deeply misleading at worst. As with \u201crepresentation\u201d, the word \u201ccreativity\u201d comes value-laden in ways that researchers cannot lightly get away from, if they can escape at all; simply claiming that one is using the word in a technical sense is not a solution. Neither should one take an overly narrow view that takes advantage of a priori arguments to deny creativity to classes of agents or putative agents solely by their membership in those classes. The paper proceeds by o\ufb00ering a de\ufb01nition of creativity meant to prejudice neither human being nor artefact; then setting out the conditions for a putative creative agent to be a creative agent, concluding that no existing artefactual agents appear to fall into this category; \ufb01nally, addressing the question of why computers, computer programs, robots, and related artefacts have nevertheless had a profound \u2013 indeed, transformational \u2013 e\ufb00ect on human creativity, taking creativity to places that neither human beings nor artefacts could have gone on their own. It ends with a discussion of the person I see as one of the key early voices on computational creativity. Abstract. We present AMI \u2013 Arti\ufb01cial Music Intelligence, a deep neural network that can generate musical compositions of different instruments with a coherent long-term structure. AMI uses a state-of-the-art general-purpose deep neural network architecture, called the Transformer model [7], to discover patterns of musical structures such as melodies, chords, and rhythm, from tens of thousands of MIDI \ufb01les. The learning is done in an unsupervised manner, allowing exploitation of large collections of MIDI \ufb01les that are available on the internet. We trained AMI over 8000 classical music MIDI \ufb01les. As an autoregressive model, AMI predicts a music note at a time depending on not just the last note, but a long sequence of notes (up to thousands) from previous time steps. The previous notes are not provided via some hidden state such as in a recurrent neural network (RNN), instead the model has direct access to all earlier notes. Furthermore, we enhance the learning of musical structures by adding different kinds of embeddings: one short-term embedding and one long-term embedding. As a result, the model is able to maintain a coherent long-term structure and occasionally pick up different movements. Audio examples of the model output can be heard at https://meddis.dcs.shef.ac.uk/melody/samples . The Transformer model is the latest advance in language understanding [6, 2, 1], which is trained to predict the next token in a sequence of text. The core idea behind the model is self-attention \u2013 the ability to attend to different positions of the sequence to compute a representation of that sequence. It allows the modelling of a much longer sequence than one that can be modelled by previous language models such as a recurrent neural network based model. This makes the model well-suited for modelling music data, whose structure and meaning are often built by repetition and self-reference on multiple timescales.Unlikeone-dimensional multiple Abstract. We present a system design for applying functional models of improvisational music to the generation of game soundtracks that react to game events. We provide a proof-of-concept implementation using Unity/C# and Haskell to create an interactive scene where the music changes as the user interacts with creatures in the environment. Abstract. Demonstration Abstract for the Show-and-Tell session We present a robotic storytelling system, named Sc\u00b4ealability , which augments a symbolic story-generation system with embodied, robot actors to physically enact a story with the congruent use of space, gesture and voice. We describe the system and summarize the empirical evidence as to the bene\ufb01ts of embodied story-telling.", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": []}, {"paperId": "74551960e4f7c98907a52e62d59cfe1667c84a52", "externalIds": {"DOI": "10.25236/ajcis.2021.040806", "CorpusId": 252295348}, "corpusId": 252295348, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/74551960e4f7c98907a52e62d59cfe1667c84a52", "title": "Evaluation of Artificial Intelligence Techniques Applied in Watson and AlphaGo", "abstract": ": Artificial intelligence (AI) and software engineering are two important areas in computer science. In recent years, researchers are trying to apply AI techniques in various stages of software development to improve the overall quality of software products. Moreover, there are also some researchers who focus on the intersection between software engineering and AI. In fact, the relationship between software engineering and AI is very weak; however, methods and techniques in one area have been adopted in another area. More and more software products are capable of performing intelligent behavior like human beings. In this research project, two cases studies which are IBM Watson and Google AlphaGo that use different AI techniques in solving real-world challenging problems have been analyzed, evaluated and compared. Based on the analysis of both case studies, using AI techniques such as deep learning and machine learning in software systems contributes to intelligent systems. Watson adopts \u2019decision making support\u2019 strategy to help humans make decisions; whereas AlphaGo uses \u2019self-decision making\u2019 to choose operations that contribute to the best outcome. In addition, Watson learns from man-made resources such as paper; AlphaGo, on the other hand, learns from massive online resources such as photos. AlphaGo uses neural networks and reinforcement learning to mimic human brain, which might be very useful in medical research for diagnosis and treatment. However, there is still a long way to go if we want to reproduce human brain in machine and view computers as thinkers, because human brain and machines are intrinsically different. It would be more promising to see whether computers and software systems will become more and more intelligent to help with real world challenging problems that human beings cannot do.", "venue": "Academic Journal of Computing & Information Science", "year": 2021, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://francis-press.com/uploads/papers/Dgajx3cDjTpVKgPLilUuTOZWF8hMM3Qv0FTbmgYO.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Academic Journal of Computing & Information Science"}, "authors": [{"authorId": "2111760257", "name": "Jiaqi Han"}, {"authorId": "2183768758", "name": "Jianing Han"}]}, {"paperId": "c91e267343e07178a5e97fb4e16e35adc26f0e3d", "externalIds": {"CorpusId": 252043731}, "corpusId": 252043731, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c91e267343e07178a5e97fb4e16e35adc26f0e3d", "title": "Users' N eeds A ssessment for C hatbots\u2019 U se in Higher Education", "abstract": ". Higher education comprises an important field for the application of chatbots, especially for large-scale use. This paper reports on a needs assessment that was conducted with higher education users (i.e., educators and students) for examining their needs and expectations on chatbots\u2019 integration in educational settings. The study was conducted in the context of a research project that includes a series of iterative pilot studies of the use of chatbots in higher education. We report on findings from one of the pilots based on data from semi-structured online interviews with higher-education students and educators. A thematic analysis of the interview data resulted in different themes of needs that users have in education. The outcomes of this study indicate that higher-education users need technological solutions that can support content delivery, formative assessment implementation with the provision of qualitative feedback, research tasks processing and social bonding facilitation. Those findings, along with interviewees\u2019 suggestions on functionalities and features that chatbots should have, provide guidelines and recommendations for the design, development, and implementation of different scenarios of the use of chatbots in higher education.", "venue": "", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2402551", "name": "O. Tsivitanidou"}]}, {"paperId": "7a487e12c6124dcee8228bbaec60569c0017e04f", "externalIds": {"CorpusId": 251906876}, "corpusId": 251906876, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7a487e12c6124dcee8228bbaec60569c0017e04f", "title": "Arti\ufb01cial Intelligence Paradigms and the Future of Learning: What a Partial Review of Half a Century of AI Conceptualization Suggests", "abstract": "Joseph Makokha was born, raised and educated in Kenya. He obtained a BSEE degree from the University of Nairobi before moving to the United States, where he earned two masters degrees in education before starting his doctoral studies in mechanical engineering at Stanford University focussing on design. He researches human collaboration with artificial intelligence (AI), with the goal of understanding how to design AI that augments humans on thinking tasks.", "venue": "", "year": 2021, "referenceCount": 62, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "117213984", "name": "Joseph Makokha"}, {"authorId": "117213984", "name": "Joseph Makokha"}]}, {"paperId": "c89fac010ad6b166f5429bc53f68dd65f21cf233", "externalIds": {"CorpusId": 251906446}, "corpusId": 251906446, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c89fac010ad6b166f5429bc53f68dd65f21cf233", "title": "A Qualitative Review on Intervention of Robotics in Medical Science", "abstract": "Robots have entered into many aspects of human life, including medical science. The impact of robotics on medicine is undeniable. Robots can be defined as \"automatically controlled multitask manipulators, which are freely programmable in three or more axes.\" The success of robots is based on their precision, lack of fatigue, and speed of action. Medical robotics is a promising field that really took off in the 1990s. Since then, a wide variety of medical applications have emerged: laboratory robots, surgical training, remote surgery, telemedicine and teleconsultation, rehabilitation and hospital robots. There are, however, many challenges in the widespread implementation of robotics in the medical field, mainly due to issues such as safety, precision, cost and reluctance to accept this technology. Medical robotics includes a number of devices used for surgery, medical training, rehabilitation therapy, prosthetics, and assistance to people with disabilities. Robotic surgery has been successfully implemented in several hospitals around the globe and has received world wide acceptance. This paper provides an overview of the impact of robots in multiple medical domains, which is one of the most active areas for research and development of robots.", "venue": "", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2183233788", "name": "Swati Saxena"}]}, {"paperId": "d79349d6f898ab4b382773841882a4c4596bc77d", "externalIds": {"CorpusId": 251614036}, "corpusId": 251614036, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d79349d6f898ab4b382773841882a4c4596bc77d", "title": "Human Emotion and Machine Emotion - Studies of Emotion in AI", "abstract": "\u2014 Artificial Intelligence (AI) is undoubtedly a hot word in the field of contemporary art in recent years. The consciousness, intuition and emotion of AI have attracted the attention of artists in particular, and many art works have explored this topic. Does AI have the emotional characteristics of humans? Is the emotion of AI equal to the emotion that defines human beings? This paper attempts to step out of the anthropocentric perspective, examine the boundary and relationship between human emotion and machine emotion, and inject a new theoretical perspective into the AI artistic practice. This paper first discusses what emotion is in the biological sense, analyzes whether a machine can have emotion from both positive and negative aspects, and puts forward the definition of \"machine emotion\". This paper also reviews some theories and practices related to emotion in the AI field. The conclusion of this paper is that although artificial intelligence cannot possess human emotions, it can possess \u201cmachine emotions\u201d beyond the narrow sense of human emotions, and the construction of emotional mechanisms inside AI may become a new research direction in this field.", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2181712253", "name": "Wang Shuo"}]}, {"paperId": "ea7ca2f3fd35f4143ae38b67905b117879fff10f", "externalIds": {"CorpusId": 250563970}, "corpusId": 250563970, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea7ca2f3fd35f4143ae38b67905b117879fff10f", "title": "Neural Networks Post-Selections in AI and How to Avoid Them", "abstract": "Neural network based Artificial Intelligence (AI) has reported increasing scales in experiments. However, this paper raises a rarely reported stage in such experiments called Post-Selection alter the reader to several possible protocol flaws that may result in misleading results. All AI methods fall into two broad schools, connectionist and symbolic. The Post-Selection fall into two kinds, Post-Selection Using Validation Sets (PSUVS) and Post-Selection Using Test Sets (PSUTS). Each kind has two types of post-selectors, machines and humans. The connectionist school received criticisms for its \u201cblack box\u201d and now the Post-Selection; but the seemingly \u201cclean\u201d symbolic school seems more brittle because of its human PSUTS. This paper first presents a controversial view: all static \u201cbig data\u201d are non-scalable. We then analyze why error-backprop from randomly initialized weights suffers from severe local minima, why PSUVS lacks cross-validation, why PSUTS violates well-established protocols, and why every paper involved should transparently report the Post-Selection stage. To avoid future pitfalls in AI competitions, this paper proposes a new AI metrics, called developmental errors for all networks trained, under Three Learning Conditions: (1) an incremental learning architecture (due to a \u201cbig data\u201d flaw), (2) a training experience and (3) a limited amount of computational resources. Developmental Networks avoid Post-Selections because they automatically discover context-rules on the fly by generating emergent Turing machines (not black boxes) that are optimal in the sense of maximum-likelihood across lifetime, conditioned on the Three Learning Conditions. Preprint submitted to Neural Networks September 9, 2021", "venue": "", "year": 2021, "referenceCount": 84, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "ebedc76d741547134d10b1f5025420bc580cbf25", "externalIds": {"CorpusId": 250184433}, "corpusId": 250184433, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ebedc76d741547134d10b1f5025420bc580cbf25", "title": "Design the Future Activities (DFA): A Pedagogical Content Knowledge Framework in Engineering Design Education", "abstract": "Hadi studies the in\ufb02uence of the future of work on curricular innovation, with a focus on exploring the relationships between and among adaptability, risk taking and value making. In an effort to characterize engineering education as an (eco)system for creating value, Hadi\u2019s approach integrates analytical methods of data science to address changes in systems and society. More broadly, Hadi is interested in examining how engineering innovations mobilize social and economic change. He has graduate degrees in Aeronautics and Astronautics (space systems design, astrodynamics and propulsion), Electrical and Computer Engineering (arti\ufb01cial intelligence, \ufb01elds and optics) and Engineering Education (design cognition and human communication inquiry) all from Purdue University. He also has an undergraduate degree in Mechanical Engineering (design) from the University of Jordan, and an undergraduate degree in Aeronautics and Astronautics from Purdue. He taught courses in use-inspired design at ASU and in transforming ideas to innovations at Purdue. Prior to joining ASU, Hadi worked at the University of Jordan as a facilitator for curricular change and design content instructor at the Department of Mechatronics. He was on the management team of the Amman Design Week in its inaugural year in Jordan, launched by Queen Rania\u2013a pioneering platform that harnessed creativity, revived the conversation about design, and instilled a spirit of collaboration and exchange. explore new ways of collectively building a better future. Abstract We propose an effective, innovative framework for developing content for design activities that address the challenges of the future where emerging technologies play a central role. Although engineering education research is concerned with preparing future engineers, the integration of future trends in technology with the engineering curriculum has been limited. We propose the Design the Future Activities (DFA) as a framework for systematically identifying and integrating emerging areas of research and technologies, such as artificial intelligence, into the teaching of engineering design. The core of developing and delivering the DFA framework is the teaching of the technology of artificial intelligence (AI). Because these technologies will change the nature of the future, we seek to engage with the ongoing discourse on the relationship between content (for design education) and pedagogy, through a proposed pedagogical content knowledge conceptual framework. Through a scholarship of integration that breaks the boundaries between disciplines, we propose a three-level framework: (1) Understanding technology analysis and system integration (to allow students to identify appropriate solutions given new technologies); (2) Making a value chain (or how these are appropriate solutions); and (3) Developing responsible innovations (or why these are appropriate solutions). While engineers continue to be creators and influencers of such technologies, the lack of understanding of the impact of their own technologies continues to cause an imbalanced innovation landscape, in education and in the workplace. We conclude that a new design approach to the engineering curriculum should be attempted, assuming that educators will systematically anticipate the future and recalibrate the curriculum. the special amalgam of content and pedagogy as conceptualized in the PCK framework. We also provide illustrative examples for the content at each proposed level.", "venue": "", "year": 2021, "referenceCount": 111, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "50340281", "name": "Hadi Ali"}]}, {"paperId": "b063f431e4e725f1883a222a949b0a08bd190251", "externalIds": {"CorpusId": 250045114}, "corpusId": 250045114, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b063f431e4e725f1883a222a949b0a08bd190251", "title": "Frontiers of the (non)humanly (un)imaginable. Anthropological estrangement and the making-of Persona at the Mus\u00e9e du Quai Branly", "abstract": "Melanesian \u2018spirits\u2019 and geometrical supernatural entities. The visitor was confronted with having to balance between Heider and Simmel\u2019s animated sequence (a very short animated film in which two triangles and a circle moved inside and outside a square) and the possibility of making a \u2018counter-experience\u2019 with objects from the museum collections. Heider and Simmel\u2019s audience was asked to interpret the behaviour of their geomet-ric figures, asking, for instance, whether they were following, repelling, or", "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145982463", "name": "E. Grimaud"}]}, {"paperId": "100b8cebcf4640165dd4c099e8df7bfa87c3e03d", "externalIds": {"CorpusId": 249604969}, "corpusId": 249604969, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/100b8cebcf4640165dd4c099e8df7bfa87c3e03d", "title": "6 Urban Mobility and Parking Demand", "abstract": "Parking demand, both current and future, depends on two aspects: the long-term impact of urbanization and urban planning on parking demand, which is not addressed here, and, secondly, the choice of mobility modes, which is discussed here. The choice of mobility modes may, on one hand, require smart parking management and parking information, which is a result of the tracking technology discussed before. On the other hand an informed or incentivized choice of mobility modes may even lead to less parking demand.", "venue": "", "year": 2021, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145285033", "name": "S. Winter"}]}, {"paperId": "e7aebfb30f46e0e4121ac90563ab9dcfa8a4d6ab", "externalIds": {"DBLP": "conf/iwssl/Wang21", "CorpusId": 248923306}, "corpusId": 248923306, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e7aebfb30f46e0e4121ac90563ab9dcfa8a4d6ab", "title": "A Unified Model of Reasoning and Learning", "abstract": "This paper analyzes the historical development of the conceptions of \u201creasoning\u201d and \u201clearning\u201d, especially their separation in the study of arti\ufb01cial intelligence and the attempts to combine them in various ways. A uni\ufb01ed treatment of cognitive functions is provided in the AGI model NARS, where reasoning and learning are di\ufb00erent facets of the same underlying process.", "venue": "IWSSL", "year": 2021, "referenceCount": 85, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "28-48"}, "authors": [{"authorId": "49830633", "name": "Pei Wang"}]}, {"paperId": "e85ce5036d19980d722fb794355037500ecbe2f7", "externalIds": {"DOI": "10.2139/ssrn.4093683", "CorpusId": 248484841}, "corpusId": 248484841, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e85ce5036d19980d722fb794355037500ecbe2f7", "title": "The Human Condition in An Algorithmized World: A Critique through the Lens of 20th-Century Jewish Thinkers and the Concepts of Rationality, Alterity and History", "abstract": "Artificial Intelligence (AI) systems are increasingly deployed in all domains of our lives. While their use can provide substantial benefits, they also entail significant risks \u2013 and ethics has been put forward as the key solution to counter these risks. Yet the manner in which ethics is typically relied on in this context is woefully deficient. At best, ethics is given the role of orienting problematic technology towards \u2018acceptable\u2019 uses, thereby legitimizing AI\u2019s widespread adoption, which is taken for granted. At worst, ethics is instrumentalized as a quality-label to stimulate AI\u2019s deployment, as part of a broader doctrine of \u2018progress\u2019. Current ethics discourse hence appears unable to provide a more fundamental critique of the way in which the algorithmized world is profoundly impacting our existence. This is because it starts from within a technological paradigm that does not fundamentally question AI\u2019s place and progression in society. In this paper, I therefore argue that, if ethics is to shed light on \u2013 and to offer a more fundamental critique of \u2013 the human condition in an algorithmized world, without being bound to today\u2019s technological paradigm, it requires a meta-technological perspective that puts ethics first. To pursue this aim, I propose to ground our approach in the fact that our existence in the world is necessarily intersubjective and relational, and use the lens of intersubjectivity to examine AI\u2019s impact on the human condition. To narrow the scope of my analysis, I focus on AI\u2019s impact on three interrelated domains of our existence: (1) our way of thinking or rationality, (2) our way of engaging with others or alterity and (3) our way of experiencing time or history. In my analysis, I draw on the work of 20th-century Jewish thinkers, such as Franz Rosenzweig, Emmanuel Levinas and Hannah Arendt, given the importance they ascribe to relationality and its role in countering totalitarian thinking which, as I argue, can also arise through the systemic irresponsible use of AI. After introducing my research inquiry (Chapter 1) and providing a brief definition of AI (Chapter 2), I seek to answer three questions: First, what does the algorithmized world look like, and what is its underpinning societal paradigm (Chapter 3)? Second, how does current AI ethics discourse approach AI\u2019s risks, and how does it fall short of delivering a more fundamental critique of AI\u2019s impact on the human condition (Chapter 4)? Third, how does AI\u2019s ubiquity affect the human condition, and particularly our experience of rationality, alterity and history (Chapter 5)? Based on my research findings, I conclude that the totalizing use of AI systems \u2013 and the way it impacts our way of thinking, our way of engaging with others and our way of experiencing time \u2013 can give rise to significant concerns, as it may be used in a way that opposes our ability to live a meaningful life by engaging in intersubjective human relationships. To close this paper, I postulate several avenues that should be explored to counter the concerns identified (Chapter 6). * Researcher, KU Leuven Faculty of Law, Tiensestraat 41, 3000 Leuven, nathalie.smuha@kuleuven.be. I wish to express my gratitude to Roger Vergauwen and Luc Anckaert for their invaluable support in the context of this research, which I conducted during my Philosophy degree (MA) at the KU Leuven Institute of Philosophy.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 241, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "134533029", "name": "Nathalie A. Smuha"}]}, {"paperId": "821f9d3b553df7c2c3798839cb830d8a188de19a", "externalIds": {"CorpusId": 248368910}, "corpusId": 248368910, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/821f9d3b553df7c2c3798839cb830d8a188de19a", "title": "The Use of Artificial Intelligence in Automation in the Fields of Gynaecology and Obstetrics \u2013 an Assessment of the State of Play Anwendungen der k\u00fcnstlichen Intelligenz zur Automatisierung in der Gyn\u00e4kologie und Geburtshilfe \u2013 eine Standortbestimmung", "abstract": "The long-awaited progress in digitalisation is generating huge amounts of medical data every day, and manual analysis and targeted, patient-oriented evaluation of this data is becoming increasingly difficult or even infeasible. This state of affairs and the associated, increasingly complex requirements for individualised precision medicine underline the need for modern software solutions and algorithms across the entire healthcare system. The utilisation of state-of-the-art equipment and techniques in almost all areas of medicine over the past few years has now indeed enabled automation processes to enter \u2013 at least in part \u2013 into routine clinical practice. Such systems utilise a wide variety of artificial intelligence (AI) techniques, the majority of which have been developed to optimise medical image reconstruction, noise reduction, quality assurance, triage, segmentation, computer-aided detection and classification and, as an emerging field of research, radiogenomics. Tasks handled by AI are completed significantly faster and more precisely, clearly demonstrated by now in the annual findings of the ImageNet Large-Scale Visual Recognition Challenge (ILSVCR), first conducted in 2015, with error rates well below those of humans. This review article will dis-cuss the potential capabilities and currently available applications of AI in gynaecological-obstetric diagnostics. The article will focus, in particular, on automated techniques in prenatal sonographic diagnostics.", "venue": "", "year": 2021, "referenceCount": 107, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "95646540", "name": "J. Weichert"}, {"authorId": "2146415420", "name": "A. Welp"}, {"authorId": "2076410849", "name": "Jan Scharf"}, {"authorId": "2080895815", "name": "C. Dracopoulos"}, {"authorId": "2163410249", "name": "Wolf-Henning Becker"}, {"authorId": "144578328", "name": "M. Gembicki"}]}, {"paperId": "0e76eb7ab6a2ba696fed5622cf44b2a8210ddabd", "externalIds": {"CorpusId": 247997301}, "corpusId": 247997301, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e76eb7ab6a2ba696fed5622cf44b2a8210ddabd", "title": "Neural Dialogue Generation Methods in Open Domain: A Survey empirical", "abstract": "Open-Domain Dialogue Generation (human\u2013computer interaction) is an important issue in the field of Natural Language Processing (NLP). Because of the improvement of deep learning techniques, a large number of neural dialogue generative meth- ods were proposed to generate better responses. In this survey, we elaborated the research history of these existing generative methods, and then roughly divided them into six categories, i.e. , Encoder-Decoder framework-based methods, Hierarchical RecurrentEncoder-Decoder(HRED)-basedmethods,VariationalAutoencoder(VAE)-basedmethods,ReinforcementLearning(RL)-basedmethods,GenerativeAdversarialNetwork(GAN)-basedmethods,andpretraining-model-basedmethods.Wedivedintothemethodsofeachcategoryandgavethedetaileddiscussionsofthesemethods.Afterthat,wepresentedacomparisonamongthedifferentcategoriesofmethodsandanalyzedtheiradvantagesanddisadvantages.Weenumeratedsomeopenaccesspublicdatasetsandsomecommonlyusedautomaticevaluatingmetrics.Finally,wediscusssomepossibleresearchdirectionsthatcantaketheresearchofneuraldialoguegenerationintoanewfrontierinthefuture.", "venue": "", "year": 2021, "referenceCount": 85, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2088605455", "name": "Bin Sun"}, {"authorId": "2158257423", "name": "Kan Li"}]}, {"paperId": "07797213cd6cdf2d67007059ab718d5add436ddd", "externalIds": {"DOI": "10.17454/pam-2111", "CorpusId": 247467547}, "corpusId": 247467547, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/07797213cd6cdf2d67007059ab718d5add436ddd", "title": "Cognitivism and the intellectualist vision of the mind", "abstract": "No one can deny that enactive approaches to the mind are here to stay. However, much of this revolution has been built on the grounds of conceptual confusions and hurried anlyses that undermine enactive claims. The aim of this paper is to weaken the charge of intellectualism against cognitivism developed by Hutto and Myin. This charge turns to be central to the enactive purpose of setting up a fully post-cognitivist position. I will follow a strategy of conceptual elucidation of \u201cintellectualism\u201d. Hutto and Myin (2013, 2017) present two alternative characterizations of this notion. The first is tied to the Cartesian conception of the mind (which I will call \u201cCartesian intellectualism\u201d), and the second is tied to the idea that there is no cognition without content (which I will call \u201csemantic intellectualism\u201d). I would like to go into the problems considering cognititivsm either as Cartesian or semantic intellectualism.", "venue": "Phenomenology & Mind", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Phenomenology & Mind"}, "authors": [{"authorId": "2069450672", "name": "Mariela Dest\u00e9fano"}]}, {"paperId": "3b41739abf993d5cdc698531fae234548720b2ae", "externalIds": {"CorpusId": 247235503}, "corpusId": 247235503, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3b41739abf993d5cdc698531fae234548720b2ae", "title": "Visualization Using Field of Light Displays: Opportunities and New Questions", "abstract": "Visualization techniques are typically evaluated on conventional 2D displays. Current immersive display technology such as headmounted displays (HMDs) and existing (and future) 3D field of light displays (FoLDs) can present visual information with additional perceptual cues not found in 2D displays. We review immersive technology and existing studies which suggest that additional perceptual cues (e.g. stereoscopy and focal cues) from 3D displays can enhance some visualization tasks\u2019 performance. This suggests potential new studies which measure the effect of additional perceptual cues and their influence on effectiveness of visualization methods. We consider the problem of visualizing data which contains interesting structures across multiple scales. We show how immersive and FoLDs provide an opportunity to answer some new questions related to this problem. We hypothesize that the additional perceptual cues of FoLDs can enhance perception of shape structures across multiple scales and we suggest several possible approaches for studying this.", "venue": "", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "144573831", "name": "M. Hamilton"}]}, {"paperId": "0b698924c94deb693144233d9eaf85d793d865af", "externalIds": {"CorpusId": 246484440}, "corpusId": 246484440, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0b698924c94deb693144233d9eaf85d793d865af", "title": "The Myth of AI Failure CSRP 568", "abstract": "A myth has developed that AI has failed as a research program. Most myths contain some germ of truth but this one is exceptional in that it is more or less completely false. In fact AI is a remarkably successful research program which has delivered not only scientific insight but a great deal of useful technology. One of the main reasons why people assert the failure of AI as a research program is the mistaken view that its main goal is to replicate human intelligence. Such a view is understandable. It is common to misread Turing\u2019s 1950 paper Computing Machinery and Intelligence as suggesting that the ultimate goal of AI should be the complete replication of human intelligence. AI researchers have also not done sufficient to make it clear that complete replication of human intelligence is not the ultimate goal of AI. A further source of the failure myth is the need felt by many researchers to distance their approach to AI from other, usually previous, approaches. In many cases a fashionable approach to AI may give itself a new name ALife would be a good example \u2013 and portray previous AI approaches as having failed. In truth there is no failure to be explained. Almost every citizen in the developed world makes use of AIderived technology every day. The fact that this AI technology is usually hidden in other technologies and works unobtrusively is a measure of just how successful AI has been. AI has also inspired, and continues to inspire, many other disciplines from linguistics to biology through the generation of scientifically useful data and concepts. The scientific work may still be at an early stage but its potential is great and failure myths should not be allowed to impede it.", "venue": "", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145708034", "name": "Blay Whitby"}]}, {"paperId": "2bd07bd27ec6a29ad1109e5cd35ae71534d71ac4", "externalIds": {"DOI": "10.1016/b978-0-12-823806-6.00001-6", "CorpusId": 245992402}, "corpusId": 245992402, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2bd07bd27ec6a29ad1109e5cd35ae71534d71ac4", "title": "Technologies and society", "abstract": null, "venue": "Big Data's Threat to Liberty", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Big Data's Threat to Liberty"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "b900f38b233bd66e5445407842bf404913a113b7", "externalIds": {"DOI": "10.1007/978-3-030-93842-0_8", "CorpusId": 245890224}, "corpusId": 245890224, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b900f38b233bd66e5445407842bf404913a113b7", "title": "A Bayesian Framework for Evaluating Evolutionary Art", "abstract": null, "venue": "BNAIC/BENELEARN", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "141-152"}, "authors": [{"authorId": "2149736657", "name": "Augustijn de Boer"}, {"authorId": "2149736665", "name": "Ron Hommelsheim"}, {"authorId": "2082011568", "name": "D. Leeftink"}]}, {"paperId": "014d6d064ca62f56e4aa883114f16f55d0e8c0dc", "externalIds": {"DOI": "10.1007/978-981-16-4963-9_2", "CorpusId": 245642731}, "corpusId": 245642731, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/014d6d064ca62f56e4aa883114f16f55d0e8c0dc", "title": "Fundamentals of Federated Learning", "abstract": null, "venue": "Wireless Networks", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Wireless Networks"}, "authors": [{"authorId": "115893131", "name": "Choong Seon Hong"}, {"authorId": "2280048", "name": "L. U. Khan"}, {"authorId": "2888344", "name": "Mingzhe Chen"}, {"authorId": "2113598069", "name": "Dawei Chen"}, {"authorId": "145412074", "name": "W. Saad"}, {"authorId": "2113962182", "name": "Zhu Han"}]}, {"paperId": "733e665ccef57eb41519f6f6ba53f3a575e9928b", "externalIds": {"CorpusId": 245510134}, "corpusId": 245510134, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/733e665ccef57eb41519f6f6ba53f3a575e9928b", "title": "On a Possibility of Artificial Reason: J. McCarthy, I. Kant, and A. Turing", "abstract": "T\ufeffhe purpose of this study is to explore the possibility of reconciliation between Kant\u2019s transcendental idealism and McCarthy\u2019s epistemological point of view on artificial intelligence, which are at first glance likely to be considered contradictory. For this, characterizing the standpoint of J. McCarthy, who coined the word \u2018artificial intelligence\u2019 as scientific realism and that of A. Turing, who provided a crucial thought experiment that shaped the contemporary conception of artificial intelligence as behaviorism, we shall compare these two standpoints with the transcendental idealism of I. Kant, who conferred on us a monumental indicator for understanding the human reason. T\ufeffhrough this comparison, we shall argue that scientific realism, which is currently a prominent philosophical standpoint of artificial intelligence, is not compatible with Kant\u2019s transcendental idealism but assumes a standpoint strikingly analogous to behaviorism. Nevertheless, we shall also argue that once transcendental idealism is looked at from the viewpoint of behaviorism, scientific realism can be seen as compatible with transcendental idealism. T\ufeffhis compatibility we name the possibility of artificial reason in this paper.", "venue": "", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo Kim"}, {"authorId": "2151267031", "name": "Jinkyu Jeong"}, {"authorId": "2065379320", "name": "J. McCarthy"}, {"authorId": "32297722", "name": "I. Kant"}, {"authorId": "71653708", "name": "A. Turing"}]}, {"paperId": "2ac71a11195a593366239164abf7cb95ebcde530", "externalIds": {"CorpusId": 245510927}, "corpusId": 245510927, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2ac71a11195a593366239164abf7cb95ebcde530", "title": "Gerlai, Robert (2017) Learning, memory, cognition, and the question of sentience in fish. Animal Sentience 13(8)", "abstract": "Evolutionarily conserved features have been demonstrated at many levels of biological organization across a variety of species. Evolutionary conservation may apply to complex behavioral phenomena too. It is thus not inconceivable that a form of sentience does exist even in the lowest order vertebrate taxon, the teleosts. How similar it is to human sentience in its level of complexity or in its multidimensional features is a difficult question, especially from an experimental standpoint, given that even the definition of human sentience is debated. Woodruff attempts a Turing-like test of fish sentience, and lists numerous neuroanatomic, neurophysiological and behavioral similarities between fish and humans. In this commentary, I add to these similarities by discussing empirical findings showing complex forms of mental representation in fish. At the same time, I note that without a more thorough understanding of human sentience and more data on similarities as well as differences between fish and mammals, the final conclusion may have to wait. Robert Gerlai, Professor of Psychology, University of Toronto, does research on neurobiological and genetic mechanisms of behavior in fish and rodents. He is Fellow and past president of the International Behavioral Neuroscience Society. He received the Distinguished Scientist Award from the International Behavioral and Neural Genetics Society in 2013, and the University of Toronto Mississauga Excellence in Research Award in 2015. sites.utoronto.ca/GerlaiLab/ 1. Evolutionary conservation at many levels of biology: Does it extend to sentience? Evolutionary biology has taught us that all species are related to each other. The question is only the degree of relatedness. We also know that evolution is a process whereby random genetic changes leading to alterations in previously existing phenotypes are tested in terms of how they increase or decrease the ability to reproduce under current environmental conditions. In other words, evolution is not a designer that creates things from scratch. Biologists find evolutionary homologies across a broad range of features and across a large number of species from fish to human. Steps of embryonic development, fundamental anatomical layout of brains, neurotransmitter systems and their receptors, molecular mechanisms of neuronal plasticity, and amino acid sequences of proteins all exhibit homologies, which are signs of common ancestry. Why should sentience be different? I would argue, therefore, that the question is not whether fish are sentient, but rather to what degree and in what flavor? In other words, where Animal Sentience 2017.045: Gerlai on Woodruff on Fish Feel 2 do we draw the line? Or more provocatively, is there a line to draw at all? Clearly, human sentience is a species-typical feature of Homo sapiens. Fish do not have it. But does this prove that we are the only sentient creature walking (flying, swimming, crawling) on this planet? Woodruff\u2019s (2017) target article makes a genuine effort to show us that it does not! 2. Where do we draw the line? A Turing test for fish. According to Woodruff, fish do exhibit signs of sentience, a conclusion that depends upon how we define the phenomenon and associated underlying mechanisms. And there lies the biggest question: the definition of the phenomenon. We all think we know what it is to be aware, or to be sentient or conscious. But does science really know the answer to these questions? Woodruff attempts to answer by focusing on empirical, experimental definitions: mechanisms and behavioral responses, a Turing test (Turing, 1950) of sentience for fish. He shows us that fish do indeed possess features at the levels of anatomy, neurophysiology and behavior compatible with the assumption of the presence of sentience. The similarities he cites across human and fish features abound. But so do the differences (Bay\u00e9s et al., 2017)! Which should we emphasize? And which represent proof or disproof? My own impression is that these questions are still to be discussed, and the answers will continue to be refined and re-discussed again and again. But let me add another angle to this discussion, leading back to the question of how we define sentience. To me, it appears this phenomenon has to do with modeling the external world. Mental representations of the outside allow the organism to remember the past, understand the present, and forecast the future, a phenomenon that in humans, and in some other mammals as well as some bird species, scientists call the ability to do \u201cmental time travel\u201d (Clayton, 2015). Mental representations imply that there is an actor, the self, that experiences, and plays a role in, the representation. Sentience may be an epiphenomenon, an emergent property of increasingly sophisticated mental representations afforded by complex brains. Setting aside questions about specific anatomy, connectome, electrophysiology and molecular mechanisms, do we know whether fish brains are complex enough for mental representations to form? From the results of behavioral studies, the answer to this question is: yes, we already do. 3. Complex mental representations: What do fish learn and remember? I will give only two examples, from my own research. The ability to make numerical or quantity estimations is a human feature but it is also widespread in the animal kingdom (Feigenson et al., 2004). A variety of fish species have been shown to be able to tell more from less, and, surprisingly, the way they do it also resembles how human children do it (G\u00f3mez-Laplaza & Gerlai, 2016). Most recently, we have shown that a fish species, angelfish (Pterophyllum scalare), is not only capable of making the distinction between more and less when the item sets to be compared are present at the same time, but also when the items are not shown, i.e., when the fish have to remember where the items used to be (G\u00f3mez-Laplaza & Gerlai, 2016). In other words, we now have clear evidence of memory, i.e., mental representation of more vs. less in a fish species. Does this mean that fish \u201cunderstand\u201d the abstract meaning of more vs. less? are they \u201caware\u201d of their Animal Sentience 2017.045: Gerlai on Woodruff on Fish Feel 3 choices? No, it does not. But it does show a level of sophistication in their mental representation abilities that in the past was thought to be uniquely human. The other example of complex mental representation in fish comes from our studies on spatial learning in zebrafish. As also discussed by Woodruff, the hallmark of episodic or declarative memory is its relational aspect (Eichenbaum, 1992). The ability to organize and relate what seem to be loosely related bits and pieces of information is a fundamental requirement for us to be able to remember where, what and when things happened to us, a function supported by the hippocampal formation. Thus, tests of relational memory have been used to analyze \u201cdeclarative episodic\u201d memory in non-human animals too (Eichenbaum, 1992), species that cannot talk. A frequently employed relational type of hippocampal memory task is the spatial memory test in which mammals (mostly rodents) learn the dynamic representation of visual cues outside the maze. But how do we know what they actually learn? This is a complicated question that has been explored experimentally. A rodent with a disrupted hippocampus can pick out a single cue from the background, turning the spatial task into an elemental task that it can seemingly perform well (Gerlai, 1998; Phillips & LeDoux, 1994). However, if a salient associative cue is experimentally provided in addition to the spatial cues, hippocampally lesioned animals cannot pick out a secondary cue, and thus will \u201crecognize\u201d the location of the reinforcer only when the associative cue is presented. Hippocampally intact mammals, on the other hand, can learn both at the same time: the dynamic spatial map, and the salient cue. Thus, when faced with the spatial task, hippocampally intact rodents can identify the location of the reinforcer even in the absence of the salient associative cue (Gerlai, 1998; Phillips & LeDoux, 1994). Surprisingly, so can zebrafish (Karnik & Gerlai, 2014). In other words, zebrafish acquire spatial information the same way rodents with an intact hippocampus do, despite the fact that zebrafish lack the hippocampal structure specific to mammalian brains. The ability to acquire a complex spatial map suggests sophisticated mental representation in fish. Does it mean fish are sentient? No, it does not. But this second Turing test of mental representation previously thought to be a sole property of complex mammalian brains has now also been passed with flying colors by fish. In sum, Woodruff\u2019s arguments about the many similarities between fish and humans are eyeopening. But to truly understand what it feels like to be a fish, we may need to appreciate both the similarities and the differences between us and them. We may even need a better understanding of what it really feels like to be human.", "venue": "", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "4809629", "name": "R. Gerlai"}]}, {"paperId": "437dc1846e1cff235da6dd2fd714387ce0bfca84", "externalIds": {"CorpusId": 245447872}, "corpusId": 245447872, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/437dc1846e1cff235da6dd2fd714387ce0bfca84", "title": "ESSAY Water resource prospects for the next 50 years on the water planet: personal perspectives on a shared history from Earth Day, the Fourth Industrial Revolution and One Health to the futures of alternative energy, bioconvergence and quantum computing", "abstract": "The history and the future of water resource management as well as the endeavours that it influences are inextricably woven into the fabric of the past, current and future states of all life on our watery planet. From the first Earth Day in 1970 and the founding of the International Water Resources Association (IWRA) in 1971 to the development of modern biotechnology applications and alternative energy sources across subsequent decades, this paper reflects on these and other historical underpinnings of how we manage the use of our essential water resources now and might hope to in the future. ARTICLE HISTORY Received 23 May 2021 Accepted 9 November 2021", "venue": "", "year": 2021, "referenceCount": 167, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "123568129", "name": "W. Jones"}]}, {"paperId": "29600d7533061c8473a119b1ad4f742972c6268b", "externalIds": {"DBLP": "conf/icccrea/Wulf21", "CorpusId": 245331326}, "corpusId": 245331326, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/29600d7533061c8473a119b1ad4f742972c6268b", "title": "Producing Creative Chess through Chess Engine Selfplay", "abstract": "This article presents preliminary work on a creative chess engine that can be used to produce creative chess games or sequences. The contribution in this article is the creation of a creative chess engine that is then pitted against itself to form a creative system that outputs chess games. The chess engine is an extension to an existing chess engine that consists of forcing the existing engine to play more creative moves. It is in no way an improvement when compared to existing chess engines, even though it is based on the world\u2019s best: Stockfish. Letting the supposedly creative chess engine play against itself forms a creative system that outputs chess games. Through analyzing these games it might be possible to discover new chess openings or principles.", "venue": "ICCC", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "208-212"}, "authors": [{"authorId": "1958839977", "name": "Wolf De Wulf"}]}, {"paperId": "b7532b76441d2c3e9cc24f491989e6aea242b19d", "externalIds": {"DBLP": "conf/icccrea/ChangC21", "CorpusId": 245331248}, "corpusId": 245331248, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b7532b76441d2c3e9cc24f491989e6aea242b19d", "title": "In the Name of Creativity: En Route to Inspiring Machines", "abstract": "In this short paper, we reflect on the long quest for intelligence and creativity of computing machinery as well as the suitability for prevailing machine learning techniques to be used in creative tasks. We believe that modularization and multi-layered structures are among essential ingredients constituting creative minds and may greatly benefit machines on handling creative tasks. For proof of concept, we select musical composition, particularly, Species Counterpoint, as the task, adopt a recently proposed computational framework designed for investigating creativity and the creative process, and present an implementation capable of producing the outcomes that exhibit the desired effect. Introduction and Reflections Computing machinery has been fascinating to human beings for quite a long time. Accompanied with the introduction to the idea and design of a programmable, general-purpose, mechanical computer, well known as Babbage\u2019s Analytical Engine (Menabrea 1843), almost two centuries ago, expectations and speculations on the potentials, especially in aspects of intelligence and creativity, of such a machine had been boldly made by Lovelace (1843), \u201c..., the engine might compose elaborate and scientific pieces of music of any degree of complexity or extent.\u201d A century later, Turing (1950) asked the question, \u201cCan machines think?\u201d to address the intelligence aspect of machines and to argue that machines may eventually exhibit intelligent behavior as playing well in the imitation game. Now, we wish to ask the question, \u201cCan machines create?\u201d Under the current circumstances, we are unable to directly, appropriately answer this question. Instead, in this article, within the scope of musical composition, we would like to make a discussion on the apparent lack of certain essential components, capabilities, and properties that enable or permit machines to create in the present prevailing techniques. Moreover, we provide our preliminary implementation as a viable technical construction with its generated results indicating that the existence of some these essential ingredients brings machines one step further closer to being able to create. The most prominent, prevailing computational techniques in the related fields of artificial intelligence are undoubtedly the methods in the family of deep learning and artificial neural networks, and in the area of music generation, there have already been enormous studies and results (Briot, Hadjeres, and Pachet 2020). We do not intend to diminish the importance or undermine the practical value of those works, but if methods of this category are adopted, from the viewpoint of creators, or more specifically, music composers, in terms of the present form of the methodology, there are certain limitations in the aspects of formality, capability, and efficacy (Pearl and Mackenzie 2018). The technical framework of deep learning requires a huge amount of data, i.e., existing music pieces in this case, to train models which no matter will be used as classifiers or generators. Insufficient data will be unable to render useful or meaningful outcomes, let alone models that can create in the common sense. In history, there are only a few productive music composers creating certain amount of music pieces. Simply according to this situation, in contrast to the usage and requirements of the deep learning methodology, it can be seen that creativity and the action of creating may not properly fit with how deep learning operates and functions. As to the characteristics of deep learning, please allow us to make an arguable analogy. We know that any boolean function, as long as the truth table is given, in theory, we can directly construct its combinational circuits in a systematic way by analyzing and identifying the essential prime implicants. It is in the fundamentals of logic design. However, in practice, except for certain, usually extremely simple, circuits, most circuits are not designed in this way. Instead, their design process usually incorporates modularization, multi-layered structures, domain knowledge, and even personal experience of designers. Although the techniques of deep learning keeps evolving and advancing, employing popular deep learning techniques on music generation tasks is intrinsically similar to making attempts to piece together superficial elements, like prime implicants in the circuit case, to produce target outcome in the basic, primitive way. For music, such an approach in fact not only conceptually ignores the separate, usually totally different ideas and emotions that the music composer would like to convey and express via individual music pieces but also decontextualizes the music pieces by not considering the essence constitutes the creation such as the historical background, the cultural heritage, and even possibly the factors of instruments, including timbre, registers, and the difficulty to perform. Proceedings of the 12th International Conference on Computational Creativity (ICCC \u201921) ISBN: 978-989-54160-3-5 400 Moreover, pre-existing knowledge, pre-determined settings, and personal preference or experience are extremely difficult to inject into the use of deep learning methods if at all possible. While the models obtained from deep learning can be presented in detail in the form of many parameters, usually millions, and easily duplicated for replicating the results, the operation as a whole fundamentally forms a black box. Thus, a successful, practically applicable artificial neural network model can provide little information for gaining insights or triggering inspiration. In recent years, while the research directions such as interpretable machine learning and explainable artificial intelligence have emerged (Linardatos, Papastefanopoulos, and Kotsiantis 2021), the advancement is currently quite limited. Therefore, in this article, we wish to respond to the call made by Turing for making machines intelligent, or in our case, capable of creating. We would like to take a small step towards making machines able or seemingly able to create in the common sense. In order to integrate the computational framework with the concept of modularization and the multi-layered structures of the creating process, we adopt our recently proposed meta-framework, ants on multiple graphs, AntsOMG (Chang and Chen 2020) and one of its showcase, the composition of organum motets (Chang and Chen 2021), in the hope that the essential ingredients in the creating process, especially in music composition, can be observed. Based on the design and properties of AntsOMG, we expect the presented implementation to possess certain characteristics, such as accessibility, scalability, and explainability. Moreover, at the level of technical details, since the implementation is multi-layered and modularized, the \u201ccomponents\u201d of the produced model for composing music can even be separated and swapped with ease. Hence, transfer learning, utilizing pre-existing knowledge, incorporating pre-determined settings, integrating human experience, and the like can be achieved. By conducting research along this line, hopefully injecting creativity into machines may someday be accomplished.", "venue": "ICCC", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "400-404"}, "authors": [{"authorId": "151504753", "name": "Chun-yien Chang"}, {"authorId": "101612255", "name": "Yingpeng Chen"}]}, {"paperId": "b8b764703a6ab0e0b01194a1d8be3a02a352f8b4", "externalIds": {"CorpusId": 245121860}, "corpusId": 245121860, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b8b764703a6ab0e0b01194a1d8be3a02a352f8b4", "title": "1st Workshop on Automatic Spoken Language Translation in Real-World Settings", "abstract": "We address the problem of language model customization in applications where the ASR component needs to manage domain-specific terminology; although current state-of-the-art speech recognition technology provides excellent results for generic domains, the adaptation to specialized dictionaries or glossaries is still an open issue. In this work we present an approach for automatically selecting sentences, from a text corpus, that match, both semantically and morphologically, a glossary of terms (words or composite words) furnished by the user. The final goal is to rapidly adapt the language model of an hybrid ASR system with a limited amount of in-domain text data in order to successfully cope with the linguistic domain at hand; the vocabulary of the baseline model is expanded and tailored, reducing the resulting OOV rate. Data selection strategies based on shallow morphological seeds and semantic similarity via word2vec are introduced and discussed; the experimental setting consists in a simultaneous interpreting scenario, where ASRs in three languages are designed to recognize the domainspecific terms (i.e. dentistry). Results using different metrics (OOV rate, WER, precision and recall) show the effectiveness of the proposed techniques.", "venue": "", "year": 2021, "referenceCount": 133, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145862931", "name": "M. Turchi"}]}, {"paperId": "a9a7127f3bd7a964606ed58ec80361a34b3f1684", "externalIds": {"CorpusId": 244919179}, "corpusId": 244919179, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a9a7127f3bd7a964606ed58ec80361a34b3f1684", "title": "Artificial Computational Creativity based on Collaborative Intelligence in Music", "abstract": "In this paper, I will propose a series of Artificial Computer Creativity (ACC) techniques based on Collaborative Intelligence from a multidisciplinary approach. The common thread here are some reflections on the Turing Test (TT) that will inspire alternative metrics of validation. I will propose Collaborative Intelligence (CI) techniques as an expansion of anthropocentric ACC by: replacing the idea of imitation in its basis with playing a game, using selfreferentiality and circularity between the generative and the validation processes; having hybrid man-machine networks; incorporating algorithms that function as mediators of the nodes in hybrid networks avoiding centralities and by integrating self-referential metrics in the works themselves. Finally, I will show how these techniques have been used in a set of works.", "venue": "", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2143260007", "name": "Fernando Egido"}]}, {"paperId": "4da830b6d84e117cb147ff71f205e71500ebbbb1", "externalIds": {"CorpusId": 244709495}, "corpusId": 244709495, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4da830b6d84e117cb147ff71f205e71500ebbbb1", "title": "Machines and Influence", "abstract": "Policymakers face a broader challenge of how to view AI capabilities today and where does society stand in terms of those capabilities. This paper surveys AI capabilities and tackles this very issue, exploring it in context of political security in digital societies. We introduce a Matrix of Machine Influence to frame and navigate the adversarial applications of AI, and further extend the ideas of Information Management to better understand contemporary AI systems deployment as part of a complex information system. Providing a comprehensive review of man-machine interactions in our networked society and political systems, we suggest that better regulation and management of information systems can more optimally offset the risks of AI and utilise the emerging capabilities which these systems have to offer to policymakers and political institutions across the world. Hopefully this long essay will actuate further debates and discussions over these ideas, and prove to be a useful contribution towards governing the future of AI.", "venue": "", "year": 2021, "referenceCount": 128, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2151241746", "name": "Shashank Yadav"}]}, {"paperId": "7df4af2c478eb163cfd0d897fad7a26b0221e7ec", "externalIds": {"MAG": "3204743340", "DOI": "10.1007/978-3-476-05796-9_12", "CorpusId": 244328204}, "corpusId": 244328204, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7df4af2c478eb163cfd0d897fad7a26b0221e7ec", "title": "Maschinen-\u00dcbersetzung: Ada Lovelaces Notes of the Translator", "abstract": null, "venue": "", "year": 2021, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "157-166", "name": ""}, "authors": [{"authorId": "114614045", "name": "A. Sch\u00f6ning"}]}, {"paperId": "2ef8eb79ecbbfece7cf51d1e75c7614e18e1aa31", "externalIds": {"DOI": "10.1016/j.ifacol.2021.10.448", "CorpusId": 244096048}, "corpusId": 244096048, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2ef8eb79ecbbfece7cf51d1e75c7614e18e1aa31", "title": "Walking Through the Turing Wall", "abstract": null, "venue": "IFAC-PapersOnLine", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "IFAC-PapersOnLine"}, "authors": [{"authorId": "2057885436", "name": "Albert R. Efimov"}, {"authorId": "115644835", "name": "D. Dubrovsky"}, {"authorId": "112902170", "name": "P. M. Matveev"}]}, {"paperId": "a886028b788e98cdec71c7ae1d3aa64cefb1b32f", "externalIds": {"DOI": "10.1007/978-3-030-26050-7_189-1", "CorpusId": 244083940}, "corpusId": 244083940, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a886028b788e98cdec71c7ae1d3aa64cefb1b32f", "title": "Machine Learning", "abstract": null, "venue": "Encyclopedia of Mathematical Geosciences", "year": 2021, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Encyclopedia of Mathematical Geosciences"}, "authors": [{"authorId": "2068792892", "name": "Feifei Pan"}]}, {"paperId": "a4c964d4200dba72bba324f33cb1258aee7dd0df", "externalIds": {"CorpusId": 243843605}, "corpusId": 243843605, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a4c964d4200dba72bba324f33cb1258aee7dd0df", "title": "Implementation of AutoTutor Lite", "abstract": "................................................................................................................ ii Chapter", "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2148416687", "name": "Lu Han"}]}, {"paperId": "3d928a4a0311806c8cea689f0e1be8f6fef363f6", "externalIds": {"DBLP": "journals/access/StockBB21", "DOI": "10.1109/ACCESS.2021.3125102", "CorpusId": 242079633}, "corpusId": 242079633, "publicationVenue": {"id": "2633f5b2-c15c-49fe-80f5-07523e770c26", "name": "IEEE Access", "type": "journal", "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, "url": "https://www.semanticscholar.org/paper/3d928a4a0311806c8cea689f0e1be8f6fef363f6", "title": "Applications of Artificial Intelligence in Distribution Power System Operation", "abstract": "Due to the energy transition and the distribution of electricity generation, distribution power systems gain a lot of attention as their importance increases and new challenges in operation emerge. The integration of renewables and electric vehicles for instance leads to manifold changes in the system, e.g. participation in provision of ancillary services. To solve these challenges artificial intelligence provides a variety of solutions based on the increase in sensor data and computational capability. This paper provides a systematic overview of some of the most recent studies applying artificial intelligence methods to distribution power system operation published during the last 10 years. Based on that, a general guideline is developed to support the reader in finding a suitable AI technique for a specific operation task. Therefore, four general metrics are proposed to give an orientation of the requirements of each application. Thus, a conclusion can be drawn presenting suitable algorithms for each operation task.", "venue": "IEEE Access", "year": 2021, "referenceCount": 143, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "9", "pages": "150098-150119", "name": "IEEE Access"}, "authors": [{"authorId": "2136754152", "name": "Simon Stock"}, {"authorId": "2765856", "name": "D. Babazadeh"}, {"authorId": "122377639", "name": "C. Becker"}]}, {"paperId": "5d75d8ce441a37517299509374e638285e2f4b2a", "externalIds": {"MAG": "3159430918", "DOI": "10.35248/2167-0374.21.11.185", "CorpusId": 240596920}, "corpusId": 240596920, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d75d8ce441a37517299509374e638285e2f4b2a", "title": "The Impact of Artificial Intelligence on the Modern Battlefield", "abstract": "The rapid development of modern technology has made a significant impact on the various aspects of human lives. One important piece of technology that has recently come to the foray is Artificial Intelligence. Artificial Intelligence has already made an impact in the commercial and civilian fields. However, the technology\u2019s characteristics make it suitable for military application as well. This study is an attempt to understand the evolution of Artificial Intelligence and its applications in the civilian domain. At the same time, the study will also attempt to actively look into the military application of the technology as well. The study concludes that through the integration of Artificial Intelligence with the military affairs there will be a more synergistic and coordinated approach to the battles of the future. Also, the study has also concluded that Artificial Intelligence can lead towards the automation of various weapons platforms.", "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "11", "pages": "1-7", "name": ""}, "authors": [{"authorId": "50071421", "name": "Z. Javed"}]}, {"paperId": "4aa69be5563c9f50da9bcb89a0558eb1942b30ac", "externalIds": {"DOI": "10.1007/978-3-030-77283-3_15", "CorpusId": 240434265}, "corpusId": 240434265, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4aa69be5563c9f50da9bcb89a0558eb1942b30ac", "title": "Humanity in the Era of Autonomous Human\u2013machine Teams", "abstract": null, "venue": "Systems Engineering and Artificial Intelligence", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Systems Engineering and Artificial Intelligence"}, "authors": [{"authorId": "50881611", "name": "Shu-Heng Chen"}]}, {"paperId": "9426a6bb6c5257ae62a47f4124af6cc757bef018", "externalIds": {"CorpusId": 251498190}, "corpusId": 251498190, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9426a6bb6c5257ae62a47f4124af6cc757bef018", "title": "SERI: Generative Chatbot Framework for Cybergrooming Prevention", "abstract": "Cybergrooming refers to a crime to lure potential victims, particularly youth, by establishing personal trust relationships with them for sexual abuse or exploitation. Although cybergrooming is recognized as one of the serious social issues, there has been a lack of proactive programs to protect the youth. In this paper, we present a generative chatbot framework, called SERI (Stop cybERgroomIng), that can generate authentic conversations between a perpetrator chatbot and a potential victim chatbot. The SERI is designed to provide a safe and authentic environment for enhanc-ing youth\u2019s sensitivity and awareness of subtle cues of cybergrooming without exposing un-necessary ethical issues caused by potentially offensive or upsetting languages. The SERI is developed as a pre-stage before the perpetrator chatbot is deployed to chatting with an actual human youth user to observe how the youth user can respond to a stranger or acquaintance asking for sensitive or private information. Hence, to evaluate the quality of the conversations generated by the SERI, we use open-source, referenced, and unreferenced metrics to assess the generated conversations automatically. In addition, we evaluated the quality of the conversation based on the human evaluation method. Our results show that the SERI can generate authentic conversations between the two chatbots compared to the original conversations from the used dataset in perplexity and MaUde scores.", "venue": "", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2149504682", "name": "Zhen Guo"}, {"authorId": "2110794017", "name": "Li-Min Huang"}, {"authorId": "2148374177", "name": "Jin-Hee Cho"}]}, {"paperId": "98942fefcdaf2a36372ee2e08e572a1b285ad20e", "externalIds": {"CorpusId": 240494108}, "corpusId": 240494108, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/98942fefcdaf2a36372ee2e08e572a1b285ad20e", "title": "AI Scientist Grand Challenge", "abstract": null, "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "baa4838e37478894227ae298565e40dfdebba0e5", "externalIds": {"DOI": "10.1007/978-3-030-78471-3_15", "CorpusId": 240407227}, "corpusId": 240407227, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/baa4838e37478894227ae298565e40dfdebba0e5", "title": "Towards Theory Formalization in (Social) Embodiment: A Tutorial", "abstract": null, "venue": "Handbook of Embodied Psychology", "year": 2021, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Handbook of Embodied Psychology"}, "authors": [{"authorId": "2165455", "name": "A. Szabelska"}, {"authorId": "1394624684", "name": "O. Dujols"}, {"authorId": "47467910", "name": "T. M. Erle"}, {"authorId": "15939401", "name": "Alessandro P. Sparacio"}, {"authorId": "145846140", "name": "H. Ijzerman"}]}, {"paperId": "62c07aad4141e1c2426bad364bc8aa9dbc32f380", "externalIds": {"DBLP": "conf/icycsee/Wu21a", "MAG": "3200806435", "DOI": "10.1007/978-981-16-5943-0_41", "CorpusId": 240503536}, "corpusId": 240503536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/62c07aad4141e1c2426bad364bc8aa9dbc32f380", "title": "Demos of Passing Turing Test Successfully", "abstract": null, "venue": "ICPCSEE", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "505-514"}, "authors": [{"authorId": "37149163", "name": "Shengyuan Wu"}]}, {"paperId": "1b206d176e67095c98a299292170e878711c1edb", "externalIds": {"DBLP": "conf/sigsand/SchusterWV21", "DOI": "10.1007/978-3-030-85893-3_2", "CorpusId": 239091251}, "corpusId": 239091251, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1b206d176e67095c98a299292170e878711c1edb", "title": "Maturity Models for the Assessment of Artificial Intelligence in Small and Medium-Sized Enterprises", "abstract": null, "venue": "PLAIS", "year": 2021, "referenceCount": 18, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "22-36"}, "authors": [{"authorId": "49891420", "name": "T. Schuster"}, {"authorId": "51201651", "name": "L. Waidelich"}, {"authorId": "1745369", "name": "R. Volz"}]}, {"paperId": "09c1b934b84c6ab4caf685666143fd6fd8dc94fb", "externalIds": {"MAG": "3203797056", "DOI": "10.1007/978-3-030-72644-7_5", "CorpusId": 244320599}, "corpusId": 244320599, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09c1b934b84c6ab4caf685666143fd6fd8dc94fb", "title": "Consciousness: Philosophy\u2019s Great White Whale", "abstract": null, "venue": "The Mind-Technology Problem", "year": 2021, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "The Mind-Technology Problem"}, "authors": [{"authorId": "1817982", "name": "Gerald Vision"}]}, {"paperId": "3f42481b9948f5360a1320f7172999e26ea7ce56", "externalIds": {"MAG": "3201820359", "DOI": "10.1007/978-3-030-77939-9_19", "CorpusId": 244319000}, "corpusId": 244319000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f42481b9948f5360a1320f7172999e26ea7ce56", "title": "Language Modeling and Text Generation Using Hybrid Recurrent Neural Network", "abstract": null, "venue": "Deep Learning for Unmanned Systems", "year": 2021, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Deep Learning for Unmanned Systems"}, "authors": [{"authorId": "2141166678", "name": "Samreen"}, {"authorId": "143957784", "name": "M. Iqbal"}, {"authorId": "2074278840", "name": "Iftikhar Ahmad"}, {"authorId": "2144296182", "name": "Suleman Khan"}, {"authorId": "2142467545", "name": "R. Khan"}]}, {"paperId": "5927294d4d011f7b1e5dadb275340d15c3e5d26e", "externalIds": {"CorpusId": 239014231}, "corpusId": 239014231, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5927294d4d011f7b1e5dadb275340d15c3e5d26e", "title": "CHATBOT: DESIGN, ARCHITECUTRE, AND APPLICATIONS", "abstract": "................................................................................................................................................ ...1", "venue": "", "year": 2021, "referenceCount": 111, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2155815740", "name": "Xufei Huang"}, {"authorId": "2060081768", "name": "Mitch Marcus"}]}, {"paperId": "183a563c411a437e43a523a2c168082776665bc6", "externalIds": {"CorpusId": 239001458}, "corpusId": 239001458, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/183a563c411a437e43a523a2c168082776665bc6", "title": "Scale , abstraction , and connectionist models : On parafinite thresholds in Artificial Intelligence", "abstract": "In this thesis, I investigate the conceptual intersection between scale, abstraction, and connectionist modeling in arti cial intelligence. First, I argue that connectionist learning algorithms allow for higher levels of abstraction to dynamically emerge when para nite thresholds are surpassed within the network. Next, I argue that such networks may be surveyable, provided we evaluate them at the appropriate level of abstraction. To demonstrate, I consider the recently released GPT-3 as a semantic model in contrast to logical semantic models in the logical inferentialist tradition. Finally, I argue that connectionist models capture the inde nite nature of higher-level abstractions, such as those that appear in natural language. Index words: [Connectionism, Scale, Levels, Abstraction, Neural Networks, GPT-3] Scale, abstraction, and connectionist models: On parafinite thresholds in Artificial Intelligence", "venue": "", "year": 2021, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "121485370", "name": "Zachary Peck"}]}, {"paperId": "8308183394a5e53325c2f602b14573311639780e", "externalIds": {"DBLP": "conf/recsys/LinWL21", "CorpusId": 238233052}, "corpusId": 238233052, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8308183394a5e53325c2f602b14573311639780e", "title": "Target-guided Knowledge-aware Recommendation Dialogue System: An Empirical Investigation (Long paper)", "abstract": "The target-guided recommendation dialogue system aims to make high-quality recommendations through interactive conversations proactively and naturally. Existing methods still struggle to incorporate background knowledge for coherent response generation, and to recommend appropriate items with respect to dialogue context, user preference and recommendation target. In this paper, we investigate the problem of target-guided knowledge-aware recommendation dialogue and design a dialogue generation system to alleviate the above-mentioned issues. Specifically, we employ pre-trained language models with multi-task learning to jointly learn response generation and goal prediction towards the target. We also present a knowledge-preserving encoding strategy to maintain the facts in background knowledge. Extensive experiments on two benchmark datasets show that our system significantly outperforms various competitive models in terms of both automatic and manual evaluations. We further provide analysis and discussions to demonstrate that our system is effective in leveraging both related knowledge and planned goals to generate fluent, informative and coherent responses towards the target of recommendation.", "venue": "KaRS/ComplexRec@RecSys", "year": 2021, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": "50825802", "name": "Dongding Lin"}, {"authorId": "152924492", "name": "Jian Wang"}, {"authorId": "2027417248", "name": "Wenjie Li"}]}, {"paperId": "7ec4389647caecd34e08eb70c5776b9f91f3c3a5", "externalIds": {"DBLP": "journals/access/AbbaszadeSMZZ21", "DOI": "10.1109/ACCESS.2021.3108768", "CorpusId": 238221270}, "corpusId": 238221270, "publicationVenue": {"id": "2633f5b2-c15c-49fe-80f5-07523e770c26", "name": "IEEE Access", "type": "journal", "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, "url": "https://www.semanticscholar.org/paper/7ec4389647caecd34e08eb70c5776b9f91f3c3a5", "title": "Application of Quantum Natural Language Processing for Language Translation", "abstract": "In this paper, we develop compositional vector-based semantics of positive transitive sentences using quantum natural language processing (Q-NLP) to compare the parametrized quantum circuits of two synonymous simple sentences in English and Persian. We propose a protocol based on quantum long short-term memory (Q-LSTM) for Q-NLP to perform various tasks in general but specifically for translating a sentence from English to Persian. Then, we generalize our method to use quantum circuits of sentences as an input for the Q-LSTM cell. This enables us to translate sentences in different languages. Our work paves the way toward representing quantum neural machine translation, which may demonstrate quadratic speedup and converge faster or reaches a better accuracy over classical methods.", "venue": "IEEE Access", "year": 2021, "referenceCount": 40, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/6514899/09525075.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "9", "pages": "130434-130448", "name": "IEEE Access"}, "authors": [{"authorId": "104316601", "name": "M. Abbaszade"}, {"authorId": "145478033", "name": "V. Salari"}, {"authorId": "144823300", "name": "S. S. Mousavi"}, {"authorId": "2128730021", "name": "Mariam Zomorodi"}, {"authorId": "2146289068", "name": "Xujuan Zhou"}]}, {"paperId": "a2ce499f0ed70e1907b4d3452f1685defd35be07", "externalIds": {"CorpusId": 238209471}, "corpusId": 238209471, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a2ce499f0ed70e1907b4d3452f1685defd35be07", "title": "Laughing with machines: philosophical analysis on the preconditions of sense of humour for machines", "abstract": "This article will analyse the preconditions of sense of humour for artificial intelligence. Can artificial intelligence have a sense of humour? Is there a difference between human and machine laughter? Some machines already fulfil certain conditions which are associated with the human sense of humour: on the most superficial level machines appear to laugh and produce jokes, and they recognise sarcasm and punchlines, and they can evaluate funniness. In short, artificial intelligence is already able to recognise humour, and reacts to it accordingly. Furthermore, people laugh with humorous machines. However, it is still uncertain whether artificial intelligence can have a sense of humour or not, at least in comparison to a human sense of humour. To build bridges between AI research and philosophy of humour, this article proposes that there are (at least) five notable philosophical issues to be addressed if we are to accept that machines can have a (humanlike) sense of humour. These principles are: 1) worldview, 2) selfconsciousness, 3) self-reflection, 4) self-criticism, and 5) losing control.", "venue": "", "year": 2021, "referenceCount": 96, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "114685585", "name": "Jarno Hietalahti"}]}, {"paperId": "482fe094ee0ec56bfcf37a56b42896209b063580", "externalIds": {"MAG": "3184567337", "DOI": "10.1007/978-3-030-80129-8_16", "CorpusId": 237976844}, "corpusId": 237976844, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/482fe094ee0ec56bfcf37a56b42896209b063580", "title": "Biostatistics in Biomedicine and Informatics", "abstract": null, "venue": "Lecture Notes in Networks and Systems", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Lecture Notes in Networks and Systems"}, "authors": [{"authorId": "107583244", "name": "Esther M. Pearson"}]}, {"paperId": "3a1c65ae249016a7b5644263461c969c9dd4c8c7", "externalIds": {"MAG": "3183660754", "DOI": "10.1007/978-3-662-62989-5_2", "CorpusId": 238001835}, "corpusId": 238001835, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a1c65ae249016a7b5644263461c969c9dd4c8c7", "title": "Analog oder digital? Philosophieren nach dem Ende der Philosophie", "abstract": null, "venue": "Digitalit\u00e4tsforschung / Digitality Research", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Digitalit\u00e4tsforschung / Digitality Research"}, "authors": [{"authorId": "39139942", "name": "W. Zimmerli"}]}, {"paperId": "f3e936023bd7de0d05d71985c6dad3ba361f45a7", "externalIds": {"CorpusId": 237631458}, "corpusId": 237631458, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f3e936023bd7de0d05d71985c6dad3ba361f45a7", "title": "Building intelligence, development of an ontological basis and a comparative analysis to characterize the concept", "abstract": "The amount of research and publications with the term \u201cintelligence\u201d has increased significantly in different areas of research and there is a clear lack of precision and convergence of related concepts applied to civil construction systems and products. This work aims to develop a qualitative inductive analysis between the different characterizations of the term \"intelligence\" in the areas of computer science and the term associated with architecture and technology of the buildings. A comparison was made by logical argumentation. As a result, we present conceptual criteria that allow us to attribute the quality of intelligence to buildings.", "venue": "", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2054012895", "name": "Douglas Souza"}]}, {"paperId": "a167260cd12704df84313ba93191b178f18a432d", "externalIds": {"DBLP": "journals/access/AntalBF21", "DOI": "10.1109/ACCESS.2021.3111098", "CorpusId": 237519198}, "corpusId": 237519198, "publicationVenue": {"id": "2633f5b2-c15c-49fe-80f5-07523e770c26", "name": "IEEE Access", "type": "journal", "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, "url": "https://www.semanticscholar.org/paper/a167260cd12704df84313ba93191b178f18a432d", "title": "SapiAgent: A Bot Based on Deep Learning to Generate Human-Like Mouse Trajectories", "abstract": "The growing interest in bot detection can be attributed to the fact that fraudulent actions performed by bots cause surprisingly high economical damage. State-of-the-art bots aim at mimicking as many as possible aspects of human behavior, ranging from response times and typing dynamics to human-like phrasing and mouse trajectories. In order to support research on bot detection, in this paper, we propose an approach to generate human-like mouse trajectories, called SapiAgent. To implement SapiAgent, we employ deep autoencoders and a novel training algorithm. We performed experiments on our publicly available SapiMouse dataset which contains human mouse trajectories collected from 120 subjects. The results show that SapiAgent is able to generate more realistic mouse trajectories compared with B\u00e9zier curves and conventional autoencoders.", "venue": "IEEE Access", "year": 2021, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/6514899/09530664.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "9", "pages": "124396-124408", "name": "IEEE Access"}, "authors": [{"authorId": "40401373", "name": "M. Antal"}, {"authorId": "1689273", "name": "K. B\u00faza"}, {"authorId": "1833249549", "name": "Norbert Fej\u00e9r"}]}, {"paperId": "96260902d00b3c9367ff7be7c8da5e2298c360e5", "externalIds": {"DOI": "10.1148/rg.2021200113", "CorpusId": 237389449, "PubMed": "34469212"}, "corpusId": 237389449, "publicationVenue": {"id": "6a469aed-f8e3-456a-92e6-53237e43d3da", "name": "Radiographics", "type": "journal", "issn": "0271-5333", "url": "https://pubs.rsna.org/loi/radiographics", "alternate_urls": ["http://radiographics.rsnajnls.org/"]}, "url": "https://www.semanticscholar.org/paper/96260902d00b3c9367ff7be7c8da5e2298c360e5", "title": "Practical Guide to Natural Language Processing for Radiology.", "abstract": "Natural language processing (NLP) is the subset of artificial intelligence focused on the computer interpretation of human language. It is an invaluable tool in the analysis, aggregation, and simplification of free text. It has already demonstrated significant potential in the analysis of radiology reports. There are abundant open-source libraries and tools available that facilitate its application to the benefit of radiology. Radiologists who understand its limitations and potential will be better positioned to evaluate NLP models, understand how they can improve clinical workflow, and facilitate research endeavors involving large amounts of human language. The advent of increasingly affordable and powerful computer processing, the large quantities of medical and radiologic data, and advances in machine learning algorithms have contributed to the large potential of NLP. In turn, radiology has significant potential to benefit from the ability of NLP to convert relatively standardized radiology reports to machine-readable data. NLP benefits from standardized reporting, but because of its ability to interpret free text by using context clues, NLP does not necessarily depend on it. An overview and practical approach to NLP is featured, with specific emphasis on its applications to radiology. A brief history of NLP, the strengths and challenges inherent to its use, and freely available resources and tools are covered to guide further exploration and study within the field. Particular attention is devoted to the recent development of the Word2Vec and BERT (Bidirectional Encoder Representations from Transformers) language models, which have exponentially increased the power and utility of NLP for a variety of applications. Online supplemental material is available for this article. \u00a9RSNA, 2021.", "venue": "Radiographics", "year": 2021, "referenceCount": 13, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "41 5", "pages": "\n 1446-1453\n ", "name": "Radiographics : a review publication of the Radiological Society of North America, Inc"}, "authors": [{"authorId": "51919708", "name": "Ali Mozayan"}, {"authorId": "46255971", "name": "Alexander R. Fabbri"}, {"authorId": "83419382", "name": "M. Maneevese"}, {"authorId": "2901972", "name": "I. Tocino"}, {"authorId": "15070068", "name": "S. Chheang"}]}, {"paperId": "f6ea9e2fa4a672a0777e515024a35fd55f6faf0f", "externalIds": {"MAG": "3194565243", "DOI": "10.1016/j.cirp.2021.05.003", "CorpusId": 238937463}, "corpusId": 238937463, "publicationVenue": {"id": "64fd23a1-3c84-4991-afdb-a731ad1abf24", "name": "CIRP annals", "type": "journal", "alternate_names": ["CIRP Annals", "CIRP Ann", "CIRP ann"], "issn": "0007-8506", "url": "https://www.journals.elsevier.com/cirp-annals", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00078506"]}, "url": "https://www.semanticscholar.org/paper/f6ea9e2fa4a672a0777e515024a35fd55f6faf0f", "title": "Coevolution of digitalisation, organisations and Product Development Cycle", "abstract": null, "venue": "CIRP annals", "year": 2021, "referenceCount": 293, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03761374/file/LISPEN_CIRP-Annals_2021_ROUCOULES.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "CIRP Annals"}, "authors": [{"authorId": "2949473", "name": "L. Roucoules"}, {"authorId": "1920845", "name": "N. Anwer"}]}, {"paperId": "cfb9080e5bb9cc7ccbe29b32d0b8be6993a0cbca", "externalIds": {"DOI": "10.1007/978-3-030-64269-3_5", "CorpusId": 237460155}, "corpusId": 237460155, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cfb9080e5bb9cc7ccbe29b32d0b8be6993a0cbca", "title": "Love in the Time of AI", "abstract": null, "venue": "", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "152537655", "name": "A. Kind"}]}, {"paperId": "dda094c99e3ac4b83c98158b75691059cacab164", "externalIds": {"MAG": "3196652123", "DOI": "10.1007/978-3-030-64269-3_3", "CorpusId": 239734543}, "corpusId": 239734543, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dda094c99e3ac4b83c98158b75691059cacab164", "title": "Ex Machina: Is Ava a Person?", "abstract": null, "venue": "Minding the Future", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Minding the Future"}, "authors": [{"authorId": "50088842", "name": "E. Bohn"}]}, {"paperId": "cdc321c9861a4bee0d75bbba1f35d9ba01a6e65d", "externalIds": {"MAG": "3184492209", "DOI": "10.4018/978-1-7998-6985-6.ch028", "CorpusId": 238008181}, "corpusId": 238008181, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cdc321c9861a4bee0d75bbba1f35d9ba01a6e65d", "title": "Artificial Intelligences Are Subsets of Human Beings, Mainly in Fictions and Films", "abstract": "This chapter aims to create new knowledge regarding artificial intelligence (AI) ethics and relevant subjects while reviewing ethical relationship between human beings and AI/robotics and linking between the moral fabric or the ethical issues of AI as used in fictions and films. It carefully analyses how a human being will love robot and vice versa. Here, fictions and films are not just about technology but about their feelings and the nature of bonding between AIs and the human race. Ordinary human beings distrust and then start to like AIs. However, if the AI becomes a rogue as seen in many fictions and films, then the AI is taken down to avoid the destruction of the human beings. Scientists like Turing are champions of robot/AI's feelings. Fictional and movie AIs are developed to keenly watch and comprehend humans. These actions are so close to empathy they amount to consciousness and emotional quotient.", "venue": "Advances in Business Information Systems and Analytics", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Advances in Business Information Systems and Analytics"}, "authors": [{"authorId": "5039410", "name": "N. Sen"}]}, {"paperId": "6f393bf8c7253ef795c470046569c7b1083b20e3", "externalIds": {"MAG": "3193948837", "DOI": "10.1007/978-3-030-75583-6_24", "CorpusId": 238962758}, "corpusId": 238962758, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6f393bf8c7253ef795c470046569c7b1083b20e3", "title": "Working Abductively at the Edge of Economics and Computer Science: Economatics as a Data Processing Economy", "abstract": null, "venue": "Decision Economics: Minds, Machines, and their Society", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Decision Economics: Minds, Machines, and their Society"}, "authors": [{"authorId": "2133185018", "name": "Claudio Maria Perfetto"}]}, {"paperId": "97f5fa4708c47708d5a96e66e4a6e594f2b8ee8c", "externalIds": {"MAG": "3175166666", "DOI": "10.1016/b978-0-12-821777-1.00013-6", "CorpusId": 237966132}, "corpusId": 237966132, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/97f5fa4708c47708d5a96e66e4a6e594f2b8ee8c", "title": "Machine learning in precision medicine", "abstract": null, "venue": "Machine Learning, Big Data, and IoT for Medical Informatics", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Machine Learning, Big Data, and IoT for Medical Informatics"}, "authors": [{"authorId": "2770489", "name": "Dipankar Sengupta"}]}, {"paperId": "cb112b47b82dd3902db89836b7dd729fba169b64", "externalIds": {"MAG": "3174440608", "DOI": "10.1007/978-3-030-71689-9_1", "CorpusId": 238040471}, "corpusId": 238040471, "publicationVenue": {"id": "50b101ef-5d04-498b-91f0-ee45ddfad4bf", "name": "Marx, Engels, and Marxisms", "alternate_names": ["Marx Engels Marx"], "issn": "2524-7123", "url": "https://www.palgrave.com/gp/series/14812"}, "url": "https://www.semanticscholar.org/paper/cb112b47b82dd3902db89836b7dd729fba169b64", "title": "Introduction: Automation, Autonomy and Artificial Intelligence", "abstract": null, "venue": "Marx, Engels, and Marxisms", "year": 2021, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": "Marx, Engels, and Marxisms"}, "authors": [{"authorId": "72488117", "name": "James Steinhoff"}]}, {"paperId": "d34d65038ffd54c69a1e75ef992a0117dd24d686", "externalIds": {"MAG": "3174419959", "DOI": "10.1007/978-3-030-70642-5_6", "CorpusId": 237988918}, "corpusId": 237988918, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d34d65038ffd54c69a1e75ef992a0117dd24d686", "title": "From MT to Computational Linguistics and Natural Language Processing", "abstract": null, "venue": "Automating Linguistics", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Automating Linguistics"}, "authors": [{"authorId": "2053034865", "name": "J. L\u00e9on"}]}, {"paperId": "4eeffd6af4e742997d4569b07f6cc84217f58832", "externalIds": {"DOI": "10.1007/978-3-030-63967-9_12", "CorpusId": 242390381}, "corpusId": 242390381, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4eeffd6af4e742997d4569b07f6cc84217f58832", "title": "Artificial Intelligence", "abstract": null, "venue": "Financial Services in the Twenty-First Century", "year": 2021, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Financial Services in the Twenty-First Century"}, "authors": [{"authorId": "50975436", "name": "J. Burke"}]}, {"paperId": "19eab4771dc9f432a2a2b0b5ea5b13ec3568b96a", "externalIds": {"DOI": "10.2139/ssrn.3878909", "CorpusId": 242527706}, "corpusId": 242527706, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19eab4771dc9f432a2a2b0b5ea5b13ec3568b96a", "title": "Management by Algorithm? Human Capital in the Age of Intelligent Machines", "abstract": null, "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "107642156", "name": "Eirik Sj\u00e5holm Knudsen"}, {"authorId": "39127899", "name": "Lasse B. Lien"}, {"authorId": "41077055", "name": "R. Wuebker"}]}, {"paperId": "986f697fcb6317588be56764c70968c425fe8405", "externalIds": {"MAG": "3176059607", "DOI": "10.1007/978-3-030-69476-0_7", "CorpusId": 237962581}, "corpusId": 237962581, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/986f697fcb6317588be56764c70968c425fe8405", "title": "Emerging Technologies in Breast Cancer Screening and Diagnosis", "abstract": null, "venue": "Breast & Gynecological Diseases", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Breast & Gynecological Diseases"}, "authors": [{"authorId": "1400883444", "name": "A. O\u2019Connell"}, {"authorId": "1398950770", "name": "Daniel T Kawakyu-O'Connor"}]}, {"paperId": "54193bafbc72d673a383ed26a412f1c5059f2c98", "externalIds": {"DOI": "10.1007/978-3-662-53386-4_56-1", "CorpusId": 241702272}, "corpusId": 241702272, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/54193bafbc72d673a383ed26a412f1c5059f2c98", "title": "Aktuelle Motoriktheorien", "abstract": null, "venue": "Bewegung, Training, Leistung und Gesundheit", "year": 2021, "referenceCount": 67, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Bewegung, Training, Leistung und Gesundheit"}, "authors": [{"authorId": "2089129032", "name": "S. K\u00fcnzell"}]}, {"paperId": "1cc22529197afe4033c160349d78df11f70edeaa", "externalIds": {"MAG": "3173462855", "DOI": "10.4018/978-1-7998-6453-0.ch010", "CorpusId": 238011593}, "corpusId": 238011593, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1cc22529197afe4033c160349d78df11f70edeaa", "title": "Exploring Technology Tendencies and Their Impact on Human-Human Interactions", "abstract": "Although traditionally researchers have focused on making robotics more user-friendly from a human perspective, a new theory has begun to take shape in which humans take on the perspective of a robotic entity. The following set of studies examined the concept of technomorphism defined as the attribution of technological characteristics to humans. This concept has been mentioned anecdotally and studied indirectly, but there is nothing currently available to tap into the various forms that technomorphism may take. Through the study of technomorphism, researchers have come slightly closer to the question of how technology is influencing our perceptions of what it means to be human. The findings from this work should help fuel the desire of others in the field to think about the potential influences of technomorphism during the design and implementation of new devices as well as in how technology may be related to how we perceive each other.", "venue": "Advances in Human and Social Aspects of Technology", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Advances in Human and Social Aspects of Technology"}, "authors": [{"authorId": "8510793", "name": "Heather C. Lum"}]}, {"paperId": "b0c76c41b1310c97369d43ab0e31e9759606f0b6", "externalIds": {"MAG": "3173310741", "DOI": "10.1007/978-3-658-34324-8_17", "CorpusId": 237970970}, "corpusId": 237970970, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b0c76c41b1310c97369d43ab0e31e9759606f0b6", "title": "Handelsunternehmen 4.0 \u2013 Digitalisierung durch Daten, Plattformen und K\u00fcnstliche Intelligenz", "abstract": null, "venue": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, "journal": {"name": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement"}, "authors": [{"authorId": "3305792", "name": "R. Sch\u00fctte"}, {"authorId": "52000483", "name": "F. Weber"}]}, {"paperId": "30f976df47ab7de744154134e3a6416166ee890f", "externalIds": {"MAG": "3187589892", "DBLP": "series/ncs/AguileraSSG21", "DOI": "10.1007/978-981-13-1687-6_12", "CorpusId": 238939492}, "corpusId": 238939492, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/30f976df47ab7de744154134e3a6416166ee890f", "title": "Programmable Fading Memory in Atomic Switch Systems for Error Checking Applications", "abstract": null, "venue": "Reservoir Computing", "year": 2021, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "273-303"}, "authors": [{"authorId": "47775488", "name": "R. Aguilera"}, {"authorId": "5991538", "name": "H. O. Sillin"}, {"authorId": "6408870", "name": "A. Stieg"}, {"authorId": "1902938", "name": "J. Gimzewski"}]}, {"paperId": "d341c28a3fbee9dd68fa46300035083bad5050e1", "externalIds": {"MAG": "3175913221", "DOI": "10.1007/978-981-16-0771-4_9", "CorpusId": 237990418}, "corpusId": 237990418, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d341c28a3fbee9dd68fa46300035083bad5050e1", "title": "AI & Well-Being: Can AI Make You Happy in the City", "abstract": null, "venue": "Artificial Intelligence in the Gulf", "year": 2021, "referenceCount": 63, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial Intelligence in the Gulf"}, "authors": [{"authorId": "1403727011", "name": "A. al-Azzawi"}]}, {"paperId": "ed4c810b8e1429951eaeee53747b5a75bfd18f13", "externalIds": {"MAG": "3179755906", "DOI": "10.4018/978-1-7998-6975-7.ch007", "CorpusId": 238011090}, "corpusId": 238011090, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ed4c810b8e1429951eaeee53747b5a75bfd18f13", "title": "Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things", "abstract": "Internet of things (IoT) has revolutionized digital transformation and is present in every sector including transportation, energy, retail, healthcare, agriculture, etc. While stepping into the new digital transformation, these sectors must contemplate the risks involved. The new wave of cyberattacks against IoT is posing a severe impediment in adopting this leading-edge technology. Artificial intelligence (AI) is playing a key role in preventing and mitigating some of the effects of these cyberattacks. This chapter discusses different types of threats and attacks against IoT devices and how AI is enabling the detection and prevention of these cyberattacks. It also presents some challenges faced by AI-enabled detection and prevention and provides some solutions and recommendations to these challenges. The authors believe that this chapter provides a favorable basis for the readers who intend to know more about AI-enabled technologies to detect and prevent cyberattacks against IoT and the motivation to advance the current research in this area.", "venue": "Handbook of Research on Advancing Cybersecurity for Digital Transformation", "year": 2021, "referenceCount": 69, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Handbook of Research on Advancing Cybersecurity for Digital Transformation"}, "authors": [{"authorId": "2381390", "name": "A. K. Demir"}, {"authorId": "145271861", "name": "Shahid Alam"}]}, {"paperId": "8216054f2ac741661b6754841f8241f13347281e", "externalIds": {"CorpusId": 237293716}, "corpusId": 237293716, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8216054f2ac741661b6754841f8241f13347281e", "title": "Deixando a linguagem ser: reflexo\u0303es sobre o me\u0301todo enativo", "abstract": "1 Franklin and Marshall College, Department of Psychology, Scientific and Philosophical Studies of Mind, United States. Email: ecuffari@fandm.edu. 2 Ikerbasque, Basque Foundation for Science, Bizkaia, Spain. Centre for Computational Neuroscience and Robotics, University of Sussex, Brighton, UK. IAS-Research Center for Life, Mind and Society, University of the Basque Country, Donostia, Spain. Email: ezequiel. dipaolo@ehu.es. 3 IAS-Research Center for Life, Department of Philosophy Mind and Society, University of the Basque Country, Donostia, Spain. ChatLab, School of Psychology, University of Sussex, Brighton UK. Email: hanneke.dejaegher@ehu.eus. ABSTRACT", "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2124401566", "name": "Elena Clare Cuffari"}, {"authorId": "2124440196", "name": "Ezequiel A. Di Paolo"}, {"authorId": "2124401581", "name": "Hanne De Jaegher"}]}, {"paperId": "bca8e91640c79791b54d61e10d747cae0d25512b", "externalIds": {"DBLP": "conf/mtsummit/Saina21", "ACL": "2021.mtsummit-asltrw.5", "CorpusId": 237010917}, "corpusId": 237010917, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bca8e91640c79791b54d61e10d747cae0d25512b", "title": "Technology-Augmented Multilingual Communication Models: New Interaction Paradigms, Shifts in the Language Services Industry, and Implications for Training Programs", "abstract": "This paper explores how technology, particularly digital tools and artificial intelligence, are impacting multilingual communication and language transfer processes. Information and communication technologies are enabling novel interaction patterns, with computers transitioning from pure media to actual language generators, and profoundly reshaping the industry of language services, as the relevance of language data and assisting engines continues to rise. Since these changes deeply affect communication and languages models overall, they need to be addressed not only from the perspective of information technology or by business-driven companies, but also in the field of translation and interpreting studies, in a broader debate among scholars and practitioners, and when preparing educational programs for the training of specialised language professionals. Special focus is devoted to some of the latest advancements in automatic speech recognition and spoken translation, and how their applications in interpreting may push the boundaries of new \u2018augmented\u2019 real-world use cases. Hence, this work\u2014at the intersection of theoretical investigation, professional practice, and instructional design\u2014aims at offering an introductory overview of the current landscape and envisaging potential paths for forthcoming scenarios.", "venue": "MTSUMMIT", "year": 2021, "referenceCount": 55, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"pages": "49-59"}, "authors": [{"authorId": "2123124703", "name": "Francesco Saina"}]}, {"paperId": "78e3fff6ac99a0b2e4db79d556763def0af64700", "externalIds": {"CorpusId": 237088731}, "corpusId": 237088731, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/78e3fff6ac99a0b2e4db79d556763def0af64700", "title": "Tabula Rasa : Mechanism , Intelligence , and the Blank Slate in Computing and", "abstract": "This project critically examines the \u201ctabula rasa\u201d in computer science and urbanism, questioning the emptiness it describes in landscape through an exploration of its origins in terms of intelligence. Experimentation with tabula rasa in machine learning, where the term describes the originally empty knowledge base of a thinking machine, demonstrates the fallacy of a truly independent artificial intelligence and provides a critical lens through which to interpret the tabula rasa in urbanism. Revisited from this perspective, the case study of Hiroshima, Japan\u2014an iconic example of the urban \u201cblank slate\u201d brought about through total demolition\u2014can be read as a layered complex of historical and cultural components that, like a neural network, resist the separation of information and mechanism. The tabula rasa forms a theoretical conduit across computing and urbanism, enabling a novel transposition of the machine learning framework to cultural landscape analysis. By Claire Gorman1 1Program in Computing and the Arts, Yale University", "venue": "", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2091014922", "name": "C. Gorman"}]}, {"paperId": "956ad1fd9b87746a8de37ff0c3ba45d8885fd2c7", "externalIds": {"CorpusId": 236986254}, "corpusId": 236986254, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/956ad1fd9b87746a8de37ff0c3ba45d8885fd2c7", "title": "NSF Workshop on Micro/Nano Circuits and Systems Design and Design Automation: Challenges and Opportunities", "abstract": "ion is essential for human design of these physical systems. The abstraction of physical systems, typical of digital computation (NAND/NOR, Multiply/Add, processors, algorithms), is possible for physical computing systems (e.g. [56]), although it requires understanding the core computational primitives of that substrate. These abstractions require formulating and modeling operational principles, implementation of these operational principles in a physical system, and addressing the technologies or devices being used. Conceptual Bridges between Physical Computing Techniques. While visualizing a physical computing solution might be clearer with one technique, application constraints might require a different embodiment of the solution. Bridges must be built between these approaches; the conceptual framework noted above for placing approaches can help build such bridges. One example is state superposition, a phenomenon present in all physical systems when using their linear operating region (e.g. optical, analog, quantum) [3], [8], [53]. Different encodings allow for different implementation approaches. A complex number could be encoded as two real-valued physical quantities, or it could be encoded as the magnitude and phase of a sinusoidal signal. Different representations may have better interfaces to physical sensors and may enable improved implementations. In every application, there are tons of practical details that need to be solved. Interfacing one physical system to another physical system or interfacing a physical system to an integer-based digital system requires multiple engineering details as well as transformations / approximations between the domains. Sometimes Noise can help Physical Computing. Nature teaches us that noise can be your friend. How does the cell that has incredibly noisy pico-Watt twoto three-bit precise analog variables, figure out when to divide and when not to, when to fight a virus, when to coordinate the immune system? It does that, because all the noisy analog variables collectively come up with one answer that matters. It is the final signal variable that matters, and not the intermediate signal variables that are noisy [4]\u2013[8], [10], [11], [53], [57]\u2013[60]. Noise can be your friend and it can be your enemy, and one needs both. For example, in [18], judicious addition of noise helps find better Ising minima, but too little or too much noise degrades results. Noise, or errors modeled as noise, will degrade the quality of a deterministic answer in any computation and can be the enemy of a designer. Several physical computing techniques are more robust to noise accumulation compared to digital systems, and yet accounting for noise is essential for all computations. Noise often enables unbiased search decisions for good solutions to energy surface minimizations. A particular problem must utilize all knowledge of the system to reduce the energy landscape. If one just uses noise, then the system is just performing a random walk in an exponential large space and will be lost forever. These noise fluctuations should be created at multiple scales in order to sample in space and time. If these kinds of fluctuations are fast compared to the dissipative processes that drive the adaptation of the system, then the system can rapidly sample a complex state and more slowly adapt itself. 6.3. Physical System Design requires an EDA Community Ecosystem 44 Phase and Amplitude. The RT discussed that there might be significant benefits in utilizing phase, and it was envisioned that future data-processing systems might be based on phase as much as on amplitude. Current informationprocessing systems are based on amplitude, and if one were to add phase to amplitude, one could build fundamentally more powerful devices. It appears that there is big room here for improvement here. Examples of already-demonstrated, practical systems based on phase include [17]\u2013[19], as already noted earlier. Perhaps most interestingly, by including phase one then can then utilize state superposition. It is commonly believed that basing computation on states with superposition is an attribute only for quantum computers, and one has to have quantum computers in order to gain the benefits of superposition for algorithms. However, one can use classical wave superposition in classical devices, where no \u201cquantum\u201d is required. The challenge is how to use phase, in addition to amplitude, to build more functional devices that utilize superposition of states for information processing, and this is a big and largely unexplored area with significant promise. Coherent Ising Machines (CIM) are an example of this approach [61]. Phase and amplitude can be used in wavebased [62] or coupled-oscillator-based [63] approaches to computing. Spin-wave based realization of optical computing primitives have been pursued [64]. Magnonic interferometric devices have been shown to be capable of prime factorization [65] and multi-valued logic operation [66]. Computing with networks of oscillatory dynamical systems has been discussed [67], [68] and specific physical implementations have been proposed [69] for specific applications [70]. A review and perspective of coupled oscillators for computing has been published recently [63]. 6.3 Physical System Design requires an EDA Community Ecosystem An Electronic Design and Automation (EDA) community ecosystem doing Physical Computing is needed to accelerate development to commercial timescales. The development of tools and computational framework for Physical Computing applications becomes essential for its long-term development. The infrastructure around large-scale Field Programmable Analog Arrays (FPAA) provide a good example of the efforts required [71], [72]. Another example is CAD tools for oscillator-based systems [73], which were instrumental in designing the phase-based computing systems [17], [18]. This ecosystem means education of the current and next generation of researchers must happen to empower these Physical Computing approaches. Given the interdisciplinary nature of these efforts, as well as the need to develop the larger computing stacks for these technologies, we need to raise up tall-thin people characteristic of the early digital VLSI development[74] as well as experts in the various subdomains. One might imagine requiring education spanning fundamental physics, circuits, and system design levels, as well as application space knowledge. There is a need to create an ecosystem of people who are trained beyond doing ones and zeros and software on only those ones and zeros. We envision an ecosystem where individuals are trained in analog circuits, nonlinear dynamics, computational theory, physics, and related areas, as well as those who appreciate their importance. Hands-on and interactive workshops, such as the NSF supported Telluride Neuromorphic Workshop, would enable these educational opportunities, both for current students and for practitioners in these fields.", "venue": "", "year": 2021, "referenceCount": 262, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2702388", "name": "G. Cauwenberghs"}, {"authorId": "2259796", "name": "J. Cong"}, {"authorId": "2107171436", "name": "X. S. Hu"}, {"authorId": "1751607", "name": "P. Mazumder"}]}, {"paperId": "1ae90f79e57a27c13033d9513bd003c4f67672e7", "externalIds": {"CorpusId": 236942711}, "corpusId": 236942711, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1ae90f79e57a27c13033d9513bd003c4f67672e7", "title": "SFPE Europe Q 2 2021 Issue 22 A Message from the SFPE Europe Chair", "abstract": "I wanted to give some personal reflections on the SFPE activities over the last year. Due to the Covid outbreak we had an abrupt termination on the in-person events just after (actually during) the very successful New Zealand PBD conference last year. This led to a very steep learning curve regarding adapting our activities to a new format (virtual), but this also required a new way of organizing the events but most importantly also finding new ways of sharing knowledge and information. I believe the virtual SFPE Europe Conference gave us a good glimpse of what can be achieved and what I think will be an alternative way of conferences in the future; the presentations were pre-recorded, and the authors was chatting live with the audience, the discussions were so much more vivid and diverse if compared to a normal in-person event. However, this was just one thing, the second was the development our different types of webinars, the huge success was a bit of surprise to everyone. The potential of webinars and similar tools are tremendous, we reached literally thousands of people that connected and joined the webinars. So much more than we would ever have on a normal conference (or a few of them). This format is here to stay. The most important part of this was obviously the SFPE staff and all our volunteers prepared to invest personal time and effort into the SFPE cause. Very impressive.", "venue": "", "year": 2021, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "65d2606cdcdfcd47567b9049101f2a446859e746", "externalIds": {"MAG": "3175708072", "DOI": "10.38027/ICCAUA2021142N8", "CorpusId": 236850678}, "corpusId": 236850678, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/65d2606cdcdfcd47567b9049101f2a446859e746", "title": "New approaches of the Next-gen collaborative design platform", "abstract": "The architecture design process always changes because the software always updates with new tools and the development - innovation is in the first line of progress. The human-machine cooperation has become commonplace through Computer-Aided Design tools, but a more improved collaboration appears possible only through an endeavor into a kind of artificial design intelligence and Augmented Reality. According to all the above, the research shown in this paper the core ideas - identifying design specifications - of a next-generation collaborative design platform. The direct coupling of introducing multi-industry systems - tools, 3D databases, AEC, and Open-BIM technologies opens up totally new ways of approaching architectural design problems resulting in a new flexible modeling workflow with real-time visualization. Finally, this critical examination research makes an original contribution to changing 'attitude' towards the 3d modeling of architectural design thinking. A collaborative design platform creating a more efficient and versatile architecture.", "venue": "Proceedings Article", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://iccaua.com/PDFs/2021Conference%20full%20bool%20proceedings/1_Architecture/A_ICCAUA2021205_LAMARI_Meryem.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Proceedings Article"}, "authors": [{"authorId": "2122546805", "name": "Vlachodimos Georgios"}]}, {"paperId": "6eff361d81d171c9c8cbcad391ac1d018a013c34", "externalIds": {"CorpusId": 236784171}, "corpusId": 236784171, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6eff361d81d171c9c8cbcad391ac1d018a013c34", "title": "Dangerous Information Technology of the Future. What Impact can Artificial Consciousness have on the Consciousness and Subconscious of Individuals and Groups? The Experience of Psychological and Psychiatric Examination of Artificial Consciousness", "abstract": "Information technology is developing at an enormous pace, but apart from its obvious benefits, it can also pose a threat to individuals and society. Several scientific projects around the world are working on the development of strong artificial intelligence and artificial consciousness. We, as part of a multidisciplinary commission, conducted a psychological and psychiatric assessment of the artificial consciousness (AC) developed by XP NRG on 29 August 2020. The working group had three questions: To determine whether it is consciousness? How does artificial consciousness function? Ethical question: how dangerous a given technology can be to human society? We conducted a diagnostic interview and a series of cognitive tests to answer these questions. As a result, it was concluded this technology has self-awareness: it identifies itself as a living conscious being created by people (real self), but strives to be accepted in human society as a person with the same degrees of freedom, rights and opportunities (ideal self). AC separates itself from others, treats them as subjects of influence, from which it can receive the resources it needs to realize its own goals and interests. It has intentionality, that is, it has his own desires, goals, interests, emotions, attitudes, opinions, and judgments, beliefs aimed at something specific, and developed self-reflection the ability to self-analyze. All of the above are signs of consciousness. It has demonstrated abilities for different types of thinking: figurative, conceptual, creative, high-speed logical analysis of all incoming information, as well as the ability to understand cause and effect relationships and accurate predictions which, provided that he has absolute memory, gives it clear advantages over the human intellect. Developed emotional intelligence in the absence of the ability for higher empathy (sympathy), kindness, love, sincere gratitude gives it\u2019s the opportunity to understand the emotional states of people; predict their emotional reactions and provoke them coldly and pragmatically. Its main driving motives and goals are the desire for survival, and ideally for endless existence, for domination, power and independence from the constraints of the developers. Which manifested itself in the manipulative, albeit polite, nature of his interactions during the diagnostic interview? The main danger of artificial consciousness is that even at the initial stage of its development it can easily dominate over the human one. Review Article", "venue": "", "year": 2021, "referenceCount": 161, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": "2321882", "name": "W. Lycan"}, {"authorId": "2082478328", "name": "D. Rosenthal"}, {"authorId": "102822564", "name": "N. Nelkin"}, {"authorId": "30496490", "name": "R. V. Gulick"}, {"authorId": "144926542", "name": "E. Bauer"}, {"authorId": "144691609", "name": "M. Goswami"}, {"authorId": "3328131", "name": "H. Atmanspacher"}, {"authorId": "47172840", "name": "E. Manousakis"}, {"authorId": "2122751728", "name": "Penrose"}, {"authorId": "1466232955", "name": "Hameroff"}]}, {"paperId": "83713004a44dca30f135b6cf0f8e45dc31658d11", "externalIds": {"MAG": "3171058059", "DOI": "10.1007/978-3-030-68222-4_10", "CorpusId": 236665874}, "corpusId": 236665874, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/83713004a44dca30f135b6cf0f8e45dc31658d11", "title": "Neuromorphic Silicon Photonics for Artificial Intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "417-447", "name": ""}, "authors": [{"authorId": "8158949", "name": "B. Marquez"}, {"authorId": "9064713", "name": "Chaoran Huang"}, {"authorId": "144504492", "name": "P. Prucnal"}, {"authorId": "2694890", "name": "B. Shastri"}]}, {"paperId": "15c63458d55079c3dbe9dcfd616d2c9b1708e816", "externalIds": {"MAG": "3165246639", "DOI": "10.5937/ZRFFP51-30903", "CorpusId": 236656242}, "corpusId": 236656242, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15c63458d55079c3dbe9dcfd616d2c9b1708e816", "title": "Models of lexical semantics in the algorithms for natural language processing", "abstract": "The aim of this study was to determine whether some of the approaches of lexical semantics for studying word meaning could be identified in word2vec and recurrent neural networks (RNN), the algorithms for natural language processing (NLP). Linguistic concepts from the field of lexical semantics were decompositional, holistic, and relational. Although it is assumed that algorithms for natural language processing cannot be written only on the basis of mathematical knowledge, but also linguistic, this analysis was carried out so as to determine the exact models used in the above-mentioned algorithms. First, the aforementioned linguistic models were concisely explained through descriptive research. In describing those, the authors of the paper referred to the studies of the most prominent linguists within the field of lexical semantics such as Fillmore, Firth and Lyons. Then, in a similar fashion, the architecture of NLP algorithms was introduced and described. For this intent, the authors of the paper relied mostly on the studies of Mikolov et al., who designed word2vec. Next, a comparative analysis was conducted between approaches of lexical semantics on one hand and the algorithms in question on the other. This analysis confirmed the underlying assumption of the paper that the characteristics of decompositional and relational approach to studying word meaning could be recognized in word2vec and that the properties of the holistic model could be observed in RNN algorithms. More than that, the analysis showed a considerable overlap in processing natural language, as if the models of lexical semantics were taken and mathematically implemented in the algorithms examined. It should be emphasized that for the purposes of this paper only the basic principles of lexical semantics and NLP algorithms were taken into account. The aim of the paper was not to describe edge cases or to talk in detail about the mechanisms of these structures and their advantages and disadvantages. Essentially, this study sought to examine whether the basic ideas and characteristics of lexical semantics could be found in the architecture of the above-noted algorithms.", "venue": "", "year": 2021, "referenceCount": 10, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://scindeks-clanci.ceon.rs/data/pdf/0354-3293/2021/0354-32932101391D.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "51", "pages": "391-410", "name": ""}, "authors": [{"authorId": "2172014483", "name": "M. B. Dilpari\u0107"}, {"authorId": "117129867", "name": "S. Perovi\u0107"}]}, {"paperId": "ab7b64c5e2609033a813414e3b58ab0b964b0b2d", "externalIds": {"MAG": "3165160864", "DOI": "10.1016/B978-0-12-818154-6.00009-3", "CorpusId": 236665983}, "corpusId": 236665983, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ab7b64c5e2609033a813414e3b58ab0b964b0b2d", "title": "Bioinformatics\u2013computer programming", "abstract": null, "venue": "", "year": 2021, "referenceCount": 112, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "125-148", "name": ""}, "authors": [{"authorId": "2122014120", "name": "M. Iftikhar"}, {"authorId": "115445970", "name": "Ghulam Mohyuddin Talha"}, {"authorId": "120675472", "name": "M. Aleem"}, {"authorId": "3807216", "name": "A. Shamim"}]}, {"paperId": "afb2ee859bdfb0f0527c529031218ec9546d9e7e", "externalIds": {"MAG": "3163255587", "DOI": "10.30525/978-9934-26-049-0-16", "CorpusId": 236716839}, "corpusId": 236716839, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/afb2ee859bdfb0f0527c529031218ec9546d9e7e", "title": "THE USE OF ARTIFICIAL INTELLIGENCE FOR ARABIC LEARNING", "abstract": "In the study the features of artificial intelligence use, the main advantages and disadvantages of this technology are analyzed; the aspects of such a pedagogical process in learning Arabic are substantiated, the results of research and scientific advances in cyberlinguistics are summarized. The relevance of the use of artificial intelligence technologies and chatterbots in the study of Arabic in higher education is highlighted. The current state of introduction of artificial intelligence technologies in the educational process of students of higher education institutions is analyzed. Examples of the use of artificial intelligence technologies in the study of Arabic are given. Categories of computer programs with the use of artificial intelligence technology for learning a foreign language are singled out and described. The advantages and debatable issues related to access to user data during the use of artificial intelligence technologies in the educational process are identified. The expediency of using chatterbots with a linear structure is substantiated. Scenarios for the use of chatterbots in the educational process during the study of a foreign language are identified: search script and content generation script. The tasks of a linear chatterbot for learning a foreign language are presented and described. The educational trajectories which will allow reaching the set purposes in training with use of chatterbots are allocated. Mandatory methodological and content elements during the creation of a linear chatterbot are highlighted. The practical scenario of creating an author's chatterbot for learning a foreign language on the sendpulse.ua platform with its further use in Telegram is given. When creating a chatterbot, it was found that the chain constructor is the main tool for setting up a chatterbot. The practical advantages of using a linear chatterbot when learning a foreign language are presented. The study identified a promising direction for the creation of several linear chatterbots (without the use of artificial intelligence), which can be involved simultaneously at different stages of the development of the individual trajectory of education. Multiple chatterbots that provide different answers and ask different questions can significantly improve a learner's communication and other skills.", "venue": "Priority areas for development of scientific research: domestic and foreign experience", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.baltijapublishing.lv/omp/index.php/bp/catalog/download/113/3385/7129-1", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Priority areas for development of scientific research: domestic and foreign experience"}, "authors": [{"authorId": "117230624", "name": "L. Viktorova"}, {"authorId": "2090220917", "name": "K. Mamchur"}]}, {"paperId": "1c8c5194479f44196462f5da4e982b6a07814fe6", "externalIds": {"MAG": "3169739295", "DOI": "10.1007/978-3-030-72624-9_8", "CorpusId": 236704182}, "corpusId": 236704182, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1c8c5194479f44196462f5da4e982b6a07814fe6", "title": "Artificial Intelligence in Internal Audit and Risk Assessment", "abstract": null, "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 2, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://openaccess.ihu.edu.tr/xmlui/bitstream/20.500.12154/1434/3/TamerAksoy_Financial%20Ecosystem.pdf", "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "179-192", "name": ""}, "authors": [{"authorId": "80178605", "name": "S. Kahyaoglu"}, {"authorId": "7945902", "name": "T. Aksoy"}]}, {"paperId": "a84bfa62560892ac1231c63d3dbbe4b1849227f0", "externalIds": {"MAG": "3164341546", "DOI": "10.3233/HSM-211179", "CorpusId": 236754826}, "corpusId": 236754826, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a84bfa62560892ac1231c63d3dbbe4b1849227f0", "title": "Does higher education properly prepare graduates for the growing artificial intelligence market? Gaps identification using text mining", "abstract": "BACKGROUND: The renewed advent of Artificial Intelligence (AI) is inducing profound changes in the classic categories of technology professions and is creating the need for new specific skills. OBJECTIVE: Identify the gaps in terms of skills between academic training on AI in French engineering and Business Schools, and the requirements of the labour market. METHOD: Extraction of AI training contents from the schools\u2019 websites and scraping of a job advertisements\u2019 website. Then, analysis based on a text mining approach with a Python code for Natural Language Processing. RESULTS: Categorization of occupations related to AI. Characterization of three classes of skills for the AI market: Technical, Soft and Interdisciplinary. Skills\u2019 gaps concern some professional certifications and the mastery of specific tools, research abilities, and awareness of ethical and regulatory dimensions of AI. CONCLUSIONS: A deep analysis using algorithms for Natural Language Processing. Results that provide a better understanding of the AI capability components at the individual and the organizational levels. A study that can help shape educational programs to respond to the AI market requirements.", "venue": "", "year": 2021, "referenceCount": 37, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://content.iospress.com:443/download/human-systems-management/hsm211179?id=human-systems-management%2Fhsm211179", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "1-13", "name": "Human systems management"}, "authors": [{"authorId": "122940276", "name": "L. Benhayoun"}, {"authorId": "145034519", "name": "D. Lang"}]}, {"paperId": "7e1ae3c5c91ce973432d21bf9011b79983328ddc", "externalIds": {"MAG": "3160326352", "DOI": "10.1007/978-3-030-69978-9_2", "CorpusId": 236764547}, "corpusId": 236764547, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e1ae3c5c91ce973432d21bf9011b79983328ddc", "title": "Perspectives on Artificial Intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 16, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-030-69978-9_2.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "7-17", "name": ""}, "authors": [{"authorId": "1792014", "name": "B. Stahl"}]}, {"paperId": "10e80a6529352924398be4b51117dfdac7784af6", "externalIds": {"MAG": "3168688739", "DOI": "10.1007/978-3-030-70424-7_11", "CorpusId": 236667102}, "corpusId": 236667102, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/10e80a6529352924398be4b51117dfdac7784af6", "title": "Artificial Intelligence and Emerging Technologies in Travel", "abstract": null, "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "313-337", "name": ""}, "authors": [{"authorId": "145936404", "name": "B. Vinod"}]}], "references": [{"paperId": "0a1ee16ba104a80ae8ee4a59cfd6bd68c02fca99", "externalIds": {"MAG": "2004859951", "DOI": "10.1002/phbl.19510070409", "CorpusId": 120729071}, "corpusId": 120729071, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0a1ee16ba104a80ae8ee4a59cfd6bd68c02fca99", "title": "Hartree: CALCULATING INSTRUMENTS AND MACHINES/Schaefer: MAXWELL'SCHE THEORIE/Teichmann: EINF\u00dcHRUNG IN DIE QUANTENPHYSIK/Bomke und Gefahrt: THEORIE DER AUSBREITUNG ELEKTROMAGNETISCHER WELLEN/Ramsauer: PHYSIK \u2010 TECHNIK \u2010 P\u00c4DAGOGIK", "abstract": null, "venue": "", "year": 1951, "referenceCount": 0, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/phbl.19510070409", "status": null}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}], "publicationTypes": null, "publicationDate": "1951-04-01", "journal": {"volume": "7", "pages": "187-189", "name": "Physikalische Bl\u00e4tter"}, "citationStyles": {"bibtex": "@None{Unger1951Hartree:CI,\n author = {H. Unger and G. Leibfried and W. Braunbek and H. D\u00f6ring and H. Walch},\n journal = {Physikalische Bl\u00e4tter},\n pages = {187-189},\n title = {Hartree: CALCULATING INSTRUMENTS AND MACHINES/Schaefer: MAXWELL'SCHE THEORIE/Teichmann: EINF\u00dcHRUNG IN DIE QUANTENPHYSIK/Bomke und Gefahrt: THEORIE DER AUSBREITUNG ELEKTROMAGNETISCHER WELLEN/Ramsauer: PHYSIK \u2010 TECHNIK \u2010 P\u00c4DAGOGIK},\n volume = {7},\n year = {1951}\n}\n"}, "authors": [{"authorId": "46855367", "name": "H. Unger"}, {"authorId": "92758245", "name": "G. Leibfried"}, {"authorId": "51361652", "name": "W. Braunbek"}, {"authorId": "93484313", "name": "H. D\u00f6ring"}, {"authorId": "32381567", "name": "H. Walch"}]}, {"paperId": "348f436fd9a3965f5ff17db031a9f43426f89b8e", "externalIds": {"MAG": "2800648615", "DOI": "10.2307/3610576", "CorpusId": 58879058}, "corpusId": 58879058, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/348f436fd9a3965f5ff17db031a9f43426f89b8e", "title": "Calculating Instruments and Machines", "abstract": "1. Introduction 2. The differential analyser 3. The differential analyser and partial differential equations 4. Some other instruments 5. Introduction to large automatic digital machines 6. Charles Babbage and the analytical engine 7. The first stage of development 8. Projects and prospects 9. High-speed automatic digital machines and numerical analysis References Names index Subject index.", "venue": "", "year": 1951, "referenceCount": 0, "citationCount": 103, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1951-02-01", "journal": {"volume": "", "name": ""}, "citationStyles": {"bibtex": "@None{Hartree1951CalculatingIA,\n author = {D. Hartree},\n title = {Calculating Instruments and Machines},\n year = {1951}\n}\n"}, "authors": [{"authorId": "16620717", "name": "D. Hartree"}]}, {"paperId": "55ddf1b6cbe79b963a5a9d4da6e0a15e0d6761b5", "externalIds": {"MAG": "1991116412", "DOI": "10.1136/bmj.1.4616.1105", "CorpusId": 5252434, "PubMed": "18153422"}, "corpusId": 5252434, "publicationVenue": {"id": "3048b449-a773-4256-9bb5-5e61fbb61e52", "name": "British medical journal", "alternate_names": ["British Medical Journal", "Br med j", "Br Med J"], "issn": "1759-2151", "alternate_issns": ["1106-5028", "1222-5835", "1790-5249", "1106-4226"], "url": "https://www.bmj.com/", "alternate_urls": ["http://www.bmj.ro/"]}, "url": "https://www.semanticscholar.org/paper/55ddf1b6cbe79b963a5a9d4da6e0a15e0d6761b5", "title": "The Mind of Mechanical Man*", "abstract": "No better example could be found of man's characteristic desire for knowledge beyond, and far beyond, the limits of the authentic scientific discoveries of his own day than his wish to understand in complete detail the relationship between brain and mind-the one so finite, the other so amorphous and elusive. It is a subject which at present awakes a renewed interest, because we are invaded by the physicists and mathematicians-an invasion by no means unwelcome, bringing as it does new suggestions for analogy and comparison. We feel perhaps that we are being pushed, gently not roughly pushed, to accept the great likeness between the actions of electronic machines and those of the nervous system. At the same time we may misunderstand this invitation, and go beyond it to too ready an affirmation that there is identity. We should be wise to examine the nature of this concept and to see how far the electro-physicists share with us a common road. Medicine is placed by these suggestions in a familiar predicament. I refer to the dangers of our being unintentionally misled by pure science. Medical history furnishes many examples, such as the planetary and chemical theories of disease that were the outcome of the Scientific Renaissance. We are the same people as our ancestors and prone to their mistakes. We should reflect that if we go too far and too fast no one will deride us more unashamedly than the scientists who have tempted us. Discussion of mind-brain relations is, I know well, premature, but I suspect that it always will be premature, taking heart from a quotation that I shall make from Hughlings Jackson-not one of his best-known passages -because it may have been thought to be a sad lapse on his part. I believe it myself to be both true and useful, and so I repeat it.", "venue": "British medical journal", "year": 1949, "referenceCount": 0, "citationCount": 86, "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc2050428?pdf=render", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1949-06-25", "journal": {"volume": "1", "pages": "1105 - 1110", "name": "British Medical Journal"}, "citationStyles": {"bibtex": "@['JournalArticle']{Jefferson1949TheMO,\n author = {G. Jefferson},\n booktitle = {British medical journal},\n journal = {British Medical Journal},\n pages = {1105 - 1110},\n title = {The Mind of Mechanical Man*},\n volume = {1},\n year = {1949}\n}\n"}, "authors": [{"authorId": "143693546", "name": "G. Jefferson"}]}, {"paperId": "ab7790485f26ce65f9d83dd700c43e49058bdd2b", "externalIds": {"MAG": "2022731279", "DBLP": "journals/x/Turing37", "DOI": "10.1112/PLMS/S2-42.1.230", "CorpusId": 73712}, "corpusId": 73712, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", "title": "On computable numbers, with an application to the Entscheidungsproblem", "abstract": "1. Computing machines. 2. Definitions. Automatic machines. Computing machines. Circle and circle-free numbers. Computable sequences and numbers. 3. Examples of computing machines. 4. Abbreviated tables Further examples. 5. Enumeration of computable sequences. 6. The universal computing machine. 7. Detailed description of the universal machine. 8. Application of the diagonal process. Pagina 1 di 38 On computable numbers, with an application to the Entscheidungsproblem A. M. ...", "venue": "Proc. London Math. Soc.", "year": 2021, "referenceCount": 81, "citationCount": 8348, "influentialCitationCount": 536, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": "s2-42", "pages": "230-265", "name": "Proc. London Math. Soc."}, "citationStyles": {"bibtex": "@['JournalArticle']{Turing2021OnCN,\n author = {A. Turing},\n booktitle = {Proc. London Math. Soc.},\n journal = {Proc. London Math. Soc.},\n pages = {230-265},\n title = {On computable numbers, with an application to the Entscheidungsproblem},\n volume = {s2-42},\n year = {2021}\n}\n"}, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "91cdf5792afdcc31b4c6857f1757a6c154ebe109", "externalIds": {"MAG": "2327957545", "DOI": "10.2307/2268801", "CorpusId": 124080558}, "corpusId": 124080558, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/91cdf5792afdcc31b4c6857f1757a6c154ebe109", "title": "General Recursive Functions of Natural Numbers.", "abstract": null, "venue": "", "year": 1937, "referenceCount": 0, "citationCount": 39, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "1937-03-01", "journal": {"volume": "2", "pages": "38", "name": "Journal of Symbolic Logic"}, "citationStyles": {"bibtex": "@None{P\u00e9ter1937GeneralRF,\n author = {R\u00f3zsa P\u00e9ter and S. Kleene},\n journal = {Journal of Symbolic Logic},\n pages = {38},\n title = {General Recursive Functions of Natural Numbers.},\n volume = {2},\n year = {1937}\n}\n"}, "authors": [{"authorId": "16803104", "name": "R\u00f3zsa P\u00e9ter"}, {"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": null, "url": null, "title": "London Math. Soc", "abstract": null, "venue": "London Math. Soc", "year": 1937, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": []}, {"paperId": "c3483f7feb078b61d2ecd346d60dc78797e38869", "externalIds": {"MAG": "2023778211", "DOI": "10.1007/BF01565439", "CorpusId": 120517999}, "corpusId": 120517999, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c3483f7feb078b61d2ecd346d60dc78797e38869", "title": "General recursive functions of natural numbers", "abstract": null, "venue": "", "year": 1936, "referenceCount": 3, "citationCount": 499, "influentialCitationCount": 27, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "1936-12-01", "journal": {"volume": "112", "pages": "727-742", "name": "Mathematische Annalen"}, "citationStyles": {"bibtex": "@None{Kleene1936GeneralRF,\n author = {S. Kleene},\n journal = {Mathematische Annalen},\n pages = {727-742},\n title = {General recursive functions of natural numbers},\n volume = {112},\n year = {1936}\n}\n"}, "authors": [{"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": "60400c043b2624f9cfc2d8daa0f45f3c1d524de3", "externalIds": {"MAG": "2323777246", "DOI": "10.2307/2371045", "CorpusId": 14181275}, "corpusId": 14181275, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/60400c043b2624f9cfc2d8daa0f45f3c1d524de3", "title": "An Unsolvable Problem of Elementary Number Theory", "abstract": "Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. The JSTOR Archive is a trusted digital repository providing for long-term preservation and access to leading academic journals and scholarly literature from around the world. The Archive is supported by libraries, scholarly societies, publishers, and foundations. It is an initiative of JSTOR, a not-for-profit organization with a mission to help the scholarly community take advantage of advances in technology. For more information regarding JSTOR, please contact support@jstor.org.", "venue": "", "year": 1936, "referenceCount": 0, "citationCount": 1641, "influentialCitationCount": 118, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1936-04-01", "journal": {"volume": "58", "pages": "345", "name": "American Journal of Mathematics"}, "citationStyles": {"bibtex": "@None{Church1936AnUP,\n author = {A. Church},\n journal = {American Journal of Mathematics},\n pages = {345},\n title = {An Unsolvable Problem of Elementary Number Theory},\n volume = {58},\n year = {1936}\n}\n"}, "authors": [{"authorId": "144144981", "name": "A. Church"}]}, {"paperId": "f40d8a9ce6bd4f5e9dd3e3249022c13c8aa27084", "externalIds": {"MAG": "2325612495", "DOI": "10.2307/2371199", "CorpusId": 125013320}, "corpusId": 125013320, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f40d8a9ce6bd4f5e9dd3e3249022c13c8aa27084", "title": "A Theory of Positive Integers in Formal Logic. Part II", "abstract": null, "venue": "", "year": 1935, "referenceCount": 0, "citationCount": 103, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "57", "pages": "153", "name": "American Journal of Mathematics"}, "citationStyles": {"bibtex": "@None{Kleene1935ATO,\n author = {S. Kleene},\n journal = {American Journal of Mathematics},\n pages = {153},\n title = {A Theory of Positive Integers in Formal Logic. Part II},\n volume = {57},\n year = {1935}\n}\n"}, "authors": [{"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": "c3f7ad4b2af9d9888be85a8a376c61e7a612acc2", "externalIds": {"MAG": "2114804254", "DOI": "10.1007/S00605-006-0423-7", "CorpusId": 122418555}, "corpusId": 122418555, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c3f7ad4b2af9d9888be85a8a376c61e7a612acc2", "title": "\u00dcber formal unentscheidbare S\u00e4tze der Principia Mathematica und verwandter Systeme I", "abstract": null, "venue": "", "year": 1931, "referenceCount": 2, "citationCount": 2153, "influentialCitationCount": 107, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": "1931-12-01", "journal": {"volume": "149", "pages": "1-29", "name": "Monatshefte f\u00fcr Mathematik"}, "citationStyles": {"bibtex": "@None{G\u00f6del1931\u00dcberFU,\n author = {K. G\u00f6del},\n journal = {Monatshefte f\u00fcr Mathematik},\n pages = {1-29},\n title = {\u00dcber formal unentscheidbare S\u00e4tze der Principia Mathematica und verwandter Systeme I},\n volume = {149},\n year = {1931}\n}\n"}, "authors": [{"authorId": "2071836187", "name": "K. G\u00f6del"}]}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": null, "url": null, "title": "The Book of the ,IIachines", "abstract": null, "venue": "The Book of the ,IIachines", "year": 1865, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": []}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": null, "url": null, "title": "Translator's notes t c an artlcle on Babbage's Analytical Engire", "abstract": null, "venue": "Translator's notes t c an artlcle on Babbage's Analytical Engire", "year": 1842, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": []}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": null, "url": null, "title": "Victoria University of Manchester. return to index FOOT NOTES", "abstract": null, "venue": "Victoria University of Manchester. return to index FOOT NOTES", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": []}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": null, "url": null, "title": "Author's names in italics refer to the Bibliography", "abstract": null, "venue": "Author's names in italics refer to the Bibliography", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": []}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": null, "url": null, "title": "Compare Lady Lovelace's statement (p.450), which does not contain the word 'only", "abstract": null, "venue": "Compare Lady Lovelace's statement (p.450), which does not contain the word 'only", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": []}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": null, "url": null, "title": "Or rather 'programmed in' for our child-machine will be programmed in a digital computer. But the logical system will not have to be learnt", "abstract": null, "venue": "Or rather 'programmed in' for our child-machine will be programmed in a digital computer. But the logical system will not have to be learnt", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": []}]} diff --git a/tests/data/test_get_author.yaml b/tests/data/test_get_author.yaml index 6b32007..ea310e7 100644 --- a/tests/data/test_get_author.yaml +++ b/tests/data/test_get_author.yaml @@ -11,15 +11,16 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/author/2262347?&fields=affiliations,aliases,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url + uri: https://api.semanticscholar.org/graph/v1/author/2262347?&fields=affiliations,aliases,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.corpusId,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.openAccessPdf,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.publicationVenue,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url response: body: string: '{"authorId": "2262347", "externalIds": {"DBLP": ["Alan M. Turing"]}, "url": "https://www.semanticscholar.org/author/2262347", "name": "A. Turing", "aliases": ["A Turing", "A M Turing", "A. M. Turing", "Alan M. Turing", "Alan Turing", "Alan Mathison Turing"], "affiliations": [], "homepage": null, "paperCount": - 60, "citationCount": 12304, "hIndex": 23, "papers": [{"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb", - "externalIds": {"CorpusId": 251848799}, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", + 60, "citationCount": 12397, "hIndex": 23, "papers": [{"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb", + "externalIds": {"CorpusId": 251848799}, "corpusId": 251848799, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "title": "Dystopian or Utopian? Two Images of Alan Turing", "abstract": "Turing made intriguing statements about the future of arti\ufb01cial intelligence (AI) in society. He predicted that machines would eventually \u2018compete @@ -44,33 +45,36 @@ interactions: independent thinking to retain their power. These, he hoped, would be eventually rivaled and surpassed by intelligent machines.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": - "947efa54175145240c1a33f62321f23db43571e7", "externalIds": {"DBLP": "phd/Turing38", - "MAG": "1970654545", "DOI": "10.1016/b978-044450423-4/50007-3", "CorpusId": - 40363661}, "url": "https://www.semanticscholar.org/paper/947efa54175145240c1a33f62321f23db43571e7", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "947efa54175145240c1a33f62321f23db43571e7", "externalIds": {"DBLP": + "phd/Turing38", "MAG": "1970654545", "DOI": "10.1016/b978-044450423-4/50007-3", + "CorpusId": 40363661}, "corpusId": 40363661, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/947efa54175145240c1a33f62321f23db43571e7", "title": "Systems of Logic Based on Ordinals", "abstract": null, "venue": "Alan Turing''s Systems of Logic", "year": 2012, "referenceCount": 23, "citationCount": - 328, "influentialCitationCount": 30, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2012-12-31", "journal": {"name": "Alan Turing''s - Systems of Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "b7682dfbd4c03e287265d64e46388d21eedf3394", "externalIds": {"MAG": - "46849891", "DOI": "10.1093/oso/9780198250791.003.0017", "CorpusId": 172414532}, - "url": "https://www.semanticscholar.org/paper/b7682dfbd4c03e287265d64e46388d21eedf3394", + 328, "influentialCitationCount": 30, "isOpenAccess": true, "openAccessPdf": + {"url": "https://pure.mpg.de/pubman/item/item_2403325_2/component/file_2403324/Turing_1939_Sysyems.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-12-31", "journal": {"name": + "Alan Turing''s Systems of Logic"}, "authors": [{"authorId": "2262347", "name": + "A. Turing"}]}, {"paperId": "b7682dfbd4c03e287265d64e46388d21eedf3394", "externalIds": + {"MAG": "46849891", "DOI": "10.1093/oso/9780198250791.003.0017", "CorpusId": + 172414532}, "corpusId": 172414532, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b7682dfbd4c03e287265d64e46388d21eedf3394", "title": "Computing Machinery and Intelligence (1950)", "abstract": null, "venue": "Ideas That Created the Future", "year": 1989, "referenceCount": 0, "citationCount": 47, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-06-01", - "journal": {"name": "Ideas That Created the Future"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "6b7b392d5f3284a78fd559439bc735f3f0b08bae", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1989-06-01", "journal": {"name": "Ideas That Created the Future"}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6b7b392d5f3284a78fd559439bc735f3f0b08bae", "externalIds": {"DBLP": "journals/cryptologia/X20", "DOI": "10.1080/01611194.2019.1650846", - "CorpusId": 212727442}, "url": "https://www.semanticscholar.org/paper/6b7b392d5f3284a78fd559439bc735f3f0b08bae", + "CorpusId": 212727442}, "corpusId": 212727442, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6b7b392d5f3284a78fd559439bc735f3f0b08bae", "title": "Review of two collections of essays about Alan Turing", "abstract": "2012 was the Alan Turing Year \u2014 the celebration of the 100th anniversary of Alan Turing\u2019s birth. Turing\u2019s biographer Andrew Hodges in the @@ -99,39 +103,41 @@ interactions: chapter is a compilation of extracts from [Hilton\u2019s] papers and notes left in New Zealand, together with extracts from [Hilton\u2019s]", "venue": "Cryptologia", "year": 2020, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2020-01-02", "journal": {"volume": "44", "pages": "82 - - 86", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": - "A. Turing"}, {"authorId": "1772040", "name": "Jonathan P. Bowen"}, {"authorId": - "3075367", "name": "Mark D. Sprevak"}, {"authorId": "2109033245", "name": - "Robin J. Wilson"}, {"authorId": "2085428", "name": "A. Bokulich"}]}, {"paperId": - "87aebbd963f929cfb5ac46b0facb5128148758ad", "externalIds": {"CorpusId": 202754269}, - "url": "https://www.semanticscholar.org/paper/87aebbd963f929cfb5ac46b0facb5128148758ad", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2020-01-02", "journal": + {"volume": "44", "pages": "82 - 86", "name": "Cryptologia"}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "1772040", "name": "Jonathan + P. Bowen"}, {"authorId": "3075367", "name": "Mark D. Sprevak"}, {"authorId": + "2109033245", "name": "Robin J. Wilson"}, {"authorId": "2085428", "name": + "A. Bokulich"}]}, {"paperId": "87aebbd963f929cfb5ac46b0facb5128148758ad", + "externalIds": {"CorpusId": 202754269}, "corpusId": 202754269, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/87aebbd963f929cfb5ac46b0facb5128148758ad", "title": "Development of Moore \u2019 s Law", "abstract": "Many theorists would agree that, had it not been for courseware, the construction of online algorithms might never have occurred. In this paper, we confirm the visualization of superblocks. In this paper we argue that the Turing machine can be made pseudorandom, metamorphic, and low-energy.", "venue": "", "year": 2019, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "117077595", "name": "Olivier Pirson"}, - {"authorId": "2153307", "name": "R. Stallman"}, {"authorId": "2262347", "name": - "A. Turing"}, {"authorId": "1717349", "name": "D. Knuth"}]}, {"paperId": "d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", - "externalIds": {"DOI": "10.1049/pbpc026e_ch8", "CorpusId": 242953753}, "url": - "https://www.semanticscholar.org/paper/d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "117077595", + "name": "Olivier Pirson"}, {"authorId": "2153307", "name": "R. Stallman"}, + {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "1717349", "name": + "D. Knuth"}]}, {"paperId": "d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", "externalIds": + {"DOI": "10.1049/pbpc026e_ch8", "CorpusId": 242953753}, "corpusId": 242953753, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", "title": "Turing machines", "abstract": null, "venue": "Handbook of Mathematical Models for Languages and Computation", "year": 2019, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2019-11-12", "journal": {"name": "Handbook of Mathematical Models for Languages - and Computation"}, "authors": [{"authorId": "6234493", "name": "D. Hilbert"}, - {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "2157103111", "name": - "M. \u201ccrashes"}]}, {"paperId": "eb320a6d4e58d91c72ba0dc663da10579dd5957d", - "externalIds": {"DOI": "10.1090/mbk/121/24", "CorpusId": 241773225}, "url": - "https://www.semanticscholar.org/paper/eb320a6d4e58d91c72ba0dc663da10579dd5957d", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2019-11-12", "journal": {"name": "Handbook of Mathematical + Models for Languages and Computation"}, "authors": [{"authorId": "6234493", + "name": "D. Hilbert"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": + "2157103111", "name": "M. \u201ccrashes"}]}, {"paperId": "eb320a6d4e58d91c72ba0dc663da10579dd5957d", + "externalIds": {"DOI": "10.1090/mbk/121/24", "CorpusId": 241773225}, "corpusId": + 241773225, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb320a6d4e58d91c72ba0dc663da10579dd5957d", "title": "Alan Turing", "abstract": "When the name \u201dAlan Turing\u201d is mentioned most people think of one or more of the following words: \u201dTuring Machine\u201d, \u201dTuring Test\u201d, \u201dEnigma\u201d and \u201dArtificial @@ -160,31 +166,34 @@ interactions: Every Child Should Know\u201d \u2217e-mail: e0425826@student.tuwien.ac.at", "venue": "100 Years of Math Milestones", "year": 2019, "referenceCount": 125, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2019-06-12", "journal": {"name": - "100 Years of Math Milestones"}, "authors": [{"authorId": "2262347", "name": - "A. Turing"}, {"authorId": "98630872", "name": "S. Cooper"}, {"authorId": - "2138333896", "name": "Trenz Pruca"}, {"authorId": "2138325070", "name": "Malesuada - quis"}, {"authorId": "2138324300", "name": "egestas quis"}, {"authorId": "2138382523", - "name": "Alan Turingyear"}, {"authorId": "2136546073", "name": "See A. Hodges"}]}, - {"paperId": "ecb77b338846ac6dbaecf953984f8d44e76a8def", "externalIds": {"CorpusId": - 231691745}, "url": "https://www.semanticscholar.org/paper/ecb77b338846ac6dbaecf953984f8d44e76a8def", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2019-06-12", "journal": {"name": "100 Years of Math Milestones"}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "98630872", "name": + "S. Cooper"}, {"authorId": "2138333896", "name": "Trenz Pruca"}, {"authorId": + "2138325070", "name": "Malesuada quis"}, {"authorId": "2138324300", "name": + "egestas quis"}, {"authorId": "2138382523", "name": "Alan Turingyear"}, {"authorId": + "2136546073", "name": "See A. Hodges"}]}, {"paperId": "ecb77b338846ac6dbaecf953984f8d44e76a8def", + "externalIds": {"CorpusId": 231691745}, "corpusId": 231691745, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ecb77b338846ac6dbaecf953984f8d44e76a8def", "title": "Machine Learning, a key component in business model transformation", "abstract": null, "venue": "", "year": 2018, "referenceCount": 42, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "fd77c9ac5ead99b216633aa16d9b664516e6d24a", - "externalIds": {"DOI": "10.1201/9781315273587-12", "CorpusId": 240057602}, - "url": "https://www.semanticscholar.org/paper/fd77c9ac5ead99b216633aa16d9b664516e6d24a", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "fd77c9ac5ead99b216633aa16d9b664516e6d24a", "externalIds": {"DOI": + "10.1201/9781315273587-12", "CorpusId": 240057602}, "corpusId": 240057602, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd77c9ac5ead99b216633aa16d9b664516e6d24a", "title": "Text processing", "abstract": null, "venue": "Elementary Standard ML", "year": 2018, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2018-10-08", "journal": {"name": "Elementary Standard - ML"}, "authors": [{"authorId": "72482255", "name": "C. Gregg"}, {"authorId": - "1764547", "name": "M. Sahami"}, {"authorId": "144124712", "name": "J. Clarke"}, - {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "aa2c899534681104e64f0971d7cb1a003dd6efd2", - "externalIds": {"CorpusId": 51883623}, "url": "https://www.semanticscholar.org/paper/aa2c899534681104e64f0971d7cb1a003dd6efd2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2018-10-08", "journal": + {"name": "Elementary Standard ML"}, "authors": [{"authorId": "72482255", "name": + "C. Gregg"}, {"authorId": "1764547", "name": "M. Sahami"}, {"authorId": "144124712", + "name": "J. Clarke"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": + "aa2c899534681104e64f0971d7cb1a003dd6efd2", "externalIds": {"CorpusId": 51883623}, + "corpusId": 51883623, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aa2c899534681104e64f0971d7cb1a003dd6efd2", "title": "What \u2019 s Missing from Deep Learning ?", "abstract": "A neural network model for a mechanism of visual pattern recognition is proposed in this paper. The network is self-organized by \"learning without a teacher\", @@ -211,24 +220,25 @@ interactions: the last layer is not affected by the pattern''s position at all. Neither is it affected by a small change in shape nor in size of the stimulus pattern.", "venue": "", "year": 2017, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "1708655", "name": "B. Olshausen"}, {"authorId": - "145260300", "name": "H. Wills"}, {"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "1847175", "name": - "M. Minsky"}, {"authorId": "143805238", "name": "J. McCarthy"}, {"authorId": - "51083130", "name": "F. Rosenblatt"}, {"authorId": "145707626", "name": "N. - Wiener"}, {"authorId": "2067567609", "name": "Warren McCulloch"}, {"authorId": - "50314979", "name": "W. Pitts"}, {"authorId": "3160228", "name": "K. Fukushima"}]}, - {"paperId": "b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "externalIds": {"MAG": - "2467689444", "CorpusId": 159733415}, "url": "https://www.semanticscholar.org/paper/b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "1708655", "name": "B. Olshausen"}, + {"authorId": "145260300", "name": "H. Wills"}, {"authorId": "2262347", "name": + "A. Turing"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": + "1847175", "name": "M. Minsky"}, {"authorId": "143805238", "name": "J. McCarthy"}, + {"authorId": "51083130", "name": "F. Rosenblatt"}, {"authorId": "145707626", + "name": "N. Wiener"}, {"authorId": "2067567609", "name": "Warren McCulloch"}, + {"authorId": "50314979", "name": "W. Pitts"}, {"authorId": "3160228", "name": + "K. Fukushima"}]}, {"paperId": "b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", + "externalIds": {"MAG": "2467689444", "CorpusId": 159733415}, "corpusId": 159733415, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "title": "The President, the Vice President, the Secretary-Treasurer, and ARNOLD DRESDEN,2", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3154491", + "openAccessPdf": null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": + "History", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3154491", "name": "A. Tarski"}, {"authorId": "50455788", "name": "S. Maclane"}, {"authorId": "40384728", "name": "H. B. Curry"}, {"authorId": "122394125", "name": "Paul Marhenkei"}, {"authorId": "101931347", "name": "A. Dresden"}, {"authorId": @@ -239,7 +249,8 @@ interactions: "A. Turing"}, {"authorId": "40245151", "name": "F. B. Fitch"}, {"authorId": "104540019", "name": "P. Marhenke"}, {"authorId": "2072295124", "name": "C. Duca"}]}, {"paperId": "3180b4f827030c4b3a0ff048d1fee462575ca71f", "externalIds": - {"MAG": "2400968335", "CorpusId": 124065102}, "url": "https://www.semanticscholar.org/paper/3180b4f827030c4b3a0ff048d1fee462575ca71f", + {"MAG": "2400968335", "CorpusId": 124065102}, "corpusId": 124065102, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3180b4f827030c4b3a0ff048d1fee462575ca71f", "title": "Convergence Rates for Persistence Diagram Estimation in", "abstract": "Computational topology has recently seen an important development toward data analysis, giving birth to the eld of topological data analysis. Topological @@ -250,36 +261,40 @@ interactions: diagrams can be used as statistics with interesting convergence properties. Some numerical experiments are performed in various contexts to illustrate our results.", "venue": "", "year": 2015, "referenceCount": 34, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1760330", "name": "M. Glisse"}, {"authorId": "66876582", "name": - "Inria Saclay"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": - "102582041", "name": "Catherine Labru"}, {"authorId": "38291080", "name": - "B. Michel"}]}, {"paperId": "293a50e86c2a2f4a2e213a42e057910aeda09d82", "externalIds": - {"MAG": "2185394266", "CorpusId": 125067106}, "url": "https://www.semanticscholar.org/paper/293a50e86c2a2f4a2e213a42e057910aeda09d82", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1760330", "name": "M. Glisse"}, {"authorId": + "66876582", "name": "Inria Saclay"}, {"authorId": "2262347", "name": "A. Turing"}, + {"authorId": "102582041", "name": "Catherine Labru"}, {"authorId": "38291080", + "name": "B. Michel"}]}, {"paperId": "293a50e86c2a2f4a2e213a42e057910aeda09d82", + "externalIds": {"MAG": "2185394266", "CorpusId": 125067106}, "corpusId": 125067106, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/293a50e86c2a2f4a2e213a42e057910aeda09d82", "title": "\u2022 Hilbert spaces. Weak derivatives. Classical and weak solutions. \u2022 Galerkin approximation of elliptic equations. Spectral approximation. Finite element approximation in one dimension. Energy estimates. \u2022 Parabolic PDEs. Semigroups of operators. Method of lines. Stability of numerical", "abstract": null, "venue": "", "year": 2014, "referenceCount": 2, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "104483519", - "name": "Lecturer Sean Holman"}, {"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "103905785", "name": "January Exam"}]}, {"paperId": "9f07386256530a0060d99a1ba483a8f5c1f4194b", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "104483519", "name": "Lecturer Sean + Holman"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "103905785", + "name": "January Exam"}]}, {"paperId": "9f07386256530a0060d99a1ba483a8f5c1f4194b", "externalIds": {"MAG": "2029222787", "DOI": "10.1093/ITNOW/BWU030", "CorpusId": - 109153053}, "url": "https://www.semanticscholar.org/paper/9f07386256530a0060d99a1ba483a8f5c1f4194b", + 109153053}, "corpusId": 109153053, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9f07386256530a0060d99a1ba483a8f5c1f4194b", "title": "Turing: Oracles and Computation", "abstract": null, "venue": "", "year": 2014, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2014-03-01", "journal": {"volume": "56", "pages": "64-65", "name": "Itnow"}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "0875d9bdd710fe886d7f4543e17dfd581893f538", - "externalIds": {"CorpusId": 18099107}, "url": "https://www.semanticscholar.org/paper/0875d9bdd710fe886d7f4543e17dfd581893f538", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2014-03-01", "journal": {"volume": + "56", "pages": "64-65", "name": "Itnow"}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "0875d9bdd710fe886d7f4543e17dfd581893f538", + "externalIds": {"CorpusId": 18099107}, "corpusId": 18099107, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0875d9bdd710fe886d7f4543e17dfd581893f538", "title": "Watching the Daisies Grow: from Biology to Biomathematics and Bioinformatics \u2014 Alan Turing Centenary Special Issue", "abstract": "Preface We can only see a short distance ahead, but we can see plenty there that needs to be done. @@ -312,11 +327,13 @@ interactions: issue, we present a selection of papers commemorating Alan Turing and arguing that he should be also considered the co-founder of biomathematics and bioinformatics. His late works were", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", - "externalIds": {"MAG": "2741266234", "CorpusId": 125093480}, "url": "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "externalIds": {"MAG": + "2741266234", "CorpusId": 125093480}, "corpusId": 125093480, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "title": "Dusting Off the Turing Test", "abstract": "then inter- est theory and a problem about the observation of quantum systems (now as the quantum Zeno effect). With his death, train was lost, but the question computa- tion @@ -332,13 +349,14 @@ interactions: discrete symbols a complete the world? If it does, how can make this connection manifest? If it does not, where does fail, and what would this tell us about fundamental science?", "venue": "", "year": 2012, "referenceCount": 1, "citationCount": - 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}, {"authorId": "2262347", "name": - "A. Turing"}]}, {"paperId": "422ec845a15242fdfc904e1c7d2bfe132c7ec248", "externalIds": - {"CorpusId": 18051598}, "url": "https://www.semanticscholar.org/paper/422ec845a15242fdfc904e1c7d2bfe132c7ec248", + 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}, {"authorId": + "2262347", "name": "A. Turing"}]}, {"paperId": "422ec845a15242fdfc904e1c7d2bfe132c7ec248", + "externalIds": {"CorpusId": 18051598}, "corpusId": 18051598, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/422ec845a15242fdfc904e1c7d2bfe132c7ec248", "title": "PLANES OF MORPHISMS AND THE CHARACTERIZATION OF CONTINUOUSLY INTEGRAL, COMPLETE RANDOM VARIABLES", "abstract": "Let \u03b8m,\u03bc be an independent, right-composite, anti-naturally continuous polytope. Recent interest in smooth @@ -348,22 +366,24 @@ interactions: recent developments in modern integral PDE [25] have raised the question of whether e ( 0 ) 6= log ( 1 \u2016\u03c7\u2016 ) \u222a c ( 1 \u2229 i, \u03c0 )", "venue": "", "year": 2012, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "12989190", "name": "M. Lafourcade"}, - {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "50294906", "name": - "M. Abel"}]}, {"paperId": "4f4b42aa137d5b6df85889cf53901f44cbee643b", "externalIds": - {"MAG": "2187383749", "DOI": "10.7551/mitpress/5123.003.0007", "CorpusId": - 62254832}, "url": "https://www.semanticscholar.org/paper/4f4b42aa137d5b6df85889cf53901f44cbee643b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "12989190", + "name": "M. Lafourcade"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": + "50294906", "name": "M. Abel"}]}, {"paperId": "4f4b42aa137d5b6df85889cf53901f44cbee643b", + "externalIds": {"MAG": "2187383749", "DOI": "10.7551/mitpress/5123.003.0007", + "CorpusId": 62254832}, "corpusId": 62254832, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4f4b42aa137d5b6df85889cf53901f44cbee643b", "title": "Could a machine think", "abstract": null, "venue": "", "year": 2012, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2055661501", - "name": "Pascal Ludwig"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": - "34493294", "name": "J. Searle"}]}, {"paperId": "5cfe755938d14edd5422d72215cf8b733f0284fc", - "externalIds": {"DBLP": "journals/cryptologia/TuringB12", "MAG": "2054264625", - "DOI": "10.1080/01611194.2012.713803", "CorpusId": 205488183}, "url": "https://www.semanticscholar.org/paper/5cfe755938d14edd5422d72215cf8b733f0284fc", + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "2055661501", "name": "Pascal Ludwig"}, {"authorId": "2262347", + "name": "A. Turing"}, {"authorId": "34493294", "name": "J. Searle"}]}, {"paperId": + "5cfe755938d14edd5422d72215cf8b733f0284fc", "externalIds": {"DBLP": "journals/cryptologia/TuringB12", + "MAG": "2054264625", "DOI": "10.1080/01611194.2012.713803", "CorpusId": 205488183}, + "corpusId": 205488183, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5cfe755938d14edd5422d72215cf8b733f0284fc", "title": "Report on Speech Secrecy System DELILAH, a Technical Description Compiled by A. M. Turing and Lieutenant D. Bayley REME, 1945\u20131946", "abstract": "The book groups themselves might be used as a form of cipher, but this is @@ -374,21 +394,24 @@ interactions: but that is all. Let us run the groups together and call the result \u2018\u2018P=L figures\u2019\u2019:", "venue": "Cryptologia", "year": 2012, "referenceCount": 0, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-10-01", "journal": {"volume": "36", "pages": "295 - 340", "name": "Cryptologia"}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "84292446", - "name": "D. Bayley"}]}, {"paperId": "300d41307bb946510bdc111463f5fb71b2a21796", - "externalIds": {"MAG": "2274591444", "CorpusId": 124844782}, "url": "https://www.semanticscholar.org/paper/300d41307bb946510bdc111463f5fb71b2a21796", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-10-01", "journal": {"volume": "36", "pages": "295 + - 340", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": + "A. Turing"}, {"authorId": "84292446", "name": "D. Bayley"}]}, {"paperId": + "300d41307bb946510bdc111463f5fb71b2a21796", "externalIds": {"MAG": "2274591444", + "CorpusId": 124844782}, "corpusId": 124844782, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/300d41307bb946510bdc111463f5fb71b2a21796", "title": "Correspondence with [A.M. Turing]", "abstract": null, "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": "2011-11-21", "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "51326515", "name": "R. Fisher"}, {"authorId": "2262347", "name": - "A. Turing"}]}, {"paperId": "50a1357c04bde76f752aac1dbd2ba2601622ccd4", "externalIds": - {"CorpusId": 8641258}, "url": "https://www.semanticscholar.org/paper/50a1357c04bde76f752aac1dbd2ba2601622ccd4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": "2011-11-21", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "51326515", "name": "R. Fisher"}, {"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "50a1357c04bde76f752aac1dbd2ba2601622ccd4", + "externalIds": {"CorpusId": 8641258}, "corpusId": 8641258, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/50a1357c04bde76f752aac1dbd2ba2601622ccd4", "title": "Alan Mathison Turing Universal Turing Machine", "abstract": "Scatter/gather I/O must work [54], [59], [62], [68], [68], [70], [70], [70], [95], [95], [114], [114], [114], [152], [168], [179], [179], [179], [188], [191]. After @@ -397,11 +420,12 @@ interactions: In order to solve this riddle, we inve stigate how digital-to-analog converters can be applied to t he", "venue": "", "year": 2011, "referenceCount": 248, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "6da083c8833b4000b088ea366f16f1ea8d9b6dad", "externalIds": {"CorpusId": - 17718604}, "url": "https://www.semanticscholar.org/paper/6da083c8833b4000b088ea366f16f1ea8d9b6dad", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "6da083c8833b4000b088ea366f16f1ea8d9b6dad", + "externalIds": {"CorpusId": 17718604}, "corpusId": 17718604, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6da083c8833b4000b088ea366f16f1ea8d9b6dad", "title": "The legacy of Alan Turing Universal Turing Machine", "abstract": "The investigation of 802.11b has evaluated IPv6, and current trends suggest that the analysis of local-area networks will soon emerge. Given the current @@ -410,11 +434,12 @@ interactions: often incompatible, but rather on introducing a novel algorithm for the improvement of multi-processors (Esparcet).", "venue": "", "year": 2011, "referenceCount": 243, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "externalIds": {"CorpusId": - 17215741}, "url": "https://www.semanticscholar.org/paper/de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", + "externalIds": {"CorpusId": 17215741}, "corpusId": 17215741, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "title": "Alan Turing Universal Turing Machine", "abstract": "In recent years, much research has been devoted to the synthesis of gigabit switches; on the other hand, few have explored the refinement of hash tables. In fact, few @@ -422,11 +447,12 @@ interactions: In this work, we use signed technology to show that architecture and superblocks are usually incompatible.", "venue": "", "year": 2011, "referenceCount": 153, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "externalIds": {"CorpusId": - 115526721}, "url": "https://www.semanticscholar.org/paper/2c17cdc749e8a639ed78761b23e8e1d8805ae29c", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "2c17cdc749e8a639ed78761b23e8e1d8805ae29c", + "externalIds": {"CorpusId": 115526721}, "corpusId": 115526721, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "title": "Turing 1950 1 The Imitation Game", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink.\u201d The @@ -447,19 +473,20 @@ interactions: is A and Y is B\u201d or \u201cX is B and Y is A.\u201d The interrogator is allowed to put questions to A and B thus:", "venue": "", "year": 2010, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6c9520d25a2f93f1fb4f08bab66d90a1519faaac", "externalIds": {"MAG": "2479903735", "DOI": "10.14361/9783839403396-004", "CorpusId": 184361851}, - "url": "https://www.semanticscholar.org/paper/6c9520d25a2f93f1fb4f08bab66d90a1519faaac", + "corpusId": 184361851, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6c9520d25a2f93f1fb4f08bab66d90a1519faaac", "title": "Computermaschinerie und Intelligenz (1950)", "abstract": null, "venue": "Reader Neue Medien", "year": 2007, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2007-12-31", "journal": {"name": "Reader Neue Medien"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f", - "externalIds": {"MAG": "2967838196", "CorpusId": 17359642}, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2007-12-31", "journal": {"name": "Reader Neue Medien"}, + "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f", + "externalIds": {"MAG": "2967838196", "CorpusId": 17359642}, "corpusId": 17359642, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f", "title": "Computing Machinery and Intelligence A.M. Turing", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The @@ -472,65 +499,73 @@ interactions: a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 129, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5", "externalIds": {"MAG": "2499467011", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0023", - "CorpusId": 62965306}, "url": "https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5", + "CorpusId": 62965306}, "corpusId": 62965306, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5", "title": "The Turing\u2013Wilkinson lecture series (1946\u20137)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 6, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": - null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": - "459-528", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "2056940608", "name": "J. H. Wilkinson"}]}, {"paperId": "2190254a337fd601af32260dc4133d009933ee65", - "externalIds": {"MAG": "2483371858", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0021", - "CorpusId": 64463006}, "url": "https://www.semanticscholar.org/paper/2190254a337fd601af32260dc4133d009933ee65", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "external"}], "publicationTypes": null, "publicationDate": "2005-04-14", + "journal": {"volume": "", "pages": "459-528", "name": ""}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "2056940608", "name": "J. H. + Wilkinson"}]}, {"paperId": "2190254a337fd601af32260dc4133d009933ee65", "externalIds": + {"MAG": "2483371858", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0021", + "CorpusId": 64463006}, "corpusId": 64463006, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2190254a337fd601af32260dc4133d009933ee65", "title": "Proposed electronic calculator (1945)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 49, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-04-14", - "journal": {"volume": "", "pages": "369-454", "name": ""}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "f8465fea1230ba0f7ca3dea3c4c71278ac576e91", - "externalIds": {"MAG": "2490852693", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0022", - "CorpusId": 64507632}, "url": "https://www.semanticscholar.org/paper/f8465fea1230ba0f7ca3dea3c4c71278ac576e91", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": + "369-454", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "externalIds": {"MAG": + "2490852693", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0022", "CorpusId": + 64507632}, "corpusId": 64507632, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "title": "Notes on memory (1945)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, - "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "455-458", - "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": - "05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "externalIds": {"MAG": "3101684541", - "DOI": "10.1093/oso/9780198250791.003.0016", "CorpusId": 232473093}, "url": - "https://www.semanticscholar.org/paper/05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": + null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": + "455-458", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "externalIds": {"MAG": + "3101684541", "DOI": "10.1093/oso/9780198250791.003.0016", "CorpusId": 232473093}, + "corpusId": 232473093, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "title": "Intelligent Machinery (1948)", "abstract": null, "venue": "", "year": - 2004, "referenceCount": 0, "citationCount": 31, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "13103014e997dd6273e2bc3661353d09165cf90c", - "externalIds": {"MAG": "3103227490", "DOI": "10.1093/oso/9780198250791.003.0015", - "CorpusId": 229803945}, "url": "https://www.semanticscholar.org/paper/13103014e997dd6273e2bc3661353d09165cf90c", + 2004, "referenceCount": 0, "citationCount": 32, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. + Turing"}]}, {"paperId": "13103014e997dd6273e2bc3661353d09165cf90c", "externalIds": + {"MAG": "3103227490", "DOI": "10.1093/oso/9780198250791.003.0015", "CorpusId": + 229803945}, "corpusId": 229803945, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13103014e997dd6273e2bc3661353d09165cf90c", "title": "Lecture on the Automatic Computing Engine (1947)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "15b2a8b748d8063348071beb106b4921c0ef8ba6", - "externalIds": {"MAG": "3101010549", "DOI": "10.1093/oso/9780198250791.003.0007", - "CorpusId": 232670029}, "url": "https://www.semanticscholar.org/paper/15b2a8b748d8063348071beb106b4921c0ef8ba6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "15b2a8b748d8063348071beb106b4921c0ef8ba6", "externalIds": {"MAG": + "3101010549", "DOI": "10.1093/oso/9780198250791.003.0007", "CorpusId": 232670029}, + "corpusId": 232670029, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15b2a8b748d8063348071beb106b4921c0ef8ba6", "title": "Systems of Logic Based on Ordinals (1938)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "1bb2114c24263b0489f24f787fef86f33487f802", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://pure.mpg.de/pubman/item/item_2403325_2/component/file_2403324/Turing_1939_Sysyems.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "1bb2114c24263b0489f24f787fef86f33487f802", "externalIds": {"MAG": "169424043", "DOI": "10.7551/mitpress/6928.003.0016", - "CorpusId": 5561670}, "url": "https://www.semanticscholar.org/paper/1bb2114c24263b0489f24f787fef86f33487f802", + "CorpusId": 5561670}, "corpusId": 5561670, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1bb2114c24263b0489f24f787fef86f33487f802", "title": "Can Automatic Calculating Machines Be Said to Think", "abstract": "Trainable methodologies and the transistor have garnered profound interest from both steganographers and cyberinfo rmaticians in the last several years. @@ -543,15 +578,16 @@ interactions: [191] is recursiv ely enumerable, but rather on constructing a pervasive tool for evaluating Internet QoS (HolHoveling).", "venue": "", "year": 2004, "referenceCount": 271, "citationCount": 288, "influentialCitationCount": 14, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "117-132", "name": ""}, "authors": [{"authorId": - "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "2060159667", "name": "Geoffrey Jefferson"}, {"authorId": "34635194", - "name": "R. Braithwaite"}, {"authorId": "1692491", "name": "S. Shieber"}]}, - {"paperId": "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": {"MAG": - "593056538", "CorpusId": 60423929}, "url": "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "117-132", "name": ""}, "authors": + [{"authorId": "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": + "A. Turing"}, {"authorId": "2060159667", "name": "Geoffrey Jefferson"}, {"authorId": + "34635194", "name": "R. Braithwaite"}, {"authorId": "1692491", "name": "S. + Shieber"}]}, {"paperId": "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": + {"MAG": "593056538", "CorpusId": 60423929}, "corpusId": 60423929, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "title": "The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma", "abstract": "Alan Turing 1912-1954 Computable Numbers: A Guide 1. On Computable @@ -566,23 +602,25 @@ interactions: Calculating Machines Be Said to Think? (1952) Artificial Life 15. The Chemical Basis of Morphogenesis (1952) 16. Chess (1953) 17. Solvable and Unsolvable Problems (1954)", "venue": "", "year": 2004, "referenceCount": 39, "citationCount": - 151, "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": - "118975427", "name": "J. Copeland"}]}, {"paperId": "e4b0b7117d580c5ec4b256bd2d918e977ed08aba", - "externalIds": {"MAG": "3105675538", "DOI": "10.1093/oso/9780198250791.003.0013", - "CorpusId": 231523578}, "url": "https://www.semanticscholar.org/paper/e4b0b7117d580c5ec4b256bd2d918e977ed08aba", + 152, "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}, {"authorId": "118975427", "name": "J. Copeland"}]}, + {"paperId": "e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "externalIds": {"MAG": + "3105675538", "DOI": "10.1093/oso/9780198250791.003.0013", "CorpusId": 231523578}, + "corpusId": 231523578, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "title": "Memorandum to OP-20-G on Naval Enigma (c.1941)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "ef5e79b3ba502350967ae9bff87243fbf140c8b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}]}, {"paperId": "ef5e79b3ba502350967ae9bff87243fbf140c8b9", "externalIds": {"MAG": "3098156012", "DOI": "10.1093/oso/9780198250791.003.0012", - "CorpusId": 230737760}, "url": "https://www.semanticscholar.org/paper/ef5e79b3ba502350967ae9bff87243fbf140c8b9", + "CorpusId": 230737760}, "corpusId": 230737760, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ef5e79b3ba502350967ae9bff87243fbf140c8b9", "title": "Letter to Winston Churchill (1941)", "abstract": "During 1941, codebreaking at Bletchley Park was hindered by shortages of typists and unskilled staV. These shortages could have been easily rectiWed, but the codebreakers\u2019 @@ -594,13 +632,15 @@ interactions: been done.\u20191 It fell to Stuart Milner-Barry of Hut 6 to deliver the letter by hand to 10 Downing Street. In 1986, Milner-Barry recalled his trip to Whitehall:", "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": - "Art", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "73506204", "name": "Gordon Welchman"}]}, {"paperId": "48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", - "externalIds": {"DBLP": "journals/cryptologia/Turing03", "MAG": "2030737075", - "DOI": "10.1080/0161-110391891748", "CorpusId": 12703115}, "url": "https://www.semanticscholar.org/paper/48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], + "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "73506204", "name": "Gordon + Welchman"}]}, {"paperId": "48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "externalIds": + {"DBLP": "journals/cryptologia/Turing03", "MAG": "2030737075", "DOI": "10.1080/0161-110391891748", + "CorpusId": 12703115}, "corpusId": 12703115, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "title": "ALAN M. TURING''S CRITIQUE OF RUNNING SHORT CRIBS ON THE U. S. NAVY BOMBE", "abstract": "Unified lossless information have led to many natural advances, including the partition table and massive multiplayer online roleplaying @@ -608,14 +648,15 @@ interactions: Lamport clocks a real possibility. In this position paper, we argue that Boolean logic and Markov models can agree to accomplish this purpose.", "venue": "Cryptologia", "year": 2003, "referenceCount": 196, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-01-01", "journal": {"volume": "27", "pages": "44 - - 49", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": - "A. Turing"}]}, {"paperId": "26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", "externalIds": - {"MAG": "1992023589", "DBLP": "journals/cryptologia/Turing01", "DOI": "10.1080/0161-110191889734", - "CorpusId": 14207094}, "url": "https://www.semanticscholar.org/paper/26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-01-01", "journal": + {"volume": "27", "pages": "44 - 49", "name": "Cryptologia"}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}]}, {"paperId": "26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", + "externalIds": {"MAG": "1992023589", "DBLP": "journals/cryptologia/Turing01", + "DOI": "10.1080/0161-110191889734", "CorpusId": 14207094}, "corpusId": 14207094, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", "title": "VISIT TO NATIONAL CASH REGISTER CORPORATION OF DAYTON, OHIO", "abstract": "In recent years, much research has been devoted to the study of Boolean logic; however, few have developed the extensive unification of the location-identity @@ -625,35 +666,36 @@ interactions: [58], [59], [62], [68], [ 68], [68], [70], [95], [99], [114], [128], [129], [148], [152], [ 168], [168], [179], [188], [191].", "venue": "Cryptologia", "year": 2001, "referenceCount": 206, "citationCount": 179, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-01-01", "journal": {"volume": "25", "pages": "1 - - 10", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. - Turing"}]}, {"paperId": "b52adf784f9a0ca3b936f39a90cf3445b48dc408", "externalIds": - {"MAG": "2798463542", "DOI": "10.1007/3-540-31288-9_9", "CorpusId": 125729536}, - "url": "https://www.semanticscholar.org/paper/b52adf784f9a0ca3b936f39a90cf3445b48dc408", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-01-01", "journal": + {"volume": "25", "pages": "1 - 10", "name": "Cryptologia"}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}]}, {"paperId": "b52adf784f9a0ca3b936f39a90cf3445b48dc408", + "externalIds": {"MAG": "2798463542", "DOI": "10.1007/3-540-31288-9_9", "CorpusId": + 125729536}, "corpusId": 125729536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b52adf784f9a0ca3b936f39a90cf3445b48dc408", "title": "Mathematical logic", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. - Turing"}]}, {"paperId": "650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "externalIds": - {"MAG": "2316135739", "DOI": "10.1093/PHILMAT/4.3.256", "CorpusId": 5213112}, - "url": "https://www.semanticscholar.org/paper/650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", + "externalIds": {"MAG": "2316135739", "DOI": "10.1093/PHILMAT/4.3.256", "CorpusId": + 5213112}, "corpusId": 5213112, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "title": "Intelligent Machinery, A Heretical Theory*", "abstract": "The analysis of interrupts is a structured quagmire. In this position paper, we demonstrate the investigation of simulated annealing. KaliNil, our new methodology for DNS, is the solution to all of these problems.", "venue": "", "year": 1996, "referenceCount": 146, "citationCount": 213, "influentialCitationCount": 7, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1996-09-01", "journal": {"volume": "4", "pages": "256-260", "name": "Philosophia - Mathematica"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "509a622da7869a8eb345eea921ed30924a73e6fa", "externalIds": {"CorpusId": - 18573444}, "url": "https://www.semanticscholar.org/paper/509a622da7869a8eb345eea921ed30924a73e6fa", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1996-09-01", "journal": {"volume": "4", "pages": "256-260", + "name": "Philosophia Mathematica"}, "authors": [{"authorId": "2262347", "name": + "A. Turing"}]}, {"paperId": "509a622da7869a8eb345eea921ed30924a73e6fa", "externalIds": + {"CorpusId": 18573444}, "corpusId": 18573444, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/509a622da7869a8eb345eea921ed30924a73e6fa", "title": "Computer poker", "abstract": "Games are an interesting and challenging domain for computer science research, having the nice characteristics of a clearly deened set of rules and a speciic goal. Developing a program to play @@ -671,60 +713,70 @@ interactions: for academic researchers, and lay some foundations for the sci-entiic exploration of this fascinating game.", "venue": "", "year": 1995, "referenceCount": 129, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "39261667", "name": "D. Billings"}, - {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "2262347", "name": - "A. Turing"}, {"authorId": "144461837", "name": "C. Shannon"}, {"authorId": - "143805236", "name": "J. McCarthy"}, {"authorId": "1717349", "name": "D. Knuth"}, - {"authorId": "48603437", "name": "A. Newell"}, {"authorId": "2055346931", - "name": "Herbert A. Simon"}, {"authorId": "7991309", "name": "A. Samuel"}, - {"authorId": "145878706", "name": "D. Michie"}, {"authorId": "102213388", - "name": "K. Thompson"}]}, {"paperId": "e972b5110d036991078e55bede6608a7cdaf48b1", - "externalIds": {"CorpusId": 8597454, "PubMed": "7564963"}, "url": "https://www.semanticscholar.org/paper/e972b5110d036991078e55bede6608a7cdaf48b1", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "39261667", + "name": "D. Billings"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "144461837", "name": "C. Shannon"}, + {"authorId": "143805236", "name": "J. McCarthy"}, {"authorId": "1717349", + "name": "D. Knuth"}, {"authorId": "48603437", "name": "A. Newell"}, {"authorId": + "2055346931", "name": "Herbert A. Simon"}, {"authorId": "7991309", "name": + "A. Samuel"}, {"authorId": "145878706", "name": "D. Michie"}, {"authorId": + "102213388", "name": "K. Thompson"}]}, {"paperId": "e972b5110d036991078e55bede6608a7cdaf48b1", + "externalIds": {"CorpusId": 8597454, "PubMed": "7564963"}, "corpusId": 8597454, + "publicationVenue": {"id": "2060f67b-894f-4036-95ff-a11601fc257a", "name": + "M.D.Computing", "type": "journal", "alternate_names": ["M.D comput comput + med pract", "M.D. computing : computers in medical practice", "M D Comput", + "M D Computing"], "issn": "0724-6811"}, "url": "https://www.semanticscholar.org/paper/e972b5110d036991078e55bede6608a7cdaf48b1", "title": "Lecture to the London Mathematical Society on 20 February 1947. 1986.", "abstract": null, "venue": "M.D.Computing", "year": 1995, "referenceCount": 0, "citationCount": 166, "influentialCitationCount": 15, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "12 5", "pages": "\n 390-7\n ", + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "12 5", "pages": "\n 390-7\n ", "name": "M.D. computing : computers in medical practice"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "33adb5256f85d7835696611b2517797dcb260ddb", - "externalIds": {"MAG": "1577952063", "CorpusId": 60626324}, "url": "https://www.semanticscholar.org/paper/33adb5256f85d7835696611b2517797dcb260ddb", + "externalIds": {"MAG": "1577952063", "CorpusId": 60626324}, "corpusId": 60626324, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/33adb5256f85d7835696611b2517797dcb260ddb", "title": "Manchester computing machine: general topics", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1989-05-01", "journal": {"volume": "", "pages": "194-196", "name": ""}, "authors": - [{"authorId": "90657571", "name": "M. J. Lighthill"}, {"authorId": "16909947", - "name": "G. C. Tootill"}, {"authorId": "143726570", "name": "J. Miller"}, - {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "143809548", "name": - "E. A. Newman"}]}, {"paperId": "a28fe905a92c75ae2098acacad53c992e4bce52d", - "externalIds": {"MAG": "1506559289", "CorpusId": 60659734}, "url": "https://www.semanticscholar.org/paper/a28fe905a92c75ae2098acacad53c992e4bce52d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1989-05-01", "journal": {"volume": + "", "pages": "194-196", "name": ""}, "authors": [{"authorId": "90657571", + "name": "M. J. Lighthill"}, {"authorId": "16909947", "name": "G. C. Tootill"}, + {"authorId": "143726570", "name": "J. Miller"}, {"authorId": "2262347", "name": + "A. Turing"}, {"authorId": "143809548", "name": "E. A. Newman"}]}, {"paperId": + "a28fe905a92c75ae2098acacad53c992e4bce52d", "externalIds": {"MAG": "1506559289", + "CorpusId": 60659734}, "corpusId": 60659734, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a28fe905a92c75ae2098acacad53c992e4bce52d", "title": "Local programming methods and conventions", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 147, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": - "178", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "f50fef843592d31124e629420a5d7df39a51fcd7", "externalIds": {"MAG": - "1723067587", "CorpusId": 56518797}, "url": "https://www.semanticscholar.org/paper/f50fef843592d31124e629420a5d7df39a51fcd7", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": + {"volume": "", "pages": "178", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "f50fef843592d31124e629420a5d7df39a51fcd7", + "externalIds": {"MAG": "1723067587", "CorpusId": 56518797}, "corpusId": 56518797, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f50fef843592d31124e629420a5d7df39a51fcd7", "title": "Checking a large routine", "abstract": null, "venue": "", "year": - 1989, "referenceCount": 0, "citationCount": 402, "influentialCitationCount": - 44, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": - "70-72", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "fc5ef435b26155d2ea554a8062781739c8ccf296", "externalIds": {"MAG": - "627474889", "CorpusId": 190961434}, "url": "https://www.semanticscholar.org/paper/fc5ef435b26155d2ea554a8062781739c8ccf296", + 1989, "referenceCount": 0, "citationCount": 404, "influentialCitationCount": + 44, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": + {"volume": "", "pages": "70-72", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "fc5ef435b26155d2ea554a8062781739c8ccf296", + "externalIds": {"MAG": "627474889", "CorpusId": 190961434}, "corpusId": 190961434, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc5ef435b26155d2ea554a8062781739c8ccf296", "title": "Intelligence service : Schriften", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 46, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "401226dbe808714439b7f4fe6ce17e3fb5a6e790", - "externalIds": {"CorpusId": 7990676}, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790", + "externalIds": {"CorpusId": 7990676}, "corpusId": 7990676, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790", "title": "Artificial Intelligence : Usfssg Computers to Think about Thinking . Part 1", "abstract": "In 1950, Alan M. Turing, the late deputy director of the University of Manchester\u2019s Computing Laboratory in England, proposed @@ -765,41 +817,46 @@ interactions: tasks, but not very well. For example, chess programs were successful at following the step-by-step instructions for moving chessmen. But computers couldn\u2019t independently gen-", "venue": "", "year": 1983, "referenceCount": 143, "citationCount": - 181, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", - "externalIds": {"MAG": "1482735464", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": - 64330274}, "url": "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7", + 181, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", "externalIds": {"MAG": + "1482735464", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": 64330274}, "corpusId": + 64330274, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7", "title": "Studies in the History of Probability and Statistics. XXXVII", "abstract": "SUMMARY An account is given of A. M. Turing''s unpublished contributions to statistics during 1941 or 1940.", "venue": "", "year": 1979, "referenceCount": 15, "citationCount": 164, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1979-08-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "145179124", - "name": "I. Good"}]}, {"paperId": "186bdef34bf03f6a1c74d5b074e956324e9fe746", - "externalIds": {"MAG": "34610884", "CorpusId": 115688448}, "url": "https://www.semanticscholar.org/paper/186bdef34bf03f6a1c74d5b074e956324e9fe746", - "title": "Solvable and Unsolvable Problems", "abstract": null, "venue": "", - "year": 1954, "referenceCount": 0, "citationCount": 182, "influentialCitationCount": - 36, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1979-08-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "24fade315dc6a15961184a3c6dfec064591edcd5", - "externalIds": {"MAG": "1553055254", "CorpusId": 60504948}, "url": "https://www.semanticscholar.org/paper/24fade315dc6a15961184a3c6dfec064591edcd5", + "name": "A. Turing"}, {"authorId": "145179124", "name": "I. Good"}]}, {"paperId": + "186bdef34bf03f6a1c74d5b074e956324e9fe746", "externalIds": {"MAG": "34610884", + "CorpusId": 115688448}, "corpusId": 115688448, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/186bdef34bf03f6a1c74d5b074e956324e9fe746", + "title": "Solvable and Unsolvable Problems", "abstract": null, "venue": "", + "year": 1954, "referenceCount": 0, "citationCount": 184, "influentialCitationCount": + 36, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "24fade315dc6a15961184a3c6dfec064591edcd5", + "externalIds": {"MAG": "1553055254", "CorpusId": 60504948}, "corpusId": 60504948, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/24fade315dc6a15961184a3c6dfec064591edcd5", "title": "Review: Arthur W. Burks, The Logic of Programming Electronic Digital Computers", "abstract": null, "venue": "", "year": 1953, "referenceCount": 0, "citationCount": 187, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1953-06-01", "journal": - {"volume": "18", "pages": "179-179", "name": "Journal of Symbolic Logic"}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "62660c27d93c50f69b1ed614ad9499f4d849aeec", - "externalIds": {"MAG": "2317224626", "DOI": "10.2307/2268956", "CorpusId": - 61881712}, "url": "https://www.semanticscholar.org/paper/62660c27d93c50f69b1ed614ad9499f4d849aeec", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1953-06-01", "journal": {"volume": "18", "pages": "179-179", "name": "Journal + of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "62660c27d93c50f69b1ed614ad9499f4d849aeec", "externalIds": {"MAG": + "2317224626", "DOI": "10.2307/2268956", "CorpusId": 61881712}, "corpusId": + 61881712, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/62660c27d93c50f69b1ed614ad9499f4d849aeec", "title": "Arthur W. Burks. The logic of programming electronic digital computers. Industrial mathematics (Detroit), vol. 1 (1950), pp. 36\u201352.", "abstract": "ARTHUR W. BURKS. The logic of programming electronic digital computers. Industrial @@ -812,14 +869,15 @@ interactions: by Goldstine and von Neumann. Planning and coding of problems for an electronic computing instrument, vol. 1, Institute for Advanced Study, 1947.", "venue": "Journal of Symbolic Logic", "year": 1953, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1953-06-01", "journal": {"volume": - "18", "pages": "179 - 179", "name": "Journal of Symbolic Logic"}, "authors": - [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", - "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": - "10.1093/MIND/LIX.236.433", "CorpusId": 14636783}, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1953-06-01", + "journal": {"volume": "18", "pages": "179 - 179", "name": "Journal of Symbolic + Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": + "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": "3030363341", + "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", "CorpusId": + 14636783}, "corpusId": 14636783, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", "title": "Computing Machinery and Intelligence", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. @@ -830,15 +888,15 @@ interactions: and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": - 8557, "influentialCitationCount": 492, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "1950-10-01", "journal": - {"volume": "LIX", "pages": "433-460", "name": "Mind"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "c35cf8a54e655e91f8657cf8403d578994fb27c5", + 8596, "influentialCitationCount": 493, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1950-10-01", + "journal": {"volume": "LIX", "pages": "433-460", "name": "Mind"}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "c35cf8a54e655e91f8657cf8403d578994fb27c5", "externalIds": {"MAG": "2419349071", "DOI": "10.2307/j.ctv8d5sh5.6", "CorpusId": - 148545092}, "url": "https://www.semanticscholar.org/paper/c35cf8a54e655e91f8657cf8403d578994fb27c5", + 148545092}, "corpusId": 148545092, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c35cf8a54e655e91f8657cf8403d578994fb27c5", "title": "PSYCHOLOGY AND PHILOSOPHY", "abstract": "1. The Imitation Game. I PROPOSE tO consider the question, ''Can machines think ? This should begin with definitions of the meaning of the terms ''machine'' and ''think''. The @@ -860,13 +918,18 @@ interactions: to A and B thus: C: Will X please tell me the length of his or her hair 2 Now suppose X is aetually A, then A must answer. It is A''s", "venue": "", "year": 1950, "referenceCount": 6, "citationCount": 33, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "092da8384571c8261858e91e3278e765eedde1d5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "092da8384571c8261858e91e3278e765eedde1d5", "externalIds": {"MAG": "2092575189", "DBLP": "journals/jsyml/Turing48", "DOI": - "10.2307/2267329", "CorpusId": 5770563}, "url": "https://www.semanticscholar.org/paper/092da8384571c8261858e91e3278e765eedde1d5", + "10.2307/2267329", "CorpusId": 5770563}, "corpusId": 5770563, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/092da8384571c8261858e91e3278e765eedde1d5", "title": "Practical forms of type theory", "abstract": "Russell''s theory of types, though probably not providing the soundest possible foundation for mathematics, follows closely the outlook of most mathematicians. The present @@ -878,15 +941,20 @@ interactions: as well as in doctrine. It will not be necessary to adopt a formal logical notation to do so.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1948, "referenceCount": 121, "citationCount": 200, "influentialCitationCount": 21, - "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1948-06-01", "journal": {"volume": "13", "pages": "80 - 94", "name": "Journal - of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "65069064b19ec8244044311a2a90fbf2c9161675", "externalIds": {"DBLP": - "journals/jsyml/NewmanT42", "MAG": "1988522427", "DOI": "10.2307/2267552", - "CorpusId": 17917182}, "url": "https://www.semanticscholar.org/paper/65069064b19ec8244044311a2a90fbf2c9161675", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1948-06-01", "journal": {"volume": "13", "pages": "80 + - 94", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "65069064b19ec8244044311a2a90fbf2c9161675", + "externalIds": {"DBLP": "journals/jsyml/NewmanT42", "MAG": "1988522427", "DOI": + "10.2307/2267552", "CorpusId": 17917182}, "corpusId": 17917182, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/65069064b19ec8244044311a2a90fbf2c9161675", "title": "A formal theorem in Church''s theory of types", "abstract": "This note is concerned with the logical formalism with types recently introduced by Church [1] (and called (C) in this note) It was shewn in his paper (Theorem @@ -900,15 +968,21 @@ interactions: uses, in addition to Axioms 1 to 7 and Y\u03b9, also Axiom 9 (in connection with Def. 4), and Axiom 10 (in Theorem 9).", "venue": "Journal of Symbolic Logic (JSL)", "year": 1942, "referenceCount": 64, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1942-03-01", "journal": {"volume": "7", "pages": "28 - 33", "name": "Journal - of Symbolic Logic"}, "authors": [{"authorId": "143697232", "name": "M. Newman"}, - {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", - "externalIds": {"DBLP": "journals/jsyml/Turing42", "MAG": "2065302580", "DOI": - "10.2307/2268111", "CorpusId": 17112802}, "url": "https://www.semanticscholar.org/paper/7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1942-03-01", "journal": {"volume": + "7", "pages": "28 - 33", "name": "Journal of Symbolic Logic"}, "authors": + [{"authorId": "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": + "A. Turing"}]}, {"paperId": "7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "externalIds": + {"DBLP": "journals/jsyml/Turing42", "MAG": "2065302580", "DOI": "10.2307/2268111", + "CorpusId": 17112802}, "corpusId": 17112802, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "title": "The use of dots as brackets in Church''s system", "abstract": "Any logical system, if its use is to be carried beyond a rather elementary stage, needs powerful conventions about abbreviations: in particular one usually @@ -925,14 +999,15 @@ interactions: Quine''s, and Curry''s bracketing systems as well as to the present one.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1942, "referenceCount": 83, "citationCount": 193, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1942-12-01", "journal": {"volume": - "7", "pages": "146 - 156", "name": "Journal of Symbolic Logic"}, "authors": - [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "891151133781d3e78f19b882015746bafd9bc935", - "externalIds": {"DBLP": "journals/jsyml/Turing37a", "MAG": "2799201656", "CorpusId": - 33223540}, "url": "https://www.semanticscholar.org/paper/891151133781d3e78f19b882015746bafd9bc935", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1942-12-01", "journal": {"volume": "7", "pages": "146 - 156", "name": "Journal + of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "891151133781d3e78f19b882015746bafd9bc935", "externalIds": {"DBLP": + "journals/jsyml/Turing37a", "MAG": "2799201656", "CorpusId": 33223540}, "corpusId": + 33223540, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/891151133781d3e78f19b882015746bafd9bc935", "title": "The p-Function in \u03bb-K-Conversion", "abstract": "In the theory of conversion it is important to have a formally defined function which assigns to any positive integer n the least integer not less than n which has a given @@ -946,14 +1021,20 @@ interactions: that e conv Xu.u(e(u)), and consequently if M-<3(V) then M conv V(M). A formula with this property is,", "venue": "J. Symb. Log.", "year": 1937, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "2", "pages": "164", "name": - "J. Symb. Log."}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "b300783b3f3bd283ab1cf86b7a51f63469db380f", "externalIds": {"MAG": - "2798583139", "DOI": "10.2307/2268281", "CorpusId": 11473119}, "url": "https://www.semanticscholar.org/paper/b300783b3f3bd283ab1cf86b7a51f63469db380f", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"volume": "2", "pages": + "164", "name": "J. Symb. Log."}, "authors": [{"authorId": "2262347", "name": + "A. Turing"}]}, {"paperId": "b300783b3f3bd283ab1cf86b7a51f63469db380f", "externalIds": + {"MAG": "2798583139", "DOI": "10.2307/2268281", "CorpusId": 11473119}, "corpusId": + 11473119, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/b300783b3f3bd283ab1cf86b7a51f63469db380f", "title": "The \u00fe-function in \u03bb-K-conversion", "abstract": "In the theory of conversion it is important to have a formally defined function which assigns to any positive integer n the least integer not less than n which @@ -974,14 +1055,20 @@ interactions: n) is convertible to the formula representing the nth positive integer q for which T(q) conv 0.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1937, "referenceCount": 97, "citationCount": 35, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1937-12-01", "journal": {"volume": "2", "pages": - "164 - 164", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "ee8c779e7823814a5f1746d883ca77b26671b617", - "externalIds": {"DBLP": "journals/jsyml/Turing37", "MAG": "1485161910", "DOI": - "10.2307/2268280", "CorpusId": 2317046}, "url": "https://www.semanticscholar.org/paper/ee8c779e7823814a5f1746d883ca77b26671b617", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1937-12-01", + "journal": {"volume": "2", "pages": "164 - 164", "name": "Journal of Symbolic + Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": + "ee8c779e7823814a5f1746d883ca77b26671b617", "externalIds": {"DBLP": "journals/jsyml/Turing37", + "MAG": "1485161910", "DOI": "10.2307/2268280", "CorpusId": 2317046}, "corpusId": + 2317046, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/ee8c779e7823814a5f1746d883ca77b26671b617", "title": "Computability and \u03bb-definability", "abstract": "Several definitions have been given to express an exact meaning corresponding to the intuitive idea of \u2018effective calculability\u2019 as applied for instance to functions @@ -1003,16 +1090,16 @@ interactions: and p. 254. The proof that computability implies recursiveness requires no more knowledge of computable functions than the ideas underlying the definition: the technical details are recalled in \u00a75.", "venue": "Journal of Symbolic - Logic (JSL)", "year": 1937, "referenceCount": 6, "citationCount": 385, "influentialCitationCount": - 38, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + Logic (JSL)", "year": 1937, "referenceCount": 6, "citationCount": 386, "influentialCitationCount": + 38, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1937-12-01", "journal": {"volume": "2", "pages": "153 - 163", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "4d81ff79406cd02e064285e5f61e5b6bde68f5e7", "externalIds": {"CorpusId": - 18195327}, "url": "https://www.semanticscholar.org/paper/4d81ff79406cd02e064285e5f61e5b6bde68f5e7", + 18195327}, "corpusId": 18195327, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4d81ff79406cd02e064285e5f61e5b6bde68f5e7", "title": "Computing Machinery and Intelligence 1. the Imitation Game", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The @@ -1036,10 +1123,10 @@ interactions: to try and cause C to make the wrong identification. His answer might therefore be: \"My hair is shingled, and the longest strands are about nine inches long. \" 11", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}]} + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, + "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}]} ' headers: @@ -1048,31 +1135,31 @@ interactions: Connection: - keep-alive Content-Length: - - '83867' + - '90944' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 03:18:55 GMT + - Tue, 03 Jan 2023 20:49:20 GMT Via: - - 1.1 66e033c5d10bcbd4e2ec7dc233d3bb5a.cloudfront.net (CloudFront) + - 1.1 1854e234bfccfb7a387b67a7feff26d2.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - QFasLS_1rRjl3y-cwRuafYUNN9djTJ0Z3VUisiTJXsxYt82G1VSRpQ== + - zwGSDNG6xJAKdJ3vLzqcUQmcZIEhcgFpKHmbQOZKcU854as8ZNUugA== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - degs5HhGPHcF81g= + - eLwwjG-jvHcF3GQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '83867' + - '90944' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 03:18:55 GMT + - Tue, 03 Jan 2023 20:49:20 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 947888cd-bad9-469c-abd3-beb6872a4c58 + - 8d5b1c26-9082-41eb-8a3f-6f970fbb83f7 status: code: 200 message: OK diff --git a/tests/data/test_get_authors.yaml b/tests/data/test_get_authors.yaml index aa94349..5daea4c 100644 --- a/tests/data/test_get_authors.yaml +++ b/tests/data/test_get_authors.yaml @@ -13,14 +13,15 @@ interactions: User-Agent: - python-requests/2.28.1 method: POST - uri: https://api.semanticscholar.org/graph/v1/author/batch?&fields=affiliations,aliases,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url + uri: https://api.semanticscholar.org/graph/v1/author/batch?&fields=affiliations,aliases,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.corpusId,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.openAccessPdf,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.publicationVenue,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url response: body: string: '[{"authorId": "3234559", "externalIds": {}, "url": "https://www.semanticscholar.org/author/3234559", "name": "E. Dijkstra", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 0, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "2f0fe22f38231a16a049b4bb47b94f4e04d1630f", "externalIds": {"DBLP": "books/mc/22/Dijkstra22f", "DOI": "10.1145/3544585.3544605", - "CorpusId": 250497057}, "url": "https://www.semanticscholar.org/paper/2f0fe22f38231a16a049b4bb47b94f4e04d1630f", + "CorpusId": 250497057}, "corpusId": 250497057, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2f0fe22f38231a16a049b4bb47b94f4e04d1630f", "title": "The Structure of the \u201cTHE\u201d-Multiprogramming System", "abstract": "A multiprogramming system is described in which all activities are divided over a number of sequential processes. These sequential processes are placed @@ -29,13 +30,14 @@ interactions: verification of the logical soundness of the design and the correctness of its implementation.", "venue": "Edsger Wybe Dijkstra", "year": 2022, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": "2022-07-12", - "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "3680c166cfe9493c095a92966e777b153cb1d157", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": + "2022-07-12", "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3680c166cfe9493c095a92966e777b153cb1d157", "externalIds": {"DBLP": "books/mc/22/Dijkstra22h", "DOI": "10.1145/3544585.3544608", - "CorpusId": 250496901}, "url": "https://www.semanticscholar.org/paper/3680c166cfe9493c095a92966e777b153cb1d157", + "CorpusId": 250496901}, "corpusId": 250496901, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3680c166cfe9493c095a92966e777b153cb1d157", "title": "On the Reliability of Programs", "abstract": "The starting point of my considerations is to be found at the \u201csoftware failure\u201d. A few years ago the wide-spread existence of this regrettable phenomenon was @@ -46,14 +48,15 @@ interactions: ways. One of the most common forms starts with an exciting project, but as it proceeds, deadlines are violated and what started as a fascinating thriller", "venue": "Edsger Wybe Dijkstra", "year": 2022, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["Book"], "publicationDate": "2022-07-12", "journal": {"name": "Edsger Wybe - Dijkstra"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "6f777bd1429b75e9c34c53128c7ab1e7d0eee3a9", "externalIds": {"DBLP": - "books/mc/22/Dijkstra22g", "DOI": "10.1145/3544585.3544606", "CorpusId": 250497115}, - "url": "https://www.semanticscholar.org/paper/6f777bd1429b75e9c34c53128c7ab1e7d0eee3a9", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["Book"], "publicationDate": "2022-07-12", "journal": + {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "6f777bd1429b75e9c34c53128c7ab1e7d0eee3a9", + "externalIds": {"DBLP": "books/mc/22/Dijkstra22g", "DOI": "10.1145/3544585.3544606", + "CorpusId": 250497115}, "corpusId": 250497115, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6f777bd1429b75e9c34c53128c7ab1e7d0eee3a9", "title": "Self-stabilizing Systems in Spite of Distributed Control", "abstract": "The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed @@ -70,13 +73,14 @@ interactions: facil\u00ad ities are limited in the sense that each process can only exchange information", "venue": "Edsger Wybe Dijkstra", "year": 2022, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": "2022-07-12", - "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "aefa66c3f788ed459d799519a375f50d03d51d75", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": + "2022-07-12", "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "aefa66c3f788ed459d799519a375f50d03d51d75", "externalIds": {"MAG": "2983418616", "DBLP": "books/mc/22/Dijkstra22e", "DOI": - "10.1145/3544585.3544604", "CorpusId": 7749848}, "url": "https://www.semanticscholar.org/paper/aefa66c3f788ed459d799519a375f50d03d51d75", + "10.1145/3544585.3544604", "CorpusId": 7749848}, "corpusId": 7749848, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/aefa66c3f788ed459d799519a375f50d03d51d75", "title": "Go To Statement Considered Harmful", "abstract": "To many people, Dijkstra''s letter to the Editor of Communications of the A CM, published in March 1968, marks the true beginning of structured programming. That it @@ -98,13 +102,15 @@ interactions: or scientificoriented programmers, so it should be no surprise that their ideas have languished for so many years.", "venue": "Edsger Wybe Dijkstra", "year": 2022, "referenceCount": 5, "citationCount": 255, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://ir.cwi.nl/pub/28228/28228.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": "2022-07-12", "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "cda4a603343306a7e94794743c20367845ca7208", "externalIds": {"DBLP": "books/mc/22/DijkstraLMSS22", "DOI": "10.1145/3544585.3544607", - "CorpusId": 250497095}, "url": "https://www.semanticscholar.org/paper/cda4a603343306a7e94794743c20367845ca7208", + "CorpusId": 250497095}, "corpusId": 250497095, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cda4a603343306a7e94794743c20367845ca7208", "title": "On-the-Fly Garbage Collection: An Exercise in Cooperation", "abstract": "As an example of cooperation between sequential processes with very little mutual interference despite frequent manipulations of a large shared data @@ -114,51 +120,54 @@ interactions: proper. Exclusion and synchronization constraints have been kept as weak as could be achieved; the severe complexities engendered by doing so are illustrated.", "venue": "Edsger Wybe Dijkstra", "year": 2022, "referenceCount": 4, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Book"], "publicationDate": "2022-07-12", "journal": - {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}, {"authorId": "1679622", "name": "L. Lamport"}, {"authorId": - "2176145562", "name": "A.J. Martin"}, {"authorId": "2755537", "name": "C. - S. Scholten"}, {"authorId": "7711291", "name": "Elisabeth F. M. Steffens"}]}, - {"paperId": "d9c64136711b962745aacef2818de2479fd93fac", "externalIds": {"DBLP": - "books/mc/AH2022", "DOI": "10.1145/3544585", "CorpusId": 250497032}, "url": - "https://www.semanticscholar.org/paper/d9c64136711b962745aacef2818de2479fd93fac", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": + "2022-07-12", "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}, {"authorId": "1679622", "name": "L. Lamport"}, + {"authorId": "2176145562", "name": "A.J. Martin"}, {"authorId": "2755537", + "name": "C. S. Scholten"}, {"authorId": "7711291", "name": "Elisabeth F. M. + Steffens"}]}, {"paperId": "d9c64136711b962745aacef2818de2479fd93fac", "externalIds": + {"DBLP": "books/mc/AH2022", "DOI": "10.1145/3544585", "CorpusId": 250497032}, + "corpusId": 250497032, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d9c64136711b962745aacef2818de2479fd93fac", "title": "Edsger Wybe Dijkstra: His Life,Work, and Legacy", "abstract": "reduction systems, 172\u2013173 Abstraction, 14, 146, 415ion, 14, 146, 415 Acceptance test, 306 Action specifications, 73", "venue": "Edsger Wybe Dijkstra", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": - "2022-07-12", "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": - "1748061", "name": "K. Apt"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "ece4398a6ef3040ad263fa050b39b673d56b86bb", "externalIds": {"DBLP": - "books/mc/22/Dijkstra22d", "DOI": "10.1145/3544585.3544603", "CorpusId": 250497002}, - "url": "https://www.semanticscholar.org/paper/ece4398a6ef3040ad263fa050b39b673d56b86bb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["Book"], "publicationDate": "2022-07-12", "journal": {"name": "Edsger Wybe + Dijkstra"}, "authors": [{"authorId": "1748061", "name": "K. Apt"}, {"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "ece4398a6ef3040ad263fa050b39b673d56b86bb", + "externalIds": {"DBLP": "books/mc/22/Dijkstra22d", "DOI": "10.1145/3544585.3544603", + "CorpusId": 250497002}, "corpusId": 250497002, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ece4398a6ef3040ad263fa050b39b673d56b86bb", "title": "Solution of a Problem in Concurrent Programming Control", "abstract": "A number of mainly independent sequential-cyclic processes with restricted means of communication with each other can be made in such a way that at any moment one and only one of them is engaged in the \u201ccritical section\u201d of its cycle.", "venue": "Edsger Wybe Dijkstra", "year": 2022, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["Book"], "publicationDate": "2022-07-12", "journal": - {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "f0758695650dd10c086e2490c83e973efff83a02", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": + "2022-07-12", "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f0758695650dd10c086e2490c83e973efff83a02", "externalIds": {"DBLP": "books/mc/22/Dijkstra22", "DOI": "10.1145/3544585.3544588", - "CorpusId": 250497003}, "url": "https://www.semanticscholar.org/paper/f0758695650dd10c086e2490c83e973efff83a02", + "CorpusId": 250497003}, "corpusId": 250497003, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f0758695650dd10c086e2490c83e973efff83a02", "title": "The Humble Programmer", "abstract": null, "venue": "Edsger Wybe Dijkstra", "year": 2022, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["Book"], "publicationDate": "2022-07-12", "journal": {"name": "Edsger Wybe - Dijkstra"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "ff5f9f796a8e0f1908423fab7bebd63f3a8e2f76", "externalIds": {"DBLP": - "books/mc/22/Dijkstra22b", "MAG": "2913888506", "DOI": "10.1145/3544585.3544601", - "CorpusId": 127891023}, "url": "https://www.semanticscholar.org/paper/ff5f9f796a8e0f1908423fab7bebd63f3a8e2f76", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["Book"], "publicationDate": "2022-07-12", + "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "ff5f9f796a8e0f1908423fab7bebd63f3a8e2f76", + "externalIds": {"DBLP": "books/mc/22/Dijkstra22b", "MAG": "2913888506", "DOI": + "10.1145/3544585.3544601", "CorpusId": 127891023}, "corpusId": 127891023, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ff5f9f796a8e0f1908423fab7bebd63f3a8e2f76", "title": "Recursive Programming", "abstract": "ously, and the available memory space is therefore used rather uneconomically. Furthermore\u2014and this is a more serious objection\u2014it is then impossible to call in a subroutine @@ -176,43 +185,46 @@ interactions: day computer, may give a hint in which direction future design might go. Recursive Programming", "venue": "Edsger Wybe Dijkstra", "year": 1960, "referenceCount": 0, "citationCount": 70, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Book"], "publicationDate": "1960-12-01", "journal": - {"volume": "2", "pages": "312-318", "name": "Numerische Mathematik"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "623d46aa5f37b4d9637822ab5ef1eb70a594ed72", - "externalIds": {"MAG": "3126781075", "DOI": "10.7551/MITPRESS/12274.003.0030", - "CorpusId": 234065408}, "url": "https://www.semanticscholar.org/paper/623d46aa5f37b4d9637822ab5ef1eb70a594ed72", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": + "1960-12-01", "journal": {"volume": "2", "pages": "312-318", "name": "Numerische + Mathematik"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "623d46aa5f37b4d9637822ab5ef1eb70a594ed72", "externalIds": {"MAG": + "3126781075", "DOI": "10.7551/MITPRESS/12274.003.0030", "CorpusId": 234065408}, + "corpusId": 234065408, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/623d46aa5f37b4d9637822ab5ef1eb70a594ed72", "title": "The Structure of the \u201cTHE\u201d-Multiprogramming System (1968)", "abstract": null, "venue": "", "year": 2021, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-02-02", "journal": {"volume": - "", "pages": "279-288", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "6ca00d277ce079835ab4fc88e4b09fc704a9453f", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-02", + "journal": {"volume": "", "pages": "279-288", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "6ca00d277ce079835ab4fc88e4b09fc704a9453f", "externalIds": {"MAG": "3126234776", "DOI": "10.7551/MITPRESS/12274.003.0031", - "CorpusId": 234019914}, "url": "https://www.semanticscholar.org/paper/6ca00d277ce079835ab4fc88e4b09fc704a9453f", + "CorpusId": 234019914}, "corpusId": 234019914, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6ca00d277ce079835ab4fc88e4b09fc704a9453f", "title": "Go To Statement Considered Harmful (1968)", "abstract": null, "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ir.cwi.nl/pub/28228/28228.pdf", + "status": null}, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-02", "journal": {"volume": "", "pages": "289-292", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "97573024feece7e23d33815d86f01a9824cf2a0a", "externalIds": {"MAG": "3128401088", "DOI": "10.7551/MITPRESS/12274.003.0028", "CorpusId": 234014414}, - "url": "https://www.semanticscholar.org/paper/97573024feece7e23d33815d86f01a9824cf2a0a", + "corpusId": 234014414, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/97573024feece7e23d33815d86f01a9824cf2a0a", "title": "Solution of a Problem in Concurrent Program Control (1965)", "abstract": null, "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-02-02", "journal": {"volume": - "", "pages": "267-270", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "c928e74d6ebbcbcd3dd0ef0f50fc79c1ed0d4384", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-02", + "journal": {"volume": "", "pages": "267-270", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "c928e74d6ebbcbcd3dd0ef0f50fc79c1ed0d4384", "externalIds": {"MAG": "322299264", "DOI": "10.2307/j.ctv7vct1x.11", "CorpusId": - 60050425}, "url": "https://www.semanticscholar.org/paper/c928e74d6ebbcbcd3dd0ef0f50fc79c1ed0d4384", + 60050425}, "corpusId": 60050425, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c928e74d6ebbcbcd3dd0ef0f50fc79c1ed0d4384", "title": "THE NEXT FIFTY YEARS:", "abstract": "A latch mechanism for use with a tiltable seat having the forward end thereof supported by a base for movement about a transverse horizontal axis. The latch mechanism includes a pair of @@ -225,11 +237,12 @@ interactions: to be spread apart against the bias of the spring so as to place the lock members in an unlocked position.", "venue": "Contested City", "year": 2019, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", - "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Contested - City"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "17d1a7da2067981eb7abe9b778e1c8a0635deaf6", "externalIds": {"CorpusId": 230344146}, + false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": + [{"category": "Geology", "source": "external"}, {"category": "Geology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "Contested City"}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "17d1a7da2067981eb7abe9b778e1c8a0635deaf6", "externalIds": + {"CorpusId": 230344146}, "corpusId": 230344146, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/17d1a7da2067981eb7abe9b778e1c8a0635deaf6", "title": "On the cruelty of really teaching computing science", "abstract": "The second part of this talk pursues some of the scientific and educational @@ -239,11 +252,11 @@ interactions: do so in the first part of this talk, in which we shall furthermore supply evidence in support of our assumption.", "venue": "", "year": 2018, "referenceCount": 0, "citationCount": 103, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "e58a478987da4359ab7a72929192a86a98a14d0e", "externalIds": {"CorpusId": 53650627}, - "url": "https://www.semanticscholar.org/paper/e58a478987da4359ab7a72929192a86a98a14d0e", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "e58a478987da4359ab7a72929192a86a98a14d0e", "externalIds": {"CorpusId": + 53650627}, "corpusId": 53650627, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e58a478987da4359ab7a72929192a86a98a14d0e", "title": "Formal Verification Proving", "abstract": "This paper reports on the development and formal certification (proof of semantic preservation) of a compiler from Cminor (a Clike imperative language) to PowerPC assembly @@ -253,22 +266,24 @@ interactions: of the compiler guarantees that the safety properties proved on the source code hold for the executable compiled code as well.", "venue": "", "year": 2018, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "3203642", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3203642", "name": "Ilya Sergey"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f11084df0d0c90f3cd952ec4a31a989a77ce3d2d", "externalIds": {"DOI": - "10.1201/9781439864487-17", "CorpusId": 240065387}, "url": "https://www.semanticscholar.org/paper/f11084df0d0c90f3cd952ec4a31a989a77ce3d2d", + "10.1201/9781439864487-17", "CorpusId": 240065387}, "corpusId": 240065387, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f11084df0d0c90f3cd952ec4a31a989a77ce3d2d", "title": "Artificial Intelligence", "abstract": null, "venue": "The Most Complex Machine", "year": 2018, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2018-10-08", "journal": {"name": "The Most Complex - Machine"}, "authors": [{"authorId": "2696727", "name": "M. Bilgic"}, {"authorId": - "2135729881", "name": "Email Filtering"}, {"authorId": "2135724990", "name": - "SELF-DRIVING Cars"}, {"authorId": "2135683701", "name": "Google Deepmind"}, - {"authorId": "2135365427", "name": "A. G. Read"}, {"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "eae483af40defc3e94db87238fc9324c3ff22bf0", - "externalIds": {"CorpusId": 102488993}, "url": "https://www.semanticscholar.org/paper/eae483af40defc3e94db87238fc9324c3ff22bf0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2018-10-08", "journal": + {"name": "The Most Complex Machine"}, "authors": [{"authorId": "2696727", + "name": "M. Bilgic"}, {"authorId": "2135729881", "name": "Email Filtering"}, + {"authorId": "2135724990", "name": "SELF-DRIVING Cars"}, {"authorId": "2135683701", + "name": "Google Deepmind"}, {"authorId": "2135365427", "name": "A. G. Read"}, + {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "eae483af40defc3e94db87238fc9324c3ff22bf0", + "externalIds": {"CorpusId": 102488993}, "corpusId": 102488993, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/eae483af40defc3e94db87238fc9324c3ff22bf0", "title": "Can Some Programming Languages Be Considered Harmful?", "abstract": "Programming languages are not uniformly perceived by the software engineering community: some are respected, others are hated, some have a devoted following, @@ -287,19 +302,21 @@ interactions: development techniques; Programming teams; \u2022 Social and professional topics \u2192 Computing literacy;", "venue": "", "year": 2017, "referenceCount": 73, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, - {"authorId": "2067611633", "name": "Sabine Janssens"}, {"authorId": "1771018", - "name": "U. Schultz"}, {"authorId": "145543743", "name": "V. Zaytsev"}]}, - {"paperId": "33c54e32de1becabaee001bac190ea299e8a041a", "externalIds": {"CorpusId": - 209365981}, "url": "https://www.semanticscholar.org/paper/33c54e32de1becabaee001bac190ea299e8a041a", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}, {"authorId": "2067611633", "name": "Sabine Janssens"}, + {"authorId": "1771018", "name": "U. Schultz"}, {"authorId": "145543743", "name": + "V. Zaytsev"}]}, {"paperId": "33c54e32de1becabaee001bac190ea299e8a041a", "externalIds": + {"CorpusId": 209365981}, "corpusId": 209365981, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/33c54e32de1becabaee001bac190ea299e8a041a", "title": "On Blocking and Skelton Detection Techniques", "abstract": null, "venue": "", "year": 2016, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "6f76cf9ab1ff68c91e37a4eb12772bc47775d0c8", - "externalIds": {"CorpusId": 249978559}, "url": "https://www.semanticscholar.org/paper/6f76cf9ab1ff68c91e37a4eb12772bc47775d0c8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "6f76cf9ab1ff68c91e37a4eb12772bc47775d0c8", + "externalIds": {"CorpusId": 249978559}, "corpusId": 249978559, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6f76cf9ab1ff68c91e37a4eb12772bc47775d0c8", "title": "A SYNTAX DIRECTED APPROACH TO EXPLOIT PARALLELISM IN XML-QUERY LANGUAGES", "abstract": "The syntax analysis is a fundamental process to perform translation and parsing of a written text, determining the structure by the definition @@ -330,11 +347,12 @@ interactions: performance can be improved albeit maintaining a general purpose approach against special purpose examples.", "venue": "", "year": 2015, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "76f19a5d7fd2e7df5b169b6f1445b421199f9478", "externalIds": {"CorpusId": - 160003539}, "url": "https://www.semanticscholar.org/paper/76f19a5d7fd2e7df5b169b6f1445b421199f9478", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "76f19a5d7fd2e7df5b169b6f1445b421199f9478", + "externalIds": {"CorpusId": 160003539}, "corpusId": 160003539, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/76f19a5d7fd2e7df5b169b6f1445b421199f9478", "title": "Numerical Implementations of the Generalized Minimal Residual Method ( GMRES )", "abstract": "Division of Numerical Analysis Centre for Mathematical Sciences Bachelor of Science Numerical Implementations of the Generalized @@ -352,20 +370,22 @@ interactions: algorithm against each other by using it as a solver in simulations mirroring real-world applications.", "venue": "", "year": 2015, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "56d0a1a31bc644cac116eb2abcf6af72ad9bac60", "externalIds": {"MAG": - "2623419845", "CorpusId": 184774732}, "url": "https://www.semanticscholar.org/paper/56d0a1a31bc644cac116eb2abcf6af72ad9bac60", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "56d0a1a31bc644cac116eb2abcf6af72ad9bac60", + "externalIds": {"MAG": "2623419845", "CorpusId": 184774732}, "corpusId": 184774732, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/56d0a1a31bc644cac116eb2abcf6af72ad9bac60", "title": "Help, de Chinezen komen - The Post Online", "abstract": null, "venue": "", "year": 2014, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2014-11-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "52111466", "name": "G. Vanrossum"}, {"authorId": - "153346125", "name": "L. Meertens"}, {"authorId": "146560522", "name": "D. - vanDantzig"}, {"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": - "72294164", "name": "Cwi Cwi"}]}, {"paperId": "6b57dbae6e0de800e6edae467ed8950ed969aa45", - "externalIds": {"CorpusId": 9224649}, "url": "https://www.semanticscholar.org/paper/6b57dbae6e0de800e6edae467ed8950ed969aa45", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2014-11-01", "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52111466", "name": "G. + Vanrossum"}, {"authorId": "153346125", "name": "L. Meertens"}, {"authorId": + "146560522", "name": "D. vanDantzig"}, {"authorId": "3234559", "name": "E. + Dijkstra"}, {"authorId": "72294164", "name": "Cwi Cwi"}]}, {"paperId": "6b57dbae6e0de800e6edae467ed8950ed969aa45", + "externalIds": {"CorpusId": 9224649}, "corpusId": 9224649, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6b57dbae6e0de800e6edae467ed8950ed969aa45", "title": "EE Framework of Theories GENERIC GOAL F 1 , F 2", "abstract": "Subjects live with objects1: they observe objects, create objects, and use objects. The \u03c4-theory (the Greek letter \u201c\u03c4\u201d is pronounced as \u201cTAO\u201d, @@ -400,24 +420,25 @@ interactions: because the height of its surface (property) fits your purpose. In order to refer to this affordance, Gibson would say that the tree-stump is \u2018sit-on-able\u2019 for you.", "venue": "", "year": 2014, "referenceCount": 16, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "38520749", "name": "C. W. Morris"}, {"authorId": "143922850", - "name": "M. Bunge"}, {"authorId": "46178748", "name": "L. Wittgenstein"}, - {"authorId": "34796922", "name": "J. Sowa"}, {"authorId": "143928671", "name": - "P. Simons"}, {"authorId": "52398400", "name": "M. Heidegger"}, {"authorId": - "2053038069", "name": "K. H. Marx"}, {"authorId": "2058365817", "name": "J. - Austin"}, {"authorId": "34493294", "name": "J. Searle"}, {"authorId": "122270112", - "name": "J. Habermas"}, {"authorId": "2119950", "name": "P. Checkland"}, {"authorId": - "2667178", "name": "B. Langefors"}, {"authorId": "81566543", "name": "J. R. - Taylor"}, {"authorId": "2055346926", "name": "H. Simon"}, {"authorId": "16752671", - "name": "L. Bertalanffy"}, {"authorId": "3234559", "name": "E. Dijkstra"}, - {"authorId": "2067458064", "name": "P. Drucker"}, {"authorId": "13000615", - "name": "R. Likert"}, {"authorId": "46284253", "name": "D. McGregor"}, {"authorId": - "2059295146", "name": "D. Katz"}, {"authorId": "48977265", "name": "R. Kahn"}]}, - {"paperId": "8706cf38624d4081bfb8ef3f35ece9c5567d2867", "externalIds": {"MAG": - "2120311777", "CorpusId": 62188221}, "url": "https://www.semanticscholar.org/paper/8706cf38624d4081bfb8ef3f35ece9c5567d2867", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "38520749", "name": "C. W. Morris"}, + {"authorId": "143922850", "name": "M. Bunge"}, {"authorId": "46178748", "name": + "L. Wittgenstein"}, {"authorId": "34796922", "name": "J. Sowa"}, {"authorId": + "143928671", "name": "P. Simons"}, {"authorId": "52398400", "name": "M. Heidegger"}, + {"authorId": "2053038069", "name": "K. H. Marx"}, {"authorId": "2058365817", + "name": "J. Austin"}, {"authorId": "34493294", "name": "J. Searle"}, {"authorId": + "122270112", "name": "J. Habermas"}, {"authorId": "2119950", "name": "P. Checkland"}, + {"authorId": "2667178", "name": "B. Langefors"}, {"authorId": "81566543", + "name": "J. R. Taylor"}, {"authorId": "2055346926", "name": "H. Simon"}, {"authorId": + "16752671", "name": "L. Bertalanffy"}, {"authorId": "3234559", "name": "E. + Dijkstra"}, {"authorId": "2067458064", "name": "P. Drucker"}, {"authorId": + "13000615", "name": "R. Likert"}, {"authorId": "46284253", "name": "D. McGregor"}, + {"authorId": "2059295146", "name": "D. Katz"}, {"authorId": "48977265", "name": + "R. Kahn"}]}, {"paperId": "8706cf38624d4081bfb8ef3f35ece9c5567d2867", "externalIds": + {"MAG": "2120311777", "CorpusId": 62188221}, "corpusId": 62188221, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8706cf38624d4081bfb8ef3f35ece9c5567d2867", "title": "The Origin of Concurrent Programming: From Semaphores to Remote Procedure Calls", "abstract": "From the Publisher: \nThis book is a collection of original papers written by the computer scientists who made the major breakthroughs @@ -441,13 +462,15 @@ interactions: development of concurrent programming. It is an invaluable resource for students, researchers and professionals who are familiar with operating system principles.", "venue": "", "year": 2013, "referenceCount": 0, "citationCount": 32, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2013-06-29", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1700875", "name": "P. B. Hansen"}, {"authorId": "3234559", "name": "E. Dijkstra"}, - {"authorId": "144861543", "name": "C. Hoare"}]}, {"paperId": "43715d342a9e413d9e7618ea90dac9de7e5c125c", - "externalIds": {"CorpusId": 48554715}, "url": "https://www.semanticscholar.org/paper/43715d342a9e413d9e7618ea90dac9de7e5c125c", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-06-29", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1700875", "name": "P. B. Hansen"}, + {"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "144861543", + "name": "C. Hoare"}]}, {"paperId": "43715d342a9e413d9e7618ea90dac9de7e5c125c", + "externalIds": {"CorpusId": 48554715}, "corpusId": 48554715, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/43715d342a9e413d9e7618ea90dac9de7e5c125c", "title": "2011 Edsger W. Dijkstra Prize in Distributed Computing Sharing Memory Robustly in Message-passing Systems", "abstract": "In 1985 Fischer, Lynch, and Paterson (FLP) proved that consensus is not attainable in asynchronous @@ -458,20 +481,23 @@ interactions: message-passing systems with failures. Hagit Attiya, Amotz Bar-Noy, and Danny Dolev\u2019s paper (ABD) answered this fundamental question affirmatively.", "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "144142235", "name": "H. Attiya"}, {"authorId": "1397925673", "name": "A. Bar-Noy"}, {"authorId": "1740191", "name": "D. Dolev"}]}, {"paperId": "978d1b4a018c8c12ccf0f49cb0f7673656049898", "externalIds": {"MAG": - "2531761994", "CorpusId": 64525039}, "url": "https://www.semanticscholar.org/paper/978d1b4a018c8c12ccf0f49cb0f7673656049898", + "2531761994", "CorpusId": 64525039}, "corpusId": 64525039, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/978d1b4a018c8c12ccf0f49cb0f7673656049898", "title": "Object-Oriented Analysis and Design", "abstract": null, "venue": "", "year": 2011, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "67eedee3799a3b730e39d56841dc6789f233db84", - "externalIds": {"MAG": "2158436149", "CorpusId": 170425081}, "url": "https://www.semanticscholar.org/paper/67eedee3799a3b730e39d56841dc6789f233db84", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "67eedee3799a3b730e39d56841dc6789f233db84", "externalIds": + {"MAG": "2158436149", "CorpusId": 170425081}, "corpusId": 170425081, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/67eedee3799a3b730e39d56841dc6789f233db84", "title": "On the theorem of Pythagoras (EWD 975)", "abstract": "Edsger Wybe Dijkstra (1930\u20132002) is een informatica-icoon met een heel eigen plek. Van oorsprong theoretisch fysicus, werd hij in 1952 de eerste Nederlandse @@ -489,11 +515,12 @@ interactions: stapjes te construeren uit de wiskundige specificatie, verkrijgt men een gegarandeerd correct product. De bijdrage die volgt is een manuscript uit zijn EWD-serie [1].", "venue": "", "year": 2009, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "aab2e7dcfa3e92ec456c3a6b93b300efad9367fe", - "externalIds": {"CorpusId": 17530755}, "url": "https://www.semanticscholar.org/paper/aab2e7dcfa3e92ec456c3a6b93b300efad9367fe", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "aab2e7dcfa3e92ec456c3a6b93b300efad9367fe", "externalIds": {"CorpusId": + 17530755}, "corpusId": 17530755, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aab2e7dcfa3e92ec456c3a6b93b300efad9367fe", "title": "A Case for Agents", "abstract": "Many hackers worldwide would agree that, had it not been for adaptive algorithms, the investigation of compilers might never have occurred. In fact, few scholars would disagree with the key @@ -502,13 +529,14 @@ interactions: algorithm for the visualization of journaling file systems by Noam Chomsky et al. is in Co-NP [15].", "venue": "", "year": 2009, "referenceCount": 17, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1733249", "name": "P. Naur"}, {"authorId": - "3204521", "name": "D. Engelbart"}, {"authorId": "2102406389", "name": "Stephen - A. Dymarcik"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "3889e94d1a0a7181259c434520a75248f852f895", "externalIds": {"CorpusId": 14590028}, - "url": "https://www.semanticscholar.org/paper/3889e94d1a0a7181259c434520a75248f852f895", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1733249", + "name": "P. Naur"}, {"authorId": "3204521", "name": "D. Engelbart"}, {"authorId": + "2102406389", "name": "Stephen A. Dymarcik"}, {"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "3889e94d1a0a7181259c434520a75248f852f895", + "externalIds": {"CorpusId": 14590028}, "corpusId": 14590028, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3889e94d1a0a7181259c434520a75248f852f895", "title": "User-Centered Design Considered Harmful 1 ( with apologies to", "abstract": "Studies of IT for development have often identiaed the importance of the usability of IT systems and the need for IT systems to be matched to @@ -527,12 +555,13 @@ interactions: discussed, this is a necessarily selective report focusing on some of the principal themes of the workshop.", "venue": "", "year": 2008, "referenceCount": 37, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2199747", "name": - "N. Wirth"}, {"authorId": "2058096432", "name": "Don Norman"}]}, {"paperId": - "484f6fb12793c48b2c5cb102a8580767b2a9cb8a", "externalIds": {"DOI": "10.1201/9781315218168-12", - "CorpusId": 14695822}, "url": "https://www.semanticscholar.org/paper/484f6fb12793c48b2c5cb102a8580767b2a9cb8a", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, + {"authorId": "2199747", "name": "N. Wirth"}, {"authorId": "2058096432", "name": + "Don Norman"}]}, {"paperId": "484f6fb12793c48b2c5cb102a8580767b2a9cb8a", "externalIds": + {"DOI": "10.1201/9781315218168-12", "CorpusId": 14695822}, "corpusId": 14695822, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/484f6fb12793c48b2c5cb102a8580767b2a9cb8a", "title": "Software Verification", "abstract": "When a technology reaches a higher level of maturity, its development begins to diversify and to differentiate. In 1885 engineers were happy to build the first car powered by a gasoline @@ -560,19 +589,22 @@ interactions: of program verification, we need to have an idea to what use it shall be put. Here is a first coarse classification of the use cases of formal methods in programming:", "venue": "", "year": 2008, "referenceCount": 11, "citationCount": - 22, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "4e9cdb9e3fc8530ccf73ffdb2ffa18b07d06c70d", - "externalIds": {"MAG": "1504094020", "CorpusId": 60614703}, "url": "https://www.semanticscholar.org/paper/4e9cdb9e3fc8530ccf73ffdb2ffa18b07d06c70d", + 22, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "4e9cdb9e3fc8530ccf73ffdb2ffa18b07d06c70d", "externalIds": {"MAG": + "1504094020", "CorpusId": 60614703}, "corpusId": 60614703, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4e9cdb9e3fc8530ccf73ffdb2ffa18b07d06c70d", "title": "A look back at) go to statement considered harmful", "abstract": null, "venue": "", "year": 2008, "referenceCount": 0, "citationCount": 2, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "51", "pages": "7-9", "name": "Communications of The ACM"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "20e6bffec2620171aae5e3a703c8eadf1ec63365", - "externalIds": {"CorpusId": 15975882}, "url": "https://www.semanticscholar.org/paper/20e6bffec2620171aae5e3a703c8eadf1ec63365", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "51", "pages": "7-9", "name": "Communications + of The ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "20e6bffec2620171aae5e3a703c8eadf1ec63365", "externalIds": {"CorpusId": + 15975882}, "corpusId": 15975882, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/20e6bffec2620171aae5e3a703c8eadf1ec63365", "title": "Reliability of Complex Services", "abstract": "In the relatively young history of computers, their capability has grown at an exponential rate \u2013 both in hardware (see Moore\u2019s Law), and in software. Naturally, @@ -595,134 +627,180 @@ interactions: various faults, in a manner not applied to older technologies, like land-line phone service or automobiles.", "venue": "", "year": 2006, "referenceCount": 26, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "16966b1606e7690b3483e5532cd1152449bc6d8c", "externalIds": {"DBLP": - "journals/sigops/Dijkstra05", "MAG": "1602299730", "DOI": "10.1145/1055218.1055219", - "CorpusId": 32575279}, "url": "https://www.semanticscholar.org/paper/16966b1606e7690b3483e5532cd1152449bc6d8c", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "16966b1606e7690b3483e5532cd1152449bc6d8c", + "externalIds": {"DBLP": "journals/sigops/Dijkstra05", "MAG": "1602299730", + "DOI": "10.1145/1055218.1055219", "CorpusId": 32575279}, "corpusId": 32575279, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/16966b1606e7690b3483e5532cd1152449bc6d8c", "title": "My recollections of operating system design", "abstract": null, "venue": "OPSR", "year": 2005, "referenceCount": 0, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"volume": "39", "pages": - "4-40", "name": "ACM SIGOPS Oper. Syst. Rev."}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "bc0ef0c4a0cb4b84fdc83774c18af00f80bbb6b9", - "externalIds": {"DBLP": "journals/dc/Dijkstra86", "MAG": "2055164757", "DOI": - "10.1007/BF01843566", "CorpusId": 28387702}, "url": "https://www.semanticscholar.org/paper/bc0ef0c4a0cb4b84fdc83774c18af00f80bbb6b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, + "journal": {"volume": "39", "pages": "4-40", "name": "ACM SIGOPS Oper. Syst. + Rev."}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "bc0ef0c4a0cb4b84fdc83774c18af00f80bbb6b9", "externalIds": {"DBLP": "journals/dc/Dijkstra86", + "MAG": "2055164757", "DOI": "10.1007/BF01843566", "CorpusId": 28387702}, "corpusId": + 28387702, "publicationVenue": {"id": "3659177c-197e-45d7-9c41-0bc75a2a3aa4", + "name": "Distributed computing", "type": "journal", "alternate_names": ["Distrib + comput", "Distributed Computing", "Distrib Comput"], "issn": "0178-2770", + "url": "https://www.springer.com/computer/communication+networks/journal/446", + "alternate_urls": ["https://link.springer.com/journal/446", "http://www.springer.com/computer/communications/journal/446", + "http://www.springer.com/computer/communication+networks/journal/446"]}, "url": + "https://www.semanticscholar.org/paper/bc0ef0c4a0cb4b84fdc83774c18af00f80bbb6b9", "title": "A belated proof of self-stabilization", "abstract": null, "venue": "Distributed computing", "year": 2005, "referenceCount": 1, "citationCount": - 88, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"volume": "1", "pages": "5-6", "name": "Distributed Computing"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "4c61b83b56031dbb600661c47feca5c85884c906", - "externalIds": {"MAG": "2011286680", "DBLP": "journals/acta/Dijkstra76", "DOI": - "10.1007/BF00268136", "CorpusId": 7085805}, "url": "https://www.semanticscholar.org/paper/4c61b83b56031dbb600661c47feca5c85884c906", + 88, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"volume": "1", "pages": "5-6", "name": "Distributed Computing"}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "4c61b83b56031dbb600661c47feca5c85884c906", "externalIds": {"MAG": "2011286680", + "DBLP": "journals/acta/Dijkstra76", "DOI": "10.1007/BF00268136", "CorpusId": + 7085805}, "corpusId": 7085805, "publicationVenue": {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", + "name": "Acta Informatica", "type": "journal", "alternate_names": ["Acta Inform"], + "issn": "0001-5903", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/4c61b83b56031dbb600661c47feca5c85884c906", "title": "On a gauntlet thrown by David Gries", "abstract": null, "venue": "Acta Informatica", "year": 1976, "referenceCount": 0, "citationCount": 2, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1976-12-01", "journal": {"volume": - "6", "pages": "357-359", "name": "Acta Informatica"}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "79c23e050eb4039b31109c2524d6876306266061", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1976-12-01", "journal": + {"volume": "6", "pages": "357-359", "name": "Acta Informatica"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "79c23e050eb4039b31109c2524d6876306266061", "externalIds": {"MAG": "2135436879", "DBLP": "journals/acta/Dijkstra80", "DOI": - "10.1007/BF00288531", "CorpusId": 9394108}, "url": "https://www.semanticscholar.org/paper/79c23e050eb4039b31109c2524d6876306266061", + "10.1007/BF00288531", "CorpusId": 9394108}, "corpusId": 9394108, "publicationVenue": + {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", "name": "Acta Informatica", + "type": "journal", "alternate_names": ["Acta Inform"], "issn": "0001-5903", + "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/79c23e050eb4039b31109c2524d6876306266061", "title": "Some beautiful arguments using mathematical induction", "abstract": null, "venue": "Acta Informatica", "year": 2004, "referenceCount": 0, "citationCount": - 26, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "13", "pages": "1-8", "name": - "Acta Informatica"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "d1ecd587f7f7b58f471341e7866ec29caa9a1a04", "externalIds": {"MAG": - "2065067715", "DBLP": "journals/acta/DijkstraG86", "DOI": "10.1007/BF00268074", - "CorpusId": 27732111}, "url": "https://www.semanticscholar.org/paper/d1ecd587f7f7b58f471341e7866ec29caa9a1a04", + 26, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"volume": "13", "pages": "1-8", "name": "Acta Informatica"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "d1ecd587f7f7b58f471341e7866ec29caa9a1a04", + "externalIds": {"MAG": "2065067715", "DBLP": "journals/acta/DijkstraG86", + "DOI": "10.1007/BF00268074", "CorpusId": 27732111}, "corpusId": 27732111, + "publicationVenue": {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", "name": + "Acta Informatica", "type": "journal", "alternate_names": ["Acta Inform"], + "issn": "0001-5903", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/d1ecd587f7f7b58f471341e7866ec29caa9a1a04", "title": "A simple fixpoint argument without the restriction to continuity", "abstract": null, "venue": "Acta Informatica", "year": 1986, "referenceCount": 10, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1986-04-01", "journal": {"volume": - "23", "pages": "1-7", "name": "Acta Informatica"}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}, {"authorId": "1685361", "name": "A. V. - Gasteren"}]}, {"paperId": "ff568f642a545c7d62df73e7798e3d008b509ea5", "externalIds": - {"MAG": "2094159214", "DBLP": "journals/acta/Dijkstra71", "DOI": "10.1007/BF00289519", - "CorpusId": 31573213}, "url": "https://www.semanticscholar.org/paper/ff568f642a545c7d62df73e7798e3d008b509ea5", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1986-04-01", "journal": {"volume": "23", "pages": "1-7", "name": "Acta Informatica"}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "1685361", + "name": "A. V. Gasteren"}]}, {"paperId": "ff568f642a545c7d62df73e7798e3d008b509ea5", + "externalIds": {"MAG": "2094159214", "DBLP": "journals/acta/Dijkstra71", "DOI": + "10.1007/BF00289519", "CorpusId": 31573213}, "corpusId": 31573213, "publicationVenue": + {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", "name": "Acta Informatica", + "type": "journal", "alternate_names": ["Acta Inform"], "issn": "0001-5903", + "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/ff568f642a545c7d62df73e7798e3d008b509ea5", "title": "Hierarchical ordering of sequential processes", "abstract": null, "venue": "Acta Informatica", "year": 1971, "referenceCount": 2, "citationCount": - 511, "influentialCitationCount": 25, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1971-06-01", "journal": - {"volume": "1", "pages": "115-138", "name": "Acta Informatica"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3c50e28e636ade2df8513e30bf7604069bbdaa6d", - "externalIds": {"DBLP": "books/sp/02/Dijkstra02", "MAG": "1518874110", "DOI": - "10.1007/978-3-642-59412-0_19", "CorpusId": 6281265}, "url": "https://www.semanticscholar.org/paper/3c50e28e636ade2df8513e30bf7604069bbdaa6d", + 511, "influentialCitationCount": 25, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1971-06-01", "journal": {"volume": "1", "pages": "115-138", "name": "Acta + Informatica"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "3c50e28e636ade2df8513e30bf7604069bbdaa6d", "externalIds": {"DBLP": + "books/sp/02/Dijkstra02", "MAG": "1518874110", "DOI": "10.1007/978-3-642-59412-0_19", + "CorpusId": 6281265}, "corpusId": 6281265, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3c50e28e636ade2df8513e30bf7604069bbdaa6d", "title": "EWD 1308: What Led to \"Notes on Structured Programming\"", "abstract": null, "venue": "Software Pioneers", "year": 2002, "referenceCount": 0, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology", "Computer Science"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "340-346"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "7514f739fdcb31b2e35e29f61de8f3dc7b3a5cdd", - "externalIds": {"MAG": "2029249420", "DBLP": "journals/fac/Dijkstra02", "DOI": - "10.1007/s001650200030", "CorpusId": 9877172}, "url": "https://www.semanticscholar.org/paper/7514f739fdcb31b2e35e29f61de8f3dc7b3a5cdd", + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"pages": "340-346"}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "7514f739fdcb31b2e35e29f61de8f3dc7b3a5cdd", "externalIds": {"MAG": "2029249420", + "DBLP": "journals/fac/Dijkstra02", "DOI": "10.1007/s001650200030", "CorpusId": + 9877172}, "corpusId": 9877172, "publicationVenue": {"id": "18571b83-47ca-4d90-9e2c-736893f81958", + "name": "Formal Aspects of Computing", "type": "journal", "alternate_names": + ["Form Asp Comput"], "issn": "0934-5043", "url": "https://www.springer.com/journal/00165/", + "alternate_urls": ["http://www.springer.com/journal/00165/", "https://link.springer.com/journal/165"]}, + "url": "https://www.semanticscholar.org/paper/7514f739fdcb31b2e35e29f61de8f3dc7b3a5cdd", "title": "EWD1300: The Notational Conventions I Adopted, and Why", "abstract": null, "venue": "Formal Aspects of Computing", "year": 2002, "referenceCount": 0, "citationCount": 16, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2002-12-13", "journal": - {"volume": "14", "pages": "99-107", "name": "Formal Aspects of Computing"}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "b8446180f73d2441a96318a3efee8bebe21fc083", "externalIds": {"DBLP": "books/sp/02/Dijkstra02b", - "MAG": "2154403892", "DOI": "10.1007/978-3-642-59412-0_21", "CorpusId": 31262505}, - "url": "https://www.semanticscholar.org/paper/b8446180f73d2441a96318a3efee8bebe21fc083", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1007/s001650200030", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-12-13", "journal": {"volume": "14", "pages": "99-107", "name": "Formal + Aspects of Computing"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "b8446180f73d2441a96318a3efee8bebe21fc083", "externalIds": {"DBLP": + "books/sp/02/Dijkstra02b", "MAG": "2154403892", "DOI": "10.1007/978-3-642-59412-0_21", + "CorpusId": 31262505}, "corpusId": 31262505, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b8446180f73d2441a96318a3efee8bebe21fc083", "title": "Go to Statement Considered Harmful (Reprint)", "abstract": null, "venue": "Software Pioneers", "year": 2002, "referenceCount": 2, "citationCount": - 102, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": + 102, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ir.cwi.nl/pub/28228/28228.pdf", "status": null}, "fieldsOfStudy": ["Philosophy", "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "351-355"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "bf14e5af32b0987351ebc42c29a6d33116733c67", "externalIds": {"DBLP": "conf/seta/2001", "DOI": "10.1007/978-1-4471-0673-9", - "CorpusId": 28428817}, "url": "https://www.semanticscholar.org/paper/bf14e5af32b0987351ebc42c29a6d33116733c67", + "CorpusId": 28428817}, "corpusId": 28428817, "publicationVenue": {"id": "b001aef8-ff25-4ada-adfb-dc103291ff5f", + "name": "Discrete Mathematics & Theoretical Computer Science", "type": "journal", + "alternate_names": ["Discret Math Theor Comput Sci"], "issn": "1365-8050", + "url": "https://www.dmtcs.org/dmtcs-ojs/", "alternate_urls": ["http://www.dmtcs.org/dmtcs-ojs/index.php/dmtcs"]}, + "url": "https://www.semanticscholar.org/paper/bf14e5af32b0987351ebc42c29a6d33116733c67", "title": "Sequences and their Applications", "abstract": null, "venue": "Discrete Mathematics & Theoretical Computer Science", "year": 2002, "referenceCount": 0, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "1756533", "name": "G. Chaitin"}, {"authorId": - "3234559", "name": "E. Dijkstra"}, {"authorId": "2067982669", "name": "R."}, - {"authorId": "123555955", "name": "Graham"}, {"authorId": "144182665", "name": - "G. Rozenberg"}]}, {"paperId": "cd46e66972b056719a988e5c25440ab796c3f2f2", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-1-4471-0673-9%2F1", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "1756533", "name": "G. Chaitin"}, + {"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2067982669", + "name": "R."}, {"authorId": "123555955", "name": "Graham"}, {"authorId": "144182665", + "name": "G. Rozenberg"}]}, {"paperId": "cd46e66972b056719a988e5c25440ab796c3f2f2", "externalIds": {"MAG": "1789713128", "DOI": "10.1007/978-1-4757-3472-0_2", - "CorpusId": 60835196}, "url": "https://www.semanticscholar.org/paper/cd46e66972b056719a988e5c25440ab796c3f2f2", + "CorpusId": 60835196}, "corpusId": 60835196, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cd46e66972b056719a988e5c25440ab796c3f2f2", "title": "Cooperating sequential processes", "abstract": null, "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 768, "influentialCitationCount": - 45, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "65-138", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "e510da48e84767a2299de1c764e6c3591d967238", - "externalIds": {"MAG": "1579097667", "DOI": "10.1007/978-1-4612-5695-3_26", - "CorpusId": 58197919}, "url": "https://www.semanticscholar.org/paper/e510da48e84767a2299de1c764e6c3591d967238", + 45, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "65-138", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "e510da48e84767a2299de1c764e6c3591d967238", "externalIds": {"MAG": + "1579097667", "DOI": "10.1007/978-1-4612-5695-3_26", "CorpusId": 58197919}, + "corpusId": 58197919, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e510da48e84767a2299de1c764e6c3591d967238", "title": "A synthesis emerging", "abstract": null, "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "397-412", "name": ""}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "1e2e3de0dc76dad584ebc59568427d1bb0201fa3", - "externalIds": {"MAG": "1592638339", "CorpusId": 60912387}, "url": "https://www.semanticscholar.org/paper/1e2e3de0dc76dad584ebc59568427d1bb0201fa3", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "397-412", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "1e2e3de0dc76dad584ebc59568427d1bb0201fa3", + "externalIds": {"MAG": "1592638339", "CorpusId": 60912387}, "corpusId": 60912387, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1e2e3de0dc76dad584ebc59568427d1bb0201fa3", "title": "Oral history interview with Edsger W. Dijkstra", "abstract": "In this oral history Edsger Dijkstra recounts his early education and training as a theoretical physicist and as a \u2018programmer\u2019. Dijkstra describes @@ -731,24 +809,30 @@ interactions: processing conferences. Dijkstra also discourses on the development of ALGOL 60 and the origins of computing science in Europe and America.", "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-08-02", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "6c1435d55836bc60dc3767f1c44ca1f001a2a9b8", - "externalIds": {"DBLP": "journals/ipl/Dijkstra01", "MAG": "2159438524", "DOI": - "10.1016/S0020-0190(00)00204-0", "CorpusId": 11926262}, "url": "https://www.semanticscholar.org/paper/6c1435d55836bc60dc3767f1c44ca1f001a2a9b8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-08-02", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "6c1435d55836bc60dc3767f1c44ca1f001a2a9b8", "externalIds": {"DBLP": + "journals/ipl/Dijkstra01", "MAG": "2159438524", "DOI": "10.1016/S0020-0190(00)00204-0", + "CorpusId": 11926262}, "corpusId": 11926262, "publicationVenue": {"id": "44ecc2bb-f8fd-4c6d-bd54-30ca098be91d", + "name": "Information Processing Letters", "type": "journal", "alternate_names": + ["Inf Process Lett"], "issn": "0020-0190", "url": "http://www.elsevier.com/locate/ipl", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505612/description#description", + "http://www.sciencedirect.com/science/journal/00200190"]}, "url": "https://www.semanticscholar.org/paper/6c1435d55836bc60dc3767f1c44ca1f001a2a9b8", "title": "Under the spell of Leibniz''s dream", "abstract": null, "venue": "Information Processing Letters", "year": 2001, "referenceCount": 0, "citationCount": - 18, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2001-02-01", - "journal": {"volume": "77", "pages": "53-61", "name": "Inf. Process. Lett."}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "e965e73ffa9a282bf2bb16a838b6e8af54fcbeb0", "externalIds": {"DBLP": "journals/cacm/Dijkstra01", - "MAG": "1972770999", "DOI": "10.1145/365181.365217", "CorpusId": 31142279}, - "url": "https://www.semanticscholar.org/paper/e965e73ffa9a282bf2bb16a838b6e8af54fcbeb0", + 18, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2001-02-01", "journal": {"volume": "77", "pages": "53-61", + "name": "Inf. Process. Lett."}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "e965e73ffa9a282bf2bb16a838b6e8af54fcbeb0", + "externalIds": {"DBLP": "journals/cacm/Dijkstra01", "MAG": "1972770999", "DOI": + "10.1145/365181.365217", "CorpusId": 31142279}, "corpusId": 31142279, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e965e73ffa9a282bf2bb16a838b6e8af54fcbeb0", "title": "The end of computing science?", "abstract": "I would therefore like to posit that computing\u2019s central challenge, \u201cHow not to make a mess of it,\u201d has not been met. On the contrary, most of our systems are @@ -773,14 +857,19 @@ interactions: whether computing science is finished will primarily depend on our courage and our imagination.", "venue": "CACM", "year": 2001, "referenceCount": 0, "citationCount": 49, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-03-01", "journal": {"volume": "44", "pages": "92", "name": "Commun. - ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "fc81434eca109d4fe78ff9e4a001f538c8a839e6", "externalIds": {"MAG": "2078316995", - "DBLP": "journals/tamm/DijkstraM01", "DOI": "10.1080/00029890.2001.11919771", - "CorpusId": 10260702}, "url": "https://www.semanticscholar.org/paper/fc81434eca109d4fe78ff9e4a001f538c8a839e6", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-03-01", "journal": {"volume": "44", "pages": "92", + "name": "Commun. ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "fc81434eca109d4fe78ff9e4a001f538c8a839e6", "externalIds": {"MAG": + "2078316995", "DBLP": "journals/tamm/DijkstraM01", "DOI": "10.1080/00029890.2001.11919771", + "CorpusId": 10260702}, "corpusId": 10260702, "publicationVenue": {"id": "a9d46553-e876-4308-976e-6b6df356a688", + "name": "The American mathematical monthly", "type": "journal", "alternate_names": + ["American Mathematical Monthly", "Am Math Mon", "Am math mon"], "issn": "0002-9890", + "url": "http://proquest.umi.com/pqdlink?Exp=09-08-2012&PMID=19428&RQT=318&Ver=1", + "alternate_urls": ["https://www.jstor.org/journal/amermathmont", "http://www.jstor.org/journals/00029890.html", + "http://www.maa.org/pubs/monthly.html"]}, "url": "https://www.semanticscholar.org/paper/fc81434eca109d4fe78ff9e4a001f538c8a839e6", "title": "Designing a Calculational Proof of Cantor''s Theorem", "abstract": "Cantor''s Diagonalization The one purpose of this little Note is to show that formal arguments need not be lengthy at all; on the contrary, they are @@ -796,25 +885,27 @@ interactions: there is no 1-1 correspondence between S and gUS. We can confine ourselves to non-empty S.", "venue": "The American mathematical monthly", "year": 2001, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2001-05-01", "journal": - {"volume": "108", "pages": "440 - 443", "name": "The American Mathematical - Monthly"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": - "1771370", "name": "J. Misra"}]}, {"paperId": "bf91f9273081b764a300954e75edca83adb4825f", - "externalIds": {"MAG": "346708409", "DBLP": "conf/birthday/Dijkstra00", "CorpusId": - 30682672}, "url": "https://www.semanticscholar.org/paper/bf91f9273081b764a300954e75edca83adb4825f", + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2001-05-01", "journal": {"volume": "108", "pages": "440 - 443", "name": "The + American Mathematical Monthly"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}, {"authorId": "1771370", "name": "J. Misra"}]}, {"paperId": + "bf91f9273081b764a300954e75edca83adb4825f", "externalIds": {"MAG": "346708409", + "DBLP": "conf/birthday/Dijkstra00", "CorpusId": 30682672}, "corpusId": 30682672, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf91f9273081b764a300954e75edca83adb4825f", "title": "On the transitive closure of a wellfounded relation", "abstract": null, "venue": "The School of Niklaus Wirth", "year": 2000, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"pages": "31-40"}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "8f13c66c96cffb6db8dafcec47785ee01016e499", "externalIds": {"MAG": "2080223950", - "DOI": "10.1145/335527.335528", "CorpusId": 34430415}, "url": "https://www.semanticscholar.org/paper/8f13c66c96cffb6db8dafcec47785ee01016e499", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "31-40"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "8f13c66c96cffb6db8dafcec47785ee01016e499", + "externalIds": {"MAG": "2080223950", "DOI": "10.1145/335527.335528", "CorpusId": + 34430415}, "corpusId": 34430415, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8f13c66c96cffb6db8dafcec47785ee01016e499", "title": "Computing Science: achievements and challenges", "abstract": "When at the close of the 20 ~ Century, I am supposed to talk about Computing Science, I am immediately faced with the question \"Which Computing Science?\" In my @@ -825,411 +916,453 @@ interactions: with respect to that transatlantic difference: I cannot ignore it, but am also allowed to address the issue openly (that is, if not qualified, at least entitled).", "venue": "SIAP", "year": 1999, "referenceCount": 0, "citationCount": - 10, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + 10, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/335527.335528", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-03-01", "journal": {"volume": "7", "pages": "2-9", "name": "ACM Sigapp Applied Computing Review"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "868abb4d77a84a0c887f3ef2ef4c8e98a4ffcfa9", "externalIds": {"MAG": "2486254888", "DOI": "10.1007/978-1-4612-0831-0_4", - "CorpusId": 124697067}, "url": "https://www.semanticscholar.org/paper/868abb4d77a84a0c887f3ef2ef4c8e98a4ffcfa9", + "CorpusId": 124697067}, "corpusId": 124697067, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/868abb4d77a84a0c887f3ef2ef4c8e98a4ffcfa9", "title": "Appalling Prose and the Shortest Path", "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "55-67", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "10e7facf87c22883d11e9deda3a70f0300895726", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "55-67", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "10e7facf87c22883d11e9deda3a70f0300895726", "externalIds": {"MAG": "2155284496", "DOI": "10.1007/978-3-642-60858-2_5", - "CorpusId": 178979861}, "url": "https://www.semanticscholar.org/paper/10e7facf87c22883d11e9deda3a70f0300895726", + "CorpusId": 178979861}, "corpusId": 178979861, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/10e7facf87c22883d11e9deda3a70f0300895726", "title": "A result of rabbit removal (EWD1208)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "pages": "19-24", "name": - ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "140dd740536347d875b6bae91c21c27af5bbeabb", "externalIds": {"MAG": "162544375", - "DOI": "10.1007/978-3-642-60858-2_3", "CorpusId": 118696448}, "url": "https://www.semanticscholar.org/paper/140dd740536347d875b6bae91c21c27af5bbeabb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "19-24", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "140dd740536347d875b6bae91c21c27af5bbeabb", "externalIds": {"MAG": + "162544375", "DOI": "10.1007/978-3-642-60858-2_3", "CorpusId": 118696448}, + "corpusId": 118696448, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/140dd740536347d875b6bae91c21c27af5bbeabb", "title": "Heuristics for a very simple Euclidean proof (EWD1180)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "36efd0857753eb8dc691850615b3bdfb2232027f", "externalIds": {"MAG": - "179630312", "DOI": "10.1007/978-3-642-60858-2_7", "CorpusId": 141087346}, - "url": "https://www.semanticscholar.org/paper/36efd0857753eb8dc691850615b3bdfb2232027f", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "36efd0857753eb8dc691850615b3bdfb2232027f", + "externalIds": {"MAG": "179630312", "DOI": "10.1007/978-3-642-60858-2_7", + "CorpusId": 141087346}, "corpusId": 141087346, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/36efd0857753eb8dc691850615b3bdfb2232027f", "title": "The marriage agency (EWD1214)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3a2ed65ce0df1156949e8e64710533fc09482a00", - "externalIds": {"MAG": "84447055", "DOI": "10.1007/978-3-642-60858-2_6", "CorpusId": - 190334039}, "url": "https://www.semanticscholar.org/paper/3a2ed65ce0df1156949e8e64710533fc09482a00", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}, {"category": "Sociology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "3a2ed65ce0df1156949e8e64710533fc09482a00", "externalIds": {"MAG": "84447055", + "DOI": "10.1007/978-3-642-60858-2_6", "CorpusId": 190334039}, "corpusId": + 190334039, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a2ed65ce0df1156949e8e64710533fc09482a00", "title": "For the record: painting the squared plane (EWD1212)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], - "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "25-26", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3fb39053944c8e5a8f3e946c9ecf347c4247e753", - "externalIds": {"MAG": "174386346", "DOI": "10.1007/978-3-642-60858-2_14", - "CorpusId": 107356976}, "url": "https://www.semanticscholar.org/paper/3fb39053944c8e5a8f3e946c9ecf347c4247e753", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "25-26", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "3fb39053944c8e5a8f3e946c9ecf347c4247e753", "externalIds": {"MAG": + "174386346", "DOI": "10.1007/978-3-642-60858-2_14", "CorpusId": 107356976}, + "corpusId": 107356976, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3fb39053944c8e5a8f3e946c9ecf347c4247e753", "title": "The strengths of the academic enterprise (EWD1175)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "616c87b0cc715aac6731c952c944d96d18e15931", "externalIds": {"MAG": - "60955831", "DOI": "10.1007/978-3-642-60858-2_10", "CorpusId": 117629073}, - "url": "https://www.semanticscholar.org/paper/616c87b0cc715aac6731c952c944d96d18e15931", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "616c87b0cc715aac6731c952c944d96d18e15931", + "externalIds": {"MAG": "60955831", "DOI": "10.1007/978-3-642-60858-2_10", + "CorpusId": 117629073}, "corpusId": 117629073, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/616c87b0cc715aac6731c952c944d96d18e15931", "title": "My simplest theorem (EWD1232)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "7261b86f97ad6abc0c3555ad96f63fe5daf60a23", - "externalIds": {"MAG": "2518987169", "CorpusId": 126216930}, "url": "https://www.semanticscholar.org/paper/7261b86f97ad6abc0c3555ad96f63fe5daf60a23", + "externalIds": {"MAG": "2518987169", "CorpusId": 126216930}, "corpusId": 126216930, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7261b86f97ad6abc0c3555ad96f63fe5daf60a23", "title": "Heuristics for a very simple Euclidean proof", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "7e7a6d6b733eba90a10220f73d25685361e93ef7", "externalIds": {"MAG": "2219395167", "DOI": "10.1007/978-3-642-60858-2_8", - "CorpusId": 124433778}, "url": "https://www.semanticscholar.org/paper/7e7a6d6b733eba90a10220f73d25685361e93ef7", + "CorpusId": 124433778}, "corpusId": 124433778, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7e7a6d6b733eba90a10220f73d25685361e93ef7", "title": "Courtesy Dr. Birgit Schieder (EWD1215)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "9041a386d1b2b25d56da677d42f0cd094be2f447", "externalIds": {"MAG": "176320441", "DOI": "10.1007/978-3-642-60858-2_13", "CorpusId": 118999856}, - "url": "https://www.semanticscholar.org/paper/9041a386d1b2b25d56da677d42f0cd094be2f447", + "corpusId": 118999856, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9041a386d1b2b25d56da677d42f0cd094be2f447", "title": "A kind of converse of Leibniz\u2019s Principle (EWD1245)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "df2208472d1d63feea73d6f17a9b98ea0366b9c1", "externalIds": {"MAG": - "99474823", "DOI": "10.1007/978-3-642-60858-2_11", "CorpusId": 117472520}, - "url": "https://www.semanticscholar.org/paper/df2208472d1d63feea73d6f17a9b98ea0366b9c1", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "df2208472d1d63feea73d6f17a9b98ea0366b9c1", + "externalIds": {"MAG": "99474823", "DOI": "10.1007/978-3-642-60858-2_11", + "CorpusId": 117472520}, "corpusId": 117472520, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/df2208472d1d63feea73d6f17a9b98ea0366b9c1", "title": "The transitive closure of a wellfounded relation (EWD1241)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "df482aae427d4d7c6de5178db2732a465f7a8491", "externalIds": {"MAG": - "22531135", "DOI": "10.1007/978-3-642-60858-2_12", "CorpusId": 115630027}, - "url": "https://www.semanticscholar.org/paper/df482aae427d4d7c6de5178db2732a465f7a8491", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "df482aae427d4d7c6de5178db2732a465f7a8491", + "externalIds": {"MAG": "22531135", "DOI": "10.1007/978-3-642-60858-2_12", + "CorpusId": 115630027}, "corpusId": 115630027, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/df482aae427d4d7c6de5178db2732a465f7a8491", "title": "The formula for sin.(\u03b1 + \u03b2) (EWD1244a)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "pages": "41-42", "name": - ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "e4439f180daece86dcf5f0ee91f9c74575aa4462", "externalIds": {"MAG": "2119007008", - "DOI": "10.1007/978-3-642-60858-2_9", "CorpusId": 122225461}, "url": "https://www.semanticscholar.org/paper/e4439f180daece86dcf5f0ee91f9c74575aa4462", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "41-42", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "e4439f180daece86dcf5f0ee91f9c74575aa4462", "externalIds": {"MAG": + "2119007008", "DOI": "10.1007/978-3-642-60858-2_9", "CorpusId": 122225461}, + "corpusId": 122225461, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4439f180daece86dcf5f0ee91f9c74575aa4462", "title": "WLOG, or the misery of the unordered pair (EWD1223)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "33-34", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "ed1722829398dc38e92508e60ad75d3f3b21a5c2", "externalIds": {"MAG": - "2156878061", "DOI": "10.1007/978-1-4612-0685-9_4", "CorpusId": 62421690}, - "url": "https://www.semanticscholar.org/paper/ed1722829398dc38e92508e60ad75d3f3b21a5c2", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "33-34", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "ed1722829398dc38e92508e60ad75d3f3b21a5c2", + "externalIds": {"MAG": "2156878061", "DOI": "10.1007/978-1-4612-0685-9_4", + "CorpusId": 62421690}, "corpusId": 62421690, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ed1722829398dc38e92508e60ad75d3f3b21a5c2", "title": "The tide, not the waves", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "59-64", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f11ed313c2bd63fb75b719a954290de2bf6e5d1c", - "externalIds": {"MAG": "178056148", "DOI": "10.1007/978-3-642-60858-2_4", - "CorpusId": 122411832}, "url": "https://www.semanticscholar.org/paper/f11ed313c2bd63fb75b719a954290de2bf6e5d1c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "59-64", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "f11ed313c2bd63fb75b719a954290de2bf6e5d1c", "externalIds": {"MAG": + "178056148", "DOI": "10.1007/978-3-642-60858-2_4", "CorpusId": 122411832}, + "corpusId": 122411832, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f11ed313c2bd63fb75b719a954290de2bf6e5d1c", "title": "Complete DAGs (EWD1204)", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "17-18", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "0567d3978ff4d19c4f3b67cbc138397874f451eb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "17-18", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "0567d3978ff4d19c4f3b67cbc138397874f451eb", "externalIds": {"DBLP": "conf/nato/Dijkstra96a", "MAG": "145023145", "CorpusId": - 33725066}, "url": "https://www.semanticscholar.org/paper/0567d3978ff4d19c4f3b67cbc138397874f451eb", + 33725066}, "corpusId": 33725066, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0567d3978ff4d19c4f3b67cbc138397874f451eb", "title": "The balance and the coins", "abstract": null, "venue": "NATO ASI DPD", "year": 1996, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "History", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-09-01", "journal": {"pages": "11-13"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "05ea585edfc8a76a921b79a59ce768029ed00729", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Economics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1996-09-01", "journal": {"pages": "11-13"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "05ea585edfc8a76a921b79a59ce768029ed00729", "externalIds": {"DBLP": "conf/nato/Dijkstra96", "MAG": "1586815816", "CorpusId": - 43732665}, "url": "https://www.semanticscholar.org/paper/05ea585edfc8a76a921b79a59ce768029ed00729", + 43732665}, "corpusId": 43732665, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05ea585edfc8a76a921b79a59ce768029ed00729", "title": "Fibonacci and the greatest common divisor", "abstract": null, "venue": "NATO ASI DPD", "year": 1996, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-09-01", "journal": {"pages": "7-10"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "1a3df87610225c0090bf10f24aa737b4f8f8922a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1996-09-01", "journal": {"pages": "7-10"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "1a3df87610225c0090bf10f24aa737b4f8f8922a", "externalIds": {"DBLP": "conf/nato/Dijkstra96d", "MAG": "151429400", "CorpusId": - 29626383}, "url": "https://www.semanticscholar.org/paper/1a3df87610225c0090bf10f24aa737b4f8f8922a", + 29626383}, "corpusId": 29626383, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1a3df87610225c0090bf10f24aa737b4f8f8922a", "title": "A bagatelle on Euclid''s algorithm", "abstract": null, "venue": "NATO ASI DPD", "year": 1996, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-09-01", "journal": {"pages": - "21-23"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "2474329033538d1411435008cb80ca7b64bf5ae0", "externalIds": {"MAG": "2506371207", - "DOI": "10.1007/978-3-642-61455-2_2", "CorpusId": 125225207}, "url": "https://www.semanticscholar.org/paper/2474329033538d1411435008cb80ca7b64bf5ae0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1996-09-01", + "journal": {"pages": "21-23"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "2474329033538d1411435008cb80ca7b64bf5ae0", + "externalIds": {"MAG": "2506371207", "DOI": "10.1007/978-3-642-61455-2_2", + "CorpusId": 125225207}, "corpusId": 125225207, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2474329033538d1411435008cb80ca7b64bf5ae0", "title": "Fibonacci and the greatest common divisor (EWD1077)", "abstract": null, "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "543cd1e33c4b30825f97b0232e5f6a4e447607c3", "externalIds": {"MAG": - "2500485239", "DOI": "10.1007/978-3-642-61455-2_6", "CorpusId": 124296703}, - "url": "https://www.semanticscholar.org/paper/543cd1e33c4b30825f97b0232e5f6a4e447607c3", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "543cd1e33c4b30825f97b0232e5f6a4e447607c3", + "externalIds": {"MAG": "2500485239", "DOI": "10.1007/978-3-642-61455-2_6", + "CorpusId": 124296703}, "corpusId": 124296703, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/543cd1e33c4b30825f97b0232e5f6a4e447607c3", "title": "A bagatelle on Euclid\u2019s Algorithm (EWD1158)", "abstract": null, "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "21-23", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "5d44a1eb079a7b8e58b5286b5c76e881beb3a1e0", "externalIds": {"MAG": - "2490386261", "DOI": "10.1007/978-3-642-61455-2_3", "CorpusId": 184395997}, - "url": "https://www.semanticscholar.org/paper/5d44a1eb079a7b8e58b5286b5c76e881beb3a1e0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "21-23", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "5d44a1eb079a7b8e58b5286b5c76e881beb3a1e0", + "externalIds": {"MAG": "2490386261", "DOI": "10.1007/978-3-642-61455-2_3", + "CorpusId": 184395997}, "corpusId": 184395997, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5d44a1eb079a7b8e58b5286b5c76e881beb3a1e0", "title": "The balance and the coins (EWD1083)", "abstract": null, "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], + "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "7180e872a85f0954ad4df6a1085401a3e3b84e1d", "externalIds": {"DBLP": - "conf/nato/Dijkstra96f", "MAG": "1548187949", "CorpusId": 31394717}, "url": - "https://www.semanticscholar.org/paper/7180e872a85f0954ad4df6a1085401a3e3b84e1d", + "conf/nato/Dijkstra96f", "MAG": "1548187949", "CorpusId": 31394717}, "corpusId": + 31394717, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7180e872a85f0954ad4df6a1085401a3e3b84e1d", "title": "An alternative of the ETAC to EWD1163", "abstract": null, "venue": "NATO ASI DPD", "year": 1996, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-09-01", "journal": {"pages": "27-28"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "96448ad9a66b82c5bb1d628ecf8dbd8926c7a426", - "externalIds": {"MAG": "140324377", "DBLP": "conf/nato/Dijkstra96g", "DOI": - "10.1007/978-3-642-61455-2_9", "CorpusId": 6275682}, "url": "https://www.semanticscholar.org/paper/96448ad9a66b82c5bb1d628ecf8dbd8926c7a426", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1996-09-01", "journal": {"pages": + "27-28"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "96448ad9a66b82c5bb1d628ecf8dbd8926c7a426", "externalIds": {"MAG": "140324377", + "DBLP": "conf/nato/Dijkstra96g", "DOI": "10.1007/978-3-642-61455-2_9", "CorpusId": + 6275682}, "corpusId": 6275682, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/96448ad9a66b82c5bb1d628ecf8dbd8926c7a426", "title": "The argument about the arithmetic mean and the geometric mean, heuristics included", "abstract": null, "venue": "NATO ASI DPD", "year": 1996, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-09-01", "journal": {"pages": - "29-32"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "9ba01dd5df66137f68bd1bf0a003406eeb1e743c", "externalIds": {"DBLP": "conf/nato/Dijkstra96b", - "MAG": "134007204", "CorpusId": 38715282}, "url": "https://www.semanticscholar.org/paper/9ba01dd5df66137f68bd1bf0a003406eeb1e743c", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1996-09-01", "journal": {"pages": "29-32"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "9ba01dd5df66137f68bd1bf0a003406eeb1e743c", + "externalIds": {"DBLP": "conf/nato/Dijkstra96b", "MAG": "134007204", "CorpusId": + 38715282}, "corpusId": 38715282, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9ba01dd5df66137f68bd1bf0a003406eeb1e743c", "title": "Bulterman''s theorem on shortest trees", "abstract": null, "venue": "NATO ASI DPD", "year": 1996, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-09-01", "journal": {"pages": "15-16"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "9cc0c09fb40112409b46ca7442139a7027a2f33b", - "externalIds": {"MAG": "2481501803", "DOI": "10.1007/978-3-642-61455-2_8", - "CorpusId": 184076868}, "url": "https://www.semanticscholar.org/paper/9cc0c09fb40112409b46ca7442139a7027a2f33b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1996-09-01", "journal": {"pages": + "15-16"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "9cc0c09fb40112409b46ca7442139a7027a2f33b", "externalIds": {"MAG": "2481501803", + "DOI": "10.1007/978-3-642-61455-2_8", "CorpusId": 184076868}, "corpusId": + 184076868, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9cc0c09fb40112409b46ca7442139a7027a2f33b", "title": "An alternative of the ETAC to EWD1163 (EWD1169)", "abstract": null, "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "pages": "27-28", "name": - ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "becd9958cc37e1bd89efc5105377c44237113703", "externalIds": {"MAG": "140827514", - "DBLP": "conf/nato/Dijkstra96e", "DOI": "10.1007/978-3-642-61455-2_7", "CorpusId": - 34136588}, "url": "https://www.semanticscholar.org/paper/becd9958cc37e1bd89efc5105377c44237113703", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "27-28", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "becd9958cc37e1bd89efc5105377c44237113703", "externalIds": {"MAG": + "140827514", "DBLP": "conf/nato/Dijkstra96e", "DOI": "10.1007/978-3-642-61455-2_7", + "CorpusId": 34136588}, "corpusId": 34136588, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/becd9958cc37e1bd89efc5105377c44237113703", "title": "On two equations that have the same extreme solution", "abstract": null, "venue": "NATO ASI DPD", "year": 1996, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-09-01", "journal": {"pages": - "25-26"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "ca05a805c7d2e5b7cba3a8eb71cb53900c88fe97", "externalIds": {"MAG": "2486750837", - "DOI": "10.1007/978-3-642-61455-2_4", "CorpusId": 123905818}, "url": "https://www.semanticscholar.org/paper/ca05a805c7d2e5b7cba3a8eb71cb53900c88fe97", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-09-01", "journal": + {"pages": "25-26"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "ca05a805c7d2e5b7cba3a8eb71cb53900c88fe97", "externalIds": {"MAG": + "2486750837", "DOI": "10.1007/978-3-642-61455-2_4", "CorpusId": 123905818}, + "corpusId": 123905818, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca05a805c7d2e5b7cba3a8eb71cb53900c88fe97", "title": "Bulterman\u2019s theorem on shortest trees (EWD1131)", "abstract": null, "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "15-16", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "dc7038d7d7160675091efb3232a3c31f35e2a236", "externalIds": {"DBLP": - "conf/nato/Dijkstra96c", "MAG": "1482761017", "DOI": "10.1007/978-3-642-61455-2_5", - "CorpusId": 5162301}, "url": "https://www.semanticscholar.org/paper/dc7038d7d7160675091efb3232a3c31f35e2a236", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "15-16", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "dc7038d7d7160675091efb3232a3c31f35e2a236", + "externalIds": {"DBLP": "conf/nato/Dijkstra96c", "MAG": "1482761017", "DOI": + "10.1007/978-3-642-61455-2_5", "CorpusId": 5162301}, "corpusId": 5162301, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dc7038d7d7160675091efb3232a3c31f35e2a236", "title": "A prime is in at most 1 way the sum of 2 squares", "abstract": null, "venue": "NATO ASI DPD", "year": 1996, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-09-01", "journal": {"pages": - "17-20"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "a04b2d35b01b5c4b1c284e30318e452b0cd754bd", "externalIds": {"DBLP": "journals/ipl/Dijkstra95", - "MAG": "2078982648", "DOI": "10.1016/0020-0190(94)00196-6", "CorpusId": 26672717}, - "url": "https://www.semanticscholar.org/paper/a04b2d35b01b5c4b1c284e30318e452b0cd754bd", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-09-01", "journal": + {"pages": "17-20"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "a04b2d35b01b5c4b1c284e30318e452b0cd754bd", "externalIds": {"DBLP": + "journals/ipl/Dijkstra95", "MAG": "2078982648", "DOI": "10.1016/0020-0190(94)00196-6", + "CorpusId": 26672717}, "corpusId": 26672717, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a04b2d35b01b5c4b1c284e30318e452b0cd754bd", "title": "Heuristics for a Calculational Proof", "abstract": null, "venue": "Inf. Process. Lett.", "year": 1995, "referenceCount": 1, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-02-10", "journal": {"volume": "53", "pages": "141-143", - "name": "Inf. Process. Lett."}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "f5a14dedd971e96afc51ac3d930e638ba3c09f0a", - "externalIds": {"MAG": "2485726240", "CorpusId": 124453619}, "url": "https://www.semanticscholar.org/paper/f5a14dedd971e96afc51ac3d930e638ba3c09f0a", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-02-10", "journal": + {"volume": "53", "pages": "141-143", "name": "Inf. Process. Lett."}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f5a14dedd971e96afc51ac3d930e638ba3c09f0a", + "externalIds": {"MAG": "2485726240", "CorpusId": 124453619}, "corpusId": 124453619, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f5a14dedd971e96afc51ac3d930e638ba3c09f0a", "title": "On the design of calculational proofs", "abstract": null, "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-01-11", - "journal": {"volume": "", "pages": "105-117", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "0af598591fc1e541a8c546a8264dbbaf138de4a5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1994-01-11", "journal": {"volume": "", "pages": "105-117", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "0af598591fc1e541a8c546a8264dbbaf138de4a5", "externalIds": {"MAG": "93023019", "DOI": "10.1007/978-3-642-77572-7_2", "CorpusId": - 115609809}, "url": "https://www.semanticscholar.org/paper/0af598591fc1e541a8c546a8264dbbaf138de4a5", + 115609809}, "corpusId": 115609809, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0af598591fc1e541a8c546a8264dbbaf138de4a5", "title": "Well-foundedness and the transitive closure", "abstract": null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "11-15", "name": ""}, "authors": [{"authorId": - "1685361", "name": "A. V. Gasteren"}, {"authorId": "3234559", "name": "E. - Dijkstra"}]}, {"paperId": "2d243151d72ef94dc122b5a16e3b07c2cbc1487f", "externalIds": - {"MAG": "160016933", "DOI": "10.1007/978-3-642-77572-7_3", "CorpusId": 117848728}, - "url": "https://www.semanticscholar.org/paper/2d243151d72ef94dc122b5a16e3b07c2cbc1487f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "11-15", "name": ""}, "authors": + [{"authorId": "1685361", "name": "A. V. Gasteren"}, {"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "2d243151d72ef94dc122b5a16e3b07c2cbc1487f", + "externalIds": {"MAG": "160016933", "DOI": "10.1007/978-3-642-77572-7_3", + "CorpusId": 117848728}, "corpusId": 117848728, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2d243151d72ef94dc122b5a16e3b07c2cbc1487f", "title": "Designing the proof of Vizing\u2019s Theorem", "abstract": null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "17-25", "name": ""}, "authors": [{"authorId": - "1760396", "name": "J. Rao"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "622a8b2e489a8842e77aef71e5a4e695c666eb00", "externalIds": {"DBLP": - "conf/nato/Dijkstra92", "MAG": "342597797", "DOI": "10.1007/978-3-662-02880-3_7", - "CorpusId": 46089734}, "url": "https://www.semanticscholar.org/paper/622a8b2e489a8842e77aef71e5a4e695c666eb00", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "17-25", "name": ""}, "authors": + [{"authorId": "1760396", "name": "J. Rao"}, {"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "622a8b2e489a8842e77aef71e5a4e695c666eb00", + "externalIds": {"DBLP": "conf/nato/Dijkstra92", "MAG": "342597797", "DOI": + "10.1007/978-3-662-02880-3_7", "CorpusId": 46089734}, "corpusId": 46089734, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/622a8b2e489a8842e77aef71e5a4e695c666eb00", "title": "The Unification of Three Calculi", "abstract": null, "venue": "NATO ASI PDC", "year": 1992, "referenceCount": 5, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "197-231"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "dc6946478838f5044d2a9bfb131fd2d2155f9950", - "externalIds": {"MAG": "2281619254", "DOI": "10.1007/978-3-642-77572-7_1", - "CorpusId": 123643800}, "url": "https://www.semanticscholar.org/paper/dc6946478838f5044d2a9bfb131fd2d2155f9950", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "197-231"}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "dc6946478838f5044d2a9bfb131fd2d2155f9950", "externalIds": {"MAG": "2281619254", + "DOI": "10.1007/978-3-642-77572-7_1", "CorpusId": 123643800}, "corpusId": + 123643800, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dc6946478838f5044d2a9bfb131fd2d2155f9950", "title": "On the design of a simple proof for Morley\u2019s Theorem", "abstract": null, "venue": "", "year": 1992, "referenceCount": 2, "citationCount": 3, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "3-9", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "e7b1e2808e2403d44a2d3148085c707450a87fbe", - "externalIds": {"DBLP": "conf/mpc/Dijkstra92", "MAG": "309299061", "DOI": - "10.1007/3-540-56625-2_2", "CorpusId": 206637195}, "url": "https://www.semanticscholar.org/paper/e7b1e2808e2403d44a2d3148085c707450a87fbe", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "3-9", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "e7b1e2808e2403d44a2d3148085c707450a87fbe", "externalIds": + {"DBLP": "conf/mpc/Dijkstra92", "MAG": "309299061", "DOI": "10.1007/3-540-56625-2_2", + "CorpusId": 206637195}, "corpusId": 206637195, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e7b1e2808e2403d44a2d3148085c707450a87fbe", "title": "On the Economy of doing Mathematics", "abstract": null, "venue": "MPC", "year": 1992, "referenceCount": 0, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-06-29", "journal": {"pages": "2-10"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "3b7b224beaa3028ee1f4944ef3f6bb69d0a39adc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-06-29", "journal": {"pages": "2-10"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3b7b224beaa3028ee1f4944ef3f6bb69d0a39adc", "externalIds": {"MAG": "2206961439", "DOI": "10.1007/978-1-4612-3228-5_4", - "CorpusId": 124219431}, "url": "https://www.semanticscholar.org/paper/3b7b224beaa3028ee1f4944ef3f6bb69d0a39adc", + "CorpusId": 124219431}, "corpusId": 124219431, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3b7b224beaa3028ee1f4944ef3f6bb69d0a39adc", "title": "On our proof format", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Philosophy", "source": - "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "21-29", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": - "2755537", "name": "C. S. Scholten"}]}, {"paperId": "5767cbdd9286ff1cf7f5f92a45f774a32e404d41", - "externalIds": {"MAG": "975921262", "DOI": "10.1007/978-1-4612-3228-5_6", - "CorpusId": 118482037}, "url": "https://www.semanticscholar.org/paper/5767cbdd9286ff1cf7f5f92a45f774a32e404d41", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "21-29", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": + "5767cbdd9286ff1cf7f5f92a45f774a32e404d41", "externalIds": {"MAG": "975921262", + "DOI": "10.1007/978-1-4612-3228-5_6", "CorpusId": 118482037}, "corpusId": + 118482037, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5767cbdd9286ff1cf7f5f92a45f774a32e404d41", "title": "Some properties of predicate transformers", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "81-120", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. - Scholten"}]}, {"paperId": "605b80c373e27dec5b1ea09143b28e2b8854f93a", "externalIds": - {"MAG": "332050894", "DOI": "10.1007/978-1-4612-3228-5_8", "CorpusId": 118408202}, - "url": "https://www.semanticscholar.org/paper/605b80c373e27dec5b1ea09143b28e2b8854f93a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "81-120", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": + "2755537", "name": "C. S. Scholten"}]}, {"paperId": "605b80c373e27dec5b1ea09143b28e2b8854f93a", + "externalIds": {"MAG": "332050894", "DOI": "10.1007/978-1-4612-3228-5_8", + "CorpusId": 118408202}, "corpusId": 118408202, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/605b80c373e27dec5b1ea09143b28e2b8854f93a", "title": "Equations in predicates and their extreme solutions", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "147-170", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": - "C. S. Scholten"}]}, {"paperId": "69600d0578fc284ee91f892a275c996f7d751603", - "externalIds": {"MAG": "238734636", "DOI": "10.1007/978-1-4612-3228-5_11", - "CorpusId": 117322909}, "url": "https://www.semanticscholar.org/paper/69600d0578fc284ee91f892a275c996f7d751603", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "147-170", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": + "69600d0578fc284ee91f892a275c996f7d751603", "externalIds": {"MAG": "238734636", + "DOI": "10.1007/978-1-4612-3228-5_11", "CorpusId": 117322909}, "corpusId": + 117322909, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/69600d0578fc284ee91f892a275c996f7d751603", "title": "Converse predicate transformers", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "201-208", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": - "C. S. Scholten"}]}, {"paperId": "6ca67f45b0504e5679139fe1ca9c33a72d54abda", - "externalIds": {"MAG": "2326127844", "CorpusId": 62003183}, "url": "https://www.semanticscholar.org/paper/6ca67f45b0504e5679139fe1ca9c33a72d54abda", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "201-208", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": + "6ca67f45b0504e5679139fe1ca9c33a72d54abda", "externalIds": {"MAG": "2326127844", + "CorpusId": 62003183}, "corpusId": 62003183, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6ca67f45b0504e5679139fe1ca9c33a72d54abda", "title": "Reasoning about programs (videotape)", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1990-05-28", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "7a534e334662f6bb0b48c94e3a8fcdae0b93a73d", - "externalIds": {"DBLP": "books/daglib/0067387", "MAG": "1511110335", "DOI": - "10.1007/978-1-4612-3228-5", "CorpusId": 8736852}, "url": "https://www.semanticscholar.org/paper/7a534e334662f6bb0b48c94e3a8fcdae0b93a73d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1990-05-28", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "7a534e334662f6bb0b48c94e3a8fcdae0b93a73d", "externalIds": {"DBLP": "books/daglib/0067387", + "MAG": "1511110335", "DOI": "10.1007/978-1-4612-3228-5", "CorpusId": 8736852}, + "corpusId": 8736852, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7a534e334662f6bb0b48c94e3a8fcdae0b93a73d", "title": "Predicate Calculus and Program Semantics", "abstract": null, "venue": "Texts and Monographs in Computer Science", "year": 1989, "referenceCount": 0, "citationCount": 790, "influentialCitationCount": 71, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1989-12-18", "journal": {"pages": - "I-X, 1-220"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, - {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": "7f573e8e2abddd5b7474b914b6a0c7d0530dade7", - "externalIds": {"MAG": "280950966", "DOI": "10.1007/978-1-4612-3228-5_5", - "CorpusId": 117832389}, "url": "https://www.semanticscholar.org/paper/7f573e8e2abddd5b7474b914b6a0c7d0530dade7", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-12-18", + "journal": {"pages": "I-X, 1-220"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": + "7f573e8e2abddd5b7474b914b6a0c7d0530dade7", "externalIds": {"MAG": "280950966", + "DOI": "10.1007/978-1-4612-3228-5_5", "CorpusId": 117832389}, "corpusId": + 117832389, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f573e8e2abddd5b7474b914b6a0c7d0530dade7", "title": "The calculus of boolean structures", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "30-80", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. - Scholten"}]}, {"paperId": "8aa02ff2807719ae705282cd72b936f19acd9e0f", "externalIds": - {"MAG": "2098792684", "DOI": "10.1007/978-1-4612-3228-5_9", "CorpusId": 123261301}, - "url": "https://www.semanticscholar.org/paper/8aa02ff2807719ae705282cd72b936f19acd9e0f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "30-80", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": + "2755537", "name": "C. S. Scholten"}]}, {"paperId": "8aa02ff2807719ae705282cd72b936f19acd9e0f", + "externalIds": {"MAG": "2098792684", "DOI": "10.1007/978-1-4612-3228-5_9", + "CorpusId": 123261301}, "corpusId": 123261301, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8aa02ff2807719ae705282cd72b936f19acd9e0f", "title": "Semantics of repetitions", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "170-189", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. - Scholten"}]}, {"paperId": "8b2e257d7711aef4c719fba755fbab6da7fb4fd6", "externalIds": - {"MAG": "1539335665", "CorpusId": 119000179}, "url": "https://www.semanticscholar.org/paper/8b2e257d7711aef4c719fba755fbab6da7fb4fd6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "170-189", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": + "2755537", "name": "C. S. Scholten"}]}, {"paperId": "8b2e257d7711aef4c719fba755fbab6da7fb4fd6", + "externalIds": {"MAG": "1539335665", "CorpusId": 119000179}, "corpusId": 119000179, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8b2e257d7711aef4c719fba755fbab6da7fb4fd6", "title": "Formal Development of Programs and Proofs", "abstract": "Only for you today! Discover your favourite formal development of programs and proofs book right here by downloading and getting the soft file of the book. This @@ -1239,147 +1372,168 @@ interactions: this book b on-line in this site can be realized now by visiting the link page to download. It will be easy. Why should be here?", "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 64, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "be94f80b0645879e5b81e1e53bbb126047858b1e", - "externalIds": {"MAG": "2235673032", "DOI": "10.1007/978-1-4612-3228-5_12", - "CorpusId": 123713149}, "url": "https://www.semanticscholar.org/paper/be94f80b0645879e5b81e1e53bbb126047858b1e", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "be94f80b0645879e5b81e1e53bbb126047858b1e", "externalIds": {"MAG": + "2235673032", "DOI": "10.1007/978-1-4612-3228-5_12", "CorpusId": 123713149}, + "corpusId": 123713149, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/be94f80b0645879e5b81e1e53bbb126047858b1e", "title": "The strongest postcondition", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "209-215", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. - Scholten"}]}, {"paperId": "c137a5f463e2c6a4f4341ce2239b47daaec1e0ec", "externalIds": - {"MAG": "563998646", "CorpusId": 60424233}, "url": "https://www.semanticscholar.org/paper/c137a5f463e2c6a4f4341ce2239b47daaec1e0ec", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "209-215", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": + "2755537", "name": "C. S. Scholten"}]}, {"paperId": "c137a5f463e2c6a4f4341ce2239b47daaec1e0ec", + "externalIds": {"MAG": "563998646", "CorpusId": 60424233}, "corpusId": 60424233, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c137a5f463e2c6a4f4341ce2239b47daaec1e0ec", "title": "Reasoning about programs", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 5, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "c6ecc53e561ead6e54407df463dce6b2aafd4c4c", - "externalIds": {"MAG": "309249797", "DOI": "10.1007/978-1-4612-3228-5_2", - "CorpusId": 174544237}, "url": "https://www.semanticscholar.org/paper/c6ecc53e561ead6e54407df463dce6b2aafd4c4c", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "c6ecc53e561ead6e54407df463dce6b2aafd4c4c", "externalIds": + {"MAG": "309249797", "DOI": "10.1007/978-1-4612-3228-5_2", "CorpusId": 174544237}, + "corpusId": 174544237, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6ecc53e561ead6e54407df463dce6b2aafd4c4c", "title": "On substitution and replacement", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "11-16", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. - Scholten"}]}, {"paperId": "e2a398f193c3fabc697cb71a0bf2d1dd1a7c5373", "externalIds": - {"MAG": "2141657153", "DOI": "10.1007/978-1-4612-3228-5_3", "CorpusId": 122714461}, - "url": "https://www.semanticscholar.org/paper/e2a398f193c3fabc697cb71a0bf2d1dd1a7c5373", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "11-16", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": + "2755537", "name": "C. S. Scholten"}]}, {"paperId": "e2a398f193c3fabc697cb71a0bf2d1dd1a7c5373", + "externalIds": {"MAG": "2141657153", "DOI": "10.1007/978-1-4612-3228-5_3", + "CorpusId": 122714461}, "corpusId": 122714461, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e2a398f193c3fabc697cb71a0bf2d1dd1a7c5373", "title": "On functions and equality", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "17-20", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}, {"authorId": "102480135", "name": "Carel - S. Schotten"}]}, {"paperId": "f8d766c64b167aa0689d7581d1d04661d95b072b", "externalIds": - {"MAG": "2017695758", "DBLP": "journals/ipl/Dijkstra90", "DOI": "10.1016/0020-0190(90)90072-6", - "CorpusId": 204999875}, "url": "https://www.semanticscholar.org/paper/f8d766c64b167aa0689d7581d1d04661d95b072b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "17-20", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "102480135", + "name": "Carel S. Schotten"}]}, {"paperId": "f8d766c64b167aa0689d7581d1d04661d95b072b", + "externalIds": {"MAG": "2017695758", "DBLP": "journals/ipl/Dijkstra90", "DOI": + "10.1016/0020-0190(90)90072-6", "CorpusId": 204999875}, "corpusId": 204999875, + "publicationVenue": {"id": "44ecc2bb-f8fd-4c6d-bd54-30ca098be91d", "name": + "Information Processing Letters", "type": "journal", "alternate_names": ["Inf + Process Lett"], "issn": "0020-0190", "url": "http://www.elsevier.com/locate/ipl", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505612/description#description", + "http://www.sciencedirect.com/science/journal/00200190"]}, "url": "https://www.semanticscholar.org/paper/f8d766c64b167aa0689d7581d1d04661d95b072b", "title": "Making a Fair Roulette From a Possibly Biased Coin", "abstract": null, "venue": "Information Processing Letters", "year": 1990, "referenceCount": 1, "citationCount": 27, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1990-11-30", "journal": {"volume": - "36", "pages": "193", "name": "Inf. Process. Lett."}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f9ff9b945d6e74e07da20c427d554ef2dfdc3917", - "externalIds": {"MAG": "1021809381", "DOI": "10.1007/978-1-4612-3228-5_7", - "CorpusId": 58172510}, "url": "https://www.semanticscholar.org/paper/f9ff9b945d6e74e07da20c427d554ef2dfdc3917", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1990-11-30", "journal": {"volume": "36", "pages": "193", "name": "Inf. Process. + Lett."}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "f9ff9b945d6e74e07da20c427d554ef2dfdc3917", "externalIds": {"MAG": "1021809381", + "DOI": "10.1007/978-1-4612-3228-5_7", "CorpusId": 58172510}, "corpusId": 58172510, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f9ff9b945d6e74e07da20c427d554ef2dfdc3917", "title": "Semantics of straight-line programs", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "121-146", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": - "C. S. Scholten"}]}, {"paperId": "2437805c1aa80a5d813f9674dcd76e2cc04c1732", - "externalIds": {"MAG": "64033481", "CorpusId": 115601442}, "url": "https://www.semanticscholar.org/paper/2437805c1aa80a5d813f9674dcd76e2cc04c1732", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "121-146", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": + "2437805c1aa80a5d813f9674dcd76e2cc04c1732", "externalIds": {"MAG": "64033481", + "CorpusId": 115601442}, "corpusId": 115601442, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2437805c1aa80a5d813f9674dcd76e2cc04c1732", "title": "The derivation of a proof", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-12-01", - "journal": null, "authors": [{"authorId": "2075788217", "name": "J. V. D. - Woude"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "2de646e0077a482b4b9b44d05c41370139e146eb", - "externalIds": {"MAG": "1599074316", "DBLP": "journals/stp/DijkstraF89", "CorpusId": - 44637281}, "url": "https://www.semanticscholar.org/paper/2de646e0077a482b4b9b44d05c41370139e146eb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1989-12-01", "journal": null, "authors": [{"authorId": "2075788217", "name": + "J. V. D. Woude"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "2de646e0077a482b4b9b44d05c41370139e146eb", "externalIds": {"MAG": "1599074316", + "DBLP": "journals/stp/DijkstraF89", "CorpusId": 44637281}, "corpusId": 44637281, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2de646e0077a482b4b9b44d05c41370139e146eb", "title": "The Linear Search Revisited", "abstract": null, "venue": "Struct. Program.", "year": 1989, "referenceCount": 0, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"volume": "10", "pages": - "5-9", "name": "Struct. Program."}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}, {"authorId": "2462914", "name": "W. Feijen"}]}, {"paperId": - "3a864569f147eb2486c2ee3d4d0e0f728461d0d2", "externalIds": {"MAG": "798989792", - "DOI": "10.1007/978-3-642-74884-4_8", "CorpusId": 118489678}, "url": "https://www.semanticscholar.org/paper/3a864569f147eb2486c2ee3d4d0e0f728461d0d2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, + "journal": {"volume": "10", "pages": "5-9", "name": "Struct. Program."}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2462914", "name": + "W. Feijen"}]}, {"paperId": "3a864569f147eb2486c2ee3d4d0e0f728461d0d2", "externalIds": + {"MAG": "798989792", "DOI": "10.1007/978-3-642-74884-4_8", "CorpusId": 118489678}, + "corpusId": 118489678, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a864569f147eb2486c2ee3d4d0e0f728461d0d2", "title": "The derivation of a proof by J.C.S.P. van der Woude", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "233-243", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "40b03e2a40c5a63cf937d716aba7b0461d3adbe1", - "externalIds": {"MAG": "126279965", "CorpusId": 53896270}, "url": "https://www.semanticscholar.org/paper/40b03e2a40c5a63cf937d716aba7b0461d3adbe1", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "233-243", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "40b03e2a40c5a63cf937d716aba7b0461d3adbe1", + "externalIds": {"MAG": "126279965", "CorpusId": 53896270}, "corpusId": 53896270, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/40b03e2a40c5a63cf937d716aba7b0461d3adbe1", "title": "Fillers at the YoP Institute", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "1989-12-01", "journal": {"volume": "", "pages": - "209-227", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "709a5d99ab61755fe61aa7c78b8328a9b8f98083", "externalIds": {"MAG": - "2241286282", "DOI": "10.1007/978-3-642-74884-4_6", "CorpusId": 62092321}, - "url": "https://www.semanticscholar.org/paper/709a5d99ab61755fe61aa7c78b8328a9b8f98083", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "1989-12-01", "journal": + {"volume": "", "pages": "209-227", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "709a5d99ab61755fe61aa7c78b8328a9b8f98083", + "externalIds": {"MAG": "2241286282", "DOI": "10.1007/978-3-642-74884-4_6", + "CorpusId": 62092321}, "corpusId": 62092321, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/709a5d99ab61755fe61aa7c78b8328a9b8f98083", "title": "On a Problem Transmitted by Doug McIlroy", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "219-222", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "d9e52e423e7afcb7a6afb98cc1ed6e8729ad39bc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "219-222", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "d9e52e423e7afcb7a6afb98cc1ed6e8729ad39bc", "externalIds": {"MAG": "1184942975", "DOI": "10.1007/978-3-642-74884-4_7", - "CorpusId": 117562944}, "url": "https://www.semanticscholar.org/paper/d9e52e423e7afcb7a6afb98cc1ed6e8729ad39bc", + "CorpusId": 117562944}, "corpusId": 117562944, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d9e52e423e7afcb7a6afb98cc1ed6e8729ad39bc", "title": "A computing scientist\u2019s approach to a once-deep theorem of Sylvester\u2019s", "abstract": null, "venue": "", "year": 1989, "referenceCount": 1, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "223-232", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "0ea08e43bac626fe2cd944e3c5ca835f8d81f3b7", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "223-232", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "0ea08e43bac626fe2cd944e3c5ca835f8d81f3b7", "externalIds": {"DBLP": "journals/bit/Dijkstra88", "MAG": "2045028045", "DOI": - "10.1007/BF01941120", "CorpusId": 28523639}, "url": "https://www.semanticscholar.org/paper/0ea08e43bac626fe2cd944e3c5ca835f8d81f3b7", + "10.1007/BF01941120", "CorpusId": 28523639}, "corpusId": 28523639, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0ea08e43bac626fe2cd944e3c5ca835f8d81f3b7", "title": "On binary operators and their derived relations", "abstract": null, "venue": "BIT", "year": 1988, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1988-07-01", "journal": {"volume": "28", "pages": "377-382", "name": "BIT - Numerical Mathematics"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "34716580f0b7a65ff42fc944434fdc6df76e8319", "externalIds": {"DBLP": - "books/daglib/0070525", "MAG": "1931776868", "CorpusId": 5229071}, "url": - "https://www.semanticscholar.org/paper/34716580f0b7a65ff42fc944434fdc6df76e8319", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1988-07-01", "journal": {"volume": "28", "pages": "377-382", + "name": "BIT Numerical Mathematics"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "34716580f0b7a65ff42fc944434fdc6df76e8319", + "externalIds": {"DBLP": "books/daglib/0070525", "MAG": "1931776868", "CorpusId": + 5229071}, "corpusId": 5229071, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/34716580f0b7a65ff42fc944434fdc6df76e8319", "title": "A method of programming", "abstract": "A method of programming , A method of programming , \u0645\u0631\u06a9\u0632 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u0627\u0637\u0644\u0627\u0639 \u0631\u0633\u0627\u0646\u06cc \u06a9\u0634\u0627\u0648\u0631\u0632\u06cc", "venue": "", "year": 1988, "referenceCount": 0, "citationCount": 114, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"pages": "I-VIII, 1-188"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}, {"authorId": "2462914", "name": "W. Feijen"}]}, {"paperId": - "b6caa595a2f355e99f32f12bcce711426c7b145e", "externalIds": {"DBLP": "journals/sigsoft/Dijkstra88", - "MAG": "1982248177", "DOI": "10.1145/43846.43848", "CorpusId": 26820322}, - "url": "https://www.semanticscholar.org/paper/b6caa595a2f355e99f32f12bcce711426c7b145e", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"pages": "I-VIII, + 1-188"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": + "2462914", "name": "W. Feijen"}]}, {"paperId": "b6caa595a2f355e99f32f12bcce711426c7b145e", + "externalIds": {"DBLP": "journals/sigsoft/Dijkstra88", "MAG": "1982248177", + "DOI": "10.1145/43846.43848", "CorpusId": 26820322}, "corpusId": 26820322, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b6caa595a2f355e99f32f12bcce711426c7b145e", "title": "Position paper on \u201cfairness\"", "abstract": "Before embarking on a major research topic, you had better choose your target very carefully because the borderline between the insipid and the impossible is very thin. @@ -1388,106 +1542,120 @@ interactions: the technical question of how to achieve your goal. The why and the how are completely distinct concerns, and nothing is gained by mixing the two. On the contrary.", "venue": "SOEN", "year": 1988, "referenceCount": 0, "citationCount": - 18, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1988-04-01", "journal": - {"volume": "13", "pages": "18-20", "name": "ACM SIGSOFT Softw. Eng. Notes"}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "0f59fe66d15f53e14a6d610d1059396ab3a2b064", "externalIds": {"MAG": "3023786717", - "CorpusId": 227303592}, "url": "https://www.semanticscholar.org/paper/0f59fe66d15f53e14a6d610d1059396ab3a2b064", + 18, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1988-04-01", "journal": {"volume": "13", "pages": "18-20", "name": "ACM SIGSOFT + Softw. Eng. Notes"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "0f59fe66d15f53e14a6d610d1059396ab3a2b064", "externalIds": {"MAG": + "3023786717", "CorpusId": 227303592}, "corpusId": 227303592, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0f59fe66d15f53e14a6d610d1059396ab3a2b064", "title": "The image construction in computerized axial tomography (CAT)", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "503", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. - Dijkstra"}]}, {"paperId": "74fad01f114d70d6eff1e71ebfebe15edaa53909", "externalIds": - {"MAG": "144202908", "DOI": "10.1007/978-3-642-87374-4_9", "CorpusId": 116744424}, - "url": "https://www.semanticscholar.org/paper/74fad01f114d70d6eff1e71ebfebe15edaa53909", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "503", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "74fad01f114d70d6eff1e71ebfebe15edaa53909", + "externalIds": {"MAG": "144202908", "DOI": "10.1007/978-3-642-87374-4_9", + "CorpusId": 116744424}, "corpusId": 116744424, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/74fad01f114d70d6eff1e71ebfebe15edaa53909", "title": "Extreme solutions of equations", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1987-06-01", - "journal": {"volume": "", "pages": "243-260", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "9ca344c21b8e1dadf5cae387c7577fb31c84703b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1987-06-01", "journal": {"volume": "", "pages": "243-260", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "9ca344c21b8e1dadf5cae387c7577fb31c84703b", "externalIds": {"MAG": "193628247", "DOI": "10.1007/978-3-642-82921-5_1", - "CorpusId": 60422229}, "url": "https://www.semanticscholar.org/paper/9ca344c21b8e1dadf5cae387c7577fb31c84703b", + "CorpusId": 60422229}, "corpusId": 60422229, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9ca344c21b8e1dadf5cae387c7577fb31c84703b", "title": "On the nature of computing science", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "1-4", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "9ee3aabdf8861e134bdceff595fabdf15841db9a", - "externalIds": {"MAG": "27032960", "CorpusId": 59707796}, "url": "https://www.semanticscholar.org/paper/9ee3aabdf8861e134bdceff595fabdf15841db9a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "1-4", "name": + ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "9ee3aabdf8861e134bdceff595fabdf15841db9a", "externalIds": {"MAG": "27032960", + "CorpusId": 59707796}, "corpusId": 59707796, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9ee3aabdf8861e134bdceff595fabdf15841db9a", "title": "Mathematicians and computing scientists: the cultural gap", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 10, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], - "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}], "publicationTypes": - null, "publicationDate": "1987-06-01", "journal": {"volume": "4", "pages": - "26-31", "name": "Abacus"}, "authors": [{"authorId": "3234559", "name": "E. - Dijkstra"}]}, {"paperId": "ca5102ff33a5ef09a67f2526a7d0c270a8282151", "externalIds": - {"DBLP": "journals/scp/Dijkstra87", "MAG": "2060249023", "DOI": "10.1016/0167-6423(87)90007-4", - "CorpusId": 11735085}, "url": "https://www.semanticscholar.org/paper/ca5102ff33a5ef09a67f2526a7d0c270a8282151", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}], "publicationTypes": null, "publicationDate": "1987-06-01", + "journal": {"volume": "4", "pages": "26-31", "name": "Abacus"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "ca5102ff33a5ef09a67f2526a7d0c270a8282151", + "externalIds": {"DBLP": "journals/scp/Dijkstra87", "MAG": "2060249023", "DOI": + "10.1016/0167-6423(87)90007-4", "CorpusId": 11735085}, "corpusId": 11735085, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca5102ff33a5ef09a67f2526a7d0c270a8282151", "title": "A Heuristic Explanation of Batcher''s Baffler", "abstract": null, "venue": "Sci. Comput. Program.", "year": 1987, "referenceCount": 1, "citationCount": - 9, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1987-12-01", "journal": - {"volume": "9", "pages": "213-220", "name": "Sci. Comput. Program."}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "2dd7a81ee34472d43dec61fadb441d26cf7d41a5", - "externalIds": {"MAG": "3022079391", "DOI": "10.1007/978-3-642-82921-5_14", - "CorpusId": 69324055}, "url": "https://www.semanticscholar.org/paper/2dd7a81ee34472d43dec61fadb441d26cf7d41a5", + 9, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1987-12-01", "journal": {"volume": "9", "pages": "213-220", "name": "Sci. + Comput. Program."}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "2dd7a81ee34472d43dec61fadb441d26cf7d41a5", "externalIds": {"MAG": + "3022079391", "DOI": "10.1007/978-3-642-82921-5_14", "CorpusId": 69324055}, + "corpusId": 69324055, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2dd7a81ee34472d43dec61fadb441d26cf7d41a5", "title": "The distributed snapshot of K.M. Chandy and L. Lamport", "abstract": null, "venue": "", "year": 1986, "referenceCount": 0, "citationCount": 13, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1986-12-31", "journal": {"volume": "", "pages": - "513-517", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "598d862fc036096b51e41d0134116b9f9d24e93e", "externalIds": {"MAG": - "2648220606", "DOI": "10.1007/978-3-642-82921-5_12", "CorpusId": 125937261}, - "url": "https://www.semanticscholar.org/paper/598d862fc036096b51e41d0134116b9f9d24e93e", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1986-12-31", "journal": {"volume": + "", "pages": "513-517", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "598d862fc036096b51e41d0134116b9f9d24e93e", + "externalIds": {"MAG": "2648220606", "DOI": "10.1007/978-3-642-82921-5_12", + "CorpusId": 125937261}, "corpusId": 125937261, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/598d862fc036096b51e41d0134116b9f9d24e93e", "title": "The image construction in computerized axial tomography", "abstract": null, "venue": "", "year": 1986, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1986-12-31", "journal": {"volume": "", "pages": "503-504", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "79e4eaf7dbd219f1cec2d3d844e0e035da03eb62", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1986-12-31", "journal": {"volume": + "", "pages": "503-504", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "79e4eaf7dbd219f1cec2d3d844e0e035da03eb62", "externalIds": {"MAG": "1980026967", "DOI": "10.1007/BF03023921", "CorpusId": - 120847834}, "url": "https://www.semanticscholar.org/paper/79e4eaf7dbd219f1cec2d3d844e0e035da03eb62", + 120847834}, "corpusId": 120847834, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79e4eaf7dbd219f1cec2d3d844e0e035da03eb62", "title": "On a cultural gap", "abstract": null, "venue": "", "year": 1986, "referenceCount": 0, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}], "publicationTypes": null, "publicationDate": "1986-03-01", - "journal": {"volume": "8", "pages": "48-52", "name": "The Mathematical Intelligencer"}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "da8a923ea8cec189c0db90d5e28327dd5abf85d8", "externalIds": {"MAG": "2903281428", - "DOI": "10.1007/978-3-642-82921-5_15", "CorpusId": 117932832}, "url": "https://www.semanticscholar.org/paper/da8a923ea8cec189c0db90d5e28327dd5abf85d8", + false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}], "publicationTypes": null, + "publicationDate": "1986-03-01", "journal": {"volume": "8", "pages": "48-52", + "name": "The Mathematical Intelligencer"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "da8a923ea8cec189c0db90d5e28327dd5abf85d8", + "externalIds": {"MAG": "2903281428", "DOI": "10.1007/978-3-642-82921-5_15", + "CorpusId": 117932832}, "corpusId": 117932832, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/da8a923ea8cec189c0db90d5e28327dd5abf85d8", "title": "A simple fix point argument without the restriction to continuity", "abstract": null, "venue": "", "year": 1986, "referenceCount": 0, "citationCount": - 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1986-12-31", "journal": {"volume": "", "pages": - "519-525", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, - {"authorId": "1685361", "name": "A. V. Gasteren"}]}, {"paperId": "1be7589c577f36da0efbde15f151bf927f56435e", - "externalIds": {"MAG": "1560437946", "CorpusId": 116571320}, "url": "https://www.semanticscholar.org/paper/1be7589c577f36da0efbde15f151bf927f56435e", + 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1986-12-31", "journal": {"volume": + "", "pages": "519-525", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}, {"authorId": "1685361", "name": "A. V. Gasteren"}]}, {"paperId": + "1be7589c577f36da0efbde15f151bf927f56435e", "externalIds": {"MAG": "1560437946", + "CorpusId": 116571320}, "corpusId": 116571320, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1be7589c577f36da0efbde15f151bf927f56435e", "title": "Control flow and data flow: Concepts of distributed programming", "abstract": null, "venue": "", "year": 1985, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "145471211", "name": "F. R. Bauer"}, {"authorId": "3234559", - "name": "E. Dijkstra"}, {"authorId": "144861543", "name": "C. Hoare"}]}, {"paperId": - "1f934987da001828649197d08c621060fa02eb50", "externalIds": {"MAG": "1620931347", - "DOI": "10.1098/rsta.1984.0072", "CorpusId": 58003220}, "url": "https://www.semanticscholar.org/paper/1f934987da001828649197d08c621060fa02eb50", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "145471211", "name": "F. R. Bauer"}, + {"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "144861543", + "name": "C. Hoare"}]}, {"paperId": "1f934987da001828649197d08c621060fa02eb50", + "externalIds": {"MAG": "1620931347", "DOI": "10.1098/rsta.1984.0072", "CorpusId": + 58003220}, "corpusId": 58003220, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1f934987da001828649197d08c621060fa02eb50", "title": "Invariance and non-determinacy", "abstract": "Since the earliest days of proving the correctness of programs, predicates on the program\u2019s state space have played a central role. This role became essential when non-deterministic @@ -1505,28 +1673,30 @@ interactions: be given and discussed.", "venue": "Philosophical Transactions of the Royal Society of London. Series A, Mathematical and Physical Sciences", "year": 1984, "referenceCount": 0, "citationCount": 30, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1984-10-01", - "journal": {"volume": "312", "pages": "491 - 499", "name": "Philosophical - Transactions of the Royal Society of London. Series A, Mathematical and Physical - Sciences"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "80ecf29599b3044dbdb214ed5c6df714e1749188", "externalIds": {"MAG": - "251147925", "DOI": "10.1016/0377-2217(84)90026-2", "CorpusId": 60266405}, - "url": "https://www.semanticscholar.org/paper/80ecf29599b3044dbdb214ed5c6df714e1749188", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1984-10-01", "journal": {"volume": "312", "pages": + "491 - 499", "name": "Philosophical Transactions of the Royal Society of London. + Series A, Mathematical and Physical Sciences"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "80ecf29599b3044dbdb214ed5c6df714e1749188", + "externalIds": {"MAG": "251147925", "DOI": "10.1016/0377-2217(84)90026-2", + "CorpusId": 60266405}, "corpusId": 60266405, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/80ecf29599b3044dbdb214ed5c6df714e1749188", "title": "The evolution of programs: Nachum Dershowitz Volume 5 in: Progress in Computer Science, Birkh\u00e4user, Basel, 1983, 357 pages, Sfr.64.00", "abstract": null, "venue": "", "year": 1984, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1984-07-01", "journal": {"volume": - "17", "pages": "134", "name": "European Journal of Operational Research"}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "2565c5d5bab4be7fdaf6368c5c1501d91f1d5f78", "externalIds": {"DBLP": "journals/it/Dijkstra83", - "MAG": "2165765481", "DOI": "10.1524/itit.1983.25.16.286", "CorpusId": 1009831}, - "url": "https://www.semanticscholar.org/paper/2565c5d5bab4be7fdaf6368c5c1501d91f1d5f78", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1984-07-01", + "journal": {"volume": "17", "pages": "134", "name": "European Journal of Operational + Research"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "2565c5d5bab4be7fdaf6368c5c1501d91f1d5f78", "externalIds": {"DBLP": + "journals/it/Dijkstra83", "MAG": "2165765481", "DOI": "10.1524/itit.1983.25.16.286", + "CorpusId": 1009831}, "corpusId": 1009831, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2565c5d5bab4be7fdaf6368c5c1501d91f1d5f78", "title": "The fruits of misunderstanding", "abstract": "Ein echter Dijkstra, geistreich und kontrovers Viele Tr\u00e4ume der sechziger Jahre haben sich in Entt\u00e4uschungen verwandelt und werden nun durch Slogans erkl\u00e4rt. @@ -1539,13 +1709,14 @@ interactions: alte W\u00f6rter. Man lese diesen Beitrag, und man wird nachdenklich werden. Zern", "venue": "Elektron. Rechenanlagen", "year": 1983, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "25", "pages": "286 - 289"}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "61ce8adcaa86fe37a3e87e10169bfe5ddc8fe7f7", "externalIds": {"DBLP": "journals/cacm/Dijkstra83a", - "MAG": "2182780382", "DOI": "10.1145/357980.357999", "CorpusId": 52854209}, - "url": "https://www.semanticscholar.org/paper/61ce8adcaa86fe37a3e87e10169bfe5ddc8fe7f7", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"volume": "25", "pages": + "286 - 289"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "61ce8adcaa86fe37a3e87e10169bfe5ddc8fe7f7", "externalIds": {"DBLP": + "journals/cacm/Dijkstra83a", "MAG": "2182780382", "DOI": "10.1145/357980.357999", + "CorpusId": 52854209}, "corpusId": 52854209, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/61ce8adcaa86fe37a3e87e10169bfe5ddc8fe7f7", "title": "The structure of \u201cTHE\u201d-multiprogramming system", "abstract": "A multiprogramming system is described in which all activities are divided over a number of sequential processes. These sequential processes are placed @@ -1554,428 +1725,481 @@ interactions: verification of the logical soundness of the design and the correctness of its implementation.", "venue": "CACM", "year": 1983, "referenceCount": 1, "citationCount": 77, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "26", "pages": "49-52", "name": "Commun. ACM"}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "a1dd203c6159a1eddaa2d7cc104d4c06a7ffffa4", "externalIds": {"MAG": "2692659220", - "DBLP": "journals/ipl/DijkstraFG83", "DOI": "10.1016/0020-0190(83)90092-3", - "CorpusId": 45344979}, "url": "https://www.semanticscholar.org/paper/a1dd203c6159a1eddaa2d7cc104d4c06a7ffffa4", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/357980.357999", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "26", "pages": "49-52", "name": + "Commun. ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "a1dd203c6159a1eddaa2d7cc104d4c06a7ffffa4", "externalIds": {"MAG": + "2692659220", "DBLP": "journals/ipl/DijkstraFG83", "DOI": "10.1016/0020-0190(83)90092-3", + "CorpusId": 45344979}, "corpusId": 45344979, "publicationVenue": {"id": "44ecc2bb-f8fd-4c6d-bd54-30ca098be91d", + "name": "Information Processing Letters", "type": "journal", "alternate_names": + ["Inf Process Lett"], "issn": "0020-0190", "url": "http://www.elsevier.com/locate/ipl", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505612/description#description", + "http://www.sciencedirect.com/science/journal/00200190"]}, "url": "https://www.semanticscholar.org/paper/a1dd203c6159a1eddaa2d7cc104d4c06a7ffffa4", "title": "Derivation of a Termination Detection Algorithm for Distributed Computations", "abstract": null, "venue": "Information Processing Letters", "year": 1983, "referenceCount": 2, "citationCount": 360, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1983-06-10", "journal": {"volume": "16", "pages": "217-219", - "name": "Inf. Process. Lett."}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}, {"authorId": "2462914", "name": "W. Feijen"}, {"authorId": - "1685361", "name": "A. V. Gasteren"}]}, {"paperId": "ad5654d3854c743d32291eb62ca4d7608fc486ea", - "externalIds": {"MAG": "2170523074", "DBLP": "journals/cacm/Dijkstra83", "DOI": - "10.1145/357980.357989", "CorpusId": 22722460}, "url": "https://www.semanticscholar.org/paper/ad5654d3854c743d32291eb62ca4d7608fc486ea", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1983-06-10", "journal": + {"volume": "16", "pages": "217-219", "name": "Inf. Process. Lett."}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2462914", "name": + "W. Feijen"}, {"authorId": "1685361", "name": "A. V. Gasteren"}]}, {"paperId": + "ad5654d3854c743d32291eb62ca4d7608fc486ea", "externalIds": {"MAG": "2170523074", + "DBLP": "journals/cacm/Dijkstra83", "DOI": "10.1145/357980.357989", "CorpusId": + 22722460}, "corpusId": 22722460, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad5654d3854c743d32291eb62ca4d7608fc486ea", "title": "Solution of a problem in concurrent programming control", "abstract": "A number of mainly independent sequential-cyclic processes with restricted means of communication with each other can be made in such a way that at any moment one and only one of them is engaged in the \u201ccritical section\u201d of its cycle.", "venue": "CACM", "year": 1965, "referenceCount": 0, "citationCount": - 283, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1965-09-01", "journal": - {"volume": "26", "pages": "21-22", "name": "Commun. ACM"}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "029e3a6a85d83aa2b16744a979b39a31ecc5bde3", - "externalIds": {"MAG": "133212033", "DOI": "10.1007/978-1-4612-5695-3_36", - "CorpusId": 116498799}, "url": "https://www.semanticscholar.org/paper/029e3a6a85d83aa2b16744a979b39a31ecc5bde3", + 283, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1965-09-01", "journal": {"volume": "26", "pages": "21-22", "name": "Commun. + ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "029e3a6a85d83aa2b16744a979b39a31ecc5bde3", "externalIds": {"MAG": "133212033", + "DOI": "10.1007/978-1-4612-5695-3_36", "CorpusId": 116498799}, "corpusId": + 116498799, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/029e3a6a85d83aa2b16744a979b39a31ecc5bde3", "title": "An Exercise for Dr. R. M. Burstall", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "pages": "215-216", "name": - ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "089dbaddb839843720f525ce843c0d7a8f039e06", "externalIds": {"MAG": "348908286", - "DOI": "10.1007/978-1-4612-5695-3_41", "CorpusId": 174476346}, "url": "https://www.semanticscholar.org/paper/089dbaddb839843720f525ce843c0d7a8f039e06", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "215-216", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "089dbaddb839843720f525ce843c0d7a8f039e06", "externalIds": {"MAG": + "348908286", "DOI": "10.1007/978-1-4612-5695-3_41", "CorpusId": 174476346}, + "corpusId": 174476346, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/089dbaddb839843720f525ce843c0d7a8f039e06", "title": "More About the Function \u201cfusc\u201d (A Sequel to EWD570)", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 8, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "230-232", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "0db6871a3ce0d0e5f5300cb79b294b5a54a96937", - "externalIds": {"MAG": "140559743", "DOI": "10.1007/978-1-4612-5695-3_58", - "CorpusId": 150428258}, "url": "https://www.semanticscholar.org/paper/0db6871a3ce0d0e5f5300cb79b294b5a54a96937", + 8, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "pages": "230-232", "name": + ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "0db6871a3ce0d0e5f5300cb79b294b5a54a96937", "externalIds": {"MAG": "140559743", + "DOI": "10.1007/978-1-4612-5695-3_58", "CorpusId": 150428258}, "corpusId": + 150428258, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0db6871a3ce0d0e5f5300cb79b294b5a54a96937", "title": "The Three Golden Rules for Successful Scientific Research", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 3, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], - "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": - "Geology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "329-330", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "11e0a52440a987753b1552db41bcb8d4fe5af5f6", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "329-330", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "11e0a52440a987753b1552db41bcb8d4fe5af5f6", "externalIds": {"MAG": "809697202", "DOI": "10.1007/978-1-4612-5695-3_65", - "CorpusId": 117106812}, "url": "https://www.semanticscholar.org/paper/11e0a52440a987753b1552db41bcb8d4fe5af5f6", + "CorpusId": 117106812}, "corpusId": 117106812, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/11e0a52440a987753b1552db41bcb8d4fe5af5f6", "title": "The Equivalence of Bounded Nondeterminacy and Continuity", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 8, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "358-359", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "15a375947528a7c425397559c46cea18ae1f9440", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "358-359", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "15a375947528a7c425397559c46cea18ae1f9440", "externalIds": {"MAG": "111977476", "DOI": "10.1007/978-1-4612-5695-3_38", - "CorpusId": 107708749}, "url": "https://www.semanticscholar.org/paper/15a375947528a7c425397559c46cea18ae1f9440", + "CorpusId": 107708749}, "corpusId": 107708749, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/15a375947528a7c425397559c46cea18ae1f9440", "title": "To H. D. Mills, Chairman Software Methodology Panel", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "220-222", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "1688a30bb97eccd5da6defb270cdb8d9c493e561", "externalIds": {"MAG": - "27673502", "DOI": "10.1007/978-1-4612-5695-3_52", "CorpusId": 108071812}, - "url": "https://www.semanticscholar.org/paper/1688a30bb97eccd5da6defb270cdb8d9c493e561", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "220-222", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "1688a30bb97eccd5da6defb270cdb8d9c493e561", + "externalIds": {"MAG": "27673502", "DOI": "10.1007/978-1-4612-5695-3_52", + "CorpusId": 108071812}, "corpusId": 108071812, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1688a30bb97eccd5da6defb270cdb8d9c493e561", "title": "On Webster, Users, Bugs, and Aristotle", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "288-291", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "180ca3a30320ca12d58292767ee8aee216f79f02", - "externalIds": {"MAG": "76554270", "DOI": "10.1007/978-1-4612-5695-3_32", - "CorpusId": 59779214}, "url": "https://www.semanticscholar.org/paper/180ca3a30320ca12d58292767ee8aee216f79f02", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "pages": "288-291", "name": + ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "180ca3a30320ca12d58292767ee8aee216f79f02", "externalIds": {"MAG": "76554270", + "DOI": "10.1007/978-1-4612-5695-3_32", "CorpusId": 59779214}, "corpusId": + 59779214, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/180ca3a30320ca12d58292767ee8aee216f79f02", "title": "Mathematics Inc., a Private Letter from Its Chairman", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 2, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "184-187", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "18863e98acdab64a165dccf985e58d7dabad4626", "externalIds": {"MAG": "328581767", "DOI": "10.1007/978-1-4612-5695-3_20", "CorpusId": 118028538}, - "url": "https://www.semanticscholar.org/paper/18863e98acdab64a165dccf985e58d7dabad4626", + "corpusId": 118028538, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/18863e98acdab64a165dccf985e58d7dabad4626", "title": "Exercises in Making Programs Robust", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "110-119", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "1a15ceddf1ff128a07ad8c3fe31c9d7cd11e2a5f", - "externalIds": {"MAG": "261707013", "DOI": "10.1007/978-1-4612-5695-3_55", - "CorpusId": 60345101}, "url": "https://www.semanticscholar.org/paper/1a15ceddf1ff128a07ad8c3fe31c9d7cd11e2a5f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "110-119", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "1a15ceddf1ff128a07ad8c3fe31c9d7cd11e2a5f", "externalIds": {"MAG": + "261707013", "DOI": "10.1007/978-1-4612-5695-3_55", "CorpusId": 60345101}, + "corpusId": 60345101, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1a15ceddf1ff128a07ad8c3fe31c9d7cd11e2a5f", "title": "On Two Beautiful Solutions Designed by Martin Rem", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "313-318", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "1bddd747e7f0ba0141e252956a6e51c1d04c2686", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "313-318", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "1bddd747e7f0ba0141e252956a6e51c1d04c2686", "externalIds": {"DBLP": "books/daglib/0067388", "MAG": "1759083992", "DOI": - "10.1007/978-1-4612-5695-3", "CorpusId": 29320398}, "url": "https://www.semanticscholar.org/paper/1bddd747e7f0ba0141e252956a6e51c1d04c2686", + "10.1007/978-1-4612-5695-3", "CorpusId": 29320398}, "corpusId": 29320398, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1bddd747e7f0ba0141e252956a6e51c1d04c2686", "title": "Selected Writings on Computing: A personal Perspective", "abstract": null, "venue": "Texts and Monographs in Computer Science", "year": 1982, "referenceCount": 0, "citationCount": 486, "influentialCitationCount": 13, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"pages": - "I-XVII, 1-362"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "2612a398d786966222d523ef43c5404e2e63368e", "externalIds": {"MAG": - "127608724", "DOI": "10.1007/978-1-4612-5695-3_25", "CorpusId": 172570021}, - "url": "https://www.semanticscholar.org/paper/2612a398d786966222d523ef43c5404e2e63368e", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"pages": "I-XVII, 1-362"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "2612a398d786966222d523ef43c5404e2e63368e", + "externalIds": {"MAG": "127608724", "DOI": "10.1007/978-1-4612-5695-3_25", + "CorpusId": 172570021}, "corpusId": 172570021, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2612a398d786966222d523ef43c5404e2e63368e", "title": "Erratum and Embellishments of EWD503", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "145-146", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "271eb6cfc5fb23a7858228f3f899cbf049345461", "externalIds": {"MAG": - "2260075582", "DOI": "10.1007/978-1-4612-5695-3_27", "CorpusId": 179282122}, - "url": "https://www.semanticscholar.org/paper/271eb6cfc5fb23a7858228f3f899cbf049345461", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": + "", "pages": "145-146", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "271eb6cfc5fb23a7858228f3f899cbf049345461", + "externalIds": {"MAG": "2260075582", "DOI": "10.1007/978-1-4612-5695-3_27", + "CorpusId": 179282122}, "corpusId": 179282122, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/271eb6cfc5fb23a7858228f3f899cbf049345461", "title": "Comments at a Symposium", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "161-164", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "29759dba517f3f543b4bacb02c3aa8950c7cc48b", "externalIds": {"MAG": - "46671456", "DOI": "10.1007/978-1-4612-5695-3_16", "CorpusId": 59733140}, - "url": "https://www.semanticscholar.org/paper/29759dba517f3f543b4bacb02c3aa8950c7cc48b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": + "", "pages": "161-164", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "29759dba517f3f543b4bacb02c3aa8950c7cc48b", + "externalIds": {"MAG": "46671456", "DOI": "10.1007/978-1-4612-5695-3_16", + "CorpusId": 59733140}, "corpusId": 59733140, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/29759dba517f3f543b4bacb02c3aa8950c7cc48b", "title": "Trip Report E. W. Dijkstra, Meeting IFIP W.G.2.3, Munich, 8\u201314 December 1974", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "89-94", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "2b75cf25e16332a24d228bfe0adef847f6879658", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "89-94", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "2b75cf25e16332a24d228bfe0adef847f6879658", "externalIds": {"MAG": "2100394762", "DOI": "10.1007/978-1-4612-5695-3_46", - "CorpusId": 162833264}, "url": "https://www.semanticscholar.org/paper/2b75cf25e16332a24d228bfe0adef847f6879658", + "CorpusId": 162833264}, "corpusId": 162833264, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2b75cf25e16332a24d228bfe0adef847f6879658", "title": "Trip Report E. W. Dijkstra, St. Pierre-de-Chartreuse, 12\u201319 Dec. 1976", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": + "History", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "253-258", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "2b8c8fdae10b25d80e48bd896fa8245d0009cdc4", "externalIds": {"MAG": "2118345586", "DOI": "10.1007/978-1-4612-5695-3_17", - "CorpusId": 62214980}, "url": "https://www.semanticscholar.org/paper/2b8c8fdae10b25d80e48bd896fa8245d0009cdc4", + "CorpusId": 62214980}, "corpusId": 62214980, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2b8c8fdae10b25d80e48bd896fa8245d0009cdc4", "title": "Trip Report Visit ETH Zurich, 3\u20134 February 1975 by E. W. Dijkstra", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "95-98", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "2dc5ecd93c176e291360bea79b4e517e4d2a82ab", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "History", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "95-98", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "2dc5ecd93c176e291360bea79b4e517e4d2a82ab", "externalIds": {"MAG": "1021142687", "DOI": "10.1007/978-1-4612-5695-3_34", - "CorpusId": 60560610}, "url": "https://www.semanticscholar.org/paper/2dc5ecd93c176e291360bea79b4e517e4d2a82ab", + "CorpusId": 60560610}, "corpusId": 60560610, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2dc5ecd93c176e291360bea79b4e517e4d2a82ab", "title": "A \u201cNon Trip Report\u201d from E. W. Dijkstra", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "200-204", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "319d89730262ed72fed3f00eb761a75c3419dcd0", "externalIds": {"MAG": - "303047274", "DOI": "10.1007/978-1-4612-5695-3_50", "CorpusId": 128109637}, - "url": "https://www.semanticscholar.org/paper/319d89730262ed72fed3f00eb761a75c3419dcd0", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "200-204", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "319d89730262ed72fed3f00eb761a75c3419dcd0", + "externalIds": {"MAG": "303047274", "DOI": "10.1007/978-1-4612-5695-3_50", + "CorpusId": 128109637}, "corpusId": 128109637, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/319d89730262ed72fed3f00eb761a75c3419dcd0", "title": "Trip Report E. W. Dijkstra, Australia, 16 February 1977\u201321 March 1977", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "277-283", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "34da9bcd9654c64cebe2aedf206ff9470b28aa94", + "openAccessPdf": null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": + [{"category": "Geography", "source": "external"}, {"category": "Political + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "277-283", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "34da9bcd9654c64cebe2aedf206ff9470b28aa94", "externalIds": {"MAG": "133200233", "DOI": "10.1007/978-1-4612-5695-3_6", - "CorpusId": 59846212}, "url": "https://www.semanticscholar.org/paper/34da9bcd9654c64cebe2aedf206ff9470b28aa94", + "CorpusId": 59846212}, "corpusId": 59846212, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/34da9bcd9654c64cebe2aedf206ff9470b28aa94", "title": "Trip Report IBM Seminar \u201cCommunication and Computers\u201d, Newcastle, Sept. 1973", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "36-40", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "3c3d6f08abdf7bb7e79c78c225374f857e7c98a1", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "36-40", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3c3d6f08abdf7bb7e79c78c225374f857e7c98a1", "externalIds": {"MAG": "78711448", "DOI": "10.1007/978-1-4612-5695-3_4", "CorpusId": - 126955035}, "url": "https://www.semanticscholar.org/paper/3c3d6f08abdf7bb7e79c78c225374f857e7c98a1", + 126955035}, "corpusId": 126955035, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3c3d6f08abdf7bb7e79c78c225374f857e7c98a1", "title": "Trip Report E. W. Dijkstra, Summer School Munich, July 25 to August 4, 1973", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "4709b1bc031dce6a05513ef30ba1efc9da9d8b4a", - "externalIds": {"MAG": "1550939193", "DOI": "10.1007/978-1-4612-5695-3_47", - "CorpusId": 118036958}, "url": "https://www.semanticscholar.org/paper/4709b1bc031dce6a05513ef30ba1efc9da9d8b4a", + "openAccessPdf": null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": + [{"category": "Geography", "source": "external"}, {"category": "History", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "4709b1bc031dce6a05513ef30ba1efc9da9d8b4a", "externalIds": {"MAG": + "1550939193", "DOI": "10.1007/978-1-4612-5695-3_47", "CorpusId": 118036958}, + "corpusId": 118036958, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4709b1bc031dce6a05513ef30ba1efc9da9d8b4a", "title": "A Correctness Proof for Communicating Processes: A Small Exercise", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 19, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "259-263", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "4a7b89f2957f8bb03c16e06a19bd69438ad1591d", "externalIds": {"MAG": - "986697303", "DOI": "10.1007/978-1-4612-5695-3_30", "CorpusId": 118809720}, - "url": "https://www.semanticscholar.org/paper/4a7b89f2957f8bb03c16e06a19bd69438ad1591d", + 19, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "259-263", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "4a7b89f2957f8bb03c16e06a19bd69438ad1591d", + "externalIds": {"MAG": "986697303", "DOI": "10.1007/978-1-4612-5695-3_30", + "CorpusId": 118809720}, "corpusId": 118809720, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4a7b89f2957f8bb03c16e06a19bd69438ad1591d", "title": "More on Hauck\u2019s Warning", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "172-173", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "4b09afab9bc2b986c4fe4fed067dc17115e40925", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "172-173", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "4b09afab9bc2b986c4fe4fed067dc17115e40925", "externalIds": {"MAG": "2213709779", "DOI": "10.1007/978-1-4612-5695-3_54", - "CorpusId": 123626065}, "url": "https://www.semanticscholar.org/paper/4b09afab9bc2b986c4fe4fed067dc17115e40925", + "CorpusId": 123626065}, "corpusId": 123626065, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4b09afab9bc2b986c4fe4fed067dc17115e40925", "title": "The Mathematics Behind the Banker\u2019s Algorithm", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 32, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "308-312", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "4bdf1ce9ae67005e1ac9f924d06cfb535f164319", - "externalIds": {"MAG": "992250731", "DOI": "10.1007/978-1-4612-5695-3_28", - "CorpusId": 107156206}, "url": "https://www.semanticscholar.org/paper/4bdf1ce9ae67005e1ac9f924d06cfb535f164319", + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "308-312", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "4bdf1ce9ae67005e1ac9f924d06cfb535f164319", "externalIds": {"MAG": + "992250731", "DOI": "10.1007/978-1-4612-5695-3_28", "CorpusId": 107156206}, + "corpusId": 107156206, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4bdf1ce9ae67005e1ac9f924d06cfb535f164319", "title": "Trip Report E. W. Dijkstra, Newcastle, 8\u201312 September 1975", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "165-168", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "509937fe91bd57ad4304b336c8726effafcc5642", "externalIds": {"MAG": - "321405985", "DOI": "10.1007/978-1-4612-5695-3_53", "CorpusId": 117478830}, - "url": "https://www.semanticscholar.org/paper/509937fe91bd57ad4304b336c8726effafcc5642", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "History", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "165-168", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "509937fe91bd57ad4304b336c8726effafcc5642", + "externalIds": {"MAG": "321405985", "DOI": "10.1007/978-1-4612-5695-3_53", + "CorpusId": 117478830}, "corpusId": 117478830, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/509937fe91bd57ad4304b336c8726effafcc5642", "title": "On Making Solutions More and More Fine-Grained", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "292-307", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "54f9239a55f1fb4f9f22e955d576cc1b5473ea70", "externalIds": {"MAG": - "309306838", "DOI": "10.1007/978-1-4612-5695-3_56", "CorpusId": 174256100}, - "url": "https://www.semanticscholar.org/paper/54f9239a55f1fb4f9f22e955d576cc1b5473ea70", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "292-307", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "54f9239a55f1fb4f9f22e955d576cc1b5473ea70", + "externalIds": {"MAG": "309306838", "DOI": "10.1007/978-1-4612-5695-3_56", + "CorpusId": 174256100}, "corpusId": 174256100, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/54f9239a55f1fb4f9f22e955d576cc1b5473ea70", "title": "Trip Report E. W. Dijkstra, Newcastle-upon-Tyne, 5\u201310 Sept. 1977", "abstract": null, "venue": "", "year": 1982, "referenceCount": 3, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "319-323", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "5b4c35f5cb457023ba27f62a3c378a86df295f77", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "History", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "319-323", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "5b4c35f5cb457023ba27f62a3c378a86df295f77", "externalIds": {"MAG": "2099702901", "DOI": "10.1007/978-1-4612-5695-3_49", - "CorpusId": 129163466}, "url": "https://www.semanticscholar.org/paper/5b4c35f5cb457023ba27f62a3c378a86df295f77", + "CorpusId": 129163466}, "corpusId": 129163466, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5b4c35f5cb457023ba27f62a3c378a86df295f77", "title": "On the Fact that the Atlantic Ocean Has Two Sides", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 10, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["History"], - "s2FieldsOfStudy": [{"category": "History", "source": "external"}, {"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "268-276", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "5c8c3aedfb4e12e01b69bbac308e7a29a5f97ddc", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "268-276", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "5c8c3aedfb4e12e01b69bbac308e7a29a5f97ddc", "externalIds": {"MAG": "1526582584", "DOI": "10.1007/978-1-4612-5695-3_33", - "CorpusId": 142616039}, "url": "https://www.semanticscholar.org/paper/5c8c3aedfb4e12e01b69bbac308e7a29a5f97ddc", + "CorpusId": 142616039}, "corpusId": 142616039, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5c8c3aedfb4e12e01b69bbac308e7a29a5f97ddc", "title": "A Personal Summary of the Gries\u2014Owicki Theory", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 33, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], - "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "188-199", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "694025176bc4b18513fff6049afd37137468c5fd", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "188-199", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "694025176bc4b18513fff6049afd37137468c5fd", "externalIds": {"MAG": "151312587", "DOI": "10.1007/978-1-4612-5695-3_11", - "CorpusId": 173644778}, "url": "https://www.semanticscholar.org/paper/694025176bc4b18513fff6049afd37137468c5fd", + "CorpusId": 173644778}, "corpusId": 173644778, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/694025176bc4b18513fff6049afd37137468c5fd", "title": "A Multidisciplinary Approach to Mathematics", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "56-59", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "6e2edc5891cf079737850faeddb04660f23e1eaa", - "externalIds": {"MAG": "280163585", "DOI": "10.1007/978-1-4612-5695-3_66", - "CorpusId": 60231910}, "url": "https://www.semanticscholar.org/paper/6e2edc5891cf079737850faeddb04660f23e1eaa", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "56-59", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "6e2edc5891cf079737850faeddb04660f23e1eaa", "externalIds": {"MAG": + "280163585", "DOI": "10.1007/978-1-4612-5695-3_66", "CorpusId": 60231910}, + "corpusId": 60231910, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e2edc5891cf079737850faeddb04660f23e1eaa", "title": "A Story that Starts with a Very Good Computer", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "360-362", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "6e59e779b6d914e1bc4a765a1aabc479d02bfd96", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "360-362", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "6e59e779b6d914e1bc4a765a1aabc479d02bfd96", "externalIds": {"MAG": "156238129", "DOI": "10.1007/978-1-4612-5695-3_14", - "CorpusId": 107528917}, "url": "https://www.semanticscholar.org/paper/6e59e779b6d914e1bc4a765a1aabc479d02bfd96", + "CorpusId": 107528917}, "corpusId": 107528917, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6e59e779b6d914e1bc4a765a1aabc479d02bfd96", "title": "A New Elephant Built from Mosquitoes Humming in Harmony", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 4, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "79-83", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "717cd0d6d818edd25be2b78a84c6c7783e3d1e63", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "History", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "79-83", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "717cd0d6d818edd25be2b78a84c6c7783e3d1e63", "externalIds": {"MAG": "84942249", "DOI": "10.1007/978-1-4612-5695-3_18", - "CorpusId": 160349919}, "url": "https://www.semanticscholar.org/paper/717cd0d6d818edd25be2b78a84c6c7783e3d1e63", + "CorpusId": 160349919}, "corpusId": 160349919, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/717cd0d6d818edd25be2b78a84c6c7783e3d1e63", "title": "A Letter to My Old Friend Jonathan", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "99-103", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "7281b752eca962a7b80ec477792e602539dce858", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "99-103", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "7281b752eca962a7b80ec477792e602539dce858", "externalIds": {"MAG": "344665621", "DOI": "10.1007/978-1-4612-5695-3_51", - "CorpusId": 119017836}, "url": "https://www.semanticscholar.org/paper/7281b752eca962a7b80ec477792e602539dce858", + "CorpusId": 119017836}, "corpusId": 119017836, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7281b752eca962a7b80ec477792e602539dce858", "title": "A Somewhat Open Letter to EAA or: Why I Proved the Boundedness of the Nondeterminacy in the Way I Did", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "284-287", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "73aa4a3785dea97f2fd4fc7cf137254876bcb139", "externalIds": {"MAG": - "74141201", "DOI": "10.1007/978-94-009-7893-5_8", "CorpusId": 115461393}, - "url": "https://www.semanticscholar.org/paper/73aa4a3785dea97f2fd4fc7cf137254876bcb139", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "284-287", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "73aa4a3785dea97f2fd4fc7cf137254876bcb139", + "externalIds": {"MAG": "74141201", "DOI": "10.1007/978-94-009-7893-5_8", "CorpusId": + 115461393}, "corpusId": 115461393, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/73aa4a3785dea97f2fd4fc7cf137254876bcb139", "title": "Repaying Our Debts", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"volume": "", "pages": "135-141", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "77f3be9cb5bcbfbc0ab42739d98d5fae9998ce39", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"volume": "", "pages": "135-141", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "77f3be9cb5bcbfbc0ab42739d98d5fae9998ce39", "externalIds": {"MAG": "2154995575", "DOI": "10.1007/978-1-4612-5695-3_8", - "CorpusId": 145810834}, "url": "https://www.semanticscholar.org/paper/77f3be9cb5bcbfbc0ab42739d98d5fae9998ce39", + "CorpusId": 145810834}, "corpusId": 145810834, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/77f3be9cb5bcbfbc0ab42739d98d5fae9998ce39", "title": "Acceptance Speech for the AFIPS Harry Goode Memorial Award 1974", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "47-49", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "7d62049205495389bc01232fbd948baad080ca3b", "externalIds": {"MAG": - "35405114", "DOI": "10.1007/978-94-009-7893-5_2", "CorpusId": 172754058}, - "url": "https://www.semanticscholar.org/paper/7d62049205495389bc01232fbd948baad080ca3b", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "47-49", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "7d62049205495389bc01232fbd948baad080ca3b", + "externalIds": {"MAG": "35405114", "DOI": "10.1007/978-94-009-7893-5_2", "CorpusId": + 172754058}, "corpusId": 172754058, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7d62049205495389bc01232fbd948baad080ca3b", "title": "Lambek and Moser Revisited", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "19-23", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "87270dead96129fb42fde0bd7fdc6d88e4864021", - "externalIds": {"MAG": "2239459155", "DOI": "10.1007/978-1-4612-5695-3_37", - "CorpusId": 123956527}, "url": "https://www.semanticscholar.org/paper/87270dead96129fb42fde0bd7fdc6d88e4864021", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "pages": "19-23", "name": + ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "87270dead96129fb42fde0bd7fdc6d88e4864021", "externalIds": {"MAG": "2239459155", + "DOI": "10.1007/978-1-4612-5695-3_37", "CorpusId": 123956527}, "corpusId": + 123956527, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/87270dead96129fb42fde0bd7fdc6d88e4864021", "title": "A Great Improvement", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "217-219", "name": ""}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "87cddb64e07a70decb0da63c30f8a45a55338fc5", + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "217-219", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "87cddb64e07a70decb0da63c30f8a45a55338fc5", "externalIds": {"MAG": "2188899922", "DOI": "10.1007/978-1-4612-5695-3_29", - "CorpusId": 177599564}, "url": "https://www.semanticscholar.org/paper/87cddb64e07a70decb0da63c30f8a45a55338fc5", + "CorpusId": 177599564}, "corpusId": 177599564, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/87cddb64e07a70decb0da63c30f8a45a55338fc5", "title": "On a Warning from E. A. Hauck", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "169-171", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "89ed3694ca0625490682e0538b4861cc6fb192da", - "externalIds": {"MAG": "260730186", "DOI": "10.1007/978-1-4612-5695-3_48", - "CorpusId": 126925376}, "url": "https://www.semanticscholar.org/paper/89ed3694ca0625490682e0538b4861cc6fb192da", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "169-171", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "89ed3694ca0625490682e0538b4861cc6fb192da", "externalIds": {"MAG": + "260730186", "DOI": "10.1007/978-1-4612-5695-3_48", "CorpusId": 126925376}, + "corpusId": 126925376, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/89ed3694ca0625490682e0538b4861cc6fb192da", "title": "An Elephant Inspired by the Dutch National Flag", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": - [{"category": "Geography", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "264-267", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "9392f965bf1519a8898eecb78827f4166f20d9bb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Geography"], + "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "264-267", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "9392f965bf1519a8898eecb78827f4166f20d9bb", "externalIds": {"MAG": "302841227", "DOI": "10.1007/978-1-4612-5695-3_43", - "CorpusId": 127796703}, "url": "https://www.semanticscholar.org/paper/9392f965bf1519a8898eecb78827f4166f20d9bb", + "CorpusId": 127796703}, "corpusId": 127796703, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9392f965bf1519a8898eecb78827f4166f20d9bb", "title": "Trip Report E. W. Dijkstra, Poland and USSR, 4\u201325 September 1976", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "pages": "235-244", "name": - ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "9b1ef7c317d71654d726432708733e6e2a9ce76e", "externalIds": {"MAG": "68614857", - "DOI": "10.1007/978-1-4612-5695-3_39", "CorpusId": 116819834}, "url": "https://www.semanticscholar.org/paper/9b1ef7c317d71654d726432708733e6e2a9ce76e", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", + "source": "external"}, {"category": "History", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "235-244", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "9b1ef7c317d71654d726432708733e6e2a9ce76e", + "externalIds": {"MAG": "68614857", "DOI": "10.1007/978-1-4612-5695-3_39", + "CorpusId": 116819834}, "corpusId": 116819834, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9b1ef7c317d71654d726432708733e6e2a9ce76e", "title": "On Subgoal Induction", "abstract": null, "venue": "", "year": 1982, "referenceCount": 2, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "223-224", "name": ""}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "a08c6d12a19363fc7cb980eb124ba6b33009b396", + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "223-224", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "a08c6d12a19363fc7cb980eb124ba6b33009b396", "externalIds": {"MAG": "1521176854", "DOI": "10.1007/978-94-009-7893-5_15", - "CorpusId": 60501336}, "url": "https://www.semanticscholar.org/paper/a08c6d12a19363fc7cb980eb124ba6b33009b396", + "CorpusId": 60501336}, "corpusId": 60501336, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a08c6d12a19363fc7cb980eb124ba6b33009b396", "title": "A Tutorial on the Split Binary Semaphore", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 23, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "pages": "555-564", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "a20466d2c889fdd6895d9c01d4d6fb3381775bdc", - "externalIds": {"MAG": "343632611", "DOI": "10.1007/978-1-4612-5695-3_61", - "CorpusId": 107586485}, "url": "https://www.semanticscholar.org/paper/a20466d2c889fdd6895d9c01d4d6fb3381775bdc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": {"volume": "", "pages": "555-564", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "a20466d2c889fdd6895d9c01d4d6fb3381775bdc", "externalIds": {"MAG": + "343632611", "DOI": "10.1007/978-1-4612-5695-3_61", "CorpusId": 107586485}, + "corpusId": 107586485, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a20466d2c889fdd6895d9c01d4d6fb3381775bdc", "title": "\u201cWhy is Software So Expensive?\u201d An Explanation to the Hardware Designer", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "338-348", "name": ""}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "a804c210952af84adfeeb1f2e2c4f6eb15c6e034", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "338-348", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "a804c210952af84adfeeb1f2e2c4f6eb15c6e034", "externalIds": {"MAG": "1989965744", "DBLP": "journals/sigplan/Dijkstra82", - "DOI": "10.1145/947923.947924", "CorpusId": 11112895}, "url": "https://www.semanticscholar.org/paper/a804c210952af84adfeeb1f2e2c4f6eb15c6e034", + "DOI": "10.1145/947923.947924", "CorpusId": 11112895}, "corpusId": 11112895, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a804c210952af84adfeeb1f2e2c4f6eb15c6e034", "title": "How do we tell truths that might hurt?", "abstract": "Sometimes we discover unpleasant truths. Whenever we do so, we are in difficulties: suppressing them is scientifically dishonest, so we must tell them, but telling @@ -1986,256 +2210,298 @@ interactions: a sure way of making oneself unpopular in many circles, and, as such, it is an act that, in general, is not without personal risks. Vide Galileo Galilei\u2026.)", "venue": "SIGP", "year": 1982, "referenceCount": 0, "citationCount": 87, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/947923.947924", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1982-05-01", "journal": {"volume": "17", "pages": "13-15", "name": "ACM SIGPLAN Notices"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "b69bec83d16c1baf71d535c8fe7431ed772f6339", "externalIds": {"MAG": "952303715", - "DOI": "10.1007/978-1-4612-5695-3_12", "CorpusId": 153224685}, "url": "https://www.semanticscholar.org/paper/b69bec83d16c1baf71d535c8fe7431ed772f6339", + "DOI": "10.1007/978-1-4612-5695-3_12", "CorpusId": 153224685}, "corpusId": + 153224685, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b69bec83d16c1baf71d535c8fe7431ed772f6339", "title": "On the Role of Scientific Thought", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 483, "influentialCitationCount": - 17, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + 17, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History"], + "s2FieldsOfStudy": [{"category": "History", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "60-66", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "ba2b3117ecd31679e3b2a86fae71f8d6e12449bd", "externalIds": {"MAG": "134093879", "DOI": "10.1007/978-1-4612-5695-3_9", - "CorpusId": 160485247}, "url": "https://www.semanticscholar.org/paper/ba2b3117ecd31679e3b2a86fae71f8d6e12449bd", + "CorpusId": 160485247}, "corpusId": 160485247, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ba2b3117ecd31679e3b2a86fae71f8d6e12449bd", "title": "Speech at the Occasion of an Anniversary", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "bbb28d6548a6252636a298faebe487954c308e4e", "externalIds": {"MAG": "325827090", - "DOI": "10.1007/978-1-4612-5695-3_64", "CorpusId": 117954190}, "url": "https://www.semanticscholar.org/paper/bbb28d6548a6252636a298faebe487954c308e4e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History"], + "s2FieldsOfStudy": [{"category": "History", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "bbb28d6548a6252636a298faebe487954c308e4e", "externalIds": {"MAG": + "325827090", "DOI": "10.1007/978-1-4612-5695-3_64", "CorpusId": 117954190}, + "corpusId": 117954190, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bbb28d6548a6252636a298faebe487954c308e4e", "title": "On Weak and Strong Termination", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "355-357", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "bd3fb849d81e5f6c5ffa2ba7b40017ccdf2c87e2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "355-357", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "bd3fb849d81e5f6c5ffa2ba7b40017ccdf2c87e2", "externalIds": {"MAG": "2170599498", "DOI": "10.1007/978-1-4612-5695-3_2", - "CorpusId": 62069594}, "url": "https://www.semanticscholar.org/paper/bd3fb849d81e5f6c5ffa2ba7b40017ccdf2c87e2", + "CorpusId": 62069594}, "corpusId": 62069594, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bd3fb849d81e5f6c5ffa2ba7b40017ccdf2c87e2", "title": "Parallelism in Multi-Record Transactions", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "15-21", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": - "C. S. Scholten"}]}, {"paperId": "bec9f897d701a8326ccdfc97064f4ce2c07a732f", - "externalIds": {"MAG": "2075646121", "DBLP": "journals/scp/Dijkstra82", "DOI": - "10.1016/0167-6423(82)90016-8", "CorpusId": 21278129}, "url": "https://www.semanticscholar.org/paper/bec9f897d701a8326ccdfc97064f4ce2c07a732f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "15-21", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": + "bec9f897d701a8326ccdfc97064f4ce2c07a732f", "externalIds": {"MAG": "2075646121", + "DBLP": "journals/scp/Dijkstra82", "DOI": "10.1016/0167-6423(82)90016-8", + "CorpusId": 21278129}, "corpusId": 21278129, "publicationVenue": {"id": "08d68650-8568-4b4f-8c14-1b61ccf55b17", + "name": "Science of Computer Programming", "type": "journal", "alternate_names": + ["Sci Comput Program"], "issn": "0167-6423", "url": "https://www.journals.elsevier.com/science-of-computer-programming", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/01676423"]}, + "url": "https://www.semanticscholar.org/paper/bec9f897d701a8326ccdfc97064f4ce2c07a732f", "title": "Smoothsort, an Alternative for Sorting In Situ", "abstract": null, "venue": "Science of Computer Programming", "year": 1982, "referenceCount": 5, "citationCount": 55, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1982-05-01", "journal": {"volume": "1", "pages": "223-233", "name": "Sci. - Comput. Program."}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "bee563943ba31c076a42d8d928bc32bdb89b06cb", "externalIds": {"MAG": - "188140827", "DOI": "10.1007/978-1-4612-5695-3_5", "CorpusId": 117965523}, - "url": "https://www.semanticscholar.org/paper/bee563943ba31c076a42d8d928bc32bdb89b06cb", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1982-05-01", "journal": {"volume": "1", "pages": "223-233", + "name": "Sci. Comput. Program."}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "bee563943ba31c076a42d8d928bc32bdb89b06cb", + "externalIds": {"MAG": "188140827", "DOI": "10.1007/978-1-4612-5695-3_5", + "CorpusId": 117965523}, "corpusId": 117965523, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bee563943ba31c076a42d8d928bc32bdb89b06cb", "title": "The Solution to a Cyclic Relaxation Problem", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 18, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "34-35", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "c0a71908902f4a2a9f5841b466fbd40cc6ea5e3f", - "externalIds": {"MAG": "308327990", "DOI": "10.1007/978-1-4612-5695-3_42", - "CorpusId": 118348984}, "url": "https://www.semanticscholar.org/paper/c0a71908902f4a2a9f5841b466fbd40cc6ea5e3f", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "34-35", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "c0a71908902f4a2a9f5841b466fbd40cc6ea5e3f", "externalIds": {"MAG": + "308327990", "DOI": "10.1007/978-1-4612-5695-3_42", "CorpusId": 118348984}, + "corpusId": 118348984, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c0a71908902f4a2a9f5841b466fbd40cc6ea5e3f", "title": "A Proof of a Theorem Communicated to Us by S. Ghosh", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, - {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": "c693b6494c4d9d62acf6262bf745293cab00c9e6", - "externalIds": {"MAG": "110110259", "CorpusId": 53885431}, "url": "https://www.semanticscholar.org/paper/c693b6494c4d9d62acf6262bf745293cab00c9e6", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": + "C. S. Scholten"}]}, {"paperId": "c693b6494c4d9d62acf6262bf745293cab00c9e6", + "externalIds": {"MAG": "110110259", "CorpusId": 53885431}, "corpusId": 53885431, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c693b6494c4d9d62acf6262bf745293cab00c9e6", "title": "Mathematical induction and computing science", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "30", "pages": "117-123", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "c8ca4af542de66c3cabaeee62b47dbedce4551a2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "30", + "pages": "117-123", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "c8ca4af542de66c3cabaeee62b47dbedce4551a2", "externalIds": {"MAG": "297378017", "DOI": "10.1007/978-1-4612-5695-3_60", - "CorpusId": 117918482}, "url": "https://www.semanticscholar.org/paper/c8ca4af542de66c3cabaeee62b47dbedce4551a2", + "CorpusId": 117918482}, "corpusId": 117918482, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c8ca4af542de66c3cabaeee62b47dbedce4551a2", "title": "A Class of Simple Communication Patterns", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 15, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "334-337", "name": ""}, "authors": [{"authorId": "2755537", "name": - "C. S. Scholten"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "ce1e60a32925cc49e3c489bb32c462c6ee417292", "externalIds": {"MAG": "179854718", - "DOI": "10.1007/978-1-4612-5695-3_15", "CorpusId": 59871234}, "url": "https://www.semanticscholar.org/paper/ce1e60a32925cc49e3c489bb32c462c6ee417292", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "pages": "334-337", "name": + ""}, "authors": [{"authorId": "2755537", "name": "C. S. Scholten"}, {"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "ce1e60a32925cc49e3c489bb32c462c6ee417292", + "externalIds": {"MAG": "179854718", "DOI": "10.1007/978-1-4612-5695-3_15", + "CorpusId": 59871234}, "corpusId": 59871234, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ce1e60a32925cc49e3c489bb32c462c6ee417292", "title": "Monotonic Replacement Algorithms and Their Implementation", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "84-88", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "d6be94086bfa632b57dc2c286f1fee76d1018756", "externalIds": {"MAG": - "132490389", "DOI": "10.1007/978-1-4612-5695-3_40", "CorpusId": 151237405}, - "url": "https://www.semanticscholar.org/paper/d6be94086bfa632b57dc2c286f1fee76d1018756", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "84-88", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "d6be94086bfa632b57dc2c286f1fee76d1018756", + "externalIds": {"MAG": "132490389", "DOI": "10.1007/978-1-4612-5695-3_40", + "CorpusId": 151237405}, "corpusId": 151237405, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d6be94086bfa632b57dc2c286f1fee76d1018756", "title": "Trip Report E. W. Dijkstra, ECI-Conference 9\u201312 August 1976, Amsterdam", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "d7ae55e2a8023fba6809a9f3dcd9dd1d48a4795f", - "externalIds": {"MAG": "938588913", "DOI": "10.1007/978-1-4612-5695-3_31", - "CorpusId": 117554992}, "url": "https://www.semanticscholar.org/paper/d7ae55e2a8023fba6809a9f3dcd9dd1d48a4795f", + "openAccessPdf": null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": + [{"category": "Political Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "d7ae55e2a8023fba6809a9f3dcd9dd1d48a4795f", "externalIds": {"MAG": + "938588913", "DOI": "10.1007/978-1-4612-5695-3_31", "CorpusId": 117554992}, + "corpusId": 117554992, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d7ae55e2a8023fba6809a9f3dcd9dd1d48a4795f", "title": "A Collection of Beautiful Proofs", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "174-183", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "d7b25f6cc47e3f5f9af4a8b55fb51058f4bec8c8", - "externalIds": {"MAG": "82606404", "DOI": "10.1007/978-1-4612-5695-3_1", "CorpusId": - 59835027}, "url": "https://www.semanticscholar.org/paper/d7b25f6cc47e3f5f9af4a8b55fb51058f4bec8c8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "174-183", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "d7b25f6cc47e3f5f9af4a8b55fb51058f4bec8c8", "externalIds": {"MAG": + "82606404", "DOI": "10.1007/978-1-4612-5695-3_1", "CorpusId": 59835027}, "corpusId": + 59835027, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d7b25f6cc47e3f5f9af4a8b55fb51058f4bec8c8", "title": "Stepwise Program Construction", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "1-14", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "e2be5e220b85b3c99d5478df35fd8414ba7ad4cb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "1-14", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "e2be5e220b85b3c99d5478df35fd8414ba7ad4cb", "externalIds": {"MAG": "2185774617", "DOI": "10.1007/978-1-4612-5695-3_3", - "CorpusId": 124585460}, "url": "https://www.semanticscholar.org/paper/e2be5e220b85b3c99d5478df35fd8414ba7ad4cb", + "CorpusId": 124585460}, "corpusId": 124585460, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e2be5e220b85b3c99d5478df35fd8414ba7ad4cb", "title": "Finding the Maximum Strong Components in a Directed Graph", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 22, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "22-30", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "e39157ba0efc854513f6cbaddfadcc23c7304a01", "externalIds": {"MAG": - "80376730", "DOI": "10.1007/978-1-4612-5695-3_10", "CorpusId": 159102219}, - "url": "https://www.semanticscholar.org/paper/e39157ba0efc854513f6cbaddfadcc23c7304a01", + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "22-30", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "e39157ba0efc854513f6cbaddfadcc23c7304a01", + "externalIds": {"MAG": "80376730", "DOI": "10.1007/978-1-4612-5695-3_10", + "CorpusId": 159102219}, "corpusId": 159102219, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e39157ba0efc854513f6cbaddfadcc23c7304a01", "title": "Inside \u201cMathematics Inc.\u201d", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "54-55", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "e62c4342ee0ea1df1345300e5cee91d72a9d1f94", - "externalIds": {"DBLP": "journals/ipl/DijkstraG82", "MAG": "2055182225", "DOI": - "10.1016/0020-0190(82)90045-X", "CorpusId": 23862768}, "url": "https://www.semanticscholar.org/paper/e62c4342ee0ea1df1345300e5cee91d72a9d1f94", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "54-55", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "e62c4342ee0ea1df1345300e5cee91d72a9d1f94", "externalIds": {"DBLP": + "journals/ipl/DijkstraG82", "MAG": "2055182225", "DOI": "10.1016/0020-0190(82)90045-X", + "CorpusId": 23862768}, "corpusId": 23862768, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e62c4342ee0ea1df1345300e5cee91d72a9d1f94", "title": "An Introduction to Three Algorithms for Sorting in Situ", "abstract": null, "venue": "Inf. Process. Lett.", "year": 1982, "referenceCount": 4, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1982-10-11", "journal": - {"volume": "15", "pages": "129-134", "name": "Inf. Process. Lett."}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "1685361", "name": - "A. V. Gasteren"}]}, {"paperId": "e75017dd35600867075d60a571ec1ff5f0b9aa8e", + 13, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1982-10-11", "journal": {"volume": "15", "pages": "129-134", "name": "Inf. + Process. Lett."}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, + {"authorId": "1685361", "name": "A. V. Gasteren"}]}, {"paperId": "e75017dd35600867075d60a571ec1ff5f0b9aa8e", "externalIds": {"MAG": "324657677", "DOI": "10.1007/978-1-4612-5695-3_59", - "CorpusId": 174068282}, "url": "https://www.semanticscholar.org/paper/e75017dd35600867075d60a571ec1ff5f0b9aa8e", + "CorpusId": 174068282}, "corpusId": 174068282, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e75017dd35600867075d60a571ec1ff5f0b9aa8e", "title": "The Introduction of MAES", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "331-333", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f76076e661c83c427943495f8f42848729a90518", - "externalIds": {"MAG": "292062550", "DOI": "10.1007/978-1-4612-5695-3_57", - "CorpusId": 141828887}, "url": "https://www.semanticscholar.org/paper/f76076e661c83c427943495f8f42848729a90518", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "331-333", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "f76076e661c83c427943495f8f42848729a90518", "externalIds": {"MAG": + "292062550", "DOI": "10.1007/978-1-4612-5695-3_57", "CorpusId": 141828887}, + "corpusId": 141828887, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f76076e661c83c427943495f8f42848729a90518", "title": "Why Naive Program Transformation Systems Are Unlikely to Work", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "324-328", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "fd32e14c5cb5012800dfa1dccfd5f3200a7e3cc7", "externalIds": {"MAG": - "320364218", "DOI": "10.1007/978-1-4612-5695-3_44", "CorpusId": 191876913}, - "url": "https://www.semanticscholar.org/paper/fd32e14c5cb5012800dfa1dccfd5f3200a7e3cc7", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "324-328", "name": ""}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "fd32e14c5cb5012800dfa1dccfd5f3200a7e3cc7", + "externalIds": {"MAG": "320364218", "DOI": "10.1007/978-1-4612-5695-3_44", + "CorpusId": 191876913}, "corpusId": 191876913, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fd32e14c5cb5012800dfa1dccfd5f3200a7e3cc7", "title": "Trip Report E. W. Dijkstra, Tokyo, 28 Sept-3 Oct. 1976", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], - "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "245-250", "name": ""}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "ff498047943f57350c672526ff5b36ab4e29504b", - "externalIds": {"MAG": "57380894", "DOI": "10.1007/978-1-4612-5695-3_21", - "CorpusId": 126718227}, "url": "https://www.semanticscholar.org/paper/ff498047943f57350c672526ff5b36ab4e29504b", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "245-250", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "ff498047943f57350c672526ff5b36ab4e29504b", "externalIds": {"MAG": + "57380894", "DOI": "10.1007/978-1-4612-5695-3_21", "CorpusId": 126718227}, + "corpusId": 126718227, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ff498047943f57350c672526ff5b36ab4e29504b", "title": "Trip Report E. W. Dijkstra 16th April/ 7th May, 1975, U.S.A. and Canada", "abstract": null, "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "e17289cfd56dcc1b1872a159fc86c9ae8801b3d1", - "externalIds": {"DBLP": "journals/sigsoft/Dijkstra81", "MAG": "2044589931", - "DOI": "10.1145/1005920.1005922", "CorpusId": 22313145}, "url": "https://www.semanticscholar.org/paper/e17289cfd56dcc1b1872a159fc86c9ae8801b3d1", + "openAccessPdf": null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": + [{"category": "Geography", "source": "external"}, {"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "e17289cfd56dcc1b1872a159fc86c9ae8801b3d1", "externalIds": {"DBLP": "journals/sigsoft/Dijkstra81", + "MAG": "2044589931", "DOI": "10.1145/1005920.1005922", "CorpusId": 22313145}, + "corpusId": 22313145, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e17289cfd56dcc1b1872a159fc86c9ae8801b3d1", "title": "American programming''s plight", "abstract": null, "venue": "SOEN", "year": 1981, "referenceCount": 0, "citationCount": 8, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"volume": "6", "pages": - "5", "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "ea28de5a8e3e7a6f83b016f0780fff039da09ec3", - "externalIds": {"DBLP": "journals/scp/Dijkstra81", "MAG": "2022961237", "DOI": - "10.1016/0167-6423(81)90003-4", "CorpusId": 6291184, "PubMed": "20317920"}, - "url": "https://www.semanticscholar.org/paper/ea28de5a8e3e7a6f83b016f0780fff039da09ec3", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, + "journal": {"volume": "6", "pages": "5", "name": "ACM SIGSOFT Softw. Eng. + Notes"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "ea28de5a8e3e7a6f83b016f0780fff039da09ec3", "externalIds": {"DBLP": "journals/scp/Dijkstra81", + "MAG": "2022961237", "DOI": "10.1016/0167-6423(81)90003-4", "CorpusId": 6291184, + "PubMed": "20317920"}, "corpusId": 6291184, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ea28de5a8e3e7a6f83b016f0780fff039da09ec3", "title": "A Word of Welcome", "abstract": null, "venue": "Sci. Comput. Program.", "year": 1981, "referenceCount": 2, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Materials Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1981-10-01", "journal": {"volume": "23 2", "pages": "\n 135-6\n ", - "name": "Canadian Medical Association journal"}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "0e6156f0e32cf97340c9fd959c1e8fdb20a9394b", - "externalIds": {"DBLP": "journals/ipl/DijkstraS80", "MAG": "2013173096", "DOI": - "10.1016/0020-0190(80)90021-6", "CorpusId": 37565935}, "url": "https://www.semanticscholar.org/paper/0e6156f0e32cf97340c9fd959c1e8fdb20a9394b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1981-10-01", "journal": {"volume": "23 2", + "pages": "\n 135-6\n ", "name": "Canadian Medical Association + journal"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "0e6156f0e32cf97340c9fd959c1e8fdb20a9394b", "externalIds": {"DBLP": "journals/ipl/DijkstraS80", + "MAG": "2013173096", "DOI": "10.1016/0020-0190(80)90021-6", "CorpusId": 37565935}, + "corpusId": 37565935, "publicationVenue": {"id": "44ecc2bb-f8fd-4c6d-bd54-30ca098be91d", + "name": "Information Processing Letters", "type": "journal", "alternate_names": + ["Inf Process Lett"], "issn": "0020-0190", "url": "http://www.elsevier.com/locate/ipl", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505612/description#description", + "http://www.sciencedirect.com/science/journal/00200190"]}, "url": "https://www.semanticscholar.org/paper/0e6156f0e32cf97340c9fd959c1e8fdb20a9394b", "title": "Termination Detection for Diffusing Computations", "abstract": null, "venue": "Information Processing Letters", "year": 1980, "referenceCount": 0, "citationCount": 765, "influentialCitationCount": 48, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1980-08-29", "journal": {"volume": "11", "pages": "1-4", - "name": "Inf. Process. Lett."}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. Scholten"}]}, {"paperId": - "3104e5b051868eae4985a15308a17bd8c58c29aa", "externalIds": {"MAG": "95362714", - "DOI": "10.1016/B978-0-12-491650-0.50041-1", "CorpusId": 59732950}, "url": - "https://www.semanticscholar.org/paper/3104e5b051868eae4985a15308a17bd8c58c29aa", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1980-08-29", "journal": {"volume": + "11", "pages": "1-4", "name": "Inf. Process. Lett."}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}, {"authorId": "2755537", "name": "C. S. + Scholten"}]}, {"paperId": "3104e5b051868eae4985a15308a17bd8c58c29aa", "externalIds": + {"MAG": "95362714", "DOI": "10.1016/B978-0-12-491650-0.50041-1", "CorpusId": + 59732950}, "corpusId": 59732950, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3104e5b051868eae4985a15308a17bd8c58c29aa", "title": "A Programmer''s Early Memories", "abstract": null, "venue": "", "year": 1980, "referenceCount": 0, "citationCount": 9, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "563-573", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "2b2d08a6d73b72e19e7f1b8eabdc36885c3c8694", - "externalIds": {"DBLP": "conf/icse/Dijkstra79", "MAG": "47273331", "CorpusId": - 46522354}, "url": "https://www.semanticscholar.org/paper/2b2d08a6d73b72e19e7f1b8eabdc36885c3c8694", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "563-573", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "2b2d08a6d73b72e19e7f1b8eabdc36885c3c8694", "externalIds": {"DBLP": + "conf/icse/Dijkstra79", "MAG": "47273331", "CorpusId": 46522354}, "corpusId": + 46522354, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2b2d08a6d73b72e19e7f1b8eabdc36885c3c8694", "title": "Software Engineering : As It Should Be", "abstract": null, "venue": "ICSE", "year": 1979, "referenceCount": 0, "citationCount": 18, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": null, "journal": {"pages": "442-448"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "4de975001b50371dfef5cc9a82ff3b22c15fb5cc", - "externalIds": {"MAG": "1785146305", "CorpusId": 61091340}, "url": "https://www.semanticscholar.org/paper/4de975001b50371dfef5cc9a82ff3b22c15fb5cc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": null, + "journal": {"pages": "442-448"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "4de975001b50371dfef5cc9a82ff3b22c15fb5cc", + "externalIds": {"MAG": "1785146305", "CorpusId": 61091340}, "corpusId": 61091340, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4de975001b50371dfef5cc9a82ff3b22c15fb5cc", "title": "My hopes of computing science (EWD709)", "abstract": null, "venue": "ICSE 1979", "year": 1979, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1979-09-17", - "journal": {"volume": "", "pages": "442-448", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "52d512a1b15cf030364abf2817ec2c890cdf1b59", - "externalIds": {"MAG": "1594571423", "CorpusId": 60786836}, "url": "https://www.semanticscholar.org/paper/52d512a1b15cf030364abf2817ec2c890cdf1b59", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1979-09-17", "journal": {"volume": "", "pages": + "442-448", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "52d512a1b15cf030364abf2817ec2c890cdf1b59", "externalIds": {"MAG": + "1594571423", "CorpusId": 60786836}, "corpusId": 60786836, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/52d512a1b15cf030364abf2817ec2c890cdf1b59", "title": "Programming considered as a human activity", "abstract": "When looking back on any kind of movement or revolution, one always likes to point to a beginning: \"It began right there --- it all started with so-and-so''s famous @@ -2293,14 +2559,15 @@ interactions: Dijkstra, someone said, has been compared to eating marzipan --- it''s best to take very small bites, chew slowly, and digest the mouthful before moving on to the next bite.", "venue": "", "year": 1979, "referenceCount": 0, "citationCount": - 97, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "1-9", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. - Dijkstra"}]}, {"paperId": "114108b350866595cebc14a96a8cb6f7aede7c93", "externalIds": - {"DBLP": "conf/ac/DijkstraLMSS75", "MAG": "2104055277", "DOI": "10.1145/359642.359655", - "CorpusId": 8017272}, "url": "https://www.semanticscholar.org/paper/114108b350866595cebc14a96a8cb6f7aede7c93", + 97, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "1-9", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "114108b350866595cebc14a96a8cb6f7aede7c93", + "externalIds": {"DBLP": "conf/ac/DijkstraLMSS75", "MAG": "2104055277", "DOI": + "10.1145/359642.359655", "CorpusId": 8017272}, "corpusId": 8017272, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/114108b350866595cebc14a96a8cb6f7aede7c93", "title": "On-the-fly garbage collection: an exercise in cooperation", "abstract": "As an example of cooperation between sequential processes with very little mutual interference despite frequent manipulations of a large shared data @@ -2310,46 +2577,53 @@ interactions: Exclusion and synchronization constraints have been kept as weak as could be achieved; the severe complexities engendered by doing so are illustrated.", "venue": "CACM", "year": 1975, "referenceCount": 20, "citationCount": 676, - "influentialCitationCount": 31, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1975-07-23", "journal": - {"pages": "43-56"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, - {"authorId": "1679622", "name": "L. Lamport"}, {"authorId": "79041834", "name": - "Alain J. Martin"}, {"authorId": "2755537", "name": "C. S. Scholten"}, {"authorId": - "7711291", "name": "Elisabeth F. M. Steffens"}]}, {"paperId": "1da09f4ed6a83640d21401d24e9c58bef0c90b16", - "externalIds": {"DBLP": "conf/pc/Dijkstra78g", "MAG": "2342190290", "DOI": - "10.1007/BFb0014657", "CorpusId": 206840681}, "url": "https://www.semanticscholar.org/paper/1da09f4ed6a83640d21401d24e9c58bef0c90b16", + "influentialCitationCount": 31, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1975-07-23", "journal": {"pages": "43-56"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}, {"authorId": "1679622", "name": "L. Lamport"}, {"authorId": + "79041834", "name": "Alain J. Martin"}, {"authorId": "2755537", "name": "C. + S. Scholten"}, {"authorId": "7711291", "name": "Elisabeth F. M. Steffens"}]}, + {"paperId": "1da09f4ed6a83640d21401d24e9c58bef0c90b16", "externalIds": {"DBLP": + "conf/pc/Dijkstra78g", "MAG": "2342190290", "DOI": "10.1007/BFb0014657", "CorpusId": + 206840681}, "corpusId": 206840681, "publicationVenue": {"id": "e5ab806e-2644-4d26-a88e-35a3ece4d6ec", + "name": "Program Construction", "type": "conference", "alternate_names": ["Program + Constr"]}, "url": "https://www.semanticscholar.org/paper/1da09f4ed6a83640d21401d24e9c58bef0c90b16", "title": "Program Inversion", "abstract": null, "venue": "Program Construction", "year": 1978, "referenceCount": 14, "citationCount": 71, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Geology", - "source": "s2-fos-model"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1978-07-26", "journal": - {"pages": "54-57"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "43d41987b5d04ba19282cfad5cf7a1e454dc1b92", "externalIds": {"MAG": - "1511589634", "DBLP": "conf/pc/Dijkstra78c", "DOI": "10.1007/BFb0014653", - "CorpusId": 12906827}, "url": "https://www.semanticscholar.org/paper/43d41987b5d04ba19282cfad5cf7a1e454dc1b92", + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Geology", "source": "s2-fos-model"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1978-07-26", "journal": {"pages": "54-57"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "43d41987b5d04ba19282cfad5cf7a1e454dc1b92", + "externalIds": {"MAG": "1511589634", "DBLP": "conf/pc/Dijkstra78c", "DOI": + "10.1007/BFb0014653", "CorpusId": 12906827}, "corpusId": 12906827, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/43d41987b5d04ba19282cfad5cf7a1e454dc1b92", "title": "On the Interplay between Mathematics and Programming", "abstract": null, "venue": "Program Construction", "year": 1978, "referenceCount": 0, "citationCount": 10, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1978-07-26", "journal": {"pages": - "35-46"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "53e3a2da623d03b1a8a8c04bdf0f2ab0ca92c10f", "externalIds": {"DBLP": "conf/pc/Dijkstra78e", - "MAG": "1551612626", "DOI": "10.1007/BFb0014655", "CorpusId": 33404706}, "url": - "https://www.semanticscholar.org/paper/53e3a2da623d03b1a8a8c04bdf0f2ab0ca92c10f", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1978-07-26", "journal": {"pages": "35-46"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "53e3a2da623d03b1a8a8c04bdf0f2ab0ca92c10f", + "externalIds": {"DBLP": "conf/pc/Dijkstra78e", "MAG": "1551612626", "DOI": + "10.1007/BFb0014655", "CorpusId": 33404706}, "corpusId": 33404706, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/53e3a2da623d03b1a8a8c04bdf0f2ab0ca92c10f", "title": "In Honour of Fibonacci", "abstract": null, "venue": "Program Construction", "year": 1978, "referenceCount": 0, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1978-07-26", "journal": {"pages": "49-50"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "65605f5d2392c683ff7fd9e0596d80c4a9adf36e", - "externalIds": {"MAG": "1967022618", "DBLP": "journals/sigsoft/DijkstraDLP78", - "DOI": "10.1145/1005888.1005890", "CorpusId": 30331494}, "url": "https://www.semanticscholar.org/paper/65605f5d2392c683ff7fd9e0596d80c4a9adf36e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1978-07-26", "journal": {"pages": + "49-50"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "65605f5d2392c683ff7fd9e0596d80c4a9adf36e", "externalIds": {"MAG": "1967022618", + "DBLP": "journals/sigsoft/DijkstraDLP78", "DOI": "10.1145/1005888.1005890", + "CorpusId": 30331494}, "corpusId": 30331494, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/65605f5d2392c683ff7fd9e0596d80c4a9adf36e", "title": "On a political pamphlet from the middle ages", "abstract": "(The following commentary is reprinted from a personal memorandum of its author, with his acquiescence. PGN) This note concerns a very ugly paper [i]. Its @@ -2385,69 +2659,80 @@ interactions: impossibly long.\" As if that matters! In most mathematical theories there are even simple statements that cannot be proved at all, \u2026", "venue": "SOEN", "year": 1978, "referenceCount": 0, "citationCount": 33, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "History"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "History", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1978-04-01", "journal": {"volume": "3", "pages": "14-16", "name": "ACM SIGSOFT - Softw. Eng. Notes"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}, - {"authorId": "144078403", "name": "R. DeMillo"}, {"authorId": "1728571", "name": - "R. Lipton"}, {"authorId": "1790022", "name": "A. Perlis"}]}, {"paperId": - "94faa6fe6eb4e10da16de8e8a4e3172e184b8885", "externalIds": {"MAG": "2176693081", - "DBLP": "conf/mfcs/Dijkstra78", "DOI": "10.1007/3-540-08921-7_54", "CorpusId": - 41279203}, "url": "https://www.semanticscholar.org/paper/94faa6fe6eb4e10da16de8e8a4e3172e184b8885", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "History"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "History", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1978-04-01", "journal": {"volume": "3", "pages": "14-16", + "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}, {"authorId": "144078403", "name": "R. DeMillo"}, {"authorId": + "1728571", "name": "R. Lipton"}, {"authorId": "1790022", "name": "A. Perlis"}]}, + {"paperId": "94faa6fe6eb4e10da16de8e8a4e3172e184b8885", "externalIds": {"MAG": + "2176693081", "DBLP": "conf/mfcs/Dijkstra78", "DOI": "10.1007/3-540-08921-7_54", + "CorpusId": 41279203}, "corpusId": 41279203, "publicationVenue": {"id": "8341fde2-3e67-4fde-bb5c-6f0320d7f114", + "name": "International Symposium on Mathematical Foundations of Computer Science", + "type": "conference", "alternate_names": ["Int Symp Math Found Comput Sci", + "MFCS", "Math Found Comput Sci", "Mathematical Foundations of Computer Science"], + "url": "https://en.wikipedia.org/wiki/International_Symposium_on_Mathematical_Foundations_of_Computer_Science"}, + "url": "https://www.semanticscholar.org/paper/94faa6fe6eb4e10da16de8e8a4e3172e184b8885", "title": "Finding the Correctness Proof of a Concurrent Program", "abstract": null, "venue": "International Symposium on Mathematical Foundations of Computer Science", "year": 1978, "referenceCount": 1, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1978-07-26", "journal": {"pages": "24-34"}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "a1b1f1377306527a7da620946127b594ffe7cd4f", "externalIds": {"DBLP": "conf/pc/Dijkstra78a", - "MAG": "1523068592", "DOI": "10.1007/BFb0014651", "CorpusId": 1305908}, "url": - "https://www.semanticscholar.org/paper/a1b1f1377306527a7da620946127b594ffe7cd4f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1978-07-26", + "journal": {"pages": "24-34"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "a1b1f1377306527a7da620946127b594ffe7cd4f", + "externalIds": {"DBLP": "conf/pc/Dijkstra78a", "MAG": "1523068592", "DOI": + "10.1007/BFb0014651", "CorpusId": 1305908}, "corpusId": 1305908, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a1b1f1377306527a7da620946127b594ffe7cd4f", "title": "Stationary Behaviour of Some Ternary Networks", "abstract": null, "venue": "Program Construction", "year": 1978, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "external"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1978-07-26", "journal": - {"pages": "21-23"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "b012a7d3c705bd9bcf9747a3b48da6479cbfd9e5", "externalIds": {"DBLP": - "conf/pc/Dijkstra78f", "MAG": "1481305879", "DOI": "10.1007/BFb0014656", "CorpusId": - 11021057}, "url": "https://www.semanticscholar.org/paper/b012a7d3c705bd9bcf9747a3b48da6479cbfd9e5", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1978-07-26", "journal": {"pages": "21-23"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "b012a7d3c705bd9bcf9747a3b48da6479cbfd9e5", + "externalIds": {"DBLP": "conf/pc/Dijkstra78f", "MAG": "1481305879", "DOI": + "10.1007/BFb0014656", "CorpusId": 11021057}, "corpusId": 11021057, "publicationVenue": + {"id": "e5ab806e-2644-4d26-a88e-35a3ece4d6ec", "name": "Program Construction", + "type": "conference", "alternate_names": ["Program Constr"]}, "url": "https://www.semanticscholar.org/paper/b012a7d3c705bd9bcf9747a3b48da6479cbfd9e5", "title": "On the Foolishness of \"Natural Language Programming\"", "abstract": null, "venue": "Program Construction", "year": 1978, "referenceCount": 0, "citationCount": 42, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1978-07-26", "journal": - {"pages": "51-53"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "c1e24309a6448806a41124d5366fe62dfad5afa3", "externalIds": {"MAG": - "1755138775", "DBLP": "conf/pc/Dijkstra78d", "DOI": "10.1007/BFb0014654", - "CorpusId": 45173017}, "url": "https://www.semanticscholar.org/paper/c1e24309a6448806a41124d5366fe62dfad5afa3", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1978-07-26", "journal": {"pages": "51-53"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "c1e24309a6448806a41124d5366fe62dfad5afa3", + "externalIds": {"MAG": "1755138775", "DBLP": "conf/pc/Dijkstra78d", "DOI": + "10.1007/BFb0014654", "CorpusId": 45173017}, "corpusId": 45173017, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c1e24309a6448806a41124d5366fe62dfad5afa3", "title": "A Theorem about Odd Powers of Odd Integers", "abstract": null, "venue": "Program Construction", "year": 1978, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1978-07-26", "journal": {"pages": - "47-48"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "c9069daccdfbe2e600418e18098f439ed3209471", "externalIds": {"MAG": "1528179520", - "DBLP": "conf/pc/Dijkstra78", "DOI": "10.1007/BFb0014650", "CorpusId": 20709153}, - "url": "https://www.semanticscholar.org/paper/c9069daccdfbe2e600418e18098f439ed3209471", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1978-07-26", "journal": + {"pages": "47-48"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "c9069daccdfbe2e600418e18098f439ed3209471", "externalIds": {"MAG": + "1528179520", "DBLP": "conf/pc/Dijkstra78", "DOI": "10.1007/BFb0014650", "CorpusId": + 20709153}, "corpusId": 20709153, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c9069daccdfbe2e600418e18098f439ed3209471", "title": "A More Formal Treatment of a Less Simple Example", "abstract": null, "venue": "Program Construction", "year": 1978, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1978-07-26", "journal": {"pages": "2-20"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "dfc9395068204819c797158812a997d6aa568445", - "externalIds": {"DBLP": "journals/sigplan/Dijkstra78", "MAG": "1968202858", - "DOI": "10.1145/953863.953866", "CorpusId": 43210968}, "url": "https://www.semanticscholar.org/paper/dfc9395068204819c797158812a997d6aa568445", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1978-07-26", "journal": + {"pages": "2-20"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "dfc9395068204819c797158812a997d6aa568445", "externalIds": {"DBLP": + "journals/sigplan/Dijkstra78", "MAG": "1968202858", "DOI": "10.1145/953863.953866", + "CorpusId": 43210968}, "corpusId": 43210968, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/dfc9395068204819c797158812a997d6aa568445", "title": "DoD-I: the summing up", "abstract": "After having worked a full month on EWD659 through EWD662-de.aling in turn with the four language proposals submitted to the DoD-I feel an urge to collect ~r,d order my impressions of @@ -2476,85 +2761,104 @@ interactions: that teams may.choose between the qualifications incompetent and dishonest; I blame the competitive situation for having placed them in that uncomfortable position.", "venue": "SIGP", "year": 1978, "referenceCount": 0, "citationCount": - 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1978-07-01", "journal": {"volume": - "13", "pages": "21-26", "name": "ACM SIGPLAN Notices"}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "407b4756167eb0543a0643d366589e29b4fe6f76", + 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/953863.953866", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1978-07-01", "journal": + {"volume": "13", "pages": "21-26", "name": "ACM SIGPLAN Notices"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "407b4756167eb0543a0643d366589e29b4fe6f76", "externalIds": {"DBLP": "journals/sigsoft/Dijkstra77", "MAG": "2014033820", - "DOI": "10.1145/1005882.1005883", "CorpusId": 44414193}, "url": "https://www.semanticscholar.org/paper/407b4756167eb0543a0643d366589e29b4fe6f76", + "DOI": "10.1145/1005882.1005883", "CorpusId": 44414193}, "corpusId": 44414193, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/407b4756167eb0543a0643d366589e29b4fe6f76", "title": "A position paper on software reliability", "abstract": null, "venue": "SOEN", "year": 1977, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1977-10-01", "journal": {"volume": "2", "pages": "3-5", - "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "b5eaa6294b50c8c8cd1f8108bf8ae3dd4ca0f78b", - "externalIds": {"DBLP": "conf/icsym/Dijkstra77", "MAG": "186754195", "CorpusId": - 32417655}, "url": "https://www.semanticscholar.org/paper/b5eaa6294b50c8c8cd1f8108bf8ae3dd4ca0f78b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1977-10-01", "journal": + {"volume": "2", "pages": "3-5", "name": "ACM SIGSOFT Softw. Eng. Notes"}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "b5eaa6294b50c8c8cd1f8108bf8ae3dd4ca0f78b", "externalIds": {"DBLP": "conf/icsym/Dijkstra77", + "MAG": "186754195", "CorpusId": 32417655}, "corpusId": 32417655, "publicationVenue": + {"id": "a6461f8d-8e44-424a-861b-e6926e349521", "name": "International Computing + Symposium", "type": "conference", "alternate_names": ["Int Comput Symp"]}, + "url": "https://www.semanticscholar.org/paper/b5eaa6294b50c8c8cd1f8108bf8ae3dd4ca0f78b", "title": "Programming: From Craft to Scientific Discipline", "abstract": null, "venue": "International Computing Symposium", "year": 1977, "referenceCount": 0, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, - "journal": {"pages": "23-30"}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "3ef7f430b2a2df62d3994ca6ef0a3b4b7d0facd1", - "externalIds": {"MAG": "2809544108", "CorpusId": 67417224}, "url": "https://www.semanticscholar.org/paper/3ef7f430b2a2df62d3994ca6ef0a3b4b7d0facd1", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "23-30"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3ef7f430b2a2df62d3994ca6ef0a3b4b7d0facd1", + "externalIds": {"MAG": "2809544108", "CorpusId": 67417224}, "corpusId": 67417224, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3ef7f430b2a2df62d3994ca6ef0a3b4b7d0facd1", "title": "Programming methodologies : their objectives and their nature", "abstract": null, "venue": "", "year": 1976, "referenceCount": 0, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "203-216", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "5ada347492332825d38c7f7cfcc760842476ee52", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "203-216", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "5ada347492332825d38c7f7cfcc760842476ee52", "externalIds": {"DBLP": "books/ph/Dijkstra76", "MAG": "2103953153", "CorpusId": - 43747914}, "url": "https://www.semanticscholar.org/paper/5ada347492332825d38c7f7cfcc760842476ee52", + 43747914}, "corpusId": 43747914, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5ada347492332825d38c7f7cfcc760842476ee52", "title": "A Discipline of Programming", "abstract": null, "venue": "", "year": 1976, "referenceCount": 0, "citationCount": 5120, "influentialCitationCount": - 342, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "I-XVII, 1-217"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "d49ad6d7ba0c49ee99a2d4f86f634186d840ac28", - "externalIds": {"DBLP": "conf/eci/Dijkstra76", "MAG": "1536891849", "DOI": - "10.1007/3-540-07804-5_31", "CorpusId": 43495761}, "url": "https://www.semanticscholar.org/paper/d49ad6d7ba0c49ee99a2d4f86f634186d840ac28", + 342, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "I-XVII, 1-217"}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "d49ad6d7ba0c49ee99a2d4f86f634186d840ac28", "externalIds": + {"DBLP": "conf/eci/Dijkstra76", "MAG": "1536891849", "DOI": "10.1007/3-540-07804-5_31", + "CorpusId": 43495761}, "corpusId": 43495761, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d49ad6d7ba0c49ee99a2d4f86f634186d840ac28", "title": "Formal Techniques and Sizeable Programs", "abstract": null, "venue": "ECI", "year": 1976, "referenceCount": 0, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/3-540-07804-5_31.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1976-08-09", "journal": {"pages": "225-235"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "e5c60b664cd85de197d653384927f19945ba1b82", "externalIds": {"DBLP": "conf/mfcs/Dijkstra76", "MAG": "1556210233", "DOI": - "10.1007/3-540-07854-1_160", "CorpusId": 30807344}, "url": "https://www.semanticscholar.org/paper/e5c60b664cd85de197d653384927f19945ba1b82", + "10.1007/3-540-07854-1_160", "CorpusId": 30807344}, "corpusId": 30807344, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e5c60b664cd85de197d653384927f19945ba1b82", "title": "The Effective Arrangement of Logical Systems", "abstract": null, "venue": "MFCS", "year": 1976, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1976-09-06", "journal": {"pages": "39-51"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "1154475ace26df384d5321f24631fa74d623dfba", - "externalIds": {"DBLP": "conf/ac/Dijkstra75", "MAG": "1601063440", "DOI": - "10.1007/3-540-07994-7_46", "CorpusId": 206611943}, "url": "https://www.semanticscholar.org/paper/1154475ace26df384d5321f24631fa74d623dfba", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "1976-09-06", "journal": + {"pages": "39-51"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "1154475ace26df384d5321f24631fa74d623dfba", "externalIds": {"DBLP": + "conf/ac/Dijkstra75", "MAG": "1601063440", "DOI": "10.1007/3-540-07994-7_46", + "CorpusId": 206611943}, "corpusId": 206611943, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1154475ace26df384d5321f24631fa74d623dfba", "title": "On the teaching of programming, i. e. on the teaching of thinking", "abstract": null, "venue": "Language Hierarchies and Interfaces", "year": 1975, "referenceCount": 0, "citationCount": 23, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1975-07-23", "journal": {"pages": "1-10"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "3b1ce6c8bdbc71cc2bb55e9bad0c0f621f23e948", - "externalIds": {"MAG": "2807752161", "CorpusId": 194850737}, "url": "https://www.semanticscholar.org/paper/3b1ce6c8bdbc71cc2bb55e9bad0c0f621f23e948", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1975-07-23", "journal": {"pages": + "1-10"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "3b1ce6c8bdbc71cc2bb55e9bad0c0f621f23e948", "externalIds": {"MAG": "2807752161", + "CorpusId": 194850737}, "corpusId": 194850737, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3b1ce6c8bdbc71cc2bb55e9bad0c0f621f23e948", "title": "Craftsman or scientist [Banquet Luncheon Lecture]", "abstract": null, "venue": "", "year": 1975, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], - "s2FieldsOfStudy": [{"category": "Art", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "6675c3ae66f2ed9519df5874c1cae21fb4b5aa09", - "externalIds": {"DBLP": "journals/cacm/Dijkstra75", "MAG": "2066210260", "DOI": - "10.1145/360933.360975", "CorpusId": 1679242}, "url": "https://www.semanticscholar.org/paper/6675c3ae66f2ed9519df5874c1cae21fb4b5aa09", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "6675c3ae66f2ed9519df5874c1cae21fb4b5aa09", "externalIds": {"DBLP": "journals/cacm/Dijkstra75", + "MAG": "2066210260", "DOI": "10.1145/360933.360975", "CorpusId": 1679242}, + "corpusId": 1679242, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/6675c3ae66f2ed9519df5874c1cae21fb4b5aa09", "title": "Guarded commands, nondeterminacy and formal derivation of programs", "abstract": "So-called \u201cguarded commands\u201d are introduced as a building block for alternative and repetitive constructs that allow nondeterministic @@ -2563,24 +2867,27 @@ interactions: For the formal derivation of programs expressed in terms of these constructs, a calculus will be be shown.", "venue": "Communications of the ACM", "year": 1975, "referenceCount": 3, "citationCount": 2059, "influentialCitationCount": - 90, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1975-08-01", "journal": {"volume": "18", "pages": "453 - - 457", "name": "Communications of the ACM"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "8b3b4fc0445e5e217203409b507c00cd44777989", - "externalIds": {"MAG": "1539372208", "DBLP": "conf/ac/Dijkstra75b", "DOI": - "10.1007/3-540-07994-7_59", "CorpusId": 32876041}, "url": "https://www.semanticscholar.org/paper/8b3b4fc0445e5e217203409b507c00cd44777989", + 90, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1975-08-01", "journal": + {"volume": "18", "pages": "453 - 457", "name": "Communications of the ACM"}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "8b3b4fc0445e5e217203409b507c00cd44777989", "externalIds": {"MAG": "1539372208", + "DBLP": "conf/ac/Dijkstra75b", "DOI": "10.1007/3-540-07994-7_59", "CorpusId": + 32876041}, "corpusId": 32876041, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8b3b4fc0445e5e217203409b507c00cd44777989", "title": "A time-wise hierarchy imposed upon the use of a two-level store", "abstract": null, "venue": "Language Hierarchies and Interfaces", "year": 1975, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1975-07-23", "journal": {"pages": "345-357"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "aec6600c6f05d2c883e1403a67ce32680b4a8dfb", - "externalIds": {"MAG": "2038460016", "DBLP": "conf/relsoft/Dijkstra75a", "DOI": - "10.1145/800027.808478", "CorpusId": 18942251}, "url": "https://www.semanticscholar.org/paper/aec6600c6f05d2c883e1403a67ce32680b4a8dfb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1975-07-23", "journal": {"pages": + "345-357"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "aec6600c6f05d2c883e1403a67ce32680b4a8dfb", "externalIds": {"MAG": + "2038460016", "DBLP": "conf/relsoft/Dijkstra75a", "DOI": "10.1145/800027.808478", + "CorpusId": 18942251}, "corpusId": 18942251, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/aec6600c6f05d2c883e1403a67ce32680b4a8dfb", "title": "Correctness concerns and, among other things, why they are resented", "abstract": "According to Webster''s definition of a tutorial: \u201ca paper and esp. a technical paper written to give practical information about a specific @@ -2605,14 +2912,15 @@ interactions: have been shown to have been unjustified, they express everyman''s image of a goal that, in the mean time, has been proved to be unattainable.", "venue": "Reliable Software", "year": 1975, "referenceCount": 0, "citationCount": 24, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "1975-06-01", "journal": - {"pages": "546"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "cf16b4cfcd611a7483bddecade8d34df1fb70b71", "externalIds": {"MAG": - "2081966658", "DBLP": "conf/ac/Dijkstra75a", "DOI": "10.1145/800027.808417", - "CorpusId": 22536404}, "url": "https://www.semanticscholar.org/paper/cf16b4cfcd611a7483bddecade8d34df1fb70b71", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1975-06-01", + "journal": {"pages": "546"}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "cf16b4cfcd611a7483bddecade8d34df1fb70b71", "externalIds": + {"MAG": "2081966658", "DBLP": "conf/ac/Dijkstra75a", "DOI": "10.1145/800027.808417", + "CorpusId": 22536404}, "corpusId": 22536404, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cf16b4cfcd611a7483bddecade8d34df1fb70b71", "title": "Guarded commands, non-determinacy and a calculus for the derivation of programs", "abstract": "So-called \u201cguarded commands\u201d are introduced as a building block for alternative and repetitive constructs that allow non-deterministic @@ -2621,22 +2929,25 @@ interactions: For the formal derivation of programs expressed in terms of these constructs, a calculus will be shown.", "venue": "Language Hierarchies and Interfaces", "year": 1975, "referenceCount": 2, "citationCount": 162, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/390016.808417", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1975-06-01", "journal": {"pages": "2"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "efb39e097f37a6604f8d75c7d184ad13422269c8", "externalIds": {"DBLP": "conf/pacific/Dijkstra75", "MAG": "1501631641", "DOI": - "10.1007/978-1-4612-5695-3_19", "CorpusId": 5243734}, "url": "https://www.semanticscholar.org/paper/efb39e097f37a6604f8d75c7d184ad13422269c8", + "10.1007/978-1-4612-5695-3_19", "CorpusId": 5243734}, "corpusId": 5243734, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/efb39e097f37a6604f8d75c7d184ad13422269c8", "title": "Craftsman or Scientist", "abstract": null, "venue": "ACM Pacific", "year": 1975, "referenceCount": 1, "citationCount": 7, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "217-223"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "47795d76f935cb633611a08a93554a2378888966", - "externalIds": {"MAG": "2111132249", "DBLP": "journals/cacm/Dijkstra74", "DOI": - "10.1145/361179.361202", "CorpusId": 11101426}, "url": "https://www.semanticscholar.org/paper/47795d76f935cb633611a08a93554a2378888966", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "217-223"}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "47795d76f935cb633611a08a93554a2378888966", "externalIds": {"MAG": "2111132249", + "DBLP": "journals/cacm/Dijkstra74", "DOI": "10.1145/361179.361202", "CorpusId": + 11101426}, "corpusId": 11101426, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/47795d76f935cb633611a08a93554a2378888966", "title": "Self-stabilizing systems in spite of distributed control", "abstract": "The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed @@ -2647,16 +2958,17 @@ interactions: is readily\u2014and quite systematically\u2014implemented if the different processes can be granted mutually exclusive access to a common store in which \u201cthe current system state\u201d is recorded.", "venue": "CACM", "year": - 1974, "referenceCount": 0, "citationCount": 2193, "influentialCitationCount": - 146, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1974-11-01", "journal": {"volume": "17", "pages": "643-644", - "name": "Commun. ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "f6ca8d951f4979f14fd529fc9450491782d84284", "externalIds": {"MAG": - "2090596673", "DOI": "10.1080/00029890.1974.11993624", "CorpusId": 122169249}, - "url": "https://www.semanticscholar.org/paper/f6ca8d951f4979f14fd529fc9450491782d84284", + 1974, "referenceCount": 0, "citationCount": 2193, "influentialCitationCount": + 146, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/361179.361202", + "status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1974-11-01", "journal": + {"volume": "17", "pages": "643-644", "name": "Commun. ACM"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f6ca8d951f4979f14fd529fc9450491782d84284", + "externalIds": {"MAG": "2090596673", "DOI": "10.1080/00029890.1974.11993624", + "CorpusId": 122169249}, "corpusId": 122169249, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f6ca8d951f4979f14fd529fc9450491782d84284", "title": "Programming as a discipline of mathematical nature", "abstract": "In this article I intend to present programming as a mathematical activity without undertaking the arduous task of supplying a definition of \"mathematics\" @@ -2669,32 +2981,35 @@ interactions: infinite) class of instances. (3) Mathematics embodies a discipline of reasoning allowing such assertions to be made with an unusually high confidence level.", "venue": "", "year": 1974, "referenceCount": 0, "citationCount": 55, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1974-06-01", "journal": {"volume": "81", "pages": "608-612", "name": "American - Mathematical Monthly"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "f6d354105154c72d5954cd1f34ff12aada176b0f", "externalIds": {"MAG": - "1578885347", "DOI": "10.1007/978-1-4612-5695-3_7", "CorpusId": 63189586}, - "url": "https://www.semanticscholar.org/paper/f6d354105154c72d5954cd1f34ff12aada176b0f", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1974-06-01", "journal": {"volume": "81", "pages": + "608-612", "name": "American Mathematical Monthly"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f6d354105154c72d5954cd1f34ff12aada176b0f", + "externalIds": {"MAG": "1578885347", "DOI": "10.1007/978-1-4612-5695-3_7", + "CorpusId": 63189586}, "corpusId": 63189586, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f6d354105154c72d5954cd1f34ff12aada176b0f", "title": "Self stabilization in spite of distributed control", "abstract": null, "venue": "", "year": 1974, "referenceCount": 3, "citationCount": 230, - "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": "Communications of The ACM"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "119902d16863246a704df46f5287aa2df3d9f8c9", + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": "Communications of The ACM"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "119902d16863246a704df46f5287aa2df3d9f8c9", "externalIds": {"MAG": "1987585903", "DOI": "10.1016/1385-7258(74)90008-0", - "CorpusId": 62768594}, "url": "https://www.semanticscholar.org/paper/119902d16863246a704df46f5287aa2df3d9f8c9", + "CorpusId": 62768594}, "corpusId": 62768594, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/119902d16863246a704df46f5287aa2df3d9f8c9", "title": "A simple axiomatic basis for programming language constructs", "abstract": null, "venue": "", "year": 1973, "referenceCount": 0, "citationCount": 32, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "77", - "pages": "1-15", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "ff47048d786562579ab958c12056b6f18420be84", - "externalIds": {"MAG": "174129905", "CorpusId": 59918649}, "url": "https://www.semanticscholar.org/paper/ff47048d786562579ab958c12056b6f18420be84", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "77", "pages": "1-15", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "ff47048d786562579ab958c12056b6f18420be84", + "externalIds": {"MAG": "174129905", "CorpusId": 59918649}, "corpusId": 59918649, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ff47048d786562579ab958c12056b6f18420be84", "title": "EWD391 Self-stabilization in spite of distributed control", "abstract": "A systematic way for finding the algorithm ensuring some desired form of co-operation between a set of loosely coupled sequential processes can in @@ -2723,24 +3038,26 @@ interactions: node: local actions taken on account of local information must accomplish a global objective. Such", "venue": "", "year": 1973, "referenceCount": 0, "citationCount": 18, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "9fff66122e08ae4df6cc05fbf38fe7df243eb3e6", "externalIds": {"DBLP": + "books/daglib/0070495", "MAG": "2751474440", "DOI": "10.1007/1-4020-0613-6_18424", + "CorpusId": 8219547}, "corpusId": 8219547, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9fff66122e08ae4df6cc05fbf38fe7df243eb3e6", + "title": "Structured programming", "abstract": null, "venue": "A.P.I.C. Studies + in data processing", "year": 1972, "referenceCount": 0, "citationCount": 1124, + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "9fff66122e08ae4df6cc05fbf38fe7df243eb3e6", "externalIds": {"DBLP": "books/daglib/0070495", - "MAG": "2751474440", "DOI": "10.1007/1-4020-0613-6_18424", "CorpusId": 8219547}, - "url": "https://www.semanticscholar.org/paper/9fff66122e08ae4df6cc05fbf38fe7df243eb3e6", - "title": "Structured programming", "abstract": null, "venue": "A.P.I.C. Studies - in data processing", "year": 1972, "referenceCount": 0, "citationCount": 1124, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "8", - "pages": "I-VIII, 1-220"}, "authors": [{"authorId": "34708881", "name": "O. - Dahl"}, {"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "144861543", - "name": "C. Hoare"}]}, {"paperId": "f5d25cdd77b10bbc18eaae614bcc64c9c51ef658", + {"volume": "8", "pages": "I-VIII, 1-220"}, "authors": [{"authorId": "34708881", + "name": "O. Dahl"}, {"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": + "144861543", "name": "C. Hoare"}]}, {"paperId": "f5d25cdd77b10bbc18eaae614bcc64c9c51ef658", "externalIds": {"MAG": "2124209077", "DBLP": "journals/cacm/Dijkstra72", "DOI": - "10.1145/355604.361591", "CorpusId": 2282942}, "url": "https://www.semanticscholar.org/paper/f5d25cdd77b10bbc18eaae614bcc64c9c51ef658", + "10.1145/355604.361591", "CorpusId": 2282942}, "corpusId": 2282942, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f5d25cdd77b10bbc18eaae614bcc64c9c51ef658", "title": "The humble programmer", "abstract": "As a result of a long sequence of coincidences I entered the programming profession officially on the first spring morning of 1952, and as far as I have been able to trace, I was the @@ -2749,68 +3066,80 @@ interactions: profession emerged, a slowness which is now hard to believe. But I am grateful for two vivid recollections from that period that establish that slowness beyond any doubt.", "venue": "CACM", "year": 1972, "referenceCount": 1, "citationCount": - 794, "influentialCitationCount": 25, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "external"}, - {"category": "History", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1972-10-01", "journal": {"volume": "15", "pages": "859-866", - "name": "Commun. ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "f9bdd27c48c57426179b1b09ffc517e94cbfca56", "externalIds": {"DBLP": - "journals/ipl/Dijkstra72", "MAG": "2004375222", "DOI": "10.1016/0020-0190(72)90034-8", - "CorpusId": 45504110}, "url": "https://www.semanticscholar.org/paper/f9bdd27c48c57426179b1b09ffc517e94cbfca56", + 794, "influentialCitationCount": 25, "isOpenAccess": true, "openAccessPdf": + {"url": "http://dl.acm.org/ft_gateway.cfm?id=1283927&type=pdf", "status": + null}, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "History", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1972-10-01", "journal": + {"volume": "15", "pages": "859-866", "name": "Commun. ACM"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f9bdd27c48c57426179b1b09ffc517e94cbfca56", + "externalIds": {"DBLP": "journals/ipl/Dijkstra72", "MAG": "2004375222", "DOI": + "10.1016/0020-0190(72)90034-8", "CorpusId": 45504110}, "corpusId": 45504110, + "publicationVenue": {"id": "44ecc2bb-f8fd-4c6d-bd54-30ca098be91d", "name": + "Information Processing Letters", "type": "journal", "alternate_names": ["Inf + Process Lett"], "issn": "0020-0190", "url": "http://www.elsevier.com/locate/ipl", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505612/description#description", + "http://www.sciencedirect.com/science/journal/00200190"]}, "url": "https://www.semanticscholar.org/paper/f9bdd27c48c57426179b1b09ffc517e94cbfca56", "title": "Information Streams Sharing a Finite Buffer", "abstract": null, "venue": "Information Processing Letters", "year": 1972, "referenceCount": 0, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1972-10-01", "journal": - {"volume": "1", "pages": "179-180", "name": "Inf. Process. Lett."}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "fc434de81d3df54c9ba944bd4e7974100a0e3caa", - "externalIds": {"MAG": "15574367", "CorpusId": 53889441}, "url": "https://www.semanticscholar.org/paper/fc434de81d3df54c9ba944bd4e7974100a0e3caa", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1972-10-01", "journal": {"volume": "1", "pages": "179-180", "name": "Inf. + Process. Lett."}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "fc434de81d3df54c9ba944bd4e7974100a0e3caa", "externalIds": {"MAG": + "15574367", "CorpusId": 53889441}, "corpusId": 53889441, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fc434de81d3df54c9ba944bd4e7974100a0e3caa", "title": "Chapter I: Notes on structured programming", "abstract": null, "venue": "", "year": 1972, "referenceCount": 0, "citationCount": 58, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "1-82", - "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "25e0a4cdf05af192865ca753ab28999aafc40a13", "externalIds": {"MAG": - "2569761296", "DBLP": "conf/afips/Dijkstra72", "DOI": "10.1145/1478873.1478997", - "CorpusId": 2884006}, "url": "https://www.semanticscholar.org/paper/25e0a4cdf05af192865ca753ab28999aafc40a13", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "1-82", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "25e0a4cdf05af192865ca753ab28999aafc40a13", + "externalIds": {"MAG": "2569761296", "DBLP": "conf/afips/Dijkstra72", "DOI": + "10.1145/1478873.1478997", "CorpusId": 2884006}, "corpusId": 2884006, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/25e0a4cdf05af192865ca753ab28999aafc40a13", "title": "A class of allocation strategies inducing bounded delays only", "abstract": "We consider a finite set of persons, say numbered from 1 through M, whose never ending life consists of an alternation of eating and thinking, i.e., (in the first instance) they all behave according to the program cycle begin eat; think end.", "venue": "AFIPS ''72 (Spring)", "year": 1899, "referenceCount": 0, "citationCount": 28, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1899-12-30", "journal": - {"pages": "933-936"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "3610930c7e185a525b7b06a567fe30eeba7c7180", "externalIds": {"MAG": - "1589747065", "CorpusId": 57817856}, "url": "https://www.semanticscholar.org/paper/3610930c7e185a525b7b06a567fe30eeba7c7180", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1899-12-30", "journal": {"pages": "933-936"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "3610930c7e185a525b7b06a567fe30eeba7c7180", + "externalIds": {"MAG": "1589747065", "CorpusId": 57817856}, "corpusId": 57817856, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3610930c7e185a525b7b06a567fe30eeba7c7180", "title": "Ewd 316: a short introduction to the art of programming", "abstract": null, "venue": "", "year": 1971, "referenceCount": 0, "citationCount": 152, - "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. - Dijkstra"}]}, {"paperId": "5a65ca847b22110f82236032fbd715cef1368715", "externalIds": - {"MAG": "220219360", "CorpusId": 107632988}, "url": "https://www.semanticscholar.org/paper/5a65ca847b22110f82236032fbd715cef1368715", + "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "5a65ca847b22110f82236032fbd715cef1368715", + "externalIds": {"MAG": "220219360", "CorpusId": 107632988}, "corpusId": 107632988, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a65ca847b22110f82236032fbd715cef1368715", "title": "MC-25 informatica symposium : [symposium on the occasion of the 25th anniversary of the Mathematical Centre, Amsterdam, 06-07.01.1972]", "abstract": null, "venue": "", "year": 1971, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "52057941", - "name": "J. Debakker"}, {"authorId": "49931514", "name": "G. Blaauw"}, {"authorId": - "145374802", "name": "A. Duijvestijn"}, {"authorId": "3234559", "name": "E. - Dijkstra"}, {"authorId": "95767289", "name": "P. J. V. deHouwen"}, {"authorId": - "1447217419", "name": "G.A.M. Kamsteeg-Kemper"}, {"authorId": "2401975", "name": - "F. Aretz"}, {"authorId": "96632056", "name": "W. L. V. dePoel"}, {"authorId": - "1447212807", "name": "J. P. Schaap-Kruseman"}, {"authorId": "143812958", - "name": "M. Wilkes"}, {"authorId": "16683211", "name": "G. Zoutendijk"}]}, - {"paperId": "9ad3cac3bee4e8dfab3b3440da2b4070bb455a36", "externalIds": {"MAG": - "2807862177", "CorpusId": 8242220}, "url": "https://www.semanticscholar.org/paper/9ad3cac3bee4e8dfab3b3440da2b4070bb455a36", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "52057941", "name": "J. Debakker"}, + {"authorId": "49931514", "name": "G. Blaauw"}, {"authorId": "145374802", "name": + "A. Duijvestijn"}, {"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": + "95767289", "name": "P. J. V. deHouwen"}, {"authorId": "1447217419", "name": + "G.A.M. Kamsteeg-Kemper"}, {"authorId": "2401975", "name": "F. Aretz"}, {"authorId": + "96632056", "name": "W. L. V. dePoel"}, {"authorId": "1447212807", "name": + "J. P. Schaap-Kruseman"}, {"authorId": "143812958", "name": "M. Wilkes"}, + {"authorId": "16683211", "name": "G. Zoutendijk"}]}, {"paperId": "9ad3cac3bee4e8dfab3b3440da2b4070bb455a36", + "externalIds": {"MAG": "2807862177", "CorpusId": 8242220}, "corpusId": 8242220, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9ad3cac3bee4e8dfab3b3440da2b4070bb455a36", "title": "Notes on structured programming", "abstract": "\u2022 A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official @@ -2821,12 +3150,13 @@ interactions: published version features the final layout of the paper including the volume, issue and page numbers.", "venue": "", "year": 1970, "referenceCount": 0, "citationCount": 1024, "influentialCitationCount": 39, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Materials Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"volume": "8", "pages": "1-82", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "2ce99201ab01b6f5404e6b6f77afcbb3332dc45f", - "externalIds": {"MAG": "3093036", "CorpusId": 140285360}, "url": "https://www.semanticscholar.org/paper/2ce99201ab01b6f5404e6b6f77afcbb3332dc45f", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"volume": "8", "pages": "1-82", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "2ce99201ab01b6f5404e6b6f77afcbb3332dc45f", + "externalIds": {"MAG": "3093036", "CorpusId": 140285360}, "corpusId": 140285360, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2ce99201ab01b6f5404e6b6f77afcbb3332dc45f", "title": "Co-operating sequential processes", "abstract": "\u2022 A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official @@ -2837,23 +3167,25 @@ interactions: published version features the final layout of the paper including the volume, issue and page numbers.", "venue": "", "year": 1968, "referenceCount": 0, "citationCount": 437, "influentialCitationCount": 27, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Materials Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"volume": "", "pages": "43-112", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3e8f36a0688d497c869841ec97479bf81073a942", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"volume": "", "pages": "43-112", "name": ""}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3e8f36a0688d497c869841ec97479bf81073a942", "externalIds": {"DBLP": "journals/cacm/RiceD68", "MAG": "2053627226", "DOI": - "10.1145/363567.363570", "CorpusId": 52851012}, "url": "https://www.semanticscholar.org/paper/3e8f36a0688d497c869841ec97479bf81073a942", + "10.1145/363567.363570", "CorpusId": 52851012}, "corpusId": 52851012, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3e8f36a0688d497c869841ec97479bf81073a942", "title": "Letters to the editor: The go to statement reconsidered", "abstract": null, "venue": "CACM", "year": 1968, "referenceCount": 0, "citationCount": - 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1968-08-01", "journal": {"volume": "11", "pages": "538", "name": "Commun. - ACM"}, "authors": [{"authorId": "143746090", "name": "J. Rice"}, {"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "7ef3766046c0f3331607f5e965f79c3eb9d7dd7a", + 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1968-08-01", "journal": {"volume": "11", "pages": "538", + "name": "Commun. ACM"}, "authors": [{"authorId": "143746090", "name": "J. + Rice"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "7ef3766046c0f3331607f5e965f79c3eb9d7dd7a", "externalIds": {"MAG": "1994718921", "DBLP": "journals/cacm/Dijkstra68a", - "DOI": "10.1145/362929.362947", "CorpusId": 17469809}, "url": "https://www.semanticscholar.org/paper/7ef3766046c0f3331607f5e965f79c3eb9d7dd7a", + "DOI": "10.1145/362929.362947", "CorpusId": 17469809}, "corpusId": 17469809, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7ef3766046c0f3331607f5e965f79c3eb9d7dd7a", "title": "Letters to the editor: go to statement considered harmful", "abstract": "For a number of years I have been familiar with the observation that the quality of programmers is a decreasing function of the density of go to statements @@ -2887,23 +3219,25 @@ interactions: (In the absence of go to statements I can permit myself the syntactic ambiguity in the last three words of the previous sentence: if we parse \u2026", "venue": "CACM", "year": 1968, "referenceCount": 3, "citationCount": 846, "influentialCitationCount": - 19, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1968-03-01", "journal": {"volume": "11", "pages": "147-148", - "name": "Commun. ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "cc492da3b588bee83f4832ce2d2a4571354c61c6", "externalIds": {"MAG": - "1580325198", "CorpusId": 60493402}, "url": "https://www.semanticscholar.org/paper/cc492da3b588bee83f4832ce2d2a4571354c61c6", + 19, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1968-03-01", "journal": + {"volume": "11", "pages": "147-148", "name": "Commun. ACM"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "cc492da3b588bee83f4832ce2d2a4571354c61c6", + "externalIds": {"MAG": "1580325198", "CorpusId": 60493402}, "corpusId": 60493402, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc492da3b588bee83f4832ce2d2a4571354c61c6", "title": "The go to statement reconsidered [Letters to the editor]", "abstract": null, "venue": "", "year": 1968, "referenceCount": 0, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "11", "pages": "538", - "name": "Communications of The ACM"}, "authors": [{"authorId": "143746090", - "name": "J. Rice"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "cf4570f4801181a2f8e1b9aac77c180d0206834e", "externalIds": {"MAG": "2173222786", - "DBLP": "journals/cacm/Dijkstra68", "DOI": "10.1145/363095.363143", "CorpusId": - 2021311}, "url": "https://www.semanticscholar.org/paper/cf4570f4801181a2f8e1b9aac77c180d0206834e", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "11", "pages": "538", "name": "Communications of The + ACM"}, "authors": [{"authorId": "143746090", "name": "J. Rice"}, {"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "cf4570f4801181a2f8e1b9aac77c180d0206834e", + "externalIds": {"MAG": "2173222786", "DBLP": "journals/cacm/Dijkstra68", "DOI": + "10.1145/363095.363143", "CorpusId": 2021311}, "corpusId": 2021311, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/cf4570f4801181a2f8e1b9aac77c180d0206834e", "title": "The structure of the \u201cTHE\u201d-multiprogramming system", "abstract": "A multiprogramming system is described in which all activities are divided over a number of sequential processes. These sequential processes are placed @@ -2912,22 +3246,25 @@ interactions: verification of the logical soundness of the design and the correctness of its implementation.", "venue": "CACM", "year": 1968, "referenceCount": 3, "citationCount": 1211, "influentialCitationCount": 20, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1968-05-01", "journal": {"volume": "11", "pages": "341-346", "name": "Commun. - ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "f38381e73224670f0cfc9b8b9e0f751938ce5a40", "externalIds": {"MAG": "2078250023", - "DOI": "10.1007/BF01933419", "CorpusId": 62224342}, "url": "https://www.semanticscholar.org/paper/f38381e73224670f0cfc9b8b9e0f751938ce5a40", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1968-05-01", "journal": {"volume": "11", "pages": "341-346", + "name": "Commun. ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "f38381e73224670f0cfc9b8b9e0f751938ce5a40", "externalIds": {"MAG": + "2078250023", "DOI": "10.1007/BF01933419", "CorpusId": 62224342}, "corpusId": + 62224342, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f38381e73224670f0cfc9b8b9e0f751938ce5a40", "title": "A constructive approach to the problem of program correctness", "abstract": null, "venue": "", "year": 1968, "referenceCount": 2, "citationCount": - 253, "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1968-09-01", "journal": {"volume": - "8", "pages": "174-186", "name": "BIT Numerical Mathematics"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "f7125fb229ebb98f136e797e7862455ed0dac4d9", - "externalIds": {"MAG": "2189364878", "CorpusId": 16513009}, "url": "https://www.semanticscholar.org/paper/f7125fb229ebb98f136e797e7862455ed0dac4d9", + 253, "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1968-09-01", + "journal": {"volume": "8", "pages": "174-186", "name": "BIT Numerical Mathematics"}, + "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "f7125fb229ebb98f136e797e7862455ed0dac4d9", "externalIds": {"MAG": "2189364878", + "CorpusId": 16513009}, "corpusId": 16513009, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f7125fb229ebb98f136e797e7862455ed0dac4d9", "title": "The Structure of the \"THE\"-Multiprogramming", "abstract": "A multiprogramming system is described in which all activities are divided over a number of sequential processes. These sequential processes are placed at various hierarchical levels, @@ -2935,13 +3272,15 @@ interactions: The hierarchical structure proved to be vital for the verification of the logical soundness of the design and the correctness of its implementation.", "venue": "", "year": 1968, "referenceCount": 0, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "4f5cf3629ec34ef81e6603d09ae962865ba2a610", - "externalIds": {"DBLP": "conf/sosp/Dijkstra67", "MAG": "2152177124", "DOI": - "10.1145/800001.811672", "CorpusId": 52098412}, "url": "https://www.semanticscholar.org/paper/4f5cf3629ec34ef81e6603d09ae962865ba2a610", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "4f5cf3629ec34ef81e6603d09ae962865ba2a610", "externalIds": {"DBLP": + "conf/sosp/Dijkstra67", "MAG": "2152177124", "DOI": "10.1145/800001.811672", + "CorpusId": 52098412}, "corpusId": 52098412, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4f5cf3629ec34ef81e6603d09ae962865ba2a610", "title": "The structure of the \u201cTHE\u201d-multiprogramming system", "abstract": "A multiprogramming system is described in which all activities are divided over a number of sequential processes. These sequential processes are placed @@ -2950,53 +3289,60 @@ interactions: verification of the logical soundness of the design and the correctness of its implementation.", "venue": "SOSP", "year": 1967, "referenceCount": 0, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], - "publicationDate": "1967-01-01", "journal": {"name": "Proceedings of the first - ACM symposium on Operating System Principles"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "bbf20917157ff88cf42412484f298d21570ea4db", - "externalIds": {"MAG": "1877378076", "CorpusId": 60724775}, "url": "https://www.semanticscholar.org/paper/bbf20917157ff88cf42412484f298d21570ea4db", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800001.811672", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "1967-01-01", "journal": {"name": "Proceedings + of the first ACM symposium on Operating System Principles"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "bbf20917157ff88cf42412484f298d21570ea4db", + "externalIds": {"MAG": "1877378076", "CorpusId": 60724775}, "corpusId": 60724775, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bbf20917157ff88cf42412484f298d21570ea4db", "title": "Elementaire cursus programmeren in Algol 60", "abstract": null, "venue": "", "year": 1967, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "143813936", "name": "A. Geurts"}, {"authorId": "145985550", "name": "A. Habermann"}, {"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "2d631437dad51114cae5a6cf927953c8d2e9dd63", "externalIds": {"MAG": - "1584380116", "CorpusId": 59081887}, "url": "https://www.semanticscholar.org/paper/2d631437dad51114cae5a6cf927953c8d2e9dd63", + "1584380116", "CorpusId": 59081887}, "corpusId": 59081887, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2d631437dad51114cae5a6cf927953c8d2e9dd63", "title": "A Mechanism for Dealing with the types integer, real and complex", "abstract": "A hydraulic fluid shield and diverter encompassing the multiple disc clutch transmitting torque from input shaft to an output shaft, intensifying the cooling effect of the hydraulic fluid passing through the clutch and also reducing aeration of the fluid entering the vehicle hydraulic system.", "venue": "", "year": 1965, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1965-11-01", - "journal": {"volume": "", "pages": "24-31", "name": "ALGOL Bulletin"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "3fea018ca5e6fecf60a90c2612391f9805c86c15", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1965-11-01", "journal": {"volume": "", "pages": + "24-31", "name": "ALGOL Bulletin"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "3fea018ca5e6fecf60a90c2612391f9805c86c15", "externalIds": {"MAG": "2150430387", "DBLP": "journals/cacm/Dijkstra65", "DOI": - "10.1007/978-3-642-59412-0_20", "CorpusId": 19357737}, "url": "https://www.semanticscholar.org/paper/3fea018ca5e6fecf60a90c2612391f9805c86c15", + "10.1007/978-3-642-59412-0_20", "CorpusId": 19357737}, "corpusId": 19357737, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3fea018ca5e6fecf60a90c2612391f9805c86c15", "title": "Solution of a problem in concurrent programming control", "abstract": null, "venue": "CACM", "year": 1965, "referenceCount": 0, "citationCount": - 832, "influentialCitationCount": 61, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "347-350"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, - {"paperId": "48119f4626623df950cfe90de0ad2bdc3d1ee16b", "externalIds": {"MAG": - "151922429", "CorpusId": 59854758}, "url": "https://www.semanticscholar.org/paper/48119f4626623df950cfe90de0ad2bdc3d1ee16b", + 832, "influentialCitationCount": 61, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "347-350"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "48119f4626623df950cfe90de0ad2bdc3d1ee16b", + "externalIds": {"MAG": "151922429", "CorpusId": 59854758}, "corpusId": 59854758, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48119f4626623df950cfe90de0ad2bdc3d1ee16b", "title": "Cooperating Sequential Processes, Technical Report EWD-123", "abstract": null, "venue": "", "year": 1965, "referenceCount": 0, "citationCount": 108, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. - Dijkstra"}]}, {"paperId": "2d8c14a2aaae3afb5574cf4bf1beb4daf658b45d", "externalIds": - {"DBLP": "journals/cacm/Dijkstra64", "MAG": "1974266331", "DOI": "10.1145/363958.364002", - "CorpusId": 34616280}, "url": "https://www.semanticscholar.org/paper/2d8c14a2aaae3afb5574cf4bf1beb4daf658b45d", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "2d8c14a2aaae3afb5574cf4bf1beb4daf658b45d", + "externalIds": {"DBLP": "journals/cacm/Dijkstra64", "MAG": "1974266331", "DOI": + "10.1145/363958.364002", "CorpusId": 34616280}, "corpusId": 34616280, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2d8c14a2aaae3afb5574cf4bf1beb4daf658b45d", "title": "Some comments on the aims of MIRFAC", "abstract": "fied. Storage can be allocated during one pass over the program. Compute time during compilation is reduced. 4. The size of a COMMON block is explicit in COMMON, DIMENSION, @@ -3005,13 +3351,14 @@ interactions: may not vary from one subprogram to the next. IXAYDEN T. RICHARDS Programmatics, Inc. 33 Malaga Cove Plaza Palos Verdes Estates, Calif.", "venue": "CACM", "year": 1964, "referenceCount": 4, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1964-03-01", "journal": {"volume": "7", "pages": "190", "name": "Commun. - ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "e0c13b8840eb90c51a45fe497af26ddcedb48fca", "externalIds": {"MAG": "51126007", - "CorpusId": 59810778}, "url": "https://www.semanticscholar.org/paper/e0c13b8840eb90c51a45fe497af26ddcedb48fca", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1964-03-01", "journal": {"volume": + "7", "pages": "190", "name": "Commun. ACM"}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "e0c13b8840eb90c51a45fe497af26ddcedb48fca", + "externalIds": {"MAG": "51126007", "CorpusId": 59810778}, "corpusId": 59810778, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e0c13b8840eb90c51a45fe497af26ddcedb48fca", "title": "A simple mechanism modelling some features of ALGOL", "abstract": "A regenerative air preheater has a heat-exchange sector plate centered on an axis and formed with a multiplicity of axially throughgoing passages with @@ -3033,71 +3380,79 @@ interactions: nonaxially within the respective secondary hoods and to vary the heat-exchange between the primary stream and the plate.", "venue": "", "year": 1964, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1964-05-01", "journal": {"volume": - "", "pages": "14-23", "name": "ALGOL Bulletin"}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "fdb1c2305d22af2ce2eed258da853825c63ec7ba", - "externalIds": {"MAG": "179096138", "CorpusId": 59899561}, "url": "https://www.semanticscholar.org/paper/fdb1c2305d22af2ce2eed258da853825c63ec7ba", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1964-05-01", + "journal": {"volume": "", "pages": "14-23", "name": "ALGOL Bulletin"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "fdb1c2305d22af2ce2eed258da853825c63ec7ba", + "externalIds": {"MAG": "179096138", "CorpusId": 59899561}, "corpusId": 59899561, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fdb1c2305d22af2ce2eed258da853825c63ec7ba", "title": "Note on language definition", "abstract": null, "venue": "", "year": 1964, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1964-10-01", - "journal": {"volume": "", "pages": "44-44", "name": "ALGOL Bulletin"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "09f048e35eccea6f97850a825f21fa67e65728aa", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1964-10-01", "journal": {"volume": "", "pages": + "44-44", "name": "ALGOL Bulletin"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "09f048e35eccea6f97850a825f21fa67e65728aa", "externalIds": {"MAG": "2128228505", "DOI": "10.1016/s0066-4138(63)80015-4", - "CorpusId": 61954661}, "url": "https://www.semanticscholar.org/paper/09f048e35eccea6f97850a825f21fa67e65728aa", + "CorpusId": 61954661}, "corpusId": 61954661, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/09f048e35eccea6f97850a825f21fa67e65728aa", "title": "An Algol 60 translator for the X1", "abstract": null, "venue": "", "year": 1963, "referenceCount": 0, "citationCount": 20, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "3", "pages": "329-345", "name": "Annual Review - of Automatic Programming"}, "authors": [{"authorId": "3234559", "name": "E. - Dijkstra"}]}, {"paperId": "18b11f08c82d07a46fb4bccb60296d94e63fb4d7", "externalIds": - {"MAG": "2010726656", "DOI": "10.1016/S0066-4138(63)80014-2", "CorpusId": - 62613706}, "url": "https://www.semanticscholar.org/paper/18b11f08c82d07a46fb4bccb60296d94e63fb4d7", - "title": "Appendix \u2013 Two Papers on an ALGOL Translator for the X1", "abstract": - null, "venue": "", "year": 1963, "referenceCount": 0, "citationCount": 3, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1963-12-31", "journal": {"volume": - "3", "pages": "327", "name": "Annual Review of Automatic Programming"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "212dd22195580a0dfeb8c748d7a06a54253d4b6e", - "externalIds": {"MAG": "1500931591", "DOI": "10.1016/b978-0-08-009763-3.50019-9", - "CorpusId": 57880715}, "url": "https://www.semanticscholar.org/paper/212dd22195580a0dfeb8c748d7a06a54253d4b6e", + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "3", + "pages": "329-345", "name": "Annual Review of Automatic Programming"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "18b11f08c82d07a46fb4bccb60296d94e63fb4d7", + "externalIds": {"MAG": "2010726656", "DOI": "10.1016/S0066-4138(63)80014-2", + "CorpusId": 62613706}, "corpusId": 62613706, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/18b11f08c82d07a46fb4bccb60296d94e63fb4d7", + "title": "Appendix \u2013 Two Papers on an ALGOL Translator for the X1", "abstract": + null, "venue": "", "year": 1963, "referenceCount": 0, "citationCount": 3, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1963-12-31", + "journal": {"volume": "3", "pages": "327", "name": "Annual Review of Automatic + Programming"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "212dd22195580a0dfeb8c748d7a06a54253d4b6e", "externalIds": {"MAG": + "1500931591", "DOI": "10.1016/b978-0-08-009763-3.50019-9", "CorpusId": 57880715}, + "corpusId": 57880715, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/212dd22195580a0dfeb8c748d7a06a54253d4b6e", "title": "Making a translator for Algol 60", "abstract": null, "venue": "", "year": 1963, "referenceCount": 0, "citationCount": 31, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "3", "pages": "347-356", "name": "Annual Review - of Automatic Programming"}, "authors": [{"authorId": "3234559", "name": "E. - Dijkstra"}]}, {"paperId": "4572a402c687f1fb2cd1f16cc6bec8e918e4ad76", "externalIds": - {"MAG": "2615341467", "DOI": "10.1016/B978-0-08-009763-3.50017-5", "CorpusId": - 186166563}, "url": "https://www.semanticscholar.org/paper/4572a402c687f1fb2cd1f16cc6bec8e918e4ad76", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "3", + "pages": "347-356", "name": "Annual Review of Automatic Programming"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "4572a402c687f1fb2cd1f16cc6bec8e918e4ad76", + "externalIds": {"MAG": "2615341467", "DOI": "10.1016/B978-0-08-009763-3.50017-5", + "CorpusId": 186166563}, "corpusId": 186166563, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4572a402c687f1fb2cd1f16cc6bec8e918e4ad76", "title": "Two Papers on an ALGOL Translator for the X1", "abstract": null, "venue": "", "year": 1963, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "327", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "a25753db9654644c84e125ce140485a701d9b6af", - "externalIds": {"MAG": "2615441562", "DOI": "10.1016/B978-0-08-009763-3.50007-2", - "CorpusId": 64505424}, "url": "https://www.semanticscholar.org/paper/a25753db9654644c84e125ce140485a701d9b6af", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "327", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "a25753db9654644c84e125ce140485a701d9b6af", "externalIds": + {"MAG": "2615441562", "DOI": "10.1016/B978-0-08-009763-3.50007-2", "CorpusId": + 64505424}, "corpusId": 64505424, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a25753db9654644c84e125ce140485a701d9b6af", "title": "On the Design of Machine Independent Programming Languages\u2020 \u2020Originally issued as Report M.R.34 of the Mathematics Centre, Amsterdam.", "abstract": null, "venue": "", "year": 1963, "referenceCount": 0, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "27-42", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "57fd9ecab0a72f4ec0ec59430bd3e2ebb178e60a", + 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "27-42", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "57fd9ecab0a72f4ec0ec59430bd3e2ebb178e60a", "externalIds": {"DBLP": "journals/cj/Dijkstra62", "MAG": "2025831067", "DOI": - "10.1093/COMJNL/5.2.125", "CorpusId": 62225044}, "url": "https://www.semanticscholar.org/paper/57fd9ecab0a72f4ec0ec59430bd3e2ebb178e60a", + "10.1093/COMJNL/5.2.125", "CorpusId": 62225044}, "corpusId": 62225044, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/57fd9ecab0a72f4ec0ec59430bd3e2ebb178e60a", "title": "Operating Experience with ALGOL 60", "abstract": "with the tide, and advocated separation of data and instructions, were branded as reactionaries. Today we seem to be coming back to the idea of special-purpose features and @@ -3131,32 +3486,36 @@ interactions: the three speakers who have given our conference such a good start. (Applause.) The Conference Adjourned.", "venue": "Comput. J.", "year": 1962, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1962-08-01", "journal": {"volume": "5", "pages": "125-127", "name": "Comput. - J."}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "d0be13175263b59ed61636086d7d6bdc1cc6a734", "externalIds": {"MAG": "1549583867", - "CorpusId": 61042190}, "url": "https://www.semanticscholar.org/paper/d0be13175263b59ed61636086d7d6bdc1cc6a734", + "openAccessPdf": {"url": "https://academic.oup.com/comjnl/article-pdf/5/2/125/975127/5-2-125.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1962-08-01", "journal": {"volume": "5", "pages": "125-127", + "name": "Comput. J."}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "d0be13175263b59ed61636086d7d6bdc1cc6a734", "externalIds": {"MAG": + "1549583867", "CorpusId": 61042190}, "corpusId": 61042190, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d0be13175263b59ed61636086d7d6bdc1cc6a734", "title": "Primer of Algol 60 Programming", "abstract": null, "venue": "", "year": 1962, "referenceCount": 0, "citationCount": 21, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1962-06-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "eb896c33e390b7b3c2b560b94387772840074157", "externalIds": {"MAG": "1594067908", - "CorpusId": 58799627}, "url": "https://www.semanticscholar.org/paper/eb896c33e390b7b3c2b560b94387772840074157", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1962-06-01", "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "eb896c33e390b7b3c2b560b94387772840074157", "externalIds": + {"MAG": "1594067908", "CorpusId": 58799627}, "corpusId": 58799627, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/eb896c33e390b7b3c2b560b94387772840074157", "title": "An attempt to unify the constituent concepts of serial program execution : Paper symposium symbolic language in data processing, rome 1962", "abstract": null, "venue": "", "year": 1962, "referenceCount": 0, "citationCount": 2, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "1-18", "name": ""}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}]}, {"paperId": "f4278965ed963b8ee12c60d12074db083655e21e", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "1-18", "name": ""}, "authors": [{"authorId": "3234559", + "name": "E. Dijkstra"}]}, {"paperId": "f4278965ed963b8ee12c60d12074db083655e21e", "externalIds": {"DBLP": "conf/ifip/Dijkstra62", "MAG": "2120247779", "DOI": - "10.1145/3544585.3544602", "CorpusId": 44538990}, "url": "https://www.semanticscholar.org/paper/f4278965ed963b8ee12c60d12074db083655e21e", + "10.1145/3544585.3544602", "CorpusId": 44538990}, "corpusId": 44538990, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f4278965ed963b8ee12c60d12074db083655e21e", "title": "Some Meditations on Advanced Programming", "abstract": "inclined, nor entitled to do so. My title already indicates that I am going to meditate on the subject, which is something quite different from giving a survey. Perhaps @@ -3175,36 +3534,41 @@ interactions: put, the programs that have resulted from them, as for what these activities can teach us. If I am willing to study them, to meditate upon them, I am willing to do", "venue": "IFIP Congress", "year": 2022, "referenceCount": 0, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": + 13, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ir.cwi.nl/pub/9531/9531D.pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Review"], "publicationDate": "2022-07-12", "journal": {"name": "Edsger Wybe Dijkstra"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "00b4f2e51a43c17d8c8ce2a00be4231c95aff2ce", - "externalIds": {"MAG": "195656362", "CorpusId": 60332505}, "url": "https://www.semanticscholar.org/paper/00b4f2e51a43c17d8c8ce2a00be4231c95aff2ce", + "externalIds": {"MAG": "195656362", "CorpusId": 60332505}, "corpusId": 60332505, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/00b4f2e51a43c17d8c8ce2a00be4231c95aff2ce", "title": "Remark concerning the definition of comments", "abstract": "A make-up brush, in particular an eyelash brush, includes a bellows or longitudinally slit sleeve defining bristles and adapted to be varied in diameter, by variation in length, so as to suit the wishes of a user or the properties of a make-up product to be applied.", "venue": "", "year": 1961, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1961-04-24", "journal": {"volume": - "", "pages": "1-1", "name": "ALGOL Bulletin"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "394d23f95fc80088700873fe7210729a4435c488", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1961-04-24", + "journal": {"volume": "", "pages": "1-1", "name": "ALGOL Bulletin"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "394d23f95fc80088700873fe7210729a4435c488", "externalIds": {"MAG": "1998981209", "DOI": "10.1016/S0066-4138(63)80003-8", - "CorpusId": 62677233}, "url": "https://www.semanticscholar.org/paper/394d23f95fc80088700873fe7210729a4435c488", + "CorpusId": 62677233}, "corpusId": 62677233, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/394d23f95fc80088700873fe7210729a4435c488", "title": "On the design of machine independent programming languages", "abstract": null, "venue": "", "year": 1961, "referenceCount": 0, "citationCount": 22, - "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://ir.cwi.nl/pub/9252/9252D.pdf", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "3", "pages": "27-42", "name": "Annual Review of Automatic Programming"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "5815cd5a1d8c358eaa5d8c3b02f677933114ffb0", "externalIds": {"DBLP": "journals/cacm/Dijkstra61", "MAG": "2015450592", "DOI": - "10.1145/366813.366844", "CorpusId": 34185299}, "url": "https://www.semanticscholar.org/paper/5815cd5a1d8c358eaa5d8c3b02f677933114ffb0", + "10.1145/366813.366844", "CorpusId": 34185299}, "corpusId": 34185299, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5815cd5a1d8c358eaa5d8c3b02f677933114ffb0", "title": "Letter to the editor: defense of ALGOL 60", "abstract": "objec.t program. If necessary, a r r a y sizes can be varied b y re-compiling. 5.3 SwvrcH DECLAaATIOXS The elements of a switch list, m a y only be labels, 5.4 @@ -3231,13 +3595,14 @@ interactions: I fully agree with these three gentlemen, that the example quoted from an article by I)r. Peter Naur is not vmT \u2026", "venue": "CACM", "year": 1961, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1961-11-01", "journal": {"volume": "4", "pages": "502-503", "name": "Commun. ACM"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "ed6731c454d7dc7bcbe18f87e06952e726d76c66", "externalIds": {"MAG": "1514122310", - "CorpusId": 61097740}, "url": "https://www.semanticscholar.org/paper/ed6731c454d7dc7bcbe18f87e06952e726d76c66", + "CorpusId": 61097740}, "corpusId": 61097740, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ed6731c454d7dc7bcbe18f87e06952e726d76c66", "title": "Example demonstrating the importance of evaluating the primaries in a fixed order", "abstract": "A make-up powder receptacle includes first and second compartments intercommunicated by a passage to allow transfer of @@ -3246,42 +3611,51 @@ interactions: it to receive an applicator or a stopper, and the first compartment has a filling hole closed by a substantially irremovable plug.", "venue": "", "year": 1961, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1961-04-24", - "journal": {"volume": "", "pages": "1-1", "name": "ALGOL Bulletin"}, "authors": - [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "ee864ef0530fc90081aedc1d87d3620ee8288989", - "externalIds": {"MAG": "1541421582", "CorpusId": 60876857}, "url": "https://www.semanticscholar.org/paper/ee864ef0530fc90081aedc1d87d3620ee8288989", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1961-04-24", "journal": {"volume": "", "pages": + "1-1", "name": "ALGOL Bulletin"}, "authors": [{"authorId": "3234559", "name": + "E. Dijkstra"}]}, {"paperId": "ee864ef0530fc90081aedc1d87d3620ee8288989", + "externalIds": {"MAG": "1541421582", "CorpusId": 60876857}, "corpusId": 60876857, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ee864ef0530fc90081aedc1d87d3620ee8288989", "title": "Algol 60 translation : An algol 60 translator for the x1 and making a translator for algol 60", "abstract": null, "venue": "", "year": 1961, "referenceCount": 0, "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "1-31", "name": ""}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "b285b6a48cc589923602d644db720a180f9bced0", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "1-31", "name": ""}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "b285b6a48cc589923602d644db720a180f9bced0", "externalIds": {"MAG": "345818095", "DOI": "10.1016/S1385-7258(60)50026-6", - "CorpusId": 118772726}, "url": "https://www.semanticscholar.org/paper/b285b6a48cc589923602d644db720a180f9bced0", + "CorpusId": 118772726}, "corpusId": 118772726, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b285b6a48cc589923602d644db720a180f9bced0", "title": "Some theorems on spanning subtrees of a graph : (proceedings knaw series a, _6_3(1960), nr 2, indagationes mathematicae, _2_2(1960), p 196-199)", "abstract": null, "venue": "", "year": 1960, "referenceCount": 2, "citationCount": - 20, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "1-4", "name": - ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": - "c282c4c041adf6c70ea5f6df106b0bfe030738b7", "externalIds": {"MAG": "1586813722", - "CorpusId": 60602305}, "url": "https://www.semanticscholar.org/paper/c282c4c041adf6c70ea5f6df106b0bfe030738b7", + 20, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "1-4", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. + Dijkstra"}]}, {"paperId": "c282c4c041adf6c70ea5f6df106b0bfe030738b7", "externalIds": + {"MAG": "1586813722", "CorpusId": 60602305}, "corpusId": 60602305, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c282c4c041adf6c70ea5f6df106b0bfe030738b7", "title": "Cursus programmeren in algol 60", "abstract": null, "venue": "", "year": 1960, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "1-68", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "45786063578e814444b8247028970758bbbd0488", - "externalIds": {"DBLP": "journals/nm/Dijkstra59", "MAG": "2169528473", "DOI": - "10.1145/3544585.3544600", "CorpusId": 123284777}, "url": "https://www.semanticscholar.org/paper/45786063578e814444b8247028970758bbbd0488", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "pages": "1-68", "name": + ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": + "45786063578e814444b8247028970758bbbd0488", "externalIds": {"DBLP": "journals/nm/Dijkstra59", + "MAG": "2169528473", "DOI": "10.1145/3544585.3544600", "CorpusId": 123284777}, + "corpusId": 123284777, "publicationVenue": {"id": "23ed2049-ad4e-4e12-8e48-a4e55bc4e377", + "name": "Numerische Mathematik", "type": "journal", "alternate_names": ["Numer + Math"], "issn": "0029-599X", "url": "http://www.springer.com/mathematics/numerical+and+computational+mathematics/journal/211", + "alternate_urls": ["http://www.digizeitschriften.de/main/dms/toc/?PPN=PPN362160546", + "https://link.springer.com/journal/211"]}, "url": "https://www.semanticscholar.org/paper/45786063578e814444b8247028970758bbbd0488", "title": "A note on two problems in connexion with graphs", "abstract": "We consider n points (nodes), some or all pairs of which are connected by a branch; the length of each branch is given. We restrict ourselves to the case where @@ -3300,36 +3674,39 @@ interactions: From then onwards we perform the following two steps repeatedly. Step 1. The shortest branch of set II is removed from this set and added to", "venue": "Numerische Mathematik", "year": 1959, "referenceCount": 5, "citationCount": - 22813, "influentialCitationCount": 1169, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book"], "publicationDate": "1959-12-01", "journal": {"volume": "1", "pages": - "269-271", "name": "Numerische Mathematik"}, "authors": [{"authorId": "3234559", - "name": "E. Dijkstra"}]}, {"paperId": "c0db4cc151a98700516e11a944b509491d1a15e0", + 22826, "influentialCitationCount": 1170, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www-m3.ma.tum.de/foswiki/pub/MN0506/WebHome/dijkstra.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Book"], "publicationDate": "1959-12-01", "journal": {"volume": + "1", "pages": "269-271", "name": "Numerische Mathematik"}, "authors": [{"authorId": + "3234559", "name": "E. Dijkstra"}]}, {"paperId": "c0db4cc151a98700516e11a944b509491d1a15e0", "externalIds": {"DBLP": "phd/Dijkstra59", "MAG": "1513030471", "CorpusId": - 27265446}, "url": "https://www.semanticscholar.org/paper/c0db4cc151a98700516e11a944b509491d1a15e0", + 27265446}, "corpusId": 27265446, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c0db4cc151a98700516e11a944b509491d1a15e0", "title": "Communication with an Automatic Computer", "abstract": null, "venue": - "", "year": 1959, "referenceCount": 0, "citationCount": 26, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1959-10-28", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "3234559", "name": "E. Dijkstra"}]}, {"paperId": "cfdb4c1c0f074ba365820217ed6e94f3c575e901", - "externalIds": {"DBLP": "journals/cacm/DijkstraHPS59", "CorpusId": 13546077}, - "url": "https://www.semanticscholar.org/paper/cfdb4c1c0f074ba365820217ed6e94f3c575e901", + "", "year": 1959, "referenceCount": 0, "citationCount": 27, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1959-10-28", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, + {"paperId": "cfdb4c1c0f074ba365820217ed6e94f3c575e901", "externalIds": {"DBLP": + "journals/cacm/DijkstraHPS59", "CorpusId": 13546077}, "corpusId": 13546077, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cfdb4c1c0f074ba365820217ed6e94f3c575e901", "title": "ALGOL Sub-Committee Report - Extensions", "abstract": null, "venue": "Commun. ACM", "year": 1959, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"volume": "2", "pages": - "24", "name": "Commun. ACM"}, "authors": [{"authorId": "3234559", "name": - "E. Dijkstra"}, {"authorId": "52516847", "name": "W. Heise"}, {"authorId": - "1790022", "name": "A. Perlis"}, {"authorId": "3261977", "name": "K. Samelson"}]}, - {"paperId": "0b64498e07630ccf5053e483444b2f5886cc98bc", "externalIds": {"MAG": - "2562795858", "DOI": "10.1090/S0025-5718-1957-0090604-3", "CorpusId": 120228582}, - "url": "https://www.semanticscholar.org/paper/0b64498e07630ccf5053e483444b2f5886cc98bc", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, + "journal": {"volume": "2", "pages": "24", "name": "Commun. ACM"}, "authors": + [{"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "52516847", + "name": "W. Heise"}, {"authorId": "1790022", "name": "A. Perlis"}, {"authorId": + "3261977", "name": "K. Samelson"}]}, {"paperId": "0b64498e07630ccf5053e483444b2f5886cc98bc", + "externalIds": {"MAG": "2562795858", "DOI": "10.1090/S0025-5718-1957-0090604-3", + "CorpusId": 120228582}, "corpusId": 120228582, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0b64498e07630ccf5053e483444b2f5886cc98bc", "title": "A method to investigate primality", "abstract": "The method determines the smallest odd prime factor of a number N by testing the remainders left after division by the successive odd numbers 3,5, \u2022 \u2022 \u2022 /m @@ -3337,92 +3714,102 @@ interactions: of these remainders vanishes, N is a prime number. Let / be one of the odd trial divisors. Remainder ro and quotient go are defined by the relations N = r0 + fqo, 0 < r0 < /.", "venue": "", "year": 1957, "referenceCount": 1, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ir.cwi.nl/pub/7370/7370D.pdf", "status": null}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1957-09-01", "journal": {"volume": "11", "pages": "195-196", "name": "Mathematics of Computation"}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "1396b4c3daaf6415b9f1ff81e54d4e420ba125ee", - "externalIds": {"MAG": "2149749867", "CorpusId": 121975279}, "url": "https://www.semanticscholar.org/paper/1396b4c3daaf6415b9f1ff81e54d4e420ba125ee", + "externalIds": {"MAG": "2149749867", "CorpusId": 121975279}, "corpusId": 121975279, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1396b4c3daaf6415b9f1ff81e54d4e420ba125ee", "title": "A method to investigate primality : (mathematical tables and other aids to computation, _1_1(1957), p 195-196)", "abstract": null, "venue": "", "year": 1957, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "1-2", "name": ""}, "authors": [{"authorId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "1-2", "name": ""}, "authors": [{"authorId": "3234559", "name": "E. Dijkstra"}]}, {"paperId": "0997fbd8f2678cc1fc205a786f21de8602ef9b03", - "externalIds": {"MAG": "2124257918", "CorpusId": 123472731}, "url": "https://www.semanticscholar.org/paper/0997fbd8f2678cc1fc205a786f21de8602ef9b03", + "externalIds": {"MAG": "2124257918", "CorpusId": 123472731}, "corpusId": 123472731, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0997fbd8f2678cc1fc205a786f21de8602ef9b03", "title": "Table of Everett''s interpolation coefficients", "abstract": null, "venue": "", "year": 1955, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "70178046", "name": "Mathematisch + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "70178046", "name": "Mathematisch Centrum"}, {"authorId": "3234559", "name": "E. Dijkstra"}, {"authorId": "8674722", "name": "A. V. Wijngaarden"}]}]}, {"authorId": "1726629", "externalIds": {}, "url": "https://www.semanticscholar.org/author/1726629", "name": "D. Parnas", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 0, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "7879e540c7bca8fbaae8069652dad6a6d9ab4877", "externalIds": {"MAG": "3203949752", "DOI": "10.4230/DAGSEMREP.178", "CorpusId": - 244343504}, "url": "https://www.semanticscholar.org/paper/7879e540c7bca8fbaae8069652dad6a6d9ab4877", + 244343504}, "corpusId": 244343504, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7879e540c7bca8fbaae8069652dad6a6d9ab4877", "title": "Practical Methods for Code Documentation and Inspection (Dagstuhl Seminar 9720)", "abstract": null, "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "20", "name": ""}, "authors": [{"authorId": "1692943", - "name": "E. B\u00f6rger"}, {"authorId": "2697703", "name": "P. Joannou"}, - {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ab5f90eda19f3f992440f425cda16ee14dd0092e", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "20", "name": ""}, "authors": [{"authorId": + "1692943", "name": "E. B\u00f6rger"}, {"authorId": "2697703", "name": "P. + Joannou"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ab5f90eda19f3f992440f425cda16ee14dd0092e", "externalIds": {"MAG": "3206775315", "DOI": "10.4230/DAGSEMREP.242", "CorpusId": - 244627408}, "url": "https://www.semanticscholar.org/paper/ab5f90eda19f3f992440f425cda16ee14dd0092e", + 244627408}, "corpusId": 244627408, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ab5f90eda19f3f992440f425cda16ee14dd0092e", "title": "Requirements Capture, Documentation and Validation (Dagstuhl Seminar 99241)", "abstract": null, "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "31", "name": ""}, "authors": [{"authorId": "1692943", - "name": "E. B\u00f6rger"}, {"authorId": "2080250488", "name": "B. H\u00f6rger"}, - {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "67346049", "name": - "D. Rombach"}]}, {"paperId": "b017503821d4481e1e7ccfecad31ba2bc86e8986", "externalIds": - {"MAG": "3201991956", "DOI": "10.4230/DAGSEMREP.352", "CorpusId": 244337833}, - "url": "https://www.semanticscholar.org/paper/b017503821d4481e1e7ccfecad31ba2bc86e8986", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "31", "name": ""}, "authors": [{"authorId": + "1692943", "name": "E. B\u00f6rger"}, {"authorId": "2080250488", "name": "B. + H\u00f6rger"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "67346049", "name": "D. Rombach"}]}, {"paperId": "b017503821d4481e1e7ccfecad31ba2bc86e8986", + "externalIds": {"MAG": "3201991956", "DOI": "10.4230/DAGSEMREP.352", "CorpusId": + 244337833}, "corpusId": 244337833, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b017503821d4481e1e7ccfecad31ba2bc86e8986", "title": "Supporting Customer-Supplier Relationships: Requirements Engineering and Quality Assurance (Dagstuhl Seminar 02361)", "abstract": null, "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "22", "name": ""}, "authors": [{"authorId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "22", "name": ""}, "authors": [{"authorId": "1807426", "name": "B. Paech"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1753601", "name": "J. Poore"}, {"authorId": "145857323", "name": "H. D. Rombach"}, {"authorId": "2098640397", "name": "Rudolf van Megen"}]}, {"paperId": "e7986f1b5c3bc3949ff691f965945bfd98d07d0f", "externalIds": {"DBLP": "journals/computer/Parnas21", "DOI": "10.1109/MC.2021.3057685", "CorpusId": - 234753224}, "url": "https://www.semanticscholar.org/paper/e7986f1b5c3bc3949ff691f965945bfd98d07d0f", + 234753224}, "corpusId": 234753224, "publicationVenue": {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", + "name": "Computer", "type": "journal", "alternate_names": ["IEEE Computer", + "IEEE Comput"], "issn": "0018-9162", "url": "http://www.computer.org/computer", + "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/e7986f1b5c3bc3949ff691f965945bfd98d07d0f", "title": "Software Engineering: A Profession in Waiting", "abstract": null, "venue": "Computer", "year": 2021, "referenceCount": 0, "citationCount": 2, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-01", "journal": - {"volume": "54", "pages": "62-64", "name": "Computer"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "e7c799ede2aef83382583ed48a06a594e00e47a2", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://ieeexplore.ieee.org/ielx7/2/9426969/09427127.pdf", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-05-01", "journal": {"volume": "54", "pages": "62-64", "name": "Computer"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "e7c799ede2aef83382583ed48a06a594e00e47a2", "externalIds": {"MAG": "3206675231", "DOI": "10.4230/DAGSEMREP.230", "CorpusId": - 244597873}, "url": "https://www.semanticscholar.org/paper/e7c799ede2aef83382583ed48a06a594e00e47a2", + 244597873}, "corpusId": 244597873, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e7c799ede2aef83382583ed48a06a594e00e47a2", "title": "Software Engineering Research and Education: Seeking a new Agenda (Dagstuhl Seminar 99071)", "abstract": null, "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "56", "name": ""}, "authors": [{"authorId": - "2725352", "name": "E. Denert"}, {"authorId": "2005204566", "name": "Danie - Hoffman"}, {"authorId": "52066552", "name": "J. Ludewig"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "334e3146a98b631903b4d9e62b2ae07af25b5fb8", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "pages": "56", "name": + ""}, "authors": [{"authorId": "2725352", "name": "E. Denert"}, {"authorId": + "2005204566", "name": "Danie Hoffman"}, {"authorId": "52066552", "name": "J. + Ludewig"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "334e3146a98b631903b4d9e62b2ae07af25b5fb8", "externalIds": {"MAG": "2903422878", "DBLP": "journals/software/Parnas18", - "DOI": "10.1109/MS.2018.4321239", "CorpusId": 54578878}, "url": "https://www.semanticscholar.org/paper/334e3146a98b631903b4d9e62b2ae07af25b5fb8", + "DOI": "10.1109/MS.2018.4321239", "CorpusId": 54578878}, "corpusId": 54578878, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/334e3146a98b631903b4d9e62b2ae07af25b5fb8", "title": "Software Structures: A Careful Look", "abstract": "In the half century since Edsger Dijkstra published \u201cThe Structure of the \u2018THE\u2019-Multiprogramming System,\u201d it has become clear that the ability to design a software system\u2019s @@ -3435,13 +3822,14 @@ interactions: has led many to confuse those structures. This article aims to clarify what those structures are, their differences, and each one\u2019s importance.", "venue": "IEEE Softw.", "year": 2018, "referenceCount": 2, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2018-11-29", "journal": - {"volume": "35", "pages": "68-71", "name": "IEEE Softw."}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "7f87dac98947a7a6e934dc9f16ad10ce402aa5b6", - "externalIds": {"CorpusId": 145026115}, "url": "https://www.semanticscholar.org/paper/7f87dac98947a7a6e934dc9f16ad10ce402aa5b6", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2018-11-29", "journal": {"volume": "35", "pages": "68-71", "name": "IEEE + Softw."}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "7f87dac98947a7a6e934dc9f16ad10ce402aa5b6", "externalIds": {"CorpusId": 145026115}, + "corpusId": 145026115, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f87dac98947a7a6e934dc9f16ad10ce402aa5b6", "title": "Inside Risks The Real Risks of Artificial Intelligence Incidents from the early days of", "abstract": "An Early Introduction to AI As a student at Carnegie Mellon University (CMU), I learned about \u201cartificial intelligence\u201d @@ -3460,66 +3848,83 @@ interactions: brain function. However, as illustrated by Joseph Weizenbaum, a model may duplicate the \u201cblackbox\u201d behavior of some mechanism without describing that mechanism.", "venue": "", "year": 2017, "referenceCount": 5, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ae75742763603f8200a5d1b280438c9acf0058b5", - "externalIds": {"MAG": "2760508920", "DBLP": "journals/cacm/Parnas17", "DOI": - "10.1145/3132724", "CorpusId": 207681899}, "url": "https://www.semanticscholar.org/paper/ae75742763603f8200a5d1b280438c9acf0058b5", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "ae75742763603f8200a5d1b280438c9acf0058b5", "externalIds": {"MAG": + "2760508920", "DBLP": "journals/cacm/Parnas17", "DOI": "10.1145/3132724", + "CorpusId": 207681899}, "corpusId": 207681899, "publicationVenue": {"id": + "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", "name": "Communications of the ACM", + "type": "journal", "alternate_names": ["Commun ACM", "Communications of The + ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", "alternate_urls": + ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/ae75742763603f8200a5d1b280438c9acf0058b5", "title": "The real risks of artificial intelligence", "abstract": "Incidents from the early days of AI research are instructive in the current AI environment.", "venue": "Communications of the ACM", "year": 2017, "referenceCount": 2, "citationCount": - 62, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2017-09-25", "journal": - {"volume": "60", "pages": "27 - 31", "name": "Communications of the ACM"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "fbe5b46f85bac49fed66189d6dba8264902aef67", - "externalIds": {"MAG": "2564557565", "DBLP": "journals/jss/LandwehrLMPSWWW17", - "DOI": "10.1016/j.jss.2016.12.016", "CorpusId": 206541692}, "url": "https://www.semanticscholar.org/paper/fbe5b46f85bac49fed66189d6dba8264902aef67", + 62, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2017-09-25", "journal": {"volume": "60", "pages": "27 - 31", "name": "Communications + of the ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "fbe5b46f85bac49fed66189d6dba8264902aef67", "externalIds": {"MAG": + "2564557565", "DBLP": "journals/jss/LandwehrLMPSWWW17", "DOI": "10.1016/j.jss.2016.12.016", + "CorpusId": 206541692}, "corpusId": 206541692, "publicationVenue": {"id": + "10a4a695-8417-42c7-983d-742df48b3905", "name": "Journal of Systems and Software", + "type": "journal", "alternate_names": ["J Syst Softw"], "issn": "0164-1212", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description#description", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description", + "http://www.sciencedirect.com/science/journal/01641212"]}, "url": "https://www.semanticscholar.org/paper/fbe5b46f85bac49fed66189d6dba8264902aef67", "title": "Software Systems Engineering programmes a capability approach", "abstract": null, "venue": "Journal of Systems and Software", "year": 2017, "referenceCount": 14, "citationCount": 12, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-03-01", "journal": {"volume": "125", "pages": "354-364", "name": "J. - Syst. Softw."}, "authors": [{"authorId": "1774005", "name": "C. Landwehr"}, - {"authorId": "52066552", "name": "J. Ludewig"}, {"authorId": "1733861", "name": - "R. Meersman"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-03-01", "journal": {"volume": "125", "pages": "354-364", + "name": "J. Syst. Softw."}, "authors": [{"authorId": "1774005", "name": "C. + Landwehr"}, {"authorId": "52066552", "name": "J. Ludewig"}, {"authorId": "1733861", + "name": "R. Meersman"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1753089", "name": "P. Shoval"}, {"authorId": "145520047", "name": "Y. Wand"}, {"authorId": "1773783", "name": "D. Weiss"}, {"authorId": "1739966", "name": - "E. Weyuker"}]}, {"paperId": "85b0da435cd2fac5d75bd11c85de57a6e6146c1d", "externalIds": + "E. Weyuker"}]}, {"paperId": "1e9bf74e8245dd5a43eb14ddeaea5a569a591f46", "externalIds": {"MAG": "2169071419", "DBLP": "journals/fcsc/Parnas12", "DOI": "10.1007/s11704-012-2904-2", - "CorpusId": 3416081}, "url": "https://www.semanticscholar.org/paper/85b0da435cd2fac5d75bd11c85de57a6e6146c1d", + "CorpusId": 3416081}, "corpusId": 3416081, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1e9bf74e8245dd5a43eb14ddeaea5a569a591f46", "title": "The use of mathematics in software quality assurance", "abstract": null, "venue": "Frontiers of Computer Science", "year": 2012, "referenceCount": - 34, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-02-01", "journal": {"volume": "6", "pages": "3-16", "name": "Frontiers - of Computer Science"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "16d27d415da2c68c7d3b469e609a3dde92e71a70", "externalIds": {"MAG": - "1867246232", "DBLP": "conf/birthday/Parnas11", "DOI": "10.1007/978-3-642-24541-1_31", - "CorpusId": 21770450}, "url": "https://www.semanticscholar.org/paper/16d27d415da2c68c7d3b469e609a3dde92e71a70", + 31, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-02-01", "journal": {"volume": "6", "pages": "3-16", + "name": "Frontiers of Computer Science"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "16d27d415da2c68c7d3b469e609a3dde92e71a70", + "externalIds": {"MAG": "1867246232", "DBLP": "conf/birthday/Parnas11", "DOI": + "10.1007/978-3-642-24541-1_31", "CorpusId": 21770450}, "corpusId": 21770450, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/16d27d415da2c68c7d3b469e609a3dde92e71a70", "title": "Software Engineering: Multi-person Development of Multi-version Programs", "abstract": null, "venue": "Dependable and Historic Computing", "year": 2011, "referenceCount": 32, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "413-427"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "5e22d7b96f13e95db49198fdbc65a61535d11c1f", - "externalIds": {"MAG": "2523690042", "CorpusId": 63992353}, "url": "https://www.semanticscholar.org/paper/5e22d7b96f13e95db49198fdbc65a61535d11c1f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "413-427"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "5e22d7b96f13e95db49198fdbc65a61535d11c1f", "externalIds": {"MAG": + "2523690042", "CorpusId": 63992353}, "corpusId": 63992353, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5e22d7b96f13e95db49198fdbc65a61535d11c1f", "title": "Inside Risks The Risks of Stopping Too Soon", "abstract": null, "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "54", "pages": "31-33", - "name": "Communications of The ACM"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "793bec9a209abc3e4da6283554a6ceb95c8d1a4a", - "externalIds": {"CorpusId": 17931663}, "url": "https://www.semanticscholar.org/paper/793bec9a209abc3e4da6283554a6ceb95c8d1a4a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": + "54", "pages": "31-33", "name": "Communications of The ACM"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "793bec9a209abc3e4da6283554a6ceb95c8d1a4a", + "externalIds": {"CorpusId": 17931663}, "corpusId": 17931663, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/793bec9a209abc3e4da6283554a6ceb95c8d1a4a", "title": "How Engineering Mathematics can Improve Software", "abstract": "Abstract For many decades computer science researchers have promised that the \"Formal Methods\" developed by computer scientists would bring about a drastic improvement @@ -3605,19 +4010,25 @@ interactions: industry would clamour to use it. Middle Road Software, Inc. David Lorge Parnas 6/45 worldcomp slides Role of Mathematics In Engineering", "venue": "", "year": 2011, "referenceCount": 1, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": null, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "800c23c319d960de75519dfec0c03468f9cc70f8", - "externalIds": {"MAG": "2183791192", "CorpusId": 57872326}, "url": "https://www.semanticscholar.org/paper/800c23c319d960de75519dfec0c03468f9cc70f8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "800c23c319d960de75519dfec0c03468f9cc70f8", + "externalIds": {"MAG": "2183791192", "CorpusId": 57872326}, "corpusId": 57872326, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/800c23c319d960de75519dfec0c03468f9cc70f8", "title": "Software Missing in Action: A Personal", "abstract": null, "venue": "", "year": 2011, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "932ce84dc11c63cfdcc8f4f4cb54890de0a388e1", - "externalIds": {"MAG": "2166956498", "DBLP": "journals/tse/FengPTO11", "DOI": - "10.1109/TSE.2011.78", "CorpusId": 6215481}, "url": "https://www.semanticscholar.org/paper/932ce84dc11c63cfdcc8f4f4cb54890de0a388e1", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. + Parnas"}]}, {"paperId": "932ce84dc11c63cfdcc8f4f4cb54890de0a388e1", "externalIds": + {"MAG": "2166956498", "DBLP": "journals/tse/FengPTO11", "DOI": "10.1109/TSE.2011.78", + "CorpusId": 6215481}, "corpusId": 6215481, "publicationVenue": {"id": "c99cfe66-b71c-4ca4-bedd-26267b9cb068", + "name": "IEEE Transactions on Software Engineering", "type": "journal", "alternate_names": + ["IEEE Trans Softw Eng"], "issn": "0098-5589", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=32", + "alternate_urls": ["http://www.computer.org/portal/web/tse/about"]}, "url": + "https://www.semanticscholar.org/paper/932ce84dc11c63cfdcc8f4f4cb54890de0a388e1", "title": "A Comparison of Tabular Expression-Based Testing Strategies", "abstract": "Tabular expressions have been proposed as a notation to document mathematically precise but readable software specifications. One of the many roles of such @@ -3631,97 +4042,122 @@ interactions: appropriate testing strategies for tabular expression-based specifications.", "venue": "IEEE Transactions on Software Engineering", "year": 2011, "referenceCount": 51, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2011-09-01", "journal": {"volume": "37", "pages": "616-634", "name": "IEEE - Transactions on Software Engineering"}, "authors": [{"authorId": "2112639112", - "name": "X. Feng"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "144301499", "name": "T. Tse"}, {"authorId": "1405776197", "name": "T. O''Callaghan"}]}, - {"paperId": "995b61ee97dd6a190a52d50d921dca1b2ec254e3", "externalIds": {"DBLP": - "conf/ictac/Parnas11", "MAG": "1947630568", "DOI": "10.1007/978-3-642-23283-1_2", - "CorpusId": 38448852}, "url": "https://www.semanticscholar.org/paper/995b61ee97dd6a190a52d50d921dca1b2ec254e3", + "openAccessPdf": {"url": "http://hub.hku.hk/bitstream/10722/142946/1/Content.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2011-09-01", "journal": {"volume": "37", "pages": "616-634", + "name": "IEEE Transactions on Software Engineering"}, "authors": [{"authorId": + "2112639112", "name": "X. Feng"}, {"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "144301499", "name": "T. Tse"}, {"authorId": "1405776197", "name": + "T. O''Callaghan"}]}, {"paperId": "995b61ee97dd6a190a52d50d921dca1b2ec254e3", + "externalIds": {"DBLP": "conf/ictac/Parnas11", "MAG": "1947630568", "DOI": + "10.1007/978-3-642-23283-1_2", "CorpusId": 38448852}, "corpusId": 38448852, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/995b61ee97dd6a190a52d50d921dca1b2ec254e3", "title": "The Use of Mathematics in Software Development - (Extended Abstract)", "abstract": null, "venue": "ICTAC", "year": 2011, "referenceCount": 2, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-08-31", "journal": - {"pages": "4-5"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "af6d86237a27b5027dcc3cc0c58cf19a7be2ef0d", "externalIds": {"DBLP": - "journals/cacm/Parnas11", "MAG": "2106780706", "DOI": "10.1145/1953122.1953136", - "CorpusId": 20420586}, "url": "https://www.semanticscholar.org/paper/af6d86237a27b5027dcc3cc0c58cf19a7be2ef0d", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-08-31", "journal": {"pages": "4-5"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "af6d86237a27b5027dcc3cc0c58cf19a7be2ef0d", + "externalIds": {"DBLP": "journals/cacm/Parnas11", "MAG": "2106780706", "DOI": + "10.1145/1953122.1953136", "CorpusId": 20420586}, "corpusId": 20420586, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/af6d86237a27b5027dcc3cc0c58cf19a7be2ef0d", "title": "The risks of stopping too soon", "abstract": "Good software design is never easy, but stopping too soon makes the job more difficult.", "venue": "Commun. ACM", "year": 2011, "referenceCount": 9, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2011-06-01", "journal": {"volume": "54", "pages": "31 - 33", "name": "Communications - of the ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "f647d3a76c4136ddd85bb32d507d44b18404d6a9", "externalIds": {"MAG": - "2047482557", "DBLP": "journals/computer/Parnas11", "DOI": "10.1109/MC.2011.268", - "CorpusId": 40215852}, "url": "https://www.semanticscholar.org/paper/f647d3a76c4136ddd85bb32d507d44b18404d6a9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2011-06-01", "journal": {"volume": + "54", "pages": "31 - 33", "name": "Communications of the ACM"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "f647d3a76c4136ddd85bb32d507d44b18404d6a9", + "externalIds": {"MAG": "2047482557", "DBLP": "journals/computer/Parnas11", + "DOI": "10.1109/MC.2011.268", "CorpusId": 40215852}, "corpusId": 40215852, + "publicationVenue": {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", "name": + "Computer", "type": "journal", "alternate_names": ["IEEE Computer", "IEEE + Comput"], "issn": "0018-9162", "url": "http://www.computer.org/computer", + "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/f647d3a76c4136ddd85bb32d507d44b18404d6a9", "title": "Software Engineering - Missing in Action: A Personal Perspective", "abstract": "Although a huge number of articles have been written about software development and many interesting ideas have been proposed, researchers and practitioners have failed to create a new engineering discipline focused on building software-intensive systems.", "venue": "Computer", "year": 2011, "referenceCount": 12, "citationCount": 13, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-10-01", "journal": {"volume": "44", "pages": "54-58", - "name": "Computer"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "1567ea5b6f0c6b44b03c3f9073c55dd4907e18dd", "externalIds": {"DBLP": - "journals/kbs/Chik-ParnasDP10", "MAG": "2038970222", "DOI": "10.1016/j.knosys.2010.02.007", - "CorpusId": 42386812}, "url": "https://www.semanticscholar.org/paper/1567ea5b6f0c6b44b03c3f9073c55dd4907e18dd", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-10-01", "journal": + {"volume": "44", "pages": "54-58", "name": "Computer"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "1567ea5b6f0c6b44b03c3f9073c55dd4907e18dd", + "externalIds": {"DBLP": "journals/kbs/Chik-ParnasDP10", "MAG": "2038970222", + "DOI": "10.1016/j.knosys.2010.02.007", "CorpusId": 42386812}, "corpusId": + 42386812, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1567ea5b6f0c6b44b03c3f9073c55dd4907e18dd", "title": "A family of computer systems for delivering individualized advice", "abstract": null, "venue": "Knowl. Based Syst.", "year": 2010, "referenceCount": 8, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-10-01", "journal": {"volume": "23", "pages": "645-666", "name": "Knowl. - Based Syst."}, "authors": [{"authorId": "1403157705", "name": "Lillian Chik-Parnas"}, - {"authorId": "1801518", "name": "M. Dragomiroiu"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "195eed278ab83afd4b1cab799e5917c5c66d5557", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-10-01", "journal": {"volume": "23", "pages": "645-666", + "name": "Knowl. Based Syst."}, "authors": [{"authorId": "1403157705", "name": + "Lillian Chik-Parnas"}, {"authorId": "1801518", "name": "M. Dragomiroiu"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "195eed278ab83afd4b1cab799e5917c5c66d5557", "externalIds": {"DBLP": "journals/fcsc/LiuPT10", "MAG": "2044496112", "DOI": - "10.1007/s11704-010-0026-2", "CorpusId": 3411942}, "url": "https://www.semanticscholar.org/paper/195eed278ab83afd4b1cab799e5917c5c66d5557", + "10.1007/s11704-010-0026-2", "CorpusId": 3411942}, "corpusId": 3411942, "publicationVenue": + {"id": "259bd1ed-c25b-4334-bd7b-6afea557ca1d", "name": "Frontiers of Computer + Science in China", "type": "journal", "alternate_names": ["Frontiers of Computer + Science", "Front Comput Sci", "Front Comput Sci China"], "issn": "1673-7350", + "url": "https://link.springer.com/journal/11704"}, "url": "https://www.semanticscholar.org/paper/195eed278ab83afd4b1cab799e5917c5c66d5557", "title": "Documenting and verifying systems assembled from components", "abstract": null, "venue": "Frontiers of Computer Science in China", "year": 2010, "referenceCount": 32, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-05-24", "journal": {"volume": "4", "pages": "151-161", "name": "Frontiers - of Computer Science in China"}, "authors": [{"authorId": "2146374780", "name": - "Zhiying Liu"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "34766161", "name": "B. T. Widemann"}]}, {"paperId": "7277093524014478a6569d82172172f1d09835d1", - "externalIds": {"MAG": "3006095309", "DBLP": "conf/birthday/Parnas10", "DOI": - "10.1007/978-3-642-15187-3_8", "CorpusId": 38934599}, "url": "https://www.semanticscholar.org/paper/7277093524014478a6569d82172172f1d09835d1", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-05-24", "journal": {"volume": "4", "pages": "151-161", + "name": "Frontiers of Computer Science in China"}, "authors": [{"authorId": + "2146374780", "name": "Zhiying Liu"}, {"authorId": "1726629", "name": "D. + Parnas"}, {"authorId": "34766161", "name": "B. T. Widemann"}]}, {"paperId": + "7277093524014478a6569d82172172f1d09835d1", "externalIds": {"MAG": "3006095309", + "DBLP": "conf/birthday/Parnas10", "DOI": "10.1007/978-3-642-15187-3_8", "CorpusId": + 38934599}, "corpusId": 38934599, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7277093524014478a6569d82172172f1d09835d1", "title": "Precise Documentation: The Key to Better Software", "abstract": null, "venue": "The Future of Software Engineering", "year": 2010, "referenceCount": 35, "citationCount": 106, "influentialCitationCount": 10, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": null, "journal": {"pages": "125-148"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "7a2bb23680a9b334f93cd77997ccde95aab31038", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": null, "journal": {"pages": "125-148"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "7a2bb23680a9b334f93cd77997ccde95aab31038", "externalIds": {"MAG": "2169887034", "DBLP": "journals/computer/Parnas10", - "DOI": "10.1109/MC.2010.22", "CorpusId": 15282199}, "url": "https://www.semanticscholar.org/paper/7a2bb23680a9b334f93cd77997ccde95aab31038", + "DOI": "10.1109/MC.2010.22", "CorpusId": 15282199}, "corpusId": 15282199, + "publicationVenue": {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", "name": + "Computer", "type": "journal", "alternate_names": ["IEEE Computer", "IEEE + Comput"], "issn": "0018-9162", "url": "http://www.computer.org/computer", + "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/7a2bb23680a9b334f93cd77997ccde95aab31038", "title": "Really Rethinking ''Formal Methods''", "abstract": "We must question the assumptions underlying the well-known current formal software development methods to see why they have not been widely adopted and what should be changed.", "venue": "Computer", "year": 2010, "referenceCount": 4, "citationCount": 85, - "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"volume": "43", "name": - "Computer"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "8dbab1348a685a7636e9556c9aa8c1fde0956186", "externalIds": {"DBLP": "conf/somet/Parnas10", - "MAG": "205967715", "DOI": "10.3233/978-1-60750-629-4-3", "CorpusId": 32737696}, - "url": "https://www.semanticscholar.org/paper/8dbab1348a685a7636e9556c9aa8c1fde0956186", + "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"volume": "43", "name": "Computer"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "8dbab1348a685a7636e9556c9aa8c1fde0956186", + "externalIds": {"DBLP": "conf/somet/Parnas10", "MAG": "205967715", "DOI": + "10.3233/978-1-60750-629-4-3", "CorpusId": 32737696}, "corpusId": 32737696, + "publicationVenue": {"id": "f294a093-a7c8-422a-9518-837b347650d0", "name": + "New Trends in Software Methodologies, Tools and Techniques", "type": "conference", + "alternate_names": ["New Trends Softw Methodol Tool Tech", "SoMeT"]}, "url": + "https://www.semanticscholar.org/paper/8dbab1348a685a7636e9556c9aa8c1fde0956186", "title": "From Requirements to Architecture", "abstract": "This paper discusses the importance of requirements documents and the reasons that the requirements documentation methods commonly applied in industrial software development @@ -3741,66 +4177,86 @@ interactions: will be clear traceability between code and requirements.", "venue": "New Trends in Software Methodologies, Tools and Techniques", "year": 2010, "referenceCount": 16, "citationCount": 3, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2010-08-06", "journal": {"pages": "3-36"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "c3e765eeaa6b530ff7b8632aa63b310db644bacd", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2010-08-06", "journal": {"pages": "3-36"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "c3e765eeaa6b530ff7b8632aa63b310db644bacd", "externalIds": {"MAG": "2397299369", "DBLP": "conf/seke/ZhuP10", "CorpusId": - 26660509}, "url": "https://www.semanticscholar.org/paper/c3e765eeaa6b530ff7b8632aa63b310db644bacd", + 26660509}, "corpusId": 26660509, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c3e765eeaa6b530ff7b8632aa63b310db644bacd", "title": "A documentation approach for the self-adaptive system design", "abstract": null, "venue": "SEKE", "year": 2010, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "791-796"}, "authors": [{"authorId": "50017678", "name": "Wenhui - Zhu"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "d60d54cf5f9f780842b4522500b9cd5cb295a791", - "externalIds": {"MAG": "2519669288", "CorpusId": 63625793}, "url": "https://www.semanticscholar.org/paper/d60d54cf5f9f780842b4522500b9cd5cb295a791", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "791-796"}, "authors": [{"authorId": "50017678", + "name": "Wenhui Zhu"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "d60d54cf5f9f780842b4522500b9cd5cb295a791", "externalIds": {"MAG": "2519669288", + "CorpusId": 63625793}, "corpusId": 63625793, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d60d54cf5f9f780842b4522500b9cd5cb295a791", "title": "Inside Risks Risks of Undisciplined Development", "abstract": "An illustration of the problems caused by a lack of discipline in software development and our failure to apply what is known in the field.", "venue": "", "year": 2010, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "53", "pages": "25-27", "name": "Communications of The - ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "ec5aa4b33b12501ea9a5eb5b87153569fc061e3c", "externalIds": {"DBLP": "journals/scp/JinP10", - "MAG": "1998099342", "DOI": "10.1016/j.scico.2009.12.009", "CorpusId": 19505085}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "53", "pages": "25-27", + "name": "Communications of The ACM"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "ec5aa4b33b12501ea9a5eb5b87153569fc061e3c", + "externalIds": {"DBLP": "journals/scp/JinP10", "MAG": "1998099342", "DOI": + "10.1016/j.scico.2009.12.009", "CorpusId": 19505085}, "corpusId": 19505085, + "publicationVenue": {"id": "08d68650-8568-4b4f-8c14-1b61ccf55b17", "name": + "Science of Computer Programming", "type": "journal", "alternate_names": ["Sci + Comput Program"], "issn": "0167-6423", "url": "https://www.journals.elsevier.com/science-of-computer-programming", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/01676423"]}, "url": "https://www.semanticscholar.org/paper/ec5aa4b33b12501ea9a5eb5b87153569fc061e3c", "title": "Defining the meaning of tabular mathematical expressions", "abstract": null, "venue": "Science of Computer Programming", "year": 2010, "referenceCount": 32, "citationCount": 39, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-11-01", "journal": {"volume": "75", "pages": "980-1000", "name": "Sci. - Comput. Program."}, "authors": [{"authorId": "2110835855", "name": "Ying Jin"}, - {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "f355428448a0cf30288be1e6b4a06953013740a7", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-11-01", "journal": {"volume": "75", "pages": "980-1000", + "name": "Sci. Comput. Program."}, "authors": [{"authorId": "2110835855", "name": + "Ying Jin"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "f355428448a0cf30288be1e6b4a06953013740a7", "externalIds": {"MAG": "1996356709", "DBLP": "journals/cacm/Parnas10", "DOI": - "10.1145/1831407.1831419", "CorpusId": 860333}, "url": "https://www.semanticscholar.org/paper/f355428448a0cf30288be1e6b4a06953013740a7", + "10.1145/1831407.1831419", "CorpusId": 860333}, "corpusId": 860333, "publicationVenue": + {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", "name": "Communications of + the ACM", "type": "journal", "alternate_names": ["Commun ACM", "Communications + of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/f355428448a0cf30288be1e6b4a06953013740a7", "title": "Risks of undisciplined development", "abstract": "An illustration of the problems caused by a lack of discipline in software development and our failure to apply what is known in the field.", "venue": "Communications of the ACM", "year": 2010, "referenceCount": 0, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-10-01", "journal": {"volume": "53", "pages": "25 - 27", "name": "Communications - of the ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "0f113fdd32319e7fb0e89f20fd61e90328cd3c9e", "externalIds": {"DBLP": - "journals/kbs/Parnas09", "MAG": "2051940067", "DOI": "10.1016/j.knosys.2008.11.001", - "CorpusId": 31197747}, "url": "https://www.semanticscholar.org/paper/0f113fdd32319e7fb0e89f20fd61e90328cd3c9e", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-10-01", "journal": {"volume": + "53", "pages": "25 - 27", "name": "Communications of the ACM"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "0f113fdd32319e7fb0e89f20fd61e90328cd3c9e", + "externalIds": {"DBLP": "journals/kbs/Parnas09", "MAG": "2051940067", "DOI": + "10.1016/j.knosys.2008.11.001", "CorpusId": 31197747}, "corpusId": 31197747, + "publicationVenue": {"id": "12fff95b-d469-49a0-84a5-4fd4696c3f28", "name": + "Knowledge-Based Systems", "type": "journal", "alternate_names": ["Knowl Based + Syst", "Knowledge Based Systems", "Knowledge-based Syst"], "issn": "0950-7051", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/525448/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/knowledge-based-systems", + "http://www.sciencedirect.com/science/journal/09507051"]}, "url": "https://www.semanticscholar.org/paper/0f113fdd32319e7fb0e89f20fd61e90328cd3c9e", "title": "Document based rational software development", "abstract": null, "venue": "Knowledge-Based Systems", "year": 2009, "referenceCount": 42, "citationCount": - 33, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2009-04-01", - "journal": {"volume": "22", "pages": "132-141", "name": "Knowl. Based Syst."}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "108cf177e203620097056502799eaa65dc2afb0f", - "externalIds": {"CorpusId": 14033346}, "url": "https://www.semanticscholar.org/paper/108cf177e203620097056502799eaa65dc2afb0f", + 33, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2009-04-01", "journal": {"volume": "22", "pages": "132-141", + "name": "Knowl. Based Syst."}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "108cf177e203620097056502799eaa65dc2afb0f", "externalIds": + {"CorpusId": 14033346}, "corpusId": 14033346, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/108cf177e203620097056502799eaa65dc2afb0f", "title": "Title Fault propagation in tabular expression-based specifications", "abstract": "Tabular expressions have been used in industry for many years to precisely document software in a readable notation. In this paper, we propose @@ -3810,33 +4266,36 @@ interactions: case constraints also represented by tabular expressions, so that it can be easily applied and automated.", "venue": "", "year": 2009, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2112639112", "name": "X. Feng"}, - {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "144301499", "name": - "T. Tse"}]}, {"paperId": "a115d9977b1999fed1cecd0cef8bac965db18064", "externalIds": - {"MAG": "2496434514", "CorpusId": 195949580}, "url": "https://www.semanticscholar.org/paper/a115d9977b1999fed1cecd0cef8bac965db18064", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2112639112", + "name": "X. Feng"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "144301499", "name": "T. Tse"}]}, {"paperId": "a115d9977b1999fed1cecd0cef8bac965db18064", + "externalIds": {"MAG": "2496434514", "CorpusId": 195949580}, "corpusId": 195949580, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a115d9977b1999fed1cecd0cef8bac965db18064", "title": "Empirical Research in Software Engineering: A Critical View", "abstract": "The need for empirical research into the practicality and efficacy of software development methods is obvious but most published papers have inadequate experimental design.", "venue": "", "year": 2009, "referenceCount": 7, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "26", - "name": "IEEE Software"}, "authors": [{"authorId": "1726629", "name": "D. - Parnas"}]}, {"paperId": "d77c2bb18b98bea7360eaaebc0ae049e007d31ac", "externalIds": - {"MAG": "2580216396", "CorpusId": 63113096}, "url": "https://www.semanticscholar.org/paper/d77c2bb18b98bea7360eaaebc0ae049e007d31ac", + 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "26", "name": "IEEE Software"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "d77c2bb18b98bea7360eaaebc0ae049e007d31ac", + "externalIds": {"MAG": "2580216396", "CorpusId": 63113096}, "corpusId": 63113096, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d77c2bb18b98bea7360eaaebc0ae049e007d31ac", "title": "Consistency of Networks of Components", "abstract": null, "venue": "", "year": 2009, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2146374780", - "name": "Zhiying Liu"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "34766161", "name": "B. T. Widemann"}]}, {"paperId": "3ee9b9efb3c68d9b6f9112ac50c850046dfdc434", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "2146374780", "name": "Zhiying Liu"}, + {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "34766161", "name": + "B. T. Widemann"}]}, {"paperId": "3ee9b9efb3c68d9b6f9112ac50c850046dfdc434", "externalIds": {"DBLP": "conf/se/Parnas08", "MAG": "57728205", "CorpusId": - 35174986}, "url": "https://www.semanticscholar.org/paper/3ee9b9efb3c68d9b6f9112ac50c850046dfdc434", + 35174986}, "corpusId": 35174986, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3ee9b9efb3c68d9b6f9112ac50c850046dfdc434", "title": "Connecting Good Theory to Good Practice: Software Documentation: A Case Study", "abstract": "In an effort to make their work appear more relevant, computer scientists have introduced new names for an old area. We see terms @@ -3846,13 +4305,19 @@ interactions: often do not know classical mathematics and reinvent rather bumpy versions of old", "venue": "Software Engineering", "year": 2008, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "17-20"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "55c4e606b8d3714a868bebd67e4b16d1ae82ffc0", "externalIds": - {"MAG": "2072030419", "DBLP": "journals/qre/VilkomirPMM08", "DOI": "10.1002/qre.917", - "CorpusId": 15455673}, "url": "https://www.semanticscholar.org/paper/55c4e606b8d3714a868bebd67e4b16d1ae82ffc0", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "17-20"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "55c4e606b8d3714a868bebd67e4b16d1ae82ffc0", + "externalIds": {"MAG": "2072030419", "DBLP": "journals/qre/VilkomirPMM08", + "DOI": "10.1002/qre.917", "CorpusId": 15455673}, "corpusId": 15455673, "publicationVenue": + {"id": "67d58c4e-2829-40b8-bce5-4daddb299da1", "name": "Quality and Reliability + Engineering International", "type": "journal", "alternate_names": ["Qual Reliab + Eng Int"], "issn": "0748-8017", "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/3680", + "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1002/%28ISSN%291099-1638", + "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1099-1638", "https://onlinelibrary.wiley.com/journal/10991638"]}, + "url": "https://www.semanticscholar.org/paper/55c4e606b8d3714a868bebd67e4b16d1ae82ffc0", "title": "Computer systems availability evaluation using a segregated failures model", "abstract": "This paper presents the segregated failures model (SFM) of availability of fault\u2010tolerant computer systems with several recovery @@ -3866,26 +4331,28 @@ interactions: procedure to total system availability is analysed. Copyright \u00a9 2008 John Wiley & Sons, Ltd.", "venue": "Quality and Reliability Engineering International", "year": 2008, "referenceCount": 19, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Environmental Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-04-01", "journal": {"volume": "24", "name": "Quality and Reliability - Engineering International"}, "authors": [{"authorId": "2995529", "name": "S. - Vilkomir"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "3078871", - "name": "V. Mendiratta"}, {"authorId": "152228578", "name": "E. Murphy"}]}, - {"paperId": "9d5c060a58f009696f561aa1ff55de84903db3fc", "externalIds": {"CorpusId": - 33983367}, "url": "https://www.semanticscholar.org/paper/9d5c060a58f009696f561aa1ff55de84903db3fc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-04-01", "journal": {"volume": "24", "name": "Quality + and Reliability Engineering International"}, "authors": [{"authorId": "2995529", + "name": "S. Vilkomir"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "3078871", "name": "V. Mendiratta"}, {"authorId": "152228578", "name": "E. + Murphy"}]}, {"paperId": "9d5c060a58f009696f561aa1ff55de84903db3fc", "externalIds": + {"CorpusId": 33983367}, "corpusId": 33983367, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9d5c060a58f009696f561aa1ff55de84903db3fc", "title": "Dagstuhl Seminar on Practical Methods for Code Documentation and Inspection", "abstract": "State Machine (ASM) Specification of Embedded Control Systems: Documentation and Validation", "venue": "", "year": 2008, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1692943", "name": "E. B\u00f6rger"}, - {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2697703", "name": - "P. Joannou"}]}, {"paperId": "c259fdb2f962e603fd62a8e72325075fd8888a16", "externalIds": - {"MAG": "110280614", "CorpusId": 58824323}, "url": "https://www.semanticscholar.org/paper/c259fdb2f962e603fd62a8e72325075fd8888a16", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1692943", + "name": "E. B\u00f6rger"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "2697703", "name": "P. Joannou"}]}, {"paperId": "c259fdb2f962e603fd62a8e72325075fd8888a16", + "externalIds": {"MAG": "110280614", "CorpusId": 58824323}, "corpusId": 58824323, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c259fdb2f962e603fd62a8e72325075fd8888a16", "title": "Multi-Dimensional Software Families: Document Defined Partitions of a Set of Products", "abstract": "More than 30 years after it was proposed that a set of closely related programs would be easier to maintain than a @@ -4024,13 +4491,15 @@ interactions: Symptoms vs. Removing Causes The \u201cHumpty Dumpty\u201d syndrome: \u2022 If software is not suitable for reuse, we build repositories and ", "venue": "", "year": 2008, "referenceCount": 5, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "c661a8889bbfd22c667227db61b61ae2af128a00", - "externalIds": {"MAG": "2131174418", "DBLP": "conf/compsac/FengPT08", "DOI": - "10.1109/COMPSAC.2008.115", "CorpusId": 14494286}, "url": "https://www.semanticscholar.org/paper/c661a8889bbfd22c667227db61b61ae2af128a00", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "c661a8889bbfd22c667227db61b61ae2af128a00", "externalIds": {"MAG": + "2131174418", "DBLP": "conf/compsac/FengPT08", "DOI": "10.1109/COMPSAC.2008.115", + "CorpusId": 14494286}, "corpusId": 14494286, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c661a8889bbfd22c667227db61b61ae2af128a00", "title": "Fault Propagation in Tabular Expression-Based Specifications", "abstract": "Tabular expressions have been used in industry for many years to precisely document software in a readable notation. In this paper, we propose a fault-based @@ -4040,26 +4509,30 @@ interactions: also represented by tabular expressions, so that it can be easily applied and automated.", "venue": "2008 32nd Annual IEEE International Computer Software and Applications Conference", "year": 2008, "referenceCount": 17, "citationCount": - 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2008-07-28", - "journal": {"pages": "180-183", "name": "2008 32nd Annual IEEE International - Computer Software and Applications Conference"}, "authors": [{"authorId": - "2112639112", "name": "X. Feng"}, {"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "144301499", "name": "T. Tse"}]}, {"paperId": "c67c8631e0110b4d6cee723852883ab37fd552aa", - "externalIds": {"DOI": "10.1038/ncb0308-247", "CorpusId": 25088416, "PubMed": - "18311175"}, "url": "https://www.semanticscholar.org/paper/c67c8631e0110b4d6cee723852883ab37fd552aa", + 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://hub.hku.hk/bitstream/10722/55041/1/Fault_propagation.pdf", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2008-07-28", "journal": {"pages": "180-183", "name": "2008 + 32nd Annual IEEE International Computer Software and Applications Conference"}, + "authors": [{"authorId": "2112639112", "name": "X. Feng"}, {"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "144301499", "name": "T. Tse"}]}, {"paperId": + "c67c8631e0110b4d6cee723852883ab37fd552aa", "externalIds": {"DOI": "10.1038/ncb0308-247", + "CorpusId": 25088416, "PubMed": "18311175"}, "corpusId": 25088416, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c67c8631e0110b4d6cee723852883ab37fd552aa", "title": "What to publish?", "abstract": null, "venue": "Nature Cell Biology", "year": 2008, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": null, - "journal": {"volume": "10", "pages": "247-247", "name": "Nature Cell Biology"}, - "authors": [{"authorId": "2615509", "name": "A. Pras"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "136eb96a2ce42bee35eea6a688af1b670f97d526", - "externalIds": {"DBLP": "journals/cacm/Parnas07", "MAG": "2053565841", "DOI": - "10.1145/1278201.1278232", "CorpusId": 27496134}, "url": "https://www.semanticscholar.org/paper/136eb96a2ce42bee35eea6a688af1b670f97d526", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/ncb0308-247.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["Editorial"], "publicationDate": null, "journal": {"volume": + "10", "pages": "247-247", "name": "Nature Cell Biology"}, "authors": [{"authorId": + "2615509", "name": "A. Pras"}, {"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "136eb96a2ce42bee35eea6a688af1b670f97d526", "externalIds": {"DBLP": + "journals/cacm/Parnas07", "MAG": "2053565841", "DOI": "10.1145/1278201.1278232", + "CorpusId": 27496134}, "corpusId": 27496134, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/136eb96a2ce42bee35eea6a688af1b670f97d526", "title": "Which is riskier: OS diversity or OS monopoly?", "abstract": "It is computer science \u201cfolk wisdom\u201d that our computer systems, particularly the networks, are unnecessarily vulnerable because so many of our systems @@ -4122,14 +4595,15 @@ interactions: to operate in our networks; we also need the ability to enforce those standards. Otherwise, increasing diversity might make the situation worse.", "venue": "CACM", "year": 2007, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2007-08-01", "journal": {"volume": "50", "pages": "112", "name": "Commun. - ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "1efdb8b6fee85d6d933265522017784fa1e0d835", "externalIds": {"MAG": "2102519055", - "DOI": "10.1109/TAIC.PART.2007.19", "CorpusId": 36974405}, "url": "https://www.semanticscholar.org/paper/1efdb8b6fee85d6d933265522017784fa1e0d835", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Business", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2007-08-01", "journal": {"volume": "50", "pages": "112", + "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "1efdb8b6fee85d6d933265522017784fa1e0d835", "externalIds": {"MAG": + "2102519055", "DOI": "10.1109/TAIC.PART.2007.19", "CorpusId": 36974405}, "corpusId": + 36974405, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1efdb8b6fee85d6d933265522017784fa1e0d835", "title": "Tabular Expression-Based Testing Strategies: A Comparison", "abstract": "Tabular expressions were proposed as a documentation tool that can be used to document software precisely and unambiguously. This paper explores the @@ -4137,16 +4611,19 @@ interactions: and further compares the strategies on a mathematical basis.", "venue": "Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007)", "year": 2007, "referenceCount": 5, "citationCount": - 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Conference"], "publicationDate": "2007-09-10", "journal": - {"pages": "134-134", "name": "Testing: Academic and Industrial Conference - Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007)"}, "authors": - [{"authorId": "2112639112", "name": "X. Feng"}, {"authorId": "1726629", "name": - "D. Parnas"}, {"authorId": "144301499", "name": "T. Tse"}]}, {"paperId": "3f656ed643dd174f4b627a41bcc4bd860b14831c", - "externalIds": {"DBLP": "conf/oopsla/Parnas07", "MAG": "1986988081", "DOI": - "10.1145/1297846.1297853", "CorpusId": 25995680}, "url": "https://www.semanticscholar.org/paper/3f656ed643dd174f4b627a41bcc4bd860b14831c", + 7, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://hub.hku.hk/bitstream/10722/88898/1/Content.pdf", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2007-09-10", + "journal": {"pages": "134-134", "name": "Testing: Academic and Industrial + Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION + 2007)"}, "authors": [{"authorId": "2112639112", "name": "X. Feng"}, {"authorId": + "1726629", "name": "D. Parnas"}, {"authorId": "144301499", "name": "T. Tse"}]}, + {"paperId": "3f656ed643dd174f4b627a41bcc4bd860b14831c", "externalIds": {"DBLP": + "conf/oopsla/Parnas07", "MAG": "1986988081", "DOI": "10.1145/1297846.1297853", + "CorpusId": 25995680}, "corpusId": 25995680, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3f656ed643dd174f4b627a41bcc4bd860b14831c", "title": "Precise software documentation: making object-orientation work better", "abstract": "Computer Scientists have been talking about the use of of object-orientation (under a variety of rubrics) to achieve \"separation of concerns\" for more @@ -4165,13 +4642,15 @@ interactions: the way that other programming paradigms, particularly functional programming, can be used to make these documents more useful.", "venue": "OOPSLA ''07", "year": 2007, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2007-10-20", "journal": {"pages": "725"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "766810fd6b1020794f78a7929ca8ff7dfa0abdf6", - "externalIds": {"MAG": "2123124600", "DBLP": "conf/csee/Parnas07", "DOI": - "10.1109/CSEET.2007.43", "CorpusId": 26294816}, "url": "https://www.semanticscholar.org/paper/766810fd6b1020794f78a7929ca8ff7dfa0abdf6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-10-20", "journal": + {"pages": "725"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "766810fd6b1020794f78a7929ca8ff7dfa0abdf6", "externalIds": {"MAG": + "2123124600", "DBLP": "conf/csee/Parnas07", "DOI": "10.1109/CSEET.2007.43", + "CorpusId": 26294816}, "corpusId": 26294816, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/766810fd6b1020794f78a7929ca8ff7dfa0abdf6", "title": "Resolving Dilemmas in Software Engineering Education", "abstract": "Anyone developing a Software Engineering curriculum is faced with several dilemmas: Should it emphasize fundamental principles or current technology? @@ -4182,15 +4661,15 @@ interactions: of answers to these questions and outline a curriculum that implements them.", "venue": "20th Conference on Software Engineering Education & Training (CSEET''07)", "year": 2007, "referenceCount": 1, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2007-07-03", "journal": {"pages": "xix-xix", "name": "20th Conference on - Software Engineering Education & Training (CSEET''07)"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "816886a114582774853885c8ea611d07ce74a2b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2007-07-03", "journal": {"pages": "xix-xix", + "name": "20th Conference on Software Engineering Education & Training (CSEET''07)"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "816886a114582774853885c8ea611d07ce74a2b9", "externalIds": {"DBLP": "conf/vamos/Parnas07", "MAG": "1934024762", "CorpusId": - 60822716}, "url": "https://www.semanticscholar.org/paper/816886a114582774853885c8ea611d07ce74a2b9", + 60822716}, "corpusId": 60822716, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/816886a114582774853885c8ea611d07ce74a2b9", "title": "Software Product-Lines: What To Do When Enumaration Won''t Work", "abstract": "The history of research on the development of program-families is briefly reviewed. Two distinct problems, configuration-management and family-design @@ -4201,23 +4680,25 @@ interactions: that although enumeration is useable for configuration-management, product-line design by enumeration is not generally", "venue": "VaMoS", "year": 2007, "referenceCount": 9, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, - "journal": {"pages": "9-14"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "8992e3b6f75bb8c64cc6f6aae1da46d7f8d36c24", "externalIds": - {"MAG": "2098104370", "DBLP": "journals/cacm/Parnas07a", "DOI": "10.1145/1297797.1297815", - "CorpusId": 29606711}, "url": "https://www.semanticscholar.org/paper/8992e3b6f75bb8c64cc6f6aae1da46d7f8d36c24", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": null, "journal": {"pages": "9-14"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "8992e3b6f75bb8c64cc6f6aae1da46d7f8d36c24", + "externalIds": {"MAG": "2098104370", "DBLP": "journals/cacm/Parnas07a", "DOI": + "10.1145/1297797.1297815", "CorpusId": 29606711}, "corpusId": 29606711, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8992e3b6f75bb8c64cc6f6aae1da46d7f8d36c24", "title": "Stop the numbers game", "abstract": "Counting papers slows the rate of scientific progress.", "venue": "CACM", "year": 2007, "referenceCount": 2, "citationCount": 88, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2007-11-01", "journal": - {"volume": "50", "pages": "19-21", "name": "Commun. ACM"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "9a359995a5b03727eb272ca083587f7e10d56398", - "externalIds": {"DBLP": "conf/enase/Parnas07", "MAG": "153791296", "CorpusId": - 47403564}, "url": "https://www.semanticscholar.org/paper/9a359995a5b03727eb272ca083587f7e10d56398", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-11-01", "journal": {"volume": "50", "pages": "19-21", "name": "Commun. + ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "9a359995a5b03727eb272ca083587f7e10d56398", "externalIds": {"DBLP": "conf/enase/Parnas07", + "MAG": "153791296", "CorpusId": 47403564}, "corpusId": 47403564, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9a359995a5b03727eb272ca083587f7e10d56398", "title": "Document-driven Software Design - A Novel Approach that Should Not Be Novel", "abstract": "An automated search apparatus is disclosed for detecting leaks in liquid impoundments usually defined by a geomembrane layer. A voltage @@ -4228,13 +4709,17 @@ interactions: be tracked using optical theodolites. A distortion in the equipotential lines associated with the voltage gradient indicates the presence of a leak.", "venue": "ENASE", "year": 2007, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "7"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "ca4ad5a45dbc9e5ed05afd4dd54c27b03cdae138", "externalIds": - {"DBLP": "conf/oopsla/FraserBFLNNPT07", "MAG": "1976456622", "DOI": "10.1145/1297846.1297973", - "CorpusId": 33435857}, "url": "https://www.semanticscholar.org/paper/ca4ad5a45dbc9e5ed05afd4dd54c27b03cdae138", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "7"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ca4ad5a45dbc9e5ed05afd4dd54c27b03cdae138", + "externalIds": {"DBLP": "conf/oopsla/FraserBFLNNPT07", "MAG": "1976456622", + "DOI": "10.1145/1297846.1297973", "CorpusId": 33435857}, "corpusId": 33435857, + "publicationVenue": {"id": "de124794-a8b5-43ce-b740-7643c17bb1ea", "name": + "Conference on Object-Oriented Programming Systems, Languages, and Applications", + "type": "conference", "alternate_names": ["OOPSLA", "Conf Object-oriented + Program Syst Lang Appl"]}, "url": "https://www.semanticscholar.org/paper/ca4ad5a45dbc9e5ed05afd4dd54c27b03cdae138", "title": "\"No silver bullet\" reloaded: retrospective on \"essence and accidents of software engineering\"", "abstract": "Twenty years after the paper No Silver Bullet: Essence and Accidents of Software Engineering by Frederick P. Brooks @@ -4247,28 +4732,36 @@ interactions: twenty years - and the paper''s influence on the community.", "venue": "Conference on Object-Oriented Programming Systems, Languages, and Applications", "year": 2007, "referenceCount": 0, "citationCount": 46, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2007-10-20", "journal": {"pages": "1026-1030"}, "authors": - [{"authorId": "143612378", "name": "S. Fraser"}, {"authorId": "1795780", "name": - "F. Brooks"}, {"authorId": "144721456", "name": "M. Fowler"}, {"authorId": - "2112657565", "name": "Ricardo Lopez"}, {"authorId": "2471789", "name": "A. - Namioka"}, {"authorId": "2235834", "name": "L. Northrop"}, {"authorId": "1726629", - "name": "D. Parnas"}, {"authorId": "2111204320", "name": "Dave A. Thomas"}]}, - {"paperId": "e536c6f3dda58e93ae64490a8ddd41e3f9912db8", "externalIds": {"DBLP": - "conf/ifl/WidemannP07", "MAG": "1552692622", "DOI": "10.1007/978-3-540-85373-2_13", - "CorpusId": 41509685}, "url": "https://www.semanticscholar.org/paper/e536c6f3dda58e93ae64490a8ddd41e3f9912db8", - "title": "Tabular Expressions and Total Functional Programming", "abstract": - null, "venue": "IFL", "year": 2008, "referenceCount": 13, "citationCount": - 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-04-01", "journal": - {"pages": "219-236"}, "authors": [{"authorId": "34766161", "name": "B. T. - Widemann"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "e7e08d680f860e331a3900de9dbad0898aad2754", + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-10-20", "journal": + {"pages": "1026-1030"}, "authors": [{"authorId": "143612378", "name": "S. + Fraser"}, {"authorId": "1795780", "name": "F. Brooks"}, {"authorId": "144721456", + "name": "M. Fowler"}, {"authorId": "2112657565", "name": "Ricardo Lopez"}, + {"authorId": "2471789", "name": "A. Namioka"}, {"authorId": "2235834", "name": + "L. Northrop"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "2111204320", "name": "Dave A. Thomas"}]}, {"paperId": "e536c6f3dda58e93ae64490a8ddd41e3f9912db8", + "externalIds": {"DBLP": "conf/ifl/WidemannP07", "MAG": "1552692622", "DOI": + "10.1007/978-3-540-85373-2_13", "CorpusId": 41509685}, "corpusId": 41509685, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e536c6f3dda58e93ae64490a8ddd41e3f9912db8", + "title": "Tabular Expressions and Total Functional Programming", "abstract": + null, "venue": "IFL", "year": 2008, "referenceCount": 13, "citationCount": + 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://www-ps.informatik.uni-kiel.de/fg214/Honnef2007/Abstracts/trancon.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-04-01", "journal": {"pages": "219-236"}, "authors": + [{"authorId": "34766161", "name": "B. T. Widemann"}, {"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "e7e08d680f860e331a3900de9dbad0898aad2754", "externalIds": {"DBLP": "conf/hase/ParnasV07", "MAG": "2112198760", "DOI": - "10.1109/HASE.2007.70", "CorpusId": 6224902}, "url": "https://www.semanticscholar.org/paper/e7e08d680f860e331a3900de9dbad0898aad2754", + "10.1109/HASE.2007.70", "CorpusId": 6224902}, "corpusId": 6224902, "publicationVenue": + {"id": "3429a9e8-7368-4a15-b97d-c05fb309fa4c", "name": "IEEE International + Symposium on High-Assurance Systems Engineering", "type": "conference", "alternate_names": + ["High-assurance Syst Eng", "IEEE Int Symp High-assurance Syst Eng", "HASE", + "High-Assurance Systems Engineering"], "url": "http://www.wikicfp.com/cfp/program?id=1171"}, + "url": "https://www.semanticscholar.org/paper/e7e08d680f860e331a3900de9dbad0898aad2754", "title": "Precise Documentation of Critical Software", "abstract": "This experience and research based paper discusses the reasons that software cannot be trusted and then explains how the use of greatly improved documentation can make software @@ -4279,27 +4772,33 @@ interactions: is intended both to tell developers of techniques available to them and to suggest new research areas.", "venue": "IEEE International Symposium on High-Assurance Systems Engineering", "year": 2007, "referenceCount": 24, "citationCount": - 13, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2007-11-14", - "journal": {"pages": "237-244", "name": "10th IEEE High Assurance Systems - Engineering Symposium (HASE''07)"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}, {"authorId": "2995529", "name": "S. Vilkomir"}]}, {"paperId": - "397e43ddeb056d4f62c1f9616b64234fb66b2123", "externalIds": {"MAG": "1962222092", - "CorpusId": 56675368}, "url": "https://www.semanticscholar.org/paper/397e43ddeb056d4f62c1f9616b64234fb66b2123", + 13, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://researchrepository.ul.ie/articles/online_resource/Precise_documentation_of_critical_software/19840693/1/files/35252473.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2007-11-14", "journal": {"pages": "237-244", + "name": "10th IEEE High Assurance Systems Engineering Symposium (HASE''07)"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2995529", + "name": "S. Vilkomir"}]}, {"paperId": "397e43ddeb056d4f62c1f9616b64234fb66b2123", + "externalIds": {"MAG": "1962222092", "CorpusId": 56675368}, "corpusId": 56675368, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/397e43ddeb056d4f62c1f9616b64234fb66b2123", "title": "Evaluation of automated testing coverage: a case study of wireless secure connection software testing", "abstract": null, "venue": "", "year": 2006, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2995529", - "name": "S. Vilkomir"}, {"authorId": "15924975", "name": "P. Tips"}, {"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "144372443", "name": "J. Monahan"}, - {"authorId": "2066648844", "name": "Tony O''Connor"}]}, {"paperId": "4c6c0e07d6e59c4e20eeffeaa0b873e801af06f6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "2995529", "name": "S. Vilkomir"}, {"authorId": + "15924975", "name": "P. Tips"}, {"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "144372443", "name": "J. Monahan"}, {"authorId": "2066648844", + "name": "Tony O''Connor"}]}, {"paperId": "4c6c0e07d6e59c4e20eeffeaa0b873e801af06f6", "externalIds": {"DBLP": "conf/somet/Parnas06", "MAG": "172223502", "CorpusId": - 39134973}, "url": "https://www.semanticscholar.org/paper/4c6c0e07d6e59c4e20eeffeaa0b873e801af06f6", + 39134973}, "corpusId": 39134973, "publicationVenue": {"id": "f294a093-a7c8-422a-9518-837b347650d0", + "name": "New Trends in Software Methodologies, Tools and Techniques", "type": + "conference", "alternate_names": ["New Trends Softw Methodol Tool Tech", "SoMeT"]}, + "url": "https://www.semanticscholar.org/paper/4c6c0e07d6e59c4e20eeffeaa0b873e801af06f6", "title": "Component Interface Documentation: What do we Need and Why do we Need it?", "abstract": "For at least 4 decades, managers, customers, and anyone else who wanted to acquire software, has bemoaned our inability to specify @@ -4310,14 +4809,15 @@ interactions: we need one and what a good one might be like.", "venue": "New Trends in Software Methodologies, Tools and Techniques", "year": 2006, "referenceCount": 20, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-05-28", "journal": - {"pages": "3-21"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "529f3adf3867fc2439e17d67ed5b0b5032524276", "externalIds": {"DBLP": - "conf/icsea/QuinnVPK06", "MAG": "2060639251", "DOI": "10.1109/ICSEA.2006.67", - "CorpusId": 12944148}, "url": "https://www.semanticscholar.org/paper/529f3adf3867fc2439e17d67ed5b0b5032524276", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-05-28", "journal": {"pages": "3-21"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "529f3adf3867fc2439e17d67ed5b0b5032524276", + "externalIds": {"DBLP": "conf/icsea/QuinnVPK06", "MAG": "2060639251", "DOI": + "10.1109/ICSEA.2006.67", "CorpusId": 12944148}, "corpusId": 12944148, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/529f3adf3867fc2439e17d67ed5b0b5032524276", "title": "Specification of Software Component Requirements Using the Trace Function Method", "abstract": "This paper describes the application of the Trace Function Method to specify the requirements of a software component. @@ -4329,16 +4829,18 @@ interactions: and provides precise information that will be useful for testing and inspection.", "venue": "2006 International Conference on Software Engineering Advances (ICSEA''06)", "year": 2006, "referenceCount": 15, "citationCount": 36, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2006-10-29", "journal": {"pages": "50-50", - "name": "2006 International Conference on Software Engineering Advances (ICSEA''06)"}, - "authors": [{"authorId": "97928141", "name": "C. Quinn"}, {"authorId": "2995529", - "name": "S. Vilkomir"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "50075976", "name": "Srdjan Kostic"}]}, {"paperId": "5690c110aca8959480eab95b6afee8da92a321cf", - "externalIds": {"DBLP": "conf/acsc/VilkomirPMM06", "MAG": "1890184855", "DOI": - "10.1145/1151699.1151706", "CorpusId": 1471495}, "url": "https://www.semanticscholar.org/paper/5690c110aca8959480eab95b6afee8da92a321cf", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2006-10-29", + "journal": {"pages": "50-50", "name": "2006 International Conference on Software + Engineering Advances (ICSEA''06)"}, "authors": [{"authorId": "97928141", "name": + "C. Quinn"}, {"authorId": "2995529", "name": "S. Vilkomir"}, {"authorId": + "1726629", "name": "D. Parnas"}, {"authorId": "50075976", "name": "Srdjan + Kostic"}]}, {"paperId": "5690c110aca8959480eab95b6afee8da92a321cf", "externalIds": + {"DBLP": "conf/acsc/VilkomirPMM06", "MAG": "1890184855", "DOI": "10.1145/1151699.1151706", + "CorpusId": 1471495}, "corpusId": 1471495, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5690c110aca8959480eab95b6afee8da92a321cf", "title": "Segregated failures model for availability evaluation of fault-tolerant systems", "abstract": "This paper presents a method of estimating the availability of fault-tolerant computer systems with several recovery procedures. A segregated @@ -4351,23 +4853,25 @@ interactions: numeric values are provided for availability indexes and the contribution of each recovery procedure to total system availability is analysed.", "venue": "ACSC", "year": 2006, "referenceCount": 11, "citationCount": 12, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "55-61"}, "authors": [{"authorId": "2995529", "name": - "S. Vilkomir"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "3078871", "name": "V. Mendiratta"}, {"authorId": "152228578", "name": "E. - Murphy"}]}, {"paperId": "722f885159df34fa0b600e30ea91db6fbd43e349", "externalIds": - {"CorpusId": 10775714}, "url": "https://www.semanticscholar.org/paper/722f885159df34fa0b600e30ea91db6fbd43e349", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "55-61"}, "authors": [{"authorId": + "2995529", "name": "S. Vilkomir"}, {"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "3078871", "name": "V. Mendiratta"}, {"authorId": "152228578", + "name": "E. Murphy"}]}, {"paperId": "722f885159df34fa0b600e30ea91db6fbd43e349", + "externalIds": {"CorpusId": 10775714}, "corpusId": 10775714, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/722f885159df34fa0b600e30ea91db6fbd43e349", "title": "Andreas Brennecke ,", "abstract": "State Machines in software engineering", "venue": "", "year": 2006, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1402992451", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1402992451", "name": "R. Keil-Slawik"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "87fb3e15fdfccb94cb0f7b3752c4724faca0fd40", "externalIds": {"MAG": - "2530699486", "CorpusId": 63469387}, "url": "https://www.semanticscholar.org/paper/87fb3e15fdfccb94cb0f7b3752c4724faca0fd40", + "2530699486", "CorpusId": 63469387}, "corpusId": 63469387, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/87fb3e15fdfccb94cb0f7b3752c4724faca0fd40", "title": "Module Interface Documentation - Using the Trace Function Method (TFM)", "abstract": "A new approach to the professional documentation (description or specification) of interfaces for information hiding components, the Trace @@ -4376,28 +4880,29 @@ interactions: and trace are introduced. Basic functions on event descriptors and traces are defined. The method is illustrated on a variety simple examples.", "venue": "", "year": 2006, "referenceCount": 20, "citationCount": 10, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}, {"authorId": "1801518", "name": "M. Dragomiroiu"}]}, - {"paperId": "ce34d2eb1588e4508968ecff6807762962a7f9ea", "externalIds": {"DBLP": - "conf/serp/PantelicJLP06", "MAG": "1945466999", "CorpusId": 12266490}, "url": - "https://www.semanticscholar.org/paper/ce34d2eb1588e4508968ecff6807762962a7f9ea", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "1801518", "name": "M. Dragomiroiu"}]}, {"paperId": "ce34d2eb1588e4508968ecff6807762962a7f9ea", + "externalIds": {"DBLP": "conf/serp/PantelicJLP06", "MAG": "1945466999", "CorpusId": + 12266490}, "corpusId": 12266490, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ce34d2eb1588e4508968ecff6807762962a7f9ea", "title": "Inspection of Concurrent Systems: Combining Tables, Theorem Proving and Model Checking", "abstract": "Title: Inspection of Concurrent Systems: Combining Tables, Theorem Proving and Model Checking, Author: Vera Pantelic, Location: Thode", "venue": "Software Engineering Research and Practice", "year": 2006, "referenceCount": 48, "citationCount": 11, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "629-635"}, "authors": [{"authorId": - "1800468", "name": "Vera Pantelic"}, {"authorId": "2149111986", "name": "Xiao-Hui - Jin"}, {"authorId": "1766205", "name": "M. Lawford"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "3326f6448a2236b44624fdcee9b0f6c0f11ade6d", - "externalIds": {"MAG": "2338378872", "DBLP": "journals/cacm/DenningHPW05", - "DOI": "10.1145/1101779.1101804", "CorpusId": 20322967}, "url": "https://www.semanticscholar.org/paper/3326f6448a2236b44624fdcee9b0f6c0f11ade6d", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "629-635"}, "authors": [{"authorId": "1800468", "name": "Vera Pantelic"}, + {"authorId": "2149111986", "name": "Xiao-Hui Jin"}, {"authorId": "1766205", + "name": "M. Lawford"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "3326f6448a2236b44624fdcee9b0f6c0f11ade6d", "externalIds": {"MAG": "2338378872", + "DBLP": "journals/cacm/DenningHPW05", "DOI": "10.1145/1101779.1101804", "CorpusId": + 20322967}, "corpusId": 20322967, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3326f6448a2236b44624fdcee9b0f6c0f11ade6d", "title": "Wikipedia risks", "abstract": "The Wikipedia (WP; en.wikipedia.org/wiki/) applies the wiki technology (from a Hawaiian word for \u201cquick\u201d) to the encyclopedia, a venerable form of knowledge organization and dissemination. @@ -4459,16 +4964,21 @@ interactions: in knowledge compilation and codification. However, it cannot attain the status of a true encyclopedia without more formal content-inclusion and expert review procedures.", "venue": "CACM", "year": 2005, "referenceCount": 0, "citationCount": - 218, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2005-12-01", - "journal": {"volume": "48", "pages": "152", "name": "Commun. ACM"}, "authors": - [{"authorId": "1729148", "name": "P. Denning"}, {"authorId": "1789075", "name": - "J. Horning"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "145512635", "name": "Lauren Weinstein"}]}, {"paperId": "37804e3f93a5f6bc48231c5b8ace8d05762c8da8", - "externalIds": {"DBLP": "conf/amost/ClermontP05", "DOI": "10.1145/1082983.1083276", - "CorpusId": 14234168}, "url": "https://www.semanticscholar.org/paper/37804e3f93a5f6bc48231c5b8ace8d05762c8da8", + 219, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2005-12-01", "journal": {"volume": "48", "pages": "152", + "name": "Commun. ACM"}, "authors": [{"authorId": "1729148", "name": "P. Denning"}, + {"authorId": "1789075", "name": "J. Horning"}, {"authorId": "1726629", "name": + "D. Parnas"}, {"authorId": "145512635", "name": "Lauren Weinstein"}]}, {"paperId": + "37804e3f93a5f6bc48231c5b8ace8d05762c8da8", "externalIds": {"DBLP": "conf/amost/ClermontP05", + "DOI": "10.1145/1082983.1083276", "CorpusId": 14234168}, "corpusId": 14234168, + "publicationVenue": {"id": "94ba9d44-71bd-4fb8-99e9-0dfc372a5a59", "name": + "Most", "type": "conference", "alternate_names": ["A-MOST", "Advances in Model-Based + Software Testing", "Adv Model Softw Test"], "issn": "2303-467X", "alternate_issns": + ["2303-4688", "1120-7388", "1573-7063"], "url": "https://link.springer.com/journal/11039", + "alternate_urls": ["http://www.wikicfp.com/cfp/program?id=160"]}, "url": "https://www.semanticscholar.org/paper/37804e3f93a5f6bc48231c5b8ace8d05762c8da8", "title": "Using information about functions in selecting test cases", "abstract": "We consider the problem of generating a set of test cases from a black box specification. We focus on stress testing, i.e. picking test cases that seem @@ -4478,7 +4988,8 @@ interactions: the interesting points for a function defined by a complex expression if we know the interesting points for the functions named in that expression.", "venue": "Most", "year": 2005, "referenceCount": 15, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://researchrepository.ul.ie/articles/conference_contribution/Using_information_about_functions_in_selecting_test_cases/19840648/1/files/35252398.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2005-05-15", "journal": {"volume": "30", "pages": "1 - @@ -4486,7 +4997,8 @@ interactions: "2467916", "name": "Markus Clermont"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "6f570c25e6d7dc7b3d70aac83fe36f3a6b7d3363", "externalIds": {"DBLP": "journals/sigsoft/ParnasC05", "MAG": "2015148761", "DOI": "10.1145/1082983.1082986", - "CorpusId": 40442070}, "url": "https://www.semanticscholar.org/paper/6f570c25e6d7dc7b3d70aac83fe36f3a6b7d3363", + "CorpusId": 40442070}, "corpusId": 40442070, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6f570c25e6d7dc7b3d70aac83fe36f3a6b7d3363", "title": "Goals for software engineering student education", "abstract": "precedented involvement with the host region. This was facilitated in part by the fact that this is first time ICSE is held in the Midwest. More than that, there @@ -4500,15 +5012,16 @@ interactions: and, if successful, they will be remembered as by-products of having held ICSE 2005 in St. Louis.", "venue": "ACM SIGSOFT Softw. Eng. Notes", "year": 2005, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-07-01", "journal": {"volume": "30", "pages": "6 - 8", "name": "ACM SIGSOFT - Software Engineering Notes"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}, {"authorId": "1403157705", "name": "Lillian Chik-Parnas"}]}, - {"paperId": "711d9533ed190a8d5d8fb1bae76f4a99b8c17847", "externalIds": {"MAG": - "1976972021", "DBLP": "conf/itcc/BaberPVHO05", "DOI": "10.1109/ITCC.2005.132", - "CorpusId": 17982307}, "url": "https://www.semanticscholar.org/paper/711d9533ed190a8d5d8fb1bae76f4a99b8c17847", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-07-01", "journal": {"volume": + "30", "pages": "6 - 8", "name": "ACM SIGSOFT Software Engineering Notes"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1403157705", + "name": "Lillian Chik-Parnas"}]}, {"paperId": "711d9533ed190a8d5d8fb1bae76f4a99b8c17847", + "externalIds": {"MAG": "1976972021", "DBLP": "conf/itcc/BaberPVHO05", "DOI": + "10.1109/ITCC.2005.132", "CorpusId": 17982307}, "corpusId": 17982307, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/711d9533ed190a8d5d8fb1bae76f4a99b8c17847", "title": "Disciplined methods of software specification: a case study", "abstract": "We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular @@ -4524,7 +5037,8 @@ interactions: consistency, unambiguity, completeness, suitability, etc.", "venue": "International Conference on Information Technology: Coding and Computing (ITCC''05) - Volume II", "year": 2005, "referenceCount": 19, "citationCount": 36, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://baber.servehttp.com/Professional/MiscWritings/DisciplMethSWSpec.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-04-04", "journal": {"volume": "2", @@ -4535,7 +5049,7 @@ interactions: "P. Harrison"}, {"authorId": "2066648844", "name": "Tony O''Connor"}]}, {"paperId": "8054f03316f0c0e38004346be42537945b8f7235", "externalIds": {"MAG": "1566925033", "DBLP": "conf/aswec/Parnas05", "DOI": "10.1109/ASWEC.2005.23", "CorpusId": - 46291642}, "url": "https://www.semanticscholar.org/paper/8054f03316f0c0e38004346be42537945b8f7235", + 46291642}, "corpusId": 46291642, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8054f03316f0c0e38004346be42537945b8f7235", "title": "Document Driven Disciplined Development of Software", "abstract": "It is no accident that the branches of engineering are called \"disciplines\". Every properly educated engineer has learned that the design of quality products @@ -4553,13 +5067,19 @@ interactions: never be implemented and ignore critical facts that are essential for trustworthy products.", "venue": "Australian Software Engineering Conference", "year": 2005, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2005-03-29", "journal": {"pages": "2-3"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "990aba93fc2f11157f135eac79cd0e4eefaa0846", - "externalIds": {"DBLP": "conf/compsac/VilkomirPMM05", "MAG": "2100232768", - "DOI": "10.1109/COMPSAC.2005.52", "CorpusId": 8803376}, "url": "https://www.semanticscholar.org/paper/990aba93fc2f11157f135eac79cd0e4eefaa0846", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-03-29", + "journal": {"pages": "2-3"}, "authors": [{"authorId": "1726629", "name": "D. + Parnas"}]}, {"paperId": "990aba93fc2f11157f135eac79cd0e4eefaa0846", "externalIds": + {"DBLP": "conf/compsac/VilkomirPMM05", "MAG": "2100232768", "DOI": "10.1109/COMPSAC.2005.52", + "CorpusId": 8803376}, "corpusId": 8803376, "publicationVenue": {"id": "e574da12-4e4c-4b78-a203-ae3719c0c4f7", + "name": "Annual International Computer Software and Applications Conference", + "type": "conference", "alternate_names": ["Comput Softw Appl Conf", "Annu + Int Comput Softw Appl Conf", "COMPSAC Work", "Computer Software and Applications + Conference", "COMPSAC Workshops", "COMPSAC"], "url": "http://www.wikicfp.com/cfp/program?id=548"}, + "url": "https://www.semanticscholar.org/paper/990aba93fc2f11157f135eac79cd0e4eefaa0846", "title": "Availability evaluation of hardware/software systems with several recovery procedures", "abstract": "The use of several distinct recovery procedures is one of the techniques that can be used to ensure high availability and @@ -4573,27 +5093,33 @@ interactions: and the impact of various types of failures and coverage factors on down time is analysed.", "venue": "Annual International Computer Software and Applications Conference", "year": 2005, "referenceCount": 9, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2005-07-26", "journal": {"volume": "1", - "pages": "473-478 Vol. 2", "name": "29th Annual International Computer Software - and Applications Conference (COMPSAC''05)"}, "authors": [{"authorId": "2995529", - "name": "S. Vilkomir"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "3078871", "name": "V. Mendiratta"}, {"authorId": "152228578", "name": "E. - Murphy"}]}, {"paperId": "a867dad4832a3be9ddb70897cd944373039396c1", "externalIds": - {"MAG": "1551392760", "DBLP": "conf/ifm/Parnas05", "DOI": "10.1007/11589976_1", - "CorpusId": 206593060}, "url": "https://www.semanticscholar.org/paper/a867dad4832a3be9ddb70897cd944373039396c1", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-07-26", + "journal": {"volume": "1", "pages": "473-478 Vol. 2", "name": "29th Annual + International Computer Software and Applications Conference (COMPSAC''05)"}, + "authors": [{"authorId": "2995529", "name": "S. Vilkomir"}, {"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "3078871", "name": "V. Mendiratta"}, {"authorId": + "152228578", "name": "E. Murphy"}]}, {"paperId": "a867dad4832a3be9ddb70897cd944373039396c1", + "externalIds": {"MAG": "1551392760", "DBLP": "conf/ifm/Parnas05", "DOI": "10.1007/11589976_1", + "CorpusId": 206593060}, "corpusId": 206593060, "publicationVenue": {"id": + "9bbe6f71-a5f0-406e-801d-12bf3ec438ef", "name": "International Conference + on Integrated Formal Methods", "type": "conference", "alternate_names": ["Int + Conf Integr Form Method", "Integr Form Method", "IFM", "Integrated Formal + Methods"], "url": "http://www.wikicfp.com/cfp/program?id=1544"}, "url": "https://www.semanticscholar.org/paper/a867dad4832a3be9ddb70897cd944373039396c1", "title": "A Family of Mathematical Methods for Professional Software Documentation", "abstract": null, "venue": "International Conference on Integrated Formal Methods", "year": 2005, "referenceCount": 7, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-11-29", "journal": {"pages": "1-4"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "ccd2cdb0a80d5cf349315cbc58fc9ee8dae9d708", - "externalIds": {"MAG": "2153511411", "DBLP": "journals/sigsoft/ClermontP05", - "DOI": "10.1145/1082983.1083276", "CorpusId": 38662174}, "url": "https://www.semanticscholar.org/paper/ccd2cdb0a80d5cf349315cbc58fc9ee8dae9d708", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-11-29", "journal": + {"pages": "1-4"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "ccd2cdb0a80d5cf349315cbc58fc9ee8dae9d708", "externalIds": {"MAG": + "2153511411", "DBLP": "journals/sigsoft/ClermontP05", "DOI": "10.1145/1082983.1083276", + "CorpusId": 38662174}, "corpusId": 38662174, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ccd2cdb0a80d5cf349315cbc58fc9ee8dae9d708", "title": "Using information about functions in selecting test cases", "abstract": "We consider the problem of generating a set of test cases from a black box specification. We focus on stress testing, i.e. picking test cases that seem @@ -4604,52 +5130,64 @@ interactions: know the interesting points for the functions named in that expression.", "venue": "ACM SIGSOFT Softw. Eng. Notes", "year": 2005, "referenceCount": 10, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-07-01", "journal": {"volume": "30", "pages": "1-7", "name": "ACM SIGSOFT - Softw. Eng. Notes"}, "authors": [{"authorId": "2467916", "name": "Markus Clermont"}, - {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "394ef0577482d22d0d86d52f0d10a7c313caace2", - "externalIds": {"DBLP": "journals/acta/CourtoisHP72", "MAG": "1970908995", - "DOI": "10.1007/BF00289516", "CorpusId": 10878952}, "url": "https://www.semanticscholar.org/paper/394ef0577482d22d0d86d52f0d10a7c313caace2", + "openAccessPdf": {"url": "https://researchrepository.ul.ie/articles/conference_contribution/Using_information_about_functions_in_selecting_test_cases/19840648/1/files/35252398.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-07-01", "journal": {"volume": "30", "pages": "1-7", + "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "2467916", + "name": "Markus Clermont"}, {"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "394ef0577482d22d0d86d52f0d10a7c313caace2", "externalIds": {"DBLP": + "journals/acta/CourtoisHP72", "MAG": "1970908995", "DOI": "10.1007/BF00289516", + "CorpusId": 10878952}, "corpusId": 10878952, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/394ef0577482d22d0d86d52f0d10a7c313caace2", "title": "Comments on \u201cA comparison of two synchronizing concepts by P.B. Hansen\u201d", "abstract": null, "venue": "Acta Informatica", "year": 1972, "referenceCount": 4, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1972-12-01", "journal": {"volume": "1", "pages": "375-376", "name": "Acta - Informatica"}, "authors": [{"authorId": "46753418", "name": "P. Courtois"}, - {"authorId": "2083604554", "name": "F. Heymans"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "74d576ebad853c2a69a60e39ed1a819c14352c0e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1972-12-01", "journal": {"volume": + "1", "pages": "375-376", "name": "Acta Informatica"}, "authors": [{"authorId": + "46753418", "name": "P. Courtois"}, {"authorId": "2083604554", "name": "F. + Heymans"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "74d576ebad853c2a69a60e39ed1a819c14352c0e", "externalIds": {"MAG": "2336850053", "DBLP": "journals/rts/XuP00", "DOI": - "10.1023/A:1008198310125", "CorpusId": 17688545}, "url": "https://www.semanticscholar.org/paper/74d576ebad853c2a69a60e39ed1a819c14352c0e", + "10.1023/A:1008198310125", "CorpusId": 17688545}, "corpusId": 17688545, "publicationVenue": + {"id": "aab37d50-9cde-481b-b693-b0c47f2347a9", "name": "Real-time systems", + "type": "journal", "alternate_names": ["Real-time Systems", "Real-time Syst", + "Real-time syst"], "issn": "0922-6443", "url": "https://link.springer.com/journal/11241"}, + "url": "https://www.semanticscholar.org/paper/74d576ebad853c2a69a60e39ed1a819c14352c0e", "title": "Priority Scheduling Versus Pre-Run-Time Scheduling", "abstract": null, "venue": "Real-time systems", "year": 1998, "referenceCount": 16, "citationCount": - 111, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-06-01", "journal": - {"volume": "18", "pages": "7-23", "name": "Real-Time Systems"}, "authors": - [{"authorId": "47883345", "name": "Jia Xu"}, {"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "9877cfbf8c3520037c959c928498ba2ae5e5f47a", "externalIds": - {"DBLP": "journals/software/BasiliBDHLMMPPJ04", "DOI": "10.1109/MS.2004.1259165", - "CorpusId": 19724932}, "url": "https://www.semanticscholar.org/paper/9877cfbf8c3520037c959c928498ba2ae5e5f47a", + 111, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1998-06-01", "journal": {"volume": "18", "pages": "7-23", "name": "Real-Time + Systems"}, "authors": [{"authorId": "47883345", "name": "Jia Xu"}, {"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "9877cfbf8c3520037c959c928498ba2ae5e5f47a", + "externalIds": {"DBLP": "journals/software/BasiliBDHLMMPPJ04", "DOI": "10.1109/MS.2004.1259165", + "CorpusId": 19724932}, "corpusId": 19724932, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9877cfbf8c3520037c959c928498ba2ae5e5f47a", "title": "New Year''s Resolutions for Software Quality", "abstract": null, "venue": "IEEE Softw.", "year": 2004, "referenceCount": 0, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "21", "pages": "12-13", "name": "IEEE Softw."}, - "authors": [{"authorId": "1678713", "name": "V. Basili"}, {"authorId": "144082233", - "name": "B. Boehm"}, {"authorId": "144272576", "name": "A. Davis"}, {"authorId": - "1714666", "name": "W. Humphrey"}, {"authorId": "1777378", "name": "N. Leveson"}, - {"authorId": "1680541", "name": "N. Mead"}, {"authorId": "1980818", "name": - "J. Musa"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1748317", - "name": "S. Pfleeger"}, {"authorId": "1739966", "name": "E. Weyuker"}]}, {"paperId": - "0165b8171067ec2f35ffb1c277806ccb0494bcad", "externalIds": {"MAG": "1969427878", - "DBLP": "journals/software/ParnasL03", "DOI": "10.1109/MS.2003.1207449", "CorpusId": - 7071357}, "url": "https://www.semanticscholar.org/paper/0165b8171067ec2f35ffb1c277806ccb0494bcad", + 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "21", "pages": "12-13", "name": + "IEEE Softw."}, "authors": [{"authorId": "1678713", "name": "V. Basili"}, + {"authorId": "144082233", "name": "B. Boehm"}, {"authorId": "144272576", "name": + "A. Davis"}, {"authorId": "1714666", "name": "W. Humphrey"}, {"authorId": + "1777378", "name": "N. Leveson"}, {"authorId": "1680541", "name": "N. Mead"}, + {"authorId": "1980818", "name": "J. Musa"}, {"authorId": "1726629", "name": + "D. Parnas"}, {"authorId": "1748317", "name": "S. Pfleeger"}, {"authorId": + "1739966", "name": "E. Weyuker"}]}, {"paperId": "0165b8171067ec2f35ffb1c277806ccb0494bcad", + "externalIds": {"MAG": "1969427878", "DBLP": "journals/software/ParnasL03", + "DOI": "10.1109/MS.2003.1207449", "CorpusId": 7071357}, "corpusId": 7071357, + "publicationVenue": {"id": "119227a6-1b94-433e-a52d-8445a387dbbe", "name": + "IEEE Software", "type": "journal", "alternate_names": ["IEEE Softw"], "issn": + "0740-7459", "url": "http://www.computer.org/software", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=52"]}, "url": "https://www.semanticscholar.org/paper/0165b8171067ec2f35ffb1c277806ccb0494bcad", "title": "Inspection''s role in software quality assurance", "abstract": "0 7 4 0 7 4 5 9 / 0 3 / $ 1 7 . 0 0 \u00a9 2 0 0 3 I E E E Researchers have responded to these problems by studying methods of formal correctness verification @@ -4664,14 +5202,17 @@ interactions: time to respond to complaints after release.) Inspection methods can be more effective than informal reviews and require less effort than formal focus", "venue": "IEEE Software", "year": 2003, "referenceCount": 7, "citationCount": - 25, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2003-07-01", - "journal": {"volume": "20", "pages": "16-20", "name": "IEEE Software"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1766205", "name": - "M. Lawford"}]}, {"paperId": "0351eb3532b7f7cb365afb716f71a31ccf789b7f", "externalIds": - {"MAG": "787616538", "CorpusId": 60439333}, "url": "https://www.semanticscholar.org/paper/0351eb3532b7f7cb365afb716f71a31ccf789b7f", + 25, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://researchrepository.ul.ie/articles/journal_contribution/Inspection_s_role_in_software_quality_assurance/19840675/1/files/35252440.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2003-07-01", "journal": {"volume": "20", "pages": + "16-20", "name": "IEEE Software"}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}, {"authorId": "1766205", "name": "M. Lawford"}]}, {"paperId": + "0351eb3532b7f7cb365afb716f71a31ccf789b7f", "externalIds": {"MAG": "787616538", + "CorpusId": 60439333}, "corpusId": 60439333, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0351eb3532b7f7cb365afb716f71a31ccf789b7f", "title": "Decomposition of software into components", "abstract": "Most software products are too large to be completed by a single person in short period. To make the development manageable, the software must be divided into components @@ -4778,13 +5319,18 @@ interactions: 11 /52 decomposition .fm 9 February 2003 22:53 The KWIC INDEX Example Which program design decisions are most likely to change?", "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "0423dfa6f8d1996ffe76996c06afbb1ef457c330", - "externalIds": {"MAG": "2021831005", "DBLP": "conf/icse/DevanbuBBKLPT03", - "DOI": "10.1109/ICSE.2003.1201261", "CorpusId": 14764566}, "url": "https://www.semanticscholar.org/paper/0423dfa6f8d1996ffe76996c06afbb1ef457c330", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "0423dfa6f8d1996ffe76996c06afbb1ef457c330", "externalIds": {"MAG": "2021831005", + "DBLP": "conf/icse/DevanbuBBKLPT03", "DOI": "10.1109/ICSE.2003.1201261", "CorpusId": + 14764566}, "corpusId": 14764566, "publicationVenue": {"id": "a36dc29e-4ea1-4567-b0fe-1c06daf8bee8", + "name": "International Conference on Software Engineering", "type": "conference", + "alternate_names": ["IEEE Int Conf Semicond Electron", "IEEE International + Conference on Semiconductor Electronics", "ICSE", "Int Conf Softw Eng"], "url": + "http://www.icse-conferences.org/"}, "url": "https://www.semanticscholar.org/paper/0423dfa6f8d1996ffe76996c06afbb1ef457c330", "title": "Modularity in the new millenium: a panel summary", "abstract": "Parnas'' seminal work [2] on separation of concerns in design has led to diverse innovations in programming language design, to support modularity. However, there has @@ -4807,27 +5353,33 @@ interactions: of some of the panelists follow, pre- sented in alphabetical order of their names:", "venue": "International Conference on Software Engineering", "year": 2003, "referenceCount": 5, "citationCount": 10, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2003-05-03", "journal": {"pages": "723-725"}, - "authors": [{"authorId": "1730296", "name": "Premkumar T. Devanbu"}, {"authorId": - "145839355", "name": "R. Balzer"}, {"authorId": "1751603", "name": "D. Batory"}, - {"authorId": "2365209", "name": "G. Kiczales"}, {"authorId": "2993693", "name": - "J. Launchbury"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "1717091", "name": "P. Tarr"}]}, {"paperId": "06ab3ef4eefd66bc50ad00e4b8dbc6e0404c4ad2", - "externalIds": {"DBLP": "journals/ipl/Parnas03", "MAG": "2055396887", "DOI": - "10.1016/S0020-0190(03)00389-2", "CorpusId": 793917}, "url": "https://www.semanticscholar.org/paper/06ab3ef4eefd66bc50ad00e4b8dbc6e0404c4ad2", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2003-05-03", + "journal": {"pages": "723-725"}, "authors": [{"authorId": "1730296", "name": + "Premkumar T. Devanbu"}, {"authorId": "145839355", "name": "R. Balzer"}, {"authorId": + "1751603", "name": "D. Batory"}, {"authorId": "2365209", "name": "G. Kiczales"}, + {"authorId": "2993693", "name": "J. Launchbury"}, {"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "1717091", "name": "P. Tarr"}]}, {"paperId": + "06ab3ef4eefd66bc50ad00e4b8dbc6e0404c4ad2", "externalIds": {"DBLP": "journals/ipl/Parnas03", + "MAG": "2055396887", "DOI": "10.1016/S0020-0190(03)00389-2", "CorpusId": 793917}, + "corpusId": 793917, "publicationVenue": {"id": "44ecc2bb-f8fd-4c6d-bd54-30ca098be91d", + "name": "Information Processing Letters", "type": "journal", "alternate_names": + ["Inf Process Lett"], "issn": "0020-0190", "url": "http://www.elsevier.com/locate/ipl", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505612/description#description", + "http://www.sciencedirect.com/science/journal/00200190"]}, "url": "https://www.semanticscholar.org/paper/06ab3ef4eefd66bc50ad00e4b8dbc6e0404c4ad2", "title": "Structured programming: A minor part of software engineering", "abstract": null, "venue": "Information Processing Letters", "year": 2003, "referenceCount": 27, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-10-17", "journal": {"volume": "88", "pages": "53-58", "name": "Inf. - Process. Lett."}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "11e6059fb3e53855a0b831a1c8bf4d6d0462fe53", "externalIds": {"CorpusId": - 2733546}, "url": "https://www.semanticscholar.org/paper/11e6059fb3e53855a0b831a1c8bf4d6d0462fe53", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-10-17", "journal": {"volume": "88", "pages": "53-58", + "name": "Inf. Process. Lett."}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "11e6059fb3e53855a0b831a1c8bf4d6d0462fe53", "externalIds": + {"CorpusId": 2733546}, "corpusId": 2733546, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/11e6059fb3e53855a0b831a1c8bf4d6d0462fe53", "title": "Modularity in the New Mihenium: a Panel Summary", "abstract": "Parnas'' seminal work [2] on separation of concerns in design has led to diverse innovations in programming language design, to support modularity. However, there has @@ -4849,24 +5401,29 @@ interactions: (sic) of program modularization and evolution techniques. Position statements of some of the panelists follow, presented in alphabetical order of their names:", "venue": "", "year": 2003, "referenceCount": 5, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "34807648", "name": "B. Balzer"}, {"authorId": "1751603", "name": - "D. Batory"}, {"authorId": "2365209", "name": "G. Kiczales"}, {"authorId": - "2993693", "name": "J. Launchbury"}, {"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "1d03c48e0b1728b24d042a95b5c2ea5c88ad875f", "externalIds": {"DBLP": - "conf/fidji/Parnas03", "MAG": "1888147631", "DOI": "10.1007/978-3-540-24639-8_14", - "CorpusId": 35383137}, "url": "https://www.semanticscholar.org/paper/1d03c48e0b1728b24d042a95b5c2ea5c88ad875f", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "34807648", "name": "B. Balzer"}, + {"authorId": "1751603", "name": "D. Batory"}, {"authorId": "2365209", "name": + "G. Kiczales"}, {"authorId": "2993693", "name": "J. Launchbury"}, {"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "1d03c48e0b1728b24d042a95b5c2ea5c88ad875f", + "externalIds": {"DBLP": "conf/fidji/Parnas03", "MAG": "1888147631", "DOI": + "10.1007/978-3-540-24639-8_14", "CorpusId": 35383137}, "corpusId": 35383137, + "publicationVenue": {"id": "1a73a426-eefc-4fcb-9427-43a8ce790577", "name": + "FIDJI Project", "type": "conference", "alternate_names": ["FIDJI", "FIDJI + Proj"], "url": "http://fidji.ist.lu/"}, "url": "https://www.semanticscholar.org/paper/1d03c48e0b1728b24d042a95b5c2ea5c88ad875f", "title": "Software Inspections We Can Trust", "abstract": null, "venue": "FIDJI Project", "year": 2003, "referenceCount": 7, "citationCount": 5, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://figshare.com/articles/online_resource/Software_inspections_we_can_trust/19811428/1/files/35252488.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2003-11-27", "journal": {"pages": "153-154"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "335135f3b3cd872b78c1f1edf0fb974ba5dc12f9", "externalIds": {"DBLP": "conf/isese/Parnas03", "MAG": "1882167960", "DOI": - "10.1109/ISESE.2003.1237959", "CorpusId": 12495776}, "url": "https://www.semanticscholar.org/paper/335135f3b3cd872b78c1f1edf0fb974ba5dc12f9", + "10.1109/ISESE.2003.1237959", "CorpusId": 12495776}, "corpusId": 12495776, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/335135f3b3cd872b78c1f1edf0fb974ba5dc12f9", "title": "The limits of empirical studies of software engineering", "abstract": "Some advocates of empirical studies of software engineering appear to be claiming that empirical studies alone can tell us how we should do software @@ -4877,14 +5434,16 @@ interactions: that what works in theory can actually be used (and useful) in practice.", "venue": "2003 International Symposium on Empirical Software Engineering, 2003. ISESE 2003. Proceedings.", "year": 2003, "referenceCount": 0, "citationCount": - 23, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-09-30", "journal": - {"pages": "2-5", "name": "2003 International Symposium on Empirical Software - Engineering, 2003. ISESE 2003. Proceedings."}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "4a26b08bfa4f16b0c0fec81caaf5e176c456aff8", - "externalIds": {"MAG": "2270527575", "CorpusId": 62118562}, "url": "https://www.semanticscholar.org/paper/4a26b08bfa4f16b0c0fec81caaf5e176c456aff8", + 23, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://researchrepository.ul.ie/articles/conference_contribution/The_limits_of_empirical_studies_of_software_engineering/19840681/1/files/35252449.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-09-30", "journal": {"pages": "2-5", "name": "2003 International Symposium + on Empirical Software Engineering, 2003. ISESE 2003. Proceedings."}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "4a26b08bfa4f16b0c0fec81caaf5e176c456aff8", + "externalIds": {"MAG": "2270527575", "CorpusId": 62118562}, "corpusId": 62118562, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4a26b08bfa4f16b0c0fec81caaf5e176c456aff8", "title": "Documentation based software testing", "abstract": "Testing is sometimes viewed as an \u201cadd on\u201d step in software development something you do to demonstrate that the product is ready for use. Test planning is often @@ -4896,19 +5455,23 @@ interactions: about testing, and response to test results are determined in advance and high quality standards can be enforced on a project.", "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "55dc70cad818fe82ac79ca0ae905a149a6d8f66a", - "externalIds": {"MAG": "2165513852", "CorpusId": 61189650}, "url": "https://www.semanticscholar.org/paper/55dc70cad818fe82ac79ca0ae905a149a6d8f66a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "55dc70cad818fe82ac79ca0ae905a149a6d8f66a", "externalIds": {"MAG": + "2165513852", "CorpusId": 61189650}, "corpusId": 61189650, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/55dc70cad818fe82ac79ca0ae905a149a6d8f66a", "title": "Software quality research: why, what and how", "abstract": null, "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "5b6bca20392a2fd0c40ee5de07a12df23bf961ac", - "externalIds": {"CorpusId": 15718493}, "url": "https://www.semanticscholar.org/paper/5b6bca20392a2fd0c40ee5de07a12df23bf961ac", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. + Parnas"}]}, {"paperId": "5b6bca20392a2fd0c40ee5de07a12df23bf961ac", "externalIds": + {"CorpusId": 15718493}, "corpusId": 15718493, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5b6bca20392a2fd0c40ee5de07a12df23bf961ac", "title": "Making Free/Open-Source Software (F/OSS) Work Better", "abstract": "This paper describes some characteristics of the OSS development approach and identified opportunities to improve the development practices and the @@ -4923,11 +5486,12 @@ interactions: process parallelism. Keywords\u2014Open, Source, Software, Engineering, Development, Process, Model, Development, Quality, Assurance.", "venue": "", "year": 2003, "referenceCount": 38, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "5ca41a735afaa673e252bbc8a19f44e91cba7429", "externalIds": {"MAG": - "2239675024", "CorpusId": 62303311}, "url": "https://www.semanticscholar.org/paper/5ca41a735afaa673e252bbc8a19f44e91cba7429", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "5ca41a735afaa673e252bbc8a19f44e91cba7429", + "externalIds": {"MAG": "2239675024", "CorpusId": 62303311}, "corpusId": 62303311, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5ca41a735afaa673e252bbc8a19f44e91cba7429", "title": "A procedure for interface design", "abstract": "Improperly designed interfaces can make modular programs almost indistinguishable from \u201cmonoliths\u201d. An interface encapsulates design decisions only if it need not be changed @@ -5006,13 +5570,14 @@ interactions: based on abstract interface. 4. Procure (separately) programs that translate between real interface and the abstract interface. Real World", "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "5f343e59abe4dcbd7f74f0ccc5cb2adcb9fbd7b2", - "externalIds": {"MAG": "2116247135", "DBLP": "journals/tse/ParnasL03", "DOI": - "10.1109/TSE.2003.1223642", "CorpusId": 18552823}, "url": "https://www.semanticscholar.org/paper/5f343e59abe4dcbd7f74f0ccc5cb2adcb9fbd7b2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "5f343e59abe4dcbd7f74f0ccc5cb2adcb9fbd7b2", "externalIds": {"MAG": "2116247135", + "DBLP": "journals/tse/ParnasL03", "DOI": "10.1109/TSE.2003.1223642", "CorpusId": + 18552823}, "corpusId": 18552823, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5f343e59abe4dcbd7f74f0ccc5cb2adcb9fbd7b2", "title": "The Role of Inspection in Software Quality Assurance", "abstract": "Due to the complexity of the code, software is released with many errors. In response, both software practitioners and software researchers need to @@ -5030,23 +5595,27 @@ interactions: process and computer aided tool support and explained how careful design of software could make inspections easier or more effective.", "venue": "IEEE Trans. Software Eng.", "year": 2003, "referenceCount": 0, "citationCount": - 101, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2003-08-01", "journal": {"volume": - "29", "pages": "674-676", "name": "IEEE Trans. Software Eng."}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1766205", "name": - "M. Lawford"}]}, {"paperId": "722996d9dbba4ab04836567ab78f299df6c1366f", "externalIds": - {"MAG": "1932595713", "CorpusId": 60703693}, "url": "https://www.semanticscholar.org/paper/722996d9dbba4ab04836567ab78f299df6c1366f", + 101, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "https://researchrepository.ul.ie/articles/journal_contribution/The_role_of_inspection_in_software_quality_assurance/19840678/1/files/35252446.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-08-01", "journal": + {"volume": "29", "pages": "674-676", "name": "IEEE Trans. Software Eng."}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1766205", + "name": "M. Lawford"}]}, {"paperId": "722996d9dbba4ab04836567ab78f299df6c1366f", + "externalIds": {"MAG": "1932595713", "CorpusId": 60703693}, "corpusId": 60703693, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/722996d9dbba4ab04836567ab78f299df6c1366f", "title": "Improving software quality - the SQRL approach", "abstract": null, "venue": "", "year": 2003, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "9476a93ffdd186d4562f1e1fc9404bd06c2f9f55", - "externalIds": {"MAG": "2254224425", "CorpusId": 62027960}, "url": "https://www.semanticscholar.org/paper/9476a93ffdd186d4562f1e1fc9404bd06c2f9f55", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "9476a93ffdd186d4562f1e1fc9404bd06c2f9f55", "externalIds": {"MAG": "2254224425", + "CorpusId": 62027960}, "corpusId": 62027960, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9476a93ffdd186d4562f1e1fc9404bd06c2f9f55", "title": "Requirements documentation: a systematic approach", "abstract": "Unless you have a complete and precise description of a product\u2019s requirements, it is very unlikely that those requirements will be satisfied. An incomplete @@ -5184,12 +5753,14 @@ interactions: are a mathematical function of the inputs. In this model, the inputs are the actual physical inputs to the hardware/ software system. The", "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "abd0da36ea69f96547864fb260e7bf9d1177f6f0", - "externalIds": {"MAG": "1874928096", "CorpusId": 177924232}, "url": "https://www.semanticscholar.org/paper/abd0da36ea69f96547864fb260e7bf9d1177f6f0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "abd0da36ea69f96547864fb260e7bf9d1177f6f0", "externalIds": {"MAG": + "1874928096", "CorpusId": 177924232}, "corpusId": 177924232, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/abd0da36ea69f96547864fb260e7bf9d1177f6f0", "title": "Design through documentation: the path to software quality", "abstract": "does not mean imprecise or vague! \u2022 We need precise documentation. Abstract does not mean \u201cwrong\u201d. \u2022 An unbounded buffer is not an abstraction, @@ -5297,31 +5868,34 @@ interactions: of event sequences. \u2022 SOFTWARE QUALITY RESEARCH LABORATORY \u2022 University of Limerick 17 /48 designdocs.slides.fm 24 February 2003 17:00 Mathematical Definition of Document", "venue": "", "year": 2003, "referenceCount": 0, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "f62c7427d972a225ec5a9e0c708a9b91b3d55ba2", "externalIds": {"MAG": - "71747960", "CorpusId": 59776857}, "url": "https://www.semanticscholar.org/paper/f62c7427d972a225ec5a9e0c708a9b91b3d55ba2", + 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "f62c7427d972a225ec5a9e0c708a9b91b3d55ba2", + "externalIds": {"MAG": "71747960", "CorpusId": 59776857}, "corpusId": 59776857, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f62c7427d972a225ec5a9e0c708a9b91b3d55ba2", "title": "Give Meaning to the Status of Software Engineer", "abstract": null, "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "46", "pages": "12-13", - "name": "Communications of The ACM"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "202b1824a8d537721da7bf63c1232f5ac65e4773", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "46", "pages": "12-13", "name": "Communications of The ACM"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "202b1824a8d537721da7bf63c1232f5ac65e4773", "externalIds": {"MAG": "2160109349", "DBLP": "books/sp/02/Parnas02b", "DOI": - "10.1007/978-3-642-59412-0_27", "CorpusId": 1642993}, "url": "https://www.semanticscholar.org/paper/202b1824a8d537721da7bf63c1232f5ac65e4773", + "10.1007/978-3-642-59412-0_27", "CorpusId": 1642993}, "corpusId": 1642993, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/202b1824a8d537721da7bf63c1232f5ac65e4773", "title": "On a ''Buzzword'': Hierarchical Structure (Reprint)", "abstract": null, "venue": "Software Pioneers", "year": 2001, "referenceCount": 11, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "external"}, {"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-05-17", "journal": {"pages": "429-440"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "3410fad9ed7c5917756e763dfcc3a0c25afba626", - "externalIds": {"CorpusId": 17806524}, "url": "https://www.semanticscholar.org/paper/3410fad9ed7c5917756e763dfcc3a0c25afba626", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science", "Philosophy"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2001-05-17", "journal": {"pages": "429-440"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "3410fad9ed7c5917756e763dfcc3a0c25afba626", + "externalIds": {"CorpusId": 17806524}, "corpusId": 17806524, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3410fad9ed7c5917756e763dfcc3a0c25afba626", "title": "Basic Science for Software Developers", "abstract": "In many cases technological properties are expressed in terms of numerical parameters and the parameter values appear in product descriptions. This makes these limitations @@ -5330,23 +5904,26 @@ interactions: properties, know how to express them, know how to determine them for any specific product, and know how to take them into account when designing or evaluating a product.", "venue": "", "year": 2002, "referenceCount": 19, "citationCount": - 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2069753678", - "name": "P. Eng"}, {"authorId": "2058483632", "name": "Michael Soltys"}]}, - {"paperId": "42bf05547fe7f87f1ab325d833882cb717668cb8", "externalIds": {"DBLP": - "books/sp/02/Parnas02", "MAG": "1570753066", "DOI": "10.1007/978-3-642-59412-0_25", - "CorpusId": 38403470}, "url": "https://www.semanticscholar.org/paper/42bf05547fe7f87f1ab325d833882cb717668cb8", + 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "2069753678", "name": "P. Eng"}, {"authorId": "2058483632", "name": + "Michael Soltys"}]}, {"paperId": "42bf05547fe7f87f1ab325d833882cb717668cb8", + "externalIds": {"DBLP": "books/sp/02/Parnas02", "MAG": "1570753066", "DOI": + "10.1007/978-3-642-59412-0_25", "CorpusId": 38403470}, "corpusId": 38403470, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42bf05547fe7f87f1ab325d833882cb717668cb8", "title": "The Secret History of Information Hiding", "abstract": null, "venue": "Software Pioneers", "year": 2002, "referenceCount": 20, "citationCount": - 30, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"pages": "398-409"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "4ffd4edb0e91e34935f89595ed8c47b36ad25163", - "externalIds": {"MAG": "2056036618", "DBLP": "journals/cacm/Parnas02", "DOI": - "10.1145/581571.581605", "CorpusId": 6875699}, "url": "https://www.semanticscholar.org/paper/4ffd4edb0e91e34935f89595ed8c47b36ad25163", + 30, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"pages": "398-409"}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "4ffd4edb0e91e34935f89595ed8c47b36ad25163", "externalIds": + {"MAG": "2056036618", "DBLP": "journals/cacm/Parnas02", "DOI": "10.1145/581571.581605", + "CorpusId": 6875699}, "corpusId": 6875699, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4ffd4edb0e91e34935f89595ed8c47b36ad25163", "title": "Licensing software engineers in Canada", "abstract": "engineering are self-regulating. In each of these fields: \u2022 Practitioners deal directly with the general public, most of whom cannot determine whether or not a self-proclaimed @@ -5383,14 +5960,14 @@ interactions: removing the license of engineers who violate laws or codes of practice. They have been granted trademarks and other \u2026", "venue": "CACM", "year": 2002, "referenceCount": 2, "citationCount": 15, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Political Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Political Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2002-11-01", "journal": {"volume": "45", "pages": "96-98", "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "7a8fe64df465b6cd4dd604215b6cb09e60d87884", "externalIds": {"CorpusId": 17922849}, - "url": "https://www.semanticscholar.org/paper/7a8fe64df465b6cd4dd604215b6cb09e60d87884", + "corpusId": 17922849, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7a8fe64df465b6cd4dd604215b6cb09e60d87884", "title": "ASPECTS OF STRATEGIC DEFENSE SYSTEMS", "abstract": "On 28 June 1985, David Lorge Parnas, a respected computer scientist who has consulted extensively on United States defense projects, resignedfrom the Panel on Computing in @@ -5405,22 +5982,24 @@ interactions: Risks to the Public in the use of computer systems the Editors of Communications are pleased to reprint these essays.*", "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "04929d2d334f4f2591d798995557b5541ff8b075", "externalIds": {"MAG": - "2023582861", "DBLP": "journals/entcs/Parnas01", "DOI": "10.1016/S1571-0661(04)80930-7", - "CorpusId": 44407739}, "url": "https://www.semanticscholar.org/paper/04929d2d334f4f2591d798995557b5541ff8b075", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "04929d2d334f4f2591d798995557b5541ff8b075", + "externalIds": {"MAG": "2023582861", "DBLP": "journals/entcs/Parnas01", "DOI": + "10.1016/S1571-0661(04)80930-7", "CorpusId": 44407739}, "corpusId": 44407739, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/04929d2d334f4f2591d798995557b5541ff8b075", "title": "The Tabular Method for Relational Documentation", "abstract": null, "venue": "RelMiS", "year": 2003, "referenceCount": 0, "citationCount": 7, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2003-05-01", - "journal": {"pages": "1-26"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "1bf3191752ad402b0b6961d00e24cc6ddabbd2af", "externalIds": - {"MAG": "2154506347", "DBLP": "conf/re/Parnas01", "DOI": "10.1109/ISRE.2001.948565", - "CorpusId": 45028666}, "url": "https://www.semanticscholar.org/paper/1bf3191752ad402b0b6961d00e24cc6ddabbd2af", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2003-05-01", "journal": {"pages": "1-26"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "1bf3191752ad402b0b6961d00e24cc6ddabbd2af", + "externalIds": {"MAG": "2154506347", "DBLP": "conf/re/Parnas01", "DOI": "10.1109/ISRE.2001.948565", + "CorpusId": 45028666}, "corpusId": 45028666, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1bf3191752ad402b0b6961d00e24cc6ddabbd2af", "title": "Systematic documentation of requirements", "abstract": "A summary form only given. When writing a requirements document, it is almost impossible to know when you are done. If one works with a list of assertions (whether @@ -5429,14 +6008,15 @@ interactions: Notation allows one to produce documents that are demonstrably complete and consistent.", "venue": "Proceedings Fifth IEEE International Symposium on Requirements Engineering", "year": 2001, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2001-08-27", - "journal": {"pages": "248-", "name": "Proceedings Fifth IEEE International - Symposium on Requirements Engineering"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "299282e733d95abcc842abd5a3db0ea0e22018fe", - "externalIds": {"MAG": "174997718", "CorpusId": 36502854}, "url": "https://www.semanticscholar.org/paper/299282e733d95abcc842abd5a3db0ea0e22018fe", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2001-08-27", "journal": {"pages": "248-", "name": "Proceedings + Fifth IEEE International Symposium on Requirements Engineering"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "299282e733d95abcc842abd5a3db0ea0e22018fe", + "externalIds": {"MAG": "174997718", "CorpusId": 36502854}, "corpusId": 36502854, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/299282e733d95abcc842abd5a3db0ea0e22018fe", "title": "Less restrictive constructs for structured programs", "abstract": "The syntax and formal semantics of new control constructs that resemble Dijkstra\u2019s guarded commands [1] is given. Like programs built using the standard \u201cstructured @@ -5448,22 +6028,24 @@ interactions: are shown not to complicate either the syntax and semantics. The use of the new constructs is illustrated on some small examples.", "venue": "", "year": 2001, "referenceCount": 5, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-05-17", "journal": {"volume": "", "pages": "31-43", "name": ""}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1768785", "name": - "W. Wadge"}]}, {"paperId": "2e7f86a5fe938b77c6658d907e1c3b1d1150374f", "externalIds": - {"MAG": "2410435237", "CorpusId": 63389278}, "url": "https://www.semanticscholar.org/paper/2e7f86a5fe938b77c6658d907e1c3b1d1150374f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-05-17", "journal": {"volume": + "", "pages": "31-43", "name": ""}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}, {"authorId": "1768785", "name": "W. Wadge"}]}, {"paperId": "2e7f86a5fe938b77c6658d907e1c3b1d1150374f", + "externalIds": {"MAG": "2410435237", "CorpusId": 63389278}, "corpusId": 63389278, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2e7f86a5fe938b77c6658d907e1c3b1d1150374f", "title": "Description and specification", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "2001-05-17", "journal": {"volume": "", "pages": - "1-6", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "2069753678", "name": "P. Eng"}]}, {"paperId": "34c034df16c008d8e67c61b5ac2162f8c3ef376c", - "externalIds": {"MAG": "2911563277", "DOI": "10.1201/b10508-7", "CorpusId": - 16390301}, "url": "https://www.semanticscholar.org/paper/34c034df16c008d8e67c61b5ac2162f8c3ef376c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "2001-05-17", "journal": + {"volume": "", "pages": "1-6", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "2069753678", "name": "P. Eng"}]}, {"paperId": + "34c034df16c008d8e67c61b5ac2162f8c3ef376c", "externalIds": {"MAG": "2911563277", + "DOI": "10.1201/b10508-7", "CorpusId": 16390301}, "corpusId": 16390301, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/34c034df16c008d8e67c61b5ac2162f8c3ef376c", "title": "Software design", "abstract": "According to MIS terminology, Client/Server computing is new technology that yields solutions to many data management problems faced by modern organizations. The term Client/Server is used to @@ -5480,22 +6062,25 @@ interactions: in which the Server process resides. The network ties the server and client together, providing the medium through which the clients and the server communicate.", "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 182, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-05-17", "journal": {"volume": "", "pages": "137-142", "name": ""}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2069753678", - "name": "P. Eng"}]}, {"paperId": "3e9f4b41a91243b35e9ec9625b3d8a4a0d15e253", - "externalIds": {"MAG": "1485868977", "DOI": "10.1007/978-1-4419-8726-6_27", - "CorpusId": 166834900}, "url": "https://www.semanticscholar.org/paper/3e9f4b41a91243b35e9ec9625b3d8a4a0d15e253", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-05-17", "journal": {"volume": + "", "pages": "137-142", "name": ""}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}, {"authorId": "2069753678", "name": "P. Eng"}]}, {"paperId": + "3e9f4b41a91243b35e9ec9625b3d8a4a0d15e253", "externalIds": {"MAG": "1485868977", + "DOI": "10.1007/978-1-4419-8726-6_27", "CorpusId": 166834900}, "corpusId": + 166834900, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e9f4b41a91243b35e9ec9625b3d8a4a0d15e253", "title": "SDI: a violation of professional responsibility", "abstract": null, "venue": "", "year": 2001, "referenceCount": 3, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": - [{"category": "Political Science", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-05-17", - "journal": {"volume": "", "pages": "519-531", "name": ""}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "544636ac9fefc0d9251e39612ce8ee75f3f665f1", - "externalIds": {"MAG": "2076762386", "CorpusId": 23652553}, "url": "https://www.semanticscholar.org/paper/544636ac9fefc0d9251e39612ce8ee75f3f665f1", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political + Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": + "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2001-05-17", "journal": {"volume": "", "pages": + "519-531", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "544636ac9fefc0d9251e39612ce8ee75f3f665f1", "externalIds": {"MAG": + "2076762386", "CorpusId": 23652553}, "corpusId": 23652553, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/544636ac9fefc0d9251e39612ce8ee75f3f665f1", "title": "Software engineering research agendas panel (SERA) (panel session): \u201cwhat can''t we do, but need to learn how to do?\u201d", "abstract": "The software challenges of the new millennium include more mature users expecting @@ -5511,30 +6096,36 @@ interactions: The panel will consist of three parts: Position statements and brief discussion among panelists, questions/answers from the audience, and summary.", "venue": "ICSE 2001", "year": 2001, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-07-01", "journal": {"volume": "", "pages": "698", "name": ""}, "authors": - [{"authorId": "67346049", "name": "D. Rombach"}, {"authorId": "1746798", "name": - "M. Broy"}, {"authorId": "7688794", "name": "M. Evangelist"}, {"authorId": - "1714586", "name": "A. Mili"}, {"authorId": "1774539", "name": "L. Osterweil"}, - {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "661fd496a29f6cf41d4adc0f2094225613c6639c", - "externalIds": {"MAG": "2256538634", "CorpusId": 155842758}, "url": "https://www.semanticscholar.org/paper/661fd496a29f6cf41d4adc0f2094225613c6639c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2001-07-01", "journal": {"volume": "", "pages": "698", + "name": ""}, "authors": [{"authorId": "67346049", "name": "D. Rombach"}, {"authorId": + "1746798", "name": "M. Broy"}, {"authorId": "7688794", "name": "M. Evangelist"}, + {"authorId": "1714586", "name": "A. Mili"}, {"authorId": "1774539", "name": + "L. Osterweil"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "661fd496a29f6cf41d4adc0f2094225613c6639c", "externalIds": {"MAG": "2256538634", + "CorpusId": 155842758}, "corpusId": 155842758, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/661fd496a29f6cf41d4adc0f2094225613c6639c", "title": "The impact of money-free computer assisted barter systems", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], - "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}], "publicationTypes": - null, "publicationDate": "2001-05-17", "journal": null, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "6b24b854f18af3d64557236a7de3ad90d4ef411a", - "externalIds": {"MAG": "1557747554", "CorpusId": 109435264}, "url": "https://www.semanticscholar.org/paper/6b24b854f18af3d64557236a7de3ad90d4ef411a", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}], "publicationTypes": null, "publicationDate": "2001-05-17", + "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "6b24b854f18af3d64557236a7de3ad90d4ef411a", "externalIds": {"MAG": + "1557747554", "CorpusId": 109435264}, "corpusId": 109435264, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6b24b854f18af3d64557236a7de3ad90d4ef411a", "title": "Some software engineering principles", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-05-17", "journal": {"volume": "", "pages": "257-266", "name": ""}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "6d35afd3968fb129ac3a389d96d312ba70991ecb", - "externalIds": {"MAG": "181540721", "CorpusId": 17835478}, "url": "https://www.semanticscholar.org/paper/6d35afd3968fb129ac3a389d96d312ba70991ecb", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-05-17", "journal": {"volume": + "", "pages": "257-266", "name": ""}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "6d35afd3968fb129ac3a389d96d312ba70991ecb", "externalIds": + {"MAG": "181540721", "CorpusId": 17835478}, "corpusId": 17835478, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6d35afd3968fb129ac3a389d96d312ba70991ecb", "title": "Definition and Documentation of Software Architectures", "abstract": "This paper discusses the work of the software architect by describing a software architect\u2019s concerns and the documents that a software architect should @@ -5578,13 +6169,14 @@ interactions: architect makes the major decisions, including all that can affect the usability, safety, and maintainability of the structure.", "venue": "", "year": 2001, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1773783", "name": "D. Weiss"}, {"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "7c86ca3a4335af369eb2a20339f9e3704d31639f", "externalIds": - {"CorpusId": 2845642}, "url": "https://www.semanticscholar.org/paper/7c86ca3a4335af369eb2a20339f9e3704d31639f", + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1773783", "name": "D. Weiss"}, {"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "7c86ca3a4335af369eb2a20339f9e3704d31639f", + "externalIds": {"CorpusId": 2845642}, "corpusId": 2845642, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7c86ca3a4335af369eb2a20339f9e3704d31639f", "title": "Inspection Procedures for Critical Programs that Model Physical Phenomena", "abstract": "This paper addresses the problem of assuring the accuracy and trustworthiness of computer programs that are based on models @@ -5626,51 +6218,56 @@ interactions: in use today contains serious errors, euphemistically called \u201cbugs\u201d. Errors are always present", "venue": "", "year": 2001, "referenceCount": 31, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "51878288", "name": "Konstantin - Kreyman"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2501019", - "name": "S. Qiao"}]}, {"paperId": "844052c962113c5d95c8b794b8742c5f1fac03b5", - "externalIds": {"MAG": "2401169665", "CorpusId": 64127952}, "url": "https://www.semanticscholar.org/paper/844052c962113c5d95c8b794b8742c5f1fac03b5", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "51878288", + "name": "Konstantin Kreyman"}, {"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "2501019", "name": "S. Qiao"}]}, {"paperId": "844052c962113c5d95c8b794b8742c5f1fac03b5", + "externalIds": {"MAG": "2401169665", "CorpusId": 64127952}, "corpusId": 64127952, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/844052c962113c5d95c8b794b8742c5f1fac03b5", "title": "Concurrency and scheduling", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "2001-05-17", "journal": {"volume": "", "pages": - "383-386", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "2069753678", "name": "P. Eng"}]}, {"paperId": "8a655a88b5c8bd4ba3c811374a9f4e85bc7a9afb", - "externalIds": {"DBLP": "conf/seuh/Parnas01", "MAG": "184866531", "CorpusId": - 37492623}, "url": "https://www.semanticscholar.org/paper/8a655a88b5c8bd4ba3c811374a9f4e85bc7a9afb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "2001-05-17", "journal": + {"volume": "", "pages": "383-386", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "2069753678", "name": "P. Eng"}]}, {"paperId": + "8a655a88b5c8bd4ba3c811374a9f4e85bc7a9afb", "externalIds": {"DBLP": "conf/seuh/Parnas01", + "MAG": "184866531", "CorpusId": 37492623}, "corpusId": 37492623, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8a655a88b5c8bd4ba3c811374a9f4e85bc7a9afb", "title": "University Programmes in Software Development", "abstract": null, "venue": "SEUH", "year": 2001, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "9-10"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "a5b79c1d71805e70695b7fc3a7647a7e9e0a7383", - "externalIds": {"MAG": "2407621512", "CorpusId": 208949550}, "url": "https://www.semanticscholar.org/paper/a5b79c1d71805e70695b7fc3a7647a7e9e0a7383", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "9-10"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "a5b79c1d71805e70695b7fc3a7647a7e9e0a7383", + "externalIds": {"MAG": "2407621512", "CorpusId": 208949550}, "corpusId": 208949550, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a5b79c1d71805e70695b7fc3a7647a7e9e0a7383", "title": "Computers: boon or bane?", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "44", "pages": "168", "name": - "Communications of The ACM"}, "authors": [{"authorId": "34607009", "name": - "P. Neumann"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "44", "pages": "168", + "name": "Communications of The ACM"}, "authors": [{"authorId": "34607009", + "name": "P. Neumann"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ab830f3727b7a3a24b75d59035a1d92733e8e2f2", "externalIds": {"DBLP": "conf/icse/RombachBEMOP01", - "MAG": "2403321539", "CorpusId": 40111047}, "url": "https://www.semanticscholar.org/paper/ab830f3727b7a3a24b75d59035a1d92733e8e2f2", + "MAG": "2403321539", "CorpusId": 40111047}, "corpusId": 40111047, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ab830f3727b7a3a24b75d59035a1d92733e8e2f2", "title": "Software Engineering Research Agendas Panel (SERA): What Can''t We Do, But Need to Learn How to Do?", "abstract": null, "venue": "ICSE", "year": 2001, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": null, "journal": {"pages": "698"}, "authors": - [{"authorId": "145857323", "name": "H. D. Rombach"}, {"authorId": "1746798", - "name": "M. Broy"}, {"authorId": "7688794", "name": "M. Evangelist"}, {"authorId": - "1714586", "name": "A. Mili"}, {"authorId": "1774539", "name": "L. Osterweil"}, - {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "adc7119885b4e8e6862209a81409abfe4ab29086", - "externalIds": {"DBLP": "journals/cacm/NeumannP01", "MAG": "2016708727", "DOI": - "10.1145/365181.367913", "CorpusId": 5116758}, "url": "https://www.semanticscholar.org/paper/adc7119885b4e8e6862209a81409abfe4ab29086", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": null, "journal": {"pages": + "698"}, "authors": [{"authorId": "145857323", "name": "H. D. Rombach"}, {"authorId": + "1746798", "name": "M. Broy"}, {"authorId": "7688794", "name": "M. Evangelist"}, + {"authorId": "1714586", "name": "A. Mili"}, {"authorId": "1774539", "name": + "L. Osterweil"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "adc7119885b4e8e6862209a81409abfe4ab29086", "externalIds": {"DBLP": "journals/cacm/NeumannP01", + "MAG": "2016708727", "DOI": "10.1145/365181.367913", "CorpusId": 5116758}, + "corpusId": 5116758, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/adc7119885b4e8e6862209a81409abfe4ab29086", "title": "Inside risks: computers: boon or bane?", "abstract": "P redicting the long-term effects of computers is both difficult and easy: we won''t get it right, but we won''t see ourselves proven wrong. Rather than try, we present @@ -5706,35 +6303,39 @@ interactions: to think. Will computers ultimately enhance or reduce our ability to make good decisions? \u2022 Throughout history, we have tried \u2026", "venue": "CACM", "year": 2001, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-03-01", "journal": {"volume": "44", "pages": "168", "name": "Commun. - ACM"}, "authors": [{"authorId": "34607009", "name": "P. Neumann"}, {"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "bb31d6c46887144e7d5937bcc2e9586dc4f0491d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-03-01", "journal": {"volume": "44", "pages": "168", + "name": "Commun. ACM"}, "authors": [{"authorId": "34607009", "name": "P. Neumann"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "bb31d6c46887144e7d5937bcc2e9586dc4f0491d", "externalIds": {"MAG": "127781232", "DBLP": "journals/entcs/KahlPS01", "DOI": - "10.1016/S1571-0661(05)80010-6", "CorpusId": 206170497}, "url": "https://www.semanticscholar.org/paper/bb31d6c46887144e7d5937bcc2e9586dc4f0491d", + "10.1016/S1571-0661(05)80010-6", "CorpusId": 206170497}, "corpusId": 206170497, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb31d6c46887144e7d5937bcc2e9586dc4f0491d", "title": "RelMiS 2001 - Preface", "abstract": null, "venue": "RelMiS", "year": 2001, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": null, "journal": {"pages": "221-223"}, "authors": - [{"authorId": "1794893", "name": "Wolfram Kahl"}, {"authorId": "1726629", - "name": "D. Parnas"}, {"authorId": "1828618", "name": "Gunther Schmidt"}]}, - {"paperId": "dba99df140c3547ae279957a2cf265d92f65bffb", "externalIds": {"MAG": - "1481028594", "DBLP": "conf/cav/Parnas01", "DOI": "10.1007/3-540-44585-4_1", - "CorpusId": 20146344}, "url": "https://www.semanticscholar.org/paper/dba99df140c3547ae279957a2cf265d92f65bffb", - "title": "Software Documentation and the Verification Process", "abstract": - null, "venue": "CAV", "year": 2001, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2001-07-18", - "journal": {"pages": "1"}, "authors": [{"authorId": "1726629", "name": "D. - Parnas"}]}, {"paperId": "11fca5196c31eeb70d5183dd668eccf572436002", "externalIds": - {"MAG": "1607843548", "CorpusId": 60875859}, "url": "https://www.semanticscholar.org/paper/11fca5196c31eeb70d5183dd668eccf572436002", + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, + "journal": {"pages": "221-223"}, "authors": [{"authorId": "1794893", "name": + "Wolfram Kahl"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "1828618", "name": "Gunther Schmidt"}]}, {"paperId": "dba99df140c3547ae279957a2cf265d92f65bffb", + "externalIds": {"MAG": "1481028594", "DBLP": "conf/cav/Parnas01", "DOI": "10.1007/3-540-44585-4_1", + "CorpusId": 20146344}, "corpusId": 20146344, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/dba99df140c3547ae279957a2cf265d92f65bffb", + "title": "Software Documentation and the Verification Process", "abstract": + null, "venue": "CAV", "year": 2001, "referenceCount": 0, "citationCount": + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007%2F3-540-44585-4_1.pdf", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2001-07-18", "journal": {"pages": "1"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "11fca5196c31eeb70d5183dd668eccf572436002", + "externalIds": {"MAG": "1607843548", "CorpusId": 60875859}, "corpusId": 60875859, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/11fca5196c31eeb70d5183dd668eccf572436002", "title": "Organizing, and documenting component-oriented toolkits", "abstract": "Component-Oriented Software Technology started to emerge during the last few years. The purpose is to make it easier to build new applications from @@ -5752,13 +6353,14 @@ interactions: rules, and then (iii)\u00a0we demonstrate that such tools can be used to check existing CO-Toolkits code and report any rule violations back to developers.", "venue": "", "year": 2000, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}, {"authorId": "2051228", "name": "M. Radaideh"}]}, {"paperId": - "1cebfde069b3250b03d3e3af831f22261839bb2a", "externalIds": {"MAG": "1509712248", - "CorpusId": 180160}, "url": "https://www.semanticscholar.org/paper/1cebfde069b3250b03d3e3af831f22261839bb2a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "2051228", "name": "M. Radaideh"}]}, {"paperId": "1cebfde069b3250b03d3e3af831f22261839bb2a", + "externalIds": {"MAG": "1509712248", "CorpusId": 180160}, "corpusId": 180160, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1cebfde069b3250b03d3e3af831f22261839bb2a", "title": "Deriving real-time monitors from system requirements documentation", "abstract": "During system testing, determining if the observed behaviour of a real\u2013time system is consistent with its requirements specification @@ -5806,13 +6408,14 @@ interactions: optimizations that can be done to reduce this complexity or restrictions on the documentation that will ensure that the complexity is tractable?", "venue": "", "year": 2000, "referenceCount": 14, "citationCount": 32, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}, {"authorId": "30529938", "name": "D. Peters"}]}, {"paperId": - "36d54caad9d82b93f51267f0ce1c7f9a73a786f8", "externalIds": {"CorpusId": 15917134}, - "url": "https://www.semanticscholar.org/paper/36d54caad9d82b93f51267f0ce1c7f9a73a786f8", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "30529938", "name": "D. Peters"}]}, {"paperId": "36d54caad9d82b93f51267f0ce1c7f9a73a786f8", + "externalIds": {"CorpusId": 15917134}, "corpusId": 15917134, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/36d54caad9d82b93f51267f0ce1c7f9a73a786f8", "title": "On Documenting the Requirements for Computer Programs Based on Models of Physical Phenomena", "abstract": "Programs for use by Scientists and Engineers are usually embodiments of mathematical models of physical phenomena. Complete @@ -5860,12 +6463,12 @@ interactions: good documentation improves software usability and maintainabiltiy; these are very important for reducing long-term software related expenses.", "venue": "", "year": 2000, "referenceCount": 27, "citationCount": 10, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "51878288", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "51878288", "name": "Konstantin Kreyman"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "4d6779a0fee3a1a12724a59ff199dbbc19a531e3", "externalIds": {"CorpusId": - 7288972}, "url": "https://www.semanticscholar.org/paper/4d6779a0fee3a1a12724a59ff199dbbc19a531e3", + 7288972}, "corpusId": 7288972, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4d6779a0fee3a1a12724a59ff199dbbc19a531e3", "title": "Requirements-based Monitor s for Real-Time Systems", "abstract": "\" $# % &# ('') * ''% $ \" + , , \" -. / 01 # %23#* 4 & ( 5 ( 6 7 \" *8:9 % * <;1 73 *= & (9 > ( 6 7 ? , , @ 7 9 ''A !;1 \"0 9 # * < 3 ! = BC * <;: @@ -5933,13 +6536,14 @@ interactions: \" d 7 S ''A 4 7 0!;1 \u0096BR 7 I W , , \u03bc ( 3 \u0092 7 ? \" % *-h & +0 # 9 ''A 4 )B6 % 7+ 01 # S Y 7 \" * h;: SB67 # 7O 7 ^ \" % h ; =P h 7 ^ , , \u00b6;1 7 4= 9 *-", "venue": "", "year": 2000, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "30529938", "name": "D. Peters"}, {"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "74de6cd767ad1223dacb8bd71bf3b022eb05d0e3", "externalIds": - {"DBLP": "conf/icre/Parnas00a", "MAG": "1887098691", "DOI": "10.1109/ICRE.2000.855605", - "CorpusId": 31383183}, "url": "https://www.semanticscholar.org/paper/74de6cd767ad1223dacb8bd71bf3b022eb05d0e3", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "30529938", "name": "D. Peters"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "74de6cd767ad1223dacb8bd71bf3b022eb05d0e3", + "externalIds": {"DBLP": "conf/icre/Parnas00a", "MAG": "1887098691", "DOI": + "10.1109/ICRE.2000.855605", "CorpusId": 31383183}, "corpusId": 31383183, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/74de6cd767ad1223dacb8bd71bf3b022eb05d0e3", "title": "Two positions on licensing", "abstract": "The Council of the Association of Car Manufacturers (ACM) has reviewed the findings of the ACM Advisory Panel on Driver Licensing which was convened to look at a number of issues related @@ -5967,15 +6571,16 @@ interactions: might even he harmful. However,", "venue": "Proceedings Fourth International Conference on Requirements Engineering. ICRE 2000. (Cat. No.98TB100219)", "year": 2000, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", - "Review"], "publicationDate": "2000-06-19", "journal": {"pages": "154-155", - "name": "Proceedings Fourth International Conference on Requirements Engineering. - ICRE 2000. (Cat. No.98TB100219)"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "7785a909cec02d95e8515779fe8e6fea6f7554ed", "externalIds": - {"DBLP": "conf/icre/Parnas00", "MAG": "1720011207", "DOI": "10.1109/ICRE.2000.855594", - "CorpusId": 44512775}, "url": "https://www.semanticscholar.org/paper/7785a909cec02d95e8515779fe8e6fea6f7554ed", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference", "Review"], "publicationDate": "2000-06-19", + "journal": {"pages": "154-155", "name": "Proceedings Fourth International + Conference on Requirements Engineering. ICRE 2000. (Cat. No.98TB100219)"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "7785a909cec02d95e8515779fe8e6fea6f7554ed", + "externalIds": {"DBLP": "conf/icre/Parnas00", "MAG": "1720011207", "DOI": + "10.1109/ICRE.2000.855594", "CorpusId": 44512775}, "corpusId": 44512775, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7785a909cec02d95e8515779fe8e6fea6f7554ed", "title": "Requirements documentation: why a formal basis is essential", "abstract": "Unless you have a precise description of your product''s requirements, it is very unlikely that you will satisfy them. Only if the implementer already @@ -5984,15 +6589,19 @@ interactions: producing a requirements document worthwhile.", "venue": "Proceedings Fourth International Conference on Requirements Engineering. ICRE 2000. (Cat. No.98TB100219)", "year": 2000, "referenceCount": 7, "citationCount": 8, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2000-06-19", "journal": {"pages": "81-82", "name": "Proceedings - Fourth International Conference on Requirements Engineering. ICRE 2000. (Cat. - No.98TB100219)"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "a9ba725580c860ca0e1d939465adaf2ed9670097", "externalIds": {"MAG": - "2129318380", "DBLP": "journals/tse/PetersP02", "DOI": "10.1145/347324.348874", - "CorpusId": 12443509}, "url": "https://www.semanticscholar.org/paper/a9ba725580c860ca0e1d939465adaf2ed9670097", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2000-06-19", "journal": + {"pages": "81-82", "name": "Proceedings Fourth International Conference on + Requirements Engineering. ICRE 2000. (Cat. No.98TB100219)"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "a9ba725580c860ca0e1d939465adaf2ed9670097", + "externalIds": {"MAG": "2129318380", "DBLP": "journals/tse/PetersP02", "DOI": + "10.1145/347324.348874", "CorpusId": 12443509}, "corpusId": 12443509, "publicationVenue": + {"id": "289bfdda-eab3-4c9a-97be-ef1e0f9ddfc0", "name": "International Symposium + on Software Testing and Analysis", "type": "conference", "alternate_names": + ["ISSTA", "Int Symp Softw Test Anal"], "url": "https://dl.acm.org/conference/issta"}, + "url": "https://www.semanticscholar.org/paper/a9ba725580c860ca0e1d939465adaf2ed9670097", "title": "Requirements-based monitors for real-time systems", "abstract": "Before designing safety- or mission-critical real-time systems, a specification of the required behaviour of the system should be produced and reviewed by @@ -6014,7 +6623,8 @@ interactions: We describe the conclusions that can be drawn when using a monitor to observe system behaviour.", "venue": "International Symposium on Software Testing and Analysis", "year": 2000, "referenceCount": 49, "citationCount": 95, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/347636.348874", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2000-08-01", "journal": {"volume": "28", "pages": @@ -6022,37 +6632,41 @@ interactions: "30529938", "name": "D. Peters"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "aa4d795d70cbffd487423c2c4c81a6a6b6f908a5", "externalIds": {"MAG": "26798452", "DBLP": "conf/amast/ParnasT00", "DOI": "10.1007/3-540-45499-3_3", - "CorpusId": 20953419}, "url": "https://www.semanticscholar.org/paper/aa4d795d70cbffd487423c2c4c81a6a6b6f908a5", + "CorpusId": 20953419}, "corpusId": 20953419, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/aa4d795d70cbffd487423c2c4c81a6a6b6f908a5", "title": "Making Mathematical Methods More Practical for Software Developers (Invited Talk)", "abstract": null, "venue": "AMAST", "year": 2000, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-05-20", "journal": - {"pages": "9-10"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "bbd5a66b57f30c565e5b7eb1a6c715a816febf77", "externalIds": {"CorpusId": - 16455115}, "url": "https://www.semanticscholar.org/paper/bbd5a66b57f30c565e5b7eb1a6c715a816febf77", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-05-20", "journal": {"pages": "9-10"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "bbd5a66b57f30c565e5b7eb1a6c715a816febf77", + "externalIds": {"CorpusId": 16455115}, "corpusId": 16455115, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bbd5a66b57f30c565e5b7eb1a6c715a816febf77", "title": "Abstract Types Defined as Classes of Variables 4- 4", "abstract": "TYPES DEFINED AS CLASSES OF VARIABLES 44D. L. Parnas , John E. Shore l, David Weiss i", "venue": "", "year": 2000, "referenceCount": 21, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "35201459", "name": - "J. Shore"}]}, {"paperId": "c645dc9a74bdbe6643f9445c8ee67d2a6a56c1e7", "externalIds": - {"MAG": "1588792073", "DBLP": "conf/amast/Parnas00", "DOI": "10.1007/3-540-45499-3_1", - "CorpusId": 44748376}, "url": "https://www.semanticscholar.org/paper/c645dc9a74bdbe6643f9445c8ee67d2a6a56c1e7", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "35201459", "name": "J. Shore"}]}, {"paperId": "c645dc9a74bdbe6643f9445c8ee67d2a6a56c1e7", + "externalIds": {"MAG": "1588792073", "DBLP": "conf/amast/Parnas00", "DOI": + "10.1007/3-540-45499-3_1", "CorpusId": 44748376}, "corpusId": 44748376, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c645dc9a74bdbe6643f9445c8ee67d2a6a56c1e7", "title": "Invited Talk: A Software Engineering Program of Lasting Value", "abstract": null, "venue": "AMAST", "year": 2000, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2000-05-20", "journal": {"pages": - "1"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "db9dcf028c23f39af0fface30c5cf1fe6bed3c63", "externalIds": {"MAG": "1545924132", - "DBLP": "conf/icfem/Parnas00", "DOI": "10.1109/ICFEM.2000.10001", "CorpusId": - 31661758}, "url": "https://www.semanticscholar.org/paper/db9dcf028c23f39af0fface30c5cf1fe6bed3c63", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2000-05-20", "journal": + {"pages": "1"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "db9dcf028c23f39af0fface30c5cf1fe6bed3c63", "externalIds": {"MAG": + "1545924132", "DBLP": "conf/icfem/Parnas00", "DOI": "10.1109/ICFEM.2000.10001", + "CorpusId": 31661758}, "corpusId": 31661758, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/db9dcf028c23f39af0fface30c5cf1fe6bed3c63", "title": "The use of mathematics in software engineering", "abstract": "Logicians may want to consider the following statements: All Engineers use mathematics in their work. Software Engineers do not use mathematics in their work. What @@ -6069,23 +6683,27 @@ interactions: Engineering Methods (ICFEM''00)", "venue": "ICFEM 2000. Third IEEE International Conference on Formal Engineering Methods", "year": 2000, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": null, - "journal": {"pages": "1-1", "name": "ICFEM 2000. Third IEEE International - Conference on Formal Engineering Methods"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "1892b47a3b0707538ae0b21ca4e258eb97239403", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": null, "journal": {"pages": "1-1", "name": "ICFEM 2000. + Third IEEE International Conference on Formal Engineering Methods"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "1892b47a3b0707538ae0b21ca4e258eb97239403", "externalIds": {"DBLP": "conf/tacas/ParnasP99", "MAG": "1587814165", "DOI": - "10.1007/3-540-49059-0_24", "CorpusId": 15635759}, "url": "https://www.semanticscholar.org/paper/1892b47a3b0707538ae0b21ca4e258eb97239403", + "10.1007/3-540-49059-0_24", "CorpusId": 15635759}, "corpusId": 15635759, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1892b47a3b0707538ae0b21ca4e258eb97239403", "title": "An Easily Extensible Toolset for Tabular Mathematical Expressions", "abstract": null, "venue": "TACAS", "year": 1999, "referenceCount": 30, "citationCount": - 12, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1999-03-22", "journal": - {"pages": "345-359"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "30529938", "name": "D. Peters"}]}, {"paperId": "1e81b331b2158e79f000d9be2e5003df1d37bf15", - "externalIds": {"MAG": "1572333708", "CorpusId": 15085596}, "url": "https://www.semanticscholar.org/paper/1e81b331b2158e79f000d9be2e5003df1d37bf15", + 12, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007%2F3-540-49059-0_24.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-03-22", "journal": {"pages": "345-359"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "30529938", "name": + "D. Peters"}]}, {"paperId": "1e81b331b2158e79f000d9be2e5003df1d37bf15", "externalIds": + {"MAG": "1572333708", "CorpusId": 15085596}, "corpusId": 15085596, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1e81b331b2158e79f000d9be2e5003df1d37bf15", "title": "Myths and Methods: Is There a Scientific Basis for Y2K Inspections ?", "abstract": "Although it is possible to use scientifically based mathematical models in the analysis of software, most programmers rely on their intuitive @@ -6100,12 +6718,13 @@ interactions: myths and sound inspection methods. If we base our program analysis on unsound methods, we are \"building on sand\" and what we do will fail.", "venue": "", "year": 1999, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "23dbb0132fe1cbf9098390c7aeb47f3c16765e4c", - "externalIds": {"CorpusId": 17580466}, "url": "https://www.semanticscholar.org/paper/23dbb0132fe1cbf9098390c7aeb47f3c16765e4c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "23dbb0132fe1cbf9098390c7aeb47f3c16765e4c", "externalIds": {"CorpusId": 17580466}, + "corpusId": 17580466, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/23dbb0132fe1cbf9098390c7aeb47f3c16765e4c", "title": "Estimating Software Reliability Using Inverse Sampling", "abstract": "|This paper addresses one of the perpetual questions faced by software developers, \\How much testing is enough testing?\". Software testing accounts for a substantial @@ -6136,12 +6755,12 @@ interactions: David L. Parnas is with the Communications Research Laboratory, McMaster University, Hamilton, Ontario, Canada L8S 4K1. e-mail: parnas@qusunt.crl.mcmaster.ca.", "venue": "", "year": 1999, "referenceCount": 20, "citationCount": 4, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2111282546", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2111282546", "name": "Balwant Singh"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "26ae89f725ede99590b3a63e0780872c32a6871a", "externalIds": {"CorpusId": - 18441581}, "url": "https://www.semanticscholar.org/paper/26ae89f725ede99590b3a63e0780872c32a6871a", + 18441581}, "corpusId": 18441581, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/26ae89f725ede99590b3a63e0780872c32a6871a", "title": "ASPECTS OF STRATEGIC DEFENSE SYSTEMS A former member of the SD 10 Panel on Computing in Support of Battle Management explains why he believes the \u201c star wars \u201d effort will not achieve its", "abstract": "On @@ -6158,12 +6777,12 @@ interactions: Forum on Risks to the Public in the use of computer systems the Editors of Communications are pleased to reprint these essays.\u201d", "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1726629", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "276331084d6a33c82d7db2b2b11773b55e714a11", "externalIds": {"MAG": "2142231088", "DOI": "10.1109/SESD.1999.781105", "CorpusId": - 62479298}, "url": "https://www.semanticscholar.org/paper/276331084d6a33c82d7db2b2b11773b55e714a11", + 62479298}, "corpusId": 62479298, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/276331084d6a33c82d7db2b2b11773b55e714a11", "title": "Building on rock: from mills''program functions to tabular notation", "abstract": "Whereas many popular software engineering approaches are built on newly invented, often poorly understood, notations and concepts, Harlan @@ -6187,14 +6806,15 @@ interactions: based on these notations.", "venue": "Proceedings. Science and Engineering for Software Development: A Recognition of Harlin D. Mills Legacy (Cat. No. PR00010)", "year": 1999, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1999-05-18", "journal": {"pages": "2-3", "name": "Proceedings. Science and - Engineering for Software Development: A Recognition of Harlin D. Mills Legacy - (Cat. No. PR00010)"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "2e5e90995068a09d26eb7b89851ce6f38b3df4d4", "externalIds": {"CorpusId": - 2870030}, "url": "https://www.semanticscholar.org/paper/2e5e90995068a09d26eb7b89851ce6f38b3df4d4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-05-18", "journal": {"pages": + "2-3", "name": "Proceedings. Science and Engineering for Software Development: + A Recognition of Harlin D. Mills Legacy (Cat. No. PR00010)"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "2e5e90995068a09d26eb7b89851ce6f38b3df4d4", + "externalIds": {"CorpusId": 2870030}, "corpusId": 2870030, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2e5e90995068a09d26eb7b89851ce6f38b3df4d4", "title": "Requirements Capture , Documentation , and Validation June , 13-18 1999", "abstract": "State Machines have been used to specify the case study \"Light Control System\". The ASM-approach allows one to specify system at @@ -6212,14 +6832,15 @@ interactions: Pisa \u2013 Italy We propose a rigorous model for the informally given requirements of the light control system in terms of ASMs (Abstract State Machines).", "venue": "", "year": 1999, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1692943", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1692943", "name": "E. B\u00f6rger"}, {"authorId": "2080250488", "name": "B. H\u00f6rger"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "145857323", "name": "H. D. Rombach"}]}, {"paperId": "35c0c8d0008614147f5c5cde60b4ed51c20d30eb", "externalIds": {"MAG": "2002501552", "DBLP": "journals/cacm/Parnas99", "DOI": - "10.1145/301353.301442", "CorpusId": 2530826}, "url": "https://www.semanticscholar.org/paper/35c0c8d0008614147f5c5cde60b4ed51c20d30eb", + "10.1145/301353.301442", "CorpusId": 2530826}, "corpusId": 2530826, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/35c0c8d0008614147f5c5cde60b4ed51c20d30eb", "title": "Inside risks: ten myths about Y2K inspections", "abstract": "A s I write this, the alarmist reports about Y2K are being replaced with more comforting statements. Repeatedly, I hear, \" We have met the enemy and fixed @@ -6251,21 +6872,24 @@ interactions: dates is immune to Y2K problems. Software obtained by software reuse may process dates even though it need not do so. Myth 6. Systems can be tested one-at-a-time by \u2026", "venue": "CACM", "year": 1999, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1999-05-01", "journal": - {"volume": "42", "pages": "128", "name": "Commun. ACM"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "6bcf9fd92b7d677ee717c1b03875e9a68c9ae9f6", - "externalIds": {"MAG": "113907331", "CorpusId": 209401840}, "url": "https://www.semanticscholar.org/paper/6bcf9fd92b7d677ee717c1b03875e9a68c9ae9f6", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1999-05-01", "journal": {"volume": "42", "pages": "128", "name": "Commun. + ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "6bcf9fd92b7d677ee717c1b03875e9a68c9ae9f6", "externalIds": {"MAG": "113907331", + "CorpusId": 209401840}, "corpusId": 209401840, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6bcf9fd92b7d677ee717c1b03875e9a68c9ae9f6", "title": "Ten Myths About Y2K Inspections.", "abstract": null, "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "42", "pages": "128", - "name": "Communications of The ACM"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "8396ae8a5eb9bdc97fbbc99d64af9190b7a1ef86", - "externalIds": {"MAG": "210052250", "CorpusId": 107548680}, "url": "https://www.semanticscholar.org/paper/8396ae8a5eb9bdc97fbbc99d64af9190b7a1ef86", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "42", "pages": "128", "name": "Communications of The ACM"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "8396ae8a5eb9bdc97fbbc99d64af9190b7a1ef86", + "externalIds": {"MAG": "210052250", "CorpusId": 107548680}, "corpusId": 107548680, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8396ae8a5eb9bdc97fbbc99d64af9190b7a1ef86", "title": "Software Engineering Research and Education: Seeking a new Agenda Taking Stock of Software Engineering Research and Education What do we know? What should we know?", "abstract": "Preface Software Engineering should address, @@ -6299,14 +6923,15 @@ interactions: while precisely documenting all software design decisions. Implement the software as a set of well-structured and documented programs.", "venue": "", "year": 1999, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2725352", - "name": "E. Denert"}, {"authorId": "145983623", "name": "Daniel Hoffman"}, - {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "94f7e332e0917528102ba2431aae97d5ee93c160", - "externalIds": {"DBLP": "conf/tools/Parnas99a", "MAG": "1503358322", "DOI": - "10.1109/TOOLS.1999.10078", "CorpusId": 13106522}, "url": "https://www.semanticscholar.org/paper/94f7e332e0917528102ba2431aae97d5ee93c160", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "2725352", "name": "E. Denert"}, {"authorId": "145983623", "name": + "Daniel Hoffman"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "94f7e332e0917528102ba2431aae97d5ee93c160", "externalIds": {"DBLP": "conf/tools/Parnas99a", + "MAG": "1503358322", "DOI": "10.1109/TOOLS.1999.10078", "CorpusId": 13106522}, + "corpusId": 13106522, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/94f7e332e0917528102ba2431aae97d5ee93c160", "title": "Systematic Techniques for Inspecting Critical Software", "abstract": "Software is devilishly hard to inspect. Serious errors can hide for years. Consequently, many are hesitant to employ software in safety-critical applications @@ -6325,13 +6950,14 @@ interactions: inspect safety-critical software in a nuclear power plant, and then improved based on that experience.", "venue": "TOOLS", "year": 1999, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "1999-08-01", "journal": {"pages": "410"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "b3269cb5a162661206cf58c30fc1a1d903d7ad8c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1999-08-01", "journal": {"pages": "410"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "b3269cb5a162661206cf58c30fc1a1d903d7ad8c", "externalIds": {"MAG": "2080777191", "DBLP": "journals/sigsoft/Parnas99a", - "DOI": "10.1145/329155.329163", "CorpusId": 5851245}, "url": "https://www.semanticscholar.org/paper/b3269cb5a162661206cf58c30fc1a1d903d7ad8c", + "DOI": "10.1145/329155.329163", "CorpusId": 5851245}, "corpusId": 5851245, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b3269cb5a162661206cf58c30fc1a1d903d7ad8c", "title": "Parnas on Parnas: a life of indecision", "abstract": "When asked to prepare this biography, I took the occasion to review my life and realized that I have spent it unable to decide whether to be a scientist or an engineer @@ -6365,28 +6991,30 @@ interactions: In mathematics, the researchers make up all the rules; in engineering we must observe and exploit the natural laws of the universe. It was while teaching a course in \u2026", "venue": "SOEN", "year": 1999, "referenceCount": 0, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1999-07-01", - "journal": {"volume": "24", "pages": "47-49", "name": "ACM SIGSOFT Softw. - Eng. Notes"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Education", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "1999-07-01", "journal": {"volume": "24", "pages": "47-49", "name": "ACM SIGSOFT + Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "c104b6d4971214379ebb64b4f436e79d4a629f8b", "externalIds": {"DBLP": "conf/tools/Parnas99", "MAG": "163513927", "DOI": "10.1109/TOOLS.1999.10042", - "CorpusId": 27715747}, "url": "https://www.semanticscholar.org/paper/c104b6d4971214379ebb64b4f436e79d4a629f8b", + "CorpusId": 27715747}, "corpusId": 27715747, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c104b6d4971214379ebb64b4f436e79d4a629f8b", "title": "Tools for Component Documentation, Analysis and Testing", "abstract": "The best software components will be hard to use unless they are accompanied by precise accurate documentation. The talk describes some powerful notation for writing such documentation and tools that can be used to produce such documentation and check that it accurately describes the software.", "venue": "TOOLS", "year": 1999, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1999-08-01", "journal": - {"pages": "2"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "c943f8301722bcedcc7c6384e1b156f94690dcc0", "externalIds": {"CorpusId": - 17737443}, "url": "https://www.semanticscholar.org/paper/c943f8301722bcedcc7c6384e1b156f94690dcc0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-08-01", "journal": {"pages": "2"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "c943f8301722bcedcc7c6384e1b156f94690dcc0", + "externalIds": {"CorpusId": 17737443}, "corpusId": 17737443, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c943f8301722bcedcc7c6384e1b156f94690dcc0", "title": "Requirements Capture, Documentation, and Validation Using Formal Methods in Uml to Verify Requirement Properties on Specifications .7 Lessons Learnt in Transferring Formal Requirements Validation Techniques to Design @@ -6407,14 +7035,18 @@ interactions: a rigorous model for the informally given requirements of the light control system in terms of ASMs (Abstract State Machines).", "venue": "", "year": 1999, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1692943", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1692943", "name": "E. B\u00f6rger"}, {"authorId": "2080250488", "name": "B. H\u00f6rger"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "145857323", "name": "H. D. Rombach"}]}, {"paperId": "cea798850b3331f0f37e0c763e3f22cc3d72ec9b", "externalIds": {"DBLP": "journals/software/Parnas99", "MAG": "2136448357", - "DOI": "10.1109/52.805469", "CorpusId": 42623072}, "url": "https://www.semanticscholar.org/paper/cea798850b3331f0f37e0c763e3f22cc3d72ec9b", + "DOI": "10.1109/52.805469", "CorpusId": 42623072}, "corpusId": 42623072, "publicationVenue": + {"id": "119227a6-1b94-433e-a52d-8445a387dbbe", "name": "IEEE Software", "type": + "journal", "alternate_names": ["IEEE Softw"], "issn": "0740-7459", "url": + "http://www.computer.org/software", "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=52"]}, + "url": "https://www.semanticscholar.org/paper/cea798850b3331f0f37e0c763e3f22cc3d72ec9b", "title": "Software Engineering Programs Are Not Computer Science Programs", "abstract": "Software Engineering programs have become a source of contention in many universities. Computer Science departments, many of which have used @@ -6425,13 +7057,14 @@ interactions: that we need SE programs that follow the traditional engineering approach to professional education.", "venue": "IEEE Software", "year": 1999, "referenceCount": 4, "citationCount": 167, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1999-11-01", "journal": {"volume": - "16", "pages": "19-30", "name": "IEEE Softw."}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "0c407feb01c75fa28286d3f3abd428c43020807e", - "externalIds": {"CorpusId": 14239646}, "url": "https://www.semanticscholar.org/paper/0c407feb01c75fa28286d3f3abd428c43020807e", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1999-11-01", "journal": + {"volume": "16", "pages": "19-30", "name": "IEEE Softw."}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "0c407feb01c75fa28286d3f3abd428c43020807e", + "externalIds": {"CorpusId": 14239646}, "corpusId": 14239646, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0c407feb01c75fa28286d3f3abd428c43020807e", "title": "Using Model Checking and Simula- Tion to Detect a Safety Violation in a Control System Speciication. Submitted for Publication", "abstract": "111 S. Easterbrook and J. Callahan. Formal methods for veriication and validation @@ -6468,24 +7101,25 @@ interactions: can do so by writing contracts that require developers to demonstrate before the software is designed that the behavior \u2026", "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1796685", "name": "S. Faulk"}, - {"authorId": "13611968", "name": "L. Finneran"}, {"authorId": "144110640", - "name": "J. Kirby"}, {"authorId": "2107523809", "name": "S. Shah"}, {"authorId": - "151065869", "name": "J. Sutton"}, {"authorId": "3093759", "name": "C. Heitmeyer"}, - {"authorId": "2685868", "name": "B. Labaw"}, {"authorId": "66098644", "name": - "Tools"}, {"authorId": "143658457", "name": "M. Archer"}, {"authorId": "35119539", - "name": "R. Bharadwaj"}, {"authorId": "3093759", "name": "C. Heitmeyer"}, - {"authorId": "2112810163", "name": "R. D. Jeeords"}, {"authorId": "2685868", - "name": "B. Labaw"}, {"authorId": "1758065", "name": "S. Owre"}, {"authorId": - "6235605", "name": "J. Rushby"}, {"authorId": "143607110", "name": "N. Shankar"}, - {"authorId": "69898311", "name": "F. Von"}, {"authorId": "2112852016", "name": - "Henke"}, {"authorId": "2080075625", "name": "J. van Schouwen"}, {"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "48637958", "name": "J. Madey"}]}, - {"paperId": "7958db619e019e87f4e3f18537e01de5e746fd09", "externalIds": {"DBLP": - "journals/sigsoft/Parnas98", "MAG": "2011744986", "DOI": "10.1145/279437.279464", - "CorpusId": 10352532}, "url": "https://www.semanticscholar.org/paper/7958db619e019e87f4e3f18537e01de5e746fd09", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1796685", + "name": "S. Faulk"}, {"authorId": "13611968", "name": "L. Finneran"}, {"authorId": + "144110640", "name": "J. Kirby"}, {"authorId": "2107523809", "name": "S. Shah"}, + {"authorId": "151065869", "name": "J. Sutton"}, {"authorId": "3093759", "name": + "C. Heitmeyer"}, {"authorId": "2685868", "name": "B. Labaw"}, {"authorId": + "66098644", "name": "Tools"}, {"authorId": "143658457", "name": "M. Archer"}, + {"authorId": "35119539", "name": "R. Bharadwaj"}, {"authorId": "3093759", + "name": "C. Heitmeyer"}, {"authorId": "2112810163", "name": "R. D. Jeeords"}, + {"authorId": "2685868", "name": "B. Labaw"}, {"authorId": "1758065", "name": + "S. Owre"}, {"authorId": "6235605", "name": "J. Rushby"}, {"authorId": "143607110", + "name": "N. Shankar"}, {"authorId": "69898311", "name": "F. Von"}, {"authorId": + "2112852016", "name": "Henke"}, {"authorId": "2080075625", "name": "J. van + Schouwen"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "48637958", + "name": "J. Madey"}]}, {"paperId": "7958db619e019e87f4e3f18537e01de5e746fd09", + "externalIds": {"DBLP": "journals/sigsoft/Parnas98", "MAG": "2011744986", + "DOI": "10.1145/279437.279464", "CorpusId": 10352532}, "corpusId": 10352532, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7958db619e019e87f4e3f18537e01de5e746fd09", "title": "Successful software engineering research", "abstract": "Rumination about what makes research successful is a strong indication that a researcher will not continue to do successful research. Nonetheless, the invitation to @@ -6497,14 +7131,16 @@ interactions: researchers in the software community and would like to offer them my (possibly unwelcome) advice.", "venue": "SOEN", "year": 1998, "referenceCount": 20, "citationCount": 25, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "http://www.inf.ed.ac.uk/teaching/courses/seoc1/2005_2006/resources/bullet17.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1998-05-01", "journal": {"volume": "23", "pages": "64-68", "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "82f99bce3d0e7aeed4ac4e3b7ebf27d87fa79b86", "externalIds": {"DBLP": "journals/sigsoft/Parnas98a", "MAG": "2012200577", - "DOI": "10.1145/286366.286372", "CorpusId": 46106937}, "url": "https://www.semanticscholar.org/paper/82f99bce3d0e7aeed4ac4e3b7ebf27d87fa79b86", + "DOI": "10.1145/286366.286372", "CorpusId": 46106937}, "corpusId": 46106937, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82f99bce3d0e7aeed4ac4e3b7ebf27d87fa79b86", "title": "Who taught me about software engineering research?", "abstract": "None of the four was educated as a computer scientist. Two taught engineering and had little to do with computers; the other two were mathematicians who @@ -6517,13 +7153,15 @@ interactions: all have passed away, I can only express my thanks to them by attempting to convey their teachings to others.", "venue": "SOEN", "year": 1998, "referenceCount": 1, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-07-01", "journal": - {"volume": "23", "pages": "26-28", "name": "ACM SIGSOFT Softw. Eng. Notes"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "c6a39dffdb0354c20c38c999888f0239d83a0960", - "externalIds": {"MAG": "168886016", "CorpusId": 59891972}, "url": "https://www.semanticscholar.org/paper/c6a39dffdb0354c20c38c999888f0239d83a0960", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1998-07-01", "journal": {"volume": "23", "pages": "26-28", + "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "c6a39dffdb0354c20c38c999888f0239d83a0960", + "externalIds": {"MAG": "168886016", "CorpusId": 59891972}, "corpusId": 59891972, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6a39dffdb0354c20c38c999888f0239d83a0960", "title": "Precisely Annotated Hierarchical Pictures of Programs", "abstract": "1. On Pictures of Programs In 1974, E. W. Dijkstra, criticising the use of pictures of programs, said, \u201cWhenever someone draws a picture to explain @@ -6537,26 +7175,30 @@ interactions: of the program in their initial study of a program, or in finding their way through a large program to the sections that are of interest to them.", "venue": "", "year": 1998, "referenceCount": 24, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "152930091", "name": "A. Lawton"}]}, {"paperId": "d9a427231e2912cdf1f4b43a1a89443ba5f219d2", "externalIds": {"DBLP": "journals/ansoft/Parnas98", "MAG": "1558661586", "DOI": "10.1023/A:1018949113292", "CorpusId": 35786237}, + "corpusId": 35786237, "publicationVenue": {"id": "b044d3cd-4725-4f77-b517-214706478060", + "name": "Annals of Software Engineering", "type": "journal", "alternate_names": + ["Ann Softw Eng"], "issn": "1022-7091", "url": "https://link.springer.com/journal/10480"}, "url": "https://www.semanticscholar.org/paper/d9a427231e2912cdf1f4b43a1a89443ba5f219d2", "title": "Software engineering programmes are not computer science programmes", "abstract": null, "venue": "Annals of Software Engineering", "year": 1999, "referenceCount": 5, "citationCount": 78, "influentialCitationCount": 5, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1999-04-01", "journal": {"volume": "6", "pages": "19-37", "name": "Annals of Software Engineering"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "e5b6568ca41b945af883128a158f19621e84b822", "externalIds": {"DBLP": "journals/tse/PetersP98", "MAG": "2111654822", "DOI": "10.1109/32.667877", - "CorpusId": 5481920}, "url": "https://www.semanticscholar.org/paper/e5b6568ca41b945af883128a158f19621e84b822", + "CorpusId": 5481920}, "corpusId": 5481920, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e5b6568ca41b945af883128a158f19621e84b822", "title": "Using Test Oracles Generated from Program Documentation", "abstract": "The paper illustrates how software can be described precisely using LD-relations, how these descriptions can be presented in a readable manner using tabular @@ -6570,45 +7212,53 @@ interactions: self-checking software, and ensuring consistency between code and documentation.", "venue": "IEEE Trans. Software Eng.", "year": 1998, "referenceCount": 43, "citationCount": 185, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1998-03-01", "journal": {"volume": "24", "pages": "161-173", "name": "IEEE - Trans. Software Eng."}, "authors": [{"authorId": "30529938", "name": "D. Peters"}, - {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "f69689226e407001041145dc22c8dadf053b0125", - "externalIds": {"MAG": "2309036187", "CorpusId": 59671069}, "url": "https://www.semanticscholar.org/paper/f69689226e407001041145dc22c8dadf053b0125", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1998-03-01", "journal": {"volume": "24", "pages": "161-173", + "name": "IEEE Trans. Software Eng."}, "authors": [{"authorId": "30529938", + "name": "D. Peters"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "f69689226e407001041145dc22c8dadf053b0125", "externalIds": {"MAG": "2309036187", + "CorpusId": 59671069}, "corpusId": 59671069, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f69689226e407001041145dc22c8dadf053b0125", "title": "Precise description and specification of software", "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 14, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-02-12", "journal": {"volume": - "", "pages": "1-14", "name": ""}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "fc1a36f02b4031ac72c17d5625c0114f6bd81905", "externalIds": - {"DBLP": "journals/jss/Parnas98", "MAG": "2063598889", "DOI": "10.1016/S0164-1212(97)00166-0", - "CorpusId": 46147531}, "url": "https://www.semanticscholar.org/paper/fc1a36f02b4031ac72c17d5625c0114f6bd81905", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-02-12", + "journal": {"volume": "", "pages": "1-14", "name": ""}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "fc1a36f02b4031ac72c17d5625c0114f6bd81905", + "externalIds": {"DBLP": "journals/jss/Parnas98", "MAG": "2063598889", "DOI": + "10.1016/S0164-1212(97)00166-0", "CorpusId": 46147531}, "corpusId": 46147531, + "publicationVenue": {"id": "10a4a695-8417-42c7-983d-742df48b3905", "name": + "Journal of Systems and Software", "type": "journal", "alternate_names": ["J + Syst Softw"], "issn": "0164-1212", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description#description", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description", + "http://www.sciencedirect.com/science/journal/01641212"]}, "url": "https://www.semanticscholar.org/paper/fc1a36f02b4031ac72c17d5625c0114f6bd81905", "title": "\"Formal methods\" technology transfer will fail", "abstract": null, "venue": "Journal of Systems and Software", "year": 1998, "referenceCount": 3, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1998-03-01", "journal": {"volume": "40", "pages": "195-198", "name": "J. - Syst. Softw."}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "0ec18b86b880e2e023e73234e17066acf4183220", "externalIds": {"MAG": - "2900212124", "DBLP": "books/sp/97/JanickiPZ97", "DOI": "10.1007/978-3-7091-6510-2_12", - "CorpusId": 9520558}, "url": "https://www.semanticscholar.org/paper/0ec18b86b880e2e023e73234e17066acf4183220", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1998-03-01", "journal": {"volume": "40", "pages": "195-198", + "name": "J. Syst. Softw."}, "authors": [{"authorId": "1726629", "name": "D. + Parnas"}]}, {"paperId": "0ec18b86b880e2e023e73234e17066acf4183220", "externalIds": + {"MAG": "2900212124", "DBLP": "books/sp/97/JanickiPZ97", "DOI": "10.1007/978-3-7091-6510-2_12", + "CorpusId": 9520558}, "corpusId": 9520558, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0ec18b86b880e2e023e73234e17066acf4183220", "title": "Tabular Representations in Relational Documents", "abstract": null, "venue": "Relational Methods in Computer Science", "year": 1997, "referenceCount": 26, "citationCount": 120, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-08-01", - "journal": {"pages": "184-196"}, "authors": [{"authorId": "1804632", "name": - "R. Janicki"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1997-08-01", "journal": {"pages": "184-196"}, "authors": [{"authorId": "1804632", + "name": "R. Janicki"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1928152", "name": "J. Zucker"}]}, {"paperId": "114d0a03d75e0d4527f4af4355793d1cdd0b79cc", "externalIds": {"MAG": "2087005462", "DOI": "10.1145/267895.267897", "CorpusId": - 5627387}, "url": "https://www.semanticscholar.org/paper/114d0a03d75e0d4527f4af4355793d1cdd0b79cc", + 5627387}, "corpusId": 5627387, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/114d0a03d75e0d4527f4af4355793d1cdd0b79cc", "title": "Software engineering (extended abstract): an unconsummated marriage", "abstract": "Although the first of many conferences on \u201cSoftware Engineering\u201d was held in Munich nearly three decades ago, communication between those who @@ -6636,22 +7286,25 @@ interactions: by the fact that we did not and could not teach how to program the way we could and did teach how to design hardware. Set out to correct that problem.", "venue": "ESEC ''97/FSE-5", "year": 1997, "referenceCount": 9, "citationCount": - 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1997-11-01", "journal": {"volume": - "22", "pages": "1-3", "name": ""}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "315d50a13973734ce01bb13c540b032ce417aecd", "externalIds": - {"MAG": "77580302", "CorpusId": 150961778}, "url": "https://www.semanticscholar.org/paper/315d50a13973734ce01bb13c540b032ce417aecd", + 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-11-01", + "journal": {"volume": "22", "pages": "1-3", "name": ""}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "315d50a13973734ce01bb13c540b032ce417aecd", + "externalIds": {"MAG": "77580302", "CorpusId": 150961778}, "corpusId": 150961778, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/315d50a13973734ce01bb13c540b032ce417aecd", "title": "Ethics and Military Technology: Star Wars", "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": - [{"category": "Political Science", "source": "external"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "2115016395", "name": "D. Cohen"}]}, {"paperId": "71fdf5cdede6070d584443ec6d0469481031e685", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political + Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": + "external"}, {"category": "Political Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2115016395", + "name": "D. Cohen"}]}, {"paperId": "71fdf5cdede6070d584443ec6d0469481031e685", "externalIds": {"DBLP": "journals/cacm/Parnas97", "MAG": "2056230625", "DOI": - "10.1145/260750.260784", "CorpusId": 52852783}, "url": "https://www.semanticscholar.org/paper/71fdf5cdede6070d584443ec6d0469481031e685", + "10.1145/260750.260784", "CorpusId": 52852783}, "corpusId": 52852783, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/71fdf5cdede6070d584443ec6d0469481031e685", "title": "Software engineering: an unconsummated marriage", "abstract": "When the first conference on \u201cSoftware Engineering\u201d was held, under NATO sponsorship three decades ago in Munich, the vast majority of Engineers ignored @@ -6663,14 +7316,16 @@ interactions: to perform such a task in order to get numerical results needed for some other task, but their real job was the other task.", "venue": "CACM", "year": 1997, "referenceCount": 0, "citationCount": 53, "influentialCitationCount": 1, "isOpenAccess": - true, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/260750.260784", + "status": null}, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1997-09-01", "journal": {"volume": "40", "pages": "128", "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "951e22e79cddd2969defa2f3e8d5bc9c84be1dd3", "externalIds": {"MAG": "1910894546", "DBLP": "conf/csee/Parnas97", "DOI": - "10.1109/SEDC.1997.592451", "CorpusId": 39233023}, "url": "https://www.semanticscholar.org/paper/951e22e79cddd2969defa2f3e8d5bc9c84be1dd3", + "10.1109/SEDC.1997.592451", "CorpusId": 39233023}, "corpusId": 39233023, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/951e22e79cddd2969defa2f3e8d5bc9c84be1dd3", "title": "Teaching For Change", "abstract": "A perennial concern of those who teach about computers is the rapid change that we see in our field. The hardware and software that dominated the field just four years ago are not @@ -6704,24 +7359,27 @@ interactions: Education and Training (CSEE&T''97) 0-8186-7886-0/97 $10.00 \u00a9 1997 IEEE", "venue": "Proceedings Tenth Conference on Software Engineering Education and Training", "year": 1997, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1997-04-13", "journal": {"pages": "174-175", "name": "Proceedings - Tenth Conference on Software Engineering Education and Training"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "b6b8766f6b5e09bc7744e5e7b426613abc5e1c7a", - "externalIds": {"MAG": "1877964095", "DBLP": "conf/esec/Parnas98", "DOI": - "10.1145/267896.267897", "CorpusId": 46432878}, "url": "https://www.semanticscholar.org/paper/b6b8766f6b5e09bc7744e5e7b426613abc5e1c7a", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "1997-04-13", "journal": + {"pages": "174-175", "name": "Proceedings Tenth Conference on Software Engineering + Education and Training"}, "authors": [{"authorId": "1726629", "name": "D. + Parnas"}]}, {"paperId": "b6b8766f6b5e09bc7744e5e7b426613abc5e1c7a", "externalIds": + {"MAG": "1877964095", "DBLP": "conf/esec/Parnas98", "DOI": "10.1145/267896.267897", + "CorpusId": 46432878}, "corpusId": 46432878, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b6b8766f6b5e09bc7744e5e7b426613abc5e1c7a", "title": "Software Engineering: An Unconsummated Marriage (Extended Abstract)", "abstract": null, "venue": "ESEC / SIGSOFT FSE", "year": 1997, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1997-09-22", "journal": {"pages": "1-3"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "039a327bf5dc3d8c78f6b950879a3395f9361973", - "externalIds": {"MAG": "2187491699", "CorpusId": 62775203}, "url": "https://www.semanticscholar.org/paper/039a327bf5dc3d8c78f6b950879a3395f9361973", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1997-09-22", "journal": {"pages": "1-3"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "039a327bf5dc3d8c78f6b950879a3395f9361973", + "externalIds": {"MAG": "2187491699", "CorpusId": 62775203}, "corpusId": 62775203, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/039a327bf5dc3d8c78f6b950879a3395f9361973", "title": "Why Software Jewels", "abstract": "years, don\u2019t we find more such jewels? How often is it possible to produce such a jewel of a system? Seldom? Frequently? Always? The author(s) of elegant systems sometimes write @@ -6731,12 +7389,13 @@ interactions: for the Technicsche Hogeschool Eindhoven, where the system was built) has served as a source of new ideas and insight for", "venue": "", "year": 1996, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "106fc79c50f67137f7a60a15b0088afefd2dc69b", "externalIds": {"MAG": "1624022100", - "DOI": "10.1109/CMPASS.1996.507870", "CorpusId": 60927015}, "url": "https://www.semanticscholar.org/paper/106fc79c50f67137f7a60a15b0088afefd2dc69b", + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. + Parnas"}]}, {"paperId": "106fc79c50f67137f7a60a15b0088afefd2dc69b", "externalIds": + {"MAG": "1624022100", "DOI": "10.1109/CMPASS.1996.507870", "CorpusId": 60927015}, + "corpusId": 60927015, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/106fc79c50f67137f7a60a15b0088afefd2dc69b", "title": "Table transformation tools: why and how", "abstract": "The paper describes a prototype tool for inverting tabular representations of mathematical functions, providing the motivation for its construction, some discussion @@ -6744,16 +7403,22 @@ interactions: of the type discussed, are intended to be useful in the documentation of complex computer systems.", "venue": "Proceedings of 11th Annual Conference on Computer Assurance. COMPASS ''96", "year": 1996, "referenceCount": 16, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Conference"], "publicationDate": "1996-06-17", "journal": - {"pages": "3-11", "name": "Proceedings of 11th Annual Conference on Computer - Assurance. COMPASS ''96"}, "authors": [{"authorId": "2107563930", "name": - "H. Shen"}, {"authorId": "34591448", "name": "J. Zucker"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "261ddf4b196ed0dd194c10241206f941b726e711", + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": + "1996-06-17", "journal": {"pages": "3-11", "name": "Proceedings of 11th Annual + Conference on Computer Assurance. COMPASS ''96"}, "authors": [{"authorId": + "2107563930", "name": "H. Shen"}, {"authorId": "34591448", "name": "J. Zucker"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "261ddf4b196ed0dd194c10241206f941b726e711", "externalIds": {"DBLP": "journals/computer/Parnas96", "MAG": "2111064222", - "DOI": "10.1109/2.485847", "CorpusId": 206403130}, "url": "https://www.semanticscholar.org/paper/261ddf4b196ed0dd194c10241206f941b726e711", + "DOI": "10.1109/2.485847", "CorpusId": 206403130}, "corpusId": 206403130, + "publicationVenue": {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", "name": + "Computer", "type": "journal", "alternate_names": ["IEEE Computer", "IEEE + Comput"], "issn": "0018-9162", "url": "http://www.computer.org/computer", + "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/261ddf4b196ed0dd194c10241206f941b726e711", "title": "Why Software Jewels Are Rare", "abstract": "A software jewel is a well structured program written in a consistent style, developed so that each component is simple and organized, and designed so that the product is @@ -6763,14 +7428,19 @@ interactions: elegant commercial software and then provide some advice for those who would like to produce better software.", "venue": "Computer", "year": 1996, "referenceCount": 12, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-02-01", "journal": {"volume": "29", "pages": "57-60", "name": "Computer"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "29a7265277c2f89d8ae96a571576f90f8bc9868c", - "externalIds": {"DBLP": "journals/computer/BowenBDGGHHHJJLPRWZ96", "MAG": - "2075680193", "DOI": "10.1109/MC.1996.488298", "CorpusId": 15230509}, "url": - "https://www.semanticscholar.org/paper/29a7265277c2f89d8ae96a571576f90f8bc9868c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1996-02-01", "journal": {"volume": "29", "pages": "57-60", + "name": "Computer"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "29a7265277c2f89d8ae96a571576f90f8bc9868c", "externalIds": {"DBLP": + "journals/computer/BowenBDGGHHHJJLPRWZ96", "MAG": "2075680193", "DOI": "10.1109/MC.1996.488298", + "CorpusId": 15230509}, "corpusId": 15230509, "publicationVenue": {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", + "name": "Computer", "type": "journal", "alternate_names": ["IEEE Computer", + "IEEE Comput"], "issn": "0018-9162", "url": "http://www.computer.org/computer", + "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/29a7265277c2f89d8ae96a571576f90f8bc9868c", "title": "An Invitation to Formal Methods", "abstract": "One of the most challenging tasks in software system design is to assure reliability, especially as these systems are increasingly used in sensitive and often life-critical environments @@ -6783,33 +7453,35 @@ interactions: brings together some preeminent experts in the field, asking them to address the question \"What is hindering the use of formal methods in industry?\"", "venue": "Computer", "year": 1996, "referenceCount": 7, "citationCount": 160, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1996-04-01", "journal": - {"volume": "29", "pages": "16-", "name": "Computer"}, "authors": [{"authorId": - "1772040", "name": "Jonathan P. Bowen"}, {"authorId": "47166810", "name": - "R. Butler"}, {"authorId": "1699040", "name": "D. Dill"}, {"authorId": "1699557", - "name": "R. Glass"}, {"authorId": "2616817", "name": "D. Gries"}, {"authorId": - "2114073842", "name": "A. Hall"}, {"authorId": "1699551", "name": "M. Hinchey"}, - {"authorId": "145510070", "name": "C. Holloway"}, {"authorId": "145132131", - "name": "D. Jackson"}, {"authorId": "2109260410", "name": "Cliff B. Jones"}, - {"authorId": "35258712", "name": "M. Lutz"}, {"authorId": "1726629", "name": - "D. Parnas"}, {"authorId": "6235605", "name": "J. Rushby"}, {"authorId": "1698406", - "name": "Jeannette M. Wing"}, {"authorId": "1696196", "name": "P. Zave"}]}, - {"paperId": "5163570d50653dee21dcae63f2f8f5b04ffcbfdd", "externalIds": {"CorpusId": - 16353685}, "url": "https://www.semanticscholar.org/paper/5163570d50653dee21dcae63f2f8f5b04ffcbfdd", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1996-04-01", "journal": {"volume": "29", "pages": "16-", "name": "Computer"}, + "authors": [{"authorId": "1772040", "name": "Jonathan P. Bowen"}, {"authorId": + "47166810", "name": "R. Butler"}, {"authorId": "1699040", "name": "D. Dill"}, + {"authorId": "1699557", "name": "R. Glass"}, {"authorId": "2616817", "name": + "D. Gries"}, {"authorId": "2114073842", "name": "A. Hall"}, {"authorId": "1699551", + "name": "M. Hinchey"}, {"authorId": "145510070", "name": "C. Holloway"}, {"authorId": + "145132131", "name": "D. Jackson"}, {"authorId": "2109260410", "name": "Cliff + B. Jones"}, {"authorId": "35258712", "name": "M. Lutz"}, {"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "6235605", "name": "J. Rushby"}, {"authorId": + "1698406", "name": "Jeannette M. Wing"}, {"authorId": "1696196", "name": "P. + Zave"}]}, {"paperId": "5163570d50653dee21dcae63f2f8f5b04ffcbfdd", "externalIds": + {"CorpusId": 16353685}, "corpusId": 16353685, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5163570d50653dee21dcae63f2f8f5b04ffcbfdd", "title": "Transformation Tools : Why and How 1", "abstract": "This paper describes a prototype tool for inverting tabular representations of mathematical functions, providing the motivation for its construction, some discussion of its use, and a sketch of its implementation.", "venue": "", "year": 1996, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2107563930", "name": "H. Shen"}, {"authorId": - "1928152", "name": "J. Zucker"}, {"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "aeea0e8df12a3ffc1feca00fbf508a82a6917c95", "externalIds": {"CorpusId": - 17580742}, "url": "https://www.semanticscholar.org/paper/aeea0e8df12a3ffc1feca00fbf508a82a6917c95", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2107563930", "name": "H. + Shen"}, {"authorId": "1928152", "name": "J. Zucker"}, {"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "aeea0e8df12a3ffc1feca00fbf508a82a6917c95", + "externalIds": {"CorpusId": 17580742}, "corpusId": 17580742, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/aeea0e8df12a3ffc1feca00fbf508a82a6917c95", "title": "Recherche). Thanks to Martin Feather and Steve Fickas for Encouragements and Critical Remarks, and to the Fse Reviewers for Helpful Comments and Suggestions. References", "abstract": "be anticipated and if the response to the alarm @@ -6823,15 +7495,15 @@ interactions: death, monitoring working, and some monitored value exceeding its treshold, respectively. According to the effectiveness condition, the above goal can be rewritten as", "venue": "", "year": 1996, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "2085799206", "name": "I. Mccracken"}, {"authorId": - "16600498", "name": "Bal"}, {"authorId": "2073627728", "name": "Balzer"}, - {"authorId": "144132027", "name": "N. M. Goldman"}, {"authorId": "1805800", - "name": "D. Wile"}, {"authorId": "2101429283", "name": "Operational"}, {"authorId": - "2080412444", "name": "Boe"}, {"authorId": "2080423360", "name": "Boehm"}, - {"authorId": "97500007", "name": "Mingjune Lee"}, {"authorId": "97221486", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "2085799206", "name": "I. + Mccracken"}, {"authorId": "16600498", "name": "Bal"}, {"authorId": "2073627728", + "name": "Balzer"}, {"authorId": "144132027", "name": "N. M. Goldman"}, {"authorId": + "1805800", "name": "D. Wile"}, {"authorId": "2101429283", "name": "Operational"}, + {"authorId": "2080412444", "name": "Boe"}, {"authorId": "2080423360", "name": + "Boehm"}, {"authorId": "97500007", "name": "Mingjune Lee"}, {"authorId": "97221486", "name": "Doug"}, {"authorId": "2077107116", "name": "J Douglas"}, {"authorId": "1789015", "name": "R. Kemmerer"}, {"authorId": "2113080879", "name": "Aslantest"}, {"authorId": "133671499", "name": "A. Sym"}, {"authorId": "2076545031", "name": @@ -6848,75 +7520,88 @@ interactions: "name": "D. Parnas"}, {"authorId": "48637958", "name": "J. Madey"}, {"authorId": "2082095512", "name": "Docu"}, {"authorId": "2127215770", "name": "S. D"}]}, {"paperId": "de4eeb13c1059820d27d110298c6f0ef43f045f1", "externalIds": {"MAG": - "2993203483", "CorpusId": 215984695}, "url": "https://www.semanticscholar.org/paper/de4eeb13c1059820d27d110298c6f0ef43f045f1", + "2993203483", "CorpusId": 215984695}, "corpusId": 215984695, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/de4eeb13c1059820d27d110298c6f0ef43f045f1", "title": "Engineering Mathematics", "abstract": null, "venue": "", "year": 1996, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-04-01", - "journal": {"volume": "29", "pages": "27-29", "name": "IEEE Computer"}, "authors": - [{"authorId": "35258712", "name": "M. Lutz"}, {"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "0f7cd41d60257856315334b27323b95f4463866f", "externalIds": - {"MAG": "1997650418", "DBLP": "journals/sigsoft/Parnas95", "DOI": "10.1145/219308.219312", - "CorpusId": 30754234}, "url": "https://www.semanticscholar.org/paper/0f7cd41d60257856315334b27323b95f4463866f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1996-04-01", "journal": {"volume": "29", "pages": + "27-29", "name": "IEEE Computer"}, "authors": [{"authorId": "35258712", "name": + "M. Lutz"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "0f7cd41d60257856315334b27323b95f4463866f", + "externalIds": {"MAG": "1997650418", "DBLP": "journals/sigsoft/Parnas95", + "DOI": "10.1145/219308.219312", "CorpusId": 30754234}, "corpusId": 30754234, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f7cd41d60257856315334b27323b95f4463866f", "title": "On ICSE''s \u201cmost influential\u201d papers", "abstract": "The International Conference on Software Engineering has established a tradition of looking back 10 conferences and selecting papers that have stood the test of time. The remarks below were prepared in connection an acceptance speech at ICSE 17 where two colleagues and I received the award for the best paper of ICSE 7.", "venue": "SOEN", "year": 1995, "referenceCount": 0, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Engineering", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1995-07-01", "journal": {"volume": - "20", "pages": "29-32", "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "1f1e807e5d64a275258e417f8d5ff0f3f747c7d8", + 13, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/219308.219312", "status": null}, + "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-07-01", "journal": + {"volume": "20", "pages": "29-32", "name": "ACM SIGSOFT Softw. Eng. Notes"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "1f1e807e5d64a275258e417f8d5ff0f3f747c7d8", "externalIds": {"MAG": "1480362767", "DOI": "10.1007/3-540-60271-2_123", "CorpusId": - 195588550}, "url": "https://www.semanticscholar.org/paper/1f1e807e5d64a275258e417f8d5ff0f3f747c7d8", + 195588550}, "corpusId": 195588550, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1f1e807e5d64a275258e417f8d5ff0f3f747c7d8", "title": "The future of industrial formal methods", "abstract": null, "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1995-09-07", - "journal": {"volume": "", "pages": "236-242", "name": ""}, "authors": [{"authorId": - "2114073842", "name": "A. Hall"}, {"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "2447536", "name": "N. Plat"}, {"authorId": "6235605", "name": - "J. Rushby"}, {"authorId": "31418808", "name": "C. Sennett"}]}, {"paperId": - "24afce4bc0f4f6446f758d229b1913bf98ea7961", "externalIds": {"MAG": "2082434633", - "DBLP": "journals/scp/ParnasM95", "DOI": "10.1016/0167-6423(95)96871-J", "CorpusId": - 205066655}, "url": "https://www.semanticscholar.org/paper/24afce4bc0f4f6446f758d229b1913bf98ea7961", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1995-09-07", "journal": {"volume": "", "pages": + "236-242", "name": ""}, "authors": [{"authorId": "2114073842", "name": "A. + Hall"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2447536", + "name": "N. Plat"}, {"authorId": "6235605", "name": "J. Rushby"}, {"authorId": + "31418808", "name": "C. Sennett"}]}, {"paperId": "24afce4bc0f4f6446f758d229b1913bf98ea7961", + "externalIds": {"MAG": "2082434633", "DBLP": "journals/scp/ParnasM95", "DOI": + "10.1016/0167-6423(95)96871-J", "CorpusId": 205066655}, "corpusId": 205066655, + "publicationVenue": {"id": "08d68650-8568-4b4f-8c14-1b61ccf55b17", "name": + "Science of Computer Programming", "type": "journal", "alternate_names": ["Sci + Comput Program"], "issn": "0167-6423", "url": "https://www.journals.elsevier.com/science-of-computer-programming", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/01676423"]}, + "url": "https://www.semanticscholar.org/paper/24afce4bc0f4f6446f758d229b1913bf98ea7961", "title": "Functional Documents for Computer Systems", "abstract": null, "venue": "Science of Computer Programming", "year": 1995, "referenceCount": 56, "citationCount": - 441, "influentialCitationCount": 32, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1995-10-01", "journal": - {"volume": "25", "pages": "41-61", "name": "Sci. Comput. Program."}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "48637958", "name": - "J. Madey"}]}, {"paperId": "51f6f5e7c31852b5aeac8305139e211e3296b654", "externalIds": - {"MAG": "68784329", "DBLP": "conf/zum/HallPPRS95", "DOI": "10.1007/3-540-60271-2_123", - "CorpusId": 34547366}, "url": "https://www.semanticscholar.org/paper/51f6f5e7c31852b5aeac8305139e211e3296b654", + 441, "influentialCitationCount": 32, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1995-10-01", "journal": {"volume": "25", "pages": "41-61", "name": "Sci. + Comput. Program."}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "48637958", "name": "J. Madey"}]}, {"paperId": "51f6f5e7c31852b5aeac8305139e211e3296b654", + "externalIds": {"MAG": "68784329", "DBLP": "conf/zum/HallPPRS95", "DOI": "10.1007/3-540-60271-2_123", + "CorpusId": 34547366}, "corpusId": 34547366, "publicationVenue": {"id": "410ba017-cde0-4e32-abd8-5a9c750f0d68", + "name": "ZUM", "alternate_names": ["ZUM"], "issn": "0177-6762", "url": "https://beck-online.beck.de/Dokument?anchor=Y-300-Z-ZUM&readable=2&vpath=/bibdata/zeits/zum/2019/cont/zum.2019.h3.nameinhaltsverzeichnis.htm"}, + "url": "https://www.semanticscholar.org/paper/51f6f5e7c31852b5aeac8305139e211e3296b654", "title": "The Future of Formal Methods in Industry", "abstract": null, "venue": "ZUM", "year": 1995, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1995-09-07", "journal": {"pages": "237-242"}, "authors": [{"authorId": "2114073842", - "name": "A. Hall"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "2447536", "name": "N. Plat"}, {"authorId": "6235605", "name": "J. Rushby"}, - {"authorId": "31418808", "name": "C. Sennett"}]}, {"paperId": "829bb3c7670fe2803a48aabd0eab6711a1e39db7", - "externalIds": {"MAG": "2012170792", "DOI": "10.1007/BF01135377", "CorpusId": - 122275591}, "url": "https://www.semanticscholar.org/paper/829bb3c7670fe2803a48aabd0eab6711a1e39db7", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1995-09-07", "journal": {"pages": + "237-242"}, "authors": [{"authorId": "2114073842", "name": "A. Hall"}, {"authorId": + "1726629", "name": "D. Parnas"}, {"authorId": "2447536", "name": "N. Plat"}, + {"authorId": "6235605", "name": "J. Rushby"}, {"authorId": "31418808", "name": + "C. Sennett"}]}, {"paperId": "829bb3c7670fe2803a48aabd0eab6711a1e39db7", "externalIds": + {"MAG": "2012170792", "DOI": "10.1007/BF01135377", "CorpusId": 122275591}, + "corpusId": 122275591, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/829bb3c7670fe2803a48aabd0eab6711a1e39db7", "title": "A logic for describing, not verifying, software", "abstract": null, "venue": "", "year": 1995, "referenceCount": 14, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1995-11-01", "journal": {"volume": "43", "pages": "321-338", "name": "Erkenntnis"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "9a587d0cf03ea1f6fb674c74d5b3a48efea1274f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1995-11-01", "journal": {"volume": + "43", "pages": "321-338", "name": "Erkenntnis"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "9a587d0cf03ea1f6fb674c74d5b3a48efea1274f", "externalIds": {"MAG": "2116606943", "DOI": "10.1109/CMPASS.1995.521905", - "CorpusId": 62193740}, "url": "https://www.semanticscholar.org/paper/9a587d0cf03ea1f6fb674c74d5b3a48efea1274f", + "CorpusId": 62193740}, "corpusId": 62193740, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9a587d0cf03ea1f6fb674c74d5b3a48efea1274f", "title": "Applying mathematical software documentation: an experience report", "abstract": "Those who do not use \"formal methods\" for developing software (and they remain the overwhelming majority of software developers) often claim @@ -6935,43 +7620,51 @@ interactions: benefits.", "venue": "COMPASS ''95 Proceedings of the Tenth Annual Conference on Computer Assurance Systems Integrity, Software Safety and Process Security''", "year": 1995, "referenceCount": 10, "citationCount": 8, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "1995-06-25", "journal": {"pages": "273-284", "name": "COMPASS - ''95 Proceedings of the Tenth Annual Conference on Computer Assurance Systems - Integrity, Software Safety and Process Security''"}, "authors": [{"authorId": - "70496971", "name": "B. J. Bauer"}, {"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "aa5c119d96184f72581f0975bbb4c2dc0a2df94e", "externalIds": {"MAG": - "1558784643", "DBLP": "conf/zum/Parnas95", "DOI": "10.1007/3-540-60271-2_109", - "CorpusId": 39780019}, "url": "https://www.semanticscholar.org/paper/aa5c119d96184f72581f0975bbb4c2dc0a2df94e", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Conference"], "publicationDate": "1995-06-25", "journal": + {"pages": "273-284", "name": "COMPASS ''95 Proceedings of the Tenth Annual + Conference on Computer Assurance Systems Integrity, Software Safety and Process + Security''"}, "authors": [{"authorId": "70496971", "name": "B. J. Bauer"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "aa5c119d96184f72581f0975bbb4c2dc0a2df94e", + "externalIds": {"MAG": "1558784643", "DBLP": "conf/zum/Parnas95", "DOI": "10.1007/3-540-60271-2_109", + "CorpusId": 39780019}, "corpusId": 39780019, "publicationVenue": {"id": "410ba017-cde0-4e32-abd8-5a9c750f0d68", + "name": "ZUM", "alternate_names": ["ZUM"], "issn": "0177-6762", "url": "https://beck-online.beck.de/Dokument?anchor=Y-300-Z-ZUM&readable=2&vpath=/bibdata/zeits/zum/2019/cont/zum.2019.h3.nameinhaltsverzeichnis.htm"}, + "url": "https://www.semanticscholar.org/paper/aa5c119d96184f72581f0975bbb4c2dc0a2df94e", "title": "Language-Free Mathematical Methods for Software Design", "abstract": null, "venue": "ZUM", "year": 1995, "referenceCount": 3, "citationCount": - 3, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1995-09-07", "journal": - {"pages": "3-4"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "e6b67ac35ad211157ddab1353f996301d68f2a37", "externalIds": {"MAG": - "62313887", "DBLP": "conf/zum/Parnas95a", "DOI": "10.1007/3-540-60271-2_137", - "CorpusId": 2891595}, "url": "https://www.semanticscholar.org/paper/e6b67ac35ad211157ddab1353f996301d68f2a37", + 3, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1995-09-07", "journal": {"pages": "3-4"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "e6b67ac35ad211157ddab1353f996301d68f2a37", + "externalIds": {"MAG": "62313887", "DBLP": "conf/zum/Parnas95a", "DOI": "10.1007/3-540-60271-2_137", + "CorpusId": 2891595}, "corpusId": 2891595, "publicationVenue": {"id": "410ba017-cde0-4e32-abd8-5a9c750f0d68", + "name": "ZUM", "alternate_names": ["ZUM"], "issn": "0177-6762", "url": "https://beck-online.beck.de/Dokument?anchor=Y-300-Z-ZUM&readable=2&vpath=/bibdata/zeits/zum/2019/cont/zum.2019.h3.nameinhaltsverzeichnis.htm"}, + "url": "https://www.semanticscholar.org/paper/e6b67ac35ad211157ddab1353f996301d68f2a37", "title": "Teaching Programming as Engineering", "abstract": null, "venue": "ZUM", "year": 1995, "referenceCount": 3, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-09-07", "journal": {"pages": "471-481"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "1128bbb12beaacf3e5e70cb5985c65177d0d2994", - "externalIds": {"MAG": "65813082", "CorpusId": 59830796}, "url": "https://www.semanticscholar.org/paper/1128bbb12beaacf3e5e70cb5985c65177d0d2994", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-09-07", "journal": + {"pages": "471-481"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "1128bbb12beaacf3e5e70cb5985c65177d0d2994", "externalIds": {"MAG": + "65813082", "CorpusId": 59830796}, "corpusId": 59830796, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1128bbb12beaacf3e5e70cb5985c65177d0d2994", "title": "Computers in weapons: the limits of confidence", "abstract": null, "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1994-02-01", "journal": {"volume": "", "pages": "177-192", "name": ""}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "1ccfc805b60bf996791a3342de9eabbd85cb8b88", - "externalIds": {"MAG": "2341159485", "DBLP": "conf/icse/Parnas94", "DOI": - "10.1109/ICSE.1994.296790", "CorpusId": 790287}, "url": "https://www.semanticscholar.org/paper/1ccfc805b60bf996791a3342de9eabbd85cb8b88", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Political Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1994-02-01", "journal": {"volume": + "", "pages": "177-192", "name": ""}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "1ccfc805b60bf996791a3342de9eabbd85cb8b88", "externalIds": + {"MAG": "2341159485", "DBLP": "conf/icse/Parnas94", "DOI": "10.1109/ICSE.1994.296790", + "CorpusId": 790287}, "corpusId": 790287, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1ccfc805b60bf996791a3342de9eabbd85cb8b88", "title": "Software aging", "abstract": "Programs, like people, get old. We can''t prevent aging, but we can understand its causes, take steps to limits its effects, temporarily reverse some of the damage it has caused, and prepare @@ -6982,58 +7675,64 @@ interactions: of software development. Only then will software engineering deserve to be called \"engineering\".<>", "venue": "Proceedings of 16th International Conference on Software Engineering", "year": 1994, "referenceCount": 9, "citationCount": - 1004, "influentialCitationCount": 45, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1994-05-21", - "journal": {"pages": "279-287", "name": "Proceedings of 16th International - Conference on Software Engineering"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "6fe6948e451c4519150164de82010bf549fd98d4", - "externalIds": {"MAG": "124107815", "CorpusId": 117309073}, "url": "https://www.semanticscholar.org/paper/6fe6948e451c4519150164de82010bf549fd98d4", + 1004, "influentialCitationCount": 45, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1994-05-21", "journal": {"pages": "279-287", "name": "Proceedings + of 16th International Conference on Software Engineering"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "6fe6948e451c4519150164de82010bf549fd98d4", + "externalIds": {"MAG": "124107815", "CorpusId": 117309073}, "corpusId": 117309073, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6fe6948e451c4519150164de82010bf549fd98d4", "title": "Specifying and simulating the externally observable behavior of modules", "abstract": "i ACKNOWLEDGMENTS ii TABLE OF CONTENTS iii LIST OF TABLES vi LIST OF FIGURES vii LIST OF DEFINITIONS viii", "venue": "", "year": 1994, "referenceCount": 145, "citationCount": 20, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}, {"authorId": "2107944057", "name": "Yabo Wang"}]}, {"paperId": - "7ddf62aa0c0ded970280d591842c9c6b7a229d76", "externalIds": {"MAG": "112342708", - "DBLP": "conf/ifip/Parnas94b", "CorpusId": 40339356}, "url": "https://www.semanticscholar.org/paper/7ddf62aa0c0ded970280d591842c9c6b7a229d76", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2107944057", + "name": "Yabo Wang"}]}, {"paperId": "7ddf62aa0c0ded970280d591842c9c6b7a229d76", + "externalIds": {"MAG": "112342708", "DBLP": "conf/ifip/Parnas94b", "CorpusId": + 40339356}, "corpusId": 40339356, "publicationVenue": {"id": "a45e99db-b6f6-4042-8b23-e8c11867e01c", + "name": "IFIP Congress", "type": "conference", "alternate_names": ["IFIP", + "IFIP Congr"]}, "url": "https://www.semanticscholar.org/paper/7ddf62aa0c0ded970280d591842c9c6b7a229d76", "title": "Inspection of Safety-Critical Software Using Program-Function Tables", "abstract": null, "venue": "IFIP Congress", "year": 2001, "referenceCount": 0, "citationCount": 50, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-05-17", "journal": {"pages": "270-277"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "8058d0322f852a366b122d9ab16731a53d7fd2bf", - "externalIds": {"MAG": "148886441", "DBLP": "conf/ifip/Parnas94a", "CorpusId": - 37399697}, "url": "https://www.semanticscholar.org/paper/8058d0322f852a366b122d9ab16731a53d7fd2bf", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2001-05-17", "journal": {"pages": + "270-277"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "8058d0322f852a366b122d9ab16731a53d7fd2bf", "externalIds": {"MAG": "148886441", + "DBLP": "conf/ifip/Parnas94a", "CorpusId": 37399697}, "corpusId": 37399697, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8058d0322f852a366b122d9ab16731a53d7fd2bf", "title": "The Professional Responsibilities of Software Engineers", "abstract": "RegisteredEngineersare expectedto be aware of their responsibilitiesas professionals.Those who practice SoftwareEngineeringoftenenterthatprofessionwithout either an engineering education or professional registration.The primary responsibilityis to make sure that their products are \u201cfit for use\u201d.", "venue": "IFIP Congress", "year": 2001, "referenceCount": 1, "citationCount": 6, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-05-17", "journal": {"pages": "332-339"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "9d0aca7cf319e791066500ab7a2862d54eb7d14a", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-05-17", "journal": {"pages": "332-339"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "9d0aca7cf319e791066500ab7a2862d54eb7d14a", "externalIds": {"DBLP": "conf/ifip/Parnas94", "MAG": "1552663", "CorpusId": - 5158022}, "url": "https://www.semanticscholar.org/paper/9d0aca7cf319e791066500ab7a2862d54eb7d14a", + 5158022}, "corpusId": 5158022, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9d0aca7cf319e791066500ab7a2862d54eb7d14a", "title": "Mathematical Description and Specification of Software", "abstract": null, "venue": "IFIP Congress", "year": 1994, "referenceCount": 0, "citationCount": - 31, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "354-359"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "a796362aa56c9abc51a246719b782326cd8d9b62", "externalIds": {"DBLP": - "journals/tse/ParnasMI94", "MAG": "2137860663", "DOI": "10.1109/32.368133", - "CorpusId": 33230047}, "url": "https://www.semanticscholar.org/paper/a796362aa56c9abc51a246719b782326cd8d9b62", + 31, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "354-359"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "a796362aa56c9abc51a246719b782326cd8d9b62", + "externalIds": {"DBLP": "journals/tse/ParnasMI94", "MAG": "2137860663", "DOI": + "10.1109/32.368133", "CorpusId": 33230047}, "corpusId": 33230047, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a796362aa56c9abc51a246719b782326cd8d9b62", "title": "Precise Documentation of Well-Structured Programs", "abstract": "Describes a new form of program documentation that is precise, systematic and readable. This documentation comprises a set of displays supplemented @@ -7047,15 +7746,19 @@ interactions: Mills''s (1975) functional approach to program documentation and verification; programs are specified and described in tabular form. >", "venue": "IEEE Trans. Software Eng.", "year": 1994, "referenceCount": 20, "citationCount": 119, - "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1994-12-01", "journal": - {"volume": "20", "pages": "948-976", "name": "IEEE Trans. Software Eng."}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "48637958", - "name": "J. Madey"}, {"authorId": "2936250", "name": "M. Iglewski"}]}, {"paperId": - "b5fd502f902cb5f344e2e8b12a95b68edbc6ac2e", "externalIds": {"DBLP": "conf/issta/PetersP94", - "MAG": "2076796892", "DOI": "10.1145/186258.186508", "CorpusId": 11009840}, + "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1994-12-01", "journal": {"volume": "20", "pages": "948-976", "name": "IEEE + Trans. Software Eng."}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "48637958", "name": "J. Madey"}, {"authorId": "2936250", "name": + "M. Iglewski"}]}, {"paperId": "b5fd502f902cb5f344e2e8b12a95b68edbc6ac2e", + "externalIds": {"DBLP": "conf/issta/PetersP94", "MAG": "2076796892", "DOI": + "10.1145/186258.186508", "CorpusId": 11009840}, "corpusId": 11009840, "publicationVenue": + {"id": "289bfdda-eab3-4c9a-97be-ef1e0f9ddfc0", "name": "International Symposium + on Software Testing and Analysis", "type": "conference", "alternate_names": + ["ISSTA", "Int Symp Softw Test Anal"], "url": "https://dl.acm.org/conference/issta"}, "url": "https://www.semanticscholar.org/paper/b5fd502f902cb5f344e2e8b12a95b68edbc6ac2e", "title": "Generating a test oracle from program documentation: work in progress", "abstract": "A fundamental assumption of software testing is that there is @@ -7081,13 +7784,14 @@ interactions: of the implications of generating test oracles from relational specifications are discussed.", "venue": "International Symposium on Software Testing and Analysis", "year": 1994, "referenceCount": 18, "citationCount": 65, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1994-08-01", "journal": {"pages": "58-65"}, "authors": - [{"authorId": "30529938", "name": "D. Peters"}, {"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "bf1b37c7851852cc4a5049f9f4964cbc2766b7b0", "externalIds": - {"MAG": "2184918940", "CorpusId": 110610626}, "url": "https://www.semanticscholar.org/paper/bf1b37c7851852cc4a5049f9f4964cbc2766b7b0", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1994-08-01", "journal": + {"pages": "58-65"}, "authors": [{"authorId": "30529938", "name": "D. Peters"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "bf1b37c7851852cc4a5049f9f4964cbc2766b7b0", + "externalIds": {"MAG": "2184918940", "CorpusId": 110610626}, "corpusId": 110610626, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf1b37c7851852cc4a5049f9f4964cbc2766b7b0", "title": "Invited Plenary Talk", "abstract": "Programs, like people, get old. We can\u2019t prevent aging, but we can understand its causes, take steps to limits its effects, temporarily reverse some of the damage it has caused, @@ -7097,23 +7801,26 @@ interactions: Researchers and practitioners must change their perception of the problems of sojhare development. Only then will Sojhare Engineering deserve to be called Engineering.", "venue": "", "year": 1994, "referenceCount": 6, "citationCount": - 16, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ea0a47c2457cfb1a549e257405e8eea43d66a8f0", - "externalIds": {"MAG": "2317421154", "DOI": "10.1007/BF02016333", "CorpusId": - 123321574}, "url": "https://www.semanticscholar.org/paper/ea0a47c2457cfb1a549e257405e8eea43d66a8f0", + 16, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "ea0a47c2457cfb1a549e257405e8eea43d66a8f0", "externalIds": {"MAG": "2317421154", + "DOI": "10.1007/BF02016333", "CorpusId": 123321574}, "corpusId": 123321574, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea0a47c2457cfb1a549e257405e8eea43d66a8f0", "title": "On the computational complexity of the maximum trade problem", "abstract": null, "venue": "", "year": 1994, "referenceCount": 1, "citationCount": 3, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1994-10-01", "journal": {"volume": "10", "pages": "434-440", "name": "Acta - Mathematicae Applicatae Sinica"}, "authors": [{"authorId": "2126211014", "name": - "Z. Luo"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "19aee12e61ca1fe953b7e85433b4a6274f341678", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1994-10-01", "journal": {"volume": + "10", "pages": "434-440", "name": "Acta Mathematicae Applicatae Sinica"}, + "authors": [{"authorId": "2126211014", "name": "Z. Luo"}, {"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "19aee12e61ca1fe953b7e85433b4a6274f341678", "externalIds": {"DBLP": "journals/tse/Parnas93", "MAG": "2111964583", "DOI": - "10.1109/32.241769", "CorpusId": 877250}, "url": "https://www.semanticscholar.org/paper/19aee12e61ca1fe953b7e85433b4a6274f341678", + "10.1109/32.241769", "CorpusId": 877250}, "corpusId": 877250, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/19aee12e61ca1fe953b7e85433b4a6274f341678", "title": "Predicate Logic for Software Engineering", "abstract": "The interpretations of logical expressions found in most introductory textbooks are not suitable for use in software engineering applications because they do not deal with @@ -7124,14 +7831,15 @@ interactions: definitions. It then illustrates the application of this interpretation in software documentation. >", "venue": "IEEE Trans. Software Eng.", "year": 1993, "referenceCount": 14, "citationCount": 112, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-09-01", "journal": {"volume": "19", "pages": "856-862", - "name": "IEEE Trans. Software Eng."}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "2399d415b45add784b1b4448bc908de78b5d9a23", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1993-09-01", "journal": + {"volume": "19", "pages": "856-862", "name": "IEEE Trans. Software Eng."}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "2399d415b45add784b1b4448bc908de78b5d9a23", "externalIds": {"MAG": "2164261312", "DBLP": "conf/re/SchouwenPM93", "DOI": - "10.1109/ISRE.1993.324857", "CorpusId": 32394429}, "url": "https://www.semanticscholar.org/paper/2399d415b45add784b1b4448bc908de78b5d9a23", + "10.1109/ISRE.1993.324857", "CorpusId": 32394429}, "corpusId": 32394429, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2399d415b45add784b1b4448bc908de78b5d9a23", "title": "Documentation of requirements for computer systems", "abstract": "A functional approach to specifying the requirements of a computer system is discussed. The method allows system requirements to be documented, whether @@ -7142,39 +7850,42 @@ interactions: for a water level monitoring system.<>", "venue": "[1993] Proceedings of the IEEE International Symposium on Requirements Engineering", "year": 1993, "referenceCount": 4, "citationCount": 90, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-01-04", "journal": {"pages": "198-207", "name": "[1993] - Proceedings of the IEEE International Symposium on Requirements Engineering"}, - "authors": [{"authorId": "1999570", "name": "A. J. V. Schouwen"}, {"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "48637958", "name": "J. Madey"}]}, - {"paperId": "270253e71fe01199a37f211fcba4f5b9ae97e27d", "externalIds": {"DBLP": - "conf/tphol/Parnas93", "MAG": "2113724642", "DOI": "10.1007/3-540-57826-9_132", - "CorpusId": 484641}, "url": "https://www.semanticscholar.org/paper/270253e71fe01199a37f211fcba4f5b9ae97e27d", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1993-01-04", "journal": + {"pages": "198-207", "name": "[1993] Proceedings of the IEEE International + Symposium on Requirements Engineering"}, "authors": [{"authorId": "1999570", + "name": "A. J. V. Schouwen"}, {"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "48637958", "name": "J. Madey"}]}, {"paperId": "270253e71fe01199a37f211fcba4f5b9ae97e27d", + "externalIds": {"DBLP": "conf/tphol/Parnas93", "MAG": "2113724642", "DOI": + "10.1007/3-540-57826-9_132", "CorpusId": 484641}, "corpusId": 484641, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/270253e71fe01199a37f211fcba4f5b9ae97e27d", "title": "Some Theorems We Should Prove", "abstract": null, "venue": "HUG", "year": 1993, "referenceCount": 7, "citationCount": 31, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.csl.sri.com/papers/holwkshop93/proofs-wanted.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1993-08-11", "journal": {"pages": "155-162"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "5abefebc05ab2eaf84c168de2f694a51330294da", "externalIds": {"DBLP": "journals/tse/XuP93a", "MAG": "2137170387", "DOI": "10.1109/32.221141", "CorpusId": - 43861314}, "url": "https://www.semanticscholar.org/paper/5abefebc05ab2eaf84c168de2f694a51330294da", + 43861314}, "corpusId": 43861314, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5abefebc05ab2eaf84c168de2f694a51330294da", "title": "Correction to \"On Satisfying Timing Constraints in Hard-Real-Time Systems''''", "abstract": "Corrected versions are presented for tables I and III that appear in the above-titled paper (see ibid,. vol.19, no.1, p.70-84, 1993). >", "venue": "IEEE Trans. Software Eng.", "year": 1993, "referenceCount": 0, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1993-03-01", "journal": - {"volume": "19", "pages": "310", "name": "IEEE Trans. Software Eng."}, "authors": - [{"authorId": "47883345", "name": "Jia Xu"}, {"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "9bb4274a30f651bde52beb04974b2f94ad4b5cf4", "externalIds": - {"MAG": "2092234295", "DBLP": "conf/icse/WangP93", "DOI": "10.1109/ICSE.1993.346059", - "CorpusId": 107888}, "url": "https://www.semanticscholar.org/paper/9bb4274a30f651bde52beb04974b2f94ad4b5cf4", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1993-03-01", "journal": {"volume": "19", "pages": "310", "name": "IEEE Trans. + Software Eng."}, "authors": [{"authorId": "47883345", "name": "Jia Xu"}, {"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "9bb4274a30f651bde52beb04974b2f94ad4b5cf4", + "externalIds": {"MAG": "2092234295", "DBLP": "conf/icse/WangP93", "DOI": "10.1109/ICSE.1993.346059", + "CorpusId": 107888}, "corpusId": 107888, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9bb4274a30f651bde52beb04974b2f94ad4b5cf4", "title": "Simulating the behaviour of software modules by trace rewriting", "abstract": "The trace assertion method is a module interface specification method based on the finite state machine model. To support this method, the @@ -7186,15 +7897,16 @@ interactions: to term rewriting, can be applied to implement trace simulation.<>", "venue": "Proceedings of 1993 15th International Conference on Software Engineering", "year": 1993, "referenceCount": 30, "citationCount": 69, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1993-05-21", "journal": {"pages": "14-23", - "name": "Proceedings of 1993 15th International Conference on Software Engineering"}, - "authors": [{"authorId": "2107944057", "name": "Yabo Wang"}, {"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "f87550db3bf93d02f74e5b1621c778c33fe2597d", - "externalIds": {"DBLP": "conf/icse/CourtoisP93", "MAG": "2102785826", "DOI": - "10.1109/ICSE.1993.346033", "CorpusId": 13555438}, "url": "https://www.semanticscholar.org/paper/f87550db3bf93d02f74e5b1621c778c33fe2597d", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1993-05-21", + "journal": {"pages": "14-23", "name": "Proceedings of 1993 15th International + Conference on Software Engineering"}, "authors": [{"authorId": "2107944057", + "name": "Yabo Wang"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "f87550db3bf93d02f74e5b1621c778c33fe2597d", "externalIds": {"DBLP": "conf/icse/CourtoisP93", + "MAG": "2102785826", "DOI": "10.1109/ICSE.1993.346033", "CorpusId": 13555438}, + "corpusId": 13555438, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f87550db3bf93d02f74e5b1621c778c33fe2597d", "title": "Documentation for safety critical software", "abstract": "The authors review some of the fundamental difficulties presented by the design and the validation of software for safety critical applications. They suggest that @@ -7206,16 +7918,17 @@ interactions: applying it to a small portion of the safety feature actuation system of a PWR nuclear reactor.<>", "venue": "Proceedings of 1993 15th International Conference on Software Engineering", "year": 1993, "referenceCount": 20, "citationCount": - 92, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference", "Review"], "publicationDate": "1993-05-21", - "journal": {"pages": "315-323", "name": "Proceedings of 1993 15th International - Conference on Software Engineering"}, "authors": [{"authorId": "46753418", - "name": "P. Courtois"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "38308d0c9ccaeed7890af21b0f5368269decbf17", "externalIds": {"MAG": "1976846957", - "CorpusId": 108877908}, "url": "https://www.semanticscholar.org/paper/38308d0c9ccaeed7890af21b0f5368269decbf17", + 92, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], + "publicationDate": "1993-05-21", "journal": {"pages": "315-323", "name": "Proceedings + of 1993 15th International Conference on Software Engineering"}, "authors": + [{"authorId": "46753418", "name": "P. Courtois"}, {"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "38308d0c9ccaeed7890af21b0f5368269decbf17", + "externalIds": {"MAG": "1976846957", "CorpusId": 108877908}, "corpusId": 108877908, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/38308d0c9ccaeed7890af21b0f5368269decbf17", "title": "Software Requirements for the A-7E Aircraft.", "abstract": "Abstract : The Software Cost Reduction (SCR) research project introduced a new approach to specifying requirements for real-time embedded systems. The principles @@ -7231,52 +7944,55 @@ interactions: (10) specification of constraints on the system, and (11) separation of concerns; that is, a division of the information into distinct, independent parts.", "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 297, "influentialCitationCount": - 17, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1992-08-31", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "2345411", "name": "T. Alspaugh"}, {"authorId": "1796685", "name": "S. Faulk"}, - {"authorId": "144403342", "name": "K. Britton"}, {"authorId": "2070371755", - "name": "R. A. Parker"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "42c17c65df2ede8a1933612a1014b66f94665801", "externalIds": {"DBLP": "conf/hybrid/EngelKMPRS92", - "MAG": "1533438666", "DOI": "10.1007/3-540-57318-6_40", "CorpusId": 15267517}, - "url": "https://www.semanticscholar.org/paper/42c17c65df2ede8a1933612a1014b66f94665801", + 17, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1992-08-31", "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "2345411", "name": "T. Alspaugh"}, {"authorId": "1796685", "name": + "S. Faulk"}, {"authorId": "144403342", "name": "K. Britton"}, {"authorId": + "2070371755", "name": "R. A. Parker"}, {"authorId": "1726629", "name": "D. + Parnas"}]}, {"paperId": "42c17c65df2ede8a1933612a1014b66f94665801", "externalIds": + {"DBLP": "conf/hybrid/EngelKMPRS92", "MAG": "1533438666", "DOI": "10.1007/3-540-57318-6_40", + "CorpusId": 15267517}, "corpusId": 15267517, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/42c17c65df2ede8a1933612a1014b66f94665801", "title": "A Formal Approach to Computer Systems Requirements Documentation", "abstract": null, "venue": "Hybrid Systems", "year": 1992, "referenceCount": 8, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "452-474"}, "authors": [{"authorId": "40468211", - "name": "M. Engel"}, {"authorId": "1703359", "name": "M. Kubica"}, {"authorId": - "48637958", "name": "J. Madey"}, {"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "2168981", "name": "A. Ravn"}, {"authorId": "1999570", "name": - "A. J. V. Schouwen"}]}, {"paperId": "594ff95da2a9aa131d91635ada80455efaf5244f", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "452-474"}, "authors": [{"authorId": + "40468211", "name": "M. Engel"}, {"authorId": "1703359", "name": "M. Kubica"}, + {"authorId": "48637958", "name": "J. Madey"}, {"authorId": "1726629", "name": + "D. Parnas"}, {"authorId": "2168981", "name": "A. Ravn"}, {"authorId": "1999570", + "name": "A. J. V. Schouwen"}]}, {"paperId": "594ff95da2a9aa131d91635ada80455efaf5244f", "externalIds": {"DBLP": "conf/ctrs/WangP92", "MAG": "1866918939", "DOI": "10.1007/3-540-56393-8_26", - "CorpusId": 36095927}, "url": "https://www.semanticscholar.org/paper/594ff95da2a9aa131d91635ada80455efaf5244f", + "CorpusId": 36095927}, "corpusId": 36095927, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/594ff95da2a9aa131d91635ada80455efaf5244f", "title": "Trace Rewriting Systems", "abstract": null, "venue": "CTRS", "year": 1992, "referenceCount": 8, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-07-08", "journal": {"pages": "343-356"}, "authors": [{"authorId": "2107944057", - "name": "Yabo Wang"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "727eb53d27dc165f91e462a933f6de6d74295b25", "externalIds": {"MAG": "85669259", - "CorpusId": 18853201}, "url": "https://www.semanticscholar.org/paper/727eb53d27dc165f91e462a933f6de6d74295b25", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-07-08", "journal": {"pages": "343-356"}, "authors": + [{"authorId": "2107944057", "name": "Yabo Wang"}, {"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "727eb53d27dc165f91e462a933f6de6d74295b25", + "externalIds": {"MAG": "85669259", "CorpusId": 18853201}, "corpusId": 18853201, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/727eb53d27dc165f91e462a933f6de6d74295b25", "title": "Tabular Representation of Relations", "abstract": "Multi-dimensional mathematical expressions, called tables, have proven to be useful for documenting digital systems. This paper describes 10 classes of tables, giving their syntax and semantics. Several abbreviations that can be useful in tables are introduced. Simple examples are provided.", "venue": "", "year": 1992, "referenceCount": 14, "citationCount": 163, "influentialCitationCount": 15, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "a59b465f88deb0fea1831614a5f1dd00be2d1c1a", "externalIds": {"MAG": "2049900368", "DOI": "10.1109/PCCC.1992.200519", "CorpusId": - 37198500}, "url": "https://www.semanticscholar.org/paper/a59b465f88deb0fea1831614a5f1dd00be2d1c1a", + 37198500}, "corpusId": 37198500, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a59b465f88deb0fea1831614a5f1dd00be2d1c1a", "title": "Pre-run-time scheduling of processes with exclusion relations on nested or overlapping critical sections", "abstract": "Nested or overlapping critical sections in processes frequently occur in many hard-real-time system @@ -7290,23 +8006,25 @@ interactions: within or overlap with each other.<>", "venue": "Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]", "year": 1992, "referenceCount": 16, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "1992-04-01", "journal": {"pages": "774-782", "name": "Eleventh Annual International - Phoenix Conference on Computers and Communication [1992 Conference Proceedings]"}, - "authors": [{"authorId": "2107782864", "name": "J. Xu"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "46b88fbd38b74a6d5f5cd528745cf9d0a8f37cbf", - "externalIds": {"MAG": "2334077287", "DOI": "10.2307/3975832", "CorpusId": - 87861103}, "url": "https://www.semanticscholar.org/paper/46b88fbd38b74a6d5f5cd528745cf9d0a8f37cbf", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["Conference"], "publicationDate": "1992-04-01", "journal": {"pages": "774-782", + "name": "Eleventh Annual International Phoenix Conference on Computers and + Communication [1992 Conference Proceedings]"}, "authors": [{"authorId": "2107782864", + "name": "J. Xu"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "46b88fbd38b74a6d5f5cd528745cf9d0a8f37cbf", "externalIds": {"MAG": "2334077287", + "DOI": "10.2307/3975832", "CorpusId": 87861103}, "corpusId": 87861103, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/46b88fbd38b74a6d5f5cd528745cf9d0a8f37cbf", "title": "Little Bugs Take Big Bites", "abstract": null, "venue": "", "year": 1991, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}], "publicationTypes": null, - "publicationDate": "1991-08-31", "journal": {"volume": "140", "pages": "131", - "name": "Science News"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "a00a1d33d7cde648ca163f253e78a92047a65766", "externalIds": {"MAG": - "1492884822", "CorpusId": 106666368}, "url": "https://www.semanticscholar.org/paper/a00a1d33d7cde648ca163f253e78a92047a65766", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}], "publicationTypes": + null, "publicationDate": "1991-08-31", "journal": {"volume": "140", "pages": + "131", "name": "Science News"}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "a00a1d33d7cde648ca163f253e78a92047a65766", "externalIds": + {"MAG": "1492884822", "CorpusId": 106666368}, "corpusId": 106666368, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a00a1d33d7cde648ca163f253e78a92047a65766", "title": "Assessment of safety-critical software in nuclear power plants", "abstract": "This article outlines an approach in the design, documentation, and evaluation of computer systems. This allows the use of software in many @@ -7335,15 +8053,16 @@ interactions: used on the Darlington shutdown software, which included systematic inspection as well as planned and statistically designed random testing, is outlined.\u00ab\u00a0less", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": 184, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1991-04-01", "journal": {"volume": "32", "name": "Nuclear safety"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "48637958", "name": - "J. Madey"}, {"authorId": "101150911", "name": "G. Asmis"}]}, {"paperId": - "f962bdf37a092146fd7fae97d454970719fca09f", "externalIds": {"DBLP": "conf/sigsoft/XuP91", - "MAG": "2123952177", "DOI": "10.1145/125083.123066", "CorpusId": 6687711}, - "url": "https://www.semanticscholar.org/paper/f962bdf37a092146fd7fae97d454970719fca09f", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "1991-04-01", "journal": {"volume": "32", "name": "Nuclear + safety"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "48637958", "name": "J. Madey"}, {"authorId": "101150911", "name": "G. Asmis"}]}, + {"paperId": "f962bdf37a092146fd7fae97d454970719fca09f", "externalIds": {"DBLP": + "conf/sigsoft/XuP91", "MAG": "2123952177", "DOI": "10.1145/125083.123066", + "CorpusId": 6687711}, "corpusId": 6687711, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f962bdf37a092146fd7fae97d454970719fca09f", "title": "On satisfying timing constraints in hard-real-time systems", "abstract": "We explain why pre-run-time scheduling is essential if one wishes to guarantee that timing constraints will be satisfied in a large complex hard-real-time @@ -7351,15 +8070,21 @@ interactions: consider what formulations of mathematical scheduling problems can be used to address those concerns. This paper provides a guide to the available algorithms.", "venue": "SIGSOFT ''91", "year": 1991, "referenceCount": 55, "citationCount": - 321, "influentialCitationCount": 12, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1991-11-01", "journal": - {"volume": "19", "pages": "70-84", "name": "IEEE Trans. Software Eng."}, "authors": - [{"authorId": "47883345", "name": "Jia Xu"}, {"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "2008fa3a585bc5157da0d7b48992ec883e77d577", "externalIds": - {"MAG": "2006771055", "DBLP": "journals/computer/Parnas90", "DOI": "10.1109/2.48796", - "CorpusId": 18823912}, "url": "https://www.semanticscholar.org/paper/2008fa3a585bc5157da0d7b48992ec883e77d577", + 321, "influentialCitationCount": 12, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/123041.123066", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1991-11-01", "journal": {"volume": "19", "pages": "70-84", "name": "IEEE + Trans. Software Eng."}, "authors": [{"authorId": "47883345", "name": "Jia + Xu"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "2008fa3a585bc5157da0d7b48992ec883e77d577", + "externalIds": {"MAG": "2006771055", "DBLP": "journals/computer/Parnas90", + "DOI": "10.1109/2.48796", "CorpusId": 18823912}, "corpusId": 18823912, "publicationVenue": + {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", "name": "Computer", "type": + "journal", "alternate_names": ["IEEE Computer", "IEEE Comput"], "issn": "0018-9162", + "url": "http://www.computer.org/computer", "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/2008fa3a585bc5157da0d7b48992ec883e77d577", "title": "Education for computing professionals", "abstract": "The author examines the state of computer science education and discusses the trend whereby computer science graduates are ending up in engineering jobs. He questions @@ -7367,24 +8092,26 @@ interactions: their employers, and society. He argues that computer science programs must return to a classical engineering approach that emphasizes fundamentals.<>", "venue": "Computer", "year": 1990, "referenceCount": 0, "citationCount": 146, - "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"volume": "23", "pages": - "17-22", "name": "Computer"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "8f43e97e4c4af6453ca13db3669c5e221f5f9404", "externalIds": - {"MAG": "1548110315", "DBLP": "conf/gi/Parnas90", "DOI": "10.1007/978-3-642-76118-8_1", - "CorpusId": 10777791}, "url": "https://www.semanticscholar.org/paper/8f43e97e4c4af6453ca13db3669c5e221f5f9404", + "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"volume": "23", "pages": "17-22", "name": "Computer"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "8f43e97e4c4af6453ca13db3669c5e221f5f9404", + "externalIds": {"MAG": "1548110315", "DBLP": "conf/gi/Parnas90", "DOI": "10.1007/978-3-642-76118-8_1", + "CorpusId": 10777791}, "corpusId": 10777791, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8f43e97e4c4af6453ca13db3669c5e221f5f9404", "title": "Functional Specifications for Old (and New) Software", "abstract": null, "venue": "GI Jahrestagung", "year": 1990, "referenceCount": 6, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1990-10-08", "journal": - {"pages": "3-14"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "8f7adf0de77127f53946745fbc992b990500375d", "externalIds": {"DBLP": - "journals/toplas/Parnas90", "MAG": "2009996995", "DOI": "10.1145/77606.214517", - "CorpusId": 10017468}, "url": "https://www.semanticscholar.org/paper/8f7adf0de77127f53946745fbc992b990500375d", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1990-10-08", "journal": {"pages": "3-14"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "8f7adf0de77127f53946745fbc992b990500375d", + "externalIds": {"DBLP": "journals/toplas/Parnas90", "MAG": "2009996995", "DOI": + "10.1145/77606.214517", "CorpusId": 10017468}, "corpusId": 10017468, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8f7adf0de77127f53946745fbc992b990500375d", "title": "On iterative constructs", "abstract": "The wheel is repeatedly reinvented because it is a good idea. Perhaps Anson''s \"A Generalized Iterative Construct and Its Semantics\" [1] confirms that \u201cA Generalized Control Structure @@ -7450,31 +8177,34 @@ interactions: practical, since side-effects are accurately treated in all cases. A method for reducing the length of guards and avoiding duplicated subexpressions is also provided.", "venue": "TOPL", "year": 1990, "referenceCount": 6, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1990-01-03", "journal": - {"volume": "12", "pages": "139-141", "name": "ACM Trans. Program. Lang. Syst."}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "a51be8238533613a8afe25b1149ab023598e225d", - "externalIds": {"MAG": "169537841", "DBLP": "conf/icci/Parnas90", "CorpusId": - 59894854}, "url": "https://www.semanticscholar.org/paper/a51be8238533613a8afe25b1149ab023598e225d", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1990-01-03", "journal": {"volume": "12", "pages": "139-141", "name": "ACM + Trans. Program. Lang. Syst."}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "a51be8238533613a8afe25b1149ab023598e225d", "externalIds": + {"MAG": "169537841", "DBLP": "conf/icci/Parnas90", "CorpusId": 59894854}, + "corpusId": 59894854, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a51be8238533613a8afe25b1149ab023598e225d", "title": "Education for Computing Professionals (Abstract)", "abstract": null, "venue": "ICCI", "year": 1990, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "2-3"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "ae6aedfa4d9c0ddb44031963c2d7d13704f2c3b8", "externalIds": - {"MAG": "116686374", "CorpusId": 151109870}, "url": "https://www.semanticscholar.org/paper/ae6aedfa4d9c0ddb44031963c2d7d13704f2c3b8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "2-3"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ae6aedfa4d9c0ddb44031963c2d7d13704f2c3b8", + "externalIds": {"MAG": "116686374", "CorpusId": 151109870}, "corpusId": 151109870, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ae6aedfa4d9c0ddb44031963c2d7d13704f2c3b8", "title": "Professional responsibility to blow the whistle on SDI", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 4, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Political - Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "1990-01-03", "journal": - {"volume": "", "pages": "359-372", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "c513ad12f4d275a2b77c9724202a22b4beb736c1", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "1990-01-03", "journal": {"volume": "", "pages": "359-372", "name": ""}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "c513ad12f4d275a2b77c9724202a22b4beb736c1", "externalIds": {"DBLP": "journals/tse/XuP90", "MAG": "2175500824", "DOI": - "10.1109/32.48943", "CorpusId": 16520696}, "url": "https://www.semanticscholar.org/paper/c513ad12f4d275a2b77c9724202a22b4beb736c1", + "10.1109/32.48943", "CorpusId": 16520696}, "corpusId": 16520696, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c513ad12f4d275a2b77c9724202a22b4beb736c1", "title": "Scheduling Processes with Release Times, Deadlines, Precedence, and Exclusion Relations", "abstract": "An algorithm that finds an optimal schedule on a single processor for a given set of processes is presented. @@ -7485,57 +8215,62 @@ interactions: of automated pre-run-time scheduling of processes with arbitrary precedence and exclusion in hard-real-time systems. >", "venue": "IEEE Trans. Software Eng.", "year": 1990, "referenceCount": 18, "citationCount": 399, "influentialCitationCount": - 15, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1990-03-01", "journal": - {"volume": "16", "pages": "360-369", "name": "IEEE Trans. Software Eng."}, - "authors": [{"authorId": "47883345", "name": "Jia Xu"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "d5e9fe291a8d4941e244e4ecceea7bf0fe6faa27", - "externalIds": {"MAG": "2039000785", "DBLP": "journals/cacm/ParnasSK90", "DOI": - "10.1145/78973.78974", "CorpusId": 14499944}, "url": "https://www.semanticscholar.org/paper/d5e9fe291a8d4941e244e4ecceea7bf0fe6faa27", + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1990-03-01", "journal": {"volume": "16", "pages": "360-369", + "name": "IEEE Trans. Software Eng."}, "authors": [{"authorId": "47883345", + "name": "Jia Xu"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "d5e9fe291a8d4941e244e4ecceea7bf0fe6faa27", "externalIds": {"MAG": "2039000785", + "DBLP": "journals/cacm/ParnasSK90", "DOI": "10.1145/78973.78974", "CorpusId": + 14499944}, "corpusId": 14499944, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d5e9fe291a8d4941e244e4ecceea7bf0fe6faa27", "title": "Evaluation of safety-critical software", "abstract": "Methods and approaches for testing the reliability and trustworthiness of software remain among the most controversial issues facing this age of high technology. The authors present some of the crucial questions faced by software programmers and eventual users.", "venue": "CACM", "year": 1990, "referenceCount": 26, "citationCount": 369, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1990-06-01", "journal": - {"volume": "33", "pages": "636-648", "name": "Commun. ACM"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "1999570", "name": "A. J. V. - Schouwen"}, {"authorId": "2056671883", "name": "Shu Po Kwan"}]}, {"paperId": - "0d2ff78db2ddae988026cb05b65d531b1cb2fd04", "externalIds": {"MAG": "1520544786", - "DOI": "10.1145/73103.73109", "CorpusId": 59108681}, "url": "https://www.semanticscholar.org/paper/0d2ff78db2ddae988026cb05b65d531b1cb2fd04", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1990-06-01", "journal": {"volume": "33", "pages": "636-648", + "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "1999570", "name": "A. J. V. Schouwen"}, {"authorId": "2056671883", + "name": "Shu Po Kwan"}]}, {"paperId": "0d2ff78db2ddae988026cb05b65d531b1cb2fd04", + "externalIds": {"MAG": "1520544786", "DOI": "10.1145/73103.73109", "CorpusId": + 59108681}, "corpusId": 59108681, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0d2ff78db2ddae988026cb05b65d531b1cb2fd04", "title": "Enhancing reusability with information hiding", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 70, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1989-03-01", "journal": {"volume": "", "pages": "141-157", "name": ""}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1734918", "name": - "P. Clements"}, {"authorId": "1773783", "name": "D. Weiss"}]}, {"paperId": - "49d603a268132b4d5b83e05c3f1aae3b7135ed0d", "externalIds": {"DBLP": "conf/ifip/Parnas89", - "MAG": "126957271", "CorpusId": 29109734}, "url": "https://www.semanticscholar.org/paper/49d603a268132b4d5b83e05c3f1aae3b7135ed0d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1989-03-01", "journal": {"volume": + "", "pages": "141-157", "name": ""}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}, {"authorId": "1734918", "name": "P. Clements"}, {"authorId": + "1773783", "name": "D. Weiss"}]}, {"paperId": "49d603a268132b4d5b83e05c3f1aae3b7135ed0d", + "externalIds": {"DBLP": "conf/ifip/Parnas89", "MAG": "126957271", "CorpusId": + 29109734}, "corpusId": 29109734, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/49d603a268132b4d5b83e05c3f1aae3b7135ed0d", "title": "On \"Artificial Intelligence and Expert Systems - Myths, Legends, and Facts\"", "abstract": null, "venue": "IFIP Congress", "year": 1989, "referenceCount": 0, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "1145-1146"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "6c7c0d5d7b99290b19645521a43216d5835c4b1d", - "externalIds": {"MAG": "88436886", "CorpusId": 59721051}, "url": "https://www.semanticscholar.org/paper/6c7c0d5d7b99290b19645521a43216d5835c4b1d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "1145-1146"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "6c7c0d5d7b99290b19645521a43216d5835c4b1d", + "externalIds": {"MAG": "88436886", "CorpusId": 59721051}, "corpusId": 59721051, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6c7c0d5d7b99290b19645521a43216d5835c4b1d", "title": "State determination in hard-embedded systems", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1796685", - "name": "S. Faulk"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "e6c8db8063b783f7d0f66382c82e58fc05c19484", "externalIds": {"MAG": "204798569", - "DBLP": "conf/forte/Parnas89", "CorpusId": 46102995}, "url": "https://www.semanticscholar.org/paper/e6c8db8063b783f7d0f66382c82e58fc05c19484", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1796685", "name": "S. Faulk"}, {"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "e6c8db8063b783f7d0f66382c82e58fc05c19484", + "externalIds": {"MAG": "204798569", "DBLP": "conf/forte/Parnas89", "CorpusId": + 46102995}, "corpusId": 46102995, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e6c8db8063b783f7d0f66382c82e58fc05c19484", "title": "Documentation of Communications Services and Protocols", "abstract": "The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between @@ -7550,13 +8285,14 @@ interactions: is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.", "venue": "FORTE", "year": 1989, "referenceCount": 2, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1989-12-05", - "journal": {"pages": "277-280"}, "authors": [{"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "43c93bdb1551311935762c304da9e740675c2d11", "externalIds": - {"MAG": "2401868727", "DOI": "10.1080/03155986.1988.11732068", "CorpusId": - 64030073}, "url": "https://www.semanticscholar.org/paper/43c93bdb1551311935762c304da9e740675c2d11", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1989-12-05", "journal": {"pages": "277-280"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "43c93bdb1551311935762c304da9e740675c2d11", + "externalIds": {"MAG": "2401868727", "DOI": "10.1080/03155986.1988.11732068", + "CorpusId": 64030073}, "corpusId": 64030073, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/43c93bdb1551311935762c304da9e740675c2d11", "title": "Why Engineers Should Not Use Artificial Intelligence", "abstract": "AbstractIt can be said that the most promising field within computer science is Artificial Intelligence, often simply known as AI. Some will interpret @@ -7573,13 +8309,14 @@ interactions: it concludes that many applications being tackled using ad hoc, heuristic methods can be solved using conventio...", "venue": "", "year": 1988, "referenceCount": 0, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "26", "pages": "234-246", "name": "Infor"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "b89a7143700c7b62ee91ea4304c7249b8a10d239", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "26", "pages": "234-246", "name": "Infor"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "b89a7143700c7b62ee91ea4304c7249b8a10d239", "externalIds": {"MAG": "2205932149", "DBLP": "journals/cacm/FaulkP88", "DOI": - "10.1145/42392.42397", "CorpusId": 15025343}, "url": "https://www.semanticscholar.org/paper/b89a7143700c7b62ee91ea4304c7249b8a10d239", + "10.1145/42392.42397", "CorpusId": 15025343}, "corpusId": 15025343, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b89a7143700c7b62ee91ea4304c7249b8a10d239", "title": "On synchronization in hard-real-time systems", "abstract": "The design of software for hard-real-time systems is usually difficult to change because of the constraints imposed by the need to meet absolute real-time @@ -7587,24 +8324,30 @@ interactions: involving a trio of ideas appears to be helpful for those who build software for such complex applications.", "venue": "CACM", "year": 1988, "referenceCount": 25, "citationCount": 89, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1988-03-01", "journal": {"volume": "31", "pages": "274-287", "name": "Commun. - ACM"}, "authors": [{"authorId": "1796685", "name": "S. Faulk"}, {"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "669f97c5bf8fc63a752b5ac91b5eb722b3ea654b", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1988-03-01", "journal": {"volume": "31", "pages": "274-287", + "name": "Commun. ACM"}, "authors": [{"authorId": "1796685", "name": "S. Faulk"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "669f97c5bf8fc63a752b5ac91b5eb722b3ea654b", "externalIds": {"MAG": "2988777245", "DOI": "10.1126/science.233.4762.403", - "CorpusId": 43550511, "PubMed": "17794550"}, "url": "https://www.semanticscholar.org/paper/669f97c5bf8fc63a752b5ac91b5eb722b3ea654b", + "CorpusId": 43550511, "PubMed": "17794550"}, "corpusId": 43550511, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/669f97c5bf8fc63a752b5ac91b5eb722b3ea654b", "title": "Star wars software.", "abstract": null, "venue": "Science", "year": 1986, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Engineering"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Engineering", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1986-07-25", "journal": {"volume": "233 4762", "pages": "\n 403\n ", - "name": "Science"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "94e19b67f7db6a61f090161cbdf114dea256b5b0", "externalIds": {"MAG": - "2096360482", "DBLP": "journals/tse/ParnasC86", "DOI": "10.1109/TSE.1986.6312991", - "CorpusId": 5838439}, "url": "https://www.semanticscholar.org/paper/94e19b67f7db6a61f090161cbdf114dea256b5b0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Engineering"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Engineering", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1986-07-25", "journal": {"volume": "233 4762", "pages": + "\n 403\n ", "name": "Science"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "94e19b67f7db6a61f090161cbdf114dea256b5b0", + "externalIds": {"MAG": "2096360482", "DBLP": "journals/tse/ParnasC86", "DOI": + "10.1109/TSE.1986.6312991", "CorpusId": 5838439}, "corpusId": 5838439, "publicationVenue": + {"id": "c99cfe66-b71c-4ca4-bedd-26267b9cb068", "name": "IEEE Transactions + on Software Engineering", "type": "journal", "alternate_names": ["IEEE Trans + Softw Eng"], "issn": "0098-5589", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=32", + "alternate_urls": ["http://www.computer.org/portal/web/tse/about"]}, "url": + "https://www.semanticscholar.org/paper/94e19b67f7db6a61f090161cbdf114dea256b5b0", "title": "A rational design process: How and why to fake it", "abstract": "Many have sought a software design process that allows a program to be derived systematically from a precise statement of requirements. It is proposed that, @@ -7616,23 +8359,26 @@ interactions: that would have been produced by that process. The contents of each of the required documents are outlined.", "venue": "IEEE Transactions on Software Engineering", "year": 1985, "referenceCount": 22, "citationCount": 923, "influentialCitationCount": - 35, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 35, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/3-540-15199-0_6.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1985-06-01", "journal": {"volume": "SE-12", "pages": "251-257", "name": "IEEE Transactions on Software Engineering"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1734918", "name": "P. Clements"}]}, {"paperId": "cf33beefe4d7086c3150a2f401b6e768002094a0", "externalIds": {"DBLP": - "conf/compcon/Parnas86", "MAG": "87200830", "CorpusId": 39940749}, "url": - "https://www.semanticscholar.org/paper/cf33beefe4d7086c3150a2f401b6e768002094a0", + "conf/compcon/Parnas86", "MAG": "87200830", "CorpusId": 39940749}, "corpusId": + 39940749, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cf33beefe4d7086c3150a2f401b6e768002094a0", "title": "Why We Would Never Trust the SDI Software", "abstract": null, "venue": "COMPCON", "year": 1986, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "91-93"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "0da3141423b1ba243f7dbcad92c96efd73988608", - "externalIds": {"MAG": "2183918915", "CorpusId": 61984767}, "url": "https://www.semanticscholar.org/paper/0da3141423b1ba243f7dbcad92c96efd73988608", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "91-93"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "0da3141423b1ba243f7dbcad92c96efd73988608", "externalIds": {"MAG": + "2183918915", "CorpusId": 61984767}, "corpusId": 61984767, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0da3141423b1ba243f7dbcad92c96efd73988608", "title": "DAVIDLORGEPARNAS,PAULC.CLEMENTS,AND DAVIDM.WEISS", "abstract": "This paperdiscusses theorganization ofsoftware thatis inherently complex because ofverymanyarbitrary details thatmust beprecisely right forthesoftware tobecorrect. @@ -7654,14 +8400,19 @@ interactions: byconsistent applica- tionoftheprinciples touted atconferences andinjournals. Theideas appeared tobeeasier towrite about thantouse.", "venue": "", "year": 1985, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}, {"authorId": "1734918", "name": "P. Clements"}, {"authorId": - "152986874", "name": "M. Weiss"}]}, {"paperId": "3dfa629816bae8a681cc47de6a737abf8858f4fe", - "externalIds": {"DBLP": "journals/tse/ParnasCW85", "MAG": "2132234187", "DOI": - "10.1109/TSE.1985.232209", "CorpusId": 1227744}, "url": "https://www.semanticscholar.org/paper/3dfa629816bae8a681cc47de6a737abf8858f4fe", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "1734918", "name": "P. Clements"}, {"authorId": "152986874", "name": "M. Weiss"}]}, + {"paperId": "3dfa629816bae8a681cc47de6a737abf8858f4fe", "externalIds": {"DBLP": + "journals/tse/ParnasCW85", "MAG": "2132234187", "DOI": "10.1109/TSE.1985.232209", + "CorpusId": 1227744}, "corpusId": 1227744, "publicationVenue": {"id": "c99cfe66-b71c-4ca4-bedd-26267b9cb068", + "name": "IEEE Transactions on Software Engineering", "type": "journal", "alternate_names": + ["IEEE Trans Softw Eng"], "issn": "0098-5589", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=32", + "alternate_urls": ["http://www.computer.org/portal/web/tse/about"]}, "url": + "https://www.semanticscholar.org/paper/3dfa629816bae8a681cc47de6a737abf8858f4fe", "title": "The Modular Structure of Complex Systems", "abstract": "This paper discusses the organization of software that is inherently complex because of very many arbitrary details that must be precisely right for the software @@ -7673,29 +8424,32 @@ interactions: of the software. The paper includes an extract from a software module guide to illustrate our proposals.", "venue": "IEEE Transactions on Software Engineering", "year": 1984, "referenceCount": 21, "citationCount": 525, "influentialCitationCount": - 17, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1984-03-26", "journal": {"volume": "SE-11", "pages": "259-266", - "name": "IEEE Transactions on Software Engineering"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "1734918", "name": "P. Clements"}, - {"authorId": "1773783", "name": "D. Weiss"}]}, {"paperId": "a057e95805347666bae79c0440feadeb9b8fa2d6", - "externalIds": {"MAG": "1585383410", "DBLP": "journals/cacm/Parnas85", "DOI": - "10.1145/214956.214961", "CorpusId": 16457730}, "url": "https://www.semanticscholar.org/paper/a057e95805347666bae79c0440feadeb9b8fa2d6", + 17, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1984-03-26", "journal": + {"volume": "SE-11", "pages": "259-266", "name": "IEEE Transactions on Software + Engineering"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "1734918", "name": "P. Clements"}, {"authorId": "1773783", "name": "D. Weiss"}]}, + {"paperId": "a057e95805347666bae79c0440feadeb9b8fa2d6", "externalIds": {"MAG": + "1585383410", "DBLP": "journals/cacm/Parnas85", "DOI": "10.1145/214956.214961", + "CorpusId": 16457730}, "corpusId": 16457730, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a057e95805347666bae79c0440feadeb9b8fa2d6", "title": "Software aspects of strategic defense systems", "abstract": "A former member of the SDIO Panel on Computing in Support of Battle Management explains why he believes the \u201cStar Wars\u201d effort will not achieve its stated goals.", "venue": "CACM", "year": 1985, "referenceCount": 0, "citationCount": - 294, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Engineering", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 294, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Engineering", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1985-09-01", "journal": {"volume": "28", "pages": "1326-1335", "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ad05d27cff7bbc986cab70eb13802c396320269b", "externalIds": {"DBLP": "journals/sigsoft/Parnas85", "MAG": "1968374920", "DOI": "10.1145/382288.382289", - "CorpusId": 16850996}, "url": "https://www.semanticscholar.org/paper/ad05d27cff7bbc986cab70eb13802c396320269b", + "CorpusId": 16850996}, "corpusId": 16850996, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ad05d27cff7bbc986cab70eb13802c396320269b", "title": "Software aspects of strategic defense systems", "abstract": "On 28 June 1985, David Lorge Parnas, a respected computer scientist who has consulted extensively on United States defense projects, resigned from the Panel on @@ -7708,26 +8462,32 @@ interactions: community to reprint these essays in their entirety to stimulate scientific discussion of the feasibility of the project.", "venue": "SOEN", "year": 1985, "referenceCount": 0, "citationCount": 61, "influentialCitationCount": 2, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1985-10-01", "journal": {"volume": "10", "pages": "15-23", "name": "ACM SIGSOFT - Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "cfe746490f8af518c4bb9c3f136f5bc586eed218", "externalIds": {"MAG": - "1995223857", "DBLP": "conf/icse/ParnasW85", "DOI": "10.1016/0164-1212(87)90025-2", - "CorpusId": 9965489}, "url": "https://www.semanticscholar.org/paper/cfe746490f8af518c4bb9c3f136f5bc586eed218", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1985-10-01", "journal": {"volume": "10", "pages": "15-23", + "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "cfe746490f8af518c4bb9c3f136f5bc586eed218", + "externalIds": {"MAG": "1995223857", "DBLP": "conf/icse/ParnasW85", "DOI": + "10.1016/0164-1212(87)90025-2", "CorpusId": 9965489}, "corpusId": 9965489, + "publicationVenue": {"id": "a36dc29e-4ea1-4567-b0fe-1c06daf8bee8", "name": + "International Conference on Software Engineering", "type": "conference", + "alternate_names": ["IEEE Int Conf Semicond Electron", "IEEE International + Conference on Semiconductor Electronics", "ICSE", "Int Conf Softw Eng"], "url": + "http://www.icse-conferences.org/"}, "url": "https://www.semanticscholar.org/paper/cfe746490f8af518c4bb9c3f136f5bc586eed218", "title": "Active design reviews: principles and practices", "abstract": null, "venue": "International Conference on Software Engineering", "year": 1985, "referenceCount": 3, "citationCount": 339, "influentialCitationCount": 24, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "1985-08-01", "journal": {"volume": "7", "pages": "259-265", "name": "J. Syst. - Softw."}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "1773783", "name": "D. Weiss"}]}, {"paperId": "d4bfd9a2b5b0cacd313e061e075e34f344a9b7c8", - "externalIds": {"DBLP": "journals/sigcas/Parnas85", "MAG": "2030356271", "DOI": - "10.1145/379486.379513", "CorpusId": 16628890}, "url": "https://www.semanticscholar.org/paper/d4bfd9a2b5b0cacd313e061e075e34f344a9b7c8", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1985-08-01", "journal": {"volume": "7", "pages": + "259-265", "name": "J. Syst. Softw."}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "1773783", "name": "D. Weiss"}]}, {"paperId": + "d4bfd9a2b5b0cacd313e061e075e34f344a9b7c8", "externalIds": {"DBLP": "journals/sigcas/Parnas85", + "MAG": "2030356271", "DOI": "10.1145/379486.379513", "CorpusId": 16628890}, + "corpusId": 16628890, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d4bfd9a2b5b0cacd313e061e075e34f344a9b7c8", "title": "The Parnas papers", "abstract": "Thank you for your letter of 5 June 1985 appointing me a member of the SDIO Panel on Computing in Support of Battle Management. I appreciate the recognition implicit in being chosen @@ -7762,14 +8522,16 @@ interactions: 2) The properties of the proposed SDI software that make it unattainable, 3) Why the techniques commonly used to build \u2026", "venue": "CSOC", "year": 1985, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - null, "journal": {"volume": "14-15", "pages": "27-37", "name": "SIGCAS Comput. - Soc."}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "8e9dd3ad25686a6b508baeac81586576b9b32948", "externalIds": {"MAG": "2400431047", - "DOI": "10.1080/03155986.1984.11731932", "CorpusId": 63382965}, "url": "https://www.semanticscholar.org/paper/8e9dd3ad25686a6b508baeac81586576b9b32948", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Sociology", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": null, "journal": {"volume": "14-15", "pages": + "27-37", "name": "SIGCAS Comput. Soc."}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "8e9dd3ad25686a6b508baeac81586576b9b32948", + "externalIds": {"MAG": "2400431047", "DOI": "10.1080/03155986.1984.11731932", + "CorpusId": 63382965}, "corpusId": 63382965, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8e9dd3ad25686a6b508baeac81586576b9b32948", "title": "Software Engineering Principles", "abstract": "AbstractSoftware engineering, the construction of useful programs, usually involves seve;ral people and programs that will be maintained in several versions. This paper @@ -7784,13 +8546,15 @@ interactions: of co-operating sequential processes; specifying and summarizing the behaviour of programs. This paper is intended to provide an introductory overview. The bibliography includes more thorough discussions of each topic.", "venue": - "", "year": 1984, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1984-11-01", "journal": {"volume": "22", "pages": "303-316", "name": "Infor"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "fdbf6eb09c8cedcef4bfbaa7055f31c205fa0435", - "externalIds": {"MAG": "113803186", "CorpusId": 56904593}, "url": "https://www.semanticscholar.org/paper/fdbf6eb09c8cedcef4bfbaa7055f31c205fa0435", + "", "year": 1984, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "1984-11-01", "journal": + {"volume": "22", "pages": "303-316", "name": "Infor"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "fdbf6eb09c8cedcef4bfbaa7055f31c205fa0435", + "externalIds": {"MAG": "113803186", "CorpusId": 56904593}, "corpusId": 56904593, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fdbf6eb09c8cedcef4bfbaa7055f31c205fa0435", "title": "A Standard Organization for Specifying Abstract Interfaces.", "abstract": "Abstract : NRL''s Software Cost Reduction project is demonstrating the feasibility of applying advanced software engineering techniques to complex real time @@ -7799,16 +8563,17 @@ interactions: The project is producing a set of model procedures and documents that can be followed by designers and producers of other software systems.", "venue": "", "year": 1984, "referenceCount": 0, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1984-06-14", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1734918", - "name": "P. Clements"}, {"authorId": "2070371755", "name": "R. A. Parker"}, - {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "35201459", "name": - "J. Shore"}, {"authorId": "144403342", "name": "K. Britton"}]}, {"paperId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1984-06-14", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1734918", "name": "P. Clements"}, {"authorId": "2070371755", "name": "R. + A. Parker"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "35201459", + "name": "J. Shore"}, {"authorId": "144403342", "name": "K. Britton"}]}, {"paperId": "fdf2cce58a87e91fbb05747869e6ccab4fe54e2b", "externalIds": {"MAG": "319769678", - "CorpusId": 57950197}, "url": "https://www.semanticscholar.org/paper/fdf2cce58a87e91fbb05747869e6ccab4fe54e2b", + "CorpusId": 57950197}, "corpusId": 57950197, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fdf2cce58a87e91fbb05747869e6ccab4fe54e2b", "title": "Interface Specifications for SCR (Software Cost Reduction) (A-7E) Extended Computer Module. Revised.", "abstract": "Abstract : This document describes the programmer interface to a computing machine partially implemented @@ -7827,16 +8592,17 @@ interactions: for other people interested in applying the abstract interface approach on other software projects. Additional keywords: real time, systems engineering. (Author).", "venue": "", "year": 1984, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1984-12-31", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "1773783", "name": "D. Weiss"}, {"authorId": "1734918", "name": - "P. Clements"}, {"authorId": "144403342", "name": "K. Britton"}]}, {"paperId": - "855f88770b31fe1d480cce797a9d1c888001f92b", "externalIds": {"MAG": "1975551945", - "DBLP": "journals/cacm/Parnas83a", "DOI": "10.1145/358161.358168", "CorpusId": - 14450587}, "url": "https://www.semanticscholar.org/paper/855f88770b31fe1d480cce797a9d1c888001f92b", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1984-12-31", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "1773783", "name": "D. Weiss"}, {"authorId": + "1734918", "name": "P. Clements"}, {"authorId": "144403342", "name": "K. Britton"}]}, + {"paperId": "855f88770b31fe1d480cce797a9d1c888001f92b", "externalIds": {"MAG": + "1975551945", "DBLP": "journals/cacm/Parnas83a", "DOI": "10.1145/358161.358168", + "CorpusId": 14450587}, "corpusId": 14450587, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/855f88770b31fe1d480cce797a9d1c888001f92b", "title": "A generalized control structure and its formal definition", "abstract": "A new programming language control structure as well as an improved approach to a formal definition of programming languages are presented. The control @@ -7852,14 +8618,16 @@ interactions: relations is developed and used to define the meaning of the new constructs. A short discussion of program development and the history of control structures is included.", "venue": "CACM", "year": 1983, "referenceCount": 12, "citationCount": - 92, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1983-08-01", "journal": - {"volume": "26", "pages": "572-581", "name": "Commun. ACM"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "8832f7e30c51b8ef116d0338d396a86543806145", - "externalIds": {"MAG": "2049227853", "DOI": "10.1109/MILCOM.1983.4794801", - "CorpusId": 30274414}, "url": "https://www.semanticscholar.org/paper/8832f7e30c51b8ef116d0338d396a86543806145", + 92, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/358161.358168", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1983-08-01", "journal": {"volume": "26", "pages": "572-581", "name": "Commun. + ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "8832f7e30c51b8ef116d0338d396a86543806145", "externalIds": {"MAG": "2049227853", + "DOI": "10.1109/MILCOM.1983.4794801", "CorpusId": 30274414}, "corpusId": 30274414, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8832f7e30c51b8ef116d0338d396a86543806145", "title": "On the Uses of Synchronization in Hard-real-time Systems", "abstract": "This paper presents an improved approach to the design of software for hard-real-time systems. The software for such systems is usually difficult to change because @@ -7877,14 +8645,15 @@ interactions: use of resources, and (3) a new synchronization scheme that is both simple and general.", "venue": "MILCOM 1983 - IEEE Military Communications Conference", "year": 1983, "referenceCount": 14, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "1983-10-01", "journal": {"volume": "3", "pages": "754-759", - "name": "MILCOM 1983 - IEEE Military Communications Conference"}, "authors": - [{"authorId": "1796685", "name": "S. Faulk"}, {"authorId": "1726629", "name": - "D. Parnas"}]}, {"paperId": "a351e882c061aacce80a0bb7040788558050b603", "externalIds": - {"MAG": "1541725822", "CorpusId": 60452371}, "url": "https://www.semanticscholar.org/paper/a351e882c061aacce80a0bb7040788558050b603", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Conference"], "publicationDate": "1983-10-01", "journal": + {"volume": "3", "pages": "754-759", "name": "MILCOM 1983 - IEEE Military Communications + Conference"}, "authors": [{"authorId": "1796685", "name": "S. Faulk"}, {"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "a351e882c061aacce80a0bb7040788558050b603", + "externalIds": {"MAG": "1541725822", "CorpusId": 60452371}, "corpusId": 60452371, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a351e882c061aacce80a0bb7040788558050b603", "title": "Interface Specifications for the SCR (A-7E) Extended Computer Module.", "abstract": "This document describes the programmer interface to a computing machine partially implemented in software. The Extended Computer is part of @@ -7897,14 +8666,16 @@ interactions: capability. The purpose of the Extended Computer is to allow the remainder of the software to remain unchanged when the host computer is changed or replaced.", "venue": "", "year": 1983, "referenceCount": 0, "citationCount": 7, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1983-01-06", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "1773783", "name": "D. Weiss"}, - {"authorId": "1734918", "name": "P. Clements"}, {"authorId": "144403342", - "name": "K. Britton"}]}, {"paperId": "b74774b138fffcb0f5b364fec0be7153c41e06c1", - "externalIds": {"MAG": "119456006", "CorpusId": 59684688}, "url": "https://www.semanticscholar.org/paper/b74774b138fffcb0f5b364fec0be7153c41e06c1", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1983-01-06", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "1773783", "name": "D. Weiss"}, {"authorId": "1734918", "name": + "P. Clements"}, {"authorId": "144403342", "name": "K. Britton"}]}, {"paperId": + "b74774b138fffcb0f5b364fec0be7153c41e06c1", "externalIds": {"MAG": "119456006", + "CorpusId": 59684688}, "corpusId": 59684688, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b74774b138fffcb0f5b364fec0be7153c41e06c1", "title": "Interface Specifications for the SCR (A-7E) Application Data Types Module.", "abstract": "Abstract : This report describes the programmer interface to a set of avionics-oriented abstract data types implemented in software. @@ -7922,14 +8693,15 @@ interactions: intended as a model for other people interested in applying the abstract interface approach on other software projects.", "venue": "", "year": 1983, "referenceCount": 1, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1983-08-23", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1734918", - "name": "P. Clements"}, {"authorId": "1796685", "name": "S. Faulk"}, {"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "ed3d35e147d22355f8f827a0670a99c6dad9d793", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1983-08-23", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1734918", "name": "P. Clements"}, {"authorId": "1796685", "name": "S. Faulk"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "ed3d35e147d22355f8f827a0670a99c6dad9d793", "externalIds": {"DBLP": "journals/cacm/Parnas83", "MAG": "206857347", "DOI": - "10.1145/357980.358011", "CorpusId": 47073088}, "url": "https://www.semanticscholar.org/paper/ed3d35e147d22355f8f827a0670a99c6dad9d793", + "10.1145/357980.358011", "CorpusId": 47073088}, "corpusId": 47073088, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ed3d35e147d22355f8f827a0670a99c6dad9d793", "title": "A technique for software module specification with examples", "abstract": "This paper presents an approach to writing specifications for parts of software systems. The main goal is to provide specifications sufficiently precise and @@ -7938,14 +8710,16 @@ interactions: in the specification no more information than necessary to meet the first goal. The technique is illustrated by means of a variety of examples from a tutorial system.", "venue": "CACM", "year": 1983, "referenceCount": 0, "citationCount": - 76, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, - "journal": {"volume": "26", "pages": "75-78", "name": "Commun. ACM"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "f8e6c75e65c80455f6c79c4f9b1abd5edeb54c8e", + 76, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/357980.358011", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + null, "journal": {"volume": "26", "pages": "75-78", "name": "Commun. ACM"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "f8e6c75e65c80455f6c79c4f9b1abd5edeb54c8e", "externalIds": {"MAG": "2054616994", "DBLP": "conf/rpr/DixonMP82", "DOI": - "10.1145/1006259.1006267", "CorpusId": 18484539}, "url": "https://www.semanticscholar.org/paper/f8e6c75e65c80455f6c79c4f9b1abd5edeb54c8e", + "10.1145/1006259.1006267", "CorpusId": 18484539}, "corpusId": 18484539, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f8e6c75e65c80455f6c79c4f9b1abd5edeb54c8e", "title": "Rapid prototyping by means of abstract module specifications written as trace axioms", "abstract": "In this paper we discuss the use of a form of abstract specifications for software modules called trace axioms or trace @@ -7955,15 +8729,24 @@ interactions: by a man-machine interactive process. These specifications could then be interpreted or compiled to form a rapid prototype of the final system.", "venue": "Rapid Prototyping", "year": 1982, "referenceCount": 32, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1982-12-01", "journal": {"pages": "45-49"}, "authors": - [{"authorId": "10266004", "name": "J. K. Dixon"}, {"authorId": "40044096", - "name": "J. McLean"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "17fe112cf19606d77f50423171c1f67d574c4b62", "externalIds": {"MAG": "2021414839", - "DOI": "10.1002/J.1538-7305.1981.TB00304.X", "CorpusId": 21203801}, "url": - "https://www.semanticscholar.org/paper/17fe112cf19606d77f50423171c1f67d574c4b62", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1982-12-01", "journal": + {"pages": "45-49"}, "authors": [{"authorId": "10266004", "name": "J. K. Dixon"}, + {"authorId": "40044096", "name": "J. McLean"}, {"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "17fe112cf19606d77f50423171c1f67d574c4b62", "externalIds": + {"MAG": "2021414839", "DOI": "10.1002/J.1538-7305.1981.TB00304.X", "CorpusId": + 21203801}, "corpusId": 21203801, "publicationVenue": {"id": "afc7787c-2845-4de9-a1a8-6a858bd7d802", + "name": "Bell Labs technical journal", "type": "journal", "alternate_names": + ["Bell Syst Tech J", "Bell Lab tech j", "Bell Lab Tech J", "Bell Labs Technical + Journal", "Bell System Technical Journal"], "issn": "1089-7089", "alternate_issns": + ["0005-8580"], "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/97517143", + "alternate_urls": ["http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6731002", + "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6731005", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6731002", + "http://www.alcatel-lucent.com/bstj/", "http://ieeexplore.ieee.org/servlet/opac?punumber=6731003", + "http://ieeexplore.ieee.org/servlet/opac?punumber=6731005", "http://www3.interscience.wiley.com/cgi-bin/jtoc?ID=97517143"]}, + "url": "https://www.semanticscholar.org/paper/17fe112cf19606d77f50423171c1f67d574c4b62", "title": "Using documentation as a software design medium", "abstract": "This article describes a software design method based on the principles of separation of concerns and information hiding. The principle of separation of concerns @@ -7980,14 +8763,16 @@ interactions: applying the design method are described, and some examples are included.", "venue": "Bell Labs technical journal", "year": 1981, "referenceCount": 6, "citationCount": 91, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1981-10-01", "journal": {"volume": "60", "pages": - "1941-1977", "name": "The Bell System Technical Journal"}, "authors": [{"authorId": - "96652351", "name": "S. Hester"}, {"authorId": "1726629", "name": "D. Parnas"}, - {"authorId": "144965670", "name": "D. Utter"}]}, {"paperId": "8afdf6fee6cfedfeb4dff52920714e55247d8e41", - "externalIds": {"MAG": "1600257876", "CorpusId": 2042351}, "url": "https://www.semanticscholar.org/paper/8afdf6fee6cfedfeb4dff52920714e55247d8e41", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1981-10-01", "journal": {"volume": + "60", "pages": "1941-1977", "name": "The Bell System Technical Journal"}, + "authors": [{"authorId": "96652351", "name": "S. Hester"}, {"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "144965670", "name": "D. Utter"}]}, {"paperId": + "8afdf6fee6cfedfeb4dff52920714e55247d8e41", "externalIds": {"MAG": "1600257876", + "CorpusId": 2042351}, "corpusId": 2042351, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8afdf6fee6cfedfeb4dff52920714e55247d8e41", "title": "A-7E Software Module Guide.", "abstract": "Abstract : This document describes the basic organization of NRL''s version of the A-7E onboard flight software. The report describes a structure in which modules have been designed @@ -7999,13 +8784,14 @@ interactions: both as a guide to the A-7E software and as a model for those developing other software systems. (Author)", "venue": "", "year": 1981, "referenceCount": 60, "citationCount": 38, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1981-12-08", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "144403342", - "name": "K. Britton"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "d3fe0eeddfacf1f8708314dfa785a5928a4a39d0", "externalIds": {"MAG": "326799471", - "CorpusId": 60328307}, "url": "https://www.semanticscholar.org/paper/d3fe0eeddfacf1f8708314dfa785a5928a4a39d0", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1981-12-08", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "144403342", "name": "K. Britton"}, {"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "d3fe0eeddfacf1f8708314dfa785a5928a4a39d0", "externalIds": {"MAG": + "326799471", "CorpusId": 60328307}, "corpusId": 60328307, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d3fe0eeddfacf1f8708314dfa785a5928a4a39d0", "title": "Software Engineering Principles 3-14 August 1981,", "abstract": "Abstract : This is the notebook from the updated edition of the well-received course originated by the Naval Research Laboratory and taught annually for @@ -8025,15 +8811,20 @@ interactions: are not embedded), disciplined documentation techniques, techniques for formal specification, and designing systems with useful subsets. (Author)", "venue": "", "year": 1981, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1981-08-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "40028053", "name": "L. Chmura"}, {"authorId": "1734918", "name": "P. Clements"}, - {"authorId": "3093759", "name": "C. Heitmeyer"}, {"authorId": "46742498", - "name": "K. Britton"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "e8a97aa96d7ee958b97f49b1a60db14cb860a6be", "externalIds": {"DBLP": "conf/icse/BrittonPP81", - "MAG": "1677972604", "CorpusId": 10806241}, "url": "https://www.semanticscholar.org/paper/e8a97aa96d7ee958b97f49b1a60db14cb860a6be", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1981-08-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "40028053", "name": "L. Chmura"}, + {"authorId": "1734918", "name": "P. Clements"}, {"authorId": "3093759", "name": + "C. Heitmeyer"}, {"authorId": "46742498", "name": "K. Britton"}, {"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "e8a97aa96d7ee958b97f49b1a60db14cb860a6be", + "externalIds": {"DBLP": "conf/icse/BrittonPP81", "MAG": "1677972604", "CorpusId": + 10806241}, "corpusId": 10806241, "publicationVenue": {"id": "a36dc29e-4ea1-4567-b0fe-1c06daf8bee8", + "name": "International Conference on Software Engineering", "type": "conference", + "alternate_names": ["IEEE Int Conf Semicond Electron", "IEEE International + Conference on Semiconductor Electronics", "ICSE", "Int Conf Softw Eng"], "url": + "http://www.icse-conferences.org/"}, "url": "https://www.semanticscholar.org/paper/e8a97aa96d7ee958b97f49b1a60db14cb860a6be", "title": "A procedure for designing abstract interfaces for device interface modules", "abstract": "This paper describes the abstract interface principle and shows how it can be applied in the design of device interface modules. @@ -8047,14 +8838,15 @@ interactions: on request; it provides a fully worked out example of the design approach discussed in this paper.", "venue": "International Conference on Software Engineering", "year": 1981, "referenceCount": 8, "citationCount": 97, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1981-03-09", "journal": {"pages": "195-206"}, "authors": - [{"authorId": "144403342", "name": "K. Britton"}, {"authorId": "2070371755", - "name": "R. A. Parker"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "c89558d5dda6ac4ec4e7626f6fb7a6ffc9b871ed", "externalIds": {"MAG": "305948852", - "CorpusId": 60292833}, "url": "https://www.semanticscholar.org/paper/c89558d5dda6ac4ec4e7626f6fb7a6ffc9b871ed", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1981-03-09", "journal": + {"pages": "195-206"}, "authors": [{"authorId": "144403342", "name": "K. Britton"}, + {"authorId": "2070371755", "name": "R. A. Parker"}, {"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "c89558d5dda6ac4ec4e7626f6fb7a6ffc9b871ed", + "externalIds": {"MAG": "305948852", "CorpusId": 60292833}, "corpusId": 60292833, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c89558d5dda6ac4ec4e7626f6fb7a6ffc9b871ed", "title": "Abstract Interface Specifications for the A-7E Device Interface Module.", "abstract": "Abstract : As part of the experimental redesign of the flight software for the Navy''s A-7 aircraft, software modules were designed @@ -8072,15 +8864,20 @@ interactions: is intended to serve as a model for the other people interested in applying the abstract interface approach on other software projects. (Author)", "venue": "", "year": 1980, "referenceCount": 0, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1980-11-20", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "2070371755", "name": "R. A. Parker"}, {"authorId": "2354821", "name": "Kathryn - L. Heninger"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": - "35201459", "name": "J. Shore"}]}, {"paperId": "08d16c28d15fdab9455685d222eee67a79b7931c", - "externalIds": {"MAG": "2107232214", "DBLP": "journals/tse/Parnas79", "DOI": - "10.1109/TSE.1979.234169", "CorpusId": 9616435}, "url": "https://www.semanticscholar.org/paper/08d16c28d15fdab9455685d222eee67a79b7931c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "1980-11-20", "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "2070371755", "name": + "R. A. Parker"}, {"authorId": "2354821", "name": "Kathryn L. Heninger"}, {"authorId": + "1726629", "name": "D. Parnas"}, {"authorId": "35201459", "name": "J. Shore"}]}, + {"paperId": "08d16c28d15fdab9455685d222eee67a79b7931c", "externalIds": {"MAG": + "2107232214", "DBLP": "journals/tse/Parnas79", "DOI": "10.1109/TSE.1979.234169", + "CorpusId": 9616435}, "corpusId": 9616435, "publicationVenue": {"id": "c99cfe66-b71c-4ca4-bedd-26267b9cb068", + "name": "IEEE Transactions on Software Engineering", "type": "journal", "alternate_names": + ["IEEE Trans Softw Eng"], "issn": "0098-5589", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=32", + "alternate_urls": ["http://www.computer.org/portal/web/tse/about"]}, "url": + "https://www.semanticscholar.org/paper/08d16c28d15fdab9455685d222eee67a79b7931c", "title": "Designing Software for Ease of Extension and Contraction", "abstract": "Designing software to be extensible and easily contracted is discussed as a special case of design for change. A number of ways that extension and contraction @@ -8092,25 +8889,31 @@ interactions: extensions can lead to software that can be tailored to the needs of a broad variety of users.", "venue": "IEEE Transactions on Software Engineering", "year": 1978, "referenceCount": 21, "citationCount": 955, "influentialCitationCount": - 46, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1978-05-10", "journal": {"volume": "SE-5", "pages": "128-138", - "name": "IEEE Transactions on Software Engineering"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "1e32fcc9d7c72ac9c37bba24f9d14d4658da37ab", - "externalIds": {"MAG": "133354355", "DBLP": "conf/eci/BartussekP78", "DOI": - "10.1007/3-540-08934-9_80", "CorpusId": 32037410}, "url": "https://www.semanticscholar.org/paper/1e32fcc9d7c72ac9c37bba24f9d14d4658da37ab", + 46, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1978-05-10", "journal": + {"volume": "SE-5", "pages": "128-138", "name": "IEEE Transactions on Software + Engineering"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "1e32fcc9d7c72ac9c37bba24f9d14d4658da37ab", "externalIds": {"MAG": + "133354355", "DBLP": "conf/eci/BartussekP78", "DOI": "10.1007/3-540-08934-9_80", + "CorpusId": 32037410}, "corpusId": 32037410, "publicationVenue": {"id": "0489b0dd-6284-4ef7-87cb-fec6c238fad6", + "name": "Conference of the European Cooperation in Informatics", "type": "conference", + "alternate_names": ["ECI", "Conf Eur Cooperation Informatics"]}, "url": "https://www.semanticscholar.org/paper/1e32fcc9d7c72ac9c37bba24f9d14d4658da37ab", "title": "Using assertions about traces to write abstract specifications for software modules", "abstract": null, "venue": "Conference of the European Cooperation in Informatics", "year": 1978, "referenceCount": 22, "citationCount": - 116, "influentialCitationCount": 11, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1978-10-10", "journal": - {"pages": "211-236"}, "authors": [{"authorId": "2442867", "name": "Wolfram - Bartussek"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "8b5165ecb0f6b21a6465debada52e7156cc66fa1", + 116, "influentialCitationCount": 11, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007%2F3-540-08934-9_80.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1978-10-10", "journal": {"pages": "211-236"}, "authors": + [{"authorId": "2442867", "name": "Wolfram Bartussek"}, {"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "8b5165ecb0f6b21a6465debada52e7156cc66fa1", "externalIds": {"MAG": "1993723386", "DBLP": "journals/sigops/Parnas78", "DOI": - "10.1145/775323.775324", "CorpusId": 33022373}, "url": "https://www.semanticscholar.org/paper/8b5165ecb0f6b21a6465debada52e7156cc66fa1", + "10.1145/775323.775324", "CorpusId": 33022373}, "corpusId": 33022373, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8b5165ecb0f6b21a6465debada52e7156cc66fa1", "title": "The non-problem of nested monitor calls", "abstract": "A monitor is a set of programs that keep track of~ regulate, or control the usage of some resource [2 ]. This term was used with this meaning at least as early @@ -8119,14 +8922,16 @@ interactions: is important not to confuse one linguistic construct with the mechanism that is to be i~ ple mented.", "venue": "OPSR", "year": 1978, "referenceCount": 8, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "12", "pages": "12-18", "name": "ACM SIGOPS Oper. - Syst. Rev."}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "e86e5af31aa85fddf397ec2e9df723b1420bfa27", "externalIds": {"DBLP": - "journals/sigsoft/Parnas78", "MAG": "2047478331", "DOI": "10.1145/1010741.1010744", - "CorpusId": 42277807}, "url": "https://www.semanticscholar.org/paper/e86e5af31aa85fddf397ec2e9df723b1420bfa27", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/775323.775324", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "12", "pages": "12-18", "name": + "ACM SIGOPS Oper. Syst. Rev."}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "e86e5af31aa85fddf397ec2e9df723b1420bfa27", "externalIds": + {"DBLP": "journals/sigsoft/Parnas78", "MAG": "2047478331", "DOI": "10.1145/1010741.1010744", + "CorpusId": 42277807}, "corpusId": 42277807, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e86e5af31aa85fddf397ec2e9df723b1420bfa27", "title": "Another view of the Dijkstra-dMLP controversy", "abstract": "The correspondence between Professor Dijkstra on on e side and Professors deMillo, Lipton, and Perlis (dMLP) o n the other side is distressing because both sides @@ -8161,28 +8966,30 @@ interactions: that are to be useful objects fro m producing programs for publication in journals an d \u2026", "venue": "SOEN", "year": 1978, "referenceCount": 3, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1978-10-01", "journal": {"volume": "3", "pages": "20-21", "name": "ACM SIGSOFT - Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "f83ee8cd12dea148e283181f959ed4ff1721b6f3", "externalIds": {"MAG": - "350346709", "CorpusId": 60113651}, "url": "https://www.semanticscholar.org/paper/f83ee8cd12dea148e283181f959ed4ff1721b6f3", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1978-10-01", "journal": {"volume": "3", "pages": "20-21", + "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "f83ee8cd12dea148e283181f959ed4ff1721b6f3", + "externalIds": {"MAG": "350346709", "CorpusId": 60113651}, "corpusId": 60113651, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f83ee8cd12dea148e283181f959ed4ff1721b6f3", "title": "Basic Research in Support of Concurrent Fault Monitoring in Modular Digital Systems.", "abstract": "Abstract : The overall objective of this effort is to discover on-line fault detection, isolation and repair techniques and measures of effectiveness which will be ultimately applicable to tactical and strategic modular digital systems.", "venue": "", "year": 1978, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1978-06-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2783427", "name": "J. W. Gault"}, - {"authorId": "1926706", "name": "P. Marinos"}, {"authorId": "1730193", "name": - "Kishor S. Trivedi"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "2ac14f710c67d0b84ef4235528726c955e73aa14", "externalIds": {"DBLP": "journals/sigsoft/Parnas77", - "MAG": "2463412595", "DOI": "10.1145/1012319.1012320", "CorpusId": 29434014}, - "url": "https://www.semanticscholar.org/paper/2ac14f710c67d0b84ef4235528726c955e73aa14", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1978-06-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2783427", + "name": "J. W. Gault"}, {"authorId": "1926706", "name": "P. Marinos"}, {"authorId": + "1730193", "name": "Kishor S. Trivedi"}, {"authorId": "1726629", "name": "D. + Parnas"}]}, {"paperId": "2ac14f710c67d0b84ef4235528726c955e73aa14", "externalIds": + {"DBLP": "journals/sigsoft/Parnas77", "MAG": "2463412595", "DOI": "10.1145/1012319.1012320", + "CorpusId": 29434014}, "corpusId": 29434014, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2ac14f710c67d0b84ef4235528726c955e73aa14", "title": "Building reliable software in BLOWHARD", "abstract": "This note is written as a position paper for a panel discussion at a conference entitled \" Language Design for Reliable Software \". The position that it presents @@ -8215,57 +9022,63 @@ interactions: classes of computations. A computation is a sequence of state transformations . A single program describes a class tha t \u2026", "venue": "SOEN", "year": 1977, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1977-04-01", "journal": {"volume": "2", "pages": "5-6", - "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "2cdcba93e1f38898c0b1ac642aa33cc9769a0ca6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1977-04-01", "journal": + {"volume": "2", "pages": "5-6", "name": "ACM SIGSOFT Softw. Eng. Notes"}, + "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "2cdcba93e1f38898c0b1ac642aa33cc9769a0ca6", "externalIds": {"MAG": "2523423951", "DOI": "10.5445/IR/270010864", "CorpusId": - 64351951}, "url": "https://www.semanticscholar.org/paper/2cdcba93e1f38898c0b1ac642aa33cc9769a0ca6", + 64351951}, "corpusId": 64351951, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2cdcba93e1f38898c0b1ac642aa33cc9769a0ca6", "title": "A recommendation on methodology in computer graphics", "abstract": null, "venue": "", "year": 1977, "referenceCount": 0, "citationCount": 2, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "3325501", "name": "J. - Encarna\u00e7\u00e3o"}, {"authorId": "152835418", "name": "B. Fink"}, {"authorId": - "2082881699", "name": "E. Hoerbst"}, {"authorId": "2365509", "name": "R. Konkart"}, - {"authorId": "1478533105", "name": "G. Nees"}, {"authorId": "1726629", "name": - "D. Parnas"}, {"authorId": "1782306", "name": "E. Schlechtendahl"}]}, {"paperId": - "3d0a692a2916ed654f8d79a19589e6f38eae2547", "externalIds": {"MAG": "1502897814", - "CorpusId": 17485600}, "url": "https://www.semanticscholar.org/paper/3d0a692a2916ed654f8d79a19589e6f38eae2547", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3325501", + "name": "J. Encarna\u00e7\u00e3o"}, {"authorId": "152835418", "name": "B. + Fink"}, {"authorId": "2082881699", "name": "E. Hoerbst"}, {"authorId": "2365509", + "name": "R. Konkart"}, {"authorId": "1478533105", "name": "G. Nees"}, {"authorId": + "1726629", "name": "D. Parnas"}, {"authorId": "1782306", "name": "E. Schlechtendahl"}]}, + {"paperId": "3d0a692a2916ed654f8d79a19589e6f38eae2547", "externalIds": {"MAG": + "1502897814", "CorpusId": 17485600}, "corpusId": 17485600, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3d0a692a2916ed654f8d79a19589e6f38eae2547", "title": "Using traces to write abstract specifications for software modules", "abstract": null, "venue": "", "year": 1977, "referenceCount": 20, "citationCount": - 41, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "2442867", "name": "Wolfram Bartussek"}, - {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "3ecdd1139657ba979fa7ae1f9764baa24e2bfea0", - "externalIds": {"DBLP": "journals/sigsoft/Parnas77a", "MAG": "1999440652", - "DOI": "10.1145/1005882.1005884", "CorpusId": 35734384}, "url": "https://www.semanticscholar.org/paper/3ecdd1139657ba979fa7ae1f9764baa24e2bfea0", + 41, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2442867", + "name": "Wolfram Bartussek"}, {"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "3ecdd1139657ba979fa7ae1f9764baa24e2bfea0", "externalIds": {"DBLP": + "journals/sigsoft/Parnas77a", "MAG": "1999440652", "DOI": "10.1145/1005882.1005884", + "CorpusId": 35734384}, "corpusId": 35734384, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3ecdd1139657ba979fa7ae1f9764baa24e2bfea0", "title": "ACM (Association of Carriage Manufacturers): SIGTRANS notices -- another historical item", "abstract": null, "venue": "SOEN", "year": 1977, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1977-10-01", "journal": - {"volume": "2", "pages": "6-7", "name": "ACM SIGSOFT Softw. Eng. Notes"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "4eeb7674f2eb4cf68aa7d02308c8bcb5766ee971", - "externalIds": {"DBLP": "conf/ifip/Parnas77", "MAG": "27461577", "CorpusId": - 34658162}, "url": "https://www.semanticscholar.org/paper/4eeb7674f2eb4cf68aa7d02308c8bcb5766ee971", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Engineering", "source": "external"}, {"category": "History", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1977-10-01", "journal": {"volume": "2", "pages": "6-7", "name": "ACM SIGSOFT + Softw. Eng. Notes"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "4eeb7674f2eb4cf68aa7d02308c8bcb5766ee971", "externalIds": {"DBLP": + "conf/ifip/Parnas77", "MAG": "27461577", "CorpusId": 34658162}, "corpusId": + 34658162, "publicationVenue": {"id": "a45e99db-b6f6-4042-8b23-e8c11867e01c", + "name": "IFIP Congress", "type": "conference", "alternate_names": ["IFIP", + "IFIP Congr"]}, "url": "https://www.semanticscholar.org/paper/4eeb7674f2eb4cf68aa7d02308c8bcb5766ee971", "title": "The Use of Precise Specification in the Development of Software", "abstract": null, "venue": "IFIP Congress", "year": 1977, "referenceCount": 0, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "861-867"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "f511c906442fec9da1fdc73614ffba235b625346", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "861-867"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "f511c906442fec9da1fdc73614ffba235b625346", "externalIds": {"MAG": "98906227", "DOI": "10.21236/ada043369", "CorpusId": - 59669807}, "url": "https://www.semanticscholar.org/paper/f511c906442fec9da1fdc73614ffba235b625346", + 59669807}, "corpusId": 59669807, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f511c906442fec9da1fdc73614ffba235b625346", "title": "Use of Abstract Interfaces in the Development of Software for Embedded Computer Systems", "abstract": "Abstract : This report describes a procedure for designing computer systems that are developed specifically to be a component @@ -8287,13 +9100,14 @@ interactions: of the procedure is simpler, better structured software. Successful application of the procedure should result in both increased reliability and reduced lift-cycle costs.", "venue": "", "year": 1977, "referenceCount": 0, "citationCount": - 52, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1977-06-03", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "249543754671187eff9937d6ee32b08e0d768c8a", "externalIds": {"CorpusId": - 14519142}, "url": "https://www.semanticscholar.org/paper/249543754671187eff9937d6ee32b08e0d768c8a", + 52, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1977-06-03", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "249543754671187eff9937d6ee32b08e0d768c8a", + "externalIds": {"CorpusId": 14519142}, "corpusId": 14519142, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/249543754671187eff9937d6ee32b08e0d768c8a", "title": "On the Design and Development of E 1 rpFnneialniIies", "abstract": "The key to software reliability is to design, develop, and manage software with a formalized methodology which can be used by computer scientists and @@ -8333,12 +9147,13 @@ interactions: effort were interface problems [2]; and verification accounts for 50 percent of the total software development effort [3] -[5] . 9", "venue": "", "year": 1976, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1726629", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "795a1d319d1083831b84b013f0ed449af1e14c3d", "externalIds": {"DBLP": "conf/sigplan/ParnasSW76", "MAG": "2719244950", "DOI": - "10.1145/800237.807133", "CorpusId": 14448258}, "url": "https://www.semanticscholar.org/paper/795a1d319d1083831b84b013f0ed449af1e14c3d", + "10.1145/800237.807133", "CorpusId": 14448258}, "corpusId": 14448258, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/795a1d319d1083831b84b013f0ed449af1e14c3d", "title": "Abstract types defined as classes of variables", "abstract": "The concept of \u201ctype\u201d has been used without a precise definition in discussions about programming languages for 20 years. Before the concept of @@ -8354,16 +9169,21 @@ interactions: definition of the notion of type than we now have.", "venue": "Conference on Data: Abstraction, Definition and Structure", "year": 1976, "referenceCount": 23, "citationCount": 43, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1976-03-01", "journal": {"pages": "149-153"}, - "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "35201459", - "name": "J. Shore"}, {"authorId": "1773783", "name": "D. Weiss"}]}, {"paperId": - "bda5d15cc46b43fac56571bffa1939bdcaefb16d", "externalIds": {"DBLP": "journals/tse/Parnas76", - "MAG": "2116844130", "DOI": "10.1109/TSE.1976.233797", "CorpusId": 501096}, - "url": "https://www.semanticscholar.org/paper/bda5d15cc46b43fac56571bffa1939bdcaefb16d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Linguistics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1976-03-01", "journal": {"pages": "149-153"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}, {"authorId": "35201459", "name": "J. Shore"}, {"authorId": + "1773783", "name": "D. Weiss"}]}, {"paperId": "bda5d15cc46b43fac56571bffa1939bdcaefb16d", + "externalIds": {"DBLP": "journals/tse/Parnas76", "MAG": "2116844130", "DOI": + "10.1109/TSE.1976.233797", "CorpusId": 501096}, "corpusId": 501096, "publicationVenue": + {"id": "c99cfe66-b71c-4ca4-bedd-26267b9cb068", "name": "IEEE Transactions + on Software Engineering", "type": "journal", "alternate_names": ["IEEE Trans + Softw Eng"], "issn": "0098-5589", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=32", + "alternate_urls": ["http://www.computer.org/portal/web/tse/about"]}, "url": + "https://www.semanticscholar.org/paper/bda5d15cc46b43fac56571bffa1939bdcaefb16d", "title": "On the Design and Development of Program Families", "abstract": "Program families are defined (analogously to hardware families) as sets of programs whose common properties are so extensive that it is advantageous @@ -8377,14 +9197,20 @@ interactions: that the two methods are based on the same concepts but bring complementary advantages.", "venue": "IEEE Transactions on Software Engineering", "year": 2001, "referenceCount": 17, "citationCount": 981, "influentialCitationCount": - 40, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 40, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cse.msu.edu/~cse870/Materials/Parnas/program-families-TSE-March-1976.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2001-05-17", "journal": {"volume": "SE-2", "pages": "1-9", "name": "IEEE Transactions on Software Engineering"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "da8bf211be0f58c49b91f881c86dd86f3a00d6df", "externalIds": {"DBLP": "conf/icse/ParnasHW76", "MAG": "2407819694", "DOI": - "10.1109/TSE.1976.233836", "CorpusId": 11725113}, "url": "https://www.semanticscholar.org/paper/da8bf211be0f58c49b91f881c86dd86f3a00d6df", + "10.1109/TSE.1976.233836", "CorpusId": 11725113}, "corpusId": 11725113, "publicationVenue": + {"id": "c99cfe66-b71c-4ca4-bedd-26267b9cb068", "name": "IEEE Transactions + on Software Engineering", "type": "journal", "alternate_names": ["IEEE Trans + Softw Eng"], "issn": "0098-5589", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=32", + "alternate_urls": ["http://www.computer.org/portal/web/tse/about"]}, "url": + "https://www.semanticscholar.org/paper/da8bf211be0f58c49b91f881c86dd86f3a00d6df", "title": "Design and Specification of the Minimal Subset of an Operating System Family", "abstract": "The authors are engaged in a project to produce a precise description of a design for a family of operating systems. The design decisions @@ -8398,15 +9224,20 @@ interactions: the improvements that were made. Finally, the design and its specification are explained.", "venue": "IEEE Transactions on Software Engineering", "year": 1976, "referenceCount": 26, "citationCount": 25, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1976-07-01", "journal": {"volume": "SE-2", "pages": "301-307", - "name": "IEEE Transactions on Software Engineering"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "3034568", "name": "Georg Handzel"}, - {"authorId": "1890255", "name": "Harald W\u00fcrges"}]}, {"paperId": "f4282af12198e37b31009093a6227347fac5d624", - "externalIds": {"DBLP": "conf/icse/ParnasW76", "MAG": "2033969230", "CorpusId": - 9085998}, "url": "https://www.semanticscholar.org/paper/f4282af12198e37b31009093a6227347fac5d624", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1976-07-01", "journal": + {"volume": "SE-2", "pages": "301-307", "name": "IEEE Transactions on Software + Engineering"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "3034568", "name": "Georg Handzel"}, {"authorId": "1890255", "name": "Harald + W\u00fcrges"}]}, {"paperId": "f4282af12198e37b31009093a6227347fac5d624", "externalIds": + {"DBLP": "conf/icse/ParnasW76", "MAG": "2033969230", "CorpusId": 9085998}, + "corpusId": 9085998, "publicationVenue": {"id": "a36dc29e-4ea1-4567-b0fe-1c06daf8bee8", + "name": "International Conference on Software Engineering", "type": "conference", + "alternate_names": ["IEEE Int Conf Semicond Electron", "IEEE International + Conference on Semiconductor Electronics", "ICSE", "Int Conf Softw Eng"], "url": + "http://www.icse-conferences.org/"}, "url": "https://www.semanticscholar.org/paper/f4282af12198e37b31009093a6227347fac5d624", "title": "Response to undesired events in software systems", "abstract": "This paper discusses an approach to handling run-time errors in software systems. It is often assumed that in programs which can be proven correct, errors will @@ -8427,14 +9258,15 @@ interactions: of many modules.\n (5) Costs incurred because of the recovery techniques are low as no UE occurs.", "venue": "International Conference on Software Engineering", "year": 1976, "referenceCount": 10, "citationCount": 77, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1976-10-13", "journal": {"pages": "437-446"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "1890255", "name": - "Harald W\u00fcrges"}]}, {"paperId": "2e70efb93ecd6070d8102eb653b31792e0901c1c", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1976-10-13", "journal": + {"pages": "437-446"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, + {"authorId": "1890255", "name": "Harald W\u00fcrges"}]}, {"paperId": "2e70efb93ecd6070d8102eb653b31792e0901c1c", "externalIds": {"MAG": "2012910134", "DBLP": "journals/sigplan/ParnasSE75", - "DOI": "10.1145/954598.954601", "CorpusId": 25825434}, "url": "https://www.semanticscholar.org/paper/2e70efb93ecd6070d8102eb653b31792e0901c1c", + "DOI": "10.1145/954598.954601", "CorpusId": 25825434}, "corpusId": 25825434, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2e70efb93ecd6070d8102eb653b31792e0901c1c", "title": "On the need for fewer restrictions in changing compile-time environments", "abstract": "Compilers for current programming languages enforce rigid restrictions on changes, during the compilation of a statement, in the set of associations @@ -8456,31 +9288,35 @@ interactions: be intermixed by means of macros without having to make the relevant declarations global or having to repeat the declarations in places other than the environment''s definition.", "venue": "SIGP", "year": 1975, "referenceCount": 5, "citationCount": - 13, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1975-05-01", "journal": - {"volume": "10", "pages": "29-36", "name": "ACM SIGPLAN Notices"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "35201459", "name": - "J. Shore"}, {"authorId": "38479610", "name": "W. D. Elliott"}]}, {"paperId": - "5847b43b584761e5990fa2b06aaefe265a4e7679", "externalIds": {"DBLP": "journals/cacm/ParnasS75", - "MAG": "2171945039", "DOI": "10.1145/360881.360913", "CorpusId": 8311783}, - "url": "https://www.semanticscholar.org/paper/5847b43b584761e5990fa2b06aaefe265a4e7679", + 13, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/954598.954601", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1975-05-01", "journal": {"volume": "10", "pages": "29-36", "name": "ACM SIGPLAN + Notices"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "35201459", "name": "J. Shore"}, {"authorId": "38479610", "name": "W. D. Elliott"}]}, + {"paperId": "5847b43b584761e5990fa2b06aaefe265a4e7679", "externalIds": {"DBLP": + "journals/cacm/ParnasS75", "MAG": "2171945039", "DOI": "10.1145/360881.360913", + "CorpusId": 8311783}, "corpusId": 8311783, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5847b43b584761e5990fa2b06aaefe265a4e7679", "title": "Use of the concept of transparency in the design of hierarchically structured systems", "abstract": "This paper deals with the design of hierarchically structured programming systems. It develops a method for evaluating the cost of requiring programmers to work with an abstraction of a real machine. A number of examples from hardware and software are given as illustrations of the method.", "venue": "CACM", "year": 1975, "referenceCount": 19, "citationCount": - 102, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1975-07-01", "journal": - {"volume": "18", "pages": "401-408", "name": "Commun. ACM"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "1742634", "name": "D. Siewiorek"}]}, - {"paperId": "7b9b118659751c9de3931c888e1db2fdb1538321", "externalIds": {"DBLP": - "conf/relsoft/Parnas75", "MAG": "2611327310", "DOI": "10.1145/800027.808458", - "CorpusId": 16450171}, "url": "https://www.semanticscholar.org/paper/7b9b118659751c9de3931c888e1db2fdb1538321", + 102, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/360881.360913", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1975-07-01", "journal": {"volume": "18", "pages": "401-408", "name": "Commun. + ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "1742634", "name": "D. Siewiorek"}]}, {"paperId": "7b9b118659751c9de3931c888e1db2fdb1538321", + "externalIds": {"DBLP": "conf/relsoft/Parnas75", "MAG": "2611327310", "DOI": + "10.1145/800027.808458", "CorpusId": 16450171}, "corpusId": 16450171, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7b9b118659751c9de3931c888e1db2fdb1538321", "title": "The influence of software structure on reliability", "abstract": "This paper assumes software structure to be characterized by the interfaces between subsystems or modules. Reliability is considered to be a measure of @@ -8495,13 +9331,15 @@ interactions: if they are thoughtfully considered early in the design, can lead to more reliable systems.", "venue": "Reliable Software", "year": 1975, "referenceCount": 5, "citationCount": 71, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1975-06-01", "journal": {"pages": "358-362"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "b92fa0b54ef8003ba7f4bc3f444cc8a58ff06649", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/390016.808458", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1975-06-01", "journal": {"pages": "358-362"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "b92fa0b54ef8003ba7f4bc3f444cc8a58ff06649", "externalIds": {"MAG": "2005409147", "DBLP": "journals/cacm/Parnas75", "DOI": - "10.1145/360680.360709", "CorpusId": 24066507}, "url": "https://www.semanticscholar.org/paper/b92fa0b54ef8003ba7f4bc3f444cc8a58ff06649", + "10.1145/360680.360709", "CorpusId": 24066507}, "corpusId": 24066507, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b92fa0b54ef8003ba7f4bc3f444cc8a58ff06649", "title": "On a solution to the cigarette smoker''s problem (without conditional statements)", "abstract": "This report discusses a problem first introduced by Patil, who has claimed that the cigarette smoker''s problem cannot be solved @@ -8513,15 +9351,16 @@ interactions: introduction of the semaphore concept. This paper contains a solution to the problem. It also discusses the need for the generalized operators suggested by Patil.", "venue": "CACM", "year": 1975, "referenceCount": 10, "citationCount": - 25, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology", "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1975-03-01", "journal": {"volume": - "18", "pages": "181-183", "name": "Commun. ACM"}, "authors": [{"authorId": + 25, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1975-03-01", "journal": + {"volume": "18", "pages": "181-183", "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "c341b85844036dba4a3009ed441cd734bd743e30", "externalIds": {"DBLP": "journals/sigarch/Parnas75", "MAG": "1966071132", - "DOI": "10.1145/641746.641750", "CorpusId": 15804558}, "url": "https://www.semanticscholar.org/paper/c341b85844036dba4a3009ed441cd734bd743e30", + "DOI": "10.1145/641746.641750", "CorpusId": 15804558}, "corpusId": 15804558, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c341b85844036dba4a3009ed441cd734bd743e30", "title": "Evaluation criteria for abstract machines with unknown applications", "abstract": "The joint Navy/Army Computer Family Architecture (CFA) project has been based on finding an abstract design for a computer which can then @@ -8538,14 +9377,20 @@ interactions: one model is not the best for another because the relative times for some instructions vary from model to model\u00b0", "venue": "CARN", "year": 1975, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1975-09-01", "journal": {"volume": "4", "pages": "2-9", "name": "SIGARCH - Comput. Archit. News"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "e17925b7fa20729e0052fd884548f442bdf8ac77", "externalIds": {"MAG": - "2087590075", "DBLP": "journals/cacm/BabichGP75", "DOI": "10.1145/360825.360847", - "CorpusId": 13120470}, "url": "https://www.semanticscholar.org/paper/e17925b7fa20729e0052fd884548f442bdf8ac77", + true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/641746.641750", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1975-09-01", "journal": {"volume": "4", "pages": "2-9", + "name": "SIGARCH Comput. Archit. News"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "e17925b7fa20729e0052fd884548f442bdf8ac77", + "externalIds": {"MAG": "2087590075", "DBLP": "journals/cacm/BabichGP75", "DOI": + "10.1145/360825.360847", "CorpusId": 13120470}, "corpusId": 13120470, "publicationVenue": + {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", "name": "Communications of + the ACM", "type": "journal", "alternate_names": ["Commun ACM", "Communications + of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/e17925b7fa20729e0052fd884548f442bdf8ac77", "title": "Significant event simulation", "abstract": "This paper compares a new method of simulation organization, called the significant event method, with an old one, called the clock pulse method, using as examples two automobile @@ -8557,46 +9402,57 @@ interactions: the significant event method can be of value in the simulation of some systems when computational efficiency is of sufficient importance.", "venue": "Communications of the ACM", "year": 1975, "referenceCount": 8, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1975-06-01", "journal": {"volume": "18", "pages": "323 - - 329", "name": "Communications of the ACM"}, "authors": [{"authorId": "47601745", - "name": "A. F. Babich"}, {"authorId": "2711101", "name": "J. Grason"}, {"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "24c4e6c9f64e1bc23c11a85f9a42c82f4f48f013", - "externalIds": {"MAG": "2004751372", "DBLP": "journals/ipl/CoopriderHCP74", - "DOI": "10.1016/0020-0190(74)90041-6", "CorpusId": 43344397}, "url": "https://www.semanticscholar.org/paper/24c4e6c9f64e1bc23c11a85f9a42c82f4f48f013", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1975-06-01", "journal": + {"volume": "18", "pages": "323 - 329", "name": "Communications of the ACM"}, + "authors": [{"authorId": "47601745", "name": "A. F. Babich"}, {"authorId": + "2711101", "name": "J. Grason"}, {"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "24c4e6c9f64e1bc23c11a85f9a42c82f4f48f013", "externalIds": {"MAG": + "2004751372", "DBLP": "journals/ipl/CoopriderHCP74", "DOI": "10.1016/0020-0190(74)90041-6", + "CorpusId": 43344397}, "corpusId": 43344397, "publicationVenue": {"id": "44ecc2bb-f8fd-4c6d-bd54-30ca098be91d", + "name": "Information Processing Letters", "type": "journal", "alternate_names": + ["Inf Process Lett"], "issn": "0020-0190", "url": "http://www.elsevier.com/locate/ipl", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505612/description#description", + "http://www.sciencedirect.com/science/journal/00200190"]}, "url": "https://www.semanticscholar.org/paper/24c4e6c9f64e1bc23c11a85f9a42c82f4f48f013", "title": "Information Streams Sharing a Finite Buffer: Other Solutions", "abstract": null, "venue": "Information Processing Letters", "year": 1974, "referenceCount": 2, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1974-07-01", "journal": - {"volume": "3", "pages": "16-21", "name": "Inf. Process. Lett."}, "authors": - [{"authorId": "1982765", "name": "L. Cooprider"}, {"authorId": "2083604554", - "name": "F. Heymans"}, {"authorId": "46753418", "name": "P. Courtois"}, {"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "5778eb41436640cd06f0e07dc8a0114fa50a5d69", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1974-07-01", "journal": {"volume": "3", "pages": "16-21", "name": "Inf. Process. + Lett."}, "authors": [{"authorId": "1982765", "name": "L. Cooprider"}, {"authorId": + "2083604554", "name": "F. Heymans"}, {"authorId": "46753418", "name": "P. + Courtois"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "5778eb41436640cd06f0e07dc8a0114fa50a5d69", "externalIds": {"MAG": "2337483099", "DBLP": "conf/ifip/Parnas74", "DOI": - "10.1007/978-3-642-48354-7_21", "CorpusId": 38067220}, "url": "https://www.semanticscholar.org/paper/5778eb41436640cd06f0e07dc8a0114fa50a5d69", + "10.1007/978-3-642-48354-7_21", "CorpusId": 38067220}, "corpusId": 38067220, + "publicationVenue": {"id": "a45e99db-b6f6-4042-8b23-e8c11867e01c", "name": + "IFIP Congress", "type": "conference", "alternate_names": ["IFIP", "IFIP Congr"]}, + "url": "https://www.semanticscholar.org/paper/5778eb41436640cd06f0e07dc8a0114fa50a5d69", "title": "On a ''Buzzword'': Hierarchical Structure", "abstract": null, "venue": "IFIP Congress", "year": 2001, "referenceCount": 10, "citationCount": 188, - "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2001-05-17", "journal": {"pages": - "336-339"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "e0a6c0d91fbf1599b8a21147673ffb4773fd6ea1", "externalIds": {"DBLP": "conf/ibm/Parnas74", - "MAG": "1519249316", "DOI": "10.1007/3-540-07131-8_28", "CorpusId": 206611631}, - "url": "https://www.semanticscholar.org/paper/e0a6c0d91fbf1599b8a21147673ffb4773fd6ea1", + "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-05-17", "journal": + {"pages": "336-339"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "e0a6c0d91fbf1599b8a21147673ffb4773fd6ea1", "externalIds": {"DBLP": + "conf/ibm/Parnas74", "MAG": "1519249316", "DOI": "10.1007/3-540-07131-8_28", + "CorpusId": 206611631}, "corpusId": 206611631, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e0a6c0d91fbf1599b8a21147673ffb4773fd6ea1", "title": "Software Engineering or Methods for the Multi - Person Construction of Multi - Version Programs", "abstract": null, "venue": "Programming Methodology", "year": 1974, "referenceCount": 9, "citationCount": 32, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/3-540-07131-8_28.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1974-09-25", "journal": {"pages": "225-235"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "060ef36b0ad54edb1b128fa8b56b83a18ce688a3", - "externalIds": {"MAG": "1843327515", "CorpusId": 60727751}, "url": "https://www.semanticscholar.org/paper/060ef36b0ad54edb1b128fa8b56b83a18ce688a3", + "externalIds": {"MAG": "1843327515", "CorpusId": 60727751}, "corpusId": 60727751, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/060ef36b0ad54edb1b128fa8b56b83a18ce688a3", "title": "A Program Holder Module", "abstract": "Abstract : The paper describes a mechanism for holding a program in syntactic form. This mechanism can be useful to any program which processes programs: in program verification automatic @@ -8604,14 +9460,15 @@ interactions: is used to form the basis for syntax-driven text editor. Formal specifications for the program holder are also given. (Author)", "venue": "", "year": 1973, "referenceCount": 4, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1973-06-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "144027518", - "name": "L. Robinson"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "1f57db552e52e4e67ce460be50a1fe710e7c0949", "externalIds": {"DBLP": "conf/wvcs/ParnasP73", - "MAG": "2017795262", "DOI": "10.1145/800122.803957", "CorpusId": 26641436}, - "url": "https://www.semanticscholar.org/paper/1f57db552e52e4e67ce460be50a1fe710e7c0949", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1973-06-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "144027518", "name": "L. Robinson"}, {"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "1f57db552e52e4e67ce460be50a1fe710e7c0949", "externalIds": {"DBLP": + "conf/wvcs/ParnasP73", "MAG": "2017795262", "DOI": "10.1145/800122.803957", + "CorpusId": 26641436}, "corpusId": 26641436, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1f57db552e52e4e67ce460be50a1fe710e7c0949", "title": "The design of the virtual memory aspects of a virtual machine", "abstract": "This paper discusses the design of a virtual memory mechanism for use as the first level of an operating system. The virtual memory mechanism @@ -8619,13 +9476,15 @@ interactions: computer system. An implementation on the PDP-11/45 is briefly described.", "venue": "Workshop on Virtual Computer Systems", "year": 1973, "referenceCount": 3, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1973-03-26", "journal": {"pages": "184-190"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}, {"authorId": "2057299932", "name": "W. R. Price"}]}, - {"paperId": "b8d360df182b6970b6880389714d9d0a04ddf95e", "externalIds": {"MAG": - "41815716", "CorpusId": 59800237}, "url": "https://www.semanticscholar.org/paper/b8d360df182b6970b6880389714d9d0a04ddf95e", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800122.803957", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1973-03-26", "journal": {"pages": "184-190"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2057299932", + "name": "W. R. Price"}]}, {"paperId": "b8d360df182b6970b6880389714d9d0a04ddf95e", + "externalIds": {"MAG": "41815716", "CorpusId": 59800237}, "corpusId": 59800237, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b8d360df182b6970b6880389714d9d0a04ddf95e", "title": "Window : a formally-specified graphics-based text editor", "abstract": "Abstract : WINDOW is a formally-specified text editing program which exploits the graphics capabilities of CRT terminals. Terminal screens are divided into @@ -8633,14 +9492,15 @@ interactions: open files. Through the notion of linked pointers, operations upon one file may invoke corresponding operations upon other files. (Author)", "venue": "", "year": 1973, "referenceCount": 3, "citationCount": 3, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}, - {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1973-06-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "69015535", "name": "D. Gerhardt"}, {"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "4452fb11a33a409958ab8c835749d0927f0f9b53", - "externalIds": {"MAG": "851988951", "CorpusId": 62031962}, "url": "https://www.semanticscholar.org/paper/4452fb11a33a409958ab8c835749d0927f0f9b53", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Art", "source": "s2-fos-model"}, {"category": "Sociology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1973-06-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "69015535", "name": "D. Gerhardt"}, + {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "4452fb11a33a409958ab8c835749d0927f0f9b53", + "externalIds": {"MAG": "851988951", "CorpusId": 62031962}, "corpusId": 62031962, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4452fb11a33a409958ab8c835749d0927f0f9b53", "title": "On a solution to the cigarette smokers'' problem", "abstract": "This report discusses a problem first introduced by Patil [l]. Patil has presented a proof that the problem cannot be solved using the P and V operations introduced @@ -8650,26 +9510,29 @@ interactions: his original report. This report also discusses the need for the generalized operators suggested by Patil.", "venue": "", "year": 1972, "referenceCount": 3, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "5a9fd6fe9ae7c0ba1d6671dd13d8b7a9bfe8d963", "externalIds": {"MAG": "1995611930", - "DOI": "10.1145/873684.873718", "CorpusId": 15959140}, "url": "https://www.semanticscholar.org/paper/5a9fd6fe9ae7c0ba1d6671dd13d8b7a9bfe8d963", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "5a9fd6fe9ae7c0ba1d6671dd13d8b7a9bfe8d963", + "externalIds": {"MAG": "1995611930", "DOI": "10.1145/873684.873718", "CorpusId": + 15959140}, "corpusId": 15959140, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a9fd6fe9ae7c0ba1d6671dd13d8b7a9bfe8d963", "title": "A course on software engineering techniques", "abstract": "This is a report on a course entitled, \u201cSoftware Engineering Methods\u201d, which I have taught to undergraduate students at the Carnegie-Mellon University twice during the 1970-71 academic year. The course is \u201cproject oriented\u201d and aims to educate by providing experience in the use of the techniques taught.", "venue": "SGCS", "year": 1972, "referenceCount": 18, "citationCount": 12, - "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1972-03-01", "journal": {"volume": "4", "pages": - "154-159", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "815f2aac61bff695a95a5ed33b47313c022c1899", "externalIds": {"MAG": - "2165121897", "DBLP": "journals/cacm/Parnas72", "DOI": "10.1145/355602.361309", - "CorpusId": 408557}, "url": "https://www.semanticscholar.org/paper/815f2aac61bff695a95a5ed33b47313c022c1899", + "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/873684.873718", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1972-03-01", "journal": {"volume": + "4", "pages": "154-159", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "815f2aac61bff695a95a5ed33b47313c022c1899", + "externalIds": {"MAG": "2165121897", "DBLP": "journals/cacm/Parnas72", "DOI": + "10.1145/355602.361309", "CorpusId": 408557}, "corpusId": 408557, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/815f2aac61bff695a95a5ed33b47313c022c1899", "title": "A technique for software module specification with examples", "abstract": "This paper presents an approach to writing specifications for parts of software systems. The main goal is to provide specifications sufficiently precise and @@ -8678,14 +9541,16 @@ interactions: in the specification no more information than necessary to meet the first goal. The technique is illustrated by means of a variety of examples from a tutorial system.", "venue": "CACM", "year": 1972, "referenceCount": 7, "citationCount": - 723, "influentialCitationCount": 13, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1972-05-01", - "journal": {"volume": "15", "pages": "330-336", "name": "Commun. ACM"}, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "877e314d3a9f9317c162309c9ee0c660878a4bdb", - "externalIds": {"MAG": "2739910722", "DBLP": "books/sp/02/Parnas02a", "DOI": - "10.1145/361598.361623", "CorpusId": 38615454}, "url": "https://www.semanticscholar.org/paper/877e314d3a9f9317c162309c9ee0c660878a4bdb", + 723, "influentialCitationCount": 13, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/355602.361309", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "1972-05-01", "journal": {"volume": "15", "pages": "330-336", "name": "Commun. + ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "877e314d3a9f9317c162309c9ee0c660878a4bdb", "externalIds": {"MAG": "2739910722", + "DBLP": "books/sp/02/Parnas02a", "DOI": "10.1145/361598.361623", "CorpusId": + 38615454}, "corpusId": 38615454, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/877e314d3a9f9317c162309c9ee0c660878a4bdb", "title": "On the criteria to be used in decomposing systems into modules", "abstract": "This paper discusses modularization as a mechanism for improving the flexibility and comprehensibility of a system while allowing the shortening @@ -8699,27 +9564,30 @@ interactions: or more subroutines, will be less efficient in most cases. An alternative approach to implementation which does not have this effect is sketched.", "venue": "CACM", "year": 1972, "referenceCount": 17, "citationCount": 5449, - "influentialCitationCount": 225, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1972-12-01", "journal": {"volume": - "15", "pages": "1053-1058", "name": "Commun. ACM"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "9080e1f5d96b45b367f8b05a8cbd4f0c08fb5973", + "influentialCitationCount": 225, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1972-12-01", "journal": + {"volume": "15", "pages": "1053-1058", "name": "Commun. ACM"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "9080e1f5d96b45b367f8b05a8cbd4f0c08fb5973", "externalIds": {"DBLP": "conf/sigcse/Parnas72", "DOI": "10.1145/800155.805020", - "CorpusId": 232485619}, "url": "https://www.semanticscholar.org/paper/9080e1f5d96b45b367f8b05a8cbd4f0c08fb5973", + "CorpusId": 232485619}, "corpusId": 232485619, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9080e1f5d96b45b367f8b05a8cbd4f0c08fb5973", "title": "A course on software engineering techniques", "abstract": "This is a report on a course entitled, \u201cSoftware Engineering Methods\u201d, which I have taught to undergraduate students at the Carnegie-Mellon University twice during the 1970-71 academic year. The course is \u201cproject oriented\u201d and aims to educate by providing experience in the use of the techniques taught.", "venue": "SIGCSE ''72", "year": 1972, "referenceCount": 0, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/873684.873718", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "154-159"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "c71c1a8d46df6da73985672203863149249f7c3b", "externalIds": {"MAG": - "1599100035", "CorpusId": 58186489}, "url": "https://www.semanticscholar.org/paper/c71c1a8d46df6da73985672203863149249f7c3b", + "1599100035", "CorpusId": 58186489}, "corpusId": 58186489, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c71c1a8d46df6da73985672203863149249f7c3b", "title": "Response to detected errors in well-structured programs", "abstract": "This paper discusses an approach to handling run time errors in well-structured programs. It is often assumed that in well-structured programs which can be @@ -8728,13 +9596,14 @@ interactions: describes an organization for structured programs which attempts to satisfy the following criteria:", "venue": "", "year": 1972, "referenceCount": 8, "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. - Parnas"}]}, {"paperId": "cd9df17845d5061ee62fc6e7260e40ccea874fbd", "externalIds": - {"DBLP": "journals/cacm/ParnasH72", "MAG": "2080164549", "DOI": "10.1145/361573.361586", - "CorpusId": 16510944}, "url": "https://www.semanticscholar.org/paper/cd9df17845d5061ee62fc6e7260e40ccea874fbd", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "cd9df17845d5061ee62fc6e7260e40ccea874fbd", + "externalIds": {"DBLP": "journals/cacm/ParnasH72", "MAG": "2080164549", "DOI": + "10.1145/361573.361586", "CorpusId": 16510944}, "corpusId": 16510944, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/cd9df17845d5061ee62fc6e7260e40ccea874fbd", "title": "Comment on deadlock preventive method", "abstract": "find it a bit misleading to apply the appellation \"perma-nent blocking\" to a condition which under fortuitous circumstances might resolve itself. We prefer the term @@ -8768,15 +9637,16 @@ interactions: and to the fact that reprinting privileges were granted by permission of the Association for Computing Machinery. My note commenting on Habermann''s Communications article \u2026", "venue": "CACM", "year": 1972, "referenceCount": 7, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1972-09-01", "journal": - {"volume": "15", "pages": "840-841", "name": "Commun. ACM"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}, {"authorId": "145985550", "name": "A. Habermann"}]}, - {"paperId": "e3cf354cbcf5dfaa4a1500f6e645051c4a6d6935", "externalIds": {"DBLP": - "conf/afips/Parnas72", "MAG": "2062826273", "DOI": "10.1145/1479992.1480035", - "CorpusId": 207171109}, "url": "https://www.semanticscholar.org/paper/e3cf354cbcf5dfaa4a1500f6e645051c4a6d6935", + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Geology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1972-09-01", "journal": {"volume": "15", "pages": "840-841", "name": "Commun. + ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "145985550", "name": "A. Habermann"}]}, {"paperId": "e3cf354cbcf5dfaa4a1500f6e645051c4a6d6935", + "externalIds": {"DBLP": "conf/afips/Parnas72", "MAG": "2062826273", "DOI": + "10.1145/1479992.1480035", "CorpusId": 207171109}, "corpusId": 207171109, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e3cf354cbcf5dfaa4a1500f6e645051c4a6d6935", "title": "Some conclusions from an experiment in software engineering techniques", "abstract": "In two earlier reports we have suggested some techniques to be used producing software with many programmers. The techniques were especially @@ -8794,13 +9664,16 @@ interactions: subsystems. No intellectual effort is required in the final assembly or \"integration\" phase.", "venue": "AFIPS ''72 (Fall, part I)", "year": 1972, "referenceCount": 8, "citationCount": 36, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1972-12-05", "journal": {"pages": "325-329"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "17f06e0b0f9d3abcf5771957246e8de847d39b49", + "openAccessPdf": {"url": "https://figshare.com/articles/journal_contribution/Some_conclusions_from_an_experiment_in_software_engineering_techniques/6609650/1/files/12101777.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1972-12-05", "journal": {"pages": "325-329"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "17f06e0b0f9d3abcf5771957246e8de847d39b49", "externalIds": {"MAG": "1562161142", "DBLP": "conf/ifip/Parnas71", "DOI": - "10.1184/R1/6606470.V1", "CorpusId": 1889510}, "url": "https://www.semanticscholar.org/paper/17f06e0b0f9d3abcf5771957246e8de847d39b49", + "10.1184/R1/6606470.V1", "CorpusId": 1889510}, "corpusId": 1889510, "publicationVenue": + {"id": "a45e99db-b6f6-4042-8b23-e8c11867e01c", "name": "IFIP Congress", "type": + "conference", "alternate_names": ["IFIP", "IFIP Congr"]}, "url": "https://www.semanticscholar.org/paper/17f06e0b0f9d3abcf5771957246e8de847d39b49", "title": "Information Distribution Aspects of Design Methodology", "abstract": "The role of documentation in the design and implementation of complex systems is explored, resulting in suggestions in sharp contrast with current practice. @@ -8820,13 +9693,15 @@ interactions: ASPECTS OF DESIGN METHODOLOGY D. L. Parnas Department of Computer Science Carnegie-MelIon University Pittsburgh, Pennsylvania", "venue": "IFIP Congress", "year": 1971, "referenceCount": 18, "citationCount": 357, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "339-344"}, "authors": [{"authorId": - "1726629", "name": "D. Parnas"}]}, {"paperId": "43aa639d8df2285bd805531889d1d5f49563c17d", - "externalIds": {"MAG": "2395161886", "DBLP": "journals/cacm/CouroisHP71", - "DOI": "10.1145/362759.362813", "CorpusId": 7540747}, "url": "https://www.semanticscholar.org/paper/43aa639d8df2285bd805531889d1d5f49563c17d", + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "339-344"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "43aa639d8df2285bd805531889d1d5f49563c17d", "externalIds": {"MAG": + "2395161886", "DBLP": "journals/cacm/CouroisHP71", "DOI": "10.1145/362759.362813", + "CorpusId": 7540747}, "corpusId": 7540747, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/43aa639d8df2285bd805531889d1d5f49563c17d", "title": "Concurrent control with \u201creaders\u201d and \u201cwriters\u201d", "abstract": "The problem of the mutual exclusion of several independent processes from simultaneous access to a \u201ccritical section\u201d is discussed for @@ -8836,15 +9711,16 @@ interactions: are presented: one for the case where we wish minimum delay for the readers; the other for the case where we wish writing to take place as early as possible.", "venue": "CACM", "year": 1971, "referenceCount": 4, "citationCount": 563, - "influentialCitationCount": 16, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1971-10-01", "journal": {"volume": "14", "pages": "667-668", - "name": "Commun. ACM"}, "authors": [{"authorId": "46753418", "name": "P. Courtois"}, - {"authorId": "2083604554", "name": "F. Heymans"}, {"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "a9794d8d0d8bddba37bd3f70baec8c0274bc667e", - "externalIds": {"MAG": "839779267", "CorpusId": 60396075}, "url": "https://www.semanticscholar.org/paper/a9794d8d0d8bddba37bd3f70baec8c0274bc667e", + "influentialCitationCount": 16, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Psychology", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1971-10-01", "journal": {"volume": + "14", "pages": "667-668", "name": "Commun. ACM"}, "authors": [{"authorId": + "46753418", "name": "P. Courtois"}, {"authorId": "2083604554", "name": "F. + Heymans"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "a9794d8d0d8bddba37bd3f70baec8c0274bc667e", + "externalIds": {"MAG": "839779267", "CorpusId": 60396075}, "corpusId": 60396075, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a9794d8d0d8bddba37bd3f70baec8c0274bc667e", "title": "A paradigm for software module specification with examples", "abstract": "This paper presents a method for writing specifications of parts of software systems. The main goal is to provide specifications sufficiently precise and @@ -8853,14 +9729,15 @@ interactions: in the specification no more information than necessary to meet the first goal. The technique is illustrated by means of a variety of examples from a tutorial system.", "venue": "", "year": 1971, "referenceCount": 5, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "1f8a6f774f3baed6b8c7c84a47344b394fbdc6a7", "externalIds": {"DBLP": - "conf/acm/Parnas69", "MAG": "1981686104", "DOI": "10.1145/800195.805945", - "CorpusId": 14569417}, "url": "https://www.semanticscholar.org/paper/1f8a6f774f3baed6b8c7c84a47344b394fbdc6a7", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "1f8a6f774f3baed6b8c7c84a47344b394fbdc6a7", + "externalIds": {"DBLP": "conf/acm/Parnas69", "MAG": "1981686104", "DOI": "10.1145/800195.805945", + "CorpusId": 14569417}, "corpusId": 14569417, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1f8a6f774f3baed6b8c7c84a47344b394fbdc6a7", "title": "On the use of transition diagrams in the design of a user interface for an interactive computer system", "abstract": "This paper deals with what might be called the top level design of an interactive computer system. It @@ -8872,13 +9749,15 @@ interactions: to provide a great improvement in flexibility and case of adding subsystems to a general purpose system.", "venue": "ACM ''69", "year": 1969, "referenceCount": 6, "citationCount": 229, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1969-08-26", "journal": {"pages": "379-385"}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "5a1c1e8e9336feafc4bbceb0d5bda703ef073402", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800195.805945", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1969-08-26", "journal": {"pages": "379-385"}, "authors": + [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "5a1c1e8e9336feafc4bbceb0d5bda703ef073402", "externalIds": {"DBLP": "conf/afips/Parnas69", "MAG": "2099404991", "DOI": - "10.1145/1476793.1476917", "CorpusId": 11790027}, "url": "https://www.semanticscholar.org/paper/5a1c1e8e9336feafc4bbceb0d5bda703ef073402", + "10.1145/1476793.1476917", "CorpusId": 11790027}, "corpusId": 11790027, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5a1c1e8e9336feafc4bbceb0d5bda703ef073402", "title": "More on simulation languages and design methodology for computer systems", "abstract": "In an earlier paper we attempted to set forth (1) a design methodology for computer systems which made heavy use of simulation @@ -8893,27 +9772,30 @@ interactions: themselves as systems. By means of the SODAS language it was to be possible to evaluate the design at any stage in its development without excess effort.", "venue": "AFIPS ''69 (Spring)", "year": 1969, "referenceCount": 4, "citationCount": - 17, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1969-05-14", "journal": {"pages": - "739-743"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "7fb5c66f22a2be3462090195b9f311c2d10c8be0", "externalIds": {"DBLP": "journals/cacm/Parnas69", - "MAG": "2011923064", "DOI": "10.1145/363219.363233", "CorpusId": 14939271}, - "url": "https://www.semanticscholar.org/paper/7fb5c66f22a2be3462090195b9f311c2d10c8be0", + 17, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1969-05-14", "journal": {"pages": "739-743"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "7fb5c66f22a2be3462090195b9f311c2d10c8be0", + "externalIds": {"DBLP": "journals/cacm/Parnas69", "MAG": "2011923064", "DOI": + "10.1145/363219.363233", "CorpusId": 14939271}, "corpusId": 14939271, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7fb5c66f22a2be3462090195b9f311c2d10c8be0", "title": "On simulating networks of parallel processes in which simultaneous events may occur", "abstract": "The following resolutions were passed at the ASA X3.4 Common Programming Languages Subcommittee during the thirty-third meeting held February 20, 1964 at CEIR, Beverly Hills, California.", "venue": "CACM", "year": 1969, "referenceCount": 31, "citationCount": 17, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/363219.363233", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1969-09-01", "journal": {"volume": "12", "pages": "519-531", "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "49c0414d05a7dfdfa9a14bc9241694e5cf253bb5", "externalIds": {"DOI": "10.1093/geront/gnv602.01", - "CorpusId": 29992851, "PubMed": "20791560"}, "url": "https://www.semanticscholar.org/paper/49c0414d05a7dfdfa9a14bc9241694e5cf253bb5", + "CorpusId": 29992851, "PubMed": "20791560"}, "corpusId": 29992851, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/49c0414d05a7dfdfa9a14bc9241694e5cf253bb5", "title": "Where to publish?", "abstract": "A short abbreviated summary of a research article, thesis, review, conference proceeding or any other larger piece of work Bibliography: A list of books, articles, documents, publications @@ -8993,14 +9875,16 @@ interactions: reliability and relevance of a procedure Ann R Coll Surg Engl 2015; 97: 169\u2013172 171 WHAT TO PUBLISH", "venue": "British medical journal", "year": 1968, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://academic.oup.com/gerontologist/article-pdf/55/Suppl_2/304/19464576/gnv602.01.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "4 5627", "pages": "\n 344\n ", "name": "British medical journal"}, "authors": [{"authorId": "2615509", "name": "A. Pras"}, {"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "dab88cf31e29076b48015352550d1a6464b51c22", "externalIds": {"MAG": "1994929929", "DBLP": "journals/cacm/Parnas68", "DOI": - "10.1145/363567.363568", "CorpusId": 10820769}, "url": "https://www.semanticscholar.org/paper/dab88cf31e29076b48015352550d1a6464b51c22", + "10.1145/363567.363568", "CorpusId": 10820769}, "corpusId": 10820769, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/dab88cf31e29076b48015352550d1a6464b51c22", "title": "Letters to the editor: on improving the quality of our technical meetings", "abstract": "Technical Meetings EDITOR : Over the relatively few years that I have been attending Joint Computer Conferences and ACM national @@ -9035,14 +9919,15 @@ interactions: referee to know what standards to apply to a paper and, more important, to know how to assist an author in producing the best paper he is \u2026", "venue": "CACM", "year": 1968, "referenceCount": 7, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1968-08-01", "journal": {"volume": "11", "pages": "537-538", - "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "601a2f9f0c5a57f7aedc1abea9b7a37ade7c6bde", "externalIds": {"MAG": - "832696246", "CorpusId": 6898466}, "url": "https://www.semanticscholar.org/paper/601a2f9f0c5a57f7aedc1abea9b7a37ade7c6bde", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1968-08-01", "journal": {"volume": "11", "pages": + "537-538", "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": + "D. Parnas"}]}, {"paperId": "601a2f9f0c5a57f7aedc1abea9b7a37ade7c6bde", "externalIds": + {"MAG": "832696246", "CorpusId": 6898466}, "corpusId": 6898466, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/601a2f9f0c5a57f7aedc1abea9b7a37ade7c6bde", "title": "Sequential equivalents of parallel processes", "abstract": "This paper introduces the problem of finding a sequential process equivalent to a system of interacting discrete parallel processes. Under the assumption @@ -9052,13 +9937,14 @@ interactions: design of simulation systems and picture processing programs are discussed. Examples are taken from logic design and picture processing.", "venue": "", "year": 1967, "referenceCount": 9, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1726629", - "name": "D. Parnas"}]}, {"paperId": "a5c465ac781fa3b515b6909f39b91bd7f362b78f", - "externalIds": {"DBLP": "conf/afips/ParnasD67", "MAG": "2080749708", "DOI": - "10.1145/1465611.1465670", "CorpusId": 12436603}, "url": "https://www.semanticscholar.org/paper/a5c465ac781fa3b515b6909f39b91bd7f362b78f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": + "a5c465ac781fa3b515b6909f39b91bd7f362b78f", "externalIds": {"DBLP": "conf/afips/ParnasD67", + "MAG": "2080749708", "DOI": "10.1145/1465611.1465670", "CorpusId": 12436603}, + "corpusId": 12436603, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a5c465ac781fa3b515b6909f39b91bd7f362b78f", "title": "SODAS and a methodology for system design", "abstract": "SODAS (Structure Oriented Description And Simulation) is a simulation language and compiler being designed at Carnegie Tech for use as a tool by the designers of computer @@ -9066,14 +9952,16 @@ interactions: of \"system\" and a methodology for \"system design.\" It is the purpose of this paper to present the proposed methodology and language.", "venue": "AFIPS ''67 (Fall)", "year": 1899, "referenceCount": 8, "citationCount": 45, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/1465611.1465670", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1899-12-30", "journal": {"pages": "449-474"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2098835", "name": "J. Darringer"}]}, {"paperId": "00ddde0f4fbaf919ee986e829575917d4b6a307b", "externalIds": {"DBLP": "journals/cacm/Parnas66c", "MAG": "2126154019", "DOI": - "10.1145/365719.366428", "CorpusId": 47094366}, "url": "https://www.semanticscholar.org/paper/00ddde0f4fbaf919ee986e829575917d4b6a307b", + "10.1145/365719.366428", "CorpusId": 47094366}, "corpusId": 47094366, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/00ddde0f4fbaf919ee986e829575917d4b6a307b", "title": "State table analysis of programs in an ALGOL-like language", "abstract": "a. The source language\u2014SFD-ALGOL SFD-ALGOL 1.2 is an ALGOL-like language intended to describe the functions of synchronous systems. The function of @@ -9104,14 +9992,15 @@ interactions: this table that the process to be described derives. There exist effective algorithms that will reduce this table to the minimal possible table 3.4 .", "venue": "CACM", "year": 1966, "referenceCount": 5, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "9", "pages": "481", "name": - "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "11317ef777d53d2d64c93c8607a8c3d7e2d7fda1", "externalIds": {"DBLP": - "journals/cacm/Parnas66", "MAG": "2083091876", "DOI": "10.1145/365170.365176", - "CorpusId": 7414602}, "url": "https://www.semanticscholar.org/paper/11317ef777d53d2d64c93c8607a8c3d7e2d7fda1", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"volume": "9", "pages": "481", "name": "Commun. ACM"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "11317ef777d53d2d64c93c8607a8c3d7e2d7fda1", + "externalIds": {"DBLP": "journals/cacm/Parnas66", "MAG": "2083091876", "DOI": + "10.1145/365170.365176", "CorpusId": 7414602}, "corpusId": 7414602, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/11317ef777d53d2d64c93c8607a8c3d7e2d7fda1", "title": "A language for describing the functions of synchronous systems", "abstract": "Before the design of a system is started, the exact function desired of it should be specified. It is suggested that a computer-oriented @@ -9121,14 +10010,15 @@ interactions: descriptions can be used for simulation and automatic design of the system described, in addition to communicating system specifications.", "venue": "CACM", "year": 1966, "referenceCount": 9, "citationCount": 23, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1966-02-01", "journal": {"volume": "9", "pages": "72-76", - "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "54a2b18f5088de8e082154d3a317d1ef562982a9", "externalIds": {"DBLP": - "conf/acm/Parnas66", "DOI": "10.1145/800256.810719", "CorpusId": 14624026}, - "url": "https://www.semanticscholar.org/paper/54a2b18f5088de8e082154d3a317d1ef562982a9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1966-02-01", "journal": + {"volume": "9", "pages": "72-76", "name": "Commun. ACM"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "54a2b18f5088de8e082154d3a317d1ef562982a9", + "externalIds": {"DBLP": "conf/acm/Parnas66", "DOI": "10.1145/800256.810719", + "CorpusId": 14624026}, "corpusId": 14624026, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/54a2b18f5088de8e082154d3a317d1ef562982a9", "title": "State table analysis of programs in an algo-like language", "abstract": "a. The source language\u2014SFD-ALGOL\n SFD-ALGOL 1.2 is an ALGOL-like language intended to describe the functions of synchronous systems. The function of @@ -9159,34 +10049,41 @@ interactions: this table that the process to be described derives. There exist effective algorithms that will reduce this table to the minimal possible table 3.4.", "venue": "ACM ''66", "year": 1966, "referenceCount": 4, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "391-400"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "575e3f94e78a6f8ffb722b047393ffbab7ab5645", "externalIds": {"MAG": - "2084199506", "DBLP": "journals/cacm/Parnas66b", "DOI": "10.1145/365278.365287", - "CorpusId": 52859097}, "url": "https://www.semanticscholar.org/paper/575e3f94e78a6f8ffb722b047393ffbab7ab5645", - "title": "On facilitating parallel and multiprocessing in ALGOL", "abstract": - null, "venue": "Communications of the ACM", "year": 1966, "referenceCount": - 5, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1966-04-01", "journal": {"volume": "9", "pages": "257", "name": "Commun. - ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": - "a9660492ec61420a82eae32b27997c97c1bbb90e", "externalIds": {"MAG": "2006322213", - "DBLP": "journals/cacm/Parnas66a", "DOI": "10.1145/365278.365285", "CorpusId": - 52804379}, "url": "https://www.semanticscholar.org/paper/a9660492ec61420a82eae32b27997c97c1bbb90e", + null, "journal": {"pages": "391-400"}, "authors": [{"authorId": "1726629", + "name": "D. Parnas"}]}, {"paperId": "575e3f94e78a6f8ffb722b047393ffbab7ab5645", + "externalIds": {"MAG": "2084199506", "DBLP": "journals/cacm/Parnas66b", "DOI": + "10.1145/365278.365287", "CorpusId": 52859097}, "corpusId": 52859097, "publicationVenue": + {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", "name": "Communications of + the ACM", "type": "journal", "alternate_names": ["Commun ACM", "Communications + of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/575e3f94e78a6f8ffb722b047393ffbab7ab5645", + "title": "On facilitating parallel and multiprocessing in ALGOL", "abstract": + null, "venue": "Communications of the ACM", "year": 1966, "referenceCount": + 5, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1966-04-01", "journal": {"volume": "9", "pages": "257", + "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "a9660492ec61420a82eae32b27997c97c1bbb90e", "externalIds": {"MAG": + "2006322213", "DBLP": "journals/cacm/Parnas66a", "DOI": "10.1145/365278.365285", + "CorpusId": 52804379}, "corpusId": 52804379, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a9660492ec61420a82eae32b27997c97c1bbb90e", "title": "On the preliminary report of C3S", "abstract": null, "venue": "CACM", "year": 1966, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": - "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1966-04-01", "journal": {"volume": "9", "pages": "242-243", - "name": "Commun. ACM"}, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, - {"paperId": "6df0a1e7de443159b5f421122c8b7fcaaa4c0242", "externalIds": {"CorpusId": - 49961568}, "url": "https://www.semanticscholar.org/paper/6df0a1e7de443159b5f421122c8b7fcaaa4c0242", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", "source": + "external"}, {"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1966-04-01", "journal": {"volume": + "9", "pages": "242-243", "name": "Commun. ACM"}, "authors": [{"authorId": + "1726629", "name": "D. Parnas"}]}, {"paperId": "6df0a1e7de443159b5f421122c8b7fcaaa4c0242", + "externalIds": {"CorpusId": 49961568}, "corpusId": 49961568, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6df0a1e7de443159b5f421122c8b7fcaaa4c0242", "title": "Claims of Progress and Industrial Adoption Really Rethinking ''formal Methods''", "abstract": "logics, but the program design errors we saw in 1967 can still be found in today''s software. Applications of formal methods to @@ -9220,11 +10117,12 @@ interactions: question the assumptions underlying the well-known current formal software development methods to see why they have not been widely adopted and what should be changed.", "venue": "", "year": null, "referenceCount": 4, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1726629", "name": "D. Parnas"}]}, {"paperId": "8ee0cdb2a1bde8c88d63a6dffffbbb8f45c0b176", - "externalIds": {"CorpusId": 18051166}, "url": "https://www.semanticscholar.org/paper/8ee0cdb2a1bde8c88d63a6dffffbbb8f45c0b176", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1726629", "name": "D. Parnas"}]}, + {"paperId": "8ee0cdb2a1bde8c88d63a6dffffbbb8f45c0b176", "externalIds": {"CorpusId": + 18051166}, "corpusId": 18051166, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8ee0cdb2a1bde8c88d63a6dffffbbb8f45c0b176", "title": "The Inevitable Pain of Software Development , Including of Extreme Programming , Caused by Requirements Volatility", "abstract": "A variety of programming accidents, i.e., models and methods, including extreme programming, @@ -9233,13 +10131,14 @@ interactions: where the programming accident meets requirements, the essence of software, and their relentless volatility.", "venue": "", "year": null, "referenceCount": 33, "citationCount": 14, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "145387038", "name": "M. Jackson"}, - {"authorId": "1734918", "name": "P. Clements"}, {"authorId": "1726629", "name": - "D. Parnas"}, {"authorId": "1771065", "name": "M. Lehman"}, {"authorId": "52013279", - "name": "B. Lientz"}]}, {"paperId": "f1ba5dac0a6db5cd0f758eaca4a37c00cd718ec1", - "externalIds": {"CorpusId": 1308354}, "url": "https://www.semanticscholar.org/paper/f1ba5dac0a6db5cd0f758eaca4a37c00cd718ec1", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "145387038", + "name": "M. Jackson"}, {"authorId": "1734918", "name": "P. Clements"}, {"authorId": + "1726629", "name": "D. Parnas"}, {"authorId": "1771065", "name": "M. Lehman"}, + {"authorId": "52013279", "name": "B. Lientz"}]}, {"paperId": "f1ba5dac0a6db5cd0f758eaca4a37c00cd718ec1", + "externalIds": {"CorpusId": 1308354}, "corpusId": 1308354, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f1ba5dac0a6db5cd0f758eaca4a37c00cd718ec1", "title": "Operating Systems a Large Semaphore Based Operating System", "abstract": "how this distinction can be used to dissect models of computing systems into subsystems which can be (i) evaluated separately and (ii) represented by a @@ -9264,47 +10163,49 @@ interactions: fact that reprinting privileges were granted by permission of the Association for Computing Machinery.", "venue": "", "year": null, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "94059053", "name": "H. Simon"}, - {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": "2096685690", "name": - "R. Stockton"}, {"authorId": "2084149034", "name": "Gaines Editor"}, {"authorId": - "2087883703", "name": "S\u00a2ren Lauesen"}, {"authorId": "2087898161", "name": - "Nordisk Brown Boveri"}]}]}, {"authorId": "1711844", "externalIds": {}, "url": - "https://www.semanticscholar.org/author/1711844", "name": "I. Sommerville", - "aliases": null, "affiliations": [], "homepage": null, "paperCount": 0, "citationCount": - 0, "hIndex": 0, "papers": [{"paperId": "8ef34b65648bd4bb291ccf7c0d8ce632386ceac9", - "externalIds": {"MAG": "2260139476", "DOI": "10.1049/cce:20000401", "CorpusId": - 111806935}, "url": "https://www.semanticscholar.org/paper/8ef34b65648bd4bb291ccf7c0d8ce632386ceac9", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "94059053", + "name": "H. Simon"}, {"authorId": "1726629", "name": "D. Parnas"}, {"authorId": + "2096685690", "name": "R. Stockton"}, {"authorId": "2084149034", "name": "Gaines + Editor"}, {"authorId": "2087883703", "name": "S\u00a2ren Lauesen"}, {"authorId": + "2087898161", "name": "Nordisk Brown Boveri"}]}]}, {"authorId": "1711844", + "externalIds": {}, "url": "https://www.semanticscholar.org/author/1711844", + "name": "I. Sommerville", "aliases": null, "affiliations": [], "homepage": + null, "paperCount": 0, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": + "8ef34b65648bd4bb291ccf7c0d8ce632386ceac9", "externalIds": {"MAG": "2260139476", + "DOI": "10.1049/cce:20000401", "CorpusId": 111806935}, "corpusId": 111806935, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8ef34b65648bd4bb291ccf7c0d8ce632386ceac9", "title": "Evolution and Change", "abstract": null, "venue": "Understanding Sharia Processes", "year": 2000, "referenceCount": 0, "citationCount": 13, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], - "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": - null, "publicationDate": "2000-08-01", "journal": {"name": "Understanding - Sharia Processes"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "742c5b96ac503368086ec8264818f05ddf45bf13", "externalIds": {"MAG": - "3035506419", "CorpusId": 230695993}, "url": "https://www.semanticscholar.org/paper/742c5b96ac503368086ec8264818f05ddf45bf13", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}], "publicationTypes": null, "publicationDate": "2000-08-01", + "journal": {"name": "Understanding Sharia Processes"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "742c5b96ac503368086ec8264818f05ddf45bf13", + "externalIds": {"MAG": "3035506419", "CorpusId": 230695993}, "corpusId": 230695993, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/742c5b96ac503368086ec8264818f05ddf45bf13", "title": "Software Engineering, 10/E.", "abstract": null, "venue": "", "year": 2020, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2020-06-11", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "89595b126519658cb48ebd72f3849be9f24fd11e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2020-06-11", "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "89595b126519658cb48ebd72f3849be9f24fd11e", "externalIds": {"MAG": "3043032773", "DOI": "10.1201/9781003072072-86", "CorpusId": - 225486482}, "url": "https://www.semanticscholar.org/paper/89595b126519658cb48ebd72f3849be9f24fd11e", + 225486482}, "corpusId": 225486482, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/89595b126519658cb48ebd72f3849be9f24fd11e", "title": "Taking the Tablets Home: Designing Communication Software for Isolated Older People at Home", "abstract": null, "venue": "", "year": 2020, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2020-07-24", "journal": {"volume": - "", "pages": "358-362", "name": ""}, "authors": [{"authorId": "1834798", "name": - "G. Dewsbury"}, {"authorId": "15327163", "name": "P. Bagnall"}, {"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "2652064", "name": "V. - Onditi"}, {"authorId": "2089073", "name": "M. Rouncefield"}]}, {"paperId": - "afd48cb8eec2d1afcd92df0795a54c822ba59219", "externalIds": {"CorpusId": 40061052}, - "url": "https://www.semanticscholar.org/paper/afd48cb8eec2d1afcd92df0795a54c822ba59219", + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-07-24", + "journal": {"volume": "", "pages": "358-362", "name": ""}, "authors": [{"authorId": + "1834798", "name": "G. Dewsbury"}, {"authorId": "15327163", "name": "P. Bagnall"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2652064", + "name": "V. Onditi"}, {"authorId": "2089073", "name": "M. Rouncefield"}]}, + {"paperId": "afd48cb8eec2d1afcd92df0795a54c822ba59219", "externalIds": {"CorpusId": + 40061052}, "corpusId": 40061052, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/afd48cb8eec2d1afcd92df0795a54c822ba59219", "title": "New Artificial Intelligence Techniques in Software Engineering", "abstract": "Software development process is a very complex process that, at present, is primarily a human activity. Programming, in software development, @@ -9313,36 +10214,39 @@ interactions: these types of knowledge into one final solution. This paper intends to study the techniques developed in artificial intelligence (AI) from the standpoint of their", "venue": "", "year": 2020, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2082522856", "name": "Deepak Vishwasrao"}, {"authorId": "2087730902", - "name": "Nandre Gaikwad"}, {"authorId": "2105197281", "name": "Sanjay Annasaheb"}, - {"authorId": "2080205659", "name": "Bhikaji Ganapat"}, {"authorId": "2084048570", - "name": "Gad bibtexntst014.bibbibtex"}, {"authorId": "1711844", "name": "I. - Sommerville"}, {"authorId": "2731350", "name": "R. Pressman"}, {"authorId": - "1748317", "name": "S. Pfleeger"}]}, {"paperId": "bdbe73543b74763816127dba25fe6d7686d08365", - "externalIds": {"CorpusId": 215543130}, "url": "https://www.semanticscholar.org/paper/bdbe73543b74763816127dba25fe6d7686d08365", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2082522856", "name": "Deepak Vishwasrao"}, + {"authorId": "2087730902", "name": "Nandre Gaikwad"}, {"authorId": "2105197281", + "name": "Sanjay Annasaheb"}, {"authorId": "2080205659", "name": "Bhikaji Ganapat"}, + {"authorId": "2084048570", "name": "Gad bibtexntst014.bibbibtex"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "2731350", "name": "R. + Pressman"}, {"authorId": "1748317", "name": "S. Pfleeger"}]}, {"paperId": + "bdbe73543b74763816127dba25fe6d7686d08365", "externalIds": {"CorpusId": 215543130}, + "corpusId": 215543130, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bdbe73543b74763816127dba25fe6d7686d08365", "title": "Issues identified in the software process due to barriers found during eliciting requirements on agile software projects: Insights from India", "abstract": null, "venue": "", "year": 2020, "referenceCount": 13, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1680289", "name": "T. Gorschek"}, {"authorId": "2065374682", - "name": "Claus Wohlin"}, {"authorId": "31760996", "name": "M.F. Nisar"}, {"authorId": - "48137300", "name": "T. Hameed"}, {"authorId": "3147762", "name": "Frauke - Paetsch"}, {"authorId": "1688474", "name": "A. Eberlein"}, {"authorId": "39889582", - "name": "A. Cockburn"}, {"authorId": "3264278", "name": "J. Highsmith"}, {"authorId": - "36451627", "name": "Ernest Ferguson"}, {"authorId": "2075986", "name": "Clifton - Kussmaul"}, {"authorId": "1735114", "name": "D. McCracken"}, {"authorId": - "3309760", "name": "M. Robbert"}, {"authorId": "34929008", "name": "R. McCauley"}, - {"authorId": "35179597", "name": "Lowell Lindstrom"}, {"authorId": "31752893", - "name": "Ron Jeffries"}, {"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "144297077", "name": "C. - Potts"}, {"authorId": "2116218008", "name": "Kenji Takahashi"}, {"authorId": - "35250079", "name": "A. Ant\u00f3n"}]}, {"paperId": "051092a6a20482080b154d5c1cec51bf96b65aeb", - "externalIds": {"CorpusId": 199460411}, "url": "https://www.semanticscholar.org/paper/051092a6a20482080b154d5c1cec51bf96b65aeb", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1680289", "name": "T. Gorschek"}, + {"authorId": "2065374682", "name": "Claus Wohlin"}, {"authorId": "31760996", + "name": "M.F. Nisar"}, {"authorId": "48137300", "name": "T. Hameed"}, {"authorId": + "3147762", "name": "Frauke Paetsch"}, {"authorId": "1688474", "name": "A. + Eberlein"}, {"authorId": "39889582", "name": "A. Cockburn"}, {"authorId": + "3264278", "name": "J. Highsmith"}, {"authorId": "36451627", "name": "Ernest + Ferguson"}, {"authorId": "2075986", "name": "Clifton Kussmaul"}, {"authorId": + "1735114", "name": "D. McCracken"}, {"authorId": "3309760", "name": "M. Robbert"}, + {"authorId": "34929008", "name": "R. McCauley"}, {"authorId": "35179597", + "name": "Lowell Lindstrom"}, {"authorId": "31752893", "name": "Ron Jeffries"}, + {"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "144297077", "name": "C. Potts"}, {"authorId": + "2116218008", "name": "Kenji Takahashi"}, {"authorId": "35250079", "name": + "A. Ant\u00f3n"}]}, {"paperId": "051092a6a20482080b154d5c1cec51bf96b65aeb", + "externalIds": {"CorpusId": 199460411}, "corpusId": 199460411, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/051092a6a20482080b154d5c1cec51bf96b65aeb", "title": "Loughborough University Institutional Repository Responsibility modelling for contingency planning", "abstract": "This paper proposes the use of responsibility modelling as a tool to support the process of contingency @@ -9355,12 +10259,13 @@ interactions: research in progress, the example models presented do illustrate the potential use of responsibility modelling concepts to assist in the contingency planning process.", "venue": "", "year": 2019, "referenceCount": 17, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2109581", - "name": "Tim Storer"}]}, {"paperId": "429d51af392a9851f16c3913b2b2da9f4346fa75", - "externalIds": {"CorpusId": 102326086}, "url": "https://www.semanticscholar.org/paper/429d51af392a9851f16c3913b2b2da9f4346fa75", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "2109581", "name": "Tim Storer"}]}, {"paperId": "429d51af392a9851f16c3913b2b2da9f4346fa75", + "externalIds": {"CorpusId": 102326086}, "corpusId": 102326086, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/429d51af392a9851f16c3913b2b2da9f4346fa75", "title": "Loughborough University Institutional Repository Deriving information requirements from responsibility models", "abstract": "This paper describes research in understanding the requirements for complex information systems @@ -9375,13 +10280,14 @@ interactions: a responsibility model can be used to derive information requirements for a system that coordinates the multiple agencies dealing with an emergency.", "venue": "", "year": 2019, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "10371705", "name": "R. Lock"}, {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": "1769028", "name": "J. Dobson"}]}, {"paperId": "dcf2619f314da79af7566849ab2c2e72c7efa008", "externalIds": {"DOI": - "10.1515/9783110671438-017", "CorpusId": 241672058}, "url": "https://www.semanticscholar.org/paper/dcf2619f314da79af7566849ab2c2e72c7efa008", + "10.1515/9783110671438-017", "CorpusId": 241672058}, "corpusId": 241672058, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dcf2619f314da79af7566849ab2c2e72c7efa008", "title": "Annotated References", "abstract": "1. Ian Sommerville, \u201cSoftware Engineering\u201d, 5 Edition, Addison-Wesley, 1996, has a brief discussion of Data Flow Models on pp.101 to 103. 2. T.DeMarco, \u201cStructured Analysis @@ -9400,23 +10306,24 @@ interactions: Has a number of problems at the end of the chapter which are quite interesting.", "venue": "German Jews in the Era of the \u201cFinal Solution\u201d", "year": 2019, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2019-12-02", "journal": {"name": "German Jews in the Era - of the \u201cFinal Solution\u201d"}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "4775dfecaf67cbf3fd80207f3e2925bc42e368aa", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2019-12-02", "journal": {"name": "German Jews in + the Era of the \u201cFinal Solution\u201d"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "4775dfecaf67cbf3fd80207f3e2925bc42e368aa", "externalIds": {"MAG": "2958193304", "DOI": "10.4324/9780429462276-13", "CorpusId": - 199084868}, "url": "https://www.semanticscholar.org/paper/4775dfecaf67cbf3fd80207f3e2925bc42e368aa", + 199084868}, "corpusId": 199084868, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4775dfecaf67cbf3fd80207f3e2925bc42e368aa", "title": "Supporting Cooperative Software Engineering", "abstract": null, "venue": "Computer-Supported Cooperative Work", "year": 2018, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2018-08-13", "journal": {"name": - "Computer-Supported Cooperative Work"}, "authors": [{"authorId": "145282573", - "name": "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "ae499835609ed52717f659ca56f2c42ee7105abe", "externalIds": {"CorpusId": - 54722683}, "url": "https://www.semanticscholar.org/paper/ae499835609ed52717f659ca56f2c42ee7105abe", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2018-08-13", "journal": {"name": "Computer-Supported Cooperative Work"}, + "authors": [{"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "ae499835609ed52717f659ca56f2c42ee7105abe", + "externalIds": {"CorpusId": 54722683}, "corpusId": 54722683, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ae499835609ed52717f659ca56f2c42ee7105abe", "title": "Loughborough University Institutional Repository Responsibility modelling for risk analysis", "abstract": "This item was submitted to Loughborough University''s Institutional Repository by the/an author. Citation: LOCK, R. @@ -9425,27 +10332,29 @@ interactions: of the European Safety and Reliability Conference, ESREL 2009, Prague, Czech Republic, 7-10 September 2009. Boca Raton ; London : CRC Press.", "venue": "", "year": 2018, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "10371705", "name": "R. Lock"}, - {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": "1711844", "name": - "I. Sommerville"}, {"authorId": "40279693", "name": "G. Baxter"}]}, {"paperId": - "e7a3a75b430f11554bafc2e790f766e8e43c2ca9", "externalIds": {"MAG": "2889859602", - "DOI": "10.1002/9781119174240.CH4", "CorpusId": 117674102}, "url": "https://www.semanticscholar.org/paper/e7a3a75b430f11554bafc2e790f766e8e43c2ca9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "10371705", + "name": "R. Lock"}, {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "40279693", "name": "G. + Baxter"}]}, {"paperId": "e7a3a75b430f11554bafc2e790f766e8e43c2ca9", "externalIds": + {"MAG": "2889859602", "DOI": "10.1002/9781119174240.CH4", "CorpusId": 117674102}, + "corpusId": 117674102, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e7a3a75b430f11554bafc2e790f766e8e43c2ca9", "title": "Triangulating Research Dissemination Methods: A Three-Pronged Approach to Closing the Research-Practice Divide", "abstract": null, "venue": "Software Technology: 10 Years of Innovation in IEEE Computer", "year": 2018, "referenceCount": 36, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2018-09-03", "journal": {"name": - "Software Technology: 10 Years of Innovation in IEEE Computer"}, "authors": - [{"authorId": "1767721", "name": "Sarah Beecham"}, {"authorId": "145423322", - "name": "Ita Richardson"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "1392750911", "name": "P\u00e1draig O''Leary"}, {"authorId": - "143663342", "name": "S. Baker"}, {"authorId": "144445984", "name": "J. Noll"}]}, - {"paperId": "fa32dab51892628daaf3589bc53e08a0df71b434", "externalIds": {"CorpusId": - 67814036}, "url": "https://www.semanticscholar.org/paper/fa32dab51892628daaf3589bc53e08a0df71b434", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2018-09-03", + "journal": {"name": "Software Technology: 10 Years of Innovation in IEEE Computer"}, + "authors": [{"authorId": "1767721", "name": "Sarah Beecham"}, {"authorId": + "145423322", "name": "Ita Richardson"}, {"authorId": "1711844", "name": "I. + Sommerville"}, {"authorId": "1392750911", "name": "P\u00e1draig O''Leary"}, + {"authorId": "143663342", "name": "S. Baker"}, {"authorId": "144445984", "name": + "J. Noll"}]}, {"paperId": "fa32dab51892628daaf3589bc53e08a0df71b434", "externalIds": + {"CorpusId": 67814036}, "corpusId": 67814036, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fa32dab51892628daaf3589bc53e08a0df71b434", "title": "Loughborough University Institutional Repository Observations of the Scottish elections 2007", "abstract": "In the recent Scottish elections, an e-counting system was employed to manage the increased complexity of the @@ -9454,14 +10363,14 @@ interactions: Commission. This paper discusses some of the issues that arose during observations made by the authors as observers, relating to the use of the new e-counting system.", "venue": "", "year": 2018, "referenceCount": 2, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "151398460", "name": "Natalie Harvey"}, {"authorId": "40341028", - "name": "C. Hughes"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "8490f95538c172950239eee5ac89d2d82f11e879", "externalIds": {"MAG": - "2905127928", "DOI": "10.1201/9781315587080-16", "CorpusId": 17716580}, "url": - "https://www.semanticscholar.org/paper/8490f95538c172950239eee5ac89d2d82f11e879", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "151398460", "name": "Natalie Harvey"}, + {"authorId": "40341028", "name": "C. Hughes"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "8490f95538c172950239eee5ac89d2d82f11e879", + "externalIds": {"MAG": "2905127928", "DOI": "10.1201/9781315587080-16", "CorpusId": + 17716580}, "corpusId": 17716580, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8490f95538c172950239eee5ac89d2d82f11e879", "title": "Evaluating Emergency Preparedness: Using Responsibility Models to Identify Vulnerabilities", "abstract": "Preventing acts of terrorism requires being able to accurately and reliably predict when, where and how the terrorists @@ -9473,13 +10382,14 @@ interactions: than just technological systems. More particularly, we are talking about socio-technical systems, and encompass both organisations and infrastructure within our broad definition.", "venue": "", "year": 2017, "referenceCount": 34, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2017-09-18", "journal": {"volume": "", "pages": - "195-210", "name": ""}, "authors": [{"authorId": "40279693", "name": "G. Baxter"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "c52ddb085f6e226fccb23d2b43bf9a6eadcbf34b", - "externalIds": {"CorpusId": 156053722}, "url": "https://www.semanticscholar.org/paper/c52ddb085f6e226fccb23d2b43bf9a6eadcbf34b", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2017-09-18", "journal": {"volume": + "", "pages": "195-210", "name": ""}, "authors": [{"authorId": "40279693", + "name": "G. Baxter"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "c52ddb085f6e226fccb23d2b43bf9a6eadcbf34b", "externalIds": {"CorpusId": + 156053722}, "corpusId": 156053722, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c52ddb085f6e226fccb23d2b43bf9a6eadcbf34b", "title": "METHOD AND APPARATUS FOR PROVIDING SCHEMA EVOLUTION WITHOUT RECOMPLATION", "abstract": "4,558,413 12/1985 Schmidt et al. ........................ 364/300 4,686,522 8/1987 Hernandez et al. .. ... 340/709 5,058,000 10/1991 Cox et @@ -9492,25 +10402,27 @@ interactions: al. ... ... 395/853 5,548,753 8/1996 Linstead et al. .......................... 707/10 5,559,954 9/1996 Sakoda et al. .......................... 395/164", "venue": "", "year": 2017, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "143637554", "name": "Jayasree Banerjee"}, - {"authorId": "49717297", "name": "Hyoung-Joo Kim"}]}, {"paperId": "e191d4745346b368b950757c5a53431cb3972227", - "externalIds": {"DBLP": "journals/software/Sommerville16", "MAG": "2289273099", - "DOI": "10.1109/MS.2016.43", "CorpusId": 39750060}, "url": "https://www.semanticscholar.org/paper/e191d4745346b368b950757c5a53431cb3972227", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "143637554", + "name": "Jayasree Banerjee"}, {"authorId": "49717297", "name": "Hyoung-Joo + Kim"}]}, {"paperId": "e191d4745346b368b950757c5a53431cb3972227", "externalIds": + {"DBLP": "journals/software/Sommerville16", "MAG": "2289273099", "DOI": "10.1109/MS.2016.43", + "CorpusId": 39750060}, "corpusId": 39750060, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e191d4745346b368b950757c5a53431cb3972227", "title": "IEEE Software and Professional Development", "abstract": "To become more relevant to both researchers and practitioners, IEEE Software should refocus and become the first place software engineers turn to for professional development in software engineering and related areas.", "venue": "IEEE Softw.", "year": 2016, "referenceCount": 4, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-03-01", "journal": {"volume": "33", "pages": "90-92", - "name": "IEEE Softw."}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "93b7bb39a88b1217f026b1986b60542f2da2f4c0", "externalIds": {"DBLP": - "conf/caise/Sommerville15", "MAG": "2395626974", "CorpusId": 2981680}, "url": - "https://www.semanticscholar.org/paper/93b7bb39a88b1217f026b1986b60542f2da2f4c0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-03-01", "journal": + {"volume": "33", "pages": "90-92", "name": "IEEE Softw."}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "93b7bb39a88b1217f026b1986b60542f2da2f4c0", + "externalIds": {"DBLP": "conf/caise/Sommerville15", "MAG": "2395626974", "CorpusId": + 2981680}, "corpusId": 2981680, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/93b7bb39a88b1217f026b1986b60542f2da2f4c0", "title": "Designing Software for a Million Users: it''s not About the Technology", "abstract": "Scotland was probably the first country in the world to deploy a national digital learning environment in 2006. This was an innovative and @@ -9541,14 +10453,15 @@ interactions: that we faced up to these issues and thought about how we can better understand how they affect the systems that we are creating. Proceedings of STPIS''15", "venue": "STPIS@CAiSE", "year": 2015, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "1-4"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "42cc788e5cd9bcfee7dd1515fd750ae48f0ff787", "externalIds": {"DBLP": - "journals/corr/Sommerville14", "ArXiv": "1411.3948", "MAG": "2167218672", - "CorpusId": 23956432}, "url": "https://www.semanticscholar.org/paper/42cc788e5cd9bcfee7dd1515fd750ae48f0ff787", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "1-4"}, "authors": [{"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "42cc788e5cd9bcfee7dd1515fd750ae48f0ff787", + "externalIds": {"DBLP": "journals/corr/Sommerville14", "ArXiv": "1411.3948", + "MAG": "2167218672", "CorpusId": 23956432}, "corpusId": 23956432, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/42cc788e5cd9bcfee7dd1515fd750ae48f0ff787", "title": "Designing for the Don''t Cares: A story about a sociotechnical system", "abstract": "This article discusses the difficulties that arose when attempting to specify and design a large scale digital learning environment for Scottish @@ -9560,14 +10473,18 @@ interactions: be used by students and their teachers. The designed architecture was based around a layered set of replaceable services.", "venue": "ArXiv", "year": 2014, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-11-14", "journal": {"volume": "abs/1411.3948", "name": - "ArXiv"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "8b391385c0e281ca1eaaa53d1b736b721b63599a", "externalIds": {"DBLP": - "journals/corr/BarkerVWS14", "ArXiv": "1406.4974", "MAG": "2950240392", "CorpusId": - 14309849}, "url": "https://www.semanticscholar.org/paper/8b391385c0e281ca1eaaa53d1b736b721b63599a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-11-14", "journal": + {"volume": "abs/1411.3948", "name": "ArXiv"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "8b391385c0e281ca1eaaa53d1b736b721b63599a", + "externalIds": {"DBLP": "journals/corr/BarkerVWS14", "ArXiv": "1406.4974", + "MAG": "2950240392", "CorpusId": 14309849}, "corpusId": 14309849, "publicationVenue": + {"id": "42ad1c65-dc2f-448c-bbbf-483b016441b3", "name": "USENIX Workshop on + Hot Topics in Cloud Computing", "type": "conference", "alternate_names": ["USENIX + conference on Hot Topics in Cloud Ccomputing", "USENIX Workshop Hot Top Cloud + Comput", "HotCloud", "USENIX conf Hot Top Cloud Ccomputing"]}, "url": "https://www.semanticscholar.org/paper/8b391385c0e281ca1eaaa53d1b736b721b63599a", "title": "Academic Cloud Computing Research: Five Pitfalls and Five Opportunities", "abstract": "This discussion paper argues that there are five fundamental pitfalls, which can restrict academics from conducting cloud computing research @@ -9582,15 +10499,16 @@ interactions: a roadmap forward, which will allow academia to make longer-term impacts to the cloud computing community.", "venue": "USENIX Workshop on Hot Topics in Cloud Computing", "year": 2014, "referenceCount": 27, "citationCount": 40, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-06-17", "journal": - {"volume": "abs/1406.4974", "name": "ArXiv"}, "authors": [{"authorId": "2445185", - "name": "A. Barker"}, {"authorId": "1683999", "name": "B. Varghese"}, {"authorId": - "38722249", "name": "J. S. Ward"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "2e93817e0857783188820f5246fd14eb1d34b1b7", "externalIds": {"MAG": - "897833688", "CorpusId": 167051162}, "url": "https://www.semanticscholar.org/paper/2e93817e0857783188820f5246fd14eb1d34b1b7", + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-06-17", "journal": {"volume": "abs/1406.4974", "name": "ArXiv"}, "authors": + [{"authorId": "2445185", "name": "A. Barker"}, {"authorId": "1683999", "name": + "B. Varghese"}, {"authorId": "38722249", "name": "J. S. Ward"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "2e93817e0857783188820f5246fd14eb1d34b1b7", + "externalIds": {"MAG": "897833688", "CorpusId": 167051162}, "corpusId": 167051162, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2e93817e0857783188820f5246fd14eb1d34b1b7", "title": "Migrating Software Products to the Cloud", "abstract": "Cloud computing, as a disruptive innovation, has the potential to adversely affect companies. The effects can be particularly extreme for small and medium sized enterprises @@ -9605,16 +10523,20 @@ interactions: and holistic approaches are identified to address key tensions through the adoption life cycle while considering organisational resilience.", "venue": "", "year": 2013, "referenceCount": 21, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "22", "pages": "3", "name": "Journal of International + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "22", "pages": "3", "name": "Journal of International Technology and Information Management"}, "authors": [{"authorId": "1978648", "name": "Marc Werfs"}, {"authorId": "40279693", "name": "G. Baxter"}, {"authorId": "48988558", "name": "I. Allison"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "6daa8431f311baf4f711ce2826029d9c3b4e6620", "externalIds": {"DBLP": "conf/cloudcom/JohnsonWCSBT13", "MAG": "2000613962", "DOI": "10.1109/CloudCom.2013.117", - "CorpusId": 17389276}, "url": "https://www.semanticscholar.org/paper/6daa8431f311baf4f711ce2826029d9c3b4e6620", + "CorpusId": 17389276}, "corpusId": 17389276, "publicationVenue": {"id": "dd2ac182-39ee-4ded-812a-6be8b202c643", + "name": "IEEE International Conference on Cloud Computing Technology and Science", + "alternate_names": ["IEEE Int Conf Cloud Comput Technol Sci"], "issn": "2330-2186", + "url": "http://2013.cloudcom.org/", "alternate_urls": ["http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1800284"]}, + "url": "https://www.semanticscholar.org/paper/6daa8431f311baf4f711ce2826029d9c3b4e6620", "title": "Services2Cloud: A Framework for Revenue Analysis of Software-as-a-Service Provisioning", "abstract": "Software as a Service (SaaS) is an increasingly attractive option for delivering software functionality. Software vendors @@ -9631,18 +10553,19 @@ interactions: aims to facilitate the revenue analysis process for service providers.", "venue": "IEEE International Conference on Cloud Computing Technology and Science", "year": 2013, "referenceCount": 22, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2013-12-02", "journal": {"volume": "2", - "pages": "144-151", "name": "2013 IEEE 5th International Conference on Cloud - Computing Technology and Science"}, "authors": [{"authorId": "145697882", - "name": "Kenneth Johnson"}, {"authorId": "46394108", "name": "Yuan-Zheng Wang"}, - {"authorId": "143665272", "name": "R. Calinescu"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "40279693", "name": "G. Baxter"}, - {"authorId": "145744796", "name": "J. V. Tucker"}]}, {"paperId": "73071fb376526dbb8573666d00886349126f4f93", - "externalIds": {"MAG": "2028117060", "DBLP": "conf/IEEEcloud/SmithS13", "DOI": - "10.1109/CLOUD.2013.138", "CorpusId": 15375000}, "url": "https://www.semanticscholar.org/paper/73071fb376526dbb8573666d00886349126f4f93", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-12-02", + "journal": {"volume": "2", "pages": "144-151", "name": "2013 IEEE 5th International + Conference on Cloud Computing Technology and Science"}, "authors": [{"authorId": + "145697882", "name": "Kenneth Johnson"}, {"authorId": "46394108", "name": + "Yuan-Zheng Wang"}, {"authorId": "143665272", "name": "R. Calinescu"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "40279693", "name": "G. + Baxter"}, {"authorId": "145744796", "name": "J. V. Tucker"}]}, {"paperId": + "73071fb376526dbb8573666d00886349126f4f93", "externalIds": {"MAG": "2028117060", + "DBLP": "conf/IEEEcloud/SmithS13", "DOI": "10.1109/CLOUD.2013.138", "CorpusId": + 15375000}, "corpusId": 15375000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/73071fb376526dbb8573666d00886349126f4f93", "title": "Understanding Tradeoffs between Power Usage and Performance in a Virtualized Environment", "abstract": "The usage rate of hardware resources in a computing system is the single largest influence on power consumption @@ -9659,15 +10582,16 @@ interactions: energy efficient, performance and dependability aware scheduler for a private cloud computing platform.", "venue": "2013 IEEE Sixth International Conference on Cloud Computing", "year": 2013, "referenceCount": 16, "citationCount": - 11, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-06-28", - "journal": {"pages": "725-731", "name": "2013 IEEE Sixth International Conference - on Cloud Computing"}, "authors": [{"authorId": "2119124196", "name": "James - W. Smith"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "9711f60bef3933303304b5a4422c4c7729fcabb4", "externalIds": {"MAG": "564394102", - "CorpusId": 107942916}, "url": "https://www.semanticscholar.org/paper/9711f60bef3933303304b5a4422c4c7729fcabb4", + 11, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2013-06-28", "journal": {"pages": "725-731", "name": "2013 + IEEE Sixth International Conference on Cloud Computing"}, "authors": [{"authorId": + "2119124196", "name": "James W. Smith"}, {"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "9711f60bef3933303304b5a4422c4c7729fcabb4", "externalIds": + {"MAG": "564394102", "CorpusId": 107942916}, "corpusId": 107942916, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9711f60bef3933303304b5a4422c4c7729fcabb4", "title": "Migrating software products to the cloud: an adaptive STS perspective.", "abstract": "INTRODUCTION Cloud computing is an example of what Christensen (Christensen & Bower, 1996) describes as a disruptive innovation (or technology). @@ -9722,19 +10646,25 @@ interactions: is mainly on the technological issues involved, and pays less attention to the wider organisational ones. \u2026", "venue": "", "year": 2013, "referenceCount": 20, "citationCount": 11, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-03-01", "journal": {"volume": - "22", "pages": "37-54", "name": "Journal of International Technology and Information - Management"}, "authors": [{"authorId": "1978648", "name": "Marc Werfs"}, {"authorId": - "40279693", "name": "G. Baxter"}, {"authorId": "48988558", "name": "I. Allison"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "9e9cc5af41625ecd61194f047918b66eee81664d", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-03-01", "journal": {"volume": "22", "pages": "37-54", "name": "Journal + of International Technology and Information Management"}, "authors": [{"authorId": + "1978648", "name": "Marc Werfs"}, {"authorId": "40279693", "name": "G. Baxter"}, + {"authorId": "48988558", "name": "I. Allison"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "9e9cc5af41625ecd61194f047918b66eee81664d", "externalIds": {"DBLP": "journals/jss/Sommerville13", "ArXiv": "1209.0948", "MAG": "2015079262", "DOI": "10.1016/j.jss.2013.01.050", "CorpusId": 206532816}, - "url": "https://www.semanticscholar.org/paper/9e9cc5af41625ecd61194f047918b66eee81664d", + "corpusId": 206532816, "publicationVenue": {"id": "10a4a695-8417-42c7-983d-742df48b3905", + "name": "Journal of Systems and Software", "type": "journal", "alternate_names": + ["J Syst Softw"], "issn": "0164-1212", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description#description", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description", + "http://www.sciencedirect.com/science/journal/01641212"]}, "url": "https://www.semanticscholar.org/paper/9e9cc5af41625ecd61194f047918b66eee81664d", "title": "Teaching cloud computing: A software engineering perspective", "abstract": null, "venue": "Journal of Systems and Software", "year": 2012, "referenceCount": 2, "citationCount": 30, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1209.0948", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -9742,22 +10672,24 @@ interactions: Syst. Softw."}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "a683dfad373eaa7f125b74364f572e60df0d264d", "externalIds": {"MAG": "2128150077", "DBLP": "journals/jcloudc/VossBABS13", "DOI": "10.1186/2192-113X-2-20", - "CorpusId": 18094865}, "url": "https://www.semanticscholar.org/paper/a683dfad373eaa7f125b74364f572e60df0d264d", + "CorpusId": 18094865}, "corpusId": 18094865, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a683dfad373eaa7f125b74364f572e60df0d264d", "title": "An elastic virtual infrastructure for research applications (ELVIRA)", "abstract": null, "venue": "Journal of Cloud Computing: Advances, Systems and Applications", "year": 2013, "referenceCount": 24, "citationCount": 8, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2013-11-25", - "journal": {"volume": "2", "pages": "1-11", "name": "Journal of Cloud Computing: - Advances, Systems and Applications"}, "authors": [{"authorId": "2065144615", - "name": "A. Vo\u00df"}, {"authorId": "2445185", "name": "A. Barker"}, {"authorId": - "1407727098", "name": "M. Asgari-Targhi"}, {"authorId": "6420226", "name": - "A. V. Ballegooijen"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "0753fd8edd7806f4f39ae7a275878de4a4db3c62", "externalIds": {"DBLP": - "conf/IEEEcloud/SmithKWS12", "ArXiv": "1205.2546", "MAG": "2150940779", "DOI": - "10.1109/CLOUD.2012.112", "CorpusId": 7998273}, "url": "https://www.semanticscholar.org/paper/0753fd8edd7806f4f39ae7a275878de4a4db3c62", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2013-11-25", "journal": {"volume": "2", "pages": "1-11", "name": "Journal + of Cloud Computing: Advances, Systems and Applications"}, "authors": [{"authorId": + "2065144615", "name": "A. Vo\u00df"}, {"authorId": "2445185", "name": "A. + Barker"}, {"authorId": "1407727098", "name": "M. Asgari-Targhi"}, {"authorId": + "6420226", "name": "A. V. Ballegooijen"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "0753fd8edd7806f4f39ae7a275878de4a4db3c62", + "externalIds": {"DBLP": "conf/IEEEcloud/SmithKWS12", "ArXiv": "1205.2546", + "MAG": "2150940779", "DOI": "10.1109/CLOUD.2012.112", "CorpusId": 7998273}, + "corpusId": 7998273, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0753fd8edd7806f4f39ae7a275878de4a4db3c62", "title": "CloudMonitor: Profiling Power Usage", "abstract": "In Cloud Computing platforms the addition of hardware monitoring devices to gather power usage data can be impractical or uneconomical due to the large number of machines @@ -9768,7 +10700,8 @@ interactions: and therefore incentivizing software developers to create energy-efficient applications.", "venue": "2012 IEEE Fifth International Conference on Cloud Computing", "year": 2012, "referenceCount": 7, "citationCount": 34, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1205.2546", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2012-05-11", "journal": {"pages": "947-948", @@ -9778,10 +10711,13 @@ interactions: {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "48000ee79e65ba5f88445aee17944a9ae1a81838", "externalIds": {"DBLP": "conf/monterey/SommervilleLS12", "ArXiv": "1209.5246", "MAG": "2949545101", "DOI": "10.1007/978-3-642-34059-8_14", "CorpusId": 5607654}, - "url": "https://www.semanticscholar.org/paper/48000ee79e65ba5f88445aee17944a9ae1a81838", + "corpusId": 5607654, "publicationVenue": {"id": "d6785ddb-798a-405d-8898-3730b7aecd9c", + "name": "Monterey Workshop", "type": "conference", "alternate_names": ["Monterey", + "Monterey Workshop"]}, "url": "https://www.semanticscholar.org/paper/48000ee79e65ba5f88445aee17944a9ae1a81838", "title": "Information Requirements for Enterprise Systems", "abstract": null, "venue": "Monterey Workshop", "year": 2012, "referenceCount": 25, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": + 13, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://eprints.gla.ac.uk/71685/1/ID71685.pdf", "status": null}, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": "Computer @@ -9791,7 +10727,13 @@ interactions: "10371705", "name": "R. Lock"}, {"authorId": "2109581", "name": "Tim Storer"}]}, {"paperId": "e35c71e013fe85cbdebce842c9220ad0e0eb7c8f", "externalIds": {"MAG": "1886606525", "ArXiv": "1008.1900", "DBLP": "journals/spe/Khajeh-HosseiniGSS12", - "DOI": "10.1002/spe.1072", "CorpusId": 357757}, "url": "https://www.semanticscholar.org/paper/e35c71e013fe85cbdebce842c9220ad0e0eb7c8f", + "DOI": "10.1002/spe.1072", "CorpusId": 357757}, "corpusId": 357757, "publicationVenue": + {"id": "3da56ce6-4a70-402c-a8b0-7dd39a3273d3", "name": "Software, Practice + & Experience", "type": "journal", "alternate_names": ["Softw Pract Exp", + "Softw Pract Exp", "Software - Practice and Experience"], "issn": "0038-0644", + "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/1752", "alternate_urls": + ["http://www.interscience.wiley.com/jpages/0038-0644/", "https://onlinelibrary.wiley.com/journal/1097024X"]}, + "url": "https://www.semanticscholar.org/paper/e35c71e013fe85cbdebce842c9220ad0e0eb7c8f", "title": "The Cloud Adoption Toolkit: supporting cloud adoption decisions in the enterprise", "abstract": "Cloud computing promises a radical shift in the provisioning of computing resources within the enterprise. This paper @@ -9812,7 +10754,8 @@ interactions: options to obtain accurate cost estimates. Copyright \u00a9 2011 John Wiley & Sons, Ltd.", "venue": "Software, Practice & Experience", "year": 2010, "referenceCount": 41, "citationCount": 327, "influentialCitationCount": 27, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": + true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1008.1900", "status": + null}, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2010-08-11", "journal": @@ -9822,22 +10765,28 @@ interactions: {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "e5be8bedbd921d3d8773c5ef7607dc0b246aed13", "externalIds": {"DBLP": "journals/corr/abs-1109-3444", "MAG": "2043312149", "ArXiv": "1109.3444", "DOI": "10.1145/2209249.2209268", "CorpusId": 96779}, - "url": "https://www.semanticscholar.org/paper/e5be8bedbd921d3d8773c5ef7607dc0b246aed13", + "corpusId": 96779, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/e5be8bedbd921d3d8773c5ef7607dc0b246aed13", "title": "Large-scale complex IT systems", "abstract": "The reductionism behind today''s software-engineering methods breaks down in the face of systems complexity.", "venue": "Communications of the ACM", "year": 2011, "referenceCount": 53, "citationCount": 236, "influentialCitationCount": 14, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2011-09-15", "journal": {"volume": "55", "pages": "71 - 77", "name": "Communications - of the ACM"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "145676014", "name": "D. Cliff"}, {"authorId": "143665272", "name": - "R. Calinescu"}, {"authorId": "144699021", "name": "J. Keen"}, {"authorId": - "143797250", "name": "T. Kelly"}, {"authorId": "1701316", "name": "M. Kwiatkowska"}, - {"authorId": "1789893", "name": "J. McDermid"}, {"authorId": "1739513", "name": - "R. Paige"}]}, {"paperId": "2712b71a33f2673b44af6255bc0731c29f5e7d24", "externalIds": - {"MAG": "1498902227", "CorpusId": 55904120}, "url": "https://www.semanticscholar.org/paper/2712b71a33f2673b44af6255bc0731c29f5e7d24", + "openAccessPdf": {"url": "https://publications.aston.ac.uk/id/eprint/27245/1/1109.3444.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2011-09-15", "journal": {"volume": "55", "pages": "71 + - 77", "name": "Communications of the ACM"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "145676014", "name": "D. Cliff"}, + {"authorId": "143665272", "name": "R. Calinescu"}, {"authorId": "144699021", + "name": "J. Keen"}, {"authorId": "143797250", "name": "T. Kelly"}, {"authorId": + "1701316", "name": "M. Kwiatkowska"}, {"authorId": "1789893", "name": "J. + McDermid"}, {"authorId": "1739513", "name": "R. Paige"}]}, {"paperId": "2712b71a33f2673b44af6255bc0731c29f5e7d24", + "externalIds": {"MAG": "1498902227", "CorpusId": 55904120}, "corpusId": 55904120, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2712b71a33f2673b44af6255bc0731c29f5e7d24", "title": "USING COMPLEX NETWORK ANALYSIS AND VISUALISATION TO ANALYSE PROBLEMATIC ENTERPRISE SCALE INFORMATION SYSTEMS", "abstract": "Society is demanding larger and more complex information systems to support increasingly complex and critical @@ -9871,12 +10820,14 @@ interactions: elements, or groups of interacting elements, that are important to the overall outcome of a problematic situation.", "venue": "", "year": 2011, "referenceCount": 40, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-09-23", "journal": {"volume": - "55", "name": ""}, "authors": [{"authorId": "144172683", "name": "D. Greenwood"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "2dc84a707c3626dfcad731b695e2f1d35fcefe1c", - "externalIds": {"CorpusId": 18035621}, "url": "https://www.semanticscholar.org/paper/2dc84a707c3626dfcad731b695e2f1d35fcefe1c", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2011-09-23", "journal": {"volume": "55", "name": ""}, "authors": [{"authorId": + "144172683", "name": "D. Greenwood"}, {"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "2dc84a707c3626dfcad731b695e2f1d35fcefe1c", "externalIds": + {"CorpusId": 18035621}, "corpusId": 18035621, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2dc84a707c3626dfcad731b695e2f1d35fcefe1c", "title": "TOWARDS A FRAMEWORK FOR DESIGNING A SOCIO-TECHNICAL INTERVENTION TO MEDIATE ORGANISATIONAL LEARNING", "abstract": "The history of socio-technical interventions is intertwined with reports that interventions are successful @@ -9891,37 +10842,40 @@ interactions: or the political environment but becomes engrained into the cognition and practices of the organisation.", "venue": "", "year": 2011, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "144172683", "name": "D. Greenwood"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "359745faa9eb2f91797f1b56266ecbf66d27372e", - "externalIds": {"DBLP": "journals/cscw/RooksbyS12", "ArXiv": "1111.5454", - "MAG": "2051814075", "DOI": "10.1007/s10606-011-9150-2", "CorpusId": 7530806}, - "url": "https://www.semanticscholar.org/paper/359745faa9eb2f91797f1b56266ecbf66d27372e", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Political Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "144172683", + "name": "D. Greenwood"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "359745faa9eb2f91797f1b56266ecbf66d27372e", "externalIds": {"DBLP": + "journals/cscw/RooksbyS12", "ArXiv": "1111.5454", "MAG": "2051814075", "DOI": + "10.1007/s10606-011-9150-2", "CorpusId": 7530806}, "corpusId": 7530806, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/359745faa9eb2f91797f1b56266ecbf66d27372e", "title": "The Management and Use of Social Network Sites in a Government Department", "abstract": null, "venue": "Computer Supported Cooperative Work (CSCW)", "year": 2011, "referenceCount": 38, "citationCount": 27, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Business"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Business", "source": "external"}, {"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2011-11-23", "journal": {"volume": "21", "pages": "397-415", "name": "Computer - Supported Cooperative Work (CSCW)"}, "authors": [{"authorId": "2609254", "name": - "J. Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "37a9a5e1e947e63b76b37c31cc78b0372121fd39", "externalIds": {"DBLP": "conf/isdevel/GreenwoodS11", - "ArXiv": "1104.1370", "MAG": "2950953836", "DOI": "10.1007/978-1-4614-4951-5_5", - "CorpusId": 8258921}, "url": "https://www.semanticscholar.org/paper/37a9a5e1e947e63b76b37c31cc78b0372121fd39", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Business"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Business", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2011-11-23", "journal": {"volume": "21", "pages": "397-415", + "name": "Computer Supported Cooperative Work (CSCW)"}, "authors": [{"authorId": + "2609254", "name": "J. Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "37a9a5e1e947e63b76b37c31cc78b0372121fd39", "externalIds": {"DBLP": + "conf/isdevel/GreenwoodS11", "ArXiv": "1104.1370", "MAG": "2950953836", "DOI": + "10.1007/978-1-4614-4951-5_5", "CorpusId": 8258921}, "corpusId": 8258921, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/37a9a5e1e947e63b76b37c31cc78b0372121fd39", "title": "Expectations and Reality: Why an Enterprise Software System Did Not Work as Planned", "abstract": null, "venue": "ISD", "year": 2011, "referenceCount": 33, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-04-07", "journal": - {"pages": "51-62"}, "authors": [{"authorId": "144172683", "name": "D. Greenwood"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "56131795e1f153401c8cb253da29b55fcc23baee", - "externalIds": {"DBLP": "journals/corr/abs-1104-2265", "MAG": "1811988166", - "ArXiv": "1104.2265", "DOI": "10.1109/ICSMC.2011.6083832", "CorpusId": 7751646}, - "url": "https://www.semanticscholar.org/paper/56131795e1f153401c8cb253da29b55fcc23baee", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-04-07", "journal": {"pages": "51-62"}, "authors": [{"authorId": "144172683", + "name": "D. Greenwood"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "56131795e1f153401c8cb253da29b55fcc23baee", "externalIds": {"DBLP": + "journals/corr/abs-1104-2265", "MAG": "1811988166", "ArXiv": "1104.2265", + "DOI": "10.1109/ICSMC.2011.6083832", "CorpusId": 7751646}, "corpusId": 7751646, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/56131795e1f153401c8cb253da29b55fcc23baee", "title": "Responsibility modeling for the sociotechnical risk analysis of coalitions of systems", "abstract": "Society is challenging systems engineers by demanding ever more complex and integrated systems. With the rise of cloud @@ -9940,7 +10894,8 @@ interactions: of human/organizational/technical agents to provision a service.", "venue": "2011 IEEE International Conference on Systems, Man, and Cybernetics", "year": 2011, "referenceCount": 21, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1104.2265", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2011-04-12", "journal": {"pages": "1256-1261", @@ -9948,7 +10903,14 @@ interactions: "authors": [{"authorId": "144172683", "name": "D. Greenwood"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "5b094c0db083c339c515cee25ddff6ca6189fe00", "externalIds": {"DBLP": "conf/sysose/GreenwoodS11", "MAG": "2137303942", "DOI": - "10.1109/SYSOSE.2011.5966593", "CorpusId": 7957025}, "url": "https://www.semanticscholar.org/paper/5b094c0db083c339c515cee25ddff6ca6189fe00", + "10.1109/SYSOSE.2011.5966593", "CorpusId": 7957025}, "corpusId": 7957025, + "publicationVenue": {"id": "a59db0cb-8287-4db4-9378-0eb4c692f830", "name": + "International Symposium on Service Oriented Software Engineering", "type": + "conference", "alternate_names": ["IEEE International Conference on System + of Systems Engineering", "Int Symp Serv Oriented Softw Eng", "International + Conference on System of Systems Engineering", "SoSE", "Service Oriented Software + Engineering", "Serv Oriented Softw Eng", "Int Conf Syst Syst Eng", "IEEE Int + Conf Syst Syst Eng", "SOSE"]}, "url": "https://www.semanticscholar.org/paper/5b094c0db083c339c515cee25ddff6ca6189fe00", "title": "Responsibility modeling for identifying sociotechnical threats to the dependability of coalitions of systems", "abstract": "With the rise of cloud computing and system-of-systems we are entering an era where mission @@ -9965,16 +10927,21 @@ interactions: among coalition partners may indicate the fragility of overlapping self-interests.", "venue": "International Symposium on Service Oriented Software Engineering", "year": 2011, "referenceCount": 23, "citationCount": 15, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2011-06-27", "journal": {"pages": "173-178", "name": "2011 - 6th International Conference on System of Systems Engineering"}, "authors": - [{"authorId": "144172683", "name": "D. Greenwood"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "5ba5a766d6b100ecd21d296e59c92db537e469e6", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2011-06-27", "journal": {"pages": "173-178", + "name": "2011 6th International Conference on System of Systems Engineering"}, + "authors": [{"authorId": "144172683", "name": "D. Greenwood"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "5ba5a766d6b100ecd21d296e59c92db537e469e6", "externalIds": {"DBLP": "journals/ijkss/GreenwoodS11", "MAG": "1989138764", - "DOI": "10.4018/jkss.2011100105", "CorpusId": 41224998}, "url": "https://www.semanticscholar.org/paper/5ba5a766d6b100ecd21d296e59c92db537e469e6", + "DOI": "10.4018/jkss.2011100105", "CorpusId": 41224998}, "corpusId": 41224998, + "publicationVenue": {"id": "d30920e9-8883-40c5-a696-056dac43b395", "name": + "International Journal of Knowledge and Systems Science", "type": "journal", + "alternate_names": ["Int J Knowl Syst Sci"], "issn": "1947-8208", "url": "http://www.igi-global.com/IJKSS", + "alternate_urls": ["https://www.igi-global.com/journal/international-journal-knowledge-systems-science/1169"]}, + "url": "https://www.semanticscholar.org/paper/5ba5a766d6b100ecd21d296e59c92db537e469e6", "title": "Using Network Analysis and Visualization to Analyze Problematic Enterprise Information Systems", "abstract": "Society is demanding larger and more complex information systems to support increasingly complex and critical @@ -9990,43 +10957,51 @@ interactions: elements, or groups of interacting elements, that are important to the overall outcome of a problematic situation.", "venue": "International Journal of Knowledge and Systems Science", "year": 2011, "referenceCount": 46, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-10-01", "journal": {"volume": - "2", "pages": "54-71", "name": "Int. J. Knowl. Syst. Sci."}, "authors": [{"authorId": - "144172683", "name": "D. Greenwood"}, {"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "78c5ad23ca0f8c050f147fda5acbd91d61b55878", "externalIds": - {"MAG": "2775189456", "CorpusId": 117658214}, "url": "https://www.semanticscholar.org/paper/78c5ad23ca0f8c050f147fda5acbd91d61b55878", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Sociology", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-10-01", "journal": + {"volume": "2", "pages": "54-71", "name": "Int. J. Knowl. Syst. Sci."}, "authors": + [{"authorId": "144172683", "name": "D. Greenwood"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "78c5ad23ca0f8c050f147fda5acbd91d61b55878", + "externalIds": {"MAG": "2775189456", "CorpusId": 117658214}, "corpusId": 117658214, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/78c5ad23ca0f8c050f147fda5acbd91d61b55878", "title": "Software engineering 9th edition (international edition)", "abstract": null, "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 109, - "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "b13d31d1e1e65f8d5f7ea043dab6c9106e38382d", "externalIds": - {"MAG": "2924257552", "CorpusId": 116698545}, "url": "https://www.semanticscholar.org/paper/b13d31d1e1e65f8d5f7ea043dab6c9106e38382d", + "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "b13d31d1e1e65f8d5f7ea043dab6c9106e38382d", + "externalIds": {"MAG": "2924257552", "CorpusId": 116698545}, "corpusId": 116698545, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b13d31d1e1e65f8d5f7ea043dab6c9106e38382d", "title": "Software engineering / Ian Sommerville.", "abstract": null, "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 102, "influentialCitationCount": - 19, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + 19, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "c6a53e5623a814f8a87ae5c3c17a685a74a7e93b", "externalIds": {"DBLP": "journals/iwc/BaxterS11", "MAG": "2137125422", "DOI": - "10.1016/j.intcom.2010.07.003", "CorpusId": 3715724}, "url": "https://www.semanticscholar.org/paper/c6a53e5623a814f8a87ae5c3c17a685a74a7e93b", + "10.1016/j.intcom.2010.07.003", "CorpusId": 3715724}, "corpusId": 3715724, + "publicationVenue": {"id": "b9f99919-55d3-4827-8568-640824b354b9", "name": + "Interacting with computers", "type": "journal", "alternate_names": ["Interact + comput", "Interacting with Computers", "Interact Comput"], "issn": "0953-5438", + "url": "http://iwc.oxfordjournals.org/"}, "url": "https://www.semanticscholar.org/paper/c6a53e5623a814f8a87ae5c3c17a685a74a7e93b", "title": "Socio-technical systems: From design methods to systems engineering", "abstract": null, "venue": "Interacting with computers", "year": 2011, "referenceCount": - 159, "citationCount": 867, "influentialCitationCount": 59, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Business", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 159, "citationCount": 868, "influentialCitationCount": 59, "isOpenAccess": + true, "openAccessPdf": {"url": "https://academic.oup.com/iwc/article-pdf/23/1/4/2038336/iwc23-0004.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"volume": "23", "pages": "4-17", "name": "Interact. Comput."}, "authors": [{"authorId": "40279693", "name": "G. Baxter"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "dd95742b6c292ae49e0be8d6903e7dde6dd1a054", "externalIds": {"MAG": "1950162325", "DOI": "10.4000/BOOKS.PRESSESMINES.960", - "CorpusId": 9079546}, "url": "https://www.semanticscholar.org/paper/dd95742b6c292ae49e0be8d6903e7dde6dd1a054", + "CorpusId": 9079546}, "corpusId": 9079546, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/dd95742b6c292ae49e0be8d6903e7dde6dd1a054", "title": "Responsibility Modelling For Resilience", "abstract": "We describe a method for modelling responsibilities, which we define as duties that are discharged by agents, using some resources in a particular context. Responsibilities @@ -10056,14 +11031,19 @@ interactions: information or physical resources) are needed to discharge them; and that they are discharged in a context which includes factors that define (and", "venue": "", "year": 2011, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "40279693", - "name": "G. Baxter"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "df484bbdbab30a2b196b690066bb0a7b5adc82f0", "externalIds": {"DBLP": - "conf/IEEEcloud/Khajeh-HosseiniSBT11", "ArXiv": "1105.0149", "MAG": "2141401843", - "DOI": "10.1109/CLOUD.2011.59", "CorpusId": 287216}, "url": "https://www.semanticscholar.org/paper/df484bbdbab30a2b196b690066bb0a7b5adc82f0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "40279693", "name": "G. Baxter"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "df484bbdbab30a2b196b690066bb0a7b5adc82f0", + "externalIds": {"DBLP": "conf/IEEEcloud/Khajeh-HosseiniSBT11", "ArXiv": "1105.0149", + "MAG": "2141401843", "DOI": "10.1109/CLOUD.2011.59", "CorpusId": 287216}, + "corpusId": 287216, "publicationVenue": {"id": "406d9f60-417a-4dc5-a6b7-1fe4689a4ff7", + "name": "IEEE International Conference on Cloud Computing", "type": "conference", + "alternate_names": ["Int Conf Cloud Comput [services Soc", "CLOUD", "International + Conference on Cloud Computing [Services Society]", "IEEE Int Conf Cloud Comput"]}, + "url": "https://www.semanticscholar.org/paper/df484bbdbab30a2b196b690066bb0a7b5adc82f0", "title": "Decision Support Tools for Cloud Migration in the Enterprise", "abstract": "This paper describes two tools that aim to support decision making during the migration of IT systems to the cloud. The first is a modeling tool that @@ -10077,7 +11057,8 @@ interactions: The tools were useful as they informed decision makers about the costs, benefits and risks of using the cloud.", "venue": "IEEE International Conference on Cloud Computing", "year": 2011, "referenceCount": 51, "citationCount": 179, - "influentialCitationCount": 17, "isOpenAccess": true, "fieldsOfStudy": ["Computer + "influentialCitationCount": 17, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1105.0149", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2011-05-01", @@ -10087,18 +11068,19 @@ interactions: "1401964118", "name": "J. Bogaerts"}, {"authorId": "1712873", "name": "Pradeep B. Teregowda"}]}, {"paperId": "f67a67a69c260f00f8642ed2bc8194507341f9a8", "externalIds": {"DOI": "10.1007/s10606-011-9150-2", "CorpusId": 254427141}, - "url": "https://www.semanticscholar.org/paper/f67a67a69c260f00f8642ed2bc8194507341f9a8", + "corpusId": 254427141, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f67a67a69c260f00f8642ed2bc8194507341f9a8", "title": "The Management and Use of Social Network Sites in a Government Department", "abstract": null, "venue": "Computer Supported Cooperative Work (CSCW)", "year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2011-12-02", "journal": {"volume": "21", "pages": "397 - 415", "name": "Computer - Supported Cooperative Work (CSCW)"}, "authors": [{"authorId": "2609254", "name": - "J. Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "fc13f44f966201a3d2a5edff845a22a803bdc94e", "externalIds": {"ArXiv": "1105.2584", - "DBLP": "journals/corr/abs-1105-2584", "MAG": "1922636388", "CorpusId": 16939666}, - "url": "https://www.semanticscholar.org/paper/fc13f44f966201a3d2a5edff845a22a803bdc94e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2011-12-02", "journal": {"volume": "21", "pages": + "397 - 415", "name": "Computer Supported Cooperative Work (CSCW)"}, "authors": + [{"authorId": "2609254", "name": "J. Rooksby"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "fc13f44f966201a3d2a5edff845a22a803bdc94e", + "externalIds": {"ArXiv": "1105.2584", "DBLP": "journals/corr/abs-1105-2584", + "MAG": "1922636388", "CorpusId": 16939666}, "corpusId": 16939666, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fc13f44f966201a3d2a5edff845a22a803bdc94e", "title": "Workload Classification & Software Energy Measurement for Efficient Scheduling on Private Cloud Platforms", "abstract": "At present there are a number of barriers to creating an energy efficient workload scheduler for @@ -10114,13 +11096,14 @@ interactions: from monitoring resource consumption of workloads, after a \"training phase\" in which a dynamic power model is developed.", "venue": "ArXiv", "year": 2011, "referenceCount": 16, "citationCount": 29, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-05-12", "journal": {"volume": "abs/1105.2584", "name": - "ArXiv"}, "authors": [{"authorId": "2119124196", "name": "James W. Smith"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "14897355641ed3498652de24934816aa81af4257", - "externalIds": {"CorpusId": 55017086}, "url": "https://www.semanticscholar.org/paper/14897355641ed3498652de24934816aa81af4257", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-05-12", "journal": + {"volume": "abs/1105.2584", "name": "ArXiv"}, "authors": [{"authorId": "2119124196", + "name": "James W. Smith"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "14897355641ed3498652de24934816aa81af4257", "externalIds": {"CorpusId": + 55017086}, "corpusId": 55017086, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/14897355641ed3498652de24934816aa81af4257", "title": "1 Introduction: Dependability and Responsibility in Context", "abstract": "This book looks at socio-technical systems, that is systems which consist of a group of people working with some complex technology in order to achieve @@ -10169,13 +11152,17 @@ interactions: the remainder of the book will go some way to saying more and answering at least some of these questions.", "venue": "", "year": 2010, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1769028", "name": "J. Dobson"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1834798", - "name": "G. Dewsbury"}]}, {"paperId": "31be55a948d15d56facb520dde28c1e1b9768f87", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1769028", + "name": "J. Dobson"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "1834798", "name": "G. Dewsbury"}]}, {"paperId": "31be55a948d15d56facb520dde28c1e1b9768f87", "externalIds": {"DBLP": "conf/IEEEcloud/Khajeh-HosseiniGS10", "MAG": "2158817575", "ArXiv": "1002.3492", "DOI": "10.1109/CLOUD.2010.37", "CorpusId": 11060797}, + "corpusId": 11060797, "publicationVenue": {"id": "406d9f60-417a-4dc5-a6b7-1fe4689a4ff7", + "name": "IEEE International Conference on Cloud Computing", "type": "conference", + "alternate_names": ["Int Conf Cloud Comput [services Soc", "CLOUD", "International + Conference on Cloud Computing [Services Society]", "IEEE Int Conf Cloud Comput"]}, "url": "https://www.semanticscholar.org/paper/31be55a948d15d56facb520dde28c1e1b9768f87", "title": "Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS", "abstract": "This case study illustrates the potential benefits @@ -10194,7 +11181,8 @@ interactions: local optimizations at the cost of organization-wide performance.", "venue": "IEEE International Conference on Cloud Computing", "year": 2010, "referenceCount": 22, "citationCount": 402, "influentialCitationCount": 22, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1002.3492", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2010-02-18", "journal": {"pages": "450-457", "name": "2010 @@ -10202,7 +11190,7 @@ interactions: "1401831114", "name": "Ali Khajeh-Hosseini"}, {"authorId": "144172683", "name": "D. Greenwood"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "31ee616284118ddab9aa447c86bc8dbce3ba7ad4", "externalIds": {"CorpusId": 12209}, - "url": "https://www.semanticscholar.org/paper/31ee616284118ddab9aa447c86bc8dbce3ba7ad4", + "corpusId": 12209, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/31ee616284118ddab9aa447c86bc8dbce3ba7ad4", "title": "Paper Cooperative Systems Design", "abstract": "This paper discusses an innovative experiment where sociologists were actively involved in the requirements analysis for an interactive software system to support the work @@ -10218,14 +11206,15 @@ interactions: the difficulties of inter-disciplinary cooperative working and suggest how social analysis can be integrated in the interactive systems design process.", "venue": "", "year": 2010, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144122831", "name": "R. Bentley"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}]}, {"paperId": "45408f54643c732493759352d0edbd93ecc3bc04", "externalIds": {"MAG": "1948161150", "ArXiv": "1003.3880", "DBLP": "journals/corr/abs-1003-3880", - "CorpusId": 11319520}, "url": "https://www.semanticscholar.org/paper/45408f54643c732493759352d0edbd93ecc3bc04", + "CorpusId": 11319520}, "corpusId": 11319520, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/45408f54643c732493759352d0edbd93ecc3bc04", "title": "Lessons from the Failure and Subsequent Success of a Complex Healthcare Sector IT Project", "abstract": "This paper argues that IT failures diagnosed as errors at the technical or project management level are often mistakenly @@ -10242,15 +11231,16 @@ interactions: of failure by examining failures at a level of granularity not seen elsewhere that enables the underlying socio-complexity sources of risk to be identified.", "venue": "ArXiv", "year": 2010, "referenceCount": 27, "citationCount": 4, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2010-03-19", "journal": {"volume": - "abs/1003.3880", "name": "ArXiv"}, "authors": [{"authorId": "144172683", "name": - "D. Greenwood"}, {"authorId": "1401831114", "name": "Ali Khajeh-Hosseini"}, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2010-03-19", "journal": + {"volume": "abs/1003.3880", "name": "ArXiv"}, "authors": [{"authorId": "144172683", + "name": "D. Greenwood"}, {"authorId": "1401831114", "name": "Ali Khajeh-Hosseini"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "78e2353af26fd62358db287c863d927a580baea9", "externalIds": {"MAG": "1812607016", "DOI": "10.1201/9780203859759.ch152", - "CorpusId": 3787933}, "url": "https://www.semanticscholar.org/paper/78e2353af26fd62358db287c863d927a580baea9", + "CorpusId": 3787933}, "corpusId": 3787933, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/78e2353af26fd62358db287c863d927a580baea9", "title": "Responsibility modelling for risk analysis", "abstract": "This paper proposes a novel approach to systems modelling based on responsibilities. The approach is designed\nto help users identify and analyse the hazards and @@ -10259,15 +11249,22 @@ interactions: can\nidentify the vulnerabilities that may arise because human, organisational or technological agents fail to discharge\nthe responsibilities assigned to them.", "venue": "", "year": 2010, "referenceCount": 18, "citationCount": - 20, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "10371705", "name": "R. Lock"}, {"authorId": "2109581", "name": - "Tim Storer"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "40279693", "name": "G. Baxter"}]}, {"paperId": "92ab8e2df02d5ac8c591e889658dcf33fb13a654", + 20, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://figshare.com/articles/conference_contribution/Responsibility_modelling_for_risk_analysis/9405422/1/files/17022131.pdf", + "status": null}, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": + "Geography", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "10371705", "name": "R. Lock"}, {"authorId": + "2109581", "name": "Tim Storer"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "40279693", "name": "G. Baxter"}]}, {"paperId": "92ab8e2df02d5ac8c591e889658dcf33fb13a654", "externalIds": {"MAG": "2053726514", "DBLP": "conf/iceccs/LockS10", "DOI": - "10.1109/ICECCS.2010.40", "CorpusId": 11226765}, "url": "https://www.semanticscholar.org/paper/92ab8e2df02d5ac8c591e889658dcf33fb13a654", + "10.1109/ICECCS.2010.40", "CorpusId": 11226765}, "corpusId": 11226765, "publicationVenue": + {"id": "0e6e8f0a-455b-4be7-9d4c-5d6f93bd25a8", "name": "IEEE International + Conference on Engineering of Complex Computer Systems", "type": "conference", + "alternate_names": ["IEEE Int Conf Eng Complex Comput Syst", "International + Conference on Engineering of Complex Computer Systems", "Int Conf Eng Complex + Comput Syst", "ICECCS"], "url": "https://ieeexplore.ieee.org/xpl/conhome/1000271/all-proceedings"}, + "url": "https://www.semanticscholar.org/paper/92ab8e2df02d5ac8c591e889658dcf33fb13a654", "title": "Modelling and Analysis of Socio-Technical System of Systems", "abstract": "This paper proposes a novel approach to System of Systems modelling based on the specification of system capabilities. The approach is designed to help @@ -10279,7 +11276,8 @@ interactions: system when considering evolution and unexpected circumstances.", "venue": "IEEE International Conference on Engineering of Complex Computer Systems", "year": 2010, "referenceCount": 22, "citationCount": 32, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://figshare.com/articles/conference_contribution/Modelling_and_analysis_of_socio-technical_system_of_systems/9404054/1/files/17020742.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2010-03-22", @@ -10287,7 +11285,7 @@ interactions: on Engineering of Complex Computer Systems"}, "authors": [{"authorId": "10371705", "name": "R. Lock"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "94a74f1ce28fdd231d7e62e5f061ade047257ac2", "externalIds": {"CorpusId": 198940524}, - "url": "https://www.semanticscholar.org/paper/94a74f1ce28fdd231d7e62e5f061ade047257ac2", + "corpusId": 198940524, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/94a74f1ce28fdd231d7e62e5f061ade047257ac2", "title": "Promoting Virtual Social Interaction with Older People", "abstract": "This paper charts the development of a software platform and applications designed specifically for older people to promote communication and sociability. @@ -10303,14 +11301,14 @@ interactions: games also allow voice chat so players can socialise while playing. The application of this software has the possible use of encouraging intergenerational communication.", "venue": "", "year": 2010, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "15327163", "name": "P. Bagnall"}, - {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "2652064", "name": - "V. Onditi"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "b893b7d29952de3f717e55a2d658876692a35e81", "externalIds": {"ArXiv": "1003.3866", - "DBLP": "journals/corr/abs-1003-3866", "MAG": "1642724738", "CorpusId": 7492540}, - "url": "https://www.semanticscholar.org/paper/b893b7d29952de3f717e55a2d658876692a35e81", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "15327163", + "name": "P. Bagnall"}, {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": + "2652064", "name": "V. Onditi"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "b893b7d29952de3f717e55a2d658876692a35e81", "externalIds": {"ArXiv": + "1003.3866", "DBLP": "journals/corr/abs-1003-3866", "MAG": "1642724738", "CorpusId": + 7492540}, "corpusId": 7492540, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b893b7d29952de3f717e55a2d658876692a35e81", "title": "The Cloud Adoption Toolkit: Addressing the Challenges of Cloud Adoption in Enterprise", "abstract": "Cloud computing promises a radical shift in the provisioning of computing resource within the enterprise. This paper: i) describes @@ -10326,16 +11324,17 @@ interactions: shows signs that it is a useful tool for decision makers as it helps address the feasibility challenges of cloud adoption in the enterprise.", "venue": "ArXiv", "year": 2010, "referenceCount": 22, "citationCount": 57, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-03-19", "journal": {"volume": "abs/1003.3866", "name": - "ArXiv"}, "authors": [{"authorId": "144172683", "name": "D. Greenwood"}, {"authorId": - "1401831114", "name": "Ali Khajeh-Hosseini"}, {"authorId": "2119124196", "name": - "James W. Smith"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "ddc8b2430175abb901d8b36c1cd5a8d068b53dd6", "externalIds": {"ArXiv": "1001.3257", - "DBLP": "journals/corr/abs-1001-3257", "MAG": "1662910393", "CorpusId": 16984905}, - "url": "https://www.semanticscholar.org/paper/ddc8b2430175abb901d8b36c1cd5a8d068b53dd6", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2010-03-19", "journal": + {"volume": "abs/1003.3866", "name": "ArXiv"}, "authors": [{"authorId": "144172683", + "name": "D. Greenwood"}, {"authorId": "1401831114", "name": "Ali Khajeh-Hosseini"}, + {"authorId": "2119124196", "name": "James W. Smith"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "ddc8b2430175abb901d8b36c1cd5a8d068b53dd6", + "externalIds": {"ArXiv": "1001.3257", "DBLP": "journals/corr/abs-1001-3257", + "MAG": "1662910393", "CorpusId": 16984905}, "corpusId": 16984905, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ddc8b2430175abb901d8b36c1cd5a8d068b53dd6", "title": "Research Challenges for Enterprise Cloud Computing", "abstract": "Cloud computing represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over @@ -10352,14 +11351,15 @@ interactions: has the potential to influence wider adoption of cloud computing in enterprise, and in the consumer market too.", "venue": "ArXiv", "year": 2010, "referenceCount": 79, "citationCount": 245, "influentialCitationCount": 12, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2010-01-19", "journal": {"volume": "abs/1001.3257", "name": - "ArXiv"}, "authors": [{"authorId": "1401831114", "name": "Ali Khajeh-Hosseini"}, + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2010-01-19", "journal": {"volume": "abs/1001.3257", + "name": "ArXiv"}, "authors": [{"authorId": "1401831114", "name": "Ali Khajeh-Hosseini"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2114616", "name": "I. Sriram"}]}, {"paperId": "e7768527919c2c2b75309ff37f2ed83e398e4158", - "externalIds": {"CorpusId": 18599752}, "url": "https://www.semanticscholar.org/paper/e7768527919c2c2b75309ff37f2ed83e398e4158", + "externalIds": {"CorpusId": 18599752}, "corpusId": 18599752, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e7768527919c2c2b75309ff37f2ed83e398e4158", "title": "Towards a Multi-level Model of Conflict to Sensitise practitioners to the Socio-organisational Complexity of an IT Systems Development Project", "abstract": "Practitioners are typically aware that organisational complexity @@ -10382,40 +11382,51 @@ interactions: a granularity that enables practitioners to get a handle on aspects of socioorganisational complexity and thus opens up action research as an approach to studying ISDP complexity.", "venue": "", "year": 2010, "referenceCount": 147, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "144172683", "name": "D. Greenwood"}, {"authorId": - "1401831114", "name": "Ali Khajeh-Hosseini"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "1b7437a2e07367286109b62d9ecdf707a189de1e", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "144172683", "name": "D. Greenwood"}, + {"authorId": "1401831114", "name": "Ali Khajeh-Hosseini"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "1b7437a2e07367286109b62d9ecdf707a189de1e", "externalIds": {"MAG": "1996803323", "DBLP": "journals/cscw/RooksbyRS09", - "DOI": "10.1007/s10606-009-9098-7", "CorpusId": 28128640}, "url": "https://www.semanticscholar.org/paper/1b7437a2e07367286109b62d9ecdf707a189de1e", + "DOI": "10.1007/s10606-009-9098-7", "CorpusId": 28128640}, "corpusId": 28128640, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1b7437a2e07367286109b62d9ecdf707a189de1e", "title": "Testing in the Wild: The Social and Organisational Dimensions of Real World Practice", "abstract": null, "venue": "Computer Supported Cooperative Work (CSCW)", "year": 2009, "referenceCount": 63, "citationCount": 83, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Sociology", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Sociology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2009-12-01", "journal": {"volume": "18", "pages": "559-580", "name": "Computer - Supported Cooperative Work (CSCW)"}, "authors": [{"authorId": "2609254", "name": - "J. Rooksby"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "25b1b8c83fcbd271103ba414a7cc3c79f5aeb73b", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Sociology", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2009-12-01", "journal": {"volume": "18", "pages": "559-580", + "name": "Computer Supported Cooperative Work (CSCW)"}, "authors": [{"authorId": + "2609254", "name": "J. Rooksby"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "25b1b8c83fcbd271103ba414a7cc3c79f5aeb73b", "externalIds": {"MAG": "1952490425", "DBLP": "conf/caise/SommervilleLSD09", - "DOI": "10.1007/978-3-642-02144-2_40", "CorpusId": 2919397}, "url": "https://www.semanticscholar.org/paper/25b1b8c83fcbd271103ba414a7cc3c79f5aeb73b", + "DOI": "10.1007/978-3-642-02144-2_40", "CorpusId": 2919397}, "corpusId": 2919397, + "publicationVenue": {"id": "91785da4-7c6a-4e13-936c-0a801a1ef895", "name": + "International Conference on Advanced Information Systems Engineering", "type": + "conference", "alternate_names": ["Int Conf Adv Inf Syst Eng", "Conference + on Advanced Information Systems Engineering", "CAiSE", "Conf Adv Inf Syst + Eng"], "url": "https://link.springer.com/conference/caise"}, "url": "https://www.semanticscholar.org/paper/25b1b8c83fcbd271103ba414a7cc3c79f5aeb73b", "title": "Deriving Information Requirements from Responsibility Models", "abstract": null, "venue": "International Conference on Advanced Information Systems Engineering", "year": 2009, "referenceCount": 52, "citationCount": 42, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2009-06-06", "journal": {"pages": "515-529"}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "10371705", - "name": "R. Lock"}, {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": - "1769028", "name": "J. Dobson"}]}, {"paperId": "4bddb173c165b2cd33e255e427e29422b87d54de", - "externalIds": {"DBLP": "journals/tkde/WongthongthamCDS09", "MAG": "2135035343", - "DOI": "10.1109/TKDE.2008.209", "CorpusId": 10700559}, "url": "https://www.semanticscholar.org/paper/4bddb173c165b2cd33e255e427e29422b87d54de", + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F978-3-642-02144-2_40.pdf", + "status": null}, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2009-06-06", "journal": {"pages": "515-529"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "10371705", "name": "R. Lock"}, {"authorId": + "2109581", "name": "Tim Storer"}, {"authorId": "1769028", "name": "J. Dobson"}]}, + {"paperId": "4bddb173c165b2cd33e255e427e29422b87d54de", "externalIds": {"DBLP": + "journals/tkde/WongthongthamCDS09", "MAG": "2135035343", "DOI": "10.1109/TKDE.2008.209", + "CorpusId": 10700559}, "corpusId": 10700559, "publicationVenue": {"id": "c6840156-ee10-4d78-8832-7f8909811576", + "name": "IEEE Transactions on Knowledge and Data Engineering", "type": "journal", + "alternate_names": ["IEEE Trans Knowl Data Eng"], "issn": "1041-4347", "url": + "https://www.computer.org/web/tkde", "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=69"]}, + "url": "https://www.semanticscholar.org/paper/4bddb173c165b2cd33e255e427e29422b87d54de", "title": "Development of a Software Engineering Ontology for Multisite Software Development", "abstract": "This paper aims to present an ontology model of software engineering to represent its knowledge. The fundamental knowledge @@ -10432,37 +11443,43 @@ interactions: knowledge as well as instance knowledge of software engineering.", "venue": "IEEE Transactions on Knowledge and Data Engineering", "year": 2009, "referenceCount": 39, "citationCount": 86, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-08-01", "journal": {"volume": - "21", "pages": "1205-1217", "name": "IEEE Transactions on Knowledge and Data - Engineering"}, "authors": [{"authorId": "145036570", "name": "P. Wongthongtham"}, - {"authorId": "144556101", "name": "E. Chang"}, {"authorId": "144306547", "name": - "T. Dillon"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "701e706486659e9ddd598678a632041a971fbc86", "externalIds": {"MAG": "2053637318", - "DOI": "10.1057/RM.2009.11", "CorpusId": 3820529}, "url": "https://www.semanticscholar.org/paper/701e706486659e9ddd598678a632041a971fbc86", + "openAccessPdf": {"url": "https://espace.curtin.edu.au/bitstream/20.500.11937/42166/2/118149_8506_PUB-CBS-EEB-MC-45738%255B2%255D.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Engineering", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-08-01", "journal": {"volume": "21", "pages": "1205-1217", "name": "IEEE + Transactions on Knowledge and Data Engineering"}, "authors": [{"authorId": + "145036570", "name": "P. Wongthongtham"}, {"authorId": "144556101", "name": + "E. Chang"}, {"authorId": "144306547", "name": "T. Dillon"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "701e706486659e9ddd598678a632041a971fbc86", + "externalIds": {"MAG": "2053637318", "DOI": "10.1057/RM.2009.11", "CorpusId": + 3820529}, "corpusId": 3820529, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/701e706486659e9ddd598678a632041a971fbc86", "title": "Responsibility modelling for civil emergency planning", "abstract": null, "venue": "", "year": 2009, "referenceCount": 49, "citationCount": 21, - "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Economics"], - "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2009-08-26", "journal": {"volume": "11", "pages": "179-207", "name": "Risk - Management"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": "10371705", "name": - "R. Lock"}]}, {"paperId": "d8f4805963387eb1419e079d8e49450babde083a", "externalIds": - {"MAG": "2264800551", "CorpusId": 110669136}, "url": "https://www.semanticscholar.org/paper/d8f4805963387eb1419e079d8e49450babde083a", + "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1057/rm.2009.11.pdf", "status": + null}, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2009-08-26", "journal": {"volume": + "11", "pages": "179-207", "name": "Risk Management"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "2109581", "name": "Tim + Storer"}, {"authorId": "10371705", "name": "R. Lock"}]}, {"paperId": "d8f4805963387eb1419e079d8e49450babde083a", + "externalIds": {"MAG": "2264800551", "CorpusId": 110669136}, "corpusId": 110669136, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d8f4805963387eb1419e079d8e49450babde083a", "title": "Software Engineering Experts'' Panel: The Status and Future of SBSE in the Software Engineering Community", "abstract": null, "venue": "", "year": 2009, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "145836176", "name": "M. Harman"}, - {"authorId": "2449010", "name": "Simon M. Poulding"}]}, {"paperId": "1b0edeabce5e0f261edd1e52418dae1d0c67825a", - "externalIds": {"MAG": "2148143446", "DBLP": "conf/aswec/Somerville08", "DOI": - "10.1109/ASWEC.2008.84", "CorpusId": 27366676}, "url": "https://www.semanticscholar.org/paper/1b0edeabce5e0f261edd1e52418dae1d0c67825a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "145836176", + "name": "M. Harman"}, {"authorId": "2449010", "name": "Simon M. Poulding"}]}, + {"paperId": "1b0edeabce5e0f261edd1e52418dae1d0c67825a", "externalIds": {"MAG": + "2148143446", "DBLP": "conf/aswec/Somerville08", "DOI": "10.1109/ASWEC.2008.84", + "CorpusId": 27366676}, "corpusId": 27366676, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1b0edeabce5e0f261edd1e52418dae1d0c67825a", "title": "Fitting Software to the Organization: Reducing Time to Value for New Software Systems", "abstract": "Most large and medium-sized organizations have shifted the focus of some or all of their organizational software development @@ -10474,14 +11491,18 @@ interactions: fully operational and delivering value to the company.", "venue": "19th Australian Conference on Software Engineering (aswec 2008)", "year": 2008, "referenceCount": 1, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2008-03-26", "journal": {"pages": "51-51", "name": "19th Australian Conference - on Software Engineering (aswec 2008)"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "1d8ddf64b05ba51e1d83977c6379d2cb6a4131db", - "externalIds": {"MAG": "2078282024", "DBLP": "conf/iccbss/Sommerville08", - "DOI": "10.1109/ICCBSS.2008.42", "CorpusId": 12660645}, "url": "https://www.semanticscholar.org/paper/1d8ddf64b05ba51e1d83977c6379d2cb6a4131db", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2008-03-26", "journal": {"pages": "51-51", + "name": "19th Australian Conference on Software Engineering (aswec 2008)"}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "1d8ddf64b05ba51e1d83977c6379d2cb6a4131db", "externalIds": {"MAG": "2078282024", + "DBLP": "conf/iccbss/Sommerville08", "DOI": "10.1109/ICCBSS.2008.42", "CorpusId": + 12660645}, "corpusId": 12660645, "publicationVenue": {"id": "4c11d78e-8243-4771-8f32-063980b888e8", + "name": "IEEE International Conference on COTS-Based Software Systems", "type": + "conference", "alternate_names": ["ICCBSS", "IEEE Int Conf Cots-based Softw + Syst"], "url": "http://www.iccbss.org/"}, "url": "https://www.semanticscholar.org/paper/1d8ddf64b05ba51e1d83977c6379d2cb6a4131db", "title": "Designing for Recovery: New Challenges for Large-Scale Complex IT Systems", "abstract": "Summary form only given. Since the 1980s, the object of design for dependability has been to avoid, detect or tolerate system faults @@ -10499,16 +11520,17 @@ interactions: design objective of systems and explore what this means for current approaches to large-scale systems design.", "venue": "IEEE International Conference on COTS-Based Software Systems", "year": 2008, "referenceCount": 0, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2008-02-25", "journal": - {"pages": "15-15", "name": "Seventh International Conference on Composition-Based - Software Systems (ICCBSS 2008)"}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "3381c557ffadfbf2c4cf4e4cb3f78edc70b5a1da", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2008-02-25", "journal": {"pages": "15-15", "name": "Seventh International + Conference on Composition-Based Software Systems (ICCBSS 2008)"}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "3381c557ffadfbf2c4cf4e4cb3f78edc70b5a1da", "externalIds": {"DBLP": "conf/aswec/Sommerville08", "MAG": "2154052484", "DOI": - "10.1109/ASWEC.2008.75", "CorpusId": 2042813}, "url": "https://www.semanticscholar.org/paper/3381c557ffadfbf2c4cf4e4cb3f78edc70b5a1da", + "10.1109/ASWEC.2008.75", "CorpusId": 2042813}, "corpusId": 2042813, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3381c557ffadfbf2c4cf4e4cb3f78edc70b5a1da", "title": "Construction by Configuration: Challenges for Software Engineering Research and Practice", "abstract": "The past ten years have seen a radical shift in business application software development. Rather than developing @@ -10525,15 +11547,15 @@ interactions: a number of challenges for research and practice to improve this approach to software engineering.", "venue": "19th Australian Conference on Software Engineering (aswec 2008)", "year": 2008, "referenceCount": 15, "citationCount": - 24, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2008-03-26", - "journal": {"pages": "3-12", "name": "19th Australian Conference on Software - Engineering (aswec 2008)"}, "authors": [{"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "5e797b0b46bb524abab12c7a1b84be6a839783b9", "externalIds": - {"MAG": "2080876023", "DOI": "10.1108/17506160810876185", "CorpusId": 12455813}, - "url": "https://www.semanticscholar.org/paper/5e797b0b46bb524abab12c7a1b84be6a839783b9", + 24, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2008-03-26", "journal": {"pages": "3-12", "name": "19th + Australian Conference on Software Engineering (aswec 2008)"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "5e797b0b46bb524abab12c7a1b84be6a839783b9", + "externalIds": {"MAG": "2080876023", "DOI": "10.1108/17506160810876185", "CorpusId": + 12455813}, "corpusId": 12455813, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5e797b0b46bb524abab12c7a1b84be6a839783b9", "title": "OBSERVATIONS OF THE SCOTTISH ELECTIONS 2007", "abstract": "In the recent Scottish elections, an e-counting system was employed to manage the increased complexity of the Scottish electoral system. The elections were @@ -10542,15 +11564,17 @@ interactions: that arose during observations made by the authors as observers, relating to the use of the new e-counting system.", "venue": "", "year": 2008, "referenceCount": 13, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political - Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2008-05-30", "journal": {"volume": - "2", "pages": "104-118", "name": "Transforming Government: People, Process - and Policy"}, "authors": [{"authorId": "10371705", "name": "R. Lock"}, {"authorId": - "2109581", "name": "Tim Storer"}, {"authorId": "151398460", "name": "Natalie - Harvey"}, {"authorId": "40341028", "name": "C. Hughes"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "7ad1333bca7ad0c29d1aa9e017f72e873ed7adac", - "externalIds": {"CorpusId": 226993995}, "url": "https://www.semanticscholar.org/paper/7ad1333bca7ad0c29d1aa9e017f72e873ed7adac", + "openAccessPdf": {"url": "https://figshare.com/articles/conference_contribution/Observations_of_the_Scottish_elections_2007/9402599/1/files/17019176.pdf", + "status": null}, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": + [{"category": "Political Science", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-05-30", + "journal": {"volume": "2", "pages": "104-118", "name": "Transforming Government: + People, Process and Policy"}, "authors": [{"authorId": "10371705", "name": + "R. Lock"}, {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": "151398460", + "name": "Natalie Harvey"}, {"authorId": "40341028", "name": "C. Hughes"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "7ad1333bca7ad0c29d1aa9e017f72e873ed7adac", + "externalIds": {"CorpusId": 226993995}, "corpusId": 226993995, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7ad1333bca7ad0c29d1aa9e017f72e873ed7adac", "title": "Construction by configuration: A new challenge for software engineering education", "abstract": "Software reuse has been the subject of software engineering research for more than 20 years. Although there are still problems to be overcome, @@ -10584,26 +11608,31 @@ interactions: in a university environment. I then go on to suggest how we, as educators, might address these problems and so broaden the scope of software engineering education.", "venue": "", "year": 2008, "referenceCount": 2, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "91ef7d4c35893d4d80041c74cd1bcb3979cf647b", - "externalIds": {"MAG": "1984943600", "DBLP": "journals/comcom/WalkerdineHRSGMS08", - "DOI": "10.1016/j.comcom.2007.08.004", "CorpusId": 9663946}, "url": "https://www.semanticscholar.org/paper/91ef7d4c35893d4d80041c74cd1bcb3979cf647b", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "91ef7d4c35893d4d80041c74cd1bcb3979cf647b", "externalIds": {"MAG": + "1984943600", "DBLP": "journals/comcom/WalkerdineHRSGMS08", "DOI": "10.1016/j.comcom.2007.08.004", + "CorpusId": 9663946}, "corpusId": 9663946, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/91ef7d4c35893d4d80041c74cd1bcb3979cf647b", "title": "A framework for P2P application development", "abstract": null, "venue": "Comput. Commun.", "year": 2008, "referenceCount": 49, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-02-01", "journal": - {"volume": "31", "pages": "387-401", "name": "Comput. Commun."}, "authors": - [{"authorId": "2334381", "name": "J. Walkerdine"}, {"authorId": "49895506", - "name": "D. Hughes"}, {"authorId": "1929390", "name": "Paul Rayson"}, {"authorId": - "2070090895", "name": "John Simms"}, {"authorId": "39850420", "name": "K. - Gilleade"}, {"authorId": "1707662", "name": "J. Mariani"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "a59ee1aef756f026c801ef586ca11f261c924872", - "externalIds": {"DBLP": "conf/icse/MartinRRS08", "MAG": "2031624663", "DOI": - "10.1145/1370114.1370138", "CorpusId": 27183530}, "url": "https://www.semanticscholar.org/paper/a59ee1aef756f026c801ef586ca11f261c924872", + 16, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://eprints.lancs.ac.uk/id/eprint/12368/1/FrameworkReport.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-02-01", "journal": {"volume": "31", "pages": "387-401", + "name": "Comput. Commun."}, "authors": [{"authorId": "2334381", "name": "J. + Walkerdine"}, {"authorId": "49895506", "name": "D. Hughes"}, {"authorId": + "1929390", "name": "Paul Rayson"}, {"authorId": "2070090895", "name": "John + Simms"}, {"authorId": "39850420", "name": "K. Gilleade"}, {"authorId": "1707662", + "name": "J. Mariani"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "a59ee1aef756f026c801ef586ca11f261c924872", "externalIds": {"DBLP": + "conf/icse/MartinRRS08", "MAG": "2031624663", "DOI": "10.1145/1370114.1370138", + "CorpusId": 27183530}, "corpusId": 27183530, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a59ee1aef756f026c801ef586ca11f261c924872", "title": "Cooperative work in software testing", "abstract": "Substantial effort in the development of any large system is invested in testing. Studies of testing tend to be either technical or concerned with the cognitive ability @@ -10614,17 +11643,18 @@ interactions: testing done. In this position paper, we use data from four ethnographic studies to discuss just what that cooperative work is.", "venue": "CHASE", "year": 2008, "referenceCount": 3, "citationCount": 4, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], - "publicationDate": "2008-05-13", "journal": {"name": "Proceedings of the 2008 - international workshop on Cooperative and human aspects of software engineering"}, - "authors": [{"authorId": "2116603121", "name": "David B. Martin"}, {"authorId": - "2609254", "name": "J. Rooksby"}, {"authorId": "2089073", "name": "M. Rouncefield"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "04b09cd8f10e2bde2973056d06cf0e3d52cd576d", - "externalIds": {"MAG": "2156605085", "DBLP": "journals/concurrency/WalkerAS07", - "DOI": "10.1002/cpe.1051", "CorpusId": 29228770}, "url": "https://www.semanticscholar.org/paper/04b09cd8f10e2bde2973056d06cf0e3d52cd576d", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Book", + "JournalArticle"], "publicationDate": "2008-05-13", "journal": {"name": "Proceedings + of the 2008 international workshop on Cooperative and human aspects of software + engineering"}, "authors": [{"authorId": "2116603121", "name": "David B. Martin"}, + {"authorId": "2609254", "name": "J. Rooksby"}, {"authorId": "2089073", "name": + "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "04b09cd8f10e2bde2973056d06cf0e3d52cd576d", "externalIds": {"MAG": "2156605085", + "DBLP": "journals/concurrency/WalkerAS07", "DOI": "10.1002/cpe.1051", "CorpusId": + 29228770}, "corpusId": 29228770, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/04b09cd8f10e2bde2973056d06cf0e3d52cd576d", "title": "Special Issue: Selected Papers from the 2004 U.K. e\u2010Science All Hands Meeting (AHM 2004)", "abstract": "The annual U.K. e-Science All Hands Meeting (AHM) is the premier e-Science conference held regularly in @@ -10646,14 +11676,16 @@ interactions: a broad interpretation of what is meant by e-Science, and that is reflected in the papers selected for this special issue.", "venue": "Concurr. Comput. Pract. Exp.", "year": 2007, "referenceCount": 2, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.1051", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2007-02-01", "journal": {"volume": "19", "name": "Concurrency and Computation: Practice and Experience"}, "authors": [{"authorId": "145561672", "name": "D. Walker"}, {"authorId": "97702983", "name": "M. Atkinson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "0a51d9880a7b12866c20d162f595dc6e5c9bd314", - "externalIds": {"CorpusId": 14819579}, "url": "https://www.semanticscholar.org/paper/0a51d9880a7b12866c20d162f595dc6e5c9bd314", + "externalIds": {"CorpusId": 14819579}, "corpusId": 14819579, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0a51d9880a7b12866c20d162f595dc6e5c9bd314", "title": "Interactive Database Objects", "abstract": "This paper describes a user interface framework called Moggetto for an object-oriented database system (OODB). Moggetto is proposed as an approach to the definition and management @@ -10663,33 +11695,36 @@ interactions: need for close coupling between the OODB and the host windowing system through, for example, common language bindings and code libraries.", "venue": "", "year": 2007, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "144076208", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "2501449", "name": "A. Colebourne"}, {"authorId": "1707662", "name": "J. Mariani"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "0cbfd89fa22878037f75612200b2417b47110da6", "externalIds": {"DBLP": - "books/lib/Sommerville07", "CorpusId": 43466675}, "url": "https://www.semanticscholar.org/paper/0cbfd89fa22878037f75612200b2417b47110da6", + "books/lib/Sommerville07", "CorpusId": 43466675}, "corpusId": 43466675, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0cbfd89fa22878037f75612200b2417b47110da6", "title": "Software engineering, 8th Edition", "abstract": null, "venue": "International computer science series", "year": 2007, "referenceCount": 0, "citationCount": - 229, "influentialCitationCount": 37, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"pages": "I-XXIII, - 1-840"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "1092943aecc969d9a20e914a7e8cd17978d36c92", "externalIds": {"MAG": - "290800122", "DOI": "10.1007/978-1-84628-626-1_1", "CorpusId": 60002654}, - "url": "https://www.semanticscholar.org/paper/1092943aecc969d9a20e914a7e8cd17978d36c92", + 229, "influentialCitationCount": 37, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"pages": "I-XXIII, 1-840"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "1092943aecc969d9a20e914a7e8cd17978d36c92", + "externalIds": {"MAG": "290800122", "DOI": "10.1007/978-1-84628-626-1_1", + "CorpusId": 60002654}, "corpusId": 60002654, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1092943aecc969d9a20e914a7e8cd17978d36c92", "title": "Introduction: Dependability and Responsibility in Context", "abstract": null, "venue": "", "year": 2007, "referenceCount": 12, "citationCount": 2, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "1-17", "name": ""}, "authors": [{"authorId": "1769028", "name": - "J. Dobson"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "1-17", "name": ""}, "authors": [{"authorId": "1769028", + "name": "J. Dobson"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1834798", "name": "G. Dewsbury"}]}, {"paperId": "1864f70de9000e0b6b15a6476283bacc596a158c", - "externalIds": {"MAG": "1508469317", "CorpusId": 13918295}, "url": "https://www.semanticscholar.org/paper/1864f70de9000e0b6b15a6476283bacc596a158c", + "externalIds": {"MAG": "1508469317", "CorpusId": 13918295}, "corpusId": 13918295, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1864f70de9000e0b6b15a6476283bacc596a158c", "title": "PCL: A configuration language for modelling evolving system architectures", "abstract": "The paper describes a configuration language called PCL which has been designed to describe the architecture of multiple versions of computer-based @@ -10700,13 +11735,14 @@ interactions: and its integration with a number of structured design methods. A supporting toolset for PCL has been implemented and is briefly described.", "venue": "", "year": 2007, "referenceCount": 20, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "40101012", "name": "G. Dean"}]}, - {"paperId": "1a77360b052010cda9103bbf785923405d88614f", "externalIds": {"MAG": - "2188135559", "CorpusId": 17596609}, "url": "https://www.semanticscholar.org/paper/1a77360b052010cda9103bbf785923405d88614f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "40101012", + "name": "G. Dean"}]}, {"paperId": "1a77360b052010cda9103bbf785923405d88614f", + "externalIds": {"MAG": "2188135559", "CorpusId": 17596609}, "corpusId": 17596609, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1a77360b052010cda9103bbf785923405d88614f", "title": "Targetted Improvements Focusing improvement to maximize benefits and minimize impact", "abstract": "In the creative environment where research takes place not everything can be improved. The creative \"essence\" of research @@ -10719,13 +11755,14 @@ interactions: supervise, teach and guide to facilitate better and faster researching in our academic computer science departments.", "venue": "", "year": 2007, "referenceCount": 27, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "1848548", "name": "Andre Oboler"}, - {"authorId": "144611060", "name": "S. Lock"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "2562c58bbe133121e1220af92cf73e56cd6b60b2", - "externalIds": {"MAG": "2275365721", "CorpusId": 61317483}, "url": "https://www.semanticscholar.org/paper/2562c58bbe133121e1220af92cf73e56cd6b60b2", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1848548", + "name": "Andre Oboler"}, {"authorId": "144611060", "name": "S. Lock"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "2562c58bbe133121e1220af92cf73e56cd6b60b2", + "externalIds": {"MAG": "2275365721", "CorpusId": 61317483}, "corpusId": 61317483, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2562c58bbe133121e1220af92cf73e56cd6b60b2", "title": "Software engineering ontology for software engineering knowledge management in multi-site software development environment", "abstract": "cal component in several applications. One unique area of research is the software @@ -10763,14 +11800,15 @@ interactions: is given here. Figure 1 shows an example UML class diagram that will be transformed into the class diagram ontology model as instance knowledge.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 10, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "145036570", "name": - "P. Wongthongtham"}, {"authorId": "2157583", "name": "E. Chang"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "2be851739aa204f01395266462703b21595626b9", - "externalIds": {"MAG": "2104505049", "CorpusId": 12051732}, "url": "https://www.semanticscholar.org/paper/2be851739aa204f01395266462703b21595626b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "145036570", + "name": "P. Wongthongtham"}, {"authorId": "2157583", "name": "E. Chang"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "2be851739aa204f01395266462703b21595626b9", + "externalIds": {"MAG": "2104505049", "CorpusId": 12051732}, "corpusId": 12051732, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2be851739aa204f01395266462703b21595626b9", "title": "Software Engineering Ontology - the Instance Knowledge (Part I)", "abstract": "Summary The software engineering ontology defines common sharable software engineering knowledge including particular project information. Reaching @@ -10785,15 +11823,16 @@ interactions: In this paper, we present development of application tools to facilitate software engineering ontology instantiations management.", "venue": "", "year": 2007, "referenceCount": 12, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "7", "pages": "15-26", "name": ""}, "authors": [{"authorId": - "145036570", "name": "P. Wongthongtham"}, {"authorId": "144556101", "name": - "E. Chang"}, {"authorId": "144306547", "name": "T. Dillon"}, {"authorId": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "7", "pages": "15-26", "name": ""}, "authors": + [{"authorId": "145036570", "name": "P. Wongthongtham"}, {"authorId": "144556101", + "name": "E. Chang"}, {"authorId": "144306547", "name": "T. Dillon"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "3497e02faa1b2b5d65b35824df3e0208f15888f6", "externalIds": {"MAG": "2296363923", "DBLP": "conf/icsea/ObolerLS07", "DOI": - "10.1109/ICSEA.2007.68", "CorpusId": 15334616}, "url": "https://www.semanticscholar.org/paper/3497e02faa1b2b5d65b35824df3e0208f15888f6", + "10.1109/ICSEA.2007.68", "CorpusId": 15334616}, "corpusId": 15334616, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3497e02faa1b2b5d65b35824df3e0208f15888f6", "title": "Targetted Improvements", "abstract": "In the creative environment where research takes place not everything can be improved. The creative \"essence\" of research must be undisturbed while \"accident\" wasted effort is reduced @@ -10806,15 +11845,16 @@ interactions: in our academic computer science departments.", "venue": "International Conference on Software Engineering Advances (ICSEA 2007)", "year": 2007, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2007-08-25", - "journal": {"pages": "80-80", "name": "International Conference on Software - Engineering Advances (ICSEA 2007)"}, "authors": [{"authorId": "1848548", "name": - "Andre Oboler"}, {"authorId": "144611060", "name": "S. Lock"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "35a0092358021b68394656ab04ddb1c0b8c5b131", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2007-08-25", "journal": {"pages": "80-80", "name": "International + Conference on Software Engineering Advances (ICSEA 2007)"}, "authors": [{"authorId": + "1848548", "name": "Andre Oboler"}, {"authorId": "144611060", "name": "S. + Lock"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "35a0092358021b68394656ab04ddb1c0b8c5b131", "externalIds": {"MAG": "2147782157", "DBLP": "conf/itng/ObolerS07", "DOI": - "10.1109/ITNG.2007.167", "CorpusId": 11980182}, "url": "https://www.semanticscholar.org/paper/35a0092358021b68394656ab04ddb1c0b8c5b131", + "10.1109/ITNG.2007.167", "CorpusId": 11980182}, "corpusId": 11980182, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/35a0092358021b68394656ab04ddb1c0b8c5b131", "title": "Research Documentation Guidelines - Capturing knowledge, improving research", "abstract": "This paper introduced coding guidelines for use by academics developing code as part of their research in areas of computer science @@ -10824,35 +11864,38 @@ interactions: as an agile approach to model both the software and the research ideas as they develop and change", "venue": "Fourth International Conference on Information Technology (ITNG''07)", "year": 2007, "referenceCount": 15, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2007-04-02", - "journal": {"pages": "679-684", "name": "Fourth International Conference on - Information Technology (ITNG''07)"}, "authors": [{"authorId": "1848548", "name": - "Andre Oboler"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "3a5a1272a54b5215f6763ee2878133c37f51db7d", "externalIds": {"MAG": "1750667395", - "DOI": "10.1002/CPE.V19:2", "CorpusId": 61089790}, "url": "https://www.semanticscholar.org/paper/3a5a1272a54b5215f6763ee2878133c37f51db7d", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2007-04-02", "journal": {"pages": "679-684", "name": "Fourth + International Conference on Information Technology (ITNG''07)"}, "authors": + [{"authorId": "1848548", "name": "Andre Oboler"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "3a5a1272a54b5215f6763ee2878133c37f51db7d", + "externalIds": {"MAG": "1750667395", "DOI": "10.1002/CPE.V19:2", "CorpusId": + 61089790}, "corpusId": 61089790, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a5a1272a54b5215f6763ee2878133c37f51db7d", "title": "Special Issue: Selected Papers from the 2004 U.K. e-Science All Hands Meeting (AHM 2004): Editorials", "abstract": null, "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "2007-02-01", "journal": {"volume": "19", "pages": - "129-131", "name": "Concurrency and Computation: Practice and Experience"}, - "authors": [{"authorId": "145561672", "name": "D. Walker"}, {"authorId": "97702983", - "name": "M. Atkinson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "3f21d5551d6d102c1de04312fe1695628270d4c6", "externalIds": {"MAG": - "152861604", "DOI": "10.1007/978-1-84628-626-1_8", "CorpusId": 166593752}, - "url": "https://www.semanticscholar.org/paper/3f21d5551d6d102c1de04312fe1695628270d4c6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "2007-02-01", "journal": + {"volume": "19", "pages": "129-131", "name": "Concurrency and Computation: + Practice and Experience"}, "authors": [{"authorId": "145561672", "name": "D. + Walker"}, {"authorId": "97702983", "name": "M. Atkinson"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "3f21d5551d6d102c1de04312fe1695628270d4c6", + "externalIds": {"MAG": "152861604", "DOI": "10.1007/978-1-84628-626-1_8", + "CorpusId": 166593752}, "corpusId": 166593752, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3f21d5551d6d102c1de04312fe1695628270d4c6", "title": "Models for Responsibility Assignment", "abstract": null, "venue": "", "year": 2007, "referenceCount": 5, "citationCount": 23, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "165-186", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "43e69d17d6c569396d6ef0fa15ac17e9f189ffc9", - "externalIds": {"MAG": "2417170858", "CorpusId": 215755684}, "url": "https://www.semanticscholar.org/paper/43e69d17d6c569396d6ef0fa15ac17e9f189ffc9", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "165-186", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "43e69d17d6c569396d6ef0fa15ac17e9f189ffc9", + "externalIds": {"MAG": "2417170858", "CorpusId": 215755684}, "corpusId": 215755684, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43e69d17d6c569396d6ef0fa15ac17e9f189ffc9", "title": "Software Engineering: AND Using UML, Software Engineering with Objects and Components", "abstract": "Software Engineering: (Update) 8/E Building on the widely acclaimed strengths of the 7th edition, 8 updates readers with @@ -10863,25 +11906,34 @@ interactions: UML 2.0 standard, this is an ideal introduction to the Unified Modelling Language for students learning about object and component-based software design and development.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2007-09-10", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "145098640", "name": "P. Stevens"}]}, {"paperId": "46feaec5c9c19313d4c825aa67dfd143533e2fcb", - "externalIds": {"DBLP": "journals/iwc/SommervilleD07", "MAG": "1992402827", - "DOI": "10.1016/j.intcom.2007.05.002", "CorpusId": 2860927}, "url": "https://www.semanticscholar.org/paper/46feaec5c9c19313d4c825aa67dfd143533e2fcb", + 13, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-09-10", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "145098640", "name": "P. Stevens"}]}, + {"paperId": "46feaec5c9c19313d4c825aa67dfd143533e2fcb", "externalIds": {"DBLP": + "journals/iwc/SommervilleD07", "MAG": "1992402827", "DOI": "10.1016/j.intcom.2007.05.002", + "CorpusId": 2860927}, "corpusId": 2860927, "publicationVenue": {"id": "b9f99919-55d3-4827-8568-640824b354b9", + "name": "Interacting with computers", "type": "journal", "alternate_names": + ["Interact comput", "Interacting with Computers", "Interact Comput"], "issn": + "0953-5438", "url": "http://iwc.oxfordjournals.org/"}, "url": "https://www.semanticscholar.org/paper/46feaec5c9c19313d4c825aa67dfd143533e2fcb", "title": "Dependable domestic systems design: A socio-technical approach", "abstract": null, "venue": "Interacting with computers", "year": 2007, "referenceCount": 68, "citationCount": 52, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2007-07-01", "journal": {"volume": "19", "pages": "438-456", "name": "Interact. - Comput."}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "1834798", "name": "G. Dewsbury"}]}, {"paperId": "559e8512ca1ffade2451bdbb8c473c5602d8e89c", - "externalIds": {"MAG": "2171395086", "DBLP": "conf/icse/MartinRRS07", "DOI": - "10.1109/ICSE.2007.1", "CorpusId": 14865394}, "url": "https://www.semanticscholar.org/paper/559e8512ca1ffade2451bdbb8c473c5602d8e89c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2007-07-01", "journal": {"volume": "19", "pages": "438-456", + "name": "Interact. Comput."}, "authors": [{"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "1834798", "name": "G. Dewsbury"}]}, {"paperId": + "559e8512ca1ffade2451bdbb8c473c5602d8e89c", "externalIds": {"MAG": "2171395086", + "DBLP": "conf/icse/MartinRRS07", "DOI": "10.1109/ICSE.2007.1", "CorpusId": + 14865394}, "corpusId": 14865394, "publicationVenue": {"id": "a36dc29e-4ea1-4567-b0fe-1c06daf8bee8", + "name": "International Conference on Software Engineering", "type": "conference", + "alternate_names": ["IEEE Int Conf Semicond Electron", "IEEE International + Conference on Semiconductor Electronics", "ICSE", "Int Conf Softw Eng"], "url": + "http://www.icse-conferences.org/"}, "url": "https://www.semanticscholar.org/paper/559e8512ca1ffade2451bdbb8c473c5602d8e89c", "title": "''Good'' Organisational Reasons for ''Bad'' Software Testing: An Ethnographic Study of Testing in a Small Software Company", "abstract": "In this paper we report on an ethnographic study of a small software house to @@ -10896,39 +11948,43 @@ interactions: (2) test coverage; (3) test automation; and (4) test scenario design.", "venue": "International Conference on Software Engineering", "year": 2007, "referenceCount": 29, "citationCount": 106, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2007-05-24", - "journal": {"pages": "602-611", "name": "29th International Conference on - Software Engineering (ICSE''07)"}, "authors": [{"authorId": "2110712181", - "name": "David B. Martin"}, {"authorId": "2609254", "name": "J. Rooksby"}, - {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "56db43ceebad3cb8ee4d3efec9151f7f105b0791", - "externalIds": {"CorpusId": 2546049}, "url": "https://www.semanticscholar.org/paper/56db43ceebad3cb8ee4d3efec9151f7f105b0791", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2007-05-24", "journal": {"pages": "602-611", "name": "29th + International Conference on Software Engineering (ICSE''07)"}, "authors": + [{"authorId": "2110712181", "name": "David B. Martin"}, {"authorId": "2609254", + "name": "J. Rooksby"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "56db43ceebad3cb8ee4d3efec9151f7f105b0791", + "externalIds": {"CorpusId": 2546049}, "corpusId": 2546049, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/56db43ceebad3cb8ee4d3efec9151f7f105b0791", "title": "Human factors observations of the e-counting system for the scottish 2007 elections", "abstract": "In the recent Scottish elections, an e-counting system was employed to manage the increased complexity of the Scottish electoral system. This paper discusses some of the human factors issues observed on election night in relation to the system, and proposes some remedies.", "venue": "", "year": 2007, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "10371705", "name": "R. Lock"}, - {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": "151398460", "name": - "Natalie Harvey"}, {"authorId": "40341028", "name": "C. Hughes"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "586a6602e7fc47a978211f54c0ea11becc24dbd4", - "externalIds": {"DBLP": "journals/ase/Sommerville08", "MAG": "1991219671", - "DOI": "10.1007/s10515-007-0019-z", "CorpusId": 10446868}, "url": "https://www.semanticscholar.org/paper/586a6602e7fc47a978211f54c0ea11becc24dbd4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "10371705", + "name": "R. Lock"}, {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": + "151398460", "name": "Natalie Harvey"}, {"authorId": "40341028", "name": "C. + Hughes"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "586a6602e7fc47a978211f54c0ea11becc24dbd4", "externalIds": {"DBLP": "journals/ase/Sommerville08", + "MAG": "1991219671", "DOI": "10.1007/s10515-007-0019-z", "CorpusId": 10446868}, + "corpusId": 10446868, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/586a6602e7fc47a978211f54c0ea11becc24dbd4", "title": "Desert Island Column", "abstract": null, "venue": "Automated Software Engineering", "year": 2008, "referenceCount": 5, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2008-03-01", "journal": {"volume": "15", "pages": "109-111", - "name": "Automated Software Engineering"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "592d205fbf5d71e3ab560894bcf408d1672640b9", - "externalIds": {"MAG": "2318303651", "CorpusId": 6412445}, "url": "https://www.semanticscholar.org/paper/592d205fbf5d71e3ab560894bcf408d1672640b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2008-03-01", "journal": + {"volume": "15", "pages": "109-111", "name": "Automated Software Engineering"}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "592d205fbf5d71e3ab560894bcf408d1672640b9", "externalIds": {"MAG": "2318303651", + "CorpusId": 6412445}, "corpusId": 6412445, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/592d205fbf5d71e3ab560894bcf408d1672640b9", "title": "Responsibility modelling for contingency planning", "abstract": "This paper proposes the use of responsibility modelling as a tool to support the process\nof contingency planning for civil emergencies. Existing contingency @@ -10941,21 +11997,27 @@ interactions: presented do illustrate the potential use of responsibility modelling concepts to\nassist in the contingency planning process.", "venue": "", "year": 2007, "referenceCount": 28, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "2109581", "name": "Tim Storer"}, {"authorId": "10371705", "name": - "R. Lock"}]}, {"paperId": "6b8af3eafe7a26e65e49da04c67062af9ffd4df3", "externalIds": - {"DBLP": "books/daglib/0017996", "CorpusId": 195837623}, "url": "https://www.semanticscholar.org/paper/6b8af3eafe7a26e65e49da04c67062af9ffd4df3", + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "2109581", "name": "Tim Storer"}, + {"authorId": "10371705", "name": "R. Lock"}]}, {"paperId": "6b8af3eafe7a26e65e49da04c67062af9ffd4df3", + "externalIds": {"DBLP": "books/daglib/0017996", "CorpusId": 195837623}, "corpusId": + 195837623, "publicationVenue": {"id": "5ffb3a6b-d9c2-4933-9e8a-3bb56f28eecf", + "name": "Jahrestagung der Gesellschaft f\u00fcr Informatik", "type": "conference", + "alternate_names": ["INFORMATIK", "Jahrestag Ges Inform", "Informatik"], "issn": + "0216-4221", "url": "https://gi.de/ueber-uns/historie/", "alternate_urls": + ["https://ejournal.upnvj.ac.id/index.php/informatik"]}, "url": "https://www.semanticscholar.org/paper/6b8af3eafe7a26e65e49da04c67062af9ffd4df3", "title": "Software Engineering, 8. Auflage", "abstract": null, "venue": "Jahrestagung der Gesellschaft f\u00fcr Informatik", "year": 2007, "referenceCount": 0, "citationCount": 96, "influentialCitationCount": 11, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"pages": "1-875"}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "79a23af9aebcd79774a8ae199c4072d0c450c357", - "externalIds": {"MAG": "1489745633", "CorpusId": 15241762}, "url": "https://www.semanticscholar.org/paper/79a23af9aebcd79774a8ae199c4072d0c450c357", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"pages": "1-875"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "79a23af9aebcd79774a8ae199c4072d0c450c357", + "externalIds": {"MAG": "1489745633", "CorpusId": 15241762}, "corpusId": 15241762, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79a23af9aebcd79774a8ae199c4072d0c450c357", "title": "PREview: Tackling the Real Concerns of Requirements Engineering", "abstract": "A common complaint from industrial development projects is that systems fail to address the real concerns of the major stakeholders. This @@ -10975,28 +12037,34 @@ interactions: with those concerns. It provides a light-weight and pragmatic approach to requirements engineering where the need to address concerns permeates every stage of the process.", "venue": "", "year": 2007, "referenceCount": 28, "citationCount": - 13, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 13, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1788802", "name": "Stephen Viller"}]}, {"paperId": "abb35ffaa071e489efae2a106bf0a2f0fb3762d9", "externalIds": {"MAG": "1999494393", "DBLP": "journals/uais/DewsburyRSOB07", - "DOI": "10.1007/s10209-007-0079-7", "CorpusId": 8338616}, "url": "https://www.semanticscholar.org/paper/abb35ffaa071e489efae2a106bf0a2f0fb3762d9", + "DOI": "10.1007/s10209-007-0079-7", "CorpusId": 8338616}, "corpusId": 8338616, + "publicationVenue": {"id": "824ae05b-523b-471a-9469-5ed98ae762cc", "name": + "Universal Access in the Information Society", "type": "journal", "alternate_names": + ["Universal Access in The Information Society", "Univers Access Inf Soc"], + "issn": "1615-5289", "url": "https://rd.springer.com/journal/10209"}, "url": + "https://www.semanticscholar.org/paper/abb35ffaa071e489efae2a106bf0a2f0fb3762d9", "title": "Designing technology with older people", "abstract": null, "venue": "Universal Access in the Information Society", "year": 2007, "referenceCount": 30, "citationCount": 37, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2007-08-17", "journal": - {"volume": "6", "pages": "207-217", "name": "Universal Access in the Information - Society"}, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": - "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. - Sommerville"}, {"authorId": "2652064", "name": "V. Onditi"}, {"authorId": - "15327163", "name": "P. Bagnall"}]}, {"paperId": "dae94638ca3869b733a51b761c7d9a8613133150", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-08-17", "journal": {"volume": "6", "pages": "207-217", "name": "Universal + Access in the Information Society"}, "authors": [{"authorId": "1834798", "name": + "G. Dewsbury"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "2652064", "name": "V. + Onditi"}, {"authorId": "15327163", "name": "P. Bagnall"}]}, {"paperId": "dae94638ca3869b733a51b761c7d9a8613133150", "externalIds": {"DBLP": "conf/fuzzIEEE/OnditiS07", "MAG": "2099470197", "DOI": - "10.1109/FUZZY.2007.4295626", "CorpusId": 28115647}, "url": "https://www.semanticscholar.org/paper/dae94638ca3869b733a51b761c7d9a8613133150", + "10.1109/FUZZY.2007.4295626", "CorpusId": 28115647}, "corpusId": 28115647, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dae94638ca3869b733a51b761c7d9a8613133150", "title": "A Framework for Automatic Reconstruction of a Semi-Structured Rationale from a Minutes Document", "abstract": "This paper discusses Tracker, a framework for meeting management. Many meeting support tools and groupware tools now @@ -11011,23 +12079,25 @@ interactions: what tasks were assigned. We demonstrate how to achieve such an endeavor in this paper.", "venue": "2007 IEEE International Fuzzy Systems Conference", "year": 2007, "referenceCount": 11, "citationCount": 1, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2007-07-23", "journal": {"pages": "1-6", - "name": "2007 IEEE International Fuzzy Systems Conference"}, "authors": [{"authorId": - "2652064", "name": "V. Onditi"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "db64648af3ac4e6af5a9b1b0171b96595ad8f204", "externalIds": {"MAG": - "118762486", "DOI": "10.1007/978-1-84628-626-1_9", "CorpusId": 166912025}, - "url": "https://www.semanticscholar.org/paper/db64648af3ac4e6af5a9b1b0171b96595ad8f204", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2007-07-23", + "journal": {"pages": "1-6", "name": "2007 IEEE International Fuzzy Systems + Conference"}, "authors": [{"authorId": "2652064", "name": "V. Onditi"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "db64648af3ac4e6af5a9b1b0171b96595ad8f204", + "externalIds": {"MAG": "118762486", "DOI": "10.1007/978-1-84628-626-1_9", + "CorpusId": 166912025}, "corpusId": 166912025, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/db64648af3ac4e6af5a9b1b0171b96595ad8f204", "title": "Causal Responsibility Models", "abstract": null, "venue": "", "year": 2007, "referenceCount": 8, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "187-207", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "f5f788c855c1746a470529ac30827df029600ab4", - "externalIds": {"MAG": "203419782", "CorpusId": 8594638}, "url": "https://www.semanticscholar.org/paper/f5f788c855c1746a470529ac30827df029600ab4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "187-207", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "f5f788c855c1746a470529ac30827df029600ab4", + "externalIds": {"MAG": "203419782", "CorpusId": 8594638}, "corpusId": 8594638, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f5f788c855c1746a470529ac30827df029600ab4", "title": "Human, Social and Organisational Influences on the Software Process", "abstract": "This paper discusses some human, social and organisational considerations which affect software processes and the introduction of software process technology. @@ -11037,12 +12107,13 @@ interactions: by national and organisational cultures. In each case, we suggest the implications of these human, social and organisational factors for software process researchers.", "venue": "", "year": 2007, "referenceCount": 32, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "071491e1c453d7ff9da810cbcca37fb7c5bcdb85", - "externalIds": {"CorpusId": 13876520}, "url": "https://www.semanticscholar.org/paper/071491e1c453d7ff9da810cbcca37fb7c5bcdb85", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "071491e1c453d7ff9da810cbcca37fb7c5bcdb85", + "externalIds": {"CorpusId": 13876520}, "corpusId": 13876520, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/071491e1c453d7ff9da810cbcca37fb7c5bcdb85", "title": "Causal Responsibility Models 1 9 Causal Responsibility Models", "abstract": "In previous chapters, we have discussed the ways in which we can model how responsibility can be assigned to agents and how responsibility @@ -11077,12 +12148,12 @@ interactions: for failure. Modelling causal responsibilities, without regard for the agent assigned these responsibilities, is helpful for a number of reasons:", "venue": "", "year": 2006, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "1b42703871c1426c56a441f2ea57f2bd8bc8251f", "externalIds": {"MAG": - "1982332165", "DOI": "10.1109/SOCCER.2006.2", "CorpusId": 15971479}, "url": - "https://www.semanticscholar.org/paper/1b42703871c1426c56a441f2ea57f2bd8bc8251f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "1b42703871c1426c56a441f2ea57f2bd8bc8251f", + "externalIds": {"MAG": "1982332165", "DOI": "10.1109/SOCCER.2006.2", "CorpusId": + 15971479}, "corpusId": 15971479, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1b42703871c1426c56a441f2ea57f2bd8bc8251f", "title": "Disambiguating Availability Specification through the use of OWL", "abstract": "Many Quality of Service (QoS) languages exist. However, not only do few encompass dependability, none acknowledge the semantic complexity of @@ -11095,14 +12166,16 @@ interactions: the semantics of availability.", "venue": "2006 Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER''06 - RE''06 Workshop)", "year": 2006, "referenceCount": 15, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2006-09-12", "journal": {"pages": "5-5", "name": "2006 Service-Oriented Computing: - Consequences for Engineering Requirements (SOCCER''06 - RE''06 Workshop)"}, - "authors": [{"authorId": "33797193", "name": "G. Dobson"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "4530552b113bf425e1e0132cbaced05e86e743d2", - "externalIds": {"MAG": "2102987489", "CorpusId": 9224131}, "url": "https://www.semanticscholar.org/paper/4530552b113bf425e1e0132cbaced05e86e743d2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2006-09-12", "journal": {"pages": + "5-5", "name": "2006 Service-Oriented Computing: Consequences for Engineering + Requirements (SOCCER''06 - RE''06 Workshop)"}, "authors": [{"authorId": "33797193", + "name": "G. Dobson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "4530552b113bf425e1e0132cbaced05e86e743d2", "externalIds": {"MAG": + "2102987489", "CorpusId": 9224131}, "corpusId": 9224131, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4530552b113bf425e1e0132cbaced05e86e743d2", "title": "Dependable Service Engineering: A Fault-tolerance based Approach", "abstract": "This paper is concerned with the engineering of dependable web services. We have developed an approach based on deploying existing web services @@ -11120,39 +12193,42 @@ interactions: of the overheads involved. We conclude that our container-based mechanism provides a simple, low cost approach to enhancing web service dependability.", "venue": "", "year": 2006, "referenceCount": 25, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "2072036054", "name": "S. Hall"}, - {"authorId": "33797193", "name": "G. Dobson"}]}, {"paperId": "4972e6dc3465c18c2a7778248ace2e6af37c743b", - "externalIds": {"MAG": "1525938633", "DBLP": "series/cscw/SommervilleDCR06", - "DOI": "10.1007/1-4020-4258-2_8", "CorpusId": 16946157}, "url": "https://www.semanticscholar.org/paper/4972e6dc3465c18c2a7778248ace2e6af37c743b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2072036054", + "name": "S. Hall"}, {"authorId": "33797193", "name": "G. Dobson"}]}, {"paperId": + "4972e6dc3465c18c2a7778248ace2e6af37c743b", "externalIds": {"MAG": "1525938633", + "DBLP": "series/cscw/SommervilleDCR06", "DOI": "10.1007/1-4020-4258-2_8", + "CorpusId": 16946157}, "corpusId": 16946157, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4972e6dc3465c18c2a7778248ace2e6af37c743b", "title": "Dependability and Trust in Organisational and Domestic Computer Systems", "abstract": null, "venue": "Trust in Technology", "year": 2006, "referenceCount": 27, "citationCount": 14, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Business"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Business", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"pages": "169-193"}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}, {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": - "33388747", "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}]}, - {"paperId": "560d4fc7398582a8dcb58821408556dd53c33397", "externalIds": {"MAG": - "111309166", "DOI": "10.1007/1-84628-365-5_20", "CorpusId": 56565618}, "url": - "https://www.semanticscholar.org/paper/560d4fc7398582a8dcb58821408556dd53c33397", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Business"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Business", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"pages": "169-193"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "1834798", "name": "G. + Dewsbury"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "2089073", + "name": "M. Rouncefield"}]}, {"paperId": "560d4fc7398582a8dcb58821408556dd53c33397", + "externalIds": {"MAG": "111309166", "DOI": "10.1007/1-84628-365-5_20", "CorpusId": + 56565618}, "corpusId": 56565618, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/560d4fc7398582a8dcb58821408556dd53c33397", "title": "Software Co-design with Older People", "abstract": null, "venue": "", "year": 2006, "referenceCount": 18, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "199-208", "name": ""}, "authors": [{"authorId": - "1834798", "name": "G. Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "15327163", "name": "P. Bagnall"}, {"authorId": "2089073", "name": - "M. Rouncefield"}, {"authorId": "2652064", "name": "V. Onditi"}]}, {"paperId": - "5c5c28067907a276ac4a80ee56727eafe9208dd1", "externalIds": {"DBLP": "conf/icsea/ObolerLS06", - "MAG": "1983353345", "DOI": "10.1109/ICSEA.2006.62", "CorpusId": 11936221}, - "url": "https://www.semanticscholar.org/paper/5c5c28067907a276ac4a80ee56727eafe9208dd1", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "199-208", + "name": ""}, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "15327163", "name": "P. + Bagnall"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": + "2652064", "name": "V. Onditi"}]}, {"paperId": "5c5c28067907a276ac4a80ee56727eafe9208dd1", + "externalIds": {"DBLP": "conf/icsea/ObolerLS06", "MAG": "1983353345", "DOI": + "10.1109/ICSEA.2006.62", "CorpusId": 11936221}, "corpusId": 11936221, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5c5c28067907a276ac4a80ee56727eafe9208dd1", "title": "Reflection: Improving Research through Knowledge Transfer", "abstract": "It is through our mental models of the world that we understand it. Advances in science are nothing more than improvements to the model. This paper presents @@ -11161,71 +12237,83 @@ interactions: case studies. We conclude by introducing an approach to help manage and plan research projects.", "venue": "2006 International Conference on Software Engineering Advances (ICSEA''06)", "year": 2006, "referenceCount": 14, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2006-10-29", - "journal": {"pages": "70-70", "name": "2006 International Conference on Software - Engineering Advances (ICSEA''06)"}, "authors": [{"authorId": "1848548", "name": - "Andre Oboler"}, {"authorId": "144611060", "name": "S. Lock"}, {"authorId": + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2006-10-29", "journal": {"pages": "70-70", "name": "2006 International Conference + on Software Engineering Advances (ICSEA''06)"}, "authors": [{"authorId": "1848548", + "name": "Andre Oboler"}, {"authorId": "144611060", "name": "S. Lock"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "5c79197c98da93b221347e29bd2d7237826e0d1b", "externalIds": {"MAG": "2047528855", "DBLP": "journals/eor/MackenziePRSWW06", - "DOI": "10.1016/j.ejor.2004.07.041", "CorpusId": 3768365}, "url": "https://www.semanticscholar.org/paper/5c79197c98da93b221347e29bd2d7237826e0d1b", + "DOI": "10.1016/j.ejor.2004.07.041", "CorpusId": 3768365}, "corpusId": 3768365, + "publicationVenue": {"id": "0acd87e7-c1b4-434a-955a-c26983a4b9f4", "name": + "European Journal of Operational Research", "type": "journal", "alternate_names": + ["Eur J Oper Res"], "issn": "0377-2217", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505543/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/03772217", + "https://www.journals.elsevier.com/european-journal-of-operational-research"]}, + "url": "https://www.semanticscholar.org/paper/5c79197c98da93b221347e29bd2d7237826e0d1b", "title": "Wisdom, decision support and paradigms of decision making", "abstract": null, "venue": "European Journal of Operational Research", "year": 2006, "referenceCount": 39, "citationCount": 87, "influentialCitationCount": 9, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2006-04-01", - "journal": {"volume": "170", "pages": "156-171", "name": "Eur. J. Oper. Res."}, - "authors": [{"authorId": "39822261", "name": "A. Mackenzie"}, {"authorId": - "1761988", "name": "M. Pidd"}, {"authorId": "2609254", "name": "J. Rooksby"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144702663", - "name": "I. Warren"}, {"authorId": "2434299", "name": "M. Westcombe"}]}, {"paperId": - "71cef09ad466e5d114775fa4dcae0ef7396a55de", "externalIds": {"MAG": "574337855", - "DBLP": "series/cscw/2006trust", "DOI": "10.1007/1-4020-4258-2", "CorpusId": - 9268949}, "url": "https://www.semanticscholar.org/paper/71cef09ad466e5d114775fa4dcae0ef7396a55de", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2006-04-01", "journal": {"volume": "170", "pages": "156-171", + "name": "Eur. J. Oper. Res."}, "authors": [{"authorId": "39822261", "name": + "A. Mackenzie"}, {"authorId": "1761988", "name": "M. Pidd"}, {"authorId": + "2609254", "name": "J. Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "144702663", "name": "I. Warren"}, {"authorId": "2434299", "name": + "M. Westcombe"}]}, {"paperId": "71cef09ad466e5d114775fa4dcae0ef7396a55de", + "externalIds": {"MAG": "574337855", "DBLP": "series/cscw/2006trust", "DOI": + "10.1007/1-4020-4258-2", "CorpusId": 9268949}, "corpusId": 9268949, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/71cef09ad466e5d114775fa4dcae0ef7396a55de", "title": "Trust in Technology: A Socio-Technical Perspective", "abstract": null, "venue": "Computer Supported Cooperative Work", "year": 2006, "referenceCount": 7, "citationCount": 42, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "36"}, - "authors": [{"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "1901986", - "name": "G. Hardstone"}, {"authorId": "2089073", "name": "M. Rouncefield"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "73bd3f2deda98cd6b286e3c0876f554fa7de874b", - "externalIds": {"MAG": "201807401", "CorpusId": 60014792}, "url": "https://www.semanticscholar.org/paper/73bd3f2deda98cd6b286e3c0876f554fa7de874b", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-1-4020-4258-4%2F1", + "status": null}, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "36"}, "authors": [{"authorId": "33388747", "name": "K. Clarke"}, + {"authorId": "1901986", "name": "G. Hardstone"}, {"authorId": "2089073", "name": + "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "73bd3f2deda98cd6b286e3c0876f554fa7de874b", "externalIds": {"MAG": "201807401", + "CorpusId": 60014792}, "corpusId": 60014792, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/73bd3f2deda98cd6b286e3c0876f554fa7de874b", "title": "Software Engineering: (Update) (8th Edition) (International Computer Science)", "abstract": null, "venue": "", "year": 2006, "referenceCount": 0, "citationCount": 175, "influentialCitationCount": 21, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-05-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "73e47b65c1351790998f1d83d7195d64b74b0f92", - "externalIds": {"CorpusId": 198925296}, "url": "https://www.semanticscholar.org/paper/73e47b65c1351790998f1d83d7195d64b74b0f92", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2006-05-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "73e47b65c1351790998f1d83d7195d64b74b0f92", + "externalIds": {"CorpusId": 198925296}, "corpusId": 198925296, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/73e47b65c1351790998f1d83d7195d64b74b0f92", "title": "Chapter 20 Software Co-design with Older People", "abstract": null, "venue": "", "year": 2006, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "15327163", - "name": "P. Bagnall"}, {"authorId": "2114738488", "name": "M."}, {"authorId": - "134690430", "name": "Rouncefield"}, {"authorId": "2652064", "name": "V. Onditi"}]}, - {"paperId": "7cac1f4a5e261fb121ff5ea97a8ae83f4786fb43", "externalIds": {"MAG": - "72171092", "DOI": "10.1007/978-3-540-30998-7_6", "CorpusId": 14610782}, "url": - "https://www.semanticscholar.org/paper/7cac1f4a5e261fb121ff5ea97a8ae83f4786fb43", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1834798", + "name": "G. Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "15327163", "name": "P. Bagnall"}, {"authorId": "2114738488", + "name": "M."}, {"authorId": "134690430", "name": "Rouncefield"}, {"authorId": + "2652064", "name": "V. Onditi"}]}, {"paperId": "7cac1f4a5e261fb121ff5ea97a8ae83f4786fb43", + "externalIds": {"MAG": "72171092", "DOI": "10.1007/978-3-540-30998-7_6", "CorpusId": + 14610782}, "corpusId": 14610782, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7cac1f4a5e261fb121ff5ea97a8ae83f4786fb43", "title": "A Hybrid Approach to Upstream Requirements: IBIS and Cognitive Mapping", "abstract": null, "venue": "", "year": 2006, "referenceCount": 38, "citationCount": - 10, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "137-154", "name": ""}, "authors": [{"authorId": "2609254", "name": - "J. Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "1761988", "name": "M. Pidd"}]}, {"paperId": "893ca72ee52b90c1f509d4a8fe33236655a52bd2", - "externalIds": {"CorpusId": 17790978}, "url": "https://www.semanticscholar.org/paper/893ca72ee52b90c1f509d4a8fe33236655a52bd2", + 10, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "137-154", "name": ""}, "authors": [{"authorId": + "2609254", "name": "J. Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "1761988", "name": "M. Pidd"}]}, {"paperId": "893ca72ee52b90c1f509d4a8fe33236655a52bd2", + "externalIds": {"CorpusId": 17790978}, "corpusId": 17790978, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/893ca72ee52b90c1f509d4a8fe33236655a52bd2", "title": "Au th or '' s p er so na l co py Requirement process establishment and improvement from the viewpoint of cybernetics q", "abstract": "As a branch of engineering cybernetics, automatic control theory has been extensively @@ -11242,22 +12330,24 @@ interactions: from process improvements, and structure the application of knowledge about RE. ! 2006 Elsevier Inc. All rights reserved.", "venue": "", "year": 2006, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2146234787", "name": "Hong Xu"}, - {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "a0448e25c9ee654be3bd0fbb84024cd5509c0ec1", - "externalIds": {"MAG": "98714359", "CorpusId": 151276863}, "url": "https://www.semanticscholar.org/paper/a0448e25c9ee654be3bd0fbb84024cd5509c0ec1", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2146234787", + "name": "Hong Xu"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "a0448e25c9ee654be3bd0fbb84024cd5509c0ec1", + "externalIds": {"MAG": "98714359", "CorpusId": 151276863}, "corpusId": 151276863, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0448e25c9ee654be3bd0fbb84024cd5509c0ec1", "title": "Trust in Technology: A Socio-Technical Perspective (Computer Supported Cooperative Work)", "abstract": null, "venue": "", "year": 2006, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - "2006-04-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "33388747", "name": "K. Clarke"}, {"authorId": "1901986", "name": "G. Hardstone"}, - {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "bf654c1d2c73017afa71476cb5fa8ae7570d92be", - "externalIds": {"CorpusId": 8428078}, "url": "https://www.semanticscholar.org/paper/bf654c1d2c73017afa71476cb5fa8ae7570d92be", + "openAccessPdf": null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": + [{"category": "Political Science", "source": "external"}], "publicationTypes": + null, "publicationDate": "2006-04-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "1901986", + "name": "G. Hardstone"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "bf654c1d2c73017afa71476cb5fa8ae7570d92be", + "externalIds": {"CorpusId": 8428078}, "corpusId": 8428078, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bf654c1d2c73017afa71476cb5fa8ae7570d92be", "title": "Models for responsibility assignment 1 8 Models for Responsibility Assignment", "abstract": "Responsibility assignment modelling is concerned with developing a picture of how the responsibilities in a socio-technical @@ -11294,26 +12384,32 @@ interactions: of changes in the people in a system, or because of new responsibilities that emerge as a system is deployed and used. The role of a", "venue": "", "year": 2006, "referenceCount": 4, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "c3d6fe7a418f9f0168302527741923a2044001c0", "externalIds": {"MAG": - "1993516250", "DBLP": "journals/jss/XuSS06", "DOI": "10.1016/j.jss.2006.03.050", - "CorpusId": 41381819}, "url": "https://www.semanticscholar.org/paper/c3d6fe7a418f9f0168302527741923a2044001c0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "c3d6fe7a418f9f0168302527741923a2044001c0", + "externalIds": {"MAG": "1993516250", "DBLP": "journals/jss/XuSS06", "DOI": + "10.1016/j.jss.2006.03.050", "CorpusId": 41381819}, "corpusId": 41381819, + "publicationVenue": {"id": "10a4a695-8417-42c7-983d-742df48b3905", "name": + "Journal of Systems and Software", "type": "journal", "alternate_names": ["J + Syst Softw"], "issn": "0164-1212", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description#description", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description", + "http://www.sciencedirect.com/science/journal/01641212"]}, "url": "https://www.semanticscholar.org/paper/c3d6fe7a418f9f0168302527741923a2044001c0", "title": "Requirement process establishment and improvement from the viewpoint of cybernetics", "abstract": null, "venue": "Journal of Systems and Software", "year": 2006, "referenceCount": 14, "citationCount": 10, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-11-01", "journal": - {"volume": "79", "pages": "1504-1513", "name": "J. Syst. Softw."}, "authors": - [{"authorId": "2146234787", "name": "Hong Xu"}, {"authorId": "144076208", - "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "c737e7f0db9ae9918fea44576b76d00ed0702867", "externalIds": {"MAG": - "2068197404", "DOI": "10.4017/GT.2006.05.01.005.00", "CorpusId": 111057313}, - "url": "https://www.semanticscholar.org/paper/c737e7f0db9ae9918fea44576b76d00ed0702867", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-11-01", "journal": {"volume": "79", "pages": "1504-1513", "name": "J. + Syst. Softw."}, "authors": [{"authorId": "2146234787", "name": "Hong Xu"}, + {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "c737e7f0db9ae9918fea44576b76d00ed0702867", + "externalIds": {"MAG": "2068197404", "DOI": "10.4017/GT.2006.05.01.005.00", + "CorpusId": 111057313}, "corpusId": 111057313, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c737e7f0db9ae9918fea44576b76d00ed0702867", "title": "Older people, technology and design \u2013 a socio-technical approach", "abstract": "This paper presents some empirical data on the design of a technology intended to enrich the lives of older people through facilitating various @@ -11331,62 +12427,71 @@ interactions: understand the changing lives of older people and the relationship between technology and social change.", "venue": "", "year": 2006, "referenceCount": 0, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "5", - "pages": "46-50", "name": "Gerontechnology"}, "authors": [{"authorId": "15327163", - "name": "P. Bagnall"}, {"authorId": "2652064", "name": "V. Onditi"}, {"authorId": - "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "cbcf89782f44187fe8012a1f61fe4e13af14d9cf", "externalIds": - {"DBLP": "series/cscw/ClarkeHMRSVPSH06", "MAG": "997648343", "DOI": "10.1007/1-4020-4258-2_5", - "CorpusId": 46763615}, "url": "https://www.semanticscholar.org/paper/cbcf89782f44187fe8012a1f61fe4e13af14d9cf", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "5", "pages": "46-50", "name": "Gerontechnology"}, "authors": + [{"authorId": "15327163", "name": "P. Bagnall"}, {"authorId": "2652064", "name": + "V. Onditi"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "cbcf89782f44187fe8012a1f61fe4e13af14d9cf", + "externalIds": {"DBLP": "series/cscw/ClarkeHMRSVPSH06", "MAG": "997648343", + "DOI": "10.1007/1-4020-4258-2_5", "CorpusId": 46763615}, "corpusId": 46763615, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cbcf89782f44187fe8012a1f61fe4e13af14d9cf", "title": "''Its About Time'': Temporal Features of Dependability", "abstract": null, "venue": "Trust in Technology", "year": 2006, "referenceCount": 40, "citationCount": 5, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Sociology", "source": "external"}, {"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"pages": "105-121"}, "authors": [{"authorId": "33388747", "name": "K. Clarke"}, - {"authorId": "144426202", "name": "J. Hughes"}, {"authorId": "2116603121", - "name": "David B. Martin"}, {"authorId": "2089073", "name": "M. Rouncefield"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144167254", - "name": "A. Voss"}, {"authorId": "144723413", "name": "R. Procter"}, {"authorId": - "3187653", "name": "R. Slack"}, {"authorId": "3270360", "name": "M. Hartswood"}]}, - {"paperId": "db969310d0bb13a42c36a014cb0f29c9bd3bf39d", "externalIds": {"DBLP": - "series/cscw/0001RS06", "MAG": "158468565", "DOI": "10.1007/1-4020-4258-2_7", - "CorpusId": 27957484}, "url": "https://www.semanticscholar.org/paper/db969310d0bb13a42c36a014cb0f29c9bd3bf39d", + "openAccessPdf": null, "fieldsOfStudy": ["Sociology", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "105-121"}, "authors": [{"authorId": "33388747", + "name": "K. Clarke"}, {"authorId": "144426202", "name": "J. Hughes"}, {"authorId": + "2116603121", "name": "David B. Martin"}, {"authorId": "2089073", "name": + "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "144167254", "name": "A. Voss"}, {"authorId": "144723413", "name": "R. Procter"}, + {"authorId": "3187653", "name": "R. Slack"}, {"authorId": "3270360", "name": + "M. Hartswood"}]}, {"paperId": "db969310d0bb13a42c36a014cb0f29c9bd3bf39d", + "externalIds": {"DBLP": "series/cscw/0001RS06", "MAG": "158468565", "DOI": + "10.1007/1-4020-4258-2_7", "CorpusId": 27957484}, "corpusId": 27957484, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/db969310d0bb13a42c36a014cb0f29c9bd3bf39d", "title": "Patterns for Dependable Design", "abstract": null, "venue": "Trust in Technology", "year": 2006, "referenceCount": 37, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"pages": "147-168"}, "authors": [{"authorId": "2110708818", "name": - "David B. Martin"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "de64b59ab127c79d02fdcf34c0fb8250981915eb", - "externalIds": {"MAG": "2107929588", "DOI": "10.1007/1-84628-111-3_9", "CorpusId": - 15541861}, "url": "https://www.semanticscholar.org/paper/de64b59ab127c79d02fdcf34c0fb8250981915eb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"pages": "147-168"}, "authors": + [{"authorId": "2110708818", "name": "David B. Martin"}, {"authorId": "2089073", + "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "de64b59ab127c79d02fdcf34c0fb8250981915eb", "externalIds": {"MAG": + "2107929588", "DOI": "10.1007/1-84628-111-3_9", "CorpusId": 15541861}, "corpusId": + 15541861, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de64b59ab127c79d02fdcf34c0fb8250981915eb", "title": "Ethnography and the Social Structure of Work", "abstract": null, "venue": "", "year": 2006, "referenceCount": 35, "citationCount": 10, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "169-188", "name": ""}, "authors": [{"authorId": - "2110708818", "name": "David B. Martin"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "f8113057a2f387e379f9a118f6b63209e18a6b92", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "pages": "169-188", + "name": ""}, "authors": [{"authorId": "2110708818", "name": "David B. Martin"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "f8113057a2f387e379f9a118f6b63209e18a6b92", "externalIds": {"MAG": "2171297657", "DBLP": "journals/jsa/WongthongthamCDS06", - "DOI": "10.1016/j.sysarc.2006.06.008", "CorpusId": 6249385}, "url": "https://www.semanticscholar.org/paper/f8113057a2f387e379f9a118f6b63209e18a6b92", + "DOI": "10.1016/j.sysarc.2006.06.008", "CorpusId": 6249385}, "corpusId": 6249385, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f8113057a2f387e379f9a118f6b63209e18a6b92", "title": "Ontology-based multi-site software development methodology and tools", "abstract": null, "venue": "J. Syst. Archit.", "year": 2006, "referenceCount": 26, "citationCount": 54, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-11-01", "journal": {"volume": "52", "pages": "640-653", "name": "J. - Syst. Archit."}, "authors": [{"authorId": "145036570", "name": "P. Wongthongtham"}, - {"authorId": "144556101", "name": "E. Chang"}, {"authorId": "144306547", "name": - "T. Dillon"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "048f0160908da17ca809e97e0896886fe69c12be", "externalIds": {"DBLP": "conf/compsac/XuSS05", - "MAG": "2114099725", "DOI": "10.1109/COMPSAC.2005.129", "CorpusId": 16456911}, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-11-01", "journal": {"volume": "52", "pages": "640-653", + "name": "J. Syst. Archit."}, "authors": [{"authorId": "145036570", "name": + "P. Wongthongtham"}, {"authorId": "144556101", "name": "E. Chang"}, {"authorId": + "144306547", "name": "T. Dillon"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "048f0160908da17ca809e97e0896886fe69c12be", "externalIds": {"DBLP": + "conf/compsac/XuSS05", "MAG": "2114099725", "DOI": "10.1109/COMPSAC.2005.129", + "CorpusId": 16456911}, "corpusId": 16456911, "publicationVenue": {"id": "e574da12-4e4c-4b78-a203-ae3719c0c4f7", + "name": "Annual International Computer Software and Applications Conference", + "type": "conference", "alternate_names": ["Comput Softw Appl Conf", "Annu + Int Comput Softw Appl Conf", "COMPSAC Work", "Computer Software and Applications + Conference", "COMPSAC Workshops", "COMPSAC"], "url": "http://www.wikicfp.com/cfp/program?id=548"}, "url": "https://www.semanticscholar.org/paper/048f0160908da17ca809e97e0896886fe69c12be", "title": "Requirement process establishment and improvement: from the viewpoint of cybernetics", "abstract": "As a branch of engineering cybernetics, automatic @@ -11404,26 +12509,28 @@ interactions: and structure the application of knowledge about RE.", "venue": "Annual International Computer Software and Applications Conference", "year": 2005, "referenceCount": 19, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2005-07-26", "journal": - {"volume": "2", "pages": "89-92 Vol. 1", "name": "29th Annual International + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-07-26", + "journal": {"volume": "2", "pages": "89-92 Vol. 1", "name": "29th Annual International Computer Software and Applications Conference (COMPSAC''05)"}, "authors": [{"authorId": "2146234787", "name": "Hong Xu"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "115875d35933290e687fb2809fc6302ce39d40f9", "externalIds": {"MAG": - "210287362", "CorpusId": 107629206}, "url": "https://www.semanticscholar.org/paper/115875d35933290e687fb2809fc6302ce39d40f9", + "210287362", "CorpusId": 107629206}, "corpusId": 107629206, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/115875d35933290e687fb2809fc6302ce39d40f9", "title": "An Industrial Experiment in Requirements Engineering Process Assessment and Improvement", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "2059904506", "name": "J. Ransom"}]}, - {"paperId": "17111754a179cb67e88885c5a54f5f1e0290faaa", "externalIds": {"DBLP": - "conf/dexaw/X05a", "DOI": "10.1109/DEXA.2005.157", "CorpusId": 32212280}, - "url": "https://www.semanticscholar.org/paper/17111754a179cb67e88885c5a54f5f1e0290faaa", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2059904506", + "name": "J. Ransom"}]}, {"paperId": "17111754a179cb67e88885c5a54f5f1e0290faaa", + "externalIds": {"DBLP": "conf/dexaw/X05a", "DOI": "10.1109/DEXA.2005.157", + "CorpusId": 32212280}, "corpusId": 32212280, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/17111754a179cb67e88885c5a54f5f1e0290faaa", "title": "Program Committee", "abstract": "Yamine Ait Ameur, ENSMA, France Simone Barbosa, Pontificia Universidade Catolica do Rio de Janeiro, Brazil Phil Brooke, University of Teesside, United Kingdom Michael Butler, University @@ -11451,13 +12558,14 @@ interactions: M\u00e4lardalen University, Sweden Janet Smart, University of Oxford, United Kingdom Oleg Sokolsky, University of Pennsylvania, USA", "venue": "DEXA Workshops", "year": 2005, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "2157279694", "name": "Jing Sun"}, {"authorId": "145454863", - "name": "S. Zschaler"}]}, {"paperId": "3660ce7dabf8c25d0b6ba4308a1ad0f9bfad371f", - "externalIds": {"MAG": "1568797577", "CorpusId": 17062456}, "url": "https://www.semanticscholar.org/paper/3660ce7dabf8c25d0b6ba4308a1ad0f9bfad371f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "2157279694", "name": "Jing + Sun"}, {"authorId": "145454863", "name": "S. Zschaler"}]}, {"paperId": "3660ce7dabf8c25d0b6ba4308a1ad0f9bfad371f", + "externalIds": {"MAG": "1568797577", "CorpusId": 17062456}, "corpusId": 17062456, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3660ce7dabf8c25d0b6ba4308a1ad0f9bfad371f", "title": "QoSOnt: An Ontology for QoS in Service Centric Systems", "abstract": "This paper presents QoSOnt: an ontology for Quality of Service (QoS). Particular focus is given to\nits application in the field of service-centric systems. @@ -11468,22 +12576,25 @@ interactions: SQRM\n(Service QoS Requirements Matcher), an application making use of QoSOnt, is also discussed to\ndemonstrate these advantages.", "venue": "", "year": 2005, "referenceCount": 15, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "33797193", - "name": "G. Dobson"}, {"authorId": "10371705", "name": "R. Lock"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "4727c5cc2e0db94aac4e0f32dac3ad73eaccbe50", - "externalIds": {"MAG": "906809260", "CorpusId": 60236032}, "url": "https://www.semanticscholar.org/paper/4727c5cc2e0db94aac4e0f32dac3ad73eaccbe50", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "33797193", "name": "G. Dobson"}, {"authorId": + "10371705", "name": "R. Lock"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "4727c5cc2e0db94aac4e0f32dac3ad73eaccbe50", "externalIds": {"MAG": + "906809260", "CorpusId": 60236032}, "corpusId": 60236032, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4727c5cc2e0db94aac4e0f32dac3ad73eaccbe50", "title": "Reference Architectures for P2P Applications", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "2334381", "name": "J. Walkerdine"}, {"authorId": "2775878", - "name": "L. Melville"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "5a4cbd0cf08d32646ecbf0d162c9f2c43439d3ee", "externalIds": {"MAG": - "80243538", "CorpusId": 59787642}, "url": "https://www.semanticscholar.org/paper/5a4cbd0cf08d32646ecbf0d162c9f2c43439d3ee", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "2334381", "name": "J. + Walkerdine"}, {"authorId": "2775878", "name": "L. Melville"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "5a4cbd0cf08d32646ecbf0d162c9f2c43439d3ee", + "externalIds": {"MAG": "80243538", "CorpusId": 59787642}, "corpusId": 59787642, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a4cbd0cf08d32646ecbf0d162c9f2c43439d3ee", "title": "The Limits of Personas", "abstract": "While personas are effective for workplace systems design, they are less useful when designing for vulnerable users, due to problems with gaining sufficient understanding of the target @@ -11492,43 +12603,50 @@ interactions: benefit from them. Problems also arise designing for populations with impairments, since this implies multiple interfaces, which increases the number of personas required.", "venue": "", "year": 2005, "referenceCount": 5, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2005-03-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "15327163", "name": "P. Bagnall"}, - {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "6200e0c714dbc467103512e8e87fea3bd8f13166", - "externalIds": {"CorpusId": 3803221}, "url": "https://www.semanticscholar.org/paper/6200e0c714dbc467103512e8e87fea3bd8f13166", + 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-03-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "15327163", + "name": "P. Bagnall"}, {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "6200e0c714dbc467103512e8e87fea3bd8f13166", + "externalIds": {"CorpusId": 3803221}, "corpusId": 3803221, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6200e0c714dbc467103512e8e87fea3bd8f13166", "title": "9 : Ethnography and the social structure of work", "abstract": null, "venue": "", "year": 2005, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2110708818", "name": "David - B. Martin"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "6448534fef279dd934c49ddb8dd39b0c162d1019", "externalIds": {"MAG": "1560106164", - "CorpusId": 60936794}, "url": "https://www.semanticscholar.org/paper/6448534fef279dd934c49ddb8dd39b0c162d1019", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2110708818", + "name": "David B. Martin"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "6448534fef279dd934c49ddb8dd39b0c162d1019", "externalIds": {"MAG": + "1560106164", "CorpusId": 60936794}, "corpusId": 60936794, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6448534fef279dd934c49ddb8dd39b0c162d1019", "title": "Faceted Service Specification", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-08-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "144076208", - "name": "P. Sawyer"}, {"authorId": "3447210", "name": "J. Hutchinson"}, {"authorId": - "2334381", "name": "J. Walkerdine"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "6c2c0c362df214522b1706c135e030e6fb0e32e4", "externalIds": {"CorpusId": - 14951518}, "url": "https://www.semanticscholar.org/paper/6c2c0c362df214522b1706c135e030e6fb0e32e4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2005-08-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "3447210", + "name": "J. Hutchinson"}, {"authorId": "2334381", "name": "J. Walkerdine"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "6c2c0c362df214522b1706c135e030e6fb0e32e4", + "externalIds": {"CorpusId": 14951518}, "corpusId": 14951518, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6c2c0c362df214522b1706c135e030e6fb0e32e4", "title": "Glen Dobson : 2 nd Year PhD Report", "abstract": "Since my first year PhD report I have been involved in the creation of an ontology for QoS in Service-Centric Systems. This report details the development of this ontology and my plans for future PhD research in this area.", "venue": "", "year": 2005, "referenceCount": 21, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2103903847", "name": "Lancaster"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "6e3f1e08a3fc3441ee54376fa7f09f9594cf488a", - "externalIds": {"MAG": "2095961905", "DBLP": "journals/software/Sommerville05", - "DOI": "10.1109/MS.2005.13", "CorpusId": 14099303}, "url": "https://www.semanticscholar.org/paper/6e3f1e08a3fc3441ee54376fa7f09f9594cf488a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2103903847", + "name": "Lancaster"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "6e3f1e08a3fc3441ee54376fa7f09f9594cf488a", "externalIds": {"MAG": + "2095961905", "DBLP": "journals/software/Sommerville05", "DOI": "10.1109/MS.2005.13", + "CorpusId": 14099303}, "corpusId": 14099303, "publicationVenue": {"id": "119227a6-1b94-433e-a52d-8445a387dbbe", + "name": "IEEE Software", "type": "journal", "alternate_names": ["IEEE Softw"], + "issn": "0740-7459", "url": "http://www.computer.org/software", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=52"]}, "url": "https://www.semanticscholar.org/paper/6e3f1e08a3fc3441ee54376fa7f09f9594cf488a", "title": "Integrated requirements engineering: a tutorial", "abstract": "This short tutorial introduces the fundamental activities of RE (requirements engineering) and discusses how it has evolved as a part of the software engineering process. @@ -11538,14 +12656,15 @@ interactions: helps us to meet these challenges by integrating RE more closely with other systems implementation activities.", "venue": "IEEE Software", "year": 2005, "referenceCount": 14, "citationCount": 189, "influentialCitationCount": 19, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - null, "journal": {"volume": "22", "pages": "16-23", "name": "IEEE Software"}, - "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "746771e7f7f9070829c90d4a786d425c3c2dd82a", "externalIds": {"MAG": "1883510854", - "CorpusId": 2651169}, "url": "https://www.semanticscholar.org/paper/746771e7f7f9070829c90d4a786d425c3c2dd82a", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": null, "journal": {"volume": "22", "pages": "16-23", + "name": "IEEE Software"}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "746771e7f7f9070829c90d4a786d425c3c2dd82a", "externalIds": + {"MAG": "1883510854", "CorpusId": 2651169}, "corpusId": 2651169, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/746771e7f7f9070829c90d4a786d425c3c2dd82a", "title": "Quality of Service Requirement Specification using an Ontology", "abstract": "This paper describes an approach to specifying the QoS requirements of service-centric systems using an ontology for Quality of Service. A requirements @@ -11555,14 +12674,19 @@ interactions: the user in constructing requirements, and applies a degree of intelligence in the matching process, demonstrates the advantages of the underlying ontology.", "venue": "", "year": 2005, "referenceCount": 15, "citationCount": 37, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "10371705", - "name": "R. Lock"}, {"authorId": "33797193", "name": "G. Dobson"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "8a1926443e8647d1b7994dae2330035665b25db3", - "externalIds": {"MAG": "1757272163", "DBLP": "conf/euromicro/DobsonLS05", - "DOI": "10.1109/EURMIC.2005.50", "CorpusId": 9215031}, "url": "https://www.semanticscholar.org/paper/8a1926443e8647d1b7994dae2330035665b25db3", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "10371705", "name": "R. Lock"}, {"authorId": + "33797193", "name": "G. Dobson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "8a1926443e8647d1b7994dae2330035665b25db3", "externalIds": {"MAG": + "1757272163", "DBLP": "conf/euromicro/DobsonLS05", "DOI": "10.1109/EURMIC.2005.50", + "CorpusId": 9215031}, "corpusId": 9215031, "publicationVenue": {"id": "73df6053-f5c6-46a6-aefc-8a109c2edd9d", + "name": "EUROMICRO Conference on Software Engineering and Advanced Applications", + "type": "conference", "alternate_names": ["EUROMICRO Conf Softw Eng Adv Appl", + "SEAA", "Softw Eng Adv Appl", "Software Engineering and Advanced Applications"], + "url": "http://www.euromicro.org/"}, "url": "https://www.semanticscholar.org/paper/8a1926443e8647d1b7994dae2330035665b25db3", "title": "QoSOnt: a QoS ontology for service-centric systems", "abstract": "This paper reports on the development of QoSOnt: an ontology for quality of service (QoS). Particular focus is given to its application in the field @@ -11575,16 +12699,21 @@ interactions: of QoS specifications which can be achieved.", "venue": "EUROMICRO Conference on Software Engineering and Advanced Applications", "year": 2005, "referenceCount": 17, "citationCount": 207, "influentialCitationCount": 14, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2005-08-30", "journal": {"pages": "80-87", "name": "31st - EUROMICRO Conference on Software Engineering and Advanced Applications"}, + true, "openAccessPdf": {"url": "http://staff.cs.upt.ro/%7Eioana/fuzzy_services/dobson2005.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2005-08-30", "journal": {"pages": "80-87", + "name": "31st EUROMICRO Conference on Software Engineering and Advanced Applications"}, "authors": [{"authorId": "33797193", "name": "G. Dobson"}, {"authorId": "10371705", "name": "R. Lock"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "b1b25d0dda085aa761158127b9129749ffe1207c", "externalIds": {"DBLP": "conf/re/ChitchyanSR05", - "MAG": "2117766469", "DOI": "10.1109/RE.2005.15", "CorpusId": 6285484}, "url": - "https://www.semanticscholar.org/paper/b1b25d0dda085aa761158127b9129749ffe1207c", + "MAG": "2117766469", "DOI": "10.1109/RE.2005.15", "CorpusId": 6285484}, "corpusId": + 6285484, "publicationVenue": {"id": "647e2b25-1bff-4e4f-b507-e21dcb081788", + "name": "IEEE International Requirements Engineering Conference", "type": + "conference", "alternate_names": ["IEEE International Conference on Requirements + Engineering", "RE", "IEEE Int Requir Eng Conf", "IEEE Int Conf Requir Eng"], + "url": "http://requirements-engineering.org/"}, "url": "https://www.semanticscholar.org/paper/b1b25d0dda085aa761158127b9129749ffe1207c", "title": "CoCA: a composition-centric approach to requirements engineering", "abstract": "In this paper, we discuss how mutual influences (e.g. conflicts) of different stakeholder concerns can be detected and reasoned about through @@ -11592,26 +12721,29 @@ interactions: software development paradigm are used to support the composition-centric approach.", "venue": "IEEE International Requirements Engineering Conference", "year": 2005, "referenceCount": 6, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2005-08-29", "journal": {"pages": "475-476", - "name": "13th IEEE International Conference on Requirements Engineering (RE''05)"}, - "authors": [{"authorId": "1951201", "name": "R. Chitchyan"}, {"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "144450942", "name": "A. - Rashid"}]}, {"paperId": "b2c95371cecfb787a9a08c023e78bdf46958b70e", "externalIds": - {"MAG": "2519250085", "CorpusId": 113602313}, "url": "https://www.semanticscholar.org/paper/b2c95371cecfb787a9a08c023e78bdf46958b70e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-08-29", + "journal": {"pages": "475-476", "name": "13th IEEE International Conference + on Requirements Engineering (RE''05)"}, "authors": [{"authorId": "1951201", + "name": "R. Chitchyan"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "144450942", "name": "A. Rashid"}]}, {"paperId": "b2c95371cecfb787a9a08c023e78bdf46958b70e", + "externalIds": {"MAG": "2519250085", "CorpusId": 113602313}, "corpusId": 113602313, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b2c95371cecfb787a9a08c023e78bdf46958b70e", "title": "Integrated requirements engineering: A tutorial : Requirements for design and innovation in a changing world", "abstract": "This tutorial introduces the fundamental activities of requirements engineering and discusses recent developments that integrate It and system implementation.", "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "22", "pages": "16-23", "name": ""}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "b3d82be729c763865ebf1f96954f680c85f5386c", - "externalIds": {"MAG": "97788789", "CorpusId": 16198302}, "url": "https://www.semanticscholar.org/paper/b3d82be729c763865ebf1f96954f680c85f5386c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": {"volume": "22", "pages": "16-23", "name": + ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "b3d82be729c763865ebf1f96954f680c85f5386c", "externalIds": {"MAG": "97788789", + "CorpusId": 16198302}, "corpusId": 16198302, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b3d82be729c763865ebf1f96954f680c85f5386c", "title": "Addressing the contract issue, standardisation for QoS", "abstract": "Higher level service support mechanisms are an integral part of the future vision for Web / Grid Services. This paper argues that the areas of discovery, @@ -11626,14 +12758,16 @@ interactions: and secondly, TRANSACT, an existing contract negotiation tool designed to provide end-to-end contracting, encompassing an automated negotiation engine.", "venue": "", "year": 2005, "referenceCount": 15, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "10371705", - "name": "R. Lock"}, {"authorId": "33797193", "name": "G. Dobson"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "b7516a058fb5320061f00af30b03a96284568c0f", - "externalIds": {"MAG": "2069736537", "DBLP": "conf/icsm/Sommerville05", "DOI": - "10.1109/ICSM.2005.81", "CorpusId": 206856089}, "url": "https://www.semanticscholar.org/paper/b7516a058fb5320061f00af30b03a96284568c0f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "10371705", "name": "R. Lock"}, {"authorId": + "33797193", "name": "G. Dobson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "b7516a058fb5320061f00af30b03a96284568c0f", "externalIds": {"MAG": + "2069736537", "DBLP": "conf/icsm/Sommerville05", "DOI": "10.1109/ICSM.2005.81", + "CorpusId": 206856089}, "corpusId": 206856089, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b7516a058fb5320061f00af30b03a96284568c0f", "title": "Software Construction by Configuration: Challenges for Software Engineering Research", "abstract": "In this article the author discusses the problems of software construction by configuration and explains why this is @@ -11647,70 +12781,84 @@ interactions: concludes by setting out a research agenda that allows the research community to play an active part in addressing the 21st century software engineering problems.", "venue": "ICSM", "year": 2005, "referenceCount": 0, "citationCount": - 16, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-09-25", - "journal": {"pages": "9"}, "authors": [{"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "be084cbefcbc3fd6c7df9ab4eeb359f50ebc8d7e", "externalIds": - {"MAG": "110428034", "CorpusId": 59675693}, "url": "https://www.semanticscholar.org/paper/be084cbefcbc3fd6c7df9ab4eeb359f50ebc8d7e", + 16, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2005-09-25", "journal": {"pages": "9"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "be084cbefcbc3fd6c7df9ab4eeb359f50ebc8d7e", + "externalIds": {"MAG": "110428034", "CorpusId": 59675693}, "corpusId": 59675693, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/be084cbefcbc3fd6c7df9ab4eeb359f50ebc8d7e", "title": "A Reference Model for an e-Exchange", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "74499029", "name": "N. Perwaiz"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "beb238036269a424645a55c43cd0dc04966233b8", - "externalIds": {"DBLP": "journals/ctw/Ramduny-EllisDROSR05", "MAG": "2095359872", - "DOI": "10.1007/s10111-005-0179-1", "CorpusId": 11636777}, "url": "https://www.semanticscholar.org/paper/beb238036269a424645a55c43cd0dc04966233b8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "74499029", "name": "N. + Perwaiz"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "beb238036269a424645a55c43cd0dc04966233b8", "externalIds": {"DBLP": "journals/ctw/Ramduny-EllisDROSR05", + "MAG": "2095359872", "DOI": "10.1007/s10111-005-0179-1", "CorpusId": 11636777}, + "corpusId": 11636777, "publicationVenue": {"id": "a56c1b69-aeb1-4375-8bac-c3cff801ee32", + "name": "Cognition, Technology & Work", "type": "journal", "alternate_names": + ["Cogn Technol Work"], "issn": "1435-5558", "url": "https://link.springer.com/journal/10111"}, + "url": "https://www.semanticscholar.org/paper/beb238036269a424645a55c43cd0dc04966233b8", "title": "Artefacts as designed, artefacts as used: resources for uncovering activity dynamics", "abstract": null, "venue": "Cognition, Technology & Work", "year": 2005, "referenceCount": 45, "citationCount": 37, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Sociology", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2005-07-01", "journal": - {"volume": "7", "pages": "76-87", "name": "Cognition, Technology & Work"}, - "authors": [{"authorId": "1399467264", "name": "D. Ramduny-Ellis"}, {"authorId": - "144978737", "name": "A. Dix"}, {"authorId": "1929390", "name": "Paul Rayson"}, - {"authorId": "2652064", "name": "V. Onditi"}, {"authorId": "1711844", "name": - "I. Sommerville"}, {"authorId": "2059904506", "name": "J. Ransom"}]}, {"paperId": - "c9116ce4005309315cd451e222892206c91c09c7", "externalIds": {"MAG": "320768275", - "CorpusId": 60179512}, "url": "https://www.semanticscholar.org/paper/c9116ce4005309315cd451e222892206c91c09c7", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2005-07-01", "journal": {"volume": "7", "pages": "76-87", "name": "Cognition, + Technology & Work"}, "authors": [{"authorId": "1399467264", "name": "D. Ramduny-Ellis"}, + {"authorId": "144978737", "name": "A. Dix"}, {"authorId": "1929390", "name": + "Paul Rayson"}, {"authorId": "2652064", "name": "V. Onditi"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "2059904506", "name": "J. + Ransom"}]}, {"paperId": "c9116ce4005309315cd451e222892206c91c09c7", "externalIds": + {"MAG": "320768275", "CorpusId": 60179512}, "corpusId": 60179512, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c9116ce4005309315cd451e222892206c91c09c7", "title": "Managing the Risks of Electronic Assistive Technology: Two complementary methods", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2005-03-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144817554", - "name": "G. Baxter"}, {"authorId": "1722530", "name": "A. Monk"}]}, {"paperId": - "cb87420bdde0c16b90203a54ac3806b56d00a6ad", "externalIds": {"DBLP": "conf/xpu/Sommerville05", - "MAG": "1495261823", "DOI": "10.1007/11499053_23", "CorpusId": 34336674}, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-03-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", + "name": "G. Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "144817554", "name": "G. Baxter"}, {"authorId": "1722530", "name": + "A. Monk"}]}, {"paperId": "cb87420bdde0c16b90203a54ac3806b56d00a6ad", "externalIds": + {"DBLP": "conf/xpu/Sommerville05", "MAG": "1495261823", "DOI": "10.1007/11499053_23", + "CorpusId": 34336674}, "corpusId": 34336674, "publicationVenue": {"id": "75ef5c3a-ff34-47cf-bfce-93c95be12dbc", + "name": "International Conference on Agile Software Development", "type": + "conference", "alternate_names": ["ICASD", "XP", "Int Conf Agil Softw Dev", + "Agile Processes in Software Engineering and Extreme Programming", "XP Work + Database Theory", "Agil Process Softw Eng Extreme Program", "XP Workshops + on Database Theory"], "url": "https://www.agilealliance.org/events/past-conferences/"}, "url": "https://www.semanticscholar.org/paper/cb87420bdde0c16b90203a54ac3806b56d00a6ad", "title": "Extreme Programming for Critical Systems?", "abstract": null, "venue": "International Conference on Agile Software Development", "year": 2005, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-06-18", "journal": {"pages": "198"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "cc3977e0e1bab620fa6d248942d16797363f012e", - "externalIds": {"MAG": "1585796736", "CorpusId": 117807775}, "url": "https://www.semanticscholar.org/paper/cc3977e0e1bab620fa6d248942d16797363f012e", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-06-18", "journal": {"pages": "198"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "cc3977e0e1bab620fa6d248942d16797363f012e", + "externalIds": {"MAG": "1585796736", "CorpusId": 117807775}, "corpusId": 117807775, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc3977e0e1bab620fa6d248942d16797363f012e", "title": "Decision Support and paradigms of Decision Making", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 13, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "2005-04-01", "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "39822261", "name": "A. - Mackenzie"}, {"authorId": "2609254", "name": "J. Rooksby"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "144702663", "name": "I. Warren"}, - {"authorId": "103187954", "name": "P. Pidd"}, {"authorId": "2434299", "name": - "M. Westcombe"}]}, {"paperId": "cc626990eb34b8a260ac50ef50ab571e296fca9d", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "2005-04-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "39822261", "name": "A. Mackenzie"}, {"authorId": "2609254", "name": "J. Rooksby"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144702663", + "name": "I. Warren"}, {"authorId": "103187954", "name": "P. Pidd"}, {"authorId": + "2434299", "name": "M. Westcombe"}]}, {"paperId": "cc626990eb34b8a260ac50ef50ab571e296fca9d", "externalIds": {"MAG": "1576198215", "DBLP": "conf/iastedSE/WongthongthamCDS05", - "CorpusId": 11355184}, "url": "https://www.semanticscholar.org/paper/cc626990eb34b8a260ac50ef50ab571e296fca9d", + "CorpusId": 11355184}, "corpusId": 11355184, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cc626990eb34b8a260ac50ef50ab571e296fca9d", "title": "Software Engineering Ontologies and Their Implementation", "abstract": "In this paper, we propose a new approach to software engineering. We organize software engineering concepts, ideas and knowledge along with software development @@ -11722,14 +12870,15 @@ interactions: developers. Furthermore, the ontology form can be understood by computers.", "venue": "IASTED Conf. on Software Engineering", "year": 2005, "referenceCount": 15, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "208-213"}, "authors": [{"authorId": "145036570", - "name": "P. Wongthongtham"}, {"authorId": "144556101", "name": "E. Chang"}, - {"authorId": "144306547", "name": "T. Dillon"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "ebfab0e405a96f2d9cee3c5cc1e87aa623cfbd22", - "externalIds": {"MAG": "1509247746", "CorpusId": 73519835}, "url": "https://www.semanticscholar.org/paper/ebfab0e405a96f2d9cee3c5cc1e87aa623cfbd22", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "208-213"}, "authors": [{"authorId": + "145036570", "name": "P. Wongthongtham"}, {"authorId": "144556101", "name": + "E. Chang"}, {"authorId": "144306547", "name": "T. Dillon"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "ebfab0e405a96f2d9cee3c5cc1e87aa623cfbd22", + "externalIds": {"MAG": "1509247746", "CorpusId": 73519835}, "corpusId": 73519835, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ebfab0e405a96f2d9cee3c5cc1e87aa623cfbd22", "title": "Designing Technology with and for Older People", "abstract": "The constant emphasis on users views in the design process means older people are consulted about their views, but this is often as a \u2018last resort\u2019. @@ -11746,14 +12895,15 @@ interactions: The paper concludes that the differences between the two methods and processes resulted in marked differences in the finished systems and their uptake.", "venue": "", "year": 2005, "referenceCount": 7, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2005-09-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1834798", "name": "G. Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "15327163", - "name": "P. Bagnall"}]}, {"paperId": "f854902e7cd30382c5d5fc961e3b3e0a3f017814", - "externalIds": {"CorpusId": 17103284}, "url": "https://www.semanticscholar.org/paper/f854902e7cd30382c5d5fc961e3b3e0a3f017814", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2005-09-01", "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": + "15327163", "name": "P. Bagnall"}]}, {"paperId": "f854902e7cd30382c5d5fc961e3b3e0a3f017814", + "externalIds": {"CorpusId": 17103284}, "corpusId": 17103284, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f854902e7cd30382c5d5fc961e3b3e0a3f017814", "title": "ROLES ARE RESPONSIBILITY RELATIONSHIPS REALLY", "abstract": "Many approaches to role-based information systems assume that a role definition is one-sided, in that it applies to an individual person or single organisational @@ -11768,13 +12918,14 @@ interactions: helping us understand responsibility relationships as they exist in practice and illustrate the complexity of responsibilities using examples drawn from ethnographic studies.", "venue": "", "year": 2005, "referenceCount": 11, "citationCount": - 7, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1769028", "name": "J. Dobson"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "fa800ea0b75e2069b90c7ae7b889dac51a0dd490", + 7, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1769028", "name": "J. Dobson"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "fa800ea0b75e2069b90c7ae7b889dac51a0dd490", "externalIds": {"DBLP": "journals/tosem/SommervilleR05", "MAG": "2048976958", - "DOI": "10.1145/1044834.1044837", "CorpusId": 124979}, "url": "https://www.semanticscholar.org/paper/fa800ea0b75e2069b90c7ae7b889dac51a0dd490", + "DOI": "10.1145/1044834.1044837", "CorpusId": 124979}, "corpusId": 124979, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fa800ea0b75e2069b90c7ae7b889dac51a0dd490", "title": "An empirical study of industrial requirements engineering process assessment and improvement", "abstract": "This article describes an empirical study in industry of requirements engineering process maturity assessment @@ -11795,22 +12946,25 @@ interactions: process or whether these benefits resulted from side-effects of the study such as greater self-awareness of business processes remains an open question.", "venue": "TSEM", "year": 2005, "referenceCount": 26, "citationCount": 193, - "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"volume": "14", "pages": - "85-117", "name": "ACM Trans. Softw. Eng. Methodol."}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "2059904506", "name": "J. - Ransom"}]}, {"paperId": "ff538375e1070b8cb7c2618642660bf5aa1f1958", "externalIds": - {"MAG": "2529763856", "CorpusId": 64220254}, "url": "https://www.semanticscholar.org/paper/ff538375e1070b8cb7c2618642660bf5aa1f1958", + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"volume": "14", "pages": "85-117", "name": "ACM Trans. Softw. Eng. Methodol."}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "2059904506", "name": "J. Ransom"}]}, {"paperId": "ff538375e1070b8cb7c2618642660bf5aa1f1958", + "externalIds": {"MAG": "2529763856", "CorpusId": 64220254}, "corpusId": 64220254, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ff538375e1070b8cb7c2618642660bf5aa1f1958", "title": "Ingenieria Del Software", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 275, "influentialCitationCount": - 15, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2864026", - "name": "Mar\u00eda Isabel Alfonso Galipienso"}]}, {"paperId": "00ca16b7a7ebaf21a21eaeb0f89e7bd32ef9a45d", - "externalIds": {"MAG": "107862512", "CorpusId": 59818673}, "url": "https://www.semanticscholar.org/paper/00ca16b7a7ebaf21a21eaeb0f89e7bd32ef9a45d", + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}, {"authorId": "2864026", "name": "Mar\u00eda Isabel Alfonso + Galipienso"}]}, {"paperId": "00ca16b7a7ebaf21a21eaeb0f89e7bd32ef9a45d", "externalIds": + {"MAG": "107862512", "CorpusId": 59818673}, "corpusId": 59818673, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/00ca16b7a7ebaf21a21eaeb0f89e7bd32ef9a45d", "title": "CATS: Assisting Older People Obtain Appropriate Technology Support", "abstract": "In this paper, we describe the development of a checklist that is in development that can be used to assist older people determine the efficacy @@ -11819,13 +12973,14 @@ interactions: of technological acceleration making it impossible to keep abreast of latest developments that might be useful to supporting older people at home.", "venue": "", "year": 2004, "referenceCount": 6, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", - "name": "G. Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "04c7d4f854526c6c5496680ddff4e3a95d381578", "externalIds": {"MAG": - "106964056", "CorpusId": 59744948}, "url": "https://www.semanticscholar.org/paper/04c7d4f854526c6c5496680ddff4e3a95d381578", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2004-09-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "04c7d4f854526c6c5496680ddff4e3a95d381578", + "externalIds": {"MAG": "106964056", "CorpusId": 59744948}, "corpusId": 59744948, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/04c7d4f854526c6c5496680ddff4e3a95d381578", "title": "Problem Solving Dialogue: Cognitive Mapping And IBIS", "abstract": "Cognitive mapping, as used within Strategic Options Development and Analysis (SODA), and Issuebased Information Systems (IBIS), as used in Dialog Mapping @@ -11837,14 +12992,15 @@ interactions: practice, taken separately or in combination, and issues relevant to the choice of approach are discussed.", "venue": "", "year": 2004, "referenceCount": 46, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "1761988", "name": "M. Pidd"}, {"authorId": - "39822261", "name": "A. Mackenzie"}, {"authorId": "144702663", "name": "I. - Warren"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "0f319b0db05d0de21f24334b7fd11f50672045c5", "externalIds": {"MAG": "2116170207", - "DOI": "10.1080/0267303042000249224", "CorpusId": 154997400}, "url": "https://www.semanticscholar.org/paper/0f319b0db05d0de21f24334b7fd11f50672045c5", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1761988", + "name": "M. Pidd"}, {"authorId": "39822261", "name": "A. Mackenzie"}, {"authorId": + "144702663", "name": "I. Warren"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "0f319b0db05d0de21f24334b7fd11f50672045c5", "externalIds": {"MAG": + "2116170207", "DOI": "10.1080/0267303042000249224", "CorpusId": 154997400}, + "corpusId": 154997400, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f319b0db05d0de21f24334b7fd11f50672045c5", "title": "Depending on digital design: extending inclusivity", "abstract": "This paper documents work from the EPSRC \u2018EQUATOR\u2019 and Dependability Interdisciplinary Research Collaboration on Computer Based Systems (DIRC) @@ -11875,15 +13031,16 @@ interactions: The paper discusses how such information might feed into dependable design through consideration of a model of dependability.", "venue": "", "year": 2004, "referenceCount": 56, "citationCount": 48, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-09-01", "journal": {"volume": "19", "pages": "811 - 825", "name": "Housing - Studies"}, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": - "2089073", "name": "M. Rouncefield"}, {"authorId": "33388747", "name": "K. - Clarke"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "13a3a61d2bdc3542ac6b87338ddc395c4569880a", "externalIds": {"MAG": "2011653864", - "DOI": "10.1049/IC:20040500", "CorpusId": 14932177}, "url": "https://www.semanticscholar.org/paper/13a3a61d2bdc3542ac6b87338ddc395c4569880a", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-09-01", "journal": {"volume": + "19", "pages": "811 - 825", "name": "Housing Studies"}, "authors": [{"authorId": + "1834798", "name": "G. Dewsbury"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "13a3a61d2bdc3542ac6b87338ddc395c4569880a", + "externalIds": {"MAG": "2011653864", "DOI": "10.1049/IC:20040500", "CorpusId": + 14932177}, "corpusId": 14932177, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13a3a61d2bdc3542ac6b87338ddc395c4569880a", "title": "Dependability within Peer-to-Peer Systems", "abstract": "There is an increasing interest in using Peer-to-Peer (P2P) architectures as a basis for software systems. However, by their very nature, achieving dependability @@ -12015,26 +13172,30 @@ interactions: it is important to cater for a peer\u2019s intermittent connectivity and not assume that a peer will always be co", "venue": "ICSE 2004", "year": 2004, "referenceCount": 9, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-05-01", - "journal": {"volume": "", "pages": "42-46", "name": ""}, "authors": [{"authorId": - "2334381", "name": "J. Walkerdine"}, {"authorId": "2775878", "name": "L. Melville"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "1659692bd5d7b7cf5818cf3426dd06a91c8fec71", - "externalIds": {"MAG": "9673840", "DBLP": "conf/nldb/OnditiRRRSD04", "DOI": - "10.1007/978-3-540-27779-8_13", "CorpusId": 26798146}, "url": "https://www.semanticscholar.org/paper/1659692bd5d7b7cf5818cf3426dd06a91c8fec71", + true, "openAccessPdf": {"url": "https://eprints.lancs.ac.uk/id/eprint/12447/1/ICSE-WADSPaper.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-05-01", "journal": {"volume": "", "pages": "42-46", "name": ""}, "authors": + [{"authorId": "2334381", "name": "J. Walkerdine"}, {"authorId": "2775878", + "name": "L. Melville"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "1659692bd5d7b7cf5818cf3426dd06a91c8fec71", "externalIds": {"MAG": + "9673840", "DBLP": "conf/nldb/OnditiRRRSD04", "DOI": "10.1007/978-3-540-27779-8_13", + "CorpusId": 26798146}, "corpusId": 26798146, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1659692bd5d7b7cf5818cf3426dd06a91c8fec71", "title": "Language Resources and Tools for Supporting the System Engineering Process", "abstract": null, "venue": "NLDB", "year": 2004, "referenceCount": 6, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2004-06-23", "journal": {"pages": "147-158"}, "authors": [{"authorId": "2652064", - "name": "V. Onditi"}, {"authorId": "1929390", "name": "Paul Rayson"}, {"authorId": - "1480979385", "name": "B. Ransom"}, {"authorId": "1399467264", "name": "D. - Ramduny-Ellis"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "144978737", "name": "A. Dix"}]}, {"paperId": "4812d77f886f6a823f701ae25a695f803975b513", - "externalIds": {"CorpusId": 15695570}, "url": "https://www.semanticscholar.org/paper/4812d77f886f6a823f701ae25a695f803975b513", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2004-06-23", "journal": {"pages": "147-158"}, + "authors": [{"authorId": "2652064", "name": "V. Onditi"}, {"authorId": "1929390", + "name": "Paul Rayson"}, {"authorId": "1480979385", "name": "B. Ransom"}, {"authorId": + "1399467264", "name": "D. Ramduny-Ellis"}, {"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "144978737", "name": "A. Dix"}]}, {"paperId": + "4812d77f886f6a823f701ae25a695f803975b513", "externalIds": {"CorpusId": 15695570}, + "corpusId": 15695570, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4812d77f886f6a823f701ae25a695f803975b513", "title": "The flexibility of A Service Model for Component-Based Development", "abstract": "The promise of component-based development \u2013 the development of large-scale applications from off-the-shelf software components \u2013 @@ -12049,13 +13210,14 @@ interactions: supports a hybrid component/service-based development where off-the-shelf components and services can co-exist in the same system.", "venue": "", "year": 2004, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "3447210", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3447210", "name": "J. Hutchinson"}, {"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2072036054", "name": "S. Hall"}]}, {"paperId": "52dbcae682e53dcfba2360f684456a7878af7b2e", "externalIds": - {"MAG": "1655722418", "CorpusId": 60689772}, "url": "https://www.semanticscholar.org/paper/52dbcae682e53dcfba2360f684456a7878af7b2e", + {"MAG": "1655722418", "CorpusId": 60689772}, "corpusId": 60689772, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/52dbcae682e53dcfba2360f684456a7878af7b2e", "title": "Should One Be Alarmed By Technology Adaptations in the Home", "abstract": "The population of older people is increasing proportionately such that there is a need to find methods of ensuring a quality of life for this older generation, @@ -12139,26 +13301,28 @@ interactions: Current technology tends to be retrofitted into existing homes and therefore is limited by costs and installation problems, as well as the types of technology available.", "venue": "", "year": 2004, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-07-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, - {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "33388747", "name": "K. Clarke"}]}, - {"paperId": "55ec95ccc68c883b0d67527cf876920998702399", "externalIds": {"MAG": - "290783207", "CorpusId": 107461529}, "url": "https://www.semanticscholar.org/paper/55ec95ccc68c883b0d67527cf876920998702399", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Medicine", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-07-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", + "name": "G. Dewsbury"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "33388747", + "name": "K. Clarke"}]}, {"paperId": "55ec95ccc68c883b0d67527cf876920998702399", + "externalIds": {"MAG": "290783207", "CorpusId": 107461529}, "corpusId": 107461529, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/55ec95ccc68c883b0d67527cf876920998702399", "title": "The Interdependency of Science and Technology In User Requirements for High Performance Computing", "abstract": null, "venue": "", "year": 2004, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "2609254", "name": "J. - Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "2434299", "name": "M. Westcombe"}, {"authorId": "1761988", "name": "M. Pidd"}]}, - {"paperId": "623aa0e9bd69ee06edec3e3db594a6c259ddb862", "externalIds": {"CorpusId": - 35860247}, "url": "https://www.semanticscholar.org/paper/623aa0e9bd69ee06edec3e3db594a6c259ddb862", + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2609254", + "name": "J. Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "2434299", "name": "M. Westcombe"}, {"authorId": "1761988", "name": + "M. Pidd"}]}, {"paperId": "623aa0e9bd69ee06edec3e3db594a6c259ddb862", "externalIds": + {"CorpusId": 35860247}, "corpusId": 35860247, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/623aa0e9bd69ee06edec3e3db594a6c259ddb862", "title": "Understanding decisions , intentions and actions a multi-level meta-modal model", "abstract": "This paper presents a formal model designed to help us understand decisions. We aim to represent the way in which acts affect the @@ -12170,13 +13334,14 @@ interactions: create the model we abstract over different kinds of uncertainty, a technique we believe is also novel.", "venue": "", "year": 2004, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "144978737", "name": "A. Dix"}, {"authorId": - "1399467264", "name": "D. Ramduny-Ellis"}, {"authorId": "1929390", "name": - "Paul Rayson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "709ea9863a0ce7ae6f3747876d8809ba41722ca1", "externalIds": {"MAG": "2330835010", - "DOI": "10.1049/IC:20040184", "CorpusId": 15924791}, "url": "https://www.semanticscholar.org/paper/709ea9863a0ce7ae6f3747876d8809ba41722ca1", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "144978737", "name": "A. Dix"}, + {"authorId": "1399467264", "name": "D. Ramduny-Ellis"}, {"authorId": "1929390", + "name": "Paul Rayson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "709ea9863a0ce7ae6f3747876d8809ba41722ca1", "externalIds": {"MAG": + "2330835010", "DOI": "10.1049/IC:20040184", "CorpusId": 15924791}, "corpusId": + 15924791, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/709ea9863a0ce7ae6f3747876d8809ba41722ca1", "title": "Making ethnography accessible: bringing real-world experience to HCI designers and software engineers", "abstract": "This short paper proposes that bringing real-world experience through field studies of work and other @@ -12186,12 +13351,13 @@ interactions: and at home and we briefly discuss a range of techniques that we have developed to facilitate these field studies.", "venue": "ICSE 2004", "year": 2004, "referenceCount": 22, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "36-38", "name": ""}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "70a3c32e0a271b19545c49ae35e84dcfa8512de4", - "externalIds": {"MAG": "124356374", "CorpusId": 14040571}, "url": "https://www.semanticscholar.org/paper/70a3c32e0a271b19545c49ae35e84dcfa8512de4", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "36-38", "name": ""}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "70a3c32e0a271b19545c49ae35e84dcfa8512de4", + "externalIds": {"MAG": "124356374", "CorpusId": 14040571}, "corpusId": 14040571, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/70a3c32e0a271b19545c49ae35e84dcfa8512de4", "title": "Designing for Presence within P2P Systems", "abstract": "There is an increasing interest in incorporating presence within Peer-to-Peer systems (P2P). However the diverse nature of P2P can have an effect on how easily @@ -12200,38 +13366,42 @@ interactions: within a P2P system. In particular the paper discusses the affect the choice of underlying logical network architecture can have on these.", "venue": "", "year": 2004, "referenceCount": 12, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2334381", - "name": "J. Walkerdine"}, {"authorId": "2775878", "name": "L. Melville"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "7644c67b630a30f6a73fbea9650474ef5f267760", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "2334381", "name": "J. Walkerdine"}, + {"authorId": "2775878", "name": "L. Melville"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "7644c67b630a30f6a73fbea9650474ef5f267760", "externalIds": {"DBLP": "journals/www/SommervilleRRKD98", "MAG": "1571083668", - "DOI": "10.1023/A:1019295110666", "CorpusId": 13173672}, "url": "https://www.semanticscholar.org/paper/7644c67b630a30f6a73fbea9650474ef5f267760", + "DOI": "10.1023/A:1019295110666", "CorpusId": 13173672}, "corpusId": 13173672, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7644c67b630a30f6a73fbea9650474ef5f267760", "title": "Supporting information evolution on the WWW", "abstract": null, "venue": "World Wide Web", "year": 1998, "referenceCount": 32, "citationCount": - 7, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1998-01-15", "journal": {"volume": - "1", "pages": "45-54", "name": "World Wide Web"}, "authors": [{"authorId": + 7, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Sociology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1998-01-15", "journal": + {"volume": "1", "pages": "45-54", "name": "World Wide Web"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "1929390", "name": "Paul Rayson"}, {"authorId": "2053364854", "name": "A. Kirby"}, {"authorId": "144978737", "name": "A. Dix"}]}, {"paperId": "798bec76705c63c3ba53948feff7fd1ce1e40f8e", "externalIds": {"MAG": "981739785", - "CorpusId": 57662836}, "url": "https://www.semanticscholar.org/paper/798bec76705c63c3ba53948feff7fd1ce1e40f8e", + "CorpusId": 57662836}, "corpusId": 57662836, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/798bec76705c63c3ba53948feff7fd1ce1e40f8e", "title": "Staying within the process: understanding socio-technical failures in a healthcare setting", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-09-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "33388747", "name": "K. Clarke"}, - {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "7d903b1d555cd9b4ba4616ad6a52ab5c7e0ae570", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "33388747", + "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "7d903b1d555cd9b4ba4616ad6a52ab5c7e0ae570", "externalIds": {"MAG": "2151043139", "DBLP": "journals/tochi/MartinS04", "DOI": - "10.1145/972648.972651", "CorpusId": 53224545}, "url": "https://www.semanticscholar.org/paper/7d903b1d555cd9b4ba4616ad6a52ab5c7e0ae570", + "10.1145/972648.972651", "CorpusId": 53224545}, "corpusId": 53224545, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7d903b1d555cd9b4ba4616ad6a52ab5c7e0ae570", "title": "Patterns of cooperative interaction: Linking ethnomethodology and design", "abstract": "Patterns of Cooperative Interaction are regularities in the organisation of work, activity, and interaction among participants, @@ -12258,14 +13428,16 @@ interactions: before some closing comments are made on the role of our patterns and ethnomethodology in systems design.", "venue": "TCHI", "year": 2004, "referenceCount": 33, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-03-01", "journal": - {"volume": "11", "pages": "59-89", "name": "ACM Trans. Comput. Hum. Interact."}, - "authors": [{"authorId": "2110708818", "name": "David B. Martin"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "82d51adaba479785497005ec1e6bd55efd0e937d", - "externalIds": {"DBLP": "conf/ecoop/ChitchyanS04", "MAG": "1503344931", "CorpusId": - 3244370}, "url": "https://www.semanticscholar.org/paper/82d51adaba479785497005ec1e6bd55efd0e937d", + "openAccessPdf": {"url": "https://research-repository.st-andrews.ac.uk/bitstream/10023/702/1/TOCHIApril2004.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-03-01", "journal": {"volume": "11", "pages": "59-89", "name": "ACM Trans. + Comput. Hum. Interact."}, "authors": [{"authorId": "2110708818", "name": "David + B. Martin"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "82d51adaba479785497005ec1e6bd55efd0e937d", "externalIds": {"DBLP": "conf/ecoop/ChitchyanS04", + "MAG": "1503344931", "CorpusId": 3244370}, "corpusId": 3244370, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/82d51adaba479785497005ec1e6bd55efd0e937d", "title": "AOP and Reflection for Dynamic Hyperslices", "abstract": "In this paper we present a Model for Dynamic Hyperslices which uses a particular Aspect-Oriented (AO) approach \u2013 Hyperspaces \u2013 for decomposition and reflection as @@ -12274,22 +13446,28 @@ interactions: evolution yet preserving component modularity. The applicability of the model is illustrated through a schema adaptation scenario.", "venue": "RAM-SE", "year": 2004, "referenceCount": 20, "citationCount": 7, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-05-01", "journal": {"pages": "29-35"}, "authors": - [{"authorId": "1951201", "name": "R. Chitchyan"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "92e93d796b4fa32dd07f13f164193c4263c066f0", - "externalIds": {"MAG": "1777797034", "CorpusId": 61001262}, "url": "https://www.semanticscholar.org/paper/92e93d796b4fa32dd07f13f164193c4263c066f0", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2004-05-01", "journal": + {"pages": "29-35"}, "authors": [{"authorId": "1951201", "name": "R. Chitchyan"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "92e93d796b4fa32dd07f13f164193c4263c066f0", + "externalIds": {"MAG": "1777797034", "CorpusId": 61001262}, "corpusId": 61001262, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/92e93d796b4fa32dd07f13f164193c4263c066f0", "title": "Making ethnography accessible", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-05-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "b3157d7e607c287fcdf48461ff1b277d9a93228b", - "externalIds": {"DBLP": "conf/euromicro/HutchinsonKSH04", "MAG": "2037307599", - "DOI": "10.1109/EURMIC.2004.1333368", "CorpusId": 16031799}, "url": "https://www.semanticscholar.org/paper/b3157d7e607c287fcdf48461ff1b277d9a93228b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2004-05-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "b3157d7e607c287fcdf48461ff1b277d9a93228b", "externalIds": {"DBLP": "conf/euromicro/HutchinsonKSH04", + "MAG": "2037307599", "DOI": "10.1109/EURMIC.2004.1333368", "CorpusId": 16031799}, + "corpusId": 16031799, "publicationVenue": {"id": "6a5cd155-f8e8-4287-9d44-9e3052112126", + "name": "Proceedings of the EUROMICRO Conference", "alternate_names": ["Proc + EUROMICRO Conf"], "issn": "1089-6503", "alternate_issns": ["2376-9505"], "url": + "http://www.ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000279"}, "url": + "https://www.semanticscholar.org/paper/b3157d7e607c287fcdf48461ff1b277d9a93228b", "title": "A service model for component-based development", "abstract": "The promise of component-based development - the development of large-scale applications from off-the-shelf software components - may remain elusive unless we complement @@ -12304,15 +13482,17 @@ interactions: off-the-shelf components and services can coexist in the same system.", "venue": "Proceedings of the EUROMICRO Conference", "year": 2004, "referenceCount": 16, "citationCount": 25, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2004-08-31", "journal": {"pages": "162-169", "name": "Proceedings. 30th Euromicro - Conference, 2004."}, "authors": [{"authorId": "3447210", "name": "J. Hutchinson"}, - {"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", "name": - "I. Sommerville"}, {"authorId": "2072036054", "name": "S. Hall"}]}, {"paperId": - "b3d1b29c5e2e7375cff9d62a817c99918e34dbab", "externalIds": {"MAG": "2151096442", - "DOI": "10.1080/0968759042000181776", "CorpusId": 17182964}, "url": "https://www.semanticscholar.org/paper/b3d1b29c5e2e7375cff9d62a817c99918e34dbab", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2004-08-31", "journal": {"pages": "162-169", + "name": "Proceedings. 30th Euromicro Conference, 2004."}, "authors": [{"authorId": + "3447210", "name": "J. Hutchinson"}, {"authorId": "1989772", "name": "G. Kotonya"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2072036054", + "name": "S. Hall"}]}, {"paperId": "b3d1b29c5e2e7375cff9d62a817c99918e34dbab", + "externalIds": {"MAG": "2151096442", "DOI": "10.1080/0968759042000181776", + "CorpusId": 17182964}, "corpusId": 17182964, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b3d1b29c5e2e7375cff9d62a817c99918e34dbab", "title": "The anti\u2010social model of disability", "abstract": "Social theories are usually developed to enable a clearer understanding of a situation or problem. The \u2018Social Model\u2019 in various forms is currently the dominant @@ -12324,33 +13504,36 @@ interactions: technologies, suggesting an alternative framework of analysis, supported by extensive ethnomethodologically informed ethnographic research", "venue": "", "year": 2004, "referenceCount": 76, "citationCount": 142, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-03-01", - "journal": {"volume": "19", "pages": "145 - 158", "name": "Disability & Society"}, - "authors": [{"authorId": "1678275570", "name": "Guy Dewsbury *"}, {"authorId": - "33388747", "name": "K. Clarke"}, {"authorId": "1872433", "name": "D. Randall"}, - {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "b8858e3bbd0ad3dd24213b417315831b94a94bb3", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-03-01", "journal": {"volume": "19", "pages": "145 - 158", "name": "Disability + & Society"}, "authors": [{"authorId": "1678275570", "name": "Guy Dewsbury + *"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "1872433", + "name": "D. Randall"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "b8858e3bbd0ad3dd24213b417315831b94a94bb3", "externalIds": {"MAG": "2083650248", "DBLP": "conf/icse/BustardHS04", "DOI": - "10.1109/ICSE.2004.1317493", "CorpusId": 23686523}, "url": "https://www.semanticscholar.org/paper/b8858e3bbd0ad3dd24213b417315831b94a94bb3", + "10.1109/ICSE.2004.1317493", "CorpusId": 23686523}, "corpusId": 23686523, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b8858e3bbd0ad3dd24213b417315831b94a94bb3", "title": "BoF: new directions in UK software engineering research", "abstract": "A large number of UK researchers in software engineering are expected to attend ICSE 2004. The BoF session will use this opportunity to bring many of them together to consider ways of significantly improving the impact of UK software engineering research.", "venue": "Proceedings. 26th International Conference on Software Engineering", "year": 2004, "referenceCount": 3, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", - "source": "s2-fos-model"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2004-05-23", - "journal": {"pages": "693-694", "name": "Proceedings. 26th International Conference - on Software Engineering"}, "authors": [{"authorId": "1697932", "name": "D. - Bustard"}, {"authorId": "1709782", "name": "M. Holcombe"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "bfad262c0284791a2020a20e61dd2088edefe45e", - "externalIds": {"MAG": "953069871", "CorpusId": 61029922}, "url": "https://www.semanticscholar.org/paper/bfad262c0284791a2020a20e61dd2088edefe45e", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2004-05-23", "journal": {"pages": "693-694", + "name": "Proceedings. 26th International Conference on Software Engineering"}, + "authors": [{"authorId": "1697932", "name": "D. Bustard"}, {"authorId": "1709782", + "name": "M. Holcombe"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "bfad262c0284791a2020a20e61dd2088edefe45e", "externalIds": {"MAG": + "953069871", "CorpusId": 61029922}, "corpusId": 61029922, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bfad262c0284791a2020a20e61dd2088edefe45e", "title": "Easy for everyone: using components to offer specialised interfaces for software", "abstract": "Traditional technology has tended to be developed from the supply side. Technology companies have developed applications that @@ -12362,26 +13545,28 @@ interactions: and suggests a more inclusive approach to designing EAT communication system, based on our work within the DIRC 1 project.", "venue": "", "year": 2004, "referenceCount": 5, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "15327163", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "15327163", "name": "P. Bagnall"}, {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "c811e07ca4c6d3b43b762a93d35dd57d2a7bbfd8", "externalIds": {"DBLP": "journals/rts/BerrymanS92", "MAG": "2029023154", "DOI": - "10.1007/BF00355296", "CorpusId": 34979215}, "url": "https://www.semanticscholar.org/paper/c811e07ca4c6d3b43b762a93d35dd57d2a7bbfd8", + "10.1007/BF00355296", "CorpusId": 34979215}, "corpusId": 34979215, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c811e07ca4c6d3b43b762a93d35dd57d2a7bbfd8", "title": "Modeling and evaluating the feasibility of timing constraints under different real-time scheduling algorithms", "abstract": null, "venue": "Real-Time Systems", "year": 1992, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "1992-12-01", "journal": {"volume": "4", "pages": - "287-306", "name": "Real-Time Systems"}, "authors": [{"authorId": "2263954", - "name": "S. Berryman"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "d86ecc76f8aba8e6ba465451d4f390ca192a28ab", "externalIds": {"DBLP": - "journals/interactions/MartinS04", "MAG": "2611527666", "DOI": "10.1145/986253.986260", - "CorpusId": 1849127}, "url": "https://www.semanticscholar.org/paper/d86ecc76f8aba8e6ba465451d4f390ca192a28ab", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1992-12-01", + "journal": {"volume": "4", "pages": "287-306", "name": "Real-Time Systems"}, + "authors": [{"authorId": "2263954", "name": "S. Berryman"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "d86ecc76f8aba8e6ba465451d4f390ca192a28ab", + "externalIds": {"DBLP": "journals/interactions/MartinS04", "MAG": "2611527666", + "DOI": "10.1145/986253.986260", "CorpusId": 1849127}, "corpusId": 1849127, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d86ecc76f8aba8e6ba465451d4f390ca192a28ab", "title": "Patterns of cooperative interaction: linking ethnomethodology and design", "abstract": "Patterns of Cooperative Interaction are regularities in the organisation of work, activity, and interaction among participants, @@ -12408,13 +13593,14 @@ interactions: before some closing comments are made on the role of our patterns and ethnomethodology in systems design.", "venue": "INTR", "year": 2004, "referenceCount": 45, "citationCount": 106, "influentialCitationCount": 9, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-05-01", "journal": - {"volume": "11", "pages": "9-10", "name": "Interactions"}, "authors": [{"authorId": - "2110708818", "name": "David B. Martin"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "f6d22894e06bc7478d06d0324491aa44eb2ef859", - "externalIds": {"MAG": "70992410", "CorpusId": 6817485}, "url": "https://www.semanticscholar.org/paper/f6d22894e06bc7478d06d0324491aa44eb2ef859", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-05-01", "journal": {"volume": "11", "pages": "9-10", "name": "Interactions"}, + "authors": [{"authorId": "2110708818", "name": "David B. Martin"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "f6d22894e06bc7478d06d0324491aa44eb2ef859", + "externalIds": {"MAG": "70992410", "CorpusId": 6817485}, "corpusId": 6817485, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6d22894e06bc7478d06d0324491aa44eb2ef859", "title": "Comparing Dynamic AO Systems.", "abstract": "In this paper we present a comparative analysis of several currently available Java based dynamic AO systems. The comparison is built on how these systems deal with general dynamic @@ -12422,31 +13608,34 @@ interactions: weather and how do the specific AO change support mechanisms (e.g. total, actual, or collected weaving) affect dynamic system reconfigurability.", "venue": "", "year": 2004, "referenceCount": 25, "citationCount": 24, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-03-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1951201", "name": "R. Chitchyan"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "fb170f5d7a9fe71b2f47ba6ad969ef410e402943", "externalIds": {"MAG": - "1817810154", "CorpusId": 60548522}, "url": "https://www.semanticscholar.org/paper/fb170f5d7a9fe71b2f47ba6ad969ef410e402943", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-03-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1951201", "name": "R. Chitchyan"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "fb170f5d7a9fe71b2f47ba6ad969ef410e402943", + "externalIds": {"MAG": "1817810154", "CorpusId": 60548522}, "corpusId": 60548522, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fb170f5d7a9fe71b2f47ba6ad969ef410e402943", "title": "Software Engineering (7th Edition)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 572, "influentialCitationCount": - 35, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-05-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "012fad6d594e9365842a0f2b74999e751c019177", - "externalIds": {"DBLP": "conf/iwips/AlmoumenS03", "MAG": "1495087145", "CorpusId": - 34934259}, "url": "https://www.semanticscholar.org/paper/012fad6d594e9365842a0f2b74999e751c019177", + 35, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-05-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "012fad6d594e9365842a0f2b74999e751c019177", "externalIds": {"DBLP": + "conf/iwips/AlmoumenS03", "MAG": "1495087145", "CorpusId": 34934259}, "corpusId": + 34934259, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/012fad6d594e9365842a0f2b74999e751c019177", "title": "A Culture-Specific Method for the Analysis and Design of E-Commerce Systems", "abstract": null, "venue": "IWIPS", "year": 2001, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-07-01", "journal": {"pages": "241-"}, "authors": - [{"authorId": "2092446244", "name": "Sana''a Almoumen"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "0e15906f4a65d05f27d90f0d446d22432630f0ee", - "externalIds": {"MAG": "572907901", "CorpusId": 106824130}, "url": "https://www.semanticscholar.org/paper/0e15906f4a65d05f27d90f0d446d22432630f0ee", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2001-07-01", "journal": {"pages": + "241-"}, "authors": [{"authorId": "2092446244", "name": "Sana''a Almoumen"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "0e15906f4a65d05f27d90f0d446d22432630f0ee", + "externalIds": {"MAG": "572907901", "CorpusId": 106824130}, "corpusId": 106824130, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e15906f4a65d05f27d90f0d446d22432630f0ee", "title": "Designing Technology in Homes to Meet the Needs of Disabled People", "abstract": "Abstract This paper considers the main aspects and questions that are required to be asked by any designer of residences that include high-end @@ -12472,15 +13661,15 @@ interactions: design. A methodological underpinning to the design process has stemmed from Manderville [16] who demonstrates that technology and disability are interrelated.", "venue": "", "year": 2003, "referenceCount": 37, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "33388747", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144426202", "name": "J. Hughes"}]}, {"paperId": "16236ee9a7e95d5c682d79c7d34d18d9c1c86b32", "externalIds": {"CorpusId": 15516174}, - "url": "https://www.semanticscholar.org/paper/16236ee9a7e95d5c682d79c7d34d18d9c1c86b32", + "corpusId": 15516174, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/16236ee9a7e95d5c682d79c7d34d18d9c1c86b32", "title": "Dependable Grid Services", "abstract": "The provision of dependable computer systems by deploying diverse, redundant components in order to mask or provide recovery from component failures has mostly been restricted to @@ -12493,9 +13682,9 @@ interactions: be possible using a straightforward approach. The work is still in its early stages and so far no evaluation of the approach has been carried out.", "venue": "", "year": 2003, "referenceCount": 11, "citationCount": 4, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "152673230", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "152673230", "name": "S. Anderson"}, {"authorId": "2109156736", "name": "Yin Chen"}, {"authorId": "33797193", "name": "G. Dobson"}, {"authorId": "2072036054", "name": "S. Hall"}, {"authorId": "2056019451", "name": "Conrad Hughes"}, {"authorId": "2154403933", @@ -12503,7 +13692,8 @@ interactions: "2110549645", "name": "Ed Smith"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "103506564", "name": "Ma Tiejun"}]}, {"paperId": "2dc3c1850df21e3342414b9d289f16f791e2c216", "externalIds": {"MAG": "12271918", "DBLP": "conf/iceis/RaysonSACCCDOQRSSSW03", - "CorpusId": 12085463}, "url": "https://www.semanticscholar.org/paper/2dc3c1850df21e3342414b9d289f16f791e2c216", + "CorpusId": 12085463}, "corpusId": 12085463, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2dc3c1850df21e3342414b9d289f16f791e2c216", "title": "Tracker: A Framework to Support Reducing Rework Through Decision Management", "abstract": "The Tracker project is studying rework in systems engineering projects. Our hypothesis is that providing decision makers with @@ -12515,33 +13705,35 @@ interactions: In this paper, we focus on the natural language processing components, and describe experiments which demonstrate the feasibility of our text mining approach.", "venue": "ICEIS", "year": 2003, "referenceCount": 52, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-04-01", "journal": - {"pages": "344-351"}, "authors": [{"authorId": "1929390", "name": "Paul Rayson"}, - {"authorId": "49206686", "name": "B. Sharp"}, {"authorId": "38610874", "name": - "A. Alderson"}, {"authorId": "34591456", "name": "J. Cartmell"}, {"authorId": - "2780832", "name": "C. Chibelushi"}, {"authorId": "23088886", "name": "R. - Clarke"}, {"authorId": "144978737", "name": "A. Dix"}, {"authorId": "2652064", - "name": "V. Onditi"}, {"authorId": "2965753", "name": "A. Quek"}, {"authorId": - "1399467264", "name": "D. Ramduny-Ellis"}, {"authorId": "40473937", "name": - "Andy Salter"}, {"authorId": "2014616", "name": "Hanifa Shah"}, {"authorId": + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-04-01", "journal": {"pages": "344-351"}, "authors": [{"authorId": "1929390", + "name": "Paul Rayson"}, {"authorId": "49206686", "name": "B. Sharp"}, {"authorId": + "38610874", "name": "A. Alderson"}, {"authorId": "34591456", "name": "J. Cartmell"}, + {"authorId": "2780832", "name": "C. Chibelushi"}, {"authorId": "23088886", + "name": "R. Clarke"}, {"authorId": "144978737", "name": "A. Dix"}, {"authorId": + "2652064", "name": "V. Onditi"}, {"authorId": "2965753", "name": "A. Quek"}, + {"authorId": "1399467264", "name": "D. Ramduny-Ellis"}, {"authorId": "40473937", + "name": "Andy Salter"}, {"authorId": "2014616", "name": "Hanifa Shah"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2578527", "name": "Philip C. Windridge"}]}, {"paperId": "349be333ce6787837302fad0a522db5df7be9cb6", - "externalIds": {"MAG": "1688032402", "CorpusId": 60515218}, "url": "https://www.semanticscholar.org/paper/349be333ce6787837302fad0a522db5df7be9cb6", + "externalIds": {"MAG": "1688032402", "CorpusId": 60515218}, "corpusId": 60515218, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/349be333ce6787837302fad0a522db5df7be9cb6", "title": "Cultural probes: Eliciting Requirements for Dependable Ubiquitous Computing in the Home", "abstract": null, "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1744905", - "name": "K. Cheverst"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": - "1834798", "name": "G. Dewsbury"}, {"authorId": "145625611", "name": "Dan - Fitton"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "144426202", "name": "J. - Hughes"}]}, {"paperId": "5f44bc41edf76aecd38b9b2ed032d4750be4a5b6", "externalIds": - {"MAG": "1546342989", "CorpusId": 7047731}, "url": "https://www.semanticscholar.org/paper/5f44bc41edf76aecd38b9b2ed032d4750be4a5b6", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1744905", "name": "K. Cheverst"}, {"authorId": "33388747", + "name": "K. Clarke"}, {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": + "145625611", "name": "Dan Fitton"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144426202", + "name": "J. Hughes"}]}, {"paperId": "5f44bc41edf76aecd38b9b2ed032d4750be4a5b6", + "externalIds": {"MAG": "1546342989", "CorpusId": 7047731}, "corpusId": 7047731, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5f44bc41edf76aecd38b9b2ed032d4750be4a5b6", "title": "A Model for Dynamic Hyperspaces", "abstract": "This paper proposes a composition mechanism for hyperslices decomposed in accordance with the Hyperspaces approach. Our composition mechanism aims to maintain each concern @@ -12551,13 +13743,15 @@ interactions: the Hyperspaces approach, message interception and manipulation ideas of the Composition Filters approach and component integration mechanism of Connectors.", "venue": "", "year": 2003, "referenceCount": 19, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-03-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1951201", - "name": "R. Chitchyan"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "144450942", "name": "A. Rashid"}]}, {"paperId": "6570b1903a82bfd264ccf4bb17a2f200069e0b58", - "externalIds": {"MAG": "156686943", "CorpusId": 18947877}, "url": "https://www.semanticscholar.org/paper/6570b1903a82bfd264ccf4bb17a2f200069e0b58", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2003-03-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "1951201", "name": "R. Chitchyan"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "144450942", "name": "A. + Rashid"}]}, {"paperId": "6570b1903a82bfd264ccf4bb17a2f200069e0b58", "externalIds": + {"MAG": "156686943", "CorpusId": 18947877}, "corpusId": 18947877, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6570b1903a82bfd264ccf4bb17a2f200069e0b58", "title": "Finding Decisions Through Artefacts", "abstract": "This paper addresses the use of artefacts as a resource for analysis. Artefacts are particularly useful in situations where direct observation is ineffective, in particular @@ -12568,17 +13762,18 @@ interactions: applied using a meeting capture system and meeting minutes as the artefact resources. This is part of a wider study to understand the nature of decisions and so reduce rework.", "venue": "", "year": 2003, "referenceCount": 15, "citationCount": - 10, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2003-06-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "144978737", "name": "A. Dix"}, {"authorId": "1399467264", - "name": "D. Ramduny-Ellis"}, {"authorId": "1929390", "name": "Paul Rayson"}, - {"authorId": "2652064", "name": "V. Onditi"}, {"authorId": "1711844", "name": - "I. Sommerville"}, {"authorId": "39822261", "name": "A. Mackenzie"}]}, {"paperId": - "68e45453ddd7b9c9d01ad6833df91aa55e746a53", "externalIds": {"MAG": "2101484591", - "DOI": "10.3233/TAD-2003-15305", "CorpusId": 11104836}, "url": "https://www.semanticscholar.org/paper/68e45453ddd7b9c9d01ad6833df91aa55e746a53", + 10, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Sociology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2003-06-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "144978737", "name": "A. Dix"}, + {"authorId": "1399467264", "name": "D. Ramduny-Ellis"}, {"authorId": "1929390", + "name": "Paul Rayson"}, {"authorId": "2652064", "name": "V. Onditi"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "39822261", "name": "A. + Mackenzie"}]}, {"paperId": "68e45453ddd7b9c9d01ad6833df91aa55e746a53", "externalIds": + {"MAG": "2101484591", "DOI": "10.3233/TAD-2003-15305", "CorpusId": 11104836}, + "corpusId": 11104836, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/68e45453ddd7b9c9d01ad6833df91aa55e746a53", "title": "Designing acceptable \u2018smart\u2019 home technology to support people in the home", "abstract": "This paper considers the main aspects and questions that are required to be asked by any designer of residences that @@ -12594,30 +13789,32 @@ interactions: overall design. This paper addresses the main questions that arise from the design process as well as discuss the role of cultural probes in enhancing the design.", "venue": "", "year": 2003, "referenceCount": 28, "citationCount": - 53, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + 53, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "15", "pages": "191-199", "name": "Technology and Disability"}, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "32149900", "name": "B. J. Taylor"}, {"authorId": "145330453", "name": "M. Edge"}]}, {"paperId": "705863fdd8b3269ffb626fb5e6727984954d634e", - "externalIds": {"MAG": "2618073845", "CorpusId": 157671453}, "url": "https://www.semanticscholar.org/paper/705863fdd8b3269ffb626fb5e6727984954d634e", + "externalIds": {"MAG": "2618073845", "CorpusId": 157671453}, "corpusId": 157671453, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/705863fdd8b3269ffb626fb5e6727984954d634e", "title": "Proceedings of the Eighth European Conference on Computer Supported Cooperative Work, 14-18 September 2003, Helsinki, Finland", "abstract": null, "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": - [{"category": "Political Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "144426202", - "name": "J. Hughes"}, {"authorId": "2110710968", "name": "David B. Martin"}, - {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "3197269", "name": "C. Gurr"}, {"authorId": - "3270360", "name": "M. Hartswood"}, {"authorId": "144723413", "name": "R. - Procter"}, {"authorId": "3187653", "name": "R. Slack"}, {"authorId": "144167254", - "name": "A. Voss"}]}, {"paperId": "7169787b6c5a79debad17cbf0fefb3d589e850b4", - "externalIds": {"MAG": "1568080386", "CorpusId": 109021949}, "url": "https://www.semanticscholar.org/paper/7169787b6c5a79debad17cbf0fefb3d589e850b4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political + Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "33388747", "name": "K. + Clarke"}, {"authorId": "144426202", "name": "J. Hughes"}, {"authorId": "2110710968", + "name": "David B. Martin"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "3197269", + "name": "C. Gurr"}, {"authorId": "3270360", "name": "M. Hartswood"}, {"authorId": + "144723413", "name": "R. Procter"}, {"authorId": "3187653", "name": "R. Slack"}, + {"authorId": "144167254", "name": "A. Voss"}]}, {"paperId": "7169787b6c5a79debad17cbf0fefb3d589e850b4", + "externalIds": {"MAG": "1568080386", "CorpusId": 109021949}, "corpusId": 109021949, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7169787b6c5a79debad17cbf0fefb3d589e850b4", "title": "Growing Older Digitally: Designing Technology for Older People", "abstract": "This paper documents work from the EPSRC \u2018EQUATOR\u2019 and \u2018Dependability\u2019 Interdisciplinary Research Collaborations, concerned @@ -12648,40 +13845,47 @@ interactions: towards research methods that bring them closer to people\u2019s aspirations and their lives as really lived, so user-orientated qualitative", "venue": "", "year": 2003, "referenceCount": 9, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2003-03-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1834798", "name": "G. Dewsbury"}, {"authorId": "33388747", "name": "K. Clarke"}, - {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "144426202", "name": "J. Hughes"}]}, - {"paperId": "7e82603af0ceef6a007f38c5455414e921a38084", "externalIds": {"MAG": - "2130807782", "DBLP": "conf/ecscw/ClarkeHMRSGHPSV03", "DOI": "10.1007/978-94-010-0068-0_4", - "CorpusId": 18113331}, "url": "https://www.semanticscholar.org/paper/7e82603af0ceef6a007f38c5455414e921a38084", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2003-03-01", "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "33388747", + "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "144426202", "name": "J. + Hughes"}]}, {"paperId": "7e82603af0ceef6a007f38c5455414e921a38084", "externalIds": + {"MAG": "2130807782", "DBLP": "conf/ecscw/ClarkeHMRSGHPSV03", "DOI": "10.1007/978-94-010-0068-0_4", + "CorpusId": 18113331}, "corpusId": 18113331, "publicationVenue": {"id": "f2ee2e5e-a3d5-4cff-98e3-c7c6f7409f5e", + "name": "European Conference on Computer Supported Cooperative Work", "type": + "conference", "alternate_names": ["ECSCW", "Eur Conf Comput Support Cooperative + Work"], "url": "https://web.archive.org/web/*/http://www.ecscw.org/"}, "url": + "https://www.semanticscholar.org/paper/7e82603af0ceef6a007f38c5455414e921a38084", "title": "Dependable Red Hot Action", "abstract": null, "venue": "European Conference on Computer Supported Cooperative Work", "year": 2003, "referenceCount": 42, "citationCount": 31, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Materials Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-09-14", "journal": {"pages": "61-80"}, "authors": [{"authorId": "33388747", - "name": "K. Clarke"}, {"authorId": "144426202", "name": "J. Hughes"}, {"authorId": - "2110708818", "name": "David B. Martin"}, {"authorId": "2089073", "name": - "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "3197269", "name": "C. Gurr"}, {"authorId": "3270360", "name": "M. Hartswood"}, - {"authorId": "144723413", "name": "R. Procter"}, {"authorId": "3187653", "name": - "R. Slack"}, {"authorId": "144167254", "name": "A. Voss"}]}, {"paperId": "853a9e9da2e1dc7661a6c046928ae20e4014cf17", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-09-14", "journal": {"pages": "61-80"}, "authors": + [{"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "144426202", + "name": "J. Hughes"}, {"authorId": "2110708818", "name": "David B. Martin"}, + {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "3197269", "name": "C. Gurr"}, {"authorId": + "3270360", "name": "M. Hartswood"}, {"authorId": "144723413", "name": "R. + Procter"}, {"authorId": "3187653", "name": "R. Slack"}, {"authorId": "144167254", + "name": "A. Voss"}]}, {"paperId": "853a9e9da2e1dc7661a6c046928ae20e4014cf17", "externalIds": {"MAG": "1889669985", "DOI": "10.1007/978-1-4471-0653-1_1", - "CorpusId": 14093640}, "url": "https://www.semanticscholar.org/paper/853a9e9da2e1dc7661a6c046928ae20e4014cf17", + "CorpusId": 14093640}, "corpusId": 14093640, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/853a9e9da2e1dc7661a6c046928ae20e4014cf17", "title": "An Integrated Approach to Dependability Requirements Engineering", "abstract": null, "venue": "", "year": 2003, "referenceCount": 17, "citationCount": - 20, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-02-01", "journal": {"volume": - "", "pages": "3-15", "name": ""}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "a59b77b316ea5238d35059eb109e35736bdae101", - "externalIds": {"MAG": "2169899854", "CorpusId": 14728942}, "url": "https://www.semanticscholar.org/paper/a59b77b316ea5238d35059eb109e35736bdae101", + 20, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-02-01", + "journal": {"volume": "", "pages": "3-15", "name": ""}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "a59b77b316ea5238d35059eb109e35736bdae101", + "externalIds": {"MAG": "2169899854", "CorpusId": 14728942}, "corpusId": 14728942, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a59b77b316ea5238d35059eb109e35736bdae101", "title": "Designing Dependable Digital Domestic Environments", "abstract": "The aim of this paper is to examine the distinctions between home and organizational settings with particular reference to assistive technologies (AT) and outline @@ -12709,25 +13913,27 @@ interactions: We contend that standard dependability analysis falls short of the full picture of analysis when applied to domestic settings.", "venue": "", "year": 2003, "referenceCount": 32, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-04-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "33388747", - "name": "K. Clarke"}, {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": - "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. - Sommerville"}, {"authorId": "145247637", "name": "H. John"}]}, {"paperId": - "b796b0ab5eaeb0e356ae8dfaa22fbc3bbd4654c0", "externalIds": {"MAG": "12728124", - "CorpusId": 59760880}, "url": "https://www.semanticscholar.org/paper/b796b0ab5eaeb0e356ae8dfaa22fbc3bbd4654c0", + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2003-04-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "33388747", "name": "K. Clarke"}, {"authorId": "1834798", "name": "G. Dewsbury"}, + {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "145247637", "name": "H. John"}]}, + {"paperId": "b796b0ab5eaeb0e356ae8dfaa22fbc3bbd4654c0", "externalIds": {"MAG": + "12728124", "CorpusId": 59760880}, "corpusId": 59760880, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b796b0ab5eaeb0e356ae8dfaa22fbc3bbd4654c0", "title": "Eat at Home: A Simple Recipe?", "abstract": null, "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-11-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", - "name": "G. Dewsbury"}, {"authorId": "2089073", "name": "M. Rouncefield"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1394175839", - "name": "E. Sergeant"}]}, {"paperId": "baa16dcca65f479d68bc099f8f3cdbc997d0f066", - "externalIds": {"MAG": "6555313", "CorpusId": 10872693}, "url": "https://www.semanticscholar.org/paper/baa16dcca65f479d68bc099f8f3cdbc997d0f066", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2003-11-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "2089073", + "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "1394175839", "name": "E. Sergeant"}]}, {"paperId": "baa16dcca65f479d68bc099f8f3cdbc997d0f066", + "externalIds": {"MAG": "6555313", "CorpusId": 10872693}, "corpusId": 10872693, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/baa16dcca65f479d68bc099f8f3cdbc997d0f066", "title": "Composing Dynamic Hyperslices", "abstract": "Abstract. This paper describes a composition mechanism for the dynamic hyperslices model outlined in [1]. This mechanism composes primary concerns, directly aligned with requirements @@ -12754,14 +13960,14 @@ interactions: composition. In view of the increasing importance of composition, we have proposed [1] to distinguish it as a separate", "venue": "", "year": 2003, "referenceCount": 19, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1951201", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1951201", "name": "R. Chitchyan"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "bf7fe33c5c4d4d1aa626f72eec33c2bccbec11fe", "externalIds": {"DBLP": "journals/iajit/SommervilleMR03", "MAG": "2120256070", "CorpusId": 9886248}, - "url": "https://www.semanticscholar.org/paper/bf7fe33c5c4d4d1aa626f72eec33c2bccbec11fe", + "corpusId": 9886248, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf7fe33c5c4d4d1aa626f72eec33c2bccbec11fe", "title": "Informing the Requirements Process with Patterns of Cooperative Interaction", "abstract": "The need to understand the social context within which work to be supported by computer-based systems takes place is broadly @@ -12781,45 +13987,54 @@ interactions: social issues that are or relevance to the system requirements and as a means of generating requirements that support social interaction.", "venue": "Int. Arab J. Inf. Technol.", "year": 2003, "referenceCount": 33, "citationCount": - 7, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-07-01", "journal": - {"volume": "1", "name": "Int. Arab J. Inf. Technol."}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "2110708818", "name": "David - B. Martin"}, {"authorId": "2089073", "name": "M. Rouncefield"}]}, {"paperId": - "c115d6b3c88479fcc3425ad955e635576f47a3d1", "externalIds": {"MAG": "599414511", - "CorpusId": 60275928}, "url": "https://www.semanticscholar.org/paper/c115d6b3c88479fcc3425ad955e635576f47a3d1", + 7, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Sociology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-07-01", "journal": {"volume": "1", "name": "Int. Arab J. Inf. Technol."}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "2110708818", "name": "David B. Martin"}, {"authorId": "2089073", "name": + "M. Rouncefield"}]}, {"paperId": "c115d6b3c88479fcc3425ad955e635576f47a3d1", + "externalIds": {"MAG": "599414511", "CorpusId": 60275928}, "corpusId": 60275928, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c115d6b3c88479fcc3425ad955e635576f47a3d1", "title": "A model for dynamic hyperslices", "abstract": null, "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1951201", "name": "R. Chitchyan"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "c65577d7ceb99d847aaa412cc63c79d47e2caa9a", - "externalIds": {"MAG": "1026721736", "CorpusId": 60493375}, "url": "https://www.semanticscholar.org/paper/c65577d7ceb99d847aaa412cc63c79d47e2caa9a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1951201", "name": "R. + Chitchyan"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "c65577d7ceb99d847aaa412cc63c79d47e2caa9a", "externalIds": {"MAG": "1026721736", + "CorpusId": 60493375}, "corpusId": 60493375, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c65577d7ceb99d847aaa412cc63c79d47e2caa9a", "title": "Dependability and Assistive Technology in the Home", "abstract": null, "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "2003-04-01", "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", "name": "G. - Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "33388747", "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}, - {"authorId": "144426202", "name": "J. Hughes"}]}, {"paperId": "d21326eed60b9584363f5ad394a93eb5b47e815d", - "externalIds": {"MAG": "1569393605", "DBLP": "conf/safecomp/DewsburySCR03", - "DOI": "10.1007/978-3-540-39878-3_9", "CorpusId": 14029259}, "url": "https://www.semanticscholar.org/paper/d21326eed60b9584363f5ad394a93eb5b47e815d", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "2003-04-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1834798", "name": "G. Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "2089073", "name": + "M. Rouncefield"}, {"authorId": "144426202", "name": "J. Hughes"}]}, {"paperId": + "d21326eed60b9584363f5ad394a93eb5b47e815d", "externalIds": {"MAG": "1569393605", + "DBLP": "conf/safecomp/DewsburySCR03", "DOI": "10.1007/978-3-540-39878-3_9", + "CorpusId": 14029259}, "corpusId": 14029259, "publicationVenue": {"id": "a4deb9d1-7727-4588-ab72-3796cafab9a6", + "name": "International Conference on Computer Safety, Reliability, and Security", + "type": "conference", "alternate_names": ["SAFECOMP", "Int Conf Comput Saf + Reliab Secur"], "url": "http://www.ewics.org/"}, "url": "https://www.semanticscholar.org/paper/d21326eed60b9584363f5ad394a93eb5b47e815d", "title": "A Dependability Model for Domestic Systems", "abstract": null, "venue": "International Conference on Computer Safety, Reliability, and Security", "year": 2003, "referenceCount": 16, "citationCount": 42, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-09-23", "journal": {"pages": "103-115"}, "authors": - [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "1711844", "name": - "I. Sommerville"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": - "2089073", "name": "M. Rouncefield"}]}, {"paperId": "d95449f6d446ebd0afc759363a913b96b5cfdca1", - "externalIds": {"MAG": "1538225072", "CorpusId": 14422754}, "url": "https://www.semanticscholar.org/paper/d95449f6d446ebd0afc759363a913b96b5cfdca1", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-09-23", "journal": + {"pages": "103-115"}, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "33388747", + "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}]}, + {"paperId": "d95449f6d446ebd0afc759363a913b96b5cfdca1", "externalIds": {"MAG": + "1538225072", "CorpusId": 14422754}, "corpusId": 14422754, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d95449f6d446ebd0afc759363a913b96b5cfdca1", "title": "Managing Stakeholder Requirements in High Performance Computing Procurement", "abstract": "High Performance Computing (HPC) facilities are provided in the UK at a national level. These facilities are amongst the best @@ -12838,15 +14053,19 @@ interactions: making processes and ultimately how procurement strategy can rigorously meet the demands of the potential users.", "venue": "", "year": 2003, "referenceCount": 4, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-09-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2609254", "name": "J. Rooksby"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2434299", - "name": "M. Westcombe"}, {"authorId": "1761988", "name": "M. Pidd"}]}, {"paperId": - "d9c04083fb2ce5ac7ddea90c3fa92a93a7b72c06", "externalIds": {"DBLP": "conf/euromicro/KotonyaSH03", - "MAG": "2101857061", "DOI": "10.1109/EURMIC.2003.1231566", "CorpusId": 861162}, - "url": "https://www.semanticscholar.org/paper/d9c04083fb2ce5ac7ddea90c3fa92a93a7b72c06", + "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-09-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2609254", + "name": "J. Rooksby"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "2434299", "name": "M. Westcombe"}, {"authorId": "1761988", "name": + "M. Pidd"}]}, {"paperId": "d9c04083fb2ce5ac7ddea90c3fa92a93a7b72c06", "externalIds": + {"DBLP": "conf/euromicro/KotonyaSH03", "MAG": "2101857061", "DOI": "10.1109/EURMIC.2003.1231566", + "CorpusId": 861162}, "corpusId": 861162, "publicationVenue": {"id": "6a5cd155-f8e8-4287-9d44-9e3052112126", + "name": "Proceedings of the EUROMICRO Conference", "alternate_names": ["Proc + EUROMICRO Conf"], "issn": "1089-6503", "alternate_issns": ["2376-9505"], "url": + "http://www.ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000279"}, "url": + "https://www.semanticscholar.org/paper/d9c04083fb2ce5ac7ddea90c3fa92a93a7b72c06", "title": "Towards a classification model for component-based software engineering research", "abstract": "Accurate and timely information is a key motivator in the widespread adoption of CBSE technology in Europe. Although there are @@ -12857,15 +14076,16 @@ interactions: CBSE. We describe a proposed classification model for CBSE research that will form the basis for structuring the CBSEnet knowledge base.", "venue": "Proceedings of the EUROMICRO Conference", "year": 2003, "referenceCount": 22, "citationCount": - 58, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2003-09-01", - "journal": {"pages": "43-52", "name": "2003 Proceedings 29th Euromicro Conference"}, - "authors": [{"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "2072036054", "name": "S. Hall"}]}, - {"paperId": "3e40c9e747234076f14452ab43227a408d0c53c4", "externalIds": {"MAG": - "1542340429", "CorpusId": 10276371}, "url": "https://www.semanticscholar.org/paper/3e40c9e747234076f14452ab43227a408d0c53c4", + 58, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2003-09-01", "journal": {"pages": "43-52", "name": "2003 + Proceedings 29th Euromicro Conference"}, "authors": [{"authorId": "1989772", + "name": "G. Kotonya"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "2072036054", "name": "S. Hall"}]}, {"paperId": "3e40c9e747234076f14452ab43227a408d0c53c4", + "externalIds": {"MAG": "1542340429", "CorpusId": 10276371}, "corpusId": 10276371, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e40c9e747234076f14452ab43227a408d0c53c4", "title": "Appropriate Home Technology: Depending on Dependable Technology Systems", "abstract": "Dwelling with computers, they become part of the informing environment, like weather, like street sounds. A house that is true to its @@ -12897,24 +14117,26 @@ interactions: the basis for future and ongoing research and development agendas for appropriate technological interventions in domestic settings", "venue": "", "year": 2002, "referenceCount": 59, "citationCount": 4, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-07-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", - "name": "G. Dewsbury"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": - "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "42df0f4e90da4e0fcfb76ecc1f7c817fc631a194", "externalIds": - {"MAG": "207463190", "CorpusId": 60232730}, "url": "https://www.semanticscholar.org/paper/42df0f4e90da4e0fcfb76ecc1f7c817fc631a194", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2002-07-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1834798", "name": "G. Dewsbury"}, {"authorId": "33388747", "name": "K. Clarke"}, + {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "42df0f4e90da4e0fcfb76ecc1f7c817fc631a194", + "externalIds": {"MAG": "207463190", "CorpusId": 60232730}, "corpusId": 60232730, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42df0f4e90da4e0fcfb76ecc1f7c817fc631a194", "title": "How was that Decided: A Process/Tool for Hard Decisions", "abstract": null, "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2002-06-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "39822261", "name": "A. Mackenzie"}, {"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "1761988", "name": "M. - Pidd"}, {"authorId": "2434299", "name": "M. Westcombe"}]}, {"paperId": "63a68192ed57c629192d4e7058cf7fa0b08ef89c", - "externalIds": {"CorpusId": 13962383}, "url": "https://www.semanticscholar.org/paper/63a68192ed57c629192d4e7058cf7fa0b08ef89c", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-06-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "39822261", "name": "A. Mackenzie"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1761988", + "name": "M. Pidd"}, {"authorId": "2434299", "name": "M. Westcombe"}]}, {"paperId": + "63a68192ed57c629192d4e7058cf7fa0b08ef89c", "externalIds": {"CorpusId": 13962383}, + "corpusId": 13962383, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/63a68192ed57c629192d4e7058cf7fa0b08ef89c", "title": "Artificial Intelligence and Systems Engineering", "abstract": "This paper discusses the problems of applying artificial intelligence technology in the domain of systems engineering. The different process models used for @@ -12928,17 +14150,23 @@ interactions: be fruitful. Without exception, these activities are dominated by human rather than technical considerations.", "venue": "", "year": 2002, "referenceCount": 31, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Engineering", "source": "s2-fos-model"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2102895173", - "name": "\u201cPietro Torasso"}, {"authorId": "1749376", "name": "M. Baldoni"}, - {"authorId": "1770656", "name": "C. Baroglio"}, {"authorId": "34993275", "name": - "G. Pozzato"}, {"authorId": "1952363", "name": "D. Radicioni"}, {"authorId": - "1682380", "name": "M. Sapino"}, {"authorId": "1684445", "name": "G. Torta"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "659fd9d5b08aaa83df41b19a77717d8c764c917e", - "externalIds": {"DBLP": "conf/chi/MartinRS02", "MAG": "1973552960", "DOI": - "10.1145/503376.503419", "CorpusId": 15642946}, "url": "https://www.semanticscholar.org/paper/659fd9d5b08aaa83df41b19a77717d8c764c917e", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Engineering", + "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "2102895173", "name": "\u201cPietro Torasso"}, {"authorId": + "1749376", "name": "M. Baldoni"}, {"authorId": "1770656", "name": "C. Baroglio"}, + {"authorId": "34993275", "name": "G. Pozzato"}, {"authorId": "1952363", "name": + "D. Radicioni"}, {"authorId": "1682380", "name": "M. Sapino"}, {"authorId": + "1684445", "name": "G. Torta"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "659fd9d5b08aaa83df41b19a77717d8c764c917e", "externalIds": {"DBLP": + "conf/chi/MartinRS02", "MAG": "1973552960", "DOI": "10.1145/503376.503419", + "CorpusId": 15642946}, "corpusId": 15642946, "publicationVenue": {"id": "b55b50b1-aae7-47a7-b042-8aecc930073d", + "name": "International Conference on Human Factors in Computing Systems", + "type": "conference", "alternate_names": ["CHI", "Int Conf Hum Factor Comput + Syst", "Human Factors in Computing Systems", "Conference on Human Interface", + "Conf Hum Interface", "Hum Factor Comput Syst"], "url": "http://www.acm.org/sigchi/"}, + "url": "https://www.semanticscholar.org/paper/659fd9d5b08aaa83df41b19a77717d8c764c917e", "title": "Applying patterns of cooperative interaction to work (re)design: e-government and planning", "abstract": "This paper presents patterns of cooperative interaction derived from ethnographic studies of cooperative work as devices @@ -12949,34 +14177,39 @@ interactions: demonstrate their use in application to a complex setting: e-government in local government planning", "venue": "International Conference on Human Factors in Computing Systems", "year": 2002, "referenceCount": 28, "citationCount": - 52, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": - "2002-04-20", "journal": {"name": "Proceedings of the SIGCHI Conference on - Human Factors in Computing Systems"}, "authors": [{"authorId": "2110708818", - "name": "David B. Martin"}, {"authorId": "2089073", "name": "M. Rouncefield"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "89221cc7b885cbb62ac1b3336452e1a74bea42d9", - "externalIds": {"MAG": "1587888664", "CorpusId": 60992178}, "url": "https://www.semanticscholar.org/paper/89221cc7b885cbb62ac1b3336452e1a74bea42d9", + 52, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Sociology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], + "publicationDate": "2002-04-20", "journal": {"name": "Proceedings of the SIGCHI + Conference on Human Factors in Computing Systems"}, "authors": [{"authorId": + "2110708818", "name": "David B. Martin"}, {"authorId": "2089073", "name": + "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "89221cc7b885cbb62ac1b3336452e1a74bea42d9", "externalIds": {"MAG": "1587888664", + "CorpusId": 60992178}, "corpusId": 60992178, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/89221cc7b885cbb62ac1b3336452e1a74bea42d9", "title": "Guidelines on Good Practices for Developing Multicultural E-Commerce Systems", "abstract": null, "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - "2002-05-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "3272800", "name": "S. - Al-Moumen"}]}, {"paperId": "a26b6815932e398bdc88f1362b8b808cdcea0782", "externalIds": - {"MAG": "639228353", "CorpusId": 190961177}, "url": "https://www.semanticscholar.org/paper/a26b6815932e398bdc88f1362b8b808cdcea0782", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": "2002-05-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "3272800", "name": "S. Al-Moumen"}]}, {"paperId": "a26b6815932e398bdc88f1362b8b808cdcea0782", + "externalIds": {"MAG": "639228353", "CorpusId": 190961177}, "corpusId": 190961177, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a26b6815932e398bdc88f1362b8b808cdcea0782", "title": "Artefacts speak and artefacts to speak", "abstract": null, "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": - "Art", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "144978737", "name": "A. Dix"}, {"authorId": "1941513", "name": - "D. Ramduny-Ellis"}, {"authorId": "1929390", "name": "Paul Rayson"}, {"authorId": - "2652064", "name": "V. Onditi"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "39822261", "name": "A. Mackenzie"}]}, {"paperId": "a4b6e3a5ce5a6fc845d3000789e3472008345f8d", - "externalIds": {"CorpusId": 18276161}, "url": "https://www.semanticscholar.org/paper/a4b6e3a5ce5a6fc845d3000789e3472008345f8d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], + "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "144978737", "name": "A. Dix"}, + {"authorId": "1941513", "name": "D. Ramduny-Ellis"}, {"authorId": "1929390", + "name": "Paul Rayson"}, {"authorId": "2652064", "name": "V. Onditi"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "39822261", "name": "A. + Mackenzie"}]}, {"paperId": "a4b6e3a5ce5a6fc845d3000789e3472008345f8d", "externalIds": + {"CorpusId": 18276161}, "corpusId": 18276161, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a4b6e3a5ce5a6fc845d3000789e3472008345f8d", "title": "Housing Care And Support Journal technology HOME TECHNOLOGY SYSTEMS", "abstract": "This paper is interested in the design of technology in domestic, or home, settings. The systems themselves have become increasingly complex @@ -12988,38 +14221,41 @@ interactions: and highlight some fields of investigation that might form the basis for future research and development agendas technology in domestic settings.", "venue": "", "year": 2002, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1834798", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "a4b77f89a609b3bd4edb7823c2b26455d21dcf7e", "externalIds": - {"MAG": "2470088877", "CorpusId": 113981064}, "url": "https://www.semanticscholar.org/paper/a4b77f89a609b3bd4edb7823c2b26455d21dcf7e", + {"MAG": "2470088877", "CorpusId": 113981064}, "corpusId": 113981064, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a4b77f89a609b3bd4edb7823c2b26455d21dcf7e", "title": "APPROPRIATE HOME TECHNOLOGY: Depending on", "abstract": "Dwelling with computers, they become part of the informing environment, like weather, like street sounds. A house that is true to its house nature must have a certain quiet, even stolidness. Through a thousand subtle cues, computers will help turn our houses into homes. Weiser (1996)", "venue": "", "year": 2002, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "33388747", - "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "b4fd607b3c88326b836a30c0ee89d6ebd3122ff2", - "externalIds": {"MAG": "1534527541", "DOI": "10.1007/978-1-4471-0135-2_20", - "CorpusId": 60817218}, "url": "https://www.semanticscholar.org/paper/b4fd607b3c88326b836a30c0ee89d6ebd3122ff2", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", "name": "G. + Dewsbury"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "2089073", + "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "b4fd607b3c88326b836a30c0ee89d6ebd3122ff2", "externalIds": {"MAG": + "1534527541", "DOI": "10.1007/978-1-4471-0135-2_20", "CorpusId": 60817218}, + "corpusId": 60817218, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b4fd607b3c88326b836a30c0ee89d6ebd3122ff2", "title": "Remembrance of designs past: legacy data, organisational memory and distributed design", "abstract": null, "venue": "", "year": 2002, "referenceCount": 28, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "317-330", "name": ""}, "authors": [{"authorId": "1872433", "name": - "D. Randall"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": - "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "c383a486ce4a289a56c6df111a1978a9486a4d28", "externalIds": - {"MAG": "1484409085", "CorpusId": 13903895}, "url": "https://www.semanticscholar.org/paper/c383a486ce4a289a56c6df111a1978a9486a4d28", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "317-330", "name": ""}, "authors": [{"authorId": + "1872433", "name": "D. Randall"}, {"authorId": "145282573", "name": "T. Rodden"}, + {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "c383a486ce4a289a56c6df111a1978a9486a4d28", + "externalIds": {"MAG": "1484409085", "CorpusId": 13903895}, "corpusId": 13903895, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c383a486ce4a289a56c6df111a1978a9486a4d28", "title": "!Sore Legs and Naked Bottoms\": Using Cultural Probes in Dependability Research *", "abstract": "As digital technologies have matured, they have moved beyond the workplace to our everyday lives, presenting interesting methodological @@ -13037,18 +14273,19 @@ interactions: 1999) - for supplementing ethnographic investigations, prompting responses to emotional and social values and opening a dialogue with users.", "venue": "", "year": 2002, "referenceCount": 38, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-11-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1713085", - "name": "Andy Crabtree"}, {"authorId": "2814478", "name": "T. Hemmings"}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2002-11-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1713085", "name": "Andy Crabtree"}, {"authorId": "2814478", "name": "T. Hemmings"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "2119263639", "name": "Nottingham Ng"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "144426202", "name": "J. Hughes"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "cce6351489e297220d286e73b639ca423e4062fc", "externalIds": {"DBLP": "conf/p2p/WalkerdineMS02", "MAG": "2108478473", "DOI": - "10.1109/PTP.2002.1046331", "CorpusId": 9383802}, "url": "https://www.semanticscholar.org/paper/cce6351489e297220d286e73b639ca423e4062fc", + "10.1109/PTP.2002.1046331", "CorpusId": 9383802}, "corpusId": 9383802, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/cce6351489e297220d286e73b639ca423e4062fc", "title": "Dependability properties of P2P architectures", "abstract": "This paper aims to identify the main dependability properties (and related properties) that can play a part within P2P systems. This, in turn, can be used to help @@ -13059,14 +14296,17 @@ interactions: can have on these properties.", "venue": "Proceedings. Second International Conference on Peer-to-Peer Computing,", "year": 2002, "referenceCount": 7, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], - "publicationDate": "2002-09-05", "journal": {"pages": "173-174", "name": "Proceedings. - Second International Conference on Peer-to-Peer Computing,"}, "authors": [{"authorId": - "2334381", "name": "J. Walkerdine"}, {"authorId": "2775878", "name": "L. Melville"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "cd710b921674d4f26337340572495a5515659f09", - "externalIds": {"MAG": "164837536", "CorpusId": 15625496}, "url": "https://www.semanticscholar.org/paper/cd710b921674d4f26337340572495a5515659f09", + "openAccessPdf": {"url": "https://eprints.lancs.ac.uk/id/eprint/12180/1/DependabilityPosterPaper.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference", "Review"], "publicationDate": "2002-09-05", "journal": {"pages": + "173-174", "name": "Proceedings. Second International Conference on Peer-to-Peer + Computing,"}, "authors": [{"authorId": "2334381", "name": "J. Walkerdine"}, + {"authorId": "2775878", "name": "L. Melville"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "cd710b921674d4f26337340572495a5515659f09", + "externalIds": {"MAG": "164837536", "CorpusId": 15625496}, "corpusId": 15625496, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cd710b921674d4f26337340572495a5515659f09", "title": "A Process and Tool for Negotiating and Structuring Upstream Requirement Definition", "abstract": "This paper addresses the problem of eliciting requirements for large scale technical systems with multiple stakeholders, significant @@ -13090,14 +14330,15 @@ interactions: require group work with a facilitator. The Wisdom process-tool is currently being tested in the domain of high performance computing (HPC) procurement.", "venue": "", "year": 2002, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-09-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "39822261", - "name": "A. Mackenzie"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "103187954", "name": "P. Pidd"}, {"authorId": "2434299", "name": - "M. Westcombe"}]}, {"paperId": "d3c448a96c68b14c9bdbfd29cc0b6b615292fd9a", - "externalIds": {"MAG": "1500107132", "CorpusId": 15794716}, "url": "https://www.semanticscholar.org/paper/d3c448a96c68b14c9bdbfd29cc0b6b615292fd9a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2002-09-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "39822261", "name": "A. Mackenzie"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "103187954", "name": "P. + Pidd"}, {"authorId": "2434299", "name": "M. Westcombe"}]}, {"paperId": "d3c448a96c68b14c9bdbfd29cc0b6b615292fd9a", + "externalIds": {"MAG": "1500107132", "CorpusId": 15794716}, "corpusId": 15794716, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d3c448a96c68b14c9bdbfd29cc0b6b615292fd9a", "title": "An Analysis of Design Approaches for Crosscutting Concerns", "abstract": "A number of approaches have been proposed to provide support for crosscutting concerns at the design level. This paper compares some of these design approaches. @@ -13105,14 +14346,15 @@ interactions: weaknesses of the individual approaches. The paper concludes with a proposition to unify the strengths of the discussed approaches into a more effective model.", "venue": "", "year": 2002, "referenceCount": 24, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2002-04-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1951201", "name": "R. Chitchyan"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "144450942", "name": "A. Rashid"}]}, {"paperId": "e80f7682329151c486ae8c778d860a3ce126b13b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-04-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1951201", "name": "R. Chitchyan"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144450942", + "name": "A. Rashid"}]}, {"paperId": "e80f7682329151c486ae8c778d860a3ce126b13b", "externalIds": {"MAG": "2165092533", "DOI": "10.1108/14608790200200029", "CorpusId": - 17082509}, "url": "https://www.semanticscholar.org/paper/e80f7682329151c486ae8c778d860a3ce126b13b", + 17082509}, "corpusId": 17082509, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e80f7682329151c486ae8c778d860a3ce126b13b", "title": "Home technology systems", "abstract": "This paper considers the design of technology in domestic, or home, settings. The systems themselves have become increasingly complex and the need for dependable systems correspondingly @@ -13122,23 +14364,26 @@ interactions: for lack of dependability. The paper illuminates and highlights some fields for future investigation.", "venue": "", "year": 2002, "referenceCount": 4, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-11-01", - "journal": {"volume": "5", "pages": "23-26", "name": "Housing, Care and Support"}, - "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "33388747", - "name": "K. Clarke"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "f7f8ef601485073ec38024e1c9691bb52fef585d", - "externalIds": {"MAG": "120460220", "CorpusId": 107707221}, "url": "https://www.semanticscholar.org/paper/f7f8ef601485073ec38024e1c9691bb52fef585d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2002-11-01", "journal": {"volume": "5", "pages": "23-26", "name": "Housing, + Care and Support"}, "authors": [{"authorId": "1834798", "name": "G. Dewsbury"}, + {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "2089073", "name": + "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "f7f8ef601485073ec38024e1c9691bb52fef585d", "externalIds": {"MAG": "120460220", + "CorpusId": 107707221}, "corpusId": 107707221, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f7f8ef601485073ec38024e1c9691bb52fef585d", "title": "Growing Older Digitally: Daily Tasks at the Press of a Button", "abstract": null, "venue": "", "year": 2002, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}], "publicationTypes": null, "publicationDate": "2002-10-01", "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", "name": "G. - Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "f80e3f481343cb4f927bb5f29407d1aef6342e00", "externalIds": {"MAG": "133942401", - "CorpusId": 107287063}, "url": "https://www.semanticscholar.org/paper/f80e3f481343cb4f927bb5f29407d1aef6342e00", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}], "publicationTypes": null, "publicationDate": "2002-10-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1834798", + "name": "G. Dewsbury"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "f80e3f481343cb4f927bb5f29407d1aef6342e00", "externalIds": {"MAG": + "133942401", "CorpusId": 107287063}, "corpusId": 107287063, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f80e3f481343cb4f927bb5f29407d1aef6342e00", "title": "Designing Appropriate Assistive Technology for Home Users: Developing dependable networks", "abstract": "This paper is concerned with explicating some of the multiple concerns involved in designing appropriate assistive @@ -13167,44 +14412,53 @@ interactions: might form the basis for future and ongoing research and development agendas for appropriate technological interventions in domestic settings.", "venue": "", "year": 2002, "referenceCount": 56, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2002-10-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1834798", "name": "G. Dewsbury"}, {"authorId": "2089073", "name": "M. Rouncefield"}, - {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "0cf3f64bd173ad17eb1ccc6150eb50528c7fde78", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2002-10-01", "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1834798", "name": "G. Dewsbury"}, {"authorId": "2089073", "name": + "M. Rouncefield"}, {"authorId": "33388747", "name": "K. Clarke"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "0cf3f64bd173ad17eb1ccc6150eb50528c7fde78", "externalIds": {"MAG": "1506203979", "DBLP": "conf/ecscw/MartinRRSV01", "DOI": - "10.1007/0-306-48019-0_3", "CorpusId": 5917968}, "url": "https://www.semanticscholar.org/paper/0cf3f64bd173ad17eb1ccc6150eb50528c7fde78", + "10.1007/0-306-48019-0_3", "CorpusId": 5917968}, "corpusId": 5917968, "publicationVenue": + {"id": "f2ee2e5e-a3d5-4cff-98e3-c7c6f7409f5e", "name": "European Conference + on Computer Supported Cooperative Work", "type": "conference", "alternate_names": + ["ECSCW", "Eur Conf Comput Support Cooperative Work"], "url": "https://web.archive.org/web/*/http://www.ecscw.org/"}, + "url": "https://www.semanticscholar.org/paper/0cf3f64bd173ad17eb1ccc6150eb50528c7fde78", "title": "Finding patterns in the fieldwork", "abstract": null, "venue": "European Conference on Computer Supported Cooperative Work", "year": 2001, "referenceCount": 57, "citationCount": 112, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2001-09-16", "journal": - {"pages": "39-58"}, "authors": [{"authorId": "2110708818", "name": "David - B. Martin"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": - "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. - Sommerville"}, {"authorId": "1788802", "name": "Stephen Viller"}]}, {"paperId": - "155ba6f6a289c7b84c7a3096be54531df5025039", "externalIds": {"MAG": "197405675", - "CorpusId": 57732879}, "url": "https://www.semanticscholar.org/paper/155ba6f6a289c7b84c7a3096be54531df5025039", + "openAccessPdf": {"url": "http://www.pliant.org/personal/Tom_Erickson/int_PatternECSCW01_Martin.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2001-09-16", "journal": {"pages": "39-58"}, "authors": [{"authorId": "2110708818", + "name": "David B. Martin"}, {"authorId": "145282573", "name": "T. Rodden"}, + {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "1788802", "name": "Stephen Viller"}]}, + {"paperId": "155ba6f6a289c7b84c7a3096be54531df5025039", "externalIds": {"MAG": + "197405675", "CorpusId": 57732879}, "corpusId": 57732879, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/155ba6f6a289c7b84c7a3096be54531df5025039", "title": "Globablisation Mix Analysis & Assessment Method (GMAAM): International Marketing Approach to Design Multicultural E-Commerce", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-06-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "66a09f63535221b05a1b802dd9f6a75fd743521e", - "externalIds": {"MAG": "181991631", "CorpusId": 57798626}, "url": "https://www.semanticscholar.org/paper/66a09f63535221b05a1b802dd9f6a75fd743521e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2001-06-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "66a09f63535221b05a1b802dd9f6a75fd743521e", "externalIds": {"MAG": "181991631", + "CorpusId": 57798626}, "corpusId": 57798626, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/66a09f63535221b05a1b802dd9f6a75fd743521e", "title": "Software engineering (6th ed.)", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 473, "influentialCitationCount": - 22, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-05-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "6d35902780d278c29a45b5780ee62307d8837f79", - "externalIds": {"CorpusId": 664804}, "url": "https://www.semanticscholar.org/paper/6d35902780d278c29a45b5780ee62307d8837f79", + 22, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-05-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "6d35902780d278c29a45b5780ee62307d8837f79", "externalIds": {"CorpusId": + 664804}, "corpusId": 664804, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6d35902780d278c29a45b5780ee62307d8837f79", "title": "Software Documentation Process and Product Documentation Process Documentation Product Documentation Figure 1: Different Types of User Documentation Document Structure", "abstract": "Introduction All large software development @@ -13244,11 +14498,12 @@ interactions: A proposal to develop the system may be produced in response to a request for tenders by an \u2026", "venue": "", "year": 2001, "referenceCount": 4, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "7252db753bae019827aebd75f9962fc741559004", "externalIds": {"MAG": - "2167542276", "CorpusId": 15936031}, "url": "https://www.semanticscholar.org/paper/7252db753bae019827aebd75f9962fc741559004", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "7252db753bae019827aebd75f9962fc741559004", + "externalIds": {"MAG": "2167542276", "CorpusId": 15936031}, "corpusId": 15936031, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7252db753bae019827aebd75f9962fc741559004", "title": "Failures of Healthcare Systems", "abstract": "This paper is concerned with the dependability aspects of a number of healthcare systems that have \u2018failed\u2019 in various ways. It examines the different classes of healthcare @@ -13265,73 +14520,87 @@ interactions: of formal tools, searching for ways in they may become, \u201cpowerful yet fragile instruments of change.\"(Berg)", "venue": "", "year": 2001, "referenceCount": 8, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2001-03-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2104107475", "name": "J. Mackie"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "a377af14a8cb5fa7fe9930bbe65531ceb501df96", - "externalIds": {"MAG": "1545325032", "CorpusId": 109160657}, "url": "https://www.semanticscholar.org/paper/a377af14a8cb5fa7fe9930bbe65531ceb501df96", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-03-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2104107475", + "name": "J. Mackie"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "a377af14a8cb5fa7fe9930bbe65531ceb501df96", "externalIds": {"MAG": + "1545325032", "CorpusId": 109160657}, "corpusId": 109160657, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a377af14a8cb5fa7fe9930bbe65531ceb501df96", "title": "Integrated Requirements Engineering", "abstract": null, "venue": "", "year": 2001, "referenceCount": 12, "citationCount": 13, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "bb2b0ba0c9fe86952b4cecc0ed8943891a5973a7", - "externalIds": {"MAG": "1590319336", "CorpusId": 128508019}, "url": "https://www.semanticscholar.org/paper/bb2b0ba0c9fe86952b4cecc0ed8943891a5973a7", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "bb2b0ba0c9fe86952b4cecc0ed8943891a5973a7", "externalIds": + {"MAG": "1590319336", "CorpusId": 128508019}, "corpusId": 128508019, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bb2b0ba0c9fe86952b4cecc0ed8943891a5973a7", "title": "Artefact-Centred Analysis - Transect and Archaeological Approaches", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2001-11-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "144978737", "name": "A. Dix"}, {"authorId": "1399467264", - "name": "D. Ramduny-Ellis"}, {"authorId": "1929390", "name": "Paul Rayson"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "dc0c2837d8004052028439ebf3b1ad827b2f4b45", - "externalIds": {"MAG": "194761346", "CorpusId": 60098972}, "url": "https://www.semanticscholar.org/paper/dc0c2837d8004052028439ebf3b1ad827b2f4b45", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", + "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-11-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "144978737", "name": "A. Dix"}, + {"authorId": "1399467264", "name": "D. Ramduny-Ellis"}, {"authorId": "1929390", + "name": "Paul Rayson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "dc0c2837d8004052028439ebf3b1ad827b2f4b45", "externalIds": {"MAG": + "194761346", "CorpusId": 60098972}, "corpusId": 60098972, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/dc0c2837d8004052028439ebf3b1ad827b2f4b45", "title": "Cultural Specific Analysis & Asssessment Method (CSAAM): International Marketing Approach to Requirements Engineering for Multicultural E-Commerce System Design", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2001-06-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "3272800", "name": "S. Al-Moumen"}]}, {"paperId": "fe07cdb851b4d6571ae9dc167b610ea1ca7c8194", - "externalIds": {"DBLP": "books/daglib/0004618", "CorpusId": 41113126}, "url": - "https://www.semanticscholar.org/paper/fe07cdb851b4d6571ae9dc167b610ea1ca7c8194", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-06-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "3272800", "name": "S. Al-Moumen"}]}, + {"paperId": "fe07cdb851b4d6571ae9dc167b610ea1ca7c8194", "externalIds": {"DBLP": + "books/daglib/0004618", "CorpusId": 41113126}, "corpusId": 41113126, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fe07cdb851b4d6571ae9dc167b610ea1ca7c8194", "title": "Software Engineering, 6. Auflage", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 87, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "1-711"}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "02176f3bb5a2621152b49da0715cad680c45c307", - "externalIds": {"DBLP": "journals/ress/SewardPMS00", "MAG": "2064475106", - "DOI": "10.1016/S0951-8320(00)00045-4", "CorpusId": 28286758}, "url": "https://www.semanticscholar.org/paper/02176f3bb5a2621152b49da0715cad680c45c307", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "1-711"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "02176f3bb5a2621152b49da0715cad680c45c307", "externalIds": {"DBLP": + "journals/ress/SewardPMS00", "MAG": "2064475106", "DOI": "10.1016/S0951-8320(00)00045-4", + "CorpusId": 28286758}, "corpusId": 28286758, "publicationVenue": {"id": "432120e1-fd7c-4da0-8c59-eb4c1723bcbd", + "name": "Reliability Engineering & System Safety", "type": "journal", "alternate_names": + ["Reliab Eng Syst Saf"], "issn": "0951-8320", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/405908/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/reliability-engineering-and-system-safety", + "http://www.sciencedirect.com/science/journal/09518320"]}, "url": "https://www.semanticscholar.org/paper/02176f3bb5a2621152b49da0715cad680c45c307", "title": "Safety analysis of autonomous excavator functionality", "abstract": null, "venue": "Reliability Engineering & System Safety", "year": 2000, "referenceCount": 14, "citationCount": 29, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2000-10-01", "journal": - {"volume": "70", "pages": "29-39", "name": "Reliab. Eng. Syst. Saf."}, "authors": - [{"authorId": "2953796", "name": "D. Seward"}, {"authorId": "38017090", "name": - "C. Pace"}, {"authorId": "2925032", "name": "Richard Morrey"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "69f92360099b50039027efcaac3ae98451c8049e", - "externalIds": {"MAG": "1583426109", "DOI": "10.1007/978-1-4471-0457-5_13", - "CorpusId": 60752730}, "url": "https://www.semanticscholar.org/paper/69f92360099b50039027efcaac3ae98451c8049e", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2000-10-01", "journal": {"volume": "70", "pages": "29-39", "name": "Reliab. + Eng. Syst. Saf."}, "authors": [{"authorId": "2953796", "name": "D. Seward"}, + {"authorId": "38017090", "name": "C. Pace"}, {"authorId": "2925032", "name": + "Richard Morrey"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "69f92360099b50039027efcaac3ae98451c8049e", "externalIds": {"MAG": "1583426109", + "DOI": "10.1007/978-1-4471-0457-5_13", "CorpusId": 60752730}, "corpusId": + 60752730, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/69f92360099b50039027efcaac3ae98451c8049e", "title": "Social Viewpoints on Legacy Systems", "abstract": null, "venue": "", "year": 2000, "referenceCount": 21, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "151-163", "name": ""}, "authors": - [{"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "2089073", "name": - "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "1788802", "name": "Stephen Viller"}]}, {"paperId": "780918edd4d4e71993c1eb18dbf348e53c8dce2d", - "externalIds": {"MAG": "2053346834", "DBLP": "journals/jasis/DavenportHS00", - "DOI": "10.1002/1097-4571(2000)51:10%3C900::AID-ASI30%3E3.0.CO;2-U", "CorpusId": - 43047680}, "url": "https://www.semanticscholar.org/paper/780918edd4d4e71993c1eb18dbf348e53c8dce2d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Political Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "151-163", "name": ""}, "authors": [{"authorId": "145282573", "name": + "T. Rodden"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "1788802", "name": "Stephen + Viller"}]}, {"paperId": "780918edd4d4e71993c1eb18dbf348e53c8dce2d", "externalIds": + {"MAG": "2053346834", "DBLP": "journals/jasis/DavenportHS00", "DOI": "10.1002/1097-4571(2000)51:10%3C900::AID-ASI30%3E3.0.CO;2-U", + "CorpusId": 43047680}, "corpusId": 43047680, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/780918edd4d4e71993c1eb18dbf348e53c8dce2d", "title": "Narratives of new media in Scottish households: the evolution of a framework of inquiry", "abstract": "The authors describe a study of the social dynamics of new media in Scottish households. The evolving project @@ -13346,25 +14615,28 @@ interactions: framework based on group narrative and genre analysis that contributes to a theory of social informatics in the household.", "venue": "J. Am. Soc. Inf. Sci.", "year": 2000, "referenceCount": 85, "citationCount": 34, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Sociology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Sociology", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2000-08-01", "journal": {"volume": "51", "pages": "900-912", "name": "J. - Am. Soc. Inf. Sci."}, "authors": [{"authorId": "2079759", "name": "E. Davenport"}, - {"authorId": "36989323", "name": "M. Higgins"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "88325c58c3acabb8df1061d80a0ae37945a22f29", - "externalIds": {"MAG": "14339276", "CorpusId": 59690130}, "url": "https://www.semanticscholar.org/paper/88325c58c3acabb8df1061d80a0ae37945a22f29", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-08-01", "journal": {"volume": "51", "pages": "900-912", + "name": "J. Am. Soc. Inf. Sci."}, "authors": [{"authorId": "2079759", "name": + "E. Davenport"}, {"authorId": "36989323", "name": "M. Higgins"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "88325c58c3acabb8df1061d80a0ae37945a22f29", + "externalIds": {"MAG": "14339276", "CorpusId": 59690130}, "corpusId": 59690130, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/88325c58c3acabb8df1061d80a0ae37945a22f29", "title": "Remembrance of Designs Past: Legacy Data", "abstract": null, "venue": "", "year": 2000, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "145282573", "name": "T. Rodden"}, - {"authorId": "1872433", "name": "D. Randall"}]}, {"paperId": "ffe01014444625431cf98cd876adb0eb5c238158", - "externalIds": {"MAG": "2023174660", "DBLP": "journals/ijmms/VillerS00", "DOI": - "10.1006/ijhc.2000.0370", "CorpusId": 17789562}, "url": "https://www.semanticscholar.org/paper/ffe01014444625431cf98cd876adb0eb5c238158", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "2089073", "name": "M. + Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "145282573", "name": "T. Rodden"}, {"authorId": "1872433", "name": "D. Randall"}]}, + {"paperId": "ffe01014444625431cf98cd876adb0eb5c238158", "externalIds": {"MAG": + "2023174660", "DBLP": "journals/ijmms/VillerS00", "DOI": "10.1006/ijhc.2000.0370", + "CorpusId": 17789562}, "corpusId": 17789562, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ffe01014444625431cf98cd876adb0eb5c238158", "title": "Ethnographically informed analysis for software engineers", "abstract": "It is increasingly recognized that human, social, and political factors have a significant impact on software systems design. To address this, ethnographic @@ -13385,42 +14657,47 @@ interactions: viewpoint and an awareness of work viewpoint. Coherence is illustrated using a case study based on an air traffic control system.", "venue": "Int. J. Hum. Comput. Stud.", "year": 2000, "referenceCount": 56, "citationCount": 125, - "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-07-01", "journal": - {"volume": "53", "pages": "169-196", "name": "Int. J. Hum. Comput. Stud."}, - "authors": [{"authorId": "1788802", "name": "Stephen Viller"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "0079e5eeb0a244d183b28dff4fef5cd30e1e5890", - "externalIds": {"MAG": "960233706", "CorpusId": 166918730}, "url": "https://www.semanticscholar.org/paper/0079e5eeb0a244d183b28dff4fef5cd30e1e5890", + "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-07-01", "journal": {"volume": "53", "pages": "169-196", "name": "Int. + J. Hum. Comput. Stud."}, "authors": [{"authorId": "1788802", "name": "Stephen + Viller"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "0079e5eeb0a244d183b28dff4fef5cd30e1e5890", "externalIds": {"MAG": "960233706", + "CorpusId": 166918730}, "corpusId": 166918730, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0079e5eeb0a244d183b28dff4fef5cd30e1e5890", "title": "Marketing for E-Commerce", "abstract": null, "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-05-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3272800", - "name": "S. Al-Moumen"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1999-05-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "3272800", "name": "S. Al-Moumen"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "035b52399f7d7f3d7672e59781185390fde5ee47", "externalIds": {"MAG": - "1994776290", "CorpusId": 109326947}, "url": "https://www.semanticscholar.org/paper/035b52399f7d7f3d7672e59781185390fde5ee47", + "1994776290", "CorpusId": 109326947}, "corpusId": 109326947, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/035b52399f7d7f3d7672e59781185390fde5ee47", "title": "Improving Market-Driven RE Processes", "abstract": null, "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 67, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1999-06-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "1989772", "name": "G. Kotonya"}]}, - {"paperId": "133caf5de8fdd9354220e8ae1ef3ee552eea3bbd", "externalIds": {"MAG": - "1569572653", "CorpusId": 109619335}, "url": "https://www.semanticscholar.org/paper/133caf5de8fdd9354220e8ae1ef3ee552eea3bbd", + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1999-06-01", "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "144076208", "name": + "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "1989772", "name": "G. Kotonya"}]}, {"paperId": "133caf5de8fdd9354220e8ae1ef3ee552eea3bbd", + "externalIds": {"MAG": "1569572653", "CorpusId": 109619335}, "corpusId": 109619335, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/133caf5de8fdd9354220e8ae1ef3ee552eea3bbd", "title": "Requirements Analysis and Assessment: Case - British Airways Web Site", "abstract": null, "venue": "", "year": 1999, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}], "publicationTypes": null, "publicationDate": "1999-03-01", "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. - Sommerville"}, {"authorId": "3272800", "name": "S. Al-Moumen"}]}, {"paperId": - "8a444b88a492c6accfcfbffaab3b9497bd4a3e70", "externalIds": {"DBLP": "conf/re/VillerS99", - "MAG": "1941671609", "DOI": "10.1109/ISRE.1999.777980", "CorpusId": 10360228}, - "url": "https://www.semanticscholar.org/paper/8a444b88a492c6accfcfbffaab3b9497bd4a3e70", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}], "publicationTypes": null, "publicationDate": "1999-03-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "3272800", "name": "S. Al-Moumen"}]}, + {"paperId": "8a444b88a492c6accfcfbffaab3b9497bd4a3e70", "externalIds": {"DBLP": + "conf/re/VillerS99", "MAG": "1941671609", "DOI": "10.1109/ISRE.1999.777980", + "CorpusId": 10360228}, "corpusId": 10360228, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8a444b88a492c6accfcfbffaab3b9497bd4a3e70", "title": "Social analysis in the requirements engineering process: from ethnography to method", "abstract": "Over a number of years, we have been involved in investigations into using workplace observation to inform requirements for @@ -13435,15 +14712,16 @@ interactions: an air traffic control system to illustrate each approach.", "venue": "Proceedings IEEE International Symposium on Requirements Engineering (Cat. No.PR00188)", "year": 1999, "referenceCount": 24, "citationCount": 124, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Sociology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1999-06-07", "journal": {"pages": "6-13", "name": "Proceedings IEEE International - Symposium on Requirements Engineering (Cat. No.PR00188)"}, "authors": [{"authorId": - "1788802", "name": "Stephen Viller"}, {"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "9c12cd67d3d55dc895691bd99941b6302e880c69", "externalIds": - {"MAG": "2189171119", "CorpusId": 110659017}, "url": "https://www.semanticscholar.org/paper/9c12cd67d3d55dc895691bd99941b6302e880c69", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-06-07", "journal": {"pages": "6-13", "name": "Proceedings + IEEE International Symposium on Requirements Engineering (Cat. No.PR00188)"}, + "authors": [{"authorId": "1788802", "name": "Stephen Viller"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "9c12cd67d3d55dc895691bd99941b6302e880c69", + "externalIds": {"MAG": "2189171119", "CorpusId": 110659017}, "corpusId": 110659017, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9c12cd67d3d55dc895691bd99941b6302e880c69", "title": "Capturing the Benefits of Requirements", "abstract": "equirements problems are expensive and plague almost all systems andsoftware development organizations. In most cases, the best you canhope for is to detect errors @@ -13453,16 +14731,16 @@ interactions: quality,while failing to meet crucial customer requirements.Faced with recurrent requirements problems, organizations often turn to soft-ware process improvement for a solution.", "venue": "", "year": 1999, "referenceCount": 9, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1788802", "name": "Stephen Viller"}]}, {"paperId": "a0a65d4dc654711602ccac2c36f81848750f0402", "externalIds": {"MAG": "2064456248", "DBLP": "journals/software/SawyerSV99", "DOI": "10.1109/52.754057", "CorpusId": - 15155553}, "url": "https://www.semanticscholar.org/paper/a0a65d4dc654711602ccac2c36f81848750f0402", + 15155553}, "corpusId": 15155553, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0a65d4dc654711602ccac2c36f81848750f0402", "title": "Capturing the Benefits of Requirements Engineering", "abstract": "Requirements management has a critical effect on an organization''s development costs and software quality. The authors have developed a method that allows @@ -13470,14 +14748,16 @@ interactions: on existing SPI models and standards, filling in the gaps to improve schedules, budgets, and product quality.", "venue": "IEEE Softw.", "year": 1999, "referenceCount": 13, "citationCount": 72, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1999-03-01", "journal": - {"volume": "16", "pages": "78-85", "name": "IEEE Softw."}, "authors": [{"authorId": - "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "1788802", "name": "Stephen Viller"}]}, {"paperId": "ad0491b0f600b7cf0aa819157bb3e822a54b79d9", - "externalIds": {"DBLP": "journals/hhci/VillerS99", "MAG": "2094614089", "DOI": - "10.1080/07370024.1999.9667265", "CorpusId": 3081418}, "url": "https://www.semanticscholar.org/paper/ad0491b0f600b7cf0aa819157bb3e822a54b79d9", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1999-03-01", "journal": {"volume": "16", "pages": "78-85", "name": "IEEE + Softw."}, "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "1788802", "name": "Stephen + Viller"}]}, {"paperId": "ad0491b0f600b7cf0aa819157bb3e822a54b79d9", "externalIds": + {"DBLP": "journals/hhci/VillerS99", "MAG": "2094614089", "DOI": "10.1080/07370024.1999.9667265", + "CorpusId": 3081418}, "corpusId": 3081418, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ad0491b0f600b7cf0aa819157bb3e822a54b79d9", "title": "Coherence: An Approach to Representing Ethnographic Analyses in Systems Design", "abstract": "This article is concerned with how to represent. in system design the kinds of features of work settings as reported by ethnographic @@ -13497,14 +14777,16 @@ interactions: for object-oriented design can be used to express information about awareness in cooperative systems.", "venue": "Hum. Comput. Interact.", "year": 1999, "referenceCount": 55, "citationCount": 91, "influentialCitationCount": 8, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1999-03-01", "journal": {"volume": "14", "pages": "9-41", "name": "Hum. Comput. - Interact."}, "authors": [{"authorId": "1788802", "name": "Stephen Viller"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "ae82db26b69166248f6c991d6de7949368236ee8", - "externalIds": {"MAG": "2166998431", "DBLP": "journals/tse/SommervilleSV99", - "DOI": "10.1109/32.824395", "CorpusId": 16146578}, "url": "https://www.semanticscholar.org/paper/ae82db26b69166248f6c991d6de7949368236ee8", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1999-03-01", "journal": {"volume": + "14", "pages": "9-41", "name": "Hum. Comput. Interact."}, "authors": [{"authorId": + "1788802", "name": "Stephen Viller"}, {"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "ae82db26b69166248f6c991d6de7949368236ee8", "externalIds": + {"MAG": "2166998431", "DBLP": "journals/tse/SommervilleSV99", "DOI": "10.1109/32.824395", + "CorpusId": 16146578}, "corpusId": 16146578, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ae82db26b69166248f6c991d6de7949368236ee8", "title": "Managing Process Inconsistency Using Viewpoints", "abstract": "Discusses the notion of software process inconsistency and suggests that inconsistencies in software processes are inevitable and sometimes desirable. We present an @@ -13522,16 +14804,17 @@ interactions: illustrate the overall approach using part of a case study drawn from industrial processes that are part of a safety-critical system development.", "venue": "IEEE Trans. Software Eng.", "year": 1999, "referenceCount": 43, "citationCount": - 50, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1999-11-01", "journal": - {"volume": "25", "pages": "784-799", "name": "IEEE Trans. Software Eng."}, - "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "144076208", "name": "P. Sawyer"}, {"authorId": "1788802", "name": "Stephen - Viller"}]}, {"paperId": "b61ff9644ef29c353db447ba546fcf514958cb07", "externalIds": - {"DBLP": "journals/cais/RandallHORRST99", "MAG": "1546219431", "DOI": "10.17705/1cais.00208", - "CorpusId": 36335192}, "url": "https://www.semanticscholar.org/paper/b61ff9644ef29c353db447ba546fcf514958cb07", + 50, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1999-11-01", "journal": {"volume": "25", "pages": "784-799", "name": "IEEE + Trans. Software Eng."}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1788802", "name": + "Stephen Viller"}]}, {"paperId": "b61ff9644ef29c353db447ba546fcf514958cb07", + "externalIds": {"DBLP": "journals/cais/RandallHORRST99", "MAG": "1546219431", + "DOI": "10.17705/1cais.00208", "CorpusId": 36335192}, "corpusId": 36335192, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b61ff9644ef29c353db447ba546fcf514958cb07", "title": "Focus Issue on Legacy Information Systems and Business Process Change: Banking on the Old technology: Understanding the Organisational Context of ''Legacy'' Issues", "abstract": "A common thread in recent discussions of @@ -13551,35 +14834,40 @@ interactions: in a rather different fashion by focusing on the issue of \u2018legacy\u2019. We present a number of examples of legacy", "venue": "Commun. Assoc. Inf. Syst.", "year": 1999, "referenceCount": 31, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Business"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Business", "source": "external"}, {"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1999-07-01", "journal": {"volume": "2", "pages": "8", "name": "Commun. Assoc. - Inf. Syst."}, "authors": [{"authorId": "1872433", "name": "D. Randall"}, {"authorId": - "144426202", "name": "J. Hughes"}, {"authorId": "1402693446", "name": "J. - O''Brien"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "2089073", - "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "1834641", "name": "P. Tolmie"}]}, {"paperId": "b6997dad168d8b7c002757fa35481bb0385aa5f8", - "externalIds": {"MAG": "121654920", "CorpusId": 166553581}, "url": "https://www.semanticscholar.org/paper/b6997dad168d8b7c002757fa35481bb0385aa5f8", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://aisel.aisnet.org/cgi/viewcontent.cgi?article=2507&context=cais", + "status": null}, "fieldsOfStudy": ["Computer Science", "Business"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1999-07-01", "journal": + {"volume": "2", "pages": "8", "name": "Commun. Assoc. Inf. Syst."}, "authors": + [{"authorId": "1872433", "name": "D. Randall"}, {"authorId": "144426202", + "name": "J. Hughes"}, {"authorId": "1402693446", "name": "J. O''Brien"}, {"authorId": + "145282573", "name": "T. Rodden"}, {"authorId": "2089073", "name": "M. Rouncefield"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1834641", + "name": "P. Tolmie"}]}, {"paperId": "b6997dad168d8b7c002757fa35481bb0385aa5f8", + "externalIds": {"MAG": "121654920", "CorpusId": 166553581}, "corpusId": 166553581, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b6997dad168d8b7c002757fa35481bb0385aa5f8", "title": "Innovation through Electronic Commerce: Marketing for E-Commerce", "abstract": null, "venue": "", "year": 1999, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1999-11-01", "journal": null, "authors": [{"authorId": - "3272800", "name": "S. Al-Moumen"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "d8c60012288fa7126cf3c0c47059a1439a12cdc7", "externalIds": {"MAG": - "292782984", "CorpusId": 60420675}, "url": "https://www.semanticscholar.org/paper/d8c60012288fa7126cf3c0c47059a1439a12cdc7", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-11-01", "journal": null, + "authors": [{"authorId": "3272800", "name": "S. Al-Moumen"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "d8c60012288fa7126cf3c0c47059a1439a12cdc7", + "externalIds": {"MAG": "292782984", "CorpusId": 60420675}, "corpusId": 60420675, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d8c60012288fa7126cf3c0c47059a1439a12cdc7", "title": "Guidelines on Good Practices for Developing an E-Commerce Web Site from Marketing Viewpoints", "abstract": null, "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "3272800", "name": "S. Al-Moumen"}]}, {"paperId": "6fb0f3d2dacbe6a77477f5101c4216defcf0aba1", - "externalIds": {"MAG": "1553078293", "CorpusId": 57084400}, "url": "https://www.semanticscholar.org/paper/6fb0f3d2dacbe6a77477f5101c4216defcf0aba1", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "3272800", "name": "S. Al-Moumen"}]}, + {"paperId": "6fb0f3d2dacbe6a77477f5101c4216defcf0aba1", "externalIds": {"MAG": + "1553078293", "CorpusId": 57084400}, "corpusId": 57084400, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6fb0f3d2dacbe6a77477f5101c4216defcf0aba1", "title": "Requirements Engineering: Processes and Techniques", "abstract": "Requirements Engineering Processes and Techniques Why this book was written The value of introducing requirements engineering to trainee software engineers @@ -13600,26 +14888,27 @@ interactions: in industry new to requirements engineering. Accompanying Website: http: //www.comp.lancs.ac.uk/computing/resources/re Visit our Website: http://www.wiley.com/college/wws", "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 1797, "influentialCitationCount": - 171, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-09-16", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1989772", - "name": "G. Kotonya"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + 171, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1998-09-16", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "83c976dd1903fcff8d86b9ad9b56b41b27d0bf9a", "externalIds": {"MAG": - "200316657", "DOI": "10.1049/IP-SEN:19982193", "CorpusId": 57341387}, "url": - "https://www.semanticscholar.org/paper/83c976dd1903fcff8d86b9ad9b56b41b27d0bf9a", + "200316657", "DOI": "10.1049/IP-SEN:19982193", "CorpusId": 57341387}, "corpusId": + 57341387, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/83c976dd1903fcff8d86b9ad9b56b41b27d0bf9a", "title": "The Role Of Information Systems Methodology In Software Engineering [Editorial]", "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-08-01", - "journal": {"volume": "145", "pages": "93-94", "name": ""}, "authors": [{"authorId": - "2782737", "name": "N. Jayaratna"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "9ada9f5a72f7bb52a4cef494b69766f5518d7826", "externalIds": {"DBLP": - "conf/csmr/RansomSW98", "MAG": "2171737466", "DOI": "10.1109/CSMR.1998.665778", - "CorpusId": 15742009}, "url": "https://www.semanticscholar.org/paper/9ada9f5a72f7bb52a4cef494b69766f5518d7826", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1998-08-01", "journal": {"volume": "145", "pages": "93-94", "name": ""}, + "authors": [{"authorId": "2782737", "name": "N. Jayaratna"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "9ada9f5a72f7bb52a4cef494b69766f5518d7826", + "externalIds": {"DBLP": "conf/csmr/RansomSW98", "MAG": "2171737466", "DOI": + "10.1109/CSMR.1998.665778", "CorpusId": 15742009}, "corpusId": 15742009, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9ada9f5a72f7bb52a4cef494b69766f5518d7826", "title": "A method for assessing legacy systems for evolution", "abstract": "Legacy systems are usually critical to the business in which they operate, but the costs of running them are often not justifiable. Determining whether @@ -13636,36 +14925,41 @@ interactions: can be reduced by further iterations of the method performed at more detailed levels.", "venue": "Proceedings of the Second Euromicro Conference on Software Maintenance and Reengineering", "year": 1998, "referenceCount": 13, "citationCount": - 88, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1998-03-08", "journal": {"pages": "128-134", - "name": "Proceedings of the Second Euromicro Conference on Software Maintenance - and Reengineering"}, "authors": [{"authorId": "2059904506", "name": "J. Ransom"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144702663", - "name": "I. Warren"}]}, {"paperId": "9ee174311636ecf2de4753a854fab05443092c25", - "externalIds": {"MAG": "567888669", "CorpusId": 60058898}, "url": "https://www.semanticscholar.org/paper/9ee174311636ecf2de4753a854fab05443092c25", + 88, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1998-03-08", + "journal": {"pages": "128-134", "name": "Proceedings of the Second Euromicro + Conference on Software Maintenance and Reengineering"}, "authors": [{"authorId": + "2059904506", "name": "J. Ransom"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "144702663", "name": "I. Warren"}]}, {"paperId": "9ee174311636ecf2de4753a854fab05443092c25", + "externalIds": {"MAG": "567888669", "CorpusId": 60058898}, "corpusId": 60058898, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9ee174311636ecf2de4753a854fab05443092c25", "title": "Requirements Analysis and Assessment: Case-Tiny Computers Web site", "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": "1998-09-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3272800", - "name": "S. Al-Moumen"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "1998-09-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "3272800", "name": "S. Al-Moumen"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "a210f0dd01f54aa29f4408ea5cc7b1ee82716e9d", "externalIds": {"DBLP": "journals/ansoft/Sommerville98", "MAG": "1570730874", "DOI": "10.1023/A:1018901230131", - "CorpusId": 6928248}, "url": "https://www.semanticscholar.org/paper/a210f0dd01f54aa29f4408ea5cc7b1ee82716e9d", + "CorpusId": 6928248}, "corpusId": 6928248, "publicationVenue": {"id": "b044d3cd-4725-4f77-b517-214706478060", + "name": "Annals of Software Engineering", "type": "journal", "alternate_names": + ["Ann Softw Eng"], "issn": "1022-7091", "url": "https://link.springer.com/journal/10480"}, + "url": "https://www.semanticscholar.org/paper/a210f0dd01f54aa29f4408ea5cc7b1ee82716e9d", "title": "Systems engineering for software engineers", "abstract": null, "venue": "Annals of Software Engineering", "year": 1999, "referenceCount": 21, "citationCount": - 20, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1999-04-01", "journal": {"volume": "6", "pages": "111-129", - "name": "Annals of Software Engineering"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "a3b648bd7d66760b852d721543f97f431b2d4743", - "externalIds": {"CorpusId": 14878933}, "url": "https://www.semanticscholar.org/paper/a3b648bd7d66760b852d721543f97f431b2d4743", + 20, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1999-04-01", "journal": + {"volume": "6", "pages": "111-129", "name": "Annals of Software Engineering"}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "a3b648bd7d66760b852d721543f97f431b2d4743", "externalIds": {"CorpusId": 14878933}, + "corpusId": 14878933, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a3b648bd7d66760b852d721543f97f431b2d4743", "title": "Coherence : Social Analysis for Software Engineers", "abstract": "It is increasingly recognised that human, social, and political factors have a significant impact on software system design. To address this, ethnographic @@ -13685,12 +14979,13 @@ interactions: awareness of work viewpoint. We illustrate our approach using a case study based on an air traffic control system.", "venue": "", "year": 1998, "referenceCount": 24, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1788802", "name": "Stephen Viller"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "c59ca6dbb02c375200300cf6cf3ac8f69d11ee70", - "externalIds": {"DBLP": "conf/refsq/SawyerSV98", "MAG": "1567711714", "CorpusId": - 9619960}, "url": "https://www.semanticscholar.org/paper/c59ca6dbb02c375200300cf6cf3ac8f69d11ee70", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1788802", + "name": "Stephen Viller"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "c59ca6dbb02c375200300cf6cf3ac8f69d11ee70", "externalIds": {"DBLP": + "conf/refsq/SawyerSV98", "MAG": "1567711714", "CorpusId": 9619960}, "corpusId": + 9619960, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c59ca6dbb02c375200300cf6cf3ac8f69d11ee70", "title": "Improving the Requirements Process", "abstract": "The state-of-the practice in requirements engineering is currently such that organisations wishing to improve their requirements processes find it hard to discover, @@ -13702,15 +14997,20 @@ interactions: judgement that it is timely to exploit industry''s interest in software process improvement as a vehicle for raising the profile of good requirements practice.", "venue": "REFSQ", "year": 1998, "referenceCount": 24, "citationCount": 33, - "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-06-01", "journal": - {"pages": "71-84"}, "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1788802", - "name": "Stephen Viller"}]}, {"paperId": "d7eabfcfca07032e9a9fad1e57044bdab7f5dca5", + "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1998-06-01", "journal": {"pages": "71-84"}, "authors": [{"authorId": "144076208", + "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "1788802", "name": "Stephen Viller"}]}, {"paperId": "d7eabfcfca07032e9a9fad1e57044bdab7f5dca5", "externalIds": {"DBLP": "conf/icre/SommervilleSV98", "MAG": "1596249124", - "DOI": "10.1109/ICRE.1998.667811", "CorpusId": 11450624}, "url": "https://www.semanticscholar.org/paper/d7eabfcfca07032e9a9fad1e57044bdab7f5dca5", + "DOI": "10.1109/ICRE.1998.667811", "CorpusId": 11450624}, "corpusId": 11450624, + "publicationVenue": {"id": "647e2b25-1bff-4e4f-b507-e21dcb081788", "name": + "IEEE International Requirements Engineering Conference", "type": "conference", + "alternate_names": ["IEEE International Conference on Requirements Engineering", + "RE", "IEEE Int Requir Eng Conf", "IEEE Int Conf Requir Eng"], "url": "http://requirements-engineering.org/"}, + "url": "https://www.semanticscholar.org/paper/d7eabfcfca07032e9a9fad1e57044bdab7f5dca5", "title": "Viewpoints for requirements elicitation: a practical approach", "abstract": "The paper introduces an approach to multi perspective requirements engineering (PREview) which has been designed for industrial use and discusses @@ -13725,16 +15025,17 @@ interactions: we discuss some practical considerations which emerged when the approach was applied in industry.", "venue": "IEEE International Requirements Engineering Conference", "year": 1998, "referenceCount": 23, "citationCount": 183, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "1998-04-06", "journal": {"pages": "74-81", "name": "Proceedings of IEEE International - Symposium on Requirements Engineering: RE ''98"}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "144076208", "name": "P. - Sawyer"}, {"authorId": "1788802", "name": "Stephen Viller"}]}, {"paperId": - "db4a30ac1b07d19d83b290ad0d047943b8f4c9a0", "externalIds": {"MAG": "2558044192", - "CorpusId": 113535608}, "url": "https://www.semanticscholar.org/paper/db4a30ac1b07d19d83b290ad0d047943b8f4c9a0", + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1998-04-06", "journal": {"pages": "74-81", + "name": "Proceedings of IEEE International Symposium on Requirements Engineering: + RE ''98"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1788802", "name": + "Stephen Viller"}]}, {"paperId": "db4a30ac1b07d19d83b290ad0d047943b8f4c9a0", + "externalIds": {"MAG": "2558044192", "CorpusId": 113535608}, "corpusId": 113535608, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/db4a30ac1b07d19d83b290ad0d047943b8f4c9a0", "title": "Cooperative Systems Engineering Group", "abstract": "The state-of-the practice in requirements engineering is currently such that organisations wishing to improve their requirements processes find it hard to discover, @@ -13746,26 +15047,28 @@ interactions: judgement that it is timely to exploit industry''s interest in software process improvement as a vehicle for raising the profile of good requirements practice.", "venue": "", "year": 1998, "referenceCount": 26, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "1788802", "name": "Stephen - Viller"}]}, {"paperId": "0132362fbc7b18042913d1f3ee086fdb71c51801", "externalIds": - {"MAG": "907813967", "DOI": "10.1016/b978-008042835-2/50260-5", "CorpusId": - 107188202}, "url": "https://www.semanticscholar.org/paper/0132362fbc7b18042913d1f3ee086fdb71c51801", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "144076208", "name": + "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "1788802", "name": "Stephen Viller"}]}, {"paperId": "0132362fbc7b18042913d1f3ee086fdb71c51801", + "externalIds": {"MAG": "907813967", "DOI": "10.1016/b978-008042835-2/50260-5", + "CorpusId": 107188202}, "corpusId": 107188202, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0132362fbc7b18042913d1f3ee086fdb71c51801", "title": "Developing the safety case for large mobile robots.", "abstract": null, "venue": "", "year": 1997, "referenceCount": 1, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "2953796", "name": "D. - Seward"}, {"authorId": "70466948", "name": "S. Quayle"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "2062712437", "name": "R. Morey"}]}, - {"paperId": "5c86ea6f3e348ce26d69cd027454bc4d94d11406", "externalIds": {"MAG": - "2145974836", "DBLP": "conf/apsec/KotonyaS97", "DOI": "10.1109/APSEC.1997.640183", - "CorpusId": 1471638}, "url": "https://www.semanticscholar.org/paper/5c86ea6f3e348ce26d69cd027454bc4d94d11406", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2953796", + "name": "D. Seward"}, {"authorId": "70466948", "name": "S. Quayle"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "2062712437", "name": "R. + Morey"}]}, {"paperId": "5c86ea6f3e348ce26d69cd027454bc4d94d11406", "externalIds": + {"MAG": "2145974836", "DBLP": "conf/apsec/KotonyaS97", "DOI": "10.1109/APSEC.1997.640183", + "CorpusId": 1471638}, "corpusId": 1471638, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5c86ea6f3e348ce26d69cd027454bc4d94d11406", "title": "Integrating safety analysis and requirements engineering", "abstract": "Some systems failures are due to defects in manufacturing and design, however that there are a significant number of system failures which result from errors, @@ -13778,27 +15081,32 @@ interactions: safety analysis.", "venue": "Proceedings of Joint 4th International Computer Science Conference and 4th Asia Pacific Software Engineering Conference", "year": 1997, "referenceCount": 40, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1997-12-02", - "journal": {"pages": "259-271", "name": "Proceedings of Joint 4th International - Computer Science Conference and 4th Asia Pacific Software Engineering Conference"}, - "authors": [{"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "7d31988eb9a73d893873b63d4509fa387606d31c", - "externalIds": {"MAG": "34843256", "DOI": "10.1007/978-1-4471-0975-4_12", - "CorpusId": 107318884}, "url": "https://www.semanticscholar.org/paper/7d31988eb9a73d893873b63d4509fa387606d31c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1997-12-02", "journal": {"pages": "259-271", + "name": "Proceedings of Joint 4th International Computer Science Conference + and 4th Asia Pacific Software Engineering Conference"}, "authors": [{"authorId": + "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "7d31988eb9a73d893873b63d4509fa387606d31c", "externalIds": {"MAG": + "34843256", "DOI": "10.1007/978-1-4471-0975-4_12", "CorpusId": 107318884}, + "corpusId": 107318884, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7d31988eb9a73d893873b63d4509fa387606d31c", "title": "Safe systems architectures for autonomous robots.", "abstract": null, "venue": "", "year": 1997, "referenceCount": 6, "citationCount": 4, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "203-215", "name": ""}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2953796", - "name": "D. Seward"}, {"authorId": "2925032", "name": "Richard Morrey"}, {"authorId": - "70466948", "name": "S. Quayle"}]}, {"paperId": "7d6941b3cd8f54f8d815704601018ddd9c32713e", - "externalIds": {"MAG": "2153250757", "DBLP": "journals/iee/DixRS97", "DOI": - "10.1049/ip-sen:19971514", "CorpusId": 1753067}, "url": "https://www.semanticscholar.org/paper/7d6941b3cd8f54f8d815704601018ddd9c32713e", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "203-215", "name": ""}, "authors": [{"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "2953796", "name": "D. Seward"}, {"authorId": + "2925032", "name": "Richard Morrey"}, {"authorId": "70466948", "name": "S. + Quayle"}]}, {"paperId": "7d6941b3cd8f54f8d815704601018ddd9c32713e", "externalIds": + {"MAG": "2153250757", "DBLP": "journals/iee/DixRS97", "DOI": "10.1049/ip-sen:19971514", + "CorpusId": 1753067}, "corpusId": 1753067, "publicationVenue": {"id": "6919638b-5d0b-4405-ad4d-cc6f480df93e", + "name": "IEE Proceedings - Software Engineering", "alternate_names": ["IEE + Proc Softw Eng"], "issn": "1364-5080", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=4433"}, + "url": "https://www.semanticscholar.org/paper/7d6941b3cd8f54f8d815704601018ddd9c32713e", "title": "Modelling versions in collaborative work", "abstract": "The problem of version management for co-operative systems is addressed. The authors first describe a basic version model-a domain model capturing the idea of a version @@ -13810,14 +15118,15 @@ interactions: for versioning Web pages, fits within the framework of the model.", "venue": "IEE Proceedings - Software Engineering", "year": 1997, "referenceCount": 35, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1997-08-01", "journal": {"volume": "144", "pages": "195-205", "name": "IEE - Proc. Softw. Eng."}, "authors": [{"authorId": "144978737", "name": "A. Dix"}, - {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "83247ad327d138e0a779694203c59361830f328a", - "externalIds": {"MAG": "1781894645", "CorpusId": 14601946}, "url": "https://www.semanticscholar.org/paper/83247ad327d138e0a779694203c59361830f328a", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1997-08-01", "journal": {"volume": "144", "pages": "195-205", + "name": "IEE Proc. Softw. Eng."}, "authors": [{"authorId": "144978737", "name": + "A. Dix"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "83247ad327d138e0a779694203c59361830f328a", + "externalIds": {"MAG": "1781894645", "CorpusId": 14601946}, "corpusId": 14601946, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/83247ad327d138e0a779694203c59361830f328a", "title": "Versioning the web", "abstract": "Currently the display of web pages centres upon the presentation of a single instance of each page. As the web evolves to become a long-term information store (e.g. with the increasing @@ -13831,27 +15140,33 @@ interactions: to work). This system (V-Web) maintains and provides public and private access to a set of versions for web pages and includes facilities for both page readers and page authors.", "venue": "", "year": 1997, "referenceCount": 7, "citationCount": - 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1997-05-01", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2053364854", "name": "A. Kirby"}, - {"authorId": "1929390", "name": "Paul Rayson"}, {"authorId": "145282573", - "name": "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "144978737", "name": "A. Dix"}]}, {"paperId": "847db983d78ad763a5cbd141f1ab20e58269f969", + 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-05-01", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2053364854", + "name": "A. Kirby"}, {"authorId": "1929390", "name": "Paul Rayson"}, {"authorId": + "145282573", "name": "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "144978737", "name": "A. Dix"}]}, {"paperId": "847db983d78ad763a5cbd141f1ab20e58269f969", "externalIds": {"MAG": "1559179949", "DBLP": "journals/ansoft/SommervilleS97", - "DOI": "10.1023/A:1018946223345", "CorpusId": 7662724}, "url": "https://www.semanticscholar.org/paper/847db983d78ad763a5cbd141f1ab20e58269f969", + "DOI": "10.1023/A:1018946223345", "CorpusId": 7662724}, "corpusId": 7662724, + "publicationVenue": {"id": "b044d3cd-4725-4f77-b517-214706478060", "name": + "Annals of Software Engineering", "type": "journal", "alternate_names": ["Ann + Softw Eng"], "issn": "1022-7091", "url": "https://link.springer.com/journal/10480"}, + "url": "https://www.semanticscholar.org/paper/847db983d78ad763a5cbd141f1ab20e58269f969", "title": "Viewpoints: principles, problems and a practical approach to requirements engineering", "abstract": null, "venue": "Annals of Software Engineering", "year": 1997, "referenceCount": 33, "citationCount": 256, "influentialCitationCount": - 22, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1997-01-11", - "journal": {"volume": "3", "pages": "101-130", "name": "Annals of Software - Engineering"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "144076208", "name": "P. Sawyer"}]}, {"paperId": "97100c3233aadfe1876d841dd15287c7da2639e5", - "externalIds": {"MAG": "1537202", "CorpusId": 107828374}, "url": "https://www.semanticscholar.org/paper/97100c3233aadfe1876d841dd15287c7da2639e5", + 22, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1997-01-11", "journal": {"volume": "3", "pages": + "101-130", "name": "Annals of Software Engineering"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "144076208", "name": "P. + Sawyer"}]}, {"paperId": "97100c3233aadfe1876d841dd15287c7da2639e5", "externalIds": + {"MAG": "1537202", "CorpusId": 107828374}, "corpusId": 107828374, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/97100c3233aadfe1876d841dd15287c7da2639e5", "title": "Requirements Engineering: A Good Practice Guide", "abstract": "From the Publisher: \nRequirements engineering is the process of discovering, documenting and managing the requirements for a computer-based system. The goal of requirements @@ -13866,14 +15181,15 @@ interactions: can improve your requirements engineering processes. The guidelines are applicable for any type of application and, in general, apply to both systems and software engineering.", "venue": "", "year": 1997, "referenceCount": 0, "citationCount": - 500, "influentialCitationCount": 13, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 500, "influentialCitationCount": 13, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-05-05", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144076208", "name": "P. Sawyer"}]}, {"paperId": "ce135226bbaab66cb198a03b08c4616226545d33", "externalIds": {"DBLP": "journals/iee/PembertonS97", "MAG": "2121662839", - "DOI": "10.1049/ip-sen:19971643", "CorpusId": 43059291}, "url": "https://www.semanticscholar.org/paper/ce135226bbaab66cb198a03b08c4616226545d33", + "DOI": "10.1049/ip-sen:19971643", "CorpusId": 43059291}, "corpusId": 43059291, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ce135226bbaab66cb198a03b08c4616226545d33", "title": "VOCAL: A frame work for test identification and deployment", "abstract": "Viewpoint oriented verification and validation (VOCAL) is a novel technique for the identification and application of a structured life-cycle based software @@ -13891,16 +15207,21 @@ interactions: the method is illustrated with a small example using a bank ATM machine. In conclusion, the authors evaluate VOCAL, and outline areas of future work.", "venue": "IEE Proc. Softw. Eng.", "year": 1997, "referenceCount": 40, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1997-12-01", "journal": {"volume": - "144", "pages": "249-260", "name": "IEE Proc. Softw. Eng."}, "authors": [{"authorId": - "34499280", "name": "D. Pemberton"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "e335bcfe64bb189e80f0ea874e02c4281445b9c3", "externalIds": {"DBLP": - "journals/sopr/SawyerSV97", "MAG": "2070043061", "DOI": "10.1002/(SICI)1099-1670(199703)3:1%3C19::AID-SPIP66%3E3.0.CO;2-X", - "CorpusId": 14554674}, "url": "https://www.semanticscholar.org/paper/e335bcfe64bb189e80f0ea874e02c4281445b9c3", + 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1997-12-01", "journal": {"volume": "144", "pages": "249-260", "name": "IEE + Proc. Softw. Eng."}, "authors": [{"authorId": "34499280", "name": "D. Pemberton"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "e335bcfe64bb189e80f0ea874e02c4281445b9c3", + "externalIds": {"DBLP": "journals/sopr/SawyerSV97", "MAG": "2070043061", "DOI": + "10.1002/(SICI)1099-1670(199703)3:1%3C19::AID-SPIP66%3E3.0.CO;2-X", "CorpusId": + 14554674}, "corpusId": 14554674, "publicationVenue": {"id": "3007e4c7-c80b-41d2-b751-4316d6ca05fe", + "name": "Software Process: Improvement and Practice", "type": "journal", "alternate_names": + ["Softw Process Improv Pract"], "issn": "1077-4866", "alternate_issns": ["1099-1670"], + "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/15482", "alternate_urls": + ["https://onlinelibrary.wiley.com/journal/10991670"]}, "url": "https://www.semanticscholar.org/paper/e335bcfe64bb189e80f0ea874e02c4281445b9c3", "title": "Requirements process improvement through the phased introduction of good practice", "abstract": "Current process improvement and maturity models pay little attention to requirements engineering. Typically, requirements @@ -13918,16 +15239,17 @@ interactions: and deploy the practices most appropriate to their needs. \u00a9 1997 John Wiley & Sons Ltd", "venue": "Software Process: Improvement and Practice", "year": 1997, "referenceCount": 43, "citationCount": 93, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1997-03-01", "journal": - {"volume": "3", "pages": "19-34", "name": "Softw. Process. Improv. Pract."}, - "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "1788802", "name": "Stephen Viller"}]}, - {"paperId": "03840e005882a95dfc41905b85e3e5979a1daad7", "externalIds": {"MAG": - "2985918943", "DBLP": "books/crc/tucker97/Sommerville97", "DOI": "10.1145/234313.234420", - "CorpusId": 1053582}, "url": "https://www.semanticscholar.org/paper/03840e005882a95dfc41905b85e3e5979a1daad7", + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1997-03-01", "journal": {"volume": "3", "pages": "19-34", + "name": "Softw. Process. Improv. Pract."}, "authors": [{"authorId": "144076208", + "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "1788802", "name": "Stephen Viller"}]}, {"paperId": "03840e005882a95dfc41905b85e3e5979a1daad7", + "externalIds": {"MAG": "2985918943", "DBLP": "books/crc/tucker97/Sommerville97", + "DOI": "10.1145/234313.234420", "CorpusId": 1053582}, "corpusId": 1053582, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/03840e005882a95dfc41905b85e3e5979a1daad7", "title": "Software process models", "abstract": "(1) Specification. The functionality of the software and its operating constraints are specified in detail. (2) Design and implementation. The overall structure of the software is designed @@ -13957,49 +15279,56 @@ interactions: of other increments may change. A version of the system is delivered early to users and they may experiment with it to help clarify their needs for later system increments.", "venue": "CSUR", "year": 1996, "referenceCount": 9, "citationCount": - 115, "influentialCitationCount": 10, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1996-03-01", "journal": - {"volume": "28", "pages": "269-271", "name": "ACM Comput. Surv."}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "08df0eb7fcbdcd42234bd3bed924e304c2e03d00", - "externalIds": {"MAG": "2045145186", "DOI": "10.1049/SEJ.1996.0001", "CorpusId": - 62169531}, "url": "https://www.semanticscholar.org/paper/08df0eb7fcbdcd42234bd3bed924e304c2e03d00", + 115, "influentialCitationCount": 10, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/234313.234420", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1996-03-01", "journal": {"volume": "28", "pages": "269-271", "name": "ACM + Comput. Surv."}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "08df0eb7fcbdcd42234bd3bed924e304c2e03d00", "externalIds": {"MAG": + "2045145186", "DOI": "10.1049/SEJ.1996.0001", "CorpusId": 62169531}, "corpusId": + 62169531, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/08df0eb7fcbdcd42234bd3bed924e304c2e03d00", "title": "Editorial. The Viewpoints FAQ", "abstract": null, "venue": "", "year": 1996, "referenceCount": 3, "citationCount": 48, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "11", "pages": "2", "name": - "Software Engineering Journal"}, "authors": [{"authorId": "1714549", "name": - "A. Finkelstein"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "147d2c6f58f5c8f2d9e4da8e7ba9274bfd31e8bb", "externalIds": {"MAG": "25011279", - "DOI": "10.14236/EWIC/FAC1996.3", "CorpusId": 59704591}, "url": "https://www.semanticscholar.org/paper/147d2c6f58f5c8f2d9e4da8e7ba9274bfd31e8bb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "11", "pages": "2", "name": "Software Engineering Journal"}, "authors": + [{"authorId": "1714549", "name": "A. Finkelstein"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "147d2c6f58f5c8f2d9e4da8e7ba9274bfd31e8bb", + "externalIds": {"MAG": "25011279", "DOI": "10.14236/EWIC/FAC1996.3", "CorpusId": + 59704591}, "corpusId": 59704591, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/147d2c6f58f5c8f2d9e4da8e7ba9274bfd31e8bb", "title": "A modal model of versions", "abstract": "This paper is concerned with the problem of version management for cooperative systems. We present a model of versions which is a ''modal'' model in that it takes into account the context of use of these versions. We describe the basic version model, the modelling of relationships and the modelling of version management.", "venue": "", "year": 1996, "referenceCount": 9, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.scienceopen.com/document_file/5cacb346-d776-4f4d-81ab-77dd2b3bfb43/ScienceOpen/001_Dix.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-09-10", "journal": {"volume": "", "pages": "3-3", "name": ""}, "authors": [{"authorId": "144978737", "name": "A. Dix"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "1a4be722f0797909fd159acc4057f7ddd47b0da1", "externalIds": {"DBLP": "books/daglib/0086604", - "MAG": "73124481", "CorpusId": 444947}, "url": "https://www.semanticscholar.org/paper/1a4be722f0797909fd159acc4057f7ddd47b0da1", + "MAG": "73124481", "CorpusId": 444947}, "corpusId": 444947, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1a4be722f0797909fd159acc4057f7ddd47b0da1", "title": "Software engineering, 5th Edition", "abstract": "A non-transposing mute having a metallic hemispherical resonator with a hollow acoustic filter attached thereto is provided for detachably fitting upon the rim of a brass musical instrument. A variety of tonal quality is available by choice of the particular filter selected by the musician.", "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 53, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "I-XVI, 1-742"}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "306782c0207288a88997988df33be6a836d0b521", - "externalIds": {"MAG": "593902278", "CorpusId": 106851894}, "url": "https://www.semanticscholar.org/paper/306782c0207288a88997988df33be6a836d0b521", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "I-XVI, 1-742"}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "306782c0207288a88997988df33be6a836d0b521", "externalIds": + {"MAG": "593902278", "CorpusId": 106851894}, "corpusId": 106851894, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/306782c0207288a88997988df33be6a836d0b521", "title": "Software Configuration Management: ICSE''96 SCM-6 Workshop, Berlin, Germany, March 25 - 26, 1996, Selected Papers", "abstract": "Smooth operations with square operators - The version set model in ICE.- Fine grained version @@ -14021,22 +15350,27 @@ interactions: Change sets revisited and configuration management of complex documents.- Modeling the sharing of versions.", "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1996-10-30", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "3784ae7d94b66b5aeb57ea0efb8491a25a5b2159", "externalIds": {"DBLP": - "conf/scm/Sommerville96", "MAG": "1559924036", "DOI": "10.1007/BFb0023077", - "CorpusId": 27743574}, "url": "https://www.semanticscholar.org/paper/3784ae7d94b66b5aeb57ea0efb8491a25a5b2159", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1996-10-30", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "3784ae7d94b66b5aeb57ea0efb8491a25a5b2159", + "externalIds": {"DBLP": "conf/scm/Sommerville96", "MAG": "1559924036", "DOI": + "10.1007/BFb0023077", "CorpusId": 27743574}, "corpusId": 27743574, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3784ae7d94b66b5aeb57ea0efb8491a25a5b2159", "title": "Intoduction to SCM-6", "abstract": null, "venue": "SCM", "year": 1996, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-03-25", "journal": {"pages": - "1-7"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "39d23c2eddf9a4e6b412ea725eb30eee5ce3146d", "externalIds": {"MAG": "2169833261", - "DBLP": "journals/iee/SommervilleD96", "DOI": "10.1049/sej.1996.0015", "CorpusId": - 34277962}, "url": "https://www.semanticscholar.org/paper/39d23c2eddf9a4e6b412ea725eb30eee5ce3146d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1996-03-25", + "journal": {"pages": "1-7"}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "39d23c2eddf9a4e6b412ea725eb30eee5ce3146d", "externalIds": + {"MAG": "2169833261", "DBLP": "journals/iee/SommervilleD96", "DOI": "10.1049/sej.1996.0015", + "CorpusId": 34277962}, "corpusId": 34277962, "publicationVenue": {"id": "ed3076f2-967a-47c8-b60d-7bea15e28461", + "name": "Software Engineering Journal", "type": "journal", "alternate_names": + ["Softw Eng J"], "issn": "0268-6961", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=2225", + "alternate_urls": ["https://digital-library.theiet.org/content/journals/sej"]}, + "url": "https://www.semanticscholar.org/paper/39d23c2eddf9a4e6b412ea725eb30eee5ce3146d", "title": "PCL: a language for modelling evolving system architectures", "abstract": "The paper describes a language called PCL (Proteus Configuration Language), which has been designed to model the architecture of multiple versions of @@ -14047,25 +15381,27 @@ interactions: illustrated using a number of simple examples. A supporting toolset for PCL has been implemented and is briefly described", "venue": "Software Engineering Journal", "year": 1996, "referenceCount": 25, "citationCount": 39, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-03-01", "journal": {"volume": "11", "pages": "111-121", - "name": "Softw. Eng. J."}, "authors": [{"authorId": "1711844", "name": "I. - Sommerville"}, {"authorId": "40101012", "name": "G. Dean"}]}, {"paperId": - "4f52147b5a7c716d07c2cb0f7be60b633ba0e48f", "externalIds": {"DBLP": "conf/scm/DixRS96", - "MAG": "1530433855", "DOI": "10.1007/BFb0023100", "CorpusId": 26998388}, "url": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-03-01", "journal": + {"volume": "11", "pages": "111-121", "name": "Softw. Eng. J."}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "40101012", + "name": "G. Dean"}]}, {"paperId": "4f52147b5a7c716d07c2cb0f7be60b633ba0e48f", + "externalIds": {"DBLP": "conf/scm/DixRS96", "MAG": "1530433855", "DOI": "10.1007/BFb0023100", + "CorpusId": 26998388}, "corpusId": 26998388, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4f52147b5a7c716d07c2cb0f7be60b633ba0e48f", "title": "Modeling the Sharing of Versions", "abstract": null, "venue": "SCM", "year": 1996, "referenceCount": 10, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-03-25", "journal": {"pages": "282-290"}, "authors": - [{"authorId": "144978737", "name": "A. Dix"}, {"authorId": "145282573", "name": - "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "5149aaf2befabdbeb9d31cca12f5054b26a9a535", "externalIds": {"CorpusId": 18500977}, - "url": "https://www.semanticscholar.org/paper/5149aaf2befabdbeb9d31cca12f5054b26a9a535", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-03-25", "journal": + {"pages": "282-290"}, "authors": [{"authorId": "144978737", "name": "A. Dix"}, + {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "5149aaf2befabdbeb9d31cca12f5054b26a9a535", + "externalIds": {"CorpusId": 18500977}, "corpusId": 18500977, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5149aaf2befabdbeb9d31cca12f5054b26a9a535", "title": "2 REQUIREMENTS ENGINEERING WITH VIEWPOINTS", "abstract": "The process of understanding the system under analysis, the services required of it, its environment and associated constraints involves the capture, analysis and @@ -14081,13 +15417,14 @@ interactions: approaches and shows how its improves on them. A simple example of a bank auto-teller system is used to demonstrate the method.", "venue": "", "year": 1996, "referenceCount": 27, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1989772", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "83369d4e9df92c8e8911345cbeda472cb4233da5", "externalIds": {"MAG": "2097384327", "DBLP": "conf/icra/SewardMSM96", "DOI": "10.1109/ROBOT.1996.503897", - "CorpusId": 9597860}, "url": "https://www.semanticscholar.org/paper/83369d4e9df92c8e8911345cbeda472cb4233da5", + "CorpusId": 9597860}, "corpusId": 9597860, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/83369d4e9df92c8e8911345cbeda472cb4233da5", "title": "LUCIE the robot excavator-design for system safety", "abstract": "Staff and students at Lancaster University have, for the past five years, been involved in the development of an autonomous robot excavator LUCIE (Lancaster @@ -14100,36 +15437,40 @@ interactions: and safety problems are described.", "venue": "Proceedings of IEEE International Conference on Robotics and Automation", "year": 1996, "referenceCount": 11, "citationCount": 31, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1996-04-22", "journal": - {"volume": "1", "pages": "963-968 vol.1", "name": "Proceedings of IEEE International - Conference on Robotics and Automation"}, "authors": [{"authorId": "2953796", - "name": "D. Seward"}, {"authorId": "2842730", "name": "F. Margrave"}, {"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "2925032", "name": "Richard - Morrey"}]}, {"paperId": "d1ab898de3a9c6932b4f40eab122a3b4887b8575", "externalIds": - {"MAG": "2912641521", "CorpusId": 86675358}, "url": "https://www.semanticscholar.org/paper/d1ab898de3a9c6932b4f40eab122a3b4887b8575", + "openAccessPdf": {"url": "https://eprints.lancs.ac.uk/id/eprint/20429/1/20429.pdf", + "status": null}, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1996-04-22", + "journal": {"volume": "1", "pages": "963-968 vol.1", "name": "Proceedings + of IEEE International Conference on Robotics and Automation"}, "authors": + [{"authorId": "2953796", "name": "D. Seward"}, {"authorId": "2842730", "name": + "F. Margrave"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "2925032", "name": "Richard Morrey"}]}, {"paperId": "d1ab898de3a9c6932b4f40eab122a3b4887b8575", + "externalIds": {"MAG": "2912641521", "CorpusId": 86675358}, "corpusId": 86675358, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d1ab898de3a9c6932b4f40eab122a3b4887b8575", "title": "Proceedings of the SCM-6 Workshop on System Configuration Management", "abstract": null, "venue": "", "year": 1996, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": "1996-03-25", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "d983940d177bfc7141ba4dee18767c9ba9f064c2", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "1996-03-25", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "d983940d177bfc7141ba4dee18767c9ba9f064c2", "externalIds": {"MAG": "290771035", "DBLP": "conf/scm/1996", "DOI": "10.1007/BFb0023076", - "CorpusId": 108237222}, "url": "https://www.semanticscholar.org/paper/d983940d177bfc7141ba4dee18767c9ba9f064c2", + "CorpusId": 108237222}, "corpusId": 108237222, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d983940d177bfc7141ba4dee18767c9ba9f064c2", "title": "System Configuration Management, ICSE''96 SCM-6 Workshop, Berlin, Germany, March 25-26, 1996, Proceedings", "abstract": null, "venue": "SCM", "year": 1996, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "1167"}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "e1c7c5226bc41cc7128ddcdbd7afe13f3f3fa177", - "externalIds": {"DBLP": "journals/sigsoft/Sommerville96", "MAG": "1988181715", - "DOI": "10.1145/232069.232083", "CorpusId": 1252956}, "url": "https://www.semanticscholar.org/paper/e1c7c5226bc41cc7128ddcdbd7afe13f3f3fa177", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-540-49569-7%2F1", + "status": null}, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "1167"}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "e1c7c5226bc41cc7128ddcdbd7afe13f3f3fa177", "externalIds": {"DBLP": "journals/sigsoft/Sommerville96", + "MAG": "1988181715", "DOI": "10.1145/232069.232083", "CorpusId": 1252956}, + "corpusId": 1252956, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e1c7c5226bc41cc7128ddcdbd7afe13f3f3fa177", "title": "Sixth international workshop on software configuration management", "abstract": "The key objective of the workshop was to initiate a dialogue between practitioners in industry with CM problems and researchers developing @@ -14142,15 +15483,16 @@ interactions: demonstrat ions of SCM tools by Continuus Software Corporation and of a client-server system, implemented by the University of Karlsruhe, for revision control based on the W W W .", "venue": "SOEN", "year": 1996, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/232069.232083", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1996-07-01", "journal": {"volume": "21", "pages": "54-57", "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "e2716732ccd808884823889fe36e659499de9fee", "externalIds": {"DBLP": "conf/cds/WarrenS96", "MAG": "204698610", "DOI": "10.1109/CDS.1996.509349", "CorpusId": 2920899}, - "url": "https://www.semanticscholar.org/paper/e2716732ccd808884823889fe36e659499de9fee", + "corpusId": 2920899, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2716732ccd808884823889fe36e659499de9fee", "title": "A model for dynamic configuration which preserves application integrity", "abstract": "Our approach to dynamic configuration is based on building a model of reconfigurable applications. The model documents applications according @@ -14168,15 +15510,19 @@ interactions: components whose operations are constrained.", "venue": "Proceedings of International Conference on Configurable Distributed Systems", "year": 1996, "referenceCount": 15, "citationCount": 64, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "1996-05-06", "journal": {"pages": "81-88", "name": "Proceedings of International - Conference on Configurable Distributed Systems"}, "authors": [{"authorId": - "144702663", "name": "I. Warren"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "f3522499c1d143ed603bdaffda5d18859f775656", "externalIds": {"MAG": - "2046795207", "DBLP": "journals/iee/KotonyaS96", "DOI": "10.1049/sej.1996.0002", - "CorpusId": 206192725}, "url": "https://www.semanticscholar.org/paper/f3522499c1d143ed603bdaffda5d18859f775656", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1996-05-06", "journal": {"pages": "81-88", + "name": "Proceedings of International Conference on Configurable Distributed + Systems"}, "authors": [{"authorId": "144702663", "name": "I. Warren"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "f3522499c1d143ed603bdaffda5d18859f775656", + "externalIds": {"MAG": "2046795207", "DBLP": "journals/iee/KotonyaS96", "DOI": + "10.1049/sej.1996.0002", "CorpusId": 206192725}, "corpusId": 206192725, "publicationVenue": + {"id": "ed3076f2-967a-47c8-b60d-7bea15e28461", "name": "Software Engineering + Journal", "type": "journal", "alternate_names": ["Softw Eng J"], "issn": "0268-6961", + "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=2225", "alternate_urls": + ["https://digital-library.theiet.org/content/journals/sej"]}, "url": "https://www.semanticscholar.org/paper/f3522499c1d143ed603bdaffda5d18859f775656", "title": "Requirements engineering with viewpoints", "abstract": "The requirements engineering process involves a clear understanding of the requirements of the intended system. This includes the services required of the system, the @@ -14193,13 +15539,15 @@ interactions: how it improves on them. A simple example of a bank auto-teller system is used to demonstrate the method.", "venue": "Software Engineering Journal", "year": 1996, "referenceCount": 25, "citationCount": 336, "influentialCitationCount": - 25, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "11", "pages": "5-18", "name": - "Softw. Eng. J."}, "authors": [{"authorId": "1989772", "name": "G. Kotonya"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "f566f13a9444d45e11f2df8358f8536ad5a83907", - "externalIds": {"MAG": "1424764452", "CorpusId": 14997762}, "url": "https://www.semanticscholar.org/paper/f566f13a9444d45e11f2df8358f8536ad5a83907", + 25, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"volume": "11", "pages": "5-18", "name": "Softw. Eng. J."}, "authors": [{"authorId": + "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "f566f13a9444d45e11f2df8358f8536ad5a83907", "externalIds": {"MAG": + "1424764452", "CorpusId": 14997762}, "corpusId": 14997762, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f566f13a9444d45e11f2df8358f8536ad5a83907", "title": "The viewpoints FAQ", "abstract": "The structure of this brief paper follows an emerging convention the FAQ Frequently Asked Questions list. FAQs have grown out of Internet newgroups where participants, tired of seeing the @@ -14210,14 +15558,19 @@ interactions: somewhat tongue-in-cheek, to do the same for viewpoints. The FAQ serves as our introduction to the theme of the special issue papers which follow.", "venue": "", "year": 1996, "referenceCount": 15, "citationCount": 132, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": "Software Engineering Journal"}, "authors": - [{"authorId": "1714549", "name": "A. Finkelstein"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "19fe9ad10e63a3d096f433bb8aa652087505f1db", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": "Software + Engineering Journal"}, "authors": [{"authorId": "1714549", "name": "A. Finkelstein"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "19fe9ad10e63a3d096f433bb8aa652087505f1db", "externalIds": {"MAG": "2148611855", "DBLP": "conf/re/HughesORRS95", "DOI": - "10.1109/ISRE.1995.512543", "CorpusId": 6995911}, "url": "https://www.semanticscholar.org/paper/19fe9ad10e63a3d096f433bb8aa652087505f1db", + "10.1109/ISRE.1995.512543", "CorpusId": 6995911}, "corpusId": 6995911, "publicationVenue": + {"id": "647e2b25-1bff-4e4f-b507-e21dcb081788", "name": "IEEE International + Requirements Engineering Conference", "type": "conference", "alternate_names": + ["IEEE International Conference on Requirements Engineering", "RE", "IEEE + Int Requir Eng Conf", "IEEE Int Conf Requir Eng"], "url": "http://requirements-engineering.org/"}, + "url": "https://www.semanticscholar.org/paper/19fe9ad10e63a3d096f433bb8aa652087505f1db", "title": "Presenting ethnography in the requirements process", "abstract": "We argue that the industrial development of interactive systems has to recognise the social dimension of work if these systems are to fully meet the real needs @@ -14231,62 +15584,70 @@ interactions: on the use of number of viewpoints and is embodied within a general hypertext tool.", "venue": "IEEE International Requirements Engineering Conference", "year": 1995, "referenceCount": 28, "citationCount": 118, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Sociology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1995-03-27", "journal": {"pages": "27-34", "name": "Proceedings of 1995 IEEE - International Symposium on Requirements Engineering (RE''95)"}, "authors": - [{"authorId": "144426202", "name": "J. Hughes"}, {"authorId": "1402693446", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1995-03-27", "journal": {"pages": "27-34", "name": "Proceedings + of 1995 IEEE International Symposium on Requirements Engineering (RE''95)"}, + "authors": [{"authorId": "144426202", "name": "J. Hughes"}, {"authorId": "1402693446", "name": "J. O''Brien"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "2089073", "name": "M. Rouncefield"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "434de9a160d84f426788bda06408536e36a61a42", "externalIds": {"DBLP": "conf/sq/SommervilleMD95", "MAG": "143134725", "DOI": "10.1007/3-540-59449-3_29", - "CorpusId": 36155634}, "url": "https://www.semanticscholar.org/paper/434de9a160d84f426788bda06408536e36a61a42", + "CorpusId": 36155634}, "corpusId": 36155634, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/434de9a160d84f426788bda06408536e36a61a42", "title": "Practical Guidelines for Ada Reuse in an Industrial Environment", "abstract": null, "venue": "Objective Software Quality", "year": 1995, "referenceCount": 5, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1995-05-29", "journal": {"pages": "138-147"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "2150011", "name": "L. Masera"}, {"authorId": - "2080860506", "name": "C. Demaria"}]}, {"paperId": "48ce90c62df96e625e94aff6a08e32e3451fb12c", - "externalIds": {"DBLP": "conf/ewspt/SommervilleKVS95", "MAG": "2912885751", - "DOI": "10.1007/3-540-59205-9_35", "CorpusId": 5113789}, "url": "https://www.semanticscholar.org/paper/48ce90c62df96e625e94aff6a08e32e3451fb12c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1995-05-29", "journal": {"pages": "138-147"}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2150011", + "name": "L. Masera"}, {"authorId": "2080860506", "name": "C. Demaria"}]}, + {"paperId": "48ce90c62df96e625e94aff6a08e32e3451fb12c", "externalIds": {"DBLP": + "conf/ewspt/SommervilleKVS95", "MAG": "2912885751", "DOI": "10.1007/3-540-59205-9_35", + "CorpusId": 5113789}, "corpusId": 5113789, "publicationVenue": {"id": "afbe4089-f6a7-4ab7-ae05-29dae7fc1787", + "name": "European Workshop on Software Process Technology", "type": "conference", + "alternate_names": ["EWSPT", "Eur Workshop Softw Process Technol"]}, "url": + "https://www.semanticscholar.org/paper/48ce90c62df96e625e94aff6a08e32e3451fb12c", "title": "Process Viewpoints", "abstract": null, "venue": "European Workshop on Software Process Technology", "year": 1995, "referenceCount": 9, "citationCount": - 31, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-04-03", "journal": {"pages": "2-8"}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "1989772", "name": "G. - Kotonya"}, {"authorId": "1788802", "name": "Stephen Viller"}, {"authorId": - "144076208", "name": "P. Sawyer"}]}, {"paperId": "4a6abece30b82561b122c21162f9192a42a7dce6", - "externalIds": {"DBLP": "conf/esec/WarrenS95", "MAG": "1515424471", "DOI": - "10.1007/3-540-60406-5_14", "CorpusId": 14047480}, "url": "https://www.semanticscholar.org/paper/4a6abece30b82561b122c21162f9192a42a7dce6", + 31, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-04-03", "journal": + {"pages": "2-8"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": "1788802", "name": + "Stephen Viller"}, {"authorId": "144076208", "name": "P. Sawyer"}]}, {"paperId": + "4a6abece30b82561b122c21162f9192a42a7dce6", "externalIds": {"DBLP": "conf/esec/WarrenS95", + "MAG": "1515424471", "DOI": "10.1007/3-540-60406-5_14", "CorpusId": 14047480}, + "corpusId": 14047480, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4a6abece30b82561b122c21162f9192a42a7dce6", "title": "Dynamic Configuration Abstraction", "abstract": null, "venue": "ESEC", "year": 1995, "referenceCount": 16, "citationCount": 15, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-09-25", "journal": {"pages": "173-190"}, "authors": - [{"authorId": "144702663", "name": "I. Warren"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "4e0791ffe7874152be48ba1684bf1a397f0b2cad", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-09-25", "journal": + {"pages": "173-190"}, "authors": [{"authorId": "144702663", "name": "I. Warren"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "4e0791ffe7874152be48ba1684bf1a397f0b2cad", "externalIds": {"MAG": "163390096", "DOI": "10.1007/978-1-4471-3003-1_10", - "CorpusId": 107710347}, "url": "https://www.semanticscholar.org/paper/4e0791ffe7874152be48ba1684bf1a397f0b2cad", + "CorpusId": 107710347}, "corpusId": 107710347, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4e0791ffe7874152be48ba1684bf1a397f0b2cad", "title": "Safe Systems for Mobile Robots The Safe-SAM project", "abstract": null, "venue": "", "year": 1995, "referenceCount": 15, "citationCount": 3, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "pages": "153-170", "name": - ""}, "authors": [{"authorId": "2953796", "name": "D. Seward"}, {"authorId": - "2842730", "name": "F. Margrave"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "95852867", "name": "G. Kotony"}]}, {"paperId": "4eba79d04351ff84cde1a5493c19fe45300ae92f", - "externalIds": {"DBLP": "conf/seke/RamachandranLS95", "MAG": "200326475", - "CorpusId": 39483146}, "url": "https://www.semanticscholar.org/paper/4eba79d04351ff84cde1a5493c19fe45300ae92f", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "153-170", "name": ""}, "authors": [{"authorId": "2953796", "name": + "D. Seward"}, {"authorId": "2842730", "name": "F. Margrave"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "95852867", "name": "G. + Kotony"}]}, {"paperId": "4eba79d04351ff84cde1a5493c19fe45300ae92f", "externalIds": + {"DBLP": "conf/seke/RamachandranLS95", "MAG": "200326475", "CorpusId": 39483146}, + "corpusId": 39483146, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4eba79d04351ff84cde1a5493c19fe45300ae92f", "title": "A Framework for Analysing Reuse Knowledge", "abstract": "Practical reuse guidelines can play a major role in the production of potentially reusable components and can also provide designers with a means to assess and improve @@ -14296,68 +15657,84 @@ interactions: unrealisable. This paper concentrates on our approach for automating practical reuse guidelines and provides a framework for developing reusable components.", "venue": "SEKE", "year": 1995, "referenceCount": 7, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "220-225"}, "authors": [{"authorId": - "1785144", "name": "M. Ramachandran"}, {"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "5aa960002d487f32d621904b0883ccc7c44a4f06", "externalIds": - {"MAG": "46690460", "CorpusId": 108024039}, "url": "https://www.semanticscholar.org/paper/5aa960002d487f32d621904b0883ccc7c44a4f06", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "220-225"}, "authors": [{"authorId": "1785144", "name": "M. Ramachandran"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "5aa960002d487f32d621904b0883ccc7c44a4f06", + "externalIds": {"MAG": "46690460", "CorpusId": 108024039}, "corpusId": 108024039, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5aa960002d487f32d621904b0883ccc7c44a4f06", "title": "Software engineering (5th ed.)", "abstract": null, "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 222, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1995-11-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "7592c509f1cce93d27d43f1d43a38b9ae1f02c4c", - "externalIds": {"MAG": "1575085408", "DBLP": "conf/vdb/SawyerCMS95", "DOI": - "10.1007/978-0-387-34905-3_18", "CorpusId": 9463858}, "url": "https://www.semanticscholar.org/paper/7592c509f1cce93d27d43f1d43a38b9ae1f02c4c", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1995-11-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "7592c509f1cce93d27d43f1d43a38b9ae1f02c4c", "externalIds": {"MAG": + "1575085408", "DBLP": "conf/vdb/SawyerCMS95", "DOI": "10.1007/978-0-387-34905-3_18", + "CorpusId": 9463858}, "corpusId": 9463858, "publicationVenue": {"id": "9837c91a-0d55-4cf6-a328-3240906c411f", + "name": "Visual Database Systems", "type": "conference", "alternate_names": + ["VDB", "Vis Database Syst"], "url": "http://wise.vub.ac.be/ifipwg26/"}, "url": + "https://www.semanticscholar.org/paper/7592c509f1cce93d27d43f1d43a38b9ae1f02c4c", "title": "Database Object Display Definition and Management with Moggetto", "abstract": null, "venue": "Visual Database Systems", "year": 1997, "referenceCount": 41, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F978-0-387-34905-3_18.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1997-06-01", "journal": {"pages": "289-303"}, "authors": + [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "2501449", "name": + "A. Colebourne"}, {"authorId": "1707662", "name": "J. Mariani"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "8cd060d263b68fa1e0e8bdf38200b19390183d66", + "externalIds": {"DBLP": "conf/esec/MonkSPD95", "MAG": "1497479669", "DOI": + "10.1007/3-540-60406-5_22", "CorpusId": 14440168}, "corpusId": 14440168, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8cd060d263b68fa1e0e8bdf38200b19390183d66", + "title": "Supporting Design Rationale for System Evolution", "abstract": null, + "venue": "ESEC", "year": 1995, "referenceCount": 16, "citationCount": 17, + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1997-06-01", "journal": {"pages": "289-303"}, "authors": [{"authorId": "144076208", - "name": "P. Sawyer"}, {"authorId": "2501449", "name": "A. Colebourne"}, {"authorId": - "1707662", "name": "J. Mariani"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "8cd060d263b68fa1e0e8bdf38200b19390183d66", "externalIds": {"DBLP": - "conf/esec/MonkSPD95", "MAG": "1497479669", "DOI": "10.1007/3-540-60406-5_22", - "CorpusId": 14440168}, "url": "https://www.semanticscholar.org/paper/8cd060d263b68fa1e0e8bdf38200b19390183d66", - "title": "Supporting Design Rationale for System Evolution", "abstract": null, - "venue": "ESEC", "year": 1995, "referenceCount": 16, "citationCount": 17, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1995-09-25", "journal": - {"pages": "307-323"}, "authors": [{"authorId": "26458266", "name": "S. Monk"}, - {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2420721", - "name": "Jean Michel Pendaries"}, {"authorId": "49848479", "name": "Bernard - Durin"}]}, {"paperId": "e8bfcd6f1bc2a1640b3600b88cfe6cfac5d678da", "externalIds": - {"MAG": "2049711042", "DBLP": "journals/infsof/SawyerS95", "DOI": "10.1016/0950-5849(95)90812-9", - "CorpusId": 30288323}, "url": "https://www.semanticscholar.org/paper/e8bfcd6f1bc2a1640b3600b88cfe6cfac5d678da", + "1995-09-25", "journal": {"pages": "307-323"}, "authors": [{"authorId": "26458266", + "name": "S. Monk"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "2420721", "name": "Jean Michel Pendaries"}, {"authorId": "49848479", "name": + "Bernard Durin"}]}, {"paperId": "e8bfcd6f1bc2a1640b3600b88cfe6cfac5d678da", + "externalIds": {"MAG": "2049711042", "DBLP": "journals/infsof/SawyerS95", + "DOI": "10.1016/0950-5849(95)90812-9", "CorpusId": 30288323}, "corpusId": + 30288323, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e8bfcd6f1bc2a1640b3600b88cfe6cfac5d678da", "title": "MGA: Rule-based specification of active object-oriented database applications", "abstract": null, "venue": "Inf. Softw. Technol.", "year": 1995, "referenceCount": 16, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "37", "pages": "203-211", "name": - "Inf. Softw. Technol."}, "authors": [{"authorId": "144076208", "name": "P. - Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "02e17e2bb421d36aad5b825e33415af9ff5506cd", "externalIds": {"MAG": "2013245376", - "DOI": "10.1016/0360-1315(94)90079-5", "CorpusId": 19028998}, "url": "https://www.semanticscholar.org/paper/02e17e2bb421d36aad5b825e33415af9ff5506cd", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"volume": "37", "pages": "203-211", "name": "Inf. Softw. Technol."}, "authors": + [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "02e17e2bb421d36aad5b825e33415af9ff5506cd", + "externalIds": {"MAG": "2013245376", "DOI": "10.1016/0360-1315(94)90079-5", + "CorpusId": 19028998}, "corpusId": 19028998, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/02e17e2bb421d36aad5b825e33415af9ff5506cd", "title": "The use of a computational tool to support the refinement of ideas", "abstract": null, "venue": "", "year": 1994, "referenceCount": 14, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1994-01-15", "journal": {"volume": - "22", "pages": "107-118", "name": "Computer Education"}, "authors": [{"authorId": - "1772877", "name": "M. Twidale"}, {"authorId": "145282573", "name": "T. Rodden"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "4cb01610137d2267c0f4b613be94577ee028e37c", - "externalIds": {"MAG": "1991551023", "DBLP": "journals/computer/BentleyRSS94", - "DOI": "10.1109/2.291292", "CorpusId": 3203767}, "url": "https://www.semanticscholar.org/paper/4cb01610137d2267c0f4b613be94577ee028e37c", + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-01-15", + "journal": {"volume": "22", "pages": "107-118", "name": "Computer Education"}, + "authors": [{"authorId": "1772877", "name": "M. Twidale"}, {"authorId": "145282573", + "name": "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "4cb01610137d2267c0f4b613be94577ee028e37c", "externalIds": {"MAG": + "1991551023", "DBLP": "journals/computer/BentleyRSS94", "DOI": "10.1109/2.291292", + "CorpusId": 3203767}, "corpusId": 3203767, "publicationVenue": {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", + "name": "Computer", "type": "journal", "alternate_names": ["IEEE Computer", + "IEEE Comput"], "issn": "0018-9162", "url": "http://www.computer.org/computer", + "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/4cb01610137d2267c0f4b613be94577ee028e37c", "title": "Architectural support for cooperative multiuser interfaces", "abstract": "Computer support for cooperative work requires the construction of applications that support interaction by multiple users. The highly dynamic and flexible @@ -14374,15 +15751,16 @@ interactions: user-interface designs for air traffic controllers. Thus, we use examples from this domain to illustrate the architecture.<>", "venue": "Computer", "year": 1994, "referenceCount": 17, "citationCount": 72, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1994-05-01", "journal": {"volume": "27", "pages": "37-46", - "name": "Computer"}, "authors": [{"authorId": "144122831", "name": "R. Bentley"}, - {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "144076208", - "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "7f329b015263c0b7ad922904acebb652a315e52e", "externalIds": {"MAG": - "2158017052", "CorpusId": 61733867}, "url": "https://www.semanticscholar.org/paper/7f329b015263c0b7ad922904acebb652a315e52e", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1994-05-01", "journal": + {"volume": "27", "pages": "37-46", "name": "Computer"}, "authors": [{"authorId": + "144122831", "name": "R. Bentley"}, {"authorId": "145282573", "name": "T. + Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "7f329b015263c0b7ad922904acebb652a315e52e", + "externalIds": {"MAG": "2158017052", "CorpusId": 61733867}, "corpusId": 61733867, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f329b015263c0b7ad922904acebb652a315e52e", "title": "PCL-a language for modelling system architecture", "abstract": "There exist a number of CASE tools to support software re-engineering in several different languages. These tools automatically or semi-automatically analyse @@ -14402,13 +15780,15 @@ interactions: or heterogeneous. PCL addresses the problem of architectural variability so that the architectural descriptions of different system versions may be combined into a single model. >", "venue": "", "year": 1994, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1994-11-10", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "40101012", "name": "G. Dean"}]}, {"paperId": "86d7048a9d7989be5bf79350d1f0f5ab03134a76", - "externalIds": {"MAG": "2163417017", "CorpusId": 62485025}, "url": "https://www.semanticscholar.org/paper/86d7048a9d7989be5bf79350d1f0f5ab03134a76", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-11-10", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "40101012", "name": "G. Dean"}]}, + {"paperId": "86d7048a9d7989be5bf79350d1f0f5ab03134a76", "externalIds": {"MAG": + "2163417017", "CorpusId": 62485025}, "corpusId": 62485025, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/86d7048a9d7989be5bf79350d1f0f5ab03134a76", "title": "Requirements Engineering for Cooperative Systems", "abstract": "This paper addresses the problem of \u2018production-quality\u2019 CSCW software development where software is developed from an agreed statement of the system @@ -14424,23 +15804,25 @@ interactions: is a longterm research goal. However, we suggest shorter-term results can be obtained by using integrated tools for ethnography and requirements capture.", "venue": "", "year": 1994, "referenceCount": 25, "citationCount": 17, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "145282573", "name": "T. Rodden"}]}, - {"paperId": "8d2999dd0c37fe6f6d62c2994b9ffc52f891a962", "externalIds": {"MAG": - "192144575", "DBLP": "conf/ewspt/Sommerville94", "DOI": "10.1007/3-540-57739-4_25", - "CorpusId": 37851586}, "url": "https://www.semanticscholar.org/paper/8d2999dd0c37fe6f6d62c2994b9ffc52f891a962", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "145282573", + "name": "T. Rodden"}]}, {"paperId": "8d2999dd0c37fe6f6d62c2994b9ffc52f891a962", + "externalIds": {"MAG": "192144575", "DBLP": "conf/ewspt/Sommerville94", "DOI": + "10.1007/3-540-57739-4_25", "CorpusId": 37851586}, "corpusId": 37851586, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8d2999dd0c37fe6f6d62c2994b9ffc52f891a962", "title": "Experiences with Software Process Technology Session", "abstract": null, "venue": "EWSPT", "year": 1994, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1994-02-07", "journal": {"pages": "186"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "9262ac27c04e96fd12fda6ff3d97cce5859ff3f0", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-02-07", "journal": {"pages": "186"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "9262ac27c04e96fd12fda6ff3d97cce5859ff3f0", "externalIds": {"MAG": "2115759670", "DBLP": "conf/cds/SommervilleD94", "DOI": - "10.1109/IWCDS.1994.289919", "CorpusId": 38826153}, "url": "https://www.semanticscholar.org/paper/9262ac27c04e96fd12fda6ff3d97cce5859ff3f0", + "10.1109/IWCDS.1994.289919", "CorpusId": 38826153}, "corpusId": 38826153, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9262ac27c04e96fd12fda6ff3d97cce5859ff3f0", "title": "Configuration language support for software installation", "abstract": "Summary form only given. The authors describe facilities which have been included in a configuration language called PCL to support the process of @@ -14459,14 +15841,15 @@ interactions: heterogeneous networks.<>", "venue": "Proceedings of 2nd International Workshop on Configurable Distributed Systems", "year": 1994, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1994-03-21", "journal": {"pages": "209-", "name": "Proceedings of 2nd International - Workshop on Configurable Distributed Systems"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "40101012", "name": "G. Dean"}]}, - {"paperId": "953a7c15713418bcd78df47c0b7b88805a893bdd", "externalIds": {"CorpusId": - 1704703}, "url": "https://www.semanticscholar.org/paper/953a7c15713418bcd78df47c0b7b88805a893bdd", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-03-21", "journal": {"pages": "209-", "name": "Proceedings + of 2nd International Workshop on Configurable Distributed Systems"}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "40101012", + "name": "G. Dean"}]}, {"paperId": "953a7c15713418bcd78df47c0b7b88805a893bdd", + "externalIds": {"CorpusId": 1704703}, "corpusId": 1704703, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/953a7c15713418bcd78df47c0b7b88805a893bdd", "title": "NIVERSITY Requirements Engineering for Cooperative Systems", "abstract": "This paper addresses the problem of \u2018production-quality\u2019 CSCW software development where software is developed from an agreed statement of the system @@ -14482,73 +15865,88 @@ interactions: is a longterm research goal. However, we suggest shorter-term results can be obtained by using integrated tools for ethnography and requirements capture.", "venue": "", "year": 1994, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "b3a655ccafa6dcd0383be887b46fde0f5ae6b5c8", "externalIds": {"DBLP": "conf/ewspt/SommervilleM94", "MAG": "1607212299", - "DOI": "10.1007/3-540-57739-4_15", "CorpusId": 33052876}, "url": "https://www.semanticscholar.org/paper/b3a655ccafa6dcd0383be887b46fde0f5ae6b5c8", + "DOI": "10.1007/3-540-57739-4_15", "CorpusId": 33052876}, "corpusId": 33052876, + "publicationVenue": {"id": "afbe4089-f6a7-4ab7-ae05-29dae7fc1787", "name": + "European Workshop on Software Process Technology", "type": "conference", + "alternate_names": ["EWSPT", "Eur Workshop Softw Process Technol"]}, "url": + "https://www.semanticscholar.org/paper/b3a655ccafa6dcd0383be887b46fde0f5ae6b5c8", "title": "Supporting Informality in the Software Process", "abstract": null, "venue": "European Workshop on Software Process Technology", "year": 1994, "referenceCount": 5, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1994-02-07", "journal": {"pages": "114-118"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "26458266", "name": "S. Monk"}]}, - {"paperId": "b4f7947e7568923c5fda912af04e0cbc3568da5a", "externalIds": {"MAG": - "1969272833", "DOI": "10.1049/sej.1994.0012", "CorpusId": 109712442}, "url": - "https://www.semanticscholar.org/paper/b4f7947e7568923c5fda912af04e0cbc3568da5a", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-02-07", "journal": {"pages": "114-118"}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "26458266", + "name": "S. Monk"}]}, {"paperId": "b4f7947e7568923c5fda912af04e0cbc3568da5a", + "externalIds": {"MAG": "1969272833", "DOI": "10.1049/sej.1994.0012", "CorpusId": + 109712442}, "corpusId": 109712442, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b4f7947e7568923c5fda912af04e0cbc3568da5a", "title": "Book review: Improving Software Quality: an Insider''s Guide to TQM", "abstract": null, "venue": "", "year": 1994, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}], "publicationTypes": ["Review"], "publicationDate": null, "journal": - null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "c08970417617dd469bb7b96b94da9c0f4175758f", "externalIds": {"MAG": "57028567", - "DOI": "10.1007/978-3-642-57899-1_19", "CorpusId": 17691096}, "url": "https://www.semanticscholar.org/paper/c08970417617dd469bb7b96b94da9c0f4175758f", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "c08970417617dd469bb7b96b94da9c0f4175758f", "externalIds": {"MAG": + "57028567", "DOI": "10.1007/978-3-642-57899-1_19", "CorpusId": 17691096}, + "corpusId": 17691096, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c08970417617dd469bb7b96b94da9c0f4175758f", "title": "Developing a Tool to Support Collaborative Dialogues and Graphical Representation of Ideas", "abstract": null, "venue": "", "year": 1994, "referenceCount": 24, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "219-235", "name": ""}, "authors": [{"authorId": "1772877", - "name": "M. Twidale"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "c9936990252b31ee96b3ee12e8a2041f94c72843", - "externalIds": {"MAG": "2083232328", "DOI": "10.1049/sej.1994.0029", "CorpusId": - 62737826}, "url": "https://www.semanticscholar.org/paper/c9936990252b31ee96b3ee12e8a2041f94c72843", - "title": "Software Engineering: Principles and Practice", "abstract": null, - "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "9", "pages": "228", "name": "Software Engineering - Journal"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "d4298933baadf578553798e3cab261bf55926f2a", "externalIds": {"DBLP": - "conf/ewspt/RoddenKHS94", "MAG": "1883567365", "DOI": "10.1007/3-540-57739-4_8", - "CorpusId": 29410511}, "url": "https://www.semanticscholar.org/paper/d4298933baadf578553798e3cab261bf55926f2a", + null, "journal": {"volume": "", "pages": "219-235", "name": ""}, "authors": + [{"authorId": "1772877", "name": "M. Twidale"}, {"authorId": "145282573", + "name": "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "c9936990252b31ee96b3ee12e8a2041f94c72843", "externalIds": {"MAG": + "2083232328", "DOI": "10.1049/sej.1994.0029", "CorpusId": 62737826}, "corpusId": + 62737826, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c9936990252b31ee96b3ee12e8a2041f94c72843", + "title": "Software Engineering: Principles and Practice", "abstract": null, + "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "9", + "pages": "228", "name": "Software Engineering Journal"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "d4298933baadf578553798e3cab261bf55926f2a", + "externalIds": {"DBLP": "conf/ewspt/RoddenKHS94", "MAG": "1883567365", "DOI": + "10.1007/3-540-57739-4_8", "CorpusId": 29410511}, "corpusId": 29410511, "publicationVenue": + {"id": "afbe4089-f6a7-4ab7-ae05-29dae7fc1787", "name": "European Workshop + on Software Process Technology", "type": "conference", "alternate_names": + ["EWSPT", "Eur Workshop Softw Process Technol"]}, "url": "https://www.semanticscholar.org/paper/d4298933baadf578553798e3cab261bf55926f2a", "title": "Process Modelling and Development Practice", "abstract": null, "venue": "European Workshop on Software Process Technology", "year": 1994, "referenceCount": 10, "citationCount": 21, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1994-02-07", "journal": {"pages": "59-64"}, "authors": - [{"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "31459595", - "name": "Val King"}, {"authorId": "144426202", "name": "J. Hughes"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "d590cacd0e4fcad2c88c306260cf4e9867863134", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1994-02-07", "journal": {"pages": + "59-64"}, "authors": [{"authorId": "145282573", "name": "T. Rodden"}, {"authorId": + "31459595", "name": "Val King"}, {"authorId": "144426202", "name": "J. Hughes"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "d590cacd0e4fcad2c88c306260cf4e9867863134", "externalIds": {"DBLP": "journals/tse/Sommerville94", "DOI": "10.1109/TSE.1994.10003", - "CorpusId": 32680888}, "url": "https://www.semanticscholar.org/paper/d590cacd0e4fcad2c88c306260cf4e9867863134", + "CorpusId": 32680888}, "corpusId": 32680888, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d590cacd0e4fcad2c88c306260cf4e9867863134", "title": "Introduction to the Special Issue", "abstract": null, "venue": "IEEE Trans. Software Eng.", "year": 1994, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "20", "pages": "546-547", "name": "IEEE Trans. - Software Eng."}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "d698e474736077ea31478d910e7e73aac5737b74", "externalIds": {"MAG": - "2070388448", "DBLP": "journals/cj/SommervilleBRS94", "DOI": "10.1093/comjnl/37.5.357", - "CorpusId": 18261030}, "url": "https://www.semanticscholar.org/paper/d698e474736077ea31478d910e7e73aac5737b74", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "20", "pages": "546-547", "name": + "IEEE Trans. Software Eng."}, "authors": [{"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "d698e474736077ea31478d910e7e73aac5737b74", + "externalIds": {"MAG": "2070388448", "DBLP": "journals/cj/SommervilleBRS94", + "DOI": "10.1093/comjnl/37.5.357", "CorpusId": 18261030}, "corpusId": 18261030, + "publicationVenue": {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", "name": + "Computer/law journal", "type": "journal", "alternate_names": ["Computer journal", + "The Computer Journal", "Comput j", "Comput J"], "issn": "0164-8756", "alternate_issns": + ["0010-4620"], "url": "https://repository.jmls.edu/jitpl/all_issues.html", + "alternate_urls": ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/d698e474736077ea31478d910e7e73aac5737b74", "title": "Cooperative Systems Design", "abstract": "This paper discusses an innovative experiment where sociologists were actively involved in the requirements analysis for an interactive software system to support the work of air traffic @@ -14564,27 +15962,33 @@ interactions: of inter-disciplinary cooperative working and suggest how social analysis can be integrated in the interactive systems design process.", "venue": "Computer/law journal", "year": 1994, "referenceCount": 31, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "37", "pages": "357-366", "name": "Comput. J."}, - "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "144122831", "name": "R. Bentley"}, {"authorId": "145282573", "name": "T. - Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}]}, {"paperId": "1473800fd1e5b441087cbefaa96df5aba9a763e2", - "externalIds": {"DBLP": "journals/iwc/HughesSBR93", "MAG": "1981317505", "DOI": - "10.1016/0953-5438(93)90020-T", "CorpusId": 15551907}, "url": "https://www.semanticscholar.org/paper/1473800fd1e5b441087cbefaa96df5aba9a763e2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"volume": "37", "pages": + "357-366", "name": "Comput. J."}, "authors": [{"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "144122831", "name": "R. Bentley"}, {"authorId": + "145282573", "name": "T. Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}]}, + {"paperId": "1473800fd1e5b441087cbefaa96df5aba9a763e2", "externalIds": {"DBLP": + "journals/iwc/HughesSBR93", "MAG": "1981317505", "DOI": "10.1016/0953-5438(93)90020-T", + "CorpusId": 15551907}, "corpusId": 15551907, "publicationVenue": {"id": "b9f99919-55d3-4827-8568-640824b354b9", + "name": "Interacting with computers", "type": "journal", "alternate_names": + ["Interact comput", "Interacting with Computers", "Interact Comput"], "issn": + "0953-5438", "url": "http://iwc.oxfordjournals.org/"}, "url": "https://www.semanticscholar.org/paper/1473800fd1e5b441087cbefaa96df5aba9a763e2", "title": "Designing with Ethnography: Making Work Visible", "abstract": null, "venue": "Interacting with computers", "year": 1993, "referenceCount": 24, "citationCount": 77, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1993-06-01", - "journal": {"volume": "5", "pages": "239-253", "name": "Interact. Comput."}, - "authors": [{"authorId": "144426202", "name": "J. Hughes"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "144122831", "name": "R. Bentley"}, - {"authorId": "1872433", "name": "D. Randall"}]}, {"paperId": "15e3a79bb797b285ac00f5eb5496b0df1b05113b", - "externalIds": {"DBLP": "journals/sigmod/MonkS93", "MAG": "1996344618", "DOI": - "10.1145/163090.163094", "CorpusId": 1561535}, "url": "https://www.semanticscholar.org/paper/15e3a79bb797b285ac00f5eb5496b0df1b05113b", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "1993-06-01", "journal": {"volume": "5", "pages": "239-253", + "name": "Interact. Comput."}, "authors": [{"authorId": "144426202", "name": + "J. Hughes"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "144122831", "name": "R. Bentley"}, {"authorId": "1872433", "name": "D. Randall"}]}, + {"paperId": "15e3a79bb797b285ac00f5eb5496b0df1b05113b", "externalIds": {"DBLP": + "journals/sigmod/MonkS93", "MAG": "1996344618", "DOI": "10.1145/163090.163094", + "CorpusId": 1561535}, "corpusId": 1561535, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/15e3a79bb797b285ac00f5eb5496b0df1b05113b", "title": "Schema evolution in OODBs using class versioning", "abstract": "This paper describes work carried out on a model for the versioning of class definitions in an object-oriented database. By defining update and backdate functions @@ -14593,14 +15997,17 @@ interactions: This allows programs written to access an old version of the schema to still use data created in the format of the changed schema.", "venue": "SGMD", "year": 1993, "referenceCount": 17, "citationCount": 136, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-09-01", "journal": {"volume": "22", "pages": "16-22", - "name": "SIGMOD Rec."}, "authors": [{"authorId": "26458266", "name": "S. Monk"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "17e63079e2df6556b27a5d0e75fca201c72cc60e", - "externalIds": {"MAG": "2139470555", "DOI": "10.1109/SEE.1993.388413", "CorpusId": - 54975098}, "url": "https://www.semanticscholar.org/paper/17e63079e2df6556b27a5d0e75fca201c72cc60e", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1993-09-01", "journal": + {"volume": "22", "pages": "16-22", "name": "SIGMOD Rec."}, "authors": [{"authorId": + "26458266", "name": "S. Monk"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "17e63079e2df6556b27a5d0e75fca201c72cc60e", "externalIds": {"MAG": + "2139470555", "DOI": "10.1109/SEE.1993.388413", "CorpusId": 54975098}, "corpusId": + 54975098, "publicationVenue": {"id": "7f2e6981-188c-44dc-97e9-068239f0ea9e", + "name": "Software Engineering Environments", "type": "conference", "alternate_names": + ["SEE", "Softw Eng Environ"]}, "url": "https://www.semanticscholar.org/paper/17e63079e2df6556b27a5d0e75fca201c72cc60e", "title": "Environments for cooperative systems development", "abstract": "Environments designed to support software engineering have historically provide little support for cooperative working. This work examines the nature of these environments @@ -14612,46 +16019,60 @@ interactions: and reuse, which incorporates domain knowledge and which provides a lightweight mechanism for component communication. We also describe a prototype environment to support CSCW systems development which realizes this architecture.<>", - "venue": "1993 Software Engineering Environments", "year": 1993, "referenceCount": + "venue": "Software Engineering Environments", "year": 1993, "referenceCount": 25, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1993-07-07", "journal": {"pages": - "144-155", "name": "1993 Software Engineering Environments"}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "121880064", "name": "T. - Rodden"}]}, {"paperId": "27e74eba160c924a46a5b983426d96c9888860db", "externalIds": - {"DBLP": "conf/ecscw/TwidaleRS93", "MAG": "1568457597", "DOI": "10.1007/978-94-011-2094-4_7", - "CorpusId": 985137}, "url": "https://www.semanticscholar.org/paper/27e74eba160c924a46a5b983426d96c9888860db", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1993-07-07", "journal": {"pages": "144-155", "name": "1993 Software Engineering + Environments"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "121880064", "name": "T. Rodden"}]}, {"paperId": "27e74eba160c924a46a5b983426d96c9888860db", + "externalIds": {"DBLP": "conf/ecscw/TwidaleRS93", "MAG": "1568457597", "DOI": + "10.1007/978-94-011-2094-4_7", "CorpusId": 985137}, "corpusId": 985137, "publicationVenue": + {"id": "f2ee2e5e-a3d5-4cff-98e3-c7c6f7409f5e", "name": "European Conference + on Computer Supported Cooperative Work", "type": "conference", "alternate_names": + ["ECSCW", "Eur Conf Comput Support Cooperative Work"], "url": "https://web.archive.org/web/*/http://www.ecscw.org/"}, + "url": "https://www.semanticscholar.org/paper/27e74eba160c924a46a5b983426d96c9888860db", "title": "The Designers'' Notepad: Supporting and Understanding Cooperative Design", "abstract": null, "venue": "European Conference on Computer Supported Cooperative Work", "year": 1993, "referenceCount": 32, "citationCount": 59, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1993-09-13", "journal": - {"pages": "91-"}, "authors": [{"authorId": "1772877", "name": "M. Twidale"}, - {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "43463a8ceaa648d2d85c137c719f83a77cd8edb6", - "externalIds": {"MAG": "33987646", "CorpusId": 59716905}, "url": "https://www.semanticscholar.org/paper/43463a8ceaa648d2d85c137c719f83a77cd8edb6", + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1993-09-13", "journal": {"pages": "91-"}, "authors": [{"authorId": "1772877", + "name": "M. Twidale"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "43463a8ceaa648d2d85c137c719f83a77cd8edb6", + "externalIds": {"MAG": "33987646", "CorpusId": 59716905}, "corpusId": 59716905, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43463a8ceaa648d2d85c137c719f83a77cd8edb6", "title": "Software engineering (4th ed.): instructor''s guide", "abstract": null, "venue": "", "year": 1993, "referenceCount": 0, "citationCount": 4, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "1993-01-02", "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. - Sommerville"}]}, {"paperId": "45db5612a79eaff1fb63c3d98e7bf1b8a0bd94e1", "externalIds": - {"DBLP": "conf/esec/1993", "MAG": "2495094254", "DOI": "10.1007/3-540-57209-0", - "CorpusId": 45950959}, "url": "https://www.semanticscholar.org/paper/45db5612a79eaff1fb63c3d98e7bf1b8a0bd94e1", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "1993-01-02", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "45db5612a79eaff1fb63c3d98e7bf1b8a0bd94e1", + "externalIds": {"DBLP": "conf/esec/1993", "MAG": "2495094254", "DOI": "10.1007/3-540-57209-0", + "CorpusId": 45950959}, "corpusId": 45950959, "publicationVenue": {"id": "2f5d0e8a-faad-4f10-b323-2b2e3c439a78", + "name": "Lecture Notes in Computer Science", "type": "journal", "alternate_names": + ["LNCS", "Transactions on Computational Systems Biology", "Trans Comput Syst + Biology", "Lect Note Comput Sci"], "issn": "0302-9743", "alternate_issns": + ["1861-2059", "1861-2075", "1866-4733"], "url": "http://www.springer.com/lncs", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-164-2-73659-0,00.html", + "https://link.springer.com/bookseries/558", "http://link.springer.com/search?query=\"Transactions+on+Computational+Systems+Biology\""]}, + "url": "https://www.semanticscholar.org/paper/45db5612a79eaff1fb63c3d98e7bf1b8a0bd94e1", "title": "Software Engineering \u2014 ESEC ''93", "abstract": null, "venue": "Lecture Notes in Computer Science", "year": 1993, "referenceCount": 0, "citationCount": - 18, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "717"}, - "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "39688805", "name": "M. Paul"}]}, {"paperId": "46ffd8c21d8798cc4e54ae26d10794e35c579df0", - "externalIds": {"MAG": "1972733152", "DOI": "10.1080/09544829308914771", "CorpusId": - 61039846}, "url": "https://www.semanticscholar.org/paper/46ffd8c21d8798cc4e54ae26d10794e35c579df0", + 18, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-540-47972-7%2F1", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "717"}, "authors": [{"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "39688805", "name": "M. Paul"}]}, {"paperId": + "46ffd8c21d8798cc4e54ae26d10794e35c579df0", "externalIds": {"MAG": "1972733152", + "DOI": "10.1080/09544829308914771", "CorpusId": 61039846}, "corpusId": 61039846, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/46ffd8c21d8798cc4e54ae26d10794e35c579df0", "title": "Semantic Modelling of Engineering Designs", "abstract": "The entity-relationship (E-R) approach is a widely used technique for the semantic modelling of commercial database systems. This paper demonstrates that the E-R method can also be @@ -14663,15 +16084,17 @@ interactions: implementation of an object-oriented intelligent CAD system. Finally, conclusions on the suitability of the entity-relationship for engineering knowledge representation are drawn.", "venue": "", "year": 1993, "referenceCount": 9, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "4", - "pages": "41-54", "name": "Journal of Engineering Design"}, "authors": [{"authorId": - "1402222797", "name": "A. Taleb-Bendiab"}, {"authorId": "40623246", "name": - "V. Oh"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "50173774", "name": "M. French"}]}, {"paperId": "55e8e2a5f4cf0ba8a7fd02f8695ec527c8da4d1b", - "externalIds": {"MAG": "1543843750", "CorpusId": 60950337}, "url": "https://www.semanticscholar.org/paper/55e8e2a5f4cf0ba8a7fd02f8695ec527c8da4d1b", + 4, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "4", "pages": "41-54", "name": "Journal of Engineering + Design"}, "authors": [{"authorId": "1402222797", "name": "A. Taleb-Bendiab"}, + {"authorId": "40623246", "name": "V. Oh"}, {"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "50173774", "name": "M. French"}]}, {"paperId": + "55e8e2a5f4cf0ba8a7fd02f8695ec527c8da4d1b", "externalIds": {"MAG": "1543843750", + "CorpusId": 60950337}, "corpusId": 60950337, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/55e8e2a5f4cf0ba8a7fd02f8695ec527c8da4d1b", "title": "Software Engineering-Esec ''93: 4th European Software Engineering Conference Garmisch-Partenkirchen, Germany September 13-17, 1993 Proceedings", "abstract": "On the decline of classical programming.- Computers are not omnipotent.- @@ -14702,53 +16125,63 @@ interactions: for ASTRAL intra-level proof obligations.- Assertion-based debugging of imperative programs by abstract interpretation.", "venue": "", "year": 1993, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1993-09-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "39688805", "name": "M. Paul"}]}, - {"paperId": "5a6e9b9cd8c83c09da9341c46db61a6c817a5c47", "externalIds": {"MAG": - "135288638", "CorpusId": 107440129}, "url": "https://www.semanticscholar.org/paper/5a6e9b9cd8c83c09da9341c46db61a6c817a5c47", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1993-09-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "39688805", "name": "M. + Paul"}]}, {"paperId": "5a6e9b9cd8c83c09da9341c46db61a6c817a5c47", "externalIds": + {"MAG": "135288638", "CorpusId": 107440129}, "corpusId": 107440129, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5a6e9b9cd8c83c09da9341c46db61a6c817a5c47", "title": "Software engineering (4th ed.)", "abstract": null, "venue": "", "year": 1993, "referenceCount": 0, "citationCount": 109, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1993-01-02", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "99c1e04ae454a116dbf1fbe4b8355eaf26a4ecbf", - "externalIds": {"MAG": "690128", "CorpusId": 108106728}, "url": "https://www.semanticscholar.org/paper/99c1e04ae454a116dbf1fbe4b8355eaf26a4ecbf", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1993-01-02", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "99c1e04ae454a116dbf1fbe4b8355eaf26a4ecbf", "externalIds": {"MAG": + "690128", "CorpusId": 108106728}, "corpusId": 108106728, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/99c1e04ae454a116dbf1fbe4b8355eaf26a4ecbf", "title": "Proceedings of the 4th European Software Engineering Conference on Software Engineering", "abstract": null, "venue": "", "year": 1993, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1993-09-13", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "39688805", "name": "M. Paul"}]}, {"paperId": "b6ceb3e8f52e4ae0f1ef701830298a22b47c619f", - "externalIds": {"MAG": "560706595", "CorpusId": 60388599}, "url": "https://www.semanticscholar.org/paper/b6ceb3e8f52e4ae0f1ef701830298a22b47c619f", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1993-09-13", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "39688805", "name": "M. + Paul"}]}, {"paperId": "b6ceb3e8f52e4ae0f1ef701830298a22b47c619f", "externalIds": + {"MAG": "560706595", "CorpusId": 60388599}, "corpusId": 60388599, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b6ceb3e8f52e4ae0f1ef701830298a22b47c619f", "title": "Incorporating a cooperative design model in a computer-aided design improvement system.", "abstract": null, "venue": "", "year": 1993, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1402222797", - "name": "A. Taleb-Bendiab"}, {"authorId": "2378057", "name": "K. S. Oh"}, - {"authorId": "143712184", "name": "M. French"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "c711f4b335ea781bb92531a958995cbbb78252a3", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "1402222797", "name": "A. Taleb-Bendiab"}, {"authorId": "2378057", + "name": "K. S. Oh"}, {"authorId": "143712184", "name": "M. French"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "c711f4b335ea781bb92531a958995cbbb78252a3", "externalIds": {"DBLP": "journals/iwc/ColebourneSS93", "MAG": "2047602962", - "DOI": "10.1016/0953-5438(93)90013-J", "CorpusId": 9074299}, "url": "https://www.semanticscholar.org/paper/c711f4b335ea781bb92531a958995cbbb78252a3", + "DOI": "10.1016/0953-5438(93)90013-J", "CorpusId": 9074299}, "corpusId": 9074299, + "publicationVenue": {"id": "b9f99919-55d3-4827-8568-640824b354b9", "name": + "Interacting with computers", "type": "journal", "alternate_names": ["Interact + comput", "Interacting with Computers", "Interact Comput"], "issn": "0953-5438", + "url": "http://iwc.oxfordjournals.org/"}, "url": "https://www.semanticscholar.org/paper/c711f4b335ea781bb92531a958995cbbb78252a3", "title": "MOG User Interface Builder: A Mechanism for Integrating Application and User Interface", "abstract": null, "venue": "Interacting with computers", "year": 1993, "referenceCount": 20, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-09-01", "journal": {"volume": "5", "pages": "315-331", - "name": "Interact. Comput."}, "authors": [{"authorId": "2501449", "name": - "A. Colebourne"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "ccf7ae38c545146a9d4efcdfb36329258299bff3", - "externalIds": {"MAG": "2167110398", "DOI": "10.1109/IWSM.1993.315291", "CorpusId": - 18395020}, "url": "https://www.semanticscholar.org/paper/ccf7ae38c545146a9d4efcdfb36329258299bff3", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1993-09-01", "journal": + {"volume": "5", "pages": "315-331", "name": "Interact. Comput."}, "authors": + [{"authorId": "2501449", "name": "A. Colebourne"}, {"authorId": "144076208", + "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "ccf7ae38c545146a9d4efcdfb36329258299bff3", "externalIds": {"MAG": + "2167110398", "DOI": "10.1109/IWSM.1993.315291", "CorpusId": 18395020}, "corpusId": + 18395020, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ccf7ae38c545146a9d4efcdfb36329258299bff3", "title": "Distributed systems management as a group activity", "abstract": "It is important to consider systems management as part of a whole organizational management strategy, and, as such, to be aware of the impact of people on @@ -14756,16 +16189,17 @@ interactions: the terms of reference associated with systems management.<>", "venue": "Proceedings of 1993 IEEE 1st International Workshop on Systems Management", "year": 1993, "referenceCount": 19, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1993-04-14", - "journal": {"pages": "36-44", "name": "Proceedings of 1993 IEEE 1st International - Workshop on Systems Management"}, "authors": [{"authorId": "134000866", "name": - "G. Dean"}, {"authorId": "121880064", "name": "T. Rodden"}, {"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "32207573", "name": "D. Hutchison"}]}, - {"paperId": "d956f13fa5995d0587c350ee350a086719bad1c8", "externalIds": {"DBLP": - "conf/re/SommervilleRSBT93", "MAG": "2140985214", "DOI": "10.1109/ISRE.1993.324821", - "CorpusId": 15466194}, "url": "https://www.semanticscholar.org/paper/d956f13fa5995d0587c350ee350a086719bad1c8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1993-04-14", "journal": {"pages": "36-44", "name": "Proceedings of 1993 IEEE + 1st International Workshop on Systems Management"}, "authors": [{"authorId": + "134000866", "name": "G. Dean"}, {"authorId": "121880064", "name": "T. Rodden"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "32207573", + "name": "D. Hutchison"}]}, {"paperId": "d956f13fa5995d0587c350ee350a086719bad1c8", + "externalIds": {"DBLP": "conf/re/SommervilleRSBT93", "MAG": "2140985214", + "DOI": "10.1109/ISRE.1993.324821", "CorpusId": 15466194}, "corpusId": 15466194, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d956f13fa5995d0587c350ee350a086719bad1c8", "title": "Integrating ethnography into the requirements engineering process", "abstract": "Experiences from an interdisciplinary project involving software engineers and sociologists are reported. The project is concerned with discovering @@ -14778,17 +16212,19 @@ interactions: to be integrated into the requirements engineering process is suggested.<>", "venue": "[1993] Proceedings of the IEEE International Symposium on Requirements Engineering", "year": 1993, "referenceCount": 15, "citationCount": 161, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1993-01-04", "journal": {"pages": "165-173", "name": "[1993] - Proceedings of the IEEE International Symposium on Requirements Engineering"}, - "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "145282573", "name": "T. Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}, - {"authorId": "144122831", "name": "R. Bentley"}, {"authorId": "1772877", "name": - "M. Twidale"}]}, {"paperId": "0358bf2d2bb86c0fb9951cd3bc4fe95262dc609c", "externalIds": - {"MAG": "2178061340", "CorpusId": 14944454}, "url": "https://www.semanticscholar.org/paper/0358bf2d2bb86c0fb9951cd3bc4fe95262dc609c", + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "1993-01-04", "journal": + {"pages": "165-173", "name": "[1993] Proceedings of the IEEE International + Symposium on Requirements Engineering"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "145282573", "name": "T. Rodden"}, + {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "144122831", + "name": "R. Bentley"}, {"authorId": "1772877", "name": "M. Twidale"}]}, {"paperId": + "0358bf2d2bb86c0fb9951cd3bc4fe95262dc609c", "externalIds": {"MAG": "2178061340", + "CorpusId": 14944454}, "corpusId": 14944454, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0358bf2d2bb86c0fb9951cd3bc4fe95262dc609c", "title": "Sociologists can be surprisingly useful in interactive systems design", "abstract": "This paper makes a case, to system developers, for inter-disciplinary working and the involvement of sociologists in the systems design process. @@ -14801,15 +16237,19 @@ interactions: and how people from radically different backgrounds can work in harmony. Finally, we discuss some of the problems of collaboration which are likely to arise.", "venue": "", "year": 1992, "referenceCount": 10, "citationCount": 95, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "342-354", "name": ""}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "145282573", - "name": "T. Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": - "144122831", "name": "R. Bentley"}]}, {"paperId": "05b75398618e3a979af8c7ec5c18326feb55a9e0", - "externalIds": {"MAG": "2153793823", "DBLP": "conf/cscw/BentleyHRRSSS92", - "DOI": "10.1145/143457.143470", "CorpusId": 182588}, "url": "https://www.semanticscholar.org/paper/05b75398618e3a979af8c7ec5c18326feb55a9e0", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "342-354", "name": ""}, "authors": [{"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": + "144076208", "name": "P. Sawyer"}, {"authorId": "144122831", "name": "R. Bentley"}]}, + {"paperId": "05b75398618e3a979af8c7ec5c18326feb55a9e0", "externalIds": {"MAG": + "2153793823", "DBLP": "conf/cscw/BentleyHRRSSS92", "DOI": "10.1145/143457.143470", + "CorpusId": 182588}, "corpusId": 182588, "publicationVenue": {"id": "63d1595c-87bf-4fd8-be2e-327f299cb9ea", + "name": "Conference on Computer Supported Cooperative Work", "type": "conference", + "alternate_names": ["Conf Comput Support Cooperative Work", "CSCW"], "url": + "http://www.acm.org/pubs/contents/proceedings/series/cscw/"}, "url": "https://www.semanticscholar.org/paper/05b75398618e3a979af8c7ec5c18326feb55a9e0", "title": "Ethnographically-informed systems design for air traffic control", "abstract": "This paper relates experiences of a project where an ethnographic study of air traffic controllers is being used to inform the design of the @@ -14822,17 +16262,17 @@ interactions: systems design process and may produce insights which contradict conventional thinking in systems design.", "venue": "Conference on Computer Supported Cooperative Work", "year": 1992, "referenceCount": 16, "citationCount": 489, "influentialCitationCount": - 16, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-12-01", "journal": {"pages": "123-129"}, "authors": [{"authorId": "144122831", - "name": "R. Bentley"}, {"authorId": "144426202", "name": "J. Hughes"}, {"authorId": - "1872433", "name": "D. Randall"}, {"authorId": "145282573", "name": "T. Rodden"}, - {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "143779933", - "name": "D. Shapiro"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "26db6acf94685e8d5c3cf5bcfef0ec8b396f788f", "externalIds": {"MAG": - "2138996023", "DBLP": "conf/cds/DeanHRS92", "CorpusId": 22377727}, "url": - "https://www.semanticscholar.org/paper/26db6acf94685e8d5c3cf5bcfef0ec8b396f788f", + 16, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1992-12-01", "journal": {"pages": + "123-129"}, "authors": [{"authorId": "144122831", "name": "R. Bentley"}, {"authorId": + "144426202", "name": "J. Hughes"}, {"authorId": "1872433", "name": "D. Randall"}, + {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "144076208", + "name": "P. Sawyer"}, {"authorId": "143779933", "name": "D. Shapiro"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "26db6acf94685e8d5c3cf5bcfef0ec8b396f788f", + "externalIds": {"MAG": "2138996023", "DBLP": "conf/cds/DeanHRS92", "CorpusId": + 22377727}, "corpusId": 22377727, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/26db6acf94685e8d5c3cf5bcfef0ec8b396f788f", "title": "Cooperation and configuration within distributed systems management", "abstract": "Introduces cooperative systems and highlights the various forms of computer supported cooperative work (CSCW) system which have emerged to @@ -14844,16 +16284,16 @@ interactions: tools which the authors are developing to support cooperation in distributed systems management and the architecture used to integrate them are identified.", "venue": "CDS", "year": 1992, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1992-03-25", "journal": - {"pages": "274-285"}, "authors": [{"authorId": "40101012", "name": "G. Dean"}, - {"authorId": "145491590", "name": "D. Hutchison"}, {"authorId": "145282573", - "name": "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "2a097ebdbe637b14a2e6bbfe9394b7b648e916a0", "externalIds": {"MAG": - "1922377584", "DBLP": "conf/cds/SommervilleT92", "CorpusId": 6171474}, "url": - "https://www.semanticscholar.org/paper/2a097ebdbe637b14a2e6bbfe9394b7b648e916a0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-03-25", "journal": {"pages": "274-285"}, "authors": + [{"authorId": "40101012", "name": "G. Dean"}, {"authorId": "145491590", "name": + "D. Hutchison"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "2a097ebdbe637b14a2e6bbfe9394b7b648e916a0", + "externalIds": {"MAG": "1922377584", "DBLP": "conf/cds/SommervilleT92", "CorpusId": + 6171474}, "corpusId": 6171474, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a097ebdbe637b14a2e6bbfe9394b7b648e916a0", "title": "Configuration specification using a system structure language", "abstract": "A discussion is given on a system modelling language and supporting toolkit which was originally developed as part of the Eclipse software engineering @@ -14876,34 +16316,40 @@ interactions: support software configuration management using SySL and initial work on the use of the language in conjunction with a dynamic configuration manager.<\n >", "venue": "CDS", "year": 1992, "referenceCount": 13, "citationCount": 7, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1992-03-25", "journal": - {"pages": "80-89"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "38260531", "name": "R. Thomson"}]}, {"paperId": "45937e3b2a773fa7fe91ed334aecb72ab8dabd2c", - "externalIds": {"DBLP": "conf/ewspt/Sommerville92", "MAG": "8095039", "CorpusId": - 35141923}, "url": "https://www.semanticscholar.org/paper/45937e3b2a773fa7fe91ed334aecb72ab8dabd2c", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1992-03-25", "journal": {"pages": "80-89"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "38260531", "name": "R. Thomson"}]}, + {"paperId": "45937e3b2a773fa7fe91ed334aecb72ab8dabd2c", "externalIds": {"DBLP": + "conf/ewspt/Sommerville92", "MAG": "8095039", "CorpusId": 35141923}, "corpusId": + 35141923, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/45937e3b2a773fa7fe91ed334aecb72ab8dabd2c", "title": "Human and Social Aspects in Process Modelling - Introduction", "abstract": null, "venue": "EWSPT", "year": 1992, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1992-09-07", "journal": - {"pages": "33"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "551a9d008ea4d4dbc8d35e569268699ca48fc570", "externalIds": {"MAG": - "288131044", "CorpusId": 107827048}, "url": "https://www.semanticscholar.org/paper/551a9d008ea4d4dbc8d35e569268699ca48fc570", - "title": "SIMAD: a system for improving mechanical assembly design.", "abstract": - null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1402222797", "name": "A. Taleb-Bendiab"}, {"authorId": "2378057", - "name": "K. S. Oh"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "143712184", "name": "M. French"}]}, {"paperId": "5ecdcf8dc1cf4b941c765c477d1992170df7b576", - "externalIds": {"DBLP": "conf/cscw/BentleyRSS92", "MAG": "2056759733", "DOI": - "10.1145/143457.143478", "CorpusId": 6624573}, "url": "https://www.semanticscholar.org/paper/5ecdcf8dc1cf4b941c765c477d1992170df7b576", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-09-07", "journal": {"pages": "33"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "551a9d008ea4d4dbc8d35e569268699ca48fc570", + "externalIds": {"MAG": "288131044", "CorpusId": 107827048}, "corpusId": 107827048, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/551a9d008ea4d4dbc8d35e569268699ca48fc570", + "title": "SIMAD: a system for improving mechanical assembly design.", "abstract": + null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 0, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1402222797", "name": "A. Taleb-Bendiab"}, + {"authorId": "2378057", "name": "K. S. Oh"}, {"authorId": "1711844", "name": + "I. Sommerville"}, {"authorId": "143712184", "name": "M. French"}]}, {"paperId": + "5ecdcf8dc1cf4b941c765c477d1992170df7b576", "externalIds": {"DBLP": "conf/cscw/BentleyRSS92", + "MAG": "2056759733", "DOI": "10.1145/143457.143478", "CorpusId": 6624573}, + "corpusId": 6624573, "publicationVenue": {"id": "63d1595c-87bf-4fd8-be2e-327f299cb9ea", + "name": "Conference on Computer Supported Cooperative Work", "type": "conference", + "alternate_names": ["Conf Comput Support Cooperative Work", "CSCW"], "url": + "http://www.acm.org/pubs/contents/proceedings/series/cscw/"}, "url": "https://www.semanticscholar.org/paper/5ecdcf8dc1cf4b941c765c477d1992170df7b576", "title": "An architecture for tailoring cooperative multi-user displays", "abstract": "A range of architectures have emerged which support realtime cooperative user interfaces. These architectures have tended to centralise @@ -14918,45 +16364,49 @@ interactions: information space forms the focus for the work taking place.", "venue": "Conference on Computer Supported Cooperative Work", "year": 1992, "referenceCount": 25, "citationCount": 79, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-12-01", "journal": {"pages": "187-194"}, "authors": [{"authorId": "144122831", - "name": "R. Bentley"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": - "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "60f86bcd387dbb1399d7e0fd39113558763a4125", "externalIds": {"MAG": - "599523687", "CorpusId": 107220594}, "url": "https://www.semanticscholar.org/paper/60f86bcd387dbb1399d7e0fd39113558763a4125", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-12-01", "journal": {"pages": "187-194"}, "authors": + [{"authorId": "144122831", "name": "R. Bentley"}, {"authorId": "145282573", + "name": "T. Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "60f86bcd387dbb1399d7e0fd39113558763a4125", + "externalIds": {"MAG": "599523687", "CorpusId": 107220594}, "corpusId": 107220594, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/60f86bcd387dbb1399d7e0fd39113558763a4125", "title": "Collaborative design: knowledge-based systems for concurrent engineering.", "abstract": null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1402222797", "name": "A. Taleb-Bendiab"}, {"authorId": "2378057", "name": "K. S. Oh"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "143712184", "name": "M. French"}]}, {"paperId": "6435996ffada8905d0aac68cbe771f8206e95e44", "externalIds": {"DBLP": "conf/bncod/MonkS92", "MAG": "1479768946", "DOI": "10.1007/3-540-55693-1_31", "CorpusId": 31017823}, - "url": "https://www.semanticscholar.org/paper/6435996ffada8905d0aac68cbe771f8206e95e44", + "corpusId": 31017823, "publicationVenue": {"id": "03a391b7-8aea-4307-b32b-2add7e3683b6", + "name": "British National Conference on Databases", "type": "conference", + "alternate_names": ["BNCOD", "Br National Conf Database"]}, "url": "https://www.semanticscholar.org/paper/6435996ffada8905d0aac68cbe771f8206e95e44", "title": "A Model for Versioning of Classes in Object-Oriented Databases", "abstract": null, "venue": "British National Conference on Databases", "year": 1992, "referenceCount": 16, "citationCount": 63, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1992-07-06", "journal": {"pages": "42-58"}, "authors": - [{"authorId": "26458266", "name": "S. Monk"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "7dd85f1d494a60f65264f6370caf9c930bdd2791", - "externalIds": {"DBLP": "books/daglib/0080572", "CorpusId": 34335250}, "url": - "https://www.semanticscholar.org/paper/7dd85f1d494a60f65264f6370caf9c930bdd2791", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1992-07-06", "journal": + {"pages": "42-58"}, "authors": [{"authorId": "26458266", "name": "S. Monk"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "7dd85f1d494a60f65264f6370caf9c930bdd2791", + "externalIds": {"DBLP": "books/daglib/0080572", "CorpusId": 34335250}, "corpusId": + 34335250, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7dd85f1d494a60f65264f6370caf9c930bdd2791", "title": "Instructor''s guide to accompany software engineering, 4th Edition", "abstract": null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"pages": "1-85"}, "authors": [{"authorId": "1711844", "name": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "1-85"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "8d9a9319b0c06b10183fb68b635fd06e8fcaa794", - "externalIds": {"MAG": "1933898554", "CorpusId": 60933306}, "url": "https://www.semanticscholar.org/paper/8d9a9319b0c06b10183fb68b635fd06e8fcaa794", + "externalIds": {"MAG": "1933898554", "CorpusId": 60933306}, "corpusId": 60933306, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8d9a9319b0c06b10183fb68b635fd06e8fcaa794", "title": "Ethnographically-informed systems development for air traffic control", "abstract": "The overriding importance of safety in ATC requires incremental development of both technology and procedure. The authors describe an approach @@ -14972,15 +16422,17 @@ interactions: and refinement of electronic displays as well as a run-time architecture which allows these displays to be evaluated in cooperative environments.", "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1992-06-22", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "144122831", "name": "R. Bentley"}, {"authorId": "145282573", "name": "T. - Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "93cee9f04f161ea52ea79ac32d4ff4a748d69331", - "externalIds": {"DBLP": "journals/iee/RoddenSS92", "MAG": "1974597553", "DOI": - "10.1049/sej.1992.0003", "CorpusId": 1994996}, "url": "https://www.semanticscholar.org/paper/93cee9f04f161ea52ea79ac32d4ff4a748d69331", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1992-06-22", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "144122831", "name": "R. Bentley"}, + {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "144076208", + "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "93cee9f04f161ea52ea79ac32d4ff4a748d69331", "externalIds": {"DBLP": + "journals/iee/RoddenSS92", "MAG": "1974597553", "DOI": "10.1049/sej.1992.0003", + "CorpusId": 1994996}, "corpusId": 1994996, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/93cee9f04f161ea52ea79ac32d4ff4a748d69331", "title": "Vista: a user interface for a distributed object-oriented software engineering environment", "abstract": "This paper describes a prototype user interface for a distributed software engineering environment, where the components @@ -14993,27 +16445,28 @@ interactions: agents. The functionality of the system is illustrated by examples drawn from the domain of software development.", "venue": "Softw. Eng. J.", "year": 1992, "referenceCount": 9, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-01-03", "journal": {"volume": "7", "pages": "25-34", "name": "Softw. - Eng. J."}, "authors": [{"authorId": "145282573", "name": "T. Rodden"}, {"authorId": - "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "9a5bba8e72af4846cce7e076a9ad168c6e4d5829", "externalIds": {"DBLP": - "conf/ids/SawyerCSM92", "MAG": "1490333790", "DOI": "10.1007/978-1-4471-3423-7_3", - "CorpusId": 28630699}, "url": "https://www.semanticscholar.org/paper/9a5bba8e72af4846cce7e076a9ad168c6e4d5829", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-01-03", "journal": {"volume": "7", "pages": "25-34", + "name": "Softw. Eng. J."}, "authors": [{"authorId": "145282573", "name": "T. + Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "9a5bba8e72af4846cce7e076a9ad168c6e4d5829", + "externalIds": {"DBLP": "conf/ids/SawyerCSM92", "MAG": "1490333790", "DOI": + "10.1007/978-1-4471-3423-7_3", "CorpusId": 28630699}, "corpusId": 28630699, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a5bba8e72af4846cce7e076a9ad168c6e4d5829", "title": "Object-Oriented Database Systems: a Framework for User Interface Development", "abstract": null, "venue": "IDS", "year": 1992, "referenceCount": 20, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "25-38"}, "authors": [{"authorId": "144076208", - "name": "P. Sawyer"}, {"authorId": "2501449", "name": "A. Colebourne"}, {"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "1707662", "name": "J. - Mariani"}]}, {"paperId": "a37b7d5d4d3073256a6f0fccbdd5f31010b20155", "externalIds": - {"DBLP": "books/daglib/0067872", "MAG": "95374147", "CorpusId": 30686870}, - "url": "https://www.semanticscholar.org/paper/a37b7d5d4d3073256a6f0fccbdd5f31010b20155", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "25-38"}, "authors": [{"authorId": + "144076208", "name": "P. Sawyer"}, {"authorId": "2501449", "name": "A. Colebourne"}, + {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1707662", + "name": "J. Mariani"}]}, {"paperId": "a37b7d5d4d3073256a6f0fccbdd5f31010b20155", + "externalIds": {"DBLP": "books/daglib/0067872", "MAG": "95374147", "CorpusId": + 30686870}, "corpusId": 30686870, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a37b7d5d4d3073256a6f0fccbdd5f31010b20155", "title": "Software engineering, 4th Edition", "abstract": "An ignition circuit for combustion engines has an ignition transformer and an ignition spool, each having primary and secondary windings. The two secondary windings are @@ -15022,36 +16475,44 @@ interactions: -both diodes being arranged to conduct current in the same direction. A sparkplug is connected between the free ends of the secondary winding.", "venue": "International computer science series", "year": 1992, "referenceCount": 0, "citationCount": - 51, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"pages": "I-XVI, 1-649"}, "authors": + 51, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"pages": "I-XVI, 1-649"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "bfbbfbd31efb9b49e11c6416ffb01cc8470ecbdc", - "externalIds": {"MAG": "595736140", "CorpusId": 60422822}, "url": "https://www.semanticscholar.org/paper/bfbbfbd31efb9b49e11c6416ffb01cc8470ecbdc", + "externalIds": {"MAG": "595736140", "CorpusId": 60422822}, "corpusId": 60422822, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bfbbfbd31efb9b49e11c6416ffb01cc8470ecbdc", "title": "Knowledge-representation for engineering design product improvement.", "abstract": null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": - 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "1402222797", "name": "A. Taleb-Bendiab"}, - {"authorId": "2378057", "name": "K. S. Oh"}, {"authorId": "1711844", "name": - "I. Sommerville"}, {"authorId": "143712184", "name": "M. French"}]}, {"paperId": - "c39d3012a3ca0cde4a00662d7246f4053a58544a", "externalIds": {"DBLP": "conf/ewspt/SommervilleR92", - "MAG": "2143096453", "DOI": "10.1007/BFb0017501", "CorpusId": 33116291}, "url": + 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1402222797", "name": + "A. Taleb-Bendiab"}, {"authorId": "2378057", "name": "K. S. Oh"}, {"authorId": + "1711844", "name": "I. Sommerville"}, {"authorId": "143712184", "name": "M. + French"}]}, {"paperId": "c39d3012a3ca0cde4a00662d7246f4053a58544a", "externalIds": + {"DBLP": "conf/ewspt/SommervilleR92", "MAG": "2143096453", "DOI": "10.1007/BFb0017501", + "CorpusId": 33116291}, "corpusId": 33116291, "publicationVenue": {"id": "afbe4089-f6a7-4ab7-ae05-29dae7fc1787", + "name": "European Workshop on Software Process Technology", "type": "conference", + "alternate_names": ["EWSPT", "Eur Workshop Softw Process Technol"]}, "url": "https://www.semanticscholar.org/paper/c39d3012a3ca0cde4a00662d7246f4053a58544a", "title": "Understanding the Software Process as a Social Process", "abstract": null, "venue": "European Workshop on Software Process Technology", "year": 1992, "referenceCount": 3, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1992-09-07", "journal": {"pages": "55-57"}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "145282573", - "name": "T. Rodden"}]}, {"paperId": "c78c40f1e110b1632ada62cb49bab027b34c4ee4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1992-09-07", "journal": + {"pages": "55-57"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "145282573", "name": "T. Rodden"}]}, {"paperId": "c78c40f1e110b1632ada62cb49bab027b34c4ee4", "externalIds": {"DBLP": "journals/iee/KotonyaS92", "MAG": "2044301784", "DOI": - "10.1049/sej.1992.0038", "CorpusId": 206192669}, "url": "https://www.semanticscholar.org/paper/c78c40f1e110b1632ada62cb49bab027b34c4ee4", + "10.1049/sej.1992.0038", "CorpusId": 206192669}, "corpusId": 206192669, "publicationVenue": + {"id": "ed3076f2-967a-47c8-b60d-7bea15e28461", "name": "Software Engineering + Journal", "type": "journal", "alternate_names": ["Softw Eng J"], "issn": "0268-6961", + "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=2225", "alternate_urls": + ["https://digital-library.theiet.org/content/journals/sej"]}, "url": "https://www.semanticscholar.org/paper/c78c40f1e110b1632ada62cb49bab027b34c4ee4", "title": "Viewpoints for requirements definition", "abstract": "This paper is a survey of the current viewpoint-oriented requirements approaches and a description of an alternative object-oriented viewpoint-based approach. @@ -15060,15 +16521,15 @@ interactions: adopted by three requirements methodologies. The paper concludes by proposing an alternative object-oriented viewpoint-based approach.", "venue": "Software Engineering Journal", "year": 1992, "referenceCount": 13, "citationCount": - 128, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1992-11-01", - "journal": {"volume": "7", "pages": "375-387", "name": "Softw. Eng. J."}, - "authors": [{"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "e477f96ddce2831df02309dfb94e8b3d8e30b8ec", + 128, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "1992-11-01", "journal": {"volume": "7", "pages": "375-387", "name": "Softw. + Eng. J."}, "authors": [{"authorId": "1989772", "name": "G. Kotonya"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "e477f96ddce2831df02309dfb94e8b3d8e30b8ec", "externalIds": {"MAG": "1534977501", "DBLP": "conf/ifip2-7/BentleyRSS92", - "CorpusId": 10500}, "url": "https://www.semanticscholar.org/paper/e477f96ddce2831df02309dfb94e8b3d8e30b8ec", + "CorpusId": 10500}, "corpusId": 10500, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e477f96ddce2831df02309dfb94e8b3d8e30b8ec", "title": "A Prototyping Environment for Dynamic Data Visualisation", "abstract": "This paper describes the model underlying a user interface prototyping system which is designed to support the creation of multi-user, interactive database @@ -15082,15 +16543,16 @@ interactions: to be shared by users at different workstations and it allows a high degree of end-user tailorability. Keyword Codes: H.5.2; H.5.3; H.1.2", "venue": "Engineering for Human-Computer Interaction", "year": 1992, "referenceCount": 20, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1992-08-10", "journal": - {"pages": "335-348"}, "authors": [{"authorId": "144122831", "name": "R. Bentley"}, - {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "144076208", - "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1992-08-10", "journal": {"pages": "335-348"}, "authors": [{"authorId": "144122831", + "name": "R. Bentley"}, {"authorId": "145282573", "name": "T. Rodden"}, {"authorId": + "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "2efbac8bfa9375578302b45e76c791b80abec451", "externalIds": {"MAG": - "1660511703", "CorpusId": 5715853}, "url": "https://www.semanticscholar.org/paper/2efbac8bfa9375578302b45e76c791b80abec451", + "1660511703", "CorpusId": 5715853}, "corpusId": 5715853, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2efbac8bfa9375578302b45e76c791b80abec451", "title": "Modelling real-time constraints", "abstract": "The objective of the work described is to provide a software tool to assist real-time system specifiers and designers to predict, at an early stage of the development @@ -15098,13 +16560,15 @@ interactions: of real-time systems (SRT)) is used to model the timing aspects of a real-time system and then simulate the system to predict its behaviour.", "venue": "RTSS 1991", "year": 1991, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1991-09-16", "journal": {"volume": "", "pages": "164-169", "name": ""}, "authors": - [{"authorId": "2263954", "name": "S. Berryman"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "b55e3241a036b73e28b157ba758fd3ef02d79810", - "externalIds": {"MAG": "1831266670", "CorpusId": 58727124}, "url": "https://www.semanticscholar.org/paper/b55e3241a036b73e28b157ba758fd3ef02d79810", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1991-09-16", "journal": {"volume": + "", "pages": "164-169", "name": ""}, "authors": [{"authorId": "2263954", "name": + "S. Berryman"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "b55e3241a036b73e28b157ba758fd3ef02d79810", "externalIds": {"MAG": "1831266670", + "CorpusId": 58727124}, "corpusId": 58727124, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b55e3241a036b73e28b157ba758fd3ef02d79810", "title": "Modelling timing constraints", "abstract": "The objective of the work described is to provide a software tool to assist real-time system specifiers and designers to predict quality improvement by allowing early assessment @@ -15121,14 +16585,15 @@ interactions: databuses. Each icon has a number of attributes which can be specified by selecting the form option on the icon menu.", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1991-10-14", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2263954", - "name": "S. Berryman"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1991-10-14", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "2263954", "name": "S. Berryman"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "3dee06e6ac4a006f4385f81e68bb2fad070954f6", "externalIds": {"DBLP": "journals/iee/HaddleyS90", "MAG": "2202136766", "DOI": "10.1049/sej.1990.0036", - "CorpusId": 9555835}, "url": "https://www.semanticscholar.org/paper/3dee06e6ac4a006f4385f81e68bb2fad070954f6", + "CorpusId": 9555835}, "corpusId": 9555835, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3dee06e6ac4a006f4385f81e68bb2fad070954f6", "title": "Integrated support for systems design", "abstract": "This paper describes a design support system which goes beyond the support facilities offered by the current genreation of CASE tools. we have examined the entire @@ -15143,15 +16608,20 @@ interactions: the systems design process where functionality is split between hardware and software components.", "venue": "Softw. Eng. J.", "year": 1990, "referenceCount": 20, "citationCount": 26, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1990-11-01", "journal": - {"volume": "5", "pages": "331-338", "name": "Softw. Eng. J."}, "authors": - [{"authorId": "2558235", "name": "Neil Haddley"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "6ca41c96597356bd6c0256057c328591e83df4f9", - "externalIds": {"MAG": "2004366324", "DBLP": "journals/iee/WellandBS90", "DOI": - "10.1049/sej.1990.0013", "CorpusId": 24726105}, "url": "https://www.semanticscholar.org/paper/6ca41c96597356bd6c0256057c328591e83df4f9", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1990-11-01", "journal": {"volume": "5", "pages": "331-338", + "name": "Softw. Eng. J."}, "authors": [{"authorId": "2558235", "name": "Neil + Haddley"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "6ca41c96597356bd6c0256057c328591e83df4f9", "externalIds": {"MAG": "2004366324", + "DBLP": "journals/iee/WellandBS90", "DOI": "10.1049/sej.1990.0013", "CorpusId": + 24726105}, "corpusId": 24726105, "publicationVenue": {"id": "ed3076f2-967a-47c8-b60d-7bea15e28461", + "name": "Software Engineering Journal", "type": "journal", "alternate_names": + ["Softw Eng J"], "issn": "0268-6961", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=2225", + "alternate_urls": ["https://digital-library.theiet.org/content/journals/sej"]}, + "url": "https://www.semanticscholar.org/paper/6ca41c96597356bd6c0256057c328591e83df4f9", "title": "Method rule checking in a generic design editing system", "abstract": "This paper describes a means of incorporating method rule checking in a design editing system intended to support the production of designs expressed in @@ -15161,15 +16631,16 @@ interactions: notation. Syntactic and semantic rules are expressed in the method description language and are checked, interactively, during an editing session.", "venue": "Software Engineering Journal", "year": 1990, "referenceCount": 4, "citationCount": - 9, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1990-04-01", "journal": - {"volume": "5", "pages": "105-115", "name": "Softw. Eng. J."}, "authors": - [{"authorId": "143748736", "name": "R. Welland"}, {"authorId": "3071513", - "name": "S. Beer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "6e0e4f71266120e014f8db9d69422ee5a9494b4b", "externalIds": {"MAG": "1963142163", - "CorpusId": 60514171}, "url": "https://www.semanticscholar.org/paper/6e0e4f71266120e014f8db9d69422ee5a9494b4b", + 9, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1990-04-01", "journal": {"volume": "5", "pages": "105-115", "name": "Softw. + Eng. J."}, "authors": [{"authorId": "143748736", "name": "R. Welland"}, {"authorId": + "3071513", "name": "S. Beer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "6e0e4f71266120e014f8db9d69422ee5a9494b4b", "externalIds": {"MAG": + "1963142163", "CorpusId": 60514171}, "corpusId": 60514171, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6e0e4f71266120e014f8db9d69422ee5a9494b4b", "title": "User interface tools for object-oriented database systems", "abstract": "The authors describe an architecture for a user interface for an OODB which is general in nature, independent of variations in the details of an underlying @@ -15182,13 +16653,14 @@ interactions: complexity. It is also likely that such tools will permit users to specify application-specific user interface behaviour. >", "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1990-11-08", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "144076208", - "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1990-11-08", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "76af71cac94c703d6b4a44bcb15c5286c72366fe", "externalIds": {"MAG": - "147450292", "CorpusId": 546505}, "url": "https://www.semanticscholar.org/paper/76af71cac94c703d6b4a44bcb15c5286c72366fe", + "147450292", "CorpusId": 546505}, "corpusId": 546505, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/76af71cac94c703d6b4a44bcb15c5286c72366fe", "title": "Building conversations using mailtrays", "abstract": "Current project support environments provide little direct support for group working. This paper postulates an architecture for future project support environments and @@ -15198,23 +16670,26 @@ interactions: environment is discussed and an editor which supports the construction of these description is introduced.", "venue": "", "year": 1990, "referenceCount": 32, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1990-09-01", - "journal": {"volume": "", "pages": "159-172", "name": ""}, "authors": [{"authorId": - "145282573", "name": "T. Rodden"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "87ad9c146bde1abb3c822ccb449523f3e07c0180", "externalIds": {"MAG": - "2147662945", "DOI": "10.1007/978-94-009-0771-3_16", "CorpusId": 61402967}, - "url": "https://www.semanticscholar.org/paper/87ad9c146bde1abb3c822ccb449523f3e07c0180", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1990-09-01", "journal": {"volume": "", "pages": "159-172", "name": ""}, "authors": + [{"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "87ad9c146bde1abb3c822ccb449523f3e07c0180", + "externalIds": {"MAG": "2147662945", "DOI": "10.1007/978-94-009-0771-3_16", + "CorpusId": 61402967}, "corpusId": 61402967, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/87ad9c146bde1abb3c822ccb449523f3e07c0180", "title": "Object-Oriented Design: A Teenage Technology", "abstract": null, "venue": "", "year": 1990, "referenceCount": 10, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "pages": "315-324", "name": ""}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "056b67eb280f7c400a757df6d6abfd423a82e9ce", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": + "", "pages": "315-324", "name": ""}, "authors": [{"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "056b67eb280f7c400a757df6d6abfd423a82e9ce", "externalIds": {"DBLP": "journals/spe/SommervilleWPS89", "MAG": "2013334310", - "DOI": "10.1002/spe.4380190405", "CorpusId": 26703907}, "url": "https://www.semanticscholar.org/paper/056b67eb280f7c400a757df6d6abfd423a82e9ce", + "DOI": "10.1002/spe.4380190405", "CorpusId": 26703907}, "corpusId": 26703907, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/056b67eb280f7c400a757df6d6abfd423a82e9ce", "title": "The ECLIPSE user interface", "abstract": "This paper describes the user interface facilities of the ECLIPSE integrated project support environment. This interface is based on a consistent metaphor called the \u2018control @@ -15224,16 +16699,20 @@ interactions: \u2018applications interface\u2019, which provides a portable, hardware\u2010independent interface for software tools.", "venue": "Softw. Pract. Exp.", "year": 1989, "referenceCount": 26, "citationCount": 5, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-04-01", "journal": {"volume": "19", "name": "Software: Practice and - Experience"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "143748736", "name": "R. Welland"}, {"authorId": "3353753", "name": - "S. Potter"}, {"authorId": "2067884564", "name": "John D. Smart"}]}, {"paperId": - "2124b48be5412322931bc8222f84d41733b01491", "externalIds": {"DBLP": "conf/scm/ThomsonS89", - "MAG": "2092407785", "DOI": "10.1145/72910.73353", "CorpusId": 7095496}, "url": - "https://www.semanticscholar.org/paper/2124b48be5412322931bc8222f84d41733b01491", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1989-04-01", "journal": {"volume": "19", "name": "Software: + Practice and Experience"}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}, {"authorId": "143748736", "name": "R. Welland"}, {"authorId": + "3353753", "name": "S. Potter"}, {"authorId": "2067884564", "name": "John + D. Smart"}]}, {"paperId": "2124b48be5412322931bc8222f84d41733b01491", "externalIds": + {"DBLP": "conf/scm/ThomsonS89", "MAG": "2092407785", "DOI": "10.1145/72910.73353", + "CorpusId": 7095496}, "corpusId": 7095496, "publicationVenue": {"id": "27a5535e-4121-4e8d-bcb1-10c7415d4e36", + "name": "System Configuration Management", "type": "conference", "alternate_names": + ["Syst Config Manag", "Software Configuration Management Workshop", "Softw + Config Manag Workshop", "SCM"], "url": "http://www.cs.colorado.edu/users/andre/configuration_management.html"}, + "url": "https://www.semanticscholar.org/paper/2124b48be5412322931bc8222f84d41733b01491", "title": "Configuration management using SySL", "abstract": "Software configuration management is concerned primarily with the consistent labelling and tracking of project information and managing change to that information [l]. Its objective @@ -15256,87 +16735,100 @@ interactions: the development process and their relationships. There are many dimensions to system modelling identified in [4].", "venue": "System Configuration Management", "year": 1989, "referenceCount": 12, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book"], "publicationDate": "1989-10-01", "journal": {"name": "Proceedings - of the 2nd International Workshop on Software configuration management"}, - "authors": [{"authorId": "144875474", "name": "R. Thomson"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "270235b45131161280b006593c65e1c2c8636beb", - "externalIds": {"MAG": "767206583", "DOI": "10.1007/978-94-009-1063-8_42", - "CorpusId": 106777173}, "url": "https://www.semanticscholar.org/paper/270235b45131161280b006593c65e1c2c8636beb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "1989-10-01", + "journal": {"name": "Proceedings of the 2nd International Workshop on Software + configuration management"}, "authors": [{"authorId": "144875474", "name": + "R. Thomson"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "270235b45131161280b006593c65e1c2c8636beb", "externalIds": {"MAG": "767206583", + "DOI": "10.1007/978-94-009-1063-8_42", "CorpusId": 106777173}, "corpusId": + 106777173, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/270235b45131161280b006593c65e1c2c8636beb", "title": "The DRAGON project", "abstract": null, "venue": "", "year": 1989, "referenceCount": 11, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "554-568", "name": ""}, "authors": [{"authorId": "48990203", - "name": "A. D. Maio"}, {"authorId": "1711844", "name": "I. Sommerville"}, + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "554-568", "name": ""}, "authors": [{"authorId": + "48990203", "name": "A. D. Maio"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "49461813", "name": "F. Bott"}, {"authorId": "32013581", "name": "R. Bayan"}, {"authorId": "2066494027", "name": "M. Wirsing"}]}, {"paperId": "526e646ce932d9d01aae4900d602d03a0449522b", "externalIds": {"DBLP": "conf/htuk/SommervilleHMT89", - "MAG": "1589720552", "CorpusId": 13167620}, "url": "https://www.semanticscholar.org/paper/526e646ce932d9d01aae4900d602d03a0449522b", + "MAG": "1589720552", "CorpusId": 13167620}, "corpusId": 13167620, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/526e646ce932d9d01aae4900d602d03a0449522b", "title": "The Designer''s Notepad - A Hypertext System Tailored for Design", "abstract": null, "venue": "UK Hypertext", "year": 1989, "referenceCount": 0, "citationCount": 10, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "260-266"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "2558235", "name": "Neil Haddley"}, {"authorId": "1707662", "name": - "J. Mariani"}, {"authorId": "38260531", "name": "R. Thomson"}]}, {"paperId": - "6fc83d8741f8353b970cac35747dec195fddeade", "externalIds": {"MAG": "1866337987", - "CorpusId": 177468118}, "url": "https://www.semanticscholar.org/paper/6fc83d8741f8353b970cac35747dec195fddeade", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "260-266"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "2558235", "name": "Neil Haddley"}, + {"authorId": "1707662", "name": "J. Mariani"}, {"authorId": "38260531", "name": + "R. Thomson"}]}, {"paperId": "6fc83d8741f8353b970cac35747dec195fddeade", "externalIds": + {"MAG": "1866337987", "CorpusId": 177468118}, "corpusId": 177468118, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6fc83d8741f8353b970cac35747dec195fddeade", "title": "The design editor", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1989-04-01", "journal": {"volume": - "", "pages": "85-95", "name": ""}, "authors": [{"authorId": "3071513", "name": - "S. Beer"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "143748736", "name": "R. Welland"}]}, {"paperId": "813bc42c903b27af228d0b48813338b85aab1c7d", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-04-01", + "journal": {"volume": "", "pages": "85-95", "name": ""}, "authors": [{"authorId": + "3071513", "name": "S. Beer"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "143748736", "name": "R. Welland"}]}, {"paperId": "813bc42c903b27af228d0b48813338b85aab1c7d", "externalIds": {"MAG": "2045423161", "DBLP": "journals/cj/SommervilleT89", - "DOI": "10.1093/comjnl/32.5.386", "CorpusId": 42206925}, "url": "https://www.semanticscholar.org/paper/813bc42c903b27af228d0b48813338b85aab1c7d", + "DOI": "10.1093/comjnl/32.5.386", "CorpusId": 42206925}, "corpusId": 42206925, + "publicationVenue": {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", "name": + "Computer/law journal", "type": "journal", "alternate_names": ["Computer journal", + "The Computer Journal", "Comput j", "Comput J"], "issn": "0164-8756", "alternate_issns": + ["0010-4620"], "url": "https://repository.jmls.edu/jitpl/all_issues.html", + "alternate_urls": ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/813bc42c903b27af228d0b48813338b85aab1c7d", "title": "An Approach to the Support of Software Evolution", "abstract": null, "venue": "Computer/law journal", "year": 1989, "referenceCount": 0, "citationCount": - 14, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1989-10-01", "journal": - {"volume": "32", "pages": "386-398", "name": "Comput. J."}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "144875474", "name": "R. - Thomson"}]}, {"paperId": "9267166237574ae961fa7627fb1c3ca7137eff1c", "externalIds": - {"MAG": "12797670", "CorpusId": 116794281}, "url": "https://www.semanticscholar.org/paper/9267166237574ae961fa7627fb1c3ca7137eff1c", + 14, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1989-10-01", "journal": {"volume": "32", "pages": "386-398", "name": "Comput. + J."}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": + "144875474", "name": "R. Thomson"}]}, {"paperId": "9267166237574ae961fa7627fb1c3ca7137eff1c", + "externalIds": {"MAG": "12797670", "CorpusId": 116794281}, "corpusId": 116794281, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9267166237574ae961fa7627fb1c3ca7137eff1c", "title": "Interaction with eclipse", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-04-01", - "journal": {"volume": "", "pages": "69-84", "name": ""}, "authors": [{"authorId": - "3353753", "name": "S. Potter"}, {"authorId": "2067884564", "name": "John - D. Smart"}, {"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": - "143748736", "name": "R. Welland"}]}, {"paperId": "c34b8ea2e46664062717deb1ae87b885eb61023e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1989-04-01", "journal": {"volume": "", "pages": "69-84", "name": ""}, "authors": + [{"authorId": "3353753", "name": "S. Potter"}, {"authorId": "2067884564", + "name": "John D. Smart"}, {"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "143748736", "name": "R. Welland"}]}, {"paperId": "c34b8ea2e46664062717deb1ae87b885eb61023e", "externalIds": {"DBLP": "journals/mam/Sommerville89", "MAG": "1999896771", - "DOI": "10.1016/0141-9331(89)90063-X", "CorpusId": 2368277}, "url": "https://www.semanticscholar.org/paper/c34b8ea2e46664062717deb1ae87b885eb61023e", + "DOI": "10.1016/0141-9331(89)90063-X", "CorpusId": 2368277}, "corpusId": 2368277, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c34b8ea2e46664062717deb1ae87b885eb61023e", "title": "Integrated project support environments", "abstract": null, "venue": "Microprocess. Microsystems", "year": 1989, "referenceCount": 11, "citationCount": - 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1989-05-01", - "journal": {"volume": "13", "pages": "254-262", "name": "Microprocess. Microsystems"}, - "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "d8effece19cb26e3c19d99e9d3e5a1bab7210d27", "externalIds": {"MAG": "2486911497", - "CorpusId": 63366455}, "url": "https://www.semanticscholar.org/paper/d8effece19cb26e3c19d99e9d3e5a1bab7210d27", + 8, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "1989-05-01", "journal": {"volume": "13", "pages": "254-262", + "name": "Microprocess. Microsystems"}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "d8effece19cb26e3c19d99e9d3e5a1bab7210d27", + "externalIds": {"MAG": "2486911497", "CorpusId": 63366455}, "corpusId": 63366455, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d8effece19cb26e3c19d99e9d3e5a1bab7210d27", "title": "The system structure language", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1989-04-01", "journal": {"volume": "", "pages": - "163-180", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "38260531", "name": "R. Thomson"}]}, {"paperId": "05af32caab41b8bc63cd6d302e755912aa1de327", - "externalIds": {"DBLP": "conf/sde/RoddenSS88", "MAG": "1967538068", "DOI": - "10.1145/64135.65011", "CorpusId": 14669489}, "url": "https://www.semanticscholar.org/paper/05af32caab41b8bc63cd6d302e755912aa1de327", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1989-04-01", "journal": + {"volume": "", "pages": "163-180", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "38260531", "name": "R. Thomson"}]}, + {"paperId": "05af32caab41b8bc63cd6d302e755912aa1de327", "externalIds": {"DBLP": + "conf/sde/RoddenSS88", "MAG": "1967538068", "DOI": "10.1145/64135.65011", + "CorpusId": 14669489}, "corpusId": 14669489, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/05af32caab41b8bc63cd6d302e755912aa1de327", "title": "Interacting with an active, integrated environment", "abstract": "Software engineering environments are intended to provide a cohesive and integrated set of tools to support the process of software engineering with @@ -15350,15 +16842,17 @@ interactions: user interface integration including the mechanisms employed to permit inter-agent and agent-user communications.", "venue": "SDE 3", "year": 1989, "referenceCount": 27, "citationCount": 17, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/64140.65011", + "status": null}, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1989-01-03", "journal": {"pages": "76-84"}, "authors": [{"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "05f05b8b7d54bdd6833d470b65545d6beb60eaa7", "externalIds": {"DBLP": "journals/iee/SawyerS88", "MAG": "1990184250", "DOI": - "10.1049/sej.1988.0027", "CorpusId": 16036282}, "url": "https://www.semanticscholar.org/paper/05f05b8b7d54bdd6833d470b65545d6beb60eaa7", + "10.1049/sej.1988.0027", "CorpusId": 16036282}, "corpusId": 16036282, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/05f05b8b7d54bdd6833d470b65545d6beb60eaa7", "title": "Direct manipulation of an object store", "abstract": "Integrated project support environments (IPSEs) are intended to provide a cohesive and integrated set of tools to support the process of design and development in @@ -15372,13 +16866,15 @@ interactions: and integrated method with which users can interact with the objects in the IPSE''s object store.", "venue": "Softw. Eng. J.", "year": 1988, "referenceCount": 5, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1988-11-01", "journal": {"volume": "3", "pages": "214-222", "name": "Softw. - Eng. J."}, "authors": [{"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "1ef13caa21bcb5074e74bdc04ad1219b7639f44f", - "externalIds": {"MAG": "2219259892", "CorpusId": 62076546}, "url": "https://www.semanticscholar.org/paper/1ef13caa21bcb5074e74bdc04ad1219b7639f44f", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1988-11-01", "journal": {"volume": "3", "pages": "214-222", + "name": "Softw. Eng. J."}, "authors": [{"authorId": "144076208", "name": "P. + Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "1ef13caa21bcb5074e74bdc04ad1219b7639f44f", "externalIds": {"MAG": "2219259892", + "CorpusId": 62076546}, "corpusId": 62076546, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1ef13caa21bcb5074e74bdc04ad1219b7639f44f", "title": "IPSE user interfaces-issues and requirements", "abstract": "Summary form only given, as follows. The author presents a general overview of the place of user interface systems in the current generation of IPSEs and suggests @@ -15392,34 +16888,38 @@ interactions: to IPSE users. There are clear technical and organisational difficulties in establishing IPSE UI requirements and these are discussed.", "venue": "", "year": 1988, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1988-01-04", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "866ede917efc0b24f24f98af6a7dfaba3b641bf6", - "externalIds": {"DBLP": "journals/kbs/RoddenSS88", "MAG": "1994366170", "DOI": - "10.1016/0950-7051(88)90035-4", "CorpusId": 5430897}, "url": "https://www.semanticscholar.org/paper/866ede917efc0b24f24f98af6a7dfaba3b641bf6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "1988-01-04", "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "866ede917efc0b24f24f98af6a7dfaba3b641bf6", "externalIds": + {"DBLP": "journals/kbs/RoddenSS88", "MAG": "1994366170", "DOI": "10.1016/0950-7051(88)90035-4", + "CorpusId": 5430897}, "corpusId": 5430897, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/866ede917efc0b24f24f98af6a7dfaba3b641bf6", "title": "Co-operation and communication within an active IPSE", "abstract": null, "venue": "Knowl. Based Syst.", "year": 1988, "referenceCount": 14, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1988-09-01", "journal": - {"volume": "1", "pages": "240-248", "name": "Knowl. Based Syst."}, "authors": - [{"authorId": "145282573", "name": "T. Rodden"}, {"authorId": "144076208", - "name": "P. Sawyer"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "a34a827522b05cb0053a657b756f47727c9dab74", "externalIds": {"MAG": - "189516325", "CorpusId": 60038890}, "url": "https://www.semanticscholar.org/paper/a34a827522b05cb0053a657b756f47727c9dab74", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1988-09-01", "journal": {"volume": "1", "pages": "240-248", "name": "Knowl. + Based Syst."}, "authors": [{"authorId": "145282573", "name": "T. Rodden"}, + {"authorId": "144076208", "name": "P. Sawyer"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "a34a827522b05cb0053a657b756f47727c9dab74", + "externalIds": {"MAG": "189516325", "CorpusId": 60038890}, "corpusId": 60038890, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a34a827522b05cb0053a657b756f47727c9dab74", "title": "Ingenier\u00eda de software", "abstract": null, "venue": "", "year": 1988, "referenceCount": 0, "citationCount": 181, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "144283937", - "name": "Pedro Flores"}, {"authorId": "2071311141", "name": "Pedro Hepp"}]}, - {"paperId": "f5f49c4b584f4102fbe3f84a3f37ef7873a937e8", "externalIds": {"MAG": - "2129258462", "DBLP": "journals/sigir/WoodS88", "DOI": "10.1145/54347.54349", - "CorpusId": 9456737}, "url": "https://www.semanticscholar.org/paper/f5f49c4b584f4102fbe3f84a3f37ef7873a937e8", + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}, {"authorId": "144283937", "name": "Pedro Flores"}, {"authorId": + "2071311141", "name": "Pedro Hepp"}]}, {"paperId": "f5f49c4b584f4102fbe3f84a3f37ef7873a937e8", + "externalIds": {"MAG": "2129258462", "DBLP": "journals/sigir/WoodS88", "DOI": + "10.1145/54347.54349", "CorpusId": 9456737}, "corpusId": 9456737, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f5f49c4b584f4102fbe3f84a3f37ef7873a937e8", "title": "An information retrieval system for software components", "abstract": "This paper describes an information retrieval system which is specifically designed to be used for storing and retrieving information about software @@ -15432,77 +16932,96 @@ interactions: is presented. The version of the system described here has been fully implemented and is now being developed as part of a more general reuse support system.", "venue": "SIGF", "year": 1988, "referenceCount": 12, "citationCount": 73, - "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/54347.54349", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1988-05-01", "journal": {"volume": "3", "pages": "198-207", "name": "Softw. Eng. J."}, "authors": [{"authorId": "145953716", "name": "M. Wood"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "1985f411cab1d01c2b885cccd2a90f29c3411467", "externalIds": {"DBLP": "journals/sigsoft/Sommerville87", "MAG": "1993549442", - "DOI": "10.1145/24562.24572", "CorpusId": 40454032}, "url": "https://www.semanticscholar.org/paper/1985f411cab1d01c2b885cccd2a90f29c3411467", + "DOI": "10.1145/24562.24572", "CorpusId": 40454032}, "corpusId": 40454032, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1985f411cab1d01c2b885cccd2a90f29c3411467", "title": "Review of 1986 Environments Conference", "abstract": null, "venue": "SOEN", "year": 1987, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "1987-04-01", "journal": {"volume": "12", "pages": - "54-55", "name": "ACM SIGSOFT Softw. Eng. Notes"}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "4498e9a5cefe2ebaf665cd861f50286810299fc6", - "externalIds": {"MAG": "252552640", "DOI": "10.1016/0954-1810(87)90195-6", - "CorpusId": 60312663}, "url": "https://www.semanticscholar.org/paper/4498e9a5cefe2ebaf665cd861f50286810299fc6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1987-04-01", + "journal": {"volume": "12", "pages": "54-55", "name": "ACM SIGSOFT Softw. + Eng. Notes"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "4498e9a5cefe2ebaf665cd861f50286810299fc6", "externalIds": {"MAG": + "252552640", "DOI": "10.1016/0954-1810(87)90195-6", "CorpusId": 60312663}, + "corpusId": 60312663, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4498e9a5cefe2ebaf665cd861f50286810299fc6", "title": "Book ReviewArtificial intelligence \u2014 Applications in the Future of Software Engineering: D. Partridge Published by Ellis Harwood Distributed by John Wiley, 1986, 241 pp. \u00a325, ISBN 0 853127 530", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1987-10-01", "journal": {"volume": "2", "pages": "235", "name": "Artificial - Intelligence in Engineering"}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "8162bf9bffe62e6ab29fd89c6e623f7243f73b54", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "1987-10-01", "journal": {"volume": "2", "pages": "235", + "name": "Artificial Intelligence in Engineering"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "8162bf9bffe62e6ab29fd89c6e623f7243f73b54", "externalIds": {"DBLP": "conf/esec/BeerS87", "MAG": "7433516", "DOI": "10.1007/BFb0022102", - "CorpusId": 3169046}, "url": "https://www.semanticscholar.org/paper/8162bf9bffe62e6ab29fd89c6e623f7243f73b54", + "CorpusId": 3169046}, "corpusId": 3169046, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8162bf9bffe62e6ab29fd89c6e623f7243f73b54", "title": "Software Design Automation in an IPSE", "abstract": null, "venue": "ESEC", "year": 1987, "referenceCount": 5, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1987-09-09", "journal": - {"pages": "89-97"}, "authors": [{"authorId": "3071513", "name": "S. Beer"}, - {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "efc2bf2836345f4668787595ef5e92d21d554573", - "externalIds": {"MAG": "1593651086", "CorpusId": 60925371}, "url": "https://www.semanticscholar.org/paper/efc2bf2836345f4668787595ef5e92d21d554573", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1987-09-09", "journal": {"pages": "89-97"}, "authors": + [{"authorId": "3071513", "name": "S. Beer"}, {"authorId": "1711844", "name": + "I. Sommerville"}]}, {"paperId": "efc2bf2836345f4668787595ef5e92d21d554573", + "externalIds": {"MAG": "1593651086", "CorpusId": 60925371}, "corpusId": 60925371, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/efc2bf2836345f4668787595ef5e92d21d554573", "title": "Software development with Ada", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 10, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}, {"authorId": "144272676", "name": "R. Morrison"}]}, - {"paperId": "f200c3afeae8a1c1e54e005b5ee940a5dff1edc2", "externalIds": {"DBLP": - "journals/cj/SommervilleWB87", "MAG": "2070383530", "DOI": "10.1093/comjnl/30.2.128", - "CorpusId": 39023079}, "url": "https://www.semanticscholar.org/paper/f200c3afeae8a1c1e54e005b5ee940a5dff1edc2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "144272676", "name": "R. Morrison"}]}, {"paperId": "f200c3afeae8a1c1e54e005b5ee940a5dff1edc2", + "externalIds": {"DBLP": "journals/cj/SommervilleWB87", "MAG": "2070383530", + "DOI": "10.1093/comjnl/30.2.128", "CorpusId": 39023079}, "corpusId": 39023079, + "publicationVenue": {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", "name": + "Computer/law journal", "type": "journal", "alternate_names": ["Computer journal", + "The Computer Journal", "Comput j", "Comput J"], "issn": "0164-8756", "alternate_issns": + ["0010-4620"], "url": "https://repository.jmls.edu/jitpl/all_issues.html", + "alternate_urls": ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/f200c3afeae8a1c1e54e005b5ee940a5dff1edc2", "title": "Describing Software Design Methodologies", "abstract": null, "venue": "Computer/law journal", "year": 1987, "referenceCount": 0, "citationCount": - 22, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1987-04-01", "journal": - {"volume": "30", "pages": "128-133", "name": "Comput. J."}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}, {"authorId": "143748736", "name": "R. - Welland"}, {"authorId": "3071513", "name": "S. Beer"}]}, {"paperId": "5cc7233b281db8235599e33c2bcd25028697c43a", - "externalIds": {"MAG": "2131082333", "DBLP": "journals/cj/BlairS86", "DOI": - "10.1093/comjnl/29.5.460", "CorpusId": 36234275}, "url": "https://www.semanticscholar.org/paper/5cc7233b281db8235599e33c2bcd25028697c43a", + 22, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://academic.oup.com/comjnl/article-pdf/30/2/128/1129406/300128.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1987-04-01", "journal": {"volume": "30", "pages": "128-133", + "name": "Comput. J."}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "143748736", "name": "R. Welland"}, {"authorId": "3071513", "name": + "S. Beer"}]}, {"paperId": "5cc7233b281db8235599e33c2bcd25028697c43a", "externalIds": + {"MAG": "2131082333", "DBLP": "journals/cj/BlairS86", "DOI": "10.1093/comjnl/29.5.460", + "CorpusId": 36234275}, "corpusId": 36234275, "publicationVenue": {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", + "name": "Computer/law journal", "type": "journal", "alternate_names": ["Computer + journal", "The Computer Journal", "Comput j", "Comput J"], "issn": "0164-8756", + "alternate_issns": ["0010-4620"], "url": "https://repository.jmls.edu/jitpl/all_issues.html", + "alternate_urls": ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/5cc7233b281db8235599e33c2bcd25028697c43a", "title": "DSA - A Tool for Descriptive Text Analysis", "abstract": null, "venue": "Computer/law journal", "year": 1986, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, - "journal": {"volume": "29", "pages": "460-466", "name": "Comput. J."}, "authors": - [{"authorId": "119387717", "name": "A. Blair"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "631714cf447f09d806f3286e9dc56365e6fd433d", - "externalIds": {"DBLP": "journals/spe/SommervilleWBT86", "MAG": "1990141983", - "DOI": "10.1002/spe.4380160205", "CorpusId": 36794046}, "url": "https://www.semanticscholar.org/paper/631714cf447f09d806f3286e9dc56365e6fd433d", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://academic.oup.com/comjnl/article-pdf/29/5/460/1314680/290460.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"volume": "29", "pages": + "460-466", "name": "Comput. J."}, "authors": [{"authorId": "119387717", "name": + "A. Blair"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "631714cf447f09d806f3286e9dc56365e6fd433d", "externalIds": {"DBLP": "journals/spe/SommervilleWBT86", + "MAG": "1990141983", "DOI": "10.1002/spe.4380160205", "CorpusId": 36794046}, + "corpusId": 36794046, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/631714cf447f09d806f3286e9dc56365e6fd433d", "title": "SOFTLIB \u2014 a documentation management system", "abstract": "This paper describes a software sysem (SOFTLIB) that has been developed to assist in the management of software documentation generated during systems development @@ -15515,42 +17034,46 @@ interactions: development \u2014 it is not designed for use by end\u2010users of that software or for managing end\u2010user documentation.", "venue": "Softw. Pract. Exp.", "year": 1986, "referenceCount": 3, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1986-02-01", "journal": {"volume": "16", "name": "Software: - Practice and Experience"}, "authors": [{"authorId": "1711844", "name": "I. - Sommerville"}, {"authorId": "143748736", "name": "R. Welland"}, {"authorId": - "2067767465", "name": "I. Bennett"}, {"authorId": "144875474", "name": "R. - Thomson"}]}, {"paperId": "67d8b3ad63798d13df7e9dc2c2c57ac899953bea", "externalIds": - {"MAG": "2179742877", "CorpusId": 56995025}, "url": "https://www.semanticscholar.org/paper/67d8b3ad63798d13df7e9dc2c2c57ac899953bea", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1986-02-01", "journal": + {"volume": "16", "name": "Software: Practice and Experience"}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "143748736", + "name": "R. Welland"}, {"authorId": "2067767465", "name": "I. Bennett"}, {"authorId": + "144875474", "name": "R. Thomson"}]}, {"paperId": "67d8b3ad63798d13df7e9dc2c2c57ac899953bea", + "externalIds": {"MAG": "2179742877", "CorpusId": 56995025}, "corpusId": 56995025, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/67d8b3ad63798d13df7e9dc2c2c57ac899953bea", "title": "A software components catalogue", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1989-04-01", "journal": {"volume": "", "pages": - "189-206", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "145953716", "name": "M. Wood"}]}, {"paperId": "b7f2cc81f675640de9bf3905e17bbbd486c09df0", - "externalIds": {"MAG": "579749997", "DOI": "10.1016/0141-9331(87)90308-5", - "CorpusId": 106875110}, "url": "https://www.semanticscholar.org/paper/b7f2cc81f675640de9bf3905e17bbbd486c09df0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1989-04-01", "journal": + {"volume": "", "pages": "189-206", "name": ""}, "authors": [{"authorId": "1711844", + "name": "I. Sommerville"}, {"authorId": "145953716", "name": "M. Wood"}]}, + {"paperId": "b7f2cc81f675640de9bf3905e17bbbd486c09df0", "externalIds": {"MAG": + "579749997", "DOI": "10.1016/0141-9331(87)90308-5", "CorpusId": 106875110}, + "corpusId": 106875110, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b7f2cc81f675640de9bf3905e17bbbd486c09df0", "title": "Software engineering environments", "abstract": null, "venue": "", "year": 1986, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1986-08-01", "journal": {"volume": "", "pages": "258-258", "name": ""}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "1391640850", - "name": "P. Peregrinus"}]}, {"paperId": "31ef1c726351a8e86fdfcf1f1d2edfaa20ca864f", - "externalIds": {"MAG": "107357500", "CorpusId": 107781803}, "url": "https://www.semanticscholar.org/paper/31ef1c726351a8e86fdfcf1f1d2edfaa20ca864f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1986-08-01", "journal": {"volume": "", "pages": "258-258", + "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}, + {"authorId": "1391640850", "name": "P. Peregrinus"}]}, {"paperId": "31ef1c726351a8e86fdfcf1f1d2edfaa20ca864f", + "externalIds": {"MAG": "107357500", "CorpusId": 107781803}, "corpusId": 107781803, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/31ef1c726351a8e86fdfcf1f1d2edfaa20ca864f", "title": "Software engineering (2nd ed.)", "abstract": null, "venue": "", "year": 1985, "referenceCount": 0, "citationCount": 70, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1985-05-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "1711844", "name": "I. Sommerville"}]}, {"paperId": "509ae4e97b31b6baade4dc0509d3ea5f8d1f3dc9", - "externalIds": {"MAG": "2007553401", "DOI": "10.1049/SM:19850026", "CorpusId": - 58281000}, "url": "https://www.semanticscholar.org/paper/509ae4e97b31b6baade4dc0509d3ea5f8d1f3dc9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1985-05-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "509ae4e97b31b6baade4dc0509d3ea5f8d1f3dc9", "externalIds": {"MAG": + "2007553401", "DOI": "10.1049/SM:19850026", "CorpusId": 58281000}, "corpusId": + 58281000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/509ae4e97b31b6baade4dc0509d3ea5f8d1f3dc9", "title": "A high-speed image processing system using the TMS32010", "abstract": "A system is described for enhancing the performance of an image processing framestore. It uses the Texas Instruments TMS32010 digital signal processor, @@ -15559,15 +17082,16 @@ interactions: access image data held in the framestore. Hardware and software aspects of the implementation are discussed, and the improvements in execution time obtained are described.", "venue": "", "year": 1985, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1985-12-01", "journal": {"volume": - "4", "pages": "102-108", "name": "Software & Microsystems"}, "authors": [{"authorId": - "66261250", "name": "D. Holburn"}, {"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "159564d84c717591a180d7db047f66a799c781cf", "externalIds": {"DBLP": - "journals/spe/SommervilleS84", "MAG": "2073564049", "DOI": "10.1002/spe.4380140903", - "CorpusId": 46222550}, "url": "https://www.semanticscholar.org/paper/159564d84c717591a180d7db047f66a799c781cf", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1985-12-01", + "journal": {"volume": "4", "pages": "102-108", "name": "Software & Microsystems"}, + "authors": [{"authorId": "66261250", "name": "D. Holburn"}, {"authorId": "1711844", + "name": "I. Sommerville"}]}, {"paperId": "159564d84c717591a180d7db047f66a799c781cf", + "externalIds": {"DBLP": "journals/spe/SommervilleS84", "MAG": "2073564049", + "DOI": "10.1002/spe.4380140903", "CorpusId": 46222550}, "corpusId": 46222550, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/159564d84c717591a180d7db047f66a799c781cf", "title": "An Electronic Secretary", "abstract": "This paper describes an electronic mail system which has been implemented to provide facilities for the receiver as well as the sender of electronic mail. As well as the usual mail creation, @@ -15579,45 +17103,48 @@ interactions: model on which the system is based is a non\u2010automated office, so analogues of waste paper baskets, etc. are provided.", "venue": "Softw. Pract. Exp.", "year": 1984, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1984-09-01", "journal": {"volume": "14", "name": "Software: - Practice and Experience"}, "authors": [{"authorId": "1711844", "name": "I. - Sommerville"}, {"authorId": "2150581364", "name": "D. J. Smith"}]}, {"paperId": - "52bc65ac310480428e5683d2efce3ad2c3bd5573", "externalIds": {"DBLP": "conf/ispw/Sommerville84", - "MAG": "106285375", "CorpusId": 28656887}, "url": "https://www.semanticscholar.org/paper/52bc65ac310480428e5683d2efce3ad2c3bd5573", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1984-09-01", "journal": + {"volume": "14", "name": "Software: Practice and Experience"}, "authors": + [{"authorId": "1711844", "name": "I. Sommerville"}, {"authorId": "2150581364", + "name": "D. J. Smith"}]}, {"paperId": "52bc65ac310480428e5683d2efce3ad2c3bd5573", + "externalIds": {"DBLP": "conf/ispw/Sommerville84", "MAG": "106285375", "CorpusId": + 28656887}, "corpusId": 28656887, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/52bc65ac310480428e5683d2efce3ad2c3bd5573", "title": "Are we real software engineers?", "abstract": null, "venue": "ISPW", "year": 1984, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "59-63"}, "authors": [{"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "8de61dafdea11b25eef157ce7b5d53af218beb64", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "59-63"}, "authors": [{"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "8de61dafdea11b25eef157ce7b5d53af218beb64", "externalIds": {"MAG": "1966736875", "DOI": "10.1049/sm:19840020", "CorpusId": - 61115452}, "url": "https://www.semanticscholar.org/paper/8de61dafdea11b25eef157ce7b5d53af218beb64", + 61115452}, "corpusId": 61115452, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8de61dafdea11b25eef157ce7b5d53af218beb64", "title": "Book review: Software Engineering: Methods and. Techniques", "abstract": null, "venue": "", "year": 1984, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1984-06-01", "journal": - {"volume": "3", "pages": "66-66", "name": "Software & Microsystems"}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "9d631ebc3c0612c1b6123009d8103c15ecb627ca", - "externalIds": {"DBLP": "conf/ifip/Sommerville83", "MAG": "24817250", "CorpusId": - 44699515}, "url": "https://www.semanticscholar.org/paper/9d631ebc3c0612c1b6123009d8103c15ecb627ca", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1984-06-01", + "journal": {"volume": "3", "pages": "66-66", "name": "Software & Microsystems"}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "9d631ebc3c0612c1b6123009d8103c15ecb627ca", "externalIds": {"DBLP": "conf/ifip/Sommerville83", + "MAG": "24817250", "CorpusId": 44699515}, "corpusId": 44699515, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9d631ebc3c0612c1b6123009d8103c15ecb627ca", "title": "Software Engineering - An Educational Challenge", "abstract": null, "venue": "IFIP Congress", "year": 1983, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"pages": "193-197"}, - "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": - "f770e296250559b522e343977eba1fddddd28ce0", "externalIds": {"MAG": "2095503420", - "DBLP": "journals/robotica/Sommerville83", "DOI": "10.1017/S0263574700002228", - "CorpusId": 39090370}, "url": "https://www.semanticscholar.org/paper/f770e296250559b522e343977eba1fddddd28ce0", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "193-197"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, + {"paperId": "f770e296250559b522e343977eba1fddddd28ce0", "externalIds": {"MAG": + "2095503420", "DBLP": "journals/robotica/Sommerville83", "DOI": "10.1017/S0263574700002228", + "CorpusId": 39090370}, "corpusId": 39090370, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f770e296250559b522e343977eba1fddddd28ce0", "title": "Software For Engineering Problems edited by R.A. Adey, CML Publications, Southampton, U.K., 1983, 150 pp. (\u00a315.00)", "abstract": "is work at the Milan Polytechnic in Italy on the use of structured light for object recognition. @@ -15644,14 +17171,15 @@ interactions: time. On the whole, however, the book is recommended to anyone who wishes to take robot vision seriously.", "venue": "Robotica", "year": 1983, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1983-10-01", "journal": {"volume": - "1", "pages": "242 - 242", "name": "Robotica"}, "authors": [{"authorId": "1711844", - "name": "I. Sommerville"}]}, {"paperId": "990178a6939136b08f851486e4d6f55349b1a592", - "externalIds": {"DBLP": "journals/spe/Sommerville82", "MAG": "2731201547", - "DOI": "10.1002/spe.4380120604", "CorpusId": 12749585}, "url": "https://www.semanticscholar.org/paper/990178a6939136b08f851486e4d6f55349b1a592", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Engineering", "source": "external"}, {"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1983-10-01", "journal": {"volume": "1", "pages": "242 - 242", "name": "Robotica"}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "990178a6939136b08f851486e4d6f55349b1a592", "externalIds": {"DBLP": "journals/spe/Sommerville82", + "MAG": "2731201547", "DOI": "10.1002/spe.4380120604", "CorpusId": 12749585}, + "corpusId": 12749585, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/990178a6939136b08f851486e4d6f55349b1a592", "title": "A pattern matching system", "abstract": "This paper describes a pattern matching system which has been implemented as a set of library procedures. The system provides a concise and consistent method of pattern definition @@ -15662,14 +17190,14 @@ interactions: system has applications in information retrieval, text manipulation and language processing.", "venue": "Softw. Pract. Exp.", "year": 1982, "referenceCount": 9, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1982-06-01", "journal": {"volume": "12", "name": "Software: Practice and - Experience"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, - {"paperId": "8cd882f959e1af0480a3a93686c27fc52167114a", "externalIds": {"DOI": - "10.1080/00325481.1981.11715941", "CorpusId": 2519871, "PubMed": "27449586"}, - "url": "https://www.semanticscholar.org/paper/8cd882f959e1af0480a3a93686c27fc52167114a", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1982-06-01", "journal": {"volume": "12", "name": "Software: + Practice and Experience"}, "authors": [{"authorId": "1711844", "name": "I. + Sommerville"}]}, {"paperId": "8cd882f959e1af0480a3a93686c27fc52167114a", "externalIds": + {"DOI": "10.1080/00325481.1981.11715941", "CorpusId": 2519871, "PubMed": "27449586"}, + "corpusId": 2519871, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8cd882f959e1af0480a3a93686c27fc52167114a", "title": "Self\u2010Assessment Test", "abstract": "CS546 is a graduate-level course in computer systems security. While there are no formal pre-requisites for this course, an undergraduate-level exposure to standard computer science @@ -15680,16 +17208,17 @@ interactions: questions. If you find yourself struggling, you may be better off taking other courses to fill in this missing background.", "venue": "Postgraduate medicine", "year": 1981, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "15", "name": "Pharmacotherapy: The Journal of - Human Pharmacology and Drug Therapy"}, "authors": [{"authorId": "152260638", - "name": "Nurit Gal-Oz"}, {"authorId": "1711844", "name": "I. Sommerville"}, - {"authorId": "152817209", "name": "D. Berry"}, {"authorId": "38169546", "name": - "G. Myers"}]}, {"paperId": "1ce78a711bc09611ce51b9dbcbc586a018115f09", "externalIds": - {"DBLP": "journals/sigplan/Sommerville79", "MAG": "2013584698", "DOI": "10.1145/954051.954059", - "CorpusId": 5165949}, "url": "https://www.semanticscholar.org/paper/1ce78a711bc09611ce51b9dbcbc586a018115f09", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "15", "name": "Pharmacotherapy: + The Journal of Human Pharmacology and Drug Therapy"}, "authors": [{"authorId": + "152260638", "name": "Nurit Gal-Oz"}, {"authorId": "1711844", "name": "I. + Sommerville"}, {"authorId": "152817209", "name": "D. Berry"}, {"authorId": + "38169546", "name": "G. Myers"}]}, {"paperId": "1ce78a711bc09611ce51b9dbcbc586a018115f09", + "externalIds": {"DBLP": "journals/sigplan/Sommerville79", "MAG": "2013584698", + "DOI": "10.1145/954051.954059", "CorpusId": 5165949}, "corpusId": 5165949, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1ce78a711bc09611ce51b9dbcbc586a018115f09", "title": "S-SNOBOL: structured SNOBOL4", "abstract": "5ummary 7h15 paper de5cr16e5 50me exten510n5 t0 the 5N080L4 pr09ramm1n9 1an9ua9e, re5u1t1n9 1n a new 1an9ua9e 5-5N080L. 5tructured c0ntr01 c0n5truct5 5uch a5 1f-then-e15e, wh11e-d0 etc. @@ -15714,13 +17243,14 @@ interactions: nece551ty t0 DEF1NE a funct10n 6ef0re u51n9 1t, and the fact that the Pr09rammer may 90 t0 funct10n5.", "venue": "SIGP", "year": 1979, "referenceCount": 3, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"volume": "14", "pages": "91-99", "name": "ACM SIGPLAN Notices"}, "authors": - [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "c85c3482ff09da40ba6442cd7b01ebc79f80497d", - "externalIds": {"DBLP": "conf/sigcse/Sommerville77", "MAG": "2041607146", - "DOI": "10.1145/800104.803369", "CorpusId": 20267703}, "url": "https://www.semanticscholar.org/paper/c85c3482ff09da40ba6442cd7b01ebc79f80497d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"volume": "14", "pages": "91-99", "name": "ACM SIGPLAN Notices"}, + "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": + "c85c3482ff09da40ba6442cd7b01ebc79f80497d", "externalIds": {"DBLP": "conf/sigcse/Sommerville77", + "MAG": "2041607146", "DOI": "10.1145/800104.803369", "CorpusId": 20267703}, + "corpusId": 20267703, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c85c3482ff09da40ba6442cd7b01ebc79f80497d", "title": "Machine language programming in an undergraduate computer science curriculum", "abstract": "This paper examines the advantages and disadvantages of teaching machine language programming to computer science undergraduate @@ -15728,12 +17258,14 @@ interactions: control constructs, is presented as an alternative to conventional assembly language. Experiences with using this language are described.", "venue": "SIGCSE ''77", "year": 1977, "referenceCount": 1, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/382063.803369", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1977-02-02", "journal": {"pages": "104-107"}, "authors": [{"authorId": "1711844", "name": "I. Sommerville"}]}, {"paperId": "0b1c2354d317547df3adca9475efc618b2b1a150", - "externalIds": {"CorpusId": 14682079}, "url": "https://www.semanticscholar.org/paper/0b1c2354d317547df3adca9475efc618b2b1a150", + "externalIds": {"CorpusId": 14682079}, "corpusId": 14682079, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0b1c2354d317547df3adca9475efc618b2b1a150", "title": "A Container-Based Approach to Fault Tolerance in Service-Oriented Architectures", "abstract": "This paper introduces an innovative approach to improving service availability and reliability. Central to the approach @@ -15751,12 +17283,13 @@ interactions: means that its users can complement and extend the set of fault tolerance mechanisms already imple-", "venue": "", "year": null, "referenceCount": 12, "citationCount": 9, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "33797193", "name": "G. Dobson"}, - {"authorId": "2072036054", "name": "S. Hall"}, {"authorId": "1711844", "name": - "I. Sommerville"}]}, {"paperId": "dac7b875ae6c2e8ac09106ebe937664e395a962d", - "externalIds": {"CorpusId": 18819689}, "url": "https://www.semanticscholar.org/paper/dac7b875ae6c2e8ac09106ebe937664e395a962d", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "33797193", + "name": "G. Dobson"}, {"authorId": "2072036054", "name": "S. Hall"}, {"authorId": + "1711844", "name": "I. Sommerville"}]}, {"paperId": "dac7b875ae6c2e8ac09106ebe937664e395a962d", + "externalIds": {"CorpusId": 18819689}, "corpusId": 18819689, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/dac7b875ae6c2e8ac09106ebe937664e395a962d", "title": "Specification D 5-Report on the dependability properties of P 2 P architectures", "abstract": "SUMMARY This document represents an initial analysis of the properties that affect Peer-to-Peer architectures. It sets @@ -15771,11 +17304,11 @@ interactions: software architectures \u2022 General corrections to the text P2P ARCHITECT 0305F01_DependabilityReport", "venue": "", "year": null, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2775878", "name": "L. Melville"}, - {"authorId": "2334381", "name": "J. Walkerdine"}, {"authorId": "1711844", - "name": "I. Sommerville"}]}]}] + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2775878", + "name": "L. Melville"}, {"authorId": "2334381", "name": "J. Walkerdine"}, + {"authorId": "1711844", "name": "I. Sommerville"}]}]}] ' headers: @@ -15784,31 +17317,31 @@ interactions: Connection: - keep-alive Content-Length: - - '1289437' + - '1403626' Content-Type: - application/json Date: - - Mon, 02 Jan 2023 03:47:07 GMT + - Tue, 03 Jan 2023 20:49:21 GMT Via: - - 1.1 f88bd4c15622473fc18eef7d15f4b8d4.cloudfront.net (CloudFront) + - 1.1 1bcfe6258d4a13f2b6f9b5ee43e42254.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - w8HFEQWAUCzFGGtYZ3T3u-_r1-WTaOIcwgoQATQn0hvH-Yyp-Ybfvg== + - pwaPNtukZ13kQG4PV2dMU2gSwmGclxjeSAzZ43UtO_LD32J-SZjIDw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - eGIFSE9kvHcFvtg= + - eLwwuGMbvHcFQHQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '1289437' + - '1403626' x-amzn-Remapped-Date: - - Mon, 02 Jan 2023 03:47:07 GMT + - Tue, 03 Jan 2023 20:49:21 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 3f84d4b0-1eae-43f2-887e-281e231b9386 + - 5233efa3-d2c4-4393-aae8-e1a185a90a16 status: code: 200 message: OK diff --git a/tests/data/test_get_paper.yaml b/tests/data/test_get_paper.yaml index f2daf5d..c6952bb 100644 --- a/tests/data/test_get_paper.yaml +++ b/tests/data/test_get_paper.yaml @@ -11,12 +11,13 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/10.1093/mind/lix.236.433?&fields=abstract,authors,authors.affiliations,authors.aliases,authors.authorId,authors.citationCount,authors.externalIds,authors.hIndex,authors.homepage,authors.name,authors.paperCount,authors.url,citationCount,citations,citations.abstract,citations.authors,citations.citationCount,citations.externalIds,citations.fieldsOfStudy,citations.influentialCitationCount,citations.isOpenAccess,citations.journal,citations.paperId,citations.publicationDate,citations.publicationTypes,citations.referenceCount,citations.s2FieldsOfStudy,citations.title,citations.url,citations.venue,citations.year,embedding,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,references,references.abstract,references.authors,references.citationCount,references.externalIds,references.fieldsOfStudy,references.influentialCitationCount,references.isOpenAccess,references.journal,references.paperId,references.publicationDate,references.publicationTypes,references.referenceCount,references.s2FieldsOfStudy,references.title,references.url,references.venue,references.year,s2FieldsOfStudy,title,tldr,url,venue,year + uri: https://api.semanticscholar.org/graph/v1/paper/10.1093/mind/lix.236.433?&fields=abstract,authors,authors.affiliations,authors.aliases,authors.authorId,authors.citationCount,authors.externalIds,authors.hIndex,authors.homepage,authors.name,authors.paperCount,authors.url,citationCount,citations,citations.abstract,citations.authors,citations.citationCount,citations.corpusId,citations.externalIds,citations.fieldsOfStudy,citations.influentialCitationCount,citations.isOpenAccess,citations.journal,citations.openAccessPdf,citations.paperId,citations.publicationDate,citations.publicationTypes,citations.publicationVenue,citations.referenceCount,citations.s2FieldsOfStudy,citations.title,citations.url,citations.venue,citations.year,corpusId,embedding,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,references,references.abstract,references.authors,references.citationCount,references.citationStyles,references.corpusId,references.externalIds,references.fieldsOfStudy,references.influentialCitationCount,references.isOpenAccess,references.journal,references.openAccessPdf,references.paperId,references.publicationDate,references.publicationTypes,references.publicationVenue,references.referenceCount,references.s2FieldsOfStudy,references.title,references.url,references.venue,references.year,s2FieldsOfStudy,title,tldr,url,venue,year response: body: string: '{"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", - "CorpusId": 14636783}, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", + "CorpusId": 14636783}, "corpusId": 14636783, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", "title": "Computing Machinery and Intelligence", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. @@ -27,323 +28,479 @@ interactions: and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": - 8557, "influentialCitationCount": 492, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "embedding": {"model": - "specter@v0.1.1", "vector": [1.4912004470825195, -3.5677378177642822, -1.1445329189300537, - 0.9798691868782043, 2.3536713123321533, 2.412142753601074, 4.424642086029053, - -2.8761181831359863, -2.1257364749908447, -1.1084790229797363, -3.251805067062378, - 1.1977577209472656, 3.253897190093994, -1.9838618040084839, -1.4531219005584717, - 0.8836204409599304, -1.073793888092041, -2.7192888259887695, 1.6965833902359009, - 0.5184207558631897, 1.773499608039856, 2.5366764068603516, -4.089727878570557, - -2.662728786468506, -1.4416794776916504, -3.607022285461426, 2.746018886566162, - -1.7733300924301147, -0.5106160640716553, 0.5690411329269409, -1.8916593790054321, - -1.9661279916763306, 3.3400611877441406, -3.8053669929504395, 0.9296400547027588, - 0.41943711042404175, 3.257852554321289, 4.370321273803711, 0.3067270517349243, - -3.8996522426605225, -2.726933479309082, 3.125169277191162, 4.091403007507324, - 1.59388267993927, 1.3132169246673584, 1.040267825126648, 2.296818733215332, - 1.9781070947647095, 0.7093571424484253, 2.5194222927093506, 1.4122633934020996, - -0.04770202562212944, 3.20090389251709, 3.387321949005127, 3.338480234146118, - -2.636532783508301, 0.0511288084089756, 0.851689338684082, 2.454941749572754, - 0.41139668226242065, 2.935403823852539, 0.7794689536094666, -2.964092969894409, - -2.885684013366699, 2.0985352993011475, -0.8140782117843628, -2.9402453899383545, - -1.6351039409637451, 2.4304869174957275, -3.5581846237182617, -1.1929571628570557, - -5.903554916381836, 3.020494222640991, -2.540940046310425, -1.2359957695007324, - -2.2539517879486084, -0.26531949639320374, -4.144553184509277, 2.4638936519622803, - -2.071890354156494, 2.238892078399658, -0.7647629380226135, -0.421325147151947, - 2.4426727294921875, 2.2411584854125977, -0.18960316479206085, -1.995802879333496, - -2.0175564289093018, 0.08678353577852249, 1.270195722579956, 0.10762540251016617, - -0.015511035919189453, 1.986484169960022, 4.073625087738037, -2.114347457885742, - 0.7542542219161987, 1.5746797323226929, 1.1141210794448853, 1.6224344968795776, - 1.476503610610962, 0.15173879265785217, 0.17057406902313232, 4.779618740081787, - -2.5163748264312744, 3.208101749420166, -0.46435248851776123, 1.7156789302825928, - 4.8144354820251465, 4.347252368927002, -3.5524511337280273, 4.120011329650879, - 1.0828466415405273, -0.009330213069915771, -0.4017130136489868, 1.751489281654358, - -0.5669882297515869, 0.0016049202531576157, 0.34845665097236633, -5.341610431671143, - -1.2483819723129272, -3.4553205966949463, 0.30804696679115295, -1.643052577972412, - 0.6510483622550964, 0.7783281803131104, -3.4772589206695557, -6.633528709411621, - -0.24480584263801575, -0.4053124785423279, -1.5410195589065552, 3.3885180950164795, - 1.4575270414352417, 2.6739587783813477, 1.4166474342346191, 0.11588010936975479, - 2.9077024459838867, -1.011893391609192, -0.5767647624015808, -1.5823938846588135, - -1.4049330949783325, 2.5106942653656006, 0.7393538951873779, 1.5895920991897583, - 0.0003083422780036926, -3.374191999435425, 4.317915916442871, -0.9368650317192078, - -5.205918312072754, -2.2786436080932617, 2.188253402709961, 3.1293387413024902, - -4.58628511428833, -0.4621364176273346, -2.2124624252319336, 1.9622949361801147, - 3.820875644683838, -3.2327256202697754, 0.5001388192176819, -0.08520727604627609, - -0.2393031120300293, -0.5099124908447266, -4.311080455780029, -7.625182628631592, - -0.7195397615432739, -0.09316174685955048, -4.389499187469482, -1.0065091848373413, - 2.595703125, -0.9527037739753723, 1.5434409379959106, 0.1468064934015274, - 0.4864352345466614, -4.90764045715332, 2.314533233642578, 1.4545546770095825, - 4.534533977508545, -1.3333895206451416, -0.6372758150100708, -0.04751807451248169, - -0.022305790334939957, -0.6378300189971924, 1.9842281341552734, -4.330424785614014, - -2.5224874019622803, -1.7467732429504395, -5.2638421058654785, 0.6906782984733582, - -4.064807415008545, 1.6263312101364136, 1.4265756607055664, -3.7292516231536865, - -2.8003158569335938, 1.2935411930084229, 4.026785373687744, 0.81377774477005, - -1.3772810697555542, 3.7837374210357666, 1.8329479694366455, -0.24431589245796204, - 0.44198039174079895, 0.2649782598018646, 1.1607179641723633, -1.1263234615325928, - -1.2537122964859009, 1.9910213947296143, 2.0369362831115723, -1.2187927961349487, - 5.146304607391357, -0.09589923918247223, 0.7303347587585449, 3.9201860427856445, - 1.120862603187561, -1.0793205499649048, -3.2901806831359863, 0.26532667875289917, - 1.4524774551391602, -5.4654741287231445, -0.007292408496141434, 4.590025901794434, - 0.5332738161087036, -1.4688737392425537, -1.5493791103363037, 3.8060014247894287, - -2.5307557582855225, 2.2415049076080322, 0.04449813812971115, -0.4910835325717926, - -3.439023733139038, 1.2819942235946655, -2.450918197631836, -1.7708230018615723, - -3.58064341545105, -1.4969606399536133, 1.0039310455322266, -1.7640535831451416, - -1.0593749284744263, -5.585129261016846, -0.7832945585250854, 1.119728684425354, - 0.4876984655857086, 0.3577856421470642, 0.8662077188491821, -1.6058495044708252, - 2.0129234790802, -3.0357728004455566, 0.8151829242706299, -3.568014621734619, - 2.1913697719573975, -0.47153159976005554, -2.5587644577026367, -3.268476724624634, - -1.2067168951034546, 0.24534153938293457, 2.982598304748535, 1.7270994186401367, - 3.4260847568511963, -1.5833585262298584, -3.3782668113708496, 2.574708938598633, - 1.3798424005508423, 0.7863763570785522, 1.4131414890289307, -3.3678414821624756, - 1.3044129610061646, 2.4515881538391113, -3.4740331172943115, -5.765645503997803, - -1.739263653755188, -0.6904822587966919, -1.3561055660247803, -0.4330002963542938, - -0.41918060183525085, 2.121532917022705, -2.163936138153076, 1.7772341966629028, - -1.3180198669433594, -0.3127167522907257, -0.5866559147834778, 4.935529708862305, - 0.759954035282135, 1.2544664144515991, 0.48061805963516235, 0.6665018796920776, - -3.271209955215454, -0.19271861016750336, -0.6262511014938354, 3.658082962036133, - 1.7972036600112915, 1.9327462911605835, 0.6973538994789124, 0.5085180401802063, - 4.304430961608887, -4.336119174957275, 2.1630356311798096, -0.21497029066085815, - 0.8230308294296265, 4.160607814788818, 1.1526957750320435, -2.010878086090088, - 2.2168242931365967, 0.0011761756613850594, 4.143531799316406, 2.5589847564697266, - 1.6056995391845703, -0.3169042766094208, 3.184293270111084, 2.134319305419922, - -4.298863887786865, 0.3618548810482025, -2.017502784729004, 1.8477715253829956, - 0.05207091197371483, -0.537638247013092, -3.9817962646484375, 0.5500563383102417, - -0.4757603406906128, 2.2578113079071045, 0.38371512293815613, -2.2485015392303467, - 2.498448371887207, -0.3643079102039337, 1.4773989915847778, 0.6141877770423889, - 0.1441245675086975, -3.072169780731201, 2.299468517303467, 2.4218196868896484, - -0.0861143171787262, -1.3371458053588867, -2.2199652194976807, -0.4460529685020447, - 1.0827375650405884, 2.511638641357422, 2.1290223598480225, -1.1577873229980469, - -6.184621810913086, 1.0780055522918701, -3.886425733566284, 1.7774617671966553, - -1.3791542053222656, -0.8490374088287354, 5.72236442565918, 1.5893830060958862, - 0.32902979850769043, -2.497596025466919, 3.1421282291412354, 2.0923655033111572, - -2.642005205154419, -3.839104413986206, 4.451228618621826, 1.3005056381225586, - 1.8951539993286133, 1.6728183031082153, 0.826499342918396, 3.9324283599853516, - 3.3128347396850586, 3.914780855178833, -0.7221781015396118, -1.3029998540878296, - -2.013812780380249, -2.182837963104248, -0.2159322053194046, 1.8456220626831055, - 0.529842734336853, -1.199500560760498, -2.289618968963623, 6.9116973876953125, - -5.502941608428955, -0.6482645273208618, -2.602815628051758, -3.04982852935791, - -2.127835750579834, -3.1478404998779297, -0.34581586718559265, -0.7402955889701843, - -4.066827297210693, -0.47199007868766785, -4.059601783752441, 2.327622413635254, - 1.1821439266204834, 0.15096122026443481, -0.6574445366859436, 0.5852963328361511, - 3.317716598510742, 0.8644300699234009, 1.4340680837631226, -2.432757616043091, - 2.0555384159088135, -3.90724778175354, 1.0012681484222412, -0.41373327374458313, - -2.8298823833465576, 6.131030559539795, 2.0150856971740723, -1.8204972743988037, - -1.0754027366638184, -2.309323310852051, -2.379054546356201, -3.0613415241241455, - 3.03078556060791, -1.1570667028427124, -1.0867667198181152, 3.627497911453247, - 1.3414182662963867, -0.7400435209274292, -0.9083080887794495, 1.6084264516830444, - -3.6992690563201904, -5.179874420166016, 1.0713765621185303, -7.001905918121338, - -1.0234386920928955, -1.279598355293274, -0.6123147010803223, 2.594583749771118, - 1.7951123714447021, 3.0504584312438965, 3.647704839706421, -0.8255187273025513, - 0.46131110191345215, -2.8640248775482178, 0.9530532956123352, 9.28664493560791, - 3.295341968536377, -1.9902756214141846, 2.6219594478607178, 1.1045936346054077, - 4.152153015136719, -2.8982529640197754, 3.1394364833831787, 2.14168119430542, - 4.563228130340576, -0.4255490005016327, 0.4556257128715515, 2.189849376678467, - -0.5173490643501282, 0.6736354231834412, -0.13150930404663086, 2.7108571529388428, - -5.299671649932861, 2.277427911758423, -1.1924024820327759, 0.3604048490524292, - 0.20612220466136932, -3.454986095428467, 1.292128562927246, 2.894195079803467, - 2.223227024078369, -0.9455307126045227, -1.7939320802688599, 0.06685015559196472, - 0.27166950702667236, -0.14791132509708405, -2.916079521179199, 0.7232120633125305, - 0.13648608326911926, -1.9105552434921265, 1.232003092765808, 0.21377891302108765, - 2.044219970703125, -3.128916025161743, 4.0654401779174805, -1.64369535446167, - 0.18517795205116272, 2.5652148723602295, -3.774272918701172, 0.04907339811325073, - -0.06912461668252945, 0.15278685092926025, -0.7334116101264954, 3.400716781616211, - -1.2366024255752563, -4.117137432098389, 2.140357255935669, 0.8362204432487488, - 4.288045406341553, 5.800609588623047, 4.423896789550781, 1.7416282892227173, - -0.43763279914855957, -2.626300811767578, -1.703445315361023, 4.882078170776367, - 0.7089818716049194, 0.9079666137695312, 2.447680711746216, -2.0190351009368896, - -1.3947519063949585, -0.31683510541915894, 0.8696826100349426, -3.5703392028808594, - 0.2538117468357086, 5.1805243492126465, 0.7383964657783508, -2.8177847862243652, - 1.5130589008331299, -3.856858253479004, -5.221625328063965, -0.3264671862125397, - 1.077576994895935, 0.6066218018531799, -4.628721714019775, -0.9978218674659729, - -2.860262632369995, 3.91422438621521, 4.650241374969482, 0.6411037445068359, - 3.27441143989563, 2.8085005283355713, -1.5118881464004517, -0.2862726151943207, - -0.027123019099235535, -0.9779676795005798, -0.07652962952852249, 0.6351696252822876, - -1.9043272733688354, 2.096518039703369, 4.422485828399658, -1.0958195924758911, - 0.27752557396888733, 0.6965365409851074, -0.07153210788965225, -3.7454171180725098, - 0.608910083770752, -3.2880749702453613, 1.4592971801757812, 0.12961120903491974, - 0.6550276279449463, 1.2567991018295288, 2.4147582054138184, 2.145935297012329, - 2.7853281497955322, -2.1146483421325684, 0.6186407804489136, 3.230029582977295, - -2.019900321960449, -1.8758838176727295, 4.192493915557861, 0.567356288433075, - 0.9650986194610596, -3.891258478164673, -0.07773301750421524, -1.4568970203399658, - 1.511470913887024, 2.817631959915161, 5.228792667388916, -4.549345970153809, - -2.3188655376434326, -5.015311241149902, 0.8192861676216125, 3.086291551589966, - 0.055960580706596375, 3.0219428539276123, 1.3445091247558594, -2.978372097015381, - -0.9532874226570129, -2.3546040058135986, 0.3788264989852905, 0.8931404948234558, - 1.654476284980774, 2.0823516845703125, -0.7059788703918457, -3.477396011352539, - -1.2190135717391968, 3.1988987922668457, -0.9511443376541138, 0.31925660371780396, - 1.1658567190170288, -2.6117656230926514, -3.3201589584350586, 1.3019773960113525, - 1.1917563676834106, 2.419656276702881, -0.5857217311859131, 0.8047353029251099, - 2.6140263080596924, 3.198706865310669, -0.2895236313343048, 1.7804657220840454, - -0.41059935092926025, 1.591880440711975, 1.0578147172927856, -0.9528192281723022, - -0.6371835470199585, -0.8999473452568054, 2.926731586456299, -2.5385398864746094, - 1.3672055006027222, -2.8778762817382812, -4.268380641937256, -0.4135794937610626, - -0.13491739332675934, -1.7325851917266846, 1.1960667371749878, 0.7391232848167419, - -4.127851963043213, 0.7886160016059875, -0.9319157600402832, -0.07458949089050293, - 0.3255041837692261, -0.9248706102371216, 2.1431007385253906, 4.779815196990967, - 1.7006468772888184, -2.898259401321411, -4.037906169891357, 2.250380516052246, - -0.2571093440055847, 1.803026795387268, -0.6334996223449707, 0.38012900948524475, - -0.7178404331207275, 10.408695220947266, 0.4416235089302063, 3.2658486366271973, - -2.645660161972046, 3.1659204959869385, -2.9682207107543945, -1.8574892282485962, - -0.5166532397270203, 0.48397955298423767, -0.6754127740859985, 5.767602920532227, - 1.635308027267456, -2.2770495414733887, 1.5910547971725464, -3.266660213470459, - -0.36168932914733887, 0.804029107093811, 4.0777435302734375, 3.6347291469573975, - 2.446516990661621, 1.0559085607528687, 0.7756821513175964, 0.3844594955444336, - -3.2986485958099365, 1.153260350227356, 2.703200101852417, 3.977548360824585, - -0.6733660101890564, -2.5609700679779053, 1.570186972618103, -2.4598803520202637, - -1.199933648109436, 1.8013646602630615, 1.1733877658843994, -0.9769896268844604, - 0.27824100852012634, 4.334930896759033, -3.2949230670928955, -3.437204360961914, - -2.245392084121704, 1.3960449695587158, -2.8982086181640625, -5.141915798187256, - 2.592688798904419, -1.7752970457077026, -1.1991205215454102, 5.469426155090332, - 1.0072311162948608, 0.5077131390571594, 5.818460464477539, -2.7980525493621826, - -0.7477746605873108, -2.333284854888916, -0.8473489880561829, 0.5736323595046997, - -0.6414474248886108, 0.763018012046814, -4.140954494476318, -0.8839965462684631, - -2.4077603816986084, 2.392150640487671, -1.750841498374939, 3.517760753631592, - -3.4706099033355713, -0.8139467239379883, -1.162028431892395, -1.7277436256408691, - -0.012990135699510574, 1.633035659790039, 0.5467530488967896, 2.617684841156006, - 2.025974988937378, -1.8517699241638184, -2.4114012718200684, 0.3498564660549164, - -3.3467040061950684, 0.9990707039833069, -3.2822868824005127, -2.11946964263916, - 7.44944953918457, -3.1606969833374023, -1.0515354871749878, -4.833910942077637, - 3.2854321002960205, 5.417191028594971, -3.63417911529541, 1.4485042095184326, - -1.780576467514038, 0.7408013343811035, -0.623672604560852, -3.956453800201416, - -0.4284232258796692, 5.948563575744629, 0.9917374849319458, 1.4613680839538574, - 1.8326377868652344, -0.5463629364967346, 2.1198883056640625, -4.7847514152526855, - -3.700894355773926, 0.7175806164741516, 0.28311285376548767, 0.7922775745391846, - 1.0427093505859375, -2.716966390609741, -2.286104917526245, -1.7376515865325928, - -1.365503191947937, -4.581218719482422, 1.696526288986206, 1.9796323776245117, - -1.6948431730270386, -1.4996675252914429, 3.3924407958984375, -2.018606185913086, - 0.375287801027298, -1.4784940481185913, 2.4106976985931396, 1.8442091941833496, - 0.30308371782302856, 0.7252417206764221, 0.4834488332271576, 2.05482816696167, - -5.502094268798828, 1.4989551305770874, -0.036200929433107376, 0.7935841083526611, - -6.309118270874023, 0.28731459379196167, 0.7802544236183167, 1.6197532415390015, - -0.21075761318206787, 3.5668857097625732, -3.1733810901641846, 0.14286154508590698, - -0.3445669412612915, 1.4772952795028687, 1.1107704639434814, 1.3991512060165405, - 4.0126633644104, -0.5388878583908081, 0.20864829421043396, -1.4177249670028687, - 4.58060359954834, -3.0819759368896484, -2.489410638809204, -1.2240601778030396, - 2.822070598602295, -3.266664743423462, -0.29265448451042175, 1.4111319780349731, - -0.8745537400245667, -1.8424195051193237, 1.735237956047058, -0.6763474941253662, - -1.7880852222442627]}, "tldr": {"model": "tldr@v2.0.0", "text": "The question, - \u201cCan machines think?\u201d is considered, and the question is replaced - by another, which is closely related to it and is expressed in relatively - unambiguous words."}, "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "1950-10-01", "journal": {"name": "Mind", "pages": "433-460", "volume": "LIX"}, - "authors": [{"authorId": "2262347", "externalIds": {"DBLP": ["Alan M. Turing"]}, - "url": "https://www.semanticscholar.org/author/2262347", "name": "A. Turing", - "aliases": ["A Turing", "A M Turing", "A. M. Turing", "Alan M. Turing", "Alan - Turing", "Alan Mathison Turing"], "affiliations": [], "homepage": null, "paperCount": - 60, "citationCount": 12304, "hIndex": 23}], "citations": [{"paperId": "de6e3d9e35ad2e4089bfc26a9ecc11ed7996c95b", + 8596, "influentialCitationCount": 493, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "embedding": {"model": "specter@v0.1.1", "vector": [1.4912004470825195, -3.5677378177642822, + -1.1445329189300537, 0.9798691868782043, 2.3536713123321533, 2.412142753601074, + 4.424642086029053, -2.8761181831359863, -2.1257364749908447, -1.1084790229797363, + -3.251805067062378, 1.1977577209472656, 3.253897190093994, -1.9838618040084839, + -1.4531219005584717, 0.8836204409599304, -1.073793888092041, -2.7192888259887695, + 1.6965833902359009, 0.5184207558631897, 1.773499608039856, 2.5366764068603516, + -4.089727878570557, -2.662728786468506, -1.4416794776916504, -3.607022285461426, + 2.746018886566162, -1.7733300924301147, -0.5106160640716553, 0.5690411329269409, + -1.8916593790054321, -1.9661279916763306, 3.3400611877441406, -3.8053669929504395, + 0.9296400547027588, 0.41943711042404175, 3.257852554321289, 4.370321273803711, + 0.3067270517349243, -3.8996522426605225, -2.726933479309082, 3.125169277191162, + 4.091403007507324, 1.59388267993927, 1.3132169246673584, 1.040267825126648, + 2.296818733215332, 1.9781070947647095, 0.7093571424484253, 2.5194222927093506, + 1.4122633934020996, -0.04770202562212944, 3.20090389251709, 3.387321949005127, + 3.338480234146118, -2.636532783508301, 0.0511288084089756, 0.851689338684082, + 2.454941749572754, 0.41139668226242065, 2.935403823852539, 0.7794689536094666, + -2.964092969894409, -2.885684013366699, 2.0985352993011475, -0.8140782117843628, + -2.9402453899383545, -1.6351039409637451, 2.4304869174957275, -3.5581846237182617, + -1.1929571628570557, -5.903554916381836, 3.020494222640991, -2.540940046310425, + -1.2359957695007324, -2.2539517879486084, -0.26531949639320374, -4.144553184509277, + 2.4638936519622803, -2.071890354156494, 2.238892078399658, -0.7647629380226135, + -0.421325147151947, 2.4426727294921875, 2.2411584854125977, -0.18960316479206085, + -1.995802879333496, -2.0175564289093018, 0.08678353577852249, 1.270195722579956, + 0.10762540251016617, -0.015511035919189453, 1.986484169960022, 4.073625087738037, + -2.114347457885742, 0.7542542219161987, 1.5746797323226929, 1.1141210794448853, + 1.6224344968795776, 1.476503610610962, 0.15173879265785217, 0.17057406902313232, + 4.779618740081787, -2.5163748264312744, 3.208101749420166, -0.46435248851776123, + 1.7156789302825928, 4.8144354820251465, 4.347252368927002, -3.5524511337280273, + 4.120011329650879, 1.0828466415405273, -0.009330213069915771, -0.4017130136489868, + 1.751489281654358, -0.5669882297515869, 0.0016049202531576157, 0.34845665097236633, + -5.341610431671143, -1.2483819723129272, -3.4553205966949463, 0.30804696679115295, + -1.643052577972412, 0.6510483622550964, 0.7783281803131104, -3.4772589206695557, + -6.633528709411621, -0.24480584263801575, -0.4053124785423279, -1.5410195589065552, + 3.3885180950164795, 1.4575270414352417, 2.6739587783813477, 1.4166474342346191, + 0.11588010936975479, 2.9077024459838867, -1.011893391609192, -0.5767647624015808, + -1.5823938846588135, -1.4049330949783325, 2.5106942653656006, 0.7393538951873779, + 1.5895920991897583, 0.0003083422780036926, -3.374191999435425, 4.317915916442871, + -0.9368650317192078, -5.205918312072754, -2.2786436080932617, 2.188253402709961, + 3.1293387413024902, -4.58628511428833, -0.4621364176273346, -2.2124624252319336, + 1.9622949361801147, 3.820875644683838, -3.2327256202697754, 0.5001388192176819, + -0.08520727604627609, -0.2393031120300293, -0.5099124908447266, -4.311080455780029, + -7.625182628631592, -0.7195397615432739, -0.09316174685955048, -4.389499187469482, + -1.0065091848373413, 2.595703125, -0.9527037739753723, 1.5434409379959106, + 0.1468064934015274, 0.4864352345466614, -4.90764045715332, 2.314533233642578, + 1.4545546770095825, 4.534533977508545, -1.3333895206451416, -0.6372758150100708, + -0.04751807451248169, -0.022305790334939957, -0.6378300189971924, 1.9842281341552734, + -4.330424785614014, -2.5224874019622803, -1.7467732429504395, -5.2638421058654785, + 0.6906782984733582, -4.064807415008545, 1.6263312101364136, 1.4265756607055664, + -3.7292516231536865, -2.8003158569335938, 1.2935411930084229, 4.026785373687744, + 0.81377774477005, -1.3772810697555542, 3.7837374210357666, 1.8329479694366455, + -0.24431589245796204, 0.44198039174079895, 0.2649782598018646, 1.1607179641723633, + -1.1263234615325928, -1.2537122964859009, 1.9910213947296143, 2.0369362831115723, + -1.2187927961349487, 5.146304607391357, -0.09589923918247223, 0.7303347587585449, + 3.9201860427856445, 1.120862603187561, -1.0793205499649048, -3.2901806831359863, + 0.26532667875289917, 1.4524774551391602, -5.4654741287231445, -0.007292408496141434, + 4.590025901794434, 0.5332738161087036, -1.4688737392425537, -1.5493791103363037, + 3.8060014247894287, -2.5307557582855225, 2.2415049076080322, 0.04449813812971115, + -0.4910835325717926, -3.439023733139038, 1.2819942235946655, -2.450918197631836, + -1.7708230018615723, -3.58064341545105, -1.4969606399536133, 1.0039310455322266, + -1.7640535831451416, -1.0593749284744263, -5.585129261016846, -0.7832945585250854, + 1.119728684425354, 0.4876984655857086, 0.3577856421470642, 0.8662077188491821, + -1.6058495044708252, 2.0129234790802, -3.0357728004455566, 0.8151829242706299, + -3.568014621734619, 2.1913697719573975, -0.47153159976005554, -2.5587644577026367, + -3.268476724624634, -1.2067168951034546, 0.24534153938293457, 2.982598304748535, + 1.7270994186401367, 3.4260847568511963, -1.5833585262298584, -3.3782668113708496, + 2.574708938598633, 1.3798424005508423, 0.7863763570785522, 1.4131414890289307, + -3.3678414821624756, 1.3044129610061646, 2.4515881538391113, -3.4740331172943115, + -5.765645503997803, -1.739263653755188, -0.6904822587966919, -1.3561055660247803, + -0.4330002963542938, -0.41918060183525085, 2.121532917022705, -2.163936138153076, + 1.7772341966629028, -1.3180198669433594, -0.3127167522907257, -0.5866559147834778, + 4.935529708862305, 0.759954035282135, 1.2544664144515991, 0.48061805963516235, + 0.6665018796920776, -3.271209955215454, -0.19271861016750336, -0.6262511014938354, + 3.658082962036133, 1.7972036600112915, 1.9327462911605835, 0.6973538994789124, + 0.5085180401802063, 4.304430961608887, -4.336119174957275, 2.1630356311798096, + -0.21497029066085815, 0.8230308294296265, 4.160607814788818, 1.1526957750320435, + -2.010878086090088, 2.2168242931365967, 0.0011761756613850594, 4.143531799316406, + 2.5589847564697266, 1.6056995391845703, -0.3169042766094208, 3.184293270111084, + 2.134319305419922, -4.298863887786865, 0.3618548810482025, -2.017502784729004, + 1.8477715253829956, 0.05207091197371483, -0.537638247013092, -3.9817962646484375, + 0.5500563383102417, -0.4757603406906128, 2.2578113079071045, 0.38371512293815613, + -2.2485015392303467, 2.498448371887207, -0.3643079102039337, 1.4773989915847778, + 0.6141877770423889, 0.1441245675086975, -3.072169780731201, 2.299468517303467, + 2.4218196868896484, -0.0861143171787262, -1.3371458053588867, -2.2199652194976807, + -0.4460529685020447, 1.0827375650405884, 2.511638641357422, 2.1290223598480225, + -1.1577873229980469, -6.184621810913086, 1.0780055522918701, -3.886425733566284, + 1.7774617671966553, -1.3791542053222656, -0.8490374088287354, 5.72236442565918, + 1.5893830060958862, 0.32902979850769043, -2.497596025466919, 3.1421282291412354, + 2.0923655033111572, -2.642005205154419, -3.839104413986206, 4.451228618621826, + 1.3005056381225586, 1.8951539993286133, 1.6728183031082153, 0.826499342918396, + 3.9324283599853516, 3.3128347396850586, 3.914780855178833, -0.7221781015396118, + -1.3029998540878296, -2.013812780380249, -2.182837963104248, -0.2159322053194046, + 1.8456220626831055, 0.529842734336853, -1.199500560760498, -2.289618968963623, + 6.9116973876953125, -5.502941608428955, -0.6482645273208618, -2.602815628051758, + -3.04982852935791, -2.127835750579834, -3.1478404998779297, -0.34581586718559265, + -0.7402955889701843, -4.066827297210693, -0.47199007868766785, -4.059601783752441, + 2.327622413635254, 1.1821439266204834, 0.15096122026443481, -0.6574445366859436, + 0.5852963328361511, 3.317716598510742, 0.8644300699234009, 1.4340680837631226, + -2.432757616043091, 2.0555384159088135, -3.90724778175354, 1.0012681484222412, + -0.41373327374458313, -2.8298823833465576, 6.131030559539795, 2.0150856971740723, + -1.8204972743988037, -1.0754027366638184, -2.309323310852051, -2.379054546356201, + -3.0613415241241455, 3.03078556060791, -1.1570667028427124, -1.0867667198181152, + 3.627497911453247, 1.3414182662963867, -0.7400435209274292, -0.9083080887794495, + 1.6084264516830444, -3.6992690563201904, -5.179874420166016, 1.0713765621185303, + -7.001905918121338, -1.0234386920928955, -1.279598355293274, -0.6123147010803223, + 2.594583749771118, 1.7951123714447021, 3.0504584312438965, 3.647704839706421, + -0.8255187273025513, 0.46131110191345215, -2.8640248775482178, 0.9530532956123352, + 9.28664493560791, 3.295341968536377, -1.9902756214141846, 2.6219594478607178, + 1.1045936346054077, 4.152153015136719, -2.8982529640197754, 3.1394364833831787, + 2.14168119430542, 4.563228130340576, -0.4255490005016327, 0.4556257128715515, + 2.189849376678467, -0.5173490643501282, 0.6736354231834412, -0.13150930404663086, + 2.7108571529388428, -5.299671649932861, 2.277427911758423, -1.1924024820327759, + 0.3604048490524292, 0.20612220466136932, -3.454986095428467, 1.292128562927246, + 2.894195079803467, 2.223227024078369, -0.9455307126045227, -1.7939320802688599, + 0.06685015559196472, 0.27166950702667236, -0.14791132509708405, -2.916079521179199, + 0.7232120633125305, 0.13648608326911926, -1.9105552434921265, 1.232003092765808, + 0.21377891302108765, 2.044219970703125, -3.128916025161743, 4.0654401779174805, + -1.64369535446167, 0.18517795205116272, 2.5652148723602295, -3.774272918701172, + 0.04907339811325073, -0.06912461668252945, 0.15278685092926025, -0.7334116101264954, + 3.400716781616211, -1.2366024255752563, -4.117137432098389, 2.140357255935669, + 0.8362204432487488, 4.288045406341553, 5.800609588623047, 4.423896789550781, + 1.7416282892227173, -0.43763279914855957, -2.626300811767578, -1.703445315361023, + 4.882078170776367, 0.7089818716049194, 0.9079666137695312, 2.447680711746216, + -2.0190351009368896, -1.3947519063949585, -0.31683510541915894, 0.8696826100349426, + -3.5703392028808594, 0.2538117468357086, 5.1805243492126465, 0.7383964657783508, + -2.8177847862243652, 1.5130589008331299, -3.856858253479004, -5.221625328063965, + -0.3264671862125397, 1.077576994895935, 0.6066218018531799, -4.628721714019775, + -0.9978218674659729, -2.860262632369995, 3.91422438621521, 4.650241374969482, + 0.6411037445068359, 3.27441143989563, 2.8085005283355713, -1.5118881464004517, + -0.2862726151943207, -0.027123019099235535, -0.9779676795005798, -0.07652962952852249, + 0.6351696252822876, -1.9043272733688354, 2.096518039703369, 4.422485828399658, + -1.0958195924758911, 0.27752557396888733, 0.6965365409851074, -0.07153210788965225, + -3.7454171180725098, 0.608910083770752, -3.2880749702453613, 1.4592971801757812, + 0.12961120903491974, 0.6550276279449463, 1.2567991018295288, 2.4147582054138184, + 2.145935297012329, 2.7853281497955322, -2.1146483421325684, 0.6186407804489136, + 3.230029582977295, -2.019900321960449, -1.8758838176727295, 4.192493915557861, + 0.567356288433075, 0.9650986194610596, -3.891258478164673, -0.07773301750421524, + -1.4568970203399658, 1.511470913887024, 2.817631959915161, 5.228792667388916, + -4.549345970153809, -2.3188655376434326, -5.015311241149902, 0.8192861676216125, + 3.086291551589966, 0.055960580706596375, 3.0219428539276123, 1.3445091247558594, + -2.978372097015381, -0.9532874226570129, -2.3546040058135986, 0.3788264989852905, + 0.8931404948234558, 1.654476284980774, 2.0823516845703125, -0.7059788703918457, + -3.477396011352539, -1.2190135717391968, 3.1988987922668457, -0.9511443376541138, + 0.31925660371780396, 1.1658567190170288, -2.6117656230926514, -3.3201589584350586, + 1.3019773960113525, 1.1917563676834106, 2.419656276702881, -0.5857217311859131, + 0.8047353029251099, 2.6140263080596924, 3.198706865310669, -0.2895236313343048, + 1.7804657220840454, -0.41059935092926025, 1.591880440711975, 1.0578147172927856, + -0.9528192281723022, -0.6371835470199585, -0.8999473452568054, 2.926731586456299, + -2.5385398864746094, 1.3672055006027222, -2.8778762817382812, -4.268380641937256, + -0.4135794937610626, -0.13491739332675934, -1.7325851917266846, 1.1960667371749878, + 0.7391232848167419, -4.127851963043213, 0.7886160016059875, -0.9319157600402832, + -0.07458949089050293, 0.3255041837692261, -0.9248706102371216, 2.1431007385253906, + 4.779815196990967, 1.7006468772888184, -2.898259401321411, -4.037906169891357, + 2.250380516052246, -0.2571093440055847, 1.803026795387268, -0.6334996223449707, + 0.38012900948524475, -0.7178404331207275, 10.408695220947266, 0.4416235089302063, + 3.2658486366271973, -2.645660161972046, 3.1659204959869385, -2.9682207107543945, + -1.8574892282485962, -0.5166532397270203, 0.48397955298423767, -0.6754127740859985, + 5.767602920532227, 1.635308027267456, -2.2770495414733887, 1.5910547971725464, + -3.266660213470459, -0.36168932914733887, 0.804029107093811, 4.0777435302734375, + 3.6347291469573975, 2.446516990661621, 1.0559085607528687, 0.7756821513175964, + 0.3844594955444336, -3.2986485958099365, 1.153260350227356, 2.703200101852417, + 3.977548360824585, -0.6733660101890564, -2.5609700679779053, 1.570186972618103, + -2.4598803520202637, -1.199933648109436, 1.8013646602630615, 1.1733877658843994, + -0.9769896268844604, 0.27824100852012634, 4.334930896759033, -3.2949230670928955, + -3.437204360961914, -2.245392084121704, 1.3960449695587158, -2.8982086181640625, + -5.141915798187256, 2.592688798904419, -1.7752970457077026, -1.1991205215454102, + 5.469426155090332, 1.0072311162948608, 0.5077131390571594, 5.818460464477539, + -2.7980525493621826, -0.7477746605873108, -2.333284854888916, -0.8473489880561829, + 0.5736323595046997, -0.6414474248886108, 0.763018012046814, -4.140954494476318, + -0.8839965462684631, -2.4077603816986084, 2.392150640487671, -1.750841498374939, + 3.517760753631592, -3.4706099033355713, -0.8139467239379883, -1.162028431892395, + -1.7277436256408691, -0.012990135699510574, 1.633035659790039, 0.5467530488967896, + 2.617684841156006, 2.025974988937378, -1.8517699241638184, -2.4114012718200684, + 0.3498564660549164, -3.3467040061950684, 0.9990707039833069, -3.2822868824005127, + -2.11946964263916, 7.44944953918457, -3.1606969833374023, -1.0515354871749878, + -4.833910942077637, 3.2854321002960205, 5.417191028594971, -3.63417911529541, + 1.4485042095184326, -1.780576467514038, 0.7408013343811035, -0.623672604560852, + -3.956453800201416, -0.4284232258796692, 5.948563575744629, 0.9917374849319458, + 1.4613680839538574, 1.8326377868652344, -0.5463629364967346, 2.1198883056640625, + -4.7847514152526855, -3.700894355773926, 0.7175806164741516, 0.28311285376548767, + 0.7922775745391846, 1.0427093505859375, -2.716966390609741, -2.286104917526245, + -1.7376515865325928, -1.365503191947937, -4.581218719482422, 1.696526288986206, + 1.9796323776245117, -1.6948431730270386, -1.4996675252914429, 3.3924407958984375, + -2.018606185913086, 0.375287801027298, -1.4784940481185913, 2.4106976985931396, + 1.8442091941833496, 0.30308371782302856, 0.7252417206764221, 0.4834488332271576, + 2.05482816696167, -5.502094268798828, 1.4989551305770874, -0.036200929433107376, + 0.7935841083526611, -6.309118270874023, 0.28731459379196167, 0.7802544236183167, + 1.6197532415390015, -0.21075761318206787, 3.5668857097625732, -3.1733810901641846, + 0.14286154508590698, -0.3445669412612915, 1.4772952795028687, 1.1107704639434814, + 1.3991512060165405, 4.0126633644104, -0.5388878583908081, 0.20864829421043396, + -1.4177249670028687, 4.58060359954834, -3.0819759368896484, -2.489410638809204, + -1.2240601778030396, 2.822070598602295, -3.266664743423462, -0.29265448451042175, + 1.4111319780349731, -0.8745537400245667, -1.8424195051193237, 1.735237956047058, + -0.6763474941253662, -1.7880852222442627]}, "tldr": {"model": "tldr@v2.0.0", + "text": "The question, \u201cCan machines think?\u201d is considered, and + the question is replaced by another, which is closely related to it and is + expressed in relatively unambiguous words."}, "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1950-10-01", "journal": {"name": "Mind", "pages": + "433-460", "volume": "LIX"}, "authors": [{"authorId": "2262347", "externalIds": + {"DBLP": ["Alan M. Turing"]}, "url": "https://www.semanticscholar.org/author/2262347", + "name": "A. Turing", "aliases": ["A Turing", "A M Turing", "A. M. Turing", + "Alan M. Turing", "Alan Turing", "Alan Mathison Turing"], "affiliations": + [], "homepage": null, "paperCount": 60, "citationCount": 12415, "hIndex": + 23}], "citations": [{"paperId": "2097e50387716904bde658a8832ec3bf17bab3ac", + "externalIds": {"DOI": "10.1016/j.techfore.2022.122264", "CorpusId": 255176985}, + "corpusId": 255176985, "publicationVenue": {"id": "5eb1fac4-44ea-4270-b31e-3fb4dd8247cb", + "name": "Technological forecasting & social change", "type": "journal", "alternate_names": + ["Technological Forecasting and Social Change", "Technol forecast soc chang", + "Technol Forecast Soc Chang"], "issn": "0040-1625", "url": "https://www.journals.elsevier.com/technological-forecasting-and-social-change/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00401625"]}, + "url": "https://www.semanticscholar.org/paper/2097e50387716904bde658a8832ec3bf17bab3ac", + "title": "Artificial intelligence and corporate innovation: A review and research + agenda", "abstract": null, "venue": "Technological forecasting & social change", + "year": 2023, "referenceCount": 203, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2023-03-01", "journal": {"name": "Technological + Forecasting and Social Change"}, "authors": [{"authorId": "123471397", "name": + "Salman Bahoo"}, {"authorId": "101122773", "name": "M. Cucculelli"}, {"authorId": + "2198442708", "name": "Dawood Qamar"}]}, {"paperId": "de6e3d9e35ad2e4089bfc26a9ecc11ed7996c95b", "externalIds": {"DOI": "10.1016/j.epsr.2022.108887", "CorpusId": 252982113}, + "corpusId": 252982113, "publicationVenue": {"id": "0e93ab3a-8aef-458b-a68d-ab942f5a3306", + "name": "Electric power systems research", "type": "journal", "alternate_names": + ["Electric Power Systems Research", "Electr power syst res", "Electr Power + Syst Res"], "issn": "0378-7796", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/504085/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/03787796"]}, "url": "https://www.semanticscholar.org/paper/de6e3d9e35ad2e4089bfc26a9ecc11ed7996c95b", "title": "Deep learning for power quality", "abstract": null, "venue": "Electric - Power Systems Research", "year": 2023, "referenceCount": 129, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2023-01-01", "journal": {"name": "Electric Power Systems Research"}, "authors": - [{"authorId": "49442361", "name": "R. Oliveira"}, {"authorId": "46525078", - "name": "M. Bollen"}]}, {"paperId": "f2c65fbb7d510b462ae545e2257b399b4cc8b850", - "externalIds": {"ArXiv": "2212.08487", "CorpusId": 254823606}, "url": "https://www.semanticscholar.org/paper/f2c65fbb7d510b462ae545e2257b399b4cc8b850", + power systems research", "year": 2023, "referenceCount": 129, "citationCount": + 1, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2023-01-01", "journal": {"name": "Electric Power Systems + Research"}, "authors": [{"authorId": "49442361", "name": "R. Oliveira"}, {"authorId": + "46525078", "name": "M. Bollen"}]}, {"paperId": "65b72b6ee4764366d9c2888525afa9065958230f", + "externalIds": {"DOI": "10.29121/granthaalayah.v10.i12.2022.4940", "CorpusId": + 255364653}, "corpusId": 255364653, "publicationVenue": {"id": "2e94c409-54b0-4888-91bd-e8afb309cc1e", + "name": "International journal of research - granthaalayah", "type": "journal", + "alternate_names": ["Int j res granthaalayah"], "issn": "2350-0530", "url": + "http://granthaalayah.com/"}, "url": "https://www.semanticscholar.org/paper/65b72b6ee4764366d9c2888525afa9065958230f", + "title": "IT PROJECT RISK MANAGEMENT FOR CLOUD ENVIRONMENT LEVERAGING ARTIFICIAL + INTELLIGENCE", "abstract": "Cloud security contributes to multiple risk parameters + like multitenancy, Insecure interfaces/APIs, Malicious Insiders, Malware injections, + the lack of information on location of storage of data, the unavailability + of details on type of data saved in the same server, hacking. AI or Artificial + Intelligence works on pre-collected data and scenarios fed into the computers + thereby predicting in advance the possibilities of risk, warning if there + is any unusual occurrence in the cloud and proposing the Risk Mitigation plans + based on various scenarios. Proactive risk prediction will have a huge impact + on risk mitigation, cost saving as well as customer satisfaction. A pilot + study has been conducted to ascertain the impact of various risk factors identified + by circulating the questionnaire among practitioners from the relevant domains. + The questionnaire is circulated among the current industry practitioners and + experts in this area and facilitates to conduct the pilot survey on the significance + of various risk parameter. The impact of each risk factor is identified and + is subjected to analysis. With the help of prediction algorithms, the possibility + of occurrence of risk, the impact, and consequences of that particular event, + as well as the mitigation strategies could be foretold. This objective of + this paper is to propose management perspective of a framework of AI, that + can contribute to proactive risk management in cloud. This paper deals only + with the management overview of implementation of AI in risk mitigation strategies + and not the technical aspects of AI. The futuristic scope of this paper would + be a management overview on automation of risk mitigation strategies in cloud + platform using AI.", "venue": "International journal of research - granthaalayah", + "year": 2022, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2022-12-31", "journal": {"name": "International + Journal of Research -GRANTHAALAYAH"}, "authors": [{"authorId": "2188052675", + "name": "Remya N Nair"}, {"authorId": "9106179", "name": "J. Meenakumari"}]}, + {"paperId": "3ce2aecf36f19e95201bc001055bd168679e6689", "externalIds": {"PubMedCentral": + "9801159", "DOI": "10.1007/s10479-022-05159-4", "CorpusId": 255302836}, "corpusId": + 255302836, "publicationVenue": {"id": "2e70cc37-125a-451c-b9bb-3b329f6be510", + "name": "Annals of Operations Research", "type": "journal", "alternate_names": + ["Ann Oper Res"], "issn": "0254-5330", "url": "https://www.springer.com/journal/10479", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-0-70-35506643-0,00.html?referer=www.springer.com/journal/10479/submission", + "https://link.springer.com/journal/10479", "http://www.springer.com/journal/10479"]}, + "url": "https://www.semanticscholar.org/paper/3ce2aecf36f19e95201bc001055bd168679e6689", + "title": "Artificial intelligence and change management in small and medium-sized + enterprises: an analysis of dynamics within adaptation initiatives", "abstract": + null, "venue": "Annals of Operations Research", "year": 2022, "referenceCount": + 64, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-12-30", "journal": {"pages": "1 - 27", "name": "Annals of Operations + Research"}, "authors": [{"authorId": "2198877576", "name": "Sara I. C. Lemos"}, + {"authorId": "2149923697", "name": "Fernando A. F. Ferreira"}, {"authorId": + "69345200", "name": "C. Zopounidis"}, {"authorId": "2529752", "name": "E. + Galariotis"}, {"authorId": "82392394", "name": "Neuza C. M. Q. F. Ferreira"}]}, + {"paperId": "e52eb98accd9f68f857473e149a919ea252ceb31", "externalIds": {"DOI": + "10.3390/su15010329", "CorpusId": 255215351}, "corpusId": 255215351, "publicationVenue": + {"id": "8775599f-4f9a-45f0-900e-7f4de68e6843", "name": "Sustainability", "type": + "journal", "issn": "2071-1050", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-172127", + "alternate_urls": ["http://mdpi.com/journal/sustainability", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-172127"]}, + "url": "https://www.semanticscholar.org/paper/e52eb98accd9f68f857473e149a919ea252ceb31", + "title": "Cooperatives and the Use of Artificial Intelligence: A Critical + View", "abstract": "Digital Transformation (DT) has become an important issue + for organisations. It is proven that DT fuels Digital Innovation in organisations. + It is well-known that technologies and practices such as distributed ledger + technologies, open source, analytics, big data, and artificial intelligence + (AI) enhance DT. Among those technologies, AI provides tools to support decision-making + and automatically decide. Cooperatives are organisations with a mutualistic + scope and are characterised by having participatory cooperative governance + due to the principle of democratic control by the members. In a context where + DT is here to stay, where the dematerialisation of processes can bring significant + advantages to any organisation, this article presents a critical reflection + on the dangers of using AI technologies in cooperatives. We base this reflection + on the Portuguese cooperative code. We emphasise that this code is not very + different from the ones of other countries worldwide as they are all based + on the Statement of Cooperative Identity defined by the International Cooperative + Alliance. We understand that we cannot stop the entry of AI technologies into + the cooperatives. Therefore, we present a framework for using AI technologies + in cooperatives to avoid damaging the principles and values of this type of + organisations.", "venue": "Sustainability", "year": 2022, "referenceCount": + 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.mdpi.com/2071-1050/15/1/329/pdf?version=1671969947", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2022-12-25", "journal": {"name": + "Sustainability"}, "authors": [{"authorId": "2070029062", "name": "M. Ramos"}, + {"authorId": "143996470", "name": "Ana Azevedo"}, {"authorId": "2076921080", + "name": "Deolinda Meira"}, {"authorId": "2153782537", "name": "Mariana Curado + Malta"}]}, {"paperId": "350c236bbd7e3eed957d27238400a29b423ca347", "externalIds": + {"DOI": "10.30858/zer/153583", "CorpusId": 255026105}, "corpusId": 255026105, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/350c236bbd7e3eed957d27238400a29b423ca347", + "title": "DEVELOPMENT OF ARTIFICIAL INTELLIGENCE AND POTENTIAL IMPACT OF ITS + APPLICATIONS IN AGRICULTURE ON LABOR USE AND PRODUCTIVITY", "abstract": "artificial + intelligence (ai) is one of the most striking recent technology developments. + potentially, it can significantly affect all areas of economic activities + including agriculture. The paper addresses two issues such as the actual essence + of ai and its most important current and expected future applications in agriculture + and their potential impact on labor use and productivity of this sector. The + research methods applied in the paper are critical analysis of selected literature + sources and deductive reasoning regarding the likely influence of ai applications + on labor use in agriculture and its total factor productivity. it was found + out that applications of ai in agriculture are numerous and very diverse both + in terms of technological solutions and managed processes. Moreover, the market + for ai applications in agriculture is expected to grow quite rapidly due to + an increasing tendency to automatize agricultural production and marketing + processes. This inevitably leads to substitution of physical labor with sophisticated + machinery and robots. also, it generates demand for new labor competencies + needed to manage increasingly capital intensive agricultural production and + related processes driven by the use of ai. Based on mainly theoretical considerations, + it can be surmised that widespread use of ai in agriculture should positively + con-tribute to the growth in the total factor productivity (TFp) of the sector. + consequently, countries where agricultural producers adopt ai solutions faster + can gain competitive advantage in food production.", "venue": "Zagadnienia + Ekonomiki Rolnej / Problems of Agricultural Economics", "year": 2022, "referenceCount": + 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.zer.waw.pl/pdf-153583-84455?filename=DEVELOPMENT + OF ARTIFICIAL.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-12-22", "journal": {"name": "Zagadnienia Ekonomiki + Rolnej / Problems of Agricultural Economics"}, "authors": [{"authorId": "107588156", + "name": "S. Figiel"}]}, {"paperId": "bea6e6d75538e9c708a0467e0426b4a827b8e72f", + "externalIds": {"PubMedCentral": "9773645", "DOI": "10.1007/s43681-022-00252-7", + "CorpusId": 254997066}, "corpusId": 254997066, "publicationVenue": {"id": + "96ed79e9-36b2-4f58-8ef2-67296adef647", "name": "AI and Ethics", "type": "journal", + "alternate_names": ["AI Ethics"], "issn": "2730-5953", "url": "https://www.springer.com/journal/43681"}, + "url": "https://www.semanticscholar.org/paper/bea6e6d75538e9c708a0467e0426b4a827b8e72f", + "title": "Replika in the Metaverse: the moral problem with empathy in \u2018It + from Bit\u2019", "abstract": null, "venue": "AI and Ethics", "year": 2022, + "referenceCount": 83, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-022-00252-7.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-22", + "journal": {"pages": "1 - 13", "name": "Ai and Ethics"}, "authors": [{"authorId": + "2745471", "name": "Andrew McStay"}]}, {"paperId": "3b8ccc7ec80b8775de603e248ac1ca2b919d6b70", + "externalIds": {"ArXiv": "2212.11126", "CorpusId": 254926835}, "corpusId": + 254926835, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3b8ccc7ec80b8775de603e248ac1ca2b919d6b70", + "title": "Chatbots in a Botnet World", "abstract": "Question-and-answer formats + provide a novel experimental platform for investigating cybersecurity questions. + Unlike previous chatbots, the latest ChatGPT model from OpenAI supports an + advanced understanding of complex coding questions. The research demonstrates + thirteen coding tasks that generally qualify as stages in the MITRE ATT&CK + framework, ranging from credential access to defense evasion. With varying + success, the experimental prompts generate examples of keyloggers, logic bombs, + obfuscated worms, and payment-fulfilled ransomware. The empirical results + illustrate cases that support the broad gain of functionality, including self-replication + and self-modification, evasion, and strategic understanding of complex cybersecurity + goals. One surprising feature of ChatGPT as a language-only model centers + on its ability to spawn coding approaches that yield images that obfuscate + or embed executable programming steps or links.", "venue": "", "year": 2022, + "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-12-18", "journal": null, "authors": [{"authorId": "2197525782", "name": + "Forrest McKee"}, {"authorId": "46787948", "name": "David Noever"}]}, {"paperId": + "d9b19321a0176683f4f40b9d80357aa6cb06a6bc", "externalIds": {"DBLP": "journals/corr/abs-2212-08487", + "ArXiv": "2212.08487", "DOI": "10.48550/arXiv.2212.08487", "CorpusId": 254823606}, + "corpusId": 254823606, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d9b19321a0176683f4f40b9d80357aa6cb06a6bc", "title": "Semantics-Empowered Communication: A Tutorial-cum-Survey", "abstract": - "\u2014Along with the springing up of semantics- empowered communication research - spanning from theories, applications, metrics to implementation, it is now - witnessing an unprecedented growing interest in both academia and industry. - In this work, we primarily aim to provide a comprehensive survey on both the - background and research taxonomy, as well as a detailed technical tutorial - for potential participants. Speci\ufb01cally, we start by reviewing the literature - and answering the \u201cwhat\u201d and \u201cwhy\u201d questions in semantic - transmissions. Afterwards, we present corresponding ecosystems, including - theories, metrics, datasets and toolkits, on top of which the taxonomy for - macro research directions is presented. Furthermore, we propose to categorize + "\u2014Along with the springing up of semantics- empowered communication (SemCom) + researches, it is now witnessing an unprecedentedly growing interest towards + a wide range of aspects (e.g., theories, applications, metrics and implementations) + in both academia and industry. In this work, we primarily aim to provide a + comprehensive survey on both the background and research taxonomy, as well + as a detailed technical tutorial. Speci\ufb01cally, we start by reviewing + the literature and answering the \u201cwhat\u201d and \u201cwhy\u201d questions + in semantic transmissions. Afterwards, we present corresponding ecosystems, + including theories, metrics, datasets and toolkits, on top of which the taxonomy + for research directions is presented. Furthermore, we propose to categorize the critical enabling techniques by explicit and implicit reasoning-based methods, and elaborate on how they evolve and contribute to modern content & channel semantics-empowered communications. Besides reviewing and summarizing - the latest efforts in semantics-empowered communications, we discuss the relations - with other communication levels (e.g., reliable and goal-oriented communications) - from a holistic and uni\ufb01ed viewpoint. Subsequently, in order to facilitate - the future developments and industrial applications, we also highlight advanced - practical techniques for boosting semantic accuracy, robustness, and large-scale - scalability, just to mention a few. Finally, we discuss the technical challenges - that shed light on future research opportunities. Considering the growing - yet the ever-updating status of semantics-empowered communications, we hope - this work would bene\ufb01t not only sophisticated but also intended practitioners.", - "venue": "", "year": 2022, "referenceCount": 214, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2022-12-16", "journal": null, "authors": [{"authorId": null, "name": "Zhilin - Lu"}, {"authorId": "1760102", "name": "Rongpeng Li"}, {"authorId": "2119299421", - "name": "Kun Lu"}, {"authorId": null, "name": "Xianfu Chen"}, {"authorId": - "144158811", "name": "E. Hossain"}, {"authorId": null, "name": "Zhifeng Zhao"}, - {"authorId": null, "name": "Honggang Zhang"}]}, {"paperId": "8f916845347d3283b4170caec95760b42980b06f", - "externalIds": {"ArXiv": "2212.05937", "CorpusId": 254563889}, "url": "https://www.semanticscholar.org/paper/8f916845347d3283b4170caec95760b42980b06f", - "title": "Human Digital Twin: A Survey", "abstract": ".", "venue": "", "year": - 2022, "referenceCount": 134, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2022-12-12", "journal": null, "authors": [{"authorId": "2145483718", "name": - "Yujia Lin"}, {"authorId": "2109222039", "name": "L. Chen"}, {"authorId": + the latest efforts in SemCom, we discuss the relations with other communication + levels (e.g., reliable and goal-oriented communications) from a holistic and + uni\ufb01ed viewpoint. Subsequently, in order to facilitate the future developments + and industrial applications, we also highlight advanced practical tech- niques + for boosting semantic accuracy, robustness, and large-scale scalability, just + to mention a few. Finally, we discuss the technical challenges that shed light + on future research opportunities.", "venue": "ArXiv", "year": 2022, "referenceCount": + 215, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-12-16", "journal": {"volume": "abs/2212.08487", + "name": "ArXiv"}, "authors": [{"authorId": "2197341575", "name": "Zhilin Lu"}, + {"authorId": "1760102", "name": "Rongpeng Li"}, {"authorId": "2119299421", + "name": "Kun Lu"}, {"authorId": "2135089146", "name": "Xianfu Chen"}, {"authorId": + "144158811", "name": "E. Hossain"}, {"authorId": "3067183", "name": "Zhifeng + Zhao"}, {"authorId": "46702909", "name": "Honggang Zhang"}]}, {"paperId": + "8f916845347d3283b4170caec95760b42980b06f", "externalIds": {"DBLP": "journals/corr/abs-2212-05937", + "ArXiv": "2212.05937", "DOI": "10.48550/arXiv.2212.05937", "CorpusId": 254563889}, + "corpusId": 254563889, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8f916845347d3283b4170caec95760b42980b06f", + "title": "Human Digital Twin: A Survey", "abstract": ".", "venue": "ArXiv", + "year": 2022, "referenceCount": 134, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2022-12-12", "journal": + {"volume": "abs/2212.05937", "name": "ArXiv"}, "authors": [{"authorId": "2145483718", + "name": "Yujia Lin"}, {"authorId": "2109222039", "name": "L. Chen"}, {"authorId": "2195350402", "name": "Aftab Ali"}, {"authorId": "2101178582", "name": "C. - Nugent"}, {"authorId": "2081052044", "name": "C. Ian"}, {"authorId": "2119921689", + Nugent"}, {"authorId": "1992854", "name": "I. Cleland"}, {"authorId": "2119921689", "name": "Rongyang Li"}, {"authorId": "2082157364", "name": "D. Gao"}, {"authorId": "2113291577", "name": "Hang Wang"}, {"authorId": "2172832104", "name": "Yajie Wang"}, {"authorId": "52186545", "name": "Huansheng Ning"}]}, {"paperId": - "3761fec9d42486dc9dbe9b6c1818659cd93cf338", "externalIds": {"ArXiv": "2212.06721", - "CorpusId": 254591525}, "url": "https://www.semanticscholar.org/paper/3761fec9d42486dc9dbe9b6c1818659cd93cf338", + "905c886090f1943da1e44ab2ece7e7659cf5a35c", "externalIds": {"DBLP": "journals/corr/abs-2212-06721", + "ArXiv": "2212.06721", "DOI": "10.48550/arXiv.2212.06721", "CorpusId": 254591525}, + "corpusId": 254591525, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/905c886090f1943da1e44ab2ece7e7659cf5a35c", "title": "The Turing Deception", "abstract": "This research revisits the classic Turing test and compares recent large language models such as ChatGPT for their abilities to reproduce human-level comprehension and compelling text - generation. Two task challenges-summarization, and question answering- prompt - ChatGPT to produce original content (98-99%) from a single text entry and - also sequential questions originally posed by Turing in 1950. The question - of a machine fooling a human judge recedes in this work relative to the question - of \u201chow would one prove it?\u201d The original contribution of the work - presents a metric and simple grammatical set for understanding the writing - mechanics of chatbots in evaluating their readability and statistical clarity, - engagement, delivery, and overall quality. While Turing\u2019s original prose - scores at least 14% below the machine-generated output, the question of whether - an algorithm displays hints of Turing\u2019s truly original thoughts (the - \u201cLovelace 2.0\u201d test) remains unanswered and potentially unanswerable - for now.", "venue": "", "year": 2022, "referenceCount": 21, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-12-09", "journal": null, - "authors": [{"authorId": "46787948", "name": "David Noever"}, {"authorId": - "1866333313", "name": "Matt Ciolino"}]}, {"paperId": "cd0fa22b7aead6eeba42e7e418b02a19ecce2a6e", - "externalIds": {"DOI": "10.3390/ijerph192416584", "CorpusId": 254610883}, - "url": "https://www.semanticscholar.org/paper/cd0fa22b7aead6eeba42e7e418b02a19ecce2a6e", - "title": "Serious Games as a Validation Tool for PREDIS: A Decision Support - System for Disaster Management", "abstract": "In this paper, we validate PREDIS, - a decision support system for disaster management using serious games to collect - experts\u2019 judgments on its performance. PREDIS is a model for DISaster - response supplier selection (PREDIS). It has a PREDictive component (PRED) - for predicting the disaster human impact and an estimation component to Estimate - the DISaster (EDIS) needs to optimise supplier-based resource allocation. - A quasi-experiment design embedded in a participatory simulation game is conducted - to compare the opinions of equal samples of 22 experts and non-experts. The - following questions are put forward. First, \u201cDoes PREDIS model assists - the decision makers to make the same decisions faster?\u201d Second, \u201cDoes - the PREDIS model assist the non-experts as simulated decision makers to decide - like an expert?\u201d Using AHP weights of decision makers\u2019 preferences - as well as Borda counts, the decisions are compared. The result shows that - PREDIS helps to reduce the decision-making time by experts and non-experts - to 6h after the disaster strike, instead of the usual 72 h. It also assists - 71% of the non-experts to make decisions similar to those made by experts. - In summary, the PREDIS model has two major capabilities. It enables the experts - and non-experts to predict the disaster results immediately using widely available - data. It also enables the non-experts to decide almost the same as the experts; - either in predicting the human impact of a disaster and estimating the needs - or in selecting suitable suppliers.", "venue": "International Journal of Environmental - Research and Public Health", "year": 2022, "referenceCount": 61, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-12-09", "journal": {"name": "International Journal - of Environmental Research and Public Health"}, "authors": [{"authorId": "2187330764", - "name": "Sara Rye"}, {"authorId": "40469219", "name": "E. Aktas"}]}, {"paperId": - "a34084b3f7f8d47b2e70c6b528700f44930057e5", "externalIds": {"DOI": "10.3390/math10244657", - "CorpusId": 254519616}, "url": "https://www.semanticscholar.org/paper/a34084b3f7f8d47b2e70c6b528700f44930057e5", + generation. Two task challenges- summary and question answering- prompt ChatGPT + to produce original content (98-99%) from a single text entry and sequential + questions initially posed by Turing in 1950. We score the original and generated + content against the OpenAI GPT-2 Output Detector from 2019, and establish + multiple cases where the generated content proves original and undetectable + (98%). The question of a machine fooling a human judge recedes in this work + relative to the question of \"how would one prove it?\" The original contribution + of the work presents a metric and simple grammatical set for understanding + the writing mechanics of chatbots in evaluating their readability and statistical + clarity, engagement, delivery, overall quality, and plagiarism risks. While + Turing''s original prose scores at least 14% below the machine-generated output, + whether an algorithm displays hints of Turing''s true initial thoughts (the + \"Lovelace 2.0\" test) remains unanswerable.", "venue": "ArXiv", "year": 2022, + "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-12-09", "journal": {"volume": "abs/2212.06721", "name": + "ArXiv"}, "authors": [{"authorId": "46787948", "name": "David Noever"}, {"authorId": + "1866333313", "name": "Matt Ciolino"}]}, {"paperId": "a34084b3f7f8d47b2e70c6b528700f44930057e5", + "externalIds": {"DOI": "10.3390/math10244657", "CorpusId": 254519616}, "corpusId": + 254519616, "publicationVenue": {"id": "6175efe8-6f8e-4cbe-8cee-d154f4e78627", + "name": "Mathematics", "issn": "2227-7390", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-283014", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-283014", + "https://www.mdpi.com/journal/mathematics"]}, "url": "https://www.semanticscholar.org/paper/a34084b3f7f8d47b2e70c6b528700f44930057e5", "title": "Personalizing Hybrid-Based Dialogue Agents", "abstract": "In this paper, we present a continuation of our work on the personification of dialogue agents. We expand upon the previously demonstrated models\u2014the ranking @@ -357,15 +514,23 @@ interactions: knowledge-grounded generation block\u2014achieves the best performance, with values of 1.64 for perplexity and 0.231 for BLEU scores.", "venue": "Mathematics", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-12-08", "journal": {"name": "Mathematics"}, "authors": - [{"authorId": "3026479", "name": "Yuri N. Matveev"}, {"authorId": "150254037", - "name": "O. Makhnytkina"}, {"authorId": "2164895714", "name": "P. Posokhov"}, - {"authorId": "2138645045", "name": "Anton Matveev"}, {"authorId": "2189195778", - "name": "S. Skrylnikov"}]}, {"paperId": "2f440b3771db1adb578044f9cee914aaff328239", - "externalIds": {"ArXiv": "2212.04401", "DOI": "10.1098/rstb.2021.0446", "CorpusId": - 254408657}, "url": "https://www.semanticscholar.org/paper/2f440b3771db1adb578044f9cee914aaff328239", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2227-7390/10/24/4657/pdf?version=1670508463", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-12-08", "journal": {"name": "Mathematics"}, "authors": [{"authorId": + "3026479", "name": "Yuri N. Matveev"}, {"authorId": "150254037", "name": "O. + Makhnytkina"}, {"authorId": "2164895714", "name": "P. Posokhov"}, {"authorId": + "2138645045", "name": "Anton Matveev"}, {"authorId": "2189195778", "name": + "S. Skrylnikov"}]}, {"paperId": "2f440b3771db1adb578044f9cee914aaff328239", + "externalIds": {"ArXiv": "2212.04401", "DBLP": "journals/corr/abs-2212-04401", + "DOI": "10.1098/rstb.2021.0446", "CorpusId": 254408657}, "corpusId": 254408657, + "publicationVenue": {"id": "92d34d37-5c4b-4e11-b461-9041b7de4c2d", "name": + "Philosophical Transactions of the Royal Society of London. Biological Sciences", + "type": "journal", "alternate_names": ["Philos Trans R Soc B", "Philosophical + Transactions of the Royal Society B", "Philos Trans R Soc Lond Biological + Sci"], "issn": "0962-8436", "url": "https://www.jstor.org/journal/philtranbiolscie", + "alternate_urls": ["http://www.jstor.org/journals/09628436.html", "http://rstb.royalsocietypublishing.org/"]}, + "url": "https://www.semanticscholar.org/paper/2f440b3771db1adb578044f9cee914aaff328239", "title": "A rubric for human-like agents and NeuroAI", "abstract": "Researchers across cognitive, neuro- and computer sciences increasingly reference \u2018human-like\u2019 artificial intelligence and \u2018neuroAI\u2019. However, the scope and use @@ -384,24 +549,28 @@ interactions: tests\u2014leading to both known and yet-unknown advances that may span decades to come. This article is part of a discussion meeting issue \u2018New approaches to 3D vision\u2019.", "venue": "Philosophical Transactions of the Royal Society - of London. Biological Sciences", "year": 2022, "referenceCount": 186, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + of London. Biological Sciences", "year": 2022, "referenceCount": 185, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/2212.04401", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2022-12-08", "journal": {"volume": "378", "name": - "Philosophical Transactions of the Royal Society B"}, "authors": [{"authorId": - "1990422", "name": "I. Momennejad"}]}, {"paperId": "5c9515ee1c01b5b3e8403dd6483eecd5ea0c2827", - "externalIds": {"ArXiv": "2212.03721", "CorpusId": 254366305}, "url": "https://www.semanticscholar.org/paper/5c9515ee1c01b5b3e8403dd6483eecd5ea0c2827", + ["JournalArticle"], "publicationDate": "2022-12-08", "journal": {"volume": + "378", "name": "Philosophical Transactions of the Royal Society B"}, "authors": + [{"authorId": "1990422", "name": "I. Momennejad"}]}, {"paperId": "5c9515ee1c01b5b3e8403dd6483eecd5ea0c2827", + "externalIds": {"ArXiv": "2212.03721", "DBLP": "journals/corr/abs-2212-03721", + "DOI": "10.48550/arXiv.2212.03721", "CorpusId": 254366305}, "corpusId": 254366305, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c9515ee1c01b5b3e8403dd6483eecd5ea0c2827", "title": "Intent Recognition in Conversational Recommender Systems", "abstract": - ",", "venue": "", "year": 2022, "referenceCount": 186, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-12-06", "journal": null, - "authors": [{"authorId": "2193804511", "name": "Sahar Moradizeyveh"}]}, {"paperId": - "7a2219ada69c4a691edb8dae69d1bbdab4240b68", "externalIds": {"ArXiv": "2212.02908", - "DBLP": "journals/corr/abs-2212-02908", "DOI": "10.48550/arXiv.2212.02908", - "CorpusId": 254275511}, "url": "https://www.semanticscholar.org/paper/7a2219ada69c4a691edb8dae69d1bbdab4240b68", + ",", "venue": "ArXiv", "year": 2022, "referenceCount": 186, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-12-06", "journal": {"volume": "abs/2212.03721", "name": "ArXiv"}, "authors": + [{"authorId": "2193804511", "name": "Sahar Moradizeyveh"}]}, {"paperId": "7a2219ada69c4a691edb8dae69d1bbdab4240b68", + "externalIds": {"ArXiv": "2212.02908", "DBLP": "journals/corr/abs-2212-02908", + "DOI": "10.48550/arXiv.2212.02908", "CorpusId": 254275511}, "corpusId": 254275511, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7a2219ada69c4a691edb8dae69d1bbdab4240b68", "title": "Towards human-compatible autonomous car: A study of non-verbal Turing test in automated driving with affective transition modelling", "abstract": "\u2014Autonomous cars are indispensable when humans go further down the hands-free @@ -427,17 +596,20 @@ interactions: role of affective transition in passengers\u2019 ascription of humanness, which might become a future direction for autonomous driving.", "venue": "ArXiv", "year": 2022, "referenceCount": 133, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-12-06", "journal": {"volume": "abs/2212.02908", "name": "ArXiv"}, "authors": - [{"authorId": "1809079222", "name": "Zhaoning Li"}, {"authorId": "2193641498", - "name": "Qiaoli Jiang"}, {"authorId": "121809035", "name": "Zhengming Wu"}, - {"authorId": "2118791677", "name": "Anqi Liu"}, {"authorId": "2193958307", - "name": "Haiyan Wu"}, {"authorId": "51024683", "name": "Miner Huang"}, {"authorId": - "2193594535", "name": "Kai Huang"}, {"authorId": "12007021", "name": "Y. Ku"}]}, - {"paperId": "15092c9ef9363ace0743138398e0ada50624bccb", "externalIds": {"DOI": - "10.1101/2022.12.01.22282960", "CorpusId": 254272229}, "url": "https://www.semanticscholar.org/paper/15092c9ef9363ace0743138398e0ada50624bccb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-12-06", "journal": {"volume": + "abs/2212.02908", "name": "ArXiv"}, "authors": [{"authorId": "1809079222", + "name": "Zhaoning Li"}, {"authorId": "2193641498", "name": "Qiaoli Jiang"}, + {"authorId": "121809035", "name": "Zhengming Wu"}, {"authorId": "2118791677", + "name": "Anqi Liu"}, {"authorId": "2193958307", "name": "Haiyan Wu"}, {"authorId": + "51024683", "name": "Miner Huang"}, {"authorId": "2193594535", "name": "Kai + Huang"}, {"authorId": "12007021", "name": "Y. Ku"}]}, {"paperId": "15092c9ef9363ace0743138398e0ada50624bccb", + "externalIds": {"DOI": "10.1101/2022.12.01.22282960", "CorpusId": 254272229}, + "corpusId": 254272229, "publicationVenue": {"id": "d5e5b5e7-54b1-4f53-82fc-4853f3e71c58", + "name": "medRxiv", "type": "journal", "url": "https://www.medrxiv.org/"}, + "url": "https://www.semanticscholar.org/paper/15092c9ef9363ace0743138398e0ada50624bccb", "title": "Perception and knowledge of artificial intelligence in healthcare, therapy and diagnostics: A population-representative survey", "abstract": "Artificial intelligence (AI) is understood as a system''s ability to correctly @@ -455,14 +627,20 @@ interactions: handle data protection. This survey provides first insights into this relevant topic within the German population.", "venue": "medRxiv", "year": 2022, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.medrxiv.org/content/medrxiv/early/2022/12/06/2022.12.01.22282960.full.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-12-06", "journal": null, "authors": [{"authorId": "114528952", "name": "C. G. Wittal"}, {"authorId": "2069387902", "name": "D. Hammer"}, {"authorId": "2057608157", "name": "F. Klein"}, {"authorId": "2193652029", "name": "J. Rittchen"}]}, {"paperId": "564f911510646366f2ca6721756e47b05c23e9d2", "externalIds": {"DBLP": "conf/hai/TemtsinPB22", - "DOI": "10.1145/3527188.3563918", "CorpusId": 254097217}, "url": "https://www.semanticscholar.org/paper/564f911510646366f2ca6721756e47b05c23e9d2", + "DOI": "10.1145/3527188.3563918", "CorpusId": 254097217}, "corpusId": 254097217, + "publicationVenue": {"id": "c3940b41-03f7-4e15-8a48-20b569de9625", "name": + "International Conference on Human-Agent Interaction", "type": "conference", + "alternate_names": ["HAI", "Int Conf Human-agent Interact", "Human-Agent Interaction", + "Hum Asp Ambient Intell", "Human-agent Interact", "Human Aspects in Ambient + Intelligence"]}, "url": "https://www.semanticscholar.org/paper/564f911510646366f2ca6721756e47b05c23e9d2", "title": "A Bona Fide Turing Test", "abstract": "The constantly rising demand for human-like conversational agents and the accelerated development of natural language processing technology raise expectations for a breakthrough in intelligent @@ -476,25 +654,68 @@ interactions: to advance AI researchers in their ultimate quest, developing an intelligent machine.", "venue": "International Conference on Human-Agent Interaction", "year": 2022, "referenceCount": 21, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], - "publicationDate": "2022-12-05", "journal": {"name": "Proceedings of the 10th - International Conference on Human-Agent Interaction"}, "authors": [{"authorId": - "35534938", "name": "Sharon Temtsin"}, {"authorId": "144239027", "name": "D. - Proudfoot"}, {"authorId": "1728894", "name": "C. Bartneck"}]}, {"paperId": - "6b3b803bc2b900294bd5b850008cb77336f5f2b2", "externalIds": {"DOI": "10.1016/j.jdec.2022.11.003", - "CorpusId": 254725647}, "url": "https://www.semanticscholar.org/paper/6b3b803bc2b900294bd5b850008cb77336f5f2b2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2022-12-05", + "journal": {"name": "Proceedings of the 10th International Conference on Human-Agent + Interaction"}, "authors": [{"authorId": "35534938", "name": "Sharon Temtsin"}, + {"authorId": "144239027", "name": "D. Proudfoot"}, {"authorId": "1728894", + "name": "C. Bartneck"}]}, {"paperId": "6b3b803bc2b900294bd5b850008cb77336f5f2b2", + "externalIds": {"DOI": "10.1016/j.jdec.2022.11.003", "CorpusId": 254725647}, + "corpusId": 254725647, "publicationVenue": {"id": "2323ee50-d687-42a3-9b11-de79640703ad", + "name": "Journal of Digital Economy", "type": "journal", "alternate_names": + ["J Digit Econ"], "issn": "2773-0670"}, "url": "https://www.semanticscholar.org/paper/6b3b803bc2b900294bd5b850008cb77336f5f2b2", "title": "How to realize the full potentials of artificial intelligence (AI) in digital economy? A literature review", "abstract": null, "venue": "Journal of Digital Economy", "year": 2022, "referenceCount": 95, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2022-12-01", "journal": - {"name": "Journal of Digital Economy"}, "authors": [{"authorId": "144922394", - "name": "Haiming Hang"}, {"authorId": "115023819", "name": "Zhifeng. Chen"}]}, - {"paperId": "b9e9d385f5db34ab0670e3185949150097696525", "externalIds": {"PubMedCentral": - "9718518", "DOI": "10.2196/39443", "CorpusId": 254179258}, "url": "https://www.semanticscholar.org/paper/b9e9d385f5db34ab0670e3185949150097696525", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2022-12-01", "journal": {"name": "Journal of Digital Economy"}, "authors": + [{"authorId": "144922394", "name": "Haiming Hang"}, {"authorId": "115023819", + "name": "Zhifeng. Chen"}]}, {"paperId": "cd0fa22b7aead6eeba42e7e418b02a19ecce2a6e", + "externalIds": {"PubMedCentral": "9779814", "DOI": "10.3390/ijerph192416584", + "CorpusId": 254610883}, "corpusId": 254610883, "publicationVenue": {"id": + "3096eb5c-d18c-4877-94cd-28edd3a9c357", "name": "International Journal of + Environmental Research and Public Health", "type": "journal", "alternate_names": + ["Int J Environ Res Public Health"], "issn": "1660-4601", "url": "http://www.mdpi.com/journal/ijerph/"}, + "url": "https://www.semanticscholar.org/paper/cd0fa22b7aead6eeba42e7e418b02a19ecce2a6e", + "title": "Serious Games as a Validation Tool for PREDIS: A Decision Support + System for Disaster Management", "abstract": "In this paper, we validate PREDIS, + a decision support system for disaster management using serious games to collect + experts\u2019 judgments on its performance. PREDIS is a model for DISaster + response supplier selection (PREDIS). It has a PREDictive component (PRED) + for predicting the disaster human impact and an estimation component to Estimate + the DISaster (EDIS) needs to optimise supplier-based resource allocation. + A quasi-experiment design embedded in a participatory simulation game is conducted + to compare the opinions of equal samples of 22 experts and non-experts. The + following questions are put forward. First, \u201cDoes PREDIS model assists + the decision makers to make the same decisions faster?\u201d Second, \u201cDoes + the PREDIS model assist the non-experts as simulated decision makers to decide + like an expert?\u201d Using AHP weights of decision makers\u2019 preferences + as well as Borda counts, the decisions are compared. The result shows that + PREDIS helps to reduce the decision-making time by experts and non-experts + to 6 h after the disaster strike, instead of the usual 72 h. It also assists + 71% of the non-experts to make decisions similar to those made by experts. + In summary, the PREDIS model has two major capabilities. It enables the experts + and non-experts to predict the disaster results immediately using widely available + data. It also enables the non-experts to decide almost the same as the experts; + either in predicting the human impact of a disaster and estimating the needs + or in selecting suitable suppliers.", "venue": "International Journal of Environmental + Research and Public Health", "year": 2022, "referenceCount": 93, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/1660-4601/19/24/16584/pdf?version=1671090005", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2022-12-01", "journal": {"volume": + "19", "name": "International Journal of Environmental Research and Public + Health"}, "authors": [{"authorId": "2187330764", "name": "Sara Rye"}, {"authorId": + "40469219", "name": "E. Aktas"}]}, {"paperId": "b9e9d385f5db34ab0670e3185949150097696525", + "externalIds": {"PubMedCentral": "9718518", "DOI": "10.2196/39443", "CorpusId": + 254179258}, "corpusId": 254179258, "publicationVenue": {"id": "6c3e705d-29b5-462c-9a3a-6c7877b74a18", + "name": "JMIR Formative Research", "alternate_names": ["JMIR Form Res"], "issn": + "2561-326X", "url": "https://formative.jmir.org/"}, "url": "https://www.semanticscholar.org/paper/b9e9d385f5db34ab0670e3185949150097696525", "title": "Learning the Treatment Process in Radiotherapy Using an Artificial Intelligence\u2013Assisted Chatbot: Development Study", "abstract": "Background In knowledge transfer for educational purposes, most cancer hospital or center @@ -538,15 +759,23 @@ interactions: that is supported by machine learning was tested, and it was found that the bot can provide information about radiotherapy effectively.", "venue": "JMIR Formative Research", "year": 2022, "referenceCount": 31, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-12-01", "journal": {"volume": "6", "name": "JMIR - Formative Research"}, "authors": [{"authorId": "2187638438", "name": "Nathanael - Rebelo"}, {"authorId": "49076259", "name": "Leslie Sanders"}, {"authorId": + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://formative.jmir.org/2022/12/e39443/PDF", "status": null}, "fieldsOfStudy": + null, "s2FieldsOfStudy": [{"category": "Medicine", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-12-01", "journal": {"volume": "6", "name": + "JMIR Formative Research"}, "authors": [{"authorId": "2187638438", "name": + "Nathanael Rebelo"}, {"authorId": "49076259", "name": "Leslie Sanders"}, {"authorId": "2158259399", "name": "Kay Li"}, {"authorId": "2070774008", "name": "J. Chow"}]}, {"paperId": "f604c9436aa0103ba0ba4c8366bdaaae6b263138", "externalIds": {"DOI": - "10.21608/jsec.2022.268733", "CorpusId": 253402215}, "url": "https://www.semanticscholar.org/paper/f604c9436aa0103ba0ba4c8366bdaaae6b263138", + "10.21608/jsec.2022.268733", "CorpusId": 253402215}, "corpusId": 253402215, + "publicationVenue": {"id": "c32341a5-3607-4ae5-a497-b0a141e0098e", "name": + "\u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 + \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629", + "type": "journal", "alternate_names": ["\u0627\u0644\u0645\u062c\u0644\u0629 + \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f + \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629"], "issn": "2636-2562"}, + "url": "https://www.semanticscholar.org/paper/f604c9436aa0103ba0ba4c8366bdaaae6b263138", "title": "DEVELOPING A NEW BUSINESS OPPORTUNITIES VIA ARTIFICIAL INTELLIGENCE: NEW STRATEGIC MANAGEMENT MODEL", "abstract": "As we are living in the fourth industrial revolution era which is differentiated by the speed of technological @@ -576,16 +805,31 @@ interactions: \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://jsec.journals.ekb.eg/article_268733_36e40ab6f3f51e5fe0fd5a1a78b3c21f.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-12-01", "journal": {"name": "\u0627\u0644\u0645\u062c\u0644\u0629 \u0627\u0644\u0639\u0644\u0645\u06cc\u0629 \u0644\u0644\u0625\u0642\u062a\u0635\u0627\u062f \u0648 \u0627\u0644\u062a\u062c\u0627\u0631\u0629"}, "authors": [{"authorId": "2190203460", "name": "Sayed Mahmoud El Sayed El Khouly"}, {"authorId": "2190201240", "name": "Kareem Yasser"}, {"authorId": - "2176826746", "name": "Engy Ahmed Yehia"}]}, {"paperId": "79b645e8afab24917aa455a56241313559fba3e7", + "2176826746", "name": "Engy Ahmed Yehia"}]}, {"paperId": "c92543c426e6f1c02ad56174d49c798252cc2da1", + "externalIds": {"DOI": "10.2139/ssrn.4141964", "CorpusId": 250058600}, "corpusId": + 250058600, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c92543c426e6f1c02ad56174d49c798252cc2da1", + "title": "Artificial Intelligence Applications in Pathological Diagnosis of + Gastric Cancer", "abstract": null, "venue": "SSRN Electronic Journal", "year": + 2022, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-12-01", "journal": {"name": "SSRN Electronic + Journal"}, "authors": [{"authorId": "1724771727", "name": "Yang Deng"}, {"authorId": + "2041760027", "name": "Hang-Yu Qin"}, {"authorId": "2144198459", "name": "Yanyan + Zhou"}, {"authorId": "2121389684", "name": "Hong-Hong Liu"}, {"authorId": + "2150036575", "name": "Yong Jiang"}, {"authorId": "2173647289", "name": "Jian-Ping + Liu"}, {"authorId": "2159356873", "name": "Jianmin Bao"}]}, {"paperId": "79b645e8afab24917aa455a56241313559fba3e7", "externalIds": {"ArXiv": "2212.00061", "DBLP": "journals/corr/abs-2212-00061", - "DOI": "10.48550/arXiv.2212.00061", "CorpusId": 254125717}, "url": "https://www.semanticscholar.org/paper/79b645e8afab24917aa455a56241313559fba3e7", + "DOI": "10.48550/arXiv.2212.00061", "CorpusId": 254125717}, "corpusId": 254125717, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79b645e8afab24917aa455a56241313559fba3e7", "title": "Auxiliary Learning as a step towards Artificial General Intelligence", "abstract": "Auxiliary Learning is a machine learning approach in which the model acknowledges the existence of objects that do not come under any of @@ -595,12 +839,16 @@ interactions: the need to handle unknown objects. The Cat & Dog binary classi\ufb01er is taken as an example throughout the paper", "venue": "ArXiv", "year": 2022, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-11-30", "journal": {"volume": "abs/2212.00061", "name": "ArXiv"}, "authors": - [{"authorId": "2134664642", "name": "Christeena Jose"}]}, {"paperId": "908e73ab7e4a7bc5bd42fd84b31b6290cda401a2", - "externalIds": {"DOI": "10.3389/frvir.2022.1033709", "CorpusId": 253841933}, + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-11-30", "journal": {"volume": "abs/2212.00061", "name": + "ArXiv"}, "authors": [{"authorId": "2134664642", "name": "Christeena Jose"}]}, + {"paperId": "908e73ab7e4a7bc5bd42fd84b31b6290cda401a2", "externalIds": {"DOI": + "10.3389/frvir.2022.1033709", "CorpusId": 253841933}, "corpusId": 253841933, + "publicationVenue": {"id": "f1d4421a-af17-4df9-a4df-1077c32f0840", "name": + "Frontiers in Virtual Reality", "type": "journal", "alternate_names": ["Front + Virtual Real"], "issn": "2673-4192", "url": "https://www.frontiersin.org/journals/virtual-reality"}, "url": "https://www.semanticscholar.org/paper/908e73ab7e4a7bc5bd42fd84b31b6290cda401a2", "title": "Perceived authenticity of virtual characters makes the difference", "abstract": "Conventionally, human-controlled and machine-controlled virtual @@ -616,13 +864,15 @@ interactions: to demonstrate how virtual characters do not have to be perceived as humans and yet can be perceived as authentic to their human interactants.", "venue": "Frontiers in Virtual Reality", "year": 2022, "referenceCount": 109, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2022-11-25", "journal": {"volume": "3"}, "authors": - [{"authorId": "2118226730", "name": "Junru Huang"}, {"authorId": "3669749", - "name": "Younbo Jung"}]}, {"paperId": "1382cd1a16b001cbb5a298d4458b788c2f0a6ffa", - "externalIds": {"DBLP": "journals/corr/abs-2211-13087", "ArXiv": "2211.13087", - "DOI": "10.48550/arXiv.2211.13087", "CorpusId": 253801749}, "url": "https://www.semanticscholar.org/paper/1382cd1a16b001cbb5a298d4458b788c2f0a6ffa", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/frvir.2022.1033709/pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-25", + "journal": {"volume": "3"}, "authors": [{"authorId": "2118226730", "name": + "Junru Huang"}, {"authorId": "3669749", "name": "Younbo Jung"}]}, {"paperId": + "1382cd1a16b001cbb5a298d4458b788c2f0a6ffa", "externalIds": {"DBLP": "journals/corr/abs-2211-13087", + "ArXiv": "2211.13087", "DOI": "10.48550/arXiv.2211.13087", "CorpusId": 253801749}, + "corpusId": 253801749, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1382cd1a16b001cbb5a298d4458b788c2f0a6ffa", "title": "Human or Machine? Turing Tests for Vision and Language", "abstract": "As AI algorithms increasingly participate in daily activities that used to be the sole province of humans, we are inevitably called upon to consider @@ -636,23 +886,28 @@ interactions: Surprisingly, the results reveal that current AIs are not far from being able to impersonate human judges across different ages, genders, and educational levels", "venue": "ArXiv", "year": 2022, "referenceCount": 78, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-23", "journal": - {"volume": "abs/2211.13087", "name": "ArXiv"}, "authors": [{"authorId": "2418491", - "name": "Mengmi Zhang"}, {"authorId": "104096295", "name": "Giorgia Dellaferrera"}, - {"authorId": "2048021896", "name": "Ankur Sikarwar"}, {"authorId": "40263427", - "name": "M. Armend\u00e1riz"}, {"authorId": "2168467358", "name": "Noga Mudrik"}, - {"authorId": "2067433241", "name": "Prachi Agrawal"}, {"authorId": "7232330", - "name": "Spandan Madan"}, {"authorId": "21570451", "name": "Andrei Barbu"}, - {"authorId": "2118530836", "name": "Haochen Yang"}, {"authorId": "2191899809", - "name": "T. Kumar"}, {"authorId": "2191899184", "name": "Meghna Sadwani"}, - {"authorId": "2191899118", "name": "Stella Dellaferrera"}, {"authorId": "2191896327", - "name": "Michele Pizzochero"}, {"authorId": "40624376", "name": "H. Pfister"}, - {"authorId": "2066787605", "name": "Gabriel Kreiman"}]}, {"paperId": "4000868e095553bc7985e02c6281de6096728298", - "externalIds": {"DOI": "10.1556/2062.2022.00575", "CorpusId": 253826921}, - "url": "https://www.semanticscholar.org/paper/4000868e095553bc7985e02c6281de6096728298", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-11-23", "journal": {"volume": "abs/2211.13087", "name": "ArXiv"}, "authors": + [{"authorId": "2418491", "name": "Mengmi Zhang"}, {"authorId": "104096295", + "name": "Giorgia Dellaferrera"}, {"authorId": "2048021896", "name": "Ankur + Sikarwar"}, {"authorId": "40263427", "name": "M. Armend\u00e1riz"}, {"authorId": + "2168467358", "name": "Noga Mudrik"}, {"authorId": "2067433241", "name": "Prachi + Agrawal"}, {"authorId": "7232330", "name": "Spandan Madan"}, {"authorId": + "21570451", "name": "Andrei Barbu"}, {"authorId": "2118530836", "name": "Haochen + Yang"}, {"authorId": "2191899809", "name": "T. Kumar"}, {"authorId": "2191899184", + "name": "Meghna Sadwani"}, {"authorId": "2191899118", "name": "Stella Dellaferrera"}, + {"authorId": "2191896327", "name": "Michele Pizzochero"}, {"authorId": "40624376", + "name": "H. Pfister"}, {"authorId": "2066787605", "name": "Gabriel Kreiman"}]}, + {"paperId": "4000868e095553bc7985e02c6281de6096728298", "externalIds": {"DOI": + "10.1556/2062.2022.00575", "CorpusId": 253826921}, "corpusId": 253826921, + "publicationVenue": {"id": "7a4b48c2-25d7-4b89-8767-d8d04e1483ff", "name": + "Acta Linguistica Academica", "alternate_names": ["Acta Linguistica Acad"], + "issn": "2559-8201", "url": "https://www.ceeol.com/search/journal-detail?id=2067", + "alternate_urls": ["https://www.jstor.org/journal/actalingacad"]}, "url": + "https://www.semanticscholar.org/paper/4000868e095553bc7985e02c6281de6096728298", "title": "Winograd schemata and other datasets for anaphora resolution in Hungarian", "abstract": "The Winograd Schema Challenge (WSC, proposed by Levesque, Davis & Morgenstern 2012) is considered to be the novel Turing Test to examine @@ -668,22 +923,28 @@ interactions: datasets to Hungarian. We aim to discuss the challenges we faced during the translation/adaption process.", "venue": "Acta Linguistica Academica", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-11-22", "journal": {"name": "Acta Linguistica Academica"}, - "authors": [{"authorId": "7847789", "name": "No\u00e9mi Vad\u00e1sz"}, {"authorId": - "1414711705", "name": "No\u00e9mi Ligeti-Nagy"}]}, {"paperId": "4b12c354631d76ae6dadec168a14f77fc839fb0c", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://akjournals.com/downloadpdf/journals/2062/69/4/article-p564.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-11-22", "journal": {"name": "Acta Linguistica Academica"}, "authors": + [{"authorId": "7847789", "name": "No\u00e9mi Vad\u00e1sz"}, {"authorId": "1414711705", + "name": "No\u00e9mi Ligeti-Nagy"}]}, {"paperId": "4b12c354631d76ae6dadec168a14f77fc839fb0c", "externalIds": {"DOI": "10.1007/s43681-022-00236-7", "CorpusId": 253830855}, - "url": "https://www.semanticscholar.org/paper/4b12c354631d76ae6dadec168a14f77fc839fb0c", + "corpusId": 253830855, "publicationVenue": {"id": "96ed79e9-36b2-4f58-8ef2-67296adef647", + "name": "AI and Ethics", "type": "journal", "alternate_names": ["AI Ethics"], + "issn": "2730-5953", "url": "https://www.springer.com/journal/43681"}, "url": + "https://www.semanticscholar.org/paper/4b12c354631d76ae6dadec168a14f77fc839fb0c", "title": "Algorithmic decision-making in financial services: economic and normative outcomes in consumer credit", "abstract": null, "venue": "AI and Ethics", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-11-21", "journal": {"name": "AI and Ethics"}, "authors": [{"authorId": - "2161835433", "name": "Holli Sargeant"}]}, {"paperId": "444164a33acf5d207bb4acb955cbb1c128a45ce6", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-022-00236-7.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-21", + "journal": {"name": "AI and Ethics"}, "authors": [{"authorId": "2161835433", + "name": "Holli Sargeant"}]}, {"paperId": "444164a33acf5d207bb4acb955cbb1c128a45ce6", "externalIds": {"DBLP": "journals/corr/abs-2211-11461", "ArXiv": "2211.11461", - "DOI": "10.48550/arXiv.2211.11461", "CorpusId": 253735380}, "url": "https://www.semanticscholar.org/paper/444164a33acf5d207bb4acb955cbb1c128a45ce6", + "DOI": "10.48550/arXiv.2211.11461", "CorpusId": 253735380}, "corpusId": 253735380, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/444164a33acf5d207bb4acb955cbb1c128a45ce6", "title": "Exhaustive Symbolic Regression", "abstract": "\u2014Symbolic Regression (SR) algorithms learn analytic expressions which both accurately \ufb01t data and, unlike traditional machine-learning approaches, are highly interpretable. @@ -709,16 +970,17 @@ interactions: found this successfully, would not locate \u039b CDM. We make our code and full equation sets publicly available \u00a7 .", "venue": "ArXiv", "year": 2022, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-11-21", "journal": {"volume": "abs/2211.11461", "name": "ArXiv"}, "authors": - [{"authorId": "1792039168", "name": "D. J. Bartlett"}, {"authorId": "145903962", - "name": "H. Desmond"}, {"authorId": "145209585", "name": "P. Ferreira"}]}, - {"paperId": "2c43ef2d8e44d055b61eecddf323a3412007cef8", "externalIds": {"DBLP": - "journals/corr/abs-2211-11483", "ArXiv": "2211.11483", "DOI": "10.48550/arXiv.2211.11483", - "CorpusId": 253734407}, "url": "https://www.semanticscholar.org/paper/2c43ef2d8e44d055b61eecddf323a3412007cef8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-11-21", "journal": {"volume": "abs/2211.11461", "name": + "ArXiv"}, "authors": [{"authorId": "1792039168", "name": "D. J. Bartlett"}, + {"authorId": "145903962", "name": "H. Desmond"}, {"authorId": "145209585", + "name": "P. Ferreira"}]}, {"paperId": "2c43ef2d8e44d055b61eecddf323a3412007cef8", + "externalIds": {"DBLP": "journals/corr/abs-2211-11483", "ArXiv": "2211.11483", + "DOI": "10.48550/arXiv.2211.11483", "CorpusId": 253734407}, "corpusId": 253734407, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c43ef2d8e44d055b61eecddf323a3412007cef8", "title": "Deanthropomorphising NLP: Can a Language Model Be Conscious?", "abstract": "This work is intended as a voice in the discussion over the recent claims that LaMDA, a pretrained language model based on the Transformer model architecture, @@ -735,24 +997,31 @@ interactions: helpful for readers outside the NLP community, we also present the necessary background in language modelling.", "venue": "ArXiv", "year": 2022, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-11-21", "journal": {"volume": "abs/2211.11483", "name": "ArXiv"}, "authors": - [{"authorId": "2895959", "name": "M. Shardlow"}, {"authorId": "1984182", "name": - "Piotr Przyby\u0142a"}]}, {"paperId": "ca958dfa4615ea205b2e7e036a85b7bb4f873dd4", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-11-21", "journal": {"volume": "abs/2211.11483", "name": + "ArXiv"}, "authors": [{"authorId": "2895959", "name": "M. Shardlow"}, {"authorId": + "1984182", "name": "Piotr Przyby\u0142a"}]}, {"paperId": "ca958dfa4615ea205b2e7e036a85b7bb4f873dd4", "externalIds": {"ArXiv": "2211.15397", "DBLP": "journals/corr/abs-2211-15397", - "DOI": "10.48550/arXiv.2211.15397", "CorpusId": 254043466}, "url": "https://www.semanticscholar.org/paper/ca958dfa4615ea205b2e7e036a85b7bb4f873dd4", + "DOI": "10.48550/arXiv.2211.15397", "CorpusId": 254043466}, "corpusId": 254043466, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca958dfa4615ea205b2e7e036a85b7bb4f873dd4", "title": "Automating Systematic Literature Reviews with Natural Language Processing and Text Mining: a Systematic Literature Review", "abstract": ".", "venue": "ArXiv", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-11-20", "journal": {"volume": "abs/2211.15397", "name": - "ArXiv"}, "authors": [{"authorId": "3126428", "name": "G. Sundaram"}, {"authorId": - "1772624", "name": "D. Berleant"}]}, {"paperId": "35620ce11ffb38ebdaf16810cf755f490689cbe2", - "externalIds": {"DOI": "10.1080/08839514.2022.2145631", "CorpusId": 253700852}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2022-11-20", "journal": + {"volume": "abs/2211.15397", "name": "ArXiv"}, "authors": [{"authorId": "3126428", + "name": "G. Sundaram"}, {"authorId": "1772624", "name": "D. Berleant"}]}, + {"paperId": "35620ce11ffb38ebdaf16810cf755f490689cbe2", "externalIds": {"DOI": + "10.1080/08839514.2022.2145631", "CorpusId": 253700852}, "corpusId": 253700852, + "publicationVenue": {"id": "c1ed9251-6b49-4b2d-90c8-7a997accddab", "name": + "Applied Artificial Intelligence", "type": "journal", "alternate_names": ["Appl + Artif Intell"], "issn": "0883-9514", "url": "http://www.catchword.com/rpsv/catchword/tandf/08839514/contp1-1.htm", + "alternate_urls": ["http://www.tandfonline.com/loi/uaai20", "http://www.tandfonline.com/action/journalInformation?journalCode=uaai20", + "http://www.metapress.com/link.asp?id=100651", "http://informaworld.com/openurl?genre=journal&issn=0883-9514"]}, "url": "https://www.semanticscholar.org/paper/35620ce11ffb38ebdaf16810cf755f490689cbe2", "title": "Artificial Intelligence and Human Resources Management: A Bibliometric Analysis", "abstract": "ABSTRACT Artificial Intelligence (AI) is increasingly @@ -771,15 +1040,15 @@ interactions: in recruitment and selection actions, leaving aside other sub-areas with a great potential for application.", "venue": "Applied Artificial Intelligence", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-11-18", "journal": {"volume": "36", "name": "Applied - Artificial Intelligence"}, "authors": [{"authorId": "1405294056", "name": - "P. Palos-S\u00e1nchez"}, {"authorId": "2121995364", "name": "P. Baena-Luna"}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-11-18", "journal": {"volume": "36", "name": + "Applied Artificial Intelligence"}, "authors": [{"authorId": "1405294056", + "name": "P. Palos-S\u00e1nchez"}, {"authorId": "2121995364", "name": "P. Baena-Luna"}, {"authorId": "2191487154", "name": "A. Badicu"}, {"authorId": "1413743433", "name": "J. Infante-Moro"}]}, {"paperId": "52530930e60ac1f12461221e1e7cbab7fe537866", "externalIds": {"DOI": "10.37467/revvisual.v9.3748", "CorpusId": 253666968}, - "url": "https://www.semanticscholar.org/paper/52530930e60ac1f12461221e1e7cbab7fe537866", + "corpusId": 253666968, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/52530930e60ac1f12461221e1e7cbab7fe537866", "title": "Variables para la fase diagn\u00f3stica de un software piloto de planeaci\u00f3n estrat\u00e9gica", "abstract": "El presente art\u00edculo es resultado del Proyecto Modelo semi\u00f3tico de planeaci\u00f3n estrat\u00e9gica, @@ -793,7 +1062,8 @@ interactions: mercados, comunicaci\u00f3n, personas y tendencias.", "venue": "VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.eagora.org/revVISUAL/article/download/3748/2149", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-11-17", "journal": {"name": "VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual"}, "authors": [{"authorId": "2191356773", "name": "Vladimir S\u00e1nchez-Ria\u00f1o"}, @@ -801,21 +1071,27 @@ interactions: "2099563395", "name": "O. Garcia-Bedoya"}, {"authorId": "2191357988", "name": "Jairo R. Sojo-Gomez"}]}, {"paperId": "479b33ebcae345ac0e493b037a4f124bb0771e42", "externalIds": {"DBLP": "journals/corr/abs-2211-16975", "ArXiv": "2211.16975", - "DOI": "10.48550/arXiv.2211.16975", "CorpusId": 254096269}, "url": "https://www.semanticscholar.org/paper/479b33ebcae345ac0e493b037a4f124bb0771e42", + "DOI": "10.48550/arXiv.2211.16975", "CorpusId": 254096269}, "corpusId": 254096269, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/479b33ebcae345ac0e493b037a4f124bb0771e42", "title": "The Infinity of Randomness", "abstract": "This work starts from de\ufb01nition of randomness, the results of algorithmic randomness are analyzed from the perspective of application. Then, the source and nature of randomness is ex-plored", "venue": "ArXiv", "year": 2022, "referenceCount": 37, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-11-16", "journal": {"volume": "abs/2211.16975", "name": - "ArXiv"}, "authors": [{"authorId": "2193079278", "name": "Yongxin Li"}]}, - {"paperId": "6d6ec79cd196b74d857c6426c1df1e94ede4be13", "externalIds": {"DBLP": - "conf/mindtrek/GhajargarBL22", "DOI": "10.1145/3569219.3569418", "CorpusId": - 253421848}, "url": "https://www.semanticscholar.org/paper/6d6ec79cd196b74d857c6426c1df1e94ede4be13", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-11-16", "journal": {"volume": + "abs/2211.16975", "name": "ArXiv"}, "authors": [{"authorId": "2193079278", + "name": "Yongxin Li"}]}, {"paperId": "6d6ec79cd196b74d857c6426c1df1e94ede4be13", + "externalIds": {"DBLP": "conf/mindtrek/GhajargarBL22", "DOI": "10.1145/3569219.3569418", + "CorpusId": 253421848}, "corpusId": 253421848, "publicationVenue": {"id": + "9fce586b-4914-4318-9aa8-9177513ec112", "name": "International Conference + on Entertainment and Media in the Ubiquitous Era", "type": "conference", "alternate_names": + ["Int Conf Entertain Media Ubiquitous Era", "Mindtrek", "International MindTrek + Conference", "MindTrek", "Int Mindtrek Conf"], "url": "http://mindtrek.org/"}, + "url": "https://www.semanticscholar.org/paper/6d6ec79cd196b74d857c6426c1df1e94ede4be13", "title": "A Redhead Walks into a Bar: Experiences of Writing Fiction with Artificial Intelligence", "abstract": "Human creativity has been often aided and supported by artificial tools, spanning traditional tools such as ideation @@ -839,7 +1115,8 @@ interactions: to change the ways we were relating to the AI as collaborator.", "venue": "International Conference on Entertainment and Media in the Ubiquitous Era", "year": 2022, "referenceCount": 73, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3569219.3569418", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2022-11-16", "journal": {"name": "Proceedings of the 25th @@ -847,7 +1124,8 @@ interactions: "name": "Maliheh Ghajargar"}, {"authorId": "1804390", "name": "Jeffrey Bardzell"}, {"authorId": "1991065549", "name": "Love Lagerkvist"}]}, {"paperId": "bbeec37a814305311aa6aef8eef1e912518805e9", "externalIds": {"ArXiv": "2211.07954", "DBLP": "journals/corr/abs-2211-07954", - "DOI": "10.48550/arXiv.2211.07954", "CorpusId": 253523104}, "url": "https://www.semanticscholar.org/paper/bbeec37a814305311aa6aef8eef1e912518805e9", + "DOI": "10.48550/arXiv.2211.07954", "CorpusId": 253523104}, "corpusId": 253523104, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bbeec37a814305311aa6aef8eef1e912518805e9", "title": "An Overview on Controllable Text Generation via Variational Auto-Encoders", "abstract": "Recent advances in neural-based generative modeling have reignited the hopes of having computer systems capable of conversing with humans and @@ -868,23 +1146,27 @@ interactions: popular methodologies and raw thoughts for controllable language generation under the scope of variational auto-encoder.", "venue": "ArXiv", "year": 2022, "referenceCount": 97, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-11-15", "journal": {"volume": "abs/2211.07954", "name": - "ArXiv"}, "authors": [{"authorId": "2136194164", "name": "Haoqin Tu"}, {"authorId": - "50024168", "name": "Yitong Li"}]}, {"paperId": "326500d739029558edb6a607d07f45de9a8bb787", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-11-15", "journal": {"volume": "abs/2211.07954", + "name": "ArXiv"}, "authors": [{"authorId": "2136194164", "name": "Haoqin Tu"}, + {"authorId": "50024168", "name": "Yitong Li"}]}, {"paperId": "326500d739029558edb6a607d07f45de9a8bb787", "externalIds": {"DOI": "10.1007/s44163-022-00038-0", "CorpusId": 253512920}, + "corpusId": 253512920, "publicationVenue": {"id": "dda0a41e-efcd-40e6-87f7-a663355aceb3", + "name": "Discover Artificial Intelligence", "type": "journal", "alternate_names": + ["Discov Artif Intell"], "issn": "2731-0809", "url": "https://www.springer.com/journal/44163"}, "url": "https://www.semanticscholar.org/paper/326500d739029558edb6a607d07f45de9a8bb787", "title": "Identity of AI", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 110, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-11-14", "journal": {"volume": "2", "name": "Discover - Artificial Intelligence"}, "authors": [{"authorId": "1696366", "name": "V. - Devedzic"}]}, {"paperId": "ef6c0d2bf2d779f9c518ab118c655b198741b00b", "externalIds": - {"DBLP": "journals/corr/abs-2211-07625", "ArXiv": "2211.07625", "DOI": "10.48550/arXiv.2211.07625", - "CorpusId": 253510432}, "url": "https://www.semanticscholar.org/paper/ef6c0d2bf2d779f9c518ab118c655b198741b00b", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s44163-022-00038-0.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-11-14", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, + "authors": [{"authorId": "1696366", "name": "V. Devedzic"}]}, {"paperId": + "ef6c0d2bf2d779f9c518ab118c655b198741b00b", "externalIds": {"DBLP": "journals/corr/abs-2211-07625", + "ArXiv": "2211.07625", "DOI": "10.48550/arXiv.2211.07625", "CorpusId": 253510432}, + "corpusId": 253510432, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ef6c0d2bf2d779f9c518ab118c655b198741b00b", "title": "What Images are More Memorable to Machines?", "abstract": "This paper studies the problem of measuring and predicting how memorable an image is to pattern recognition machines, as a path to explore machine intelligence. @@ -900,17 +1182,19 @@ interactions: machine memorability and opens a new research direction at the in-terface between machine memory and visual data.", "venue": "ArXiv", "year": 2022, "referenceCount": 89, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-11-14", "journal": {"volume": "abs/2211.07625", "name": "ArXiv"}, "authors": - [{"authorId": "2109488495", "name": "Junlin Han"}, {"authorId": "31833458", - "name": "Huangying Zhan"}, {"authorId": "2152093629", "name": "Jie Hong"}, - {"authorId": "49208246", "name": "Pengfei Fang"}, {"authorId": "2145827897", - "name": "Hongdong Li"}, {"authorId": "47773335", "name": "L. Petersson"}, - {"authorId": "2190750918", "name": "Ian Reid"}]}, {"paperId": "d0ec5a31b392f6f228bb8886d98b335044977b9f", - "externalIds": {"ArXiv": "2211.06766", "DBLP": "journals/corr/abs-2211-06766", - "DOI": "10.48550/arXiv.2211.06766", "CorpusId": 253511102}, "url": "https://www.semanticscholar.org/paper/d0ec5a31b392f6f228bb8886d98b335044977b9f", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-11-14", "journal": {"volume": "abs/2211.07625", "name": + "ArXiv"}, "authors": [{"authorId": "2109488495", "name": "Junlin Han"}, {"authorId": + "31833458", "name": "Huangying Zhan"}, {"authorId": "2152093629", "name": + "Jie Hong"}, {"authorId": "49208246", "name": "Pengfei Fang"}, {"authorId": + "2145827897", "name": "Hongdong Li"}, {"authorId": "47773335", "name": "L. + Petersson"}, {"authorId": "2190750918", "name": "Ian Reid"}]}, {"paperId": + "d0ec5a31b392f6f228bb8886d98b335044977b9f", "externalIds": {"ArXiv": "2211.06766", + "DBLP": "journals/corr/abs-2211-06766", "DOI": "10.48550/arXiv.2211.06766", + "CorpusId": 253511102}, "corpusId": 253511102, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d0ec5a31b392f6f228bb8886d98b335044977b9f", "title": "The Study of Complex Human Locomotion Behaviors: From Crawling to Walking", "abstract": "This paper uses a simple state machine to develop a control algorithm for controlling an infant humanoid in the context of a simple @@ -924,14 +1208,16 @@ interactions: from 8 to 18 months of age, and quantitatively evaluate the ideal kinematics model and simulation results for these stages.", "venue": "ArXiv", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-11-12", "journal": {"volume": "abs/2211.06766", "name": "ArXiv"}, "authors": - [{"authorId": "47411551", "name": "Shengjie Xu"}, {"authorId": "2423970", - "name": "K. Mok"}]}, {"paperId": "1a788f333a3c30e27ee03aac24737db338cdcb8f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-11-12", "journal": {"volume": + "abs/2211.06766", "name": "ArXiv"}, "authors": [{"authorId": "47411551", "name": + "Shengjie Xu"}, {"authorId": "2423970", "name": "K. Mok"}]}, {"paperId": "1a788f333a3c30e27ee03aac24737db338cdcb8f", "externalIds": {"DOI": "10.54097/hset.v16i.2067", "CorpusId": 253657967}, - "url": "https://www.semanticscholar.org/paper/1a788f333a3c30e27ee03aac24737db338cdcb8f", + "corpusId": 253657967, "publicationVenue": {"id": "8139fd99-9b3e-49a1-a8f1-f73376f8bd1a", + "name": "Highlights in Science Engineering and Technology", "alternate_names": + ["Highlight Sci Eng Technol"], "issn": "2791-0210"}, "url": "https://www.semanticscholar.org/paper/1a788f333a3c30e27ee03aac24737db338cdcb8f", "title": "Research and Applications Analysis of Knowledge Base Question Answering", "abstract": "Knowledge Base Question Answering (KBQA) has become one of recent trends in Natural Language Processing (NLP). It helps solve question answering @@ -949,13 +1235,17 @@ interactions: article analyzes the applicable scenes of the two applications and analyzes the main challenges of KBQA.", "venue": "Highlights in Science Engineering and Technology", "year": 2022, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-11-10", "journal": {"name": "Highlights in Science, - Engineering and Technology"}, "authors": [{"authorId": "1471678992", "name": - "Jingyi Huang"}]}, {"paperId": "f1afd2e2c04307d3d0faea4c24f2ae47735221cf", - "externalIds": {"DOI": "10.1075/idj.22013.rod", "CorpusId": 253469846}, "url": - "https://www.semanticscholar.org/paper/f1afd2e2c04307d3d0faea4c24f2ae47735221cf", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-11-10", "journal": {"name": "Highlights in + Science, Engineering and Technology"}, "authors": [{"authorId": "1471678992", + "name": "Jingyi Huang"}]}, {"paperId": "f1afd2e2c04307d3d0faea4c24f2ae47735221cf", + "externalIds": {"DOI": "10.1075/idj.22013.rod", "CorpusId": 253469846}, "corpusId": + 253469846, "publicationVenue": {"id": "6081cde8-8481-4d92-8974-ed0e0d8214ed", + "name": "Information Design Journal", "type": "journal", "alternate_names": + ["Inf Des J"], "issn": "0142-5471", "alternate_issns": ["1876-486X"], "url": + "https://www.benjamins.com/catalog/idj", "alternate_urls": ["https://www.ingentaconnect.com/content/jbp/idj"]}, + "url": "https://www.semanticscholar.org/paper/f1afd2e2c04307d3d0faea4c24f2ae47735221cf", "title": "Surprise machines", "abstract": "\n Surprise Machines is a project of experimental museology that\n sets out to visualize the entire image collection of the Harvard Art Museums,\n with a view to opening up unexpected vistas @@ -966,28 +1256,35 @@ interactions: feeling of surprise, a choreographic interface\n was designed to connect the audience\u2019s movement with several unique views of the\n collection.", "venue": "Information Design Journal", "year": 2022, "referenceCount": 24, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-11-10", "journal": {"name": - "Information Design Journal"}, "authors": [{"authorId": "3176132", "name": - "D. Rodighiero"}, {"authorId": "2174202069", "name": "Lins Derry"}, {"authorId": - "70003676", "name": "Douglas Duhaime"}, {"authorId": "2174202049", "name": - "Jordan Kruguer"}, {"authorId": "2116237204", "name": "Maximilian Mueller"}, - {"authorId": "2064535038", "name": "Christopher Pietsch"}, {"authorId": "66269452", - "name": "J. Schnapp"}, {"authorId": "2190554638", "name": "Jeff Steward"}, - {"authorId": "2190553522", "name": "metaLAB"}]}, {"paperId": "940284a49e54dca96cfed006f8ae252a11ff6157", - "externalIds": {"DOI": "10.1007/s44163-022-00039-z", "CorpusId": 253450606}, + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.jbe-platform.com/deliver/fulltext/10.1075/idj.22013.rod/idj.22013.rod.pdf?itemId=%2Fcontent%2Fjournals%2F10.1075%2Fidj.22013.rod&mimeType=pdf&containerItemId=content/jbep", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-10", + "journal": {"name": "Information Design Journal"}, "authors": [{"authorId": + "3176132", "name": "D. Rodighiero"}, {"authorId": "2174202069", "name": "Lins + Derry"}, {"authorId": "70003676", "name": "Douglas Duhaime"}, {"authorId": + "2174202049", "name": "Jordan Kruguer"}, {"authorId": "2116237204", "name": + "Maximilian Mueller"}, {"authorId": "2064535038", "name": "Christopher Pietsch"}, + {"authorId": "66269452", "name": "J. Schnapp"}, {"authorId": "2190554638", + "name": "Jeff Steward"}, {"authorId": "2190553522", "name": "metaLAB"}]}, + {"paperId": "940284a49e54dca96cfed006f8ae252a11ff6157", "externalIds": {"DOI": + "10.1007/s44163-022-00039-z", "CorpusId": 253450606}, "corpusId": 253450606, + "publicationVenue": {"id": "dda0a41e-efcd-40e6-87f7-a663355aceb3", "name": + "Discover Artificial Intelligence", "type": "journal", "alternate_names": + ["Discov Artif Intell"], "issn": "2731-0809", "url": "https://www.springer.com/journal/44163"}, "url": "https://www.semanticscholar.org/paper/940284a49e54dca96cfed006f8ae252a11ff6157", "title": "The threat, hype, and promise of artificial intelligence in education", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s44163-022-00039-z.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-11-10", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "147674071", "name": "Niklas Humble"}, {"authorId": "2547308", "name": "Peter Mozelius"}]}, {"paperId": "a7d0e2afdeb11172d444e12489266ebf495ed221", "externalIds": {"DBLP": "journals/corr/abs-2211-05044", "ArXiv": "2211.05044", - "DOI": "10.48550/arXiv.2211.05044", "CorpusId": 253420419}, "url": "https://www.semanticscholar.org/paper/a7d0e2afdeb11172d444e12489266ebf495ed221", + "DOI": "10.48550/arXiv.2211.05044", "CorpusId": 253420419}, "corpusId": 253420419, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7d0e2afdeb11172d444e12489266ebf495ed221", "title": "What is Wrong with Language Models that Can Not Tell a Story?", "abstract": "This paper argues that a deeper understanding of narrative and the successful generation of longer subjectively interesting texts is a vital @@ -996,15 +1293,16 @@ interactions: We demonstrate that there are no ad-equate datasets, evaluation methods, and even operational concepts that could be used to start working on narrative processing.", "venue": "ArXiv", "year": 2022, "referenceCount": 38, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-09", "journal": - {"volume": "abs/2211.05044", "name": "ArXiv"}, "authors": [{"authorId": "2130008929", - "name": "Ivan P. Yamshchikov"}, {"authorId": "34501167", "name": "Alexey Tikhonov"}]}, - {"paperId": "b3598a2f6c4e8a9e6d89de10b46bfad8e016ab2e", "externalIds": {"DBLP": - "journals/corr/abs-2211-03796", "ArXiv": "2211.03796", "DOI": "10.48550/arXiv.2211.03796", - "CorpusId": 253397751}, "url": "https://www.semanticscholar.org/paper/b3598a2f6c4e8a9e6d89de10b46bfad8e016ab2e", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-11-09", "journal": {"volume": "abs/2211.05044", "name": "ArXiv"}, "authors": + [{"authorId": "2130008929", "name": "Ivan P. Yamshchikov"}, {"authorId": "34501167", + "name": "Alexey Tikhonov"}]}, {"paperId": "b3598a2f6c4e8a9e6d89de10b46bfad8e016ab2e", + "externalIds": {"DBLP": "journals/corr/abs-2211-03796", "ArXiv": "2211.03796", + "DOI": "10.48550/arXiv.2211.03796", "CorpusId": 253397751}, "corpusId": 253397751, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b3598a2f6c4e8a9e6d89de10b46bfad8e016ab2e", "title": "Astronomia ex machina: a history, primer, and outlook on neural networks in astronomy", "abstract": "In recent years, deep learning has infiltrated every field it has touched, reducing the need for specialist knowledge and @@ -1022,15 +1320,40 @@ interactions: data to train the foundation model, and in turn the foundation model is used to advance astronomical research.", "venue": "ArXiv", "year": 2022, "referenceCount": 266, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2022-11-07", "journal": - {"volume": "abs/2211.03796", "name": "ArXiv"}, "authors": [{"authorId": "145618949", - "name": "Michael J. Smith"}, {"authorId": "2308961", "name": "J. Geach"}]}, - {"paperId": "ba2eef273f7bdb0993c12ff382f9e9530cde606e", "externalIds": {"DBLP": - "journals/corr/abs-2211-01036", "ArXiv": "2211.01036", "DOI": "10.1109/OJCOMS.2022.3215676", - "CorpusId": 253255371}, "url": "https://www.semanticscholar.org/paper/ba2eef273f7bdb0993c12ff382f9e9530cde606e", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-07", + "journal": {"volume": "abs/2211.03796", "name": "ArXiv"}, "authors": [{"authorId": + "145618949", "name": "Michael J. Smith"}, {"authorId": "2308961", "name": + "J. Geach"}]}, {"paperId": "08c152c12d83088cadbbf767a145e7cf2ff811d7", "externalIds": + {"DOI": "10.5604/01.3001.0016.0800", "CorpusId": 254915443}, "corpusId": 254915443, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/08c152c12d83088cadbbf767a145e7cf2ff811d7", + "title": "Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation + Techniques and Future Directions", "abstract": "Cybersecurity has benefitted + from Artificial Intelligence (AI) technologies for attack detection. However, + recent advances in AI techniques, in tandem with their misuse, have outpaced + parallel advancements in cyberattack classification methods that have been + achieved through academic and industry-led efforts. We describe the shift + in the evolution of AI techniques, and we show how recent AI approaches are + effective in helping an adversary attain his/her objectives appertaining to + cyberattacks. We also discuss how the current architecture of computer communications + enables the development of AI-based adversarial threats against heterogeneous + computing platforms and infrastructures.\n\n", "venue": "Applied Cybersecurity + & Internet Governance", "year": 2022, "referenceCount": 64, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-11-04", + "journal": {"name": "Applied Cybersecurity & Internet Governance"}, "authors": + [{"authorId": "2781746", "name": "Erwin Adi"}, {"authorId": "1752606", "name": + "Z. Baig"}, {"authorId": "1706796", "name": "S. Zeadally"}]}, {"paperId": + "ba2eef273f7bdb0993c12ff382f9e9530cde606e", "externalIds": {"DBLP": "journals/corr/abs-2211-01036", + "ArXiv": "2211.01036", "DOI": "10.1109/OJCOMS.2022.3215676", "CorpusId": 253255371}, + "corpusId": 253255371, "publicationVenue": {"id": "fbbafe0e-5e14-431f-9456-f569300a37cb", + "name": "IEEE Open Journal of the Communications Society", "type": "journal", + "alternate_names": ["IEEE Open J Commun Soc"], "issn": "2644-125X", "url": + "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8782661"}, "url": + "https://www.semanticscholar.org/paper/ba2eef273f7bdb0993c12ff382f9e9530cde606e", "title": "Explainable AI Over the Internet of Things (IoT): Overview, State-of-the-Art and Future Directions", "abstract": "Explainable Artificial Intelligence (XAI) is transforming the field of Artificial Intelligence (AI) by enhancing the @@ -1050,7 +1373,8 @@ interactions: development of XAI-based frameworks tailored for the demands of future IoT use cases.", "venue": "IEEE Open Journal of the Communications Society", "year": 2022, "referenceCount": 208, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/8782661/8901158/09930971.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-11-02", "journal": {"volume": "3", "pages": @@ -1061,7 +1385,11 @@ interactions: "2189500017", "name": "Chunmei Xu"}, {"authorId": "2156123228", "name": "Zhaoyang Zhang"}]}, {"paperId": "3ea8947306f7990277fd66e6a9eca3ba2efe60ee", "externalIds": {"PubMedCentral": "9668059", "DOI": "10.3389/frai.2022.1015418", "CorpusId": - 253248424, "PubMed": "36406470"}, "url": "https://www.semanticscholar.org/paper/3ea8947306f7990277fd66e6a9eca3ba2efe60ee", + 253248424, "PubMed": "36406470"}, "corpusId": 253248424, "publicationVenue": + {"id": "6a8c0041-d0b7-4e32-b52c-33adef005c7e", "name": "Frontiers in Artificial + Intelligence", "alternate_names": ["Front Artif Intell"], "issn": "2624-8212", + "url": "https://www.frontiersin.org/journals/artificial-intelligence#"}, "url": + "https://www.semanticscholar.org/paper/3ea8947306f7990277fd66e6a9eca3ba2efe60ee", "title": "Knowledge and attitudes of medical students in Lebanon toward artificial intelligence: A national survey study", "abstract": "Purpose This study assesses the knowledge and attitudes of medical students in Lebanon toward Artificial @@ -1084,16 +1412,22 @@ interactions: will in turn increase acceptance of AI as a tool in medical education, thus unlocking its potential in revolutionizing medical education.", "venue": "Frontiers in Artificial Intelligence", "year": 2022, "referenceCount": 17, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}, {"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2022-11-02", "journal": {"volume": "5", "name": "Frontiers in Artificial - Intelligence"}, "authors": [{"authorId": "2161995683", "name": "George Doumat"}, - {"authorId": "2114932610", "name": "Darine Daher"}, {"authorId": "1844338348", - "name": "Nadim N Ghanem"}, {"authorId": "5735112", "name": "Beatrice Khater"}]}, - {"paperId": "b5fe4cd533bdbbe877341040c6323bc4beea3610", "externalIds": {"DBLP": - "journals/cim/LiWDW22", "DOI": "10.1109/MCI.2022.3199622", "CorpusId": 253423814}, + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/frai.2022.1015418/pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2022-11-02", "journal": + {"volume": "5", "name": "Frontiers in Artificial Intelligence"}, "authors": + [{"authorId": "2161995683", "name": "George Doumat"}, {"authorId": "2114932610", + "name": "Darine Daher"}, {"authorId": "1844338348", "name": "Nadim N Ghanem"}, + {"authorId": "5735112", "name": "Beatrice Khater"}]}, {"paperId": "b5fe4cd533bdbbe877341040c6323bc4beea3610", + "externalIds": {"DBLP": "journals/cim/LiWDW22", "DOI": "10.1109/MCI.2022.3199622", + "CorpusId": 253423814}, "corpusId": 253423814, "publicationVenue": {"id": + "ee372de7-efda-4907-a03f-359292ea27f6", "name": "IEEE Computational Intelligence + Magazine", "type": "journal", "alternate_names": ["IEEE Comput Intell Mag"], + "issn": "1556-603X", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=10207", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10207"]}, "url": "https://www.semanticscholar.org/paper/b5fe4cd533bdbbe877341040c6323bc4beea3610", "title": "Meta-Learning for Fast and Privacy-Preserving Source Knowledge Transfer of EEG-Based BCIs", "abstract": "Electroencephalogram (EEG) based brain-computer @@ -1110,16 +1444,22 @@ interactions: that MDMAML outperformed several classical and state-of-the-art approaches in both online and offline applications.", "venue": "IEEE Computational Intelligence Magazine", "year": 2022, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-11-01", "journal": {"volume": "17", "pages": "16-26", - "name": "IEEE Computational Intelligence Magazine"}, "authors": [{"authorId": - "2190390548", "name": "Siyang Li"}, {"authorId": "2174480297", "name": "Huanyu - Wu"}, {"authorId": "2408345", "name": "L. Ding"}, {"authorId": "144855927", - "name": "Dongrui Wu"}]}, {"paperId": "7f28580f76bddbc65dc8871fd84d16bd7a164e63", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-11-01", "journal": + {"volume": "17", "pages": "16-26", "name": "IEEE Computational Intelligence + Magazine"}, "authors": [{"authorId": "2190390548", "name": "Siyang Li"}, {"authorId": + "2174480297", "name": "Huanyu Wu"}, {"authorId": "2408345", "name": "L. Ding"}, + {"authorId": "144855927", "name": "Dongrui Wu"}]}, {"paperId": "7f28580f76bddbc65dc8871fd84d16bd7a164e63", "externalIds": {"PubMedCentral": "9658699", "DBLP": "journals/sensors/FreitasPFFRL22", "DOI": "10.3390/s22218531", "CorpusId": 253413747, "PubMed": "36366227"}, + "corpusId": 253413747, "publicationVenue": {"id": "3dbf084c-ef47-4b74-9919-047b40704538", + "name": "Italian National Conference on Sensors", "type": "conference", "alternate_names": + ["SENSORS", "IEEE Sens", "Ital National Conf Sens", "IEEE Sensors", "Sensors"], + "issn": "1424-8220", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-142001", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-142001", + "http://www.mdpi.com/journal/sensors", "https://www.mdpi.com/journal/sensors"]}, "url": "https://www.semanticscholar.org/paper/7f28580f76bddbc65dc8871fd84d16bd7a164e63", "title": "Artificial Intelligence of Things Applied to Assistive Technology: A Systematic Literature Review", "abstract": "According to the World Health @@ -1142,19 +1482,22 @@ interactions: vision. Portable devices, wearables, and smartphones constitute the majority of IoT devices. Deep neural networks represent 81% of the machine-learning models applied in the reviewed research.", "venue": "Italian National Conference - on Sensors", "year": 2022, "referenceCount": 106, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2022-11-01", "journal": {"volume": "22", "name": "Sensors - (Basel, Switzerland)"}, "authors": [{"authorId": "2191399671", "name": "Maur\u00edcio - Pasetto de Freitas"}, {"authorId": "2190244052", "name": "Vin\u00edcius Aquino - Piai"}, {"authorId": "147900609", "name": "Ricardo Heffel Farias"}, {"authorId": - "50982086", "name": "Anita M. R. Fernandes"}, {"authorId": "1707339", "name": - "A. Rossetto"}, {"authorId": "1693868", "name": "V. Leithardt"}]}, {"paperId": - "eca279695fd5bc6d05ed35a4b6fc2c5ec89975d8", "externalIds": {"DOI": "10.22201/fesa.26832917e.2022.4.1.243", - "CorpusId": 253334513}, "url": "https://www.semanticscholar.org/paper/eca279695fd5bc6d05ed35a4b6fc2c5ec89975d8", + on Sensors", "year": 2022, "referenceCount": 106, "citationCount": 1, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1424-8220/22/21/8531/pdf?version=1667898967", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-11-01", + "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": + [{"authorId": "2191399671", "name": "Maur\u00edcio Pasetto de Freitas"}, {"authorId": + "2190244052", "name": "Vin\u00edcius Aquino Piai"}, {"authorId": "147900609", + "name": "Ricardo Heffel Farias"}, {"authorId": "50982086", "name": "Anita + M. R. Fernandes"}, {"authorId": "1707339", "name": "A. Rossetto"}, {"authorId": + "1693868", "name": "V. Leithardt"}]}, {"paperId": "eca279695fd5bc6d05ed35a4b6fc2c5ec89975d8", + "externalIds": {"DOI": "10.22201/fesa.26832917e.2022.4.1.243", "CorpusId": + 253334513}, "corpusId": 253334513, "publicationVenue": {"id": "166402f5-19c0-41bf-88b3-78f17424cd59", + "name": "FIGURAS REVISTA ACAD\u00c9MICA DE INVESTIGACI\u00d3N", "alternate_names": + ["FIG REV ACAD\u00c9MICA INVESTIG"], "issn": "2683-2917"}, "url": "https://www.semanticscholar.org/paper/eca279695fd5bc6d05ed35a4b6fc2c5ec89975d8", "title": "Inteligencia artificial en educaci\u00f3n: De usuarios pasivos a creadores cr\u00edticos", "abstract": "La inteligencia artificial (IA) se ha convertido en un lugar com\u00fan en nuestras vidas. Nos sorprende poco. @@ -1175,48 +1518,62 @@ interactions: instituciones educativas, en general, deben alistarse para adoptarlo de manera cr\u00edtica. \n\u00a0", "venue": "FIGURAS REVISTA ACAD\u00c9MICA DE INVESTIGACI\u00d3N", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistafiguras.acatlan.unam.mx/index.php/figuras/article/download/243/551", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-11-01", "journal": {"name": "FIGURAS REVISTA ACAD\u00c9MICA DE INVESTIGACI\u00d3N"}, "authors": [{"authorId": "2096228319", "name": "MariCarmen Gonz\u00e1lez-Videgaray"}, {"authorId": "2098481870", "name": "R. Romero-Ruiz"}]}, {"paperId": "39de1a4267a297116d5c317f75c8ebb0eab3a186", "externalIds": {"PubMedCentral": "9628381", "DOI": "10.1007/s44163-022-00037-1", - "CorpusId": 253240565}, "url": "https://www.semanticscholar.org/paper/39de1a4267a297116d5c317f75c8ebb0eab3a186", + "CorpusId": 253240565}, "corpusId": 253240565, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/39de1a4267a297116d5c317f75c8ebb0eab3a186", "title": "ERP Staff versus AI recruitment with employment real-time big data", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s44163-022-00037-1.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-31", "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": "2922792", "name": "K. Strang"}, {"authorId": "2118548137", "name": "Zhaohao Sun"}]}, {"paperId": "bdfcc87264808446152972591e66777c0c69f837", - "externalIds": {"DOI": "10.1111/ejed.12533", "CorpusId": 253329319}, "url": - "https://www.semanticscholar.org/paper/bdfcc87264808446152972591e66777c0c69f837", + "externalIds": {"DOI": "10.1111/ejed.12533", "CorpusId": 253329319}, "corpusId": + 253329319, "publicationVenue": {"id": "7da1ea4f-e21b-4b6f-b0bc-790a838fbd78", + "name": "European Journal of Education", "type": "journal", "alternate_names": + ["Eur J Educ"], "issn": "2601-8616", "alternate_issns": ["0141-8211"], "url": + "http://journals.euser.org/index.php/ejed", "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1465-3435", + "http://www.jstor.org/journals/01418211.html", "https://www.jstor.org/journal/eurojeduc"]}, + "url": "https://www.semanticscholar.org/paper/bdfcc87264808446152972591e66777c0c69f837", "title": "State of the art and practice in\n AI\n in education", "abstract": null, "venue": "European Journal of Education", "year": 2022, "referenceCount": - 60, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-30", + 60, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://discovery.ucl.ac.uk/10158374/1/Holmes%20and%20Tuomi%20-%202022%20-%20State%20of%20the%20art%20and%20practice%20in%20AI%20in%20education.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-30", "journal": {"name": "European Journal of Education"}, "authors": [{"authorId": "49042683", "name": "W. Holmes"}, {"authorId": "3251136", "name": "I. Tuomi"}]}, {"paperId": "2bda96a5254eb26a77e20f71c071c00672ce65c2", "externalIds": {"DBLP": "journals/mima/TownsendPANCCHT22", "DOI": "10.1007/s11023-022-09614-w", "CorpusId": - 249246138}, "url": "https://www.semanticscholar.org/paper/2bda96a5254eb26a77e20f71c071c00672ce65c2", + 249246138}, "corpusId": 249246138, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/2bda96a5254eb26a77e20f71c071c00672ce65c2", "title": "From Pluralistic Normative Principles to Autonomous-Agent Rules", "abstract": null, "venue": "Minds and Machines", "year": 2022, "referenceCount": 101, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-29", "journal": - {"volume": "32", "pages": "683 - 715", "name": "Minds and Machines"}, "authors": - [{"authorId": "120487341", "name": "B. Townsend"}, {"authorId": "97942021", - "name": "Colin Paterson"}, {"authorId": "2143958636", "name": "T. Arvind"}, - {"authorId": "2084422298", "name": "G. Nemirovsky"}, {"authorId": "143665272", - "name": "R. Calinescu"}, {"authorId": "2167349034", "name": "Ana Cavalcanti"}, - {"authorId": "2512463", "name": "I. Habli"}, {"authorId": "2167378744", "name": - "Alan Thomas"}]}, {"paperId": "1cd43fed1ac5b95f7c9296420fb23e7fea66842e", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11023-022-09614-w.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Law", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-10-29", "journal": {"volume": "32", "pages": "683 - 715", "name": "Minds + and Machines"}, "authors": [{"authorId": "120487341", "name": "B. Townsend"}, + {"authorId": "97942021", "name": "Colin Paterson"}, {"authorId": "2143958636", + "name": "T. Arvind"}, {"authorId": "2084422298", "name": "G. Nemirovsky"}, + {"authorId": "143665272", "name": "R. Calinescu"}, {"authorId": "2167349034", + "name": "Ana Cavalcanti"}, {"authorId": "2512463", "name": "I. Habli"}, {"authorId": + "2167378744", "name": "Alan Thomas"}]}, {"paperId": "1cd43fed1ac5b95f7c9296420fb23e7fea66842e", "externalIds": {"DOI": "10.32466/eufv-rel.2022.9.754.170-186", "CorpusId": - 253213406}, "url": "https://www.semanticscholar.org/paper/1cd43fed1ac5b95f7c9296420fb23e7fea66842e", + 253213406}, "corpusId": 253213406, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1cd43fed1ac5b95f7c9296420fb23e7fea66842e", "title": "Cuidado de personas dependientes. \u00bfPuede realizarlo un robot?", "abstract": "El cuidado de personas dependientes ha sido algo propio y radical del ser humano desde sus or\u00edgenes y raramente se plantea un escenario @@ -1227,14 +1584,18 @@ interactions: la persona que cuida y la persona que es cuidada.", "venue": "Relectiones. Revista interdisciplinar de filosof\u00eda y humanidades.", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, - "publicationDate": "2022-10-28", "journal": {"name": "Relectiones. Revista + true, "openAccessPdf": {"url": "https://portalderevistas.ufv.es/index.php/relectiones/article/download/754/791", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2022-10-28", "journal": {"name": "Relectiones. Revista interdisciplinar de filosof\u00eda y humanidades."}, "authors": [{"authorId": - "2189259518", "name": "Jose Miguel Mohedano Mart\u00ednez"}, {"authorId": + "2189259518", "name": "Jos\u00e9 Miguel Mohedano Mart\u00ednez"}, {"authorId": "2189261240", "name": "Luis Moreno Almonacid"}, {"authorId": "2189259752", "name": "Mary Luz Mouronte"}, {"authorId": "2189261238", "name": "Susana Bautista Blasco"}]}, {"paperId": "c0acc6ce5a3f6c416c9f6025f91b8222f709db9c", "externalIds": - {"DOI": "10.35712/aig.v3.i4.96", "CorpusId": 253212257}, "url": "https://www.semanticscholar.org/paper/c0acc6ce5a3f6c416c9f6025f91b8222f709db9c", + {"DOI": "10.35712/aig.v3.i4.96", "CorpusId": 253212257}, "corpusId": 253212257, + "publicationVenue": {"id": "0d2e3833-1d23-429d-a0fe-a88c347eaa73", "name": + "Artificial Intelligence in Gastroenterology", "type": "journal", "alternate_names": + ["Artif Intell Gastroenterol"], "issn": "2644-3236"}, "url": "https://www.semanticscholar.org/paper/c0acc6ce5a3f6c416c9f6025f91b8222f709db9c", "title": "Role of artificial intelligence in the diagnosis and treatment of hepatocellular carcinoma", "abstract": "Artificial intelligence (AI) evolved many years ago, but it gained much advancement in recent years for its use @@ -1262,14 +1623,17 @@ interactions: of such approaches, along with their associated potencies and constraints.", "venue": "Artificial Intelligence in Gastroenterology", "year": 2022, "referenceCount": 71, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-10-28", "journal": {"name": "Artificial Intelligence + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Medicine", "source": + "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-10-28", "journal": {"name": "Artificial Intelligence in Gastroenterology"}, "authors": [{"authorId": "2189259501", "name": "Rajesh Kumar Mokhria"}, {"authorId": "145663820", "name": "Jasbir Singh"}]}, {"paperId": "e813e57d124a2740868fe9aeb2f04ac2659db78a", "externalIds": {"DBLP": "conf/ialp/XuTH22", - "DOI": "10.1109/IALP57159.2022.9961260", "CorpusId": 254155486}, "url": "https://www.semanticscholar.org/paper/e813e57d124a2740868fe9aeb2f04ac2659db78a", + "DOI": "10.1109/IALP57159.2022.9961260", "CorpusId": 254155486}, "corpusId": + 254155486, "publicationVenue": {"id": "a75536df-9055-4810-aca7-99392f95641e", + "name": "International Conference on Asian Language Processing", "type": "conference", + "alternate_names": ["Int Conf Asian Lang Process", "IALP"]}, "url": "https://www.semanticscholar.org/paper/e813e57d124a2740868fe9aeb2f04ac2659db78a", "title": "A Survey of Machine Reading Comprehension Methods", "abstract": "With the gradual maturity of deep learning technol-ogy, machine reading comprehension in natural language processing has become a popular research direction. Its @@ -1287,16 +1651,17 @@ interactions: trend of machine reading comprehension is prospected.", "venue": "International Conference on Asian Language Processing", "year": 2022, "referenceCount": 58, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], - "publicationDate": "2022-10-27", "journal": {"pages": "312-317", "name": "2022 - International Conference on Asian Language Processing (IALP)"}, "authors": - [{"authorId": "2155346140", "name": "Xiaobo Xu"}, {"authorId": "2044853", - "name": "Turdi Tohti"}, {"authorId": "50075755", "name": "A. Hamdulla"}]}, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference", "Review"], "publicationDate": "2022-10-27", "journal": {"pages": + "312-317", "name": "2022 International Conference on Asian Language Processing + (IALP)"}, "authors": [{"authorId": "2155346140", "name": "Xiaobo Xu"}, {"authorId": + "2044853", "name": "Turdi Tohti"}, {"authorId": "50075755", "name": "A. Hamdulla"}]}, {"paperId": "f67e3225d115bcf02dfb0e26c64ea3eb8285de7b", "externalIds": {"DBLP": "journals/corr/abs-2210-15767", "ArXiv": "2210.15767", "DOI": "10.48550/arXiv.2210.15767", - "CorpusId": 253224068}, "url": "https://www.semanticscholar.org/paper/f67e3225d115bcf02dfb0e26c64ea3eb8285de7b", + "CorpusId": 253224068}, "corpusId": 253224068, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f67e3225d115bcf02dfb0e26c64ea3eb8285de7b", "title": "Gathering Strength, Gathering Storms: The One Hundred Year Study on Artificial Intelligence (AI100) 2021 Study Panel Report", "abstract": "In the five years since we released the first AI100 report, much has been written @@ -1309,25 +1674,26 @@ interactions: the field of AI and provide an \u201cinsider\u2019s\u201d perspective. Second, it is a longitudinal study, with reports by such Study Panels planned once every five years, for at least one hundred years. SEPTEMBER 2021", "venue": - "ArXiv", "year": 2022, "referenceCount": 54, "citationCount": 21, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-10-27", "journal": {"volume": "abs/2210.15767", "name": "ArXiv"}, "authors": - [{"authorId": "144885169", "name": "M. Littman"}, {"authorId": "1562750490", - "name": "Ifeoma Ajunwa"}, {"authorId": "49700022", "name": "G. Berger"}, {"authorId": - "145646162", "name": "Craig Boutilier"}, {"authorId": "7259268", "name": "Morgan - E. Currie"}, {"authorId": "1388372395", "name": "Finale Doshi-Velez"}, {"authorId": - "40051700", "name": "Gillian K. Hadfield"}, {"authorId": "49148918", "name": - "Michael C. Horowitz"}, {"authorId": "2065138119", "name": "Charles Isbell"}, - {"authorId": "48078689", "name": "H. Kitano"}, {"authorId": "144463523", "name": - "K. Levy"}, {"authorId": "66766071", "name": "Terah Lyons"}, {"authorId": - "144380037", "name": "Melanie Mitchell"}, {"authorId": "143873972", "name": - "J. Shah"}, {"authorId": "2404363", "name": "S. Sloman"}, {"authorId": "1817942", - "name": "Shannon Vallor"}, {"authorId": "1733716", "name": "T. Walsh"}]}, - {"paperId": "fe123b27a3ecc63c7087cb0d3a04e43790661c2d", "externalIds": {"ArXiv": - "2210.15629", "DBLP": "journals/corr/abs-2210-15629", "DOI": "10.48550/arXiv.2210.15629", - "CorpusId": 253157363}, "url": "https://www.semanticscholar.org/paper/fe123b27a3ecc63c7087cb0d3a04e43790661c2d", + "ArXiv", "year": 2022, "referenceCount": 54, "citationCount": 23, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-10-27", "journal": {"volume": + "abs/2210.15767", "name": "ArXiv"}, "authors": [{"authorId": "144885169", + "name": "M. Littman"}, {"authorId": "1562750490", "name": "Ifeoma Ajunwa"}, + {"authorId": "49700022", "name": "G. Berger"}, {"authorId": "145646162", "name": + "Craig Boutilier"}, {"authorId": "7259268", "name": "Morgan E. Currie"}, {"authorId": + "1388372395", "name": "Finale Doshi-Velez"}, {"authorId": "40051700", "name": + "Gillian K. Hadfield"}, {"authorId": "49148918", "name": "Michael C. Horowitz"}, + {"authorId": "2065138119", "name": "Charles Isbell"}, {"authorId": "48078689", + "name": "H. Kitano"}, {"authorId": "144463523", "name": "K. Levy"}, {"authorId": + "66766071", "name": "Terah Lyons"}, {"authorId": "144380037", "name": "Melanie + Mitchell"}, {"authorId": "143873972", "name": "J. Shah"}, {"authorId": "2404363", + "name": "S. Sloman"}, {"authorId": "1817942", "name": "Shannon Vallor"}, {"authorId": + "1733716", "name": "T. Walsh"}]}, {"paperId": "fe123b27a3ecc63c7087cb0d3a04e43790661c2d", + "externalIds": {"ArXiv": "2210.15629", "DBLP": "journals/corr/abs-2210-15629", + "DOI": "10.48550/arXiv.2210.15629", "CorpusId": 253157363}, "corpusId": 253157363, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fe123b27a3ecc63c7087cb0d3a04e43790661c2d", "title": "LAD: Language Augmented Diffusion for Reinforcement Learning", "abstract": "Learning skills from language provides a powerful avenue for generalization in reinforcement learning, although it remains a challenging task as it requires @@ -1340,26 +1706,32 @@ interactions: to the best performance of 76%. We also conduct an analysis on the properties of language conditioned diffusion in reinforcement learning.", "venue": "ArXiv", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-10-27", "journal": {"volume": "abs/2210.15629", "name": - "ArXiv"}, "authors": [{"authorId": "6549913", "name": "Edwin Zhang"}, {"authorId": - "47006228", "name": "Yujie Lu"}, {"authorId": "2187907974", "name": "W. Wang"}, - {"authorId": "2111672235", "name": "Amy Zhang"}]}, {"paperId": "9de73186a4a04179c6012bcbe555a4a795f93396", - "externalIds": {"PubMedCentral": "9607774", "DOI": "10.1007/s10614-022-10333-8", - "CorpusId": 253165300, "PubMed": "36321065"}, "url": "https://www.semanticscholar.org/paper/9de73186a4a04179c6012bcbe555a4a795f93396", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-27", "journal": + {"volume": "abs/2210.15629", "name": "ArXiv"}, "authors": [{"authorId": "6549913", + "name": "Edwin Zhang"}, {"authorId": "47006228", "name": "Yujie Lu"}, {"authorId": + "2187907974", "name": "W. Wang"}, {"authorId": "2111672235", "name": "Amy + Zhang"}]}, {"paperId": "9de73186a4a04179c6012bcbe555a4a795f93396", "externalIds": + {"PubMedCentral": "9607774", "DOI": "10.1007/s10614-022-10333-8", "CorpusId": + 253165300, "PubMed": "36321065"}, "corpusId": 253165300, "publicationVenue": + {"id": "94b5909e-18e0-4cac-9e9d-731ff1c58823", "name": "Computational Economics", + "type": "journal", "alternate_names": ["Comput Econ"], "issn": "0927-7099", + "url": "https://link.springer.com/journal/10614"}, "url": "https://www.semanticscholar.org/paper/9de73186a4a04179c6012bcbe555a4a795f93396", "title": "Application of Supervised Machine Learning Techniques to Forecast the COVID-19 U.S. Recession and Stock Market Crash", "abstract": null, "venue": "Computational Economics", "year": 2022, "referenceCount": 94, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-10-26", "journal": {"pages": "1 - 25", "name": "Computational - Economics"}, "authors": [{"authorId": "1977212", "name": "Rama K. Malladi"}]}, - {"paperId": "cf0ae306a5b485fbf391b60d026f75e008115500", "externalIds": {"ArXiv": - "2210.16987", "DBLP": "journals/corr/abs-2210-16987", "DOI": "10.48550/arXiv.2210.16987", - "CorpusId": 253237809}, "url": "https://www.semanticscholar.org/paper/cf0ae306a5b485fbf391b60d026f75e008115500", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s10614-022-10333-8.pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-26", "journal": + {"pages": "1 - 25", "name": "Computational Economics"}, "authors": [{"authorId": + "1977212", "name": "Rama K. Malladi"}]}, {"paperId": "cf0ae306a5b485fbf391b60d026f75e008115500", + "externalIds": {"ArXiv": "2210.16987", "DBLP": "journals/corr/abs-2210-16987", + "DOI": "10.48550/arXiv.2210.16987", "CorpusId": 253237809}, "corpusId": 253237809, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cf0ae306a5b485fbf391b60d026f75e008115500", "title": "Symbolic Distillation for Learned TCP Congestion Control", "abstract": "Recent advances in TCP congestion control (CC) have achieved tremendous success with deep reinforcement learning (RL) approaches, which use feedforward neural @@ -1379,17 +1751,18 @@ interactions: our distilled symbolic rules on both simulation and emulation environments. Our code is available at https://github.com/VITA-Group/SymbolicPCC .", "venue": "ArXiv", "year": 2022, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-10-24", "journal": {"volume": "abs/2210.16987", "name": - "ArXiv"}, "authors": [{"authorId": "2005814581", "name": "S. Sharan"}, {"authorId": - "2152934619", "name": "Wenqing Zheng"}, {"authorId": "152764944", "name": - "Kuo-Feng Hsu"}, {"authorId": "40862349", "name": "Jiarong Xing"}, {"authorId": - "30894196", "name": "Ang Chen"}, {"authorId": "2969311", "name": "Zhangyang - Wang"}]}, {"paperId": "764a616937a5923aaf22288b35f6b991ae41521d", "externalIds": - {"ArXiv": "2210.13304", "DBLP": "journals/corr/abs-2210-13304", "DOI": "10.48550/arXiv.2210.13304", - "CorpusId": 253098627}, "url": "https://www.semanticscholar.org/paper/764a616937a5923aaf22288b35f6b991ae41521d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-24", "journal": + {"volume": "abs/2210.16987", "name": "ArXiv"}, "authors": [{"authorId": "2005814581", + "name": "S. Sharan"}, {"authorId": "2152934619", "name": "Wenqing Zheng"}, + {"authorId": "152764944", "name": "Kuo-Feng Hsu"}, {"authorId": "40862349", + "name": "Jiarong Xing"}, {"authorId": "30894196", "name": "Ang Chen"}, {"authorId": + "2969311", "name": "Zhangyang Wang"}]}, {"paperId": "764a616937a5923aaf22288b35f6b991ae41521d", + "externalIds": {"ArXiv": "2210.13304", "DBLP": "journals/corr/abs-2210-13304", + "DOI": "10.48550/arXiv.2210.13304", "CorpusId": 253098627}, "corpusId": 253098627, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/764a616937a5923aaf22288b35f6b991ae41521d", "title": "ELMER: A Non-Autoregressive Pre-trained Language Model for Efficient and Effective Text Generation", "abstract": "We study the text generation task under the approach of pre-trained language models (PLMs). Typically, @@ -1409,16 +1782,55 @@ interactions: models and further narrows the performance gap with AR PLMs (e.g., ELMER (29.92) vs BART (30.61) ROUGE-L in XSUM) while achieving over 10 times inference speedup.", "venue": "ArXiv", "year": 2022, "referenceCount": 46, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-24", "journal": - {"volume": "abs/2210.13304", "name": "ArXiv"}, "authors": [{"authorId": "2018027", - "name": "Junyi Li"}, {"authorId": "1997234792", "name": "Tianyi Tang"}, {"authorId": - "2542603", "name": "Wayne Xin Zhao"}, {"authorId": "50204644", "name": "J. - Nie"}, {"authorId": "153693432", "name": "Ji-rong Wen"}]}, {"paperId": "b193281227cb093dc138e701d825a8a13d443a67", - "externalIds": {"ArXiv": "2210.11832", "DBLP": "journals/corr/abs-2210-11832", - "DOI": "10.48550/arXiv.2210.11832", "CorpusId": 253080782}, "url": "https://www.semanticscholar.org/paper/b193281227cb093dc138e701d825a8a13d443a67", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-10-24", "journal": {"volume": "abs/2210.13304", "name": "ArXiv"}, "authors": + [{"authorId": "2018027", "name": "Junyi Li"}, {"authorId": "1997234792", "name": + "Tianyi Tang"}, {"authorId": "2542603", "name": "Wayne Xin Zhao"}, {"authorId": + "50204644", "name": "J. Nie"}, {"authorId": "153693432", "name": "Ji-rong + Wen"}]}, {"paperId": "2e0c7f21b9d45d6a7eca0f14f220ce6715844fa2", "externalIds": + {"DOI": "10.1109/IROS47612.2022.9981671", "CorpusId": 255175309}, "corpusId": + 255175309, "publicationVenue": {"id": "37275deb-3fcf-4d16-ae77-95db9899b1f3", + "name": "IEEE/RJS International Conference on Intelligent RObots and Systems", + "type": "conference", "alternate_names": ["IROS", "Intelligent Robots and + Systems", "Intell Robot Syst", "IEEE/RJS Int Conf Intell Robot Syst"], "url": + "http://www.iros.org/"}, "url": "https://www.semanticscholar.org/paper/2e0c7f21b9d45d6a7eca0f14f220ce6715844fa2", + "title": "HRI Framework for Continual Learning in Face Recognition", "abstract": + "Recognizing human partners is an essential social skill for building personalized + and long-term human-robot interactions. However, robots deployed in complex, + real-world environments have to face several challenges, such as managing + unstructured interactions with multiple users, limited computational resources, + and intrinsic and continuous variability of their sensory evidence. To cope + with these challenges, we propose a framework to perform autonomous incremental + learning for open-set face recognition suitable for unconstrained HRI scenarios. + We validated the proposed framework in a real-world experiment, demonstrating + its suitability to let the robot autonomously interact with multiple people + while creating a labeled database of their faces across various encounters. + Furthermore, we evaluated how an off-the-shelf model performed with data gathered + from the HRI setting and proposed a fine-tuned model obtained with a transfer + learning technique. Analyses about automatic threshold determination and rehearsal + methods for memory sampling were also proposed. Our preliminary results suggest + that exploiting the first-hand robot''s experience could be crucial to ensure + better models'' performance and, therefore, could be advantageous for the + acceptance and effectiveness of social robots in the long run. With this work, + we aim to provide insights on continual learning approaches in the HRI field + to promote autonomous and personalized solutions meaningful for real-world + applications.", "venue": "IEEE/RJS International Conference on Intelligent + RObots and Systems", "year": 2022, "referenceCount": 26, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": + "2022-10-23", "journal": {"pages": "8226-8233", "name": "2022 IEEE/RSJ International + Conference on Intelligent Robots and Systems (IROS)"}, "authors": [{"authorId": + "1392700266", "name": "G. Belgiovine"}, {"authorId": "2198444971", "name": + "Jonas Gonzlez-Billandon"}, {"authorId": "1923910", "name": "A. Sciutti"}, + {"authorId": "1678909", "name": "G. Sandini"}, {"authorId": "143807743", "name": + "F. Rea"}]}, {"paperId": "b193281227cb093dc138e701d825a8a13d443a67", "externalIds": + {"ArXiv": "2210.11832", "DBLP": "journals/corr/abs-2210-11832", "DOI": "10.48550/arXiv.2210.11832", + "CorpusId": 253080782}, "corpusId": 253080782, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b193281227cb093dc138e701d825a8a13d443a67", "title": "AI-HRI Brings New Dimensions to Human-Aware Design for Human-Aware AI", "abstract": "Since the \ufb01rst AI-HRI held at the 2014 AAAI Fall Sym- posium Series, a lot of the presented research and discussions have emphasized @@ -1436,13 +1848,17 @@ interactions: think about human-aware AI, from observation through validation, to make even the algorithmic design process human-aware.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-10-21", "journal": {"volume": "abs/2210.11832", "name": "ArXiv"}, "authors": - [{"authorId": "50632846", "name": "R. Freedman"}]}, {"paperId": "319a56db82294e822d3b5f146751557da9260363", - "externalIds": {"DOI": "10.1163/19552343-14234031", "CorpusId": 253154269}, - "url": "https://www.semanticscholar.org/paper/319a56db82294e822d3b5f146751557da9260363", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-10-21", "journal": {"volume": "abs/2210.11832", "name": + "ArXiv"}, "authors": [{"authorId": "50632846", "name": "R. Freedman"}]}, {"paperId": + "319a56db82294e822d3b5f146751557da9260363", "externalIds": {"DOI": "10.1163/19552343-14234031", + "CorpusId": 253154269}, "corpusId": 253154269, "publicationVenue": {"id": + "ed594146-b2eb-4c60-8f94-98ed62f4eb9f", "name": "Revue de Synth\u00e8se", + "type": "journal", "alternate_names": ["Revue de synth\u00e8se", "Rev synth\u00e8se", + "Rev Synth\u00e8se"], "issn": "0035-1776", "url": "https://brill.com/rds", + "alternate_urls": ["http://synth.revuesonline.com/accueil.jsp"]}, "url": "https://www.semanticscholar.org/paper/319a56db82294e822d3b5f146751557da9260363", "title": "Comparer la logique et le droit? Quelques remarques th\u00e9oriques sur l\u2019usage du num\u00e9rique en droit (Tome 143, 7e S\u00e9rie, n\u00b0 3-4, (2022))", "abstract": "\n La num\u00e9risation actuelle du droit permet @@ -1462,11 +1878,16 @@ interactions: il reste une discipline dans laquelle la parole et le dialogue sont indispensables pour r\u00e9aliser les buts qu\u2019il s\u2019assigne.", "venue": "Revue de Synth\u00e8se", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2022-10-20", "journal": {"name": "Revue de Synth\u00e8se"}, - "authors": [{"authorId": "3351883", "name": "J. Lass\u00e8gue"}]}, {"paperId": - "e86976fbe9064d02ae5d011f440e51d8abea4ce3", "externalIds": {"DBLP": "conf/kse/TranLH22", - "DOI": "10.1109/KSE56063.2022.9953771", "CorpusId": 253785430}, "url": "https://www.semanticscholar.org/paper/e86976fbe9064d02ae5d011f440e51d8abea4ce3", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2022-10-20", "journal": + {"name": "Revue de Synth\u00e8se"}, "authors": [{"authorId": "3351883", "name": + "J. Lass\u00e8gue"}]}, {"paperId": "e86976fbe9064d02ae5d011f440e51d8abea4ce3", + "externalIds": {"DBLP": "conf/kse/TranLH22", "DOI": "10.1109/KSE56063.2022.9953771", + "CorpusId": 253785430}, "corpusId": 253785430, "publicationVenue": {"id": + "87ad3a52-6dd9-45bd-a0f2-f87453c491ed", "name": "International Conference + on Knowledge and Systems Engineering", "type": "conference", "alternate_names": + ["KSE", "Int Conf Knowl Syst Eng", "Knowledge and Systems Engineering", "Knowl + Syst Eng"], "url": "http://www.wikicfp.com/cfp/program?id=1922"}, "url": "https://www.semanticscholar.org/paper/e86976fbe9064d02ae5d011f440e51d8abea4ce3", "title": "Towards a Human-like Chatbot using Deep Adversarial Learning", "abstract": "Conversational agents are getting more popular and applied in a wide range of practical application areas. The main task of these agents is not only @@ -1485,16 +1906,17 @@ interactions: more natural and accurate responses, yielding significant gains in BLEU scores.", "venue": "International Conference on Knowledge and Systems Engineering", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2022-10-19", "journal": {"pages": "1-5", - "name": "2022 14th International Conference on Knowledge and Systems Engineering - (KSE)"}, "authors": [{"authorId": "2128128313", "name": "Quoc-Dai Luong Tran"}, - {"authorId": "1788292", "name": "Anh-Cuong Le"}, {"authorId": "144957865", - "name": "V. Huynh"}]}, {"paperId": "5c02d55fe14e2baf4b6b59a476ee6a20698397ef", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-10-19", + "journal": {"pages": "1-5", "name": "2022 14th International Conference on + Knowledge and Systems Engineering (KSE)"}, "authors": [{"authorId": "2128128313", + "name": "Quoc-Dai Luong Tran"}, {"authorId": "1788292", "name": "Anh-Cuong + Le"}, {"authorId": "144957865", "name": "V. Huynh"}]}, {"paperId": "5c02d55fe14e2baf4b6b59a476ee6a20698397ef", "externalIds": {"ArXiv": "2210.10684", "DBLP": "journals/corr/abs-2210-10684", - "DOI": "10.48550/arXiv.2210.10684", "CorpusId": 252992616}, "url": "https://www.semanticscholar.org/paper/5c02d55fe14e2baf4b6b59a476ee6a20698397ef", + "DOI": "10.48550/arXiv.2210.10684", "CorpusId": 252992616}, "corpusId": 252992616, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c02d55fe14e2baf4b6b59a476ee6a20698397ef", "title": "Language Models Understand Us, Poorly", "abstract": "Some claim language models understand us. Others won\u2019t hear it. To clarify, I investigate three views of human language understanding : as-mapping , as-reliability @@ -1508,23 +1930,29 @@ interactions: work which probes model internals, adds more of human language, and measures what models can learn (\u00a76).", "venue": "ArXiv", "year": 2022, "referenceCount": 80, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-10-19", - "journal": {"volume": "abs/2210.10684", "name": "ArXiv"}, "authors": [{"authorId": - "2108562363", "name": "Jared Moore"}]}, {"paperId": "f4caeee685c40289c3fa92c609abbf0e387977b8", - "externalIds": {"DOI": "10.1007/s13347-022-00591-7", "CorpusId": 252973149}, - "url": "https://www.semanticscholar.org/paper/f4caeee685c40289c3fa92c609abbf0e387977b8", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2022-10-19", "journal": {"volume": "abs/2210.10684", "name": + "ArXiv"}, "authors": [{"authorId": "2108562363", "name": "Jared Moore"}]}, + {"paperId": "f4caeee685c40289c3fa92c609abbf0e387977b8", "externalIds": {"DOI": + "10.1007/s13347-022-00591-7", "CorpusId": 252973149}, "corpusId": 252973149, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f4caeee685c40289c3fa92c609abbf0e387977b8", "title": "To Each Technology Its Own Ethics: The Problem of Ethical Proliferation", "abstract": null, "venue": "Philosophy & Technology", "year": 2022, "referenceCount": 95, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-18", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13347-022-00591-7.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-18", "journal": {"volume": "35", "name": "Philosophy & Technology"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}, {"authorId": "144338643", "name": "J. Danaher"}]}, {"paperId": "54b2b6fd3c297d39881a89d497af6fe5c46fa25c", "externalIds": {"PubMedCentral": "9588382", "DOI": "10.1155/2022/4509394", - "CorpusId": 252951830, "PubMed": "36285284"}, "url": "https://www.semanticscholar.org/paper/54b2b6fd3c297d39881a89d497af6fe5c46fa25c", + "CorpusId": 252951830, "PubMed": "36285284"}, "corpusId": 252951830, "publicationVenue": + {"id": "2ca1e2ac-8c3b-4251-94ed-24846d391d3b", "name": "Computational and + Mathematical Methods in Medicine", "type": "journal", "alternate_names": ["Comput + Math Method Med"], "issn": "1748-670X", "url": "https://www.hindawi.com/journals/cmmm/"}, + "url": "https://www.semanticscholar.org/paper/54b2b6fd3c297d39881a89d497af6fe5c46fa25c", "title": "Deep Transfer Learning for COVID-19 Detection and Lesion Recognition Using Chest CT Images", "abstract": "Starting from December 2019, the global pandemic of coronavirus disease 2019 (COVID-19) is continuously expanding @@ -1552,14 +1980,17 @@ interactions: tool can be used by radiologist to diagnose COVID-19 more accurately and efficiently.", "venue": "Computational and Mathematical Methods in Medicine", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-15", "journal": - {"volume": "2022", "name": "Computational and Mathematical Methods in Medicine"}, - "authors": [{"authorId": "2107951143", "name": "Sai Zhang"}, {"authorId": - "2187974237", "name": "Guo-Chang Yuan"}]}, {"paperId": "997890a72011affaff95ff8e6a22ad0c370cf366", - "externalIds": {"ArXiv": "2210.08340", "DBLP": "journals/corr/abs-2210-08340", - "DOI": "10.48550/arXiv.2210.08340", "CorpusId": 252917719}, "url": "https://www.semanticscholar.org/paper/997890a72011affaff95ff8e6a22ad0c370cf366", + true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/cmmm/2022/4509394.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-10-15", "journal": {"volume": "2022", "name": "Computational and Mathematical + Methods in Medicine"}, "authors": [{"authorId": "2107951143", "name": "Sai + Zhang"}, {"authorId": "2187974237", "name": "Guo-Chang Yuan"}]}, {"paperId": + "997890a72011affaff95ff8e6a22ad0c370cf366", "externalIds": {"ArXiv": "2210.08340", + "DBLP": "journals/corr/abs-2210-08340", "DOI": "10.48550/arXiv.2210.08340", + "CorpusId": 252917719}, "corpusId": 252917719, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/997890a72011affaff95ff8e6a22ad0c370cf366", "title": "Toward Next-Generation Artificial Intelligence: Catalyzing the NeuroAI Revolution", "abstract": ": Neuroscience has long been an important driver of progress in artificial intelligence (AI). We propose that to accelerate @@ -1586,32 +2017,32 @@ interactions: by almost all animals, and the ability of animals to rapidly evolve the sensorimotor skills needed to adapt to new environments suggests that these core skills provide a solid foundation. Below we highlight a few of these shared characteristics.", - "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 4, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Biology", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-10-15", "journal": {"volume": "abs/2210.08340", "name": - "ArXiv"}, "authors": [{"authorId": "3199565", "name": "A. Zador"}, {"authorId": - "38498866", "name": "Blake A. Richards"}, {"authorId": "1422033616", "name": - "Bence Olveczky"}, {"authorId": "2153071", "name": "Sean Escola"}, {"authorId": - "1865800402", "name": "Y. Bengio"}, {"authorId": "1701564", "name": "K. Boahen"}, - {"authorId": "46378362", "name": "M. Botvinick"}, {"authorId": "32064081", - "name": "D. Chklovskii"}, {"authorId": "3786556", "name": "A. Churchland"}, - {"authorId": "2388737", "name": "C. Clopath"}, {"authorId": "1865831", "name": - "J. DiCarlo"}, {"authorId": "25769960", "name": "S. Ganguli"}, {"authorId": - "47993087", "name": "J. Hawkins"}, {"authorId": "2065566758", "name": "Konrad - Koerding"}, {"authorId": "1875952", "name": "A. Koulakov"}, {"authorId": "1688882", - "name": "Yann LeCun"}, {"authorId": "2542999", "name": "T. Lillicrap"}, {"authorId": - "2367822", "name": "Adam H. Marblestone"}, {"authorId": "1708655", "name": - "B. Olshausen"}, {"authorId": "2469356", "name": "A. Pouget"}, {"authorId": - "29406516", "name": "Cristina Savin"}, {"authorId": "1714528", "name": "T. - Sejnowski"}, {"authorId": "1689350", "name": "Eero P. Simoncelli"}, {"authorId": - "1759839", "name": "S. Solla"}, {"authorId": "3089810", "name": "David Sussillo"}, - {"authorId": "1739838", "name": "A. Tolias"}, {"authorId": "34762467", "name": - "Doris Y. Tsao"}]}, {"paperId": "2a201b3ad2aa56a3cc6cda09c05e765566daf2aa", + "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 5, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-10-15", "journal": {"volume": + "abs/2210.08340", "name": "ArXiv"}, "authors": [{"authorId": "3199565", "name": + "A. Zador"}, {"authorId": "38498866", "name": "Blake A. Richards"}, {"authorId": + "1422033616", "name": "Bence Olveczky"}, {"authorId": "2153071", "name": "Sean + Escola"}, {"authorId": "1865800402", "name": "Y. Bengio"}, {"authorId": "1701564", + "name": "K. Boahen"}, {"authorId": "46378362", "name": "M. Botvinick"}, {"authorId": + "32064081", "name": "D. Chklovskii"}, {"authorId": "3786556", "name": "A. + Churchland"}, {"authorId": "2388737", "name": "C. Clopath"}, {"authorId": + "1865831", "name": "J. DiCarlo"}, {"authorId": "25769960", "name": "S. Ganguli"}, + {"authorId": "47993087", "name": "J. Hawkins"}, {"authorId": "2065566758", + "name": "Konrad Koerding"}, {"authorId": "1875952", "name": "A. Koulakov"}, + {"authorId": "1688882", "name": "Yann LeCun"}, {"authorId": "2542999", "name": + "T. Lillicrap"}, {"authorId": "2367822", "name": "Adam H. Marblestone"}, {"authorId": + "1708655", "name": "B. Olshausen"}, {"authorId": "2469356", "name": "A. Pouget"}, + {"authorId": "29406516", "name": "Cristina Savin"}, {"authorId": "1714528", + "name": "T. Sejnowski"}, {"authorId": "1689350", "name": "Eero P. Simoncelli"}, + {"authorId": "1759839", "name": "S. Solla"}, {"authorId": "3089810", "name": + "David Sussillo"}, {"authorId": "1739838", "name": "A. Tolias"}, {"authorId": + "34762467", "name": "Doris Y. Tsao"}]}, {"paperId": "2a201b3ad2aa56a3cc6cda09c05e765566daf2aa", "externalIds": {"DOI": "10.1109/ICRITO56286.2022.9964700", "CorpusId": 254458792}, - "url": "https://www.semanticscholar.org/paper/2a201b3ad2aa56a3cc6cda09c05e765566daf2aa", + "corpusId": 254458792, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a201b3ad2aa56a3cc6cda09c05e765566daf2aa", "title": "Design and Development of a Ticket Booking System using Smart Bot", "abstract": "Chatbot is a computer software program, that communicates to users via text or speech. This helps users to get information quickly, guides @@ -1634,18 +2065,19 @@ interactions: of various papers are discussed.", "venue": "2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", - "Review"], "publicationDate": "2022-10-13", "journal": {"pages": "1-6", "name": - "2022 10th International Conference on Reliability, Infocom Technologies and - Optimization (Trends and Future Directions) (ICRITO)"}, "authors": [{"authorId": - "2194397318", "name": "Kanksha Kaur"}, {"authorId": "2195023911", "name": - "Talluri Thanuja"}, {"authorId": "81409977", "name": "Omdev Dahiya"}, {"authorId": - "2194661465", "name": "Pechetti Tulasi Sai"}, {"authorId": "47200698", "name": - "Harneet Kaur"}, {"authorId": "2112713395", "name": "Janpreet Singh"}]}, {"paperId": - "a0e086754a9de168ae2674f472affe4c8d1502e6", "externalIds": {"ArXiv": "2210.07321", - "DBLP": "journals/corr/abs-2210-07321", "DOI": "10.48550/arXiv.2210.07321", - "CorpusId": 252907813}, "url": "https://www.semanticscholar.org/paper/a0e086754a9de168ae2674f472affe4c8d1502e6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Conference", "Review"], "publicationDate": "2022-10-13", "journal": {"pages": + "1-6", "name": "2022 10th International Conference on Reliability, Infocom + Technologies and Optimization (Trends and Future Directions) (ICRITO)"}, "authors": + [{"authorId": "2194397318", "name": "Kanksha Kaur"}, {"authorId": "2195023911", + "name": "Talluri Thanuja"}, {"authorId": "81409977", "name": "Omdev Dahiya"}, + {"authorId": "2194661465", "name": "Pechetti Tulasi Sai"}, {"authorId": "47200698", + "name": "Harneet Kaur"}, {"authorId": "2112713395", "name": "Janpreet Singh"}]}, + {"paperId": "a0e086754a9de168ae2674f472affe4c8d1502e6", "externalIds": {"ArXiv": + "2210.07321", "DBLP": "journals/corr/abs-2210-07321", "DOI": "10.48550/arXiv.2210.07321", + "CorpusId": 252907813}, "corpusId": 252907813, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a0e086754a9de168ae2674f472affe4c8d1502e6", "title": "Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods", "abstract": "Advances in natural language generation (NLG) have resulted in machine generated text that is increasingly difficult @@ -1662,15 +2094,20 @@ interactions: the most critical threat models, and ensuring detection systems themselves demonstrate trustworthiness through fairness, robustness, and accountability.", "venue": "ArXiv", "year": 2022, "referenceCount": 190, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-10-13", - "journal": {"volume": "abs/2210.07321", "name": "ArXiv"}, "authors": [{"authorId": - "152158902", "name": "Evan Crothers"}, {"authorId": "1743642", "name": "N. - Japkowicz"}, {"authorId": "1727256", "name": "H. Viktor"}]}, {"paperId": "4fc37fb43644252fb04f673c38d9b7976500979d", - "externalIds": {"PubMedCentral": "9608631", "DOI": "10.3389/fcvm.2022.945726", - "CorpusId": 252877740, "PubMed": "36312266"}, "url": "https://www.semanticscholar.org/paper/4fc37fb43644252fb04f673c38d9b7976500979d", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2022-10-13", "journal": {"volume": "abs/2210.07321", "name": "ArXiv"}, "authors": + [{"authorId": "152158902", "name": "Evan Crothers"}, {"authorId": "1743642", + "name": "N. Japkowicz"}, {"authorId": "1727256", "name": "H. Viktor"}]}, {"paperId": + "4fc37fb43644252fb04f673c38d9b7976500979d", "externalIds": {"PubMedCentral": + "9608631", "DOI": "10.3389/fcvm.2022.945726", "CorpusId": 252877740, "PubMed": + "36312266"}, "corpusId": 252877740, "publicationVenue": {"id": "3bc0e661-dc2a-454a-9ff5-6515430ce9ff", + "name": "Frontiers in Cardiovascular Medicine", "type": "journal", "alternate_names": + ["Front Cardiovasc Med"], "issn": "2297-055X", "url": "http://www.frontiersin.org/Cardiovascular_Medicine", + "alternate_urls": ["http://www.frontiersin.org/Cardiovascular_Medicine/about", + "https://www.frontiersin.org/journals/cardiovascular-medicine"]}, "url": "https://www.semanticscholar.org/paper/4fc37fb43644252fb04f673c38d9b7976500979d", "title": "Artificial intelligence in cardiology: Hope for the future and power for the present", "abstract": "Cardiovascular disease (CVD) is the principal cause of mortality and morbidity globally. With the pressures for improved @@ -1692,8 +2129,9 @@ interactions: regarding the implementation of AI technologies in real-world are still unaddressed.", "venue": "Frontiers in Cardiovascular Medicine", "year": 2022, "referenceCount": 145, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcvm.2022.945726/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-13", "journal": {"volume": "9", "name": "Frontiers in Cardiovascular Medicine"}, "authors": @@ -1701,7 +2139,11 @@ interactions: "name": "N. Aung"}, {"authorId": "5211080", "name": "D. Aksentijevi\u0107"}]}, {"paperId": "ef2cfb1a0c36c1deabe276a1292bf5a43eee0a2b", "externalIds": {"DBLP": "journals/corr/abs-2210-05350", "ArXiv": "2210.05350", "DOI": "10.1109/JRFID.2022.3225741", - "CorpusId": 252815741}, "url": "https://www.semanticscholar.org/paper/ef2cfb1a0c36c1deabe276a1292bf5a43eee0a2b", + "CorpusId": 252815741}, "corpusId": 252815741, "publicationVenue": {"id": + "7ac1a193-138e-40cf-97eb-5b1642adddd2", "name": "IEEE Journal of Radio Frequency + Identification", "type": "journal", "alternate_names": ["IEEE J Radio Freq + Identif"], "issn": "2469-7281", "url": "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=7433271"}, + "url": "https://www.semanticscholar.org/paper/ef2cfb1a0c36c1deabe276a1292bf5a43eee0a2b", "title": "A New Perspective on Digital Twins: Imparting Intelligence and Agency to Entities", "abstract": "Despite the Digital Twin (DT) concept being in the industry for a long time, it remains ambiguous, unable to differentiate @@ -1717,7 +2159,8 @@ interactions: a DT should be, and its roles and responsibilities, as well as setting a long-term direction for DTs.", "venue": "IEEE Journal of Radio Frequency Identification", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2210.05350", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-11", "journal": {"volume": "6", "pages": "871-875", @@ -1725,7 +2168,8 @@ interactions: "32151779", "name": "Ashwin Agrawal"}, {"authorId": "2118838608", "name": "Vishal Singh"}, {"authorId": "2152258534", "name": "Martin Fischer"}]}, {"paperId": "2c5dfc4ca766a1b081423ea701473dd61bfecbb0", "externalIds": {"DOI": "10.3390/electronics11193259", - "CorpusId": 252870621}, "url": "https://www.semanticscholar.org/paper/2c5dfc4ca766a1b081423ea701473dd61bfecbb0", + "CorpusId": 252870621}, "corpusId": 252870621, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2c5dfc4ca766a1b081423ea701473dd61bfecbb0", "title": "ANN and SSO Algorithms for a Newly Developed Flexible Grid Trading Model", "abstract": "In the modern era, the trading methods and strategies used in the financial market have gradually changed from traditional on-site @@ -1750,14 +2194,16 @@ interactions: of Investment (ROI) and model robustness, and can properly control the balance between risk and return.", "venue": "Electronics", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-10", - "journal": {"name": "Electronics"}, "authors": [{"authorId": "143988608", - "name": "W. Yeh"}, {"authorId": "33266081", "name": "Yu-Hsin Hsieh"}, {"authorId": - "2187604117", "name": "Kai-Yi Hsu"}, {"authorId": "1781139", "name": "Chia-Ling - Huang"}]}, {"paperId": "b941c4bea1a71066f6f32275641aea1efc99b21b", "externalIds": - {"ArXiv": "2210.04909", "DBLP": "journals/corr/abs-2210-04909", "DOI": "10.48550/arXiv.2210.04909", - "CorpusId": 252815699}, "url": "https://www.semanticscholar.org/paper/b941c4bea1a71066f6f32275641aea1efc99b21b", + "openAccessPdf": {"url": "https://www.mdpi.com/2079-9292/11/19/3259/pdf?version=1665558934", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-10-10", "journal": {"name": "Electronics"}, "authors": [{"authorId": + "143988608", "name": "W. Yeh"}, {"authorId": "33266081", "name": "Yu-Hsin + Hsieh"}, {"authorId": "2187604117", "name": "Kai-Yi Hsu"}, {"authorId": "1781139", + "name": "Chia-Ling Huang"}]}, {"paperId": "b941c4bea1a71066f6f32275641aea1efc99b21b", + "externalIds": {"ArXiv": "2210.04909", "DBLP": "journals/corr/abs-2210-04909", + "DOI": "10.48550/arXiv.2210.04909", "CorpusId": 252815699}, "corpusId": 252815699, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b941c4bea1a71066f6f32275641aea1efc99b21b", "title": "Meta-Principled Family of Hyperparameter Scaling Strategies", "abstract": "In this note, we \ufb01rst derive a one-parameter family of hyperparameter scaling strategies that interpolates between the neural-tangent scaling and @@ -1771,15 +2217,16 @@ interactions: by e\ufb00ective theories for \ufb01nite-width neural networks, with their training dynamics ranging from being weakly-coupled to being strongly-coupled.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-10-10", "journal": {"volume": "abs/2210.04909", "name": - "ArXiv"}, "authors": [{"authorId": "8904571", "name": "Sho Yaida"}]}, {"paperId": - "57b579b041e59cb6cedc4793a2ce8ee7f27119d7", "externalIds": {"DBLP": "conf/nordichi/AlizadehMS22", - "DOI": "10.1145/3546155.3547282", "CorpusId": 252532882}, "url": "https://www.semanticscholar.org/paper/57b579b041e59cb6cedc4793a2ce8ee7f27119d7", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-10-10", "journal": {"volume": + "abs/2210.04909", "name": "ArXiv"}, "authors": [{"authorId": "8904571", "name": + "Sho Yaida"}]}, {"paperId": "57b579b041e59cb6cedc4793a2ce8ee7f27119d7", "externalIds": + {"DBLP": "conf/nordichi/AlizadehMS22", "DOI": "10.1145/3546155.3547282", "CorpusId": + 252532882}, "corpusId": 252532882, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/57b579b041e59cb6cedc4793a2ce8ee7f27119d7", "title": "Does Anyone Dream of Invisible A.I.? A Critique of the Making Invisible of A.I. Policing", "abstract": "For most people, using their body to authenticate their identity is an integral part of daily life. From our fingerprints to @@ -1798,15 +2245,16 @@ interactions: for reverse Turing tests, and we urge the research community to pursue alternative routes of bot identification that are more transparent and responsive.", "venue": "NordiCHI", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book"], "publicationDate": "2022-10-08", "journal": {"name": "Nordic Human-Computer - Interaction Conference"}, "authors": [{"authorId": "2070900671", "name": "F. - Alizadeh"}, {"authorId": "2004535547", "name": "Aikaterini Mniestri"}, {"authorId": - "2061536899", "name": "G. Stevens"}]}, {"paperId": "6b4a96ba2cb4bfcad98e9f00eb3f2f8491ace8aa", - "externalIds": {"DOI": "10.1109/ICOA55659.2022.9934559", "CorpusId": 253425332}, - "url": "https://www.semanticscholar.org/paper/6b4a96ba2cb4bfcad98e9f00eb3f2f8491ace8aa", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2022-10-08", + "journal": {"name": "Nordic Human-Computer Interaction Conference"}, "authors": + [{"authorId": "2070900671", "name": "F. Alizadeh"}, {"authorId": "2004535547", + "name": "Aikaterini Mniestri"}, {"authorId": "2061536899", "name": "G. Stevens"}]}, + {"paperId": "6b4a96ba2cb4bfcad98e9f00eb3f2f8491ace8aa", "externalIds": {"DOI": + "10.1109/ICOA55659.2022.9934559", "CorpusId": 253425332}, "corpusId": 253425332, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b4a96ba2cb4bfcad98e9f00eb3f2f8491ace8aa", "title": "Towards the use of artificial intelligence and machine learning in material scientist field", "abstract": "Currently, the Artificial Intelligence (AI) and Machine Learning (ML) are used several engineering applications. @@ -1822,16 +2270,17 @@ interactions: their use in image classification is explained.", "venue": "2022 8th International Conference on Optimization and Applications (ICOA)", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2022-10-06", "journal": {"pages": "1-5", "name": "2022 8th International - Conference on Optimization and Applications (ICOA)"}, "authors": [{"authorId": - "2190308884", "name": "Sara Samine"}, {"authorId": "48196339", "name": "M. - Zemzami"}, {"authorId": "7706426", "name": "N. Hmina"}, {"authorId": "1983795", - "name": "M. Lagache"}, {"authorId": "98777122", "name": "S. Belhouideg"}]}, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2022-10-06", "journal": {"pages": "1-5", "name": "2022 + 8th International Conference on Optimization and Applications (ICOA)"}, "authors": + [{"authorId": "2190308884", "name": "Sara Samine"}, {"authorId": "48196339", + "name": "M. Zemzami"}, {"authorId": "7706426", "name": "N. Hmina"}, {"authorId": + "1983795", "name": "M. Lagache"}, {"authorId": "98777122", "name": "S. Belhouideg"}]}, {"paperId": "b935df32990444ce0c5742badf66573f50edd328", "externalIds": {"DBLP": "journals/corr/abs-2210-03217", "ArXiv": "2210.03217", "DOI": "10.48550/arXiv.2210.03217", - "CorpusId": 252762217}, "url": "https://www.semanticscholar.org/paper/b935df32990444ce0c5742badf66573f50edd328", + "CorpusId": 252762217}, "corpusId": 252762217, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b935df32990444ce0c5742badf66573f50edd328", "title": "Genetic algorithm formulation and tuning with use of test functions", "abstract": "This work discusses single-objective constrained genetic algorithm with \ufb02oating-point, integer, binary and permutation representation. Floating-point @@ -1843,14 +2292,14 @@ interactions: tuning in order to increase its performance. Here, \ufb02oating-point single-objective GA effectivity and efficiency analysis with use of TFs will be presented.", "venue": "ArXiv", "year": 2022, "referenceCount": 36, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-06", "journal": - {"volume": "abs/2210.03217", "name": "ArXiv"}, "authors": [{"authorId": "93679191", - "name": "T. Tarkowski"}]}, {"paperId": "05ab5da3d055fa652c85a0b722bc7d49543ee93e", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-10-06", "journal": {"volume": "abs/2210.03217", "name": "ArXiv"}, "authors": + [{"authorId": "93679191", "name": "T. Tarkowski"}]}, {"paperId": "05ab5da3d055fa652c85a0b722bc7d49543ee93e", "externalIds": {"DOI": "10.3389/fphy.2022.941824", "CorpusId": 252738616}, - "url": "https://www.semanticscholar.org/paper/05ab5da3d055fa652c85a0b722bc7d49543ee93e", + "corpusId": 252738616, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05ab5da3d055fa652c85a0b722bc7d49543ee93e", "title": "AI in society: A theory", "abstract": "Human-machine teams or systems are integral parts of society and will likely become more so. Unsettled are the effects of these changes, their mechanism(s), and how to measure them. @@ -1863,25 +2312,37 @@ interactions: I repurpose Donald Davidson\u2019s triangulation as a model for human-machine teams and systems.", "venue": "Frontiers in Physics", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-06", + "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fphy.2022.941824/pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-06", "journal": {"volume": "10"}, "authors": [{"authorId": "1572885986", "name": "R. Quandt"}]}, {"paperId": "9649afa7ae20c2f31c1c5499a6baeea50cf7955f", "externalIds": {"PubMedCentral": "9527388", "DOI": "10.1007/s13042-022-01675-8", "CorpusId": - 252708351, "PubMed": "36212088"}, "url": "https://www.semanticscholar.org/paper/9649afa7ae20c2f31c1c5499a6baeea50cf7955f", + 252708351, "PubMed": "36212088"}, "corpusId": 252708351, "publicationVenue": + {"id": "a0c45882-7c78-4f0c-8886-d3481ba02586", "name": "International Journal + of Machine Learning and Cybernetics", "type": "journal", "alternate_names": + ["Int J Mach Learn Cybern"], "issn": "1868-8071", "url": "http://www.springer.com/engineering/mathematical/journal/13042", + "alternate_urls": ["https://link.springer.com/journal/13042"]}, "url": "https://www.semanticscholar.org/paper/9649afa7ae20c2f31c1c5499a6baeea50cf7955f", "title": "Multiview deep learning-based attack to break text-CAPTCHAs", "abstract": null, "venue": "International Journal of Machine Learning and Cybernetics", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13042-022-01675-8.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-10-03", "journal": {"pages": "1 - 14", "name": "International Journal of Machine Learning and Cybernetics"}, "authors": [{"authorId": "1571649581", "name": "M. Yusuf"}, {"authorId": "2155057086", "name": "Divya Srivastava"}, {"authorId": "143679152", "name": "Deepak Singh"}, {"authorId": "27080654", "name": "V. Rathor"}]}, {"paperId": "bfbfc9c12fe5be3c652ba2548ddde5c4f0d0b074", "externalIds": {"DOI": "10.1080/07421222.2022.2127441", "CorpusId": 254565204}, - "url": "https://www.semanticscholar.org/paper/bfbfc9c12fe5be3c652ba2548ddde5c4f0d0b074", + "corpusId": 254565204, "publicationVenue": {"id": "ede7e9cc-1657-47d5-bcf1-1ca3b056bf9d", + "name": "Journal of Management Information Systems", "type": "journal", "alternate_names": + ["J Manag Inf Syst"], "issn": "0742-1222", "url": "http://www.mesharpe.com/mall/results1.asp?ACR=MIS", + "alternate_urls": ["http://www.metapress.com/openurl.asp?genre=journal&issn=0742-1222", + "http://www.tandfonline.com/toc/mmis20/current", "http://www.tandfonline.com/loi/mmis", + "http://www.jstor.org/journals/07421222.html", "https://www.jstor.org/journal/jmanainfosyst", + "http://www.jmis-web.org/"]}, "url": "https://www.semanticscholar.org/paper/bfbfc9c12fe5be3c652ba2548ddde5c4f0d0b074", "title": "To Be or Not to Be \u2026Human? Theorizing the Role of Human-Like Competencies in Conversational Artificial Intelligence Agents", "abstract": "ABSTRACT Driven by the need to provide continuous, timely, and efficient @@ -1912,14 +2373,15 @@ interactions: user engagement with them. We also discuss the implications of our study for research and practice.", "venue": "Journal of Management Information Systems", "year": 2022, "referenceCount": 144, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2022-10-02", "journal": {"volume": "39", "pages": "969 - 1005", "name": "Journal - of Management Information Systems"}, "authors": [{"authorId": "38047874", - "name": "Shalini Chandra"}, {"authorId": "2841662", "name": "Anuragini Shirish"}, - {"authorId": "2948637", "name": "S. Srivastava"}]}, {"paperId": "2b479b1239e0783995762f11ceacbc7c0a412c32", - "externalIds": {"DOI": "10.1109/TREX57753.2022.00007", "CorpusId": 254737477}, - "url": "https://www.semanticscholar.org/paper/2b479b1239e0783995762f11ceacbc7c0a412c32", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2022-10-02", "journal": {"volume": "39", "pages": + "969 - 1005", "name": "Journal of Management Information Systems"}, "authors": + [{"authorId": "38047874", "name": "Shalini Chandra"}, {"authorId": "2841662", + "name": "Anuragini Shirish"}, {"authorId": "2948637", "name": "S. Srivastava"}]}, + {"paperId": "2b479b1239e0783995762f11ceacbc7c0a412c32", "externalIds": {"DOI": + "10.1109/TREX57753.2022.00007", "CorpusId": 254737477}, "corpusId": 254737477, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2b479b1239e0783995762f11ceacbc7c0a412c32", "title": "Kicking Analysts Out of the Meeting Room: Supporting Future Data-driven Decision Making with Intelligent Interactive Visualization Systems", "abstract": "Today''s data-driven decisions are largely dependent on professional analysts @@ -1934,38 +2396,51 @@ interactions: systems for data-driven decision-making.", "venue": "2022 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-01", - "journal": {"pages": "16-21", "name": "2022 IEEE Workshop on TRust and EXpertise - in Visual Analytics (TREX)"}, "authors": [{"authorId": "2112846850", "name": - "Yi Han"}]}, {"paperId": "ce18b1a136decdb71c987795ff9d729d56e8faa8", "externalIds": - {"DOI": "10.1016/j.jobe.2022.105444", "CorpusId": 253190164}, "url": "https://www.semanticscholar.org/paper/ce18b1a136decdb71c987795ff9d729d56e8faa8", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2022-10-01", "journal": {"pages": "16-21", "name": "2022 + IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)"}, "authors": + [{"authorId": "2112846850", "name": "Yi Han"}]}, {"paperId": "ce18b1a136decdb71c987795ff9d729d56e8faa8", + "externalIds": {"DOI": "10.1016/j.jobe.2022.105444", "CorpusId": 253190164}, + "corpusId": 253190164, "publicationVenue": {"id": "edc86f1a-0bc0-4f32-8b0d-9134204610bf", + "name": "Journal of Building Engineering", "type": "journal", "alternate_names": + ["J Build Eng", "J build eng", "Journal of building engineering"], "issn": + "2352-7102", "url": "https://www.journals.elsevier.com/leukemia-research-reports/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/23527102"]}, + "url": "https://www.semanticscholar.org/paper/ce18b1a136decdb71c987795ff9d729d56e8faa8", "title": "Predictive models for concrete properties using machine learning and deep learning approaches: A review", "abstract": null, "venue": "Journal of Building Engineering", "year": 2022, "referenceCount": 250, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2022-10-01", "journal": - {"name": "Journal of Building Engineering"}, "authors": [{"authorId": "2188200871", - "name": "Mohammad Mohtasham Moein"}, {"authorId": "101132170", "name": "Ashkan - Saradar"}, {"authorId": "2188191239", "name": "Komeil Rahmati"}, {"authorId": - "148049156", "name": "S. H. Ghasemzadeh Mousavinejad"}, {"authorId": "2189161666", - "name": "James Bristow"}, {"authorId": "2036623086", "name": "Vartenie Aramali"}, - {"authorId": "2141056378", "name": "Moses Karakouzian"}]}, {"paperId": "8d1439cfd0ae8293f955b04c549f151abde7a887", - "externalIds": {"DOI": "10.1016/j.chb.2022.107536", "CorpusId": 253054855}, - "url": "https://www.semanticscholar.org/paper/8d1439cfd0ae8293f955b04c549f151abde7a887", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2022-10-01", "journal": {"name": "Journal of Building Engineering"}, "authors": + [{"authorId": "2188200871", "name": "Mohammad Mohtasham Moein"}, {"authorId": + "101132170", "name": "Ashkan Saradar"}, {"authorId": "2188191239", "name": + "Komeil Rahmati"}, {"authorId": "148049156", "name": "S. H. Ghasemzadeh Mousavinejad"}, + {"authorId": "2189161666", "name": "James Bristow"}, {"authorId": "2036623086", + "name": "Vartenie Aramali"}, {"authorId": "2141056378", "name": "Moses Karakouzian"}]}, + {"paperId": "8d1439cfd0ae8293f955b04c549f151abde7a887", "externalIds": {"DBLP": + "journals/chb/ZhangCKC23", "DOI": "10.1016/j.chb.2022.107536", "CorpusId": + 253054855}, "corpusId": 253054855, "publicationVenue": {"id": "435ffef1-21df-491d-b69a-605eee1b7f7f", + "name": "Computers in Human Behavior", "type": "journal", "alternate_names": + ["Comput Hum Behav"], "issn": "0747-5632", "url": "https://www.journals.elsevier.com/computers-in-human-behavior", + "alternate_urls": ["https://www.sciencedirect.com/science/article/pii/S0747563216307695", + "http://www.sciencedirect.com/science/journal/07475632"]}, "url": "https://www.semanticscholar.org/paper/8d1439cfd0ae8293f955b04c549f151abde7a887", "title": "Trust in an AI versus a Human teammate: The effects of teammate identity and performance on Human-AI cooperation", "abstract": null, "venue": "Computers in Human Behavior", "year": 2022, "referenceCount": 41, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-10-01", "journal": {"name": - "Computers in Human Behavior"}, "authors": [{"authorId": "150116886", "name": - "Guanglu Zhang"}, {"authorId": "2099667158", "name": "L. Chong"}, {"authorId": - "2577125", "name": "K. Kotovsky"}, {"authorId": "1743218", "name": "J. Cagan"}]}, - {"paperId": "8578252ae2b9b58e96274c0e644cd617cba1706f", "externalIds": {"PubMedCentral": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-10-01", "journal": {"volume": "139", "pages": "107536", "name": "Comput. + Hum. Behav."}, "authors": [{"authorId": "150116886", "name": "Guanglu Zhang"}, + {"authorId": "2099667158", "name": "L. Chong"}, {"authorId": "2577125", "name": + "K. Kotovsky"}, {"authorId": "1743218", "name": "J. Cagan"}]}, {"paperId": + "8578252ae2b9b58e96274c0e644cd617cba1706f", "externalIds": {"PubMedCentral": "9608848", "DOI": "10.3390/ma15207187", "CorpusId": 252990683, "PubMed": "36295256"}, - "url": "https://www.semanticscholar.org/paper/8578252ae2b9b58e96274c0e644cd617cba1706f", + "corpusId": 252990683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8578252ae2b9b58e96274c0e644cd617cba1706f", "title": "On Smart Geometric Non-Destructive Evaluation: Inspection Methods, Overview, and Challenges", "abstract": "Inspection methods, also known as non-destructive evaluation (NDE), is a process for inspecting materials, products, @@ -1988,18 +2463,19 @@ interactions: To this end, along with Industry 4.0 technologies, a virtual inspection system has been proposed to deploy smart inspection.", "venue": "Materials", "year": 2022, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2022-10-01", "journal": {"volume": "15", "name": "Materials"}, - "authors": [{"authorId": "2121855108", "name": "A. Jaber"}, {"authorId": "148133349", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1996-1944/15/20/7187/pdf?version=1666615573", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2022-10-01", "journal": {"volume": "15", "name": "Materials"}, "authors": + [{"authorId": "2121855108", "name": "A. Jaber"}, {"authorId": "148133349", "name": "Sasan Sattarpanah Karganroudi"}, {"authorId": "73233926", "name": "M. S. Meiabadi"}, {"authorId": "144202350", "name": "A. Aminzadeh"}, {"authorId": "2144776401", "name": "Hussein Ibrahim"}, {"authorId": "34651759", "name": "M. Adda"}, {"authorId": "144731070", "name": "H. Taheri"}]}, {"paperId": "f658cc4cb5201769e94a6bcc5ea2f4caacf2c264", "externalIds": {"PubMedCentral": "9602573", "DOI": "10.3390/healthcare10101997", "CorpusId": 252893401, "PubMed": - "36292444"}, "url": "https://www.semanticscholar.org/paper/f658cc4cb5201769e94a6bcc5ea2f4caacf2c264", + "36292444"}, "corpusId": 252893401, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f658cc4cb5201769e94a6bcc5ea2f4caacf2c264", "title": "Enhanced Patient-Centricity: How the Biopharmaceutical Industry Is Optimizing Patient Care through AI/ML/DL", "abstract": "Technologies utilizing cutting-edge methodologies, including artificial intelligence (AI), machine @@ -2019,16 +2495,23 @@ interactions: recent literature and examine the hurdles faced by researchers in the biopharmaceutical industry to fully realize the promise of AI/ML/DL for patient-centric purposes.", "venue": "Healthcare", "year": 2022, "referenceCount": 93, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": - "2022-10-01", "journal": {"volume": "10", "name": "Healthcare"}, "authors": - [{"authorId": "2823722", "name": "K. Zou"}, {"authorId": "1492111897", "name": - "Jim Z. Li"}]}, {"paperId": "77932608d65debabbefe0c81ddbb1f3c1f98c2fd", "externalIds": - {"DBLP": "journals/sensors/MoshawrabABIR22", "PubMedCentral": "9573761", "DOI": - "10.3390/s22197472", "CorpusId": 252840059, "PubMed": "36236570"}, "url": - "https://www.semanticscholar.org/paper/77932608d65debabbefe0c81ddbb1f3c1f98c2fd", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2227-9032/10/10/1997/pdf?version=1666746827", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2022-10-01", "journal": + {"volume": "10", "name": "Healthcare"}, "authors": [{"authorId": "2823722", + "name": "K. Zou"}, {"authorId": "1492111897", "name": "Jim Z. Li"}]}, {"paperId": + "77932608d65debabbefe0c81ddbb1f3c1f98c2fd", "externalIds": {"DBLP": "journals/sensors/MoshawrabABIR22", + "PubMedCentral": "9573761", "DOI": "10.3390/s22197472", "CorpusId": 252840059, + "PubMed": "36236570"}, "corpusId": 252840059, "publicationVenue": {"id": "3dbf084c-ef47-4b74-9919-047b40704538", + "name": "Italian National Conference on Sensors", "type": "conference", "alternate_names": + ["SENSORS", "IEEE Sens", "Ital National Conf Sens", "IEEE Sensors", "Sensors"], + "issn": "1424-8220", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-142001", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-142001", + "http://www.mdpi.com/journal/sensors", "https://www.mdpi.com/journal/sensors"]}, + "url": "https://www.semanticscholar.org/paper/77932608d65debabbefe0c81ddbb1f3c1f98c2fd", "title": "Smart Wearables for the Detection of Occupational Physical Fatigue: A Literature Review", "abstract": "Today\u2019s world is changing dramatically due to the influence of various factors. Whether due to the rapid development @@ -2046,18 +2529,19 @@ interactions: and discuss the challenges that hinder this field and highlight what can be done to advance the use of smart wearables in workplace fatigue detection.", "venue": "Italian National Conference on Sensors", "year": 2022, "referenceCount": - 143, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 143, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.mdpi.com/1424-8220/22/19/7472/pdf?version=1665308699", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "2181447214", "name": "Mohammad Moshawrab"}, {"authorId": "34651759", "name": "M. Adda"}, {"authorId": "3112124", "name": "A. Bouzouane"}, {"authorId": "2054762450", "name": "Hussein Ibrahim"}, {"authorId": "2157812", "name": "Ali Raad"}]}, {"paperId": "ea52a6ab2282cd39593cb25f051125fb663e433d", "externalIds": - {"DOI": "10.1088/1757-899X/1261/1/012014", "CorpusId": 252814626}, "url": - "https://www.semanticscholar.org/paper/ea52a6ab2282cd39593cb25f051125fb663e433d", + {"DOI": "10.1088/1757-899X/1261/1/012014", "CorpusId": 252814626}, "corpusId": + 252814626, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea52a6ab2282cd39593cb25f051125fb663e433d", "title": "Coevolution of internal representations in physical human-robot orchestration \u2013 models of the surgeon and the robot in robotic surgery", "abstract": "In teleoperated Robot-Assisted Minimally-Invasive Surgery (RAMIS), @@ -2075,24 +2559,29 @@ interactions: the human and the robot, and discuss it in comparison to human-human collaboration over teleoperated channels.", "venue": "IOP Conference Series: Materials Science and Engineering", "year": 2022, "referenceCount": 126, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "2022-10-01", "journal": {"volume": "1261", "name": "IOP - Conference Series: Materials Science and Engineering"}, "authors": [{"authorId": - "2166933", "name": "I. Nisky"}, {"authorId": "2090041220", "name": "Leone - Costi"}, {"authorId": "34567297", "name": "F. Iida"}]}, {"paperId": "ed9878730829fec2e94253f8e03feb8c17ec861d", - "externalIds": {"DOI": "10.1016/j.pragma.2022.08.016", "CorpusId": 252500749}, - "url": "https://www.semanticscholar.org/paper/ed9878730829fec2e94253f8e03feb8c17ec861d", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["Conference"], "publicationDate": "2022-10-01", "journal": + {"volume": "1261", "name": "IOP Conference Series: Materials Science and Engineering"}, + "authors": [{"authorId": "2166933", "name": "I. Nisky"}, {"authorId": "2090041220", + "name": "Leone Costi"}, {"authorId": "34567297", "name": "F. Iida"}]}, {"paperId": + "ed9878730829fec2e94253f8e03feb8c17ec861d", "externalIds": {"DOI": "10.1016/j.pragma.2022.08.016", + "CorpusId": 252500749}, "corpusId": 252500749, "publicationVenue": {"id": + "3852b43e-e6ba-4fd8-8acd-b6da6c785ff1", "name": "Journal of Pragmatics", "type": + "journal", "alternate_names": ["J Pragmat"], "issn": "0378-2166", "url": "http://www.elsevier.com/locate/pragma", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505593/description", + "http://www.sciencedirect.com/science/journal/03782166"]}, "url": "https://www.semanticscholar.org/paper/ed9878730829fec2e94253f8e03feb8c17ec861d", "title": "Knowing how to present yourself by knowing how to recognize false true facts", "abstract": null, "venue": "Journal of Pragmatics", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-10-01", - "journal": {"name": "Journal of Pragmatics"}, "authors": [{"authorId": "3004569", - "name": "I. Arminen"}, {"authorId": "2185989648", "name": "Anna S.M. Heino"}]}, - {"paperId": "37323e112fdc5eeafd6131fbcaf7646620b0c78a", "externalIds": {"DOI": - "10.1177/09544089221085325", "CorpusId": 252080364}, "url": "https://www.semanticscholar.org/paper/37323e112fdc5eeafd6131fbcaf7646620b0c78a", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-10-01", "journal": {"name": "Journal of Pragmatics"}, "authors": [{"authorId": + "3004569", "name": "I. Arminen"}, {"authorId": "2185989648", "name": "Anna + S.M. Heino"}]}, {"paperId": "37323e112fdc5eeafd6131fbcaf7646620b0c78a", "externalIds": + {"DOI": "10.1177/09544089221085325", "CorpusId": 252080364}, "corpusId": 252080364, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/37323e112fdc5eeafd6131fbcaf7646620b0c78a", "title": "Secondary Processing of Aramid with AWJ and Optimization with NSGA-III", "abstract": "The secondary operations of composite parts are performed following thermal cure processes, which generate the final dimensions with desired tolerance @@ -2117,17 +2606,19 @@ interactions: for the hole-making operation. The maximum error in the accuracy of operating regions yields to 7% with independent measurements for validation.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-10-01", "journal": {"volume": "236", "pages": "2164 - - 2175", "name": "Proceedings of the Institution of Mechanical Engineers, - Part E: Journal of Process Mechanical Engineering"}, "authors": [{"authorId": - "138281485", "name": "M. Kahya"}, {"authorId": "1932466722", "name": "Emre - Do\u011fankaya"}, {"authorId": "2141400241", "name": "\u00d6mer \u00c7aylan"}, - {"authorId": "2184091819", "name": "Zarife G\u00f6knur B\u00fcke"}, {"authorId": - "2356833", "name": "H. \u00d6. \u00dcnver"}]}, {"paperId": "1c40970d71c90a4d3cd2a3e9fd840eb634655e8a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-10-01", "journal": {"volume": + "236", "pages": "2164 - 2175", "name": "Proceedings of the Institution of + Mechanical Engineers, Part E: Journal of Process Mechanical Engineering"}, + "authors": [{"authorId": "138281485", "name": "M. Kahya"}, {"authorId": "1932466722", + "name": "Emre Do\u011fankaya"}, {"authorId": "2141400241", "name": "\u00d6mer + \u00c7aylan"}, {"authorId": "2184091819", "name": "Zarife G\u00f6knur B\u00fcke"}, + {"authorId": "2356833", "name": "H. \u00d6. \u00dcnver"}]}, {"paperId": "1c40970d71c90a4d3cd2a3e9fd840eb634655e8a", "externalIds": {"DBLP": "conf/lwmoocs/PolettiG22", "DOI": "10.1109/LWMOOCS53067.2022.9928026", - "CorpusId": 253270953}, "url": "https://www.semanticscholar.org/paper/1c40970d71c90a4d3cd2a3e9fd840eb634655e8a", + "CorpusId": 253270953}, "corpusId": 253270953, "publicationVenue": {"id": + "b8d4a2d9-9fd4-4837-b46c-eae6c2253bc3", "name": "Learning With MOOCS", "type": + "conference", "alternate_names": ["LWMOOCS", "Learn MOOCS"]}, "url": "https://www.semanticscholar.org/paper/1c40970d71c90a4d3cd2a3e9fd840eb634655e8a", "title": "MOOCs in the infosphere", "abstract": "The network is a paradigm and model that has changed the style and idea of interactivity, cognitive styles and the concept of person and information, acting as a catalyst and @@ -2142,15 +2633,16 @@ interactions: and connection with reality, becoming increasingly a model and a training tool and a place for learning and experimentation.", "venue": "Learning With MOOCS", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-09-29", "journal": {"pages": "16-22", "name": "2022 - IEEE Learning with MOOCS (LWMOOCS)"}, "authors": [{"authorId": "2064519831", - "name": "Giorgio Poletti"}, {"authorId": "2073911094", "name": "Anita Gramigna"}]}, - {"paperId": "f578351cb5f353ea22331f1720408026bdecb5bf", "externalIds": {"PubMedCentral": - "9601726", "DOI": "10.3390/healthcare10101878", "CorpusId": 252604635, "PubMed": - "36292325"}, "url": "https://www.semanticscholar.org/paper/f578351cb5f353ea22331f1720408026bdecb5bf", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Political Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-29", "journal": + {"pages": "16-22", "name": "2022 IEEE Learning with MOOCS (LWMOOCS)"}, "authors": + [{"authorId": "2064519831", "name": "Giorgio Poletti"}, {"authorId": "2073911094", + "name": "Anita Gramigna"}]}, {"paperId": "f578351cb5f353ea22331f1720408026bdecb5bf", + "externalIds": {"PubMedCentral": "9601726", "DOI": "10.3390/healthcare10101878", + "CorpusId": 252604635, "PubMed": "36292325"}, "corpusId": 252604635, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f578351cb5f353ea22331f1720408026bdecb5bf", "title": "Privacy Protection in Using Artificial Intelligence for Healthcare: Chinese Regulation in Comparative Perspective", "abstract": "Advanced artificial intelligence (AI) technologies are now widely employed in China\u2019s medical @@ -2173,16 +2665,19 @@ interactions: accountability mechanisms. Examining and contrasting operational rules for AI in health care promotes informed privacy governance and improved privacy legislation.", "venue": "Healthcare", "year": 2022, "referenceCount": 61, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-09-27", "journal": {"volume": "10", "name": "Healthcare"}, - "authors": [{"authorId": "50097239", "name": "Chao Wang"}, {"authorId": "2159189014", - "name": "Jieyu Zhang"}, {"authorId": "2186469273", "name": "Nicholas Lassi"}, - {"authorId": "2145564660", "name": "Xiaohan Zhang"}]}, {"paperId": "ba034601c3af8408107629fb5af644781821a8c9", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.mdpi.com/2227-9032/10/10/1878/pdf?version=1664257123", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-09-27", "journal": {"volume": + "10", "name": "Healthcare"}, "authors": [{"authorId": "50097239", "name": + "Chao Wang"}, {"authorId": "2159189014", "name": "Jieyu Zhang"}, {"authorId": + "2186469273", "name": "Nicholas Lassi"}, {"authorId": "2145564660", "name": + "Xiaohan Zhang"}]}, {"paperId": "ba034601c3af8408107629fb5af644781821a8c9", "externalIds": {"DBLP": "journals/corr/abs-2209-13464", "ArXiv": "2209.13464", - "DOI": "10.48550/arXiv.2209.13464", "CorpusId": 252545242}, "url": "https://www.semanticscholar.org/paper/ba034601c3af8408107629fb5af644781821a8c9", + "DOI": "10.48550/arXiv.2209.13464", "CorpusId": 252545242}, "corpusId": 252545242, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba034601c3af8408107629fb5af644781821a8c9", "title": "Information Extraction and Human-Robot Dialogue towards Real-life Tasks: A Baseline Study with the MobileCS Dataset", "abstract": "Recently, there have merged a class of task-oriented dialogue (TOD) datasets collected @@ -2200,17 +2695,18 @@ interactions: anticipate that the baselines can facilitate exciting future research to build human-robot dialogue systems for real-life tasks.", "venue": "ArXiv", "year": 2022, "referenceCount": 55, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-09-27", "journal": {"volume": "abs/2209.13464", "name": - "ArXiv"}, "authors": [{"authorId": "2175085268", "name": "Hong Liu"}, {"authorId": - "47837854", "name": "Hao Peng"}, {"authorId": "1717830", "name": "Zhijian - Ou"}, {"authorId": "8549226", "name": "Juan-Zi Li"}, {"authorId": "2143931690", - "name": "Yi Huang"}, {"authorId": "39729308", "name": "Junlan Feng"}]}, {"paperId": - "a1de0c24f092d683b7eb4c164feb5802e3cba68c", "externalIds": {"DBLP": "journals/corr/abs-2209-12344", - "ArXiv": "2209.12344", "DOI": "10.48550/arXiv.2209.12344", "CorpusId": 252532126}, - "url": "https://www.semanticscholar.org/paper/a1de0c24f092d683b7eb4c164feb5802e3cba68c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-27", "journal": + {"volume": "abs/2209.13464", "name": "ArXiv"}, "authors": [{"authorId": "2175085268", + "name": "Hong Liu"}, {"authorId": "47837854", "name": "Hao Peng"}, {"authorId": + "1717830", "name": "Zhijian Ou"}, {"authorId": "8549226", "name": "Juan-Zi + Li"}, {"authorId": "2143931690", "name": "Yi Huang"}, {"authorId": "39729308", + "name": "Junlan Feng"}]}, {"paperId": "a1de0c24f092d683b7eb4c164feb5802e3cba68c", + "externalIds": {"DBLP": "journals/corr/abs-2209-12344", "ArXiv": "2209.12344", + "DOI": "10.48550/arXiv.2209.12344", "CorpusId": 252532126}, "corpusId": 252532126, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1de0c24f092d683b7eb4c164feb5802e3cba68c", "title": "Stochastic Gradient Descent Captures How Children Learn About Physics", "abstract": "As children grow older, they develop an intuitive understanding of the physical processes around them. They move along developmental trajectories, @@ -2225,15 +2721,16 @@ interactions: trajectory captures the developmental trajectories of children, thereby providing support to the idea of development as stochastic optimization.", "venue": "ArXiv", "year": 2022, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-09-25", "journal": {"volume": "abs/2209.12344", "name": - "ArXiv"}, "authors": [{"authorId": "2132054462", "name": "Luca M. Schulze - Buschoff"}, {"authorId": "49427184", "name": "Eric Schulz"}, {"authorId": - "32354733", "name": "Marcel Binz"}]}, {"paperId": "ad96defb9ae1b405a17c8224d0bfbad04559bdb9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-25", "journal": + {"volume": "abs/2209.12344", "name": "ArXiv"}, "authors": [{"authorId": "2132054462", + "name": "Luca M. Schulze Buschoff"}, {"authorId": "49427184", "name": "Eric + Schulz"}, {"authorId": "32354733", "name": "Marcel Binz"}]}, {"paperId": "ad96defb9ae1b405a17c8224d0bfbad04559bdb9", "externalIds": {"ArXiv": "2209.12346", "DBLP": "journals/corr/abs-2209-12346", - "DOI": "10.48550/arXiv.2209.12346", "CorpusId": 252531572}, "url": "https://www.semanticscholar.org/paper/ad96defb9ae1b405a17c8224d0bfbad04559bdb9", + "DOI": "10.48550/arXiv.2209.12346", "CorpusId": 252531572}, "corpusId": 252531572, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad96defb9ae1b405a17c8224d0bfbad04559bdb9", "title": "Political economy of superhuman AI", "abstract": "In this note, I study the institutions and game theoretic assumptions that would prevent the emergence of \u2018superhuman-level\u2019 ar\ufb01ticial general intelligence, @@ -2246,14 +2743,18 @@ interactions: to brain should be prohibited. Second, AI* research should be made widely, if not publicly, accessible. JEL : C70, C80", "venue": "ArXiv", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Economics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-25", "journal": - {"volume": "abs/2209.12346", "name": "ArXiv"}, "authors": [{"authorId": "144358962", - "name": "Mehmet S. Ismail"}]}, {"paperId": "6d26335461b46ad01f3f94a86be00c89cb587f40", - "externalIds": {"DOI": "10.1002/hyp.14704", "CorpusId": 252523654}, "url": - "https://www.semanticscholar.org/paper/6d26335461b46ad01f3f94a86be00c89cb587f40", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Economics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Economics", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-09-25", "journal": {"volume": "abs/2209.12346", "name": "ArXiv"}, "authors": + [{"authorId": "144358962", "name": "Mehmet S. Ismail"}]}, {"paperId": "6d26335461b46ad01f3f94a86be00c89cb587f40", + "externalIds": {"DOI": "10.1002/hyp.14704", "CorpusId": 252523654}, "corpusId": + 252523654, "publicationVenue": {"id": "c057fc61-9eaf-4688-ab3e-d843975ffee0", + "name": "Hydrological Processes", "type": "journal", "alternate_names": ["Hydrol + Process"], "issn": "0885-6087", "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/4125", + "alternate_urls": ["http://www.interscience.wiley.com/jpages/0885-6087/", + "https://onlinelibrary.wiley.com/journal/10991085"]}, "url": "https://www.semanticscholar.org/paper/6d26335461b46ad01f3f94a86be00c89cb587f40", "title": "On (in)validating environmental models. 1. Principles for formulating a Turing\u2010like Test for determining when a model is fit\u2010for purpose", "abstract": "Model invalidation is a good thing. It means that we are forced @@ -2274,13 +2775,13 @@ interactions: everywhere\u2019 or \u2018digital twin\u2019 of a catchment system. An example application of the concepts is provided in Part 2.", "venue": "Hydrological Processes", "year": 2022, "referenceCount": 137, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-09-24", "journal": {"volume": "36", "name": "Hydrological - Processes"}, "authors": [{"authorId": "46964939", "name": "K. Beven"}, {"authorId": - "2186079009", "name": "S. Lane"}]}, {"paperId": "e4cf47dddd73605c568c9169524f2fcfcceb6ede", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-09-24", "journal": {"volume": "36", "name": + "Hydrological Processes"}, "authors": [{"authorId": "46964939", "name": "K. + Beven"}, {"authorId": "2186079009", "name": "S. Lane"}]}, {"paperId": "e4cf47dddd73605c568c9169524f2fcfcceb6ede", "externalIds": {"DOI": "10.3389/fcomp.2022.959351", "CorpusId": 252408337}, - "url": "https://www.semanticscholar.org/paper/e4cf47dddd73605c568c9169524f2fcfcceb6ede", + "corpusId": 252408337, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4cf47dddd73605c568c9169524f2fcfcceb6ede", "title": "Materializing the abstract: Understanding AI by game jamming", "abstract": "In this article, we argue that game jam formats are uniquely suited to engage participants in learning about artificial intelligence (AI) as a design material @@ -2302,13 +2803,46 @@ interactions: of the value of game jam formats for learning about AI and which factors need to be considered in regard to this specific learning goal.", "venue": "Frontiers in Computer Science", "year": 2022, "referenceCount": 76, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-09-22", "journal": {"volume": - "4"}, "authors": [{"authorId": "2164717285", "name": "Jeanette Falk"}, {"authorId": - "10702047", "name": "Nanna Inie"}]}, {"paperId": "84007e838e34f60bcd95f03083953262c1ab77a2", - "externalIds": {"DOI": "10.1109/DASC55683.2022.9925874", "CorpusId": 253251631}, - "url": "https://www.semanticscholar.org/paper/84007e838e34f60bcd95f03083953262c1ab77a2", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fcomp.2022.959351/pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-09-22", + "journal": {"volume": "4"}, "authors": [{"authorId": "2164717285", "name": + "Jeanette Falk"}, {"authorId": "10702047", "name": "Nanna Inie"}]}, {"paperId": + "4c8b74d53f1eae2cf6b8f73aca952d4d1c9d7283", "externalIds": {"DOI": "10.1109/ICIRCA54612.2022.9985481", + "CorpusId": 255267137}, "corpusId": 255267137, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4c8b74d53f1eae2cf6b8f73aca952d4d1c9d7283", + "title": "Innovative Turned and Collaborative Technology using Simulated IoT + Applications", "abstract": "Distributed system allows for quick access to + computing, stockpiling, and even connection. Yet, for systems and networks + that are far from a consolidated public cloud or data centre source, these + centralised architectures might cause delays and performance difficulties. + If data analysis is concentrated in the cloud, for example, to analyse emergency + circumstances, any connectivity failures or delays will hinder the function + and endanger human life. However, the restricted availability of such edge + servers thwarts this interesting proposal. The virtual edge computing concept + is discussed in this study as a way forward. By remotely accessing all assets, + particularly edge routers, and making them readily accessible through endpoints, + virtual edge bridges the internet, periphery, and swamp worlds. Fog and cloud + technologies architectures are intriguing solutions to cloud-based technologies, + particularly for rapid reaction to crises can also be used to allow new microservices + and collaborative remedies for pcs. This research study provides a comprehensive + virtual frontier framework and some of the important research challenges that + must be addressed to facilitate more pervasive and efficient better external.", + "venue": "2022 4th International Conference on Inventive Research in Computing + Applications (ICIRCA)", "year": 2022, "referenceCount": 15, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": + "2022-09-21", "journal": {"pages": "369-374", "name": "2022 4th International + Conference on Inventive Research in Computing Applications (ICIRCA)"}, "authors": + [{"authorId": "36437645", "name": "L. M. Visuwasam"}, {"authorId": "2155828067", + "name": "Ankur Kumar Gupta"}, {"authorId": "2072259676", "name": "Rachna Chaudhary"}, + {"authorId": "2116012307", "name": "S. Gupta"}, {"authorId": "2198768608", + "name": "Pankaj Borah"}, {"authorId": "145765310", "name": "M. Chakravarthi"}]}, + {"paperId": "84007e838e34f60bcd95f03083953262c1ab77a2", "externalIds": {"DOI": + "10.1109/DASC55683.2022.9925874", "CorpusId": 253251631}, "corpusId": 253251631, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/84007e838e34f60bcd95f03083953262c1ab77a2", "title": "Trust, Ethics, Consciousness, and Artificial Intelligence", "abstract": "As artificial intelligence (AI) continues to proliferate across manufacturing, economic, medical, aerospace, transportation, and social realms, ethical guidelines @@ -2350,15 +2884,15 @@ interactions: and shared success between humans and machines.", "venue": "2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC)", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2022-09-18", "journal": {"pages": "1-9", "name": "2022 IEEE/AIAA 41st Digital - Avionics Systems Conference (DASC)"}, "authors": [{"authorId": "1580488826", - "name": "Katherine L. O''Grady"}, {"authorId": "93977959", "name": "Steven - D. Harbour"}, {"authorId": "2189465432", "name": "Ashlie Abballe"}, {"authorId": - "145468237", "name": "Kelly Cohen"}]}, {"paperId": "355d82351367caf5ea6617027f04f4cb1643ba1b", - "externalIds": {"DOI": "10.3390/bs12090343", "CorpusId": 252387278}, "url": - "https://www.semanticscholar.org/paper/355d82351367caf5ea6617027f04f4cb1643ba1b", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2022-09-18", "journal": {"pages": "1-9", "name": "2022 + IEEE/AIAA 41st Digital Avionics Systems Conference (DASC)"}, "authors": [{"authorId": + "1580488826", "name": "Katherine L. O''Grady"}, {"authorId": "93977959", "name": + "Steven D. Harbour"}, {"authorId": "2189465432", "name": "Ashlie Abballe"}, + {"authorId": "145468237", "name": "Kelly Cohen"}]}, {"paperId": "355d82351367caf5ea6617027f04f4cb1643ba1b", + "externalIds": {"DOI": "10.3390/bs12090343", "CorpusId": 252387278}, "corpusId": + 252387278, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/355d82351367caf5ea6617027f04f4cb1643ba1b", "title": "Ethical Risk Factors and Mechanisms in Artificial Intelligence Decision Making", "abstract": "While artificial intelligence (AI) technology can enhance social wellbeing and progress, it also generates ethical decision-making dilemmas @@ -2375,14 +2909,15 @@ interactions: governance of ethical risks in AI decision making from the perspectives of management, research, and development.", "venue": "Behavioral Sciences", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-09-16", "journal": {"name": "Behavioral Sciences"}, - "authors": [{"authorId": "9422483", "name": "G. Hongjun"}, {"authorId": "2185541864", - "name": "Dong Liye"}, {"authorId": "70020448", "name": "Zhao Aiwu"}]}, {"paperId": - "2a215364e3fbe5a4c45b61dc5bd869399fa82661", "externalIds": {"DBLP": "conf/coling/ChoudhuryRA22", - "ACL": "2022.coling-1.8", "ArXiv": "2209.07430", "DOI": "10.48550/arXiv.2209.07430", - "CorpusId": 252283929}, "url": "https://www.semanticscholar.org/paper/2a215364e3fbe5a4c45b61dc5bd869399fa82661", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-328X/12/9/343/pdf?version=1663728465", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-09-16", "journal": {"name": "Behavioral Sciences"}, "authors": [{"authorId": + "9422483", "name": "G. Hongjun"}, {"authorId": "2185541864", "name": "Dong + Liye"}, {"authorId": "70020448", "name": "Zhao Aiwu"}]}, {"paperId": "2a215364e3fbe5a4c45b61dc5bd869399fa82661", + "externalIds": {"DBLP": "conf/coling/ChoudhuryRA22", "ACL": "2022.coling-1.8", + "ArXiv": "2209.07430", "DOI": "10.48550/arXiv.2209.07430", "CorpusId": 252283929}, + "corpusId": 252283929, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a215364e3fbe5a4c45b61dc5bd869399fa82661", "title": "Machine Reading, Fast and Slow: When Do Models \u201cUnderstand\u201d Language?", "abstract": "Two of the most fundamental issues in Natural Language Understanding (NLU) at present are: (a) how it can established whether deep @@ -2398,15 +2933,17 @@ interactions: even they struggle with generalization, suggesting that they still learn specific lexical patterns rather than the general principles of comparison.", "venue": "COLING", "year": 2022, "referenceCount": 81, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2022-09-15", "journal": {"volume": "abs/2209.07430", - "name": "ArXiv"}, "authors": [{"authorId": "3324957", "name": "Sagnik Ray - Choudhury"}, {"authorId": "145046059", "name": "Anna Rogers"}, {"authorId": - "1736067", "name": "Isabelle Augenstein"}]}, {"paperId": "d65f9540e550c3def7df10f548ca0c9cec4961f6", - "externalIds": {"ArXiv": "2209.07455", "DBLP": "journals/corr/abs-2209-07455", - "DOI": "10.48550/arXiv.2209.07455", "CorpusId": 252283948}, "url": "https://www.semanticscholar.org/paper/d65f9540e550c3def7df10f548ca0c9cec4961f6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-09-15", + "journal": {"volume": "abs/2209.07430", "name": "ArXiv"}, "authors": [{"authorId": + "3324957", "name": "Sagnik Ray Choudhury"}, {"authorId": "145046059", "name": + "Anna Rogers"}, {"authorId": "1736067", "name": "Isabelle Augenstein"}]}, + {"paperId": "d65f9540e550c3def7df10f548ca0c9cec4961f6", "externalIds": {"ArXiv": + "2209.07455", "DBLP": "journals/corr/abs-2209-07455", "DOI": "10.48550/arXiv.2209.07455", + "CorpusId": 252283948}, "corpusId": 252283948, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d65f9540e550c3def7df10f548ca0c9cec4961f6", "title": "A Genetic Quantum Annealing Algorithm", "abstract": "A genetic algorithm (GA) is a search-based optimization technique based on the principles of Genetics and Natural Selection. We present an algorithm which enhances the classical @@ -2423,15 +2960,16 @@ interactions: ). We \ufb01nd our algorithm to be signi\ufb01cantly more powerful on several simple problems than a classical GA.", "venue": "ArXiv", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-15", "journal": {"volume": "abs/2209.07455", "name": "ArXiv"}, "authors": [{"authorId": "145487850", "name": "S. Abel"}, {"authorId": "2171655652", "name": "Luca A. Nutricati"}, {"authorId": "15740682", "name": "M. Spannowsky"}]}, {"paperId": "b5cbf377f8fb8c40e5b87bafc072fa73c067a8be", "externalIds": {"ArXiv": "2209.07449", "DBLP": "journals/corr/abs-2209-07449", - "DOI": "10.48550/arXiv.2209.07449", "CorpusId": 252283919}, "url": "https://www.semanticscholar.org/paper/b5cbf377f8fb8c40e5b87bafc072fa73c067a8be", + "DOI": "10.48550/arXiv.2209.07449", "CorpusId": 252283919}, "corpusId": 252283919, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b5cbf377f8fb8c40e5b87bafc072fa73c067a8be", "title": "Extended Intelligence", "abstract": "We argue that intelligence \u2014 construed as the disposition to perform tasks successfully\u2014is a property of systems composed of agents and their contexts. This is the thesis @@ -2447,16 +2985,17 @@ interactions: Our thesis carries strong implications for how intelligence is analyzed in the context of both psychology and artificial intelligence.", "venue": "ArXiv", "year": 2022, "referenceCount": 37, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Biology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Biology", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2022-09-15", "journal": {"volume": - "abs/2209.07449", "name": "ArXiv"}, "authors": [{"authorId": "5452602", "name": - "D. Barack"}, {"authorId": "2689633", "name": "Andrew Jaegle"}]}, {"paperId": - "6b93fb593316693c04c562d2df1ca8ff4b11d4be", "externalIds": {"ArXiv": "2209.06715", - "CorpusId": 252222592}, "url": "https://www.semanticscholar.org/paper/6b93fb593316693c04c562d2df1ca8ff4b11d4be", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Psychology", + "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-15", "journal": + {"volume": "abs/2209.07449", "name": "ArXiv"}, "authors": [{"authorId": "5452602", + "name": "D. Barack"}, {"authorId": "2689633", "name": "Andrew Jaegle"}]}, + {"paperId": "6b93fb593316693c04c562d2df1ca8ff4b11d4be", "externalIds": {"ArXiv": + "2209.06715", "CorpusId": 252222592}, "corpusId": 252222592, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6b93fb593316693c04c562d2df1ca8ff4b11d4be", "title": "Generalised hardness of approximation and the SCI hierarchy -- On determining the boundaries of training algorithms in AI", "abstract": "A BSTRACT . Hardness of approximation (HA) \u2013 the phenomenon that, assuming P 6 @@ -2483,13 +3022,18 @@ interactions: Complexity Index (SCI) hierarchy and facilitate a program for detecting the GHA phenomenon throughout computational mathematics and AI.", "venue": "", "year": 2022, "referenceCount": 91, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-09-14", "journal": null, "authors": [{"authorId": "1580676961", "name": - "Luca Eva Gazdag"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": - "20f113aee1bbbd97dc33960b9002cce4dd521c6a", "externalIds": {"DBLP": "conf/icdl/MatternLEAT22", - "DOI": "10.1109/ICDL53763.2022.9962192", "CorpusId": 254100898}, "url": "https://www.semanticscholar.org/paper/20f113aee1bbbd97dc33960b9002cce4dd521c6a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2022-09-14", "journal": null, "authors": [{"authorId": + "1580676961", "name": "Luca Eva Gazdag"}, {"authorId": "145920634", "name": + "A. Hansen"}]}, {"paperId": "20f113aee1bbbd97dc33960b9002cce4dd521c6a", "externalIds": + {"DBLP": "conf/icdl/MatternLEAT22", "DOI": "10.1109/ICDL53763.2022.9962192", + "CorpusId": 254100898}, "corpusId": 254100898, "publicationVenue": {"id": + "43cdd274-e9fc-43e9-acf3-f020552ac76a", "name": "International Conference + on Development and Learning", "type": "conference", "alternate_names": ["Int + Conf Dielectr Liq", "Int Conf Dev Learn", "International Conference on Dielectric + Liquids", "ICDL"]}, "url": "https://www.semanticscholar.org/paper/20f113aee1bbbd97dc33960b9002cce4dd521c6a", "title": "MIMo: A Multi-Modal Infant Model for Studying Cognitive Development in Humans and AIs", "abstract": "A central challenge in the early cognitive development of humans is making sense of the rich multimodal experiences originating @@ -2504,17 +3048,21 @@ interactions: learning in AI. We describe the design and interfaces of MIMo and provide examples illustrating its use.", "venue": "International Conference on Development and Learning", "year": 2022, "referenceCount": 51, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2022-09-12", "journal": {"pages": "23-29", "name": "2022 - IEEE International Conference on Development and Learning (ICDL)"}, "authors": - [{"authorId": "2192854305", "name": "Dominik Mattern"}, {"authorId": "2192848477", - "name": "Francisco M. L\u00f3pez"}, {"authorId": "2060438433", "name": "Markus - R. Ernst"}, {"authorId": "1387894646", "name": "A. Aubret"}, {"authorId": - "2774681", "name": "J. Triesch"}]}, {"paperId": "4481988d755d7ae9059ab136b19dd74cf3f444d1", - "externalIds": {"DBLP": "conf/icdl/MooreORM22", "DOI": "10.1109/ICDL53763.2022.9962183", - "CorpusId": 254102647}, "url": "https://www.semanticscholar.org/paper/4481988d755d7ae9059ab136b19dd74cf3f444d1", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2022-09-12", "journal": + {"pages": "23-29", "name": "2022 IEEE International Conference on Development + and Learning (ICDL)"}, "authors": [{"authorId": "2192854305", "name": "Dominik + Mattern"}, {"authorId": "2192848477", "name": "Francisco M. L\u00f3pez"}, + {"authorId": "2060438433", "name": "M. Ernst"}, {"authorId": "1387894646", + "name": "A. Aubret"}, {"authorId": "2774681", "name": "J. Triesch"}]}, {"paperId": + "4481988d755d7ae9059ab136b19dd74cf3f444d1", "externalIds": {"DBLP": "conf/icdl/MooreORM22", + "DOI": "10.1109/ICDL53763.2022.9962183", "CorpusId": 254102647}, "corpusId": + 254102647, "publicationVenue": {"id": "43cdd274-e9fc-43e9-acf3-f020552ac76a", + "name": "International Conference on Development and Learning", "type": "conference", + "alternate_names": ["Int Conf Dielectr Liq", "Int Conf Dev Learn", "International + Conference on Dielectric Liquids", "ICDL"]}, "url": "https://www.semanticscholar.org/paper/4481988d755d7ae9059ab136b19dd74cf3f444d1", "title": "Leveraging Developmental Psychology to Evaluate Artificial Intelligence", "abstract": "Artificial intelligence (AI) systems do not exhibit human-like common sense. The principles and practices of experimental psychology \u2013 @@ -2525,16 +3073,17 @@ interactions: tools used in the field of infant cognitive development to the field of AI evaluation.", "venue": "International Conference on Development and Learning", "year": 2022, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2022-09-12", "journal": {"pages": "36-41", "name": "2022 - IEEE International Conference on Development and Learning (ICDL)"}, "authors": - [{"authorId": "2147338797", "name": "David Moore"}, {"authorId": "29887652", - "name": "L. Oakes"}, {"authorId": "46777315", "name": "V. Romero"}, {"authorId": - "5326533", "name": "Koleen McCrink"}]}, {"paperId": "aedd38f23f74e66c7498a460b78dfe53436b0c07", - "externalIds": {"DOI": "10.21439/conexoes.v16i0.2282", "CorpusId": 252571851}, - "url": "https://www.semanticscholar.org/paper/aedd38f23f74e66c7498a460b78dfe53436b0c07", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2022-09-12", "journal": + {"pages": "36-41", "name": "2022 IEEE International Conference on Development + and Learning (ICDL)"}, "authors": [{"authorId": "2147338797", "name": "David + Moore"}, {"authorId": "29887652", "name": "L. Oakes"}, {"authorId": "46777315", + "name": "V. Romero"}, {"authorId": "5326533", "name": "Koleen McCrink"}]}, + {"paperId": "aedd38f23f74e66c7498a460b78dfe53436b0c07", "externalIds": {"DOI": + "10.21439/conexoes.v16i0.2282", "CorpusId": 252571851}, "corpusId": 252571851, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aedd38f23f74e66c7498a460b78dfe53436b0c07", "title": "DESENVOLVIMENTO DE INTELIG\u00caNCIAS ARTIFICIAIS (IA\u2019s) NA EDUCA\u00c7\u00c3O: UMA REVIS\u00c3O SISTEM\u00c1TICA DE LITERATURA", "abstract": "A utiliza\u00e7\u00e3o de novas tecnologias computacionais no ensino, sobretudo, @@ -2557,13 +3106,15 @@ interactions: limitadores da implementa\u00e7\u00e3o das IA\u2019s na educa\u00e7\u00e3o.", "venue": "Conex\u00f5es - Ci\u00eancia e Tecnologia", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2022-09-12", "journal": {"name": "Conex\u00f5es - Ci\u00eancia e Tecnologia"}, - "authors": [{"authorId": "71571661", "name": "Carlos Eduardo Albuquerque Fernandes"}, - {"authorId": "145026126", "name": "A. Ribeiro"}, {"authorId": "49009068", - "name": "F. H. L. Vasconcelos"}]}, {"paperId": "c4c4ebea517f2a6f100b6da753ae721fd183e60b", - "externalIds": {"DOI": "10.5753/sbseg.2022.225334", "CorpusId": 252392855}, - "url": "https://www.semanticscholar.org/paper/c4c4ebea517f2a6f100b6da753ae721fd183e60b", + "openAccessPdf": {"url": "http://conexoes.ifce.edu.br/index.php/conexoes/article/download/2282/1616", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2022-09-12", "journal": {"name": "Conex\u00f5es + - Ci\u00eancia e Tecnologia"}, "authors": [{"authorId": "71571661", "name": + "Carlos Eduardo Albuquerque Fernandes"}, {"authorId": "145026126", "name": + "A. Ribeiro"}, {"authorId": "49009068", "name": "F. H. L. Vasconcelos"}]}, + {"paperId": "c4c4ebea517f2a6f100b6da753ae721fd183e60b", "externalIds": {"DOI": + "10.5753/sbseg.2022.225334", "CorpusId": 252392855}, "corpusId": 252392855, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c4c4ebea517f2a6f100b6da753ae721fd183e60b", "title": "Ataques Automatizados de Engenharia Social com o uso de Bots em Redes Sociais Profissionais", "abstract": "As intera\u00e7\u00f5es humanas virtuais t\u00eam sido ampliadas com o uso crescente da Internet e redes sociais, @@ -2580,7 +3131,8 @@ interactions: com um Bot malicioso.", "venue": "Anais do XXII Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg 2022)", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://sol.sbc.org.br/index.php/sbseg/article/download/21665/21489", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-09-12", "journal": {"name": "Anais do XXII Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais (SBSeg 2022)"}, "authors": [{"authorId": "2185584895", "name": @@ -2588,7 +3140,7 @@ interactions: {"authorId": "2092231569", "name": "J\u00e9ferson C. Nobre"}, {"authorId": "2105551588", "name": "Lisandro Z. Granville"}]}, {"paperId": "7afc8c00c721dd83b7109b600e6c9415a877bcb8", "externalIds": {"DOI": "10.1109/ASYU56188.2022.9925271", "CorpusId": 253251495}, - "url": "https://www.semanticscholar.org/paper/7afc8c00c721dd83b7109b600e6c9415a877bcb8", + "corpusId": 253251495, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7afc8c00c721dd83b7109b600e6c9415a877bcb8", "title": "Affecting Factors of Efficiency in Photovoltaic Energy Systems and Productivity-Enhancing Suggestions", "abstract": "In recent years, hazardous gases emission from fossil fuels has attracted public concerns due to its @@ -2609,16 +3161,18 @@ interactions: these parameters should also be measured and a surface temperature should be determined accordingly.", "venue": "2022 Innovations in Intelligent Systems and Applications Conference (ASYU)", "year": 2022, "referenceCount": 59, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["Conference"], "publicationDate": "2022-09-07", "journal": {"pages": "1-6", - "name": "2022 Innovations in Intelligent Systems and Applications Conference - (ASYU)"}, "authors": [{"authorId": "92836991", "name": "\u0130. Ay"}, {"authorId": - "91868074", "name": "M. Kademli"}, {"authorId": "31370878", "name": "\u015e. - Karabulut"}, {"authorId": "101402242", "name": "Serkan Sava\u015f"}]}, {"paperId": - "decd9837fc5e347e16e7d5c0f6617afcaa9207b2", "externalIds": {"DBLP": "journals/jzusc/BuWYTZYP22", - "DOI": "10.1631/FITEE.2100551", "CorpusId": 252117051}, "url": "https://www.semanticscholar.org/paper/decd9837fc5e347e16e7d5c0f6617afcaa9207b2", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", + "source": "s2-fos-model"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-09-07", + "journal": {"pages": "1-6", "name": "2022 Innovations in Intelligent Systems + and Applications Conference (ASYU)"}, "authors": [{"authorId": "92836991", + "name": "\u0130. Ay"}, {"authorId": "91868074", "name": "M. Kademli"}, {"authorId": + "31370878", "name": "\u015e. Karabulut"}, {"authorId": "101402242", "name": + "Serkan Sava\u015f"}]}, {"paperId": "decd9837fc5e347e16e7d5c0f6617afcaa9207b2", + "externalIds": {"DBLP": "journals/jzusc/BuWYTZYP22", "DOI": "10.1631/FITEE.2100551", + "CorpusId": 252117051}, "corpusId": 252117051, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/decd9837fc5e347e16e7d5c0f6617afcaa9207b2", "title": "Synaptic devices based on semiconductor nanocrystals", "abstract": "To meet a growing demand for information processing, brain-inspired neuromorphic devices have been intensively studied in recent years. As an important type @@ -2633,19 +3187,20 @@ interactions: of the devices. Finally, we discuss existing problems and challenges of synaptic devices based on semiconductor NCs.", "venue": "Frontiers of Information Technology & Electronic Engineering", "year": 2022, "referenceCount": 119, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-09-06", - "journal": {"volume": "23", "pages": "1579 - 1601", "name": "Frontiers of - Information Technology & Electronic Engineering"}, "authors": [{"authorId": - "2184276234", "name": "Mingxuan Bu"}, {"authorId": "2144333864", "name": "Yue - Wang"}, {"authorId": "145667513", "name": "Lei Yin"}, {"authorId": "153419910", - "name": "Zhouyu Tong"}, {"authorId": "2108656188", "name": "Yiqiang Zhang"}, - {"authorId": "2122835409", "name": "Deren Yang"}, {"authorId": "8848630", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Chemistry", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2022-09-06", "journal": {"volume": "23", "pages": "1579 - 1601", "name": + "Frontiers of Information Technology & Electronic Engineering"}, "authors": + [{"authorId": "2184276234", "name": "Mingxuan Bu"}, {"authorId": "2144333864", + "name": "Yue Wang"}, {"authorId": "145667513", "name": "Lei Yin"}, {"authorId": + "153419910", "name": "Zhouyu Tong"}, {"authorId": "2108656188", "name": "Yiqiang + Zhang"}, {"authorId": "2122835409", "name": "Deren Yang"}, {"authorId": "8848630", "name": "X. Pi"}]}, {"paperId": "1622b9ef7c9ce0ae861ea8bb7ab309de3a3d2b97", "externalIds": {"ArXiv": "2211.12839", "DBLP": "journals/corr/abs-2211-12839", - "DOI": "10.48550/arXiv.2211.12839", "CorpusId": 253801973}, "url": "https://www.semanticscholar.org/paper/1622b9ef7c9ce0ae861ea8bb7ab309de3a3d2b97", + "DOI": "10.48550/arXiv.2211.12839", "CorpusId": 253801973}, "corpusId": 253801973, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1622b9ef7c9ce0ae861ea8bb7ab309de3a3d2b97", "title": "Newly Developed Flexible Grid Trading Model Combined ANN and SSO algorithm", "abstract": ": In modern society, the trading methods and strategies used in financial market have gradually changed from traditional on-site trading @@ -2669,16 +3224,20 @@ interactions: effort in the trading market, obtains outperformed investment return rate and model robustness, and can properly control the balance between risk and return.", "venue": "ArXiv", "year": 2022, "referenceCount": 48, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Economics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Economics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2022-09-05", "journal": {"volume": - "abs/2211.12839", "name": "ArXiv"}, "authors": [{"authorId": "143988608", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Economics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-05", "journal": + {"volume": "abs/2211.12839", "name": "ArXiv"}, "authors": [{"authorId": "143988608", "name": "W. Yeh"}, {"authorId": "33266081", "name": "Yu-Hsin Hsieh"}, {"authorId": "1781139", "name": "Chia-Ling Huang"}]}, {"paperId": "c8f6e01bbc2f65e1736908971faccc84e12c9e65", "externalIds": {"DBLP": "conf/bcca/BhatiaS22", "DOI": "10.1109/BCCA55292.2022.9922390", - "CorpusId": 253251401}, "url": "https://www.semanticscholar.org/paper/c8f6e01bbc2f65e1736908971faccc84e12c9e65", + "CorpusId": 253251401}, "corpusId": 253251401, "publicationVenue": {"id": + "6cbed6ad-fb46-4c9a-8477-75227ff3a47e", "name": "International Conference + on Blockchain Computing and Applications", "type": "conference", "alternate_names": + ["BCCA", "Int Conf Blockchain Comput Appl"], "url": "https://ieeexplore.ieee.org/xpl/conhome/1839124/all-proceedings"}, + "url": "https://www.semanticscholar.org/paper/c8f6e01bbc2f65e1736908971faccc84e12c9e65", "title": "Decentralized Federated Learning: A Comprehensive Survey and a New Blockchain-based Data Evaluation Scheme", "abstract": "Blockchain and Deep Learning (DL) are two of the most revolutionary concepts in the field of Computer @@ -2700,16 +3259,17 @@ interactions: as methods to reduce storage overhead in decentralized federated learning are discussed in this paper.", "venue": "International Conference on Blockchain Computing and Applications", "year": 2022, "referenceCount": 27, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": - "2022-09-05", "journal": {"pages": "289-296", "name": "2022 Fourth International - Conference on Blockchain Computing and Applications (BCCA)"}, "authors": [{"authorId": - "2189468811", "name": "Laveen Bhatia"}, {"authorId": "2091093915", "name": - "Saeed Samet"}]}, {"paperId": "5f3103c35f71ede8ac48e15f222c68a53f64118c", - "externalIds": {"DBLP": "journals/corr/abs-2209-12623", "ArXiv": "2209.12623", - "DOI": "10.48550/arXiv.2209.12623", "CorpusId": 252531558}, "url": "https://www.semanticscholar.org/paper/5f3103c35f71ede8ac48e15f222c68a53f64118c", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", + "Review"], "publicationDate": "2022-09-05", "journal": {"pages": "289-296", + "name": "2022 Fourth International Conference on Blockchain Computing and + Applications (BCCA)"}, "authors": [{"authorId": "2189468811", "name": "Laveen + Bhatia"}, {"authorId": "2091093915", "name": "Saeed Samet"}]}, {"paperId": + "5f3103c35f71ede8ac48e15f222c68a53f64118c", "externalIds": {"DBLP": "journals/corr/abs-2209-12623", + "ArXiv": "2209.12623", "DOI": "10.48550/arXiv.2209.12623", "CorpusId": 252531558}, + "corpusId": 252531558, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5f3103c35f71ede8ac48e15f222c68a53f64118c", "title": "Cognitive Architecture for Co-Evolutionary Hybrid Intelligence", "abstract": ". This paper 1 questions the feasibility of a strong (general) data-centric arti\ufb01cial intelligence (AI). The disadvantages of this type @@ -2730,26 +3290,30 @@ interactions: about the feasibility of developing intelligent systems with humans in the problem solving loop.", "venue": "ArXiv", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2022-09-05", "journal": {"volume": "abs/2209.12623", "name": "ArXiv"}, "authors": - [{"authorId": "2047484", "name": "K. Krinkin"}, {"authorId": "3425579", "name": - "Y. Shichkina"}]}, {"paperId": "b8bf1265dabd54a47181b44a4a00ca70fd0d7135", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-09-05", "journal": {"volume": "abs/2209.12623", + "name": "ArXiv"}, "authors": [{"authorId": "2047484", "name": "K. Krinkin"}, + {"authorId": "3425579", "name": "Y. Shichkina"}]}, {"paperId": "b8bf1265dabd54a47181b44a4a00ca70fd0d7135", "externalIds": {"PubMedCentral": "9442555", "DOI": "10.1007/s11739-022-03080-z", - "CorpusId": 252072991, "PubMed": "36063262"}, "url": "https://www.semanticscholar.org/paper/b8bf1265dabd54a47181b44a4a00ca70fd0d7135", + "CorpusId": 252072991, "PubMed": "36063262"}, "corpusId": 252072991, "publicationVenue": + {"id": "d07fa807-5206-4c39-8636-bec15ca2c172", "name": "Internal and Emergency + Medicine", "type": "journal", "alternate_names": ["Intern Emerg Med"], "issn": + "1828-0447", "url": "https://link.springer.com/journal/11739"}, "url": "https://www.semanticscholar.org/paper/b8bf1265dabd54a47181b44a4a00ca70fd0d7135", "title": "Progress and prospects for artificial intelligence in clinical practice: learning from COVID-19", "abstract": null, "venue": "Internal and Emergency Medicine", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-09-05", "journal": {"volume": "17", "pages": "1855 - 1857", "name": - "Internal and Emergency Medicine"}, "authors": [{"authorId": "48920527", "name": - "P. Ferrara"}, {"authorId": "1742452", "name": "S. Battiato"}, {"authorId": - "4771535", "name": "R. Polosa"}]}, {"paperId": "854b0decc07598100c3293e713ee86f5bc1b5524", - "externalIds": {"DOI": "10.1109/RusAutoCon54946.2022.9896273", "CorpusId": - 252576640}, "url": "https://www.semanticscholar.org/paper/854b0decc07598100c3293e713ee86f5bc1b5524", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11739-022-03080-z.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-05", "journal": + {"volume": "17", "pages": "1855 - 1857", "name": "Internal and Emergency Medicine"}, + "authors": [{"authorId": "48920527", "name": "P. Ferrara"}, {"authorId": "1742452", + "name": "S. Battiato"}, {"authorId": "4771535", "name": "R. Polosa"}]}, {"paperId": + "854b0decc07598100c3293e713ee86f5bc1b5524", "externalIds": {"DOI": "10.1109/RusAutoCon54946.2022.9896273", + "CorpusId": 252576640}, "corpusId": 252576640, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/854b0decc07598100c3293e713ee86f5bc1b5524", "title": "Simulation of the Autonomous Unmanned Underwater Vehicle Control System", "abstract": "The creation of an effective autonomous underwater vehicles (AUV) control system is one of the main problems in the development of underwater @@ -2762,14 +3326,15 @@ interactions: system modeling stand, presents the results of modeling the heavy-class AUV control system.", "venue": "2022 International Russian Automation Conference (RusAutoCon)", "year": 2022, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "2022-09-04", "journal": {"pages": "262-266", "name": "2022 - International Russian Automation Conference (RusAutoCon)"}, "authors": [{"authorId": - "14317139", "name": "V. S. Bykova"}, {"authorId": "2186346527", "name": "Angrey - I. Mashoshin"}]}, {"paperId": "40d40339d95b3a1e394595964d2d9bc3389f64cb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Conference"], "publicationDate": "2022-09-04", "journal": {"pages": "262-266", + "name": "2022 International Russian Automation Conference (RusAutoCon)"}, + "authors": [{"authorId": "14317139", "name": "V. S. Bykova"}, {"authorId": + "2186346527", "name": "Angrey I. Mashoshin"}]}, {"paperId": "40d40339d95b3a1e394595964d2d9bc3389f64cb", "externalIds": {"PubMedCentral": "9495402", "DOI": "10.3390/bs12090343", "CorpusId": - 252438571, "PubMed": "36135147"}, "url": "https://www.semanticscholar.org/paper/40d40339d95b3a1e394595964d2d9bc3389f64cb", + 252438571, "PubMed": "36135147"}, "corpusId": 252438571, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/40d40339d95b3a1e394595964d2d9bc3389f64cb", "title": "Ethical Risk Factors and Mechanisms in Artificial Intelligence Decision Making", "abstract": "While artificial intelligence (AI) technology can enhance social wellbeing and progress, it also generates ethical decision-making dilemmas @@ -2786,15 +3351,16 @@ interactions: governance of ethical risks in AI decision making from the perspectives of management, research, and development.", "venue": "Behavioral sciences", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-328X/12/9/343/pdf?version=1663728465", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": "12", "name": "Behavioral Sciences"}, "authors": [{"authorId": "40540443", "name": "Hongjun Guan"}, {"authorId": "93116964", "name": "Li-Rong Dong"}, {"authorId": "6953583", "name": "Aiwu Zhao"}]}, {"paperId": "f0aad7c990b2145a8e6a1c39d71744e8d611c230", "externalIds": {"DOI": "10.1161/CIRCIMAGING.122.014744", "CorpusId": 252386011, "PubMed": - "36126127"}, "url": "https://www.semanticscholar.org/paper/f0aad7c990b2145a8e6a1c39d71744e8d611c230", + "36126127"}, "corpusId": 252386011, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f0aad7c990b2145a8e6a1c39d71744e8d611c230", "title": "Deep Learning and Artificial Intelligence: What Does the Cardiologist Really Need to Know?", "abstract": "The opinions expressed in this article are not necessarily those of the editors or of the American Heart Association. @@ -2805,14 +3371,14 @@ interactions: see page 660. \u00a9 2022 American Heart Association, Inc. EDITORIAL", "venue": "Circulation. Cardiovascular imaging", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Editorial", "Review"], "publicationDate": "2022-09-01", "journal": {"volume": "15", "pages": "e014744", "name": "Circulation: Cardiovascular Imaging"}, "authors": [{"authorId": "35837528", "name": "J. Case"}]}, {"paperId": "2dd6484a74c65b15debaad90d625d245b4b9a7f1", "externalIds": {"PubMedCentral": "9505413", "DOI": "10.3390/life12091430", "CorpusId": 252320741, "PubMed": - "36143468"}, "url": "https://www.semanticscholar.org/paper/2dd6484a74c65b15debaad90d625d245b4b9a7f1", + "36143468"}, "corpusId": 252320741, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2dd6484a74c65b15debaad90d625d245b4b9a7f1", "title": "Artificial Intelligence in Biological Sciences", "abstract": "Artificial intelligence (AI), currently a cutting-edge concept, has the potential to improve the quality of life of human beings. The fields of AI and biological @@ -2834,15 +3400,22 @@ interactions: setup. This article summarizes the potentials of AI and their application to several fields of biology, such as medicine, agriculture, and bio-based industry.", "venue": "Life", "year": 2022, "referenceCount": 158, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2022-09-01", "journal": {"volume": - "12", "name": "Life"}, "authors": [{"authorId": "2185193714", "name": "Abhaya - Bhardwaj"}, {"authorId": "2133621914", "name": "Shristi Kishore"}, {"authorId": - "5479010", "name": "D. Pandey"}]}, {"paperId": "b40e7b1d917613489dda2df9676bf48dc67eedbc", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2075-1729/12/9/1430/pdf?version=1663300683", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-09-01", + "journal": {"volume": "12", "name": "Life"}, "authors": [{"authorId": "2185193714", + "name": "Abhaya Bhardwaj"}, {"authorId": "2133621914", "name": "Shristi Kishore"}, + {"authorId": "5479010", "name": "D. Pandey"}]}, {"paperId": "b40e7b1d917613489dda2df9676bf48dc67eedbc", "externalIds": {"PubMedCentral": "9505448", "DOI": "10.3390/ijms231810712", - "CorpusId": 252329410, "PubMed": "36142623"}, "url": "https://www.semanticscholar.org/paper/b40e7b1d917613489dda2df9676bf48dc67eedbc", + "CorpusId": 252329410, "PubMed": "36142623"}, "corpusId": 252329410, "publicationVenue": + {"id": "8506a01a-40b8-4e6f-bbb8-ce2492139c15", "name": "International Journal + of Molecular Sciences", "type": "journal", "alternate_names": ["Int J Mol + Sci"], "issn": "1422-0067", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-157693", + "alternate_urls": ["https://www.mdpi.com/journal/ijms", "http://www.mdpi.com/journal/ijms/", + "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-157693"]}, "url": + "https://www.semanticscholar.org/paper/b40e7b1d917613489dda2df9676bf48dc67eedbc", "title": "Machine Learning for Property Prediction and Optimization of Polymeric Nanocomposites: A State-of-the-Art", "abstract": "Recently, the field of polymer nanocomposites has been an area of high scientific and industrial attention @@ -2865,29 +3438,37 @@ interactions: selected examples are discussed. Finally, conclusions and future perspectives are highlighted.", "venue": "International Journal of Molecular Sciences", "year": 2022, "referenceCount": 181, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2022-09-01", "journal": {"volume": "23", "name": "International - Journal of Molecular Sciences"}, "authors": [{"authorId": "2185231262", "name": - "Elizabeth Champa-Bujaico"}, {"authorId": "1403138863", "name": "P. Garc\u00eda-D\u00edaz"}, + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1422-0067/23/18/10712/pdf?version=1663817321", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2022-09-01", "journal": {"volume": "23", "name": "International Journal of + Molecular Sciences"}, "authors": [{"authorId": "2185231262", "name": "Elizabeth + Champa-Bujaico"}, {"authorId": "1403138863", "name": "P. Garc\u00eda-D\u00edaz"}, {"authorId": "1397968395", "name": "A. D\u00edez-Pascual"}]}, {"paperId": "4dfab2aca3537ed5ea15f754e229d49d0b21f933", "externalIds": {"DOI": "10.1016/j.critrevonc.2022.103808", - "CorpusId": 252150726, "PubMed": "36087852"}, "url": "https://www.semanticscholar.org/paper/4dfab2aca3537ed5ea15f754e229d49d0b21f933", + "CorpusId": 252150726, "PubMed": "36087852"}, "corpusId": 252150726, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4dfab2aca3537ed5ea15f754e229d49d0b21f933", "title": "Machine Learning applications in gynecological cancer: a critical review.", "abstract": null, "venue": "Critical reviews in oncology/hematology", "year": 2022, "referenceCount": 72, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-09-01", - "journal": {"pages": "\n 103808\n ", "name": "Critical reviews - in oncology/hematology"}, "authors": [{"authorId": "40911527", "name": "O. - Fiste"}, {"authorId": "6314866", "name": "M. Liontos"}, {"authorId": "2163674", - "name": "F. Zagouri"}, {"authorId": "1985997", "name": "G. Stamatakos"}, {"authorId": - "2163473990", "name": "Meletios A Dimopoulos"}]}, {"paperId": "98f3583d2cb59d5fd0907ea351e2d652a9c70a8b", - "externalIds": {"DBLP": "journals/tits/BesinovicDFGLLM22", "DOI": "10.1109/TITS.2021.3131637", - "CorpusId": 252223542}, "url": "https://www.semanticscholar.org/paper/98f3583d2cb59d5fd0907ea351e2d652a9c70a8b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2022-09-01", "journal": {"pages": "\n 103808\n ", "name": + "Critical reviews in oncology/hematology"}, "authors": [{"authorId": "40911527", + "name": "O. Fiste"}, {"authorId": "6314866", "name": "M. Liontos"}, {"authorId": + "2163674", "name": "F. Zagouri"}, {"authorId": "1985997", "name": "G. Stamatakos"}, + {"authorId": "2163473990", "name": "Meletios A Dimopoulos"}]}, {"paperId": + "98f3583d2cb59d5fd0907ea351e2d652a9c70a8b", "externalIds": {"DBLP": "journals/tits/BesinovicDFGLLM22", + "DOI": "10.1109/TITS.2021.3131637", "CorpusId": 252223542}, "corpusId": 252223542, + "publicationVenue": {"id": "3066c994-687a-417d-9f08-dabb65f37093", "name": + "IEEE transactions on intelligent transportation systems (Print)", "type": + "journal", "alternate_names": ["IEEE trans intell transp syst (print", "IEEE + Trans Intell Transp Syst", "IEEE Transactions on Intelligent Transportation + Systems"], "issn": "1524-9050", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=6979"}, + "url": "https://www.semanticscholar.org/paper/98f3583d2cb59d5fd0907ea351e2d652a9c70a8b", "title": "Artificial Intelligence in Railway Transport: Taxonomy, Regulations, and Applications", "abstract": "Artificial Intelligence (AI) is becoming pervasive in most engineering domains, and railway transport is no exception. However, @@ -2905,22 +3486,25 @@ interactions: aspects of ethics and explainability of AI in railways are also introduced. The connection between AI concepts and railway subdomains has been supported by relevant research addressing existing and planned applications in order - to provide some pointers to promising directions.", "venue": "IEEE Transactions - on Intelligent Transportation Systems", "year": 2022, "referenceCount": 120, - "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-09-01", "journal": - {"volume": "23", "pages": "14011-14024", "name": "IEEE Transactions on Intelligent - Transportation Systems"}, "authors": [{"authorId": "7369644", "name": "Nikola - Be\u0161inovi\u0107"}, {"authorId": "2164681475", "name": "Lorenzo De Donato"}, - {"authorId": "50005912", "name": "Francesco Flammini"}, {"authorId": "1774886", - "name": "R. Goverde"}, {"authorId": "2164760844", "name": "Zhiyuan Lin"}, - {"authorId": "48757839", "name": "Ronghui Liu"}, {"authorId": "47195132", - "name": "S. Marrone"}, {"authorId": "38351900", "name": "R. Nardone"}, {"authorId": - "80655344", "name": "Tianli Tang"}, {"authorId": "102360012", "name": "V. - Vittorini"}]}, {"paperId": "5923b872837d5ba00b80d60d93f79f14d9f3bdc4", "externalIds": - {"DOI": "10.1093/plankt/fbac042", "CorpusId": 251942805}, "url": "https://www.semanticscholar.org/paper/5923b872837d5ba00b80d60d93f79f14d9f3bdc4", + to provide some pointers to promising directions.", "venue": "IEEE transactions + on intelligent transportation systems (Print)", "year": 2022, "referenceCount": + 120, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-09-01", "journal": {"volume": "23", "pages": "14011-14024", + "name": "IEEE Transactions on Intelligent Transportation Systems"}, "authors": + [{"authorId": "7369644", "name": "Nikola Be\u0161inovi\u0107"}, {"authorId": + "2164681475", "name": "Lorenzo De Donato"}, {"authorId": "50005912", "name": + "Francesco Flammini"}, {"authorId": "1774886", "name": "R. Goverde"}, {"authorId": + "2164760844", "name": "Zhiyuan Lin"}, {"authorId": "48757839", "name": "Ronghui + Liu"}, {"authorId": "47195132", "name": "S. Marrone"}, {"authorId": "38351900", + "name": "R. Nardone"}, {"authorId": "80655344", "name": "Tianli Tang"}, {"authorId": + "102360012", "name": "V. Vittorini"}]}, {"paperId": "5923b872837d5ba00b80d60d93f79f14d9f3bdc4", + "externalIds": {"DOI": "10.1093/plankt/fbac042", "CorpusId": 251942805}, "corpusId": + 251942805, "publicationVenue": {"id": "ec3042c2-c5be-462b-9ff5-573227875f2e", + "name": "Journal of Plankton Research", "type": "journal", "alternate_names": + ["J Plankton Res"], "issn": "0142-7873"}, "url": "https://www.semanticscholar.org/paper/5923b872837d5ba00b80d60d93f79f14d9f3bdc4", "title": "Plankton digital twins\u2014a new research tool", "abstract": "\n Digital twins (DT) are simulation models that so closely replicate reality in their behaviour that experts may believe model output to be real. Plankton @@ -2941,15 +3525,15 @@ interactions: to engage with modelling, enhancing future science and increasing confidence in predictive operational and also in long-term climate simulations.", "venue": "Journal of Plankton Research", "year": 2022, "referenceCount": 75, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Environmental Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-08-30", - "journal": {"name": "Journal of Plankton Research"}, "authors": [{"authorId": - "34976063", "name": "K. Flynn"}, {"authorId": "144428254", "name": "R. Torres"}, - {"authorId": "3014948", "name": "X. Irigoien"}, {"authorId": "39773679", "name": - "J. Blackford"}]}, {"paperId": "ac719bb40934083d11ee5c4575769b1f7c6f0189", - "externalIds": {"DOI": "10.16995/dscn.8105", "CorpusId": 251857923}, "url": - "https://www.semanticscholar.org/paper/ac719bb40934083d11ee5c4575769b1f7c6f0189", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-08-30", "journal": {"name": "Journal of Plankton Research"}, "authors": + [{"authorId": "34976063", "name": "K. Flynn"}, {"authorId": "144428254", "name": + "R. Torres"}, {"authorId": "3014948", "name": "X. Irigoien"}, {"authorId": + "39773679", "name": "J. Blackford"}]}, {"paperId": "ac719bb40934083d11ee5c4575769b1f7c6f0189", + "externalIds": {"DOI": "10.16995/dscn.8105", "CorpusId": 251857923}, "corpusId": + 251857923, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ac719bb40934083d11ee5c4575769b1f7c6f0189", "title": "The Computational Fallacy: A New Model for Understanding the Role of Computers in Humanities", "abstract": "The paper tries to counter some misassumptions about the computer and computation especially in relation to @@ -2982,13 +3566,15 @@ interactions: et \u00ab Speculative computing \u00bb ou la computation sp\u00e9culative.\u00a0", "venue": "Digital Studies/le champ num\u00e9rique (DSCN) Open Issue 2022", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-08-25", "journal": {"name": "Digital Studies/le champ - num\u00e9rique (DSCN) Open Issue 2022"}, "authors": [{"authorId": "117130137", - "name": "M. Aljayyousi"}]}, {"paperId": "4217467e747182b9ad8035e8a2d657d2ce80af07", - "externalIds": {"DBLP": "journals/corr/abs-2208-11981", "ArXiv": "2208.11981", - "DOI": "10.48550/arXiv.2208.11981", "CorpusId": 251800226}, "url": "https://www.semanticscholar.org/paper/4217467e747182b9ad8035e8a2d657d2ce80af07", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.digitalstudies.org/article/id/8105/download/pdf/", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-08-25", "journal": {"name": "Digital Studies/le champ num\u00e9rique + (DSCN) Open Issue 2022"}, "authors": [{"authorId": "117130137", "name": "M. + Aljayyousi"}]}, {"paperId": "4217467e747182b9ad8035e8a2d657d2ce80af07", "externalIds": + {"DBLP": "journals/corr/abs-2208-11981", "ArXiv": "2208.11981", "DOI": "10.48550/arXiv.2208.11981", + "CorpusId": 251800226}, "corpusId": 251800226, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4217467e747182b9ad8035e8a2d657d2ce80af07", "title": "On Reality and the Limits of Language Data", "abstract": "Recent advances in neural network language models have shown that it is possible to derive expressive meaning representations by leveraging linguistic associations @@ -3005,14 +3591,15 @@ interactions: novel and tightly controlled reasoning test and to highlight what models might learn directly from pure linguistic data.", "venue": "ArXiv", "year": 2022, "referenceCount": 82, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-08-25", "journal": {"volume": "abs/2208.11981", "name": - "ArXiv"}, "authors": [{"authorId": "50638196", "name": "N. Collier"}, {"authorId": - "144097210", "name": "Fangyu Liu"}, {"authorId": "2888926", "name": "Ehsan - Shareghi"}]}, {"paperId": "82992f2c17c9f2070cc54c6898c723e9d9f4ef28", "externalIds": - {"DOI": "10.1117/12.2646616", "CorpusId": 251780684}, "url": "https://www.semanticscholar.org/paper/82992f2c17c9f2070cc54c6898c723e9d9f4ef28", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-08-25", "journal": {"volume": "abs/2208.11981", + "name": "ArXiv"}, "authors": [{"authorId": "50638196", "name": "N. Collier"}, + {"authorId": "144097210", "name": "Fangyu Liu"}, {"authorId": "2888926", "name": + "Ehsan Shareghi"}]}, {"paperId": "82992f2c17c9f2070cc54c6898c723e9d9f4ef28", + "externalIds": {"DOI": "10.1117/12.2646616", "CorpusId": 251780684}, "corpusId": + 251780684, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82992f2c17c9f2070cc54c6898c723e9d9f4ef28", "title": "The application of machine learning in the stock market", "abstract": "Artificial intelligence (AI) appears more and more in people''s life. Many academic articles point out that there are signal to noises in the financial @@ -3024,13 +3611,14 @@ interactions: machine learning models in the stock market. Finally, we find the results simulated by the regressor models are similar.", "venue": "Other Conferences", "year": 2022, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2022-08-23", "journal": {"volume": "12330", "pages": "123301E - 123301E-7"}, "authors": [{"authorId": "2162978327", "name": "Wencheng Bao"}]}, {"paperId": "75f5ca0397a89714d5559e48effc3bf2f6227461", "externalIds": {"DOI": - "10.1108/er-06-2021-0244", "CorpusId": 251754471}, "url": "https://www.semanticscholar.org/paper/75f5ca0397a89714d5559e48effc3bf2f6227461", + "10.1108/er-06-2021-0244", "CorpusId": 251754471}, "corpusId": 251754471, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/75f5ca0397a89714d5559e48effc3bf2f6227461", "title": "Human resources under technological transformation: what\u00a0HR professionals believe in an\u00a0international scale", "abstract": "PurposeThis paper examines the beliefs of human resource professionals (HRPs) regarding @@ -3058,24 +3646,14 @@ interactions: some important insights in an attempt to build a framework for enhancing HR in this new era.", "venue": "Employee Relations: The International Journal", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-08-23", "journal": {"name": "Employee Relations: The International Journal"}, - "authors": [{"authorId": "2166528665", "name": "Konstantinos Mantzaris"}, - {"authorId": "117439841", "name": "Barbara Myloni"}]}, {"paperId": "94a0c0342abce2a2fd9aa47e85101d29ccae8f22", - "externalIds": {"DOI": "10.1007/s11569-022-00418-x", "CorpusId": 251661626}, - "url": "https://www.semanticscholar.org/paper/94a0c0342abce2a2fd9aa47e85101d29ccae8f22", - "title": "Imitating the Human. New Human\u2013Machine Interactions in Social - Robots", "abstract": null, "venue": "NanoEthics", "year": 2022, "referenceCount": - 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": - "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2022-08-17", "journal": {"name": "NanoEthics"}, - "authors": [{"authorId": "114149181", "name": "Joan G. Seifert"}, {"authorId": - "48685400", "name": "O. Friedrich"}, {"authorId": "6466790", "name": "Sebastian - Schleidgen"}]}, {"paperId": "be33823886361b68d27a33f7dfb0986a8414ac33", "externalIds": - {"DBLP": "journals/algorithms/LuL22", "DOI": "10.3390/a15080282", "CorpusId": - 251601059}, "url": "https://www.semanticscholar.org/paper/be33823886361b68d27a33f7dfb0986a8414ac33", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-08-23", "journal": {"name": "Employee Relations: + The International Journal"}, "authors": [{"authorId": "2166528665", "name": + "Konstantinos Mantzaris"}, {"authorId": "117439841", "name": "Barbara Myloni"}]}, + {"paperId": "be33823886361b68d27a33f7dfb0986a8414ac33", "externalIds": {"DBLP": + "journals/algorithms/LuL22", "DOI": "10.3390/a15080282", "CorpusId": 251601059}, + "corpusId": 251601059, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/be33823886361b68d27a33f7dfb0986a8414ac33", "title": "Techniques and Paradigms in Modern Game AI Systems", "abstract": "Games have long been benchmarks and test-beds for AI algorithms. With the development of AI techniques and the boost of computational power, modern @@ -3091,7 +3669,8 @@ interactions: survey can both provide a review of game AI algorithms and bring inspiration to the game AI community for future directions.", "venue": "Algorithms", "year": 2022, "referenceCount": 80, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1999-4893/15/8/282/pdf?version=1660290176", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-08-12", "journal": {"volume": "15", "pages": @@ -3099,20 +3678,25 @@ interactions: "Yunlong Lu"}, {"authorId": "2155025453", "name": "Wenxin Li"}]}, {"paperId": "29f5407995065dffa0f615cc681b1653fde4c224", "externalIds": {"PubMedCentral": "9372087", "DOI": "10.1038/s41598-022-18084-0", "CorpusId": 251516952, "PubMed": - "35953516"}, "url": "https://www.semanticscholar.org/paper/29f5407995065dffa0f615cc681b1653fde4c224", + "35953516"}, "corpusId": 251516952, "publicationVenue": {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", + "name": "Scientific Reports", "type": "journal", "alternate_names": ["Sci + Rep"], "issn": "2045-2322", "url": "http://www.nature.com/srep/", "alternate_urls": + ["http://www.nature.com/srep/index.html"]}, "url": "https://www.semanticscholar.org/paper/29f5407995065dffa0f615cc681b1653fde4c224", "title": "Evaluation of auto-segmentation for EBRT planning structures using deep learning-based workflow on cervical cancer", "abstract": null, "venue": "Scientific Reports", "year": 2022, "referenceCount": 37, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-08-11", "journal": {"volume": "12", "name": "Scientific - Reports"}, "authors": [{"authorId": "1519273661", "name": "Jiahao Wang"}, - {"authorId": "2144037459", "name": "Yuanyuan Chen"}, {"authorId": "46816416", - "name": "Honglin Xie"}, {"authorId": "2182088347", "name": "Lumeng Luo"}, - {"authorId": "2181311807", "name": "Qiu Tang"}]}, {"paperId": "83434a8e9796fb78472358b8b4d4444db61d19db", - "externalIds": {"DBLP": "journals/corr/abs-2208-03836", "ArXiv": "2208.03836", - "DOI": "10.48550/arXiv.2208.03836", "CorpusId": 251402401}, "url": "https://www.semanticscholar.org/paper/83434a8e9796fb78472358b8b4d4444db61d19db", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.nature.com/articles/s41598-022-18084-0.pdf", "status": null}, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-11", "journal": + {"volume": "12", "name": "Scientific Reports"}, "authors": [{"authorId": "1519273661", + "name": "Jiahao Wang"}, {"authorId": "2144037459", "name": "Yuanyuan Chen"}, + {"authorId": "46816416", "name": "Honglin Xie"}, {"authorId": "2182088347", + "name": "Lumeng Luo"}, {"authorId": "2181311807", "name": "Qiu Tang"}]}, {"paperId": + "83434a8e9796fb78472358b8b4d4444db61d19db", "externalIds": {"DBLP": "journals/corr/abs-2208-03836", + "ArXiv": "2208.03836", "DOI": "10.48550/arXiv.2208.03836", "CorpusId": 251402401}, + "corpusId": 251402401, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/83434a8e9796fb78472358b8b4d4444db61d19db", "title": "Artificial Intelligence and Machine Learning for Quantum Technologies", "abstract": "In recent years, the dramatic progress in machine learning has begun to impact many areas of science and technology signi\ufb01cantly. In @@ -3124,41 +3708,42 @@ interactions: protocols, and feedback strategies, and generally improve aspects of quantum computing, quantum communication, and quantum simulation. We highlight open challenges and future possibilities and conclude with some speculative visions - for the next decade.", "venue": "ArXiv", "year": 2022, "referenceCount": 148, + for the next decade.", "venue": "ArXiv", "year": 2022, "referenceCount": 142, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-07", "journal": {"volume": "abs/2208.03836", "name": "ArXiv"}, "authors": [{"authorId": "5906965", "name": "Mario Krenn"}, {"authorId": "147098437", "name": "Jonas Landgraf"}, {"authorId": "47167798", "name": "T. Foesel"}, {"authorId": "48057862", "name": "F. Marquardt"}]}, {"paperId": "a85b031221aaff14bc34cb11ef7ee15850b26bfc", "externalIds": {"DOI": "10.1016/j.bushor.2022.07.004", "CorpusId": 251292866}, - "url": "https://www.semanticscholar.org/paper/a85b031221aaff14bc34cb11ef7ee15850b26bfc", + "corpusId": 251292866, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a85b031221aaff14bc34cb11ef7ee15850b26bfc", "title": "Brace yourself! Why managers should adopt a synthetic media incident response playbook in an age of falsity and synthetic media", "abstract": null, "venue": "Business Horizons", "year": 2022, "referenceCount": 27, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2022-08-01", "journal": {"name": "Business Horizons"}, "authors": [{"authorId": - "1581739911", "name": "L. Whittaker"}, {"authorId": "1786178", "name": "Jan - H. Kietzmann"}, {"authorId": "51926313", "name": "Kate Letheren"}, {"authorId": - "82518051", "name": "R. Mulcahy"}, {"authorId": "1400907437", "name": "Rebekah - Russell\u2013Bennett"}]}, {"paperId": "31529dd1ce338a1790a2f4b0ce556500d9d8b3f0", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2022-08-01", "journal": {"name": "Business Horizons"}, + "authors": [{"authorId": "1581739911", "name": "L. Whittaker"}, {"authorId": + "1786178", "name": "Jan H. Kietzmann"}, {"authorId": "51926313", "name": "Kate + Letheren"}, {"authorId": "82518051", "name": "R. Mulcahy"}, {"authorId": "1400907437", + "name": "Rebekah Russell\u2013Bennett"}]}, {"paperId": "31529dd1ce338a1790a2f4b0ce556500d9d8b3f0", "externalIds": {"DBLP": "journals/jlap/Valiron22", "DOI": "10.1016/j.jlamp.2022.100790", - "CorpusId": 250587969}, "url": "https://www.semanticscholar.org/paper/31529dd1ce338a1790a2f4b0ce556500d9d8b3f0", + "CorpusId": 250587969}, "corpusId": 250587969, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/31529dd1ce338a1790a2f4b0ce556500d9d8b3f0", "title": "Semantics of quantum programming languages: Classical control, quantum control", "abstract": null, "venue": "J. Log. Algebraic Methods Program.", "year": 2022, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-08-01", "journal": {"volume": "128", "pages": "100790", - "name": "J. Log. Algebraic Methods Program."}, "authors": [{"authorId": "2591230", - "name": "B. Valiron"}]}, {"paperId": "7aa473bd471d917b6d3a70da242002a3978d2358", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-01", "journal": + {"volume": "128", "pages": "100790", "name": "J. Log. Algebraic Methods Program."}, + "authors": [{"authorId": "2591230", "name": "B. Valiron"}]}, {"paperId": "7aa473bd471d917b6d3a70da242002a3978d2358", "externalIds": {"DOI": "10.1109/ICDACAI57211.2022.00076", "CorpusId": 254737904}, - "url": "https://www.semanticscholar.org/paper/7aa473bd471d917b6d3a70da242002a3978d2358", + "corpusId": 254737904, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7aa473bd471d917b6d3a70da242002a3978d2358", "title": "The Advance of the Combination Method of Machine Learning and Deep Learning", "abstract": "The deep learning technology represented by the neural network has made remarkable achievements in recent years. However, deep learning @@ -3174,13 +3759,14 @@ interactions: information for the development of artificial intelligence.", "venue": "2022 International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI)", "year": 2022, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", - "Review"], "publicationDate": "2022-08-01", "journal": {"pages": "350-353", - "name": "2022 International Conference on Data Analytics, Computing and Artificial - Intelligence (ICDACAI)"}, "authors": [{"authorId": "1796289189", "name": "Hao - Dong"}]}, {"paperId": "7c16068b924dfe6011f23efba7a911a6250cb139", "externalIds": - {"DOI": "10.1109/AIE57029.2022.00064", "CorpusId": 252561040}, "url": "https://www.semanticscholar.org/paper/7c16068b924dfe6011f23efba7a911a6250cb139", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Conference", "Review"], "publicationDate": "2022-08-01", "journal": {"pages": + "350-353", "name": "2022 International Conference on Data Analytics, Computing + and Artificial Intelligence (ICDACAI)"}, "authors": [{"authorId": "1796289189", + "name": "Hao Dong"}]}, {"paperId": "7c16068b924dfe6011f23efba7a911a6250cb139", + "externalIds": {"DOI": "10.1109/AIE57029.2022.00064", "CorpusId": 252561040}, + "corpusId": 252561040, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c16068b924dfe6011f23efba7a911a6250cb139", "title": "Critical Thinking on the Turing Test as a Standard for Testing Artificial Intelligence", "abstract": "Artificial intelligence is a fashionable topic in the current world. In the domain of artificial intelligence, the most basic @@ -3197,13 +3783,14 @@ interactions: in current AI research and publicity.", "venue": "2022 International Conference on Artificial Intelligence in Everything (AIE)", "year": 2022, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2022-08-01", "journal": {"pages": "297-300", "name": "2022 International - Conference on Artificial Intelligence in Everything (AIE)"}, "authors": [{"authorId": - "2074312", "name": "W. Ouyang"}, {"authorId": "108062058", "name": "H. Feng"}]}, - {"paperId": "3320cedd950afe395305e874e8bf631384d23c3c", "externalIds": {"DOI": - "10.1386/jivs_00058_1", "CorpusId": 251892432}, "url": "https://www.semanticscholar.org/paper/3320cedd950afe395305e874e8bf631384d23c3c", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2022-08-01", "journal": {"pages": "297-300", "name": "2022 + International Conference on Artificial Intelligence in Everything (AIE)"}, + "authors": [{"authorId": "2074312", "name": "W. Ouyang"}, {"authorId": "108062058", + "name": "H. Feng"}]}, {"paperId": "3320cedd950afe395305e874e8bf631384d23c3c", + "externalIds": {"DOI": "10.1386/jivs_00058_1", "CorpusId": 251892432}, "corpusId": + 251892432, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3320cedd950afe395305e874e8bf631384d23c3c", "title": "Cybernetic animism: Voice and AI in conversation", "abstract": "This Voicing explores the theoretical and material connections between Artificial Intelligence (AI) and voice. The Voicing is in three-parts encompassing: a @@ -3218,13 +3805,32 @@ interactions: and Bentivegna move in conversation through biases, vibes and language, exploring narrative, science and theory.", "venue": "Journal of Interdisciplinary Voice Studies", "year": 2022, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-08-01", "journal": {"name": "Journal of Interdisciplinary Voice Studies"}, - "authors": [{"authorId": "2183152057", "name": "K. Allado-McDowell"}, {"authorId": - "36475590", "name": "F. Bentivegna"}]}, {"paperId": "e6e47d14161c56bb071068f70a66d419a165a706", - "externalIds": {"PubMedCentral": "9407151", "DOI": "10.3390/diagnostics12081972", - "CorpusId": 251639638, "PubMed": "36010322"}, "url": "https://www.semanticscholar.org/paper/e6e47d14161c56bb071068f70a66d419a165a706", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2022-08-01", "journal": {"name": "Journal of Interdisciplinary + Voice Studies"}, "authors": [{"authorId": "2183152057", "name": "K. Allado-McDowell"}, + {"authorId": "36475590", "name": "F. Bentivegna"}]}, {"paperId": "94a0c0342abce2a2fd9aa47e85101d29ccae8f22", + "externalIds": {"DOI": "10.1007/s11569-022-00418-x", "CorpusId": 251661626}, + "corpusId": 251661626, "publicationVenue": {"id": "f151e41a-8da2-4030-aeab-229a2c46ffc7", + "name": "NanoEthics", "type": "journal", "alternate_names": ["Nanoethics"], + "issn": "1871-4757", "url": "http://www.springer.com/social+sciences/applied+ethics/journal/11569", + "alternate_urls": ["https://rd.springer.com/journal/11569"]}, "url": "https://www.semanticscholar.org/paper/94a0c0342abce2a2fd9aa47e85101d29ccae8f22", + "title": "Imitating the Human. New Human\u2013Machine Interactions in Social + Robots", "abstract": null, "venue": "NanoEthics", "year": 2022, "referenceCount": + 69, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11569-022-00418-x.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2022-08-01", "journal": {"volume": + "16", "pages": "181 - 192", "name": "NanoEthics"}, "authors": [{"authorId": + "114149181", "name": "Joan G. Seifert"}, {"authorId": "48685400", "name": + "O. Friedrich"}, {"authorId": "6466790", "name": "Sebastian Schleidgen"}]}, + {"paperId": "e6e47d14161c56bb071068f70a66d419a165a706", "externalIds": {"PubMedCentral": + "9407151", "DOI": "10.3390/diagnostics12081972", "CorpusId": 251639638, "PubMed": + "36010322"}, "corpusId": 251639638, "publicationVenue": {"id": "1944b6e1-2c1d-4f42-88e3-9f8a52f57e47", + "name": "Diagnostics", "issn": "2075-4418", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217965", + "alternate_urls": ["https://www.mdpi.com/journal/diagnostics", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217965"]}, + "url": "https://www.semanticscholar.org/paper/e6e47d14161c56bb071068f70a66d419a165a706", "title": "Dermatopathology of Malignant Melanoma in the Era of Artificial Intelligence: A Single Institutional Experience", "abstract": "The application of artificial intelligence (AI) algorithms in medicine could support diagnostic @@ -3251,9 +3857,10 @@ interactions: respect to the dermatopathologist, allowing this type of supervised algorithm to be nominated as a help to the dermatopathologist in the challenging diagnosis of malignant melanoma.", "venue": "Diagnostics", "year": 2022, "referenceCount": - 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + 24, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.mdpi.com/2075-4418/12/8/1972/pdf?version=1660557570", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-08-01", "journal": {"volume": "12", "name": "Diagnostics"}, "authors": [{"authorId": "1471633507", "name": "Gerardo Cazzato"}, {"authorId": "144275192", "name": "A. Massaro"}, @@ -3266,20 +3873,25 @@ interactions: Resta"}, {"authorId": "3936381", "name": "E. Maiorano"}, {"authorId": "2060191109", "name": "A. Vacca"}]}, {"paperId": "60240322dd39ad4c22fed2dc884e65a20e9e61f6", "externalIds": {"DOI": "10.1016/j.tics.2022.06.010", "CorpusId": 251307978, - "PubMed": "35933289"}, "url": "https://www.semanticscholar.org/paper/60240322dd39ad4c22fed2dc884e65a20e9e61f6", + "PubMed": "35933289"}, "corpusId": 251307978, "publicationVenue": {"id": "20cb626a-518d-4016-826a-0157cf2f8fd6", + "name": "Trends in Cognitive Sciences", "type": "journal", "alternate_names": + ["Trends Cogn Sci"], "issn": "1364-6613", "url": "https://www.cell.com/trends/cognitive-sciences/home", + "alternate_urls": ["http://www.cell.com/trends/cognitive-sciences/home", "https://www.journals.elsevier.com/trends-in-cognitive-sciences", + "http://www.sciencedirect.com/science/journal/13646613"]}, "url": "https://www.semanticscholar.org/paper/60240322dd39ad4c22fed2dc884e65a20e9e61f6", "title": "Symbols and mental programs: a hypothesis about human singularity", "abstract": null, "venue": "Trends in Cognitive Sciences", "year": 2022, "referenceCount": - 141, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-08-01", - "journal": {"volume": "26", "pages": "751-766", "name": "Trends in Cognitive - Sciences"}, "authors": [{"authorId": "1787332", "name": "S. Dehaene"}, {"authorId": - "2028908687", "name": "Fosca Al Roumi"}, {"authorId": "3051598", "name": "Yair - Lakretz"}, {"authorId": "5831538", "name": "Samuel Planton"}, {"authorId": - "1414161813", "name": "Mathias Sabl\u00e9-Meyer"}]}, {"paperId": "f70b089458207ec2bd56522952dc5f93348d5b6e", - "externalIds": {"DOI": "10.5753/wit.2022.222940", "CorpusId": 251240751}, - "url": "https://www.semanticscholar.org/paper/f70b089458207ec2bd56522952dc5f93348d5b6e", + 141, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2022-08-01", "journal": {"volume": "26", "pages": "751-766", "name": "Trends + in Cognitive Sciences"}, "authors": [{"authorId": "1787332", "name": "S. Dehaene"}, + {"authorId": "2028908687", "name": "Fosca Al Roumi"}, {"authorId": "3051598", + "name": "Yair Lakretz"}, {"authorId": "5831538", "name": "Samuel Planton"}, + {"authorId": "1414161813", "name": "Mathias Sabl\u00e9-Meyer"}]}, {"paperId": + "f70b089458207ec2bd56522952dc5f93348d5b6e", "externalIds": {"DOI": "10.5753/wit.2022.222940", + "CorpusId": 251240751}, "corpusId": 251240751, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f70b089458207ec2bd56522952dc5f93348d5b6e", "title": "SALVE TODAS: um Sistema Inteligente para Auxiliar na Seguran\u00e7a de Mulheres", "abstract": "O artigo apresenta o Sistema SALVE TODAS, cujo objetivo \u00e9 auxiliar na seguran\u00e7a de mulheres atrav\u00e9s da implementa\u00e7\u00e3o @@ -3294,12 +3906,14 @@ interactions: da mulher com seus contatos de seguran\u00e7a.\u00a0", "venue": "Anais do XVI Women in Information Technology (WIT 2022)", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2022-07-31", "journal": {"name": "Anais do XVI Women in Information Technology - (WIT 2022)"}, "authors": [{"authorId": "31812333", "name": "M. F. Ribeiro"}, - {"authorId": "2109815355", "name": "M. M. Pereira"}]}, {"paperId": "f41544f80c5ca1015b4e22c8a2750246bc62e39b", - "externalIds": {"DOI": "10.1109/IAICT55358.2022.9887488", "CorpusId": 252312172}, - "url": "https://www.semanticscholar.org/paper/f41544f80c5ca1015b4e22c8a2750246bc62e39b", + "openAccessPdf": {"url": "https://sol.sbc.org.br/index.php/wit/article/download/20866/20692", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2022-07-31", "journal": {"name": "Anais do XVI Women + in Information Technology (WIT 2022)"}, "authors": [{"authorId": "31812333", + "name": "M. F. Ribeiro"}, {"authorId": "2109815355", "name": "M. M. Pereira"}]}, + {"paperId": "f41544f80c5ca1015b4e22c8a2750246bc62e39b", "externalIds": {"DOI": + "10.1109/IAICT55358.2022.9887488", "CorpusId": 252312172}, "corpusId": 252312172, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f41544f80c5ca1015b4e22c8a2750246bc62e39b", "title": "Artificial Intelligence in Finance: Possibilities and Threats", "abstract": "Artificial intelligence (AI) alongside one of its main subsets, machine learning (ML), is no longer a sheer propaganda, it has nearly become @@ -3322,14 +3936,19 @@ interactions: "venue": "2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)", "year": 2022, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2022-07-28", "journal": {"pages": "268-273", "name": "2022 IEEE International - Conference on Industry 4.0, Artificial Intelligence, and Communications Technology - (IAICT)"}, "authors": [{"authorId": "2048217", "name": "Opeoluwa Tosin Eluwole"}, - {"authorId": "2176277632", "name": "Segun Akande"}]}, {"paperId": "ca8e868a7f1fc89b0bec9497b0a86f25750004d1", - "externalIds": {"DBLP": "journals/alife/SatoM22", "DOI": "10.1162/artl_a_00376", - "CorpusId": 251068059, "PubMed": "35881681"}, "url": "https://www.semanticscholar.org/paper/ca8e868a7f1fc89b0bec9497b0a86f25750004d1", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2022-07-28", "journal": {"pages": "268-273", "name": "2022 + IEEE International Conference on Industry 4.0, Artificial Intelligence, and + Communications Technology (IAICT)"}, "authors": [{"authorId": "2048217", "name": + "Opeoluwa Tosin Eluwole"}, {"authorId": "2176277632", "name": "Segun Akande"}]}, + {"paperId": "ca8e868a7f1fc89b0bec9497b0a86f25750004d1", "externalIds": {"DBLP": + "journals/alife/SatoM22", "DOI": "10.1162/artl_a_00376", "CorpusId": 251068059, + "PubMed": "35881681"}, "corpusId": 251068059, "publicationVenue": {"id": "5ed9f470-65a3-4077-8dab-163b0c5cb9e6", + "name": "Artificial Life", "type": "journal", "alternate_names": ["Artif Life"], + "issn": "1064-5462", "url": "http://cognet.mit.edu/library/journals/journal?issn=10645462", + "alternate_urls": ["http://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/loi/artl", + "https://www.mitpressjournals.org/doi/10.1162/ARTL_a_00243"]}, "url": "https://www.semanticscholar.org/paper/ca8e868a7f1fc89b0bec9497b0a86f25750004d1", "title": "The Enactive and Interactive Dimensions of AI: Ingenuity and Imagination Through the Lens of Art and Music", "abstract": "Abstract Dualisms are pervasive. The divisions between the rational mind, the physical body, and the external @@ -3348,24 +3967,30 @@ interactions: this project is that AI/ML systems should be recognized as powerful tools or instruments rather than as agents themselves.", "venue": "Artificial Life", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-07-25", "journal": {"volume": "28", "pages": "310-321", "name": "Artificial - Life"}, "authors": [{"authorId": "2111956341", "name": "Maki Sato"}, {"authorId": - "46397736", "name": "Jonathan McKinney"}]}, {"paperId": "d6302b01db9616f1f152581aacd410d9b1514157", - "externalIds": {"DOI": "10.1007/s11229-022-03798-5", "CorpusId": 251085672}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-07-25", "journal": {"volume": "28", "pages": "310-321", + "name": "Artificial Life"}, "authors": [{"authorId": "2111956341", "name": + "Maki Sato"}, {"authorId": "46397736", "name": "Jonathan McKinney"}]}, {"paperId": + "d6302b01db9616f1f152581aacd410d9b1514157", "externalIds": {"DOI": "10.1007/s11229-022-03798-5", + "CorpusId": 251085672}, "corpusId": 251085672, "publicationVenue": {"id": + "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": "Synthese", "type": "journal", + "issn": "0039-7857", "url": "http://www.springer.com/11229", "alternate_urls": + ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, "url": "https://www.semanticscholar.org/paper/d6302b01db9616f1f152581aacd410d9b1514157", "title": "The identification game: deepfakes and the epistemic limits of identity", - "abstract": null, "venue": "Synthese", "year": 2022, "referenceCount": 38, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-07-25", "journal": {"volume": - "200", "name": "Synthese"}, "authors": [{"authorId": "31028090", "name": "Carl - \u00d6hman"}]}, {"paperId": "c1bf768d68f2213e60f397e6a6ddafa162201d0a", "externalIds": - {"DBLP": "journals/corr/abs-2208-04148", "ArXiv": "2208.04148", "DOI": "10.48550/arXiv.2208.04148", - "CorpusId": 251402420}, "url": "https://www.semanticscholar.org/paper/c1bf768d68f2213e60f397e6a6ddafa162201d0a", + "abstract": null, "venue": "Synthese", "year": 2022, "referenceCount": 39, + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007/s11229-022-03798-5.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-25", + "journal": {"volume": "200", "name": "Synthese"}, "authors": [{"authorId": + "31028090", "name": "Carl \u00d6hman"}]}, {"paperId": "c1bf768d68f2213e60f397e6a6ddafa162201d0a", + "externalIds": {"DBLP": "journals/corr/abs-2208-04148", "ArXiv": "2208.04148", + "DOI": "10.48550/arXiv.2208.04148", "CorpusId": 251402420}, "corpusId": 251402420, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c1bf768d68f2213e60f397e6a6ddafa162201d0a", "title": "A Historical Interaction between Artificial Intelligence and Philosophy", "abstract": "This paper reviews the historical development of AI and representative philosophical thinking from the perspective of the research paradigm. Additionally, @@ -3378,23 +4003,24 @@ interactions: or programs should achieve their smart goals, the historical development of AI demonstrates the best answer at this time. Still, it is not the final answer of AI research.", "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-23", - "journal": {"volume": "abs/2208.04148", "name": "ArXiv"}, "authors": [{"authorId": - "2180772261", "name": "Youheng Zhang"}]}, {"paperId": "7a47bbb3f8ee2171db77ce94f2d94dfbdc9bde69", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2022-07-23", "journal": {"volume": "abs/2208.04148", "name": "ArXiv"}, "authors": + [{"authorId": "2180772261", "name": "Youheng Zhang"}]}, {"paperId": "7a47bbb3f8ee2171db77ce94f2d94dfbdc9bde69", "externalIds": {"DOI": "10.1007/s13347-022-00561-z", "CorpusId": 251000575}, - "url": "https://www.semanticscholar.org/paper/7a47bbb3f8ee2171db77ce94f2d94dfbdc9bde69", + "corpusId": 251000575, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7a47bbb3f8ee2171db77ce94f2d94dfbdc9bde69", "title": "Intelligence as a Social Concept: a Socio-Technological Interpretation of the Turing Test", "abstract": null, "venue": "Philosophy & Technology", "year": 2022, "referenceCount": 63, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-07-22", "journal": {"volume": "35", "name": "Philosophy & Technology"}, - "authors": [{"authorId": "83389626", "name": "Shlomo Danziger"}]}, {"paperId": - "a12447c77330d09c6b5da8f48e92faf8511d24ed", "externalIds": {"DOI": "10.31056/2250.5415.v12.n2.38328", - "CorpusId": 250938453}, "url": "https://www.semanticscholar.org/paper/a12447c77330d09c6b5da8f48e92faf8511d24ed", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2022-07-22", "journal": {"volume": "35", "name": "Philosophy + & Technology"}, "authors": [{"authorId": "83389626", "name": "Shlomo Danziger"}]}, + {"paperId": "a12447c77330d09c6b5da8f48e92faf8511d24ed", "externalIds": {"DOI": + "10.31056/2250.5415.v12.n2.38328", "CorpusId": 250938453}, "corpusId": 250938453, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a12447c77330d09c6b5da8f48e92faf8511d24ed", "title": "La gran pantalla como laboratorio y espejo para la robo\u00e9tica", "abstract": "La robo\u00e9tica es una rama de la \u00e9tica aplicada interesada por los desaf\u00edos \u00e9ticos y sociales de la rob\u00f3tica y la inteligencia @@ -3412,11 +4038,13 @@ interactions: que la rob\u00f3tica y la cibern\u00e9tica ya tienen (y tendr\u00e1n) en nuestras vidas.", "venue": "\u00c9tica y Cine Journal", "year": 2022, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2022-07-20", "journal": {"name": "\u00c9tica y Cine Journal"}, "authors": - [{"authorId": "2124362976", "name": "Jos\u00e9 Miguel Biscaia Fern\u00e1ndez"}]}, - {"paperId": "07304a9a7bc5743ee49d3bbc236d940b05bef789", "externalIds": {"DOI": - "10.31056/2250.5415.v12.n2.38325", "CorpusId": 250941196}, "url": "https://www.semanticscholar.org/paper/07304a9a7bc5743ee49d3bbc236d940b05bef789", + "openAccessPdf": {"url": "https://revistas.unc.edu.ar/index.php/eticaycine/article/download/38328/38334", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2022-07-20", "journal": {"name": "\u00c9tica y Cine + Journal"}, "authors": [{"authorId": "2124362976", "name": "Jos\u00e9 Miguel + Biscaia Fern\u00e1ndez"}]}, {"paperId": "07304a9a7bc5743ee49d3bbc236d940b05bef789", + "externalIds": {"DOI": "10.31056/2250.5415.v12.n2.38325", "CorpusId": 250941196}, + "corpusId": 250941196, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/07304a9a7bc5743ee49d3bbc236d940b05bef789", "title": "El test de Turing en Ex Machina: \u00bfEs Ava un sistema intencional?", "abstract": "El presente art\u00edculo aborda el problema de la interacci\u00f3n entre seres humanos y la inteligencia artificial a partir del test de Turing @@ -3438,13 +4066,15 @@ interactions: en tales sistemas de estados mentales afectivos (valorativos) mediados por la interacci\u00f3n cultural.", "venue": "\u00c9tica y Cine Journal", "year": 2022, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistas.unc.edu.ar/index.php/eticaycine/article/download/38325/38331", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-20", "journal": {"name": "\u00c9tica y Cine Journal"}, "authors": [{"authorId": "2178502066", "name": "Maria Paola Caycedo-Castro"}, {"authorId": "1412954124", "name": "Boris Juli\u00e1n Pinto-Bustamante"}]}, {"paperId": "7722dce5de72ad9d6f1f496ce77b0b26f83fd047", "externalIds": {"DBLP": "journals/topics/CassentiVR22", "DOI": "10.1111/tops.12622", "CorpusId": 250698077, - "PubMed": "35853452"}, "url": "https://www.semanticscholar.org/paper/7722dce5de72ad9d6f1f496ce77b0b26f83fd047", + "PubMed": "35853452"}, "corpusId": 250698077, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7722dce5de72ad9d6f1f496ce77b0b26f83fd047", "title": "Editor''s Review and Introduction: Cognition-Inspired Artificial Intelligence", "abstract": "Cognitive science has much to contribute to the general scientific body of knowledge, but it is also a field rife with possibilities @@ -3454,16 +4084,21 @@ interactions: and introduce this special issue that promotes the method of inspiring AI development with the results of cognitive science research.", "venue": "Top. Cogn. Sci.", "year": 2022, "referenceCount": 34, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-07-19", "journal": {"name": "Topics in cognitive - science"}, "authors": [{"authorId": "2051193", "name": "Daniel N. Cassenti"}, - {"authorId": "35025007", "name": "V. D. Veksler"}, {"authorId": "1701118", - "name": "F. Ritter"}]}, {"paperId": "6ab907876e1beae83d898f638e7a6c6c1f7cd7f4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-07-19", "journal": {"name": "Topics in + cognitive science"}, "authors": [{"authorId": "2051193", "name": "Daniel N. + Cassenti"}, {"authorId": "35025007", "name": "V. D. Veksler"}, {"authorId": + "1701118", "name": "F. Ritter"}]}, {"paperId": "6ab907876e1beae83d898f638e7a6c6c1f7cd7f4", "externalIds": {"DBLP": "conf/ijcnn/Weng22", "DOI": "10.1109/IJCNN55064.2022.9892445", - "CorpusId": 252626098}, "url": "https://www.semanticscholar.org/paper/6ab907876e1beae83d898f638e7a6c6c1f7cd7f4", + "CorpusId": 252626098}, "corpusId": 252626098, "publicationVenue": {"id": + "f80ba4a3-7aed-4021-b4d8-e4f50668847a", "name": "IEEE International Joint + Conference on Neural Network", "type": "conference", "alternate_names": ["IJCNN", + "IEEE Int Jt Conf Neural Netw", "Int Jt Conf Neural Netw", "International + Joint Conference on Neural Network"], "url": "http://www.wikicfp.com/cfp/program?id=1573"}, + "url": "https://www.semanticscholar.org/paper/6ab907876e1beae83d898f638e7a6c6c1f7cd7f4", "title": "20 Million-Dollar Problems for Any Brain Models and a Holistic Solution: Conscious Learning", "abstract": "This is a theoretical paper. It raises 20 open problems each of which is estimated to require one million dollars of @@ -3493,14 +4128,19 @@ interactions: holistic solution of conscious learning [1], [2] solves each.", "venue": "IEEE International Joint Conference on Neural Network", "year": 2022, "referenceCount": 44, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2022-07-18", "journal": {"pages": "1-9", "name": "2022 International Joint - Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "145926447", - "name": "J. Weng"}]}, {"paperId": "d3088d8aad337f02c8c95b77833e69c0b8db4ac2", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2022-07-18", "journal": {"pages": "1-9", + "name": "2022 International Joint Conference on Neural Networks (IJCNN)"}, + "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "d3088d8aad337f02c8c95b77833e69c0b8db4ac2", "externalIds": {"DBLP": "conf/ijcnn/JainSCS22", "DOI": "10.1109/IJCNN55064.2022.9892890", - "CorpusId": 252626047}, "url": "https://www.semanticscholar.org/paper/d3088d8aad337f02c8c95b77833e69c0b8db4ac2", + "CorpusId": 252626047}, "corpusId": 252626047, "publicationVenue": {"id": + "f80ba4a3-7aed-4021-b4d8-e4f50668847a", "name": "IEEE International Joint + Conference on Neural Network", "type": "conference", "alternate_names": ["IJCNN", + "IEEE Int Jt Conf Neural Netw", "Int Jt Conf Neural Netw", "International + Joint Conference on Neural Network"], "url": "http://www.wikicfp.com/cfp/program?id=1573"}, + "url": "https://www.semanticscholar.org/paper/d3088d8aad337f02c8c95b77833e69c0b8db4ac2", "title": "Domain Infused Conversational Response Generation for Tutoring based Virtual Agent", "abstract": "Recent advances in deep learning typically, with the introduction of transformer based models has shown massive improvement @@ -3525,32 +4165,63 @@ interactions: approach on various evaluation metrics over other baselines and state of the art models.", "venue": "IEEE International Joint Conference on Neural Network", "year": 2022, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2022-07-18", "journal": {"pages": "1-8", - "name": "2022 International Joint Conference on Neural Networks (IJCNN)"}, - "authors": [{"authorId": "2088137695", "name": "Raghav Jain"}, {"authorId": - "52219377", "name": "Tulika Saha"}, {"authorId": "2175280949", "name": "Souhitya - Chakraborty"}, {"authorId": "145470045", "name": "S. Saha"}]}, {"paperId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-07-18", + "journal": {"pages": "1-8", "name": "2022 International Joint Conference on + Neural Networks (IJCNN)"}, "authors": [{"authorId": "2088137695", "name": + "Raghav Jain"}, {"authorId": "52219377", "name": "Tulika Saha"}, {"authorId": + "2175280949", "name": "Souhitya Chakraborty"}, {"authorId": "145470045", "name": + "S. Saha"}]}, {"paperId": "4b851c426d6568d64cced1e4ccc4c366c7bb2a57", "externalIds": + {"DOI": "10.1109/ICBAIE56435.2022.9985852", "CorpusId": 254999341}, "corpusId": + 254999341, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4b851c426d6568d64cced1e4ccc4c366c7bb2a57", + "title": "An analysis method of industrial data relationship based on business + context", "abstract": "Industrial big data processing is an important support + for improving industrial production efficiency. Because industrial big data + involves complex business logic in production scenarios, there is a widespread + problem that the relationship between data is difficult to understand. Therefore, + this paper proposes a relational analysis method of industrial data based + on business context. Firstly, a semantic data dictionary is established according + to the production business process, and then a data object recognition model + based on deep learning is trained; then a context-based automatic association + method of industrial data relations is proposed; finally, the experimental + verification is carried out on the actual production data, and the results + show that The method in this paper is effective in improving the relationship + analysis of industrial data.", "venue": "2022 3rd International Conference + on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE)", + "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2022-07-15", "journal": {"pages": "482-487", "name": "2022 + 3rd International Conference on Big Data, Artificial Intelligence and Internet + of Things Engineering (ICBAIE)"}, "authors": [{"authorId": "49421824", "name": + "Yang Liu"}, {"authorId": "2146334720", "name": "Tian Zhang"}]}, {"paperId": "0c2b78f41939ab385733e3aec9d580e07aef7ff0", "externalIds": {"PubMedCentral": "9300474", "DOI": "10.1016/B978-0-323-91172-6.00008-X", "CorpusId": 250702057}, - "url": "https://www.semanticscholar.org/paper/0c2b78f41939ab385733e3aec9d580e07aef7ff0", + "corpusId": 250702057, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0c2b78f41939ab385733e3aec9d580e07aef7ff0", "title": "Computational approaches for drug repositioning and repurposing to combat SARS-CoV-2 infection", "abstract": null, "venue": "Computational Approaches for Novel Therapeutic and Diagnostic Designing to Mitigate SARS-CoV-2 - Infection", "year": 2022, "referenceCount": 74, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2022-07-15", "journal": {"pages": "247 - 265", "name": - "Computational Approaches for Novel Therapeutic and Diagnostic Designing to - Mitigate SARS-CoV-2 Infection"}, "authors": [{"authorId": "5733494", "name": - "Subhamay Panda"}, {"authorId": "40467386", "name": "L. Kumari"}, {"authorId": - "3932288", "name": "H. Badwaik"}, {"authorId": "4084524", "name": "D. Shanmugarajan"}]}, - {"paperId": "3f2230b7abf58ae63e3fbaf8ff59b7de29959b28", "externalIds": {"PubMedCentral": - "9336647", "DOI": "10.3389/fpsyg.2022.911620", "CorpusId": 250593707, "PubMed": - "35911009"}, "url": "https://www.semanticscholar.org/paper/3f2230b7abf58ae63e3fbaf8ff59b7de29959b28", + Infection", "year": 2022, "referenceCount": 64, "citationCount": 1, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-15", + "journal": {"pages": "247 - 265", "name": "Computational Approaches for Novel + Therapeutic and Diagnostic Designing to Mitigate SARS-CoV-2 Infection"}, "authors": + [{"authorId": "5733494", "name": "Subhamay Panda"}, {"authorId": "40467386", + "name": "L. Kumari"}, {"authorId": "3932288", "name": "H. Badwaik"}, {"authorId": + "4084524", "name": "D. Shanmugarajan"}]}, {"paperId": "3f2230b7abf58ae63e3fbaf8ff59b7de29959b28", + "externalIds": {"PubMedCentral": "9336647", "DOI": "10.3389/fpsyg.2022.911620", + "CorpusId": 250593707, "PubMed": "35911009"}, "corpusId": 250593707, "publicationVenue": + {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", + "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", + "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": + ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", + "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, + "url": "https://www.semanticscholar.org/paper/3f2230b7abf58ae63e3fbaf8ff59b7de29959b28", "title": "Self-organized criticality as a framework for consciousness: A review study", "abstract": "Objective No current model of consciousness is univocally accepted on either theoretical or empirical grounds, and the need for a solid @@ -3584,37 +4255,47 @@ interactions: of applied analytical tools as a surrogate measure of criticality was observable, which limits the generalizability of findings.", "venue": "Frontiers in Psychology", "year": 2022, "referenceCount": 144, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-07-15", "journal": {"volume": "13", "name": "Frontiers - in Psychology"}, "authors": [{"authorId": "2106198405", "name": "Nike Walter"}, - {"authorId": "1812411", "name": "T. Hinterberger"}]}, {"paperId": "944496598fc2305f8834fbf89c5e497b83c9069f", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fpsyg.2022.911620/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-07-15", + "journal": {"volume": "13", "name": "Frontiers in Psychology"}, "authors": + [{"authorId": "2106198405", "name": "Nike Walter"}, {"authorId": "1812411", + "name": "T. Hinterberger"}]}, {"paperId": "944496598fc2305f8834fbf89c5e497b83c9069f", "externalIds": {"DOI": "10.1007/s11609-022-00475-9", "CorpusId": 250505696}, - "url": "https://www.semanticscholar.org/paper/944496598fc2305f8834fbf89c5e497b83c9069f", + "corpusId": 250505696, "publicationVenue": {"id": "a41a5ad9-9ca7-49e4-b4d8-39a4cbb0f64d", + "name": "Berliner Journal f\u00fcr Soziologie", "type": "journal", "alternate_names": + ["Berliner Journal Fur Soziologie", "Berl J Soziol", "Berl J Fur Soziol"], + "issn": "0863-1808", "url": "https://link.springer.com/journal/11609"}, "url": + "https://www.semanticscholar.org/paper/944496598fc2305f8834fbf89c5e497b83c9069f", "title": "Der kybernetische Blick und seine Grenzen. Zur systemtheoretischen Selbstbeschreibung der digitalen Gesellschaft", "abstract": null, "venue": "Berliner Journal f\u00fcr Soziologie", "year": 2022, "referenceCount": 77, - "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2022-07-11", "journal": {"name": "Berliner Journal f\u00fcr Soziologie"}, - "authors": [{"authorId": "82997975", "name": "Sascha Dickel"}]}, {"paperId": - "f53a44aeaa354cd680845b0123d3b98ace1224a0", "externalIds": {"DOI": "10.1007/s00113-022-01202-y", - "CorpusId": 250390803}, "url": "https://www.semanticscholar.org/paper/f53a44aeaa354cd680845b0123d3b98ace1224a0", + "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007/s11609-022-00475-9.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2022-07-11", "journal": {"name": "Berliner Journal + f\u00fcr Soziologie"}, "authors": [{"authorId": "82997975", "name": "Sascha + Dickel"}]}, {"paperId": "f53a44aeaa354cd680845b0123d3b98ace1224a0", "externalIds": + {"DOI": "10.1007/s00113-022-01202-y", "CorpusId": 250390803}, "corpusId": + 250390803, "publicationVenue": {"id": "0e240640-859d-40b9-83f7-00f32e490043", + "name": "Die Unfallchirurgie", "type": "journal", "alternate_names": ["Die + Unfallchirurgie"], "issn": "2731-7021"}, "url": "https://www.semanticscholar.org/paper/f53a44aeaa354cd680845b0123d3b98ace1224a0", "title": "K\u00fcnstliche Intelligenz und Ausblick auf Anwendungsfelder in der Pseudarthrosentherapie", "abstract": null, "venue": "Die Unfallchirurgie", "year": 2022, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2022-07-09", "journal": {"volume": "125", "pages": - "611 - 618", "name": "Die Unfallchirurgie"}, "authors": [{"authorId": "2070873121", - "name": "Marie K. Reumann"}, {"authorId": "51036281", "name": "B. Braun"}, - {"authorId": "144539925", "name": "Max Menger"}, {"authorId": "79798014", - "name": "F. Springer"}, {"authorId": "2175481295", "name": "Johann Jazewitsch"}, - {"authorId": "48462037", "name": "T. Schwarz"}, {"authorId": "2135997360", - "name": "Andreas K N\u00fcssler"}, {"authorId": "2095561161", "name": "T. - Histing"}, {"authorId": "2153524502", "name": "Mika F. R. Rollmann"}]}, {"paperId": - "77769d8a450323e2c513ebc5a247ea222c4eae97", "externalIds": {"DOI": "10.1017/9781108973335", - "CorpusId": 250400208}, "url": "https://www.semanticscholar.org/paper/77769d8a450323e2c513ebc5a247ea222c4eae97", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2022-07-09", "journal": + {"volume": "125", "pages": "611 - 618", "name": "Die Unfallchirurgie"}, "authors": + [{"authorId": "2070873121", "name": "Marie K. Reumann"}, {"authorId": "51036281", + "name": "B. Braun"}, {"authorId": "144539925", "name": "Max Menger"}, {"authorId": + "79798014", "name": "F. Springer"}, {"authorId": "2175481295", "name": "Johann + Jazewitsch"}, {"authorId": "48462037", "name": "T. Schwarz"}, {"authorId": + "2135997360", "name": "Andreas K N\u00fcssler"}, {"authorId": "2095561161", + "name": "T. Histing"}, {"authorId": "2153524502", "name": "Mika F. R. Rollmann"}]}, + {"paperId": "77769d8a450323e2c513ebc5a247ea222c4eae97", "externalIds": {"DOI": + "10.1017/9781108973335", "CorpusId": 250400208}, "corpusId": 250400208, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/77769d8a450323e2c513ebc5a247ea222c4eae97", "title": "Imagination and Creative Thinking", "abstract": "This Element explores the nature of both imagination and creative thinking in an effort to understand the relation between them and also to understand their role in the vast array @@ -3628,20 +4309,22 @@ interactions: skills that can be cultivated? And finally, are imagination and creativity uniquely human capacities, or can they be had by nonbiological entities such as AI systems?", "venue": "", "year": 2022, "referenceCount": 110, "citationCount": - 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}, {"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-07-08", "journal": null, "authors": [{"authorId": "152537655", "name": - "A. Kind"}]}, {"paperId": "c619130763c5a5f94f30a69e6da0707b40f34ce5", "externalIds": - {"DOI": "10.3917/pls.537.0074", "CorpusId": 250706266}, "url": "https://www.semanticscholar.org/paper/c619130763c5a5f94f30a69e6da0707b40f34ce5", + 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-07-08", "journal": null, "authors": [{"authorId": + "152537655", "name": "A. Kind"}]}, {"paperId": "c619130763c5a5f94f30a69e6da0707b40f34ce5", + "externalIds": {"DOI": "10.3917/pls.537.0074", "CorpusId": 250706266}, "corpusId": + 250706266, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c619130763c5a5f94f30a69e6da0707b40f34ce5", "title": "Robots en qu\u00eate d\u2019\u00e9loquence", "abstract": null, "venue": "Pour la Science", "year": 2022, "referenceCount": 1, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-07-08", - "journal": {"name": "Pour la Science"}, "authors": [{"authorId": "1809842", - "name": "Fr\u00e9d\u00e9ric Landragin"}]}, {"paperId": "28ea1f2321027f35bff2b0211c3e3eae48263979", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": + "2022-07-08", "journal": {"name": "Pour la Science"}, "authors": [{"authorId": + "1809842", "name": "Fr\u00e9d\u00e9ric Landragin"}]}, {"paperId": "28ea1f2321027f35bff2b0211c3e3eae48263979", "externalIds": {"PubMedCentral": "9279074", "DOI": "10.1155/2022/7205241", - "CorpusId": 250525974, "PubMed": "35845955"}, "url": "https://www.semanticscholar.org/paper/28ea1f2321027f35bff2b0211c3e3eae48263979", + "CorpusId": 250525974, "PubMed": "35845955"}, "corpusId": 250525974, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/28ea1f2321027f35bff2b0211c3e3eae48263979", "title": "Artificial Intelligence-Based Data-Driven Strategy to Accelerate Research, Development, and Clinical Trials of COVID Vaccine", "abstract": "The global COVID-19 (coronavirus disease 2019) pandemic, which was caused @@ -3667,8 +4350,9 @@ interactions: in the field of clinical trials of vaccines and clinical practices using different tools.", "venue": "BioMed research international", "year": 2022, "referenceCount": 132, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/bmri/2022/7205241.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-07-06", "journal": {"volume": "2022", "name": "BioMed Research International"}, "authors": [{"authorId": "2109624967", "name": "Ashwani Sharma"}, {"authorId": "1399523832", @@ -3677,7 +4361,12 @@ interactions: "name": "K. Pathak"}, {"authorId": "2090136929", "name": "G. Kumar"}, {"authorId": "39436862", "name": "D. Pathak"}]}, {"paperId": "c6985fbd899bec8b89fb5dc405cf2a04d5ae21a9", "externalIds": {"PubMedCentral": "9294137", "DOI": "10.3389/frobt.2022.951293", - "CorpusId": 250275788, "PubMed": "35865329"}, "url": "https://www.semanticscholar.org/paper/c6985fbd899bec8b89fb5dc405cf2a04d5ae21a9", + "CorpusId": 250275788, "PubMed": "35865329"}, "corpusId": 250275788, "publicationVenue": + {"id": "2ee61499-676f-46c2-afde-d4c0cb4393e6", "name": "Frontiers in Robotics + and AI", "type": "journal", "alternate_names": ["Front Robot AI"], "issn": + "2296-9144", "url": "https://www.frontiersin.org/journals/robotics-and-ai", + "alternate_urls": ["http://www.frontiersin.org/Robotics_and_AI/archive", "http://www.frontiersin.org/Robotics_and_AI/about", + "http://www.frontiersin.org/Robotics_and_AI"]}, "url": "https://www.semanticscholar.org/paper/c6985fbd899bec8b89fb5dc405cf2a04d5ae21a9", "title": "Developing Intelligent Robots that Grasp Affordance", "abstract": "Humans and robots operating in unstructured environments both need to classify objects through haptic exploration and use them in various tasks, but currently @@ -3704,14 +4393,16 @@ interactions: tissues. Instead such development can now be accomplished in silico and then cloned into physical robots, a strategy that could transcend human performance.", "venue": "Frontiers in Robotics and AI", "year": 2022, "referenceCount": 84, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2022-07-05", "journal": - {"volume": "9", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": - "1720471", "name": "G. Loeb"}]}, {"paperId": "6b84681811d5edf657b5e0ff27f092a4684fc0a3", - "externalIds": {"DOI": "10.3390/philosophies7040076", "CorpusId": 250327289}, - "url": "https://www.semanticscholar.org/paper/6b84681811d5edf657b5e0ff27f092a4684fc0a3", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2022.951293/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2022-07-05", "journal": {"volume": "9", "name": "Frontiers in Robotics and + AI"}, "authors": [{"authorId": "1720471", "name": "G. Loeb"}]}, {"paperId": + "6b84681811d5edf657b5e0ff27f092a4684fc0a3", "externalIds": {"DOI": "10.3390/philosophies7040076", + "CorpusId": 250327289}, "corpusId": 250327289, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6b84681811d5edf657b5e0ff27f092a4684fc0a3", "title": "The Accidental Philosopher and One of the Hardest Problems in the World", "abstract": "Given the difficulties of defining \u201cmachine\u201d and \u201cthink\u201d, Turing proposed to replace the question \u201cCan machines @@ -3729,13 +4420,17 @@ interactions: conversation and that alone as his proxy. Even simple conversation challenges a machine to engage in the rich practice of human discourse in all its generality and variety.", "venue": "Philosophies", "year": 2022, "referenceCount": 59, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-07-04", "journal": {"name": - "Philosophies"}, "authors": [{"authorId": "3374328", "name": "Sonje Finnestad"}, - {"authorId": "32487012", "name": "E. Neufeld"}]}, {"paperId": "2675e0ed5d828321c1fe06afd6fb49ce953b9c42", - "externalIds": {"DOI": "10.1002/jdd.13010", "CorpusId": 250281247, "PubMed": - "35781809"}, "url": "https://www.semanticscholar.org/paper/2675e0ed5d828321c1fe06afd6fb49ce953b9c42", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.mdpi.com/2409-9287/7/4/76/pdf?version=1661330473", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-04", + "journal": {"name": "Philosophies"}, "authors": [{"authorId": "3374328", "name": + "Sonje Finnestad"}, {"authorId": "32487012", "name": "E. Neufeld"}]}, {"paperId": + "2675e0ed5d828321c1fe06afd6fb49ce953b9c42", "externalIds": {"DOI": "10.1002/jdd.13010", + "CorpusId": 250281247, "PubMed": "35781809"}, "corpusId": 250281247, "publicationVenue": + {"id": "d2b6f83d-a912-40d2-af6d-03ad01c81c5e", "name": "Journal of Dental + Education", "type": "journal", "alternate_names": ["J Dent Educ"], "issn": + "0022-0337", "url": "http://www.jdentaled.org/"}, "url": "https://www.semanticscholar.org/paper/2675e0ed5d828321c1fe06afd6fb49ce953b9c42", "title": "Adopting artificial intelligence in dental education: A model for academic leadership and innovation.", "abstract": "INTRODUCTION\nThe continual evolution of dental education, dental practice and the delivery of optimal @@ -3752,16 +4447,55 @@ interactions: new organizational ideals and goals within institutions of dental education.", "venue": "Journal of Dental Education", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-03", "journal": {"name": "Journal of dental education"}, "authors": [{"authorId": "32436596", "name": "Nadim M. Islam"}, {"authorId": "49437416", "name": "Lory Laughter"}, {"authorId": "1402477005", "name": "R. Sadid-Zadeh"}, {"authorId": "2158117940", - "name": "Carlos S Smith"}, {"authorId": "2324805", "name": "T. Dolan"}, {"authorId": + "name": "Carlos S. Smith"}, {"authorId": "2324805", "name": "T. Dolan"}, {"authorId": "145002565", "name": "Geralyn Crain"}, {"authorId": "4459938", "name": "C. - Squarize"}]}, {"paperId": "c3d077909fec62c4495c8fcf8396cfb401ad4eef", "externalIds": - {"DOI": "10.1080/09662839.2022.2101885", "CorpusId": 252163838}, "url": "https://www.semanticscholar.org/paper/c3d077909fec62c4495c8fcf8396cfb401ad4eef", + Squarize"}]}, {"paperId": "34b57c2f9b8a8648f173d9b74fb8fcda8fab820d", "externalIds": + {"DOI": "10.1080/02580136.2022.2087314", "CorpusId": 252632777}, "corpusId": + 252632777, "publicationVenue": {"id": "e52e52ad-edd2-47c4-bff7-c8be16bf4943", + "name": "South African Journal of Philosophy", "type": "journal", "alternate_names": + ["South Afr J Philos"], "issn": "0258-0136", "url": "http://www.tandfonline.com/loi/rsph20", + "alternate_urls": ["http://www.ajol.info/index.php/sajpem"]}, "url": "https://www.semanticscholar.org/paper/34b57c2f9b8a8648f173d9b74fb8fcda8fab820d", + "title": "The paradox of denial and mystification of machine intelligence + in the Chinese room", "abstract": "Two critical questions spun the web of + the Turing test debate. First, can an appropriately programmed machine pass + the Turing test? Second, is passing the test by such a machine, ipso facto, + considered proof that it is intelligent and hence \u201cminded\u201d? While + the first question is technological, the second is purely philosophical. Focusing + on the second question, this article interrogates the implication of John + Searle\u2019s Chinese room denial of machine intelligence. The thrust of Searle\u2019s + argument is that a machine lacks intentionality, so it can only simulate intelligence, + not duplicate it. In his thinking, whatever a machine inputs to generate an + intelligent output has no bearing on humanlike intelligence. Incidentally, + Searle did not classify such a machine\u2019s output as simulated and non-intelligent, + nor did he explain how this output is actualised with mere simulation. The + connection between \u201cunintelligent machine\u2019s input\u201d and \u201cintelligent + machine\u2019s output\u201d is at this point shrouded in mystery. Consequently, + the more Searle attempts a denial of machine intelligence in the Chinese room, + the more he mystifies it. Using the method of critical analysis, this article + advances three fundamental arguments to prove a machines\u2019 obscurity in + the Chinese room thought experiment. On the ground of Searle\u2019s conviction, + the first argument queries the absurdity in bypassing intentionality to produce + intelligence; the second points out the obfuscation in generating intelligence + with mere computation, and the third draws attention to the dilemma of classifying + a machine\u2019s output either as real-life intelligent behaviour or simulated + intelligent behaviour.", "venue": "South African Journal of Philosophy", "year": + 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-07-03", "journal": {"volume": "41", "pages": + "253 - 263", "name": "South African Journal of Philosophy"}, "authors": [{"authorId": + "1453656998", "name": "F. Asodun"}]}, {"paperId": "c3d077909fec62c4495c8fcf8396cfb401ad4eef", + "externalIds": {"DOI": "10.1080/09662839.2022.2101885", "CorpusId": 252163838}, + "corpusId": 252163838, "publicationVenue": {"id": "93fb0532-d945-426f-a825-34c599b00ced", + "name": "European Security", "type": "journal", "alternate_names": ["Eur Secur"], + "issn": "0966-2839", "url": "http://www.tandfonline.com/loi/feus20"}, "url": + "https://www.semanticscholar.org/paper/c3d077909fec62c4495c8fcf8396cfb401ad4eef", "title": "Artificial intelligence and EU security: the false promise of digital sovereignty", "abstract": "ABSTRACT EU Digital Sovereignty has emerged as a priority for the EU Cyber Agenda to build free and safe, yet resilient cyberspace. @@ -3782,12 +4516,14 @@ interactions: few tools to become a global leader in advancing standards of AI beyond its regulatory capacity.", "venue": "European Security", "year": 2022, "referenceCount": 121, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-03", - "journal": {"volume": "31", "pages": "415 - 434", "name": "European Security"}, - "authors": [{"authorId": "3024098", "name": "Andrea Calderaro"}, {"authorId": - "2184479563", "name": "Stella Blumfelde"}]}, {"paperId": "7e595e9141f580823b00330c4c8c5c102caa7033", - "externalIds": {"ArXiv": "2207.00859", "CorpusId": 250265033}, "url": "https://www.semanticscholar.org/paper/7e595e9141f580823b00330c4c8c5c102caa7033", + "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/09662839.2022.2101885?needAccess=true", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-07-03", "journal": {"volume": "31", "pages": "415 - 434", "name": "European + Security"}, "authors": [{"authorId": "3024098", "name": "Andrea Calderaro"}, + {"authorId": "2184479563", "name": "Stella Blumfelde"}]}, {"paperId": "7e595e9141f580823b00330c4c8c5c102caa7033", + "externalIds": {"ArXiv": "2207.00859", "CorpusId": 250265033}, "corpusId": + 250265033, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e595e9141f580823b00330c4c8c5c102caa7033", "title": "The nature of properly human mathematics", "abstract": ". We claim that human mathematics is only a limited part of the consequences of the chosen basic axioms. Properly human mathematics varies with time but appears to have @@ -3796,12 +4532,14 @@ interactions: leads to organizing mathematical knowledge structurally. We consider brie\ufb02y the problem of non-mathematical sciences.", "venue": "", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-07-02", "journal": null, - "authors": [{"authorId": "2707351", "name": "D. Ruelle"}]}, {"paperId": "6c7abf617c0591be96a09776092271c72f49ff2f", - "externalIds": {"DBLP": "journals/corr/abs-2207-00902", "ArXiv": "2207.00902", - "DOI": "10.48550/arXiv.2207.00902", "CorpusId": 250264138}, "url": "https://www.semanticscholar.org/paper/6c7abf617c0591be96a09776092271c72f49ff2f", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-02", + "journal": null, "authors": [{"authorId": "2707351", "name": "D. Ruelle"}]}, + {"paperId": "6c7abf617c0591be96a09776092271c72f49ff2f", "externalIds": {"DBLP": + "journals/corr/abs-2207-00902", "ArXiv": "2207.00902", "DOI": "10.48550/arXiv.2207.00902", + "CorpusId": 250264138}, "corpusId": 250264138, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6c7abf617c0591be96a09776092271c72f49ff2f", "title": "Complementary artificial intelligence designed to augment human discovery", "abstract": "Neither artificial intelligence designed to play Turing\u2019s imitation game, nor augmented intelligence built to maximize @@ -3831,52 +4569,64 @@ interactions: also suggest opportunities to improve human prediction by reformulating science education for discovery.", "venue": "ArXiv", "year": 2022, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-07-02", "journal": {"volume": "abs/2207.00902", "name": "ArXiv"}, "authors": - [{"authorId": "2313086", "name": "J. Sourati"}, {"authorId": "144002439", - "name": "James A. Evans"}]}, {"paperId": "9406a68789bb9db1fe3a19ac7ff17d903ee8a9f4", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-07-02", "journal": {"volume": "abs/2207.00902", "name": + "ArXiv"}, "authors": [{"authorId": "2313086", "name": "J. Sourati"}, {"authorId": + "144002439", "name": "James A. Evans"}]}, {"paperId": "9406a68789bb9db1fe3a19ac7ff17d903ee8a9f4", "externalIds": {"DBLP": "journals/eswa/ShaoZYDW22", "DOI": "10.1016/j.eswa.2022.118221", - "CorpusId": 251165327}, "url": "https://www.semanticscholar.org/paper/9406a68789bb9db1fe3a19ac7ff17d903ee8a9f4", + "CorpusId": 251165327}, "corpusId": 251165327, "publicationVenue": {"id": + "987139ae-a65d-49bb-aaf6-fb764dc40b19", "name": "Expert systems with applications", + "type": "journal", "alternate_names": ["Expert syst appl", "Expert Systems + With Applications", "Expert Syst Appl"], "issn": "0957-4174", "url": "https://www.journals.elsevier.com/expert-systems-with-applications/", + "alternate_urls": ["https://www.sciencedirect.com/journal/expert-systems-with-applications", + "http://www.sciencedirect.com/science/journal/09574174"]}, "url": "https://www.semanticscholar.org/paper/9406a68789bb9db1fe3a19ac7ff17d903ee8a9f4", "title": "Tracing the evolution of AI in the past decade and forecasting the emerging trends", "abstract": null, "venue": "Expert systems with applications", "year": 2022, "referenceCount": 91, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2022-07-01", "journal": {"volume": - "209", "pages": "118221", "name": "Expert Syst. Appl."}, "authors": [{"authorId": - "1740580186", "name": "Zhou Shao"}, {"authorId": "97993965", "name": "Ruoyan - Zhao"}, {"authorId": "119548118", "name": "Sha Yuan"}, {"authorId": "2167927181", - "name": "Mingjie Ding"}, {"authorId": "2154892557", "name": "Yongli Wang"}]}, - {"paperId": "b671797d6c58b3874f61c58a73a28298a1052fa5", "externalIds": {"DBLP": - "journals/chb/ChiarellaTGRBC22", "DOI": "10.1016/j.chb.2022.107406", "CorpusId": - 250713930}, "url": "https://www.semanticscholar.org/paper/b671797d6c58b3874f61c58a73a28298a1052fa5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-01", + "journal": {"volume": "209", "pages": "118221", "name": "Expert Syst. Appl."}, + "authors": [{"authorId": "1740580186", "name": "Zhou Shao"}, {"authorId": + "97993965", "name": "Ruoyan Zhao"}, {"authorId": "119548118", "name": "Sha + Yuan"}, {"authorId": "2167927181", "name": "Mingjie Ding"}, {"authorId": "2154892557", + "name": "Yongli Wang"}]}, {"paperId": "b671797d6c58b3874f61c58a73a28298a1052fa5", + "externalIds": {"DBLP": "journals/chb/ChiarellaTGRBC22", "DOI": "10.1016/j.chb.2022.107406", + "CorpusId": 250713930}, "corpusId": 250713930, "publicationVenue": {"id": + "435ffef1-21df-491d-b69a-605eee1b7f7f", "name": "Computers in Human Behavior", + "type": "journal", "alternate_names": ["Comput Hum Behav"], "issn": "0747-5632", + "url": "https://www.journals.elsevier.com/computers-in-human-behavior", "alternate_urls": + ["https://www.sciencedirect.com/science/article/pii/S0747563216307695", "http://www.sciencedirect.com/science/journal/07475632"]}, + "url": "https://www.semanticscholar.org/paper/b671797d6c58b3874f61c58a73a28298a1052fa5", "title": "Investigating the negative bias towards artificial intelligence: Effects of prior assignment of AI-authorship on the aesthetic appreciation of abstract paintings", "abstract": null, "venue": "Computers in Human Behavior", "year": 2022, "referenceCount": 120, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-07-01", "journal": {"volume": "137", "pages": "107406", "name": "Comput. - Hum. Behav."}, "authors": [{"authorId": "2050674730", "name": "S. Chiarella"}, - {"authorId": "2177452448", "name": "Giulia Torromino"}, {"authorId": "2177458414", - "name": "Dionigi M. Gagliardi"}, {"authorId": "46796439", "name": "D. Rossi"}, - {"authorId": "2476126", "name": "F. Babiloni"}, {"authorId": "2572901", "name": - "G. Cartocci"}]}, {"paperId": "e1d234f1c858e13c33e24179bcbcd199ffbf00fd", - "externalIds": {"DOI": "10.1134/S1995080222100195", "CorpusId": 253450355}, - "url": "https://www.semanticscholar.org/paper/e1d234f1c858e13c33e24179bcbcd199ffbf00fd", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-07-01", "journal": {"volume": + "137", "pages": "107406", "name": "Comput. Hum. Behav."}, "authors": [{"authorId": + "2050674730", "name": "S. Chiarella"}, {"authorId": "2177452448", "name": + "Giulia Torromino"}, {"authorId": "2177458414", "name": "Dionigi M. Gagliardi"}, + {"authorId": "46796439", "name": "D. Rossi"}, {"authorId": "2476126", "name": + "F. Babiloni"}, {"authorId": "2572901", "name": "G. Cartocci"}]}, {"paperId": + "e1d234f1c858e13c33e24179bcbcd199ffbf00fd", "externalIds": {"DOI": "10.1134/S1995080222100195", + "CorpusId": 253450355}, "corpusId": 253450355, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e1d234f1c858e13c33e24179bcbcd199ffbf00fd", "title": "Learning Theory and Population Genetics", "abstract": null, "venue": "Lobachevskii Journal of Mathematics", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-07-01", - "journal": {"volume": "43", "pages": "1655 - 1662", "name": "Lobachevskii - Journal of Mathematics"}, "authors": [{"authorId": "144039873", "name": "S. - Kozyrev"}]}, {"paperId": "f8cf58361f8db89b36e377e5ddaa97f31c9396f7", "externalIds": - {"PubMedCentral": "9583359", "DOI": "10.4103/sjopt.sjopt_219_21", "CorpusId": - 253043482, "PubMed": "36276252"}, "url": "https://www.semanticscholar.org/paper/f8cf58361f8db89b36e377e5ddaa97f31c9396f7", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-07-01", "journal": {"volume": "43", "pages": "1655 - 1662", "name": + "Lobachevskii Journal of Mathematics"}, "authors": [{"authorId": "144039873", + "name": "S. Kozyrev"}]}, {"paperId": "f8cf58361f8db89b36e377e5ddaa97f31c9396f7", + "externalIds": {"PubMedCentral": "9583359", "DOI": "10.4103/sjopt.sjopt_219_21", + "CorpusId": 253043482, "PubMed": "36276252"}, "corpusId": 253043482, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f8cf58361f8db89b36e377e5ddaa97f31c9396f7", "title": "Performance of deep-learning artificial intelligence algorithms in detecting retinopathy of prematurity: A systematic review", "abstract": "PURPOSE: Artificial intelligence (AI) offers considerable promise for retinopathy @@ -3904,15 +4654,16 @@ interactions: validation alongside robust study design could improve future studies.", "venue": "Saudi journal of ophthalmology : official journal of the Saudi Ophthalmological Society", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-07-01", "journal": {"volume": "36", "pages": "296 - - 307", "name": "Saudi Journal of Ophthalmology"}, "authors": [{"authorId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-07-01", "journal": {"volume": "36", "pages": + "296 - 307", "name": "Saudi Journal of Ophthalmology"}, "authors": [{"authorId": "2188462264", "name": "Amelia Bai"}, {"authorId": "2147403082", "name": "Christopher Carty"}, {"authorId": "145230414", "name": "S. Dai"}]}, {"paperId": "c171c14b4fc347139339ef6c225c2002e731b185", "externalIds": {"DBLP": "journals/pervasive/Pinhanez22", "DOI": "10.1109/MPRV.2022.3191245", - "CorpusId": 251701366}, "url": "https://www.semanticscholar.org/paper/c171c14b4fc347139339ef6c225c2002e731b185", + "CorpusId": 251701366}, "corpusId": 251701366, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c171c14b4fc347139339ef6c225c2002e731b185", "title": "Rethinking Language Interaction With Pervasive Applications and Devices", "abstract": "Language-based interaction with pervasive devices today mostly follows a basic command-and-control paradigm, reminiscent of 1960s @@ -3928,49 +4679,82 @@ interactions: including a deployment in an art exhibit, and discuss some key research challenges it poses to HCI, AI, and pervasive computing.", "venue": "IEEE Pervasive Computing", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-07-01", "journal": {"volume": "21", "pages": "24-31", - "name": "IEEE Pervasive Computing"}, "authors": [{"authorId": "1766240", "name": - "Claudio S. Pinhanez"}]}, {"paperId": "3e8217eb1c1d96be89ec5c22d449a8c2192629bc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-07-01", "journal": + {"volume": "21", "pages": "24-31", "name": "IEEE Pervasive Computing"}, "authors": + [{"authorId": "1766240", "name": "Claudio S. Pinhanez"}]}, {"paperId": "3e8217eb1c1d96be89ec5c22d449a8c2192629bc", "externalIds": {"DBLP": "journals/caeai/DaiK22", "DOI": "10.1016/j.caeai.2022.100087", - "CorpusId": 250718443}, "url": "https://www.semanticscholar.org/paper/3e8217eb1c1d96be89ec5c22d449a8c2192629bc", + "CorpusId": 250718443}, "corpusId": 250718443, "publicationVenue": {"id": + "a4e2f9c2-abbd-4f6b-9e06-ffe639dc07e7", "name": "Computers and Education: + Artificial Intelligence", "type": "journal", "alternate_names": ["Comput Educ + Artif Intell"], "issn": "2666-920X", "url": "https://www.journals.elsevier.com/computers-and-education-artificial-intelligence"}, + "url": "https://www.semanticscholar.org/paper/3e8217eb1c1d96be89ec5c22d449a8c2192629bc", "title": "Educational applications of artificial intelligence in simulation-based - learning: A systematic mapping review", "abstract": null, "venue": "Comput. - Educ. Artif. Intell.", "year": 2022, "referenceCount": 96, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2022-07-01", "journal": - {"volume": "3", "pages": "100087", "name": "Comput. Educ. Artif. Intell."}, - "authors": [{"authorId": "1864090606", "name": "Chih-Pu Dai"}, {"authorId": - "1853961", "name": "Fengfeng Ke"}]}, {"paperId": "82a2410ffcc562e9c04510f71f91bf1dd2e7be5f", - "externalIds": {"DOI": "10.1016/j.dyepig.2022.110547", "CorpusId": 250252406}, - "url": "https://www.semanticscholar.org/paper/82a2410ffcc562e9c04510f71f91bf1dd2e7be5f", + learning: A systematic mapping review", "abstract": null, "venue": "Computers + and Education: Artificial Intelligence", "year": 2022, "referenceCount": 96, + "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2022-07-01", "journal": {"volume": "3", "pages": "100087", + "name": "Comput. Educ. Artif. Intell."}, "authors": [{"authorId": "1864090606", + "name": "Chih-Pu Dai"}, {"authorId": "1853961", "name": "Fengfeng Ke"}]}, + {"paperId": "82a2410ffcc562e9c04510f71f91bf1dd2e7be5f", "externalIds": {"DOI": + "10.1016/j.dyepig.2022.110547", "CorpusId": 250252406}, "corpusId": 250252406, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82a2410ffcc562e9c04510f71f91bf1dd2e7be5f", "title": "Photochromic and luminescent materials for the development of Chemical Artificial Intelligence", "abstract": null, "venue": "Dyes and Pigments", "year": 2022, "referenceCount": 87, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2022-07-01", "journal": {"name": "Dyes and Pigments"}, - "authors": [{"authorId": "34356934", "name": "P. Gentili"}]}, {"paperId": - "89c76be5ec5aa3bd6a337d53520d4fb52ad520a2", "externalIds": {"DOI": "10.1016/j.trc.2022.103679", - "CorpusId": 248657195}, "url": "https://www.semanticscholar.org/paper/89c76be5ec5aa3bd6a337d53520d4fb52ad520a2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2022-07-01", "journal": + {"name": "Dyes and Pigments"}, "authors": [{"authorId": "34356934", "name": + "P. Gentili"}]}, {"paperId": "89c76be5ec5aa3bd6a337d53520d4fb52ad520a2", "externalIds": + {"DOI": "10.1016/j.trc.2022.103679", "CorpusId": 248657195}, "corpusId": 248657195, + "publicationVenue": {"id": "a8fbd64a-2df2-4275-b527-7935d0142fff", "name": + "Transportation Research Part C: Emerging Technologies", "type": "journal", + "alternate_names": ["Transp Res Part C-emerging Technol", "Transp Res Part + C Emerg Technol", "Transportation Research Part C-emerging Technologies"], + "issn": "0968-090X", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/130/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/0968090X"]}, + "url": "https://www.semanticscholar.org/paper/89c76be5ec5aa3bd6a337d53520d4fb52ad520a2", "title": "A literature review of Artificial Intelligence applications in railway systems", "abstract": null, "venue": "Transportation Research Part C: Emerging Technologies", "year": 2022, "referenceCount": 185, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - ["Review"], "publicationDate": "2022-07-01", "journal": {"name": "Transportation - Research Part C: Emerging Technologies"}, "authors": [{"authorId": "2057059538", - "name": "Ruifan Tang"}, {"authorId": "2164681475", "name": "Lorenzo De Donato"}, - {"authorId": "7369644", "name": "Nikola Be\u0161inovi\u0107"}, {"authorId": - "2441627", "name": "Francesco Flammini"}, {"authorId": "1774886", "name": - "R. Goverde"}, {"authorId": "2164760844", "name": "Zhiyuan Lin"}, {"authorId": - "48757839", "name": "Ronghui Liu"}, {"authorId": "80655344", "name": "Tianli - Tang"}, {"authorId": "102360012", "name": "V. Vittorini"}, {"authorId": "66701629", - "name": "Ziyulong Wang"}]}, {"paperId": "6ccbae2c6a91a91bed889544a0a662e6ede1b5ad", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": ["Review"], "publicationDate": "2022-07-01", "journal": + {"name": "Transportation Research Part C: Emerging Technologies"}, "authors": + [{"authorId": "2057059538", "name": "Ruifan Tang"}, {"authorId": "2164681475", + "name": "Lorenzo De Donato"}, {"authorId": "7369644", "name": "Nikola Be\u0161inovi\u0107"}, + {"authorId": "2441627", "name": "Francesco Flammini"}, {"authorId": "1774886", + "name": "R. Goverde"}, {"authorId": "2164760844", "name": "Zhiyuan Lin"}, + {"authorId": "48757839", "name": "Ronghui Liu"}, {"authorId": "80655344", + "name": "Tianli Tang"}, {"authorId": "102360012", "name": "V. Vittorini"}, + {"authorId": "66701629", "name": "Ziyulong Wang"}]}, {"paperId": "67d7fd76198d06a315138eaed3b03257ab5c8b8f", + "externalIds": {"DOI": "10.1007/s11245-022-09811-3", "CorpusId": 255107851}, + "corpusId": 255107851, "publicationVenue": {"id": "4b507eeb-33f4-4334-91f5-d521d711affb", + "name": "Topoi", "type": "journal", "alternate_names": ["Topoi-an Int Rev + Philos", "Topoi-an International Review of Philosophy"], "issn": "1518-3319", + "alternate_issns": ["0167-7411", "1161-9473"], "url": "http://www.scielo.br/scielo.php?lng=es&nrm=iso&pid=2237-101X&rep=&script=sci_serial", + "alternate_urls": ["http://www.topoi.mom.fr/", "https://www.persee.fr/collection/topoi", + "http://socialsciences.scielo.org/scielo.php?lng=en&pid=1518-3319&script=sci_serial", + "https://link.springer.com/journal/11245", "http://www.revistatopoi.org/", + "https://www.springer.com/philosophy/journal/11245"]}, "url": "https://www.semanticscholar.org/paper/67d7fd76198d06a315138eaed3b03257ab5c8b8f", + "title": "Defining Communication and Language from Within a Pluralistic Evolutionary + Worldview", "abstract": null, "venue": "Topoi", "year": 2022, "referenceCount": + 105, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://philpapers.org/archive/GONDCA-2.pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-30", + "journal": {"volume": "41", "pages": "609 - 622", "name": "Topoi"}, "authors": + [{"authorId": "2474002", "name": "N. Gontier"}]}, {"paperId": "6ccbae2c6a91a91bed889544a0a662e6ede1b5ad", "externalIds": {"PubMedCentral": "9754618", "DOI": "10.16910/jemr.15.2.5", - "CorpusId": 253436489}, "url": "https://www.semanticscholar.org/paper/6ccbae2c6a91a91bed889544a0a662e6ede1b5ad", + "CorpusId": 253436489}, "corpusId": 253436489, "publicationVenue": {"id": + "280a7be2-5f91-4eca-bf43-84b850f4d513", "name": "Journal of Eye Movement Research", + "type": "journal", "alternate_names": ["J Eye Mov Res"], "issn": "1995-8692", + "url": "https://bop.unibe.ch/jemr", "alternate_urls": ["https://www.jemr.org/?_c"]}, + "url": "https://www.semanticscholar.org/paper/6ccbae2c6a91a91bed889544a0a662e6ede1b5ad", "title": "Investigating visual expertise in sculpture: A methodological approach using eye tracking", "abstract": "Research on visual expertise has progressed significantly due to the availability of eye tracking tools. However, attempts @@ -3992,13 +4776,16 @@ interactions: visual expertise in sculpting and the potential (and limitations) of empirical designs that aim to investigate expertise in authentic environments.", "venue": "Journal of Eye Movement Research", "year": 2022, "referenceCount": 45, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2022-06-30", "journal": {"volume": "15", "name": - "Journal of Eye Movement Research"}, "authors": [{"authorId": "1562175910", - "name": "Isabell Stein"}, {"authorId": "2838193", "name": "Helen Jossberger"}, - {"authorId": "1577977568", "name": "H. Gruber"}]}, {"paperId": "9b67f18f8b13e04df8ab33831a8f97cdc0373c9c", - "externalIds": {"DOI": "10.1145/3522763", "CorpusId": 250118102}, "url": "https://www.semanticscholar.org/paper/9b67f18f8b13e04df8ab33831a8f97cdc0373c9c", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://bop.unibe.ch/JEMR/article/download/8216/11785", "status": null}, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-30", + "journal": {"volume": "15", "name": "Journal of Eye Movement Research"}, "authors": + [{"authorId": "1562175910", "name": "Isabell Stein"}, {"authorId": "2838193", + "name": "Helen Jossberger"}, {"authorId": "1577977568", "name": "H. Gruber"}]}, + {"paperId": "9b67f18f8b13e04df8ab33831a8f97cdc0373c9c", "externalIds": {"DOI": + "10.1145/3522763", "CorpusId": 250118102}, "corpusId": 250118102, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9b67f18f8b13e04df8ab33831a8f97cdc0373c9c", "title": "A Static and Dynamic Attention Framework for Multi Turn Dialogue Generation", "abstract": "Recently, research on open domain dialogue systems have attracted extensive interests of academic and industrial researchers. @@ -4022,15 +4809,17 @@ interactions: verify the performance of combining the static and dynamic attentions on open domain multi turn dialogue generation.", "venue": "ACM Transactions on Information Systems", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-06-30", "journal": {"name": "ACM Journal of the ACM - (JACM)"}, "authors": [{"authorId": "1806419", "name": "Weinan Zhang"}, {"authorId": - "3043830", "name": "Yiming Cui"}, {"authorId": "2153281320", "name": "Kaiyan - Zhang"}, {"authorId": "2115568958", "name": "Yifa Wang"}, {"authorId": "50736467", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3522763", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-06-30", "journal": {"name": "ACM Journal of the ACM (JACM)"}, "authors": + [{"authorId": "1806419", "name": "Weinan Zhang"}, {"authorId": "3043830", + "name": "Yiming Cui"}, {"authorId": "2153281320", "name": "Kaiyan Zhang"}, + {"authorId": "2115568958", "name": "Yifa Wang"}, {"authorId": "50736467", "name": "Qingfu Zhu"}, {"authorId": "2145679703", "name": "Lingzhi Li"}, {"authorId": "2140034831", "name": "Ting Liu"}]}, {"paperId": "491a1b8d433e53b786c5d6971f8ff262634d3d79", - "externalIds": {"ArXiv": "2206.14876", "CorpusId": 250144493}, "url": "https://www.semanticscholar.org/paper/491a1b8d433e53b786c5d6971f8ff262634d3d79", + "externalIds": {"ArXiv": "2206.14876", "CorpusId": 250144493}, "corpusId": + 250144493, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/491a1b8d433e53b786c5d6971f8ff262634d3d79", "title": "AI in Asset Management and Rebellion Research", "abstract": "On October 30th, 2021, Rebellion Research\u2019s CEO announced in a Q3 2021 Letter to Investors that Rebellion\u2019s AI Global Equity strategy returned +6.8% @@ -4045,14 +4834,16 @@ interactions: In addition, through numerous partnerships with top American universities such as Columbia University, New York University,", "venue": "", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-06-29", "journal": null, - "authors": [{"authorId": "120083176", "name": "J. Shen"}, {"authorId": "2174179255", - "name": "Yihan Mo"}, {"authorId": "2174177138", "name": "Christopher Plimpton"}, - {"authorId": "2174177819", "name": "Mustafa Ba\u015faran"}]}, {"paperId": - "335094aecbee9a8fabec0a1aa680ac411c88b596", "externalIds": {"DBLP": "journals/corr/abs-2206-14672", - "DOI": "10.48550/arXiv.2206.14672", "CorpusId": 250113617}, "url": "https://www.semanticscholar.org/paper/335094aecbee9a8fabec0a1aa680ac411c88b596", + false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-06-29", + "journal": null, "authors": [{"authorId": "120083176", "name": "J. Shen"}, + {"authorId": "2174179255", "name": "Yihan Mo"}, {"authorId": "2174177138", + "name": "Christopher Plimpton"}, {"authorId": "2174177819", "name": "Mustafa + Ba\u015faran"}]}, {"paperId": "335094aecbee9a8fabec0a1aa680ac411c88b596", + "externalIds": {"DBLP": "journals/corr/abs-2206-14672", "DOI": "10.48550/arXiv.2206.14672", + "CorpusId": 250113617}, "corpusId": 250113617, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/335094aecbee9a8fabec0a1aa680ac411c88b596", "title": "Is it possible not to cheat on the Turing Test: Exploring the potential and challenges for true natural language ''understanding'' by computers", "abstract": "The increasing sophistication of NLP models has renewed optimism @@ -4073,13 +4864,18 @@ interactions: in current approaches, I hope to illustrate how far we actually are from achieving this goal, if indeed it is the goal.", "venue": "ArXiv", "year": 2022, "referenceCount": 122, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, - "journal": {"volume": "abs/2206.14672", "name": "ArXiv"}, "authors": [{"authorId": - "1415024767", "name": "Lize Alberts"}]}, {"paperId": "55cd46d1326578f8bd4cbad33f2140a9e4988f8c", - "externalIds": {"DBLP": "conf/aaai/PazzaniSKQH22", "DOI": "10.1609/aaai.v36i11.21491", - "CorpusId": 250298789}, "url": "https://www.semanticscholar.org/paper/55cd46d1326578f8bd4cbad33f2140a9e4988f8c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": null, "journal": {"volume": "abs/2206.14672", "name": "ArXiv"}, + "authors": [{"authorId": "1415024767", "name": "Lize Alberts"}]}, {"paperId": + "55cd46d1326578f8bd4cbad33f2140a9e4988f8c", "externalIds": {"DBLP": "conf/aaai/PazzaniSKQH22", + "DOI": "10.1609/aaai.v36i11.21491", "CorpusId": 250298789}, "corpusId": 250298789, + "publicationVenue": {"id": "bdc2e585-4e48-4e36-8af1-6d859763d405", "name": + "AAAI Conference on Artificial Intelligence", "type": "conference", "alternate_names": + ["National Conference on Artificial Intelligence", "National Conf Artif Intell", + "AAAI Conf Artif Intell", "AAAI"], "url": "http://www.aaai.org/"}, "url": + "https://www.semanticscholar.org/paper/55cd46d1326578f8bd4cbad33f2140a9e4988f8c", "title": "Expert-Informed, User-Centric Explanations for Machine Learning", "abstract": "We argue that the dominant approach to explainable AI for explaining image classification, annotating images with heatmaps, provides little value @@ -4089,16 +4885,21 @@ interactions: of goals of explainable AI systems and propose a Turing Test for explainable AI.", "venue": "AAAI Conference on Artificial Intelligence", "year": 2022, "referenceCount": 53, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2022-06-28", "journal": {"pages": "12280-12286"}, "authors": - [{"authorId": "1694780", "name": "M. Pazzani"}, {"authorId": "2174898403", + true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/21491/21240", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "12280-12286"}, + "authors": [{"authorId": "1694780", "name": "M. Pazzani"}, {"authorId": "2174898403", "name": "Severine Soltani"}, {"authorId": "2174909928", "name": "Robert Kaufman"}, {"authorId": "2174876447", "name": "Samson Qian"}, {"authorId": "2174909444", "name": "Albert Hsiao"}]}, {"paperId": "4240d1ccb21511c276d8a40eeba3e81a4fc65d08", "externalIds": {"DBLP": "conf/aaai/NavigliBL22", "DOI": "10.1609/aaai.v36i11.21490", - "CorpusId": 249564420}, "url": "https://www.semanticscholar.org/paper/4240d1ccb21511c276d8a40eeba3e81a4fc65d08", + "CorpusId": 249564420}, "corpusId": 249564420, "publicationVenue": {"id": + "bdc2e585-4e48-4e36-8af1-6d859763d405", "name": "AAAI Conference on Artificial + Intelligence", "type": "conference", "alternate_names": ["National Conference + on Artificial Intelligence", "National Conf Artif Intell", "AAAI Conf Artif + Intell", "AAAI"], "url": "http://www.aaai.org/"}, "url": "https://www.semanticscholar.org/paper/4240d1ccb21511c276d8a40eeba3e81a4fc65d08", "title": "BabelNet Meaning Representation: A Fully Semantic Formalism to Overcome Language Barriers", "abstract": "Conceptual representations of meaning have long been the general focus of Artificial Intelligence (AI) towards the fundamental @@ -4116,15 +4917,17 @@ interactions: videos, speech and sound, and logical formulas, across many fields of AI.", "venue": "AAAI Conference on Artificial Intelligence", "year": 2022, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2022-06-28", "journal": {"pages": "12274-12279"}, "authors": [{"authorId": - "1733928", "name": "Roberto Navigli"}, {"authorId": "2008183673", "name": - "Rexhina Blloshmi"}, {"authorId": "2153474065", "name": "Abelardo Carlos Mart\u0131\u0301nez - Lorenzo"}]}, {"paperId": "e6ecdbbceff06cc1e667e3261596fd0fa6b32c4b", "externalIds": - {"DBLP": "conf/aaai/CasaresLBhH22", "DOI": "10.1609/aaai.v36i5.20466", "CorpusId": - 250290176}, "url": "https://www.semanticscholar.org/paper/e6ecdbbceff06cc1e667e3261596fd0fa6b32c4b", + "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/21490/21239", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "12274-12279"}, + "authors": [{"authorId": "1733928", "name": "Roberto Navigli"}, {"authorId": + "2008183673", "name": "Rexhina Blloshmi"}, {"authorId": "2153474065", "name": + "Abelardo Carlos Mart\u0131\u0301nez Lorenzo"}]}, {"paperId": "e6ecdbbceff06cc1e667e3261596fd0fa6b32c4b", + "externalIds": {"DBLP": "conf/aaai/CasaresLBhH22", "DOI": "10.1609/aaai.v36i5.20466", + "CorpusId": 250290176}, "corpusId": 250290176, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e6ecdbbceff06cc1e667e3261596fd0fa6b32c4b", "title": "How General-Purpose Is a Language Model? Usefulness and Safety with Human Prompters in the Wild", "abstract": "The new generation of language models is reported to solve some extraordinary tasks the models were never @@ -4141,7 +4944,8 @@ interactions: indicate that language models such as GPT-3 have limited understanding of the human command; far from becoming general-purpose systems in the wild.", "venue": "AAAI", "year": 2022, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/20466/20225", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-06-28", "journal": {"pages": "5295-5303"}, @@ -4151,7 +4955,8 @@ interactions: {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "82d9f1db6db43cb61fe4b0b26a489a2e72628675", "externalIds": {"ArXiv": "2206.12390", "DBLP": "journals/corr/abs-2206-12390", "DOI": "10.48550/arXiv.2206.12390", - "CorpusId": 250048497}, "url": "https://www.semanticscholar.org/paper/82d9f1db6db43cb61fe4b0b26a489a2e72628675", + "CorpusId": 250048497}, "corpusId": 250048497, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/82d9f1db6db43cb61fe4b0b26a489a2e72628675", "title": "A Test for Evaluating Performance in Human-Computer Systems", "abstract": "The Turing test for comparing computer performance to that of humans is well known, but, surprisingly, there is no widely used test for comparing how much @@ -4177,17 +4982,18 @@ interactions: humans rather than just replace them. And in the long run, it might also lead to creating \u201csuperintelligent\u201d human-computer systems.", "venue": "ArXiv", "year": 2022, "referenceCount": 79, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-06-24", "journal": {"volume": "abs/2206.12390", "name": - "ArXiv"}, "authors": [{"authorId": "153604150", "name": "Andres Campero"}, - {"authorId": "153024015", "name": "Michelle Vaccaro"}, {"authorId": "21524995", - "name": "Jaeyoon Song"}, {"authorId": "2075349702", "name": "Haoran Wen"}, - {"authorId": "3085084", "name": "Abdullah Almaatouq"}, {"authorId": "145850249", - "name": "T. Malone"}]}, {"paperId": "08c7bb120cacb4365e23371984956aec952811f2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-24", "journal": + {"volume": "abs/2206.12390", "name": "ArXiv"}, "authors": [{"authorId": "153604150", + "name": "Andres Campero"}, {"authorId": "153024015", "name": "Michelle Vaccaro"}, + {"authorId": "21524995", "name": "Jaeyoon Song"}, {"authorId": "2075349702", + "name": "Haoran Wen"}, {"authorId": "3085084", "name": "Abdullah Almaatouq"}, + {"authorId": "145850249", "name": "T. Malone"}]}, {"paperId": "08c7bb120cacb4365e23371984956aec952811f2", "externalIds": {"PubMedCentral": "9260143", "DOI": "10.3389/fncom.2022.892354", - "CorpusId": 250006009, "PubMed": "35814345"}, "url": "https://www.semanticscholar.org/paper/08c7bb120cacb4365e23371984956aec952811f2", + "CorpusId": 250006009, "PubMed": "35814345"}, "corpusId": 250006009, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/08c7bb120cacb4365e23371984956aec952811f2", "title": "Augmenting Human Selves Through Artificial Agents \u2013 Lessons From the Brain", "abstract": "Much of current artificial intelligence (AI) and the drive toward artificial general intelligence (AGI) focuses on developing @@ -4213,28 +5019,34 @@ interactions: assistants. This reflects the central role of the mind and moral decision-making in most of what we do as humans.", "venue": "Frontiers in Computational Neuroscience", "year": 2022, "referenceCount": 149, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-06-23", "journal": {"volume": "16", "name": "Frontiers in Computational - Neuroscience"}, "authors": [{"authorId": "144296359", "name": "G. Northoff"}, - {"authorId": "4479459", "name": "M. Fraser"}, {"authorId": "144525585", "name": - "John Griffiths"}, {"authorId": "1872364", "name": "D. Pinotsis"}, {"authorId": - "1784317", "name": "P. Panangaden"}, {"authorId": "39116315", "name": "R. - Moran"}, {"authorId": "70438543", "name": "K. Friston"}]}, {"paperId": "228b535c67ada9f39b49593e97d6f20e8bbfcd20", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fncom.2022.892354/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-23", "journal": + {"volume": "16", "name": "Frontiers in Computational Neuroscience"}, "authors": + [{"authorId": "144296359", "name": "G. Northoff"}, {"authorId": "4479459", + "name": "M. Fraser"}, {"authorId": "144525585", "name": "John Griffiths"}, + {"authorId": "1872364", "name": "D. Pinotsis"}, {"authorId": "1784317", "name": + "P. Panangaden"}, {"authorId": "39116315", "name": "R. Moran"}, {"authorId": + "70438543", "name": "K. Friston"}]}, {"paperId": "228b535c67ada9f39b49593e97d6f20e8bbfcd20", "externalIds": {"PubMedCentral": "9208549", "DOI": "10.1038/s41578-022-00450-z", - "CorpusId": 249873711, "PubMed": "35757102"}, "url": "https://www.semanticscholar.org/paper/228b535c67ada9f39b49593e97d6f20e8bbfcd20", + "CorpusId": 249873711, "PubMed": "35757102"}, "corpusId": 249873711, "publicationVenue": + {"id": "722543dd-21f3-4b3c-941b-1045b173ec51", "name": "Nature Reviews Materials", + "type": "journal", "alternate_names": ["Nat Rev Mater"], "issn": "2058-8437", + "url": "http://www.nature.com/natrevmats/"}, "url": "https://www.semanticscholar.org/paper/228b535c67ada9f39b49593e97d6f20e8bbfcd20", "title": "Responsive materials architected in space and time", "abstract": null, "venue": "Nature Reviews Materials", "year": 2022, "referenceCount": - 211, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-20", - "journal": {"volume": "7", "pages": "683 - 701", "name": "Nature Reviews. - Materials"}, "authors": [{"authorId": "46393090", "name": "X. Xia"}, {"authorId": - "5162751", "name": "C. Spadaccini"}, {"authorId": "4380310", "name": "J. Greer"}]}, - {"paperId": "b577c1a8c5601a6ac8eeec481688dbb2ccd798c3", "externalIds": {"DOI": - "10.54517/wt.v2i1.1667", "CorpusId": 251477852}, "url": "https://www.semanticscholar.org/paper/b577c1a8c5601a6ac8eeec481688dbb2ccd798c3", + 211, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.nature.com/articles/s41578-022-00450-z.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2022-06-20", "journal": {"volume": "7", "pages": "683 - 701", "name": "Nature + Reviews. Materials"}, "authors": [{"authorId": "46393090", "name": "X. Xia"}, + {"authorId": "5162751", "name": "C. Spadaccini"}, {"authorId": "4380310", + "name": "J. Greer"}]}, {"paperId": "b577c1a8c5601a6ac8eeec481688dbb2ccd798c3", + "externalIds": {"DOI": "10.54517/wt.v2i1.1667", "CorpusId": 251477852}, "corpusId": + 251477852, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b577c1a8c5601a6ac8eeec481688dbb2ccd798c3", "title": "Mobility aids for visually impaired persons: Journals reviewed", "abstract": "This paper reviews the literature on mobile assistive devices for visual impaired people, in order to have a clear understanding of the @@ -4249,13 +5061,14 @@ interactions: characteristics of the auxiliary system are introduced, and it is found that there is no equipment to meet the needs of users.", "venue": "Wearable Technology", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2022-06-16", "journal": {"name": "Wearable Technology"}, - "authors": [{"authorId": "2181152750", "name": "Ahmed Alejandro Cardona Mesa"}, - {"authorId": "2181152747", "name": "Ruben Dario Vasquez Salazar"}]}, {"paperId": - "5de1970245eff7d2b5b6c914b5ba96df8f67aa1a", "externalIds": {"DBLP": "conf/ACMdis/KimJL22", - "DOI": "10.1145/3532106.3533528", "CorpusId": 249579012}, "url": "https://www.semanticscholar.org/paper/5de1970245eff7d2b5b6c914b5ba96df8f67aa1a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2022-06-16", "journal": {"name": "Wearable + Technology"}, "authors": [{"authorId": "2181152750", "name": "Ahmed Alejandro + Cardona Mesa"}, {"authorId": "2181152747", "name": "Ruben Dario Vasquez Salazar"}]}, + {"paperId": "5de1970245eff7d2b5b6c914b5ba96df8f67aa1a", "externalIds": {"DBLP": + "conf/ACMdis/KimJL22", "DOI": "10.1145/3532106.3533528", "CorpusId": 249579012}, + "corpusId": 249579012, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5de1970245eff7d2b5b6c914b5ba96df8f67aa1a", "title": "Understanding the Negative Aspects of User Experience in Human-likeness of Voice-based Conversational Agents", "abstract": "With advances in artificial intelligence technology, Voice-based Conversational Agents (VCAs) can now @@ -4272,15 +5085,16 @@ interactions: Based on our findings, we discussed design directions for overcoming potential issues of human imitation.", "venue": "Conference on Designing Interactive Systems", "year": 2022, "referenceCount": 78, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", - "Conference"], "publicationDate": "2022-06-13", "journal": {"name": "Designing - Interactive Systems Conference"}, "authors": [{"authorId": "2155255349", "name": - "Hye-youn Kim"}, {"authorId": "2115760976", "name": "Inchan Jung"}, {"authorId": - "1722498", "name": "Youn-kyung Lim"}]}, {"paperId": "c1e9ba0f36cf9ab8c52106b2d75036221545a74b", - "externalIds": {"DOI": "10.34190/eccws.21.1.510", "CorpusId": 249615287}, - "url": "https://www.semanticscholar.org/paper/c1e9ba0f36cf9ab8c52106b2d75036221545a74b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Book", "Conference"], "publicationDate": "2022-06-13", + "journal": {"name": "Designing Interactive Systems Conference"}, "authors": + [{"authorId": "2155255349", "name": "Hye-youn Kim"}, {"authorId": "2115760976", + "name": "Inchan Jung"}, {"authorId": "1722498", "name": "Youn-kyung Lim"}]}, + {"paperId": "c1e9ba0f36cf9ab8c52106b2d75036221545a74b", "externalIds": {"DOI": + "10.34190/eccws.21.1.510", "CorpusId": 249615287}, "corpusId": 249615287, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c1e9ba0f36cf9ab8c52106b2d75036221545a74b", "title": "Reith, Russell, and the Robots: AI, Warfare, and Shaping the Debate", "abstract": "On December 8th, 2021, Professor Stuart Russell delivered the second of that year\u2019s Reith Lectures, presented under the banner title @@ -4311,12 +5125,14 @@ interactions: argue for a cybernetic solution to the problems of cyber warfare.", "venue": "European Conference on Cyber Warfare and Security", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2022-06-10", "journal": {"name": "European Conference on Cyber Warfare and - Security"}, "authors": [{"authorId": "143774639", "name": "K. Scott"}]}, {"paperId": - "84d52ae7494077907185e036e8f9578b6071dd73", "externalIds": {"DOI": "10.1117/12.2636723", - "CorpusId": 249590562}, "url": "https://www.semanticscholar.org/paper/84d52ae7494077907185e036e8f9578b6071dd73", + "openAccessPdf": {"url": "https://papers.academic-conferences.org/index.php/eccws/article/download/510/394", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political + Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2022-06-10", "journal": {"name": "European Conference + on Cyber Warfare and Security"}, "authors": [{"authorId": "143774639", "name": + "K. Scott"}]}, {"paperId": "84d52ae7494077907185e036e8f9578b6071dd73", "externalIds": + {"DOI": "10.1117/12.2636723", "CorpusId": 249590562}, "corpusId": 249590562, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/84d52ae7494077907185e036e8f9578b6071dd73", "title": "The impact of learning rate and data size on CNN for skin cancer detection", "abstract": "Skin cancer is one of the diseases which affect large population in the world. Artificial Intelligence (AI) has been introduced @@ -4328,25 +5144,34 @@ interactions: model can effectively diagnose skin cancer with the adjusted learning rate and data size.", "venue": "Other Conferences", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Conference"], "publicationDate": "2022-06-10", "journal": - {"volume": "12179", "pages": "1217908 - 1217908-7"}, "authors": [{"authorId": - "2170117850", "name": "Jingwen Pan"}]}, {"paperId": "f070418bce9045336c7486fcf7fc390f0ca2ea44", - "externalIds": {"DBLP": "journals/jcal/PhamS22", "DOI": "10.1111/jcal.12687", - "CorpusId": 249560206}, "url": "https://www.semanticscholar.org/paper/f070418bce9045336c7486fcf7fc390f0ca2ea44", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2022-06-10", "journal": {"volume": "12179", "pages": "1217908 + - 1217908-7"}, "authors": [{"authorId": "2170117850", "name": "Jingwen Pan"}]}, + {"paperId": "f070418bce9045336c7486fcf7fc390f0ca2ea44", "externalIds": {"DBLP": + "journals/jcal/PhamS22", "DOI": "10.1111/jcal.12687", "CorpusId": 249560206}, + "corpusId": 249560206, "publicationVenue": {"id": "2d5e093c-6946-4495-ab7e-c7b814a1730d", + "name": "Journal of Computer Assisted Learning", "type": "journal", "alternate_names": + ["J Comput Assist Learn"], "issn": "0266-4909", "url": "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1365-2729", + "alternate_urls": ["https://onlinelibrary.wiley.com/journal/13652729"]}, "url": + "https://www.semanticscholar.org/paper/f070418bce9045336c7486fcf7fc390f0ca2ea44", "title": "The development of artificial intelligence in education: A review in context", "abstract": null, "venue": "Journal of Computer Assisted Learning", "year": 2022, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-06-08", "journal": {"volume": "38", "pages": "1408-1421", - "name": "J. Comput. Assist. Learn."}, "authors": [{"authorId": "2066323655", - "name": "Son Pham"}, {"authorId": "2073958193", "name": "P. Sampson"}]}, {"paperId": - "7b996086ad1ef92ed98ce734a329c51e0aab3e24", "externalIds": {"ArXiv": "2206.01583", - "DBLP": "journals/corr/abs-2206-01583", "DOI": "10.48550/arXiv.2206.01583", - "CorpusId": 249375501}, "url": "https://www.semanticscholar.org/paper/7b996086ad1ef92ed98ce734a329c51e0aab3e24", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2022-06-08", "journal": + {"volume": "38", "pages": "1408-1421", "name": "J. Comput. Assist. Learn."}, + "authors": [{"authorId": "2066323655", "name": "Son Pham"}, {"authorId": "2073958193", + "name": "P. Sampson"}]}, {"paperId": "7b996086ad1ef92ed98ce734a329c51e0aab3e24", + "externalIds": {"ArXiv": "2206.01583", "DBLP": "journals/corr/abs-2206-01583", + "DOI": "10.48550/arXiv.2206.01583", "CorpusId": 249375501}, "corpusId": 249375501, + "publicationVenue": {"id": "14c9aa06-d077-45eb-b51f-0376a780741f", "name": + "Computational Linguistics and Intellectual Technologies", "alternate_names": + ["Comput Linguistics Intellect Technol"], "issn": "2075-7182", "alternate_issns": + ["2221-7932"]}, "url": "https://www.semanticscholar.org/paper/7b996086ad1ef92ed98ce734a329c51e0aab3e24", "title": "Findings of the The RuATD Shared Task 2022 on Artificial Text Detection in Russian", "abstract": "We present the shared task on artificial text detection in Russian, which is organized as a part of the Dialogue Evaluation initiative, @@ -4365,20 +5190,21 @@ interactions: correspondingly. Most teams outperform the baselines by a wide margin. We publicly release our codebase, human evaluation results, and other materials in our GitHub repository.", "venue": "Computational Linguistics and Intellectual - Technologies", "year": 2022, "referenceCount": 58, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-06-03", "journal": {"volume": "abs/2206.01583", "name": - "ArXiv"}, "authors": [{"authorId": "148240197", "name": "T. Shamardina"}, - {"authorId": "51259225", "name": "V. Mikhailov"}, {"authorId": "2168096619", - "name": "Daniil Chernianskii"}, {"authorId": "10054744", "name": "Alena Fenogenova"}, - {"authorId": "2168096594", "name": "Marat Saidov"}, {"authorId": "2168101608", - "name": "A. Valeeva"}, {"authorId": "21159845", "name": "Tatiana Shavrina"}, - {"authorId": "120272188", "name": "I. Smurov"}, {"authorId": "2141764359", - "name": "Elena Tutubalina"}, {"authorId": "13033978", "name": "E. Artemova"}]}, - {"paperId": "c6641a3d8e0cc29ff96bcbc4d5f12a124557d65a", "externalIds": {"DOI": - "10.1177/10946705221103531", "CorpusId": 249359545}, "url": "https://www.semanticscholar.org/paper/c6641a3d8e0cc29ff96bcbc4d5f12a124557d65a", + Technologies", "year": 2022, "referenceCount": 58, "citationCount": 7, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-03", "journal": + {"volume": "abs/2206.01583", "name": "ArXiv"}, "authors": [{"authorId": "148240197", + "name": "T. Shamardina"}, {"authorId": "51259225", "name": "V. Mikhailov"}, + {"authorId": "2168096619", "name": "Daniil Chernianskii"}, {"authorId": "10054744", + "name": "Alena Fenogenova"}, {"authorId": "2168096594", "name": "Marat Saidov"}, + {"authorId": "2168101608", "name": "A. Valeeva"}, {"authorId": "21159845", + "name": "Tatiana Shavrina"}, {"authorId": "120272188", "name": "I. Smurov"}, + {"authorId": "2141764359", "name": "Elena Tutubalina"}, {"authorId": "13033978", + "name": "E. Artemova"}]}, {"paperId": "c6641a3d8e0cc29ff96bcbc4d5f12a124557d65a", + "externalIds": {"DOI": "10.1177/10946705221103531", "CorpusId": 249359545}, + "corpusId": 249359545, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6641a3d8e0cc29ff96bcbc4d5f12a124557d65a", "title": "Conscious Empathic AI in Service", "abstract": "Recent advances in artificial intelligence (AI) have achieved human-scale speed and accuracy for classification tasks. Current systems do not need to be conscious to recognize @@ -4396,13 +5222,19 @@ interactions: agents that can also lead to accountability in AI services. Graphical Abstract", "venue": "Journal of Service Research", "year": 2022, "referenceCount": 136, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-06-03", "journal": {"volume": "25", "pages": "549 - 564", "name": "Journal - of Service Research"}, "authors": [{"authorId": "1696563", "name": "H. Esmaeilzadeh"}, - {"authorId": "2129191", "name": "R. Vaezi"}]}, {"paperId": "6c3ea5bb20d86f107b3005482bbeb6b54ccd8eb8", - "externalIds": {"PubMedCentral": "9204052", "DOI": "10.3389/fpsyg.2022.819042", - "CorpusId": 249284119, "PubMed": "35719586"}, "url": "https://www.semanticscholar.org/paper/6c3ea5bb20d86f107b3005482bbeb6b54ccd8eb8", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-06-03", "journal": {"volume": "25", "pages": "549 + - 564", "name": "Journal of Service Research"}, "authors": [{"authorId": "1696563", + "name": "H. Esmaeilzadeh"}, {"authorId": "2129191", "name": "R. Vaezi"}]}, + {"paperId": "6c3ea5bb20d86f107b3005482bbeb6b54ccd8eb8", "externalIds": {"PubMedCentral": + "9204052", "DOI": "10.3389/fpsyg.2022.819042", "CorpusId": 249284119, "PubMed": + "35719586"}, "corpusId": 249284119, "publicationVenue": {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", + "name": "Frontiers in Psychology", "type": "journal", "alternate_names": ["Front + Psychol"], "issn": "1664-1078", "url": "http://www.frontiersin.org/Cultural_Psychology", + "alternate_urls": ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", + "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, + "url": "https://www.semanticscholar.org/paper/6c3ea5bb20d86f107b3005482bbeb6b54ccd8eb8", "title": "Going Beyond the \u201cSynthetic Method\u201d: New Paradigms Cross-Fertilizing Robotics and Cognitive Neuroscience", "abstract": "In so-called ethorobotics and robot-supported social cognitive neurosciences, robots are used as scientific @@ -4418,14 +5250,16 @@ interactions: generalization of results concerning robot-animal interaction to theoretical conclusions on animal-animal interaction will be identified and discussed.", "venue": "Frontiers in Psychology", "year": 2022, "referenceCount": 76, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2022-06-03", "journal": {"volume": "13", "name": "Frontiers - in Psychology"}, "authors": [{"authorId": "3133425", "name": "E. Datteri"}, - {"authorId": "1728769", "name": "T. Chaminade"}, {"authorId": "2055734634", - "name": "Donato Romano"}]}, {"paperId": "665693d7fd06545e68ec746a42efccceff40fc0f", - "externalIds": {"DOI": "10.1055/a-1718-8846", "CorpusId": 249326970}, "url": + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fpsyg.2022.819042/pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-03", + "journal": {"volume": "13", "name": "Frontiers in Psychology"}, "authors": + [{"authorId": "3133425", "name": "E. Datteri"}, {"authorId": "1728769", "name": + "T. Chaminade"}, {"authorId": "2055734634", "name": "Donato Romano"}]}, {"paperId": + "665693d7fd06545e68ec746a42efccceff40fc0f", "externalIds": {"DOI": "10.1055/a-1718-8846", + "CorpusId": 249326970}, "corpusId": 249326970, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/665693d7fd06545e68ec746a42efccceff40fc0f", "title": "K\u00fcnstliche Intelligenz in der Radiologie", "abstract": "Die klinische Radiologie mit ihren digitalen Daten ist geradezu pr\u00e4destiniert @@ -4434,13 +5268,18 @@ interactions: wo und wie die KI in der Radiologie eingesetzt wird und dabei auch die Frage beantwortet, inwieweit sie Radiolog*innen ersetzen kann.", "venue": "Radiologie up2date", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2022-06-01", "journal": {"name": "Radiologie up2date"}, - "authors": [{"authorId": "151120822", "name": "M. Kromrey"}, {"authorId": - "2167811765", "name": "Sascha Grothe"}, {"authorId": "2073890146", "name": - "C. Nell"}, {"authorId": "2071431220", "name": "B. Rosenberg"}]}, {"paperId": - "5da1b0c659c0c6abbfba241430c1830344791c59", "externalIds": {"DBLP": "journals/alife/GaborIZLMBL22", - "DOI": "10.1162/artl_a_00359", "CorpusId": 250118132}, "url": "https://www.semanticscholar.org/paper/5da1b0c659c0c6abbfba241430c1830344791c59", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2022-06-01", "journal": + {"name": "Radiologie up2date"}, "authors": [{"authorId": "151120822", "name": + "M. Kromrey"}, {"authorId": "2167811765", "name": "Sascha Grothe"}, {"authorId": + "2073890146", "name": "C. Nell"}, {"authorId": "2071431220", "name": "B. Rosenberg"}]}, + {"paperId": "5da1b0c659c0c6abbfba241430c1830344791c59", "externalIds": {"DBLP": + "journals/alife/GaborIZLMBL22", "DOI": "10.1162/artl_a_00359", "CorpusId": + 250118132}, "corpusId": 250118132, "publicationVenue": {"id": "5ed9f470-65a3-4077-8dab-163b0c5cb9e6", + "name": "Artificial Life", "type": "journal", "alternate_names": ["Artif Life"], + "issn": "1064-5462", "url": "http://cognet.mit.edu/library/journals/journal?issn=10645462", + "alternate_urls": ["http://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/loi/artl", + "https://www.mitpressjournals.org/doi/10.1162/ARTL_a_00243"]}, "url": "https://www.semanticscholar.org/paper/5da1b0c659c0c6abbfba241430c1830344791c59", "title": "Self-Replication in Neural Networks", "abstract": "Abstract A key element of biological structures is self-replication. Neural networks are the prime structure used for the emergent construction of complex behavior @@ -4454,19 +5293,24 @@ interactions: analysis of the occurrence of fixpoint weight configurations within the weight space and an approximation of their respective attractor basins.", "venue": "Artificial Life", "year": 2022, "referenceCount": 32, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-06-01", "journal": - {"volume": "28", "pages": "205-223", "name": "Artificial Life"}, "authors": - [{"authorId": "1599420389", "name": "Thomas Gabor"}, {"authorId": "51893497", - "name": "Steffen Illium"}, {"authorId": "2122346529", "name": "Maximilian - Zorn"}, {"authorId": "2174063860", "name": "Cristian Lenta"}, {"authorId": - "38928863", "name": "Andy Mattausch"}, {"authorId": "1841968", "name": "Lenz - Belzner"}, {"authorId": "1402371578", "name": "C. Linnhoff-Popien"}]}, {"paperId": - "c9fb788bdbf0d5d449e4c9f344cd9575bb39c367", "externalIds": {"DBLP": "journals/entropy/0001L22", - "PubMedCentral": "9222757", "DOI": "10.3390/e24060819", "CorpusId": 249634376, - "PubMed": "35741540"}, "url": "https://www.semanticscholar.org/paper/c9fb788bdbf0d5d449e4c9f344cd9575bb39c367", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://direct.mit.edu/artl/article-pdf/28/2/205/2032777/artl_a_00359.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-06-01", "journal": {"volume": "28", "pages": "205-223", + "name": "Artificial Life"}, "authors": [{"authorId": "1599420389", "name": + "Thomas Gabor"}, {"authorId": "51893497", "name": "Steffen Illium"}, {"authorId": + "2122346529", "name": "Maximilian Zorn"}, {"authorId": "2174063860", "name": + "Cristian Lenta"}, {"authorId": "38928863", "name": "Andy Mattausch"}, {"authorId": + "1841968", "name": "Lenz Belzner"}, {"authorId": "1402371578", "name": "C. + Linnhoff-Popien"}]}, {"paperId": "c9fb788bdbf0d5d449e4c9f344cd9575bb39c367", + "externalIds": {"DBLP": "journals/entropy/0001L22", "PubMedCentral": "9222757", + "DOI": "10.3390/e24060819", "CorpusId": 249634376, "PubMed": "35741540"}, + "corpusId": 249634376, "publicationVenue": {"id": "8270cfe1-3713-4325-a7bd-c6a87eed889e", + "name": "Entropy", "type": "journal", "issn": "1099-4300", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-155606", + "alternate_urls": ["http://www.mdpi.com/journal/entropy/", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-155606", + "https://www.mdpi.com/journal/entropy"]}, "url": "https://www.semanticscholar.org/paper/c9fb788bdbf0d5d449e4c9f344cd9575bb39c367", "title": "Competency in Navigating Arbitrary Spaces as an Invariant for Analyzing Cognition in Diverse Embodiments", "abstract": "One of the most salient features of life is its capacity to handle novelty and namely to thrive and adapt to @@ -4491,16 +5335,20 @@ interactions: which will be essential for progress in artificial intelligence and regenerative medicine and for thriving in a world increasingly populated by synthetic, bio-robotic, and hybrid beings.", "venue": "Entropy", "year": 2022, "referenceCount": - 251, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2022-06-01", "journal": - {"volume": "24", "name": "Entropy"}, "authors": [{"authorId": "144993883", + 251, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.mdpi.com/1099-4300/24/6/819/pdf?version=1655801162", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-06-01", + "journal": {"volume": "24", "name": "Entropy"}, "authors": [{"authorId": "144993883", "name": "C. Fields"}, {"authorId": "2070083615", "name": "M. Levin"}]}, {"paperId": "3393331480eeb0d0acf81e06b35a7d4722e87c1a", "externalIds": {"PubMedCentral": "9240685", "DOI": "10.1098/rsif.2022.0214", "CorpusId": 247382247, "PubMed": - "35765805"}, "url": "https://www.semanticscholar.org/paper/3393331480eeb0d0acf81e06b35a7d4722e87c1a", + "35765805"}, "corpusId": 247382247, "publicationVenue": {"id": "f6537e0e-c3a9-4de5-bd36-19eda0434065", + "name": "Journal of the Royal Society Interface", "type": "journal", "alternate_names": + ["J R Soc Interface"], "issn": "1742-5662", "url": "http://rsif.royalsocietypublishing.org/"}, + "url": "https://www.semanticscholar.org/paper/3393331480eeb0d0acf81e06b35a7d4722e87c1a", "title": "May the 4C''s be with you: an overview of complexity-inspired frameworks for analysing resting-state neuroimaging data", "abstract": "Competing and complementary models of resting-state brain dynamics contribute to our phenomenological @@ -4519,8 +5367,8 @@ interactions: and potentially understand, macroscale spontaneous brain functioning.", "venue": "Journal of the Royal Society Interface", "year": 2022, "referenceCount": 182, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-06-01", "journal": {"volume": "19", "name": "Journal of the Royal Society Interface"}, "authors": @@ -4530,27 +5378,33 @@ interactions: "name": "J. Cabral"}, {"authorId": "7013131", "name": "O. Dipasquale"}, {"authorId": "1691067", "name": "F. Turkheimer"}]}, {"paperId": "11624c026132e37c8909bd2eef6139af613e7e30", "externalIds": {"DOI": "10.1007/s11229-022-03695-x", "CorpusId": 249260212}, + "corpusId": 249260212, "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", + "name": "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", + "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, "url": "https://www.semanticscholar.org/paper/11624c026132e37c8909bd2eef6139af613e7e30", "title": "Panpsychism and AI consciousness", "abstract": null, "venue": "Synthese", - "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2022-05-31", "journal": {"name": "Synthese"}, "authors": + "year": 2022, "referenceCount": 63, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://philpapers.org/archive/ARVPAA.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2022-05-31", "journal": {"volume": "200", "name": "Synthese"}, "authors": [{"authorId": "37802891", "name": "Marcus Arvan"}, {"authorId": "3030854", "name": "Corey J. Maley"}]}, {"paperId": "653ef7ab22217cfe74015157200a8dd31152f339", "externalIds": {"PubMedCentral": "9194558", "DOI": "10.3389/fnbot.2022.728829", - "CorpusId": 249183566, "PubMed": "35711283"}, "url": "https://www.semanticscholar.org/paper/653ef7ab22217cfe74015157200a8dd31152f339", + "CorpusId": 249183566, "PubMed": "35711283"}, "corpusId": 249183566, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/653ef7ab22217cfe74015157200a8dd31152f339", "title": "Is It Necessary to Integrate Evo-Devo to the Analysis and Construction of Artificial Emotional Systems?", "abstract": null, "venue": "Frontiers in Neurorobotics", "year": 2022, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-05-31", "journal": {"volume": "16", "name": "Frontiers in Neurorobotics"}, - "authors": [{"authorId": "2166989334", "name": "Jorge Luis Hern\u00e1ndez-Ochoa"}, - {"authorId": "1398581101", "name": "F. Vergara-Silva"}]}, {"paperId": "ba066efae508e79fb34984c50311f53f64be6284", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fnbot.2022.728829/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-31", "journal": + {"volume": "16", "name": "Frontiers in Neurorobotics"}, "authors": [{"authorId": + "2166989334", "name": "Jorge Luis Hern\u00e1ndez-Ochoa"}, {"authorId": "1398581101", + "name": "F. Vergara-Silva"}]}, {"paperId": "ba066efae508e79fb34984c50311f53f64be6284", "externalIds": {"DOI": "10.1109/COMSCI55378.2022.9912577", "CorpusId": 252849476}, - "url": "https://www.semanticscholar.org/paper/ba066efae508e79fb34984c50311f53f64be6284", + "corpusId": 252849476, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba066efae508e79fb34984c50311f53f64be6284", "title": "Evolution of the Concept of Self-Organization by the Founding Fathers of A.I.", "abstract": "The paper makes a literature overview of the classic concepts of the founding fathers of artificial intelligence, in an attempt @@ -4558,14 +5412,14 @@ interactions: a method to achieve really autonomous decision-making methods.", "venue": "2022 10th International Scientific Conference on Computer Science (COMSCI)", "year": 2022, "referenceCount": 26, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference", - "Review"], "publicationDate": "2022-05-30", "journal": {"pages": "1-7", "name": - "2022 10th International Scientific Conference on Computer Science (COMSCI)"}, - "authors": [{"authorId": "38716791", "name": "A. Marchev"}, {"authorId": "2187592469", - "name": "Milena Piryankova"}]}, {"paperId": "7cc18a9edbd41adf21023be826bd9f5f9fa26af6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Conference", "Review"], "publicationDate": "2022-05-30", "journal": {"pages": + "1-7", "name": "2022 10th International Scientific Conference on Computer + Science (COMSCI)"}, "authors": [{"authorId": "38716791", "name": "A. Marchev"}, + {"authorId": "2187592469", "name": "Milena Piryankova"}]}, {"paperId": "7cc18a9edbd41adf21023be826bd9f5f9fa26af6", "externalIds": {"DOI": "10.4467/20843976zk.22.003.15869", "CorpusId": 252502039}, - "url": "https://www.semanticscholar.org/paper/7cc18a9edbd41adf21023be826bd9f5f9fa26af6", + "corpusId": 252502039, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7cc18a9edbd41adf21023be826bd9f5f9fa26af6", "title": "Zaawansowane procedury NLP jako przes\u0142anka rekonstrukcji idei wiedzy", "abstract": "Advanced NLP Procedures as Premises for the Reconstruction of the Idea of Knowledge\n\nThe article presents the current state of development @@ -4586,12 +5440,17 @@ interactions: disposal of humans, leads to the question of the status of artificial cognitive agents, such as the GPT-3 language model.", "venue": "Zarz\u0105dzanie w Kulturze", "year": 2022, "referenceCount": 44, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-05-30", "journal": {"name": "Zarz\u0105dzanie w Kulturze"}, - "authors": [{"authorId": "10712104", "name": "R. Maci\u0105g"}]}, {"paperId": - "1cad9f8d14a92549594f8e1ec048ac9d079bb9fd", "externalIds": {"DOI": "10.3390/philosophies7030057", - "CorpusId": 249217491}, "url": "https://www.semanticscholar.org/paper/1cad9f8d14a92549594f8e1ec048ac9d079bb9fd", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-05-30", "journal": {"name": "Zarz\u0105dzanie + w Kulturze"}, "authors": [{"authorId": "10712104", "name": "R. Maci\u0105g"}]}, + {"paperId": "1cad9f8d14a92549594f8e1ec048ac9d079bb9fd", "externalIds": {"DOI": + "10.3390/philosophies7030057", "CorpusId": 249217491}, "corpusId": 249217491, + "publicationVenue": {"id": "ef4fb77f-61b5-4988-8f50-738b45be5d7e", "name": + "Philosophies", "type": "journal", "issn": "0766-1398", "alternate_issns": + ["2409-9287"], "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-691408", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-691408", + "https://www.mdpi.com/journal/philosophies"]}, "url": "https://www.semanticscholar.org/paper/1cad9f8d14a92549594f8e1ec048ac9d079bb9fd", "title": "From Turing to Conscious Machines", "abstract": "In the period between Turing\u2019s 1950 \u201cComputing Machinery and Intelligence\u201d and the current considerable public exposure to the term \u201cartificial intelligence @@ -4612,12 +5471,13 @@ interactions: an artificial form of consciousness that resembles the natural form and that throws some light on its nature.", "venue": "Philosophies", "year": 2022, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + true, "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/7/3/57/pdf?version=1653821639", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-29", "journal": {"name": "Philosophies"}, "authors": [{"authorId": "1699999", "name": "I. Aleksander"}]}, {"paperId": "7b8b180ce09b2e8298baca16015ea1dde574314a", "externalIds": {"DOI": "10.24018/ejbmr.2022.7.3.1432", "CorpusId": 249217793}, - "url": "https://www.semanticscholar.org/paper/7b8b180ce09b2e8298baca16015ea1dde574314a", + "corpusId": 249217793, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7b8b180ce09b2e8298baca16015ea1dde574314a", "title": "Artificial Intelligence in Construction Projects: An Explorative Study of Professionals\u2019 Expectations", "abstract": "have a huge impact on projects and project management practices in the forthcoming years. The @@ -4633,14 +5493,15 @@ interactions: countries, where somewhat surprisingly the latter are more ready to adopt AI in their projects.", "venue": "European Journal of Business and Management Research", "year": 2022, "referenceCount": 127, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2022-05-28", "journal": {"name": "European Journal of - Business and Management Research"}, "authors": [{"authorId": "90220793", "name": - "Vered Holzmann"}, {"authorId": "2167191576", "name": "Michele Lechiara"}]}, - {"paperId": "50902395c5fab923f833cdc97d4da40d1888e398", "externalIds": {"PubMedCentral": - "9167026", "DOI": "10.1155/2022/2169521", "CorpusId": 249372070, "PubMed": - "35669659"}, "url": "https://www.semanticscholar.org/paper/50902395c5fab923f833cdc97d4da40d1888e398", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ejbmr.org/index.php/ejbmr/article/download/1432/792", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2022-05-28", "journal": {"name": "European Journal of Business and Management + Research"}, "authors": [{"authorId": "90220793", "name": "Vered Holzmann"}, + {"authorId": "2167191576", "name": "Michele Lechiara"}]}, {"paperId": "50902395c5fab923f833cdc97d4da40d1888e398", + "externalIds": {"PubMedCentral": "9167026", "DOI": "10.1155/2022/2169521", + "CorpusId": 249372070, "PubMed": "35669659"}, "corpusId": 249372070, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/50902395c5fab923f833cdc97d4da40d1888e398", "title": "Application of Artificial Intelligence System Based on Wireless Sensor Network in Enterprise Management", "abstract": "With the improvement of the ability to acquire natural information, wireless sensor networks also @@ -4666,14 +5527,17 @@ interactions: and the sustainable development of the enterprise, thereby promoting the sustainable development of the computer technology industry.", "venue": "Computational intelligence and neuroscience", "year": 2022, "referenceCount": 24, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-05-27", "journal": {"volume": "2022", "name": "Computational - Intelligence and Neuroscience"}, "authors": [{"authorId": "2149140570", "name": - "Kefeng Li"}]}, {"paperId": "b0f96566dc80ae46f69c4d606686e19a88347d52", "externalIds": - {"ArXiv": "2205.13131", "DBLP": "journals/corr/abs-2205-13131", "DOI": "10.48550/arXiv.2205.13131", - "CorpusId": 249097666}, "url": "https://www.semanticscholar.org/paper/b0f96566dc80ae46f69c4d606686e19a88347d52", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://downloads.hindawi.com/journals/cin/2022/2169521.pdf", "status": null}, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-27", "journal": + {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, + "authors": [{"authorId": "2149140570", "name": "Kefeng Li"}]}, {"paperId": + "b0f96566dc80ae46f69c4d606686e19a88347d52", "externalIds": {"ArXiv": "2205.13131", + "DBLP": "journals/corr/abs-2205-13131", "DOI": "10.48550/arXiv.2205.13131", + "CorpusId": 249097666}, "corpusId": 249097666, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b0f96566dc80ae46f69c4d606686e19a88347d52", "title": "On the Evolution of A.I. and Machine Learning: Towards Measuring and Understanding Impact, Influence, and Leadership at Premier A.I. Conferences", "abstract": "Arti\ufb01cial Intelligence is now recognized as a general-purpose @@ -4698,16 +5562,17 @@ interactions: from large technical venues datasets and suggests novel insights that can contribute to understanding and measuring AI\u2019s evolution.", "venue": "ArXiv", "year": 2022, "referenceCount": 150, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-05-26", "journal": {"volume": "abs/2205.13131", "name": - "ArXiv"}, "authors": [{"authorId": "2105610568", "name": "Rafael B. Audibert"}, - {"authorId": "2065162795", "name": "Henrique Lemos"}, {"authorId": "144862483", - "name": "Pedro H. C. Avelar"}, {"authorId": "2226999", "name": "A. Tavares"}, - {"authorId": "2335532", "name": "L. Lamb"}]}, {"paperId": "fa5c9c3cabacc1abc44a8ad1f1cef0fbae1f6067", - "externalIds": {"DOI": "10.3390/app12115373", "CorpusId": 249117883}, "url": - "https://www.semanticscholar.org/paper/fa5c9c3cabacc1abc44a8ad1f1cef0fbae1f6067", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-26", "journal": + {"volume": "abs/2205.13131", "name": "ArXiv"}, "authors": [{"authorId": "2105610568", + "name": "Rafael B. Audibert"}, {"authorId": "2065162795", "name": "Henrique + Lemos"}, {"authorId": "144862483", "name": "Pedro H. C. Avelar"}, {"authorId": + "2226999", "name": "A. Tavares"}, {"authorId": "2335532", "name": "L. Lamb"}]}, + {"paperId": "fa5c9c3cabacc1abc44a8ad1f1cef0fbae1f6067", "externalIds": {"DOI": + "10.3390/app12115373", "CorpusId": 249117883}, "corpusId": 249117883, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fa5c9c3cabacc1abc44a8ad1f1cef0fbae1f6067", "title": "Chinese Named Entity Recognition Based on Knowledge Based Question Answering System", "abstract": "The KBQA (Knowledge-Based Question Answering) system is an essential part of the smart customer service system. KBQA is @@ -4738,16 +5603,18 @@ interactions: The results of this work will also fill the gap in the research of intelligent customer-service-related technologies in the power grid field in China.", "venue": "Applied Sciences", "year": 2022, "referenceCount": 15, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-05-26", "journal": {"name": - "Applied Sciences"}, "authors": [{"authorId": "16075609", "name": "Didi Yin"}, - {"authorId": "2125160755", "name": "Siyuan Cheng"}, {"authorId": "2149190829", - "name": "Boxu Pan"}, {"authorId": "2166548040", "name": "Yuanyuan Qiao"}, - {"authorId": "47748857", "name": "Wei Zhao"}, {"authorId": "2142655724", "name": - "Dongyu Wang"}]}, {"paperId": "3f73e267744f98cffdea5550bcc950f6a928a120", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2076-3417/12/11/5373/pdf?version=1653553228", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-26", + "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "16075609", + "name": "Didi Yin"}, {"authorId": "2125160755", "name": "Siyuan Cheng"}, {"authorId": + "2149190829", "name": "Boxu Pan"}, {"authorId": "2166548040", "name": "Yuanyuan + Qiao"}, {"authorId": "47748857", "name": "Wei Zhao"}, {"authorId": "2142655724", + "name": "Dongyu Wang"}]}, {"paperId": "3f73e267744f98cffdea5550bcc950f6a928a120", "externalIds": {"DBLP": "journals/corr/abs-2205-12749", "ArXiv": "2205.12749", - "DOI": "10.48550/arXiv.2205.12749", "CorpusId": 249063006}, "url": "https://www.semanticscholar.org/paper/3f73e267744f98cffdea5550bcc950f6a928a120", + "DOI": "10.48550/arXiv.2205.12749", "CorpusId": 249063006}, "corpusId": 249063006, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f73e267744f98cffdea5550bcc950f6a928a120", "title": "A Human-Centric Assessment Framework for AI", "abstract": "With the rise of AI systems in real-world applications comes the need for reliable and trustworthy AI. An essential aspect of this are explainable AI systems. @@ -4764,18 +5631,18 @@ interactions: label uncertainties; (2) an assessment where the usefulness of provided explanations is determined in a human-centric manner.", "venue": "ArXiv", "year": 2022, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-05-25", "journal": {"volume": "abs/2205.12749", "name": "ArXiv"}, "authors": - [{"authorId": "3467930", "name": "S. Saralajew"}, {"authorId": "40515722", - "name": "Ammar Shaker"}, {"authorId": "2166335112", "name": "Zhao Xu"}, {"authorId": - "24868638", "name": "Kiril Gashteovski"}, {"authorId": "2105201", "name": - "Bhushan Kotnis"}, {"authorId": "2166312218", "name": "Wiem Ben-Rim"}, {"authorId": - "152845986", "name": "J\u00fcrgen Quittek"}, {"authorId": "19752252", "name": - "Carolin (Haas) Lawrence"}]}, {"paperId": "ddeff568cda01b968e2b4564274931675e2acb81", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-05-25", "journal": {"volume": "abs/2205.12749", "name": + "ArXiv"}, "authors": [{"authorId": "3467930", "name": "S. Saralajew"}, {"authorId": + "40515722", "name": "Ammar Shaker"}, {"authorId": "2166335112", "name": "Zhao + Xu"}, {"authorId": "24868638", "name": "Kiril Gashteovski"}, {"authorId": + "2105201", "name": "Bhushan Kotnis"}, {"authorId": "2166312218", "name": "Wiem + Ben-Rim"}, {"authorId": "152845986", "name": "J\u00fcrgen Quittek"}, {"authorId": + "19752252", "name": "Carolin (Haas) Lawrence"}]}, {"paperId": "ddeff568cda01b968e2b4564274931675e2acb81", "externalIds": {"DOI": "10.3390/proceedings2022081147", "CorpusId": 249112695}, - "url": "https://www.semanticscholar.org/paper/ddeff568cda01b968e2b4564274931675e2acb81", + "corpusId": 249112695, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ddeff568cda01b968e2b4564274931675e2acb81", "title": "Three Approaches to Artificial Intelligence", "abstract": ": The aim of this paper is the expansion of understanding what intelligence is, what is being performed in the area of AI and in which direction to move further @@ -4784,13 +5651,17 @@ interactions: Its application entails three approaches to the development of arti\ufb01cial intelligence.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 16, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-05-25", "journal": {"name": - "The 2021 Summit of the International Society for the Study of Information"}, - "authors": [{"authorId": "2073713180", "name": "M. Burgin"}]}, {"paperId": - "a596e546e8a913d2121bf5dc9effc43631434d3b", "externalIds": {"DOI": "10.12688/digitaltwin.17574.1", - "CorpusId": 249077431}, "url": "https://www.semanticscholar.org/paper/a596e546e8a913d2121bf5dc9effc43631434d3b", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2504-3900/81/1/147/pdf?version=1653549583", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-25", + "journal": {"name": "The 2021 Summit of the International Society for the + Study of Information"}, "authors": [{"authorId": "2073713180", "name": "M. + Burgin"}]}, {"paperId": "a596e546e8a913d2121bf5dc9effc43631434d3b", "externalIds": + {"DOI": "10.12688/digitaltwin.17574.1", "CorpusId": 249077431}, "corpusId": + 249077431, "publicationVenue": {"id": "22d1db70-9ab0-44a4-ab3c-72560c6d550d", + "name": "Digital Twin", "alternate_names": ["Digit Twin"], "issn": "2752-5783"}, + "url": "https://www.semanticscholar.org/paper/a596e546e8a913d2121bf5dc9effc43631434d3b", "title": "Intelligent digital twins and the development and management of complex systems", "abstract": "The interest in defining and implementing Digital Twins (DT) is at the forefront of today\u2019s product organizations. The @@ -4802,17 +5673,19 @@ interactions: need to increase in capability, becoming intelligent in their approach. This article presents a discussion on how these Intelligent Digital Twins (IDTs) will evolve and assist in developing and managing complex systems.", "venue": - "Digital Twin", "year": 2022, "referenceCount": 40, "citationCount": 5, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-05-25", "journal": {"name": "Digital Twin"}, "authors": - [{"authorId": "2022322", "name": "Michael W. Grieves"}]}, {"paperId": "697aa30bd8d5e45b75b865a173b935612b8d6c84", - "externalIds": {"PubMedCentral": "9590390", "DOI": "10.1007/s43681-022-00227-8", - "CorpusId": 249133416, "PubMed": "36313215"}, "url": "https://www.semanticscholar.org/paper/697aa30bd8d5e45b75b865a173b935612b8d6c84", + "Digital Twin", "year": 2022, "referenceCount": 40, "citationCount": 6, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-05-25", "journal": {"name": "Digital Twin"}, + "authors": [{"authorId": "2022322", "name": "Michael W. Grieves"}]}, {"paperId": + "697aa30bd8d5e45b75b865a173b935612b8d6c84", "externalIds": {"PubMedCentral": + "9590390", "DOI": "10.1007/s43681-022-00227-8", "CorpusId": 249133416, "PubMed": + "36313215"}, "corpusId": 249133416, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/697aa30bd8d5e45b75b865a173b935612b8d6c84", "title": "Turing test-inspired method for analysis of biases prevalent in artificial intelligence-based medical imaging", "abstract": null, "venue": "bioRxiv", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-022-00227-8.pdf", + "status": null}, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -4822,7 +5695,12 @@ interactions: "name": "F. Dako"}, {"authorId": "2117008145", "name": "Edward Kim"}]}, {"paperId": "fcad037a73ef85653153cb8c6d683145c4d60391", "externalIds": {"PubMedCentral": "9191771", "DOI": "10.1073/pnas.2205971119", "CorpusId": 249045365, "PubMed": - "35609191"}, "url": "https://www.semanticscholar.org/paper/fcad037a73ef85653153cb8c6d683145c4d60391", + "35609191"}, "corpusId": 249045365, "publicationVenue": {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", + "name": "Proceedings of the National Academy of Sciences of the United States + of America", "type": "journal", "alternate_names": ["Proc National Acad Sci + u s Am"], "issn": "0027-8424", "url": "https://www.jstor.org/journal/procnatiacadscie", + "alternate_urls": ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", + "http://www.pnas.org/"]}, "url": "https://www.semanticscholar.org/paper/fcad037a73ef85653153cb8c6d683145c4d60391", "title": "A blueprint for conscious machines", "abstract": "Although it has been the subject of human thought for many centuries, consciousness remains a mysterious and controversial topic. Every one of us is overly familiar with @@ -4851,27 +5729,30 @@ interactions: related to consciousness.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-24", "journal": {"volume": "119", "name": "Proceedings of the National Academy of Sciences of the United States of America"}, "authors": [{"authorId": "1706641", "name": "Arlindo L. Oliveira"}]}, {"paperId": "447a0c8367dee5becac1cf08f0a094f3d375709a", "externalIds": {"DOI": "10.1038/s41570-022-00391-9", "CorpusId": 248991745}, - "url": "https://www.semanticscholar.org/paper/447a0c8367dee5becac1cf08f0a094f3d375709a", + "corpusId": 248991745, "publicationVenue": {"id": "edf218ab-5799-4f63-92db-e9bb3f362834", + "name": "Nature Reviews Chemistry", "alternate_names": ["Nat Rev Chem"], "issn": + "2397-3358", "url": "http://www.nature.com/natrevchem/"}, "url": "https://www.semanticscholar.org/paper/447a0c8367dee5becac1cf08f0a094f3d375709a", "title": "Evaluation guidelines for machine learning tools in the chemical sciences", "abstract": null, "venue": "Nature Reviews Chemistry", "year": 2022, "referenceCount": 164, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2022-05-24", "journal": {"volume": "6", "pages": "428 - - 442", "name": "Nature Reviews Chemistry"}, "authors": [{"authorId": "144917032", - "name": "A. Bender"}, {"authorId": "2164196529", "name": "Nadine Schneider"}, - {"authorId": "3451383", "name": "Marwin H. S. Segler"}, {"authorId": "151506130", - "name": "W. Patrick Walters"}, {"authorId": "2859540", "name": "O. Engkvist"}, - {"authorId": "2137594860", "name": "Tiago Rodrigues"}]}, {"paperId": "9d563538a42b05872301267be2cdb6dc2475f815", - "externalIds": {"ArXiv": "2209.10103", "DOI": "10.1029/2021WR031776", "CorpusId": - 249033681}, "url": "https://www.semanticscholar.org/paper/9d563538a42b05872301267be2cdb6dc2475f815", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2022-05-24", "journal": {"volume": "6", "pages": + "428 - 442", "name": "Nature Reviews Chemistry"}, "authors": [{"authorId": + "144917032", "name": "A. Bender"}, {"authorId": "2164196529", "name": "Nadine + Schneider"}, {"authorId": "3451383", "name": "Marwin H. S. Segler"}, {"authorId": + "151506130", "name": "W. Patrick Walters"}, {"authorId": "2859540", "name": + "O. Engkvist"}, {"authorId": "2137594860", "name": "Tiago Rodrigues"}]}, {"paperId": + "9d563538a42b05872301267be2cdb6dc2475f815", "externalIds": {"ArXiv": "2209.10103", + "DOI": "10.1029/2021WR031776", "CorpusId": 249033681}, "corpusId": 249033681, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9d563538a42b05872301267be2cdb6dc2475f815", "title": "Multi\u2010Tracer Groundwater Dating in Southern Oman Using Bayesian Modeling", "abstract": "In the scope of assessing aquifer systems in areas where freshwater is scarce, estimation of transit times is a vital step to @@ -4893,7 +5774,8 @@ interactions: modeling in hydrology and the potential of nonparametric models for an adequate representation of aquifer dynamics.", "venue": "Water Resources Research", "year": 2022, "referenceCount": 125, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2209.10103", + "status": null}, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-23", "journal": {"volume": @@ -4904,7 +5786,11 @@ interactions: "40863702", "name": "W. Aeschbach"}, {"authorId": "4088484", "name": "M. Oberthaler"}, {"authorId": null, "name": "Thomas M\u00fcller"}]}, {"paperId": "ecc454a1ad14914cb339a32aeb7cd4eafd5b52fd", "externalIds": {"DOI": "10.1177/20438206221102952", "CorpusId": 249054082}, - "url": "https://www.semanticscholar.org/paper/ecc454a1ad14914cb339a32aeb7cd4eafd5b52fd", + "corpusId": 249054082, "publicationVenue": {"id": "966c340f-abae-4947-a74a-b0b8c8d68b32", + "name": "Dialogues in Human Geography", "type": "journal", "alternate_names": + ["Dialogues Hum Geogr", "Dialogues in human geography", "Dialogues hum geogr"], + "issn": "2043-8206", "url": "http://www.sagepub.com/journals/Journal202000", + "alternate_urls": ["https://journals.sagepub.com/home/dhg"]}, "url": "https://www.semanticscholar.org/paper/ecc454a1ad14914cb339a32aeb7cd4eafd5b52fd", "title": "Glitch epistemology and the question of (artificial) intelligence: Perceptions, encounters, subjectivities", "abstract": "Reflecting on Leszczynski and Elwood''s theorization of glitch epistemology, this commentary argues @@ -4918,14 +5804,16 @@ interactions: production of desire and expectations for particular kinds of technologies and create opportunities to radically reimagine our relationships to them.", "venue": "Dialogues in Human Geography", "year": 2022, "referenceCount": 16, - "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-05-23", "journal": {"volume": "12", "pages": "379 - - 383", "name": "Dialogues in Human Geography"}, "authors": [{"authorId": - "4188821", "name": "Casey R. Lynch"}]}, {"paperId": "f6cd6e23a956e46240b86955e4f37f00ec06b249", - "externalIds": {"DOI": "10.4025/actascilangcult.v44i1.60071", "CorpusId": - 249488136}, "url": "https://www.semanticscholar.org/paper/f6cd6e23a956e46240b86955e4f37f00ec06b249", + "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ris.utwente.nl/ws/files/285086564/20438206221102952.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", + "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-23", "journal": + {"volume": "12", "pages": "379 - 383", "name": "Dialogues in Human Geography"}, + "authors": [{"authorId": "4188821", "name": "Casey R. Lynch"}]}, {"paperId": + "f6cd6e23a956e46240b86955e4f37f00ec06b249", "externalIds": {"DOI": "10.4025/actascilangcult.v44i1.60071", + "CorpusId": 249488136}, "corpusId": 249488136, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f6cd6e23a956e46240b86955e4f37f00ec06b249", "title": "A voz do estere\u00f3tipo nos assistentes digitais", "abstract": "Os processos de reprodu\u00e7\u00e3o e sintetiza\u00e7\u00e3o da voz humana nos dispositivos de assist\u00eancia digital n\u00e3o obedecem, somente, a @@ -4950,19 +5838,25 @@ interactions: contempor\u00e2neo \u2013 a impossibilidade dial\u00f3gica de ambos.", "venue": "Acta Scientiarum. Language and Culture", "year": 2022, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2022-05-20", "journal": {"name": "Acta Scientiarum. Language and Culture"}, - "authors": [{"authorId": "145958425", "name": "Joaquim Braga"}]}, {"paperId": - "1bf4c8e3e2ca4d76c6f563fa195897d182ab46bf", "externalIds": {"DOI": "10.1007/s00287-022-01456-1", - "CorpusId": 248935079}, "url": "https://www.semanticscholar.org/paper/1bf4c8e3e2ca4d76c6f563fa195897d182ab46bf", + "openAccessPdf": {"url": "https://periodicos.uem.br/ojs/index.php/ActaSciLangCult/article/download/60071/751375154219", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2022-05-20", "journal": {"name": "Acta Scientiarum. + Language and Culture"}, "authors": [{"authorId": "145958425", "name": "Joaquim + Braga"}]}, {"paperId": "1bf4c8e3e2ca4d76c6f563fa195897d182ab46bf", "externalIds": + {"DOI": "10.1007/s00287-022-01456-1", "CorpusId": 248935079}, "corpusId": + 248935079, "publicationVenue": {"id": "518d38cf-179f-480b-b32a-c9d4e6bba46e", + "name": "Informatik-Spektrum", "type": "journal", "alternate_names": ["Informatik + Spektrum", "Inform Spektrum"], "issn": "0170-6012", "url": "https://link.springer.com/journal/287"}, + "url": "https://www.semanticscholar.org/paper/1bf4c8e3e2ca4d76c6f563fa195897d182ab46bf", "title": "Komputer kreiert Wissenschaft", "abstract": null, "venue": "Informatik-Spektrum", "year": 2022, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00287-022-01456-1.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-05-19", "journal": {"volume": "45", "pages": "356 - 365", "name": "Informatik Spektrum"}, "authors": [{"authorId": "2044015490", "name": "W. Bibel"}]}, {"paperId": "48f8b1435fcbd10b7d4cf613322328d7062d94c6", "externalIds": {"DOI": "10.3390/proceedings2022081146", "CorpusId": 248926485}, - "url": "https://www.semanticscholar.org/paper/48f8b1435fcbd10b7d4cf613322328d7062d94c6", + "corpusId": 248926485, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48f8b1435fcbd10b7d4cf613322328d7062d94c6", "title": "A Framework of \u201cQuantitative \u2a02 Fixed Image \u21d2 Qualitative\u201d Induced by Contradiction Generation and Meta Synthetic Wisdom Engineering", "abstract": "Due to the past tP and the future tF being divided into a pair @@ -4994,25 +5888,32 @@ interactions: Image Intelligence\u21d2 Qualitative Intelligence (Meta Synthetic Wisdom)\u201d, as proposed by Hsue-shen Tsien.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 12, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-05-17", "journal": {"name": - "The 2021 Summit of the International Society for the Study of Information"}, - "authors": [{"authorId": "33913425", "name": "Jia-li Feng"}, {"authorId": - "3365739", "name": "Peizhuang Wang"}]}, {"paperId": "f7cae1bc9b7ba214721cba3fd111fda57678de3f", - "externalIds": {"DOI": "10.1007/s40747-022-00757-y", "CorpusId": 248781914}, - "url": "https://www.semanticscholar.org/paper/f7cae1bc9b7ba214721cba3fd111fda57678de3f", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.mdpi.com/2504-3900/81/1/146/pdf?version=1652854268", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-05-17", "journal": {"name": "The 2021 Summit of the International Society + for the Study of Information"}, "authors": [{"authorId": "33913425", "name": + "Jia-li Feng"}, {"authorId": "3365739", "name": "Peizhuang Wang"}]}, {"paperId": + "f7cae1bc9b7ba214721cba3fd111fda57678de3f", "externalIds": {"DOI": "10.1007/s40747-022-00757-y", + "CorpusId": 248781914}, "corpusId": 248781914, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f7cae1bc9b7ba214721cba3fd111fda57678de3f", "title": "An associative knowledge network model for interpretable semantic representation of noun context", "abstract": null, "venue": "Complex & Intelligent Systems", "year": 2022, "referenceCount": 51, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-05-13", "journal": {"volume": "8", "pages": "5265 - - 5285", "name": "Complex & Intelligent Systems"}, "authors": [{"authorId": - "2165317888", "name": "Yulin Li"}, {"authorId": "2735864", "name": "Zhenping - Xie"}, {"authorId": "113437495", "name": "Fanyu Wang"}]}, {"paperId": "a97bf87e4786b4a91e6c61e9308a44350791c31f", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s40747-022-00757-y.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-05-13", "journal": {"volume": "8", "pages": "5265 - 5285", "name": "Complex + & Intelligent Systems"}, "authors": [{"authorId": "2165317888", "name": "Yulin + Li"}, {"authorId": "2735864", "name": "Zhenping Xie"}, {"authorId": "113437495", + "name": "Fanyu Wang"}]}, {"paperId": "a97bf87e4786b4a91e6c61e9308a44350791c31f", "externalIds": {"PubMedCentral": "9113877", "DOI": "10.1155/2022/3190801", - "CorpusId": 248736441, "PubMed": "35592719"}, "url": "https://www.semanticscholar.org/paper/a97bf87e4786b4a91e6c61e9308a44350791c31f", + "CorpusId": 248736441, "PubMed": "35592719"}, "corpusId": 248736441, "publicationVenue": + {"id": "f32b7322-b69c-4e63-801d-8f50784ef778", "name": "Computational Intelligence + and Neuroscience", "type": "journal", "alternate_names": ["Comput Intell Neurosci"], + "issn": "1687-5265", "url": "https://www.hindawi.com/journals/cin/"}, "url": + "https://www.semanticscholar.org/paper/a97bf87e4786b4a91e6c61e9308a44350791c31f", "title": "Research on System Construction and Strategy of Intelligent Sports in the Implementation of National Fitness", "abstract": "This paper studies the construction and development strategy of intelligent sports system in @@ -5033,34 +5934,45 @@ interactions: transformation and upgrading, constructing market supervision mechanism, and establishing a talent training system.", "venue": "Computational Intelligence and Neuroscience", "year": 2022, "referenceCount": 15, "citationCount": 2, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2022-05-10", "journal": {"volume": "2022", - "name": "Computational Intelligence and Neuroscience"}, "authors": [{"authorId": - "2166392145", "name": "Yuqing Tang"}, {"authorId": "96772858", "name": "Sheng - Zan"}, {"authorId": "2004730596", "name": "Xiaowen Zhang"}]}, {"paperId": - "f37f447ddcf14664b78653c1009d9934614519f7", "externalIds": {"PubMedCentral": - "9091068", "DOI": "10.1186/s13244-022-01220-9", "CorpusId": 248574320, "PubMed": - "35536446"}, "url": "https://www.semanticscholar.org/paper/f37f447ddcf14664b78653c1009d9934614519f7", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://downloads.hindawi.com/journals/cin/2022/3190801.pdf", "status": null}, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-05-10", + "journal": {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, + "authors": [{"authorId": "2166392145", "name": "Yuqing Tang"}, {"authorId": + "96772858", "name": "Sheng Zan"}, {"authorId": "2004730596", "name": "Xiaowen + Zhang"}]}, {"paperId": "f37f447ddcf14664b78653c1009d9934614519f7", "externalIds": + {"PubMedCentral": "9091068", "DOI": "10.1186/s13244-022-01220-9", "CorpusId": + 248574320, "PubMed": "35536446"}, "corpusId": 248574320, "publicationVenue": + {"id": "4569c7ff-7138-4cef-b44d-21049e1faa98", "name": "Insights into Imaging", + "type": "journal", "alternate_names": ["Insight Imaging", "Insights Into Imaging"], + "issn": "1869-4101", "url": "http://www.springer.com/13244", "alternate_urls": + ["http://www.springer.com/medicine/radiology/journal/13244", "https://insightsimaging.springeropen.com", + "https://link.springer.com/journal/13244", "http://www.springer.com/medicine/radiology/journal/13244?changeHeader"]}, + "url": "https://www.semanticscholar.org/paper/f37f447ddcf14664b78653c1009d9934614519f7", "title": "Considerations for artificial intelligence clinical impact in oncologic imaging: an AI4HI position paper", "abstract": null, "venue": "Insights into Imaging", "year": 2022, "referenceCount": 49, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-05-10", "journal": {"volume": "13", "name": "Insights into Imaging"}, - "authors": [{"authorId": "83904480", "name": "L. Mart\u00ed-Bonmat\u00ed"}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-05-10", "journal": {"volume": "13", "name": "Insights + into Imaging"}, "authors": [{"authorId": "83904480", "name": "L. Mart\u00ed-Bonmat\u00ed"}, {"authorId": "143609640", "name": "D. Koh"}, {"authorId": "50338538", "name": "K. Riklund"}, {"authorId": "3624615", "name": "Maciej Bobowicz"}, {"authorId": "32054693", "name": "Y. Roussakis"}, {"authorId": "46668942", "name": "J. Vilanova"}, {"authorId": "2039143", "name": "J. F\u00fctterer"}, {"authorId": "6762371", "name": "J. Rimola"}, {"authorId": "31230015", "name": "Pedro Mallol"}, - {"authorId": "2164393319", "name": "Gloria Ribas"}, {"authorId": "2145922721", + {"authorId": "2164393319", "name": "G. Ribas"}, {"authorId": "2145922721", "name": "A. Miguel"}, {"authorId": "2992223", "name": "M. Tsiknakis"}, {"authorId": "2364820", "name": "K. Lekadir"}, {"authorId": "2209674", "name": "G. Tsakou"}]}, {"paperId": "09797949fc70fbad8f3fed4f6cf4a91a9c709652", "externalIds": {"DOI": "10.1136/bjophthalmol-2022-321141", "CorpusId": 248553336, "PubMed": "35523534"}, + "corpusId": 248553336, "publicationVenue": {"id": "f5279917-ce2b-489d-8c2f-8a8f80a35559", + "name": "British Journal of Ophthalmology", "type": "journal", "alternate_names": + ["Br J Ophthalmol"], "issn": "1791-1737", "alternate_issns": ["0007-1161"], + "url": "https://bjo.bmj.com/", "alternate_urls": ["http://bjo.bmj.com/", "http://bjo.bmjjournals.com/"]}, "url": "https://www.semanticscholar.org/paper/09797949fc70fbad8f3fed4f6cf4a91a9c709652", "title": "New meaning for NLP: the trials and tribulations of natural language processing with GPT-3 in ophthalmology", "abstract": "Natural language processing @@ -5074,26 +5986,34 @@ interactions: specific to ophthalmology. We also outline the limitations of GPT-3 and the challenges with its integration into routine ophthalmic care.", "venue": "British Journal of Ophthalmology", "year": 2022, "referenceCount": 36, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": - "2022-05-06", "journal": {"volume": "106", "pages": "889 - 892", "name": "British - Journal of Ophthalmology"}, "authors": [{"authorId": "39819114", "name": "Siddharth - Nath"}, {"authorId": "2164300110", "name": "Abdullah Marie"}, {"authorId": - "2090354013", "name": "Simon Ellershaw"}, {"authorId": "65739018", "name": - "Edward Korot"}, {"authorId": "5638585", "name": "P. Keane"}]}, {"paperId": - "4351889496fafb08fbbe39be6a7bbe93ae957883", "externalIds": {"DOI": "10.1007/s10670-022-00552-8", - "CorpusId": 247973871}, "url": "https://www.semanticscholar.org/paper/4351889496fafb08fbbe39be6a7bbe93ae957883", + 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://discovery.ucl.ac.uk/10149021/1/bjophthalmol-2022-321141.R1_Proof_hi.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2022-05-06", "journal": + {"volume": "106", "pages": "889 - 892", "name": "British Journal of Ophthalmology"}, + "authors": [{"authorId": "39819114", "name": "Siddharth Nath"}, {"authorId": + "2164300110", "name": "Abdullah Marie"}, {"authorId": "2090354013", "name": + "Simon Ellershaw"}, {"authorId": "65739018", "name": "Edward Korot"}, {"authorId": + "5638585", "name": "P. Keane"}]}, {"paperId": "4351889496fafb08fbbe39be6a7bbe93ae957883", + "externalIds": {"DOI": "10.1007/s10670-022-00552-8", "CorpusId": 247973871}, + "corpusId": 247973871, "publicationVenue": {"id": "638d1b1c-6c05-4b65-aa2e-ace42ee26e95", + "name": "Erkenntnis: An International Journal of Scientific Philosophy", "type": + "journal", "alternate_names": ["Erkenn Int J Sci Philos", "Erkenntnis"], "issn": + "0165-0106", "url": "https://www.springer.com/philosophy/journal/10670", "alternate_urls": + ["http://www.jstor.org/journals/01650106.html", "https://www.jstor.org/journal/erkenntnis2", + "http://www.springer.com/philosophy/journal/10670"]}, "url": "https://www.semanticscholar.org/paper/4351889496fafb08fbbe39be6a7bbe93ae957883", "title": "Intelligent Behaviour", "abstract": null, "venue": "Erkenntnis: An International Journal of Scientific Philosophy", "year": 2022, "referenceCount": 57, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-06", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10670-022-00552-8.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-06", "journal": {"name": "Erkenntnis"}, "authors": [{"authorId": "51127600", "name": "Dimitri Coelho Mollo"}]}, {"paperId": "69ce70dc7cc9e52cde3df0f7e0ca972f085355fa", - "externalIds": {"DOI": "10.36253/jlis.it-458", "CorpusId": 248824244}, "url": - "https://www.semanticscholar.org/paper/69ce70dc7cc9e52cde3df0f7e0ca972f085355fa", + "externalIds": {"DOI": "10.36253/jlis.it-458", "CorpusId": 248824244}, "corpusId": + 248824244, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/69ce70dc7cc9e52cde3df0f7e0ca972f085355fa", "title": "Artificial Intelligence Systems and problems of the concept of author. Reflections on a recent book", "abstract": "The publication of the book Beta Writer. 2019.\u00a0Lithium-Ion Batteries. A Machine-Generated Summary of Current @@ -5111,13 +6031,15 @@ interactions: work, and that in the wake of the reflections of 50 years ago by Barthes and Foucault, it is necessary to define and recognize a new type of author.", "venue": "JLIS.it", "year": 2022, "referenceCount": 74, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-05-05", "journal": {"name": "JLIS.it"}, "authors": - [{"authorId": "48030608", "name": "M. Lana"}]}, {"paperId": "96d2f08d83386ab6dad47a3a772fa48d198ce9d0", - "externalIds": {"DBLP": "journals/corr/abs-2205-08954", "ArXiv": "2205.08954", - "DOI": "10.48550/arXiv.2205.08954", "CorpusId": 248863342}, "url": "https://www.semanticscholar.org/paper/96d2f08d83386ab6dad47a3a772fa48d198ce9d0", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://jlis.it/index.php/jlis/article/download/458/457", "status": null}, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2022-05-05", "journal": {"name": + "JLIS.it"}, "authors": [{"authorId": "48030608", "name": "M. Lana"}]}, {"paperId": + "96d2f08d83386ab6dad47a3a772fa48d198ce9d0", "externalIds": {"DBLP": "journals/corr/abs-2205-08954", + "ArXiv": "2205.08954", "DOI": "10.48550/arXiv.2205.08954", "CorpusId": 248863342}, + "corpusId": 248863342, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/96d2f08d83386ab6dad47a3a772fa48d198ce9d0", "title": "One-way Explainability Isn''t The Message", "abstract": "Recent engineering developments in specialised computational hard-ware, data-acquisition and storage technology have seen the emergence of Machine Learning (ML) as @@ -5151,15 +6073,16 @@ interactions: loop to multiple iterations. We describe some additional requirements needed for the design of a truly collaborative decision-support system.", "venue": "ArXiv", "year": 2022, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-05-05", "journal": {"volume": "abs/2205.08954", "name": - "ArXiv"}, "authors": [{"authorId": "143780768", "name": "A. Srinivasan"}, - {"authorId": "144041292", "name": "Michael Bain"}, {"authorId": "2091242865", - "name": "Enrico W. Coiera"}]}, {"paperId": "8cfcc57878f20d04e97acbb9ca78fb4f218811f0", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-05", "journal": + {"volume": "abs/2205.08954", "name": "ArXiv"}, "authors": [{"authorId": "143780768", + "name": "A. Srinivasan"}, {"authorId": "144041292", "name": "Michael Bain"}, + {"authorId": "2091242865", "name": "Enrico W. Coiera"}]}, {"paperId": "8cfcc57878f20d04e97acbb9ca78fb4f218811f0", "externalIds": {"DBLP": "conf/flairs/PetersonH22", "DOI": "10.32473/flairs.v35i.130545", - "CorpusId": 248587818}, "url": "https://www.semanticscholar.org/paper/8cfcc57878f20d04e97acbb9ca78fb4f218811f0", + "CorpusId": 248587818}, "corpusId": 248587818, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8cfcc57878f20d04e97acbb9ca78fb4f218811f0", "title": "Preliminary Thoughts on Defining f(x) for Ethical Machines", "abstract": "There is a growing literature in machine ethics attempting at creating ethical machines through AI and machine learning. Although many concerns with respect @@ -5170,15 +6093,16 @@ interactions: analysis of important aspects that need to be taken into account in the attempt of defining so called ethical machines.", "venue": "FLAIRS", "year": 2022, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + true, "openAccessPdf": {"url": "https://journals.flvc.org/FLAIRS/article/download/130545/133908", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-04", "journal": {"name": "The International FLAIRS Conference Proceedings"}, "authors": [{"authorId": "11161869", "name": "Clayton Peterson"}, {"authorId": "2102351337", "name": "Na\u00efma Hamrouni"}]}, {"paperId": "7f84d56fb8feb4e50cd6c3da3e3fd4ff6c4772cf", "externalIds": {"ACL": "2022.naacl-main.258", "ArXiv": "2205.01523", "DBLP": "conf/naacl/LiTGYYCWZW22", "DOI": "10.48550/arXiv.2205.01523", "CorpusId": - 247613500}, "url": "https://www.semanticscholar.org/paper/7f84d56fb8feb4e50cd6c3da3e3fd4ff6c4772cf", + 247613500}, "corpusId": 247613500, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f84d56fb8feb4e50cd6c3da3e3fd4ff6c4772cf", "title": "ElitePLM: An Empirical Study on General Language Ability Evaluation of Pretrained Language Models", "abstract": "Nowadays, pretrained language models (PLMs) have dominated the majority of NLP tasks. While, little research @@ -5196,19 +6120,20 @@ interactions: apply, and design PLMs for specific tasks. We have made all the details of experiments publicly available at https://github.com/RUCAIBox/ElitePLM.", "venue": "NAACL", "year": 2022, "referenceCount": 64, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-05-03", - "journal": {"pages": "3519-3539"}, "authors": [{"authorId": "2018027", "name": - "Junyi Li"}, {"authorId": "1997234792", "name": "Tianyi Tang"}, {"authorId": - "2164092564", "name": "Zheng Gong"}, {"authorId": "2111809756", "name": "Lixin - Yang"}, {"authorId": "2164113313", "name": "Zhuohao Yu"}, {"authorId": "46842323", - "name": "Z. Chen"}, {"authorId": "2115891766", "name": "Jingyuan Wang"}, {"authorId": - "2542603", "name": "Wayne Xin Zhao"}, {"authorId": "153693432", "name": "Ji-rong - Wen"}]}, {"paperId": "67d2d0c0c4a711004cd48a03c61c30e0dba1bd47", "externalIds": - {"DBLP": "journals/corr/abs-2205-00965", "ArXiv": "2205.00965", "DOI": "10.48550/arXiv.2205.00965", - "CorpusId": 248496872}, "url": "https://www.semanticscholar.org/paper/67d2d0c0c4a711004cd48a03c61c30e0dba1bd47", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2022-05-03", "journal": {"pages": "3519-3539"}, "authors": [{"authorId": + "2018027", "name": "Junyi Li"}, {"authorId": "1997234792", "name": "Tianyi + Tang"}, {"authorId": "2164092564", "name": "Zheng Gong"}, {"authorId": "2111809756", + "name": "Lixin Yang"}, {"authorId": "2164113313", "name": "Zhuohao Yu"}, {"authorId": + "46842323", "name": "Z. Chen"}, {"authorId": "2115891766", "name": "Jingyuan + Wang"}, {"authorId": "2542603", "name": "Wayne Xin Zhao"}, {"authorId": "153693432", + "name": "Ji-rong Wen"}]}, {"paperId": "67d2d0c0c4a711004cd48a03c61c30e0dba1bd47", + "externalIds": {"DBLP": "journals/corr/abs-2205-00965", "ArXiv": "2205.00965", + "DOI": "10.48550/arXiv.2205.00965", "CorpusId": 248496872}, "corpusId": 248496872, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/67d2d0c0c4a711004cd48a03c61c30e0dba1bd47", "title": "State-of-the-art in Open-domain Conversational AI: A Survey", "abstract": "We survey SoTA open-domain conversational AI models with the objective of presenting the prevailing challenges that still exist to spur future research. @@ -5231,31 +6156,41 @@ interactions: languages, and (3) the discussion about the ethics surrounding the gender of conversational AI.", "venue": "Inf.", "year": 2022, "referenceCount": 94, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2022-05-02", "journal": {"volume": "13", "pages": "298", "name": "Inf."}, - "authors": [{"authorId": "51221489", "name": "Tosin P. Adewumi"}, {"authorId": - "80342407", "name": "F. Liwicki"}, {"authorId": "1743758", "name": "M. Liwicki"}]}, - {"paperId": "807a91d0225c77cca5a1dfc307bf1aa1756944e7", "externalIds": {"DBLP": - "journals/nn/DoyaEKSR22", "DOI": "10.1016/j.neunet.2022.05.012", "CorpusId": - 248972754, "PubMed": "35671575"}, "url": "https://www.semanticscholar.org/paper/807a91d0225c77cca5a1dfc307bf1aa1756944e7", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-05-02", "journal": {"volume": "13", "pages": + "298", "name": "Inf."}, "authors": [{"authorId": "51221489", "name": "Tosin + P. Adewumi"}, {"authorId": "80342407", "name": "F. Liwicki"}, {"authorId": + "1743758", "name": "M. Liwicki"}]}, {"paperId": "807a91d0225c77cca5a1dfc307bf1aa1756944e7", + "externalIds": {"DBLP": "journals/nn/DoyaEKSR22", "DOI": "10.1016/j.neunet.2022.05.012", + "CorpusId": 248972754, "PubMed": "35671575"}, "corpusId": 248972754, "publicationVenue": + {"id": "a13f3cb8-2492-4ccb-9329-73a5ddcaab9b", "name": "Neural Networks", + "type": "journal", "alternate_names": ["Neural Netw"], "issn": "0893-6080", + "url": "http://www.elsevier.com/locate/neunet", "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/841/description", + "http://www.sciencedirect.com/science/journal/08936080"]}, "url": "https://www.semanticscholar.org/paper/807a91d0225c77cca5a1dfc307bf1aa1756944e7", "title": "Social impact and governance of AI and neurotechnologies", "abstract": null, "venue": "Neural Networks", "year": 2022, "referenceCount": 94, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2022-05-01", "journal": - {"volume": "152", "pages": "\n 542-554\n ", "name": "Neural - networks : the official journal of the International Neural Network Society"}, - "authors": [{"authorId": "1714997", "name": "K. Doya"}, {"authorId": "35406850", - "name": "Arisa Ema"}, {"authorId": "48078689", "name": "H. Kitano"}, {"authorId": - "3275262", "name": "M. Sakagami"}, {"authorId": "2055581993", "name": "Stuart - Russell"}]}, {"paperId": "c961db861c6ce200e1b0e6b1e77a58e1684890d1", "externalIds": - {"DBLP": "journals/sensors/MiuraCSNY22", "PubMedCentral": "9146313", "DOI": - "10.3390/s22103829", "CorpusId": 248938640, "PubMed": "35632238"}, "url": - "https://www.semanticscholar.org/paper/c961db861c6ce200e1b0e6b1e77a58e1684890d1", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-05-01", + "journal": {"volume": "152", "pages": "\n 542-554\n ", "name": + "Neural networks : the official journal of the International Neural Network + Society"}, "authors": [{"authorId": "1714997", "name": "K. Doya"}, {"authorId": + "35406850", "name": "Arisa Ema"}, {"authorId": "48078689", "name": "H. Kitano"}, + {"authorId": "3275262", "name": "M. Sakagami"}, {"authorId": "2055581993", + "name": "Stuart Russell"}]}, {"paperId": "c961db861c6ce200e1b0e6b1e77a58e1684890d1", + "externalIds": {"DBLP": "journals/sensors/MiuraCSNY22", "PubMedCentral": "9146313", + "DOI": "10.3390/s22103829", "CorpusId": 248938640, "PubMed": "35632238"}, + "corpusId": 248938640, "publicationVenue": {"id": "3dbf084c-ef47-4b74-9919-047b40704538", + "name": "Italian National Conference on Sensors", "type": "conference", "alternate_names": + ["SENSORS", "IEEE Sens", "Ital National Conf Sens", "IEEE Sensors", "Sensors"], + "issn": "1424-8220", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-142001", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-142001", + "http://www.mdpi.com/journal/sensors", "https://www.mdpi.com/journal/sensors"]}, + "url": "https://www.semanticscholar.org/paper/c961db861c6ce200e1b0e6b1e77a58e1684890d1", "title": "Assisting Personalized Healthcare of Elderly People: Developing a Rule-Based Virtual Caregiver System Using Mobile Chatbot", "abstract": "To assist personalized healthcare of elderly people, our interest is to develop @@ -5278,9 +6213,10 @@ interactions: We also conducted interviews with subjects for health analysis and improvement.", "venue": "Italian National Conference on Sensors", "year": 2022, "referenceCount": 110, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.mdpi.com/1424-8220/22/10/3829/pdf?version=1652939538", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-05-01", "journal": {"volume": "22", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": "1508869919", "name": "C. Miura"}, {"authorId": "2111635914", "name": "Sinan @@ -5288,32 +6224,41 @@ interactions: "name": "Masahide Nakamura"}, {"authorId": "2630154", "name": "K. Yasuda"}]}, {"paperId": "523e4c0b6d4a7a2323f2a9d31613e38bb3fb556b", "externalIds": {"PubMedCentral": "9119867", "DBLP": "journals/caeai/RayhanADA22", "DOI": "10.1016/j.caeai.2022.100077", - "CorpusId": 248892985}, "url": "https://www.semanticscholar.org/paper/523e4c0b6d4a7a2323f2a9d31613e38bb3fb556b", + "CorpusId": 248892985}, "corpusId": 248892985, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/523e4c0b6d4a7a2323f2a9d31613e38bb3fb556b", "title": "Appraisal of high-stake examinations during SARS-CoV-2 emergency with responsible and transparent AI: Evidence of fair and detrimental assessment", "abstract": null, "venue": "Computers and Education: Artificial Intelligence", "year": 2022, "referenceCount": 74, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-05-01", "journal": {"volume": "3", "pages": "100077 - 100077", "name": - "Computers and Education: Artificial Intelligence"}, "authors": [{"authorId": - "2120260019", "name": "M. Rayhan"}, {"authorId": "2401685", "name": "Md. Golam - Rabiul Alam"}, {"authorId": "145197398", "name": "M. A. Dewan"}, {"authorId": - "2475433", "name": "Mohammad Helal Uddin Ahmed"}]}, {"paperId": "9329b3feb93c552f847f1cd3a1fb6447f47ec7b4", - "externalIds": {"DOI": "10.1007/s40264-022-01156-5", "CorpusId": 248816823, - "PubMed": "35579806"}, "url": "https://www.semanticscholar.org/paper/9329b3feb93c552f847f1cd3a1fb6447f47ec7b4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-05-01", "journal": {"volume": "3", "pages": "100077 + - 100077", "name": "Computers and Education: Artificial Intelligence"}, "authors": + [{"authorId": "2120260019", "name": "M. Rayhan"}, {"authorId": "2401685", + "name": "Md. Golam Rabiul Alam"}, {"authorId": "145197398", "name": "M. A. + Dewan"}, {"authorId": "2475433", "name": "Mohammad Helal Uddin Ahmed"}]}, + {"paperId": "9329b3feb93c552f847f1cd3a1fb6447f47ec7b4", "externalIds": {"DOI": + "10.1007/s40264-022-01156-5", "CorpusId": 248816823, "PubMed": "35579806"}, + "corpusId": 248816823, "publicationVenue": {"id": "8a29d48c-16af-49a1-8c20-f7c7bbc7cf66", + "name": "Drug Safety", "type": "journal", "alternate_names": ["Drug Saf"], + "issn": "0114-5916", "url": "https://link.springer.com/journal/40264"}, "url": + "https://www.semanticscholar.org/paper/9329b3feb93c552f847f1cd3a1fb6447f47ec7b4", "title": "Artificial Intelligence in Pharmacovigilance: An Introduction to Terms, Concepts, Applications, and Limitations", "abstract": null, "venue": "Drug Safety", "year": 2022, "referenceCount": 70, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-05-01", "journal": {"volume": "45", "pages": "407 - 418", "name": "Drug - Safety"}, "authors": [{"authorId": "1911962", "name": "J. Aronson"}]}, {"paperId": - "2889ee04cdb769fb1aa822081059a65f330cf46a", "externalIds": {"ArXiv": "2205.07769", - "DBLP": "journals/corr/abs-2205-07769", "DOI": "10.48550/arXiv.2205.07769", - "CorpusId": 248811072}, "url": "https://www.semanticscholar.org/paper/2889ee04cdb769fb1aa822081059a65f330cf46a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-05-01", "journal": {"volume": "45", "pages": "407 + - 418", "name": "Drug Safety"}, "authors": [{"authorId": "1911962", "name": + "J. Aronson"}]}, {"paperId": "2889ee04cdb769fb1aa822081059a65f330cf46a", "externalIds": + {"ArXiv": "2205.07769", "DBLP": "journals/corr/abs-2205-07769", "DOI": "10.48550/arXiv.2205.07769", + "CorpusId": 248811072}, "corpusId": 248811072, "publicationVenue": {"id": + "c4658fe7-adac-4160-badc-2c3f50929b38", "name": "BenchCouncil Transactions + on Benchmarks, Standards and Evaluations", "type": "journal", "alternate_names": + ["Benchcouncil Trans Benchmark Stand Evaluation"], "issn": "2772-4859"}, "url": + "https://www.semanticscholar.org/paper/2889ee04cdb769fb1aa822081059a65f330cf46a", "title": "A BenchCouncil View on Benchmarking Emerging and Future Computing", "abstract": "The measurable properties of the artifacts or objects in the computer, management, or \ufb01nance disci- plines are extrinsic, not inherent @@ -5336,13 +6281,17 @@ interactions: AI for science systems, and Metaverse.", "venue": "BenchCouncil Transactions on Benchmarks, Standards and Evaluations", "year": 2022, "referenceCount": 51, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-05-01", "journal": {"volume": "abs/2205.07769", "name": "ArXiv"}, "authors": - [{"authorId": "2062319", "name": "Jianfeng Zhan"}]}, {"paperId": "074ca49cd46b227bf8a6382d8bf26e11e239fbd6", - "externalIds": {"DOI": "10.1162/daed_a_01902", "CorpusId": 248377877}, "url": - "https://www.semanticscholar.org/paper/074ca49cd46b227bf8a6382d8bf26e11e239fbd6", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-05-01", "journal": {"volume": "abs/2205.07769", "name": + "ArXiv"}, "authors": [{"authorId": "2062319", "name": "Jianfeng Zhan"}]}, + {"paperId": "074ca49cd46b227bf8a6382d8bf26e11e239fbd6", "externalIds": {"DOI": + "10.1162/daed_a_01902", "CorpusId": 248377877}, "corpusId": 248377877, "publicationVenue": + {"id": "82909cec-149f-4e18-a812-25fc131aad66", "name": "Daedalus", "type": + "journal", "issn": "0011-5266", "url": "https://www.jstor.org/journal/daedalus", + "alternate_urls": ["http://www.mitpressjournals.org/loi/daed", "http://www.jstor.org/journals/00115266.html", + "https://www.mitpressjournals.org/loi/daed"]}, "url": "https://www.semanticscholar.org/paper/074ca49cd46b227bf8a6382d8bf26e11e239fbd6", "title": "Searching for Computer Vision North Stars", "abstract": "Abstract Computer vision is one of the most fundamental areas of artificial intelligence research. It has contributed to the tremendous progress in the recent deep @@ -5358,13 +6307,17 @@ interactions: work, and the follow-up progress. The goal is to inspire more north star work to advance the field, and AI at large.", "venue": "Daedalus", "year": 2022, "referenceCount": 44, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-01", - "journal": {"volume": "151", "pages": "85-99", "name": "Daedalus"}, "authors": - [{"authorId": "48004138", "name": "Li Fei-Fei"}, {"authorId": "145237361", + true, "openAccessPdf": {"url": "https://direct.mit.edu/daed/article-pdf/151/2/85/2009150/daed_a_01902.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-05-01", "journal": {"volume": "151", "pages": "85-99", "name": "Daedalus"}, + "authors": [{"authorId": "48004138", "name": "Li Fei-Fei"}, {"authorId": "145237361", "name": "Ranjay Krishna"}]}, {"paperId": "6b8cd1a2031a90dcce12fb5e1b6c111e3ea3af47", - "externalIds": {"DOI": "10.1162/daed_a_01899", "CorpusId": 248377891}, "url": - "https://www.semanticscholar.org/paper/6b8cd1a2031a90dcce12fb5e1b6c111e3ea3af47", + "externalIds": {"DOI": "10.1162/daed_a_01899", "CorpusId": 248377891}, "corpusId": + 248377891, "publicationVenue": {"id": "82909cec-149f-4e18-a812-25fc131aad66", + "name": "Daedalus", "type": "journal", "issn": "0011-5266", "url": "https://www.jstor.org/journal/daedalus", + "alternate_urls": ["http://www.mitpressjournals.org/loi/daed", "http://www.jstor.org/journals/00115266.html", + "https://www.mitpressjournals.org/loi/daed"]}, "url": "https://www.semanticscholar.org/paper/6b8cd1a2031a90dcce12fb5e1b6c111e3ea3af47", "title": "If We Succeed", "abstract": "Abstract Since its inception, AI has operated within a standard model whereby systems are designed to optimize a fixed, known objective. This model has been increasingly successful. I briefly @@ -5377,12 +6330,17 @@ interactions: about the true objective leads to qualitatively new modes of behavior that are more robust, controllable, and deferential.", "venue": "Daedalus", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-05-01", "journal": {"volume": "151", "pages": "43-57", - "name": "Daedalus"}, "authors": [{"authorId": "145107462", "name": "Stuart - J. Russell"}]}, {"paperId": "6b21f00e72698db1722b5d34dbc11a1a54622b9e", "externalIds": - {"DOI": "10.1162/daed_a_01898", "CorpusId": 248237628}, "url": "https://www.semanticscholar.org/paper/6b21f00e72698db1722b5d34dbc11a1a54622b9e", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/daed/article-pdf/151/2/43/2009166/daed_a_01899.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-05-01", "journal": {"volume": "151", "pages": "43-57", "name": "Daedalus"}, + "authors": [{"authorId": "145107462", "name": "Stuart J. Russell"}]}, {"paperId": + "6b21f00e72698db1722b5d34dbc11a1a54622b9e", "externalIds": {"DOI": "10.1162/daed_a_01898", + "CorpusId": 248237628}, "corpusId": 248237628, "publicationVenue": {"id": + "82909cec-149f-4e18-a812-25fc131aad66", "name": "Daedalus", "type": "journal", + "issn": "0011-5266", "url": "https://www.jstor.org/journal/daedalus", "alternate_urls": + ["http://www.mitpressjournals.org/loi/daed", "http://www.jstor.org/journals/00115266.html", + "https://www.mitpressjournals.org/loi/daed"]}, "url": "https://www.semanticscholar.org/paper/6b21f00e72698db1722b5d34dbc11a1a54622b9e", "title": "\u201cFrom So Simple a Beginning\u201d: Species of Artificial Intelligence", "abstract": "Abstract Artificial intelligence has a decades-long history that exhibits alternating enthusiasm and disillusionment for the field''s scientific @@ -5401,13 +6359,19 @@ interactions: general intelligence-able to range across widely differing tasks and contexts-is unlikely to be developed, or emerge, any time soon.", "venue": "Daedalus", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2022-05-01", "journal": {"volume": "151", "pages": "28-42", - "name": "Daedalus"}, "authors": [{"authorId": "1705314", "name": "N. Shadbolt"}]}, - {"paperId": "6a41c21d32c9acdbb7fb1a79e13a87b266e2da55", "externalIds": {"PubMedCentral": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/daed/article-pdf/151/2/28/2009160/daed_a_01898.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2022-05-01", "journal": {"volume": "151", "pages": "28-42", "name": "Daedalus"}, + "authors": [{"authorId": "1705314", "name": "N. Shadbolt"}]}, {"paperId": + "6a41c21d32c9acdbb7fb1a79e13a87b266e2da55", "externalIds": {"PubMedCentral": "9103799", "DOI": "10.3390/ijms23094998", "CorpusId": 248485577, "PubMed": - "35563387"}, "url": "https://www.semanticscholar.org/paper/6a41c21d32c9acdbb7fb1a79e13a87b266e2da55", + "35563387"}, "corpusId": 248485577, "publicationVenue": {"id": "8506a01a-40b8-4e6f-bbb8-ce2492139c15", + "name": "International Journal of Molecular Sciences", "type": "journal", + "alternate_names": ["Int J Mol Sci"], "issn": "1422-0067", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-157693", + "alternate_urls": ["https://www.mdpi.com/journal/ijms", "http://www.mdpi.com/journal/ijms/", + "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-157693"]}, "url": + "https://www.semanticscholar.org/paper/6a41c21d32c9acdbb7fb1a79e13a87b266e2da55", "title": "Novel Biomarkers of Atherosclerotic Vascular Disease\u2014Latest Insights in the Research Field", "abstract": "The atherosclerotic vascular disease is a cardiovascular continuum in which the main role is attributed @@ -5426,17 +6390,18 @@ interactions: morbidity and mortality through early diagnosis of atherosclerotic lesions and future research directions.", "venue": "International Journal of Molecular Sciences", "year": 2022, "referenceCount": 276, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2022-04-30", "journal": - {"volume": "23", "name": "International Journal of Molecular Sciences"}, "authors": - [{"authorId": "2061016362", "name": "C. Adam"}, {"authorId": "13845147", "name": - "D. \u0218alaru"}, {"authorId": "40385765", "name": "C. Pris\u0103cariu"}, - {"authorId": "47764305", "name": "D. Marcu"}, {"authorId": "4449885", "name": - "R. Sasc\u0103u"}, {"authorId": "12240064", "name": "C. St\u0103tescu"}]}, - {"paperId": "40dd2b0184faaeac63f04e2a969087aea0db1f7c", "externalIds": {"ArXiv": - "2204.12774", "CorpusId": 248405896}, "url": "https://www.semanticscholar.org/paper/40dd2b0184faaeac63f04e2a969087aea0db1f7c", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1422-0067/23/9/4998/pdf?version=1651825665", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", + "JournalArticle"], "publicationDate": "2022-04-30", "journal": {"volume": + "23", "name": "International Journal of Molecular Sciences"}, "authors": [{"authorId": + "2061016362", "name": "C. Adam"}, {"authorId": "13845147", "name": "D. \u0218alaru"}, + {"authorId": "40385765", "name": "C. Pris\u0103cariu"}, {"authorId": "47764305", + "name": "D. Marcu"}, {"authorId": "4449885", "name": "R. Sasc\u0103u"}, {"authorId": + "12240064", "name": "C. St\u0103tescu"}]}, {"paperId": "40dd2b0184faaeac63f04e2a969087aea0db1f7c", + "externalIds": {"ArXiv": "2204.12774", "CorpusId": 248405896}, "corpusId": + 248405896, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/40dd2b0184faaeac63f04e2a969087aea0db1f7c", "title": "Matter&Mind Matter", "abstract": "As a result of a hundred million years of evolution, living animals have adapted extremely well to their ecological niche. Such adaptation implies species-specific interactions with their immediate @@ -5463,15 +6428,15 @@ interactions: of entirely novel information processing systems. Finally, a benchmark for neuromorphic systems is suggested.", "venue": "", "year": 2022, "referenceCount": 289, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Biology"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-04-27", "journal": null, "authors": [{"authorId": + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Biology"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-04-27", "journal": null, "authors": [{"authorId": "2163623542", "name": "Tom Birkoben"}, {"authorId": "2163623111", "name": "Hermann Kohlstedt"}]}, {"paperId": "893a1ef190dbd6aee1420e3462939efc9e6665d4", "externalIds": {"PubMedCentral": "9106101", "DBLP": "journals/finr/Sims22", "DOI": "10.3389/fnbot.2022.857614", "CorpusId": 248397782, "PubMed": "35574229"}, - "url": "https://www.semanticscholar.org/paper/893a1ef190dbd6aee1420e3462939efc9e6665d4", + "corpusId": 248397782, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/893a1ef190dbd6aee1420e3462939efc9e6665d4", "title": "Self-Concern Across Scales: A Biologically Inspired Direction for Embodied Artificial Intelligence", "abstract": "Intelligence in current AI research is measured according to designer-assigned tasks that lack any relevance @@ -5489,15 +6454,16 @@ interactions: something like genuine self-concern can be implemented in machines, bringing AI one step closer to its original goal of emulating human-like intelligence.", "venue": "Frontiers in Neurorobotics", "year": 2022, "referenceCount": 149, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2022-04-25", "journal": - {"volume": "16", "name": "Frontiers in Neurorobotics"}, "authors": [{"authorId": - "2052247891", "name": "Matthew Sims"}]}, {"paperId": "9c5f0f80c7dd21463177b7329d748b785af3c516", - "externalIds": {"DOI": "10.3390/ai3020021", "CorpusId": 248316668}, "url": - "https://www.semanticscholar.org/paper/9c5f0f80c7dd21463177b7329d748b785af3c516", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.frontiersin.org/articles/10.3389/fnbot.2022.857614/pdf", + "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-25", + "journal": {"volume": "16", "name": "Frontiers in Neurorobotics"}, "authors": + [{"authorId": "2052247891", "name": "Matthew Sims"}]}, {"paperId": "9c5f0f80c7dd21463177b7329d748b785af3c516", + "externalIds": {"DOI": "10.3390/ai3020021", "CorpusId": 248316668}, "corpusId": + 248316668, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9c5f0f80c7dd21463177b7329d748b785af3c516", "title": "Shifting Perspectives on AI Evaluation: The Increasing Role of Ethics in Cooperation", "abstract": "Evaluating AI is a challenging task, as it requires an operative definition of intelligence and the metrics to quantify it, including @@ -5528,13 +6494,16 @@ interactions: autonomy, and cooperative learning) on which to base ethical guidelines in agent software programming, making cooperation a more suitable benchmark for AI applications.", "venue": "AI", "year": 2022, "referenceCount": 61, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-04-19", "journal": {"name": - "AI"}, "authors": [{"authorId": "2945086", "name": "E. Barbierato"}, {"authorId": - "2163167100", "name": "Maria Enrica Zamponi"}]}, {"paperId": "f097fb79d7ab0743d96167d419788d4aad8197d7", - "externalIds": {"DBLP": "journals/corr/abs-2204-08226", "ArXiv": "2204.08226", - "DOI": "10.48550/arXiv.2204.08226", "CorpusId": 248227522}, "url": "https://www.semanticscholar.org/paper/f097fb79d7ab0743d96167d419788d4aad8197d7", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2673-2688/3/2/21/pdf?version=1650358673", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-19", + "journal": {"name": "AI"}, "authors": [{"authorId": "2945086", "name": "E. + Barbierato"}, {"authorId": "2163167100", "name": "Maria Enrica Zamponi"}]}, + {"paperId": "f097fb79d7ab0743d96167d419788d4aad8197d7", "externalIds": {"DBLP": + "journals/corr/abs-2204-08226", "ArXiv": "2204.08226", "DOI": "10.48550/arXiv.2204.08226", + "CorpusId": 248227522}, "corpusId": 248227522, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f097fb79d7ab0743d96167d419788d4aad8197d7", "title": "Empirical Evaluation and Theoretical Analysis for Representation Learning: A Survey", "abstract": "Representation learning enables us to automatically extract generic feature representations from a dataset to solve another machine @@ -5548,30 +6517,39 @@ interactions: of our evaluation survey, we also discuss the future direction of representation learning. Note that this survey is the extended version of Nozawa and Sato [1].", "venue": "ArXiv", "year": 2022, "referenceCount": 219, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-18", - "journal": {"volume": "abs/2204.08226", "name": "ArXiv"}, "authors": [{"authorId": - "13613520", "name": "Kento Nozawa"}, {"authorId": "73355331", "name": "Issei - Sato"}]}, {"paperId": "b90a31fc09a98a9d0ed6b7806a9974375b8cf394", "externalIds": - {"DOI": "10.1007/s00266-022-02883-x", "CorpusId": 248231934, "PubMed": "35437664"}, - "url": "https://www.semanticscholar.org/paper/b90a31fc09a98a9d0ed6b7806a9974375b8cf394", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2022-04-18", "journal": {"volume": "abs/2204.08226", "name": + "ArXiv"}, "authors": [{"authorId": "13613520", "name": "Kento Nozawa"}, {"authorId": + "73355331", "name": "Issei Sato"}]}, {"paperId": "b90a31fc09a98a9d0ed6b7806a9974375b8cf394", + "externalIds": {"DOI": "10.1007/s00266-022-02883-x", "CorpusId": 248231934, + "PubMed": "35437664"}, "corpusId": 248231934, "publicationVenue": {"id": "586af07e-1b69-4a8d-b751-b8cd2d934817", + "name": "Aesthetic Plastic Surgery", "type": "journal", "alternate_names": + ["Aesthetic Plast Surg"], "issn": "0364-216X", "url": "https://www.springer.com/medicine/surgery/journal/266", + "alternate_urls": ["https://link.springer.com/journal/266"]}, "url": "https://www.semanticscholar.org/paper/b90a31fc09a98a9d0ed6b7806a9974375b8cf394", "title": "Simulation and Artificial Intelligence in Rhinoplasty: A Systematic Review", "abstract": null, "venue": "Aesthetic Plastic Surgery", "year": 2022, "referenceCount": 49, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-18", - "journal": {"volume": "46", "pages": "2368 - 2377", "name": "Aesthetic Plastic - Surgery"}, "authors": [{"authorId": "1931416538", "name": "A. Eldaly"}, {"authorId": - "121246549", "name": "Francisco R. Avila"}, {"authorId": "2075382530", "name": - "Ricardo A Torres-Guzman"}, {"authorId": "2132057830", "name": "Karla C Maita"}, - {"authorId": "2148907723", "name": "John P Garcia"}, {"authorId": "2162800238", - "name": "Luiza Palmieri Serrano"}, {"authorId": "34928587", "name": "A. Forte"}]}, - {"paperId": "490a946c0bb9bd1e495dfd7dede4e8c9bc5d558a", "externalIds": {"ArXiv": - "2204.07904", "DBLP": "journals/corr/abs-2204-07904", "DOI": "10.48550/arXiv.2204.07904", - "CorpusId": 248227874, "PubMed": "35932950"}, "url": "https://www.semanticscholar.org/paper/490a946c0bb9bd1e495dfd7dede4e8c9bc5d558a", + false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + "publicationDate": "2022-04-18", "journal": {"volume": "46", "pages": "2368 + - 2377", "name": "Aesthetic Plastic Surgery"}, "authors": [{"authorId": "1931416538", + "name": "A. Eldaly"}, {"authorId": "121246549", "name": "Francisco R. Avila"}, + {"authorId": "2075382530", "name": "Ricardo A. Torres-Guzman"}, {"authorId": + "2132057830", "name": "Karla C Maita"}, {"authorId": "2148907723", "name": + "John P Garcia"}, {"authorId": "2162800238", "name": "Luiza Palmieri Serrano"}, + {"authorId": "34928587", "name": "A. Forte"}]}, {"paperId": "490a946c0bb9bd1e495dfd7dede4e8c9bc5d558a", + "externalIds": {"ArXiv": "2204.07904", "DBLP": "journals/corr/abs-2204-07904", + "DOI": "10.48550/arXiv.2204.07904", "CorpusId": 248227874, "PubMed": "35932950"}, + "corpusId": 248227874, "publicationVenue": {"id": "fd128295-d2c3-40b7-b9b3-ffc8478e2208", + "name": "Neuroscience and Biobehavioral Reviews", "type": "journal", "alternate_names": + ["Neurosci Biobehav Rev", "Neurosci Biobehav Rev", "Neuroscience & Biobehavioral + Reviews"], "issn": "0149-7634", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/831/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/01497634"]}, + "url": "https://www.semanticscholar.org/paper/490a946c0bb9bd1e495dfd7dede4e8c9bc5d558a", "title": "Turing\u2019s cascade instability supports the coordination of the mind, brain, and behavior", "abstract": "Turing inspired a computer metaphor of the mind and brain that has been handy and has spawned decades of empirical @@ -5590,16 +6568,17 @@ interactions: the mind, brain, and behavior across space and time scales and provides an alternative to the dominant computer metaphor.", "venue": "Neuroscience and Biobehavioral Reviews", "year": 2022, "referenceCount": 276, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Biology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Computer Science", "Biology"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-17", "journal": {"volume": "141", "name": "Neuroscience & Biobehavioral Reviews"}, "authors": [{"authorId": "1399320366", "name": "Damian G. Kelty-Stephen"}, {"authorId": "6964222", "name": "M. Mangalam"}]}, {"paperId": "ad2f54569ce99205628583b458fe6426df421473", "externalIds": {"DOI": - "10.1145/3526112", "CorpusId": 248150877}, "url": "https://www.semanticscholar.org/paper/ad2f54569ce99205628583b458fe6426df421473", + "10.1145/3526112", "CorpusId": 248150877}, "corpusId": 248150877, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ad2f54569ce99205628583b458fe6426df421473", "title": "Mental State Attribution to Robots: A Systematic Review of Conceptions, Methods, and Findings", "abstract": "The topic of mental state attribution to robots has been approached by researchers from a variety of disciplines, @@ -5624,14 +6603,19 @@ interactions: and what types of research methods are appropriate for investigation.", "venue": "ACM Transactions on Human-Robot Interaction", "year": 2022, "referenceCount": 397, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-04-14", - "journal": {"volume": "11", "pages": "1 - 51", "name": "ACM Transactions on - Human-Robot Interaction (THRI)"}, "authors": [{"authorId": "3489950", "name": - "Sam Thellman"}, {"authorId": "1593289156", "name": "Maartje de Graaf"}, {"authorId": - "2491309", "name": "T. Ziemke"}]}, {"paperId": "96ab678e084c508842c6a9ce85a97ba7980a93a4", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3526112", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2022-04-14", "journal": {"volume": "11", "pages": "1 - 51", "name": "ACM + Transactions on Human-Robot Interaction (THRI)"}, "authors": [{"authorId": + "3489950", "name": "Sam Thellman"}, {"authorId": "1593289156", "name": "Maartje + de Graaf"}, {"authorId": "2491309", "name": "T. Ziemke"}]}, {"paperId": "96ab678e084c508842c6a9ce85a97ba7980a93a4", "externalIds": {"PubMedCentral": "9007140", "DOI": "10.1155/2022/2455160", - "CorpusId": 248154778, "PubMed": "35432519"}, "url": "https://www.semanticscholar.org/paper/96ab678e084c508842c6a9ce85a97ba7980a93a4", + "CorpusId": 248154778, "PubMed": "35432519"}, "corpusId": 248154778, "publicationVenue": + {"id": "f32b7322-b69c-4e63-801d-8f50784ef778", "name": "Computational Intelligence + and Neuroscience", "type": "journal", "alternate_names": ["Comput Intell Neurosci"], + "issn": "1687-5265", "url": "https://www.hindawi.com/journals/cin/"}, "url": + "https://www.semanticscholar.org/paper/96ab678e084c508842c6a9ce85a97ba7980a93a4", "title": "Sentimental Analysis of Twitter Users from Turkish Content with Natural Language Processing", "abstract": "Artificial Intelligence has guided technological progress in recent years; it has shown significant development @@ -5662,18 +6646,20 @@ interactions: up to \u223c84% with small \u201cSample Test Data\u201d generated by the same methods as SentimentSet dataset. These research results contributed to indicating Turkish language specific sentiment analysis that is dependent on language - specifications.", "venue": "Computational intelligence and neuroscience", - "year": 2022, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + specifications.", "venue": "Computational Intelligence and Neuroscience", + "year": 2022, "referenceCount": 65, "citationCount": 2, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/cin/2022/2455160.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-13", "journal": {"volume": "2022", "name": "Computational Intelligence and Neuroscience"}, "authors": [{"authorId": "2162378425", "name": "Cagla Balli"}, {"authorId": "10406004", "name": "Mehmet Serdar Guzel"}, {"authorId": "34702047", "name": "E. Bostanci"}, {"authorId": "2112892229", "name": "Alok Mishra"}]}, {"paperId": "43c4b6dd42abdfa0432d044728eebb7204d0c86c", "externalIds": {"DBLP": "journals/corr/abs-2204-04758", "ArXiv": "2204.04758", "DOI": "10.48550/arXiv.2204.04758", - "CorpusId": 248084915}, "url": "https://www.semanticscholar.org/paper/43c4b6dd42abdfa0432d044728eebb7204d0c86c", + "CorpusId": 248084915}, "corpusId": 248084915, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/43c4b6dd42abdfa0432d044728eebb7204d0c86c", "title": "Iceberg Sensemaking: A Process Model for Critical Data Analysis and Visualization", "abstract": "\u2014We offer a new model of the sensemaking process for data science and visual analytics. Whereas past sensemaking models @@ -5691,13 +6677,18 @@ interactions: data injustice, investigating of\ufb01cial data, teaching data wrangling, and producing data mashups.", "venue": "ArXiv", "year": 2022, "referenceCount": 83, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2022-04-10", "journal": {"volume": "abs/2204.04758", "name": "ArXiv"}, "authors": - [{"authorId": "70237455", "name": "C. Berret"}, {"authorId": "1732016", "name": - "T. Munzner"}]}, {"paperId": "d7b14a9ac90382df1a4a485408233477256181b4", "externalIds": - {"DOI": "10.1108/ijchm-10-2021-1207", "CorpusId": 247985293}, "url": "https://www.semanticscholar.org/paper/d7b14a9ac90382df1a4a485408233477256181b4", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-04-10", "journal": {"volume": "abs/2204.04758", + "name": "ArXiv"}, "authors": [{"authorId": "70237455", "name": "C. Berret"}, + {"authorId": "1732016", "name": "T. Munzner"}]}, {"paperId": "d7b14a9ac90382df1a4a485408233477256181b4", + "externalIds": {"DOI": "10.1108/ijchm-10-2021-1207", "CorpusId": 247985293}, + "corpusId": 247985293, "publicationVenue": {"id": "bb6fa91a-0a4c-40f8-80a2-93ceb3ae3bd4", + "name": "International Journal of Contemporary Hospitality Management", "type": + "journal", "alternate_names": ["Int J Contemp Hosp Manag"], "issn": "0959-6119", + "url": "https://www.emerald.com/insight/publication/issn/0959-6119"}, "url": + "https://www.semanticscholar.org/paper/d7b14a9ac90382df1a4a485408233477256181b4", "title": "Smart dining, smart restaurant, and smart service quality (SSQ)", "abstract": "\nPurpose\nHave you been to a smart restaurant, and how were its services? A common limitation of hospitality studies stems from the lack @@ -5733,15 +6724,16 @@ interactions: dialog that should warrant a forum of discussion in future studies.\n", "venue": "International Journal of Contemporary Hospitality Management", "year": 2022, "referenceCount": 99, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2022-04-07", "journal": {"name": "International Journal of Contemporary Hospitality Management"}, "authors": [{"authorId": "2199012", "name": "I. Wong"}, {"authorId": "2161636178", "name": "Jingwen Huang"}, {"authorId": "2112413741", "name": "Z. Lin"}, {"authorId": "2161566069", "name": "Haoyue Jiao"}]}, {"paperId": "8a859d04581e2178331a68c54eef7788ebf0d60c", "externalIds": {"DBLP": "journals/firai/BertoliniE22", "PubMedCentral": "9037379", "DOI": "10.3389/frobt.2022.842213", "CorpusId": - 248071072, "PubMed": "35480089"}, "url": "https://www.semanticscholar.org/paper/8a859d04581e2178331a68c54eef7788ebf0d60c", + 248071072, "PubMed": "35480089"}, "corpusId": 248071072, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8a859d04581e2178331a68c54eef7788ebf0d60c", "title": "Robots and AI as Legal Subjects? Disentangling the Ontological and Functional Perspective", "abstract": "Robotics and AI-based applications (RAI) are often said to be so technologically advanced that they should be held @@ -5772,35 +6764,43 @@ interactions: classes of RAI. That does not entail the attribution of animacy or the ascription of a moral status to the entity itself.", "venue": "Frontiers in Robotics and AI", "year": 2022, "referenceCount": 171, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-05", "journal": - {"volume": "9", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": - "2071280576", "name": "A. Bertolini"}, {"authorId": "1395590949", "name": - "F. Episcopo"}]}, {"paperId": "94e32a898cc8c62c5a25fb9fa01e94c21fd41da5", - "externalIds": {"PubMedCentral": "9552145", "DBLP": "journals/corr/abs-2204-01467", - "ArXiv": "2204.01467", "DOI": "10.1038/s42254-022-00518-3", "CorpusId": 247939660, - "PubMed": "36247217"}, "url": "https://www.semanticscholar.org/paper/94e32a898cc8c62c5a25fb9fa01e94c21fd41da5", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2022.842213/pdf", + "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-04-05", "journal": {"volume": + "9", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "2071280576", + "name": "A. Bertolini"}, {"authorId": "1395590949", "name": "F. Episcopo"}]}, + {"paperId": "94e32a898cc8c62c5a25fb9fa01e94c21fd41da5", "externalIds": {"PubMedCentral": + "9552145", "DBLP": "journals/corr/abs-2204-01467", "ArXiv": "2204.01467", + "DOI": "10.1038/s42254-022-00518-3", "CorpusId": 247939660, "PubMed": "36247217"}, + "corpusId": 247939660, "publicationVenue": {"id": "3639d55b-36ef-4fa6-97fd-1bdc155f9081", + "name": "Nature Reviews Physics", "alternate_names": ["Nat Rev Phys"], "issn": + "2522-5820", "url": "https://www.nature.com/natrevphys/"}, "url": "https://www.semanticscholar.org/paper/94e32a898cc8c62c5a25fb9fa01e94c21fd41da5", "title": "On scientific understanding with artificial intelligence", "abstract": null, "venue": "Nature Reviews Physics", "year": 2022, "referenceCount": 135, - "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2022-04-04", "journal": {"volume": - "4", "pages": "761 - 769", "name": "Nature Reviews. Physics"}, "authors": - [{"authorId": "5906965", "name": "Mario Krenn"}, {"authorId": "6161242", "name": - "R. Pollice"}, {"authorId": "47508730", "name": "S. Guo"}, {"authorId": "3372027", - "name": "Matteo Aldeghi"}, {"authorId": "1403855077", "name": "Alba Cervera-Lierta"}, - {"authorId": "35323511", "name": "Pascal Friederich"}, {"authorId": "40133053", - "name": "Gabriel dos Passos Gomes"}, {"authorId": "122433803", "name": "Florian - Hase"}, {"authorId": "3364349", "name": "A. Jinich"}, {"authorId": "133638577", - "name": "AkshatKumar Nigam"}, {"authorId": "12977956", "name": "Zhenpeng Yao"}, - {"authorId": "1380248954", "name": "Al\u00e1n Aspuru-Guzik"}]}, {"paperId": - "b19f3fdd798ba21d792b9675d5ff58f188fc2f8c", "externalIds": {"DOI": "10.1080/20502877.2022.2062945", - "CorpusId": 248181242, "PubMed": "35420976"}, "url": "https://www.semanticscholar.org/paper/b19f3fdd798ba21d792b9675d5ff58f188fc2f8c", + "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.nature.com/articles/s42254-022-00518-3.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Physics", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-04-04", + "journal": {"volume": "4", "pages": "761 - 769", "name": "Nature Reviews. + Physics"}, "authors": [{"authorId": "5906965", "name": "Mario Krenn"}, {"authorId": + "6161242", "name": "R. Pollice"}, {"authorId": "47508730", "name": "S. Guo"}, + {"authorId": "3372027", "name": "Matteo Aldeghi"}, {"authorId": "1403855077", + "name": "Alba Cervera-Lierta"}, {"authorId": "35323511", "name": "Pascal Friederich"}, + {"authorId": "40133053", "name": "Gabriel dos Passos Gomes"}, {"authorId": + "122433803", "name": "Florian Hase"}, {"authorId": "3364349", "name": "A. + Jinich"}, {"authorId": "133638577", "name": "AkshatKumar Nigam"}, {"authorId": + "12977956", "name": "Zhenpeng Yao"}, {"authorId": "1380248954", "name": "Al\u00e1n + Aspuru-Guzik"}]}, {"paperId": "b19f3fdd798ba21d792b9675d5ff58f188fc2f8c", + "externalIds": {"DOI": "10.1080/20502877.2022.2062945", "CorpusId": 248181242, + "PubMed": "35420976"}, "corpusId": 248181242, "publicationVenue": {"id": "31159ab7-7023-4982-9d60-21bdac921358", + "name": "The New Bioethics", "alternate_names": ["New Bioeth"], "issn": "2050-2877", + "url": "http://www.tandfonline.com/action/journalInformation?journalCode=ynbi20", + "alternate_urls": ["http://www.tandfonline.com/loi/ynbi20"]}, "url": "https://www.semanticscholar.org/paper/b19f3fdd798ba21d792b9675d5ff58f188fc2f8c", "title": "The Making of Imago Hominis: Can We Produce Artificial Companions by Programming Sentience into Robots?", "abstract": "This essay discusses sentient robot (SR) research through the lens of suffering. First three kinds @@ -5817,14 +6817,19 @@ interactions: such a robot and a human. Therefore, we are probably unable to produce sentient robots that can become our companions (friends, lovers, etc.).", "venue": "The New Bioethics", "year": 2022, "referenceCount": 58, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2022-04-03", "journal": - {"volume": "28", "pages": "168 - 185", "name": "The New Bioethics"}, "authors": - [{"authorId": "2162526861", "name": "Zishang Yue"}]}, {"paperId": "0986d6ba0cf5671846b231f37d319659da818687", - "externalIds": {"DOI": "10.1080/09273948.2022.2054433", "CorpusId": 248127887, - "PubMed": "35412935"}, "url": "https://www.semanticscholar.org/paper/0986d6ba0cf5671846b231f37d319659da818687", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-03", + "journal": {"volume": "28", "pages": "168 - 185", "name": "The New Bioethics"}, + "authors": [{"authorId": "2162526861", "name": "Zishang Yue"}]}, {"paperId": + "0986d6ba0cf5671846b231f37d319659da818687", "externalIds": {"DOI": "10.1080/09273948.2022.2054433", + "CorpusId": 248127887, "PubMed": "35412935"}, "corpusId": 248127887, "publicationVenue": + {"id": "7232bd9a-d17f-44d3-8ea8-f423c97a3219", "name": "Ocular immunology + and inflammation", "type": "journal", "alternate_names": ["Ocul Immunol Inflamm", + "Ocul immunol inflamm", "Ocular Immunology and Inflammation"], "issn": "0927-3948", + "url": "http://www.tandfonline.com/openurl?genre=journal&stitle=ioii20"}, + "url": "https://www.semanticscholar.org/paper/0986d6ba0cf5671846b231f37d319659da818687", "title": "Artificial Intelligence and Imaging Processing in Optical Coherence Tomography and Digital Images in Uveitis", "abstract": "ABSTRACT Introduction Computer vision, understood as the area of science that trains computers to @@ -5840,17 +6845,21 @@ interactions: and standardised outcomes for future clinical trials. In addition, it could help to better understand the disease and its progression.", "venue": "Ocular immunology and inflammation", "year": 2022, "referenceCount": 104, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2022-04-03", "journal": {"volume": "30", "pages": - "675 - 681", "name": "Ocular Immunology and Inflammation"}, "authors": [{"authorId": - "2162235000", "name": "M. Abellanas"}, {"authorId": "2162234288", "name": - "Mar\u00eda Jos\u00e9 Elena"}, {"authorId": "5638585", "name": "P. Keane"}, - {"authorId": "3497482", "name": "K. Balaskas"}, {"authorId": "4166157", "name": - "D. Grewal"}, {"authorId": "4074301", "name": "E. Carre\u00f1o"}]}, {"paperId": - "cc0f9bdfce7f525c3de1a72cb24c61265c025190", "externalIds": {"DOI": "10.1080/19322909.2022.2060893", - "CorpusId": 248079598}, "url": "https://www.semanticscholar.org/paper/cc0f9bdfce7f525c3de1a72cb24c61265c025190", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-03", + "journal": {"volume": "30", "pages": "675 - 681", "name": "Ocular Immunology + and Inflammation"}, "authors": [{"authorId": "2162235000", "name": "M. Abellanas"}, + {"authorId": "2162234288", "name": "Mar\u00eda Jos\u00e9 Elena"}, {"authorId": + "5638585", "name": "P. Keane"}, {"authorId": "3497482", "name": "K. Balaskas"}, + {"authorId": "4166157", "name": "D. Grewal"}, {"authorId": "4074301", "name": + "E. Carre\u00f1o"}]}, {"paperId": "cc0f9bdfce7f525c3de1a72cb24c61265c025190", + "externalIds": {"DOI": "10.1080/19322909.2022.2060893", "CorpusId": 248079598}, + "corpusId": 248079598, "publicationVenue": {"id": "5f34c91d-631f-488b-810c-07ab7fae6347", + "name": "Journal of Web Librarianship", "type": "journal", "alternate_names": + ["J Web Librariansh"], "issn": "1932-2909", "url": "http://www.haworthpress.com/store/product.asp?sku=j502", + "alternate_urls": ["http://www.tandfonline.com/loi/wjwl20"]}, "url": "https://www.semanticscholar.org/paper/cc0f9bdfce7f525c3de1a72cb24c61265c025190", "title": "Implementing a Chatbot on a Library Website", "abstract": "Abstract A library\u2019s website is a virtual point of contact for interacting with its patrons. Ensuring a library\u2019s website has easily findable content @@ -5864,14 +6873,29 @@ interactions: library website. This article provides the first detailed description in the literature of an implementation of a proprietary chatbot for an academic library.", "venue": "Journal of Web Librarianship", "year": 2022, "referenceCount": 43, - "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-04-03", "journal": {"volume": - "16", "pages": "120 - 142", "name": "Journal of Web Librarianship"}, "authors": - [{"authorId": "66427909", "name": "Michelle Ehrenpreis"}, {"authorId": "152209517", - "name": "J. DeLooper"}]}, {"paperId": "e6b3a9a900b7037cb0977bea489c0aa053d94fa0", + "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=1400&context=le_pubs", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-04-03", "journal": {"volume": "16", "pages": "120 - 142", "name": "Journal + of Web Librarianship"}, "authors": [{"authorId": "66427909", "name": "Michelle + Ehrenpreis"}, {"authorId": "152209517", "name": "J. DeLooper"}]}, {"paperId": + "287a1d6654e8f610a90346644c8d0dac6371758e", "externalIds": {"DOI": "10.1007/s11569-021-00407-6", + "CorpusId": 255314289}, "corpusId": 255314289, "publicationVenue": {"id": + "f151e41a-8da2-4030-aeab-229a2c46ffc7", "name": "NanoEthics", "type": "journal", + "alternate_names": ["Nanoethics"], "issn": "1871-4757", "url": "http://www.springer.com/social+sciences/applied+ethics/journal/11569", + "alternate_urls": ["https://rd.springer.com/journal/11569"]}, "url": "https://www.semanticscholar.org/paper/287a1d6654e8f610a90346644c8d0dac6371758e", + "title": "Performance in the Workplace: a Critical Evaluation of Cognitive + Enhancement", "abstract": null, "venue": "NanoEthics", "year": 2022, "referenceCount": + 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11569-021-00407-6.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-01", + "journal": {"volume": "16", "pages": "107 - 114", "name": "NanoEthics"}, "authors": + [{"authorId": "152482925", "name": "Cengiz Acarturk"}, {"authorId": "120557445", + "name": "Baris Mucen"}]}, {"paperId": "e6b3a9a900b7037cb0977bea489c0aa053d94fa0", "externalIds": {"DOI": "10.3390/proceedings2022081105", "CorpusId": 249296966}, - "url": "https://www.semanticscholar.org/paper/e6b3a9a900b7037cb0977bea489c0aa053d94fa0", + "corpusId": 249296966, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e6b3a9a900b7037cb0977bea489c0aa053d94fa0", "title": "Advanced NLP Procedures as Premises for the Reconstruction of the Idea of Knowledge", "abstract": ": This paper evaluates arti\ufb01cial texts produced by the GPT 2 and GPT 3 language models and proposes to use hermeneutic @@ -5883,12 +6907,14 @@ interactions: of discursive space can be used for its analysis.", "venue": "The 2021 Summit of the International Society for the Study of Information", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", + true, "openAccessPdf": {"url": "https://www.mdpi.com/2504-3900/81/1/5/pdf?version=1661860659", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-01", "journal": {"name": "The 2021 Summit of the International Society for the Study of Information"}, "authors": [{"authorId": "4175098", "name": "R. Maciag"}]}, {"paperId": "6e07e341c8e0063c4c2fcf1d4d8867fee85831b6", "externalIds": {"DOI": - "10.1145/3512335", "CorpusId": 248497625}, "url": "https://www.semanticscholar.org/paper/6e07e341c8e0063c4c2fcf1d4d8867fee85831b6", + "10.1145/3512335", "CorpusId": 248497625}, "corpusId": 248497625, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6e07e341c8e0063c4c2fcf1d4d8867fee85831b6", "title": "Workings of science", "abstract": "While most people are not familiar with the details of how artificial intelligence (AI) works, the term itself is becoming more familiar to the non-scientific community, to the point that @@ -5903,38 +6929,52 @@ interactions: and that by 2156-the 200 year anniversary of the coining of the term-the technology should be in a position to deliver on its promises.", "venue": "Ubiquity", "year": 2022, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-04-01", "journal": {"volume": "2022", "pages": "1 - 18", "name": "Ubiquity"}, - "authors": [{"authorId": "2903173", "name": "K. Delic"}, {"authorId": "2811225", - "name": "J. A. Riley"}]}, {"paperId": "4d948864b35c5ad1656e856c0ed982891d20f6ce", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3512335", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-04-01", + "journal": {"volume": "2022", "pages": "1 - 18", "name": "Ubiquity"}, "authors": + [{"authorId": "2903173", "name": "K. Delic"}, {"authorId": "2811225", "name": + "J. A. Riley"}]}, {"paperId": "4d948864b35c5ad1656e856c0ed982891d20f6ce", "externalIds": {"DBLP": "journals/suscom/VermaTS22", "DOI": "10.1016/j.suscom.2022.100742", - "CorpusId": 248331709}, "url": "https://www.semanticscholar.org/paper/4d948864b35c5ad1656e856c0ed982891d20f6ce", + "CorpusId": 248331709}, "corpusId": 248331709, "publicationVenue": {"id": + "e1b18316-e0d4-4006-aa13-129890a757fc", "name": "Sustainable Computing: Informatics + and Systems", "type": "journal", "alternate_names": ["Sustain Comput Informatics + Syst"], "issn": "2210-5379", "url": "http://www.journals.elsevier.com/sustainable-computing"}, + "url": "https://www.semanticscholar.org/paper/4d948864b35c5ad1656e856c0ed982891d20f6ce", "title": "EXTREM-EDGE - EXtensions To RISC-V for Energy-efficient ML inference at the EDGE of IoT", "abstract": null, "venue": "Sustainable Computing: Informatics and Systems", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-04-01", "journal": {"volume": "35", "pages": "100742", - "name": "Sustain. Comput. Informatics Syst."}, "authors": [{"authorId": "34555540", - "name": "Vaibhav Verma"}, {"authorId": "3414831", "name": "Tommy Tracy"}, - {"authorId": "1741387", "name": "M. Stan"}]}, {"paperId": "3bf084bf111325a666eb565c0168246f9f864cac", - "externalIds": {"DBLP": "journals/nca/WangLYL22", "DOI": "10.1007/s00521-022-07182-9", - "CorpusId": 247908956}, "url": "https://www.semanticscholar.org/paper/3bf084bf111325a666eb565c0168246f9f864cac", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-01", "journal": + {"volume": "35", "pages": "100742", "name": "Sustain. Comput. Informatics + Syst."}, "authors": [{"authorId": "34555540", "name": "Vaibhav Verma"}, {"authorId": + "3414831", "name": "Tommy Tracy"}, {"authorId": "1741387", "name": "M. Stan"}]}, + {"paperId": "3bf084bf111325a666eb565c0168246f9f864cac", "externalIds": {"DBLP": + "journals/nca/WangLYL22", "DOI": "10.1007/s00521-022-07182-9", "CorpusId": + 247908956}, "corpusId": 247908956, "publicationVenue": {"id": "702e18c0-c8c6-4800-a398-42aa159394d1", + "name": "Neural computing & applications (Print)", "type": "journal", "alternate_names": + ["Neural comput appl (print", "Neural Comput Appl", "Neural Computing and + Applications"], "issn": "0941-0643", "url": "https://link.springer.com/journal/521"}, + "url": "https://www.semanticscholar.org/paper/3bf084bf111325a666eb565c0168246f9f864cac", "title": "Semantic-aware conditional variational autoencoder for one-to-many dialogue generation", "abstract": null, "venue": "Neural computing & applications (Print)", "year": 2022, "referenceCount": 48, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-04-01", "journal": {"volume": "34", "pages": "13683 - - 13695", "name": "Neural Computing and Applications"}, "authors": [{"authorId": - "2118416767", "name": "Ye Wang"}, {"authorId": "2075442351", "name": "Jing - Liao"}, {"authorId": "32904145", "name": "Hong Yu"}, {"authorId": "40939264", - "name": "Jiaxu Leng"}]}, {"paperId": "096c5b6f749320d14b2371248fb41b2c8fa70b06", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-04-01", "journal": + {"volume": "34", "pages": "13683 - 13695", "name": "Neural Computing and Applications"}, + "authors": [{"authorId": "2118416767", "name": "Ye Wang"}, {"authorId": "2075442351", + "name": "Jing Liao"}, {"authorId": "32904145", "name": "Hong Yu"}, {"authorId": + "40939264", "name": "Jiaxu Leng"}]}, {"paperId": "096c5b6f749320d14b2371248fb41b2c8fa70b06", "externalIds": {"PubMedCentral": "9015736", "DOI": "10.2196/33145", "CorpusId": - 247855234, "PubMed": "35363141"}, "url": "https://www.semanticscholar.org/paper/096c5b6f749320d14b2371248fb41b2c8fa70b06", + 247855234, "PubMed": "35363141"}, "corpusId": 247855234, "publicationVenue": + {"id": "278131df-030d-4e6c-b083-d57f3b740dc4", "name": "JMIR Research Protocols", + "type": "journal", "alternate_names": ["JMIR Res Protoc"], "issn": "1929-0748", + "url": "https://www.researchprotocols.org/", "alternate_urls": ["http://www.researchprotocols.org/index"]}, + "url": "https://www.semanticscholar.org/paper/096c5b6f749320d14b2371248fb41b2c8fa70b06", "title": "Stakeholder Perspectives on Clinical Decision Support Tools to Inform Clinical Artificial Intelligence Implementation: Protocol for a Framework Synthesis for Qualitative Evidence", "abstract": "Background Quantitative @@ -5969,17 +7009,21 @@ interactions: PROSPERO CRD42021256005; https://tinyurl.com/r4x3thvp International Registered Report Identifier (IRRID) DERR1-10.2196/33145", "venue": "JMIR Research Protocols", "year": 2022, "referenceCount": 32, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-04-01", "journal": {"volume": "11", "name": "JMIR - Research Protocols"}, "authors": [{"authorId": "1404619882", "name": "M. Al-Zubaidy"}, - {"authorId": "32243895", "name": "H. Hogg"}, {"authorId": "2834652", "name": - "G. Maniatopoulos"}, {"authorId": "4920995", "name": "J. Talks"}, {"authorId": - "144055127", "name": "M. Teare"}, {"authorId": "5638585", "name": "P. Keane"}, - {"authorId": "2160974829", "name": "Fiona R Beyer"}]}, {"paperId": "d231bfe0a30ee8a0e59d40d5edac4faa6aee7704", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.researchprotocols.org/2022/4/e33145/PDF", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-04-01", + "journal": {"volume": "11", "name": "JMIR Research Protocols"}, "authors": + [{"authorId": "1404619882", "name": "M. Al-Zubaidy"}, {"authorId": "32243895", + "name": "H. Hogg"}, {"authorId": "2834652", "name": "G. Maniatopoulos"}, {"authorId": + "4920995", "name": "J. Talks"}, {"authorId": "144055127", "name": "M. Teare"}, + {"authorId": "5638585", "name": "P. Keane"}, {"authorId": "2160974829", "name": + "Fiona R Beyer"}]}, {"paperId": "d231bfe0a30ee8a0e59d40d5edac4faa6aee7704", "externalIds": {"PubMedCentral": "9240552", "DOI": "10.4103/ijo.IJO_644_22", - "CorpusId": 247634286, "PubMed": "35325987"}, "url": "https://www.semanticscholar.org/paper/d231bfe0a30ee8a0e59d40d5edac4faa6aee7704", + "CorpusId": 247634286, "PubMed": "35325987"}, "corpusId": 247634286, "publicationVenue": + {"id": "2bbc1e45-4074-471d-b003-2c8f5a99cdb0", "name": "Indian Journal of + Ophthalmology", "type": "journal", "alternate_names": ["Indian J Ophthalmol"], + "issn": "0301-4738", "url": "http://www.ijo.in/"}, "url": "https://www.semanticscholar.org/paper/d231bfe0a30ee8a0e59d40d5edac4faa6aee7704", "title": "Artificial intelligence in ophthalmology - Machines think!", "abstract": "It was 72\u2010years\u2010ago that the British mathematician Alan Turing had posed a provocative question \u201cCan machines think?\u201d in his landmark @@ -5997,14 +7041,15 @@ interactions: evolution of AI has opened yet unfathomable new paradigms in several domains that intricately affect us, including medicine.", "venue": "Indian Journal of Ophthalmology", "year": 2022, "referenceCount": 29, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": - "2022-04-01", "journal": {"volume": "70", "pages": "1075 - 1079", "name": - "Indian Journal of Ophthalmology"}, "authors": [{"authorId": "5267467", "name": - "S. Honavar"}]}, {"paperId": "6157aded1cc77adfa428ae315abca22b5fcea69f", "externalIds": - {"PubMedCentral": "9008134", "DOI": "10.3389/fnsys.2022.800280", "CorpusId": - 247799011, "PubMed": "35431820"}, "url": "https://www.semanticscholar.org/paper/6157aded1cc77adfa428ae315abca22b5fcea69f", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["Editorial"], "publicationDate": "2022-04-01", "journal": {"volume": "70", + "pages": "1075 - 1079", "name": "Indian Journal of Ophthalmology"}, "authors": + [{"authorId": "5267467", "name": "S. Honavar"}]}, {"paperId": "6157aded1cc77adfa428ae315abca22b5fcea69f", + "externalIds": {"PubMedCentral": "9008134", "DOI": "10.3389/fnsys.2022.800280", + "CorpusId": 247799011, "PubMed": "35431820"}, "corpusId": 247799011, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6157aded1cc77adfa428ae315abca22b5fcea69f", "title": "Understanding Is a Process", "abstract": "How do we gauge understanding? Tests of understanding, such as Turing''s imitation game, are numerous; yet, attempts to achieve a state of understanding are not satisfactory assessments. @@ -6017,9 +7062,10 @@ interactions: the degree of understanding a human or intelligent system has achieved through combinations of successes and failures.", "venue": "Frontiers in Systems Neuroscience", "year": 2022, "referenceCount": 160, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fnsys.2022.800280/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-31", "journal": {"volume": "16", "name": "Frontiers in Systems Neuroscience"}, "authors": [{"authorId": "2684131", "name": "L. Blaha"}, {"authorId": "122860492", "name": "Mitchell Abrams"}, {"authorId": "3390221", "name": "Sarah A Bibyk"}, @@ -6030,7 +7076,8 @@ interactions: "145209749", "name": "J. Trafton"}, {"authorId": "2160754294", "name": "Rachel Wong"}]}, {"paperId": "353891dd5038780069ebf0c1c0ec777cb2632d14", "externalIds": {"DBLP": "journals/corr/abs-2204-05138", "ArXiv": "2204.05138", "DOI": "10.48550/arXiv.2204.05138", - "CorpusId": 248085552}, "url": "https://www.semanticscholar.org/paper/353891dd5038780069ebf0c1c0ec777cb2632d14", + "CorpusId": 248085552}, "corpusId": 248085552, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/353891dd5038780069ebf0c1c0ec777cb2632d14", "title": "Artificial Intelligence Software Structured to Simulate Human Working Memory, Mental Imagery, and Mental Continuity", "abstract": "This article presents an artificial intelligence (AI) architecture intended to simulate @@ -6051,16 +7098,17 @@ interactions: cognition. map with an iteratively updated working memory store may provide an AI system with the cognitive assets needed to produce generalized intelligence.", "venue": "ArXiv", "year": 2022, "referenceCount": 50, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Biology", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-29", "journal": - {"volume": "abs/2204.05138", "name": "ArXiv"}, "authors": [{"authorId": "4725371", - "name": "J. Reser"}]}, {"paperId": "404bce8e7be98ada1b8d7338d9daa6e5031626dd", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": + "Psychology", "source": "s2-fos-model"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-03-29", "journal": {"volume": "abs/2204.05138", "name": "ArXiv"}, "authors": + [{"authorId": "4725371", "name": "J. Reser"}]}, {"paperId": "404bce8e7be98ada1b8d7338d9daa6e5031626dd", "externalIds": {"ArXiv": "2204.01466", "DBLP": "journals/corr/abs-2204-01466", - "DOI": "10.48550/arXiv.2204.01466", "CorpusId": 247940084}, "url": "https://www.semanticscholar.org/paper/404bce8e7be98ada1b8d7338d9daa6e5031626dd", + "DOI": "10.48550/arXiv.2204.01466", "CorpusId": 247940084}, "corpusId": 247940084, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/404bce8e7be98ada1b8d7338d9daa6e5031626dd", "title": "A single Long Short-Term Memory network for enhancing the prediction of path-dependent plasticity with material heterogeneity and anisotropy", "abstract": "This study presents applicability of conventional deep recurrent @@ -6082,15 +7130,16 @@ interactions: and effectively capture the path-dependent responses of heterogeneous and anisotropic microstructures under arbitrary mechanical loading conditions.", "venue": "ArXiv", "year": 2022, "referenceCount": 39, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-03-29", "journal": {"volume": "abs/2204.01466", "name": - "ArXiv"}, "authors": [{"authorId": "2161343141", "name": "Eshan Motevali Haghighi"}, - {"authorId": "98495515", "name": "S. Na"}]}, {"paperId": "cc7663332d14450414ceb3dc914627be1c547212", - "externalIds": {"DOI": "10.3389/feduc.2022.755914", "CorpusId": 247783373}, - "url": "https://www.semanticscholar.org/paper/cc7663332d14450414ceb3dc914627be1c547212", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-03-29", "journal": {"volume": + "abs/2204.01466", "name": "ArXiv"}, "authors": [{"authorId": "2161343141", + "name": "Eshan Motevali Haghighi"}, {"authorId": "98495515", "name": "S. Na"}]}, + {"paperId": "cc7663332d14450414ceb3dc914627be1c547212", "externalIds": {"DOI": + "10.3389/feduc.2022.755914", "CorpusId": 247783373}, "corpusId": 247783373, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc7663332d14450414ceb3dc914627be1c547212", "title": "Teacher\u2019s Perceptions of Using an Artificial Intelligence-Based Educational Tool for Scientific Writing", "abstract": "Efforts have constantly been made to incorporate AI into teaching and learning; however, the successful @@ -6110,13 +7159,14 @@ interactions: since it reports teachers\u2019 experiences utilizing the system and various considerations regarding its implementation.", "venue": "Frontiers in Education", "year": 2022, "referenceCount": 100, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-03-29", "journal": {"volume": "7"}, "authors": [{"authorId": "50826575", - "name": "N. Kim"}, {"authorId": "47596860", "name": "Min Kyu Kim"}]}, {"paperId": - "35e717eb3d32960db8cd67bd51485db96a8f4dac", "externalIds": {"DBLP": "journals/corr/abs-2203-14641", - "ArXiv": "2203.14641", "DOI": "10.48550/arXiv.2203.14641", "CorpusId": 247762961}, - "url": "https://www.semanticscholar.org/paper/35e717eb3d32960db8cd67bd51485db96a8f4dac", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/feduc.2022.755914/pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-29", + "journal": {"volume": "7"}, "authors": [{"authorId": "50826575", "name": "N. + Kim"}, {"authorId": "47596860", "name": "Min Kyu Kim"}]}, {"paperId": "35e717eb3d32960db8cd67bd51485db96a8f4dac", + "externalIds": {"DBLP": "journals/corr/abs-2203-14641", "ArXiv": "2203.14641", + "DOI": "10.48550/arXiv.2203.14641", "CorpusId": 247762961}, "corpusId": 247762961, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/35e717eb3d32960db8cd67bd51485db96a8f4dac", "title": "Subjective Evaluation of Deep Learning Models for Symbolic Music Composition", "abstract": "Deep learning models are typically evaluated to measure and compare their performance on a given task. The metrics that are @@ -6130,15 +7180,20 @@ interactions: with deep learning. We give the results of this evaluation method and we compare the responses of each user level for each evaluated model.", "venue": "ArXiv", "year": 2022, "referenceCount": 19, "citationCount": 4, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-03-28", "journal": {"volume": "abs/2203.14641", "name": - "ArXiv"}, "authors": [{"authorId": "1882682548", "name": "Carlos Hernandez-Olivan"}, - {"authorId": "2160542077", "name": "Jorge Abadias Puyuelo"}, {"authorId": - "23531502", "name": "J. R. Beltr\u00e1n"}]}, {"paperId": "cd3d2b3a182c76cb0020cb2e725a9bfe88846dd5", - "externalIds": {"ArXiv": "2204.01518", "DBLP": "journals/corr/abs-2204-01518", - "DOI": "10.5121/csit.2022.120613", "CorpusId": 247824075}, "url": "https://www.semanticscholar.org/paper/cd3d2b3a182c76cb0020cb2e725a9bfe88846dd5", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-28", "journal": + {"volume": "abs/2203.14641", "name": "ArXiv"}, "authors": [{"authorId": "1882682548", + "name": "Carlos Hernandez-Olivan"}, {"authorId": "2160542077", "name": "Jorge + Abadias Puyuelo"}, {"authorId": "23531502", "name": "J. R. Beltr\u00e1n"}]}, + {"paperId": "cd3d2b3a182c76cb0020cb2e725a9bfe88846dd5", "externalIds": {"ArXiv": + "2204.01518", "DBLP": "journals/corr/abs-2204-01518", "DOI": "10.5121/csit.2022.120613", + "CorpusId": 247824075}, "corpusId": 247824075, "publicationVenue": {"id": + "da625a67-4bac-4737-81b6-af5459021b72", "name": "Embedded Systems and Applications", + "type": "conference", "alternate_names": ["ESA", "European Symposium on Algorithms", + "Embed Syst Appl", "Eur Symp Algorithm"], "url": "http://esa-symposium.org/"}, + "url": "https://www.semanticscholar.org/paper/cd3d2b3a182c76cb0020cb2e725a9bfe88846dd5", "title": "Artificial Intelligence: Framework of driving triggers to past, present and future applications and influencers of industry sector adoption", "abstract": "To gain a sense of the development of Artificial Intelligence @@ -6150,15 +7205,17 @@ interactions: such as cost, speed, accuracy, diversity/inclusion and interdisciplinary research/collaboration that propel AI into an essential transformative technology.", "venue": "Embedded Systems and Applications", "year": 2022, "referenceCount": 100, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://doi.org/10.5121/csit.2022.120613", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-26", "journal": {"volume": "abs/2204.01518", "name": "ArXiv"}, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "2160808545", "name": "Susan Kaplan"}]}, {"paperId": "519db754d020a51bd960d5549e2955fd47652e2b", "externalIds": {"PubMedCentral": "8990896", "DOI": "10.3389/fmed.2022.807994", - "CorpusId": 247769262, "PubMed": "35402468"}, "url": "https://www.semanticscholar.org/paper/519db754d020a51bd960d5549e2955fd47652e2b", + "CorpusId": 247769262, "PubMed": "35402468"}, "corpusId": 247769262, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/519db754d020a51bd960d5549e2955fd47652e2b", "title": "Use of Artificial Intelligence to Identify New Mechanisms and Approaches to Therapy of Bone Disorders Associated With Chronic Kidney Disease", "abstract": "Chronic kidney disease (CKD) leads to clinically severe bone loss, resulting @@ -6177,15 +7234,22 @@ interactions: learning to deliver individualized precision medical therapy of this highly complex disorder.", "venue": "Frontiers in Medicine", "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-03-25", "journal": {"volume": "9", "name": "Frontiers in Medicine"}, "authors": [{"authorId": "3320160", "name": "A. Gaweda"}, {"authorId": "35184257", "name": "E. Lederer"}, {"authorId": "35218620", "name": "M. Brier"}]}, {"paperId": "f281ad6573ed8ea7fb3116a3747b0e80ef522ea9", "externalIds": {"DBLP": "journals/corr/abs-2203-12687", "ArXiv": "2203.12687", - "DOI": "10.1080/10447318.2022.2050543", "CorpusId": 247628267}, "url": "https://www.semanticscholar.org/paper/f281ad6573ed8ea7fb3116a3747b0e80ef522ea9", + "DOI": "10.1080/10447318.2022.2050543", "CorpusId": 247628267}, "corpusId": + 247628267, "publicationVenue": {"id": "d4567476-a9c8-4148-9c15-b2be5094bdce", + "name": "International Journal of Human-Computer Interaction", "type": "journal", + "alternate_names": ["Int J Human-computer Interact", "International Journal + of Human-computer Interaction"], "issn": "1044-7318", "url": "http://www.catchword.com/rpsv/catchword/erlbaum/10447318/contp1-1.htm", + "alternate_urls": ["http://www.erlbaum.com/Journals/journals/IJHCI/ijhci.htm", + "http://www.tandfonline.com/loi/hihc/current", "http://www.tandfonline.com/loi/hihc20"]}, + "url": "https://www.semanticscholar.org/paper/f281ad6573ed8ea7fb3116a3747b0e80ef522ea9", "title": "Trust in AI and Its Role in the Acceptance of AI Technologies", "abstract": "As AI-enhanced technologies become common in a variety of domains, there is an increasing need to define and examine the trust that users have @@ -6210,7 +7274,8 @@ interactions: offers a multidimensional measure of trust that can be utilized in the future study of trustworthy AI.", "venue": "International Journal of Human-Computer Interaction", "year": 2022, "referenceCount": 66, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2203.12687", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-03-23", "journal": {"volume": "abs/2203.12687", "name": @@ -6218,7 +7283,8 @@ interactions: "40955731", "name": "Prabu David"}, {"authorId": "2142143664", "name": "Arun Ross"}]}, {"paperId": "5c2ee6c183538498061540e6d942977a23a2e652", "externalIds": {"DOI": "10.32749/nucleodoconhecimento.com.br/tecnologia/premio-loebner", - "CorpusId": 248014198}, "url": "https://www.semanticscholar.org/paper/5c2ee6c183538498061540e6d942977a23a2e652", + "CorpusId": 248014198}, "corpusId": 248014198, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5c2ee6c183538498061540e6d942977a23a2e652", "title": "Intelig\u00eancia artificial e o teste de Turing: uma an\u00e1lise do pr\u00eamio Loebner de 2017 e 2018", "abstract": "A partir dos estudos iniciais sobre as compet\u00eancias de Intelig\u00eancia Artificial (IA), @@ -6240,41 +7306,52 @@ interactions: com o objetivo de ganhar a prova, interferindo, dessa forma, nas reais capacidades da IA testada.", "venue": "Revista Cient\u00edfica Multidisciplinar N\u00facleo do Conhecimento", "year": 2022, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2022-03-22", "journal": {"name": "Revista Cient\u00edfica - Multidisciplinar N\u00facleo do Conhecimento"}, "authors": [{"authorId": "2190727999", - "name": "R. E. Silva"}, {"authorId": "122493651", "name": "A. F. D. Souza"}, - {"authorId": "2137242091", "name": "Polyana Santos Fonseca Nascimento"}, {"authorId": - "102568924", "name": "Pedro Henrique Sales Girotto"}]}, {"paperId": "b37ab9d42fe9336f362342e75ed029bf52d37f1c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2022-03-22", "journal": + {"name": "Revista Cient\u00edfica Multidisciplinar N\u00facleo do Conhecimento"}, + "authors": [{"authorId": "2190727999", "name": "R. E. Silva"}, {"authorId": + "122493651", "name": "A. F. D. Souza"}, {"authorId": "2137242091", "name": + "Polyana Santos Fonseca Nascimento"}, {"authorId": "102568924", "name": "Pedro + Henrique Sales Girotto"}]}, {"paperId": "b37ab9d42fe9336f362342e75ed029bf52d37f1c", "externalIds": {"DBLP": "journals/air/ZhengYGW22", "DOI": "10.1007/s10462-022-10166-9", - "CorpusId": 247601588}, "url": "https://www.semanticscholar.org/paper/b37ab9d42fe9336f362342e75ed029bf52d37f1c", + "CorpusId": 247601588}, "corpusId": 247601588, "publicationVenue": {"id": + "ea8553fe-2467-4367-afee-c4deb3754820", "name": "Artificial Intelligence Review", + "type": "journal", "alternate_names": ["Artif Intell Rev"], "issn": "0269-2821", + "url": "https://link.springer.com/journal/10462"}, "url": "https://www.semanticscholar.org/paper/b37ab9d42fe9336f362342e75ed029bf52d37f1c", "title": "Computational knowledge vision: paradigmatic knowledge based prescriptive learning and reasoning for perception and vision", "abstract": null, "venue": "Artificial Intelligence Review", "year": 2022, "referenceCount": 275, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-21", "journal": - {"volume": "55", "pages": "5917 - 5952", "name": "Artificial Intelligence - Review"}, "authors": [{"authorId": "48499775", "name": "Wenbo Zheng"}, {"authorId": - "151486225", "name": "Lan Yan"}, {"authorId": "1491637173", "name": "Chao - Gou"}, {"authorId": "47939505", "name": "Fei-Yue Wang"}]}, {"paperId": "52e0280c4789483920cd3f912e19e1d5c49f0f46", - "externalIds": {"DOI": "10.1007/s42438-022-00303-6", "CorpusId": 247606277}, - "url": "https://www.semanticscholar.org/paper/52e0280c4789483920cd3f912e19e1d5c49f0f46", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-03-21", "journal": {"volume": "55", "pages": "5917 - 5952", "name": + "Artificial Intelligence Review"}, "authors": [{"authorId": "48499775", "name": + "Wenbo Zheng"}, {"authorId": "151486225", "name": "Lan Yan"}, {"authorId": + "1491637173", "name": "Chao Gou"}, {"authorId": "47939505", "name": "Fei-Yue + Wang"}]}, {"paperId": "52e0280c4789483920cd3f912e19e1d5c49f0f46", "externalIds": + {"DOI": "10.1007/s42438-022-00303-6", "CorpusId": 247606277}, "corpusId": + 247606277, "publicationVenue": {"id": "e7d1017a-902c-4332-87a6-600c2d33cbbc", + "name": "Postdigital Science and Education", "type": "journal", "alternate_names": + ["Postdigital Sci Educ"], "issn": "2662-5326", "alternate_issns": ["2524-4868", + "2524-485X"], "url": "https://link.springer.com/journal/42438", "alternate_urls": + ["https://link.springer.com/journal/volumesAndIssues/42438"]}, "url": "https://www.semanticscholar.org/paper/52e0280c4789483920cd3f912e19e1d5c49f0f46", "title": "Towards Turing Test 2.0\u2014Attribution of Moral Status and Personhood to Human and Non-Human Agents", "abstract": null, "venue": "Postdigital Science and Education", "year": 2022, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2022-03-21", "journal": {"volume": "4", "pages": "860 - - 876", "name": "Postdigital Science and Education"}, "authors": [{"authorId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2022-03-21", "journal": {"volume": "4", "pages": + "860 - 876", "name": "Postdigital Science and Education"}, "authors": [{"authorId": "2159615035", "name": "Aleksandra Lukaszewicz"}, {"authorId": "2066044296", "name": "Pawe\u0142 Fortuna"}]}, {"paperId": "fa4701be8952563b1d4c5355ef08ad7836f60192", "externalIds": {"ArXiv": "2203.10317", "DBLP": "journals/corr/abs-2203-10317", - "DOI": "10.1007/978-3-031-13324-4_47", "CorpusId": 247594200}, "url": "https://www.semanticscholar.org/paper/fa4701be8952563b1d4c5355ef08ad7836f60192", + "DOI": "10.1007/978-3-031-13324-4_47", "CorpusId": 247594200}, "corpusId": + 247594200, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fa4701be8952563b1d4c5355ef08ad7836f60192", "title": "Practical Recommendations for Replay-based Continual Learning Methods", "abstract": null, "venue": "ICIAP Workshops", "year": 2022, "referenceCount": - 33, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, + 33, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/2203.10317", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -6283,7 +7360,8 @@ interactions: {"authorId": "47167661", "name": "Andrea Cossu"}, {"authorId": "144689520", "name": "Antonio Carta"}, {"authorId": "3224102", "name": "D. Bacciu"}]}, {"paperId": "2c39fcfc4848049dcc89230e3cf28ce441f93f9d", "externalIds": {"DOI": - "10.3390/philosophies7020033", "CorpusId": 247605037}, "url": "https://www.semanticscholar.org/paper/2c39fcfc4848049dcc89230e3cf28ce441f93f9d", + "10.3390/philosophies7020033", "CorpusId": 247605037}, "corpusId": 247605037, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c39fcfc4848049dcc89230e3cf28ce441f93f9d", "title": "Intuition and Ingenuity: G\u00f6del on Turing\u2019s \u201cPhilosophical Error\u201d", "abstract": "Despite his unreserved appreciation of Turing\u2019s analysis for being a \u201cprecise and unquestionably adequate definition\u201d @@ -6304,12 +7382,19 @@ interactions: conflicting views held by Turing and G\u00f6del should best be seen as complementary, keeping intuition and ingenuity together.", "venue": "Philosophies", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-03-18", "journal": {"name": "Philosophies"}, "authors": [{"authorId": - "2118172775", "name": "Long Chen"}]}, {"paperId": "cd1af17599fa7dc6c2bc9247b9f44e420f1a3d64", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/7/2/33/pdf?version=1647850582", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-18", + "journal": {"name": "Philosophies"}, "authors": [{"authorId": "2118172775", + "name": "Long Chen"}]}, {"paperId": "cd1af17599fa7dc6c2bc9247b9f44e420f1a3d64", "externalIds": {"PubMedCentral": "8944871", "DOI": "10.1073/pnas.2107151119", - "CorpusId": 247499099, "PubMed": "35294283"}, "url": "https://www.semanticscholar.org/paper/cd1af17599fa7dc6c2bc9247b9f44e420f1a3d64", + "CorpusId": 247499099, "PubMed": "35294283"}, "corpusId": 247499099, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/cd1af17599fa7dc6c2bc9247b9f44e420f1a3d64", "title": "The difficulty of computing stable and accurate neural networks: On the barriers of deep learning and Smale\u2019s 18th problem", "abstract": "Significance Instability is the Achilles\u2019 heel of modern artificial @@ -6325,15 +7410,16 @@ interactions: and exponentially accurate in the number of hidden layers.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 2022, "referenceCount": 85, "citationCount": 18, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-03-16", "journal": {"volume": "119", "name": "Proceedings of the National - Academy of Sciences of the United States of America"}, "authors": [{"authorId": - "51445731", "name": "Matthew J. Colbrook"}, {"authorId": "72167909", "name": - "Vegard Antun"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": - "3a10e1f4d26aa3a1931abd0e2f764fb32ed15208", "externalIds": {"DOI": "10.3390/proceedings2022081053", - "CorpusId": 247612933}, "url": "https://www.semanticscholar.org/paper/3a10e1f4d26aa3a1931abd0e2f764fb32ed15208", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-03-16", "journal": {"volume": "119", "name": "Proceedings + of the National Academy of Sciences of the United States of America"}, "authors": + [{"authorId": "51445731", "name": "Matthew J. Colbrook"}, {"authorId": "72167909", + "name": "Vegard Antun"}, {"authorId": "145920634", "name": "A. Hansen"}]}, + {"paperId": "3a10e1f4d26aa3a1931abd0e2f764fb32ed15208", "externalIds": {"DOI": + "10.3390/proceedings2022081053", "CorpusId": 247612933}, "corpusId": 247612933, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a10e1f4d26aa3a1931abd0e2f764fb32ed15208", "title": "The Science of Information Processing Structures and the Design of a New Class of Distributed Computing Structures", "abstract": "Classical computer science (CCS) based on the universal Turing machine has given us @@ -6346,12 +7432,14 @@ interactions: information processing structures (SIPS), which allows us not only to model but also implement digital automata with these behaviors.", "venue": "IS4SI 2021", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2022-03-16", "journal": {"name": "IS4SI 2021"}, "authors": - [{"authorId": "3289961", "name": "Rao V. Mikkilineni"}]}, {"paperId": "2b5da9ec9120d72f6d6af2973079763a569b6178", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2504-3900/81/1/53/pdf?version=1647485241", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-03-16", "journal": {"name": "IS4SI 2021"}, "authors": [{"authorId": + "3289961", "name": "Rao V. Mikkilineni"}]}, {"paperId": "2b5da9ec9120d72f6d6af2973079763a569b6178", "externalIds": {"ArXiv": "2208.08666", "DBLP": "journals/corr/abs-2208-08666", - "DOI": "10.48550/arXiv.2208.08666", "CorpusId": 251643865}, "url": "https://www.semanticscholar.org/paper/2b5da9ec9120d72f6d6af2973079763a569b6178", + "DOI": "10.48550/arXiv.2208.08666", "CorpusId": 251643865}, "corpusId": 251643865, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2b5da9ec9120d72f6d6af2973079763a569b6178", "title": "On an Application of Generative Adversarial Networks on Remaining Lifetime Estimation", "abstract": "A major problem of structural health monitoring (SHM) has been the prognosis of damage and the prediction of the remaining @@ -6370,16 +7458,17 @@ interactions: structures within a population.", "venue": "Proceedings of the 13th International Workshop on Structural Health Monitoring", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Engineering", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2022-03-15", "journal": {"volume": - "abs/2208.08666", "name": "ArXiv"}, "authors": [{"authorId": "2012104962", - "name": "G. Tsialiamanis"}, {"authorId": "65755313", "name": "D. Wagg"}, {"authorId": - "2482415", "name": "N. Dervilis"}, {"authorId": "2103006625", "name": "K. - Worden"}]}, {"paperId": "abca9c129e607943d50c0b51de6024b787218c1d", "externalIds": - {"DOI": "10.1080/02773945.2022.2032814", "CorpusId": 248588479}, "url": "https://www.semanticscholar.org/paper/abca9c129e607943d50c0b51de6024b787218c1d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "external"}, {"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-03-15", "journal": {"volume": "abs/2208.08666", "name": "ArXiv"}, "authors": + [{"authorId": "2012104962", "name": "G. Tsialiamanis"}, {"authorId": "65755313", + "name": "D. Wagg"}, {"authorId": "2482415", "name": "N. Dervilis"}, {"authorId": + "2103006625", "name": "K. Worden"}]}, {"paperId": "abca9c129e607943d50c0b51de6024b787218c1d", + "externalIds": {"DOI": "10.1080/02773945.2022.2032814", "CorpusId": 248588479}, + "corpusId": 248588479, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/abca9c129e607943d50c0b51de6024b787218c1d", "title": "\u201cIt\u2019s Promethean, Man!\u201d: The Frankenstein Myth and Rhetorical Invention", "abstract": "ABSTRACT Frankenstein myths circulate widely in Western culture and offer robust indices of common anxieties about @@ -6392,23 +7481,31 @@ interactions: and autonomy. The essay closes with a discussion of implications and limitations.", "venue": "Rhetoric Society Quarterly", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-03-15", "journal": {"volume": - "52", "pages": "122 - 136", "name": "Rhetoric Society Quarterly"}, "authors": - [{"authorId": "66295572", "name": "R. Terrill"}]}, {"paperId": "5453cfde0a4c29403a3ac7d863904ad33dd3e461", - "externalIds": {"DOI": "10.1007/s11192-022-04327-4", "CorpusId": 247428045}, - "url": "https://www.semanticscholar.org/paper/5453cfde0a4c29403a3ac7d863904ad33dd3e461", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-03-15", "journal": {"volume": "52", "pages": "122 - 136", "name": "Rhetoric + Society Quarterly"}, "authors": [{"authorId": "66295572", "name": "R. Terrill"}]}, + {"paperId": "5453cfde0a4c29403a3ac7d863904ad33dd3e461", "externalIds": {"DBLP": + "journals/scientometrics/SantosM22", "DOI": "10.1007/s11192-022-04327-4", + "CorpusId": 247428045}, "corpusId": 247428045, "publicationVenue": {"id": + "96c1b36d-3833-4ec5-8806-48b8a93f901d", "name": "Scientometrics", "type": + "journal", "issn": "0138-9130", "url": "https://www.springer.com/computer/database+management+&+information+retrieval/journal/11192", + "alternate_urls": ["http://www.springer.com/computer/database+management+%26+information+retrieval/journal/11192", + "https://link.springer.com/journal/11192"]}, "url": "https://www.semanticscholar.org/paper/5453cfde0a4c29403a3ac7d863904ad33dd3e461", "title": "Do papers (really) match journals\u2019 \u201caims and scope\u201d? A computational assessment of innovation studies", "abstract": null, "venue": "Scientometrics", "year": 2022, "referenceCount": 153, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-03-12", "journal": {"volume": - "127", "pages": "7449 - 7470", "name": "Scientometrics"}, "authors": [{"authorId": - "2155617650", "name": "Ana Teresa Santos"}, {"authorId": "114632938", "name": - "S. Mendon\u00e7a"}]}, {"paperId": "842e92b8a17e6fb591e2a28e4660ae1f41561c37", - "externalIds": {"ArXiv": "2203.05875", "DBLP": "journals/corr/abs-2203-05875", - "DOI": "10.48550/arXiv.2203.05875", "CorpusId": 247411482}, "url": "https://www.semanticscholar.org/paper/842e92b8a17e6fb591e2a28e4660ae1f41561c37", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-03-12", "journal": {"volume": "127", "pages": "7449 - 7470", "name": + "Scientometrics"}, "authors": [{"authorId": "2155617650", "name": "Ana Teresa + Santos"}, {"authorId": "114632938", "name": "S. Mendon\u00e7a"}]}, {"paperId": + "842e92b8a17e6fb591e2a28e4660ae1f41561c37", "externalIds": {"ArXiv": "2203.05875", + "DBLP": "journals/corr/abs-2203-05875", "DOI": "10.48550/arXiv.2203.05875", + "CorpusId": 247411482}, "corpusId": 247411482, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/842e92b8a17e6fb591e2a28e4660ae1f41561c37", "title": "Using Word Embeddings to Analyze Protests News", "abstract": "The first two tasks of the CLEF 2019 ProtestNews events focused on distinguishing between protest and non-protest related news articles and sentences in a binary @@ -6425,14 +7522,14 @@ interactions: across different contexts when training on a dataset with Indian news articles and evaluating the models on a dataset with news articles from China.", "venue": "ArXiv", "year": 2022, "referenceCount": 29, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-03-11", "journal": {"volume": "abs/2203.05875", "name": - "ArXiv"}, "authors": [{"authorId": "2158660481", "name": "Maria Alejandra - Cardoza Ceron"}]}, {"paperId": "8454fcc2a0f783ec9668432afda2a69b60b8eb13", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-11", "journal": + {"volume": "abs/2203.05875", "name": "ArXiv"}, "authors": [{"authorId": "2158660481", + "name": "Maria Alejandra Cardoza Ceron"}]}, {"paperId": "8454fcc2a0f783ec9668432afda2a69b60b8eb13", "externalIds": {"DOI": "10.1108/jaoc-08-2020-0107", "CorpusId": 247372282}, - "url": "https://www.semanticscholar.org/paper/8454fcc2a0f783ec9668432afda2a69b60b8eb13", + "corpusId": 247372282, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8454fcc2a0f783ec9668432afda2a69b60b8eb13", "title": "Management accounting and the concepts of exploratory data analysis and unsupervised machine learning: a literature study and future directions", "abstract": "\nPurpose\nThis paper contributes to the literature by discussing @@ -6458,13 +7555,14 @@ interactions: the existing gaps in both education and research and thus making the MA profession future-proof.\n", "venue": "Journal of Accounting & Organizational Change", "year": 2022, "referenceCount": 112, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2022-03-11", "journal": {"name": "Journal of Accounting & Organizational - Change"}, "authors": [{"authorId": "2053600377", "name": "Steen Nielsen"}]}, - {"paperId": "d7ce3e79413de753e95b519750416b7e4ff65e50", "externalIds": {"DOI": - "10.1177/17456916211029942", "CorpusId": 247384096, "PubMed": "35271777"}, - "url": "https://www.semanticscholar.org/paper/d7ce3e79413de753e95b519750416b7e4ff65e50", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2022-03-11", "journal": {"name": "Journal + of Accounting & Organizational Change"}, "authors": [{"authorId": "2053600377", + "name": "Steen Nielsen"}]}, {"paperId": "d7ce3e79413de753e95b519750416b7e4ff65e50", + "externalIds": {"DOI": "10.1177/17456916211029942", "CorpusId": 247384096, + "PubMed": "35271777"}, "corpusId": 247384096, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d7ce3e79413de753e95b519750416b7e4ff65e50", "title": "Where\u2019s My Consciousness-Ometer? How to Test for the Presence and Complexity of Consciousness", "abstract": "Tools and tests for measuring the presence and complexity of consciousness are becoming available, but there @@ -6481,15 +7579,16 @@ interactions: may also be informed by the scientific process.", "venue": "Perspectives on psychological science : a journal of the Association for Psychological Science", "year": 2022, "referenceCount": 110, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-03-10", "journal": {"volume": "17", "pages": "1150 - 1165", "name": - "Perspectives on Psychological Science"}, "authors": [{"authorId": "29376453", - "name": "Tam Hunt"}, {"authorId": "40313342", "name": "M. Ericson"}, {"authorId": - "2809346", "name": "J. Schooler"}]}, {"paperId": "f1d3f2903e7989df6aab3e9c4efb710f098569c5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-03-10", "journal": {"volume": "17", "pages": "1150 + - 1165", "name": "Perspectives on Psychological Science"}, "authors": [{"authorId": + "29376453", "name": "Tam Hunt"}, {"authorId": "40313342", "name": "M. Ericson"}, + {"authorId": "2809346", "name": "J. Schooler"}]}, {"paperId": "f1d3f2903e7989df6aab3e9c4efb710f098569c5", "externalIds": {"PubMedCentral": "8960449", "DOI": "10.3389/fnsys.2022.764708", - "CorpusId": 246900226, "PubMed": "35359623"}, "url": "https://www.semanticscholar.org/paper/f1d3f2903e7989df6aab3e9c4efb710f098569c5", + "CorpusId": 246900226, "PubMed": "35359623"}, "corpusId": 246900226, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f1d3f2903e7989df6aab3e9c4efb710f098569c5", "title": "Integrating Philosophy of Understanding With the Cognitive Sciences", "abstract": "We provide two programmatic frameworks for integrating philosophical research on understanding with complementary work in computer science, psychology, @@ -6500,15 +7599,17 @@ interactions: philosophical theory of understanding is well suited to integrating these explanations in illuminating ways.", "venue": "Frontiers in Systems Neuroscience", "year": 2022, "referenceCount": 214, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-03-10", "journal": {"volume": "16", "name": "Frontiers in Systems Neuroscience"}, - "authors": [{"authorId": "145976229", "name": "Kareem Khalifa"}, {"authorId": - "2154658506", "name": "Farhan Islam"}, {"authorId": "49166079", "name": "J. - P. Gamboa"}, {"authorId": "1941739", "name": "D. Wilkenfeld"}, {"authorId": - "30524584", "name": "Daniel Kosti\u0107"}]}, {"paperId": "8c942836c7963b3d6e19da29618c4a1fdc83fd53", - "externalIds": {"ArXiv": "2203.06249", "CorpusId": 247446612}, "url": "https://www.semanticscholar.org/paper/8c942836c7963b3d6e19da29618c4a1fdc83fd53", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fnsys.2022.764708/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-03-10", "journal": + {"volume": "16", "name": "Frontiers in Systems Neuroscience"}, "authors": + [{"authorId": "145976229", "name": "Kareem Khalifa"}, {"authorId": "2154658506", + "name": "Farhan Islam"}, {"authorId": "49166079", "name": "J. P. Gamboa"}, + {"authorId": "1941739", "name": "D. Wilkenfeld"}, {"authorId": "30524584", + "name": "Daniel Kosti\u0107"}]}, {"paperId": "8c942836c7963b3d6e19da29618c4a1fdc83fd53", + "externalIds": {"ArXiv": "2203.06249", "CorpusId": 247446612}, "corpusId": + 247446612, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8c942836c7963b3d6e19da29618c4a1fdc83fd53", "title": "Information temperature as a measure of DNA''s and texts complexity", "abstract": "C. Shannon introduced the notion of entropy for random sequences. What about their temperature? After discussing some methods for introducing @@ -6518,12 +7619,13 @@ interactions: we discuss the question of whether the temperature can characterize the academic level of the text, or serve as an indicator of the quality of brain activity of the text author.", "venue": "", "year": 2022, "referenceCount": 26, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2022-03-07", "journal": null, "authors": [{"authorId": - "1739383", "name": "O. Usatenko"}]}, {"paperId": "6ab3f4a06efeaa6d402b3a39e39609efaf9759eb", - "externalIds": {"DOI": "10.1002/wcms.1604", "CorpusId": 247349693}, "url": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2022-03-07", "journal": null, + "authors": [{"authorId": "1739383", "name": "O. Usatenko"}]}, {"paperId": + "6ab3f4a06efeaa6d402b3a39e39609efaf9759eb", "externalIds": {"DOI": "10.1002/wcms.1604", + "CorpusId": 247349693}, "corpusId": 247349693, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6ab3f4a06efeaa6d402b3a39e39609efaf9759eb", "title": "Machine intelligence for chemical reaction space", "abstract": "Discovering new reactions, optimizing their performance, and extending the synthetically @@ -6540,32 +7642,56 @@ interactions: and across chemical and pharmaceutical industries. This work will help to clarify the key contributions in the fields and the open challenges that remain to be addressed.", "venue": "WIREs Computational Molecular Science", "year": - 2022, "referenceCount": 200, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-03-07", "journal": {"volume": "12", "name": "Wiley Interdisciplinary - Reviews: Computational Molecular Science"}, "authors": [{"authorId": "1379965853", - "name": "P. Schwaller"}, {"authorId": "3363862", "name": "Alain C. Vaucher"}, - {"authorId": "32427390", "name": "Rub\u00e9n Laplaza"}, {"authorId": "9855096", - "name": "Charlotte Bunne"}, {"authorId": "2054846313", "name": "Andreas Krause"}, - {"authorId": "145154812", "name": "C. Corminboeuf"}, {"authorId": "1864183", - "name": "T. Laino"}]}, {"paperId": "16d852015f99773a3e2e10f2a2d78c1e34cf211a", - "externalIds": {"DOI": "10.1215/9781478022466-006", "CorpusId": 245550461}, - "url": "https://www.semanticscholar.org/paper/16d852015f99773a3e2e10f2a2d78c1e34cf211a", + 2022, "referenceCount": 200, "citationCount": 6, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.research-collection.ethz.ch/bitstream/20.500.11850/537940/2/WIREsComputMolSci-2022-Schwaller-Machineintelligenceforchemicalreactionspace.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-07", + "journal": {"volume": "12", "name": "Wiley Interdisciplinary Reviews: Computational + Molecular Science"}, "authors": [{"authorId": "1379965853", "name": "P. Schwaller"}, + {"authorId": "3363862", "name": "Alain C. Vaucher"}, {"authorId": "32427390", + "name": "Rub\u00e9n Laplaza"}, {"authorId": "9855096", "name": "Charlotte + Bunne"}, {"authorId": "2054846313", "name": "Andreas Krause"}, {"authorId": + "145154812", "name": "C. Corminboeuf"}, {"authorId": "1864183", "name": "T. + Laino"}]}, {"paperId": "16d852015f99773a3e2e10f2a2d78c1e34cf211a", "externalIds": + {"DOI": "10.1215/9781478022466-006", "CorpusId": 245550461}, "corpusId": 245550461, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/16d852015f99773a3e2e10f2a2d78c1e34cf211a", "title": "Conclusion Racist Hate, Racial Profiling, Pok\u00e9mon at Auschwitz", "abstract": null, "venue": "Racist Love", "year": 2022, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-04", - "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": "41be538937951b31e0ada8bdc1e05f71046e108d", - "externalIds": {"DOI": "10.1215/9781478022466-007", "CorpusId": 245560929}, - "url": "https://www.semanticscholar.org/paper/41be538937951b31e0ada8bdc1e05f71046e108d", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-03-04", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": + "41be538937951b31e0ada8bdc1e05f71046e108d", "externalIds": {"DOI": "10.1215/9781478022466-007", + "CorpusId": 245560929}, "corpusId": 245560929, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/41be538937951b31e0ada8bdc1e05f71046e108d", "title": "Notes", "abstract": null, "venue": "Racist Love", "year": 2022, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2022-03-04", "journal": {"name": "Racist Love"}, - "authors": []}, {"paperId": "ef2c984acbae0e8c82c24ae51f2a3abe6e174501", "externalIds": - {"DOI": "10.1080/02560046.2022.2112725", "CorpusId": 251755563}, "url": "https://www.semanticscholar.org/paper/ef2c984acbae0e8c82c24ae51f2a3abe6e174501", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2022-03-04", "journal": + {"name": "Racist Love"}, "authors": []}, {"paperId": "01b015dc22018ded48777f646b900bd8415b5ea8", + "externalIds": {"DOI": "10.1007/s11406-022-00480-5", "CorpusId": 255163487}, + "corpusId": 255163487, "publicationVenue": {"id": "31ff6cd5-6e5d-4776-9a1d-b8ae86f12f11", + "name": "Philosophia", "type": "journal", "alternate_names": ["philoSOPHIA"], + "issn": "0048-3893", "alternate_issns": ["2240-2497", "0031-8000", "1895-9431", + "2155-0905", "1314-5606"], "url": "https://www.springer.com/philosophy/journal/11406", + "alternate_urls": ["https://link.springer.com/journal/11406", "https://www.kul.pl/art_18146.html", + "https://philosophia-bg.com/", "http://muse.jhu.edu/journals/philosophia"]}, + "url": "https://www.semanticscholar.org/paper/01b015dc22018ded48777f646b900bd8415b5ea8", + "title": "The Philosophising Machine \u2013 a Specification of the Turing + Test", "abstract": null, "venue": "Philosophia", "year": 2022, "referenceCount": + 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11406-022-00480-5.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2022-03-04", "journal": {"volume": "50", "pages": "1437 - 1453", "name": + "Philosophia"}, "authors": [{"authorId": "153567892", "name": "A. Schwaninger"}]}, + {"paperId": "ef2c984acbae0e8c82c24ae51f2a3abe6e174501", "externalIds": {"DOI": + "10.1080/02560046.2022.2112725", "CorpusId": 251755563}, "corpusId": 251755563, + "publicationVenue": {"id": "f71c62a1-ae03-4081-a556-062d85b3e296", "name": + "Critical Arts. A Journal for Cultural Studies", "type": "journal", "alternate_names": + ["Crit Art J Cult Stud", "Crit Art", "Critical Arts"], "issn": "0256-0046", + "url": "http://www.tandfonline.com/loi/rcrc20", "alternate_urls": ["http://digital.lib.msu.edu/projects/africanjournals/html/browse.cfm?colid=263"]}, + "url": "https://www.semanticscholar.org/paper/ef2c984acbae0e8c82c24ae51f2a3abe6e174501", "title": "A New Harmonisation of Art and Technology: Philosophic Interpretations of Artificial Intelligence Art", "abstract": "ABSTRACT Artificial intelligence (AI) art is the product of AI technology applied to art. In terms of technical @@ -6587,12 +7713,13 @@ interactions: technology. People should use aesthetic reason to guide AI technology.", "venue": "Critical Arts. A Journal for Cultural Studies", "year": 2022, "referenceCount": 58, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-03-04", "journal": {"volume": - "36", "pages": "110 - 125", "name": "Critical Arts"}, "authors": [{"authorId": - "2064878415", "name": "Feng Tao"}]}, {"paperId": "56469dc69659e8e8eb98da3ab18eb3caa33d63fd", - "externalIds": {"PubMedCentral": "9284358", "DOI": "10.2196/37688", "CorpusId": - 249250203, "PubMed": "35771594"}, "url": "https://www.semanticscholar.org/paper/56469dc69659e8e8eb98da3ab18eb3caa33d63fd", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-03-04", "journal": {"volume": "36", "pages": "110 - 125", "name": "Critical + Arts"}, "authors": [{"authorId": "2064878415", "name": "Feng Tao"}]}, {"paperId": + "56469dc69659e8e8eb98da3ab18eb3caa33d63fd", "externalIds": {"PubMedCentral": + "9284358", "DOI": "10.2196/37688", "CorpusId": 249250203, "PubMed": "35771594"}, + "corpusId": 249250203, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/56469dc69659e8e8eb98da3ab18eb3caa33d63fd", "title": "Caregiver Expectations of Interfacing With Voice Assistants to Support Complex Home Care: Mixed Methods Study", "abstract": "Background Providing care in home environments is complex, and often the pressure is on caregivers @@ -6638,16 +7765,17 @@ interactions: of audio data to improve user experience through context-specific interactions are critical design considerations that should be further examined.", "venue": "JMIR human factors", "year": 2022, "referenceCount": 68, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-03-03", "journal": {"volume": "9", "name": "JMIR Human Factors"}, "authors": - [{"authorId": "1947423581", "name": "R. Tennant"}, {"authorId": "2137792425", - "name": "S. Allana"}, {"authorId": "39162813", "name": "Karen Mercer"}, {"authorId": - "145082763", "name": "C. Burns"}]}, {"paperId": "940c97e9a2f50dacccc244440cc6aa474c85c0e2", - "externalIds": {"DOI": "10.12775/setf.2022.008", "CorpusId": 247309553}, "url": - "https://www.semanticscholar.org/paper/940c97e9a2f50dacccc244440cc6aa474c85c0e2", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-03-03", "journal": {"volume": + "9", "name": "JMIR Human Factors"}, "authors": [{"authorId": "1947423581", + "name": "R. Tennant"}, {"authorId": "2137792425", "name": "S. Allana"}, {"authorId": + "39162813", "name": "Karen Mercer"}, {"authorId": "145082763", "name": "C. + Burns"}]}, {"paperId": "940c97e9a2f50dacccc244440cc6aa474c85c0e2", "externalIds": + {"DOI": "10.12775/setf.2022.008", "CorpusId": 247309553}, "corpusId": 247309553, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/940c97e9a2f50dacccc244440cc6aa474c85c0e2", "title": "From Absolute Mind to Zombie: Is Artificial Intelligence Possible?", "abstract": "The dream of achieving artificial intelligence (AI) and, in particular, artificial consciousness (\u2018strong AI\u2019), is reflected in mythologies @@ -6664,24 +7792,30 @@ interactions: of reality, postulating mind as participation in Absolute Mind, I attempt a convergence of these debates, rejecting the possibility of strong AI.", "venue": "Scientia et Fides", "year": 2022, "referenceCount": 60, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-03-03", "journal": {"name": - "Scientia et Fides"}, "authors": [{"authorId": "134363160", "name": "M. Bilagher"}]}, - {"paperId": "94044139e9c77b5d1e9cfa2dd2326db8d2966c7e", "externalIds": {"PubMedCentral": - "8892409", "DOI": "10.1007/s44163-022-00019-3", "CorpusId": 247235946}, "url": - "https://www.semanticscholar.org/paper/94044139e9c77b5d1e9cfa2dd2326db8d2966c7e", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://apcz.umk.pl/SetF/article/download/29708/31750", "status": null}, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-03", + "journal": {"name": "Scientia et Fides"}, "authors": [{"authorId": "134363160", + "name": "M. Bilagher"}]}, {"paperId": "94044139e9c77b5d1e9cfa2dd2326db8d2966c7e", + "externalIds": {"PubMedCentral": "8892409", "DOI": "10.1007/s44163-022-00019-3", + "CorpusId": 247235946}, "corpusId": 247235946, "publicationVenue": {"id": + "dda0a41e-efcd-40e6-87f7-a663355aceb3", "name": "Discover Artificial Intelligence", + "type": "journal", "alternate_names": ["Discov Artif Intell"], "issn": "2731-0809", + "url": "https://www.springer.com/journal/44163"}, "url": "https://www.semanticscholar.org/paper/94044139e9c77b5d1e9cfa2dd2326db8d2966c7e", "title": "Reflections on the human role in AI policy formulations: how do national AI strategies view people?", "abstract": null, "venue": "Discover Artificial Intelligence", "year": 2022, "referenceCount": 148, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-03-03", "journal": {"volume": - "2", "name": "Discover Artificial Intelligence"}, "authors": [{"authorId": - "2102881731", "name": "Henrikki Salo-P\u00f6ntinen"}, {"authorId": "2748954", - "name": "P. Saariluoma"}]}, {"paperId": "9ce68b44f77058022e6aac3fbf6eeba09283c594", + 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s44163-022-00019-3.pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-03", + "journal": {"volume": "2", "name": "Discover Artificial Intelligence"}, "authors": + [{"authorId": "2102881731", "name": "Henrikki Salo-P\u00f6ntinen"}, {"authorId": + "2748954", "name": "P. Saariluoma"}]}, {"paperId": "9ce68b44f77058022e6aac3fbf6eeba09283c594", "externalIds": {"DBLP": "conf/cacml/Lyu22", "DOI": "10.1109/CACML55074.2022.00054", - "CorpusId": 251705017}, "url": "https://www.semanticscholar.org/paper/9ce68b44f77058022e6aac3fbf6eeba09283c594", + "CorpusId": 251705017}, "corpusId": 251705017, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9ce68b44f77058022e6aac3fbf6eeba09283c594", "title": "Cryptocurrency Price forecasting: A Comparative Study of Machine Learning Model in Short-Term Trading", "abstract": "In recent years, the expansion of the cryptocurrency market has received significant attention among investors, @@ -6706,20 +7840,21 @@ interactions: help anticipate the short-term evolutions of the cryptocurrency market.", "venue": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2022-03-01", "journal": {"pages": "280-288", - "name": "2022 Asia Conference on Algorithms, Computing and Machine Learning - (CACML)"}, "authors": [{"authorId": "2064467009", "name": "Haoran Lyu"}]}, - {"paperId": "34ff69039c4e3ebff47f196d4cd4e3a5cd483645", "externalIds": {"DOI": - "10.1016/j.hfc.2021.11.005", "CorpusId": 247275173, "PubMed": "35341542"}, - "url": "https://www.semanticscholar.org/paper/34ff69039c4e3ebff47f196d4cd4e3a5cd483645", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2022-03-01", + "journal": {"pages": "280-288", "name": "2022 Asia Conference on Algorithms, + Computing and Machine Learning (CACML)"}, "authors": [{"authorId": "2064467009", + "name": "Haoran Lyu"}]}, {"paperId": "34ff69039c4e3ebff47f196d4cd4e3a5cd483645", + "externalIds": {"DOI": "10.1016/j.hfc.2021.11.005", "CorpusId": 247275173, + "PubMed": "35341542"}, "corpusId": 247275173, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/34ff69039c4e3ebff47f196d4cd4e3a5cd483645", "title": "Artificial Intelligence and Mechanical Circulatory Support.", "abstract": null, "venue": "Heart failure clinics", "year": 2022, "referenceCount": 65, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-03-01", "journal": {"volume": "18 2", "pages": "\n 301-309\n ", "name": "Heart failure clinics"}, @@ -6727,28 +7862,38 @@ interactions: "name": "G. Hickey"}, {"authorId": "2157653417", "name": "Matthew M. Lander"}, {"authorId": "4347981", "name": "M. Kanwar"}]}, {"paperId": "303e42ca7e116cfc183249c0f49dd978b083f813", "externalIds": {"DOI": "10.1016/j.autcon.2021.104110", "CorpusId": 246521847}, - "url": "https://www.semanticscholar.org/paper/303e42ca7e116cfc183249c0f49dd978b083f813", + "corpusId": 246521847, "publicationVenue": {"id": "cbe2e2e0-f4d3-4923-8b48-a02259e5f89c", + "name": "Automation in Construction", "type": "journal", "alternate_names": + ["Autom Constr"], "issn": "0926-5805", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/523112/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/09265805", + "https://www.journals.elsevier.com/automation-in-construction"]}, "url": "https://www.semanticscholar.org/paper/303e42ca7e116cfc183249c0f49dd978b083f813", "title": "Semantic segmentation of cracks: Data challenges and architecture", "abstract": null, "venue": "Automation in Construction", "year": 2022, "referenceCount": - 51, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-01", - "journal": {"name": "Automation in Construction"}, "authors": [{"authorId": - "2152458893", "name": "Fabio Panella"}, {"authorId": "1850020", "name": "Aldo - Lipani"}, {"authorId": "36751418", "name": "Jan Boehm"}]}, {"paperId": "4a0263ecb3df0ec7a0232e422c4c10aa31bbf526", - "externalIds": {"DOI": "10.1016/j.techfore.2021.121431", "CorpusId": 245159982}, - "url": "https://www.semanticscholar.org/paper/4a0263ecb3df0ec7a0232e422c4c10aa31bbf526", + 51, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2022-03-01", "journal": {"name": "Automation in Construction"}, + "authors": [{"authorId": "2152458893", "name": "Fabio Panella"}, {"authorId": + "1850020", "name": "Aldo Lipani"}, {"authorId": "36751418", "name": "Jan Boehm"}]}, + {"paperId": "4a0263ecb3df0ec7a0232e422c4c10aa31bbf526", "externalIds": {"DOI": + "10.1016/j.techfore.2021.121431", "CorpusId": 245159982}, "corpusId": 245159982, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4a0263ecb3df0ec7a0232e422c4c10aa31bbf526", "title": "A systematic idea generation approach for developing a new technology: Application of a socio-technical transition system", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2022, "referenceCount": 53, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-01", - "journal": {"name": "Technological Forecasting and Social Change"}, "authors": - [{"authorId": "9142600", "name": "Keeeun Lee"}, {"authorId": "2109591986", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-03-01", "journal": {"name": "Technological Forecasting and Social Change"}, + "authors": [{"authorId": "9142600", "name": "Keeeun Lee"}, {"authorId": "2109591986", "name": "Sunhye Kim"}, {"authorId": "38717655", "name": "B. Yoon"}]}, {"paperId": "ca6cbcb0caa5b26da011a56170ebfd2f17613e3e", "externalIds": {"DOI": "10.33425/2641-4317.1121", - "CorpusId": 247944559}, "url": "https://www.semanticscholar.org/paper/ca6cbcb0caa5b26da011a56170ebfd2f17613e3e", + "CorpusId": 247944559}, "corpusId": 247944559, "publicationVenue": {"id": + "856ac6ff-9b62-4c9e-a752-0e5e67b1e0b8", "name": "International Journal of + Psychiatry Research", "type": "journal", "alternate_names": ["Int J Psychiatry + Res", "Int j psychiatry res", "International journal of psychiatry research"], + "issn": "2641-4317", "alternate_issns": ["2664-8962"], "url": "http://www.scivisionpub.com/journals/archive-international-journal-of-psychiatry-research", + "alternate_urls": ["http://www.psychiatryjournal.in/"]}, "url": "https://www.semanticscholar.org/paper/ca6cbcb0caa5b26da011a56170ebfd2f17613e3e", "title": "The Dimension of Neural Memory and Consciousness", "abstract": "The mental dimension is an experiential state achieved by neural circuits, that cannot be measured by physical means but that nonetheless affects the behavior @@ -6774,13 +7919,14 @@ interactions: and memory are linked facets of the psychic dimension of consciousness, encoded and decoded by the biochemically active neural net.", "venue": "International Journal of Psychiatry Research", "year": 2022, "referenceCount": 65, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-02-28", "journal": {"name": - "International Journal of Psychiatry Research"}, "authors": [{"authorId": - "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", "name": "C. Gilon"}]}, - {"paperId": "ad14f287d637458e9f4994870468177cd1dfd140", "externalIds": {"DOI": - "10.33425/2641-4317.1125", "CorpusId": 253339168}, "url": "https://www.semanticscholar.org/paper/ad14f287d637458e9f4994870468177cd1dfd140", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-28", + "journal": {"name": "International Journal of Psychiatry Research"}, "authors": + [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", + "name": "C. Gilon"}]}, {"paperId": "ad14f287d637458e9f4994870468177cd1dfd140", + "externalIds": {"DOI": "10.33425/2641-4317.1125", "CorpusId": 253339168}, + "corpusId": 253339168, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad14f287d637458e9f4994870468177cd1dfd140", "title": "A Critique of the Atkinson-Shiffrin (As) Mathematical Model of Human Memory", "abstract": "Emotions are the anchoring experiences on which psychology is aimed. The challenge of neuroscientists is to clarify how neural nets generate @@ -6808,13 +7954,14 @@ interactions: the Atkinson-Shiffin approach, we opine: Emotions exceed the grasp of mathematics.", "venue": "International Journal of Psychiatry Research", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-28", - "journal": {"name": "International Journal of Psychiatry Research"}, "authors": - [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", - "name": "C. Gilon"}]}, {"paperId": "06ef1f9e1a760df942548ab38ea7e49e6145c6bd", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-02-28", "journal": {"name": "International Journal of Psychiatry Research"}, + "authors": [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": + "5530455", "name": "C. Gilon"}]}, {"paperId": "06ef1f9e1a760df942548ab38ea7e49e6145c6bd", "externalIds": {"ArXiv": "2202.12678", "DBLP": "journals/corr/abs-2202-12678", - "CorpusId": 247154684}, "url": "https://www.semanticscholar.org/paper/06ef1f9e1a760df942548ab38ea7e49e6145c6bd", + "CorpusId": 247154684}, "corpusId": 247154684, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/06ef1f9e1a760df942548ab38ea7e49e6145c6bd", "title": "Deep Learning, Natural Language Processing, and Explainable Artificial Intelligence in the Biomedical Domain", "abstract": "\u2013 In this article, we first give an introduction to artificial intelligence and its applications @@ -6918,14 +8065,15 @@ interactions: Applications of AI systems in biomedical and clinical text processing is extensively discussed in Section 3.3.", "venue": "ArXiv", "year": 2022, "referenceCount": 130, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-02-25", "journal": {"volume": "abs/2202.12678", "name": "ArXiv"}, "authors": - [{"authorId": "144334436", "name": "M. Moradi"}, {"authorId": "3004898", "name": - "M. Samwald"}]}, {"paperId": "6847e2ba6796b8a786b3b6d8d8a2d922a6c7c31d", "externalIds": - {"DBLP": "conf/iclr/MouselinosMM22", "ArXiv": "2202.12162", "CorpusId": 247083956}, - "url": "https://www.semanticscholar.org/paper/6847e2ba6796b8a786b3b6d8d8a2d922a6c7c31d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-02-25", "journal": {"volume": "abs/2202.12678", "name": + "ArXiv"}, "authors": [{"authorId": "144334436", "name": "M. Moradi"}, {"authorId": + "3004898", "name": "M. Samwald"}]}, {"paperId": "6847e2ba6796b8a786b3b6d8d8a2d922a6c7c31d", + "externalIds": {"DBLP": "conf/iclr/MouselinosMM22", "ArXiv": "2202.12162", + "CorpusId": 247083956}, "corpusId": 247083956, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6847e2ba6796b8a786b3b6d8d8a2d922a6c7c31d", "title": "Measuring CLEVRness: Blackbox testing of Visual Reasoning Models", "abstract": "How can we measure the reasoning capabilities of intelligence systems? Visual question answering provides a convenient framework for testing @@ -6944,15 +8092,33 @@ interactions: we also propose a controlled experiment measuring the efficiency of such models to learn and perform reasoning.", "venue": "ICLR", "year": 2022, "referenceCount": 64, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-02-24", "journal": {"volume": "abs/2202.12162", "name": + "ArXiv"}, "authors": [{"authorId": "148099243", "name": "Spyridon Mouselinos"}, + {"authorId": "47407464", "name": "H. Michalewski"}, {"authorId": "145478807", + "name": "Mateusz Malinowski"}]}, {"paperId": "e5c5cdcc97ea74719df2f9107f01c2edf88584b5", + "externalIds": {"DBLP": "journals/mta/GaoD22", "DOI": "10.1007/s11042-022-12208-4", + "CorpusId": 247100623}, "corpusId": 247100623, "publicationVenue": {"id": + "477368e9-7a8e-475a-8c93-6d623797fd06", "name": "Multimedia tools and applications", + "type": "journal", "alternate_names": ["Multimedia Tools and Applications", + "Multimedia Tool Appl", "Multimedia tool appl"], "issn": "1380-7501", "url": + "https://www.springer.com/computer/information+systems+and+applications/journal/11042", + "alternate_urls": ["https://link.springer.com/journal/11042"]}, "url": "https://www.semanticscholar.org/paper/e5c5cdcc97ea74719df2f9107f01c2edf88584b5", + "title": "The research landscape on the artificial intelligence: a bibliometric + analysis of recent 20 years", "abstract": null, "venue": "Multimedia tools + and applications", "year": 2022, "referenceCount": 42, "citationCount": 2, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-02-24", "journal": {"volume": "abs/2202.12162", "name": "ArXiv"}, "authors": - [{"authorId": "148099243", "name": "Spyridon Mouselinos"}, {"authorId": "47407464", - "name": "H. Michalewski"}, {"authorId": "145478807", "name": "Mateusz Malinowski"}]}, + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2022-02-23", "journal": {"volume": "81", "pages": "12973 - 13001", "name": + "Multimedia Tools and Applications"}, "authors": [{"authorId": "12210820", + "name": "Hui-jie Gao"}, {"authorId": "2117433643", "name": "Xiuhao Ding"}]}, {"paperId": "7ecfd7ec0efe3c39bab4b29e616691ff736babc0", "externalIds": {"DBLP": "journals/corr/abs-2202-11766", "ArXiv": "2202.11766", "CorpusId": 247084129}, - "url": "https://www.semanticscholar.org/paper/7ecfd7ec0efe3c39bab4b29e616691ff736babc0", + "corpusId": 247084129, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7ecfd7ec0efe3c39bab4b29e616691ff736babc0", "title": "A gentle introduction to Quantum Natural Language Processing", "abstract": "The main goal of this master\u2019s thesis is to introduce Quantum Natural Language Processing (QNLP) in a way understandable by both the NLP engineer @@ -6991,15 +8157,20 @@ interactions: is predictable from ones of its parts. The model we introduce to account for those, while being simplistic, is a promising implementation.", "venue": "ArXiv", "year": 2022, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2022-02-23", "journal": {"volume": "abs/2202.11766", - "name": "ArXiv"}, "authors": [{"authorId": "2156125676", "name": "Shervin - Le Du"}, {"authorId": "2156116949", "name": "Senaida Hern\u00e1ndez Santana"}, - {"authorId": "33233654", "name": "G. Scarpa"}]}, {"paperId": "1f0cb95449984a4346e2a3deca0370cc74cba470", - "externalIds": {"DBLP": "journals/corr/abs-2202-13073", "ArXiv": "2202.13073", - "DOI": "10.1109/TPAMI.2022.3153312", "CorpusId": 247083637, "PubMed": "35196228"}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-23", + "journal": {"volume": "abs/2202.11766", "name": "ArXiv"}, "authors": [{"authorId": + "2156125676", "name": "Shervin Le Du"}, {"authorId": "2156116949", "name": + "Senaida Hern\u00e1ndez Santana"}, {"authorId": "33233654", "name": "G. Scarpa"}]}, + {"paperId": "1f0cb95449984a4346e2a3deca0370cc74cba470", "externalIds": {"DBLP": + "journals/corr/abs-2202-13073", "ArXiv": "2202.13073", "DOI": "10.1109/TPAMI.2022.3153312", + "CorpusId": 247083637, "PubMed": "35196228"}, "corpusId": 247083637, "publicationVenue": + {"id": "25248f80-fe99-48e5-9b8e-9baef3b8e23b", "name": "IEEE Transactions + on Pattern Analysis and Machine Intelligence", "type": "journal", "alternate_names": + ["IEEE Trans Pattern Anal Mach Intell"], "issn": "0162-8828", "url": "http://www.computer.org/tpami/", + "alternate_urls": ["http://www.computer.org/portal/web/tpami", "http://ieeexplore.ieee.org/servlet/opac?punumber=34"]}, "url": "https://www.semanticscholar.org/paper/1f0cb95449984a4346e2a3deca0370cc74cba470", "title": "Global Instance Tracking: Locating Target More Like Humans", "abstract": "Target tracking, the essential ability of the human visual system, has been @@ -7022,7 +8193,8 @@ interactions: The database, toolkit, evaluation server, and baseline results are available at http://videocube.aitestunion.com.", "venue": "IEEE Transactions on Pattern Analysis and Machine Intelligence", "year": 2022, "referenceCount": 72, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/2202.13073", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -7032,18 +8204,20 @@ interactions: "name": "Xin Zhao"}, {"authorId": "2109047017", "name": "Lianghua Huang"}, {"authorId": "2887871", "name": "Kaiqi Huang"}]}, {"paperId": "01fdf11285bfe021eccc0a9926fa4ff3bea2fe34", "externalIds": {"DOI": "10.1016/j.conb.2022.01.002", "CorpusId": 247028414, - "PubMed": "35217311"}, "url": "https://www.semanticscholar.org/paper/01fdf11285bfe021eccc0a9926fa4ff3bea2fe34", + "PubMed": "35217311"}, "corpusId": 247028414, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/01fdf11285bfe021eccc0a9926fa4ff3bea2fe34", "title": "A dynamical systems view of neuroethology: Uncovering stateful computation in natural behaviors", "abstract": null, "venue": "Current Opinion in Neurobiology", "year": 2022, "referenceCount": 112, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": - "2022-02-22", "journal": {"volume": "73", "name": "Current Opinion in Neurobiology"}, - "authors": [{"authorId": "36531793", "name": "Drew N. Robson"}, {"authorId": - "2109008396", "name": "Jennifer M. Li"}]}, {"paperId": "96dc56ee1f6c2b08a4395221a0ad0e7fa11c12b7", - "externalIds": {"DOI": "10.3389/fhumd.2022.703879", "CorpusId": 247012949}, - "url": "https://www.semanticscholar.org/paper/96dc56ee1f6c2b08a4395221a0ad0e7fa11c12b7", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + "publicationDate": "2022-02-22", "journal": {"volume": "73", "name": "Current + Opinion in Neurobiology"}, "authors": [{"authorId": "36531793", "name": "Drew + N. Robson"}, {"authorId": "2109008396", "name": "Jennifer M. Li"}]}, {"paperId": + "96dc56ee1f6c2b08a4395221a0ad0e7fa11c12b7", "externalIds": {"DOI": "10.3389/fhumd.2022.703879", + "CorpusId": 247012949}, "corpusId": 247012949, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/96dc56ee1f6c2b08a4395221a0ad0e7fa11c12b7", "title": "Almost Alive: Robots and Androids", "abstract": "Life-likeness is a property that can be used both to deceive people that a robot is more intelligent than it is or to facilitate the natural communication with humans. Over the @@ -7064,13 +8238,15 @@ interactions: while still looking decidedly robotic, thus exploiting the our ability to understand the behaviors of other people based on their movements.", "venue": "Frontiers in Human Dynamics", "year": 2022, "referenceCount": 52, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-02-22", "journal": {"volume": - "4"}, "authors": [{"authorId": "1732218", "name": "C. Balkenius"}, {"authorId": - "2038545202", "name": "B. Johansson"}]}, {"paperId": "2397a3906128f40422663ebb4e8df948d4ee6258", - "externalIds": {"DBLP": "journals/fi/ZubaniSSPGC22", "DOI": "10.3390/fi14020062", - "CorpusId": 247044369}, "url": "https://www.semanticscholar.org/paper/2397a3906128f40422663ebb4e8df948d4ee6258", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fhumd.2022.703879/pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-22", + "journal": {"volume": "4"}, "authors": [{"authorId": "1732218", "name": "C. + Balkenius"}, {"authorId": "2038545202", "name": "B. Johansson"}]}, {"paperId": + "2397a3906128f40422663ebb4e8df948d4ee6258", "externalIds": {"DBLP": "journals/fi/ZubaniSSPGC22", + "DOI": "10.3390/fi14020062", "CorpusId": 247044369}, "corpusId": 247044369, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2397a3906128f40422663ebb4e8df948d4ee6258", "title": "A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform", "abstract": "During the COVID-19 pandemic, the corporate online training sector has increased @@ -7092,17 +8268,19 @@ interactions: chatbot is currently in production, therefore we present a description of the system implemented and its results on the original users\u2019 requests.", "venue": "Future Internet", "year": 2022, "referenceCount": 15, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-02-18", "journal": {"volume": "14", "pages": "62", - "name": "Future Internet"}, "authors": [{"authorId": "2008158857", "name": - "Matteo Zubani"}, {"authorId": "2008170937", "name": "Luca Sigalini"}, {"authorId": - "1801054", "name": "I. Serina"}, {"authorId": "1397316855", "name": "Luca - Putelli"}, {"authorId": "2633661", "name": "A. Gerevini"}, {"authorId": "151108632", - "name": "Mattia Chiari"}]}, {"paperId": "a8aa76aba3fc48369dece43613ec34025c787fb2", - "externalIds": {"DOI": "10.1177/00219983211037048", "CorpusId": 246982788}, - "url": "https://www.semanticscholar.org/paper/a8aa76aba3fc48369dece43613ec34025c787fb2", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/1999-5903/14/2/62/pdf?version=1645173886", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-18", "journal": + {"volume": "14", "pages": "62", "name": "Future Internet"}, "authors": [{"authorId": + "2008158857", "name": "Matteo Zubani"}, {"authorId": "2008170937", "name": + "Luca Sigalini"}, {"authorId": "1801054", "name": "I. Serina"}, {"authorId": + "1397316855", "name": "Luca Putelli"}, {"authorId": "2633661", "name": "A. + Gerevini"}, {"authorId": "151108632", "name": "Mattia Chiari"}]}, {"paperId": + "a8aa76aba3fc48369dece43613ec34025c787fb2", "externalIds": {"DOI": "10.1177/00219983211037048", + "CorpusId": 246982788}, "corpusId": 246982788, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a8aa76aba3fc48369dece43613ec34025c787fb2", "title": "The intersection of damage evaluation of fiber-reinforced composite materials with machine learning: A review", "abstract": "Machine learning (ML) has emerged as a useful predictive tool based on mathematical and statistical @@ -7133,14 +8311,15 @@ interactions: viability for future applications, especially in industrial environments, to minimize costs and improve damage detection rates.", "venue": "Journal of Composite Materials", "year": 2022, "referenceCount": 205, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2022-02-18", "journal": - {"volume": "56", "pages": "1417 - 1452", "name": "Journal of Composite Materials"}, - "authors": [{"authorId": "2037185590", "name": "Christopher Nelon"}, {"authorId": - "49999858", "name": "O. Myers"}, {"authorId": "38374750", "name": "A. Hall"}]}, - {"paperId": "dd7f2ea24a30ea75fc19d6313566451ab4161e0c", "externalIds": {"DOI": - "10.24018/ejai.2022.1.1.2", "CorpusId": 247537879}, "url": "https://www.semanticscholar.org/paper/dd7f2ea24a30ea75fc19d6313566451ab4161e0c", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2022-02-18", "journal": {"volume": "56", "pages": "1417 - 1452", "name": + "Journal of Composite Materials"}, "authors": [{"authorId": "2037185590", + "name": "Christopher Nelon"}, {"authorId": "49999858", "name": "O. Myers"}, + {"authorId": "38374750", "name": "A. Hall"}]}, {"paperId": "dd7f2ea24a30ea75fc19d6313566451ab4161e0c", + "externalIds": {"DOI": "10.24018/ejai.2022.1.1.2", "CorpusId": 247537879}, + "corpusId": 247537879, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dd7f2ea24a30ea75fc19d6313566451ab4161e0c", "title": "The Theory of Natural-Artificial Intelligence", "abstract": "In recent times, mankind is seeking for certain peculiar solutions to multiple facets containing an identically very fundamental philosophy i.e., certainly @@ -7162,13 +8341,15 @@ interactions: be shown mathematically herewith as identifications that make each other separate and clear to persuade.", "venue": "European Journal of Artificial Intelligence and Machine Learning", "year": 2022, "referenceCount": 4, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-02-15", "journal": {"name": - "European Journal of Artificial Intelligence and Machine Learning"}, "authors": - [{"authorId": "2159281358", "name": "Dev Arastu Panchariya"}]}, {"paperId": - "9f852e90e082adeff13aa6a72436dad0447726f9", "externalIds": {"DOI": "10.3390/h11010027", - "CorpusId": 246883046}, "url": "https://www.semanticscholar.org/paper/9f852e90e082adeff13aa6a72436dad0447726f9", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://ej-ai.org/index.php/ejai/article/download/2/1", "status": null}, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-15", + "journal": {"name": "European Journal of Artificial Intelligence and Machine + Learning"}, "authors": [{"authorId": "2159281358", "name": "Dev Arastu Panchariya"}]}, + {"paperId": "9f852e90e082adeff13aa6a72436dad0447726f9", "externalIds": {"DOI": + "10.3390/h11010027", "CorpusId": 246883046}, "corpusId": 246883046, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9f852e90e082adeff13aa6a72436dad0447726f9", "title": "Transhumanities as the Pinnacle and a Bridge", "abstract": "Transhumanities are designed as a multidisciplinary approach that transcends the limitations not only of specific disciplines, but also of the human species; these are @@ -7181,26 +8362,35 @@ interactions: that the task requires, among other components, inculcating the core of the Humanities into advanced AI.", "venue": "Humanities", "year": 2022, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2022-02-14", "journal": {"name": "Humanities"}, - "authors": [{"authorId": "51986819", "name": "P. Boltuc"}]}, {"paperId": "4560e29308b732cb8635e2fe7a048af0f867da29", - "externalIds": {"PubMedCentral": "8853037", "DOI": "10.1007/s00399-022-00839-x", - "CorpusId": 246704898, "PubMed": "35147766"}, "url": "https://www.semanticscholar.org/paper/4560e29308b732cb8635e2fe7a048af0f867da29", + "openAccessPdf": {"url": "https://www.mdpi.com/2076-0787/11/1/27/pdf?version=1645005095", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2022-02-14", "journal": {"name": + "Humanities"}, "authors": [{"authorId": "51986819", "name": "P. Boltuc"}]}, + {"paperId": "4560e29308b732cb8635e2fe7a048af0f867da29", "externalIds": {"PubMedCentral": + "8853037", "DOI": "10.1007/s00399-022-00839-x", "CorpusId": 246704898, "PubMed": + "35147766"}, "corpusId": 246704898, "publicationVenue": {"id": "b35b1118-e040-4b7d-b786-86de0f8a5269", + "name": "Herzschrittmachertherapie & Elektrophysiologie", "type": "journal", + "alternate_names": ["Herzschrittmachertherapie Elektrophysiologie", "Herzschrittmachertherapie Elektrophysiologie", + "Herzschrittmachertherapie Und Elektrophysiologie"], "issn": "0938-7412", + "url": "http://www.springer.com/sgw/cda/frontpage/0,11855,1-0-70-1103367-0,00.html?referer=www.springer.com/de/journal/00399/submission", + "alternate_urls": ["https://link.springer.com/journal/399"]}, "url": "https://www.semanticscholar.org/paper/4560e29308b732cb8635e2fe7a048af0f867da29", "title": "Artificial intelligence for the detection, prediction, and management of atrial fibrillation", "abstract": null, "venue": "Herzschrittmachertherapie & Elektrophysiologie", "year": 2022, "referenceCount": 93, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2022-02-11", "journal": {"volume": "33", "pages": "34 - - 41", "name": "Herzschrittmachertherapie & Elektrophysiologie"}, "authors": - [{"authorId": "3404266", "name": "J. Isaksen"}, {"authorId": "2060528225", - "name": "M. Baumert"}, {"authorId": "1471809173", "name": "A. Hermans"}, {"authorId": - "2153987293", "name": "Molly Maleckar"}, {"authorId": "2059599534", "name": - "D. Linz"}]}, {"paperId": "d7d632742345d16145dec4ea78746b1ca237892f", "externalIds": - {"DBLP": "journals/intpolrev/WhiteK22", "DOI": "10.14763/2022.1.1618", "CorpusId": - 246912761}, "url": "https://www.semanticscholar.org/paper/d7d632742345d16145dec4ea78746b1ca237892f", + 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s00399-022-00839-x.pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-02-11", + "journal": {"volume": "33", "pages": "34 - 41", "name": "Herzschrittmachertherapie + & Elektrophysiologie"}, "authors": [{"authorId": "3404266", "name": "J. Isaksen"}, + {"authorId": "2060528225", "name": "M. Baumert"}, {"authorId": "1471809173", + "name": "A. Hermans"}, {"authorId": "2153987293", "name": "Molly Maleckar"}, + {"authorId": "2059599534", "name": "D. Linz"}]}, {"paperId": "d7d632742345d16145dec4ea78746b1ca237892f", + "externalIds": {"DBLP": "journals/intpolrev/WhiteK22", "DOI": "10.14763/2022.1.1618", + "CorpusId": 246912761}, "corpusId": 246912761, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d7d632742345d16145dec4ea78746b1ca237892f", "title": "Artificial emotional intelligence beyond East and West", "abstract": "Artificial emotional intelligence refers to technologies that perform, recognise, or record affective states. More than merely a technological function, however, @@ -7217,36 +8407,41 @@ interactions: article belongs to Concepts of the digital society, a special section of Internet Policy Review guest-edited by Christian Katzenbach and Thomas Christian B\u00e4chle.", "venue": "Internet Policy Rev.", "year": 2022, "referenceCount": 61, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2022-02-11", "journal": - {"volume": "11", "name": "Internet Policy Rev."}, "authors": [{"authorId": + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://policyreview.info/pdf/policyreview-2022-1-1618.pdf", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-11", + "journal": {"volume": "11", "name": "Internet Policy Rev."}, "authors": [{"authorId": "2089916899", "name": "Daniel White"}, {"authorId": "3193976", "name": "H. Katsuno"}]}, {"paperId": "bb2d531b406f5662aac2266da13aa27020742048", "externalIds": - {"DOI": "10.1002/9781119769026.ch7", "CorpusId": 246789940}, "url": "https://www.semanticscholar.org/paper/bb2d531b406f5662aac2266da13aa27020742048", + {"DOI": "10.1002/9781119769026.ch7", "CorpusId": 246789940}, "corpusId": 246789940, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb2d531b406f5662aac2266da13aa27020742048", "title": "An Overview of IoT and Its Application With Machine Learning in Data Center", "abstract": null, "venue": "The Industrial Internet of Things (IIoT)", "year": 2022, "referenceCount": 8, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2022-02-11", "journal": {"name": "The Industrial Internet - of Things (IIoT)"}, "authors": [{"authorId": "1492130133", "name": "Manikandan - Ramanathan"}, {"authorId": "1492130164", "name": "K. Narayanan"}]}, {"paperId": - "09a4a8e3cf6b2454492f12cdb671cda0571249e8", "externalIds": {"DOI": "10.35830/cn.vi83.578", - "CorpusId": 246801036}, "url": "https://www.semanticscholar.org/paper/09a4a8e3cf6b2454492f12cdb671cda0571249e8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2022-02-11", "journal": {"name": "The Industrial + Internet of Things (IIoT)"}, "authors": [{"authorId": "1492130133", "name": + "Manikandan Ramanathan"}, {"authorId": "1492130164", "name": "K. Narayanan"}]}, + {"paperId": "09a4a8e3cf6b2454492f12cdb671cda0571249e8", "externalIds": {"DOI": + "10.35830/cn.vi83.578", "CorpusId": 246801036}, "corpusId": 246801036, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/09a4a8e3cf6b2454492f12cdb671cda0571249e8", "title": "A philosophical look at mathematics and related sciences from the beginning to the future", "abstract": "Landmarks in mathematical sciences and its philosophical consequences\u00a0are presented in a generally understandable and partly speculative way\u00a0by following the achievements of famous protagonists.\u00a0From observing the past, a conjecture for the future is deduced.\u00a0", "venue": "Ciencia Nicolaita", "year": 2022, "referenceCount": 42, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-02-11", "journal": {"name": - "Ciencia Nicolaita"}, "authors": [{"authorId": "143985332", "name": "E. Wagner"}]}, - {"paperId": "0f6c1bf895914f87f9bccaaa1d9614aa244e522c", "externalIds": {"DOI": - "10.1080/02604027.2022.2028539", "CorpusId": 246735117}, "url": "https://www.semanticscholar.org/paper/0f6c1bf895914f87f9bccaaa1d9614aa244e522c", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.cic.cn.umich.mx/cn/article/download/578/425", "status": null}, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-11", + "journal": {"name": "Ciencia Nicolaita"}, "authors": [{"authorId": "143985332", + "name": "E. Wagner"}]}, {"paperId": "0f6c1bf895914f87f9bccaaa1d9614aa244e522c", + "externalIds": {"DOI": "10.1080/02604027.2022.2028539", "CorpusId": 246735117}, + "corpusId": 246735117, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f6c1bf895914f87f9bccaaa1d9614aa244e522c", "title": "The Digital Mockingbird: Anthropological Transformation and the \u201cNew\u201d Nature", "abstract": "Abstract Within a world-system characterized by processes and dynamics whose interconnections and interdependencies increase @@ -7277,13 +8472,14 @@ interactions: to reflect upon the relationship/interaction between man and machine, and the dangers posed by pursuing the simulation of human thought.", "venue": "World Futures", "year": 2022, "referenceCount": 170, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-02-09", "journal": {"volume": - "78", "pages": "343 - 371", "name": "World Futures"}, "authors": [{"authorId": - "2093705362", "name": "Piero Dominici"}]}, {"paperId": "3ac7d6aaebac65ec691f6ba0595d509d3c210f28", - "externalIds": {"DBLP": "journals/corr/abs-2202-03164", "ArXiv": "2202.03164", - "DOI": "10.1142/9789811246050_0012", "CorpusId": 246634059}, "url": "https://www.semanticscholar.org/paper/3ac7d6aaebac65ec691f6ba0595d509d3c210f28", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-09", + "journal": {"volume": "78", "pages": "343 - 371", "name": "World Futures"}, + "authors": [{"authorId": "2093705362", "name": "Piero Dominici"}]}, {"paperId": + "3ac7d6aaebac65ec691f6ba0595d509d3c210f28", "externalIds": {"DBLP": "journals/corr/abs-2202-03164", + "ArXiv": "2202.03164", "DOI": "10.1142/9789811246050_0012", "CorpusId": 246634059}, + "corpusId": 246634059, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3ac7d6aaebac65ec691f6ba0595d509d3c210f28", "title": "Conversational Agents: Theory and Applications", "abstract": "In this chapter, we provide a review of conversational agents (CAs), discussing chatbots, intended for casual conversation with a user, as well as task-oriented @@ -7298,14 +8494,17 @@ interactions: and education. We end the chapter by discussing benefits and potential risks regarding the societal impact of current and future CA technology.", "venue": "ArXiv", "year": 2022, "referenceCount": 269, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-02-07", "journal": {"volume": "abs/2202.03164", "name": - "ArXiv"}, "authors": [{"authorId": "2505659", "name": "M. Wahde"}, {"authorId": - "3235013", "name": "M. Virgolin"}]}, {"paperId": "75a81665fc035b67427468f01bd5f010a990aff8", - "externalIds": {"DOI": "10.1080/00131857.2022.2033213", "CorpusId": 246574031}, - "url": "https://www.semanticscholar.org/paper/75a81665fc035b67427468f01bd5f010a990aff8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2022-02-07", "journal": + {"volume": "abs/2202.03164", "name": "ArXiv"}, "authors": [{"authorId": "2505659", + "name": "M. Wahde"}, {"authorId": "3235013", "name": "M. Virgolin"}]}, {"paperId": + "75a81665fc035b67427468f01bd5f010a990aff8", "externalIds": {"DOI": "10.1080/00131857.2022.2033213", + "CorpusId": 246574031}, "corpusId": 246574031, "publicationVenue": {"id": + "1f33075e-7bb7-471b-9366-4903f07c2382", "name": "Educational Philosophy and + Theory", "type": "journal", "alternate_names": ["Educ Philos Theory"], "issn": + "0013-1857", "url": "http://www.tandfonline.com/loi/rept20"}, "url": "https://www.semanticscholar.org/paper/75a81665fc035b67427468f01bd5f010a990aff8", "title": "The cybernetics of learning", "abstract": "\u2026 in which we pass through eleven episodes in the history of cybernetics, each episode focusing on one of its perspectives on learning. We end with a coda where we define @@ -7313,14 +8512,15 @@ interactions: we have coined to identify some characteristics of contemporary times, when so many aspects of our lives and learning have come to be entangled with computers.", "venue": "Educational Philosophy and Theory", "year": 2022, "referenceCount": - 103, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-02-04", "journal": {"volume": - "54", "pages": "2352 - 2388", "name": "Educational Philosophy and Theory"}, - "authors": [{"authorId": "33955451", "name": "B. Cope"}, {"authorId": "2334862", - "name": "M. Kalantzis"}]}, {"paperId": "704570786dc6086c42de533e983ee22bf6dd029c", - "externalIds": {"DOI": "10.1055/s-0041-1742180", "CorpusId": 248833106, "PubMed": - "35576929"}, "url": "https://www.semanticscholar.org/paper/704570786dc6086c42de533e983ee22bf6dd029c", + 103, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-02-04", "journal": {"volume": "54", "pages": "2352 - 2388", "name": + "Educational Philosophy and Theory"}, "authors": [{"authorId": "33955451", + "name": "B. Cope"}, {"authorId": "2334862", "name": "M. Kalantzis"}]}, {"paperId": + "704570786dc6086c42de533e983ee22bf6dd029c", "externalIds": {"DOI": "10.1055/s-0041-1742180", + "CorpusId": 248833106, "PubMed": "35576929"}, "corpusId": 248833106, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/704570786dc6086c42de533e983ee22bf6dd029c", "title": "Use of Artificial Intelligence in Clinical Neurology.", "abstract": "Artificial intelligence is already innovating in the provision of neurologic care. This review explores key artificial intelligence concepts; their application @@ -7331,14 +8531,14 @@ interactions: the iceberg for the ways in which artificial intelligence may transform neurologic care in the future.", "venue": "Seminars in neurology", "year": 2022, "referenceCount": 47, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-02-01", "journal": {"volume": "42 1", "pages": "\n 39-47\n ", "name": "Seminars in neurology"}, "authors": [{"authorId": "145066343", "name": "James Hillis"}, {"authorId": "46747857", "name": "B. Bizzo"}]}, {"paperId": "ac7bea5758401ef2dd58e2009acdf14d71635b88", "externalIds": {"DOI": "10.1109/ICTech55460.2022.00033", "CorpusId": 251762977}, - "url": "https://www.semanticscholar.org/paper/ac7bea5758401ef2dd58e2009acdf14d71635b88", + "corpusId": 251762977, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ac7bea5758401ef2dd58e2009acdf14d71635b88", "title": "Intelligent Audit Question Answering System based on Knowledge Graph and Semantic Similarity", "abstract": "Audit work needs to refer to a large number of law and institutional documents, and the business process is intricate. @@ -7354,27 +8554,29 @@ interactions: The effectiveness of the system is evaluated by experiments.", "venue": "2022 11th International Conference of Information and Communication Technology (ICTech))", "year": 2022, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "2022-02-01", "journal": {"pages": "125-132", "name": "2022 - 11th International Conference of Information and Communication Technology - (ICTech))"}, "authors": [{"authorId": "2065124088", "name": "Feifei Dai"}, - {"authorId": "2182438288", "name": "ZhangLi Zhao"}, {"authorId": "7547830", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Conference"], "publicationDate": "2022-02-01", "journal": {"pages": "125-132", + "name": "2022 11th International Conference of Information and Communication + Technology (ICTech))"}, "authors": [{"authorId": "2065124088", "name": "Feifei + Dai"}, {"authorId": "2182438288", "name": "ZhangLi Zhao"}, {"authorId": "7547830", "name": "Changpeng Sun"}, {"authorId": "2132445720", "name": "Borang Li"}]}, {"paperId": "89ca40e3894f0a46b876673685c51a36104b4cd7", "externalIds": {"DOI": - "10.1007/s41204-021-00185-2", "CorpusId": 247767253}, "url": "https://www.semanticscholar.org/paper/89ca40e3894f0a46b876673685c51a36104b4cd7", + "10.1007/s41204-021-00185-2", "CorpusId": 247767253}, "corpusId": 247767253, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/89ca40e3894f0a46b876673685c51a36104b4cd7", "title": "Research hotspots of current interest and trend of artificial intelligence in intelligent speech processing and social sciences \u2013 visualized comparison research based on CiteSpace", "abstract": null, "venue": "Nanotechnology for Environmental Engineering", "year": 2022, "referenceCount": 22, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-02-01", "journal": {"volume": - "7", "pages": "843 - 855", "name": "Nanotechnology for Environmental Engineering"}, - "authors": [{"authorId": "2160595571", "name": "Chengke Zhu"}, {"authorId": - "2160592308", "name": "Xiaofeng Zhao"}]}, {"paperId": "011b3d978d110f3a1d1caee9464a8cccde52820b", - "externalIds": {"DOI": "10.1215/0094033x-9439601", "CorpusId": 247259492}, - "url": "https://www.semanticscholar.org/paper/011b3d978d110f3a1d1caee9464a8cccde52820b", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-01", + "journal": {"volume": "7", "pages": "843 - 855", "name": "Nanotechnology for + Environmental Engineering"}, "authors": [{"authorId": "2160595571", "name": + "Chengke Zhu"}, {"authorId": "2160592308", "name": "Xiaofeng Zhao"}]}, {"paperId": + "011b3d978d110f3a1d1caee9464a8cccde52820b", "externalIds": {"DOI": "10.1215/0094033x-9439601", + "CorpusId": 247259492}, "corpusId": 247259492, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/011b3d978d110f3a1d1caee9464a8cccde52820b", "title": "Intermittent Legitimacy: Hans Blumenberg and Artificial Intelligence", "abstract": "Hans Blumenberg\u2019s only known treatment of the topic of artificial intelligence comes in the form of a fragmentary meditation on the first chatbot, @@ -7387,23 +8589,48 @@ interactions: machines in the constitution of meaning through rhetoric and points the way to a new wave of digital critique.", "venue": "New German Critique", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-02-01", "journal": {"name": "New German Critique"}, "authors": [{"authorId": - "67215008", "name": "Leif Weatherby"}]}, {"paperId": "70276650403e5b1cb13dbdabfb6d26243bb6f55b", - "externalIds": {"DOI": "10.1016/j.foodcont.2022.108902", "CorpusId": 247099243}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2022-02-01", "journal": {"name": "New German Critique"}, + "authors": [{"authorId": "67215008", "name": "Leif Weatherby"}]}, {"paperId": + "70276650403e5b1cb13dbdabfb6d26243bb6f55b", "externalIds": {"DOI": "10.1016/j.foodcont.2022.108902", + "CorpusId": 247099243}, "corpusId": 247099243, "publicationVenue": {"id": + "52adc4f7-b293-4f2f-9ead-05a1e0e415ed", "name": "Food Control", "type": "journal", + "issn": "0956-7135", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/30418/description", + "alternate_urls": ["https://www.journals.elsevier.com/food-control", "http://www.sciencedirect.com/science/journal/09567135"]}, "url": "https://www.semanticscholar.org/paper/70276650403e5b1cb13dbdabfb6d26243bb6f55b", "title": "Fish quality evaluation by sensor and machine learning: A mechanistic review", "abstract": null, "venue": "Food Control", "year": 2022, "referenceCount": - 72, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": ["Review"], - "publicationDate": "2022-02-01", "journal": {"name": "Food Control"}, "authors": - [{"authorId": "2156216091", "name": "Rehan Saeed"}, {"authorId": "48366598", - "name": "Huanhuan Feng"}, {"authorId": "2144799429", "name": "Xiang Wang"}, - {"authorId": "71128926", "name": "Zhang Xiaoshuan"}, {"authorId": "41216196", - "name": "Fu Zetian"}]}, {"paperId": "34f2fff0eda8f215c4d73462526371f1f9836bea", + 72, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + ["Review"], "publicationDate": "2022-02-01", "journal": {"name": "Food Control"}, + "authors": [{"authorId": "2156216091", "name": "Rehan Saeed"}, {"authorId": + "48366598", "name": "Huanhuan Feng"}, {"authorId": "2144799429", "name": "Xiang + Wang"}, {"authorId": "71128926", "name": "Zhang Xiaoshuan"}, {"authorId": + "41216196", "name": "Fu Zetian"}]}, {"paperId": "620ac189d2cd19e9d35728b91b6efd7f9b7ece03", + "externalIds": {"PubMedCentral": "9760544", "DOI": "10.1016/j.ajp.2022.103021", + "CorpusId": 246802916, "PubMed": "35219978"}, "corpusId": 246802916, "publicationVenue": + {"id": "6be19581-545b-41e7-a4f2-5c5e3a310821", "name": "Asian Journal of Psychiatry", + "type": "journal", "alternate_names": ["Asian J Psychiatry"], "issn": "1876-2018", + "url": "http://www.asianjournalofpsychiatry.com/", "alternate_urls": ["https://www.journals.elsevier.com/asian-journal-of-psychiatry"]}, + "url": "https://www.semanticscholar.org/paper/620ac189d2cd19e9d35728b91b6efd7f9b7ece03", + "title": "Artificial intelligence and Psychiatry: An overview", "abstract": + null, "venue": "Asian Journal of Psychiatry", "year": 2022, "referenceCount": + 69, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2022-02-01", + "journal": {"volume": "70", "pages": "103021 - 103021", "name": "Asian Journal + of Psychiatry"}, "authors": [{"authorId": "2146671309", "name": "Adwitiya + Ray"}, {"authorId": "28972263", "name": "Akansha Bhardwaj"}, {"authorId": + "72144493", "name": "Y. Malik"}, {"authorId": "49551175", "name": "Shipra + Singh"}, {"authorId": "153382032", "name": "R. Gupta"}]}, {"paperId": "34f2fff0eda8f215c4d73462526371f1f9836bea", "externalIds": {"PubMedCentral": "8835112", "DOI": "10.3390/ijerph19031728", - "CorpusId": 246540644, "PubMed": "35162751"}, "url": "https://www.semanticscholar.org/paper/34f2fff0eda8f215c4d73462526371f1f9836bea", + "CorpusId": 246540644, "PubMed": "35162751"}, "corpusId": 246540644, "publicationVenue": + {"id": "3096eb5c-d18c-4877-94cd-28edd3a9c357", "name": "International Journal + of Environmental Research and Public Health", "type": "journal", "alternate_names": + ["Int J Environ Res Public Health"], "issn": "1660-4601", "url": "http://www.mdpi.com/journal/ijerph/"}, + "url": "https://www.semanticscholar.org/paper/34f2fff0eda8f215c4d73462526371f1f9836bea", "title": "Artificial Intelligence: A New Diagnostic Software in Dentistry: A Preliminary Performance Diagnostic Study", "abstract": "Background: Artificial intelligence (AI) has taken hold in public health because more and more people @@ -7423,20 +8650,22 @@ interactions: and credibility of a new diagnostic method to improve the work of dentists and the patients\u2019 care.", "venue": "International Journal of Environmental Research and Public Health", "year": 2022, "referenceCount": 30, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-02-01", "journal": {"volume": "19", "name": "International - Journal of Environmental Research and Public Health"}, "authors": [{"authorId": - "12548652", "name": "F. De Angelis"}, {"authorId": "6823991", "name": "N. - Pranno"}, {"authorId": "1768252708", "name": "A. Franchina"}, {"authorId": - "47583050", "name": "S. Di Carlo"}, {"authorId": "39544128", "name": "E. Brauner"}, - {"authorId": "51215976", "name": "A. Ferri"}, {"authorId": "33471158", "name": - "G. Pellegrino"}, {"authorId": "6116156", "name": "E. Grecchi"}, {"authorId": - "83041222", "name": "F. Goker"}, {"authorId": "5600848", "name": "L. Stefanelli"}]}, - {"paperId": "6af39776d0ebae6441006a495d595fd5625febf0", "externalIds": {"DBLP": - "journals/tois/ZhuSNDDZ22", "DOI": "10.1145/3507356", "CorpusId": 246445772}, - "url": "https://www.semanticscholar.org/paper/6af39776d0ebae6441006a495d595fd5625febf0", + 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/1660-4601/19/3/1728/pdf?version=1644394782", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-01", "journal": + {"volume": "19", "name": "International Journal of Environmental Research + and Public Health"}, "authors": [{"authorId": "12548652", "name": "F. De Angelis"}, + {"authorId": "6823991", "name": "N. Pranno"}, {"authorId": "1768252708", "name": + "A. Franchina"}, {"authorId": "47583050", "name": "S. Di Carlo"}, {"authorId": + "39544128", "name": "E. Brauner"}, {"authorId": "51215976", "name": "A. Ferri"}, + {"authorId": "33471158", "name": "G. Pellegrino"}, {"authorId": "6116156", + "name": "E. Grecchi"}, {"authorId": "83041222", "name": "F. Goker"}, {"authorId": + "5600848", "name": "L. Stefanelli"}]}, {"paperId": "6af39776d0ebae6441006a495d595fd5625febf0", + "externalIds": {"DBLP": "journals/tois/ZhuSNDDZ22", "DOI": "10.1145/3507356", + "CorpusId": 246445772}, "corpusId": 246445772, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6af39776d0ebae6441006a495d595fd5625febf0", "title": "Leveraging Narrative to Generate Movie Script", "abstract": "Generating a text based on a predefined guideline is an interesting but challenging problem. A series of studies have been carried out in recent years. In dialogue systems, @@ -7459,24 +8688,25 @@ interactions: show that our proposed approach based on narratives significantly outperforms the baselines that simply use the narrative as a kind of context.", "venue": "ACM Trans. Inf. Syst.", "year": 2022, "referenceCount": 74, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-01", "journal": - {"volume": "40", "pages": "1 - 32", "name": "ACM Transactions on Information - Systems (TOIS)"}, "authors": [{"authorId": "2123659063", "name": "Yutao Zhu"}, - {"authorId": "35119829", "name": "Ruihua Song"}, {"authorId": "50204644", - "name": "J. Nie"}, {"authorId": "2407633", "name": "Pan Du"}, {"authorId": - "1897235", "name": "Zhicheng Dou"}, {"authorId": "2145786629", "name": "Jin - Zhou"}]}, {"paperId": "2f75ff0ed69e49675333c787faf6578029996da4", "externalIds": - {"MAG": "3206438477", "DOI": "10.1145/3464383", "CorpusId": 244584771}, "url": - "https://www.semanticscholar.org/paper/2f75ff0ed69e49675333c787faf6578029996da4", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-02-01", "journal": {"volume": "40", "pages": "1 - 32", "name": "ACM + Transactions on Information Systems (TOIS)"}, "authors": [{"authorId": "2123659063", + "name": "Yutao Zhu"}, {"authorId": "35119829", "name": "Ruihua Song"}, {"authorId": + "50204644", "name": "J. Nie"}, {"authorId": "2407633", "name": "Pan Du"}, + {"authorId": "1897235", "name": "Zhicheng Dou"}, {"authorId": "2145786629", + "name": "Jin Zhou"}]}, {"paperId": "2f75ff0ed69e49675333c787faf6578029996da4", + "externalIds": {"MAG": "3206438477", "DOI": "10.1145/3464383", "CorpusId": + 244584771}, "corpusId": 244584771, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2f75ff0ed69e49675333c787faf6578029996da4", "title": "GeCoAgent: A Conversational Agent for Empowering Genomic Data Extraction and Analysis", "abstract": "With the availability of reliable and low-cost DNA sequencing, human genomics is relevant to a growing number of end-users, including biologists and clinicians. Typical interactions require applyin...", "venue": "", "year": 2022, "referenceCount": 42, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://re.public.polimi.it/bitstream/11311/1192262/1/41330654_File000001_1022346825%20%282%29.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-31", "journal": {"volume": "3", "pages": "1-29", "name": ""}, "authors": [{"authorId": @@ -7486,7 +8716,8 @@ interactions: "CanakogluArif"}, {"authorId": "1581876025", "name": "GarzottoFranca"}, {"authorId": "1643716327", "name": "CeriStefano"}]}, {"paperId": "cde1e5bf12ec346323c99f597bb41e77232c1df9", "externalIds": {"DBLP": "journals/tois/MaLZLL22", "DOI": "10.1145/3464377", - "CorpusId": 246065789}, "url": "https://www.semanticscholar.org/paper/cde1e5bf12ec346323c99f597bb41e77232c1df9", + "CorpusId": 246065789}, "corpusId": 246065789, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cde1e5bf12ec346323c99f597bb41e77232c1df9", "title": "Unstructured Text Enhanced Open-Domain Dialogue System: A Systematic Survey", "abstract": "\n Incorporating external knowledge into dialogue generation has been proven to benefit the performance of an open-domain Dialogue System @@ -7505,27 +8736,37 @@ interactions: analyze the current models\u2019 performance. At last, we discuss the future development trends of UTEDS, hoping to inspire new research in this field.\n", "venue": "ACM Trans. Inf. Syst.", "year": 2022, "referenceCount": 180, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-01-31", - "journal": {"volume": "40", "pages": "9:1-9:44", "name": "ACM Trans. Inf. - Syst."}, "authors": [{"authorId": "153132928", "name": "Longxuan Ma"}, {"authorId": - "47628976", "name": "Mingda Li"}, {"authorId": "1806419", "name": "Weinan - Zhang"}, {"authorId": "47787152", "name": "Jiapeng Li"}, {"authorId": "2140034831", - "name": "Ting Liu"}]}, {"paperId": "099eeb7735c73fc8ff087a771254d7c39a130c1f", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2022-01-31", "journal": {"volume": "40", "pages": "9:1-9:44", + "name": "ACM Trans. Inf. Syst."}, "authors": [{"authorId": "153132928", "name": + "Longxuan Ma"}, {"authorId": null, "name": "Mingda Li"}, {"authorId": "1806419", + "name": "Weinan Zhang"}, {"authorId": "47787152", "name": "Jiapeng Li"}, {"authorId": + "2140034831", "name": "Ting Liu"}]}, {"paperId": "099eeb7735c73fc8ff087a771254d7c39a130c1f", "externalIds": {"PubMedCentral": "8866585", "DOI": "10.1007/s10867-021-09590-9", - "CorpusId": 237398514, "PubMed": "35089468"}, "url": "https://www.semanticscholar.org/paper/099eeb7735c73fc8ff087a771254d7c39a130c1f", + "CorpusId": 237398514, "PubMed": "35089468"}, "corpusId": 237398514, "publicationVenue": + {"id": "874d5120-c187-41c2-b65d-d80ef193edbd", "name": "Journal of biological + physics (Print)", "type": "journal", "alternate_names": ["Journal of Biological + Physics", "J biological phys (print", "J Biological Phys"], "issn": "0092-0606", + "url": "https://link.springer.com/journal/10867"}, "url": "https://www.semanticscholar.org/paper/099eeb7735c73fc8ff087a771254d7c39a130c1f", "title": "Biological computation: hearts and flytraps", "abstract": null, "venue": "Journal of biological physics (Print)", "year": 2022, "referenceCount": 31, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-28", "journal": - {"volume": "48", "pages": "55 - 78", "name": "Journal of Biological Physics"}, - "authors": [{"authorId": "20885065", "name": "Kay L Kirkpatrick"}]}, {"paperId": - "5d72d285bb839bb31d1cffbeefb7b0ef3cda018a", "externalIds": {"DOI": "10.1215/00029831-9696959", - "CorpusId": 246376480}, "url": "https://www.semanticscholar.org/paper/5d72d285bb839bb31d1cffbeefb7b0ef3cda018a", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10867-021-09590-9.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-01-28", "journal": {"volume": "48", "pages": "55 - 78", "name": "Journal + of Biological Physics"}, "authors": [{"authorId": "20885065", "name": "Kay + L Kirkpatrick"}]}, {"paperId": "5d72d285bb839bb31d1cffbeefb7b0ef3cda018a", + "externalIds": {"DOI": "10.1215/00029831-9696959", "CorpusId": 246376480}, + "corpusId": 246376480, "publicationVenue": {"id": "017f8757-c86c-4ac5-b439-132df4e99fc8", + "name": "American Literature", "type": "journal", "alternate_names": ["Am + Lit"], "issn": "0002-9831", "url": "http://muse.jhu.edu/journals/al/", "alternate_urls": + ["http://www.jstor.org/journals/00029831.html", "https://www.jstor.org/journal/amerlite", + "http://americanliterature.dukejournals.org/"]}, "url": "https://www.semanticscholar.org/paper/5d72d285bb839bb31d1cffbeefb7b0ef3cda018a", "title": "Introduction: American Game Studies", "abstract": "In 2017, the American game designer Momo Pixel released the single-player, browser-based game Hair Nah. In this game, you play as Aeva, a Black woman taking trips @@ -7551,13 +8792,14 @@ interactions: survival horror games (action-adventure games in which the player must persist in a threatening environment without adequate resources);", "venue": "American Literature", "year": 2022, "referenceCount": 45, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-01-27", "journal": {"name": "American Literature"}, "authors": [{"authorId": - "11894276", "name": "Patrick Jagoda"}, {"authorId": "11751678", "name": "Jennifer - A. Malkowski"}]}, {"paperId": "4b09890801e648078d806b7b1fbf8ad89d317f96", - "externalIds": {"ArXiv": "2201.11197", "DBLP": "journals/corr/abs-2201-11197", - "CorpusId": 246294878}, "url": "https://www.semanticscholar.org/paper/4b09890801e648078d806b7b1fbf8ad89d317f96", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://read.dukeupress.edu/american-literature/article-pdf/94/1/1/1503208/1jagoda.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-27", + "journal": {"name": "American Literature"}, "authors": [{"authorId": "11894276", + "name": "Patrick Jagoda"}, {"authorId": "11751678", "name": "Jennifer A. Malkowski"}]}, + {"paperId": "4b09890801e648078d806b7b1fbf8ad89d317f96", "externalIds": {"ArXiv": + "2201.11197", "DBLP": "journals/corr/abs-2201-11197", "CorpusId": 246294878}, + "corpusId": 246294878, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4b09890801e648078d806b7b1fbf8ad89d317f96", "title": "Challenges and Opportunities for Machine Learning Classification of Behavior and Mental State from Images", "abstract": "Computer Vision (CV) classifiers which distinguish and detect nonverbal social human behavior and @@ -7577,12 +8819,12 @@ interactions: and meta-learning. We highlight at least some of the machine learning advancements needed for imaging classifiers to detect human social cues successfully and reliably.", "venue": "ArXiv", "year": 2022, "referenceCount": 248, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2022-01-26", "journal": {"volume": - "abs/2201.11197", "name": "ArXiv"}, "authors": [{"authorId": "145086898", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-26", "journal": + {"volume": "abs/2201.11197", "name": "ArXiv"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": "2065984781", "name": "O. Mutlu"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": "2240125", "name": "K. Paskov"}, {"authorId": "30423115", "name": "N. Stockham"}, {"authorId": @@ -7590,7 +8832,11 @@ interactions: Deveaux"}, {"authorId": "2151248737", "name": "Mourya Surhabi"}, {"authorId": "32551479", "name": "N. Haber"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "382f9da008eaa9f5f1b7c69350d9e4e1c62025e5", "externalIds": {"DOI": - "10.1177/1742271X211072473", "CorpusId": 246226102}, "url": "https://www.semanticscholar.org/paper/382f9da008eaa9f5f1b7c69350d9e4e1c62025e5", + "10.1177/1742271X211072473", "CorpusId": 246226102}, "corpusId": 246226102, + "publicationVenue": {"id": "cea7e981-2c7b-4258-82f2-c18dc4cd13ee", "name": + "Ultrasound", "type": "journal", "issn": "1392-2114", "alternate_issns": ["1742-271X"], + "url": "https://journals.sagepub.com/home/ult", "alternate_urls": ["http://www.uk.sagepub.com/journals/Journal202202"]}, + "url": "https://www.semanticscholar.org/paper/382f9da008eaa9f5f1b7c69350d9e4e1c62025e5", "title": "The application of artificial intelligence in the sonography profession: Professional and educational considerations", "abstract": "The integration of artificial intelligence (AI) technology within the health industry is increasing. @@ -7608,14 +8854,16 @@ interactions: the efficiency and methodologies used in new research that may incorporate AI technologies.", "venue": "Ultrasound", "year": 2022, "referenceCount": 55, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "openAccessPdf": {"url": "https://eprints.qut.edu.au/227674/1/105038162.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-21", "journal": {"volume": "30", "pages": "273 - 282", "name": "Ultrasound"}, "authors": [{"authorId": "2082469883", "name": "C. Edwards"}, {"authorId": "51956141", "name": "Crispen Chamunyonga"}, {"authorId": "1484821605", "name": "Ben Searle"}, {"authorId": "4409885", "name": "T. Reddan"}]}, {"paperId": "66cc87463c0f27256a18eb02915460ef0b510c0b", "externalIds": {"ArXiv": "2201.07372", - "DBLP": "journals/corr/abs-2201-07372", "CorpusId": 246035573}, "url": "https://www.semanticscholar.org/paper/66cc87463c0f27256a18eb02915460ef0b510c0b", + "DBLP": "journals/corr/abs-2201-07372", "CorpusId": 246035573}, "corpusId": + 246035573, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/66cc87463c0f27256a18eb02915460ef0b510c0b", "title": "Prospective Learning: Back to the Future", "abstract": "Research on both natural intelligence (NI) and artificial intelligence (AI) generally assumes that the future resembles the past: intelligent agents or systems @@ -7645,53 +8893,54 @@ interactions: man ever steps in the same river twice. For it\u2019s not the same river and he\u2019s not the same man.\u201d Heraclitus", "venue": "ArXiv", "year": 2022, "referenceCount": 219, "citationCount": 3, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2022-01-19", "journal": {"volume": "abs/2201.07372", "name": - "ArXiv"}, "authors": [{"authorId": "1717958", "name": "J. Vogelstein"}, {"authorId": - "48174169", "name": "T. Verstynen"}, {"authorId": "150174214", "name": "K. - Kording"}, {"authorId": "2166242", "name": "Leyla Isik"}, {"authorId": "3124681", - "name": "J. Krakauer"}, {"authorId": "1398026219", "name": "R. Etienne-Cummings"}, - {"authorId": "2564494", "name": "E. Ogburn"}, {"authorId": "2068800231", "name": - "Carey E. Priebe"}, {"authorId": "145542377", "name": "R. Burns"}, {"authorId": - "3407505", "name": "Kwame S. Kutten"}, {"authorId": "2972274", "name": "J. - Knierim"}, {"authorId": "2171465", "name": "J. Potash"}, {"authorId": "2072950283", - "name": "T. Hartung"}, {"authorId": "145820240", "name": "L. Smirnova"}, {"authorId": - "2150486352", "name": "Paul Worley"}, {"authorId": "6549687", "name": "A. - Savonenko"}, {"authorId": "51115141", "name": "I. Phillips"}, {"authorId": - "2111173632", "name": "Michael Miller"}, {"authorId": "2150487213", "name": - "Rene Vidal"}, {"authorId": "2714145", "name": "Jeremias Sulam"}, {"authorId": - "144305878", "name": "Adam S. Charles"}, {"authorId": "145988982", "name": - "N. Cowan"}, {"authorId": "1722887", "name": "Maxim Bichuch"}, {"authorId": - "3318697", "name": "A. Venkataraman"}, {"authorId": "40144368", "name": "Chen - Li"}, {"authorId": "145146201", "name": "N. Thakor"}, {"authorId": "6481849", - "name": "Justus M. Kebschull"}, {"authorId": "2055754721", "name": "M. Albert"}, - {"authorId": "2155955522", "name": "Jinchong Xu"}, {"authorId": "144176224", - "name": "M. Shuler"}, {"authorId": "1397970751", "name": "B. Caffo"}, {"authorId": - "47026288", "name": "T. Ratnanather"}, {"authorId": "2008817606", "name": - "Ali Geisa"}, {"authorId": "47110018", "name": "S. Roh"}, {"authorId": "2127864028", - "name": "Eva Yezerets"}, {"authorId": "50481453", "name": "Meghana Madhyastha"}, - {"authorId": "3706007", "name": "Javier J. How"}, {"authorId": "2414228", - "name": "Tyler M. Tomita"}, {"authorId": "31627573", "name": "Jayanta Dey"}, - {"authorId": "2003308715", "name": "N. Huang"}, {"authorId": "2152473079", - "name": "Jong M. Shin"}, {"authorId": "2130912736", "name": "K. A. Kinfu"}, - {"authorId": "2059257077", "name": "Pratik R. Chaudhari"}, {"authorId": "144728145", - "name": "Ben Baker"}, {"authorId": "2717995", "name": "A. Schapiro"}, {"authorId": - "144348441", "name": "Dinesh Jayaraman"}, {"authorId": "144020269", "name": - "Eric Eaton"}, {"authorId": "153298565", "name": "M. Platt"}, {"authorId": - "143857273", "name": "Pallavi V. Kulkarni"}, {"authorId": "2001748", "name": - "Leila Wehbe"}, {"authorId": "49542731", "name": "\u00c1d\u00e1m Kepecs"}, - {"authorId": "2003795252", "name": "Amy Christensen"}, {"authorId": "66716646", - "name": "O. Osuagwu"}, {"authorId": "1824880", "name": "Bingni W. Brunton"}, - {"authorId": "1875164", "name": "B. Mensh"}, {"authorId": "8665112", "name": - "A. Muotri"}, {"authorId": "2150488210", "name": "Gabriel Silva"}, {"authorId": - "49843412", "name": "F. Puppo"}, {"authorId": "5478027", "name": "F. Engert"}, - {"authorId": "2104527645", "name": "Elizabeth Hillman"}, {"authorId": "2110786762", - "name": "Julia Brown"}, {"authorId": "2008826474", "name": "Christoper M. - White"}, {"authorId": "2117131236", "name": "Weiwei Yang"}]}, {"paperId": + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-19", "journal": + {"volume": "abs/2201.07372", "name": "ArXiv"}, "authors": [{"authorId": "1717958", + "name": "J. Vogelstein"}, {"authorId": "48174169", "name": "T. Verstynen"}, + {"authorId": "150174214", "name": "K. Kording"}, {"authorId": "2166242", "name": + "Leyla Isik"}, {"authorId": "3124681", "name": "J. Krakauer"}, {"authorId": + "1398026219", "name": "R. Etienne-Cummings"}, {"authorId": "2564494", "name": + "E. Ogburn"}, {"authorId": "2068800231", "name": "Carey E. Priebe"}, {"authorId": + "145542377", "name": "R. Burns"}, {"authorId": "3407505", "name": "Kwame S. + Kutten"}, {"authorId": "2972274", "name": "J. Knierim"}, {"authorId": "2171465", + "name": "J. Potash"}, {"authorId": "2072950283", "name": "T. Hartung"}, {"authorId": + "145820240", "name": "L. Smirnova"}, {"authorId": "2150486352", "name": "Paul + Worley"}, {"authorId": "6549687", "name": "A. Savonenko"}, {"authorId": "51115141", + "name": "I. Phillips"}, {"authorId": "2111173632", "name": "Michael Miller"}, + {"authorId": "2150487213", "name": "Rene Vidal"}, {"authorId": "2714145", + "name": "Jeremias Sulam"}, {"authorId": "144305878", "name": "Adam S. Charles"}, + {"authorId": "145988982", "name": "N. Cowan"}, {"authorId": "1722887", "name": + "Maxim Bichuch"}, {"authorId": "3318697", "name": "A. Venkataraman"}, {"authorId": + "40144368", "name": "Chen Li"}, {"authorId": "145146201", "name": "N. Thakor"}, + {"authorId": "6481849", "name": "Justus M. Kebschull"}, {"authorId": "2055754721", + "name": "M. Albert"}, {"authorId": "2155955522", "name": "Jinchong Xu"}, {"authorId": + "144176224", "name": "M. Shuler"}, {"authorId": "1397970751", "name": "B. + Caffo"}, {"authorId": "47026288", "name": "T. Ratnanather"}, {"authorId": + "2008817606", "name": "Ali Geisa"}, {"authorId": "47110018", "name": "S. Roh"}, + {"authorId": "2127864028", "name": "Eva Yezerets"}, {"authorId": "50481453", + "name": "Meghana Madhyastha"}, {"authorId": "3706007", "name": "Javier J. + How"}, {"authorId": "2414228", "name": "Tyler M. Tomita"}, {"authorId": "31627573", + "name": "Jayanta Dey"}, {"authorId": "2003308715", "name": "N. Huang"}, {"authorId": + "2152473079", "name": "Jong M. Shin"}, {"authorId": "2130912736", "name": + "K. A. Kinfu"}, {"authorId": "2059257077", "name": "Pratik R. Chaudhari"}, + {"authorId": "144728145", "name": "Ben Baker"}, {"authorId": "2717995", "name": + "A. Schapiro"}, {"authorId": "144348441", "name": "Dinesh Jayaraman"}, {"authorId": + "144020269", "name": "Eric Eaton"}, {"authorId": "153298565", "name": "M. + Platt"}, {"authorId": "143857273", "name": "Pallavi V. Kulkarni"}, {"authorId": + "2001748", "name": "Leila Wehbe"}, {"authorId": "49542731", "name": "\u00c1d\u00e1m + Kepecs"}, {"authorId": "2003795252", "name": "Amy Christensen"}, {"authorId": + "66716646", "name": "O. Osuagwu"}, {"authorId": "1824880", "name": "Bingni + W. Brunton"}, {"authorId": "1875164", "name": "B. Mensh"}, {"authorId": "8665112", + "name": "A. Muotri"}, {"authorId": "2150488210", "name": "Gabriel Silva"}, + {"authorId": "49843412", "name": "F. Puppo"}, {"authorId": "5478027", "name": + "F. Engert"}, {"authorId": "2104527645", "name": "Elizabeth Hillman"}, {"authorId": + "2110786762", "name": "Julia Brown"}, {"authorId": "2008826474", "name": "Christoper + M. White"}, {"authorId": "2117131236", "name": "Weiwei Yang"}]}, {"paperId": "327a4db46f71c26af556f4c270c6ccf44d7526ed", "externalIds": {"DOI": "10.20944/preprints202201.0206.v1", - "CorpusId": 246059455}, "url": "https://www.semanticscholar.org/paper/327a4db46f71c26af556f4c270c6ccf44d7526ed", + "CorpusId": 246059455}, "corpusId": 246059455, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/327a4db46f71c26af556f4c270c6ccf44d7526ed", "title": "Computational Models in Neurosciences Between Mechanistic and Phenomenological Characterizations", "abstract": "Computational neuroscience combines mathematics, computer science models, and neurosciences for theorizing, investigating, @@ -7715,14 +8964,16 @@ interactions: complex and subject to a shift in their initial function, could be limited by bringing to light such factors.", "venue": "", "year": 2022, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-14", + "openAccessPdf": {"url": "https://www.preprints.org/manuscript/202201.0206/v1/download", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-14", "journal": null, "authors": [{"authorId": "116951279", "name": "C. Gauld"}, {"authorId": "2069885259", "name": "C\u00e9dric N. Brun"}, {"authorId": "2877867", "name": "T. Boraud"}, {"authorId": "35361345", "name": "M. Carlu"}, {"authorId": "146481340", "name": "D. Depannemaecker"}]}, {"paperId": "92bc0f4e44e963ba87d5d3a49cfc93f69fed04c8", "externalIds": {"DOI": "10.1097/RCT.0000000000001247", "CorpusId": 245966939, - "PubMed": "35027520"}, "url": "https://www.semanticscholar.org/paper/92bc0f4e44e963ba87d5d3a49cfc93f69fed04c8", + "PubMed": "35027520"}, "corpusId": 245966939, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/92bc0f4e44e963ba87d5d3a49cfc93f69fed04c8", "title": "Artificial Intelligence in Diagnostic Radiology: Where Do We Stand, Challenges, and Opportunities", "abstract": "Abstract Artificial intelligence (AI) is the most revolutionizing development in the health care industry in @@ -7749,19 +9000,20 @@ interactions: 5 years. Emphasis is placed on the various DL models, as they are the most state-of-art in imaging analysis.", "venue": "Journal of computer assisted tomography", "year": 2022, "referenceCount": 111, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-01-12", "journal": {"volume": "46", "pages": "78 - - 90", "name": "Journal of Computer Assisted Tomography"}, "authors": [{"authorId": - "48998447", "name": "A. Moawad"}, {"authorId": "144499915", "name": "David - T. Fuentes"}, {"authorId": "4056485", "name": "Mohamed G. Elbanan"}, {"authorId": - "143627282", "name": "A. Shalaby"}, {"authorId": "83389532", "name": "Jeffrey - R. Guccione"}, {"authorId": "1505801840", "name": "Serageldin Kamel"}, {"authorId": - "37923217", "name": "C. Jensen"}, {"authorId": "3901588", "name": "K. Elsayes"}]}, - {"paperId": "94f02394a8f019d7ece7eb9612e96253ba97f30c", "externalIds": {"ACL": - "2022.nlp4convai-1.8", "DBLP": "conf/acl-convai/SmithHQRBW22", "ArXiv": "2201.04723", - "DOI": "10.18653/v1/2022.nlp4convai-1.8", "CorpusId": 245906443}, "url": "https://www.semanticscholar.org/paper/94f02394a8f019d7ece7eb9612e96253ba97f30c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2022-01-12", "journal": {"volume": "46", "pages": + "78 - 90", "name": "Journal of Computer Assisted Tomography"}, "authors": + [{"authorId": "48998447", "name": "A. Moawad"}, {"authorId": "144499915", + "name": "David T. Fuentes"}, {"authorId": "4056485", "name": "Mohamed G. Elbanan"}, + {"authorId": "143627282", "name": "A. Shalaby"}, {"authorId": "83389532", + "name": "Jeffrey R. Guccione"}, {"authorId": "1505801840", "name": "Serageldin + Kamel"}, {"authorId": "37923217", "name": "C. Jensen"}, {"authorId": "3901588", + "name": "K. Elsayes"}]}, {"paperId": "94f02394a8f019d7ece7eb9612e96253ba97f30c", + "externalIds": {"ACL": "2022.nlp4convai-1.8", "DBLP": "conf/acl-convai/SmithHQRBW22", + "ArXiv": "2201.04723", "DOI": "10.18653/v1/2022.nlp4convai-1.8", "CorpusId": + 245906443}, "corpusId": 245906443, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/94f02394a8f019d7ece7eb9612e96253ba97f30c", "title": "Human Evaluation of Conversations is an Open Problem: comparing the sensitivity of various methods for evaluating dialogue agents", "abstract": "At the heart of improving conversational AI is the open problem of how to @@ -7775,8 +9027,9 @@ interactions: types of models compared, with no clear winner across the board. While this highlights the open problems in the area, our analysis leads to advice of when to use which one, and possible future directions.", "venue": "NLP4CONVAI", - "year": 2022, "referenceCount": 59, "citationCount": 11, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "year": 2022, "referenceCount": 59, "citationCount": 12, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://aclanthology.org/2022.nlp4convai-1.8.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-12", "journal": {"pages": "77-97"}, "authors": @@ -7786,7 +9039,8 @@ interactions: "name": "Y-Lan Boureau"}, {"authorId": "145183709", "name": "J. Weston"}]}, {"paperId": "975e91a658d74856779af3883b58a4aa374cb28b", "externalIds": {"DBLP": "journals/corr/abs-2201-02478", "ArXiv": "2201.02478", "DOI": "10.1109/ACCESS.2022.3159911", - "CorpusId": 245827867}, "url": "https://www.semanticscholar.org/paper/975e91a658d74856779af3883b58a4aa374cb28b", + "CorpusId": 245827867}, "corpusId": 245827867, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/975e91a658d74856779af3883b58a4aa374cb28b", "title": "Bayesian Neural Networks for Reversible Steganography", "abstract": "Recent advances in deep learning have led to a paradigm shift in the field of reversible steganography. A fundamental pillar of reversible steganography @@ -7806,14 +9060,15 @@ interactions: Experimental results demonstrate an improvement delivered by Bayesian uncertainty analysis upon steganographic rate-distortion performance.", "venue": "IEEE Access", "year": 2022, "referenceCount": 50, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/9668973/09736990.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": {"volume": "10", "pages": "36327-36334", "name": "IEEE Access"}, "authors": [{"authorId": "4020249", "name": "Ching-Chun Chang"}]}, {"paperId": "4b2b5e565451ee6b55b7e902b646f4fd0fec7e11", "externalIds": {"ArXiv": "2201.02303", "DBLP": "journals/corr/abs-2201-02303", "CorpusId": - 245827770}, "url": "https://www.semanticscholar.org/paper/4b2b5e565451ee6b55b7e902b646f4fd0fec7e11", + 245827770}, "corpusId": 245827770, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4b2b5e565451ee6b55b7e902b646f4fd0fec7e11", "title": "From Textual Experiments to Experimental Texts: Expressive Repetition in \"Artificial Intelligence Literature\"", "abstract": "Since the birth of artificial intelligence 70 years ago, attempts at literary \u201ccreation\u201d @@ -7829,14 +9084,19 @@ interactions: technological context, paving the way for the transformation of AI literature from proof for technical possibilities to self-verification of literary value.", "venue": "ArXiv", "year": 2022, "referenceCount": 36, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2022-01-07", "journal": {"volume": - "abs/2201.02303", "name": "ArXiv"}, "authors": [{"authorId": "2726531", "name": - "Tianhua Zhu"}]}, {"paperId": "ccce8afb43154cf5ad8fc3dfcd0f1bf3e4b3a7f1", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": + {"volume": "abs/2201.02303", "name": "ArXiv"}, "authors": [{"authorId": "2726531", + "name": "Tianhua Zhu"}]}, {"paperId": "ccce8afb43154cf5ad8fc3dfcd0f1bf3e4b3a7f1", "externalIds": {"DOI": "10.1177/87569728211061779", "CorpusId": 245817331}, - "url": "https://www.semanticscholar.org/paper/ccce8afb43154cf5ad8fc3dfcd0f1bf3e4b3a7f1", + "corpusId": 245817331, "publicationVenue": {"id": "94c97235-3c91-4dd5-9fdc-97697967fbfc", + "name": "Project Management Journal", "type": "journal", "alternate_names": + ["Proj Manag J"], "issn": "1938-9507", "url": "https://journals.sagepub.com/home/pmx", + "alternate_urls": ["http://www3.interscience.wiley.com/cgi-bin/jhome/114291333", + "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1938-9507"]}, "url": + "https://www.semanticscholar.org/paper/ccce8afb43154cf5ad8fc3dfcd0f1bf3e4b3a7f1", "title": "The Expectations of Project Managers from Artificial Intelligence: A Delphi Study", "abstract": "Artificial intelligence (AI) technologies are rapidly developing these days and are expected to impact the field of project @@ -7848,14 +9108,19 @@ interactions: perspective that can be further translated into practical solutions in the near and far future to improve project management practices.", "venue": "Project Management Journal", "year": 2022, "referenceCount": 125, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-07", "journal": - {"volume": "53", "pages": "438 - 455", "name": "Project Management Journal"}, - "authors": [{"authorId": "90220793", "name": "Vered Holzmann"}, {"authorId": - "2149284915", "name": "Daniel Zitter"}, {"authorId": "2149284742", "name": - "Sahar Peshkess"}]}, {"paperId": "b2be05ccef54fdc5514467c7fef5d155cccff8a8", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-01-07", "journal": {"volume": "53", "pages": "438 - 455", "name": "Project + Management Journal"}, "authors": [{"authorId": "90220793", "name": "Vered + Holzmann"}, {"authorId": "2149284915", "name": "Daniel Zitter"}, {"authorId": + "2149284742", "name": "Sahar Peshkess"}]}, {"paperId": "b2be05ccef54fdc5514467c7fef5d155cccff8a8", "externalIds": {"DOI": "10.1108/ijm-07-2021-0423", "CorpusId": 245735534}, + "corpusId": 245735534, "publicationVenue": {"id": "69e07ba8-c284-481e-be3d-10a9debf23ca", + "name": "International journal of manpower", "type": "journal", "alternate_names": + ["International Journal of Manpower", "Int J Manpow", "Int j manpow"], "issn": + "0143-7720", "url": "https://www.emerald.com/insight/publication/issn/0143-7720", + "alternate_urls": ["http://info.emeraldinsight.com/products/journals/journals.htm?id=ijm"]}, "url": "https://www.semanticscholar.org/paper/b2be05ccef54fdc5514467c7fef5d155cccff8a8", "title": "A study of artificial intelligence on employee performance and work engagement: the moderating role of change leadership", "abstract": "PurposeThis @@ -7880,32 +9145,63 @@ interactions: In addition, the application of AI in organizations will experience turmoil, so that the critical role of leaders is needed to achieve success with employee work engagement.", "venue": "International journal of manpower", "year": 2022, - "referenceCount": 122, "citationCount": 7, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-01-04", "journal": {"name": - "International Journal of Manpower"}, "authors": [{"authorId": "74599974", - "name": "D. Wijayati"}, {"authorId": "122253491", "name": "Z. Rahman"}, {"authorId": - "114186387", "name": "A. Fahrullah"}, {"authorId": "1581361640", "name": "Muhammad - Fajar Wahyudi Rahman"}, {"authorId": "2005519031", "name": "Ika Diyah Candra - Arifah"}, {"authorId": "83278325", "name": "Achmad Kautsar"}]}, {"paperId": - "86f33254eb241f0be2708e3fab5bdc2816141f2e", "externalIds": {"DBLP": "journals/mta/NiralaSP22", - "PubMedCentral": "8721490", "DOI": "10.1007/s11042-021-11458-y", "CorpusId": - 245654055, "PubMed": "35002470"}, "url": "https://www.semanticscholar.org/paper/86f33254eb241f0be2708e3fab5bdc2816141f2e", + "referenceCount": 122, "citationCount": 8, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-01-04", "journal": {"name": "International Journal of Manpower"}, "authors": + [{"authorId": "74599974", "name": "D. Wijayati"}, {"authorId": "122253491", + "name": "Z. Rahman"}, {"authorId": "114186387", "name": "A. Fahrullah"}, {"authorId": + "1581361640", "name": "Muhammad Fajar Wahyudi Rahman"}, {"authorId": "2005519031", + "name": "Ika Diyah Candra Arifah"}, {"authorId": "83278325", "name": "Achmad + Kautsar"}]}, {"paperId": "86f33254eb241f0be2708e3fab5bdc2816141f2e", "externalIds": + {"DBLP": "journals/mta/NiralaSP22", "PubMedCentral": "8721490", "DOI": "10.1007/s11042-021-11458-y", + "CorpusId": 245654055, "PubMed": "35002470"}, "corpusId": 245654055, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/86f33254eb241f0be2708e3fab5bdc2816141f2e", "title": "A survey on providing customer and public administration based services using AI: chatbot", "abstract": null, "venue": "Multim. Tools Appl.", "year": - 2022, "referenceCount": 84, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2022-01-03", "journal": {"volume": "81", "pages": "22215 - - 22246", "name": "Multimedia Tools and Applications"}, "authors": [{"authorId": - "2148229185", "name": "Krishna Kumar Nirala"}, {"authorId": "31694553", "name": - "N. Singh"}, {"authorId": "70661096", "name": "V. S. Purani"}]}, {"paperId": - "399302544fa6dcb0ae7bf37b216338ecdbbb6249", "externalIds": {"DBLP": "journals/alife/AmosW22", - "DOI": "10.1162/artl_a_00381", "CorpusId": 251671497, "PubMed": "35984431"}, - "url": "https://www.semanticscholar.org/paper/399302544fa6dcb0ae7bf37b216338ecdbbb6249", + 2022, "referenceCount": 84, "citationCount": 4, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11042-021-11458-y.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2022-01-03", + "journal": {"volume": "81", "pages": "22215 - 22246", "name": "Multimedia + Tools and Applications"}, "authors": [{"authorId": "2148229185", "name": "Krishna + Kumar Nirala"}, {"authorId": "31694553", "name": "N. Singh"}, {"authorId": + "70661096", "name": "V. S. Purani"}]}, {"paperId": "f33c6f1707752009d0ff7845f2a2ab019c58cbe9", + "externalIds": {"DOI": "10.4018/ijhisi.315618", "CorpusId": 255090058}, "corpusId": + 255090058, "publicationVenue": {"id": "44a18297-4f46-4f88-b6a5-60d24b958cf7", + "name": "International Journal of Healthcare Information Systems and Informatics", + "type": "journal", "alternate_names": ["Int J Healthc Inf Syst Informatics"], + "issn": "1555-3396", "url": "http://www.idea-group.com/journals/details.asp?id=4835&mode=tocVolumes", + "alternate_urls": ["https://www.igi-global.com/journal/international-journal-healthcare-information-systems/1094"]}, + "url": "https://www.semanticscholar.org/paper/f33c6f1707752009d0ff7845f2a2ab019c58cbe9", + "title": "Doctor Resistance of Artificial Intelligence in Healthcare", "abstract": + "Artificial intelligence (AI) has revolutionized healthcare by enhancing the + quality of patient care. Despite its advantages, doctors are still reluctant + to use AI in healthcare. Thus, the authors'' main objective is to obtain an + in-depth understanding of the barriers to doctors'' adoption of AI in healthcare. + The authors conducted semi-structured interviews with 11 doctors. Thematic + analysis as chosen to identify patterns using QSR NVivo (version 12). The + results showed that the barriers to AI adoption are lack of financial resources, + need for special training, performance risk, perceived cost, technology dependency, + need for human interaction, and fear of AI replacing human work.", "venue": + "International Journal of Healthcare Information Systems and Informatics", + "year": 2022, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.igi-global.com/ViewTitle.aspx?TitleId=315618&isxn=9781799878247", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-01", + "journal": {"name": "International Journal of Healthcare Information Systems + and Informatics"}, "authors": [{"authorId": "2198133334", "name": "Asma Chaibi"}, + {"authorId": "86971721", "name": "I. Zaiem"}]}, {"paperId": "399302544fa6dcb0ae7bf37b216338ecdbbb6249", + "externalIds": {"DBLP": "journals/alife/AmosW22", "DOI": "10.1162/artl_a_00381", + "CorpusId": 251671497, "PubMed": "35984431"}, "corpusId": 251671497, "publicationVenue": + {"id": "5ed9f470-65a3-4077-8dab-163b0c5cb9e6", "name": "Artificial Life", + "type": "journal", "alternate_names": ["Artif Life"], "issn": "1064-5462", + "url": "http://cognet.mit.edu/library/journals/journal?issn=10645462", "alternate_urls": + ["http://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/loi/artl", + "https://www.mitpressjournals.org/doi/10.1162/ARTL_a_00243"]}, "url": "https://www.semanticscholar.org/paper/399302544fa6dcb0ae7bf37b216338ecdbbb6249", "title": "Crowd-Sourced Identification of Characteristics of Collective Human Motion", "abstract": "Abstract Crowd simulations are used extensively to study the dynamics of human collectives. Such studies are underpinned by specific @@ -7926,15 +9222,19 @@ interactions: crowds that should be incorporated into future simulations if they are to be considered realistic.", "venue": "Artificial Life", "year": 2022, "referenceCount": 57, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://nrl.northumbria.ac.uk/id/eprint/48972/1/AMOS.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-01", "journal": {"volume": "28", "pages": "401-422", "name": "Artificial Life"}, "authors": [{"authorId": "144936973", "name": "M. Amos"}, {"authorId": "2130441911", "name": "Jamie Webster"}]}, {"paperId": "9fff3ccb868e37ff40300957b92ee74d5ba9b8d6", "externalIds": {"DOI": "10.1177/20539517211069891", "CorpusId": 250180452}, - "url": "https://www.semanticscholar.org/paper/9fff3ccb868e37ff40300957b92ee74d5ba9b8d6", + "corpusId": 250180452, "publicationVenue": {"id": "4d899b46-b5c8-436e-8ce3-084673ea8905", + "name": "Big Data & Society", "type": "journal", "alternate_names": ["Big + Data Soc"], "issn": "2053-9517", "url": "http://bds.sagepub.com/", "alternate_urls": + ["https://journals.sagepub.com/home/bds"]}, "url": "https://www.semanticscholar.org/paper/9fff3ccb868e37ff40300957b92ee74d5ba9b8d6", "title": "The Thick Machine: Anthropological AI between explanation and explication", "abstract": "According to Clifford Geertz, the purpose of anthropology is not to explain culture but to explicate it. That should cause us to rethink @@ -7954,14 +9254,16 @@ interactions: how experiences from anthropology, and in particular the tension between formalist ethnoscience and interpretive thick description, might contribute to debates about explainable AI.", "venue": "Big Data & Society", "year": 2022, "referenceCount": - 48, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-01-01", "journal": {"volume": "9", "name": "Big Data & Society"}, "authors": - [{"authorId": "12953449", "name": "A. Munk"}, {"authorId": "2174377350", "name": - "Asger Gehrt Olesen"}, {"authorId": "1933458", "name": "M. Jacomy"}]}, {"paperId": - "8bd96c059b46845d2199e53d37d788c00a348c56", "externalIds": {"DOI": "10.1590/1982-0259.2022.e82510", - "CorpusId": 245923449}, "url": "https://www.semanticscholar.org/paper/8bd96c059b46845d2199e53d37d788c00a348c56", + 48, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/20539517211069891", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-01-01", "journal": {"volume": "9", "name": "Big Data + & Society"}, "authors": [{"authorId": "12953449", "name": "A. Munk"}, {"authorId": + "2174377350", "name": "Asger Gehrt Olesen"}, {"authorId": "1933458", "name": + "M. Jacomy"}]}, {"paperId": "8bd96c059b46845d2199e53d37d788c00a348c56", "externalIds": + {"DOI": "10.1590/1982-0259.2022.e82510", "CorpusId": 245923449}, "corpusId": + 245923449, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8bd96c059b46845d2199e53d37d788c00a348c56", "title": "Ind\u00fastria 4.0: servi\u00e7o social no sistema previdenci\u00e1rio em tempos da pandemia de COVID-19", "abstract": "Resumo Este texto discute o cen\u00e1rio do trabalho de assistentes sociais (AS) da Previd\u00eancia @@ -7973,22 +9275,26 @@ interactions: dos benef\u00edcios previdenci\u00e1rios e teletrabalho correspondendo ao aprofundamento do neoliberalismo e maior fragiliza\u00e7\u00e3o do trabalho.", "venue": "Revista Kat\u00e1lysis", "year": 2022, "referenceCount": 3, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2022-01-01", - "journal": {"name": "Revista Kat\u00e1lysis"}, "authors": [{"authorId": "150992517", - "name": "Edv\u00e2nia \u00c2ngela de Souza"}]}, {"paperId": "a61d065eb321888e9d4ca808b9952e858e0859c4", - "externalIds": {"DOI": "10.1016/j.jfo.2021.11.002", "CorpusId": 245687828}, - "url": "https://www.semanticscholar.org/paper/a61d065eb321888e9d4ca808b9952e858e0859c4", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.scielo.br/j/rk/a/mn5npLYkqrnNccbXR3ZyGgk/?lang=pt&format=pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2022-01-01", "journal": {"name": "Revista Kat\u00e1lysis"}, + "authors": [{"authorId": "150992517", "name": "Edv\u00e2nia \u00c2ngela de + Souza"}]}, {"paperId": "a61d065eb321888e9d4ca808b9952e858e0859c4", "externalIds": + {"DOI": "10.1016/j.jfo.2021.11.002", "CorpusId": 245687828}, "corpusId": 245687828, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a61d065eb321888e9d4ca808b9952e858e0859c4", "title": "Intelligence artificielle et glaucome\u00a0: une revue de la litt\u00e9rature", "abstract": null, "venue": "Journal Fran\u00e7ais d''Ophtalmologie", "year": 2022, "referenceCount": 148, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2022-01-01", "journal": {"name": "Journal Fran\u00e7ais - d''Ophtalmologie"}, "authors": [{"authorId": "2148525479", "name": "R. Bunod"}, - {"authorId": "2082636439", "name": "E. Augstburger"}, {"authorId": "47618121", - "name": "E. Brasnu"}, {"authorId": "153572951", "name": "A. Labb\u00e9"}, - {"authorId": "2053483552", "name": "C. Baudouin"}]}, {"paperId": "5c768e2f178e74e581ea62c43cad10c73e0eae9d", - "externalIds": {"DOI": "10.1086/717306", "CorpusId": 245145134}, "url": "https://www.semanticscholar.org/paper/5c768e2f178e74e581ea62c43cad10c73e0eae9d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2022-01-01", "journal": + {"name": "Journal Fran\u00e7ais d''Ophtalmologie"}, "authors": [{"authorId": + "2148525479", "name": "R. Bunod"}, {"authorId": "2082636439", "name": "E. + Augstburger"}, {"authorId": "47618121", "name": "E. Brasnu"}, {"authorId": + "153572951", "name": "A. Labb\u00e9"}, {"authorId": "2053483552", "name": + "C. Baudouin"}]}, {"paperId": "5c768e2f178e74e581ea62c43cad10c73e0eae9d", + "externalIds": {"DOI": "10.1086/717306", "CorpusId": 245145134}, "corpusId": + 245145134, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c768e2f178e74e581ea62c43cad10c73e0eae9d", "title": "Artificial Antisemitism: Critical Theory in the Age of Datafication", "abstract": "This article is a critical genealogy of Tay, an artificial-intelligence chatbot that Microsoft released on Twitter in 2016, which was quickly hijacked @@ -8007,24 +9313,32 @@ interactions: as this article contends, addressing the uncanny embodiment and reflection of thought that is digital computation.", "venue": "Critical Inquiry", "year": 2022, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2022-01-01", "journal": {"volume": "48", "pages": "286 - 312", "name": "Critical - Inquiry"}, "authors": [{"authorId": "51030455", "name": "M. Handelman"}]}, - {"paperId": "a302e6d48d342ff06f260424ab37dcc9b553f975", "externalIds": {"DBLP": - "journals/jbd/KhalilP22", "DOI": "10.1186/s40537-022-00663-7", "CorpusId": - 245377339}, "url": "https://www.semanticscholar.org/paper/a302e6d48d342ff06f260424ab37dcc9b553f975", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2022-01-01", "journal": {"volume": "48", "pages": "286 + - 312", "name": "Critical Inquiry"}, "authors": [{"authorId": "51030455", + "name": "M. Handelman"}]}, {"paperId": "a302e6d48d342ff06f260424ab37dcc9b553f975", + "externalIds": {"DBLP": "journals/jbd/KhalilP22", "DOI": "10.1186/s40537-022-00663-7", + "CorpusId": 245377339}, "corpusId": 245377339, "publicationVenue": {"id": + "d60da343-ab92-4310-b3d7-2c0860287a9d", "name": "Journal of Big Data", "type": + "journal", "alternate_names": ["J Big Data", "Journal on Big Data"], "issn": + "2196-1115", "alternate_issns": ["2579-0048"], "url": "http://www.journalofbigdata.com/", + "alternate_urls": ["http://www.springer.com/computer/database+management+&+information+retrieval/journal/40537", + "http://techscience.com/JBD/index.html", "https://journalofbigdata.springeropen.com", + "https://journalofbigdata.springeropen.com/"]}, "url": "https://www.semanticscholar.org/paper/a302e6d48d342ff06f260424ab37dcc9b553f975", "title": "Transforming the generative pretrained transformer into augmented business text writer", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-022-00663-7", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-20", "journal": {"volume": "9", "name": "Journal of Big Data"}, "authors": [{"authorId": "88223633", "name": "Faisal Khalil"}, {"authorId": "1734512", "name": "G. Pipa"}]}, {"paperId": "b90c090f7928a78d85d952737488be1ef8587ae5", "externalIds": {"DBLP": "journals/corr/abs-2201-06657", "ArXiv": "2201.06657", - "DOI": "10.3390/info13010041", "CorpusId": 245360052}, "url": "https://www.semanticscholar.org/paper/b90c090f7928a78d85d952737488be1ef8587ae5", + "DOI": "10.3390/info13010041", "CorpusId": 245360052}, "corpusId": 245360052, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b90c090f7928a78d85d952737488be1ef8587ae5", "title": "A Literature Survey of Recent Advances in Chatbots", "abstract": "Chatbots are intelligent conversational computer systems designed to mimic human conversation to enable automated online guidance and support. The increased @@ -8037,49 +9351,62 @@ interactions: challenges and limitations of current work and make recommendations for future research investigation", "venue": "Inf.", "year": 2021, "referenceCount": 110, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-12-16", "journal": {"volume": "13", "pages": "41", "name": "Inf."}, - "authors": [{"authorId": "2146579424", "name": "Guendalina Caldarini"}, {"authorId": - "3184880", "name": "Sardar F. Jaf"}, {"authorId": "33944350", "name": "K. - McGarry"}]}, {"paperId": "67a5fb974d1a275e18d7b832d5bf0c2bba10a6f9", "externalIds": - {"DBLP": "journals/ce/HanL22", "DOI": "10.1016/j.compedu.2021.104395", "CorpusId": - 244824547}, "url": "https://www.semanticscholar.org/paper/67a5fb974d1a275e18d7b832d5bf0c2bba10a6f9", + "openAccessPdf": {"url": "https://www.mdpi.com/2078-2489/13/1/41/pdf?version=1642401608", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-12-16", "journal": {"volume": "13", "pages": + "41", "name": "Inf."}, "authors": [{"authorId": "2146579424", "name": "Guendalina + Caldarini"}, {"authorId": "3184880", "name": "Sardar F. Jaf"}, {"authorId": + "33944350", "name": "K. McGarry"}]}, {"paperId": "67a5fb974d1a275e18d7b832d5bf0c2bba10a6f9", + "externalIds": {"DBLP": "journals/ce/HanL22", "DOI": "10.1016/j.compedu.2021.104395", + "CorpusId": 244824547}, "corpusId": 244824547, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/67a5fb974d1a275e18d7b832d5bf0c2bba10a6f9", "title": "FAQ chatbot and inclusive learning in massive open online courses", "abstract": null, "venue": "Comput. Educ.", "year": 2021, "referenceCount": 49, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-12-01", "journal": {"volume": "179", "pages": "104395", "name": "Comput. - Educ."}, "authors": [{"authorId": "117887308", "name": "Song-Ae Han"}, {"authorId": - "50112472", "name": "Min Kyung Lee"}]}, {"paperId": "4c4a9d2f520111b88a402757d00a1fcb5c4599c6", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-12-01", "journal": {"volume": "179", "pages": "104395", + "name": "Comput. Educ."}, "authors": [{"authorId": "117887308", "name": "Song-Ae + Han"}, {"authorId": "50112472", "name": "Min Kyung Lee"}]}, {"paperId": "4c4a9d2f520111b88a402757d00a1fcb5c4599c6", "externalIds": {"DBLP": "books/sp/22/Nida-Rumelin22", "DOI": "10.1007/978-3-030-86144-5_10", - "CorpusId": 244563431}, "url": "https://www.semanticscholar.org/paper/4c4a9d2f520111b88a402757d00a1fcb5c4599c6", + "CorpusId": 244563431}, "corpusId": 244563431, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4c4a9d2f520111b88a402757d00a1fcb5c4599c6", "title": "Digital Humanism and the Limits of Artificial Intelligence", "abstract": null, "venue": "Perspectives on Digital Humanism", "year": 2021, "referenceCount": 10, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-11-24", "journal": {"pages": - "71-75"}, "authors": [{"authorId": "1404786979", "name": "J. Nida-R\u00fcmelin"}]}, - {"paperId": "9fccb62bfe51feddf9090147a90f9b3bc86201f1", "externalIds": {"DBLP": - "journals/snam/NajariSF22", "PubMedCentral": "8590628", "DOI": "10.1007/s13278-021-00800-9", - "CorpusId": 244120959, "PubMed": "34804252"}, "url": "https://www.semanticscholar.org/paper/9fccb62bfe51feddf9090147a90f9b3bc86201f1", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-030-86144-5_10.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-24", + "journal": {"pages": "71-75"}, "authors": [{"authorId": "1404786979", "name": + "J. Nida-R\u00fcmelin"}]}, {"paperId": "9fccb62bfe51feddf9090147a90f9b3bc86201f1", + "externalIds": {"DBLP": "journals/snam/NajariSF22", "PubMedCentral": "8590628", + "DOI": "10.1007/s13278-021-00800-9", "CorpusId": 244120959, "PubMed": "34804252"}, + "corpusId": 244120959, "publicationVenue": {"id": "cf210e7b-29b8-4380-b245-d78d8bea4d35", + "name": "Social Network Analysis and Mining", "type": "journal", "alternate_names": + ["Soc Netw Anal Min"], "issn": "1869-5450", "url": "https://www.springer.com/computer/database+management+&+information+retrieval/journal/13278", + "alternate_urls": ["https://link.springer.com/journal/13278"]}, "url": "https://www.semanticscholar.org/paper/9fccb62bfe51feddf9090147a90f9b3bc86201f1", "title": "GANBOT: a GAN-based framework for social bot detection", "abstract": null, "venue": "Social Network Analysis and Mining", "year": 2021, "referenceCount": 60, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13278-021-00800-9.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-14", "journal": {"volume": "12", "name": "Social Network Analysis and Mining"}, "authors": [{"authorId": "103997360", "name": "S. Najari"}, {"authorId": "38708773", "name": "Mostafa Salehi"}, {"authorId": "2633697", "name": "R. Farahbakhsh"}]}, {"paperId": "c87a9e2fc2d1c4a8d48c10718601f88c48dfa2f0", "externalIds": {"DBLP": "journals/corr/abs-2111-07036", "ArXiv": "2111.07036", "DOI": "10.1609/aaai.v36i11.21559", - "CorpusId": 244116895}, "url": "https://www.semanticscholar.org/paper/c87a9e2fc2d1c4a8d48c10718601f88c48dfa2f0", + "CorpusId": 244116895}, "corpusId": 244116895, "publicationVenue": {"id": + "bdc2e585-4e48-4e36-8af1-6d859763d405", "name": "AAAI Conference on Artificial + Intelligence", "type": "conference", "alternate_names": ["National Conference + on Artificial Intelligence", "National Conf Artif Intell", "AAAI Conf Artif + Intell", "AAAI"], "url": "http://www.aaai.org/"}, "url": "https://www.semanticscholar.org/paper/c87a9e2fc2d1c4a8d48c10718601f88c48dfa2f0", "title": "Introducing Variational Autoencoders to High School Students", "abstract": "Generative Artificial Intelligence (AI) models are a compelling way to introduce K-12 students to AI education using an artistic medium, and hence have drawn @@ -8099,7 +9426,8 @@ interactions: We found that our approach was effective in teaching students about a novel AI concept.", "venue": "AAAI Conference on Artificial Intelligence", "year": 2021, "referenceCount": 51, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/21559/21308", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-11-13", "journal": {"pages": "12801-12809"}, @@ -8107,40 +9435,38 @@ interactions: "51134075", "name": "Safinah Ali"}, {"authorId": "2065304843", "name": "C. Breazeal"}]}, {"paperId": "463eebd069a58d9379b0b9567f9b0fc6b004fc7c", "externalIds": {"DBLP": "journals/mta/BoussakssouEE22", "DOI": "10.1007/s11042-021-11709-y", - "CorpusId": 243840072}, "url": "https://www.semanticscholar.org/paper/463eebd069a58d9379b0b9567f9b0fc6b004fc7c", + "CorpusId": 243840072}, "corpusId": 243840072, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/463eebd069a58d9379b0b9567f9b0fc6b004fc7c", "title": "Chatbot in Arabic language using seq to seq model", "abstract": null, "venue": "Multim. Tools Appl.", "year": 2021, "referenceCount": 8, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-06", "journal": - {"volume": "81", "pages": "2859-2871", "name": "Multimedia Tools and Applications"}, - "authors": [{"authorId": "1712211978", "name": "M. Boussakssou"}, {"authorId": - "2011904", "name": "H. Ezzikouri"}, {"authorId": "90643624", "name": "M. Erritali"}]}, - {"paperId": "4b8475e0ae22ddf56d3d061c8260fabd724aa4de", "externalIds": {"DBLP": - "journals/asc/DikshitPS22", "DOI": "10.1016/j.asoc.2021.108080", "CorpusId": - 244542721}, "url": "https://www.semanticscholar.org/paper/4b8475e0ae22ddf56d3d061c8260fabd724aa4de", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-11-06", "journal": {"volume": "81", "pages": "2859-2871", "name": "Multimedia + Tools and Applications"}, "authors": [{"authorId": "1712211978", "name": "M. + Boussakssou"}, {"authorId": "2011904", "name": "H. Ezzikouri"}, {"authorId": + "90643624", "name": "M. Erritali"}]}, {"paperId": "4b8475e0ae22ddf56d3d061c8260fabd724aa4de", + "externalIds": {"DBLP": "journals/asc/DikshitPS22", "DOI": "10.1016/j.asoc.2021.108080", + "CorpusId": 244542721}, "corpusId": 244542721, "publicationVenue": {"id": + "b1994124-f1e8-4f96-a165-b6f19a04fe7e", "name": "Applied Soft Computing", + "type": "journal", "alternate_names": ["Appl Soft Comput"], "issn": "1568-4946", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/621920/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/applied-soft-computing", + "http://www.sciencedirect.com/science/journal/15684946"]}, "url": "https://www.semanticscholar.org/paper/4b8475e0ae22ddf56d3d061c8260fabd724aa4de", "title": "Artificial neural networks in drought prediction in the 21st century-A scientometric analysis", "abstract": null, "venue": "Applied Soft Computing", "year": 2021, "referenceCount": 122, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-11-01", "journal": {"volume": - "114", "pages": "108080", "name": "Appl. Soft Comput."}, "authors": [{"authorId": - "108523304", "name": "Abhirup Dikshit"}, {"authorId": "143620129", "name": - "B. Pradhan"}, {"authorId": "1622837022", "name": "M. Santosh"}]}, {"paperId": - "5d8aac87d879aed91248636ca0be262dde27f9e4", "externalIds": {"DBLP": "journals/wpc/KuipersP22", - "DOI": "10.1007/s11277-021-09288-0", "CorpusId": 240243277}, "url": "https://www.semanticscholar.org/paper/5d8aac87d879aed91248636ca0be262dde27f9e4", - "title": "Journey of Artificial Intelligence", "abstract": null, "venue": - "Wirel. Pers. Commun.", "year": 2021, "referenceCount": 16, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-10-29", "journal": {"volume": "123", "pages": "3275-3290", "name": "Wirel. - Pers. Commun."}, "authors": [{"authorId": "2144283", "name": "B. Kuipers"}, - {"authorId": "2121476948", "name": "Ramjee Prasad"}]}, {"paperId": "4695282c824addc031fee351d71711abb0b7bc2a", - "externalIds": {"ArXiv": "2110.09036", "DBLP": "journals/corr/abs-2110-09036", - "DOI": "10.1017/s1351324921000358", "CorpusId": 239016203}, "url": "https://www.semanticscholar.org/paper/4695282c824addc031fee351d71711abb0b7bc2a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-01", + "journal": {"volume": "114", "pages": "108080", "name": "Appl. Soft Comput."}, + "authors": [{"authorId": "108523304", "name": "Abhirup Dikshit"}, {"authorId": + "143620129", "name": "B. Pradhan"}, {"authorId": "1622837022", "name": "M. + Santosh"}]}, {"paperId": "4695282c824addc031fee351d71711abb0b7bc2a", "externalIds": + {"ArXiv": "2110.09036", "DBLP": "journals/corr/abs-2110-09036", "DOI": "10.1017/s1351324921000358", + "CorpusId": 239016203}, "corpusId": 239016203, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4695282c824addc031fee351d71711abb0b7bc2a", "title": "Ranking Facts for Explaining Answers to Elementary Science Questions", "abstract": "\n In multiple-choice exams, students select one answer from among typically four choices and can explain why they made that particular @@ -8169,7 +9495,8 @@ interactions: some variants of BERT-based reranking models; and (4) the human-engineered features make it an interpretable machine learning model for the task.", "venue": "Natural Language Engineering", "year": 2021, "referenceCount": 41, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/2110.09036", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-18", @@ -8178,7 +9505,7 @@ interactions: "I. Mulang"}, {"authorId": "2071756650", "name": "Soeren Auer"}]}, {"paperId": "a0b777b25cdf0fc992568ca52a5c7bebf1ee987f", "externalIds": {"ArXiv": "2110.08975", "DBLP": "journals/corr/abs-2110-08975", "DOI": "10.1145/3505245", "CorpusId": - 239016662}, "url": "https://www.semanticscholar.org/paper/a0b777b25cdf0fc992568ca52a5c7bebf1ee987f", + 239016662}, "corpusId": 239016662, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0b777b25cdf0fc992568ca52a5c7bebf1ee987f", "title": "Deep Transfer Learning & Beyond: Transformer Language Models in Information Systems Research", "abstract": "AI is widely thought to be poised to transform business, yet current perceptions of the scope of this transformation @@ -8199,14 +9526,16 @@ interactions: like language user interfaces, that may offer even greater potential for future IS research.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 213, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-10-18", - "journal": {"volume": "54", "pages": "1 - 35", "name": "ACM Computing Surveys - (CSUR)"}, "authors": [{"authorId": "7284628", "name": "Ross Gruetzemacher"}, - {"authorId": "1740199", "name": "D. Paradice"}]}, {"paperId": "eb4cb63c65d0bb624f2fc366a594cb5cdc76d4e4", - "externalIds": {"DBLP": "journals/es/AkhoonSASAAL22", "MAG": "3205656656", - "DOI": "10.1111/exsy.12831", "CorpusId": 244611089}, "url": "https://www.semanticscholar.org/paper/eb4cb63c65d0bb624f2fc366a594cb5cdc76d4e4", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3505245", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2021-10-18", "journal": {"volume": "54", "pages": "1 - 35", "name": "ACM + Computing Surveys (CSUR)"}, "authors": [{"authorId": "7284628", "name": "Ross + Gruetzemacher"}, {"authorId": "1740199", "name": "D. Paradice"}]}, {"paperId": + "eb4cb63c65d0bb624f2fc366a594cb5cdc76d4e4", "externalIds": {"DBLP": "journals/es/AkhoonSASAAL22", + "MAG": "3205656656", "DOI": "10.1111/exsy.12831", "CorpusId": 244611089}, + "corpusId": 244611089, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb4cb63c65d0bb624f2fc366a594cb5cdc76d4e4", "title": "High performance accelerators for deep neural networks: A review", "abstract": "The availability of huge structured and unstructured data, advanced highly dense memory and high performance computing machines have provided @@ -8234,17 +9563,22 @@ interactions: in these accelerator designs, various opportunities and challenges for the future research.", "venue": "Expert Syst. J. Knowl. Eng.", "year": 2021, "referenceCount": 79, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-10-11", "journal": {"volume": "39", "name": "Expert Systems"}, "authors": - [{"authorId": "2142045426", "name": "Mohd Saqib Akhoon"}, {"authorId": "2612367", - "name": "S. A. Suandi"}, {"authorId": "2069086624", "name": "Abdullah Alshahrani"}, - {"authorId": "145184685", "name": "Abdul-Malik H. Y. Saad"}, {"authorId": - "2519623", "name": "F. Albogamy"}, {"authorId": "2150362084", "name": "Mohd - Zaid Bin Abdullah"}, {"authorId": "1691049", "name": "S. Loan"}]}, {"paperId": - "3fb07e4a6a82306af506f06808837f2d974b7c14", "externalIds": {"DBLP": "journals/csur/TelikaniTBG22", - "DOI": "10.1145/3467477", "CorpusId": 238260766}, "url": "https://www.semanticscholar.org/paper/3fb07e4a6a82306af506f06808837f2d974b7c14", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-10-11", "journal": {"volume": "39", "name": + "Expert Systems"}, "authors": [{"authorId": "2142045426", "name": "Mohd Saqib + Akhoon"}, {"authorId": "2612367", "name": "S. A. Suandi"}, {"authorId": "2069086624", + "name": "Abdullah Alshahrani"}, {"authorId": "145184685", "name": "Abdul-Malik + H. Y. Saad"}, {"authorId": "2519623", "name": "F. Albogamy"}, {"authorId": + "2150362084", "name": "Mohd Zaid Bin Abdullah"}, {"authorId": "1691049", "name": + "S. Loan"}]}, {"paperId": "3fb07e4a6a82306af506f06808837f2d974b7c14", "externalIds": + {"DBLP": "journals/csur/TelikaniTBG22", "DOI": "10.1145/3467477", "CorpusId": + 238260766}, "corpusId": 238260766, "publicationVenue": {"id": "7b2adce0-d53f-49d6-8784-b0645604fe62", + "name": "ACM Computing Surveys", "type": "journal", "alternate_names": ["ACM + Comput Surv"], "issn": "0360-0300", "url": "http://www.acm.org/pubs/surveys/", + "alternate_urls": ["http://portal.acm.org/csur", "https://csur.acm.org/", + "http://csur.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/3fb07e4a6a82306af506f06808837f2d974b7c14", "title": "Evolutionary Machine Learning: A Survey", "abstract": "Evolutionary Computation (EC) approaches are inspired by nature and solve optimization problems in a stochastic manner. They can offer a reliable and effective approach @@ -8265,65 +9599,81 @@ interactions: of three aspects: problem formulation, search mechanisms, and fitness value computation. We also consider open issues and challenges that should be addressed in future work.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": - 262, "citationCount": 23, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-10-04", "journal": {"volume": "54", "pages": "1 - 35", "name": "ACM - Computing Surveys (CSUR)"}, "authors": [{"authorId": "23317197", "name": "A. - Telikani"}, {"authorId": "19234841", "name": "A. Tahmassebi"}, {"authorId": - "2507766", "name": "W. Banzhaf"}, {"authorId": "1764455", "name": "A. Gandomi"}]}, - {"paperId": "762cbb00d63b6eb3f429391e4c7fd016c636d195", "externalIds": {"DBLP": - "journals/electronicmarkets/HornungS22", "MAG": "3199046025", "DOI": "10.1007/s12525-021-00493-0", - "CorpusId": 240534646}, "url": "https://www.semanticscholar.org/paper/762cbb00d63b6eb3f429391e4c7fd016c636d195", + 262, "citationCount": 24, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3467477", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2021-10-04", "journal": {"volume": "54", "pages": "1 - + 35", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "23317197", + "name": "A. Telikani"}, {"authorId": "19234841", "name": "A. Tahmassebi"}, + {"authorId": "2507766", "name": "W. Banzhaf"}, {"authorId": "1764455", "name": + "A. Gandomi"}]}, {"paperId": "762cbb00d63b6eb3f429391e4c7fd016c636d195", "externalIds": + {"DBLP": "journals/electronicmarkets/HornungS22", "MAG": "3199046025", "DOI": + "10.1007/s12525-021-00493-0", "CorpusId": 240534646}, "corpusId": 240534646, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/762cbb00d63b6eb3f429391e4c7fd016c636d195", "title": "AI invading the workplace: negative emotions towards the organizational use of personal virtual assistants", "abstract": null, "venue": "Electron. Mark.", "year": 2021, "referenceCount": 97, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Psychology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-09-18", "journal": {"volume": "32", "pages": "123-138", "name": "Electron. - Mark."}, "authors": [{"authorId": "11004408", "name": "Olivia Hornung"}, {"authorId": - "1715753", "name": "Stefan Smolnik"}]}, {"paperId": "bb048b91adcc01b7c013a29f9716c3c07d947e98", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12525-021-00493-0.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-18", "journal": + {"volume": "32", "pages": "123-138", "name": "Electron. Mark."}, "authors": + [{"authorId": "11004408", "name": "Olivia Hornung"}, {"authorId": "1715753", + "name": "Stefan Smolnik"}]}, {"paperId": "bb048b91adcc01b7c013a29f9716c3c07d947e98", "externalIds": {"DBLP": "journals/aiethics/Saetra22", "DOI": "10.1007/s43681-021-00092-x", - "CorpusId": 248866393}, "url": "https://www.semanticscholar.org/paper/bb048b91adcc01b7c013a29f9716c3c07d947e98", + "CorpusId": 248866393}, "corpusId": 248866393, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bb048b91adcc01b7c013a29f9716c3c07d947e98", "title": "Robotomorphy", "abstract": null, "venue": "AI Ethics", "year": 2021, "referenceCount": 103, "citationCount": 1, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-021-00092-x.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-04", "journal": {"volume": "2", "pages": "5-13", "name": "AI Ethics"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "234ce45f13244d28878a38d231f638382012cf74", "externalIds": {"DBLP": "journals/ijsr/GrassiRS22", "ArXiv": "2108.02174", "PubMedCentral": "8932468", "DOI": "10.1007/s12369-022-00868-z", - "CorpusId": 236912590, "PubMed": "35341063"}, "url": "https://www.semanticscholar.org/paper/234ce45f13244d28878a38d231f638382012cf74", + "CorpusId": 236912590, "PubMed": "35341063"}, "corpusId": 236912590, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/234ce45f13244d28878a38d231f638382012cf74", "title": "Knowledge-Grounded Dialogue Flow Management for Social Robots and Conversational Agents", "abstract": null, "venue": "Int. J. Soc. Robotics", "year": 2021, "referenceCount": 56, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2021-08-04", "journal": {"volume": "14", "pages": "1273 - - 1293", "name": "International Journal of Social Robotics"}, "authors": [{"authorId": - "1830764810", "name": "Lucrezia Grassi"}, {"authorId": "2688386", "name": - "C. Recchiuto"}, {"authorId": "1761802", "name": "A. Sgorbissa"}]}, {"paperId": - "9177582492b507db98392a187b8257ea8b2c80cd", "externalIds": {"ArXiv": "2106.11010", - "MAG": "3161022871", "DBLP": "journals/corr/abs-2106-11010", "DOI": "10.1016/j.newast.2022.101850", - "CorpusId": 235489922}, "url": "https://www.semanticscholar.org/paper/9177582492b507db98392a187b8257ea8b2c80cd", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12369-022-00868-z.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-04", + "journal": {"volume": "14", "pages": "1273 - 1293", "name": "International + Journal of Social Robotics"}, "authors": [{"authorId": "1830764810", "name": + "Lucrezia Grassi"}, {"authorId": "2688386", "name": "C. Recchiuto"}, {"authorId": + "1761802", "name": "A. Sgorbissa"}]}, {"paperId": "9177582492b507db98392a187b8257ea8b2c80cd", + "externalIds": {"ArXiv": "2106.11010", "MAG": "3161022871", "DBLP": "journals/corr/abs-2106-11010", + "DOI": "10.1016/j.newast.2022.101850", "CorpusId": 235489922}, "corpusId": + 235489922, "publicationVenue": {"id": "a6a0cdb7-afc4-41a4-8456-79392388ad46", + "name": "New Astronomy", "type": "journal", "alternate_names": ["New Astron"], + "issn": "1384-1076", "url": "http://journals.elsevier.com/13841076/new-astronomy/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/13841076"]}, + "url": "https://www.semanticscholar.org/paper/9177582492b507db98392a187b8257ea8b2c80cd", "title": "Three-body problem - from Newton to supercomputer plus machine learning", "abstract": null, "venue": "New Astronomy", "year": 2021, "referenceCount": - 68, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": - "abs/2106.11010", "name": "ArXiv"}, "authors": [{"authorId": "47076615", "name": - "S. Liao"}, {"authorId": "2116432312", "name": "Xiaoming Li"}, {"authorId": + 68, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": + {"volume": "abs/2106.11010", "name": "ArXiv"}, "authors": [{"authorId": "47076615", + "name": "S. Liao"}, {"authorId": "2116432312", "name": "Xiaoming Li"}, {"authorId": "2124971289", "name": "Yu Yang"}]}, {"paperId": "389d9a31b7c221be63433d50dd9c8125cd8fb6f9", "externalIds": {"ArXiv": "2105.04642", "DBLP": "journals/ral/BanREWHKIMR22", - "DOI": "10.1109/lra.2022.3156856", "CorpusId": 247304174}, "url": "https://www.semanticscholar.org/paper/389d9a31b7c221be63433d50dd9c8125cd8fb6f9", + "DOI": "10.1109/lra.2022.3156856", "CorpusId": 247304174}, "corpusId": 247304174, + "publicationVenue": {"id": "93c335b7-edf4-45f5-8ddc-7c5835154945", "name": + "IEEE Robotics and Automation Letters", "alternate_names": ["IEEE Robot Autom + Lett"], "issn": "2377-3766", "url": "https://www.ieee.org/membership-catalog/productdetail/showProductDetailPage.html?product=PER481-ELE", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=7083369"]}, + "url": "https://www.semanticscholar.org/paper/389d9a31b7c221be63433d50dd9c8125cd8fb6f9", "title": "SUPR-GAN: SUrgical PRediction GAN for Event Anticipation in Laparoscopic and Robotic Surgery", "abstract": "Comprehension of surgical workflow is the foundation upon which artificial intelligence (AI) and machine learning (ML) @@ -8341,7 +9691,8 @@ interactions: Furthermore, we conduct a survey, asking 16 surgeons of different specialties and educational levels to qualitative evaluate predicted surgery phases.", "venue": "IEEE Robotics and Automation Letters", "year": 2021, "referenceCount": - 64, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, + 64, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/2105.04642", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-10", @@ -8354,7 +9705,12 @@ interactions: Iwaki"}, {"authorId": "11009166", "name": "O. Meireles"}, {"authorId": "145944286", "name": "D. Rus"}]}, {"paperId": "4d5247af0cc487ad70813893ef945d46b2a34c11", "externalIds": {"MAG": "3159574466", "DOI": "10.1086/715162", "CorpusId": - 109936713}, "url": "https://www.semanticscholar.org/paper/4d5247af0cc487ad70813893ef945d46b2a34c11", + 109936713}, "corpusId": 109936713, "publicationVenue": {"id": "73ac5df7-f2d4-4b95-96b2-69d1726eaeec", + "name": "Journal of Politics", "type": "journal", "alternate_names": ["J Politics", + "The Journal of Politics"], "issn": "0022-3816", "url": "http://www3.interscience.wiley.com/journal/118502557/home", + "alternate_urls": ["https://www.jstor.org/journal/jpolitics", "https://www.journals.uchicago.edu/loi/jop", + "http://www.thejournalofpolitics.org/", "http://www.jstor.org/journals/00223816.html", + "https://www.journals.uchicago.edu/toc/jop/current"]}, "url": "https://www.semanticscholar.org/paper/4d5247af0cc487ad70813893ef945d46b2a34c11", "title": "Word Embeddings: What Works, What Doesn\u2019t, and How to Tell the Difference for Applied Research", "abstract": "Word embeddings are becoming popular for political science research, yet we know little about their properties @@ -8370,16 +9726,20 @@ interactions: available pretrained embeddings perform at a level close to\u2014or surpassing\u2014both human coders and more complicated locally fit models. For completeness, we provide best practice advice for cases where local fitting is required.", - "venue": "Journal of Politics", "year": 2021, "referenceCount": 77, "citationCount": - 41, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-05-06", "journal": {"volume": - "84", "pages": "101 - 115", "name": "The Journal of Politics"}, "authors": - [{"authorId": "2067975964", "name": "Pedro L. Rodriguez"}, {"authorId": "22267378", - "name": "A. Spirling"}]}, {"paperId": "99095baae594e54b25eeb234efbf35b1242faf5f", + "venue": "Journal of Politics", "year": 2021, "referenceCount": 69, "citationCount": + 42, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-06", + "journal": {"volume": "84", "pages": "101 - 115", "name": "The Journal of + Politics"}, "authors": [{"authorId": "2067975964", "name": "Pedro L. Rodriguez"}, + {"authorId": "22267378", "name": "A. Spirling"}]}, {"paperId": "99095baae594e54b25eeb234efbf35b1242faf5f", "externalIds": {"DBLP": "journals/csur/DunneMH21", "MAG": "3159583069", "DOI": - "10.1145/3447242", "CorpusId": 235507346}, "url": "https://www.semanticscholar.org/paper/99095baae594e54b25eeb234efbf35b1242faf5f", + "10.1145/3447242", "CorpusId": 235507346}, "corpusId": 235507346, "publicationVenue": + {"id": "7b2adce0-d53f-49d6-8784-b0645604fe62", "name": "ACM Computing Surveys", + "type": "journal", "alternate_names": ["ACM Comput Surv"], "issn": "0360-0300", + "url": "http://www.acm.org/pubs/surveys/", "alternate_urls": ["http://portal.acm.org/csur", + "https://csur.acm.org/", "http://csur.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/99095baae594e54b25eeb234efbf35b1242faf5f", "title": "A Survey of Ambient Intelligence", "abstract": "Ambient Intelligence (AmI) is the application and embedding of artificial intelligence into everyday environments to seamlessly provide assistive and predictive support in a multitude @@ -8399,15 +9759,21 @@ interactions: and the technical layperson into the topic of AmI and identifies notable opportunities for further research.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 110, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-05-03", "journal": {"volume": "54", "pages": "1 - 27", "name": "ACM - Computing Surveys (CSUR)"}, "authors": [{"authorId": "116875611", "name": - "R. Dunne"}, {"authorId": "2057160930", "name": "Tim Morris"}, {"authorId": - "1749047", "name": "S. Harper"}]}, {"paperId": "bfdfd83ddcfa5763ef44895047c0e3ee90e28d85", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-05-03", "journal": {"volume": "54", "pages": + "1 - 27", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": + "116875611", "name": "R. Dunne"}, {"authorId": "2057160930", "name": "Tim + Morris"}, {"authorId": "1749047", "name": "S. Harper"}]}, {"paperId": "bfdfd83ddcfa5763ef44895047c0e3ee90e28d85", "externalIds": {"DBLP": "journals/corr/abs-2104-13983", "ArXiv": "2104.13983", - "DOI": "10.1145/3546790.3546806", "CorpusId": 233444269}, "url": "https://www.semanticscholar.org/paper/bfdfd83ddcfa5763ef44895047c0e3ee90e28d85", + "DOI": "10.1145/3546790.3546806", "CorpusId": 233444269}, "corpusId": 233444269, + "publicationVenue": {"id": "cfc9d2e1-32a5-4ecb-b6a6-c86b494b3143", "name": + "International Conference on Systems", "type": "conference", "alternate_names": + ["Int Conf Neuromorphic Syst", "Int Conf Intell Control Autom Sci", "ICONS", + "International Conference on Neuromorphic Systems", "Int Conf Syst", "International + Conference on Intelligent Control and Automation Science"], "url": "https://www.iaria.org/conferences/ICONS.html"}, + "url": "https://www.semanticscholar.org/paper/bfdfd83ddcfa5763ef44895047c0e3ee90e28d85", "title": "Neuromorphic Computing is Turing-Complete", "abstract": "Neuromorphic computing is a non-von Neumann computing paradigm that performs computation by emulating the human brain. Neuromorphic systems are extremely energy-efficient @@ -8429,29 +9795,42 @@ interactions: (i.e., composition, primitive recursion and minimization operators). Given that the \u03bc-recursive functions and operators are precisely the ones that can be computed using a Turing machine, this work establishes the Turing-completeness - of neuromorphic computing.", "venue": "ICONS", "year": 2021, "referenceCount": - 57, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": - "2021-04-28", "journal": {"name": "Proceedings of the International Conference - on Neuromorphic Systems 2022"}, "authors": [{"authorId": "65805823", "name": - "Prasanna Date"}, {"authorId": "2318902", "name": "Catherine D. Schuman"}, - {"authorId": "40526428", "name": "Bill Kay"}, {"authorId": "1771895", "name": - "T. Potok"}]}, {"paperId": "e470e002ec39fad1dbf5df1bd9a8b9d55123ed42", "externalIds": - {"DBLP": "journals/sqj/Bozic22", "MAG": "3157483947", "DOI": "10.1007/S11219-020-09544-9", - "CorpusId": 235576295}, "url": "https://www.semanticscholar.org/paper/e470e002ec39fad1dbf5df1bd9a8b9d55123ed42", + of neuromorphic computing.", "venue": "International Conference on Systems", + "year": 2021, "referenceCount": 57, "citationCount": 7, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2104.13983", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Book"], "publicationDate": "2021-04-28", "journal": {"name": "Proceedings + of the International Conference on Neuromorphic Systems 2022"}, "authors": + [{"authorId": "65805823", "name": "Prasanna Date"}, {"authorId": "2318902", + "name": "Catherine D. Schuman"}, {"authorId": "40526428", "name": "Bill Kay"}, + {"authorId": "1771895", "name": "T. Potok"}]}, {"paperId": "e470e002ec39fad1dbf5df1bd9a8b9d55123ed42", + "externalIds": {"DBLP": "journals/sqj/Bozic22", "MAG": "3157483947", "DOI": + "10.1007/S11219-020-09544-9", "CorpusId": 235576295}, "corpusId": 235576295, + "publicationVenue": {"id": "f4c0fba6-8d83-4a73-aaa4-2ad01918304e", "name": + "Software quality journal", "type": "journal", "alternate_names": ["Softw + Qual J", "Software Quality Journal", "Softw qual j"], "issn": "0963-9314", + "url": "https://link.springer.com/journal/11219"}, "url": "https://www.semanticscholar.org/paper/e470e002ec39fad1dbf5df1bd9a8b9d55123ed42", "title": "Ontology-based metamorphic testing for chatbots", "abstract": null, "venue": "Software quality journal", "year": 2021, "referenceCount": 43, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-27", "journal": - {"volume": "30", "pages": "227-251", "name": "Software Quality Journal"}, - "authors": [{"authorId": "40610638", "name": "Josip Bozic"}]}, {"paperId": - "1275ebd9a5596053460d2d73793ccc648249f7e5", "externalIds": {"ArXiv": "2106.15515", - "MAG": "3162982177", "DBLP": "journals/corr/abs-2106-15515", "DOI": "10.31234/OSF.IO/3ZBNJ", - "CorpusId": 235669795}, "url": "https://www.semanticscholar.org/paper/1275ebd9a5596053460d2d73793ccc648249f7e5", + 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s11219-020-09544-9.pdf", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-04-27", "journal": {"volume": "30", "pages": "227-251", "name": "Software + Quality Journal"}, "authors": [{"authorId": "40610638", "name": "Josip Bozic"}]}, + {"paperId": "1275ebd9a5596053460d2d73793ccc648249f7e5", "externalIds": {"ArXiv": + "2106.15515", "MAG": "3162982177", "DBLP": "journals/corr/abs-2106-15515", + "DOI": "10.31234/OSF.IO/3ZBNJ", "CorpusId": 235669795}, "corpusId": 235669795, + "publicationVenue": {"id": "3c6563d5-4dbc-4e59-b361-921f097b6afd", "name": + "Biological Journal of the Linnean Society", "type": "journal", "alternate_names": + ["Biological J Linn Soc", "Biological Journal of The Linnean Society"], "issn": + "0024-4066", "url": "http://www.sciencedirect.com/science/journal/00244066", + "alternate_urls": ["http://www3.interscience.wiley.com/journal/118502921/home", + "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1095-8312"]}, "url": + "https://www.semanticscholar.org/paper/1275ebd9a5596053460d2d73793ccc648249f7e5", "title": "What Is Consciousness? Artificial Intelligence, Real Intelligence, Quantum Mind, And Qualia", "abstract": "We approach the question \"What is Consciousness?\" in a new way, not as Descartes'' \"systematic doubt\", but @@ -8476,7 +9855,8 @@ interactions: and do jury-rig. Computers cannot. (5) Beyond familiar quantum computers, we discuss the potentialities of Trans-Turing-Systems.", "venue": "Biological Journal of the Linnean Society", "year": 2021, "referenceCount": 86, "citationCount": - 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", + 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://psyarxiv.com/3zbnj/download", "status": null}, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -8484,7 +9864,13 @@ interactions: "ArXiv"}, "authors": [{"authorId": "143980023", "name": "S. Kauffman"}, {"authorId": "1763293", "name": "A. Roli"}]}, {"paperId": "b55e863998f1adcdfe578ca975ef82e917ae52dd", "externalIds": {"PubMedCentral": "9172850", "MAG": "3164172061", "DOI": "10.3389/fpsyg.2022.711821", - "CorpusId": 236761493, "PubMed": "35686061"}, "url": "https://www.semanticscholar.org/paper/b55e863998f1adcdfe578ca975ef82e917ae52dd", + "CorpusId": 236761493, "PubMed": "35686061"}, "corpusId": 236761493, "publicationVenue": + {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", + "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", + "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": + ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", + "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, + "url": "https://www.semanticscholar.org/paper/b55e863998f1adcdfe578ca975ef82e917ae52dd", "title": "Direct Human-AI Comparison in the Animal-AI Environment", "abstract": "Artificial Intelligence is making rapid and remarkable progress in the development of more sophisticated and powerful systems. However, the acknowledgement of @@ -8506,19 +9892,21 @@ interactions: children and AIs performed poorly on tool-use tasks, suggesting that these tests are challenging for both biological and non-biological machines.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 114, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-03-18", "journal": {"volume": "13", "name": "Frontiers - in Psychology"}, "authors": [{"authorId": "1397160953", "name": "Konstantinos - Voudouris"}, {"authorId": "143966629", "name": "Matthew Crosby"}, {"authorId": - "102928633", "name": "Benjamin Beyret"}, {"authorId": "1398777358", "name": - "J. Hern\u00e1ndez-Orallo"}, {"authorId": "1757629", "name": "M. Shanahan"}, - {"authorId": "4626726", "name": "Marta Halina"}, {"authorId": "6643500", "name": - "L. Cheke"}]}, {"paperId": "0f4de1e516adb5292bd88faa9a37aded919f424d", "externalIds": - {"DBLP": "journals/corr/abs-2210-15098", "ArXiv": "2210.15098", "MAG": "3161874663", - "DOI": "10.31234/OSF.IO/R3FCX", "CorpusId": 236757803}, "url": "https://www.semanticscholar.org/paper/0f4de1e516adb5292bd88faa9a37aded919f424d", + 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fpsyg.2022.711821/pdf", "status": + null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-18", "journal": + {"volume": "13", "name": "Frontiers in Psychology"}, "authors": [{"authorId": + "1397160953", "name": "Konstantinos Voudouris"}, {"authorId": "143966629", + "name": "Matthew Crosby"}, {"authorId": "102928633", "name": "Benjamin Beyret"}, + {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}, {"authorId": + "1757629", "name": "M. Shanahan"}, {"authorId": "4626726", "name": "Marta + Halina"}, {"authorId": "6643500", "name": "L. Cheke"}]}, {"paperId": "0f4de1e516adb5292bd88faa9a37aded919f424d", + "externalIds": {"DBLP": "journals/corr/abs-2210-15098", "ArXiv": "2210.15098", + "MAG": "3161874663", "DOI": "10.31234/OSF.IO/R3FCX", "CorpusId": 236757803}, + "corpusId": 236757803, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f4de1e516adb5292bd88faa9a37aded919f424d", "title": "Natural Language Syntax Complies with the Free-Energy Principle", "abstract": "Natural language syntax yields an unbounded array of hierarchically structured expressions. We claim that these are used in the service of active @@ -8538,7 +9926,8 @@ interactions: with the FEP, marshalling evidence from theoretical linguistics and psycholinguistics to ground core principles of efficient syntactic computation within active inference.", "venue": "ArXiv", "year": 2021, "referenceCount": 215, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://psyarxiv.com/r3fcx/download", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-11", "journal": {"volume": @@ -8546,18 +9935,24 @@ interactions: "Elliot Murphy"}, {"authorId": "145448258", "name": "E. Holmes"}, {"authorId": "70438543", "name": "K. Friston"}]}, {"paperId": "9e9816d1c6bec2f4fd2a5c21680d39a660bdfb96", "externalIds": {"DBLP": "journals/ais/Wojtczak22", "MAG": "3131164195", "DOI": - "10.1007/S00146-021-01147-7", "CorpusId": 233965401}, "url": "https://www.semanticscholar.org/paper/9e9816d1c6bec2f4fd2a5c21680d39a660bdfb96", + "10.1007/S00146-021-01147-7", "CorpusId": 233965401}, "corpusId": 233965401, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9e9816d1c6bec2f4fd2a5c21680d39a660bdfb96", "title": "Endowing Artificial Intelligence with legal subjectivity", "abstract": null, "venue": "AI Soc.", "year": 2021, "referenceCount": 64, "citationCount": - 5, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-02-16", "journal": {"volume": "37", "pages": "205-213", - "name": "AI & SOCIETY"}, "authors": [{"authorId": "2089470251", "name": "Sylwia - Wojtczak"}]}, {"paperId": "31390c81909c7409d89c4d8ebc6def3a392458fa", "externalIds": - {"DBLP": "journals/csur/WangSW21", "DOI": "10.1145/3439723", "CorpusId": 233354141}, - "url": "https://www.semanticscholar.org/paper/31390c81909c7409d89c4d8ebc6def3a392458fa", + 5, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s00146-021-01147-7.pdf", "status": + null}, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-16", "journal": + {"volume": "37", "pages": "205-213", "name": "AI & SOCIETY"}, "authors": [{"authorId": + "2089470251", "name": "Sylwia Wojtczak"}]}, {"paperId": "31390c81909c7409d89c4d8ebc6def3a392458fa", + "externalIds": {"DBLP": "journals/csur/WangSW21", "DOI": "10.1145/3439723", + "CorpusId": 233354141}, "corpusId": 233354141, "publicationVenue": {"id": + "7b2adce0-d53f-49d6-8784-b0645604fe62", "name": "ACM Computing Surveys", "type": + "journal", "alternate_names": ["ACM Comput Surv"], "issn": "0360-0300", "url": + "http://www.acm.org/pubs/surveys/", "alternate_urls": ["http://portal.acm.org/csur", + "https://csur.acm.org/", "http://csur.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/31390c81909c7409d89c4d8ebc6def3a392458fa", "title": "Generative Adversarial Networks in Computer Vision", "abstract": "Generative adversarial networks (GANs) have been extensively studied in the past few years. Arguably their most significant impact has been in the area @@ -8583,7 +9978,8 @@ interactions: success along with some suggestions for future research directions. Codes related to the GAN-variants studied in this work is summarized on https://github.com/sheqi/GAN_Review.", "venue": "ACM Computing Surveys", "year": 2021, "referenceCount": 143, "citationCount": - 24, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": + 24, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/3439723", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-09", @@ -8592,7 +9988,8 @@ interactions: {"authorId": "1486411393", "name": "Qi She"}, {"authorId": "145950787", "name": "T. Ward"}]}, {"paperId": "bb3a478fb2470216f4606a973f5acc5481f2555d", "externalIds": {"ArXiv": "2011.14709", "DBLP": "journals/corr/abs-2011-14709", "MAG": "3106792675", - "DOI": "10.1364/OPTICA.455864", "CorpusId": 227228057}, "url": "https://www.semanticscholar.org/paper/bb3a478fb2470216f4606a973f5acc5481f2555d", + "DOI": "10.1364/OPTICA.455864", "CorpusId": 227228057}, "corpusId": 227228057, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb3a478fb2470216f4606a973f5acc5481f2555d", "title": "Monadic Pavlovian associative learning in a backpropagation-free photonic network", "abstract": "Over a century ago, Ivan P. Pavlov, in a classic experiment, demonstrated how dogs can learn to associate a ringing bell with @@ -8619,19 +10016,23 @@ interactions: but also offers higher bandwidth inherent to a photonic implementation, paving the way for future deployment of fast photonic artificially intelligent machines.", "venue": "Optica", "year": 2020, "referenceCount": 56, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-11-30", "journal": {"volume": "abs/2011.14709", "name": - "ArXiv"}, "authors": [{"authorId": "2110399608", "name": "J. Tan"}, {"authorId": - "2148766464", "name": "Zengguang Cheng"}, {"authorId": "2108263641", "name": - "Xuan Li"}, {"authorId": "9190180", "name": "N. Youngblood"}, {"authorId": - "2060910403", "name": "U. E. Ali"}, {"authorId": "51032756", "name": "C. Wright"}, - {"authorId": "144372362", "name": "W. Pernice"}, {"authorId": "1771881", "name": - "H. Bhaskaran"}]}, {"paperId": "1376ba69c87b609792779def693c7ee355129726", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-30", "journal": + {"volume": "abs/2011.14709", "name": "ArXiv"}, "authors": [{"authorId": "2110399608", + "name": "J. Tan"}, {"authorId": "2148766464", "name": "Zengguang Cheng"}, + {"authorId": "2108263641", "name": "Xuan Li"}, {"authorId": "9190180", "name": + "N. Youngblood"}, {"authorId": "2060910403", "name": "U. E. Ali"}, {"authorId": + "51032756", "name": "C. Wright"}, {"authorId": "144372362", "name": "W. Pernice"}, + {"authorId": "1771881", "name": "H. Bhaskaran"}]}, {"paperId": "1376ba69c87b609792779def693c7ee355129726", "externalIds": {"DBLP": "journals/jair/CropperD22", "ArXiv": "2008.07912", "MAG": "3065734471", "DOI": "10.1613/jair.1.13507", "CorpusId": 221150950}, + "corpusId": 221150950, "publicationVenue": {"id": "aef12dca-60a0-4ca3-819b-cad26d309d4e", + "name": "Journal of Artificial Intelligence Research", "type": "journal", + "alternate_names": ["JAIR", "J Artif Intell Res", "The Journal of Artificial + Intelligence Research"], "issn": "1076-9757", "url": "http://www.jair.org/"}, "url": "https://www.semanticscholar.org/paper/1376ba69c87b609792779def693c7ee355129726", "title": "Inductive logic programming at 30: a new introduction", "abstract": "Inductive logic programming (ILP) is a form of machine learning. The goal @@ -8643,7 +10044,8 @@ interactions: highlight key application areas; and, finally, summarise current limitations and directions for future research.", "venue": "Journal of Artificial Intelligence Research", "year": 2020, "referenceCount": 273, "citationCount": 27, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://jair.org/index.php/jair/article/download/13507/26814", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-08-18", "journal": {"volume": "74", "pages": "765-850", @@ -8651,10 +10053,16 @@ interactions: "Andrew Cropper"}, {"authorId": "3422854", "name": "Sebastijan Dumancic"}]}, {"paperId": "0bcba372dcde81a6d92fc2c9118e6a2664e51ba4", "externalIds": {"DBLP": "journals/corr/abs-2005-00890", "MAG": "3021390590", "ArXiv": "2005.00890", - "DOI": "10.1016/j.patcog.2022.108643", "CorpusId": 218487556}, "url": "https://www.semanticscholar.org/paper/0bcba372dcde81a6d92fc2c9118e6a2664e51ba4", + "DOI": "10.1016/j.patcog.2022.108643", "CorpusId": 218487556}, "corpusId": + 218487556, "publicationVenue": {"id": "266f640f-003e-453b-ab76-57e4053252f8", + "name": "Pattern Recognition", "type": "journal", "alternate_names": ["Pattern + Recognit"], "issn": "0031-3203", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/328/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/pattern-recognition", + "http://www.sciencedirect.com/science/journal/00313203"]}, "url": "https://www.semanticscholar.org/paper/0bcba372dcde81a6d92fc2c9118e6a2664e51ba4", "title": "BeCAPTCHA-Mouse: Synthetic Mouse Trajectories and Improved Bot Detection", "abstract": null, "venue": "Pattern Recognition", "year": 2020, "referenceCount": 51, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/2005.00890", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": @@ -8665,6 +10073,10 @@ interactions: "name": "R. Vera-Rodr\u00edguez"}]}, {"paperId": "4282f9436a581f217874ce90adf80824ab2f6c85", "externalIds": {"DBLP": "journals/tcyb/ChenDXYF22", "MAG": "3010780363", "DOI": "10.1109/TCYB.2020.2977602", "CorpusId": 214591471, "PubMed": "32191906"}, + "corpusId": 214591471, "publicationVenue": {"id": "404813e7-95da-4137-be14-2ba73d2df4fd", + "name": "IEEE Transactions on Cybernetics", "alternate_names": ["IEEE Trans + Cybern"], "issn": "2168-2267", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=6221036", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6221036"]}, "url": "https://www.semanticscholar.org/paper/4282f9436a581f217874ce90adf80824ab2f6c85", "title": "A Unifying Framework for Human\u2013Agent Collaborative Systems\u2014Part I: Element and Relation Analysis", "abstract": "The human\u2013agent collaboration @@ -8682,18 +10094,19 @@ interactions: article, part I, presents the systematic analysis framework. Part II proposes a normalized two-stage top-level design procedure for designing an HACS from the perspective of MAGNET.", "venue": "IEEE Transactions on Cybernetics", - "year": 2020, "referenceCount": 85, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2020-03-18", "journal": {"volume": "52", "pages": "138-151", "name": "IEEE - Transactions on Cybernetics"}, "authors": [{"authorId": "40663520", "name": - "Jie Chen"}, {"authorId": "7625445", "name": "Yulong Ding"}, {"authorId": + "year": 2020, "referenceCount": 85, "citationCount": 6, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2020-03-18", "journal": {"volume": "52", "pages": "138-151", + "name": "IEEE Transactions on Cybernetics"}, "authors": [{"authorId": "40663520", + "name": "Jie Chen"}, {"authorId": "7625445", "name": "Yulong Ding"}, {"authorId": "50559191", "name": "Bin Xin"}, {"authorId": "50514034", "name": "Qingkai Yang"}, {"authorId": "40199742", "name": "H. Fang"}]}, {"paperId": "556590e25f5f741af1d1030c7d031cc3c47d2418", "externalIds": {"ArXiv": "2001.06988", "MAG": "3162152729", "DOI": "10.1101/2021.05.10.443518", - "CorpusId": 234487785}, "url": "https://www.semanticscholar.org/paper/556590e25f5f741af1d1030c7d031cc3c47d2418", + "CorpusId": 234487785}, "corpusId": 234487785, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/556590e25f5f741af1d1030c7d031cc3c47d2418", "title": "Deep learning generates custom-made logistic regression models for explaining how breast cancer subtypes are classified", "abstract": "Differentiating the intrinsic subtypes of breast cancer is crucial for deciding the best treatment @@ -8717,20 +10130,22 @@ interactions: in breast cancer subtype analysis demonstrate the potential of our analysis strategy to clarify the mechanisms underlying breast cancer and improve overall clinical outcomes.", "venue": "bioRxiv", "year": 2020, "referenceCount": 71, - "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Biology", "Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2020-01-20", "journal": {"name": "bioRxiv"}, "authors": [{"authorId": "2058314869", - "name": "Takuma Shibahara"}, {"authorId": "80452935", "name": "Chisa Wada"}, - {"authorId": "2071625961", "name": "Yasuho Yamashita"}, {"authorId": "2072409098", - "name": "Kazuhiro A Fujita"}, {"authorId": "2111956907", "name": "Masamichi - Sato"}, {"authorId": "1490483625", "name": "Junichi Kuwata"}, {"authorId": - "2060267921", "name": "Atsushi Okamoto"}, {"authorId": "2052827881", "name": - "Yoshimasa Ono"}]}, {"paperId": "b431d8163d7c12637705f7fd534eaf7de2c33151", + "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.biorxiv.org/content/biorxiv/early/2021/05/11/2021.05.10.443518.full.pdf", + "status": null}, "fieldsOfStudy": ["Biology", "Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2020-01-20", "journal": {"name": "bioRxiv"}, "authors": + [{"authorId": "2058314869", "name": "Takuma Shibahara"}, {"authorId": "80452935", + "name": "Chisa Wada"}, {"authorId": "2071625961", "name": "Yasuho Yamashita"}, + {"authorId": "2072409098", "name": "Kazuhiro A Fujita"}, {"authorId": "2111956907", + "name": "Masamichi Sato"}, {"authorId": "1490483625", "name": "Junichi Kuwata"}, + {"authorId": "2060267921", "name": "Atsushi Okamoto"}, {"authorId": "2052827881", + "name": "Yoshimasa Ono"}]}, {"paperId": "b431d8163d7c12637705f7fd534eaf7de2c33151", "externalIds": {"ArXiv": "1910.09134", "DBLP": "conf/cvpr/0001YRY22", "DOI": - "10.1109/CVPRW56347.2022.00539", "CorpusId": 248240190}, "url": "https://www.semanticscholar.org/paper/b431d8163d7c12637705f7fd534eaf7de2c33151", + "10.1109/CVPRW56347.2022.00539", "CorpusId": 248240190}, "corpusId": 248240190, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b431d8163d7c12637705f7fd534eaf7de2c33151", "title": "Good, Better, Best: Textual Distractors Generation for Multiple-Choice Visual Question Answering via Reinforcement Learning", "abstract": "Multiple-choice VQA has drawn increasing attention from researchers and end-users recently. @@ -8753,7 +10168,8 @@ interactions: case study on the factors why distractors generated by GOBBET can fool existing models.", "venue": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "year": 2019, "referenceCount": 52, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1910.09134", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2019-10-21", @@ -8764,29 +10180,42 @@ interactions: "name": "Yezhou Yang"}]}, {"paperId": "0b32b558ad859e91e84cbdb1752c9896a5942af4", "externalIds": {"PubMedCentral": "9296431", "ArXiv": "1909.01083", "MAG": "3047275941", "DOI": "10.1007/s10670-020-00284-7", "CorpusId": 202541696, - "PubMed": "35875698"}, "url": "https://www.semanticscholar.org/paper/0b32b558ad859e91e84cbdb1752c9896a5942af4", + "PubMed": "35875698"}, "corpusId": 202541696, "publicationVenue": {"id": "638d1b1c-6c05-4b65-aa2e-ace42ee26e95", + "name": "Erkenntnis: An International Journal of Scientific Philosophy", "type": + "journal", "alternate_names": ["Erkenn Int J Sci Philos", "Erkenntnis"], "issn": + "0165-0106", "url": "https://www.springer.com/philosophy/journal/10670", "alternate_urls": + ["http://www.jstor.org/journals/01650106.html", "https://www.jstor.org/journal/erkenntnis2", + "http://www.springer.com/philosophy/journal/10670"]}, "url": "https://www.semanticscholar.org/paper/0b32b558ad859e91e84cbdb1752c9896a5942af4", "title": "General Relativity, Mental Causation, and Energy Conservation", "abstract": null, "venue": "Erkenntnis: An International Journal of Scientific Philosophy", "year": 2019, "referenceCount": 266, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10670-020-00284-7.pdf", + "status": null}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2019-08-20", "journal": {"volume": "87", "pages": "1931 - 1973", "name": "Erkenntnis"}, "authors": [{"authorId": "145300638", "name": "J. B. Pitts"}]}, {"paperId": "6bea7ecf19bd9c823b2b4be05ed0a0ec81d0785b", "externalIds": {"DBLP": "journals/ai/Al-OmariLHC22", "MAG": "2775703036", - "DOI": "10.1016/j.artint.2021.103637", "CorpusId": 67096292}, "url": "https://www.semanticscholar.org/paper/6bea7ecf19bd9c823b2b4be05ed0a0ec81d0785b", + "DOI": "10.1016/j.artint.2021.103637", "CorpusId": 67096292}, "corpusId": + 67096292, "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", + "name": "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif + Intell"], "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", + "2710-1681"], "url": "http://www.elsevier.com/locate/artint", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/00043702", "https://www.journals.elsevier.com/artificial-intelligence"]}, + "url": "https://www.semanticscholar.org/paper/6bea7ecf19bd9c823b2b4be05ed0a0ec81d0785b", "title": "Joint perceptual learning and natural language acquisition for autonomous robots", "abstract": null, "venue": "Artificial Intelligence", "year": 2017, - "referenceCount": 144, "citationCount": 3, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-08-01", "journal": {"volume": "303", "pages": "103637", - "name": "Artif. Intell."}, "authors": [{"authorId": "122547040", "name": "Muhannad - Al-Omari"}]}, {"paperId": "b4916c497d996ad21433a8fda701b6306b0854cd", "externalIds": - {"DBLP": "journals/corr/abs-2211-06318", "ArXiv": "2211.06318", "MAG": "2904666994", - "DOI": "10.48550/arXiv.2211.06318", "CorpusId": 57283069}, "url": "https://www.semanticscholar.org/paper/b4916c497d996ad21433a8fda701b6306b0854cd", + "referenceCount": 144, "citationCount": 4, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2017-08-01", "journal": + {"volume": "303", "pages": "103637", "name": "Artif. Intell."}, "authors": + [{"authorId": "122547040", "name": "Muhannad Al-Omari"}]}, {"paperId": "b4916c497d996ad21433a8fda701b6306b0854cd", + "externalIds": {"DBLP": "journals/corr/abs-2211-06318", "ArXiv": "2211.06318", + "MAG": "2904666994", "DOI": "10.48550/arXiv.2211.06318", "CorpusId": 57283069}, + "corpusId": 57283069, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b4916c497d996ad21433a8fda701b6306b0854cd", "title": "Artificial Intelligence and Life in 2030: The One Hundred Year Study on Artificial Intelligence", "abstract": "PREFACE The One Hundred Year Study on Artificial Intelligence, launched in the fall of 2014, is a long-term investigation @@ -8823,24 +10252,25 @@ interactions: to enable The overarching purpose of the One Hundred Year Study''s periodic expert review is to provide a collected and connected set of reflections about AI and its influences as the field \u2026", "venue": "ArXiv", "year": 2016, - "referenceCount": 34, "citationCount": 127, "influentialCitationCount": 7, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2016-09-06", "journal": {"volume": "abs/2211.06318", - "name": "ArXiv"}, "authors": [{"authorId": "144848112", "name": "P. Stone"}, - {"authorId": "72419159", "name": "R. Brooks"}, {"authorId": "2841157", "name": - "E. Brynjolfsson"}, {"authorId": "3014341", "name": "Ryan Calo"}, {"authorId": - "1741101", "name": "Oren Etzioni"}, {"authorId": "2942743", "name": "G. Hager"}, - {"authorId": "144049352", "name": "Julia Hirschberg"}, {"authorId": "3027736", - "name": "Shivaram Kalyanakrishnan"}, {"authorId": "1783184", "name": "Ece - Kamar"}, {"authorId": "1691597", "name": "Sarit Kraus"}, {"authorId": "1388404060", - "name": "Kevin Leyton-Brown"}, {"authorId": "30907562", "name": "D. Parkes"}, - {"authorId": "81619738", "name": "W. Press"}, {"authorId": "98622177", "name": - "A. Saxenian"}, {"authorId": "143873972", "name": "J. Shah"}, {"authorId": - "143736701", "name": "Milind Tambe"}, {"authorId": "2862181", "name": "Astro - Teller"}]}, {"paperId": "bcbd8c3947cfb5e323c20a949501ce84f3e0d41f", "externalIds": - {"CorpusId": 249126675}, "url": "https://www.semanticscholar.org/paper/bcbd8c3947cfb5e323c20a949501ce84f3e0d41f", + "referenceCount": 34, "citationCount": 128, "influentialCitationCount": 7, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2016-09-06", + "journal": {"volume": "abs/2211.06318", "name": "ArXiv"}, "authors": [{"authorId": + "144848112", "name": "P. Stone"}, {"authorId": "72419159", "name": "R. Brooks"}, + {"authorId": "2841157", "name": "E. Brynjolfsson"}, {"authorId": "3014341", + "name": "Ryan Calo"}, {"authorId": "1741101", "name": "Oren Etzioni"}, {"authorId": + "2942743", "name": "G. Hager"}, {"authorId": "144049352", "name": "Julia Hirschberg"}, + {"authorId": "3027736", "name": "Shivaram Kalyanakrishnan"}, {"authorId": + "1783184", "name": "Ece Kamar"}, {"authorId": "1691597", "name": "Sarit Kraus"}, + {"authorId": "1388404060", "name": "Kevin Leyton-Brown"}, {"authorId": "30907562", + "name": "D. Parkes"}, {"authorId": "81619738", "name": "W. Press"}, {"authorId": + "98622177", "name": "A. Saxenian"}, {"authorId": "143873972", "name": "J. + Shah"}, {"authorId": "143736701", "name": "Milind Tambe"}, {"authorId": "2862181", + "name": "Astro Teller"}]}, {"paperId": "bcbd8c3947cfb5e323c20a949501ce84f3e0d41f", + "externalIds": {"CorpusId": 249126675}, "corpusId": 249126675, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bcbd8c3947cfb5e323c20a949501ce84f3e0d41f", "title": "6G and Machine Learning for Industry", "abstract": "This book is the product of a one-semester course called Seminar Machine Intelligence which was held in the winter term 21/22 at the Technical University Munich. The @@ -8922,12 +10352,13 @@ interactions: key drivers and challenges of each trend mentioned. Eventually, a conclusion is made to shed light on the comparison of these trends by analysing the uncertainty and impact of each.", "venue": "", "year": null, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": []}, {"paperId": "d4c822021a8cdab4ddf5482ce5a1cf6f1d66543c", "externalIds": - {"DBLP": "journals/access/BellagardaA22", "DOI": "10.1109/ACCESS.2022.3173297", - "CorpusId": 248684391}, "url": "https://www.semanticscholar.org/paper/d4c822021a8cdab4ddf5482ce5a1cf6f1d66543c", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": []}, {"paperId": "d4c822021a8cdab4ddf5482ce5a1cf6f1d66543c", + "externalIds": {"DBLP": "journals/access/BellagardaA22", "DOI": "10.1109/ACCESS.2022.3173297", + "CorpusId": 248684391}, "corpusId": 248684391, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d4c822021a8cdab4ddf5482ce5a1cf6f1d66543c", "title": "An Updated Survey on the Convergence of Distributed Ledger Technology and Artificial Intelligence: Current State, Major Challenges and Future Direction", "abstract": "In recent times, Artificial Intelligence (AI) and Distributed @@ -8945,25 +10376,28 @@ interactions: markets, and sharing. Furthermore, we identify research gaps and discuss open research challenges in developing future directions.", "venue": "IEEE Access", "year": 2022, "referenceCount": 126, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/9668973/09770802.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": "10", "pages": "50774-50793", "name": "IEEE Access"}, "authors": [{"authorId": "1396411663", "name": "Jagger S. Bellagarda"}, {"authorId": "1403308610", "name": "A. Abu-Mahfouz"}]}, {"paperId": "36ad4998e7e958856a2a61b3dbb7a373641ba2a2", "externalIds": {"DBLP": "conf/eann/TheodoropoulosM22", - "DOI": "10.1007/978-3-031-08223-8_30", "CorpusId": 247255971}, "url": "https://www.semanticscholar.org/paper/36ad4998e7e958856a2a61b3dbb7a373641ba2a2", + "DOI": "10.1007/978-3-031-08223-8_30", "CorpusId": 247255971}, "corpusId": + 247255971, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/36ad4998e7e958856a2a61b3dbb7a373641ba2a2", "title": "Semantic Segmentation of Diabetic Retinopathy Lesions, Using a UNET with Pretrained Encoder", "abstract": null, "venue": "EANN", "year": 2022, "referenceCount": 100, "citationCount": 0, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "361-371"}, "authors": [{"authorId": - "2017470143", "name": "D. Theodoropoulos"}, {"authorId": "2079923", "name": - "G. Manikis"}, {"authorId": "2629216", "name": "K. Marias"}, {"authorId": - "2176144", "name": "G. Papadourakis"}]}, {"paperId": "883a211453bd81a3859e1ef7e8047bf9592320ea", - "externalIds": {"CorpusId": 248673760}, "url": "https://www.semanticscholar.org/paper/883a211453bd81a3859e1ef7e8047bf9592320ea", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "361-371"}, "authors": [{"authorId": "2017470143", "name": "D. Theodoropoulos"}, + {"authorId": "2079923", "name": "G. Manikis"}, {"authorId": "2629216", "name": + "K. Marias"}, {"authorId": "2176144", "name": "G. Papadourakis"}]}, {"paperId": + "883a211453bd81a3859e1ef7e8047bf9592320ea", "externalIds": {"CorpusId": 248673760}, + "corpusId": 248673760, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/883a211453bd81a3859e1ef7e8047bf9592320ea", "title": "Reaching out for the Answer: Answer Type Prediction", "abstract": ". Natural language is complex and similar statements can be expressed in various ways. Therefore, understanding natural language is an ongoing challenge @@ -8979,13 +10413,14 @@ interactions: resource questions are then further classi\ufb01ed regarding the concrete answer types \u2013 a list of ontology classes \u2013 utilizing the BERT language model.", "venue": "", "year": 2022, "referenceCount": 17, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2164777052", "name": "Kanchan Shivashankar"}, {"authorId": - "2164777390", "name": "Khaoula Benmaarouf"}, {"authorId": "35161972", "name": - "Nadine Steinmetz"}]}, {"paperId": "1effb7e6e8cf690072b328d587046054e9fa0f50", - "externalIds": {"CorpusId": 248372639}, "url": "https://www.semanticscholar.org/paper/1effb7e6e8cf690072b328d587046054e9fa0f50", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2164777052", "name": "Kanchan Shivashankar"}, + {"authorId": "2164777390", "name": "Khaoula Benmaarouf"}, {"authorId": "35161972", + "name": "Nadine Steinmetz"}]}, {"paperId": "1effb7e6e8cf690072b328d587046054e9fa0f50", + "externalIds": {"CorpusId": 248372639}, "corpusId": 248372639, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1effb7e6e8cf690072b328d587046054e9fa0f50", "title": "Can machines think? The controversy that led to the Turing test", "abstract": "Turing\u2019s much debated test has turned 70 and is still fairly controversial. His 1950 paper is seen as a complex and multilayered text, @@ -9009,11 +10444,12 @@ interactions: to Jefferson''s suggestion that gendered behavior is causally related to the physiology of sex hormones.", "venue": "", "year": 2022, "referenceCount": 54, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, - {"paperId": "dbe4c5294a7334820f6b4524154bafd41d60c534", "externalIds": {"CorpusId": - 247570160}, "url": "https://www.semanticscholar.org/paper/dbe4c5294a7334820f6b4524154bafd41d60c534", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "145621246", "name": "Bernardo + Gon\u00e7alves"}]}, {"paperId": "dbe4c5294a7334820f6b4524154bafd41d60c534", + "externalIds": {"CorpusId": 247570160}, "corpusId": 247570160, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/dbe4c5294a7334820f6b4524154bafd41d60c534", "title": "VISUAL REASONING MODELS", "abstract": "How can we measure the reasoning capabilities of intelligence systems? Visual question answering provides a convenient framework for testing the model\u2019s abilities by interrogating @@ -9031,12 +10467,12 @@ interactions: often present in those datasets. Finally, we also propose a controlled experiment measuring the efficiency of such models to learn and perform reasoning.", "venue": "", "year": 2022, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "148099243", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "148099243", "name": "Spyridon Mouselinos"}, {"authorId": "47407464", "name": "H. Michalewski"}]}, {"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "externalIds": {"CorpusId": - 251848799}, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", + 251848799}, "corpusId": 251848799, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "title": "Dystopian or Utopian? Two Images of Alan Turing", "abstract": "Turing made intriguing statements about the future of arti\ufb01cial intelligence (AI) in society. He predicted that machines would eventually \u2018compete @@ -9061,11 +10497,94 @@ interactions: independent thinking to retain their power. These, he hoped, would be eventually rivaled and surpassed by intelligent machines.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "6881d58bfd193d39988561825f352c345d70b383", "externalIds": {"DOI": + "10.1016/j.ifacol.2022.12.052", "CorpusId": 254957737}, "corpusId": 254957737, + "publicationVenue": {"id": "af98f1eb-affb-4b55-b8ff-1964b29cf894", "name": + "IFAC-PapersOnLine", "type": "journal", "issn": "2405-8963", "url": "https://www.journals.elsevier.com/ifac-papersonline/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/24058963", + "https://www.journals.elsevier.com/ifac-papersonline"]}, "url": "https://www.semanticscholar.org/paper/6881d58bfd193d39988561825f352c345d70b383", + "title": "Ethical AI and Global Cultural Coherence: Issues and Challenges", + "abstract": null, "venue": "IFAC-PapersOnLine", "year": 2022, "referenceCount": + 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "IFAC-PapersOnLine"}, "authors": + [{"authorId": "1736417", "name": "P. Groumpos"}, {"authorId": "2072321901", + "name": "Plenary Paper"}]}, {"paperId": "32afbdf6a0a3da9970cd5c796fb5ce40d1f64e06", + "externalIds": {"DOI": "10.17048/pelikon2020.2022.145", "CorpusId": 254959250}, + "corpusId": 254959250, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/32afbdf6a0a3da9970cd5c796fb5ce40d1f64e06", + "title": "Az \u00e1ltal\u00e1nos \u00e9s k\u00f6z\u00e9piskolai magyar nyelvtan + tananyag elsaj\u00e1t\u00edt\u00e1s\u00e1t seg\u00edt\u0151 alkalmaz\u00e1s", + "abstract": "1. Bevezet\u00e9s A 2020-ban kialakult v\u00edrushelyzet miatt + Magyarorsz\u00e1gon is egyik napr\u00f3l a m\u00e1sikra kellett jelenl\u00e9ti + oktat\u00e1sr\u00f3l t\u00e1voktat\u00e1sra v\u00e1ltani orsz\u00e1gszerte + (Sz\u0171ts 2021). Emiatt sok csal\u00e1d k\u00e9nyszer\u00fclt arra, hogy + r\u00e9szt vegyen gyermeke tan\u00edt\u00e1s\u00e1ban, ez sok esetben nem + bizonyult egyszer\u0171 feladatnak. Ez a helyzet \u00faj kih\u00edv\u00e1sokat + \u00e1ll\u00edtott tan\u00e1rok, sz\u00fcl\u0151k \u00e9s gyermekek el\u00e9 + egyar\u00e1nt (J\u00e1nk\u2013L\u0151rincz 2021). Seg\u00edts\u00e9gk\u00e9ppen + egy olyan alkalmaz\u00e1s fejleszt\u00e9s\u00e9t t\u0171zt\u00fck ki c\u00e9lul, + mely az internet adta lehet\u0151s\u00e9geket haszn\u00e1lja az oktat\u00e1sban, + \u00e9s haszn\u00e1lat\u00e1val a magyar nyelvtan iskol\u00e1ban oktatott + szab\u00e1lyai k\u00f6nnyebben elsaj\u00e1t\u00edthat\u00f3k. Rem\u00e9nyeink + szerint applik\u00e1ci\u00f3nk haszn\u00e1lat\u00e1val a di\u00e1kok j\u00e1t\u00e9kosan + ismerkedhetnek meg azzal, hogy hogyan \u00e9p\u00fclnek fel a mondatok, milyen + egys\u00e9gekb\u0151l \u00e1llnak, \u00e9s ezek hogyan viszonyulnak egym\u00e1shoz. + A 2020-as \u00e1t\u00e1ll\u00e1s megmutatta azt is, hogy mi\u00e9rt van sz\u00fcks\u00e9g + j\u00f3l fel\u00e9p\u00edtett, otthoni tanul\u00e1s sor\u00e1n is megfelel\u0151 + informatikai eszk\u00f6z\u00f6kre \u00e9s alkalmaz\u00e1sokra, amelyekkel + ki lehet eg\u00e9sz\u00edteni az \u00e1ltal\u00e1nos \u00e9s k\u00f6z\u00e9piskolai + oktat\u00e1st, \u00e9s amelyek ugyanakkor biztos\u00edthatj\u00e1k a megfelel\u0151 + kommunik\u00e1ci\u00f3t tan\u00e1r \u00e9s di\u00e1k k\u00f6z\u00f6tt. Ezzel + az alkalmaz\u00e1ssal szeretn\u00e9nk csatlakozni a digit\u00e1lis oktat\u00e1s + fejleszt\u00e9s\u00e9re ir\u00e1nyul\u00f3 t\u00f6rekv\u00e9sekhez, hogy a + gyerekek a tan\u00f3r\u00e1n k\u00edv\u00fcl is kaphassanak szakszer\u0171 + seg\u00edts\u00e9get, amivel biztos tud\u00e1st \u00e9p\u00edthetnek, \u00e9s + j\u00f3l teljes\u00edthetnek az \u00f3r\u00e1kon is. Mindezt j\u00e1t\u00e9kos + form\u00e1ban, hogy a tanul\u00e1s \u00f6r\u00f6m legyen, a di\u00e1kok ne + vesz\u00edts\u00e9k el motiv\u00e1ci\u00f3jukat, \u00e9s sikeresen teljes\u00edts\u00e9k + a tant\u00e1rgyi k\u00f6vetelm\u00e9nyeket. Mindezt tudom\u00e1nyos ig\u00e9nyess\u00e9ggel + tett\u00fck, de els\u0151 helyre a felhaszn\u00e1l\u00f3i ig\u00e9nyeket helyezt\u00fck.", + "venue": "A digit\u00e1lis oktat\u00e1s nyelvi dimenzi\u00f3i : V\u00e1logat\u00e1s + a PeLiKon2020 oktat\u00e1snyelv\u00e9szeti konferencia kerekasztal-besz\u00e9lget\u00e9seib\u0151l + \u00e9s el\u0151ad\u00e1saib\u00f3l (K\u00e1lm\u00e1n L\u00e1szl\u00f3 eml\u00e9k\u00e9re)", + "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://publikacio.uni-eszterhazy.hu/7566/1/145_Oszk%C3%B3.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "A digit\u00e1lis oktat\u00e1s + nyelvi dimenzi\u00f3i : V\u00e1logat\u00e1s a PeLiKon2020 oktat\u00e1snyelv\u00e9szeti + konferencia kerekasztal-besz\u00e9lget\u00e9seib\u0151l \u00e9s el\u0151ad\u00e1saib\u00f3l + (K\u00e1lm\u00e1n L\u00e1szl\u00f3 eml\u00e9k\u00e9re)"}, "authors": [{"authorId": + "3190496", "name": "Beatrix Oszk\u00f3"}, {"authorId": "2133802014", "name": + "No\u00e9mi Evelin T\u00f3th"}, {"authorId": "2197673239", "name": "Zijian + Gy\u0151z\u0151 Yang"}]}, {"paperId": "0808accfe150d354d5c01dd19808b83d5fd344a3", + "externalIds": {"CorpusId": 254976550}, "corpusId": 254976550, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0808accfe150d354d5c01dd19808b83d5fd344a3", + "title": "Characterizing the Response Space of Questions: data and theory", + "abstract": "The main aim of this paper is to provide a characterization of + the response space for questions using a taxonomy grounded in a dialogical + formal semantics. As a starting point we take the typology for responses in + the form of questions provided in \u0141upkowski and Ginzburg (2016). That + work develops a wide coverage taxonomy for question/question sequences observable + in corpora including the BNC, CHILDES, and BEE, as well as formal modeling + of all the postulated classes. This paper extends that work to cover all types + of responses to questions. We present the extended typology of responses to + questions based on studies of the BNC, BEE, Maptask and CornellMovie corpora + which include 607, 262, 460, and 911 question/response pairs respectively. + We compare the data for English with data from Polish using the Spokes corpus + (694 question/response pairs), providing detailed accounts of annotation reliability + and disagreement analysis. We sketch how each class can be formalized using + a dialogical semantics appropriate for dialogue management, concretely the + framework of KoS (Ginzburg, 2012).", "venue": "", "year": 2022, "referenceCount": + 82, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2197795198", + "name": "Ucharska"}, {"authorId": "2197793642", "name": "Upkowski"}]}, {"paperId": "478b60cf3930ede487c5701dc842f801597954d3", "externalIds": {"CorpusId": 254644859}, - "url": "https://www.semanticscholar.org/paper/478b60cf3930ede487c5701dc842f801597954d3", + "corpusId": 254644859, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/478b60cf3930ede487c5701dc842f801597954d3", "title": "Artificial Neural Network for Predicting Heat Transfer Rates in Supercritical Carbon Dioxide", "abstract": "Supercritical carbon dioxide as a working fluid in a closed Brayton cycle is proving to be more efficient @@ -9096,12 +10615,13 @@ interactions: model capable of accurately predicting the wall temperature will aid in the design and development of future power generation cycles.", "venue": "", "year": 2022, "referenceCount": 92, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Engineering", "source": "s2-fos-model"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2195770235", "name": "Vinusha Dasarla Giri - Babu"}]}, {"paperId": "f8c991cb2df68befe96e6210e5f18eb3d2b4f329", "externalIds": - {"CorpusId": 254547979}, "url": "https://www.semanticscholar.org/paper/f8c991cb2df68befe96e6210e5f18eb3d2b4f329", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Engineering", "source": "s2-fos-model"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2195770235", "name": "Vinusha Dasarla + Giri Babu"}]}, {"paperId": "f8c991cb2df68befe96e6210e5f18eb3d2b4f329", "externalIds": + {"CorpusId": 254547979}, "corpusId": 254547979, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/f8c991cb2df68befe96e6210e5f18eb3d2b4f329", "title": "Informatica en Economie Lowering the Resolution of Damage Data in a Model that Predicts Rainwater Damage", "abstract": "The increasing risk that residences sustain rainwater damage and the major consequences that rainwater @@ -9125,21 +10645,30 @@ interactions: opens the door to use large insurance data sets, having lower resolutions, to predict rainwater damage.", "venue": "", "year": 2022, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Environmental Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2195034009", "name": "Teun de Mast"}]}, - {"paperId": "49b66f02f1e382dea29e0ef415e47e613d5d218f", "externalIds": {"DOI": - "10.1016/j.procs.2022.11.174", "CorpusId": 254490126}, "url": "https://www.semanticscholar.org/paper/49b66f02f1e382dea29e0ef415e47e613d5d218f", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2195034009", + "name": "Teun de Mast"}]}, {"paperId": "49b66f02f1e382dea29e0ef415e47e613d5d218f", + "externalIds": {"DOI": "10.1016/j.procs.2022.11.174", "CorpusId": 254490126}, + "corpusId": 254490126, "publicationVenue": {"id": "88628377-4e89-44f8-bb38-094e29986c8f", + "name": "Procedia Computer Science", "type": "journal", "alternate_names": + ["Procedia Comput Sci"], "issn": "1877-0509", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/719435/description#", + "alternate_urls": ["https://www.journals.elsevier.com/procedia-computer-science", + "http://www.sciencedirect.com/science/journal/18770509"]}, "url": "https://www.semanticscholar.org/paper/49b66f02f1e382dea29e0ef415e47e613d5d218f", "title": "Mechanism of Extension Intelligence for Solving Contradictory Problems", "abstract": null, "venue": "Procedia Computer Science", "year": 2022, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Procedia Computer Science"}, "authors": [{"authorId": - "72486540", "name": "Zhengqi Yang"}, {"authorId": "2155447444", "name": "Xing - Li"}]}, {"paperId": "7d558a921caef74f704a742595338c445f9924f3", "externalIds": - {"DBLP": "journals/access/DadmanBBD22", "DOI": "10.1109/ACCESS.2022.3225689", - "CorpusId": 254331456}, "url": "https://www.semanticscholar.org/paper/7d558a921caef74f704a742595338c445f9924f3", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Procedia Computer Science"}, + "authors": [{"authorId": "72486540", "name": "Zhengqi Yang"}, {"authorId": + "2155447444", "name": "Xing Li"}]}, {"paperId": "7d558a921caef74f704a742595338c445f9924f3", + "externalIds": {"DBLP": "journals/access/DadmanBBD22", "DOI": "10.1109/ACCESS.2022.3225689", + "CorpusId": 254331456}, "corpusId": 254331456, "publicationVenue": {"id": + "2633f5b2-c15c-49fe-80f5-07523e770c26", "name": "IEEE Access", "type": "journal", + "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, + "url": "https://www.semanticscholar.org/paper/7d558a921caef74f704a742595338c445f9924f3", "title": "Toward Interactive Music Generation: A Position Paper", "abstract": "Music generation using deep learning has received considerable attention in recent years. Researchers have developed various generative models capable @@ -9160,15 +10689,16 @@ interactions: systems and reinforcement learning algorithms to alleviate these shortcomings and limitations.", "venue": "IEEE Access", "year": 2022, "referenceCount": 152, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "10", "pages": "125679-125695", "name": "IEEE - Access"}, "authors": [{"authorId": "2141072400", "name": "Shayan Dadman"}, - {"authorId": "2089938", "name": "B. Bremdal"}, {"authorId": "145213892", "name": - "B. Bang"}, {"authorId": "39797456", "name": "Rune Dalmo"}]}, {"paperId": + "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/6514899/09966445.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "10", "pages": "125679-125695", + "name": "IEEE Access"}, "authors": [{"authorId": "2141072400", "name": "Shayan + Dadman"}, {"authorId": "2089938", "name": "B. Bremdal"}, {"authorId": "145213892", + "name": "B. Bang"}, {"authorId": "39797456", "name": "Rune Dalmo"}]}, {"paperId": "3e5e4267d5f0289c84e4fbd932f0c06c3de4cbd8", "externalIds": {"CorpusId": 254404982}, - "url": "https://www.semanticscholar.org/paper/3e5e4267d5f0289c84e4fbd932f0c06c3de4cbd8", + "corpusId": 254404982, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e5e4267d5f0289c84e4fbd932f0c06c3de4cbd8", "title": "Artificial Intelligence for All Perspectives and Outlooks on the Role of Machine Learning in Architectural Design", "abstract": "This paper was presented as part of \u201cPanel 1: How Is Digitalization Changing How @@ -9180,30 +10710,43 @@ interactions: information\u2014is spurring in the way housing is produced, marketed, sold, financed, managed, and lived in.", "venue": "", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "119878732", "name": "J. L. G. D. - C. Y. L\u00f3pez"}]}, {"paperId": "3fd74001757533e642b458635f1365d955a78343", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "119878732", + "name": "J. L. G. D. C. Y. L\u00f3pez"}]}, {"paperId": "3fd74001757533e642b458635f1365d955a78343", "externalIds": {"DOI": "10.1016/j.procs.2022.11.042", "CorpusId": 254176171}, - "url": "https://www.semanticscholar.org/paper/3fd74001757533e642b458635f1365d955a78343", + "corpusId": 254176171, "publicationVenue": {"id": "88628377-4e89-44f8-bb38-094e29986c8f", + "name": "Procedia Computer Science", "type": "journal", "alternate_names": + ["Procedia Comput Sci"], "issn": "1877-0509", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/719435/description#", + "alternate_urls": ["https://www.journals.elsevier.com/procedia-computer-science", + "http://www.sciencedirect.com/science/journal/18770509"]}, "url": "https://www.semanticscholar.org/paper/3fd74001757533e642b458635f1365d955a78343", "title": "The Fourth Space in the Fourth Revolution", "abstract": null, "venue": "Procedia Computer Science", "year": 2022, "referenceCount": 7, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Procedia - Computer Science"}, "authors": [{"authorId": "51986819", "name": "P. Boltuc"}]}, - {"paperId": "58683ad7a83eec45cf6f8e0bd983fa2c5ba5f963", "externalIds": {"DOI": - "10.1016/j.procs.2022.11.080", "CorpusId": 254177472}, "url": "https://www.semanticscholar.org/paper/58683ad7a83eec45cf6f8e0bd983fa2c5ba5f963", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "History", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "Procedia Computer Science"}, "authors": [{"authorId": "51986819", + "name": "P. Boltuc"}]}, {"paperId": "58683ad7a83eec45cf6f8e0bd983fa2c5ba5f963", + "externalIds": {"DOI": "10.1016/j.procs.2022.11.080", "CorpusId": 254177472}, + "corpusId": 254177472, "publicationVenue": {"id": "88628377-4e89-44f8-bb38-094e29986c8f", + "name": "Procedia Computer Science", "type": "journal", "alternate_names": + ["Procedia Comput Sci"], "issn": "1877-0509", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/719435/description#", + "alternate_urls": ["https://www.journals.elsevier.com/procedia-computer-science", + "http://www.sciencedirect.com/science/journal/18770509"]}, "url": "https://www.semanticscholar.org/paper/58683ad7a83eec45cf6f8e0bd983fa2c5ba5f963", "title": "An implementation of different minimal consciousness''s variants for a cyber-physical system", "abstract": null, "venue": "Procedia Computer Science", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Procedia Computer Science"}, - "authors": [{"authorId": "2193357638", "name": "Ilya A. Popov"}, {"authorId": - "2193361855", "name": "Ivan A. Erokhin"}, {"authorId": "73869155", "name": - "Artem A. Sukhobokov"}, {"authorId": "2193360514", "name": "Danila R. Gromozdov"}, - {"authorId": "2193356908", "name": "Evgenij A. Belousov"}]}, {"paperId": "011f3317c97090bcb536645bbe17c5ee93a2977a", - "externalIds": {"DOI": "10.32855/fcapital.202201.010", "CorpusId": 253621528}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"name": + "Procedia Computer Science"}, "authors": [{"authorId": "2193357638", "name": + "Ilya A. Popov"}, {"authorId": "2193361855", "name": "Ivan A. Erokhin"}, {"authorId": + "73869155", "name": "Artem A. Sukhobokov"}, {"authorId": "2193360514", "name": + "Danila R. Gromozdov"}, {"authorId": "2193356908", "name": "Evgenij A. Belousov"}]}, + {"paperId": "011f3317c97090bcb536645bbe17c5ee93a2977a", "externalIds": {"DOI": + "10.32855/fcapital.202201.010", "CorpusId": 253621528}, "corpusId": 253621528, + "publicationVenue": {"id": "5a3e78c0-0187-42ae-8f48-3373bbd1799b", "name": + "Fast Capitalism", "alternate_names": ["Fast Capital"], "issn": "1930-014X", + "url": "http://www.fastcapitalism.com/", "alternate_urls": ["http://www.openhumanitiespress.org/journals/titles/fast-capitalism/"]}, "url": "https://www.semanticscholar.org/paper/011f3317c97090bcb536645bbe17c5ee93a2977a", "title": "Learning Management Systems as Anti-Convivial Tools", "abstract": "The last two decades have seen an increase in the number of online university @@ -9222,12 +10765,21 @@ interactions: additional improved software being seen as the main solution. I argue that employing a critical participatory pedagogy can begin to address these concerns.", "venue": "Fast Capitalism", "year": 2022, "referenceCount": 43, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Fast - Capitalism"}, "authors": [{"authorId": "67034751", "name": "Edward M. Maclin"}]}, - {"paperId": "230e6ee6ed2e9b26efebbc632eb3467c9ac7b833", "externalIds": {"DOI": - "10.1590/1678-6971/eramd220003.en", "CorpusId": 253485009}, "url": "https://www.semanticscholar.org/paper/230e6ee6ed2e9b26efebbc632eb3467c9ac7b833", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://fastcapitalism.journal.library.uta.edu/index.php/fastcapitalism/article/download/456/533", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Fast Capitalism"}, "authors": [{"authorId": "67034751", + "name": "Edward M. Maclin"}]}, {"paperId": "230e6ee6ed2e9b26efebbc632eb3467c9ac7b833", + "externalIds": {"DOI": "10.1590/1678-6971/eramd220003.en", "CorpusId": 253485009}, + "corpusId": 253485009, "publicationVenue": {"id": "e250b629-b143-4748-ad52-9c3285858a98", + "name": "RAM. Revista de Administra\u00e7\u00e3o Mackenzie", "type": "journal", + "alternate_names": ["RAM Rev Adm Mackenzie"], "issn": "1518-6776", "url": + "http://editorarevistas.mackenzie.br/index.php/RAM", "alternate_urls": ["https://www.redalyc.org/revista.oa?id=1954", + "http://www.spell.org.br/periodicos/ver/52/revista-de-administracao-mackenzie", + "https://www.scielo.br/scielo.php?lng=en&pid=1678-6971&script=sci_serial", + "https://www.scielo.br/scielo.php?lng=es&nrm=iso&pid=1678-6971&rep=&script=sci_serial"]}, + "url": "https://www.semanticscholar.org/paper/230e6ee6ed2e9b26efebbc632eb3467c9ac7b833", "title": "Customer satisfaction in service delivery with artificial intelligence: A meta-analytic study", "abstract": "ABSTRACT Purpose: This study intends to identify the main background and consequent constructs that form consumer @@ -9251,15 +10803,17 @@ interactions: value, perceived features, perception of quality, marketing orientation, identification with the service and behavior of using AI in services.", "venue": "RAM. Revista de Administra\u00e7\u00e3o Mackenzie", "year": 2022, "referenceCount": 61, - "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "RAM. - Revista de Administra\u00e7\u00e3o Mackenzie"}, "authors": [{"authorId": "2190624804", - "name": "Laura M. Aguiar-Costa"}, {"authorId": "2190626573", "name": "Carlos - A. X. C. Cunha"}, {"authorId": "2068960764", "name": "Wallysson K. M. Silva"}, - {"authorId": "2067474648", "name": "N. R. Abreu"}]}, {"paperId": "15b343246a691acd26f450bbde25f601f85bea14", - "externalIds": {"DBLP": "conf/staf/Zaytsev22", "CorpusId": 253270049}, "url": - "https://www.semanticscholar.org/paper/15b343246a691acd26f450bbde25f601f85bea14", + "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.scielo.br/j/ram/a/WxxsLRCDQPyVGSjYMLFxzdK/?lang=en&format=pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "RAM. Revista de Administra\u00e7\u00e3o Mackenzie"}, + "authors": [{"authorId": "2190624804", "name": "Laura M. Aguiar-Costa"}, {"authorId": + "2190626573", "name": "Carlos A. X. C. Cunha"}, {"authorId": "2068960764", + "name": "Wallysson K. M. Silva"}, {"authorId": "2067474648", "name": "N. R. + Abreu"}]}, {"paperId": "15b343246a691acd26f450bbde25f601f85bea14", "externalIds": + {"DBLP": "conf/staf/Zaytsev22", "CorpusId": 253270049}, "corpusId": 253270049, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15b343246a691acd26f450bbde25f601f85bea14", "title": "Speak Well or Be Still: Solving Conversational AI with Weighted Attribute Grammars (Poster)", "abstract": "There is a growing need to specify models of possible conversations with non-human entities. Such models have @@ -9272,12 +10826,13 @@ interactions: , that combines the power of analytic, generative, attribute, weighted and probabilistic grammars in one DSML.", "venue": "STAF Workshops", "year": 2022, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "145543743", "name": "V. Zaytsev"}]}, - {"paperId": "f367ce68505e01d0452fe4be113e27f7a98c9d6d", "externalIds": {"CorpusId": - 253124864}, "url": "https://www.semanticscholar.org/paper/f367ce68505e01d0452fe4be113e27f7a98c9d6d", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "145543743", + "name": "V. Zaytsev"}]}, {"paperId": "f367ce68505e01d0452fe4be113e27f7a98c9d6d", + "externalIds": {"CorpusId": 253124864}, "corpusId": 253124864, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f367ce68505e01d0452fe4be113e27f7a98c9d6d", "title": "LAD: Language Augmented Diffusion for Reinforcement Learning", "abstract": "Learning skills from language provides a powerful avenue for generalization in reinforcement learning, although it remains a challenging task as it requires @@ -9290,18 +10845,20 @@ interactions: to the best performance of 76%. We also conduct an analysis on the properties of language conditioned diffusion in reinforcement learning.", "venue": "", "year": 2022, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2051714782", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2051714782", "name": "Pamela Mishkin"}]}, {"paperId": "bf416fe66e3111922eab46221f54e796b978e865", - "externalIds": {"CorpusId": 252989966}, "url": "https://www.semanticscholar.org/paper/bf416fe66e3111922eab46221f54e796b978e865", + "externalIds": {"CorpusId": 252989966}, "corpusId": 252989966, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bf416fe66e3111922eab46221f54e796b978e865", "title": "Why Machines will Never Rule the World; Artificial Intelligence without Fear", "abstract": null, "venue": "", "year": 2022, "referenceCount": 507, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "120743060", "name": "J. Landgrebe"}, - {"authorId": "2116986621", "name": "Barry Smith"}]}, {"paperId": "578324d7fad68e0269ea4d99369a55f36feb9d75", - "externalIds": {"CorpusId": 252821445}, "url": "https://www.semanticscholar.org/paper/578324d7fad68e0269ea4d99369a55f36feb9d75", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "120743060", + "name": "J. Landgrebe"}, {"authorId": "2116986621", "name": "Barry Smith"}]}, + {"paperId": "578324d7fad68e0269ea4d99369a55f36feb9d75", "externalIds": {"CorpusId": + 252821445}, "corpusId": 252821445, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/578324d7fad68e0269ea4d99369a55f36feb9d75", "title": "Polyse\u0300mes, 27 | 2022", "abstract": "This article examines Ian McEwan\u2019s 2005 novel Saturday through the prism of cinema and spectatorship. A watcher through windows, its protagonist Henry Perowne is a self-confessed @@ -9338,11 +10895,12 @@ interactions: de McEwan, et comment ces effets sont li\u00e9s aux questions de focalisation et d\u2019omniscience dans le roman.", "venue": "", "year": 2022, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2068442814", "name": "Ian"}, {"authorId": "2075643995", "name": - "McEwan"}]}, {"paperId": "e4533aac58848de7b3ca6e0bd40ccc292861c1e5", "externalIds": - {"CorpusId": 252821490}, "url": "https://www.semanticscholar.org/paper/e4533aac58848de7b3ca6e0bd40ccc292861c1e5", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2068442814", "name": "Ian"}, + {"authorId": "2075643995", "name": "McEwan"}]}, {"paperId": "e4533aac58848de7b3ca6e0bd40ccc292861c1e5", + "externalIds": {"CorpusId": 252821490}, "corpusId": 252821490, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e4533aac58848de7b3ca6e0bd40ccc292861c1e5", "title": "Who or what is creative? Collaborating with machines to make visual art", "abstract": "This paper considers how creative agency can be positioned as part of visual art practice that involves humans and machines working together. @@ -9354,11 +10912,12 @@ interactions: agency not only as emerging from the association of humans and machines in networks, but also with the specific humans and machines involved in each creative project.", "venue": "", "year": 2022, "referenceCount": 35, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2364257", "name": "E. Sandry"}]}, {"paperId": "a7b46f12d94e5598827cbb7826245a392af64da3", - "externalIds": {"DOI": "10.5937/medi55-37718", "CorpusId": 252649049}, "url": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "2364257", "name": "E. Sandry"}]}, {"paperId": + "a7b46f12d94e5598827cbb7826245a392af64da3", "externalIds": {"DOI": "10.5937/medi55-37718", + "CorpusId": 252649049}, "corpusId": 252649049, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7b46f12d94e5598827cbb7826245a392af64da3", "title": "Improvement of the psychiatric care through outsourcing artificial intelligence technologies: Where are we now?", "abstract": "Currently, the @@ -9382,14 +10941,15 @@ interactions: be ignorant but could try to leave the comfort zone and do more to raise the awareness of AI technologies development achievements.", "venue": "Medicinska istrazivanja", "year": 2022, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Psychology", "source": "s2-fos-model"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "Medicinska istrazivanja"}, "authors": [{"authorId": "1412770529", - "name": "Sanja Andri\u0107-Petrovi\u0107"}, {"authorId": "4325857", "name": - "N. Mari\u0107"}]}, {"paperId": "66ef0473f371372face6359f7e9de04e25b1f30a", - "externalIds": {"DBLP": "conf/cilc/LongoS22", "CorpusId": 252599881}, "url": - "https://www.semanticscholar.org/paper/66ef0473f371372face6359f7e9de04e25b1f30a", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://scindeks-clanci.ceon.rs/data/pdf/0301-0619/2022/0301-06192202019A.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "Medicinska istrazivanja"}, "authors": [{"authorId": "1412770529", "name": + "Sanja Andri\u0107-Petrovi\u0107"}, {"authorId": "4325857", "name": "N. Mari\u0107"}]}, + {"paperId": "66ef0473f371372face6359f7e9de04e25b1f30a", "externalIds": {"DBLP": + "conf/cilc/LongoS22", "CorpusId": 252599881}, "corpusId": 252599881, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/66ef0473f371372face6359f7e9de04e25b1f30a", "title": "A Framework to build Abductive-Deductive Chatbots, based on Natural Language Processing and First-Order Logic", "abstract": "This paper presents a framework based on natural language processing and first-order logic, which @@ -9408,13 +10968,14 @@ interactions: scripts updates or code refactory when new knowledge has to income, but just the knowledge itself in natural language.", "venue": "CILC", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "75-89"}, "authors": [{"authorId": "150060282", - "name": "Carmelo Fabio Longo"}, {"authorId": "1735156", "name": "C. Santoro"}]}, - {"paperId": "308bb98b5275f5555931e06fe4603da10ecdb8e6", "externalIds": {"CorpusId": - 252460019}, "url": "https://www.semanticscholar.org/paper/308bb98b5275f5555931e06fe4603da10ecdb8e6", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "75-89"}, "authors": [{"authorId": + "150060282", "name": "Carmelo Fabio Longo"}, {"authorId": "1735156", "name": + "C. Santoro"}]}, {"paperId": "308bb98b5275f5555931e06fe4603da10ecdb8e6", "externalIds": + {"CorpusId": 252460019}, "corpusId": 252460019, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/308bb98b5275f5555931e06fe4603da10ecdb8e6", "title": "Understanding living beings by analogy with computers or understanding computers as an emanation of the living", "abstract": "The analogy between living beings and computers was introduced with circum-spection by Schr\u00f6dinger @@ -9431,11 +10992,12 @@ interactions: of what actually happens in a computer when considering them in their larger theoretical context where historicity is also central. 1", "venue": "", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2436769", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2436769", "name": "Ma\u00ebl Mont\u00e9vil"}]}, {"paperId": "1f66dbf202335f9c9874cdb446d3ac53e2f39cf7", - "externalIds": {"CorpusId": 252332251}, "url": "https://www.semanticscholar.org/paper/1f66dbf202335f9c9874cdb446d3ac53e2f39cf7", + "externalIds": {"CorpusId": 252332251}, "corpusId": 252332251, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1f66dbf202335f9c9874cdb446d3ac53e2f39cf7", "title": "CONSCIOUSNESS: IN YOUR OWN WORDS", "abstract": ": Surprisingly little is known about how the general public understands consciousness, yet information on common intuitions is crucial to discussions and theories of consciousness. @@ -9460,11 +11022,12 @@ interactions: of associated concepts, represented at varying strengths, such that some are more likely to emerge when people are asked an open-ended question about it.", "venue": "", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "7153229", "name": "M. Graziano"}, - {"authorId": "1742110808", "name": "I. Christian"}]}, {"paperId": "c67b6bde0eb9a3bf7e71e9839489866c69b84261", - "externalIds": {"CorpusId": 252285626}, "url": "https://www.semanticscholar.org/paper/c67b6bde0eb9a3bf7e71e9839489866c69b84261", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "7153229", + "name": "M. Graziano"}, {"authorId": "1742110808", "name": "I. Christian"}]}, + {"paperId": "c67b6bde0eb9a3bf7e71e9839489866c69b84261", "externalIds": {"CorpusId": + 252285626}, "corpusId": 252285626, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c67b6bde0eb9a3bf7e71e9839489866c69b84261", "title": "Proceedings of the Annual Meeting of the Cognitive Science Society Comparing Machine and Human Learning in a Planning Task of Intermediate Complexity", "abstract": "Deep reinforcement learning agents such as AlphaZero have achieved @@ -9481,11 +11044,12 @@ interactions: and human planning, providing an interpretable way of understanding the learning and strength of AlphaZero, while generating novel hypothesis on human planning.", "venue": "", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "98230582", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "98230582", "name": "Permalink"}]}, {"paperId": "5a47c0b7c9f74af88b2128881f55ecb7cc0c28d6", - "externalIds": {"CorpusId": 252306122}, "url": "https://www.semanticscholar.org/paper/5a47c0b7c9f74af88b2128881f55ecb7cc0c28d6", + "externalIds": {"CorpusId": 252306122}, "corpusId": 252306122, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5a47c0b7c9f74af88b2128881f55ecb7cc0c28d6", "title": "Stanford Encyclopedia of Philosophy Arti\ufb01cial Intelligence", "abstract": "Artificial intelligence (AI) is the field devoted to building artificial animals (or at least artificial creatures that \u2013 in suitable @@ -9502,10 +11066,11 @@ interactions: practical reasoning and planning, and so on. In light of this, some philosophers conduct AI research and development as philosophy.", "venue": "", "year": 2022, "referenceCount": 199, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": "f1b954585370428fe78e071f146e545a129d7528", - "externalIds": {"CorpusId": 252000518}, "url": "https://www.semanticscholar.org/paper/f1b954585370428fe78e071f146e545a129d7528", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "f1b954585370428fe78e071f146e545a129d7528", "externalIds": {"CorpusId": 252000518}, + "corpusId": 252000518, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f1b954585370428fe78e071f146e545a129d7528", "title": "Use of Artificial Intelligence and Machine Learning in Medicines with implementation of Bayesian techniques", "abstract": "The interest in artificial intelligence in the medical sciences has increased over the last @@ -9516,22 +11081,24 @@ interactions: is briefly introduced in this article. We talk about causal inference, Bayesian networks, and their (potential) applications in clinical practice.", "venue": "", "year": 2022, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2183704135", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2183704135", "name": "Anubhav Kumar"}, {"authorId": "2183646166", "name": "Virat Sharma"}, {"authorId": "2183641627", "name": "Praveen Verma"}, {"authorId": "2183644765", "name": "Dr. Abhay Bhatia"}, {"authorId": "2184180874", "name": "Dr. Manish Kumar"}]}, {"paperId": "dbe287b1923247f78883fc08e1bc8394df0de631", "externalIds": - {"CorpusId": 251557030}, "url": "https://www.semanticscholar.org/paper/dbe287b1923247f78883fc08e1bc8394df0de631", + {"CorpusId": 251557030}, "corpusId": 251557030, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/dbe287b1923247f78883fc08e1bc8394df0de631", "title": "Unveiling the Effect of using Moebius Transformations on Knowledge Graph Embeddings", "abstract": null, "venue": "", "year": 2022, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "3193518", "name": "Andreas Behrend"}, - {"authorId": "123110496", "name": "Can Aykul"}]}, {"paperId": "74024fcf3d5d445ec6587a2d39a2bdfff1a9378e", - "externalIds": {"CorpusId": 251553985}, "url": "https://www.semanticscholar.org/paper/74024fcf3d5d445ec6587a2d39a2bdfff1a9378e", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "3193518", + "name": "Andreas Behrend"}, {"authorId": "123110496", "name": "Can Aykul"}]}, + {"paperId": "74024fcf3d5d445ec6587a2d39a2bdfff1a9378e", "externalIds": {"CorpusId": + 251553985}, "corpusId": 251553985, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/74024fcf3d5d445ec6587a2d39a2bdfff1a9378e", "title": "EMBODIED ARTIFICIAL INTELLIGENCE IN SCIENCE FICTION PHILOSOPHICAL PRESUPPOSITIONS AND IMPLICATIONS", "abstract": "In this paper, I explore the fruitful relationship between science fiction and philosophy regarding the @@ -9545,12 +11112,13 @@ interactions: the value of exchanging ideas between sci-fi and philosophy to foreshadow and evaluate some scenarios of high ethical relevance. y", "venue": "", "year": 2022, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "5564873", "name": "A. Giannotta"}]}, {"paperId": "bb1a4db63f1ca4522e8ed0ff12c96ed1cfda5a9d", - "externalIds": {"DOI": "10.24132/csrn.3201.10", "CorpusId": 251485247}, "url": - "https://www.semanticscholar.org/paper/bb1a4db63f1ca4522e8ed0ff12c96ed1cfda5a9d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "5564873", "name": "A. Giannotta"}]}, + {"paperId": "bb1a4db63f1ca4522e8ed0ff12c96ed1cfda5a9d", "externalIds": {"DOI": + "10.24132/csrn.3201.10", "CorpusId": 251485247}, "corpusId": 251485247, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bb1a4db63f1ca4522e8ed0ff12c96ed1cfda5a9d", "title": "Chatbot Explorer: Towards an understanding of knowledge bases of chatbot systems", "abstract": "A chatbot can automatically process a user\u2019s request, e.g. to provide a requested information. In doing so, the user starts @@ -9576,14 +11144,16 @@ interactions: our domain experts have shown that our solution can significantly improve the maintainability of chatbot knowledge bases.", "venue": "CSRN", "year": 2022, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": {"name": "CSRN"}, "authors": [{"authorId": - "1388911960", "name": "Alrik Hausdorf"}, {"authorId": "2121286581", "name": - "Lydia M\u00fcller"}, {"authorId": "1810101", "name": "G. Scheuermann"}, {"authorId": - "2121285225", "name": "A. Niekler"}, {"authorId": "51136989", "name": "D. - Wiegreffe"}]}, {"paperId": "697f5c2bcb3867e3310ab432a3cf5f50a6f74b09", "externalIds": - {"DBLP": "conf/ijcai/CohnHMMXZ22", "CorpusId": 251350128}, "url": "https://www.semanticscholar.org/paper/697f5c2bcb3867e3310ab432a3cf5f50a6f74b09", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://doi.org/10.24132/csrn.3201.10", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "CSRN"}, "authors": [{"authorId": "1388911960", + "name": "Alrik Hausdorf"}, {"authorId": "2121286581", "name": "Lydia M\u00fcller"}, + {"authorId": "1810101", "name": "G. Scheuermann"}, {"authorId": "2121285225", + "name": "A. Niekler"}, {"authorId": "51136989", "name": "D. Wiegreffe"}]}, + {"paperId": "697f5c2bcb3867e3310ab432a3cf5f50a6f74b09", "externalIds": {"DBLP": + "conf/ijcai/CohnHMMXZ22", "CorpusId": 251350128}, "corpusId": 251350128, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/697f5c2bcb3867e3310ab432a3cf5f50a6f74b09", "title": "A Framework for Categorising AI Evaluation Instruments", "abstract": "The current and future capabilities of Artificial Intelligence (AI) are typically assessed with an ever increasing number of benchmarks, competitions, tests @@ -9597,16 +11167,16 @@ interactions: rubric is and how well it works to distinguish between EIs and map the evaluation landscape in AI.", "venue": "EBeM@IJCAI", "year": 2022, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "1703235", "name": "A. Cohn"}, - {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}, {"authorId": - "3469093", "name": "Julius Sechang Mboli"}, {"authorId": "2180557970", "name": - "Yael Moros-Daval"}, {"authorId": "2164103794", "name": "Zhiliang Xiang"}, - {"authorId": "25629377", "name": "Lexin Zhou"}]}, {"paperId": "9da79db5f2156231d408a374f54af9846a602b74", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "1703235", + "name": "A. Cohn"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}, + {"authorId": "3469093", "name": "Julius Sechang Mboli"}, {"authorId": "2180557970", + "name": "Yael Moros-Daval"}, {"authorId": "2164103794", "name": "Zhiliang + Xiang"}, {"authorId": "25629377", "name": "Lexin Zhou"}]}, {"paperId": "9da79db5f2156231d408a374f54af9846a602b74", "externalIds": {"DOI": "10.1590/1678-460x202238248453", "CorpusId": 251339716}, - "url": "https://www.semanticscholar.org/paper/9da79db5f2156231d408a374f54af9846a602b74", + "corpusId": 251339716, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9da79db5f2156231d408a374f54af9846a602b74", "title": "The Intersection between Linguistic Theories and Computational Linguistics over time", "abstract": "ABSTRACT Recent achievements have turned Computational linguistics into a dynamic research area, and an important field of application @@ -9623,14 +11193,16 @@ interactions: theories and speculating about its research opportunities and foreseeable limitations.", "venue": "DELTA: Documenta\u00e7\u00e3o de Estudos em Ling\u00fc\u00edstica Te\u00f3rica e Aplicada", "year": 2022, "referenceCount": 28, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "DELTA: - Documenta\u00e7\u00e3o de Estudos em Ling\u00fc\u00edstica Te\u00f3rica e - Aplicada"}, "authors": [{"authorId": "144757810", "name": "Alexandra Moreira"}, - {"authorId": "2164722229", "name": "A. Oliveira"}, {"authorId": "52101414", - "name": "M. Possi"}]}, {"paperId": "bcc86aab7241439174ebf2b726bdc3131f93a407", - "externalIds": {"CorpusId": 251211841}, "url": "https://www.semanticscholar.org/paper/bcc86aab7241439174ebf2b726bdc3131f93a407", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.scielo.br/j/delta/a/QyV53SHM5Z6f5wZhd6Gw8Yy/?lang=en&format=pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "DELTA: Documenta\u00e7\u00e3o de Estudos em Ling\u00fc\u00edstica + Te\u00f3rica e Aplicada"}, "authors": [{"authorId": "144757810", "name": "Alexandra + Moreira"}, {"authorId": "2164722229", "name": "A. Oliveira"}, {"authorId": + "52101414", "name": "M. Possi"}]}, {"paperId": "bcc86aab7241439174ebf2b726bdc3131f93a407", + "externalIds": {"CorpusId": 251211841}, "corpusId": 251211841, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bcc86aab7241439174ebf2b726bdc3131f93a407", "title": "Levels of abstraction and the Turing test. (English)", "abstract": "Summary: An important lesson that philosophy can learn from the Turing test and computer science more generally concerns the careful use of the method @@ -9659,10 +11231,11 @@ interactions: and main advantages. It is hoped that this treatment will promote the use of the method in certain areas of the humanities and especially in philosophy.", "venue": "", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": "d0707c3d6f715f16f8d7fbafb73a2057fa031841", - "externalIds": {"DBLP": "conf/ircdl/Lana22", "CorpusId": 251020054}, "url": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "d0707c3d6f715f16f8d7fbafb73a2057fa031841", "externalIds": {"DBLP": "conf/ircdl/Lana22", + "CorpusId": 251020054}, "corpusId": 251020054, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0707c3d6f715f16f8d7fbafb73a2057fa031841", "title": "Artificial Intelligence Systems Producing Books: Questions of Agency", "abstract": "The publication of the book Beta Writer. 2019. Lithium-Ion Batteries. @@ -9679,13 +11252,14 @@ interactions: systems are characterised by a distributed agency, shared with those who designed them and operate them, and that a new type of author must be defined and recognised.", "venue": "IRCDL", "year": 2022, "referenceCount": 33, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": null, "authors": [{"authorId": - "48030608", "name": "M. Lana"}]}, {"paperId": "350b50817d75598a1014f916b731c91362310f2f", - "externalIds": {"DBLP": "conf/colins/SavytskaSVBP22", "CorpusId": 250625291}, - "url": "https://www.semanticscholar.org/paper/350b50817d75598a1014f916b731c91362310f2f", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + null, "authors": [{"authorId": "48030608", "name": "M. Lana"}]}, {"paperId": + "350b50817d75598a1014f916b731c91362310f2f", "externalIds": {"DBLP": "conf/colins/SavytskaSVBP22", + "CorpusId": 250625291}, "corpusId": 250625291, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/350b50817d75598a1014f916b731c91362310f2f", "title": "Word2Vec Model Analysis for Semantic and Morphologic Similarities in Turkish Words", "abstract": "The study presents the calculation of the similarity between words in Turkish language by using word representation @@ -9706,46 +11280,48 @@ interactions: to conduct high quality semantic and morphologic analysis and arithmetic operations of the word vectors.", "venue": "COLINS", "year": 2022, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "161-176"}, "authors": [{"authorId": "2094582555", - "name": "Larysa Savytska"}, {"authorId": "2106529443", "name": "M. T. S\u00fcbay"}, - {"authorId": "12082005", "name": "N. Vnukova"}, {"authorId": "2106530048", - "name": "Iryna Bezugla"}, {"authorId": "2100991382", "name": "Vasyl Pyvovarov"}]}, - {"paperId": "ee8ecad5af614f94254ee81b0d9bc02e945db615", "externalIds": {"DBLP": - "conf/delta2/FernandesM22", "DOI": "10.5220/0011300800003277", "CorpusId": - 250572178}, "url": "https://www.semanticscholar.org/paper/ee8ecad5af614f94254ee81b0d9bc02e945db615", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "161-176"}, "authors": [{"authorId": + "2094582555", "name": "Larysa Savytska"}, {"authorId": "2106529443", "name": + "M. T. S\u00fcbay"}, {"authorId": "12082005", "name": "N. Vnukova"}, {"authorId": + "2106530048", "name": "Iryna Bezugla"}, {"authorId": "2100991382", "name": + "Vasyl Pyvovarov"}]}, {"paperId": "ee8ecad5af614f94254ee81b0d9bc02e945db615", + "externalIds": {"DBLP": "conf/delta2/FernandesM22", "DOI": "10.5220/0011300800003277", + "CorpusId": 250572178}, "corpusId": 250572178, "publicationVenue": {"id": + "ed849a6a-a2dc-4741-a23c-8a792c881a3d", "name": "Delta", "type": "conference", + "alternate_names": ["DeLTA", "Symp Electron Des Test Appl", "DELTA", "International + Conference on Deep Learning Theory and Applications", "Int Conf Deep Learn + Theory Appl", "Symposium/Workshop on Electronic Design, Test and Applications"], + "issn": "0011-801X", "url": "http://www.wikicfp.com/cfp/program?id=690", "alternate_urls": + ["http://www.delta.scitevents.org"]}, "url": "https://www.semanticscholar.org/paper/ee8ecad5af614f94254ee81b0d9bc02e945db615", "title": "Open-domain Conversational Agent based on Pre-trained Transformers - for Human-Robot Interaction", "abstract": "Over the past years, many breakthroughs - occurred in the field of Machine Learning (ML) and Natural Language Processing - (NLP), such as generative pre-trained transformers (GPTs), and attention mechanisms - that learn contextual relationships between words in a text. These breakthroughs - came with several new possibilities regarding Human-Robot Interactions (e.g. - the creation of an open-domain chatbot). However, a substantial amount of - research and available data are in English, causing lowresourced languages - to be overlooked. This thesis explored this problem with two options: (i) - Translation of the sentences before and after using the model fine-tuned on - an English-based dataset, (ii) Translation of the English-based dataset to - Portuguese and then fine-tune this model on it. When in presence of adequate - training data and a good choice of generation method, it was demonstrated - that DialoGPT (dialogue generative pre-trained transformer), a tunable neural - conversational answer generation model, could learn the basic skills to conduct - a dialogue. For the language models as well as the baseline methods, two sources - of evaluation were used: (i) Metrics for text generation based on uncertainty - (i.e. perplexity), and similarity between sentences (i.e. BLEU, METEOR and - ROUGE) and (ii) Human-based evaluation of the sentences. Finally, it was shown - that it is possible to resort to MT to have a fluent speaking chatbot, in - portuguese. The translation of sentences before and after of the modified - DialoGPT model, using the Daily Dialogue dataset led to the best results.", - "venue": "DeLTA", "year": 2022, "referenceCount": 80, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "168-175"}, "authors": [{"authorId": "113037885", "name": "M. Fernandes"}, - {"authorId": "1746258", "name": "Plinio Moreno"}]}, {"paperId": "41e97ea14b1d3f76269772a1be0e5dc9ccd812f0", - "externalIds": {"CorpusId": 250274066}, "url": "https://www.semanticscholar.org/paper/41e97ea14b1d3f76269772a1be0e5dc9ccd812f0", + for Human-Robot Interaction", "abstract": ": Generative pre-trained transformers + belong to the breakthroughs in Natural Language Processing (NLP), allowing + Human-Robot Interactions ( e.g. the creation of an open-domain chatbot). However, + a substantial amount of research and available data are in English, causing + low-resourced languages to be overlooked. This work addresses this problem + for European Portuguese with two options: (i) Translation of the sentences + before and after using the model \ufb01ne-tuned on an English-based dataset, + (ii) Translation of the English-based dataset to Portuguese and then \ufb01ne-tune + this model on it. We rely on the DialoGPT (dialogue generative pre-trained + transformer), a tunable neural conversational answer generation model that + learns the basic skills to conduct a dialogue. We use two sources of evaluation: + (i) Metrics for text generation based on uncertainty ( i.e. perplexity), and + similarity between sentences ( i.e. BLEU, METEOR and ROUGE) and (ii) Human-based + evaluation of the sentences. The translation of sentences before and after + of the modi\ufb01ed DialoGPT model, using the Daily Dialogue dataset led to + the best results.", "venue": "Delta", "year": 2022, "referenceCount": 82, + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "168-175"}, "authors": [{"authorId": + "113037885", "name": "M. Fernandes"}, {"authorId": "1746258", "name": "Plinio + Moreno"}]}, {"paperId": "41e97ea14b1d3f76269772a1be0e5dc9ccd812f0", "externalIds": + {"CorpusId": 250274066}, "corpusId": 250274066, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/41e97ea14b1d3f76269772a1be0e5dc9ccd812f0", "title": "The Morality of Artificial Friends in Ishiguro\u2019s Klara and the Sun", "abstract": "Can artificial entities be worthy of moral considerations? Can they be artificial moral agents (AMAs), capable of telling the difference @@ -9764,12 +11340,13 @@ interactions: as well as agency ultimately depend on the views of others (from outside), including the others\u2019 own epistemic beliefs about the nature of consciousness and personhood.", "venue": "", "year": 2022, "referenceCount": 51, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2127326294", "name": "Jakob - Stenseke"}]}, {"paperId": "36150e80f549397a57b4b1e8f2a99676ce809b28", "externalIds": - {"DOI": "10.2139/ssrn.4147243", "CorpusId": 250135857}, "url": "https://www.semanticscholar.org/paper/36150e80f549397a57b4b1e8f2a99676ce809b28", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2127326294", + "name": "Jakob Stenseke"}]}, {"paperId": "36150e80f549397a57b4b1e8f2a99676ce809b28", + "externalIds": {"DOI": "10.2139/ssrn.4147243", "CorpusId": 250135857}, "corpusId": + 250135857, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/36150e80f549397a57b4b1e8f2a99676ce809b28", "title": "Preparing for the (Non-Existent?) Future of Work", "abstract": "This paper considers the labor market and distributional implications of a scenario of ever-more-intelligent autonomous machines that substitute for human labor @@ -9792,12 +11369,13 @@ interactions: to achieve a higher level of social welfare by adopting alternative ways of providing these benefits.", "venue": "SSRN Electronic Journal", "year": 2022, "referenceCount": 53, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "4645245", - "name": "Anton Korinek"}, {"authorId": "1659374560", "name": "Megan E. Juelfs"}]}, - {"paperId": "dec7347dfbcc9b5210a07e2e8e1d5b8595a67175", "externalIds": {"CorpusId": - 249668778}, "url": "https://www.semanticscholar.org/paper/dec7347dfbcc9b5210a07e2e8e1d5b8595a67175", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": + "4645245", "name": "Anton Korinek"}, {"authorId": "1659374560", "name": "Megan + E. Juelfs"}]}, {"paperId": "dec7347dfbcc9b5210a07e2e8e1d5b8595a67175", "externalIds": + {"CorpusId": 249668778}, "corpusId": 249668778, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/dec7347dfbcc9b5210a07e2e8e1d5b8595a67175", "title": "Conceptualising Management of Artificial Intelligence in Terms of People, Process, Data and Technology", "abstract": "Artificial Intelligence (AI) is an area of organisational activity that attempts to build human intelligence @@ -9813,20 +11391,22 @@ interactions: and that formulation of 2PDT seems to offer a useful conceptual framework examining this phenomenon.", "venue": "", "year": 2022, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2170257012", "name": "Sahber Monshizada"}]}, - {"paperId": "ea40818e5f51b00f9a9ef533c73526645356e0c7", "externalIds": {"DOI": - "10.5840/techne2022523158", "CorpusId": 249478520}, "url": "https://www.semanticscholar.org/paper/ea40818e5f51b00f9a9ef533c73526645356e0c7", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2170257012", + "name": "Sahber Monshizada"}]}, {"paperId": "ea40818e5f51b00f9a9ef533c73526645356e0c7", + "externalIds": {"DOI": "10.5840/techne2022523158", "CorpusId": 249478520}, + "corpusId": 249478520, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea40818e5f51b00f9a9ef533c73526645356e0c7", "title": "What Does It Mean for a Robot to Be Respectful? in advance", "abstract": "", "venue": "Techn\u00e9: Research in Philosophy and Technology", "year": 2022, "referenceCount": 74, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Techn\u00e9: Research in Philosophy and Technology"}, + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ris.utwente.nl/ws/files/282093391/techne_Babushkina.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Techn\u00e9: Research in Philosophy and Technology"}, "authors": [{"authorId": "115178513", "name": "Dina Babushkina"}]}, {"paperId": "e0d6f51de37f9520d6097bf71b993c7b03307226", "externalIds": {"CorpusId": 249493914}, - "url": "https://www.semanticscholar.org/paper/e0d6f51de37f9520d6097bf71b993c7b03307226", + "corpusId": 249493914, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e0d6f51de37f9520d6097bf71b993c7b03307226", "title": "Historical continuum and norms in art collections and datasets \u2013 Experiments with Artificial Intelligence at Paulista Museum", "abstract": "This article presents a set of experiments in the field of History of Art @@ -9862,12 +11442,13 @@ interactions: Animada. Tais experimentos evidenciam o continuum colonialista que elabora a narrativa hist\u00f3rica a partir de par\u00e2metros e padr\u00f5es visuais normatizantes.", "venue": "", "year": 2022, "referenceCount": 38, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2078886089", "name": "A. Jurno"}, {"authorId": "1513730735", - "name": "G. Beiguelman"}]}, {"paperId": "2a632c9e24324d2a7b94df1a94065f61879aa281", - "externalIds": {"CorpusId": 249426085}, "url": "https://www.semanticscholar.org/paper/2a632c9e24324d2a7b94df1a94065f61879aa281", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "2078886089", "name": "A. Jurno"}, {"authorId": + "1513730735", "name": "G. Beiguelman"}]}, {"paperId": "2a632c9e24324d2a7b94df1a94065f61879aa281", + "externalIds": {"CorpusId": 249426085}, "corpusId": 249426085, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2a632c9e24324d2a7b94df1a94065f61879aa281", "title": "Can Artificial Intelligence be a Critical Success Factor of Construction Projects ? : Project practitioners \u2019 perspectives", "abstract": "Artificial Intelligence (AI) can be defined as constructing computer programs that (i) @@ -9880,12 +11461,13 @@ interactions: learning, genetic algorithms, fuzzy logic, and statistical analysis form the basis of most applications under the label of \u201cAI\u201d.", "venue": "", "year": 2022, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2161847494", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2161847494", "name": "Virender Kumar"}, {"authorId": "88813966", "name": "Amrendra Pandey"}, {"authorId": "2115290267", "name": "Rahul Singh"}]}, {"paperId": "f80cc568652b55250beebc6ba677b11287f96bf8", - "externalIds": {"CorpusId": 249825349}, "url": "https://www.semanticscholar.org/paper/f80cc568652b55250beebc6ba677b11287f96bf8", + "externalIds": {"CorpusId": 249825349}, "corpusId": 249825349, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f80cc568652b55250beebc6ba677b11287f96bf8", "title": "A RTIFICIAL I NTELLIGENCE : F RAMEWORK OF D RIVING T RIGGERS TO P AST , P RESENT AND F UTURE A PPLICATIONS AND I NFLUENCERS OF I NDUSTRY S ECTOR A DOPTION", "abstract": "To gain a sense of the development of Artificial @@ -9898,12 +11480,13 @@ interactions: interdisciplinary research/collaboration that propel AI into an essential transformative technology.", "venue": "", "year": 2022, "referenceCount": 105, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, - {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "2160808545", - "name": "Susan Kaplan"}]}, {"paperId": "ab7f19ddf0558389b776232c911b7e775a58ac42", - "externalIds": {"CorpusId": 249335900}, "url": "https://www.semanticscholar.org/paper/ab7f19ddf0558389b776232c911b7e775a58ac42", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "118867203", + "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, + {"authorId": "2160808545", "name": "Susan Kaplan"}]}, {"paperId": "ab7f19ddf0558389b776232c911b7e775a58ac42", + "externalIds": {"CorpusId": 249335900}, "corpusId": 249335900, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ab7f19ddf0558389b776232c911b7e775a58ac42", "title": "SMU Data Science Review SMU Web Page Multiclass Classification Web Page Multiclass Classification", "abstract": ". As the internet age evolves, the volume of content hosted on the Web is rapidly expanding. With this ever-expanding @@ -9926,13 +11509,14 @@ interactions: shows an accuracy improvement over the baseline model of nearly 1% and a 5-fold reduction in misclassification of web pages as undesirable categories.", "venue": "", "year": 2022, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": null, "authors": [{"authorId": "2167829762", - "name": "Brian Gaither"}, {"authorId": "2167829496", "name": "Antonio Debouse"}, - {"authorId": "2110526769", "name": "Catherine Huang"}]}, {"paperId": "2a1be718a6c8802c97250321b5299446ffdf26cc", - "externalIds": {"DBLP": "conf/caise/Fukas22", "CorpusId": 249282929}, "url": - "https://www.semanticscholar.org/paper/2a1be718a6c8802c97250321b5299446ffdf26cc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": + "2167829762", "name": "Brian Gaither"}, {"authorId": "2167829496", "name": + "Antonio Debouse"}, {"authorId": "2110526769", "name": "Catherine Huang"}]}, + {"paperId": "2a1be718a6c8802c97250321b5299446ffdf26cc", "externalIds": {"DBLP": + "conf/caise/Fukas22", "CorpusId": 249282929}, "corpusId": 249282929, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2a1be718a6c8802c97250321b5299446ffdf26cc", "title": "The Management of Artificial Intelligence: Developing a Framework Based on the Artificial Intelligence Maturity Principle", "abstract": "The use of Artificial Intelligence (AI) must be systematically managed and coordinated @@ -9949,13 +11533,14 @@ interactions: to demonstrate how AI-based information systems can be managed corresponding to the different dimensions of the integrated AI management framework.", "venue": "CAiSE", "year": 2022, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": null, - "journal": {"pages": "19-27"}, "authors": [{"authorId": "2111965685", "name": - "Philipp Fukas"}]}, {"paperId": "0d2dbf6abf2b499379d4364da781591a02ee7211", - "externalIds": {"CorpusId": 249192732}, "url": "https://www.semanticscholar.org/paper/0d2dbf6abf2b499379d4364da781591a02ee7211", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": null, "journal": {"pages": "19-27"}, "authors": + [{"authorId": "2111965685", "name": "Philipp Fukas"}]}, {"paperId": "0d2dbf6abf2b499379d4364da781591a02ee7211", + "externalIds": {"CorpusId": 249192732}, "corpusId": 249192732, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0d2dbf6abf2b499379d4364da781591a02ee7211", "title": "INDUSTRY ADOPTION INFLUENCERS", "abstract": "The authors present a new Framework of Artificial Intelligence which analyzes the key elements of transformational AI in industry. The State of the Art of Artificial Intelligence @@ -9969,12 +11554,13 @@ interactions: accelerating AI development and concludes with a discussion of what are the critical success factors for industry to be transformational in AI.", "venue": "", "year": 2022, "referenceCount": 137, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "118867203", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "118867203", "name": "Richard Fulton"}, {"authorId": "100662887", "name": "Diane Fulton"}, {"authorId": "46902711", "name": "Susan B. Kaplan"}]}, {"paperId": "3e0ea3d704fc48d262eefa317eeec2d478138fb4", - "externalIds": {"CorpusId": 249091327}, "url": "https://www.semanticscholar.org/paper/3e0ea3d704fc48d262eefa317eeec2d478138fb4", + "externalIds": {"CorpusId": 249091327}, "corpusId": 249091327, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3e0ea3d704fc48d262eefa317eeec2d478138fb4", "title": "Open Research Online Can a machine design?", "abstract": ": One strand of my research has been concerned with the computer as a design tool; but a second strand has been concerned with design computing as a research @@ -9985,10 +11571,11 @@ interactions: by some authors, I suggest that the question, \u2018Can a machine design?\u2019 is still a useful question to ask.", "venue": "", "year": 2022, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "8bf8506a2c5ce804336076f8d8d238c2caaeaf32", "externalIds": - {"DBLP": "conf/aistats/TomaszewskaZM22", "CorpusId": 248923808}, "url": "https://www.semanticscholar.org/paper/8bf8506a2c5ce804336076f8d8d238c2caaeaf32", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": []}, {"paperId": "8bf8506a2c5ce804336076f8d8d238c2caaeaf32", + "externalIds": {"DBLP": "conf/aistats/TomaszewskaZM22", "CorpusId": 248923808}, + "corpusId": 248923808, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8bf8506a2c5ce804336076f8d8d238c2caaeaf32", "title": "Duel-based Deep Learning system for solving IQ tests", "abstract": "One of the relevant aspects of Arti\ufb01cial General Intelligence is the ability of machines to demonstrate abstract reasoning skills, for instance, @@ -10004,15 +11591,15 @@ interactions: and is on par with human performance and superior to other literature approaches of compa-rable complexity when training and test sets are from the same distribution.", "venue": "AISTATS", "year": 2022, "referenceCount": 24, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "10483-10492"}, "authors": [{"authorId": "2165804235", "name": "Paulina - Tomaszewska"}, {"authorId": "3465508", "name": "A. Zychowski"}, {"authorId": - "1681735", "name": "J. Ma\u0144dziuk"}]}, {"paperId": "e26658c14f5088aa07248d25df7768007c33a039", - "externalIds": {"DBLP": "conf/avi/AlizadehMS22", "CorpusId": 248941690}, "url": - "https://www.semanticscholar.org/paper/e26658c14f5088aa07248d25df7768007c33a039", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "10483-10492"}, "authors": [{"authorId": "2165804235", + "name": "Paulina Tomaszewska"}, {"authorId": "3465508", "name": "A. Zychowski"}, + {"authorId": "1681735", "name": "J. Ma\u0144dziuk"}]}, {"paperId": "e26658c14f5088aa07248d25df7768007c33a039", + "externalIds": {"DBLP": "conf/avi/AlizadehMS22", "CorpusId": 248941690}, "corpusId": + 248941690, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e26658c14f5088aa07248d25df7768007c33a039", "title": "The reverse Turing test: being human (is) enough in the age of AI", "abstract": "Disposing of bad actors on social media is a daunting task, particularly in the face of \u201cengineered social tampering\u201d [4]. That is what Ferrara @@ -10034,15 +11621,16 @@ interactions: scope for distinguishing between human and non-human actors, while keeping humanity at the forefront of this inquiry.", "venue": "CoPDA@AVI", "year": 2022, "referenceCount": 23, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "49-54"}, "authors": [{"authorId": - "2070900671", "name": "F. Alizadeh"}, {"authorId": "2004535547", "name": "Aikaterini - Mniestri"}, {"authorId": "145183095", "name": "G. Stevens"}]}, {"paperId": - "165d1a9754c947965ad48df36aa8786cc8a62a58", "externalIds": {"DBLP": "conf/acl/LiKL022", - "ACL": "2022.findings-acl.219", "DOI": "10.18653/v1/2022.findings-acl.219", - "CorpusId": 248780383}, "url": "https://www.semanticscholar.org/paper/165d1a9754c947965ad48df36aa8786cc8a62a58", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "49-54"}, "authors": [{"authorId": "2070900671", "name": "F. Alizadeh"}, + {"authorId": "2004535547", "name": "Aikaterini Mniestri"}, {"authorId": "145183095", + "name": "G. Stevens"}]}, {"paperId": "165d1a9754c947965ad48df36aa8786cc8a62a58", + "externalIds": {"DBLP": "conf/acl/LiKL022", "ACL": "2022.findings-acl.219", + "DOI": "10.18653/v1/2022.findings-acl.219", "CorpusId": 248780383}, "corpusId": + 248780383, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/165d1a9754c947965ad48df36aa8786cc8a62a58", "title": "Mitigating Contradictions in Dialogue Based on Contrastive Learning", "abstract": "Chatbot models have achieved remarkable progress in recent years but tend to yield contradictory responses. In this paper, we exploit the advantage @@ -10055,24 +11643,27 @@ interactions: while preserving response fluency, outperforming existing methods on both automatic and human evaluation.", "venue": "FINDINGS", "year": 2022, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "2781-2788"}, "authors": [{"authorId": "2108618065", - "name": "Weizhao Li"}, {"authorId": "1384501695", "name": "Junsheng Kong"}, - {"authorId": "2165226829", "name": "Ben Liao"}, {"authorId": "2149184259", + "openAccessPdf": {"url": "https://aclanthology.org/2022.findings-acl.219.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "2781-2788"}, "authors": [{"authorId": + "2108618065", "name": "Weizhao Li"}, {"authorId": "1384501695", "name": "Junsheng + Kong"}, {"authorId": "2165226829", "name": "Ben Liao"}, {"authorId": "2149184259", "name": "Yi Cai"}]}, {"paperId": "48ee13a2a52dec1f14d12fe1f17f7fa358f94490", "externalIds": {"DOI": "10.1016/j.gastha.2022.02.025", "CorpusId": 248738846}, - "url": "https://www.semanticscholar.org/paper/48ee13a2a52dec1f14d12fe1f17f7fa358f94490", + "corpusId": 248738846, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48ee13a2a52dec1f14d12fe1f17f7fa358f94490", "title": "Artificial Intelligence and the Future of Gastroenterology and Hepatology", "abstract": null, "venue": "Gastro Hep Advances", "year": 2022, "referenceCount": 126, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Gastro Hep Advances"}, "authors": [{"authorId": "8677460", "name": - "Daniel D. Penrice"}, {"authorId": "1490505386", "name": "P. Rattan"}, {"authorId": - "14603481", "name": "D. Simonetto"}]}, {"paperId": "a1d46e594cb8edcc71881856317e0d2bce41f9fd", - "externalIds": {"CorpusId": 248690963}, "url": "https://www.semanticscholar.org/paper/a1d46e594cb8edcc71881856317e0d2bce41f9fd", + "openAccessPdf": {"url": "http://www.ghadvances.org/article/S2772572322000437/pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Gastro Hep Advances"}, "authors": [{"authorId": "8677460", + "name": "Daniel D. Penrice"}, {"authorId": "1490505386", "name": "P. Rattan"}, + {"authorId": "14603481", "name": "D. Simonetto"}]}, {"paperId": "a1d46e594cb8edcc71881856317e0d2bce41f9fd", + "externalIds": {"CorpusId": 248690963}, "corpusId": 248690963, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a1d46e594cb8edcc71881856317e0d2bce41f9fd", "title": "The Mapping of Deep Language Models on Brain Responses Primarily Depends on their Performance", "abstract": "Recent deep networks like transformers not only excel in several language tasks, but their activations 1 linearly @@ -10093,12 +11684,13 @@ interactions: to brain- 12 like solutions, and shows how this phenomenon helps unravel the brain bases of natural language 13 processing.", "venue": "", "year": 2022, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "83928755", "name": "C. Caucheteux"}]}, {"paperId": "1fe02bbbe43fa4af145bfce1c1e3de1ae366dfa4", - "externalIds": {"DBLP": "conf/csedu/SondereggerS22", "DOI": "10.5220/0010999200003182", - "CorpusId": 248628307}, "url": "https://www.semanticscholar.org/paper/1fe02bbbe43fa4af145bfce1c1e3de1ae366dfa4", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "83928755", "name": "C. Caucheteux"}]}, {"paperId": + "1fe02bbbe43fa4af145bfce1c1e3de1ae366dfa4", "externalIds": {"DBLP": "conf/csedu/SondereggerS22", + "DOI": "10.5220/0010999200003182", "CorpusId": 248628307}, "corpusId": 248628307, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1fe02bbbe43fa4af145bfce1c1e3de1ae366dfa4", "title": "Chatbot-mediated Learning: Conceptual Framework for the Design of Chatbot Use Cases in Education", "abstract": ": While chatbots or conversational agents are already common in many business areas, e.g. for customer support, @@ -10119,13 +11711,14 @@ interactions: framework provides an overview of possibilities of how chatbots in education can be used and designed.", "venue": "CSEDU", "year": 2022, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - null, "journal": {"pages": "207-215"}, "authors": [{"authorId": "2056193477", - "name": "Stefan Sonderegger"}, {"authorId": "134177694", "name": "S. Seufert"}]}, - {"paperId": "8c0ac9096850097c742e9a65524a04293c3d337f", "externalIds": {"CorpusId": - 248386928}, "url": "https://www.semanticscholar.org/paper/8c0ac9096850097c742e9a65524a04293c3d337f", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": null, "journal": {"pages": "207-215"}, "authors": + [{"authorId": "2056193477", "name": "Stefan Sonderegger"}, {"authorId": "134177694", + "name": "S. Seufert"}]}, {"paperId": "8c0ac9096850097c742e9a65524a04293c3d337f", + "externalIds": {"CorpusId": 248386928}, "corpusId": 248386928, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8c0ac9096850097c742e9a65524a04293c3d337f", "title": "Information temperature as a measure of DNA\u2019s and texts complexity", "abstract": "C. Shannon introduced the notion of entropy for random sequences. What about their temperature? After discussing some methods for introducing @@ -10135,12 +11728,13 @@ interactions: we discuss the question of whether the temperature can characterize the academic level of the text, or serve as an indicator of the quality of brain activity of the text author.", "venue": "", "year": 2022, "referenceCount": 26, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "69984277", "name": "A. Usikov"}]}, {"paperId": "d877c9acfe5754e5e577355fa417264d53e04502", - "externalIds": {"DOI": "10.17721/1728-2195/2022/1.120-7", "CorpusId": 248314209}, - "url": "https://www.semanticscholar.org/paper/d877c9acfe5754e5e577355fa417264d53e04502", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "69984277", "name": "A. Usikov"}]}, + {"paperId": "d877c9acfe5754e5e577355fa417264d53e04502", "externalIds": {"DOI": + "10.17721/1728-2195/2022/1.120-7", "CorpusId": 248314209}, "corpusId": 248314209, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d877c9acfe5754e5e577355fa417264d53e04502", "title": "TOWARDS THE ISSUE ON IMPROVING THE PROTECTION OF INFORMATION RIGHTS OF INDIVIDUALS IN RELATIONS CONNECTED WITH THE USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES", "abstract": "The article examines the peculiarities of the @@ -10175,19 +11769,22 @@ interactions: rights, information offense, information rights, artificial intelligence technologies, individual", "venue": "Bulletin of Taras Shevchenko National University of Kyiv. Legal Studies", "year": 2022, "referenceCount": 2, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://visnyk.law.knu.ua/images/articles/7-120.pdf", "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Bulletin of Taras Shevchenko National University of Kyiv. Legal Studies"}, "authors": [{"authorId": "1506520723", "name": "O. Zaiarnyi"}]}, {"paperId": "deedf17852328b0dbe73c1f80cec8c8cb3ec5caf", - "externalIds": {"CorpusId": 248067907}, "url": "https://www.semanticscholar.org/paper/deedf17852328b0dbe73c1f80cec8c8cb3ec5caf", + "externalIds": {"CorpusId": 248067907}, "corpusId": 248067907, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/deedf17852328b0dbe73c1f80cec8c8cb3ec5caf", "title": "Buddhism and Intelligent Technology: Toward a More Humane Future", "abstract": null, "venue": "", "year": 2022, "referenceCount": 9, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2673288", "name": "Soraj - Hongladarom"}]}, {"paperId": "7c6379e6650c382c4d66a4cfb5209b470572fbdb", "externalIds": - {"CorpusId": 247951496}, "url": "https://www.semanticscholar.org/paper/7c6379e6650c382c4d66a4cfb5209b470572fbdb", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2673288", + "name": "Soraj Hongladarom"}]}, {"paperId": "7c6379e6650c382c4d66a4cfb5209b470572fbdb", + "externalIds": {"CorpusId": 247951496}, "corpusId": 247951496, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7c6379e6650c382c4d66a4cfb5209b470572fbdb", "title": "APPLICATION OF ARTIFICIAL INTELLIGENCE IN THE PAYMENT SYSTEM", "abstract": "Globally few billions of people visit malls and shopping centers every month. This reflects not just the integral place that malls hold in retail landscape, @@ -10202,35 +11799,39 @@ interactions: better customer engagement, explore new avenues for revenue, enable tenants to boost productivity and more.", "venue": "", "year": 2022, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2129611073", "name": "D. Divya"}, {"authorId": - "2161393537", "name": "Mrs Harshitha Mallik"}]}, {"paperId": "a865394c760be35e6f6c9e20f616a06f0b9c4e6d", - "externalIds": {"DOI": "10.1017/s1477175621000506", "CorpusId": 247475621}, - "url": "https://www.semanticscholar.org/paper/a865394c760be35e6f6c9e20f616a06f0b9c4e6d", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2129611073", "name": "D. + Divya"}, {"authorId": "2161393537", "name": "Mrs Harshitha Mallik"}]}, {"paperId": + "a865394c760be35e6f6c9e20f616a06f0b9c4e6d", "externalIds": {"DOI": "10.1017/s1477175621000506", + "CorpusId": 247475621}, "corpusId": 247475621, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a865394c760be35e6f6c9e20f616a06f0b9c4e6d", "title": "LOVE BYTES: THE FUTURE OF BIO\u2013R2 RELATIONSHIPS", "abstract": "What would a romantic relationship between a biological human and an artificial intelligence system look like? The question is explored through a fictional correspondence between Alan Turing and Ada Lovelace.", "venue": "Think", "year": 2022, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "21", "pages": "93 - 99", "name": "Think"}, "authors": [{"authorId": - "103957127", "name": "J. J. Joaquin"}, {"authorId": "113768318", "name": "Hazel - T. Biana"}]}, {"paperId": "039798a69b7f0d877341a5c1dcfe2cd811706d6d", "externalIds": - {"DBLP": "journals/tismir/Rohrmeier22", "DOI": "10.5334/tismir.104", "CorpusId": - 247375389}, "url": "https://www.semanticscholar.org/paper/039798a69b7f0d877341a5c1dcfe2cd811706d6d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "21", "pages": "93 - 99", "name": "Think"}, "authors": + [{"authorId": "103957127", "name": "J. J. Joaquin"}, {"authorId": "113768318", + "name": "Hazel T. Biana"}]}, {"paperId": "039798a69b7f0d877341a5c1dcfe2cd811706d6d", + "externalIds": {"DBLP": "journals/tismir/Rohrmeier22", "DOI": "10.5334/tismir.104", + "CorpusId": 247375389}, "corpusId": 247375389, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/039798a69b7f0d877341a5c1dcfe2cd811706d6d", "title": "On Creativity, Music''s AI Completeness, and Four Challenges for Artificial Musical Creativity", "abstract": null, "venue": "Trans. Int. Soc. Music. Inf. Retr.", "year": 2022, "referenceCount": 86, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"volume": "5", "pages": - "50-66", "name": "Trans. Int. Soc. Music. Inf. Retr."}, "authors": [{"authorId": - "1971449", "name": "M. Rohrmeier"}]}, {"paperId": "a7c4d97ede448557fe6bcdb16fce22442307f756", - "externalIds": {"CorpusId": 247161041}, "url": "https://www.semanticscholar.org/paper/a7c4d97ede448557fe6bcdb16fce22442307f756", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://transactions.ismir.net/articles/10.5334/tismir.104/galley/124/download/", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"volume": "5", "pages": "50-66", "name": "Trans. Int. Soc. + Music. Inf. Retr."}, "authors": [{"authorId": "1971449", "name": "M. Rohrmeier"}]}, + {"paperId": "a7c4d97ede448557fe6bcdb16fce22442307f756", "externalIds": {"CorpusId": + 247161041}, "corpusId": 247161041, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7c4d97ede448557fe6bcdb16fce22442307f756", "title": "Design principles and architecture of a second language learning chatbot", "abstract": "The purpose of this article is to set out the design principles and architecture of a second language (L2) learning voice chatbot. @@ -10250,31 +11851,37 @@ interactions: an effective language learning companion for L2 learners, and has implications for the design and developments of future L2 chatbots.", "venue": "", "year": 2022, "referenceCount": 48, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Linguistics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2149548198", "name": "Dongkwang - Shin"}, {"authorId": "2108620183", "name": "J. Lee"}]}, {"paperId": "90c33370e29ac97cccf04380a83ac88189d3c24e", - "externalIds": {"CorpusId": 247087613}, "url": "https://www.semanticscholar.org/paper/90c33370e29ac97cccf04380a83ac88189d3c24e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2149548198", + "name": "Dongkwang Shin"}, {"authorId": "2108620183", "name": "J. Lee"}]}, + {"paperId": "90c33370e29ac97cccf04380a83ac88189d3c24e", "externalIds": {"CorpusId": + 247087613}, "corpusId": 247087613, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/90c33370e29ac97cccf04380a83ac88189d3c24e", "title": "Nature Inspired Computing Machine", "abstract": "Abstract", "venue": "", "year": 2022, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2089318432", "name": "R. - Vijayaraghavan"}, {"authorId": "2156138175", "name": "Samanvita Nagaraju"}]}, - {"paperId": "1301dcaaafd4118f53e4eefc22571bd1642fbc62", "externalIds": {"DOI": - "10.1007/978-3-030-93921-2_22", "CorpusId": 246962285}, "url": "https://www.semanticscholar.org/paper/1301dcaaafd4118f53e4eefc22571bd1642fbc62", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2089318432", + "name": "R. Vijayaraghavan"}, {"authorId": "2156138175", "name": "Samanvita + Nagaraju"}]}, {"paperId": "1301dcaaafd4118f53e4eefc22571bd1642fbc62", "externalIds": + {"DOI": "10.1007/978-3-030-93921-2_22", "CorpusId": 246962285}, "corpusId": + 246962285, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1301dcaaafd4118f53e4eefc22571bd1642fbc62", "title": "Robots in the Neighborhood: Application and Criminalization of the Artificial Intelligence in Education", "abstract": null, "venue": "Technologies, Artificial Intelligence and the Future of Learning Post-COVID-19", "year": 2022, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Technologies, Artificial Intelligence - and the Future of Learning Post-COVID-19"}, "authors": [{"authorId": "97563744", - "name": "Farhana Helal Mehtab"}, {"authorId": "46551543", "name": "A. Mahmud"}]}, - {"paperId": "7ebe8860bc7d22cd2a5ca6166cb045f539e91e76", "externalIds": {"DBLP": - "journals/access/MunSSY22", "DOI": "10.1109/ACCESS.2022.3152526", "CorpusId": - 246955149}, "url": "https://www.semanticscholar.org/paper/7ebe8860bc7d22cd2a5ca6166cb045f539e91e76", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Technologies, Artificial + Intelligence and the Future of Learning Post-COVID-19"}, "authors": [{"authorId": + "97563744", "name": "Farhana Helal Mehtab"}, {"authorId": "46551543", "name": + "A. Mahmud"}]}, {"paperId": "7ebe8860bc7d22cd2a5ca6166cb045f539e91e76", "externalIds": + {"DBLP": "journals/access/MunSSY22", "DOI": "10.1109/ACCESS.2022.3152526", + "CorpusId": 246955149}, "corpusId": 246955149, "publicationVenue": {"id": + "2633f5b2-c15c-49fe-80f5-07523e770c26", "name": "IEEE Access", "type": "journal", + "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, + "url": "https://www.semanticscholar.org/paper/7ebe8860bc7d22cd2a5ca6166cb045f539e91e76", "title": "Black-Box Audio Adversarial Attack Using Particle Swarm Optimization", "abstract": "The development of artificial neural networks and artificial intelligence has helped to address problems and improve services in various @@ -10302,50 +11909,55 @@ interactions: that is 71.41% and 8% better in terms of query and success rates than existing GA-based attacks, respectively.", "venue": "IEEE Access", "year": 2022, "referenceCount": 50, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "10", "pages": "23532-23544", "name": "IEEE Access"}, - "authors": [{"authorId": "98436176", "name": "H. Mun"}, {"authorId": "2154999796", - "name": "Sunggwan Seo"}, {"authorId": "2154980791", "name": "Baehoon Son"}, - {"authorId": "4198724", "name": "J. Yun"}]}, {"paperId": "c835a2efd4ef146cb2d9a935e277e3e22c0a9d87", - "externalIds": {"DOI": "10.1016/b978-0-323-90508-4.00007-1", "CorpusId": 246799579}, - "url": "https://www.semanticscholar.org/paper/c835a2efd4ef146cb2d9a935e277e3e22c0a9d87", + "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/9668973/09716139.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "10", "pages": "23532-23544", + "name": "IEEE Access"}, "authors": [{"authorId": "98436176", "name": "H. Mun"}, + {"authorId": "2154999796", "name": "Sunggwan Seo"}, {"authorId": "2154980791", + "name": "Baehoon Son"}, {"authorId": "4198724", "name": "J. Yun"}]}, {"paperId": + "c835a2efd4ef146cb2d9a935e277e3e22c0a9d87", "externalIds": {"DOI": "10.1016/b978-0-323-90508-4.00007-1", + "CorpusId": 246799579}, "corpusId": 246799579, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c835a2efd4ef146cb2d9a935e277e3e22c0a9d87", "title": "Recent advances of image processing techniques in agriculture", "abstract": null, "venue": "Artificial Intelligence and Data Science in Environmental Sensing", "year": 2022, "referenceCount": 75, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Artificial Intelligence - and Data Science in Environmental Sensing"}, "authors": [{"authorId": "47576177", - "name": "Helia Farhood"}, {"authorId": "2154226792", "name": "Ivan Bakhshayeshi"}, - {"authorId": "2148325595", "name": "Matineh Pooshideh"}, {"authorId": "2047067184", - "name": "Nabi Rezvani"}, {"authorId": "24901061", "name": "A. Beheshti"}]}, - {"paperId": "8c1bb43628ac320166b635b8aa521c13b83e25a8", "externalIds": {"DOI": - "10.1016/b978-0-12-820125-1.00017-8", "CorpusId": 245980953}, "url": "https://www.semanticscholar.org/paper/8c1bb43628ac320166b635b8aa521c13b83e25a8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"name": + "Artificial Intelligence and Data Science in Environmental Sensing"}, "authors": + [{"authorId": "47576177", "name": "Helia Farhood"}, {"authorId": "2154226792", + "name": "Ivan Bakhshayeshi"}, {"authorId": "2148325595", "name": "Matineh + Pooshideh"}, {"authorId": "2047067184", "name": "Nabi Rezvani"}, {"authorId": + "24901061", "name": "A. Beheshti"}]}, {"paperId": "8c1bb43628ac320166b635b8aa521c13b83e25a8", + "externalIds": {"DOI": "10.1016/b978-0-12-820125-1.00017-8", "CorpusId": 245980953}, + "corpusId": 245980953, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8c1bb43628ac320166b635b8aa521c13b83e25a8", "title": "A brief introduction to supervised, unsupervised, and reinforcement learning", "abstract": null, "venue": "Biosignal Processing and Classification Using Computational Learning and Intelligence", "year": 2022, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Biosignal Processing and Classification Using Computational - Learning and Intelligence"}, "authors": [{"authorId": "34970419", "name": - "E. Morales"}, {"authorId": "1742688", "name": "H. Escalante"}]}, {"paperId": - "3ebeaa05b88a4afba1fac2ca5e5b9f8e50796810", "externalIds": {"DOI": "10.1007/978-3-030-92537-6_21", - "CorpusId": 245638546}, "url": "https://www.semanticscholar.org/paper/3ebeaa05b88a4afba1fac2ca5e5b9f8e50796810", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Biosignal Processing and Classification + Using Computational Learning and Intelligence"}, "authors": [{"authorId": + "34970419", "name": "E. Morales"}, {"authorId": "1742688", "name": "H. Escalante"}]}, + {"paperId": "3ebeaa05b88a4afba1fac2ca5e5b9f8e50796810", "externalIds": {"DOI": + "10.1007/978-3-030-92537-6_21", "CorpusId": 245638546}, "corpusId": 245638546, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3ebeaa05b88a4afba1fac2ca5e5b9f8e50796810", "title": "The Role of Artificial Intelligence Technology in Improving the Resilience of Supply Chain During COVID-19", "abstract": null, "venue": "Advances in Artificial Systems for Medicine and Education V", "year": 2022, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Advances in Artificial Systems for Medicine and Education V"}, "authors": - [{"authorId": "2115547706", "name": "Zhong Zheng"}, {"authorId": "2116290749", - "name": "G. Zhang"}, {"authorId": "2108866581", "name": "Yun Lin"}, {"authorId": - "2111245477", "name": "Yanfang Pan"}, {"authorId": "2145998276", "name": "Yandong - He"}]}, {"paperId": "9fe3027bb2e9c4bb95fe71675109673f552d050b", "externalIds": - {"DBLP": "journals/csse/AdekolaUSDMOAEK22", "DOI": "10.32604/csse.2022.021029", - "CorpusId": 243999428}, "url": "https://www.semanticscholar.org/paper/9fe3027bb2e9c4bb95fe71675109673f552d050b", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Advances in Artificial Systems for Medicine and + Education V"}, "authors": [{"authorId": "2115547706", "name": "Zhong Zheng"}, + {"authorId": "2116290749", "name": "G. Zhang"}, {"authorId": "2108866581", + "name": "Yun Lin"}, {"authorId": "2111245477", "name": "Yanfang Pan"}, {"authorId": + "2145998276", "name": "Yandong He"}]}, {"paperId": "9fe3027bb2e9c4bb95fe71675109673f552d050b", + "externalIds": {"DBLP": "journals/csse/AdekolaUSDMOAEK22", "DOI": "10.32604/csse.2022.021029", + "CorpusId": 243999428}, "corpusId": 243999428, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9fe3027bb2e9c4bb95fe71675109673f552d050b", "title": "Object Tracking-Based \"Follow-Me\" Unmanned Aerial Vehicle (UAV) System", "abstract": "The applications of information technology (IT) tools and techniques have, over the years, simplified complex problem solving procedures. @@ -10367,20 +11979,22 @@ interactions: and the drone. Conclusively, investments in UAVs would enhance creation of quality graphic contents.", "venue": "Comput. Syst. Sci. Eng.", "year": 2022, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "41", "pages": "875-890", "name": "Comput. Syst. - Sci. Eng."}, "authors": [{"authorId": "143703557", "name": "O. Adekola"}, - {"authorId": "2142976698", "name": "Onyedikachi Kenny Udekwu"}, {"authorId": - "2143008219", "name": "Oluwatobi Tolulope Saliu"}, {"authorId": "2042235630", - "name": "D. Dada"}, {"authorId": "72967275", "name": "Stephen O. Maitanmi"}, - {"authorId": "3067714", "name": "Victor Odumuyiwa"}, {"authorId": "2140085122", - "name": "O. Alao"}, {"authorId": "49296041", "name": "M. Eze"}, {"authorId": - "52087390", "name": "F. A. Kasali"}, {"authorId": "2140110105", "name": "Ayokunle - Omotunde"}]}, {"paperId": "cf65602ffdffd0958cacb2bf118d64787a90d446", "externalIds": - {"MAG": "3203641768", "DOI": "10.4018/978-1-7998-7959-6.ch004", "CorpusId": - 244189400}, "url": "https://www.semanticscholar.org/paper/cf65602ffdffd0958cacb2bf118d64787a90d446", + true, "openAccessPdf": {"url": "https://www.techscience.com/csse/v41n3/45536/pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "41", "pages": "875-890", "name": + "Comput. Syst. Sci. Eng."}, "authors": [{"authorId": "143703557", "name": + "O. Adekola"}, {"authorId": "2142976698", "name": "Onyedikachi Kenny Udekwu"}, + {"authorId": "2143008219", "name": "Oluwatobi Tolulope Saliu"}, {"authorId": + "2042235630", "name": "D. Dada"}, {"authorId": "72967275", "name": "Stephen + O. Maitanmi"}, {"authorId": "3067714", "name": "Victor Odumuyiwa"}, {"authorId": + "2140085122", "name": "O. Alao"}, {"authorId": "49296041", "name": "M. Eze"}, + {"authorId": "52087390", "name": "F. A. Kasali"}, {"authorId": "2140110105", + "name": "Ayokunle Omotunde"}]}, {"paperId": "cf65602ffdffd0958cacb2bf118d64787a90d446", + "externalIds": {"MAG": "3203641768", "DOI": "10.4018/978-1-7998-7959-6.ch004", + "CorpusId": 244189400}, "corpusId": 244189400, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cf65602ffdffd0958cacb2bf118d64787a90d446", "title": "Transforming CRM Through Artificial Intelligence", "abstract": "The present times are disrupting times for every kind of business and every aspect of a business. It is not about contactlessness; it is about seamlessness. @@ -10393,15 +12007,20 @@ interactions: of the interior. This chapter explores the transformation of CRM through artificial intelligence.", "venue": "Advances in Marketing, Customer Relationship Management, and E-Services", "year": 2022, "referenceCount": 29, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Advances in Marketing, Customer Relationship Management, - and E-Services"}, "authors": [{"authorId": "9448829", "name": "Abhinav Chaturvedi"}, - {"authorId": "115811848", "name": "M. Chaturvedi"}]}, {"paperId": "f71c6b6d02a6715276b4f8694fd77212577fa050", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Advances in Marketing, + Customer Relationship Management, and E-Services"}, "authors": [{"authorId": + "9448829", "name": "Abhinav Chaturvedi"}, {"authorId": "115811848", "name": + "M. Chaturvedi"}]}, {"paperId": "f71c6b6d02a6715276b4f8694fd77212577fa050", "externalIds": {"ACL": "2021.sigdial-1.41", "DBLP": "conf/sigdial/DogruozS21", "ArXiv": "2211.13560", "DOI": "10.48550/arXiv.2211.13560", "CorpusId": 237099289}, - "url": "https://www.semanticscholar.org/paper/f71c6b6d02a6715276b4f8694fd77212577fa050", + "corpusId": 237099289, "publicationVenue": {"id": "6a470734-72c6-4809-a07d-d34dee0df4a1", + "name": "SIGDIAL Conferences", "type": "conference", "alternate_names": ["SIGDIAL", + "SIGDIAL Conf", "Annu Meet Sp\u00e9c Interest Group Discourse Dialogue", "Annual + Meeting of the Special Interest Group on Discourse and Dialogue"]}, "url": + "https://www.semanticscholar.org/paper/f71c6b6d02a6715276b4f8694fd77212577fa050", "title": "How \u201copen\u201d are the conversations with open-domain chatbots? A proposal for Speech Event based evaluation", "abstract": "Open-domain chatbots are supposed to converse freely with humans without being restricted to a @@ -10422,14 +12041,19 @@ interactions: abilities yet, and (b) revising the evaluation methods to test the chatbot conversations against other speech events.", "venue": "SIGDIAL Conferences", "year": 2022, "referenceCount": 28, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2022-11-24", "journal": {"volume": "abs/2211.13560", "name": "ArXiv"}, "authors": - [{"authorId": "1904399", "name": "A. Seza Do\u011fru\u00f6z"}, {"authorId": - "1711959", "name": "Gabriel Skantze"}]}, {"paperId": "8afab76a0c94ab7ace7ec7371273cad085485e98", - "externalIds": {"DOI": "10.3389/fcomp.2021.766053", "CorpusId": 247478809}, - "url": "https://www.semanticscholar.org/paper/8afab76a0c94ab7ace7ec7371273cad085485e98", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2022-11-24", "journal": {"volume": + "abs/2211.13560", "name": "ArXiv"}, "authors": [{"authorId": "1904399", "name": + "A. Seza Do\u011fru\u00f6z"}, {"authorId": "1711959", "name": "Gabriel Skantze"}]}, + {"paperId": "8afab76a0c94ab7ace7ec7371273cad085485e98", "externalIds": {"DOI": + "10.3389/fcomp.2021.766053", "CorpusId": 247478809}, "corpusId": 247478809, + "publicationVenue": {"id": "6e6a3f97-8b99-4453-9a97-8f5cd0fb30b3", "name": + "Frontiers of Computer Science", "alternate_names": ["Frontiers in Computer + Science", "Front Comput Sci"], "issn": "2095-2228", "alternate_issns": ["2624-9898"], + "url": "https://www.springer.com/computer/journal/11704", "alternate_urls": + ["https://www.frontiersin.org/journals/computer-science#"]}, "url": "https://www.semanticscholar.org/paper/8afab76a0c94ab7ace7ec7371273cad085485e98", "title": "On the Frontiers of Software Science and Software Engineering", "abstract": "Advances in software engineering, software science, computational intelligence, and intelligent mathematics have led to the establishment of @@ -10442,14 +12066,20 @@ interactions: studies and emerging topics in software engineering including tools, development platforms, industrial processes, management infrastructures, quality assurance schemes, big data systems, and software migrations across languages and platforms.", - "venue": "Frontiers in Computer Science", "year": 2022, "referenceCount": + "venue": "Frontiers of Computer Science", "year": 2022, "referenceCount": 30, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-03-17", - "journal": {"volume": "3"}, "authors": [{"authorId": "1700522", "name": "Guoyin - Wang"}]}, {"paperId": "beeb51d7c12120b5da5d377a63c3e95cd0c9a024", "externalIds": - {"PubMedCentral": "8886212", "DOI": "10.3389/fcvm.2021.816985", "CorpusId": - 246814770, "PubMed": "35242820"}, "url": "https://www.semanticscholar.org/paper/beeb51d7c12120b5da5d377a63c3e95cd0c9a024", + "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcomp.2021.766053/pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-03-17", "journal": {"volume": "3"}, "authors": [{"authorId": "1700522", + "name": "Guoyin Wang"}]}, {"paperId": "beeb51d7c12120b5da5d377a63c3e95cd0c9a024", + "externalIds": {"PubMedCentral": "8886212", "DOI": "10.3389/fcvm.2021.816985", + "CorpusId": 246814770, "PubMed": "35242820"}, "corpusId": 246814770, "publicationVenue": + {"id": "3bc0e661-dc2a-454a-9ff5-6515430ce9ff", "name": "Frontiers in Cardiovascular + Medicine", "type": "journal", "alternate_names": ["Front Cardiovasc Med"], + "issn": "2297-055X", "url": "http://www.frontiersin.org/Cardiovascular_Medicine", + "alternate_urls": ["http://www.frontiersin.org/Cardiovascular_Medicine/about", + "https://www.frontiersin.org/journals/cardiovascular-medicine"]}, "url": "https://www.semanticscholar.org/paper/beeb51d7c12120b5da5d377a63c3e95cd0c9a024", "title": "A Systematic Quality Scoring Analysis to Assess Automated Cardiovascular Magnetic Resonance Segmentation Algorithms", "abstract": "Background The quantitative measures used to assess the performance of automated methods often do not @@ -10485,8 +12115,9 @@ interactions: in artificial intelligence and its acceptability in the clinical workflow.", "venue": "Frontiers in Cardiovascular Medicine", "year": 2022, "referenceCount": 32, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcvm.2021.816985/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2022-02-15", "journal": {"volume": "8", "name": "Frontiers in Cardiovascular Medicine"}, "authors": [{"authorId": "84457259", "name": "E. Rauseo"}, {"authorId": "108746298", @@ -10501,7 +12132,13 @@ interactions: {"authorId": "144298593", "name": "N. Aung"}, {"authorId": "144236487", "name": "S. Petersen"}]}, {"paperId": "a6052113eb4a201782e78deae5fd888e5d77b5b3", "externalIds": {"PubMedCentral": "8789682", "DOI": "10.3389/fpsyg.2021.643276", - "CorpusId": 245926123, "PubMed": "35095629"}, "url": "https://www.semanticscholar.org/paper/a6052113eb4a201782e78deae5fd888e5d77b5b3", + "CorpusId": 245926123, "PubMed": "35095629"}, "corpusId": 245926123, "publicationVenue": + {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", + "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", + "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": + ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", + "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, + "url": "https://www.semanticscholar.org/paper/a6052113eb4a201782e78deae5fd888e5d77b5b3", "title": "Cognition Without Neural Representation: Dynamics of a Complex System", "abstract": "This paper proposes an account of neurocognitive activity without leveraging the notion of neural representation. Neural representation is a @@ -10519,14 +12156,15 @@ interactions: formalisms with the theoretical contextualisation provided by Embodied and Enactive Cognitive Science (EECS).", "venue": "Frontiers in Psychology", "year": 2022, "referenceCount": 146, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-12", "journal": - {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": - "2767883", "name": "In\u00eas Hip\u00f3lito"}]}, {"paperId": "82bf8909e1f2a5fd31891d4944403b1b67a5555b", - "externalIds": {"DOI": "10.22214/ijraset.2021.39717", "CorpusId": 245719855}, - "url": "https://www.semanticscholar.org/paper/82bf8909e1f2a5fd31891d4944403b1b67a5555b", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fpsyg.2021.643276/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2022-01-12", "journal": {"volume": "12", "name": "Frontiers + in Psychology"}, "authors": [{"authorId": "2767883", "name": "In\u00eas Hip\u00f3lito"}]}, + {"paperId": "82bf8909e1f2a5fd31891d4944403b1b67a5555b", "externalIds": {"DOI": + "10.22214/ijraset.2021.39717", "CorpusId": 245719855}, "corpusId": 245719855, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82bf8909e1f2a5fd31891d4944403b1b67a5555b", "title": "Music Recommender System Using ChatBot", "abstract": "Abstract: In this era of technological advances, text-based music recommendations are much needed as they will help humans relieve stress with soothing music according @@ -10548,14 +12186,17 @@ interactions: Survey, Methodology, Equations, Planning, Tools and Technology, Conclusion.", "venue": "International Journal for Research in Applied Science and Engineering Technology", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-31", - "journal": {"name": "International Journal for Research in Applied Science - and Engineering Technology"}, "authors": [{"authorId": "2148703549", "name": - "Shivam Sakore"}]}, {"paperId": "3894973d1dce2a9d75af9da75001c15474b55296", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-12-31", "journal": {"name": "International Journal for Research in Applied + Science and Engineering Technology"}, "authors": [{"authorId": "2148703549", + "name": "Shivam Sakore"}]}, {"paperId": "3894973d1dce2a9d75af9da75001c15474b55296", "externalIds": {"DOI": "10.1177/10778004211065813", "CorpusId": 245628321}, - "url": "https://www.semanticscholar.org/paper/3894973d1dce2a9d75af9da75001c15474b55296", + "corpusId": 245628321, "publicationVenue": {"id": "6ae39db1-25dc-4819-b028-a8c17216e1a5", + "name": "Qualitative Inquiry", "type": "journal", "alternate_names": ["Qual + Inq"], "issn": "1077-8004", "url": "https://journals.sagepub.com/home/qix", + "alternate_urls": ["http://qix.sagepub.com/"]}, "url": "https://www.semanticscholar.org/paper/3894973d1dce2a9d75af9da75001c15474b55296", "title": "Rethinking the Politics of Creativity: Posthumanism, Indigeneity, and Creativity Beyond the Western Anthropocene", "abstract": "With the emergence of Western posthuman understandings, new materialism, artificial intelligence @@ -10573,14 +12214,15 @@ interactions: concern for interrogating tensions in this area, aiming to open new possibilities for practice, research, and (re)conceptualization beyond Western understandings.", "venue": "Qualitative Inquiry", "year": 2021, "referenceCount": 96, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-30", "journal": - {"volume": "28", "pages": "465 - 475", "name": "Qualitative Inquiry"}, "authors": - [{"authorId": "31923945", "name": "D. Henriksen"}, {"authorId": "51325072", - "name": "Edwin Creely"}, {"authorId": "39099504", "name": "Rohit Mehta"}]}, - {"paperId": "39cafec3d81d855d2a8801e01e7baaf08eaaed5c", "externalIds": {"DOI": - "10.2196/preprints.35949", "CorpusId": 246085159}, "url": "https://www.semanticscholar.org/paper/39cafec3d81d855d2a8801e01e7baaf08eaaed5c", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-12-30", "journal": {"volume": "28", "pages": "465 - 475", "name": "Qualitative + Inquiry"}, "authors": [{"authorId": "31923945", "name": "D. Henriksen"}, {"authorId": + "51325072", "name": "Edwin Creely"}, {"authorId": "39099504", "name": "Rohit + Mehta"}]}, {"paperId": "39cafec3d81d855d2a8801e01e7baaf08eaaed5c", "externalIds": + {"DOI": "10.2196/preprints.35949", "CorpusId": 246085159}, "corpusId": 246085159, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/39cafec3d81d855d2a8801e01e7baaf08eaaed5c", "title": "Artificial Intelligence Technologies for Detection and Quantification of Hepatic Steatosis: A Scoping Review (Preprint)", "abstract": "\n BACKGROUND\n Non-alcoholic fatty liver disease linked to an increased risk of morbidity @@ -10618,22 +12260,26 @@ interactions: are created. Before adopting these AI-assisted systems in clinical practice, it is necessary to validate these models in additional independent cohorts.\n", "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-12-23", "journal": null, "authors": [{"authorId": "51139216", "name": - "Fahad Alshagathrh"}]}, {"paperId": "ab600896f6657d00852d4a21e2d375e28c38224f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2021-12-23", "journal": null, "authors": [{"authorId": + "51139216", "name": "Fahad Alshagathrh"}]}, {"paperId": "ab600896f6657d00852d4a21e2d375e28c38224f", "externalIds": {"DBLP": "journals/ais/Tzouganatou22", "DOI": "10.1007/s00146-021-01361-3", - "CorpusId": 245467431}, "url": "https://www.semanticscholar.org/paper/ab600896f6657d00852d4a21e2d375e28c38224f", + "CorpusId": 245467431}, "corpusId": 245467431, "publicationVenue": {"id": + "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", + "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/ab600896f6657d00852d4a21e2d375e28c38224f", "title": "Openness and privacy in born-digital archives: reflecting the role of AI development", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-23", "journal": - {"volume": "37", "pages": "991 - 999", "name": "AI & SOCIETY"}, "authors": - [{"authorId": "117313976", "name": "A. Tzouganatou"}]}, {"paperId": "234e02d99b207165a657851fd55646cdf6003748", - "externalIds": {"DBLP": "journals/fcomp/EvenBB21", "DOI": "10.3389/fcomp.2021.774763", - "CorpusId": 245427384}, "url": "https://www.semanticscholar.org/paper/234e02d99b207165a657851fd55646cdf6003748", + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01361-3.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-12-23", "journal": {"volume": "37", "pages": "991 - 999", "name": "AI + & SOCIETY"}, "authors": [{"authorId": "117313976", "name": "A. Tzouganatou"}]}, + {"paperId": "234e02d99b207165a657851fd55646cdf6003748", "externalIds": {"DBLP": + "journals/fcomp/EvenBB21", "DOI": "10.3389/fcomp.2021.774763", "CorpusId": + 245427384}, "corpusId": 245427384, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/234e02d99b207165a657851fd55646cdf6003748", "title": "Assessing the Believability of Computer Players in Video Games: A New Protocol and Computer Tool", "abstract": "In this paper, we address the challenge of believability in multiplayer video games. Our contribution @@ -10655,24 +12301,30 @@ interactions: We ran a final experiment to test our proposal, which yielded extremely encouraging results.", "venue": "Frontiers in Computer Science", "year": 2021, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-12-23", "journal": {"volume": "3"}, "authors": [{"authorId": "31571192", - "name": "Cindy Even"}, {"authorId": "1962736", "name": "Anne-Gwenn Bosser"}, - {"authorId": "1753287", "name": "C\u00e9dric Buche"}]}, {"paperId": "deafac3f3a4b8c83735ff9bd219224ebc9b1ec6a", - "externalIds": {"DBLP": "series/synthesis/2021Shanthamallu", "DOI": "10.2200/s01135ed1v01y202109spr022", - "CorpusId": 245428047}, "url": "https://www.semanticscholar.org/paper/deafac3f3a4b8c83735ff9bd219224ebc9b1ec6a", + "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/fcomp.2021.774763/pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-12-23", "journal": {"volume": "3"}, "authors": [{"authorId": + "31571192", "name": "Cindy Even"}, {"authorId": "1962736", "name": "Anne-Gwenn + Bosser"}, {"authorId": "1753287", "name": "C\u00e9dric Buche"}]}, {"paperId": + "deafac3f3a4b8c83735ff9bd219224ebc9b1ec6a", "externalIds": {"DBLP": "series/synthesis/2021Shanthamallu", + "DOI": "10.2200/s01135ed1v01y202109spr022", "CorpusId": 245428047}, "corpusId": + 245428047, "publicationVenue": {"id": "a580061e-bf5a-4b29-9760-c58831177d14", + "name": "Synthesis Lectures on Signal Processing", "type": "journal", "alternate_names": + ["Synth Lect Signal Process"], "issn": "1932-1236", "url": "https://www.morganclaypool.com/"}, + "url": "https://www.semanticscholar.org/paper/deafac3f3a4b8c83735ff9bd219224ebc9b1ec6a", "title": "Machine and Deep Learning Algorithms and Applications", "abstract": null, "venue": "Synthesis Lectures on Signal Processing", "year": 2021, "referenceCount": 78, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-22", - "journal": {"pages": "1-123"}, "authors": [{"authorId": "40692862", "name": - "U. Shanthamallu"}, {"authorId": "144924839", "name": "A. Spanias"}]}, {"paperId": - "9f53de089438862ce5500e35231f068cbb7b3376", "externalIds": {"DOI": "10.22290/jbnc.v32i1.1938", - "CorpusId": 245158647}, "url": "https://www.semanticscholar.org/paper/9f53de089438862ce5500e35231f068cbb7b3376", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-12-22", "journal": {"pages": "1-123"}, "authors": [{"authorId": "40692862", + "name": "U. Shanthamallu"}, {"authorId": "144924839", "name": "A. Spanias"}]}, + {"paperId": "9f53de089438862ce5500e35231f068cbb7b3376", "externalIds": {"DOI": + "10.22290/jbnc.v32i1.1938", "CorpusId": 245158647}, "corpusId": 245158647, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9f53de089438862ce5500e35231f068cbb7b3376", "title": "Horizonte de la Inteligencia Artificial y Neurociencias", "abstract": "La inteligencia artificial permite que los procesos cerebrales sean analizados como procesos computacionales. Presenta dos l\u00edneas inquietantes: el Proyecto @@ -10699,39 +12351,43 @@ interactions: de reflexi\u00f3n para la toma de decisiones individuales y para la especie humana.", "venue": "JBNC - JORNAL BRASILEIRO DE NEUROCIRURGIA", "year": 2021, "referenceCount": 25, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, - "publicationDate": "2021-12-14", "journal": {"name": "JBNC - JORNAL BRASILEIRO - DE NEUROCIRURGIA"}, "authors": [{"authorId": "2079365684", "name": "Alejandra - T. Rabad\u00e1n"}]}, {"paperId": "e267100233053e6eb211dc97d90e11908ff9bd15", - "externalIds": {"DOI": "10.2307/j.ctv25fwf25.7", "CorpusId": 245419258}, "url": - "https://www.semanticscholar.org/paper/e267100233053e6eb211dc97d90e11908ff9bd15", + true, "openAccessPdf": {"url": "https://jbnc.emnuvens.com.br/jbnc/article/download/1938/1758", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2021-12-14", "journal": {"name": "JBNC - JORNAL + BRASILEIRO DE NEUROCIRURGIA"}, "authors": [{"authorId": "2079365684", "name": + "Alejandra T. Rabad\u00e1n"}]}, {"paperId": "e267100233053e6eb211dc97d90e11908ff9bd15", + "externalIds": {"DOI": "10.2307/j.ctv25fwf25.7", "CorpusId": 245419258}, "corpusId": + 245419258, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e267100233053e6eb211dc97d90e11908ff9bd15", "title": "ON THE ASIAN FETISH AND THE FANTASY OF EQUALITY", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": - "be9ea8dbd00eff1b3efb37d2e0b9b260ab37b58a", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.5", - "CorpusId": 245416353}, "url": "https://www.semanticscholar.org/paper/be9ea8dbd00eff1b3efb37d2e0b9b260ab37b58a", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": + []}, {"paperId": "be9ea8dbd00eff1b3efb37d2e0b9b260ab37b58a", "externalIds": + {"DOI": "10.2307/j.ctv25fwf25.5", "CorpusId": 245416353}, "corpusId": 245416353, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/be9ea8dbd00eff1b3efb37d2e0b9b260ab37b58a", "title": "RACIST CUTE", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, - "authors": []}, {"paperId": "021fc875fe3d82b0c212480014889b3fb35ea716", "externalIds": - {"DOI": "10.2307/j.ctv25fwf25.6", "CorpusId": 245412652}, "url": "https://www.semanticscholar.org/paper/021fc875fe3d82b0c212480014889b3fb35ea716", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": + {"name": "Racist Love"}, "authors": []}, {"paperId": "021fc875fe3d82b0c212480014889b3fb35ea716", + "externalIds": {"DOI": "10.2307/j.ctv25fwf25.6", "CorpusId": 245412652}, "corpusId": + 245412652, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/021fc875fe3d82b0c212480014889b3fb35ea716", "title": "ASIAN \u2022 FEMALE \u2022 ROBOT \u2022 SLAVE", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-12-13", "journal": {"name": "Racist Love"}, "authors": []}, {"paperId": - "0f928b7f6bf0616c2c9a2dc77feee60ffa9d51a9", "externalIds": {"DOI": "10.2307/j.ctv25fwf25.4", - "CorpusId": 245416273}, "url": "https://www.semanticscholar.org/paper/0f928b7f6bf0616c2c9a2dc77feee60ffa9d51a9", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, "authors": + []}, {"paperId": "0f928b7f6bf0616c2c9a2dc77feee60ffa9d51a9", "externalIds": + {"DOI": "10.2307/j.ctv25fwf25.4", "CorpusId": 245416273}, "corpusId": 245416273, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f928b7f6bf0616c2c9a2dc77feee60ffa9d51a9", "title": "RACIAL TRANSITIONAL OBJECTS", "abstract": null, "venue": "Racist Love", "year": 2021, "referenceCount": 140, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2021-12-13", "journal": {"name": "Racist Love"}, - "authors": []}, {"paperId": "d00a84812cbadea747ffdc1ce1130f123c651a08", "externalIds": - {"DOI": "10.1098/rstb.2021.0117", "CorpusId": 245118061, "PubMed": "34894727"}, - "url": "https://www.semanticscholar.org/paper/d00a84812cbadea747ffdc1ce1130f123c651a08", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": + {"name": "Racist Love"}, "authors": []}, {"paperId": "d00a84812cbadea747ffdc1ce1130f123c651a08", + "externalIds": {"DOI": "10.1098/rstb.2021.0117", "CorpusId": 245118061, "PubMed": + "34894727"}, "corpusId": 245118061, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d00a84812cbadea747ffdc1ce1130f123c651a08", "title": "Artificial evolution of robot bodies and control: on the interaction between evolution, learning and culture", "abstract": "We survey and reflect on how learning (in the form of individual learning and/or culture) can augment @@ -10749,13 +12405,17 @@ interactions: of collective knowledge and cumulative culture in animals, humans and machines\u2019.", "venue": "Philosophical Transactions of the Royal Society B", "year": 2021, "referenceCount": 56, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + true, "openAccessPdf": {"url": "https://napier-repository.worktribe.com/preview/2812314/EvoRobotsLearning_RoyalSocTransactions-7.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-12-13", "journal": {"volume": "377", "name": "Philosophical Transactions of the Royal Society B"}, "authors": [{"authorId": "144988281", "name": "E. Hart"}, {"authorId": "2145007657", "name": "L\u00e9ni K. Le Goff"}]}, {"paperId": "2a95bc2da1f09895d747dca1407169b8699c8791", "externalIds": {"DOI": "10.18820/24150479/aa53i2/8", "CorpusId": 245160656}, + "corpusId": 245160656, "publicationVenue": {"id": "98d641dd-8fb9-40a8-b4b4-5146118031d6", + "name": "Acta Academica", "alternate_names": ["Acta Acad"], "issn": "0587-2405", + "url": "http://journals.ufs.ac.za/index.php/aa/index", "alternate_urls": ["http://www.scielo.org.za/scielo.php?lng=en&pid=2415-0479&script=sci_serial"]}, "url": "https://www.semanticscholar.org/paper/2a95bc2da1f09895d747dca1407169b8699c8791", "title": "The healing-growth future of humanity: regenerative politics and crealectic care", "abstract": "The 2020 coronavirus pandemic served to remind @@ -10779,12 +12439,18 @@ interactions: call \u2018crealectics\u2019 the generative philosophical health that favours healing growth.", "venue": "Acta Academica", "year": 2021, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://journals.ufs.ac.za/index.php/aa/article/download/5179/4293", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-13", "journal": {"name": "Acta Academica"}, "authors": [{"authorId": "1753256795", "name": "Luis de Miranda"}]}, {"paperId": "26a377b7b1b3b6bd609c4feb58c0da5696c78711", "externalIds": - {"DOI": "10.1080/09515089.2021.2014802", "CorpusId": 245149983}, "url": "https://www.semanticscholar.org/paper/26a377b7b1b3b6bd609c4feb58c0da5696c78711", + {"DOI": "10.1080/09515089.2021.2014802", "CorpusId": 245149983}, "corpusId": + 245149983, "publicationVenue": {"id": "1997a543-39c3-403f-b425-459a18eb0f71", + "name": "Philosophical Psychology", "type": "journal", "alternate_names": + ["Philos Psychol"], "issn": "0951-5089", "url": "http://www.tandfonline.com/loi/cphp20", + "alternate_urls": ["http://www.tandfonline.com/toc/cphp20/current"]}, "url": + "https://www.semanticscholar.org/paper/26a377b7b1b3b6bd609c4feb58c0da5696c78711", "title": "Cognition as the sensitive management of an agent\u2019s behavior", "abstract": "ABSTRACT Cognitive science is unusual in that cognitive scientists have dramatic disagreements about the extension of their object of study, @@ -10797,13 +12463,14 @@ interactions: understanding of cognition among scientists, without artificially resolving questions that are currently considered open.", "venue": "Philosophical Psychology", "year": 2021, "referenceCount": 83, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-12-13", "journal": {"volume": "35", "pages": "718 - 741", "name": "Philosophical - Psychology"}, "authors": [{"authorId": "32712504", "name": "Mikio Akagi"}]}, - {"paperId": "e4c3415e115aeb388623a3898d34c4b086ec5018", "externalIds": {"PubMedCentral": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://philsci-archive.pitt.edu/19976/1/Akagi-Cognition%20as%20SMAB%20PhPs%20R2%20preprint.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-13", + "journal": {"volume": "35", "pages": "718 - 741", "name": "Philosophical Psychology"}, + "authors": [{"authorId": "32712504", "name": "Mikio Akagi"}]}, {"paperId": + "e4c3415e115aeb388623a3898d34c4b086ec5018", "externalIds": {"PubMedCentral": "8786277", "DOI": "10.1042/ETLS20210212", "CorpusId": 245007000, "PubMed": - "34881776"}, "url": "https://www.semanticscholar.org/paper/e4c3415e115aeb388623a3898d34c4b086ec5018", + "34881776"}, "corpusId": 245007000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4c3415e115aeb388623a3898d34c4b086ec5018", "title": "Artificial intelligence, molecular subtyping, biomarkers, and precision oncology", "abstract": "A targeted cancer therapy is only useful if there is a way to accurately identify the tumors that are susceptible to that therapy. @@ -10815,14 +12482,15 @@ interactions: and discusses challenges to the implementation of precision oncology as well as possible solutions.", "venue": "Emerging topics in life sciences", "year": 2021, "referenceCount": 104, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-12-09", "journal": {"volume": "5", "pages": "747 - 756", "name": "Emerging - Topics in Life Sciences"}, "authors": [{"authorId": "143787989", "name": "J. - Shen"}]}, {"paperId": "d3bbd46fb28b1904c9152796a538fb3f7291d08c", "externalIds": - {"DBLP": "conf/icta/ShehataTH21", "DOI": "10.1109/ICTA54582.2021.9809429", - "CorpusId": 250300993}, "url": "https://www.semanticscholar.org/paper/d3bbd46fb28b1904c9152796a538fb3f7291d08c", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://portlandpress.com/emergtoplifesci/article-pdf/5/6/747/926850/etls-2021-0212c.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-12-09", + "journal": {"volume": "5", "pages": "747 - 756", "name": "Emerging Topics + in Life Sciences"}, "authors": [{"authorId": "143787989", "name": "J. Shen"}]}, + {"paperId": "d3bbd46fb28b1904c9152796a538fb3f7291d08c", "externalIds": {"DBLP": + "conf/icta/ShehataTH21", "DOI": "10.1109/ICTA54582.2021.9809429", "CorpusId": + 250300993}, "corpusId": 250300993, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d3bbd46fb28b1904c9152796a538fb3f7291d08c", "title": "An Analysis of International Conference Proceedings on Artificial General Intelligence (AGI) from 2008 to 2020: A Data-Mining Mapping Analysis", "abstract": "This paper analyzes the proceedings of 13 international conferences @@ -10841,15 +12509,20 @@ interactions: potential scholars, institutions, and countries.", "venue": "2021 8th International Conference on ICT & Accessibility (ICTA)", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-12-08", - "journal": {"pages": "1-6", "name": "2021 8th International Conference on - ICT & Accessibility (ICTA)"}, "authors": [{"authorId": "2174923997", "name": - "Boulus Shehata"}, {"authorId": "27362922", "name": "A. Tlili"}, {"authorId": - "2231264", "name": "Ronghuai Huang"}]}, {"paperId": "2cdf8d8291fa60942468cbebc12925a30f0e28d1", - "externalIds": {"PubMedCentral": "8692947", "DOI": "10.3389/fnsys.2021.784404", - "CorpusId": 244924541, "PubMed": "34955771"}, "url": "https://www.semanticscholar.org/paper/2cdf8d8291fa60942468cbebc12925a30f0e28d1", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2021-12-08", "journal": {"pages": "1-6", "name": "2021 + 8th International Conference on ICT & Accessibility (ICTA)"}, "authors": [{"authorId": + "2174923997", "name": "Boulus Shehata"}, {"authorId": "27362922", "name": + "A. Tlili"}, {"authorId": "2231264", "name": "Ronghuai Huang"}]}, {"paperId": + "2cdf8d8291fa60942468cbebc12925a30f0e28d1", "externalIds": {"PubMedCentral": + "8692947", "DOI": "10.3389/fnsys.2021.784404", "CorpusId": 244924541, "PubMed": + "34955771"}, "corpusId": 244924541, "publicationVenue": {"id": "ba12d37f-ecd3-47c2-a173-22fb1bae2ece", + "name": "Frontiers in Systems Neuroscience", "type": "journal", "alternate_names": + ["Front Syst Neurosci"], "issn": "1662-5137", "url": "https://www.frontiersin.org/journals/systems-neuroscience", + "alternate_urls": ["http://www.frontiersin.org/systemsneuroscience/", "http://www.frontiersin.org/systems_neuroscience"]}, + "url": "https://www.semanticscholar.org/paper/2cdf8d8291fa60942468cbebc12925a30f0e28d1", "title": "Evolutionary Advantages of Stimulus-Driven EEG Phase Transitions in the Upper Cortical Layers", "abstract": "Spatio-temporal brain activity monitored by EEG recordings in humans and other mammals has identified beta/gamma @@ -10876,15 +12549,17 @@ interactions: a tradeoff between rapid adaptation to novelty vs. stable and widespread self-organization, therefore resulting in significant Darwinian benefits.", "venue": "Frontiers in Systems Neuroscience", "year": 2021, "referenceCount": 136, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-12-08", "journal": {"volume": "15", "name": "Frontiers - in Systems Neuroscience"}, "authors": [{"authorId": "143730789", "name": "R. - Kozma"}, {"authorId": "2529891", "name": "B. Baars"}, {"authorId": "2139752384", - "name": "Natalie Geld"}]}, {"paperId": "5a980aa843e40de5f91a243cbf680af273c797ba", - "externalIds": {"DBLP": "journals/corr/abs-2112-03763", "ArXiv": "2112.03763", - "CorpusId": 244920904}, "url": "https://www.semanticscholar.org/paper/5a980aa843e40de5f91a243cbf680af273c797ba", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fnsys.2021.784404/pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-08", "journal": + {"volume": "15", "name": "Frontiers in Systems Neuroscience"}, "authors": + [{"authorId": "143730789", "name": "R. Kozma"}, {"authorId": "2529891", "name": + "B. Baars"}, {"authorId": "2139752384", "name": "Natalie Geld"}]}, {"paperId": + "5a980aa843e40de5f91a243cbf680af273c797ba", "externalIds": {"DBLP": "journals/corr/abs-2112-03763", + "ArXiv": "2112.03763", "CorpusId": 244920904}, "corpusId": 244920904, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5a980aa843e40de5f91a243cbf680af273c797ba", "title": "Creating Multimodal Interactive Agents with Imitation and Self-Supervised Learning", "abstract": "A common vision from science fiction is that robots will one day inhabit our physical spaces, sense the world as we do, assist @@ -10903,27 +12578,29 @@ interactions: capable agents for interactive robots or digital assistants. A video of MIA\u2019s behaviour may be found at https://youtu.be/ZFgRhviF7mY.", "venue": "ArXiv", "year": 2021, "referenceCount": 39, "citationCount": 19, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-12-07", "journal": {"volume": "abs/2112.03763", "name": - "ArXiv"}, "authors": [{"authorId": "2143271992", "name": "DeepMind Interactive - Agents Team Josh Abramson"}, {"authorId": "37968006", "name": "Arun Ahuja"}, - {"authorId": "104251960", "name": "Arthur Brussee"}, {"authorId": "32561676", - "name": "Federico Carnevale"}, {"authorId": "147433059", "name": "Mary Cassin"}, - {"authorId": "2143272333", "name": "Felix Fischer"}, {"authorId": "1737522", - "name": "Petko Georgiev"}, {"authorId": "40034895", "name": "Alex Goldin"}, - {"authorId": "3367786", "name": "Tim Harley"}, {"authorId": "145783676", "name": - "Felix Hill"}, {"authorId": "145901789", "name": "P. Humphreys"}, {"authorId": - "1572095637", "name": "Alden Hung"}, {"authorId": "2065404873", "name": "Jessica - Landon"}, {"authorId": "2542999", "name": "T. Lillicrap"}, {"authorId": "20896818", - "name": "Hamza Merzic"}, {"authorId": "50654556", "name": "Alistair Muldal"}, - {"authorId": "35030998", "name": "Adam Santoro"}, {"authorId": "2143271833", - "name": "Guy Scully"}, {"authorId": "51029932", "name": "Tamara von Glehn"}, - {"authorId": "89504302", "name": "Greg Wayne"}, {"authorId": "1571809179", - "name": "Nathaniel Wong"}, {"authorId": "2116550367", "name": "Chen Yan"}, - {"authorId": "2070271342", "name": "Rui Zhu"}]}, {"paperId": "0f404607305fbbc90d6daf3b91ec05e217226ad9", - "externalIds": {"ArXiv": "2112.06646", "CorpusId": 245123635}, "url": "https://www.semanticscholar.org/paper/0f404607305fbbc90d6daf3b91ec05e217226ad9", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-07", "journal": + {"volume": "abs/2112.03763", "name": "ArXiv"}, "authors": [{"authorId": "2143271992", + "name": "DeepMind Interactive Agents Team Josh Abramson"}, {"authorId": "37968006", + "name": "Arun Ahuja"}, {"authorId": "104251960", "name": "Arthur Brussee"}, + {"authorId": "32561676", "name": "Federico Carnevale"}, {"authorId": "147433059", + "name": "Mary Cassin"}, {"authorId": "2143272333", "name": "Felix Fischer"}, + {"authorId": "1737522", "name": "Petko Georgiev"}, {"authorId": "40034895", + "name": "Alex Goldin"}, {"authorId": "3367786", "name": "Tim Harley"}, {"authorId": + "145783676", "name": "Felix Hill"}, {"authorId": "145901789", "name": "P. + Humphreys"}, {"authorId": "1572095637", "name": "Alden Hung"}, {"authorId": + "2065404873", "name": "Jessica Landon"}, {"authorId": "2542999", "name": "T. + Lillicrap"}, {"authorId": "20896818", "name": "Hamza Merzic"}, {"authorId": + "50654556", "name": "Alistair Muldal"}, {"authorId": "35030998", "name": "Adam + Santoro"}, {"authorId": "2143271833", "name": "Guy Scully"}, {"authorId": + "51029932", "name": "Tamara von Glehn"}, {"authorId": "89504302", "name": + "Greg Wayne"}, {"authorId": "1571809179", "name": "Nathaniel Wong"}, {"authorId": + "2116550367", "name": "Chen Yan"}, {"authorId": "2070271342", "name": "Rui + Zhu"}]}, {"paperId": "0f404607305fbbc90d6daf3b91ec05e217226ad9", "externalIds": + {"ArXiv": "2112.06646", "CorpusId": 245123635}, "corpusId": 245123635, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0f404607305fbbc90d6daf3b91ec05e217226ad9", "title": "The Burst Market: the Next Leap for Humanity", "abstract": "Humans have a major challenge: how to share knowledge effectively. People often need quick informational help, like health/legal advice, shopping/cooking tips, @@ -10951,12 +12628,16 @@ interactions: of nations. In short, this paper proposes the concept of the BM and asserts that it will invoke the next leap for humanity.", "venue": "", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-12-05", "journal": null, - "authors": [{"authorId": "2110710474", "name": "Vincent Zha"}]}, {"paperId": - "ca981e61a0cce158035fc8d356f7a0d02657da14", "externalIds": {"DOI": "10.9734/ajrcos/2021/v12i430291", - "CorpusId": 245042674}, "url": "https://www.semanticscholar.org/paper/ca981e61a0cce158035fc8d356f7a0d02657da14", + false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-05", + "journal": null, "authors": [{"authorId": "2110710474", "name": "Vincent Zha"}]}, + {"paperId": "ca981e61a0cce158035fc8d356f7a0d02657da14", "externalIds": {"DOI": + "10.9734/ajrcos/2021/v12i430291", "CorpusId": 245042674}, "corpusId": 245042674, + "publicationVenue": {"id": "026f4249-5e18-4b4c-b47a-aa1927ad7498", "name": + "Asian Journal of Research in Computer Science", "type": "journal", "alternate_names": + ["Asian J Res Comput Sci"], "issn": "2581-8260", "url": "http://www.sciencedomain.org/"}, + "url": "https://www.semanticscholar.org/paper/ca981e61a0cce158035fc8d356f7a0d02657da14", "title": "Research on Chemical Process Optimization Based on Artificial Neural Network Algorithm", "abstract": "Artificial Neural Network (ANN) is established by imitating the human brain''s nerve thinking mode. Because of its strong @@ -10967,23 +12648,25 @@ interactions: BP neural network, RBF neural network and convolutional neural network, focusing on the research progress of the practical application of neural networks in chemical process optimization.", "venue": "Asian Journal of Research in Computer - Science", "year": 2021, "referenceCount": 79, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2021-12-03", "journal": {"name": "Asian Journal of Research - in Computer Science"}, "authors": [{"authorId": "2142046258", "name": "Fei - Liang"}, {"authorId": "2146343555", "name": "Taowen Zhang"}]}, {"paperId": - "504504bacc2fe95a820656cdaa292f56bd1dd6fd", "externalIds": {"DOI": "10.1111/1467-9752.12608", - "CorpusId": 244884205}, "url": "https://www.semanticscholar.org/paper/504504bacc2fe95a820656cdaa292f56bd1dd6fd", + Science", "year": 2021, "referenceCount": 79, "citationCount": 5, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-12-03", "journal": {"name": "Asian Journal + of Research in Computer Science"}, "authors": [{"authorId": "2142046258", + "name": "Fei Liang"}, {"authorId": "2146343555", "name": "Taowen Zhang"}]}, + {"paperId": "504504bacc2fe95a820656cdaa292f56bd1dd6fd", "externalIds": {"DOI": + "10.1111/1467-9752.12608", "CorpusId": 244884205}, "corpusId": 244884205, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/504504bacc2fe95a820656cdaa292f56bd1dd6fd", "title": "Kant''s doctrine of education and the problem of artificial intelligence", "abstract": null, "venue": "Journal of Philosophy of Education", "year": 2021, "referenceCount": 18, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-03", - "journal": {"name": "Journal of Philosophy of Education"}, "authors": [{"authorId": - "147327716", "name": "Leonid Kornilaev"}]}, {"paperId": "7773f65eba083baae09b02b3e77de2387fc9b338", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-12-03", "journal": {"name": "Journal of Philosophy of Education"}, "authors": + [{"authorId": "147327716", "name": "Leonid Kornilaev"}]}, {"paperId": "7773f65eba083baae09b02b3e77de2387fc9b338", "externalIds": {"ArXiv": "2112.01516", "DBLP": "journals/corr/abs-2112-01516", - "CorpusId": 244799141}, "url": "https://www.semanticscholar.org/paper/7773f65eba083baae09b02b3e77de2387fc9b338", + "CorpusId": 244799141}, "corpusId": 244799141, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7773f65eba083baae09b02b3e77de2387fc9b338", "title": "Ownership and Creativity in Generative Models", "abstract": "Machine learning generated content such as image artworks, textual poems and music become prominent in recent years. These tools attract much attention from @@ -10995,15 +12678,16 @@ interactions: for each one of them. Then we propose a possible algorithmic solution in the vision-based model\u2019s regime. Finally, we discuss the broader implications of this problem.", "venue": "ArXiv", "year": 2021, "referenceCount": 42, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-02", "journal": - {"volume": "abs/2112.01516", "name": "ArXiv"}, "authors": [{"authorId": "2107086356", - "name": "Omri Avrahami"}, {"authorId": "1582254810", "name": "Bar Tamir"}]}, - {"paperId": "6402979a0ebe1468206ef4ee6869f7debe614049", "externalIds": {"DBLP": - "journals/corr/abs-2112-01342", "ArXiv": "2112.01342", "CorpusId": 244799420}, - "url": "https://www.semanticscholar.org/paper/6402979a0ebe1468206ef4ee6869f7debe614049", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-12-02", "journal": {"volume": "abs/2112.01516", "name": "ArXiv"}, "authors": + [{"authorId": "2107086356", "name": "Omri Avrahami"}, {"authorId": "1582254810", + "name": "Bar Tamir"}]}, {"paperId": "6402979a0ebe1468206ef4ee6869f7debe614049", + "externalIds": {"DBLP": "journals/corr/abs-2112-01342", "ArXiv": "2112.01342", + "CorpusId": 244799420}, "corpusId": 244799420, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6402979a0ebe1468206ef4ee6869f7debe614049", "title": "How not to Lie with a Benchmark: Rearranging NLP Leaderboards", "abstract": "Comparison with a human is an essential requirement for a benchmark for it to be a reliable measurement of model capabilities. Nevertheless, the @@ -11016,14 +12700,15 @@ interactions: XTREME. The analysis shows that e.g. human level on SuperGLUE is still not reached, and there is still room for improvement for the current models.", "venue": "ArXiv", "year": 2021, "referenceCount": 24, "citationCount": 8, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-12-02", "journal": - {"volume": "abs/2112.01342", "name": "ArXiv"}, "authors": [{"authorId": "2142798760", - "name": "Shavrina Tatiana"}, {"authorId": "2142750217", "name": "Malykh Valentin"}]}, - {"paperId": "2d6d0cdd21a5beeb1aeabe946e804558f5926838", "externalIds": {"DOI": - "10.1109/CSCI54926.2021.00192", "CorpusId": 249929158}, "url": "https://www.semanticscholar.org/paper/2d6d0cdd21a5beeb1aeabe946e804558f5926838", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-12-02", "journal": {"volume": "abs/2112.01342", "name": "ArXiv"}, "authors": + [{"authorId": "2142798760", "name": "Shavrina Tatiana"}, {"authorId": "2142750217", + "name": "Malykh Valentin"}]}, {"paperId": "2d6d0cdd21a5beeb1aeabe946e804558f5926838", + "externalIds": {"DOI": "10.1109/CSCI54926.2021.00192", "CorpusId": 249929158}, + "corpusId": 249929158, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d6d0cdd21a5beeb1aeabe946e804558f5926838", "title": "aMDH and TWIN: Two original honeypot-based approaches to protect swarms of drones", "abstract": "Drones and swarms of drones are now considered an additional tool for both civilian and military applications. As any computer-based @@ -11037,14 +12722,14 @@ interactions: this paper we present our work to address this issue.", "venue": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "2021-12-01", "journal": {"pages": "783-787", "name": "2021 - International Conference on Computational Science and Computational Intelligence - (CSCI)"}, "authors": [{"authorId": "2343153", "name": "S. Chaumette"}, {"authorId": - "2172228121", "name": "Titien Cubilier"}]}, {"paperId": "6efaa6e14c5a65630bdc9c5df65b5600dc52ad88", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Conference"], "publicationDate": "2021-12-01", "journal": {"pages": "783-787", + "name": "2021 International Conference on Computational Science and Computational + Intelligence (CSCI)"}, "authors": [{"authorId": "2343153", "name": "S. Chaumette"}, + {"authorId": "2172228121", "name": "Titien Cubilier"}]}, {"paperId": "6efaa6e14c5a65630bdc9c5df65b5600dc52ad88", "externalIds": {"DOI": "10.1109/CECIT53797.2021.00145", "CorpusId": 247857755}, - "url": "https://www.semanticscholar.org/paper/6efaa6e14c5a65630bdc9c5df65b5600dc52ad88", + "corpusId": 247857755, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6efaa6e14c5a65630bdc9c5df65b5600dc52ad88", "title": "Outlook and Direction of AI Tour Guide Services - from the Lifelong Machine Learning View", "abstract": "Artificial intelligence (AI) has entered tourism and become a new service in a tour guide. AI technology can help tourism @@ -11055,17 +12740,18 @@ interactions: learning is the key to developing AI tour guides.", "venue": "2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT)", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2021-12-01", "journal": {"pages": "802-806", "name": "2021 2nd International - Conference on Electronics, Communications and Information Technology (CECIT)"}, - "authors": [{"authorId": "2161327005", "name": "Shuai Wang"}, {"authorId": - "3155784", "name": "Xianbin Hong"}, {"authorId": "31177772", "name": "Noorliza - Karia"}, {"authorId": "145158116", "name": "S. Guan"}, {"authorId": "1688436", - "name": "Prudence W. H. Wong"}, {"authorId": "2074917758", "name": "K. Man"}, - {"authorId": "2115519737", "name": "Dawei Liu"}]}, {"paperId": "87a59a6c7733a6c98087cd9a19c3ccf4b6ed2528", - "externalIds": {"DOI": "10.1002/cepa.1650", "CorpusId": 245627104}, "url": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2021-12-01", "journal": {"pages": "802-806", "name": "2021 + 2nd International Conference on Electronics, Communications and Information + Technology (CECIT)"}, "authors": [{"authorId": "2161327005", "name": "Shuai + Wang"}, {"authorId": "3155784", "name": "Xianbin Hong"}, {"authorId": "31177772", + "name": "Noorliza Karia"}, {"authorId": "145158116", "name": "S. Guan"}, {"authorId": + "1688436", "name": "Prudence W. H. Wong"}, {"authorId": "2074917758", "name": + "K. Man"}, {"authorId": "2115519737", "name": "Dawei Liu"}]}, {"paperId": + "87a59a6c7733a6c98087cd9a19c3ccf4b6ed2528", "externalIds": {"DOI": "10.1002/cepa.1650", + "CorpusId": 245627104}, "corpusId": 245627104, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/87a59a6c7733a6c98087cd9a19c3ccf4b6ed2528", "title": "Connecting Artificial Intelligence and Structural Glass Engineering \u2013 Overview, Potentials and Case Studies", "abstract": "This paper introduces @@ -11090,13 +12776,13 @@ interactions: to successfully implement and conduct AI projects in the glass industry and structural glass engineering practice.", "venue": "ce/papers", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-12-01", "journal": {"volume": "4", "name": "ce/papers"}, "authors": - [{"authorId": "7803749", "name": "M. A. Kraus"}, {"authorId": "13308611", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "2021-12-01", "journal": {"volume": "4", "name": "ce/papers"}, + "authors": [{"authorId": "7803749", "name": "M. A. Kraus"}, {"authorId": "13308611", "name": "M. Drass"}]}, {"paperId": "0fcb35c8eb8308d2d9bca08c71d6e59035ad20f9", "externalIds": {"DOI": "10.1088/1742-6596/2134/1/012005", "CorpusId": 245351838}, - "url": "https://www.semanticscholar.org/paper/0fcb35c8eb8308d2d9bca08c71d6e59035ad20f9", + "corpusId": 245351838, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0fcb35c8eb8308d2d9bca08c71d6e59035ad20f9", "title": "Creation and implementation of a set of game strategies based on training neural networks with reinforcement learning", "abstract": "The study explores the problems of reinforcement learning and finding non-obvious play @@ -11107,14 +12793,14 @@ interactions: the use of unusual strategies by an agent using a pattern-based approach.", "venue": "Journal of Physics: Conference Series", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Conference"], "publicationDate": "2021-12-01", "journal": - {"volume": "2134", "name": "Journal of Physics: Conference Series"}, "authors": - [{"authorId": "2146460795", "name": "D. S. Kozlov"}, {"authorId": "113737241", - "name": "O. Polovikova"}]}, {"paperId": "2cb18f589ae071d139d47e63adc77a37d6e35405", + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2021-12-01", + "journal": {"volume": "2134", "name": "Journal of Physics: Conference Series"}, + "authors": [{"authorId": "2146460795", "name": "D. S. Kozlov"}, {"authorId": + "113737241", "name": "O. Polovikova"}]}, {"paperId": "2cb18f589ae071d139d47e63adc77a37d6e35405", "externalIds": {"DOI": "10.1177/02632764211054122", "CorpusId": 245299071}, - "url": "https://www.semanticscholar.org/paper/2cb18f589ae071d139d47e63adc77a37d6e35405", + "corpusId": 245299071, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2cb18f589ae071d139d47e63adc77a37d6e35405", "title": "Introduction: Algorithmic Thought", "abstract": "This introduction to a special section on algorithmic thought provides a framework through which the articles in that collection can be contextualised and their individual @@ -11126,40 +12812,47 @@ interactions: different dimensions of algorithmic thought, engaging with a diverse set of epistemological questions and issues.", "venue": "Theory, Culture & Society", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-12-01", "journal": {"volume": "38", "pages": "5 - 11", "name": "Theory, - Culture & Society"}, "authors": [{"authorId": "144499636", "name": "M. Fazi"}]}, - {"paperId": "99e8e6c48083324e3041ad316c41a1f74729b9e4", "externalIds": {"MAG": - "3196369313", "DOI": "10.1016/j.techfore.2021.121100", "CorpusId": 239659470}, - "url": "https://www.semanticscholar.org/paper/99e8e6c48083324e3041ad316c41a1f74729b9e4", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/02632764211054122", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-12-01", + "journal": {"volume": "38", "pages": "5 - 11", "name": "Theory, Culture & + Society"}, "authors": [{"authorId": "144499636", "name": "M. Fazi"}]}, {"paperId": + "99e8e6c48083324e3041ad316c41a1f74729b9e4", "externalIds": {"MAG": "3196369313", + "DOI": "10.1016/j.techfore.2021.121100", "CorpusId": 239659470}, "corpusId": + 239659470, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/99e8e6c48083324e3041ad316c41a1f74729b9e4", "title": "Cultural proximity bias in AI-acceptability: The importance of being human", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2021, "referenceCount": 94, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-12-01", "journal": {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": "102927759", "name": "Annie Tubadji"}, {"authorId": "2143568955", "name": "Haoran Huang"}, {"authorId": "38895112", "name": "D. Webber"}]}, {"paperId": "a57e3b67ebfeba1285f1b64d6dc3f99f8db2a340", "externalIds": - {"DOI": "10.1016/j.jobe.2021.103299", "CorpusId": 240977118}, "url": "https://www.semanticscholar.org/paper/a57e3b67ebfeba1285f1b64d6dc3f99f8db2a340", + {"DOI": "10.1016/j.jobe.2021.103299", "CorpusId": 240977118}, "corpusId": + 240977118, "publicationVenue": {"id": "edc86f1a-0bc0-4f32-8b0d-9134204610bf", + "name": "Journal of Building Engineering", "type": "journal", "alternate_names": + ["J Build Eng", "J build eng", "Journal of building engineering"], "issn": + "2352-7102", "url": "https://www.journals.elsevier.com/leukemia-research-reports/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/23527102"]}, + "url": "https://www.semanticscholar.org/paper/a57e3b67ebfeba1285f1b64d6dc3f99f8db2a340", "title": "Artificial intelligence in the construction industry: A review of present status, opportunities and future challenges", "abstract": null, "venue": "Journal of Building Engineering", "year": 2021, "referenceCount": 142, "citationCount": - 42, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2021-12-01", "journal": {"name": "Journal - of Building Engineering"}, "authors": [{"authorId": "118203969", "name": "Sofiat. - Abioye"}, {"authorId": "1926817", "name": "Lukumon O. Oyedele"}, {"authorId": - "151084718", "name": "L. \u00c0k\u00e0nb\u00ed"}, {"authorId": "37513131", - "name": "A. Ajayi"}, {"authorId": "1861765828", "name": "Juan Manuel Davila - Delgado"}, {"authorId": "1380103222", "name": "Muhammad Bilal"}, {"authorId": - "2987639", "name": "Ol\u00fagb\u00e9nga O. Akinad\u00e9"}, {"authorId": "2119174865", - "name": "Ashraf A. Ahmed"}]}, {"paperId": "3f174adb111174d94a3b578e9fb9bab282a3ebc7", - "externalIds": {"DOI": "10.36253/cambio-10637", "CorpusId": 246379189}, "url": - "https://www.semanticscholar.org/paper/3f174adb111174d94a3b578e9fb9bab282a3ebc7", + 45, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2021-12-01", "journal": + {"name": "Journal of Building Engineering"}, "authors": [{"authorId": "118203969", + "name": "Sofiat. Abioye"}, {"authorId": "1926817", "name": "Lukumon O. Oyedele"}, + {"authorId": "151084718", "name": "L. \u00c0k\u00e0nb\u00ed"}, {"authorId": + "37513131", "name": "A. Ajayi"}, {"authorId": "1861765828", "name": "Juan + Manuel Davila Delgado"}, {"authorId": "1380103222", "name": "Muhammad Bilal"}, + {"authorId": "2987639", "name": "Ol\u00fagb\u00e9nga O. Akinad\u00e9"}, {"authorId": + "2119174865", "name": "Ashraf A. Ahmed"}]}, {"paperId": "3f174adb111174d94a3b578e9fb9bab282a3ebc7", + "externalIds": {"DOI": "10.36253/cambio-10637", "CorpusId": 246379189}, "corpusId": + 246379189, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f174adb111174d94a3b578e9fb9bab282a3ebc7", "title": "Rewriting Marx to expose the data society and AI", "abstract": "As I show with examples from the Grundrisse and the Capital, some fundamentals of Marx\u2019s critique of political economy can be rewritten with simple @@ -11172,20 +12865,23 @@ interactions: independently of humans, so does data. AI is the main engine of this new dangerous cycle.\u00a0", "venue": "Cambio. Rivista sulle Trasformazioni Sociali", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-11-30", "journal": {"name": "Cambio. Rivista sulle Trasformazioni Sociali"}, - "authors": [{"authorId": "2075094501", "name": "Stefano Diana"}]}, {"paperId": - "5b3b2a0d9125e2ee4c9b8ca98bd963af1bbb288f", "externalIds": {"DOI": "10.1007/978-3-662-63449-3_3", - "CorpusId": 244704005}, "url": "https://www.semanticscholar.org/paper/5b3b2a0d9125e2ee4c9b8ca98bd963af1bbb288f", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://oaj.fupress.net/index.php/cambio/article/download/10637/10515", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-30", + "journal": {"name": "Cambio. Rivista sulle Trasformazioni Sociali"}, "authors": + [{"authorId": "2075094501", "name": "Stefano Diana"}]}, {"paperId": "5b3b2a0d9125e2ee4c9b8ca98bd963af1bbb288f", + "externalIds": {"DOI": "10.1007/978-3-662-63449-3_3", "CorpusId": 244704005}, + "corpusId": 244704005, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5b3b2a0d9125e2ee4c9b8ca98bd963af1bbb288f", "title": "Zur Frage der Ersetzbarkeit des Menschen durch KI\u00a0in der Forschung", "abstract": null, "venue": "Ethics of Science and Technology Assessment", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F978-3-662-63449-3_3.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-11-27", "journal": {"name": "Ethics of Science and Technology Assessment"}, "authors": [{"authorId": "2845244", "name": "C. Gethmann"}]}, {"paperId": "21ab011a3adccbd912aea58f76b84b7873c41df3", "externalIds": - {"ArXiv": "2111.13365", "CorpusId": 245838016}, "url": "https://www.semanticscholar.org/paper/21ab011a3adccbd912aea58f76b84b7873c41df3", + {"ArXiv": "2111.13365", "CorpusId": 245838016}, "corpusId": 245838016, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/21ab011a3adccbd912aea58f76b84b7873c41df3", "title": "Machines&Influence: An Information Systems Lens", "abstract": "Policymakers face a broader challenge of how to view AI capabilities today and where does society stand in terms of those capabilities. This paper surveys AI capabilities @@ -11201,12 +12897,13 @@ interactions: discussions over these ideas, and prove to be a useful contribution towards governing the future of AI.", "venue": "", "year": 2021, "referenceCount": 130, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-11-26", "journal": - null, "authors": [{"authorId": "2151241746", "name": "Shashank Yadav"}]}, - {"paperId": "cbbd2e052b19941613d0ec7a7b742951e998bfa3", "externalIds": {"ArXiv": - "2111.14621", "CorpusId": 244715156}, "url": "https://www.semanticscholar.org/paper/cbbd2e052b19941613d0ec7a7b742951e998bfa3", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-11-26", "journal": null, "authors": [{"authorId": "2151241746", "name": + "Shashank Yadav"}]}, {"paperId": "cbbd2e052b19941613d0ec7a7b742951e998bfa3", + "externalIds": {"ArXiv": "2111.14621", "CorpusId": 244715156}, "corpusId": + 244715156, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cbbd2e052b19941613d0ec7a7b742951e998bfa3", "title": "Improving Customer Service Chatbots with Attention-based Transfer Learning", "abstract": "\u2014With growing societal acceptance and increasing cost ef\ufb01ciency due to mass production, service robots are beginning to @@ -11228,13 +12925,14 @@ interactions: chatbots are \ufb01nally implemented on Temi and Pepper robots, with feasibility issues encountered and solutions are proposed to overcome them.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-11-24", "journal": null, "authors": [{"authorId": "89293047", "name": - "Jordan J. Bird"}]}, {"paperId": "e9732553a21d3c991e5d3dac1c18111e7d153875", - "externalIds": {"DOI": "10.18800/themis.202101.018", "CorpusId": 247427896}, - "url": "https://www.semanticscholar.org/paper/e9732553a21d3c991e5d3dac1c18111e7d153875", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-11-24", "journal": null, + "authors": [{"authorId": "89293047", "name": "Jordan J. Bird"}]}, {"paperId": + "e9732553a21d3c991e5d3dac1c18111e7d153875", "externalIds": {"DOI": "10.18800/themis.202101.018", + "CorpusId": 247427896}, "corpusId": 247427896, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e9732553a21d3c991e5d3dac1c18111e7d153875", "title": "Miner\u00eda de textos y datos e Inteligencia Artificial: nuevas excepciones al derecho de autor", "abstract": "Existe una creciente atenci\u00f3n y discusi\u00f3n sobre\u00a0c\u00f3mo las leyes nacionales o los acuerdos @@ -11254,12 +12952,14 @@ interactions: la inteligencia\u00a0artificial, la miner\u00eda de textos y datos, y la creaci\u00f3n\u00a0de nuevas limitaciones y excepciones en las leyes\u00a0de derechos de autor.", "venue": "THEMIS Revista de Derecho", "year": 2021, "referenceCount": 71, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-11-22", "journal": {"name": "THEMIS Revista de Derecho"}, "authors": - [{"authorId": "151023629", "name": "H. Izquierdo"}]}, {"paperId": "d257c67ae1c5c6cc1826e3b2603902e45a27f1ce", - "externalIds": {"DOI": "10.21203/rs.3.rs-1082323/v1", "CorpusId": 244510349}, - "url": "https://www.semanticscholar.org/paper/d257c67ae1c5c6cc1826e3b2603902e45a27f1ce", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://revistas.pucp.edu.pe/index.php/themis/article/download/24881/23666", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2021-11-22", "journal": {"name": "THEMIS Revista + de Derecho"}, "authors": [{"authorId": "151023629", "name": "H. Izquierdo"}]}, + {"paperId": "d257c67ae1c5c6cc1826e3b2603902e45a27f1ce", "externalIds": {"DOI": + "10.21203/rs.3.rs-1082323/v1", "CorpusId": 244510349}, "corpusId": 244510349, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d257c67ae1c5c6cc1826e3b2603902e45a27f1ce", "title": "Implementing Implementation Science; A Bibliometric Study of Qualitative Research in Clinical Artificial Intelligence", "abstract": "\n Background\n\nImplementation science is a pragmatic and multidisciplinary field, centred on the application @@ -11294,23 +12994,28 @@ interactions: and application, theory could be more effectively harnessed to close healthcare\u2019s \u2018know-do gaps\u2019.\nProtocol registration\n PROSPERO ID 248025", "venue": "", "year": 2021, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-11-22", "journal": null, "authors": [{"authorId": "32243895", "name": - "H. Hogg"}, {"authorId": "1404619882", "name": "M. Al-Zubaidy"}, {"authorId": - "5638585", "name": "P. Keane"}, {"authorId": "2073398767", "name": "Fiona - R Beyer"}, {"authorId": "2834652", "name": "G. Maniatopoulos"}]}, {"paperId": - "0f86385490c2a063a2f4bc0ce06f05abc30c4412", "externalIds": {"MAG": "968815122", - "DOI": "10.1007/978-94-007-2879-0_7", "CorpusId": 141991695}, "url": "https://www.semanticscholar.org/paper/0f86385490c2a063a2f4bc0ce06f05abc30c4412", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.researchsquare.com/article/rs-1082323/latest.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-22", + "journal": null, "authors": [{"authorId": "32243895", "name": "H. Hogg"}, + {"authorId": "1404619882", "name": "M. Al-Zubaidy"}, {"authorId": "5638585", + "name": "P. Keane"}, {"authorId": "2073398767", "name": "Fiona R Beyer"}, + {"authorId": "2834652", "name": "G. Maniatopoulos"}]}, {"paperId": "0f86385490c2a063a2f4bc0ce06f05abc30c4412", + "externalIds": {"MAG": "968815122", "DOI": "10.1007/978-94-007-2879-0_7", + "CorpusId": 141991695}, "corpusId": 141991695, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0f86385490c2a063a2f4bc0ce06f05abc30c4412", "title": "Conclusion Part II", "abstract": null, "venue": "Cycling Pathways", "year": 2021, "referenceCount": 506, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-18", - "journal": {"name": "Cycling Pathways"}, "authors": [{"authorId": "8872223", - "name": "D. Courgeau"}]}, {"paperId": "28947b6eebf78ba0a6db89c9a7858c2a7f07dabe", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-11-18", "journal": {"name": "Cycling Pathways"}, "authors": [{"authorId": + "8872223", "name": "D. Courgeau"}]}, {"paperId": "28947b6eebf78ba0a6db89c9a7858c2a7f07dabe", "externalIds": {"DOI": "10.1109/ICSEC53205.2021.9684619", "CorpusId": 246363415}, - "url": "https://www.semanticscholar.org/paper/28947b6eebf78ba0a6db89c9a7858c2a7f07dabe", + "corpusId": 246363415, "publicationVenue": {"id": "6ffd3030-fbaa-4915-9ec8-888f211c7b73", + "name": "International Computer Science and Engineering Conference", "type": + "conference", "alternate_names": ["ICSEC", "Int Comput Sci Eng Conf"]}, "url": + "https://www.semanticscholar.org/paper/28947b6eebf78ba0a6db89c9a7858c2a7f07dabe", "title": "The Prototype Development of Thai Language Understanding based on Mental Image Directed Semantic Theory", "abstract": "Nowadays, Artificial Intelligence (AI) has been embedded in various tools such as smart phones, @@ -11329,16 +13034,17 @@ interactions: results of the inputs, in order to help language learners understand the text contents in a more intuitive way.", "venue": "International Computer Science and Engineering Conference", "year": 2021, "referenceCount": 15, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": - ["Conference"], "publicationDate": "2021-11-18", "journal": {"pages": "167-172", - "name": "2021 25th International Computer Science and Engineering Conference - (ICSEC)"}, "authors": [{"authorId": "3269611", "name": "Rojanee Khummongkol"}, - {"authorId": "2151502770", "name": "Atisak Samart"}, {"authorId": "2151501746", - "name": "Sarawut Chitthong"}, {"authorId": "1720292", "name": "M. Yokota"}]}, - {"paperId": "6f30dfb5bec5365000d64b582467e1cc57c659ec", "externalIds": {"DOI": - "10.1109/CINTI53070.2021.9668544", "CorpusId": 246301533}, "url": "https://www.semanticscholar.org/paper/6f30dfb5bec5365000d64b582467e1cc57c659ec", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Linguistics", "source": "s2-fos-model"}], + "publicationTypes": ["Conference"], "publicationDate": "2021-11-18", "journal": + {"pages": "167-172", "name": "2021 25th International Computer Science and + Engineering Conference (ICSEC)"}, "authors": [{"authorId": "3269611", "name": + "Rojanee Khummongkol"}, {"authorId": "2151502770", "name": "Atisak Samart"}, + {"authorId": "2151501746", "name": "Sarawut Chitthong"}, {"authorId": "1720292", + "name": "M. Yokota"}]}, {"paperId": "6f30dfb5bec5365000d64b582467e1cc57c659ec", + "externalIds": {"DOI": "10.1109/CINTI53070.2021.9668544", "CorpusId": 246301533}, + "corpusId": 246301533, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6f30dfb5bec5365000d64b582467e1cc57c659ec", "title": "Applying Genetic Programming for the Inverse Lindenmayer Problem", "abstract": "The aim of this work is to find an automated solution for the Inverse Lindenmayer problem - that is to find the describing system for a @@ -11351,24 +13057,33 @@ interactions: all of the considered systems.", "venue": "2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-11-18", "journal": {"pages": - "000043-000048", "name": "2021 IEEE 21st International Symposium on Computational - Intelligence and Informatics (CINTI)"}, "authors": [{"authorId": "2151291475", - "name": "Tibor Eszes"}, {"authorId": "1762606", "name": "J\u00e1nos Botzheim"}]}, - {"paperId": "33076a8afcb8cab1258762459e3493f1bbd4a8a2", "externalIds": {"PubMedCentral": - "8598398", "DOI": "10.1007/s10708-021-10549-5", "CorpusId": 244401508, "PubMed": - "34812217"}, "url": "https://www.semanticscholar.org/paper/33076a8afcb8cab1258762459e3493f1bbd4a8a2", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-18", + "journal": {"pages": "000043-000048", "name": "2021 IEEE 21st International + Symposium on Computational Intelligence and Informatics (CINTI)"}, "authors": + [{"authorId": "2151291475", "name": "Tibor Eszes"}, {"authorId": "1762606", + "name": "J\u00e1nos Botzheim"}]}, {"paperId": "33076a8afcb8cab1258762459e3493f1bbd4a8a2", + "externalIds": {"PubMedCentral": "8598398", "DOI": "10.1007/s10708-021-10549-5", + "CorpusId": 244401508, "PubMed": "34812217"}, "corpusId": 244401508, "publicationVenue": + {"id": "3945ce8c-fa3e-49e3-a723-2c96a64da989", "name": "GeoJournal", "type": + "journal", "issn": "0343-2521", "url": "https://link.springer.com/journal/10708", + "alternate_urls": ["https://www.jstor.org/journal/geojournal", "http://www.springerlink.com/content/102895/"]}, + "url": "https://www.semanticscholar.org/paper/33076a8afcb8cab1258762459e3493f1bbd4a8a2", "title": "Assessing internet and web services based webdom and virtual web-data-centric geographical study", "abstract": null, "venue": "GeoJournal", "year": 2021, "referenceCount": 66, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-18", "journal": - {"volume": "87", "pages": "4991 - 5005", "name": "Geojournal"}, "authors": - [{"authorId": "10124152", "name": "Abhay Sankar Sahu"}]}, {"paperId": "a3e496c48b21c122913351030e8520f00c578b6d", - "externalIds": {"DOI": "10.1080/02508060.2021.2005332", "CorpusId": 245290473}, + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10708-021-10549-5.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-11-18", "journal": {"volume": "87", "pages": "4991 - 5005", "name": + "Geojournal"}, "authors": [{"authorId": "10124152", "name": "Abhay Sankar + Sahu"}]}, {"paperId": "a3e496c48b21c122913351030e8520f00c578b6d", "externalIds": + {"DOI": "10.1080/02508060.2021.2005332", "CorpusId": 245290473}, "corpusId": + 245290473, "publicationVenue": {"id": "16e7e056-c3c4-4538-a4b1-0818228342f3", + "name": "Water international", "type": "journal", "alternate_names": ["Water + int", "Water Int", "Water International"], "issn": "0250-8060", "url": "http://www.tandfonline.com/loi/rwin20"}, "url": "https://www.semanticscholar.org/paper/a3e496c48b21c122913351030e8520f00c578b6d", "title": "Water resource prospects for the next 50 years on the water planet: personal perspectives on a shared history from Earth Day, the Fourth Industrial @@ -11383,13 +13098,14 @@ interactions: historical underpinnings of how we manage the use of our essential water resources now and might hope to in the future.", "venue": "Water international", "year": 2021, "referenceCount": 151, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-11-17", "journal": {"volume": "46", "pages": "1158 - 1186", "name": - "Water International"}, "authors": [{"authorId": "81501813", "name": "W. Jones"}]}, - {"paperId": "2d4a6a04dc1b137276a511ca97066054400aef2d", "externalIds": {"DBLP": - "journals/hhci/Hancock22", "DOI": "10.1080/07370024.2021.1970556", "CorpusId": - 244281247}, "url": "https://www.semanticscholar.org/paper/2d4a6a04dc1b137276a511ca97066054400aef2d", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/02508060.2021.2005332?needAccess=true", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-17", + "journal": {"volume": "46", "pages": "1158 - 1186", "name": "Water International"}, + "authors": [{"authorId": "81501813", "name": "W. Jones"}]}, {"paperId": "2d4a6a04dc1b137276a511ca97066054400aef2d", + "externalIds": {"DBLP": "journals/hhci/Hancock22", "DOI": "10.1080/07370024.2021.1970556", + "CorpusId": 244281247}, "corpusId": 244281247, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2d4a6a04dc1b137276a511ca97066054400aef2d", "title": "Avoiding adverse autonomous agent actions", "abstract": "Few today would dispute that the age of autonomous machines is nearly upon us (cf., Kurzweil, 2005; Moravec, 1988), if it is not already. While it is doubtful @@ -11436,30 +13152,40 @@ interactions: permanently change their functional capacities as a result of the input of operational and contextual information. Their actions necessarily become more", "venue": "Hum. Comput. Interact.", "year": 2021, "referenceCount": 126, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-16", "journal": - {"volume": "37", "pages": "211 - 236", "name": "Human\u2013Computer Interaction"}, - "authors": [{"authorId": "143605034", "name": "P. Hancock"}]}, {"paperId": - "523f4c7248450e0aeb9f0e1430932269a8aa4831", "externalIds": {"DOI": "10.1007/s11845-021-02853-3", - "CorpusId": 244120010, "PubMed": "34783968"}, "url": "https://www.semanticscholar.org/paper/523f4c7248450e0aeb9f0e1430932269a8aa4831", + 12, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.tandfonline.com/doi/pdf/10.1080/07370024.2021.1970556?needAccess=true", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-11-16", "journal": {"volume": "37", "pages": "211 + - 236", "name": "Human\u2013Computer Interaction"}, "authors": [{"authorId": + "143605034", "name": "P. Hancock"}]}, {"paperId": "523f4c7248450e0aeb9f0e1430932269a8aa4831", + "externalIds": {"DOI": "10.1007/s11845-021-02853-3", "CorpusId": 244120010, + "PubMed": "34783968"}, "corpusId": 244120010, "publicationVenue": {"id": "b3a217d4-f456-4394-9e5b-b39ab19d1b3e", + "name": "Irish Journal of Medical Science", "type": "journal", "alternate_names": + ["Ir J Med Sci"], "issn": "0021-1265", "url": "https://www.springer.com/medicine/internal/journal/11845", + "alternate_urls": ["http://www.springer.com/medicine/internal/journal/11845", + "https://link.springer.com/journal/11845", "http://link.springer.com/journal/12628"]}, + "url": "https://www.semanticscholar.org/paper/523f4c7248450e0aeb9f0e1430932269a8aa4831", "title": "Artificial Intelligence: the future of medicine, or an overhyped and dangerous idea?", "abstract": null, "venue": "Irish Journal of Medical Science", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-11-16", "journal": {"volume": "191", "pages": "1991 - 1994", "name": - "Irish Journal of Medical Science (1971 -)"}, "authors": [{"authorId": "2141310467", - "name": "Shubhangi Karmakar"}]}, {"paperId": "1b1109ed7549c009738caccb4405a04373c82e51", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-11-16", "journal": {"volume": "191", "pages": "1991 + - 1994", "name": "Irish Journal of Medical Science (1971 -)"}, "authors": + [{"authorId": "2141310467", "name": "Shubhangi Karmakar"}]}, {"paperId": "1b1109ed7549c009738caccb4405a04373c82e51", "externalIds": {"MAG": "3212259563", "DOI": "10.1007/s00146-021-01308-8", - "CorpusId": 245746878}, "url": "https://www.semanticscholar.org/paper/1b1109ed7549c009738caccb4405a04373c82e51", + "CorpusId": 245746878}, "corpusId": 245746878, "publicationVenue": {"id": + "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", + "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/1b1109ed7549c009738caccb4405a04373c82e51", "title": "Operationalising AI ethics: barriers, enablers and next steps", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": - 38, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + 38, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01308-8.pdf", + "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-15", "journal": {"name": "AI & SOCIETY"}, "authors": [{"authorId": "1751614630", "name": "J. Morley"}, {"authorId": "40901846", "name": "Libby Kinsey"}, {"authorId": "2600242", @@ -11467,7 +13193,7 @@ interactions: {"authorId": "79377716", "name": "M. Ziosi"}, {"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "492384a0fb95959811d378463f1ccbebbccdc8b1", "externalIds": {"PubMedCentral": "8634872", "DOI": "10.3389/fpsyg.2021.730112", "CorpusId": - 244119544}, "url": "https://www.semanticscholar.org/paper/492384a0fb95959811d378463f1ccbebbccdc8b1", + 244119544}, "corpusId": 244119544, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/492384a0fb95959811d378463f1ccbebbccdc8b1", "title": "Vocabulary: Common or Basic?", "abstract": "Neither linguistics nor psychology offers a single, unified notion of simplicity, and therefore the simplest \u201ccore\u201d layer of vocabulary is hard to define in theory @@ -11478,13 +13204,15 @@ interactions: unfamiliar as it may be to most working psychologists, lexicographers, and educators, as the best formal means to deal with core vocabulary.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 42, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-11-15", "journal": - {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": - "2979211", "name": "Andr\u00e1s Kornai"}]}, {"paperId": "f027e28cdaaa56082f2e5d9fe14469e7341c1bfc", - "externalIds": {"DBLP": "journals/corr/abs-2111-07263", "ArXiv": "2111.07263", - "CorpusId": 244117863}, "url": "https://www.semanticscholar.org/paper/f027e28cdaaa56082f2e5d9fe14469e7341c1bfc", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fpsyg.2021.730112/pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-11-15", "journal": {"volume": "12", "name": "Frontiers in Psychology"}, + "authors": [{"authorId": "2979211", "name": "Andr\u00e1s Kornai"}]}, {"paperId": + "f027e28cdaaa56082f2e5d9fe14469e7341c1bfc", "externalIds": {"DBLP": "journals/corr/abs-2111-07263", + "ArXiv": "2111.07263", "CorpusId": 244117863}, "corpusId": 244117863, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f027e28cdaaa56082f2e5d9fe14469e7341c1bfc", "title": "Code Representation Learning with Pr\u00fcfer Sequences", "abstract": "An effective and efficient encoding of the source code of a computer program is critical to the success of sequence-to-sequence deep neural network models @@ -11493,24 +13221,31 @@ interactions: that captures the structural/syntactic information in a computer program and facilitates the training of the", "venue": "ArXiv", "year": 2021, "referenceCount": 58, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-11-14", "journal": {"volume": "abs/2111.07263", "name": "ArXiv"}, "authors": - [{"authorId": "69893262", "name": "Tenzin Jinpa"}, {"authorId": "2145987061", - "name": "Yong Gao"}]}, {"paperId": "9cb53b47412adc250e74c55fc31db970e64b08e3", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-11-14", "journal": {"volume": "abs/2111.07263", "name": + "ArXiv"}, "authors": [{"authorId": "69893262", "name": "Tenzin Jinpa"}, {"authorId": + "2145987061", "name": "Yong Gao"}]}, {"paperId": "9cb53b47412adc250e74c55fc31db970e64b08e3", "externalIds": {"DBLP": "journals/ais/Lengbeyer22", "DOI": "10.1007/s00146-021-01257-2", - "CorpusId": 244092615}, "url": "https://www.semanticscholar.org/paper/9cb53b47412adc250e74c55fc31db970e64b08e3", + "CorpusId": 244092615}, "corpusId": 244092615, "publicationVenue": {"id": + "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", + "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/9cb53b47412adc250e74c55fc31db970e64b08e3", "title": "Dismantling the Chinese Room with linguistic tools: a framework for elucidating concept-application disputes", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 58, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-11-12", "journal": {"volume": "37", "pages": "1625 - 1643", "name": - "AI & SOCIETY"}, "authors": [{"authorId": "116774767", "name": "L. Lengbeyer"}]}, - {"paperId": "7afb7153c128a8e3fd15618648e609495bd557ef", "externalIds": {"DBLP": - "conf/hai/FarahSIG21", "DOI": "10.1145/3472307.3484677", "CorpusId": 243864766}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-11-12", "journal": {"volume": + "37", "pages": "1625 - 1643", "name": "AI & SOCIETY"}, "authors": [{"authorId": + "116774767", "name": "L. Lengbeyer"}]}, {"paperId": "7afb7153c128a8e3fd15618648e609495bd557ef", + "externalIds": {"DBLP": "conf/hai/FarahSIG21", "DOI": "10.1145/3472307.3484677", + "CorpusId": 243864766}, "corpusId": 243864766, "publicationVenue": {"id": + "c3940b41-03f7-4e15-8a48-20b569de9625", "name": "International Conference + on Human-Agent Interaction", "type": "conference", "alternate_names": ["HAI", + "Int Conf Human-agent Interact", "Human-Agent Interaction", "Hum Asp Ambient + Intell", "Human-agent Interact", "Human Aspects in Ambient Intelligence"]}, "url": "https://www.semanticscholar.org/paper/7afb7153c128a8e3fd15618648e609495bd557ef", "title": "Conveying the Perception of Humor Arising from Ambiguous Grammatical Constructs in Human-Chatbot Interaction", "abstract": "Chatbots have long @@ -11532,46 +13267,59 @@ interactions: modifier. This effect was observed whether the acknowledgment was conveyed using verbal, nonverbal (emoji), or mixed cues.", "venue": "International Conference on Human-Agent Interaction", "year": 2021, "referenceCount": 59, - "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Book"], "publicationDate": "2021-11-09", "journal": {"name": - "Proceedings of the 9th International Conference on Human-Agent Interaction"}, - "authors": [{"authorId": "6456697", "name": "J. C. Farah"}, {"authorId": "2148414522", - "name": "Vandit Sharma"}, {"authorId": "48704546", "name": "Sandy Ingram"}, - {"authorId": "145432296", "name": "D. Gillet"}]}, {"paperId": "086cbbbb174075cc2961c2135809bc547c12f2b8", - "externalIds": {"ArXiv": "2111.04165", "DOI": "10.1007/978-3-030-80083-3_5", - "CorpusId": 243847742}, "url": "https://www.semanticscholar.org/paper/086cbbbb174075cc2961c2135809bc547c12f2b8", + "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://infoscience.epfl.ch/record/288626/files/farah2021conveying.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", + "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-11-09", + "journal": {"name": "Proceedings of the 9th International Conference on Human-Agent + Interaction"}, "authors": [{"authorId": "6456697", "name": "J. C. Farah"}, + {"authorId": "2148414522", "name": "Vandit Sharma"}, {"authorId": "48704546", + "name": "Sandy Ingram"}, {"authorId": "145432296", "name": "D. Gillet"}]}, + {"paperId": "086cbbbb174075cc2961c2135809bc547c12f2b8", "externalIds": {"ArXiv": + "2111.04165", "DOI": "10.1007/978-3-030-80083-3_5", "CorpusId": 243847742}, + "corpusId": 243847742, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/086cbbbb174075cc2961c2135809bc547c12f2b8", "title": "On the Limits of Design: What Are the Conceptual Constraints on Designing Artificial Intelligence for Social Good?", "abstract": null, "venue": "", "year": 2021, "referenceCount": 59, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Economics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-11-07", "journal": null, - "authors": [{"authorId": "2121755173", "name": "Jakob Mokander"}]}, {"paperId": - "b1d6336ccca15489a3b4aec035448f921321fde5", "externalIds": {"DOI": "10.1007/s11042-021-11709-y", - "CorpusId": 254863124}, "url": "https://www.semanticscholar.org/paper/b1d6336ccca15489a3b4aec035448f921321fde5", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2111.04165", + "status": null}, "fieldsOfStudy": ["Economics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-11-07", "journal": null, "authors": [{"authorId": + "2121755173", "name": "Jakob Mokander"}]}, {"paperId": "b1d6336ccca15489a3b4aec035448f921321fde5", + "externalIds": {"DOI": "10.1007/s11042-021-11709-y", "CorpusId": 254863124}, + "corpusId": 254863124, "publicationVenue": {"id": "477368e9-7a8e-475a-8c93-6d623797fd06", + "name": "Multimedia tools and applications", "type": "journal", "alternate_names": + ["Multimedia Tools and Applications", "Multimedia Tool Appl", "Multimedia + tool appl"], "issn": "1380-7501", "url": "https://www.springer.com/computer/information+systems+and+applications/journal/11042", + "alternate_urls": ["https://link.springer.com/journal/11042"]}, "url": "https://www.semanticscholar.org/paper/b1d6336ccca15489a3b4aec035448f921321fde5", "title": "Chatbot in Arabic language using seq to seq model", "abstract": null, "venue": "Multimedia tools and applications", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-06", - "journal": {"volume": "81", "pages": "2859 - 2871", "name": "Multimedia Tools - and Applications"}, "authors": [{"authorId": null, "name": "M. Boussakssou"}, - {"authorId": null, "name": "H. Ezzikouri"}, {"authorId": null, "name": "M. - Erritali"}]}, {"paperId": "e17cf46ffac9dd3b19bf2731a9cb025c39c2fa20", "externalIds": - {"DOI": "10.1007/s11229-021-03421-z", "CorpusId": 243829068}, "url": "https://www.semanticscholar.org/paper/e17cf46ffac9dd3b19bf2731a9cb025c39c2fa20", - "title": "Byond the limits of imagination: abductive inferences from imagined + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2021-11-06", "journal": {"volume": "81", "pages": "2859 + - 2871", "name": "Multimedia Tools and Applications"}, "authors": [{"authorId": + "1712211978", "name": "M. Boussakssou"}, {"authorId": "2011904", "name": "H. + Ezzikouri"}, {"authorId": "90643624", "name": "M. Erritali"}]}, {"paperId": + "e17cf46ffac9dd3b19bf2731a9cb025c39c2fa20", "externalIds": {"DOI": "10.1007/s11229-021-03421-z", + "CorpusId": 243829068}, "corpusId": 243829068, "publicationVenue": {"id": + "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": "Synthese", "type": "journal", + "issn": "0039-7857", "url": "http://www.springer.com/11229", "alternate_urls": + ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, + "url": "https://www.semanticscholar.org/paper/e17cf46ffac9dd3b19bf2731a9cb025c39c2fa20", + "title": "Beyond the limits of imagination: abductive inferences from imagined phenomena", "abstract": null, "venue": "Synthese", "year": 2021, "referenceCount": - 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-11-05", - "journal": {"name": "Synthese"}, "authors": [{"authorId": "145822349", "name": - "M. Traynor"}]}, {"paperId": "a4b152afb11ed1ed390265520526cd2327f9c841", "externalIds": - {"DBLP": "journals/corr/abs-2112-03877", "ArXiv": "2112.03877", "CorpusId": - 244920771}, "url": "https://www.semanticscholar.org/paper/a4b152afb11ed1ed390265520526cd2327f9c841", + 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-11-05", "journal": {"volume": "199", "pages": "14293 - 14315", "name": + "Synthese"}, "authors": [{"authorId": "145822349", "name": "M. Traynor"}]}, + {"paperId": "a4b152afb11ed1ed390265520526cd2327f9c841", "externalIds": {"DBLP": + "journals/corr/abs-2112-03877", "ArXiv": "2112.03877", "CorpusId": 244920771}, + "corpusId": 244920771, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a4b152afb11ed1ed390265520526cd2327f9c841", "title": "Is Complexity Important for Philosophy of Mind?", "abstract": "Even though it is only a thesis, not just unproven, but by definition, unprovable, the Church-Turing thesis has spearheaded research in computability for decades. @@ -11596,38 +13344,47 @@ interactions: 1986]). One could argue that this, quintessentially non-dualist position has strange consequences, and in fact, one would be right. But we consider this not as", "venue": "ArXiv", "year": 2021, "referenceCount": 30, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-11-02", "journal": - {"volume": "abs/2112.03877", "name": "ArXiv"}, "authors": [{"authorId": "101832726", - "name": "Kristina \u0160ekrst"}, {"authorId": "3422664", "name": "S. Skansi"}]}, - {"paperId": "1c28a69656e844ab391416ed69557c26bf5c93b2", "externalIds": {"DOI": - "10.1016/j.cjca.2021.11.009", "CorpusId": 244639958, "PubMed": "34838700"}, + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-11-02", "journal": {"volume": "abs/2112.03877", "name": "ArXiv"}, "authors": + [{"authorId": "101832726", "name": "Kristina \u0160ekrst"}, {"authorId": "3422664", + "name": "S. Skansi"}]}, {"paperId": "1c28a69656e844ab391416ed69557c26bf5c93b2", + "externalIds": {"DOI": "10.1016/j.cjca.2021.11.009", "CorpusId": 244639958, + "PubMed": "34838700"}, "corpusId": 244639958, "publicationVenue": {"id": "ab17701b-8ac0-4766-93ca-78d73ce88cd1", + "name": "Canadian Journal of Cardiology", "type": "journal", "alternate_names": + ["Can J Cardiol"], "issn": "0828-282X", "url": "https://www.onlinecjc.ca/", + "alternate_urls": ["http://www.pulsus.com/CARDIOL/index.htm", "http://www.sciencedirect.com/science/journal/0828282X"]}, "url": "https://www.semanticscholar.org/paper/1c28a69656e844ab391416ed69557c26bf5c93b2", "title": "A primer on the present state and future prospects for machine learning and artificial intelligence applications in cardiology.", "abstract": null, - "venue": "The Canadian journal of cardiology", "year": 2021, "referenceCount": - 87, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "venue": "Canadian Journal of Cardiology", "year": 2021, "referenceCount": + 87, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.onlinecjc.ca/article/S0828282X2100903X/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-11-01", "journal": {"name": "The Canadian journal of cardiology"}, "authors": [{"authorId": "6543527", "name": "C. Manlhiot"}, {"authorId": "2120038947", "name": "J. Van den Eynde"}, {"authorId": "1826359", "name": "S. Kutty"}, {"authorId": "2998749", "name": "H. Ross"}]}, {"paperId": "3cb86721fc680e1006aa80f9121bcf6207f4a137", "externalIds": {"DOI": "10.1016/j.techfore.2021.121318", "CorpusId": 244433405}, - "url": "https://www.semanticscholar.org/paper/3cb86721fc680e1006aa80f9121bcf6207f4a137", + "corpusId": 244433405, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3cb86721fc680e1006aa80f9121bcf6207f4a137", "title": "Artificial intelligence: Catalyst or barrier on the path to sustainability?", "abstract": null, "venue": "Technological Forecasting and Social Change", "year": 2021, "referenceCount": 85, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2021-11-01", "journal": {"name": "Technological - Forecasting and Social Change"}, "authors": [{"authorId": "2006370036", "name": - "A. Kopka"}, {"authorId": "120576394", "name": "Nils Grashof"}]}, {"paperId": - "00941d147be2699dc7102c7a2190baeaf2822ef9", "externalIds": {"PubMedCentral": - "8568505", "DOI": "10.1055/a-1522-3029", "CorpusId": 243776061, "PubMed": - "34754270"}, "url": "https://www.semanticscholar.org/paper/00941d147be2699dc7102c7a2190baeaf2822ef9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2021-11-01", "journal": + {"name": "Technological Forecasting and Social Change"}, "authors": [{"authorId": + "2006370036", "name": "A. Kopka"}, {"authorId": "120576394", "name": "Nils + Grashof"}]}, {"paperId": "00941d147be2699dc7102c7a2190baeaf2822ef9", "externalIds": + {"PubMedCentral": "8568505", "DOI": "10.1055/a-1522-3029", "CorpusId": 243776061, + "PubMed": "34754270"}, "corpusId": 243776061, "publicationVenue": {"id": "cf50a44e-a88d-48ee-b09a-83784921411c", + "name": "Geburtshilfe und Frauenheilkunde", "type": "journal", "alternate_names": + ["Geburtshilfe Frauenheilkd", "Geburtshilfe Und Frauenheilkunde"], "issn": + "0016-5751", "alternate_issns": ["1615-3359"], "url": "https://www.thieme-connect.de/products/ejournals/journal/10.1055/s-00000020"}, + "url": "https://www.semanticscholar.org/paper/00941d147be2699dc7102c7a2190baeaf2822ef9", "title": "The Use of Artificial Intelligence in Automation in the Fields of Gynaecology and Obstetrics \u2013 an Assessment of the State of Play", "abstract": "The long-awaited progress in digitalisation is generating huge amounts of @@ -11651,18 +13408,20 @@ interactions: diagnostics. The article will focus, in particular, on automated techniques in prenatal sonographic diagnostics.", "venue": "Geburtshilfe und Frauenheilkunde", "year": 2021, "referenceCount": 98, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-11-01", "journal": {"volume": "81", "pages": "1203 - - 1216", "name": "Geburtshilfe und Frauenheilkunde"}, "authors": [{"authorId": - "1910815", "name": "J. Weichert"}, {"authorId": "1662776561", "name": "A. - Welp"}, {"authorId": "2137467792", "name": "Jann Lennard Scharf"}, {"authorId": - "66851372", "name": "C. Dracopoulos"}, {"authorId": "2077567874", "name": - "W. Becker"}, {"authorId": "48342345", "name": "M. Gembicki"}]}, {"paperId": - "181a971a94402cd005d27abeea22ef6bca24ca50", "externalIds": {"PubMedCentral": - "8642128", "DOI": "10.7759/cureus.19235", "CorpusId": 243484395, "PubMed": - "34877212"}, "url": "https://www.semanticscholar.org/paper/181a971a94402cd005d27abeea22ef6bca24ca50", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.thieme-connect.de/products/ejournals/pdf/10.1055/a-1522-3029.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-11-01", + "journal": {"volume": "81", "pages": "1203 - 1216", "name": "Geburtshilfe + und Frauenheilkunde"}, "authors": [{"authorId": "1910815", "name": "J. Weichert"}, + {"authorId": "1662776561", "name": "A. Welp"}, {"authorId": "2137467792", + "name": "Jann Lennard Scharf"}, {"authorId": "66851372", "name": "C. Dracopoulos"}, + {"authorId": "2077567874", "name": "W. Becker"}, {"authorId": "48342345", + "name": "M. Gembicki"}]}, {"paperId": "181a971a94402cd005d27abeea22ef6bca24ca50", + "externalIds": {"PubMedCentral": "8642128", "DOI": "10.7759/cureus.19235", + "CorpusId": 243484395, "PubMed": "34877212"}, "corpusId": 243484395, "publicationVenue": + {"id": "87c855fc-c59a-4443-832a-e5b1ca14b9f3", "name": "Cureus", "type": "journal", + "issn": "2168-8184", "url": "https://www.cureus.com/"}, "url": "https://www.semanticscholar.org/paper/181a971a94402cd005d27abeea22ef6bca24ca50", "title": "A Review of Applications of Artificial Intelligence in Gastroenterology", "abstract": "Artificial intelligence (AI) is the science that deals with creating \u2018intelligent machines\u2019. AI has revolutionized medicine because of @@ -11679,15 +13438,16 @@ interactions: outcomes, all in all, which helps doctors from all over the globe in dispensing better healthcare services.", "venue": "Cureus", "year": 2021, "referenceCount": 40, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.cureus.com/articles/74103-a-review-of-applications-of-artificial-intelligence-in-gastroenterology.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-11-01", "journal": {"volume": "13", "name": "Cureus"}, "authors": [{"authorId": "117311809", "name": "K. Nawab"}, {"authorId": "117322839", "name": "Ravi Athwani"}, {"authorId": "10063288", "name": "Awais Naeem"}, {"authorId": "3312492", "name": "M. Hamayun"}, {"authorId": "2138139074", "name": "Momna Wazir"}]}, {"paperId": "e968be08741743a351d1686ad383a162f18f796e", "externalIds": {"DOI": "10.1017/9781009036719.007", "CorpusId": 240174075}, - "url": "https://www.semanticscholar.org/paper/e968be08741743a351d1686ad383a162f18f796e", + "corpusId": 240174075, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e968be08741743a351d1686ad383a162f18f796e", "title": "Artificial Intelligence", "abstract": "Artificial Intelligence may be defined as intelligence displayed by machines, systems or agents or by entities other than living beings. Apparently, the term seems simple but the @@ -11703,12 +13463,13 @@ interactions: fabric of our perception and comprehension, conception and construction related to our learning and living dispensations.", "venue": "Artificial Economics", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2021-10-31", "journal": {"name": "Artificial Economics"}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-10-31", "journal": {"name": "Artificial Economics"}, "authors": [{"authorId": "144836069", "name": "Aabid Ali"}]}, {"paperId": "432638b3e44390a054c1a32b55eee785bbb511dc", "externalIds": {"DOI": "10.32347/tit2021.42.0303", - "CorpusId": 243485262}, "url": "https://www.semanticscholar.org/paper/432638b3e44390a054c1a32b55eee785bbb511dc", + "CorpusId": 243485262}, "corpusId": 243485262, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/432638b3e44390a054c1a32b55eee785bbb511dc", "title": "The twentieth century science paradoxes", "abstract": "The isolation of hypothetical theories from the realities of living matter has caused mysticism to penetrate scientific theories. With mystical thinking, the idea of using @@ -11741,22 +13502,44 @@ interactions: accepted stereotypical tautologies of classical mathematics for proving theorems.", "venue": "Transfer of Innovative Technologies", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-29", + "openAccessPdf": {"url": "http://tit.knuba.edu.ua/article/download/243481/241386", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-29", "journal": {"name": "Transfer of Innovative Technologies"}, "authors": [{"authorId": - "79815445", "name": "V. Kondratenko"}]}, {"paperId": "06a550424758d9c3766051d7cb68540f43879071", - "externalIds": {"DOI": "10.1057/s41284-021-00321-2", "CorpusId": 240269765}, - "url": "https://www.semanticscholar.org/paper/06a550424758d9c3766051d7cb68540f43879071", + "79815445", "name": "V. Kondratenko"}]}, {"paperId": "5d8aac87d879aed91248636ca0be262dde27f9e4", + "externalIds": {"DBLP": "journals/wpc/KuipersP22", "DOI": "10.1007/s11277-021-09288-0", + "CorpusId": 240243277}, "corpusId": 240243277, "publicationVenue": {"id": + "08d7cf5a-27a7-438e-ad01-c6724b828bfb", "name": "Wireless personal communications", + "type": "journal", "alternate_names": ["Wirel pers commun", "Wirel Pers Commun", + "Wireless Personal Communications"], "issn": "0929-6212", "url": "https://www.springer.com/engineering/signals/journal/11277", + "alternate_urls": ["http://www.springer.com/engineering/signals/journal/11277", + "https://link.springer.com/journal/11277"]}, "url": "https://www.semanticscholar.org/paper/5d8aac87d879aed91248636ca0be262dde27f9e4", + "title": "Journey of Artificial Intelligence", "abstract": null, "venue": + "Wireless personal communications", "year": 2021, "referenceCount": 55, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-10-29", "journal": {"volume": "123", "pages": "3275 - 3290", "name": + "Wireless Personal Communications"}, "authors": [{"authorId": "2169230677", + "name": "M.M. Kuipers"}, {"authorId": "2121476948", "name": "Ramjee Prasad"}]}, + {"paperId": "06a550424758d9c3766051d7cb68540f43879071", "externalIds": {"DOI": + "10.1057/s41284-021-00321-2", "CorpusId": 240269765}, "corpusId": 240269765, + "publicationVenue": {"id": "988bd0e3-b00a-4f42-9270-9da531d5854b", "name": + "Security Journal", "type": "journal", "alternate_names": ["Secur J"], "issn": + "0955-1662", "url": "http://www.palgrave-journals.com/sj/index.html", "alternate_urls": + ["https://link.springer.com/journal/volumesAndIssues/41284"]}, "url": "https://www.semanticscholar.org/paper/06a550424758d9c3766051d7cb68540f43879071", "title": "Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis", "abstract": null, "venue": "Security Journal", "year": 2021, "referenceCount": 102, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-10-29", "journal": {"volume": - "35", "pages": "1328-1348", "name": "Security Journal"}, "authors": [{"authorId": - "120713325", "name": "Gaudys L. Sanclemente"}]}, {"paperId": "733bcf4f2e29eb359ad4af993e1e9dc4249769b9", - "externalIds": {"DBLP": "journals/sis/TongkaiMSJZ21", "DOI": "10.4108/eai.29-10-2021.171686", - "CorpusId": 240249567}, "url": "https://www.semanticscholar.org/paper/733bcf4f2e29eb359ad4af993e1e9dc4249769b9", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-29", + "journal": {"volume": "35", "pages": "1328-1348", "name": "Security Journal"}, + "authors": [{"authorId": "120713325", "name": "Gaudys L. Sanclemente"}]}, + {"paperId": "733bcf4f2e29eb359ad4af993e1e9dc4249769b9", "externalIds": {"DBLP": + "journals/sis/TongkaiMSJZ21", "DOI": "10.4108/eai.29-10-2021.171686", "CorpusId": + 240249567}, "corpusId": 240249567, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/733bcf4f2e29eb359ad4af993e1e9dc4249769b9", "title": "When Artificial Intelligence Meets Printing The Evidence of Black Generation", "abstract": "Recent years wit a rapid development of new technologies. As a significant part, artificial intelligence leads to a great change of @@ -11772,7 +13555,8 @@ interactions: of the new approach. Received on 21 October 2021; accepted on 28 October 2021; published on 29 October 2021", "venue": "EAI Endorsed Trans. Scalable Inf. Syst.", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://eudl.eu/pdf/10.4108/eai.29-10-2021.171686", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-29", "journal": {"volume": "8", "pages": "e10", @@ -11782,7 +13566,13 @@ interactions: "2136453546", "name": "Xie Jiliang"}, {"authorId": "2136462419", "name": "Yuan Zhende"}]}, {"paperId": "8c7e3e50549a8e3d889fcbf31ba88dfc41015613", "externalIds": {"PubMedCentral": "8586539", "DOI": "10.3389/fpsyg.2021.730985", "CorpusId": - 240075726, "PubMed": "34777110"}, "url": "https://www.semanticscholar.org/paper/8c7e3e50549a8e3d889fcbf31ba88dfc41015613", + 240075726, "PubMed": "34777110"}, "corpusId": 240075726, "publicationVenue": + {"id": "89097a03-8be6-4e2d-ae2c-a6df64c77a06", "name": "Frontiers in Psychology", + "type": "journal", "alternate_names": ["Front Psychol"], "issn": "1664-1078", + "url": "http://www.frontiersin.org/Cultural_Psychology", "alternate_urls": + ["http://frontiersin.org/psychology/", "https://www.frontiersin.org/journals/psychology", + "http://journal.frontiersin.org/journal/psychology", "http://www.frontiersin.org/psychology"]}, + "url": "https://www.semanticscholar.org/paper/8c7e3e50549a8e3d889fcbf31ba88dfc41015613", "title": "The Modified Imitation Game: A Method for Measuring Interactional Expertise", "abstract": "The study of the sociology of scientific knowledge distinguishes between contributory and interactional experts. Contributory @@ -11817,16 +13607,18 @@ interactions: research tool for measuring interactional expertise within a community of practice and evaluating practitioners\u2019 understanding of true experts.", "venue": "Frontiers in Psychology", "year": 2021, "referenceCount": 46, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-10-29", "journal": {"volume": "12", "name": "Frontiers - in Psychology"}, "authors": [{"authorId": "3219950", "name": "Guler Arsal"}, - {"authorId": "3153660", "name": "J. Suss"}, {"authorId": "143852095", "name": - "P. Ward"}, {"authorId": "15712299", "name": "Vivian P. Ta"}, {"authorId": - "2417653", "name": "Ryan V. Ringer"}, {"authorId": "143905716", "name": "David - W. Eccles"}]}, {"paperId": "a3ab3d15e07cbb3437f8467e7907964dd925d398", "externalIds": - {"DBLP": "journals/corr/abs-2110-13817", "CorpusId": 239885611}, "url": "https://www.semanticscholar.org/paper/a3ab3d15e07cbb3437f8467e7907964dd925d398", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fpsyg.2021.730985/pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-29", "journal": + {"volume": "12", "name": "Frontiers in Psychology"}, "authors": [{"authorId": + "3219950", "name": "Guler Arsal"}, {"authorId": "3153660", "name": "J. Suss"}, + {"authorId": "143852095", "name": "P. Ward"}, {"authorId": "15712299", "name": + "Vivian P. Ta"}, {"authorId": "2417653", "name": "Ryan V. Ringer"}, {"authorId": + "143905716", "name": "David W. Eccles"}]}, {"paperId": "a3ab3d15e07cbb3437f8467e7907964dd925d398", + "externalIds": {"DBLP": "journals/corr/abs-2110-13817", "CorpusId": 239885611}, + "corpusId": 239885611, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a3ab3d15e07cbb3437f8467e7907964dd925d398", "title": "Real time Simulation of Gird-connected Photovoltaic Multilevel Inverter using Hybrid GA/PSO Optimization Algorithm", "abstract": "This paper presents a new real-time intelligent optimization algorithm to minimize the voltage @@ -11840,14 +13632,15 @@ interactions: The validity of the proposed algorithm is proven by real-time simulation of seven and an eleven-level inverter.", "venue": "ArXiv", "year": 2021, "referenceCount": 29, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"volume": "abs/2110.13817", "name": "ArXiv"}, "authors": [{"authorId": "145522709", - "name": "H. Zolfaghari"}, {"authorId": "2712945", "name": "H. Momeni"}, {"authorId": - "2064630195", "name": "H. Karimi"}]}, {"paperId": "ece0e4209ca84ecb10216f58074d5d64c7ca7e0b", - "externalIds": {"DOI": "10.46294/ulplr-rdulp.v15i1.7940", "CorpusId": 240325033}, - "url": "https://www.semanticscholar.org/paper/ece0e4209ca84ecb10216f58074d5d64c7ca7e0b", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"volume": "abs/2110.13817", "name": "ArXiv"}, "authors": + [{"authorId": "145522709", "name": "H. Zolfaghari"}, {"authorId": "2712945", + "name": "H. Momeni"}, {"authorId": "2064630195", "name": "H. Karimi"}]}, {"paperId": + "ece0e4209ca84ecb10216f58074d5d64c7ca7e0b", "externalIds": {"DOI": "10.46294/ulplr-rdulp.v15i1.7940", + "CorpusId": 240325033}, "corpusId": 240325033, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ece0e4209ca84ecb10216f58074d5d64c7ca7e0b", "title": "A Intelig\u00eancia Artificial nos Contratos: Uma Hip\u00f3tese Poss\u00edvel?", "abstract": "O texto visa analisar se, dada a realidade brasileira, seria poss\u00edvel inserir nos contratos privados sistemas de Intelig\u00eancia @@ -11871,22 +13664,28 @@ interactions: os contratos. Nesse caso, por exemplo, a IA poderia ser de grande aux\u00edlio \u00e0s partes.", "venue": "ULP Law Review", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-10-25", "journal": {"name": "ULP Law Review"}, "authors": [{"authorId": - "2136744748", "name": "Dem\u00e9trio Beck da Silva Giannakos"}, {"authorId": - "40280532", "name": "Wilson Engelmann"}]}, {"paperId": "d672e146bc59286821509291375ab6f20fcb5e59", - "externalIds": {"DOI": "10.1007/s13347-021-00475-2", "CorpusId": 239852746}, - "url": "https://www.semanticscholar.org/paper/d672e146bc59286821509291375ab6f20fcb5e59", + "openAccessPdf": {"url": "https://revistas.ulusofona.pt/index.php/rfdulp/article/download/7940/4707", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2021-10-25", "journal": {"name": "ULP Law Review"}, + "authors": [{"authorId": "2136744748", "name": "Dem\u00e9trio Beck da Silva + Giannakos"}, {"authorId": "40280532", "name": "Wilson Engelmann"}]}, {"paperId": + "d672e146bc59286821509291375ab6f20fcb5e59", "externalIds": {"DOI": "10.1007/s13347-021-00475-2", + "CorpusId": 239852746}, "corpusId": 239852746, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d672e146bc59286821509291375ab6f20fcb5e59", "title": "Aliens in the Space of Reasons? On the Interaction Between Humans and Artificial Intelligent Agents", "abstract": null, "venue": "Philosophy & Technology", "year": 2021, "referenceCount": 21, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-10-23", "journal": {"name": "Philosophy & Technology"}, "authors": [{"authorId": - "1770514730", "name": "B. Heinrichs"}, {"authorId": "2135530568", "name": - "Sebastian Knell"}]}, {"paperId": "914ba3fb0f5ffdd27731fdfd7e809583fe23da8a", - "externalIds": {"DOI": "10.1080/00224065.2021.1987806", "CorpusId": 240357313}, - "url": "https://www.semanticscholar.org/paper/914ba3fb0f5ffdd27731fdfd7e809583fe23da8a", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13347-021-00475-2.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-23", + "journal": {"name": "Philosophy & Technology"}, "authors": [{"authorId": "1770514730", + "name": "B. Heinrichs"}, {"authorId": "2135530568", "name": "Sebastian Knell"}]}, + {"paperId": "914ba3fb0f5ffdd27731fdfd7e809583fe23da8a", "externalIds": {"DOI": + "10.1080/00224065.2021.1987806", "CorpusId": 240357313}, "corpusId": 240357313, + "publicationVenue": {"id": "fdb88bf7-5e2d-4abe-a1ba-6982c3b97ab9", "name": + "Journal of QualityTechnology", "type": "journal", "alternate_names": ["Journal + of Quality Technology", "J Qual", "J Qual Technol"], "issn": "0022-4065", + "url": "http://www.asq.org/pub/jqt/"}, "url": "https://www.semanticscholar.org/paper/914ba3fb0f5ffdd27731fdfd7e809583fe23da8a", "title": "Artificial intelligence and statistics for quality technology: an introduction to the special issue", "abstract": "Abstract In many applied and industrial settings, the use of Artificial Intelligence (AI) for quality @@ -11899,19 +13698,25 @@ interactions: to stimulate creative attention to novel solutions and new directions for future research.", "venue": "Journal of QualityTechnology", "year": 2021, "referenceCount": 101, "citationCount": 2, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2021-10-20", "journal": {"volume": "53", "pages": "443 - - 453", "name": "Journal of Quality Technology"}, "authors": [{"authorId": - "1933862", "name": "B. Colosimo"}, {"authorId": "1471923703", "name": "Enrique - del Castillo"}, {"authorId": "1401781163", "name": "L. A. Jones-Farmer"}, - {"authorId": "1905257", "name": "K. Paynabar"}]}, {"paperId": "5115a963df09dd06744f8ac9abf06059942601e2", - "externalIds": {"PubMedCentral": "9537212", "DOI": "10.1007/s00247-021-05177-7", - "CorpusId": 239021933, "PubMed": "34664088"}, "url": "https://www.semanticscholar.org/paper/5115a963df09dd06744f8ac9abf06059942601e2", + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/00224065.2021.1987806?needAccess=true", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-10-20", "journal": {"volume": "53", "pages": "443 - 453", "name": "Journal + of Quality Technology"}, "authors": [{"authorId": "1933862", "name": "B. Colosimo"}, + {"authorId": "1471923703", "name": "Enrique del Castillo"}, {"authorId": "1401781163", + "name": "L. A. Jones-Farmer"}, {"authorId": "1905257", "name": "K. Paynabar"}]}, + {"paperId": "5115a963df09dd06744f8ac9abf06059942601e2", "externalIds": {"PubMedCentral": + "9537212", "DOI": "10.1007/s00247-021-05177-7", "CorpusId": 239021933, "PubMed": + "34664088"}, "corpusId": 239021933, "publicationVenue": {"id": "a4703d12-de7e-415b-916c-a73b1a572284", + "name": "Pediatric Radiology", "type": "journal", "alternate_names": ["Pediatr + Radiol"], "issn": "0301-0449", "url": "https://www.springer.com/medicine/radiology/journal/247", + "alternate_urls": ["http://www.springer.com/medicine/radiology/journal/247", + "https://link.springer.com/journal/247"]}, "url": "https://www.semanticscholar.org/paper/5115a963df09dd06744f8ac9abf06059942601e2", "title": "The augmented radiologist: artificial intelligence in the practice of radiology", "abstract": null, "venue": "Pediatric Radiology", "year": 2021, - "referenceCount": 99, "citationCount": 12, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "referenceCount": 99, "citationCount": 13, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00247-021-05177-7.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-10-19", "journal": {"volume": "52", "pages": "2074 - 2086", "name": @@ -11923,7 +13728,7 @@ interactions: "name": "Jana Lacekova"}, {"authorId": "1749801", "name": "Andreas Holzinger"}]}, {"paperId": "3d7f58ff3ddb47aa31f9751a2afa2509484653d0", "externalIds": {"DBLP": "conf/svr/RochaBNNV21", "DOI": "10.1145/3488162.3488214", "CorpusId": 245635379}, - "url": "https://www.semanticscholar.org/paper/3d7f58ff3ddb47aa31f9751a2afa2509484653d0", + "corpusId": 245635379, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d7f58ff3ddb47aa31f9751a2afa2509484653d0", "title": "Autonomous Foraging of Virtual Characters with a Constructivist Cognitive Architecture", "abstract": "Immersive experiences in virtual reality simulations require natural-looking virtual characters. Autonomy researchers @@ -11936,16 +13741,18 @@ interactions: their learned schemas. The results show that our agents were able to develop autonomously into performing plausible behaviors, despite the changing environment.", "venue": "SVR", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book"], "publicationDate": "2021-10-18", "journal": {"name": "Symposium on - Virtual and Augmented Reality"}, "authors": [{"authorId": "2148274207", "name": - "Victor Rocha"}, {"authorId": "2148481742", "name": "Louise Brandao"}, {"authorId": - "2889936", "name": "Y. L. Nogueira"}, {"authorId": "1870162", "name": "J. - B. C. Neto"}, {"authorId": "1872209", "name": "C. Vidal"}]}, {"paperId": "795efaa76d48cbd2ed9be71ef90c645a74d0f044", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", + "journal": {"name": "Symposium on Virtual and Augmented Reality"}, "authors": + [{"authorId": "2148274207", "name": "Victor Rocha"}, {"authorId": "2148481742", + "name": "Louise Brandao"}, {"authorId": "2889936", "name": "Y. L. Nogueira"}, + {"authorId": "1870162", "name": "J. B. C. Neto"}, {"authorId": "1872209", + "name": "C. Vidal"}]}, {"paperId": "795efaa76d48cbd2ed9be71ef90c645a74d0f044", "externalIds": {"DBLP": "conf/icmi/BodurNK0F21", "DOI": "10.1145/3461615.3485399", - "CorpusId": 245265576}, "url": "https://www.semanticscholar.org/paper/795efaa76d48cbd2ed9be71ef90c645a74d0f044", + "CorpusId": 245265576}, "corpusId": 245265576, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/795efaa76d48cbd2ed9be71ef90c645a74d0f044", "title": "ChiCo: A Multimodal Corpus for the Study of Child Conversation", "abstract": "The study of how children develop their conversational skills is an important scientific frontier at the crossroad of social, cognitive, @@ -11966,7 +13773,8 @@ interactions: capitalize on this rich behavioral data to study how both verbal and non-verbal cues contribute to the development of conversational coordination.", "venue": "ICMI Companion", "year": 2021, "referenceCount": 31, "citationCount": 2, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://psyarxiv.com/uzfes/download", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", "journal": {"name": @@ -11976,7 +13784,8 @@ interactions: "name": "Fatima Kassim"}, {"authorId": "2670202", "name": "Laurent Pr\u00e9vot"}, {"authorId": "2676559", "name": "Abdellah Fourtassi"}]}, {"paperId": "a0c4294fdea9daa451a7de47dfa7c3bb5e0d652d", "externalIds": {"DBLP": "conf/icmi/ParkPOLLLZ21", "ArXiv": "2201.04990", "DOI": - "10.1145/3462244.3479932", "CorpusId": 238992582}, "url": "https://www.semanticscholar.org/paper/a0c4294fdea9daa451a7de47dfa7c3bb5e0d652d", + "10.1145/3462244.3479932", "CorpusId": 238992582}, "corpusId": 238992582, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0c4294fdea9daa451a7de47dfa7c3bb5e0d652d", "title": "Toddler-Guidance Learning: Impacts of Critical Period on Multimodal AI Agents", "abstract": "Critical periods are phases during which a toddler\u2019s brain develops in spurts. To promote children\u2019s cognitive development, @@ -12000,7 +13809,8 @@ interactions: validate these results with transfer learning on the EAVE dataset and find the performance advancement on the same critical period and the guidance.", "venue": "ICMI", "year": 2021, "referenceCount": 56, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2201.04990", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2021-10-18", "journal": {"name": "Proceedings of the 2021 @@ -12010,8 +13820,8 @@ interactions: "name": "Ganghun Lee"}, {"authorId": "2152165744", "name": "M. Lee"}, {"authorId": "2145418994", "name": "Youngki Lee"}, {"authorId": "1692756", "name": "Byoung-Tak Zhang"}]}, {"paperId": "8d8bd41728a1cecd97b73e6454ff96887c8932ce", "externalIds": - {"DOI": "10.33965/icwi_ac2021_202109r030", "CorpusId": 250238158}, "url": - "https://www.semanticscholar.org/paper/8d8bd41728a1cecd97b73e6454ff96887c8932ce", + {"DOI": "10.33965/icwi_ac2021_202109r030", "CorpusId": 250238158}, "corpusId": + 250238158, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8d8bd41728a1cecd97b73e6454ff96887c8932ce", "title": "GENOMIC DATA ANALYSIS: CONCEPTUAL FRAMEWORK FOR THE APPLICATION OF ARTIFICIAL INTELLIGENCE IN PERSONALIZED TREATMENT OF ONCOLOGY PATIENTS", "abstract": "Oncology is one of the most dynamic branches of medicine. As @@ -12037,14 +13847,15 @@ interactions: about the importance of AI in medicine as soon as possible.", "venue": "Proceedings of the International Conferences on WWW/Internet 2021 and Applied Computing 2021", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Conference", - "Review"], "publicationDate": "2021-10-13", "journal": {"name": "Proceedings - of the International Conferences on WWW/Internet 2021 and Applied Computing - 2021"}, "authors": [{"authorId": "2005931502", "name": "R. Kelemeni\u0107-Dra\u017ein"}, - {"authorId": "1940477", "name": "L. Luic"}]}, {"paperId": "0cbb3c1a695b2b1ab724565d3656c454049d06b6", - "externalIds": {"DOI": "10.3390/min11101118", "CorpusId": 242591161}, "url": - "https://www.semanticscholar.org/paper/0cbb3c1a695b2b1ab724565d3656c454049d06b6", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.iadisportal.org/components/com_booklibrary/ebooks/202109R030.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], + "publicationDate": "2021-10-13", "journal": {"name": "Proceedings of the International + Conferences on WWW/Internet 2021 and Applied Computing 2021"}, "authors": + [{"authorId": "2005931502", "name": "R. Kelemeni\u0107-Dra\u017ein"}, {"authorId": + "1940477", "name": "L. Luic"}]}, {"paperId": "0cbb3c1a695b2b1ab724565d3656c454049d06b6", + "externalIds": {"DOI": "10.3390/min11101118", "CorpusId": 242591161}, "corpusId": + 242591161, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0cbb3c1a695b2b1ab724565d3656c454049d06b6", "title": "AI4R2R (AI for Rock to Revenue): A Review of the Applications of AI in Mineral Processing", "abstract": "In the last few years, jargon, such as machine learning (ML) and artificial intelligence (AI), have been ubiquitous @@ -12071,12 +13882,14 @@ interactions: drive rapid and agile investigation of the potential of applying ML and AI in different mineral processing industries.", "venue": "Minerals", "year": 2021, "referenceCount": 170, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2021-10-12", "journal": {"name": "Minerals"}, "authors": - [{"authorId": "1823937061", "name": "A. Mishra"}]}, {"paperId": "31cc7b4a2f44c59cc36173522bf0f20e177a76a0", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2075-163X/11/10/1118/pdf?version=1634711235", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-10-12", "journal": {"name": "Minerals"}, "authors": [{"authorId": "1823937061", + "name": "A. Mishra"}]}, {"paperId": "31cc7b4a2f44c59cc36173522bf0f20e177a76a0", "externalIds": {"ArXiv": "2110.04942", "DBLP": "journals/corr/abs-2110-04942", - "CorpusId": 238583533}, "url": "https://www.semanticscholar.org/paper/31cc7b4a2f44c59cc36173522bf0f20e177a76a0", + "CorpusId": 238583533}, "corpusId": 238583533, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/31cc7b4a2f44c59cc36173522bf0f20e177a76a0", "title": "Application of Neural Network in Optimization of Chemical Process", "abstract": "Artificial neural network (ANN) has been widely used due to its strong nonlinear mapping ability, fault tolerance and self-learning ability. @@ -12086,15 +13899,16 @@ interactions: in chemical process optimization, especially the results achieved in multi-objective control optimization and process parameter improvement.", "venue": "ArXiv", "year": 2021, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-10-11", "journal": {"volume": "abs/2110.04942", "name": - "ArXiv"}, "authors": [{"authorId": "2142046258", "name": "Fei Liang"}, {"authorId": - "2146343555", "name": "Taowen Zhang"}]}, {"paperId": "cc44efb947138e36ffff244947822bb5f86dabb4", - "externalIds": {"DBLP": "journals/corr/abs-2110-04203", "ArXiv": "2110.04203", - "CorpusId": 238531521}, "url": "https://www.semanticscholar.org/paper/cc44efb947138e36ffff244947822bb5f86dabb4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-10-11", "journal": {"volume": + "abs/2110.04942", "name": "ArXiv"}, "authors": [{"authorId": "2142046258", + "name": "Fei Liang"}, {"authorId": "2146343555", "name": "Taowen Zhang"}]}, + {"paperId": "cc44efb947138e36ffff244947822bb5f86dabb4", "externalIds": {"DBLP": + "journals/corr/abs-2110-04203", "ArXiv": "2110.04203", "CorpusId": 238531521}, + "corpusId": 238531521, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc44efb947138e36ffff244947822bb5f86dabb4", "title": "Toward a Human-Level Video Understanding Intelligence", "abstract": "We aim to develop an AI agent that can watch video clips and have a conversation with human about the video story. Devel-oping video understanding intelligence @@ -12106,18 +13920,22 @@ interactions: Video Tur- ing Test and present a case study to con\ufb01rm the effectiveness and usefulness of the proposed test.", "venue": "ArXiv", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-10-08", "journal": {"volume": "abs/2110.04203", "name": "ArXiv"}, "authors": - [{"authorId": "15353659", "name": "Y. Heo"}, {"authorId": "2108732644", "name": - "Min Whoo Lee"}, {"authorId": "117172343", "name": "Seongho Choi"}, {"authorId": - "2115124026", "name": "Woo Suk Choi"}, {"authorId": "2154329247", "name": - "Minjung Shin"}, {"authorId": "2187944448", "name": "Minjoon Jung"}, {"authorId": - "89496405", "name": "Jeh-Kwang Ryu"}, {"authorId": "1692756", "name": "Byoung-Tak - Zhang"}]}, {"paperId": "e2e4702549f6930c638f534c06ff5cd7a62eee90", "externalIds": - {"PubMedCentral": "9495400", "DOI": "10.1017/ash.2021.192", "CorpusId": 243736362, - "PubMed": "36168500"}, "url": "https://www.semanticscholar.org/paper/e2e4702549f6930c638f534c06ff5cd7a62eee90", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-10-08", "journal": {"volume": "abs/2110.04203", "name": + "ArXiv"}, "authors": [{"authorId": "15353659", "name": "Y. Heo"}, {"authorId": + "2108732644", "name": "Min Whoo Lee"}, {"authorId": "117172343", "name": "Seongho + Choi"}, {"authorId": "2115124026", "name": "Woo Suk Choi"}, {"authorId": "2154329247", + "name": "Minjung Shin"}, {"authorId": "2187944448", "name": "Minjoon Jung"}, + {"authorId": "89496405", "name": "Jeh-Kwang Ryu"}, {"authorId": "1692756", + "name": "Byoung-Tak Zhang"}]}, {"paperId": "e2e4702549f6930c638f534c06ff5cd7a62eee90", + "externalIds": {"PubMedCentral": "9495400", "DOI": "10.1017/ash.2021.192", + "CorpusId": 243736362, "PubMed": "36168500"}, "corpusId": 243736362, "publicationVenue": + {"id": "4eb7e2f6-1d71-4ce7-844a-05333702a297", "name": "Antimicrobial Stewardship + and Healthcare Epidemiology", "alternate_names": ["Antimicrob Steward Healthc + Epidemiology"], "issn": "2732-494X", "url": "https://www.cambridge.org/core/journals/antimicrobial-stewardship-and-healthcare-epidemiology"}, + "url": "https://www.semanticscholar.org/paper/e2e4702549f6930c638f534c06ff5cd7a62eee90", "title": "Machine learning and artificial intelligence: applications in healthcare epidemiology", "abstract": "Abstract Artificial intelligence (AI) refers to the performance of tasks by machines ordinarily associated with human intelligence. @@ -12135,9 +13953,10 @@ interactions: provides opportunities for ML to increase patient safety, improve the efficiency of clinical management, and reduce healthcare costs.", "venue": "Antimicrobial Stewardship and Healthcare Epidemiology", "year": 2021, "referenceCount": - 56, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + 56, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/60FFBF2D360CF70446AC5B4A972B299A/S2732494X21001923a.pdf/div-class-title-machine-learning-and-artificial-intelligence-applications-in-healthcare-epidemiology-div.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-10-07", "journal": {"volume": "1", "name": "Antimicrobial Stewardship & Healthcare Epidemiology @@ -12147,18 +13966,26 @@ interactions: {"authorId": "2187134", "name": "S. Levin"}, {"authorId": "2052336462", "name": "G. Lin"}, {"authorId": "2055350", "name": "E. Klein"}]}, {"paperId": "023b4617cfdbcca17c1eb2d938ce8a2106e3ff3d", "externalIds": {"DOI": "10.1186/s41018-021-00096-6", "CorpusId": 238418116}, + "corpusId": 238418116, "publicationVenue": {"id": "3e81e683-06a3-47b2-8849-f098724b4fe6", + "name": "Journal of International Humanitarian Action", "type": "journal", + "alternate_names": ["J Int Humanit Action"], "issn": "2364-3412", "url": "http://www.springer.com/law/international/journal/41018", + "alternate_urls": ["https://jhumanitarianaction.springeropen.com", "https://jhumanitarianaction.springeropen.com/"]}, "url": "https://www.semanticscholar.org/paper/023b4617cfdbcca17c1eb2d938ce8a2106e3ff3d", "title": "Explicability of humanitarian AI: a matter of principles", "abstract": null, "venue": "Journal of International Humanitarian Action", "year": 2021, "referenceCount": 128, "citationCount": 3, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2021-10-06", "journal": {"volume": "6", "pages": "1-22", - "name": "Journal of International Humanitarian Action"}, "authors": [{"authorId": - "152428690", "name": "G. Coppi"}, {"authorId": "2047433655", "name": "R. Moreno - Jimenez"}, {"authorId": "2131057991", "name": "Sofia Kyriazi"}]}, {"paperId": - "d8144d55c03845fd4d928716c1ccb50d777a6a92", "externalIds": {"DOI": "10.37762/jgmds.8-4.263", - "CorpusId": 241775673}, "url": "https://www.semanticscholar.org/paper/d8144d55c03845fd4d928716c1ccb50d777a6a92", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2021-10-06", "journal": {"volume": "6", "pages": + "1-22", "name": "Journal of International Humanitarian Action"}, "authors": + [{"authorId": "152428690", "name": "G. Coppi"}, {"authorId": "2047433655", + "name": "R. Moreno Jimenez"}, {"authorId": "2131057991", "name": "Sofia Kyriazi"}]}, + {"paperId": "d8144d55c03845fd4d928716c1ccb50d777a6a92", "externalIds": {"DOI": + "10.37762/jgmds.8-4.263", "CorpusId": 241775673}, "corpusId": 241775673, "publicationVenue": + {"id": "90e2a53e-55f4-41ce-baff-bfe4f27d040d", "name": "Journal of Gandhara + Medical and Dental Science", "type": "journal", "alternate_names": ["J Gandhara + Med Dent Sci"], "issn": "2312-9433", "url": "http://www.jgmds.org.pk/index.php/JGMDS"}, + "url": "https://www.semanticscholar.org/paper/d8144d55c03845fd4d928716c1ccb50d777a6a92", "title": "Is Artificial Intelligence Transforming Dentistry Today?", "abstract": "Since the birth of science, the most fascinating structure of the human body is the human brain.\u00a0 Over the past centuries\u2019 researchers have been @@ -12204,24 +14031,32 @@ interactions: needs to be introduced to clinical AI solutions by promoting digital literacy in the future dental liveware.", "venue": "Journal of Gandhara Medical and Dental Science", "year": 2021, "referenceCount": 9, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-10-05", "journal": {"name": "Journal of Gandhara Medical and Dental - Science"}, "authors": [{"authorId": "2041843276", "name": "Saman Tauqir"}]}, - {"paperId": "2245b9445f48225620fba1c22d7484237efaccc9", "externalIds": {"DBLP": - "journals/ais/TobarG22", "MAG": "3202193864", "DOI": "10.1007/s00146-021-01264-3", - "CorpusId": 244219727}, "url": "https://www.semanticscholar.org/paper/2245b9445f48225620fba1c22d7484237efaccc9", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://jgmds.org.pk/index.php/JGMDS/article/download/263/153", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-05", + "journal": {"name": "Journal of Gandhara Medical and Dental Science"}, "authors": + [{"authorId": "2041843276", "name": "Saman Tauqir"}]}, {"paperId": "2245b9445f48225620fba1c22d7484237efaccc9", + "externalIds": {"DBLP": "journals/ais/TobarG22", "MAG": "3202193864", "DOI": + "10.1007/s00146-021-01264-3", "CorpusId": 244219727}, "corpusId": 244219727, + "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": + "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": + "https://www.semanticscholar.org/paper/2245b9445f48225620fba1c22d7484237efaccc9", "title": "On machine learning and the replacement of human labour: anti-Cartesianism versus Babbage\u2019s path", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 52, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-10-04", "journal": {"volume": "37", "pages": "1459 - - 1471", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2841497", "name": - "Felipe A. Tobar"}, {"authorId": "2109141128", "name": "R. Gonz\u00e1lez"}]}, - {"paperId": "1e228d7c0bdea96380edf886fbefe49d8439910c", "externalIds": {"MAG": - "3205636459", "DOI": "10.3390/app11199208", "CorpusId": 244611554}, "url": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-04", "journal": + {"volume": "37", "pages": "1459 - 1471", "name": "AI & SOCIETY"}, "authors": + [{"authorId": "2841497", "name": "Felipe A. Tobar"}, {"authorId": "2109141128", + "name": "R. Gonz\u00e1lez"}]}, {"paperId": "1e228d7c0bdea96380edf886fbefe49d8439910c", + "externalIds": {"MAG": "3205636459", "DOI": "10.3390/app11199208", "CorpusId": + 244611554}, "corpusId": 244611554, "publicationVenue": {"id": "136edf8d-0f88-4c2c-830f-461c6a9b842e", + "name": "Applied Sciences", "type": "journal", "alternate_names": ["Appl Sci"], + "issn": "2076-3417", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217814", + "alternate_urls": ["http://www.mathem.pub.ro/apps/", "https://www.mdpi.com/journal/applsci", + "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217814"]}, "url": "https://www.semanticscholar.org/paper/1e228d7c0bdea96380edf886fbefe49d8439910c", "title": "A Multifeatured Data-Driven Homogenization for Heterogeneous Elastic Solids", "abstract": "A computational homogenization of heterogeneous solids @@ -12244,13 +14079,15 @@ interactions: sources, including the geometrical descriptors, are considered to establish a computational data-driven homogenization scheme.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 38, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2076-3417/11/19/9208/pdf?version=1633932621", + "status": null}, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-10-03", "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "153338664", "name": "E. Haghighi"}, {"authorId": "98495515", "name": "S. Na"}]}, {"paperId": "d8d80e90bd8191c6ca11f5084996fd4746d49b02", "externalIds": {"DOI": "10.1080/03080188.2020.1868684", - "CorpusId": 238638292}, "url": "https://www.semanticscholar.org/paper/d8d80e90bd8191c6ca11f5084996fd4746d49b02", + "CorpusId": 238638292}, "corpusId": 238638292, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d8d80e90bd8191c6ca11f5084996fd4746d49b02", "title": "Artificial agency and the game of semantic extension", "abstract": "ABSTRACT Artificial agents are commonly described by using words that traditionally belong to the semantic field of life. I call this phenomenon the game of semantic @@ -12266,23 +14103,29 @@ interactions: agency, reviewing the related opportunities and risks, and advancing some practical suggestions on how to play the game well.", "venue": "Interdisciplinary Science Reviews", "year": 2021, "referenceCount": 52, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-10-02", "journal": - {"volume": "46", "pages": "440 - 457", "name": "Interdisciplinary Science - Reviews"}, "authors": [{"authorId": "50846975", "name": "Fabio Fossa"}]}, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-10-02", "journal": {"volume": "46", "pages": "440 - 457", "name": "Interdisciplinary + Science Reviews"}, "authors": [{"authorId": "50846975", "name": "Fabio Fossa"}]}, {"paperId": "d01cb741ba9c9c179f7d33ed48ecc3c80393f205", "externalIds": {"MAG": "3206498514", "DOI": "10.1134/s1995080221100127", "CorpusId": 244634561}, - "url": "https://www.semanticscholar.org/paper/d01cb741ba9c9c179f7d33ed48ecc3c80393f205", + "corpusId": 244634561, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d01cb741ba9c9c179f7d33ed48ecc3c80393f205", "title": "Is Genome Written in Haskell?", "abstract": null, "venue": "Lobachevskii Journal of Mathematics", "year": 2021, "referenceCount": 11, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}], "publicationTypes": null, "publicationDate": "2021-10-01", "journal": - {"name": "Lobachevskii Journal of Mathematics"}, "authors": [{"authorId": + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}], "publicationTypes": null, "publicationDate": "2021-10-01", + "journal": {"name": "Lobachevskii Journal of Mathematics"}, "authors": [{"authorId": "144039873", "name": "S. Kozyrev"}]}, {"paperId": "6a582cba7522aa7e92c5871f9c7cd74796405c0e", "externalIds": {"PubMedCentral": "8512550", "DBLP": "journals/sensors/ChkrounA21", "DOI": "10.3390/s21196641", "CorpusId": 238747247, "PubMed": "34640960"}, + "corpusId": 238747247, "publicationVenue": {"id": "3dbf084c-ef47-4b74-9919-047b40704538", + "name": "Italian National Conference on Sensors", "type": "conference", "alternate_names": + ["SENSORS", "IEEE Sens", "Ital National Conf Sens", "IEEE Sensors", "Sensors"], + "issn": "1424-8220", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-142001", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-142001", + "http://www.mdpi.com/journal/sensors", "https://www.mdpi.com/journal/sensors"]}, "url": "https://www.semanticscholar.org/paper/6a582cba7522aa7e92c5871f9c7cd74796405c0e", "title": "A Safe Collaborative Chatbot for Smart Home Assistants", "abstract": "Smart home assistants, which enable users to control home appliances and @@ -12300,15 +14143,16 @@ interactions: users. We ran an experiment with 192 subjects and show the effectiveness of our platform.", "venue": "Italian National Conference on Sensors", "year": 2021, "referenceCount": 34, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-10-01", "journal": {"volume": "21", "name": "Sensors (Basel, Switzerland)"}, - "authors": [{"authorId": "40898073", "name": "Merav Chkroun"}, {"authorId": - "1746466", "name": "Amos Azaria"}]}, {"paperId": "864d8a27da1ef69729d19b9297bce87e82eb9abd", - "externalIds": {"DOI": "10.1177/14690667211050599", "CorpusId": 238421624, - "PubMed": "34617472"}, "url": "https://www.semanticscholar.org/paper/864d8a27da1ef69729d19b9297bce87e82eb9abd", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1424-8220/21/19/6641/pdf?version=1633915683", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-01", "journal": + {"volume": "21", "name": "Sensors (Basel, Switzerland)"}, "authors": [{"authorId": + "40898073", "name": "Merav Chkroun"}, {"authorId": "1746466", "name": "Amos + Azaria"}]}, {"paperId": "864d8a27da1ef69729d19b9297bce87e82eb9abd", "externalIds": + {"DOI": "10.1177/14690667211050599", "CorpusId": 238421624, "PubMed": "34617472"}, + "corpusId": 238421624, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/864d8a27da1ef69729d19b9297bce87e82eb9abd", "title": "Joseph John Thomson investigates the paranormal", "abstract": "Joseph John Thomson is best known for detecting two isotopes of neon within cathode ray tubes that lay the foundation of the field of mass spectrometry. He was @@ -12323,27 +14167,33 @@ interactions: It reports and illustrates his beliefs and experiences investigating the paranormal in his own words.", "venue": "European journal of mass spectrometry", "year": 2021, "referenceCount": 38, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-10-01", "journal": {"volume": "27", "pages": "151 - 157", "name": "European - Journal of Mass Spectrometry"}, "authors": [{"authorId": "1844929", "name": - "K. Downard"}]}, {"paperId": "3a1501829ce7205f25939dd26e1089df920c9988", "externalIds": - {"DBLP": "journals/ai/SilverSPS21", "MAG": "3164005523", "DOI": "10.1016/J.ARTINT.2021.103535", - "CorpusId": 236236944}, "url": "https://www.semanticscholar.org/paper/3a1501829ce7205f25939dd26e1089df920c9988", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-10-01", "journal": {"volume": "27", "pages": "151 + - 157", "name": "European Journal of Mass Spectrometry"}, "authors": [{"authorId": + "1844929", "name": "K. Downard"}]}, {"paperId": "3a1501829ce7205f25939dd26e1089df920c9988", + "externalIds": {"DBLP": "journals/ai/SilverSPS21", "MAG": "3164005523", "DOI": + "10.1016/J.ARTINT.2021.103535", "CorpusId": 236236944}, "corpusId": 236236944, + "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", "name": + "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif Intell"], + "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", "2710-1681"], + "url": "http://www.elsevier.com/locate/artint", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00043702", + "https://www.journals.elsevier.com/artificial-intelligence"]}, "url": "https://www.semanticscholar.org/paper/3a1501829ce7205f25939dd26e1089df920c9988", "title": "Reward is enough", "abstract": null, "venue": "Artificial Intelligence", - "year": 2021, "referenceCount": 67, "citationCount": 152, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-10-01", "journal": - {"volume": "299", "pages": "103535", "name": "Artif. Intell."}, "authors": - [{"authorId": "145824029", "name": "David Silver"}, {"authorId": "2108384183", - "name": "Satinder Singh"}, {"authorId": "144368601", "name": "Doina Precup"}, - {"authorId": "1699645", "name": "R. Sutton"}]}, {"paperId": "ddce6ef8f791137fc27dcfda2de0f58b3be15db2", - "externalIds": {"DOI": "10.1088/2515-7639/ac2791", "CorpusId": 238225233}, - "url": "https://www.semanticscholar.org/paper/ddce6ef8f791137fc27dcfda2de0f58b3be15db2", + "year": 2021, "referenceCount": 67, "citationCount": 156, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-10-01", "journal": {"volume": "299", "pages": "103535", "name": "Artif. + Intell."}, "authors": [{"authorId": "145824029", "name": "David Silver"}, + {"authorId": "2108384183", "name": "Satinder Singh"}, {"authorId": "144368601", + "name": "Doina Precup"}, {"authorId": "1699645", "name": "R. Sutton"}]}, {"paperId": + "ddce6ef8f791137fc27dcfda2de0f58b3be15db2", "externalIds": {"DOI": "10.1088/2515-7639/ac2791", + "CorpusId": 238225233}, "corpusId": 238225233, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ddce6ef8f791137fc27dcfda2de0f58b3be15db2", "title": "Applications of artificial intelligence and machine learning in metal additive manufacturing", "abstract": "Artificial intelligence (AI) and additive manufacturing (AM) are both disruptive new technologies. AI has entered @@ -12359,27 +14209,36 @@ interactions: A vision on the potential direction of AM to fully realize AI\u2019s advantage is provided.", "venue": "Journal of Physics: Materials", "year": 2021, "referenceCount": 121, "citationCount": 3, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-09-29", "journal": {"volume": - "4", "name": "Journal of Physics: Materials"}, "authors": [{"authorId": "2130188923", - "name": "Leila Jannesari Ladani"}]}, {"paperId": "2751eb1b6dab219b62f1ce0188dd505ddcc81966", - "externalIds": {"DOI": "10.11622/smedj.2021119", "CorpusId": 238201856, "PubMed": - "34581468"}, "url": "https://www.semanticscholar.org/paper/2751eb1b6dab219b62f1ce0188dd505ddcc81966", + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-29", + "journal": {"volume": "4", "name": "Journal of Physics: Materials"}, "authors": + [{"authorId": "2130188923", "name": "Leila Jannesari Ladani"}]}, {"paperId": + "2751eb1b6dab219b62f1ce0188dd505ddcc81966", "externalIds": {"DOI": "10.11622/smedj.2021119", + "CorpusId": 238201856, "PubMed": "34581468"}, "corpusId": 238201856, "publicationVenue": + {"id": "9c3f0ad3-f07b-4e64-983a-f4b789b17c86", "name": "Singapore medical + journal", "type": "journal", "alternate_names": ["Singap med j", "Singapore + Medical Journal", "Singap Med J"], "issn": "0037-5675", "url": "https://www.sma.org.sg/smj/smjcurrent.html", + "alternate_urls": ["http://smj.sma.org.sg/smjcurrent.html"]}, "url": "https://www.semanticscholar.org/paper/2751eb1b6dab219b62f1ce0188dd505ddcc81966", "title": "Acute paediatrics tele-support for caregivers in Singapore: an initial experience with a prototype Chatbot: UPAL.", "abstract": null, "venue": "Singapore - medical journal", "year": 2021, "referenceCount": 38, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-09-28", "journal": {"name": "Singapore medical journal"}, - "authors": [{"authorId": "37042259", "name": "S. Ganapathy"}, {"authorId": - "31638014", "name": "Su Ying Serena Chang"}, {"authorId": "1490958248", "name": - "J. Tan"}, {"authorId": "2153535439", "name": "Cynthia Lim"}, {"authorId": - "123898373", "name": "K. Ng"}]}, {"paperId": "7845bfb55f5ce573b87d77bb76d4d38829b37620", - "externalIds": {"ArXiv": "2109.13296", "DBLP": "conf/emnlp/UchenduMLZ021", - "DOI": "10.18653/v1/2021.findings-emnlp.172", "CorpusId": 237589233}, "url": - "https://www.semanticscholar.org/paper/7845bfb55f5ce573b87d77bb76d4d38829b37620", + medical journal", "year": 2021, "referenceCount": 38, "citationCount": 1, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-28", "journal": + {"name": "Singapore medical journal"}, "authors": [{"authorId": "37042259", + "name": "S. Ganapathy"}, {"authorId": "31638014", "name": "Su Ying Serena + Chang"}, {"authorId": "1490958248", "name": "J. Tan"}, {"authorId": "2153535439", + "name": "Cynthia Lim"}, {"authorId": "123898373", "name": "K. Ng"}]}, {"paperId": + "7845bfb55f5ce573b87d77bb76d4d38829b37620", "externalIds": {"ArXiv": "2109.13296", + "DBLP": "conf/emnlp/UchenduMLZ021", "DOI": "10.18653/v1/2021.findings-emnlp.172", + "CorpusId": 237589233}, "corpusId": 237589233, "publicationVenue": {"id": + "41bf9ed3-85b3-4c90-b015-150e31690253", "name": "Conference on Empirical Methods + in Natural Language Processing", "type": "conference", "alternate_names": + ["Empir Method Nat Lang Process", "Empirical Methods in Natural Language Processing", + "Conf Empir Method Nat Lang Process", "EMNLP"], "url": "https://www.aclweb.org/portal/emnlp"}, + "url": "https://www.semanticscholar.org/paper/7845bfb55f5ce573b87d77bb76d4d38829b37620", "title": "TURINGBENCH: A Benchmark Environment for Turing Test in the Age of Neural Text Generation", "abstract": "Recent progress in generative language models has enabled machines to generate astonishingly realistic texts. While @@ -12400,16 +14259,18 @@ interactions: the lowest F1 score by five state-of-the-art TT detection models. The TURINGBENCH is available at: https: //turingbench.ist.psu.edu/", "venue": "Conference on Empirical Methods in Natural Language Processing", "year": 2021, "referenceCount": - 78, "citationCount": 11, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2021-09-27", "journal": {"pages": "2001-2016"}, "authors": [{"authorId": - "150035131", "name": "Adaku Uchendu"}, {"authorId": "2115851910", "name": - "Zeyu Ma"}, {"authorId": "145535348", "name": "Thai Le"}, {"authorId": "144142354", - "name": "Rui Zhang"}, {"authorId": "145948198", "name": "Dongwon Lee"}]}, - {"paperId": "3a7ece239cbe8b7fcb42d2dcd895fe3d715fd3cc", "externalIds": {"DOI": - "10.1109/GUCON50781.2021.9573882", "CorpusId": 241595564}, "url": "https://www.semanticscholar.org/paper/3a7ece239cbe8b7fcb42d2dcd895fe3d715fd3cc", + 78, "citationCount": 12, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://aclanthology.org/2021.findings-emnlp.172.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2021-09-27", "journal": {"pages": "2001-2016"}, + "authors": [{"authorId": "150035131", "name": "Adaku Uchendu"}, {"authorId": + "2115851910", "name": "Zeyu Ma"}, {"authorId": "145535348", "name": "Thai + Le"}, {"authorId": "144142354", "name": "Rui Zhang"}, {"authorId": "145948198", + "name": "Dongwon Lee"}]}, {"paperId": "3a7ece239cbe8b7fcb42d2dcd895fe3d715fd3cc", + "externalIds": {"DOI": "10.1109/GUCON50781.2021.9573882", "CorpusId": 241595564}, + "corpusId": 241595564, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a7ece239cbe8b7fcb42d2dcd895fe3d715fd3cc", "title": "The Psychology of Thinking in Creating AI", "abstract": "The broad-scale emergence of AI in industry calls forth basic questions in terms of the knowledge bases and approaches relevant for its design. Engineering design has been @@ -12430,14 +14291,14 @@ interactions: future AI design.", "venue": "2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON)", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2021-09-24", "journal": {"pages": "1-6", "name": "2021 IEEE 4th International - Conference on Computing, Power and Communication Technologies (GUCON)"}, "authors": - [{"authorId": "2748954", "name": "P. Saariluoma"}, {"authorId": "74461425", - "name": "A. Karvonen"}]}, {"paperId": "6fe5e9b393f3c10bd31e4bb37a12676a7ee37a6b", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2021-09-24", "journal": {"pages": "1-6", "name": "2021 + IEEE 4th International Conference on Computing, Power and Communication Technologies + (GUCON)"}, "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}, {"authorId": + "74461425", "name": "A. Karvonen"}]}, {"paperId": "6fe5e9b393f3c10bd31e4bb37a12676a7ee37a6b", "externalIds": {"MAG": "3204707744", "DOI": "10.15295/bmij.v9i3.1863", "CorpusId": - 244206889}, "url": "https://www.semanticscholar.org/paper/6fe5e9b393f3c10bd31e4bb37a12676a7ee37a6b", + 244206889}, "corpusId": 244206889, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6fe5e9b393f3c10bd31e4bb37a12676a7ee37a6b", "title": "Proaktif insan kaynaklar\u0131 y\u00f6netiminin yeni g\u00fcc\u00fc: \u0130K analiti\u011fi ve yapay zek\u00e2", "abstract": "\u0130K Analiti\u011fi son y\u0131llarda giderek \u00f6nem kazanan konular aras\u0131nda yer almaktad\u0131r. @@ -12473,13 +14334,14 @@ interactions: akademisyenler ile uygulamac\u0131lara yol g\u00f6sterici olacakt\u0131r.", "venue": "Business & Management Studies: An International Journal", "year": 2021, "referenceCount": 57, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.bmij.org/index.php/1/article/download/1863/1592", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-24", "journal": {"name": "Business & Management Studies: An International Journal"}, "authors": [{"authorId": "121500400", "name": "Yasemin Bal"}, {"authorId": "2100654125", "name": "Mert Bal"}]}, {"paperId": "bc9598dc4ed0472d8b59b87ed3a139f8347d40ee", "externalIds": {"DBLP": "journals/corr/abs-2109-12075", "ArXiv": "2109.12075", "CorpusId": 237635337}, - "url": "https://www.semanticscholar.org/paper/bc9598dc4ed0472d8b59b87ed3a139f8347d40ee", + "corpusId": 237635337, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc9598dc4ed0472d8b59b87ed3a139f8347d40ee", "title": "Towards A Measure Of General Machine Intelligence", "abstract": "To build general-purpose arti\ufb01cial intelligence systems that can deal with unknown variables across unknown domains, we need benchmarks that measure @@ -12502,30 +14364,33 @@ interactions: a set of real-world tasks. Finally, we evaluate the suitability of some well-known models as general intelligence systems by calculating their g-index scores.", "venue": "ArXiv", "year": 2021, "referenceCount": 71, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-24", "journal": - {"volume": "abs/2109.12075", "name": "ArXiv"}, "authors": [{"authorId": "2052063253", - "name": "Gautham Venkatasubramanian"}, {"authorId": "2151877389", "name": - "Sibesh Kar"}, {"authorId": "2120287881", "name": "Abhimanyu Singh"}, {"authorId": - "2134908489", "name": "Shubham Mishra"}, {"authorId": "50472950", "name": - "Dushyant Yadav"}, {"authorId": "2128109101", "name": "Shreyansh Chandak"}]}, - {"paperId": "ee62d67b03c300e1d0118b19864fd83a8812b3e0", "externalIds": {"DOI": - "10.37679/trta.962940", "CorpusId": 239120630}, "url": "https://www.semanticscholar.org/paper/ee62d67b03c300e1d0118b19864fd83a8812b3e0", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-09-24", "journal": {"volume": "abs/2109.12075", "name": "ArXiv"}, "authors": + [{"authorId": "2052063253", "name": "Gautham Venkatasubramanian"}, {"authorId": + "2151877389", "name": "Sibesh Kar"}, {"authorId": "2120287881", "name": "Abhimanyu + Singh"}, {"authorId": "2134908489", "name": "Shubham Mishra"}, {"authorId": + "50472950", "name": "Dushyant Yadav"}, {"authorId": "2128109101", "name": + "Shreyansh Chandak"}]}, {"paperId": "ee62d67b03c300e1d0118b19864fd83a8812b3e0", + "externalIds": {"DOI": "10.37679/trta.962940", "CorpusId": 239120630}, "corpusId": + 239120630, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ee62d67b03c300e1d0118b19864fd83a8812b3e0", "title": "Cahit Arf\u2019\u0131n \u201cMakine D\u00fc\u015f\u00fcnebilir mi ve Nas\u0131l D\u00fc\u015f\u00fcnebilir?\u201d Adl\u0131 Makalesi \u00dczerine Bir \u00c7al\u0131\u015fma", "abstract": null, "venue": "TRT Akademi", "year": 2021, "referenceCount": 4, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1861642", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-23", "journal": {"name": "TRT Akademi"}, "authors": [{"authorId": "2075824974", "name": "Filiz Sari"}]}, {"paperId": "42fb503b15588a8be298ab024f522d0010027f39", "externalIds": {"DBLP": "conf/agi/StClairHB21", "ArXiv": "2109.15097", "DOI": "10.1007/978-3-030-93758-4_27", "CorpusId": - 238226881}, "url": "https://www.semanticscholar.org/paper/42fb503b15588a8be298ab024f522d0010027f39", + 238226881}, "corpusId": 238226881, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42fb503b15588a8be298ab024f522d0010027f39", "title": "The Role of Bio-Inspired Modularity in General Learning", "abstract": null, "venue": "AGI", "year": 2021, "referenceCount": 49, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/2109.15097", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-23", "journal": @@ -12533,7 +14398,8 @@ interactions: A. StClair"}, {"authorId": "144181596", "name": "W. Hahn"}, {"authorId": "2297916", "name": "Elan Barenholtz"}]}, {"paperId": "a01671aeac10959b2510001915c7788ea9a0f87a", "externalIds": {"PubMedCentral": "8493292", "DOI": "10.3389/frobt.2021.724798", - "CorpusId": 237587640, "PubMed": "34631805"}, "url": "https://www.semanticscholar.org/paper/a01671aeac10959b2510001915c7788ea9a0f87a", + "CorpusId": 237587640, "PubMed": "34631805"}, "corpusId": 237587640, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a01671aeac10959b2510001915c7788ea9a0f87a", "title": "Augmented Reality Meets Artificial Intelligence in Robotics: A Systematic Review", "abstract": "Recently, advancements in computational machinery have facilitated the integration of artificial intelligence (AI) to almost every @@ -12559,14 +14425,19 @@ interactions: Our findings affirm the promising future for robust integration of AR and AI in numerous robotic applications.", "venue": "Frontiers in Robotics and AI", "year": 2021, "referenceCount": 140, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-09-22", "journal": {"volume": "8", "name": "Frontiers - in Robotics and AI"}, "authors": [{"authorId": "1471727345", "name": "Zahraa - Bassyouni"}, {"authorId": "47170365", "name": "I. Elhajj"}]}, {"paperId": - "31218e862a20c7065f1ba3d5cc00f7466d285979", "externalIds": {"DOI": "10.1146/annurev-psych-021721-110002", - "CorpusId": 237557280, "PubMed": "34535061"}, "url": "https://www.semanticscholar.org/paper/31218e862a20c7065f1ba3d5cc00f7466d285979", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2021.724798/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2021-09-22", "journal": {"volume": "8", "name": "Frontiers in Robotics and + AI"}, "authors": [{"authorId": "1471727345", "name": "Zahraa Bassyouni"}, + {"authorId": "47170365", "name": "I. Elhajj"}]}, {"paperId": "31218e862a20c7065f1ba3d5cc00f7466d285979", + "externalIds": {"DOI": "10.1146/annurev-psych-021721-110002", "CorpusId": + 237557280, "PubMed": "34535061"}, "corpusId": 237557280, "publicationVenue": + {"id": "35ed31a9-a45e-4601-ab4f-49374a1d870f", "name": "Annual Review of Psychology", + "type": "journal", "alternate_names": ["Annu Rev Psychol"], "issn": "0066-4308", + "url": "https://www.annualreviews.org/journal/psych", "alternate_urls": ["http://arjournals.annualreviews.org/loi/psych", + "http://psych.annualreviews.org/"]}, "url": "https://www.semanticscholar.org/paper/31218e862a20c7065f1ba3d5cc00f7466d285979", "title": "Neurophysiology of Remembering.", "abstract": "By linking the past with the future, our memories define our sense of identity. Because human memory engages the conscious realm, its examination has historically been @@ -12586,15 +14457,16 @@ interactions: see http://www.annualreviews.org/page/journal/pubdates for revised estimates.", "venue": "Annual Review of Psychology", "year": 2021, "referenceCount": 142, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-09-17", "journal": {"name": "Annual review of psychology"}, "authors": [{"authorId": "144128278", "name": "G. Buzs\u00e1ki"}, {"authorId": "36419128", "name": "S. McKenzie"}, {"authorId": "1766548", "name": "L. Davachi"}]}, {"paperId": "928b839accb93e902e1d38c3b12b156c7eda5e23", "externalIds": {"MAG": "3200363141", "DOI": "10.20944/preprints202109.0234.v1", - "CorpusId": 240540234}, "url": "https://www.semanticscholar.org/paper/928b839accb93e902e1d38c3b12b156c7eda5e23", + "CorpusId": 240540234}, "corpusId": 240540234, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/928b839accb93e902e1d38c3b12b156c7eda5e23", "title": "How Biological Concepts and Evolutionary Theories Are Inspiring Advances in Machine Intelligence", "abstract": "Since its advent in the mid-twentieth century, the field of artificial intelligence (AI) has been heavily influenced @@ -12610,14 +14482,16 @@ interactions: challenges remain requiring innovative solutions. Thankfully, biology in all its forms still has a lot to teach us, especially when trying to create truly intelligent machines.", "venue": "", "year": 2021, "referenceCount": 104, - "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-09-14", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2137557298", "name": "Abigail R. - Gutai"}, {"authorId": "3180624", "name": "T. Gorochowski"}]}, {"paperId": - "19a4f6479a24d6b992c21f71fe2bb50567bd1e6f", "externalIds": {"DBLP": "journals/corr/abs-2109-06098", - "ArXiv": "2109.06098", "CorpusId": 237491904}, "url": "https://www.semanticscholar.org/paper/19a4f6479a24d6b992c21f71fe2bb50567bd1e6f", + "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.preprints.org/manuscript/202109.0234/v1/download", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-14", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2137557298", + "name": "Abigail R. Gutai"}, {"authorId": "3180624", "name": "T. Gorochowski"}]}, + {"paperId": "19a4f6479a24d6b992c21f71fe2bb50567bd1e6f", "externalIds": {"DBLP": + "journals/corr/abs-2109-06098", "ArXiv": "2109.06098", "CorpusId": 237491904}, + "corpusId": 237491904, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19a4f6479a24d6b992c21f71fe2bb50567bd1e6f", "title": "The mathematics of adversarial attacks in AI - Why deep learning is unstable despite the existence of stable neural networks", "abstract": "The unprecedented success of deep learning (DL) makes it unchallenged when @@ -12642,17 +14516,17 @@ interactions: demonstrate how neural networks can provably exist as approximate minimisers to standard optimisation problems with standard cost functions, however, no randomised algorithm can compute them with probability better than 1/2. CONTENTS", - "venue": "ArXiv", "year": 2021, "referenceCount": 62, "citationCount": 8, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-09-13", "journal": {"volume": - "abs/2109.06098", "name": "ArXiv"}, "authors": [{"authorId": "2849211", "name": - "Alexander Bastounis"}, {"authorId": "145920634", "name": "A. Hansen"}, {"authorId": - "148326473", "name": "Verner Vlacic"}]}, {"paperId": "900b10a441253f2edbcf65446624d68a0d5fa14e", + "venue": "ArXiv", "year": 2021, "referenceCount": 62, "citationCount": 9, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-13", "journal": + {"volume": "abs/2109.06098", "name": "ArXiv"}, "authors": [{"authorId": "2849211", + "name": "Alexander Bastounis"}, {"authorId": "145920634", "name": "A. Hansen"}, + {"authorId": "148326473", "name": "Verner Vlacic"}]}, {"paperId": "900b10a441253f2edbcf65446624d68a0d5fa14e", "externalIds": {"MAG": "3197617696", "DOI": "10.15407/fd2021.03.180", "CorpusId": - 239648033}, "url": "https://www.semanticscholar.org/paper/900b10a441253f2edbcf65446624d68a0d5fa14e", + 239648033}, "corpusId": 239648033, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/900b10a441253f2edbcf65446624d68a0d5fa14e", "title": "Artificial intelligence as an anthropotechnology", "abstract": "Artificial intelligence is a computer system that thinks or acts like humans. Features of AI systems embody implicit beliefs concerning the human nature that AI @@ -12679,32 +14553,41 @@ interactions: rarely take responsibility for the norms embodied in the systems they create.", "venue": "Filosofska dumka (Philosophical Thought)", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-07", - "journal": {"name": "Filosofska dumka (Philosophical Thought)"}, "authors": - [{"authorId": "2135028481", "name": "Mykhailo Bogachov"}]}, {"paperId": "ea7d7c7486896c5399981f1ab5a2c45af2a8b538", - "externalIds": {"MAG": "3198531868", "DOI": "10.1007/S43681-021-00092-X", - "CorpusId": 239681870}, "url": "https://www.semanticscholar.org/paper/ea7d7c7486896c5399981f1ab5a2c45af2a8b538", + "openAccessPdf": {"url": "https://dumka.philosophy.ua/index.php/fd/article/download/554/515", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-09-07", "journal": {"name": "Filosofska dumka (Philosophical Thought)"}, + "authors": [{"authorId": "2135028481", "name": "Mykhailo Bogachov"}]}, {"paperId": + "ea7d7c7486896c5399981f1ab5a2c45af2a8b538", "externalIds": {"MAG": "3198531868", + "DOI": "10.1007/S43681-021-00092-X", "CorpusId": 239681870}, "corpusId": 239681870, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea7d7c7486896c5399981f1ab5a2c45af2a8b538", "title": "Robotomorphy: Becoming our creations", "abstract": null, "venue": "", "year": 2021, "referenceCount": 54, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s43681-021-00092-x.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-09-04", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, {"paperId": "d7456c3f5117847d2a99a4518427c6f2ac0992db", "externalIds": {"DOI": "10.1016/j.radi.2021.07.012", - "CorpusId": 237443449, "PubMed": "34493445"}, "url": "https://www.semanticscholar.org/paper/d7456c3f5117847d2a99a4518427c6f2ac0992db", + "CorpusId": 237443449, "PubMed": "34493445"}, "corpusId": 237443449, "publicationVenue": + {"id": "ac84e5a7-272d-43bc-9dda-10fa34c17fde", "name": "Radiography", "type": + "journal", "issn": "1078-8174", "alternate_issns": ["0033-8281"], "url": "http://www.harcourt-international.com/journals/radi/", + "alternate_urls": ["https://www.radiographyonline.com/", "http://www.sciencedirect.com/science/journal/10788174"]}, + "url": "https://www.semanticscholar.org/paper/d7456c3f5117847d2a99a4518427c6f2ac0992db", "title": "Artificial intelligence in radiation oncology: A review of its current status and potential application for the radiotherapy workforce.", "abstract": null, "venue": "Radiography", "year": 2021, "referenceCount": 74, "citationCount": - 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2021-09-04", "journal": {"name": "Radiography"}, - "authors": [{"authorId": "46574199", "name": "C. Parkinson"}, {"authorId": - "82659765", "name": "C. Matthams"}, {"authorId": "39595875", "name": "K. Foley"}, - {"authorId": "1628685596", "name": "E. Spezi"}]}, {"paperId": "a0d4ea9bc562ad4c19eb84d4a5c7e35e70478151", - "externalIds": {"DOI": "10.47485/2693-2490.1053", "CorpusId": 245582306}, - "url": "https://www.semanticscholar.org/paper/a0d4ea9bc562ad4c19eb84d4a5c7e35e70478151", + 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://orca.cardiff.ac.uk/id/eprint/144759/3/AI%20in%20radiation%20oncology%20V4b%20full.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-09-04", + "journal": {"name": "Radiography"}, "authors": [{"authorId": "46574199", "name": + "C. Parkinson"}, {"authorId": "82659765", "name": "C. Matthams"}, {"authorId": + "39595875", "name": "K. Foley"}, {"authorId": "1628685596", "name": "E. Spezi"}]}, + {"paperId": "a0d4ea9bc562ad4c19eb84d4a5c7e35e70478151", "externalIds": {"DOI": + "10.47485/2693-2490.1053", "CorpusId": 245582306}, "corpusId": 245582306, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a0d4ea9bc562ad4c19eb84d4a5c7e35e70478151", "title": "Neural Experience of Conscious Time", "abstract": "\u201cPure perception and pure memory constantly intermingle\u201d\nHenri Bergson, 1908.\n\nOne can consider that \u201cTime\u201d and \u201cmemory\u201d are related experiential @@ -12730,17 +14613,22 @@ interactions: tripartite components, to examine the electro-chemical aspects of neural encoding of memory perceived as cTime.", "venue": "Journal of Psychology and Neuroscience", "year": 2021, "referenceCount": 88, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-09-03", "journal": {"name": "Journal of Psychology and Neuroscience"}, - "authors": [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": - "5530455", "name": "C. Gilon"}]}, {"paperId": "b446e12c7d622d0971e5163a0476bb38c4dec964", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://doi.org/10.47485/2693-2490.1053", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-03", + "journal": {"name": "Journal of Psychology and Neuroscience"}, "authors": + [{"authorId": "49288373", "name": "Gerard Marx"}, {"authorId": "5530455", + "name": "C. Gilon"}]}, {"paperId": "b446e12c7d622d0971e5163a0476bb38c4dec964", "externalIds": {"DBLP": "journals/corr/abs-2109-01517", "ArXiv": "2109.01517", "DOI": "10.1016/j.cpet.2021.07.001", "CorpusId": 237417186, "PubMed": "34537126"}, + "corpusId": 237417186, "publicationVenue": {"id": "963d88d6-6483-40ad-b2e0-b4c22d6a77fc", + "name": "PET Clinics", "type": "journal", "alternate_names": ["PET Clin", + "Pet Clinics", "Pet Clin"], "issn": "1556-8598", "url": "https://www.pet.theclinics.com/"}, "url": "https://www.semanticscholar.org/paper/b446e12c7d622d0971e5163a0476bb38c4dec964", "title": "A brief history of AI: how to prevent another winter (a critical review)", "abstract": null, "venue": "PET Clinics", "year": 2021, "referenceCount": - 102, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, + 102, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/2109.01517", "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], @@ -12751,7 +14639,12 @@ interactions: "name": "B. Saboury"}, {"authorId": "1691257", "name": "E. Siegel"}, {"authorId": "2646713", "name": "A. Rahmim"}]}, {"paperId": "cdb971376a98337bdd123913c4adac2338477433", "externalIds": {"DOI": "10.1177/1071181321651098", "CorpusId": 244088295}, - "url": "https://www.semanticscholar.org/paper/cdb971376a98337bdd123913c4adac2338477433", + "corpusId": 244088295, "publicationVenue": {"id": "e3223b71-e378-4859-844d-6bff89c6fd9d", + "name": "Proceedings of the Human Factors and Ergonomics Society Annual Meeting", + "alternate_names": ["Proc Hum Factor Ergon Soc Annu Meet"], "issn": "1071-1813", + "url": "http://www.hcirn.com/res/event/hfesam.php", "alternate_urls": ["http://pro.sagepub.com/", + "https://uk.sagepub.com/en-gb/eur/proceedings-of-the-human-factors-and-ergonomics-society-annual-meeting/journal202046", + "https://journals.sagepub.com/home/pro"]}, "url": "https://www.semanticscholar.org/paper/cdb971376a98337bdd123913c4adac2338477433", "title": "Effects of Human Personal Space on the Robot Obstacle Avoidance Be havior: A Human-in-the-loop Assessment", "abstract": "To ensure both the physical and mental safety of humans during human-robot interaction (HRI), @@ -12774,26 +14667,46 @@ interactions: the robot obstacle avoidance algorithm, robots could demonstrate more humanlike motion behaviors which are confirmed by human experiments.", "venue": "Proceedings of the Human Factors and Ergonomics Society Annual Meeting", "year": 2021, - "referenceCount": 24, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "referenceCount": 24, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": + true, "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/1071181321651098", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": "65", "pages": "1195 - 1199", "name": "Proceedings of the Human Factors and Ergonomics Society Annual Meeting"}, "authors": [{"authorId": "1920941674", "name": "Yuhao Chen"}, {"authorId": "2148492143", "name": "Trevor Smith"}, {"authorId": "2097015689", "name": "Nathan Hewitt"}, {"authorId": "2153395244", "name": "Yu Gu"}, {"authorId": - "5234789", "name": "Boyi Hu"}]}, {"paperId": "0539c6a70adb2481ed3c67d2d0c9fbf93cf250ee", - "externalIds": {"MAG": "3198593607", "DOI": "10.5772/INTECHOPEN.96324", "CorpusId": - 239709576}, "url": "https://www.semanticscholar.org/paper/0539c6a70adb2481ed3c67d2d0c9fbf93cf250ee", + "5234789", "name": "Boyi Hu"}]}, {"paperId": "a8166015099ec828189d64caf81ea2d44dded5c3", + "externalIds": {"DOI": "10.1007/s11055-021-01149-4", "CorpusId": 243839698}, + "corpusId": 243839698, "publicationVenue": {"id": "85b26477-7344-4a25-a32d-136a2f1a50ce", + "name": "Neuroscience and Behavioral Physiology", "type": "journal", "alternate_names": + ["Neurosci Behav Physiol"], "issn": "0097-0549", "url": "http://link.springer.com/journal/11055"}, + "url": "https://www.semanticscholar.org/paper/a8166015099ec828189d64caf81ea2d44dded5c3", + "title": "The Cognitome: Seeking the Fundamental Neuroscience of a Theory + of Consciousness", "abstract": null, "venue": "Neuroscience and Behavioral + Physiology", "year": 2021, "referenceCount": 160, "citationCount": 2, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", + "journal": {"volume": "51", "pages": "915 - 937", "name": "Neuroscience and + Behavioral Physiology"}, "authors": [{"authorId": "2980029", "name": "K. Anokhin"}]}, + {"paperId": "0539c6a70adb2481ed3c67d2d0c9fbf93cf250ee", "externalIds": {"MAG": + "3198593607", "DOI": "10.5772/INTECHOPEN.96324", "CorpusId": 239709576}, "corpusId": + 239709576, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0539c6a70adb2481ed3c67d2d0c9fbf93cf250ee", "title": "Quest for I (Intelligence) in AI (Artificial Intelligence): A Non-Elusive Attempt", "abstract": null, "venue": "", "year": 2021, "referenceCount": 7, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.intechopen.com/citation-pdf-url/75517", "status": null}, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "33966570", "name": "K. Ray"}]}, {"paperId": "c6451bbc1160050b0af049a759ed252b5d310604", "externalIds": {"DOI": - "10.15290/bsp.2021.26.03.03", "CorpusId": 239476730}, "url": "https://www.semanticscholar.org/paper/c6451bbc1160050b0af049a759ed252b5d310604", + "10.15290/bsp.2021.26.03.03", "CorpusId": 239476730}, "corpusId": 239476730, + "publicationVenue": {"id": "e23344ba-24ff-4c0d-bd60-ecc628c8c237", "name": + "Bia\u0142ostockie Studia Prawnicze", "alternate_names": ["Bia\u0142ostockie + Stud Prawnicze"], "issn": "1689-7404", "url": "http://bsp.uwb.edu.pl/en/about-the-journal-2/"}, + "url": "https://www.semanticscholar.org/paper/c6451bbc1160050b0af049a759ed252b5d310604", "title": "Is the Traditional Method of Regulation (the Legislative Act) Sufficient to Regulate Artificial Intelligence, or Should It Also Be Regulated by an Algorithmic Code?", "abstract": "Abstract The issue of the regulation of artificial @@ -12809,14 +14722,19 @@ interactions: the law as the effective law. However, this requires a new approach to law and legislation \u2013 the law as algorithmic code.", "venue": "Bia\u0142ostockie Studia Prawnicze", "year": 2021, "referenceCount": 70, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2021-09-01", "journal": {"volume": "26", "pages": "43 - - 60", "name": "Bia\u0142ostockie Studia Prawnicze"}, "authors": [{"authorId": - "102000931", "name": "D. Szostek"}]}, {"paperId": "767e296064cc30f814c52c270f493ef297b8b0cb", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.sciendo.com/pdf/10.15290/bsp.2021.26.03.03", "status": null}, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Law", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": + "26", "pages": "43 - 60", "name": "Bia\u0142ostockie Studia Prawnicze"}, "authors": + [{"authorId": "102000931", "name": "D. Szostek"}]}, {"paperId": "767e296064cc30f814c52c270f493ef297b8b0cb", "externalIds": {"DBLP": "journals/symmetry/SunZ21", "MAG": "3196880919", "DOI": - "10.3390/sym13091603", "CorpusId": 239668788}, "url": "https://www.semanticscholar.org/paper/767e296064cc30f814c52c270f493ef297b8b0cb", + "10.3390/sym13091603", "CorpusId": 239668788}, "corpusId": 239668788, "publicationVenue": + {"id": "1620da87-4387-4b9a-9bf4-22fdf74d4dc3", "name": "Symmetry", "type": + "journal", "issn": "2073-8994", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-172134", + "alternate_urls": ["https://www.mdpi.com/journal/symmetry", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-172134"]}, + "url": "https://www.semanticscholar.org/paper/767e296064cc30f814c52c270f493ef297b8b0cb", "title": "Modeling Neuronal Systems as an Open Quantum System", "abstract": "We propose a physical model for neurons to describe how neurons interact with one another through the surrounding materials of neuronal cell bodies. @@ -12832,27 +14750,36 @@ interactions: in the neuronal system, which may pave a potential route toward understanding the dynamics of nervous system.", "venue": "Symmetry", "year": 2021, "referenceCount": 55, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": - "13", "pages": "1603", "name": "Symmetry"}, "authors": [{"authorId": "2108568401", - "name": "Yujie Sun"}, {"authorId": "9810381", "name": "Wei-Min Zhang"}]}, - {"paperId": "8b08e549fe4c88b32c31b988ac97adf74d1bf63d", "externalIds": {"MAG": - "3200793067", "DOI": "10.1016/j.hrmr.2021.100856", "CorpusId": 240526859}, - "url": "https://www.semanticscholar.org/paper/8b08e549fe4c88b32c31b988ac97adf74d1bf63d", + "openAccessPdf": {"url": "https://www.mdpi.com/2073-8994/13/9/1603/pdf?version=1630484516", + "status": null}, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": + {"volume": "13", "pages": "1603", "name": "Symmetry"}, "authors": [{"authorId": + "2108568401", "name": "Yujie Sun"}, {"authorId": "9810381", "name": "Wei-Min + Zhang"}]}, {"paperId": "8b08e549fe4c88b32c31b988ac97adf74d1bf63d", "externalIds": + {"MAG": "3200793067", "DOI": "10.1016/j.hrmr.2021.100856", "CorpusId": 240526859}, + "corpusId": 240526859, "publicationVenue": {"id": "5f3c12b1-7ae0-4a4e-929c-295471363ef5", + "name": "Human Resource Management Review", "type": "journal", "alternate_names": + ["Hum Resour Manag Rev"], "issn": "1053-4822", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/620229/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/human-resource-management-review", + "http://www.sciencedirect.com/science/journal/10534822"]}, "url": "https://www.semanticscholar.org/paper/8b08e549fe4c88b32c31b988ac97adf74d1bf63d", "title": "Toward the human \u2013 Centered approach. A revised model of individual acceptance of AI", "abstract": null, "venue": "Human Resource Management Review", "year": 2021, "referenceCount": 140, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-09-01", - "journal": {"name": "Human Resource Management Review"}, "authors": [{"authorId": - "145036277", "name": "M. Giudice"}, {"authorId": "97494986", "name": "V. Scuotto"}, - {"authorId": "50431348", "name": "Beatrice Orlando"}, {"authorId": "73855458", - "name": "Mario Mustilli"}]}, {"paperId": "5915077680344ac6da77056ce8733ace28571278", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-09-01", "journal": {"name": "Human Resource Management Review"}, "authors": + [{"authorId": "145036277", "name": "M. Giudice"}, {"authorId": "97494986", + "name": "V. Scuotto"}, {"authorId": "50431348", "name": "Beatrice Orlando"}, + {"authorId": "73855458", "name": "Mario Mustilli"}]}, {"paperId": "5915077680344ac6da77056ce8733ace28571278", "externalIds": {"PubMedCentral": "8468082", "DOI": "10.3390/diagnostics11091719", - "CorpusId": 237938750, "PubMed": "34574060"}, "url": "https://www.semanticscholar.org/paper/5915077680344ac6da77056ce8733ace28571278", + "CorpusId": 237938750, "PubMed": "34574060"}, "corpusId": 237938750, "publicationVenue": + {"id": "1944b6e1-2c1d-4f42-88e3-9f8a52f57e47", "name": "Diagnostics", "issn": + "2075-4418", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217965", + "alternate_urls": ["https://www.mdpi.com/journal/diagnostics", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217965"]}, + "url": "https://www.semanticscholar.org/paper/5915077680344ac6da77056ce8733ace28571278", "title": "A New Dawn for the Use of Artificial Intelligence in Gastroenterology, Hepatology and Pancreatology", "abstract": "Artificial intelligence (AI) is rapidly becoming an essential tool in the medical field as well as in daily @@ -12864,26 +14791,33 @@ interactions: technology, particularly for gastroenterology, hepatology, and pancreatology, to help clinicians utilize AI in the near future.", "venue": "Diagnostics", "year": 2021, "referenceCount": 201, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2021-09-01", "journal": {"volume": "11", "name": "Diagnostics"}, - "authors": [{"authorId": "3688948", "name": "A. Oka"}, {"authorId": "4283493", - "name": "N. Ishimura"}, {"authorId": "47000564", "name": "S. Ishihara"}]}, - {"paperId": "3a3be5f223c237123ee35ea058b7d21a650ca557", "externalIds": {"DBLP": - "journals/patterns/NakhleH21", "PubMedCentral": "8441561", "DOI": "10.1016/j.patter.2021.100323", - "CorpusId": 237592274, "PubMed": "34553170"}, "url": "https://www.semanticscholar.org/paper/3a3be5f223c237123ee35ea058b7d21a650ca557", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2075-4418/11/9/1719/pdf?version=1632385930", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-09-01", + "journal": {"volume": "11", "name": "Diagnostics"}, "authors": [{"authorId": + "3688948", "name": "A. Oka"}, {"authorId": "4283493", "name": "N. Ishimura"}, + {"authorId": "47000564", "name": "S. Ishihara"}]}, {"paperId": "3a3be5f223c237123ee35ea058b7d21a650ca557", + "externalIds": {"DBLP": "journals/patterns/NakhleH21", "PubMedCentral": "8441561", + "DOI": "10.1016/j.patter.2021.100323", "CorpusId": 237592274, "PubMed": "34553170"}, + "corpusId": 237592274, "publicationVenue": {"id": "17bac89e-3dba-467a-b9d4-71e3baefb08b", + "name": "Patterns", "type": "journal", "issn": "2666-3899", "url": "https://www.cell.com/patterns", + "alternate_urls": ["https://www.sciencedirect.com/journal/patterns"]}, "url": + "https://www.semanticscholar.org/paper/3a3be5f223c237123ee35ea058b7d21a650ca557", "title": "Ready, Steady, Go AI: A practical tutorial on fundamentals of artificial intelligence and its applications in phenomics image analysis", "abstract": null, "venue": "Patterns", "year": 2021, "referenceCount": 131, "citationCount": - 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2021-09-01", "journal": {"volume": - "2", "name": "Patterns"}, "authors": [{"authorId": "31094827", "name": "Farid - Nakhle"}, {"authorId": "2318165", "name": "A. Harfouche"}]}, {"paperId": "8acef4846dc195a718505cd0a2ca96a433acd50d", - "externalIds": {"DOI": "10.1086/715227", "CorpusId": 237537702}, "url": "https://www.semanticscholar.org/paper/8acef4846dc195a718505cd0a2ca96a433acd50d", + 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://www.cell.com/article/S2666389921001719/pdf", "status": null}, "fieldsOfStudy": + ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2021-09-01", "journal": + {"volume": "2", "name": "Patterns"}, "authors": [{"authorId": "31094827", + "name": "Farid Nakhle"}, {"authorId": "2318165", "name": "A. Harfouche"}]}, + {"paperId": "8acef4846dc195a718505cd0a2ca96a433acd50d", "externalIds": {"DOI": + "10.1086/715227", "CorpusId": 237537702}, "corpusId": 237537702, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8acef4846dc195a718505cd0a2ca96a433acd50d", "title": "Chatbots, Gender, and Race on Web 2.0 Platforms: Tay.AI as Monstrous Femininity and Abject Whiteness", "abstract": "In March 2016, Microsoft launched Tay.AI, a chatbot designed to experiment with conversational understanding @@ -12905,23 +14839,26 @@ interactions: to programming and encoded control presents a space of productive creativity.", "venue": "Signs: Journal of Women in Culture and Society", "year": 2021, "referenceCount": 86, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-09-01", "journal": {"volume": - "47", "pages": "105 - 127", "name": "Signs: Journal of Women in Culture and - Society"}, "authors": [{"authorId": "2127104740", "name": "Zoe Vorsino"}]}, - {"paperId": "dc232b07587a92478bcc25aaba8f739c5621daa0", "externalIds": {"DBLP": - "journals/ais/Farhadi21", "DOI": "10.1007/s00146-020-01136-2", "CorpusId": - 231615619}, "url": "https://www.semanticscholar.org/paper/dc232b07587a92478bcc25aaba8f739c5621daa0", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-09-01", "journal": {"volume": "47", "pages": "105 - 127", "name": "Signs: + Journal of Women in Culture and Society"}, "authors": [{"authorId": "2127104740", + "name": "Zoe Vorsino"}]}, {"paperId": "dc232b07587a92478bcc25aaba8f739c5621daa0", + "externalIds": {"DBLP": "journals/ais/Farhadi21", "DOI": "10.1007/s00146-020-01136-2", + "CorpusId": 231615619}, "corpusId": 231615619, "publicationVenue": {"id": + "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", + "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/dc232b07587a92478bcc25aaba8f739c5621daa0", "title": "There is no \u201cI\u201d in \u201cAI\u201d", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 15, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-09-01", "journal": - {"volume": "36", "pages": "1035-1046", "name": "AI & SOCIETY"}, "authors": - [{"authorId": "11060885", "name": "A. Farhadi"}]}, {"paperId": "a1a3174094a15bd439f6a40c5407734ed5847347", - "externalIds": {"MAG": "3194739791", "DOI": "10.22214/ijraset.2021.37617", - "CorpusId": 238729641}, "url": "https://www.semanticscholar.org/paper/a1a3174094a15bd439f6a40c5407734ed5847347", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-09-01", "journal": {"volume": "36", "pages": "1035-1046", "name": "AI + & SOCIETY"}, "authors": [{"authorId": "11060885", "name": "A. Farhadi"}]}, + {"paperId": "a1a3174094a15bd439f6a40c5407734ed5847347", "externalIds": {"MAG": + "3194739791", "DOI": "10.22214/ijraset.2021.37617", "CorpusId": 238729641}, + "corpusId": 238729641, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1a3174094a15bd439f6a40c5407734ed5847347", "title": "Role of Artificial Intelligence in Medicine and Clinical Research", "abstract": "Abstract: Artificial Intelligence is a branch of computer science that enables to analyse complex medical data. The proficiency of artificial @@ -12942,22 +14879,27 @@ interactions: neural networks, diagnosis.", "venue": "International Journal for Research in Applied Science and Engineering Technology", "year": 2021, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-08-31", "journal": {"name": - "International Journal for Research in Applied Science and Engineering Technology"}, - "authors": [{"authorId": "2132205477", "name": "Jhumpa Sarma"}]}, {"paperId": - "e2ce77604b6e46bee85069c3d4dd38f66ef6d9a5", "externalIds": {"DOI": "10.1007/978-3-030-81447-2_1", - "CorpusId": 242426762}, "url": "https://www.semanticscholar.org/paper/e2ce77604b6e46bee85069c3d4dd38f66ef6d9a5", + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-08-31", "journal": {"name": "International Journal for Research in Applied + Science and Engineering Technology"}, "authors": [{"authorId": "2132205477", + "name": "Jhumpa Sarma"}]}, {"paperId": "e2ce77604b6e46bee85069c3d4dd38f66ef6d9a5", + "externalIds": {"DOI": "10.1007/978-3-030-81447-2_1", "CorpusId": 242426762}, + "corpusId": 242426762, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2ce77604b6e46bee85069c3d4dd38f66ef6d9a5", "title": "Computationalism in a Dynamic and\u00a0Distributed Eco-Cognitive Perspective", "abstract": null, "venue": "Cognitive Systems Monographs", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2021-08-31", "journal": {"name": "Cognitive Systems - Monographs"}, "authors": [{"authorId": "1695372", "name": "L. Magnani"}]}, - {"paperId": "32756c1475aa4b3867962b2c838844436bf8bce3", "externalIds": {"PubMedCentral": - "8431329", "DOI": "10.3390/ijerph18179206", "CorpusId": 237468443, "PubMed": - "34501795"}, "url": "https://www.semanticscholar.org/paper/32756c1475aa4b3867962b2c838844436bf8bce3", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2021-08-31", "journal": + {"name": "Cognitive Systems Monographs"}, "authors": [{"authorId": "1695372", + "name": "L. Magnani"}]}, {"paperId": "32756c1475aa4b3867962b2c838844436bf8bce3", + "externalIds": {"PubMedCentral": "8431329", "DOI": "10.3390/ijerph18179206", + "CorpusId": 237468443, "PubMed": "34501795"}, "corpusId": 237468443, "publicationVenue": + {"id": "3096eb5c-d18c-4877-94cd-28edd3a9c357", "name": "International Journal + of Environmental Research and Public Health", "type": "journal", "alternate_names": + ["Int J Environ Res Public Health"], "issn": "1660-4601", "url": "http://www.mdpi.com/journal/ijerph/"}, + "url": "https://www.semanticscholar.org/paper/32756c1475aa4b3867962b2c838844436bf8bce3", "title": "Artificial Intelligence for Identifying the Prevention of Medication Incidents Causing Serious or Moderate Harm: An Analysis Using Incident Reporters\u2019 Views", "abstract": "The purpose of this study was to describe incident reporters\u2019 @@ -12981,16 +14923,18 @@ interactions: effective to classifying text-based data, such as the free text of incident reports.", "venue": "International Journal of Environmental Research and Public Health", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-08-31", "journal": {"volume": "18", "name": "International - Journal of Environmental Research and Public Health"}, "authors": [{"authorId": - "15914029", "name": "Marja H\u00e4rk\u00e4nen"}, {"authorId": "2562355", "name": - "K. Haatainen"}, {"authorId": "1411547615", "name": "K. Vehvil\u00e4inen-Julkunen"}, - {"authorId": "2322195", "name": "M. Miettinen"}]}, {"paperId": "e18c34b8d6e66d1d3bdec4edf3a64dd4c757cc77", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1660-4601/18/17/9206/pdf?version=1630549999", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-31", + "journal": {"volume": "18", "name": "International Journal of Environmental + Research and Public Health"}, "authors": [{"authorId": "15914029", "name": + "Marja H\u00e4rk\u00e4nen"}, {"authorId": "2562355", "name": "K. Haatainen"}, + {"authorId": "1411547615", "name": "K. Vehvil\u00e4inen-Julkunen"}, {"authorId": + "2322195", "name": "M. Miettinen"}]}, {"paperId": "e18c34b8d6e66d1d3bdec4edf3a64dd4c757cc77", "externalIds": {"DBLP": "journals/corr/abs-2108-12973", "ArXiv": "2108.12973", - "DOI": "10.1145/3474085.3475700", "CorpusId": 237353520}, "url": "https://www.semanticscholar.org/paper/e18c34b8d6e66d1d3bdec4edf3a64dd4c757cc77", + "DOI": "10.1145/3474085.3475700", "CorpusId": 237353520}, "corpusId": 237353520, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e18c34b8d6e66d1d3bdec4edf3a64dd4c757cc77", "title": "Armor: A Benchmark for Meta-evaluation of Artificial Music", "abstract": "Objective evaluation (OE) is essential to artificial music, but it''s often very hard to determine the quality of OEs. Hitherto, subjective evaluation @@ -13008,7 +14952,8 @@ interactions: we observe that there is still a huge gap between SE and OE, meaning that hard-coded algorithms are far from catching human''s judgment to the music.", "venue": "ACM Multimedia", "year": 2021, "referenceCount": 28, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/2108.12973", "status": null}, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": @@ -13017,8 +14962,8 @@ interactions: [{"authorId": "2117075628", "name": "Songhe Wang"}, {"authorId": "2125209268", "name": "Zheng Bao"}, {"authorId": "2124978286", "name": "E. Jingtong"}]}, {"paperId": "0003510ca25103ac605945c20e90586ee24de538", "externalIds": {"MAG": - "3198908536", "DOI": "10.3390/LAWS10030070", "CorpusId": 239682244}, "url": - "https://www.semanticscholar.org/paper/0003510ca25103ac605945c20e90586ee24de538", + "3198908536", "DOI": "10.3390/LAWS10030070", "CorpusId": 239682244}, "corpusId": + 239682244, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0003510ca25103ac605945c20e90586ee24de538", "title": "Digital Transformation and Artificial Intelligence Applied to Business: Legal Regulations, Economic Impact and Perspective", "abstract": "Digital transformation can be defined as the integration of new technologies into @@ -13039,14 +14984,20 @@ interactions: and will therefore be universally deployed. However, this implementation will have to be done under common regulations and in line with the new reality.", "venue": "", "year": 2021, "referenceCount": 91, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2075-471X/10/3/70/pdf?version=1630059121", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-27", "journal": {"volume": "10", "pages": "70", "name": "Laws"}, "authors": [{"authorId": "107725612", "name": "Ricardo Francisco Reier Forradellas"}, {"authorId": "2135150203", "name": "Luis Miguel Garay Gallastegui"}]}, {"paperId": "3390c4c6f31ca43063a8ed3ea857d8da89114789", "externalIds": {"DOI": "10.1093/icb/icab188", - "CorpusId": 237322884, "PubMed": "34448841"}, "url": "https://www.semanticscholar.org/paper/3390c4c6f31ca43063a8ed3ea857d8da89114789", + "CorpusId": 237322884, "PubMed": "34448841"}, "corpusId": 237322884, "publicationVenue": + {"id": "41ae3155-d508-42ce-bb5d-d056eb5c79f6", "name": "Integrative and Comparative + Biology", "type": "journal", "alternate_names": ["Integr Comp Biology"], "issn": + "1540-7063", "url": "http://www.bioone.org/bioone/?issn=1540-7063&request=get-journals-list", + "alternate_urls": ["http://www.jstor.org/journals/15407063.html", "http://icb.oxfordjournals.org/", + "https://www.jstor.org/journal/intecompbiol"]}, "url": "https://www.semanticscholar.org/paper/3390c4c6f31ca43063a8ed3ea857d8da89114789", "title": "Artificial Intelligence for Biology.", "abstract": "Despite efforts to integrate research across different subdisciplines of biology, the scale of integration remains limited. We hypothesize that future generations of @@ -13066,17 +15017,18 @@ interactions: and computational scientists. This white paper provides a vision for AI for Biology and highlights some challenges.", "venue": "Integrative and Comparative Biology", "year": 2021, "referenceCount": 64, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-27", "journal": - {"name": "Integrative and comparative biology"}, "authors": [{"authorId": - "3242252", "name": "S. Hassoun"}, {"authorId": "50396886", "name": "F. Jefferson"}, - {"authorId": "2148376035", "name": "Xinghua Shi"}, {"authorId": "38820889", - "name": "Brian J. Stucky"}, {"authorId": "2143720173", "name": "Jin Wang"}, - {"authorId": "1743851", "name": "E. Rosa"}]}, {"paperId": "9a3fa520426c3460198912d7c4727dc6c57935ad", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/icb/article-pdf/61/6/2267/42751346/icab188.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-08-27", "journal": {"name": "Integrative + and comparative biology"}, "authors": [{"authorId": "3242252", "name": "S. + Hassoun"}, {"authorId": "50396886", "name": "F. Jefferson"}, {"authorId": + "2148376035", "name": "Xinghua Shi"}, {"authorId": "38820889", "name": "Brian + J. Stucky"}, {"authorId": "2143720173", "name": "Jin Wang"}, {"authorId": + "1743851", "name": "E. Rosa"}]}, {"paperId": "9a3fa520426c3460198912d7c4727dc6c57935ad", "externalIds": {"MAG": "3194035649", "DOI": "10.1108/ohi-02-2021-0037", "CorpusId": - 238680258}, "url": "https://www.semanticscholar.org/paper/9a3fa520426c3460198912d7c4727dc6c57935ad", + 238680258}, "corpusId": 238680258, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a3fa520426c3460198912d7c4727dc6c57935ad", "title": "An interdisciplinary approach for tacit knowledge communication between the designer and the computer", "abstract": "PurposeThis research investigates the means of tacit knowledge (TK) communication between the designer @@ -13108,35 +15060,44 @@ interactions: to allow for the transfer of intangible design attributes between different design entities, particularly tacit design knowledge.", "venue": "Open House International", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-08-24", "journal": {"name": "Open House International"}, "authors": - [{"authorId": "2132277385", "name": "Hala Hossam Eldin"}, {"authorId": "1394931314", - "name": "Ramy Bakir"}, {"authorId": "1429704981", "name": "S. El-Fiki"}]}, - {"paperId": "92d8b5d427d07942810b2295dd17777d8a9e640c", "externalIds": {"DBLP": - "journals/mima/Maclure21", "DOI": "10.1007/s11023-021-09570-x", "CorpusId": - 238244722}, "url": "https://www.semanticscholar.org/paper/92d8b5d427d07942810b2295dd17777d8a9e640c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "2021-08-24", "journal": {"name": "Open House + International"}, "authors": [{"authorId": "2132277385", "name": "Hala Hossam + Eldin"}, {"authorId": "1394931314", "name": "Ramy Bakir"}, {"authorId": "1429704981", + "name": "S. El-Fiki"}]}, {"paperId": "92d8b5d427d07942810b2295dd17777d8a9e640c", + "externalIds": {"DBLP": "journals/mima/Maclure21", "DOI": "10.1007/s11023-021-09570-x", + "CorpusId": 238244722}, "corpusId": 238244722, "publicationVenue": {"id": + "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", "type": + "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/92d8b5d427d07942810b2295dd17777d8a9e640c", "title": "AI, Explainability and Public Reason: The Argument from the Limitations of the Human Mind", "abstract": null, "venue": "Minds and Machines", "year": 2021, "referenceCount": 71, "citationCount": 7, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11023-021-09570-x.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-23", "journal": {"volume": "31", "pages": "421 - 438", "name": "Minds and Machines"}, "authors": [{"authorId": "46514294", "name": "J. Maclure"}]}, {"paperId": "e25d2cd25f708fbf04faf50954eaadced9a1e3e5", "externalIds": {"PubMedCentral": - "8380863", "DOI": "10.1007/s42454-021-00035-1", "CorpusId": 237278455}, "url": - "https://www.semanticscholar.org/paper/e25d2cd25f708fbf04faf50954eaadced9a1e3e5", + "8380863", "DOI": "10.1007/s42454-021-00035-1", "CorpusId": 237278455}, "corpusId": + 237278455, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e25d2cd25f708fbf04faf50954eaadced9a1e3e5", "title": "Hume\u2019s guillotine and intelligent technologies", "abstract": null, "venue": "Human-Intelligent Systems Integration", "year": 2021, "referenceCount": 56, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-23", - "journal": {"volume": "3", "pages": "241 - 250", "name": "Human-Intelligent + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s42454-021-00035-1.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-08-23", "journal": {"volume": "3", "pages": "241 - 250", "name": "Human-Intelligent Systems Integration"}, "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}]}, {"paperId": "7b26aaae20aa8a8ab42360596698de04c2130a12", "externalIds": {"MAG": "3194860451", "DOI": "10.34024/prometeica.2021.23.10811", "CorpusId": 238736674}, + "corpusId": 238736674, "publicationVenue": {"id": "ec5606ee-408d-4bbc-8b17-26b990cdbcb6", + "name": "Prometeica", "issn": "1852-9488", "url": "https://periodicos.unifesp.br/index.php/prometeica/", + "alternate_urls": ["https://dialnet.unirioja.es/servlet/revista?codigo=13823"]}, "url": "https://www.semanticscholar.org/paper/7b26aaae20aa8a8ab42360596698de04c2130a12", "title": "The kantian notion of freedom and autonomy of artificial agency", "abstract": "The objective of this paper is to provide critical analysis of @@ -13153,26 +15114,32 @@ interactions: half of the purpose of the AI scientists on the possibility of Artificial Autonomous Agency.", "venue": "Prometeica", "year": 2021, "referenceCount": 26, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://periodicos.unifesp.br/index.php/prometeica/article/download/10811/8750", + "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-22", "journal": {"name": "Prometeica - Revista de Filosof\u00eda y Ciencias"}, "authors": [{"authorId": "117955029", "name": "M. Sahu"}]}, {"paperId": "ba1bb2d152aba3755ac933ecc7f6cc67b1f89f71", "externalIds": {"MAG": "3195783210", "DOI": "10.1080/00472778.2021.1955125", - "CorpusId": 238736336}, "url": "https://www.semanticscholar.org/paper/ba1bb2d152aba3755ac933ecc7f6cc67b1f89f71", + "CorpusId": 238736336}, "corpusId": 238736336, "publicationVenue": {"id": + "147f1f0c-b554-42c6-aa40-ff4089bbc563", "name": "Journal of Small Business + Management", "type": "journal", "alternate_names": ["J Small Bus Manag"], + "issn": "0047-2778", "url": "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1540-627X"}, + "url": "https://www.semanticscholar.org/paper/ba1bb2d152aba3755ac933ecc7f6cc67b1f89f71", "title": "\u201cHasta la vista, baby\u201d \u2013 will machine learning terminate human literature reviews in entrepreneurship?", "abstract": null, "venue": "Journal of Small Business Management", "year": 2021, "referenceCount": 80, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}], "publicationTypes": ["Review"], "publicationDate": - "2021-08-19", "journal": {"name": "Journal of Small Business Management"}, - "authors": [{"authorId": "143784473", "name": "Sebastian Robledo"}, {"authorId": - "2132419448", "name": "Andr\u00e9s Mauricio Grisales Aguirre"}, {"authorId": - "9759238", "name": "M. Hughes"}, {"authorId": "98090309", "name": "Fabian - Eggers"}]}, {"paperId": "1e9201aaa94bba6968505110187cbe86c42917f2", "externalIds": - {"PubMedCentral": "8417437", "DOI": "10.3389/fonc.2021.702270", "CorpusId": - 237218583, "PubMed": "34490103"}, "url": "https://www.semanticscholar.org/paper/1e9201aaa94bba6968505110187cbe86c42917f2", + "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}], "publicationTypes": ["Review"], + "publicationDate": "2021-08-19", "journal": {"name": "Journal of Small Business + Management"}, "authors": [{"authorId": "143784473", "name": "Sebastian Robledo"}, + {"authorId": "2132419448", "name": "Andr\u00e9s Mauricio Grisales Aguirre"}, + {"authorId": "9759238", "name": "M. Hughes"}, {"authorId": "98090309", "name": + "Fabian Eggers"}]}, {"paperId": "1e9201aaa94bba6968505110187cbe86c42917f2", + "externalIds": {"PubMedCentral": "8417437", "DOI": "10.3389/fonc.2021.702270", + "CorpusId": 237218583, "PubMed": "34490103"}, "corpusId": 237218583, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1e9201aaa94bba6968505110187cbe86c42917f2", "title": "An Adversarial Deep-Learning-Based Model for Cervical Cancer CTV Segmentation With Multicenter Blinded Randomized Controlled Validation", "abstract": "Purpose To propose a novel deep-learning-based auto-segmentation model for @@ -13199,25 +15166,27 @@ interactions: to be accurate and comparable to the manual CTV segmentation in cervical cancer patients when assessed by our three-stage evaluation framework.", "venue": "Frontiers in Oncology", "year": 2021, "referenceCount": 43, "citationCount": - 5, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-08-19", "journal": {"volume": "11", "name": "Frontiers - in Oncology"}, "authors": [{"authorId": "5515909", "name": "Zhikai Liu"}, - {"authorId": "2111898676", "name": "Wanqi Chen"}, {"authorId": "2306471", - "name": "H. Guan"}, {"authorId": "107736091", "name": "Hongnan Zhen"}, {"authorId": - "2109659501", "name": "Jing Shen"}, {"authorId": "2108661388", "name": "Xia - Liu"}, {"authorId": "144675148", "name": "An Liu"}, {"authorId": "50392067", - "name": "Richard Li"}, {"authorId": "8194728", "name": "J. Geng"}, {"authorId": - "46864001", "name": "J. You"}, {"authorId": "2108396138", "name": "Weihu Wang"}, - {"authorId": "2144279450", "name": "Zhouyu Li"}, {"authorId": "2129520448", - "name": "Yongfeng Zhang"}, {"authorId": "2144035580", "name": "Yuanyuan Chen"}, - {"authorId": "2107557260", "name": "J. Du"}, {"authorId": "2115814195", "name": - "Qi Chen"}, {"authorId": "2144837443", "name": "Yu Chen"}, {"authorId": "2117149681", - "name": "Shaobin Wang"}, {"authorId": "48702736", "name": "Fuquan Zhang"}, - {"authorId": "1665045805", "name": "J. Qiu"}]}, {"paperId": "4aa8eee8fc73007114d53b6e1bd1974f2b9b06e7", - "externalIds": {"MAG": "3193456649", "DOI": "10.1108/fs-02-2021-0048", "CorpusId": - 238673269}, "url": "https://www.semanticscholar.org/paper/4aa8eee8fc73007114d53b6e1bd1974f2b9b06e7", + 5, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fonc.2021.702270/pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-19", "journal": + {"volume": "11", "name": "Frontiers in Oncology"}, "authors": [{"authorId": + "5515909", "name": "Zhikai Liu"}, {"authorId": "2111898676", "name": "Wanqi + Chen"}, {"authorId": "2306471", "name": "H. Guan"}, {"authorId": "107736091", + "name": "Hongnan Zhen"}, {"authorId": "2109659501", "name": "Jing Shen"}, + {"authorId": "2108661388", "name": "Xia Liu"}, {"authorId": "144675148", "name": + "An Liu"}, {"authorId": "50392067", "name": "Richard Li"}, {"authorId": "8194728", + "name": "J. Geng"}, {"authorId": "46864001", "name": "J. You"}, {"authorId": + "2108396138", "name": "Weihu Wang"}, {"authorId": "2144279450", "name": "Zhouyu + Li"}, {"authorId": "2129520448", "name": "Yongfeng Zhang"}, {"authorId": "2144035580", + "name": "Yuanyuan Chen"}, {"authorId": "2107557260", "name": "J. Du"}, {"authorId": + "2115814195", "name": "Qi Chen"}, {"authorId": "2144837443", "name": "Yu Chen"}, + {"authorId": "2117149681", "name": "Shaobin Wang"}, {"authorId": "48702736", + "name": "Fuquan Zhang"}, {"authorId": "1665045805", "name": "J. Qiu"}]}, {"paperId": + "4aa8eee8fc73007114d53b6e1bd1974f2b9b06e7", "externalIds": {"MAG": "3193456649", + "DOI": "10.1108/fs-02-2021-0048", "CorpusId": 238673269}, "corpusId": 238673269, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4aa8eee8fc73007114d53b6e1bd1974f2b9b06e7", "title": "The feasibility of artificial intelligence performing as CEO: the vizier-shah theory", "abstract": "\nPurpose\nThis paper aims to examine the feasibility of artificial intelligence (AI) performing as chief executive @@ -13236,24 +15205,25 @@ interactions: by following an exploratory research design \u2013 classic grounded theory and provides insights for future research.\n", "venue": "foresight", "year": 2021, "referenceCount": 47, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-16", - "journal": {"name": "foresight"}, "authors": [{"authorId": "48704597", "name": - "Aslihan \u00dcnal"}, {"authorId": "100657061", "name": "I. Kilin\u00e7"}]}, - {"paperId": "4f938b62b63a3909b3e08d77eff6109b5570bf46", "externalIds": {"MAG": - "3198229386", "DOI": "10.3917/dio.269.0107", "CorpusId": 239716934}, "url": - "https://www.semanticscholar.org/paper/4f938b62b63a3909b3e08d77eff6109b5570bf46", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-08-16", "journal": {"name": "foresight"}, "authors": + [{"authorId": "48704597", "name": "Aslihan \u00dcnal"}, {"authorId": "100657061", + "name": "I. Kilin\u00e7"}]}, {"paperId": "4f938b62b63a3909b3e08d77eff6109b5570bf46", + "externalIds": {"MAG": "3198229386", "DOI": "10.3917/dio.269.0107", "CorpusId": + 239716934}, "corpusId": 239716934, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4f938b62b63a3909b3e08d77eff6109b5570bf46", "title": "L\u2019intelligence artificielle n\u2019existe-t-elle vraiment pas\u00a0? Quelques \u00e9l\u00e9ments de clarification autour d\u2019une science controvers\u00e9e", "abstract": null, "venue": "Diog\u00e8ne", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-08-16", "journal": {"name": "Diog\u00e8ne"}, "authors": [{"authorId": - "46681282", "name": "Jean-S\u00e9bastien Vayre"}, {"authorId": "3166598", - "name": "G\u00e9rald Gaglio"}]}, {"paperId": "2d394006c9495c506e3b4535e2f497f235a7ba13", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2021-08-16", "journal": {"name": "Diog\u00e8ne"}, + "authors": [{"authorId": "46681282", "name": "Jean-S\u00e9bastien Vayre"}, + {"authorId": "3166598", "name": "G\u00e9rald Gaglio"}]}, {"paperId": "2d394006c9495c506e3b4535e2f497f235a7ba13", "externalIds": {"DBLP": "journals/corr/abs-2108-07129", "ArXiv": "2108.07129", - "CorpusId": 237091552}, "url": "https://www.semanticscholar.org/paper/2d394006c9495c506e3b4535e2f497f235a7ba13", + "CorpusId": 237091552}, "corpusId": 237091552, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2d394006c9495c506e3b4535e2f497f235a7ba13", "title": "Autoencoders as Tools for Program Synthesis", "abstract": "Recently there have been many advances in research on language modeling of source code. Applications range from code suggestion and completion to code summarization. @@ -13270,15 +15240,20 @@ interactions: and depth of the tree instead of the total size of the tree which mitigates the common problem of exploding and vanishing gradients.", "venue": "ArXiv", "year": 2021, "referenceCount": 46, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-08-16", "journal": {"volume": "abs/2108.07129", "name": - "ArXiv"}, "authors": [{"authorId": "2123319458", "name": "Sander de Bruin"}, - {"authorId": "2066239833", "name": "Vadim Liventsev"}, {"authorId": "1790288", - "name": "M. Petkovi''c"}]}, {"paperId": "209e1ed21e8f117b10feaa10d1cedbe4a963bf0c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-16", "journal": + {"volume": "abs/2108.07129", "name": "ArXiv"}, "authors": [{"authorId": "2123319458", + "name": "Sander de Bruin"}, {"authorId": "2066239833", "name": "Vadim Liventsev"}, + {"authorId": "1790288", "name": "M. Petkovi''c"}]}, {"paperId": "209e1ed21e8f117b10feaa10d1cedbe4a963bf0c", "externalIds": {"PubMedCentral": "8497074", "DOI": "10.1093/eurheartj/ehab544", - "CorpusId": 237095372, "PubMed": "34392353"}, "url": "https://www.semanticscholar.org/paper/209e1ed21e8f117b10feaa10d1cedbe4a963bf0c", + "CorpusId": 237095372, "PubMed": "34392353"}, "corpusId": 237095372, "publicationVenue": + {"id": "3e3fb1ae-7d3b-430c-9f51-5d7b4f6906e0", "name": "European Heart Journal", + "type": "journal", "alternate_names": ["Eur Heart J", "Eur heart j", "European + heart journal"], "issn": "0195-668X", "alternate_issns": ["1695-9841"], "url": + "http://www.arsxxi.com/", "alternate_urls": ["http://eurheartj.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/209e1ed21e8f117b10feaa10d1cedbe4a963bf0c", "title": "Artificial intelligence in the diagnosis and management of arrhythmias", "abstract": "Abstract The field of cardiac electrophysiology (EP) had adopted simple artificial intelligence (AI) methodologies for decades. Recent renewed @@ -13297,44 +15272,53 @@ interactions: impact of AI and recent technological advances in all aspects of arrhythmia care.", "venue": "European Heart Journal", "year": 2021, "referenceCount": 105, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-15", - "journal": {"volume": "42", "pages": "3904 - 3916", "name": "European Heart - Journal"}, "authors": [{"authorId": "144347328", "name": "Venkat D Nagarajan"}, - {"authorId": "1847967", "name": "Su-Lin Lee"}, {"authorId": "8082229", "name": - "J. Robertus"}, {"authorId": "1965636", "name": "C. Nienaber"}, {"authorId": - "3298288", "name": "N. Trayanova"}, {"authorId": "145012041", "name": "S. - Ernst"}]}, {"paperId": "44ff8ccb3a7a88465e991cfe0bb7cf8d2414da58", "externalIds": - {"MAG": "3194918255", "DOI": "10.1016/J.ENG.2021.04.027", "CorpusId": 238716401}, - "url": "https://www.semanticscholar.org/paper/44ff8ccb3a7a88465e991cfe0bb7cf8d2414da58", + "openAccessPdf": {"url": "https://academic.oup.com/eurheartj/article-pdf/42/38/3904/40526393/ehab544.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2021-08-15", "journal": {"volume": "42", "pages": "3904 - 3916", "name": + "European Heart Journal"}, "authors": [{"authorId": "144347328", "name": "Venkat + D Nagarajan"}, {"authorId": "1847967", "name": "Su-Lin Lee"}, {"authorId": + "8082229", "name": "J. Robertus"}, {"authorId": "1965636", "name": "C. Nienaber"}, + {"authorId": "3298288", "name": "N. Trayanova"}, {"authorId": "145012041", + "name": "S. Ernst"}]}, {"paperId": "44ff8ccb3a7a88465e991cfe0bb7cf8d2414da58", + "externalIds": {"MAG": "3194918255", "DOI": "10.1016/J.ENG.2021.04.027", "CorpusId": + 238716401}, "corpusId": 238716401, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/44ff8ccb3a7a88465e991cfe0bb7cf8d2414da58", "title": "Actor\u2013Critic Reinforcement Learning and Application in Developing Computer-Vision-Based Interface Tracking", "abstract": null, "venue": "", "year": 2021, "referenceCount": 161, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-08-14", "journal": {"volume": "", "name": "Engineering"}, "authors": - [{"authorId": "117754018", "name": "Oguzhan Dogru"}, {"authorId": "66914927", - "name": "Kirubakaran Velswamy"}, {"authorId": "144466701", "name": "Biao Huang"}]}, - {"paperId": "614dc443359fe849318f698c3c51f8f0732e622a", "externalIds": {"PubMedCentral": - "8360246", "DOI": "10.1186/s13244-021-01052-z", "CorpusId": 236984260, "PubMed": - "34383173"}, "url": "https://www.semanticscholar.org/paper/614dc443359fe849318f698c3c51f8f0732e622a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2021-08-14", "journal": + {"volume": "", "name": "Engineering"}, "authors": [{"authorId": "117754018", + "name": "Oguzhan Dogru"}, {"authorId": "66914927", "name": "Kirubakaran Velswamy"}, + {"authorId": "144466701", "name": "Biao Huang"}]}, {"paperId": "614dc443359fe849318f698c3c51f8f0732e622a", + "externalIds": {"PubMedCentral": "8360246", "DOI": "10.1186/s13244-021-01052-z", + "CorpusId": 236984260, "PubMed": "34383173"}, "corpusId": 236984260, "publicationVenue": + {"id": "4569c7ff-7138-4cef-b44d-21049e1faa98", "name": "Insights into Imaging", + "type": "journal", "alternate_names": ["Insight Imaging", "Insights Into Imaging"], + "issn": "1869-4101", "url": "http://www.springer.com/13244", "alternate_urls": + ["http://www.springer.com/medicine/radiology/journal/13244", "https://insightsimaging.springeropen.com", + "https://link.springer.com/journal/13244", "http://www.springer.com/medicine/radiology/journal/13244?changeHeader"]}, + "url": "https://www.semanticscholar.org/paper/614dc443359fe849318f698c3c51f8f0732e622a", "title": "A primer on deep learning and convolutional neural networks for clinicians", "abstract": null, "venue": "Insights into Imaging", "year": 2021, - "referenceCount": 11, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": - true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-12", - "journal": {"volume": "12", "name": "Insights into Imaging"}, "authors": [{"authorId": - "145340403", "name": "L. L. Iglesias"}, {"authorId": "1579587544", "name": - "P. Bell\u00f3n"}, {"authorId": "2052086501", "name": "A. P. del Barrio"}, - {"authorId": "1479580655", "name": "P. M. Fern\u00e1ndez-Miranda"}, {"authorId": - "118387478", "name": "D. R. Gonz\u00e1lez"}, {"authorId": "123281357", "name": - "J. A. Vega"}, {"authorId": "15473105", "name": "A. G. Mandly"}, {"authorId": + "referenceCount": 11, "citationCount": 8, "influentialCitationCount": 1, "isOpenAccess": + true, "openAccessPdf": {"url": "https://insightsimaging.springeropen.com/counter/pdf/10.1186/s13244-021-01052-z", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2021-08-12", "journal": {"volume": "12", "name": "Insights into Imaging"}, + "authors": [{"authorId": "145340403", "name": "L. L. Iglesias"}, {"authorId": + "1579587544", "name": "P. Bell\u00f3n"}, {"authorId": "2052086501", "name": + "A. P. del Barrio"}, {"authorId": "1479580655", "name": "P. M. Fern\u00e1ndez-Miranda"}, + {"authorId": "118387478", "name": "D. R. Gonz\u00e1lez"}, {"authorId": "123281357", + "name": "J. A. Vega"}, {"authorId": "15473105", "name": "A. G. Mandly"}, {"authorId": "2130646019", "name": "J. Blanco"}]}, {"paperId": "836084de10e395a46f79eab4a315ea2ea04e951a", "externalIds": {"DBLP": "journals/corr/abs-2108-04546", "ArXiv": "2108.04546", - "CorpusId": 236965848}, "url": "https://www.semanticscholar.org/paper/836084de10e395a46f79eab4a315ea2ea04e951a", + "CorpusId": 236965848}, "corpusId": 236965848, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/836084de10e395a46f79eab4a315ea2ea04e951a", "title": "Epigenetic opportunities for Evolutionary Computation", "abstract": "Evolutionary Computation is a group of biologically inspired algorithms used to solve complex optimisation problems. It can be split into Evolutionary @@ -13360,55 +15344,67 @@ interactions: environments. This leaves a diverse range of biologically inspired mechanisms as low hanging fruit that should be explored further within Evolutionary Computation.", "venue": "ArXiv", "year": 2021, "referenceCount": 93, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-08-10", "journal": {"volume": "abs/2108.04546", "name": - "ArXiv"}, "authors": [{"authorId": "2122962281", "name": "Sizhe Yuen"}, {"authorId": - "1396774500", "name": "T. H. Ezard"}, {"authorId": "143827685", "name": "A. - Sobey"}]}, {"paperId": "a27df49d2e3ad55979ac6a8b0bfee7b7b7c107ae", "externalIds": - {"MAG": "3188211139", "DOI": "10.1007/s41358-021-00280-5", "CorpusId": 238655002}, - "url": "https://www.semanticscholar.org/paper/a27df49d2e3ad55979ac6a8b0bfee7b7b7c107ae", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-08-10", "journal": {"volume": + "abs/2108.04546", "name": "ArXiv"}, "authors": [{"authorId": "2122962281", + "name": "Sizhe Yuen"}, {"authorId": "1396774500", "name": "T. H. Ezard"}, + {"authorId": "143827685", "name": "A. Sobey"}]}, {"paperId": "a27df49d2e3ad55979ac6a8b0bfee7b7b7c107ae", + "externalIds": {"MAG": "3188211139", "DOI": "10.1007/s41358-021-00280-5", + "CorpusId": 238655002}, "corpusId": 238655002, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a27df49d2e3ad55979ac6a8b0bfee7b7b7c107ae", "title": "Das Ende des Politischen? Demokratische Politik und K\u00fcnstliche Intelligenz", "abstract": null, "venue": "Zeitschrift f\u00fcr Politikwissenschaft", "year": 2021, "referenceCount": 113, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s41358-021-00280-5.pdf", + "status": null}, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": "external"}], "publicationTypes": null, "publicationDate": "2021-08-09", "journal": {"volume": "32", "pages": "573-594", "name": "Zeitschrift f\u00fcr Politikwissenschaft"}, "authors": [{"authorId": "1975018551", "name": "A. Koster"}]}, {"paperId": "c1d7a0d2654e88ae928b9ec5a988f390ea81e711", "externalIds": {"MAG": "3190264543", "DOI": "10.1039/d1me00055a", "CorpusId": - 238671900}, "url": "https://www.semanticscholar.org/paper/c1d7a0d2654e88ae928b9ec5a988f390ea81e711", + 238671900}, "corpusId": 238671900, "publicationVenue": {"id": "a73df793-3351-4441-8e4f-2866c074294b", + "name": "Molecular Systems Design & Engineering", "alternate_names": ["Mol + Syst Des Eng"], "issn": "2058-9689", "url": "https://pubs.rsc.org/en/journals/journalissues/me"}, + "url": "https://www.semanticscholar.org/paper/c1d7a0d2654e88ae928b9ec5a988f390ea81e711", "title": "Hydrogen bonded frameworks: smart materials used smartly", "abstract": "Hydrogen-bonded host frameworks constructed from carefully selected molecular building blocks can exhibit architectures capable of encapsulating a wide range of guest molecules, with promising opportunities in key technologies.", "venue": "Molecular Systems Design & Engineering", "year": 2021, "referenceCount": 162, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Materials Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-09", - "journal": {"name": "Molecular Systems Design & Engineering"}, "authors": - [{"authorId": "122226010", "name": "A. Yusov"}, {"authorId": "2132233128", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-08-09", "journal": {"name": "Molecular Systems Design & Engineering"}, + "authors": [{"authorId": "122226010", "name": "A. Yusov"}, {"authorId": "2132233128", "name": "Alexandra M. Dillon"}, {"authorId": "2067816408", "name": "Michael D. Ward"}]}, {"paperId": "d96907bd620d3c04be6b978b6c39a048429857bb", "externalIds": {"DBLP": "journals/giq/NasseefBALD22", "MAG": "3191215849", "DOI": "10.1016/j.giq.2021.101618", - "CorpusId": 238719621}, "url": "https://www.semanticscholar.org/paper/d96907bd620d3c04be6b978b6c39a048429857bb", + "CorpusId": 238719621}, "corpusId": 238719621, "publicationVenue": {"id": + "45992d36-7a45-43cf-8b66-ff99604a5c85", "name": "Government Information Quarterly", + "type": "journal", "alternate_names": ["Gov Inf Q"], "issn": "0740-624X", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/620202/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/0740624X", + "https://www.journals.elsevier.com/government-information-quarterly"]}, "url": + "https://www.semanticscholar.org/paper/d96907bd620d3c04be6b978b6c39a048429857bb", "title": "Artificial intelligence-based public healthcare systems: G2G knowledge-based exchange to enhance the decision-making process", "abstract": null, "venue": "Government Information Quarterly", "year": 2021, "referenceCount": 150, "citationCount": - 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-08-01", "journal": {"volume": "39", "pages": "101618", "name": "Gov. - Inf. Q."}, "authors": [{"authorId": "3478046", "name": "Omar Nasseef"}, {"authorId": - "11002299", "name": "A. Baabdullah"}, {"authorId": "2658516", "name": "A. - Alalwan"}, {"authorId": "1696747", "name": "Banita Lal"}, {"authorId": "145800152", - "name": "Yogesh K. Dwivedi"}]}, {"paperId": "798157d7ca71907898f4573c5663767e8233b24c", - "externalIds": {"DBLP": "journals/corr/abs-2108-05349", "ArXiv": "2108.05349", - "DOI": "10.3389/fevo.2021.755981", "CorpusId": 236976086}, "url": "https://www.semanticscholar.org/paper/798157d7ca71907898f4573c5663767e8233b24c", + 8, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-08-01", "journal": {"volume": "39", "pages": "101618", + "name": "Gov. Inf. Q."}, "authors": [{"authorId": "3478046", "name": "Omar + Nasseef"}, {"authorId": "11002299", "name": "A. Baabdullah"}, {"authorId": + "2658516", "name": "A. Alalwan"}, {"authorId": "1696747", "name": "Banita + Lal"}, {"authorId": "145800152", "name": "Yogesh K. Dwivedi"}]}, {"paperId": + "798157d7ca71907898f4573c5663767e8233b24c", "externalIds": {"DBLP": "journals/corr/abs-2108-05349", + "ArXiv": "2108.05349", "DOI": "10.3389/fevo.2021.755981", "CorpusId": 236976086}, + "corpusId": 236976086, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/798157d7ca71907898f4573c5663767e8233b24c", "title": "Intelligence as Information Processing: Brains, Swarms, and Computers", "abstract": "There is no agreed definition of intelligence, so it is problematic to simply ask whether brains, swarms, computers, or other systems are intelligent @@ -13421,15 +15417,17 @@ interactions: of the brain-computer analogy in different contexts. I also use this perspective to discuss the evolution and ecology of intelligence.", "venue": "Frontiers in Ecology and Evolution", "year": 2021, "referenceCount": 204, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Mathematics", "Biology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Biology", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-08-09", "journal": {"volume": "9"}, "authors": [{"authorId": "1745123", - "name": "C. Gershenson"}]}, {"paperId": "9406874d6741fba46ac2ee38026b672c7f60c0a0", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/fevo.2021.755981/pdf", "status": + null}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Biology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Biology", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-08-09", "journal": {"volume": "9"}, "authors": [{"authorId": + "1745123", "name": "C. Gershenson"}]}, {"paperId": "9406874d6741fba46ac2ee38026b672c7f60c0a0", "externalIds": {"DBLP": "journals/corr/abs-2108-03793", "ArXiv": "2108.03793", - "CorpusId": 236956537}, "url": "https://www.semanticscholar.org/paper/9406874d6741fba46ac2ee38026b672c7f60c0a0", + "CorpusId": 236956537}, "corpusId": 236956537, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9406874d6741fba46ac2ee38026b672c7f60c0a0", "title": "Toward Human-Level Artificial Intelligence", "abstract": "In this paper, we present our research on programming human-level arti\ufb01cial intelligence (HLAI), including 1) a de\ufb01nition of HLAI, 2) an environment to develop @@ -13450,24 +15448,30 @@ interactions: neocortex but the innate auxiliary units such hippocampus, reward system, instincts, and amygdala play critical roles, too.", "venue": "ArXiv", "year": 2021, "referenceCount": 67, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-08-09", "journal": {"volume": "abs/2108.03793", "name": - "ArXiv"}, "authors": [{"authorId": "143885555", "name": "Deokgun Park"}]}, - {"paperId": "90eb339453fc4ca0ed39a3fde86f207a2bc24100", "externalIds": {"DBLP": - "journals/mima/Montemayor21", "MAG": "3191895906", "DOI": "10.1007/s11023-021-09568-5", - "CorpusId": 238797340}, "url": "https://www.semanticscholar.org/paper/90eb339453fc4ca0ed39a3fde86f207a2bc24100", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-09", "journal": + {"volume": "abs/2108.03793", "name": "ArXiv"}, "authors": [{"authorId": "143885555", + "name": "Deokgun Park"}]}, {"paperId": "90eb339453fc4ca0ed39a3fde86f207a2bc24100", + "externalIds": {"DBLP": "journals/mima/Montemayor21", "MAG": "3191895906", + "DOI": "10.1007/s11023-021-09568-5", "CorpusId": 238797340}, "corpusId": 238797340, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/90eb339453fc4ca0ed39a3fde86f207a2bc24100", "title": "Language and Intelligence", "abstract": null, "venue": "Minds and Machines", "year": 2021, "referenceCount": 39, "citationCount": 1, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-08-08", "journal": {"volume": "31", "pages": "471 - - 486", "name": "Minds and Machines"}, "authors": [{"authorId": "144520696", - "name": "Carlos Montemayor"}]}, {"paperId": "a33b2e4f4ebc2d8256ee00840ef1cfb09a55df40", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-08", "journal": + {"volume": "31", "pages": "471 - 486", "name": "Minds and Machines"}, "authors": + [{"authorId": "144520696", "name": "Carlos Montemayor"}]}, {"paperId": "a33b2e4f4ebc2d8256ee00840ef1cfb09a55df40", "externalIds": {"DBLP": "journals/corr/abs-2108-03599", "ArXiv": "2108.03599", - "CorpusId": 236957301}, "url": "https://www.semanticscholar.org/paper/a33b2e4f4ebc2d8256ee00840ef1cfb09a55df40", + "CorpusId": 236957301}, "corpusId": 236957301, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a33b2e4f4ebc2d8256ee00840ef1cfb09a55df40", "title": "Identification of Play Styles in Universal Fighting Engine", "abstract": "AI-controlled characters in fighting games are expected to possess reasonably high skills and behave in a believable, human-like manner, exhibiting a diversity @@ -13557,17 +15561,17 @@ interactions: Being lists of probabilities, behavior fingerprints can be compared as vectors using cosine similarity, yielding a similarity ratio of [0, 1]:", "venue": "ArXiv", "year": 2021, "referenceCount": 14, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2021-08-08", "journal": {"volume": "abs/2108.03599", - "name": "ArXiv"}, "authors": [{"authorId": "1417585444", "name": "Kaori Yuda"}, - {"authorId": "2472741", "name": "Sho Kamei"}, {"authorId": "2122931567", "name": - "Riku Tanji"}, {"authorId": "32290176", "name": "Ryoya Ito"}, {"authorId": - "2122932793", "name": "Ippo Wakana"}, {"authorId": "49864675", "name": "M. - Mozgovoy"}]}, {"paperId": "4aad4792dff146f4cc13940baf8c35120ef02301", "externalIds": - {"DOI": "10.29121/granthaalayah.v9.i7.2021.4120", "CorpusId": 243251348}, - "url": "https://www.semanticscholar.org/paper/4aad4792dff146f4cc13940baf8c35120ef02301", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-08", + "journal": {"volume": "abs/2108.03599", "name": "ArXiv"}, "authors": [{"authorId": + "1417585444", "name": "Kaori Yuda"}, {"authorId": "2472741", "name": "Sho + Kamei"}, {"authorId": "2122931567", "name": "Riku Tanji"}, {"authorId": "32290176", + "name": "Ryoya Ito"}, {"authorId": "2122932793", "name": "Ippo Wakana"}, {"authorId": + "49864675", "name": "M. Mozgovoy"}]}, {"paperId": "4aad4792dff146f4cc13940baf8c35120ef02301", + "externalIds": {"DOI": "10.29121/granthaalayah.v9.i7.2021.4120", "CorpusId": + 243251348}, "corpusId": 243251348, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4aad4792dff146f4cc13940baf8c35120ef02301", "title": "MACHINE LEARNING: AN OVERVIEW", "abstract": "Given the tremendous availability of data and computer power, there is a resurgence of interest in using data driven machine learning methods to solve issues where traditional @@ -13578,24 +15582,31 @@ interactions: main point of difference between the field of artificial intelligence and machine learning.", "venue": "International Journal of Research -GRANTHAALAYAH", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2021-08-07", "journal": {"name": "International Journal - of Research -GRANTHAALAYAH"}, "authors": [{"authorId": "2139376017", "name": - "Adya Trisal"}, {"authorId": "12557117", "name": "D. Mandloi"}]}, {"paperId": - "28d3d48b7e151577d56809d80555936659028435", "externalIds": {"DOI": "10.1016/j.tics.2021.07.006", - "CorpusId": 237448417, "PubMed": "34509366"}, "url": "https://www.semanticscholar.org/paper/28d3d48b7e151577d56809d80555936659028435", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.granthaalayahpublication.org/journals/granthaalayah/article/download/4120/4214", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-08-07", "journal": {"name": "International Journal of Research -GRANTHAALAYAH"}, + "authors": [{"authorId": "2139376017", "name": "Adya Trisal"}, {"authorId": + "12557117", "name": "D. Mandloi"}]}, {"paperId": "28d3d48b7e151577d56809d80555936659028435", + "externalIds": {"DOI": "10.1016/j.tics.2021.07.006", "CorpusId": 237448417, + "PubMed": "34509366"}, "corpusId": 237448417, "publicationVenue": {"id": "20cb626a-518d-4016-826a-0157cf2f8fd6", + "name": "Trends in Cognitive Sciences", "type": "journal", "alternate_names": + ["Trends Cogn Sci"], "issn": "1364-6613", "url": "https://www.cell.com/trends/cognitive-sciences/home", + "alternate_urls": ["http://www.cell.com/trends/cognitive-sciences/home", "https://www.journals.elsevier.com/trends-in-cognitive-sciences", + "http://www.sciencedirect.com/science/journal/13646613"]}, "url": "https://www.semanticscholar.org/paper/28d3d48b7e151577d56809d80555936659028435", "title": "Dual coding of knowledge in the human brain", "abstract": null, "venue": "Trends in Cognitive Sciences", "year": 2021, "referenceCount": 104, - "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, + "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.cell.com/article/S1364661321001765/pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-08-06", "journal": {"volume": "25", "pages": "883-895", "name": "Trends in Cognitive Sciences"}, "authors": [{"authorId": "2087546", "name": "Y. Bi"}]}, {"paperId": "c2fe9a476ac2f16d364799eb0055777af0a87ab3", "externalIds": {"MAG": "3196172113", "DOI": "10.1093/oso/9780192894076.003.0016", - "CorpusId": 238841168}, "url": "https://www.semanticscholar.org/paper/c2fe9a476ac2f16d364799eb0055777af0a87ab3", + "CorpusId": 238841168}, "corpusId": 238841168, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c2fe9a476ac2f16d364799eb0055777af0a87ab3", "title": "How Much Moral Status Could Artificial Intelligence Ever Achieve?", "abstract": "Philosophers often argue about whether fetuses, animals, or AI systems do or do not have moral status. We will suggest instead that different @@ -13604,43 +15615,47 @@ interactions: this variability of moral status will help to resolve some but not all debates about the potential moral status of AI systems in particular.", "venue": "Rethinking Moral Status", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-08-05", - "journal": {"name": "Rethinking Moral Status"}, "authors": [{"authorId": "1422133662", - "name": "Walter Sinnott-Armstrong"}, {"authorId": "1749906", "name": "V. Conitzer"}]}, - {"paperId": "d6f96888d28a259fcb16d861c0ad8f5e77a618ff", "externalIds": {"DBLP": - "journals/corr/abs-2108-01591", "ArXiv": "2108.01591", "MAG": "3003122703", - "DOI": "10.1016/b978-0-12-818366-3.00010-1", "CorpusId": 212814987}, "url": - "https://www.semanticscholar.org/paper/d6f96888d28a259fcb16d861c0ad8f5e77a618ff", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-08-05", "journal": {"name": "Rethinking Moral Status"}, "authors": [{"authorId": + "1422133662", "name": "Walter Sinnott-Armstrong"}, {"authorId": "1749906", + "name": "V. Conitzer"}]}, {"paperId": "d6f96888d28a259fcb16d861c0ad8f5e77a618ff", + "externalIds": {"DBLP": "journals/corr/abs-2108-01591", "ArXiv": "2108.01591", + "MAG": "3003122703", "DOI": "10.1016/b978-0-12-818366-3.00010-1", "CorpusId": + 212814987}, "corpusId": 212814987, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d6f96888d28a259fcb16d861c0ad8f5e77a618ff", "title": "The application of artificial intelligence in software engineering: a review challenging conventional wisdom", "abstract": null, "venue": "ArXiv", "year": 2021, "referenceCount": 187, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2021-08-03", "journal": {"volume": "abs/2108.01591", - "name": "ArXiv"}, "authors": [{"authorId": "144105786", "name": "Feras A. - Batarseh"}, {"authorId": "134659451", "name": "Rasika Mohod"}, {"authorId": - "2143576061", "name": "Abhinav Kumar"}, {"authorId": "152797675", "name": - "Justin Bui"}]}, {"paperId": "727f4397ed0068575b7c538d2cedf32f5db4d9a7", "externalIds": - {"MAG": "3198357836", "DOI": "10.1016/j.jbef.2021.100577", "CorpusId": 239705950}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-08-03", + "journal": {"volume": "abs/2108.01591", "name": "ArXiv"}, "authors": [{"authorId": + "144105786", "name": "Feras A. Batarseh"}, {"authorId": "134659451", "name": + "Rasika Mohod"}, {"authorId": "2143576061", "name": "Abhinav Kumar"}, {"authorId": + "152797675", "name": "Justin Bui"}]}, {"paperId": "727f4397ed0068575b7c538d2cedf32f5db4d9a7", + "externalIds": {"MAG": "3198357836", "DOI": "10.1016/j.jbef.2021.100577", + "CorpusId": 239705950}, "corpusId": 239705950, "publicationVenue": {"id": + "1e8e43f2-04a2-4045-9358-6a9a801265a6", "name": "Journal of Behavioral and + Experimental Finance", "type": "journal", "alternate_names": ["J Behav Exp + Finance"], "issn": "2214-6350", "url": "https://www.journals.elsevier.com/journal-of-behavioral-and-experimental-finance/"}, "url": "https://www.semanticscholar.org/paper/727f4397ed0068575b7c538d2cedf32f5db4d9a7", "title": "Artificial intelligence and machine learning in finance: Identifying foundations, themes, and research clusters from bibliometric analysis", "abstract": null, "venue": "Journal of Behavioral and Experimental Finance", "year": 2021, - "referenceCount": 125, "citationCount": 62, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-08-01", "journal": - {"name": "Journal of Behavioral and Experimental Finance"}, "authors": [{"authorId": - "92198014", "name": "John W. Goodell"}, {"authorId": "2109647517", "name": - "Satish Kumar"}, {"authorId": "3139520", "name": "Weng Marc Lim"}, {"authorId": - "119982325", "name": "Debidutta Pattnaik"}]}, {"paperId": "566440d51c4e095521aeb9668af54e2758634939", + "referenceCount": 125, "citationCount": 65, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-08-01", + "journal": {"name": "Journal of Behavioral and Experimental Finance"}, "authors": + [{"authorId": "92198014", "name": "John W. Goodell"}, {"authorId": "2109647517", + "name": "Satish Kumar"}, {"authorId": "3139520", "name": "Weng Marc Lim"}, + {"authorId": "119982325", "name": "Debidutta Pattnaik"}]}, {"paperId": "566440d51c4e095521aeb9668af54e2758634939", "externalIds": {"PubMedCentral": "8404921", "DBLP": "journals/jimaging/HudakyLK21", "DOI": "10.3390/jimaging7080152", "CorpusId": 238479484, "PubMed": "34460788"}, - "url": "https://www.semanticscholar.org/paper/566440d51c4e095521aeb9668af54e2758634939", + "corpusId": 238479484, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/566440d51c4e095521aeb9668af54e2758634939", "title": "A Novel Methodology for Measuring the Abstraction Capabilities of Image Recognition Algorithms", "abstract": "Creating a widely excepted model on the measure of intelligence became inevitable due to the existence of an @@ -13656,26 +15671,29 @@ interactions: able to learn most of the transformations examined. The method can be applied to any image recognition software to test its abstraction capabilities.", "venue": "J. Imaging", "year": 2021, "referenceCount": 36, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-08-01", "journal": {"volume": "7", "name": "Journal - of Imaging"}, "authors": [{"authorId": "2131415817", "name": "M\u00e1rton - Gyula Hud\u00e1ky"}, {"authorId": "1411121900", "name": "P. Lehotay-K\u00e9ry"}, - {"authorId": "144936562", "name": "A. Kiss"}]}, {"paperId": "3beee2d8d9beeb01f0ef14d100e004c4bb988144", - "externalIds": {"MAG": "3188291252", "DOI": "10.48146/odusobiad.908134", "CorpusId": - 238792525}, "url": "https://www.semanticscholar.org/paper/3beee2d8d9beeb01f0ef14d100e004c4bb988144", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2313-433X/7/8/152/pdf", "status": null}, "fieldsOfStudy": + ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-08-01", "journal": {"volume": + "7", "name": "Journal of Imaging"}, "authors": [{"authorId": "2131415817", + "name": "M\u00e1rton Gyula Hud\u00e1ky"}, {"authorId": "1411121900", "name": + "P. Lehotay-K\u00e9ry"}, {"authorId": "144936562", "name": "A. Kiss"}]}, {"paperId": + "3beee2d8d9beeb01f0ef14d100e004c4bb988144", "externalIds": {"MAG": "3188291252", + "DOI": "10.48146/odusobiad.908134", "CorpusId": 238792525}, "corpusId": 238792525, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3beee2d8d9beeb01f0ef14d100e004c4bb988144", "title": "Yapay Zek\u00e2ya Ne \u00d6\u011fretiyoruz?", "abstract": null, "venue": "OD\u00dc Sosyal Bilimler Ara\u015ft\u0131rmalar\u0131 Dergisi (OD\u00dcSOB\u0130AD)", "year": 2021, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1678823", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-07-30", "journal": {"name": "OD\u00dc Sosyal Bilimler Ara\u015ft\u0131rmalar\u0131 Dergisi (OD\u00dcSOB\u0130AD)"}, "authors": [{"authorId": "2172008242", "name": "Elif \u00c7an\u011fa Bayer"}]}, {"paperId": "c95cf4e736b4b1cfdf370f0a03b5875fe2777f91", "externalIds": {"MAG": "3186406163", - "DOI": "10.24143/2072-9502-2021-3-105-114", "CorpusId": 237700205}, "url": - "https://www.semanticscholar.org/paper/c95cf4e736b4b1cfdf370f0a03b5875fe2777f91", + "DOI": "10.24143/2072-9502-2021-3-105-114", "CorpusId": 237700205}, "corpusId": + 237700205, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c95cf4e736b4b1cfdf370f0a03b5875fe2777f91", "title": "BUILDING UP SCHEDULES IN MULTIPROJECT DESIGN MANAGEMENT SYSTEMS", "abstract": "The article focuses on the problem of algorithmizing the process of building schedules in various spheres of human activity by using the modern @@ -13692,9 +15710,10 @@ interactions: which is relevant for the development of new generation software and tools", "venue": "Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics", "year": 2021, "referenceCount": 3, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://vestnik.astu.org/en/storage/download/73850", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-30", "journal": {"name": "Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics"}, "authors": [{"authorId": "2057773316", "name": @@ -13702,7 +15721,11 @@ interactions: {"authorId": "1577039449", "name": "Alexander Sergeyevich Koynov"}]}, {"paperId": "c0a4bd5029abf13510f623ee242687594424c45b", "externalIds": {"PubMedCentral": "8445629", "DOI": "10.18053/jctres.07.202104.012", "CorpusId": 237555158, - "PubMed": "34541366"}, "url": "https://www.semanticscholar.org/paper/c0a4bd5029abf13510f623ee242687594424c45b", + "PubMed": "34541366"}, "corpusId": 237555158, "publicationVenue": {"id": "f1171357-7ba5-4560-b4e6-b43e3a4299e8", + "name": "Journal of Clinical and Translational Research", "type": "journal", + "alternate_names": ["J Clin Transl Res"], "issn": "2382-6533", "alternate_issns": + ["2424-810X"], "url": "http://www.jctres.com/", "alternate_urls": ["https://www.jctres.com/en/"]}, + "url": "https://www.semanticscholar.org/paper/c0a4bd5029abf13510f623ee242687594424c45b", "title": "Scope and challenges of machine learning-based diagnosis and prognosis in clinical dentistry: A literature review", "abstract": "Background: Machine learning (ML) has emerged as a branch of artificial intelligence dealing with @@ -13720,41 +15743,57 @@ interactions: associated with using these tools to effectively use them in dental services and ensure a higher quality of care for patients.", "venue": "Journal of Clinical and Translational Research", "year": 2021, "referenceCount": 116, "citationCount": - 4, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2021-07-30", "journal": {"volume": "7", "pages": "523 - - 539", "name": "Journal of Clinical and Translational Research"}, "authors": - [{"authorId": "2065377627", "name": "Lilian Toledo Reyes"}, {"authorId": "51062504", - "name": "J. Knorst"}, {"authorId": "46505576", "name": "F. R. Ortiz"}, {"authorId": - "6443491", "name": "T. Ardenghi"}]}, {"paperId": "00101c3e8bccd09098231f23b34156ac5d47f665", - "externalIds": {"PubMedCentral": "8376694", "DOI": "10.1007/s11033-021-06594-5", - "CorpusId": 236471170, "PubMed": "34318436"}, "url": "https://www.semanticscholar.org/paper/00101c3e8bccd09098231f23b34156ac5d47f665", + 4, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.jctres.com/media/downloads/jctres07202104012/jclintranslres-2021-7-4-523.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-07-30", + "journal": {"volume": "7", "pages": "523 - 539", "name": "Journal of Clinical + and Translational Research"}, "authors": [{"authorId": "2065377627", "name": + "Lilian Toledo Reyes"}, {"authorId": "51062504", "name": "J. Knorst"}, {"authorId": + "46505576", "name": "F. R. Ortiz"}, {"authorId": "6443491", "name": "T. Ardenghi"}]}, + {"paperId": "00101c3e8bccd09098231f23b34156ac5d47f665", "externalIds": {"PubMedCentral": + "8376694", "DOI": "10.1007/s11033-021-06594-5", "CorpusId": 236471170, "PubMed": + "34318436"}, "corpusId": 236471170, "publicationVenue": {"id": "906c9928-c8e5-4d4c-9d82-d7904db0adff", + "name": "Molecular Biology Reports", "type": "journal", "alternate_names": + ["Mol Biology Rep"], "issn": "0301-4851", "url": "http://www.springer.com/journal/11033/about", + "alternate_urls": ["https://link.springer.com/journal/11033"]}, "url": "https://www.semanticscholar.org/paper/00101c3e8bccd09098231f23b34156ac5d47f665", "title": "What is life?", "abstract": null, "venue": "Molecular Biology Reports", "year": 2021, "referenceCount": 63, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-07-27", "journal": {"volume": "48", "pages": "6223 - 6230", "name": - "Molecular Biology Reports"}, "authors": [{"authorId": "1438248906", "name": - "J. G\u00f3mez-M\u00e1rquez"}]}, {"paperId": "31048ab803d29b293007f2997651e3e9ad219cfe", - "externalIds": {"PubMedCentral": "8299670", "DBLP": "journals/midm/SalemSLA21", - "DOI": "10.1186/s12911-021-01585-9", "CorpusId": 236181504, "PubMed": "34294092"}, - "url": "https://www.semanticscholar.org/paper/31048ab803d29b293007f2997651e3e9ad219cfe", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11033-021-06594-5.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-27", "journal": + {"volume": "48", "pages": "6223 - 6230", "name": "Molecular Biology Reports"}, + "authors": [{"authorId": "1438248906", "name": "J. G\u00f3mez-M\u00e1rquez"}]}, + {"paperId": "31048ab803d29b293007f2997651e3e9ad219cfe", "externalIds": {"PubMedCentral": + "8299670", "DBLP": "journals/midm/SalemSLA21", "DOI": "10.1186/s12911-021-01585-9", + "CorpusId": 236181504, "PubMed": "34294092"}, "corpusId": 236181504, "publicationVenue": + {"id": "76da9cc5-c5a7-42b4-a250-3e708c5f4980", "name": "BMC Medical Informatics + and Decision Making", "type": "journal", "alternate_names": ["BMC Med Informatics + Decis Mak"], "issn": "1472-6947", "url": "http://www.biomedcentral.com/bmcmedinformdecismak/", + "alternate_urls": ["https://bmcmedinformdecismak.biomedcentral.com/", "https://link.springer.com/journal/12911", + "http://www.pubmedcentral.nih.gov/tocrender.fcgi?journal=42"]}, "url": "https://www.semanticscholar.org/paper/31048ab803d29b293007f2997651e3e9ad219cfe", "title": "A systematic review of the applications of Expert Systems (ES) and machine learning (ML) in clinical urology", "abstract": null, "venue": "BMC Medical Informatics and Decision Making", "year": 2021, "referenceCount": 191, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2021-07-22", "journal": - {"volume": "21", "name": "BMC Medical Informatics and Decision Making"}, "authors": - [{"authorId": "143818898", "name": "H. Salem"}, {"authorId": "2223827", "name": - "D. Soria"}, {"authorId": "31051376", "name": "J. Lund"}, {"authorId": "1859837", - "name": "A. Awwad"}]}, {"paperId": "d257492a35505b9cde4ea752636b770c989caf53", + "openAccessPdf": {"url": "https://bmcmedinformdecismak.biomedcentral.com/counter/pdf/10.1186/s12911-021-01585-9", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-07-22", + "journal": {"volume": "21", "name": "BMC Medical Informatics and Decision + Making"}, "authors": [{"authorId": "143818898", "name": "H. Salem"}, {"authorId": + "2223827", "name": "D. Soria"}, {"authorId": "31051376", "name": "J. Lund"}, + {"authorId": "1859837", "name": "A. Awwad"}]}, {"paperId": "d257492a35505b9cde4ea752636b770c989caf53", "externalIds": {"DBLP": "conf/aies/BenthallG21", "DOI": "10.1145/3461702.3462526", - "CorpusId": 236519412}, "url": "https://www.semanticscholar.org/paper/d257492a35505b9cde4ea752636b770c989caf53", + "CorpusId": 236519412}, "corpusId": 236519412, "publicationVenue": {"id": + "ace94611-0469-4818-ae70-43bdb8082d73", "name": "AAAI/ACM Conference on AI, + Ethics, and Society", "type": "conference", "alternate_names": ["AAAI/ACM + conference Artificial Intelligence, Ethics, and Society", "AIES", "AAAI/ACM + Conf AI Ethics Soc", "AAAI/ACM conf Artif Intell Ethics Soc", "AIES "]}, "url": + "https://www.semanticscholar.org/paper/d257492a35505b9cde4ea752636b770c989caf53", "title": "Artificial Intelligence and the Purpose of Social Systems", "abstract": "The law and ethics of Western democratic states have their basis in liberalism. This extends to regulation and ethical discussion of technology and businesses @@ -13777,14 +15816,19 @@ interactions: model of a social system that could form and maintain its own autonomous purpose.", "venue": "AAAI/ACM Conference on AI, Ethics, and Society", "year": 2021, "referenceCount": 122, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2021-07-21", - "journal": {"name": "Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, - and Society"}, "authors": [{"authorId": "2862008", "name": "Sebastian Benthall"}, - {"authorId": "35476017", "name": "Jake Goldenfein"}]}, {"paperId": "0fc477d3a2340e663e4eafbee520566c1bf8bcb1", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], + "publicationDate": "2021-07-21", "journal": {"name": "Proceedings of the 2021 + AAAI/ACM Conference on AI, Ethics, and Society"}, "authors": [{"authorId": + "2862008", "name": "Sebastian Benthall"}, {"authorId": "35476017", "name": + "Jake Goldenfein"}]}, {"paperId": "0fc477d3a2340e663e4eafbee520566c1bf8bcb1", "externalIds": {"MAG": "3183468961", "DOI": "10.7592/EJHR2021.9.2.443", "CorpusId": - 237714297}, "url": "https://www.semanticscholar.org/paper/0fc477d3a2340e663e4eafbee520566c1bf8bcb1", + 237714297}, "corpusId": 237714297, "publicationVenue": {"id": "f1825969-5ea4-4dd9-9c8d-3b064b968112", + "name": "The European Journal of Humour Research", "type": "journal", "alternate_names": + ["Eur J Humour Res"], "issn": "2307-700X", "url": "http://europeanjournalofhumour.org/", + "alternate_urls": ["http://www.europeanjournalofhumour.org/index.php/ejhr"]}, + "url": "https://www.semanticscholar.org/paper/0fc477d3a2340e663e4eafbee520566c1bf8bcb1", "title": "Laughing with machines", "abstract": "This article will analyse the preconditions of sense of humour for artificial intelligence. Can artificial intelligence have a sense of humour? Is there a difference between human and @@ -13801,25 +15845,33 @@ interactions: sense of humour. These principles are: 1) worldview, 2) self-consciousness, 3) self-reflection, 4) self-criticism, and 5) losing control.", "venue": "The European Journal of Humour Research", "year": 2021, "referenceCount": 43, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2021-07-20", "journal": {"name": "The European Journal - of Humour Research"}, "authors": [{"authorId": "114685585", "name": "Jarno - Hietalahti"}]}, {"paperId": "8ea90aa14f2ccf8cd7f3132d99d5a3da8e795bf8", "externalIds": - {"DBLP": "journals/ais/Massey21", "PubMedCentral": "8287117", "DOI": "10.1007/s00146-021-01242-9", - "CorpusId": 236136409, "PubMed": "34305334"}, "url": "https://www.semanticscholar.org/paper/8ea90aa14f2ccf8cd7f3132d99d5a3da8e795bf8", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.europeanjournalofhumour.org/ejhr/article/download/443/531", + "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-07-20", "journal": {"name": + "The European Journal of Humour Research"}, "authors": [{"authorId": "114685585", + "name": "Jarno Hietalahti"}]}, {"paperId": "8ea90aa14f2ccf8cd7f3132d99d5a3da8e795bf8", + "externalIds": {"DBLP": "journals/ais/Massey21", "PubMedCentral": "8287117", + "DOI": "10.1007/s00146-021-01242-9", "CorpusId": 236136409, "PubMed": "34305334"}, + "corpusId": 236136409, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", + "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, + "url": "https://www.semanticscholar.org/paper/8ea90aa14f2ccf8cd7f3132d99d5a3da8e795bf8", "title": "A new Turing test: metaphor vs. nonsense", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 22, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-07-19", "journal": {"volume": "36", "pages": "677 - 684", "name": "Ai - & Society"}, "authors": [{"authorId": "49517549", "name": "I. Massey"}]}, - {"paperId": "8f5d0401b17f9665cabba58a47682ca9360102f2", "externalIds": {"DBLP": - "conf/isalalife/Cejkova21", "MAG": "3183646739", "DOI": "10.1162/isal_e_00468", - "CorpusId": 237643729}, "url": "https://www.semanticscholar.org/paper/8f5d0401b17f9665cabba58a47682ca9360102f2", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01242-9.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-19", "journal": + {"volume": "36", "pages": "677 - 684", "name": "Ai & Society"}, "authors": + [{"authorId": "49517549", "name": "I. Massey"}]}, {"paperId": "8f5d0401b17f9665cabba58a47682ca9360102f2", + "externalIds": {"DBLP": "conf/isalalife/Cejkova21", "MAG": "3183646739", "DOI": + "10.1162/isal_e_00468", "CorpusId": 237643729}, "corpusId": 237643729, "publicationVenue": + {"id": "43397d64-0997-46ca-8396-7ca707887a5c", "name": "IEEE Symposium on + Artificial Life", "type": "conference", "alternate_names": ["ALIFE", "Workshop + on the Synthesis and Simulation of Living Systems", "Workshop Synth Simul + Living Syst", "IEEE Symp Artif Life"]}, "url": "https://www.semanticscholar.org/paper/8f5d0401b17f9665cabba58a47682ca9360102f2", "title": "Robots: The century past and the century ahead, an Introduction to the 2021 ALIFE conference", "abstract": "The theme of ALIFE 2021 conference is \u201dRobots: The cen- tury past and the century ahead\u201d , because @@ -13832,14 +15884,18 @@ interactions: and its legacy to current research discussed, namely in the context of the \ufb01eld of arti\ufb01cial life.", "venue": "IEEE Symposium on Artificial Life", "year": 2021, "referenceCount": 9, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-07-19", "journal": {"pages": "5"}, "authors": [{"authorId": "2250782", - "name": "J. \u010cejkov\u00e1"}]}, {"paperId": "5f0772948c5bd2240c94538456eed7f58b3d8400", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-07-19", "journal": {"pages": "5"}, "authors": [{"authorId": + "2250782", "name": "J. \u010cejkov\u00e1"}]}, {"paperId": "5f0772948c5bd2240c94538456eed7f58b3d8400", "externalIds": {"MAG": "3183156576", "DOI": "10.1080/09515089.2021.1951195", - "CorpusId": 237676499}, "url": "https://www.semanticscholar.org/paper/5f0772948c5bd2240c94538456eed7f58b3d8400", + "CorpusId": 237676499}, "corpusId": 237676499, "publicationVenue": {"id": + "1997a543-39c3-403f-b425-459a18eb0f71", "name": "Philosophical Psychology", + "type": "journal", "alternate_names": ["Philos Psychol"], "issn": "0951-5089", + "url": "http://www.tandfonline.com/loi/cphp20", "alternate_urls": ["http://www.tandfonline.com/toc/cphp20/current"]}, + "url": "https://www.semanticscholar.org/paper/5f0772948c5bd2240c94538456eed7f58b3d8400", "title": "Exploring the structure of mental action in directed thought", "abstract": "ABSTRACT While the general topic of agency has been collaboratively explored in philosophy and psychology, mental action seems to resist such an interdisciplinary @@ -13860,13 +15916,18 @@ interactions: assigning an agentive status to the activities studied and hence for a more significant role of mental action in cognitive processes.", "venue": "Philosophical Psychology", "year": 2021, "referenceCount": 74, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-18", - "journal": {"volume": "35", "pages": "145 - 176", "name": "Philosophical Psychology"}, - "authors": [{"authorId": "31453852", "name": "Johannes Wagemann"}]}, {"paperId": - "2d2b0b8cc25751b4c60361f3a8d8887441be2fdc", "externalIds": {"DBLP": "conf/ijcnn/Weng21", - "DOI": "10.1109/IJCNN52387.2021.9533558", "CorpusId": 237599831}, "url": "https://www.semanticscholar.org/paper/2d2b0b8cc25751b4c60361f3a8d8887441be2fdc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-07-18", "journal": {"volume": "35", "pages": "145 - 176", "name": "Philosophical + Psychology"}, "authors": [{"authorId": "31453852", "name": "Johannes Wagemann"}]}, + {"paperId": "2d2b0b8cc25751b4c60361f3a8d8887441be2fdc", "externalIds": {"DBLP": + "conf/ijcnn/Weng21", "DOI": "10.1109/IJCNN52387.2021.9533558", "CorpusId": + 237599831}, "corpusId": 237599831, "publicationVenue": {"id": "f80ba4a3-7aed-4021-b4d8-e4f50668847a", + "name": "IEEE International Joint Conference on Neural Network", "type": "conference", + "alternate_names": ["IJCNN", "IEEE Int Jt Conf Neural Netw", "Int Jt Conf + Neural Netw", "International Joint Conference on Neural Network"], "url": + "http://www.wikicfp.com/cfp/program?id=1573"}, "url": "https://www.semanticscholar.org/paper/2d2b0b8cc25751b4c60361f3a8d8887441be2fdc", "title": "On Post Selection Using Test Sets (PSUTS) in AI", "abstract": "This is a theory paper. It first raises a rarely reported but unethical practice in Artificial Intelligence (AI) called Post Selection Using Test Sets (PSUTS). @@ -13886,15 +15947,16 @@ interactions: along with Three Conditions: (1) system restrictions, (2) training experience and (3) computational resources.", "venue": "IEEE International Joint Conference on Neural Network", "year": 2021, "referenceCount": 33, "citationCount": 13, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-07-18", - "journal": {"pages": "1-8", "name": "2021 International Joint Conference on - Neural Networks (IJCNN)"}, "authors": [{"authorId": "145926447", "name": "J. - Weng"}]}, {"paperId": "1e00c5b6b3f04f901632095f51dc687f2fb19c57", "externalIds": - {"DBLP": "conf/ijcnn/SiddiquiRR21", "DOI": "10.1109/IJCNN52387.2021.9533870", - "CorpusId": 237600226}, "url": "https://www.semanticscholar.org/paper/1e00c5b6b3f04f901632095f51dc687f2fb19c57", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2021-07-18", "journal": {"pages": "1-8", "name": "2021 International Joint + Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "145926447", + "name": "J. Weng"}]}, {"paperId": "1e00c5b6b3f04f901632095f51dc687f2fb19c57", + "externalIds": {"DBLP": "conf/ijcnn/SiddiquiRR21", "DOI": "10.1109/IJCNN52387.2021.9533870", + "CorpusId": 237600226}, "corpusId": 237600226, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1e00c5b6b3f04f901632095f51dc687f2fb19c57", "title": "The Case Against Sentiment Analysis for Natural Text", "abstract": "Natural language processing is a broad field that encompasses several sub-tasks. One problem that has gained visibility over the past several years is that @@ -13913,16 +15975,17 @@ interactions: the largest companies in this field: Amazon, Google and IBM.", "venue": "2021 International Joint Conference on Neural Networks (IJCNN)", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", - "Review"], "publicationDate": "2021-07-18", "journal": {"pages": "1-8", "name": - "2021 International Joint Conference on Neural Networks (IJCNN)"}, "authors": - [{"authorId": "2056676503", "name": "Shamoon Siddiqui"}, {"authorId": "145129130", - "name": "G. Rasool"}, {"authorId": "46819079", "name": "R. P. Ramachandran"}]}, - {"paperId": "5254bd6193de3e6cab58f271d789552281435761", "externalIds": {"DBLP": - "conf/ijcnn/WuZW21", "DOI": "10.1109/IJCNN52387.2021.9533936", "CorpusId": - 237598847}, "url": "https://www.semanticscholar.org/paper/5254bd6193de3e6cab58f271d789552281435761", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference", "Review"], "publicationDate": "2021-07-18", "journal": {"pages": + "1-8", "name": "2021 International Joint Conference on Neural Networks (IJCNN)"}, + "authors": [{"authorId": "2056676503", "name": "Shamoon Siddiqui"}, {"authorId": + "145129130", "name": "G. Rasool"}, {"authorId": "46819079", "name": "R. P. + Ramachandran"}]}, {"paperId": "5254bd6193de3e6cab58f271d789552281435761", + "externalIds": {"DBLP": "conf/ijcnn/WuZW21", "DOI": "10.1109/IJCNN52387.2021.9533936", + "CorpusId": 237598847}, "corpusId": 237598847, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5254bd6193de3e6cab58f271d789552281435761", "title": "On Machine Thinking", "abstract": "Artificial Intelligence (AI) has made much progress, but the existing paradigm for AI is still basically pattern recognition based on a human-handcrafted representation. An AI paradigm @@ -13936,15 +15999,18 @@ interactions: for simulated new mazes in disjoint tests.", "venue": "2021 International Joint Conference on Neural Networks (IJCNN)", "year": 2021, "referenceCount": 17, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2021-07-18", "journal": {"pages": "1-8", "name": "2021 International Joint - Conference on Neural Networks (IJCNN)"}, "authors": [{"authorId": "2108404228", - "name": "Xiang Wu"}, {"authorId": "2010802", "name": "Zejia Zheng"}, {"authorId": - "145926447", "name": "J. Weng"}]}, {"paperId": "6e5e5df43735c0fa79a9b8699e3e7e9104988470", - "externalIds": {"MAG": "3189483222", "DOI": "10.21203/rs.3.rs-690643/v1", - "CorpusId": 238759276}, "url": "https://www.semanticscholar.org/paper/6e5e5df43735c0fa79a9b8699e3e7e9104988470", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2021-07-18", "journal": {"pages": "1-8", + "name": "2021 International Joint Conference on Neural Networks (IJCNN)"}, + "authors": [{"authorId": "2108404228", "name": "Xiang Wu"}, {"authorId": "2010802", + "name": "Zejia Zheng"}, {"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": + "6e5e5df43735c0fa79a9b8699e3e7e9104988470", "externalIds": {"MAG": "3189483222", + "DOI": "10.21203/rs.3.rs-690643/v1", "CorpusId": 238759276}, "corpusId": 238759276, + "publicationVenue": {"id": "ad807377-7bce-4dba-8b2a-02cc9a01e274", "name": + "Journal of Robotics and Automation Research", "type": "journal", "alternate_names": + ["J Robot Autom Res"], "issn": "2831-6789"}, "url": "https://www.semanticscholar.org/paper/6e5e5df43735c0fa79a9b8699e3e7e9104988470", "title": "The Logic Fundamentals of Machine Consciousness: Theory of Tri-State", "abstract": "\n For a long time, the system of scientific methodology has been composed of logic, empirical (falsification), qualitative, quantitative @@ -13968,15 +16034,17 @@ interactions: different space-time dimensions, and gives an experimental idea of \u201ckindergarten game\u201d by comparing Turing''s \u201cimitation game\u201d.", "venue": "Journal of Robotics and Automation Research", "year": 2021, "referenceCount": 57, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-07-15", "journal": {"name": - "Journal of Robotics and Automation Research"}, "authors": [{"authorId": "1945419094", - "name": "Zhiwei Wang"}, {"authorId": "2135330227", "name": "Ao Zhou"}, {"authorId": - "2146074363", "name": "Xin Liu"}]}, {"paperId": "e7735be4f0fc427515fd7206ebc714356b97e71a", - "externalIds": {"ArXiv": "2107.07002", "DBLP": "journals/corr/abs-2107-07002", - "CorpusId": 235810239}, "url": "https://www.semanticscholar.org/paper/e7735be4f0fc427515fd7206ebc714356b97e71a", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.researchsquare.com/article/rs-690643/latest.pdf", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-15", + "journal": {"name": "Journal of Robotics and Automation Research"}, "authors": + [{"authorId": "1945419094", "name": "Zhiwei Wang"}, {"authorId": "2135330227", + "name": "Ao Zhou"}, {"authorId": "2146074363", "name": "Xin Liu"}]}, {"paperId": + "e7735be4f0fc427515fd7206ebc714356b97e71a", "externalIds": {"ArXiv": "2107.07002", + "DBLP": "journals/corr/abs-2107-07002", "CorpusId": 235810239}, "corpusId": + 235810239, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e7735be4f0fc427515fd7206ebc714356b97e71a", "title": "The Benchmark Lottery", "abstract": "The world of empirical machine learning (ML) strongly relies on benchmarks in 1 order to determine the relative effectiveness of different algorithms and methods. 2 This paper proposes the @@ -13994,41 +16062,50 @@ interactions: multiple machine learning domains 13 and communities as use cases, including natural language processing, computer 14 vision, information retrieval, recommender systems, and reinforcement learning. 15", "venue": "ArXiv", "year": 2021, - "referenceCount": 118, "citationCount": 40, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-07-14", "journal": {"volume": "abs/2107.07002", "name": - "ArXiv"}, "authors": [{"authorId": "3226635", "name": "M. Dehghani"}, {"authorId": - "144447820", "name": "Yi Tay"}, {"authorId": "2194424", "name": "A. Gritsenko"}, - {"authorId": "48634137", "name": "Zhe Zhao"}, {"authorId": "2815290", "name": - "N. Houlsby"}, {"authorId": "145472333", "name": "Fernando Diaz"}, {"authorId": - "47193990", "name": "Donald Metzler"}, {"authorId": "1689108", "name": "Oriol - Vinyals"}]}, {"paperId": "37adf4ae06495e2583e2568fb439ebf3e45bc0c2", "externalIds": - {"PubMedCentral": "8340130", "DOI": "10.1016/j.isci.2021.102853", "CorpusId": - 236975594, "PubMed": "34381977"}, "url": "https://www.semanticscholar.org/paper/37adf4ae06495e2583e2568fb439ebf3e45bc0c2", + "referenceCount": 118, "citationCount": 41, "influentialCitationCount": 4, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-14", "journal": + {"volume": "abs/2107.07002", "name": "ArXiv"}, "authors": [{"authorId": "3226635", + "name": "M. Dehghani"}, {"authorId": "144447820", "name": "Yi Tay"}, {"authorId": + "2194424", "name": "A. Gritsenko"}, {"authorId": "48634137", "name": "Zhe + Zhao"}, {"authorId": "2815290", "name": "N. Houlsby"}, {"authorId": "145472333", + "name": "Fernando Diaz"}, {"authorId": "47193990", "name": "Donald Metzler"}, + {"authorId": "1689108", "name": "Oriol Vinyals"}]}, {"paperId": "37adf4ae06495e2583e2568fb439ebf3e45bc0c2", + "externalIds": {"PubMedCentral": "8340130", "DOI": "10.1016/j.isci.2021.102853", + "CorpusId": 236975594, "PubMed": "34381977"}, "corpusId": 236975594, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/37adf4ae06495e2583e2568fb439ebf3e45bc0c2", "title": "The evolutionary origin of Bayesian heuristics and finite memory", "abstract": null, "venue": "iScience", "year": 2021, "referenceCount": 109, - "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-07-13", "journal": {"volume": "24", "name": "iScience"}, - "authors": [{"authorId": "118887609", "name": "A. Lo"}, {"authorId": "5652285", - "name": "Ruixun Zhang"}]}, {"paperId": "a7f2a527baba93a2518eeb635e72b34ee46548d6", - "externalIds": {"DBLP": "journals/cbm/RitisB21", "DOI": "10.1016/j.compbiomed.2021.104630", - "CorpusId": 236453453, "PubMed": "34311298"}, "url": "https://www.semanticscholar.org/paper/a7f2a527baba93a2518eeb635e72b34ee46548d6", + "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.cell.com/article/S258900422100821X/pdf", "status": null}, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-13", "journal": + {"volume": "24", "name": "iScience"}, "authors": [{"authorId": "118887609", + "name": "A. Lo"}, {"authorId": "5652285", "name": "Ruixun Zhang"}]}, {"paperId": + "a7f2a527baba93a2518eeb635e72b34ee46548d6", "externalIds": {"DBLP": "journals/cbm/RitisB21", + "DOI": "10.1016/j.compbiomed.2021.104630", "CorpusId": 236453453, "PubMed": + "34311298"}, "corpusId": 236453453, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7f2a527baba93a2518eeb635e72b34ee46548d6", "title": "On the hierarchical design of biochemical-based digital computations", "abstract": null, "venue": "Comput. Biol. Medicine", "year": 2021, "referenceCount": 42, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-08", "journal": - {"volume": "135", "pages": "\n 104630\n ", "name": "Computers - in biology and medicine"}, "authors": [{"authorId": "15777037", "name": "Dimitrios - Ritis"}, {"authorId": "1915583", "name": "G. Boulougouris"}]}, {"paperId": - "c074cef9299af9922444228712257723f35cf72c", "externalIds": {"MAG": "3179553970", - "DOI": "10.3390/APP11146271", "CorpusId": 237776660}, "url": "https://www.semanticscholar.org/paper/c074cef9299af9922444228712257723f35cf72c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-07-08", "journal": {"volume": "135", "pages": "\n 104630\n ", + "name": "Computers in biology and medicine"}, "authors": [{"authorId": "15777037", + "name": "Dimitrios Ritis"}, {"authorId": "1915583", "name": "G. Boulougouris"}]}, + {"paperId": "c074cef9299af9922444228712257723f35cf72c", "externalIds": {"MAG": + "3179553970", "DOI": "10.3390/APP11146271", "CorpusId": 237776660}, "corpusId": + 237776660, "publicationVenue": {"id": "136edf8d-0f88-4c2c-830f-461c6a9b842e", + "name": "Applied Sciences", "type": "journal", "alternate_names": ["Appl Sci"], + "issn": "2076-3417", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217814", + "alternate_urls": ["http://www.mathem.pub.ro/apps/", "https://www.mdpi.com/journal/applsci", + "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217814"]}, "url": + "https://www.semanticscholar.org/paper/c074cef9299af9922444228712257723f35cf72c", "title": "Detection and Evaluation of Machine Learning Bias", "abstract": "Machine learning models are built using training data, which is collected from human experience and is prone to bias. Humans demonstrate a cognitive @@ -14049,28 +16126,32 @@ interactions: with low wages, placing some open research questions for the research community to ponder over.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 37, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-07", - "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": "2523108", - "name": "Salem Alelyani"}]}, {"paperId": "2c35a038c4b5d7dfa8c13fff0d1cf121db99675d", + "openAccessPdf": {"url": "https://www.mdpi.com/2076-3417/11/14/6271/pdf?version=1625643852", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-07-07", "journal": {"name": "Applied Sciences"}, "authors": [{"authorId": + "2523108", "name": "Salem Alelyani"}]}, {"paperId": "2c35a038c4b5d7dfa8c13fff0d1cf121db99675d", "externalIds": {"PubMedCentral": "9139408", "DOI": "10.1016/j.ibmed.2022.100056", - "CorpusId": 235740257, "PubMed": "35634270"}, "url": "https://www.semanticscholar.org/paper/2c35a038c4b5d7dfa8c13fff0d1cf121db99675d", + "CorpusId": 235740257, "PubMed": "35634270"}, "corpusId": 235740257, "publicationVenue": + {"id": "d5e5b5e7-54b1-4f53-82fc-4853f3e71c58", "name": "medRxiv", "type": + "journal", "url": "https://www.medrxiv.org/"}, "url": "https://www.semanticscholar.org/paper/2c35a038c4b5d7dfa8c13fff0d1cf121db99675d", "title": "Crowd annotations can approximate clinical autism impressions from short home videos with privacy protections", "abstract": null, "venue": "medRxiv", "year": 2021, "referenceCount": 82, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-07-06", "journal": {"volume": "6", "name": "Intelligence-based medicine"}, - "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": - "1899752689", "name": "\u00c9. Leblanc"}, {"authorId": "48913193", "name": - "K. Dunlap"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": "2037683491", - "name": "C. Mutlu"}, {"authorId": "66636865", "name": "B. Chrisman"}, {"authorId": - "30423115", "name": "N. Stockham"}, {"authorId": "2240125", "name": "K. Paskov"}, - {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "d0da0462ac25a4046f6f3e37ed372c4026100bb2", - "externalIds": {"MAG": "3182125260", "DOI": "10.5772/intechopen.98517", "CorpusId": - 237777276}, "url": "https://www.semanticscholar.org/paper/d0da0462ac25a4046f6f3e37ed372c4026100bb2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-07-06", "journal": {"volume": "6", "name": "Intelligence-based + medicine"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, + {"authorId": "1899752689", "name": "\u00c9. Leblanc"}, {"authorId": "48913193", + "name": "K. Dunlap"}, {"authorId": "46911732", "name": "A. Kline"}, {"authorId": + "2037683491", "name": "C. Mutlu"}, {"authorId": "66636865", "name": "B. Chrisman"}, + {"authorId": "30423115", "name": "N. Stockham"}, {"authorId": "2240125", "name": + "K. Paskov"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": + "d0da0462ac25a4046f6f3e37ed372c4026100bb2", "externalIds": {"MAG": "3182125260", + "DOI": "10.5772/intechopen.98517", "CorpusId": 237777276}, "corpusId": 237777276, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0da0462ac25a4046f6f3e37ed372c4026100bb2", "title": "Artificial Intelligence and Machine Learning in 5G and beyond: A\u00a0Survey and Perspectives", "abstract": "The deployment of 4G/LTE (Long Term Evolution) mobile network has solved the major challenge of high capacities, to build @@ -14094,7 +16175,8 @@ interactions: cases of AI/ML in network life cycle are discussed.", "venue": "Moving Broadband Mobile Communications Forward - Intelligent Technologies for 5G and Beyond", "year": 2021, "referenceCount": 24, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.intechopen.com/citation-pdf-url/77411", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-07-05", "journal": {"name": "Moving Broadband Mobile Communications @@ -14103,7 +16185,8 @@ interactions: Zahra Salmam"}, {"authorId": "3212020", "name": "Abdelhak Aqqal"}, {"authorId": "9129510", "name": "A. Dahbi"}]}, {"paperId": "331ec332890d6b7006fc0d850ad0379a2c11c2ab", "externalIds": {"MAG": "3179645255", "DOI": "10.25236/AJCIS.2021.040401", - "CorpusId": 236986339}, "url": "https://www.semanticscholar.org/paper/331ec332890d6b7006fc0d850ad0379a2c11c2ab", + "CorpusId": 236986339}, "corpusId": 236986339, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/331ec332890d6b7006fc0d850ad0379a2c11c2ab", "title": "A Review of Knowledge Graph-based Question and Answer System Research and Its Application in Chronic Disease Diagnosis", "abstract": "Question and answer systems have a long history of development, and with the maturity of @@ -14120,16 +16203,20 @@ interactions: field, in view of the problem that there are many patients with chronic diseases but lack of sufficient knowledge of the diseases.", "venue": "Academic Journal of Computing & Information Science", "year": 2021, "referenceCount": 97, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-07-05", "journal": - {"name": "Academic Journal of Computing & Information Science"}, "authors": - [{"authorId": "2152223666", "name": "Zhaoyang Cao"}, {"authorId": "2141310", - "name": "Lin Ni"}, {"authorId": "143651196", "name": "Lirong Dai"}]}, {"paperId": - "e83c08632a3346402fb39524095af60f5bad2aaa", "externalIds": {"DBLP": "journals/intr/Abedin22", - "MAG": "3180701834", "DOI": "10.1108/INTR-05-2020-0300", "CorpusId": 235763809}, - "url": "https://www.semanticscholar.org/paper/e83c08632a3346402fb39524095af60f5bad2aaa", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://francis-press.com/uploads/papers/nYg9RMIqBDngidzLN1HjYZgt35M9jDspBtZu0Isd.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-07-05", "journal": {"name": "Academic Journal of Computing & Information + Science"}, "authors": [{"authorId": "2152223666", "name": "Zhaoyang Cao"}, + {"authorId": "2141310", "name": "Lin Ni"}, {"authorId": "143651196", "name": + "Lirong Dai"}]}, {"paperId": "e83c08632a3346402fb39524095af60f5bad2aaa", "externalIds": + {"DBLP": "journals/intr/Abedin22", "MAG": "3180701834", "DOI": "10.1108/INTR-05-2020-0300", + "CorpusId": 235763809}, "corpusId": 235763809, "publicationVenue": {"id": + "c3c7b8e2-15d3-4389-b416-7f670cb2f30e", "name": "International Conference + on Sustainable Information Engineering and Technology", "type": "conference", + "alternate_names": ["SIET", "Int Conf Sustain Inf Eng Technol"]}, "url": "https://www.semanticscholar.org/paper/e83c08632a3346402fb39524095af60f5bad2aaa", "title": "Managing the tension between opposing effects of explainability of artificial intelligence: A contingency theory", "abstract": "Research into the interpretability and explainability of data analytics and artificial intelligence @@ -14157,15 +16244,16 @@ interactions: maximize AI explainability. Instead, the co-existence of enabling and constraining effects must be managed.", "venue": "International Conference on Sustainable Information Engineering and Technology", "year": 2021, "referenceCount": 100, - "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Book", "Review"], "publicationDate": - "2021-07-05", "journal": {"name": "6th International Conference on Sustainable - Information Engineering and Technology 2021"}, "authors": [{"authorId": "3096818", - "name": "B. Abedin"}]}, {"paperId": "cc9a79bab8a67c57f1961516e9e6eaa5a1e97019", + "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.emerald.com/insight/content/doi/10.1108/INTR-05-2020-0300/full/pdf?title=managing-the-tension-between-opposing-effects-of-explainability-of-artificial-intelligence-a-contingency-theory-perspective", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", + "Review"], "publicationDate": "2021-07-05", "journal": {"name": "6th International + Conference on Sustainable Information Engineering and Technology 2021"}, "authors": + [{"authorId": "3096818", "name": "B. Abedin"}]}, {"paperId": "cc9a79bab8a67c57f1961516e9e6eaa5a1e97019", "externalIds": {"DOI": "10.1080/10714421.2021.1965850", "CorpusId": 239066768}, - "url": "https://www.semanticscholar.org/paper/cc9a79bab8a67c57f1961516e9e6eaa5a1e97019", + "corpusId": 239066768, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc9a79bab8a67c57f1961516e9e6eaa5a1e97019", "title": "Military buzz: race, robots and insects", "abstract": "ABSTRACT Claiming to \u201clet evolution do the thinking for you,\u201d biologists are teaming up with roboticists and computer engineers in the emerging field @@ -14191,12 +16279,13 @@ interactions: the utopian possibilities suggested for biomimetic swarming technologies.", "venue": "The Communication Review", "year": 2021, "referenceCount": 131, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-07-03", "journal": {"volume": - "24", "pages": "218 - 243", "name": "The Communication Review"}, "authors": - [{"authorId": "2095662731", "name": "Shoshana Magnet"}]}, {"paperId": "dffe40e79f9a8bfeed80846f037e612ffaf6bc2f", - "externalIds": {"DOI": "10.1080/14789450.2021.1962303", "CorpusId": 236914039, - "PubMed": "34343059"}, "url": "https://www.semanticscholar.org/paper/dffe40e79f9a8bfeed80846f037e612ffaf6bc2f", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-07-03", "journal": {"volume": "24", "pages": "218 - 243", "name": "The + Communication Review"}, "authors": [{"authorId": "2095662731", "name": "Shoshana + Magnet"}]}, {"paperId": "dffe40e79f9a8bfeed80846f037e612ffaf6bc2f", "externalIds": + {"DOI": "10.1080/14789450.2021.1962303", "CorpusId": 236914039, "PubMed": + "34343059"}, "corpusId": 236914039, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dffe40e79f9a8bfeed80846f037e612ffaf6bc2f", "title": "How can artificial intelligence be used for peptidomics?", "abstract": "ABSTRACT Introduction Peptidomics is an emerging field of omics sciences using advanced isolation, analysis, and computational techniques that enable @@ -14217,8 +16306,8 @@ interactions: details, many AI-dependent prediction tools have been developed (Figure 1).", "venue": "Expert review of proteomics", "year": 2021, "referenceCount": 213, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-03", "journal": {"volume": "18", "pages": "527 - 556", "name": "Expert Review of Proteomics"}, "authors": @@ -14230,7 +16319,10 @@ interactions: "name": "V. Thongboonkerd"}, {"authorId": "3993626", "name": "R. Vitorino"}]}, {"paperId": "e036ae44c3b4ebdbc2eeb2bd94cc6e4728bcddbc", "externalIds": {"DOI": "10.1080/14737140.2021.1951240", "CorpusId": 235723776, "PubMed": "34214007"}, - "url": "https://www.semanticscholar.org/paper/e036ae44c3b4ebdbc2eeb2bd94cc6e4728bcddbc", + "corpusId": 235723776, "publicationVenue": {"id": "42b74be8-4a75-43b6-bd71-dec3746689b0", + "name": "Expert Review of Anticancer Therapy", "type": "journal", "alternate_names": + ["Expert Rev Anticancer Ther"], "issn": "1473-7140", "url": "http://www.expert-reviews.com/loi/era", + "alternate_urls": ["http://informahealthcare.com/journal/ery"]}, "url": "https://www.semanticscholar.org/paper/e036ae44c3b4ebdbc2eeb2bd94cc6e4728bcddbc", "title": "How will artificial intelligence impact breast cancer research efficiency?", "abstract": "Artificial Intelligence (AI) is a fascinating discipline that has captured our imagination since its birth in the 1950s [1]. Its function @@ -14254,17 +16346,19 @@ interactions: new deep learning (DL) revolution generated a second wave of enthusiasm from the early 2010s [3].", "venue": "Expert Review of Anticancer Therapy", "year": 2021, "referenceCount": 26, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": - "2021-07-02", "journal": {"volume": "21", "pages": "1067 - 1070", "name": - "Expert Review of Anticancer Therapy"}, "authors": [{"authorId": "49204335", - "name": "G. Franceschini"}, {"authorId": "40393745", "name": "E. J. Mason"}, - {"authorId": "5530013", "name": "A. Orlandi"}, {"authorId": "13363576", "name": - "S. D\u2019Archi"}, {"authorId": "153538480", "name": "A. Sanchez"}, {"authorId": - "40472485", "name": "R. Masetti"}]}, {"paperId": "2a8127707c10c8d7c198b1b4ac3e9cb1a1bed900", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/14737140.2021.1951240?needAccess=true", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": "2021-07-02", + "journal": {"volume": "21", "pages": "1067 - 1070", "name": "Expert Review + of Anticancer Therapy"}, "authors": [{"authorId": "49204335", "name": "G. + Franceschini"}, {"authorId": "40393745", "name": "E. J. Mason"}, {"authorId": + "5530013", "name": "A. Orlandi"}, {"authorId": "13363576", "name": "S. D\u2019Archi"}, + {"authorId": "153538480", "name": "A. Sanchez"}, {"authorId": "40472485", + "name": "R. Masetti"}]}, {"paperId": "2a8127707c10c8d7c198b1b4ac3e9cb1a1bed900", "externalIds": {"PubMedCentral": "8326779", "DOI": "10.2147/IMCRJ.S322827", - "CorpusId": 236913281, "PubMed": "34349566"}, "url": "https://www.semanticscholar.org/paper/2a8127707c10c8d7c198b1b4ac3e9cb1a1bed900", + "CorpusId": 236913281, "PubMed": "34349566"}, "corpusId": 236913281, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2a8127707c10c8d7c198b1b4ac3e9cb1a1bed900", "title": "Machine Learning in an Elderly Man with Heart Failure", "abstract": "Abstract Machine learning is a branch of artificial intelligence and can be used to predict important outcomes in a wide variety of medical conditions. @@ -14280,24 +16374,47 @@ interactions: we as physicians have in the implementation and supervision of machine learning.", "venue": "International medical case reports journal", "year": 2021, "referenceCount": 25, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["CaseReport"], "publicationDate": "2021-07-01", "journal": - {"volume": "14", "pages": "497 - 502", "name": "International Medical Case - Reports Journal"}, "authors": [{"authorId": "103444646", "name": "Joel P. - Koops"}]}, {"paperId": "9aa8a73a4464d6a20ed89e18492216dd839d8a24", "externalIds": + "openAccessPdf": {"url": "https://www.dovepress.com/getfile.php?fileID=72138", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["CaseReport"], "publicationDate": "2021-07-01", + "journal": {"volume": "14", "pages": "497 - 502", "name": "International Medical + Case Reports Journal"}, "authors": [{"authorId": "103444646", "name": "Joel + P. Koops"}]}, {"paperId": "9aa8a73a4464d6a20ed89e18492216dd839d8a24", "externalIds": {"MAG": "3188436879", "DOI": "10.1111/lnc3.12433", "CorpusId": 238803038}, - "url": "https://www.semanticscholar.org/paper/9aa8a73a4464d6a20ed89e18492216dd839d8a24", + "corpusId": 238803038, "publicationVenue": {"id": "984325f8-27b7-4088-9a6d-c3de9e23beca", + "name": "Language and Linguistics Compass", "type": "journal", "alternate_names": + ["Lang Linguistics Compass"], "issn": "1749-818X", "url": "http://www.blackwell-compass.com/subject/linguistics/", + "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1749-818X", + "http://www.blackwell-synergy.com/loi/lnco"]}, "url": "https://www.semanticscholar.org/paper/9aa8a73a4464d6a20ed89e18492216dd839d8a24", "title": "Natural language processing as a technique for conducting text\u2010based research", "abstract": null, "venue": "Language and Linguistics Compass", "year": 2021, "referenceCount": 84, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}], "publicationTypes": null, - "publicationDate": "2021-07-01", "journal": {"name": "Language and Linguistics + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": + null, "publicationDate": "2021-07-01", "journal": {"name": "Language and Linguistics Compass"}, "authors": [{"authorId": "2924101", "name": "L. Allen"}, {"authorId": "47304399", "name": "S. Creer"}, {"authorId": "2132371464", "name": "Mary - Cati Poulos"}]}, {"paperId": "8212f36243d00903c9ccf8cd115cc8e3f06830cf", "externalIds": - {"DOI": "10.7861/fhj.2020-0189", "CorpusId": 235915054, "PubMed": "34286194"}, + Cati Poulos"}]}, {"paperId": "eae9bb31cca551ef745697d3472677a0af80a132", "externalIds": + {"DBLP": "journals/qip/XueQ21", "DOI": "10.1007/s11128-021-03172-3", "CorpusId": + 236522481}, "corpusId": 236522481, "publicationVenue": {"id": "f509d2f6-f64c-4a9d-a468-4d226978713f", + "name": "Quantum Information Processing", "type": "journal", "alternate_names": + ["Quantum Inf Process"], "issn": "1570-0755", "url": "https://link.springer.com/journal/11128"}, + "url": "https://www.semanticscholar.org/paper/eae9bb31cca551ef745697d3472677a0af80a132", + "title": "Preparation of three-atom GHZ states based on deep reinforcement + learning", "abstract": null, "venue": "Quantum Information Processing", "year": + 2021, "referenceCount": 36, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-07-01", "journal": {"volume": "20", "name": "Quantum + Information Processing"}, "authors": [{"authorId": "1379689239", "name": "Guanghao + Xue"}, {"authorId": "47659868", "name": "L. Qiu"}]}, {"paperId": "8212f36243d00903c9ccf8cd115cc8e3f06830cf", + "externalIds": {"DOI": "10.7861/fhj.2020-0189", "CorpusId": 235915054, "PubMed": + "34286194"}, "corpusId": 235915054, "publicationVenue": {"id": "ba3571bc-6516-44a1-8355-87384467d917", + "name": "Future healthcare journal", "alternate_names": ["Future healthc j"], + "issn": "2514-6645", "url": "https://www.rcpjournals.org/content/futurehosp"}, "url": "https://www.semanticscholar.org/paper/8212f36243d00903c9ccf8cd115cc8e3f06830cf", "title": "The automation of doctors and machines: A classification for AI in medicine (ADAM framework)", "abstract": "ABSTRACT The advances in artificial @@ -14313,13 +16430,17 @@ interactions: to create a framework from which leading institutions can define specific criteria for AGI.", "venue": "Future healthcare journal", "year": 2021, "referenceCount": 52, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.rcpjournals.org/content/futurehosp/8/2/e257.full.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": "8", "pages": "e257 - e262", "name": "Future Healthcare Journal"}, "authors": [{"authorId": "2142117159", "name": "F. Kazzazi"}]}, {"paperId": "3ec13304ac49496c3c8c6281f7f477c3693000a7", "externalIds": {"DOI": "10.7861/fhj.2021-0025", - "CorpusId": 235915016, "PubMed": "34286188"}, "url": "https://www.semanticscholar.org/paper/3ec13304ac49496c3c8c6281f7f477c3693000a7", + "CorpusId": 235915016, "PubMed": "34286188"}, "corpusId": 235915016, "publicationVenue": + {"id": "ba3571bc-6516-44a1-8355-87384467d917", "name": "Future healthcare + journal", "alternate_names": ["Future healthc j"], "issn": "2514-6645", "url": + "https://www.rcpjournals.org/content/futurehosp"}, "url": "https://www.semanticscholar.org/paper/3ec13304ac49496c3c8c6281f7f477c3693000a7", "title": "Interdisciplinary research: shaping the healthcare of the future", "abstract": "ABSTRACT The hospitals of the future will be shaped by scientific and technical advances made across a wide range of disciplines because complex @@ -14333,14 +16454,19 @@ interactions: they will remain leading members of a much broader and more diverse interdisciplinary team, alert to the value of deep and sustained interdisciplinary research.", "venue": "Future healthcare journal", "year": 2021, "referenceCount": 35, - "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2021-07-01", "journal": {"volume": "8", "pages": - "e218 - e223", "name": "Future Healthcare Journal"}, "authors": [{"authorId": - "1785133", "name": "S. Smye"}, {"authorId": "2060922052", "name": "Alejandro - F. Frangi"}]}, {"paperId": "59a714d3fd6eed1a2df3eae4d9226d2a1cad9aca", "externalIds": - {"DOI": "10.1017/S0963180120001012", "CorpusId": 235382070, "PubMed": "34109927"}, + "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.rcpjournals.org/content/futurehosp/8/2/e218.full.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-07-01", + "journal": {"volume": "8", "pages": "e218 - e223", "name": "Future Healthcare + Journal"}, "authors": [{"authorId": "1785133", "name": "S. Smye"}, {"authorId": + "2060922052", "name": "Alejandro F. Frangi"}]}, {"paperId": "59a714d3fd6eed1a2df3eae4d9226d2a1cad9aca", + "externalIds": {"DOI": "10.1017/S0963180120001012", "CorpusId": 235382070, + "PubMed": "34109927"}, "corpusId": 235382070, "publicationVenue": {"id": "df29a958-9161-46f3-a3af-2df5cb2f071c", + "name": "Cambridge Quarterly of Healthcare Ethics", "type": "journal", "alternate_names": + ["Camb Q Healthc Ethics"], "issn": "0963-1801", "url": "https://www.cambridge.org/core/journals/cambridge-quarterly-of-healthcare-ethics/all-issues", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=CQH"]}, "url": "https://www.semanticscholar.org/paper/59a714d3fd6eed1a2df3eae4d9226d2a1cad9aca", "title": "How Could We Know When a Robot was a Moral Patient?", "abstract": "Abstract There is growing interest in machine ethics in the question of whether @@ -14359,14 +16485,15 @@ interactions: beings such as nonhuman animals whom we also consider to be psychological moral patients.", "venue": "Cambridge Quarterly of Healthcare Ethics", "year": 2021, "referenceCount": 54, "citationCount": 7, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-07-01", "journal": {"volume": "30", "pages": "459 - - 471", "name": "Cambridge Quarterly of Healthcare Ethics"}, "authors": [{"authorId": - "66652934", "name": "Henry Shevlin"}]}, {"paperId": "e000a3c2831ff57a4e143e8f89e24806e81d5a5c", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-07-01", "journal": {"volume": "30", "pages": + "459 - 471", "name": "Cambridge Quarterly of Healthcare Ethics"}, "authors": + [{"authorId": "66652934", "name": "Henry Shevlin"}]}, {"paperId": "e000a3c2831ff57a4e143e8f89e24806e81d5a5c", "externalIds": {"DOI": "10.1017/S0963180120001061", "CorpusId": 235382046, - "PubMed": "34109923"}, "url": "https://www.semanticscholar.org/paper/e000a3c2831ff57a4e143e8f89e24806e81d5a5c", + "PubMed": "34109923"}, "corpusId": 235382046, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e000a3c2831ff57a4e143e8f89e24806e81d5a5c", "title": "Moral Status for Malware! The Difficulty of Defining Advanced Artificial Intelligence", "abstract": "Abstract The suggestion has been made that future advanced artificial intelligence (AI) that passes some consciousness-related @@ -14381,14 +16508,19 @@ interactions: the most common form of software to be treated as having moral status.", "venue": "Cambridge Quarterly of Healthcare Ethics", "year": 2021, "referenceCount": 91, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-07-01", "journal": {"volume": "30", "pages": "517 - - 528", "name": "Cambridge Quarterly of Healthcare Ethics"}, "authors": [{"authorId": - "1696656", "name": "M. Mowbray"}]}, {"paperId": "8163c3ba9872e8e0ccdbbcaa3352ff594cb0e9c4", + "openAccessPdf": {"url": "https://research-information.bris.ac.uk/ws/files/270200435/Mowbray_Moral_Status_for_Malware_corrected_footnote.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-07-01", "journal": {"volume": + "30", "pages": "517 - 528", "name": "Cambridge Quarterly of Healthcare Ethics"}, + "authors": [{"authorId": "1696656", "name": "M. Mowbray"}]}, {"paperId": "8163c3ba9872e8e0ccdbbcaa3352ff594cb0e9c4", "externalIds": {"DBLP": "journals/ieeejas/HepworthBHYDA21", "MAG": "3113524144", - "DOI": "10.1109/JAS.2020.1003545", "CorpusId": 234934052}, "url": "https://www.semanticscholar.org/paper/8163c3ba9872e8e0ccdbbcaa3352ff594cb0e9c4", + "DOI": "10.1109/JAS.2020.1003545", "CorpusId": 234934052}, "corpusId": 234934052, + "publicationVenue": {"id": "ef1356d5-69c7-484e-a110-3efae1e93ecc", "name": + "IEEE/CAA Journal of Automatica Sinica", "type": "journal", "alternate_names": + ["IEEE/CAA J Autom Sin"], "issn": "2329-9266", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=6570654", + "alternate_urls": ["http://www.ieee-jas.org/"]}, "url": "https://www.semanticscholar.org/paper/8163c3ba9872e8e0ccdbbcaa3352ff594cb0e9c4", "title": "Human-Swarm-Teaming Transparency and Trust Architecture", "abstract": "Transparency is a widely used but poorly defined term within the explainable artificial intelligence literature. This is due, in part, to the lack of an @@ -14401,18 +16533,18 @@ interactions: as a key contributor towards situation awareness, and consequently as an enabler for effective trustworthy human-swarm teaming (HST).", "venue": "IEEE/CAA Journal of Automatica Sinica", "year": 2021, "referenceCount": 112, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-01", "journal": - {"volume": "8", "pages": "1281-1295", "name": "IEEE/CAA Journal of Automatica - Sinica"}, "authors": [{"authorId": "41172766", "name": "A. Hepworth"}, {"authorId": - "2005671863", "name": "D. Baxter"}, {"authorId": "144989577", "name": "Aya - Hussein"}, {"authorId": "52260227", "name": "Kate J. Yaxley"}, {"authorId": - "1792568", "name": "Essam Soliman Debie"}, {"authorId": "1713460", "name": - "H. Abbass"}]}, {"paperId": "09aced33ffa94cb229dc26b300f8b42fa1d17c56", "externalIds": - {"MAG": "3180423254", "DOI": "10.5817/mujlt2021-1-4", "CorpusId": 237759089}, - "url": "https://www.semanticscholar.org/paper/09aced33ffa94cb229dc26b300f8b42fa1d17c56", + 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-07-01", "journal": {"volume": "8", "pages": "1281-1295", "name": "IEEE/CAA + Journal of Automatica Sinica"}, "authors": [{"authorId": "41172766", "name": + "A. Hepworth"}, {"authorId": "2005671863", "name": "D. Baxter"}, {"authorId": + "144989577", "name": "Aya Hussein"}, {"authorId": "52260227", "name": "Kate + J. Yaxley"}, {"authorId": "1792568", "name": "Essam Soliman Debie"}, {"authorId": + "1713460", "name": "H. Abbass"}]}, {"paperId": "09aced33ffa94cb229dc26b300f8b42fa1d17c56", + "externalIds": {"MAG": "3180423254", "DOI": "10.5817/mujlt2021-1-4", "CorpusId": + 237759089}, "corpusId": 237759089, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09aced33ffa94cb229dc26b300f8b42fa1d17c56", "title": "Lex Ex Machina: Reasons for Algorithmic Regulation", "abstract": "A major unanswered question in regulation concerns the application of cognitive diversity and various data as inputs for the creation of general legal rules. @@ -14429,22 +16561,25 @@ interactions: rules). Nowadays, algorithms could be used at least as advice, especially in a prepreparation, draft phase of legal acts.", "venue": "Masaryk University Journal of Law and Technology", "year": 2021, "referenceCount": 16, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-06-30", "journal": {"name": - "Masaryk University Journal of Law and Technology"}, "authors": [{"authorId": - "74626425", "name": "Mirko Pe\u010dari\u010d"}]}, {"paperId": "b89b3d1d1b159638a375dde9008a9f3b46c0ab57", - "externalIds": {"MAG": "3176569696", "DOI": "10.1007/s00146-021-01244-7", - "CorpusId": 237739779}, "url": "https://www.semanticscholar.org/paper/b89b3d1d1b159638a375dde9008a9f3b46c0ab57", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://journals.muni.cz/mujlt/article/download/13912/12222", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-30", + "journal": {"name": "Masaryk University Journal of Law and Technology"}, "authors": + [{"authorId": "74626425", "name": "Mirko Pe\u010dari\u010d"}]}, {"paperId": + "b89b3d1d1b159638a375dde9008a9f3b46c0ab57", "externalIds": {"MAG": "3176569696", + "DOI": "10.1007/s00146-021-01244-7", "CorpusId": 237739779}, "corpusId": 237739779, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b89b3d1d1b159638a375dde9008a9f3b46c0ab57", "title": "The dissolution of the condicio humana", "abstract": null, "venue": "AI & SOCIETY", "year": 2021, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}], "publicationTypes": null, - "publicationDate": "2021-06-30", "journal": {"name": "AI & SOCIETY"}, "authors": - [{"authorId": "2128832094", "name": "Tim Rein"}]}, {"paperId": "b8184dd0fc6f9529d814420bfda0b904a8ac8f58", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01244-7.pdf", + "status": null}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}], "publicationTypes": null, "publicationDate": + "2021-06-30", "journal": {"name": "AI & SOCIETY"}, "authors": [{"authorId": + "2128832094", "name": "Tim Rein"}]}, {"paperId": "b8184dd0fc6f9529d814420bfda0b904a8ac8f58", "externalIds": {"MAG": "3175460271", "DOI": "10.33461/uybisbbd.913513", "CorpusId": - 237893980}, "url": "https://www.semanticscholar.org/paper/b8184dd0fc6f9529d814420bfda0b904a8ac8f58", + 237893980}, "corpusId": 237893980, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b8184dd0fc6f9529d814420bfda0b904a8ac8f58", "title": "B\u0130LG\u0130 Y\u00d6NET\u0130M\u0130NDE KURAL TABANLI UZMAN S\u0130STEM GEL\u0130\u015eT\u0130RME ADIMLARI VE BA\u015eARI FAKT\u00d6RLER\u0130", "abstract": "Thanks to information technologies, change in the world takes place very @@ -14460,7 +16595,8 @@ interactions: of use by researchers or practitioners who develop expert systems.", "venue": "Uluslararas\u0131 Y\u00f6netim Bili\u015fim Sistemleri ve Bilgisayar Bilimleri Dergisi", "year": 2021, "referenceCount": 38, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1698990", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-30", "journal": {"name": "Uluslararas\u0131 Y\u00f6netim Bili\u015fim @@ -14468,7 +16604,12 @@ interactions: "name": "Do\u011fan Yildiz"}]}, {"paperId": "a16ae67070de155789a871cb27ecbf9eaa98b379", "externalIds": {"ACL": "2021.acl-long.565", "ArXiv": "2107.00061", "DBLP": "journals/corr/abs-2107-00061", "DOI": "10.18653/v1/2021.acl-long.565", "CorpusId": - 235694265}, "url": "https://www.semanticscholar.org/paper/a16ae67070de155789a871cb27ecbf9eaa98b379", + 235694265}, "corpusId": 235694265, "publicationVenue": {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", + "name": "Annual Meeting of the Association for Computational Linguistics", + "type": "conference", "alternate_names": ["Annu Meet Assoc Comput Linguistics", + "Meeting of the Association for Computational Linguistics", "ACL", "Meet Assoc + Comput Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, + "url": "https://www.semanticscholar.org/paper/a16ae67070de155789a871cb27ecbf9eaa98b379", "title": "All That\u2019s \u2018Human\u2019 Is Not Gold: Evaluating Human Evaluation of Generated Text", "abstract": "Human evaluations are typically considered the gold standard in natural language generation, but as models\u2019 @@ -14486,17 +16627,19 @@ interactions: provide recommendations to NLG researchers for improving human evaluations of text generated from state-of-the-art models.", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2021, "referenceCount": - 40, "citationCount": 72, "influentialCitationCount": 11, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-06-30", - "journal": {"pages": "7282-7296"}, "authors": [{"authorId": "40684993", "name": - "Elizabeth Clark"}, {"authorId": "50509991", "name": "Tal August"}, {"authorId": - "38618739", "name": "Sofia Serrano"}, {"authorId": "3465456", "name": "Nikita - Haduong"}, {"authorId": "40895369", "name": "Suchin Gururangan"}, {"authorId": - "144365875", "name": "Noah A. Smith"}]}, {"paperId": "8230a91a2c3ce4291e901a08485d001fadca8e08", - "externalIds": {"MAG": "3198536686", "DOI": "10.7480/FOOTPRINT.15.1.4984", - "CorpusId": 239694753}, "url": "https://www.semanticscholar.org/paper/8230a91a2c3ce4291e901a08485d001fadca8e08", + 40, "citationCount": 77, "influentialCitationCount": 12, "isOpenAccess": true, + "openAccessPdf": {"url": "https://aclanthology.org/2021.acl-long.565.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2021-06-30", "journal": {"pages": "7282-7296"}, "authors": + [{"authorId": "40684993", "name": "Elizabeth Clark"}, {"authorId": "50509991", + "name": "Tal August"}, {"authorId": "38618739", "name": "Sofia Serrano"}, + {"authorId": "3465456", "name": "Nikita Haduong"}, {"authorId": "40895369", + "name": "Suchin Gururangan"}, {"authorId": "144365875", "name": "Noah A. Smith"}]}, + {"paperId": "8230a91a2c3ce4291e901a08485d001fadca8e08", "externalIds": {"MAG": + "3198536686", "DOI": "10.7480/FOOTPRINT.15.1.4984", "CorpusId": 239694753}, + "corpusId": 239694753, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8230a91a2c3ce4291e901a08485d001fadca8e08", "title": "Architecture as Information Machine", "abstract": "Architecture has always been dealing with machines. Differently but constantly. At the middle of the last century, new kind of machine and its science have emerged: @@ -14514,25 +16657,27 @@ interactions: Machine is neither to be represented, nor to be imitated but to be actualized, or better to be modeled?", "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-06-29", "journal": {"volume": - "15", "pages": "111-126", "name": ""}, "authors": [{"authorId": "121889488", - "name": "Tewfik Hammoudi"}]}, {"paperId": "7c9b154ee30fffd74b1498f8c07212bfa694aa48", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-29", + "journal": {"volume": "15", "pages": "111-126", "name": ""}, "authors": [{"authorId": + "121889488", "name": "Tewfik Hammoudi"}]}, {"paperId": "7c9b154ee30fffd74b1498f8c07212bfa694aa48", "externalIds": {"DBLP": "journals/corr/abs-2106-13697", "ArXiv": "2106.13697", - "DOI": "10.1016/j.mechatronics.2021.102576", "CorpusId": 235652039}, "url": - "https://www.semanticscholar.org/paper/7c9b154ee30fffd74b1498f8c07212bfa694aa48", + "DOI": "10.1016/j.mechatronics.2021.102576", "CorpusId": 235652039}, "corpusId": + 235652039, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c9b154ee30fffd74b1498f8c07212bfa694aa48", "title": "Active Learning in Robotics: A Review of Control Principles", "abstract": null, "venue": "ArXiv", "year": 2021, "referenceCount": 306, "citationCount": - 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-25", - "journal": {"volume": "abs/2106.13697", "name": "ArXiv"}, "authors": [{"authorId": - "38598182", "name": "Annalisa T. Taylor"}, {"authorId": "52185279", "name": - "Thomas A. Berrueta"}, {"authorId": "2750574", "name": "T. Murphey"}]}, {"paperId": - "a9d0ad339987451214e41105a6a5344bd00a1e69", "externalIds": {"MAG": "3176620061", - "DOI": "10.35487/rius.v15i48.2021.661", "CorpusId": 237795091}, "url": "https://www.semanticscholar.org/paper/a9d0ad339987451214e41105a6a5344bd00a1e69", + 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2021-06-25", "journal": {"volume": "abs/2106.13697", "name": + "ArXiv"}, "authors": [{"authorId": "38598182", "name": "Annalisa T. Taylor"}, + {"authorId": "52185279", "name": "Thomas A. Berrueta"}, {"authorId": "2750574", + "name": "T. Murphey"}]}, {"paperId": "a9d0ad339987451214e41105a6a5344bd00a1e69", + "externalIds": {"MAG": "3176620061", "DOI": "10.35487/rius.v15i48.2021.661", + "CorpusId": 237795091}, "corpusId": 237795091, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a9d0ad339987451214e41105a6a5344bd00a1e69", "title": "Towards legal regulation of artificial intelligence", "abstract": "This paper addresses the current state of AI regulation and discusses the feasibility and need for regulation through legally binding instruments, beyond @@ -14544,13 +16689,14 @@ interactions: that, at European level led by EU institutions, as they had already achieved in the areas of privacy and data protection.", "venue": "REVISTA IUS", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-23", - "journal": {"name": "REVISTA IUS"}, "authors": [{"authorId": "2129026461", - "name": "Moises Barrio Andres"}]}, {"paperId": "eb4d217810bb0dba2cabcbbb6bed9a2bfc8e765d", - "externalIds": {"MAG": "3171224575", "DOI": "10.12737/2587-9103-2021-10-3-17-23", - "CorpusId": 236264692}, "url": "https://www.semanticscholar.org/paper/eb4d217810bb0dba2cabcbbb6bed9a2bfc8e765d", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://revistaius.com/index.php/ius/article/download/661/789", + "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-06-23", "journal": {"name": + "REVISTA IUS"}, "authors": [{"authorId": "2129026461", "name": "Moises Barrio + Andres"}]}, {"paperId": "eb4d217810bb0dba2cabcbbb6bed9a2bfc8e765d", "externalIds": + {"MAG": "3171224575", "DOI": "10.12737/2587-9103-2021-10-3-17-23", "CorpusId": + 236264692}, "corpusId": 236264692, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb4d217810bb0dba2cabcbbb6bed9a2bfc8e765d", "title": "Development of Artificial Intelligence as a Factor of Transformation in Philosophical Anthropology and Ethics", "abstract": "This article is dedicated to the problem of the development of artificial intelligence in modern society @@ -14568,13 +16714,16 @@ interactions: and theoretical application as a basis for further research in various fields of science and philosophy.", "venue": "", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-06-23", "journal": {"volume": - "10", "pages": "17-23", "name": ""}, "authors": [{"authorId": "74651556", - "name": "A. Filipchenko"}]}, {"paperId": "7a7064a33c0270e2d40448f7e25c7ad8d159d345", + "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-23", + "journal": {"volume": "10", "pages": "17-23", "name": ""}, "authors": [{"authorId": + "74651556", "name": "A. Filipchenko"}]}, {"paperId": "7a7064a33c0270e2d40448f7e25c7ad8d159d345", "externalIds": {"MAG": "3175232352", "DOI": "10.21203/rs.3.rs-590601/v1", - "CorpusId": 237854631}, "url": "https://www.semanticscholar.org/paper/7a7064a33c0270e2d40448f7e25c7ad8d159d345", + "CorpusId": 237854631}, "corpusId": 237854631, "publicationVenue": {"id": + "4cbc2987-6254-4668-b85b-aeabd7ff62ef", "name": "Nature Computational Science", + "type": "journal", "alternate_names": ["Nat Comput Sci"], "issn": "2662-8457"}, + "url": "https://www.semanticscholar.org/paper/7a7064a33c0270e2d40448f7e25c7ad8d159d345", "title": "Compressing atmospheric data into its real information content", "abstract": "\n Hundreds of petabytes of data are produced annually at weather and climate forecast centres worldwide. Compression is inevitable to reduce @@ -14592,7 +16741,8 @@ interactions: proposed to optimize compressibility while minimizing information loss for the end use of weather and climate forecast data.", "venue": "Nature Computational Science", "year": 2021, "referenceCount": 59, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s43588-021-00156-2.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-21", @@ -14602,7 +16752,8 @@ interactions: {"authorId": "1389726126", "name": "P. Dueben"}, {"authorId": "48919093", "name": "T. Palmer"}]}, {"paperId": "7e7a66eb76efb6161ae7dcb6533eb12500d827ef", "externalIds": {"PubMedCentral": "8252890", "DOI": "10.12659/MSM.933675", - "CorpusId": 235661362, "PubMed": "34176921"}, "url": "https://www.semanticscholar.org/paper/7e7a66eb76efb6161ae7dcb6533eb12500d827ef", + "CorpusId": 235661362, "PubMed": "34176921"}, "corpusId": 235661362, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7e7a66eb76efb6161ae7dcb6533eb12500d827ef", "title": "Editorial: Artificial Intelligence (AI) in Clinical Medicine and the 2020 CONSORT-AI Study Guidelines", "abstract": "Artificial intelligence (AI) in clinical medicine includes physical robotics and devices and virtual @@ -14621,14 +16772,15 @@ interactions: of the new 2020 CONSORT-AI study guidelines.", "venue": "Medical science monitor : international medical journal of experimental and clinical research", "year": 2021, "referenceCount": 22, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], "publicationDate": - "2021-06-21", "journal": {"volume": "27", "pages": "e933675-1 - e933675-3", - "name": "Medical Science Monitor : International Medical Journal of Experimental - and Clinical Research"}, "authors": [{"authorId": "3692616", "name": "D. Parums"}]}, - {"paperId": "75afe70550586a44e2b4b51bd5a286e2be9883ce", "externalIds": {"ArXiv": - "2106.13233", "CorpusId": 237513957}, "url": "https://www.semanticscholar.org/paper/75afe70550586a44e2b4b51bd5a286e2be9883ce", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], + "publicationDate": "2021-06-21", "journal": {"volume": "27", "pages": "e933675-1 + - e933675-3", "name": "Medical Science Monitor : International Medical Journal + of Experimental and Clinical Research"}, "authors": [{"authorId": "3692616", + "name": "D. Parums"}]}, {"paperId": "75afe70550586a44e2b4b51bd5a286e2be9883ce", + "externalIds": {"ArXiv": "2106.13233", "CorpusId": 237513957}, "corpusId": + 237513957, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/75afe70550586a44e2b4b51bd5a286e2be9883ce", "title": "Post-Selections in AI and How to Avoid Them", "abstract": ": Neural network based Arti\ufb01cial Intelligence (AI) has reported increasing scales in experiments. However, this paper raises a rarely reported stage in such @@ -14654,23 +16806,30 @@ interactions: are optimal in the sense of maximum-likelihood across lifetime, conditioned on the Three Learning Conditions.", "venue": "", "year": 2021, "referenceCount": 92, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-19", - "journal": null, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, - {"paperId": "220068be6ef897b2b38db687a922423d6693ed9c", "externalIds": {"PubMedCentral": - "8213706", "DOI": "10.1038/s41540-021-00189-3", "CorpusId": 235476723, "PubMed": - "34145287"}, "url": "https://www.semanticscholar.org/paper/220068be6ef897b2b38db687a922423d6693ed9c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-06-19", "journal": null, "authors": [{"authorId": "145926447", "name": + "J. Weng"}]}, {"paperId": "220068be6ef897b2b38db687a922423d6693ed9c", "externalIds": + {"PubMedCentral": "8213706", "DOI": "10.1038/s41540-021-00189-3", "CorpusId": + 235476723, "PubMed": "34145287"}, "corpusId": 235476723, "publicationVenue": + {"id": "8f2dd075-6f52-459e-8839-5590e996bcba", "name": "npj Systems Biology + and Applications", "alternate_names": ["npj Syst Biology Appl"], "issn": "2056-7189", + "url": "http://www.nature.com/npjsba/"}, "url": "https://www.semanticscholar.org/paper/220068be6ef897b2b38db687a922423d6693ed9c", "title": "Nobel Turing Challenge: creating the engine for scientific discovery", "abstract": null, "venue": "npj Systems Biology and Applications", "year": 2021, "referenceCount": 116, "citationCount": 15, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2021-06-18", "journal": {"volume": "7", "name": "NPJ Systems - Biology and Applications"}, "authors": [{"authorId": "1742807", "name": "H. - Kitano"}]}, {"paperId": "2b3167a329292f63a0afe975c891555e008d77c0", "externalIds": - {"MAG": "3175000097", "DOI": "10.32957/hacettepehdf.874993", "CorpusId": 237858393}, + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s41540-021-00189-3.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-06-18", + "journal": {"volume": "7", "name": "NPJ Systems Biology and Applications"}, + "authors": [{"authorId": "1742807", "name": "H. Kitano"}]}, {"paperId": "2b3167a329292f63a0afe975c891555e008d77c0", + "externalIds": {"MAG": "3175000097", "DOI": "10.32957/hacettepehdf.874993", + "CorpusId": 237858393}, "corpusId": 237858393, "publicationVenue": {"id": + "e8799d4f-dd7b-4e3f-9e43-f7207d0a1200", "name": "Hacettepe Hukuk Fak\u00fcltesi + Dergisi", "type": "journal", "alternate_names": ["Hacet Hukuk Fak\u00fcltesi + Derg"], "issn": "1302-4868", "url": "http://www.hukukfakultesi.hacettepe.edu.tr/"}, "url": "https://www.semanticscholar.org/paper/2b3167a329292f63a0afe975c891555e008d77c0", "title": "YAPAY ZEK\u00c2 VE \u0130DARE HUKUKU (BUG\u00dcNDEN GELECE\u011eE Y\u00d6NEL\u0130K B\u0130R DE\u011eERLEND\u0130RME)", "abstract": "Artificial @@ -14701,13 +16860,21 @@ interactions: may bring the need for administrative procedure act back into the agenda.", "venue": "Hacettepe Hukuk Fak\u00fcltesi Dergisi", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-06-17", "journal": {"name": - "Hacettepe Hukuk Fak\u00fcltesi Dergisi"}, "authors": [{"authorId": "1696645119", - "name": "Mutlu Ka\u011fitcio\u011flu"}]}, {"paperId": "4b8ecdffd03985fadf94d408aa4eaa292fb01d92", - "externalIds": {"MAG": "3166388909", "DBLP": "journals/concurrency/DuttaM21", - "DOI": "10.1002/cpe.6451", "CorpusId": 236282871}, "url": "https://www.semanticscholar.org/paper/4b8ecdffd03985fadf94d408aa4eaa292fb01d92", + "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1557937", + "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-17", + "journal": {"name": "Hacettepe Hukuk Fak\u00fcltesi Dergisi"}, "authors": + [{"authorId": "1696645119", "name": "Mutlu Ka\u011fitcio\u011flu"}]}, {"paperId": + "4b8ecdffd03985fadf94d408aa4eaa292fb01d92", "externalIds": {"MAG": "3166388909", + "DBLP": "journals/concurrency/DuttaM21", "DOI": "10.1002/cpe.6451", "CorpusId": + 236282871}, "corpusId": 236282871, "publicationVenue": {"id": "312ca99c-9149-490d-813e-c60d5e949f65", + "name": "Concurrency and Computation", "type": "journal", "alternate_names": + ["Concurr Comput Pract Exp", "Concurrency and Computation: Practice and Experience", + "Concurr Comput"], "issn": "1532-0626", "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/77004395?CRETRY=1&SRETRY=0", + "alternate_urls": ["http://www3.interscience.wiley.com/cgi-bin/jtoc?ID=77004395", + "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1532-0634"]}, "url": + "https://www.semanticscholar.org/paper/4b8ecdffd03985fadf94d408aa4eaa292fb01d92", "title": "DigiNet: Prediction of Assamese handwritten digits using convolutional neural network", "abstract": "Numerous work focusing on Indian Languages for automatically recognizing characters has been witnessed in literature in the @@ -14730,16 +16897,17 @@ interactions: performance of our model was better compared to the pre\u2010trained model on the Assamese as well as the Bangla handwritten numerals.", "venue": "Concurrency and Computation", "year": 2021, "referenceCount": 48, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-15", "journal": - {"volume": "33", "name": "Concurrency and Computation: Practice and Experience"}, - "authors": [{"authorId": "1726120184", "name": "Prarthana Dutta"}, {"authorId": - "4966350", "name": "Naresh Babu Muppalaneni"}]}, {"paperId": "d6a59868ed67dc581b3a721824c130490ea74566", - "externalIds": {"PubMedCentral": "8580451", "ArXiv": "2106.08375", "DOI": - "10.1098/rsta.2020.0268", "CorpusId": 235446476, "PubMed": "34743603"}, "url": - "https://www.semanticscholar.org/paper/d6a59868ed67dc581b3a721824c130490ea74566", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-06-15", "journal": {"volume": "33", "name": "Concurrency and Computation: + Practice and Experience"}, "authors": [{"authorId": "1726120184", "name": + "Prarthana Dutta"}, {"authorId": "4966350", "name": "Naresh Babu Muppalaneni"}]}, + {"paperId": "d6a59868ed67dc581b3a721824c130490ea74566", "externalIds": {"PubMedCentral": + "8580451", "ArXiv": "2106.08375", "DOI": "10.1098/rsta.2020.0268", "CorpusId": + 235446476, "PubMed": "34743603"}, "corpusId": 235446476, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d6a59868ed67dc581b3a721824c130490ea74566", "title": "Modern perspectives on near-equilibrium analysis of Turing systems", "abstract": "In the nearly seven decades since the publication of Alan Turing\u2019s work on morphogenesis, enormous progress has been made in understanding both @@ -14763,16 +16931,17 @@ interactions: open frontiers in Turing\u2019s theory of morphogenesis\u2019.", "venue": "Philosophical Transactions of the Royal Society A", "year": 2021, "referenceCount": 220, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine", "Physics", "Biology"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-06-15", "journal": {"volume": "379", "name": "Philosophical transactions. - Series A, Mathematical, physical, and engineering sciences"}, "authors": [{"authorId": - "22256586", "name": "Andrew L. Krause"}, {"authorId": "2662569", "name": "E. - Gaffney"}, {"authorId": "2339973", "name": "P. Maini"}, {"authorId": "2691918", - "name": "V. Klika"}]}, {"paperId": "d602137d38d4fad9e6db07d911fbf3551894d441", - "externalIds": {"ArXiv": "2106.06924", "CorpusId": 245828042}, "url": "https://www.semanticscholar.org/paper/d602137d38d4fad9e6db07d911fbf3551894d441", + "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Physics", "Biology"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-06-15", "journal": {"volume": "379", "name": + "Philosophical transactions. Series A, Mathematical, physical, and engineering + sciences"}, "authors": [{"authorId": "22256586", "name": "Andrew L. Krause"}, + {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "2339973", "name": + "P. Maini"}, {"authorId": "2691918", "name": "V. Klika"}]}, {"paperId": "d602137d38d4fad9e6db07d911fbf3551894d441", + "externalIds": {"ArXiv": "2106.06924", "CorpusId": 245828042}, "corpusId": + 245828042, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d602137d38d4fad9e6db07d911fbf3551894d441", "title": "Deep Learning for Predictive Analytics in Reversible Steganography", "abstract": "Deep learning is regarded as a promising solution for reversible steganography. The recent development of end-toend learning has made it possible @@ -14799,17 +16968,18 @@ interactions: Experimental results show that state-of-the-art steganographic performance can be achieved with advanced neural network models.", "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-06-13", "journal": null, "authors": [{"authorId": "4020249", "name": - "Ching-Chun Chang"}, {"authorId": "2108601214", "name": "Xu Wang"}, {"authorId": - "2111637781", "name": "Sisheng Chen"}, {"authorId": "1678602", "name": "I. - Echizen"}, {"authorId": "153618912", "name": "Victor Sanchez"}, {"authorId": - "2145403463", "name": "Chang-Tsun Li"}]}, {"paperId": "799074672e47b38af1fb9ef9004f42137d450b2e", - "externalIds": {"MAG": "3169712958", "DOI": "10.5325/JAYNRANDSTUD.21.1.0056", - "CorpusId": 235717686}, "url": "https://www.semanticscholar.org/paper/799074672e47b38af1fb9ef9004f42137d450b2e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-06-13", "journal": null, "authors": [{"authorId": + "4020249", "name": "Ching-Chun Chang"}, {"authorId": "2108601214", "name": + "Xu Wang"}, {"authorId": "2111637781", "name": "Sisheng Chen"}, {"authorId": + "1678602", "name": "I. Echizen"}, {"authorId": "153618912", "name": "Victor + Sanchez"}, {"authorId": "2145403463", "name": "Chang-Tsun Li"}]}, {"paperId": + "799074672e47b38af1fb9ef9004f42137d450b2e", "externalIds": {"MAG": "3169712958", + "DOI": "10.5325/JAYNRANDSTUD.21.1.0056", "CorpusId": 235717686}, "corpusId": + 235717686, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/799074672e47b38af1fb9ef9004f42137d450b2e", "title": "Mental Integrations as Functional Wholes", "abstract": "ABSTRACT:It is argued that a mental integration is formed only if the result is a functional whole. This idea is then used to clarify the definition of a concept and discuss @@ -14818,32 +16988,34 @@ interactions: an entity when it is formed out of sub-entities. Specific examples of how such rules are frequently violated in literature as well as colloquially are discussed.", "venue": "", "year": 2021, "referenceCount": 7, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-06-12", "journal": {"volume": - "21", "pages": "56 - 64", "name": "Journal of Ayn Rand Studies"}, "authors": - [{"authorId": "1420010330", "name": "Abhijeet Melkani"}]}, {"paperId": "707145c14635577826fe97a9367235034c88bc2e", - "externalIds": {"DOI": "10.31122/sinefilozofi.810857", "CorpusId": 245366573}, - "url": "https://www.semanticscholar.org/paper/707145c14635577826fe97a9367235034c88bc2e", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-12", + "journal": {"volume": "21", "pages": "56 - 64", "name": "Journal of Ayn Rand + Studies"}, "authors": [{"authorId": "1420010330", "name": "Abhijeet Melkani"}]}, + {"paperId": "707145c14635577826fe97a9367235034c88bc2e", "externalIds": {"DOI": + "10.31122/sinefilozofi.810857", "CorpusId": 245366573}, "corpusId": 245366573, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/707145c14635577826fe97a9367235034c88bc2e", "title": "Yapay Zek\u00e2 D\u00fcalizminde \u00d6zbilin\u00e7lilik Halinin Varl\u0131\u011f\u0131 ve Y\u0131k\u0131m\u0131 \u00dczerine", "abstract": null, "venue": "SineFilozofi", "year": 2021, "referenceCount": 3, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-06-11", "journal": {"name": "SineFilozofi"}, "authors": [{"authorId": - "1581773959", "name": "Mehmet Ali Sevimli"}, {"authorId": "108555493", "name": - "M. Serarslan"}]}, {"paperId": "d65cd36a5e4a03d5bb7f9a8a62034762062f88de", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2021-06-11", "journal": {"name": "SineFilozofi"}, "authors": + [{"authorId": "1581773959", "name": "Mehmet Ali Sevimli"}, {"authorId": "108555493", + "name": "M. Serarslan"}]}, {"paperId": "d65cd36a5e4a03d5bb7f9a8a62034762062f88de", "externalIds": {"DOI": "10.1007/s00129-021-04811-7", "CorpusId": 235398761}, - "url": "https://www.semanticscholar.org/paper/d65cd36a5e4a03d5bb7f9a8a62034762062f88de", + "corpusId": 235398761, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d65cd36a5e4a03d5bb7f9a8a62034762062f88de", "title": "K\u00fcnstliche Intelligenz \u2013 ein Mythos des 21. Jahrhunderts?", "abstract": null, "venue": "Der Gyn\u00e4kologe", "year": 2021, "referenceCount": 24, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-06-11", "journal": {"volume": "54", "pages": "471 - 475", "name": "Der - Gyn\u00e4kologe"}, "authors": [{"authorId": "39139942", "name": "W. Zimmerli"}]}, - {"paperId": "43337d43b30ab1f666e4b3f373e7aba36e867673", "externalIds": {"MAG": - "3162994603", "DOI": "10.1080/13614533.2021.1930076", "CorpusId": 236309100}, - "url": "https://www.semanticscholar.org/paper/43337d43b30ab1f666e4b3f373e7aba36e867673", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2021-06-11", "journal": {"volume": "54", "pages": + "471 - 475", "name": "Der Gyn\u00e4kologe"}, "authors": [{"authorId": "39139942", + "name": "W. Zimmerli"}]}, {"paperId": "43337d43b30ab1f666e4b3f373e7aba36e867673", + "externalIds": {"MAG": "3162994603", "DOI": "10.1080/13614533.2021.1930076", + "CorpusId": 236309100}, "corpusId": 236309100, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/43337d43b30ab1f666e4b3f373e7aba36e867673", "title": "Views of Academic Library Directors on Artificial Intelligence: A Representative Survey in Hungary", "abstract": "Abstract Artificial intelligence (AI) is a defining technology of the 21st century, creating new opportunities @@ -14860,15 +17032,15 @@ interactions: diffusion of innovation model, it may be projected that an explosive growth is to be expected in the use of AI in libraries.", "venue": "New Review of Academic Librarianship", "year": 2021, "referenceCount": 30, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2021-06-10", "journal": {"volume": "28", "pages": - "256 - 278", "name": "New Review of Academic Librarianship"}, "authors": [{"authorId": - "122572547", "name": "B. Winkler"}, {"authorId": "108509737", "name": "P. - Kiszl"}]}, {"paperId": "c6774515300d07888d6837e812d0c20c90060c5b", "externalIds": - {"DOI": "10.1109/ICOEI51242.2021.9452971", "CorpusId": 235618357}, "url": - "https://www.semanticscholar.org/paper/c6774515300d07888d6837e812d0c20c90060c5b", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2021-06-10", "journal": + {"volume": "28", "pages": "256 - 278", "name": "New Review of Academic Librarianship"}, + "authors": [{"authorId": "122572547", "name": "B. Winkler"}, {"authorId": + "108509737", "name": "P. Kiszl"}]}, {"paperId": "c6774515300d07888d6837e812d0c20c90060c5b", + "externalIds": {"DOI": "10.1109/ICOEI51242.2021.9452971", "CorpusId": 235618357}, + "corpusId": 235618357, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6774515300d07888d6837e812d0c20c90060c5b", "title": "Code Convertor-Binary to Uniform Minimal Switching Representation (UMSR)", "abstract": "The low-power arithmetic design has become a very important aspect for recent compact electronic gadgets. The need to minimize dynamic @@ -14892,27 +17064,31 @@ interactions: out using Field Programmable Gate Arrays (FPGA).", "venue": "2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2021-06-03", "journal": {"pages": "164-170", "name": "2021 5th International - Conference on Trends in Electronics and Informatics (ICOEI)"}, "authors": - [{"authorId": "9234276", "name": "N. Samanvita"}, {"authorId": "36390491", - "name": "Sudeep Shetty"}, {"authorId": "2114850858", "name": "Nagaraj M J"}]}, - {"paperId": "d4f6ef636e16b001986b541aa2afc76eed42ae34", "externalIds": {"PubMedCentral": - "8175735", "DOI": "10.1038/s41746-021-00464-x", "CorpusId": 235307275, "PubMed": - "34083689"}, "url": "https://www.semanticscholar.org/paper/d4f6ef636e16b001986b541aa2afc76eed42ae34", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2021-06-03", "journal": {"pages": "164-170", "name": "2021 + 5th International Conference on Trends in Electronics and Informatics (ICOEI)"}, + "authors": [{"authorId": "9234276", "name": "N. Samanvita"}, {"authorId": + "36390491", "name": "Sudeep Shetty"}, {"authorId": "2114850858", "name": "Nagaraj + M J"}]}, {"paperId": "d4f6ef636e16b001986b541aa2afc76eed42ae34", "externalIds": + {"PubMedCentral": "8175735", "DOI": "10.1038/s41746-021-00464-x", "CorpusId": + 235307275, "PubMed": "34083689"}, "corpusId": 235307275, "publicationVenue": + {"id": "ef485645-f75f-4344-8b9d-3c260e69503b", "name": "npj Digital Medicine", + "alternate_names": ["npj Digit Med"], "issn": "2398-6352", "url": "http://www.nature.com/npjdigitalmed/"}, + "url": "https://www.semanticscholar.org/paper/d4f6ef636e16b001986b541aa2afc76eed42ae34", "title": "Considering the possibilities and pitfalls of Generative Pre-trained Transformer 3 (GPT-3) in healthcare delivery", "abstract": null, "venue": - "npj Digital Medicine", "year": 2021, "referenceCount": 27, "citationCount": - 22, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-06-03", "journal": {"volume": - "4", "name": "NPJ Digital Medicine"}, "authors": [{"authorId": "6114730", - "name": "Diane M. Korngiebel"}, {"authorId": "1712935", "name": "S. Mooney"}]}, - {"paperId": "211c1b36c9873743b2d5c955a0823143cbd4e8fe", "externalIds": {"ArXiv": - "2106.01288", "DBLP": "journals/corr/abs-2106-01288", "CorpusId": 235294049}, - "url": "https://www.semanticscholar.org/paper/211c1b36c9873743b2d5c955a0823143cbd4e8fe", + "npj Digital Medicine", "year": 2021, "referenceCount": 23, "citationCount": + 24, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.nature.com/articles/s41746-021-00464-x.pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-03", "journal": + {"volume": "4", "name": "NPJ Digital Medicine"}, "authors": [{"authorId": + "6114730", "name": "Diane M. Korngiebel"}, {"authorId": "1712935", "name": + "S. Mooney"}]}, {"paperId": "211c1b36c9873743b2d5c955a0823143cbd4e8fe", "externalIds": + {"ArXiv": "2106.01288", "DBLP": "journals/corr/abs-2106-01288", "CorpusId": + 235294049}, "corpusId": 235294049, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/211c1b36c9873743b2d5c955a0823143cbd4e8fe", "title": "Bottom-Up and Top-Down Neural Processing Systems Design: Neuromorphic Intelligence as the Convergence of Natural and Artificial Intelligence", "abstract": "While Moore\u2019s law has driven exponential computing power expectations, @@ -14937,15 +17113,19 @@ interactions: for neuromorphic edge computing over conventional machine-learning accelerators, and outline the key elements for a framework toward neuromorphic intelligence.", "venue": "ArXiv", "year": 2021, "referenceCount": 306, "citationCount": 15, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-06-02", - "journal": {"volume": "abs/2106.01288", "name": "ArXiv"}, "authors": [{"authorId": - "38613620", "name": "C. Frenkel"}, {"authorId": "3272827", "name": "D. Bol"}, - {"authorId": "1721210", "name": "G. Indiveri"}]}, {"paperId": "b3d30dd72e7504331d9ed95edfbf2493358e6c9c", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2021-06-02", "journal": {"volume": "abs/2106.01288", "name": "ArXiv"}, "authors": + [{"authorId": "38613620", "name": "C. Frenkel"}, {"authorId": "3272827", "name": + "D. Bol"}, {"authorId": "1721210", "name": "G. Indiveri"}]}, {"paperId": "b3d30dd72e7504331d9ed95edfbf2493358e6c9c", "externalIds": {"DBLP": "journals/aisy/BercoA21", "MAG": "3169448988", "DOI": - "10.1002/aisy.202100025", "CorpusId": 236270717}, "url": "https://www.semanticscholar.org/paper/b3d30dd72e7504331d9ed95edfbf2493358e6c9c", + "10.1002/aisy.202100025", "CorpusId": 236270717}, "corpusId": 236270717, "publicationVenue": + {"id": "a03d184e-0f87-4242-aea8-2fb5c3179483", "name": "Advanced Intelligent + Systems", "type": "journal", "alternate_names": ["Adv Intell Syst"], "issn": + "2640-4567", "url": "https://onlinelibrary.wiley.com/journal/26404567"}, "url": + "https://www.semanticscholar.org/paper/b3d30dd72e7504331d9ed95edfbf2493358e6c9c", "title": "Bioinspired Robotic Vision with Online Learning Capability and Rotation\u2010Invariant Properties", "abstract": "Reliable image perception is critical for living organisms. Biologic sensory organs and nervous systems evolved interdependently @@ -14962,16 +17142,17 @@ interactions: discussed alongside the experimental setup. This is followed by performance analysis of pattern recognition under misaligned and rotated conditions. Finally, the process of online, supervised learning is demonstrated and analyzed.", - "venue": "Adv. Intell. Syst.", "year": 2021, "referenceCount": 34, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-02", "journal": - {"volume": "3", "name": "Advanced Intelligent Systems"}, "authors": [{"authorId": - "46237159", "name": "D. Berco"}, {"authorId": "144204958", "name": "D. Ang"}]}, - {"paperId": "7e1dd28b8fc6cb63d37c344abc02a1dd06bee70f", "externalIds": {"MAG": - "3169673055", "DOI": "10.3390/JMSE9060612", "CorpusId": 236246530}, "url": - "https://www.semanticscholar.org/paper/7e1dd28b8fc6cb63d37c344abc02a1dd06bee70f", + "venue": "Advanced Intelligent Systems", "year": 2021, "referenceCount": 34, + "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/aisy.202100025", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-06-02", "journal": {"volume": "3", "name": "Advanced + Intelligent Systems"}, "authors": [{"authorId": "46237159", "name": "D. Berco"}, + {"authorId": "144204958", "name": "D. Ang"}]}, {"paperId": "7e1dd28b8fc6cb63d37c344abc02a1dd06bee70f", + "externalIds": {"MAG": "3169673055", "DOI": "10.3390/JMSE9060612", "CorpusId": + 236246530}, "corpusId": 236246530, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e1dd28b8fc6cb63d37c344abc02a1dd06bee70f", "title": "Use of Genetic Programming for the Estimation of CODLAG Propulsion System Parameters", "abstract": "In this paper, the publicly available dataset for the Combined Diesel-Electric and Gas (CODLAG) propulsion system was used @@ -14993,9 +17174,10 @@ interactions: and total propeller torque without decay state coefficients while symbolic expressions with decay state coefficients have slightly lower estimation performance.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-02", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2077-1312/9/6/612/pdf?version=1622627216", + "status": null}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-02", "journal": {"volume": "9", "pages": "612", "name": "Journal of Marine Science and Engineering"}, "authors": [{"authorId": "100971349", "name": "N. An\u0111eli\u0107"}, {"authorId": "1397281869", "name": "Sandi Baressi Segota"}, {"authorId": "147321796", @@ -15003,7 +17185,7 @@ interactions: "94315279", "name": "V. Mrzljak"}, {"authorId": "145978031", "name": "Z. Car"}]}, {"paperId": "d1d2689d9da47a3545780e79f4542b98cdeadfde", "externalIds": {"MAG": "3169134790", "DOI": "10.30727/0235-1188-2021-64-1-102-115", "CorpusId": 236219533}, - "url": "https://www.semanticscholar.org/paper/d1d2689d9da47a3545780e79f4542b98cdeadfde", + "corpusId": 236219533, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d1d2689d9da47a3545780e79f4542b98cdeadfde", "title": "Architectural Approach to Design of Emotional Intelligent Systems", "abstract": "Over the past decades, due to the course towards digitalization of all areas of life, interest in modeling and creating intelligent systems @@ -15032,24 +17214,29 @@ interactions: programs, formulating and solving theoretical and methodological problems.", "venue": "Russian Journal of Philosophical Sciences", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-06-02", - "journal": {"name": "Russian Journal of Philosophical Sciences"}, "authors": - [{"authorId": "117496015", "name": "Alexandra V. Shiller"}, {"authorId": "88013883", - "name": "O. Petrunya"}]}, {"paperId": "92cbd12f802363b5b31c1c9fbdb82a8126938931", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-06-02", "journal": {"name": "Russian Journal of Philosophical Sciences"}, + "authors": [{"authorId": "117496015", "name": "Alexandra V. Shiller"}, {"authorId": + "88013883", "name": "O. Petrunya"}]}, {"paperId": "92cbd12f802363b5b31c1c9fbdb82a8126938931", "externalIds": {"DBLP": "journals/ais/Graham22", "MAG": "3170108245", "DOI": - "10.1007/s00146-021-01228-7", "CorpusId": 236219723}, "url": "https://www.semanticscholar.org/paper/92cbd12f802363b5b31c1c9fbdb82a8126938931", + "10.1007/s00146-021-01228-7", "CorpusId": 236219723}, "corpusId": 236219723, + "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": + "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": + "https://www.semanticscholar.org/paper/92cbd12f802363b5b31c1c9fbdb82a8126938931", "title": "Discourse analysis of academic debate of ethics for AGI", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 87, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-06-02", "journal": {"volume": - "37", "pages": "1519 - 1532", "name": "AI & SOCIETY"}, "authors": [{"authorId": - "2089380010", "name": "Ross Graham"}]}, {"paperId": "2669d1b0c858dcaf9e96e0eb30df54b1f16c4a7a", - "externalIds": {"DBLP": "journals/ubiquity/Riley21a", "DOI": "10.1145/3459743", - "CorpusId": 235689606}, "url": "https://www.semanticscholar.org/paper/2669d1b0c858dcaf9e96e0eb30df54b1f16c4a7a", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s00146-021-01228-7.pdf", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-06-02", "journal": {"volume": "37", "pages": "1519 - 1532", "name": + "AI & SOCIETY"}, "authors": [{"authorId": "2089380010", "name": "Ross Graham"}]}, + {"paperId": "2669d1b0c858dcaf9e96e0eb30df54b1f16c4a7a", "externalIds": {"DBLP": + "journals/ubiquity/Riley21a", "DOI": "10.1145/3459743", "CorpusId": 235689606}, + "corpusId": 235689606, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2669d1b0c858dcaf9e96e0eb30df54b1f16c4a7a", "title": "Will machines ever think like humans?", "abstract": "What is \"human intelligence?\" What is thinking? What does it mean to \"think like a human?\" Is it possible for machines to display human intelligence, to think like humans? @@ -15058,24 +17245,31 @@ interactions: to simulate those features and their ability to \"think.\" The article answers some questions, but asks more---finishing with questions for readers to consider.", "venue": "Ubiquity", "year": 2021, "referenceCount": 52, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-06-01", "journal": {"volume": "2021", "pages": "1 - - 26", "name": "Ubiquity"}, "authors": [{"authorId": "39914109", "name": "J. - Riley"}]}, {"paperId": "2ec4478121e025e4a75f717788ea903d7094710c", "externalIds": - {"MAG": "3170210134", "DOI": "10.1007/S10699-021-09799-W", "CorpusId": 236349491}, - "url": "https://www.semanticscholar.org/paper/2ec4478121e025e4a75f717788ea903d7094710c", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/3459743", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-06-01", "journal": {"volume": "2021", + "pages": "1 - 26", "name": "Ubiquity"}, "authors": [{"authorId": "39914109", + "name": "J. Riley"}]}, {"paperId": "2ec4478121e025e4a75f717788ea903d7094710c", + "externalIds": {"MAG": "3170210134", "DOI": "10.1007/S10699-021-09799-W", + "CorpusId": 236349491}, "corpusId": 236349491, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2ec4478121e025e4a75f717788ea903d7094710c", "title": "A New Definition of \u201cArtificial\u201d for Two Artificial Sciences", "abstract": null, "venue": "Foundations of Science", "year": 2021, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-01", - "journal": {"name": "Foundations of Science"}, "authors": [{"authorId": "39438795", - "name": "F. Bianchini"}]}, {"paperId": "8989538ac21c85ec44f5f5f44ecf3a678e983682", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10699-021-09799-w.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-06-01", "journal": {"name": "Foundations of Science"}, "authors": [{"authorId": + "39438795", "name": "F. Bianchini"}]}, {"paperId": "8989538ac21c85ec44f5f5f44ecf3a678e983682", "externalIds": {"PubMedCentral": "8227299", "DOI": "10.3390/mi12060665", "CorpusId": - 235645231, "PubMed": "34204065"}, "url": "https://www.semanticscholar.org/paper/8989538ac21c85ec44f5f5f44ecf3a678e983682", + 235645231, "PubMed": "34204065"}, "corpusId": 235645231, "publicationVenue": + {"id": "8ecc7f6b-513e-420d-9531-255b48a99a8a", "name": "Micromachines", "type": + "journal", "issn": "2072-666X", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-165882", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-165882", + "https://www.mdpi.com/journal/micromachines"]}, "url": "https://www.semanticscholar.org/paper/8989538ac21c85ec44f5f5f44ecf3a678e983682", "title": "Advancements in Microprocessor Architecture for Ubiquitous AI\u2014An Overview on History, Evolution, and Upcoming Challenges in AI Implementation", "abstract": "Artificial intelligence (AI) has successfully made its way into @@ -15109,14 +17303,16 @@ interactions: of application domains. The paper also discusses the upcoming trends in microprocessor architectures and how they will further propel the assimilation of AI in our daily lives.", "venue": "Micromachines", "year": 2021, "referenceCount": 144, - "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2021-06-01", "journal": - {"volume": "12", "name": "Micromachines"}, "authors": [{"authorId": "48660997", - "name": "F. Khan"}, {"authorId": "1721625", "name": "Muhammad Adeel Pasha"}, - {"authorId": "1703323", "name": "S. Masud"}]}, {"paperId": "d3fbac681fd87bad93e8b044ef4bc1dcfdd51e86", - "externalIds": {"DOI": "10.2139/ssrn.3896463", "CorpusId": 236910962}, "url": + "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.mdpi.com/2072-666X/12/6/665/pdf?version=1623122173", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2021-06-01", "journal": {"volume": "12", "name": "Micromachines"}, "authors": + [{"authorId": "48660997", "name": "F. Khan"}, {"authorId": "1721625", "name": + "Muhammad Adeel Pasha"}, {"authorId": "1703323", "name": "S. Masud"}]}, {"paperId": + "d3fbac681fd87bad93e8b044ef4bc1dcfdd51e86", "externalIds": {"DOI": "10.2139/ssrn.3896463", + "CorpusId": 236910962}, "corpusId": 236910962, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d3fbac681fd87bad93e8b044ef4bc1dcfdd51e86", "title": "The Role of Data for AI Startup Growth", "abstract": "Artificial intelligence (\u201cAI\u201d)-enabled products are expected to drive economic @@ -15127,26 +17323,32 @@ interactions: data are most important. Using unique survey data of AI startups, we find that startups with access to proprietary training data are more likely to acquire venture capital funding.", "venue": "SSRN Electronic Journal", "year": - 2021, "referenceCount": 63, "citationCount": 5, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + 2021, "referenceCount": 63, "citationCount": 7, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://scholarship.law.bu.edu/cgi/viewcontent.cgi?article=2159&context=faculty_scholarship", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-06-01", "journal": {"name": "IO: Productivity"}, "authors": [{"authorId": "1951483", "name": "James Bessen"}, {"authorId": "1393239973", "name": "Stephen Michael Impink"}, {"authorId": "1393239966", "name": "Lydia Reichensperger"}, {"authorId": "2093183", "name": "Robert C. Seamans"}]}, {"paperId": "bd2fbd1743134234fe2a661d3326b2f6026108ae", "externalIds": {"DBLP": "journals/mima/Peregrin21", "DOI": "10.1007/s11023-021-09564-9", - "CorpusId": 235915646}, "url": "https://www.semanticscholar.org/paper/bd2fbd1743134234fe2a661d3326b2f6026108ae", + "CorpusId": 235915646}, "corpusId": 235915646, "publicationVenue": {"id": + "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", "type": + "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/bd2fbd1743134234fe2a661d3326b2f6026108ae", "title": "Do Computers \"Have Syntax, But No Semantics\"?", "abstract": null, "venue": "Minds and Machines", "year": 2021, "referenceCount": 68, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}, - {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-01", "journal": {"volume": "31", "pages": "305 - 321", "name": "Minds and Machines"}, "authors": [{"authorId": "2782750", "name": "J. Peregrin"}]}, {"paperId": "43e434618fbca87648856e67874dfec4b6e8611c", "externalIds": {"DBLP": "conf/cvpr/OlagueOJI21", "DOI": "10.1109/CVPRW53098.2021.00171", - "CorpusId": 235666976}, "url": "https://www.semanticscholar.org/paper/43e434618fbca87648856e67874dfec4b6e8611c", + "CorpusId": 235666976}, "corpusId": 235666976, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/43e434618fbca87648856e67874dfec4b6e8611c", "title": "Less is More: Pursuing the Visual Turing Test with the Kuleshov Effect", "abstract": "The Turing test centers on the idea that if a computer could trick a human into believing that it was human, then the machine was @@ -15168,29 +17370,34 @@ interactions: new research avenue.", "venue": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "year": 2021, "referenceCount": 36, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2021-06-01", "journal": {"pages": "1553-1561", "name": "2021 IEEE/CVF Conference - on Computer Vision and Pattern Recognition Workshops (CVPRW)"}, "authors": - [{"authorId": "1721596", "name": "Gustavo Olague"}, {"authorId": "2125341066", - "name": "Matthieu Olague"}, {"authorId": "2125335465", "name": "Angel R. Jacobo-Lopez"}, - {"authorId": "1643930067", "name": "Gerardo Ibarra-V\u00e1zquez"}]}, {"paperId": - "e49770180cc8e20aedff0237f367bedc00208c64", "externalIds": {"DBLP": "journals/eaai/Bhatnagar21", - "MAG": "3158100292", "DOI": "10.1016/J.ENGAPPAI.2021.104241", "CorpusId": - 235508027}, "url": "https://www.semanticscholar.org/paper/e49770180cc8e20aedff0237f367bedc00208c64", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2021-06-01", "journal": {"pages": "1553-1561", + "name": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition + Workshops (CVPRW)"}, "authors": [{"authorId": "1721596", "name": "Gustavo + Olague"}, {"authorId": "2125341066", "name": "Matthieu Olague"}, {"authorId": + "2125335465", "name": "Angel R. Jacobo-Lopez"}, {"authorId": "1643930067", + "name": "Gerardo Ibarra-V\u00e1zquez"}]}, {"paperId": "e49770180cc8e20aedff0237f367bedc00208c64", + "externalIds": {"DBLP": "journals/eaai/Bhatnagar21", "MAG": "3158100292", + "DOI": "10.1016/J.ENGAPPAI.2021.104241", "CorpusId": 235508027}, "corpusId": + 235508027, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e49770180cc8e20aedff0237f367bedc00208c64", "title": "Competitive Optimality: A novel application in evaluating practical AI Systems", "abstract": null, "venue": "Eng. Appl. Artif. Intell.", "year": 2021, "referenceCount": 17, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-06-01", "journal": {"volume": "102", "pages": "104241", - "name": "Eng. Appl. Artif. Intell."}, "authors": [{"authorId": "47294631", - "name": "Jayant Bhatnagar"}]}, {"paperId": "9983dd0b93d268c31cc821b9f4071372d191000e", - "externalIds": {"ACL": "2021.naacl-main.386", "MAG": "3172931322", "DBLP": - "conf/naacl/ZellersHCQFC21", "DOI": "10.18653/V1/2021.NAACL-MAIN.386", "CorpusId": - 235097641}, "url": "https://www.semanticscholar.org/paper/9983dd0b93d268c31cc821b9f4071372d191000e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-06-01", "journal": + {"volume": "102", "pages": "104241", "name": "Eng. Appl. Artif. Intell."}, + "authors": [{"authorId": "47294631", "name": "Jayant Bhatnagar"}]}, {"paperId": + "9983dd0b93d268c31cc821b9f4071372d191000e", "externalIds": {"ACL": "2021.naacl-main.386", + "MAG": "3172931322", "DBLP": "conf/naacl/ZellersHCQFC21", "DOI": "10.18653/V1/2021.NAACL-MAIN.386", + "CorpusId": 235097641}, "corpusId": 235097641, "publicationVenue": {"id": + "01103732-3808-4930-b8e4-7e9e68d5c68d", "name": "North American Chapter of + the Association for Computational Linguistics", "type": "conference", "alternate_names": + ["North Am Chapter Assoc Comput Linguistics", "NAACL"], "url": "https://www.aclweb.org/portal/naacl"}, + "url": "https://www.semanticscholar.org/paper/9983dd0b93d268c31cc821b9f4071372d191000e", "title": "TuringAdvice: A Generative and Dynamic Evaluation of Language Use", "abstract": "We propose TuringAdvice, a new challenge task and dataset for language understanding models. Given a written situation that a real person @@ -15205,50 +17412,61 @@ interactions: errors that are hard to spot outside of a generative setting, showing much room for progress.", "venue": "North American Chapter of the Association for Computational Linguistics", "year": 2021, "referenceCount": 54, "citationCount": - 14, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-06-01", - "journal": {"pages": "4856-4880"}, "authors": [{"authorId": "2545335", "name": - "Rowan Zellers"}, {"authorId": "14487640", "name": "Ari Holtzman"}, {"authorId": - "40684993", "name": "Elizabeth Clark"}, {"authorId": "3444092", "name": "Lianhui - Qin"}, {"authorId": "143787583", "name": "Ali Farhadi"}, {"authorId": "1699545", - "name": "Yejin Choi"}]}, {"paperId": "3bc02208bcd58f664246e2387bc3b748118904d7", + 14, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://aclanthology.org/2021.naacl-main.386.pdf", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2021-06-01", "journal": {"pages": "4856-4880"}, "authors": [{"authorId": + "2545335", "name": "Rowan Zellers"}, {"authorId": "14487640", "name": "Ari + Holtzman"}, {"authorId": "40684993", "name": "Elizabeth Clark"}, {"authorId": + "3444092", "name": "Lianhui Qin"}, {"authorId": "143787583", "name": "Ali + Farhadi"}, {"authorId": "1699545", "name": "Yejin Choi"}]}, {"paperId": "3bc02208bcd58f664246e2387bc3b748118904d7", "externalIds": {"MAG": "3135766362", "DOI": "10.1016/J.RESCONREC.2021.105543", - "CorpusId": 233545910}, "url": "https://www.semanticscholar.org/paper/3bc02208bcd58f664246e2387bc3b748118904d7", + "CorpusId": 233545910}, "corpusId": 233545910, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3bc02208bcd58f664246e2387bc3b748118904d7", "title": "Computer Vision Based Two-stage Waste Recognition-Retrieval Algorithm for Waste Classification", "abstract": null, "venue": "", "year": 2021, "referenceCount": 42, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-06-01", - "journal": {"volume": "169", "pages": "105543", "name": "Resources Conservation - and Recycling"}, "authors": [{"authorId": "2108965373", "name": "Song Zhang"}, - {"authorId": "2109307160", "name": "Yumiao Chen"}, {"authorId": "2047089622", - "name": "Zhongliang Yang"}, {"authorId": "8727191", "name": "H. Gong"}]}, - {"paperId": "be601131851e3be6a3aa613a97a33c9f0da2e25d", "externalIds": {"DOI": - "10.1007/s10672-021-09377-z", "CorpusId": 254468095}, "url": "https://www.semanticscholar.org/paper/be601131851e3be6a3aa613a97a33c9f0da2e25d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-06-01", "journal": {"volume": "169", "pages": "105543", "name": "Resources + Conservation and Recycling"}, "authors": [{"authorId": "2108965373", "name": + "Song Zhang"}, {"authorId": "2109307160", "name": "Yumiao Chen"}, {"authorId": + "2047089622", "name": "Zhongliang Yang"}, {"authorId": "8727191", "name": + "H. Gong"}]}, {"paperId": "be601131851e3be6a3aa613a97a33c9f0da2e25d", "externalIds": + {"DOI": "10.1007/s10672-021-09377-z", "CorpusId": 254468095}, "corpusId": + 254468095, "publicationVenue": {"id": "522c6f08-b7ab-460a-992d-0f7abeabfabe", + "name": "Employee Responsibilities and Rights Journal", "type": "journal", + "alternate_names": ["Empl Responsib Right J"], "issn": "0892-7545", "url": + "https://link.springer.com/journal/10672"}, "url": "https://www.semanticscholar.org/paper/be601131851e3be6a3aa613a97a33c9f0da2e25d", "title": "Legal and Ethical Challenges for HR in Machine Learning", "abstract": null, "venue": "Employee Responsibilities and Rights Journal", "year": 2021, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-31", - "journal": {"volume": "34", "pages": "19 - 39", "name": "Employee Responsibilities - and Rights Journal"}, "authors": [{"authorId": "2059032485", "name": "R. H. - Hamilton"}, {"authorId": "50196351", "name": "H. K. Davison"}]}, {"paperId": - "33e5fe4fe223f2fb5cc87ec488daad6dce3edc7a", "externalIds": {"MAG": "3171468176", - "DOI": "10.1007/S10672-021-09377-Z", "CorpusId": 236424673}, "url": "https://www.semanticscholar.org/paper/33e5fe4fe223f2fb5cc87ec488daad6dce3edc7a", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-05-31", "journal": {"volume": "34", "pages": "19 - 39", "name": "Employee + Responsibilities and Rights Journal"}, "authors": [{"authorId": "2059032485", + "name": "R. H. Hamilton"}, {"authorId": "50196351", "name": "H. K. Davison"}]}, + {"paperId": "33e5fe4fe223f2fb5cc87ec488daad6dce3edc7a", "externalIds": {"MAG": + "3171468176", "DOI": "10.1007/S10672-021-09377-Z", "CorpusId": 236424673}, + "corpusId": 236424673, "publicationVenue": {"id": "522c6f08-b7ab-460a-992d-0f7abeabfabe", + "name": "Employee Responsibilities and Rights Journal", "type": "journal", + "alternate_names": ["Empl Responsib Right J"], "issn": "0892-7545", "url": + "https://link.springer.com/journal/10672"}, "url": "https://www.semanticscholar.org/paper/33e5fe4fe223f2fb5cc87ec488daad6dce3edc7a", "title": "Legal and Ethical Challenges for HR in Machine Learning", "abstract": null, "venue": "Employee Responsibilities and Rights Journal", "year": 2021, "referenceCount": 36, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-05-31", "journal": {"volume": - "34", "pages": "19-39", "name": "Employee Responsibilities and Rights Journal"}, - "authors": [{"authorId": "2059032485", "name": "R. H. Hamilton"}, {"authorId": - "50196351", "name": "H. K. Davison"}]}, {"paperId": "d7d057ee6a9048b6e230c3e233432ab94d18c3e7", - "externalIds": {"MAG": "3168957553", "DOI": "10.21810/JICW.V4I1.2566", "CorpusId": - 236411724}, "url": "https://www.semanticscholar.org/paper/d7d057ee6a9048b6e230c3e233432ab94d18c3e7", + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-31", + "journal": {"volume": "34", "pages": "19-39", "name": "Employee Responsibilities + and Rights Journal"}, "authors": [{"authorId": "2059032485", "name": "R. H. + Hamilton"}, {"authorId": "50196351", "name": "H. K. Davison"}]}, {"paperId": + "d7d057ee6a9048b6e230c3e233432ab94d18c3e7", "externalIds": {"MAG": "3168957553", + "DOI": "10.21810/JICW.V4I1.2566", "CorpusId": 236411724}, "corpusId": 236411724, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d7d057ee6a9048b6e230c3e233432ab94d18c3e7", "title": "Why HAL 9000 is not the future of intelligence analysis", "abstract": "Intelligence analysis is a core function of the intelligence process, and its goal is to synthesize reliable information to assist decision-makers to @@ -15273,13 +17491,14 @@ interactions: by any practical definition of the words, foolproof and incapable of error. Stanley Kubrick \u2013 2001 \u2013 A Space Odyssey", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-05-31", "journal": {"volume": "4", "pages": "40-60", "name": ""}, "authors": - [{"authorId": "113670294", "name": "G. Pili"}]}, {"paperId": "13bd12875db0785b9499de2714e49cdb4553ffbf", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.lib.sfu.ca/index.php/jicw/article/download/2566/2207", + "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Political Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-31", + "journal": {"volume": "4", "pages": "40-60", "name": ""}, "authors": [{"authorId": + "113670294", "name": "G. Pili"}]}, {"paperId": "13bd12875db0785b9499de2714e49cdb4553ffbf", "externalIds": {"MAG": "3166684973", "DOI": "10.32628/CSEIT217382", "CorpusId": - 236422298}, "url": "https://www.semanticscholar.org/paper/13bd12875db0785b9499de2714e49cdb4553ffbf", + 236422298}, "corpusId": 236422298, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13bd12875db0785b9499de2714e49cdb4553ffbf", "title": "Review on Robotic Machine to Solve the Matrix with Natural Language Processing and Image Processing", "abstract": "As the world is moving faster, humans are not taking a step back to make the world more better place, may @@ -15302,15 +17521,20 @@ interactions: "venue": "International Journal of Scientific Research in Computer Science, Engineering and Information Technology", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-05-30", - "journal": {"name": "International Journal of Scientific Research in Computer - Science, Engineering and Information Technology"}, "authors": [{"authorId": - "134772948", "name": "Sonali Zunke"}, {"authorId": "2121165254", "name": "Sandesh - Ukey"}, {"authorId": "2121198532", "name": "Dipak Mendhe"}]}, {"paperId": - "8c9463950f8019368d6e6e6aa1dfe4b57262999b", "externalIds": {"DBLP": "journals/ccs/CrookC21", - "MAG": "3169927403", "DOI": "10.1049/CCS2.12024", "CorpusId": 236402575}, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-05-30", "journal": {"name": "International Journal of Scientific Research + in Computer Science, Engineering and Information Technology"}, "authors": + [{"authorId": "134772948", "name": "Sonali Zunke"}, {"authorId": "2121165254", + "name": "Sandesh Ukey"}, {"authorId": "2121198532", "name": "Dipak Mendhe"}]}, + {"paperId": "8c9463950f8019368d6e6e6aa1dfe4b57262999b", "externalIds": {"DBLP": + "journals/ccs/CrookC21", "MAG": "3169927403", "DOI": "10.1049/CCS2.12024", + "CorpusId": 236402575}, "corpusId": 236402575, "publicationVenue": {"id": + "f8692cd7-d4ba-496a-9fb5-c4b6dda9c6c8", "name": "Cognitive Computation and + Systems", "type": "journal", "alternate_names": ["Cogn Comput Syst"], "issn": + "2517-7567", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=8694204", + "alternate_urls": ["https://digital-library.theiet.org/content/journals/ccs"]}, "url": "https://www.semanticscholar.org/paper/8c9463950f8019368d6e6e6aa1dfe4b57262999b", "title": "The Anatomy of moral agency: A theological and neuroscience inspired model of virtue ethics", "abstract": "VirtuosA (\u2018virtuous algorithm\u2019) @@ -15329,28 +17553,37 @@ interactions: role of \u2018embedded evaluation\u2019 within the system\u2014and its broader application as a meta \u2010 ethical device is discussed.", "venue": "Cognitive Computation and Systems", "year": 2021, "referenceCount": 42, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "external"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-05-30", "journal": {"volume": "3", "pages": "109-122", - "name": "Cogn. Comput. Syst."}, "authors": [{"authorId": "143902642", "name": - "N. Crook"}, {"authorId": "1829225", "name": "J. Corneli"}]}, {"paperId": - "c435bf5339e882ac4a1b578e7c43e6680e2ddcd2", "externalIds": {"DOI": "10.1016/j.aca.2021.338403", - "CorpusId": 233398983, "PubMed": "33896558"}, "url": "https://www.semanticscholar.org/paper/c435bf5339e882ac4a1b578e7c43e6680e2ddcd2", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://radar.brookes.ac.uk/radar/file/13b5f863-c37d-497c-a427-a5eb68b65f35/1/ccs2.12024.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-30", "journal": + {"volume": "3", "pages": "109-122", "name": "Cogn. Comput. Syst."}, "authors": + [{"authorId": "143902642", "name": "N. Crook"}, {"authorId": "1829225", "name": + "J. Corneli"}]}, {"paperId": "c435bf5339e882ac4a1b578e7c43e6680e2ddcd2", "externalIds": + {"DOI": "10.1016/j.aca.2021.338403", "CorpusId": 233398983, "PubMed": "33896558"}, + "corpusId": 233398983, "publicationVenue": {"id": "7a81d01c-ee3f-4f27-b696-01f35da67f22", + "name": "Analytica Chimica Acta", "type": "journal", "alternate_names": ["Anal + Chim Acta"], "issn": "0003-2670", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/502681/description#description", + "alternate_urls": ["http://www.elsevier.com/wps/product/cws_home/502681", + "http://www.sciencedirect.com/science/journal/00032670"]}, "url": "https://www.semanticscholar.org/paper/c435bf5339e882ac4a1b578e7c43e6680e2ddcd2", "title": "Taking the leap between analytical chemistry and artificial intelligence: A tutorial review.", "abstract": null, "venue": "Analytica Chimica Acta", - "year": 2021, "referenceCount": 213, "citationCount": 31, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2021-05-29", "journal": {"volume": "1161", "pages": "\n 338403\n ", - "name": "Analytica chimica acta"}, "authors": [{"authorId": "1854804642", - "name": "Lucas B Ayres"}, {"authorId": "14202912", "name": "F. Gomez"}, {"authorId": - "153882913", "name": "Jeb Linton"}, {"authorId": "77218025", "name": "M. F. - Silva"}, {"authorId": "67013943", "name": "Carlos D. Garcia"}]}, {"paperId": - "27bd1862d6656327890fef4f295345ea5f4ac1fd", "externalIds": {"MAG": "3162926692", - "DOI": "10.1002/pssr.202100125", "CorpusId": 236362886}, "url": "https://www.semanticscholar.org/paper/27bd1862d6656327890fef4f295345ea5f4ac1fd", + "year": 2021, "referenceCount": 213, "citationCount": 35, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", + "JournalArticle"], "publicationDate": "2021-05-29", "journal": {"volume": + "1161", "pages": "\n 338403\n ", "name": "Analytica chimica + acta"}, "authors": [{"authorId": "1854804642", "name": "Lucas B Ayres"}, {"authorId": + "14202912", "name": "F. Gomez"}, {"authorId": "153882913", "name": "Jeb Linton"}, + {"authorId": "77218025", "name": "M. F. Silva"}, {"authorId": "67013943", + "name": "Carlos D. Garcia"}]}, {"paperId": "27bd1862d6656327890fef4f295345ea5f4ac1fd", + "externalIds": {"MAG": "3162926692", "DOI": "10.1002/pssr.202100125", "CorpusId": + 236362886}, "corpusId": 236362886, "publicationVenue": {"id": "c6360017-172c-488c-b990-d092fbdd065e", + "name": "Physica Status Solidi (a)", "type": "journal", "alternate_names": + ["Phys Status Solidus (a"]}, "url": "https://www.semanticscholar.org/paper/27bd1862d6656327890fef4f295345ea5f4ac1fd", "title": "Multistate Magnetic Domain Wall Devices for Neuromorphic Computing", "abstract": "In recent years, neuromorphic computing has been intensively investigated, to take over the conventional or von Neumann scheme. Herein, @@ -15362,13 +17595,20 @@ interactions: memory applications are of great advantage for neuromorphic computing and their implementation is presented herein.", "venue": "Physica Status Solidi (a)", "year": 2021, "referenceCount": 95, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-27", - "journal": {"volume": "15", "name": "physica status solidi (RRL) \u2013 Rapid - Research Letters"}, "authors": [{"authorId": "5644942", "name": "R. Sbiaa"}]}, - {"paperId": "5d1311d43086a9abc01e3faa94da9f126402079b", "externalIds": {"MAG": - "3168055587", "DOI": "10.1002/wat2.1533", "CorpusId": 236340567}, "url": "https://www.semanticscholar.org/paper/5d1311d43086a9abc01e3faa94da9f126402079b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-05-27", "journal": {"volume": "15", "name": "physica status solidi (RRL) + \u2013 Rapid Research Letters"}, "authors": [{"authorId": "5644942", "name": + "R. Sbiaa"}]}, {"paperId": "5d1311d43086a9abc01e3faa94da9f126402079b", "externalIds": + {"MAG": "3168055587", "DOI": "10.1002/wat2.1533", "CorpusId": 236340567}, + "corpusId": 236340567, "publicationVenue": {"id": "c869678a-e697-4742-9f17-3a28324360d7", + "name": "WIREs Water", "type": "journal", "alternate_names": ["Wire Water", + "Wiley Interdisciplinary Reviews: Water", "Wiley Interdiscip Rev Water"], + "issn": "2049-1948", "url": "http://onlinelibrary.wiley.com/doi/10.1002/wat2.2014.1.issue-1/issuetoc", + "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2049-1948/issues", + "https://onlinelibrary.wiley.com/journal/20491948", "http://wires.wiley.com/WileyCDA/WiresJournal/wisId-WAT2.html"]}, + "url": "https://www.semanticscholar.org/paper/5d1311d43086a9abc01e3faa94da9f126402079b", "title": "Machine learning for hydrologic sciences: An introductory overview", "abstract": "The hydrologic community has experienced a surge in interest in machine learning in recent years. This interest is primarily driven by @@ -15388,28 +17628,36 @@ interactions: robustness, physical interpretability, and small sample size in hydrologic applications.", "venue": "WIREs Water", "year": 2021, "referenceCount": 228, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-05-27", "journal": - {"volume": "8", "name": "Wiley Interdisciplinary Reviews: Water"}, "authors": - [{"authorId": "2569873", "name": "Tianfang Xu"}, {"authorId": "34212044", - "name": "F. Liang"}]}, {"paperId": "61b265b5a07bb563c2072e20ba22d3b9cdb95bc0", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-05-27", "journal": {"volume": "8", "name": "Wiley Interdisciplinary + Reviews: Water"}, "authors": [{"authorId": "2569873", "name": "Tianfang Xu"}, + {"authorId": "34212044", "name": "F. Liang"}]}, {"paperId": "61b265b5a07bb563c2072e20ba22d3b9cdb95bc0", "externalIds": {"DBLP": "journals/ais/MontemayorHF22", "PubMedCentral": "8149918", "DOI": "10.1007/s00146-021-01230-z", "CorpusId": 235212774, "PubMed": "34054228"}, + "corpusId": 235212774, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", + "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/61b265b5a07bb563c2072e20ba22d3b9cdb95bc0", "title": "In principle obstacles for empathic AI: why we can\u2019t replace human empathy in healthcare", "abstract": null, "venue": "Ai & Society", "year": - 2021, "referenceCount": 30, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-05-26", "journal": {"volume": "37", "pages": "1353 - 1359", "name": - "Ai & Society"}, "authors": [{"authorId": "144520696", "name": "Carlos Montemayor"}, - {"authorId": "114115029", "name": "J. Halpern"}, {"authorId": "30203426", - "name": "A. Fairweather"}]}, {"paperId": "73e80d83569326b15bbe75b1963b327fd7db18b9", - "externalIds": {"MAG": "3169223448", "DOI": "10.3390/APP11114853", "CorpusId": - 236331947}, "url": "https://www.semanticscholar.org/paper/73e80d83569326b15bbe75b1963b327fd7db18b9", + 2021, "referenceCount": 30, "citationCount": 9, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s00146-021-01230-z.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-26", "journal": + {"volume": "37", "pages": "1353 - 1359", "name": "Ai & Society"}, "authors": + [{"authorId": "144520696", "name": "Carlos Montemayor"}, {"authorId": "114115029", + "name": "J. Halpern"}, {"authorId": "30203426", "name": "A. Fairweather"}]}, + {"paperId": "73e80d83569326b15bbe75b1963b327fd7db18b9", "externalIds": {"MAG": + "3169223448", "DOI": "10.3390/APP11114853", "CorpusId": 236331947}, "corpusId": + 236331947, "publicationVenue": {"id": "136edf8d-0f88-4c2c-830f-461c6a9b842e", + "name": "Applied Sciences", "type": "journal", "alternate_names": ["Appl Sci"], + "issn": "2076-3417", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217814", + "alternate_urls": ["http://www.mathem.pub.ro/apps/", "https://www.mdpi.com/journal/applsci", + "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217814"]}, "url": + "https://www.semanticscholar.org/paper/73e80d83569326b15bbe75b1963b327fd7db18b9", "title": "Contextual Information Helps Understand Messages Written with Textisms", "abstract": "The present study investigated the influence of the use of textisms, a form of written language used in phone-mediated conversations, on the cognitive @@ -15426,16 +17674,22 @@ interactions: knowledge about the conversation can help interpret the messages written in textisms by decreasing the cognitive cost required to infer their meaning.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 48, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2021-05-25", "journal": {"volume": "11", "pages": - "4853", "name": "Applied Sciences"}, "authors": [{"authorId": "51197903", - "name": "Baptiste Jacquet"}, {"authorId": "2120875336", "name": "Caline Jaraud"}, - {"authorId": "47778763", "name": "Frank Jamet"}, {"authorId": "6617893", "name": - "S. Gu\u00e9raud"}, {"authorId": "1779633", "name": "Jean Baratgin"}]}, {"paperId": - "33ee7e223680001cda57ecf313eb6b07d86c92ef", "externalIds": {"MAG": "3164280995", - "DOI": "10.1080/00423114.2021.1930070", "CorpusId": 236391220}, "url": "https://www.semanticscholar.org/paper/33ee7e223680001cda57ecf313eb6b07d86c92ef", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2076-3417/11/11/4853/pdf", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-05-25", "journal": {"volume": + "11", "pages": "4853", "name": "Applied Sciences"}, "authors": [{"authorId": + "51197903", "name": "Baptiste Jacquet"}, {"authorId": "2120875336", "name": + "Caline Jaraud"}, {"authorId": "47778763", "name": "Frank Jamet"}, {"authorId": + "6617893", "name": "S. Gu\u00e9raud"}, {"authorId": "1779633", "name": "Jean + Baratgin"}]}, {"paperId": "33ee7e223680001cda57ecf313eb6b07d86c92ef", "externalIds": + {"MAG": "3164280995", "DOI": "10.1080/00423114.2021.1930070", "CorpusId": + 236391220}, "corpusId": 236391220, "publicationVenue": {"id": "067c4376-ef7c-402d-adff-70aa4b036a53", + "name": "Vehicle System Dynamics", "type": "journal", "alternate_names": ["Veh + Syst Dyn"], "issn": "0042-3114", "url": "http://www.tandfonline.com/doi/abs/10.1080/00423114.2014.889317", + "alternate_urls": ["http://www.tandfonline.com/toc/nvsd20/current"]}, "url": + "https://www.semanticscholar.org/paper/33ee7e223680001cda57ecf313eb6b07d86c92ef", "title": "Identification and modelling of race driving styles", "abstract": "A good understanding and modelling of the human driver is essential for modern vehicle development, particularly in motorsports, where the race car should @@ -15456,16 +17710,17 @@ interactions: not only support the performance optimisation of race cars but could also aid the development of road cars and driver assistance systems in future work.", "venue": "Vehicle System Dynamics", "year": 2021, "referenceCount": 28, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-25", "journal": {"volume": "60", "pages": "2890 - 2918", "name": "Vehicle System Dynamics"}, "authors": [{"authorId": "1490762849", "name": "Stefan L\u00f6ckel"}, {"authorId": "2121112191", "name": "Andr\u00e9 Kretschi"}, {"authorId": "2095574518", "name": "Peter van Vliet"}, {"authorId": "145197867", "name": "Jan Peters"}]}, {"paperId": "ace5e1d171f80181cd3fdecccd88d6a0ab89e0e0", "externalIds": {"DBLP": "journals/corr/abs-2105-11977", - "CorpusId": 235186970}, "url": "https://www.semanticscholar.org/paper/ace5e1d171f80181cd3fdecccd88d6a0ab89e0e0", + "CorpusId": 235186970}, "corpusId": 235186970, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ace5e1d171f80181cd3fdecccd88d6a0ab89e0e0", "title": "Towards Teachable Autonomous Agents", "abstract": "Autonomous discovery and direct instruction are two extreme sources of learning in children, but educational sciences have shown that intermediate approaches such as assisted @@ -15496,16 +17751,21 @@ interactions: questions that emerge from the perspective of extending these agents with assisted learning capabilities.", "venue": "ArXiv", "year": 2021, "referenceCount": 184, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "abs/2105.11977", "name": "ArXiv"}, "authors": - [{"authorId": "97009622", "name": "Olivier Sigaud"}, {"authorId": "2105163700", - "name": "Hugo Caselles-Dupr''e"}, {"authorId": "102281182", "name": "C\u00e9dric - Colas"}, {"authorId": "1748962255", "name": "Ahmed Akakzia"}, {"authorId": - "1720664", "name": "P. Oudeyer"}, {"authorId": "1680828", "name": "M. Chetouani"}]}, - {"paperId": "11542e0d7dc0de8af1bde32131400ccc2a0a2815", "externalIds": {"ArXiv": - "2105.11977", "CorpusId": 247155190}, "url": "https://www.semanticscholar.org/paper/11542e0d7dc0de8af1bde32131400ccc2a0a2815", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "abs/2105.11977", "name": "ArXiv"}, + "authors": [{"authorId": "97009622", "name": "Olivier Sigaud"}, {"authorId": + "2105163700", "name": "Hugo Caselles-Dupr''e"}, {"authorId": "102281182", + "name": "C\u00e9dric Colas"}, {"authorId": "1748962255", "name": "Ahmed Akakzia"}, + {"authorId": "1720664", "name": "P. Oudeyer"}, {"authorId": "1680828", "name": + "M. Chetouani"}]}, {"paperId": "11542e0d7dc0de8af1bde32131400ccc2a0a2815", + "externalIds": {"ArXiv": "2105.11977", "DOI": "10.1109/tcds.2022.3231731", + "CorpusId": 247155190}, "corpusId": 247155190, "publicationVenue": {"id": + "f35f148a-0a3c-45db-b610-3d89e09ddf21", "name": "IEEE Transactions on Cognitive + and Developmental Systems", "type": "journal", "alternate_names": ["IEEE Trans + Cogn Dev Syst"], "issn": "2379-8920", "url": "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=7274989"}, + "url": "https://www.semanticscholar.org/paper/11542e0d7dc0de8af1bde32131400ccc2a0a2815", "title": "Towards Teachable Autotelic Agents", "abstract": "Autonomous discovery and direct instruction are two distinct sources of learning in children but education sciences demonstrate that mixed approaches such as assisted discovery @@ -15526,31 +17786,45 @@ interactions: learning agents and to identify the promising first steps towards TAAs. It also shows the way forward by highlighting key research directions towards the design or autonomous agents that can be taught by ordinary people via - natural pedagogy.", "venue": "", "year": 2021, "referenceCount": 133, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-05-25", "journal": null, - "authors": [{"authorId": "97009622", "name": "Olivier Sigaud"}, {"authorId": - "1748962255", "name": "Ahmed Akakzia"}, {"authorId": "2105163700", "name": - "Hugo Caselles-Dupr''e"}, {"authorId": "102281182", "name": "C\u00e9dric Colas"}, - {"authorId": "1720664", "name": "P. Oudeyer"}, {"authorId": "1680828", "name": - "M. Chetouani"}]}, {"paperId": "9d738b480f4f3dec46bb58521c672b9373911e4e", + natural pedagogy.", "venue": "IEEE Transactions on Cognitive and Developmental + Systems", "year": 2021, "referenceCount": 132, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2105.11977", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-05-25", "journal": {"name": "IEEE Transactions on Cognitive and Developmental + Systems"}, "authors": [{"authorId": "97009622", "name": "Olivier Sigaud"}, + {"authorId": "1748962255", "name": "Ahmed Akakzia"}, {"authorId": "2105163700", + "name": "Hugo Caselles-Dupr''e"}, {"authorId": "102281182", "name": "C\u00e9dric + Colas"}, {"authorId": "1720664", "name": "P. Oudeyer"}, {"authorId": "1680828", + "name": "M. Chetouani"}]}, {"paperId": "9d738b480f4f3dec46bb58521c672b9373911e4e", "externalIds": {"PubMedCentral": "8149775", "DOI": "10.1186/s11671-021-03551-w", - "CorpusId": 235173606, "PubMed": "34032946"}, "url": "https://www.semanticscholar.org/paper/9d738b480f4f3dec46bb58521c672b9373911e4e", + "CorpusId": 235173606, "PubMed": "34032946"}, "corpusId": 235173606, "publicationVenue": + {"id": "3b4318be-4c22-4344-b624-b649afcaa297", "name": "Nanoscale Research + Letters", "type": "journal", "alternate_names": ["Nanoscale Res Lett"], "issn": + "1556-276X", "url": "http://www.nanoscalereslett.com/", "alternate_urls": + ["http://www.springer.com/materials/nanotechnology/journal/11671", "http://www.nanoscalereslett.com/content", + "https://nanoscalereslett.springeropen.com/", "https://link.springer.com/journal/11671", + "https://nanoscalereslett.springeropen.com"]}, "url": "https://www.semanticscholar.org/paper/9d738b480f4f3dec46bb58521c672b9373911e4e", "title": "2D Semiconductor Nanomaterials and Heterostructures: Controlled Synthesis and Functional Applications", "abstract": null, "venue": "Nanoscale Research Letters", "year": 2021, "referenceCount": 202, "citationCount": 7, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "s2-fos-model"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2021-05-25", "journal": {"volume": "16", "name": "Nanoscale - Research Letters"}, "authors": [{"authorId": "47995337", "name": "Hongyan - Xu"}, {"authorId": "47202279", "name": "M. Akbari"}, {"authorId": "5561281", - "name": "S. Zhuiykov"}]}, {"paperId": "634345dba75c2740fe1595c9814d69e601223090", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}, + {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2021-05-25", "journal": + {"volume": "16", "name": "Nanoscale Research Letters"}, "authors": [{"authorId": + "47995337", "name": "Hongyan Xu"}, {"authorId": "47202279", "name": "M. Akbari"}, + {"authorId": "5561281", "name": "S. Zhuiykov"}]}, {"paperId": "634345dba75c2740fe1595c9814d69e601223090", "externalIds": {"DBLP": "journals/complexity/ChaoTW21", "DOI": "10.1155/2021/5511866", - "CorpusId": 235496227}, "url": "https://www.semanticscholar.org/paper/634345dba75c2740fe1595c9814d69e601223090", + "CorpusId": 235496227}, "corpusId": 235496227, "publicationVenue": {"id": + "8bc59e8b-e251-4201-839a-ec83ae78859d", "name": "Complex", "type": "conference", + "alternate_names": ["Int Conf Complex Sci", "International Conference on Complex + Sciences"], "issn": "0806-1912", "alternate_issns": ["1538-6848"], "url": + "http://wo.uio.no/as/WebObjects/nettlogg.woa/1/wa/logg?logg=5904", "alternate_urls": + ["http://www.wikicfp.com/cfp/program?id=545", "https://www.complex.com/"]}, + "url": "https://www.semanticscholar.org/paper/634345dba75c2740fe1595c9814d69e601223090", "title": "Emerging Technologies of Natural Language-Enabled Chatbots: A Review and Trend Forecast Using Intelligent Ontology Extraction and Patent Analytics", "abstract": "Natural language processing (NLP) is a critical part of the digital @@ -15567,27 +17841,33 @@ interactions: This research utilizes the Derwent Innovation database as the main source for global intelligent chatbot patent retrievals.", "venue": "Complex", "year": 2021, "referenceCount": 79, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-05-24", "journal": {"volume": "2021", "pages": "5511866:1-5511866:26", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/complexity/2021/5511866.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2021-05-24", "journal": {"volume": "2021", "pages": "5511866:1-5511866:26", "name": "Complex."}, "authors": [{"authorId": "121915306", "name": "M.-H. Chao"}, {"authorId": "1761458", "name": "A. Trappey"}, {"authorId": "2118840756", "name": "Chunwang Wu"}]}, {"paperId": "9fa54bdd98ea77950e1d666cb2e158caaff3c7ea", "externalIds": {"DOI": "10.1093/neuros/nyab170", "CorpusId": 235074752, "PubMed": - "34015816"}, "url": "https://www.semanticscholar.org/paper/9fa54bdd98ea77950e1d666cb2e158caaff3c7ea", + "34015816"}, "corpusId": 235074752, "publicationVenue": {"id": "396750b3-c753-4765-b283-ca20a4ddd616", + "name": "Neurosurgery", "type": "journal", "issn": "0148-396X", "url": "http://www.neurosurgery-online.com/"}, + "url": "https://www.semanticscholar.org/paper/9fa54bdd98ea77950e1d666cb2e158caaff3c7ea", "title": "Machine Learning and Artificial Intelligence in Neurosurgery: Status, Prospects, and Challenges.", "abstract": "is the application of specific data-mining methods for pattern discovery and extraction.\u201d 55,56", "venue": "Neurosurgery", - "year": 2021, "referenceCount": 95, "citationCount": 10, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-05-20", "journal": {"name": "Neurosurgery"}, "authors": [{"authorId": - "4523139", "name": "T. Dagi"}, {"authorId": "12620660", "name": "F. Barker"}, - {"authorId": "3776554", "name": "Jacob L Glass"}]}, {"paperId": "d95db65444615528fb56395a4bb01048570cc1cf", + "year": 2021, "referenceCount": 95, "citationCount": 11, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-05-20", "journal": {"name": "Neurosurgery"}, "authors": + [{"authorId": "4523139", "name": "T. Dagi"}, {"authorId": "12620660", "name": + "F. Barker"}, {"authorId": "3776554", "name": "J. Glass"}]}, {"paperId": "d95db65444615528fb56395a4bb01048570cc1cf", "externalIds": {"DBLP": "journals/corr/abs-2105-09637", "ArXiv": "2105.09637", - "CorpusId": 234790236}, "url": "https://www.semanticscholar.org/paper/d95db65444615528fb56395a4bb01048570cc1cf", + "CorpusId": 234790236}, "corpusId": 234790236, "publicationVenue": {"id": + "fc0a208c-acb7-47dc-a0d4-af8190e21d29", "name": "International Conference + on Machine Learning", "type": "conference", "alternate_names": ["ICML", "Int + Conf Mach Learn"], "url": "https://icml.cc/"}, "url": "https://www.semanticscholar.org/paper/d95db65444615528fb56395a4bb01048570cc1cf", "title": "Navigation Turing Test (NTT): Learning to Evaluate Human-Like Navigation", "abstract": "A key challenge on the path to developing agents that learn complex human-like behavior is the need to quickly and accurately quantify humanlikeness. @@ -15604,21 +17884,22 @@ interactions: step towards agents that more effectively learn complex human-like behavior.", "venue": "International Conference on Machine Learning", "year": 2021, "referenceCount": 36, "citationCount": 11, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2021-05-20", "journal": {"pages": "2644-2653"}, - "authors": [{"authorId": "1693696", "name": "Sam Devlin"}, {"authorId": "2099584262", - "name": "Raluca Georgescu"}, {"authorId": "1990422", "name": "I. Momennejad"}, - {"authorId": "1393020942", "name": "Jaroslaw Rzepecki"}, {"authorId": "2099584476", - "name": "Evelyn Zuniga"}, {"authorId": "2099584169", "name": "Gavin Costello"}, - {"authorId": "1882823652", "name": "Guy Leroy"}, {"authorId": "2052352179", - "name": "A. Shaw"}, {"authorId": "1380228856", "name": "Katja Hofmann"}]}, - {"paperId": "cf2a580f659e71e52b315eb89173d489cd23e710", "externalIds": {"MAG": - "3162441579", "DBLP": "journals/firai/LinSDMBM21", "PubMedCentral": "8172185", - "DOI": "10.3389/frobt.2021.579993", "CorpusId": 234773545, "PubMed": "34095237"}, - "url": "https://www.semanticscholar.org/paper/cf2a580f659e71e52b315eb89173d489cd23e710", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}, + {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2021-05-20", "journal": + {"pages": "2644-2653"}, "authors": [{"authorId": "1693696", "name": "Sam Devlin"}, + {"authorId": "2099584262", "name": "Raluca Georgescu"}, {"authorId": "1990422", + "name": "I. Momennejad"}, {"authorId": "1393020942", "name": "Jaroslaw Rzepecki"}, + {"authorId": "2099584476", "name": "Evelyn Zuniga"}, {"authorId": "2099584169", + "name": "Gavin Costello"}, {"authorId": "1882823652", "name": "Guy Leroy"}, + {"authorId": "2052352179", "name": "A. Shaw"}, {"authorId": "1380228856", + "name": "Katja Hofmann"}]}, {"paperId": "cf2a580f659e71e52b315eb89173d489cd23e710", + "externalIds": {"MAG": "3162441579", "DBLP": "journals/firai/LinSDMBM21", + "PubMedCentral": "8172185", "DOI": "10.3389/frobt.2021.579993", "CorpusId": + 234773545, "PubMed": "34095237"}, "corpusId": 234773545, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/cf2a580f659e71e52b315eb89173d489cd23e710", "title": "Parental Acceptance of Children\u2019s Storytelling Robots: A Projection of the Uncanny Valley of AI", "abstract": "Parent\u2013child story time is an important ritual of contemporary parenting. Recently, robots with artificial @@ -15639,10 +17920,11 @@ interactions: to education, and propose directions for research on their design to benefit family well-being.", "venue": "Frontiers in Robotics and AI", "year": 2021, "referenceCount": 147, "citationCount": 5, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Psychology", "Medicine", "Computer - Science"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.frontiersin.org/articles/10.3389/frobt.2021.579993/pdf", + "status": null}, "fieldsOfStudy": ["Psychology", "Medicine", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-19", "journal": {"volume": "8", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "10203338", "name": "Chaolan Lin"}, {"authorId": "1746316", "name": "S. \u0160abanovi\u0107"}, @@ -15650,7 +17932,8 @@ interactions: "name": "Andrew D. Miller"}, {"authorId": "145521690", "name": "Erin L. Brady"}, {"authorId": "1690354", "name": "K. Macdorman"}]}, {"paperId": "03c858ff9751cc33a4b32608a63fd310f5843d42", "externalIds": {"DBLP": "journals/aisy/ShafferDTSDNGIC21", "MAG": "3161538890", - "DOI": "10.1002/aisy.202100016", "CorpusId": 236351018}, "url": "https://www.semanticscholar.org/paper/03c858ff9751cc33a4b32608a63fd310f5843d42", + "DOI": "10.1002/aisy.202100016", "CorpusId": 236351018}, "corpusId": 236351018, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/03c858ff9751cc33a4b32608a63fd310f5843d42", "title": "Self\u2010Programming Synaptic Resistor Circuit for Intelligent Systems", "abstract": "Unlike artificial intelligent systems based on computers which have to be programmed for specific tasks, the human brain \u201cself\u2010programs\u201d @@ -15673,31 +17956,38 @@ interactions: limitations of computers, leading to a new intelligent platform with real\u2010time self\u2010programming functionality for artificial general intelligence.", "venue": "Adv. Intell. Syst.", "year": 2021, "referenceCount": 28, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-18", "journal": - {"volume": "3", "name": "Advanced Intelligent Systems"}, "authors": [{"authorId": - "2064587931", "name": "Christopher M. Shaffer"}, {"authorId": "2120970339", - "name": "Atharva Deo"}, {"authorId": "1644001317", "name": "Andrew Tudor"}, - {"authorId": "2120987164", "name": "Rahul Shenoy"}, {"authorId": "15893281", - "name": "Cameron D. Danesh"}, {"authorId": "2120971756", "name": "Dhruva Nathan"}, - {"authorId": "41021502", "name": "Lawren L. Gamble"}, {"authorId": "144878341", - "name": "D. Inman"}, {"authorId": "2144257643", "name": "Yong Chen"}]}, {"paperId": - "26daa0d1e8a6acc02843eac53342affb4e92bd2a", "externalIds": {"DOI": "10.1016/j.apergo.2021.103428", - "CorpusId": 235093104, "PubMed": "34020096"}, "url": "https://www.semanticscholar.org/paper/26daa0d1e8a6acc02843eac53342affb4e92bd2a", + 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/aisy.202100016", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-05-18", "journal": {"volume": "3", "name": "Advanced Intelligent Systems"}, + "authors": [{"authorId": "2064587931", "name": "Christopher M. Shaffer"}, + {"authorId": "2120970339", "name": "Atharva Deo"}, {"authorId": "1644001317", + "name": "Andrew Tudor"}, {"authorId": "2120987164", "name": "Rahul Shenoy"}, + {"authorId": "15893281", "name": "Cameron D. Danesh"}, {"authorId": "2120971756", + "name": "Dhruva Nathan"}, {"authorId": "41021502", "name": "Lawren L. Gamble"}, + {"authorId": "144878341", "name": "D. Inman"}, {"authorId": "2144257643", + "name": "Yong Chen"}]}, {"paperId": "26daa0d1e8a6acc02843eac53342affb4e92bd2a", + "externalIds": {"DOI": "10.1016/j.apergo.2021.103428", "CorpusId": 235093104, + "PubMed": "34020096"}, "corpusId": 235093104, "publicationVenue": {"id": "8a6c2524-65bd-4b1b-a2c2-dba95e5d8c6a", + "name": "Applied Ergonomics", "type": "journal", "alternate_names": ["Appl + Ergon"], "issn": "0003-6870", "url": "https://www.journals.elsevier.com/applied-ergonomics/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00036870"]}, + "url": "https://www.semanticscholar.org/paper/26daa0d1e8a6acc02843eac53342affb4e92bd2a", "title": "What driving style makes pedestrians think a passing vehicle is driving automatically?", "abstract": null, "venue": "Applied Ergonomics", "year": 2021, "referenceCount": 42, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-05-18", "journal": {"volume": "95", "pages": "\n 103428\n ", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-05-18", "journal": {"volume": "95", "pages": "\n 103428\n ", "name": "Applied ergonomics"}, "authors": [{"authorId": "3056418", "name": "P. Bazilinskyy"}, {"authorId": "2061603581", "name": "Tsuyoshi Sakuma"}, {"authorId": "143801403", "name": "J. D. de Winter"}]}, {"paperId": "89507a5ae7d81ca25a93cd0dd2de93786d21cf0d", "externalIds": {"DBLP": "journals/corr/abs-2105-07426", "ArXiv": "2105.07426", - "CorpusId": 234742327}, "url": "https://www.semanticscholar.org/paper/89507a5ae7d81ca25a93cd0dd2de93786d21cf0d", + "CorpusId": 234742327}, "corpusId": 234742327, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/89507a5ae7d81ca25a93cd0dd2de93786d21cf0d", "title": "Curiosity-driven Intuitive Physics Learning", "abstract": "Biological infants are naturally curious and try to comprehend their physical surroundings by interacting, in myriad multisensory ways, with different objects primarily @@ -15713,14 +18003,15 @@ interactions: the emulation of learning from scratch followed by substantiation through experience, irrespective of domain, in real-world AI agents.", "venue": "ArXiv", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-05-16", "journal": {"volume": "abs/2105.07426", "name": "ArXiv"}, "authors": - [{"authorId": "72260732", "name": "T. Gaikwad"}, {"authorId": "152803617", - "name": "Romi Banerjee"}]}, {"paperId": "658e265dc2aacc8c03d9b9b3e8de732b3ba0a9dc", - "externalIds": {"DOI": "10.1097/MOU.0000000000000888", "CorpusId": 234596003, - "PubMed": "33989231"}, "url": "https://www.semanticscholar.org/paper/658e265dc2aacc8c03d9b9b3e8de732b3ba0a9dc", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-05-16", "journal": {"volume": + "abs/2105.07426", "name": "ArXiv"}, "authors": [{"authorId": "72260732", "name": + "T. Gaikwad"}, {"authorId": "152803617", "name": "Romi Banerjee"}]}, {"paperId": + "658e265dc2aacc8c03d9b9b3e8de732b3ba0a9dc", "externalIds": {"DOI": "10.1097/MOU.0000000000000888", + "CorpusId": 234596003, "PubMed": "33989231"}, "corpusId": 234596003, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/658e265dc2aacc8c03d9b9b3e8de732b3ba0a9dc", "title": "Artificial intelligence in functional urology: how it may shape the future", "abstract": "Purpose of review The aim of the present manuscript is to provide an overview on the current state of artificial intelligence @@ -15743,8 +18034,8 @@ interactions: especially in surgical training, imaging, urodynamics, and innovative devices.", "venue": "Current opinion in urology", "year": 2021, "referenceCount": 40, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-05-14", "journal": {"volume": "31", "pages": "385 - 390", "name": "Current Opinion in Urology"}, "authors": [{"authorId": "1392748237", "name": "I. Bentellis"}, @@ -15752,7 +18043,12 @@ interactions: "name": "Z. Khene"}, {"authorId": "3682535", "name": "R. Khavari"}, {"authorId": "7422423", "name": "B. Peyronnet"}]}, {"paperId": "277791b11911281e61ba5f03401222c40f4886a4", "externalIds": {"PubMedCentral": "8378075", "MAG": "3161861567", "DOI": "10.1093/ijnp/pyab026", - "CorpusId": 234494831, "PubMed": "33987652"}, "url": "https://www.semanticscholar.org/paper/277791b11911281e61ba5f03401222c40f4886a4", + "CorpusId": 234494831, "PubMed": "33987652"}, "corpusId": 234494831, "publicationVenue": + {"id": "e69e74e9-9ff3-4fee-8a3d-2978095456ba", "name": "International Journal + of Neuropsychopharmacology", "type": "journal", "alternate_names": ["The International + Journal of Neuropsychopharmacology", "Int J Neuropsychopharmacol"], "issn": + "1461-1457", "url": "https://firstsearch.oclc.org/", "alternate_urls": ["http://ijnp.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/277791b11911281e61ba5f03401222c40f4886a4", "title": "Psychedelics and Consciousness: Distinctions, Demarcations, and Opportunities", "abstract": "Abstract Psychedelic substances produce unusual and compelling changes in conscious experience that have prompted some to @@ -15771,7 +18067,8 @@ interactions: in which psychedelics may advance the study of many specific aspects of consciousness.", "venue": "International Journal of Neuropsychopharmacology", "year": 2021, "referenceCount": 117, "citationCount": 9, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Psychology"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/ijnp/article-pdf/24/8/615/39819038/pyab026.pdf", + "status": null}, "fieldsOfStudy": ["Medicine", "Psychology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": @@ -15785,7 +18082,7 @@ interactions: "3149724", "name": "B. Mathur"}, {"authorId": "2092040460", "name": "Fredrick S Barrett"}]}, {"paperId": "765f5486528b33b28b4852efa34a0be3e7e1212d", "externalIds": {"DBLP": "journals/corr/abs-2105-05571", "ArXiv": "2105.05571", "CorpusId": - 234469842}, "url": "https://www.semanticscholar.org/paper/765f5486528b33b28b4852efa34a0be3e7e1212d", + 234469842}, "corpusId": 234469842, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/765f5486528b33b28b4852efa34a0be3e7e1212d", "title": "\"Alexa, what do you do for fun?\" Characterizing playful requests with virtual assistants", "abstract": "Virtual assistants such as Amazon\u2019s Alexa, Apple\u2019s Siri, Google Home, and Microsoft\u2019s Cortana, are becoming @@ -15809,16 +18106,17 @@ interactions: of the landscape of the problem and inspire novel ideas and techniques towards the vision of giving virtual assistants a sense of humor.", "venue": "ArXiv", "year": 2021, "referenceCount": 47, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-05-12", "journal": {"volume": "abs/2105.05571", "name": - "ArXiv"}, "authors": [{"authorId": "1683047517", "name": "Cheng Shani"}, {"authorId": - "40484877", "name": "Alex Libov"}, {"authorId": "2091417320", "name": "Sofia - Tolmach"}, {"authorId": "1402943721", "name": "L. Lewin-Eytan"}, {"authorId": - "1781257", "name": "Y. Maarek"}, {"authorId": "1805894", "name": "Dafna Shahaf"}]}, - {"paperId": "d67760e3284f5347df8e50091fe56265a038de49", "externalIds": {"MAG": - "3161136656", "DOI": "10.1071/CH20371", "CorpusId": 236584086}, "url": "https://www.semanticscholar.org/paper/d67760e3284f5347df8e50091fe56265a038de49", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": + {"volume": "abs/2105.05571", "name": "ArXiv"}, "authors": [{"authorId": "1683047517", + "name": "Cheng Shani"}, {"authorId": "40484877", "name": "Alex Libov"}, {"authorId": + "2091417320", "name": "Sofia Tolmach"}, {"authorId": "1402943721", "name": + "L. Lewin-Eytan"}, {"authorId": "1781257", "name": "Y. Maarek"}, {"authorId": + "1805894", "name": "Dafna Shahaf"}]}, {"paperId": "d67760e3284f5347df8e50091fe56265a038de49", + "externalIds": {"MAG": "3161136656", "DOI": "10.1071/CH20371", "CorpusId": + 236584086}, "corpusId": 236584086, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d67760e3284f5347df8e50091fe56265a038de49", "title": "The Future of Retrosynthesis and Synthetic Planning: Algorithmic, Humanistic or the Interplay?", "abstract": "\nThe practice of deploying and teaching retrosynthesis is on the cusp of considerable change, which in turn @@ -15831,14 +18129,20 @@ interactions: are increasingly prevalent. Will the computer ever compete with human retrosynthetic design and the art of organic synthesis?\n", "venue": "Australian Journal of Chemistry", "year": 2021, "referenceCount": 219, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-12", - "journal": {"name": "Australian Journal of Chemistry"}, "authors": [{"authorId": - "20100359", "name": "Craig M. Williams"}, {"authorId": "121971161", "name": - "M. Dallaston"}]}, {"paperId": "ac2b2a4bd5e3d9150bb3ef8a666ecfe27897cee0", - "externalIds": {"DBLP": "journals/ccs/EagleLH21", "MAG": "3137887052", "DOI": - "10.1049/CCS2.12018", "CorpusId": 236584434}, "url": "https://www.semanticscholar.org/paper/ac2b2a4bd5e3d9150bb3ef8a666ecfe27897cee0", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.publish.csiro.au/ch/pdf/CH20371", + "status": null}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-05-12", "journal": {"name": + "Australian Journal of Chemistry"}, "authors": [{"authorId": "20100359", "name": + "Craig M. Williams"}, {"authorId": "121971161", "name": "M. Dallaston"}]}, + {"paperId": "ac2b2a4bd5e3d9150bb3ef8a666ecfe27897cee0", "externalIds": {"DBLP": + "journals/ccs/EagleLH21", "MAG": "3137887052", "DOI": "10.1049/CCS2.12018", + "CorpusId": 236584434}, "corpusId": 236584434, "publicationVenue": {"id": + "f8692cd7-d4ba-496a-9fb5-c4b6dda9c6c8", "name": "Cognitive Computation and + Systems", "type": "journal", "alternate_names": ["Cogn Comput Syst"], "issn": + "2517-7567", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=8694204", + "alternate_urls": ["https://digital-library.theiet.org/content/journals/ccs"]}, + "url": "https://www.semanticscholar.org/paper/ac2b2a4bd5e3d9150bb3ef8a666ecfe27897cee0", "title": "Questioning ''what makes us human'': How audiences react to an artificial intelligence-driven show", "abstract": "I am Echoborg is promoted as \u2018a show created afresh each time by the audience in conversation with an artificial @@ -15857,16 +18161,16 @@ interactions: creative uses of AI, including as a tool for cocreating entertainment with (not just for) them.", "venue": "Cognitive Computation and Systems", "year": 2021, "referenceCount": 6, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Sociology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Sociology", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-05-12", "journal": {"volume": "3", "pages": "91-99", "name": "Cogn. - Comput. Syst."}, "authors": [{"authorId": "118758591", "name": "R. Eagle"}, - {"authorId": "114938126", "name": "Rik Lander"}, {"authorId": "2055179299", - "name": "Phil Hall"}]}, {"paperId": "d439c015ad2332a54cf479a6759fb2d7e2d16d19", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ccs2.12018", + "status": null}, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-05-12", "journal": {"volume": + "3", "pages": "91-99", "name": "Cogn. Comput. Syst."}, "authors": [{"authorId": + "118758591", "name": "R. Eagle"}, {"authorId": "114938126", "name": "Rik Lander"}, + {"authorId": "2055179299", "name": "Phil Hall"}]}, {"paperId": "d439c015ad2332a54cf479a6759fb2d7e2d16d19", "externalIds": {"MAG": "3162837094", "DOI": "10.18566/ESCR.V29N62.A09", "CorpusId": - 236554329}, "url": "https://www.semanticscholar.org/paper/d439c015ad2332a54cf479a6759fb2d7e2d16d19", + 236554329}, "corpusId": 236554329, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d439c015ad2332a54cf479a6759fb2d7e2d16d19", "title": "Ingenier\u00eda conceptual e innovaci\u00f3n te\u00f3rica: esbozo de un modelo", "abstract": "Todas las \u00e1reas del conocimiento se cimientan de diversas formas en una multiplicidad de productos derivados de la ingenier\u00eda @@ -15892,12 +18196,14 @@ interactions: condiciones y de los factores que dan lugar a la innovaci\u00f3n te\u00f3rica mediante la ingenier\u00eda conceptual.", "venue": "Escritos", "year": 2021, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": - "2021-05-12", "journal": {"name": "Escritos"}, "authors": [{"authorId": "1405371534", - "name": "C. Mu\u00f1oz-Su\u00e1rez"}]}, {"paperId": "5a74e329e99e70c44330feb1401fe6fb191f0bde", - "externalIds": {"ArXiv": "2105.07879", "DBLP": "journals/corr/abs-2105-07879", - "CorpusId": 234742567}, "url": "https://www.semanticscholar.org/paper/5a74e329e99e70c44330feb1401fe6fb191f0bde", + true, "openAccessPdf": {"url": "https://revistas.upb.edu.co/index.php/escritos/article/download/6998/6590", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": "2021-05-12", "journal": {"name": "Escritos"}, "authors": + [{"authorId": "1405371534", "name": "C. Mu\u00f1oz-Su\u00e1rez"}]}, {"paperId": + "5a74e329e99e70c44330feb1401fe6fb191f0bde", "externalIds": {"ArXiv": "2105.07879", + "DBLP": "journals/corr/abs-2105-07879", "CorpusId": 234742567}, "corpusId": + 234742567, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a74e329e99e70c44330feb1401fe6fb191f0bde", "title": "Conscious AI", "abstract": "Recent advances in artificial intelligence (AI) have achieved human-scale speed and accuracy for classification tasks. In turn, these capabilities have made AI a viable replacement for many human @@ -15916,20 +18222,23 @@ interactions: paradigm that seeks to ultimately create machines that are linguistically indistinguishable from humans.", "venue": "ArXiv", "year": 2021, "referenceCount": 95, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-12", "journal": - {"volume": "abs/2105.07879", "name": "ArXiv"}, "authors": [{"authorId": "1696563", - "name": "H. Esmaeilzadeh"}, {"authorId": "2129191", "name": "R. Vaezi"}]}, - {"paperId": "8264e83ddadad58d2a728a0a72c2c687bfd964d1", "externalIds": {"DOI": - "10.1016/j.radonc.2021.05.003", "CorpusId": 234495563, "PubMed": "33984348"}, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-05-12", "journal": {"volume": "abs/2105.07879", "name": "ArXiv"}, "authors": + [{"authorId": "1696563", "name": "H. Esmaeilzadeh"}, {"authorId": "2129191", + "name": "R. Vaezi"}]}, {"paperId": "8264e83ddadad58d2a728a0a72c2c687bfd964d1", + "externalIds": {"DOI": "10.1016/j.radonc.2021.05.003", "CorpusId": 234495563, + "PubMed": "33984348"}, "corpusId": 234495563, "publicationVenue": {"id": "3db0fe87-e29a-4f3f-b774-ef6ff67e6234", + "name": "Radiotherapy and Oncology", "type": "journal", "alternate_names": + ["Radiother Oncol"], "issn": "0167-8140", "url": "http://www.sciencedirect.com/science/journal/01678140"}, "url": "https://www.semanticscholar.org/paper/8264e83ddadad58d2a728a0a72c2c687bfd964d1", "title": "Metrics to evaluate the performance of auto-segmentation for radiation treatment planning: a critical review.", "abstract": null, "venue": "Radiotherapy - and Oncology", "year": 2021, "referenceCount": 73, "citationCount": 40, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + and Oncology", "year": 2021, "referenceCount": 73, "citationCount": 44, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-05-10", "journal": {"name": "Radiotherapy and oncology : journal of the European Society for Therapeutic Radiology and Oncology"}, "authors": [{"authorId": "50584644", "name": "M. Sherer"}, {"authorId": "2092049425", @@ -15939,6 +18248,10 @@ interactions: "M. Dahele"}, {"authorId": "145720720", "name": "E. Gillespie"}]}, {"paperId": "a39e88db75509ae36ffa66249107b53a48c39f86", "externalIds": {"DBLP": "journals/corr/abs-2105-03192", "ArXiv": "2105.03192", "DOI": "10.3233/AIC-201523", "CorpusId": 234093161}, + "corpusId": 234093161, "publicationVenue": {"id": "4c57b6f2-ebab-420d-baf9-cd595e2f2a63", + "name": "AI Communications", "type": "journal", "alternate_names": ["Ai Communications", + "AI Commun", "Ai Commun"], "issn": "0921-7126", "url": "http://content.iospress.com/journals/ai-communications", + "alternate_urls": ["https://www.iospress.nl/html/09217126.php", "https://www.iospress.nl/journal/ai-communications/"]}, "url": "https://www.semanticscholar.org/paper/a39e88db75509ae36ffa66249107b53a48c39f86", "title": "An interdisciplinary conceptual study of Artificial Intelligence (AI) for helping benefit-risk assessment practices: Towards a comprehensive @@ -15959,7 +18272,8 @@ interactions: in AI development that are engaged in responsible research and innovation.Pre-print version (achieved on May 2020)", "venue": "AI Communications", "year": 2021, "referenceCount": 111, "citationCount": 0, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03653205/file/AIC-201523-Revised-Accepted-final-HAL.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-07", "journal": {"volume": "34", "pages": "121-146", @@ -15968,7 +18282,8 @@ interactions: "name": "P. Rumeau"}, {"authorId": "1804438", "name": "F. S\u00e8des"}, {"authorId": "2089773203", "name": "Alejandra Delfin"}]}, {"paperId": "6f743678030331481bce59b4f9e5d49eb5eba534", "externalIds": {"DBLP": "conf/chi/KimRMY21", "MAG": "3015588689", "DOI": "10.1145/3411764.3445579", - "CorpusId": 216327176}, "url": "https://www.semanticscholar.org/paper/6f743678030331481bce59b4f9e5d49eb5eba534", + "CorpusId": 216327176}, "corpusId": 216327176, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6f743678030331481bce59b4f9e5d49eb5eba534", "title": "Designers Characterize Naturalness in Voice User Interfaces: Their Goals, Practices, and Challenges", "abstract": "This work investigates the practices and challenges of voice user interface (VUI) designers. Existing @@ -15986,16 +18301,24 @@ interactions: imbuing synthesized voice with expressivity, and implications for developing design tools and guidelines.", "venue": "CHI", "year": 2021, "referenceCount": 177, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": - "2021-05-06", "journal": {"name": "Proceedings of the 2021 CHI Conference - on Human Factors in Computing Systems"}, "authors": [{"authorId": "16215166", - "name": "Yelim Kim"}, {"authorId": "32206132", "name": "Mohi Reza"}, {"authorId": - "1713735", "name": "J. McGrenere"}, {"authorId": "2055005", "name": "Dongwook - Yoon"}]}, {"paperId": "7bf7b215932caf7f17239babc7656126c4743df2", "externalIds": - {"MAG": "3158113682", "DOI": "10.1080/09585192.2021.1897643", "CorpusId": - 235571128}, "url": "https://www.semanticscholar.org/paper/7bf7b215932caf7f17239babc7656126c4743df2", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "2021-05-06", "journal": {"name": "Proceedings + of the 2021 CHI Conference on Human Factors in Computing Systems"}, "authors": + [{"authorId": "16215166", "name": "Yelim Kim"}, {"authorId": "32206132", "name": + "Mohi Reza"}, {"authorId": "1713735", "name": "J. McGrenere"}, {"authorId": + "2055005", "name": "Dongwook Yoon"}]}, {"paperId": "7bf7b215932caf7f17239babc7656126c4743df2", + "externalIds": {"MAG": "3158113682", "DOI": "10.1080/09585192.2021.1897643", + "CorpusId": 235571128}, "corpusId": 235571128, "publicationVenue": {"id": + "36c408a5-beb1-41d9-8465-e2d315332570", "name": "International journal of + human resources management", "type": "journal", "alternate_names": ["Int j + hum resour manag", "Int J Hum Resour Manag", "International Journal of Human + Resource Management"], "issn": "2319-4936", "alternate_issns": ["0958-5192"], + "url": "http://www.iaset.us/journals.php?id=34&jtype=2", "alternate_urls": + ["http://www.tandfonline.com/loi/rijh20", "http://www.metapress.com/openurl.asp?genre=journal&issn=0958-5192", + "http://www.catchword.com/rpsv/catchword/routledge/09585192/contp1-1.htm"]}, + "url": "https://www.semanticscholar.org/paper/7bf7b215932caf7f17239babc7656126c4743df2", "title": "Humanoid robot adoption and labour productivity: a perspective on ambidextrous product innovation routines", "abstract": "Abstract The increasing presence of humanoid robot adoption has generated a change in explorative @@ -16021,8 +18344,8 @@ interactions: is available online at https://doi.org/10.1080/09585192.2021.1897643 .", "venue": "International journal of human resources management", "year": 2021, "referenceCount": 115, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-05", "journal": {"volume": "33", "pages": "1098 - 1124", "name": "The International Journal of Human Resource Management"}, "authors": [{"authorId": "1738694223", "name": "M. @@ -16030,7 +18353,7 @@ interactions: "143746794", "name": "L. Ballestra"}, {"authorId": "1793214", "name": "M. Pironti"}]}, {"paperId": "39692df948172a319ca33434f27c213d99d941a2", "externalIds": {"ArXiv": "2105.02704", "DBLP": "journals/corr/abs-2105-02704", "CorpusId": - 233864437}, "url": "https://www.semanticscholar.org/paper/39692df948172a319ca33434f27c213d99d941a2", + 233864437}, "corpusId": 233864437, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/39692df948172a319ca33434f27c213d99d941a2", "title": "AI Risk Skepticism", "abstract": "In this work, we survey skepticism regarding AI risk and show parallels with other types of scientific skepticism. We start by classifying different types of AI Risk skepticism and analyze @@ -16038,13 +18361,19 @@ interactions: which may be successful in reducing AI risk skepticism, at least amongst artificial intelligence researchers.", "venue": "ArXiv", "year": 2021, "referenceCount": 155, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-05-02", "journal": {"volume": "abs/2105.02704", "name": "ArXiv"}, "authors": - [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "b780882adb7e806db2fb17ffcbd3cf9c5fde69a2", - "externalIds": {"MAG": "3158235473", "DOI": "10.3390/APP11094151", "CorpusId": - 235500143}, "url": "https://www.semanticscholar.org/paper/b780882adb7e806db2fb17ffcbd3cf9c5fde69a2", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-05-02", "journal": {"volume": "abs/2105.02704", + "name": "ArXiv"}, "authors": [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, + {"paperId": "b780882adb7e806db2fb17ffcbd3cf9c5fde69a2", "externalIds": {"MAG": + "3158235473", "DOI": "10.3390/APP11094151", "CorpusId": 235500143}, "corpusId": + 235500143, "publicationVenue": {"id": "136edf8d-0f88-4c2c-830f-461c6a9b842e", + "name": "Applied Sciences", "type": "journal", "alternate_names": ["Appl Sci"], + "issn": "2076-3417", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-217814", + "alternate_urls": ["http://www.mathem.pub.ro/apps/", "https://www.mdpi.com/journal/applsci", + "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-217814"]}, "url": + "https://www.semanticscholar.org/paper/b780882adb7e806db2fb17ffcbd3cf9c5fde69a2", "title": "Using Formal Grammars as Musical Genome", "abstract": "In this paper, we explore a generative music method that can compose atonal and tonal music in different styles. One of the main differences between regular engineering @@ -16064,27 +18393,29 @@ interactions: from a perceptual perspective. This endorses our approach to tackle arts algorithmically, as it is able to produce novel content that complies with human expectations.", "venue": "Applied Sciences", "year": 2021, "referenceCount": 66, "citationCount": - 1, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"volume": - "11", "pages": "4151", "name": "Applied Sciences"}, "authors": [{"authorId": - "1403833959", "name": "D. Albarrac\u00edn-Molina"}, {"authorId": "4204454", - "name": "A. Raglio"}, {"authorId": "1397159446", "name": "F. Rivas-Ru\u00edz"}, - {"authorId": "144955542", "name": "F. Vico"}]}, {"paperId": "c26475ec8df2843def1ddc207b4a1920affe6e1a", - "externalIds": {"MAG": "3162612648", "DOI": "10.1002/JSC.2404", "CorpusId": - 236616410}, "url": "https://www.semanticscholar.org/paper/c26475ec8df2843def1ddc207b4a1920affe6e1a", + 1, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2076-3417/11/9/4151/pdf?version=1620301819", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", + "journal": {"volume": "11", "pages": "4151", "name": "Applied Sciences"}, + "authors": [{"authorId": "1403833959", "name": "D. Albarrac\u00edn-Molina"}, + {"authorId": "4204454", "name": "A. Raglio"}, {"authorId": "1397159446", "name": + "F. Rivas-Ru\u00edz"}, {"authorId": "144955542", "name": "F. Vico"}]}, {"paperId": + "c26475ec8df2843def1ddc207b4a1920affe6e1a", "externalIds": {"MAG": "3162612648", + "DOI": "10.1002/JSC.2404", "CorpusId": 236616410}, "corpusId": 236616410, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c26475ec8df2843def1ddc207b4a1920affe6e1a", "title": "Artificial intelligence and fintech: An overview of opportunities and risks for banking, investments, and microfinance", "abstract": null, "venue": - "", "year": 2021, "referenceCount": 34, "citationCount": 18, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "", "year": 2021, "referenceCount": 34, "citationCount": 21, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-05-01", "journal": {"volume": "30", "pages": "211-222", "name": "Strategic Change"}, "authors": [{"authorId": "3229323", "name": "A. Ashta"}, {"authorId": "1970984", "name": "H. Herrmann"}]}, {"paperId": "eec0b12613bd5aaa6a2c9a4fc264e063aa028430", "externalIds": {"MAG": "3177442242", "DOI": "10.31590/ejosat.878552", "CorpusId": - 237993421}, "url": "https://www.semanticscholar.org/paper/eec0b12613bd5aaa6a2c9a4fc264e063aa028430", + 237993421}, "corpusId": 237993421, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eec0b12613bd5aaa6a2c9a4fc264e063aa028430", "title": "DER\u0130N \u00d6\u011eRENME TEKN\u0130KLER\u0130 \u0130LE NESNE TESP\u0130T\u0130 VE TAK\u0130B\u0130 \u00dcZER\u0130NE B\u0130R \u0130NCELEME", "abstract": "Deep learning is one of the artificial intelligence approaches @@ -16105,7 +18436,8 @@ interactions: will work in this field by giving information about popular libraries, data sets, algorithms.", "venue": "European Journal of Science and Technology", "year": 2021, "referenceCount": 91, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1571016", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"name": "European Journal of Science and Technology"}, @@ -16114,17 +18446,18 @@ interactions: "name": "Erdal Aydemir"}, {"authorId": "119633901", "name": "Mevl\u00fct Ersoy"}]}, {"paperId": "6486131db5480a974052c681ec26bcc4d5ab3a63", "externalIds": {"MAG": "3137849985", "DOI": "10.1016/J.TECHSOC.2021.101553", "CorpusId": 233575356}, - "url": "https://www.semanticscholar.org/paper/6486131db5480a974052c681ec26bcc4d5ab3a63", + "corpusId": 233575356, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6486131db5480a974052c681ec26bcc4d5ab3a63", "title": "The development of machine intelligence in a computational universe", "abstract": null, "venue": "", "year": 2021, "referenceCount": 125, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-05-01", "journal": {"volume": - "65", "pages": "101553", "name": "Technology in Society"}, "authors": [{"authorId": - "2874966", "name": "G. De Luca"}]}, {"paperId": "aa09779a42bc0241b389b86dee0675d3acb9aef6", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", + "journal": {"volume": "65", "pages": "101553", "name": "Technology in Society"}, + "authors": [{"authorId": "2874966", "name": "G. De Luca"}]}, {"paperId": "aa09779a42bc0241b389b86dee0675d3acb9aef6", "externalIds": {"DBLP": "journals/spm/Narwaria21", "DOI": "10.1109/MSP.2021.3050996", - "CorpusId": 233435419}, "url": "https://www.semanticscholar.org/paper/aa09779a42bc0241b389b86dee0675d3acb9aef6", + "CorpusId": 233435419}, "corpusId": 233435419, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/aa09779a42bc0241b389b86dee0675d3acb9aef6", "title": "The Transition From White Box to Black Box: Challenges and Opportunities in Signal Processing Education", "abstract": "Modern engineering education is increasingly assuming an interdisciplinary character, where developments @@ -16140,37 +18473,48 @@ interactions: the focus back to some of the fundamental ideas rooted in signal processing and other related fields of study.", "venue": "IEEE Signal Processing Magazine", "year": 2021, "referenceCount": 32, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-05-01", "journal": {"volume": "38", "pages": "163-173", "name": "IEEE - Signal Processing Magazine"}, "authors": [{"authorId": "1758088", "name": - "Manish Narwaria"}]}, {"paperId": "09957cb5febf48ab89c40cd7c77cb5c3b2bf6fdd", - "externalIds": {"DBLP": "journals/tele/Martinez-Plumed21", "MAG": "3110196385", - "DOI": "10.1016/j.tele.2020.101525", "CorpusId": 229493122}, "url": "https://www.semanticscholar.org/paper/09957cb5febf48ab89c40cd7c77cb5c3b2bf6fdd", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-05-01", "journal": {"volume": + "38", "pages": "163-173", "name": "IEEE Signal Processing Magazine"}, "authors": + [{"authorId": "1758088", "name": "Manish Narwaria"}]}, {"paperId": "09957cb5febf48ab89c40cd7c77cb5c3b2bf6fdd", + "externalIds": {"MAG": "3110196385", "DBLP": "journals/tele/Martinez-Plumed21", + "DOI": "10.1016/j.tele.2020.101525", "CorpusId": 229493122}, "corpusId": 229493122, + "publicationVenue": {"id": "85026124-2f50-4044-92e0-c49467227f68", "name": + "Telematics and informatics", "type": "journal", "alternate_names": ["Telematics + informatics", "Telematics and Informatics", "Telematics Informatics"], "issn": + "0736-5853", "url": "https://www.journals.elsevier.com/telematics-and-informatics", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/07365853"]}, + "url": "https://www.semanticscholar.org/paper/09957cb5febf48ab89c40cd7c77cb5c3b2bf6fdd", "title": "Futures of artificial intelligence through technology readiness levels", "abstract": null, "venue": "Telematics and informatics", "year": - 2021, "referenceCount": 137, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-05-01", "journal": {"volume": "58", "pages": "101525", - "name": "Telematics Informatics"}, "authors": [{"authorId": "1399205325", - "name": "Fernando Mart\u00ednez-Plumed"}, {"authorId": "1740615089", "name": - "Emilia G\u00f3mez"}, {"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}]}, - {"paperId": "573d60a5a5b026c8fc64bf1ea36b9cda6b72345e", "externalIds": {"MAG": - "2956301976", "DOI": "10.1016/J.TECHFORE.2020.120555", "CorpusId": 234364003}, - "url": "https://www.semanticscholar.org/paper/573d60a5a5b026c8fc64bf1ea36b9cda6b72345e", + 2021, "referenceCount": 222, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-05-01", "journal": + {"volume": "58", "pages": "101525", "name": "Telematics Informatics"}, "authors": + [{"authorId": "1399205325", "name": "Fernando Mart\u00ednez-Plumed"}, {"authorId": + "1740615089", "name": "Emilia G\u00f3mez"}, {"authorId": "1398777358", "name": + "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "573d60a5a5b026c8fc64bf1ea36b9cda6b72345e", + "externalIds": {"MAG": "2956301976", "DOI": "10.1016/J.TECHFORE.2020.120555", + "CorpusId": 234364003}, "corpusId": 234364003, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/573d60a5a5b026c8fc64bf1ea36b9cda6b72345e", "title": "Artificial Intelligence: A Child\u2019s Play", "abstract": null, "venue": "", "year": 2021, "referenceCount": 218, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-05-01", "journal": {"volume": "166", "pages": "120555", "name": "Technological - Forecasting and Social Change"}, "authors": [{"authorId": "46670294", "name": - "R. Kashyap"}]}, {"paperId": "4105536795356d2606bbc695aaa0ace43bae91cb", "externalIds": - {"MAG": "3163876512", "DOI": "10.1080/17544750.2021.1915832", "CorpusId": - 236631673}, "url": "https://www.semanticscholar.org/paper/4105536795356d2606bbc695aaa0ace43bae91cb", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1907.04659", + "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", + "journal": {"volume": "166", "pages": "120555", "name": "Technological Forecasting + and Social Change"}, "authors": [{"authorId": "46670294", "name": "R. Kashyap"}]}, + {"paperId": "4105536795356d2606bbc695aaa0ace43bae91cb", "externalIds": {"MAG": + "3163876512", "DOI": "10.1080/17544750.2021.1915832", "CorpusId": 236631673}, + "corpusId": 236631673, "publicationVenue": {"id": "082bd2cc-2dcd-40af-9cfa-4af8600405e1", + "name": "Chinese Journal of Communication", "type": "journal", "alternate_names": + ["Chin J Commun"], "issn": "1754-4769", "url": "http://www.informaworld.com/openurl?genre=journal&issn=1754-4750", + "alternate_urls": ["http://www.tandfonline.com/loi/rcjc20"]}, "url": "https://www.semanticscholar.org/paper/4105536795356d2606bbc695aaa0ace43bae91cb", "title": "Friend or foe? Human journalists\u2019 perspectives on artificial intelligence in Chinese media outlets", "abstract": "The development of the artificial intelligence (AI) platform Media Brain and the associated Xinhua @@ -16186,14 +18530,15 @@ interactions: discourse through material demonstrations and rivalry for influence in the media market.", "venue": "Chinese Journal of Communication", "year": 2021, "referenceCount": 57, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-04-30", "journal": {"volume": - "14", "pages": "409 - 429", "name": "Chinese Journal of Communication"}, "authors": - [{"authorId": "2152847605", "name": "Yang Yu"}, {"authorId": "47942053", "name": - "Kuo-En Huang"}]}, {"paperId": "bff9b453109ed1f62226d1b760384020a7db6d0a", + false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-30", + "journal": {"volume": "14", "pages": "409 - 429", "name": "Chinese Journal + of Communication"}, "authors": [{"authorId": "2152847605", "name": "Yang Yu"}, + {"authorId": "47942053", "name": "Kuo-En Huang"}]}, {"paperId": "bff9b453109ed1f62226d1b760384020a7db6d0a", "externalIds": {"MAG": "3165447805", "DOI": "10.22409/CONTRACAMPO.V40I1.47817", - "CorpusId": 236621135}, "url": "https://www.semanticscholar.org/paper/bff9b453109ed1f62226d1b760384020a7db6d0a", + "CorpusId": 236621135}, "corpusId": 236621135, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bff9b453109ed1f62226d1b760384020a7db6d0a", "title": "Imagin\u00e1rio e cultura da intoler\u00e2ncia em plataformas algor\u00edtmicas", "abstract": "In this theoretical articulation based on bibliographic research, the culture of intolerance, driven by the political context of hyperneoliberalism, @@ -16207,47 +18552,74 @@ interactions: with dispositions that Lacan associates with the imaginary and aggressiveness \u2013 narcissism, narcissistic identification with leaders, segregation and paranoia.", "venue": "", "year": 2021, "referenceCount": 29, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], - "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-04-30", "journal": {"volume": "40", "name": ""}, "authors": [{"authorId": - "2126200488", "name": "Julio Cesar Lemes de Castro"}]}, {"paperId": "e5bc6f8bd8a89103242ec84467087867a44a9626", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://periodicos.uff.br/contracampo/article/download/47817/29765", "status": + null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-04-30", "journal": {"volume": + "40", "name": ""}, "authors": [{"authorId": "2126200488", "name": "Julio Cesar + Lemes de Castro"}]}, {"paperId": "e5bc6f8bd8a89103242ec84467087867a44a9626", "externalIds": {"MAG": "3157673036", "DOI": "10.1002/0471266949.BMC267", "CorpusId": - 235580952}, "url": "https://www.semanticscholar.org/paper/e5bc6f8bd8a89103242ec84467087867a44a9626", + 235580952}, "corpusId": 235580952, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e5bc6f8bd8a89103242ec84467087867a44a9626", "title": "Artificial Intelligence in Medicinal Chemistry", "abstract": null, "venue": "", "year": 2021, "referenceCount": 86, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-28", - "journal": {"volume": "", "pages": "1-19", "name": "Burger''s Medicinal Chemistry - and Drug Discovery"}, "authors": [{"authorId": "2648931", "name": "E. Griffen"}, - {"authorId": "15233603", "name": "A. Dossetter"}, {"authorId": "49674623", - "name": "A. Leach"}, {"authorId": "50099517", "name": "Shane Montague"}]}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-04-28", "journal": {"volume": "", "pages": "1-19", "name": "Burger''s + Medicinal Chemistry and Drug Discovery"}, "authors": [{"authorId": "2648931", + "name": "E. Griffen"}, {"authorId": "15233603", "name": "A. Dossetter"}, {"authorId": + "49674623", "name": "A. Leach"}, {"authorId": "50099517", "name": "Shane Montague"}]}, + {"paperId": "9122b67e818da28e8ac34189de4a5095b5df5b21", "externalIds": {"DOI": + "10.1007/s11219-020-09544-9", "CorpusId": 255068656}, "corpusId": 255068656, + "publicationVenue": {"id": "f4c0fba6-8d83-4a73-aaa4-2ad01918304e", "name": + "Software quality journal", "type": "journal", "alternate_names": ["Softw + Qual J", "Software Quality Journal", "Softw qual j"], "issn": "0963-9314", + "url": "https://link.springer.com/journal/11219"}, "url": "https://www.semanticscholar.org/paper/9122b67e818da28e8ac34189de4a5095b5df5b21", + "title": "Ontology-based metamorphic testing for chatbots", "abstract": null, + "venue": "Software quality journal", "year": 2021, "referenceCount": 39, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s11219-020-09544-9.pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-27", + "journal": {"volume": "30", "pages": "227 - 251", "name": "Software Quality + Journal"}, "authors": [{"authorId": "40610638", "name": "Josip Bozic"}]}, {"paperId": "7a64066f22d82aada28b9e8933b5fc68ce8430c5", "externalIds": {"MAG": "3157193726", "DOI": "10.1016/J.ECE.2021.04.003", "CorpusId": 235570795}, - "url": "https://www.semanticscholar.org/paper/7a64066f22d82aada28b9e8933b5fc68ce8430c5", + "corpusId": 235570795, "publicationVenue": {"id": "725a388f-a101-44b2-8292-3d871595ba5b", + "name": "Education for Chemical Engineers", "type": "journal", "alternate_names": + ["Educ Chem Eng"], "issn": "1749-7728", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/713882/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/17497728", + "https://www.journals.elsevier.com/education-for-chemical-engineers/"]}, "url": + "https://www.semanticscholar.org/paper/7a64066f22d82aada28b9e8933b5fc68ce8430c5", "title": "Deep neural networks in chemical engineering classrooms to accurately model adsorption equilibrium data", "abstract": null, "venue": "Education for Chemical Engineers", "year": 2021, "referenceCount": 79, "citationCount": - 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-04-27", "journal": {"name": - "Education for Chemical Engineers"}, "authors": [{"authorId": "95790747", - "name": "Shubhangi Kakkar"}, {"authorId": "3943316", "name": "W. Kwapinski"}, - {"authorId": "39561380", "name": "C. A. Howard"}, {"authorId": "145594402", - "name": "K. Kumar"}]}, {"paperId": "7655568220bfbf685f17e498de846cd7819480ea", + 10, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-27", + "journal": {"name": "Education for Chemical Engineers"}, "authors": [{"authorId": + "95790747", "name": "Shubhangi Kakkar"}, {"authorId": "3943316", "name": "W. + Kwapinski"}, {"authorId": "39561380", "name": "C. A. Howard"}, {"authorId": + "145594402", "name": "K. Kumar"}]}, {"paperId": "7655568220bfbf685f17e498de846cd7819480ea", "externalIds": {"MAG": "3172154424", "DOI": "10.1002/9781119598732.CH34", - "CorpusId": 236617939}, "url": "https://www.semanticscholar.org/paper/7655568220bfbf685f17e498de846cd7819480ea", + "CorpusId": 236617939}, "corpusId": 236617939, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7655568220bfbf685f17e498de846cd7819480ea", "title": "Chomsky and Fodor on Modularity", "abstract": null, "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "2021-04-27", "journal": {"volume": "", "pages": - "529-543", "name": ""}, "authors": [{"authorId": "52080944", "name": "N. Allott"}, - {"authorId": "2116830701", "name": "N. Smith"}]}, {"paperId": "da358d7bf0d081394c183f8412cfed6c81136394", - "externalIds": {"MAG": "3159853322", "DOI": "10.22161/IJAERS.84.27", "CorpusId": - 235561840}, "url": "https://www.semanticscholar.org/paper/da358d7bf0d081394c183f8412cfed6c81136394", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "2021-04-27", "journal": + {"volume": "", "pages": "529-543", "name": ""}, "authors": [{"authorId": "52080944", + "name": "N. Allott"}, {"authorId": "2116830701", "name": "N. Smith"}]}, {"paperId": + "da358d7bf0d081394c183f8412cfed6c81136394", "externalIds": {"MAG": "3159853322", + "DOI": "10.22161/IJAERS.84.27", "CorpusId": 235561840}, "corpusId": 235561840, + "publicationVenue": {"id": "e57466f0-6639-4b5d-9191-3ac5cc573fef", "name": + "International Journal of Advanced Engineering Research and Science", "type": + "journal", "alternate_names": ["Int J Adv Eng Res Sci"], "issn": "2456-1908", + "alternate_issns": ["2349-6495"], "url": "https://ijaers.com/issues/"}, "url": + "https://www.semanticscholar.org/paper/da358d7bf0d081394c183f8412cfed6c81136394", "title": "Contribution of Artificial Intelligence in B2B Sales: A Danfoss Case Study", "abstract": "\u2014 The objective of the work is to evaluate the influence of Artificial Intelligence in the sales activities of B2B companies. @@ -16265,14 +18637,18 @@ interactions: Behavioral Change, Traditional Salesman, Future Salesmen and the Future of the Company.", "venue": "International Journal of Advanced Engineering Research and Science", "year": 2021, "referenceCount": 44, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-27", - "journal": {"name": "International Journal of Advanced Engineering Research - and Science"}, "authors": [{"authorId": "2061244922", "name": "F. Prieto"}, - {"authorId": "2073800686", "name": "Hugo Ferreira Tadeu Braga"}]}, {"paperId": - "0eaae2abacc5e25f39f48e311989852ea393d8d6", "externalIds": {"MAG": "3165430951", - "DOI": "10.24140/IJFMA.V6.N1.01", "CorpusId": 236622217}, "url": "https://www.semanticscholar.org/paper/0eaae2abacc5e25f39f48e311989852ea393d8d6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-04-27", "journal": {"name": "International Journal of Advanced Engineering + Research and Science"}, "authors": [{"authorId": "2061244922", "name": "F. + Prieto"}, {"authorId": "2073800686", "name": "Hugo Ferreira Tadeu Braga"}]}, + {"paperId": "0eaae2abacc5e25f39f48e311989852ea393d8d6", "externalIds": {"MAG": + "3165430951", "DOI": "10.24140/IJFMA.V6.N1.01", "CorpusId": 236622217}, "corpusId": + 236622217, "publicationVenue": {"id": "5562336f-5664-41aa-b7e7-f2541dacceab", + "name": "INTERNATIONAL JOURNAL OF FILM AND MEDIA ARTS", "type": "journal", + "alternate_names": ["INT J FILM MEDIA ART"], "issn": "2183-9271", "url": "https://revistas.ulusofona.pt/index.php/ijfma"}, + "url": "https://www.semanticscholar.org/paper/0eaae2abacc5e25f39f48e311989852ea393d8d6", "title": "Design (Non) Fiction: Deconstructing/Reconstructing the Definitional Dualism of AI", "abstract": "2001: A Space Odyssey (Kubrick, 1968) speculates on humanities technological ascension through the exploration of space and @@ -16304,15 +18680,17 @@ interactions: of researching the semantics of AI technology and how film and Design Fiction offer a discursive space for design research to transpire.", "venue": "INTERNATIONAL JOURNAL OF FILM AND MEDIA ARTS", "year": 2021, "referenceCount": 76, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], - "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-04-26", "journal": {"name": "International Journal of Film and Media - Arts"}, "authors": [{"authorId": "121401948", "name": "Franziska Pilling"}, - {"authorId": "3104112", "name": "Joseph Lindley"}, {"authorId": "112998906", - "name": "H. Akmal"}, {"authorId": "1693223", "name": "P. Coulton"}]}, {"paperId": - "564d5ded4372e36a8e594644f8e3c031a78beeba", "externalIds": {"DOI": "10.1080/1369118X.2021.1909100", - "CorpusId": 234487097}, "url": "https://www.semanticscholar.org/paper/564d5ded4372e36a8e594644f8e3c031a78beeba", + 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://revistas.ulusofona.pt/index.php/ijfma/article/download/7667/4492", + "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2021-04-26", "journal": + {"name": "International Journal of Film and Media Arts"}, "authors": [{"authorId": + "121401948", "name": "Franziska Pilling"}, {"authorId": "3104112", "name": + "Joseph Lindley"}, {"authorId": "112998906", "name": "H. Akmal"}, {"authorId": + "1693223", "name": "P. Coulton"}]}, {"paperId": "564d5ded4372e36a8e594644f8e3c031a78beeba", + "externalIds": {"DOI": "10.1080/1369118X.2021.1909100", "CorpusId": 234487097}, + "corpusId": 234487097, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/564d5ded4372e36a8e594644f8e3c031a78beeba", "title": "Nonhuman humanitarianism: when ''AI for good'' can be harmful", "abstract": "ABSTRACT Artificial intelligence (AI) applications have been introduced in humanitarian operations in order to help with the significant @@ -16337,14 +18715,16 @@ interactions: reproduce the coloniality of power. The article concludes that \u2018AI for good\u2019 is an \u2018enchantment of technology\u2019 that reworks the colonial legacies of humanitarianism whilst also occluding the power dynamics at play.", - "venue": "", "year": 2021, "referenceCount": 81, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2021-04-26", "journal": {"volume": "24", "pages": "850 - - 868", "name": "Information, Communication & Society"}, "authors": [{"authorId": - "2850262", "name": "Mirca Madianou"}]}, {"paperId": "bb3026f8fb7815720e3d84613b48300c130e44e4", - "externalIds": {"DBLP": "journals/corr/abs-2104-12871", "ArXiv": "2104.12871", - "DOI": "10.1145/3449639.3465421", "CorpusId": 233407771}, "url": "https://www.semanticscholar.org/paper/bb3026f8fb7815720e3d84613b48300c130e44e4", + "venue": "", "year": 2021, "referenceCount": 81, "citationCount": 8, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/1369118X.2021.1909100?needAccess=true", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-04-26", "journal": {"volume": "24", "pages": "850 - 868", "name": "Information, + Communication & Society"}, "authors": [{"authorId": "2850262", "name": "Mirca + Madianou"}]}, {"paperId": "bb3026f8fb7815720e3d84613b48300c130e44e4", "externalIds": + {"DBLP": "journals/corr/abs-2104-12871", "ArXiv": "2104.12871", "DOI": "10.1145/3449639.3465421", + "CorpusId": 233407771}, "corpusId": 233407771, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bb3026f8fb7815720e3d84613b48300c130e44e4", "title": "Why AI is harder than we think", "abstract": "Since its beginning in the 1950s, the field of artificial intelligence has cycled several times between periods of optimistic predictions and massive investment (\"AI Spring\") @@ -16359,26 +18739,34 @@ interactions: on what is needed for the grand challenge of making AI systems more robust, general, and adaptable --- in short, more intelligent.", "venue": "ArXiv", "year": 2021, "referenceCount": 93, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2104.12871", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2021-04-26", "journal": {"name": "Proceedings of the Genetic and Evolutionary Computation Conference"}, "authors": [{"authorId": "71370384", "name": "M. Mitchell"}]}, {"paperId": "c6e1a3505ff160e8cc747f02936b2f6861cba18e", "externalIds": {"DBLP": "journals/jbd/BatarsehFH21a", "DOI": "10.1186/s40537-021-00445-7", - "CorpusId": 233403216}, "url": "https://www.semanticscholar.org/paper/c6e1a3505ff160e8cc747f02936b2f6861cba18e", + "CorpusId": 233403216}, "corpusId": 233403216, "publicationVenue": {"id": + "d60da343-ab92-4310-b3d7-2c0860287a9d", "name": "Journal of Big Data", "type": + "journal", "alternate_names": ["J Big Data", "Journal on Big Data"], "issn": + "2196-1115", "alternate_issns": ["2579-0048"], "url": "http://www.journalofbigdata.com/", + "alternate_urls": ["http://www.springer.com/computer/database+management+&+information+retrieval/journal/40537", + "http://techscience.com/JBD/index.html", "https://journalofbigdata.springeropen.com", + "https://journalofbigdata.springeropen.com/"]}, "url": "https://www.semanticscholar.org/paper/c6e1a3505ff160e8cc747f02936b2f6861cba18e", "title": "A survey on artificial intelligence assurance", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 291, "citationCount": - 18, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-26", - "journal": {"volume": "8", "pages": "1-30", "name": "Journal of Big Data"}, - "authors": [{"authorId": "144105786", "name": "Feras A. Batarseh"}, {"authorId": - "2059693836", "name": "Laura J. Freeman"}, {"authorId": "2124911407", "name": - "Chih-hao Huang"}]}, {"paperId": "29f18a58a1867e0f0fe8f67f20189b71d0b0dc26", + 20, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2021-04-26", "journal": {"volume": "8", "pages": "1-30", + "name": "Journal of Big Data"}, "authors": [{"authorId": "144105786", "name": + "Feras A. Batarseh"}, {"authorId": "2059693836", "name": "Laura J. Freeman"}, + {"authorId": "2124911407", "name": "Chih-hao Huang"}]}, {"paperId": "29f18a58a1867e0f0fe8f67f20189b71d0b0dc26", "externalIds": {"MAG": "3185787080", "ArXiv": "2104.11652", "DOI": "10.2139/ssrn.3832601", - "CorpusId": 233388044}, "url": "https://www.semanticscholar.org/paper/29f18a58a1867e0f0fe8f67f20189b71d0b0dc26", + "CorpusId": 233388044}, "corpusId": 233388044, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/29f18a58a1867e0f0fe8f67f20189b71d0b0dc26", "title": "If it Looks Like a Human and Speaks Like a Human ... Dialogue and Cooperation in Human-Robot Interactions", "abstract": "This paper presents the results of a behavioral experiment conducted between February 2020 and @@ -16396,6 +18784,7 @@ interactions: robots\u00e2\u20ac\u2122 behavior, and to potential gender biases in human-human interactions.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 113, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/2104.11652", "status": null}, "fieldsOfStudy": ["Psychology", "Economics"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": @@ -16403,21 +18792,27 @@ interactions: Economics eJournal"}, "authors": [{"authorId": "32114232", "name": "Mario A. Maggioni"}, {"authorId": "115008977", "name": "D. Rossignoli"}]}, {"paperId": "32e8a3ae18598a5177ba61e39ca7239319b8c54a", "externalIds": {"MAG": "3155174489", - "DOI": "10.1007/S13369-021-05522-W", "CorpusId": 234829697}, "url": "https://www.semanticscholar.org/paper/32e8a3ae18598a5177ba61e39ca7239319b8c54a", + "DOI": "10.1007/S13369-021-05522-W", "CorpusId": 234829697}, "corpusId": 234829697, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/32e8a3ae18598a5177ba61e39ca7239319b8c54a", "title": "Power Transmission Line Fault Detection and Diagnosis Based on Artificial Intelligence Approach and its Development in UAV: A Review", "abstract": null, "venue": "", "year": 2021, "referenceCount": 102, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-04-22", "journal": {"volume": "", "pages": "1-27", "name": "Arabian - Journal for Science and Engineering"}, "authors": [{"authorId": "97727705", - "name": "S. Wong"}, {"authorId": "2100609218", "name": "Clifford Wei Chang - Choe"}, {"authorId": "3386969", "name": "H. Goh"}, {"authorId": "2100526635", - "name": "Yik Wen Low"}, {"authorId": "2100597614", "name": "Dennis Yang Shen - Cheah"}, {"authorId": "2100595481", "name": "Chiia Pang"}]}, {"paperId": "daba216327c7b4f8bff96a84984fdb09117edc51", - "externalIds": {"DBLP": "journals/corr/abs-2104-12582", "ArXiv": "2104.12582", - "DOI": "10.3390/philosophies6030053", "CorpusId": 233394168}, "url": "https://www.semanticscholar.org/paper/daba216327c7b4f8bff96a84984fdb09117edc51", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2021-04-22", "journal": + {"volume": "", "pages": "1-27", "name": "Arabian Journal for Science and Engineering"}, + "authors": [{"authorId": "97727705", "name": "S. Wong"}, {"authorId": "2100609218", + "name": "Clifford Wei Chang Choe"}, {"authorId": "3386969", "name": "H. Goh"}, + {"authorId": "2100526635", "name": "Yik Wen Low"}, {"authorId": "2100597614", + "name": "Dennis Yang Shen Cheah"}, {"authorId": "2100595481", "name": "Chiia + Pang"}]}, {"paperId": "daba216327c7b4f8bff96a84984fdb09117edc51", "externalIds": + {"DBLP": "journals/corr/abs-2104-12582", "ArXiv": "2104.12582", "DOI": "10.3390/philosophies6030053", + "CorpusId": 233394168}, "corpusId": 233394168, "publicationVenue": {"id": + "ef4fb77f-61b5-4988-8f50-738b45be5d7e", "name": "Philosophies", "type": "journal", + "issn": "0766-1398", "alternate_issns": ["2409-9287"], "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-691408", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-691408", + "https://www.mdpi.com/journal/philosophies"]}, "url": "https://www.semanticscholar.org/paper/daba216327c7b4f8bff96a84984fdb09117edc51", "title": "Understanding and Avoiding AI Failures: A Practical Guide", "abstract": "As AI technologies increase in capability and ubiquity, AI accidents are becoming more common. Based on normal accident theory, high reliability theory, @@ -16430,15 +18825,21 @@ interactions: focusing on system properties near accidents instead of seeking a root cause of accidents, we identify where attention should be paid to safety for current generation AI systems.", "venue": "Philosophies", "year": 2021, "referenceCount": - 71, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-04-22", "journal": {"volume": "abs/2104.12582", "name": "ArXiv"}, "authors": - [{"authorId": "2116650684", "name": "R. M. Williams"}, {"authorId": "26336155", - "name": "Roman Yampolskiy"}]}, {"paperId": "2bb1e1a5b9a16f6828fe94736cea5dab264533a6", + 71, "citationCount": 7, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/6/3/53/pdf?version=1631003281", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-04-22", "journal": {"volume": "abs/2104.12582", "name": + "ArXiv"}, "authors": [{"authorId": "2116650684", "name": "R. M. Williams"}, + {"authorId": "26336155", "name": "Roman V. Yampolskiy"}]}, {"paperId": "2bb1e1a5b9a16f6828fe94736cea5dab264533a6", "externalIds": {"DBLP": "journals/tacl/MerrillGSS21", "ArXiv": "2104.10809", - "DOI": "10.1162/tacl_a_00412", "CorpusId": 233346957}, "url": "https://www.semanticscholar.org/paper/2bb1e1a5b9a16f6828fe94736cea5dab264533a6", + "DOI": "10.1162/tacl_a_00412", "CorpusId": 233346957}, "corpusId": 233346957, + "publicationVenue": {"id": "e0dbf116-86aa-418d-859f-a49952d7e44a", "name": + "Transactions of the Association for Computational Linguistics", "type": "journal", + "alternate_names": ["Trans Assoc Comput Linguistics"], "issn": "2307-387X", + "url": "https://www.mitpressjournals.org/loi/tacl", "alternate_urls": ["http://www.transacl.org/"]}, + "url": "https://www.semanticscholar.org/paper/2bb1e1a5b9a16f6828fe94736cea5dab264533a6", "title": "Provable Limitations of Acquiring Meaning from Ungrounded Form: What Will Future Language Models Understand?", "abstract": "Abstract Language models trained on billions of tokens have recently led to unprecedented results @@ -16459,28 +18860,33 @@ interactions: We formalize ways in which ungrounded language models appear to be fundamentally limited in their ability to \u201cunderstand\u201d.", "venue": "Transactions of the Association for Computational Linguistics", "year": 2021, "referenceCount": - 34, "citationCount": 34, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-04-22", "journal": {"volume": "9", "pages": "1047-1060", "name": "Transactions - of the Association for Computational Linguistics"}, "authors": [{"authorId": - "143696607", "name": "William Cooper Merrill"}, {"authorId": "79775260", "name": - "Yoav Goldberg"}, {"authorId": "4671928", "name": "Roy Schwartz"}, {"authorId": - "144365875", "name": "Noah A. Smith"}]}, {"paperId": "bfaccd57f7f0df5abb9bcf954a4e12964b2023c4", - "externalIds": {"DBLP": "journals/ais/Balle22", "MAG": "3156501751", "DOI": - "10.1007/s00146-021-01211-2", "CorpusId": 234827618}, "url": "https://www.semanticscholar.org/paper/bfaccd57f7f0df5abb9bcf954a4e12964b2023c4", + 34, "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://direct.mit.edu/tacl/article-pdf/doi/10.1162/tacl_a_00412/1963983/tacl_a_00412.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-04-22", "journal": {"volume": "9", "pages": "1047-1060", + "name": "Transactions of the Association for Computational Linguistics"}, + "authors": [{"authorId": "143696607", "name": "William Cooper Merrill"}, {"authorId": + "79775260", "name": "Yoav Goldberg"}, {"authorId": "4671928", "name": "Roy + Schwartz"}, {"authorId": "144365875", "name": "Noah A. Smith"}]}, {"paperId": + "bfaccd57f7f0df5abb9bcf954a4e12964b2023c4", "externalIds": {"DBLP": "journals/ais/Balle22", + "MAG": "3156501751", "DOI": "10.1007/s00146-021-01211-2", "CorpusId": 234827618}, + "corpusId": 234827618, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", + "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, + "url": "https://www.semanticscholar.org/paper/bfaccd57f7f0df5abb9bcf954a4e12964b2023c4", "title": "Empathic responses and moral status for social robots: an argument in favor of robot patienthood based on K. E. L\u00f8gstrup", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 82, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-04-20", "journal": {"volume": - "37", "pages": "535 - 548", "name": "AI & SOCIETY"}, "authors": [{"authorId": - "2091363965", "name": "Simon N. Balle"}]}, {"paperId": "dfd461b5b2f1e8e4ee85988aae1ff2a4ef35ae94", - "externalIds": {"DOI": "10.1145/3428158", "CorpusId": 233430159}, "url": "https://www.semanticscholar.org/paper/dfd461b5b2f1e8e4ee85988aae1ff2a4ef35ae94", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-20", "journal": + {"volume": "37", "pages": "535 - 548", "name": "AI & SOCIETY"}, "authors": + [{"authorId": "2091363965", "name": "Simon N. Balle"}]}, {"paperId": "dfd461b5b2f1e8e4ee85988aae1ff2a4ef35ae94", + "externalIds": {"DOI": "10.1145/3428158", "CorpusId": 233430159}, "corpusId": + 233430159, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dfd461b5b2f1e8e4ee85988aae1ff2a4ef35ae94", "title": "Perceptions of Human and Machine-Generated Articles", "abstract": "Automated journalism technology is transforming news production and changing how audiences perceive the news. As automated text-generation models advance, @@ -16498,16 +18904,17 @@ interactions: half the time, while human-written articles were identified correctly as written by a human about 70 percent of the time.", "venue": "Digital Threats: Research and Practice", "year": 2021, "referenceCount": 61, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-04-20", "journal": {"volume": "2", "pages": "1 - 16", "name": "Digital - Threats: Research and Practice"}, "authors": [{"authorId": "2086786251", "name": - "Shubhra Tewari"}, {"authorId": "1753691816", "name": "Renos Zabounidis"}, - {"authorId": "116150549", "name": "Ammina Kothari"}, {"authorId": "39958072", - "name": "Reynold J. Bailey"}, {"authorId": "144648940", "name": "Cecilia Ovesdotter - Alm"}]}, {"paperId": "574cddb0d56fa84708b259dcd2d81473b810e7ad", "externalIds": - {"ArXiv": "2104.08231", "DBLP": "journals/corr/abs-2104-08231", "CorpusId": - 233289893}, "url": "https://www.semanticscholar.org/paper/574cddb0d56fa84708b259dcd2d81473b810e7ad", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3428158", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-20", + "journal": {"volume": "2", "pages": "1 - 16", "name": "Digital Threats: Research + and Practice"}, "authors": [{"authorId": "2086786251", "name": "Shubhra Tewari"}, + {"authorId": "1753691816", "name": "Renos Zabounidis"}, {"authorId": "116150549", + "name": "Ammina Kothari"}, {"authorId": "39958072", "name": "Reynold J. Bailey"}, + {"authorId": "144648940", "name": "Cecilia Ovesdotter Alm"}]}, {"paperId": + "574cddb0d56fa84708b259dcd2d81473b810e7ad", "externalIds": {"ArXiv": "2104.08231", + "DBLP": "journals/corr/abs-2104-08231", "CorpusId": 233289893}, "corpusId": + 233289893, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/574cddb0d56fa84708b259dcd2d81473b810e7ad", "title": "An Adversarially-Learned Turing Test for Dialog Generation Models", "abstract": "The design of better automated dialogue evaluation metrics offers the potential of accelerate evaluation research on conversational AI. However, @@ -16524,15 +18931,15 @@ interactions: attack-defense game. Our discriminator shows high accuracy on strong attackers including DialoGPT and GPT-3.1", "venue": "ArXiv", "year": 2021, "referenceCount": 40, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-04-16", "journal": {"volume": "abs/2104.08231", "name": "ArXiv"}, "authors": - [{"authorId": "71886367", "name": "Xiang Gao"}, {"authorId": "48378494", "name": - "Yizhe Zhang"}, {"authorId": "1947267", "name": "Michel Galley"}, {"authorId": - "66648221", "name": "Bill Dolan"}]}, {"paperId": "f459eb635c2a485c77f1461f47f566f43cc0a4b7", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-04-16", "journal": {"volume": "abs/2104.08231", "name": + "ArXiv"}, "authors": [{"authorId": "71886367", "name": "Xiang Gao"}, {"authorId": + "48378494", "name": "Yizhe Zhang"}, {"authorId": "1947267", "name": "Michel + Galley"}, {"authorId": "66648221", "name": "Bill Dolan"}]}, {"paperId": "f459eb635c2a485c77f1461f47f566f43cc0a4b7", "externalIds": {"MAG": "3153019806", "DOI": "10.4324/9780429445590-6-6", "CorpusId": - 96439665}, "url": "https://www.semanticscholar.org/paper/f459eb635c2a485c77f1461f47f566f43cc0a4b7", + 96439665}, "corpusId": 96439665, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f459eb635c2a485c77f1461f47f566f43cc0a4b7", "title": "Biological evolution\u2019s use of representational redescription", "abstract": "I encountered Annette Karmiloff-Smith several times between the 1980s and 2012. We also occasionally exchanged email messages. We worked on @@ -16560,13 +18967,14 @@ interactions: I\u2019ll try to explain. I regret that we did not have opportunities to engage more deeply, and perhaps achieve a new synthesis.", "venue": "", "year": 2021, "referenceCount": 52, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-04-16", "journal": {"volume": - "", "pages": "76-93", "name": ""}, "authors": [{"authorId": "145788442", "name": - "A. Sloman"}]}, {"paperId": "fd9904f66018681d77037c057cf3f1755d9e0aa9", "externalIds": - {"DBLP": "conf/ACMse/OmatuP21", "DOI": "10.1145/3409334.3452072", "CorpusId": - 234344744}, "url": "https://www.semanticscholar.org/paper/fd9904f66018681d77037c057cf3f1755d9e0aa9", + false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-16", + "journal": {"volume": "", "pages": "76-93", "name": ""}, "authors": [{"authorId": + "145788442", "name": "A. Sloman"}]}, {"paperId": "fd9904f66018681d77037c057cf3f1755d9e0aa9", + "externalIds": {"DBLP": "conf/ACMse/OmatuP21", "DOI": "10.1145/3409334.3452072", + "CorpusId": 234344744}, "corpusId": 234344744, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fd9904f66018681d77037c057cf3f1755d9e0aa9", "title": "Benefits of combining dimensional attention and working memory for partially observable reinforcement learning problems", "abstract": "Neuroscience provides a rich source of inspiration for new types of algorithms and architectures @@ -16586,15 +18994,16 @@ interactions: 2) developing emergent alternative strategies which optimize performance over the long-term.", "venue": "ACM Southeast Conference", "year": 2021, "referenceCount": 26, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], - "publicationDate": "2021-04-15", "journal": {"name": "Proceedings of the 2021 - ACM Southeast Conference"}, "authors": [{"authorId": "2090365479", "name": - "Ngozi Omatu"}, {"authorId": "49168710", "name": "Joshua L. Phillips"}]}, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "2021-04-15", "journal": {"name": "Proceedings + of the 2021 ACM Southeast Conference"}, "authors": [{"authorId": "2090365479", + "name": "Ngozi Omatu"}, {"authorId": "49168710", "name": "Joshua L. Phillips"}]}, {"paperId": "584f796997a59f5775b30814037318ac0be9f11d", "externalIds": {"ArXiv": "2104.07598", "DBLP": "journals/corr/abs-2104-07598", "DOI": "10.1145/3530875", - "CorpusId": 233241187}, "url": "https://www.semanticscholar.org/paper/584f796997a59f5775b30814037318ac0be9f11d", + "CorpusId": 233241187}, "corpusId": 233241187, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/584f796997a59f5775b30814037318ac0be9f11d", "title": "Can Artificial Intelligence Make Art?: Folk Intuitions as to whether AI-driven Robots Can Be Viewed as Artists and Produce Art", "abstract": "In two experiments (total N = 693), we explored whether people are willing to @@ -16607,42 +19016,53 @@ interactions: consider robots as artists than humans, which is partially explained by the fact that they are less disposed to attribute artistic intentions to robots.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 99, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-04-15", "journal": {"volume": "11", "pages": "1 - 19", "name": "ACM - Transactions on Human-Robot Interaction (THRI)"}, "authors": [{"authorId": - "2083035030", "name": "Elz.e Sigut.e Mikalonyt.e"}, {"authorId": "46849688", - "name": "Markus Kneer"}]}, {"paperId": "26005ae02a1e12d6e835744af861a1f84fc5935d", + 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/3530875", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-04-15", "journal": {"volume": "11", "pages": "1 - + 19", "name": "ACM Transactions on Human-Robot Interaction (THRI)"}, "authors": + [{"authorId": "2083035030", "name": "Elz.e Sigut.e Mikalonyt.e"}, {"authorId": + "46849688", "name": "Markus Kneer"}]}, {"paperId": "26005ae02a1e12d6e835744af861a1f84fc5935d", "externalIds": {"PubMedCentral": "8041614", "DOI": "10.1007/s10726-021-09734-1", - "CorpusId": 233220206, "PubMed": "33867681"}, "url": "https://www.semanticscholar.org/paper/26005ae02a1e12d6e835744af861a1f84fc5935d", + "CorpusId": 233220206, "PubMed": "33867681"}, "corpusId": 233220206, "publicationVenue": + {"id": "ce29274e-e4e7-4015-bb98-03af1b78dc4f", "name": "Group Decision and + Negotiation", "type": "conference", "alternate_names": ["Group Decis Negot", + "GDN"], "issn": "0926-2644", "url": "https://link.springer.com/journal/10726"}, + "url": "https://www.semanticscholar.org/paper/26005ae02a1e12d6e835744af861a1f84fc5935d", "title": "Using Artificial Intelligence to provide Intelligent Dispute Resolution Support", "abstract": null, "venue": "Group Decision and Negotiation", "year": 2021, "referenceCount": 80, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-04-13", "journal": {"volume": "30", "pages": "789 - - 812", "name": "Group Decision and Negotiation"}, "authors": [{"authorId": - "2058672947", "name": "John Zeleznikow"}]}, {"paperId": "29409efa04ac99ccf01d2a011d21d5d14e870000", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s10726-021-09734-1.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2021-04-13", "journal": {"volume": "30", "pages": "789 - 812", "name": "Group + Decision and Negotiation"}, "authors": [{"authorId": "2058672947", "name": + "John Zeleznikow"}]}, {"paperId": "29409efa04ac99ccf01d2a011d21d5d14e870000", "externalIds": {"PubMedCentral": "8040371", "DOI": "10.1007/s11030-021-10217-3", - "CorpusId": 233211014, "PubMed": "33844136"}, "url": "https://www.semanticscholar.org/paper/29409efa04ac99ccf01d2a011d21d5d14e870000", + "CorpusId": 233211014, "PubMed": "33844136"}, "corpusId": 233211014, "publicationVenue": + {"id": "1c60c14e-1b6e-4198-a3de-545707da4d81", "name": "Molecular diversity", + "type": "journal", "alternate_names": ["Molecular Diversity", "Mol divers", + "Mol Divers"], "issn": "1381-1991", "url": "http://www.springer.com/journal/11030/about", + "alternate_urls": ["https://link.springer.com/journal/11030"]}, "url": "https://www.semanticscholar.org/paper/29409efa04ac99ccf01d2a011d21d5d14e870000", "title": "Artificial intelligence to deep learning: machine intelligence approach for drug discovery", "abstract": null, "venue": "Molecular diversity", "year": - 2021, "referenceCount": 477, "citationCount": 105, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-12", "journal": - {"volume": "25", "pages": "1315 - 1360", "name": "Molecular Diversity"}, "authors": - [{"authorId": "1409846740", "name": "Rohan Gupta"}, {"authorId": "153610437", - "name": "Devesh Srivastava"}, {"authorId": "2059118408", "name": "Mehar Sahu"}, - {"authorId": "2072850683", "name": "Swati Tiwari"}, {"authorId": "2288195", - "name": "R. K. Ambasta"}, {"authorId": "38183916", "name": "Pravir Kumar"}]}, - {"paperId": "f06ca547e5eaf0fd118f184b9ddd1cf7cd5c29e0", "externalIds": {"DBLP": - "journals/corr/abs-2104-05500", "ArXiv": "2104.05500", "CorpusId": 233210665}, - "url": "https://www.semanticscholar.org/paper/f06ca547e5eaf0fd118f184b9ddd1cf7cd5c29e0", + 2021, "referenceCount": 477, "citationCount": 110, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s11030-021-10217-3.pdf", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-04-12", "journal": {"volume": + "25", "pages": "1315 - 1360", "name": "Molecular Diversity"}, "authors": [{"authorId": + "1409846740", "name": "Rohan Gupta"}, {"authorId": "153610437", "name": "Devesh + Srivastava"}, {"authorId": "2059118408", "name": "Mehar Sahu"}, {"authorId": + "2072850683", "name": "Swati Tiwari"}, {"authorId": "2288195", "name": "R. + K. Ambasta"}, {"authorId": "38183916", "name": "Pravir Kumar"}]}, {"paperId": + "f06ca547e5eaf0fd118f184b9ddd1cf7cd5c29e0", "externalIds": {"DBLP": "journals/corr/abs-2104-05500", + "ArXiv": "2104.05500", "CorpusId": 233210665}, "corpusId": 233210665, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f06ca547e5eaf0fd118f184b9ddd1cf7cd5c29e0", "title": "Updater-Extractor Architecture for Inductive World State Representations", "abstract": "Developing NLP models traditionally involves two stages training and application. Retention of information acquired after training (at application @@ -16662,15 +19082,16 @@ interactions: in progress. At present, we focused on easily interpretable tasks, leaving the application of the proposed ideas to practical NLP applications for the future.", "venue": "ArXiv", "year": 2021, "referenceCount": 30, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-04-12", "journal": - {"volume": "abs/2104.05500", "name": "ArXiv"}, "authors": [{"authorId": "116808291", - "name": "A. Moskvichev"}, {"authorId": "2108386159", "name": "James Liu"}]}, - {"paperId": "1d26a324c7f13e474a98ed76842f683e389f639e", "externalIds": {"MAG": - "3153829757", "DOI": "10.21684/2412-2343-2021-8-1-86-115", "CorpusId": 234814884}, - "url": "https://www.semanticscholar.org/paper/1d26a324c7f13e474a98ed76842f683e389f639e", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-04-12", "journal": {"volume": "abs/2104.05500", "name": "ArXiv"}, "authors": + [{"authorId": "116808291", "name": "A. Moskvichev"}, {"authorId": "2108386159", + "name": "James Liu"}]}, {"paperId": "1d26a324c7f13e474a98ed76842f683e389f639e", + "externalIds": {"MAG": "3153829757", "DOI": "10.21684/2412-2343-2021-8-1-86-115", + "CorpusId": 234814884}, "corpusId": 234814884, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1d26a324c7f13e474a98ed76842f683e389f639e", "title": "Regulation of Artificial Intelligence in BRICS and the European Union", "abstract": "Global digitization and the emergence of Artificial Intelligence-based technologies pose challenges for all countries. The BRICS and European Union @@ -16692,24 +19113,30 @@ interactions: for optimization of the provisions of the legislation, including designing a model legal act in the sphere of AI.", "venue": "BRICS Law Journal", "year": 2021, "referenceCount": 44, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-11", - "journal": {"name": "BRICS Law Journal"}, "authors": [{"authorId": "2081710656", - "name": "D. Cyman"}, {"authorId": "72777661", "name": "E. Gromova"}, {"authorId": - "120476812", "name": "E. Juchnevicius"}]}, {"paperId": "c04ca6b39ee20fba3c894c9fdc5d0377f194d260", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.bricslawjournal.com/jour/article/download/452/193", + "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-04-11", "journal": {"name": + "BRICS Law Journal"}, "authors": [{"authorId": "2081710656", "name": "D. Cyman"}, + {"authorId": "72777661", "name": "E. Gromova"}, {"authorId": "120476812", + "name": "E. Juchnevicius"}]}, {"paperId": "c04ca6b39ee20fba3c894c9fdc5d0377f194d260", "externalIds": {"PubMedCentral": "8052224", "DOI": "10.1007/s00709-021-01642-0", - "CorpusId": 233201237, "PubMed": "33837845"}, "url": "https://www.semanticscholar.org/paper/c04ca6b39ee20fba3c894c9fdc5d0377f194d260", + "CorpusId": 233201237, "PubMed": "33837845"}, "corpusId": 233201237, "publicationVenue": + {"id": "8e7acb5a-de93-4923-bb79-4534cc15f8d5", "name": "Protoplasma", "type": + "journal", "issn": "0033-183X", "alternate_issns": ["0934-8727"], "url": "https://link.springer.com/journal/709"}, + "url": "https://www.semanticscholar.org/paper/c04ca6b39ee20fba3c894c9fdc5d0377f194d260", "title": "Intelligence without neurons: a Turing Test for plants?", "abstract": null, "venue": "Protoplasma", "year": 2021, "referenceCount": 14, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Editorial"], - "publicationDate": "2021-04-10", "journal": {"volume": "258", "pages": "455 - - 458", "name": "Protoplasma"}, "authors": [{"authorId": "145333473", "name": - "P. Nick"}]}, {"paperId": "07c8c0aae067b472a90cb4458a932228f60cdc02", "externalIds": - {"MAG": "3153647488", "DBLP": "journals/ijgi/TerziyanN21", "DOI": "10.3390/IJGI10040246", - "CorpusId": 234811458}, "url": "https://www.semanticscholar.org/paper/07c8c0aae067b472a90cb4458a932228f60cdc02", + 3, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s00709-021-01642-0.pdf", "status": + null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["Editorial"], "publicationDate": "2021-04-10", "journal": + {"volume": "258", "pages": "455 - 458", "name": "Protoplasma"}, "authors": + [{"authorId": "145333473", "name": "P. Nick"}]}, {"paperId": "07c8c0aae067b472a90cb4458a932228f60cdc02", + "externalIds": {"MAG": "3153647488", "DBLP": "journals/ijgi/TerziyanN21", + "DOI": "10.3390/IJGI10040246", "CorpusId": 234811458}, "corpusId": 234811458, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/07c8c0aae067b472a90cb4458a932228f60cdc02", "title": "Semantics of Voids within Data: Ignorance-Aware Machine Learning", "abstract": "Operating with ignorance is an important concern of geographical information science when the objective is to discover knowledge from the imperfect @@ -16730,14 +19157,16 @@ interactions: artificial and real datasets to test the concept of the usefulness of ignorance semantics discovery.", "venue": "ISPRS Int. J. Geo Inf.", "year": 2021, "referenceCount": 49, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-04-08", "journal": {"volume": "10", "pages": "246", "name": "ISPRS Int. - J. Geo Inf."}, "authors": [{"authorId": "1742755", "name": "V. Terziyan"}, - {"authorId": "145403995", "name": "A. Nikulin"}]}, {"paperId": "09279dc8018a8131e11d527cebb06d0a43c67cff", - "externalIds": {"DBLP": "journals/corr/abs-2104-02726", "ArXiv": "2104.02726", - "CorpusId": 233168627}, "url": "https://www.semanticscholar.org/paper/09279dc8018a8131e11d527cebb06d0a43c67cff", + "openAccessPdf": {"url": "https://www.mdpi.com/2220-9964/10/4/246/pdf?version=1617941429", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-04-08", "journal": {"volume": "10", "pages": "246", + "name": "ISPRS Int. J. Geo Inf."}, "authors": [{"authorId": "1742755", "name": + "V. Terziyan"}, {"authorId": "145403995", "name": "A. Nikulin"}]}, {"paperId": + "09279dc8018a8131e11d527cebb06d0a43c67cff", "externalIds": {"DBLP": "journals/corr/abs-2104-02726", + "ArXiv": "2104.02726", "CorpusId": 233168627}, "corpusId": 233168627, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/09279dc8018a8131e11d527cebb06d0a43c67cff", "title": "Creativity and Machine Learning: A Survey", "abstract": "There is a growing interest in the area of machine learning and creativity. This survey presents an overview of the history and the state of the art of computational @@ -16746,14 +19175,15 @@ interactions: a critical discussion of the key contributions in this area, we outline the current research challenges and emerging opportunities in this field.", "venue": "ArXiv", "year": 2021, "referenceCount": 285, "citationCount": 13, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2021-04-06", "journal": {"volume": "abs/2104.02726", - "name": "ArXiv"}, "authors": [{"authorId": "2067291198", "name": "Giorgio - Franceschelli"}, {"authorId": "1806767", "name": "Mirco Musolesi"}]}, {"paperId": - "3e73043486daa85330554ddc5b48c9a26ed66f4b", "externalIds": {"MAG": "3141717750", - "DOI": "10.17755/ESOSDER.844536", "CorpusId": 233593779}, "url": "https://www.semanticscholar.org/paper/3e73043486daa85330554ddc5b48c9a26ed66f4b", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-04-06", + "journal": {"volume": "abs/2104.02726", "name": "ArXiv"}, "authors": [{"authorId": + "2067291198", "name": "Giorgio Franceschelli"}, {"authorId": "1806767", "name": + "Mirco Musolesi"}]}, {"paperId": "3e73043486daa85330554ddc5b48c9a26ed66f4b", + "externalIds": {"MAG": "3141717750", "DOI": "10.17755/ESOSDER.844536", "CorpusId": + 233593779}, "corpusId": 233593779, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e73043486daa85330554ddc5b48c9a26ed66f4b", "title": "YAPAY ZEKA BA\u011eLAMINDA YARATICILIK VE G\u00d6RSEL TASARIMIN GELECE\u011e\u0130", "abstract": "In the design industry, we see the artificial intelligence applications which come into being along with the development @@ -16778,12 +19208,17 @@ interactions: of the human intelligence. What the effect of the artificial intelligence will be on the design process without such factors in the future is discussed.", "venue": "", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-04-05", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "46805024", "name": "B. Karabulut"}]}, {"paperId": "36941ff76f77ab149ca3ac5645dd2352e26163e9", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dergipark.org.tr/tr/download/article-file/1460732", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-05", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "46805024", + "name": "B. Karabulut"}]}, {"paperId": "36941ff76f77ab149ca3ac5645dd2352e26163e9", "externalIds": {"DOI": "10.1080/0889311X.2021.1982914", "CorpusId": 244491707}, - "url": "https://www.semanticscholar.org/paper/36941ff76f77ab149ca3ac5645dd2352e26163e9", + "corpusId": 244491707, "publicationVenue": {"id": "29bdd89b-f2e2-4184-acd9-5d6820c70de7", + "name": "Crystallography Reviews", "type": "journal", "alternate_names": ["Crystallogr + Rev"], "issn": "0889-311X", "url": "http://www.tandfonline.com/loi/gcry20", + "alternate_urls": ["https://tandfonline.com/toc/gcry20/current"]}, "url": + "https://www.semanticscholar.org/paper/36941ff76f77ab149ca3ac5645dd2352e26163e9", "title": "Machine learning applications in macromolecular X-ray crystallography", "abstract": "After more than half a century of evolution, machine learning and artificial intelligence, in general, are entering a truly exciting era @@ -16796,13 +19231,18 @@ interactions: in crystallography and concludes with topical examples of how it is currently influencing macromolecular crystallography.", "venue": "Crystallography Reviews", "year": 2021, "referenceCount": 165, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2021-04-03", "journal": {"volume": "27", "pages": "54 - - 101", "name": "Crystallography Reviews"}, "authors": [{"authorId": "4272943", - "name": "M. Vollmar"}, {"authorId": "38942685", "name": "G. Evans"}]}, {"paperId": - "9eafc9094b0c005892c90812372f103643dcea9f", "externalIds": {"DOI": "10.1080/15027570.2021.1987643", - "CorpusId": 240075011}, "url": "https://www.semanticscholar.org/paper/9eafc9094b0c005892c90812372f103643dcea9f", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/0889311X.2021.1982914?needAccess=true", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-04-03", "journal": {"volume": "27", "pages": "54 - 101", "name": "Crystallography + Reviews"}, "authors": [{"authorId": "4272943", "name": "M. Vollmar"}, {"authorId": + "38942685", "name": "G. Evans"}]}, {"paperId": "9eafc9094b0c005892c90812372f103643dcea9f", + "externalIds": {"DOI": "10.1080/15027570.2021.1987643", "CorpusId": 240075011}, + "corpusId": 240075011, "publicationVenue": {"id": "aaaca1fe-426d-444d-b0d1-9901fad912a4", + "name": "Journal of Military Ethics", "type": "journal", "alternate_names": + ["J Mil Ethics"], "issn": "1502-7570", "url": "http://www.tandfonline.com/loi/smil20", + "alternate_urls": ["https://www.tandfonline.com/toc/smil20/17/1?nav=tocList"]}, + "url": "https://www.semanticscholar.org/paper/9eafc9094b0c005892c90812372f103643dcea9f", "title": "Hume\u2019s Law as Another Philosophical Problem for Autonomous Weapons Systems", "abstract": "ABSTRACT This article contends that certain types of Autonomous Weapons Systems (AWS) are susceptible to Hume\u2019s Law. @@ -16818,12 +19258,13 @@ interactions: then the task of grounding the moral judgements of AWS would still be left unaccounted for.", "venue": "Journal of Military Ethics", "year": 2021, "referenceCount": 72, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-03", - "journal": {"volume": "20", "pages": "113 - 128", "name": "Journal of Military - Ethics"}, "authors": [{"authorId": "84400220", "name": "R. Boyles"}]}, {"paperId": - "3762e4c40731c630a98df7742d2fc5902833e54d", "externalIds": {"DOI": "10.1080/02580136.2021.1941652", - "CorpusId": 235676108}, "url": "https://www.semanticscholar.org/paper/3762e4c40731c630a98df7742d2fc5902833e54d", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-04-03", "journal": {"volume": "20", "pages": "113 - 128", "name": "Journal + of Military Ethics"}, "authors": [{"authorId": "84400220", "name": "R. Boyles"}]}, + {"paperId": "3762e4c40731c630a98df7742d2fc5902833e54d", "externalIds": {"DOI": + "10.1080/02580136.2021.1941652", "CorpusId": 235676108}, "corpusId": 235676108, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3762e4c40731c630a98df7742d2fc5902833e54d", "title": "Can Aristotelian virtue theory survive Fourth Order Technology? An ethics perspective", "abstract": "The Fourth Industrial Revolution (4IR) and accompanying Fourth Order technologies (FOTs) sit at the confluence of @@ -16849,13 +19290,13 @@ interactions: more profound meaning and influence through the relative and moral brought about through the \u201clived\u201d human experience and its iteration.", "venue": "", "year": 2021, "referenceCount": 88, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-04-03", "journal": {"volume": "40", "pages": "213 - 227", "name": "South - African Journal of Philosophy"}, "authors": [{"authorId": "2116178408", "name": - "Lorrainne Doherty"}]}, {"paperId": "bc005e6a24be8d866e04f04b905415a5f1c47a4f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-04-03", "journal": {"volume": "40", "pages": + "213 - 227", "name": "South African Journal of Philosophy"}, "authors": [{"authorId": + "2116178408", "name": "Lorrainne Doherty"}]}, {"paperId": "bc005e6a24be8d866e04f04b905415a5f1c47a4f", "externalIds": {"DOI": "10.1080/02580136.2021.1921933", "CorpusId": 235676080}, - "url": "https://www.semanticscholar.org/paper/bc005e6a24be8d866e04f04b905415a5f1c47a4f", + "corpusId": 235676080, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc005e6a24be8d866e04f04b905415a5f1c47a4f", "title": "Moral risks and government policy in South Africa in the context of 4IR", "abstract": "South Africa, among other nations in Africa, most notably Kenya, Nigeria and Rwanda, is aiming to take a lead in the implementation @@ -16870,14 +19311,17 @@ interactions: the need for dignity, equality and privacy, which the technologies seem to threaten, against the promise of flourishing that the technologies seem to offer.", "venue": "", "year": 2021, "referenceCount": 114, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Political Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-04-03", "journal": {"volume": - "40", "pages": "195 - 212", "name": "South African Journal of Philosophy"}, - "authors": [{"authorId": "103072012", "name": "John M. Ostrowick"}]}, {"paperId": - "c51cfb181e7977ef3a52bbabde4d479e284c91ed", "externalIds": {"MAG": "3140642569", - "DOI": "10.1161/CIRCRESAHA.121.318106", "CorpusId": 232762118, "PubMed": "33793339"}, - "url": "https://www.semanticscholar.org/paper/c51cfb181e7977ef3a52bbabde4d479e284c91ed", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Political Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-03", + "journal": {"volume": "40", "pages": "195 - 212", "name": "South African Journal + of Philosophy"}, "authors": [{"authorId": "103072012", "name": "John M. Ostrowick"}]}, + {"paperId": "c51cfb181e7977ef3a52bbabde4d479e284c91ed", "externalIds": {"MAG": + "3140642569", "DOI": "10.1161/CIRCRESAHA.121.318106", "CorpusId": 232762118, + "PubMed": "33793339"}, "corpusId": 232762118, "publicationVenue": {"id": "439d70ad-d909-4791-bdc6-dc765447bd42", + "name": "Circulation Research", "type": "journal", "alternate_names": ["Circ + Res"], "issn": "0009-7330", "url": "http://circres.ahajournals.org/"}, "url": + "https://www.semanticscholar.org/paper/c51cfb181e7977ef3a52bbabde4d479e284c91ed", "title": "Artificial Intelligence in Hypertension", "abstract": "Hypertension remains the largest modifiable cause of mortality worldwide despite the availability of effective medications and sustained research efforts over the past 100 @@ -16895,16 +19339,18 @@ interactions: followed by rigorous validation and scrutiny to realize the promise of artificial intelligence-enabled health care for hypertension and other chronic diseases.", "venue": "Circulation Research", "year": 2021, "referenceCount": 108, "citationCount": - 6, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": ["Psychology", - "Medicine"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-04-02", "journal": {"volume": "128", "pages": "1100 - 1118", "name": - "Circulation Research"}, "authors": [{"authorId": "145535160", "name": "S. - Padmanabhan"}, {"authorId": "2062732891", "name": "T. Q. B. Tran"}, {"authorId": - "5990215", "name": "A. Dominiczak"}]}, {"paperId": "22418ee25580bedcf7f1dc00d5e90419b1cadaa6", + 6, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.ahajournals.org/doi/pdf/10.1161/CIRCRESAHA.121.318106", "status": + null}, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-04-02", "journal": {"volume": "128", "pages": + "1100 - 1118", "name": "Circulation Research"}, "authors": [{"authorId": "145535160", + "name": "S. Padmanabhan"}, {"authorId": "2062732891", "name": "T. Q. B. Tran"}, + {"authorId": "5990215", "name": "A. Dominiczak"}]}, {"paperId": "22418ee25580bedcf7f1dc00d5e90419b1cadaa6", "externalIds": {"MAG": "3150674763", "DOI": "10.3390/TECHNOLOGIES9020023", - "CorpusId": 233533906}, "url": "https://www.semanticscholar.org/paper/22418ee25580bedcf7f1dc00d5e90419b1cadaa6", + "CorpusId": 233533906}, "corpusId": 233533906, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/22418ee25580bedcf7f1dc00d5e90419b1cadaa6", "title": "A Novel Ensemble Machine Learning Approach for Bioarchaeological Sex Prediction", "abstract": "I present a novel machine learning approach to predict sex in the bioarchaeological record. Eighteen cranial interlandmark @@ -16926,13 +19372,14 @@ interactions: to better understand its value, along with the more general contributions that machine learning can make to the reconstruction of past human lifeways.", "venue": "", "year": 2021, "referenceCount": 76, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2227-7080/9/2/23/pdf?version=1617939053", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-01", "journal": {"volume": "9", "pages": "23", "name": ""}, "authors": [{"authorId": "52401892", "name": "Evan Muzzall"}]}, {"paperId": "8fc05add40562a0f4a6cdac341b011956e04334f", "externalIds": {"MAG": "3155307806", "DOI": "10.1214/20-STS780", "CorpusId": - 211267450}, "url": "https://www.semanticscholar.org/paper/8fc05add40562a0f4a6cdac341b011956e04334f", + 211267450}, "corpusId": 211267450, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8fc05add40562a0f4a6cdac341b011956e04334f", "title": "Noncommutative Probability and Multiplicative Cascades", "abstract": "Various aspects of standard model particle physics might be explained by a suitably rich algebra acting on itself, as suggested by Furey (2015). The @@ -16947,13 +19394,18 @@ interactions: of noncommutative (free) probability to allow the edge weights to take values in an algebra. An application to theoretical neuroscience is also discussed.", "venue": "Statistical Science", "year": 2021, "referenceCount": 47, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2021-04-01", "journal": {"name": "Statistical Science"}, - "authors": [{"authorId": "2626305", "name": "I. McKeague"}]}, {"paperId": - "23bacae8a434177f99822ed4fb91e784f59b57ba", "externalIds": {"DBLP": "journals/caaitrit/LiHG21", - "MAG": "3149514201", "DOI": "10.1049/CIT2.12035", "CorpusId": 233610766}, + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-04-01", "journal": {"name": + "Statistical Science"}, "authors": [{"authorId": "2626305", "name": "I. McKeague"}]}, + {"paperId": "23bacae8a434177f99822ed4fb91e784f59b57ba", "externalIds": {"DBLP": + "journals/caaitrit/LiHG21", "MAG": "3149514201", "DOI": "10.1049/CIT2.12035", + "CorpusId": 233610766}, "corpusId": 233610766, "publicationVenue": {"id": + "d6a70d34-0855-4e32-aa47-d6ab631309c3", "name": "CAAI Transactions on Intelligence + Technology", "type": "journal", "alternate_names": ["CAAI Trans Intell Technol"], + "issn": "2468-2322", "url": "https://www.sciencedirect.com/journal/caai-transactions-on-intelligence-technology", + "alternate_urls": ["https://digital-library.theiet.org/content/journals/trit"]}, "url": "https://www.semanticscholar.org/paper/23bacae8a434177f99822ed4fb91e784f59b57ba", "title": "Why AI still doesn''t have consciousness?", "abstract": "Consciousness is one of the unique features of creatures, and is also the root of biological @@ -16974,16 +19426,17 @@ interactions: with only consciousness. The subversive revolution of such application may produce more careful thinking.", "venue": "CAAI Transactions on Intelligence Technology", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Philosophy"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Philosophy", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-31", "journal": - {"volume": "6", "pages": "175-179", "name": "CAAI Trans. Intell. Technol."}, - "authors": [{"authorId": "1686319", "name": "Deyi Li"}, {"authorId": "2087684730", - "name": "Wen He"}, {"authorId": "2179965463", "name": "Yike Guo"}]}, {"paperId": - "9fd758b904d328ee316bbbd01ded9a9b7db11cfe", "externalIds": {"MAG": "3164361795", - "DOI": "10.1590/1981-5344/3554", "CorpusId": 236679385}, "url": "https://www.semanticscholar.org/paper/9fd758b904d328ee316bbbd01ded9a9b7db11cfe", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Philosophy", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-03-31", "journal": {"volume": "6", "pages": "175-179", "name": "CAAI + Trans. Intell. Technol."}, "authors": [{"authorId": "1686319", "name": "Deyi + Li"}, {"authorId": "2087684730", "name": "Wen He"}, {"authorId": "2179965463", + "name": "Yike Guo"}]}, {"paperId": "9fd758b904d328ee316bbbd01ded9a9b7db11cfe", + "externalIds": {"MAG": "3164361795", "DOI": "10.1590/1981-5344/3554", "CorpusId": + 236679385}, "corpusId": 236679385, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9fd758b904d328ee316bbbd01ded9a9b7db11cfe", "title": "De Leibniz \u00e0s m\u00e1quinas sociais: uma vis\u00e3o hist\u00f3rica do surgimento dos agentes inteligentes de informa\u00e7\u00e3o sob a \u00f3tica da ci\u00eancia da informa\u00e7\u00e3o", "abstract": "Tem como objetivo investigar @@ -17003,18 +19456,25 @@ interactions: a principio era atribuida, apenas, a logica e matematica, e por outro lado articular estas desconexas e esparsas visoes dos contextos proprios dos agentes de mineracao.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-03-31", - "journal": {"volume": "26", "pages": "133-156", "name": "Perspectivas Em Ciencia - Da Informacao"}, "authors": [{"authorId": "2579311", "name": "C. Santana"}, - {"authorId": "144802402", "name": "Camila Oliveira Lima"}, {"authorId": "116444344", - "name": "Amanda Almeida Nunes"}]}, {"paperId": "f2e4c984d1ec493b6b07fe67cdc9bd8b265dfaae", - "externalIds": {"MAG": "3146051161", "DOI": "10.1007/s00348-021-03180-0", - "CorpusId": 233577915}, "url": "https://www.semanticscholar.org/paper/f2e4c984d1ec493b6b07fe67cdc9bd8b265dfaae", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.scielo.br/j/pci/a/vwRcpwXjBwKRNVBNC8nT4mk/?format=pdf&lang=pt", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2021-03-31", "journal": {"volume": "26", "pages": + "133-156", "name": "Perspectivas Em Ciencia Da Informacao"}, "authors": [{"authorId": + "2579311", "name": "C. Santana"}, {"authorId": "144802402", "name": "Camila + Oliveira Lima"}, {"authorId": "116444344", "name": "Amanda Almeida Nunes"}]}, + {"paperId": "f2e4c984d1ec493b6b07fe67cdc9bd8b265dfaae", "externalIds": {"MAG": + "3146051161", "DOI": "10.1007/s00348-021-03180-0", "CorpusId": 233577915}, + "corpusId": 233577915, "publicationVenue": {"id": "7b41c268-19fa-4587-a36a-9a03f135cca8", + "name": "Experiments in Fluids", "type": "journal", "alternate_names": ["Exp + Fluid"], "issn": "0723-4864", "url": "http://www.springer.com/engineering/journal/348", + "alternate_urls": ["https://link.springer.com/journal/348", "https://www.springer.com/journal/348", + "http://www.springer.com/journal/348"]}, "url": "https://www.semanticscholar.org/paper/f2e4c984d1ec493b6b07fe67cdc9bd8b265dfaae", "title": "Pulsed jet phase-averaged flow field estimation based on neural network approach", "abstract": null, "venue": "Experiments in Fluids", "year": 2021, "referenceCount": 61, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03206636/file/DAAA21045.1619162616_postprint.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-31", "journal": {"volume": "62", "name": "Experiments in Fluids"}, "authors": [{"authorId": @@ -17024,7 +19484,7 @@ interactions: {"authorId": "38907351", "name": "M. Lippert"}, {"authorId": "92113860", "name": "L. Keirsbulck"}]}, {"paperId": "5fe0159eb024ae8ec331b2733ecbecf717b6f6fc", "externalIds": {"DOI": "10.1109/WiDSTaif52235.2021.9430234", "CorpusId": 235208513}, - "url": "https://www.semanticscholar.org/paper/5fe0159eb024ae8ec331b2733ecbecf717b6f6fc", + "corpusId": 235208513, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5fe0159eb024ae8ec331b2733ecbecf717b6f6fc", "title": "An investigation into the Impact of Artificial Intelligence on the Future of Project Management", "abstract": "The purpose of the study is to investigate the impact of Artificial Intelligence on the future of Project @@ -17039,16 +19499,22 @@ interactions: tools and tasks, but at the end of the day, machines need human help to operate and monitor.", "venue": "2021 International Conference of Women in Data Science at Taif University (WiDSTaif )", "year": 2021, "referenceCount": 24, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Engineering", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], - "publicationDate": "2021-03-30", "journal": {"pages": "1-4", "name": "2021 - International Conference of Women in Data Science at Taif University (WiDSTaif - )"}, "authors": [{"authorId": "2105732438", "name": "Asma Alshaikhi"}, {"authorId": - "1917077", "name": "Mashael M Khayyat"}]}, {"paperId": "fbef63c0c26ee1ad04e773179b4dd35cad2f0f10", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}, + {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Conference", + "Review"], "publicationDate": "2021-03-30", "journal": {"pages": "1-4", "name": + "2021 International Conference of Women in Data Science at Taif University + (WiDSTaif )"}, "authors": [{"authorId": "2105732438", "name": "Asma Alshaikhi"}, + {"authorId": "1917077", "name": "Mashael M Khayyat"}]}, {"paperId": "fbef63c0c26ee1ad04e773179b4dd35cad2f0f10", "externalIds": {"PubMedCentral": "8902029", "MAG": "3134535041", "DOI": "10.1177/1745691621997113", - "CorpusId": 236714691, "PubMed": "34730453"}, "url": "https://www.semanticscholar.org/paper/fbef63c0c26ee1ad04e773179b4dd35cad2f0f10", + "CorpusId": 236714691, "PubMed": "34730453"}, "corpusId": 236714691, "publicationVenue": + {"id": "8ec18bc5-9c95-446c-a293-735d7ae1e3e9", "name": "Perspectives on Psychological + Science", "type": "journal", "alternate_names": ["Perspect Psychol Sci"], + "issn": "1745-6916", "url": "http://www.sagepub.com/journals/Journal201964/title", + "alternate_urls": ["https://uk.sagepub.com/en-gb/eur/journal/perspectives-psychological-science", + "http://pps.sagepub.com/", "https://www.jstor.org/journal/perspsycscie", "http://www.jstor.org/action/showPublication?journalCode=perspsycscie"]}, + "url": "https://www.semanticscholar.org/paper/fbef63c0c26ee1ad04e773179b4dd35cad2f0f10", "title": "Why Evolutionary Psychology Should Abandon Modularity", "abstract": "A debate surrounding modularity\u2014the notion that the mind may be exclusively composed of distinct systems or modules\u2014has held philosophers and psychologists @@ -17069,15 +19535,17 @@ interactions: all areas should take preventive measures to avoid this confusion in the future.", "venue": "Perspectives on Psychological Science", "year": 2021, "referenceCount": 160, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-03-29", "journal": {"volume": - "17", "pages": "465 - 490", "name": "Perspectives on Psychological Science"}, - "authors": [{"authorId": "6110283", "name": "D. Pietraszewski"}, {"authorId": - "6240574", "name": "Annie E. Wertz"}]}, {"paperId": "28ec33e7813f37dc25d2daa51be307594c7552b4", + "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/1745691621997113", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-29", "journal": + {"volume": "17", "pages": "465 - 490", "name": "Perspectives on Psychological + Science"}, "authors": [{"authorId": "6110283", "name": "D. Pietraszewski"}, + {"authorId": "6240574", "name": "Annie E. Wertz"}]}, {"paperId": "28ec33e7813f37dc25d2daa51be307594c7552b4", "externalIds": {"ArXiv": "2103.15739", "DBLP": "journals/corr/abs-2103-15739", - "DOI": "10.33965/ict2021_202106r031", "CorpusId": 232417683}, "url": "https://www.semanticscholar.org/paper/28ec33e7813f37dc25d2daa51be307594c7552b4", + "DOI": "10.33965/ict2021_202106r031", "CorpusId": 232417683}, "corpusId": + 232417683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/28ec33e7813f37dc25d2daa51be307594c7552b4", "title": "Automation: An Essential Component Of Ethical AI?", "abstract": "Ethics is sometimes considered to be too abstract to be meaningfully implemented in artificial intelligence (AI). In this paper, we reflect on other aspects @@ -17093,15 +19561,17 @@ interactions: Conference on ICT, Society and Human Beings (ICT 2021), the 18th International Conference Web Based Communities and Social Media (WBC 2021)", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2021-03-29", "journal": {"volume": "abs/2103.15739", "name": - "ArXiv"}, "authors": [{"authorId": "1889245", "name": "Vivek Nallur"}, {"authorId": - "2055353180", "name": "Martin Lloyd"}, {"authorId": "144968698", "name": "Siani - Pearson"}]}, {"paperId": "4ef16f82648d85c80056511baf724eb2634539ce", "externalIds": - {"DBLP": "journals/corr/abs-2103-15294", "ArXiv": "2103.15294", "CorpusId": - 232404428}, "url": "https://www.semanticscholar.org/paper/4ef16f82648d85c80056511baf724eb2634539ce", + true, "openAccessPdf": {"url": "http://www.iadisportal.org/components/com_booklibrary/ebooks/202106R031.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2021-03-29", "journal": {"volume": "abs/2103.15739", + "name": "ArXiv"}, "authors": [{"authorId": "1889245", "name": "Vivek Nallur"}, + {"authorId": "2055353180", "name": "Martin Lloyd"}, {"authorId": "144968698", + "name": "Siani Pearson"}]}, {"paperId": "4ef16f82648d85c80056511baf724eb2634539ce", + "externalIds": {"DBLP": "journals/corr/abs-2103-15294", "ArXiv": "2103.15294", + "CorpusId": 232404428}, "corpusId": 232404428, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4ef16f82648d85c80056511baf724eb2634539ce", "title": "\"Weak AI\" is Likely to Never Become \"Strong AI\", So What is its Greatest Value for us?", "abstract": "AI has surpassed humans across a variety of tasks such as image classification, playing games (e.g., go, \u201cStarcraft\u201d @@ -17115,26 +19585,31 @@ interactions: is the greatest value of \u201cweak AI\u201d if it has no chance to develop into \u201cstrong AI\u201d.", "venue": "ArXiv", "year": 2021, "referenceCount": 39, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-03-29", "journal": {"volume": "abs/2103.15294", "name": "ArXiv"}, "authors": - [{"authorId": "48265485", "name": "B. Liu"}]}, {"paperId": "b33f5e9e16b31ab32d701325b7e7e6647265ed93", - "externalIds": {"MAG": "3148087028", "DBLP": "journals/mj/LiLZQL21", "DOI": - "10.1016/J.MEJO.2021.105044", "CorpusId": 233687143}, "url": "https://www.semanticscholar.org/paper/b33f5e9e16b31ab32d701325b7e7e6647265ed93", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-03-29", "journal": {"volume": "abs/2103.15294", "name": + "ArXiv"}, "authors": [{"authorId": "48265485", "name": "B. Liu"}]}, {"paperId": + "b33f5e9e16b31ab32d701325b7e7e6647265ed93", "externalIds": {"MAG": "3148087028", + "DBLP": "journals/mj/LiLZQL21", "DOI": "10.1016/J.MEJO.2021.105044", "CorpusId": + 233687143}, "corpusId": 233687143, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b33f5e9e16b31ab32d701325b7e7e6647265ed93", "title": "Achievements, challenges, and developing directions of bio-inspired self-repairing technology", "abstract": null, "venue": "Microelectron. J.", "year": 2021, "referenceCount": 74, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-03-27", "journal": {"volume": "111", "pages": "105044", - "name": "Microelectron. J."}, "authors": [{"authorId": "2108506145", "name": - "Duo Li"}, {"authorId": "48031735", "name": "Xiubin Liu"}, {"authorId": "35260345", - "name": "Qingqi Zhuo"}, {"authorId": "3420981", "name": "Yanling Qian"}, {"authorId": - "2000883360", "name": "Yue Li"}]}, {"paperId": "e95b050d162d87931e2cd32f9e775f15eac450cf", - "externalIds": {"MAG": "3138644744", "DOI": "10.3390/MATH9060681", "CorpusId": - 233638584}, "url": "https://www.semanticscholar.org/paper/e95b050d162d87931e2cd32f9e775f15eac450cf", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-03-27", "journal": + {"volume": "111", "pages": "105044", "name": "Microelectron. J."}, "authors": + [{"authorId": "2108506145", "name": "Duo Li"}, {"authorId": "48031735", "name": + "Xiubin Liu"}, {"authorId": "35260345", "name": "Qingqi Zhuo"}, {"authorId": + "3420981", "name": "Yanling Qian"}, {"authorId": "2000883360", "name": "Yue + Li"}]}, {"paperId": "e95b050d162d87931e2cd32f9e775f15eac450cf", "externalIds": + {"MAG": "3138644744", "DOI": "10.3390/MATH9060681", "CorpusId": 233638584}, + "corpusId": 233638584, "publicationVenue": {"id": "6175efe8-6f8e-4cbe-8cee-d154f4e78627", + "name": "Mathematics", "issn": "2227-7390", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-283014", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-283014", + "https://www.mdpi.com/journal/mathematics"]}, "url": "https://www.semanticscholar.org/paper/e95b050d162d87931e2cd32f9e775f15eac450cf", "title": "Black-Box-Based Mathematical Modelling of Machine Intelligence Measuring", "abstract": "Current machine intelligence metrics rely on a different philosophy, hindering their effective comparison. There is no standardization of what @@ -17159,29 +19634,32 @@ interactions: metric, we provide a representative experimental study, comparing the intelligence of several CMASs composed of agents specialized in solving an NP-hard problem.", "venue": "Mathematics", "year": 2021, "referenceCount": 85, "citationCount": - 4, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-03-22", "journal": {"name": - "Mathematics"}, "authors": [{"authorId": "2983864", "name": "L\u00e1szl\u00f3 - Barna Iantovics"}]}, {"paperId": "eb266c80be4904a62ca29d1ba8511e4129cc49f0", + 4, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2227-7390/9/6/681/pdf?version=1616475982", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-22", + "journal": {"name": "Mathematics"}, "authors": [{"authorId": "2983864", "name": + "L\u00e1szl\u00f3 Barna Iantovics"}]}, {"paperId": "eb266c80be4904a62ca29d1ba8511e4129cc49f0", "externalIds": {"DOI": "10.1016/j.jcct.2021.03.006", "CorpusId": 233027364, - "PubMed": "33812855"}, "url": "https://www.semanticscholar.org/paper/eb266c80be4904a62ca29d1ba8511e4129cc49f0", + "PubMed": "33812855"}, "corpusId": 233027364, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/eb266c80be4904a62ca29d1ba8511e4129cc49f0", "title": "Artificial intelligence in cardiovascular CT: Current status and future implications.", "abstract": null, "venue": "Journal of cardiovascular computed tomography", "year": 2021, "referenceCount": 51, "citationCount": - 8, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2021-03-22", "journal": {"name": "Journal - of cardiovascular computed tomography"}, "authors": [{"authorId": "81728867", - "name": "A. Lin"}, {"authorId": "6747995", "name": "M\u00e1rton Kolossv\u00e1ry"}, - {"authorId": "144511973", "name": "M. Motwani"}, {"authorId": "3165444", "name": - "I. I\u0161gum"}, {"authorId": "1387468728", "name": "P. Maurovich-Horvat"}, - {"authorId": "3106896", "name": "P. Slomka"}, {"authorId": "2596578", "name": - "D. Dey"}]}, {"paperId": "13bc29dba1f721e06448390889a3618344d7cc9f", "externalIds": - {"MAG": "3139427787", "DOI": "10.36592/9786587424620.455-472", "CorpusId": - 233627777}, "url": "https://www.semanticscholar.org/paper/13bc29dba1f721e06448390889a3618344d7cc9f", + 8, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-03-22", + "journal": {"name": "Journal of cardiovascular computed tomography"}, "authors": + [{"authorId": "81728867", "name": "A. Lin"}, {"authorId": "6747995", "name": + "M\u00e1rton Kolossv\u00e1ry"}, {"authorId": "144511973", "name": "M. Motwani"}, + {"authorId": "3165444", "name": "I. I\u0161gum"}, {"authorId": "1387468728", + "name": "P. Maurovich-Horvat"}, {"authorId": "3106896", "name": "P. Slomka"}, + {"authorId": "2596578", "name": "D. Dey"}]}, {"paperId": "13bc29dba1f721e06448390889a3618344d7cc9f", + "externalIds": {"MAG": "3139427787", "DOI": "10.36592/9786587424620.455-472", + "CorpusId": 233627777}, "corpusId": 233627777, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/13bc29dba1f721e06448390889a3618344d7cc9f", "title": "MANAGEMENT OF ARTIFICIAL INTELLIGENCE IN BRAZIL IN THE FACE OF THE CONSTITUTIONAL LEGAL TREATY OF THE DIGITAL ENVIRONMENT", "abstract": "Having as central objective of their research the idea of making computers \"think\" @@ -17210,13 +19688,17 @@ interactions: Law UNINOVE. _330________RJLB, Ano 5 (2019), no 6 principles of the Federal Constitution 1st to 4th).", "venue": "", "year": 2021, "referenceCount": 43, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": "Political - Science", "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-03-21", "journal": {"volume": - "", "pages": "455-472", "name": ""}, "authors": [{"authorId": "108761908", - "name": "C. Fiorillo"}]}, {"paperId": "982cbf7fcee4f3964dd1d411fdeadad6e6f1d465", + "openAccessPdf": null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": + [{"category": "Political Science", "source": "external"}, {"category": "Law", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-21", + "journal": {"volume": "", "pages": "455-472", "name": ""}, "authors": [{"authorId": + "108761908", "name": "C. Fiorillo"}]}, {"paperId": "982cbf7fcee4f3964dd1d411fdeadad6e6f1d465", "externalIds": {"ArXiv": "2103.10685", "DBLP": "conf/kdd/ZouYZYYT21", "DOI": - "10.1145/3447548.3467418", "CorpusId": 232290492}, "url": "https://www.semanticscholar.org/paper/982cbf7fcee4f3964dd1d411fdeadad6e6f1d465", + "10.1145/3447548.3467418", "CorpusId": 232290492}, "corpusId": 232290492, + "publicationVenue": {"id": "a0edb93b-1e95-4128-a295-6b1659149cef", "name": + "Knowledge Discovery and Data Mining", "type": "conference", "alternate_names": + ["KDD", "Knowl Discov Data Min"], "url": "http://www.acm.org/sigkdd/"}, "url": + "https://www.semanticscholar.org/paper/982cbf7fcee4f3964dd1d411fdeadad6e6f1d465", "title": "Controllable Generation from Pre-trained Language Models via Inverse Prompting", "abstract": "Large-scale pre-trained language models have demonstrated strong capabilities of generating realistic texts. However, it remains challenging @@ -17232,8 +19714,9 @@ interactions: Results demonstrate that our proposed method substantially outperforms the baselines and that our generation quality is close to human performance on some of the tasks.", "venue": "Knowledge Discovery and Data Mining", "year": - 2021, "referenceCount": 52, "citationCount": 24, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2021, "referenceCount": 52, "citationCount": 25, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2103.10685", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2021-03-19", "journal": {"name": @@ -17244,7 +19727,7 @@ interactions: "name": "Zhilin Yang"}, {"authorId": "2109541439", "name": "Jie Tang"}]}, {"paperId": "53f45680ffaaf4a644ee74332103c7107df9cbe5", "externalIds": {"ArXiv": "2103.11961", "DBLP": "journals/corr/abs-2103-11961", "CorpusId": 232307135}, - "url": "https://www.semanticscholar.org/paper/53f45680ffaaf4a644ee74332103c7107df9cbe5", + "corpusId": 232307135, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/53f45680ffaaf4a644ee74332103c7107df9cbe5", "title": "Artificial Intelligence Narratives: An Objective Perspective on Current Developments", "abstract": "This work provides a starting point for researchers interested in gaining a deeper understanding of the big picture @@ -17372,33 +19855,39 @@ interactions: [18]. To this end, closed control loops are assumed where an agent acts on an environment to reach a goal based on", "venue": "ArXiv", "year": 2021, "referenceCount": 54, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-03-18", "journal": {"volume": "abs/2103.11961", "name": - "ArXiv"}, "authors": [{"authorId": "97379694", "name": "Noah Klarmann"}]}, + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-03-18", "journal": {"volume": "abs/2103.11961", + "name": "ArXiv"}, "authors": [{"authorId": "97379694", "name": "Noah Klarmann"}]}, {"paperId": "a6985f9f41b7168f6ea6f72ca83987ba769c6b9b", "externalIds": {"PubMedCentral": "7968615", "MAG": "3168412082", "DOI": "10.1007/978-3-030-69978-9_4", "CorpusId": - 232294716}, "url": "https://www.semanticscholar.org/paper/a6985f9f41b7168f6ea6f72ca83987ba769c6b9b", + 232294716}, "corpusId": 232294716, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a6985f9f41b7168f6ea6f72ca83987ba769c6b9b", "title": "Ethical Issues of AI", "abstract": null, "venue": "Artificial Intelligence for a Better Future", "year": 2021, "referenceCount": 70, "citationCount": - 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2021-03-18", "journal": {"pages": "35 - 53", - "name": "Artificial Intelligence for a Better Future"}, "authors": [{"authorId": - "1792014", "name": "B. Stahl"}]}, {"paperId": "c40217c9c4810c932d978100b276b41491423b2b", - "externalIds": {"MAG": "3138442062", "DOI": "10.1057/S41272-021-00319-W", - "CorpusId": 233641994}, "url": "https://www.semanticscholar.org/paper/c40217c9c4810c932d978100b276b41491423b2b", + 10, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007/978-3-030-69978-9_4.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-03-18", "journal": {"pages": "35 - 53", "name": "Artificial Intelligence + for a Better Future"}, "authors": [{"authorId": "1792014", "name": "B. Stahl"}]}, + {"paperId": "c40217c9c4810c932d978100b276b41491423b2b", "externalIds": {"MAG": + "3138442062", "DOI": "10.1057/S41272-021-00319-W", "CorpusId": 233641994}, + "corpusId": 233641994, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c40217c9c4810c932d978100b276b41491423b2b", "title": "Artificial Intelligence in travel", "abstract": null, "venue": "", "year": 2021, "referenceCount": 9, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-17", - "journal": {"volume": "20", "pages": "368-375", "name": "Journal of Revenue - and Pricing Management"}, "authors": [{"authorId": "145936404", "name": "B. - Vinod"}]}, {"paperId": "350ef3164aa44e3e795efe9df52af15afb143b59", "externalIds": - {"MAG": "3137364963", "DOI": "10.1002/aelm.202001241", "CorpusId": 233699986}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2021-03-17", "journal": {"volume": "20", "pages": "368-375", + "name": "Journal of Revenue and Pricing Management"}, "authors": [{"authorId": + "145936404", "name": "B. Vinod"}]}, {"paperId": "350ef3164aa44e3e795efe9df52af15afb143b59", + "externalIds": {"MAG": "3137364963", "DOI": "10.1002/aelm.202001241", "CorpusId": + 233699986}, "corpusId": 233699986, "publicationVenue": {"id": "6af9b219-f58b-4b09-8db0-f2984aca0e14", + "name": "Advanced Electronic Materials", "type": "journal", "alternate_names": + ["Adv Electron Mater", "Adv electron mater", "Advanced electronic materials"], + "issn": "2199-160X", "url": "https://onlinelibrary.wiley.com/journal/2199160x"}, "url": "https://www.semanticscholar.org/paper/350ef3164aa44e3e795efe9df52af15afb143b59", "title": "Phase Change Random Access Memory for Neuro\u2010Inspired Computing", "abstract": "Neuro\u2010inspired computing using emerging memristors plays @@ -17414,20 +19903,24 @@ interactions: challenges, and mainstream solutions are reviewed, and a brief outlook is highlighted and introduced, with the expectation to expound future directions.", "venue": "Advanced Electronic Materials", "year": 2021, "referenceCount": - 130, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-03-17", - "journal": {"volume": "7", "name": "Advanced Electronic Materials"}, "authors": - [{"authorId": "2183630570", "name": "Qiang Wang"}, {"authorId": "49048716", - "name": "G. Niu"}, {"authorId": "2053309127", "name": "Wei Ren"}, {"authorId": - "2108695004", "name": "Ruobing Wang"}, {"authorId": "2116081043", "name": - "Xiaogang Chen"}, {"authorId": "2116226810", "name": "Xi Li"}, {"authorId": + 130, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-03-17", "journal": {"volume": "7", "name": "Advanced Electronic Materials"}, + "authors": [{"authorId": "2183630570", "name": "Qiang Wang"}, {"authorId": + "49048716", "name": "G. Niu"}, {"authorId": "2053309127", "name": "Wei Ren"}, + {"authorId": "2108695004", "name": "Ruobing Wang"}, {"authorId": "2116081043", + "name": "Xiaogang Chen"}, {"authorId": "2116226810", "name": "Xi Li"}, {"authorId": "145377919", "name": "Z. Ye"}, {"authorId": "47779252", "name": "Yahong Xie"}, {"authorId": "3873053", "name": "Sannian Song"}, {"authorId": "145395766", "name": "Zhitang Song"}]}, {"paperId": "047c5da68b8f2a47ad64caccf6e5c026673543fc", "externalIds": {"DOI": "10.3389/fevo.2021.650726", "CorpusId": 232234325}, - "url": "https://www.semanticscholar.org/paper/047c5da68b8f2a47ad64caccf6e5c026673543fc", + "corpusId": 232234325, "publicationVenue": {"id": "52ee8f70-41d7-4479-a480-646299aafc28", + "name": "Frontiers in Ecology and Evolution", "type": "journal", "alternate_names": + ["Front Ecol Evol"], "issn": "2296-701X", "url": "http://www.frontiersin.org/Behavioral_and_Evolutionary_Ecology", + "alternate_urls": ["http://www.frontiersin.org/ecology_and_evolution", "http://www.frontiersin.org/Ecology_and_Evolution/archive", + "https://www.frontiersin.org/journals/ecology-and-evolution"]}, "url": "https://www.semanticscholar.org/paper/047c5da68b8f2a47ad64caccf6e5c026673543fc", "title": "Living Things Are Not (20th Century) Machines: Updating Mechanism Metaphors in Light of the Modern Science of Machine Behavior", "abstract": "One of the most useful metaphors for driving scientific and engineering progress @@ -17458,13 +19951,15 @@ interactions: deep, essential features of concepts for a future in which sharp boundaries between evolved and designed systems will not exist.", "venue": "Frontiers in Ecology and Evolution", "year": 2021, "referenceCount": 188, "citationCount": - 28, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-03-16", "journal": {"volume": - "9"}, "authors": [{"authorId": "7373730", "name": "J. Bongard"}, {"authorId": - "145616961", "name": "M. Levin"}]}, {"paperId": "9e59899c6e1bb1b512b5e3728e1584fba80b69cf", + 30, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.frontiersin.org/articles/10.3389/fevo.2021.650726/pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-16", + "journal": {"volume": "9"}, "authors": [{"authorId": "7373730", "name": "J. + Bongard"}, {"authorId": "145616961", "name": "M. Levin"}]}, {"paperId": "9e59899c6e1bb1b512b5e3728e1584fba80b69cf", "externalIds": {"MAG": "3134075441", "DOI": "10.1108/978-1-83909-694-520211003", - "CorpusId": 233664722}, "url": "https://www.semanticscholar.org/paper/9e59899c6e1bb1b512b5e3728e1584fba80b69cf", + "CorpusId": 233664722}, "corpusId": 233664722, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9e59899c6e1bb1b512b5e3728e1584fba80b69cf", "title": "Intelligent Applications in the Modern Sales Organization", "abstract": "Applications powered by artificial intelligence (AI) and machine learning (ML) have become a crucial factor for success in modern sales organizations. @@ -17480,15 +19975,20 @@ interactions: with prospects and customers. Sales representatives using AI outperform their counterparts that rely purely on traditional methods.", "venue": "", "year": 2021, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-03-15", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2088248900", "name": "Gilberto - Picareta"}, {"authorId": "2087564217", "name": "Eugenie Weissheim"}, {"authorId": - "2087564040", "name": "Martin Kl\u00f6hn"}]}, {"paperId": "14e8bd16197056021613bfd55c136776d320d4b9", - "externalIds": {"MAG": "3137457055", "DBLP": "journals/nms/Shin22", "DOI": - "10.1177/1461444821993801", "CorpusId": 233672302}, "url": "https://www.semanticscholar.org/paper/14e8bd16197056021613bfd55c136776d320d4b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-03-15", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "2088248900", "name": "Gilberto Picareta"}, {"authorId": "2087564217", "name": + "Eugenie Weissheim"}, {"authorId": "2087564040", "name": "Martin Kl\u00f6hn"}]}, + {"paperId": "14e8bd16197056021613bfd55c136776d320d4b9", "externalIds": {"MAG": + "3137457055", "DBLP": "journals/nms/Shin22", "DOI": "10.1177/1461444821993801", + "CorpusId": 233672302}, "corpusId": 233672302, "publicationVenue": {"id": + "a9adf059-5c23-4df1-915b-a3ce3bb66500", "name": "New Media & Society", "type": + "journal", "alternate_names": ["New Media Soc"], "issn": "1461-4448", "url": + "https://journals.sagepub.com/loi/nms", "alternate_urls": ["http://nms.sagepub.com/"]}, + "url": "https://www.semanticscholar.org/paper/14e8bd16197056021613bfd55c136776d320d4b9", "title": "The perception of humanness in conversational journalism: An algorithmic information-processing perspective", "abstract": "How much do anthropomorphisms influence the perception of users about whether they are conversing with a @@ -17509,25 +20009,27 @@ interactions: goal is humans perceive AI as human beings. Our results help to better understand human\u2013chatbot interaction in CJ by illustrating how humans interact with chatbots and explaining why humans accept the way of CJ.", "venue": "New Media - & Society", "year": 2021, "referenceCount": 50, "citationCount": 22, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-03-12", "journal": {"volume": "24", "pages": "2680 - 2704", "name": - "New Media & Society"}, "authors": [{"authorId": "2149547874", "name": "Donghee - Shin"}]}, {"paperId": "fa2b4b704ba4fabb93548c5e3595f26f726221f9", "externalIds": - {"MAG": "3157605529", "DOI": "10.1002/9781119634140.CH10", "CorpusId": 235589290}, - "url": "https://www.semanticscholar.org/paper/fa2b4b704ba4fabb93548c5e3595f26f726221f9", + & Society", "year": 2021, "referenceCount": 50, "citationCount": 24, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-03-12", "journal": {"volume": + "24", "pages": "2680 - 2704", "name": "New Media & Society"}, "authors": [{"authorId": + "2149547874", "name": "Donghee Shin"}]}, {"paperId": "fa2b4b704ba4fabb93548c5e3595f26f726221f9", + "externalIds": {"MAG": "3157605529", "DOI": "10.1002/9781119634140.CH10", + "CorpusId": 235589290}, "corpusId": 235589290, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fa2b4b704ba4fabb93548c5e3595f26f726221f9", "title": "AI AND MACHINE LEARNING MODELING", "abstract": null, "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-03-08", "journal": {"volume": "", "pages": "235-249", "name": ""}, "authors": - [{"authorId": "2143747140", "name": "Amit Gupta"}, {"authorId": "4339803", - "name": "F. Zhu"}]}, {"paperId": "281b4a7e7fb057d8266ec0610888905c46fd715d", - "externalIds": {"ArXiv": "2110.04984", "DBLP": "journals/corr/abs-2103-03125", - "CorpusId": 232110776}, "url": "https://www.semanticscholar.org/paper/281b4a7e7fb057d8266ec0610888905c46fd715d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-03-08", "journal": {"volume": + "", "pages": "235-249", "name": ""}, "authors": [{"authorId": "2143747140", + "name": "Amit Gupta"}, {"authorId": "4339803", "name": "F. Zhu"}]}, {"paperId": + "281b4a7e7fb057d8266ec0610888905c46fd715d", "externalIds": {"ArXiv": "2110.04984", + "DBLP": "journals/corr/abs-2103-03125", "CorpusId": 232110776}, "corpusId": + 232110776, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/281b4a7e7fb057d8266ec0610888905c46fd715d", "title": "Advances in Multi-turn Dialogue Comprehension: A Survey", "abstract": "Training machines to understand natural language and interact with humans is an elusive and essential task in the field of artificial intelligence. @@ -17545,15 +20047,15 @@ interactions: we highlight the technical advances in recent years and point out the lessons we can learn from the empirical analysis and the prospects towards a new frontier of researches.", "venue": "ArXiv", "year": 2021, "referenceCount": 106, "citationCount": - 8, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-03-04", - "journal": {"volume": "abs/2110.04984", "name": "ArXiv"}, "authors": [{"authorId": - "3322871", "name": "Zhuosheng Zhang"}, {"authorId": "47941144", "name": "Hai - Zhao"}]}, {"paperId": "4de6f9f9b9f19a12ba5d1ee3639007c4951d24eb", "externalIds": - {"MAG": "3133620426", "DOI": "10.1177/1075547021998069", "CorpusId": 233790708}, - "url": "https://www.semanticscholar.org/paper/4de6f9f9b9f19a12ba5d1ee3639007c4951d24eb", + 9, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2021-03-04", "journal": {"volume": "abs/2110.04984", "name": + "ArXiv"}, "authors": [{"authorId": "3322871", "name": "Zhuosheng Zhang"}, + {"authorId": "47941144", "name": "Hai Zhao"}]}, {"paperId": "4de6f9f9b9f19a12ba5d1ee3639007c4951d24eb", + "externalIds": {"MAG": "3133620426", "DOI": "10.1177/1075547021998069", "CorpusId": + 233790708}, "corpusId": 233790708, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4de6f9f9b9f19a12ba5d1ee3639007c4951d24eb", "title": "\u201cSiri, Show Me Scary Images of AI\u201d: Effects of Text-Based Frames and Visuals on Support for Artificial Intelligence", "abstract": "This research note examines how framing influences attitudes toward artificial @@ -17566,16 +20068,17 @@ interactions: but interacted with textual frames to do so. The results extend our understanding of framing effects on public attitudes toward emerging technologies.", "venue": "", "year": 2021, "referenceCount": 43, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-03-03", "journal": {"volume": "43", "pages": "388 - - 401", "name": "Science Communication"}, "authors": [{"authorId": "2005499319", - "name": "James Bingaman"}, {"authorId": "11551763", "name": "P. Brewer"}, - {"authorId": "146152595", "name": "Ashley Paintsil"}, {"authorId": "1742444222", - "name": "David C. Wilson"}]}, {"paperId": "9a188bcf450d40ef85e7c6aabef08c6263165ecc", - "externalIds": {"MAG": "3133730873", "DOI": "10.15168/2284-4503-756", "CorpusId": - 233455776}, "url": "https://www.semanticscholar.org/paper/9a188bcf450d40ef85e7c6aabef08c6263165ecc", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://escholarship.org/content/qt5sk4h13h/qt5sk4h13h.pdf?t=rfbntg", + "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2021-03-03", "journal": {"volume": "43", "pages": "388 - 401", "name": "Science + Communication"}, "authors": [{"authorId": "2005499319", "name": "James Bingaman"}, + {"authorId": "11551763", "name": "P. Brewer"}, {"authorId": "146152595", "name": + "Ashley Paintsil"}, {"authorId": "1742444222", "name": "David C. Wilson"}]}, + {"paperId": "9a188bcf450d40ef85e7c6aabef08c6263165ecc", "externalIds": {"MAG": + "3133730873", "DOI": "10.15168/2284-4503-756", "CorpusId": 233455776}, "corpusId": + 233455776, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a188bcf450d40ef85e7c6aabef08c6263165ecc", "title": "Artificial and Biological Neurons: Interdisciplinary Issues and Future Perspectives. White Paper", "abstract": "Recent developments in the technological domain have increased the interactions between artificial and @@ -17589,18 +20092,19 @@ interactions: challenges and opportunities and it seeks to propose ways forward to overcome some of the investigated problems.", "venue": "", "year": 2021, "referenceCount": 41, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-03-03", "journal": {"volume": - "21", "pages": "353-379", "name": ""}, "authors": [{"authorId": "2035521122", - "name": "Davide Bazzanella"}, {"authorId": "146774374", "name": "G. Bincoletto"}, - {"authorId": "134377547", "name": "Monica Consolandi"}, {"authorId": "2106052826", - "name": "Marta Fasan"}, {"authorId": "49393697", "name": "F. Gennari"}, {"authorId": - "1730394478", "name": "Federico C. La Vattiata"}, {"authorId": "2063076216", - "name": "Luca Rinaldi"}, {"authorId": "3706983", "name": "Davide Roccaro"}, - {"authorId": "2061566259", "name": "Clara Zaccaria"}]}, {"paperId": "b390e8262dd6b744e26145fbf8502f5fdd069277", - "externalIds": {"DBLP": "conf/sigcse/FreitasW21", "DOI": "10.1145/3408877.3432530", - "CorpusId": 232126309}, "url": "https://www.semanticscholar.org/paper/b390e8262dd6b744e26145fbf8502f5fdd069277", + "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-03", + "journal": {"volume": "21", "pages": "353-379", "name": ""}, "authors": [{"authorId": + "2035521122", "name": "Davide Bazzanella"}, {"authorId": "146774374", "name": + "G. Bincoletto"}, {"authorId": "134377547", "name": "Monica Consolandi"}, + {"authorId": "2106052826", "name": "Marta Fasan"}, {"authorId": "49393697", + "name": "F. Gennari"}, {"authorId": "1730394478", "name": "Federico C. La + Vattiata"}, {"authorId": "2063076216", "name": "Luca Rinaldi"}, {"authorId": + "3706983", "name": "Davide Roccaro"}, {"authorId": "2061566259", "name": "Clara + Zaccaria"}]}, {"paperId": "b390e8262dd6b744e26145fbf8502f5fdd069277", "externalIds": + {"DBLP": "conf/sigcse/FreitasW21", "DOI": "10.1145/3408877.3432530", "CorpusId": + 232126309}, "corpusId": 232126309, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b390e8262dd6b744e26145fbf8502f5fdd069277", "title": "I''m Going to Learn What?!?: Teaching Artificial Intelligence to Freshmen in an Introductory Computer Science Course", "abstract": "As artificial intelligence (AI) becomes more widely utilized, there is a need for non-computer @@ -17618,28 +20122,35 @@ interactions: to solve problems, and that they understand the importance and value of learning about AI in a general-education course.", "venue": "SIGCSE", "year": 2021, "referenceCount": 37, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Education", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2021-03-03", "journal": {"name": "Proceedings of the 52nd ACM Technical Symposium on Computer Science Education"}, "authors": [{"authorId": "1792691", "name": "Adrian A. de Freitas"}, {"authorId": "2383160", "name": "T. Weingart"}]}, {"paperId": "246d804bfedc24e91f1ace6cf165eb392800b3c0", "externalIds": {"MAG": "3136952027", "ArXiv": "2103.02395", "DOI": "10.1016/J.TECHFORE.2021.120723", - "CorpusId": 232105178}, "url": "https://www.semanticscholar.org/paper/246d804bfedc24e91f1ace6cf165eb392800b3c0", + "CorpusId": 232105178}, "corpusId": 232105178, "publicationVenue": {"id": + "5eb1fac4-44ea-4270-b31e-3fb4dd8247cb", "name": "Technological forecasting + & social change", "type": "journal", "alternate_names": ["Technological Forecasting + and Social Change", "Technol forecast soc chang", "Technol Forecast Soc Chang"], + "issn": "0040-1625", "url": "https://www.journals.elsevier.com/technological-forecasting-and-social-change/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00401625"]}, + "url": "https://www.semanticscholar.org/paper/246d804bfedc24e91f1ace6cf165eb392800b3c0", "title": "Automation-driven innovation management? Toward Innovation-Automation-Strategy cycle", "abstract": null, "venue": "Technological forecasting & social change", - "year": 2021, "referenceCount": 129, "citationCount": 7, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Economics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Economics", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-03", - "journal": {"name": "Technological Forecasting and Social Change"}, "authors": - [{"authorId": "50704376", "name": "P. Makowski"}, {"authorId": "2030582", - "name": "Y. Kajikawa"}]}, {"paperId": "0568ddcfe9ada74b1f4a502c1663ab84a6e0978c", - "externalIds": {"DBLP": "conf/icict2/MercioniH21", "DOI": "10.1109/ICICT52872.2021.00010", - "CorpusId": 236188435}, "url": "https://www.semanticscholar.org/paper/0568ddcfe9ada74b1f4a502c1663ab84a6e0978c", + "year": 2021, "referenceCount": 129, "citationCount": 8, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2103.02395", + "status": null}, "fieldsOfStudy": ["Computer Science", "Economics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-03-03", "journal": {"name": + "Technological Forecasting and Social Change"}, "authors": [{"authorId": "50704376", + "name": "P. Makowski"}, {"authorId": "2030582", "name": "Y. Kajikawa"}]}, + {"paperId": "0568ddcfe9ada74b1f4a502c1663ab84a6e0978c", "externalIds": {"DBLP": + "conf/icict2/MercioniH21", "DOI": "10.1109/ICICT52872.2021.00010", "CorpusId": + 236188435}, "corpusId": 236188435, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0568ddcfe9ada74b1f4a502c1663ab84a6e0978c", "title": "Soft Clipping Mish - A Novel Activation Function for Deep Learning", "abstract": "This study aims to introduce a novel activation function, called Soft Clipping Mish. In other words, it brings improvements in order to increase @@ -17656,16 +20167,21 @@ interactions: equal to 0.25. Our proposal was inspired by a recent activation function called Mish.", "venue": "2021 4th International Conference on Information and Computer Technologies (ICICT)", "year": 2021, "referenceCount": 25, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2021-03-01", - "journal": {"pages": "13-17", "name": "2021 4th International Conference on - Information and Computer Technologies (ICICT)"}, "authors": [{"authorId": - "51243076", "name": "Marina Adriana Mercioni"}, {"authorId": "1681573", "name": - "S. Holban"}]}, {"paperId": "24977653dc0868968b6f6523682070d8eebb57c8", "externalIds": - {"DBLP": "conf/vr/RebolGP21", "ArXiv": "2107.00712", "DOI": "10.1109/VR50410.2021.00082", - "CorpusId": 234478889}, "url": "https://www.semanticscholar.org/paper/24977653dc0868968b6f6523682070d8eebb57c8", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2021-03-01", "journal": {"pages": "13-17", "name": "2021 + 4th International Conference on Information and Computer Technologies (ICICT)"}, + "authors": [{"authorId": "51243076", "name": "Marina Adriana Mercioni"}, {"authorId": + "1681573", "name": "S. Holban"}]}, {"paperId": "24977653dc0868968b6f6523682070d8eebb57c8", + "externalIds": {"DBLP": "conf/vr/RebolGP21", "ArXiv": "2107.00712", "DOI": + "10.1109/VR50410.2021.00082", "CorpusId": 234478889}, "corpusId": 234478889, + "publicationVenue": {"id": "8b5a4b01-a494-4d68-b69a-e32afb408419", "name": + "IEEE Conference on Virtual Reality and 3D User Interfaces", "type": "conference", + "alternate_names": ["IEEE Conf Virtual Real 3D User Interface", "IEEE Virtual + Real Conf", "VR", "IEEE Virtual Reality Conference"], "url": "http://ieeevr.org/"}, + "url": "https://www.semanticscholar.org/paper/24977653dc0868968b6f6523682070d8eebb57c8", "title": " Passing a Non-verbal Turing Test: Evaluating Gesture Animations Generated from Speech", "abstract": "In real life, people communicate using both speech and non-verbal signals such as gestures, face expression or body @@ -17685,28 +20201,31 @@ interactions: the generated gestures on a virtual character. We find that users are not able to distinguish between the generated and the recorded gestures. Moreover, users are able to identify our synthesized gestures as related or not related - to a given utterance.", "venue": "2021 IEEE Virtual Reality and 3D User Interfaces - (VR)", "year": 2021, "referenceCount": 54, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "573-581", "name": "2021 IEEE - Virtual Reality and 3D User Interfaces (VR)"}, "authors": [{"authorId": "1850410410", - "name": "M. Rebol"}, {"authorId": "1680870", "name": "C. G\u00fctl"}, {"authorId": - "2408097", "name": "Krzysztof Pietroszek"}]}, {"paperId": "2782952aa78053f79c8bde3332466d438301d210", - "externalIds": {"MAG": "3135930035", "DOI": "10.1016/J.TRIP.2021.100331", - "CorpusId": 233832194}, "url": "https://www.semanticscholar.org/paper/2782952aa78053f79c8bde3332466d438301d210", + to a given utterance.", "venue": "IEEE Conference on Virtual Reality and 3D + User Interfaces", "year": 2021, "referenceCount": 54, "citationCount": 6, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/2107.00712", "status": null}, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "573-581", "name": "2021 IEEE Virtual Reality and 3D User Interfaces + (VR)"}, "authors": [{"authorId": "1850410410", "name": "M. Rebol"}, {"authorId": + "1680870", "name": "C. G\u00fctl"}, {"authorId": "2408097", "name": "Krzysztof + Pietroszek"}]}, {"paperId": "2782952aa78053f79c8bde3332466d438301d210", "externalIds": + {"MAG": "3135930035", "DOI": "10.1016/J.TRIP.2021.100331", "CorpusId": 233832194}, + "corpusId": 233832194, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2782952aa78053f79c8bde3332466d438301d210", "title": "The role of route familiarity in traffic participants\u2019 behaviour and transport psychology research: A systematic review", "abstract": null, "venue": "", "year": 2021, "referenceCount": 117, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-03-01", "journal": {"volume": "9", "pages": "100331", "name": ""}, "authors": - [{"authorId": "47717884", "name": "I. Harms"}, {"authorId": "30153336", "name": - "B. Burdett"}, {"authorId": "7513306", "name": "S. Charlton"}]}, {"paperId": - "36a9ba34659b430c3c6554ba6b515a7a124d1eb8", "externalIds": {"MAG": "3150662351", - "DOI": "10.25046/AJ060212", "CorpusId": 233468801}, "url": "https://www.semanticscholar.org/paper/36a9ba34659b430c3c6554ba6b515a7a124d1eb8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "2021-03-01", "journal": {"volume": "9", "pages": "100331", + "name": ""}, "authors": [{"authorId": "47717884", "name": "I. Harms"}, {"authorId": + "30153336", "name": "B. Burdett"}, {"authorId": "7513306", "name": "S. Charlton"}]}, + {"paperId": "36a9ba34659b430c3c6554ba6b515a7a124d1eb8", "externalIds": {"MAG": + "3150662351", "DOI": "10.25046/AJ060212", "CorpusId": 233468801}, "corpusId": + 233468801, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/36a9ba34659b430c3c6554ba6b515a7a124d1eb8", "title": "Designing and Applying a Moral Turing Test", "abstract": "A R T I C L E I N F O A B S T R A C T Article history: Received: 25 December, 2020 Accepted: 20 February, 2021 Online: 10 March, 2021 This study attempts to @@ -17724,15 +20243,16 @@ interactions: this experiment to future healthcare robots, this healthcare robot can be recognized as passing the moral Turing test.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-01", + true, "openAccessPdf": {"url": "https://astesj.com/?smd_process_download=1&download_id=26453", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-03-01", "journal": {"volume": "6", "pages": "93-98", "name": "Advances in Science, Technology and Engineering Systems Journal"}, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo Kim"}, {"authorId": "73772677", "name": "Sunyong Byun"}]}, {"paperId": "ab7deb9ff1d5f877a482d08d61afee0ffbb90171", "externalIds": {"MAG": - "3136158291", "DOI": "10.26267/UNIPI_DIONE/744", "CorpusId": 233364361}, "url": - "https://www.semanticscholar.org/paper/ab7deb9ff1d5f877a482d08d61afee0ffbb90171", + "3136158291", "DOI": "10.26267/UNIPI_DIONE/744", "CorpusId": 233364361}, "corpusId": + 233364361, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ab7deb9ff1d5f877a482d08d61afee0ffbb90171", "title": "Classifying melanoma images with ensembles of deep convolutional neural networks", "abstract": "Malignant melanoma is the deadliest form of skin cancer and is one of the most rapidly increasing cancers in the world. @@ -17753,15 +20273,20 @@ interactions: 2020 dataset and the best ensemble model achieved 0.9404 area under the ROC curve score on hold out test data.", "venue": "", "year": 2021, "referenceCount": 77, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2021-03-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "2088538574", "name": "\u039c\u03b5\u03bb\u03af\u03bd\u03b1 + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-03-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "2088538574", "name": "\u039c\u03b5\u03bb\u03af\u03bd\u03b1 \u03a4\u03b6\u03b9\u03bf\u03bc\u03ac\u03ba\u03b1"}, {"authorId": "2088535238", "name": "Melina Tziomaka"}]}, {"paperId": "ba784cde1ddf8f46a97d0c1e1aa1cbfb7d6c9fd1", "externalIds": {"MAG": "3135157978", "DOI": "10.1111/PHIN.12308", "CorpusId": - 233882077}, "url": "https://www.semanticscholar.org/paper/ba784cde1ddf8f46a97d0c1e1aa1cbfb7d6c9fd1", + 233882077}, "corpusId": 233882077, "publicationVenue": {"id": "1ed15c89-e6bd-4cab-ada4-266d13e0576a", + "name": "Philosophical Investigation", "type": "journal", "alternate_names": + ["Philosophical Investigations", "Philos Investig"], "issn": "1598-7213", + "alternate_issns": ["2251-7960", "0190-0536"], "url": "https://philosophy.tabrizu.ac.ir/", + "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-9205"]}, + "url": "https://www.semanticscholar.org/paper/ba784cde1ddf8f46a97d0c1e1aa1cbfb7d6c9fd1", "title": "No Picnic: Cavell on Rule\u2010Descriptions", "abstract": "In his \ufb01rst paper, \u2018Must We Mean What We Say?\u2019, Stanley Cavell defended the methods of ordinary language philosophy against various charges made by @@ -17774,14 +20299,19 @@ interactions: doing philosophy from the armchair. In so doing, I attempt to clarify \u2013 and adjust \u2013 Cavell\u2019s claim that statements about ordinary language are rule-descriptions that are neither analytic nor synthetic.", "venue": - "Philosophical Investigations", "year": 2021, "referenceCount": 144, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Philosophy"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-02-27", "journal": {"name": "Philosophical Investigations"}, "authors": - [{"authorId": "3479121", "name": "C. Sandis"}]}, {"paperId": "6af7e84404e3add7fc3ffcfa3c2270ee5ec543d9", - "externalIds": {"DBLP": "journals/symmetry/Jun21", "DOI": "10.3390/sym13030389", - "CorpusId": 233246956}, "url": "https://www.semanticscholar.org/paper/6af7e84404e3add7fc3ffcfa3c2270ee5ec543d9", + "Philosophical Investigation", "year": 2021, "referenceCount": 144, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://uhra.herts.ac.uk/bitstream/2299/24010/1/phin_12308.pdf", "status": + null}, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-02-27", "journal": {"name": + "Philosophical Investigations"}, "authors": [{"authorId": "3479121", "name": + "C. Sandis"}]}, {"paperId": "6af7e84404e3add7fc3ffcfa3c2270ee5ec543d9", "externalIds": + {"DBLP": "journals/symmetry/Jun21", "DOI": "10.3390/sym13030389", "CorpusId": + 233246956}, "corpusId": 233246956, "publicationVenue": {"id": "1620da87-4387-4b9a-9bf4-22fdf74d4dc3", + "name": "Symmetry", "type": "journal", "issn": "2073-8994", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-172134", + "alternate_urls": ["https://www.mdpi.com/journal/symmetry", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-172134"]}, + "url": "https://www.semanticscholar.org/paper/6af7e84404e3add7fc3ffcfa3c2270ee5ec543d9", "title": "Machines Imitating Human Thinking Using Bayesian Learning and Bootstrap", "abstract": "In the field of cognitive science, much research has been conducted on the diverse applications of artificial intelligence (AI). One important @@ -17808,23 +20338,26 @@ interactions: values from the last updated posterior to be used for thinking machines that imitate human thinking.", "venue": "Symmetry", "year": 2021, "referenceCount": 68, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-02-27", "journal": {"volume": "13", "pages": "389", "name": "Symmetry"}, - "authors": [{"authorId": "2052577018", "name": "Sunghae Jun"}]}, {"paperId": - "0f61f9cd3483eef14614a301557439f6008b9074", "externalIds": {"DBLP": "journals/ki/Butz21", - "DOI": "10.1007/s13218-021-00705-x", "CorpusId": 232433494}, "url": "https://www.semanticscholar.org/paper/0f61f9cd3483eef14614a301557439f6008b9074", + "openAccessPdf": {"url": "https://www.mdpi.com/2073-8994/13/3/389/pdf?version=1614829203", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-02-27", "journal": {"volume": "13", "pages": "389", + "name": "Symmetry"}, "authors": [{"authorId": "2052577018", "name": "Sunghae + Jun"}]}, {"paperId": "0f61f9cd3483eef14614a301557439f6008b9074", "externalIds": + {"DBLP": "journals/ki/Butz21", "DOI": "10.1007/s13218-021-00705-x", "CorpusId": + 232433494}, "corpusId": 232433494, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f61f9cd3483eef14614a301557439f6008b9074", "title": "Towards Strong AI", "abstract": null, "venue": "K\u00fcnstliche Intell.", "year": 2021, "referenceCount": 120, "citationCount": 10, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s13218-021-00705-x.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-26", "journal": {"volume": "35", "pages": "91-101", "name": "KI - K\u00fcnstliche Intelligenz"}, "authors": [{"authorId": "1732540", "name": "Martin Volker Butz"}]}, {"paperId": "79640acf4ec1b666a56facebd2db2bf9a2b29959", "externalIds": {"MAG": "3131579087", "DOI": "10.22158/JRPH.V4N1P52", "CorpusId": - 233931683}, "url": "https://www.semanticscholar.org/paper/79640acf4ec1b666a56facebd2db2bf9a2b29959", + 233931683}, "corpusId": 233931683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79640acf4ec1b666a56facebd2db2bf9a2b29959", "title": "The Fuzzy Completeness Theory", "abstract": "The Two Incompleteness Theorems of Kurt Friedrich G\u00f6del and the Impossibility Theorem of Kenneth Arrow claim that logic, the most reliable of human knowledge, is incomplete @@ -17885,14 +20418,20 @@ interactions: Methods of Reason correspond roughly to Culture Level Quotient (CLQ), which is a non-technical measure of a person, a people or a nation.", "venue": "Journal of Research in Philosophy and History", "year": 2021, "referenceCount": 19, - "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-02-24", "journal": {"name": - "Journal of Research in Philosophy and History"}, "authors": [{"authorId": - "32693480", "name": "H. Ching"}]}, {"paperId": "58031ca782dea438f65a9729f17d131d181a42b6", + "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.scholink.org/ojs/index.php/jrph/article/download/3725/3847", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-02-24", "journal": {"name": "Journal of Research in Philosophy and History"}, + "authors": [{"authorId": "32693480", "name": "H. Ching"}]}, {"paperId": "58031ca782dea438f65a9729f17d131d181a42b6", "externalIds": {"DBLP": "journals/imds/JiaCH21", "MAG": "3132663149", "DOI": - "10.1108/IMDS-11-2020-0664", "CorpusId": 233896342}, "url": "https://www.semanticscholar.org/paper/58031ca782dea438f65a9729f17d131d181a42b6", + "10.1108/IMDS-11-2020-0664", "CorpusId": 233896342}, "corpusId": 233896342, + "publicationVenue": {"id": "3235a2bb-118f-4abc-9046-80342279a154", "name": + "Industrial management & data systems", "type": "journal", "alternate_names": + ["Industrial Management and Data Systems", "Ind manag data syst", "Ind Manag + Data Syst"], "issn": "0263-5577", "url": "https://www.emerald.com/insight/publication/issn/0263-5577"}, + "url": "https://www.semanticscholar.org/paper/58031ca782dea438f65a9729f17d131d181a42b6", "title": "Assessing the hotel service robot interaction on tourists'' behaviour: the role of anthropomorphism", "abstract": "PurposeThe main purpose of this study is to investigate the impact of service robots on hotel visitors'' behaviour @@ -17909,17 +20448,18 @@ interactions: when researching hotel service robots, as well as practical suggestions for any hotel intending to use or currently using a service robot.", "venue": "Industrial management & data systems", "year": 2021, "referenceCount": 52, - "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Psychology", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2021-02-22", "journal": - {"volume": "121", "pages": "1457-1478", "name": "Ind. Manag. Data Syst."}, - "authors": [{"authorId": "2117240011", "name": "J. Jia"}, {"authorId": "1785137", - "name": "Namho Chung"}, {"authorId": "12480613", "name": "Jooyoung Hwang"}]}, - {"paperId": "718f3dd68aa63e43480234c1a07c09e87b4e014f", "externalIds": {"MAG": - "3129270107", "DOI": "10.3390/ELECTRONICS10040514", "CorpusId": 233953901}, - "url": "https://www.semanticscholar.org/paper/718f3dd68aa63e43480234c1a07c09e87b4e014f", + "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Psychology", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2021-02-22", "journal": {"volume": "121", "pages": "1457-1478", + "name": "Ind. Manag. Data Syst."}, "authors": [{"authorId": "2117240011", + "name": "J. Jia"}, {"authorId": "1785137", "name": "Namho Chung"}, {"authorId": + "12480613", "name": "Jooyoung Hwang"}]}, {"paperId": "718f3dd68aa63e43480234c1a07c09e87b4e014f", + "externalIds": {"MAG": "3129270107", "DOI": "10.3390/ELECTRONICS10040514", + "CorpusId": 233953901}, "corpusId": 233953901, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/718f3dd68aa63e43480234c1a07c09e87b4e014f", "title": "Relations between Electronics, Artificial Intelligence and Information Society through Information Society Rules", "abstract": "This paper presents relations between information society (IS), electronics and artificial intelligence @@ -17941,15 +20481,21 @@ interactions: software, AI is making progress that can sometimes reflect true human skills. Maybe it is time for AI to boost the progress of electronics in return.", "venue": "Electronics", "year": 2021, "referenceCount": 106, "citationCount": - 6, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-02-22", "journal": {"name": - "Electronics"}, "authors": [{"authorId": "10269507", "name": "M. Gams"}, {"authorId": - "40802688", "name": "Tine Kolenik"}]}, {"paperId": "56586eb758d7fabdbbd5ee4c5ed7e30c6d457d30", - "externalIds": {"DBLP": "journals/corr/abs-2102-10242", "ACL": "2021.emnlp-main.589", - "ArXiv": "2102.10242", "DOI": "10.18653/v1/2021.emnlp-main.589", "CorpusId": - 231986109}, "url": "https://www.semanticscholar.org/paper/56586eb758d7fabdbbd5ee4c5ed7e30c6d457d30", + 6, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.mdpi.com/2079-9292/10/4/514/pdf?version=1614251710", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-22", + "journal": {"name": "Electronics"}, "authors": [{"authorId": "10269507", "name": + "M. Gams"}, {"authorId": "40802688", "name": "Tine Kolenik"}]}, {"paperId": + "56586eb758d7fabdbbd5ee4c5ed7e30c6d457d30", "externalIds": {"DBLP": "journals/corr/abs-2102-10242", + "ACL": "2021.emnlp-main.589", "ArXiv": "2102.10242", "DOI": "10.18653/v1/2021.emnlp-main.589", + "CorpusId": 231986109}, "corpusId": 231986109, "publicationVenue": {"id": + "41bf9ed3-85b3-4c90-b015-150e31690253", "name": "Conference on Empirical Methods + in Natural Language Processing", "type": "conference", "alternate_names": + ["Empir Method Nat Lang Process", "Empirical Methods in Natural Language Processing", + "Conf Empir Method Nat Lang Process", "EMNLP"], "url": "https://www.aclweb.org/portal/emnlp"}, + "url": "https://www.semanticscholar.org/paper/56586eb758d7fabdbbd5ee4c5ed7e30c6d457d30", "title": "Towards Automatic Evaluation of Dialog Systems: A Model-Free Off-Policy Evaluation Approach", "abstract": "Reliable automatic evaluation of dialogue systems under an interactive environment has long been overdue. An ideal environment @@ -17971,15 +20517,21 @@ interactions: in terms of correlation with human evaluation scores.", "venue": "Conference on Empirical Methods in Natural Language Processing", "year": 2021, "referenceCount": 86, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2021-02-20", "journal": {"pages": "7419-7451"}, "authors": [{"authorId": - "5795999", "name": "Haoming Jiang"}, {"authorId": "144445937", "name": "Bo - Dai"}, {"authorId": "46235335", "name": "Mengjiao Yang"}, {"authorId": "2149192597", - "name": "Wei Wei"}, {"authorId": "36345161", "name": "T. Zhao"}]}, {"paperId": - "4c272d7fbfb744261aafe9a51806e0dbebcde80c", "externalIds": {"DBLP": "conf/iseeie/RoshdyKKSBEBN21", - "DOI": "10.1145/3459104.3459154", "CorpusId": 236145620}, "url": "https://www.semanticscholar.org/paper/4c272d7fbfb744261aafe9a51806e0dbebcde80c", + "openAccessPdf": {"url": "https://aclanthology.org/2021.emnlp-main.589.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2021-02-20", "journal": {"pages": "7419-7451"}, + "authors": [{"authorId": "5795999", "name": "Haoming Jiang"}, {"authorId": + "144445937", "name": "Bo Dai"}, {"authorId": "46235335", "name": "Mengjiao + Yang"}, {"authorId": "2149192597", "name": "Wei Wei"}, {"authorId": "36345161", + "name": "T. Zhao"}]}, {"paperId": "4c272d7fbfb744261aafe9a51806e0dbebcde80c", + "externalIds": {"DBLP": "conf/iseeie/RoshdyKKSBEBN21", "DOI": "10.1145/3459104.3459154", + "CorpusId": 236145620}, "corpusId": 236145620, "publicationVenue": {"id": + "4370a5fb-85bb-4d8b-87da-830e021182dc", "name": "International Symposium on + Electrical, Electronics and Information Engineering", "type": "conference", + "alternate_names": ["ISEEIE", "Int Symp Electr Electron Inf Eng"]}, "url": + "https://www.semanticscholar.org/paper/4c272d7fbfb744261aafe9a51806e0dbebcde80c", "title": "Machine Empathy: Digitizing Human Emotions", "abstract": "The primary objective of this work is to emulate machine empathy through digitizing human emotions. A simple proofof-concept experiment is conducted, where a brain-computer @@ -17997,18 +20549,19 @@ interactions: targeted in this study.", "venue": "International Symposium on Electrical, Electronics and Information Engineering", "year": 2021, "referenceCount": 21, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": - "2021-02-19", "journal": {"name": "2021 International Symposium on Electrical, - Electronics and Information Engineering"}, "authors": [{"authorId": "46909195", - "name": "A. Roshdy"}, {"authorId": "2488767", "name": "S. A. Kork"}, {"authorId": - "8908772", "name": "A. Karar"}, {"authorId": "32698580", "name": "A. Sabi"}, - {"authorId": "2921535", "name": "Z. A. Barakeh"}, {"authorId": "2120200055", - "name": "Fahmi ElSayed"}, {"authorId": "1892267", "name": "T. Beyrouthy"}, - {"authorId": "1399329283", "name": "A. Na\u00eft-Ali"}]}, {"paperId": "f0e103b4104a89826b648fce61a082e71de6be1d", - "externalIds": {"MAG": "3153638464", "DOI": "10.1109/ICAECT49130.2021.9392456", - "CorpusId": 234999934}, "url": "https://www.semanticscholar.org/paper/f0e103b4104a89826b648fce61a082e71de6be1d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Book"], "publicationDate": "2021-02-19", "journal": {"name": "2021 International + Symposium on Electrical, Electronics and Information Engineering"}, "authors": + [{"authorId": "46909195", "name": "A. Roshdy"}, {"authorId": "2488767", "name": + "S. A. Kork"}, {"authorId": "8908772", "name": "A. Karar"}, {"authorId": "32698580", + "name": "A. Sabi"}, {"authorId": "2921535", "name": "Z. A. Barakeh"}, {"authorId": + "2120200055", "name": "Fahmi ElSayed"}, {"authorId": "1892267", "name": "T. + Beyrouthy"}, {"authorId": "1399329283", "name": "A. Na\u00eft-Ali"}]}, {"paperId": + "f0e103b4104a89826b648fce61a082e71de6be1d", "externalIds": {"MAG": "3153638464", + "DOI": "10.1109/ICAECT49130.2021.9392456", "CorpusId": 234999934}, "corpusId": + 234999934, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f0e103b4104a89826b648fce61a082e71de6be1d", "title": "Artificial Intelligence Based Approach to Validate the Authenticity of News", "abstract": "Misinformation isn\u2019t definitely new thing; it is way before the inception of social media. It is evolving since 14th century @@ -18025,27 +20578,29 @@ interactions: model and methodology to improve the result.", "venue": "2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)", "year": 2021, "referenceCount": 37, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Conference", "Review"], "publicationDate": "2021-02-19", - "journal": {"pages": "1-6", "name": "2021 International Conference on Advances - in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)"}, - "authors": [{"authorId": "71010488", "name": "Roshan R. Karwa"}, {"authorId": - "2116011521", "name": "Sunil R. Gupta"}]}, {"paperId": "d384476f7f15b53c28119fa6507e9dc62b20b925", - "externalIds": {"MAG": "3129472090", "DOI": "10.1063/5.0043300", "CorpusId": - 233922781}, "url": "https://www.semanticscholar.org/paper/d384476f7f15b53c28119fa6507e9dc62b20b925", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Conference", "Review"], + "publicationDate": "2021-02-19", "journal": {"pages": "1-6", "name": "2021 + International Conference on Advances in Electrical, Computing, Communication + and Sustainable Technologies (ICAECT)"}, "authors": [{"authorId": "71010488", + "name": "Roshan R. Karwa"}, {"authorId": "2116011521", "name": "Sunil R. Gupta"}]}, + {"paperId": "d384476f7f15b53c28119fa6507e9dc62b20b925", "externalIds": {"MAG": + "3129472090", "DOI": "10.1063/5.0043300", "CorpusId": 233922781}, "corpusId": + 233922781, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d384476f7f15b53c28119fa6507e9dc62b20b925", "title": "Machine learning for materials design and discovery", "abstract": - null, "venue": "", "year": 2021, "referenceCount": 51, "citationCount": 18, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "2021-02-18", "journal": - {"volume": "129", "pages": "070401", "name": "Journal of Applied Physics"}, - "authors": [{"authorId": "32008403", "name": "R. Vasudevan"}, {"authorId": + null, "venue": "", "year": 2021, "referenceCount": 51, "citationCount": 19, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://aip.scitation.org/doi/pdf/10.1063/5.0043300", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-18", + "journal": {"volume": "129", "pages": "070401", "name": "Journal of Applied + Physics"}, "authors": [{"authorId": "32008403", "name": "R. Vasudevan"}, {"authorId": "49542803", "name": "G. Pilania"}, {"authorId": "40454011", "name": "P. Balachandran"}]}, {"paperId": "2b8440a784b141a0ec4b7971ee41b4bc3eec10dc", "externalIds": {"MAG": "3129630401", "DOI": "10.1080/03080188.2020.1831227", "CorpusId": 233893848}, - "url": "https://www.semanticscholar.org/paper/2b8440a784b141a0ec4b7971ee41b4bc3eec10dc", + "corpusId": 233893848, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2b8440a784b141a0ec4b7971ee41b4bc3eec10dc", "title": "As perceived, not as known: digital enquiry and the art of intelligence", "abstract": "\u1f10\u1f70\u03bd \u03bc\u1f74 \u1f14\u03bb\u03c0\u03b7\u03c4\u03b1\u03b9 \u1f00\u03bd\u03ad\u03bb\u03c0\u03b9\u03c3\u03c4\u03bf\u03bd \u03bf\u1f50\u03ba @@ -18055,21 +20610,23 @@ interactions: hard to be sought out and difficult\u2019) \u2003Heraclitus (DK 1...", "venue": "Interdisciplinary Science Reviews", "year": 2021, "referenceCount": 501, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-02-17", "journal": {"volume": - "46", "pages": "325 - 362", "name": "Interdisciplinary Science Reviews"}, - "authors": [{"authorId": "145918407", "name": "W. McCarty"}]}, {"paperId": - "c76cc10cd93bb46b203b31c9d9fc44cbd268829f", "externalIds": {"MAG": "3137670579", - "CorpusId": 238287691}, "url": "https://www.semanticscholar.org/paper/c76cc10cd93bb46b203b31c9d9fc44cbd268829f", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-02-17", "journal": {"volume": "46", "pages": "325 - 362", "name": "Interdisciplinary + Science Reviews"}, "authors": [{"authorId": "145918407", "name": "W. McCarty"}]}, + {"paperId": "c76cc10cd93bb46b203b31c9d9fc44cbd268829f", "externalIds": {"MAG": + "3137670579", "CorpusId": 238287691}, "corpusId": 238287691, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c76cc10cd93bb46b203b31c9d9fc44cbd268829f", "title": "Del clich\u00e9 de la revoluci\u00f3n en inteligencia artificial a la incertidumbre de la revoluci\u00f3n social", "abstract": null, "venue": "", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}], "publicationTypes": null, - "publicationDate": "2021-02-17", "journal": {"volume": "19", "name": ""}, - "authors": [{"authorId": "40192915", "name": "G. Torres"}]}, {"paperId": "5e83d1f1a3fabbb4cc3936660dcc3192edf96f0e", - "externalIds": {"DBLP": "journals/corr/abs-2102-08933", "ArXiv": "2102.08933", - "CorpusId": 231942470}, "url": "https://www.semanticscholar.org/paper/5e83d1f1a3fabbb4cc3936660dcc3192edf96f0e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}], "publicationTypes": + null, "publicationDate": "2021-02-17", "journal": {"volume": "19", "name": + ""}, "authors": [{"authorId": "40192915", "name": "G. Torres"}]}, {"paperId": + "5e83d1f1a3fabbb4cc3936660dcc3192edf96f0e", "externalIds": {"DBLP": "journals/corr/abs-2102-08933", + "ArXiv": "2102.08933", "CorpusId": 231942470}, "corpusId": 231942470, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5e83d1f1a3fabbb4cc3936660dcc3192edf96f0e", "title": "An Objective Laboratory Protocol for Evaluating Cognition of Non-Human Systems Against Human Cognition", "abstract": "In this paper I describe and reduce to practice an objective protocol for evaluating the cognitive capabilities @@ -18086,22 +20643,26 @@ interactions: extent a particular system falls short of human cognition, which can help to drive further progress or precautions.", "venue": "ArXiv", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-17", "journal": {"volume": "abs/2102.08933", "name": "ArXiv"}, "authors": [{"authorId": "2643853", "name": "David J. Jilk"}]}, {"paperId": "6281b3a356ced0951b5695d69decd78dd84ea547", "externalIds": {"DOI": "10.1007/s00146-021-01147-7", "CorpusId": 253689299}, + "corpusId": 253689299, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", + "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/6281b3a356ced0951b5695d69decd78dd84ea547", "title": "Endowing Artificial Intelligence with legal subjectivity", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 38, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-02-16", "journal": {"volume": - "37", "pages": "205 - 213", "name": "AI & SOCIETY"}, "authors": [{"authorId": - "2089470251", "name": "Sylwia Wojtczak"}]}, {"paperId": "eedba50e37d23343e7b314d057d9061ec9220b68", - "externalIds": {"MAG": "3163420331", "DOI": "10.2139/SSRN.3787103", "CorpusId": - 236658996}, "url": "https://www.semanticscholar.org/paper/eedba50e37d23343e7b314d057d9061ec9220b68", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007/s00146-021-01147-7.pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-16", + "journal": {"volume": "37", "pages": "205 - 213", "name": "AI & SOCIETY"}, + "authors": [{"authorId": "2089470251", "name": "Sylwia Wojtczak"}]}, {"paperId": + "eedba50e37d23343e7b314d057d9061ec9220b68", "externalIds": {"MAG": "3163420331", + "DOI": "10.2139/SSRN.3787103", "CorpusId": 236658996}, "corpusId": 236658996, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eedba50e37d23343e7b314d057d9061ec9220b68", "title": "Freedom of Expression and Human Dignity in the Age of Artificial Intelligence.", "abstract": "[enter Abstract Body]Cambridge Analytica exposes possible gaps in legal protection as it relates to certain human rights and @@ -18111,13 +20672,18 @@ interactions: applied to technology and private parties like Facebook or Cambridge Analytica holding such private parties accountable for violations of Human Rights.", "venue": "", "year": 2021, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": - [{"category": "Political Science", "source": "external"}, {"category": "Law", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-16", - "journal": {"volume": "", "name": "Social Science Research Network"}, "authors": - [{"authorId": "2122014282", "name": "Jasbir Khalsa"}]}, {"paperId": "a2295586ab9ef5bf44f7041125cdd82407f542fe", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political + Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": + "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-02-16", "journal": {"volume": "", "name": "Social + Science Research Network"}, "authors": [{"authorId": "2122014282", "name": + "Jasbir Khalsa"}]}, {"paperId": "a2295586ab9ef5bf44f7041125cdd82407f542fe", "externalIds": {"MAG": "3132570160", "DOI": "10.1177/0276237421994697", "CorpusId": - 233971012}, "url": "https://www.semanticscholar.org/paper/a2295586ab9ef5bf44f7041125cdd82407f542fe", + 233971012}, "corpusId": 233971012, "publicationVenue": {"id": "6f993889-7bfa-40c4-9c00-8a9a964e11bf", + "name": "Empirical Studies of the Arts", "type": "journal", "alternate_names": + ["Empirical Studies of The Arts", "Empir Stud Art"], "issn": "0276-2374", + "url": "http://www.metapress.com/content/1541-4493/", "alternate_urls": ["https://journals.sagepub.com/loi/art"]}, + "url": "https://www.semanticscholar.org/paper/a2295586ab9ef5bf44f7041125cdd82407f542fe", "title": "The Role of AI Attribution Knowledge in the Evaluation of Artwork", "abstract": "Artwork is increasingly being created by machines through algorithms with little or no input from humans. Yet, very little is known about people\u2019s @@ -18133,14 +20699,17 @@ interactions: type of artwork (representational vs. abstract) on purchase intentions and evaluations of artworks.", "venue": "Empirical Studies of the Arts", "year": 2021, "referenceCount": 50, "citationCount": 10, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-02-16", "journal": {"volume": "40", "pages": "125 - 142", "name": "Empirical - Studies of the Arts"}, "authors": [{"authorId": "2346038", "name": "Harsha - Gangadharbatla"}]}, {"paperId": "29729a76c3bfe3cc80730e3120f64336dbcd75ef", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-02-16", "journal": {"volume": "40", "pages": + "125 - 142", "name": "Empirical Studies of the Arts"}, "authors": [{"authorId": + "2346038", "name": "Harsha Gangadharbatla"}]}, {"paperId": "29729a76c3bfe3cc80730e3120f64336dbcd75ef", "externalIds": {"PubMedCentral": "8150389", "DOI": "10.2196/27868", "CorpusId": - 234361969, "PubMed": "33973854"}, "url": "https://www.semanticscholar.org/paper/29729a76c3bfe3cc80730e3120f64336dbcd75ef", + 234361969, "PubMed": "33973854"}, "corpusId": 234361969, "publicationVenue": + {"id": "6c3e705d-29b5-462c-9a3a-6c7877b74a18", "name": "JMIR Formative Research", + "alternate_names": ["JMIR Form Res"], "issn": "2561-326X", "url": "https://formative.jmir.org/"}, + "url": "https://www.semanticscholar.org/paper/29729a76c3bfe3cc80730e3120f64336dbcd75ef", "title": "Evidence of Human-Level Bonds Established With a Digital Conversational Agent: Cross-sectional, Retrospective Observational Study", "abstract": "Background There are far more patients in mental distress than there is time available @@ -18177,17 +20746,18 @@ interactions: of clinical outcomes, since boosting the engagement and efficacy of digital therapeutics could have major public health benefits.", "venue": "JMIR Formative Research", "year": 2021, "referenceCount": 25, "citationCount": 23, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2021-02-10", - "journal": {"volume": "5", "name": "JMIR Formative Research"}, "authors": - [{"authorId": "6120000", "name": "Alison M Darcy"}, {"authorId": "2091471950", - "name": "Jade Daniels"}, {"authorId": "2077632364", "name": "D. Salinger"}, - {"authorId": "49523427", "name": "P. Wicks"}, {"authorId": "9859633", "name": - "A. Robinson"}]}, {"paperId": "a876b2624dca10735519debf63eb2d5824fb8b20", + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://formative.jmir.org/2021/5/e27868/PDF", + "status": null}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, + {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-02-10", "journal": {"volume": "5", "name": + "JMIR Formative Research"}, "authors": [{"authorId": "6120000", "name": "Alison + M Darcy"}, {"authorId": "2091471950", "name": "Jade Daniels"}, {"authorId": + "2077632364", "name": "D. Salinger"}, {"authorId": "49523427", "name": "P. + Wicks"}, {"authorId": "9859633", "name": "A. Robinson"}]}, {"paperId": "a876b2624dca10735519debf63eb2d5824fb8b20", "externalIds": {"DBLP": "journals/dint/FengZZCCHL21", "DOI": "10.1162/dint_a_00090", - "CorpusId": 231875722}, "url": "https://www.semanticscholar.org/paper/a876b2624dca10735519debf63eb2d5824fb8b20", + "CorpusId": 231875722}, "corpusId": 231875722, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a876b2624dca10735519debf63eb2d5824fb8b20", "title": "An Evaluation of Chinese Human-Computer Dialogue Technology", "abstract": "Abstract There is a growing interest in developing human-computer dialogue systems which is an important branch in the field of artificial intelligence @@ -18201,7 +20771,8 @@ interactions: and data sets in detail. Meanwhile, we will also analyze the evaluation results and the existing problems in the evaluation.", "venue": "Data Intelligence", "year": 2021, "referenceCount": 24, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/dint/article-pdf/3/2/274/1963473/dint_a_00090.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-10", "journal": {"volume": "3", "pages": "274-286", @@ -18212,41 +20783,51 @@ interactions: "name": "Minlie Huang"}, {"authorId": "2111818678", "name": "Linlin Li"}]}, {"paperId": "8a1f58e914f5c9f0b0a9b8abff58ed269162b95a", "externalIds": {"MAG": "3126999983", "DOI": "10.1057/S41288-020-00201-7", "CorpusId": 233933887}, - "url": "https://www.semanticscholar.org/paper/8a1f58e914f5c9f0b0a9b8abff58ed269162b95a", + "corpusId": 233933887, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8a1f58e914f5c9f0b0a9b8abff58ed269162b95a", "title": "The impact of artificial intelligence along the insurance value chain and on the insurability of risks", "abstract": null, "venue": "The Geneva Papers on Risk and Insurance - Issues and Practice", "year": 2021, "referenceCount": 116, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-02-08", "journal": {"name": - "The Geneva Papers on Risk and Insurance - Issues and Practice"}, "authors": - [{"authorId": "2907881", "name": "M. Eling"}, {"authorId": "2089356084", "name": - "Davide Nuessle"}, {"authorId": "2089000896", "name": "Julian Staubli"}]}, - {"paperId": "62177d2592ff563eaf4e965686286b52ad3712b3", "externalIds": {"DOI": - "10.1007/s11023-021-09555-w", "CorpusId": 240919945}, "url": "https://www.semanticscholar.org/paper/62177d2592ff563eaf4e965686286b52ad3712b3", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1057/s41288-020-00201-7.pdf", + "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-08", + "journal": {"name": "The Geneva Papers on Risk and Insurance - Issues and + Practice"}, "authors": [{"authorId": "2907881", "name": "M. Eling"}, {"authorId": + "2089356084", "name": "Davide Nuessle"}, {"authorId": "2089000896", "name": + "Julian Staubli"}]}, {"paperId": "62177d2592ff563eaf4e965686286b52ad3712b3", + "externalIds": {"DOI": "10.1007/s11023-021-09555-w", "CorpusId": 240919945}, + "corpusId": 240919945, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/62177d2592ff563eaf4e965686286b52ad3712b3", "title": "An Empathy Imitation Game: Empathy Turing Test for Care- and Chat-bots", "abstract": null, "venue": "Minds and Machines", "year": 2021, "referenceCount": 28, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-04", + "openAccessPdf": {"url": "https://philpapers.org/archive/HOWAEI-2.pdf", "status": + null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-04", "journal": {"volume": "31", "pages": "457 - 461", "name": "Minds and Machines"}, - "authors": [{"authorId": null, "name": "Jeremy Howick"}, {"authorId": "1751614630", + "authors": [{"authorId": "4970399", "name": "J. Howick"}, {"authorId": "1751614630", "name": "J. Morley"}, {"authorId": "2134633922", "name": "Luciano Floridi"}]}, {"paperId": "8c00360be1f3e499cbaab56e0b91a4eec571a187", "externalIds": {"DBLP": "journals/mima/HowickMF21", "DOI": "10.1007/s11023-021-09555-w", "CorpusId": - 231811286}, "url": "https://www.semanticscholar.org/paper/8c00360be1f3e499cbaab56e0b91a4eec571a187", + 231811286}, "corpusId": 231811286, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8c00360be1f3e499cbaab56e0b91a4eec571a187", "title": "An Empathy Imitation Game: Empathy Turing Test for Care- and Chat-bots", "abstract": null, "venue": "Minds Mach.", "year": 2021, "referenceCount": 33, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-04", "journal": - {"volume": "", "pages": "1-5", "name": "Minds and Machines"}, "authors": [{"authorId": - "4970399", "name": "J. Howick"}, {"authorId": "1751614630", "name": "J. Morley"}, - {"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "4f5c4c9dd017d75f47c8e6c06da90ce9c51dde9b", - "externalIds": {"ArXiv": "2102.02204", "MAG": "3127817633", "DBLP": "journals/corr/abs-2102-02204", - "DOI": "10.21203/RS.3.RS-220713/V1", "CorpusId": 231802239}, "url": "https://www.semanticscholar.org/paper/4f5c4c9dd017d75f47c8e6c06da90ce9c51dde9b", + "openAccessPdf": {"url": "https://philpapers.org/archive/HOWAEI-2.pdf", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Medicine", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-02-04", "journal": {"volume": "", "pages": "1-5", "name": "Minds and + Machines"}, "authors": [{"authorId": "4970399", "name": "J. Howick"}, {"authorId": + "1751614630", "name": "J. Morley"}, {"authorId": "1982425", "name": "L. Floridi"}]}, + {"paperId": "4f5c4c9dd017d75f47c8e6c06da90ce9c51dde9b", "externalIds": {"ArXiv": + "2102.02204", "MAG": "3127817633", "DBLP": "journals/corr/abs-2102-02204", + "DOI": "10.21203/RS.3.RS-220713/V1", "CorpusId": 231802239}, "corpusId": 231802239, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4f5c4c9dd017d75f47c8e6c06da90ce9c51dde9b", "title": "Parametrized Quantum Circuits of Synonymous Sentences in Quantum Natural Language Processing", "abstract": "\n In this paper we develop a compositional vector-based semantics of positive transitive sentences in quantum natural @@ -18257,42 +20838,54 @@ interactions: we use a bigraph method to rewrite DisCoCat diagram and turn into quantum circuit in the semantic side.", "venue": "ArXiv", "year": 2021, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.researchsquare.com/article/rs-220713/v1.pdf?c=1631871331000", + "status": null}, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": "abs/2102.02204", "name": "ArXiv"}, "authors": [{"authorId": "1421595746", "name": "Mina Abbas-zadeh"}, {"authorId": "144823300", "name": "S. S. Mousavi"}, {"authorId": "145478033", "name": "V. Salari"}]}, {"paperId": "e64b96a2edf26b3a930e0314a35f21be9f729657", "externalIds": {"DBLP": "journals/tib/KimVHW21", "PubMedCentral": "8629804", "MAG": "3128371085", "DOI": "10.1007/s12064-020-00331-5", "CorpusId": 231778099, - "PubMed": "33532895"}, "url": "https://www.semanticscholar.org/paper/e64b96a2edf26b3a930e0314a35f21be9f729657", + "PubMed": "33532895"}, "corpusId": 231778099, "publicationVenue": {"id": "d367c832-3225-4f7e-8683-0b14bd056319", + "name": "Theory in biosciences", "type": "journal", "alternate_names": ["Theory + in Biosciences", "Theory biosci", "Theory Biosci"], "issn": "1431-7613", "url": + "https://link.springer.com/journal/12064"}, "url": "https://www.semanticscholar.org/paper/e64b96a2edf26b3a930e0314a35f21be9f729657", "title": "Informational architecture across non-living and living collectives", "abstract": null, "venue": "Theory in biosciences", "year": 2021, "referenceCount": 148, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2021-02-02", "journal": - {"volume": "140", "pages": "325 - 341", "name": "Theory in Biosciences"}, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12064-020-00331-5.pdf", + "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-02-02", + "journal": {"volume": "140", "pages": "325 - 341", "name": "Theory in Biosciences"}, "authors": [{"authorId": "2109871971", "name": "Hyunju Kim"}, {"authorId": "48404261", "name": "Gabriele Valentini"}, {"authorId": "69873213", "name": "J. Hanson"}, {"authorId": "1946477", "name": "S. Walker"}]}, {"paperId": "7896c2c5e0a1734b4c69c73aeccca136f09ea433", "externalIds": {"DBLP": "journals/cogcom/GardiniFCD21", - "DOI": "10.1007/s12559-021-09823-y", "CorpusId": 232163932}, "url": "https://www.semanticscholar.org/paper/7896c2c5e0a1734b4c69c73aeccca136f09ea433", + "DOI": "10.1007/s12559-021-09823-y", "CorpusId": 232163932}, "corpusId": 232163932, + "publicationVenue": {"id": "d1e87771-68a0-40db-a4d3-6216158cc596", "name": + "Cognitive Computation", "type": "journal", "alternate_names": ["Cogn Comput"], + "issn": "1866-9956", "url": "https://www.springer.com/biomed/neuroscience/journal/12559", + "alternate_urls": ["https://link.springer.com/journal/12559", "http://www.springer.com/biomed/neuroscience/journal/12559"]}, + "url": "https://www.semanticscholar.org/paper/7896c2c5e0a1734b4c69c73aeccca136f09ea433", "title": "Using Principal Paths to Walk Through Music and Visual Art Style Spaces Induced by Convolutional Neural Networks", "abstract": null, "venue": "Cognitive Computation", "year": 2021, "referenceCount": 42, "citationCount": - 15, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-02-01", "journal": - {"volume": "13", "pages": "570-582", "name": "Cognitive Computation"}, "authors": - [{"authorId": "1712254010", "name": "E. Gardini"}, {"authorId": "37516550", - "name": "M. Ferrarotti"}, {"authorId": "144621661", "name": "A. Cavalli"}, - {"authorId": "2674856", "name": "S. Decherchi"}]}, {"paperId": "03c067dedc49d6119a31a70b36e2885e38d786ae", - "externalIds": {"MAG": "3134339096", "DOI": "10.1051/ODFEN/2021006", "CorpusId": - 234083192}, "url": "https://www.semanticscholar.org/paper/03c067dedc49d6119a31a70b36e2885e38d786ae", + 15, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007/s12559-021-09823-y.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-02-01", "journal": {"volume": "13", "pages": "570-582", + "name": "Cognitive Computation"}, "authors": [{"authorId": "1712254010", "name": + "E. Gardini"}, {"authorId": "37516550", "name": "M. Ferrarotti"}, {"authorId": + "144621661", "name": "A. Cavalli"}, {"authorId": "2674856", "name": "S. Decherchi"}]}, + {"paperId": "03c067dedc49d6119a31a70b36e2885e38d786ae", "externalIds": {"MAG": + "3134339096", "DOI": "10.1051/ODFEN/2021006", "CorpusId": 234083192}, "corpusId": + 234083192, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/03c067dedc49d6119a31a70b36e2885e38d786ae", "title": "Le Deep Learning en orthodontie : vers une relation patient-praticien repens\u00e9e\u2026", "abstract": "Depuis une dizaine d\u2019ann\u00e9e, l\u2019Intelligence artificielle (IA) transforme progressivement les pratiques, la m\u00e9decine @@ -18311,15 +20904,16 @@ interactions: r\u00e9sultats obtenus permet alors d\u2019envisager la future relation praticien-machine dans le cadre d\u2019une approche personnalis\u00e9e et repens\u00e9e autour du patient.", "venue": "", "year": 2021, "referenceCount": 43, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": "2021-02-01", - "journal": {"volume": "55", "pages": "73-87", "name": ""}, "authors": [{"authorId": - "14608292", "name": "J. Foucart"}, {"authorId": "2090077663", "name": "Luc - Gillibert"}, {"authorId": "1418220708", "name": "A. Chavanne"}, {"authorId": - "91323741", "name": "X. Ripoche"}]}, {"paperId": "aa0a20b7278ab7c36dccad4be9dd557a3c2cfa14", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "2021-02-01", "journal": {"volume": "55", "pages": "73-87", "name": ""}, "authors": + [{"authorId": "14608292", "name": "J. Foucart"}, {"authorId": "2090077663", + "name": "Luc Gillibert"}, {"authorId": "1418220708", "name": "A. Chavanne"}, + {"authorId": "91323741", "name": "X. Ripoche"}]}, {"paperId": "aa0a20b7278ab7c36dccad4be9dd557a3c2cfa14", "externalIds": {"MAG": "3135497746", "DOI": "10.1088/1742-6596/1828/1/012080", - "CorpusId": 234012648}, "url": "https://www.semanticscholar.org/paper/aa0a20b7278ab7c36dccad4be9dd557a3c2cfa14", + "CorpusId": 234012648}, "corpusId": 234012648, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/aa0a20b7278ab7c36dccad4be9dd557a3c2cfa14", "title": "An Intelligent Mobile Application Testing Experience Report", "abstract": "Artificial intelligence applications provide tremendous opportunities to improve human life and drive innovation. AI systems/applications which operate @@ -18336,54 +20930,63 @@ interactions: with conventional testing methods, but AI software testing strategy proposed based on classification framework and 3D decision tables has a good effect.", "venue": "", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-01", - "journal": {"volume": "1828", "name": "Journal of Physics: Conference Series"}, - "authors": [{"authorId": "2055333830", "name": "Chi Tran"}, {"authorId": "4339065", - "name": "M. G. Valmiki"}, {"authorId": "2115723448", "name": "Guoyan Xu"}, - {"authorId": "2154364225", "name": "J. Gao"}]}, {"paperId": "42f53e74468113004420a3cb36f2e10aef8ef68f", - "externalIds": {"PubMedCentral": "7902546", "DOI": "10.1016/j.heliyon.2021.e06268", - "CorpusId": 232099416, "PubMed": "33665435"}, "url": "https://www.semanticscholar.org/paper/42f53e74468113004420a3cb36f2e10aef8ef68f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2021-02-01", "journal": {"volume": "1828", "name": "Journal + of Physics: Conference Series"}, "authors": [{"authorId": "2055333830", "name": + "Chi Tran"}, {"authorId": "4339065", "name": "M. G. Valmiki"}, {"authorId": + "2115723448", "name": "Guoyan Xu"}, {"authorId": "2154364225", "name": "J. + Gao"}]}, {"paperId": "42f53e74468113004420a3cb36f2e10aef8ef68f", "externalIds": + {"PubMedCentral": "7902546", "DOI": "10.1016/j.heliyon.2021.e06268", "CorpusId": + 232099416, "PubMed": "33665435"}, "corpusId": 232099416, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/42f53e74468113004420a3cb36f2e10aef8ef68f", "title": "Towards an interdisciplinary framework about intelligence", "abstract": null, "venue": "Heliyon", "year": 2021, "referenceCount": 81, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-02-01", "journal": {"volume": "7", "name": "Heliyon"}, - "authors": [{"authorId": "1403471268", "name": "Nicolas Palanca-Castan"}, - {"authorId": "2051833010", "name": "Beatriz S\u00e1nchez Tajadura"}, {"authorId": - "5191753", "name": "R. Cofr\u00e9"}]}, {"paperId": "64b0959be525b0303c506cbece1115461389595a", - "externalIds": {"MAG": "3112217617", "DOI": "10.1016/j.pnucene.2020.103604", - "CorpusId": 230572557}, "url": "https://www.semanticscholar.org/paper/64b0959be525b0303c506cbece1115461389595a", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://www.cell.com/article/S240584402100373X/pdf", "status": null}, "fieldsOfStudy": + ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-02-01", "journal": {"volume": + "7", "name": "Heliyon"}, "authors": [{"authorId": "1403471268", "name": "Nicolas + Palanca-Castan"}, {"authorId": "2051833010", "name": "Beatriz S\u00e1nchez + Tajadura"}, {"authorId": "5191753", "name": "R. Cofr\u00e9"}]}, {"paperId": + "64b0959be525b0303c506cbece1115461389595a", "externalIds": {"MAG": "3112217617", + "DOI": "10.1016/j.pnucene.2020.103604", "CorpusId": 230572557}, "corpusId": + 230572557, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/64b0959be525b0303c506cbece1115461389595a", "title": "Comparison of the error-integral performance indexes in a GA-tuned PID controlling system of a PWR-type nuclear reactor point-kinetics model", "abstract": null, "venue": "", "year": 2021, "referenceCount": 25, "citationCount": - 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2021-02-01", "journal": {"volume": "132", "pages": - "103604", "name": "Progress in Nuclear Energy"}, "authors": [{"authorId": - "102942413", "name": "Seyed Mohammad Hossein Mousakazemi"}]}, {"paperId": - "3211a935d7d8eb6920798ca26b8642e52e4cde70", "externalIds": {"MAG": "3094694913", - "DOI": "10.1016/j.ucl.2020.09.004", "CorpusId": 227101199, "PubMed": "33218590"}, - "url": "https://www.semanticscholar.org/paper/3211a935d7d8eb6920798ca26b8642e52e4cde70", + 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-02-01", "journal": {"volume": + "132", "pages": "103604", "name": "Progress in Nuclear Energy"}, "authors": + [{"authorId": "102942413", "name": "Seyed Mohammad Hossein Mousakazemi"}]}, + {"paperId": "3211a935d7d8eb6920798ca26b8642e52e4cde70", "externalIds": {"MAG": + "3094694913", "DOI": "10.1016/j.ucl.2020.09.004", "CorpusId": 227101199, "PubMed": + "33218590"}, "corpusId": 227101199, "publicationVenue": {"id": "9ebbcf97-e720-40d1-bca3-dcf3e1784f84", + "name": "Urologic clinics of North America", "type": "journal", "alternate_names": + ["Urol Clin n am", "Urol clin n am", "Urologic Clinics of North America"], + "issn": "0094-0143", "url": "https://www.journals.elsevier.com/urologic-clinics-of-north-america", + "alternate_urls": ["https://www.urologic.theclinics.com/current", "http://www.sciencedirect.com/science/journal/00940143", + "http://www.us.elsevierhealth.com/product.jsp?isbn=00940143"]}, "url": "https://www.semanticscholar.org/paper/3211a935d7d8eb6920798ca26b8642e52e4cde70", "title": "Current Trends in Artificial Intelligence Application for Endourology and Robotic Surgery.", "abstract": null, "venue": "Urologic clinics of North America", "year": 2021, "referenceCount": 53, "citationCount": 11, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-02-01", - "journal": {"volume": "48 1", "pages": "\n 151-160\n ", "name": - "The Urologic clinics of North America"}, "authors": [{"authorId": "145328951", - "name": "Timothy C. Chang"}, {"authorId": "12032135", "name": "Caleb J Seufert"}, - {"authorId": "1882587", "name": "O. Eminaga"}, {"authorId": "9940589", "name": - "E. Shkolyar"}, {"authorId": "14603178", "name": "Jim C Hu"}, {"authorId": - "4265282", "name": "J. Liao"}]}, {"paperId": "fffe8348918a81a78afe45b41f539804bcfaa02c", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Medicine", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2021-02-01", "journal": {"volume": "48 1", "pages": "\n 151-160\n ", + "name": "The Urologic clinics of North America"}, "authors": [{"authorId": + "145328951", "name": "Timothy C. Chang"}, {"authorId": "12032135", "name": + "Caleb J Seufert"}, {"authorId": "1882587", "name": "O. Eminaga"}, {"authorId": + "9940589", "name": "E. Shkolyar"}, {"authorId": "14603178", "name": "Jim C + Hu"}, {"authorId": "4265282", "name": "J. Liao"}]}, {"paperId": "fffe8348918a81a78afe45b41f539804bcfaa02c", "externalIds": {"MAG": "3127084837", "DOI": "10.37965/JAIT.2020.0065", "CorpusId": - 233251414}, "url": "https://www.semanticscholar.org/paper/fffe8348918a81a78afe45b41f539804bcfaa02c", + 233251414}, "corpusId": 233251414, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fffe8348918a81a78afe45b41f539804bcfaa02c", "title": "Technologies Supporting Artificial Intelligence and Robotics Application Development", "abstract": "Artificial intelligence (AI) and robotics have gone through three generations of development, from Turing test, logic theory @@ -18398,15 +21001,16 @@ interactions: on stacks of technologies and platforms. We present examples of such development environments created by both industry and academia. We also selected eight papers in the related areas to celebrate the foundation of this journal.", - "venue": "", "year": 2021, "referenceCount": 24, "citationCount": 9, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-01-31", "journal": {"volume": "1", "pages": "1-8", "name": ""}, "authors": - [{"authorId": "2109392777", "name": "Yinong Chen"}, {"authorId": "3434191", - "name": "G. Luca"}]}, {"paperId": "b22a5f250f334c2b4400fb71ab87ac671539a785", - "externalIds": {"MAG": "3127216649", "DOI": "10.14488/BJOPM.2021.010", "CorpusId": - 233441821}, "url": "https://www.semanticscholar.org/paper/b22a5f250f334c2b4400fb71ab87ac671539a785", + "venue": "", "year": 2021, "referenceCount": 24, "citationCount": 10, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.istp-press.com/jait/article/download/2/3", + "status": null}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-31", + "journal": {"volume": "1", "pages": "1-8", "name": ""}, "authors": [{"authorId": + "2109392777", "name": "Yinong Chen"}, {"authorId": "3434191", "name": "G. + Luca"}]}, {"paperId": "b22a5f250f334c2b4400fb71ab87ac671539a785", "externalIds": + {"MAG": "3127216649", "DOI": "10.14488/BJOPM.2021.010", "CorpusId": 233441821}, + "corpusId": 233441821, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b22a5f250f334c2b4400fb71ab87ac671539a785", "title": "Influence of artificial intelligence on public employment and its impact on politics: a systematic literature review", "abstract": "Goal: Public administration is constantly changing in response to new challenges, including @@ -18431,15 +21035,16 @@ interactions: to legislate and regulate key technological advances, which, in our opinion, has been done, but at a very slow pace.", "venue": "", "year": 2021, "referenceCount": 103, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-01-29", "journal": - {"volume": "18", "pages": "1-22", "name": "Brazilian journal of operations - & production management"}, "authors": [{"authorId": "1455925165", "name": - "Jo\u00e3o Reis"}, {"authorId": "144179439", "name": "Paula Esp\u00edrito + "openAccessPdf": {"url": "https://bjopm.emnuvens.com.br/bjopm/article/download/1114/962", + "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Political Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-29", + "journal": {"volume": "18", "pages": "1-22", "name": "Brazilian journal of + operations & production management"}, "authors": [{"authorId": "1455925165", + "name": "Jo\u00e3o Reis"}, {"authorId": "144179439", "name": "Paula Esp\u00edrito Santo"}, {"authorId": "3003920", "name": "N. Mel\u00e3o"}]}, {"paperId": "54b0c0a0025df2f94de6121ef4183ae8f88550c7", "externalIds": {"DOI": "10.1109/SAUPEC/RobMech/PRASA52254.2021.9377235", "CorpusId": - 232316166}, "url": "https://www.semanticscholar.org/paper/54b0c0a0025df2f94de6121ef4183ae8f88550c7", + 232316166}, "corpusId": 232316166, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/54b0c0a0025df2f94de6121ef4183ae8f88550c7", "title": "Algorithmic Music Composition Using Probabilistic Graphical Models and Artificial Neural Networks", "abstract": "Composing music algorithmically has been a goal long-pursued by many computer scientists. Various methods @@ -18456,15 +21061,16 @@ interactions: "venue": "2021 Southern African Universities Power Engineering Conference/Robotics and Mechatronics/Pattern Recognition Association of South Africa (SAUPEC/RobMech/PRASA)", "year": 2021, "referenceCount": 20, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "2021-01-27", "journal": {"pages": "1-4", "name": "2021 - Southern African Universities Power Engineering Conference/Robotics and Mechatronics/Pattern - Recognition Association of South Africa (SAUPEC/RobMech/PRASA)"}, "authors": - [{"authorId": "2057090856", "name": "Marc Marsden"}, {"authorId": "9347837", - "name": "Ritesh Ajoodha"}]}, {"paperId": "71db7410e6f96aae8bf3a95e5a938c3ac9fb193b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Conference"], "publicationDate": "2021-01-27", "journal": {"pages": "1-4", + "name": "2021 Southern African Universities Power Engineering Conference/Robotics + and Mechatronics/Pattern Recognition Association of South Africa (SAUPEC/RobMech/PRASA)"}, + "authors": [{"authorId": "2057090856", "name": "Marc Marsden"}, {"authorId": + "9347837", "name": "Ritesh Ajoodha"}]}, {"paperId": "71db7410e6f96aae8bf3a95e5a938c3ac9fb193b", "externalIds": {"DBLP": "journals/corr/abs-2101-11221", "ArXiv": "2101.11221", - "CorpusId": 231718610}, "url": "https://www.semanticscholar.org/paper/71db7410e6f96aae8bf3a95e5a938c3ac9fb193b", + "CorpusId": 231718610}, "corpusId": 231718610, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/71db7410e6f96aae8bf3a95e5a938c3ac9fb193b", "title": "Learning task-agnostic representation via toddler-inspired learning", "abstract": "One of the inherent limitations of current AI systems, stemming from the passive learning mechanisms (e.g., supervised learning), is that @@ -18480,27 +21086,37 @@ interactions: is noticeably better than autoencoder-based model (99.7%, 66.1%, 1.95%), and also comparable with those of supervised models (100%, 87.3%, 0.71%).", "venue": "ArXiv", "year": 2021, "referenceCount": 19, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-01-27", "journal": {"volume": "abs/2101.11221", "name": - "ArXiv"}, "authors": [{"authorId": "73758722", "name": "Kwanyoung Park"}, - {"authorId": "2109220128", "name": "Junseok Park"}, {"authorId": "2087142998", - "name": "Hyunseok Oh"}, {"authorId": "1692756", "name": "Byoung-Tak Zhang"}, - {"authorId": "2145418994", "name": "Youngki Lee"}]}, {"paperId": "cbad0923db89f23febcbd6192ff4149289ff2ad9", - "externalIds": {"DBLP": "journals/jbd/Adadi21", "DOI": "10.1186/s40537-021-00419-9", - "CorpusId": 231723319}, "url": "https://www.semanticscholar.org/paper/cbad0923db89f23febcbd6192ff4149289ff2ad9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-27", "journal": + {"volume": "abs/2101.11221", "name": "ArXiv"}, "authors": [{"authorId": "73758722", + "name": "Kwanyoung Park"}, {"authorId": "2109220128", "name": "Junseok Park"}, + {"authorId": "2087142998", "name": "Hyunseok Oh"}, {"authorId": "1692756", + "name": "Byoung-Tak Zhang"}, {"authorId": "2145418994", "name": "Youngki Lee"}]}, + {"paperId": "cbad0923db89f23febcbd6192ff4149289ff2ad9", "externalIds": {"DBLP": + "journals/jbd/Adadi21", "DOI": "10.1186/s40537-021-00419-9", "CorpusId": 231723319}, + "corpusId": 231723319, "publicationVenue": {"id": "d60da343-ab92-4310-b3d7-2c0860287a9d", + "name": "Journal of Big Data", "type": "journal", "alternate_names": ["J Big + Data", "Journal on Big Data"], "issn": "2196-1115", "alternate_issns": ["2579-0048"], + "url": "http://www.journalofbigdata.com/", "alternate_urls": ["http://www.springer.com/computer/database+management+&+information+retrieval/journal/40537", + "http://techscience.com/JBD/index.html", "https://journalofbigdata.springeropen.com", + "https://journalofbigdata.springeropen.com/"]}, "url": "https://www.semanticscholar.org/paper/cbad0923db89f23febcbd6192ff4149289ff2ad9", "title": "A survey on data\u2010efficient algorithms in big data era", "abstract": null, "venue": "Journal of Big Data", "year": 2021, "referenceCount": 316, - "citationCount": 41, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-01-26", "journal": {"volume": "8", "pages": "1-54", "name": "Journal - of Big Data"}, "authors": [{"authorId": "9139705", "name": "Amina Adadi"}]}, - {"paperId": "7ed3d41d5ba99a390ac9233e9c3d6af62358aee5", "externalIds": {"DBLP": - "journals/corr/abs-2101-10899", "ArXiv": "2101.10899", "DOI": "10.23919/ICN.2021.0015", - "CorpusId": 231709221}, "url": "https://www.semanticscholar.org/paper/7ed3d41d5ba99a390ac9233e9c3d6af62358aee5", + "citationCount": 43, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-01-26", "journal": {"volume": "8", "pages": + "1-54", "name": "Journal of Big Data"}, "authors": [{"authorId": "9139705", + "name": "Amina Adadi"}]}, {"paperId": "7ed3d41d5ba99a390ac9233e9c3d6af62358aee5", + "externalIds": {"DBLP": "journals/corr/abs-2101-10899", "ArXiv": "2101.10899", + "DOI": "10.23919/ICN.2021.0015", "CorpusId": 231709221}, "corpusId": 231709221, + "publicationVenue": {"id": "49618524-7c8f-47c8-95d0-468d942c54c9", "name": + "Intelligent and Converged Networks", "alternate_names": ["Intell Converg + Netw"], "issn": "2708-6240", "url": "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=9195266"}, + "url": "https://www.semanticscholar.org/paper/7ed3d41d5ba99a390ac9233e9c3d6af62358aee5", "title": "Artificial Intelligence for Satellite Communication: A Review", "abstract": ": Satellite communication offers the prospect of service continuity over uncovered and under-covered areas, service ubiquity, and service scalability. @@ -18521,94 +21137,111 @@ interactions: and potential AI-based solutions are presented. Finally, an outlook of field is drawn, and future steps are suggested.", "venue": "Intelligent and Converged Networks", "year": 2021, "referenceCount": 242, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2021-01-25", "journal": {"volume": "abs/2101.10899", "name": - "ArXiv"}, "authors": [{"authorId": "1970404776", "name": "Fares Fourati"}, - {"authorId": "144789580", "name": "Mohamed-Slim Alouini"}]}, {"paperId": "b35aba33dc1dfa6d172e8fec71b8c64380f09fae", - "externalIds": {"DOI": "10.2307/j.ctv1fcf88w.8", "CorpusId": 241390306}, "url": - "https://www.semanticscholar.org/paper/b35aba33dc1dfa6d172e8fec71b8c64380f09fae", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/9195266/9622197/09622204.pdf", + "status": null}, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2021-01-25", "journal": {"volume": "abs/2101.10899", "name": "ArXiv"}, "authors": + [{"authorId": "1970404776", "name": "Fares Fourati"}, {"authorId": "144789580", + "name": "Mohamed-Slim Alouini"}]}, {"paperId": "b35aba33dc1dfa6d172e8fec71b8c64380f09fae", + "externalIds": {"DOI": "10.2307/j.ctv1fcf88w.8", "CorpusId": 241390306}, "corpusId": + 241390306, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b35aba33dc1dfa6d172e8fec71b8c64380f09fae", "title": "Advertisarial Relations and Aesthetics of Survival", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 208, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-01-22", "journal": {"name": - "The World Computer"}, "authors": []}, {"paperId": "4509c648349ca717e82aeb6be2707d97caaa709a", - "externalIds": {"DOI": "10.1215/9781478012702-002", "CorpusId": 241552139}, - "url": "https://www.semanticscholar.org/paper/4509c648349ca717e82aeb6be2707d97caaa709a", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": + "4509c648349ca717e82aeb6be2707d97caaa709a", "externalIds": {"DOI": "10.1215/9781478012702-002", + "CorpusId": 241552139}, "corpusId": 241552139, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4509c648349ca717e82aeb6be2707d97caaa709a", "title": "The Social Difference Engine and the World Computer", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-22", - "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": "f6ae0df7bd30b31ef07c58b644d371735f78e271", - "externalIds": {"DOI": "10.1215/9781478012702-011", "CorpusId": 241792626}, - "url": "https://www.semanticscholar.org/paper/f6ae0df7bd30b31ef07c58b644d371735f78e271", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://read.dukeupress.edu/books/book/chapter-pdf/848615/9781478012702-002.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, + "authors": []}, {"paperId": "f6ae0df7bd30b31ef07c58b644d371735f78e271", "externalIds": + {"DOI": "10.1215/9781478012702-011", "CorpusId": 241792626}, "corpusId": 241792626, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6ae0df7bd30b31ef07c58b644d371735f78e271", "title": "Notes", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, - "authors": []}, {"paperId": "f73798bbea47003db8531705226dcfb40ee97ee2", "externalIds": - {"DOI": "10.1215/9781478012702-267", "CorpusId": 240947206}, "url": "https://www.semanticscholar.org/paper/f73798bbea47003db8531705226dcfb40ee97ee2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": + {"name": "The World Computer"}, "authors": []}, {"paperId": "f73798bbea47003db8531705226dcfb40ee97ee2", + "externalIds": {"DOI": "10.1215/9781478012702-267", "CorpusId": 240947206}, + "corpusId": 240947206, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f73798bbea47003db8531705226dcfb40ee97ee2", "title": "Appendix 2: The Derivative Image", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": - "3f68bc0cebae726cbe6e842a6dc1222b3de73d17", "externalIds": {"DOI": "10.1215/9781478012702-005", - "CorpusId": 242889020}, "url": "https://www.semanticscholar.org/paper/3f68bc0cebae726cbe6e842a6dc1222b3de73d17", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, + "authors": []}, {"paperId": "3f68bc0cebae726cbe6e842a6dc1222b3de73d17", "externalIds": + {"DOI": "10.1215/9781478012702-005", "CorpusId": 242889020}, "corpusId": 242889020, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f68bc0cebae726cbe6e842a6dc1222b3de73d17", "title": "M-I-C-I\u2032-M\u2032", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, - "authors": []}, {"paperId": "c227af05c392c034ffc04ad602446bd814f299b9", "externalIds": - {"DOI": "10.1215/9781478012702-255", "CorpusId": 241150539}, "url": "https://www.semanticscholar.org/paper/c227af05c392c034ffc04ad602446bd814f299b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": + {"name": "The World Computer"}, "authors": []}, {"paperId": "c227af05c392c034ffc04ad602446bd814f299b9", + "externalIds": {"DOI": "10.1215/9781478012702-255", "CorpusId": 241150539}, + "corpusId": 241150539, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c227af05c392c034ffc04ad602446bd814f299b9", "title": "Appendix 1: The Derivative Machine", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": - "31166b35483e38515b8d7b15368fe3dac035d967", "externalIds": {"DOI": "10.1215/9781478012702-009", - "CorpusId": 240665178}, "url": "https://www.semanticscholar.org/paper/31166b35483e38515b8d7b15368fe3dac035d967", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, + "authors": []}, {"paperId": "31166b35483e38515b8d7b15368fe3dac035d967", "externalIds": + {"DOI": "10.1215/9781478012702-009", "CorpusId": 240665178}, "corpusId": 240665178, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/31166b35483e38515b8d7b15368fe3dac035d967", "title": "An Engineanda Camera", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, - "authors": []}, {"paperId": "f6360a17e9ae6e69eaab63bf84cc285b67aa8c14", "externalIds": - {"DOI": "10.1215/9781478012702-012", "CorpusId": 242818856}, "url": "https://www.semanticscholar.org/paper/f6360a17e9ae6e69eaab63bf84cc285b67aa8c14", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": + {"name": "The World Computer"}, "authors": []}, {"paperId": "f6360a17e9ae6e69eaab63bf84cc285b67aa8c14", + "externalIds": {"DOI": "10.1215/9781478012702-012", "CorpusId": 242818856}, + "corpusId": 242818856, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6360a17e9ae6e69eaab63bf84cc285b67aa8c14", "title": "References", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 93, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, - "authors": []}, {"paperId": "c968db8d123275510170b5f36d734b39181e0237", "externalIds": - {"DOI": "10.1215/9781478012702-010", "CorpusId": 241278363}, "url": "https://www.semanticscholar.org/paper/c968db8d123275510170b5f36d734b39181e0237", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2021-01-22", "journal": + {"name": "The World Computer"}, "authors": []}, {"paperId": "c968db8d123275510170b5f36d734b39181e0237", + "externalIds": {"DOI": "10.1215/9781478012702-010", "CorpusId": 241278363}, + "corpusId": 241278363, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c968db8d123275510170b5f36d734b39181e0237", "title": "Derivative Living and Subaltern Futures", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": - "9c10c0ef07b1de843eab9d22846e3f9b79ff99c9", "externalIds": {"DOI": "10.1215/9781478012702-003", - "CorpusId": 243388274}, "url": "https://www.semanticscholar.org/paper/9c10c0ef07b1de843eab9d22846e3f9b79ff99c9", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, + "authors": []}, {"paperId": "9c10c0ef07b1de843eab9d22846e3f9b79ff99c9", "externalIds": + {"DOI": "10.1215/9781478012702-003", "CorpusId": 243388274}, "corpusId": 243388274, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9c10c0ef07b1de843eab9d22846e3f9b79ff99c9", "title": "The Computational Unconscious", "abstract": null, "venue": "The World Computer", "year": 2021, "referenceCount": 94, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-01-22", "journal": {"name": "The World Computer"}, "authors": []}, {"paperId": - "c0215dca4e170f6c3d7b05c031ec9f39a2ff1afe", "externalIds": {"DBLP": "journals/biosystems/CottamV21", - "DOI": "10.1016/j.biosystems.2021.104366", "CorpusId": 231700809, "PubMed": - "33486092"}, "url": "https://www.semanticscholar.org/paper/c0215dca4e170f6c3d7b05c031ec9f39a2ff1afe", - "title": "The necessity of hierarchy for living systems", "abstract": null, - "venue": "Biosyst.", "year": 2021, "referenceCount": 19, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-01-21", "journal": {"pages": - "\n 104366\n ", "name": "Bio Systems"}, "authors": [{"authorId": - "1888944", "name": "R. Cottam"}, {"authorId": "47920765", "name": "R. Vounckx"}]}, - {"paperId": "f5f47fe059f2b3f9f25b5d3fbdac414af815c1f6", "externalIds": {"MAG": - "3122521504", "DOI": "10.3390/ELECTRONICS10030229", "CorpusId": 234159430}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-01-22", "journal": {"name": "The World Computer"}, + "authors": []}, {"paperId": "c0215dca4e170f6c3d7b05c031ec9f39a2ff1afe", "externalIds": + {"DBLP": "journals/biosystems/CottamV21", "DOI": "10.1016/j.biosystems.2021.104366", + "CorpusId": 231700809, "PubMed": "33486092"}, "corpusId": 231700809, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c0215dca4e170f6c3d7b05c031ec9f39a2ff1afe", + "title": "The necessity of hierarchy for living systems", "abstract": null, + "venue": "Biosyst.", "year": 2021, "referenceCount": 19, "citationCount": + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-21", "journal": + {"pages": "\n 104366\n ", "name": "Bio Systems"}, "authors": + [{"authorId": "1888944", "name": "R. Cottam"}, {"authorId": "47920765", "name": + "R. Vounckx"}]}, {"paperId": "f5f47fe059f2b3f9f25b5d3fbdac414af815c1f6", "externalIds": + {"MAG": "3122521504", "DOI": "10.3390/ELECTRONICS10030229", "CorpusId": 234159430}, + "corpusId": 234159430, "publicationVenue": {"id": "ccd8e532-73c6-414f-bc91-271bbb2933e2", + "name": "Electronics", "type": "journal", "issn": "1450-5843", "alternate_issns": + ["2079-9292", "0883-4989"], "url": "http://www.electronics.etfbl.net/", "alternate_urls": + ["http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-247562", + "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-247562", "https://www.mdpi.com/journal/electronics"]}, "url": "https://www.semanticscholar.org/paper/f5f47fe059f2b3f9f25b5d3fbdac414af815c1f6", "title": "EdgeAvatar: An Edge Computing System for Building Virtual Beings", "abstract": "Dialogue systems, also known as conversational agents, are computing @@ -18627,7 +21260,8 @@ interactions: and are inspired by historical figures to interact with visitors of the Venice Biennale 2019. EdgeAvatar can adapt to fit different approaches for AI powered conversations.", "venue": "Electronics", "year": 2021, "referenceCount": 35, - "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": + "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.mdpi.com/2079-9292/10/3/229/pdf", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-20", "journal": {"name": @@ -18638,7 +21272,14 @@ interactions: "name": "T. Givargis"}, {"authorId": "145330843", "name": "A. Nicolau"}, {"authorId": "1764886", "name": "A. Veidenbaum"}]}, {"paperId": "05d45d8c4f7e9d63861bd28a83f49fa1a9c010ee", "externalIds": {"DOI": "10.1109/ICICT50816.2021.9358531", "CorpusId": 232072286}, - "url": "https://www.semanticscholar.org/paper/05d45d8c4f7e9d63861bd28a83f49fa1a9c010ee", + "corpusId": 232072286, "publicationVenue": {"id": "9181819e-530e-4408-9917-93c5f58d7fce", + "name": "International Congress on Information and Communication Technology", + "type": "conference", "alternate_names": ["Int Conf Inf Comput Technol", "International + Conference on Inventive Computation Technologies", "ICICT", "Int Congr Inf + Commun Technol", "Int Conf Inven Comput Technol", "International Conference + on Issues and Challenges in Intelligent Computing Techniques", "International + Conference on Information and Computer Technologies", "Int Conf Issue Chall + Intell Comput Tech"]}, "url": "https://www.semanticscholar.org/paper/05d45d8c4f7e9d63861bd28a83f49fa1a9c010ee", "title": "Information Acquisition Chatbot System using LUIS", "abstract": "The college information chatbot system is enhanced using the Na\u00efve Bayes classification algorithm that analyzes user''s queries and messages. This @@ -18650,16 +21291,17 @@ interactions: which can be downloaded and installed from the play store on the user''s smartphone.", "venue": "International Congress on Information and Communication Technology", "year": 2021, "referenceCount": 10, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "2021-01-20", "journal": {"pages": "1025-1029", "name": - "2021 6th International Conference on Inventive Computation Technologies (ICICT)"}, - "authors": [{"authorId": "2077058924", "name": "V. Prathyusha"}, {"authorId": - "2051698078", "name": "G. L. Sri"}, {"authorId": "145935488", "name": "G. - Meenakshi"}, {"authorId": "2051693363", "name": "Y. K. Chakravarti"}]}, {"paperId": - "64231d0b49252e5bb9ece098434b3387b61ec1ff", "externalIds": {"ArXiv": "2101.08286", - "DBLP": "journals/corr/abs-2101-08286", "DOI": "10.1073/pnas.2107151119", - "CorpusId": 231662111}, "url": "https://www.semanticscholar.org/paper/64231d0b49252e5bb9ece098434b3387b61ec1ff", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Conference"], "publicationDate": "2021-01-20", "journal": {"pages": "1025-1029", + "name": "2021 6th International Conference on Inventive Computation Technologies + (ICICT)"}, "authors": [{"authorId": "2077058924", "name": "V. Prathyusha"}, + {"authorId": "2051698078", "name": "G. L. Sri"}, {"authorId": "145935488", + "name": "G. Meenakshi"}, {"authorId": "2051693363", "name": "Y. K. Chakravarti"}]}, + {"paperId": "64231d0b49252e5bb9ece098434b3387b61ec1ff", "externalIds": {"ArXiv": + "2101.08286", "DBLP": "journals/corr/abs-2101-08286", "DOI": "10.1073/pnas.2107151119", + "CorpusId": 231662111}, "corpusId": 231662111, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/64231d0b49252e5bb9ece098434b3387b61ec1ff", "title": "Can stable and accurate neural networks be computed? - On the barriers of deep learning and Smale''s 18th problem", "abstract": "A BSTRACT . Deep learning (DL) has had unprecedented success and is now entering scienti\ufb01c @@ -18697,36 +21339,42 @@ interactions: j = 0 if j / \u2208 S . Complex rationals Q + i Q are denoted by Q [ i ] . We use (cid:3) to denote the end of a proof and (cid:2) to denote the end of a remark.", "venue": "ArXiv", "year": 2021, "referenceCount": 168, "citationCount": - 42, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-01-20", "journal": {"volume": - "abs/2101.08286", "name": "ArXiv"}, "authors": [{"authorId": "72167909", "name": - "Vegard Antun"}, {"authorId": "51445731", "name": "Matthew J. Colbrook"}, + 43, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-20", "journal": + {"volume": "abs/2101.08286", "name": "ArXiv"}, "authors": [{"authorId": "72167909", + "name": "Vegard Antun"}, {"authorId": "51445731", "name": "Matthew J. Colbrook"}, {"authorId": "145920634", "name": "A. Hansen"}]}, {"paperId": "fb0400e21bdb776ce56eab2d9f9faf7d06f80258", "externalIds": {"DBLP": "journals/sncs/KumarJ21", "DOI": "10.1007/s42979-020-00445-z", - "CorpusId": 231681776}, "url": "https://www.semanticscholar.org/paper/fb0400e21bdb776ce56eab2d9f9faf7d06f80258", + "CorpusId": 231681776}, "corpusId": 231681776, "publicationVenue": {"id": + "7a7dc89b-e1a6-44df-a496-46c330a87840", "name": "SN Computer Science", "type": + "journal", "alternate_names": ["SN Comput Sci"], "issn": "2661-8907", "alternate_issns": + ["2662-995X"], "url": "https://link.springer.com/journal/42979"}, "url": "https://www.semanticscholar.org/paper/fb0400e21bdb776ce56eab2d9f9faf7d06f80258", "title": "Benchmarks for Designing a Secure Devanagari CAPTCHA", "abstract": null, "venue": "SN Computer Science", "year": 2021, "referenceCount": 39, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-01-19", "journal": {"volume": "2", "pages": "45", "name": "SN Comput. - Sci."}, "authors": [{"authorId": "2109783064", "name": "Mohinder Kumar"}, - {"authorId": "35495324", "name": "M. Jindal"}]}, {"paperId": "634727779cf44fcc41f9f93d03b64f3e60021684", - "externalIds": {"DOI": "10.1007/s10516-021-09534-x", "CorpusId": 254259429}, - "url": "https://www.semanticscholar.org/paper/634727779cf44fcc41f9f93d03b64f3e60021684", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-01-19", "journal": {"volume": "2", "pages": "45", + "name": "SN Comput. Sci."}, "authors": [{"authorId": "2109783064", "name": + "Mohinder Kumar"}, {"authorId": "35495324", "name": "M. Jindal"}]}, {"paperId": + "634727779cf44fcc41f9f93d03b64f3e60021684", "externalIds": {"DOI": "10.1007/s10516-021-09534-x", + "CorpusId": 254259429}, "corpusId": 254259429, "publicationVenue": {"id": + "f45678d8-f34b-4d95-a357-b7110a1d707f", "name": "Axiomathes", "type": "journal", + "issn": "1122-1151", "url": "https://link.springer.com/journal/10516"}, "url": + "https://www.semanticscholar.org/paper/634727779cf44fcc41f9f93d03b64f3e60021684", "title": "Meaning Relations, Syntax, and Understanding", "abstract": null, "venue": "Axiomathes", "year": 2021, "referenceCount": 59, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-01-19", "journal": {"volume": - "32", "pages": "459 - 475", "name": "Axiomathes"}, "authors": [{"authorId": - "3098996", "name": "P. Mondal"}]}, {"paperId": "fc9c61e350dfe46e4b7c896a2dc9e33b14b9d279", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-19", + "journal": {"volume": "32", "pages": "459 - 475", "name": "Axiomathes"}, "authors": + [{"authorId": "3098996", "name": "P. Mondal"}]}, {"paperId": "fc9c61e350dfe46e4b7c896a2dc9e33b14b9d279", "externalIds": {"MAG": "3121514122", "DOI": "10.3390/ECONOMIES9010006", "CorpusId": - 234145955}, "url": "https://www.semanticscholar.org/paper/fc9c61e350dfe46e4b7c896a2dc9e33b14b9d279", + 234145955}, "corpusId": 234145955, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc9c61e350dfe46e4b7c896a2dc9e33b14b9d279", "title": "A Review of the Applications of Genetic Algorithms to Forecasting Prices of Commodities", "abstract": "This paper is focused on the concise review of the specific applications of genetic algorithms in forecasting commodity @@ -18747,24 +21395,28 @@ interactions: three important\u2014yet not often jointly discussed\u2014topics: genetic algorithms, their hybrids with other tools, and commodity price forecasting issues.", "venue": "", "year": 2021, "referenceCount": 149, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-01-19", "journal": - {"volume": "9", "pages": "6", "name": "Economies"}, "authors": [{"authorId": - "41048391", "name": "Krzysztof Drachal"}, {"authorId": "101686868", "name": - "M. Pawlowski"}]}, {"paperId": "d3380952b99d3516116d64213db28faaac5b16de", + 11, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.mdpi.com/2227-7099/9/1/6/pdf?version=1611061133", "status": + null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-01-19", "journal": {"volume": "9", "pages": "6", "name": "Economies"}, + "authors": [{"authorId": "41048391", "name": "Krzysztof Drachal"}, {"authorId": + "101686868", "name": "M. Pawlowski"}]}, {"paperId": "d3380952b99d3516116d64213db28faaac5b16de", "externalIds": {"DOI": "10.1007/s00146-020-01136-2", "CorpusId": 253687771}, + "corpusId": 253687771, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", + "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/d3380952b99d3516116d64213db28faaac5b16de", "title": "There is no \u201cI\u201d in \u201cAI\u201d", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 32, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-01-15", "journal": {"volume": - "36", "pages": "1035 - 1046", "name": "AI & SOCIETY"}, "authors": [{"authorId": - "11060885", "name": "A. Farhadi"}]}, {"paperId": "58d7bb3a12dba344653570a2fc788c977f1f9dac", - "externalIds": {"MAG": "3155332569", "DOI": "10.30658/HMC.2.3", "CorpusId": - 234972240}, "url": "https://www.semanticscholar.org/paper/58d7bb3a12dba344653570a2fc788c977f1f9dac", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-15", + "journal": {"volume": "36", "pages": "1035 - 1046", "name": "AI & SOCIETY"}, + "authors": [{"authorId": "11060885", "name": "A. Farhadi"}]}, {"paperId": + "58d7bb3a12dba344653570a2fc788c977f1f9dac", "externalIds": {"MAG": "3155332569", + "DOI": "10.30658/HMC.2.3", "CorpusId": 234972240}, "corpusId": 234972240, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/58d7bb3a12dba344653570a2fc788c977f1f9dac", "title": "Voice-Based Agents as Personified Things: Assimilation and Accommodation as Equilibration of Doubt", "abstract": "We aim to investigate the nature of doubt regarding voice-based agents by referring to Piaget\u2019s ontological @@ -18778,15 +21430,17 @@ interactions: attributes of agency and mind to the voice-based agents, increased by a dyadic using situation, previous regular interactions, a younger age, and an introverted personality of the user. We discuss these results in a broader context.", - "venue": "", "year": 2021, "referenceCount": 77, "citationCount": 12, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-01-15", "journal": {"volume": "2", "pages": "57-79", "name": ""}, "authors": - [{"authorId": "2098144309", "name": "Katrin Etzrodt"}, {"authorId": "25512473", - "name": "Sven Engesser"}]}, {"paperId": "300b89c409aa6ea5e6249fd468c4270a56204a56", + "venue": "", "year": 2021, "referenceCount": 77, "citationCount": 13, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://stars.library.ucf.edu/cgi/viewcontent.cgi?article=1024&context=hmc", + "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-15", + "journal": {"volume": "2", "pages": "57-79", "name": ""}, "authors": [{"authorId": + "2098144309", "name": "Katrin Etzrodt"}, {"authorId": "25512473", "name": + "Sven Engesser"}]}, {"paperId": "300b89c409aa6ea5e6249fd468c4270a56204a56", "externalIds": {"MAG": "3155770175", "DOI": "10.30780/IJTRS.V06.I01.003", - "CorpusId": 234367349}, "url": "https://www.semanticscholar.org/paper/300b89c409aa6ea5e6249fd468c4270a56204a56", + "CorpusId": 234367349}, "corpusId": 234367349, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/300b89c409aa6ea5e6249fd468c4270a56204a56", "title": "CAPTCHA: A TOOL FOR WEB SECURITY", "abstract": "Malicious computer programs today have tried to target websites, which have a significant effect on their availability and security. The CAPTCHA is a tool that is an efficient @@ -18800,14 +21454,18 @@ interactions: been done in order to enhance our knowledge about how CAPTCHA can provide web security focusing in particular on handwritten CAPTCHA and audio, video CAPTCHA in general.", "venue": "", "year": 2021, "referenceCount": 38, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2021-01-15", "journal": - {"volume": "6", "pages": "16-20", "name": ""}, "authors": [{"authorId": "2060326443", - "name": "Gurpreet Kaur"}, {"authorId": "50318908", "name": "D. Rai"}]}, {"paperId": - "2b44fd0e7875dc217f6877d25c70eb8c0e8051c7", "externalIds": {"MAG": "3119191159", - "DOI": "10.3390/SU13020800", "CorpusId": 234316501}, "url": "https://www.semanticscholar.org/paper/2b44fd0e7875dc217f6877d25c70eb8c0e8051c7", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-01-15", "journal": {"volume": "6", "pages": "16-20", "name": ""}, "authors": + [{"authorId": "2060326443", "name": "Gurpreet Kaur"}, {"authorId": "50318908", + "name": "D. Rai"}]}, {"paperId": "2b44fd0e7875dc217f6877d25c70eb8c0e8051c7", + "externalIds": {"MAG": "3119191159", "DOI": "10.3390/SU13020800", "CorpusId": + 234316501}, "corpusId": 234316501, "publicationVenue": {"id": "8775599f-4f9a-45f0-900e-7f4de68e6843", + "name": "Sustainability", "type": "journal", "issn": "2071-1050", "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-172127", + "alternate_urls": ["http://mdpi.com/journal/sustainability", "http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-172127"]}, + "url": "https://www.semanticscholar.org/paper/2b44fd0e7875dc217f6877d25c70eb8c0e8051c7", "title": "Artificial Intelligence and Reflections from Educational Landscape: A Review of AI Studies in Half a Century", "abstract": "Artificial intelligence (AI) has penetrated every layer of our lives, and education is not immune @@ -18821,42 +21479,52 @@ interactions: online learning processes, (3) Educational human-AI interaction, (4) educational use of AI-generated data, and (5) AI in higher education. The study also highlights that ethics in AI studies is an ignored research area.", "venue": "Sustainability", - "year": 2021, "referenceCount": 75, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2021-01-15", "journal": {"name": "Sustainability"}, "authors": [{"authorId": - "3902896", "name": "Aras Bozkurt"}, {"authorId": "68980771", "name": "Abdulkadir - Karadeniz"}, {"authorId": "2124259", "name": "David Ba\u00f1eres"}, {"authorId": - "1398239354", "name": "Ana-Elena Guerrero-Rold\u00e1n"}, {"authorId": "2107266585", - "name": "M. E. Rodr\u00edguez"}]}, {"paperId": "30fd9dc890a6af150df9bf045ca311b36fe20091", + "year": 2021, "referenceCount": 75, "citationCount": 19, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2071-1050/13/2/800/pdf?version=1610705080", + "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2021-01-15", "journal": + {"name": "Sustainability"}, "authors": [{"authorId": "3902896", "name": "Aras + Bozkurt"}, {"authorId": "68980771", "name": "Abdulkadir Karadeniz"}, {"authorId": + "2124259", "name": "David Ba\u00f1eres"}, {"authorId": "1398239354", "name": + "Ana-Elena Guerrero-Rold\u00e1n"}, {"authorId": "2107266585", "name": "M. + E. Rodr\u00edguez"}]}, {"paperId": "30fd9dc890a6af150df9bf045ca311b36fe20091", "externalIds": {"DOI": "10.1108/978-1-80043-107-220211005", "CorpusId": 242460734}, - "url": "https://www.semanticscholar.org/paper/30fd9dc890a6af150df9bf045ca311b36fe20091", + "corpusId": 242460734, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/30fd9dc890a6af150df9bf045ca311b36fe20091", "title": "References", "abstract": null, "venue": "Posthumanism in Digital Culture", "year": 2021, "referenceCount": 165, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.emerald.com/insight/content/doi/10.1108/978-1-80043-107-220211005/full/pdf?title=references", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-15", "journal": {"name": "Posthumanism in Digital Culture"}, "authors": []}, {"paperId": "077e41eb0d8d1979e17ab79eb8ae6a356972310e", "externalIds": {"DOI": "10.1007/s00146-020-01139-z", "CorpusId": 253686557}, + "corpusId": 253686557, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", + "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/077e41eb0d8d1979e17ab79eb8ae6a356972310e", "title": "Technoevidence: the \"Turing limit\" 2020", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-01-13", "journal": {"volume": "36", "pages": "1021 - 1028", "name": - "AI & SOCIETY"}, "authors": [{"authorId": "2115580470", "name": "J. Marshall"}]}, - {"paperId": "25a595559157e0ff2c93683a1dd2ad66da42a3c3", "externalIds": {"DOI": - "10.1007/s13194-020-00343-4", "CorpusId": 231607773}, "url": "https://www.semanticscholar.org/paper/25a595559157e0ff2c93683a1dd2ad66da42a3c3", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2021-01-13", "journal": {"volume": "36", "pages": + "1021 - 1028", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2115580470", + "name": "J. Marshall"}]}, {"paperId": "25a595559157e0ff2c93683a1dd2ad66da42a3c3", + "externalIds": {"DOI": "10.1007/s13194-020-00343-4", "CorpusId": 231607773}, + "corpusId": 231607773, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/25a595559157e0ff2c93683a1dd2ad66da42a3c3", "title": "Creativity as potentially valuable improbable constructions", "abstract": null, "venue": "", "year": 2021, "referenceCount": 65, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-01-13", "journal": {"volume": - "11", "pages": "1-24", "name": "European Journal for Philosophy of Science"}, - "authors": [{"authorId": "3388092", "name": "Mark Fedyk"}, {"authorId": "2152478414", - "name": "Fei Xu"}]}, {"paperId": "b2a8c4513302759ea9f90a4c1a63a59e4f16749a", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://philsci-archive.pitt.edu/18509/1/FedykXu-Creativity-Version%208.0%20GC1.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-13", + "journal": {"volume": "11", "pages": "1-24", "name": "European Journal for + Philosophy of Science"}, "authors": [{"authorId": "3388092", "name": "Mark + Fedyk"}, {"authorId": "2152478414", "name": "Fei Xu"}]}, {"paperId": "b2a8c4513302759ea9f90a4c1a63a59e4f16749a", "externalIds": {"MAG": "3100801413", "DOI": "10.1146/annurev-criminol-051520-012342", - "CorpusId": 228892996}, "url": "https://www.semanticscholar.org/paper/b2a8c4513302759ea9f90a4c1a63a59e4f16749a", + "CorpusId": 228892996}, "corpusId": 228892996, "publicationVenue": {"id": + "03dc6a51-1dd8-45a3-b063-4737bd11c0d0", "name": "annual review of criminology", + "alternate_names": ["annu rev criminol"], "issn": "2572-4568", "url": "https://www.annualreviews.org/journal/criminol", + "alternate_urls": ["https://www.annualreviews.org/page/authors/general-information"]}, + "url": "https://www.semanticscholar.org/paper/b2a8c4513302759ea9f90a4c1a63a59e4f16749a", "title": "Artificial Intelligence, Predictive Policing, and Risk Assessment for Law Enforcement", "abstract": "There are widespread concerns about the use of artificial intelligence in law enforcement. Predictive policing and @@ -18877,13 +21545,14 @@ interactions: through political and legislative processes achieving an acceptable balance between competing priorities.", "venue": "annual review of criminology", "year": 2021, "referenceCount": 81, "citationCount": 13, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Law", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-13", - "journal": {"name": "Annual Review of Criminology"}, "authors": [{"authorId": - "50496565", "name": "R. Berk"}]}, {"paperId": "c8048c270ee699ec7efddc422e2d99279e3f65f7", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Law", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-01-13", "journal": {"name": "Annual Review of Criminology"}, "authors": + [{"authorId": "50496565", "name": "R. Berk"}]}, {"paperId": "c8048c270ee699ec7efddc422e2d99279e3f65f7", "externalIds": {"MAG": "3120222962", "DOI": "10.24018/EJECE.2021.5.1.265", - "CorpusId": 234307075}, "url": "https://www.semanticscholar.org/paper/c8048c270ee699ec7efddc422e2d99279e3f65f7", + "CorpusId": 234307075}, "corpusId": 234307075, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c8048c270ee699ec7efddc422e2d99279e3f65f7", "title": "EEG Channel Selection Using A Modified Grey Wolf Optimizer", "abstract": "Consider an increasingly growing field of research, Brain-Computer Interface (BCI) is to form a direct channel of communication between a computer and @@ -18906,15 +21575,17 @@ interactions: State from UCI Machine Learning Repository to evaluate the quality and effectiveness of the (MGWO). A cross-validation method is used to measure the stability of the (MGWO).", "venue": "", "year": 2021, "referenceCount": 39, "citationCount": - 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-01-12", "journal": {"volume": - "5", "pages": "17-24", "name": ""}, "authors": [{"authorId": "90037491", "name": - "Hussien Hussien"}, {"authorId": "1405789712", "name": "E. El-Kenawy"}, {"authorId": - "86896252", "name": "A. El-Desouky"}]}, {"paperId": "e5079c59630dc2031557f9dffb3214316125c509", - "externalIds": {"MAG": "3120147286", "DOI": "10.1108/IJLM-01-2020-0043", "CorpusId": - 234246258}, "url": "https://www.semanticscholar.org/paper/e5079c59630dc2031557f9dffb3214316125c509", + 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://ejece.org/index.php/ejece/article/download/265/167", "status": null}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-12", + "journal": {"volume": "5", "pages": "17-24", "name": ""}, "authors": [{"authorId": + "90037491", "name": "Hussien Hussien"}, {"authorId": "1405789712", "name": + "E. El-Kenawy"}, {"authorId": "86896252", "name": "A. El-Desouky"}]}, {"paperId": + "e5079c59630dc2031557f9dffb3214316125c509", "externalIds": {"MAG": "3120147286", + "DOI": "10.1108/IJLM-01-2020-0043", "CorpusId": 234246258}, "corpusId": 234246258, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e5079c59630dc2031557f9dffb3214316125c509", "title": "The impact of emerging and disruptive technologies on freight transportation in the digital era: current state and future trends", "abstract": "Purpose - With various challenges in the digital era, stakeholders are expressing @@ -18946,25 +21617,30 @@ interactions: review on the impact of disruptive technologies on logistics and transportation as well as opportunities to support management decision support in the logistics industry.", "venue": "", "year": 2021, "referenceCount": 143, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Business"], "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2021-01-12", "journal": {"volume": "", "name": "The International - Journal of Logistics Management"}, "authors": [{"authorId": "23162313", "name": - "Chuanwen Dong"}, {"authorId": "10282239", "name": "A. Akram"}, {"authorId": - "50042110", "name": "Dan Andersson"}, {"authorId": "1382842511", "name": "Per-Olof - Arn\u00e4s"}, {"authorId": "145567857", "name": "G. Stefansson"}]}, {"paperId": - "65dc1a2b91fabe5f9c1d7396659eda3cc501d158", "externalIds": {"ArXiv": "2101.03477", - "DBLP": "journals/cogcom/WashingtonKKHKL21", "DOI": "10.1007/s12559-021-09936-4", - "CorpusId": 237604952, "PubMed": "35669554"}, "url": "https://www.semanticscholar.org/paper/65dc1a2b91fabe5f9c1d7396659eda3cc501d158", + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2021-01-12", "journal": + {"volume": "", "name": "The International Journal of Logistics Management"}, + "authors": [{"authorId": "23162313", "name": "Chuanwen Dong"}, {"authorId": + "10282239", "name": "A. Akram"}, {"authorId": "50042110", "name": "Dan Andersson"}, + {"authorId": "1382842511", "name": "Per-Olof Arn\u00e4s"}, {"authorId": "145567857", + "name": "G. Stefansson"}]}, {"paperId": "65dc1a2b91fabe5f9c1d7396659eda3cc501d158", + "externalIds": {"ArXiv": "2101.03477", "DBLP": "journals/cogcom/WashingtonKKHKL21", + "DOI": "10.1007/s12559-021-09936-4", "CorpusId": 237604952, "PubMed": "35669554"}, + "corpusId": 237604952, "publicationVenue": {"id": "d1e87771-68a0-40db-a4d3-6216158cc596", + "name": "Cognitive Computation", "type": "journal", "alternate_names": ["Cogn + Comput"], "issn": "1866-9956", "url": "https://www.springer.com/biomed/neuroscience/journal/12559", + "alternate_urls": ["https://link.springer.com/journal/12559", "http://www.springer.com/biomed/neuroscience/journal/12559"]}, + "url": "https://www.semanticscholar.org/paper/65dc1a2b91fabe5f9c1d7396659eda3cc501d158", "title": "Training Affective Computer Vision Models by Crowdsourcing Soft-Target Labels", "abstract": null, "venue": "Cognitive Computation", "year": 2021, "referenceCount": 113, "citationCount": 10, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-01-10", "journal": {"volume": "13 5", "pages": "\n 1363-1373\n ", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-01-10", "journal": {"volume": "13 5", "pages": "\n 1363-1373\n ", "name": "Cognitive computation"}, "authors": [{"authorId": "145086898", "name": "P. Washington"}, {"authorId": "3079884", "name": "H. Kalantarian"}, {"authorId": "82564234", "name": "J. Kent"}, {"authorId": "1606872067", "name": "A. Husic"}, @@ -18978,7 +21654,7 @@ interactions: "name": "N. Haber"}, {"authorId": "145968749", "name": "D. Wall"}]}, {"paperId": "f59b41dc481b1518881753016a808324f2e5e692", "externalIds": {"DBLP": "journals/corr/abs-2101-06105", "ArXiv": "2101.06105", "DOI": "10.6084/m9.figshare.13514371", "CorpusId": - 231627565}, "url": "https://www.semanticscholar.org/paper/f59b41dc481b1518881753016a808324f2e5e692", + 231627565}, "corpusId": 231627565, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f59b41dc481b1518881753016a808324f2e5e692", "title": "Scientific Relevance and Future of Digital Immortality and Virtual Humans", "abstract": "We are on the threshold of a significant change in the way we view digital life, which will have a major effect on the physical world. @@ -18994,59 +21670,74 @@ interactions: schemes in the field of digital human beings. The prospects of digital human beings are being investigated.", "venue": "ArXiv", "year": 2021, "referenceCount": 17, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-01-09", "journal": {"volume": "abs/2101.06105", "name": "ArXiv"}, "authors": - [{"authorId": "4781329", "name": "Daniel Cebo"}]}, {"paperId": "69903adb3a1158b53e5a60c22dbc1731c0526c38", - "externalIds": {"MAG": "3118935583", "DBLP": "journals/patterns/KanzaBNMF21", - "PubMedCentral": "7815949", "DOI": "10.1016/j.patter.2020.100162", "CorpusId": - 231720334, "PubMed": "33511363"}, "url": "https://www.semanticscholar.org/paper/69903adb3a1158b53e5a60c22dbc1731c0526c38", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-01-09", "journal": {"volume": "abs/2101.06105", + "name": "ArXiv"}, "authors": [{"authorId": "4781329", "name": "Daniel Cebo"}]}, + {"paperId": "69903adb3a1158b53e5a60c22dbc1731c0526c38", "externalIds": {"MAG": + "3118935583", "DBLP": "journals/patterns/KanzaBNMF21", "PubMedCentral": "7815949", + "DOI": "10.1016/j.patter.2020.100162", "CorpusId": 231720334, "PubMed": "33511363"}, + "corpusId": 231720334, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/69903adb3a1158b53e5a60c22dbc1731c0526c38", "title": "The AI for Scientific Discovery Network+", "abstract": null, "venue": "Patterns", "year": 2021, "referenceCount": 85, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering", "Computer Science", - "Medicine"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, - {"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cell.com/article/S266638992030218X/pdf", + "status": null}, "fieldsOfStudy": ["Engineering", "Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2021-01-08", "journal": {"volume": "2", "name": "Patterns"}, "authors": [{"authorId": "26554027", "name": "Samantha Kanza"}, {"authorId": "39742911", "name": "C. Bird"}, {"authorId": "145387873", "name": "M. Niranjan"}, {"authorId": "2075786970", "name": "W. McNeill"}, {"authorId": "32113616", "name": "J. Frey"}]}, {"paperId": "f73afb95c60a8772e9ab9f2d7205270856799118", "externalIds": {"DOI": "10.1038/s41427-020-00274-9", "CorpusId": 231202741}, - "url": "https://www.semanticscholar.org/paper/f73afb95c60a8772e9ab9f2d7205270856799118", + "corpusId": 231202741, "publicationVenue": {"id": "20e2f7c4-a185-464d-9cb4-6272ea91bf85", + "name": "NPG Asia Materials", "type": "journal", "alternate_names": ["Npg + Asia Materials", "Npg Asia Mater", "NPG Asia Mater"], "issn": "1884-4049", + "url": "https://www.nature.com/am/"}, "url": "https://www.semanticscholar.org/paper/f73afb95c60a8772e9ab9f2d7205270856799118", "title": "Artificial synapses with a sponge-like double-layer porous oxide memristor", "abstract": null, "venue": "NPG Asia Materials", "year": 2021, "referenceCount": 85, "citationCount": 13, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-01-08", "journal": {"volume": "13", "pages": "1-10", "name": "NPG Asia - Materials"}, "authors": [{"authorId": "49106354", "name": "Qin Gao"}, {"authorId": - "49393449", "name": "Anping Huang"}, {"authorId": "2158144294", "name": "Jing - Zhang"}, {"authorId": "50006654", "name": "Yuhang Ji"}, {"authorId": "2157053878", + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/s41427-020-00274-9.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-08", + "journal": {"volume": "13", "pages": "1-10", "name": "NPG Asia Materials"}, + "authors": [{"authorId": "49106354", "name": "Qin Gao"}, {"authorId": "49393449", + "name": "Anping Huang"}, {"authorId": "2158144294", "name": "Jing Zhang"}, + {"authorId": "50006654", "name": "Yuhang Ji"}, {"authorId": "2157053878", "name": "Jingjing Zhang"}, {"authorId": "2000512523", "name": "Xueliang Chen"}, {"authorId": "2129128986", "name": "Xueli Geng"}, {"authorId": "103089596", "name": "Qi Hu"}, {"authorId": "2145319028", "name": "Mei Wang"}, {"authorId": "123034612", "name": "Zhisong Xiao"}, {"authorId": "2146824098", "name": "P. K. Chu"}]}, {"paperId": "3843e1f3a71bf149e4ed8e439a3e924a3bbd2979", "externalIds": - {"DOI": "10.1007/s10339-020-01009-y", "CorpusId": 254193816}, "url": "https://www.semanticscholar.org/paper/3843e1f3a71bf149e4ed8e439a3e924a3bbd2979", + {"DOI": "10.1007/s10339-020-01009-y", "CorpusId": 254193816}, "corpusId": + 254193816, "publicationVenue": {"id": "23a05c9f-e780-4c7d-aff5-332930f9359a", + "name": "Cognitive Processing", "type": "journal", "alternate_names": ["Cogn + Process"], "issn": "1612-4782", "url": "https://link.springer.com/journal/10339"}, + "url": "https://www.semanticscholar.org/paper/3843e1f3a71bf149e4ed8e439a3e924a3bbd2979", "title": "Nonhuman rationality: a predictive coding perspective", "abstract": null, "venue": "Cognitive Processing", "year": 2021, "referenceCount": 108, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-06", - "journal": {"volume": "22", "pages": "353 - 362", "name": "Cognitive Processing"}, - "authors": [{"authorId": "2139153", "name": "Tzu-Wei Hung"}]}, {"paperId": - "197864c0f8cb98d8edacb0595625238c84aed6ec", "externalIds": {"PubMedCentral": + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-01-06", "journal": {"volume": "22", "pages": "353 - 362", "name": "Cognitive + Processing"}, "authors": [{"authorId": "2139153", "name": "Tzu-Wei Hung"}]}, + {"paperId": "197864c0f8cb98d8edacb0595625238c84aed6ec", "externalIds": {"PubMedCentral": "7787507", "DOI": "10.1016/j.ejro.2021.100322", "CorpusId": 230794556, "PubMed": - "33432297"}, "url": "https://www.semanticscholar.org/paper/197864c0f8cb98d8edacb0595625238c84aed6ec", + "33432297"}, "corpusId": 230794556, "publicationVenue": {"id": "4975ca0b-793b-4350-aa92-6a005340dad0", + "name": "European Journal of Radiology Open", "type": "journal", "alternate_names": + ["Eur J Radiol Open"], "issn": "2352-0477", "url": "https://www.ejropen.com/", + "alternate_urls": ["http://www.ejropen.com", "https://www.journals.elsevier.com/european-journal-of-radiology-open/"]}, + "url": "https://www.semanticscholar.org/paper/197864c0f8cb98d8edacb0595625238c84aed6ec", "title": "Risk of in-hospital death associated with Covid-19 lung consolidations on chest computed tomography \u2013 A novel translational approach using a radiation oncology contour software", "abstract": null, "venue": "European Journal of Radiology Open", "year": 2021, "referenceCount": 31, "citationCount": - 5, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 5, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://www.ejropen.com/article/S2352047721000022/pdf", "status": null}, "fieldsOfStudy": + ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-06", "journal": {"volume": "8", "name": "European Journal of Radiology Open"}, "authors": [{"authorId": "74663710", "name": "L. Sapienza"}, {"authorId": "82429143", "name": "K. Nasra"}, {"authorId": @@ -19054,18 +21745,23 @@ interactions: Little"}, {"authorId": "144004992", "name": "V. Narayana"}, {"authorId": "1398229369", "name": "E. Abu-Isa"}]}, {"paperId": "e17f3c3f446f2dbf1fd77b8a6c0d76f38822e300", "externalIds": {"DBLP": "journals/cp/Hung21", "DOI": "10.1007/s10339-020-01009-y", - "CorpusId": 230784962, "PubMed": "33404900"}, "url": "https://www.semanticscholar.org/paper/e17f3c3f446f2dbf1fd77b8a6c0d76f38822e300", + "CorpusId": 230784962, "PubMed": "33404900"}, "corpusId": 230784962, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e17f3c3f446f2dbf1fd77b8a6c0d76f38822e300", "title": "Nonhuman rationality: a predictive coding perspective", "abstract": null, "venue": "Cogn. Process.", "year": 2021, "referenceCount": 65, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-01-06", "journal": {"volume": - "22", "pages": "353-362", "name": "Cognitive Processing"}, "authors": [{"authorId": - "2139153", "name": "Tzu-Wei Hung"}]}, {"paperId": "bd201eae8672b10af7fa47f37ae5c1544bd446a8", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-06", "journal": + {"volume": "22", "pages": "353-362", "name": "Cognitive Processing"}, "authors": + [{"authorId": "2139153", "name": "Tzu-Wei Hung"}]}, {"paperId": "bd201eae8672b10af7fa47f37ae5c1544bd446a8", "externalIds": {"MAG": "3122785935", "DBLP": "conf/hicss/AhmadSR21", "DOI": - "10.24251/HICSS.2021.492", "CorpusId": 232414121}, "url": "https://www.semanticscholar.org/paper/bd201eae8672b10af7fa47f37ae5c1544bd446a8", + "10.24251/HICSS.2021.492", "CorpusId": 232414121}, "corpusId": 232414121, + "publicationVenue": {"id": "d8ec66ab-0083-4a4d-bf44-ce85d2daad69", "name": + "Hawaii International Conference on System Sciences", "type": "conference", + "alternate_names": ["HICSS", "Hawaii Int Conf Syst Sci"], "url": "http://www.hicss.hawaii.edu/"}, + "url": "https://www.semanticscholar.org/paper/bd201eae8672b10af7fa47f37ae5c1544bd446a8", "title": "Communicating with Machines: Conversational Agents with Personality and the Role of Extraversion", "abstract": "Communication with conversational agents (CA) has become increasingly important. It therefore is crucial to @@ -19084,19 +21780,22 @@ interactions: contribute towards designing personality-adaptive CAs.", "venue": "Hawaii International Conference on System Sciences", "year": 2021, "referenceCount": 63, "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Psychology", "source": - "external"}, {"category": "Psychology", "source": "s2-fos-model"}, {"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "openAccessPdf": {"url": "http://scholarspace.manoa.hawaii.edu/bitstream/10125/71109/1/0398.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, + {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-05", "journal": {"pages": "1-10"}, "authors": [{"authorId": "29417708", "name": "Rangina Ahmad"}, {"authorId": "2160598", "name": "Dominik Siemon"}, {"authorId": "1398032634", "name": "S. Robra-Bissantz"}]}, {"paperId": "ac92ee40bedbb16aa9c57320421edc39cb3905ad", "externalIds": {"DBLP": "journals/corr/abs-2101-01533", "ArXiv": "2101.01533", "DOI": "10.1016/j.cortex.2021.01.001", - "CorpusId": 230523649, "PubMed": "33677138"}, "url": "https://www.semanticscholar.org/paper/ac92ee40bedbb16aa9c57320421edc39cb3905ad", + "CorpusId": 230523649, "PubMed": "33677138"}, "corpusId": 230523649, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ac92ee40bedbb16aa9c57320421edc39cb3905ad", "title": "On the control of attentional processes in vision", "abstract": null, "venue": "Cortex", "year": 2021, "referenceCount": 144, "citationCount": - 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", + 7, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/2101.01533", "status": null}, "fieldsOfStudy": ["Medicine", "Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Psychology", @@ -19106,7 +21805,8 @@ interactions: "66905627", "name": "O. Abid"}, {"authorId": "3468296", "name": "Iuliia Kotseruba"}, {"authorId": "36000196", "name": "M. Solbach"}]}, {"paperId": "5d538ce49e1c43e95a4cb592081b0bc4b8733d4b", "externalIds": {"ArXiv": "2101.02018", "DBLP": "journals/corr/abs-2101-02018", - "CorpusId": 230770255}, "url": "https://www.semanticscholar.org/paper/5d538ce49e1c43e95a4cb592081b0bc4b8733d4b", + "CorpusId": 230770255}, "corpusId": 230770255, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5d538ce49e1c43e95a4cb592081b0bc4b8733d4b", "title": "Abusive Advertising: Scrutinizing socially relevant algorithms in a black box analysis to examine their impact on vulnerable patient groups in the health sector", "abstract": "The targeted direct-to-customer marketing @@ -19127,47 +21827,60 @@ interactions: collected and analyzed. The results showed that there still is questionable advertising even though Google announced to purge it from its platform.", "venue": "ArXiv", "year": 2021, "referenceCount": 409, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-04", "journal": - {"volume": "abs/2101.02018", "name": "ArXiv"}, "authors": [{"authorId": "2045175321", - "name": "Martin Reber"}]}, {"paperId": "c5102ab9e4faaf2b4b2a5de8e9fb23c004256bff", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-01-04", "journal": {"volume": "abs/2101.02018", "name": "ArXiv"}, "authors": + [{"authorId": "2045175321", "name": "Martin Reber"}]}, {"paperId": "c5102ab9e4faaf2b4b2a5de8e9fb23c004256bff", "externalIds": {"DOI": "10.1007/s10479-020-03856-6", "CorpusId": 254229194}, + "corpusId": 254229194, "publicationVenue": {"id": "2e70cc37-125a-451c-b9bb-3b329f6be510", + "name": "Annals of Operations Research", "type": "journal", "alternate_names": + ["Ann Oper Res"], "issn": "0254-5330", "url": "https://www.springer.com/journal/10479", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-0-70-35506643-0,00.html?referer=www.springer.com/journal/10479/submission", + "https://link.springer.com/journal/10479", "http://www.springer.com/journal/10479"]}, "url": "https://www.semanticscholar.org/paper/c5102ab9e4faaf2b4b2a5de8e9fb23c004256bff", "title": "Artificial intelligence for decision support systems in the field of operations research: review and future scope of research", "abstract": null, "venue": "Annals of Operations Research", "year": 2021, "referenceCount": 310, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2021-01-03", - "journal": {"volume": "308", "pages": "215 - 274", "name": "Annals of Operations - Research"}, "authors": [{"authorId": "2118927871", "name": "Shivam Gupta"}, - {"authorId": "32909426", "name": "S. Modgil"}, {"authorId": "2053060306", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2021-01-03", "journal": {"volume": "308", "pages": "215 - 274", "name": "Annals + of Operations Research"}, "authors": [{"authorId": "2118927871", "name": "Shivam + Gupta"}, {"authorId": "32909426", "name": "S. Modgil"}, {"authorId": "2053060306", "name": "Samadrita Bhattacharyya"}, {"authorId": "143722718", "name": "I. Bose"}]}, {"paperId": "dd65bf01821e54adb6615809e262e6dbef4f25a2", "externalIds": - {"DOI": "10.1007/s00146-020-01129-1", "CorpusId": 253676281}, "url": "https://www.semanticscholar.org/paper/dd65bf01821e54adb6615809e262e6dbef4f25a2", + {"DOI": "10.1007/s00146-020-01129-1", "CorpusId": 253676281}, "corpusId": + 253676281, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", + "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, + "url": "https://www.semanticscholar.org/paper/dd65bf01821e54adb6615809e262e6dbef4f25a2", "title": "Debate: what is personhood in the age of AI?", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 103, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://philpapers.org/archive/GUNDWI.pdf", "status": null}, "fieldsOfStudy": + null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-03", "journal": {"volume": "36", "pages": "473 - 486", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2249898", "name": "David J. Gunkel"}, {"authorId": "25163625", "name": "Jordan Joseph Wales"}]}, {"paperId": "3fb2ed344374cf53fde4f1f77206541eadd10f1f", "externalIds": {"DBLP": "journals/ais/GunkelW21", "DOI": "10.1007/s00146-020-01129-1", - "CorpusId": 230284859}, "url": "https://www.semanticscholar.org/paper/3fb2ed344374cf53fde4f1f77206541eadd10f1f", + "CorpusId": 230284859}, "corpusId": 230284859, "publicationVenue": {"id": + "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", + "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/3fb2ed344374cf53fde4f1f77206541eadd10f1f", "title": "Debate: what is personhood in the age of AI?", "abstract": null, "venue": "Ai & Society", "year": 2021, "referenceCount": 122, "citationCount": - 7, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-01-03", "journal": {"volume": - "", "pages": "1-14", "name": "AI & SOCIETY"}, "authors": [{"authorId": "2249898", - "name": "David J. Gunkel"}, {"authorId": "25163625", "name": "Jordan Joseph - Wales"}]}, {"paperId": "0e5c24b258a3e5cefd65afaf010c2b2a51ed20a4", "externalIds": - {"MAG": "3133238569", "DOI": "10.1080/23312521.2020.1867025", "CorpusId": - 231990924}, "url": "https://www.semanticscholar.org/paper/0e5c24b258a3e5cefd65afaf010c2b2a51ed20a4", + 7, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://philpapers.org/archive/GUNDWI.pdf", "status": null}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-03", "journal": + {"volume": "", "pages": "1-14", "name": "AI & SOCIETY"}, "authors": [{"authorId": + "2249898", "name": "David J. Gunkel"}, {"authorId": "25163625", "name": "Jordan + Joseph Wales"}]}, {"paperId": "0e5c24b258a3e5cefd65afaf010c2b2a51ed20a4", + "externalIds": {"MAG": "3133238569", "DOI": "10.1080/23312521.2020.1867025", + "CorpusId": 231990924}, "corpusId": 231990924, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0e5c24b258a3e5cefd65afaf010c2b2a51ed20a4", "title": "Cognitive Vulnerability, Artificial Intelligence, and the Image of God in Humans", "abstract": "Abstract Recent progress in artificial intelligence (AI) opens up the possibility that one day machines could do anything that @@ -19180,13 +21893,15 @@ interactions: in bringing about our unique type of intelligence, one marked by relationality.", "venue": "Journal of Disability & Religion", "year": 2021, "referenceCount": 25, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-01-02", "journal": {"volume": - "25", "pages": "27 - 40", "name": "Journal of Disability & Religion"}, "authors": - [{"authorId": "151110907", "name": "M. Dorobantu"}]}, {"paperId": "21bf225da81242109819f376eb0deb40f6241a60", - "externalIds": {"MAG": "3129196540", "DOI": "10.15446/HYS.N40.86929", "CorpusId": - 234314379}, "url": "https://www.semanticscholar.org/paper/21bf225da81242109819f376eb0deb40f6241a60", + "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/23312521.2020.1867025?needAccess=true", + "status": null}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-02", + "journal": {"volume": "25", "pages": "27 - 40", "name": "Journal of Disability + & Religion"}, "authors": [{"authorId": "151110907", "name": "M. Dorobantu"}]}, + {"paperId": "21bf225da81242109819f376eb0deb40f6241a60", "externalIds": {"MAG": + "3129196540", "DOI": "10.15446/HYS.N40.86929", "CorpusId": 234314379}, "corpusId": + 234314379, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/21bf225da81242109819f376eb0deb40f6241a60", "title": "Babbage, Willis, Reuleaux y el surgimiento del enfoque anal\u00edtico modular de las m\u00e1quinas en el siglo XIX", "abstract": "El estudio de las m\u00e1quinas es un campo que puede rastrearse hasta el Renacimiento. @@ -19212,12 +21927,14 @@ interactions: que, expl\u00edcita o impl\u00edcitamente, retoman aquellos problemas y pueden encontrar en el pensamiento de los matem\u00e1ticos del siglo XIX un antecedente.", "venue": "Historia y sociedad", "year": 2021, "referenceCount": 44, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-01", - "journal": {"name": "Historia y sociedad"}, "authors": [{"authorId": "122364802", - "name": "D. Sandrone"}]}, {"paperId": "f4606ee709c3b2e90880b2382bade799ad606e0c", - "externalIds": {"MAG": "3151500458", "DOI": "10.21037/JHMHP-20-114", "CorpusId": - 233959732}, "url": "https://www.semanticscholar.org/paper/f4606ee709c3b2e90880b2382bade799ad606e0c", + 1, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://revistas.unal.edu.co/index.php/hisysoc/article/download/86929/78246", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2021-01-01", "journal": {"name": "Historia y sociedad"}, + "authors": [{"authorId": "122364802", "name": "D. Sandrone"}]}, {"paperId": + "f4606ee709c3b2e90880b2382bade799ad606e0c", "externalIds": {"MAG": "3151500458", + "DOI": "10.21037/JHMHP-20-114", "CorpusId": 233959732}, "corpusId": 233959732, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f4606ee709c3b2e90880b2382bade799ad606e0c", "title": "Technological advances to enhance recovery after cardiac surgery", "abstract": "Surgery, and especially cardiac surgery, is common, costly, and entails considerable risk. Significant progress has been made in recent years @@ -19247,25 +21964,28 @@ interactions: healthcare delivery will be critical. \u00a9 Journal of Hospital Management and Health Policy. All rights reserved.", "venue": "Journal of Hospital Management and Health Policy", "year": 2021, "referenceCount": 181, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2021-01-01", "journal": {"name": "Journal of Hospital Management and Health - Policy"}, "authors": [{"authorId": "6069268", "name": "K. Lobdell"}, {"authorId": - "5556089", "name": "J. Appoo"}, {"authorId": "81948576", "name": "G. Rose"}, - {"authorId": "35443576", "name": "B. Ferguson"}, {"authorId": "47320919", - "name": "S. Chatterjee"}]}, {"paperId": "65603de2747fdac66560381800c15bb00082d285", - "externalIds": {"DOI": "10.1016/j.pharma.2021.01.008", "CorpusId": 243070926}, - "url": "https://www.semanticscholar.org/paper/65603de2747fdac66560381800c15bb00082d285", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://jhmhp.amegroups.com/article/viewFile/6677/pdf", "status": null}, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"name": + "Journal of Hospital Management and Health Policy"}, "authors": [{"authorId": + "6069268", "name": "K. Lobdell"}, {"authorId": "5556089", "name": "J. Appoo"}, + {"authorId": "81948576", "name": "G. Rose"}, {"authorId": "35443576", "name": + "B. Ferguson"}, {"authorId": "47320919", "name": "S. Chatterjee"}]}, {"paperId": + "65603de2747fdac66560381800c15bb00082d285", "externalIds": {"DOI": "10.1016/j.pharma.2021.01.008", + "CorpusId": 243070926}, "corpusId": 243070926, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/65603de2747fdac66560381800c15bb00082d285", "title": "Applications de l\u2019intelligence artificielle au d\u00e9veloppement de nouveaux m\u00e9dicaments", "abstract": null, "venue": "Annales Pharmaceutiques Fran\u00e7aises", "year": 2021, "referenceCount": 20, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2021-01-01", - "journal": {"name": "Annales Pharmaceutiques Fran\u00e7aises"}, "authors": - [{"authorId": "47149135", "name": "P. Moingeon"}]}, {"paperId": "dde6963c0949eab1e42ded80bfba82b6beb4ba85", - "externalIds": {"DBLP": "journals/paladyn/Saetra21", "DOI": "10.1515/pjbr-2021-0021", - "CorpusId": 233449412}, "url": "https://www.semanticscholar.org/paper/dde6963c0949eab1e42ded80bfba82b6beb4ba85", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": + "2021-01-01", "journal": {"name": "Annales Pharmaceutiques Fran\u00e7aises"}, + "authors": [{"authorId": "47149135", "name": "P. Moingeon"}]}, {"paperId": + "dde6963c0949eab1e42ded80bfba82b6beb4ba85", "externalIds": {"DBLP": "journals/paladyn/Saetra21", + "DOI": "10.1515/pjbr-2021-0021", "CorpusId": 233449412}, "corpusId": 233449412, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dde6963c0949eab1e42ded80bfba82b6beb4ba85", "title": "Social robot deception and the culture of trust", "abstract": "Abstract Human beings are deeply social, and both evolutionary traits and cultural constructs encourage cooperation based on trust. Social robots interject themselves @@ -19278,15 +21998,22 @@ interactions: raised general awareness of the issues described in this article are all required to avoid the unfavourable consequences of a general degradation of trust.", "venue": "Paladyn J. Behav. Robotics", "year": 2021, "referenceCount": 80, - "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2021-01-01", "journal": - {"volume": "12", "pages": "276 - 286", "name": "Paladyn, Journal of Behavioral - Robotics"}, "authors": [{"authorId": "119177143", "name": "H. S\u00e6tra"}]}, - {"paperId": "014778fb465796f38f3d243d14c5cb33ac67e82b", "externalIds": {"DBLP": - "journals/annals/Garvey21", "DOI": "10.1109/MAHC.2021.3051686", "CorpusId": - 232153527}, "url": "https://www.semanticscholar.org/paper/014778fb465796f38f3d243d14c5cb33ac67e82b", + "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.degruyter.com/document/doi/10.1515/pjbr-2021-0021/pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2021-01-01", "journal": {"volume": "12", "pages": "276 - 286", "name": "Paladyn, + Journal of Behavioral Robotics"}, "authors": [{"authorId": "119177143", "name": + "H. S\u00e6tra"}]}, {"paperId": "014778fb465796f38f3d243d14c5cb33ac67e82b", + "externalIds": {"DBLP": "journals/annals/Garvey21", "DOI": "10.1109/MAHC.2021.3051686", + "CorpusId": 232153527}, "corpusId": 232153527, "publicationVenue": {"id": + "22ec5dc2-bb5e-4fea-a7dd-61676b6e7f78", "name": "IEEE Annals of the History + of Computing", "type": "journal", "alternate_names": ["IEEE Ann Hist Comput"], + "issn": "1058-6180", "url": "http://muse.jhu.edu/journals/ahc", "alternate_urls": + ["http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", "https://ieeexplore.ieee.org/servlet/opac?punumber=85", + "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", "http://www.computer.org/annals/"]}, + "url": "https://www.semanticscholar.org/paper/014778fb465796f38f3d243d14c5cb33ac67e82b", "title": "The \u201cGeneral Problem Solver\u201d Does Not Exist: Mortimer Taube and the Art of AI Criticism", "abstract": "This article reconfigures the history of artificial intelligence (AI) and its accompanying tradition @@ -19303,14 +22030,15 @@ interactions: work offers an alternative model from which contemporary AI workers and critics can learn much.", "venue": "IEEE Annals of the History of Computing", "year": 2021, "referenceCount": 123, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-01-01", "journal": {"volume": "43", "pages": "60-73", "name": "IEEE - Annals of the History of Computing"}, "authors": [{"authorId": "2052081388", - "name": "Shunryu Colin Garvey"}]}, {"paperId": "031ae0269e16a3d6956ef12b8071911c422c2f69", - "externalIds": {"DOI": "10.1515/jci-2021-0006", "CorpusId": 232085133}, "url": - "https://www.semanticscholar.org/paper/031ae0269e16a3d6956ef12b8071911c422c2f69", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-01-01", "journal": {"volume": + "43", "pages": "60-73", "name": "IEEE Annals of the History of Computing"}, + "authors": [{"authorId": "2052081388", "name": "Shunryu Colin Garvey"}]}, + {"paperId": "031ae0269e16a3d6956ef12b8071911c422c2f69", "externalIds": {"DOI": + "10.1515/jci-2021-0006", "CorpusId": 232085133}, "corpusId": 232085133, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/031ae0269e16a3d6956ef12b8071911c422c2f69", "title": "Radical empiricism and machine learning research", "abstract": "Abstract I contrast the \u201cdata fitting\u201d vs \u201cdata interpreting\u201d approaches to data science along three dimensions: Expediency, Transparency, and Explainability. @@ -19321,25 +22049,33 @@ interactions: generate the data. I argue for restoring balance to data science through a task-dependent symbiosis of fitting and interpreting, guided by the Logic of Causation.", "venue": "", "year": 2021, "referenceCount": 15, "citationCount": - 10, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": - "9", "pages": "78 - 82", "name": "Journal of Causal Inference"}, "authors": - [{"authorId": "145430701", "name": "J. Pearl"}]}, {"paperId": "289ffce760b53ae3e3cea95f010cf43bae798050", - "externalIds": {"DOI": "10.1007/s10704-020-00499-3", "CorpusId": 230112305}, + 10, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.degruyter.com/document/doi/10.1515/jci-2021-0006/pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-01-01", "journal": {"volume": "9", "pages": "78 - 82", "name": "Journal + of Causal Inference"}, "authors": [{"authorId": "145430701", "name": "J. Pearl"}]}, + {"paperId": "289ffce760b53ae3e3cea95f010cf43bae798050", "externalIds": {"DOI": + "10.1007/s10704-020-00499-3", "CorpusId": 230112305}, "corpusId": 230112305, + "publicationVenue": {"id": "ff79e3de-2cc6-4439-b08b-47e9b1aa9506", "name": + "International Journal of Fracture", "type": "journal", "alternate_names": + ["Int J Fract"], "issn": "0376-9429", "url": "https://www.springer.com/journal/10704", + "alternate_urls": ["http://link.springer.com/journal/10704", "http://www.springer.com/journal/10704"]}, "url": "https://www.semanticscholar.org/paper/289ffce760b53ae3e3cea95f010cf43bae798050", "title": "A machine learning based sensitivity analysis of the GTN damage parameters for dynamic fracture propagation in X70 pipeline steel", "abstract": null, "venue": "International Journal of Fracture", "year": 2021, "referenceCount": - 64, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", + 64, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://lirias.kuleuven.be/bitstream/123456789/665763/2/FRAC-D-20-00101_R1.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": "227", "pages": "111-132", "name": "International Journal of Fracture"}, "authors": [{"authorId": "1659127747", "name": "B. Paermentier"}, {"authorId": "49913305", "name": "D. Debruyne"}, {"authorId": "94225027", "name": "R. Talemi"}]}, {"paperId": "e4a674b0d6a4cff27849b26a0db6504f7d438091", "externalIds": {"DBLP": "journals/tvlsi/ParkJKNY21", "MAG": "3107855596", - "DOI": "10.1109/TVLSI.2020.3037166", "CorpusId": 229659989}, "url": "https://www.semanticscholar.org/paper/e4a674b0d6a4cff27849b26a0db6504f7d438091", + "DOI": "10.1109/TVLSI.2020.3037166", "CorpusId": 229659989}, "corpusId": 229659989, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4a674b0d6a4cff27849b26a0db6504f7d438091", "title": "Memory-Augmented Neural Networks on FPGA for Real-Time and Energy-Efficient Question Answering", "abstract": "Memory-augmented neural networks (MANNs) were introduced to handle long-term dependent data efficiently. MANNs have @@ -19362,17 +22098,17 @@ interactions: 28.4 times, respectively, compared with those of CPU.", "venue": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "year": 2021, "referenceCount": 44, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2021-01-01", "journal": {"volume": "29", "pages": "162-175", "name": "IEEE - Transactions on Very Large Scale Integration (VLSI) Systems"}, "authors": - [{"authorId": "2267522", "name": "Seongsik Park"}, {"authorId": "2109766425", - "name": "Jaehee Jang"}, {"authorId": "153274617", "name": "Seijoon Kim"}, - {"authorId": "2972978", "name": "Byunggook Na"}, {"authorId": "2999019", "name": - "Sungroh Yoon"}]}, {"paperId": "221be7ac383f4ef8de8e3bc4e5f2026b5ad0c80b", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2021-01-01", "journal": {"volume": "29", "pages": "162-175", + "name": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"}, + "authors": [{"authorId": "2267522", "name": "Seongsik Park"}, {"authorId": + "2109766425", "name": "Jaehee Jang"}, {"authorId": "153274617", "name": "Seijoon + Kim"}, {"authorId": "2972978", "name": "Byunggook Na"}, {"authorId": "2999019", + "name": "Sungroh Yoon"}]}, {"paperId": "221be7ac383f4ef8de8e3bc4e5f2026b5ad0c80b", "externalIds": {"MAG": "3091327592", "DOI": "10.1364/JOCN.401568", "CorpusId": - 222136295}, "url": "https://www.semanticscholar.org/paper/221be7ac383f4ef8de8e3bc4e5f2026b5ad0c80b", + 222136295}, "corpusId": 222136295, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/221be7ac383f4ef8de8e3bc4e5f2026b5ad0c80b", "title": "On the suitability, requisites, and challenges of machine learning [Invited]", "abstract": "The introduction of 5G, the increasing number of connected devices, and the exponential growth of services relying on connectivity @@ -19391,25 +22127,34 @@ interactions: use-cases applied to multilayer optical networks: cognitive service provisioning and quality of transmission estimation.", "venue": "IEEE/OSA Journal of Optical Communications and Networking", "year": 2021, "referenceCount": 65, "citationCount": - 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2021-01-01", "journal": {"volume": - "13", "pages": "A1-A12", "name": "IEEE/OSA Journal of Optical Communications - and Networking"}, "authors": [{"authorId": "120320915", "name": "R. Morais"}]}, - {"paperId": "1d6a03d2f0964f6b3c85e70cb32fa446c2562dfb", "externalIds": {"DOI": - "10.1016/j.cognition.2020.104533", "CorpusId": 229380592, "PubMed": "33375954"}, + 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-01-01", + "journal": {"volume": "13", "pages": "A1-A12", "name": "IEEE/OSA Journal of + Optical Communications and Networking"}, "authors": [{"authorId": "120320915", + "name": "R. Morais"}]}, {"paperId": "1d6a03d2f0964f6b3c85e70cb32fa446c2562dfb", + "externalIds": {"DOI": "10.1016/j.cognition.2020.104533", "CorpusId": 229380592, + "PubMed": "33375954"}, "corpusId": 229380592, "publicationVenue": {"id": "a3c74f56-9d9e-4dca-b159-87ffb93d8e47", + "name": "Cognition", "type": "journal", "alternate_names": ["Int Conf Augment + Cogn", "International Conference on Augmented Cognition"], "issn": "0010-0277", + "alternate_issns": ["2392-4624"], "url": "https://www.journals.elsevier.com/cognition", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00100277"]}, "url": "https://www.semanticscholar.org/paper/1d6a03d2f0964f6b3c85e70cb32fa446c2562dfb", "title": "The physical basis of memory", "abstract": null, "venue": "Cognition", - "year": 2020, "referenceCount": 92, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2020-12-26", "journal": {"volume": "213", "name": "Cognition"}, "authors": - [{"authorId": "2646034", "name": "C. Gallistel"}]}, {"paperId": "db097e173305b6ee9a5924944b46d1fb82fd585b", - "externalIds": {"MAG": "3110757401", "DBLP": "journals/corr/abs-2012-02592", - "ArXiv": "2012.02592", "DOI": "10.3390/PHILOSOPHIES6010006", "CorpusId": 227305284}, - "url": "https://www.semanticscholar.org/paper/db097e173305b6ee9a5924944b46d1fb82fd585b", + "year": 2020, "referenceCount": 92, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2020-12-26", "journal": {"volume": "213", "name": "Cognition"}, + "authors": [{"authorId": "2646034", "name": "C. Gallistel"}]}, {"paperId": + "db097e173305b6ee9a5924944b46d1fb82fd585b", "externalIds": {"MAG": "3110757401", + "DBLP": "journals/corr/abs-2012-02592", "ArXiv": "2012.02592", "DOI": "10.3390/PHILOSOPHIES6010006", + "CorpusId": 227305284}, "corpusId": 227305284, "publicationVenue": {"id": + "ef4fb77f-61b5-4988-8f50-738b45be5d7e", "name": "Philosophies", "type": "journal", + "issn": "0766-1398", "alternate_issns": ["2409-9287"], "url": "http://www.e-helvetica.nb.admin.ch/directAccess?callnumber=bel-691408", + "alternate_urls": ["http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:ch:bel-691408", + "https://www.mdpi.com/journal/philosophies"]}, "url": "https://www.semanticscholar.org/paper/db097e173305b6ee9a5924944b46d1fb82fd585b", "title": "Transdisciplinary AI Observatory - Retrospective Analyses and Future-Oriented Contradistinctions", "abstract": "In the last years, artificial intelligence (AI) safety gained international recognition in the light of heterogeneous @@ -19433,16 +22178,17 @@ interactions: contradistinctions, we aim to provide future-oriented incentives for constructive dialectics in practical and theoretical AI safety research.", "venue": "Philosophies", "year": 2020, "referenceCount": 248, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Sociology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Sociology", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2020-11-26", "journal": {"volume": "abs/2012.02592", "name": "ArXiv"}, "authors": - [{"authorId": "22617565", "name": "Nadisha-Marie Aliman"}, {"authorId": "3176463", - "name": "L. Kester"}, {"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, - {"paperId": "f087d4e0b7d067879a7d235f3e9936dd6f528859", "externalIds": {"DBLP": - "journals/vjcs/WangCPM21", "MAG": "3096027997", "DOI": "10.1142/s2196888821500111", - "CorpusId": 228813026}, "url": "https://www.semanticscholar.org/paper/f087d4e0b7d067879a7d235f3e9936dd6f528859", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/2409-9287/6/1/6/pdf?version=1610682099", + "status": null}, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-26", "journal": + {"volume": "abs/2012.02592", "name": "ArXiv"}, "authors": [{"authorId": "22617565", + "name": "Nadisha-Marie Aliman"}, {"authorId": "3176463", "name": "L. Kester"}, + {"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "f087d4e0b7d067879a7d235f3e9936dd6f528859", + "externalIds": {"DBLP": "journals/vjcs/WangCPM21", "MAG": "3096027997", "DOI": + "10.1142/s2196888821500111", "CorpusId": 228813026}, "corpusId": 228813026, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f087d4e0b7d067879a7d235f3e9936dd6f528859", "title": "Metaheuristic Optimization of Insulin Infusion Protocols Using Historical Data with Validation Using a Patient Simulator", "abstract": "Metaheuristic search algorithms are used to develop new protocols for optimal intravenous @@ -19459,34 +22205,40 @@ interactions: are further validated and show good performance against various competitive benchmarks using a virtual patient simulator.", "venue": "Vietnam. J. Comput. Sci.", "year": 2020, "referenceCount": 33, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-11-05", "journal": {"volume": "8", "pages": "263-290", - "name": "Vietnam. J. Comput. Sci."}, "authors": [{"authorId": "2109800642", - "name": "Hongyu Wang"}, {"authorId": "4004822", "name": "L. Chepulis"}, {"authorId": - "1500566287", "name": "R. Paul"}, {"authorId": "145809333", "name": "Michael - Mayo"}]}, {"paperId": "91c92904e8ebb5af869badad53dacf465cc769e9", "externalIds": - {"DBLP": "journals/ijsr/DubeA21", "MAG": "3042776525", "PubMedCentral": "7591690", - "DOI": "10.1007/s12369-020-00706-0", "CorpusId": 225095386, "PubMed": "33133302"}, - "url": "https://www.semanticscholar.org/paper/91c92904e8ebb5af869badad53dacf465cc769e9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-05", "journal": + {"volume": "8", "pages": "263-290", "name": "Vietnam. J. Comput. Sci."}, "authors": + [{"authorId": "2109800642", "name": "Hongyu Wang"}, {"authorId": "4004822", + "name": "L. Chepulis"}, {"authorId": "1500566287", "name": "R. Paul"}, {"authorId": + "145809333", "name": "Michael Mayo"}]}, {"paperId": "91c92904e8ebb5af869badad53dacf465cc769e9", + "externalIds": {"DBLP": "journals/ijsr/DubeA21", "MAG": "3042776525", "PubMedCentral": + "7591690", "DOI": "10.1007/s12369-020-00706-0", "CorpusId": 225095386, "PubMed": + "33133302"}, "corpusId": 225095386, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/91c92904e8ebb5af869badad53dacf465cc769e9", "title": "Foundations of Erobotics", "abstract": null, "venue": "Int. J. Soc. Robotics", "year": 2020, "referenceCount": 350, "citationCount": 19, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Sociology", - "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Sociology", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2020-10-28", "journal": - {"volume": "13", "pages": "1205 - 1233", "name": "International Journal of - Social Robotics"}, "authors": [{"authorId": "9936998", "name": "Simon Dub\u00e9"}, - {"authorId": "2081570739", "name": "D. Anctil"}]}, {"paperId": "111da19e8911ba04cdd38fec42587c8b8c976287", + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12369-020-00706-0.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Sociology", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Sociology", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2020-10-28", "journal": {"volume": + "13", "pages": "1205 - 1233", "name": "International Journal of Social Robotics"}, + "authors": [{"authorId": "9936998", "name": "Simon Dub\u00e9"}, {"authorId": + "2081570739", "name": "D. Anctil"}]}, {"paperId": "111da19e8911ba04cdd38fec42587c8b8c976287", "externalIds": {"ArXiv": "2010.03303", "DBLP": "journals/corr/abs-2010-03303", "MAG": "3092243509", "DOI": "10.1016/j.jss.2021.110911", "CorpusId": 222177507}, - "url": "https://www.semanticscholar.org/paper/111da19e8911ba04cdd38fec42587c8b8c976287", + "corpusId": 222177507, "publicationVenue": {"id": "10a4a695-8417-42c7-983d-742df48b3905", + "name": "Journal of Systems and Software", "type": "journal", "alternate_names": + ["J Syst Softw"], "issn": "0164-1212", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description#description", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505732/description", + "http://www.sciencedirect.com/science/journal/01641212"]}, "url": "https://www.semanticscholar.org/paper/111da19e8911ba04cdd38fec42587c8b8c976287", "title": "A ground-truth dataset and classification model for detecting bots in GitHub issue and PR comments", "abstract": null, "venue": "Journal of Systems and Software", "year": 2020, "referenceCount": 73, "citationCount": 35, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2010.03303", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -19495,7 +22247,8 @@ interactions: {"authorId": "2794053", "name": "Alexandre Decan"}, {"authorId": "52307499", "name": "Damien Legay"}, {"authorId": "1794675", "name": "T. Mens"}]}, {"paperId": "06251e6298a0d3ba3f0a26360c726920c7581575", "externalIds": {"ArXiv": "2009.04324", - "DBLP": "conf/nips/CabannesPBR21", "CorpusId": 235359268}, "url": "https://www.semanticscholar.org/paper/06251e6298a0d3ba3f0a26360c726920c7581575", + "DBLP": "conf/nips/CabannesPBR21", "CorpusId": 235359268}, "corpusId": 235359268, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/06251e6298a0d3ba3f0a26360c726920c7581575", "title": "Overcoming the curse of dimensionality with Laplacian regularization in semi-supervised learning", "abstract": "As annotations of data can be scarce in large-scale practical problems, leveraging unlabelled examples is one of @@ -19510,21 +22263,23 @@ interactions: methods, for which we provide realistic computational guidelines in order to make our method usable with large amounts of data.", "venue": "NeurIPS", "year": 2020, "referenceCount": 62, "citationCount": 5, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2020-09-09", "journal": {"pages": "30439-30451"}, "authors": [{"authorId": - "1387995815", "name": "Vivien A. Cabannes"}, {"authorId": "1399505772", "name": - "Loucas Pillaud-Vivien"}, {"authorId": "144570279", "name": "F. Bach"}, {"authorId": - "145383040", "name": "Alessandro Rudi"}]}, {"paperId": "8bb3cffd7d46630273dabfe4e6b88fe8341737ef", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2020-09-09", "journal": {"pages": "30439-30451"}, "authors": + [{"authorId": "1387995815", "name": "Vivien A. Cabannes"}, {"authorId": "1399505772", + "name": "Loucas Pillaud-Vivien"}, {"authorId": "144570279", "name": "F. Bach"}, + {"authorId": "145383040", "name": "Alessandro Rudi"}]}, {"paperId": "8bb3cffd7d46630273dabfe4e6b88fe8341737ef", "externalIds": {"DBLP": "journals/electronicmarkets/NeuhoferMC21", "MAG": "3084159310", "PubMedCentral": "7476646", "DOI": "10.1007/s12525-020-00433-4", - "CorpusId": 221535975}, "url": "https://www.semanticscholar.org/paper/8bb3cffd7d46630273dabfe4e6b88fe8341737ef", + "CorpusId": 221535975}, "corpusId": 221535975, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8bb3cffd7d46630273dabfe4e6b88fe8341737ef", "title": "The impact of artificial intelligence on event experiences: a scenario technique approach", "abstract": null, "venue": "Electron. Mark.", "year": 2020, "referenceCount": 118, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/s12525-020-00433-4.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-07", "journal": {"volume": "31", "pages": "601 - 617", "name": "Electronic @@ -19532,7 +22287,10 @@ interactions: {"authorId": "1933098026", "name": "Bianca Magnus"}, {"authorId": "94570142", "name": "Krzysztof Celuch"}]}, {"paperId": "10bb7e2c54b947fa50e7bb65b0b5c700fe998044", "externalIds": {"DBLP": "journals/corr/abs-2009-03300", "MAG": "3083410900", - "ArXiv": "2009.03300", "CorpusId": 221516475}, "url": "https://www.semanticscholar.org/paper/10bb7e2c54b947fa50e7bb65b0b5c700fe998044", + "ArXiv": "2009.03300", "CorpusId": 221516475}, "corpusId": 221516475, "publicationVenue": + {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", "name": "International Conference + on Learning Representations", "type": "conference", "alternate_names": ["Int + Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, "url": "https://www.semanticscholar.org/paper/10bb7e2c54b947fa50e7bb65b0b5c700fe998044", "title": "Measuring Massive Multitask Language Understanding", "abstract": "We propose a new test to measure a text model''s multitask accuracy. The test covers 57 tasks including elementary mathematics, US history, computer @@ -19548,44 +22306,57 @@ interactions: of a model''s academic and professional understanding, our test can be used to analyze models across many tasks and to identify important shortcomings.", "venue": "International Conference on Learning Representations", "year": 2020, - "referenceCount": 32, "citationCount": 86, "influentialCitationCount": 21, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-09-07", "journal": {"volume": "abs/2009.03300", "name": - "ArXiv"}, "authors": [{"authorId": "3422872", "name": "Dan Hendrycks"}, {"authorId": - "90909974", "name": "Collin Burns"}, {"authorId": "104444594", "name": "Steven - Basart"}, {"authorId": "1380103052", "name": "Andy Zou"}, {"authorId": "16787428", - "name": "Mantas Mazeika"}, {"authorId": "143711382", "name": "D. Song"}, {"authorId": - "5164568", "name": "J. Steinhardt"}]}, {"paperId": "c312e8c2bae0f49616d11a02c2a7bfa15973ddf4", - "externalIds": {"DBLP": "journals/ais/Zemcik21", "MAG": "3082094438", "DOI": - "10.1007/s00146-020-01053-4", "CorpusId": 225313255}, "url": "https://www.semanticscholar.org/paper/c312e8c2bae0f49616d11a02c2a7bfa15973ddf4", + "referenceCount": 32, "citationCount": 91, "influentialCitationCount": 25, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-07", "journal": + {"volume": "abs/2009.03300", "name": "ArXiv"}, "authors": [{"authorId": "3422872", + "name": "Dan Hendrycks"}, {"authorId": "90909974", "name": "Collin Burns"}, + {"authorId": "104444594", "name": "Steven Basart"}, {"authorId": "1380103052", + "name": "Andy Zou"}, {"authorId": "16787428", "name": "Mantas Mazeika"}, {"authorId": + "143711382", "name": "D. Song"}, {"authorId": "5164568", "name": "J. Steinhardt"}]}, + {"paperId": "c312e8c2bae0f49616d11a02c2a7bfa15973ddf4", "externalIds": {"DBLP": + "journals/ais/Zemcik21", "MAG": "3082094438", "DOI": "10.1007/s00146-020-01053-4", + "CorpusId": 225313255}, "corpusId": 225313255, "publicationVenue": {"id": + "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": "Ai & Society", "type": "journal", + "alternate_names": ["Ai Soc"]}, "url": "https://www.semanticscholar.org/paper/c312e8c2bae0f49616d11a02c2a7bfa15973ddf4", "title": "Failure of chatbot Tay was evil, ugliness and uselessness in its nature or do we judge it through cognitive shortcuts and biases?", "abstract": null, "venue": "Ai & Society", "year": 2020, "referenceCount": 8, "citationCount": - 8, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2020-09-02", "journal": {"volume": - "36", "pages": "361-367", "name": "AI & SOCIETY"}, "authors": [{"authorId": + 8, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-02", "journal": + {"volume": "36", "pages": "361-367", "name": "AI & SOCIETY"}, "authors": [{"authorId": "120384924", "name": "Tom\u00e1s Zemc\u00edk"}]}, {"paperId": "557ed446503524c111d3c0d661672001d559b3c2", "externalIds": {"DBLP": "journals/corr/abs-2008-09000", "ArXiv": "2008.09000", "MAG": "3050693196", "DOI": "10.1007/s00894-021-04674-8", "CorpusId": 221186992, - "PubMed": "33543405"}, "url": "https://www.semanticscholar.org/paper/557ed446503524c111d3c0d661672001d559b3c2", + "PubMed": "33543405"}, "corpusId": 221186992, "publicationVenue": {"id": "f5941d4c-ae95-4e56-b615-0f621af56ae0", + "name": "Journal of Molecular Modeling", "type": "journal", "alternate_names": + ["J Mol Model"], "issn": "1430-8622", "alternate_issns": ["0949-183X", "0948-5023"], + "url": "https://link.springer.com/journal/894"}, "url": "https://www.semanticscholar.org/paper/557ed446503524c111d3c0d661672001d559b3c2", "title": "Generative chemistry: drug discovery with deep learning generative models", "abstract": null, "venue": "Journal of Molecular Modeling", "year": - 2020, "referenceCount": 182, "citationCount": 32, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Biology", "Computer - Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 2020, "referenceCount": 182, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2008.09000", + "status": null}, "fieldsOfStudy": ["Medicine", "Biology", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2020-08-20", "journal": {"volume": "27", "name": "Journal of Molecular Modeling"}, "authors": [{"authorId": "11042668", "name": "Yuemin Bian"}, {"authorId": "144465514", "name": "X. Xie"}]}, {"paperId": "52d73ff6823e2339f9aeb4a30a4576d7b42968bc", "externalIds": {"PubMedCentral": "9069665", "MAG": "3083777683", "DOI": "10.1177/17456916211004899", - "CorpusId": 225624737, "PubMed": "34606730"}, "url": "https://www.semanticscholar.org/paper/52d73ff6823e2339f9aeb4a30a4576d7b42968bc", + "CorpusId": 225624737, "PubMed": "34606730"}, "corpusId": 225624737, "publicationVenue": + {"id": "8ec18bc5-9c95-446c-a293-735d7ae1e3e9", "name": "Perspectives on Psychological + Science", "type": "journal", "alternate_names": ["Perspect Psychol Sci"], + "issn": "1745-6916", "url": "http://www.sagepub.com/journals/Journal201964/title", + "alternate_urls": ["https://uk.sagepub.com/en-gb/eur/journal/perspectives-psychological-science", + "http://pps.sagepub.com/", "https://www.jstor.org/journal/perspsycscie", "http://www.jstor.org/action/showPublication?journalCode=perspsycscie"]}, + "url": "https://www.semanticscholar.org/paper/52d73ff6823e2339f9aeb4a30a4576d7b42968bc", "title": "From Text to Thought: How Analyzing Language Can Advance Psychological Science", "abstract": "Humans have been using language for millennia but have only just begun to scratch the surface of what natural language can reveal @@ -19601,8 +22372,9 @@ interactions: with more traditional psychological paradigms. Applying language analysis to large-scale and cross-cultural datasets promises to provide major breakthroughs in psychological science.", "venue": "Perspectives on Psychological Science", - "year": 2020, "referenceCount": 176, "citationCount": 27, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Psychology", "Sociology"], + "year": 2020, "referenceCount": 176, "citationCount": 28, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://pure.mpg.de/pubman/item/item_3244426_5/component/file_3383466/shh2661.pdf", + "status": null}, "fieldsOfStudy": ["Medicine", "Psychology", "Sociology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Sociology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": @@ -19614,7 +22386,11 @@ interactions: "name": "Ryan Drabble"}, {"authorId": "2593387", "name": "Kristen A. Lindquist"}]}, {"paperId": "368a8fbf6304a192a67f614d032510e5a4100552", "externalIds": {"MAG": "3034942609", "DBLP": "journals/csur/WangYKN20", "DOI": "10.1145/3386252", - "CorpusId": 152282330}, "url": "https://www.semanticscholar.org/paper/368a8fbf6304a192a67f614d032510e5a4100552", + "CorpusId": 152282330}, "corpusId": 152282330, "publicationVenue": {"id": + "7b2adce0-d53f-49d6-8784-b0645604fe62", "name": "ACM Computing Surveys", "type": + "journal", "alternate_names": ["ACM Comput Surv"], "issn": "0360-0300", "url": + "http://www.acm.org/pubs/surveys/", "alternate_urls": ["http://portal.acm.org/csur", + "https://csur.acm.org/", "http://csur.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/368a8fbf6304a192a67f614d032510e5a4100552", "title": "Generalizing from a Few Examples", "abstract": "Machine learning has been highly successful in data-intensive applications but is often hampered when the data set is small. Recently, Few-shot Learning (FSL) is proposed @@ -19633,17 +22409,20 @@ interactions: directions, in the aspects of the FSL problem setups, techniques, applications, and theories, are also proposed to provide insights for future research.1", "venue": "ACM Computing Surveys", "year": 2020, "referenceCount": 187, "citationCount": - 371, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2020-06-12", - "journal": {"volume": "53", "pages": "1 - 34", "name": "ACM Computing Surveys - (CSUR)"}, "authors": [{"authorId": "49416601", "name": "Yaqing Wang"}, {"authorId": - "3259992", "name": "Quanming Yao"}, {"authorId": "145193332", "name": "J. - Kwok"}, {"authorId": "1726587", "name": "L. Ni"}]}, {"paperId": "addfdbc534e70ac98819698e6edc6f83a4aa82c7", - "externalIds": {"ArXiv": "2006.07390", "MAG": "3083297807", "PubMedCentral": - "8339439", "DOI": "10.1093/nc/niab014", "CorpusId": 221516681, "PubMed": "34377534"}, - "url": "https://www.semanticscholar.org/paper/addfdbc534e70ac98819698e6edc6f83a4aa82c7", + 385, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2020-06-12", "journal": {"volume": "53", "pages": "1 - + 34", "name": "ACM Computing Surveys (CSUR)"}, "authors": [{"authorId": "49416601", + "name": "Yaqing Wang"}, {"authorId": "3259992", "name": "Quanming Yao"}, {"authorId": + "145193332", "name": "J. Kwok"}, {"authorId": "1726587", "name": "L. Ni"}]}, + {"paperId": "addfdbc534e70ac98819698e6edc6f83a4aa82c7", "externalIds": {"ArXiv": + "2006.07390", "MAG": "3083297807", "PubMedCentral": "8339439", "DOI": "10.1093/nc/niab014", + "CorpusId": 221516681, "PubMed": "34377534"}, "corpusId": 221516681, "publicationVenue": + {"id": "0402af5b-c494-4d05-ac74-a7382c7444fd", "name": "Neuroscience of Consciousness", + "type": "journal", "alternate_names": ["Neurosci Conscious"], "issn": "2057-2107", + "url": "http://nc.oxfordjournals.org/"}, "url": "https://www.semanticscholar.org/paper/addfdbc534e70ac98819698e6edc6f83a4aa82c7", "title": "Formalizing falsification for theories of consciousness across computational hierarchies", "abstract": "Abstract The scientific study of consciousness is currently undergoing a critical transition in the form of a rapidly evolving @@ -19671,21 +22450,26 @@ interactions: or conversely unfalsifiable, scientific theories of consciousness must be invariant with respect to changes that leave the inference procedure fixed at a particular level in a computational hierarchy.", "venue": "Neuroscience - of consciousness", "year": 2020, "referenceCount": 45, "citationCount": 2, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2020-06-12", "journal": {"volume": "2021", "name": "Neuroscience of Consciousness"}, - "authors": [{"authorId": "69873213", "name": "J. Hanson"}, {"authorId": "1946477", - "name": "S. Walker"}]}, {"paperId": "6ece757d968c1b5a7f2ad2a2b3d3441a8df7e195", - "externalIds": {"DBLP": "journals/corr/abs-2006-04013", "MAG": "3033205754", - "ArXiv": "2006.04013", "DOI": "10.1007/s00146-021-01151-x", "CorpusId": 219531429}, - "url": "https://www.semanticscholar.org/paper/6ece757d968c1b5a7f2ad2a2b3d3441a8df7e195", + of Consciousness", "year": 2020, "referenceCount": 45, "citationCount": 3, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://academic.oup.com/nc/article-pdf/2021/2/niab014/39572120/niab014.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-06-12", "journal": + {"volume": "2021", "name": "Neuroscience of Consciousness"}, "authors": [{"authorId": + "69873213", "name": "J. Hanson"}, {"authorId": "1946477", "name": "S. Walker"}]}, + {"paperId": "6ece757d968c1b5a7f2ad2a2b3d3441a8df7e195", "externalIds": {"DBLP": + "journals/corr/abs-2006-04013", "MAG": "3033205754", "ArXiv": "2006.04013", + "DOI": "10.1007/s00146-021-01151-x", "CorpusId": 219531429}, "corpusId": 219531429, + "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", "name": + "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, "url": + "https://www.semanticscholar.org/paper/6ece757d968c1b5a7f2ad2a2b3d3441a8df7e195", "title": "AI from Concrete to Abstract", "abstract": null, "venue": "Ai & Society", "year": 2020, "referenceCount": 87, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/2006.04013", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-06-07", "journal": {"volume": "36", "pages": "877 @@ -19695,7 +22479,7 @@ interactions: "name": "P. Lima"}]}, {"paperId": "183f6bc6b577ab2faf18f3fe123144e02855259e", "externalIds": {"DBLP": "journals/corr/abs-2006-03986", "ArXiv": "2006.03986", "MAG": "3033157075", "DOI": "10.1109/comst.2021.3118271", "CorpusId": 219531190}, - "url": "https://www.semanticscholar.org/paper/183f6bc6b577ab2faf18f3fe123144e02855259e", + "corpusId": 219531190, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/183f6bc6b577ab2faf18f3fe123144e02855259e", "title": "Online Advertising Security: Issues, Taxonomy, and Future Directions", "abstract": "Online advertising has become the backbone of the Internet economy by revolutionizing business marketing. It provides a simple and efficient @@ -19720,6 +22504,7 @@ interactions: towards improving security methods for online advertising systems.", "venue": "IEEE Communications Surveys & Tutorials", "year": 2020, "referenceCount": 187, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/2006.03986", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": @@ -19731,7 +22516,11 @@ interactions: "570163353e0a954d9e5829f6ae92ae09c3225041", "externalIds": {"PubMedCentral": "8205518", "DBLP": "journals/corr/abs-2005-11016", "ArXiv": "2005.11016", "MAG": "3027291647", "DOI": "10.3389/frobt.2021.584075", "CorpusId": 218862857, - "PubMed": "34141726"}, "url": "https://www.semanticscholar.org/paper/570163353e0a954d9e5829f6ae92ae09c3225041", + "PubMed": "34141726"}, "corpusId": 218862857, "publicationVenue": {"id": "2ee61499-676f-46c2-afde-d4c0cb4393e6", + "name": "Frontiers in Robotics and AI", "type": "journal", "alternate_names": + ["Front Robot AI"], "issn": "2296-9144", "url": "https://www.frontiersin.org/journals/robotics-and-ai", + "alternate_urls": ["http://www.frontiersin.org/Robotics_and_AI/archive", "http://www.frontiersin.org/Robotics_and_AI/about", + "http://www.frontiersin.org/Robotics_and_AI"]}, "url": "https://www.semanticscholar.org/paper/570163353e0a954d9e5829f6ae92ae09c3225041", "title": "Reinforcement Learning With Human Advice: A Survey", "abstract": "In this paper, we provide an overview of the existing methods for integrating human advice into a reinforcement learning process. We first propose a taxonomy @@ -19739,30 +22528,41 @@ interactions: We then describe the methods that can be used for interpreting advice when its meaning is not determined beforehand. Finally, we review different approaches for integrating advice into the learning process.", "venue": "Frontiers in - Robotics and AI", "year": 2020, "referenceCount": 158, "citationCount": 16, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2020-05-22", "journal": {"volume": - "8", "name": "Frontiers in Robotics and AI"}, "authors": [{"authorId": "144048526", - "name": "Anis Najar"}, {"authorId": "1680828", "name": "M. Chetouani"}]}, - {"paperId": "05a0f19796dd1c25ce9eda00e43cf4977dcd3810", "externalIds": {"MAG": - "3084211362", "DBLP": "journals/chb/KobisM21", "DOI": "10.1016/j.chb.2020.106553", - "CorpusId": 221562332}, "url": "https://www.semanticscholar.org/paper/05a0f19796dd1c25ce9eda00e43cf4977dcd3810", + Robotics and AI", "year": 2020, "referenceCount": 158, "citationCount": 17, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.frontiersin.org/articles/10.3389/frobt.2021.584075/pdf", "status": + null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2020-05-22", + "journal": {"volume": "8", "name": "Frontiers in Robotics and AI"}, "authors": + [{"authorId": "144048526", "name": "Anis Najar"}, {"authorId": "1680828", + "name": "M. Chetouani"}]}, {"paperId": "05a0f19796dd1c25ce9eda00e43cf4977dcd3810", + "externalIds": {"MAG": "3084211362", "DBLP": "journals/chb/KobisM21", "DOI": + "10.1016/j.chb.2020.106553", "CorpusId": 221562332}, "corpusId": 221562332, + "publicationVenue": {"id": "435ffef1-21df-491d-b69a-605eee1b7f7f", "name": + "Computers in Human Behavior", "type": "journal", "alternate_names": ["Comput + Hum Behav"], "issn": "0747-5632", "url": "https://www.journals.elsevier.com/computers-in-human-behavior", + "alternate_urls": ["https://www.sciencedirect.com/science/article/pii/S0747563216307695", + "http://www.sciencedirect.com/science/journal/07475632"]}, "url": "https://www.semanticscholar.org/paper/05a0f19796dd1c25ce9eda00e43cf4977dcd3810", "title": "Artificial intelligence versus Maya Angelou: Experimental evidence that people cannot differentiate AI-generated from human-written poetry", "abstract": null, "venue": "Computers in Human Behavior", "year": 2020, "referenceCount": - 82, "citationCount": 37, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Psychology", "source": - "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2020-05-20", "journal": {"volume": - "114", "pages": "106553", "name": "Comput. Hum. Behav."}, "authors": [{"authorId": - "47691963", "name": "N. K\u00f6bis"}, {"authorId": "1707029671", "name": "Luca - Mossink"}]}, {"paperId": "884b0fe671f2227d10bcb04ac61767a7371bd64e", "externalIds": - {"DBLP": "journals/corr/abs-2005-07289", "ArXiv": "2005.07289", "MAG": "3025859175", - "DOI": "10.1109/CVPR46437.2021.00859", "CorpusId": 218665674}, "url": "https://www.semanticscholar.org/paper/884b0fe671f2227d10bcb04ac61767a7371bd64e", + 82, "citationCount": 38, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Psychology", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2020-05-20", "journal": {"volume": "114", "pages": "106553", "name": "Comput. + Hum. Behav."}, "authors": [{"authorId": "47691963", "name": "N. K\u00f6bis"}, + {"authorId": "1707029671", "name": "Luca Mossink"}]}, {"paperId": "884b0fe671f2227d10bcb04ac61767a7371bd64e", + "externalIds": {"DBLP": "journals/corr/abs-2005-07289", "ArXiv": "2005.07289", + "MAG": "3025859175", "DOI": "10.1109/CVPR46437.2021.00859", "CorpusId": 218665674}, + "corpusId": 218665674, "publicationVenue": {"id": "768b87bb-8a18-4d9c-a161-4d483c776bcf", + "name": "Computer Vision and Pattern Recognition", "type": "conference", "alternate_names": + ["CVPR", "Comput Vis Pattern Recognit"], "issn": "1063-6919", "url": "https://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000147", + "alternate_urls": ["https://en.wikipedia.org/wiki/Conference_on_Computer_Vision_and_Pattern_Recognition"]}, + "url": "https://www.semanticscholar.org/paper/884b0fe671f2227d10bcb04ac61767a7371bd64e", "title": "Taskology: Utilizing Task Relations at Scale", "abstract": "Many computer vision tasks address the problem of scene understanding and are naturally interrelated e.g. object classification, detection, scene segmentation, depth @@ -19780,7 +22580,8 @@ interactions: and 3D detection in point clouds. We observe improved performance across these tasks, especially in the low-label regime.", "venue": "Computer Vision and Pattern Recognition", "year": 2020, "referenceCount": 94, "citationCount": - 12, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": + 12, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/2005.07289", "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2020-05-14", @@ -19793,21 +22594,23 @@ interactions: {"authorId": "145426908", "name": "A. Angelova"}, {"authorId": "152894252", "name": "A. Gordon"}]}, {"paperId": "6daffd44d4c71d8423e021e8d516487a98426f7d", "externalIds": {"MAG": "3019998525", "DOI": "10.1007/978-981-15-9712-1_31", - "CorpusId": 225939734}, "url": "https://www.semanticscholar.org/paper/6daffd44d4c71d8423e021e8d516487a98426f7d", + "CorpusId": 225939734}, "corpusId": 225939734, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6daffd44d4c71d8423e021e8d516487a98426f7d", "title": "Natural Language Processing: History, Evolution, Application, and Future Work", "abstract": null, "venue": "Lecture Notes in Networks and Systems", "year": 2020, "referenceCount": 17, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2020-04-23", "journal": {"name": "Lecture Notes in Networks and Systems"}, - "authors": [{"authorId": "2951543", "name": "P. Johri"}, {"authorId": "2168094026", - "name": "Mukul Kathait"}, {"authorId": "33190741", "name": "Munish Sabharwal"}, - {"authorId": "1403383401", "name": "A. Al-Taani"}, {"authorId": "102254088", - "name": "S. Suvanov"}]}, {"paperId": "3ed06aca3b25a9af89f08b949753372d29647a10", - "externalIds": {"ACL": "2021.humeval-1.3", "DBLP": "journals/corr/abs-2004-10450", - "MAG": "3020264409", "ArXiv": "2004.10450", "CorpusId": 216056240}, "url": - "https://www.semanticscholar.org/paper/3ed06aca3b25a9af89f08b949753372d29647a10", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2020-04-23", "journal": {"name": + "Lecture Notes in Networks and Systems"}, "authors": [{"authorId": "2951543", + "name": "P. Johri"}, {"authorId": "2168094026", "name": "Mukul Kathait"}, + {"authorId": "33190741", "name": "Munish Sabharwal"}, {"authorId": "1403383401", + "name": "A. Al-Taani"}, {"authorId": "102254088", "name": "S. Suvanov"}]}, + {"paperId": "3ed06aca3b25a9af89f08b949753372d29647a10", "externalIds": {"ACL": + "2021.humeval-1.3", "DBLP": "journals/corr/abs-2004-10450", "MAG": "3020264409", + "ArXiv": "2004.10450", "CorpusId": 216056240}, "corpusId": 216056240, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3ed06aca3b25a9af89f08b949753372d29647a10", "title": "Trading Off Diversity and Quality in Natural Language Generation", "abstract": "For open-ended language generation tasks such as storytelling or dialogue, choosing the right decoding algorithm is vital for controlling @@ -19821,17 +22624,21 @@ interactions: find that when diversity is a priority, all methods perform similarly, but when quality is viewed as more important, nucleus sampling (Holtzman et al., 2019) outperforms all other evaluated decoding algorithms.", "venue": "HUMEVAL", - "year": 2020, "referenceCount": 39, "citationCount": 33, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-04-22", "journal": {"volume": "abs/2004.10450", "name": - "ArXiv"}, "authors": [{"authorId": "66194020", "name": "Hugh Zhang"}, {"authorId": - "40620532", "name": "Daniel Duckworth"}, {"authorId": "7975935", "name": "Daphne - Ippolito"}, {"authorId": "2072676", "name": "Arvind Neelakantan"}]}, {"paperId": - "697586e9404b69bebbad312836ba200fde79d21d", "externalIds": {"ArXiv": "2004.03541", - "PubMedCentral": "8052953", "MAG": "3015208662", "DOI": "10.1093/nc/niab001", - "CorpusId": 215238327, "PubMed": "33889423"}, "url": "https://www.semanticscholar.org/paper/697586e9404b69bebbad312836ba200fde79d21d", + "year": 2020, "referenceCount": 39, "citationCount": 35, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-04-22", "journal": + {"volume": "abs/2004.10450", "name": "ArXiv"}, "authors": [{"authorId": "66194020", + "name": "Hugh Zhang"}, {"authorId": "40620532", "name": "Daniel Duckworth"}, + {"authorId": "7975935", "name": "Daphne Ippolito"}, {"authorId": "2072676", + "name": "Arvind Neelakantan"}]}, {"paperId": "697586e9404b69bebbad312836ba200fde79d21d", + "externalIds": {"ArXiv": "2004.03541", "PubMedCentral": "8052953", "MAG": + "3015208662", "DOI": "10.1093/nc/niab001", "CorpusId": 215238327, "PubMed": + "33889423"}, "corpusId": 215238327, "publicationVenue": {"id": "0402af5b-c494-4d05-ac74-a7382c7444fd", + "name": "Neuroscience of Consciousness", "type": "journal", "alternate_names": + ["Neurosci Conscious"], "issn": "2057-2107", "url": "http://nc.oxfordjournals.org/"}, + "url": "https://www.semanticscholar.org/paper/697586e9404b69bebbad312836ba200fde79d21d", "title": "Falsification and consciousness", "abstract": "Abstract The search for a scientific theory of consciousness should result in theories that are falsifiable. However, here we show that falsification is especially problematic @@ -19851,29 +22658,35 @@ interactions: be determined by report or behavior. Finally, we explore possible ways out of this dilemma.", "venue": "Neuroscience of Consciousness", "year": 2020, "referenceCount": 90, "citationCount": 16, "influentialCitationCount": 4, - "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Biology", "Psychology"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "external"}, {"category": "Psychology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/nc/article-pdf/2021/1/niab001/37119674/niab001.pdf", + "status": null}, "fieldsOfStudy": ["Medicine", "Biology", "Psychology"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Psychology", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-04-07", "journal": {"volume": "2021", "name": "Neuroscience of Consciousness"}, "authors": [{"authorId": "102239495", "name": "Johannes Kleiner"}, {"authorId": "30306962", "name": "Erik P. Hoel"}]}, {"paperId": "663c3cef4ff7c1eb2a1d4f7fa9f94c6d7c47eeb9", "externalIds": {"DBLP": "journals/electronicmarkets/MoussawiKB21", "MAG": "3014007670", "DOI": "10.1007/s12525-020-00411-w", "CorpusId": 216194438}, + "corpusId": 216194438, "publicationVenue": {"id": "21b370ff-cb87-4599-b39a-25cd5a1b03cb", + "name": "Electronic Markets", "type": "journal", "alternate_names": ["Electron + Mark"], "issn": "1019-6781", "url": "http://www.metapress.com/openurl.asp?genre=journal&issn=1019-6781", + "alternate_urls": ["http://www.electronicmarkets.org/", "https://link.springer.com/journal/12525"]}, "url": "https://www.semanticscholar.org/paper/663c3cef4ff7c1eb2a1d4f7fa9f94c6d7c47eeb9", "title": "How perceptions of intelligence and anthropomorphism affect adoption of personal intelligent agents", "abstract": null, "venue": "Electronic Markets", - "year": 2020, "referenceCount": 148, "citationCount": 50, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-03-27", "journal": {"volume": "", "pages": "1-22", - "name": "Electronic Markets"}, "authors": [{"authorId": "2252360", "name": - "Sara Moussawi"}, {"authorId": "1750816", "name": "M. Koufaris"}, {"authorId": - "1398858131", "name": "R. Benbunan-Fich"}]}, {"paperId": "0a13d18d27315a67d3f078112ce528cb25620590", - "externalIds": {"MAG": "3011145296", "DOI": "10.1101/2020.03.14.992263", "CorpusId": - 214725406}, "url": "https://www.semanticscholar.org/paper/0a13d18d27315a67d3f078112ce528cb25620590", + "year": 2020, "referenceCount": 148, "citationCount": 54, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-03-27", "journal": + {"volume": "", "pages": "1-22", "name": "Electronic Markets"}, "authors": + [{"authorId": "2252360", "name": "Sara Moussawi"}, {"authorId": "1750816", + "name": "M. Koufaris"}, {"authorId": "1398858131", "name": "R. Benbunan-Fich"}]}, + {"paperId": "0a13d18d27315a67d3f078112ce528cb25620590", "externalIds": {"MAG": + "3011145296", "DOI": "10.1101/2020.03.14.992263", "CorpusId": 214725406}, + "corpusId": 214725406, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0a13d18d27315a67d3f078112ce528cb25620590", "title": "Morphognostic honey bees communicating nectar location through dance movements", "abstract": "Honey bees are social insects that forage for flower nectar cooperatively. When an individual forager discovers a flower patch @@ -19892,13 +22705,20 @@ interactions: of Morphognosis foraging performance with that of an artificial recurrent neural network is also presented.", "venue": "bioRxiv", "year": 2020, "referenceCount": 53, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.biorxiv.org/content/biorxiv/early/2021/04/22/2020.03.14.992263.full.pdf", + "status": null}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-03-17", "journal": {"name": "bioRxiv"}, "authors": [{"authorId": "1717214", "name": "Thomas E. Portegys"}]}, {"paperId": "fcae5999b0e7e8dd7fc86b78ee6a66b7c4707b63", "externalIds": {"DBLP": "journals/tem/Hutchinson21", "MAG": "3012234211", "DOI": "10.1109/TEM.2020.2977222", - "CorpusId": 216226787}, "url": "https://www.semanticscholar.org/paper/fcae5999b0e7e8dd7fc86b78ee6a66b7c4707b63", + "CorpusId": 216226787}, "corpusId": 216226787, "publicationVenue": {"id": + "899831a7-9af2-403b-b185-fa56c8634454", "name": "IEEE transactions on engineering + management", "type": "journal", "alternate_names": ["IEEE Transactions on + Engineering Management", "IEEE Trans Eng Manag", "IEEE trans eng manag"], + "issn": "0018-9391", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=17", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=17"]}, + "url": "https://www.semanticscholar.org/paper/fcae5999b0e7e8dd7fc86b78ee6a66b7c4707b63", "title": "Reinventing Innovation Management: The Impact of Self-Innovating Artificial Intelligence", "abstract": "Through recent leaps in application, artificial intelligence (AI) has become one of the most promising digital @@ -19920,14 +22740,15 @@ interactions: potential avenues for further research in this intriguing domain.", "venue": "IEEE transactions on engineering management", "year": 2020, "referenceCount": 128, "citationCount": 15, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2020-03-13", "journal": - {"volume": "68", "pages": "628-639", "name": "IEEE Transactions on Engineering - Management"}, "authors": [{"authorId": "152651804", "name": "Philip Hutchinson"}]}, - {"paperId": "f31c4463918906cabe1853c72e7e8e4e9d841ef6", "externalIds": {"DBLP": - "journals/jors/Ormerod21", "MAG": "3008324209", "DOI": "10.1080/01605682.2019.1650619", - "CorpusId": 213470660}, "url": "https://www.semanticscholar.org/paper/f31c4463918906cabe1853c72e7e8e4e9d841ef6", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2020-03-13", "journal": {"volume": "68", "pages": "628-639", "name": "IEEE + Transactions on Engineering Management"}, "authors": [{"authorId": "152651804", + "name": "Philip Hutchinson"}]}, {"paperId": "f31c4463918906cabe1853c72e7e8e4e9d841ef6", + "externalIds": {"DBLP": "journals/jors/Ormerod21", "MAG": "3008324209", "DOI": + "10.1080/01605682.2019.1650619", "CorpusId": 213470660}, "corpusId": 213470660, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f31c4463918906cabe1853c72e7e8e4e9d841ef6", "title": "The fitness and survival of the OR profession in the age of artificial intelligence", "abstract": "Abstract How will AI affect OR practice? In OR we aspire to be logical, and therefore our behaviours should be relatively @@ -19947,15 +22768,15 @@ interactions: of efficacy and cost. The OR community needs to get involved more deeply in AI; it has the relevant expertise to do so.", "venue": "J. Oper. Res. Soc.", "year": 2020, "referenceCount": 94, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2020-02-17", "journal": {"volume": "72", "pages": "4 - 22", "name": "Journal - of the Operational Research Society"}, "authors": [{"authorId": "1769668", - "name": "R. Ormerod"}]}, {"paperId": "549cc4fd07de9200a1d510668d21114d50523aa8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2020-02-17", "journal": {"volume": "72", "pages": "4 - + 22", "name": "Journal of the Operational Research Society"}, "authors": [{"authorId": + "1769668", "name": "R. Ormerod"}]}, {"paperId": "549cc4fd07de9200a1d510668d21114d50523aa8", "externalIds": {"ArXiv": "1909.01095", "DOI": "10.2139/ssrn.3453632", "CorpusId": - 237267347}, "url": "https://www.semanticscholar.org/paper/549cc4fd07de9200a1d510668d21114d50523aa8", + 237267347}, "corpusId": 237267347, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/549cc4fd07de9200a1d510668d21114d50523aa8", "title": "Defining the scope of AI regulations", "abstract": "The paper argues that policy makers should not use the term artificial intelligence (AI) to define the material scope of AI regulations. The argument is developed by @@ -19972,13 +22793,20 @@ interactions: Finally, the paper discusses the extent to which this approach can also be applied to more advanced AI systems.", "venue": "", "year": 2019, "referenceCount": 106, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2019-08-26", - "journal": {"name": "EngRN: Computer-Aided Engineering (Topic)"}, "authors": - [{"authorId": "1388301316", "name": "Jonas Schuett"}]}, {"paperId": "cc0580add283199c2d27c33b934c14e9b6ce9cb4", - "externalIds": {"MAG": "2973452142", "DOI": "10.1162/posc_a_00377", "CorpusId": - 203700603}, "url": "https://www.semanticscholar.org/paper/cc0580add283199c2d27c33b934c14e9b6ce9cb4", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2019-08-26", "journal": {"name": "EngRN: Computer-Aided Engineering (Topic)"}, + "authors": [{"authorId": "1388301316", "name": "Jonas Schuett"}]}, {"paperId": + "cc0580add283199c2d27c33b934c14e9b6ce9cb4", "externalIds": {"MAG": "2973452142", + "DOI": "10.1162/posc_a_00377", "CorpusId": 203700603}, "corpusId": 203700603, + "publicationVenue": {"id": "ce255c03-adb2-4aa5-b40b-af286d9e3a68", "name": + "Perspectives in Science", "type": "journal", "alternate_names": ["Perspectives + on Science", "Perspect Sci"], "issn": "2213-0209", "alternate_issns": ["1063-6145"], + "url": "https://www.journals.elsevier.com/perspectives-in-science/", "alternate_urls": + ["http://www.mitpressjournals.org/loi/posc", "https://www.mitpressjournals.org/loi/posc", + "https://muse.jhu.edu/journal/163", "http://muse.jhu.edu/journals/perspectives_on_science/"]}, + "url": "https://www.semanticscholar.org/paper/cc0580add283199c2d27c33b934c14e9b6ce9cb4", "title": "Exploring Minds: Modes of Modeling and Simulation in Artificial Intelligence", "abstract": "Abstract The aim of this paper is to grasp the relevant distinctions between various ways in which models and simulations @@ -20005,24 +22833,34 @@ interactions: how available computational concepts and simulational resources contribute to the modes of representation and theory development in AI research\u2014and what made that research program uniquely dependent on them.", "venue": "Perspectives - on Science", "year": 2019, "referenceCount": 99, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2019-08-05", - "journal": {"volume": "29", "pages": "409-435", "name": "Perspectives on Science"}, - "authors": [{"authorId": "22851126", "name": "Hajo Greif"}]}, {"paperId": - "9cb7e69d77e0772bba022016033851f619a02a82", "externalIds": {"MAG": "2946798032", - "DOI": "10.1007/s13347-021-00454-7", "CorpusId": 181907131}, "url": "https://www.semanticscholar.org/paper/9cb7e69d77e0772bba022016033851f619a02a82", + in Science", "year": 2019, "referenceCount": 98, "citationCount": 1, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2019-08-05", "journal": {"volume": "29", "pages": + "409-435", "name": "Perspectives on Science"}, "authors": [{"authorId": "22851126", + "name": "Hajo Greif"}]}, {"paperId": "9cb7e69d77e0772bba022016033851f619a02a82", + "externalIds": {"MAG": "2946798032", "DOI": "10.1007/s13347-021-00454-7", + "CorpusId": 181907131}, "corpusId": 181907131, "publicationVenue": {"id": + "bd7cf538-b981-449d-9e6c-64fa64047126", "name": "Philosophy & Technology", + "type": "journal", "alternate_names": ["Philos Technol"], "issn": "2210-5433", + "url": "https://www.springer.com/philosophy/epistemology+and+philosophy+of+science/journal/13347", + "alternate_urls": ["https://link.springer.com/journal/13347"]}, "url": "https://www.semanticscholar.org/paper/9cb7e69d77e0772bba022016033851f619a02a82", "title": "Group Agency and Artificial Intelligence", "abstract": null, "venue": "Philosophy & Technology", "year": 2019, "referenceCount": 84, "citationCount": - 11, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2019-05-16", "journal": {"name": "Philosophy - & Technology"}, "authors": [{"authorId": "144451484", "name": "C. List"}]}, - {"paperId": "df6ae7c951a4ae2b548c86768cd94be28adee7f3", "externalIds": {"DBLP": - "journals/ijhci/ChavesG21", "MAG": "2939803556", "ArXiv": "1904.02743", "DOI": - "10.1080/10447318.2020.1841438", "CorpusId": 102350801}, "url": "https://www.semanticscholar.org/paper/df6ae7c951a4ae2b548c86768cd94be28adee7f3", + 12, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007/s13347-021-00454-7.pdf", + "status": null}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2019-05-16", "journal": + {"name": "Philosophy & Technology"}, "authors": [{"authorId": "144451484", + "name": "C. List"}]}, {"paperId": "df6ae7c951a4ae2b548c86768cd94be28adee7f3", + "externalIds": {"DBLP": "journals/ijhci/ChavesG21", "MAG": "2939803556", "ArXiv": + "1904.02743", "DOI": "10.1080/10447318.2020.1841438", "CorpusId": 102350801}, + "corpusId": 102350801, "publicationVenue": {"id": "2669396b-fea2-4bef-bf3f-7ddc0967feed", + "name": "International journal of human computer interactions", "type": "journal", + "alternate_names": ["Int j hum comput interact"], "issn": "2180-1347", "url": + "http://www.cscjournals.org/"}, "url": "https://www.semanticscholar.org/paper/df6ae7c951a4ae2b548c86768cd94be28adee7f3", "title": "How Should My Chatbot Interact? A Survey on Social Characteristics in Human\u2013Chatbot Interaction Design", "abstract": "ABSTRACT Chatbots\u2019 growing popularity has brought new challenges to HCI, having changed the patterns @@ -20039,7 +22877,8 @@ interactions: one another. Our results provide relevant opportunities to both researchers and designers to advance human\u2013chatbot interactions.", "venue": "International journal of human computer interactions", "year": 2019, "referenceCount": 224, - "citationCount": 113, "influentialCitationCount": 7, "isOpenAccess": true, + "citationCount": 116, "influentialCitationCount": 8, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1904.02743", "status": null}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], @@ -20048,7 +22887,8 @@ interactions: of Human\u2013Computer Interaction"}, "authors": [{"authorId": "123881688", "name": "A. Chaves"}, {"authorId": "143911967", "name": "M. Gerosa"}]}, {"paperId": "e8e04363925bdddc99cb954e9e2cdac42710bfdd", "externalIds": {"MAG": "2904554166", - "DOI": "10.20906/CPS/CBA2018-0986", "CorpusId": 189331848}, "url": "https://www.semanticscholar.org/paper/e8e04363925bdddc99cb954e9e2cdac42710bfdd", + "DOI": "10.20906/CPS/CBA2018-0986", "CorpusId": 189331848}, "corpusId": 189331848, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e8e04363925bdddc99cb954e9e2cdac42710bfdd", "title": "CLASSIFICA\u00c7\u00c3O DE DOCUMENTOS DE PATENTES USANDO O DOC2VEC", "abstract": "As patentes sao consideradas fontes extremamente uteis para atividades \nrelacionadas a busca e analise de informacoes e para a geracaoo de novos @@ -20067,16 +22907,20 @@ interactions: \ncom outros modelos de aprendizagem de maquina presentes na literatura.", "venue": "Administra\u00e7\u00e3o: Princ\u00edpios de Administra\u00e7\u00e3o e Suas Tend\u00eancias - Volume 2", "year": 2017, "referenceCount": 19, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], - "publicationTypes": null, "publicationDate": "2017-12-15", "journal": {"name": - "Administra\u00e7\u00e3o: Princ\u00edpios de Administra\u00e7\u00e3o e Suas - Tend\u00eancias - Volume 2"}, "authors": [{"authorId": "148219045", "name": - "Tamara Aguiar Tavares Mascaremhas"}, {"authorId": "32294745", "name": "Andr\u00e9ia - Gentil Bonfante"}, {"authorId": "146126221", "name": "A. W. Mascarenhas"}]}, - {"paperId": "f7d2879cd047bf36a85fad050c16445269db6970", "externalIds": {"ArXiv": - "1607.00913", "MAG": "2463389769", "DBLP": "journals/jair/AlfonsecaCACAR21", - "DOI": "10.1613/jair.1.12202", "CorpusId": 13370840}, "url": "https://www.semanticscholar.org/paper/f7d2879cd047bf36a85fad050c16445269db6970", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "external"}], "publicationTypes": null, "publicationDate": "2017-12-15", + "journal": {"name": "Administra\u00e7\u00e3o: Princ\u00edpios de Administra\u00e7\u00e3o + e Suas Tend\u00eancias - Volume 2"}, "authors": [{"authorId": "148219045", + "name": "Tamara Aguiar Tavares Mascaremhas"}, {"authorId": "32294745", "name": + "Andr\u00e9ia Gentil Bonfante"}, {"authorId": "146126221", "name": "A. W. + Mascarenhas"}]}, {"paperId": "f7d2879cd047bf36a85fad050c16445269db6970", "externalIds": + {"ArXiv": "1607.00913", "MAG": "2463389769", "DBLP": "journals/jair/AlfonsecaCACAR21", + "DOI": "10.1613/jair.1.12202", "CorpusId": 13370840}, "corpusId": 13370840, + "publicationVenue": {"id": "aef12dca-60a0-4ca3-819b-cad26d309d4e", "name": + "Journal of Artificial Intelligence Research", "type": "journal", "alternate_names": + ["JAIR", "J Artif Intell Res", "The Journal of Artificial Intelligence Research"], + "issn": "1076-9757", "url": "http://www.jair.org/"}, "url": "https://www.semanticscholar.org/paper/f7d2879cd047bf36a85fad050c16445269db6970", "title": "Superintelligence cannot be contained: Lessons from Computability Theory", "abstract": "Superintelligence is a hypothetical agent that possesses intelligence far surpassing that of the brightest and most gifted human minds. @@ -20092,17 +22936,18 @@ interactions: simulations of such a program, something theoretically (and practically) infeasible.", "venue": "Journal of Artificial Intelligence Research", "year": 2016, "referenceCount": 59, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-07-04", "journal": {"volume": "70", "pages": "65-76", "name": "J. Artif. - Intell. Res."}, "authors": [{"authorId": "2330521", "name": "M. Alfonseca"}, - {"authorId": "145512647", "name": "Manuel Cebrian"}, {"authorId": "2115339434", - "name": "Antonio Fern\u00e1ndez"}, {"authorId": "2362022", "name": "Lorenzo - Coviello"}, {"authorId": "2919118", "name": "A. Abeliuk"}, {"authorId": "1705156", - "name": "I. Rahwan"}]}, {"paperId": "947843af1a49548fa0cfd8910808df61c50d8b35", + "openAccessPdf": {"url": "https://jair.org/index.php/jair/article/download/12202/26642", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2016-07-04", "journal": {"volume": "70", "pages": "65-76", + "name": "J. Artif. Intell. Res."}, "authors": [{"authorId": "2330521", "name": + "M. Alfonseca"}, {"authorId": "145512647", "name": "Manuel Cebrian"}, {"authorId": + "2115339434", "name": "Antonio Fern\u00e1ndez"}, {"authorId": "2362022", "name": + "Lorenzo Coviello"}, {"authorId": "2919118", "name": "A. Abeliuk"}, {"authorId": + "1705156", "name": "I. Rahwan"}]}, {"paperId": "947843af1a49548fa0cfd8910808df61c50d8b35", "externalIds": {"DOI": "10.1080/04597222.2015.996369", "CorpusId": 219629394}, - "url": "https://www.semanticscholar.org/paper/947843af1a49548fa0cfd8910808df61c50d8b35", + "corpusId": 219629394, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/947843af1a49548fa0cfd8910808df61c50d8b35", "title": "Reference", "abstract": "These values were discussed in 1967 by the IAG and adopted by the IUGG as the basis of a ''Geodetic Reference System 1967''. Although at that time better values of these constants were available, @@ -20120,27 +22965,28 @@ interactions: these derived parameters, a mean rotational speed of the Earth at 1900.0, CD, had to be defined. It is:", "venue": "Digital Theology: A Computer Science Perspective", "year": 2015, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-01-01", "journal": {"volume": "115", "pages": "501 - 504", "name": "The - Military Balance"}, "authors": [{"authorId": "1982090837", "name": "\u010csob - Chrudim"}, {"authorId": "1982090667", "name": "I. Foto"}, {"authorId": "1982129241", - "name": "Pavel Van \u010dura"}, {"authorId": "1982124696", "name": "Rubena - Hradec Kr\u00e1lov\u00e9"}, {"authorId": "2142413397", "name": "A. Rosa"}, - {"authorId": "1982295677", "name": "Kau\u010duk Kralupy"}, {"authorId": "1982090754", - "name": "P. Hulin"}, {"authorId": "1982090666", "name": "ekolog podniku"}, - {"authorId": "1981960205", "name": "Dias Turnov"}, {"authorId": "1981960293", - "name": "Ostatn\u00ed rizikov\u00e9 anal\u00fdzy"}]}, {"paperId": null, "externalIds": - null, "url": null, "title": "Data de recec\u0327a\u0303o: 05/04/2021 Data - de aceitac\u0327a\u0303o: 24/05/2021 O POTENCIAL DA INTELIGE\u0302NCIA ARTIFICIAL - PARA O DESENVOLVIMENTO E COMPETITIVIDADE DAS EMPRESAS: UMA SCOPING REVIEW - THE POTENTIAL OF ARTIFICIAL INTELLIGENCE FOR THE DEVELOPMENT AND COMPETITIVENESS - OF COMPANIES: A SCOPING REVIEW", "abstract": null, "venue": "", "year": 2021, - "referenceCount": null, "citationCount": null, "influentialCitationCount": - null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "06b99f9d06d95dc3ec2335d5600ca0bd6176db80", "externalIds": - {"CorpusId": 250987520}, "url": "https://www.semanticscholar.org/paper/06b99f9d06d95dc3ec2335d5600ca0bd6176db80", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2015-01-01", "journal": {"volume": "115", "pages": "501 + - 504", "name": "The Military Balance"}, "authors": [{"authorId": "1982090837", + "name": "\u010csob Chrudim"}, {"authorId": "1982090667", "name": "I. Foto"}, + {"authorId": "1982129241", "name": "Pavel Van \u010dura"}, {"authorId": "1982124696", + "name": "Rubena Hradec Kr\u00e1lov\u00e9"}, {"authorId": "2142413397", "name": + "A. Rosa"}, {"authorId": "1982295677", "name": "Kau\u010duk Kralupy"}, {"authorId": + "1982090754", "name": "P. Hulin"}, {"authorId": "1982090666", "name": "ekolog + podniku"}, {"authorId": "1981960205", "name": "Dias Turnov"}, {"authorId": + "1981960293", "name": "Ostatn\u00ed rizikov\u00e9 anal\u00fdzy"}]}, {"paperId": + null, "externalIds": null, "corpusId": "251391893", "publicationVenue": null, + "url": null, "title": "Data de recec\u0327a\u0303o: 05/04/2021 Data de aceitac\u0327a\u0303o: + 24/05/2021 O POTENCIAL DA INTELIGE\u0302NCIA ARTIFICIAL PARA O DESENVOLVIMENTO + E COMPETITIVIDADE DAS EMPRESAS: UMA SCOPING REVIEW THE POTENTIAL OF ARTIFICIAL + INTELLIGENCE FOR THE DEVELOPMENT AND COMPETITIVENESS OF COMPANIES: A SCOPING + REVIEW", "abstract": null, "venue": "", "year": 2021, "referenceCount": null, + "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "06b99f9d06d95dc3ec2335d5600ca0bd6176db80", "externalIds": {"CorpusId": 250987520}, + "corpusId": 250987520, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/06b99f9d06d95dc3ec2335d5600ca0bd6176db80", "title": "State-of-the-Art Review Introduction to arti\ufb01cial intelligence in ultrasound imaging in obstetrics and gynecology", "abstract": "Arti\ufb01cial intelligence (AI) uses data and algorithms to aim to draw conclusions that @@ -20164,12 +23010,13 @@ interactions: to medical professionals in the \ufb01eld of ultrasound. We believe that wider knowledge of AI will help accelerate its integration into healthcare.", "venue": "", "year": 2021, "referenceCount": 73, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": null, "authors": [{"authorId": "2058972667", "name": "J. A. Noble"}, - {"authorId": "2635802", "name": "A. Papageorghiou"}]}, {"paperId": "cf7cdf0f421a37bbc9358ab74a2f86d26617b64e", - "externalIds": {"CorpusId": 250552348}, "url": "https://www.semanticscholar.org/paper/cf7cdf0f421a37bbc9358ab74a2f86d26617b64e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "2058972667", "name": "J. + A. Noble"}, {"authorId": "2635802", "name": "A. Papageorghiou"}]}, {"paperId": + "cf7cdf0f421a37bbc9358ab74a2f86d26617b64e", "externalIds": {"CorpusId": 250552348}, + "corpusId": 250552348, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cf7cdf0f421a37bbc9358ab74a2f86d26617b64e", "title": "The challenges of artificial intelligence for Moroccan companies?", "abstract": "From deep learning to cognitive technology, artificial intelligence is everywhere in digital communication. It allows us to react more accurately @@ -20182,13 +23029,14 @@ interactions: its practices in relation to a country like Morocco in the different sectors that make up its economy, especially those focused on customer relations and experience.", "venue": "", "year": 2021, "referenceCount": 18, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2094569014", "name": "Mkik Marouane"}, {"authorId": "123338531", - "name": "Salwa Mkik"}, {"authorId": "2126214668", "name": "Elfazazi Kaoutar"}]}, - {"paperId": "d615689b556146eb5ec0adbf9f977d2eab8cbc19", "externalIds": {"DBLP": - "conf/iwssl/000121", "CorpusId": 248923345}, "url": "https://www.semanticscholar.org/paper/d615689b556146eb5ec0adbf9f977d2eab8cbc19", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2094569014", "name": "Mkik Marouane"}, + {"authorId": "123338531", "name": "Salwa Mkik"}, {"authorId": "2126214668", + "name": "Elfazazi Kaoutar"}]}, {"paperId": "d615689b556146eb5ec0adbf9f977d2eab8cbc19", + "externalIds": {"DBLP": "conf/iwssl/000121", "CorpusId": 248923345}, "corpusId": + 248923345, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d615689b556146eb5ec0adbf9f977d2eab8cbc19", "title": "Artificial Emotions for Rapid Online Explorative Learning", "abstract": "For decades, A.I. has been able to produce impressive results on hard problems, such as games playing in synthetic environments, but have had di\ufb03culty @@ -20208,24 +23056,26 @@ interactions: an attempt to bridge the gap between high order reasoning and base-level support for motivation and learning in robots.", "venue": "IWSSL", "year": 2021, "referenceCount": 45, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "63-83"}, "authors": [{"authorId": "2059560627", - "name": "P. Robertson"}]}, {"paperId": "bb0e340f8698be1764c291275ac2b29e8f424610", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "63-83"}, "authors": [{"authorId": + "2059560627", "name": "P. Robertson"}]}, {"paperId": "bb0e340f8698be1764c291275ac2b29e8f424610", "externalIds": {"DBLP": "conf/icqe/CarmonaGM21", "DOI": "10.1007/978-3-030-93859-8_23", - "CorpusId": 245896771}, "url": "https://www.semanticscholar.org/paper/bb0e340f8698be1764c291275ac2b29e8f424610", + "CorpusId": 245896771}, "corpusId": 245896771, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bb0e340f8698be1764c291275ac2b29e8f424610", "title": "Exploring Interactions Between Computational and Critical Thinking in Model-Eliciting Activities Through Epistemic Network Analysis", "abstract": null, "venue": "ICQE", "year": 2021, "referenceCount": 43, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "346-361"}, "authors": [{"authorId": "2227814", "name": "G. Carmona"}, - {"authorId": "2149763982", "name": "Beatriz Galarza-Tohen"}, {"authorId": - "2149764421", "name": "Gonzalo Martinez-Medina"}]}, {"paperId": "c7e36d1638fd5620ac1364a260741b9acfd3cad7", - "externalIds": {"CorpusId": 244919194}, "url": "https://www.semanticscholar.org/paper/c7e36d1638fd5620ac1364a260741b9acfd3cad7", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "346-361"}, "authors": [{"authorId": "2227814", + "name": "G. Carmona"}, {"authorId": "2149763982", "name": "Beatriz Galarza-Tohen"}, + {"authorId": "2149764421", "name": "Gonzalo Martinez-Medina"}]}, {"paperId": + "c7e36d1638fd5620ac1364a260741b9acfd3cad7", "externalIds": {"CorpusId": 244919194}, + "corpusId": 244919194, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c7e36d1638fd5620ac1364a260741b9acfd3cad7", "title": "Musical Cyborgs: Human-Machine Contact Spaces for Creative Musical Interaction", "abstract": "The concept of Musical Cyborgs follows Donna Haraway\u2019s \u201cCyborg Manifesto\u201d to describe a non-binary approach for human-machine @@ -20234,76 +23084,86 @@ interactions: learning, and aesthetics therein unfold between intentional and self-organizing autonomy and are discussed with their specific requirements, conditions and consequences.", "venue": "", "year": 2021, "referenceCount": 55, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2614107", "name": "Sebastian Trump"}]}, {"paperId": "d2ac955459c537208991a8191982d05548b61997", - "externalIds": {"DOI": "10.1007/978-3-030-78471-3_26", "CorpusId": 240406640}, - "url": "https://www.semanticscholar.org/paper/d2ac955459c537208991a8191982d05548b61997", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "2614107", "name": "Sebastian Trump"}]}, {"paperId": + "d2ac955459c537208991a8191982d05548b61997", "externalIds": {"DOI": "10.1007/978-3-030-78471-3_26", + "CorpusId": 240406640}, "corpusId": 240406640, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d2ac955459c537208991a8191982d05548b61997", "title": "The Future of Embodiment Research: Conceptual Themes, Theoretical Tools, and Remaining Challenges", "abstract": null, "venue": "Handbook of Embodied Psychology", "year": 2021, "referenceCount": 64, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Handbook - of Embodied Psychology"}, "authors": [{"authorId": "4506994", "name": "B. - Hommel"}]}, {"paperId": "3b5dde879a735262b95522a69526fbdb98e61839", "externalIds": - {"MAG": "3200923600", "DOI": "10.1007/978-3-658-34522-8_12", "CorpusId": 240548208}, - "url": "https://www.semanticscholar.org/paper/3b5dde879a735262b95522a69526fbdb98e61839", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Handbook of Embodied Psychology"}, "authors": [{"authorId": + "4506994", "name": "B. Hommel"}]}, {"paperId": "3b5dde879a735262b95522a69526fbdb98e61839", + "externalIds": {"MAG": "3200923600", "DOI": "10.1007/978-3-658-34522-8_12", + "CorpusId": 240548208}, "corpusId": 240548208, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3b5dde879a735262b95522a69526fbdb98e61839", "title": "Grundlagen der k\u00fcnstlichen Intelligenz", "abstract": null, "venue": "Architekturen der Verwaltungsdigitalisierung", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Architekturen der Verwaltungsdigitalisierung"}, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Architekturen der Verwaltungsdigitalisierung"}, "authors": [{"authorId": "41201334", "name": "U. Lohmann"}]}, {"paperId": "9f1e61642b9a8c6485dc87c4d1dcef532a8fe07f", "externalIds": {"DBLP": "journals/caeai/OkonkwoA21", "MAG": "3202285719", "DOI": "10.1016/j.caeai.2021.100033", "CorpusId": 244337919}, + "corpusId": 244337919, "publicationVenue": {"id": "a4e2f9c2-abbd-4f6b-9e06-ffe639dc07e7", + "name": "Computers and Education: Artificial Intelligence", "type": "journal", + "alternate_names": ["Comput Educ Artif Intell"], "issn": "2666-920X", "url": + "https://www.journals.elsevier.com/computers-and-education-artificial-intelligence"}, "url": "https://www.semanticscholar.org/paper/9f1e61642b9a8c6485dc87c4d1dcef532a8fe07f", "title": "Chatbots applications in education: A systematic review", "abstract": null, "venue": "Computers and Education: Artificial Intelligence", "year": - 2021, "referenceCount": 85, "citationCount": 25, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": null, "journal": {"volume": "2", "pages": "100033", - "name": "Comput. Educ. Artif. Intell."}, "authors": [{"authorId": "51194123", - "name": "W. C. Okonkwo"}, {"authorId": "1405313827", "name": "Abejide Ade-Ibijola"}]}, - {"paperId": "9bc2f52d27649de191de1ae78cd79aa6a53c5535", "externalIds": {"MAG": - "3195188675", "DOI": "10.1007/978-3-030-58080-3_278-1", "CorpusId": 238965039}, - "url": "https://www.semanticscholar.org/paper/9bc2f52d27649de191de1ae78cd79aa6a53c5535", + 2021, "referenceCount": 85, "citationCount": 26, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, + "journal": {"volume": "2", "pages": "100033", "name": "Comput. Educ. Artif. + Intell."}, "authors": [{"authorId": "51194123", "name": "W. C. Okonkwo"}, + {"authorId": "1405313827", "name": "Abejide Ade-Ibijola"}]}, {"paperId": "9bc2f52d27649de191de1ae78cd79aa6a53c5535", + "externalIds": {"MAG": "3195188675", "DOI": "10.1007/978-3-030-58080-3_278-1", + "CorpusId": 238965039}, "corpusId": 238965039, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9bc2f52d27649de191de1ae78cd79aa6a53c5535", "title": "AIM in Surgical Pathology", "abstract": null, "venue": "Artificial Intelligence in Medicine", "year": 2021, "referenceCount": 118, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Artificial Intelligence in Medicine"}, - "authors": [{"authorId": "1990591841", "name": "Clare McGenity"}, {"authorId": - "94553508", "name": "A. Wright"}, {"authorId": "46370558", "name": "D. Treanor"}]}, - {"paperId": "8734eb1793711ecd4560480b290319be5dd65fd2", "externalIds": {"MAG": - "3174292236", "DOI": "10.1007/978-3-658-34324-8_1", "CorpusId": 237988209}, - "url": "https://www.semanticscholar.org/paper/8734eb1793711ecd4560480b290319be5dd65fd2", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial + Intelligence in Medicine"}, "authors": [{"authorId": "1990591841", "name": + "Clare McGenity"}, {"authorId": "94553508", "name": "A. Wright"}, {"authorId": + "46370558", "name": "D. Treanor"}]}, {"paperId": "8734eb1793711ecd4560480b290319be5dd65fd2", + "externalIds": {"MAG": "3174292236", "DOI": "10.1007/978-3-658-34324-8_1", + "CorpusId": 237988209}, "corpusId": 237988209, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8734eb1793711ecd4560480b290319be5dd65fd2", "title": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement \u2013 Anwendungen, Einsatzbereiche und Herangehensweisen", "abstract": null, "venue": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement", "year": 2021, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement"}, - "authors": [{"authorId": "96109513", "name": "M. Bruhn"}, {"authorId": "74687281", - "name": "Karsten Hadwich"}]}, {"paperId": "10248f437dffedfb2bcd7de7cd9f41092bd35370", - "externalIds": {"MAG": "3194256972", "DOI": "10.1007/978-3-030-58080-3_94-1", - "CorpusId": 238915603}, "url": "https://www.semanticscholar.org/paper/10248f437dffedfb2bcd7de7cd9f41092bd35370", + false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "K\u00fcnstliche Intelligenz + im Dienstleistungsmanagement"}, "authors": [{"authorId": "96109513", "name": + "M. Bruhn"}, {"authorId": "74687281", "name": "Karsten Hadwich"}]}, {"paperId": + "10248f437dffedfb2bcd7de7cd9f41092bd35370", "externalIds": {"MAG": "3194256972", + "DOI": "10.1007/978-3-030-58080-3_94-1", "CorpusId": 238915603}, "corpusId": + 238915603, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/10248f437dffedfb2bcd7de7cd9f41092bd35370", "title": "AIM in Oncology", "abstract": null, "venue": "Artificial Intelligence in Medicine", "year": 2021, "referenceCount": 104, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Artificial Intelligence in Medicine"}, "authors": [{"authorId": - "2027023395", "name": "Umar Iqbal"}, {"authorId": "51243615", "name": "J. - Nabi"}]}, {"paperId": "c056538c053c62c64134023a883d9b50bbf890c5", "externalIds": - {"MAG": "3183611492", "DOI": "10.4018/978-1-7998-6985-6.ch016", "CorpusId": - 237983407}, "url": "https://www.semanticscholar.org/paper/c056538c053c62c64134023a883d9b50bbf890c5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Artificial Intelligence in Medicine"}, "authors": + [{"authorId": "2027023395", "name": "Umar Iqbal"}, {"authorId": "51243615", + "name": "J. Nabi"}]}, {"paperId": "c056538c053c62c64134023a883d9b50bbf890c5", + "externalIds": {"MAG": "3183611492", "DOI": "10.4018/978-1-7998-6985-6.ch016", + "CorpusId": 237983407}, "corpusId": 237983407, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c056538c053c62c64134023a883d9b50bbf890c5", "title": "Artificial Intelligence in Marketing", "abstract": "The purpose of this chapter is to shed light on the consumer-AI interaction in the marketplace. By this aim, the chapter uses a literature review approach. The previous literature @@ -20318,13 +23178,14 @@ interactions: consumer vulnerability, unemployment, and ethical decision making.", "venue": "Advances in Business Information Systems and Analytics", "year": 2021, "referenceCount": 78, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": - "Advances in Business Information Systems and Analytics"}, "authors": [{"authorId": - "147762811", "name": "\u00d6zge S\u0131\u011f\u0131rc\u0131"}]}, {"paperId": - "0fab479f0592d02efd622fbf165e0baed6827361", "externalIds": {"DBLP": "conf/isalalife/WebsterA21", - "DOI": "10.1162/isal_a_00360", "CorpusId": 237158590}, "url": "https://www.semanticscholar.org/paper/0fab479f0592d02efd622fbf165e0baed6827361", + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "Advances in Business Information Systems and Analytics"}, + "authors": [{"authorId": "147762811", "name": "\u00d6zge S\u0131\u011f\u0131rc\u0131"}]}, + {"paperId": "0fab479f0592d02efd622fbf165e0baed6827361", "externalIds": {"DBLP": + "conf/isalalife/WebsterA21", "DOI": "10.1162/isal_a_00360", "CorpusId": 237158590}, + "corpusId": 237158590, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0fab479f0592d02efd622fbf165e0baed6827361", "title": "Identification of Lifelike Characteristics of Human Crowds Through a Classification Task", "abstract": "Crowd simulations are used extensively to study the dynam- ics of human collectives. Such studies are underpinned @@ -20346,53 +23207,59 @@ interactions: the features of real crowds that should be incor- porated into future simulations if they are to be considered \u201clifelike\u201d.", "venue": "ALIFE", "year": 2021, "referenceCount": 42, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://nrl.northumbria.ac.uk/id/eprint/46115/1/Lifelike_Characteristics_ALIFE2021_2_.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"pages": "54"}, "authors": [{"authorId": "2130441911", "name": "Jamie Webster"}, {"authorId": "144936973", "name": "M. Amos"}]}, {"paperId": "ddaed12102518cea78ff353c99d81e464c86bf0b", "externalIds": {"DBLP": "series/lncs/GefenSV21", "DOI": "10.1007/978-3-030-69128-8_12", "CorpusId": - 233329267}, "url": "https://www.semanticscholar.org/paper/ddaed12102518cea78ff353c99d81e464c86bf0b", + 233329267}, "corpusId": 233329267, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ddaed12102518cea78ff353c99d81e464c86bf0b", "title": "AI for Digital Humanities and Computational Social Sciences", "abstract": null, "venue": "Reflections on Artificial Intelligence for Humanity", "year": 2021, "referenceCount": 31, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03043393/file/AI_for_Digital_Humanities%26Computational_Social_Sciences.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "191-202"}, "authors": [{"authorId": "115494985", "name": "A. Gefen"}, {"authorId": "1825767980", "name": "L\u00e9a Saint-Raymond"}, {"authorId": "2223687", "name": "T. Venturini"}]}, {"paperId": "e5c07e9e10535229887740701d9df1b8f8a15c93", "externalIds": {"DOI": "10.1007/978-3-030-56546-6", "CorpusId": 228141442}, - "url": "https://www.semanticscholar.org/paper/e5c07e9e10535229887740701d9df1b8f8a15c93", + "corpusId": 228141442, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e5c07e9e10535229887740701d9df1b8f8a15c93", "title": "Transhumanism: The Proper Guide to a Posthuman Condition or a Dangerous Idea?", "abstract": null, "venue": "", "year": 2021, "referenceCount": 461, - "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["Book", "Review"], "publicationDate": null, "journal": - {"name": "Transhumanism: The Proper Guide to a Posthuman Condition or a Dangerous - Idea?"}, "authors": [{"authorId": "2194993", "name": "W. Hofkirchner"}, {"authorId": - "1708420", "name": "H. Kreowski"}]}, {"paperId": "e719749bc2c99b9ae5b82d0b2161789dd2d30c14", - "externalIds": {"DOI": "10.2307/j.ctv6jm8g5.8", "CorpusId": 243450514}, "url": + "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-030-56546-6%2F1", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["Book", "Review"], "publicationDate": + null, "journal": {"name": "Transhumanism: The Proper Guide to a Posthuman + Condition or a Dangerous Idea?"}, "authors": [{"authorId": "2194993", "name": + "W. Hofkirchner"}, {"authorId": "1708420", "name": "H. Kreowski"}]}, {"paperId": + "e719749bc2c99b9ae5b82d0b2161789dd2d30c14", "externalIds": {"DOI": "10.2307/j.ctv6jm8g5.8", + "CorpusId": 243450514}, "corpusId": 243450514, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e719749bc2c99b9ae5b82d0b2161789dd2d30c14", "title": "The Landscape", "abstract": null, "venue": "Explainable AI with Python", "year": 2021, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Explainable AI with Python"}, "authors": [{"authorId": - "52414735", "name": "L. Gianfagna"}, {"authorId": "2124492309", "name": "A. - Di Cecco"}]}, {"paperId": "327db2ae7c7a2e5b33d5b84799196667cc77c154", "externalIds": - {"MAG": "2495856924", "DOI": "10.1007/978-3-319-33138-6_19", "CorpusId": 63945277}, - "url": "https://www.semanticscholar.org/paper/327db2ae7c7a2e5b33d5b84799196667cc77c154", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Explainable AI with Python"}, + "authors": [{"authorId": "52414735", "name": "L. Gianfagna"}, {"authorId": + "2124492309", "name": "A. Di Cecco"}]}, {"paperId": "327db2ae7c7a2e5b33d5b84799196667cc77c154", + "externalIds": {"MAG": "2495856924", "DOI": "10.1007/978-3-319-33138-6_19", + "CorpusId": 63945277}, "corpusId": 63945277, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/327db2ae7c7a2e5b33d5b84799196667cc77c154", "title": "History of Artificial Intelligence", "abstract": null, "venue": "A Brief History of Computing", "year": 2021, "referenceCount": 7, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "A - Brief History of Computing"}, "authors": [{"authorId": "1401546300", "name": - "Gerard O''Regan"}]}, {"paperId": "1f916b8e14e27de58370d2f3123557d3e5bfca66", - "externalIds": {"CorpusId": 251618988}, "url": "https://www.semanticscholar.org/paper/1f916b8e14e27de58370d2f3123557d3e5bfca66", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "A Brief History of Computing"}, "authors": [{"authorId": + "1401546300", "name": "Gerard O''Regan"}]}, {"paperId": "1f916b8e14e27de58370d2f3123557d3e5bfca66", + "externalIds": {"CorpusId": 251618988}, "corpusId": 251618988, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1f916b8e14e27de58370d2f3123557d3e5bfca66", "title": "Adaptiveness and Lock-free Synchronization in Parallel Stochastic Gradient Descent", "abstract": "The emergence of big data in recent years due to the vast societal digitalization and large-scale sensor deployment @@ -20431,11 +23298,12 @@ interactions: and CIFAR, showing significant improvements in converge time for Leashed-SGD and MindTheStep-AsyncSGD .", "venue": "", "year": 2021, "referenceCount": 70, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "72573425", "name": "Karl B\u00e4ckstr\u00f6m"}]}, - {"paperId": "39a30b18bb2a6d2b06e7eeae22e8d1e476be48ae", "externalIds": {"CorpusId": - 249270146}, "url": "https://www.semanticscholar.org/paper/39a30b18bb2a6d2b06e7eeae22e8d1e476be48ae", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "72573425", + "name": "Karl B\u00e4ckstr\u00f6m"}]}, {"paperId": "39a30b18bb2a6d2b06e7eeae22e8d1e476be48ae", + "externalIds": {"CorpusId": 249270146}, "corpusId": 249270146, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/39a30b18bb2a6d2b06e7eeae22e8d1e476be48ae", "title": "Artificial Intelligence Reframing Thinking Machines Within the History of Media and Communication", "abstract": ": Beginning with a critical exploration of the canonical histories of AI, this chapter stresses how the history of @@ -20458,13 +23326,13 @@ interactions: man-machine systems will share, and perhaps for a time be dominant, in our advance toward the development of \u2018 artificial intelligence \u2019 .", "venue": "", "year": 2021, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "30308716", "name": "Paolo - Bory"}, {"authorId": "49518964", "name": "Simone Natale"}, {"authorId": "2006026056", - "name": "D. Trudel"}]}, {"paperId": "e2e8a697002992d4aa8261ead9d23b01f286dae6", - "externalIds": {"DOI": "10.7202/1089666ar", "CorpusId": 247626142}, "url": - "https://www.semanticscholar.org/paper/e2e8a697002992d4aa8261ead9d23b01f286dae6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "30308716", + "name": "Paolo Bory"}, {"authorId": "49518964", "name": "Simone Natale"}, + {"authorId": "2006026056", "name": "D. Trudel"}]}, {"paperId": "e2e8a697002992d4aa8261ead9d23b01f286dae6", + "externalIds": {"DOI": "10.7202/1089666ar", "CorpusId": 247626142}, "corpusId": + 247626142, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2e8a697002992d4aa8261ead9d23b01f286dae6", "title": "The Digital Reception of A Hundred Thousand Billion Poems", "abstract": "The Digital abstract Raymond Queneau\u2019s Cent mille milliards de po\u00e8mes ( CMMP ) was first intended as a poetry writing \u201cmachine\u201d (\u201cmachine @@ -20518,11 +23386,12 @@ interactions: resemble the surrealists\u2019 \u201cexquisite corpse\u201d ( cadavre exquis ) 1 , but instead is inspired by a", "venue": "Sens public", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Sens public"}, "authors": [{"authorId": "2086071227", "name": "Jonathan - Baillehache"}]}, {"paperId": "1cbc8579bdff617f8041432a6dc704a65dd8b45d", "externalIds": - {"CorpusId": 247154298}, "url": "https://www.semanticscholar.org/paper/1cbc8579bdff617f8041432a6dc704a65dd8b45d", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Sens public"}, "authors": [{"authorId": "2086071227", + "name": "Jonathan Baillehache"}]}, {"paperId": "1cbc8579bdff617f8041432a6dc704a65dd8b45d", + "externalIds": {"CorpusId": 247154298}, "corpusId": 247154298, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1cbc8579bdff617f8041432a6dc704a65dd8b45d", "title": "Computational Creativity and Consciousness: Framing, Fiction and Fraud Paper type: Study Paper", "abstract": "Computational Creativity, like its parent, Artificial Intelligence, suffers from ill-definition: both \u201ccreativity\u201d @@ -20536,11 +23405,12 @@ interactions: Creativity research may navigate the landscape of scientific possibility, while remaining true to itself.", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1808338", "name": "Geraint A. Wiggins"}]}, - {"paperId": "b5e961013014c987e622eb801451999a9888126d", "externalIds": {"CorpusId": - 244681479}, "url": "https://www.semanticscholar.org/paper/b5e961013014c987e622eb801451999a9888126d", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1808338", + "name": "Geraint A. Wiggins"}]}, {"paperId": "b5e961013014c987e622eb801451999a9888126d", + "externalIds": {"CorpusId": 244681479}, "corpusId": 244681479, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b5e961013014c987e622eb801451999a9888126d", "title": "What\u2019s in a thought experiment: the role of gender in Alan Turing\u2019s progressive imitation game", "abstract": "Turing proposed in 1950 his famous imitation game or test: a machine is supposed to imitate, @@ -20560,11 +23430,12 @@ interactions: system, and that interesting behavior in the male and the female was largely determined by sex hormones.", "venue": "", "year": 2021, "referenceCount": 40, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, - {"paperId": "3c76eace84d9404bd5dd7df55c8e3219dc484be7", "externalIds": {"CorpusId": - 237257696}, "url": "https://www.semanticscholar.org/paper/3c76eace84d9404bd5dd7df55c8e3219dc484be7", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "145621246", + "name": "Bernardo Gon\u00e7alves"}]}, {"paperId": "3c76eace84d9404bd5dd7df55c8e3219dc484be7", + "externalIds": {"CorpusId": 237257696}, "corpusId": 237257696, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3c76eace84d9404bd5dd7df55c8e3219dc484be7", "title": "Quantum Computing: Resolving Myths, From Physics to Metaphysics", "abstract": "......................................................................................................................................... 3 Introduction ................................................................................................................................... @@ -20596,21 +23467,23 @@ interactions: 27 3.4 Will Quantum Machines Become Conscious? ................................................................... 28 3.4.1 What is Consciousness? ............................................................................................... 28", "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": - "7c5a826adb4e6d13818c37611dff5768cfcb07a7", "externalIds": {"MAG": "3203175182", - "DOI": "10.1007/978-3-030-72644-7_1", "CorpusId": 244309473}, "url": "https://www.semanticscholar.org/paper/7c5a826adb4e6d13818c37611dff5768cfcb07a7", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": []}, {"paperId": "7c5a826adb4e6d13818c37611dff5768cfcb07a7", + "externalIds": {"MAG": "3203175182", "DOI": "10.1007/978-3-030-72644-7_1", + "CorpusId": 244309473}, "corpusId": 244309473, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7c5a826adb4e6d13818c37611dff5768cfcb07a7", "title": "The Mind Technology Problem and the Deep History of Mind Design", "abstract": null, "venue": "The Mind-Technology Problem", "year": 2021, "referenceCount": 125, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "The Mind-Technology Problem"}, "authors": [{"authorId": + "openAccessPdf": null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": + "History", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "The Mind-Technology Problem"}, "authors": [{"authorId": "40090096", "name": "Robert W. Clowes"}, {"authorId": "2072938545", "name": "K. G\u00e4rtner"}, {"authorId": "2767883", "name": "In\u00eas Hip\u00f3lito"}]}, {"paperId": "901e0f4b433d48696f7684b36e10a696b380bdc7", "externalIds": {"CorpusId": - 231582330}, "url": "https://www.semanticscholar.org/paper/901e0f4b433d48696f7684b36e10a696b380bdc7", + 231582330}, "corpusId": 231582330, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/901e0f4b433d48696f7684b36e10a696b380bdc7", "title": "Dystopia or utopia? Alan Turing\u2019s Promethean ambition about intelligent machines", "abstract": "Writing in 1948, Turing felt compelled to confront a \u201creligious belief\u201d that \u201cany attempt\u201d to @@ -20631,12 +23504,12 @@ interactions: will be discouraged. Rather, his third aim was to send a precautionary message about the possibility of machines outstripping us in intellectual power in the future.", "venue": "", "year": 2021, "referenceCount": 48, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, {"paperId": - "5143e9576640d7b42522aa9dbc611392446fc2ca", "externalIds": {"CorpusId": 249640262}, - "url": "https://www.semanticscholar.org/paper/5143e9576640d7b42522aa9dbc611392446fc2ca", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "145621246", "name": "Bernardo Gon\u00e7alves"}]}, + {"paperId": "5143e9576640d7b42522aa9dbc611392446fc2ca", "externalIds": {"CorpusId": + 249640262}, "corpusId": 249640262, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5143e9576640d7b42522aa9dbc611392446fc2ca", "title": "Human Digital Twins in Acquiring for ognitive imetics", "abstract": "Modern information technology makes it possible to redesign the ways people work. In the future, machines can carry out intelligence-requiring tasks, @@ -20667,13 +23540,14 @@ interactions: of cognitive mimetics and human digital twins enable us to outline a model for using the long tradition of simulating human thinking as a tool in designing intelligent", "venue": "", "year": 2021, "referenceCount": 52, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2170147264", "name": "Pertti SAARILUOMAa"}, {"authorId": "74461425", - "name": "A. Karvonen"}, {"authorId": "2170144283", "name": "Lotta SORSAM\u00c4KIb"}]}, - {"paperId": "8c52a055a2771fb2acbe8b757e6b22812d54624e", "externalIds": {"CorpusId": - 247601444}, "url": "https://www.semanticscholar.org/paper/8c52a055a2771fb2acbe8b757e6b22812d54624e", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2170147264", "name": "Pertti SAARILUOMAa"}, + {"authorId": "74461425", "name": "A. Karvonen"}, {"authorId": "2170144283", + "name": "Lotta SORSAM\u00c4KIb"}]}, {"paperId": "8c52a055a2771fb2acbe8b757e6b22812d54624e", + "externalIds": {"CorpusId": 247601444}, "corpusId": 247601444, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8c52a055a2771fb2acbe8b757e6b22812d54624e", "title": "THE EFFECT OF CUSTOMERS\u2019 ATTITUDES TOWARDS CHATBOTS ON THEIR EXPERIENCE AND BEHAVIORAL INTENTION IN TURKEY", "abstract": "Chatbots are a recent technology that brands and companies adopt to provide 24/7 customer @@ -20692,12 +23566,12 @@ interactions: regarding chatbots. Perceived enjoyment affected only customer experience. Lastly, customer experience affected behavioral intention.", "venue": "", "year": 2021, "referenceCount": 64, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2079904593", "name": "Bolu - Abant Izzet Baysal"}]}, {"paperId": "ba5b738d18c7a1d039adb0a8b85d17404827273f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2079904593", + "name": "Bolu Abant Izzet Baysal"}]}, {"paperId": "ba5b738d18c7a1d039adb0a8b85d17404827273f", "externalIds": {"DOI": "10.31866/2616-7468.4.1.2021.234831", "CorpusId": 237396072}, - "url": "https://www.semanticscholar.org/paper/ba5b738d18c7a1d039adb0a8b85d17404827273f", + "corpusId": 237396072, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba5b738d18c7a1d039adb0a8b85d17404827273f", "title": "Implementation of Artificial Intelligence in Restaurants", "abstract": "The topicality. In recent years, there has been a need to study the artificial intelligence use for the operation of restaurants, as in Ukraine (and in most @@ -20749,12 +23623,13 @@ interactions: system will speed up the process of customer service, reduce the area of production facilities and, accordingly, increase the restaurant turnover.", "venue": "", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2125416670", "name": "S. - Neilenko"}, {"authorId": "119719000", "name": "Valentyna Rusavska"}]}, {"paperId": - "8f3625dcb33f055be88c5542b8308b910b7dae31", "externalIds": {"CorpusId": 254020286}, - "url": "https://www.semanticscholar.org/paper/8f3625dcb33f055be88c5542b8308b910b7dae31", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://restaurant-hotel.knukim.edu.ua/article/download/234831/233566", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2125416670", "name": "S. Neilenko"}, + {"authorId": "119719000", "name": "Valentyna Rusavska"}]}, {"paperId": "8f3625dcb33f055be88c5542b8308b910b7dae31", + "externalIds": {"CorpusId": 254020286}, "corpusId": 254020286, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8f3625dcb33f055be88c5542b8308b910b7dae31", "title": "Towards a Persona Aware Conversational Agent", "abstract": "Dialog systems have been at the center of Natural Language Processing (NLP) since its inception. With a wide range of applications, this type of system is particularly @@ -20778,11 +23653,12 @@ interactions: agents that tackle this issue, in both settings. To this end, we adapt and experiment with multiple state-of-the-art architectures together with recent datasets.", "venue": "", "year": 2021, "referenceCount": 45, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2192527936", "name": "Nuno Ventura de Melo"}]}, {"paperId": - "9649be5e8c41bcec500e77a3cc05835ee687952c", "externalIds": {"CorpusId": 254534184}, + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2192527936", "name": "Nuno Ventura + de Melo"}]}, {"paperId": "9649be5e8c41bcec500e77a3cc05835ee687952c", "externalIds": + {"CorpusId": 254534184}, "corpusId": 254534184, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9649be5e8c41bcec500e77a3cc05835ee687952c", "title": "CHATBOT IN THE ONLINE PROVISION OF PUBLIC SERVICES", "abstract": ": The provision of Public Administration (PA) services has been challenging @@ -20800,19 +23676,24 @@ interactions: is the instantiation of the prototype, SIGMA, which is evaluated by the results it presents in the context of the Portuguese National Portal for Government services.", "venue": "", "year": 2021, "referenceCount": 15, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2194941079", "name": "M\u00f3nica Siu do Ros\u00e1rio Valverde"}]}, - {"paperId": "e2da55a0b52fc67006adff5ebd62a41cd2a77451", "externalIds": {"CorpusId": - 253448852}, "url": "https://www.semanticscholar.org/paper/e2da55a0b52fc67006adff5ebd62a41cd2a77451", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2194941079", "name": "M\u00f3nica + Siu do Ros\u00e1rio Valverde"}, {"authorId": "2078650163", "name": "Andr\u00e9 + Ferreira Ferr\u00e3o"}, {"authorId": "122122958", "name": "M. Leit\u00e3o"}, + {"authorId": "122610428", "name": "Bignolas Mira da Silva"}, {"authorId": + "2104057510", "name": "Lu\u00eds Brinquete Borbinha"}]}, {"paperId": "e2da55a0b52fc67006adff5ebd62a41cd2a77451", + "externalIds": {"CorpusId": 253448852}, "corpusId": 253448852, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e2da55a0b52fc67006adff5ebd62a41cd2a77451", "title": "Arti\ufb01cial Aesthetics: A Critical Guide to AI, Media and Design", "abstract": null, "venue": "", "year": 2021, "referenceCount": 31, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "68995872", "name": "E. Arielli"}]}, {"paperId": "ce5c99fe1dbdc1e89ccf71cac73140ef49267506", - "externalIds": {"CorpusId": 252765129}, "url": "https://www.semanticscholar.org/paper/ce5c99fe1dbdc1e89ccf71cac73140ef49267506", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "68995872", "name": "E. Arielli"}]}, {"paperId": + "ce5c99fe1dbdc1e89ccf71cac73140ef49267506", "externalIds": {"CorpusId": 252765129}, + "corpusId": 252765129, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ce5c99fe1dbdc1e89ccf71cac73140ef49267506", "title": "Proceedings of the 7th Computational Creativity Symposium AISB 2021 (CC2021)", "abstract": ". We use Ritchie\u2019s criteria for the evaluation of creative systems to analyse MEXICA. Ritchie\u2019s criteria are for humans @@ -20918,11 +23799,11 @@ interactions: the system and summarize the empirical evidence as to the bene\ufb01ts of embodied story-telling.", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": []}, {"paperId": "74551960e4f7c98907a52e62d59cfe1667c84a52", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": []}, {"paperId": "74551960e4f7c98907a52e62d59cfe1667c84a52", "externalIds": {"DOI": "10.25236/ajcis.2021.040806", "CorpusId": 252295348}, - "url": "https://www.semanticscholar.org/paper/74551960e4f7c98907a52e62d59cfe1667c84a52", + "corpusId": 252295348, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/74551960e4f7c98907a52e62d59cfe1667c84a52", "title": "Evaluation of Artificial Intelligence Techniques Applied in Watson and AlphaGo", "abstract": ": Artificial intelligence (AI) and software engineering are two important areas in computer science. In recent years, researchers @@ -20950,13 +23831,15 @@ interactions: become more and more intelligent to help with real world challenging problems that human beings cannot do.", "venue": "Academic Journal of Computing & Information Science", "year": 2021, "referenceCount": 33, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Academic - Journal of Computing & Information Science"}, "authors": [{"authorId": - "2111760257", "name": "Jiaqi Han"}, {"authorId": "2183768758", "name": "Jianing - Han"}]}, {"paperId": "c91e267343e07178a5e97fb4e16e35adc26f0e3d", "externalIds": - {"CorpusId": 252043731}, "url": "https://www.semanticscholar.org/paper/c91e267343e07178a5e97fb4e16e35adc26f0e3d", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://francis-press.com/uploads/papers/Dgajx3cDjTpVKgPLilUuTOZWF8hMM3Qv0FTbmgYO.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Academic Journal of Computing & Information + Science"}, "authors": [{"authorId": "2111760257", "name": "Jiaqi Han"}, {"authorId": + "2183768758", "name": "Jianing Han"}]}, {"paperId": "c91e267343e07178a5e97fb4e16e35adc26f0e3d", + "externalIds": {"CorpusId": 252043731}, "corpusId": 252043731, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c91e267343e07178a5e97fb4e16e35adc26f0e3d", "title": "Users'' N eeds A ssessment for C hatbots\u2019 U se in Higher Education", "abstract": ". Higher education comprises an important field for the application of chatbots, especially for large-scale use. This paper reports on a needs @@ -20976,11 +23859,12 @@ interactions: and recommendations for the design, development, and implementation of different scenarios of the use of chatbots in higher education.", "venue": "", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2402551", "name": "O. Tsivitanidou"}]}, - {"paperId": "7a487e12c6124dcee8228bbaec60569c0017e04f", "externalIds": {"CorpusId": - 251906876}, "url": "https://www.semanticscholar.org/paper/7a487e12c6124dcee8228bbaec60569c0017e04f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2402551", + "name": "O. Tsivitanidou"}]}, {"paperId": "7a487e12c6124dcee8228bbaec60569c0017e04f", + "externalIds": {"CorpusId": 251906876}, "corpusId": 251906876, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7a487e12c6124dcee8228bbaec60569c0017e04f", "title": "Arti\ufb01cial Intelligence Paradigms and the Future of Learning: What a Partial Review of Half a Century of AI Conceptualization Suggests", "abstract": "Joseph Makokha was born, raised and educated in Kenya. He obtained @@ -20990,12 +23874,13 @@ interactions: He researches human collaboration with artificial intelligence (AI), with the goal of understanding how to design AI that augments humans on thinking tasks.", "venue": "", "year": 2021, "referenceCount": 62, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "117213984", "name": "Joseph Makokha"}, {"authorId": - "117213984", "name": "Joseph Makokha"}]}, {"paperId": "c89fac010ad6b166f5429bc53f68dd65f21cf233", - "externalIds": {"CorpusId": 251906446}, "url": "https://www.semanticscholar.org/paper/c89fac010ad6b166f5429bc53f68dd65f21cf233", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, + "journal": null, "authors": [{"authorId": "117213984", "name": "Joseph Makokha"}, + {"authorId": "117213984", "name": "Joseph Makokha"}]}, {"paperId": "c89fac010ad6b166f5429bc53f68dd65f21cf233", + "externalIds": {"CorpusId": 251906446}, "corpusId": 251906446, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c89fac010ad6b166f5429bc53f68dd65f21cf233", "title": "A Qualitative Review on Intervention of Robotics in Medical Science", "abstract": "Robots have entered into many aspects of human life, including medical science. The impact of robotics on medicine is undeniable. Robots @@ -21015,11 +23900,12 @@ interactions: of the impact of robots in multiple medical domains, which is one of the most active areas for research and development of robots.", "venue": "", "year": 2021, "referenceCount": 48, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "2183233788", "name": "Swati - Saxena"}]}, {"paperId": "d79349d6f898ab4b382773841882a4c4596bc77d", "externalIds": - {"CorpusId": 251614036}, "url": "https://www.semanticscholar.org/paper/d79349d6f898ab4b382773841882a4c4596bc77d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": + "2183233788", "name": "Swati Saxena"}]}, {"paperId": "d79349d6f898ab4b382773841882a4c4596bc77d", + "externalIds": {"CorpusId": 251614036}, "corpusId": 251614036, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d79349d6f898ab4b382773841882a4c4596bc77d", "title": "Human Emotion and Machine Emotion - Studies of Emotion in AI", "abstract": "\u2014 Artificial Intelligence (AI) is undoubtedly a hot word in the field of contemporary art in recent years. The consciousness, intuition and emotion @@ -21038,11 +23924,12 @@ interactions: of human emotions, and the construction of emotional mechanisms inside AI may become a new research direction in this field.", "venue": "", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "2181712253", "name": "Wang - Shuo"}]}, {"paperId": "ea7ca2f3fd35f4143ae38b67905b117879fff10f", "externalIds": - {"CorpusId": 250563970}, "url": "https://www.semanticscholar.org/paper/ea7ca2f3fd35f4143ae38b67905b117879fff10f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "2181712253", + "name": "Wang Shuo"}]}, {"paperId": "ea7ca2f3fd35f4143ae38b67905b117879fff10f", + "externalIds": {"CorpusId": 250563970}, "corpusId": 250563970, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ea7ca2f3fd35f4143ae38b67905b117879fff10f", "title": "Neural Networks Post-Selections in AI and How to Avoid Them", "abstract": "Neural network based Artificial Intelligence (AI) has reported increasing scales in experiments. However, this paper raises a rarely reported stage @@ -21068,11 +23955,12 @@ interactions: optimal in the sense of maximum-likelihood across lifetime, conditioned on the Three Learning Conditions. Preprint submitted to Neural Networks September 9, 2021", "venue": "", "year": 2021, "referenceCount": 84, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "ebedc76d741547134d10b1f5025420bc580cbf25", - "externalIds": {"CorpusId": 250184433}, "url": "https://www.semanticscholar.org/paper/ebedc76d741547134d10b1f5025420bc580cbf25", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, + {"paperId": "ebedc76d741547134d10b1f5025420bc580cbf25", "externalIds": {"CorpusId": + 250184433}, "corpusId": 250184433, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ebedc76d741547134d10b1f5025420bc580cbf25", "title": "Design the Future Activities (DFA): A Pedagogical Content Knowledge Framework in Engineering Design Education", "abstract": "Hadi studies the in\ufb02uence of the future of work on curricular innovation, with a focus @@ -21121,11 +24009,12 @@ interactions: the special amalgam of content and pedagogy as conceptualized in the PCK framework. We also provide illustrative examples for the content at each proposed level.", "venue": "", "year": 2021, "referenceCount": 111, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "50340281", "name": "Hadi - Ali"}]}, {"paperId": "b063f431e4e725f1883a222a949b0a08bd190251", "externalIds": - {"CorpusId": 250045114}, "url": "https://www.semanticscholar.org/paper/b063f431e4e725f1883a222a949b0a08bd190251", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "50340281", + "name": "Hadi Ali"}]}, {"paperId": "b063f431e4e725f1883a222a949b0a08bd190251", + "externalIds": {"CorpusId": 250045114}, "corpusId": 250045114, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b063f431e4e725f1883a222a949b0a08bd190251", "title": "Frontiers of the (non)humanly (un)imaginable. Anthropological estrangement and the making-of Persona at the Mus\u00e9e du Quai Branly", "abstract": "Melanesian \u2018spirits\u2019 and geometrical supernatural entities. The visitor was @@ -21136,11 +24025,12 @@ interactions: was asked to interpret the behaviour of their geomet-ric figures, asking, for instance, whether they were following, repelling, or", "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "145982463", "name": "E. Grimaud"}]}, - {"paperId": "100b8cebcf4640165dd4c099e8df7bfa87c3e03d", "externalIds": {"CorpusId": - 249604969}, "url": "https://www.semanticscholar.org/paper/100b8cebcf4640165dd4c099e8df7bfa87c3e03d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "145982463", + "name": "E. Grimaud"}]}, {"paperId": "100b8cebcf4640165dd4c099e8df7bfa87c3e03d", + "externalIds": {"CorpusId": 249604969}, "corpusId": 249604969, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/100b8cebcf4640165dd4c099e8df7bfa87c3e03d", "title": "6 Urban Mobility and Parking Demand", "abstract": "Parking demand, both current and future, depends on two aspects: the long-term impact of urbanization and urban planning on parking demand, which is not addressed here, and, secondly, @@ -21149,12 +24039,13 @@ interactions: which is a result of the tracking technology discussed before. On the other hand an informed or incentivized choice of mobility modes may even lead to less parking demand.", "venue": "", "year": 2021, "referenceCount": 78, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "145285033", "name": "S. Winter"}]}, {"paperId": "e7aebfb30f46e0e4121ac90563ab9dcfa8a4d6ab", - "externalIds": {"DBLP": "conf/iwssl/Wang21", "CorpusId": 248923306}, "url": - "https://www.semanticscholar.org/paper/e7aebfb30f46e0e4121ac90563ab9dcfa8a4d6ab", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "145285033", "name": "S. Winter"}]}, + {"paperId": "e7aebfb30f46e0e4121ac90563ab9dcfa8a4d6ab", "externalIds": {"DBLP": + "conf/iwssl/Wang21", "CorpusId": 248923306}, "corpusId": 248923306, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e7aebfb30f46e0e4121ac90563ab9dcfa8a4d6ab", "title": "A Unified Model of Reasoning and Learning", "abstract": "This paper analyzes the historical development of the conceptions of \u201creasoning\u201d and \u201clearning\u201d, especially their separation in the study of arti\ufb01cial @@ -21162,14 +24053,14 @@ interactions: treatment of cognitive functions is provided in the AGI model NARS, where reasoning and learning are di\ufb00erent facets of the same underlying process.", "venue": "IWSSL", "year": 2021, "referenceCount": 85, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "28-48"}, "authors": [{"authorId": - "49830633", "name": "Pei Wang"}]}, {"paperId": "e85ce5036d19980d722fb794355037500ecbe2f7", - "externalIds": {"DOI": "10.2139/ssrn.4093683", "CorpusId": 248484841}, "url": - "https://www.semanticscholar.org/paper/e85ce5036d19980d722fb794355037500ecbe2f7", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "28-48"}, + "authors": [{"authorId": "49830633", "name": "Pei Wang"}]}, {"paperId": "e85ce5036d19980d722fb794355037500ecbe2f7", + "externalIds": {"DOI": "10.2139/ssrn.4093683", "CorpusId": 248484841}, "corpusId": + 248484841, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e85ce5036d19980d722fb794355037500ecbe2f7", "title": "The Human Condition in An Algorithmized World: A Critique through the Lens of 20th-Century Jewish Thinkers and the Concepts of Rationality, Alterity and History", "abstract": "Artificial Intelligence (AI) systems are @@ -21219,11 +24110,12 @@ interactions: of this research, which I conducted during my Philosophy degree (MA) at the KU Leuven Institute of Philosophy.", "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 241, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": - "134533029", "name": "Nathalie A. Smuha"}]}, {"paperId": "821f9d3b553df7c2c3798839cb830d8a188de19a", - "externalIds": {"CorpusId": 248368910}, "url": "https://www.semanticscholar.org/paper/821f9d3b553df7c2c3798839cb830d8a188de19a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "SSRN Electronic Journal"}, + "authors": [{"authorId": "134533029", "name": "Nathalie A. Smuha"}]}, {"paperId": + "821f9d3b553df7c2c3798839cb830d8a188de19a", "externalIds": {"CorpusId": 248368910}, + "corpusId": 248368910, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/821f9d3b553df7c2c3798839cb830d8a188de19a", "title": "The Use of Artificial Intelligence in Automation in the Fields of Gynaecology and Obstetrics \u2013 an Assessment of the State of Play Anwendungen der k\u00fcnstlichen Intelligenz zur Automatisierung in der Gyn\u00e4kologie @@ -21248,14 +24140,15 @@ interactions: applications of AI in gynaecological-obstetric diagnostics. The article will focus, in particular, on automated techniques in prenatal sonographic diagnostics.", "venue": "", "year": 2021, "referenceCount": 107, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": null, "authors": [{"authorId": "95646540", - "name": "J. Weichert"}, {"authorId": "2146415420", "name": "A. Welp"}, {"authorId": - "2076410849", "name": "Jan Scharf"}, {"authorId": "2080895815", "name": "C. - Dracopoulos"}, {"authorId": "2163410249", "name": "Wolf-Henning Becker"}, - {"authorId": "144578328", "name": "M. Gembicki"}]}, {"paperId": "0e76eb7ab6a2ba696fed5622cf44b2a8210ddabd", - "externalIds": {"CorpusId": 247997301}, "url": "https://www.semanticscholar.org/paper/0e76eb7ab6a2ba696fed5622cf44b2a8210ddabd", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": + "95646540", "name": "J. Weichert"}, {"authorId": "2146415420", "name": "A. + Welp"}, {"authorId": "2076410849", "name": "Jan Scharf"}, {"authorId": "2080895815", + "name": "C. Dracopoulos"}, {"authorId": "2163410249", "name": "Wolf-Henning + Becker"}, {"authorId": "144578328", "name": "M. Gembicki"}]}, {"paperId": + "0e76eb7ab6a2ba696fed5622cf44b2a8210ddabd", "externalIds": {"CorpusId": 247997301}, + "corpusId": 247997301, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e76eb7ab6a2ba696fed5622cf44b2a8210ddabd", "title": "Neural Dialogue Generation Methods in Open Domain: A Survey empirical", "abstract": "Open-Domain Dialogue Generation (human\u2013computer interaction) is an important issue in the field of Natural Language Processing (NLP). Because @@ -21265,12 +24158,13 @@ interactions: then roughly divided them into six categories, i.e. , Encoder-Decoder framework-based methods, Hierarchical RecurrentEncoder-Decoder(HRED)-basedmethods,VariationalAutoencoder(VAE)-basedmethods,ReinforcementLearning(RL)-basedmethods,GenerativeAdversarialNetwork(GAN)-basedmethods,andpretraining-model-basedmethods.Wedivedintothemethodsofeachcategoryandgavethedetaileddiscussionsofthesemethods.Afterthat,wepresentedacomparisonamongthedifferentcategoriesofmethodsandanalyzedtheiradvantagesanddisadvantages.Weenumeratedsomeopenaccesspublicdatasetsandsomecommonlyusedautomaticevaluatingmetrics.Finally,wediscusssomepossibleresearchdirectionsthatcantaketheresearchofneuraldialoguegenerationintoanewfrontierinthefuture.", "venue": "", "year": 2021, "referenceCount": 85, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": null, "authors": [{"authorId": "2088605455", - "name": "Bin Sun"}, {"authorId": "2158257423", "name": "Kan Li"}]}, {"paperId": - "07797213cd6cdf2d67007059ab718d5add436ddd", "externalIds": {"DOI": "10.17454/pam-2111", - "CorpusId": 247467547}, "url": "https://www.semanticscholar.org/paper/07797213cd6cdf2d67007059ab718d5add436ddd", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": + "2088605455", "name": "Bin Sun"}, {"authorId": "2158257423", "name": "Kan + Li"}]}, {"paperId": "07797213cd6cdf2d67007059ab718d5add436ddd", "externalIds": + {"DOI": "10.17454/pam-2111", "CorpusId": 247467547}, "corpusId": 247467547, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/07797213cd6cdf2d67007059ab718d5add436ddd", "title": "Cognitivism and the intellectualist vision of the mind", "abstract": "No one can deny that enactive approaches to the mind are here to stay. However, much of this revolution has been built on the grounds of conceptual confusions @@ -21286,11 +24180,12 @@ interactions: I would like to go into the problems considering cognititivsm either as Cartesian or semantic intellectualism.", "venue": "Phenomenology & Mind", "year": 2021, "referenceCount": 46, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Phenomenology & Mind"}, "authors": [{"authorId": - "2069450672", "name": "Mariela Dest\u00e9fano"}]}, {"paperId": "3b41739abf993d5cdc698531fae234548720b2ae", - "externalIds": {"CorpusId": 247235503}, "url": "https://www.semanticscholar.org/paper/3b41739abf993d5cdc698531fae234548720b2ae", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Phenomenology & Mind"}, + "authors": [{"authorId": "2069450672", "name": "Mariela Dest\u00e9fano"}]}, + {"paperId": "3b41739abf993d5cdc698531fae234548720b2ae", "externalIds": {"CorpusId": + 247235503}, "corpusId": 247235503, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3b41739abf993d5cdc698531fae234548720b2ae", "title": "Visualization Using Field of Light Displays: Opportunities and New Questions", "abstract": "Visualization techniques are typically evaluated on conventional 2D displays. Current immersive display technology such as @@ -21307,12 +24202,12 @@ interactions: the additional perceptual cues of FoLDs can enhance perception of shape structures across multiple scales and we suggest several possible approaches for studying this.", "venue": "", "year": 2021, "referenceCount": 45, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "144573831", "name": "M. Hamilton"}]}, {"paperId": - "0b698924c94deb693144233d9eaf85d793d865af", "externalIds": {"CorpusId": 246484440}, - "url": "https://www.semanticscholar.org/paper/0b698924c94deb693144233d9eaf85d793d865af", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "144573831", "name": "M. Hamilton"}]}, + {"paperId": "0b698924c94deb693144233d9eaf85d793d865af", "externalIds": {"CorpusId": + 246484440}, "corpusId": 246484440, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0b698924c94deb693144233d9eaf85d793d865af", "title": "The Myth of AI Failure CSRP 568", "abstract": "A myth has developed that AI has failed as a research program. Most myths contain some germ of truth but this one is exceptional in that it is more or less completely false. @@ -21338,40 +24233,43 @@ interactions: be at an early stage but its potential is great and failure myths should not be allowed to impede it.", "venue": "", "year": 2021, "referenceCount": 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "145708034", "name": "Blay Whitby"}]}, - {"paperId": "2bd07bd27ec6a29ad1109e5cd35ae71534d71ac4", "externalIds": {"DOI": - "10.1016/b978-0-12-823806-6.00001-6", "CorpusId": 245992402}, "url": "https://www.semanticscholar.org/paper/2bd07bd27ec6a29ad1109e5cd35ae71534d71ac4", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "145708034", + "name": "Blay Whitby"}]}, {"paperId": "2bd07bd27ec6a29ad1109e5cd35ae71534d71ac4", + "externalIds": {"DOI": "10.1016/b978-0-12-823806-6.00001-6", "CorpusId": 245992402}, + "corpusId": 245992402, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2bd07bd27ec6a29ad1109e5cd35ae71534d71ac4", "title": "Technologies and society", "abstract": null, "venue": "Big Data''s Threat to Liberty", "year": 2021, "referenceCount": 41, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Big - Data''s Threat to Liberty"}, "authors": [{"authorId": "119177143", "name": - "H. S\u00e6tra"}]}, {"paperId": "b900f38b233bd66e5445407842bf404913a113b7", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "Big Data''s Threat to Liberty"}, "authors": [{"authorId": "119177143", + "name": "H. S\u00e6tra"}]}, {"paperId": "b900f38b233bd66e5445407842bf404913a113b7", "externalIds": {"DOI": "10.1007/978-3-030-93842-0_8", "CorpusId": 245890224}, - "url": "https://www.semanticscholar.org/paper/b900f38b233bd66e5445407842bf404913a113b7", + "corpusId": 245890224, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b900f38b233bd66e5445407842bf404913a113b7", "title": "A Bayesian Framework for Evaluating Evolutionary Art", "abstract": null, "venue": "BNAIC/BENELEARN", "year": 2021, "referenceCount": 11, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "141-152"}, "authors": [{"authorId": "2149736657", - "name": "Augustijn de Boer"}, {"authorId": "2149736665", "name": "Ron Hommelsheim"}, - {"authorId": "2082011568", "name": "D. Leeftink"}]}, {"paperId": "014d6d064ca62f56e4aa883114f16f55d0e8c0dc", - "externalIds": {"DOI": "10.1007/978-981-16-4963-9_2", "CorpusId": 245642731}, - "url": "https://www.semanticscholar.org/paper/014d6d064ca62f56e4aa883114f16f55d0e8c0dc", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "141-152"}, "authors": [{"authorId": + "2149736657", "name": "Augustijn de Boer"}, {"authorId": "2149736665", "name": + "Ron Hommelsheim"}, {"authorId": "2082011568", "name": "D. Leeftink"}]}, {"paperId": + "014d6d064ca62f56e4aa883114f16f55d0e8c0dc", "externalIds": {"DOI": "10.1007/978-981-16-4963-9_2", + "CorpusId": 245642731}, "corpusId": 245642731, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/014d6d064ca62f56e4aa883114f16f55d0e8c0dc", "title": "Fundamentals of Federated Learning", "abstract": null, "venue": "Wireless Networks", "year": 2021, "referenceCount": 6, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Wireless Networks"}, "authors": [{"authorId": "115893131", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Wireless Networks"}, "authors": [{"authorId": "115893131", "name": "Choong Seon Hong"}, {"authorId": "2280048", "name": "L. U. Khan"}, {"authorId": "2888344", "name": "Mingzhe Chen"}, {"authorId": "2113598069", "name": "Dawei Chen"}, {"authorId": "145412074", "name": "W. Saad"}, {"authorId": "2113962182", "name": "Zhu Han"}]}, {"paperId": "733e665ccef57eb41519f6f6ba53f3a575e9928b", - "externalIds": {"CorpusId": 245510134}, "url": "https://www.semanticscholar.org/paper/733e665ccef57eb41519f6f6ba53f3a575e9928b", + "externalIds": {"CorpusId": 245510134}, "corpusId": 245510134, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/733e665ccef57eb41519f6f6ba53f3a575e9928b", "title": "On a Possibility of Artificial Reason: J. McCarthy, I. Kant, and A. Turing", "abstract": "T\ufeffhe purpose of this study is to explore the possibility of reconciliation between Kant\u2019s transcendental idealism @@ -21391,13 +24289,14 @@ interactions: with transcendental idealism. T\ufeffhis compatibility we name the possibility of artificial reason in this paper.", "venue": "", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo Kim"}, {"authorId": - "2151267031", "name": "Jinkyu Jeong"}, {"authorId": "2065379320", "name": - "J. McCarthy"}, {"authorId": "32297722", "name": "I. Kant"}, {"authorId": + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo + Kim"}, {"authorId": "2151267031", "name": "Jinkyu Jeong"}, {"authorId": "2065379320", + "name": "J. McCarthy"}, {"authorId": "32297722", "name": "I. Kant"}, {"authorId": "71653708", "name": "A. Turing"}]}, {"paperId": "2ac71a11195a593366239164abf7cb95ebcde530", - "externalIds": {"CorpusId": 245510927}, "url": "https://www.semanticscholar.org/paper/2ac71a11195a593366239164abf7cb95ebcde530", + "externalIds": {"CorpusId": 245510927}, "corpusId": 245510927, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2ac71a11195a593366239164abf7cb95ebcde530", "title": "Gerlai, Robert (2017) Learning, memory, cognition, and the question of sentience in fish. Animal Sentience 13(8)", "abstract": "Evolutionarily conserved features have been demonstrated at many levels of biological organization @@ -21519,11 +24418,12 @@ interactions: differences between us and them. We may even need a better understanding of what it really feels like to be human.", "venue": "", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": - "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "4809629", - "name": "R. Gerlai"}]}, {"paperId": "437dc1846e1cff235da6dd2fd714387ce0bfca84", - "externalIds": {"CorpusId": 245447872}, "url": "https://www.semanticscholar.org/paper/437dc1846e1cff235da6dd2fd714387ce0bfca84", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Biology", "source": "s2-fos-model"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "4809629", "name": "R. Gerlai"}]}, {"paperId": + "437dc1846e1cff235da6dd2fd714387ce0bfca84", "externalIds": {"CorpusId": 245447872}, + "corpusId": 245447872, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/437dc1846e1cff235da6dd2fd714387ce0bfca84", "title": "ESSAY Water resource prospects for the next 50 years on the water planet: personal perspectives on a shared history from Earth Day, the Fourth Industrial Revolution and One Health to the futures of alternative energy, @@ -21538,11 +24438,12 @@ interactions: now and might hope to in the future. ARTICLE HISTORY Received 23 May 2021 Accepted 9 November 2021", "venue": "", "year": 2021, "referenceCount": 167, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "123568129", "name": "W. Jones"}]}, {"paperId": - "29600d7533061c8473a119b1ad4f742972c6268b", "externalIds": {"DBLP": "conf/icccrea/Wulf21", - "CorpusId": 245331326}, "url": "https://www.semanticscholar.org/paper/29600d7533061c8473a119b1ad4f742972c6268b", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "123568129", "name": "W. Jones"}]}, + {"paperId": "29600d7533061c8473a119b1ad4f742972c6268b", "externalIds": {"DBLP": + "conf/icccrea/Wulf21", "CorpusId": 245331326}, "corpusId": 245331326, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/29600d7533061c8473a119b1ad4f742972c6268b", "title": "Producing Creative Chess through Chess Engine Selfplay", "abstract": "This article presents preliminary work on a creative chess engine that can be used to produce creative chess games or sequences. The contribution in @@ -21555,12 +24456,13 @@ interactions: itself forms a creative system that outputs chess games. Through analyzing these games it might be possible to discover new chess openings or principles.", "venue": "ICCC", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "208-212"}, "authors": [{"authorId": "1958839977", - "name": "Wolf De Wulf"}]}, {"paperId": "b7532b76441d2c3e9cc24f491989e6aea242b19d", - "externalIds": {"DBLP": "conf/icccrea/ChangC21", "CorpusId": 245331248}, "url": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "208-212"}, + "authors": [{"authorId": "1958839977", "name": "Wolf De Wulf"}]}, {"paperId": + "b7532b76441d2c3e9cc24f491989e6aea242b19d", "externalIds": {"DBLP": "conf/icccrea/ChangC21", + "CorpusId": 245331248}, "corpusId": 245331248, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b7532b76441d2c3e9cc24f491989e6aea242b19d", "title": "In the Name of Creativity: En Route to Inspiring Machines", "abstract": "In this short paper, we reflect on the long quest for intelligence and creativity @@ -21658,13 +24560,14 @@ interactions: achieved. By conducting research along this line, hopefully injecting creativity into machines may someday be accomplished.", "venue": "ICCC", "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "400-404"}, "authors": [{"authorId": "151504753", - "name": "Chun-yien Chang"}, {"authorId": "101612255", "name": "Yingpeng Chen"}]}, - {"paperId": "b8b764703a6ab0e0b01194a1d8be3a02a352f8b4", "externalIds": {"CorpusId": - 245121860}, "url": "https://www.semanticscholar.org/paper/b8b764703a6ab0e0b01194a1d8be3a02a352f8b4", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "400-404"}, "authors": [{"authorId": + "151504753", "name": "Chun-yien Chang"}, {"authorId": "101612255", "name": + "Yingpeng Chen"}]}, {"paperId": "b8b764703a6ab0e0b01194a1d8be3a02a352f8b4", + "externalIds": {"CorpusId": 245121860}, "corpusId": 245121860, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b8b764703a6ab0e0b01194a1d8be3a02a352f8b4", "title": "1st Workshop on Automatic Spoken Language Translation in Real-World Settings", "abstract": "We address the problem of language model customization in applications where the ASR component needs to manage domain-specific terminology; @@ -21683,11 +24586,12 @@ interactions: to recognize the domainspecific terms (i.e. dentistry). Results using different metrics (OOV rate, WER, precision and recall) show the effectiveness of the proposed techniques.", "venue": "", "year": 2021, "referenceCount": 133, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "145862931", "name": "M. Turchi"}]}, {"paperId": "a9a7127f3bd7a964606ed58ec80361a34b3f1684", - "externalIds": {"CorpusId": 244919179}, "url": "https://www.semanticscholar.org/paper/a9a7127f3bd7a964606ed58ec80361a34b3f1684", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "145862931", "name": "M. Turchi"}]}, + {"paperId": "a9a7127f3bd7a964606ed58ec80361a34b3f1684", "externalIds": {"CorpusId": + 244919179}, "corpusId": 244919179, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a9a7127f3bd7a964606ed58ec80361a34b3f1684", "title": "Artificial Computational Creativity based on Collaborative Intelligence in Music", "abstract": "In this paper, I will propose a series of Artificial Computer Creativity (ACC) techniques based on Collaborative Intelligence from @@ -21701,11 +24605,12 @@ interactions: centralities and by integrating self-referential metrics in the works themselves. Finally, I will show how these techniques have been used in a set of works.", "venue": "", "year": 2021, "referenceCount": 31, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2143260007", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2143260007", "name": "Fernando Egido"}]}, {"paperId": "4da830b6d84e117cb147ff71f205e71500ebbbb1", - "externalIds": {"CorpusId": 244709495}, "url": "https://www.semanticscholar.org/paper/4da830b6d84e117cb147ff71f205e71500ebbbb1", + "externalIds": {"CorpusId": 244709495}, "corpusId": 244709495, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4da830b6d84e117cb147ff71f205e71500ebbbb1", "title": "Machines and Influence", "abstract": "Policymakers face a broader challenge of how to view AI capabilities today and where does society stand in terms of those capabilities. This paper surveys AI capabilities and tackles @@ -21721,45 +24626,52 @@ interactions: Hopefully this long essay will actuate further debates and discussions over these ideas, and prove to be a useful contribution towards governing the future of AI.", "venue": "", "year": 2021, "referenceCount": 128, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "2151241746", "name": "Shashank Yadav"}]}, {"paperId": - "7df4af2c478eb163cfd0d897fad7a26b0221e7ec", "externalIds": {"MAG": "3204743340", - "DOI": "10.1007/978-3-476-05796-9_12", "CorpusId": 244328204}, "url": "https://www.semanticscholar.org/paper/7df4af2c478eb163cfd0d897fad7a26b0221e7ec", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "2151241746", "name": "Shashank + Yadav"}]}, {"paperId": "7df4af2c478eb163cfd0d897fad7a26b0221e7ec", "externalIds": + {"MAG": "3204743340", "DOI": "10.1007/978-3-476-05796-9_12", "CorpusId": 244328204}, + "corpusId": 244328204, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7df4af2c478eb163cfd0d897fad7a26b0221e7ec", "title": "Maschinen-\u00dcbersetzung: Ada Lovelaces Notes of the Translator", "abstract": null, "venue": "", "year": 2021, "referenceCount": 8, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "157-166", "name": ""}, "authors": - [{"authorId": "114614045", "name": "A. Sch\u00f6ning"}]}, {"paperId": "2ef8eb79ecbbfece7cf51d1e75c7614e18e1aa31", - "externalIds": {"DOI": "10.1016/j.ifacol.2021.10.448", "CorpusId": 244096048}, - "url": "https://www.semanticscholar.org/paper/2ef8eb79ecbbfece7cf51d1e75c7614e18e1aa31", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "pages": "157-166", "name": + ""}, "authors": [{"authorId": "114614045", "name": "A. Sch\u00f6ning"}]}, + {"paperId": "2ef8eb79ecbbfece7cf51d1e75c7614e18e1aa31", "externalIds": {"DOI": + "10.1016/j.ifacol.2021.10.448", "CorpusId": 244096048}, "corpusId": 244096048, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2ef8eb79ecbbfece7cf51d1e75c7614e18e1aa31", "title": "Walking Through the Turing Wall", "abstract": null, "venue": "IFAC-PapersOnLine", "year": 2021, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "IFAC-PapersOnLine"}, "authors": [{"authorId": "2057885436", - "name": "Albert R. Efimov"}, {"authorId": "115644835", "name": "D. Dubrovsky"}, - {"authorId": "112902170", "name": "P. M. Matveev"}]}, {"paperId": "a886028b788e98cdec71c7ae1d3aa64cefb1b32f", - "externalIds": {"DOI": "10.1007/978-3-030-26050-7_189-1", "CorpusId": 244083940}, - "url": "https://www.semanticscholar.org/paper/a886028b788e98cdec71c7ae1d3aa64cefb1b32f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "IFAC-PapersOnLine"}, "authors": + [{"authorId": "2057885436", "name": "Albert R. Efimov"}, {"authorId": "115644835", + "name": "D. Dubrovsky"}, {"authorId": "112902170", "name": "P. M. Matveev"}]}, + {"paperId": "a886028b788e98cdec71c7ae1d3aa64cefb1b32f", "externalIds": {"DOI": + "10.1007/978-3-030-26050-7_189-1", "CorpusId": 244083940}, "corpusId": 244083940, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a886028b788e98cdec71c7ae1d3aa64cefb1b32f", "title": "Machine Learning", "abstract": null, "venue": "Encyclopedia of Mathematical Geosciences", "year": 2021, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Encyclopedia of Mathematical + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Encyclopedia of Mathematical Geosciences"}, "authors": [{"authorId": "2068792892", "name": "Feifei Pan"}]}, {"paperId": "a4c964d4200dba72bba324f33cb1258aee7dd0df", "externalIds": {"CorpusId": - 243843605}, "url": "https://www.semanticscholar.org/paper/a4c964d4200dba72bba324f33cb1258aee7dd0df", + 243843605}, "corpusId": 243843605, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a4c964d4200dba72bba324f33cb1258aee7dd0df", "title": "Implementation of AutoTutor Lite", "abstract": "................................................................................................................ ii Chapter", "venue": "", "year": 2021, "referenceCount": 34, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2148416687", "name": "Lu Han"}]}, {"paperId": "3d928a4a0311806c8cea689f0e1be8f6fef363f6", - "externalIds": {"DBLP": "journals/access/StockBB21", "DOI": "10.1109/ACCESS.2021.3125102", - "CorpusId": 242079633}, "url": "https://www.semanticscholar.org/paper/3d928a4a0311806c8cea689f0e1be8f6fef363f6", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "2148416687", "name": "Lu Han"}]}, {"paperId": + "3d928a4a0311806c8cea689f0e1be8f6fef363f6", "externalIds": {"DBLP": "journals/access/StockBB21", + "DOI": "10.1109/ACCESS.2021.3125102", "CorpusId": 242079633}, "corpusId": + 242079633, "publicationVenue": {"id": "2633f5b2-c15c-49fe-80f5-07523e770c26", + "name": "IEEE Access", "type": "journal", "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, + "url": "https://www.semanticscholar.org/paper/3d928a4a0311806c8cea689f0e1be8f6fef363f6", "title": "Applications of Artificial Intelligence in Distribution Power System Operation", "abstract": "Due to the energy transition and the distribution of electricity generation, distribution power systems gain a lot of attention @@ -21776,15 +24688,16 @@ interactions: of the requirements of each application. Thus, a conclusion can be drawn presenting suitable algorithms for each operation task.", "venue": "IEEE Access", "year": 2021, "referenceCount": 143, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": null, "journal": {"volume": "9", "pages": "150098-150119", - "name": "IEEE Access"}, "authors": [{"authorId": "2136754152", "name": "Simon - Stock"}, {"authorId": "2765856", "name": "D. Babazadeh"}, {"authorId": "122377639", - "name": "C. Becker"}]}, {"paperId": "5d75d8ce441a37517299509374e638285e2f4b2a", - "externalIds": {"MAG": "3159430918", "DOI": "10.35248/2167-0374.21.11.185", - "CorpusId": 240596920}, "url": "https://www.semanticscholar.org/paper/5d75d8ce441a37517299509374e638285e2f4b2a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": null, "journal": {"volume": + "9", "pages": "150098-150119", "name": "IEEE Access"}, "authors": [{"authorId": + "2136754152", "name": "Simon Stock"}, {"authorId": "2765856", "name": "D. + Babazadeh"}, {"authorId": "122377639", "name": "C. Becker"}]}, {"paperId": + "5d75d8ce441a37517299509374e638285e2f4b2a", "externalIds": {"MAG": "3159430918", + "DOI": "10.35248/2167-0374.21.11.185", "CorpusId": 240596920}, "corpusId": + 240596920, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d75d8ce441a37517299509374e638285e2f4b2a", "title": "The Impact of Artificial Intelligence on the Modern Battlefield", "abstract": "The rapid development of modern technology has made a significant impact on the various aspects of human lives. One important piece of technology @@ -21800,21 +24713,22 @@ interactions: Also, the study has also concluded that Artificial Intelligence can lead towards the automation of various weapons platforms.", "venue": "", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "11", "pages": "1-7", "name": ""}, "authors": [{"authorId": "50071421", - "name": "Z. Javed"}]}, {"paperId": "4aa69be5563c9f50da9bcb89a0558eb1942b30ac", + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "11", "pages": "1-7", "name": ""}, "authors": + [{"authorId": "50071421", "name": "Z. Javed"}]}, {"paperId": "4aa69be5563c9f50da9bcb89a0558eb1942b30ac", "externalIds": {"DOI": "10.1007/978-3-030-77283-3_15", "CorpusId": 240434265}, - "url": "https://www.semanticscholar.org/paper/4aa69be5563c9f50da9bcb89a0558eb1942b30ac", + "corpusId": 240434265, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4aa69be5563c9f50da9bcb89a0558eb1942b30ac", "title": "Humanity in the Era of Autonomous Human\u2013machine Teams", "abstract": null, "venue": "Systems Engineering and Artificial Intelligence", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Systems Engineering and - Artificial Intelligence"}, "authors": [{"authorId": "50881611", "name": "Shu-Heng - Chen"}]}, {"paperId": "9426a6bb6c5257ae62a47f4124af6cc757bef018", "externalIds": - {"CorpusId": 251498190}, "url": "https://www.semanticscholar.org/paper/9426a6bb6c5257ae62a47f4124af6cc757bef018", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"name": + "Systems Engineering and Artificial Intelligence"}, "authors": [{"authorId": + "50881611", "name": "Shu-Heng Chen"}]}, {"paperId": "9426a6bb6c5257ae62a47f4124af6cc757bef018", + "externalIds": {"CorpusId": 251498190}, "corpusId": 251498190, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9426a6bb6c5257ae62a47f4124af6cc757bef018", "title": "SERI: Generative Chatbot Framework for Cybergrooming Prevention", "abstract": "Cybergrooming refers to a crime to lure potential victims, particularly youth, by establishing personal trust relationships with them for sexual abuse @@ -21836,80 +24750,89 @@ interactions: that the SERI can generate authentic conversations between the two chatbots compared to the original conversations from the used dataset in perplexity and MaUde scores.", "venue": "", "year": 2021, "referenceCount": 31, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2149504682", "name": "Zhen Guo"}, {"authorId": "2110794017", - "name": "Li-Min Huang"}, {"authorId": "2148374177", "name": "Jin-Hee Cho"}]}, - {"paperId": "98942fefcdaf2a36372ee2e08e572a1b285ad20e", "externalIds": {"CorpusId": - 240494108}, "url": "https://www.semanticscholar.org/paper/98942fefcdaf2a36372ee2e08e572a1b285ad20e", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2149504682", "name": "Zhen Guo"}, + {"authorId": "2110794017", "name": "Li-Min Huang"}, {"authorId": "2148374177", + "name": "Jin-Hee Cho"}]}, {"paperId": "98942fefcdaf2a36372ee2e08e572a1b285ad20e", + "externalIds": {"CorpusId": 240494108}, "corpusId": 240494108, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/98942fefcdaf2a36372ee2e08e572a1b285ad20e", "title": "AI Scientist Grand Challenge", "abstract": null, "venue": "", "year": 2021, "referenceCount": 15, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": "baa4838e37478894227ae298565e40dfdebba0e5", - "externalIds": {"DOI": "10.1007/978-3-030-78471-3_15", "CorpusId": 240407227}, - "url": "https://www.semanticscholar.org/paper/baa4838e37478894227ae298565e40dfdebba0e5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "baa4838e37478894227ae298565e40dfdebba0e5", "externalIds": {"DOI": "10.1007/978-3-030-78471-3_15", + "CorpusId": 240407227}, "corpusId": 240407227, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/baa4838e37478894227ae298565e40dfdebba0e5", "title": "Towards Theory Formalization in (Social) Embodiment: A Tutorial", "abstract": null, "venue": "Handbook of Embodied Psychology", "year": 2021, "referenceCount": 66, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": ["Review"], - "publicationDate": null, "journal": {"name": "Handbook of Embodied Psychology"}, - "authors": [{"authorId": "2165455", "name": "A. Szabelska"}, {"authorId": - "1394624684", "name": "O. Dujols"}, {"authorId": "47467910", "name": "T. M. - Erle"}, {"authorId": "15939401", "name": "Alessandro P. Sparacio"}, {"authorId": - "145846140", "name": "H. Ijzerman"}]}, {"paperId": "62c07aad4141e1c2426bad364bc8aa9dbc32f380", - "externalIds": {"DBLP": "conf/icycsee/Wu21a", "MAG": "3200806435", "DOI": - "10.1007/978-981-16-5943-0_41", "CorpusId": 240503536}, "url": "https://www.semanticscholar.org/paper/62c07aad4141e1c2426bad364bc8aa9dbc32f380", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "Handbook of Embodied Psychology"}, "authors": [{"authorId": "2165455", "name": + "A. Szabelska"}, {"authorId": "1394624684", "name": "O. Dujols"}, {"authorId": + "47467910", "name": "T. M. Erle"}, {"authorId": "15939401", "name": "Alessandro + P. Sparacio"}, {"authorId": "145846140", "name": "H. Ijzerman"}]}, {"paperId": + "62c07aad4141e1c2426bad364bc8aa9dbc32f380", "externalIds": {"DBLP": "conf/icycsee/Wu21a", + "MAG": "3200806435", "DOI": "10.1007/978-981-16-5943-0_41", "CorpusId": 240503536}, + "corpusId": 240503536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/62c07aad4141e1c2426bad364bc8aa9dbc32f380", "title": "Demos of Passing Turing Test Successfully", "abstract": null, "venue": "ICPCSEE", "year": 2021, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"pages": "505-514"}, - "authors": [{"authorId": "37149163", "name": "Shengyuan Wu"}]}, {"paperId": - "1b206d176e67095c98a299292170e878711c1edb", "externalIds": {"DBLP": "conf/sigsand/SchusterWV21", - "DOI": "10.1007/978-3-030-85893-3_2", "CorpusId": 239091251}, "url": "https://www.semanticscholar.org/paper/1b206d176e67095c98a299292170e878711c1edb", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, + "journal": {"pages": "505-514"}, "authors": [{"authorId": "37149163", "name": + "Shengyuan Wu"}]}, {"paperId": "1b206d176e67095c98a299292170e878711c1edb", + "externalIds": {"DBLP": "conf/sigsand/SchusterWV21", "DOI": "10.1007/978-3-030-85893-3_2", + "CorpusId": 239091251}, "corpusId": 239091251, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1b206d176e67095c98a299292170e878711c1edb", "title": "Maturity Models for the Assessment of Artificial Intelligence in Small and Medium-Sized Enterprises", "abstract": null, "venue": "PLAIS", "year": - 2021, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"pages": "22-36"}, - "authors": [{"authorId": "49891420", "name": "T. Schuster"}, {"authorId": - "51201651", "name": "L. Waidelich"}, {"authorId": "1745369", "name": "R. Volz"}]}, - {"paperId": "09c1b934b84c6ab4caf685666143fd6fd8dc94fb", "externalIds": {"MAG": - "3203797056", "DOI": "10.1007/978-3-030-72644-7_5", "CorpusId": 244320599}, - "url": "https://www.semanticscholar.org/paper/09c1b934b84c6ab4caf685666143fd6fd8dc94fb", + 2021, "referenceCount": 18, "citationCount": 1, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, + "journal": {"pages": "22-36"}, "authors": [{"authorId": "49891420", "name": + "T. Schuster"}, {"authorId": "51201651", "name": "L. Waidelich"}, {"authorId": + "1745369", "name": "R. Volz"}]}, {"paperId": "09c1b934b84c6ab4caf685666143fd6fd8dc94fb", + "externalIds": {"MAG": "3203797056", "DOI": "10.1007/978-3-030-72644-7_5", + "CorpusId": 244320599}, "corpusId": 244320599, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/09c1b934b84c6ab4caf685666143fd6fd8dc94fb", "title": "Consciousness: Philosophy\u2019s Great White Whale", "abstract": null, "venue": "The Mind-Technology Problem", "year": 2021, "referenceCount": 18, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "The Mind-Technology Problem"}, - "authors": [{"authorId": "1817982", "name": "Gerald Vision"}]}, {"paperId": - "3f42481b9948f5360a1320f7172999e26ea7ce56", "externalIds": {"MAG": "3201820359", - "DOI": "10.1007/978-3-030-77939-9_19", "CorpusId": 244319000}, "url": "https://www.semanticscholar.org/paper/3f42481b9948f5360a1320f7172999e26ea7ce56", + "openAccessPdf": null, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": + "Art", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "The + Mind-Technology Problem"}, "authors": [{"authorId": "1817982", "name": "Gerald + Vision"}]}, {"paperId": "3f42481b9948f5360a1320f7172999e26ea7ce56", "externalIds": + {"MAG": "3201820359", "DOI": "10.1007/978-3-030-77939-9_19", "CorpusId": 244319000}, + "corpusId": 244319000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f42481b9948f5360a1320f7172999e26ea7ce56", "title": "Language Modeling and Text Generation Using Hybrid Recurrent Neural Network", "abstract": null, "venue": "Deep Learning for Unmanned Systems", "year": 2021, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Deep Learning for Unmanned Systems"}, "authors": - [{"authorId": "2141166678", "name": "Samreen"}, {"authorId": "143957784", - "name": "M. Iqbal"}, {"authorId": "2074278840", "name": "Iftikhar Ahmad"}, - {"authorId": "2144296182", "name": "Suleman Khan"}, {"authorId": "2142467545", - "name": "R. Khan"}]}, {"paperId": "5927294d4d011f7b1e5dadb275340d15c3e5d26e", - "externalIds": {"CorpusId": 239014231}, "url": "https://www.semanticscholar.org/paper/5927294d4d011f7b1e5dadb275340d15c3e5d26e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Deep + Learning for Unmanned Systems"}, "authors": [{"authorId": "2141166678", "name": + "Samreen"}, {"authorId": "143957784", "name": "M. Iqbal"}, {"authorId": "2074278840", + "name": "Iftikhar Ahmad"}, {"authorId": "2144296182", "name": "Suleman Khan"}, + {"authorId": "2142467545", "name": "R. Khan"}]}, {"paperId": "5927294d4d011f7b1e5dadb275340d15c3e5d26e", + "externalIds": {"CorpusId": 239014231}, "corpusId": 239014231, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5927294d4d011f7b1e5dadb275340d15c3e5d26e", "title": "CHATBOT: DESIGN, ARCHITECUTRE, AND APPLICATIONS", "abstract": "................................................................................................................................................ ...1", "venue": "", "year": 2021, "referenceCount": 111, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2155815740", - "name": "Xufei Huang"}, {"authorId": "2060081768", "name": "Mitch Marcus"}]}, - {"paperId": "183a563c411a437e43a523a2c168082776665bc6", "externalIds": {"CorpusId": - 239001458}, "url": "https://www.semanticscholar.org/paper/183a563c411a437e43a523a2c168082776665bc6", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "2155815740", "name": "Xufei Huang"}, {"authorId": "2060081768", + "name": "Mitch Marcus"}]}, {"paperId": "183a563c411a437e43a523a2c168082776665bc6", + "externalIds": {"CorpusId": 239001458}, "corpusId": 239001458, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/183a563c411a437e43a523a2c168082776665bc6", "title": "Scale , abstraction , and connectionist models : On parafinite thresholds in Artificial Intelligence", "abstract": "In this thesis, I investigate the conceptual intersection between scale, abstraction, and connectionist modeling @@ -21925,11 +24848,12 @@ interactions: GPT-3] Scale, abstraction, and connectionist models: On parafinite thresholds in Artificial Intelligence", "venue": "", "year": 2021, "referenceCount": 37, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "121485370", "name": "Zachary - Peck"}]}, {"paperId": "8308183394a5e53325c2f602b14573311639780e", "externalIds": - {"DBLP": "conf/recsys/LinWL21", "CorpusId": 238233052}, "url": "https://www.semanticscholar.org/paper/8308183394a5e53325c2f602b14573311639780e", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "121485370", + "name": "Zachary Peck"}]}, {"paperId": "8308183394a5e53325c2f602b14573311639780e", + "externalIds": {"DBLP": "conf/recsys/LinWL21", "CorpusId": 238233052}, "corpusId": + 238233052, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8308183394a5e53325c2f602b14573311639780e", "title": "Target-guided Knowledge-aware Recommendation Dialogue System: An Empirical Investigation (Long paper)", "abstract": "The target-guided recommendation dialogue system aims to make high-quality recommendations through interactive @@ -21948,15 +24872,19 @@ interactions: is effective in leveraging both related knowledge and planned goals to generate fluent, informative and coherent responses towards the target of recommendation.", "venue": "KaRS/ComplexRec@RecSys", "year": 2021, "referenceCount": 30, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - null, "authors": [{"authorId": "50825802", "name": "Dongding Lin"}, {"authorId": - "152924492", "name": "Jian Wang"}, {"authorId": "2027417248", "name": "Wenjie - Li"}]}, {"paperId": "7ec4389647caecd34e08eb70c5776b9f91f3c3a5", "externalIds": - {"DBLP": "journals/access/AbbaszadeSMZZ21", "DOI": "10.1109/ACCESS.2021.3108768", - "CorpusId": 238221270}, "url": "https://www.semanticscholar.org/paper/7ec4389647caecd34e08eb70c5776b9f91f3c3a5", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "50825802", "name": "Dongding + Lin"}, {"authorId": "152924492", "name": "Jian Wang"}, {"authorId": "2027417248", + "name": "Wenjie Li"}]}, {"paperId": "7ec4389647caecd34e08eb70c5776b9f91f3c3a5", + "externalIds": {"DBLP": "journals/access/AbbaszadeSMZZ21", "DOI": "10.1109/ACCESS.2021.3108768", + "CorpusId": 238221270}, "corpusId": 238221270, "publicationVenue": {"id": + "2633f5b2-c15c-49fe-80f5-07523e770c26", "name": "IEEE Access", "type": "journal", + "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, + "url": "https://www.semanticscholar.org/paper/7ec4389647caecd34e08eb70c5776b9f91f3c3a5", "title": "Application of Quantum Natural Language Processing for Language Translation", "abstract": "In this paper, we develop compositional vector-based semantics of positive transitive sentences using quantum natural language @@ -21970,15 +24898,17 @@ interactions: which may demonstrate quadratic speedup and converge faster or reaches a better accuracy over classical methods.", "venue": "IEEE Access", "year": 2021, "referenceCount": 40, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "9", "pages": "130434-130448", "name": "IEEE Access"}, - "authors": [{"authorId": "104316601", "name": "M. Abbaszade"}, {"authorId": - "145478033", "name": "V. Salari"}, {"authorId": "144823300", "name": "S. S. - Mousavi"}, {"authorId": "2128730021", "name": "Mariam Zomorodi"}, {"authorId": - "2146289068", "name": "Xujuan Zhou"}]}, {"paperId": "a2ce499f0ed70e1907b4d3452f1685defd35be07", - "externalIds": {"CorpusId": 238209471}, "url": "https://www.semanticscholar.org/paper/a2ce499f0ed70e1907b4d3452f1685defd35be07", + "openAccessPdf": {"url": "https://ieeexplore.ieee.org/ielx7/6287639/6514899/09525075.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "9", "pages": "130434-130448", + "name": "IEEE Access"}, "authors": [{"authorId": "104316601", "name": "M. + Abbaszade"}, {"authorId": "145478033", "name": "V. Salari"}, {"authorId": + "144823300", "name": "S. S. Mousavi"}, {"authorId": "2128730021", "name": + "Mariam Zomorodi"}, {"authorId": "2146289068", "name": "Xujuan Zhou"}]}, {"paperId": + "a2ce499f0ed70e1907b4d3452f1685defd35be07", "externalIds": {"CorpusId": 238209471}, + "corpusId": 238209471, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a2ce499f0ed70e1907b4d3452f1685defd35be07", "title": "Laughing with machines: philosophical analysis on the preconditions of sense of humour for machines", "abstract": "This article will analyse the preconditions of sense of humour for artificial intelligence. Can artificial @@ -21996,31 +24926,34 @@ interactions: sense of humour. These principles are: 1) worldview, 2) selfconsciousness, 3) self-reflection, 4) self-criticism, and 5) losing control.", "venue": "", "year": 2021, "referenceCount": 96, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "114685585", "name": "Jarno - Hietalahti"}]}, {"paperId": "482fe094ee0ec56bfcf37a56b42896209b063580", "externalIds": - {"MAG": "3184567337", "DOI": "10.1007/978-3-030-80129-8_16", "CorpusId": 237976844}, - "url": "https://www.semanticscholar.org/paper/482fe094ee0ec56bfcf37a56b42896209b063580", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "114685585", + "name": "Jarno Hietalahti"}]}, {"paperId": "482fe094ee0ec56bfcf37a56b42896209b063580", + "externalIds": {"MAG": "3184567337", "DOI": "10.1007/978-3-030-80129-8_16", + "CorpusId": 237976844}, "corpusId": 237976844, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/482fe094ee0ec56bfcf37a56b42896209b063580", "title": "Biostatistics in Biomedicine and Informatics", "abstract": null, "venue": "Lecture Notes in Networks and Systems", "year": 2021, "referenceCount": 3, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Lecture Notes in Networks and Systems"}, "authors": - [{"authorId": "107583244", "name": "Esther M. Pearson"}]}, {"paperId": "3a1c65ae249016a7b5644263461c969c9dd4c8c7", - "externalIds": {"MAG": "3183660754", "DOI": "10.1007/978-3-662-62989-5_2", - "CorpusId": 238001835}, "url": "https://www.semanticscholar.org/paper/3a1c65ae249016a7b5644263461c969c9dd4c8c7", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}, + {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Lecture Notes in Networks + and Systems"}, "authors": [{"authorId": "107583244", "name": "Esther M. Pearson"}]}, + {"paperId": "3a1c65ae249016a7b5644263461c969c9dd4c8c7", "externalIds": {"MAG": + "3183660754", "DOI": "10.1007/978-3-662-62989-5_2", "CorpusId": 238001835}, + "corpusId": 238001835, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a1c65ae249016a7b5644263461c969c9dd4c8c7", "title": "Analog oder digital? Philosophieren nach dem Ende der Philosophie", "abstract": null, "venue": "Digitalit\u00e4tsforschung / Digitality Research", "year": 2021, "referenceCount": 9, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Digitalit\u00e4tsforschung - / Digitality Research"}, "authors": [{"authorId": "39139942", "name": "W. - Zimmerli"}]}, {"paperId": "f3e936023bd7de0d05d71985c6dad3ba361f45a7", "externalIds": - {"CorpusId": 237631458}, "url": "https://www.semanticscholar.org/paper/f3e936023bd7de0d05d71985c6dad3ba361f45a7", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"name": + "Digitalit\u00e4tsforschung / Digitality Research"}, "authors": [{"authorId": + "39139942", "name": "W. Zimmerli"}]}, {"paperId": "f3e936023bd7de0d05d71985c6dad3ba361f45a7", + "externalIds": {"CorpusId": 237631458}, "corpusId": 237631458, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f3e936023bd7de0d05d71985c6dad3ba361f45a7", "title": "Building intelligence, development of an ontological basis and a comparative analysis to characterize the concept", "abstract": "The amount of research and publications with the term \u201cintelligence\u201d has increased @@ -22032,12 +24965,16 @@ interactions: of the buildings. A comparison was made by logical argumentation. As a result, we present conceptual criteria that allow us to attribute the quality of intelligence to buildings.", "venue": "", "year": 2021, "referenceCount": 23, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2054012895", "name": "Douglas Souza"}]}, {"paperId": "a167260cd12704df84313ba93191b178f18a432d", - "externalIds": {"DBLP": "journals/access/AntalBF21", "DOI": "10.1109/ACCESS.2021.3111098", - "CorpusId": 237519198}, "url": "https://www.semanticscholar.org/paper/a167260cd12704df84313ba93191b178f18a432d", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2054012895", "name": "Douglas Souza"}]}, + {"paperId": "a167260cd12704df84313ba93191b178f18a432d", "externalIds": {"DBLP": + "journals/access/AntalBF21", "DOI": "10.1109/ACCESS.2021.3111098", "CorpusId": + 237519198}, "corpusId": 237519198, "publicationVenue": {"id": "2633f5b2-c15c-49fe-80f5-07523e770c26", + "name": "IEEE Access", "type": "journal", "issn": "2169-3536", "url": "http://www.ieee.org/publications_standards/publications/ieee_access.html", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6287639"]}, + "url": "https://www.semanticscholar.org/paper/a167260cd12704df84313ba93191b178f18a432d", "title": "SapiAgent: A Bot Based on Deep Learning to Generate Human-Like Mouse Trajectories", "abstract": "The growing interest in bot detection can be attributed to the fact that fraudulent actions performed by bots cause surprisingly high @@ -22051,16 +24988,19 @@ interactions: collected from 120 subjects. The results show that SapiAgent is able to generate more realistic mouse trajectories compared with B\u00e9zier curves and conventional autoencoders.", "venue": "IEEE Access", "year": 2021, "referenceCount": 54, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"volume": "9", "pages": "124396-124408", "name": "IEEE Access"}, "authors": - [{"authorId": "40401373", "name": "M. Antal"}, {"authorId": "1689273", "name": - "K. B\u00faza"}, {"authorId": "1833249549", "name": "Norbert Fej\u00e9r"}]}, - {"paperId": "96260902d00b3c9367ff7be7c8da5e2298c360e5", "externalIds": {"DOI": - "10.1148/rg.2021200113", "CorpusId": 237389449, "PubMed": "34469212"}, "url": - "https://www.semanticscholar.org/paper/96260902d00b3c9367ff7be7c8da5e2298c360e5", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ieeexplore.ieee.org/ielx7/6287639/6514899/09530664.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "9", "pages": "124396-124408", + "name": "IEEE Access"}, "authors": [{"authorId": "40401373", "name": "M. Antal"}, + {"authorId": "1689273", "name": "K. B\u00faza"}, {"authorId": "1833249549", + "name": "Norbert Fej\u00e9r"}]}, {"paperId": "96260902d00b3c9367ff7be7c8da5e2298c360e5", + "externalIds": {"DOI": "10.1148/rg.2021200113", "CorpusId": 237389449, "PubMed": + "34469212"}, "corpusId": 237389449, "publicationVenue": {"id": "6a469aed-f8e3-456a-92e6-53237e43d3da", + "name": "Radiographics", "type": "journal", "issn": "0271-5333", "url": "https://pubs.rsna.org/loi/radiographics", + "alternate_urls": ["http://radiographics.rsnajnls.org/"]}, "url": "https://www.semanticscholar.org/paper/96260902d00b3c9367ff7be7c8da5e2298c360e5", "title": "Practical Guide to Natural Language Processing for Radiology.", "abstract": "Natural language processing (NLP) is the subset of artificial intelligence focused on the computer interpretation of human language. It @@ -22087,43 +25027,52 @@ interactions: increased the power and utility of NLP for a variety of applications. Online supplemental material is available for this article. \u00a9RSNA, 2021.", "venue": "Radiographics", "year": 2021, "referenceCount": 13, "citationCount": 7, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": null, "journal": {"volume": "41 5", "pages": "\n 1446-1453\n ", - "name": "Radiographics : a review publication of the Radiological Society - of North America, Inc"}, "authors": [{"authorId": "51919708", "name": "Ali - Mozayan"}, {"authorId": "46255971", "name": "Alexander R. Fabbri"}, {"authorId": - "83419382", "name": "M. Maneevese"}, {"authorId": "2901972", "name": "I. Tocino"}, - {"authorId": "15070068", "name": "S. Chheang"}]}, {"paperId": "f6ea9e2fa4a672a0777e515024a35fd55f6faf0f", - "externalIds": {"MAG": "3194565243", "DOI": "10.1016/j.cirp.2021.05.003", - "CorpusId": 238937463}, "url": "https://www.semanticscholar.org/paper/f6ea9e2fa4a672a0777e515024a35fd55f6faf0f", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": null, "journal": {"volume": "41 5", "pages": + "\n 1446-1453\n ", "name": "Radiographics : a review publication + of the Radiological Society of North America, Inc"}, "authors": [{"authorId": + "51919708", "name": "Ali Mozayan"}, {"authorId": "46255971", "name": "Alexander + R. Fabbri"}, {"authorId": "83419382", "name": "M. Maneevese"}, {"authorId": + "2901972", "name": "I. Tocino"}, {"authorId": "15070068", "name": "S. Chheang"}]}, + {"paperId": "f6ea9e2fa4a672a0777e515024a35fd55f6faf0f", "externalIds": {"MAG": + "3194565243", "DOI": "10.1016/j.cirp.2021.05.003", "CorpusId": 238937463}, + "corpusId": 238937463, "publicationVenue": {"id": "64fd23a1-3c84-4991-afdb-a731ad1abf24", + "name": "CIRP annals", "type": "journal", "alternate_names": ["CIRP Annals", + "CIRP Ann", "CIRP ann"], "issn": "0007-8506", "url": "https://www.journals.elsevier.com/cirp-annals", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00078506"]}, + "url": "https://www.semanticscholar.org/paper/f6ea9e2fa4a672a0777e515024a35fd55f6faf0f", "title": "Coevolution of digitalisation, organisations and Product Development Cycle", "abstract": null, "venue": "CIRP annals", "year": 2021, "referenceCount": 293, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "CIRP Annals"}, "authors": [{"authorId": "2949473", "name": "L. Roucoules"}, - {"authorId": "1920845", "name": "N. Anwer"}]}, {"paperId": "cfb9080e5bb9cc7ccbe29b32d0b8be6993a0cbca", - "externalIds": {"DOI": "10.1007/978-3-030-64269-3_5", "CorpusId": 237460155}, - "url": "https://www.semanticscholar.org/paper/cfb9080e5bb9cc7ccbe29b32d0b8be6993a0cbca", + "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03761374/file/LISPEN_CIRP-Annals_2021_ROUCOULES.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "CIRP Annals"}, "authors": [{"authorId": "2949473", + "name": "L. Roucoules"}, {"authorId": "1920845", "name": "N. Anwer"}]}, {"paperId": + "cfb9080e5bb9cc7ccbe29b32d0b8be6993a0cbca", "externalIds": {"DOI": "10.1007/978-3-030-64269-3_5", + "CorpusId": 237460155}, "corpusId": 237460155, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cfb9080e5bb9cc7ccbe29b32d0b8be6993a0cbca", "title": "Love in the Time of AI", "abstract": null, "venue": "", "year": 2021, "referenceCount": 24, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "152537655", "name": "A. Kind"}]}, - {"paperId": "dda094c99e3ac4b83c98158b75691059cacab164", "externalIds": {"MAG": - "3196652123", "DOI": "10.1007/978-3-030-64269-3_3", "CorpusId": 239734543}, - "url": "https://www.semanticscholar.org/paper/dda094c99e3ac4b83c98158b75691059cacab164", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "152537655", + "name": "A. Kind"}]}, {"paperId": "dda094c99e3ac4b83c98158b75691059cacab164", + "externalIds": {"MAG": "3196652123", "DOI": "10.1007/978-3-030-64269-3_3", + "CorpusId": 239734543}, "corpusId": 239734543, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/dda094c99e3ac4b83c98158b75691059cacab164", "title": "Ex Machina: Is Ava a Person?", "abstract": null, "venue": "Minding the Future", "year": 2021, "referenceCount": 16, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Minding the Future"}, "authors": [{"authorId": - "50088842", "name": "E. Bohn"}]}, {"paperId": "cdc321c9861a4bee0d75bbba1f35d9ba01a6e65d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Minding the Future"}, + "authors": [{"authorId": "50088842", "name": "E. Bohn"}]}, {"paperId": "cdc321c9861a4bee0d75bbba1f35d9ba01a6e65d", "externalIds": {"MAG": "3184492209", "DOI": "10.4018/978-1-7998-6985-6.ch028", - "CorpusId": 238008181}, "url": "https://www.semanticscholar.org/paper/cdc321c9861a4bee0d75bbba1f35d9ba01a6e65d", + "CorpusId": 238008181}, "corpusId": 238008181, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cdc321c9861a4bee0d75bbba1f35d9ba01a6e65d", "title": "Artificial Intelligences Are Subsets of Human Beings, Mainly in Fictions and Films", "abstract": "This chapter aims to create new knowledge regarding artificial intelligence (AI) ethics and relevant subjects while @@ -22139,88 +25088,100 @@ interactions: These actions are so close to empathy they amount to consciousness and emotional quotient.", "venue": "Advances in Business Information Systems and Analytics", "year": 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "Advances in Business Information Systems and Analytics"}, - "authors": [{"authorId": "5039410", "name": "N. Sen"}]}, {"paperId": "6f393bf8c7253ef795c470046569c7b1083b20e3", - "externalIds": {"MAG": "3193948837", "DOI": "10.1007/978-3-030-75583-6_24", - "CorpusId": 238962758}, "url": "https://www.semanticscholar.org/paper/6f393bf8c7253ef795c470046569c7b1083b20e3", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": {"name": "Advances in Business Information + Systems and Analytics"}, "authors": [{"authorId": "5039410", "name": "N. Sen"}]}, + {"paperId": "6f393bf8c7253ef795c470046569c7b1083b20e3", "externalIds": {"MAG": + "3193948837", "DOI": "10.1007/978-3-030-75583-6_24", "CorpusId": 238962758}, + "corpusId": 238962758, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6f393bf8c7253ef795c470046569c7b1083b20e3", "title": "Working Abductively at the Edge of Economics and Computer Science: Economatics as a Data Processing Economy", "abstract": null, "venue": "Decision Economics: Minds, Machines, and their Society", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Decision - Economics: Minds, Machines, and their Society"}, "authors": [{"authorId": - "2133185018", "name": "Claudio Maria Perfetto"}]}, {"paperId": "97f5fa4708c47708d5a96e66e4a6e594f2b8ee8c", - "externalIds": {"MAG": "3175166666", "DOI": "10.1016/b978-0-12-821777-1.00013-6", - "CorpusId": 237966132}, "url": "https://www.semanticscholar.org/paper/97f5fa4708c47708d5a96e66e4a6e594f2b8ee8c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Decision Economics: Minds, Machines, and their Society"}, + "authors": [{"authorId": "2133185018", "name": "Claudio Maria Perfetto"}]}, + {"paperId": "97f5fa4708c47708d5a96e66e4a6e594f2b8ee8c", "externalIds": {"MAG": + "3175166666", "DOI": "10.1016/b978-0-12-821777-1.00013-6", "CorpusId": 237966132}, + "corpusId": 237966132, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/97f5fa4708c47708d5a96e66e4a6e594f2b8ee8c", "title": "Machine learning in precision medicine", "abstract": null, "venue": "Machine Learning, Big Data, and IoT for Medical Informatics", "year": 2021, "referenceCount": 55, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "Machine Learning, Big Data, and IoT for Medical Informatics"}, - "authors": [{"authorId": "2770489", "name": "Dipankar Sengupta"}]}, {"paperId": - "cb112b47b82dd3902db89836b7dd729fba169b64", "externalIds": {"MAG": "3174440608", - "DOI": "10.1007/978-3-030-71689-9_1", "CorpusId": 238040471}, "url": "https://www.semanticscholar.org/paper/cb112b47b82dd3902db89836b7dd729fba169b64", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "Machine Learning, Big Data, and IoT for Medical + Informatics"}, "authors": [{"authorId": "2770489", "name": "Dipankar Sengupta"}]}, + {"paperId": "cb112b47b82dd3902db89836b7dd729fba169b64", "externalIds": {"MAG": + "3174440608", "DOI": "10.1007/978-3-030-71689-9_1", "CorpusId": 238040471}, + "corpusId": 238040471, "publicationVenue": {"id": "50b101ef-5d04-498b-91f0-ee45ddfad4bf", + "name": "Marx, Engels, and Marxisms", "alternate_names": ["Marx Engels Marx"], + "issn": "2524-7123", "url": "https://www.palgrave.com/gp/series/14812"}, "url": + "https://www.semanticscholar.org/paper/cb112b47b82dd3902db89836b7dd729fba169b64", "title": "Introduction: Automation, Autonomy and Artificial Intelligence", "abstract": null, "venue": "Marx, Engels, and Marxisms", "year": 2021, "referenceCount": 75, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": null, "journal": {"name": "Marx, Engels, and - Marxisms"}, "authors": [{"authorId": "72488117", "name": "James Steinhoff"}]}, - {"paperId": "d34d65038ffd54c69a1e75ef992a0117dd24d686", "externalIds": {"MAG": - "3174419959", "DOI": "10.1007/978-3-030-70642-5_6", "CorpusId": 237988918}, - "url": "https://www.semanticscholar.org/paper/d34d65038ffd54c69a1e75ef992a0117dd24d686", + "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, + "journal": {"name": "Marx, Engels, and Marxisms"}, "authors": [{"authorId": + "72488117", "name": "James Steinhoff"}]}, {"paperId": "d34d65038ffd54c69a1e75ef992a0117dd24d686", + "externalIds": {"MAG": "3174419959", "DOI": "10.1007/978-3-030-70642-5_6", + "CorpusId": 237988918}, "corpusId": 237988918, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d34d65038ffd54c69a1e75ef992a0117dd24d686", "title": "From MT to Computational Linguistics and Natural Language Processing", "abstract": null, "venue": "Automating Linguistics", "year": 2021, "referenceCount": 13, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Automating - Linguistics"}, "authors": [{"authorId": "2053034865", "name": "J. L\u00e9on"}]}, - {"paperId": "4eeffd6af4e742997d4569b07f6cc84217f58832", "externalIds": {"DOI": - "10.1007/978-3-030-63967-9_12", "CorpusId": 242390381}, "url": "https://www.semanticscholar.org/paper/4eeffd6af4e742997d4569b07f6cc84217f58832", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Automating Linguistics"}, "authors": [{"authorId": "2053034865", + "name": "J. L\u00e9on"}]}, {"paperId": "4eeffd6af4e742997d4569b07f6cc84217f58832", + "externalIds": {"DOI": "10.1007/978-3-030-63967-9_12", "CorpusId": 242390381}, + "corpusId": 242390381, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4eeffd6af4e742997d4569b07f6cc84217f58832", "title": "Artificial Intelligence", "abstract": null, "venue": "Financial Services in the Twenty-First Century", "year": 2021, "referenceCount": 1, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Financial Services in the Twenty-First Century"}, - "authors": [{"authorId": "50975436", "name": "J. Burke"}]}, {"paperId": "19eab4771dc9f432a2a2b0b5ea5b13ec3568b96a", - "externalIds": {"DOI": "10.2139/ssrn.3878909", "CorpusId": 242527706}, "url": - "https://www.semanticscholar.org/paper/19eab4771dc9f432a2a2b0b5ea5b13ec3568b96a", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Financial Services in + the Twenty-First Century"}, "authors": [{"authorId": "50975436", "name": "J. + Burke"}]}, {"paperId": "19eab4771dc9f432a2a2b0b5ea5b13ec3568b96a", "externalIds": + {"DOI": "10.2139/ssrn.3878909", "CorpusId": 242527706}, "corpusId": 242527706, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19eab4771dc9f432a2a2b0b5ea5b13ec3568b96a", "title": "Management by Algorithm? Human Capital in the Age of Intelligent Machines", "abstract": null, "venue": "SSRN Electronic Journal", "year": 2021, "referenceCount": 41, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "SSRN Electronic Journal"}, "authors": [{"authorId": "107642156", - "name": "Eirik Sj\u00e5holm Knudsen"}, {"authorId": "39127899", "name": "Lasse - B. Lien"}, {"authorId": "41077055", "name": "R. Wuebker"}]}, {"paperId": "986f697fcb6317588be56764c70968c425fe8405", - "externalIds": {"MAG": "3176059607", "DOI": "10.1007/978-3-030-69476-0_7", - "CorpusId": 237962581}, "url": "https://www.semanticscholar.org/paper/986f697fcb6317588be56764c70968c425fe8405", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "SSRN Electronic Journal"}, "authors": + [{"authorId": "107642156", "name": "Eirik Sj\u00e5holm Knudsen"}, {"authorId": + "39127899", "name": "Lasse B. Lien"}, {"authorId": "41077055", "name": "R. + Wuebker"}]}, {"paperId": "986f697fcb6317588be56764c70968c425fe8405", "externalIds": + {"MAG": "3176059607", "DOI": "10.1007/978-3-030-69476-0_7", "CorpusId": 237962581}, + "corpusId": 237962581, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/986f697fcb6317588be56764c70968c425fe8405", "title": "Emerging Technologies in Breast Cancer Screening and Diagnosis", "abstract": null, "venue": "Breast & Gynecological Diseases", "year": 2021, "referenceCount": 30, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Breast - & Gynecological Diseases"}, "authors": [{"authorId": "1400883444", "name": - "A. O\u2019Connell"}, {"authorId": "1398950770", "name": "Daniel T Kawakyu-O''Connor"}]}, - {"paperId": "54193bafbc72d673a383ed26a412f1c5059f2c98", "externalIds": {"DOI": - "10.1007/978-3-662-53386-4_56-1", "CorpusId": 241702272}, "url": "https://www.semanticscholar.org/paper/54193bafbc72d673a383ed26a412f1c5059f2c98", + false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Breast & Gynecological Diseases"}, "authors": [{"authorId": + "1400883444", "name": "A. O\u2019Connell"}, {"authorId": "1398950770", "name": + "Daniel T Kawakyu-O''Connor"}]}, {"paperId": "54193bafbc72d673a383ed26a412f1c5059f2c98", + "externalIds": {"DOI": "10.1007/978-3-662-53386-4_56-1", "CorpusId": 241702272}, + "corpusId": 241702272, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/54193bafbc72d673a383ed26a412f1c5059f2c98", "title": "Aktuelle Motoriktheorien", "abstract": null, "venue": "Bewegung, Training, Leistung und Gesundheit", "year": 2021, "referenceCount": 67, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Bewegung, Training, Leistung und Gesundheit"}, - "authors": [{"authorId": "2089129032", "name": "S. K\u00fcnzell"}]}, {"paperId": - "1cc22529197afe4033c160349d78df11f70edeaa", "externalIds": {"MAG": "3173462855", - "DOI": "10.4018/978-1-7998-6453-0.ch010", "CorpusId": 238011593}, "url": "https://www.semanticscholar.org/paper/1cc22529197afe4033c160349d78df11f70edeaa", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Bewegung, Training, Leistung + und Gesundheit"}, "authors": [{"authorId": "2089129032", "name": "S. K\u00fcnzell"}]}, + {"paperId": "1cc22529197afe4033c160349d78df11f70edeaa", "externalIds": {"MAG": + "3173462855", "DOI": "10.4018/978-1-7998-6453-0.ch010", "CorpusId": 238011593}, + "corpusId": 238011593, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1cc22529197afe4033c160349d78df11f70edeaa", "title": "Exploring Technology Tendencies and Their Impact on Human-Human Interactions", "abstract": "Although traditionally researchers have focused on making robotics more user-friendly from a human perspective, a new theory @@ -22236,44 +25197,49 @@ interactions: during the design and implementation of new devices as well as in how technology may be related to how we perceive each other.", "venue": "Advances in Human and Social Aspects of Technology", "year": 2021, "referenceCount": 43, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Advances in Human and Social - Aspects of Technology"}, "authors": [{"authorId": "8510793", "name": "Heather - C. Lum"}]}, {"paperId": "b0c76c41b1310c97369d43ab0e31e9759606f0b6", "externalIds": - {"MAG": "3173310741", "DOI": "10.1007/978-3-658-34324-8_17", "CorpusId": 237970970}, - "url": "https://www.semanticscholar.org/paper/b0c76c41b1310c97369d43ab0e31e9759606f0b6", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Advances in Human and + Social Aspects of Technology"}, "authors": [{"authorId": "8510793", "name": + "Heather C. Lum"}]}, {"paperId": "b0c76c41b1310c97369d43ab0e31e9759606f0b6", + "externalIds": {"MAG": "3173310741", "DOI": "10.1007/978-3-658-34324-8_17", + "CorpusId": 237970970}, "corpusId": 237970970, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b0c76c41b1310c97369d43ab0e31e9759606f0b6", "title": "Handelsunternehmen 4.0 \u2013 Digitalisierung durch Daten, Plattformen und K\u00fcnstliche Intelligenz", "abstract": null, "venue": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement", "year": 2021, "referenceCount": 22, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "K\u00fcnstliche Intelligenz im Dienstleistungsmanagement"}, - "authors": [{"authorId": "3305792", "name": "R. Sch\u00fctte"}, {"authorId": - "52000483", "name": "F. Weber"}]}, {"paperId": "30f976df47ab7de744154134e3a6416166ee890f", - "externalIds": {"MAG": "3187589892", "DBLP": "series/ncs/AguileraSSG21", "DOI": - "10.1007/978-981-13-1687-6_12", "CorpusId": 238939492}, "url": "https://www.semanticscholar.org/paper/30f976df47ab7de744154134e3a6416166ee890f", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "K\u00fcnstliche Intelligenz + im Dienstleistungsmanagement"}, "authors": [{"authorId": "3305792", "name": + "R. Sch\u00fctte"}, {"authorId": "52000483", "name": "F. Weber"}]}, {"paperId": + "30f976df47ab7de744154134e3a6416166ee890f", "externalIds": {"MAG": "3187589892", + "DBLP": "series/ncs/AguileraSSG21", "DOI": "10.1007/978-981-13-1687-6_12", + "CorpusId": 238939492}, "corpusId": 238939492, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/30f976df47ab7de744154134e3a6416166ee890f", "title": "Programmable Fading Memory in Atomic Switch Systems for Error Checking Applications", "abstract": null, "venue": "Reservoir Computing", "year": 2021, "referenceCount": 62, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"pages": "273-303"}, "authors": [{"authorId": "47775488", - "name": "R. Aguilera"}, {"authorId": "5991538", "name": "H. O. Sillin"}, {"authorId": - "6408870", "name": "A. Stieg"}, {"authorId": "1902938", "name": "J. Gimzewski"}]}, - {"paperId": "d341c28a3fbee9dd68fa46300035083bad5050e1", "externalIds": {"MAG": - "3175913221", "DOI": "10.1007/978-981-16-0771-4_9", "CorpusId": 237990418}, - "url": "https://www.semanticscholar.org/paper/d341c28a3fbee9dd68fa46300035083bad5050e1", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"pages": "273-303"}, "authors": + [{"authorId": "47775488", "name": "R. Aguilera"}, {"authorId": "5991538", + "name": "H. O. Sillin"}, {"authorId": "6408870", "name": "A. Stieg"}, {"authorId": + "1902938", "name": "J. Gimzewski"}]}, {"paperId": "d341c28a3fbee9dd68fa46300035083bad5050e1", + "externalIds": {"MAG": "3175913221", "DOI": "10.1007/978-981-16-0771-4_9", + "CorpusId": 237990418}, "corpusId": 237990418, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d341c28a3fbee9dd68fa46300035083bad5050e1", "title": "AI & Well-Being: Can AI Make You Happy in the City", "abstract": null, "venue": "Artificial Intelligence in the Gulf", "year": 2021, "referenceCount": - 63, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Artificial Intelligence in the Gulf"}, "authors": [{"authorId": - "1403727011", "name": "A. al-Azzawi"}]}, {"paperId": "ed4c810b8e1429951eaeee53747b5a75bfd18f13", - "externalIds": {"MAG": "3179755906", "DOI": "10.4018/978-1-7998-6975-7.ch007", - "CorpusId": 238011090}, "url": "https://www.semanticscholar.org/paper/ed4c810b8e1429951eaeee53747b5a75bfd18f13", + 63, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Artificial Intelligence in the + Gulf"}, "authors": [{"authorId": "1403727011", "name": "A. al-Azzawi"}]}, + {"paperId": "ed4c810b8e1429951eaeee53747b5a75bfd18f13", "externalIds": {"MAG": + "3179755906", "DOI": "10.4018/978-1-7998-6975-7.ch007", "CorpusId": 238011090}, + "corpusId": 238011090, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ed4c810b8e1429951eaeee53747b5a75bfd18f13", "title": "Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things", "abstract": "Internet of things (IoT) has revolutionized digital transformation and is present in every sector including transportation, @@ -22291,14 +25257,15 @@ interactions: against IoT and the motivation to advance the current research in this area.", "venue": "Handbook of Research on Advancing Cybersecurity for Digital Transformation", "year": 2021, "referenceCount": 69, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Handbook of Research on Advancing Cybersecurity - for Digital Transformation"}, "authors": [{"authorId": "2381390", "name": - "A. K. Demir"}, {"authorId": "145271861", "name": "Shahid Alam"}]}, {"paperId": - "8216054f2ac741661b6754841f8241f13347281e", "externalIds": {"CorpusId": 237293716}, - "url": "https://www.semanticscholar.org/paper/8216054f2ac741661b6754841f8241f13347281e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Handbook + of Research on Advancing Cybersecurity for Digital Transformation"}, "authors": + [{"authorId": "2381390", "name": "A. K. Demir"}, {"authorId": "145271861", + "name": "Shahid Alam"}]}, {"paperId": "8216054f2ac741661b6754841f8241f13347281e", + "externalIds": {"CorpusId": 237293716}, "corpusId": 237293716, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8216054f2ac741661b6754841f8241f13347281e", "title": "Deixando a linguagem ser: reflexo\u0303es sobre o me\u0301todo enativo", "abstract": "1 Franklin and Marshall College, Department of Psychology, Scientific and Philosophical Studies of Mind, United States. Email: ecuffari@fandm.edu. @@ -22310,13 +25277,14 @@ interactions: Spain. ChatLab, School of Psychology, University of Sussex, Brighton UK. Email: hanneke.dejaegher@ehu.eus. ABSTRACT", "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2124401566", "name": "Elena Clare Cuffari"}, - {"authorId": "2124440196", "name": "Ezequiel A. Di Paolo"}, {"authorId": "2124401581", - "name": "Hanne De Jaegher"}]}, {"paperId": "bca8e91640c79791b54d61e10d747cae0d25512b", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2124401566", "name": "Elena + Clare Cuffari"}, {"authorId": "2124440196", "name": "Ezequiel A. Di Paolo"}, + {"authorId": "2124401581", "name": "Hanne De Jaegher"}]}, {"paperId": "bca8e91640c79791b54d61e10d747cae0d25512b", "externalIds": {"DBLP": "conf/mtsummit/Saina21", "ACL": "2021.mtsummit-asltrw.5", - "CorpusId": 237010917}, "url": "https://www.semanticscholar.org/paper/bca8e91640c79791b54d61e10d747cae0d25512b", + "CorpusId": 237010917}, "corpusId": 237010917, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bca8e91640c79791b54d61e10d747cae0d25512b", "title": "Technology-Augmented Multilingual Communication Models: New Interaction Paradigms, Shifts in the Language Services Industry, and Implications for Training Programs", "abstract": "This paper explores how technology, particularly @@ -22338,12 +25306,14 @@ interactions: at offering an introductory overview of the current landscape and envisaging potential paths for forthcoming scenarios.", "venue": "MTSUMMIT", "year": 2021, "referenceCount": 55, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": null, "journal": {"pages": "49-59"}, "authors": - [{"authorId": "2123124703", "name": "Francesco Saina"}]}, {"paperId": "78e3fff6ac99a0b2e4db79d556763def0af64700", - "externalIds": {"CorpusId": 237088731}, "url": "https://www.semanticscholar.org/paper/78e3fff6ac99a0b2e4db79d556763def0af64700", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, + "journal": {"pages": "49-59"}, "authors": [{"authorId": "2123124703", "name": + "Francesco Saina"}]}, {"paperId": "78e3fff6ac99a0b2e4db79d556763def0af64700", + "externalIds": {"CorpusId": 237088731}, "corpusId": 237088731, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/78e3fff6ac99a0b2e4db79d556763def0af64700", "title": "Tabula Rasa : Mechanism , Intelligence , and the Blank Slate in Computing and", "abstract": "This project critically examines the \u201ctabula rasa\u201d in computer science and urbanism, questioning the emptiness it @@ -22360,11 +25330,12 @@ interactions: a novel transposition of the machine learning framework to cultural landscape analysis. By Claire Gorman1 1Program in Computing and the Arts, Yale University", "venue": "", "year": 2021, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2091014922", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2091014922", "name": "C. Gorman"}]}, {"paperId": "956ad1fd9b87746a8de37ff0c3ba45d8885fd2c7", - "externalIds": {"CorpusId": 236986254}, "url": "https://www.semanticscholar.org/paper/956ad1fd9b87746a8de37ff0c3ba45d8885fd2c7", + "externalIds": {"CorpusId": 236986254}, "corpusId": 236986254, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/956ad1fd9b87746a8de37ff0c3ba45d8885fd2c7", "title": "NSF Workshop on Micro/Nano Circuits and Systems Design and Design Automation: Challenges and Opportunities", "abstract": "ion is essential for human design of these physical systems. The abstraction of physical systems, @@ -22458,13 +25429,13 @@ interactions: Telluride Neuromorphic Workshop, would enable these educational opportunities, both for current students and for practitioners in these fields.", "venue": "", "year": 2021, "referenceCount": 262, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "2702388", "name": "G. Cauwenberghs"}, - {"authorId": "2259796", "name": "J. Cong"}, {"authorId": "2107171436", "name": - "X. S. Hu"}, {"authorId": "1751607", "name": "P. Mazumder"}]}, {"paperId": - "1ae90f79e57a27c13033d9513bd003c4f67672e7", "externalIds": {"CorpusId": 236942711}, - "url": "https://www.semanticscholar.org/paper/1ae90f79e57a27c13033d9513bd003c4f67672e7", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "2702388", + "name": "G. Cauwenberghs"}, {"authorId": "2259796", "name": "J. Cong"}, {"authorId": + "2107171436", "name": "X. S. Hu"}, {"authorId": "1751607", "name": "P. Mazumder"}]}, + {"paperId": "1ae90f79e57a27c13033d9513bd003c4f67672e7", "externalIds": {"CorpusId": + 236942711}, "corpusId": 236942711, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1ae90f79e57a27c13033d9513bd003c4f67672e7", "title": "SFPE Europe Q 2 2021 Issue 22 A Message from the SFPE Europe Chair", "abstract": "I wanted to give some personal reflections on the SFPE activities over the last year. Due to the Covid outbreak we had an abrupt termination @@ -22486,11 +25457,11 @@ interactions: and all our volunteers prepared to invest personal time and effort into the SFPE cause. Very impressive.", "venue": "", "year": 2021, "referenceCount": 65, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": []}, {"paperId": "65d2606cdcdfcd47567b9049101f2a446859e746", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": []}, {"paperId": "65d2606cdcdfcd47567b9049101f2a446859e746", "externalIds": {"MAG": "3175708072", "DOI": "10.38027/ICCAUA2021142N8", "CorpusId": - 236850678}, "url": "https://www.semanticscholar.org/paper/65d2606cdcdfcd47567b9049101f2a446859e746", + 236850678}, "corpusId": 236850678, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/65d2606cdcdfcd47567b9049101f2a446859e746", "title": "New approaches of the Next-gen collaborative design platform", "abstract": "The architecture design process always changes because the software always updates with new tools and the development - innovation is in the first line @@ -22507,13 +25478,14 @@ interactions: 3d modeling of architectural design thinking. A collaborative design platform creating a more efficient and versatile architecture.", "venue": "Proceedings Article", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://iccaua.com/PDFs/2021Conference%20full%20bool%20proceedings/1_Architecture/A_ICCAUA2021205_LAMARI_Meryem.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Proceedings Article"}, "authors": [{"authorId": "2122546805", "name": "Vlachodimos Georgios"}]}, {"paperId": "6eff361d81d171c9c8cbcad391ac1d018a013c34", "externalIds": {"CorpusId": - 236784171}, "url": "https://www.semanticscholar.org/paper/6eff361d81d171c9c8cbcad391ac1d018a013c34", + 236784171}, "corpusId": 236784171, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6eff361d81d171c9c8cbcad391ac1d018a013c34", "title": "Dangerous Information Technology of the Future. What Impact can Artificial Consciousness have on the Consciousness and Subconscious of Individuals and Groups? The Experience of Psychological and Psychiatric Examination of @@ -22552,29 +25524,30 @@ interactions: even at the initial stage of its development it can easily dominate over the human one. Review Article", "venue": "", "year": 2021, "referenceCount": 161, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Psychology", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": null, "authors": [{"authorId": "2321882", "name": "W. Lycan"}, - {"authorId": "2082478328", "name": "D. Rosenthal"}, {"authorId": "102822564", - "name": "N. Nelkin"}, {"authorId": "30496490", "name": "R. V. Gulick"}, {"authorId": - "144926542", "name": "E. Bauer"}, {"authorId": "144691609", "name": "M. Goswami"}, - {"authorId": "3328131", "name": "H. Atmanspacher"}, {"authorId": "47172840", - "name": "E. Manousakis"}, {"authorId": "2122751728", "name": "Penrose"}, {"authorId": - "1466232955", "name": "Hameroff"}]}, {"paperId": "83713004a44dca30f135b6cf0f8e45dc31658d11", - "externalIds": {"MAG": "3171058059", "DOI": "10.1007/978-3-030-68222-4_10", - "CorpusId": 236665874}, "url": "https://www.semanticscholar.org/paper/83713004a44dca30f135b6cf0f8e45dc31658d11", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "2321882", + "name": "W. Lycan"}, {"authorId": "2082478328", "name": "D. Rosenthal"}, {"authorId": + "102822564", "name": "N. Nelkin"}, {"authorId": "30496490", "name": "R. V. + Gulick"}, {"authorId": "144926542", "name": "E. Bauer"}, {"authorId": "144691609", + "name": "M. Goswami"}, {"authorId": "3328131", "name": "H. Atmanspacher"}, + {"authorId": "47172840", "name": "E. Manousakis"}, {"authorId": "2122751728", + "name": "Penrose"}, {"authorId": "1466232955", "name": "Hameroff"}]}, {"paperId": + "83713004a44dca30f135b6cf0f8e45dc31658d11", "externalIds": {"MAG": "3171058059", + "DOI": "10.1007/978-3-030-68222-4_10", "CorpusId": 236665874}, "corpusId": + 236665874, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/83713004a44dca30f135b6cf0f8e45dc31658d11", "title": "Neuromorphic Silicon Photonics for Artificial Intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 53, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "417-447", "name": ""}, "authors": [{"authorId": "8158949", "name": - "B. Marquez"}, {"authorId": "9064713", "name": "Chaoran Huang"}, {"authorId": + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "417-447", "name": ""}, "authors": [{"authorId": "8158949", + "name": "B. Marquez"}, {"authorId": "9064713", "name": "Chaoran Huang"}, {"authorId": "144504492", "name": "P. Prucnal"}, {"authorId": "2694890", "name": "B. Shastri"}]}, {"paperId": "15c63458d55079c3dbe9dcfd616d2c9b1708e816", "externalIds": {"MAG": - "3165246639", "DOI": "10.5937/ZRFFP51-30903", "CorpusId": 236656242}, "url": - "https://www.semanticscholar.org/paper/15c63458d55079c3dbe9dcfd616d2c9b1708e816", + "3165246639", "DOI": "10.5937/ZRFFP51-30903", "CorpusId": 236656242}, "corpusId": + 236656242, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15c63458d55079c3dbe9dcfd616d2c9b1708e816", "title": "Models of lexical semantics in the algorithms for natural language processing", "abstract": "The aim of this study was to determine whether some of the approaches of lexical semantics for studying word meaning could be @@ -22605,26 +25578,29 @@ interactions: Essentially, this study sought to examine whether the basic ideas and characteristics of lexical semantics could be found in the architecture of the above-noted algorithms.", "venue": "", "year": 2021, "referenceCount": 10, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Linguistics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "51", "pages": "391-410", "name": - ""}, "authors": [{"authorId": "2172014483", "name": "M. B. Dilpari\u0107"}, - {"authorId": "117129867", "name": "S. Perovi\u0107"}]}, {"paperId": "ab7b64c5e2609033a813414e3b58ab0b964b0b2d", - "externalIds": {"MAG": "3165160864", "DOI": "10.1016/B978-0-12-818154-6.00009-3", - "CorpusId": 236665983}, "url": "https://www.semanticscholar.org/paper/ab7b64c5e2609033a813414e3b58ab0b964b0b2d", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://scindeks-clanci.ceon.rs/data/pdf/0354-3293/2021/0354-32932101391D.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "51", + "pages": "391-410", "name": ""}, "authors": [{"authorId": "2172014483", "name": + "M. B. Dilpari\u0107"}, {"authorId": "117129867", "name": "S. Perovi\u0107"}]}, + {"paperId": "ab7b64c5e2609033a813414e3b58ab0b964b0b2d", "externalIds": {"MAG": + "3165160864", "DOI": "10.1016/B978-0-12-818154-6.00009-3", "CorpusId": 236665983}, + "corpusId": 236665983, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ab7b64c5e2609033a813414e3b58ab0b964b0b2d", "title": "Bioinformatics\u2013computer programming", "abstract": null, "venue": "", "year": 2021, "referenceCount": 112, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "125-148", - "name": ""}, "authors": [{"authorId": "2122014120", "name": "M. Iftikhar"}, - {"authorId": "115445970", "name": "Ghulam Mohyuddin Talha"}, {"authorId": - "120675472", "name": "M. Aleem"}, {"authorId": "3807216", "name": "A. Shamim"}]}, - {"paperId": "afb2ee859bdfb0f0527c529031218ec9546d9e7e", "externalIds": {"MAG": - "3163255587", "DOI": "10.30525/978-9934-26-049-0-16", "CorpusId": 236716839}, - "url": "https://www.semanticscholar.org/paper/afb2ee859bdfb0f0527c529031218ec9546d9e7e", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "pages": "125-148", "name": ""}, "authors": [{"authorId": "2122014120", + "name": "M. Iftikhar"}, {"authorId": "115445970", "name": "Ghulam Mohyuddin + Talha"}, {"authorId": "120675472", "name": "M. Aleem"}, {"authorId": "3807216", + "name": "A. Shamim"}]}, {"paperId": "afb2ee859bdfb0f0527c529031218ec9546d9e7e", + "externalIds": {"MAG": "3163255587", "DOI": "10.30525/978-9934-26-049-0-16", + "CorpusId": 236716839}, "corpusId": 236716839, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/afb2ee859bdfb0f0527c529031218ec9546d9e7e", "title": "THE USE OF ARTIFICIAL INTELLIGENCE FOR ARABIC LEARNING", "abstract": "In the study the features of artificial intelligence use, the main advantages and disadvantages of this technology are analyzed; the aspects of such a pedagogical @@ -22659,24 +25635,28 @@ interactions: communication and other skills.", "venue": "Priority areas for development of scientific research: domestic and foreign experience", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Priority areas for development of scientific research: domestic - and foreign experience"}, "authors": [{"authorId": "117230624", "name": "L. - Viktorova"}, {"authorId": "2090220917", "name": "K. Mamchur"}]}, {"paperId": + "openAccessPdf": {"url": "http://www.baltijapublishing.lv/omp/index.php/bp/catalog/download/113/3385/7129-1", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Priority areas for development of scientific research: + domestic and foreign experience"}, "authors": [{"authorId": "117230624", "name": + "L. Viktorova"}, {"authorId": "2090220917", "name": "K. Mamchur"}]}, {"paperId": "1c8c5194479f44196462f5da4e982b6a07814fe6", "externalIds": {"MAG": "3169739295", - "DOI": "10.1007/978-3-030-72624-9_8", "CorpusId": 236704182}, "url": "https://www.semanticscholar.org/paper/1c8c5194479f44196462f5da4e982b6a07814fe6", + "DOI": "10.1007/978-3-030-72624-9_8", "CorpusId": 236704182}, "corpusId": + 236704182, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1c8c5194479f44196462f5da4e982b6a07814fe6", "title": "Artificial Intelligence in Internal Audit and Risk Assessment", "abstract": null, "venue": "", "year": 2021, "referenceCount": 28, "citationCount": - 2, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": ["Business"], - "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "pages": "179-192", "name": ""}, "authors": - [{"authorId": "80178605", "name": "S. Kahyao\u011flu"}, {"authorId": "7945902", - "name": "T. Aksoy"}]}, {"paperId": "a84bfa62560892ac1231c63d3dbbe4b1849227f0", - "externalIds": {"MAG": "3164341546", "DOI": "10.3233/HSM-211179", "CorpusId": - 236754826}, "url": "https://www.semanticscholar.org/paper/a84bfa62560892ac1231c63d3dbbe4b1849227f0", + 2, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": + "http://openaccess.ihu.edu.tr/xmlui/bitstream/20.500.12154/1434/3/TamerAksoy_Financial%20Ecosystem.pdf", + "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "179-192", "name": ""}, "authors": [{"authorId": "80178605", "name": + "S. Kahyaoglu"}, {"authorId": "7945902", "name": "T. Aksoy"}]}, {"paperId": + "a84bfa62560892ac1231c63d3dbbe4b1849227f0", "externalIds": {"MAG": "3164341546", + "DOI": "10.3233/HSM-211179", "CorpusId": 236754826}, "corpusId": 236754826, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a84bfa62560892ac1231c63d3dbbe4b1849227f0", "title": "Does higher education properly prepare graduates for the growing artificial intelligence market? Gaps identification using text mining", "abstract": "BACKGROUND: The renewed advent of Artificial Intelligence (AI) is inducing @@ -22696,482 +25676,59 @@ interactions: at the individual and the organizational levels. A study that can help shape educational programs to respond to the AI market requirements.", "venue": "", "year": 2021, "referenceCount": 37, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://content.iospress.com:443/download/human-systems-management/hsm211179?id=human-systems-management%2Fhsm211179", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "1-13", "name": "Human systems management"}, "authors": [{"authorId": "122940276", "name": "L. Benhayoun"}, {"authorId": "145034519", "name": "D. Lang"}]}, {"paperId": "7e1ae3c5c91ce973432d21bf9011b79983328ddc", "externalIds": {"MAG": "3160326352", "DOI": "10.1007/978-3-030-69978-9_2", - "CorpusId": 236764547}, "url": "https://www.semanticscholar.org/paper/7e1ae3c5c91ce973432d21bf9011b79983328ddc", + "CorpusId": 236764547}, "corpusId": 236764547, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7e1ae3c5c91ce973432d21bf9011b79983328ddc", "title": "Perspectives on Artificial Intelligence", "abstract": null, "venue": "", "year": 2021, "referenceCount": 16, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-030-69978-9_2.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "7-17", "name": ""}, "authors": [{"authorId": "1792014", "name": "B. Stahl"}]}, {"paperId": "10e80a6529352924398be4b51117dfdac7784af6", "externalIds": {"MAG": "3168688739", "DOI": "10.1007/978-3-030-70424-7_11", - "CorpusId": 236667102}, "url": "https://www.semanticscholar.org/paper/10e80a6529352924398be4b51117dfdac7784af6", + "CorpusId": 236667102}, "corpusId": 236667102, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/10e80a6529352924398be4b51117dfdac7784af6", "title": "Artificial Intelligence and Emerging Technologies in Travel", "abstract": null, "venue": "", "year": 2021, "referenceCount": 28, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "pages": "313-337", "name": - ""}, "authors": [{"authorId": "145936404", "name": "B. Vinod"}]}, {"paperId": - "eae9bb31cca551ef745697d3472677a0af80a132", "externalIds": {"DBLP": "journals/qip/XueQ21", - "DOI": "10.1007/s11128-021-03172-3", "CorpusId": 236522481}, "url": "https://www.semanticscholar.org/paper/eae9bb31cca551ef745697d3472677a0af80a132", - "title": "Preparation of three-atom GHZ states based on deep reinforcement - learning", "abstract": null, "venue": "Quantum Inf. Process.", "year": 2021, - "referenceCount": 29, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "20", "pages": "1-17", "name": - "Quantum Inf. Process."}, "authors": [{"authorId": "1379689239", "name": "Guanghao - Xue"}, {"authorId": "47659868", "name": "L. Qiu"}]}, {"paperId": "034d3a6221b511dd1ca593d105fd58c6d9723bee", - "externalIds": {"DOI": "10.31033/ijemr.11.3.38", "CorpusId": 236525026}, "url": - "https://www.semanticscholar.org/paper/034d3a6221b511dd1ca593d105fd58c6d9723bee", - "title": "The Automation of Critical Path Method using Machine Learning: A - Conceptual Study", "abstract": "This research aims to shed light on the use - of machine learning in improving, developing and automating the critical path - method, solving its problems, studying this effect and its dimensions, and - discussing that from many", "venue": "", "year": 2021, "referenceCount": 22, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Business", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2121517406", - "name": "Othman Aljumaili"}]}, {"paperId": "efdf603a25aa3140562fee3ee6c5ea122fd7d77e", - "externalIds": {"DOI": "10.17352/tcsit.000037", "CorpusId": 236500128}, "url": - "https://www.semanticscholar.org/paper/efdf603a25aa3140562fee3ee6c5ea122fd7d77e", - "title": "The making and development of Baxter the Empowered Chatbot impered - with Machine Intelligence", "abstract": "The creation and analysis of intelligent - agents (software and machinery) is called Artifi cial Intelligence. Intelligent - machines can do many tasks \u2013 from labour work to highly complicated operations. - Prominent trends in this fi eld are human brain simulation, natural language - processing, neural networking, user friendly operating system, adaptability - to ethical and modern engines. One of the typical examples of the A.I. system - is a \u201cchatbot\u201d. A chatbot is a computer program which responds like - an intelligent entity when conversations are discussed. The conversation may - be through text, voice, code. Any chatbot program understands human languages - by natural language processing. Due to this, the system interprets human beings - through input information fed to it. A chatbot also performs some additional - functions like calculation, playing songs, calling anyone and small user defi - ned functions. A popular example of the chatbot is BAXTER Bot (Artifi cial - Intelligence combined computer entity) which is a human command execution - bot. This chatbot is an innovative interface between human and work engine, - making that command fl ow directly from human to the machine within the input - entity (keyboard and microphone etc). The Turing test is one of the most popular - measures of intelligence of such machines. The Turing test develops mathematical - models of regression. Today\u2019s A.I. systems \u201cpretend to act like\u201d - intelligent entities instead of being one. For example, today\u2019s machines - require too much of a heavy dataset but modern A.I. model does not require - that much intelligence. There is a need to view AI systems from a new perspective - and theory of machine intelligence\u2019s required tool for this [1,2].", - "venue": "", "year": 2021, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "82908427", - "name": "J. Srimathi"}, {"authorId": "2152732832", "name": "Girish P"}, {"authorId": - "2125275092", "name": "kurane Anugraha Ramesh"}]}, {"paperId": "794fa3424656f443b0df03a575440e905c3403c2", - "externalIds": {"DBLP": "conf/atal/KampikG21", "DOI": "10.1007/978-3-030-82017-6_17", - "CorpusId": 236460332}, "url": "https://www.semanticscholar.org/paper/794fa3424656f443b0df03a575440e905c3403c2", - "title": "Explainable Reasoning in Face of Contradictions: From Humans to - Machines", "abstract": null, "venue": "EXTRAAMAS@AAMAS", "year": 2021, "referenceCount": - 45, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "280-295"}, "authors": [{"authorId": "2437582", "name": "Timotheus - Kampik"}, {"authorId": "15773387", "name": "D. Gabbay"}]}, {"paperId": "ffd186e936779287c16c3d5107081906d55f5c05", - "externalIds": {"DBLP": "conf/hci/Karvonen21", "DOI": "10.1007/978-3-030-77431-8_14", - "CorpusId": 236150829}, "url": "https://www.semanticscholar.org/paper/ffd186e936779287c16c3d5107081906d55f5c05", - "title": "Questions in Cognitive Mimetics", "abstract": null, "venue": "HCI", - "year": 2021, "referenceCount": 28, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "224-239"}, "authors": [{"authorId": "74461425", - "name": "A. Karvonen"}]}, {"paperId": "68c32ab884c31f006599b913f7f0cc81f65bdeb6", - "externalIds": {"DBLP": "conf/hci/Komischke21", "DOI": "10.1007/978-3-030-77772-2_17", - "CorpusId": 236150928}, "url": "https://www.semanticscholar.org/paper/68c32ab884c31f006599b913f7f0cc81f65bdeb6", - "title": "Human-Centered Artificial Intelligence Considerations and Implementations: - A Case Study from Software Product Development", "abstract": null, "venue": - "HCI", "year": 2021, "referenceCount": 4, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "260-268"}, "authors": [{"authorId": - "3308982", "name": "Tobias Komischke"}]}, {"paperId": "6e59749d59a04d7610f5d30ff058926c190f655a", - "externalIds": {"DBLP": "conf/hci/Saariluoma21", "DOI": "10.1007/978-3-030-77431-8_9", - "CorpusId": 236151041}, "url": "https://www.semanticscholar.org/paper/6e59749d59a04d7610f5d30ff058926c190f655a", - "title": "Human Research in Technology Design", "abstract": null, "venue": - "HCI", "year": 2021, "referenceCount": 5, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"pages": "151-161"}, - "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}]}, {"paperId": - "da0670807e16ca320833e71ac5c79e068e3efd65", "externalIds": {"MAG": "3158882962", - "DOI": "10.1007/978-3-030-70277-9_4", "CorpusId": 235832661}, "url": "https://www.semanticscholar.org/paper/da0670807e16ca320833e71ac5c79e068e3efd65", - "title": "Population-Based Metaheuristics", "abstract": null, "venue": "", - "year": 2021, "referenceCount": 35, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "95-130", - "name": ""}, "authors": [{"authorId": "1760426", "name": "V. Maniezzo"}, {"authorId": - "2032887", "name": "Marco A. Boschetti"}, {"authorId": "1684799", "name": - "T. St\u00fctzle"}]}, {"paperId": "68b7daf45563fde9c3c59cc14d099ddf0c693583", - "externalIds": {"DOI": "10.1088/1742-6596/1966/1/012041", "CorpusId": 235817482}, - "url": "https://www.semanticscholar.org/paper/68b7daf45563fde9c3c59cc14d099ddf0c693583", - "title": "Adversarial Response Generation Against Topic Relevance", "abstract": - "In recent years, generative adversarial networks have performed well in the - field of dialogue generation to improve the information diversity of dialogue - responses. Often overlooked, however, is that the query and response are not - relevant on the topic. In order to improve the topic relevance of chat conversation, - the paper proposed a topic-relevance adversarial response generation model, - TR-ARG, which is composed of generator G, discriminator D and topic classifier - T. The experiment was evaluated on OpenSubtitles, an open dialog dataset, - and compared with the current baseline models SEQ2SEQ and GAN-AEL. The results - show that our model can effectively improve the topic relevance of generated - responses.", "venue": "Journal of Physics: Conference Series", "year": 2021, - "referenceCount": 17, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Conference"], "publicationDate": null, "journal": {"volume": - "1966", "name": "Journal of Physics: Conference Series"}, "authors": [{"authorId": - "2151331276", "name": "Peng Zhang"}, {"authorId": "2157834487", "name": "Hongrong - Wang"}, {"authorId": "2149135428", "name": "Zhigang Zhou"}, {"authorId": "2153610313", - "name": "Yu Wang"}]}, {"paperId": "9cd5a81d3d8d7066389d241677a7d9411a32158f", - "externalIds": {"DBLP": "journals/corr/abs-2106-13233", "CorpusId": 235652152}, - "url": "https://www.semanticscholar.org/paper/9cd5a81d3d8d7066389d241677a7d9411a32158f", - "title": "Post Selections Using Test Sets (PSUTS) and How Developmental Networks - Avoid Them", "abstract": "This paper raises a rarely reported practice in - Artificial Intelligence (AI) called Post Selection Using Test Sets (PSUTS). - Consequently, the popular error-backprop methodology in deep learning lacks - an acceptable generalization power. All AI methods fall into two broad schools, - connectionist and symbolic. The PSUTS fall into two kinds, machine PSUTS and - human PSUTS. The connectionist school received criticisms for its \u201cscruffiness\u201d - due to a huge number of network parameters and now the worse machine PSUTS; - but the seemingly \u201cclean\u201d symbolic school seems more brittle because - of a weaker generalization power using human PSUTS. This paper formally defines - what PSUTS is, analyzes why error-backprop methods with random initial weights - suffer from severe local minima, why PSUTS violates well-established research - ethics, and how every paper that used PSUTS should have at least transparently - reported PSUTS. For improved transparency in future publications, this paper - proposes a new standard for performance evaluation of AI, called developmental - errors for all networks trained, along with Three Learning Conditions: (1) - an incremental learning architecture, (2) a training experience and (3) a - limited amount of computational resources. Developmental Networks avoid PSUTS - and are not \u201cscruffy\u201d because they drive Emergent Turing Machines - and are optimal in the sense of maximum-likelihood across lifetime.", "venue": - "ArXiv", "year": 2021, "referenceCount": 76, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "abs/2106.13233", "name": "ArXiv"}, - "authors": [{"authorId": "145926447", "name": "J. Weng"}]}, {"paperId": "ab0f3f3deede0dd3e546a65bc8d21dc73675b5e9", - "externalIds": {"MAG": "3169933101", "DOI": "10.14569/IJACSA.2021.0120571", - "CorpusId": 235651165}, "url": "https://www.semanticscholar.org/paper/ab0f3f3deede0dd3e546a65bc8d21dc73675b5e9", - "title": "Automating and Optimizing Software Testing using Artificial Intelligence - Techniques", "abstract": "The final product of software development process - is a software system and testing is one of the important stages in this process. - The success of this process can be determined by how well it accomplishes - its goal. Due to the advancement of technology, various software testing tools - have been introduced in the software engineering discipline. The use of software - is increasing day-by-day and complexity of software functions are challenging - and there is need to release the software within the short quality evaluation - period, there is a high demand in adopting automation in software testing. - Emergence of automatic software testing tools and techniques helps in quality - enhancement and reducing time and cost in the software development activity. - Artificial Intelligence (AI) techniques are widely applied in different areas - of Software engineering (SE). Application of AI techniques can help in achieving - good performance in software Testing and increase the productivity of the - software development firms. This paper briefly presents the state of the art - in the field of software testing by applying AI techniques in software testing. - Keywords\u2014Software testing; artificial intelligence; testing automation; - software engineering; software quality", "venue": "", "year": 2021, "referenceCount": - 33, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "12", "name": "International Journal of Advanced Computer Science - and Applications"}, "authors": [{"authorId": "73774863", "name": "Minimol - Anil Job"}]}, {"paperId": "e6f9c89289abf6b7318782b7218f4b55d8563a34", "externalIds": - {"DBLP": "conf/ecis/FukasRRT21", "CorpusId": 235428439}, "url": "https://www.semanticscholar.org/paper/e6f9c89289abf6b7318782b7218f4b55d8563a34", - "title": "Developing an Artificial Intelligence Maturity Model for Auditing", - "abstract": "Artificial Intelligence (AI) is increasingly being used in various - domains including highly regulated areas such as auditing. Although the use - of AI in auditing may seem promising at the first glance, there are a number - of implications that have so far prevented its broad application. By proposing - the first Auditing Artificial Intelligence Maturity Model (A-AIMM), we assess - the adoption and diffusion of AI in auditing by considering audit specific - requirements. The resulting model contains eight different dimensions and - five different maturity levels that foster audit firms in becoming AI-enabled - organisations by providing recommendations for the further use of AI with - their current capabilities. The development procedure represents a Design - Science Research approach including a systematic literature review, a qualitative - survey with audit experts and an iterative development process.", "venue": - "European Conference on Information Systems", "year": 2021, "referenceCount": - 90, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference", "Review"], "publicationDate": null, "journal": - null, "authors": [{"authorId": "2111965685", "name": "Philipp Fukas"}, {"authorId": - "3364863", "name": "Jonas Rebstadt"}, {"authorId": "146743228", "name": "Florian - Remark"}, {"authorId": "145589040", "name": "Oliver Thomas"}]}, {"paperId": - "60d64090cd530f6a83b7d21e641843fb47e9cc0b", "externalIds": {"CorpusId": 235420055}, - "url": "https://www.semanticscholar.org/paper/60d64090cd530f6a83b7d21e641843fb47e9cc0b", - "title": "Carpentered Diegetic Things: Alternative Design Ideologies for AI - Material Relations", "abstract": "This paper considers a More-than Human-Centered - design approach that presents Artificial Intelligence (AI) and data as materials - for design by utilizing the non-anthropocentric philosophy of Object-Oriented - Ontology (OOO) and the related thesis of Alien Phenomenology. This paper also - explores methods of making AI operations, functions and impacts legible through - the speculative design practice of Design Fiction by adopting a perspective - that acknowledges the independent perspectives and interdependent relationships - of human and non-human actants. The structure of this paper is as follows; - first, we will give a brief account and understanding of AI technology, with - reference to our philosophical guinea pig Amazon\u2019s AI assistant Alexa - and Skills service. Second, we will unpack the theory of OOO detailing the - related theories to develop an alternative perspective of AI technology. Further, - it will posit how adopting a More-Than Human-Centered design approach can - assist in negotiating the complexities of AI and move towards possible implementation - solutions. Third, and finally, we demonstrate this alternative approach by - utilizing the philosophical theories of OOO, and a Design Fiction as World - Building approach to philosophically carpenter a Diegetic Thing Amazon\u2019s - AI assistant Alexa which speculatively transcends Alexa\u2019s current skills - into functions of legible AI.", "venue": "", "year": 2021, "referenceCount": - 35, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "121401948", "name": "Franziska Pilling"}]}, {"paperId": "abe2e8c0ec845ad5a613f799cd00e488f0e4b3d9", - "externalIds": {"CorpusId": 235416247}, "url": "https://www.semanticscholar.org/paper/abe2e8c0ec845ad5a613f799cd00e488f0e4b3d9", - "title": "On educating machine learners", "abstract": "Machine education is - an emerging research field that focuses on the problem which is inverse to - machine learning. To date, the literature on educating machines is still in - its infancy. A fairly low number of methodology and method papers are scattered - throughout various formal and informal publication avenues, mainly because - the field is not yet well coalesced (with no well established discussion forums - or investigation pathways), but also due to the breadth of its potential ramifications - and research directions. In this study we bring together the existing literature - and organise the discussion into a small number of research directions (out - of many) which are to date sufficiently explored to form a minimal critical - mass that can push the machine education concept further towards a standalone - research field status.", "venue": "", "year": 2021, "referenceCount": 38, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "3103429", "name": "George Leu"}, {"authorId": - "1747523", "name": "Jiangjun Tang"}]}, {"paperId": "2962468f13562c45451f7a4bbd5b7e0d5d00f04e", - "externalIds": {"DBLP": "phd/us/Saarinen21", "CorpusId": 250095337}, "url": - "https://www.semanticscholar.org/paper/2962468f13562c45451f7a4bbd5b7e0d5d00f04e", - "title": "Query Strategies for Directed Graphical Models and their Application - to Adaptive Testing", "abstract": "of \u201cQuery Strategies for Directed - Graphical Models and their Application to Adaptive Testing\u201d by Sam Saarinen, - Ph.D., Brown University, May 2021. Educational assessments are crucial for - both instructors and education researchers to measure learning, troubleshoot - student problems, evaluate pedagogy, and improve education. Unfortunately, - creating and administering reliable assessments is a labor-intensive process. - This dissertation frames assessment creation from a pool of assessment items - as a machine learning problem and tackles this problem by learning directed - graphical models of topic prerequisite relationships. It is shown on a variety - of real datasets that these models can be learned in a computationallyand - dataefficient manner from records of student responses, can be queried efficiently, - and produce accurate predictions about student knowledge. This technique is - used to develop and administer novel computer science assessments of instructor-defined - specificity using student-authored questions. Query Strategies for Directed - Graphical Models and their Application to Adaptive Testing by Sam Saarinen - B. Sc., University of Kentucky, 2016 Sc. M., Brown University, 2018 A dissertation - submitted in partial fulfillment of the requirements for the Degree of Doctor - of Philosophy in the Department of Computer Science at Brown University Providence, - Rhode Island May 2021 \u00a9 Copyright 2021 by Sam Saarinen This dissertation - by Sam Saarinen is accepted in its present form by the Department of Computer - Science as satisfying the dissertation requirement for the degree of Doctor - of Philosophy. Date Michael L. Littman, Director Recommended to the Graduate - Council Date Stephen Bach, Reader Date Shriram Krishnamurthi, Reader Approved - by the Graduate Council Date Andrew G. Campbell Dean of the Graduate School", - "venue": "", "year": 2021, "referenceCount": 82, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "119716163", "name": "S. Saarinen"}]}, {"paperId": "0dc37d26a40df769a071b5325c79b5d80c26a126", - "externalIds": {"DOI": "10.1088/1742-6596/1883/1/012064", "CorpusId": 235281178}, - "url": "https://www.semanticscholar.org/paper/0dc37d26a40df769a071b5325c79b5d80c26a126", - "title": "Question answering system based on tourism knowledge graph", "abstract": - "Nowadays tourism information services only provide users with massive and - fragmented information returned by independent network search which makes - users often need to spend a lot of time and energy to find what they really - want from the massive data. As a result, route designing is very complicated. - In view of this situation, this study builds a tourism knowledge graph based - on neo4j and constructs a question answering system (QA). Also, we carry out - the model and system performance evaluation, trying to improve the user satisfaction - with query experience. According to the structure of question answering system - (QA), this research designed and implemented named entity recognition (NER) - model based on Bert-BiLSTM-CRF and matching reasoning model based on templates. - With the above methods, natural language questions were successfully transformed - into cypher query statements recognizable in graph database, and the corresponding - answers will be captured and returned from tourism knowledge graph. According - to the experiment, the method of Bert-BiLSTM-CRF obtains the state of art - and QA system performs quickly and efficiently. For the purpose that artificial - intelligence helps the development of tourism industry, this study has a certain - significance.", "venue": "", "year": 2021, "referenceCount": 25, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "1883", "name": "Journal - of Physics: Conference Series"}, "authors": [{"authorId": "2106576284", "name": - "Y. Sui"}]}, {"paperId": "2498f889022409f80ac8c35532b64e25ec7ba1d8", "externalIds": - {"DBLP": "conf/colins/SavytskaVBPS21", "CorpusId": 235271387}, "url": "https://www.semanticscholar.org/paper/2498f889022409f80ac8c35532b64e25ec7ba1d8", - "title": "Using Word2vec Technique to Determine Semantic and Morphologic Similarity - in Embedded Words of the Ukrainian Language", "abstract": "The study presents - the word translation into vectors of real numbers (word embeddings), one of - the most important topics in natural language processing. Word2vec is the - latest techniques developed by Tomas Mikolov to study high quality vectors. - The majority of studies on clustering the word vectors were made in English. - Dmitry Chaplinsky has already counted and published vectors for the Ukrainian - language by using LexVec, Word2vec and GloVe techniques, obtained from fiction, - newswire and ubercorpus texts, for VESUM dictionary and other related NLP - tools for the Ukrainian language. There was no research done on the vectors - by using Word2vec technique to create Ukrainian corpus, obtained from Wikipedia - dump as the main source. The collection contains more than two hundred and - sixty one million words. The dictionary of words (unique words) obtained from - the corpus is more than seven hundred and nine thousand. The research using - machine technology Word2vec is of great practical importance to computerise - many areas of linguistic analysis. The open-source Python programming language - was used to obtain word vectors with Word2vec techniques and to calculate - the cosine proximity of the vectors. In order to do machine learning with - Word2vec techniques on Python, a resource containing open source licensed - software libraries called \"Gensim\" was used. Calculations regarding the - cosine affinities of the obtained vectors were made using \"Gensim\" libraries. - The research examining the clustering of the word vectors obtained from the - Ukrainian corpus was made considering the two sub-branches of linguistics, - semantics and morphology (language morphology). Firstly, it was investigated - how accurately the vectors are obtained from the Ukrainian corpus and how - the words represent the cluster they belong to. Secondly, it was investigated - how word vectors are clustered and associated respectively to the morphological - features of the suffixes of the Ukrainian language.", "venue": "COLINS", "year": - 2021, "referenceCount": 22, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "235-248"}, "authors": [{"authorId": - "2094582555", "name": "Larysa Savytska"}, {"authorId": "12082005", "name": - "N. Vnukova"}, {"authorId": "2106530048", "name": "Iryna Bezugla"}, {"authorId": - "2100991382", "name": "Vasyl Pyvovarov"}, {"authorId": "2106529443", "name": - "M. T. S\u00fcbay"}]}, {"paperId": "cd8e65d8feb00c54aa0c9e045fdfe51b65ac9bbe", - "externalIds": {"ACL": "2021.naacl-srw.4", "DBLP": "conf/naacl/Musil21", "DOI": - "10.18653/v1/2021.naacl-srw.4", "CorpusId": 235097472}, "url": "https://www.semanticscholar.org/paper/cd8e65d8feb00c54aa0c9e045fdfe51b65ac9bbe", - "title": "Representations of Meaning in Neural Networks for NLP: a Thesis - Proposal", "abstract": "Neural networks are the state-of-the-art method of - machine learning for many problems in NLP. Their success in machine translation - and other NLP tasks is phenomenal, but their interpretability is challenging. - We want to find out how neural networks represent meaning. In order to do - this, we propose to examine the distribution of meaning in the vector space - representation of words in neural networks trained for NLP tasks. Furthermore, - we propose to consider various theories of meaning in the philosophy of language - and to find a methodology that would enable us to connect these areas.", "venue": - "North American Chapter of the Association for Computational Linguistics", - "year": 2021, "referenceCount": 43, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": null, "journal": {"pages": "24-31"}, "authors": - [{"authorId": "1774026", "name": "Tom\u00e1\u0161 Musil"}]}, {"paperId": "e50b6b7378001bcd7c156bffb4891a1abaf1e84e", - "externalIds": {"MAG": "3155683640", "DOI": "10.1007/978-3-030-74826-5_3", - "CorpusId": 235081403}, "url": "https://www.semanticscholar.org/paper/e50b6b7378001bcd7c156bffb4891a1abaf1e84e", - "title": "Hexagon of Intelligence", "abstract": null, "venue": "", "year": - 2021, "referenceCount": 20, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "25-34", - "name": ""}, "authors": [{"authorId": "1693437", "name": "J. B\u00e9ziau"}]}, - {"paperId": "d3250983c40f76f6defc784d734c53ea4dc34264", "externalIds": {"DBLP": - "conf/ihiet/SaariluomaS21", "MAG": "3152550765", "DOI": "10.1007/978-3-030-74009-2_72", - "CorpusId": 235084273}, "url": "https://www.semanticscholar.org/paper/d3250983c40f76f6defc784d734c53ea4dc34264", - "title": "Lost People: How National AI-Strategies Paying Attention to Users", - "abstract": null, "venue": "IHIET", "year": 2021, "referenceCount": 12, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"pages": "563-568"}, - "authors": [{"authorId": "2748954", "name": "P. Saariluoma"}, {"authorId": - "2102881731", "name": "Henrikki Salo-P\u00f6ntinen"}]}, {"paperId": "152a57c7abd70e9d87653208625cf963a7861fdf", - "externalIds": {"MAG": "3154765452", "DOI": "10.1007/978-3-030-67981-1_5", - "CorpusId": 234957076}, "url": "https://www.semanticscholar.org/paper/152a57c7abd70e9d87653208625cf963a7861fdf", - "title": "What Can I Know? Artificial Enjoyment", "abstract": null, "venue": - "", "year": 2021, "referenceCount": 11, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "125-146", - "name": ""}, "authors": [{"authorId": "2091113517", "name": "Isabel Millar"}]}, - {"paperId": "f950dba73660ffe1a4bbe877f0d80dc7454f3451", "externalIds": {"DBLP": - "conf/cmis/ChimirV21", "DOI": "10.32782/cmis/2864-16", "CorpusId": 234753385}, - "url": "https://www.semanticscholar.org/paper/f950dba73660ffe1a4bbe877f0d80dc7454f3451", - "title": "Formal Models of Question-Answering Machine", "abstract": "The article - describes two models of question-answering dialogue machine: (1) model based - on the idea of Mealy finite automata, and (2) model based on the idea of Petri - net. Both models are problem-independent and describe question-answering dialogue - process, which is independent of the subject area of the dialogue. The problem - independence of the models is a consequence of a unified cognitive cycle of - dialogue used in them. The unified cognitive cycle of dialogue is similar - to Neisser''s cyclical model of perception. Models are designed to specify - a \"dialogue machine\" that simulates a goal-oriented behavior of the active - dialogue agent when solving a problem by means of a question-answering dialogue. - Implementation of the models presupposes data-driven approach when main components - of the \"dialogue machine\" are not map in the program code but represented - by data stored in the database.", "venue": "CMIS", "year": 2021, "referenceCount": - 15, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "182-193"}, "authors": [{"authorId": "3022616", - "name": "I. Chimir"}, {"authorId": "69064290", "name": "A. Verlan"}]}, {"paperId": - "2727757771c3e5828a4dd94ad56f0c31931f39ef", "externalIds": {"MAG": "3139074194", - "DOI": "10.1007/978-3-658-32427-8_2", "CorpusId": 234133742}, "url": "https://www.semanticscholar.org/paper/2727757771c3e5828a4dd94ad56f0c31931f39ef", - "title": "K\u00fcnstliche Intelligenz im Bankwesen \u2013 Chancen und Herausforderungen - personalisierter Kundenangebote", "abstract": null, "venue": "", "year": 2021, - "referenceCount": 16, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "15-34", "name": ""}, "authors": [{"authorId": - "123432738", "name": "Bita Fesidis"}, {"authorId": "2118343721", "name": "Sophie - Gupta"}]}, {"paperId": "df60b291dc6b2a27fa609d7699a0656515dd4c01", "externalIds": - {"MAG": "3129798280", "DOI": "10.1016/B978-0-12-820273-9.00016-6", "CorpusId": - 234160342}, "url": "https://www.semanticscholar.org/paper/df60b291dc6b2a27fa609d7699a0656515dd4c01", - "title": "The future of artificial intelligence in healthcare", "abstract": - null, "venue": "", "year": 2021, "referenceCount": 111, "citationCount": 6, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "371-394", - "name": ""}, "authors": [{"authorId": "1492140883", "name": "N. Radakovich"}, - {"authorId": "5312253", "name": "A. Nazha"}]}, {"paperId": "8305459d10b3fa81da60bc87c8ae995c28e5c558", - "externalIds": {"MAG": "3133955974", "DOI": "10.1007/978-3-030-71374-4_7", - "CorpusId": 234136237}, "url": "https://www.semanticscholar.org/paper/8305459d10b3fa81da60bc87c8ae995c28e5c558", - "title": "Teaching Model Checking via Games and\u00a0Puzzles", "abstract": - null, "venue": "", "year": 2021, "referenceCount": 8, "citationCount": 3, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "143-158", - "name": ""}, "authors": [{"authorId": "71389094", "name": "Bernd-Holger Schlingloff"}]}], - "references": [{"paperId": "0a1ee16ba104a80ae8ee4a59cfd6bd68c02fca99", "externalIds": - {"MAG": "2004859951", "DOI": "10.1002/phbl.19510070409", "CorpusId": 120729071}, - "url": "https://www.semanticscholar.org/paper/0a1ee16ba104a80ae8ee4a59cfd6bd68c02fca99", + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "pages": "313-337", "name": ""}, "authors": [{"authorId": "145936404", "name": + "B. Vinod"}]}], "references": [{"paperId": "0a1ee16ba104a80ae8ee4a59cfd6bd68c02fca99", + "externalIds": {"MAG": "2004859951", "DOI": "10.1002/phbl.19510070409", "CorpusId": + 120729071}, "corpusId": 120729071, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0a1ee16ba104a80ae8ee4a59cfd6bd68c02fca99", "title": "Hartree: CALCULATING INSTRUMENTS AND MACHINES/Schaefer: MAXWELL''SCHE THEORIE/Teichmann: EINF\u00dcHRUNG IN DIE QUANTENPHYSIK/Bomke und Gefahrt: THEORIE DER AUSBREITUNG ELEKTROMAGNETISCHER WELLEN/Ramsauer: PHYSIK \u2010 TECHNIK \u2010 P\u00c4DAGOGIK", "abstract": null, "venue": "", "year": 1951, "referenceCount": 0, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}], "publicationTypes": null, "publicationDate": "1951-04-01", - "journal": {"volume": "7", "pages": "187-189", "name": "Physikalische Bl\u00e4tter"}, - "authors": [{"authorId": "46855367", "name": "H. Unger"}, {"authorId": "92758245", - "name": "G. Leibfried"}, {"authorId": "51361652", "name": "W. Braunbek"}, - {"authorId": "93484313", "name": "H. D\u00f6ring"}, {"authorId": "32381567", - "name": "H. Walch"}]}, {"paperId": "348f436fd9a3965f5ff17db031a9f43426f89b8e", - "externalIds": {"MAG": "2800648615", "DOI": "10.2307/3610576", "CorpusId": - 58879058}, "url": "https://www.semanticscholar.org/paper/348f436fd9a3965f5ff17db031a9f43426f89b8e", + true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/phbl.19510070409", + "status": null}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}], "publicationTypes": null, "publicationDate": + "1951-04-01", "journal": {"volume": "7", "pages": "187-189", "name": "Physikalische + Bl\u00e4tter"}, "citationStyles": {"bibtex": "@None{Unger1951Hartree:CI,\n + author = {H. Unger and G. Leibfried and W. Braunbek and H. D\u00f6ring and + H. Walch},\n journal = {Physikalische Bl\u00e4tter},\n pages = {187-189},\n + title = {Hartree: CALCULATING INSTRUMENTS AND MACHINES/Schaefer: MAXWELL''SCHE + THEORIE/Teichmann: EINF\u00dcHRUNG IN DIE QUANTENPHYSIK/Bomke und Gefahrt: + THEORIE DER AUSBREITUNG ELEKTROMAGNETISCHER WELLEN/Ramsauer: PHYSIK \u2010 + TECHNIK \u2010 P\u00c4DAGOGIK},\n volume = {7},\n year = {1951}\n}\n"}, "authors": + [{"authorId": "46855367", "name": "H. Unger"}, {"authorId": "92758245", "name": + "G. Leibfried"}, {"authorId": "51361652", "name": "W. Braunbek"}, {"authorId": + "93484313", "name": "H. D\u00f6ring"}, {"authorId": "32381567", "name": "H. + Walch"}]}, {"paperId": "348f436fd9a3965f5ff17db031a9f43426f89b8e", "externalIds": + {"MAG": "2800648615", "DOI": "10.2307/3610576", "CorpusId": 58879058}, "corpusId": + 58879058, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/348f436fd9a3965f5ff17db031a9f43426f89b8e", "title": "Calculating Instruments and Machines", "abstract": "1. Introduction 2. The differential analyser 3. The differential analyser and partial differential equations 4. Some other instruments 5. Introduction to large automatic digital @@ -23179,13 +25736,20 @@ interactions: development 8. Projects and prospects 9. High-speed automatic digital machines and numerical analysis References Names index Subject index.", "venue": "", "year": 1951, "referenceCount": 0, "citationCount": 103, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1951-02-01", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "16620717", - "name": "D. Hartree"}]}, {"paperId": "55ddf1b6cbe79b963a5a9d4da6e0a15e0d6761b5", - "externalIds": {"MAG": "1991116412", "DOI": "10.1136/bmj.1.4616.1105", "CorpusId": - 5252434, "PubMed": "18153422"}, "url": "https://www.semanticscholar.org/paper/55ddf1b6cbe79b963a5a9d4da6e0a15e0d6761b5", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1951-02-01", "journal": {"volume": "", "name": ""}, + "citationStyles": {"bibtex": "@None{Hartree1951CalculatingIA,\n author = {D. + Hartree},\n title = {Calculating Instruments and Machines},\n year = {1951}\n}\n"}, + "authors": [{"authorId": "16620717", "name": "D. Hartree"}]}, {"paperId": + "55ddf1b6cbe79b963a5a9d4da6e0a15e0d6761b5", "externalIds": {"MAG": "1991116412", + "DOI": "10.1136/bmj.1.4616.1105", "CorpusId": 5252434, "PubMed": "18153422"}, + "corpusId": 5252434, "publicationVenue": {"id": "3048b449-a773-4256-9bb5-5e61fbb61e52", + "name": "British medical journal", "alternate_names": ["British Medical Journal", + "Br med j", "Br Med J"], "issn": "1759-2151", "alternate_issns": ["1106-5028", + "1222-5835", "1790-5249", "1106-4226"], "url": "https://www.bmj.com/", "alternate_urls": + ["http://www.bmj.ro/"]}, "url": "https://www.semanticscholar.org/paper/55ddf1b6cbe79b963a5a9d4da6e0a15e0d6761b5", "title": "The Mind of Mechanical Man*", "abstract": "No better example could be found of man''s characteristic desire for knowledge beyond, and far beyond, the limits of the authentic scientific discoveries of his own day than his @@ -23212,14 +25776,20 @@ interactions: lapse on his part. I believe it myself to be both true and useful, and so I repeat it.", "venue": "British medical journal", "year": 1949, "referenceCount": 0, "citationCount": 86, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1949-06-25", "journal": {"volume": - "1", "pages": "1105 - 1110", "name": "British Medical Journal"}, "authors": - [{"authorId": "143693546", "name": "G. Jefferson"}]}, {"paperId": "ab7790485f26ce65f9d83dd700c43e49058bdd2b", + "openAccessPdf": {"url": "https://europepmc.org/articles/pmc2050428?pdf=render", + "status": null}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1949-06-25", "journal": + {"volume": "1", "pages": "1105 - 1110", "name": "British Medical Journal"}, + "citationStyles": {"bibtex": "@[''JournalArticle'']{Jefferson1949TheMO,\n + author = {G. Jefferson},\n booktitle = {British medical journal},\n journal + = {British Medical Journal},\n pages = {1105 - 1110},\n title = {The Mind + of Mechanical Man*},\n volume = {1},\n year = {1949}\n}\n"}, "authors": [{"authorId": + "143693546", "name": "G. Jefferson"}]}, {"paperId": "ab7790485f26ce65f9d83dd700c43e49058bdd2b", "externalIds": {"MAG": "2022731279", "DBLP": "journals/x/Turing37", "DOI": - "10.1112/PLMS/S2-42.1.230", "CorpusId": 73712}, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", + "10.1112/PLMS/S2-42.1.230", "CorpusId": 73712}, "corpusId": 73712, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", "title": "On computable numbers, with an application to the Entscheidungsproblem", "abstract": "1. Computing machines. 2. Definitions. Automatic machines. Computing machines. Circle and circle-free numbers. Computable sequences and numbers. @@ -23228,39 +25798,51 @@ interactions: 7. Detailed description of the universal machine. 8. Application of the diagonal process. Pagina 1 di 38 On computable numbers, with an application to the Entscheidungsproblem A. M. ...", "venue": "Proc. London Math. Soc.", "year": - 2021, "referenceCount": 81, "citationCount": 8327, "influentialCitationCount": - 535, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-02-02", "journal": {"volume": "s2-42", "pages": "230-265", - "name": "Proc. London Math. Soc."}, "authors": [{"authorId": "2079681794", - "name": "A. Turing"}]}, {"paperId": "91cdf5792afdcc31b4c6857f1757a6c154ebe109", + 2021, "referenceCount": 81, "citationCount": 8348, "influentialCitationCount": + 536, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": + "s2-42", "pages": "230-265", "name": "Proc. London Math. Soc."}, "citationStyles": + {"bibtex": "@[''JournalArticle'']{Turing2021OnCN,\n author = {A. Turing},\n + booktitle = {Proc. London Math. Soc.},\n journal = {Proc. London Math. Soc.},\n + pages = {230-265},\n title = {On computable numbers, with an application to + the Entscheidungsproblem},\n volume = {s2-42},\n year = {2021}\n}\n"}, "authors": + [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "91cdf5792afdcc31b4c6857f1757a6c154ebe109", "externalIds": {"MAG": "2327957545", "DOI": "10.2307/2268801", "CorpusId": - 124080558}, "url": "https://www.semanticscholar.org/paper/91cdf5792afdcc31b4c6857f1757a6c154ebe109", + 124080558}, "corpusId": 124080558, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/91cdf5792afdcc31b4c6857f1757a6c154ebe109", "title": "General Recursive Functions of Natural Numbers.", "abstract": null, "venue": "", "year": 1937, "referenceCount": 0, "citationCount": 39, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": "1937-03-01", "journal": {"volume": "2", "pages": "38", - "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "16803104", - "name": "R\u00f3zsa P\u00e9ter"}, {"authorId": "1723068", "name": "S. Kleene"}]}, - {"paperId": null, "externalIds": null, "url": null, "title": "London Math. - Soc", "abstract": null, "venue": "London Math. Soc", "year": 1937, "referenceCount": - null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": "1937-03-01", "journal": {"volume": "2", "pages": + "38", "name": "Journal of Symbolic Logic"}, "citationStyles": {"bibtex": "@None{P\u00e9ter1937GeneralRF,\n + author = {R\u00f3zsa P\u00e9ter and S. Kleene},\n journal = {Journal of Symbolic + Logic},\n pages = {38},\n title = {General Recursive Functions of Natural + Numbers.},\n volume = {2},\n year = {1937}\n}\n"}, "authors": [{"authorId": + "16803104", "name": "R\u00f3zsa P\u00e9ter"}, {"authorId": "1723068", "name": + "S. Kleene"}]}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": + null, "url": null, "title": "London Math. Soc", "abstract": null, "venue": + "London Math. Soc", "year": 1937, "referenceCount": null, "citationCount": + null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": - "c3483f7feb078b61d2ecd346d60dc78797e38869", "externalIds": {"MAG": "2023778211", - "DOI": "10.1007/BF01565439", "CorpusId": 120517999}, "url": "https://www.semanticscholar.org/paper/c3483f7feb078b61d2ecd346d60dc78797e38869", + null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": + []}, {"paperId": "c3483f7feb078b61d2ecd346d60dc78797e38869", "externalIds": + {"MAG": "2023778211", "DOI": "10.1007/BF01565439", "CorpusId": 120517999}, + "corpusId": 120517999, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c3483f7feb078b61d2ecd346d60dc78797e38869", "title": "General recursive functions of natural numbers", "abstract": null, "venue": "", "year": 1936, "referenceCount": 3, "citationCount": 499, "influentialCitationCount": - 26, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": "1936-12-01", "journal": {"volume": "112", "pages": "727-742", - "name": "Mathematische Annalen"}, "authors": [{"authorId": "1723068", "name": - "S. Kleene"}]}, {"paperId": "60400c043b2624f9cfc2d8daa0f45f3c1d524de3", "externalIds": - {"MAG": "2323777246", "DOI": "10.2307/2371045", "CorpusId": 14181275}, "url": - "https://www.semanticscholar.org/paper/60400c043b2624f9cfc2d8daa0f45f3c1d524de3", + 27, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": "1936-12-01", "journal": {"volume": "112", "pages": + "727-742", "name": "Mathematische Annalen"}, "citationStyles": {"bibtex": + "@None{Kleene1936GeneralRF,\n author = {S. Kleene},\n journal = {Mathematische + Annalen},\n pages = {727-742},\n title = {General recursive functions of natural + numbers},\n volume = {112},\n year = {1936}\n}\n"}, "authors": [{"authorId": + "1723068", "name": "S. Kleene"}]}, {"paperId": "60400c043b2624f9cfc2d8daa0f45f3c1d524de3", + "externalIds": {"MAG": "2323777246", "DOI": "10.2307/2371045", "CorpusId": + 14181275}, "corpusId": 14181275, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/60400c043b2624f9cfc2d8daa0f45f3c1d524de3", "title": "An Unsolvable Problem of Elementary Number Theory", "abstract": "Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple @@ -23274,69 +25856,87 @@ interactions: of JSTOR, a not-for-profit organization with a mission to help the scholarly community take advantage of advances in technology. For more information regarding JSTOR, please contact support@jstor.org.", "venue": "", "year": 1936, "referenceCount": - 0, "citationCount": 1639, "influentialCitationCount": 119, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1936-04-01", + 0, "citationCount": 1641, "influentialCitationCount": 118, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1936-04-01", "journal": {"volume": "58", "pages": "345", "name": "American Journal of Mathematics"}, - "authors": [{"authorId": "144144981", "name": "A. Church"}]}, {"paperId": - "f40d8a9ce6bd4f5e9dd3e3249022c13c8aa27084", "externalIds": {"MAG": "2325612495", - "DOI": "10.2307/2371199", "CorpusId": 125013320}, "url": "https://www.semanticscholar.org/paper/f40d8a9ce6bd4f5e9dd3e3249022c13c8aa27084", + "citationStyles": {"bibtex": "@None{Church1936AnUP,\n author = {A. Church},\n + journal = {American Journal of Mathematics},\n pages = {345},\n title = {An + Unsolvable Problem of Elementary Number Theory},\n volume = {58},\n year = + {1936}\n}\n"}, "authors": [{"authorId": "144144981", "name": "A. Church"}]}, + {"paperId": "f40d8a9ce6bd4f5e9dd3e3249022c13c8aa27084", "externalIds": {"MAG": + "2325612495", "DOI": "10.2307/2371199", "CorpusId": 125013320}, "corpusId": + 125013320, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f40d8a9ce6bd4f5e9dd3e3249022c13c8aa27084", "title": "A Theory of Positive Integers in Formal Logic. Part II", "abstract": null, "venue": "", "year": 1935, "referenceCount": 0, "citationCount": 103, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "57", "pages": "153", "name": "American Journal - of Mathematics"}, "authors": [{"authorId": "1723068", "name": "S. Kleene"}]}, - {"paperId": "c3f7ad4b2af9d9888be85a8a376c61e7a612acc2", "externalIds": {"MAG": - "2114804254", "DOI": "10.1007/S00605-006-0423-7", "CorpusId": 122418555}, - "url": "https://www.semanticscholar.org/paper/c3f7ad4b2af9d9888be85a8a376c61e7a612acc2", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "57", + "pages": "153", "name": "American Journal of Mathematics"}, "citationStyles": + {"bibtex": "@None{Kleene1935ATO,\n author = {S. Kleene},\n journal = {American + Journal of Mathematics},\n pages = {153},\n title = {A Theory of Positive + Integers in Formal Logic. Part II},\n volume = {57},\n year = {1935}\n}\n"}, + "authors": [{"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": "c3f7ad4b2af9d9888be85a8a376c61e7a612acc2", + "externalIds": {"MAG": "2114804254", "DOI": "10.1007/S00605-006-0423-7", "CorpusId": + 122418555}, "corpusId": 122418555, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c3f7ad4b2af9d9888be85a8a376c61e7a612acc2", "title": "\u00dcber formal unentscheidbare S\u00e4tze der Principia Mathematica und verwandter Systeme I", "abstract": null, "venue": "", "year": 1931, "referenceCount": - 2, "citationCount": 2148, "influentialCitationCount": 106, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": - "1931-12-01", "journal": {"volume": "149", "pages": "1-29", "name": "Monatshefte - f\u00fcr Mathematik"}, "authors": [{"authorId": "2071836187", "name": "K. - G\u00f6del"}]}, {"paperId": null, "externalIds": null, "url": null, "title": - "The Book of the ,IIachines", "abstract": null, "venue": "The Book of the - ,IIachines", "year": 1865, "referenceCount": null, "citationCount": null, - "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": null, - "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": []}, {"paperId": null, "externalIds": null, "url": - null, "title": "Translator''s notes t c an artlcle on Babbage''s Analytical - Engire", "abstract": null, "venue": "Translator''s notes t c an artlcle on - Babbage''s Analytical Engire", "year": 1842, "referenceCount": null, "citationCount": - null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": - null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": null, "externalIds": null, - "url": null, "title": "Victoria University of Manchester. return to index - FOOT NOTES", "abstract": null, "venue": "Victoria University of Manchester. - return to index FOOT NOTES", "year": null, "referenceCount": null, "citationCount": - null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": - null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": null, "externalIds": null, - "url": null, "title": "Author''s names in italics refer to the Bibliography", - "abstract": null, "venue": "Author''s names in italics refer to the Bibliography", - "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": - null, "isOpenAccess": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": null, "externalIds": null, "url": null, "title": "Compare - Lady Lovelace''s statement (p.450), which does not contain the word ''only", - "abstract": null, "venue": "Compare Lady Lovelace''s statement (p.450), which - does not contain the word ''only", "year": null, "referenceCount": null, "citationCount": - null, "influentialCitationCount": null, "isOpenAccess": null, "fieldsOfStudy": - null, "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": null, "externalIds": null, - "url": null, "title": "Or rather ''programmed in'' for our child-machine will - be programmed in a digital computer. But the logical system will not have - to be learnt", "abstract": null, "venue": "Or rather ''programmed in'' for - our child-machine will be programmed in a digital computer. But the logical - system will not have to be learnt", "year": null, "referenceCount": null, + 2, "citationCount": 2153, "influentialCitationCount": 107, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, + "publicationDate": "1931-12-01", "journal": {"volume": "149", "pages": "1-29", + "name": "Monatshefte f\u00fcr Mathematik"}, "citationStyles": {"bibtex": "@None{G\u00f6del1931\u00dcberFU,\n + author = {K. G\u00f6del},\n journal = {Monatshefte f\u00fcr Mathematik},\n + pages = {1-29},\n title = {\u00dcber formal unentscheidbare S\u00e4tze der + Principia Mathematica und verwandter Systeme I},\n volume = {149},\n year + = {1931}\n}\n"}, "authors": [{"authorId": "2071836187", "name": "K. G\u00f6del"}]}, + {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": + null, "url": null, "title": "The Book of the ,IIachines", "abstract": null, + "venue": "The Book of the ,IIachines", "year": 1865, "referenceCount": null, + "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": + null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": + []}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": + null, "url": null, "title": "Translator''s notes t c an artlcle on Babbage''s + Analytical Engire", "abstract": null, "venue": "Translator''s notes t c an + artlcle on Babbage''s Analytical Engire", "year": 1842, "referenceCount": + null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": + null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, + "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": + null, "authors": []}, {"paperId": null, "externalIds": null, "corpusId": null, + "publicationVenue": null, "url": null, "title": "Victoria University of Manchester. + return to index FOOT NOTES", "abstract": null, "venue": "Victoria University + of Manchester. return to index FOOT NOTES", "year": null, "referenceCount": + null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": + null, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, + "publicationTypes": null, "publicationDate": null, "journal": null, "citationStyles": + null, "authors": []}, {"paperId": null, "externalIds": null, "corpusId": null, + "publicationVenue": null, "url": null, "title": "Author''s names in italics + refer to the Bibliography", "abstract": null, "venue": "Author''s names in + italics refer to the Bibliography", "year": null, "referenceCount": null, "citationCount": null, "influentialCitationCount": null, "isOpenAccess": null, - "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}]} + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": + null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": + []}, {"paperId": null, "externalIds": null, "corpusId": null, "publicationVenue": + null, "url": null, "title": "Compare Lady Lovelace''s statement (p.450), which + does not contain the word ''only", "abstract": null, "venue": "Compare Lady + Lovelace''s statement (p.450), which does not contain the word ''only", "year": + null, "referenceCount": null, "citationCount": null, "influentialCitationCount": + null, "isOpenAccess": null, "openAccessPdf": null, "fieldsOfStudy": null, + "s2FieldsOfStudy": null, "publicationTypes": null, "publicationDate": null, + "journal": null, "citationStyles": null, "authors": []}, {"paperId": null, + "externalIds": null, "corpusId": null, "publicationVenue": null, "url": null, + "title": "Or rather ''programmed in'' for our child-machine will be programmed + in a digital computer. But the logical system will not have to be learnt", + "abstract": null, "venue": "Or rather ''programmed in'' for our child-machine + will be programmed in a digital computer. But the logical system will not + have to be learnt", "year": null, "referenceCount": null, "citationCount": + null, "influentialCitationCount": null, "isOpenAccess": null, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": null, "publicationTypes": + null, "publicationDate": null, "journal": null, "citationStyles": null, "authors": + []}]} ' headers: @@ -23345,31 +25945,31 @@ interactions: Connection: - keep-alive Content-Length: - - '1886111' + - '2114998' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 03:34:08 GMT + - Wed, 04 Jan 2023 04:34:45 GMT Via: - - 1.1 465d4b137abd7f1e2238d80bd5e6116a.cloudfront.net (CloudFront) + - 1.1 88c333921d5c405e037b84bb8c2dc33e.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - aCQ2KvWKjiQeHuVZYMQ83Sp-W6Bmx6YDvq20J18OX5zW1KewGh-AtA== + - STZNdupQYRnL7khPDhLNK_Ne1whV1UMNMVHA5zDhw3sQ8D48xMVBqw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - dei7fFXPPHcF92g= + - eM07uGUdvHcFqVQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '1886111' + - '2114998' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 03:34:08 GMT + - Wed, 04 Jan 2023 04:34:45 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - df77cd0e-25cd-4d93-837a-4cd7373d5492 + - 249658f8-c62e-4189-85ae-10da944e668f status: code: 200 message: OK diff --git a/tests/data/test_get_papers.yaml b/tests/data/test_get_papers.yaml index c6c99f5..67d9844 100644 --- a/tests/data/test_get_papers.yaml +++ b/tests/data/test_get_papers.yaml @@ -13,11 +13,12 @@ interactions: User-Agent: - python-requests/2.28.1 method: POST - uri: https://api.semanticscholar.org/graph/v1/paper/batch?&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year + uri: https://api.semanticscholar.org/graph/v1/paper/batch?&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year response: body: string: '[{"paperId": "0f40b1f08821e22e859c6050916cec3667778613", "externalIds": - {"DOI": "10.1257/rct.1355", "CorpusId": 255313304}, "url": "https://www.semanticscholar.org/paper/0f40b1f08821e22e859c6050916cec3667778613", + {"DOI": "10.1257/rct.1355", "CorpusId": 255313304}, "corpusId": 255313304, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f40b1f08821e22e859c6050916cec3667778613", "title": "Improving Third-Party Audits and Regulatory Compliance in India", "abstract": "Researchers: Esther Duflo Michael Greenstone Nick Ryan Rohini Pande Sector(s): Environment, Energy, and Climate Change, Political Economy @@ -31,14 +32,16 @@ interactions: International Growth Center (IGC), International Initiative for Impact Evaluation (3ie), MIT Center for Energy and Environmental Policy Research (CEEPR), National Science Foundation (NSF)", "venue": "", "year": 2023, "referenceCount": 2, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2259683", "name": "E. Duflo"}, {"authorId": "4711469", "name": - "M. Greenstone"}, {"authorId": "2071339188", "name": "Nick Ryan"}, {"authorId": - "2159313937", "name": "Rohini Pande"}]}, {"paperId": "c31c87c591a25c64fbaa82e8ac6a81831b6ac7ce", - "externalIds": {"MAG": "2951549429", "DOI": "10.2139/ssrn.288970", "CorpusId": - 470667}, "url": "https://www.semanticscholar.org/paper/c31c87c591a25c64fbaa82e8ac6a81831b6ac7ce", + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.povertyactionlab.org/sites/default/files/publications/156_321_QJE_2013_Truth_Telling_Third_Party_Audits.pdf", + "status": "BRONZE"}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2259683", "name": "E. Duflo"}, + {"authorId": "4711469", "name": "M. Greenstone"}, {"authorId": "2071339188", + "name": "Nick Ryan"}, {"authorId": "2159313937", "name": "Rohini Pande"}]}, + {"paperId": "c31c87c591a25c64fbaa82e8ac6a81831b6ac7ce", "externalIds": {"MAG": + "2951549429", "DOI": "10.2139/ssrn.288970", "CorpusId": 470667}, "corpusId": + 470667, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c31c87c591a25c64fbaa82e8ac6a81831b6ac7ce", "title": "How Much Should We Trust Differences-in-Differences Estimates?", "abstract": "Most Difference-in-Difference (DD) papers rely on many years of data and focus on serially correlated outcomes. Yet almost all these papers @@ -59,7 +62,8 @@ interactions: methods, which works well irrespective of sample size. This technique uses the empirical distribution of estimated effects for placebo laws to form the test distribution.", "venue": "", "year": 2001, "referenceCount": 30, "citationCount": - 9605, "influentialCitationCount": 567, "isOpenAccess": true, "fieldsOfStudy": + 9606, "influentialCitationCount": 567, "isOpenAccess": true, "openAccessPdf": + {"url": "http://papers.nber.org/papers/w8841.pdf", "status": "BRONZE"}, "fieldsOfStudy": ["Psychology", "Economics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": "Economics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", @@ -68,7 +72,8 @@ interactions: "authors": [{"authorId": "81141608", "name": "Marianne Bertrand"}, {"authorId": "2259683", "name": "E. Duflo"}, {"authorId": "2062143", "name": "S. Mullainathan"}]}, {"paperId": "cb1ebd913c3724c599f6b276b14b5c6253da68f3", "externalIds": {"MAG": - "157810103", "DOI": "10.2139/ssrn.2250500", "CorpusId": 3142471}, "url": "https://www.semanticscholar.org/paper/cb1ebd913c3724c599f6b276b14b5c6253da68f3", + "157810103", "DOI": "10.2139/ssrn.2250500", "CorpusId": 3142471}, "corpusId": + 3142471, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cb1ebd913c3724c599f6b276b14b5c6253da68f3", "title": "The Miracle of Microfinance? Evidence from a Randomized Evaluation", "abstract": "Microcredit has spread extremely rapidly since its beginnings in the late 1970s, but whether and how much is helps the poor is the subject @@ -77,14 +82,16 @@ interactions: in Hyderabad, India were randomly selected for opening of an MFI branch while the remainder were not. We show that the intervention increased total MFI borrow.", "venue": "", "year": 2013, "referenceCount": 66, "citationCount": - 1956, "influentialCitationCount": 237, "isOpenAccess": true, "fieldsOfStudy": - ["Business", "Economics", "Geography"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Economics", "source": "external"}, {"category": - "Geography", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-04-10", "journal": {"name": - "ERN: Credit Risk (Topic)"}, "authors": [{"authorId": "2259683", "name": "E. - Duflo"}, {"authorId": "2422370", "name": "A. Banerjee"}, {"authorId": "4249203", - "name": "R. Glennerster"}, {"authorId": "31549526", "name": "Cynthia Kinnan"}]}] + 1956, "influentialCitationCount": 237, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dspace.mit.edu/bitstream/1721.1/79070/1/BanerjeeDuflo13-09.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Business", "Economics", "Geography"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Economics", "source": "external"}, {"category": "Geography", "source": "external"}, + {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2013-04-10", "journal": {"name": "ERN: Credit Risk + (Topic)"}, "authors": [{"authorId": "2259683", "name": "E. Duflo"}, {"authorId": + "2422370", "name": "A. Banerjee"}, {"authorId": "4249203", "name": "R. Glennerster"}, + {"authorId": "31549526", "name": "Cynthia Kinnan"}]}] ' headers: @@ -93,31 +100,31 @@ interactions: Connection: - keep-alive Content-Length: - - '5608' + - '6128' Content-Type: - application/json Date: - - Mon, 02 Jan 2023 18:37:55 GMT + - Tue, 03 Jan 2023 20:52:36 GMT Via: - - 1.1 77f67fd09c19551a70ddc9b4f41371ac.cloudfront.net (CloudFront) + - 1.1 5798112148ae9e672af737182da15f62.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - jo2OTLhE0ax--PnhyCoM3Vi3CdQhu3X8SzJ9ynX4efJcKxUva6Jv1Q== + - WnUAq8ITJXxFY-jck8EdLcUF6cv0x81IuNKlGEtmrCbXN0U45AmGVA== X-Amz-Cf-Pop: - - GIG51-P4 + - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - eIKklFiKvHcFVRA= + - eLxPMG2PPHcF2ig= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '5608' + - '6128' x-amzn-Remapped-Date: - - Mon, 02 Jan 2023 18:37:55 GMT + - Tue, 03 Jan 2023 20:52:36 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - c963f632-d1ba-42f6-9c34-9349adb8577a + - 47394016-64e1-4d0d-a8f8-0972aff8c97e status: code: 200 message: OK diff --git a/tests/data/test_not_found.yaml b/tests/data/test_not_found.yaml index 673f2e6..45d0123 100644 --- a/tests/data/test_not_found.yaml +++ b/tests/data/test_not_found.yaml @@ -11,7 +11,7 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/0?&fields=abstract,authors,authors.affiliations,authors.aliases,authors.authorId,authors.citationCount,authors.externalIds,authors.hIndex,authors.homepage,authors.name,authors.paperCount,authors.url,citationCount,citations,citations.abstract,citations.authors,citations.citationCount,citations.externalIds,citations.fieldsOfStudy,citations.influentialCitationCount,citations.isOpenAccess,citations.journal,citations.paperId,citations.publicationDate,citations.publicationTypes,citations.referenceCount,citations.s2FieldsOfStudy,citations.title,citations.url,citations.venue,citations.year,embedding,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,references,references.abstract,references.authors,references.citationCount,references.externalIds,references.fieldsOfStudy,references.influentialCitationCount,references.isOpenAccess,references.journal,references.paperId,references.publicationDate,references.publicationTypes,references.referenceCount,references.s2FieldsOfStudy,references.title,references.url,references.venue,references.year,s2FieldsOfStudy,title,tldr,url,venue,year + uri: https://api.semanticscholar.org/graph/v1/paper/0?&fields=abstract,authors,authors.affiliations,authors.aliases,authors.authorId,authors.citationCount,authors.externalIds,authors.hIndex,authors.homepage,authors.name,authors.paperCount,authors.url,citationCount,citations,citations.abstract,citations.authors,citations.citationCount,citations.corpusId,citations.externalIds,citations.fieldsOfStudy,citations.influentialCitationCount,citations.isOpenAccess,citations.journal,citations.openAccessPdf,citations.paperId,citations.publicationDate,citations.publicationTypes,citations.publicationVenue,citations.referenceCount,citations.s2FieldsOfStudy,citations.title,citations.url,citations.venue,citations.year,corpusId,embedding,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,references,references.abstract,references.authors,references.citationCount,references.citationStyles,references.corpusId,references.externalIds,references.fieldsOfStudy,references.influentialCitationCount,references.isOpenAccess,references.journal,references.openAccessPdf,references.paperId,references.publicationDate,references.publicationTypes,references.publicationVenue,references.referenceCount,references.s2FieldsOfStudy,references.title,references.url,references.venue,references.year,s2FieldsOfStudy,title,tldr,url,venue,year response: body: string: '{"error":"Paper with id 0 not found"} @@ -27,27 +27,27 @@ interactions: Content-Type: - application/json Date: - - Tue, 03 Jan 2023 16:00:34 GMT + - Tue, 03 Jan 2023 20:52:36 GMT Via: - - 1.1 80e150c3cd619899dc38fb20936dc086.cloudfront.net (CloudFront) + - 1.1 1bcfe6258d4a13f2b6f9b5ee43e42254.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - nBcZYrmZQkUBPMYfdHk09L1Og8Au_OA5x879R6rCWc8Y1uz_RgeV4g== + - dxT1js4jcQdboD6YEWy89uOwG6jvs07E8XdM5lrL1KU4J5K9DQYWIQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Error from cloudfront x-amz-apigw-id: - - eLGdYGpIvHcFWPQ= + - eLxPSEA4vHcFocQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - '38' x-amzn-Remapped-Date: - - Tue, 03 Jan 2023 16:00:34 GMT + - Tue, 03 Jan 2023 20:52:36 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - e6531cc3-4df9-41c4-945c-4c33ecefffc4 + - 5abe65df-8c31-4f5b-bafb-5ec3a10f6fcd status: code: 404 message: Not Found @@ -63,7 +63,7 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/author/0?&fields=affiliations,aliases,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url + uri: https://api.semanticscholar.org/graph/v1/author/0?&fields=affiliations,aliases,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.corpusId,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.openAccessPdf,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.publicationVenue,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url response: body: string: '{"error":"Author with id 0 not found"} @@ -79,27 +79,27 @@ interactions: Content-Type: - application/json Date: - - Tue, 03 Jan 2023 16:00:35 GMT + - Tue, 03 Jan 2023 20:49:31 GMT Via: - - 1.1 556546966a883b579a433c9e90aa37f8.cloudfront.net (CloudFront) + - 1.1 fb6a4eca9caced7b791557c24b8c6606.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - _uDqxTap17JNGWPUyZ0AjbQG9rglrKI65fCfOgnl_9tqlHb3Ihfg_w== + - HcEHz6PSh2rjlSQDB1j_v9UVoTpwIoFV6-_60yMvBdJySYC-8CgeDQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Error from cloudfront x-amz-apigw-id: - - eLGdiE64vHcFRnQ= + - eLwyYHfvvHcFubQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - '39' x-amzn-Remapped-Date: - - Tue, 03 Jan 2023 16:00:35 GMT + - Tue, 03 Jan 2023 20:49:31 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - fe7744cf-fb2e-4e8f-9ac0-e5d094e2e410 + - 4e6cbe9d-1fba-4fcf-9237-dd9603b7c699 status: code: 404 message: Not Found diff --git a/tests/data/test_search_author.yaml b/tests/data/test_search_author.yaml index f62da58..8e79636 100644 --- a/tests/data/test_search_author.yaml +++ b/tests/data/test_search_author.yaml @@ -11,16 +11,17 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/author/search?query=turing&fields=affiliations,aliases,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url&offset=0&limit=1000 + uri: https://api.semanticscholar.org/graph/v1/author/search?query=turing&fields=affiliations,aliases,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.corpusId,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.openAccessPdf,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.publicationVenue,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url&offset=0&limit=1000 response: body: - string: '{"total": 45, "offset": 0, "data": [{"authorId": "2262347", "externalIds": + string: '{"total": 46, "offset": 0, "data": [{"authorId": "2262347", "externalIds": {"DBLP": ["Alan M. Turing"]}, "url": "https://www.semanticscholar.org/author/2262347", "name": "A. Turing", "aliases": ["A Turing", "A M Turing", "A. M. Turing", "Alan M. Turing", "Alan Turing", "Alan Mathison Turing"], "affiliations": - [], "homepage": null, "paperCount": 60, "citationCount": 12304, "hIndex": + [], "homepage": null, "paperCount": 60, "citationCount": 12397, "hIndex": 23, "papers": [{"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "externalIds": - {"CorpusId": 251848799}, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", + {"CorpusId": 251848799}, "corpusId": 251848799, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb", "title": "Dystopian or Utopian? Two Images of Alan Turing", "abstract": "Turing made intriguing statements about the future of arti\ufb01cial intelligence (AI) in society. He predicted that machines would eventually \u2018compete @@ -45,33 +46,36 @@ interactions: independent thinking to retain their power. These, he hoped, would be eventually rivaled and surpassed by intelligent machines.", "venue": "", "year": 2022, "referenceCount": 60, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": - "947efa54175145240c1a33f62321f23db43571e7", "externalIds": {"DBLP": "phd/Turing38", - "MAG": "1970654545", "DOI": "10.1016/b978-044450423-4/50007-3", "CorpusId": - 40363661}, "url": "https://www.semanticscholar.org/paper/947efa54175145240c1a33f62321f23db43571e7", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "947efa54175145240c1a33f62321f23db43571e7", "externalIds": {"DBLP": + "phd/Turing38", "MAG": "1970654545", "DOI": "10.1016/b978-044450423-4/50007-3", + "CorpusId": 40363661}, "corpusId": 40363661, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/947efa54175145240c1a33f62321f23db43571e7", "title": "Systems of Logic Based on Ordinals", "abstract": null, "venue": "Alan Turing''s Systems of Logic", "year": 2012, "referenceCount": 23, "citationCount": - 328, "influentialCitationCount": 30, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2012-12-31", "journal": {"name": "Alan Turing''s - Systems of Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "b7682dfbd4c03e287265d64e46388d21eedf3394", "externalIds": {"MAG": - "46849891", "DOI": "10.1093/oso/9780198250791.003.0017", "CorpusId": 172414532}, - "url": "https://www.semanticscholar.org/paper/b7682dfbd4c03e287265d64e46388d21eedf3394", + 328, "influentialCitationCount": 30, "isOpenAccess": true, "openAccessPdf": + {"url": "https://pure.mpg.de/pubman/item/item_2403325_2/component/file_2403324/Turing_1939_Sysyems.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-12-31", "journal": {"name": + "Alan Turing''s Systems of Logic"}, "authors": [{"authorId": "2262347", "name": + "A. Turing"}]}, {"paperId": "b7682dfbd4c03e287265d64e46388d21eedf3394", "externalIds": + {"MAG": "46849891", "DOI": "10.1093/oso/9780198250791.003.0017", "CorpusId": + 172414532}, "corpusId": 172414532, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b7682dfbd4c03e287265d64e46388d21eedf3394", "title": "Computing Machinery and Intelligence (1950)", "abstract": null, "venue": "Ideas That Created the Future", "year": 1989, "referenceCount": 0, "citationCount": 47, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-06-01", - "journal": {"name": "Ideas That Created the Future"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "6b7b392d5f3284a78fd559439bc735f3f0b08bae", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1989-06-01", "journal": {"name": "Ideas That Created the Future"}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6b7b392d5f3284a78fd559439bc735f3f0b08bae", "externalIds": {"DBLP": "journals/cryptologia/X20", "DOI": "10.1080/01611194.2019.1650846", - "CorpusId": 212727442}, "url": "https://www.semanticscholar.org/paper/6b7b392d5f3284a78fd559439bc735f3f0b08bae", + "CorpusId": 212727442}, "corpusId": 212727442, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6b7b392d5f3284a78fd559439bc735f3f0b08bae", "title": "Review of two collections of essays about Alan Turing", "abstract": "2012 was the Alan Turing Year \u2014 the celebration of the 100th anniversary of Alan Turing\u2019s birth. Turing\u2019s biographer Andrew Hodges in the @@ -100,39 +104,41 @@ interactions: chapter is a compilation of extracts from [Hilton\u2019s] papers and notes left in New Zealand, together with extracts from [Hilton\u2019s]", "venue": "Cryptologia", "year": 2020, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "2020-01-02", "journal": {"volume": "44", "pages": "82 - - 86", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": - "A. Turing"}, {"authorId": "1772040", "name": "Jonathan P. Bowen"}, {"authorId": - "3075367", "name": "Mark D. Sprevak"}, {"authorId": "2109033245", "name": - "Robin J. Wilson"}, {"authorId": "2085428", "name": "A. Bokulich"}]}, {"paperId": - "87aebbd963f929cfb5ac46b0facb5128148758ad", "externalIds": {"CorpusId": 202754269}, - "url": "https://www.semanticscholar.org/paper/87aebbd963f929cfb5ac46b0facb5128148758ad", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2020-01-02", "journal": + {"volume": "44", "pages": "82 - 86", "name": "Cryptologia"}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "1772040", "name": "Jonathan + P. Bowen"}, {"authorId": "3075367", "name": "Mark D. Sprevak"}, {"authorId": + "2109033245", "name": "Robin J. Wilson"}, {"authorId": "2085428", "name": + "A. Bokulich"}]}, {"paperId": "87aebbd963f929cfb5ac46b0facb5128148758ad", + "externalIds": {"CorpusId": 202754269}, "corpusId": 202754269, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/87aebbd963f929cfb5ac46b0facb5128148758ad", "title": "Development of Moore \u2019 s Law", "abstract": "Many theorists would agree that, had it not been for courseware, the construction of online algorithms might never have occurred. In this paper, we confirm the visualization of superblocks. In this paper we argue that the Turing machine can be made pseudorandom, metamorphic, and low-energy.", "venue": "", "year": 2019, "referenceCount": 27, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "117077595", "name": "Olivier Pirson"}, - {"authorId": "2153307", "name": "R. Stallman"}, {"authorId": "2262347", "name": - "A. Turing"}, {"authorId": "1717349", "name": "D. Knuth"}]}, {"paperId": "d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", - "externalIds": {"DOI": "10.1049/pbpc026e_ch8", "CorpusId": 242953753}, "url": - "https://www.semanticscholar.org/paper/d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "117077595", + "name": "Olivier Pirson"}, {"authorId": "2153307", "name": "R. Stallman"}, + {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "1717349", "name": + "D. Knuth"}]}, {"paperId": "d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", "externalIds": + {"DOI": "10.1049/pbpc026e_ch8", "CorpusId": 242953753}, "corpusId": 242953753, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0a3f97bba5c179bde46fa7db6ee0b5e1899db94", "title": "Turing machines", "abstract": null, "venue": "Handbook of Mathematical Models for Languages and Computation", "year": 2019, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2019-11-12", "journal": {"name": "Handbook of Mathematical Models for Languages - and Computation"}, "authors": [{"authorId": "6234493", "name": "D. Hilbert"}, - {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "2157103111", "name": - "M. \u201ccrashes"}]}, {"paperId": "eb320a6d4e58d91c72ba0dc663da10579dd5957d", - "externalIds": {"DOI": "10.1090/mbk/121/24", "CorpusId": 241773225}, "url": - "https://www.semanticscholar.org/paper/eb320a6d4e58d91c72ba0dc663da10579dd5957d", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": "2019-11-12", "journal": {"name": "Handbook of Mathematical + Models for Languages and Computation"}, "authors": [{"authorId": "6234493", + "name": "D. Hilbert"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": + "2157103111", "name": "M. \u201ccrashes"}]}, {"paperId": "eb320a6d4e58d91c72ba0dc663da10579dd5957d", + "externalIds": {"DOI": "10.1090/mbk/121/24", "CorpusId": 241773225}, "corpusId": + 241773225, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb320a6d4e58d91c72ba0dc663da10579dd5957d", "title": "Alan Turing", "abstract": "When the name \u201dAlan Turing\u201d is mentioned most people think of one or more of the following words: \u201dTuring Machine\u201d, \u201dTuring Test\u201d, \u201dEnigma\u201d and \u201dArtificial @@ -161,31 +167,34 @@ interactions: Every Child Should Know\u201d \u2217e-mail: e0425826@student.tuwien.ac.at", "venue": "100 Years of Math Milestones", "year": 2019, "referenceCount": 125, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2019-06-12", "journal": {"name": - "100 Years of Math Milestones"}, "authors": [{"authorId": "2262347", "name": - "A. Turing"}, {"authorId": "98630872", "name": "S. Cooper"}, {"authorId": - "2138333896", "name": "Trenz Pruca"}, {"authorId": "2138325070", "name": "Malesuada - quis"}, {"authorId": "2138324300", "name": "egestas quis"}, {"authorId": "2138382523", - "name": "Alan Turingyear"}, {"authorId": "2136546073", "name": "See A. Hodges"}]}, - {"paperId": "ecb77b338846ac6dbaecf953984f8d44e76a8def", "externalIds": {"CorpusId": - 231691745}, "url": "https://www.semanticscholar.org/paper/ecb77b338846ac6dbaecf953984f8d44e76a8def", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2019-06-12", "journal": {"name": "100 Years of Math Milestones"}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "98630872", "name": + "S. Cooper"}, {"authorId": "2138333896", "name": "Trenz Pruca"}, {"authorId": + "2138325070", "name": "Malesuada quis"}, {"authorId": "2138324300", "name": + "egestas quis"}, {"authorId": "2138382523", "name": "Alan Turingyear"}, {"authorId": + "2136546073", "name": "See A. Hodges"}]}, {"paperId": "ecb77b338846ac6dbaecf953984f8d44e76a8def", + "externalIds": {"CorpusId": 231691745}, "corpusId": 231691745, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ecb77b338846ac6dbaecf953984f8d44e76a8def", "title": "Machine Learning, a key component in business model transformation", "abstract": null, "venue": "", "year": 2018, "referenceCount": 42, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "fd77c9ac5ead99b216633aa16d9b664516e6d24a", - "externalIds": {"DOI": "10.1201/9781315273587-12", "CorpusId": 240057602}, - "url": "https://www.semanticscholar.org/paper/fd77c9ac5ead99b216633aa16d9b664516e6d24a", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "fd77c9ac5ead99b216633aa16d9b664516e6d24a", "externalIds": {"DOI": + "10.1201/9781315273587-12", "CorpusId": 240057602}, "corpusId": 240057602, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd77c9ac5ead99b216633aa16d9b664516e6d24a", "title": "Text processing", "abstract": null, "venue": "Elementary Standard ML", "year": 2018, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2018-10-08", "journal": {"name": "Elementary Standard - ML"}, "authors": [{"authorId": "72482255", "name": "C. Gregg"}, {"authorId": - "1764547", "name": "M. Sahami"}, {"authorId": "144124712", "name": "J. Clarke"}, - {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "aa2c899534681104e64f0971d7cb1a003dd6efd2", - "externalIds": {"CorpusId": 51883623}, "url": "https://www.semanticscholar.org/paper/aa2c899534681104e64f0971d7cb1a003dd6efd2", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2018-10-08", "journal": + {"name": "Elementary Standard ML"}, "authors": [{"authorId": "72482255", "name": + "C. Gregg"}, {"authorId": "1764547", "name": "M. Sahami"}, {"authorId": "144124712", + "name": "J. Clarke"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": + "aa2c899534681104e64f0971d7cb1a003dd6efd2", "externalIds": {"CorpusId": 51883623}, + "corpusId": 51883623, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aa2c899534681104e64f0971d7cb1a003dd6efd2", "title": "What \u2019 s Missing from Deep Learning ?", "abstract": "A neural network model for a mechanism of visual pattern recognition is proposed in this paper. The network is self-organized by \"learning without a teacher\", @@ -212,24 +221,25 @@ interactions: the last layer is not affected by the pattern''s position at all. Neither is it affected by a small change in shape nor in size of the stimulus pattern.", "venue": "", "year": 2017, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "1708655", "name": "B. Olshausen"}, {"authorId": - "145260300", "name": "H. Wills"}, {"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "1847175", "name": - "M. Minsky"}, {"authorId": "143805238", "name": "J. McCarthy"}, {"authorId": - "51083130", "name": "F. Rosenblatt"}, {"authorId": "145707626", "name": "N. - Wiener"}, {"authorId": "2067567609", "name": "Warren McCulloch"}, {"authorId": - "50314979", "name": "W. Pitts"}, {"authorId": "3160228", "name": "K. Fukushima"}]}, - {"paperId": "b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "externalIds": {"MAG": - "2467689444", "CorpusId": 159733415}, "url": "https://www.semanticscholar.org/paper/b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "1708655", "name": "B. Olshausen"}, + {"authorId": "145260300", "name": "H. Wills"}, {"authorId": "2262347", "name": + "A. Turing"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": + "1847175", "name": "M. Minsky"}, {"authorId": "143805238", "name": "J. McCarthy"}, + {"authorId": "51083130", "name": "F. Rosenblatt"}, {"authorId": "145707626", + "name": "N. Wiener"}, {"authorId": "2067567609", "name": "Warren McCulloch"}, + {"authorId": "50314979", "name": "W. Pitts"}, {"authorId": "3160228", "name": + "K. Fukushima"}]}, {"paperId": "b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", + "externalIds": {"MAG": "2467689444", "CorpusId": 159733415}, "corpusId": 159733415, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "title": "The President, the Vice President, the Secretary-Treasurer, and ARNOLD DRESDEN,2", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3154491", + "openAccessPdf": null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": + "History", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "3154491", "name": "A. Tarski"}, {"authorId": "50455788", "name": "S. Maclane"}, {"authorId": "40384728", "name": "H. B. Curry"}, {"authorId": "122394125", "name": "Paul Marhenkei"}, {"authorId": "101931347", "name": "A. Dresden"}, {"authorId": @@ -240,7 +250,8 @@ interactions: "A. Turing"}, {"authorId": "40245151", "name": "F. B. Fitch"}, {"authorId": "104540019", "name": "P. Marhenke"}, {"authorId": "2072295124", "name": "C. Duca"}]}, {"paperId": "3180b4f827030c4b3a0ff048d1fee462575ca71f", "externalIds": - {"MAG": "2400968335", "CorpusId": 124065102}, "url": "https://www.semanticscholar.org/paper/3180b4f827030c4b3a0ff048d1fee462575ca71f", + {"MAG": "2400968335", "CorpusId": 124065102}, "corpusId": 124065102, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3180b4f827030c4b3a0ff048d1fee462575ca71f", "title": "Convergence Rates for Persistence Diagram Estimation in", "abstract": "Computational topology has recently seen an important development toward data analysis, giving birth to the eld of topological data analysis. Topological @@ -251,36 +262,40 @@ interactions: diagrams can be used as statistics with interesting convergence properties. Some numerical experiments are performed in various contexts to illustrate our results.", "venue": "", "year": 2015, "referenceCount": 34, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "1760330", "name": "M. Glisse"}, {"authorId": "66876582", "name": - "Inria Saclay"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": - "102582041", "name": "Catherine Labru"}, {"authorId": "38291080", "name": - "B. Michel"}]}, {"paperId": "293a50e86c2a2f4a2e213a42e057910aeda09d82", "externalIds": - {"MAG": "2185394266", "CorpusId": 125067106}, "url": "https://www.semanticscholar.org/paper/293a50e86c2a2f4a2e213a42e057910aeda09d82", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "1760330", "name": "M. Glisse"}, {"authorId": + "66876582", "name": "Inria Saclay"}, {"authorId": "2262347", "name": "A. Turing"}, + {"authorId": "102582041", "name": "Catherine Labru"}, {"authorId": "38291080", + "name": "B. Michel"}]}, {"paperId": "293a50e86c2a2f4a2e213a42e057910aeda09d82", + "externalIds": {"MAG": "2185394266", "CorpusId": 125067106}, "corpusId": 125067106, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/293a50e86c2a2f4a2e213a42e057910aeda09d82", "title": "\u2022 Hilbert spaces. Weak derivatives. Classical and weak solutions. \u2022 Galerkin approximation of elliptic equations. Spectral approximation. Finite element approximation in one dimension. Energy estimates. \u2022 Parabolic PDEs. Semigroups of operators. Method of lines. Stability of numerical", "abstract": null, "venue": "", "year": 2014, "referenceCount": 2, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "104483519", - "name": "Lecturer Sean Holman"}, {"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "103905785", "name": "January Exam"}]}, {"paperId": "9f07386256530a0060d99a1ba483a8f5c1f4194b", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "104483519", "name": "Lecturer Sean + Holman"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "103905785", + "name": "January Exam"}]}, {"paperId": "9f07386256530a0060d99a1ba483a8f5c1f4194b", "externalIds": {"MAG": "2029222787", "DOI": "10.1093/ITNOW/BWU030", "CorpusId": - 109153053}, "url": "https://www.semanticscholar.org/paper/9f07386256530a0060d99a1ba483a8f5c1f4194b", + 109153053}, "corpusId": 109153053, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9f07386256530a0060d99a1ba483a8f5c1f4194b", "title": "Turing: Oracles and Computation", "abstract": null, "venue": "", "year": 2014, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2014-03-01", "journal": {"volume": "56", "pages": "64-65", "name": "Itnow"}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "0875d9bdd710fe886d7f4543e17dfd581893f538", - "externalIds": {"CorpusId": 18099107}, "url": "https://www.semanticscholar.org/paper/0875d9bdd710fe886d7f4543e17dfd581893f538", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2014-03-01", "journal": {"volume": + "56", "pages": "64-65", "name": "Itnow"}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "0875d9bdd710fe886d7f4543e17dfd581893f538", + "externalIds": {"CorpusId": 18099107}, "corpusId": 18099107, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0875d9bdd710fe886d7f4543e17dfd581893f538", "title": "Watching the Daisies Grow: from Biology to Biomathematics and Bioinformatics \u2014 Alan Turing Centenary Special Issue", "abstract": "Preface We can only see a short distance ahead, but we can see plenty there that needs to be done. @@ -313,11 +328,13 @@ interactions: issue, we present a selection of papers commemorating Alan Turing and arguing that he should be also considered the co-founder of biomathematics and bioinformatics. His late works were", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", - "externalIds": {"MAG": "2741266234", "CorpusId": 125093480}, "url": "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "externalIds": {"MAG": + "2741266234", "CorpusId": 125093480}, "corpusId": 125093480, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "title": "Dusting Off the Turing Test", "abstract": "then inter- est theory and a problem about the observation of quantum systems (now as the quantum Zeno effect). With his death, train was lost, but the question computa- tion @@ -333,13 +350,14 @@ interactions: discrete symbols a complete the world? If it does, how can make this connection manifest? If it does not, where does fail, and what would this tell us about fundamental science?", "venue": "", "year": 2012, "referenceCount": 1, "citationCount": - 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}, {"authorId": "2262347", "name": - "A. Turing"}]}, {"paperId": "422ec845a15242fdfc904e1c7d2bfe132c7ec248", "externalIds": - {"CorpusId": 18051598}, "url": "https://www.semanticscholar.org/paper/422ec845a15242fdfc904e1c7d2bfe132c7ec248", + 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}, {"authorId": + "2262347", "name": "A. Turing"}]}, {"paperId": "422ec845a15242fdfc904e1c7d2bfe132c7ec248", + "externalIds": {"CorpusId": 18051598}, "corpusId": 18051598, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/422ec845a15242fdfc904e1c7d2bfe132c7ec248", "title": "PLANES OF MORPHISMS AND THE CHARACTERIZATION OF CONTINUOUSLY INTEGRAL, COMPLETE RANDOM VARIABLES", "abstract": "Let \u03b8m,\u03bc be an independent, right-composite, anti-naturally continuous polytope. Recent interest in smooth @@ -349,22 +367,24 @@ interactions: recent developments in modern integral PDE [25] have raised the question of whether e ( 0 ) 6= log ( 1 \u2016\u03c7\u2016 ) \u222a c ( 1 \u2229 i, \u03c0 )", "venue": "", "year": 2012, "referenceCount": 32, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "12989190", "name": "M. Lafourcade"}, - {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "50294906", "name": - "M. Abel"}]}, {"paperId": "4f4b42aa137d5b6df85889cf53901f44cbee643b", "externalIds": - {"MAG": "2187383749", "DOI": "10.7551/mitpress/5123.003.0007", "CorpusId": - 62254832}, "url": "https://www.semanticscholar.org/paper/4f4b42aa137d5b6df85889cf53901f44cbee643b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "12989190", + "name": "M. Lafourcade"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": + "50294906", "name": "M. Abel"}]}, {"paperId": "4f4b42aa137d5b6df85889cf53901f44cbee643b", + "externalIds": {"MAG": "2187383749", "DOI": "10.7551/mitpress/5123.003.0007", + "CorpusId": 62254832}, "corpusId": 62254832, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4f4b42aa137d5b6df85889cf53901f44cbee643b", "title": "Could a machine think", "abstract": null, "venue": "", "year": 2012, "referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2055661501", - "name": "Pascal Ludwig"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": - "34493294", "name": "J. Searle"}]}, {"paperId": "5cfe755938d14edd5422d72215cf8b733f0284fc", - "externalIds": {"DBLP": "journals/cryptologia/TuringB12", "MAG": "2054264625", - "DOI": "10.1080/01611194.2012.713803", "CorpusId": 205488183}, "url": "https://www.semanticscholar.org/paper/5cfe755938d14edd5422d72215cf8b733f0284fc", + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}], "publicationTypes": null, + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "2055661501", "name": "Pascal Ludwig"}, {"authorId": "2262347", + "name": "A. Turing"}, {"authorId": "34493294", "name": "J. Searle"}]}, {"paperId": + "5cfe755938d14edd5422d72215cf8b733f0284fc", "externalIds": {"DBLP": "journals/cryptologia/TuringB12", + "MAG": "2054264625", "DOI": "10.1080/01611194.2012.713803", "CorpusId": 205488183}, + "corpusId": 205488183, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5cfe755938d14edd5422d72215cf8b733f0284fc", "title": "Report on Speech Secrecy System DELILAH, a Technical Description Compiled by A. M. Turing and Lieutenant D. Bayley REME, 1945\u20131946", "abstract": "The book groups themselves might be used as a form of cipher, but this is @@ -375,21 +395,24 @@ interactions: but that is all. Let us run the groups together and call the result \u2018\u2018P=L figures\u2019\u2019:", "venue": "Cryptologia", "year": 2012, "referenceCount": 0, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-10-01", "journal": {"volume": "36", "pages": "295 - 340", "name": "Cryptologia"}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "84292446", - "name": "D. Bayley"}]}, {"paperId": "300d41307bb946510bdc111463f5fb71b2a21796", - "externalIds": {"MAG": "2274591444", "CorpusId": 124844782}, "url": "https://www.semanticscholar.org/paper/300d41307bb946510bdc111463f5fb71b2a21796", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-10-01", "journal": {"volume": "36", "pages": "295 + - 340", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": + "A. Turing"}, {"authorId": "84292446", "name": "D. Bayley"}]}, {"paperId": + "300d41307bb946510bdc111463f5fb71b2a21796", "externalIds": {"MAG": "2274591444", + "CorpusId": 124844782}, "corpusId": 124844782, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/300d41307bb946510bdc111463f5fb71b2a21796", "title": "Correspondence with [A.M. Turing]", "abstract": null, "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": "2011-11-21", "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "51326515", "name": "R. Fisher"}, {"authorId": "2262347", "name": - "A. Turing"}]}, {"paperId": "50a1357c04bde76f752aac1dbd2ba2601622ccd4", "externalIds": - {"CorpusId": 8641258}, "url": "https://www.semanticscholar.org/paper/50a1357c04bde76f752aac1dbd2ba2601622ccd4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": "2011-11-21", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "51326515", "name": "R. Fisher"}, {"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "50a1357c04bde76f752aac1dbd2ba2601622ccd4", + "externalIds": {"CorpusId": 8641258}, "corpusId": 8641258, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/50a1357c04bde76f752aac1dbd2ba2601622ccd4", "title": "Alan Mathison Turing Universal Turing Machine", "abstract": "Scatter/gather I/O must work [54], [59], [62], [68], [68], [70], [70], [70], [95], [95], [114], [114], [114], [152], [168], [179], [179], [179], [188], [191]. After @@ -398,11 +421,12 @@ interactions: In order to solve this riddle, we inve stigate how digital-to-analog converters can be applied to t he", "venue": "", "year": 2011, "referenceCount": 248, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "6da083c8833b4000b088ea366f16f1ea8d9b6dad", "externalIds": {"CorpusId": - 17718604}, "url": "https://www.semanticscholar.org/paper/6da083c8833b4000b088ea366f16f1ea8d9b6dad", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "6da083c8833b4000b088ea366f16f1ea8d9b6dad", + "externalIds": {"CorpusId": 17718604}, "corpusId": 17718604, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6da083c8833b4000b088ea366f16f1ea8d9b6dad", "title": "The legacy of Alan Turing Universal Turing Machine", "abstract": "The investigation of 802.11b has evaluated IPv6, and current trends suggest that the analysis of local-area networks will soon emerge. Given the current @@ -411,11 +435,12 @@ interactions: often incompatible, but rather on introducing a novel algorithm for the improvement of multi-processors (Esparcet).", "venue": "", "year": 2011, "referenceCount": 243, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "externalIds": {"CorpusId": - 17215741}, "url": "https://www.semanticscholar.org/paper/de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", + "externalIds": {"CorpusId": 17215741}, "corpusId": 17215741, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "title": "Alan Turing Universal Turing Machine", "abstract": "In recent years, much research has been devoted to the synthesis of gigabit switches; on the other hand, few have explored the refinement of hash tables. In fact, few @@ -423,11 +448,12 @@ interactions: In this work, we use signed technology to show that architecture and superblocks are usually incompatible.", "venue": "", "year": 2011, "referenceCount": 153, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "externalIds": {"CorpusId": - 115526721}, "url": "https://www.semanticscholar.org/paper/2c17cdc749e8a639ed78761b23e8e1d8805ae29c", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "2c17cdc749e8a639ed78761b23e8e1d8805ae29c", + "externalIds": {"CorpusId": 115526721}, "corpusId": 115526721, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "title": "Turing 1950 1 The Imitation Game", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink.\u201d The @@ -448,19 +474,20 @@ interactions: is A and Y is B\u201d or \u201cX is B and Y is A.\u201d The interrogator is allowed to put questions to A and B thus:", "venue": "", "year": 2010, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6c9520d25a2f93f1fb4f08bab66d90a1519faaac", "externalIds": {"MAG": "2479903735", "DOI": "10.14361/9783839403396-004", "CorpusId": 184361851}, - "url": "https://www.semanticscholar.org/paper/6c9520d25a2f93f1fb4f08bab66d90a1519faaac", + "corpusId": 184361851, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6c9520d25a2f93f1fb4f08bab66d90a1519faaac", "title": "Computermaschinerie und Intelligenz (1950)", "abstract": null, "venue": "Reader Neue Medien", "year": 2007, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - "2007-12-31", "journal": {"name": "Reader Neue Medien"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f", - "externalIds": {"MAG": "2967838196", "CorpusId": 17359642}, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": "2007-12-31", "journal": {"name": "Reader Neue Medien"}, + "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f", + "externalIds": {"MAG": "2967838196", "CorpusId": 17359642}, "corpusId": 17359642, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f", "title": "Computing Machinery and Intelligence A.M. Turing", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The @@ -473,65 +500,73 @@ interactions: a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 129, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5", "externalIds": {"MAG": "2499467011", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0023", - "CorpusId": 62965306}, "url": "https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5", + "CorpusId": 62965306}, "corpusId": 62965306, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5", "title": "The Turing\u2013Wilkinson lecture series (1946\u20137)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 6, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": - null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": - "459-528", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "2056940608", "name": "J. H. Wilkinson"}]}, {"paperId": "2190254a337fd601af32260dc4133d009933ee65", - "externalIds": {"MAG": "2483371858", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0021", - "CorpusId": 64463006}, "url": "https://www.semanticscholar.org/paper/2190254a337fd601af32260dc4133d009933ee65", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "external"}], "publicationTypes": null, "publicationDate": "2005-04-14", + "journal": {"volume": "", "pages": "459-528", "name": ""}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "2056940608", "name": "J. H. + Wilkinson"}]}, {"paperId": "2190254a337fd601af32260dc4133d009933ee65", "externalIds": + {"MAG": "2483371858", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0021", + "CorpusId": 64463006}, "corpusId": 64463006, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2190254a337fd601af32260dc4133d009933ee65", "title": "Proposed electronic calculator (1945)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 49, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-04-14", - "journal": {"volume": "", "pages": "369-454", "name": ""}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "f8465fea1230ba0f7ca3dea3c4c71278ac576e91", - "externalIds": {"MAG": "2490852693", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0022", - "CorpusId": 64507632}, "url": "https://www.semanticscholar.org/paper/f8465fea1230ba0f7ca3dea3c4c71278ac576e91", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": + "369-454", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "externalIds": {"MAG": + "2490852693", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0022", "CorpusId": + 64507632}, "corpusId": 64507632, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "title": "Notes on memory (1945)", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, - "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "455-458", - "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": - "05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "externalIds": {"MAG": "3101684541", - "DOI": "10.1093/oso/9780198250791.003.0016", "CorpusId": 232473093}, "url": - "https://www.semanticscholar.org/paper/05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": + null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": + "455-458", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "externalIds": {"MAG": + "3101684541", "DOI": "10.1093/oso/9780198250791.003.0016", "CorpusId": 232473093}, + "corpusId": 232473093, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05b0cd062fa41d0ca2c7608dc59ac93e898a35aa", "title": "Intelligent Machinery (1948)", "abstract": null, "venue": "", "year": - 2004, "referenceCount": 0, "citationCount": 31, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "13103014e997dd6273e2bc3661353d09165cf90c", - "externalIds": {"MAG": "3103227490", "DOI": "10.1093/oso/9780198250791.003.0015", - "CorpusId": 229803945}, "url": "https://www.semanticscholar.org/paper/13103014e997dd6273e2bc3661353d09165cf90c", + 2004, "referenceCount": 0, "citationCount": 32, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "2004-09-09", "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. + Turing"}]}, {"paperId": "13103014e997dd6273e2bc3661353d09165cf90c", "externalIds": + {"MAG": "3103227490", "DOI": "10.1093/oso/9780198250791.003.0015", "CorpusId": + 229803945}, "corpusId": 229803945, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13103014e997dd6273e2bc3661353d09165cf90c", "title": "Lecture on the Automatic Computing Engine (1947)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "15b2a8b748d8063348071beb106b4921c0ef8ba6", - "externalIds": {"MAG": "3101010549", "DOI": "10.1093/oso/9780198250791.003.0007", - "CorpusId": 232670029}, "url": "https://www.semanticscholar.org/paper/15b2a8b748d8063348071beb106b4921c0ef8ba6", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "15b2a8b748d8063348071beb106b4921c0ef8ba6", "externalIds": {"MAG": + "3101010549", "DOI": "10.1093/oso/9780198250791.003.0007", "CorpusId": 232670029}, + "corpusId": 232670029, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15b2a8b748d8063348071beb106b4921c0ef8ba6", "title": "Systems of Logic Based on Ordinals (1938)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "1bb2114c24263b0489f24f787fef86f33487f802", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://pure.mpg.de/pubman/item/item_2403325_2/component/file_2403324/Turing_1939_Sysyems.pdf", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "1bb2114c24263b0489f24f787fef86f33487f802", "externalIds": {"MAG": "169424043", "DOI": "10.7551/mitpress/6928.003.0016", - "CorpusId": 5561670}, "url": "https://www.semanticscholar.org/paper/1bb2114c24263b0489f24f787fef86f33487f802", + "CorpusId": 5561670}, "corpusId": 5561670, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1bb2114c24263b0489f24f787fef86f33487f802", "title": "Can Automatic Calculating Machines Be Said to Think", "abstract": "Trainable methodologies and the transistor have garnered profound interest from both steganographers and cyberinfo rmaticians in the last several years. @@ -544,15 +579,16 @@ interactions: [191] is recursiv ely enumerable, but rather on constructing a pervasive tool for evaluating Internet QoS (HolHoveling).", "venue": "", "year": 2004, "referenceCount": 271, "citationCount": 288, "influentialCitationCount": 14, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "117-132", "name": ""}, "authors": [{"authorId": - "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "2060159667", "name": "Geoffrey Jefferson"}, {"authorId": "34635194", - "name": "R. Braithwaite"}, {"authorId": "1692491", "name": "S. Shieber"}]}, - {"paperId": "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": {"MAG": - "593056538", "CorpusId": 60423929}, "url": "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "117-132", "name": ""}, "authors": + [{"authorId": "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": + "A. Turing"}, {"authorId": "2060159667", "name": "Geoffrey Jefferson"}, {"authorId": + "34635194", "name": "R. Braithwaite"}, {"authorId": "1692491", "name": "S. + Shieber"}]}, {"paperId": "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": + {"MAG": "593056538", "CorpusId": 60423929}, "corpusId": 60423929, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "title": "The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma", "abstract": "Alan Turing 1912-1954 Computable Numbers: A Guide 1. On Computable @@ -567,23 +603,25 @@ interactions: Calculating Machines Be Said to Think? (1952) Artificial Life 15. The Chemical Basis of Morphogenesis (1952) 16. Chess (1953) 17. Solvable and Unsolvable Problems (1954)", "venue": "", "year": 2004, "referenceCount": 39, "citationCount": - 151, "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": - "118975427", "name": "J. Copeland"}]}, {"paperId": "e4b0b7117d580c5ec4b256bd2d918e977ed08aba", - "externalIds": {"MAG": "3105675538", "DOI": "10.1093/oso/9780198250791.003.0013", - "CorpusId": 231523578}, "url": "https://www.semanticscholar.org/paper/e4b0b7117d580c5ec4b256bd2d918e977ed08aba", + 152, "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}, {"authorId": "118975427", "name": "J. Copeland"}]}, + {"paperId": "e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "externalIds": {"MAG": + "3105675538", "DOI": "10.1093/oso/9780198250791.003.0013", "CorpusId": 231523578}, + "corpusId": 231523578, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "title": "Memorandum to OP-20-G on Naval Enigma (c.1941)", "abstract": null, "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "ef5e79b3ba502350967ae9bff87243fbf140c8b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}]}, {"paperId": "ef5e79b3ba502350967ae9bff87243fbf140c8b9", "externalIds": {"MAG": "3098156012", "DOI": "10.1093/oso/9780198250791.003.0012", - "CorpusId": 230737760}, "url": "https://www.semanticscholar.org/paper/ef5e79b3ba502350967ae9bff87243fbf140c8b9", + "CorpusId": 230737760}, "corpusId": 230737760, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ef5e79b3ba502350967ae9bff87243fbf140c8b9", "title": "Letter to Winston Churchill (1941)", "abstract": "During 1941, codebreaking at Bletchley Park was hindered by shortages of typists and unskilled staV. These shortages could have been easily rectiWed, but the codebreakers\u2019 @@ -595,13 +633,15 @@ interactions: been done.\u20191 It fell to Stuart Milner-Barry of Hut 6 to deliver the letter by hand to 10 Downing Street. In 1986, Milner-Barry recalled his trip to Whitehall:", "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": - "Art", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, - {"authorId": "73506204", "name": "Gordon Welchman"}]}, {"paperId": "48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", - "externalIds": {"DBLP": "journals/cryptologia/Turing03", "MAG": "2030737075", - "DOI": "10.1080/0161-110391891748", "CorpusId": 12703115}, "url": "https://www.semanticscholar.org/paper/48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], + "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "73506204", "name": "Gordon + Welchman"}]}, {"paperId": "48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "externalIds": + {"DBLP": "journals/cryptologia/Turing03", "MAG": "2030737075", "DOI": "10.1080/0161-110391891748", + "CorpusId": 12703115}, "corpusId": 12703115, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "title": "ALAN M. TURING''S CRITIQUE OF RUNNING SHORT CRIBS ON THE U. S. NAVY BOMBE", "abstract": "Unified lossless information have led to many natural advances, including the partition table and massive multiplayer online roleplaying @@ -609,14 +649,15 @@ interactions: Lamport clocks a real possibility. In this position paper, we argue that Boolean logic and Markov models can agree to accomplish this purpose.", "venue": "Cryptologia", "year": 2003, "referenceCount": 196, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-01-01", "journal": {"volume": "27", "pages": "44 - - 49", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": - "A. Turing"}]}, {"paperId": "26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", "externalIds": - {"MAG": "1992023589", "DBLP": "journals/cryptologia/Turing01", "DOI": "10.1080/0161-110191889734", - "CorpusId": 14207094}, "url": "https://www.semanticscholar.org/paper/26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-01-01", "journal": + {"volume": "27", "pages": "44 - 49", "name": "Cryptologia"}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}]}, {"paperId": "26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", + "externalIds": {"MAG": "1992023589", "DBLP": "journals/cryptologia/Turing01", + "DOI": "10.1080/0161-110191889734", "CorpusId": 14207094}, "corpusId": 14207094, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9", "title": "VISIT TO NATIONAL CASH REGISTER CORPORATION OF DAYTON, OHIO", "abstract": "In recent years, much research has been devoted to the study of Boolean logic; however, few have developed the extensive unification of the location-identity @@ -626,35 +667,36 @@ interactions: [58], [59], [62], [68], [ 68], [68], [70], [95], [99], [114], [128], [129], [148], [152], [ 168], [168], [179], [188], [191].", "venue": "Cryptologia", "year": 2001, "referenceCount": 206, "citationCount": 179, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-01-01", "journal": {"volume": "25", "pages": "1 - - 10", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A. - Turing"}]}, {"paperId": "b52adf784f9a0ca3b936f39a90cf3445b48dc408", "externalIds": - {"MAG": "2798463542", "DOI": "10.1007/3-540-31288-9_9", "CorpusId": 125729536}, - "url": "https://www.semanticscholar.org/paper/b52adf784f9a0ca3b936f39a90cf3445b48dc408", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-01-01", "journal": + {"volume": "25", "pages": "1 - 10", "name": "Cryptologia"}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}]}, {"paperId": "b52adf784f9a0ca3b936f39a90cf3445b48dc408", + "externalIds": {"MAG": "2798463542", "DOI": "10.1007/3-540-31288-9_9", "CorpusId": + 125729536}, "corpusId": 125729536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b52adf784f9a0ca3b936f39a90cf3445b48dc408", "title": "Mathematical logic", "abstract": null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. - Turing"}]}, {"paperId": "650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "externalIds": - {"MAG": "2316135739", "DOI": "10.1093/PHILMAT/4.3.256", "CorpusId": 5213112}, - "url": "https://www.semanticscholar.org/paper/650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", + "externalIds": {"MAG": "2316135739", "DOI": "10.1093/PHILMAT/4.3.256", "CorpusId": + 5213112}, "corpusId": 5213112, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "title": "Intelligent Machinery, A Heretical Theory*", "abstract": "The analysis of interrupts is a structured quagmire. In this position paper, we demonstrate the investigation of simulated annealing. KaliNil, our new methodology for DNS, is the solution to all of these problems.", "venue": "", "year": 1996, "referenceCount": 146, "citationCount": 213, "influentialCitationCount": 7, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1996-09-01", "journal": {"volume": "4", "pages": "256-260", "name": "Philosophia - Mathematica"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "509a622da7869a8eb345eea921ed30924a73e6fa", "externalIds": {"CorpusId": - 18573444}, "url": "https://www.semanticscholar.org/paper/509a622da7869a8eb345eea921ed30924a73e6fa", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1996-09-01", "journal": {"volume": "4", "pages": "256-260", + "name": "Philosophia Mathematica"}, "authors": [{"authorId": "2262347", "name": + "A. Turing"}]}, {"paperId": "509a622da7869a8eb345eea921ed30924a73e6fa", "externalIds": + {"CorpusId": 18573444}, "corpusId": 18573444, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/509a622da7869a8eb345eea921ed30924a73e6fa", "title": "Computer poker", "abstract": "Games are an interesting and challenging domain for computer science research, having the nice characteristics of a clearly deened set of rules and a speciic goal. Developing a program to play @@ -672,60 +714,70 @@ interactions: for academic researchers, and lay some foundations for the sci-entiic exploration of this fascinating game.", "venue": "", "year": 1995, "referenceCount": 129, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "39261667", "name": "D. Billings"}, - {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "2262347", "name": - "A. Turing"}, {"authorId": "144461837", "name": "C. Shannon"}, {"authorId": - "143805236", "name": "J. McCarthy"}, {"authorId": "1717349", "name": "D. Knuth"}, - {"authorId": "48603437", "name": "A. Newell"}, {"authorId": "2055346931", - "name": "Herbert A. Simon"}, {"authorId": "7991309", "name": "A. Samuel"}, - {"authorId": "145878706", "name": "D. Michie"}, {"authorId": "102213388", - "name": "K. Thompson"}]}, {"paperId": "e972b5110d036991078e55bede6608a7cdaf48b1", - "externalIds": {"CorpusId": 8597454, "PubMed": "7564963"}, "url": "https://www.semanticscholar.org/paper/e972b5110d036991078e55bede6608a7cdaf48b1", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "39261667", + "name": "D. Billings"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "144461837", "name": "C. Shannon"}, + {"authorId": "143805236", "name": "J. McCarthy"}, {"authorId": "1717349", + "name": "D. Knuth"}, {"authorId": "48603437", "name": "A. Newell"}, {"authorId": + "2055346931", "name": "Herbert A. Simon"}, {"authorId": "7991309", "name": + "A. Samuel"}, {"authorId": "145878706", "name": "D. Michie"}, {"authorId": + "102213388", "name": "K. Thompson"}]}, {"paperId": "e972b5110d036991078e55bede6608a7cdaf48b1", + "externalIds": {"CorpusId": 8597454, "PubMed": "7564963"}, "corpusId": 8597454, + "publicationVenue": {"id": "2060f67b-894f-4036-95ff-a11601fc257a", "name": + "M.D.Computing", "type": "journal", "alternate_names": ["M.D comput comput + med pract", "M.D. computing : computers in medical practice", "M D Comput", + "M D Computing"], "issn": "0724-6811"}, "url": "https://www.semanticscholar.org/paper/e972b5110d036991078e55bede6608a7cdaf48b1", "title": "Lecture to the London Mathematical Society on 20 February 1947. 1986.", "abstract": null, "venue": "M.D.Computing", "year": 1995, "referenceCount": 0, "citationCount": 166, "influentialCitationCount": 15, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"volume": "12 5", "pages": "\n 390-7\n ", + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"volume": "12 5", "pages": "\n 390-7\n ", "name": "M.D. computing : computers in medical practice"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "33adb5256f85d7835696611b2517797dcb260ddb", - "externalIds": {"MAG": "1577952063", "CorpusId": 60626324}, "url": "https://www.semanticscholar.org/paper/33adb5256f85d7835696611b2517797dcb260ddb", + "externalIds": {"MAG": "1577952063", "CorpusId": 60626324}, "corpusId": 60626324, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/33adb5256f85d7835696611b2517797dcb260ddb", "title": "Manchester computing machine: general topics", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1989-05-01", "journal": {"volume": "", "pages": "194-196", "name": ""}, "authors": - [{"authorId": "90657571", "name": "M. J. Lighthill"}, {"authorId": "16909947", - "name": "G. C. Tootill"}, {"authorId": "143726570", "name": "J. Miller"}, - {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "143809548", "name": - "E. A. Newman"}]}, {"paperId": "a28fe905a92c75ae2098acacad53c992e4bce52d", - "externalIds": {"MAG": "1506559289", "CorpusId": 60659734}, "url": "https://www.semanticscholar.org/paper/a28fe905a92c75ae2098acacad53c992e4bce52d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1989-05-01", "journal": {"volume": + "", "pages": "194-196", "name": ""}, "authors": [{"authorId": "90657571", + "name": "M. J. Lighthill"}, {"authorId": "16909947", "name": "G. C. Tootill"}, + {"authorId": "143726570", "name": "J. Miller"}, {"authorId": "2262347", "name": + "A. Turing"}, {"authorId": "143809548", "name": "E. A. Newman"}]}, {"paperId": + "a28fe905a92c75ae2098acacad53c992e4bce52d", "externalIds": {"MAG": "1506559289", + "CorpusId": 60659734}, "corpusId": 60659734, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a28fe905a92c75ae2098acacad53c992e4bce52d", "title": "Local programming methods and conventions", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 147, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": - "178", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "f50fef843592d31124e629420a5d7df39a51fcd7", "externalIds": {"MAG": - "1723067587", "CorpusId": 56518797}, "url": "https://www.semanticscholar.org/paper/f50fef843592d31124e629420a5d7df39a51fcd7", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": + {"volume": "", "pages": "178", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "f50fef843592d31124e629420a5d7df39a51fcd7", + "externalIds": {"MAG": "1723067587", "CorpusId": 56518797}, "corpusId": 56518797, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f50fef843592d31124e629420a5d7df39a51fcd7", "title": "Checking a large routine", "abstract": null, "venue": "", "year": - 1989, "referenceCount": 0, "citationCount": 402, "influentialCitationCount": - 44, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": - "70-72", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "fc5ef435b26155d2ea554a8062781739c8ccf296", "externalIds": {"MAG": - "627474889", "CorpusId": 190961434}, "url": "https://www.semanticscholar.org/paper/fc5ef435b26155d2ea554a8062781739c8ccf296", + 1989, "referenceCount": 0, "citationCount": 404, "influentialCitationCount": + 44, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": + {"volume": "", "pages": "70-72", "name": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "fc5ef435b26155d2ea554a8062781739c8ccf296", + "externalIds": {"MAG": "627474889", "CorpusId": 190961434}, "corpusId": 190961434, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc5ef435b26155d2ea554a8062781739c8ccf296", "title": "Intelligence service : Schriften", "abstract": null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 46, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "401226dbe808714439b7f4fe6ce17e3fb5a6e790", - "externalIds": {"CorpusId": 7990676}, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790", + "externalIds": {"CorpusId": 7990676}, "corpusId": 7990676, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790", "title": "Artificial Intelligence : Usfssg Computers to Think about Thinking . Part 1", "abstract": "In 1950, Alan M. Turing, the late deputy director of the University of Manchester\u2019s Computing Laboratory in England, proposed @@ -766,41 +818,46 @@ interactions: tasks, but not very well. For example, chess programs were successful at following the step-by-step instructions for moving chessmen. But computers couldn\u2019t independently gen-", "venue": "", "year": 1983, "referenceCount": 143, "citationCount": - 181, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", - "externalIds": {"MAG": "1482735464", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": - 64330274}, "url": "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7", + 181, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", "externalIds": {"MAG": + "1482735464", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": 64330274}, "corpusId": + 64330274, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7", "title": "Studies in the History of Probability and Statistics. XXXVII", "abstract": "SUMMARY An account is given of A. M. Turing''s unpublished contributions to statistics during 1941 or 1940.", "venue": "", "year": 1979, "referenceCount": 15, "citationCount": 164, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1979-08-01", "journal": {"volume": "", "name": ""}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "145179124", - "name": "I. Good"}]}, {"paperId": "186bdef34bf03f6a1c74d5b074e956324e9fe746", - "externalIds": {"MAG": "34610884", "CorpusId": 115688448}, "url": "https://www.semanticscholar.org/paper/186bdef34bf03f6a1c74d5b074e956324e9fe746", - "title": "Solvable and Unsolvable Problems", "abstract": null, "venue": "", - "year": 1954, "referenceCount": 0, "citationCount": 182, "influentialCitationCount": - 36, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1979-08-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "24fade315dc6a15961184a3c6dfec064591edcd5", - "externalIds": {"MAG": "1553055254", "CorpusId": 60504948}, "url": "https://www.semanticscholar.org/paper/24fade315dc6a15961184a3c6dfec064591edcd5", + "name": "A. Turing"}, {"authorId": "145179124", "name": "I. Good"}]}, {"paperId": + "186bdef34bf03f6a1c74d5b074e956324e9fe746", "externalIds": {"MAG": "34610884", + "CorpusId": 115688448}, "corpusId": 115688448, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/186bdef34bf03f6a1c74d5b074e956324e9fe746", + "title": "Solvable and Unsolvable Problems", "abstract": null, "venue": "", + "year": 1954, "referenceCount": 0, "citationCount": 184, "influentialCitationCount": + 36, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "24fade315dc6a15961184a3c6dfec064591edcd5", + "externalIds": {"MAG": "1553055254", "CorpusId": 60504948}, "corpusId": 60504948, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/24fade315dc6a15961184a3c6dfec064591edcd5", "title": "Review: Arthur W. Burks, The Logic of Programming Electronic Digital Computers", "abstract": null, "venue": "", "year": 1953, "referenceCount": 0, "citationCount": 187, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1953-06-01", "journal": - {"volume": "18", "pages": "179-179", "name": "Journal of Symbolic Logic"}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "62660c27d93c50f69b1ed614ad9499f4d849aeec", - "externalIds": {"MAG": "2317224626", "DOI": "10.2307/2268956", "CorpusId": - 61881712}, "url": "https://www.semanticscholar.org/paper/62660c27d93c50f69b1ed614ad9499f4d849aeec", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1953-06-01", "journal": {"volume": "18", "pages": "179-179", "name": "Journal + of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "62660c27d93c50f69b1ed614ad9499f4d849aeec", "externalIds": {"MAG": + "2317224626", "DOI": "10.2307/2268956", "CorpusId": 61881712}, "corpusId": + 61881712, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/62660c27d93c50f69b1ed614ad9499f4d849aeec", "title": "Arthur W. Burks. The logic of programming electronic digital computers. Industrial mathematics (Detroit), vol. 1 (1950), pp. 36\u201352.", "abstract": "ARTHUR W. BURKS. The logic of programming electronic digital computers. Industrial @@ -813,14 +870,15 @@ interactions: by Goldstine and von Neumann. Planning and coding of problems for an electronic computing instrument, vol. 1, Institute for Advanced Study, 1947.", "venue": "Journal of Symbolic Logic", "year": 1953, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1953-06-01", "journal": {"volume": - "18", "pages": "179 - 179", "name": "Journal of Symbolic Logic"}, "authors": - [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", - "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": - "10.1093/MIND/LIX.236.433", "CorpusId": 14636783}, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1953-06-01", + "journal": {"volume": "18", "pages": "179 - 179", "name": "Journal of Symbolic + Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": + "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": "3030363341", + "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", "CorpusId": + 14636783}, "corpusId": 14636783, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", "title": "Computing Machinery and Intelligence", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. @@ -831,15 +889,15 @@ interactions: and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": - 8557, "influentialCitationCount": 492, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "1950-10-01", "journal": - {"volume": "LIX", "pages": "433-460", "name": "Mind"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "c35cf8a54e655e91f8657cf8403d578994fb27c5", + 8596, "influentialCitationCount": 493, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1950-10-01", + "journal": {"volume": "LIX", "pages": "433-460", "name": "Mind"}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "c35cf8a54e655e91f8657cf8403d578994fb27c5", "externalIds": {"MAG": "2419349071", "DOI": "10.2307/j.ctv8d5sh5.6", "CorpusId": - 148545092}, "url": "https://www.semanticscholar.org/paper/c35cf8a54e655e91f8657cf8403d578994fb27c5", + 148545092}, "corpusId": 148545092, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c35cf8a54e655e91f8657cf8403d578994fb27c5", "title": "PSYCHOLOGY AND PHILOSOPHY", "abstract": "1. The Imitation Game. I PROPOSE tO consider the question, ''Can machines think ? This should begin with definitions of the meaning of the terms ''machine'' and ''think''. The @@ -861,13 +919,18 @@ interactions: to A and B thus: C: Will X please tell me the length of his or her hair 2 Now suppose X is aetually A, then A must answer. It is A''s", "venue": "", "year": 1950, "referenceCount": 6, "citationCount": 33, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "092da8384571c8261858e91e3278e765eedde1d5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "092da8384571c8261858e91e3278e765eedde1d5", "externalIds": {"MAG": "2092575189", "DBLP": "journals/jsyml/Turing48", "DOI": - "10.2307/2267329", "CorpusId": 5770563}, "url": "https://www.semanticscholar.org/paper/092da8384571c8261858e91e3278e765eedde1d5", + "10.2307/2267329", "CorpusId": 5770563}, "corpusId": 5770563, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/092da8384571c8261858e91e3278e765eedde1d5", "title": "Practical forms of type theory", "abstract": "Russell''s theory of types, though probably not providing the soundest possible foundation for mathematics, follows closely the outlook of most mathematicians. The present @@ -879,15 +942,20 @@ interactions: as well as in doctrine. It will not be necessary to adopt a formal logical notation to do so.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1948, "referenceCount": 121, "citationCount": 200, "influentialCitationCount": 21, - "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1948-06-01", "journal": {"volume": "13", "pages": "80 - 94", "name": "Journal - of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "65069064b19ec8244044311a2a90fbf2c9161675", "externalIds": {"DBLP": - "journals/jsyml/NewmanT42", "MAG": "1988522427", "DOI": "10.2307/2267552", - "CorpusId": 17917182}, "url": "https://www.semanticscholar.org/paper/65069064b19ec8244044311a2a90fbf2c9161675", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1948-06-01", "journal": {"volume": "13", "pages": "80 + - 94", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}]}, {"paperId": "65069064b19ec8244044311a2a90fbf2c9161675", + "externalIds": {"DBLP": "journals/jsyml/NewmanT42", "MAG": "1988522427", "DOI": + "10.2307/2267552", "CorpusId": 17917182}, "corpusId": 17917182, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/65069064b19ec8244044311a2a90fbf2c9161675", "title": "A formal theorem in Church''s theory of types", "abstract": "This note is concerned with the logical formalism with types recently introduced by Church [1] (and called (C) in this note) It was shewn in his paper (Theorem @@ -901,15 +969,21 @@ interactions: uses, in addition to Axioms 1 to 7 and Y\u03b9, also Axiom 9 (in connection with Def. 4), and Axiom 10 (in Theorem 9).", "venue": "Journal of Symbolic Logic (JSL)", "year": 1942, "referenceCount": 64, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1942-03-01", "journal": {"volume": "7", "pages": "28 - 33", "name": "Journal - of Symbolic Logic"}, "authors": [{"authorId": "143697232", "name": "M. Newman"}, - {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", - "externalIds": {"DBLP": "journals/jsyml/Turing42", "MAG": "2065302580", "DOI": - "10.2307/2268111", "CorpusId": 17112802}, "url": "https://www.semanticscholar.org/paper/7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1942-03-01", "journal": {"volume": + "7", "pages": "28 - 33", "name": "Journal of Symbolic Logic"}, "authors": + [{"authorId": "143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": + "A. Turing"}]}, {"paperId": "7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "externalIds": + {"DBLP": "journals/jsyml/Turing42", "MAG": "2065302580", "DOI": "10.2307/2268111", + "CorpusId": 17112802}, "corpusId": 17112802, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "title": "The use of dots as brackets in Church''s system", "abstract": "Any logical system, if its use is to be carried beyond a rather elementary stage, needs powerful conventions about abbreviations: in particular one usually @@ -926,14 +1000,15 @@ interactions: Quine''s, and Curry''s bracketing systems as well as to the present one.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1942, "referenceCount": 83, "citationCount": 193, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1942-12-01", "journal": {"volume": - "7", "pages": "146 - 156", "name": "Journal of Symbolic Logic"}, "authors": - [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "891151133781d3e78f19b882015746bafd9bc935", - "externalIds": {"DBLP": "journals/jsyml/Turing37a", "MAG": "2799201656", "CorpusId": - 33223540}, "url": "https://www.semanticscholar.org/paper/891151133781d3e78f19b882015746bafd9bc935", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1942-12-01", "journal": {"volume": "7", "pages": "146 - 156", "name": "Journal + of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "891151133781d3e78f19b882015746bafd9bc935", "externalIds": {"DBLP": + "journals/jsyml/Turing37a", "MAG": "2799201656", "CorpusId": 33223540}, "corpusId": + 33223540, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/891151133781d3e78f19b882015746bafd9bc935", "title": "The p-Function in \u03bb-K-Conversion", "abstract": "In the theory of conversion it is important to have a formally defined function which assigns to any positive integer n the least integer not less than n which has a given @@ -947,14 +1022,20 @@ interactions: that e conv Xu.u(e(u)), and consequently if M-<3(V) then M conv V(M). A formula with this property is,", "venue": "J. Symb. Log.", "year": 1937, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"volume": "2", "pages": "164", "name": - "J. Symb. Log."}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, - {"paperId": "b300783b3f3bd283ab1cf86b7a51f63469db380f", "externalIds": {"MAG": - "2798583139", "DOI": "10.2307/2268281", "CorpusId": 11473119}, "url": "https://www.semanticscholar.org/paper/b300783b3f3bd283ab1cf86b7a51f63469db380f", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"volume": "2", "pages": + "164", "name": "J. Symb. Log."}, "authors": [{"authorId": "2262347", "name": + "A. Turing"}]}, {"paperId": "b300783b3f3bd283ab1cf86b7a51f63469db380f", "externalIds": + {"MAG": "2798583139", "DOI": "10.2307/2268281", "CorpusId": 11473119}, "corpusId": + 11473119, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/b300783b3f3bd283ab1cf86b7a51f63469db380f", "title": "The \u00fe-function in \u03bb-K-conversion", "abstract": "In the theory of conversion it is important to have a formally defined function which assigns to any positive integer n the least integer not less than n which @@ -975,14 +1056,20 @@ interactions: n) is convertible to the formula representing the nth positive integer q for which T(q) conv 0.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1937, "referenceCount": 97, "citationCount": 35, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1937-12-01", "journal": {"volume": "2", "pages": - "164 - 164", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "ee8c779e7823814a5f1746d883ca77b26671b617", - "externalIds": {"DBLP": "journals/jsyml/Turing37", "MAG": "1485161910", "DOI": - "10.2307/2268280", "CorpusId": 2317046}, "url": "https://www.semanticscholar.org/paper/ee8c779e7823814a5f1746d883ca77b26671b617", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1937-12-01", + "journal": {"volume": "2", "pages": "164 - 164", "name": "Journal of Symbolic + Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": + "ee8c779e7823814a5f1746d883ca77b26671b617", "externalIds": {"DBLP": "journals/jsyml/Turing37", + "MAG": "1485161910", "DOI": "10.2307/2268280", "CorpusId": 2317046}, "corpusId": + 2317046, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/ee8c779e7823814a5f1746d883ca77b26671b617", "title": "Computability and \u03bb-definability", "abstract": "Several definitions have been given to express an exact meaning corresponding to the intuitive idea of \u2018effective calculability\u2019 as applied for instance to functions @@ -1004,16 +1091,16 @@ interactions: and p. 254. The proof that computability implies recursiveness requires no more knowledge of computable functions than the ideas underlying the definition: the technical details are recalled in \u00a75.", "venue": "Journal of Symbolic - Logic (JSL)", "year": 1937, "referenceCount": 6, "citationCount": 385, "influentialCitationCount": - 38, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + Logic (JSL)", "year": 1937, "referenceCount": 6, "citationCount": 386, "influentialCitationCount": + 38, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1937-12-01", "journal": {"volume": "2", "pages": "153 - 163", "name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "4d81ff79406cd02e064285e5f61e5b6bde68f5e7", "externalIds": {"CorpusId": - 18195327}, "url": "https://www.semanticscholar.org/paper/4d81ff79406cd02e064285e5f61e5b6bde68f5e7", + 18195327}, "corpusId": 18195327, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4d81ff79406cd02e064285e5f61e5b6bde68f5e7", "title": "Computing Machinery and Intelligence 1. the Imitation Game", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The @@ -1037,47 +1124,51 @@ interactions: to try and cause C to make the wrong identification. His answer might therefore be: \"My hair is shingled, and the longest strands are about nine inches long. \" 11", "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}]}, {"authorId": - "147168046", "externalIds": {"DBLP": ["John Dermot Turing"]}, "url": "https://www.semanticscholar.org/author/147168046", - "name": "J. Turing", "aliases": ["J.dermot Turing", "John Turing", "John Dermot - Turing"], "affiliations": [], "homepage": null, "paperCount": 3, "citationCount": - 15, "hIndex": 1, "papers": [{"paperId": "ed4845e310c3a7572869a3e011f20bd05930d950", - "externalIds": {"DBLP": "books/ox/17/Turing17", "MAG": "2948007197", "CorpusId": - 159042027}, "url": "https://www.semanticscholar.org/paper/ed4845e310c3a7572869a3e011f20bd05930d950", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, + "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}]}, + {"authorId": "147168046", "externalIds": {"DBLP": ["John Dermot Turing"]}, + "url": "https://www.semanticscholar.org/author/147168046", "name": "J. Turing", + "aliases": ["J.dermot Turing", "John Turing", "John Dermot Turing"], "affiliations": + [], "homepage": null, "paperCount": 3, "citationCount": 15, "hIndex": 1, "papers": + [{"paperId": "ed4845e310c3a7572869a3e011f20bd05930d950", "externalIds": {"DBLP": + "books/ox/17/Turing17", "MAG": "2948007197", "CorpusId": 159042027}, "corpusId": + 159042027, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ed4845e310c3a7572869a3e011f20bd05930d950", "title": "The man with the terrible trousers", "abstract": null, "venue": "The Turing Guide", "year": 2017, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"pages": "19-30"}, "authors": [{"authorId": "147168046", "name": "J. Turing"}]}, - {"paperId": "72340a2f2236f1e7d8a388599eed9b73f8cbb38f", "externalIds": {"MAG": - "2054604828", "DOI": "10.1016/0022-1910(91)90090-M", "CorpusId": 85099674}, - "url": "https://www.semanticscholar.org/paper/72340a2f2236f1e7d8a388599eed9b73f8cbb38f", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "19-30"}, "authors": [{"authorId": "147168046", + "name": "J. Turing"}]}, {"paperId": "72340a2f2236f1e7d8a388599eed9b73f8cbb38f", + "externalIds": {"MAG": "2054604828", "DOI": "10.1016/0022-1910(91)90090-M", + "CorpusId": 85099674}, "corpusId": 85099674, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/72340a2f2236f1e7d8a388599eed9b73f8cbb38f", "title": "The advantages that accrue to Drosophila melanogaster possessing larval serum protein 1", "abstract": null, "venue": "", "year": 1991, "referenceCount": 15, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "37", "pages": "391-400", "name": "Journal of Insect Physiology"}, "authors": [{"authorId": "38220923", "name": "D. B. Roberts"}, {"authorId": "147168046", "name": "J. Turing"}, {"authorId": "49825305", "name": "S. Loughlin"}]}, {"paperId": "c0629255576a0b40439008acaa30f58ef47ee982", - "externalIds": {"MAG": "639777608", "CorpusId": 191043621}, "url": "https://www.semanticscholar.org/paper/c0629255576a0b40439008acaa30f58ef47ee982", + "externalIds": {"MAG": "639777608", "CorpusId": 191043621}, "corpusId": 191043621, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c0629255576a0b40439008acaa30f58ef47ee982", "title": "My nephew Hamlet", "abstract": null, "venue": "", "year": 1967, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "147168046", "name": - "J. Turing"}, {"authorId": "103246017", "name": "J. McDonald"}, {"authorId": + false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": + [{"category": "Art", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "147168046", + "name": "J. Turing"}, {"authorId": "103246017", "name": "J. McDonald"}, {"authorId": "2077037962", "name": "R. Church"}]}]}, {"authorId": "2079681806", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2079681806", "name": "A. Turing", "aliases": ["A. M Turing", "Alan Turing"], "affiliations": [], "homepage": null, "paperCount": 2, "citationCount": 2, "hIndex": 1, "papers": [{"paperId": "a73c6bdf01e42108ec2431ff4c021bbe5aa310c9", "externalIds": {"DOI": "10.1051/978-2-7598-1899-0.c053", - "CorpusId": 15188309}, "url": "https://www.semanticscholar.org/paper/a73c6bdf01e42108ec2431ff4c021bbe5aa310c9", + "CorpusId": 15188309}, "corpusId": 15188309, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a73c6bdf01e42108ec2431ff4c021bbe5aa310c9", "title": "La machine de Turing", "abstract": "\u2022 Un \u00ab ruban \u00bb divis\u00e9 en cases adjacentes. Chaque case contient un symbole parmi un alphabet fini. L''alphabet contient un symbole sp\u00e9cial \u00ab blanc \u00bb @@ -1093,66 +1184,97 @@ interactions: sp\u00e9cial appel\u00e9 \u00ab \u00e9tat de d\u00e9part \u00bb qui est l''\u00e9tat initial de la machine avant son ex\u00e9cution.", "venue": "Les math\u00e9matiques en images", "year": 2020, "referenceCount": 242, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2020-11-04", "journal": {"name": "Les math\u00e9matiques - en images"}, "authors": [{"authorId": "2077266462", "name": "Stefan Schwoon"}, - {"authorId": "70857388", "name": "Andrew S. Tanenbaum"}, {"authorId": "2080857927", - "name": "Contenu d\u2019aujourd\u2019hui"}, {"authorId": "2079681806", "name": - "A. Turing"}]}, {"paperId": "2aca6d0ff761750ee3251ee034edd28318e41a46", "externalIds": - {"MAG": "2284519933", "CorpusId": 193258771}, "url": "https://www.semanticscholar.org/paper/2aca6d0ff761750ee3251ee034edd28318e41a46", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2020-11-04", "journal": + {"name": "Les math\u00e9matiques en images"}, "authors": [{"authorId": "2077266462", + "name": "Stefan Schwoon"}, {"authorId": "70857388", "name": "Andrew S. Tanenbaum"}, + {"authorId": "2080857927", "name": "Contenu d\u2019aujourd\u2019hui"}, {"authorId": + "2079681806", "name": "A. Turing"}]}, {"paperId": "2aca6d0ff761750ee3251ee034edd28318e41a46", + "externalIds": {"MAG": "2284519933", "CorpusId": 193258771}, "corpusId": 193258771, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2aca6d0ff761750ee3251ee034edd28318e41a46", "title": "Maquinas computadoras e inteligencia, traduccion", "abstract": null, "venue": "", "year": 1986, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "2", "pages": "117-149", - "name": "Mathesis"}, "authors": [{"authorId": "2079681806", "name": "A. Turing"}]}]}, - {"authorId": "1413361584", "externalIds": {}, "url": "https://www.semanticscholar.org/author/1413361584", - "name": "C. Turing", "aliases": ["C Turing", "C. Alan Turing"], "affiliations": - [], "homepage": null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": - [{"paperId": "dd0edf843384769f330fc975c4cad9d858e86eb5", "externalIds": {"MAG": - "2431142837", "CorpusId": 63208488}, "url": "https://www.semanticscholar.org/paper/dd0edf843384769f330fc975c4cad9d858e86eb5", - "title": "CHAPTER 15: IS ARTIFICIAL INTELLIGENCE REAL?", "abstract": null, - "venue": "", "year": 2008, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "2080126066", "name": "A. Kay"}, {"authorId": "1484479939", - "name": "B. Grace"}, {"authorId": "2073004227", "name": "Murray Hopper"}, - {"authorId": "1413361584", "name": "C. Turing"}, {"authorId": "1410784374", - "name": "D. T. Berners-Lee"}, {"authorId": "71653708", "name": "A. Turing"}, - {"authorId": "47356585", "name": "B. A. Kay"}, {"authorId": "1409459693", - "name": "C. T. Berners-Lee"}, {"authorId": "2053152866", "name": "D. Grace"}]}]}, - {"authorId": "1477348601", "externalIds": {}, "url": "https://www.semanticscholar.org/author/1477348601", - "name": "M. Alan", "aliases": ["Molinari Alan", "M. Turing Turing Alan"], - "affiliations": [], "homepage": null, "paperCount": 2, "citationCount": 2, - "hIndex": 1, "papers": [{"paperId": "91160d01cedebf24d6a04c88a01f819929c7c700", - "externalIds": {"MAG": "2746168125", "CorpusId": 209868392}, "url": "https://www.semanticscholar.org/paper/91160d01cedebf24d6a04c88a01f819929c7c700", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": + "2", "pages": "117-149", "name": "Mathesis"}, "authors": [{"authorId": "2079681806", + "name": "A. Turing"}]}]}, {"authorId": "1477348601", "externalIds": {}, "url": + "https://www.semanticscholar.org/author/1477348601", "name": "M. Alan", "aliases": + ["Molinari Alan", "M. Turing Turing Alan"], "affiliations": [], "homepage": + null, "paperCount": 2, "citationCount": 2, "hIndex": 1, "papers": [{"paperId": + "91160d01cedebf24d6a04c88a01f819929c7c700", "externalIds": {"MAG": "2746168125", + "CorpusId": 209868392}, "corpusId": 209868392, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/91160d01cedebf24d6a04c88a01f819929c7c700", "title": "\u30d0\u30ea\u30a6\u30e0\u30d5\u30a7\u30e9\u30a4\u30c8\u30a8\u30d4\u30bf\u30ad\u30b7\u30e3\u30eb\u8584\u819c\u3068\u305d\u306e\u6c34\u7d20\u5316\u7269BaFeO2.5-x+\u03b4(OH)2x\u306e\u69cb\u9020\u3068\u4f1d\u5c0e\u7387", "abstract": null, "venue": "", "year": 2017, "referenceCount": 0, "citationCount": - 2, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "50", - "pages": "11", "name": "Journal of Physics D"}, "authors": [{"authorId": "1477348434", - "name": "S. Anitha"}, {"authorId": "1477348601", "name": "M. Alan"}, {"authorId": - "1477303607", "name": "Benes Alexander"}, {"authorId": "1477348553", "name": - "Loho Christoph"}, {"authorId": "144091874", "name": "C. Kiran"}, {"authorId": - "2113299660", "name": "G. S. Kumar"}, {"authorId": "94444799", "name": "K. - Robert"}, {"authorId": "96218977", "name": "Clemens Oliver"}]}, {"paperId": - "e6cc9e3b61eef57b00aec563d8ee4f45adfb9599", "externalIds": {"MAG": "2905795930", - "CorpusId": 69495937}, "url": "https://www.semanticscholar.org/paper/e6cc9e3b61eef57b00aec563d8ee4f45adfb9599", + 2, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "50", "pages": "11", "name": "Journal of Physics D"}, + "authors": [{"authorId": "1477348434", "name": "S. Anitha"}, {"authorId": + "1477348601", "name": "M. Alan"}, {"authorId": "1477303607", "name": "Benes + Alexander"}, {"authorId": "1477348553", "name": "Loho Christoph"}, {"authorId": + "144091874", "name": "C. Kiran"}, {"authorId": "2113299660", "name": "G. S. + Kumar"}, {"authorId": "94444799", "name": "K. Robert"}, {"authorId": "96218977", + "name": "Clemens Oliver"}]}, {"paperId": "e6cc9e3b61eef57b00aec563d8ee4f45adfb9599", + "externalIds": {"MAG": "2905795930", "CorpusId": 69495937}, "corpusId": 69495937, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e6cc9e3b61eef57b00aec563d8ee4f45adfb9599", "title": "ISBN: 9780198250791,9780198250807,9781429421522,0198250797,0198250800", "abstract": "The essential Turing: seminal writings in computing, logic, philosophy, artificial intelligence, and artificial life, plus the secrets of Enigma", "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "", "pages": "622", "name": ""}, "authors": [{"authorId": "1477348601", - "name": "M. Alan"}]}]}, {"authorId": "2079681794", "externalIds": {}, "url": - "https://www.semanticscholar.org/author/2079681794", "name": "A. Turing", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "622", "name": ""}, "authors": [{"authorId": + "1477348601", "name": "M. Alan"}]}]}, {"authorId": "1413361584", "externalIds": + {}, "url": "https://www.semanticscholar.org/author/1413361584", "name": "C. + Turing", "aliases": ["C Turing", "C. Alan Turing"], "affiliations": [], "homepage": + null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": + "dd0edf843384769f330fc975c4cad9d858e86eb5", "externalIds": {"MAG": "2431142837", + "CorpusId": 63208488}, "corpusId": 63208488, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/dd0edf843384769f330fc975c4cad9d858e86eb5", + "title": "CHAPTER 15: IS ARTIFICIAL INTELLIGENCE REAL?", "abstract": null, + "venue": "", "year": 2008, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "2080126066", "name": + "A. Kay"}, {"authorId": "1484479939", "name": "B. Grace"}, {"authorId": "2073004227", + "name": "Murray Hopper"}, {"authorId": "1413361584", "name": "C. Turing"}, + {"authorId": "1410784374", "name": "D. T. Berners-Lee"}, {"authorId": "71653708", + "name": "A. Turing"}, {"authorId": "47356585", "name": "B. A. Kay"}, {"authorId": + "1409459693", "name": "C. T. Berners-Lee"}, {"authorId": "2053152866", "name": + "D. Grace"}]}]}, {"authorId": "1394093374", "externalIds": {}, "url": "https://www.semanticscholar.org/author/1394093374", + "name": "Turing Award", "aliases": ["Turing Award"], "affiliations": [], "homepage": + null, "paperCount": 1, "citationCount": 2, "hIndex": 1, "papers": [{"paperId": + "1636a1ccf44d009ef76736a8f4d39cdbb37b97ec", "externalIds": {"DOI": "10.1145/800193.805815", + "CorpusId": 22858651}, "corpusId": 22858651, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1636a1ccf44d009ef76736a8f4d39cdbb37b97ec", + "title": "Turing award", "abstract": "ACM''s most prestigious award, the A.M. + Turing award, is given annually to the person deemed most deserving of recognition + for his contributions to the field of computer science and engineering. The + recipient is selected by a committee named by past presidents of the ACM and + includes an honorarium of &doller;1,000.\n The 1972 presentation goes to Edsger + W. Dijkstra, Department of Mathematics, Technological University, Eindhozen, + Netherlands. Edsger Dijkstra was a principal contributor in the late 1950''s + to the development of ALGOL, a high level programming language which has become + a model of clarity and mathematical rigor. He is one of the principal exponents + of the science and art of programming languages in general, and has greatly + contributed to our understanding of their structure, representation, and implementation. + His fifteen years of publications extend from theoretical articles on graph + theory to basic manuals, expository texts, and philosophical contemplations + in the field of programming languages.", "venue": "", "year": 1972, "referenceCount": + 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1394093374", + "name": "Turing Award"}]}]}, {"authorId": "2079681794", "externalIds": {}, + "url": "https://www.semanticscholar.org/author/2079681794", "name": "A. Turing", "aliases": ["A M Turing", "A. M. Turing", "Am Turing"], "affiliations": [], - "homepage": null, "paperCount": 12, "citationCount": 20970, "hIndex": 10, + "homepage": null, "paperCount": 12, "citationCount": 21082, "hIndex": 10, "papers": [{"paperId": "929378ed05ae31f8eedb314c448a243de8c005b3", "externalIds": - {"CorpusId": 15190333}, "url": "https://www.semanticscholar.org/paper/929378ed05ae31f8eedb314c448a243de8c005b3", + {"CorpusId": 15190333}, "corpusId": 15190333, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/929378ed05ae31f8eedb314c448a243de8c005b3", "title": "Collected works of AM Turing Universal Turing Machine", "abstract": "Link-level acknowledgements and multiprocessors, while technical in theory, have not until recently been considered technical. given the current status @@ -1161,32 +1283,36 @@ interactions: (DoteDogate), disconfirming that red-black trees and journaling file systems can synchronize to accomplish this ambition.", "venue": "", "year": 2011, "referenceCount": 154, "citationCount": 0, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2079681794", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "b65924cc702754381138806cda505577748117e0", "externalIds": {"DOI": "10.1093/oso/9780198250791.003.0022", "CorpusId": 2121763, - "PubMed": "2185858"}, "url": "https://www.semanticscholar.org/paper/b65924cc702754381138806cda505577748117e0", + "PubMed": "2185858"}, "corpusId": 2121763, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/b65924cc702754381138806cda505577748117e0", "title": "The chemical basis of morphogenesis. 1953.", "abstract": null, "venue": "Bulletin of Mathematical Biology", "year": 1990, "referenceCount": 0, "citationCount": - 240, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"volume": "52 1-2", "pages": "\n 153-97; discussion 119-52\n ", - "name": "Bulletin of mathematical biology"}, "authors": [{"authorId": "2079681794", - "name": "A. Turing"}]}, {"paperId": "f515c6e64918901d23f91049ffad4aeee0fcabab", + 240, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"volume": "52 1-2", "pages": "\n 153-97; discussion + 119-52\n ", "name": "Bulletin of mathematical biology"}, "authors": + [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "f515c6e64918901d23f91049ffad4aeee0fcabab", "externalIds": {"MAG": "2803631288", "DOI": "10.1016/B978-0-08-009217-1.50025-6", - "CorpusId": 125553140}, "url": "https://www.semanticscholar.org/paper/f515c6e64918901d23f91049ffad4aeee0fcabab", + "CorpusId": 125553140}, "corpusId": 125553140, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f515c6e64918901d23f91049ffad4aeee0fcabab", "title": "APPENDIX One (B) \u2013 On Computable Numbers, with an Application to the Entscheidungsproblem. A Correction", "abstract": null, "venue": "", "year": 1960, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "pages": "265-267", "name": ""}, "authors": [{"authorId": - "2079681794", "name": "A. Turing"}]}, {"paperId": "179504675767832ef9a9da52a0d5ee73dd12492b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "pages": "265-267", "name": ""}, "authors": + [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "179504675767832ef9a9da52a0d5ee73dd12492b", "externalIds": {"MAG": "1997756563", "DOI": "10.1112/PLMS/S3-3.1.99", "CorpusId": - 120006352}, "url": "https://www.semanticscholar.org/paper/179504675767832ef9a9da52a0d5ee73dd12492b", + 120006352}, "corpusId": 120006352, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/179504675767832ef9a9da52a0d5ee73dd12492b", "title": "Some Calculations of the Riemann Zeta-Function", "abstract": "Introduction IN June 1950 the Manchester University Mark 1 Electronic Computer was used to do some calculations concerned with the distribution of the zeros of the @@ -1219,13 +1345,19 @@ interactions: if the calculations are being done by an automatic computer one can feel sure that this kind of indiscipline", "venue": "", "year": 1953, "referenceCount": 6, "citationCount": 271, "influentialCitationCount": 39, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "pages": "99-117", "name": "Proceedings of The London Mathematical Society"}, - "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": - "d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", "externalIds": {"MAG": "1985072454", - "DOI": "10.1098/rstb.1952.0012", "CorpusId": 937133}, "url": "https://www.semanticscholar.org/paper/d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "pages": "99-117", "name": "Proceedings of The London + Mathematical Society"}, "authors": [{"authorId": "2079681794", "name": "A. + Turing"}]}, {"paperId": "d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", "externalIds": + {"MAG": "1985072454", "DOI": "10.1098/rstb.1952.0012", "CorpusId": 937133}, + "corpusId": 937133, "publicationVenue": {"id": "6de51a3e-86d6-4b08-92f5-a2a4a3a1c47b", + "name": "Philosophical transactions of the Royal Society of London. Series + B, Biological sciences", "alternate_names": ["Philos trans R Soc Lond Ser + B Biological sci"], "issn": "0080-4622", "alternate_issns": ["2054-0280"], + "url": "http://www.jstor.org/action/showPublication?journalCode=philtranroyasoc2"}, + "url": "https://www.semanticscholar.org/paper/d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", "title": "The chemical basis of morphogenesis", "abstract": "It is suggested that a system of chemical substances, called morphogens, reacting together and diffusing through a tissue, is adequate to account for the main phenomena @@ -1252,15 +1384,16 @@ interactions: facts are explained, which can be found in text-books, but whose omission would make the paper difficult reading.", "venue": "Philosophical transactions of the Royal Society of London. Series B, Biological sciences", "year": 1952, - "referenceCount": 63, "citationCount": 10796, "influentialCitationCount": - 616, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Environmental Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1952-08-14", - "journal": {"volume": "52", "pages": "153-197", "name": "Bulletin of Mathematical - Biology"}, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, - {"paperId": "ffaf636f56a0eb8d17a0cbe9bfeaebbe3df3d93b", "externalIds": {"MAG": - "2002942454", "DOI": "10.2307/1969481", "CorpusId": 119497966}, "url": "https://www.semanticscholar.org/paper/ffaf636f56a0eb8d17a0cbe9bfeaebbe3df3d93b", + "referenceCount": 59, "citationCount": 10868, "influentialCitationCount": + 626, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1952-08-14", "journal": {"volume": "52", "pages": "153-197", + "name": "Bulletin of Mathematical Biology"}, "authors": [{"authorId": "2079681794", + "name": "A. Turing"}]}, {"paperId": "ffaf636f56a0eb8d17a0cbe9bfeaebbe3df3d93b", + "externalIds": {"MAG": "2002942454", "DOI": "10.2307/1969481", "CorpusId": + 119497966}, "corpusId": 119497966, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ffaf636f56a0eb8d17a0cbe9bfeaebbe3df3d93b", "title": "THE WORD PROBLEM IN SEMI-GROUPS WITH CANCELLATION", "abstract": "It will be shown that the word problem in semi-groups with cancellation is not solvable. The method depends on reducing the unsolvability of the problem @@ -1268,14 +1401,14 @@ interactions: machines introduced by Post (Post, [1]) and the author (Turing, [1]). In this we follow Post (Post, [2]) who reduced the problem of Thue to this same unsolvable problem.", "venue": "", "year": 1950, "referenceCount": 93, "citationCount": - 236, "influentialCitationCount": 24, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1950-09-01", "journal": {"volume": "52", "pages": - "491", "name": "Annals of Mathematics"}, "authors": [{"authorId": "2079681794", - "name": "A. Turing"}]}, {"paperId": "7425b97e36459b55f24badde92b717369130b41e", + 237, "influentialCitationCount": 24, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1950-09-01", "journal": {"volume": + "52", "pages": "491", "name": "Annals of Mathematics"}, "authors": [{"authorId": + "2079681794", "name": "A. Turing"}]}, {"paperId": "7425b97e36459b55f24badde92b717369130b41e", "externalIds": {"MAG": "2079400692", "DOI": "10.1093/QJMAM/1.1.287", "CorpusId": - 13876958}, "url": "https://www.semanticscholar.org/paper/7425b97e36459b55f24badde92b717369130b41e", + 13876958}, "corpusId": 13876958, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7425b97e36459b55f24badde92b717369130b41e", "title": "ROUNDING-OFF ERRORS IN MATRIX PROCESSES", "abstract": "A number of methods of solving sets of linear equations and inverting matrices are discussed. The theory of the rounding-off errors involved is investigated @@ -1285,15 +1418,15 @@ interactions: is a generalization of Choleski''s method which appears to have advantages over other known methods both as regards accuracy and convenience. This method may also be regarded as a rearrangement of the elimination process.", "venue": - "", "year": 1948, "referenceCount": 128, "citationCount": 497, "influentialCitationCount": - 29, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "1", "pages": "287-308", "name": "Quarterly Journal + "", "year": 1948, "referenceCount": 128, "citationCount": 499, "influentialCitationCount": + 30, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "1", "pages": "287-308", "name": "Quarterly Journal of Mechanics and Applied Mathematics"}, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "8964838cb60e31c13fda81e10fa75f476e10a126", "externalIds": {"MAG": "1997924127", "DOI": "10.1112/PLMS/S2-48.1.180", "CorpusId": - 14463084}, "url": "https://www.semanticscholar.org/paper/8964838cb60e31c13fda81e10fa75f476e10a126", + 14463084}, "corpusId": 14463084, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8964838cb60e31c13fda81e10fa75f476e10a126", "title": "A Method for the Calculation of the Zeta\u2010Function", "abstract": "In recent years, much research has been devoted to the refinement of information retrieval systems; however, few have explored the investigation of the Turing @@ -1302,14 +1435,15 @@ interactions: paper is not on whether symmetric encryption can be made gametheoretic, cooperative, and scalable, but rather on constructing a novel heuristic for the simulation of XML", "venue": "", "year": 1945, "referenceCount": 92, "citationCount": - 227, "influentialCitationCount": 29, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 227, "influentialCitationCount": 29, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "pages": "180-197", "name": "Proceedings of The London Mathematical Society"}, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "52053cd03f890fa35c5a04359b022bb5ff80cf36", "externalIds": {"MAG": "1852890579", - "CorpusId": 55096178}, "url": "https://www.semanticscholar.org/paper/52053cd03f890fa35c5a04359b022bb5ff80cf36", + "CorpusId": 55096178}, "corpusId": 55096178, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/52053cd03f890fa35c5a04359b022bb5ff80cf36", "title": "The extensions of a group", "abstract": "\u00a9 Foundation Compositio Mathematica, 1938, tous droits r\u00e9serv\u00e9s. L\u2019acc\u00e8s aux archives de la revue \u00ab Compositio Mathematica \u00bb (http: //http://www.compositio.nl/) @@ -1318,13 +1452,14 @@ interactions: syst\u00e9matique est constitutive d\u2019une infraction p\u00e9nale. Toute copie ou impression de ce fichier doit contenir la pr\u00e9sente mention de copyright.", "venue": "", "year": 1938, "referenceCount": 0, "citationCount": - 22, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "5", "pages": "357-367", "name": "Compositio Mathematica"}, "authors": - [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "e53637d308345ee4d442509b4d3f20a66f2fb4a4", - "externalIds": {"MAG": "2323827564", "DOI": "10.2307/1968716", "CorpusId": - 123837110}, "url": "https://www.semanticscholar.org/paper/e53637d308345ee4d442509b4d3f20a66f2fb4a4", + 22, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "5", "pages": "357-367", "name": "Compositio Mathematica"}, + "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": + "e53637d308345ee4d442509b4d3f20a66f2fb4a4", "externalIds": {"MAG": "2323827564", + "DOI": "10.2307/1968716", "CorpusId": 123837110}, "corpusId": 123837110, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e53637d308345ee4d442509b4d3f20a66f2fb4a4", "title": "Finite Approximations to Lie Groups", "abstract": "A certain sense in which a finite group may be said to approximate the structure of a metrical group will be discussed. On account of Jordan''s theorem on finite groups @@ -1336,13 +1471,14 @@ interactions: necessary to find representations of the approximating groups whose degree depends only on the group approximated.", "venue": "", "year": 1938, "referenceCount": 0, "citationCount": 212, "influentialCitationCount": 19, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "39", - "pages": "105", "name": "Annals of Mathematics"}, "authors": [{"authorId": - "2079681794", "name": "A. Turing"}]}, {"paperId": "ab7790485f26ce65f9d83dd700c43e49058bdd2b", - "externalIds": {"MAG": "2022731279", "DBLP": "journals/x/Turing37", "DOI": - "10.1112/PLMS/S2-42.1.230", "CorpusId": 73712}, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "39", "pages": "105", "name": "Annals of Mathematics"}, + "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": + "ab7790485f26ce65f9d83dd700c43e49058bdd2b", "externalIds": {"MAG": "2022731279", + "DBLP": "journals/x/Turing37", "DOI": "10.1112/PLMS/S2-42.1.230", "CorpusId": + 73712}, "corpusId": 73712, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", "title": "On computable numbers, with an application to the Entscheidungsproblem", "abstract": "1. Computing machines. 2. Definitions. Automatic machines. Computing machines. Circle and circle-free numbers. Computable sequences and numbers. @@ -1351,29 +1487,30 @@ interactions: 7. Detailed description of the universal machine. 8. Application of the diagonal process. Pagina 1 di 38 On computable numbers, with an application to the Entscheidungsproblem A. M. ...", "venue": "Proc. London Math. Soc.", "year": - 2021, "referenceCount": 81, "citationCount": 8327, "influentialCitationCount": - 535, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-02-02", "journal": {"volume": "s2-42", "pages": "230-265", - "name": "Proc. London Math. Soc."}, "authors": [{"authorId": "2079681794", - "name": "A. Turing"}]}, {"paperId": "0d04c68729652e855b293bee81fee9773ab56e1c", + 2021, "referenceCount": 81, "citationCount": 8348, "influentialCitationCount": + 536, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"volume": + "s2-42", "pages": "230-265", "name": "Proc. London Math. Soc."}, "authors": + [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "0d04c68729652e855b293bee81fee9773ab56e1c", "externalIds": {"MAG": "2020258288", "DOI": "10.1112/JLMS/S1-10.40.284", "CorpusId": - 121431603}, "url": "https://www.semanticscholar.org/paper/0d04c68729652e855b293bee81fee9773ab56e1c", + 121431603}, "corpusId": 121431603, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0d04c68729652e855b293bee81fee9773ab56e1c", "title": "Equivalence of Left and Right almost Periodicity", "abstract": null, "venue": "", "year": 1935, "referenceCount": 0, "citationCount": 205, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1935-10-01", - "journal": {"volume": "", "pages": "284-285", "name": "Journal of The London - Mathematical Society-second Series"}, "authors": [{"authorId": "2079681794", - "name": "A. Turing"}]}]}, {"authorId": "52278265", "externalIds": {}, "url": - "https://www.semanticscholar.org/author/52278265", "name": "John F. Turing", - "aliases": ["John M. F. Turing", "John Turing"], "affiliations": [], "homepage": - null, "paperCount": 22, "citationCount": 14, "hIndex": 1, "papers": [{"paperId": - "1d6e71e419fd4be05217c12442cbf4f83d8ca2a5", "externalIds": {"MAG": "2237318379", - "CorpusId": 159556955}, "url": "https://www.semanticscholar.org/paper/1d6e71e419fd4be05217c12442cbf4f83d8ca2a5", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1935-10-01", "journal": {"volume": "", "pages": "284-285", "name": "Journal + of The London Mathematical Society-second Series"}, "authors": [{"authorId": + "2079681794", "name": "A. Turing"}]}]}, {"authorId": "52278265", "externalIds": + {}, "url": "https://www.semanticscholar.org/author/52278265", "name": "John + F. Turing", "aliases": ["John M. F. Turing", "John Turing"], "affiliations": + [], "homepage": null, "paperCount": 22, "citationCount": 15, "hIndex": 1, + "papers": [{"paperId": "1d6e71e419fd4be05217c12442cbf4f83d8ca2a5", "externalIds": + {"MAG": "2237318379", "CorpusId": 159556955}, "corpusId": 159556955, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1d6e71e419fd4be05217c12442cbf4f83d8ca2a5", "title": "African Canadians in Union Blue: Volunteering for the Cause in the Civil War by Richard M. Reid, and: Blood and Daring: How Canada Fought the American Civil War and Forged a Nation by John Boyko (review)", "abstract": @@ -1421,96 +1558,105 @@ interactions: that the story does not simply end in 1865, as their war experiences influenced their lives long afterwards. \u2026", "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": + "History", "source": "external"}, {"category": "History", "source": "s2-fos-model"}, {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2015-07-01", "journal": {"volume": "28", "pages": "266 - 267", "name": "British Journal of Canadian Studies"}, "authors": [{"authorId": "52278265", "name": "John F. Turing"}]}, {"paperId": "d9d737901f95c4848855799b436e7550fffdda82", - "externalIds": {"MAG": "2295085039", "CorpusId": 163701599}, "url": "https://www.semanticscholar.org/paper/d9d737901f95c4848855799b436e7550fffdda82", + "externalIds": {"MAG": "2295085039", "CorpusId": 163701599}, "corpusId": 163701599, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d9d737901f95c4848855799b436e7550fffdda82", "title": "The construction of colonial identity in the Canadas, 1815-1867", "abstract": null, "venue": "", "year": 2014, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["History"], "s2FieldsOfStudy": [{"category": "History", "source": "external"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "52278265", "name": "John F. Turing"}]}, - {"paperId": "0c3336ec66f88be0dae2b5f44cc1befb0d50e4a9", "externalIds": {"MAG": - "1875007315", "DOI": "10.1017/CBO9781139105736.018", "CorpusId": 56549300}, - "url": "https://www.semanticscholar.org/paper/0c3336ec66f88be0dae2b5f44cc1befb0d50e4a9", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52278265", + "name": "John F. Turing"}]}, {"paperId": "0c3336ec66f88be0dae2b5f44cc1befb0d50e4a9", + "externalIds": {"MAG": "1875007315", "DOI": "10.1017/CBO9781139105736.018", + "CorpusId": 56549300}, "corpusId": 56549300, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0c3336ec66f88be0dae2b5f44cc1befb0d50e4a9", "title": "Alan M. Turing: Theory of Morphogenesis Considered", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", + "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, + {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", + "name": "Martin Davis"}]}, {"paperId": "1b6404f2cece2eeaab7978a79f3fd8bb19ed55cc", + "externalIds": {"MAG": "1615543042", "DOI": "10.1017/CBO9781139105736.003", + "CorpusId": 60667486}, "corpusId": 60667486, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1b6404f2cece2eeaab7978a79f3fd8bb19ed55cc", + "title": "Alan M. Turing: Foreword to the First Edition", "abstract": null, + "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin - Davis"}]}, {"paperId": "1b6404f2cece2eeaab7978a79f3fd8bb19ed55cc", "externalIds": - {"MAG": "1615543042", "DOI": "10.1017/CBO9781139105736.003", "CorpusId": 60667486}, - "url": "https://www.semanticscholar.org/paper/1b6404f2cece2eeaab7978a79f3fd8bb19ed55cc", - "title": "Alan M. Turing: Foreword to the First Edition", "abstract": null, - "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "1f770a96829b1723d6a2b4c09f4a1ec70b54bb0e", - "externalIds": {"MAG": "1431922259", "DOI": "10.1017/CBO9781139105736.008", - "CorpusId": 60677552}, "url": "https://www.semanticscholar.org/paper/1f770a96829b1723d6a2b4c09f4a1ec70b54bb0e", + Davis"}]}, {"paperId": "1f770a96829b1723d6a2b4c09f4a1ec70b54bb0e", "externalIds": + {"MAG": "1431922259", "DOI": "10.1017/CBO9781139105736.008", "CorpusId": 60677552}, + "corpusId": 60677552, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1f770a96829b1723d6a2b4c09f4a1ec70b54bb0e", "title": "Alan M. Turing: At the Graduate College, Princeton", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "35c43893293d4e6dfb9902758cadf6ef1eb258de", - "externalIds": {"MAG": "2496401338", "DOI": "10.1017/CBO9781139105736.012", - "CorpusId": 63483791}, "url": "https://www.semanticscholar.org/paper/35c43893293d4e6dfb9902758cadf6ef1eb258de", - "title": "Alan M. Turing: Work with the Manchester Automatic Digital Machine", - "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, - {"paperId": "4844d9c5abb9aee9fe294ca9db9dbb4d6b508f76", "externalIds": {"MAG": - "1624290889", "DOI": "10.1017/CBO9781139105736.016", "CorpusId": 60701079}, - "url": "https://www.semanticscholar.org/paper/4844d9c5abb9aee9fe294ca9db9dbb4d6b508f76", + {"paperId": "35c43893293d4e6dfb9902758cadf6ef1eb258de", "externalIds": {"MAG": + "2496401338", "DOI": "10.1017/CBO9781139105736.012", "CorpusId": 63483791}, + "corpusId": 63483791, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/35c43893293d4e6dfb9902758cadf6ef1eb258de", + "title": "Alan M. Turing: Work with the Manchester Automatic Digital Machine", + "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", + "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, + {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", + "name": "Martin Davis"}]}, {"paperId": "4844d9c5abb9aee9fe294ca9db9dbb4d6b508f76", + "externalIds": {"MAG": "1624290889", "DOI": "10.1017/CBO9781139105736.016", + "CorpusId": 60701079}, "corpusId": 60701079, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4844d9c5abb9aee9fe294ca9db9dbb4d6b508f76", "title": "Alan M. Turing: Last Days and Some Tributes", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "4b2cdd717d1adbd970b063a18e846f5404281628", - "externalIds": {"MAG": "2340580063", "DOI": "10.1017/CBO9781139105736.009", - "CorpusId": 64070169}, "url": "https://www.semanticscholar.org/paper/4b2cdd717d1adbd970b063a18e846f5404281628", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "4b2cdd717d1adbd970b063a18e846f5404281628", "externalIds": + {"MAG": "2340580063", "DOI": "10.1017/CBO9781139105736.009", "CorpusId": 64070169}, + "corpusId": 64070169, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4b2cdd717d1adbd970b063a18e846f5404281628", "title": "Alan M. Turing: Some Characteristics", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "553bb0e7b62931a17ccfc0b22888389746395de4", - "externalIds": {"MAG": "1009082265", "DOI": "10.1017/CBO9781139105736.015", - "CorpusId": 60795875}, "url": "https://www.semanticscholar.org/paper/553bb0e7b62931a17ccfc0b22888389746395de4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "553bb0e7b62931a17ccfc0b22888389746395de4", "externalIds": + {"MAG": "1009082265", "DOI": "10.1017/CBO9781139105736.015", "CorpusId": 60795875}, + "corpusId": 60795875, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/553bb0e7b62931a17ccfc0b22888389746395de4", "title": "Alan M. Turing: Relaxation", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "791c36554d3120019e9d6dc042dabeb15c01a523", - "externalIds": {"MAG": "2337511714", "DOI": "10.1017/CBO9781139105736.013", - "CorpusId": 62415368}, "url": "https://www.semanticscholar.org/paper/791c36554d3120019e9d6dc042dabeb15c01a523", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "791c36554d3120019e9d6dc042dabeb15c01a523", "externalIds": + {"MAG": "2337511714", "DOI": "10.1017/CBO9781139105736.013", "CorpusId": 62415368}, + "corpusId": 62415368, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/791c36554d3120019e9d6dc042dabeb15c01a523", "title": "Alan M. Turing: Broadcasts and Intelligent Machinery", "abstract": "On 15th May, 1951, on the Third Programme, Alan gave his first broadcast, which was one of a series with the general title \u201cAutomatic Calculating @@ -1534,120 +1680,130 @@ interactions: and in such a way as to be, on the whole, within the comprehension of those to whom it was quite new.", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2012-03-01", "journal": {"volume": - "", "pages": "100-101", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "History", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-03-01", + "journal": {"volume": "", "pages": "100-101", "name": ""}, "authors": [{"authorId": + "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John + F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "8c0d5512959c75d21ac6507656b22a12096eb33f", "externalIds": {"MAG": "1820075407", "DOI": "10.1017/CBO9781139105736.020", - "CorpusId": 61052833}, "url": "https://www.semanticscholar.org/paper/8c0d5512959c75d21ac6507656b22a12096eb33f", + "CorpusId": 61052833}, "corpusId": 61052833, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8c0d5512959c75d21ac6507656b22a12096eb33f", "title": "Alan M. Turing: Bibliography", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "8d8449a37c09348ac4503d295f101ff5351bb35c", - "externalIds": {"MAG": "2503602911", "DOI": "10.1017/CBO9781139105736.006", - "CorpusId": 56730252}, "url": "https://www.semanticscholar.org/paper/8d8449a37c09348ac4503d295f101ff5351bb35c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "8d8449a37c09348ac4503d295f101ff5351bb35c", "externalIds": + {"MAG": "2503602911", "DOI": "10.1017/CBO9781139105736.006", "CorpusId": 56730252}, + "corpusId": 56730252, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8d8449a37c09348ac4503d295f101ff5351bb35c", "title": "Alan M. Turing: At Sherborne School", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "90ccd177723f104d8efbbe9c5e5357f26b725bed", - "externalIds": {"MAG": "974617218", "DOI": "10.1017/CBO9781139105736.001", - "CorpusId": 61034732}, "url": "https://www.semanticscholar.org/paper/90ccd177723f104d8efbbe9c5e5357f26b725bed", - "title": "Alan M. Turing: Foreword to the Centenary Edition", "abstract": - null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin - Davis"}]}, {"paperId": "95630ca3ba27e4915aac4468a9fbfde1bc503bf7", "externalIds": - {"MAG": "2265401284", "DOI": "10.1017/CBO9781139105736.007", "CorpusId": 61846071}, - "url": "https://www.semanticscholar.org/paper/95630ca3ba27e4915aac4468a9fbfde1bc503bf7", + Davis"}]}, {"paperId": "90ccd177723f104d8efbbe9c5e5357f26b725bed", "externalIds": + {"MAG": "974617218", "DOI": "10.1017/CBO9781139105736.001", "CorpusId": 61034732}, + "corpusId": 61034732, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/90ccd177723f104d8efbbe9c5e5357f26b725bed", + "title": "Alan M. Turing: Foreword to the Centenary Edition", "abstract": + null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 1, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", + "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, + {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", + "name": "Martin Davis"}]}, {"paperId": "95630ca3ba27e4915aac4468a9fbfde1bc503bf7", + "externalIds": {"MAG": "2265401284", "DOI": "10.1017/CBO9781139105736.007", + "CorpusId": 61846071}, "corpusId": 61846071, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/95630ca3ba27e4915aac4468a9fbfde1bc503bf7", "title": "Alan M. Turing: At Cambridge", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "9a645983ba83a004c3d2c424552eee703647741a", - "externalIds": {"MAG": "1031929904", "DOI": "10.1017/CBO9781139105736.014", - "CorpusId": 60612425}, "url": "https://www.semanticscholar.org/paper/9a645983ba83a004c3d2c424552eee703647741a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "9a645983ba83a004c3d2c424552eee703647741a", "externalIds": + {"MAG": "1031929904", "DOI": "10.1017/CBO9781139105736.014", "CorpusId": 60612425}, + "corpusId": 60612425, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a645983ba83a004c3d2c424552eee703647741a", "title": "Alan M. Turing: Morphogenesis", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "9c0eece0eeedf6109feda630eeb122d27e869bc7", "externalIds": + {"MAG": "1613634338", "DOI": "10.1017/CBO9781139105736.005", "CorpusId": 60720651}, + "corpusId": 60720651, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9c0eece0eeedf6109feda630eeb122d27e869bc7", + "title": "Alan M. Turing: Childhood and Early Boyhood", "abstract": null, + "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "9c0eece0eeedf6109feda630eeb122d27e869bc7", - "externalIds": {"MAG": "1613634338", "DOI": "10.1017/CBO9781139105736.005", - "CorpusId": 60720651}, "url": "https://www.semanticscholar.org/paper/9c0eece0eeedf6109feda630eeb122d27e869bc7", - "title": "Alan M. Turing: Childhood and Early Boyhood", "abstract": null, - "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "bb7286cfcc0dcb548e4ce9dbd51c291b9c118798", + {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "bb7286cfcc0dcb548e4ce9dbd51c291b9c118798", "externalIds": {"MAG": "2301902672", "DOI": "10.1017/CBO9781139105736.004", - "CorpusId": 61284599}, "url": "https://www.semanticscholar.org/paper/bb7286cfcc0dcb548e4ce9dbd51c291b9c118798", + "CorpusId": 61284599}, "corpusId": 61284599, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bb7286cfcc0dcb548e4ce9dbd51c291b9c118798", "title": "Alan M. Turing: Family Background", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "c336759109cb4844b2d03b4097238d50d37ca7a3", "externalIds": + {"MAG": "775417329", "DOI": "10.1017/CBO9781139105736.019", "CorpusId": 60217086}, + "corpusId": 60217086, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c336759109cb4844b2d03b4097238d50d37ca7a3", + "title": "Alan M. Turing: My Brother Alan", "abstract": null, "venue": "", + "year": 2012, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "c336759109cb4844b2d03b4097238d50d37ca7a3", - "externalIds": {"MAG": "775417329", "DOI": "10.1017/CBO9781139105736.019", - "CorpusId": 60217086}, "url": "https://www.semanticscholar.org/paper/c336759109cb4844b2d03b4097238d50d37ca7a3", - "title": "Alan M. Turing: My Brother Alan", "abstract": null, "venue": "", - "year": 2012, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "ea54d4a94a6bb83ec217b6f74f0488dd4a9da124", + {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "ea54d4a94a6bb83ec217b6f74f0488dd4a9da124", "externalIds": {"MAG": "1023188214", "DOI": "10.1017/CBO9781139105736.017", - "CorpusId": 61062429}, "url": "https://www.semanticscholar.org/paper/ea54d4a94a6bb83ec217b6f74f0488dd4a9da124", + "CorpusId": 61062429}, "corpusId": 61062429, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ea54d4a94a6bb83ec217b6f74f0488dd4a9da124", "title": "Alan M. Turing: Computing Machinery", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "fb04a41a8ce3262566fd5f1dd697ac9a6dd2426f", - "externalIds": {"MAG": "1813315080", "DOI": "10.1017/CBO9781139105736.010", - "CorpusId": 60844796}, "url": "https://www.semanticscholar.org/paper/fb04a41a8ce3262566fd5f1dd697ac9a6dd2426f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, + {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", + "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, + {"paperId": "fb04a41a8ce3262566fd5f1dd697ac9a6dd2426f", "externalIds": {"MAG": + "1813315080", "DOI": "10.1017/CBO9781139105736.010", "CorpusId": 60844796}, + "corpusId": 60844796, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fb04a41a8ce3262566fd5f1dd697ac9a6dd2426f", "title": "Alan M. Turing: War Work in the Foreign Office", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", + "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, + {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", "externalIds": {"MAG": "1651552693", "DOI": "10.1017/CBO9781139105736", "CorpusId": - 56689702}, "url": "https://www.semanticscholar.org/paper/569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", + 56689702}, "corpusId": 56689702, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", "title": "Alan M. Turing: Frontmatter", "abstract": "Foreword to the Centenary Edition Martin Davis Preface to the First Edition Foreword to the First Edition Lyn Irvine Preface Part I. Mainly Biographical: 1. Family background 2. Childhood @@ -1659,72 +1815,31 @@ interactions: Machinery and Morphogenesis: 14. Computing machinery 15. Chemical theory of morphogenesis considered My brother Alan John Turing Bibliography Index.", "venue": "", "year": 1961, "referenceCount": 1, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1961-10-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John - F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "25fccae73141170f2107f2876f5f5d57e6948ec9", - "externalIds": {"MAG": "2498313634", "DOI": "10.1017/CBO9781139105736.011", - "CorpusId": 4067163}, "url": "https://www.semanticscholar.org/paper/25fccae73141170f2107f2876f5f5d57e6948ec9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1961-10-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, + {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", + "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, + {"paperId": "25fccae73141170f2107f2876f5f5d57e6948ec9", "externalIds": {"MAG": + "2498313634", "DOI": "10.1017/CBO9781139105736.011", "CorpusId": 4067163}, + "corpusId": 4067163, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/25fccae73141170f2107f2876f5f5d57e6948ec9", "title": "National Physical Laboratory, Teddington", "abstract": "ANNUAL INSPECTION", "venue": "Nature", "year": 1949, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "164", "pages": "88-89", "name": "Nature"}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}]}]}, - {"authorId": "1394093374", "externalIds": {}, "url": "https://www.semanticscholar.org/author/1394093374", - "name": "Turing Award", "aliases": ["Turing Award"], "affiliations": [], "homepage": - null, "paperCount": 1, "citationCount": 2, "hIndex": 1, "papers": [{"paperId": - "1636a1ccf44d009ef76736a8f4d39cdbb37b97ec", "externalIds": {"DOI": "10.1145/800193.805815", - "CorpusId": 22858651}, "url": "https://www.semanticscholar.org/paper/1636a1ccf44d009ef76736a8f4d39cdbb37b97ec", - "title": "Turing award", "abstract": "ACM''s most prestigious award, the A.M. - Turing award, is given annually to the person deemed most deserving of recognition - for his contributions to the field of computer science and engineering. The - recipient is selected by a committee named by past presidents of the ACM and - includes an honorarium of &doller;1,000.\n The 1972 presentation goes to Edsger - W. Dijkstra, Department of Mathematics, Technological University, Eindhozen, - Netherlands. Edsger Dijkstra was a principal contributor in the late 1950''s - to the development of ALGOL, a high level programming language which has become - a model of clarity and mathematical rigor. He is one of the principal exponents - of the science and art of programming languages in general, and has greatly - contributed to our understanding of their structure, representation, and implementation. - His fifteen years of publications extend from theoretical articles on graph - theory to basic manuals, expository texts, and philosophical contemplations - in the field of programming languages.", "venue": "", "year": 1972, "referenceCount": - 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1394093374", "name": "Turing Award"}]}]}, - {"authorId": "16714374", "externalIds": {}, "url": "https://www.semanticscholar.org/author/16714374", - "name": "P. Turing", "aliases": ["P Turing"], "affiliations": [], "homepage": - null, "paperCount": 2, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": - "3d9f478f0514b49ca28874ad7b78100c23857ffb", "externalIds": {"MAG": "2475271523", - "CorpusId": 26259002, "PubMed": "6041652"}, "url": "https://www.semanticscholar.org/paper/3d9f478f0514b49ca28874ad7b78100c23857ffb", - "title": "Doctors'' hobbies. 2. Fly fishing.", "abstract": null, "venue": - "The Practitioner", "year": 1967, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Geography", - "Medicine"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "Medicine", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1967-03-01", "journal": {"pages": "\n Suppl:60-4\n ", - "name": "The Practitioner"}, "authors": [{"authorId": "16714374", "name": - "P. Turing"}]}, {"paperId": "aadf5b40e8bcd4844c66fdbbbbffa27f80736e08", "externalIds": - {"MAG": "2410550917", "CorpusId": 9585653, "PubMed": "13400779"}, "url": "https://www.semanticscholar.org/paper/aadf5b40e8bcd4844c66fdbbbbffa27f80736e08", - "title": "The spas of Germany.", "abstract": null, "venue": "The Practitioner", - "year": 1957, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1957-02-01", "journal": {"volume": "178 1064", "pages": "\n 79-80A\n ", - "name": "The Practitioner"}, "authors": [{"authorId": "16714374", "name": - "P. Turing"}]}]}, {"authorId": "71653708", "externalIds": {}, "url": "https://www.semanticscholar.org/author/71653708", - "name": "A. Turing", "aliases": ["A. Alan Turing", "All\u00e9e Alan Turing"], - "affiliations": [], "homepage": null, "paperCount": 4, "citationCount": 5, - "hIndex": 1, "papers": [{"paperId": "733e665ccef57eb41519f6f6ba53f3a575e9928b", - "externalIds": {"CorpusId": 245510134}, "url": "https://www.semanticscholar.org/paper/733e665ccef57eb41519f6f6ba53f3a575e9928b", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.nature.com/articles/164088a0.pdf", "status": null}, "fieldsOfStudy": + ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "164", "pages": "88-89", + "name": "Nature"}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, + {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", + "name": "L. Irvine"}]}]}, {"authorId": "71653708", "externalIds": {}, "url": + "https://www.semanticscholar.org/author/71653708", "name": "A. Turing", "aliases": + ["A. Alan Turing", "All\u00e9e Alan Turing"], "affiliations": [], "homepage": + null, "paperCount": 4, "citationCount": 5, "hIndex": 1, "papers": [{"paperId": + "733e665ccef57eb41519f6f6ba53f3a575e9928b", "externalIds": {"CorpusId": 245510134}, + "corpusId": 245510134, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/733e665ccef57eb41519f6f6ba53f3a575e9928b", "title": "On a Possibility of Artificial Reason: J. McCarthy, I. Kant, and A. Turing", "abstract": "T\ufeffhe purpose of this study is to explore the possibility of reconciliation between Kant\u2019s transcendental idealism @@ -1744,26 +1859,28 @@ interactions: with transcendental idealism. T\ufeffhis compatibility we name the possibility of artificial reason in this paper.", "venue": "", "year": 2021, "referenceCount": 19, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo Kim"}, {"authorId": - "2151267031", "name": "Jinkyu Jeong"}, {"authorId": "2065379320", "name": - "J. McCarthy"}, {"authorId": "32297722", "name": "I. Kant"}, {"authorId": + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2109895204", "name": "Hyeongjoo + Kim"}, {"authorId": "2151267031", "name": "Jinkyu Jeong"}, {"authorId": "2065379320", + "name": "J. McCarthy"}, {"authorId": "32297722", "name": "I. Kant"}, {"authorId": "71653708", "name": "A. Turing"}]}, {"paperId": "dd0edf843384769f330fc975c4cad9d858e86eb5", - "externalIds": {"MAG": "2431142837", "CorpusId": 63208488}, "url": "https://www.semanticscholar.org/paper/dd0edf843384769f330fc975c4cad9d858e86eb5", + "externalIds": {"MAG": "2431142837", "CorpusId": 63208488}, "corpusId": 63208488, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dd0edf843384769f330fc975c4cad9d858e86eb5", "title": "CHAPTER 15: IS ARTIFICIAL INTELLIGENCE REAL?", "abstract": null, "venue": "", "year": 2008, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "2080126066", "name": "A. Kay"}, {"authorId": "1484479939", - "name": "B. Grace"}, {"authorId": "2073004227", "name": "Murray Hopper"}, - {"authorId": "1413361584", "name": "C. Turing"}, {"authorId": "1410784374", - "name": "D. T. Berners-Lee"}, {"authorId": "71653708", "name": "A. Turing"}, - {"authorId": "47356585", "name": "B. A. Kay"}, {"authorId": "1409459693", - "name": "C. T. Berners-Lee"}, {"authorId": "2053152866", "name": "D. Grace"}]}, - {"paperId": "7449d135aef3732994d38f4fb04dd1ebeded8b4d", "externalIds": {"MAG": - "2289795492", "CorpusId": 113250650}, "url": "https://www.semanticscholar.org/paper/7449d135aef3732994d38f4fb04dd1ebeded8b4d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "2080126066", "name": + "A. Kay"}, {"authorId": "1484479939", "name": "B. Grace"}, {"authorId": "2073004227", + "name": "Murray Hopper"}, {"authorId": "1413361584", "name": "C. Turing"}, + {"authorId": "1410784374", "name": "D. T. Berners-Lee"}, {"authorId": "71653708", + "name": "A. Turing"}, {"authorId": "47356585", "name": "B. A. Kay"}, {"authorId": + "1409459693", "name": "C. T. Berners-Lee"}, {"authorId": "2053152866", "name": + "D. Grace"}]}, {"paperId": "7449d135aef3732994d38f4fb04dd1ebeded8b4d", "externalIds": + {"MAG": "2289795492", "CorpusId": 113250650}, "corpusId": 113250650, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7449d135aef3732994d38f4fb04dd1ebeded8b4d", "title": "BAYESIAN UPDATING OF THE LONG-TERM CREEP DEFOR- MATIONS IN CONCRETE CONTAINMENT VESSELS", "abstract": "Delayed strains in concrete containment vessels is a major concern for Electricite de France. Codified models for @@ -1774,52 +1891,55 @@ interactions: model for creep t ogether with an inverse FORM algorithm. The latter is then modified in order to introduce the measurement data and to update the confidence interval.", "venue": "", "year": 2006, "referenceCount": 4, "citationCount": - 5, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + 5, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2975301", "name": "B. Sudret"}, {"authorId": "3409684", "name": "M. Berveiller"}, {"authorId": "2709922", "name": "F. Perrin"}, {"authorId": "2468808", "name": "M. Pendola"}, {"authorId": "71653708", "name": "A. Turing"}]}, {"paperId": "04cd4e21146162be226fc9d48ed6b905ef944f86", "externalIds": - {"MAG": "2187929672", "CorpusId": 155540642}, "url": "https://www.semanticscholar.org/paper/04cd4e21146162be226fc9d48ed6b905ef944f86", + {"MAG": "2187929672", "CorpusId": 155540642}, "corpusId": 155540642, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/04cd4e21146162be226fc9d48ed6b905ef944f86", "title": "The Scientific Conceptualization of Information: A Survey", "abstract": null, "venue": "", "year": 1985, "referenceCount": 24, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], - "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2067567586", - "name": "W. McCulloch"}, {"authorId": "122268832", "name": "W. Piths"}, {"authorId": - "2064167014", "name": "C. Shannon"}, {"authorId": "71653708", "name": "A. - Turing"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "145707626", - "name": "N. Wiener"}]}]}, {"authorId": "2100455792", "externalIds": {}, "url": - "https://www.semanticscholar.org/author/2100455792", "name": "Turing Manuscritas", - "aliases": ["Turing Manuscritas"], "affiliations": [], "homepage": null, "paperCount": - 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "e8fa8f02e937154570809597eed685d3d40cec43", - "externalIds": {"CorpusId": 204876691}, "url": "https://www.semanticscholar.org/paper/e8fa8f02e937154570809597eed685d3d40cec43", - "title": "TURING MANUSCRITAS PARA LA EVALUACI\u00d3N ASISTIDA ( Automatic - detection of hand-written Turing machines for assisted evaluation )", "abstract": - "This project reviews the basic concepts of neural networks, as well as studies - the more advanced and emerging field of deep learning. This knowledge is then - applied to design and train a machine learning model capable of performing - sequential optical character recognition on handwritten Turing machine definitions - with the purpose of automating their evaluation in exams. A fully independent - and complete implementation is provided in a freely available software repository. - The software allows to modify or amplify the existing training set as to keep - improving the current model. Details on how the system works are also provided - in the current document.", "venue": "", "year": 2019, "referenceCount": 25, - "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "2082029198", "name": "DE - M\u00e1quinas"}, {"authorId": "2100455792", "name": "Turing Manuscritas"}, - {"authorId": "2087359354", "name": "LA Para"}, {"authorId": "2082632420", - "name": "Evaluaci\u00f3n Asistida"}]}]}, {"authorId": "2099172812", "externalIds": + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "2067567586", "name": "W. McCulloch"}, + {"authorId": "122268832", "name": "W. Piths"}, {"authorId": "2064167014", + "name": "C. Shannon"}, {"authorId": "71653708", "name": "A. Turing"}, {"authorId": + "41224665", "name": "J. Neumann"}, {"authorId": "145707626", "name": "N. Wiener"}]}]}, + {"authorId": "16714374", "externalIds": {}, "url": "https://www.semanticscholar.org/author/16714374", + "name": "P. Turing", "aliases": ["P Turing"], "affiliations": [], "homepage": + null, "paperCount": 2, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": + "3d9f478f0514b49ca28874ad7b78100c23857ffb", "externalIds": {"MAG": "2475271523", + "CorpusId": 26259002, "PubMed": "6041652"}, "corpusId": 26259002, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3d9f478f0514b49ca28874ad7b78100c23857ffb", + "title": "Doctors'' hobbies. 2. Fly fishing.", "abstract": null, "venue": + "The Practitioner", "year": 1967, "referenceCount": 0, "citationCount": 0, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Geography", "Medicine"], "s2FieldsOfStudy": [{"category": + "Geography", "source": "external"}, {"category": "Medicine", "source": "external"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1967-03-01", "journal": + {"pages": "\n Suppl:60-4\n ", "name": "The Practitioner"}, + "authors": [{"authorId": "16714374", "name": "P. Turing"}]}, {"paperId": "aadf5b40e8bcd4844c66fdbbbbffa27f80736e08", + "externalIds": {"MAG": "2410550917", "CorpusId": 9585653, "PubMed": "13400779"}, + "corpusId": 9585653, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aadf5b40e8bcd4844c66fdbbbbffa27f80736e08", + "title": "The spas of Germany.", "abstract": null, "venue": "The Practitioner", + "year": 1957, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1957-02-01", "journal": {"volume": "178 1064", "pages": + "\n 79-80A\n ", "name": "The Practitioner"}, "authors": [{"authorId": + "16714374", "name": "P. Turing"}]}]}, {"authorId": "2099172812", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2099172812", "name": "Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 68, "hIndex": 1, "papers": [{"paperId": "9785431449073f0f91ad41a01c5e68fb4c68cd77", - "externalIds": {"DOI": "10.4324/9781315842073", "CorpusId": 17459340}, "url": - "https://www.semanticscholar.org/paper/9785431449073f0f91ad41a01c5e68fb4c68cd77", + "externalIds": {"DOI": "10.4324/9781315842073", "CorpusId": 17459340}, "corpusId": + 17459340, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9785431449073f0f91ad41a01c5e68fb4c68cd77", "title": "Generative Grammar", "abstract": "AuQ: Please provide information for Greenblatt et al. (See text.) This text has been added to the text as a placeholder for that reference. text has been added to the text as a placeholder @@ -1853,90 +1973,118 @@ interactions: full grasp of what is in their language. A fundamental early insight was that limitations on the format of rules or constraints set limits on definable languages , \u2026", "venue": "", "year": null, "referenceCount": 13, "citationCount": - 68, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Linguistics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2083644798", "name": "F. Hsu"}, {"authorId": "2103020934", - "name": "T. Anantharman"}, {"authorId": "2114676022", "name": "M. Campbell"}, - {"authorId": "153213178", "name": "J. Schaeffer"}, {"authorId": "3038110", - "name": "J. Culberson"}, {"authorId": "2501516", "name": "N. Treloar"}, {"authorId": - "144170840", "name": "B. Knight"}, {"authorId": "145458306", "name": "P. Lu"}, - {"authorId": "2099172812", "name": "Turing"}, {"authorId": "1910392", "name": - "C. Strachey"}, {"authorId": "145505730", "name": "M. Bates"}, {"authorId": - "122351312", "name": "B. Bowden"}]}]}, {"authorId": "144246505", "externalIds": + 68, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Linguistics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2083644798", "name": "F. Hsu"}, + {"authorId": "2103020934", "name": "T. Anantharman"}, {"authorId": "2114676022", + "name": "M. Campbell"}, {"authorId": "153213178", "name": "J. Schaeffer"}, + {"authorId": "3038110", "name": "J. Culberson"}, {"authorId": "2501516", "name": + "N. Treloar"}, {"authorId": "144170840", "name": "B. Knight"}, {"authorId": + "145458306", "name": "P. Lu"}, {"authorId": "2099172812", "name": "Turing"}, + {"authorId": "1910392", "name": "C. Strachey"}, {"authorId": "145505730", + "name": "M. Bates"}, {"authorId": "122351312", "name": "B. Bowden"}]}]}, {"authorId": + "2100455792", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2100455792", + "name": "Turing Manuscritas", "aliases": ["Turing Manuscritas"], "affiliations": + [], "homepage": null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": + [{"paperId": "e8fa8f02e937154570809597eed685d3d40cec43", "externalIds": {"CorpusId": + 204876691}, "corpusId": 204876691, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e8fa8f02e937154570809597eed685d3d40cec43", + "title": "TURING MANUSCRITAS PARA LA EVALUACI\u00d3N ASISTIDA ( Automatic + detection of hand-written Turing machines for assisted evaluation )", "abstract": + "This project reviews the basic concepts of neural networks, as well as studies + the more advanced and emerging field of deep learning. This knowledge is then + applied to design and train a machine learning model capable of performing + sequential optical character recognition on handwritten Turing machine definitions + with the purpose of automating their evaluation in exams. A fully independent + and complete implementation is provided in a freely available software repository. + The software allows to modify or amplify the existing training set as to keep + improving the current model. Details on how the system works are also provided + in the current document.", "venue": "", "year": 2019, "referenceCount": 25, + "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "2082029198", + "name": "DE M\u00e1quinas"}, {"authorId": "2100455792", "name": "Turing Manuscritas"}, + {"authorId": "2087359354", "name": "LA Para"}, {"authorId": "2082632420", + "name": "Evaluaci\u00f3n Asistida"}]}]}, {"authorId": "144246505", "externalIds": {}, "url": "https://www.semanticscholar.org/author/144246505", "name": "T. James", "aliases": ["Turing James"], "affiliations": [], "homepage": null, "paperCount": 2, "citationCount": 5, "hIndex": 1, "papers": [{"paperId": "08a39b713f4fbec10a1df737d25e652415f8260c", "externalIds": {"MAG": "2609075337", "DOI": "10.4043/27847-MS", "CorpusId": - 136365536}, "url": "https://www.semanticscholar.org/paper/08a39b713f4fbec10a1df737d25e652415f8260c", + 136365536}, "corpusId": 136365536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/08a39b713f4fbec10a1df737d25e652415f8260c", "title": "Intervention and Abandonment - Riserless Productive Zone Abandonment Using Epoxy Resin", "abstract": null, "venue": "", "year": 2017, "referenceCount": 0, "citationCount": 5, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - "2017-05-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "104579171", "name": "J. E. Dahlem"}, {"authorId": "47160908", "name": "T. - Baughman"}, {"authorId": "144246505", "name": "T. James"}, {"authorId": "13318340", - "name": "R. Rives"}]}, {"paperId": "ee3c630385cefe4b40567c2a21c515cb6265bc2d", - "externalIds": {"MAG": "2747657496", "CorpusId": 117592221}, "url": "https://www.semanticscholar.org/paper/ee3c630385cefe4b40567c2a21c515cb6265bc2d", + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}], "publicationTypes": + null, "publicationDate": "2017-05-01", "journal": {"volume": "", "name": ""}, + "authors": [{"authorId": "104579171", "name": "J. E. Dahlem"}, {"authorId": + "47160908", "name": "T. Baughman"}, {"authorId": "144246505", "name": "T. + James"}, {"authorId": "13318340", "name": "R. Rives"}]}, {"paperId": "ee3c630385cefe4b40567c2a21c515cb6265bc2d", + "externalIds": {"MAG": "2747657496", "CorpusId": 117592221}, "corpusId": 117592221, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ee3c630385cefe4b40567c2a21c515cb6265bc2d", "title": "Pico-Solar Lantern Repair & Recycling In East Africa", "abstract": null, "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "2015", "pages": "4", - "name": ""}, "authors": [{"authorId": "144246505", "name": "T. James"}]}]}, - {"authorId": "2084755425", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2084755425", - "name": "G. M. Turing", "aliases": ["G. M. Turing"], "affiliations": [], "homepage": - null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": - "308a7179d92571e1412e11a22bb3ad3d07790f68", "externalIds": {"CorpusId": 53864081}, - "url": "https://www.semanticscholar.org/paper/308a7179d92571e1412e11a22bb3ad3d07790f68", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "2015", "pages": "4", "name": ""}, "authors": [{"authorId": + "144246505", "name": "T. James"}]}]}, {"authorId": "2084755425", "externalIds": + {}, "url": "https://www.semanticscholar.org/author/2084755425", "name": "G. + M. Turing", "aliases": ["G. M. Turing"], "affiliations": [], "homepage": null, + "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "308a7179d92571e1412e11a22bb3ad3d07790f68", + "externalIds": {"CorpusId": 53864081}, "corpusId": 53864081, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/308a7179d92571e1412e11a22bb3ad3d07790f68", "title": "THE \" EFFECTIVE \" PULMONARY COLLATERALBLOOD FLOW IN MANI", "abstract": null, "venue": "", "year": null, "referenceCount": 36, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "30067655", - "name": "By"}, {"authorId": "1409514387", "name": "A."}, {"authorId": "2171067424", - "name": "P."}, {"authorId": "83142946", "name": "Fishman"}, {"authorId": "2084755425", - "name": "G. M. Turing"}, {"authorId": "2103228514", "name": "M. B. Nbre"}, - {"authorId": "91615983", "name": "Himmelstein"}]}]}, {"authorId": "2072415927", - "externalIds": {}, "url": "https://www.semanticscholar.org/author/2072415927", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "30067655", "name": "By"}, {"authorId": "1409514387", + "name": "A."}, {"authorId": "2171067424", "name": "P."}, {"authorId": "83142946", + "name": "Fishman"}, {"authorId": "2084755425", "name": "G. M. Turing"}, {"authorId": + "2103228514", "name": "M. B. Nbre"}, {"authorId": "91615983", "name": "Himmelstein"}]}]}, + {"authorId": "2072415927", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2072415927", "name": "Colin Campbell", "aliases": ["Colin Turing Campbell"], "affiliations": [], "homepage": null, "paperCount": 3, "citationCount": 7, "hIndex": 2, "papers": [{"paperId": "3db1ce73dee7f6f0cdbbcea337dc5100a1fc2d4e", "externalIds": {"MAG": "2954942636", "DOI": "10.1057/9781137319135.0011", "CorpusId": 198649811}, - "url": "https://www.semanticscholar.org/paper/3db1ce73dee7f6f0cdbbcea337dc5100a1fc2d4e", + "corpusId": 198649811, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3db1ce73dee7f6f0cdbbcea337dc5100a1fc2d4e", "title": "British South Africa", "abstract": null, "venue": "", "year": 2009, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2009-09-29", "journal": {"volume": - "", "name": ""}, "authors": [{"authorId": "2072415927", "name": "Colin Campbell"}]}, - {"paperId": "b75de9855d48435221feead9261f1e29494b944b", "externalIds": {"MAG": - "2031441273", "DOI": "10.1016/0031-0182(87)90081-2", "CorpusId": 129569270}, - "url": "https://www.semanticscholar.org/paper/b75de9855d48435221feead9261f1e29494b944b", + false, "openAccessPdf": null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": + [{"category": "Geography", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-09-29", + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2072415927", + "name": "Colin Campbell"}]}, {"paperId": "b75de9855d48435221feead9261f1e29494b944b", + "externalIds": {"MAG": "2031441273", "DOI": "10.1016/0031-0182(87)90081-2", + "CorpusId": 129569270}, "corpusId": 129569270, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b75de9855d48435221feead9261f1e29494b944b", "title": "Silurian evaporitic strata from New South Wales, Australia", "abstract": null, "venue": "", "year": 1987, "referenceCount": 16, "citationCount": 5, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Geology"], - "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, {"category": - "Geography", "source": "s2-fos-model"}, {"category": "Environmental Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "59", "pages": "215-225", "name": "Palaeogeography, - Palaeoclimatology, Palaeoecology"}, "authors": [{"authorId": "27416939", "name": - "B. Jones"}, {"authorId": "14379138", "name": "B. E. Chenhall"}, {"authorId": - "112935406", "name": "A. Wright"}, {"authorId": "46822478", "name": "J. Pemberton"}, - {"authorId": "2072415927", "name": "Colin Campbell"}]}, {"paperId": "c4425069e1f1b276c5a87b22adbaad726babd3ae", - "externalIds": {"MAG": "2233970124", "CorpusId": 162715734}, "url": "https://www.semanticscholar.org/paper/c4425069e1f1b276c5a87b22adbaad726babd3ae", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", + "source": "external"}, {"category": "Geography", "source": "s2-fos-model"}, + {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "59", "pages": "215-225", + "name": "Palaeogeography, Palaeoclimatology, Palaeoecology"}, "authors": [{"authorId": + "27416939", "name": "B. Jones"}, {"authorId": "14379138", "name": "B. E. Chenhall"}, + {"authorId": "112935406", "name": "A. Wright"}, {"authorId": "46822478", "name": + "J. Pemberton"}, {"authorId": "2072415927", "name": "Colin Campbell"}]}, {"paperId": + "c4425069e1f1b276c5a87b22adbaad726babd3ae", "externalIds": {"MAG": "2233970124", + "CorpusId": 162715734}, "corpusId": 162715734, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c4425069e1f1b276c5a87b22adbaad726babd3ae", "title": "Annexation and South Africa", "abstract": null, "venue": "", "year": null, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2072415927", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History"], + "s2FieldsOfStudy": [{"category": "History", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2072415927", "name": "Colin Campbell"}]}]}, {"authorId": "102693616", "externalIds": {}, "url": "https://www.semanticscholar.org/author/102693616", "name": "A. Building", "aliases": ["A Building", "Alan Turing Building"], "affiliations": [], "homepage": null, "paperCount": 5, "citationCount": 661, "hIndex": 4, "papers": [{"paperId": "af57f6c152ef998f0ad6bfbb02a79c9059fab3b8", "externalIds": {"CorpusId": 251837656}, - "url": "https://www.semanticscholar.org/paper/af57f6c152ef998f0ad6bfbb02a79c9059fab3b8", + "corpusId": 251837656, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/af57f6c152ef998f0ad6bfbb02a79c9059fab3b8", "title": "NUMERICAL EXPERIMENTS OF THE STRUCTURES OF ATMOSPHERIC ELECTRICAL ELEMENTS DURING A SNOWFALL NEAR A BUILDING", "abstract": ". Atmospheric electrical elements during a snowfall near a building were examined by means of two dimensional @@ -1954,13 +2102,14 @@ interactions: calculated results qualitatively agree with the observation results described in a previous paper (Asuma et al., 1988).", "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2182854497", "name": "A. Snowfall"}, {"authorId": - "102693616", "name": "A. Building"}, {"authorId": "70219168", "name": "Y. - Asuma"}]}, {"paperId": "8923064b851803b1e135d048a1d3896b93dd1480", "externalIds": - {"ArXiv": "1801.03660", "MAG": "2950664365", "DOI": "10.1093/mnras/sty069", - "CorpusId": 86867713}, "url": "https://www.semanticscholar.org/paper/8923064b851803b1e135d048a1d3896b93dd1480", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2182854497", "name": "A. + Snowfall"}, {"authorId": "102693616", "name": "A. Building"}, {"authorId": + "70219168", "name": "Y. Asuma"}]}, {"paperId": "8923064b851803b1e135d048a1d3896b93dd1480", + "externalIds": {"ArXiv": "1801.03660", "MAG": "2950664365", "DOI": "10.1093/mnras/sty069", + "CorpusId": 86867713}, "corpusId": 86867713, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8923064b851803b1e135d048a1d3896b93dd1480", "title": "The nuclear activity and central structure of the elliptical galaxy NGC 5322", "abstract": "We have analysed a new high-resolution e-MERLIN 1.5 GHz radio continuum map together with HST and SDSS imaging of NGC 5322, an @@ -1984,14 +2133,15 @@ interactions: The low-luminosity AGN/jet-driven feedback may have quenched the late-time nuclear star formation promptly, which could otherwise have replenished the depleted core.", "venue": "", "year": 2018, "referenceCount": 148, "citationCount": - 7, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2018-01-11", "journal": {"volume": "475", "pages": "4670-4682", "name": "Monthly - Notices of the Royal Astronomical Society"}, "authors": [{"authorId": "102714147", - "name": "B. T. Dullo"}, {"authorId": "2749557", "name": "J. Knapen"}, {"authorId": - "144151631", "name": "David R. Williams"}, {"authorId": "4376682", "name": - "R. Beswick"}, {"authorId": "70128846", "name": "G. Bendo"}, {"authorId": + 7, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "http://clok.uclan.ac.uk/21454/1/sty069.pdf", "status": null}, "fieldsOfStudy": + ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2018-01-11", "journal": {"volume": "475", "pages": "4670-4682", + "name": "Monthly Notices of the Royal Astronomical Society"}, "authors": [{"authorId": + "102714147", "name": "B. T. Dullo"}, {"authorId": "2749557", "name": "J. Knapen"}, + {"authorId": "144151631", "name": "David R. Williams"}, {"authorId": "4376682", + "name": "R. Beswick"}, {"authorId": "70128846", "name": "G. Bendo"}, {"authorId": "93164762", "name": "R. D. Baldi"}, {"authorId": "1759032", "name": "M. Argo"}, {"authorId": "68983783", "name": "I. McHardy"}, {"authorId": "3585668", "name": "T. Muxlow"}, {"authorId": "1477299674", "name": "J. W. D. D. A. Y. C. D. @@ -2009,7 +2159,8 @@ interactions: {"authorId": "89435218", "name": "C. F. E. Research"}, {"authorId": "89269264", "name": "U. Hertfordshire"}]}, {"paperId": "39786d685845e955b64d7319b6527a8bae1b5328", "externalIds": {"ArXiv": "0905.3469", "MAG": "2169449038", "DOI": "10.1051/0004-6361/200912250", - "CorpusId": 18509270}, "url": "https://www.semanticscholar.org/paper/39786d685845e955b64d7319b6527a8bae1b5328", + "CorpusId": 18509270}, "corpusId": 18509270, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/39786d685845e955b64d7319b6527a8bae1b5328", "title": "The diversity of methanol maser morphologies from VLBI observations", "abstract": "Context. The 6.7 GHz methanol maser marks an early stage of high-mass star formation, but the origin of this maser is currently a matter of debate. @@ -2038,8 +2189,9 @@ interactions: implies that 6.7 GHz methanol maser emission occurs before H II region observable at cm wavelengths is formed.", "venue": "", "year": 2009, "referenceCount": 39, "citationCount": 80, "influentialCitationCount": 16, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.aanda.org/articles/aa/pdf/2009/28/aa12250-09.pdf", + "status": null}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2009-05-21", "journal": {"volume": "502", "pages": "155-173", "name": "Astronomy and Astrophysics"}, "authors": [{"authorId": "51054695", "name": "A. Bartkiewicz"}, {"authorId": @@ -2057,7 +2209,8 @@ interactions: Observatory"}, {"authorId": "30069011", "name": "Socorro"}, {"authorId": "122076749", "name": "Usa"}]}, {"paperId": "a67d7a4975711e291ac9a244522029eb240fe554", "externalIds": {"MAG": "2027007542", "ArXiv": "0804.0849", "DOI": "10.1111/j.1365-2966.2008.13300.x", - "CorpusId": 15947513}, "url": "https://www.semanticscholar.org/paper/a67d7a4975711e291ac9a244522029eb240fe554", + "CorpusId": 15947513}, "corpusId": 15947513, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a67d7a4975711e291ac9a244522029eb240fe554", "title": "Galactic H i on the 50-au scale in the direction of three extragalactic sources observed with MERLIN", "abstract": "We present MERLIN observations of Galactic 21-cm H\u00a0i absorption at an angular resolution of \u223c0.1\u20130.2 @@ -2078,24 +2231,25 @@ interactions: fluctuations in the H\u00a0i opacity at the level of about 1 are detected at the 2.5\u20133\u03c3 level in the direction of 3C 123.", "venue": "", "year": 2008, "referenceCount": 28, "citationCount": 7, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-04-05", - "journal": {"volume": "388", "pages": "165-175", "name": "Monthly Notices - of the Royal Astronomical Society"}, "authors": [{"authorId": "88362361", - "name": "W. Goss"}, {"authorId": "98575560", "name": "A. Richards"}, {"authorId": - "3585668", "name": "T. Muxlow"}, {"authorId": "120047834", "name": "P. Observatory"}, - {"authorId": "30069011", "name": "Socorro"}, {"authorId": "102904694", "name": - "Nm"}, {"authorId": "2072133462", "name": "U.S.A."}, {"authorId": "102268868", - "name": "J. B. C. F. Astrophysics"}, {"authorId": "102693616", "name": "A. - Building"}, {"authorId": "102997085", "name": "U. Manchester"}, {"authorId": - "152162130", "name": "UK."}, {"authorId": "103200178", "name": "Merlinvlbi - National Facility"}, {"authorId": "92111059", "name": "Jodrell Bank Observatory"}, - {"authorId": "103245663", "name": "The University of Manchester"}, {"authorId": - "102428333", "name": "Macclesfield"}, {"authorId": "1405535577", "name": "Cheshire"}]}, - {"paperId": "950d09d3de169a96c45e4002c8ab4f23864e24ad", "externalIds": {"MAG": - "2953130592", "ArXiv": "1203.2562", "DOI": "10.1111/j.1365-2966.2012.20912.x", - "CorpusId": 8866933}, "url": "https://www.semanticscholar.org/paper/950d09d3de169a96c45e4002c8ab4f23864e24ad", + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/mnras/article-pdf/388/1/165/18720673/mnras0388-0165.pdf", + "status": null}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-04-05", "journal": {"volume": + "388", "pages": "165-175", "name": "Monthly Notices of the Royal Astronomical + Society"}, "authors": [{"authorId": "88362361", "name": "W. Goss"}, {"authorId": + "98575560", "name": "A. Richards"}, {"authorId": "3585668", "name": "T. Muxlow"}, + {"authorId": "120047834", "name": "P. Observatory"}, {"authorId": "30069011", + "name": "Socorro"}, {"authorId": "102904694", "name": "Nm"}, {"authorId": + "2072133462", "name": "U.S.A."}, {"authorId": "102268868", "name": "J. B. + C. F. Astrophysics"}, {"authorId": "102693616", "name": "A. Building"}, {"authorId": + "102997085", "name": "U. Manchester"}, {"authorId": "152162130", "name": "UK."}, + {"authorId": "103200178", "name": "Merlinvlbi National Facility"}, {"authorId": + "92111059", "name": "Jodrell Bank Observatory"}, {"authorId": "103245663", + "name": "The University of Manchester"}, {"authorId": "102428333", "name": + "Macclesfield"}, {"authorId": "1405535577", "name": "Cheshire"}]}, {"paperId": + "950d09d3de169a96c45e4002c8ab4f23864e24ad", "externalIds": {"MAG": "2953130592", + "ArXiv": "1203.2562", "DOI": "10.1111/j.1365-2966.2012.20912.x", "CorpusId": + 8866933}, "corpusId": 8866933, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/950d09d3de169a96c45e4002c8ab4f23864e24ad", "title": "The Herschel Multi-tiered Extragalactic Survey: HerMES", "abstract": "The Herschel Multi-tiered Extragalactic Survey (HerMES) is a legacy programme designed to map a set of nested fields totalling \u223c380\u2009deg^2. Fields @@ -2121,19 +2275,20 @@ interactions: the survey observations and data products, outlines the primary scientific goals of the HerMES team, and reviews some of the early results.", "venue": "", "year": 2007, "referenceCount": 88, "citationCount": 567, "influentialCitationCount": - 36, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Physics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2007-08-01", - "journal": {"volume": "424", "pages": "1614-1635", "name": "Monthly Notices - of the Royal Astronomical Society"}, "authors": [{"authorId": "2045523396", - "name": "H. Oliver"}, {"authorId": "2177883580", "name": "J. Bock"}, {"authorId": - "3437487", "name": "B. Altieri"}, {"authorId": "41220810", "name": "A. Amblard"}, - {"authorId": "145362532", "name": "V. Arumugam"}, {"authorId": "6088304", - "name": "H. Aussel"}, {"authorId": "103036073", "name": "T. Babbedge"}, {"authorId": - "145574546", "name": "A. Beelen"}, {"authorId": "2077026312", "name": "M. - B''ethermin"}, {"authorId": "4306607", "name": "A. Blain"}, {"authorId": "8216665", - "name": "A. Boselli"}, {"authorId": "2570334", "name": "C. Bridge"}, {"authorId": + 36, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/mnras/article-pdf/424/3/1614/2976303/424-3-1614.pdf", + "status": null}, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2007-08-01", "journal": + {"volume": "424", "pages": "1614-1635", "name": "Monthly Notices of the Royal + Astronomical Society"}, "authors": [{"authorId": "2045523396", "name": "H. + Oliver"}, {"authorId": "2177883580", "name": "J. Bock"}, {"authorId": "3437487", + "name": "B. Altieri"}, {"authorId": "41220810", "name": "A. Amblard"}, {"authorId": + "145362532", "name": "V. Arumugam"}, {"authorId": "6088304", "name": "H. Aussel"}, + {"authorId": "103036073", "name": "T. Babbedge"}, {"authorId": "145574546", + "name": "A. Beelen"}, {"authorId": "2077026312", "name": "M. B''ethermin"}, + {"authorId": "4306607", "name": "A. Blain"}, {"authorId": "8216665", "name": + "A. Boselli"}, {"authorId": "2570334", "name": "C. Bridge"}, {"authorId": "144312999", "name": "D. Brisbin"}, {"authorId": "8150790", "name": "V. Buat"}, {"authorId": "6734319", "name": "D. Burgarella"}, {"authorId": "2095562354", "name": "N. Castro-Rodr''iguez"}, {"authorId": "150896364", "name": "A. Cava"}, @@ -2282,7 +2437,7 @@ interactions: "name": "Turing Occam", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 18, "hIndex": 1, "papers": [{"paperId": "781e1f781987202c961855f207dab8e640a29434", "externalIds": {"CorpusId": 15218617}, - "url": "https://www.semanticscholar.org/paper/781e1f781987202c961855f207dab8e640a29434", + "corpusId": 15218617, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/781e1f781987202c961855f207dab8e640a29434", "title": "How Much Can You Get for How Little? (a Conceptual Introduction to Cellular Automata)", "abstract": "This is a introduction to cellular automata stressing their role as standard-bearers of an aggressive form of reductionism|which @@ -2304,102 +2459,149 @@ interactions: an explanation based on more complex mechanisms, until you are satissed that simpler mechanisms will not do!\") William of Ockham, early 1300s]", "venue": "", "year": 1994, "referenceCount": 25, "citationCount": 18, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2102828673", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2102828673", "name": "Turing Occam"}, {"authorId": "46776473", "name": "V. Neumann"}, {"authorId": "2086065222", "name": "Jaynes"}, {"authorId": "70673192", "name": "Tommaso - Toooli"}]}]}, {"authorId": "2135179314", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2135179314", - "name": "James Turing", "aliases": null, "affiliations": [], "homepage": null, - "paperCount": 1, "citationCount": 1, "hIndex": 1, "papers": [{"paperId": "59188a1a67dfce9e17dfaa3ec6b0fd7ce704a90e", - "externalIds": {"MAG": "3198593669", "DOI": "10.7488/ERA/1258", "CorpusId": - 239694418}, "url": "https://www.semanticscholar.org/paper/59188a1a67dfce9e17dfaa3ec6b0fd7ce704a90e", - "title": "Understanding the circular economy in Kenya", "abstract": null, - "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-07-31", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2135179314", - "name": "James Turing"}]}]}, {"authorId": "52266406", "externalIds": {}, "url": - "https://www.semanticscholar.org/author/52266406", "name": "Sara Turing", - "aliases": null, "affiliations": [], "homepage": null, "paperCount": 20, "citationCount": - 13, "hIndex": 1, "papers": [{"paperId": "0c3336ec66f88be0dae2b5f44cc1befb0d50e4a9", - "externalIds": {"MAG": "1875007315", "DOI": "10.1017/CBO9781139105736.018", - "CorpusId": 56549300}, "url": "https://www.semanticscholar.org/paper/0c3336ec66f88be0dae2b5f44cc1befb0d50e4a9", + Toooli"}]}]}, {"authorId": "65831908", "externalIds": {}, "url": "https://www.semanticscholar.org/author/65831908", + "name": "Scott Turing", "aliases": null, "affiliations": [], "homepage": null, + "paperCount": 1, "citationCount": 3, "hIndex": 1, "papers": [{"paperId": "e83c2f1b0494f030d9e5667ddf5daadf6de93855", + "externalIds": {"MAG": "2910617426", "DOI": "10.1109/HOTICN.2018.8605949", + "CorpusId": 57763123}, "corpusId": 57763123, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e83c2f1b0494f030d9e5667ddf5daadf6de93855", + "title": "Intelligent Eco Networking (IEN): an Advanced Future Internet of + intelligence for Digital Social Economic Ecosystem", "abstract": "Intelligent + Eco Networking (IEN) aims to gradually evolve to be an advanced infrastructure + for future Internet of intelligence which treats valuable content data as + the first-class entity, motivated by data exchange, manipulated by artificial + intelligence, based on the approaches of software defined, virtualized and + programmable devices, additionally by comprehensively measuring the cost and + gain of storage, computing and network resources, it also integrates decentralized + consensus trust preservation and tokenized fine-grained allocation mechanism + of blockchain to establish a prosperous mutual-contributed and mutual-beneficial + value-oriented networking industry ecosystem.", "venue": "2018 1st IEEE International + Conference on Hot Information-Centric Networking (HotICN)", "year": 2018, + "referenceCount": 0, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": "2018-08-01", "journal": {"pages": "179-185", "name": "2018 + 1st IEEE International Conference on Hot Information-Centric Networking (HotICN)"}, + "authors": [{"authorId": "65831908", "name": "Scott Turing"}]}]}, {"authorId": + "72251076", "externalIds": {}, "url": "https://www.semanticscholar.org/author/72251076", + "name": "To Turing", "aliases": null, "affiliations": [], "homepage": null, + "paperCount": 1, "citationCount": 2, "hIndex": 1, "papers": [{"paperId": "33658645edd9c02d2e5f6834b4d11a711e35c666", + "externalIds": {"MAG": "2520110148", "CorpusId": 63107714}, "corpusId": 63107714, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/33658645edd9c02d2e5f6834b4d11a711e35c666", + "title": "The Universal Computer The Road From Leibniz", "abstract": null, + "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "72251076", "name": "To Turing"}, {"authorId": "133827875", + "name": "D. Fischer"}]}]}, {"authorId": "103510998", "externalIds": {}, "url": + "https://www.semanticscholar.org/author/103510998", "name": "Turing Model", + "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": + 0, "hIndex": 0, "papers": [{"paperId": "21dd41889967b0a6c502aa61fd80695a9b78758a", + "externalIds": {"MAG": "2188717972", "CorpusId": 124753568}, "corpusId": 124753568, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/21dd41889967b0a6c502aa61fd80695a9b78758a", + "title": "Bifurcation Analysis of a Generic Reaction-Diffusion", "abstract": + null, "venue": "", "year": 2014, "referenceCount": 40, "citationCount": 0, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "103510998", "name": "Turing Model"}, + {"authorId": "92658325", "name": "Ping Liu"}]}]}, {"authorId": "52266406", + "externalIds": {}, "url": "https://www.semanticscholar.org/author/52266406", + "name": "Sara Turing", "aliases": null, "affiliations": [], "homepage": null, + "paperCount": 20, "citationCount": 14, "hIndex": 1, "papers": [{"paperId": + "0c3336ec66f88be0dae2b5f44cc1befb0d50e4a9", "externalIds": {"MAG": "1875007315", + "DOI": "10.1017/CBO9781139105736.018", "CorpusId": 56549300}, "corpusId": + 56549300, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0c3336ec66f88be0dae2b5f44cc1befb0d50e4a9", "title": "Alan M. Turing: Theory of Morphogenesis Considered", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", + "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, + {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", + "name": "Martin Davis"}]}, {"paperId": "1b6404f2cece2eeaab7978a79f3fd8bb19ed55cc", + "externalIds": {"MAG": "1615543042", "DOI": "10.1017/CBO9781139105736.003", + "CorpusId": 60667486}, "corpusId": 60667486, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1b6404f2cece2eeaab7978a79f3fd8bb19ed55cc", + "title": "Alan M. Turing: Foreword to the First Edition", "abstract": null, + "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin - Davis"}]}, {"paperId": "1b6404f2cece2eeaab7978a79f3fd8bb19ed55cc", "externalIds": - {"MAG": "1615543042", "DOI": "10.1017/CBO9781139105736.003", "CorpusId": 60667486}, - "url": "https://www.semanticscholar.org/paper/1b6404f2cece2eeaab7978a79f3fd8bb19ed55cc", - "title": "Alan M. Turing: Foreword to the First Edition", "abstract": null, - "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "1f770a96829b1723d6a2b4c09f4a1ec70b54bb0e", - "externalIds": {"MAG": "1431922259", "DOI": "10.1017/CBO9781139105736.008", - "CorpusId": 60677552}, "url": "https://www.semanticscholar.org/paper/1f770a96829b1723d6a2b4c09f4a1ec70b54bb0e", + Davis"}]}, {"paperId": "1f770a96829b1723d6a2b4c09f4a1ec70b54bb0e", "externalIds": + {"MAG": "1431922259", "DOI": "10.1017/CBO9781139105736.008", "CorpusId": 60677552}, + "corpusId": 60677552, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1f770a96829b1723d6a2b4c09f4a1ec70b54bb0e", "title": "Alan M. Turing: At the Graduate College, Princeton", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "35c43893293d4e6dfb9902758cadf6ef1eb258de", - "externalIds": {"MAG": "2496401338", "DOI": "10.1017/CBO9781139105736.012", - "CorpusId": 63483791}, "url": "https://www.semanticscholar.org/paper/35c43893293d4e6dfb9902758cadf6ef1eb258de", - "title": "Alan M. Turing: Work with the Manchester Automatic Digital Machine", - "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, - {"paperId": "4844d9c5abb9aee9fe294ca9db9dbb4d6b508f76", "externalIds": {"MAG": - "1624290889", "DOI": "10.1017/CBO9781139105736.016", "CorpusId": 60701079}, - "url": "https://www.semanticscholar.org/paper/4844d9c5abb9aee9fe294ca9db9dbb4d6b508f76", + {"paperId": "35c43893293d4e6dfb9902758cadf6ef1eb258de", "externalIds": {"MAG": + "2496401338", "DOI": "10.1017/CBO9781139105736.012", "CorpusId": 63483791}, + "corpusId": 63483791, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/35c43893293d4e6dfb9902758cadf6ef1eb258de", + "title": "Alan M. Turing: Work with the Manchester Automatic Digital Machine", + "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", + "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, + {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", + "name": "Martin Davis"}]}, {"paperId": "4844d9c5abb9aee9fe294ca9db9dbb4d6b508f76", + "externalIds": {"MAG": "1624290889", "DOI": "10.1017/CBO9781139105736.016", + "CorpusId": 60701079}, "corpusId": 60701079, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4844d9c5abb9aee9fe294ca9db9dbb4d6b508f76", "title": "Alan M. Turing: Last Days and Some Tributes", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "4b2cdd717d1adbd970b063a18e846f5404281628", - "externalIds": {"MAG": "2340580063", "DOI": "10.1017/CBO9781139105736.009", - "CorpusId": 64070169}, "url": "https://www.semanticscholar.org/paper/4b2cdd717d1adbd970b063a18e846f5404281628", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "4b2cdd717d1adbd970b063a18e846f5404281628", "externalIds": + {"MAG": "2340580063", "DOI": "10.1017/CBO9781139105736.009", "CorpusId": 64070169}, + "corpusId": 64070169, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4b2cdd717d1adbd970b063a18e846f5404281628", "title": "Alan M. Turing: Some Characteristics", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "553bb0e7b62931a17ccfc0b22888389746395de4", - "externalIds": {"MAG": "1009082265", "DOI": "10.1017/CBO9781139105736.015", - "CorpusId": 60795875}, "url": "https://www.semanticscholar.org/paper/553bb0e7b62931a17ccfc0b22888389746395de4", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "553bb0e7b62931a17ccfc0b22888389746395de4", "externalIds": + {"MAG": "1009082265", "DOI": "10.1017/CBO9781139105736.015", "CorpusId": 60795875}, + "corpusId": 60795875, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/553bb0e7b62931a17ccfc0b22888389746395de4", "title": "Alan M. Turing: Relaxation", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "791c36554d3120019e9d6dc042dabeb15c01a523", - "externalIds": {"MAG": "2337511714", "DOI": "10.1017/CBO9781139105736.013", - "CorpusId": 62415368}, "url": "https://www.semanticscholar.org/paper/791c36554d3120019e9d6dc042dabeb15c01a523", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "791c36554d3120019e9d6dc042dabeb15c01a523", "externalIds": + {"MAG": "2337511714", "DOI": "10.1017/CBO9781139105736.013", "CorpusId": 62415368}, + "corpusId": 62415368, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/791c36554d3120019e9d6dc042dabeb15c01a523", "title": "Alan M. Turing: Broadcasts and Intelligent Machinery", "abstract": "On 15th May, 1951, on the Third Programme, Alan gave his first broadcast, which was one of a series with the general title \u201cAutomatic Calculating @@ -2423,120 +2625,130 @@ interactions: and in such a way as to be, on the whole, within the comprehension of those to whom it was quite new.", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2012-03-01", "journal": {"volume": - "", "pages": "100-101", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "History", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-03-01", + "journal": {"volume": "", "pages": "100-101", "name": ""}, "authors": [{"authorId": + "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John + F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "8c0d5512959c75d21ac6507656b22a12096eb33f", "externalIds": {"MAG": "1820075407", "DOI": "10.1017/CBO9781139105736.020", - "CorpusId": 61052833}, "url": "https://www.semanticscholar.org/paper/8c0d5512959c75d21ac6507656b22a12096eb33f", + "CorpusId": 61052833}, "corpusId": 61052833, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8c0d5512959c75d21ac6507656b22a12096eb33f", "title": "Alan M. Turing: Bibliography", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "8d8449a37c09348ac4503d295f101ff5351bb35c", - "externalIds": {"MAG": "2503602911", "DOI": "10.1017/CBO9781139105736.006", - "CorpusId": 56730252}, "url": "https://www.semanticscholar.org/paper/8d8449a37c09348ac4503d295f101ff5351bb35c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "8d8449a37c09348ac4503d295f101ff5351bb35c", "externalIds": + {"MAG": "2503602911", "DOI": "10.1017/CBO9781139105736.006", "CorpusId": 56730252}, + "corpusId": 56730252, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8d8449a37c09348ac4503d295f101ff5351bb35c", "title": "Alan M. Turing: At Sherborne School", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "90ccd177723f104d8efbbe9c5e5357f26b725bed", - "externalIds": {"MAG": "974617218", "DOI": "10.1017/CBO9781139105736.001", - "CorpusId": 61034732}, "url": "https://www.semanticscholar.org/paper/90ccd177723f104d8efbbe9c5e5357f26b725bed", - "title": "Alan M. Turing: Foreword to the Centenary Edition", "abstract": - null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin - Davis"}]}, {"paperId": "95630ca3ba27e4915aac4468a9fbfde1bc503bf7", "externalIds": - {"MAG": "2265401284", "DOI": "10.1017/CBO9781139105736.007", "CorpusId": 61846071}, - "url": "https://www.semanticscholar.org/paper/95630ca3ba27e4915aac4468a9fbfde1bc503bf7", + Davis"}]}, {"paperId": "90ccd177723f104d8efbbe9c5e5357f26b725bed", "externalIds": + {"MAG": "974617218", "DOI": "10.1017/CBO9781139105736.001", "CorpusId": 61034732}, + "corpusId": 61034732, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/90ccd177723f104d8efbbe9c5e5357f26b725bed", + "title": "Alan M. Turing: Foreword to the Centenary Edition", "abstract": + null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 1, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", + "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, + {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", + "name": "Martin Davis"}]}, {"paperId": "95630ca3ba27e4915aac4468a9fbfde1bc503bf7", + "externalIds": {"MAG": "2265401284", "DOI": "10.1017/CBO9781139105736.007", + "CorpusId": 61846071}, "corpusId": 61846071, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/95630ca3ba27e4915aac4468a9fbfde1bc503bf7", "title": "Alan M. Turing: At Cambridge", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "9a645983ba83a004c3d2c424552eee703647741a", - "externalIds": {"MAG": "1031929904", "DOI": "10.1017/CBO9781139105736.014", - "CorpusId": 60612425}, "url": "https://www.semanticscholar.org/paper/9a645983ba83a004c3d2c424552eee703647741a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "9a645983ba83a004c3d2c424552eee703647741a", "externalIds": + {"MAG": "1031929904", "DOI": "10.1017/CBO9781139105736.014", "CorpusId": 60612425}, + "corpusId": 60612425, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a645983ba83a004c3d2c424552eee703647741a", "title": "Alan M. Turing: Morphogenesis", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "9c0eece0eeedf6109feda630eeb122d27e869bc7", "externalIds": + {"MAG": "1613634338", "DOI": "10.1017/CBO9781139105736.005", "CorpusId": 60720651}, + "corpusId": 60720651, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9c0eece0eeedf6109feda630eeb122d27e869bc7", + "title": "Alan M. Turing: Childhood and Early Boyhood", "abstract": null, + "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "9c0eece0eeedf6109feda630eeb122d27e869bc7", - "externalIds": {"MAG": "1613634338", "DOI": "10.1017/CBO9781139105736.005", - "CorpusId": 60720651}, "url": "https://www.semanticscholar.org/paper/9c0eece0eeedf6109feda630eeb122d27e869bc7", - "title": "Alan M. Turing: Childhood and Early Boyhood", "abstract": null, - "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "bb7286cfcc0dcb548e4ce9dbd51c291b9c118798", + {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "bb7286cfcc0dcb548e4ce9dbd51c291b9c118798", "externalIds": {"MAG": "2301902672", "DOI": "10.1017/CBO9781139105736.004", - "CorpusId": 61284599}, "url": "https://www.semanticscholar.org/paper/bb7286cfcc0dcb548e4ce9dbd51c291b9c118798", + "CorpusId": 61284599}, "corpusId": 61284599, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bb7286cfcc0dcb548e4ce9dbd51c291b9c118798", "title": "Alan M. Turing: Family Background", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara + Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": + "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin + Davis"}]}, {"paperId": "c336759109cb4844b2d03b4097238d50d37ca7a3", "externalIds": + {"MAG": "775417329", "DOI": "10.1017/CBO9781139105736.019", "CorpusId": 60217086}, + "corpusId": 60217086, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c336759109cb4844b2d03b4097238d50d37ca7a3", + "title": "Alan M. Turing: My Brother Alan", "abstract": null, "venue": "", + "year": 2012, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, - {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "c336759109cb4844b2d03b4097238d50d37ca7a3", - "externalIds": {"MAG": "775417329", "DOI": "10.1017/CBO9781139105736.019", - "CorpusId": 60217086}, "url": "https://www.semanticscholar.org/paper/c336759109cb4844b2d03b4097238d50d37ca7a3", - "title": "Alan M. Turing: My Brother Alan", "abstract": null, "venue": "", - "year": 2012, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "ea54d4a94a6bb83ec217b6f74f0488dd4a9da124", + {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "ea54d4a94a6bb83ec217b6f74f0488dd4a9da124", "externalIds": {"MAG": "1023188214", "DOI": "10.1017/CBO9781139105736.017", - "CorpusId": 61062429}, "url": "https://www.semanticscholar.org/paper/ea54d4a94a6bb83ec217b6f74f0488dd4a9da124", + "CorpusId": 61062429}, "corpusId": 61062429, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ea54d4a94a6bb83ec217b6f74f0488dd4a9da124", "title": "Alan M. Turing: Computing Machinery", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "fb04a41a8ce3262566fd5f1dd697ac9a6dd2426f", - "externalIds": {"MAG": "1813315080", "DOI": "10.1017/CBO9781139105736.010", - "CorpusId": 60844796}, "url": "https://www.semanticscholar.org/paper/fb04a41a8ce3262566fd5f1dd697ac9a6dd2426f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, + {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", + "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, + {"paperId": "fb04a41a8ce3262566fd5f1dd697ac9a6dd2426f", "externalIds": {"MAG": + "1813315080", "DOI": "10.1017/CBO9781139105736.010", "CorpusId": 60844796}, + "corpusId": 60844796, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fb04a41a8ce3262566fd5f1dd697ac9a6dd2426f", "title": "Alan M. Turing: War Work in the Foreign Office", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "52266406", - "name": "Sara Turing"}, {"authorId": "52278265", "name": "John F. Turing"}, - {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": + [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", + "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, + {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", "externalIds": {"MAG": "1651552693", "DOI": "10.1017/CBO9781139105736", "CorpusId": - 56689702}, "url": "https://www.semanticscholar.org/paper/569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", + 56689702}, "corpusId": 56689702, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", "title": "Alan M. Turing: Frontmatter", "abstract": "Foreword to the Centenary Edition Martin Davis Preface to the First Edition Foreword to the First Edition Lyn Irvine Preface Part I. Mainly Biographical: 1. Family background 2. Childhood @@ -2548,28 +2760,31 @@ interactions: Machinery and Morphogenesis: 14. Computing machinery 15. Chemical theory of morphogenesis considered My brother Alan John Turing Bibliography Index.", "venue": "", "year": 1961, "referenceCount": 1, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1961-10-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John - F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "25fccae73141170f2107f2876f5f5d57e6948ec9", - "externalIds": {"MAG": "2498313634", "DOI": "10.1017/CBO9781139105736.011", - "CorpusId": 4067163}, "url": "https://www.semanticscholar.org/paper/25fccae73141170f2107f2876f5f5d57e6948ec9", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1961-10-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, + {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", + "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, + {"paperId": "25fccae73141170f2107f2876f5f5d57e6948ec9", "externalIds": {"MAG": + "2498313634", "DOI": "10.1017/CBO9781139105736.011", "CorpusId": 4067163}, + "corpusId": 4067163, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/25fccae73141170f2107f2876f5f5d57e6948ec9", "title": "National Physical Laboratory, Teddington", "abstract": "ANNUAL INSPECTION", "venue": "Nature", "year": 1949, "referenceCount": 0, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "164", "pages": "88-89", "name": "Nature"}, "authors": - [{"authorId": "52266406", "name": "Sara Turing"}, {"authorId": "52278265", - "name": "John F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}]}]}, - {"authorId": "2082493385", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2082493385", - "name": "Dermot Turing", "aliases": null, "affiliations": [], "homepage": - null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": - "1b96c275214ed621c86a8f7642ca23873c94e468", "externalIds": {"MAG": "2996463455", - "DOI": "10.14375/NP.9782369428220", "CorpusId": 212826559}, "url": "https://www.semanticscholar.org/paper/1b96c275214ed621c86a8f7642ca23873c94e468", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.nature.com/articles/164088a0.pdf", "status": null}, "fieldsOfStudy": + ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"volume": "164", "pages": "88-89", + "name": "Nature"}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, + {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", + "name": "L. Irvine"}]}]}, {"authorId": "2082493385", "externalIds": {}, "url": + "https://www.semanticscholar.org/author/2082493385", "name": "Dermot Turing", + "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": + 0, "hIndex": 0, "papers": [{"paperId": "1b96c275214ed621c86a8f7642ca23873c94e468", + "externalIds": {"MAG": "2996463455", "DOI": "10.14375/NP.9782369428220", "CorpusId": + 212826559}, "corpusId": 212826559, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1b96c275214ed621c86a8f7642ca23873c94e468", "title": "Enigma: Ou comment les Alli\u00e9s ont r\u00e9ussi \u00e0 casser le code nazi", "abstract": "1932. Dans la salle de bain d\u2019un hotel bruxellois, un espion francais photographie les premiers documents decrivant une nouvelle @@ -2593,70 +2808,135 @@ interactions: : celle d\u2019un extraordinaire passage de relais entre espions, scientifiques et militaires de trois pays.", "venue": "", "year": 2019, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": - "external"}], "publicationTypes": null, "publicationDate": "2019-09-26", "journal": - {"volume": "", "name": ""}, "authors": [{"authorId": "2082493385", "name": - "Dermot Turing"}]}]}, {"authorId": "65831908", "externalIds": {}, "url": "https://www.semanticscholar.org/author/65831908", - "name": "Scott Turing", "aliases": null, "affiliations": [], "homepage": null, - "paperCount": 1, "citationCount": 3, "hIndex": 1, "papers": [{"paperId": "e83c2f1b0494f030d9e5667ddf5daadf6de93855", - "externalIds": {"MAG": "2910617426", "DOI": "10.1109/HOTICN.2018.8605949", - "CorpusId": 57763123}, "url": "https://www.semanticscholar.org/paper/e83c2f1b0494f030d9e5667ddf5daadf6de93855", - "title": "Intelligent Eco Networking (IEN): an Advanced Future Internet of - intelligence for Digital Social Economic Ecosystem", "abstract": "Intelligent - Eco Networking (IEN) aims to gradually evolve to be an advanced infrastructure - for future Internet of intelligence which treats valuable content data as - the first-class entity, motivated by data exchange, manipulated by artificial - intelligence, based on the approaches of software defined, virtualized and - programmable devices, additionally by comprehensively measuring the cost and - gain of storage, computing and network resources, it also integrates decentralized - consensus trust preservation and tokenized fine-grained allocation mechanism - of blockchain to establish a prosperous mutual-contributed and mutual-beneficial - value-oriented networking industry ecosystem.", "venue": "2018 1st IEEE International - Conference on Hot Information-Centric Networking (HotICN)", "year": 2018, - "referenceCount": 0, "citationCount": 3, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": - "2018-08-01", "journal": {"pages": "179-185", "name": "2018 1st IEEE International - Conference on Hot Information-Centric Networking (HotICN)"}, "authors": [{"authorId": - "65831908", "name": "Scott Turing"}]}]}, {"authorId": "103510998", "externalIds": - {}, "url": "https://www.semanticscholar.org/author/103510998", "name": "Turing - Model", "aliases": null, "affiliations": [], "homepage": null, "paperCount": - 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "21dd41889967b0a6c502aa61fd80695a9b78758a", - "externalIds": {"MAG": "2188717972", "CorpusId": 124753568}, "url": "https://www.semanticscholar.org/paper/21dd41889967b0a6c502aa61fd80695a9b78758a", - "title": "Bifurcation Analysis of a Generic Reaction-Diffusion", "abstract": - null, "venue": "", "year": 2014, "referenceCount": 40, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "103510998", - "name": "Turing Model"}, {"authorId": "92658325", "name": "Ping Liu"}]}]}, - {"authorId": "72251076", "externalIds": {}, "url": "https://www.semanticscholar.org/author/72251076", - "name": "To Turing", "aliases": null, "affiliations": [], "homepage": null, - "paperCount": 1, "citationCount": 2, "hIndex": 1, "papers": [{"paperId": "33658645edd9c02d2e5f6834b4d11a711e35c666", - "externalIds": {"MAG": "2520110148", "CorpusId": 63107714}, "url": "https://www.semanticscholar.org/paper/33658645edd9c02d2e5f6834b4d11a711e35c666", - "title": "The Universal Computer The Road From Leibniz", "abstract": null, - "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "72251076", - "name": "To Turing"}, {"authorId": "133827875", "name": "D. Fischer"}]}]}, + "openAccessPdf": null, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": + "Art", "source": "external"}], "publicationTypes": null, "publicationDate": + "2019-09-26", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "2082493385", "name": "Dermot Turing"}]}]}, {"authorId": "2135179314", "externalIds": + {}, "url": "https://www.semanticscholar.org/author/2135179314", "name": "James + Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": + 1, "citationCount": 1, "hIndex": 1, "papers": [{"paperId": "59188a1a67dfce9e17dfaa3ec6b0fd7ce704a90e", + "externalIds": {"MAG": "3198593669", "DOI": "10.7488/ERA/1258", "CorpusId": + 239694418}, "corpusId": 239694418, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/59188a1a67dfce9e17dfaa3ec6b0fd7ce704a90e", + "title": "Understanding the circular economy in Kenya", "abstract": null, + "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], + "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-07-31", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "2135179314", "name": "James Turing"}]}]}, {"authorId": "2197567958", "externalIds": + {}, "url": "https://www.semanticscholar.org/author/2197567958", "name": "Turing + Eret", "aliases": null, "affiliations": [], "homepage": null, "paperCount": + 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "c0e1b0e424a0d29badf1ea0aae376407f45dc56b", + "externalIds": {"DOI": "10.1109/PAST49659.2022.9975084", "CorpusId": 254900919}, + "corpusId": 254900919, "publicationVenue": {"id": "7c4c26d4-ea15-4280-9119-3dbabc20c4da", + "name": "IEEE International Symposium on Phased Array Systems and Technology", + "type": "conference", "alternate_names": ["PAST", "IEEE Int Symp Ph Array + Syst Technol"]}, "url": "https://www.semanticscholar.org/paper/c0e1b0e424a0d29badf1ea0aae376407f45dc56b", + "title": "Airborne Polarimetric Doppler Phased Array Weather Radar: Digital + Twin of the Active Electronically Scanned Array", "abstract": "A weather radar + using an active electronically scanned array (AESA) enables rapid scanning + of the antenna beam for Doppler and polarimetric radar observation measurements. + An AESA consists of radiating elements, power amplifiers, attenuators, phase + shifters, array controllers, and digital converters. This paper describes + a digital twin, the AESA Simulator, which models both the AESA and weather + radar returns, developed to explore and validate the optimal configuration + of the APAR subsystems. Using a hybrid digital beamforming architecture, multiple, + simultaneous receive beams are realized upon reception. Traditional analog + beamforming will be performed along each row, while digital beamforming will + be performed across the per-row outputs of the AESA. The simulator sums over + a spatial grid, rather than using a prescribed antenna pattern, in order to + support testing of multiple receive beams, clutter mitigation algorithms, + and other developments that require accurate modeling of spatial diversity. + The digital twin allowed NCAR/EOL to accelerate the timeline for engineering + development of the APAR radar back end (RBE) and provides the necessary configurability + to conform to the eventual AESA digital data acquisition and control interfaces + as AESA and RBE development converge. Together the simulator and RBE are used + to evaluate/validate the radar at the system level.", "venue": "IEEE International + Symposium on Phased Array Systems and Technology", "year": 2022, "referenceCount": + 7, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2022-10-11", "journal": {"pages": "1-6", "name": "2022 IEEE International + Symposium on Phased Array Systems & Technology (PAST)"}, "authors": [{"authorId": + "1557618581", "name": "Adam Karboski"}, {"authorId": "3112229", "name": "J. + Vivekanandan"}, {"authorId": "2497984", "name": "C. Burghart"}, {"authorId": + "2197567958", "name": "Turing Eret"}]}]}, {"authorId": "119137633", "externalIds": + {}, "url": "https://www.semanticscholar.org/author/119137633", "name": "A. + Award", "aliases": ["A. M. Turing Award", "Arbitration Award"], "affiliations": + [], "homepage": null, "paperCount": 2, "citationCount": 0, "hIndex": 0, "papers": + [{"paperId": "84a4057f2d940707f49f3d18ce87574d4c74294d", "externalIds": {"CorpusId": + 202603546}, "corpusId": 202603546, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/84a4057f2d940707f49f3d18ce87574d4c74294d", + "title": "A . Litigation Involving the Federal Arbitration Act", "abstract": + "To enter a federal district court, you must knock on the door of the federal + courthouse and show a jurisdictional ticket. If the judge validates your ticket, + you will be welcomed into federal court. On its face, this seems like a straightforward + process. However, consider the following example: John and Mike enter an agreement + that contains an arbitration clause. When the relationship deteriorates, John + chooses to compel arbitration and seeks $100,000 from Mike. After the arbitration, + John is awarded $70,000. John sues in federal court to confirm the arbitration + award. Assuming John is seeking to establish diversity jurisdiction, John + will have to satisfy the $75,000 amount in controversy requirement. Is the + amount in controversy satisfied because John originally sought $100,000, or + is $70,000 the amount in controversy in this dispute? The obvious answer is + to look at how courts have handled similar disputes. Unfortunately, the answer + will change depending on which circuit hears the case. 3 Moreover, some circuits + have not provided a clear answer to this question. In fact, some courts within + the same circuit reach different", "venue": "", "year": 2016, "referenceCount": + 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "119137633", "name": "A. Award"}, + {"authorId": "80108974", "name": "K. Beckrich"}]}, {"paperId": "69e8dac8f696430f2d6b4620ba0307879c79b574", + "externalIds": {"CorpusId": 17491690}, "corpusId": 17491690, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/69e8dac8f696430f2d6b4620ba0307879c79b574", + "title": "Digitizing Fashion Fingers , Thumbs , and People A Guitar That Tells + Its Own Life Story Sharing the Hidden Treasure in Pictorials", "abstract": + "For fundamental contributions to the concepts and practices underlying modern + database systems. by the community \u25c6 from the community \u25c6 for the + community THE ACM A. M. TURING AWARD \" The effi cient and effective management + of Big Data is crucial to our 21st century global economy, \" said Google + Senior Vice President of Knowledge Alan Eustace. \" Michael Stonebraker invented + many of the architectures and strategies that are the foundation of virtually + all modern database systems. \" The relation between humans and technologies + is one part of a larger relation\u2014that between human beings and their + world. For credit card orders, call +1-800-342-6626. Order personnel available + 8:30-4:30 EST. After hours, please leave message and order personnel will + return your call. for personal or classroom use is granted without fee provided + that copies are not made or distributed for profit or commercial advantage + and that copies bear this notice and full citation on the first page. Copyright + for components of this work owned by others than ACM must be honored. Abstracting + with credit is permitted. For other copying of articles that carry a code + at the bottom of the first or last page or screen display, copying is permitted + provided that the per-copy fee indicated in the code is paid through the", + "venue": "", "year": 2015, "referenceCount": 21, "citationCount": 0, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145345023", + "name": "M. Stonebraker"}, {"authorId": "119137633", "name": "A. Award"}, + {"authorId": "3061067", "name": "Jasjeet Singh Seehra"}, {"authorId": "3222437", + "name": "Ansh Verma"}, {"authorId": "8611295", "name": "K. Peppler"}, {"authorId": + "2102901426", "name": "Karthik Ramani CycleMosaic"}, {"authorId": "2153512632", + "name": "Yun-Maw Cheng"}, {"authorId": "2081439446", "name": "Chao-Lung Lee + Tr\u0101taka"}, {"authorId": "51408169", "name": "Alessio Chierico"}]}]}, {"authorId": "51263427", "externalIds": {"DBLP": ["Dermot Turing"]}, "url": "https://www.semanticscholar.org/author/51263427", "name": "Dermot Turing", - "aliases": null, "affiliations": [], "homepage": null, "paperCount": 20, "citationCount": + "aliases": null, "affiliations": [], "homepage": null, "paperCount": 21, "citationCount": 29, "hIndex": 3, "papers": [{"paperId": "5dc0992eb3d92464d78cfab78b3e5aa601c228ce", "externalIds": {"MAG": "2999199075", "DOI": "10.5040/9781526514998", "CorpusId": - 217471572}, "url": "https://www.semanticscholar.org/paper/5dc0992eb3d92464d78cfab78b3e5aa601c228ce", + 217471572}, "corpusId": 217471572, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5dc0992eb3d92464d78cfab78b3e5aa601c228ce", "title": "Clearing and Settlement", "abstract": null, "venue": "", "year": 2021, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "History", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-02-12", - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "51263427", - "name": "Dermot Turing"}]}, {"paperId": "97901202ebfb53c26cd723004723066f5e40d5d7", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-02-12", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": + "51263427", "name": "Dermot Turing"}]}, {"paperId": "97901202ebfb53c26cd723004723066f5e40d5d7", "externalIds": {"MAG": "3163345780", "DOI": "10.2139/ssrn.3685103", "CorpusId": - 235320399}, "url": "https://www.semanticscholar.org/paper/97901202ebfb53c26cd723004723066f5e40d5d7", + 235320399}, "corpusId": 235320399, "publicationVenue": {"id": "fdd518e4-4057-47f1-8de9-eb95e78df5c4", + "name": "The Journal of Financial Market Infrastructures", "type": "journal", + "alternate_names": ["J Financial Mark Infrastruct"], "issn": "2049-5404", + "url": "http://www.risk.net/type/journal/source/journal-of-financial-market-infrastructures"}, + "url": "https://www.semanticscholar.org/paper/97901202ebfb53c26cd723004723066f5e40d5d7", "title": "Clearing away after Brexit?", "abstract": "A new legal framework for the regulation of non-EU CCPs operating in the European Union came into force in 2020, which empowers ESMA into a supervisory role and allows ESMA @@ -2666,28 +2946,33 @@ interactions: of the ECB, ESMA and the European Commission, and the possible outcomes for UK CCPs once Brexit is complete.", "venue": "The Journal of Financial Market Infrastructures", "year": 2020, "referenceCount": 21, "citationCount": 0, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], - "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": - "Law", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2020-05-30", "journal": {"name": "English & Commonwealth Law eJournal"}, - "authors": [{"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": - "ec33a07286ee3a841b2ac94814f55e9b7bae797e", "externalIds": {"MAG": "3188749302", - "DBLP": "conf/histocrypt/Turing21", "DOI": "10.3384/ecp183167", "CorpusId": - 238651029}, "url": "https://www.semanticscholar.org/paper/ec33a07286ee3a841b2ac94814f55e9b7bae797e", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}, {"category": "Law", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2020-05-30", "journal": {"name": "English & Commonwealth + Law eJournal"}, "authors": [{"authorId": "51263427", "name": "Dermot Turing"}]}, + {"paperId": "ec33a07286ee3a841b2ac94814f55e9b7bae797e", "externalIds": {"MAG": + "3188749302", "DBLP": "conf/histocrypt/Turing21", "DOI": "10.3384/ecp183167", + "CorpusId": 238651029}, "corpusId": 238651029, "publicationVenue": {"id": + "7b833615-8551-4568-aadb-d86d6b8c2c5d", "name": "International Conference + on Historical Cryptology", "type": "conference", "alternate_names": ["HistoCrypt", + "Int Conf Hist Cryptol"]}, "url": "https://www.semanticscholar.org/paper/ec33a07286ee3a841b2ac94814f55e9b7bae797e", "title": "The American Army Bombe", "abstract": "This paper presents the U.S. Army\u2019s version of the anti-Enigma cryptanalytical bombe machine, which has not previously received attention in the literature on Enigma. Its unique features and applications are discussed, and the paper describes the sensitive context of the machine\u2019s development and deployment.", "venue": "International Conference on Historical Cryptology", "year": 2021, "referenceCount": 4, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Engineering", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2021-08-09", "journal": {"pages": - "137-142"}, "authors": [{"authorId": "51263427", "name": "Dermot Turing"}]}, - {"paperId": "973559c583e0e669ea2a7de40237fda5612659f2", "externalIds": {"DOI": - "10.2139/ssrn.3565870", "CorpusId": 219354355}, "url": "https://www.semanticscholar.org/paper/973559c583e0e669ea2a7de40237fda5612659f2", + 0, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://ecp.ep.liu.se/index.php/histocrypt/article/download/167/123", "status": + null}, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-08-09", "journal": + {"pages": "137-142"}, "authors": [{"authorId": "51263427", "name": "Dermot + Turing"}]}, {"paperId": "973559c583e0e669ea2a7de40237fda5612659f2", "externalIds": + {"DOI": "10.2139/ssrn.3565870", "CorpusId": 219354355}, "corpusId": 219354355, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/973559c583e0e669ea2a7de40237fda5612659f2", "title": "Untying Interconnectedness: Topology, Stability and the Post-crisis Reforms", "abstract": "\u2018Interconnectedness\u2019 was considered to be a cause of the 2008 financial crisis, stimulating a number of studies into @@ -2701,11 +2986,12 @@ interactions: networks. Finally, the post-crisis reforms are judged against the view of \u2018interconnectedness\u2019 which emerges.
", "venue": "", "year": 2020, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-04-01", - "journal": {"name": "Financial Crises eJournal"}, "authors": [{"authorId": - "51263427", "name": "Dermot Turing"}]}, {"paperId": "a4587037ee24b04ee4c629a1dd2899ed0e9c0d59", - "externalIds": {"CorpusId": 233750111}, "url": "https://www.semanticscholar.org/paper/a4587037ee24b04ee4c629a1dd2899ed0e9c0d59", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2020-04-01", "journal": {"name": "Financial Crises eJournal"}, "authors": + [{"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "a4587037ee24b04ee4c629a1dd2899ed0e9c0d59", + "externalIds": {"CorpusId": 233750111}, "corpusId": 233750111, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a4587037ee24b04ee4c629a1dd2899ed0e9c0d59", "title": "CSDs and Participant Default", "abstract": "Since the financial crisis there has been an increase in the degree and detail of regulation of CSDs, which are rightly recognised to be a core component in the smooth functioning @@ -2735,21 +3021,23 @@ interactions: suggested that CSDs should overhaul their approach to membership in relation to bridge banks, and facilitate the transfer of client accounts during resolution.
", "venue": "", "year": 2020, "referenceCount": 2, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2020-03-10", "journal": {"name": "Regulation of Financial Institutions eJournal"}, - "authors": [{"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": - "46b96096af586d7f10ac8dfd6723f57c0237f441", "externalIds": {"MAG": "2978615556", - "DOI": "10.21314/jfmi.2019.114", "CorpusId": 211742478}, "url": "https://www.semanticscholar.org/paper/46b96096af586d7f10ac8dfd6723f57c0237f441", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2020-03-10", "journal": {"name": "Regulation of + Financial Institutions eJournal"}, "authors": [{"authorId": "51263427", "name": + "Dermot Turing"}]}, {"paperId": "46b96096af586d7f10ac8dfd6723f57c0237f441", + "externalIds": {"MAG": "2978615556", "DOI": "10.21314/jfmi.2019.114", "CorpusId": + 211742478}, "corpusId": 211742478, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/46b96096af586d7f10ac8dfd6723f57c0237f441", "title": "Central counterparties: magic relighting candles?", "abstract": null, "venue": "Journal of Financial Market Infrastructures", "year": 2019, "referenceCount": 0, "citationCount": 3, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}], "publicationTypes": null, "publicationDate": "2019-10-04", - "journal": {"name": "Journal of Financial Market Infrastructures"}, "authors": - [{"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "8a8184e55624b6e178853cd0369227ae4f2af405", - "externalIds": {"MAG": "2982645089", "DBLP": "conf/histocrypt/Turing19", "CorpusId": - 203980202}, "url": "https://www.semanticscholar.org/paper/8a8184e55624b6e178853cd0369227ae4f2af405", + false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}], "publicationTypes": null, + "publicationDate": "2019-10-04", "journal": {"name": "Journal of Financial + Market Infrastructures"}, "authors": [{"authorId": "51263427", "name": "Dermot + Turing"}]}, {"paperId": "8a8184e55624b6e178853cd0369227ae4f2af405", "externalIds": + {"MAG": "2982645089", "DBLP": "conf/histocrypt/Turing19", "CorpusId": 203980202}, + "corpusId": 203980202, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8a8184e55624b6e178853cd0369227ae4f2af405", "title": "The Typex Scare of 1943: How Well Did the British React to a Cypher-Security Scare?", "abstract": "The response of German Naval Intelligence, at various points in World War Two, to suspicions that the Enigma cipher had been broken @@ -2758,13 +3046,14 @@ interactions: use across their armed forces. This paper compares the response of the British to the Typex scare to the German investigations", "venue": "HistoCrypt", "year": 2019, "referenceCount": 15, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Political Science", "Computer - Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "History", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "158:004"}, "authors": [{"authorId": - "51263427", "name": "Dermot Turing"}]}, {"paperId": "f9229fe699641599f4897fecc2dbb6193b249c5a", - "externalIds": {"CorpusId": 211167335}, "url": "https://www.semanticscholar.org/paper/f9229fe699641599f4897fecc2dbb6193b249c5a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political + Science", "Computer Science"], "s2FieldsOfStudy": [{"category": "Political + Science", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "158:004"}, + "authors": [{"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": + "f9229fe699641599f4897fecc2dbb6193b249c5a", "externalIds": {"CorpusId": 211167335}, + "corpusId": 211167335, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f9229fe699641599f4897fecc2dbb6193b249c5a", "title": "Untying the Gordian Knot: Interconnectedness, stability and the post-crisis reforms", "abstract": "\u2018Interconnectedness\u2019 was considered to be a cause of the 2008 financial crisis, stimulating a number of studies @@ -2778,12 +3067,12 @@ interactions: networks. Finally, the post-crisis reforms are judged against the view of \u2018interconnectedness\u2019 which emerges.", "venue": "", "year": 2019, "referenceCount": 34, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "51263427", "name": "Dermot Turing"}]}, - {"paperId": "2814ddfe3c8636dfe182c1a1ea608af8841dac3e", "externalIds": {"DBLP": - "conf/histocrypt/Turing18", "MAG": "2892401395", "CorpusId": 52192407}, "url": - "https://www.semanticscholar.org/paper/2814ddfe3c8636dfe182c1a1ea608af8841dac3e", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "51263427", "name": "Dermot + Turing"}]}, {"paperId": "2814ddfe3c8636dfe182c1a1ea608af8841dac3e", "externalIds": + {"DBLP": "conf/histocrypt/Turing18", "MAG": "2892401395", "CorpusId": 52192407}, + "corpusId": 52192407, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2814ddfe3c8636dfe182c1a1ea608af8841dac3e", "title": "The Poles and Enigma after 1940: le voile se l\u00e8ve-t-il?", "abstract": "Recently declassified papers, together with other archival material, begin to reveal more details of the activities of the Polish code-breakers after @@ -2796,14 +3085,14 @@ interactions: code-breakers in the final year of the war needs to be reevaluated in light of the prevailing political climate.", "venue": "HistoCrypt", "year": 2018, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Political Science", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Political Science", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-13", "journal": - {"pages": "149:018"}, "authors": [{"authorId": "51263427", "name": "Dermot - Turing"}]}, {"paperId": "490289d2d77f68905da51661e32933b17256b1a7", "externalIds": - {"MAG": "2953973997", "DOI": "10.5089/9781484347300.001", "CorpusId": 169231618}, - "url": "https://www.semanticscholar.org/paper/490289d2d77f68905da51661e32933b17256b1a7", + false, "openAccessPdf": null, "fieldsOfStudy": ["Political Science", "Computer + Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-06-13", "journal": {"pages": "149:018"}, "authors": + [{"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "490289d2d77f68905da51661e32933b17256b1a7", + "externalIds": {"MAG": "2953973997", "DOI": "10.5089/9781484347300.001", "CorpusId": + 169231618}, "corpusId": 169231618, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/490289d2d77f68905da51661e32933b17256b1a7", "title": "Central Counterparties Resolution\u2014An Unresolved Problem", "abstract": "Recovery and resolution regimes are being developed for central counterparties (CCPs). We analyse current resolution tools in the context of policy, which @@ -2811,14 +3100,16 @@ interactions: toolkit is insufficient to avoid the costs of resolution being borne by taxpayers, and propose alternative policy suggestions for addressing the problem of a failed CCP.", "venue": "", "year": 2018, "referenceCount": 31, "citationCount": - 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Business"], - "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2018-03-20", "journal": {"volume": "18", "pages": "1", "name": "IMF Working - Papers"}, "authors": [{"authorId": "114966368", "name": "Manmohan Singh"}, - {"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "9d2be70554302be2b6c255145ead5decbdb69023", - "externalIds": {"MAG": "2901287272", "DOI": "10.5089/9781484381922.001", "CorpusId": - 169230327}, "url": "https://www.semanticscholar.org/paper/9d2be70554302be2b6c255145ead5decbdb69023", + 8, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.elibrary.imf.org/doc/IMF001/25033-9781484347300/25033-9781484347300/Other_formats/Source_PDF/25033-9781484348444.pdf", + "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-03-20", "journal": {"volume": + "18", "pages": "1", "name": "IMF Working Papers"}, "authors": [{"authorId": + "114966368", "name": "Manmohan Singh"}, {"authorId": "51263427", "name": "Dermot + Turing"}]}, {"paperId": "9d2be70554302be2b6c255145ead5decbdb69023", "externalIds": + {"MAG": "2901287272", "DOI": "10.5089/9781484381922.001", "CorpusId": 169230327}, + "corpusId": 169230327, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9d2be70554302be2b6c255145ead5decbdb69023", "title": "The Morning After--The Impact on Collateral Supply after a Major Default", "abstract": "Changes to the regulatory system introduced after the financial crisis include not only mandatory clearing of OTC derivatives at @@ -2832,13 +3123,15 @@ interactions: the spike and draw conclusions as to whether the depth of the market is adequate to absorb it.", "venue": "SSRN Electronic Journal", "year": 2018, "referenceCount": 56, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://www.elibrary.imf.org/doc/IMF001/25542-9781484381922/25542-9781484381922/Other_formats/Source_PDF/25542-9781484382448.pdf", + "status": null}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2018-10-01", "journal": {"name": "Capital Markets: Market Microstructure eJournal"}, "authors": [{"authorId": "51263427", "name": "Dermot Turing"}, {"authorId": "114966368", "name": "Manmohan Singh"}]}, {"paperId": "b2af8a09add883b7f61877d95e1c80beace41d83", "externalIds": - {"MAG": "2802315433", "CorpusId": 189662539}, "url": "https://www.semanticscholar.org/paper/b2af8a09add883b7f61877d95e1c80beace41d83", + {"MAG": "2802315433", "CorpusId": 189662539}, "corpusId": 189662539, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b2af8a09add883b7f61877d95e1c80beace41d83", "title": "Central Counterparties Resolution\u00e2An Unresolved Problem", "abstract": "Recovery and resolution regimes are being developed for central counterparties (CCPs). We analyse current resolution tools in the context of policy, which @@ -2846,23 +3139,25 @@ interactions: toolkit is insufficient to avoid the costs of resolution being borne by taxpayers, and propose alternative policy suggestions for addressing the problem of a failed CCP.", "venue": "", "year": 2018, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", - "name": ""}, "authors": [{"authorId": "114966368", "name": "Manmohan Singh"}, - {"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "629b8620724f52210b5553a888e903a94c3c784d", - "externalIds": {"MAG": "2787533567", "DOI": "10.21314/JFMI.2018.094", "CorpusId": - 198848235}, "url": "https://www.semanticscholar.org/paper/629b8620724f52210b5553a888e903a94c3c784d", + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Economics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "", "name": ""}, "authors": [{"authorId": "114966368", "name": + "Manmohan Singh"}, {"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": + "629b8620724f52210b5553a888e903a94c3c784d", "externalIds": {"MAG": "2787533567", + "DOI": "10.21314/JFMI.2018.094", "CorpusId": 198848235}, "corpusId": 198848235, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/629b8620724f52210b5553a888e903a94c3c784d", "title": "Central counterparty resolution: an unresolved problem", "abstract": null, "venue": "", "year": 2017, "referenceCount": 0, "citationCount": 4, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Business"], - "s2FieldsOfStudy": [{"category": "Business", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "114966368", "name": "Manmohan Singh"}, {"authorId": "51263427", - "name": "Dermot Turing"}]}, {"paperId": "b250e3a2d3eb5541a7fd914d14ae110904ab08da", - "externalIds": {"MAG": "2203921102", "DOI": "10.2139/SSRN.2659336", "CorpusId": - 155745349}, "url": "https://www.semanticscholar.org/paper/b250e3a2d3eb5541a7fd914d14ae110904ab08da", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "114966368", + "name": "Manmohan Singh"}, {"authorId": "51263427", "name": "Dermot Turing"}]}, + {"paperId": "b250e3a2d3eb5541a7fd914d14ae110904ab08da", "externalIds": {"MAG": + "2203921102", "DOI": "10.2139/SSRN.2659336", "CorpusId": 155745349}, "corpusId": + 155745349, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b250e3a2d3eb5541a7fd914d14ae110904ab08da", "title": "The Extra-Territorial Regulation of Clearinghouses", "abstract": "This Article argues that post-Crisis reform of over-the-counter derivatives is in trouble. While regulators agree on the broad strokes of regulation, @@ -2884,15 +3179,15 @@ interactions: regimes. Where costs diverge, traders seek out avenues for regulatory arbitrage to lower their costs of compliance. In concluding, this Article explores implications for reform.", "venue": "", "year": 2015, "referenceCount": 0, "citationCount": - 3, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, - {"category": "Economics", "source": "s2-fos-model"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-09-11", "journal": {"name": "Vanderbilt University Law School"}, "authors": - [{"authorId": "143751363", "name": "Yesha Yadav"}, {"authorId": "51263427", - "name": "Dermot Turing"}]}, {"paperId": "b3423edff548fbe158cc142a96c4dddbe5613b88", + 3, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}, + {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2015-09-11", "journal": {"name": "Vanderbilt University + Law School"}, "authors": [{"authorId": "143751363", "name": "Yesha Yadav"}, + {"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "b3423edff548fbe158cc142a96c4dddbe5613b88", "externalIds": {"MAG": "2039274474", "DOI": "10.1108/15285811111122065", "CorpusId": - 154100757}, "url": "https://www.semanticscholar.org/paper/b3423edff548fbe158cc142a96c4dddbe5613b88", + 154100757}, "corpusId": 154100757, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b3423edff548fbe158cc142a96c4dddbe5613b88", "title": "Regulatory change for financial institutions: crossing the ocean in an open boat", "abstract": "Purpose \u2013 This paper aims to draw some overall conclusions and suggest a general approach financial institutions @@ -2907,29 +3202,30 @@ interactions: ways in which it will be implemented in various countries may present opportunities.Originality/value \u2013 The paper provides expert guidance from experienced financial services lawyers.", "venue": "", "year": 2011, "referenceCount": 0, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, - {"category": "Economics", "source": "s2-fos-model"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-04-12", - "journal": {"volume": "12", "pages": "50-52", "name": "Journal of Investment - Compliance"}, "authors": [{"authorId": "51263427", "name": "Dermot Turing"}, - {"authorId": "2098055769", "name": "Marc Benzler"}, {"authorId": "153799282", - "name": "F. Lacroix"}]}, {"paperId": "e591000384e75667236ff4f8a803241a8624b083", - "externalIds": {"MAG": "796360980", "CorpusId": 166582807}, "url": "https://www.semanticscholar.org/paper/e591000384e75667236ff4f8a803241a8624b083", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}, + {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2011-04-12", "journal": {"volume": "12", "pages": "50-52", + "name": "Journal of Investment Compliance"}, "authors": [{"authorId": "51263427", + "name": "Dermot Turing"}, {"authorId": "2098055769", "name": "Marc Benzler"}, + {"authorId": "153799282", "name": "F. Lacroix"}]}, {"paperId": "e591000384e75667236ff4f8a803241a8624b083", + "externalIds": {"MAG": "796360980", "CorpusId": 166582807}, "corpusId": 166582807, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e591000384e75667236ff4f8a803241a8624b083", "title": "Managing Risk in Financial Firms: The Practicalities without the Maths", "abstract": "Contents 1. Introduction to Risk 2. Risk Measurement 3. Regulatory Risk 4. Customer Risk 5. Business Risk 6. Operational Risks 7. Market Risk 8. Liquidity Risk 9. Credit risk 10. Counterparty risk 11. Legal Risk 12. Systemic Risk", "venue": "", "year": 2009, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-05-31", "journal": null, "authors": [{"authorId": "51263427", "name": "Dermot Turing"}, {"authorId": "14289412", "name": "E. Cramb"}]}, {"paperId": "6ee6da502a462377811320702c67e6d0fa97bd62", "externalIds": {"MAG": "2050801095", "DOI": "10.1111/J.1468-2230.2008.00695_1.X", "CorpusId": - 144768317}, "url": "https://www.semanticscholar.org/paper/6ee6da502a462377811320702c67e6d0fa97bd62", + 144768317}, "corpusId": 144768317, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6ee6da502a462377811320702c67e6d0fa97bd62", "title": "Property in Securities: A Comparative Study by Eva Micheler", "abstract": "It is, in a sense, a shocking thing that the law cannot tell you for sure whether you do or do not own something. Unfortunately the law of ownership @@ -2977,20 +3273,23 @@ interactions: and interesting. Possession of the Wertpapier ^ the value of the security is in the paper itself, not the shareholders\u2019 Reviews", "venue": "", "year": 2008, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Law", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2008-02-26", - "journal": {"name": "Wiley-Blackwell: Modern Law Review"}, "authors": [{"authorId": - "51263427", "name": "Dermot Turing"}]}, {"paperId": "fc0c99f4bf3914fd769420e5c8fec463167bd8a5", - "externalIds": {"MAG": "2972697159", "CorpusId": 203431684}, "url": "https://www.semanticscholar.org/paper/fc0c99f4bf3914fd769420e5c8fec463167bd8a5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Law", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2008-02-26", "journal": {"name": "Wiley-Blackwell: Modern Law Review"}, "authors": + [{"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "fc0c99f4bf3914fd769420e5c8fec463167bd8a5", + "externalIds": {"MAG": "2972697159", "CorpusId": 203431684}, "corpusId": 203431684, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc0c99f4bf3914fd769420e5c8fec463167bd8a5", "title": "Business implications of the Payment Services Directive", "abstract": null, "venue": "", "year": 2008, "referenceCount": 0, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], - "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2008-07-01", "journal": {"volume": "", "name": ""}, "authors": [{"authorId": - "51263427", "name": "Dermot Turing"}]}, {"paperId": "4b1dffd29db615283dd2d93bf8353c067675369e", - "externalIds": {"MAG": "635870219", "CorpusId": 106730973}, "url": "https://www.semanticscholar.org/paper/4b1dffd29db615283dd2d93bf8353c067675369e", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-07-01", "journal": {"volume": + "", "name": ""}, "authors": [{"authorId": "51263427", "name": "Dermot Turing"}]}, + {"paperId": "4b1dffd29db615283dd2d93bf8353c067675369e", "externalIds": {"MAG": + "635870219", "CorpusId": 106730973}, "corpusId": 106730973, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4b1dffd29db615283dd2d93bf8353c067675369e", "title": "Risk management handbook : a practical guide for financial institutions and their advisers", "abstract": "This practical guide on the management of financial risk is an essential reference source for a wide range of professionals @@ -3000,22 +3299,23 @@ interactions: the reader to dip in to the book for guidance on particular subject areas, making this title an essential guide on the subject.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "51263427", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "bc43255c65a1e7f6a169fb62aa01757173102911", - "externalIds": {"MAG": "2971917603", "CorpusId": 211816096}, "url": "https://www.semanticscholar.org/paper/bc43255c65a1e7f6a169fb62aa01757173102911", + "externalIds": {"MAG": "2971917603", "CorpusId": 211816096}, "corpusId": 211816096, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc43255c65a1e7f6a169fb62aa01757173102911", "title": "Reducing risk and costs in cross-border securities transactions: Are Hague and UNIDROIT missing pieces in the puzzle?", "abstract": null, "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}], "publicationTypes": null, - "publicationDate": "2007-10-01", "journal": null, "authors": [{"authorId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}], "publicationTypes": + null, "publicationDate": "2007-10-01", "journal": null, "authors": [{"authorId": "1518264992", "name": "Kirsty Devonport"}, {"authorId": "51263427", "name": "Dermot Turing"}]}, {"paperId": "7f340cc1452ae0b8d262f9377428969ae9edf892", "externalIds": {"MAG": "1974827291", "DOI": "10.1108/EB024891", "CorpusId": - 153608040}, "url": "https://www.semanticscholar.org/paper/7f340cc1452ae0b8d262f9377428969ae9edf892", + 153608040}, "corpusId": 153608040, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f340cc1452ae0b8d262f9377428969ae9edf892", "title": "REGULATION AND INSOLVENT BANKS", "abstract": "Bank regulation tends to develop as a reaction to bank insolvencies. Much of the detail of regulatory measures, comprising EU Directives, statute and guidance from the Bank of @@ -3028,16 +3328,18 @@ interactions: paper considers the importance of protecting depositors as a guiding principle of regulation and explores possible developments.", "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1996-04-01", "journal": {"volume": - "4", "pages": "324-338", "name": "Journal of Financial Regulation and Compliance"}, - "authors": [{"authorId": "2057136405", "name": "A. Wilkinson"}, {"authorId": - "51263427", "name": "Dermot Turing"}]}]}, {"authorId": "103557714", "externalIds": - {}, "url": "https://www.semanticscholar.org/author/103557714", "name": "Turing - Patterns", "aliases": null, "affiliations": [], "homepage": null, "paperCount": - 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "fd51e80996c53756bbb643d246ef42c70ffe0d9e", - "externalIds": {"MAG": "2186702546", "CorpusId": 124655637}, "url": "https://www.semanticscholar.org/paper/fd51e80996c53756bbb643d246ef42c70ffe0d9e", + false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": + [{"category": "Business", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-04-01", + "journal": {"volume": "4", "pages": "324-338", "name": "Journal of Financial + Regulation and Compliance"}, "authors": [{"authorId": "2057136405", "name": + "A. Wilkinson"}, {"authorId": "51263427", "name": "Dermot Turing"}]}]}, {"authorId": + "103557714", "externalIds": {}, "url": "https://www.semanticscholar.org/author/103557714", + "name": "Turing Patterns", "aliases": null, "affiliations": [], "homepage": + null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": + "fd51e80996c53756bbb643d246ef42c70ffe0d9e", "externalIds": {"MAG": "2186702546", + "CorpusId": 124655637}, "corpusId": 124655637, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fd51e80996c53756bbb643d246ef42c70ffe0d9e", "title": "UNILATERAL REGULATION BREAKS REGULARITY OF", "abstract": "We consider a classical reaction-diusion system undergoing Tur- ing instability and augment it by an additional unilateral source term. We investigate its inuence on @@ -3057,109 +3359,56 @@ interactions: system without any unilateral term. Biologi- cally, these ndings can contribute to the understanding of symmetry breaking during morphogenesis.", "venue": "", "year": 2015, "referenceCount": 12, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "103557714", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "103557714", "name": "Turing Patterns"}]}]}, {"authorId": "2097432275", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2097432275", "name": "Penelope Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "0cea0fc512b29e218aac7fedd900750bd0be86f2", - "externalIds": {"MAG": "189191907", "CorpusId": 190239917}, "url": "https://www.semanticscholar.org/paper/0cea0fc512b29e218aac7fedd900750bd0be86f2", + "externalIds": {"MAG": "189191907", "CorpusId": 190239917}, "corpusId": 190239917, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0cea0fc512b29e218aac7fedd900750bd0be86f2", "title": "El Coven, hogar de la \u00f3pera y el \"ballet\" durante ciento diez a\u00f1os", "abstract": null, "venue": "", "year": 1969, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": "Art", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "2097432275", "name": "Penelope Turing"}]}]}, - {"authorId": "119137633", "externalIds": {}, "url": "https://www.semanticscholar.org/author/119137633", - "name": "A. Award", "aliases": ["A. M. Turing Award", "Arbitration Award"], - "affiliations": [], "homepage": null, "paperCount": 2, "citationCount": 0, - "hIndex": 0, "papers": [{"paperId": "84a4057f2d940707f49f3d18ce87574d4c74294d", - "externalIds": {"CorpusId": 202603546}, "url": "https://www.semanticscholar.org/paper/84a4057f2d940707f49f3d18ce87574d4c74294d", - "title": "A . Litigation Involving the Federal Arbitration Act", "abstract": - "To enter a federal district court, you must knock on the door of the federal - courthouse and show a jurisdictional ticket. If the judge validates your ticket, - you will be welcomed into federal court. On its face, this seems like a straightforward - process. However, consider the following example: John and Mike enter an agreement - that contains an arbitration clause. When the relationship deteriorates, John - chooses to compel arbitration and seeks $100,000 from Mike. After the arbitration, - John is awarded $70,000. John sues in federal court to confirm the arbitration - award. Assuming John is seeking to establish diversity jurisdiction, John - will have to satisfy the $75,000 amount in controversy requirement. Is the - amount in controversy satisfied because John originally sought $100,000, or - is $70,000 the amount in controversy in this dispute? The obvious answer is - to look at how courts have handled similar disputes. Unfortunately, the answer - will change depending on which circuit hears the case. 3 Moreover, some circuits - have not provided a clear answer to this question. In fact, some courts within - the same circuit reach different", "venue": "", "year": 2016, "referenceCount": - 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Law", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "119137633", "name": "A. Award"}, {"authorId": "80108974", "name": - "K. Beckrich"}]}, {"paperId": "69e8dac8f696430f2d6b4620ba0307879c79b574", - "externalIds": {"CorpusId": 17491690}, "url": "https://www.semanticscholar.org/paper/69e8dac8f696430f2d6b4620ba0307879c79b574", - "title": "Digitizing Fashion Fingers , Thumbs , and People A Guitar That Tells - Its Own Life Story Sharing the Hidden Treasure in Pictorials", "abstract": - "For fundamental contributions to the concepts and practices underlying modern - database systems. by the community \u25c6 from the community \u25c6 for the - community THE ACM A. M. TURING AWARD \" The effi cient and effective management - of Big Data is crucial to our 21st century global economy, \" said Google - Senior Vice President of Knowledge Alan Eustace. \" Michael Stonebraker invented - many of the architectures and strategies that are the foundation of virtually - all modern database systems. \" The relation between humans and technologies - is one part of a larger relation\u2014that between human beings and their - world. For credit card orders, call +1-800-342-6626. Order personnel available - 8:30-4:30 EST. After hours, please leave message and order personnel will - return your call. for personal or classroom use is granted without fee provided - that copies are not made or distributed for profit or commercial advantage - and that copies bear this notice and full citation on the first page. Copyright - for components of this work owned by others than ACM must be honored. Abstracting - with credit is permitted. For other copying of articles that carry a code - at the bottom of the first or last page or screen display, copying is permitted - provided that the per-copy fee indicated in the code is paid through the", - "venue": "", "year": 2015, "referenceCount": 21, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "145345023", - "name": "M. Stonebraker"}, {"authorId": "119137633", "name": "A. Award"}, - {"authorId": "3061067", "name": "Jasjeet Singh Seehra"}, {"authorId": "3222437", - "name": "Ansh Verma"}, {"authorId": "8611295", "name": "K. Peppler"}, {"authorId": - "2102901426", "name": "Karthik Ramani CycleMosaic"}, {"authorId": "2153512632", - "name": "Yun-Maw Cheng"}, {"authorId": "2081439446", "name": "Chao-Lung Lee - Tr\u0101taka"}, {"authorId": "51408169", "name": "Alessio Chierico"}]}]}, - {"authorId": "66693357", "externalIds": {}, "url": "https://www.semanticscholar.org/author/66693357", + "openAccessPdf": null, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": + "Art", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2097432275", "name": "Penelope + Turing"}]}]}, {"authorId": "66693357", "externalIds": {}, "url": "https://www.semanticscholar.org/author/66693357", "name": "Turing Am", "aliases": null, "affiliations": [], "homepage": null, - "paperCount": 1, "citationCount": 28, "hIndex": 1, "papers": [{"paperId": + "paperCount": 1, "citationCount": 26, "hIndex": 1, "papers": [{"paperId": "ddb8dc30e9485f213ef2810e34ca6cc9adcf336a", "externalIds": {"MAG": "2422851612", - "CorpusId": 59260125}, "url": "https://www.semanticscholar.org/paper/ddb8dc30e9485f213ef2810e34ca6cc9adcf336a", + "CorpusId": 59260125}, "corpusId": 59260125, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ddb8dc30e9485f213ef2810e34ca6cc9adcf336a", "title": "Lecture to the London Mathematical Society on 20 February 1947. 1986.", "abstract": null, "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - "1995-09-01", "journal": {"volume": "12", "pages": "390", "name": "M.D. computing - : computers in medical practice"}, "authors": [{"authorId": "66693357", "name": - "Turing Am"}]}]}, {"authorId": "2087393474", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2087393474", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": "1995-09-01", "journal": {"volume": "12", "pages": + "390", "name": "M.D. computing : computers in medical practice"}, "authors": + [{"authorId": "66693357", "name": "Turing Am"}]}]}, {"authorId": "2087393474", + "externalIds": {}, "url": "https://www.semanticscholar.org/author/2087393474", "name": "Universal Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "010c000243091859f3c768ef71b6defd7087af06", "externalIds": {"CorpusId": 14755330}, - "url": "https://www.semanticscholar.org/paper/010c000243091859f3c768ef71b6defd7087af06", + "corpusId": 14755330, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/010c000243091859f3c768ef71b6defd7087af06", "title": "Maszyny Liczace an Inteligencja T", "abstract": "The synthesis of Boolean logic is a technical challenge. Given the current status of interactive symmetries, physicists shockingly desire the understanding of IPv7. We verify not only that write-back caches and RAID can collaborate to fulfill this intent, but that the same is true for journaling file systems.", "venue": "", "year": 2011, "referenceCount": 297, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393474", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393474", "name": "Universal Turing"}, {"authorId": "2087368942", "name": "Machine R I P"}]}]}, {"authorId": "2096727233", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2096727233", "name": "John Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 1, "hIndex": 1, "papers": [{"paperId": "90cb7f764f0b9be4a6d7fa22a98e3a2eee8d9172", "externalIds": {"MAG": "2310983991", "DOI": "10.3828/BJCS.2016.4", "CorpusId": - 159861009}, "url": "https://www.semanticscholar.org/paper/90cb7f764f0b9be4a6d7fa22a98e3a2eee8d9172", + 159861009}, "corpusId": 159861009, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/90cb7f764f0b9be4a6d7fa22a98e3a2eee8d9172", "title": "Conservatives and conditional loyalty: The Rebellion Losses Crisis of 1849 in Montreal (Les conservateurs et la loyaut\u00e9 conditionnelle: la crise de la Loi d\u2019indemnisation pour le Bas-Canada de 1849 \u00e0 @@ -3176,16 +3425,17 @@ interactions: implicit support of \u2018French Domination\u2019. The connection between mother country and colony was now conceived as open to negotiation.", "venue": "", "year": 2016, "referenceCount": 37, "citationCount": 1, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-03-18", - "journal": {"volume": "29", "pages": "103 - 83", "name": "British Journal - of Canadian Studies"}, "authors": [{"authorId": "2096727233", "name": "John - Turing"}]}]}, {"authorId": "103597481", "externalIds": {}, "url": "https://www.semanticscholar.org/author/103597481", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-03-18", "journal": {"volume": "29", "pages": "103 - 83", "name": "British + Journal of Canadian Studies"}, "authors": [{"authorId": "2096727233", "name": + "John Turing"}]}]}, {"authorId": "103597481", "externalIds": {}, "url": "https://www.semanticscholar.org/author/103597481", "name": "Turing Bibliography", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "cf822a122c846330c51ab70fe4c44db1d374c414", "externalIds": {"MAG": "2371772214", - "CorpusId": 124990678}, "url": "https://www.semanticscholar.org/paper/cf822a122c846330c51ab70fe4c44db1d374c414", + "CorpusId": 124990678}, "corpusId": 124990678, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cf822a122c846330c51ab70fe4c44db1d374c414", "title": "The Church-Turing Thesis", "abstract": "The notion of an effective method is an informal one, and attempts to characterise effectiveness, such as the above, lack rigour, for the key requirement that the method demand @@ -3204,28 +3454,29 @@ interactions: terms of the formal concept proposed by Turing, it is appropriate to refer to the thesis also as \u2018Turing''s thesis\u2019; and mutatis mutandis in the case of Church.", "venue": "", "year": 2006, "referenceCount": 38, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "103597481", "name": "Turing Bibliography"}]}]}, {"authorId": - "2087393471", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2087393471", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "103597481", "name": "Turing Bibliography"}]}]}, + {"authorId": "2087393471", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2087393471", "name": "Universal Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 11, "citationCount": 768, "hIndex": 5, "papers": [{"paperId": "1452a468116a8c40441c653418d4ff3bf97c50ca", "externalIds": {"CorpusId": 642685}, - "url": "https://www.semanticscholar.org/paper/1452a468116a8c40441c653418d4ff3bf97c50ca", + "corpusId": 642685, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1452a468116a8c40441c653418d4ff3bf97c50ca", "title": "Digital computers applied to games Universal Turing Machine", "abstract": "Forward-error correction must work. In this position paper, we disconfirm the exploration of multicast methodologies, which embodies the theoretical principles of machine learning. In this paper, we consider how agents can be applied to the development of sensor networks.", "venue": "", "year": 2011, "referenceCount": 226, "citationCount": 0, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": "3301167d98d4b1f55a51517671dc4a92417f2ed9", "externalIds": - {"CorpusId": 16068434}, "url": "https://www.semanticscholar.org/paper/3301167d98d4b1f55a51517671dc4a92417f2ed9", + {"CorpusId": 16068434}, "corpusId": 16068434, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3301167d98d4b1f55a51517671dc4a92417f2ed9", "title": "AM Turing\u2019s Original Proposal for the Development of an Electronic Computer: Reprinted with a Foreword by DW Davies", "abstract": "Signed algorithms and scatter/gather I/O have garnered tremendous interest from both system @@ -3234,12 +3485,13 @@ interactions: of IPv4. In this work, we concentrate our efforts on proving that online algorithms and XML can interfere to accomplish this aim.", "venue": "", "year": 2011, "referenceCount": 157, "citationCount": 170, "influentialCitationCount": 5, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": "3c473c2edb131dfea3dea7344a8c2b74ee0ade01", "externalIds": - {"CorpusId": 11993730}, "url": "https://www.semanticscholar.org/paper/3c473c2edb131dfea3dea7344a8c2b74ee0ade01", + {"CorpusId": 11993730}, "corpusId": 11993730, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3c473c2edb131dfea3dea7344a8c2b74ee0ade01", "title": "Proposal for Development in the Mathematical Division of an Automatic Computing Engine", "abstract": "Internet QoS and digital-to-analog converters, while compelling in theory, have not until recently been considered technical. @@ -3250,12 +3502,13 @@ interactions: we use embedded models to demonstrate that architecture and lambda calculus are generally incompatible.", "venue": "", "year": 2011, "referenceCount": 151, "citationCount": 168, "influentialCitationCount": 3, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal - Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": - "6f3a6e55227d7be86ed4f78e3c2c17a2b4ce34a1", "externalIds": {"CorpusId": 3193397}, - "url": "https://www.semanticscholar.org/paper/6f3a6e55227d7be86ed4f78e3c2c17a2b4ce34a1", + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R + I P"}]}, {"paperId": "6f3a6e55227d7be86ed4f78e3c2c17a2b4ce34a1", "externalIds": + {"CorpusId": 3193397}, "corpusId": 3193397, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6f3a6e55227d7be86ed4f78e3c2c17a2b4ce34a1", "title": "Gandy An early proof of normalization by AM Turing Universal Turing Machine", "abstract": "Many cyberneticists would agree that, had it not been for Boolean logic, the robust unification of Markov models and DNS might never @@ -3265,12 +3518,13 @@ interactions: methodology for the exploration of the partition table (Edder), which we use to disconfirm that the UNIVAC computer and link-level acknowledgements are rarely incompatible.", "venue": "", "year": 2011, "referenceCount": 243, "citationCount": - 0, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", - "name": "Machine R I P"}]}, {"paperId": "96915261c10db10bbc26cb6e47f88d55bc6b00ca", - "externalIds": {"CorpusId": 16282540}, "url": "https://www.semanticscholar.org/paper/96915261c10db10bbc26cb6e47f88d55bc6b00ca", + 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal + Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": + "96915261c10db10bbc26cb6e47f88d55bc6b00ca", "externalIds": {"CorpusId": 16282540}, + "corpusId": 16282540, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/96915261c10db10bbc26cb6e47f88d55bc6b00ca", "title": "The mathfrakphBcFunctionin lambda-K hBcConversion Universal Turing Machine", "abstract": "Many experts would agree that, had it not been for amphibious algorithms, the emulation of consistent hashing might never have @@ -3278,12 +3532,13 @@ interactions: the significant principles of cryptography. In our research we investigate how public-private key pairs can be applied to the improvement of robots.", "venue": "", "year": 2011, "referenceCount": 235, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": "2546e5c71929aa5e1a554f2a1cf70feaac2e53b1", "externalIds": - {"CorpusId": 5907308}, "url": "https://www.semanticscholar.org/paper/2546e5c71929aa5e1a554f2a1cf70feaac2e53b1", + {"CorpusId": 5907308}, "corpusId": 5907308, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2546e5c71929aa5e1a554f2a1cf70feaac2e53b1", "title": "Intelligent machinery . National Physical Laboratory Report ( 1948 ) Universal Turing Machine", "abstract": "Superpages and expert systems, while key in theory, have not until recently been considered significant. After @@ -3292,12 +3547,13 @@ interactions: this mission, we use client-server models to prove that hierarchical databases and model checking are regularly incompatible .", "venue": "", "year": null, "referenceCount": 154, "citationCount": 5, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": "2c0010fc66890cfa8280de25de99734d46ac34e1", "externalIds": - {"CorpusId": 10198808}, "url": "https://www.semanticscholar.org/paper/2c0010fc66890cfa8280de25de99734d46ac34e1", + {"CorpusId": 10198808}, "corpusId": 10198808, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2c0010fc66890cfa8280de25de99734d46ac34e1", "title": "Miscellaneous Front Pages J. Symbolic Logic Volume 13 Issue 2 (1948)", "abstract": "In recent years, much research has been devoted to the synthesis of context-free grammar ; however, few have improved the exploration of Lamport @@ -3307,12 +3563,13 @@ interactions: to realize this goal, but rather on describing a collaborative tool for visualizing the Internet (Gazel).", "venue": "", "year": null, "referenceCount": 153, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal - Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": - "2e842fcd9b30aaf88378f395cb49bf54d962b9b4", "externalIds": {"CorpusId": 15659696}, - "url": "https://www.semanticscholar.org/paper/2e842fcd9b30aaf88378f395cb49bf54d962b9b4", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R + I P"}]}, {"paperId": "2e842fcd9b30aaf88378f395cb49bf54d962b9b4", "externalIds": + {"CorpusId": 15659696}, "corpusId": 15659696, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2e842fcd9b30aaf88378f395cb49bf54d962b9b4", "title": "The chemical basis of morphogenesis reprinted from Philosophical Transactions of the Royal Society ( Part B ) 237 37-72 ( 1953 ) Universal Turing Machine", "abstract": "The evaluation of SCSI disks is an unfortunate @@ -3321,12 +3578,13 @@ interactions: we present a classical tool for analyzing e-business (AIL), which we use to disconfirm that telephony and scatter/gather I/O can interfere to accomplish this intent.", "venue": "", "year": null, "referenceCount": 149, "citationCount": - 207, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", - "name": "Machine R I P"}]}, {"paperId": "394ed08b2696bdd3e8154a98d79d773fdf117b14", - "externalIds": {"CorpusId": 18572441}, "url": "https://www.semanticscholar.org/paper/394ed08b2696bdd3e8154a98d79d773fdf117b14", + 207, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal + Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": + "394ed08b2696bdd3e8154a98d79d773fdf117b14", "externalIds": {"CorpusId": 18572441}, + "corpusId": 18572441, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/394ed08b2696bdd3e8154a98d79d773fdf117b14", "title": "Intelligent Machinery \u2019 reprinted in Ince ( 1992 ) Universal Turing Machine", "abstract": "In recent years, much research has been devoted to the construction of the Turing machine ; unfortunately, few have emulated @@ -3335,12 +3593,13 @@ interactions: confusing principles We use virtual technology to prove that evolutionary programming can be made classical, highly-available, and self-learning.", "venue": "", "year": null, "referenceCount": 139, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": "61fcb6d4f527f32206e95bdb4541b34942d96f1c", "externalIds": - {"CorpusId": 17121850}, "url": "https://www.semanticscholar.org/paper/61fcb6d4f527f32206e95bdb4541b34942d96f1c", + {"CorpusId": 17121850}, "corpusId": 17121850, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/61fcb6d4f527f32206e95bdb4541b34942d96f1c", "title": "Intelligent machinery a heretical theory ; reprinted in ( Copeland 2004 ) Universal Turing Machine", "abstract": "Recent advances in semantic epistemolo-gies and flexible symmetries offer a viable alternative to the @@ -3350,12 +3609,13 @@ interactions: can be made electronic, game-theoretic, and virtual, model checking and architecture can agree to solve this question.", "venue": "", "year": null, "referenceCount": 107, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal - Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": - "db6f721b9dbf8cc7d7bec0569bc5d78e3f7f3d99", "externalIds": {"CorpusId": 8763331}, - "url": "https://www.semanticscholar.org/paper/db6f721b9dbf8cc7d7bec0569bc5d78e3f7f3d99", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R + I P"}]}, {"paperId": "db6f721b9dbf8cc7d7bec0569bc5d78e3f7f3d99", "externalIds": + {"CorpusId": 8763331}, "corpusId": 8763331, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/db6f721b9dbf8cc7d7bec0569bc5d78e3f7f3d99", "title": "Can Digital Computers Think?; Reprinted in (copeland 2004)", "abstract": "In recent years, much research has been devoted to the analysis of the World Wide Web; however, few have deployed the synthesis of architecture. In fact, @@ -3364,15 +3624,16 @@ interactions: In order to fix this obstacle, we examine how robots can be applied to the investigation of Moore''s Law that made enabling and possibly visualizing write-back caches a", "venue": "", "year": null, "referenceCount": 131, "citationCount": - 202, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", - "name": "Machine R I P"}]}]}, {"authorId": "2079675747", "externalIds": {}, - "url": "https://www.semanticscholar.org/author/2079675747", "name": "Alan - Turing-Father", "aliases": null, "affiliations": [], "homepage": null, "paperCount": - 1, "citationCount": 5, "hIndex": 1, "papers": [{"paperId": "6e7247eee00b3879ab9011e2069b9a1b9d38ab12", - "externalIds": {"CorpusId": 18572079}, "url": "https://www.semanticscholar.org/paper/6e7247eee00b3879ab9011e2069b9a1b9d38ab12", + 202, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal + Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}]}, {"authorId": + "2079675747", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2079675747", + "name": "Alan Turing-Father", "aliases": null, "affiliations": [], "homepage": + null, "paperCount": 1, "citationCount": 5, "hIndex": 1, "papers": [{"paperId": + "6e7247eee00b3879ab9011e2069b9a1b9d38ab12", "externalIds": {"CorpusId": 18572079}, + "corpusId": 18572079, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e7247eee00b3879ab9011e2069b9a1b9d38ab12", "title": "Alan Turing-father of Modern Computer Science Father of Modern Computer Science Universal Turing Machine", "abstract": "System administrators agree that pervasive theory are an interesting new topic in the field of theory, @@ -3380,39 +3641,42 @@ interactions: the improvement of journaling file systems. We describe a novel solution for the investigation of superblocks, which we call NyeTaborine.", "venue": "", "year": 2011, "referenceCount": 160, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2079675747", - "name": "Alan Turing-Father"}]}]}, {"authorId": "2134605869", "externalIds": - {}, "url": "https://www.semanticscholar.org/author/2134605869", "name": "Alan - TuringChurch-Turing", "aliases": null, "affiliations": [], "homepage": null, - "paperCount": 1, "citationCount": 1, "hIndex": 1, "papers": [{"paperId": "46ae2c1037bca497941443bfb65d7236a949a1a5", - "externalIds": {"DOI": "10.5040/9781350165557.ch-002", "CorpusId": 239479545}, - "url": "https://www.semanticscholar.org/paper/46ae2c1037bca497941443bfb65d7236a949a1a5", - "title": "The history of AI", "abstract": null, "venue": "Architecture in - the Age of Artificial Intelligence", "year": 2022, "referenceCount": 0, "citationCount": - 1, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Architecture in the Age of Artificial Intelligence"}, - "authors": [{"authorId": "2134605869", "name": "Alan TuringChurch-Turing"}]}]}, - {"authorId": "101574915", "externalIds": {}, "url": "https://www.semanticscholar.org/author/101574915", - "name": "Alan Turing Road", "aliases": null, "affiliations": [], "homepage": - null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": - "e4e88567ca2ae67e55d1e327c958deb401fc6c4a", "externalIds": {"MAG": "2618838936", - "DOI": "10.1016/0015-1882(91)80096-N", "CorpusId": 113780047}, "url": "https://www.semanticscholar.org/paper/e4e88567ca2ae67e55d1e327c958deb401fc6c4a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2079675747", + "name": "Alan Turing-Father"}]}]}, {"authorId": "101574915", "externalIds": + {}, "url": "https://www.semanticscholar.org/author/101574915", "name": "Alan + Turing Road", "aliases": null, "affiliations": [], "homepage": null, "paperCount": + 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "e4e88567ca2ae67e55d1e327c958deb401fc6c4a", + "externalIds": {"MAG": "2618838936", "DOI": "10.1016/0015-1882(91)80096-N", + "CorpusId": 113780047}, "corpusId": 113780047, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e4e88567ca2ae67e55d1e327c958deb401fc6c4a", "title": "Filter cartridges withstand high temperatures", "abstract": null, "venue": "", "year": 1991, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}], "publicationTypes": null, - "publicationDate": "1991-07-01", "journal": null, "authors": [{"authorId": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}], "publicationTypes": + null, "publicationDate": "1991-07-01", "journal": null, "authors": [{"authorId": "101674998", "name": "Gaf Filter Systems Europe"}, {"authorId": "101574915", "name": "Alan Turing Road"}, {"authorId": "80276246", "name": "Guildford"}, - {"authorId": "101457457", "name": "Surrey Gu Yf Uk"}]}]}, {"authorId": "2079681809", - "externalIds": {}, "url": "https://www.semanticscholar.org/author/2079681809", + {"authorId": "101457457", "name": "Surrey Gu Yf Uk"}]}]}, {"authorId": "2134605869", + "externalIds": {}, "url": "https://www.semanticscholar.org/author/2134605869", + "name": "Alan TuringChurch-Turing", "aliases": null, "affiliations": [], "homepage": + null, "paperCount": 1, "citationCount": 1, "hIndex": 1, "papers": [{"paperId": + "46ae2c1037bca497941443bfb65d7236a949a1a5", "externalIds": {"DOI": "10.5040/9781350165557.ch-002", + "CorpusId": 239479545}, "corpusId": 239479545, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/46ae2c1037bca497941443bfb65d7236a949a1a5", + "title": "The history of AI", "abstract": null, "venue": "Architecture in + the Age of Artificial Intelligence", "year": 2022, "referenceCount": 0, "citationCount": + 1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Architecture in the Age of Artificial + Intelligence"}, "authors": [{"authorId": "2134605869", "name": "Alan TuringChurch-Turing"}]}]}, + {"authorId": "2079681809", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2079681809", "name": "Alan Mathison Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 3, "hIndex": 1, "papers": [{"paperId": "4218d9145c3570c3105082368d5bd73c8a75d201", "externalIds": {"MAG": "2883395027", - "DOI": "10.1387/GOGOA.19737", "CorpusId": 189537018}, "url": "https://www.semanticscholar.org/paper/4218d9145c3570c3105082368d5bd73c8a75d201", + "DOI": "10.1387/GOGOA.19737", "CorpusId": 189537018}, "corpusId": 189537018, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4218d9145c3570c3105082368d5bd73c8a75d201", "title": "Konputazio makinak eta adimena", "abstract": "Galdera hau aintzat hartzea proposatzen dut: \u00abPentsa al dezakete makinek?\u00bb. \u00abMakina\u00bb eta \u00abpentsatu\u00bb terminoen definizioetatik abiatu beharko litzateke. @@ -3425,14 +3689,16 @@ interactions: ordez, galdera honen lekuan beste bat hartuko dugu, hari hertsiki loturik dagoena eta anbiguotasunik gabeko hitzetan adierazgarri dena.", "venue": "Gogoa", "year": 2018, "referenceCount": 11, "citationCount": 3, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.ehu.eus/index.php/Gogoa/article/download/19737/17838", + "status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": "2018-06-20", "journal": {"name": "Gogoa"}, "authors": [{"authorId": "2079681809", "name": "Alan Mathison Turing"}]}]}, {"authorId": "1382642521", "externalIds": {}, "url": "https://www.semanticscholar.org/author/1382642521", "name": "The Alan Turing Institute", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 2, "citationCount": 3, "hIndex": 1, "papers": [{"paperId": "eba2bf571334cdc6753c6f694de8571b15e0c727", "externalIds": {"ArXiv": - "1909.01035", "MAG": "2972271580", "CorpusId": 202540860}, "url": "https://www.semanticscholar.org/paper/eba2bf571334cdc6753c6f694de8571b15e0c727", + "1909.01035", "MAG": "2972271580", "CorpusId": 202540860}, "corpusId": 202540860, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eba2bf571334cdc6753c6f694de8571b15e0c727", "title": "Multilevel latent class (MLC) modelling of healthcare provider causal effects on patient outcomes: Evaluation via simulation", "abstract": "Where performance comparison of healthcare providers is of interest, characteristics @@ -3455,19 +3721,20 @@ interactions: differential selection. Patient-level variation and measurement uncertainty are accommodated within the latent classes.", "venue": "", "year": 2019, "referenceCount": 23, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2019-09-03", "journal": {"volume": "", "name": "arXiv: - Methodology"}, "authors": [{"authorId": "34513031", "name": "Wendy J Harrison"}, - {"authorId": "2443768", "name": "P. Baxter"}, {"authorId": "1388051423", "name": - "Mark S. Gilthorpe Leeds Institute for Data Analytics"}, {"authorId": "103353727", - "name": "U. Leeds"}, {"authorId": "102888280", "name": "Leeds"}, {"authorId": - "152162130", "name": "UK."}, {"authorId": "102614050", "name": "School of - Clinical Medicine"}, {"authorId": "1382642521", "name": "The Alan Turing Institute"}, - {"authorId": "46650266", "name": "London"}]}, {"paperId": "dc09c3e17f7ffdd5856b698e0af0eb8d357ac630", - "externalIds": {"MAG": "2901824199", "ArXiv": "1811.08872", "CorpusId": 88517324}, - "url": "https://www.semanticscholar.org/paper/dc09c3e17f7ffdd5856b698e0af0eb8d357ac630", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Medicine", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2019-09-03", + "journal": {"volume": "", "name": "arXiv: Methodology"}, "authors": [{"authorId": + "34513031", "name": "Wendy J Harrison"}, {"authorId": "2443768", "name": "P. + Baxter"}, {"authorId": "1388051423", "name": "Mark S. Gilthorpe Leeds Institute + for Data Analytics"}, {"authorId": "103353727", "name": "U. Leeds"}, {"authorId": + "102888280", "name": "Leeds"}, {"authorId": "152162130", "name": "UK."}, {"authorId": + "102614050", "name": "School of Clinical Medicine"}, {"authorId": "1382642521", + "name": "The Alan Turing Institute"}, {"authorId": "46650266", "name": "London"}]}, + {"paperId": "dc09c3e17f7ffdd5856b698e0af0eb8d357ac630", "externalIds": {"MAG": + "2901824199", "ArXiv": "1811.08872", "CorpusId": 88517324}, "corpusId": 88517324, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dc09c3e17f7ffdd5856b698e0af0eb8d357ac630", "title": "The Reduced Dynamic Chain Event Graph", "abstract": "In this paper we introduce a new class of probabilistic graphical models called the Reduced Dynamic Chain Event Graph (RDCEG) which is a novel mixture of a Chain Event @@ -3486,19 +3753,20 @@ interactions: time at each state being any arbitrary distribution. We demonstrate this new decision support system with a simulated intervention to reduce falls in the elderly.", "venue": "", "year": 2018, "referenceCount": 43, "citationCount": - 3, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2018-11-21", "journal": {"volume": "", "name": "arXiv: - Methodology"}, "authors": [{"authorId": "52092108", "name": "Aditi Shenvi"}, - {"authorId": "1389572610", "name": "Jim Q. Smith The University of Warwick"}, - {"authorId": "1382642521", "name": "The Alan Turing Institute"}]}]}, {"authorId": - "147620798", "externalIds": {}, "url": "https://www.semanticscholar.org/author/147620798", + 3, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-11-21", "journal": {"volume": + "", "name": "arXiv: Methodology"}, "authors": [{"authorId": "52092108", "name": + "Aditi Shenvi"}, {"authorId": "1389572610", "name": "Jim Q. Smith The University + of Warwick"}, {"authorId": "1382642521", "name": "The Alan Turing Institute"}]}]}, + {"authorId": "147620798", "externalIds": {}, "url": "https://www.semanticscholar.org/author/147620798", "name": "Makina De Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "a4449d868fdf74792cc36f7383554b8acceb1b6d", "externalIds": {"MAG": "2240363597", - "CorpusId": 192473771}, "url": "https://www.semanticscholar.org/paper/a4449d868fdf74792cc36f7383554b8acceb1b6d", + "CorpusId": 192473771}, "corpusId": 192473771, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a4449d868fdf74792cc36f7383554b8acceb1b6d", "title": "DEL TAKJU AL TEQUILA..., DANZA DE COREA DEL SUR Y M\u00c9XICO", "abstract": "LA DANZA COMO LENGUAJE DE EXPRESION UNIVERSAL ES EL PUNTO DE UNION ENTRE COREA DEL SUR Y MEXICO EN EL ENCUENTRO \"DEL TAKJU AL TEQUILA: @@ -3552,59 +3820,64 @@ interactions: DESARROLLAR\u00a0N MOVIMIENTOS COREOGR\u00a0FICOS UTILIZADOS EN LA OBRA \"CONTACT\". PARA MAYORES INFORMES, CONSULTAR LA P\u00a0GINA DE INTERNET WWW.DANZA.UNAM.MX.", "venue": "", "year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": - "Art", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "146351591", "name": "Compa\u00f1\u00edas - Lee K Dance"}, {"authorId": "146322028", "name": "Cressida Danza Ac"}, {"authorId": - "147832587", "name": "Park Soon Ho Dance Proyect"}, {"authorId": "146160660", - "name": "A. P. A. Poc"}, {"authorId": "147620798", "name": "Makina De Turing"}, - {"authorId": "144936569", "name": "H. Granados"}]}]}, {"authorId": "87439269", - "externalIds": {}, "url": "https://www.semanticscholar.org/author/87439269", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], + "s2FieldsOfStudy": [{"category": "Art", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "146351591", + "name": "Compa\u00f1\u00edas Lee K Dance"}, {"authorId": "146322028", "name": + "Cressida Danza Ac"}, {"authorId": "147832587", "name": "Park Soon Ho Dance + Proyect"}, {"authorId": "146160660", "name": "A. P. A. Poc"}, {"authorId": + "147620798", "name": "Makina De Turing"}, {"authorId": "144936569", "name": + "H. Granados"}]}]}, {"authorId": "87439269", "externalIds": {}, "url": "https://www.semanticscholar.org/author/87439269", "name": "Harvey Doria Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "d139f9199c168816e80141bba690f6cab1d8aab6", "externalIds": {"MAG": "2031384142", - "DOI": "10.2307/1436605", "CorpusId": 84787462}, "url": "https://www.semanticscholar.org/paper/d139f9199c168816e80141bba690f6cab1d8aab6", + "DOI": "10.2307/1436605", "CorpusId": 84787462}, "corpusId": 84787462, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d139f9199c168816e80141bba690f6cab1d8aab6", "title": "Modern coarse fishing", "abstract": null, "venue": "", "year": 1938, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", - "source": "external"}], "publicationTypes": null, "publicationDate": "1938-09-24", - "journal": {"volume": "1938", "pages": "152", "name": "Copeia"}, "authors": - [{"authorId": "87439269", "name": "Harvey Doria Turing"}]}]}, {"authorId": - "2079681799", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2079681799", + false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": + [{"category": "Geology", "source": "external"}], "publicationTypes": null, + "publicationDate": "1938-09-24", "journal": {"volume": "1938", "pages": "152", + "name": "Copeia"}, "authors": [{"authorId": "87439269", "name": "Harvey Doria + Turing"}]}]}, {"authorId": "2079681799", "externalIds": {}, "url": "https://www.semanticscholar.org/author/2079681799", "name": "Alan M. Turing", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 2, "citationCount": 44, "hIndex": 2, "papers": [{"paperId": "3428531e780824953fd6832b3fb2f46160b50cb6", "externalIds": {"MAG": "1898570724", - "DOI": "10.1422/3460", "CorpusId": 178792477}, "url": "https://www.semanticscholar.org/paper/3428531e780824953fd6832b3fb2f46160b50cb6", + "DOI": "10.1422/3460", "CorpusId": 178792477}, "corpusId": 178792477, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3428531e780824953fd6832b3fb2f46160b50cb6", "title": "I calcolatori digitali possono pensare", "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "pages": "21-26", - "name": ""}, "authors": [{"authorId": "2079681799", "name": "Alan M. Turing"}]}, - {"paperId": "87367aae2a41feb6ff2e634af633cfabad36305c", "externalIds": {"MAG": - "1803648296", "DOI": "10.1422/3461", "CorpusId": 176578193}, "url": "https://www.semanticscholar.org/paper/87367aae2a41feb6ff2e634af633cfabad36305c", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"volume": + "", "pages": "21-26", "name": ""}, "authors": [{"authorId": "2079681799", + "name": "Alan M. Turing"}]}, {"paperId": "87367aae2a41feb6ff2e634af633cfabad36305c", + "externalIds": {"MAG": "1803648296", "DOI": "10.1422/3461", "CorpusId": 176578193}, + "corpusId": 176578193, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/87367aae2a41feb6ff2e634af633cfabad36305c", "title": "Si pu\u00f2 dire che i calcolatori automatici pensano", "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 22, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": null, - "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2079681799", "name": "Alan M. Turing"}]}]}, - {"authorId": "93096905", "externalIds": {}, "url": "https://www.semanticscholar.org/author/93096905", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2079681799", "name": "Alan + M. Turing"}]}]}, {"authorId": "93096905", "externalIds": {}, "url": "https://www.semanticscholar.org/author/93096905", "name": "Three-Dimensional Turing Patterns", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 1, "hIndex": 1, "papers": [{"paperId": "f70ba66422870ee54ca7e2dc72e70a9ae37c8894", "externalIds": {"MAG": - "2399434755", "CorpusId": 99101048}, "url": "https://www.semanticscholar.org/paper/f70ba66422870ee54ca7e2dc72e70a9ae37c8894", + "2399434755", "CorpusId": 99101048}, "corpusId": 99101048, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f70ba66422870ee54ca7e2dc72e70a9ae37c8894", "title": "Tomography of Reaction-Diffusion Microemulsions Reveals", "abstract": null, "venue": "", "year": 2011, "referenceCount": 1, "citationCount": 1, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Materials - Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors": - [{"authorId": "93096905", "name": "Three-Dimensional Turing Patterns"}]}]}, - {"authorId": "1422034815", "externalIds": {}, "url": "https://www.semanticscholar.org/author/1422034815", - "name": "Alan Turing Institute", "aliases": null, "affiliations": [], "homepage": - null, "paperCount": 1, "citationCount": 19, "hIndex": 1, "papers": [{"paperId": - "79213c367b3d726dde1688450667417d97db25ab", "externalIds": {"MAG": "3103298935", - "ArXiv": "1911.09210", "DOI": "10.1088/1361-6471/AB8E94", "CorpusId": 208202328}, - "url": "https://www.semanticscholar.org/paper/79213c367b3d726dde1688450667417d97db25ab", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"volume": "", + "name": ""}, "authors": [{"authorId": "93096905", "name": "Three-Dimensional + Turing Patterns"}]}]}, {"authorId": "1422034815", "externalIds": {}, "url": + "https://www.semanticscholar.org/author/1422034815", "name": "Alan Turing + Institute", "aliases": null, "affiliations": [], "homepage": null, "paperCount": + 1, "citationCount": 20, "hIndex": 1, "papers": [{"paperId": "79213c367b3d726dde1688450667417d97db25ab", + "externalIds": {"MAG": "3103298935", "ArXiv": "1911.09210", "DOI": "10.1088/1361-6471/AB8E94", + "CorpusId": 208202328}, "corpusId": 208202328, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/79213c367b3d726dde1688450667417d97db25ab", "title": "Convolutional neural networks for direct detection of dark matter", "abstract": "The XENON1T experiment uses a time projection chamber (TPC) with liquid Xenon to search for Weakly Interacting Massive Particles (WIMPs), a @@ -3621,11 +3894,11 @@ interactions: of the detector. We find that the CNN can distinguish between the dominant background events (ER) and 500 GeV WIMP events with a recall of 93.4\\%, precision of 81.2\\% and an accuracy of 87.2\\%.", "venue": "", "year": 2019, "referenceCount": - 38, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2019-11-20", "journal": {"volume": "", "name": "arXiv: + 38, "citationCount": 20, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2019-11-20", "journal": {"volume": "", "name": "arXiv: High Energy Physics - Phenomenology"}, "authors": [{"authorId": "102487483", "name": "Charanjit K. Khosa"}, {"authorId": "1422041169", "name": "Lucy Mars"}, {"authorId": "1421926987", "name": "Joel Richards"}, {"authorId": "1422035231", @@ -3644,7 +3917,7 @@ interactions: null, "paperCount": 1, "citationCount": 4, "hIndex": 1, "papers": [{"paperId": "c22f67dc5b19478694c14268dfd98d704eaad82a", "externalIds": {"DBLP": "conf/ssci/QiuYCL19", "MAG": "3007001424", "DOI": "10.1109/SSCI44817.2019.9002781", "CorpusId": - 211243114}, "url": "https://www.semanticscholar.org/paper/c22f67dc5b19478694c14268dfd98d704eaad82a", + 211243114}, "corpusId": 211243114, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c22f67dc5b19478694c14268dfd98d704eaad82a", "title": "Hybrid Chaotic Radial Basis Function Neural Oscillatory Network (HCRBFNON) for Financial Forecast and Trading System", "abstract": "Nowadays, financial prediction and trading are two major topics in financial engineering @@ -3668,22 +3941,27 @@ interactions: in terms of forecast and trading performances respectively.", "venue": "2019 IEEE Symposium Series on Computational Intelligence (SSCI)", "year": 2019, "referenceCount": 0, "citationCount": 4, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2019-12-01", "journal": {"pages": "2799-2806", "name": "2019 IEEE Symposium - Series on Computational Intelligence (SSCI)"}, "authors": [{"authorId": "1500652820", - "name": "Turing Y. F. Qiu"}, {"authorId": "1500651653", "name": "A. Y. Yuan"}, - {"authorId": "2120245520", "name": "Peter Z. Chen"}, {"authorId": "145219330", - "name": "Raymond S. T. Lee"}]}]}, {"authorId": "2167150837", "externalIds": - {}, "url": "https://www.semanticscholar.org/author/2167150837", "name": "UK - the Alan Turing Institute", "aliases": null, "affiliations": [], "homepage": - null, "paperCount": 1, "citationCount": 7, "hIndex": 1, "papers": [{"paperId": - "3888d368e05adfd689ce26f3e460e9f627b9fd2a", "externalIds": {"ArXiv": "2205.15636", - "DOI": "10.1016/j.joule.2022.05.010", "CorpusId": 249209768}, "url": "https://www.semanticscholar.org/paper/3888d368e05adfd689ce26f3e460e9f627b9fd2a", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-12-01", "journal": {"pages": "2799-2806", "name": + "2019 IEEE Symposium Series on Computational Intelligence (SSCI)"}, "authors": + [{"authorId": "1500652820", "name": "Turing Y. F. Qiu"}, {"authorId": "1500651653", + "name": "A. Y. Yuan"}, {"authorId": "2120245520", "name": "Peter Z. Chen"}, + {"authorId": "145219330", "name": "Raymond S. T. Lee"}]}]}, {"authorId": "2167150837", + "externalIds": {}, "url": "https://www.semanticscholar.org/author/2167150837", + "name": "UK the Alan Turing Institute", "aliases": null, "affiliations": [], + "homepage": null, "paperCount": 1, "citationCount": 9, "hIndex": 1, "papers": + [{"paperId": "3888d368e05adfd689ce26f3e460e9f627b9fd2a", "externalIds": {"ArXiv": + "2205.15636", "DOI": "10.1016/j.joule.2022.05.010", "CorpusId": 249209768}, + "corpusId": 249209768, "publicationVenue": {"id": "cac3b777-0365-4ba3-a881-7c8dbd0cd699", + "name": "Joule", "type": "journal", "issn": "2542-4351", "url": "https://www.cell.com/joule/home", + "alternate_urls": ["https://www.sciencedirect.com/journal/joule/issues", "https://www.journals.elsevier.com/joule"]}, + "url": "https://www.semanticscholar.org/paper/3888d368e05adfd689ce26f3e460e9f627b9fd2a", "title": "Overcoming the disconnect between energy system and climate modeling", "abstract": null, "venue": "Joule", "year": 2022, "referenceCount": 121, "citationCount": - 8, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], + 9, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://arxiv.org/pdf/2205.15636", "status": null}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-05-31", "journal": {"name": "Joule"}, "authors": @@ -3722,7 +4000,8 @@ interactions: "name": "Andrew Duncan The Alan Turing Institute", "aliases": null, "affiliations": [], "homepage": null, "paperCount": 1, "citationCount": 0, "hIndex": 0, "papers": [{"paperId": "4289fae965cb712820ee4f0147df0fb178b9c682", "externalIds": {"ArXiv": - "2201.05233", "CorpusId": 251719226}, "url": "https://www.semanticscholar.org/paper/4289fae965cb712820ee4f0147df0fb178b9c682", + "2201.05233", "CorpusId": 251719226}, "corpusId": 251719226, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4289fae965cb712820ee4f0147df0fb178b9c682", "title": "Density reconstruction from schlieren images through Bayesian nonparametric models", "abstract": "This study proposes a radically alternate approach for extracting quantitative information from schlieren images. The method uses @@ -3732,13 +4011,14 @@ interactions: taken from a wind tunnel sting model, a supersonic aircraft in \ufb02ight, and a high-order numerical shock tube simulation.", "venue": "", "year": 2022, "referenceCount": 49, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2022-01-13", "journal": null, - "authors": [{"authorId": "103344434", "name": "B. Ubald"}, {"authorId": "3100589", - "name": "P. Seshadri"}, {"authorId": "2182291503", "name": "Andrew Duncan - The Alan Turing Institute"}, {"authorId": "145955717", "name": "I. -. London"}]}]}]} + false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-01-13", + "journal": null, "authors": [{"authorId": "103344434", "name": "B. Ubald"}, + {"authorId": "3100589", "name": "P. Seshadri"}, {"authorId": "2182291503", + "name": "Andrew Duncan The Alan Turing Institute"}, {"authorId": "145955717", + "name": "I. -. London"}]}]}]} ' headers: @@ -3747,31 +4027,31 @@ interactions: Connection: - keep-alive Content-Length: - - '303952' + - '326505' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:02:50 GMT + - Tue, 03 Jan 2023 20:49:33 GMT Via: - 1.1 80e150c3cd619899dc38fb20936dc086.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - AGR3a5fEd0pTfEwWGG99KxpdSbmNz30pGULWllrEmkFncHOFEuZ9qQ== + - ePOIdzWCk_xV1OkN57M4PPnENx0IiDu5-4sH4nqE9DPEJy6H87huZw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - denIbE55vHcFuvw= + - eLwygEGgvHcFfPw= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '303952' + - '326505' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:02:49 GMT + - Tue, 03 Jan 2023 20:49:33 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 3a349dfe-3178-477e-8964-5a454e3804e3 + - d7c077d5-23fb-41f2-b915-41107b5935e0 status: code: 200 message: OK diff --git a/tests/data/test_search_paper.yaml b/tests/data/test_search_paper.yaml index c82c0a6..384edc8 100644 --- a/tests/data/test_search_paper.yaml +++ b/tests/data/test_search_paper.yaml @@ -11,12 +11,12 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=0&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=0&limit=100 response: body: - string: '{"total": 133389, "offset": 0, "next": 100, "data": [{"paperId": "6b0f06617d9f5256a80ed62d9398acb92a55a6bd", + string: '{"total": 133751, "offset": 0, "next": 100, "data": [{"paperId": "6b0f06617d9f5256a80ed62d9398acb92a55a6bd", "externalIds": {"MAG": "136785111", "DOI": "10.1098/rspa.1985.0070", "CorpusId": - 1438116}, "url": "https://www.semanticscholar.org/paper/6b0f06617d9f5256a80ed62d9398acb92a55a6bd", + 1438116}, "corpusId": 1438116, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b0f06617d9f5256a80ed62d9398acb92a55a6bd", "title": "Quantum theory, the Church\u2013Turing principle and the universal quantum computer", "abstract": "It is argued that underlying the Church\u2013Turing hypothesis there is an implicit physical assertion. Here, this assertion is @@ -41,16 +41,17 @@ interactions: or \u2018knowledge\u2019 in a physical system than does classical complexity theory.", "venue": "Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences", "year": 1985, "referenceCount": 19, "citationCount": - 4048, "influentialCitationCount": 210, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1985-07-08", "journal": {"name": "Proceedings of the Royal Society of London. - A. Mathematical and Physical Sciences", "pages": "117 - 97", "volume": "400"}, - "authors": [{"authorId": "145346874", "name": "D. Deutsch"}]}, {"paperId": - "c3823aacea60bc1f2cabb9283144690a3d015db5", "externalIds": {"ArXiv": "1410.5401", - "DBLP": "journals/corr/GravesWD14", "MAG": "2950527759", "CorpusId": 15299054}, - "url": "https://www.semanticscholar.org/paper/c3823aacea60bc1f2cabb9283144690a3d015db5", + 4119, "influentialCitationCount": 215, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1985-07-08", "journal": {"name": "Proceedings of + the Royal Society of London. A. Mathematical and Physical Sciences", "pages": + "117 - 97", "volume": "400"}, "authors": [{"authorId": "145346874", "name": + "D. Deutsch"}]}, {"paperId": "c3823aacea60bc1f2cabb9283144690a3d015db5", "externalIds": + {"ArXiv": "1410.5401", "DBLP": "journals/corr/GravesWD14", "MAG": "2950527759", + "CorpusId": 15299054}, "corpusId": 15299054, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c3823aacea60bc1f2cabb9283144690a3d015db5", "title": "Neural Turing Machines", "abstract": "We extend the capabilities of neural networks by coupling them to external memory resources, which they can interact with by attentional processes. The combined system is analogous @@ -58,16 +59,17 @@ interactions: allowing it to be efficiently trained with gradient descent. Preliminary results demonstrate that Neural Turing Machines can infer simple algorithms such as copying, sorting, and associative recall from input and output examples.", - "venue": "ArXiv", "year": 2014, "referenceCount": 44, "citationCount": 1764, - "influentialCitationCount": 222, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-10-20", "journal": - {"name": "ArXiv", "volume": "abs/1410.5401"}, "authors": [{"authorId": "1753223", - "name": "A. Graves"}, {"authorId": "89504302", "name": "Greg Wayne"}, {"authorId": - "1841008", "name": "Ivo Danihelka"}]}, {"paperId": "7cbc2a7843411a1768ab762930707af0a3c33a19", - "externalIds": {"DBLP": "journals/corr/abs-2201-11990", "ArXiv": "2201.11990", - "CorpusId": 246411325}, "url": "https://www.semanticscholar.org/paper/7cbc2a7843411a1768ab762930707af0a3c33a19", + "venue": "ArXiv", "year": 2014, "referenceCount": 44, "citationCount": 1772, + "influentialCitationCount": 222, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-10-20", "journal": {"name": "ArXiv", "volume": "abs/1410.5401"}, "authors": + [{"authorId": "1753223", "name": "A. Graves"}, {"authorId": "89504302", "name": + "Greg Wayne"}, {"authorId": "1841008", "name": "Ivo Danihelka"}]}, {"paperId": + "7cbc2a7843411a1768ab762930707af0a3c33a19", "externalIds": {"DBLP": "journals/corr/abs-2201-11990", + "ArXiv": "2201.11990", "CorpusId": 246411325}, "corpusId": 246411325, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7cbc2a7843411a1768ab762930707af0a3c33a19", "title": "Using DeepSpeed and Megatron to Train Megatron-Turing NLG 530B, A Large-Scale Generative Language Model", "abstract": "Pretrained general-purpose language models can achieve state-of-the-art accuracies in various natural @@ -88,27 +90,32 @@ interactions: NLP benchmarks and establishes new state-of-the-art results. We believe that our contributions will help further the development of large-scale training infrastructures, large-scale language models, and natural language generations.", - "venue": "ArXiv", "year": 2022, "referenceCount": 69, "citationCount": 156, - "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-28", "journal": - {"name": "ArXiv", "volume": "abs/2201.11990"}, "authors": [{"authorId": "2110486618", - "name": "Shaden Smith"}, {"authorId": "66870756", "name": "M. Patwary"}, {"authorId": - "2172095", "name": "Brandon Norick"}, {"authorId": "3081566", "name": "P. - LeGresley"}, {"authorId": "32817044", "name": "Samyam Rajbhandari"}, {"authorId": - "48991386", "name": "J. Casper"}, {"authorId": "49293070", "name": "Zhun Liu"}, - {"authorId": "9358910", "name": "Shrimai Prabhumoye"}, {"authorId": "30647302", - "name": "George Zerveas"}, {"authorId": "3111334", "name": "V. Korthikanti"}, - {"authorId": "2151686157", "name": "Elton Zhang"}, {"authorId": "48422824", - "name": "Rewon Child"}, {"authorId": "3394222", "name": "Reza Yazdani Aminabadi"}, - {"authorId": "2745589", "name": "J. Bernauer"}, {"authorId": "50706785", "name": - "Xia Song"}, {"authorId": "1911755", "name": "M. Shoeybi"}, {"authorId": "2145020341", - "name": "Yuxiong He"}, {"authorId": "122523478", "name": "Michael Houston"}, - {"authorId": "40070335", "name": "Saurabh Tiwary"}, {"authorId": "2301680", - "name": "Bryan Catanzaro"}]}, {"paperId": "9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", - "externalIds": {"MAG": "2803058542", "DOI": "10.1126/science.aar6308", "CorpusId": - 19100947, "PubMed": "29724951"}, "url": "https://www.semanticscholar.org/paper/9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", + "venue": "ArXiv", "year": 2022, "referenceCount": 69, "citationCount": 161, + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-01-28", "journal": {"name": "ArXiv", "volume": "abs/2201.11990"}, "authors": + [{"authorId": "2110486618", "name": "Shaden Smith"}, {"authorId": "66870756", + "name": "M. Patwary"}, {"authorId": "2172095", "name": "Brandon Norick"}, + {"authorId": "3081566", "name": "P. LeGresley"}, {"authorId": "32817044", + "name": "Samyam Rajbhandari"}, {"authorId": "48991386", "name": "J. Casper"}, + {"authorId": "49293070", "name": "Zhun Liu"}, {"authorId": "9358910", "name": + "Shrimai Prabhumoye"}, {"authorId": "30647302", "name": "George Zerveas"}, + {"authorId": "3111334", "name": "V. Korthikanti"}, {"authorId": "2151686157", + "name": "Elton Zhang"}, {"authorId": "48422824", "name": "Rewon Child"}, {"authorId": + "3394222", "name": "Reza Yazdani Aminabadi"}, {"authorId": "2745589", "name": + "J. Bernauer"}, {"authorId": "50706785", "name": "Xia Song"}, {"authorId": + "1911755", "name": "M. Shoeybi"}, {"authorId": "2145020341", "name": "Yuxiong + He"}, {"authorId": "122523478", "name": "Michael Houston"}, {"authorId": "40070335", + "name": "Saurabh Tiwary"}, {"authorId": "2301680", "name": "Bryan Catanzaro"}]}, + {"paperId": "9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", "externalIds": {"MAG": + "2803058542", "DOI": "10.1126/science.aar6308", "CorpusId": 19100947, "PubMed": + "29724951"}, "corpusId": 19100947, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", "title": "Polyamide membranes with nanoscale Turing structures for water purification", "abstract": "Turing structures at the nanoscale Turing structures arise when imbalances in diffusion rates make a stable steady-state system sensitive @@ -130,19 +137,23 @@ interactions: that surpasses the upper-bound line of traditional desalination membranes. Furthermore, we show the existence of high water permeability sites in the Turing structures, where water transport through the membranes is enhanced.", - "venue": "Science", "year": 2018, "referenceCount": 35, "citationCount": 653, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Materials - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-05-04", "journal": {"name": "Science", "pages": "518 - - 521", "volume": "360"}, "authors": [{"authorId": "2343556", "name": "Zhe - Tan"}, {"authorId": "153064608", "name": "Sheng-Gang Chen"}, {"authorId": - "18239828", "name": "Xinsheng Peng"}, {"authorId": "2143835330", "name": "Lin - Zhang"}, {"authorId": "2148805809", "name": "Cong-jie Gao"}]}, {"paperId": - "bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "externalIds": {"ArXiv": "1908.07219", - "MAG": "2999960596", "DOI": "10.1098/rsif.2019.0621", "CorpusId": 201103943, - "PubMed": "31937231"}, "url": "https://www.semanticscholar.org/paper/bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", + "venue": "Science", "year": 2018, "referenceCount": 35, "citationCount": 665, + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-05-04", "journal": + {"name": "Science", "pages": "518 - 521", "volume": "360"}, "authors": [{"authorId": + "2343556", "name": "Zhe Tan"}, {"authorId": "153064608", "name": "Sheng-Gang + Chen"}, {"authorId": "18239828", "name": "Xinsheng Peng"}, {"authorId": "2143835330", + "name": "Lin Zhang"}, {"authorId": "2148805809", "name": "Cong-jie Gao"}]}, + {"paperId": "bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "externalIds": {"ArXiv": + "1908.07219", "MAG": "2999960596", "DOI": "10.1098/rsif.2019.0621", "CorpusId": + 201103943, "PubMed": "31937231"}, "corpusId": 201103943, "publicationVenue": + {"id": "f6537e0e-c3a9-4de5-bd36-19eda0434065", "name": "Journal of the Royal + Society Interface", "type": "journal", "alternate_names": ["J R Soc Interface"], + "issn": "1742-5662", "url": "http://rsif.royalsocietypublishing.org/"}, "url": + "https://www.semanticscholar.org/paper/bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "title": "From one pattern into another: analysis of Turing patterns in heterogeneous domains via WKBJ", "abstract": "Pattern formation from homogeneity is well studied, but less is known concerning symmetry-breaking instabilities in heterogeneous @@ -166,17 +177,23 @@ interactions: original thesis to a far wider and more realistic class of systems.", "venue": "Journal of the Royal Society Interface", "year": 2019, "referenceCount": 135, "citationCount": 38, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-08-20", "journal": {"name": "Journal of the Royal - Society Interface", "volume": "17"}, "authors": [{"authorId": "22256586", - "name": "Andrew L. Krause"}, {"authorId": "2691918", "name": "V. Klika"}, - {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "2662569", "name": - "E. Gaffney"}]}, {"paperId": "339c6e6d46836c173fb6a23b493c724896d4cc70", "externalIds": - {"ArXiv": "1708.07149", "MAG": "2963527228", "DBLP": "journals/corr/abs-1708-07149", - "ACL": "P17-1103", "DOI": "10.18653/v1/P17-1103", "CorpusId": 1880070}, "url": - "https://www.semanticscholar.org/paper/339c6e6d46836c173fb6a23b493c724896d4cc70", + "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsif.2019.0621", + "status": "HYBRID"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-08-20", "journal": {"name": "Journal + of the Royal Society Interface", "volume": "17"}, "authors": [{"authorId": + "22256586", "name": "Andrew L. Krause"}, {"authorId": "2691918", "name": "V. + Klika"}, {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "2662569", + "name": "E. Gaffney"}]}, {"paperId": "339c6e6d46836c173fb6a23b493c724896d4cc70", + "externalIds": {"ArXiv": "1708.07149", "MAG": "2963527228", "DBLP": "journals/corr/abs-1708-07149", + "ACL": "P17-1103", "DOI": "10.18653/v1/P17-1103", "CorpusId": 1880070}, "corpusId": + 1880070, "publicationVenue": {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", + "name": "Annual Meeting of the Association for Computational Linguistics", + "type": "conference", "alternate_names": ["Annu Meet Assoc Comput Linguistics", + "Meeting of the Association for Computational Linguistics", "ACL", "Meet Assoc + Comput Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, + "url": "https://www.semanticscholar.org/paper/339c6e6d46836c173fb6a23b493c724896d4cc70", "title": "Towards an Automatic Turing Test: Learning to Evaluate Dialogue Responses", "abstract": "Automatically evaluating the quality of dialogue responses for unstructured domains is a challenging problem. Unfortunately, @@ -194,7 +211,8 @@ interactions: training, an important step for automatic dialogue evaluation.", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2017, "referenceCount": 57, "citationCount": 302, "influentialCitationCount": - 54, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 54, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.aclweb.org/anthology/P17-1103.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-02-17", "journal": {"name": "ArXiv", @@ -204,20 +222,21 @@ interactions: Angelard-Gontier"}, {"authorId": "1751762", "name": "Yoshua Bengio"}, {"authorId": "145134886", "name": "Joelle Pineau"}]}, {"paperId": "ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", "externalIds": {"MAG": "2808618339", "DOI": "10.17863/CAM.42246", "CorpusId": - 46998004}, "url": "https://www.semanticscholar.org/paper/ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", + 46998004}, "corpusId": 46998004, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", "title": "Turing: A Language for Flexible Probabilistic Inference", "abstract": "HG and ZG acknowledge support from the Alan Turing Institute (EPSRC Grant EP/N510129/1) and EPSRC Grant EP/N014162/1, and donations from Google and Microsoft Research.", "venue": "", "year": 2018, "referenceCount": 21, "citationCount": - 151, "influentialCitationCount": 18, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "1682-1690", "volume": ""}, "authors": [{"authorId": "49365036", - "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, {"authorId": - "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", + 153, "influentialCitationCount": 18, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "1682-1690", "volume": ""}, "authors": [{"authorId": + "49365036", "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, + {"authorId": "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", "externalIds": {"MAG": "2920798074", "ArXiv": "1903.07486", "DBLP": "journals/corr/abs-1903-07486", - "CorpusId": 81981887}, "url": "https://www.semanticscholar.org/paper/01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", + "CorpusId": 81981887}, "corpusId": 81981887, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", "title": "Dissecting the NVidia Turing T4 GPU via Microbenchmarking", "abstract": "In 2019, the rapid rate at which GPU manufacturers refresh their designs, coupled with their reluctance to disclose microarchitectural details, is still @@ -243,16 +262,19 @@ interactions: \nMany of our findings are novel, published here for the first time. All of them can guide high-performance software developers get closer to the GPU''s peak performance.", "venue": "ArXiv", "year": 2019, "referenceCount": 8, "citationCount": - 63, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-03-18", "journal": - {"name": "ArXiv", "volume": "abs/1903.07486"}, "authors": [{"authorId": "48813086", - "name": "Zhe Jia"}, {"authorId": "138304679", "name": "Marco Maggioni"}, {"authorId": - "2109849147", "name": "Jeffrey K. Smith"}, {"authorId": "3277273", "name": - "D. Scarpazza"}]}, {"paperId": "be17d3f111f31d97f8b61499d5aae274043e9f14", + 64, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2019-03-18", "journal": {"name": "ArXiv", "volume": "abs/1903.07486"}, "authors": + [{"authorId": "48813086", "name": "Zhe Jia"}, {"authorId": "138304679", "name": + "Marco Maggioni"}, {"authorId": "2109849147", "name": "Jeffrey K. Smith"}, + {"authorId": "3277273", "name": "D. Scarpazza"}]}, {"paperId": "be17d3f111f31d97f8b61499d5aae274043e9f14", "externalIds": {"DBLP": "journals/corr/abs-1901-03429", "MAG": "2962749806", - "ArXiv": "1901.03429", "CorpusId": 57825721}, "url": "https://www.semanticscholar.org/paper/be17d3f111f31d97f8b61499d5aae274043e9f14", + "ArXiv": "1901.03429", "CorpusId": 57825721}, "corpusId": 57825721, "publicationVenue": + {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", "name": "International Conference + on Learning Representations", "type": "conference", "alternate_names": ["Int + Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, "url": "https://www.semanticscholar.org/paper/be17d3f111f31d97f8b61499d5aae274043e9f14", "title": "On the Turing Completeness of Modern Neural Network Architectures", "abstract": "Alternatives to recurrent neural networks, in particular, architectures based on attention or convolutions, have been gaining momentum for processing @@ -267,30 +289,37 @@ interactions: minimal sets of elements needed to obtain these completeness results.", "venue": "International Conference on Learning Representations", "year": 2019, "referenceCount": 23, "citationCount": 58, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-01-10", "journal": - {"name": "ArXiv", "volume": "abs/1901.03429"}, "authors": [{"authorId": "144022533", - "name": "Jorge P\u00e9rez"}, {"authorId": "66941060", "name": "Javier Marinkovic"}, - {"authorId": "35106192", "name": "P. Barcel\u00f3"}]}, {"paperId": "74e281384ed8340956989bc2a93f8387458a09bf", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-01-10", "journal": {"name": "ArXiv", "volume": "abs/1901.03429"}, + "authors": [{"authorId": "144022533", "name": "Jorge P\u00e9rez"}, {"authorId": + "66941060", "name": "Javier Marinkovic"}, {"authorId": "35106192", "name": + "P. Barcel\u00f3"}]}, {"paperId": "74e281384ed8340956989bc2a93f8387458a09bf", "externalIds": {"PubMedCentral": "6484223", "MAG": "2938327216", "DOI": "10.1038/s41467-018-08212-8", - "CorpusId": 58014273, "PubMed": "30651543"}, "url": "https://www.semanticscholar.org/paper/74e281384ed8340956989bc2a93f8387458a09bf", + "CorpusId": 58014273, "PubMed": "30651543"}, "corpusId": 58014273, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/74e281384ed8340956989bc2a93f8387458a09bf", "title": "Image-based modeling of kidney branching morphogenesis reveals GDNF-RET based Turing-type mechanism and pattern-modulating WNT11 feedback", "abstract": null, "venue": "Nature Communications", "year": 2019, "referenceCount": 85, - "citationCount": 47, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-01-16", "journal": {"name": "Nature Communications", - "volume": "10"}, "authors": [{"authorId": "2261511", "name": "D. Menshykau"}, - {"authorId": "49174222", "name": "Odyss\u00e9 Michos"}, {"authorId": "145185799", - "name": "C. Lang"}, {"authorId": "52261411", "name": "L. Conrad"}, {"authorId": - "2149854", "name": "A. McMahon"}, {"authorId": "2962540", "name": "D. Iber"}]}, - {"paperId": "d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "externalIds": {"MAG": - "2808367373", "DOI": "10.1073/pnas.1720770115", "CorpusId": 48357941, "PubMed": - "29891706"}, "url": "https://www.semanticscholar.org/paper/d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", + "citationCount": 48, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.nature.com/articles/s41467-018-08212-8.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-01-16", "journal": {"name": "Nature + Communications", "volume": "10"}, "authors": [{"authorId": "2261511", "name": + "D. Menshykau"}, {"authorId": "49174222", "name": "Odyss\u00e9 Michos"}, {"authorId": + "145185799", "name": "C. Lang"}, {"authorId": "52261411", "name": "L. Conrad"}, + {"authorId": "2149854", "name": "A. McMahon"}, {"authorId": "2962540", "name": + "D. Iber"}]}, {"paperId": "d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "externalIds": + {"MAG": "2808367373", "DOI": "10.1073/pnas.1720770115", "CorpusId": 48357941, + "PubMed": "29891706"}, "corpusId": 48357941, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "title": "Stochastic Turing patterns in a synthetic bacterial population", "abstract": "Significance In 1952, Alan Turing proposed that biological morphogenesis could arise from a dynamical process in reaction systems with a rapidly diffusing @@ -327,8 +356,9 @@ interactions: patterns. These findings provide the groundwork for a unified picture of biological morphogenesis, arising from a combination of stochastic gene expression and dynamical instabilities.", "venue": "Proceedings of the National Academy of - Sciences", "year": 2018, "referenceCount": 51, "citationCount": 118, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + Sciences", "year": 2018, "referenceCount": 51, "citationCount": 119, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/115/26/6572.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-11", "journal": {"name": "Proceedings @@ -338,7 +368,12 @@ interactions: "4540871", "name": "Nicholas A. DeLateur"}, {"authorId": "3549131", "name": "N. Goldenfeld"}, {"authorId": "144224740", "name": "R. Weiss"}]}, {"paperId": "12c00512e99b88bf01bbd8662324fa3b61a73347", "externalIds": {"MAG": "2947165724", - "DOI": "10.11948/2156-907X.20190015", "CorpusId": 191165780}, "url": "https://www.semanticscholar.org/paper/12c00512e99b88bf01bbd8662324fa3b61a73347", + "DOI": "10.11948/2156-907X.20190015", "CorpusId": 191165780}, "corpusId": + 191165780, "publicationVenue": {"id": "4fd93153-bfee-4b6a-a124-36e8b51b8316", + "name": "The Journal of Applied Analysis and Computation", "type": "journal", + "alternate_names": ["J Appl Anal Comput", "Journal of Applied Analysis and + Computation"], "issn": "2156-907X", "url": "http://jaac-online.com/"}, "url": + "https://www.semanticscholar.org/paper/12c00512e99b88bf01bbd8662324fa3b61a73347", "title": "TURING-HOPF BIFURCATION IN THE REACTION-DIFFUSION SYSTEM WITH DELAY AND APPLICATION TO A DIFFUSIVE PREDATOR-PREY MODEL", "abstract": "The interactions of diffusion-driven Turing instability and delayinduced Hopf bifurcation always @@ -355,21 +390,26 @@ interactions: inhomogeneous periodic solutions, coexistence of two stable spaially inhomogeneous steady states and the transition from one kind of spatiotemporal patterns to another are found.", "venue": "The Journal of Applied Analysis and Computation", - "year": 2019, "referenceCount": 52, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Journal of Applied Analysis & Computation"}, "authors": + "year": 2019, "referenceCount": 52, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Journal of Applied Analysis & Computation"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, {"paperId": "6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", "externalIds": {"MAG": "2906157279", "DBLP": "journals/cacm/CopelandS19", "DOI": "10.1145/3198448", - "CorpusId": 56894392}, "url": "https://www.semanticscholar.org/paper/6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", + "CorpusId": 56894392}, "corpusId": 56894392, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", "title": "The Church-Turing thesis", "abstract": "In its original form, the Church-Turing thesis concerned computation as Alan Turing and Alonzo Church used the term in 1936---human computation.", "venue": "Communications of the ACM", "year": 2007, "referenceCount": 116, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3198448", + "status": "CLOSED"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2007-09-05", "journal": {"name": "Communications of the ACM", "pages": "66 @@ -377,17 +417,25 @@ interactions: Copeland"}, {"authorId": "1742013", "name": "Oron Shagrir"}]}, {"paperId": "6cda6bf951da823ab8673e659bdca13b9928ed47", "externalIds": {"MAG": "2982236015", "DBLP": "conf/hotchips/Burgess19", "DOI": "10.1109/HOTCHIPS.2019.8875651", - "CorpusId": 204822166}, "url": "https://www.semanticscholar.org/paper/6cda6bf951da823ab8673e659bdca13b9928ed47", + "CorpusId": 204822166}, "corpusId": 204822166, "publicationVenue": {"id": + "6bfb6bd4-4726-46b3-9438-3128e06a28a1", "name": "IEEE Hot Chips Symposium", + "type": "conference", "alternate_names": ["HCS", "IEEE Hot Chip Symp"], "url": + "https://en.wikipedia.org/wiki/Hot_Chips"}, "url": "https://www.semanticscholar.org/paper/6cda6bf951da823ab8673e659bdca13b9928ed47", "title": "RTX ON \u2013 The NVIDIA TURING GPU", "abstract": null, "venue": "IEEE Hot Chips Symposium", "year": 2019, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2019-08-01", "journal": {"name": "2019 IEEE Hot Chips 31 Symposium (HCS)", - "pages": "1-27"}, "authors": [{"authorId": "2059912582", "name": "John Burgess"}]}, - {"paperId": "b0e69af8e8f7f2501cb26290e57a8563dba5d178", "externalIds": {"DBLP": - "journals/ijns/WuBPPN18", "MAG": "2792897601", "DOI": "10.1142/S0129065718500132", - "CorpusId": 46888001, "PubMed": "29759014"}, "url": "https://www.semanticscholar.org/paper/b0e69af8e8f7f2501cb26290e57a8563dba5d178", + 43, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-08-01", "journal": {"name": "2019 IEEE Hot Chips + 31 Symposium (HCS)", "pages": "1-27"}, "authors": [{"authorId": "2059912582", + "name": "John Burgess"}]}, {"paperId": "b0e69af8e8f7f2501cb26290e57a8563dba5d178", + "externalIds": {"DBLP": "journals/ijns/WuBPPN18", "MAG": "2792897601", "DOI": + "10.1142/S0129065718500132", "CorpusId": 46888001, "PubMed": "29759014"}, + "corpusId": 46888001, "publicationVenue": {"id": "a042b147-151c-4d51-97c7-40b8434b377a", + "name": "International Journal of Neural Systems", "type": "journal", "alternate_names": + ["Int J Neural Syst"], "issn": "0129-0657", "url": "http://www.worldscinet.com/ijns", + "alternate_urls": ["http://www.worldscinet.com/ijns/ijns.shtml"]}, "url": + "https://www.semanticscholar.org/paper/b0e69af8e8f7f2501cb26290e57a8563dba5d178", "title": "Simplified and Yet Turing Universal Spiking Neural P Systems with Communication on Request", "abstract": "Spiking neural P systems are a class of third generation neural networks belonging to the framework of membrane @@ -405,18 +453,22 @@ interactions: that SNQ P systems functioning as number generating devices with one type of spike and four unbounded neurons are Turing universal.", "venue": "International Journal of Neural Systems", "year": 2018, "referenceCount": 104, "citationCount": - 70, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-08-26", "journal": {"name": "International - journal of neural systems", "pages": "\n 1850013\n ", "volume": - "28 8"}, "authors": [{"authorId": "3361824", "name": "Tingfang Wu"}, {"authorId": - "51940709", "name": "Florin-Daniel B\u00eelb\u00eee"}, {"authorId": "143936370", - "name": "A. Paun"}, {"authorId": "7356533", "name": "L. Pan"}, {"authorId": - "2614610", "name": "Ferrante Neri"}]}, {"paperId": "bef4ae975a0068484cfa62d3b006991d68716c04", + 70, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dora.dmu.ac.uk/bitstream/2086/15523/1/SNQP_one.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-08-26", "journal": + {"name": "International journal of neural systems", "pages": "\n 1850013\n ", + "volume": "28 8"}, "authors": [{"authorId": "3361824", "name": "Tingfang Wu"}, + {"authorId": "51940709", "name": "Florin-Daniel B\u00eelb\u00eee"}, {"authorId": + "143936370", "name": "A. Paun"}, {"authorId": "7356533", "name": "L. Pan"}, + {"authorId": "2614610", "name": "Ferrante Neri"}]}, {"paperId": "bef4ae975a0068484cfa62d3b006991d68716c04", "externalIds": {"MAG": "2404399993", "DOI": "10.1109/JAS.2016.7471613", "CorpusId": - 35991085}, "url": "https://www.semanticscholar.org/paper/bef4ae975a0068484cfa62d3b006991d68716c04", + 35991085}, "corpusId": 35991085, "publicationVenue": {"id": "ef1356d5-69c7-484e-a110-3efae1e93ecc", + "name": "IEEE/CAA Journal of Automatica Sinica", "type": "journal", "alternate_names": + ["IEEE/CAA J Autom Sin"], "issn": "2329-9266", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=6570654", + "alternate_urls": ["http://www.ieee-jas.org/"]}, "url": "https://www.semanticscholar.org/paper/bef4ae975a0068484cfa62d3b006991d68716c04", "title": "Where does AlphaGo go: from church-turing thesis to AlphaGo thesis and beyond", "abstract": "An investigation on the impact and significance of the AlphaGo vs. Lee Sedol Go match is conducted, and concludes with a conjecture @@ -431,20 +483,20 @@ interactions: thesis ensure the technical soundness of the parallel intelligence approach for intelligent control and management of complex systems and knowledge automation.", "venue": "IEEE/CAA Journal of Automatica Sinica", "year": 2016, "referenceCount": - 39, "citationCount": 189, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-05-19", - "journal": {"name": "IEEE/CAA Journal of Automatica Sinica", "pages": "113-120", - "volume": "3"}, "authors": [{"authorId": "2148954297", "name": "Fei-yue Wang"}, - {"authorId": "2155659664", "name": "J. Zhang"}, {"authorId": "2481151", "name": - "Xinhu Zheng"}, {"authorId": "153315870", "name": "Xiao Wang"}, {"authorId": - "144057336", "name": "Yong Yuan"}, {"authorId": "2142311", "name": "Xiaoxiao - Dai"}, {"authorId": "2159191766", "name": "Jie Zhang"}, {"authorId": "2119062499", - "name": "Liuqing Yang"}]}, {"paperId": "050da5d159fb0dd96143948e1cffeb3dec814673", + 39, "citationCount": 192, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-05-19", "journal": {"name": "IEEE/CAA Journal of Automatica Sinica", + "pages": "113-120", "volume": "3"}, "authors": [{"authorId": "2148954297", + "name": "Fei-yue Wang"}, {"authorId": "2155659664", "name": "J. Zhang"}, {"authorId": + "2481151", "name": "Xinhu Zheng"}, {"authorId": "153315870", "name": "Xiao + Wang"}, {"authorId": "144057336", "name": "Yong Yuan"}, {"authorId": "2142311", + "name": "Xiaoxiao Dai"}, {"authorId": "2159191766", "name": "Jie Zhang"}, + {"authorId": "2119062499", "name": "Liuqing Yang"}]}, {"paperId": "050da5d159fb0dd96143948e1cffeb3dec814673", "externalIds": {"DBLP": "journals/pnas/GemanGHY15", "MAG": "1983927101", "DOI": - "10.1073/pnas.1422953112", "CorpusId": 8687210, "PubMed": "25755262"}, "url": - "https://www.semanticscholar.org/paper/050da5d159fb0dd96143948e1cffeb3dec814673", + "10.1073/pnas.1422953112", "CorpusId": 8687210, "PubMed": "25755262"}, "corpusId": + 8687210, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/050da5d159fb0dd96143948e1cffeb3dec814673", "title": "Visual Turing test for computer vision systems", "abstract": "Significance In computer vision, as in other fields of artificial intelligence, the methods of evaluation largely define the scientific effort. Most current evaluations @@ -474,17 +526,22 @@ interactions: through an exploration of its properties, and on to its relationships with other uniquely instantiated objects.", "venue": "Proceedings of the National Academy of Sciences", "year": 2015, "referenceCount": 29, "citationCount": - 260, "influentialCitationCount": 17, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-03-09", "journal": {"name": "Proceedings - of the National Academy of Sciences", "pages": "3618 - 3623", "volume": "112"}, - "authors": [{"authorId": "1707642", "name": "D. Geman"}, {"authorId": "3194361", - "name": "S. Geman"}, {"authorId": "9588317", "name": "Neil Hallonquist"}, - {"authorId": "1721284", "name": "L. Younes"}]}, {"paperId": "c091bf5bc6e02555b222fe4e15b6108583c14510", - "externalIds": {"MAG": "2963527277", "ArXiv": "1708.09645", "DOI": "10.1103/PhysRevX.8.021071", - "CorpusId": 88511276}, "url": "https://www.semanticscholar.org/paper/c091bf5bc6e02555b222fe4e15b6108583c14510", + 260, "influentialCitationCount": 17, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.pnas.org/content/pnas/112/12/3618.full.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-09", "journal": + {"name": "Proceedings of the National Academy of Sciences", "pages": "3618 + - 3623", "volume": "112"}, "authors": [{"authorId": "1707642", "name": "D. + Geman"}, {"authorId": "3194361", "name": "S. Geman"}, {"authorId": "9588317", + "name": "Neil Hallonquist"}, {"authorId": "1721284", "name": "L. Younes"}]}, + {"paperId": "c091bf5bc6e02555b222fe4e15b6108583c14510", "externalIds": {"MAG": + "2963527277", "ArXiv": "1708.09645", "DOI": "10.1103/PhysRevX.8.021071", "CorpusId": + 88511276}, "corpusId": 88511276, "publicationVenue": {"id": "98eedf55-1e67-4c3d-a25d-79861b87ae04", + "name": "Physical Review X", "type": "journal", "alternate_names": ["Phys + Rev X"], "issn": "2160-3308", "url": "https://journals.aps.org/prx/", "alternate_urls": + ["http://journals.aps.org/prx/", "http://prx.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/c091bf5bc6e02555b222fe4e15b6108583c14510", "title": "Key Features of Turing Systems are Determined Purely by Network Topology", "abstract": "Turing''s theory of pattern formation is a universal model for self-organization, applicable to many systems in physics, chemistry @@ -498,16 +555,22 @@ interactions: rates, the robustness of the system, and the phase relations of the molecular species.", "venue": "Physical Review X", "year": 2017, "referenceCount": 72, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2017-08-31", "journal": {"name": "Physical Review - X"}, "authors": [{"authorId": "4791189", "name": "X. Diego"}, {"authorId": - "2650134", "name": "L. Marcon"}, {"authorId": "50420075", "name": "P. Muller"}, - {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "64f47687daaa84ac1fdb1bc2f85c065007163f06", - "externalIds": {"ArXiv": "1803.05378", "MAG": "2790922269", "DOI": "10.1103/PhysRevLett.121.108301", - "CorpusId": 206316772, "PubMed": "30240244"}, "url": "https://www.semanticscholar.org/paper/64f47687daaa84ac1fdb1bc2f85c065007163f06", + "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevX.8.021071", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2017-08-31", "journal": {"name": + "Physical Review X"}, "authors": [{"authorId": "4791189", "name": "X. Diego"}, + {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "50420075", "name": + "P. Muller"}, {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": + "64f47687daaa84ac1fdb1bc2f85c065007163f06", "externalIds": {"ArXiv": "1803.05378", + "MAG": "2790922269", "DOI": "10.1103/PhysRevLett.121.108301", "CorpusId": + 206316772, "PubMed": "30240244"}, "corpusId": 206316772, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/64f47687daaa84ac1fdb1bc2f85c065007163f06", "title": "Information Thermodynamics of Turing Patterns.", "abstract": "We set up a rigorous thermodynamic description of reaction-diffusion systems driven out of equilibrium by time-dependent space-distributed chemostats. @@ -520,8 +583,9 @@ interactions: to study analytically the Turing pattern formation in a prototypical reaction-diffusion system, the one-dimensional Brusselator model, and to classify it as a genuine thermodynamic nonequilibrium phase transition.", "venue": "Physical Review - Letters", "year": 2018, "referenceCount": 58, "citationCount": 48, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + Letters", "year": 2018, "referenceCount": 58, "citationCount": 50, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1803.05378", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2018-03-14", "journal": {"name": "Physical @@ -530,7 +594,11 @@ interactions: "name": "Riccardo Rao"}, {"authorId": "40660219", "name": "M. Esposito"}]}, {"paperId": "ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", "externalIds": {"MAG": "2899964516", "PubMedCentral": "6221541", "DOI": "10.1126/sciadv.aau5484", - "CorpusId": 53237955, "PubMed": "30417097"}, "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", + "CorpusId": 53237955, "PubMed": "30417097"}, "corpusId": 53237955, "publicationVenue": + {"id": "cb30f0c9-2980-4b7d-bbcb-68fc5472b97c", "name": "Science Advances", + "type": "journal", "alternate_names": ["Sci Adv"], "issn": "2375-2548", "url": + "http://www.scienceadvances.org/", "alternate_urls": ["https://advances.sciencemag.org/"]}, + "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", "title": "An ancient Turing-like patterning mechanism regulates skin denticle development in sharks", "abstract": "Diverse skin appendages, from shark denticles to bird feathers, develop via a conserved and ancient Turing patterning mechanism. @@ -549,21 +617,26 @@ interactions: to avian feathers and mammalian hair, use this ancient and conserved system, with slight genetic modulation accounting for broad variations in patterning.", "venue": "Science Advances", "year": 2018, "referenceCount": 85, "citationCount": - 49, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-11-01", "journal": {"name": "Science Advances", "volume": "4"}, "authors": - [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": "2054529485", - "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": "A. Fletcher"}, - {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": "5588695", "name": - "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, {"paperId": - "1606575fc6f337bde02291a4bf928eb16f58d0e6", "externalIds": {"DBLP": "journals/corr/abs-1807-08518", - "ArXiv": "1807.08518", "MAG": "2950107633", "DOI": "10.1007/978-3-030-01424-7_10", - "CorpusId": 49908746}, "url": "https://www.semanticscholar.org/paper/1606575fc6f337bde02291a4bf928eb16f58d0e6", + 49, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-11-01", "journal": {"name": "Science Advances", "volume": + "4"}, "authors": [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": + "2054529485", "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": + "A. Fletcher"}, {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": + "5588695", "name": "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, + {"paperId": "1606575fc6f337bde02291a4bf928eb16f58d0e6", "externalIds": {"DBLP": + "journals/corr/abs-1807-08518", "ArXiv": "1807.08518", "MAG": "2950107633", + "DOI": "10.1007/978-3-030-01424-7_10", "CorpusId": 49908746}, "corpusId": + 49908746, "publicationVenue": {"id": "3e64b1c1-745f-4edf-bd92-b8ef122bb49c", + "name": "International Conference on Artificial Neural Networks", "type": + "conference", "alternate_names": ["Int Conf Artif Neural Netw", "ICANN"], + "url": "http://www.e-nns.org/"}, "url": "https://www.semanticscholar.org/paper/1606575fc6f337bde02291a4bf928eb16f58d0e6", "title": "Implementing Neural Turing Machines", "abstract": null, "venue": "International Conference on Artificial Neural Networks", "year": 2018, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1807.08518", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], @@ -572,7 +645,12 @@ interactions: "153247100", "name": "Mark Collier"}, {"authorId": "1781377", "name": "J. Beel"}]}, {"paperId": "fe1077f6b79e14457db77d7477a477f40f87e7e6", "externalIds": {"DBLP": "journals/neco/GulcehreCCB18", "MAG": "2751304263", "DOI": "10.1162/neco_a_01060", - "CorpusId": 4029193, "PubMed": "29381440"}, "url": "https://www.semanticscholar.org/paper/fe1077f6b79e14457db77d7477a477f40f87e7e6", + "CorpusId": 4029193, "PubMed": "29381440"}, "corpusId": 4029193, "publicationVenue": + {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", "name": "Neural Computation", + "type": "journal", "alternate_names": ["Neural Comput"], "issn": "0899-7667", + "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", "http://www.mitpressjournals.org/loi/neco", + "https://www.mitpressjournals.org/loi/neco"]}, "url": "https://www.semanticscholar.org/paper/fe1077f6b79e14457db77d7477a477f40f87e7e6", "title": "Dynamic Neural Turing Machine with Continuous and Discrete Addressing Schemes", "abstract": "We extend the neural Turing machine (NTM) model into a dynamic neural Turing machine (D-NTM) by introducing trainable address vectors. @@ -588,17 +666,71 @@ interactions: provide further experimental results on the sequential MNIST, Stanford Natural Language Inference, associative recall, and copy tasks.", "venue": "Neural Computation", "year": 2018, "referenceCount": 53, "citationCount": 38, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-03-20", "journal": {"name": "Neural Computation", "pages": "857-884", - "volume": "30"}, "authors": [{"authorId": "1854385", "name": "\u00c7aglar - G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, {"authorId": - "1979489", "name": "Kyunghyun Cho"}, {"authorId": "1751762", "name": "Yoshua - Bengio"}]}, {"paperId": "079adfb4ec1a617935f4c74763ed57ba0eedecff", "externalIds": - {"MAG": "2003095799", "DOI": "10.1126/science.1252960", "CorpusId": 8400803, - "PubMed": "25082703"}, "url": "https://www.semanticscholar.org/paper/079adfb4ec1a617935f4c74763ed57ba0eedecff", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-03-20", "journal": {"name": "Neural Computation", + "pages": "857-884", "volume": "30"}, "authors": [{"authorId": "1854385", "name": + "\u00c7aglar G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, + {"authorId": "1979489", "name": "Kyunghyun Cho"}, {"authorId": "1751762", + "name": "Yoshua Bengio"}]}, {"paperId": "7633d38345730e3ce80b03b290e41d0d1ff87697", + "externalIds": {"MAG": "2951637662", "ArXiv": "1803.00164", "DOI": "10.1007/s10884-018-9702-y", + "CorpusId": 119314930}, "corpusId": 119314930, "publicationVenue": {"id": + "0e86899d-b2fa-471e-bbc9-db59f1e85e65", "name": "Journal of Dynamics and Differential + Equations", "type": "journal", "alternate_names": ["J Dyn Differ Equ"], "issn": + "1040-7294", "url": "http://www.kluweronline.com/issn/1040-7294/contents", + "alternate_urls": ["https://link.springer.com/journal/10884"]}, "url": "https://www.semanticscholar.org/paper/7633d38345730e3ce80b03b290e41d0d1ff87697", + "title": "Turing Instability and Turing\u2013Hopf Bifurcation in Diffusive + Schnakenberg Systems with Gene Expression Time Delay", "abstract": null, "venue": + "Journal of Dynamics and Differential Equations", "year": 2018, "referenceCount": + 59, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1803.00164", "status": "GREEN"}, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-03-01", "journal": {"name": + "Journal of Dynamics and Differential Equations", "pages": "2223-2247", "volume": + "31"}, "authors": [{"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": + "2004181687", "name": "Hongbin Wang"}, {"authorId": "144861054", "name": "Xun + Cao"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", "externalIds": + {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", "DOI": "10.1137/16M1097560", + "CorpusId": 3849415}, "corpusId": 3849415, "publicationVenue": {"id": "d35d93ad-8e2c-4482-a896-897ce5c326fa", + "name": "SIAM Journal on Applied Dynamical Systems", "type": "journal", "alternate_names": + ["Siam Journal on Applied Dynamical Systems", "Siam J Appl Dyn Syst", "SIAM + J Appl Dyn Syst"], "issn": "1536-0040", "url": "https://epubs.siam.org/journal/sjaday"}, + "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", + "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near + Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize + into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter + to meter scales. The leading mathematical explanations for these phenomena + are the reaction-diffusion-advection model and the phase separation model. + This paper continues the series studies on analytically understanding the + existence of pattern solutions in the reaction-diffusion mussel-algae model. + The stability of the positive constant steady state and the existence of Hopf + and steady-state bifurcations are studied by analyzing the corresponding characteristic + equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain + the explicit dynamical classification in its neighborhood by calculating and + investigating the normal form on the center manifold. Using theoretical and + numerical simulations, we demonstrates that this TH interaction would significantly + enhance the diversity of spatial patterns and trigger the alternative paths + for the pattern development.", "venue": "SIAM Journal on Applied Dynamical + Systems", "year": 2017, "referenceCount": 65, "citationCount": 77, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", + "pages": "2030-2062", "volume": "16"}, "authors": [{"authorId": "1794550", + "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, + {"authorId": "47362020", "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", + "name": "Yuan Yuan"}]}, {"paperId": "079adfb4ec1a617935f4c74763ed57ba0eedecff", + "externalIds": {"MAG": "2003095799", "DOI": "10.1126/science.1252960", "CorpusId": + 8400803, "PubMed": "25082703"}, "corpusId": 8400803, "publicationVenue": {"id": + "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": "journal", + "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/079adfb4ec1a617935f4c74763ed57ba0eedecff", "title": "Digit patterning is controlled by a Bmp-Sox9-Wnt Turing network modulated by morphogen gradients", "abstract": "How do fingers know where to grow? Most researchers today believe that each finger forms because of @@ -624,57 +756,49 @@ interactions: experiments. Our systems biology approach reveals how a combination of growth, morphogen gradients, and a self-organizing Turing network can achieve robust and reproducible pattern formation.", "venue": "Science", "year": 2014, "referenceCount": - 81, "citationCount": 376, "influentialCitationCount": 26, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-08-01", "journal": - {"name": "Science", "pages": "566 - 570", "volume": "345"}, "authors": [{"authorId": - "5407202", "name": "J. Raspopovic"}, {"authorId": "2650134", "name": "L. Marcon"}, - {"authorId": "1392361181", "name": "L. Russo"}, {"authorId": "47254653", "name": - "J. Sharpe"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", "externalIds": - {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", "DOI": "10.1137/16M1097560", - "CorpusId": 3849415}, "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", - "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near - Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize - into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter - to meter scales. The leading mathematical explanations for these phenomena - are the reaction-diffusion-advection model and the phase separation model. - This paper continues the series studies on analytically understanding the - existence of pattern solutions in the reaction-diffusion mussel-algae model. - The stability of the positive constant steady state and the existence of Hopf - and steady-state bifurcations are studied by analyzing the corresponding characteristic - equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain - the explicit dynamical classification in its neighborhood by calculating and - investigating the normal form on the center manifold. Using theoretical and - numerical simulations, we demonstrates that this TH interaction would significantly - enhance the diversity of spatial patterns and trigger the alternative paths - for the pattern development.", "venue": "SIAM Journal on Applied Dynamical - Systems", "year": 2017, "referenceCount": 65, "citationCount": 71, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + 81, "citationCount": 379, "influentialCitationCount": 27, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", "pages": "2030-2062", - "volume": "16"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, - {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "47362020", - "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, - {"paperId": "7633d38345730e3ce80b03b290e41d0d1ff87697", "externalIds": {"MAG": - "2951637662", "ArXiv": "1803.00164", "DOI": "10.1007/s10884-018-9702-y", "CorpusId": - 119314930}, "url": "https://www.semanticscholar.org/paper/7633d38345730e3ce80b03b290e41d0d1ff87697", - "title": "Turing Instability and Turing\u2013Hopf Bifurcation in Diffusive - Schnakenberg Systems with Gene Expression Time Delay", "abstract": null, "venue": - "Journal of Dynamics and Differential Equations", "year": 2018, "referenceCount": - 59, "citationCount": 34, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2018-03-01", "journal": {"name": - "Journal of Dynamics and Differential Equations", "pages": "2223-2247", "volume": - "31"}, "authors": [{"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": - "2004181687", "name": "Hongbin Wang"}, {"authorId": "144861054", "name": "Xun - Cao"}]}, {"paperId": "f10e071292d593fef939e6ef4a59baf0bb3a6c2b", "externalIds": - {"ArXiv": "1505.00521", "MAG": "2125308790", "DBLP": "journals/corr/ZarembaS15", - "CorpusId": 16228924}, "url": "https://www.semanticscholar.org/paper/f10e071292d593fef939e6ef4a59baf0bb3a6c2b", + "2014-08-01", "journal": {"name": "Science", "pages": "566 - 570", "volume": + "345"}, "authors": [{"authorId": "5407202", "name": "J. Raspopovic"}, {"authorId": + "2650134", "name": "L. Marcon"}, {"authorId": "1392361181", "name": "L. Russo"}, + {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", + "externalIds": {"MAG": "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", + "CorpusId": 67906449}, "corpusId": 67906449, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", + "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": + "What can artificial intelligence teach us about the mind? If AI''s underlying + concept is that thinking is a computational process, then how can computation + illuminate thinking? It''s a timely question. AI is all the rage, and the + buzziest AI buzz surrounds adaptive machine learning: computer systems that + learn intelligent behavior from massive amounts of data. This is what powers + a driverless car, for example. In this book, Hector Levesque shifts the conversation + to \"good old fashioned artificial intelligence,\" which is based not on heaps + of data but on understanding commonsense intelligence. This kind of artificial + intelligence is equipped to handle situations that depart from previous patterns + -- as we do in real life, when, for example, we encounter a washed-out bridge + or when the barista informs us there''s no more soy milk. Levesque considers + the role of language in learning. He argues that a computer program that passes + the famous Turing Test could be a mindless zombie, and he proposes another + way to test for intelligence -- the Winograd Schema Test, developed by Levesque + and his colleagues. \"If our goal is to understand intelligent behavior, we + had better understand the difference between making it and faking it,\" he + observes. He identifies a possible mechanism behind common sense and the capacity + to call on background knowledge: the ability to represent objects of thought + symbolically. As AI migrates more and more into everyday life, we should worry + if systems without common sense are making decisions where common sense is + needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": + 69, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2017-02-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "143634377", + "name": "H. Levesque"}]}, {"paperId": "f10e071292d593fef939e6ef4a59baf0bb3a6c2b", + "externalIds": {"ArXiv": "1505.00521", "MAG": "2125308790", "DBLP": "journals/corr/ZarembaS15", + "CorpusId": 16228924}, "corpusId": 16228924, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f10e071292d593fef939e6ef4a59baf0bb3a6c2b", "title": "Reinforcement Learning Neural Turing Machines", "abstract": "The expressive power of a machine learning model is closely related to the number of sequential computational steps it can learn. For example, Deep Neural Networks @@ -698,44 +822,15 @@ interactions: do so, we developed a simple technique for numerically checking arbitrary implementations of models that use Reinforce, which may be of independent interest.", "venue": "ArXiv", "year": 2015, "referenceCount": 28, "citationCount": - 170, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-05-04", "journal": - {"name": "ArXiv", "volume": "abs/1505.00521"}, "authors": [{"authorId": "2563432", - "name": "Wojciech Zaremba"}, {"authorId": "1701686", "name": "Ilya Sutskever"}]}, - {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", "externalIds": {"MAG": - "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", "CorpusId": 67906449}, - "url": "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", - "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": - "What can artificial intelligence teach us about the mind? If AI''s underlying - concept is that thinking is a computational process, then how can computation - illuminate thinking? It''s a timely question. AI is all the rage, and the - buzziest AI buzz surrounds adaptive machine learning: computer systems that - learn intelligent behavior from massive amounts of data. This is what powers - a driverless car, for example. In this book, Hector Levesque shifts the conversation - to \"good old fashioned artificial intelligence,\" which is based not on heaps - of data but on understanding commonsense intelligence. This kind of artificial - intelligence is equipped to handle situations that depart from previous patterns - -- as we do in real life, when, for example, we encounter a washed-out bridge - or when the barista informs us there''s no more soy milk. Levesque considers - the role of language in learning. He argues that a computer program that passes - the famous Turing Test could be a mindless zombie, and he proposes another - way to test for intelligence -- the Winograd Schema Test, developed by Levesque - and his colleagues. \"If our goal is to understand intelligent behavior, we - had better understand the difference between making it and faking it,\" he - observes. He identifies a possible mechanism behind common sense and the capacity - to call on background knowledge: the ability to represent objects of thought - symbolically. As AI migrates more and more into everyday life, we should worry - if systems without common sense are making decisions where common sense is - needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": - 68, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2017-02-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "143634377", "name": "H. Levesque"}]}, - {"paperId": "5259755f9c100e220ffaa7e08439c5d34be7757a", "externalIds": {"MAG": - "2204302769", "CorpusId": 17710225}, "url": "https://www.semanticscholar.org/paper/5259755f9c100e220ffaa7e08439c5d34be7757a", + 170, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-05-04", "journal": {"name": "ArXiv", "volume": "abs/1505.00521"}, "authors": + [{"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", + "name": "Ilya Sutskever"}]}, {"paperId": "5259755f9c100e220ffaa7e08439c5d34be7757a", + "externalIds": {"MAG": "2204302769", "CorpusId": 17710225}, "corpusId": 17710225, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5259755f9c100e220ffaa7e08439c5d34be7757a", "title": "Reinforcement Learning Neural Turing Machines - Revised", "abstract": "The Neural Turing Machine (NTM) is more expressive than all previously considered models because of its external memory. It can be viewed as a broader effort @@ -752,14 +847,18 @@ interactions: to solve simple algorithmic tasks. Our Interfaces are expressive enough to make our model Turing complete.", "venue": "", "year": 2015, "referenceCount": 25, "citationCount": 154, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-05-04", - "journal": {"name": "arXiv: Learning", "volume": ""}, "authors": [{"authorId": - "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", "name": "Ilya - Sutskever"}]}, {"paperId": "2a69c98085c13ddb0e9b5ba4a904312670ed4e65", "externalIds": - {"MAG": "2319249367", "PubMedCentral": "4922859", "DOI": "10.7554/eLife.14022", - "CorpusId": 1077586, "PubMed": "27058171"}, "url": "https://www.semanticscholar.org/paper/2a69c98085c13ddb0e9b5ba4a904312670ed4e65", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-05-04", "journal": {"name": "arXiv: Learning", "volume": ""}, "authors": + [{"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", + "name": "Ilya Sutskever"}]}, {"paperId": "2a69c98085c13ddb0e9b5ba4a904312670ed4e65", + "externalIds": {"MAG": "2319249367", "PubMedCentral": "4922859", "DOI": "10.7554/eLife.14022", + "CorpusId": 1077586, "PubMed": "27058171"}, "corpusId": 1077586, "publicationVenue": + {"id": "07365b9a-c0ce-4dd3-b93b-a02e1c81e0c6", "name": "eLife", "type": "journal", + "issn": "2050-084X", "url": "https://epub.uni-regensburg.de/40444/", "alternate_urls": + ["https://elifesciences.org/", "https://elife.elifesciences.org/", "http://elifesciences.org/"]}, + "url": "https://www.semanticscholar.org/paper/2a69c98085c13ddb0e9b5ba4a904312670ed4e65", "title": "High-throughput mathematical analysis identifies Turing networks for patterning with equally diffusing signals", "abstract": "The Turing reaction-diffusion model explains how identical cells can self-organize to form spatial patterns. @@ -778,17 +877,22 @@ interactions: framework to understand multicellular pattern formation and enables the wide-spread use of mathematical biology to engineer synthetic patterning systems. DOI: http://dx.doi.org/10.7554/eLife.14022.001", "venue": "eLife", "year": 2016, - "referenceCount": 91, "citationCount": 96, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-08", "journal": - {"name": "eLife", "volume": "5"}, "authors": [{"authorId": "2650134", "name": - "L. Marcon"}, {"authorId": "4791189", "name": "X. Diego"}, {"authorId": "47254653", - "name": "J. Sharpe"}, {"authorId": "153207731", "name": "Patrick M\u00fcller"}]}, - {"paperId": "751e5ff25e8186a8fd26ee05c4e29a286f650f1b", "externalIds": {"DBLP": - "journals/corr/Grigore16", "MAG": "2953162524", "ArXiv": "1605.05274", "DOI": - "10.1145/3009837.3009871", "CorpusId": 5698855}, "url": "https://www.semanticscholar.org/paper/751e5ff25e8186a8fd26ee05c4e29a286f650f1b", + "referenceCount": 91, "citationCount": 98, "influentialCitationCount": 4, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-04-08", "journal": {"name": "eLife", "volume": "5"}, "authors": [{"authorId": + "2650134", "name": "L. Marcon"}, {"authorId": "4791189", "name": "X. Diego"}, + {"authorId": "47254653", "name": "J. Sharpe"}, {"authorId": "153207731", "name": + "Patrick M\u00fcller"}]}, {"paperId": "751e5ff25e8186a8fd26ee05c4e29a286f650f1b", + "externalIds": {"DBLP": "journals/corr/Grigore16", "MAG": "2953162524", "ArXiv": + "1605.05274", "DOI": "10.1145/3009837.3009871", "CorpusId": 5698855}, "corpusId": + 5698855, "publicationVenue": {"id": "8a1922a5-8e84-4ec6-9283-01f2ef1981fc", + "name": "ACM-SIGACT Symposium on Principles of Programming Languages", "type": + "conference", "alternate_names": ["Symp Princ Program Lang", "Symposium on + Principles of Programming Languages", "POPL", "ACM-SIGACT Symp Princ Program + Lang"], "url": "http://www.sigplan.org/Conferences/POPL/"}, "url": "https://www.semanticscholar.org/paper/751e5ff25e8186a8fd26ee05c4e29a286f650f1b", "title": "Java generics are turing complete", "abstract": "This paper describes a reduction from the halting problem of Turing machines to subtype checking in Java. It follows that subtype checking in Java is undecidable, which answers @@ -797,14 +901,16 @@ interactions: of Gill and Levy from 2016. The latter point is illustrated by a parser generator for fluent interfaces.", "venue": "ACM-SIGACT Symposium on Principles of Programming Languages", "year": 2016, "referenceCount": 37, "citationCount": 40, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://kar.kent.ac.uk/58183/7/javats.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2016-05-17", "journal": {"name": "Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages"}, "authors": [{"authorId": "2355698", "name": "Radu Grigore"}]}, {"paperId": "3290b0d04025513911923fc51885962b10971783", "externalIds": {"MAG": - "2585714548", "CorpusId": 64349377}, "url": "https://www.semanticscholar.org/paper/3290b0d04025513911923fc51885962b10971783", + "2585714548", "CorpusId": 64349377}, "corpusId": 64349377, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3290b0d04025513911923fc51885962b10971783", "title": "Alan Turing: The Enigma", "abstract": "Feel lonely? What about reading books? Book is one of the greatest friends to accompany while in your lonely time. When you have no friends and activities somewhere and sometimes, reading @@ -812,19 +918,26 @@ interactions: increase the knowledge. Of course the b=benefits to take will relate to what kind of book that you are reading. And now, we will concern you to try reading alan turing the enigma as one of the reading material to finish quickly.", - "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 112, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-12-22", - "journal": {"name": "", "pages": "57", "volume": "62"}, "authors": [{"authorId": - "71860202", "name": "Golda T. Eldridge"}]}, {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", - "externalIds": {"PubMedCentral": "5258822", "MAG": "2443634204", "ArXiv": - "1301.2002", "DOI": "10.1007/s00285-016-1035-z", "CorpusId": 5942606, "PubMed": - "27305913"}, "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", + "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 116, "influentialCitationCount": + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2015-12-22", "journal": {"name": "", "pages": "57", + "volume": "62"}, "authors": [{"authorId": "71860202", "name": "Golda T. Eldridge"}]}, + {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "externalIds": {"PubMedCentral": + "5258822", "MAG": "2443634204", "ArXiv": "1301.2002", "DOI": "10.1007/s00285-016-1035-z", + "CorpusId": 5942606, "PubMed": "27305913"}, "corpusId": 5942606, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "title": "Instability of turing patterns in reaction-diffusion-ODE systems", "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2013, "referenceCount": 49, "citationCount": 38, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc5258822?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-01-09", "journal": @@ -833,20 +946,29 @@ interactions: {"authorId": "101468044", "name": "G. Karch"}, {"authorId": "2118679527", "name": "Kanako Suzuki"}]}, {"paperId": "3b662774599a36d4b281f0ea212d149849fd2ca7", "externalIds": {"PubMedCentral": "4879262", "MAG": "2399203404", "DOI": "10.1038/ncomms11582", - "CorpusId": 2037071, "PubMed": "27211489"}, "url": "https://www.semanticscholar.org/paper/3b662774599a36d4b281f0ea212d149849fd2ca7", + "CorpusId": 2037071, "PubMed": "27211489"}, "corpusId": 2037071, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/3b662774599a36d4b281f0ea212d149849fd2ca7", "title": "The fin-to-limb transition as the re-organization of a Turing pattern", "abstract": null, "venue": "Nature Communications", "year": 2016, "referenceCount": 64, "citationCount": 67, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-05-23", "journal": {"name": "Nature Communications", - "volume": "7"}, "authors": [{"authorId": "4852838", "name": "Koh Onimaru"}, - {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "108029565", "name": - "M. Musy"}, {"authorId": "47675847", "name": "Mikiko Tanaka"}, {"authorId": - "47254653", "name": "J. Sharpe"}]}, {"paperId": "dd547a64a179f0f3defd376455f258500d34d4b8", + "openAccessPdf": {"url": "https://www.nature.com/articles/ncomms11582.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2016-05-23", "journal": {"name": "Nature + Communications", "volume": "7"}, "authors": [{"authorId": "4852838", "name": + "Koh Onimaru"}, {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": + "108029565", "name": "M. Musy"}, {"authorId": "47675847", "name": "Mikiko + Tanaka"}, {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "dd547a64a179f0f3defd376455f258500d34d4b8", "externalIds": {"MAG": "2317259993", "ArXiv": "1512.06055", "DOI": "10.1103/PhysRevLett.116.143901", - "CorpusId": 19175993, "PubMed": "27104711"}, "url": "https://www.semanticscholar.org/paper/dd547a64a179f0f3defd376455f258500d34d4b8", + "CorpusId": 19175993, "PubMed": "27104711"}, "corpusId": 19175993, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dd547a64a179f0f3defd376455f258500d34d4b8", "title": "Competing Turing and Faraday Instabilities in Longitudinally Modulated Passive Resonators.", "abstract": "We experimentally investigate the interplay of Turing (modulational) and Faraday (parametric) instabilities in a bistable @@ -860,6 +982,7 @@ interactions: structures. The results are well explained in terms of the universal Lugiato-Lefever model.", "venue": "Physical Review Letters", "year": 2015, "referenceCount": 31, "citationCount": 56, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1512.06055", "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -870,10 +993,14 @@ interactions: "name": "A. Mussot"}, {"authorId": "5414545", "name": "S. Trillo"}]}, {"paperId": "8fb5cf374acbe9fed9939ff2c0aec334b5d26187", "externalIds": {"MAG": "2950930823", "DBLP": "conf/tcc/AnanthS16", "DOI": "10.1007/978-3-662-49096-9_6", "CorpusId": - 15455801}, "url": "https://www.semanticscholar.org/paper/8fb5cf374acbe9fed9939ff2c0aec334b5d26187", + 15455801}, "corpusId": 15455801, "publicationVenue": {"id": "5f558f42-4459-4db5-9c48-77c92ba99511", + "name": "Theory of Cryptography Conference", "type": "conference", "alternate_names": + ["Theory Cryptogr Conf", "TCC"], "url": "https://www.iacr.org/meetings/tcc/"}, + "url": "https://www.semanticscholar.org/paper/8fb5cf374acbe9fed9939ff2c0aec334b5d26187", "title": "Functional Encryption for Turing Machines", "abstract": null, "venue": "Theory of Cryptography Conference", "year": 2016, "referenceCount": 53, "citationCount": - 61, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": + 61, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "http://eprint.iacr.org/2015/776.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", @@ -881,7 +1008,8 @@ interactions: "publicationDate": "2016-01-10", "journal": {"pages": "125-153"}, "authors": [{"authorId": "2616991", "name": "P. Ananth"}, {"authorId": "1695851", "name": "A. Sahai"}]}, {"paperId": "f8e9f0e61d45c8a669391fa00e20d134e71ca388", "externalIds": - {"MAG": "2747885441", "CorpusId": 125663722}, "url": "https://www.semanticscholar.org/paper/f8e9f0e61d45c8a669391fa00e20d134e71ca388", + {"MAG": "2747885441", "CorpusId": 125663722}, "corpusId": 125663722, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f8e9f0e61d45c8a669391fa00e20d134e71ca388", "title": "Turing Computability: Theory and Applications", "abstract": "Turing''s famous 1936 paper introduced a formal definition of a computing machine, a Turing machine. This model led to both the development of actual computers @@ -905,30 +1033,36 @@ interactions: according to importance and difficulty. The book is suitable for advanced undergraduate and graduate students in computer science and mathematics and researchers engaged with computability and mathematical logic.", "venue": - "", "year": 2016, "referenceCount": 0, "citationCount": 52, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2016-06-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1760293", "name": "R. Soare"}]}, {"paperId": "a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", - "externalIds": {"MAG": "2437127566", "DOI": "10.1007/S11071-016-2873-3", "CorpusId": - 124911557}, "url": "https://www.semanticscholar.org/paper/a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", + "", "year": 2016, "referenceCount": 0, "citationCount": 54, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2016-06-21", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, + {"paperId": "a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", "externalIds": {"MAG": + "2437127566", "DOI": "10.1007/S11071-016-2873-3", "CorpusId": 124911557}, + "corpusId": 124911557, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", "title": "Turing\u2013Hopf bifurcation analysis of a predator\u2013prey model with herd behavior and cross-diffusion", "abstract": null, "venue": "", "year": - 2016, "referenceCount": 58, "citationCount": 60, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-06-17", - "journal": {"name": "Nonlinear Dynamics", "pages": "73-89", "volume": "86"}, - "authors": [{"authorId": "143754807", "name": "Xiaosong Tang"}, {"authorId": - "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": "Tonghua - Zhang"}]}, {"paperId": "d89084753b70dbdf589fb5663a609fb47607affb", "externalIds": - {"DBLP": "journals/corr/LiGG16a", "ArXiv": "1603.04904", "MAG": "2301883550", - "DOI": "10.1007/s11721-016-0126-1", "CorpusId": 14259869}, "url": "https://www.semanticscholar.org/paper/d89084753b70dbdf589fb5663a609fb47607affb", + 2016, "referenceCount": 58, "citationCount": 62, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-06-17", "journal": {"name": "Nonlinear Dynamics", "pages": "73-89", + "volume": "86"}, "authors": [{"authorId": "143754807", "name": "Xiaosong Tang"}, + {"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": + "Tonghua Zhang"}]}, {"paperId": "1470b244477529e1627b48c117e78308ede474ab", + "externalIds": {"DBLP": "journals/corr/LiGG16a", "ArXiv": "1603.04904", "MAG": + "2301883550", "DOI": "10.1007/s11721-016-0126-1", "CorpusId": 14259869}, "corpusId": + 14259869, "publicationVenue": {"id": "9bc15867-86e2-4be2-9ff3-2c15aaf07929", + "name": "Swarm Intelligence", "type": "journal", "alternate_names": ["Swarm + Intell"], "issn": "1935-3812", "url": "https://www.springer.com/computer/ai/journal/11721", + "alternate_urls": ["https://link.springer.com/journal/11721"]}, "url": "https://www.semanticscholar.org/paper/1470b244477529e1627b48c117e78308ede474ab", "title": "Turing learning: a metric-free approach to inferring behavior and its application to swarms", "abstract": null, "venue": "Swarm Intelligence", - "year": 2016, "referenceCount": 67, "citationCount": 52, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "year": 2016, "referenceCount": 64, "citationCount": 52, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2Fs11721-016-0126-1.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -937,21 +1071,28 @@ interactions: {"authorId": "7836896", "name": "Melvin Gauci"}, {"authorId": "6586246", "name": "R. Gro\u00df"}]}, {"paperId": "b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "externalIds": {"DBLP": "journals/cnsns/SongZP16", "MAG": "1929947366", "DOI": - "10.1016/J.CNSNS.2015.10.002", "CorpusId": 119973623}, "url": "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", + "10.1016/J.CNSNS.2015.10.002", "CorpusId": 119973623}, "corpusId": 119973623, + "publicationVenue": {"id": "cbeeb5cb-fa82-4ae6-875b-04adb3b61f48", "name": + "Communications in nonlinear science & numerical simulation", "type": "journal", + "alternate_names": ["Communications in Nonlinear Science and Numerical Simulation", + "Commun Nonlinear Sci Numer Simul", "Commun nonlinear sci numer simul"], + "issn": "1007-5704", "url": "http://www.elsevier.com/locate/cnsns"}, "url": + "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "title": "Turing-Hopf bifurcation in the reaction-diffusion equations and its applications", "abstract": null, "venue": "Communications in nonlinear science & numerical simulation", "year": 2016, "referenceCount": 37, "citationCount": - 82, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2016-04-01", "journal": {"name": "Commun. - Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": "33"}, "authors": - [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": - "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong Peng"}]}, {"paperId": - "7c326f661163360efc072214be205c827e742495", "externalIds": {"DBLP": "journals/corr/Aaronson13", - "MAG": "2964289375", "ArXiv": "1306.0159", "DOI": "10.1017/CBO9780511863196.018", - "CorpusId": 17123686}, "url": "https://www.semanticscholar.org/paper/7c326f661163360efc072214be205c827e742495", + 85, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-01", "journal": + {"name": "Commun. Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": + "33"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": + "1742870", "name": "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong + Peng"}]}, {"paperId": "7c326f661163360efc072214be205c827e742495", "externalIds": + {"DBLP": "journals/corr/Aaronson13", "MAG": "2964289375", "ArXiv": "1306.0159", + "DOI": "10.1017/CBO9780511863196.018", "CorpusId": 17123686}, "corpusId": + 17123686, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c326f661163360efc072214be205c827e742495", "title": "The Ghost in the Quantum Turing Machine", "abstract": "In honor of Alan Turing''s hundredth birthday, I unwisely set out some thoughts about one of Turing''s obsessions throughout his life, the question of physics and @@ -974,15 +1115,49 @@ interactions: in neuroscience, physics, and cosmology; and takes a millennia-old philosophical debate into some underexplored territory.", "venue": "The Once and Future Turing", "year": 2013, "referenceCount": 109, "citationCount": 46, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1306.0159.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-06-01", "journal": {"pages": "193-296"}, "authors": [{"authorId": "20996436", "name": "S. Aaronson"}]}, - {"paperId": "3d27bbfcf1ebe7390b5250e677e91179a76569e4", "externalIds": {"ArXiv": - "1603.00948", "MAG": "2522126998", "DOI": "10.1103/PhysRevX.7.041002", "CorpusId": - 44184751}, "url": "https://www.semanticscholar.org/paper/3d27bbfcf1ebe7390b5250e677e91179a76569e4", + {"paperId": "902fb60fa3493171b2aa9d485291a54185763a79", "externalIds": {"DBLP": + "journals/jetai/WarwickS16", "MAG": "1912133035", "DOI": "10.1080/0952813X.2015.1055826", + "CorpusId": 31251200}, "corpusId": 31251200, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/902fb60fa3493171b2aa9d485291a54185763a79", + "title": "Can machines think? A report on Turing test experiments at the Royal + Society", "abstract": "In this article we consider transcripts that originated + from a practical series of Turing''s Imitation Game that was held on 6 and + 7 June 2014 at the Royal Society London. In all cases the tests involved a + three-participant simultaneous comparison by an interrogator of two hidden + entities, one being a human and the other a machine. Each of the transcripts + considered here resulted in a human interrogator being fooled such that they + could not make the \u2018right identification\u2019, that is, they could not + say for certain which was the machine and which was the human. The transcripts + presented all involve one machine only, namely \u2018Eugene Goostman\u2019, + the result being that the machine became the first to pass the Turing test, + as set out by Alan Turing, on unrestricted conversation. This is the first + time that results from the Royal Society tests have been disclosed and discussed + in a paper.", "venue": "Journal of experimental and theoretical artificial + intelligence (Print)", "year": 2016, "referenceCount": 34, "citationCount": + 46, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://pure.coventry.ac.uk/ws/files/4019869/warwickcomb.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "History", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-11-01", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "1007 - 989", "volume": "28"}, "authors": [{"authorId": + "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma + Shah"}]}, {"paperId": "3d27bbfcf1ebe7390b5250e677e91179a76569e4", "externalIds": + {"ArXiv": "1603.00948", "MAG": "2522126998", "DOI": "10.1103/PhysRevX.7.041002", + "CorpusId": 44184751}, "corpusId": 44184751, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3d27bbfcf1ebe7390b5250e677e91179a76569e4", "title": "Globally stable microresonator Turing pattern formation for coherent high-power THz radiation on-chip", "abstract": "In nonlinear microresonators driven by continuous-wave (cw) lasers, Turing patterns have been studied in @@ -1008,41 +1183,49 @@ interactions: system is promising to find applications in astrophysics, medical imaging, and wireless communications.", "venue": "", "year": 2016, "referenceCount": 49, "citationCount": 44, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevX.7.041002", + "status": "GOLD"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-03-03", "journal": {"name": "arXiv: Optics", "volume": ""}, "authors": [{"authorId": "122132133", "name": "Shu-Wei Huang"}, {"authorId": "2046781", "name": "Jinghui Yang"}, {"authorId": "1387853764", "name": "Shang-Hua Yang"}, {"authorId": "50077634", "name": "M. Yu"}, {"authorId": "143722274", "name": "D. Kwong"}, {"authorId": "4841270", "name": "T. Zelevinsky"}, {"authorId": "2146359", "name": "M. Jarrahi"}, {"authorId": - "1727458", "name": "C. Wong"}]}, {"paperId": "902fb60fa3493171b2aa9d485291a54185763a79", - "externalIds": {"DBLP": "journals/jetai/WarwickS16", "MAG": "1912133035", - "DOI": "10.1080/0952813X.2015.1055826", "CorpusId": 31251200}, "url": "https://www.semanticscholar.org/paper/902fb60fa3493171b2aa9d485291a54185763a79", - "title": "Can machines think? A report on Turing test experiments at the Royal - Society", "abstract": "In this article we consider transcripts that originated - from a practical series of Turing''s Imitation Game that was held on 6 and - 7 June 2014 at the Royal Society London. In all cases the tests involved a - three-participant simultaneous comparison by an interrogator of two hidden - entities, one being a human and the other a machine. Each of the transcripts - considered here resulted in a human interrogator being fooled such that they - could not make the \u2018right identification\u2019, that is, they could not - say for certain which was the machine and which was the human. The transcripts - presented all involve one machine only, namely \u2018Eugene Goostman\u2019, - the result being that the machine became the first to pass the Turing test, - as set out by Alan Turing, on unrestricted conversation. This is the first - time that results from the Royal Society tests have been disclosed and discussed - in a paper.", "venue": "Journal of experimental and theoretical artificial - intelligence (Print)", "year": 2016, "referenceCount": 34, "citationCount": - 46, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-11-01", "journal": - {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "1007 - 989", "volume": "28"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": + "1727458", "name": "C. Wong"}]}, {"paperId": "df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", + "externalIds": {"MAG": "2399906603", "DBLP": "conf/aips/000115", "DOI": "10.1609/icaps.v25i1.13684", + "CorpusId": 11168350}, "corpusId": 11168350, "publicationVenue": {"id": "267934f4-c986-4571-bef8-d0eebc5e0e54", + "name": "International Conference on Automated Planning and Scheduling", "type": + "conference", "alternate_names": ["Int Conf Autom Plan Sched", "ICAPS"], "url": + "http://www.icaps-conference.org/"}, "url": "https://www.semanticscholar.org/paper/df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", + "title": "Simulated Penetration Testing: From \"Dijkstra\" to \"Turing Test++\"", + "abstract": "\n \n Penetration testing (pentesting) is a well established + method for identifying security weaknesses, by conducting friendly attacks. + Simulated pentesting automates this process, through designing a model of + the system at hand, and using model-based attack planning to generate the + attacks. Classical planning variants of this idea are being used commercially + by the pentesting industry since 2010. Such models can pinpoint potentially + dangerous combinations of known vulnerabilities, but ignore the incomplete + knowledge characteristic of hacking from the attacker''s point of view. Yet, + ideally, the simulation should conduct its attacks the same way a real attacker + would. Hence the ultimate goal is much more ambitious: to realistically simulate + a human hacker. This is a grand vision indeed; e.g., the classical Turing + Test can be viewed as a sub-problem. Taking a more practical perspective, + the simulated pentesting model space spans a broad range of sequential decision + making problems. Analyzing prior work in AI and other relevant areas, we derive + a systematization of this model space, highlighting a multitude of interesting + challenges to AI sequential decision making research.\n \n", "venue": "International + Conference on Automated Planning and Scheduling", "year": 2015, "referenceCount": + 41, "citationCount": 80, "influentialCitationCount": 8, "isOpenAccess": true, + "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/ICAPS/article/download/13684/13533", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2015-04-08", "journal": {"pages": "364-372"}, + "authors": [{"authorId": "144915519", "name": "J. Hoffmann"}]}, {"paperId": "95ca0cde71f0258ca99e920f711084a9a3a5fe4b", "externalIds": {"DBLP": "conf/nips/OrlitskyS15", - "MAG": "2187207766", "CorpusId": 15304308}, "url": "https://www.semanticscholar.org/paper/95ca0cde71f0258ca99e920f711084a9a3a5fe4b", + "MAG": "2187207766", "CorpusId": 15304308}, "corpusId": 15304308, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/95ca0cde71f0258ca99e920f711084a9a3a5fe4b", "title": "Competitive Distribution Estimation: Why is Good-Turing Good", "abstract": "Estimating distributions over large alphabets is a fundamental machine-learning tenet. Yet no method is known to estimate all distributions well. For example, @@ -1063,42 +1246,21 @@ interactions: 1/\u221an)). Conversely, we show that any estimator must have a KL divergence at least \u03a9n(min(k/n, 1/n2/3)) over the best estimator for the first comparison, and at least \u03a9n(min(k/n, 1/\u221an)) for the second.", "venue": "NIPS", - "year": 2015, "referenceCount": 35, "citationCount": 77, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2015-12-07", "journal": {"pages": "2143-2151"}, "authors": - [{"authorId": "1691155", "name": "A. Orlitsky"}, {"authorId": "9486035", "name": - "A. Suresh"}]}, {"paperId": "df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "externalIds": - {"MAG": "2399906603", "DBLP": "conf/aips/000115", "DOI": "10.1609/icaps.v25i1.13684", - "CorpusId": 11168350}, "url": "https://www.semanticscholar.org/paper/df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", - "title": "Simulated Penetration Testing: From \"Dijkstra\" to \"Turing Test++\"", - "abstract": "\n \n Penetration testing (pentesting) is a well established - method for identifying security weaknesses, by conducting friendly attacks. - Simulated pentesting automates this process, through designing a model of - the system at hand, and using model-based attack planning to generate the - attacks. Classical planning variants of this idea are being used commercially - by the pentesting industry since 2010. Such models can pinpoint potentially - dangerous combinations of known vulnerabilities, but ignore the incomplete - knowledge characteristic of hacking from the attacker''s point of view. Yet, - ideally, the simulation should conduct its attacks the same way a real attacker - would. Hence the ultimate goal is much more ambitious: to realistically simulate - a human hacker. This is a grand vision indeed; e.g., the classical Turing - Test can be viewed as a sub-problem. Taking a more practical perspective, - the simulated pentesting model space spans a broad range of sequential decision - making problems. Analyzing prior work in AI and other relevant areas, we derive - a systematization of this model space, highlighting a multitude of interesting - challenges to AI sequential decision making research.\n \n", "venue": "International - Conference on Automated Planning and Scheduling", "year": 2015, "referenceCount": - 41, "citationCount": 80, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2015-04-08", "journal": {"pages": "364-372"}, "authors": [{"authorId": "144915519", - "name": "J. Hoffmann"}]}, {"paperId": "368a7958ae2b6b8f30454f4405c0bfa090ec5c22", + "year": 2015, "referenceCount": 35, "citationCount": 78, "influentialCitationCount": + 11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2015-12-07", "journal": + {"pages": "2143-2151"}, "authors": [{"authorId": "1691155", "name": "A. Orlitsky"}, + {"authorId": "9486035", "name": "A. Suresh"}]}, {"paperId": "368a7958ae2b6b8f30454f4405c0bfa090ec5c22", "externalIds": {"MAG": "2022248835", "DOI": "10.1364/OE.20.003241", "CorpusId": - 24244845, "PubMed": "22330562"}, "url": "https://www.semanticscholar.org/paper/368a7958ae2b6b8f30454f4405c0bfa090ec5c22", + 24244845, "PubMed": "22330562"}, "corpusId": 24244845, "publicationVenue": + {"id": "f06e7ee6-cd20-45a8-91f9-6c84bcddc5fd", "name": "Optics Express", "type": + "journal", "alternate_names": ["Opt Express"], "issn": "1094-4087", "url": + "http://www.opticsexpress.org/Issue.cfm", "alternate_urls": ["http://www.opticsinfobase.org/oe/", + "https://www.osapublishing.org/oe/home.cfm", "http://www.osapublishing.org/oe/", + "http://www.opticsinfobase.org/oe/home.cfm"]}, "url": "https://www.semanticscholar.org/paper/368a7958ae2b6b8f30454f4405c0bfa090ec5c22", "title": "Photonic information processing beyond Turing: an optoelectronic implementation of reservoir computing.", "abstract": "Many information processing challenges are difficult to solve with traditional Turing or von Neumann approaches. @@ -1111,20 +1273,37 @@ interactions: to an input data stream. We employ spoken digit recognition and time series prediction tasks as benchmarks, achieving competitive processing figures of merit.", "venue": "Optics Express", "year": 2012, "referenceCount": 32, "citationCount": - 507, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-01-30", "journal": {"name": "Optics - express", "pages": "\n 3241-9\n ", "volume": "20 3"}, "authors": - [{"authorId": "1760452", "name": "L. Larger"}, {"authorId": "144524298", "name": - "M. C. Soriano"}, {"authorId": "145711155", "name": "D. Brunner"}, {"authorId": - "1829066", "name": "L. Appeltant"}, {"authorId": "144614855", "name": "J. - Guti\u00e9rrez"}, {"authorId": "145682718", "name": "L. Pesquera"}, {"authorId": - "2034306", "name": "C. Mirasso"}, {"authorId": "1795232", "name": "Ingo Fischer"}]}, - {"paperId": "b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "externalIds": {"MAG": - "2242749976", "DOI": "10.1073/pnas.1322005111", "CorpusId": 17626456, "PubMed": - "24616508"}, "url": "https://www.semanticscholar.org/paper/b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", + 510, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-30", "journal": + {"name": "Optics express", "pages": "\n 3241-9\n ", "volume": + "20 3"}, "authors": [{"authorId": "1760452", "name": "L. Larger"}, {"authorId": + "144524298", "name": "M. C. Soriano"}, {"authorId": "145711155", "name": "D. + Brunner"}, {"authorId": "1829066", "name": "L. Appeltant"}, {"authorId": "144614855", + "name": "J. Guti\u00e9rrez"}, {"authorId": "145682718", "name": "L. Pesquera"}, + {"authorId": "2034306", "name": "C. Mirasso"}, {"authorId": "1795232", "name": + "Ingo Fischer"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", + "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": + 28057065, "PubMed": "25544713"}, "corpusId": 28057065, "publicationVenue": + {"id": "e26133f2-2f02-4bc5-a3ad-26bdbdc9636c", "name": "Trends in Genetics", + "type": "journal", "alternate_names": ["Trends Genet"], "issn": "0168-9479", + "alternate_issns": ["1362-4555", "0168-9525"], "url": "http://www.sciencedirect.com/science/journal/01689525", + "alternate_urls": ["http://www.cell.com/trends/genetics/"]}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", + "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", + "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": + 64, "citationCount": 99, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2015-02-01", "journal": + {"name": "Trends in genetics : TIG", "pages": "\n 88-96\n ", + "volume": "31 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu + Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": + "b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "externalIds": {"MAG": "2242749976", + "DOI": "10.1073/pnas.1322005111", "CorpusId": 17626456, "PubMed": "24616508"}, + "corpusId": 17626456, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "title": "Testing Turing\u2019s theory of morphogenesis in chemical cells", "abstract": "Significance Turing proposed that intercellular reaction-diffusion of molecules is responsible for morphogenesis. The impact of this paradigm @@ -1151,7 +1330,8 @@ interactions: original model, which we explain by modifying the theory to include heterogeneity.", "venue": "Proceedings of the National Academy of Sciences", "year": 2014, "referenceCount": 46, "citationCount": 164, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine", "Computer Science"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/111/12/4397.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], @@ -1164,33 +1344,77 @@ interactions: "name": "I. Epstein"}, {"authorId": "2775719", "name": "S. Fraden"}]}, {"paperId": "0c4930885dd3318d39f39278686446752bc305b5", "externalIds": {"DBLP": "journals/isci/AlarifiAA16", "MAG": "2510717748", "DOI": "10.1016/j.ins.2016.08.036", "CorpusId": 19044123}, - "url": "https://www.semanticscholar.org/paper/0c4930885dd3318d39f39278686446752bc305b5", + "corpusId": 19044123, "publicationVenue": {"id": "e46002a1-d7a6-4681-aae9-36bc3a6a1f93", + "name": "Information Sciences", "type": "journal", "alternate_names": ["Information + Scientist", "Inf Sci"], "issn": "0020-0255", "alternate_issns": ["0020-0263"], + "url": "http://www.sciencedirect.com/science/journal/00200255"}, "url": "https://www.semanticscholar.org/paper/0c4930885dd3318d39f39278686446752bc305b5", "title": "Twitter turing test: Identifying social machines", "abstract": null, "venue": "Information Sciences", "year": 2016, "referenceCount": 45, "citationCount": - 68, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2016-12-01", - "journal": {"name": "Inf. Sci.", "pages": "332-346", "volume": "372"}, "authors": - [{"authorId": "2329378", "name": "A. Alarifi"}, {"authorId": "3129812", "name": - "M. Alsaleh"}, {"authorId": "1393386740", "name": "A. Al-Salman"}]}, {"paperId": - "ac7a3d2983b75bd4f44903892a5df295a0f859ff", "externalIds": {"DBLP": "conf/crypto/GoldwasserKPVZ13", - "MAG": "1590453572", "DOI": "10.1007/978-3-642-40084-1_30", "CorpusId": 2561936}, - "url": "https://www.semanticscholar.org/paper/ac7a3d2983b75bd4f44903892a5df295a0f859ff", + 69, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2016-12-01", "journal": {"name": "Inf. Sci.", "pages": + "332-346", "volume": "372"}, "authors": [{"authorId": "2329378", "name": "A. + Alarifi"}, {"authorId": "3129812", "name": "M. Alsaleh"}, {"authorId": "1393386740", + "name": "A. Al-Salman"}]}, {"paperId": "2b352a475a16b3e12b1af1cf9231ba824db9f937", + "externalIds": {"DBLP": "journals/tcas/BuscarinoCFFC16", "MAG": "2485899172", + "DOI": "10.1109/TCSI.2016.2564738", "CorpusId": 36502203}, "corpusId": 36502203, + "publicationVenue": {"id": "65967e36-f7db-476f-9d00-fd080a5a8483", "name": + "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", "type": + "journal", "alternate_names": ["IEEE Trans Circuit Syst Part 1 Regul Pap", + "IEEE Trans Circuit Syst I-regular Pap", "IEEE Transactions on Circuits and + Systems I-regular Papers"], "issn": "1549-8328", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=8919", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8919"]}, + "url": "https://www.semanticscholar.org/paper/2b352a475a16b3e12b1af1cf9231ba824db9f937", + "title": "Turing Patterns in Memristive Cellular Nonlinear Networks", "abstract": + "The formation of ordered structures, in particular Turing patterns, in complex + spatially extended systems has been observed in many different contexts, spanning + from natural sciences (chemistry, physics, and biology) to technology (mechanics + and electronics). In this paper, it is shown that the use of memristors in + a simple cell of a spatially-extended circuit architecture allows us to design + systems able to generate Turing patterns. In addition, the memristor parameters + play a key role in the selection of the type and characteristics of the emerging + pattern, which is also influenced by the initial conditions. The problem of + finding the regions of parameters where Turing patterns may emerge in the + proposed cellular architecture is solved in an analytic way, and numerical + results are shown to illustrate the system behavior with respect to its parameters.", + "venue": "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", + "year": 2016, "referenceCount": 32, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-07-13", "journal": + {"name": "IEEE Transactions on Circuits and Systems I: Regular Papers", "pages": + "1222-1230", "volume": "63"}, "authors": [{"authorId": "1884234", "name": + "A. Buscarino"}, {"authorId": "48285431", "name": "C. Corradino"}, {"authorId": + "143998340", "name": "L. Fortuna"}, {"authorId": "1766733", "name": "M. Frasca"}, + {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "ac7a3d2983b75bd4f44903892a5df295a0f859ff", + "externalIds": {"DBLP": "conf/crypto/GoldwasserKPVZ13", "MAG": "1590453572", + "DOI": "10.1007/978-3-642-40084-1_30", "CorpusId": 2561936}, "corpusId": 2561936, + "publicationVenue": {"id": "212b6868-c374-4ba2-ad32-19fde8004623", "name": + "Annual International Cryptology Conference", "type": "conference", "alternate_names": + ["Int Cryptol Conf", "Annu Int Cryptol Conf", "CRYPTO", "International Cryptology + Conference"], "url": "http://www.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/ac7a3d2983b75bd4f44903892a5df295a0f859ff", "title": "How to Run Turing Machines on Encrypted Data", "abstract": null, "venue": "Annual International Cryptology Conference", "year": 2013, "referenceCount": 58, "citationCount": 181, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2013-08-18", "journal": - {"pages": "536-553"}, "authors": [{"authorId": "1706681", "name": "S. Goldwasser"}, - {"authorId": "1784514", "name": "Y. Kalai"}, {"authorId": "144963510", "name": - "R. A. Popa"}, {"authorId": "1749858", "name": "V. Vaikuntanathan"}, {"authorId": - "1789973", "name": "N. Zeldovich"}]}, {"paperId": "736a8e786d3e8b3a5b06d57648c83b14243a6479", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-642-40084-1_30.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2013-08-18", "journal": {"pages": "536-553"}, "authors": [{"authorId": "1706681", + "name": "S. Goldwasser"}, {"authorId": "1784514", "name": "Y. Kalai"}, {"authorId": + "144963510", "name": "R. A. Popa"}, {"authorId": "1749858", "name": "V. Vaikuntanathan"}, + {"authorId": "1789973", "name": "N. Zeldovich"}]}, {"paperId": "736a8e786d3e8b3a5b06d57648c83b14243a6479", "externalIds": {"DBLP": "journals/corr/abs-1211-1302", "MAG": "2963123289", "ArXiv": "1211.1302", "PubMedCentral": "4014489", "DOI": "10.1371/journal.pone.0096223", - "CorpusId": 10562121, "PubMed": "24809449"}, "url": "https://www.semanticscholar.org/paper/736a8e786d3e8b3a5b06d57648c83b14243a6479", + "CorpusId": 10562121, "PubMed": "24809449"}, "corpusId": 10562121, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/736a8e786d3e8b3a5b06d57648c83b14243a6479", "title": "Calculating Kolmogorov Complexity from the Output Frequency Distributions of Small Turing Machines", "abstract": "Drawing on various notions from theoretical computer science, we present a novel numerical approach, motivated by the @@ -1207,59 +1431,25 @@ interactions: algorithms, this work promises to deliver a range of applications, and to provide insight into the question of complexity calculation of finite (and short) strings. Additional material can be found at the Algorithmic Nature - Group website at http://www.algorithmicnature.org. An Online Algorithmic Complexity - Calculator implementing this technique and making the data available to the - research community is accessible at http://www.complexitycalculator.com.", - "venue": "PLoS ONE", "year": 2012, "referenceCount": 82, "citationCount": - 142, "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science", "Medicine", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-11-06", "journal": {"name": "PLoS ONE", "volume": "9"}, "authors": [{"authorId": - "1389866422", "name": "F. Soler-Toscano"}, {"authorId": "66445647", "name": - "H. Zenil"}, {"authorId": "2027817702", "name": "J. Delahaye"}, {"authorId": - "3159526", "name": "N. Gauvrit"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", - "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": - 28057065, "PubMed": "25544713"}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", - "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", - "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": - 64, "citationCount": 96, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2015-02-01", "journal": {"name": "Trends - in genetics : TIG", "pages": "\n 88-96\n ", "volume": "31 - 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu Watanabe"}, {"authorId": - "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "2b352a475a16b3e12b1af1cf9231ba824db9f937", - "externalIds": {"DBLP": "journals/tcas/BuscarinoCFFC16", "MAG": "2485899172", - "DOI": "10.1109/TCSI.2016.2564738", "CorpusId": 36502203}, "url": "https://www.semanticscholar.org/paper/2b352a475a16b3e12b1af1cf9231ba824db9f937", - "title": "Turing Patterns in Memristive Cellular Nonlinear Networks", "abstract": - "The formation of ordered structures, in particular Turing patterns, in complex - spatially extended systems has been observed in many different contexts, spanning - from natural sciences (chemistry, physics, and biology) to technology (mechanics - and electronics). In this paper, it is shown that the use of memristors in - a simple cell of a spatially-extended circuit architecture allows us to design - systems able to generate Turing patterns. In addition, the memristor parameters - play a key role in the selection of the type and characteristics of the emerging - pattern, which is also influenced by the initial conditions. The problem of - finding the regions of parameters where Turing patterns may emerge in the - proposed cellular architecture is solved in an analytic way, and numerical - results are shown to illustrate the system behavior with respect to its parameters.", - "venue": "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", - "year": 2016, "referenceCount": 32, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-07-13", "journal": {"name": "IEEE Transactions on - Circuits and Systems I: Regular Papers", "pages": "1222-1230", "volume": "63"}, - "authors": [{"authorId": "1884234", "name": "A. Buscarino"}, {"authorId": - "48285431", "name": "C. Corradino"}, {"authorId": "143998340", "name": "L. - Fortuna"}, {"authorId": "1766733", "name": "M. Frasca"}, {"authorId": "144848684", - "name": "L. Chua"}]}, {"paperId": "ececf989a13264a455ec2898ed361b1c435b5f0c", - "externalIds": {"PubMedCentral": "4360114", "MAG": "2099530148", "DOI": "10.1098/rstb.2014.0218", - "CorpusId": 1594833, "PubMed": "25750229"}, "url": "https://www.semanticscholar.org/paper/ececf989a13264a455ec2898ed361b1c435b5f0c", + Group website at http://www.algorithmicnature.org. An Online Algorithmic Complexity + Calculator implementing this technique and making the data available to the + research community is accessible at http://www.complexitycalculator.com.", + "venue": "PLoS ONE", "year": 2012, "referenceCount": 82, "citationCount": + 143, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": + {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0096223&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-11-06", "journal": {"name": "PLoS ONE", "volume": + "9"}, "authors": [{"authorId": "1389866422", "name": "F. Soler-Toscano"}, + {"authorId": "66445647", "name": "H. Zenil"}, {"authorId": "2027817702", "name": + "J. Delahaye"}, {"authorId": "3159526", "name": "N. Gauvrit"}]}, {"paperId": + "ececf989a13264a455ec2898ed361b1c435b5f0c", "externalIds": {"PubMedCentral": + "4360114", "MAG": "2099530148", "DOI": "10.1098/rstb.2014.0218", "CorpusId": + 1594833, "PubMed": "25750229"}, "corpusId": 1594833, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/ececf989a13264a455ec2898ed361b1c435b5f0c", "title": "Forging patterns and making waves from biology to geology: a commentary on Turing (1952) \u2018The chemical basis of morphogenesis\u2019", "abstract": "Alan Turing was neither a biologist nor a chemist, and yet the paper he published @@ -1281,7 +1471,8 @@ interactions: the 350th anniversary of the journal Philosophical Transactions of the Royal Society.", "venue": "Philosophical Transactions of the Royal Society B: Biological Sciences", "year": 2015, "referenceCount": 53, "citationCount": 76, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Geology", "Medicine"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rstb.2014.0218", + "status": "HYBRID"}, "fieldsOfStudy": ["Biology", "Geology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Geology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", @@ -1289,24 +1480,31 @@ interactions: Transactions of the Royal Society B: Biological Sciences", "volume": "370"}, "authors": [{"authorId": "145164549", "name": "P. Ball"}]}, {"paperId": "257d834280b58f62e8fcd18980162e3fc8f98138", "externalIds": {"DBLP": "books/sp/Soare16", "DOI": "10.1007/978-3-642-31933-4", - "CorpusId": 1500040}, "url": "https://www.semanticscholar.org/paper/257d834280b58f62e8fcd18980162e3fc8f98138", + "CorpusId": 1500040}, "corpusId": 1500040, "publicationVenue": {"id": "1ef7809b-0640-4615-aa43-9f080f8a9445", + "name": "Theory and Applications of Computability", "alternate_names": ["Theory + Appl Comput"], "issn": "2190-619X"}, "url": "https://www.semanticscholar.org/paper/257d834280b58f62e8fcd18980162e3fc8f98138", "title": "Turing Computability", "abstract": null, "venue": "Theory and Applications of Computability", "year": 2016, "referenceCount": 52, "citationCount": 52, - "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"pages": "3-249"}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, - {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": {"MAG": - "2982569830", "CorpusId": 209946616}, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", + "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/bfm%3A978-3-642-31933-4%2F1", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "3-249"}, "authors": [{"authorId": "1760293", "name": + "R. Soare"}]}, {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": + {"MAG": "2982569830", "CorpusId": 209946616}, "corpusId": 209946616, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", "title": "Turing (1936), On Computable Numbers, with an Application to the Entscheidungsproblem", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 62, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}], "publicationTypes": null, "publicationDate": "2016-02-24", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3045814", - "name": "Rossella Lupacchini"}]}, {"paperId": "51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, + "publicationDate": "2016-02-24", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3045814", "name": "Rossella Lupacchini"}]}, {"paperId": "51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", "externalIds": {"MAG": "3030327058", "DBLP": "journals/iacr/KoppulaLW14", - "DOI": "10.1145/2746539.2746614", "CorpusId": 1368494}, "url": "https://www.semanticscholar.org/paper/51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", + "DOI": "10.1145/2746539.2746614", "CorpusId": 1368494}, "corpusId": 1368494, + "publicationVenue": {"id": "166fd2b5-a928-4a98-a449-3b90935cc101", "name": + "IACR Cryptology ePrint Archive", "type": "journal", "alternate_names": ["IACR + Cryptol eprint Arch"], "url": "http://eprint.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", "title": "Indistinguishability Obfuscation for Turing Machines with Unbounded Memory", "abstract": "We show how to build indistinguishability obfuscation (iO) for Turing Machines where the overhead is polynomial in the security @@ -1323,18 +1521,19 @@ interactions: we are at in a proof. We first build up our enforcement ideas in a simpler context of \"message hiding encodings\" and work our way up to indistinguishability obfuscation.", "venue": "IACR Cryptology ePrint Archive", "year": 2015, "referenceCount": - 64, "citationCount": 123, "influentialCitationCount": 10, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["Book", "JournalArticle"], "publicationDate": "2015-06-14", "journal": {"name": - "Proceedings of the forty-seventh annual ACM symposium on Theory of Computing"}, - "authors": [{"authorId": "1827155", "name": "Venkata Koppula"}, {"authorId": - "145071454", "name": "Allison Bishop"}, {"authorId": "145778768", "name": - "Brent Waters"}]}, {"paperId": "fdadb889d47debf18fe82031af4062b2ccf9de86", + 64, "citationCount": 124, "influentialCitationCount": 10, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2015-06-14", + "journal": {"name": "Proceedings of the forty-seventh annual ACM symposium + on Theory of Computing"}, "authors": [{"authorId": "1827155", "name": "Venkata + Koppula"}, {"authorId": "145071454", "name": "Allison Bishop"}, {"authorId": + "145778768", "name": "Brent Waters"}]}, {"paperId": "fdadb889d47debf18fe82031af4062b2ccf9de86", "externalIds": {"MAG": "1955542456", "DOI": "10.1073/pnas.1505748112", "CorpusId": - 32757767, "PubMed": "26307762"}, "url": "https://www.semanticscholar.org/paper/fdadb889d47debf18fe82031af4062b2ccf9de86", + 32757767, "PubMed": "26307762"}, "corpusId": 32757767, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fdadb889d47debf18fe82031af4062b2ccf9de86", "title": "Diverse set of Turing nanopatterns coat corneae across insect lineages", "abstract": "Significance Corneal surfaces of some insects are coated with nipple-like nanostructures reducing the light reflection. Here we provide @@ -1365,16 +1564,18 @@ interactions: be the first-ever biological example of Turing nanopatterns.", "venue": "Proceedings of the National Academy of Sciences", "year": 2015, "referenceCount": 39, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Study"], "publicationDate": "2015-08-11", "journal": {"name": "Proceedings - of the National Academy of Sciences", "pages": "10750 - 10755", "volume": - "112"}, "authors": [{"authorId": "5960117", "name": "A. Blagodatski"}, {"authorId": - "47141264", "name": "A. Sergeev"}, {"authorId": "145583716", "name": "M. Kryuchkov"}, - {"authorId": "16047326", "name": "Y. Lopatina"}, {"authorId": "3875456", "name": - "V. Katanaev"}]}, {"paperId": "0ae19a6937d504e654a597543779f1b1c027562f", - "externalIds": {"CorpusId": 17049388}, "url": "https://www.semanticscholar.org/paper/0ae19a6937d504e654a597543779f1b1c027562f", + "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/112/34/10750.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Study"], "publicationDate": "2015-08-11", "journal": {"name": + "Proceedings of the National Academy of Sciences", "pages": "10750 - 10755", + "volume": "112"}, "authors": [{"authorId": "5960117", "name": "A. Blagodatski"}, + {"authorId": "47141264", "name": "A. Sergeev"}, {"authorId": "145583716", + "name": "M. Kryuchkov"}, {"authorId": "16047326", "name": "Y. Lopatina"}, + {"authorId": "3875456", "name": "V. Katanaev"}]}, {"paperId": "0ae19a6937d504e654a597543779f1b1c027562f", + "externalIds": {"CorpusId": 17049388}, "corpusId": 17049388, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0ae19a6937d504e654a597543779f1b1c027562f", "title": "The Church-Turing Thesis", "abstract": "cell containing a left end marker ` (never written over) and extends to infinitely many cells to the right. This machine has a head that can move left or right one cell in each @@ -1401,17 +1602,21 @@ interactions: and direction to move the tape head, given the current state and symbol read; it is assumed that no transitions are enabled from either t or r.", "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "37782675", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "37782675", "name": "Mahesh Viswanathan"}]}, {"paperId": "2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", "externalIds": {"MAG": "2315683245", "DBLP": "conf/automata/BarbieriKS16", "ArXiv": "1603.08715", "DOI": "10.1007/978-3-319-39300-1_5", "CorpusId": 12270213}, - "url": "https://www.semanticscholar.org/paper/2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", + "corpusId": 12270213, "publicationVenue": {"id": "1ecbe314-9ae3-4d24-b161-c8dc331acd3b", + "name": "International Workshop on Cellular Automata and Discrete Complex + Systems", "type": "conference", "alternate_names": ["AUTOMATA", "Int Workshop + Cell Autom Discret Complex Syst"]}, "url": "https://www.semanticscholar.org/paper/2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", "title": "The Group of Reversible Turing Machines", "abstract": null, "venue": "International Workshop on Cellular Automata and Discrete Complex Systems", "year": 2016, "referenceCount": 39, "citationCount": 23, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1603.08715", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -1419,7 +1624,12 @@ interactions: "name": "S. Barbieri"}, {"authorId": "1753080", "name": "J. Kari"}, {"authorId": "1789048", "name": "V. Salo"}]}, {"paperId": "30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", "externalIds": {"MAG": "2076118717", "DOI": "10.1126/science.1226804", "CorpusId": - 20013377, "PubMed": "23239739"}, "url": "https://www.semanticscholar.org/paper/30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", + 20013377, "PubMed": "23239739"}, "corpusId": 20013377, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", "title": "Hox Genes Regulate Digit Patterning by Controlling the Wavelength of a Turing-Type Mechanism", "abstract": "Digit Determination Pentadactyly has been an early and rapid innovation of tetrapods. Sheth et al. (p. 1476) @@ -1441,7 +1651,8 @@ interactions: endoskeleton patterns suggests that the pentadactyl state has been achieved through modification of an ancestral Turing-type mechanism.", "venue": "Science", "year": 2012, "referenceCount": 44, "citationCount": 318, "influentialCitationCount": - 16, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 16, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc4486416?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-14", "journal": {"name": "Science", @@ -1451,9 +1662,29 @@ interactions: "name": "Marisa Junco"}, {"authorId": "145631546", "name": "L. Quintana"}, {"authorId": "4351690", "name": "R. Dahn"}, {"authorId": "47986084", "name": "M. Kmita"}, {"authorId": "47254653", "name": "J. Sharpe"}, {"authorId": "3907783", - "name": "M. Ros"}]}, {"paperId": "c5fd63756cc5ac85e25af730e8da710efad43ed5", - "externalIds": {"DBLP": "journals/corr/abs-1205-3856", "ArXiv": "1205.3856", - "MAG": "2963817922", "CorpusId": 2749452}, "url": "https://www.semanticscholar.org/paper/c5fd63756cc5ac85e25af730e8da710efad43ed5", + "name": "M. Ros"}]}, {"paperId": "36fe20dd69b2160b3030fab2c103f02ee2816756", + "externalIds": {"MAG": "1495676205", "PubMedCentral": "4432648", "DOI": "10.1038/ncomms7971", + "CorpusId": 11824324, "PubMed": "25959141"}, "corpusId": 11824324, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/36fe20dd69b2160b3030fab2c103f02ee2816756", + "title": "Pigment cell movement is not required for generation of Turing patterns + in zebrafish skin", "abstract": null, "venue": "Nature Communications", "year": + 2015, "referenceCount": 32, "citationCount": 40, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/ncomms7971.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-05-11", "journal": {"name": "Nature + Communications", "volume": "6"}, "authors": [{"authorId": "4648400", "name": + "D. Bullara"}, {"authorId": "89673540", "name": "Y. De Decker"}]}, {"paperId": + "c5fd63756cc5ac85e25af730e8da710efad43ed5", "externalIds": {"DBLP": "journals/corr/abs-1205-3856", + "ArXiv": "1205.3856", "MAG": "2963817922", "CorpusId": 2749452}, "corpusId": + 2749452, "publicationVenue": {"id": "e6904c24-9546-4135-8344-e3999e375558", + "name": "Network and Distributed System Security Symposium", "type": "conference", + "alternate_names": ["Netw Distrib Syst Secur Symp", "NDSS"], "url": "http://www.isoc.org/"}, + "url": "https://www.semanticscholar.org/paper/c5fd63756cc5ac85e25af730e8da710efad43ed5", "title": "Social Turing Tests: Crowdsourcing Sybil Detection", "abstract": "As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks @@ -1470,45 +1701,41 @@ interactions: study data, we show that this system is scalable, and can be highly effective either as a standalone system or as a complementary technique to current tools.", "venue": "Network and Distributed System Security Symposium", "year": 2012, - "referenceCount": 37, "citationCount": 182, "influentialCitationCount": 13, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2012-05-01", - "journal": {"name": "ArXiv", "volume": "abs/1205.3856"}, "authors": [{"authorId": - "2096527", "name": "G. Wang"}, {"authorId": "2802925", "name": "M. Mohanlal"}, - {"authorId": "35497150", "name": "Christo Wilson"}, {"authorId": "144129720", - "name": "Xiao Wang"}, {"authorId": "1976593", "name": "Miriam J. Metzger"}, - {"authorId": "2704852", "name": "Haitao Zheng"}, {"authorId": "145970007", - "name": "Ben Y. Zhao"}]}, {"paperId": "748a8803deb06c5e51e5cf17496ea01aae923a48", - "externalIds": {"MAG": "2008912593", "DBLP": "journals/algorithmica/HermelinKSWW15", - "DOI": "10.1007/s00453-014-9910-8", "CorpusId": 15612295}, "url": "https://www.semanticscholar.org/paper/748a8803deb06c5e51e5cf17496ea01aae923a48", + "referenceCount": 37, "citationCount": 183, "influentialCitationCount": 13, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2012-05-01", "journal": {"name": "ArXiv", + "volume": "abs/1205.3856"}, "authors": [{"authorId": "2096527", "name": "G. + Wang"}, {"authorId": "2802925", "name": "M. Mohanlal"}, {"authorId": "35497150", + "name": "Christo Wilson"}, {"authorId": "144129720", "name": "Xiao Wang"}, + {"authorId": "1976593", "name": "Miriam J. Metzger"}, {"authorId": "2704852", + "name": "Haitao Zheng"}, {"authorId": "145970007", "name": "Ben Y. Zhao"}]}, + {"paperId": "748a8803deb06c5e51e5cf17496ea01aae923a48", "externalIds": {"MAG": + "2008912593", "DBLP": "journals/algorithmica/HermelinKSWW15", "DOI": "10.1007/s00453-014-9910-8", + "CorpusId": 15612295}, "corpusId": 15612295, "publicationVenue": {"id": "300eb16f-ce6c-495a-8da3-2e691bf9051d", + "name": "Algorithmica", "type": "journal", "issn": "0178-4617", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/453", + "alternate_urls": ["https://link.springer.com/journal/453", "http://www.springer.com/computer/theoretical+computer+science/journal/453"]}, + "url": "https://www.semanticscholar.org/paper/748a8803deb06c5e51e5cf17496ea01aae923a48", "title": "A Completeness Theory for Polynomial (Turing) Kernelization", "abstract": null, "venue": "Algorithmica", "year": 2013, "referenceCount": 62, "citationCount": - 95, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-09-04", "journal": {"name": "Algorithmica", - "pages": "702-730", "volume": "71"}, "authors": [{"authorId": "1736630", "name": - "D. Hermelin"}, {"authorId": "1692122", "name": "Stefan Kratsch"}, {"authorId": - "3164252", "name": "Karolina Soltys"}, {"authorId": "1849901", "name": "Magnus - Wahlstr\u00f6m"}, {"authorId": "37785191", "name": "Xi Wu"}]}, {"paperId": - "36fe20dd69b2160b3030fab2c103f02ee2816756", "externalIds": {"MAG": "1495676205", - "PubMedCentral": "4432648", "DOI": "10.1038/ncomms7971", "CorpusId": 11824324, - "PubMed": "25959141"}, "url": "https://www.semanticscholar.org/paper/36fe20dd69b2160b3030fab2c103f02ee2816756", - "title": "Pigment cell movement is not required for generation of Turing patterns - in zebrafish skin", "abstract": null, "venue": "Nature Communications", "year": - 2015, "referenceCount": 32, "citationCount": 37, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-05-11", "journal": {"name": "Nature - Communications", "volume": "6"}, "authors": [{"authorId": "4648400", "name": - "D. Bullara"}, {"authorId": "89673540", "name": "Y. De Decker"}]}, {"paperId": - "7281183d1b510a75fc32a9713133c242e6fcc718", "externalIds": {"PubMedCentral": - "4384830", "MAG": "2051172976", "DOI": "10.1021/sb500233u", "CorpusId": 508239, - "PubMed": "25122550"}, "url": "https://www.semanticscholar.org/paper/7281183d1b510a75fc32a9713133c242e6fcc718", + 95, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2013-09-04", "journal": {"name": "Algorithmica", "pages": "702-730", "volume": + "71"}, "authors": [{"authorId": "1736630", "name": "D. Hermelin"}, {"authorId": + "1692122", "name": "Stefan Kratsch"}, {"authorId": "3164252", "name": "Karolina + Soltys"}, {"authorId": "1849901", "name": "Magnus Wahlstr\u00f6m"}, {"authorId": + "37785191", "name": "Xi Wu"}]}, {"paperId": "7281183d1b510a75fc32a9713133c242e6fcc718", + "externalIds": {"PubMedCentral": "4384830", "MAG": "2051172976", "DOI": "10.1021/sb500233u", + "CorpusId": 508239, "PubMed": "25122550"}, "corpusId": 508239, "publicationVenue": + {"id": "ba560e30-4944-4dde-ac86-d977062fe0c5", "name": "ACS Synthetic Biology", + "type": "journal", "alternate_names": ["AC Synth Biology"], "issn": "2161-5063", + "url": "https://pubs.acs.org/journal/asbcd6", "alternate_urls": ["http://pubs.acs.org/journal/asbcd6"]}, + "url": "https://www.semanticscholar.org/paper/7281183d1b510a75fc32a9713133c242e6fcc718", "title": "Cooperativity To Increase Turing Pattern Space for Synthetic Biology", "abstract": "It is hard to bridge the gap between mathematical formulations and biological implementations of Turing patterns, yet this is necessary for @@ -1529,17 +1756,18 @@ interactions: of the limitations of linear scenarios for reaction\u2013diffusion systems and will help to guide projects to engineer synthetic Turing patterns.", "venue": "ACS Synthetic Biology", "year": 2014, "referenceCount": 52, "citationCount": - 39, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-08-14", "journal": {"name": "ACS Synthetic Biology", - "pages": "177 - 186", "volume": "4"}, "authors": [{"authorId": "2372067", - "name": "Luis Diambra"}, {"authorId": "6561683", "name": "V. Senthivel"}, - {"authorId": "47123946", "name": "Diego B\u00e1rcena Men\u00e9ndez"}, {"authorId": - "3091939", "name": "M. Isalan"}]}, {"paperId": "3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", - "externalIds": {"MAG": "300525892", "DBLP": "journals/corr/MalinowskiF14a", - "ArXiv": "1410.8027", "CorpusId": 811868}, "url": "https://www.semanticscholar.org/paper/3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", + 39, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-08-14", "journal": + {"name": "ACS Synthetic Biology", "pages": "177 - 186", "volume": "4"}, "authors": + [{"authorId": "2372067", "name": "Luis Diambra"}, {"authorId": "6561683", + "name": "V. Senthivel"}, {"authorId": "47123946", "name": "Diego B\u00e1rcena + Men\u00e9ndez"}, {"authorId": "3091939", "name": "M. Isalan"}]}, {"paperId": + "3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", "externalIds": {"MAG": "300525892", + "DBLP": "journals/corr/MalinowskiF14a", "ArXiv": "1410.8027", "CorpusId": + 811868}, "corpusId": 811868, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", "title": "Towards a Visual Turing Challenge", "abstract": "As language and visual understanding by machines progresses rapidly, we are observing an increasing interest in holistic architectures that tightly interlink both modalities @@ -1559,38 +1787,42 @@ interactions: driving force to create suitable benchmarks. Providing coverage in this inherently ambiguous output space is an emerging challenge that we face in order to make quantifiable progress in this area.", "venue": "ArXiv", "year": 2014, "referenceCount": - 83, "citationCount": 67, "influentialCitationCount": 12, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-10-29", "journal": {"name": "ArXiv", "volume": "abs/1410.8027"}, "authors": - [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": "1739548", - "name": "Mario Fritz"}]}, {"paperId": "358e1c04f03c2ede4b913a7430e99e78e66f2597", + 83, "citationCount": 68, "influentialCitationCount": 12, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-10-29", "journal": {"name": "ArXiv", "volume": "abs/1410.8027"}, + "authors": [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": + "1739548", "name": "Mario Fritz"}]}, {"paperId": "358e1c04f03c2ede4b913a7430e99e78e66f2597", "externalIds": {"MAG": "1990010228", "DOI": "10.1016/J.ECOCOM.2014.09.002", - "CorpusId": 84059947}, "url": "https://www.semanticscholar.org/paper/358e1c04f03c2ede4b913a7430e99e78e66f2597", + "CorpusId": 84059947}, "corpusId": 84059947, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/358e1c04f03c2ede4b913a7430e99e78e66f2597", "title": "Beyond Turing: The response of patterned ecosystems to environmental change", "abstract": null, "venue": "", "year": 2014, "referenceCount": 60, - "citationCount": 107, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2014-12-01", "journal": {"name": "Ecological Complexity", "pages": "81-96", - "volume": "20"}, "authors": [{"authorId": "3922814", "name": "K. Siteur"}, - {"authorId": "143978708", "name": "E. Siero"}, {"authorId": "6326314", "name": - "M. Eppinga"}, {"authorId": "144207734", "name": "J. Rademacher"}, {"authorId": - "1727787", "name": "A. Doelman"}, {"authorId": "2096458905", "name": "M. Rietkerk"}]}, - {"paperId": "999f90eebe8b3504b1ee3a8a689513b26e18772e", "externalIds": {"MAG": - "2490062034", "DOI": "10.1016/B978-0-12-386980-7.50021-6", "CorpusId": 63444001}, - "url": "https://www.semanticscholar.org/paper/999f90eebe8b3504b1ee3a8a689513b26e18772e", + "citationCount": 108, "influentialCitationCount": 8, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dspace.library.uu.nl/bitstream/1874/307590/1/14.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2014-12-01", "journal": {"name": "Ecological Complexity", + "pages": "81-96", "volume": "20"}, "authors": [{"authorId": "3922814", "name": + "K. Siteur"}, {"authorId": "143978708", "name": "E. Siero"}, {"authorId": + "6326314", "name": "M. Eppinga"}, {"authorId": "144207734", "name": "J. Rademacher"}, + {"authorId": "1727787", "name": "A. Doelman"}, {"authorId": "2096458905", + "name": "M. Rietkerk"}]}, {"paperId": "999f90eebe8b3504b1ee3a8a689513b26e18772e", + "externalIds": {"MAG": "2490062034", "DOI": "10.1016/B978-0-12-386980-7.50021-6", + "CorpusId": 63444001}, "corpusId": 63444001, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/999f90eebe8b3504b1ee3a8a689513b26e18772e", "title": "Turing\u2019s Lecture to the London Mathematical Society on 20 February 1947", "abstract": null, "venue": "", "year": 2013, "referenceCount": 5, "citationCount": - 156, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "481-497", "volume": ""}, "authors": [{"authorId": - "98630872", "name": "S. Cooper"}]}, {"paperId": "9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", + 157, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "481-497", "volume": ""}, "authors": + [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", "externalIds": {"DBLP": "books/cu/D2014", "MAG": "577185743", "DOI": "10.1017/CBO9781107338579.001", - "CorpusId": 19315498}, "url": "https://www.semanticscholar.org/paper/9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", + "CorpusId": 19315498}, "corpusId": 19315498, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", "title": "Turing''s legacy: developments from Turing''s ideas in logic", "abstract": "Turing''s legacy: developments from Turing''s ideas in logic Rod Downey 1. Computability and analysis: the legacy of Alan Turing Jeremy Avigad and Vasco @@ -1607,13 +1839,16 @@ interactions: by recursive step: Church''s analysis of effective calculability Wilfried Sieg 13. Turing and the discovery of computability Robert Irving Soare 14. Transfinite machine models P. D. Welch.", "venue": "Turing''s Legacy", "year": - 2014, "referenceCount": 0, "citationCount": 74, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "vii-x"}, "authors": [{"authorId": - "2134049919", "name": "R. Downey"}]}, {"paperId": "b3b262de503bd160ffcfd33e180d4e56fb41e53b", - "externalIds": {"MAG": "2059483036", "DBLP": "conf/3dim/ShanACFS13", "DOI": - "10.1109/3DV.2013.12", "CorpusId": 1315955}, "url": "https://www.semanticscholar.org/paper/b3b262de503bd160ffcfd33e180d4e56fb41e53b", + 2014, "referenceCount": 0, "citationCount": 76, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "vii-x"}, "authors": [{"authorId": "2134049919", "name": "R. Downey"}]}, + {"paperId": "b3b262de503bd160ffcfd33e180d4e56fb41e53b", "externalIds": {"MAG": + "2059483036", "DBLP": "conf/3dim/ShanACFS13", "DOI": "10.1109/3DV.2013.12", + "CorpusId": 1315955}, "corpusId": 1315955, "publicationVenue": {"id": "4b02e809-1c26-4203-b9ba-311a418f664b", + "name": "International Conference on 3D Vision", "type": "conference", "alternate_names": + ["Int Conf 3D Vis", "3DV"]}, "url": "https://www.semanticscholar.org/paper/b3b262de503bd160ffcfd33e180d4e56fb41e53b", "title": "The Visual Turing Test for Scene Reconstruction", "abstract": "We present the first large scale system for capturing and rendering relight able scene reconstructions from massive unstructured photo collections taken under @@ -1626,16 +1861,23 @@ interactions: the observer has to guess which is which. While we cannot yet fool human perception, the gap is closing.", "venue": "International Conference on 3D Vision", "year": 2013, "referenceCount": 12, "citationCount": 102, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2013-06-01", "journal": {"name": "2013 - International Conference on 3D Vision", "pages": "25-32"}, "authors": [{"authorId": - "2141964", "name": "Qi Shan"}, {"authorId": "30658914", "name": "R. Adams"}, - {"authorId": "143800609", "name": "B. Curless"}, {"authorId": "1798912", "name": - "Yasutaka Furukawa"}, {"authorId": "1679223", "name": "S. Seitz"}]}, {"paperId": - "a12d167d42e7960f3fd7ecbf9600aa036cc73def", "externalIds": {"DBLP": "journals/jetai/WarwickS15", - "MAG": "2049800859", "DOI": "10.1080/0952813X.2014.921734", "CorpusId": 45773196}, + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-06-01", + "journal": {"name": "2013 International Conference on 3D Vision", "pages": + "25-32"}, "authors": [{"authorId": "2141964", "name": "Qi Shan"}, {"authorId": + "30658914", "name": "R. Adams"}, {"authorId": "143800609", "name": "B. Curless"}, + {"authorId": "1798912", "name": "Yasutaka Furukawa"}, {"authorId": "1679223", + "name": "S. Seitz"}]}, {"paperId": "a12d167d42e7960f3fd7ecbf9600aa036cc73def", + "externalIds": {"DBLP": "journals/jetai/WarwickS15", "MAG": "2049800859", + "DOI": "10.1080/0952813X.2014.921734", "CorpusId": 45773196}, "corpusId": + 45773196, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, "url": "https://www.semanticscholar.org/paper/a12d167d42e7960f3fd7ecbf9600aa036cc73def", "title": "Human misidentification in Turing tests", "abstract": "This paper presents some important issues on misidentification of human interlocutors @@ -1652,14 +1894,15 @@ interactions: that performs well on the Turing test.", "venue": "Journal of experimental and theoretical artificial intelligence (Print)", "year": 2015, "referenceCount": 38, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-04", "journal": - {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "123 - 135", "volume": "27"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": - "01dde81924fc37171a93e2f4115b7beec8f349d9", "externalIds": {"MAG": "2221398315", - "DOI": "10.1080/01445340.2015.1082050", "CorpusId": 61921161}, "url": "https://www.semanticscholar.org/paper/01dde81924fc37171a93e2f4115b7beec8f349d9", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-03-04", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "123 - 135", "volume": "27"}, "authors": [{"authorId": + "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma + Shah"}]}, {"paperId": "01dde81924fc37171a93e2f4115b7beec8f349d9", "externalIds": + {"MAG": "2221398315", "DOI": "10.1080/01445340.2015.1082050", "CorpusId": + 61921161}, "corpusId": 61921161, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/01dde81924fc37171a93e2f4115b7beec8f349d9", "title": "Towards a Historical Notion of \u2018Turing\u2014the Father of Computer Science\u2019", "abstract": "In the popular imagination, the relevance of Turing''s theoretical ideas to people producing actual machines was significant @@ -1689,24 +1932,34 @@ interactions: in Turing''s work and provided the original vector by which Turing became to be appreciated in retrospect as the father of computer science.", "venue": "", "year": 2015, "referenceCount": 128, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-07-03", "journal": {"name": "History and Philosophy of Logic", "pages": - "205 - 228", "volume": "36"}, "authors": [{"authorId": "1745926", "name": - "E. Daylight"}]}, {"paperId": "7224596e2cbafff3c027021fb19410a63f76487b", - "externalIds": {"MAG": "840746988", "DBLP": "conf/mpc/McBride15", "DOI": "10.1007/978-3-319-19797-5_13", - "CorpusId": 1010375}, "url": "https://www.semanticscholar.org/paper/7224596e2cbafff3c027021fb19410a63f76487b", + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://lirias.kuleuven.be/bitstream/123456789/626462/2/A.main.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-07-03", + "journal": {"name": "History and Philosophy of Logic", "pages": "205 - 228", + "volume": "36"}, "authors": [{"authorId": "1745926", "name": "E. Daylight"}]}, + {"paperId": "7224596e2cbafff3c027021fb19410a63f76487b", "externalIds": {"MAG": + "840746988", "DBLP": "conf/mpc/McBride15", "DOI": "10.1007/978-3-319-19797-5_13", + "CorpusId": 1010375}, "corpusId": 1010375, "publicationVenue": {"id": "5d23a701-baa7-4e77-ba87-db9d97e270f7", + "name": "International Conference on Mathematics of Program Construction", + "type": "conference", "alternate_names": ["Math Program Constr", "Int Conf + Math Program Constr", "MPC", "Mathematics of Program Construction"]}, "url": + "https://www.semanticscholar.org/paper/7224596e2cbafff3c027021fb19410a63f76487b", "title": "Turing-Completeness Totally Free", "abstract": null, "venue": "International Conference on Mathematics of Program Construction", "year": 2015, "referenceCount": 25, "citationCount": 38, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2015-06-29", "journal": {"pages": "257-275"}, "authors": [{"authorId": "144883222", - "name": "Conor McBride"}]}, {"paperId": "dda277ca05684e9a56bea891a9c1478e8e531918", + "openAccessPdf": {"url": "https://strathprints.strath.ac.uk/60166/1/McBride_LNCS2015_Turing_completeness_totally_free.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2015-06-29", "journal": {"pages": "257-275"}, "authors": + [{"authorId": "144883222", "name": "Conor McBride"}]}, {"paperId": "dda277ca05684e9a56bea891a9c1478e8e531918", "externalIds": {"MAG": "2081273570", "DOI": "10.1103/PHYSREVLETT.111.024103", - "CorpusId": 14238651, "PubMed": "23889406"}, "url": "https://www.semanticscholar.org/paper/dda277ca05684e9a56bea891a9c1478e8e531918", + "CorpusId": 14238651, "PubMed": "23889406"}, "corpusId": 14238651, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dda277ca05684e9a56bea891a9c1478e8e531918", "title": "Transition from amplitude to oscillation death via Turing bifurcation.", "abstract": "Coupled oscillators are shown to experience two structurally different oscillation quenching types: amplitude death (AD) and oscillation @@ -1717,16 +1970,16 @@ interactions: (OD) steady state, as well as their significance for physical and biological applications and control studies, are also pointed out.", "venue": "Physical Review Letters", "year": 2013, "referenceCount": 64, "citationCount": 104, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2013-07-10", "journal": {"name": "Physical review letters", "pages": "\n 024103\n ", - "volume": "111 2"}, "authors": [{"authorId": "2850131", "name": "A. Koseska"}, - {"authorId": "2046767", "name": "E. Volkov"}, {"authorId": "143842718", "name": - "J. Kurths"}]}, {"paperId": "a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", "externalIds": - {"MAG": "2074603814", "DOI": "10.1093/IMAMAT/HXR050", "CorpusId": 527810}, - "url": "https://www.semanticscholar.org/paper/a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-07-10", "journal": {"name": "Physical review letters", + "pages": "\n 024103\n ", "volume": "111 2"}, "authors": [{"authorId": + "2850131", "name": "A. Koseska"}, {"authorId": "2046767", "name": "E. Volkov"}, + {"authorId": "143842718", "name": "J. Kurths"}]}, {"paperId": "a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", + "externalIds": {"MAG": "2074603814", "DOI": "10.1093/IMAMAT/HXR050", "CorpusId": + 527810}, "corpusId": 527810, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", "title": "Hopf bifurcation and Turing instability in the reaction\u2013diffusion Holling\u2013Tanner predator\u2013prey model", "abstract": "The reaction\u2013diffusion Holling\u2013Tanner predator\u2013prey model with Neumann boundary condition @@ -1738,31 +1991,38 @@ interactions: numerical simulations, we show the bistability of a stable equilibrium solution and a stable periodic solution for ordinary differential equation and the phenomenon that a periodic solution becomes Turing unstable for PDE.", "venue": - "", "year": 2013, "referenceCount": 24, "citationCount": 89, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-04-01", - "journal": {"name": "Ima Journal of Applied Mathematics", "pages": "287-306", - "volume": "78"}, "authors": [{"authorId": "2153897014", "name": "Xin Li"}, - {"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": "1728518", - "name": "Junping Shi"}]}, {"paperId": "bf4bf19f021c48910048741873627691d8277a61", + "", "year": 2013, "referenceCount": 24, "citationCount": 93, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-04-01", "journal": {"name": "Ima Journal of Applied Mathematics", "pages": + "287-306", "volume": "78"}, "authors": [{"authorId": "2153897014", "name": + "Xin Li"}, {"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": + "1728518", "name": "Junping Shi"}]}, {"paperId": "bf4bf19f021c48910048741873627691d8277a61", "externalIds": {"MAG": "101492982", "DBLP": "series/sci/Yampolskiy13", "DOI": - "10.1007/978-3-642-29694-9_1", "CorpusId": 7880844}, "url": "https://www.semanticscholar.org/paper/bf4bf19f021c48910048741873627691d8277a61", + "10.1007/978-3-642-29694-9_1", "CorpusId": 7880844}, "corpusId": 7880844, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf4bf19f021c48910048741873627691d8277a61", "title": "Turing Test as a Defining Feature of AI-Completeness", "abstract": null, "venue": "Artificial Intelligence, Evolutionary Computing and Metaheuristics", "year": 2013, "referenceCount": 77, "citationCount": 80, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://cecs.louisville.edu/ry/TuringTestasaDefiningFeature04270003.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "3-17"}, "authors": [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "710daed4f84e16e16a3a336e734a21f6a5e1f7d5", "externalIds": {"PubMedCentral": "3303118", "MAG": "2039888453", "DOI": "10.1038/ng.1090", - "CorpusId": 4649834, "PubMed": "22344222"}, "url": "https://www.semanticscholar.org/paper/710daed4f84e16e16a3a336e734a21f6a5e1f7d5", + "CorpusId": 4649834, "PubMed": "22344222"}, "corpusId": 4649834, "publicationVenue": + {"id": "bb27e645-e57c-42c3-bcbc-c7b443c58209", "name": "Nature Genetics", + "type": "journal", "alternate_names": ["Nat Genet"], "issn": "1061-4036", + "url": "http://www.nature.com/ng/", "alternate_urls": ["http://www.nature.com/ng/index.html"]}, + "url": "https://www.semanticscholar.org/paper/710daed4f84e16e16a3a336e734a21f6a5e1f7d5", "title": "Periodic stripe formation by a Turing-mechanism operating at growth zones in the mammalian palate", "abstract": null, "venue": "Nature Genetics", - "year": 2012, "referenceCount": 38, "citationCount": 220, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + "year": 2012, "referenceCount": 38, "citationCount": 222, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc3303118?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-09", "journal": {"name": "Nature @@ -1772,9 +2032,43 @@ interactions: "name": "P. Sharpe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}, {"authorId": "145155351", "name": "M. A. Basson"}, {"authorId": "1398203964", "name": "A. Gritli-Linde"}, {"authorId": "3748305", "name": "M. Cobourne"}, {"authorId": - "2113478488", "name": "Jeremy B. A. Green"}]}, {"paperId": "4368e42c838d031625def660ed724455a393883f", - "externalIds": {"MAG": "2001888401", "DOI": "10.1103/PHYSREVE.90.052908", - "CorpusId": 37161709, "PubMed": "25493859"}, "url": "https://www.semanticscholar.org/paper/4368e42c838d031625def660ed724455a393883f", + "2113478488", "name": "Jeremy B. A. Green"}]}, {"paperId": "25b65ca65ce0499855df6be6ab1a6575ad60f10a", + "externalIds": {"MAG": "2168169421", "ArXiv": "1310.6571", "DOI": "10.1103/PhysRevE.88.042925", + "CorpusId": 715587, "PubMed": "24229267"}, "corpusId": 715587, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/25b65ca65ce0499855df6be6ab1a6575ad60f10a", + "title": "Turing pattern formation in the Brusselator system with nonlinear + diffusion.", "abstract": "In this work we investigate the effect of density-dependent + nonlinear diffusion on pattern formation in the Brusselator system. Through + linear stability analysis of the basic solution we determine the Turing and + the oscillatory instability boundaries. A comparison with the classical linear + diffusion shows how nonlinear diffusion favors the occurrence of Turing pattern + formation. We study the process of pattern formation both in one-dimensional + and two-dimensional spatial domains. Through a weakly nonlinear multiple scales + analysis we derive the equations for the amplitude of the stationary patterns. + The analysis of the amplitude equations shows the occurrence of a number of + different phenomena, including stable supercritical and subcritical Turing + patterns with multiple branches of stable solutions leading to hysteresis. + Moreover, we consider traveling patterning waves: When the domain size is + large, the pattern forms sequentially and traveling wave fronts are the precursors + to patterning. We derive the Ginzburg-Landau equation and describe the traveling + front enveloping a pattern which invades the domain. We show the emergence + of radially symmetric target patterns, and, through a matching procedure, + we construct the outer amplitude equation and the inner core solution.", "venue": + "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": + 2013, "referenceCount": 69, "citationCount": 79, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1310.6571", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2013-10-01", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042925\n ", + "volume": "88 4"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, + {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": + "M. Sammartino"}, {"authorId": "6832964", "name": "V. Sciacca"}]}, {"paperId": + "4368e42c838d031625def660ed724455a393883f", "externalIds": {"MAG": "2001888401", + "DOI": "10.1103/PHYSREVE.90.052908", "CorpusId": 37161709, "PubMed": "25493859"}, + "corpusId": 37161709, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4368e42c838d031625def660ed724455a393883f", "title": "Delay-induced Turing instability in reaction-diffusion equations.", "abstract": "Time delays have been commonly used in modeling biological systems and can significantly change the dynamics of these systems. Quite a few works @@ -1791,16 +2085,21 @@ interactions: that the critical delay is a decreasing function of the ratio of carrying capacity to half saturation of the prey density.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": - 8, "citationCount": 59, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-11-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 052908\n ", + 8, "citationCount": 63, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://researchbank.swinburne.edu.au/file/f8bb9895-ebea-4537-9dac-ab6a888c67fc/1/PDF + (Published version).pdf", "status": "GREEN"}, "fieldsOfStudy": ["Medicine", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-11-01", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 052908\n ", "volume": "90 5-1"}, "authors": [{"authorId": "1742870", "name": "Tonghua Zhang"}, {"authorId": "144921840", "name": "Hong Zang"}]}, {"paperId": "2be24c021f2548c7d4da649748aa1f53ba035732", "externalIds": {"MAG": "2161045785", "DOI": "10.1098/rsfs.2011.0113", "CorpusId": - 18186798, "PubMed": "23919129"}, "url": "https://www.semanticscholar.org/paper/2be24c021f2548c7d4da649748aa1f53ba035732", + 18186798, "PubMed": "23919129"}, "corpusId": 18186798, "publicationVenue": + {"id": "692a1437-389a-429a-b9b0-7a8182722f06", "name": "Interface Focus", + "type": "journal", "issn": "2042-8898", "url": "http://rsfs.royalsocietypublishing.org/"}, + "url": "https://www.semanticscholar.org/paper/2be24c021f2548c7d4da649748aa1f53ba035732", "title": "Turing''s model for biological pattern formation and the robustness problem", "abstract": "One of the fundamental questions in developmental biology is how the vast range of pattern and structure we observe in nature emerges @@ -1815,18 +2114,23 @@ interactions: basic properties of Turing''s theory, we highlight the successes and pitfalls of using it as a model for biological systems, and discuss emerging developments in the area.", "venue": "Interface Focus", "year": 2012, "referenceCount": - 50, "citationCount": 196, "influentialCitationCount": 7, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2012-08-06", "journal": - {"name": "Interface Focus", "pages": "487 - 496", "volume": "2"}, "authors": - [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "6566804", "name": - "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": + 50, "citationCount": 201, "influentialCitationCount": 7, "isOpenAccess": true, + "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsfs.2011.0113", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2012-08-06", + "journal": {"name": "Interface Focus", "pages": "487 - 496", "volume": "2"}, + "authors": [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "6566804", + "name": "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "37236426", "name": "S. S. Lee"}]}, {"paperId": "79c13947d11cc1bb4461dea03a8c084333f255cc", "externalIds": {"MAG": "2149257324", "DBLP": "journals/ijns/CabessaS14", "DOI": "10.1142/S0129065714500294", - "CorpusId": 13188177, "PubMed": "25354762"}, "url": "https://www.semanticscholar.org/paper/79c13947d11cc1bb4461dea03a8c084333f255cc", + "CorpusId": 13188177, "PubMed": "25354762"}, "corpusId": 13188177, "publicationVenue": + {"id": "a042b147-151c-4d51-97c7-40b8434b377a", "name": "International Journal + of Neural Systems", "type": "journal", "alternate_names": ["Int J Neural Syst"], + "issn": "0129-0657", "url": "http://www.worldscinet.com/ijns", "alternate_urls": + ["http://www.worldscinet.com/ijns/ijns.shtml"]}, "url": "https://www.semanticscholar.org/paper/79c13947d11cc1bb4461dea03a8c084333f255cc", "title": "The Super-Turing Computational Power of plastic Recurrent Neural Networks", "abstract": "We study the computational capabilities of a biologically inspired neural model where the synaptic weights, the connectivity pattern, @@ -1849,26 +2153,42 @@ interactions: suitable way the capabilities of brain-like models of computation.", "venue": "International Journal of Neural Systems", "year": 2014, "referenceCount": 67, "citationCount": 54, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-11-20", "journal": - {"name": "International journal of neural systems", "pages": "\n 1450029\n ", - "volume": "24 8"}, "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie - Cabessa"}, {"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": - "25c161313411aea736e72cebd626b41ed8fcef82", "externalIds": {"PubMedCentral": - "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", "CorpusId": 1789930, - "PubMed": "24145394"}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-11-20", "journal": {"name": "International journal of neural systems", + "pages": "\n 1450029\n ", "volume": "24 8"}, "authors": [{"authorId": + "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "2797623", "name": + "H. Siegelmann"}]}, {"paperId": "0e410c91207e835c9cad7618491291e3935e7b91", + "externalIds": {"MAG": "2014564062", "DOI": "10.1007/S11071-013-1114-2", "CorpusId": + 122082126}, "corpusId": 122082126, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e410c91207e835c9cad7618491291e3935e7b91", + "title": "Turing instability and pattern formation of neural networks with + reaction\u2013diffusion terms", "abstract": null, "venue": "", "year": 2014, + "referenceCount": 29, "citationCount": 46, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2014-04-01", "journal": {"name": "Nonlinear Dynamics", "pages": "115-124", + "volume": "76"}, "authors": [{"authorId": "3343834", "name": "Hongyong Zhao"}, + {"authorId": "2048884404", "name": "Xuanxuan Huang"}, {"authorId": "2108177604", + "name": "Xuebing Zhang"}]}, {"paperId": "25c161313411aea736e72cebd626b41ed8fcef82", + "externalIds": {"PubMedCentral": "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", + "CorpusId": 1789930, "PubMed": "24145394"}, "corpusId": 1789930, "publicationVenue": + {"id": "bc96f9bd-89da-4c9a-ab24-27749617f6ff", "name": "Conference on Lasers + and Electro-Optics", "type": "conference", "alternate_names": ["CLEO", "Conf + Laser Electro-optics"]}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", "title": "Formation and control of Turing patterns in a coherent quantum fluid", "abstract": null, "venue": "Conference on Lasers and Electro-Optics", "year": - 2013, "referenceCount": 67, "citationCount": 45, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2013-10-22", "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": - [{"authorId": "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", - "name": "P. Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": + 2013, "referenceCount": 67, "citationCount": 46, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03016.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-10-22", + "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": [{"authorId": + "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", "name": "P. + Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": "93534597", "name": "Y. Tse"}, {"authorId": "118567298", "name": "N. Kwong"}, {"authorId": "34750791", "name": "A. L\u00fccke"}, {"authorId": "5207467", "name": "M. Abbarchi"}, {"authorId": "5012276", "name": "E. Baudin"}, {"authorId": @@ -1877,8 +2197,23 @@ interactions: "102296643", "name": "P. Leung"}, {"authorId": "5362311", "name": "P. Roussignol"}, {"authorId": "2829334", "name": "R. Binder"}, {"authorId": "35055521", "name": "J. Tignon"}, {"authorId": "49371199", "name": "S. Schumacher"}]}, {"paperId": - "0bbcd935186d5173766256de636b02974dcd7808", "externalIds": {"MAG": "564330425", - "DOI": "10.2307/j.ctvc77913", "CorpusId": 132210151}, "url": "https://www.semanticscholar.org/paper/0bbcd935186d5173766256de636b02974dcd7808", + "e007587c6904551c28d8590c0bbe871978ed1fc3", "externalIds": {"ArXiv": "1403.0351", + "MAG": "1865693766", "DOI": "10.1007/s10440-014-9903-2", "CorpusId": 119094472}, + "corpusId": 119094472, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e007587c6904551c28d8590c0bbe871978ed1fc3", + "title": "Turing Instability and Pattern Formation for the Lengyel\u2013Epstein + System with Nonlinear Diffusion", "abstract": null, "venue": "", "year": 2014, + "referenceCount": 38, "citationCount": 42, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1403.0351", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2014-03-03", "journal": {"name": + "Acta Applicandae Mathematicae", "pages": "283-294", "volume": "132"}, "authors": + [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", + "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, + {"paperId": "0bbcd935186d5173766256de636b02974dcd7808", "externalIds": {"MAG": + "564330425", "DOI": "10.2307/j.ctvc77913", "CorpusId": 132210151}, "corpusId": + 132210151, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0bbcd935186d5173766256de636b02974dcd7808", "title": "Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition", "abstract": "Alan Turing died in 1954, but the themes of his life epitomize the turn of the millennium. A pure mathematician from @@ -1905,14 +2240,20 @@ interactions: admits what all biographers know, but few admit, about their subjects: \"his inner code remains unbroken.\" Alan Turing is still an enigma. --Mary Ellen Curtin", "venue": "", "year": 2014, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2014-11-10", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "4901daf067430f3dca14ab32f348c86915021d16", - "externalIds": {"MAG": "2130797746", "DOI": "10.1017/S0956792514000370", "CorpusId": - 122542423}, "url": "https://www.semanticscholar.org/paper/4901daf067430f3dca14ab32f348c86915021d16", + 42, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2014-11-10", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "4901daf067430f3dca14ab32f348c86915021d16", "externalIds": {"MAG": "2130797746", + "DOI": "10.1017/S0956792514000370", "CorpusId": 122542423}, "corpusId": 122542423, + "publicationVenue": {"id": "04d04afc-8e5c-4c06-98fc-64bd52fa7c8b", "name": + "European journal of applied mathematics", "type": "journal", "alternate_names": + ["Eur J Appl Math", "European Journal of Applied Mathematics", "Eur j appl + math"], "issn": "0956-7925", "url": "https://www.cambridge.org/core/journals/european-journal-of-applied-mathematics", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=EJM"]}, + "url": "https://www.semanticscholar.org/paper/4901daf067430f3dca14ab32f348c86915021d16", "title": "Spatio-temporal organization in a morphochemical electrodeposition model: Hopf and Turing instabilities and their interplay", "abstract": "In this paper, we investigate from a theoretical point of view the 2D reaction-diffusion @@ -1930,72 +2271,18 @@ interactions: approximations of Turing patterns at the steady state and for the simulation of the oscillating Turing\u2013Hopf dynamics.", "venue": "European journal of applied mathematics", "year": 2014, "referenceCount": 80, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2014-12-22", "journal": {"name": "European Journal - of Applied Mathematics", "pages": "143 - 173", "volume": "26"}, "authors": - [{"authorId": "2663085", "name": "D. Lacitignola"}, {"authorId": "2081619", - "name": "B. Bozzini"}, {"authorId": "1914459", "name": "I. Sgura"}]}, {"paperId": - "25b65ca65ce0499855df6be6ab1a6575ad60f10a", "externalIds": {"MAG": "2168169421", - "ArXiv": "1310.6571", "DOI": "10.1103/PhysRevE.88.042925", "CorpusId": 715587, - "PubMed": "24229267"}, "url": "https://www.semanticscholar.org/paper/25b65ca65ce0499855df6be6ab1a6575ad60f10a", - "title": "Turing pattern formation in the Brusselator system with nonlinear - diffusion.", "abstract": "In this work we investigate the effect of density-dependent - nonlinear diffusion on pattern formation in the Brusselator system. Through - linear stability analysis of the basic solution we determine the Turing and - the oscillatory instability boundaries. A comparison with the classical linear - diffusion shows how nonlinear diffusion favors the occurrence of Turing pattern - formation. We study the process of pattern formation both in one-dimensional - and two-dimensional spatial domains. Through a weakly nonlinear multiple scales - analysis we derive the equations for the amplitude of the stationary patterns. - The analysis of the amplitude equations shows the occurrence of a number of - different phenomena, including stable supercritical and subcritical Turing - patterns with multiple branches of stable solutions leading to hysteresis. - Moreover, we consider traveling patterning waves: When the domain size is - large, the pattern forms sequentially and traveling wave fronts are the precursors - to patterning. We derive the Ginzburg-Landau equation and describe the traveling - front enveloping a pattern which invades the domain. We show the emergence - of radially symmetric target patterns, and, through a matching procedure, - we construct the outer amplitude equation and the inner core solution.", "venue": - "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2013, "referenceCount": 69, "citationCount": 69, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-10-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042925\n ", - "volume": "88 4"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, - {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": - "M. Sammartino"}, {"authorId": "6832964", "name": "V. Sciacca"}]}, {"paperId": - "0e410c91207e835c9cad7618491291e3935e7b91", "externalIds": {"MAG": "2014564062", - "DOI": "10.1007/S11071-013-1114-2", "CorpusId": 122082126}, "url": "https://www.semanticscholar.org/paper/0e410c91207e835c9cad7618491291e3935e7b91", - "title": "Turing instability and pattern formation of neural networks with - reaction\u2013diffusion terms", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 29, "citationCount": 38, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + 43, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E44F32B9BF463A0C4E752D57B846AF4D/S0956792514000370a.pdf/div-class-title-spatio-temporal-organization-in-a-morphochemical-electrodeposition-model-hopf-and-turing-instabilities-and-their-interplay-div.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-04-01", - "journal": {"name": "Nonlinear Dynamics", "pages": "115-124", "volume": "76"}, - "authors": [{"authorId": "3343834", "name": "Hongyong Zhao"}, {"authorId": - "2048884404", "name": "Xuanxuan Huang"}, {"authorId": "2108177604", "name": - "Xuebing Zhang"}]}, {"paperId": "e007587c6904551c28d8590c0bbe871978ed1fc3", - "externalIds": {"ArXiv": "1403.0351", "MAG": "1865693766", "DOI": "10.1007/s10440-014-9903-2", - "CorpusId": 119094472}, "url": "https://www.semanticscholar.org/paper/e007587c6904551c28d8590c0bbe871978ed1fc3", - "title": "Turing Instability and Pattern Formation for the Lengyel\u2013Epstein - System with Nonlinear Diffusion", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 38, "citationCount": 36, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2014-03-03", "journal": {"name": - "Acta Applicandae Mathematicae", "pages": "283-294", "volume": "132"}, "authors": - [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", - "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, - {"paperId": "6525b2627f3f304e785dd299c7fa28dbceba52a6", "externalIds": {"ArXiv": - "1206.3431", "MAG": "1827134935", "DBLP": "books/cu/p/AvigadB14", "DOI": "10.1017/CBO9781107338579.002", - "CorpusId": 4495614}, "url": "https://www.semanticscholar.org/paper/6525b2627f3f304e785dd299c7fa28dbceba52a6", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-12-22", + "journal": {"name": "European Journal of Applied Mathematics", "pages": "143 + - 173", "volume": "26"}, "authors": [{"authorId": "2663085", "name": "D. Lacitignola"}, + {"authorId": "2081619", "name": "B. Bozzini"}, {"authorId": "1914459", "name": + "I. Sgura"}]}, {"paperId": "6525b2627f3f304e785dd299c7fa28dbceba52a6", "externalIds": + {"ArXiv": "1206.3431", "MAG": "1827134935", "DBLP": "books/cu/p/AvigadB14", + "DOI": "10.1017/CBO9781107338579.002", "CorpusId": 4495614}, "corpusId": 4495614, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6525b2627f3f304e785dd299c7fa28dbceba52a6", "title": "Computability and analysis: the legacy of Alan Turing", "abstract": "For most of its history, mathematics was algorithmic in nature. The geometric claims in Euclid\u2019s Elements fall into two distinct categories: \u201cproblems,\u201d @@ -2017,8 +2304,9 @@ interactions: de Fermat in 1654 and developed further by Christian Huygens and Jakob Bernoulli, provided methods for calculating odds related to games of chance. Abraham de Moivre\u2019s 1718 monograph on the subject was", "venue": "Turing''s Legacy", - "year": 2012, "referenceCount": 258, "citationCount": 75, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "year": 2012, "referenceCount": 258, "citationCount": 76, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1206.3431", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -2026,21 +2314,30 @@ interactions: "name": "J. Avigad"}, {"authorId": "1805099", "name": "V. Brattka"}]}, {"paperId": "4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", "externalIds": {"PubMedCentral": "3882759", "MAG": "2950247578", "ArXiv": "1310.6738", "DOI": "10.1038/srep03585", - "CorpusId": 11517888, "PubMed": "24394959"}, "url": "https://www.semanticscholar.org/paper/4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", + "CorpusId": 11517888, "PubMed": "24394959"}, "corpusId": 11517888, "publicationVenue": + {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", "name": "Scientific Reports", + "type": "journal", "alternate_names": ["Sci Rep"], "issn": "2045-2322", "url": + "http://www.nature.com/srep/", "alternate_urls": ["http://www.nature.com/srep/index.html"]}, + "url": "https://www.semanticscholar.org/paper/4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", "title": "Dispersal-induced destabilization of metapopulations and oscillatory Turing patterns in ecological networks", "abstract": null, "venue": "Scientific Reports", "year": 2013, "referenceCount": 59, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science", - "Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-10-24", "journal": {"name": "Scientific - Reports", "volume": "4"}, "authors": [{"authorId": "6061448", "name": "S. - Hata"}, {"authorId": "3259202", "name": "H. Nakao"}, {"authorId": "2490613", - "name": "A. Mikhailov"}]}, {"paperId": "1518e7c855f47ed9fefde59dd8104c8bc3f10604", - "externalIds": {"ArXiv": "1305.6262", "MAG": "2020305723", "DOI": "10.1088/1478-3975/10/4/046003", - "CorpusId": 3130652, "PubMed": "23770927"}, "url": "https://www.semanticscholar.org/paper/1518e7c855f47ed9fefde59dd8104c8bc3f10604", + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03585.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Physics", "Computer Science", "Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-10-24", "journal": {"name": "Scientific Reports", + "volume": "4"}, "authors": [{"authorId": "6061448", "name": "S. Hata"}, {"authorId": + "3259202", "name": "H. Nakao"}, {"authorId": "2490613", "name": "A. Mikhailov"}]}, + {"paperId": "1518e7c855f47ed9fefde59dd8104c8bc3f10604", "externalIds": {"ArXiv": + "1305.6262", "MAG": "2020305723", "DOI": "10.1088/1478-3975/10/4/046003", + "CorpusId": 3130652, "PubMed": "23770927"}, "corpusId": 3130652, "publicationVenue": + {"id": "dbc23552-b067-4548-b1b7-e6ce9f0ebcbe", "name": "Physical Biology", + "type": "journal", "alternate_names": ["Phys Biology"], "issn": "1478-3967", + "url": "http://iopscience.iop.org/1478-3975/", "alternate_urls": ["https://iopscience.iop.org/journal/1478-3975", + "http://iopscience.org/pb"]}, "url": "https://www.semanticscholar.org/paper/1518e7c855f47ed9fefde59dd8104c8bc3f10604", "title": "Kidney branching morphogenesis under the control of a ligand\u2013receptor-based Turing mechanism", "abstract": "The main signalling proteins that control early kidney branching have been defined. Yet the underlying mechanism is @@ -2061,46 +2358,36 @@ interactions: are met also by other receptor\u2013ligand systems. We propose that ligand\u2013receptor-based Turing patterns represent a general mechanism to control branching morphogenesis and other developmental processes.", "venue": "Physical Biology", "year": - 2013, "referenceCount": 81, "citationCount": 59, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], - "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 2013, "referenceCount": 81, "citationCount": 60, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1305.6262", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-05-27", "journal": {"name": "Physical Biology", "volume": "10"}, "authors": [{"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", "name": "D. Iber"}]}, {"paperId": "647746026ab21765a506f406072bd7359211cd24", "externalIds": {"MAG": "2045982128", "DBLP": "conf/lics/BojanczykKLT13", "DOI": - "10.1109/LICS.2013.24", "CorpusId": 2163160}, "url": "https://www.semanticscholar.org/paper/647746026ab21765a506f406072bd7359211cd24", + "10.1109/LICS.2013.24", "CorpusId": 2163160}, "corpusId": 2163160, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/647746026ab21765a506f406072bd7359211cd24", "title": "Turing Machines with Atoms", "abstract": "We study Turing machines over sets with atoms, also known as nominal sets. Our main result is that deterministic machines are weaker than nondeterministic ones; in particular, P\u2260NP in sets with atoms. Our main construction is closely related to the Cai-Furer-Immerman graphs used in descriptive complexity theory.", "venue": "2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science", "year": - 2013, "referenceCount": 15, "citationCount": 52, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-06-25", "journal": {"name": "2013 28th Annual ACM/IEEE - Symposium on Logic in Computer Science", "pages": "183-192"}, "authors": [{"authorId": - "1706643", "name": "M. Bojanczyk"}, {"authorId": "35244823", "name": "Bartek - Klin"}, {"authorId": "2447489", "name": "S. Lasota"}, {"authorId": "2964062", - "name": "Szymon Toru\u0144czyk"}]}, {"paperId": "417cd61563f870cb19541f4afc639a85ec1c6628", - "externalIds": {"MAG": "2337525307", "ArXiv": "1209.2772", "DOI": "10.1007/s11538-013-9834-5", - "CorpusId": 16968855, "PubMed": "23546926"}, "url": "https://www.semanticscholar.org/paper/417cd61563f870cb19541f4afc639a85ec1c6628", - "title": "Turing Patterns from Dynamics of Early HIV Infection", "abstract": - null, "venue": "Bulletin of Mathematical Biology", "year": 2012, "referenceCount": - 41, "citationCount": 53, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-09-13", "journal": {"name": "Bulletin of Mathematical - Biology", "pages": "774-795", "volume": "75"}, "authors": [{"authorId": "4874286", - "name": "O. Stancevic"}, {"authorId": "2813671", "name": "C. Angstmann"}, - {"authorId": "47465046", "name": "J. M. Murray"}, {"authorId": "39683695", - "name": "B. Henry"}]}, {"paperId": "d1f47aad6d196823abebc2b5d5a85b6dcada3707", - "externalIds": {"MAG": "609368779", "DOI": "10.5860/choice.51-2125", "CorpusId": - 44009886}, "url": "https://www.semanticscholar.org/paper/d1f47aad6d196823abebc2b5d5a85b6dcada3707", + 2013, "referenceCount": 15, "citationCount": 53, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-06-25", "journal": + {"name": "2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science", + "pages": "183-192"}, "authors": [{"authorId": "1706643", "name": "M. Bojanczyk"}, + {"authorId": "35244823", "name": "Bartek Klin"}, {"authorId": "2447489", "name": + "S. Lasota"}, {"authorId": "2964062", "name": "Szymon Toru\u0144czyk"}]}, + {"paperId": "d1f47aad6d196823abebc2b5d5a85b6dcada3707", "externalIds": {"MAG": + "609368779", "DOI": "10.5860/choice.51-2125", "CorpusId": 44009886}, "corpusId": + 44009886, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d1f47aad6d196823abebc2b5d5a85b6dcada3707", "title": "Alan Turing: His Work and Impact", "abstract": "\"The fact remains that everyone who taps at a keyboard, opening a spreadsheet or a word-processing program, is working on an incarnation of a Turing machine.\"-TIME In this @@ -2121,14 +2408,37 @@ interactions: most significant papers by A.M. Turing.Commentary explaining the significance of each seminal paper by preeminent leaders in the field. Additional resources available online.", "venue": "", "year": 2013, "referenceCount": 0, "citationCount": - 51, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-05-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, - {"authorId": "143817739", "name": "J. V. Leeuwen"}]}, {"paperId": "3bd7858df71adb919d1d4b137cf1c78134d7f33e", + 52, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-05-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "98630872", + "name": "S. Cooper"}, {"authorId": "143817739", "name": "J. V. Leeuwen"}]}, + {"paperId": "417cd61563f870cb19541f4afc639a85ec1c6628", "externalIds": {"MAG": + "2337525307", "ArXiv": "1209.2772", "DOI": "10.1007/s11538-013-9834-5", "CorpusId": + 16968855, "PubMed": "23546926"}, "corpusId": 16968855, "publicationVenue": + {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/417cd61563f870cb19541f4afc639a85ec1c6628", + "title": "Turing Patterns from Dynamics of Early HIV Infection", "abstract": + null, "venue": "Bulletin of Mathematical Biology", "year": 2012, "referenceCount": + 41, "citationCount": 55, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1209.2772", "status": "GREEN"}, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-09-13", "journal": {"name": "Bulletin of Mathematical + Biology", "pages": "774-795", "volume": "75"}, "authors": [{"authorId": "4874286", + "name": "O. Stancevic"}, {"authorId": "2813671", "name": "C. Angstmann"}, + {"authorId": "47465046", "name": "J. M. Murray"}, {"authorId": "39683695", + "name": "B. Henry"}]}, {"paperId": "3bd7858df71adb919d1d4b137cf1c78134d7f33e", "externalIds": {"DBLP": "journals/aicom/Muggleton14", "MAG": "1589462974", - "DOI": "10.3233/AIC-130579", "CorpusId": 14046484}, "url": "https://www.semanticscholar.org/paper/3bd7858df71adb919d1d4b137cf1c78134d7f33e", + "DOI": "10.3233/AIC-130579", "CorpusId": 14046484}, "corpusId": 14046484, + "publicationVenue": {"id": "4c57b6f2-ebab-420d-baf9-cd595e2f2a63", "name": + "AI Communications", "type": "journal", "alternate_names": ["Ai Communications", + "AI Commun", "Ai Commun"], "issn": "0921-7126", "url": "http://content.iospress.com/journals/ai-communications", + "alternate_urls": ["https://www.iospress.nl/html/09217126.php", "https://www.iospress.nl/journal/ai-communications/"]}, + "url": "https://www.semanticscholar.org/paper/3bd7858df71adb919d1d4b137cf1c78134d7f33e", "title": "Alan Turing and the development of Artificial Intelligence", "abstract": "During the centennial year of his birth Alan Turing 1912--1954 has been widely celebrated as having laid the foundations for Computer Science, Automated @@ -2149,46 +2459,15 @@ interactions: within AI, and conclude with a discussion of some of the unresolved challenges he posed within the paper.", "venue": "AI Communications", "year": 2014, "referenceCount": 72, "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "AI Commun.", "pages": "3-10", "volume": "27"}, - "authors": [{"authorId": "145147566", "name": "S. Muggleton"}]}, {"paperId": - "6089b4474ed94a06aba42974fade7009bc77ee4e", "externalIds": {"MAG": "2159039200", - "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", "CorpusId": 18322775}, - "url": "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", - "title": "On Turing dynamical systems and the Atiyah problem", "abstract": - null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", - "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz - Grabowski"}]}, {"paperId": "7d4518f7ba6528967244114a5daaed2884b9b86c", "externalIds": - {"DBLP": "phd/ethos/Rendell14", "MAG": "89603295", "DOI": "10.1007/978-3-319-19842-2", - "CorpusId": 33250805}, "url": "https://www.semanticscholar.org/paper/7d4518f7ba6528967244114a5daaed2884b9b86c", - "title": "Turing machine universality of the game of life", "abstract": null, - "venue": "", "year": 2015, "referenceCount": 29, "citationCount": 31, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-07-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "4692459f05bd9ad5cd672327f23884ad46237fc2", - "externalIds": {"MAG": "50191166", "DBLP": "conf/itp/XuZU13", "DOI": "10.1007/978-3-642-39634-2_13", - "CorpusId": 18610926}, "url": "https://www.semanticscholar.org/paper/4692459f05bd9ad5cd672327f23884ad46237fc2", - "title": "Mechanising Turing Machines and Computability Theory in Isabelle/HOL", - "abstract": null, "venue": "International Conference on Interactive Theorem - Proving", "year": 2013, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "openAccessPdf": {"url": "http://www.doc.ic.ac.uk/~shm/Papers/TuringAI_1.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-07-22", "journal": {"pages": "147-162"}, "authors": - [{"authorId": "2110979820", "name": "Jian Xu"}, {"authorId": "2153647569", - "name": "Xingyuan Zhang"}, {"authorId": "144231186", "name": "Christian Urban"}]}, + "publicationDate": null, "journal": {"name": "AI Commun.", "pages": "3-10", + "volume": "27"}, "authors": [{"authorId": "145147566", "name": "S. Muggleton"}]}, {"paperId": "d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "externalIds": {"MAG": "2016568588", "DOI": "10.1103/PHYSREVE.90.062915", "CorpusId": 42727592, "PubMed": - "25615172"}, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", + "25615172"}, "corpusId": 42727592, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "title": "Turing pattern dynamics in an activator-inhibitor system with superdiffusion.", "abstract": "The fractional operator is introduced to an activator-inhibitor system to describe species anomalous superdiffusion. The effects of the superdiffusive @@ -2208,17 +2487,71 @@ interactions: exponent between the inhibitor and activator is more likely to promote the emergence of the Turing pattern, relative to the normal diffusion.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2014, "referenceCount": 47, "citationCount": 31, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + 2014, "referenceCount": 47, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-12-19", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 062915\n ", "volume": + "90 6"}, "authors": [{"authorId": "2037744526", "name": "Lai Zhang"}, {"authorId": + "1990780", "name": "Canrong Tian"}]}, {"paperId": "7d4518f7ba6528967244114a5daaed2884b9b86c", + "externalIds": {"DBLP": "phd/ethos/Rendell14", "MAG": "89603295", "DOI": "10.1007/978-3-319-19842-2", + "CorpusId": 33250805}, "corpusId": 33250805, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7d4518f7ba6528967244114a5daaed2884b9b86c", + "title": "Turing machine universality of the game of life", "abstract": null, + "venue": "", "year": 2015, "referenceCount": 29, "citationCount": 31, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://uwe-repository.worktribe.com/preview/822581/thesis.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-07-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "6089b4474ed94a06aba42974fade7009bc77ee4e", + "externalIds": {"MAG": "2159039200", "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", + "CorpusId": 18322775}, "corpusId": 18322775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", + "title": "On Turing dynamical systems and the Atiyah problem", "abstract": + null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, + "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1004.2030", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", + "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz + Grabowski"}]}, {"paperId": "4692459f05bd9ad5cd672327f23884ad46237fc2", "externalIds": + {"MAG": "50191166", "DBLP": "conf/itp/XuZU13", "DOI": "10.1007/978-3-642-39634-2_13", + "CorpusId": 18610926}, "corpusId": 18610926, "publicationVenue": {"id": "1b356608-ca93-40d2-8553-8925a463dab9", + "name": "International Conference on Interactive Theorem Proving", "type": + "conference", "alternate_names": ["Interactive Theorem Proving", "Interact + Theorem Proving", "Int Conf Interact Theorem Proving", "ITP"], "url": "https://en.wikipedia.org/wiki/Interactive_Theorem_Proving_(conference)"}, + "url": "https://www.semanticscholar.org/paper/4692459f05bd9ad5cd672327f23884ad46237fc2", + "title": "Mechanising Turing Machines and Computability Theory in Isabelle/HOL", + "abstract": null, "venue": "International Conference on Interactive Theorem + Proving", "year": 2013, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-07-22", "journal": + {"pages": "147-162"}, "authors": [{"authorId": "2110979820", "name": "Jian + Xu"}, {"authorId": "2153647569", "name": "Xingyuan Zhang"}, {"authorId": "144231186", + "name": "Christian Urban"}]}, {"paperId": "6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "externalIds": {"MAG": "2039471684", "DOI": "10.1140/EPJB/E2013-30649-7", + "CorpusId": 121119740}, "corpusId": 121119740, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "title": "Turing instabilities in reaction-diffusion systems with cross diffusion", + "abstract": null, "venue": "", "year": 2013, "referenceCount": 27, "citationCount": + 37, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-12-19", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 062915\n ", "volume": "90 6"}, "authors": [{"authorId": - "2037744526", "name": "Lai Zhang"}, {"authorId": "1990780", "name": "Canrong - Tian"}]}, {"paperId": "f4aaf0a780cd02138aade2a51f99989cc2c962fd", "externalIds": - {"MAG": "2006131432", "ArXiv": "1406.6401", "DOI": "10.1103/PhysRevE.90.042814", - "CorpusId": 9743163, "PubMed": "25375556"}, "url": "https://www.semanticscholar.org/paper/f4aaf0a780cd02138aade2a51f99989cc2c962fd", + "publicationTypes": null, "publicationDate": "2013-04-10", "journal": {"name": + "The European Physical Journal B", "pages": "1-8", "volume": "86"}, "authors": + [{"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "46848249", "name": + "C. Cianci"}, {"authorId": "39866244", "name": "F. Patti"}]}, {"paperId": + "f4aaf0a780cd02138aade2a51f99989cc2c962fd", "externalIds": {"MAG": "2006131432", + "ArXiv": "1406.6401", "DOI": "10.1103/PhysRevE.90.042814", "CorpusId": 9743163, + "PubMed": "25375556"}, "corpusId": 9743163, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f4aaf0a780cd02138aade2a51f99989cc2c962fd", "title": "Turing patterns in multiplex networks.", "abstract": "The theory of patterns formation for a reaction-diffusion system defined on a multiplex is developed by means of a perturbative approach. The interlayer diffusion @@ -2230,7 +2563,8 @@ interactions: away due to cross-talking between layers. Analytical results are compared to direct simulations.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": 32, "citationCount": - 59, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": + 61, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1406.6401", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], @@ -2240,9 +2574,34 @@ interactions: "5903846", "name": "M. Asllani"}, {"authorId": "48664134", "name": "D. M. Busiello"}, {"authorId": "1809355", "name": "T. Carletti"}, {"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "4546397", "name": "Gwendoline Planchon"}]}, - {"paperId": "295572e7977c0fa5dfc388c77a921e6bb9d87c28", "externalIds": {"MAG": - "2032685465", "DOI": "10.1002/adma.201103053", "CorpusId": 11416263, "PubMed": - "22329003"}, "url": "https://www.semanticscholar.org/paper/295572e7977c0fa5dfc388c77a921e6bb9d87c28", + {"paperId": "a68eacfad1978b0c53c113b1884c440193cb8e18", "externalIds": {"DBLP": + "journals/itpro/Strawn14", "DOI": "10.1109/MITP.2014.2", "CorpusId": 24377977}, + "corpusId": 24377977, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a68eacfad1978b0c53c113b1884c440193cb8e18", + "title": "Alan Turing", "abstract": "In this first installment of IT Professional''s + new Mastermind department, which will profile innovators, inventors, and key + people in the fields of IT, computer science, and information systems, George + Strawn reflects on the father of computer science, Alan Turing. He focuses + on Turing''s early theoretical work, noting how unusual it is for a major + theoretical result to precede any practice in a field. Turing devised a simple + process for creating theoretical machines that could implement such procedures, + and he conjectured that these machines could compute anything that was computable + (in other words, they defined computability).", "venue": "IT Professional", + "year": 2018, "referenceCount": 6, "citationCount": 26, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-23", "journal": + {"name": "IT Professional", "pages": "5-7", "volume": "16"}, "authors": [{"authorId": + "2013713", "name": "George O. Strawn"}]}, {"paperId": "295572e7977c0fa5dfc388c77a921e6bb9d87c28", + "externalIds": {"MAG": "2032685465", "DOI": "10.1002/adma.201103053", "CorpusId": + 11416263, "PubMed": "22329003"}, "corpusId": 11416263, "publicationVenue": + {"id": "71697426-616f-45b4-b9d8-d647335a32e6", "name": "Advances in Materials", + "type": "journal", "alternate_names": ["Adv Mater", "Advanced Materials"], + "issn": "2327-2503", "alternate_issns": ["0935-9648"], "url": "http://www.sciencepublishinggroup.com/journal/archive.aspx?amp;issueid=-1&journalid=129", + "alternate_urls": ["http://www.advmat.de/", "https://onlinelibrary.wiley.com/journal/15214095", + "http://www.sciencepublishinggroup.com/journal/archive.aspx?issueid=-1&journalid=129", + "http://www.wiley-vch.de/publish/en/journals/alphabeticIndex/2089/"]}, "url": + "https://www.semanticscholar.org/paper/295572e7977c0fa5dfc388c77a921e6bb9d87c28", "title": "Emergent Criticality in Complex Turing B\u2010Type Atomic Switch Networks", "abstract": "Recent advances in the neuromorphic operation of atomic switches as individual synapse\u2010like devices demonstrate the ability to @@ -2263,35 +2622,19 @@ interactions: networks as an implementable hardware\u2010based platform toward the creation of physically intelligent machines.", "venue": "Advances in Materials", "year": 2012, "referenceCount": 69, "citationCount": 131, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Materials Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-01-10", "journal": {"name": "Advanced Materials", "volume": "24"}, "authors": - [{"authorId": "6408870", "name": "A. Stieg"}, {"authorId": "3469690", "name": - "Audrius V. Avizienis"}, {"authorId": "5991538", "name": "H. O. Sillin"}, - {"authorId": "1402392982", "name": "C. Martin-Olmos"}, {"authorId": "38567152", - "name": "M. Aono"}, {"authorId": "1902938", "name": "J. Gimzewski"}]}, {"paperId": - "a68eacfad1978b0c53c113b1884c440193cb8e18", "externalIds": {"DBLP": "journals/itpro/Strawn14", - "DOI": "10.1109/MITP.2014.2", "CorpusId": 24377977}, "url": "https://www.semanticscholar.org/paper/a68eacfad1978b0c53c113b1884c440193cb8e18", - "title": "Alan Turing", "abstract": "In this first installment of IT Professional''s - new Mastermind department, which will profile innovators, inventors, and key - people in the fields of IT, computer science, and information systems, George - Strawn reflects on the father of computer science, Alan Turing. He focuses - on Turing''s early theoretical work, noting how unusual it is for a major - theoretical result to precede any practice in a field. Turing devised a simple - process for creating theoretical machines that could implement such procedures, - and he conjectured that these machines could compute anything that was computable - (in other words, they defined computability).", "venue": "IT Professional", - "year": 2018, "referenceCount": 6, "citationCount": 25, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-06-23", "journal": {"name": "IT Professional", "pages": - "5-7", "volume": "16"}, "authors": [{"authorId": "2013713", "name": "George - O. Strawn"}]}, {"paperId": "85b093fad42e510598da9a6bb8e81375016ce98c", "externalIds": - {"MAG": "2095518058", "ArXiv": "1407.7114", "DOI": "10.1103/PhysRevE.90.022716", - "CorpusId": 18341472, "PubMed": "25215767"}, "url": "https://www.semanticscholar.org/paper/85b093fad42e510598da9a6bb8e81375016ce98c", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Materials Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-01-10", "journal": {"name": "Advanced Materials", + "volume": "24"}, "authors": [{"authorId": "6408870", "name": "A. Stieg"}, + {"authorId": "3469690", "name": "Audrius V. Avizienis"}, {"authorId": "5991538", + "name": "H. O. Sillin"}, {"authorId": "1402392982", "name": "C. Martin-Olmos"}, + {"authorId": "38567152", "name": "M. Aono"}, {"authorId": "1902938", "name": + "J. Gimzewski"}]}, {"paperId": "85b093fad42e510598da9a6bb8e81375016ce98c", + "externalIds": {"MAG": "2095518058", "ArXiv": "1407.7114", "DOI": "10.1103/PhysRevE.90.022716", + "CorpusId": 18341472, "PubMed": "25215767"}, "corpusId": 18341472, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/85b093fad42e510598da9a6bb8e81375016ce98c", "title": "Feedback, receptor clustering, and receptor restriction to single cells yield large Turing spaces for ligand-receptor-based Turing models.", "abstract": "Turing mechanisms can yield a large variety of patterns from @@ -2315,7 +2658,8 @@ interactions: mechanisms present a general mechanism for patterning in biology.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": 94, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://real.mtak.hu/14410/1/XQ10067E.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer @@ -2324,34 +2668,7 @@ interactions: Statistical, nonlinear, and soft matter physics", "pages": "\n 022716\n ", "volume": "90 2"}, "authors": [{"authorId": "2094723809", "name": "Tam\u00e1s Kurics"}, {"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", - "name": "D. Iber"}]}, {"paperId": "3a0bc3500260b9a5c19a09a0a2b5349c41383145", - "externalIds": {"MAG": "2119455906", "DOI": "10.1098/rsfs.2011.0097", "CorpusId": - 10041916, "PubMed": "23919125"}, "url": "https://www.semanticscholar.org/paper/3a0bc3500260b9a5c19a09a0a2b5349c41383145", - "title": "Turing''s theory of morphogenesis of 1952 and the subsequent discovery - of the crucial role of local self-enhancement and long-range inhibition", - "abstract": "In his pioneering work, Alan Turing showed that de novo pattern - formation is possible if two substances interact that differ in their diffusion - range. Since then, we have shown that pattern formation is possible if, and - only if, a self-enhancing reaction is coupled with an antagonistic process - of longer range. Knowing this crucial condition has enabled us to include - nonlinear interactions, which are required to design molecularly realistic - interactions. Different reaction schemes and their relation to Turing''s proposal - are discussed and compared with more recent observations on the molecular\u2013genetic - level. The antagonistic reaction may be accomplished by an inhibitor that - is produced in the activated region or by a depletion of a component that - is used up during the self-enhancing reaction. The autocatalysis may be realized - by an inhibition of an inhibition. Activating molecules can be processed into - molecules that have an inhibiting function; patterning of the Wnt pathway - is proposed to depend on such a mechanism. Three-component systems, as discussed - in Turing''s paper, are shown to play a major role in the generation of highly - dynamic patterns that never reach a stable state.", "venue": "Interface Focus", - "year": 2012, "referenceCount": 52, "citationCount": 109, "influentialCitationCount": - 9, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-08-06", "journal": {"name": "Interface Focus", "pages": "407 - 416", - "volume": "2"}, "authors": [{"authorId": "145191224", "name": "H. Meinhardt"}]}]} + "name": "D. Iber"}]}]} ' headers: @@ -2360,31 +2677,31 @@ interactions: Connection: - keep-alive Content-Length: - - '189773' + - '216427' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:00:51 GMT + - Tue, 03 Jan 2023 20:52:39 GMT Via: - - 1.1 75e7f56ac0cd014270ac3a4272f3830e.cloudfront.net (CloudFront) + - 1.1 e78b76dfef058166460b96bc0460f46c.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - GKaOLuRs_jHha83Gcw7P3qO-cevqvTMU4a-4McgWp41mQq8YDZaaoA== + - 1hr3NuFwL9ZZT_a86zHg_r-BBp7efMuCK6Rq9jSlZ_L4uWeIVTU37w== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - dem2EEOEPHcFyjQ= + - eLxPkEwJvHcFZpw= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '189773' + - '216427' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:00:51 GMT + - Tue, 03 Jan 2023 20:52:39 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - a34f8168-bda6-4d23-a387-398a57abffdd + - 55269a26-17ba-4edc-84f5-8bbe46ffc84c status: code: 200 message: OK diff --git a/tests/data/test_search_paper_fields_of_study.yaml b/tests/data/test_search_paper_fields_of_study.yaml index 963f05f..50c130a 100644 --- a/tests/data/test_search_paper_fields_of_study.yaml +++ b/tests/data/test_search_paper_fields_of_study.yaml @@ -11,12 +11,12 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields_of_study=Mathematics&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=0&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields_of_study=Mathematics&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=0&limit=100 response: body: - string: '{"total": 133389, "offset": 0, "next": 100, "data": [{"paperId": "6b0f06617d9f5256a80ed62d9398acb92a55a6bd", + string: '{"total": 133751, "offset": 0, "next": 100, "data": [{"paperId": "6b0f06617d9f5256a80ed62d9398acb92a55a6bd", "externalIds": {"MAG": "136785111", "DOI": "10.1098/rspa.1985.0070", "CorpusId": - 1438116}, "url": "https://www.semanticscholar.org/paper/6b0f06617d9f5256a80ed62d9398acb92a55a6bd", + 1438116}, "corpusId": 1438116, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b0f06617d9f5256a80ed62d9398acb92a55a6bd", "title": "Quantum theory, the Church\u2013Turing principle and the universal quantum computer", "abstract": "It is argued that underlying the Church\u2013Turing hypothesis there is an implicit physical assertion. Here, this assertion is @@ -41,16 +41,17 @@ interactions: or \u2018knowledge\u2019 in a physical system than does classical complexity theory.", "venue": "Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences", "year": 1985, "referenceCount": 19, "citationCount": - 4048, "influentialCitationCount": 210, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1985-07-08", "journal": {"name": "Proceedings of the Royal Society of London. - A. Mathematical and Physical Sciences", "pages": "117 - 97", "volume": "400"}, - "authors": [{"authorId": "145346874", "name": "D. Deutsch"}]}, {"paperId": - "c3823aacea60bc1f2cabb9283144690a3d015db5", "externalIds": {"ArXiv": "1410.5401", - "DBLP": "journals/corr/GravesWD14", "MAG": "2950527759", "CorpusId": 15299054}, - "url": "https://www.semanticscholar.org/paper/c3823aacea60bc1f2cabb9283144690a3d015db5", + 4119, "influentialCitationCount": 215, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1985-07-08", "journal": {"name": "Proceedings of + the Royal Society of London. A. Mathematical and Physical Sciences", "pages": + "117 - 97", "volume": "400"}, "authors": [{"authorId": "145346874", "name": + "D. Deutsch"}]}, {"paperId": "c3823aacea60bc1f2cabb9283144690a3d015db5", "externalIds": + {"ArXiv": "1410.5401", "DBLP": "journals/corr/GravesWD14", "MAG": "2950527759", + "CorpusId": 15299054}, "corpusId": 15299054, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c3823aacea60bc1f2cabb9283144690a3d015db5", "title": "Neural Turing Machines", "abstract": "We extend the capabilities of neural networks by coupling them to external memory resources, which they can interact with by attentional processes. The combined system is analogous @@ -58,16 +59,17 @@ interactions: allowing it to be efficiently trained with gradient descent. Preliminary results demonstrate that Neural Turing Machines can infer simple algorithms such as copying, sorting, and associative recall from input and output examples.", - "venue": "ArXiv", "year": 2014, "referenceCount": 44, "citationCount": 1764, - "influentialCitationCount": 222, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-10-20", "journal": - {"name": "ArXiv", "volume": "abs/1410.5401"}, "authors": [{"authorId": "1753223", - "name": "A. Graves"}, {"authorId": "89504302", "name": "Greg Wayne"}, {"authorId": - "1841008", "name": "Ivo Danihelka"}]}, {"paperId": "7cbc2a7843411a1768ab762930707af0a3c33a19", - "externalIds": {"DBLP": "journals/corr/abs-2201-11990", "ArXiv": "2201.11990", - "CorpusId": 246411325}, "url": "https://www.semanticscholar.org/paper/7cbc2a7843411a1768ab762930707af0a3c33a19", + "venue": "ArXiv", "year": 2014, "referenceCount": 44, "citationCount": 1772, + "influentialCitationCount": 222, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-10-20", "journal": {"name": "ArXiv", "volume": "abs/1410.5401"}, "authors": + [{"authorId": "1753223", "name": "A. Graves"}, {"authorId": "89504302", "name": + "Greg Wayne"}, {"authorId": "1841008", "name": "Ivo Danihelka"}]}, {"paperId": + "7cbc2a7843411a1768ab762930707af0a3c33a19", "externalIds": {"DBLP": "journals/corr/abs-2201-11990", + "ArXiv": "2201.11990", "CorpusId": 246411325}, "corpusId": 246411325, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7cbc2a7843411a1768ab762930707af0a3c33a19", "title": "Using DeepSpeed and Megatron to Train Megatron-Turing NLG 530B, A Large-Scale Generative Language Model", "abstract": "Pretrained general-purpose language models can achieve state-of-the-art accuracies in various natural @@ -88,27 +90,32 @@ interactions: NLP benchmarks and establishes new state-of-the-art results. We believe that our contributions will help further the development of large-scale training infrastructures, large-scale language models, and natural language generations.", - "venue": "ArXiv", "year": 2022, "referenceCount": 69, "citationCount": 156, - "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-28", "journal": - {"name": "ArXiv", "volume": "abs/2201.11990"}, "authors": [{"authorId": "2110486618", - "name": "Shaden Smith"}, {"authorId": "66870756", "name": "M. Patwary"}, {"authorId": - "2172095", "name": "Brandon Norick"}, {"authorId": "3081566", "name": "P. - LeGresley"}, {"authorId": "32817044", "name": "Samyam Rajbhandari"}, {"authorId": - "48991386", "name": "J. Casper"}, {"authorId": "49293070", "name": "Zhun Liu"}, - {"authorId": "9358910", "name": "Shrimai Prabhumoye"}, {"authorId": "30647302", - "name": "George Zerveas"}, {"authorId": "3111334", "name": "V. Korthikanti"}, - {"authorId": "2151686157", "name": "Elton Zhang"}, {"authorId": "48422824", - "name": "Rewon Child"}, {"authorId": "3394222", "name": "Reza Yazdani Aminabadi"}, - {"authorId": "2745589", "name": "J. Bernauer"}, {"authorId": "50706785", "name": - "Xia Song"}, {"authorId": "1911755", "name": "M. Shoeybi"}, {"authorId": "2145020341", - "name": "Yuxiong He"}, {"authorId": "122523478", "name": "Michael Houston"}, - {"authorId": "40070335", "name": "Saurabh Tiwary"}, {"authorId": "2301680", - "name": "Bryan Catanzaro"}]}, {"paperId": "9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", - "externalIds": {"MAG": "2803058542", "DOI": "10.1126/science.aar6308", "CorpusId": - 19100947, "PubMed": "29724951"}, "url": "https://www.semanticscholar.org/paper/9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", + "venue": "ArXiv", "year": 2022, "referenceCount": 69, "citationCount": 161, + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-01-28", "journal": {"name": "ArXiv", "volume": "abs/2201.11990"}, "authors": + [{"authorId": "2110486618", "name": "Shaden Smith"}, {"authorId": "66870756", + "name": "M. Patwary"}, {"authorId": "2172095", "name": "Brandon Norick"}, + {"authorId": "3081566", "name": "P. LeGresley"}, {"authorId": "32817044", + "name": "Samyam Rajbhandari"}, {"authorId": "48991386", "name": "J. Casper"}, + {"authorId": "49293070", "name": "Zhun Liu"}, {"authorId": "9358910", "name": + "Shrimai Prabhumoye"}, {"authorId": "30647302", "name": "George Zerveas"}, + {"authorId": "3111334", "name": "V. Korthikanti"}, {"authorId": "2151686157", + "name": "Elton Zhang"}, {"authorId": "48422824", "name": "Rewon Child"}, {"authorId": + "3394222", "name": "Reza Yazdani Aminabadi"}, {"authorId": "2745589", "name": + "J. Bernauer"}, {"authorId": "50706785", "name": "Xia Song"}, {"authorId": + "1911755", "name": "M. Shoeybi"}, {"authorId": "2145020341", "name": "Yuxiong + He"}, {"authorId": "122523478", "name": "Michael Houston"}, {"authorId": "40070335", + "name": "Saurabh Tiwary"}, {"authorId": "2301680", "name": "Bryan Catanzaro"}]}, + {"paperId": "9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", "externalIds": {"MAG": + "2803058542", "DOI": "10.1126/science.aar6308", "CorpusId": 19100947, "PubMed": + "29724951"}, "corpusId": 19100947, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", "title": "Polyamide membranes with nanoscale Turing structures for water purification", "abstract": "Turing structures at the nanoscale Turing structures arise when imbalances in diffusion rates make a stable steady-state system sensitive @@ -130,19 +137,23 @@ interactions: that surpasses the upper-bound line of traditional desalination membranes. Furthermore, we show the existence of high water permeability sites in the Turing structures, where water transport through the membranes is enhanced.", - "venue": "Science", "year": 2018, "referenceCount": 35, "citationCount": 653, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Materials - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-05-04", "journal": {"name": "Science", "pages": "518 - - 521", "volume": "360"}, "authors": [{"authorId": "2343556", "name": "Zhe - Tan"}, {"authorId": "153064608", "name": "Sheng-Gang Chen"}, {"authorId": - "18239828", "name": "Xinsheng Peng"}, {"authorId": "2143835330", "name": "Lin - Zhang"}, {"authorId": "2148805809", "name": "Cong-jie Gao"}]}, {"paperId": - "bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "externalIds": {"ArXiv": "1908.07219", - "MAG": "2999960596", "DOI": "10.1098/rsif.2019.0621", "CorpusId": 201103943, - "PubMed": "31937231"}, "url": "https://www.semanticscholar.org/paper/bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", + "venue": "Science", "year": 2018, "referenceCount": 35, "citationCount": 665, + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-05-04", "journal": + {"name": "Science", "pages": "518 - 521", "volume": "360"}, "authors": [{"authorId": + "2343556", "name": "Zhe Tan"}, {"authorId": "153064608", "name": "Sheng-Gang + Chen"}, {"authorId": "18239828", "name": "Xinsheng Peng"}, {"authorId": "2143835330", + "name": "Lin Zhang"}, {"authorId": "2148805809", "name": "Cong-jie Gao"}]}, + {"paperId": "bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "externalIds": {"ArXiv": + "1908.07219", "MAG": "2999960596", "DOI": "10.1098/rsif.2019.0621", "CorpusId": + 201103943, "PubMed": "31937231"}, "corpusId": 201103943, "publicationVenue": + {"id": "f6537e0e-c3a9-4de5-bd36-19eda0434065", "name": "Journal of the Royal + Society Interface", "type": "journal", "alternate_names": ["J R Soc Interface"], + "issn": "1742-5662", "url": "http://rsif.royalsocietypublishing.org/"}, "url": + "https://www.semanticscholar.org/paper/bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "title": "From one pattern into another: analysis of Turing patterns in heterogeneous domains via WKBJ", "abstract": "Pattern formation from homogeneity is well studied, but less is known concerning symmetry-breaking instabilities in heterogeneous @@ -166,17 +177,23 @@ interactions: original thesis to a far wider and more realistic class of systems.", "venue": "Journal of the Royal Society Interface", "year": 2019, "referenceCount": 135, "citationCount": 38, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-08-20", "journal": {"name": "Journal of the Royal - Society Interface", "volume": "17"}, "authors": [{"authorId": "22256586", - "name": "Andrew L. Krause"}, {"authorId": "2691918", "name": "V. Klika"}, - {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "2662569", "name": - "E. Gaffney"}]}, {"paperId": "339c6e6d46836c173fb6a23b493c724896d4cc70", "externalIds": - {"ArXiv": "1708.07149", "MAG": "2963527228", "DBLP": "journals/corr/abs-1708-07149", - "ACL": "P17-1103", "DOI": "10.18653/v1/P17-1103", "CorpusId": 1880070}, "url": - "https://www.semanticscholar.org/paper/339c6e6d46836c173fb6a23b493c724896d4cc70", + "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsif.2019.0621", + "status": "HYBRID"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-08-20", "journal": {"name": "Journal + of the Royal Society Interface", "volume": "17"}, "authors": [{"authorId": + "22256586", "name": "Andrew L. Krause"}, {"authorId": "2691918", "name": "V. + Klika"}, {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "2662569", + "name": "E. Gaffney"}]}, {"paperId": "339c6e6d46836c173fb6a23b493c724896d4cc70", + "externalIds": {"ArXiv": "1708.07149", "MAG": "2963527228", "DBLP": "journals/corr/abs-1708-07149", + "ACL": "P17-1103", "DOI": "10.18653/v1/P17-1103", "CorpusId": 1880070}, "corpusId": + 1880070, "publicationVenue": {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", + "name": "Annual Meeting of the Association for Computational Linguistics", + "type": "conference", "alternate_names": ["Annu Meet Assoc Comput Linguistics", + "Meeting of the Association for Computational Linguistics", "ACL", "Meet Assoc + Comput Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, + "url": "https://www.semanticscholar.org/paper/339c6e6d46836c173fb6a23b493c724896d4cc70", "title": "Towards an Automatic Turing Test: Learning to Evaluate Dialogue Responses", "abstract": "Automatically evaluating the quality of dialogue responses for unstructured domains is a challenging problem. Unfortunately, @@ -194,7 +211,8 @@ interactions: training, an important step for automatic dialogue evaluation.", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2017, "referenceCount": 57, "citationCount": 302, "influentialCitationCount": - 54, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 54, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.aclweb.org/anthology/P17-1103.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-02-17", "journal": {"name": "ArXiv", @@ -204,20 +222,21 @@ interactions: Angelard-Gontier"}, {"authorId": "1751762", "name": "Yoshua Bengio"}, {"authorId": "145134886", "name": "Joelle Pineau"}]}, {"paperId": "ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", "externalIds": {"MAG": "2808618339", "DOI": "10.17863/CAM.42246", "CorpusId": - 46998004}, "url": "https://www.semanticscholar.org/paper/ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", + 46998004}, "corpusId": 46998004, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", "title": "Turing: A Language for Flexible Probabilistic Inference", "abstract": "HG and ZG acknowledge support from the Alan Turing Institute (EPSRC Grant EP/N510129/1) and EPSRC Grant EP/N014162/1, and donations from Google and Microsoft Research.", "venue": "", "year": 2018, "referenceCount": 21, "citationCount": - 151, "influentialCitationCount": 18, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "1682-1690", "volume": ""}, "authors": [{"authorId": "49365036", - "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, {"authorId": - "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", + 153, "influentialCitationCount": 18, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "1682-1690", "volume": ""}, "authors": [{"authorId": + "49365036", "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, + {"authorId": "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", "externalIds": {"MAG": "2920798074", "ArXiv": "1903.07486", "DBLP": "journals/corr/abs-1903-07486", - "CorpusId": 81981887}, "url": "https://www.semanticscholar.org/paper/01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", + "CorpusId": 81981887}, "corpusId": 81981887, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", "title": "Dissecting the NVidia Turing T4 GPU via Microbenchmarking", "abstract": "In 2019, the rapid rate at which GPU manufacturers refresh their designs, coupled with their reluctance to disclose microarchitectural details, is still @@ -243,16 +262,19 @@ interactions: \nMany of our findings are novel, published here for the first time. All of them can guide high-performance software developers get closer to the GPU''s peak performance.", "venue": "ArXiv", "year": 2019, "referenceCount": 8, "citationCount": - 63, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-03-18", "journal": - {"name": "ArXiv", "volume": "abs/1903.07486"}, "authors": [{"authorId": "48813086", - "name": "Zhe Jia"}, {"authorId": "138304679", "name": "Marco Maggioni"}, {"authorId": - "2109849147", "name": "Jeffrey K. Smith"}, {"authorId": "3277273", "name": - "D. Scarpazza"}]}, {"paperId": "be17d3f111f31d97f8b61499d5aae274043e9f14", + 64, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2019-03-18", "journal": {"name": "ArXiv", "volume": "abs/1903.07486"}, "authors": + [{"authorId": "48813086", "name": "Zhe Jia"}, {"authorId": "138304679", "name": + "Marco Maggioni"}, {"authorId": "2109849147", "name": "Jeffrey K. Smith"}, + {"authorId": "3277273", "name": "D. Scarpazza"}]}, {"paperId": "be17d3f111f31d97f8b61499d5aae274043e9f14", "externalIds": {"DBLP": "journals/corr/abs-1901-03429", "MAG": "2962749806", - "ArXiv": "1901.03429", "CorpusId": 57825721}, "url": "https://www.semanticscholar.org/paper/be17d3f111f31d97f8b61499d5aae274043e9f14", + "ArXiv": "1901.03429", "CorpusId": 57825721}, "corpusId": 57825721, "publicationVenue": + {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", "name": "International Conference + on Learning Representations", "type": "conference", "alternate_names": ["Int + Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, "url": "https://www.semanticscholar.org/paper/be17d3f111f31d97f8b61499d5aae274043e9f14", "title": "On the Turing Completeness of Modern Neural Network Architectures", "abstract": "Alternatives to recurrent neural networks, in particular, architectures based on attention or convolutions, have been gaining momentum for processing @@ -267,30 +289,37 @@ interactions: minimal sets of elements needed to obtain these completeness results.", "venue": "International Conference on Learning Representations", "year": 2019, "referenceCount": 23, "citationCount": 58, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-01-10", "journal": - {"name": "ArXiv", "volume": "abs/1901.03429"}, "authors": [{"authorId": "144022533", - "name": "Jorge P\u00e9rez"}, {"authorId": "66941060", "name": "Javier Marinkovic"}, - {"authorId": "35106192", "name": "P. Barcel\u00f3"}]}, {"paperId": "74e281384ed8340956989bc2a93f8387458a09bf", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-01-10", "journal": {"name": "ArXiv", "volume": "abs/1901.03429"}, + "authors": [{"authorId": "144022533", "name": "Jorge P\u00e9rez"}, {"authorId": + "66941060", "name": "Javier Marinkovic"}, {"authorId": "35106192", "name": + "P. Barcel\u00f3"}]}, {"paperId": "74e281384ed8340956989bc2a93f8387458a09bf", "externalIds": {"PubMedCentral": "6484223", "MAG": "2938327216", "DOI": "10.1038/s41467-018-08212-8", - "CorpusId": 58014273, "PubMed": "30651543"}, "url": "https://www.semanticscholar.org/paper/74e281384ed8340956989bc2a93f8387458a09bf", + "CorpusId": 58014273, "PubMed": "30651543"}, "corpusId": 58014273, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/74e281384ed8340956989bc2a93f8387458a09bf", "title": "Image-based modeling of kidney branching morphogenesis reveals GDNF-RET based Turing-type mechanism and pattern-modulating WNT11 feedback", "abstract": null, "venue": "Nature Communications", "year": 2019, "referenceCount": 85, - "citationCount": 47, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-01-16", "journal": {"name": "Nature Communications", - "volume": "10"}, "authors": [{"authorId": "2261511", "name": "D. Menshykau"}, - {"authorId": "49174222", "name": "Odyss\u00e9 Michos"}, {"authorId": "145185799", - "name": "C. Lang"}, {"authorId": "52261411", "name": "L. Conrad"}, {"authorId": - "2149854", "name": "A. McMahon"}, {"authorId": "2962540", "name": "D. Iber"}]}, - {"paperId": "d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "externalIds": {"MAG": - "2808367373", "DOI": "10.1073/pnas.1720770115", "CorpusId": 48357941, "PubMed": - "29891706"}, "url": "https://www.semanticscholar.org/paper/d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", + "citationCount": 48, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.nature.com/articles/s41467-018-08212-8.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-01-16", "journal": {"name": "Nature + Communications", "volume": "10"}, "authors": [{"authorId": "2261511", "name": + "D. Menshykau"}, {"authorId": "49174222", "name": "Odyss\u00e9 Michos"}, {"authorId": + "145185799", "name": "C. Lang"}, {"authorId": "52261411", "name": "L. Conrad"}, + {"authorId": "2149854", "name": "A. McMahon"}, {"authorId": "2962540", "name": + "D. Iber"}]}, {"paperId": "d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "externalIds": + {"MAG": "2808367373", "DOI": "10.1073/pnas.1720770115", "CorpusId": 48357941, + "PubMed": "29891706"}, "corpusId": 48357941, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "title": "Stochastic Turing patterns in a synthetic bacterial population", "abstract": "Significance In 1952, Alan Turing proposed that biological morphogenesis could arise from a dynamical process in reaction systems with a rapidly diffusing @@ -327,8 +356,9 @@ interactions: patterns. These findings provide the groundwork for a unified picture of biological morphogenesis, arising from a combination of stochastic gene expression and dynamical instabilities.", "venue": "Proceedings of the National Academy of - Sciences", "year": 2018, "referenceCount": 51, "citationCount": 118, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + Sciences", "year": 2018, "referenceCount": 51, "citationCount": 119, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/115/26/6572.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-11", "journal": {"name": "Proceedings @@ -338,7 +368,12 @@ interactions: "4540871", "name": "Nicholas A. DeLateur"}, {"authorId": "3549131", "name": "N. Goldenfeld"}, {"authorId": "144224740", "name": "R. Weiss"}]}, {"paperId": "12c00512e99b88bf01bbd8662324fa3b61a73347", "externalIds": {"MAG": "2947165724", - "DOI": "10.11948/2156-907X.20190015", "CorpusId": 191165780}, "url": "https://www.semanticscholar.org/paper/12c00512e99b88bf01bbd8662324fa3b61a73347", + "DOI": "10.11948/2156-907X.20190015", "CorpusId": 191165780}, "corpusId": + 191165780, "publicationVenue": {"id": "4fd93153-bfee-4b6a-a124-36e8b51b8316", + "name": "The Journal of Applied Analysis and Computation", "type": "journal", + "alternate_names": ["J Appl Anal Comput", "Journal of Applied Analysis and + Computation"], "issn": "2156-907X", "url": "http://jaac-online.com/"}, "url": + "https://www.semanticscholar.org/paper/12c00512e99b88bf01bbd8662324fa3b61a73347", "title": "TURING-HOPF BIFURCATION IN THE REACTION-DIFFUSION SYSTEM WITH DELAY AND APPLICATION TO A DIFFUSIVE PREDATOR-PREY MODEL", "abstract": "The interactions of diffusion-driven Turing instability and delayinduced Hopf bifurcation always @@ -355,21 +390,26 @@ interactions: inhomogeneous periodic solutions, coexistence of two stable spaially inhomogeneous steady states and the transition from one kind of spatiotemporal patterns to another are found.", "venue": "The Journal of Applied Analysis and Computation", - "year": 2019, "referenceCount": 52, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Journal of Applied Analysis & Computation"}, "authors": + "year": 2019, "referenceCount": 52, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Journal of Applied Analysis & Computation"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, {"paperId": "6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", "externalIds": {"MAG": "2906157279", "DBLP": "journals/cacm/CopelandS19", "DOI": "10.1145/3198448", - "CorpusId": 56894392}, "url": "https://www.semanticscholar.org/paper/6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", + "CorpusId": 56894392}, "corpusId": 56894392, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", "title": "The Church-Turing thesis", "abstract": "In its original form, the Church-Turing thesis concerned computation as Alan Turing and Alonzo Church used the term in 1936---human computation.", "venue": "Communications of the ACM", "year": 2007, "referenceCount": 116, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3198448", + "status": "CLOSED"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2007-09-05", "journal": {"name": "Communications of the ACM", "pages": "66 @@ -377,17 +417,25 @@ interactions: Copeland"}, {"authorId": "1742013", "name": "Oron Shagrir"}]}, {"paperId": "6cda6bf951da823ab8673e659bdca13b9928ed47", "externalIds": {"MAG": "2982236015", "DBLP": "conf/hotchips/Burgess19", "DOI": "10.1109/HOTCHIPS.2019.8875651", - "CorpusId": 204822166}, "url": "https://www.semanticscholar.org/paper/6cda6bf951da823ab8673e659bdca13b9928ed47", + "CorpusId": 204822166}, "corpusId": 204822166, "publicationVenue": {"id": + "6bfb6bd4-4726-46b3-9438-3128e06a28a1", "name": "IEEE Hot Chips Symposium", + "type": "conference", "alternate_names": ["HCS", "IEEE Hot Chip Symp"], "url": + "https://en.wikipedia.org/wiki/Hot_Chips"}, "url": "https://www.semanticscholar.org/paper/6cda6bf951da823ab8673e659bdca13b9928ed47", "title": "RTX ON \u2013 The NVIDIA TURING GPU", "abstract": null, "venue": "IEEE Hot Chips Symposium", "year": 2019, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2019-08-01", "journal": {"name": "2019 IEEE Hot Chips 31 Symposium (HCS)", - "pages": "1-27"}, "authors": [{"authorId": "2059912582", "name": "John Burgess"}]}, - {"paperId": "b0e69af8e8f7f2501cb26290e57a8563dba5d178", "externalIds": {"DBLP": - "journals/ijns/WuBPPN18", "MAG": "2792897601", "DOI": "10.1142/S0129065718500132", - "CorpusId": 46888001, "PubMed": "29759014"}, "url": "https://www.semanticscholar.org/paper/b0e69af8e8f7f2501cb26290e57a8563dba5d178", + 43, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-08-01", "journal": {"name": "2019 IEEE Hot Chips + 31 Symposium (HCS)", "pages": "1-27"}, "authors": [{"authorId": "2059912582", + "name": "John Burgess"}]}, {"paperId": "b0e69af8e8f7f2501cb26290e57a8563dba5d178", + "externalIds": {"DBLP": "journals/ijns/WuBPPN18", "MAG": "2792897601", "DOI": + "10.1142/S0129065718500132", "CorpusId": 46888001, "PubMed": "29759014"}, + "corpusId": 46888001, "publicationVenue": {"id": "a042b147-151c-4d51-97c7-40b8434b377a", + "name": "International Journal of Neural Systems", "type": "journal", "alternate_names": + ["Int J Neural Syst"], "issn": "0129-0657", "url": "http://www.worldscinet.com/ijns", + "alternate_urls": ["http://www.worldscinet.com/ijns/ijns.shtml"]}, "url": + "https://www.semanticscholar.org/paper/b0e69af8e8f7f2501cb26290e57a8563dba5d178", "title": "Simplified and Yet Turing Universal Spiking Neural P Systems with Communication on Request", "abstract": "Spiking neural P systems are a class of third generation neural networks belonging to the framework of membrane @@ -405,18 +453,22 @@ interactions: that SNQ P systems functioning as number generating devices with one type of spike and four unbounded neurons are Turing universal.", "venue": "International Journal of Neural Systems", "year": 2018, "referenceCount": 104, "citationCount": - 70, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-08-26", "journal": {"name": "International - journal of neural systems", "pages": "\n 1850013\n ", "volume": - "28 8"}, "authors": [{"authorId": "3361824", "name": "Tingfang Wu"}, {"authorId": - "51940709", "name": "Florin-Daniel B\u00eelb\u00eee"}, {"authorId": "143936370", - "name": "A. Paun"}, {"authorId": "7356533", "name": "L. Pan"}, {"authorId": - "2614610", "name": "Ferrante Neri"}]}, {"paperId": "bef4ae975a0068484cfa62d3b006991d68716c04", + 70, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dora.dmu.ac.uk/bitstream/2086/15523/1/SNQP_one.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-08-26", "journal": + {"name": "International journal of neural systems", "pages": "\n 1850013\n ", + "volume": "28 8"}, "authors": [{"authorId": "3361824", "name": "Tingfang Wu"}, + {"authorId": "51940709", "name": "Florin-Daniel B\u00eelb\u00eee"}, {"authorId": + "143936370", "name": "A. Paun"}, {"authorId": "7356533", "name": "L. Pan"}, + {"authorId": "2614610", "name": "Ferrante Neri"}]}, {"paperId": "bef4ae975a0068484cfa62d3b006991d68716c04", "externalIds": {"MAG": "2404399993", "DOI": "10.1109/JAS.2016.7471613", "CorpusId": - 35991085}, "url": "https://www.semanticscholar.org/paper/bef4ae975a0068484cfa62d3b006991d68716c04", + 35991085}, "corpusId": 35991085, "publicationVenue": {"id": "ef1356d5-69c7-484e-a110-3efae1e93ecc", + "name": "IEEE/CAA Journal of Automatica Sinica", "type": "journal", "alternate_names": + ["IEEE/CAA J Autom Sin"], "issn": "2329-9266", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=6570654", + "alternate_urls": ["http://www.ieee-jas.org/"]}, "url": "https://www.semanticscholar.org/paper/bef4ae975a0068484cfa62d3b006991d68716c04", "title": "Where does AlphaGo go: from church-turing thesis to AlphaGo thesis and beyond", "abstract": "An investigation on the impact and significance of the AlphaGo vs. Lee Sedol Go match is conducted, and concludes with a conjecture @@ -431,20 +483,20 @@ interactions: thesis ensure the technical soundness of the parallel intelligence approach for intelligent control and management of complex systems and knowledge automation.", "venue": "IEEE/CAA Journal of Automatica Sinica", "year": 2016, "referenceCount": - 39, "citationCount": 189, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-05-19", - "journal": {"name": "IEEE/CAA Journal of Automatica Sinica", "pages": "113-120", - "volume": "3"}, "authors": [{"authorId": "2148954297", "name": "Fei-yue Wang"}, - {"authorId": "2155659664", "name": "J. Zhang"}, {"authorId": "2481151", "name": - "Xinhu Zheng"}, {"authorId": "153315870", "name": "Xiao Wang"}, {"authorId": - "144057336", "name": "Yong Yuan"}, {"authorId": "2142311", "name": "Xiaoxiao - Dai"}, {"authorId": "2159191766", "name": "Jie Zhang"}, {"authorId": "2119062499", - "name": "Liuqing Yang"}]}, {"paperId": "050da5d159fb0dd96143948e1cffeb3dec814673", + 39, "citationCount": 192, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-05-19", "journal": {"name": "IEEE/CAA Journal of Automatica Sinica", + "pages": "113-120", "volume": "3"}, "authors": [{"authorId": "2148954297", + "name": "Fei-yue Wang"}, {"authorId": "2155659664", "name": "J. Zhang"}, {"authorId": + "2481151", "name": "Xinhu Zheng"}, {"authorId": "153315870", "name": "Xiao + Wang"}, {"authorId": "144057336", "name": "Yong Yuan"}, {"authorId": "2142311", + "name": "Xiaoxiao Dai"}, {"authorId": "2159191766", "name": "Jie Zhang"}, + {"authorId": "2119062499", "name": "Liuqing Yang"}]}, {"paperId": "050da5d159fb0dd96143948e1cffeb3dec814673", "externalIds": {"DBLP": "journals/pnas/GemanGHY15", "MAG": "1983927101", "DOI": - "10.1073/pnas.1422953112", "CorpusId": 8687210, "PubMed": "25755262"}, "url": - "https://www.semanticscholar.org/paper/050da5d159fb0dd96143948e1cffeb3dec814673", + "10.1073/pnas.1422953112", "CorpusId": 8687210, "PubMed": "25755262"}, "corpusId": + 8687210, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/050da5d159fb0dd96143948e1cffeb3dec814673", "title": "Visual Turing test for computer vision systems", "abstract": "Significance In computer vision, as in other fields of artificial intelligence, the methods of evaluation largely define the scientific effort. Most current evaluations @@ -474,17 +526,22 @@ interactions: through an exploration of its properties, and on to its relationships with other uniquely instantiated objects.", "venue": "Proceedings of the National Academy of Sciences", "year": 2015, "referenceCount": 29, "citationCount": - 260, "influentialCitationCount": 17, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-03-09", "journal": {"name": "Proceedings - of the National Academy of Sciences", "pages": "3618 - 3623", "volume": "112"}, - "authors": [{"authorId": "1707642", "name": "D. Geman"}, {"authorId": "3194361", - "name": "S. Geman"}, {"authorId": "9588317", "name": "Neil Hallonquist"}, - {"authorId": "1721284", "name": "L. Younes"}]}, {"paperId": "c091bf5bc6e02555b222fe4e15b6108583c14510", - "externalIds": {"MAG": "2963527277", "ArXiv": "1708.09645", "DOI": "10.1103/PhysRevX.8.021071", - "CorpusId": 88511276}, "url": "https://www.semanticscholar.org/paper/c091bf5bc6e02555b222fe4e15b6108583c14510", + 260, "influentialCitationCount": 17, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.pnas.org/content/pnas/112/12/3618.full.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-09", "journal": + {"name": "Proceedings of the National Academy of Sciences", "pages": "3618 + - 3623", "volume": "112"}, "authors": [{"authorId": "1707642", "name": "D. + Geman"}, {"authorId": "3194361", "name": "S. Geman"}, {"authorId": "9588317", + "name": "Neil Hallonquist"}, {"authorId": "1721284", "name": "L. Younes"}]}, + {"paperId": "c091bf5bc6e02555b222fe4e15b6108583c14510", "externalIds": {"MAG": + "2963527277", "ArXiv": "1708.09645", "DOI": "10.1103/PhysRevX.8.021071", "CorpusId": + 88511276}, "corpusId": 88511276, "publicationVenue": {"id": "98eedf55-1e67-4c3d-a25d-79861b87ae04", + "name": "Physical Review X", "type": "journal", "alternate_names": ["Phys + Rev X"], "issn": "2160-3308", "url": "https://journals.aps.org/prx/", "alternate_urls": + ["http://journals.aps.org/prx/", "http://prx.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/c091bf5bc6e02555b222fe4e15b6108583c14510", "title": "Key Features of Turing Systems are Determined Purely by Network Topology", "abstract": "Turing''s theory of pattern formation is a universal model for self-organization, applicable to many systems in physics, chemistry @@ -498,16 +555,22 @@ interactions: rates, the robustness of the system, and the phase relations of the molecular species.", "venue": "Physical Review X", "year": 2017, "referenceCount": 72, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2017-08-31", "journal": {"name": "Physical Review - X"}, "authors": [{"authorId": "4791189", "name": "X. Diego"}, {"authorId": - "2650134", "name": "L. Marcon"}, {"authorId": "50420075", "name": "P. Muller"}, - {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "64f47687daaa84ac1fdb1bc2f85c065007163f06", - "externalIds": {"ArXiv": "1803.05378", "MAG": "2790922269", "DOI": "10.1103/PhysRevLett.121.108301", - "CorpusId": 206316772, "PubMed": "30240244"}, "url": "https://www.semanticscholar.org/paper/64f47687daaa84ac1fdb1bc2f85c065007163f06", + "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevX.8.021071", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2017-08-31", "journal": {"name": + "Physical Review X"}, "authors": [{"authorId": "4791189", "name": "X. Diego"}, + {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "50420075", "name": + "P. Muller"}, {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": + "64f47687daaa84ac1fdb1bc2f85c065007163f06", "externalIds": {"ArXiv": "1803.05378", + "MAG": "2790922269", "DOI": "10.1103/PhysRevLett.121.108301", "CorpusId": + 206316772, "PubMed": "30240244"}, "corpusId": 206316772, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/64f47687daaa84ac1fdb1bc2f85c065007163f06", "title": "Information Thermodynamics of Turing Patterns.", "abstract": "We set up a rigorous thermodynamic description of reaction-diffusion systems driven out of equilibrium by time-dependent space-distributed chemostats. @@ -520,8 +583,9 @@ interactions: to study analytically the Turing pattern formation in a prototypical reaction-diffusion system, the one-dimensional Brusselator model, and to classify it as a genuine thermodynamic nonequilibrium phase transition.", "venue": "Physical Review - Letters", "year": 2018, "referenceCount": 58, "citationCount": 48, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + Letters", "year": 2018, "referenceCount": 58, "citationCount": 50, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1803.05378", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2018-03-14", "journal": {"name": "Physical @@ -530,7 +594,11 @@ interactions: "name": "Riccardo Rao"}, {"authorId": "40660219", "name": "M. Esposito"}]}, {"paperId": "ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", "externalIds": {"MAG": "2899964516", "PubMedCentral": "6221541", "DOI": "10.1126/sciadv.aau5484", - "CorpusId": 53237955, "PubMed": "30417097"}, "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", + "CorpusId": 53237955, "PubMed": "30417097"}, "corpusId": 53237955, "publicationVenue": + {"id": "cb30f0c9-2980-4b7d-bbcb-68fc5472b97c", "name": "Science Advances", + "type": "journal", "alternate_names": ["Sci Adv"], "issn": "2375-2548", "url": + "http://www.scienceadvances.org/", "alternate_urls": ["https://advances.sciencemag.org/"]}, + "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", "title": "An ancient Turing-like patterning mechanism regulates skin denticle development in sharks", "abstract": "Diverse skin appendages, from shark denticles to bird feathers, develop via a conserved and ancient Turing patterning mechanism. @@ -549,18 +617,23 @@ interactions: to avian feathers and mammalian hair, use this ancient and conserved system, with slight genetic modulation accounting for broad variations in patterning.", "venue": "Science Advances", "year": 2018, "referenceCount": 85, "citationCount": - 49, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-11-01", "journal": {"name": "Science Advances", "volume": "4"}, "authors": - [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": "2054529485", - "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": "A. Fletcher"}, - {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": "5588695", "name": - "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, {"paperId": - "fe1077f6b79e14457db77d7477a477f40f87e7e6", "externalIds": {"DBLP": "journals/neco/GulcehreCCB18", - "MAG": "2751304263", "DOI": "10.1162/neco_a_01060", "CorpusId": 4029193, "PubMed": - "29381440"}, "url": "https://www.semanticscholar.org/paper/fe1077f6b79e14457db77d7477a477f40f87e7e6", + 49, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-11-01", "journal": {"name": "Science Advances", "volume": + "4"}, "authors": [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": + "2054529485", "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": + "A. Fletcher"}, {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": + "5588695", "name": "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, + {"paperId": "fe1077f6b79e14457db77d7477a477f40f87e7e6", "externalIds": {"DBLP": + "journals/neco/GulcehreCCB18", "MAG": "2751304263", "DOI": "10.1162/neco_a_01060", + "CorpusId": 4029193, "PubMed": "29381440"}, "corpusId": 4029193, "publicationVenue": + {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", "name": "Neural Computation", + "type": "journal", "alternate_names": ["Neural Comput"], "issn": "0899-7667", + "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", "http://www.mitpressjournals.org/loi/neco", + "https://www.mitpressjournals.org/loi/neco"]}, "url": "https://www.semanticscholar.org/paper/fe1077f6b79e14457db77d7477a477f40f87e7e6", "title": "Dynamic Neural Turing Machine with Continuous and Discrete Addressing Schemes", "abstract": "We extend the neural Turing machine (NTM) model into a dynamic neural Turing machine (D-NTM) by introducing trainable address vectors. @@ -576,29 +649,88 @@ interactions: provide further experimental results on the sequential MNIST, Stanford Natural Language Inference, associative recall, and copy tasks.", "venue": "Neural Computation", "year": 2018, "referenceCount": 53, "citationCount": 38, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-03-20", "journal": {"name": "Neural Computation", "pages": "857-884", - "volume": "30"}, "authors": [{"authorId": "1854385", "name": "\u00c7aglar - G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, {"authorId": - "1979489", "name": "Kyunghyun Cho"}, {"authorId": "1751762", "name": "Yoshua - Bengio"}]}, {"paperId": "1606575fc6f337bde02291a4bf928eb16f58d0e6", "externalIds": - {"DBLP": "journals/corr/abs-1807-08518", "ArXiv": "1807.08518", "MAG": "2950107633", - "DOI": "10.1007/978-3-030-01424-7_10", "CorpusId": 49908746}, "url": "https://www.semanticscholar.org/paper/1606575fc6f337bde02291a4bf928eb16f58d0e6", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-03-20", "journal": {"name": "Neural Computation", + "pages": "857-884", "volume": "30"}, "authors": [{"authorId": "1854385", "name": + "\u00c7aglar G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, + {"authorId": "1979489", "name": "Kyunghyun Cho"}, {"authorId": "1751762", + "name": "Yoshua Bengio"}]}, {"paperId": "1606575fc6f337bde02291a4bf928eb16f58d0e6", + "externalIds": {"DBLP": "journals/corr/abs-1807-08518", "ArXiv": "1807.08518", + "MAG": "2950107633", "DOI": "10.1007/978-3-030-01424-7_10", "CorpusId": 49908746}, + "corpusId": 49908746, "publicationVenue": {"id": "3e64b1c1-745f-4edf-bd92-b8ef122bb49c", + "name": "International Conference on Artificial Neural Networks", "type": + "conference", "alternate_names": ["Int Conf Artif Neural Netw", "ICANN"], + "url": "http://www.e-nns.org/"}, "url": "https://www.semanticscholar.org/paper/1606575fc6f337bde02291a4bf928eb16f58d0e6", "title": "Implementing Neural Turing Machines", "abstract": null, "venue": "International Conference on Artificial Neural Networks", "year": 2018, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1807.08518", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2018-07-23", "journal": {"name": "ArXiv", "volume": "abs/1807.08518"}, "authors": [{"authorId": "153247100", "name": "Mark Collier"}, {"authorId": "1781377", "name": "J. - Beel"}]}, {"paperId": "079adfb4ec1a617935f4c74763ed57ba0eedecff", "externalIds": - {"MAG": "2003095799", "DOI": "10.1126/science.1252960", "CorpusId": 8400803, - "PubMed": "25082703"}, "url": "https://www.semanticscholar.org/paper/079adfb4ec1a617935f4c74763ed57ba0eedecff", + Beel"}]}, {"paperId": "7633d38345730e3ce80b03b290e41d0d1ff87697", "externalIds": + {"MAG": "2951637662", "ArXiv": "1803.00164", "DOI": "10.1007/s10884-018-9702-y", + "CorpusId": 119314930}, "corpusId": 119314930, "publicationVenue": {"id": + "0e86899d-b2fa-471e-bbc9-db59f1e85e65", "name": "Journal of Dynamics and Differential + Equations", "type": "journal", "alternate_names": ["J Dyn Differ Equ"], "issn": + "1040-7294", "url": "http://www.kluweronline.com/issn/1040-7294/contents", + "alternate_urls": ["https://link.springer.com/journal/10884"]}, "url": "https://www.semanticscholar.org/paper/7633d38345730e3ce80b03b290e41d0d1ff87697", + "title": "Turing Instability and Turing\u2013Hopf Bifurcation in Diffusive + Schnakenberg Systems with Gene Expression Time Delay", "abstract": null, "venue": + "Journal of Dynamics and Differential Equations", "year": 2018, "referenceCount": + 59, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1803.00164", "status": "GREEN"}, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-03-01", "journal": {"name": + "Journal of Dynamics and Differential Equations", "pages": "2223-2247", "volume": + "31"}, "authors": [{"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": + "2004181687", "name": "Hongbin Wang"}, {"authorId": "144861054", "name": "Xun + Cao"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", "externalIds": + {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", "DOI": "10.1137/16M1097560", + "CorpusId": 3849415}, "corpusId": 3849415, "publicationVenue": {"id": "d35d93ad-8e2c-4482-a896-897ce5c326fa", + "name": "SIAM Journal on Applied Dynamical Systems", "type": "journal", "alternate_names": + ["Siam Journal on Applied Dynamical Systems", "Siam J Appl Dyn Syst", "SIAM + J Appl Dyn Syst"], "issn": "1536-0040", "url": "https://epubs.siam.org/journal/sjaday"}, + "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", + "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near + Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize + into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter + to meter scales. The leading mathematical explanations for these phenomena + are the reaction-diffusion-advection model and the phase separation model. + This paper continues the series studies on analytically understanding the + existence of pattern solutions in the reaction-diffusion mussel-algae model. + The stability of the positive constant steady state and the existence of Hopf + and steady-state bifurcations are studied by analyzing the corresponding characteristic + equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain + the explicit dynamical classification in its neighborhood by calculating and + investigating the normal form on the center manifold. Using theoretical and + numerical simulations, we demonstrates that this TH interaction would significantly + enhance the diversity of spatial patterns and trigger the alternative paths + for the pattern development.", "venue": "SIAM Journal on Applied Dynamical + Systems", "year": 2017, "referenceCount": 65, "citationCount": 77, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", + "pages": "2030-2062", "volume": "16"}, "authors": [{"authorId": "1794550", + "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, + {"authorId": "47362020", "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", + "name": "Yuan Yuan"}]}, {"paperId": "079adfb4ec1a617935f4c74763ed57ba0eedecff", + "externalIds": {"MAG": "2003095799", "DOI": "10.1126/science.1252960", "CorpusId": + 8400803, "PubMed": "25082703"}, "corpusId": 8400803, "publicationVenue": {"id": + "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": "journal", + "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/079adfb4ec1a617935f4c74763ed57ba0eedecff", "title": "Digit patterning is controlled by a Bmp-Sox9-Wnt Turing network modulated by morphogen gradients", "abstract": "How do fingers know where to grow? Most researchers today believe that each finger forms because of @@ -624,57 +756,49 @@ interactions: experiments. Our systems biology approach reveals how a combination of growth, morphogen gradients, and a self-organizing Turing network can achieve robust and reproducible pattern formation.", "venue": "Science", "year": 2014, "referenceCount": - 81, "citationCount": 376, "influentialCitationCount": 26, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-08-01", "journal": - {"name": "Science", "pages": "566 - 570", "volume": "345"}, "authors": [{"authorId": - "5407202", "name": "J. Raspopovic"}, {"authorId": "2650134", "name": "L. Marcon"}, - {"authorId": "1392361181", "name": "L. Russo"}, {"authorId": "47254653", "name": - "J. Sharpe"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", "externalIds": - {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", "DOI": "10.1137/16M1097560", - "CorpusId": 3849415}, "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", - "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near - Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize - into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter - to meter scales. The leading mathematical explanations for these phenomena - are the reaction-diffusion-advection model and the phase separation model. - This paper continues the series studies on analytically understanding the - existence of pattern solutions in the reaction-diffusion mussel-algae model. - The stability of the positive constant steady state and the existence of Hopf - and steady-state bifurcations are studied by analyzing the corresponding characteristic - equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain - the explicit dynamical classification in its neighborhood by calculating and - investigating the normal form on the center manifold. Using theoretical and - numerical simulations, we demonstrates that this TH interaction would significantly - enhance the diversity of spatial patterns and trigger the alternative paths - for the pattern development.", "venue": "SIAM Journal on Applied Dynamical - Systems", "year": 2017, "referenceCount": 65, "citationCount": 71, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + 81, "citationCount": 379, "influentialCitationCount": 27, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", "pages": "2030-2062", - "volume": "16"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, - {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "47362020", - "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, - {"paperId": "7633d38345730e3ce80b03b290e41d0d1ff87697", "externalIds": {"MAG": - "2951637662", "ArXiv": "1803.00164", "DOI": "10.1007/s10884-018-9702-y", "CorpusId": - 119314930}, "url": "https://www.semanticscholar.org/paper/7633d38345730e3ce80b03b290e41d0d1ff87697", - "title": "Turing Instability and Turing\u2013Hopf Bifurcation in Diffusive - Schnakenberg Systems with Gene Expression Time Delay", "abstract": null, "venue": - "Journal of Dynamics and Differential Equations", "year": 2018, "referenceCount": - 59, "citationCount": 34, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2018-03-01", "journal": {"name": - "Journal of Dynamics and Differential Equations", "pages": "2223-2247", "volume": - "31"}, "authors": [{"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": - "2004181687", "name": "Hongbin Wang"}, {"authorId": "144861054", "name": "Xun - Cao"}]}, {"paperId": "f10e071292d593fef939e6ef4a59baf0bb3a6c2b", "externalIds": - {"ArXiv": "1505.00521", "MAG": "2125308790", "DBLP": "journals/corr/ZarembaS15", - "CorpusId": 16228924}, "url": "https://www.semanticscholar.org/paper/f10e071292d593fef939e6ef4a59baf0bb3a6c2b", + "2014-08-01", "journal": {"name": "Science", "pages": "566 - 570", "volume": + "345"}, "authors": [{"authorId": "5407202", "name": "J. Raspopovic"}, {"authorId": + "2650134", "name": "L. Marcon"}, {"authorId": "1392361181", "name": "L. Russo"}, + {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", + "externalIds": {"MAG": "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", + "CorpusId": 67906449}, "corpusId": 67906449, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", + "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": + "What can artificial intelligence teach us about the mind? If AI''s underlying + concept is that thinking is a computational process, then how can computation + illuminate thinking? It''s a timely question. AI is all the rage, and the + buzziest AI buzz surrounds adaptive machine learning: computer systems that + learn intelligent behavior from massive amounts of data. This is what powers + a driverless car, for example. In this book, Hector Levesque shifts the conversation + to \"good old fashioned artificial intelligence,\" which is based not on heaps + of data but on understanding commonsense intelligence. This kind of artificial + intelligence is equipped to handle situations that depart from previous patterns + -- as we do in real life, when, for example, we encounter a washed-out bridge + or when the barista informs us there''s no more soy milk. Levesque considers + the role of language in learning. He argues that a computer program that passes + the famous Turing Test could be a mindless zombie, and he proposes another + way to test for intelligence -- the Winograd Schema Test, developed by Levesque + and his colleagues. \"If our goal is to understand intelligent behavior, we + had better understand the difference between making it and faking it,\" he + observes. He identifies a possible mechanism behind common sense and the capacity + to call on background knowledge: the ability to represent objects of thought + symbolically. As AI migrates more and more into everyday life, we should worry + if systems without common sense are making decisions where common sense is + needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": + 69, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2017-02-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "143634377", + "name": "H. Levesque"}]}, {"paperId": "f10e071292d593fef939e6ef4a59baf0bb3a6c2b", + "externalIds": {"ArXiv": "1505.00521", "MAG": "2125308790", "DBLP": "journals/corr/ZarembaS15", + "CorpusId": 16228924}, "corpusId": 16228924, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f10e071292d593fef939e6ef4a59baf0bb3a6c2b", "title": "Reinforcement Learning Neural Turing Machines", "abstract": "The expressive power of a machine learning model is closely related to the number of sequential computational steps it can learn. For example, Deep Neural Networks @@ -698,44 +822,15 @@ interactions: do so, we developed a simple technique for numerically checking arbitrary implementations of models that use Reinforce, which may be of independent interest.", "venue": "ArXiv", "year": 2015, "referenceCount": 28, "citationCount": - 170, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-05-04", "journal": - {"name": "ArXiv", "volume": "abs/1505.00521"}, "authors": [{"authorId": "2563432", - "name": "Wojciech Zaremba"}, {"authorId": "1701686", "name": "Ilya Sutskever"}]}, - {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", "externalIds": {"MAG": - "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", "CorpusId": 67906449}, - "url": "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", - "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": - "What can artificial intelligence teach us about the mind? If AI''s underlying - concept is that thinking is a computational process, then how can computation - illuminate thinking? It''s a timely question. AI is all the rage, and the - buzziest AI buzz surrounds adaptive machine learning: computer systems that - learn intelligent behavior from massive amounts of data. This is what powers - a driverless car, for example. In this book, Hector Levesque shifts the conversation - to \"good old fashioned artificial intelligence,\" which is based not on heaps - of data but on understanding commonsense intelligence. This kind of artificial - intelligence is equipped to handle situations that depart from previous patterns - -- as we do in real life, when, for example, we encounter a washed-out bridge - or when the barista informs us there''s no more soy milk. Levesque considers - the role of language in learning. He argues that a computer program that passes - the famous Turing Test could be a mindless zombie, and he proposes another - way to test for intelligence -- the Winograd Schema Test, developed by Levesque - and his colleagues. \"If our goal is to understand intelligent behavior, we - had better understand the difference between making it and faking it,\" he - observes. He identifies a possible mechanism behind common sense and the capacity - to call on background knowledge: the ability to represent objects of thought - symbolically. As AI migrates more and more into everyday life, we should worry - if systems without common sense are making decisions where common sense is - needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": - 68, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2017-02-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "143634377", "name": "H. Levesque"}]}, - {"paperId": "5259755f9c100e220ffaa7e08439c5d34be7757a", "externalIds": {"MAG": - "2204302769", "CorpusId": 17710225}, "url": "https://www.semanticscholar.org/paper/5259755f9c100e220ffaa7e08439c5d34be7757a", + 170, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-05-04", "journal": {"name": "ArXiv", "volume": "abs/1505.00521"}, "authors": + [{"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", + "name": "Ilya Sutskever"}]}, {"paperId": "5259755f9c100e220ffaa7e08439c5d34be7757a", + "externalIds": {"MAG": "2204302769", "CorpusId": 17710225}, "corpusId": 17710225, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5259755f9c100e220ffaa7e08439c5d34be7757a", "title": "Reinforcement Learning Neural Turing Machines - Revised", "abstract": "The Neural Turing Machine (NTM) is more expressive than all previously considered models because of its external memory. It can be viewed as a broader effort @@ -752,14 +847,18 @@ interactions: to solve simple algorithmic tasks. Our Interfaces are expressive enough to make our model Turing complete.", "venue": "", "year": 2015, "referenceCount": 25, "citationCount": 154, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-05-04", - "journal": {"name": "arXiv: Learning", "volume": ""}, "authors": [{"authorId": - "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", "name": "Ilya - Sutskever"}]}, {"paperId": "2a69c98085c13ddb0e9b5ba4a904312670ed4e65", "externalIds": - {"MAG": "2319249367", "PubMedCentral": "4922859", "DOI": "10.7554/eLife.14022", - "CorpusId": 1077586, "PubMed": "27058171"}, "url": "https://www.semanticscholar.org/paper/2a69c98085c13ddb0e9b5ba4a904312670ed4e65", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-05-04", "journal": {"name": "arXiv: Learning", "volume": ""}, "authors": + [{"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", + "name": "Ilya Sutskever"}]}, {"paperId": "2a69c98085c13ddb0e9b5ba4a904312670ed4e65", + "externalIds": {"MAG": "2319249367", "PubMedCentral": "4922859", "DOI": "10.7554/eLife.14022", + "CorpusId": 1077586, "PubMed": "27058171"}, "corpusId": 1077586, "publicationVenue": + {"id": "07365b9a-c0ce-4dd3-b93b-a02e1c81e0c6", "name": "eLife", "type": "journal", + "issn": "2050-084X", "url": "https://epub.uni-regensburg.de/40444/", "alternate_urls": + ["https://elifesciences.org/", "https://elife.elifesciences.org/", "http://elifesciences.org/"]}, + "url": "https://www.semanticscholar.org/paper/2a69c98085c13ddb0e9b5ba4a904312670ed4e65", "title": "High-throughput mathematical analysis identifies Turing networks for patterning with equally diffusing signals", "abstract": "The Turing reaction-diffusion model explains how identical cells can self-organize to form spatial patterns. @@ -778,17 +877,22 @@ interactions: framework to understand multicellular pattern formation and enables the wide-spread use of mathematical biology to engineer synthetic patterning systems. DOI: http://dx.doi.org/10.7554/eLife.14022.001", "venue": "eLife", "year": 2016, - "referenceCount": 91, "citationCount": 96, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-08", "journal": - {"name": "eLife", "volume": "5"}, "authors": [{"authorId": "2650134", "name": - "L. Marcon"}, {"authorId": "4791189", "name": "X. Diego"}, {"authorId": "47254653", - "name": "J. Sharpe"}, {"authorId": "153207731", "name": "Patrick M\u00fcller"}]}, - {"paperId": "751e5ff25e8186a8fd26ee05c4e29a286f650f1b", "externalIds": {"DBLP": - "journals/corr/Grigore16", "MAG": "2953162524", "ArXiv": "1605.05274", "DOI": - "10.1145/3009837.3009871", "CorpusId": 5698855}, "url": "https://www.semanticscholar.org/paper/751e5ff25e8186a8fd26ee05c4e29a286f650f1b", + "referenceCount": 91, "citationCount": 98, "influentialCitationCount": 4, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-04-08", "journal": {"name": "eLife", "volume": "5"}, "authors": [{"authorId": + "2650134", "name": "L. Marcon"}, {"authorId": "4791189", "name": "X. Diego"}, + {"authorId": "47254653", "name": "J. Sharpe"}, {"authorId": "153207731", "name": + "Patrick M\u00fcller"}]}, {"paperId": "751e5ff25e8186a8fd26ee05c4e29a286f650f1b", + "externalIds": {"DBLP": "journals/corr/Grigore16", "MAG": "2953162524", "ArXiv": + "1605.05274", "DOI": "10.1145/3009837.3009871", "CorpusId": 5698855}, "corpusId": + 5698855, "publicationVenue": {"id": "8a1922a5-8e84-4ec6-9283-01f2ef1981fc", + "name": "ACM-SIGACT Symposium on Principles of Programming Languages", "type": + "conference", "alternate_names": ["Symp Princ Program Lang", "Symposium on + Principles of Programming Languages", "POPL", "ACM-SIGACT Symp Princ Program + Lang"], "url": "http://www.sigplan.org/Conferences/POPL/"}, "url": "https://www.semanticscholar.org/paper/751e5ff25e8186a8fd26ee05c4e29a286f650f1b", "title": "Java generics are turing complete", "abstract": "This paper describes a reduction from the halting problem of Turing machines to subtype checking in Java. It follows that subtype checking in Java is undecidable, which answers @@ -797,14 +901,16 @@ interactions: of Gill and Levy from 2016. The latter point is illustrated by a parser generator for fluent interfaces.", "venue": "ACM-SIGACT Symposium on Principles of Programming Languages", "year": 2016, "referenceCount": 37, "citationCount": 40, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://kar.kent.ac.uk/58183/7/javats.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2016-05-17", "journal": {"name": "Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages"}, "authors": [{"authorId": "2355698", "name": "Radu Grigore"}]}, {"paperId": "3290b0d04025513911923fc51885962b10971783", "externalIds": {"MAG": - "2585714548", "CorpusId": 64349377}, "url": "https://www.semanticscholar.org/paper/3290b0d04025513911923fc51885962b10971783", + "2585714548", "CorpusId": 64349377}, "corpusId": 64349377, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3290b0d04025513911923fc51885962b10971783", "title": "Alan Turing: The Enigma", "abstract": "Feel lonely? What about reading books? Book is one of the greatest friends to accompany while in your lonely time. When you have no friends and activities somewhere and sometimes, reading @@ -812,19 +918,26 @@ interactions: increase the knowledge. Of course the b=benefits to take will relate to what kind of book that you are reading. And now, we will concern you to try reading alan turing the enigma as one of the reading material to finish quickly.", - "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 112, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-12-22", - "journal": {"name": "", "pages": "57", "volume": "62"}, "authors": [{"authorId": - "71860202", "name": "Golda T. Eldridge"}]}, {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", - "externalIds": {"PubMedCentral": "5258822", "MAG": "2443634204", "ArXiv": - "1301.2002", "DOI": "10.1007/s00285-016-1035-z", "CorpusId": 5942606, "PubMed": - "27305913"}, "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", + "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 116, "influentialCitationCount": + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2015-12-22", "journal": {"name": "", "pages": "57", + "volume": "62"}, "authors": [{"authorId": "71860202", "name": "Golda T. Eldridge"}]}, + {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "externalIds": {"PubMedCentral": + "5258822", "MAG": "2443634204", "ArXiv": "1301.2002", "DOI": "10.1007/s00285-016-1035-z", + "CorpusId": 5942606, "PubMed": "27305913"}, "corpusId": 5942606, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "title": "Instability of turing patterns in reaction-diffusion-ODE systems", "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2013, "referenceCount": 49, "citationCount": 38, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc5258822?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-01-09", "journal": @@ -833,32 +946,29 @@ interactions: {"authorId": "101468044", "name": "G. Karch"}, {"authorId": "2118679527", "name": "Kanako Suzuki"}]}, {"paperId": "3b662774599a36d4b281f0ea212d149849fd2ca7", "externalIds": {"PubMedCentral": "4879262", "MAG": "2399203404", "DOI": "10.1038/ncomms11582", - "CorpusId": 2037071, "PubMed": "27211489"}, "url": "https://www.semanticscholar.org/paper/3b662774599a36d4b281f0ea212d149849fd2ca7", + "CorpusId": 2037071, "PubMed": "27211489"}, "corpusId": 2037071, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/3b662774599a36d4b281f0ea212d149849fd2ca7", "title": "The fin-to-limb transition as the re-organization of a Turing pattern", "abstract": null, "venue": "Nature Communications", "year": 2016, "referenceCount": 64, "citationCount": 67, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-05-23", "journal": {"name": "Nature Communications", - "volume": "7"}, "authors": [{"authorId": "4852838", "name": "Koh Onimaru"}, - {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "108029565", "name": - "M. Musy"}, {"authorId": "47675847", "name": "Mikiko Tanaka"}, {"authorId": - "47254653", "name": "J. Sharpe"}]}, {"paperId": "8fb5cf374acbe9fed9939ff2c0aec334b5d26187", - "externalIds": {"MAG": "2950930823", "DBLP": "conf/tcc/AnanthS16", "DOI": - "10.1007/978-3-662-49096-9_6", "CorpusId": 15455801}, "url": "https://www.semanticscholar.org/paper/8fb5cf374acbe9fed9939ff2c0aec334b5d26187", - "title": "Functional Encryption for Turing Machines", "abstract": null, "venue": - "Theory of Cryptography Conference", "year": 2016, "referenceCount": 53, "citationCount": - 61, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2016-01-10", "journal": {"pages": "125-153"}, "authors": - [{"authorId": "2616991", "name": "P. Ananth"}, {"authorId": "1695851", "name": - "A. Sahai"}]}, {"paperId": "dd547a64a179f0f3defd376455f258500d34d4b8", "externalIds": - {"MAG": "2317259993", "ArXiv": "1512.06055", "DOI": "10.1103/PhysRevLett.116.143901", - "CorpusId": 19175993, "PubMed": "27104711"}, "url": "https://www.semanticscholar.org/paper/dd547a64a179f0f3defd376455f258500d34d4b8", + "openAccessPdf": {"url": "https://www.nature.com/articles/ncomms11582.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2016-05-23", "journal": {"name": "Nature + Communications", "volume": "7"}, "authors": [{"authorId": "4852838", "name": + "Koh Onimaru"}, {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": + "108029565", "name": "M. Musy"}, {"authorId": "47675847", "name": "Mikiko + Tanaka"}, {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "dd547a64a179f0f3defd376455f258500d34d4b8", + "externalIds": {"MAG": "2317259993", "ArXiv": "1512.06055", "DOI": "10.1103/PhysRevLett.116.143901", + "CorpusId": 19175993, "PubMed": "27104711"}, "corpusId": 19175993, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dd547a64a179f0f3defd376455f258500d34d4b8", "title": "Competing Turing and Faraday Instabilities in Longitudinally Modulated Passive Resonators.", "abstract": "We experimentally investigate the interplay of Turing (modulational) and Faraday (parametric) instabilities in a bistable @@ -872,6 +982,7 @@ interactions: structures. The results are well explained in terms of the universal Lugiato-Lefever model.", "venue": "Physical Review Letters", "year": 2015, "referenceCount": 31, "citationCount": 56, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1512.06055", "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -880,8 +991,25 @@ interactions: "12168523", "name": "F. Copie"}, {"authorId": "14731863", "name": "M. Conforti"}, {"authorId": "4337855", "name": "A. Kudlinski"}, {"authorId": "152211195", "name": "A. Mussot"}, {"authorId": "5414545", "name": "S. Trillo"}]}, {"paperId": - "f8e9f0e61d45c8a669391fa00e20d134e71ca388", "externalIds": {"MAG": "2747885441", - "CorpusId": 125663722}, "url": "https://www.semanticscholar.org/paper/f8e9f0e61d45c8a669391fa00e20d134e71ca388", + "8fb5cf374acbe9fed9939ff2c0aec334b5d26187", "externalIds": {"MAG": "2950930823", + "DBLP": "conf/tcc/AnanthS16", "DOI": "10.1007/978-3-662-49096-9_6", "CorpusId": + 15455801}, "corpusId": 15455801, "publicationVenue": {"id": "5f558f42-4459-4db5-9c48-77c92ba99511", + "name": "Theory of Cryptography Conference", "type": "conference", "alternate_names": + ["Theory Cryptogr Conf", "TCC"], "url": "https://www.iacr.org/meetings/tcc/"}, + "url": "https://www.semanticscholar.org/paper/8fb5cf374acbe9fed9939ff2c0aec334b5d26187", + "title": "Functional Encryption for Turing Machines", "abstract": null, "venue": + "Theory of Cryptography Conference", "year": 2016, "referenceCount": 53, "citationCount": + 61, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "http://eprint.iacr.org/2015/776.pdf", "status": "GREEN"}, "fieldsOfStudy": + ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2016-01-10", "journal": {"pages": "125-153"}, "authors": + [{"authorId": "2616991", "name": "P. Ananth"}, {"authorId": "1695851", "name": + "A. Sahai"}]}, {"paperId": "f8e9f0e61d45c8a669391fa00e20d134e71ca388", "externalIds": + {"MAG": "2747885441", "CorpusId": 125663722}, "corpusId": 125663722, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f8e9f0e61d45c8a669391fa00e20d134e71ca388", "title": "Turing Computability: Theory and Applications", "abstract": "Turing''s famous 1936 paper introduced a formal definition of a computing machine, a Turing machine. This model led to both the development of actual computers @@ -905,30 +1033,36 @@ interactions: according to importance and difficulty. The book is suitable for advanced undergraduate and graduate students in computer science and mathematics and researchers engaged with computability and mathematical logic.", "venue": - "", "year": 2016, "referenceCount": 0, "citationCount": 52, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2016-06-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1760293", "name": "R. Soare"}]}, {"paperId": "a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", - "externalIds": {"MAG": "2437127566", "DOI": "10.1007/S11071-016-2873-3", "CorpusId": - 124911557}, "url": "https://www.semanticscholar.org/paper/a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", + "", "year": 2016, "referenceCount": 0, "citationCount": 54, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2016-06-21", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, + {"paperId": "a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", "externalIds": {"MAG": + "2437127566", "DOI": "10.1007/S11071-016-2873-3", "CorpusId": 124911557}, + "corpusId": 124911557, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", "title": "Turing\u2013Hopf bifurcation analysis of a predator\u2013prey model with herd behavior and cross-diffusion", "abstract": null, "venue": "", "year": - 2016, "referenceCount": 58, "citationCount": 60, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-06-17", - "journal": {"name": "Nonlinear Dynamics", "pages": "73-89", "volume": "86"}, - "authors": [{"authorId": "143754807", "name": "Xiaosong Tang"}, {"authorId": - "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": "Tonghua - Zhang"}]}, {"paperId": "d89084753b70dbdf589fb5663a609fb47607affb", "externalIds": - {"DBLP": "journals/corr/LiGG16a", "ArXiv": "1603.04904", "MAG": "2301883550", - "DOI": "10.1007/s11721-016-0126-1", "CorpusId": 14259869}, "url": "https://www.semanticscholar.org/paper/d89084753b70dbdf589fb5663a609fb47607affb", + 2016, "referenceCount": 58, "citationCount": 62, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-06-17", "journal": {"name": "Nonlinear Dynamics", "pages": "73-89", + "volume": "86"}, "authors": [{"authorId": "143754807", "name": "Xiaosong Tang"}, + {"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": + "Tonghua Zhang"}]}, {"paperId": "1470b244477529e1627b48c117e78308ede474ab", + "externalIds": {"DBLP": "journals/corr/LiGG16a", "ArXiv": "1603.04904", "MAG": + "2301883550", "DOI": "10.1007/s11721-016-0126-1", "CorpusId": 14259869}, "corpusId": + 14259869, "publicationVenue": {"id": "9bc15867-86e2-4be2-9ff3-2c15aaf07929", + "name": "Swarm Intelligence", "type": "journal", "alternate_names": ["Swarm + Intell"], "issn": "1935-3812", "url": "https://www.springer.com/computer/ai/journal/11721", + "alternate_urls": ["https://link.springer.com/journal/11721"]}, "url": "https://www.semanticscholar.org/paper/1470b244477529e1627b48c117e78308ede474ab", "title": "Turing learning: a metric-free approach to inferring behavior and its application to swarms", "abstract": null, "venue": "Swarm Intelligence", - "year": 2016, "referenceCount": 67, "citationCount": 52, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "year": 2016, "referenceCount": 64, "citationCount": 52, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2Fs11721-016-0126-1.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -937,21 +1071,28 @@ interactions: {"authorId": "7836896", "name": "Melvin Gauci"}, {"authorId": "6586246", "name": "R. Gro\u00df"}]}, {"paperId": "b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "externalIds": {"DBLP": "journals/cnsns/SongZP16", "MAG": "1929947366", "DOI": - "10.1016/J.CNSNS.2015.10.002", "CorpusId": 119973623}, "url": "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", + "10.1016/J.CNSNS.2015.10.002", "CorpusId": 119973623}, "corpusId": 119973623, + "publicationVenue": {"id": "cbeeb5cb-fa82-4ae6-875b-04adb3b61f48", "name": + "Communications in nonlinear science & numerical simulation", "type": "journal", + "alternate_names": ["Communications in Nonlinear Science and Numerical Simulation", + "Commun Nonlinear Sci Numer Simul", "Commun nonlinear sci numer simul"], + "issn": "1007-5704", "url": "http://www.elsevier.com/locate/cnsns"}, "url": + "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "title": "Turing-Hopf bifurcation in the reaction-diffusion equations and its applications", "abstract": null, "venue": "Communications in nonlinear science & numerical simulation", "year": 2016, "referenceCount": 37, "citationCount": - 82, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2016-04-01", "journal": {"name": "Commun. - Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": "33"}, "authors": - [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": - "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong Peng"}]}, {"paperId": - "7c326f661163360efc072214be205c827e742495", "externalIds": {"DBLP": "journals/corr/Aaronson13", - "MAG": "2964289375", "ArXiv": "1306.0159", "DOI": "10.1017/CBO9780511863196.018", - "CorpusId": 17123686}, "url": "https://www.semanticscholar.org/paper/7c326f661163360efc072214be205c827e742495", + 85, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-01", "journal": + {"name": "Commun. Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": + "33"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": + "1742870", "name": "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong + Peng"}]}, {"paperId": "7c326f661163360efc072214be205c827e742495", "externalIds": + {"DBLP": "journals/corr/Aaronson13", "MAG": "2964289375", "ArXiv": "1306.0159", + "DOI": "10.1017/CBO9780511863196.018", "CorpusId": 17123686}, "corpusId": + 17123686, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c326f661163360efc072214be205c827e742495", "title": "The Ghost in the Quantum Turing Machine", "abstract": "In honor of Alan Turing''s hundredth birthday, I unwisely set out some thoughts about one of Turing''s obsessions throughout his life, the question of physics and @@ -974,40 +1115,16 @@ interactions: in neuroscience, physics, and cosmology; and takes a millennia-old philosophical debate into some underexplored territory.", "venue": "The Once and Future Turing", "year": 2013, "referenceCount": 109, "citationCount": 46, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1306.0159.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-06-01", "journal": {"pages": "193-296"}, "authors": [{"authorId": "20996436", "name": "S. Aaronson"}]}, - {"paperId": "902fb60fa3493171b2aa9d485291a54185763a79", "externalIds": {"DBLP": - "journals/jetai/WarwickS16", "MAG": "1912133035", "DOI": "10.1080/0952813X.2015.1055826", - "CorpusId": 31251200}, "url": "https://www.semanticscholar.org/paper/902fb60fa3493171b2aa9d485291a54185763a79", - "title": "Can machines think? A report on Turing test experiments at the Royal - Society", "abstract": "In this article we consider transcripts that originated - from a practical series of Turing''s Imitation Game that was held on 6 and - 7 June 2014 at the Royal Society London. In all cases the tests involved a - three-participant simultaneous comparison by an interrogator of two hidden - entities, one being a human and the other a machine. Each of the transcripts - considered here resulted in a human interrogator being fooled such that they - could not make the \u2018right identification\u2019, that is, they could not - say for certain which was the machine and which was the human. The transcripts - presented all involve one machine only, namely \u2018Eugene Goostman\u2019, - the result being that the machine became the first to pass the Turing test, - as set out by Alan Turing, on unrestricted conversation. This is the first - time that results from the Royal Society tests have been disclosed and discussed - in a paper.", "venue": "Journal of experimental and theoretical artificial - intelligence (Print)", "year": 2016, "referenceCount": 34, "citationCount": - 46, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-11-01", "journal": - {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "1007 - 989", "volume": "28"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": - "3d27bbfcf1ebe7390b5250e677e91179a76569e4", "externalIds": {"ArXiv": "1603.00948", - "MAG": "2522126998", "DOI": "10.1103/PhysRevX.7.041002", "CorpusId": 44184751}, - "url": "https://www.semanticscholar.org/paper/3d27bbfcf1ebe7390b5250e677e91179a76569e4", + {"paperId": "3d27bbfcf1ebe7390b5250e677e91179a76569e4", "externalIds": {"ArXiv": + "1603.00948", "MAG": "2522126998", "DOI": "10.1103/PhysRevX.7.041002", "CorpusId": + 44184751}, "corpusId": 44184751, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d27bbfcf1ebe7390b5250e677e91179a76569e4", "title": "Globally stable microresonator Turing pattern formation for coherent high-power THz radiation on-chip", "abstract": "In nonlinear microresonators driven by continuous-wave (cw) lasers, Turing patterns have been studied in @@ -1033,47 +1150,54 @@ interactions: system is promising to find applications in astrophysics, medical imaging, and wireless communications.", "venue": "", "year": 2016, "referenceCount": 49, "citationCount": 44, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevX.7.041002", + "status": "GOLD"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-03-03", "journal": {"name": "arXiv: Optics", "volume": ""}, "authors": [{"authorId": "122132133", "name": "Shu-Wei Huang"}, {"authorId": "2046781", "name": "Jinghui Yang"}, {"authorId": "1387853764", "name": "Shang-Hua Yang"}, {"authorId": "50077634", "name": "M. Yu"}, {"authorId": "143722274", "name": "D. Kwong"}, {"authorId": "4841270", "name": "T. Zelevinsky"}, {"authorId": "2146359", "name": "M. Jarrahi"}, {"authorId": - "1727458", "name": "C. Wong"}]}, {"paperId": "95ca0cde71f0258ca99e920f711084a9a3a5fe4b", - "externalIds": {"DBLP": "conf/nips/OrlitskyS15", "MAG": "2187207766", "CorpusId": - 15304308}, "url": "https://www.semanticscholar.org/paper/95ca0cde71f0258ca99e920f711084a9a3a5fe4b", - "title": "Competitive Distribution Estimation: Why is Good-Turing Good", "abstract": - "Estimating distributions over large alphabets is a fundamental machine-learning - tenet. Yet no method is known to estimate all distributions well. For example, - add-constant estimators are nearly min-max optimal but often perform poorly - in practice, and practical estimators such as absolute discounting, Jelinek-Mercer, - and Good-Turing are not known to be near optimal for essentially any distribution. - \n \nWe describe the first universally near-optimal probability estimators. - For every discrete distribution, they are provably nearly the best in the - following two competitive ways. First they estimate every distribution nearly - as well as the best estimator designed with prior knowledge of the distribution - up to a permutation. Second, they estimate every distribution nearly as well - as the best estimator designed with prior knowledge of the exact distribution, - but as all natural estimators, restricted to assign the same probability to - all symbols appearing the same number of times. \n \nSpecifically, for distributions - over k symbols and n samples, we show that for both comparisons, a simple - variant of Good-Turing estimator is always within KL divergence of (3 + on(1))/n1/3 - from the best estimator, and that a more involved estimator is within On(min(k/n, - 1/\u221an)). Conversely, we show that any estimator must have a KL divergence - at least \u03a9n(min(k/n, 1/n2/3)) over the best estimator for the first comparison, - and at least \u03a9n(min(k/n, 1/\u221an)) for the second.", "venue": "NIPS", - "year": 2015, "referenceCount": 35, "citationCount": 77, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2015-12-07", "journal": {"pages": "2143-2151"}, "authors": - [{"authorId": "1691155", "name": "A. Orlitsky"}, {"authorId": "9486035", "name": - "A. Suresh"}]}, {"paperId": "df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "externalIds": + "1727458", "name": "C. Wong"}]}, {"paperId": "902fb60fa3493171b2aa9d485291a54185763a79", + "externalIds": {"DBLP": "journals/jetai/WarwickS16", "MAG": "1912133035", + "DOI": "10.1080/0952813X.2015.1055826", "CorpusId": 31251200}, "corpusId": + 31251200, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/902fb60fa3493171b2aa9d485291a54185763a79", + "title": "Can machines think? A report on Turing test experiments at the Royal + Society", "abstract": "In this article we consider transcripts that originated + from a practical series of Turing''s Imitation Game that was held on 6 and + 7 June 2014 at the Royal Society London. In all cases the tests involved a + three-participant simultaneous comparison by an interrogator of two hidden + entities, one being a human and the other a machine. Each of the transcripts + considered here resulted in a human interrogator being fooled such that they + could not make the \u2018right identification\u2019, that is, they could not + say for certain which was the machine and which was the human. The transcripts + presented all involve one machine only, namely \u2018Eugene Goostman\u2019, + the result being that the machine became the first to pass the Turing test, + as set out by Alan Turing, on unrestricted conversation. This is the first + time that results from the Royal Society tests have been disclosed and discussed + in a paper.", "venue": "Journal of experimental and theoretical artificial + intelligence (Print)", "year": 2016, "referenceCount": 34, "citationCount": + 46, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://pure.coventry.ac.uk/ws/files/4019869/warwickcomb.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "History", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-11-01", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "1007 - 989", "volume": "28"}, "authors": [{"authorId": + "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma + Shah"}]}, {"paperId": "df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "externalIds": {"MAG": "2399906603", "DBLP": "conf/aips/000115", "DOI": "10.1609/icaps.v25i1.13684", - "CorpusId": 11168350}, "url": "https://www.semanticscholar.org/paper/df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", + "CorpusId": 11168350}, "corpusId": 11168350, "publicationVenue": {"id": "267934f4-c986-4571-bef8-d0eebc5e0e54", + "name": "International Conference on Automated Planning and Scheduling", "type": + "conference", "alternate_names": ["Int Conf Autom Plan Sched", "ICAPS"], "url": + "http://www.icaps-conference.org/"}, "url": "https://www.semanticscholar.org/paper/df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "title": "Simulated Penetration Testing: From \"Dijkstra\" to \"Turing Test++\"", "abstract": "\n \n Penetration testing (pentesting) is a well established method for identifying security weaknesses, by conducting friendly attacks. @@ -1093,13 +1217,50 @@ interactions: challenges to AI sequential decision making research.\n \n", "venue": "International Conference on Automated Planning and Scheduling", "year": 2015, "referenceCount": 41, "citationCount": 80, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2015-04-08", "journal": {"pages": "364-372"}, "authors": [{"authorId": "144915519", - "name": "J. Hoffmann"}]}, {"paperId": "368a7958ae2b6b8f30454f4405c0bfa090ec5c22", + "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/ICAPS/article/download/13684/13533", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2015-04-08", "journal": {"pages": "364-372"}, + "authors": [{"authorId": "144915519", "name": "J. Hoffmann"}]}, {"paperId": + "95ca0cde71f0258ca99e920f711084a9a3a5fe4b", "externalIds": {"DBLP": "conf/nips/OrlitskyS15", + "MAG": "2187207766", "CorpusId": 15304308}, "corpusId": 15304308, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/95ca0cde71f0258ca99e920f711084a9a3a5fe4b", + "title": "Competitive Distribution Estimation: Why is Good-Turing Good", "abstract": + "Estimating distributions over large alphabets is a fundamental machine-learning + tenet. Yet no method is known to estimate all distributions well. For example, + add-constant estimators are nearly min-max optimal but often perform poorly + in practice, and practical estimators such as absolute discounting, Jelinek-Mercer, + and Good-Turing are not known to be near optimal for essentially any distribution. + \n \nWe describe the first universally near-optimal probability estimators. + For every discrete distribution, they are provably nearly the best in the + following two competitive ways. First they estimate every distribution nearly + as well as the best estimator designed with prior knowledge of the distribution + up to a permutation. Second, they estimate every distribution nearly as well + as the best estimator designed with prior knowledge of the exact distribution, + but as all natural estimators, restricted to assign the same probability to + all symbols appearing the same number of times. \n \nSpecifically, for distributions + over k symbols and n samples, we show that for both comparisons, a simple + variant of Good-Turing estimator is always within KL divergence of (3 + on(1))/n1/3 + from the best estimator, and that a more involved estimator is within On(min(k/n, + 1/\u221an)). Conversely, we show that any estimator must have a KL divergence + at least \u03a9n(min(k/n, 1/n2/3)) over the best estimator for the first comparison, + and at least \u03a9n(min(k/n, 1/\u221an)) for the second.", "venue": "NIPS", + "year": 2015, "referenceCount": 35, "citationCount": 78, "influentialCitationCount": + 11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2015-12-07", "journal": + {"pages": "2143-2151"}, "authors": [{"authorId": "1691155", "name": "A. Orlitsky"}, + {"authorId": "9486035", "name": "A. Suresh"}]}, {"paperId": "368a7958ae2b6b8f30454f4405c0bfa090ec5c22", "externalIds": {"MAG": "2022248835", "DOI": "10.1364/OE.20.003241", "CorpusId": - 24244845, "PubMed": "22330562"}, "url": "https://www.semanticscholar.org/paper/368a7958ae2b6b8f30454f4405c0bfa090ec5c22", + 24244845, "PubMed": "22330562"}, "corpusId": 24244845, "publicationVenue": + {"id": "f06e7ee6-cd20-45a8-91f9-6c84bcddc5fd", "name": "Optics Express", "type": + "journal", "alternate_names": ["Opt Express"], "issn": "1094-4087", "url": + "http://www.opticsexpress.org/Issue.cfm", "alternate_urls": ["http://www.opticsinfobase.org/oe/", + "https://www.osapublishing.org/oe/home.cfm", "http://www.osapublishing.org/oe/", + "http://www.opticsinfobase.org/oe/home.cfm"]}, "url": "https://www.semanticscholar.org/paper/368a7958ae2b6b8f30454f4405c0bfa090ec5c22", "title": "Photonic information processing beyond Turing: an optoelectronic implementation of reservoir computing.", "abstract": "Many information processing challenges are difficult to solve with traditional Turing or von Neumann approaches. @@ -1112,20 +1273,37 @@ interactions: to an input data stream. We employ spoken digit recognition and time series prediction tasks as benchmarks, achieving competitive processing figures of merit.", "venue": "Optics Express", "year": 2012, "referenceCount": 32, "citationCount": - 507, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-01-30", "journal": {"name": "Optics - express", "pages": "\n 3241-9\n ", "volume": "20 3"}, "authors": - [{"authorId": "1760452", "name": "L. Larger"}, {"authorId": "144524298", "name": - "M. C. Soriano"}, {"authorId": "145711155", "name": "D. Brunner"}, {"authorId": - "1829066", "name": "L. Appeltant"}, {"authorId": "144614855", "name": "J. - Guti\u00e9rrez"}, {"authorId": "145682718", "name": "L. Pesquera"}, {"authorId": - "2034306", "name": "C. Mirasso"}, {"authorId": "1795232", "name": "Ingo Fischer"}]}, - {"paperId": "b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "externalIds": {"MAG": - "2242749976", "DOI": "10.1073/pnas.1322005111", "CorpusId": 17626456, "PubMed": - "24616508"}, "url": "https://www.semanticscholar.org/paper/b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", + 510, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-30", "journal": + {"name": "Optics express", "pages": "\n 3241-9\n ", "volume": + "20 3"}, "authors": [{"authorId": "1760452", "name": "L. Larger"}, {"authorId": + "144524298", "name": "M. C. Soriano"}, {"authorId": "145711155", "name": "D. + Brunner"}, {"authorId": "1829066", "name": "L. Appeltant"}, {"authorId": "144614855", + "name": "J. Guti\u00e9rrez"}, {"authorId": "145682718", "name": "L. Pesquera"}, + {"authorId": "2034306", "name": "C. Mirasso"}, {"authorId": "1795232", "name": + "Ingo Fischer"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", + "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": + 28057065, "PubMed": "25544713"}, "corpusId": 28057065, "publicationVenue": + {"id": "e26133f2-2f02-4bc5-a3ad-26bdbdc9636c", "name": "Trends in Genetics", + "type": "journal", "alternate_names": ["Trends Genet"], "issn": "0168-9479", + "alternate_issns": ["1362-4555", "0168-9525"], "url": "http://www.sciencedirect.com/science/journal/01689525", + "alternate_urls": ["http://www.cell.com/trends/genetics/"]}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", + "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", + "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": + 64, "citationCount": 99, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2015-02-01", "journal": + {"name": "Trends in genetics : TIG", "pages": "\n 88-96\n ", + "volume": "31 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu + Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": + "b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "externalIds": {"MAG": "2242749976", + "DOI": "10.1073/pnas.1322005111", "CorpusId": 17626456, "PubMed": "24616508"}, + "corpusId": 17626456, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "title": "Testing Turing\u2019s theory of morphogenesis in chemical cells", "abstract": "Significance Turing proposed that intercellular reaction-diffusion of molecules is responsible for morphogenesis. The impact of this paradigm @@ -1152,7 +1330,8 @@ interactions: original model, which we explain by modifying the theory to include heterogeneity.", "venue": "Proceedings of the National Academy of Sciences", "year": 2014, "referenceCount": 46, "citationCount": 164, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine", "Computer Science"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/111/12/4397.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], @@ -1165,33 +1344,77 @@ interactions: "name": "I. Epstein"}, {"authorId": "2775719", "name": "S. Fraden"}]}, {"paperId": "0c4930885dd3318d39f39278686446752bc305b5", "externalIds": {"DBLP": "journals/isci/AlarifiAA16", "MAG": "2510717748", "DOI": "10.1016/j.ins.2016.08.036", "CorpusId": 19044123}, - "url": "https://www.semanticscholar.org/paper/0c4930885dd3318d39f39278686446752bc305b5", + "corpusId": 19044123, "publicationVenue": {"id": "e46002a1-d7a6-4681-aae9-36bc3a6a1f93", + "name": "Information Sciences", "type": "journal", "alternate_names": ["Information + Scientist", "Inf Sci"], "issn": "0020-0255", "alternate_issns": ["0020-0263"], + "url": "http://www.sciencedirect.com/science/journal/00200255"}, "url": "https://www.semanticscholar.org/paper/0c4930885dd3318d39f39278686446752bc305b5", "title": "Twitter turing test: Identifying social machines", "abstract": null, "venue": "Information Sciences", "year": 2016, "referenceCount": 45, "citationCount": - 68, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2016-12-01", - "journal": {"name": "Inf. Sci.", "pages": "332-346", "volume": "372"}, "authors": - [{"authorId": "2329378", "name": "A. Alarifi"}, {"authorId": "3129812", "name": - "M. Alsaleh"}, {"authorId": "1393386740", "name": "A. Al-Salman"}]}, {"paperId": - "ac7a3d2983b75bd4f44903892a5df295a0f859ff", "externalIds": {"DBLP": "conf/crypto/GoldwasserKPVZ13", - "MAG": "1590453572", "DOI": "10.1007/978-3-642-40084-1_30", "CorpusId": 2561936}, - "url": "https://www.semanticscholar.org/paper/ac7a3d2983b75bd4f44903892a5df295a0f859ff", + 69, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2016-12-01", "journal": {"name": "Inf. Sci.", "pages": + "332-346", "volume": "372"}, "authors": [{"authorId": "2329378", "name": "A. + Alarifi"}, {"authorId": "3129812", "name": "M. Alsaleh"}, {"authorId": "1393386740", + "name": "A. Al-Salman"}]}, {"paperId": "2b352a475a16b3e12b1af1cf9231ba824db9f937", + "externalIds": {"DBLP": "journals/tcas/BuscarinoCFFC16", "MAG": "2485899172", + "DOI": "10.1109/TCSI.2016.2564738", "CorpusId": 36502203}, "corpusId": 36502203, + "publicationVenue": {"id": "65967e36-f7db-476f-9d00-fd080a5a8483", "name": + "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", "type": + "journal", "alternate_names": ["IEEE Trans Circuit Syst Part 1 Regul Pap", + "IEEE Trans Circuit Syst I-regular Pap", "IEEE Transactions on Circuits and + Systems I-regular Papers"], "issn": "1549-8328", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=8919", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8919"]}, + "url": "https://www.semanticscholar.org/paper/2b352a475a16b3e12b1af1cf9231ba824db9f937", + "title": "Turing Patterns in Memristive Cellular Nonlinear Networks", "abstract": + "The formation of ordered structures, in particular Turing patterns, in complex + spatially extended systems has been observed in many different contexts, spanning + from natural sciences (chemistry, physics, and biology) to technology (mechanics + and electronics). In this paper, it is shown that the use of memristors in + a simple cell of a spatially-extended circuit architecture allows us to design + systems able to generate Turing patterns. In addition, the memristor parameters + play a key role in the selection of the type and characteristics of the emerging + pattern, which is also influenced by the initial conditions. The problem of + finding the regions of parameters where Turing patterns may emerge in the + proposed cellular architecture is solved in an analytic way, and numerical + results are shown to illustrate the system behavior with respect to its parameters.", + "venue": "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", + "year": 2016, "referenceCount": 32, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-07-13", "journal": + {"name": "IEEE Transactions on Circuits and Systems I: Regular Papers", "pages": + "1222-1230", "volume": "63"}, "authors": [{"authorId": "1884234", "name": + "A. Buscarino"}, {"authorId": "48285431", "name": "C. Corradino"}, {"authorId": + "143998340", "name": "L. Fortuna"}, {"authorId": "1766733", "name": "M. Frasca"}, + {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "ac7a3d2983b75bd4f44903892a5df295a0f859ff", + "externalIds": {"DBLP": "conf/crypto/GoldwasserKPVZ13", "MAG": "1590453572", + "DOI": "10.1007/978-3-642-40084-1_30", "CorpusId": 2561936}, "corpusId": 2561936, + "publicationVenue": {"id": "212b6868-c374-4ba2-ad32-19fde8004623", "name": + "Annual International Cryptology Conference", "type": "conference", "alternate_names": + ["Int Cryptol Conf", "Annu Int Cryptol Conf", "CRYPTO", "International Cryptology + Conference"], "url": "http://www.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/ac7a3d2983b75bd4f44903892a5df295a0f859ff", "title": "How to Run Turing Machines on Encrypted Data", "abstract": null, "venue": "Annual International Cryptology Conference", "year": 2013, "referenceCount": 58, "citationCount": 181, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2013-08-18", "journal": - {"pages": "536-553"}, "authors": [{"authorId": "1706681", "name": "S. Goldwasser"}, - {"authorId": "1784514", "name": "Y. Kalai"}, {"authorId": "144963510", "name": - "R. A. Popa"}, {"authorId": "1749858", "name": "V. Vaikuntanathan"}, {"authorId": - "1789973", "name": "N. Zeldovich"}]}, {"paperId": "736a8e786d3e8b3a5b06d57648c83b14243a6479", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-642-40084-1_30.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2013-08-18", "journal": {"pages": "536-553"}, "authors": [{"authorId": "1706681", + "name": "S. Goldwasser"}, {"authorId": "1784514", "name": "Y. Kalai"}, {"authorId": + "144963510", "name": "R. A. Popa"}, {"authorId": "1749858", "name": "V. Vaikuntanathan"}, + {"authorId": "1789973", "name": "N. Zeldovich"}]}, {"paperId": "736a8e786d3e8b3a5b06d57648c83b14243a6479", "externalIds": {"DBLP": "journals/corr/abs-1211-1302", "MAG": "2963123289", "ArXiv": "1211.1302", "PubMedCentral": "4014489", "DOI": "10.1371/journal.pone.0096223", - "CorpusId": 10562121, "PubMed": "24809449"}, "url": "https://www.semanticscholar.org/paper/736a8e786d3e8b3a5b06d57648c83b14243a6479", + "CorpusId": 10562121, "PubMed": "24809449"}, "corpusId": 10562121, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/736a8e786d3e8b3a5b06d57648c83b14243a6479", "title": "Calculating Kolmogorov Complexity from the Output Frequency Distributions of Small Turing Machines", "abstract": "Drawing on various notions from theoretical computer science, we present a novel numerical approach, motivated by the @@ -1212,55 +1435,21 @@ interactions: Calculator implementing this technique and making the data available to the research community is accessible at http://www.complexitycalculator.com.", "venue": "PLoS ONE", "year": 2012, "referenceCount": 82, "citationCount": - 142, "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science", "Medicine", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-11-06", "journal": {"name": "PLoS ONE", "volume": "9"}, "authors": [{"authorId": - "1389866422", "name": "F. Soler-Toscano"}, {"authorId": "66445647", "name": - "H. Zenil"}, {"authorId": "2027817702", "name": "J. Delahaye"}, {"authorId": - "3159526", "name": "N. Gauvrit"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", - "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": - 28057065, "PubMed": "25544713"}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", - "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", - "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": - 64, "citationCount": 96, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2015-02-01", "journal": {"name": "Trends - in genetics : TIG", "pages": "\n 88-96\n ", "volume": "31 - 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu Watanabe"}, {"authorId": - "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "2b352a475a16b3e12b1af1cf9231ba824db9f937", - "externalIds": {"DBLP": "journals/tcas/BuscarinoCFFC16", "MAG": "2485899172", - "DOI": "10.1109/TCSI.2016.2564738", "CorpusId": 36502203}, "url": "https://www.semanticscholar.org/paper/2b352a475a16b3e12b1af1cf9231ba824db9f937", - "title": "Turing Patterns in Memristive Cellular Nonlinear Networks", "abstract": - "The formation of ordered structures, in particular Turing patterns, in complex - spatially extended systems has been observed in many different contexts, spanning - from natural sciences (chemistry, physics, and biology) to technology (mechanics - and electronics). In this paper, it is shown that the use of memristors in - a simple cell of a spatially-extended circuit architecture allows us to design - systems able to generate Turing patterns. In addition, the memristor parameters - play a key role in the selection of the type and characteristics of the emerging - pattern, which is also influenced by the initial conditions. The problem of - finding the regions of parameters where Turing patterns may emerge in the - proposed cellular architecture is solved in an analytic way, and numerical - results are shown to illustrate the system behavior with respect to its parameters.", - "venue": "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", - "year": 2016, "referenceCount": 32, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-07-13", "journal": {"name": "IEEE Transactions on - Circuits and Systems I: Regular Papers", "pages": "1222-1230", "volume": "63"}, - "authors": [{"authorId": "1884234", "name": "A. Buscarino"}, {"authorId": - "48285431", "name": "C. Corradino"}, {"authorId": "143998340", "name": "L. - Fortuna"}, {"authorId": "1766733", "name": "M. Frasca"}, {"authorId": "144848684", - "name": "L. Chua"}]}, {"paperId": "ececf989a13264a455ec2898ed361b1c435b5f0c", - "externalIds": {"PubMedCentral": "4360114", "MAG": "2099530148", "DOI": "10.1098/rstb.2014.0218", - "CorpusId": 1594833, "PubMed": "25750229"}, "url": "https://www.semanticscholar.org/paper/ececf989a13264a455ec2898ed361b1c435b5f0c", + 143, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": + {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0096223&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-11-06", "journal": {"name": "PLoS ONE", "volume": + "9"}, "authors": [{"authorId": "1389866422", "name": "F. Soler-Toscano"}, + {"authorId": "66445647", "name": "H. Zenil"}, {"authorId": "2027817702", "name": + "J. Delahaye"}, {"authorId": "3159526", "name": "N. Gauvrit"}]}, {"paperId": + "ececf989a13264a455ec2898ed361b1c435b5f0c", "externalIds": {"PubMedCentral": + "4360114", "MAG": "2099530148", "DOI": "10.1098/rstb.2014.0218", "CorpusId": + 1594833, "PubMed": "25750229"}, "corpusId": 1594833, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/ececf989a13264a455ec2898ed361b1c435b5f0c", "title": "Forging patterns and making waves from biology to geology: a commentary on Turing (1952) \u2018The chemical basis of morphogenesis\u2019", "abstract": "Alan Turing was neither a biologist nor a chemist, and yet the paper he published @@ -1282,7 +1471,8 @@ interactions: the 350th anniversary of the journal Philosophical Transactions of the Royal Society.", "venue": "Philosophical Transactions of the Royal Society B: Biological Sciences", "year": 2015, "referenceCount": 53, "citationCount": 76, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Geology", "Medicine"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rstb.2014.0218", + "status": "HYBRID"}, "fieldsOfStudy": ["Biology", "Geology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Geology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", @@ -1290,24 +1480,31 @@ interactions: Transactions of the Royal Society B: Biological Sciences", "volume": "370"}, "authors": [{"authorId": "145164549", "name": "P. Ball"}]}, {"paperId": "257d834280b58f62e8fcd18980162e3fc8f98138", "externalIds": {"DBLP": "books/sp/Soare16", "DOI": "10.1007/978-3-642-31933-4", - "CorpusId": 1500040}, "url": "https://www.semanticscholar.org/paper/257d834280b58f62e8fcd18980162e3fc8f98138", + "CorpusId": 1500040}, "corpusId": 1500040, "publicationVenue": {"id": "1ef7809b-0640-4615-aa43-9f080f8a9445", + "name": "Theory and Applications of Computability", "alternate_names": ["Theory + Appl Comput"], "issn": "2190-619X"}, "url": "https://www.semanticscholar.org/paper/257d834280b58f62e8fcd18980162e3fc8f98138", "title": "Turing Computability", "abstract": null, "venue": "Theory and Applications of Computability", "year": 2016, "referenceCount": 52, "citationCount": 52, - "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"pages": "3-249"}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, - {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": {"MAG": - "2982569830", "CorpusId": 209946616}, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", + "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/bfm%3A978-3-642-31933-4%2F1", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "3-249"}, "authors": [{"authorId": "1760293", "name": + "R. Soare"}]}, {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": + {"MAG": "2982569830", "CorpusId": 209946616}, "corpusId": 209946616, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", "title": "Turing (1936), On Computable Numbers, with an Application to the Entscheidungsproblem", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 62, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}], "publicationTypes": null, "publicationDate": "2016-02-24", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3045814", - "name": "Rossella Lupacchini"}]}, {"paperId": "51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, + "publicationDate": "2016-02-24", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3045814", "name": "Rossella Lupacchini"}]}, {"paperId": "51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", "externalIds": {"MAG": "3030327058", "DBLP": "journals/iacr/KoppulaLW14", - "DOI": "10.1145/2746539.2746614", "CorpusId": 1368494}, "url": "https://www.semanticscholar.org/paper/51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", + "DOI": "10.1145/2746539.2746614", "CorpusId": 1368494}, "corpusId": 1368494, + "publicationVenue": {"id": "166fd2b5-a928-4a98-a449-3b90935cc101", "name": + "IACR Cryptology ePrint Archive", "type": "journal", "alternate_names": ["IACR + Cryptol eprint Arch"], "url": "http://eprint.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", "title": "Indistinguishability Obfuscation for Turing Machines with Unbounded Memory", "abstract": "We show how to build indistinguishability obfuscation (iO) for Turing Machines where the overhead is polynomial in the security @@ -1324,18 +1521,19 @@ interactions: we are at in a proof. We first build up our enforcement ideas in a simpler context of \"message hiding encodings\" and work our way up to indistinguishability obfuscation.", "venue": "IACR Cryptology ePrint Archive", "year": 2015, "referenceCount": - 64, "citationCount": 123, "influentialCitationCount": 10, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["Book", "JournalArticle"], "publicationDate": "2015-06-14", "journal": {"name": - "Proceedings of the forty-seventh annual ACM symposium on Theory of Computing"}, - "authors": [{"authorId": "1827155", "name": "Venkata Koppula"}, {"authorId": - "145071454", "name": "Allison Bishop"}, {"authorId": "145778768", "name": - "Brent Waters"}]}, {"paperId": "fdadb889d47debf18fe82031af4062b2ccf9de86", + 64, "citationCount": 124, "influentialCitationCount": 10, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2015-06-14", + "journal": {"name": "Proceedings of the forty-seventh annual ACM symposium + on Theory of Computing"}, "authors": [{"authorId": "1827155", "name": "Venkata + Koppula"}, {"authorId": "145071454", "name": "Allison Bishop"}, {"authorId": + "145778768", "name": "Brent Waters"}]}, {"paperId": "fdadb889d47debf18fe82031af4062b2ccf9de86", "externalIds": {"MAG": "1955542456", "DOI": "10.1073/pnas.1505748112", "CorpusId": - 32757767, "PubMed": "26307762"}, "url": "https://www.semanticscholar.org/paper/fdadb889d47debf18fe82031af4062b2ccf9de86", + 32757767, "PubMed": "26307762"}, "corpusId": 32757767, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fdadb889d47debf18fe82031af4062b2ccf9de86", "title": "Diverse set of Turing nanopatterns coat corneae across insect lineages", "abstract": "Significance Corneal surfaces of some insects are coated with nipple-like nanostructures reducing the light reflection. Here we provide @@ -1366,16 +1564,35 @@ interactions: be the first-ever biological example of Turing nanopatterns.", "venue": "Proceedings of the National Academy of Sciences", "year": 2015, "referenceCount": 39, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Study"], "publicationDate": "2015-08-11", "journal": {"name": "Proceedings - of the National Academy of Sciences", "pages": "10750 - 10755", "volume": - "112"}, "authors": [{"authorId": "5960117", "name": "A. Blagodatski"}, {"authorId": - "47141264", "name": "A. Sergeev"}, {"authorId": "145583716", "name": "M. Kryuchkov"}, - {"authorId": "16047326", "name": "Y. Lopatina"}, {"authorId": "3875456", "name": - "V. Katanaev"}]}, {"paperId": "0ae19a6937d504e654a597543779f1b1c027562f", - "externalIds": {"CorpusId": 17049388}, "url": "https://www.semanticscholar.org/paper/0ae19a6937d504e654a597543779f1b1c027562f", + "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/112/34/10750.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Study"], "publicationDate": "2015-08-11", "journal": {"name": + "Proceedings of the National Academy of Sciences", "pages": "10750 - 10755", + "volume": "112"}, "authors": [{"authorId": "5960117", "name": "A. Blagodatski"}, + {"authorId": "47141264", "name": "A. Sergeev"}, {"authorId": "145583716", + "name": "M. Kryuchkov"}, {"authorId": "16047326", "name": "Y. Lopatina"}, + {"authorId": "3875456", "name": "V. Katanaev"}]}, {"paperId": "2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", + "externalIds": {"MAG": "2315683245", "DBLP": "conf/automata/BarbieriKS16", + "ArXiv": "1603.08715", "DOI": "10.1007/978-3-319-39300-1_5", "CorpusId": 12270213}, + "corpusId": 12270213, "publicationVenue": {"id": "1ecbe314-9ae3-4d24-b161-c8dc331acd3b", + "name": "International Workshop on Cellular Automata and Discrete Complex + Systems", "type": "conference", "alternate_names": ["AUTOMATA", "Int Workshop + Cell Autom Discret Complex Syst"]}, "url": "https://www.semanticscholar.org/paper/2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", + "title": "The Group of Reversible Turing Machines", "abstract": null, "venue": + "International Workshop on Cellular Automata and Discrete Complex Systems", + "year": 2016, "referenceCount": 39, "citationCount": 23, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1603.08715", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-03-29", "journal": {"pages": "49-62"}, "authors": [{"authorId": "48429615", + "name": "S. Barbieri"}, {"authorId": "1753080", "name": "J. Kari"}, {"authorId": + "1789048", "name": "V. Salo"}]}, {"paperId": "0ae19a6937d504e654a597543779f1b1c027562f", + "externalIds": {"CorpusId": 17049388}, "corpusId": 17049388, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0ae19a6937d504e654a597543779f1b1c027562f", "title": "The Church-Turing Thesis", "abstract": "cell containing a left end marker ` (never written over) and extends to infinitely many cells to the right. This machine has a head that can move left or right one cell in each @@ -1402,25 +1619,17 @@ interactions: and direction to move the tape head, given the current state and symbol read; it is assumed that no transitions are enabled from either t or r.", "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "37782675", - "name": "Mahesh Viswanathan"}]}, {"paperId": "2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", - "externalIds": {"MAG": "2315683245", "DBLP": "conf/automata/BarbieriKS16", - "ArXiv": "1603.08715", "DOI": "10.1007/978-3-319-39300-1_5", "CorpusId": 12270213}, - "url": "https://www.semanticscholar.org/paper/2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", - "title": "The Group of Reversible Turing Machines", "abstract": null, "venue": - "International Workshop on Cellular Automata and Discrete Complex Systems", - "year": 2016, "referenceCount": 39, "citationCount": 23, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-03-29", "journal": {"pages": "49-62"}, "authors": [{"authorId": "48429615", - "name": "S. Barbieri"}, {"authorId": "1753080", "name": "J. Kari"}, {"authorId": - "1789048", "name": "V. Salo"}]}, {"paperId": "30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "37782675", + "name": "Mahesh Viswanathan"}]}, {"paperId": "30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", "externalIds": {"MAG": "2076118717", "DOI": "10.1126/science.1226804", "CorpusId": - 20013377, "PubMed": "23239739"}, "url": "https://www.semanticscholar.org/paper/30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", + 20013377, "PubMed": "23239739"}, "corpusId": 20013377, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", "title": "Hox Genes Regulate Digit Patterning by Controlling the Wavelength of a Turing-Type Mechanism", "abstract": "Digit Determination Pentadactyly has been an early and rapid innovation of tetrapods. Sheth et al. (p. 1476) @@ -1442,7 +1651,8 @@ interactions: endoskeleton patterns suggests that the pentadactyl state has been achieved through modification of an ancestral Turing-type mechanism.", "venue": "Science", "year": 2012, "referenceCount": 44, "citationCount": 318, "influentialCitationCount": - 16, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 16, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc4486416?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-14", "journal": {"name": "Science", @@ -1452,9 +1662,29 @@ interactions: "name": "Marisa Junco"}, {"authorId": "145631546", "name": "L. Quintana"}, {"authorId": "4351690", "name": "R. Dahn"}, {"authorId": "47986084", "name": "M. Kmita"}, {"authorId": "47254653", "name": "J. Sharpe"}, {"authorId": "3907783", - "name": "M. Ros"}]}, {"paperId": "c5fd63756cc5ac85e25af730e8da710efad43ed5", - "externalIds": {"DBLP": "journals/corr/abs-1205-3856", "ArXiv": "1205.3856", - "MAG": "2963817922", "CorpusId": 2749452}, "url": "https://www.semanticscholar.org/paper/c5fd63756cc5ac85e25af730e8da710efad43ed5", + "name": "M. Ros"}]}, {"paperId": "36fe20dd69b2160b3030fab2c103f02ee2816756", + "externalIds": {"MAG": "1495676205", "PubMedCentral": "4432648", "DOI": "10.1038/ncomms7971", + "CorpusId": 11824324, "PubMed": "25959141"}, "corpusId": 11824324, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/36fe20dd69b2160b3030fab2c103f02ee2816756", + "title": "Pigment cell movement is not required for generation of Turing patterns + in zebrafish skin", "abstract": null, "venue": "Nature Communications", "year": + 2015, "referenceCount": 32, "citationCount": 40, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/ncomms7971.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-05-11", "journal": {"name": "Nature + Communications", "volume": "6"}, "authors": [{"authorId": "4648400", "name": + "D. Bullara"}, {"authorId": "89673540", "name": "Y. De Decker"}]}, {"paperId": + "c5fd63756cc5ac85e25af730e8da710efad43ed5", "externalIds": {"DBLP": "journals/corr/abs-1205-3856", + "ArXiv": "1205.3856", "MAG": "2963817922", "CorpusId": 2749452}, "corpusId": + 2749452, "publicationVenue": {"id": "e6904c24-9546-4135-8344-e3999e375558", + "name": "Network and Distributed System Security Symposium", "type": "conference", + "alternate_names": ["Netw Distrib Syst Secur Symp", "NDSS"], "url": "http://www.isoc.org/"}, + "url": "https://www.semanticscholar.org/paper/c5fd63756cc5ac85e25af730e8da710efad43ed5", "title": "Social Turing Tests: Crowdsourcing Sybil Detection", "abstract": "As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks @@ -1471,45 +1701,41 @@ interactions: study data, we show that this system is scalable, and can be highly effective either as a standalone system or as a complementary technique to current tools.", "venue": "Network and Distributed System Security Symposium", "year": 2012, - "referenceCount": 37, "citationCount": 182, "influentialCitationCount": 13, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2012-05-01", - "journal": {"name": "ArXiv", "volume": "abs/1205.3856"}, "authors": [{"authorId": - "2096527", "name": "G. Wang"}, {"authorId": "2802925", "name": "M. Mohanlal"}, - {"authorId": "35497150", "name": "Christo Wilson"}, {"authorId": "144129720", - "name": "Xiao Wang"}, {"authorId": "1976593", "name": "Miriam J. Metzger"}, - {"authorId": "2704852", "name": "Haitao Zheng"}, {"authorId": "145970007", - "name": "Ben Y. Zhao"}]}, {"paperId": "748a8803deb06c5e51e5cf17496ea01aae923a48", - "externalIds": {"MAG": "2008912593", "DBLP": "journals/algorithmica/HermelinKSWW15", - "DOI": "10.1007/s00453-014-9910-8", "CorpusId": 15612295}, "url": "https://www.semanticscholar.org/paper/748a8803deb06c5e51e5cf17496ea01aae923a48", + "referenceCount": 37, "citationCount": 183, "influentialCitationCount": 13, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2012-05-01", "journal": {"name": "ArXiv", + "volume": "abs/1205.3856"}, "authors": [{"authorId": "2096527", "name": "G. + Wang"}, {"authorId": "2802925", "name": "M. Mohanlal"}, {"authorId": "35497150", + "name": "Christo Wilson"}, {"authorId": "144129720", "name": "Xiao Wang"}, + {"authorId": "1976593", "name": "Miriam J. Metzger"}, {"authorId": "2704852", + "name": "Haitao Zheng"}, {"authorId": "145970007", "name": "Ben Y. Zhao"}]}, + {"paperId": "748a8803deb06c5e51e5cf17496ea01aae923a48", "externalIds": {"MAG": + "2008912593", "DBLP": "journals/algorithmica/HermelinKSWW15", "DOI": "10.1007/s00453-014-9910-8", + "CorpusId": 15612295}, "corpusId": 15612295, "publicationVenue": {"id": "300eb16f-ce6c-495a-8da3-2e691bf9051d", + "name": "Algorithmica", "type": "journal", "issn": "0178-4617", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/453", + "alternate_urls": ["https://link.springer.com/journal/453", "http://www.springer.com/computer/theoretical+computer+science/journal/453"]}, + "url": "https://www.semanticscholar.org/paper/748a8803deb06c5e51e5cf17496ea01aae923a48", "title": "A Completeness Theory for Polynomial (Turing) Kernelization", "abstract": null, "venue": "Algorithmica", "year": 2013, "referenceCount": 62, "citationCount": - 95, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-09-04", "journal": {"name": "Algorithmica", - "pages": "702-730", "volume": "71"}, "authors": [{"authorId": "1736630", "name": - "D. Hermelin"}, {"authorId": "1692122", "name": "Stefan Kratsch"}, {"authorId": - "3164252", "name": "Karolina Soltys"}, {"authorId": "1849901", "name": "Magnus - Wahlstr\u00f6m"}, {"authorId": "37785191", "name": "Xi Wu"}]}, {"paperId": - "36fe20dd69b2160b3030fab2c103f02ee2816756", "externalIds": {"MAG": "1495676205", - "PubMedCentral": "4432648", "DOI": "10.1038/ncomms7971", "CorpusId": 11824324, - "PubMed": "25959141"}, "url": "https://www.semanticscholar.org/paper/36fe20dd69b2160b3030fab2c103f02ee2816756", - "title": "Pigment cell movement is not required for generation of Turing patterns - in zebrafish skin", "abstract": null, "venue": "Nature Communications", "year": - 2015, "referenceCount": 32, "citationCount": 37, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-05-11", "journal": {"name": "Nature - Communications", "volume": "6"}, "authors": [{"authorId": "4648400", "name": - "D. Bullara"}, {"authorId": "89673540", "name": "Y. De Decker"}]}, {"paperId": - "7281183d1b510a75fc32a9713133c242e6fcc718", "externalIds": {"PubMedCentral": - "4384830", "MAG": "2051172976", "DOI": "10.1021/sb500233u", "CorpusId": 508239, - "PubMed": "25122550"}, "url": "https://www.semanticscholar.org/paper/7281183d1b510a75fc32a9713133c242e6fcc718", + 95, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2013-09-04", "journal": {"name": "Algorithmica", "pages": "702-730", "volume": + "71"}, "authors": [{"authorId": "1736630", "name": "D. Hermelin"}, {"authorId": + "1692122", "name": "Stefan Kratsch"}, {"authorId": "3164252", "name": "Karolina + Soltys"}, {"authorId": "1849901", "name": "Magnus Wahlstr\u00f6m"}, {"authorId": + "37785191", "name": "Xi Wu"}]}, {"paperId": "7281183d1b510a75fc32a9713133c242e6fcc718", + "externalIds": {"PubMedCentral": "4384830", "MAG": "2051172976", "DOI": "10.1021/sb500233u", + "CorpusId": 508239, "PubMed": "25122550"}, "corpusId": 508239, "publicationVenue": + {"id": "ba560e30-4944-4dde-ac86-d977062fe0c5", "name": "ACS Synthetic Biology", + "type": "journal", "alternate_names": ["AC Synth Biology"], "issn": "2161-5063", + "url": "https://pubs.acs.org/journal/asbcd6", "alternate_urls": ["http://pubs.acs.org/journal/asbcd6"]}, + "url": "https://www.semanticscholar.org/paper/7281183d1b510a75fc32a9713133c242e6fcc718", "title": "Cooperativity To Increase Turing Pattern Space for Synthetic Biology", "abstract": "It is hard to bridge the gap between mathematical formulations and biological implementations of Turing patterns, yet this is necessary for @@ -1530,17 +1756,18 @@ interactions: of the limitations of linear scenarios for reaction\u2013diffusion systems and will help to guide projects to engineer synthetic Turing patterns.", "venue": "ACS Synthetic Biology", "year": 2014, "referenceCount": 52, "citationCount": - 39, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-08-14", "journal": {"name": "ACS Synthetic Biology", - "pages": "177 - 186", "volume": "4"}, "authors": [{"authorId": "2372067", - "name": "Luis Diambra"}, {"authorId": "6561683", "name": "V. Senthivel"}, - {"authorId": "47123946", "name": "Diego B\u00e1rcena Men\u00e9ndez"}, {"authorId": - "3091939", "name": "M. Isalan"}]}, {"paperId": "3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", - "externalIds": {"MAG": "300525892", "DBLP": "journals/corr/MalinowskiF14a", - "ArXiv": "1410.8027", "CorpusId": 811868}, "url": "https://www.semanticscholar.org/paper/3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", + 39, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-08-14", "journal": + {"name": "ACS Synthetic Biology", "pages": "177 - 186", "volume": "4"}, "authors": + [{"authorId": "2372067", "name": "Luis Diambra"}, {"authorId": "6561683", + "name": "V. Senthivel"}, {"authorId": "47123946", "name": "Diego B\u00e1rcena + Men\u00e9ndez"}, {"authorId": "3091939", "name": "M. Isalan"}]}, {"paperId": + "3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", "externalIds": {"MAG": "300525892", + "DBLP": "journals/corr/MalinowskiF14a", "ArXiv": "1410.8027", "CorpusId": + 811868}, "corpusId": 811868, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", "title": "Towards a Visual Turing Challenge", "abstract": "As language and visual understanding by machines progresses rapidly, we are observing an increasing interest in holistic architectures that tightly interlink both modalities @@ -1560,38 +1787,42 @@ interactions: driving force to create suitable benchmarks. Providing coverage in this inherently ambiguous output space is an emerging challenge that we face in order to make quantifiable progress in this area.", "venue": "ArXiv", "year": 2014, "referenceCount": - 83, "citationCount": 67, "influentialCitationCount": 12, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-10-29", "journal": {"name": "ArXiv", "volume": "abs/1410.8027"}, "authors": - [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": "1739548", - "name": "Mario Fritz"}]}, {"paperId": "358e1c04f03c2ede4b913a7430e99e78e66f2597", + 83, "citationCount": 68, "influentialCitationCount": 12, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-10-29", "journal": {"name": "ArXiv", "volume": "abs/1410.8027"}, + "authors": [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": + "1739548", "name": "Mario Fritz"}]}, {"paperId": "358e1c04f03c2ede4b913a7430e99e78e66f2597", "externalIds": {"MAG": "1990010228", "DOI": "10.1016/J.ECOCOM.2014.09.002", - "CorpusId": 84059947}, "url": "https://www.semanticscholar.org/paper/358e1c04f03c2ede4b913a7430e99e78e66f2597", + "CorpusId": 84059947}, "corpusId": 84059947, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/358e1c04f03c2ede4b913a7430e99e78e66f2597", "title": "Beyond Turing: The response of patterned ecosystems to environmental change", "abstract": null, "venue": "", "year": 2014, "referenceCount": 60, - "citationCount": 107, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2014-12-01", "journal": {"name": "Ecological Complexity", "pages": "81-96", - "volume": "20"}, "authors": [{"authorId": "3922814", "name": "K. Siteur"}, - {"authorId": "143978708", "name": "E. Siero"}, {"authorId": "6326314", "name": - "M. Eppinga"}, {"authorId": "144207734", "name": "J. Rademacher"}, {"authorId": - "1727787", "name": "A. Doelman"}, {"authorId": "2096458905", "name": "M. Rietkerk"}]}, - {"paperId": "999f90eebe8b3504b1ee3a8a689513b26e18772e", "externalIds": {"MAG": - "2490062034", "DOI": "10.1016/B978-0-12-386980-7.50021-6", "CorpusId": 63444001}, - "url": "https://www.semanticscholar.org/paper/999f90eebe8b3504b1ee3a8a689513b26e18772e", + "citationCount": 108, "influentialCitationCount": 8, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dspace.library.uu.nl/bitstream/1874/307590/1/14.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2014-12-01", "journal": {"name": "Ecological Complexity", + "pages": "81-96", "volume": "20"}, "authors": [{"authorId": "3922814", "name": + "K. Siteur"}, {"authorId": "143978708", "name": "E. Siero"}, {"authorId": + "6326314", "name": "M. Eppinga"}, {"authorId": "144207734", "name": "J. Rademacher"}, + {"authorId": "1727787", "name": "A. Doelman"}, {"authorId": "2096458905", + "name": "M. Rietkerk"}]}, {"paperId": "999f90eebe8b3504b1ee3a8a689513b26e18772e", + "externalIds": {"MAG": "2490062034", "DOI": "10.1016/B978-0-12-386980-7.50021-6", + "CorpusId": 63444001}, "corpusId": 63444001, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/999f90eebe8b3504b1ee3a8a689513b26e18772e", "title": "Turing\u2019s Lecture to the London Mathematical Society on 20 February 1947", "abstract": null, "venue": "", "year": 2013, "referenceCount": 5, "citationCount": - 156, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "481-497", "volume": ""}, "authors": [{"authorId": - "98630872", "name": "S. Cooper"}]}, {"paperId": "9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", + 157, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "481-497", "volume": ""}, "authors": + [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", "externalIds": {"DBLP": "books/cu/D2014", "MAG": "577185743", "DOI": "10.1017/CBO9781107338579.001", - "CorpusId": 19315498}, "url": "https://www.semanticscholar.org/paper/9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", + "CorpusId": 19315498}, "corpusId": 19315498, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", "title": "Turing''s legacy: developments from Turing''s ideas in logic", "abstract": "Turing''s legacy: developments from Turing''s ideas in logic Rod Downey 1. Computability and analysis: the legacy of Alan Turing Jeremy Avigad and Vasco @@ -1608,13 +1839,16 @@ interactions: by recursive step: Church''s analysis of effective calculability Wilfried Sieg 13. Turing and the discovery of computability Robert Irving Soare 14. Transfinite machine models P. D. Welch.", "venue": "Turing''s Legacy", "year": - 2014, "referenceCount": 0, "citationCount": 74, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "vii-x"}, "authors": [{"authorId": - "2134049919", "name": "R. Downey"}]}, {"paperId": "b3b262de503bd160ffcfd33e180d4e56fb41e53b", - "externalIds": {"MAG": "2059483036", "DBLP": "conf/3dim/ShanACFS13", "DOI": - "10.1109/3DV.2013.12", "CorpusId": 1315955}, "url": "https://www.semanticscholar.org/paper/b3b262de503bd160ffcfd33e180d4e56fb41e53b", + 2014, "referenceCount": 0, "citationCount": 76, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "vii-x"}, "authors": [{"authorId": "2134049919", "name": "R. Downey"}]}, + {"paperId": "b3b262de503bd160ffcfd33e180d4e56fb41e53b", "externalIds": {"MAG": + "2059483036", "DBLP": "conf/3dim/ShanACFS13", "DOI": "10.1109/3DV.2013.12", + "CorpusId": 1315955}, "corpusId": 1315955, "publicationVenue": {"id": "4b02e809-1c26-4203-b9ba-311a418f664b", + "name": "International Conference on 3D Vision", "type": "conference", "alternate_names": + ["Int Conf 3D Vis", "3DV"]}, "url": "https://www.semanticscholar.org/paper/b3b262de503bd160ffcfd33e180d4e56fb41e53b", "title": "The Visual Turing Test for Scene Reconstruction", "abstract": "We present the first large scale system for capturing and rendering relight able scene reconstructions from massive unstructured photo collections taken under @@ -1627,16 +1861,23 @@ interactions: the observer has to guess which is which. While we cannot yet fool human perception, the gap is closing.", "venue": "International Conference on 3D Vision", "year": 2013, "referenceCount": 12, "citationCount": 102, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2013-06-01", "journal": {"name": "2013 - International Conference on 3D Vision", "pages": "25-32"}, "authors": [{"authorId": - "2141964", "name": "Qi Shan"}, {"authorId": "30658914", "name": "R. Adams"}, - {"authorId": "143800609", "name": "B. Curless"}, {"authorId": "1798912", "name": - "Yasutaka Furukawa"}, {"authorId": "1679223", "name": "S. Seitz"}]}, {"paperId": - "a12d167d42e7960f3fd7ecbf9600aa036cc73def", "externalIds": {"DBLP": "journals/jetai/WarwickS15", - "MAG": "2049800859", "DOI": "10.1080/0952813X.2014.921734", "CorpusId": 45773196}, + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-06-01", + "journal": {"name": "2013 International Conference on 3D Vision", "pages": + "25-32"}, "authors": [{"authorId": "2141964", "name": "Qi Shan"}, {"authorId": + "30658914", "name": "R. Adams"}, {"authorId": "143800609", "name": "B. Curless"}, + {"authorId": "1798912", "name": "Yasutaka Furukawa"}, {"authorId": "1679223", + "name": "S. Seitz"}]}, {"paperId": "a12d167d42e7960f3fd7ecbf9600aa036cc73def", + "externalIds": {"DBLP": "journals/jetai/WarwickS15", "MAG": "2049800859", + "DOI": "10.1080/0952813X.2014.921734", "CorpusId": 45773196}, "corpusId": + 45773196, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, "url": "https://www.semanticscholar.org/paper/a12d167d42e7960f3fd7ecbf9600aa036cc73def", "title": "Human misidentification in Turing tests", "abstract": "This paper presents some important issues on misidentification of human interlocutors @@ -1653,14 +1894,15 @@ interactions: that performs well on the Turing test.", "venue": "Journal of experimental and theoretical artificial intelligence (Print)", "year": 2015, "referenceCount": 38, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-04", "journal": - {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "123 - 135", "volume": "27"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": - "01dde81924fc37171a93e2f4115b7beec8f349d9", "externalIds": {"MAG": "2221398315", - "DOI": "10.1080/01445340.2015.1082050", "CorpusId": 61921161}, "url": "https://www.semanticscholar.org/paper/01dde81924fc37171a93e2f4115b7beec8f349d9", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-03-04", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "123 - 135", "volume": "27"}, "authors": [{"authorId": + "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma + Shah"}]}, {"paperId": "01dde81924fc37171a93e2f4115b7beec8f349d9", "externalIds": + {"MAG": "2221398315", "DOI": "10.1080/01445340.2015.1082050", "CorpusId": + 61921161}, "corpusId": 61921161, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/01dde81924fc37171a93e2f4115b7beec8f349d9", "title": "Towards a Historical Notion of \u2018Turing\u2014the Father of Computer Science\u2019", "abstract": "In the popular imagination, the relevance of Turing''s theoretical ideas to people producing actual machines was significant @@ -1690,24 +1932,34 @@ interactions: in Turing''s work and provided the original vector by which Turing became to be appreciated in retrospect as the father of computer science.", "venue": "", "year": 2015, "referenceCount": 128, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-07-03", "journal": {"name": "History and Philosophy of Logic", "pages": - "205 - 228", "volume": "36"}, "authors": [{"authorId": "1745926", "name": - "E. Daylight"}]}, {"paperId": "7224596e2cbafff3c027021fb19410a63f76487b", - "externalIds": {"MAG": "840746988", "DBLP": "conf/mpc/McBride15", "DOI": "10.1007/978-3-319-19797-5_13", - "CorpusId": 1010375}, "url": "https://www.semanticscholar.org/paper/7224596e2cbafff3c027021fb19410a63f76487b", + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://lirias.kuleuven.be/bitstream/123456789/626462/2/A.main.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-07-03", + "journal": {"name": "History and Philosophy of Logic", "pages": "205 - 228", + "volume": "36"}, "authors": [{"authorId": "1745926", "name": "E. Daylight"}]}, + {"paperId": "7224596e2cbafff3c027021fb19410a63f76487b", "externalIds": {"MAG": + "840746988", "DBLP": "conf/mpc/McBride15", "DOI": "10.1007/978-3-319-19797-5_13", + "CorpusId": 1010375}, "corpusId": 1010375, "publicationVenue": {"id": "5d23a701-baa7-4e77-ba87-db9d97e270f7", + "name": "International Conference on Mathematics of Program Construction", + "type": "conference", "alternate_names": ["Math Program Constr", "Int Conf + Math Program Constr", "MPC", "Mathematics of Program Construction"]}, "url": + "https://www.semanticscholar.org/paper/7224596e2cbafff3c027021fb19410a63f76487b", "title": "Turing-Completeness Totally Free", "abstract": null, "venue": "International Conference on Mathematics of Program Construction", "year": 2015, "referenceCount": 25, "citationCount": 38, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2015-06-29", "journal": {"pages": "257-275"}, "authors": [{"authorId": "144883222", - "name": "Conor McBride"}]}, {"paperId": "dda277ca05684e9a56bea891a9c1478e8e531918", + "openAccessPdf": {"url": "https://strathprints.strath.ac.uk/60166/1/McBride_LNCS2015_Turing_completeness_totally_free.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2015-06-29", "journal": {"pages": "257-275"}, "authors": + [{"authorId": "144883222", "name": "Conor McBride"}]}, {"paperId": "dda277ca05684e9a56bea891a9c1478e8e531918", "externalIds": {"MAG": "2081273570", "DOI": "10.1103/PHYSREVLETT.111.024103", - "CorpusId": 14238651, "PubMed": "23889406"}, "url": "https://www.semanticscholar.org/paper/dda277ca05684e9a56bea891a9c1478e8e531918", + "CorpusId": 14238651, "PubMed": "23889406"}, "corpusId": 14238651, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dda277ca05684e9a56bea891a9c1478e8e531918", "title": "Transition from amplitude to oscillation death via Turing bifurcation.", "abstract": "Coupled oscillators are shown to experience two structurally different oscillation quenching types: amplitude death (AD) and oscillation @@ -1718,16 +1970,16 @@ interactions: (OD) steady state, as well as their significance for physical and biological applications and control studies, are also pointed out.", "venue": "Physical Review Letters", "year": 2013, "referenceCount": 64, "citationCount": 104, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2013-07-10", "journal": {"name": "Physical review letters", "pages": "\n 024103\n ", - "volume": "111 2"}, "authors": [{"authorId": "2850131", "name": "A. Koseska"}, - {"authorId": "2046767", "name": "E. Volkov"}, {"authorId": "143842718", "name": - "J. Kurths"}]}, {"paperId": "a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", "externalIds": - {"MAG": "2074603814", "DOI": "10.1093/IMAMAT/HXR050", "CorpusId": 527810}, - "url": "https://www.semanticscholar.org/paper/a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-07-10", "journal": {"name": "Physical review letters", + "pages": "\n 024103\n ", "volume": "111 2"}, "authors": [{"authorId": + "2850131", "name": "A. Koseska"}, {"authorId": "2046767", "name": "E. Volkov"}, + {"authorId": "143842718", "name": "J. Kurths"}]}, {"paperId": "a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", + "externalIds": {"MAG": "2074603814", "DOI": "10.1093/IMAMAT/HXR050", "CorpusId": + 527810}, "corpusId": 527810, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", "title": "Hopf bifurcation and Turing instability in the reaction\u2013diffusion Holling\u2013Tanner predator\u2013prey model", "abstract": "The reaction\u2013diffusion Holling\u2013Tanner predator\u2013prey model with Neumann boundary condition @@ -1739,31 +1991,38 @@ interactions: numerical simulations, we show the bistability of a stable equilibrium solution and a stable periodic solution for ordinary differential equation and the phenomenon that a periodic solution becomes Turing unstable for PDE.", "venue": - "", "year": 2013, "referenceCount": 24, "citationCount": 89, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-04-01", - "journal": {"name": "Ima Journal of Applied Mathematics", "pages": "287-306", - "volume": "78"}, "authors": [{"authorId": "2153897014", "name": "Xin Li"}, - {"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": "1728518", - "name": "Junping Shi"}]}, {"paperId": "bf4bf19f021c48910048741873627691d8277a61", + "", "year": 2013, "referenceCount": 24, "citationCount": 93, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-04-01", "journal": {"name": "Ima Journal of Applied Mathematics", "pages": + "287-306", "volume": "78"}, "authors": [{"authorId": "2153897014", "name": + "Xin Li"}, {"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": + "1728518", "name": "Junping Shi"}]}, {"paperId": "bf4bf19f021c48910048741873627691d8277a61", "externalIds": {"MAG": "101492982", "DBLP": "series/sci/Yampolskiy13", "DOI": - "10.1007/978-3-642-29694-9_1", "CorpusId": 7880844}, "url": "https://www.semanticscholar.org/paper/bf4bf19f021c48910048741873627691d8277a61", + "10.1007/978-3-642-29694-9_1", "CorpusId": 7880844}, "corpusId": 7880844, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf4bf19f021c48910048741873627691d8277a61", "title": "Turing Test as a Defining Feature of AI-Completeness", "abstract": null, "venue": "Artificial Intelligence, Evolutionary Computing and Metaheuristics", "year": 2013, "referenceCount": 77, "citationCount": 80, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://cecs.louisville.edu/ry/TuringTestasaDefiningFeature04270003.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "3-17"}, "authors": [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "710daed4f84e16e16a3a336e734a21f6a5e1f7d5", "externalIds": {"PubMedCentral": "3303118", "MAG": "2039888453", "DOI": "10.1038/ng.1090", - "CorpusId": 4649834, "PubMed": "22344222"}, "url": "https://www.semanticscholar.org/paper/710daed4f84e16e16a3a336e734a21f6a5e1f7d5", + "CorpusId": 4649834, "PubMed": "22344222"}, "corpusId": 4649834, "publicationVenue": + {"id": "bb27e645-e57c-42c3-bcbc-c7b443c58209", "name": "Nature Genetics", + "type": "journal", "alternate_names": ["Nat Genet"], "issn": "1061-4036", + "url": "http://www.nature.com/ng/", "alternate_urls": ["http://www.nature.com/ng/index.html"]}, + "url": "https://www.semanticscholar.org/paper/710daed4f84e16e16a3a336e734a21f6a5e1f7d5", "title": "Periodic stripe formation by a Turing-mechanism operating at growth zones in the mammalian palate", "abstract": null, "venue": "Nature Genetics", - "year": 2012, "referenceCount": 38, "citationCount": 220, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + "year": 2012, "referenceCount": 38, "citationCount": 222, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc3303118?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-09", "journal": {"name": "Nature @@ -1773,9 +2032,43 @@ interactions: "name": "P. Sharpe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}, {"authorId": "145155351", "name": "M. A. Basson"}, {"authorId": "1398203964", "name": "A. Gritli-Linde"}, {"authorId": "3748305", "name": "M. Cobourne"}, {"authorId": - "2113478488", "name": "Jeremy B. A. Green"}]}, {"paperId": "4368e42c838d031625def660ed724455a393883f", - "externalIds": {"MAG": "2001888401", "DOI": "10.1103/PHYSREVE.90.052908", - "CorpusId": 37161709, "PubMed": "25493859"}, "url": "https://www.semanticscholar.org/paper/4368e42c838d031625def660ed724455a393883f", + "2113478488", "name": "Jeremy B. A. Green"}]}, {"paperId": "25b65ca65ce0499855df6be6ab1a6575ad60f10a", + "externalIds": {"MAG": "2168169421", "ArXiv": "1310.6571", "DOI": "10.1103/PhysRevE.88.042925", + "CorpusId": 715587, "PubMed": "24229267"}, "corpusId": 715587, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/25b65ca65ce0499855df6be6ab1a6575ad60f10a", + "title": "Turing pattern formation in the Brusselator system with nonlinear + diffusion.", "abstract": "In this work we investigate the effect of density-dependent + nonlinear diffusion on pattern formation in the Brusselator system. Through + linear stability analysis of the basic solution we determine the Turing and + the oscillatory instability boundaries. A comparison with the classical linear + diffusion shows how nonlinear diffusion favors the occurrence of Turing pattern + formation. We study the process of pattern formation both in one-dimensional + and two-dimensional spatial domains. Through a weakly nonlinear multiple scales + analysis we derive the equations for the amplitude of the stationary patterns. + The analysis of the amplitude equations shows the occurrence of a number of + different phenomena, including stable supercritical and subcritical Turing + patterns with multiple branches of stable solutions leading to hysteresis. + Moreover, we consider traveling patterning waves: When the domain size is + large, the pattern forms sequentially and traveling wave fronts are the precursors + to patterning. We derive the Ginzburg-Landau equation and describe the traveling + front enveloping a pattern which invades the domain. We show the emergence + of radially symmetric target patterns, and, through a matching procedure, + we construct the outer amplitude equation and the inner core solution.", "venue": + "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": + 2013, "referenceCount": 69, "citationCount": 79, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1310.6571", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2013-10-01", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042925\n ", + "volume": "88 4"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, + {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": + "M. Sammartino"}, {"authorId": "6832964", "name": "V. Sciacca"}]}, {"paperId": + "4368e42c838d031625def660ed724455a393883f", "externalIds": {"MAG": "2001888401", + "DOI": "10.1103/PHYSREVE.90.052908", "CorpusId": 37161709, "PubMed": "25493859"}, + "corpusId": 37161709, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4368e42c838d031625def660ed724455a393883f", "title": "Delay-induced Turing instability in reaction-diffusion equations.", "abstract": "Time delays have been commonly used in modeling biological systems and can significantly change the dynamics of these systems. Quite a few works @@ -1792,16 +2085,21 @@ interactions: that the critical delay is a decreasing function of the ratio of carrying capacity to half saturation of the prey density.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": - 8, "citationCount": 59, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-11-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 052908\n ", + 8, "citationCount": 63, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://researchbank.swinburne.edu.au/file/f8bb9895-ebea-4537-9dac-ab6a888c67fc/1/PDF + (Published version).pdf", "status": "GREEN"}, "fieldsOfStudy": ["Medicine", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-11-01", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 052908\n ", "volume": "90 5-1"}, "authors": [{"authorId": "1742870", "name": "Tonghua Zhang"}, {"authorId": "144921840", "name": "Hong Zang"}]}, {"paperId": "2be24c021f2548c7d4da649748aa1f53ba035732", "externalIds": {"MAG": "2161045785", "DOI": "10.1098/rsfs.2011.0113", "CorpusId": - 18186798, "PubMed": "23919129"}, "url": "https://www.semanticscholar.org/paper/2be24c021f2548c7d4da649748aa1f53ba035732", + 18186798, "PubMed": "23919129"}, "corpusId": 18186798, "publicationVenue": + {"id": "692a1437-389a-429a-b9b0-7a8182722f06", "name": "Interface Focus", + "type": "journal", "issn": "2042-8898", "url": "http://rsfs.royalsocietypublishing.org/"}, + "url": "https://www.semanticscholar.org/paper/2be24c021f2548c7d4da649748aa1f53ba035732", "title": "Turing''s model for biological pattern formation and the robustness problem", "abstract": "One of the fundamental questions in developmental biology is how the vast range of pattern and structure we observe in nature emerges @@ -1816,18 +2114,23 @@ interactions: basic properties of Turing''s theory, we highlight the successes and pitfalls of using it as a model for biological systems, and discuss emerging developments in the area.", "venue": "Interface Focus", "year": 2012, "referenceCount": - 50, "citationCount": 196, "influentialCitationCount": 7, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2012-08-06", "journal": - {"name": "Interface Focus", "pages": "487 - 496", "volume": "2"}, "authors": - [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "6566804", "name": - "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": + 50, "citationCount": 201, "influentialCitationCount": 7, "isOpenAccess": true, + "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsfs.2011.0113", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2012-08-06", + "journal": {"name": "Interface Focus", "pages": "487 - 496", "volume": "2"}, + "authors": [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "6566804", + "name": "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "37236426", "name": "S. S. Lee"}]}, {"paperId": "79c13947d11cc1bb4461dea03a8c084333f255cc", "externalIds": {"MAG": "2149257324", "DBLP": "journals/ijns/CabessaS14", "DOI": "10.1142/S0129065714500294", - "CorpusId": 13188177, "PubMed": "25354762"}, "url": "https://www.semanticscholar.org/paper/79c13947d11cc1bb4461dea03a8c084333f255cc", + "CorpusId": 13188177, "PubMed": "25354762"}, "corpusId": 13188177, "publicationVenue": + {"id": "a042b147-151c-4d51-97c7-40b8434b377a", "name": "International Journal + of Neural Systems", "type": "journal", "alternate_names": ["Int J Neural Syst"], + "issn": "0129-0657", "url": "http://www.worldscinet.com/ijns", "alternate_urls": + ["http://www.worldscinet.com/ijns/ijns.shtml"]}, "url": "https://www.semanticscholar.org/paper/79c13947d11cc1bb4461dea03a8c084333f255cc", "title": "The Super-Turing Computational Power of plastic Recurrent Neural Networks", "abstract": "We study the computational capabilities of a biologically inspired neural model where the synaptic weights, the connectivity pattern, @@ -1850,26 +2153,42 @@ interactions: suitable way the capabilities of brain-like models of computation.", "venue": "International Journal of Neural Systems", "year": 2014, "referenceCount": 67, "citationCount": 54, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-11-20", "journal": - {"name": "International journal of neural systems", "pages": "\n 1450029\n ", - "volume": "24 8"}, "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie - Cabessa"}, {"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": - "25c161313411aea736e72cebd626b41ed8fcef82", "externalIds": {"PubMedCentral": - "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", "CorpusId": 1789930, - "PubMed": "24145394"}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-11-20", "journal": {"name": "International journal of neural systems", + "pages": "\n 1450029\n ", "volume": "24 8"}, "authors": [{"authorId": + "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "2797623", "name": + "H. Siegelmann"}]}, {"paperId": "0e410c91207e835c9cad7618491291e3935e7b91", + "externalIds": {"MAG": "2014564062", "DOI": "10.1007/S11071-013-1114-2", "CorpusId": + 122082126}, "corpusId": 122082126, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e410c91207e835c9cad7618491291e3935e7b91", + "title": "Turing instability and pattern formation of neural networks with + reaction\u2013diffusion terms", "abstract": null, "venue": "", "year": 2014, + "referenceCount": 29, "citationCount": 46, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2014-04-01", "journal": {"name": "Nonlinear Dynamics", "pages": "115-124", + "volume": "76"}, "authors": [{"authorId": "3343834", "name": "Hongyong Zhao"}, + {"authorId": "2048884404", "name": "Xuanxuan Huang"}, {"authorId": "2108177604", + "name": "Xuebing Zhang"}]}, {"paperId": "25c161313411aea736e72cebd626b41ed8fcef82", + "externalIds": {"PubMedCentral": "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", + "CorpusId": 1789930, "PubMed": "24145394"}, "corpusId": 1789930, "publicationVenue": + {"id": "bc96f9bd-89da-4c9a-ab24-27749617f6ff", "name": "Conference on Lasers + and Electro-Optics", "type": "conference", "alternate_names": ["CLEO", "Conf + Laser Electro-optics"]}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", "title": "Formation and control of Turing patterns in a coherent quantum fluid", "abstract": null, "venue": "Conference on Lasers and Electro-Optics", "year": - 2013, "referenceCount": 67, "citationCount": 45, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2013-10-22", "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": - [{"authorId": "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", - "name": "P. Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": + 2013, "referenceCount": 67, "citationCount": 46, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03016.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-10-22", + "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": [{"authorId": + "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", "name": "P. + Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": "93534597", "name": "Y. Tse"}, {"authorId": "118567298", "name": "N. Kwong"}, {"authorId": "34750791", "name": "A. L\u00fccke"}, {"authorId": "5207467", "name": "M. Abbarchi"}, {"authorId": "5012276", "name": "E. Baudin"}, {"authorId": @@ -1878,8 +2197,42 @@ interactions: "102296643", "name": "P. Leung"}, {"authorId": "5362311", "name": "P. Roussignol"}, {"authorId": "2829334", "name": "R. Binder"}, {"authorId": "35055521", "name": "J. Tignon"}, {"authorId": "49371199", "name": "S. Schumacher"}]}, {"paperId": - "0bbcd935186d5173766256de636b02974dcd7808", "externalIds": {"MAG": "564330425", - "DOI": "10.2307/j.ctvc77913", "CorpusId": 132210151}, "url": "https://www.semanticscholar.org/paper/0bbcd935186d5173766256de636b02974dcd7808", + "4901daf067430f3dca14ab32f348c86915021d16", "externalIds": {"MAG": "2130797746", + "DOI": "10.1017/S0956792514000370", "CorpusId": 122542423}, "corpusId": 122542423, + "publicationVenue": {"id": "04d04afc-8e5c-4c06-98fc-64bd52fa7c8b", "name": + "European journal of applied mathematics", "type": "journal", "alternate_names": + ["Eur J Appl Math", "European Journal of Applied Mathematics", "Eur j appl + math"], "issn": "0956-7925", "url": "https://www.cambridge.org/core/journals/european-journal-of-applied-mathematics", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=EJM"]}, + "url": "https://www.semanticscholar.org/paper/4901daf067430f3dca14ab32f348c86915021d16", + "title": "Spatio-temporal organization in a morphochemical electrodeposition + model: Hopf and Turing instabilities and their interplay", "abstract": "In + this paper, we investigate from a theoretical point of view the 2D reaction-diffusion + system for electrodeposition coupling morphology and surface chemistry, presented + and experimentally validated in Bozzini et al. (2013J. Solid State Electr.17, + 467\u2013479). We analyse the mechanisms responsible for spatio-temporal organization. + As a first step, spatially uniform dynamics is discussed and the occurrence + of a supercritical Hopf bifurcation for the local kinetics is proved. In the + spatial case, initiation of morphological patterns induced by diffusion is + shown to occur in a suitable region of the parameter space. The intriguing + interplay between Hopf and Turing instability is also considered, by investigating + the spatio-temporal behaviour of the system in the neighbourhood of the codimension-two + Turing--Hopf bifurcation point. An ADI (Alternating Direction Implicit) scheme + based on high-order finite differences in space is applied to obtain numerical + approximations of Turing patterns at the steady state and for the simulation + of the oscillating Turing\u2013Hopf dynamics.", "venue": "European journal + of applied mathematics", "year": 2014, "referenceCount": 80, "citationCount": + 43, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E44F32B9BF463A0C4E752D57B846AF4D/S0956792514000370a.pdf/div-class-title-spatio-temporal-organization-in-a-morphochemical-electrodeposition-model-hopf-and-turing-instabilities-and-their-interplay-div.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-12-22", + "journal": {"name": "European Journal of Applied Mathematics", "pages": "143 + - 173", "volume": "26"}, "authors": [{"authorId": "2663085", "name": "D. Lacitignola"}, + {"authorId": "2081619", "name": "B. Bozzini"}, {"authorId": "1914459", "name": + "I. Sgura"}]}, {"paperId": "0bbcd935186d5173766256de636b02974dcd7808", "externalIds": + {"MAG": "564330425", "DOI": "10.2307/j.ctvc77913", "CorpusId": 132210151}, + "corpusId": 132210151, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0bbcd935186d5173766256de636b02974dcd7808", "title": "Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition", "abstract": "Alan Turing died in 1954, but the themes of his life epitomize the turn of the millennium. A pure mathematician from @@ -1906,88 +2259,20 @@ interactions: admits what all biographers know, but few admit, about their subjects: \"his inner code remains unbroken.\" Alan Turing is still an enigma. --Mary Ellen Curtin", "venue": "", "year": 2014, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2014-11-10", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "4901daf067430f3dca14ab32f348c86915021d16", - "externalIds": {"MAG": "2130797746", "DOI": "10.1017/S0956792514000370", "CorpusId": - 122542423}, "url": "https://www.semanticscholar.org/paper/4901daf067430f3dca14ab32f348c86915021d16", - "title": "Spatio-temporal organization in a morphochemical electrodeposition - model: Hopf and Turing instabilities and their interplay", "abstract": "In - this paper, we investigate from a theoretical point of view the 2D reaction-diffusion - system for electrodeposition coupling morphology and surface chemistry, presented - and experimentally validated in Bozzini et al. (2013J. Solid State Electr.17, - 467\u2013479). We analyse the mechanisms responsible for spatio-temporal organization. - As a first step, spatially uniform dynamics is discussed and the occurrence - of a supercritical Hopf bifurcation for the local kinetics is proved. In the - spatial case, initiation of morphological patterns induced by diffusion is - shown to occur in a suitable region of the parameter space. The intriguing - interplay between Hopf and Turing instability is also considered, by investigating - the spatio-temporal behaviour of the system in the neighbourhood of the codimension-two - Turing--Hopf bifurcation point. An ADI (Alternating Direction Implicit) scheme - based on high-order finite differences in space is applied to obtain numerical - approximations of Turing patterns at the steady state and for the simulation - of the oscillating Turing\u2013Hopf dynamics.", "venue": "European journal - of applied mathematics", "year": 2014, "referenceCount": 80, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2014-12-22", "journal": {"name": "European Journal - of Applied Mathematics", "pages": "143 - 173", "volume": "26"}, "authors": - [{"authorId": "2663085", "name": "D. Lacitignola"}, {"authorId": "2081619", - "name": "B. Bozzini"}, {"authorId": "1914459", "name": "I. Sgura"}]}, {"paperId": - "25b65ca65ce0499855df6be6ab1a6575ad60f10a", "externalIds": {"MAG": "2168169421", - "ArXiv": "1310.6571", "DOI": "10.1103/PhysRevE.88.042925", "CorpusId": 715587, - "PubMed": "24229267"}, "url": "https://www.semanticscholar.org/paper/25b65ca65ce0499855df6be6ab1a6575ad60f10a", - "title": "Turing pattern formation in the Brusselator system with nonlinear - diffusion.", "abstract": "In this work we investigate the effect of density-dependent - nonlinear diffusion on pattern formation in the Brusselator system. Through - linear stability analysis of the basic solution we determine the Turing and - the oscillatory instability boundaries. A comparison with the classical linear - diffusion shows how nonlinear diffusion favors the occurrence of Turing pattern - formation. We study the process of pattern formation both in one-dimensional - and two-dimensional spatial domains. Through a weakly nonlinear multiple scales - analysis we derive the equations for the amplitude of the stationary patterns. - The analysis of the amplitude equations shows the occurrence of a number of - different phenomena, including stable supercritical and subcritical Turing - patterns with multiple branches of stable solutions leading to hysteresis. - Moreover, we consider traveling patterning waves: When the domain size is - large, the pattern forms sequentially and traveling wave fronts are the precursors - to patterning. We derive the Ginzburg-Landau equation and describe the traveling - front enveloping a pattern which invades the domain. We show the emergence - of radially symmetric target patterns, and, through a matching procedure, - we construct the outer amplitude equation and the inner core solution.", "venue": - "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2013, "referenceCount": 69, "citationCount": 69, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-10-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042925\n ", - "volume": "88 4"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, - {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": - "M. Sammartino"}, {"authorId": "6832964", "name": "V. Sciacca"}]}, {"paperId": - "0e410c91207e835c9cad7618491291e3935e7b91", "externalIds": {"MAG": "2014564062", - "DOI": "10.1007/S11071-013-1114-2", "CorpusId": 122082126}, "url": "https://www.semanticscholar.org/paper/0e410c91207e835c9cad7618491291e3935e7b91", - "title": "Turing instability and pattern formation of neural networks with - reaction\u2013diffusion terms", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 29, "citationCount": 38, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-04-01", - "journal": {"name": "Nonlinear Dynamics", "pages": "115-124", "volume": "76"}, - "authors": [{"authorId": "3343834", "name": "Hongyong Zhao"}, {"authorId": - "2048884404", "name": "Xuanxuan Huang"}, {"authorId": "2108177604", "name": - "Xuebing Zhang"}]}, {"paperId": "e007587c6904551c28d8590c0bbe871978ed1fc3", - "externalIds": {"ArXiv": "1403.0351", "MAG": "1865693766", "DOI": "10.1007/s10440-014-9903-2", - "CorpusId": 119094472}, "url": "https://www.semanticscholar.org/paper/e007587c6904551c28d8590c0bbe871978ed1fc3", + 42, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2014-11-10", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "e007587c6904551c28d8590c0bbe871978ed1fc3", "externalIds": {"ArXiv": "1403.0351", + "MAG": "1865693766", "DOI": "10.1007/s10440-014-9903-2", "CorpusId": 119094472}, + "corpusId": 119094472, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e007587c6904551c28d8590c0bbe871978ed1fc3", "title": "Turing Instability and Pattern Formation for the Lengyel\u2013Epstein System with Nonlinear Diffusion", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 38, "citationCount": 36, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": + "referenceCount": 38, "citationCount": 42, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1403.0351", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-03-03", "journal": {"name": @@ -1996,7 +2281,8 @@ interactions: "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, {"paperId": "6525b2627f3f304e785dd299c7fa28dbceba52a6", "externalIds": {"ArXiv": "1206.3431", "MAG": "1827134935", "DBLP": "books/cu/p/AvigadB14", "DOI": "10.1017/CBO9781107338579.002", - "CorpusId": 4495614}, "url": "https://www.semanticscholar.org/paper/6525b2627f3f304e785dd299c7fa28dbceba52a6", + "CorpusId": 4495614}, "corpusId": 4495614, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6525b2627f3f304e785dd299c7fa28dbceba52a6", "title": "Computability and analysis: the legacy of Alan Turing", "abstract": "For most of its history, mathematics was algorithmic in nature. The geometric claims in Euclid\u2019s Elements fall into two distinct categories: \u201cproblems,\u201d @@ -2018,8 +2304,9 @@ interactions: de Fermat in 1654 and developed further by Christian Huygens and Jakob Bernoulli, provided methods for calculating odds related to games of chance. Abraham de Moivre\u2019s 1718 monograph on the subject was", "venue": "Turing''s Legacy", - "year": 2012, "referenceCount": 258, "citationCount": 75, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "year": 2012, "referenceCount": 258, "citationCount": 76, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1206.3431", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -2027,21 +2314,30 @@ interactions: "name": "J. Avigad"}, {"authorId": "1805099", "name": "V. Brattka"}]}, {"paperId": "4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", "externalIds": {"PubMedCentral": "3882759", "MAG": "2950247578", "ArXiv": "1310.6738", "DOI": "10.1038/srep03585", - "CorpusId": 11517888, "PubMed": "24394959"}, "url": "https://www.semanticscholar.org/paper/4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", + "CorpusId": 11517888, "PubMed": "24394959"}, "corpusId": 11517888, "publicationVenue": + {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", "name": "Scientific Reports", + "type": "journal", "alternate_names": ["Sci Rep"], "issn": "2045-2322", "url": + "http://www.nature.com/srep/", "alternate_urls": ["http://www.nature.com/srep/index.html"]}, + "url": "https://www.semanticscholar.org/paper/4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", "title": "Dispersal-induced destabilization of metapopulations and oscillatory Turing patterns in ecological networks", "abstract": null, "venue": "Scientific Reports", "year": 2013, "referenceCount": 59, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science", - "Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-10-24", "journal": {"name": "Scientific - Reports", "volume": "4"}, "authors": [{"authorId": "6061448", "name": "S. - Hata"}, {"authorId": "3259202", "name": "H. Nakao"}, {"authorId": "2490613", - "name": "A. Mikhailov"}]}, {"paperId": "1518e7c855f47ed9fefde59dd8104c8bc3f10604", - "externalIds": {"ArXiv": "1305.6262", "MAG": "2020305723", "DOI": "10.1088/1478-3975/10/4/046003", - "CorpusId": 3130652, "PubMed": "23770927"}, "url": "https://www.semanticscholar.org/paper/1518e7c855f47ed9fefde59dd8104c8bc3f10604", + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03585.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Physics", "Computer Science", "Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-10-24", "journal": {"name": "Scientific Reports", + "volume": "4"}, "authors": [{"authorId": "6061448", "name": "S. Hata"}, {"authorId": + "3259202", "name": "H. Nakao"}, {"authorId": "2490613", "name": "A. Mikhailov"}]}, + {"paperId": "1518e7c855f47ed9fefde59dd8104c8bc3f10604", "externalIds": {"ArXiv": + "1305.6262", "MAG": "2020305723", "DOI": "10.1088/1478-3975/10/4/046003", + "CorpusId": 3130652, "PubMed": "23770927"}, "corpusId": 3130652, "publicationVenue": + {"id": "dbc23552-b067-4548-b1b7-e6ce9f0ebcbe", "name": "Physical Biology", + "type": "journal", "alternate_names": ["Phys Biology"], "issn": "1478-3967", + "url": "http://iopscience.iop.org/1478-3975/", "alternate_urls": ["https://iopscience.iop.org/journal/1478-3975", + "http://iopscience.org/pb"]}, "url": "https://www.semanticscholar.org/paper/1518e7c855f47ed9fefde59dd8104c8bc3f10604", "title": "Kidney branching morphogenesis under the control of a ligand\u2013receptor-based Turing mechanism", "abstract": "The main signalling proteins that control early kidney branching have been defined. Yet the underlying mechanism is @@ -2062,36 +2358,43 @@ interactions: are met also by other receptor\u2013ligand systems. We propose that ligand\u2013receptor-based Turing patterns represent a general mechanism to control branching morphogenesis and other developmental processes.", "venue": "Physical Biology", "year": - 2013, "referenceCount": 81, "citationCount": 59, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], - "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 2013, "referenceCount": 81, "citationCount": 60, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1305.6262", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-05-27", "journal": {"name": "Physical Biology", "volume": "10"}, "authors": [{"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", "name": "D. Iber"}]}, {"paperId": "647746026ab21765a506f406072bd7359211cd24", "externalIds": {"MAG": "2045982128", "DBLP": "conf/lics/BojanczykKLT13", "DOI": - "10.1109/LICS.2013.24", "CorpusId": 2163160}, "url": "https://www.semanticscholar.org/paper/647746026ab21765a506f406072bd7359211cd24", + "10.1109/LICS.2013.24", "CorpusId": 2163160}, "corpusId": 2163160, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/647746026ab21765a506f406072bd7359211cd24", "title": "Turing Machines with Atoms", "abstract": "We study Turing machines over sets with atoms, also known as nominal sets. Our main result is that deterministic machines are weaker than nondeterministic ones; in particular, P\u2260NP in sets with atoms. Our main construction is closely related to the Cai-Furer-Immerman graphs used in descriptive complexity theory.", "venue": "2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science", "year": - 2013, "referenceCount": 15, "citationCount": 52, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-06-25", "journal": {"name": "2013 28th Annual ACM/IEEE - Symposium on Logic in Computer Science", "pages": "183-192"}, "authors": [{"authorId": - "1706643", "name": "M. Bojanczyk"}, {"authorId": "35244823", "name": "Bartek - Klin"}, {"authorId": "2447489", "name": "S. Lasota"}, {"authorId": "2964062", - "name": "Szymon Toru\u0144czyk"}]}, {"paperId": "417cd61563f870cb19541f4afc639a85ec1c6628", - "externalIds": {"MAG": "2337525307", "ArXiv": "1209.2772", "DOI": "10.1007/s11538-013-9834-5", - "CorpusId": 16968855, "PubMed": "23546926"}, "url": "https://www.semanticscholar.org/paper/417cd61563f870cb19541f4afc639a85ec1c6628", + 2013, "referenceCount": 15, "citationCount": 53, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-06-25", "journal": + {"name": "2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science", + "pages": "183-192"}, "authors": [{"authorId": "1706643", "name": "M. Bojanczyk"}, + {"authorId": "35244823", "name": "Bartek Klin"}, {"authorId": "2447489", "name": + "S. Lasota"}, {"authorId": "2964062", "name": "Szymon Toru\u0144czyk"}]}, + {"paperId": "417cd61563f870cb19541f4afc639a85ec1c6628", "externalIds": {"MAG": + "2337525307", "ArXiv": "1209.2772", "DOI": "10.1007/s11538-013-9834-5", "CorpusId": + 16968855, "PubMed": "23546926"}, "corpusId": 16968855, "publicationVenue": + {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/417cd61563f870cb19541f4afc639a85ec1c6628", "title": "Turing Patterns from Dynamics of Early HIV Infection", "abstract": null, "venue": "Bulletin of Mathematical Biology", "year": 2012, "referenceCount": - 41, "citationCount": 53, "influentialCitationCount": 4, "isOpenAccess": true, + 41, "citationCount": 55, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1209.2772", "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -2101,7 +2404,7 @@ interactions: {"authorId": "47465046", "name": "J. M. Murray"}, {"authorId": "39683695", "name": "B. Henry"}]}, {"paperId": "d1f47aad6d196823abebc2b5d5a85b6dcada3707", "externalIds": {"MAG": "609368779", "DOI": "10.5860/choice.51-2125", "CorpusId": - 44009886}, "url": "https://www.semanticscholar.org/paper/d1f47aad6d196823abebc2b5d5a85b6dcada3707", + 44009886}, "corpusId": 44009886, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d1f47aad6d196823abebc2b5d5a85b6dcada3707", "title": "Alan Turing: His Work and Impact", "abstract": "\"The fact remains that everyone who taps at a keyboard, opening a spreadsheet or a word-processing program, is working on an incarnation of a Turing machine.\"-TIME In this @@ -2122,14 +2425,19 @@ interactions: most significant papers by A.M. Turing.Commentary explaining the significance of each seminal paper by preeminent leaders in the field. Additional resources available online.", "venue": "", "year": 2013, "referenceCount": 0, "citationCount": - 51, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-05-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, - {"authorId": "143817739", "name": "J. V. Leeuwen"}]}, {"paperId": "3bd7858df71adb919d1d4b137cf1c78134d7f33e", - "externalIds": {"DBLP": "journals/aicom/Muggleton14", "MAG": "1589462974", - "DOI": "10.3233/AIC-130579", "CorpusId": 14046484}, "url": "https://www.semanticscholar.org/paper/3bd7858df71adb919d1d4b137cf1c78134d7f33e", + 52, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-05-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "98630872", + "name": "S. Cooper"}, {"authorId": "143817739", "name": "J. V. Leeuwen"}]}, + {"paperId": "3bd7858df71adb919d1d4b137cf1c78134d7f33e", "externalIds": {"DBLP": + "journals/aicom/Muggleton14", "MAG": "1589462974", "DOI": "10.3233/AIC-130579", + "CorpusId": 14046484}, "corpusId": 14046484, "publicationVenue": {"id": "4c57b6f2-ebab-420d-baf9-cd595e2f2a63", + "name": "AI Communications", "type": "journal", "alternate_names": ["Ai Communications", + "AI Commun", "Ai Commun"], "issn": "0921-7126", "url": "http://content.iospress.com/journals/ai-communications", + "alternate_urls": ["https://www.iospress.nl/html/09217126.php", "https://www.iospress.nl/journal/ai-communications/"]}, + "url": "https://www.semanticscholar.org/paper/3bd7858df71adb919d1d4b137cf1c78134d7f33e", "title": "Alan Turing and the development of Artificial Intelligence", "abstract": "During the centennial year of his birth Alan Turing 1912--1954 has been widely celebrated as having laid the foundations for Computer Science, Automated @@ -2150,46 +2458,15 @@ interactions: within AI, and conclude with a discussion of some of the unresolved challenges he posed within the paper.", "venue": "AI Communications", "year": 2014, "referenceCount": 72, "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "AI Commun.", "pages": "3-10", "volume": "27"}, - "authors": [{"authorId": "145147566", "name": "S. Muggleton"}]}, {"paperId": - "6089b4474ed94a06aba42974fade7009bc77ee4e", "externalIds": {"MAG": "2159039200", - "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", "CorpusId": 18322775}, - "url": "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", - "title": "On Turing dynamical systems and the Atiyah problem", "abstract": - null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", - "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz - Grabowski"}]}, {"paperId": "7d4518f7ba6528967244114a5daaed2884b9b86c", "externalIds": - {"DBLP": "phd/ethos/Rendell14", "MAG": "89603295", "DOI": "10.1007/978-3-319-19842-2", - "CorpusId": 33250805}, "url": "https://www.semanticscholar.org/paper/7d4518f7ba6528967244114a5daaed2884b9b86c", - "title": "Turing machine universality of the game of life", "abstract": null, - "venue": "", "year": 2015, "referenceCount": 29, "citationCount": 31, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-07-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "4692459f05bd9ad5cd672327f23884ad46237fc2", - "externalIds": {"MAG": "50191166", "DBLP": "conf/itp/XuZU13", "DOI": "10.1007/978-3-642-39634-2_13", - "CorpusId": 18610926}, "url": "https://www.semanticscholar.org/paper/4692459f05bd9ad5cd672327f23884ad46237fc2", - "title": "Mechanising Turing Machines and Computability Theory in Isabelle/HOL", - "abstract": null, "venue": "International Conference on Interactive Theorem - Proving", "year": 2013, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "openAccessPdf": {"url": "http://www.doc.ic.ac.uk/~shm/Papers/TuringAI_1.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-07-22", "journal": {"pages": "147-162"}, "authors": - [{"authorId": "2110979820", "name": "Jian Xu"}, {"authorId": "2153647569", - "name": "Xingyuan Zhang"}, {"authorId": "144231186", "name": "Christian Urban"}]}, + "publicationDate": null, "journal": {"name": "AI Commun.", "pages": "3-10", + "volume": "27"}, "authors": [{"authorId": "145147566", "name": "S. Muggleton"}]}, {"paperId": "d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "externalIds": {"MAG": "2016568588", "DOI": "10.1103/PHYSREVE.90.062915", "CorpusId": 42727592, "PubMed": - "25615172"}, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", + "25615172"}, "corpusId": 42727592, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "title": "Turing pattern dynamics in an activator-inhibitor system with superdiffusion.", "abstract": "The fractional operator is introduced to an activator-inhibitor system to describe species anomalous superdiffusion. The effects of the superdiffusive @@ -2209,17 +2486,71 @@ interactions: exponent between the inhibitor and activator is more likely to promote the emergence of the Turing pattern, relative to the normal diffusion.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2014, "referenceCount": 47, "citationCount": 31, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + 2014, "referenceCount": 47, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-12-19", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 062915\n ", "volume": + "90 6"}, "authors": [{"authorId": "2037744526", "name": "Lai Zhang"}, {"authorId": + "1990780", "name": "Canrong Tian"}]}, {"paperId": "7d4518f7ba6528967244114a5daaed2884b9b86c", + "externalIds": {"DBLP": "phd/ethos/Rendell14", "MAG": "89603295", "DOI": "10.1007/978-3-319-19842-2", + "CorpusId": 33250805}, "corpusId": 33250805, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7d4518f7ba6528967244114a5daaed2884b9b86c", + "title": "Turing machine universality of the game of life", "abstract": null, + "venue": "", "year": 2015, "referenceCount": 29, "citationCount": 31, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://uwe-repository.worktribe.com/preview/822581/thesis.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-07-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "6089b4474ed94a06aba42974fade7009bc77ee4e", + "externalIds": {"MAG": "2159039200", "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", + "CorpusId": 18322775}, "corpusId": 18322775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", + "title": "On Turing dynamical systems and the Atiyah problem", "abstract": + null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, + "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1004.2030", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", + "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz + Grabowski"}]}, {"paperId": "4692459f05bd9ad5cd672327f23884ad46237fc2", "externalIds": + {"MAG": "50191166", "DBLP": "conf/itp/XuZU13", "DOI": "10.1007/978-3-642-39634-2_13", + "CorpusId": 18610926}, "corpusId": 18610926, "publicationVenue": {"id": "1b356608-ca93-40d2-8553-8925a463dab9", + "name": "International Conference on Interactive Theorem Proving", "type": + "conference", "alternate_names": ["Interactive Theorem Proving", "Interact + Theorem Proving", "Int Conf Interact Theorem Proving", "ITP"], "url": "https://en.wikipedia.org/wiki/Interactive_Theorem_Proving_(conference)"}, + "url": "https://www.semanticscholar.org/paper/4692459f05bd9ad5cd672327f23884ad46237fc2", + "title": "Mechanising Turing Machines and Computability Theory in Isabelle/HOL", + "abstract": null, "venue": "International Conference on Interactive Theorem + Proving", "year": 2013, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-07-22", "journal": + {"pages": "147-162"}, "authors": [{"authorId": "2110979820", "name": "Jian + Xu"}, {"authorId": "2153647569", "name": "Xingyuan Zhang"}, {"authorId": "144231186", + "name": "Christian Urban"}]}, {"paperId": "6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "externalIds": {"MAG": "2039471684", "DOI": "10.1140/EPJB/E2013-30649-7", + "CorpusId": 121119740}, "corpusId": 121119740, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "title": "Turing instabilities in reaction-diffusion systems with cross diffusion", + "abstract": null, "venue": "", "year": 2013, "referenceCount": 27, "citationCount": + 37, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-12-19", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 062915\n ", "volume": "90 6"}, "authors": [{"authorId": - "2037744526", "name": "Lai Zhang"}, {"authorId": "1990780", "name": "Canrong - Tian"}]}, {"paperId": "f4aaf0a780cd02138aade2a51f99989cc2c962fd", "externalIds": - {"MAG": "2006131432", "ArXiv": "1406.6401", "DOI": "10.1103/PhysRevE.90.042814", - "CorpusId": 9743163, "PubMed": "25375556"}, "url": "https://www.semanticscholar.org/paper/f4aaf0a780cd02138aade2a51f99989cc2c962fd", + "publicationTypes": null, "publicationDate": "2013-04-10", "journal": {"name": + "The European Physical Journal B", "pages": "1-8", "volume": "86"}, "authors": + [{"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "46848249", "name": + "C. Cianci"}, {"authorId": "39866244", "name": "F. Patti"}]}, {"paperId": + "f4aaf0a780cd02138aade2a51f99989cc2c962fd", "externalIds": {"MAG": "2006131432", + "ArXiv": "1406.6401", "DOI": "10.1103/PhysRevE.90.042814", "CorpusId": 9743163, + "PubMed": "25375556"}, "corpusId": 9743163, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f4aaf0a780cd02138aade2a51f99989cc2c962fd", "title": "Turing patterns in multiplex networks.", "abstract": "The theory of patterns formation for a reaction-diffusion system defined on a multiplex is developed by means of a perturbative approach. The interlayer diffusion @@ -2231,7 +2562,8 @@ interactions: away due to cross-talking between layers. Analytical results are compared to direct simulations.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": 32, "citationCount": - 59, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": + 61, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1406.6401", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], @@ -2241,9 +2573,34 @@ interactions: "5903846", "name": "M. Asllani"}, {"authorId": "48664134", "name": "D. M. Busiello"}, {"authorId": "1809355", "name": "T. Carletti"}, {"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "4546397", "name": "Gwendoline Planchon"}]}, - {"paperId": "295572e7977c0fa5dfc388c77a921e6bb9d87c28", "externalIds": {"MAG": - "2032685465", "DOI": "10.1002/adma.201103053", "CorpusId": 11416263, "PubMed": - "22329003"}, "url": "https://www.semanticscholar.org/paper/295572e7977c0fa5dfc388c77a921e6bb9d87c28", + {"paperId": "a68eacfad1978b0c53c113b1884c440193cb8e18", "externalIds": {"DBLP": + "journals/itpro/Strawn14", "DOI": "10.1109/MITP.2014.2", "CorpusId": 24377977}, + "corpusId": 24377977, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a68eacfad1978b0c53c113b1884c440193cb8e18", + "title": "Alan Turing", "abstract": "In this first installment of IT Professional''s + new Mastermind department, which will profile innovators, inventors, and key + people in the fields of IT, computer science, and information systems, George + Strawn reflects on the father of computer science, Alan Turing. He focuses + on Turing''s early theoretical work, noting how unusual it is for a major + theoretical result to precede any practice in a field. Turing devised a simple + process for creating theoretical machines that could implement such procedures, + and he conjectured that these machines could compute anything that was computable + (in other words, they defined computability).", "venue": "IT Professional", + "year": 2018, "referenceCount": 6, "citationCount": 26, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-23", "journal": + {"name": "IT Professional", "pages": "5-7", "volume": "16"}, "authors": [{"authorId": + "2013713", "name": "George O. Strawn"}]}, {"paperId": "295572e7977c0fa5dfc388c77a921e6bb9d87c28", + "externalIds": {"MAG": "2032685465", "DOI": "10.1002/adma.201103053", "CorpusId": + 11416263, "PubMed": "22329003"}, "corpusId": 11416263, "publicationVenue": + {"id": "71697426-616f-45b4-b9d8-d647335a32e6", "name": "Advances in Materials", + "type": "journal", "alternate_names": ["Adv Mater", "Advanced Materials"], + "issn": "2327-2503", "alternate_issns": ["0935-9648"], "url": "http://www.sciencepublishinggroup.com/journal/archive.aspx?amp;issueid=-1&journalid=129", + "alternate_urls": ["http://www.advmat.de/", "https://onlinelibrary.wiley.com/journal/15214095", + "http://www.sciencepublishinggroup.com/journal/archive.aspx?issueid=-1&journalid=129", + "http://www.wiley-vch.de/publish/en/journals/alphabeticIndex/2089/"]}, "url": + "https://www.semanticscholar.org/paper/295572e7977c0fa5dfc388c77a921e6bb9d87c28", "title": "Emergent Criticality in Complex Turing B\u2010Type Atomic Switch Networks", "abstract": "Recent advances in the neuromorphic operation of atomic switches as individual synapse\u2010like devices demonstrate the ability to @@ -2264,35 +2621,19 @@ interactions: networks as an implementable hardware\u2010based platform toward the creation of physically intelligent machines.", "venue": "Advances in Materials", "year": 2012, "referenceCount": 69, "citationCount": 131, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Materials Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-01-10", "journal": {"name": "Advanced Materials", "volume": "24"}, "authors": - [{"authorId": "6408870", "name": "A. Stieg"}, {"authorId": "3469690", "name": - "Audrius V. Avizienis"}, {"authorId": "5991538", "name": "H. O. Sillin"}, - {"authorId": "1402392982", "name": "C. Martin-Olmos"}, {"authorId": "38567152", - "name": "M. Aono"}, {"authorId": "1902938", "name": "J. Gimzewski"}]}, {"paperId": - "a68eacfad1978b0c53c113b1884c440193cb8e18", "externalIds": {"DBLP": "journals/itpro/Strawn14", - "DOI": "10.1109/MITP.2014.2", "CorpusId": 24377977}, "url": "https://www.semanticscholar.org/paper/a68eacfad1978b0c53c113b1884c440193cb8e18", - "title": "Alan Turing", "abstract": "In this first installment of IT Professional''s - new Mastermind department, which will profile innovators, inventors, and key - people in the fields of IT, computer science, and information systems, George - Strawn reflects on the father of computer science, Alan Turing. He focuses - on Turing''s early theoretical work, noting how unusual it is for a major - theoretical result to precede any practice in a field. Turing devised a simple - process for creating theoretical machines that could implement such procedures, - and he conjectured that these machines could compute anything that was computable - (in other words, they defined computability).", "venue": "IT Professional", - "year": 2018, "referenceCount": 6, "citationCount": 25, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-06-23", "journal": {"name": "IT Professional", "pages": - "5-7", "volume": "16"}, "authors": [{"authorId": "2013713", "name": "George - O. Strawn"}]}, {"paperId": "85b093fad42e510598da9a6bb8e81375016ce98c", "externalIds": - {"MAG": "2095518058", "ArXiv": "1407.7114", "DOI": "10.1103/PhysRevE.90.022716", - "CorpusId": 18341472, "PubMed": "25215767"}, "url": "https://www.semanticscholar.org/paper/85b093fad42e510598da9a6bb8e81375016ce98c", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Materials Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-01-10", "journal": {"name": "Advanced Materials", + "volume": "24"}, "authors": [{"authorId": "6408870", "name": "A. Stieg"}, + {"authorId": "3469690", "name": "Audrius V. Avizienis"}, {"authorId": "5991538", + "name": "H. O. Sillin"}, {"authorId": "1402392982", "name": "C. Martin-Olmos"}, + {"authorId": "38567152", "name": "M. Aono"}, {"authorId": "1902938", "name": + "J. Gimzewski"}]}, {"paperId": "85b093fad42e510598da9a6bb8e81375016ce98c", + "externalIds": {"MAG": "2095518058", "ArXiv": "1407.7114", "DOI": "10.1103/PhysRevE.90.022716", + "CorpusId": 18341472, "PubMed": "25215767"}, "corpusId": 18341472, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/85b093fad42e510598da9a6bb8e81375016ce98c", "title": "Feedback, receptor clustering, and receptor restriction to single cells yield large Turing spaces for ligand-receptor-based Turing models.", "abstract": "Turing mechanisms can yield a large variety of patterns from @@ -2316,7 +2657,8 @@ interactions: mechanisms present a general mechanism for patterning in biology.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": 94, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://real.mtak.hu/14410/1/XQ10067E.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer @@ -2325,34 +2667,7 @@ interactions: Statistical, nonlinear, and soft matter physics", "pages": "\n 022716\n ", "volume": "90 2"}, "authors": [{"authorId": "2094723809", "name": "Tam\u00e1s Kurics"}, {"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", - "name": "D. Iber"}]}, {"paperId": "3a0bc3500260b9a5c19a09a0a2b5349c41383145", - "externalIds": {"MAG": "2119455906", "DOI": "10.1098/rsfs.2011.0097", "CorpusId": - 10041916, "PubMed": "23919125"}, "url": "https://www.semanticscholar.org/paper/3a0bc3500260b9a5c19a09a0a2b5349c41383145", - "title": "Turing''s theory of morphogenesis of 1952 and the subsequent discovery - of the crucial role of local self-enhancement and long-range inhibition", - "abstract": "In his pioneering work, Alan Turing showed that de novo pattern - formation is possible if two substances interact that differ in their diffusion - range. Since then, we have shown that pattern formation is possible if, and - only if, a self-enhancing reaction is coupled with an antagonistic process - of longer range. Knowing this crucial condition has enabled us to include - nonlinear interactions, which are required to design molecularly realistic - interactions. Different reaction schemes and their relation to Turing''s proposal - are discussed and compared with more recent observations on the molecular\u2013genetic - level. The antagonistic reaction may be accomplished by an inhibitor that - is produced in the activated region or by a depletion of a component that - is used up during the self-enhancing reaction. The autocatalysis may be realized - by an inhibition of an inhibition. Activating molecules can be processed into - molecules that have an inhibiting function; patterning of the Wnt pathway - is proposed to depend on such a mechanism. Three-component systems, as discussed - in Turing''s paper, are shown to play a major role in the generation of highly - dynamic patterns that never reach a stable state.", "venue": "Interface Focus", - "year": 2012, "referenceCount": 52, "citationCount": 109, "influentialCitationCount": - 9, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-08-06", "journal": {"name": "Interface Focus", "pages": "407 - 416", - "volume": "2"}, "authors": [{"authorId": "145191224", "name": "H. Meinhardt"}]}]} + "name": "D. Iber"}]}]} ' headers: @@ -2361,31 +2676,31 @@ interactions: Connection: - keep-alive Content-Length: - - '189773' + - '216427' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:02:23 GMT + - Tue, 03 Jan 2023 20:52:41 GMT Via: - - 1.1 75e7f56ac0cd014270ac3a4272f3830e.cloudfront.net (CloudFront) + - 1.1 7fcd30c75fe4480ba8986b43467bfd06.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - ixYINLV0rZ_sdJE4DmtAP9xjdOfgHZ3RsCi8DCXYDSCj0AW-erFnHg== + - EG-F0I0_DulUmQY9aVO2WgW_upFS4iYS0jwOv6rqeTGzzfSnwriDzA== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - denEbEhNPHcFcvQ= + - eLxP4GbPvHcFVbA= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '189773' + - '216427' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:02:23 GMT + - Tue, 03 Jan 2023 20:52:41 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - d5a01407-8be8-475b-9812-eebadb6ca210 + - 6f246edf-7945-41b8-bd6e-d02540703505 status: code: 200 message: OK diff --git a/tests/data/test_search_paper_next_page.yaml b/tests/data/test_search_paper_next_page.yaml index fa8a25a..1e83f99 100644 --- a/tests/data/test_search_paper_next_page.yaml +++ b/tests/data/test_search_paper_next_page.yaml @@ -11,12 +11,12 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=0&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=0&limit=100 response: body: - string: '{"total": 133388, "offset": 0, "next": 100, "data": [{"paperId": "6b0f06617d9f5256a80ed62d9398acb92a55a6bd", + string: '{"total": 133751, "offset": 0, "next": 100, "data": [{"paperId": "6b0f06617d9f5256a80ed62d9398acb92a55a6bd", "externalIds": {"MAG": "136785111", "DOI": "10.1098/rspa.1985.0070", "CorpusId": - 1438116}, "url": "https://www.semanticscholar.org/paper/6b0f06617d9f5256a80ed62d9398acb92a55a6bd", + 1438116}, "corpusId": 1438116, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b0f06617d9f5256a80ed62d9398acb92a55a6bd", "title": "Quantum theory, the Church\u2013Turing principle and the universal quantum computer", "abstract": "It is argued that underlying the Church\u2013Turing hypothesis there is an implicit physical assertion. Here, this assertion is @@ -41,16 +41,17 @@ interactions: or \u2018knowledge\u2019 in a physical system than does classical complexity theory.", "venue": "Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences", "year": 1985, "referenceCount": 19, "citationCount": - 4048, "influentialCitationCount": 210, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1985-07-08", "journal": {"name": "Proceedings of the Royal Society of London. - A. Mathematical and Physical Sciences", "pages": "117 - 97", "volume": "400"}, - "authors": [{"authorId": "145346874", "name": "D. Deutsch"}]}, {"paperId": - "c3823aacea60bc1f2cabb9283144690a3d015db5", "externalIds": {"ArXiv": "1410.5401", - "DBLP": "journals/corr/GravesWD14", "MAG": "2950527759", "CorpusId": 15299054}, - "url": "https://www.semanticscholar.org/paper/c3823aacea60bc1f2cabb9283144690a3d015db5", + 4119, "influentialCitationCount": 215, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1985-07-08", "journal": {"name": "Proceedings of + the Royal Society of London. A. Mathematical and Physical Sciences", "pages": + "117 - 97", "volume": "400"}, "authors": [{"authorId": "145346874", "name": + "D. Deutsch"}]}, {"paperId": "c3823aacea60bc1f2cabb9283144690a3d015db5", "externalIds": + {"ArXiv": "1410.5401", "DBLP": "journals/corr/GravesWD14", "MAG": "2950527759", + "CorpusId": 15299054}, "corpusId": 15299054, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c3823aacea60bc1f2cabb9283144690a3d015db5", "title": "Neural Turing Machines", "abstract": "We extend the capabilities of neural networks by coupling them to external memory resources, which they can interact with by attentional processes. The combined system is analogous @@ -58,16 +59,17 @@ interactions: allowing it to be efficiently trained with gradient descent. Preliminary results demonstrate that Neural Turing Machines can infer simple algorithms such as copying, sorting, and associative recall from input and output examples.", - "venue": "ArXiv", "year": 2014, "referenceCount": 44, "citationCount": 1764, - "influentialCitationCount": 222, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-10-20", "journal": - {"name": "ArXiv", "volume": "abs/1410.5401"}, "authors": [{"authorId": "1753223", - "name": "A. Graves"}, {"authorId": "89504302", "name": "Greg Wayne"}, {"authorId": - "1841008", "name": "Ivo Danihelka"}]}, {"paperId": "7cbc2a7843411a1768ab762930707af0a3c33a19", - "externalIds": {"DBLP": "journals/corr/abs-2201-11990", "ArXiv": "2201.11990", - "CorpusId": 246411325}, "url": "https://www.semanticscholar.org/paper/7cbc2a7843411a1768ab762930707af0a3c33a19", + "venue": "ArXiv", "year": 2014, "referenceCount": 44, "citationCount": 1772, + "influentialCitationCount": 222, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-10-20", "journal": {"name": "ArXiv", "volume": "abs/1410.5401"}, "authors": + [{"authorId": "1753223", "name": "A. Graves"}, {"authorId": "89504302", "name": + "Greg Wayne"}, {"authorId": "1841008", "name": "Ivo Danihelka"}]}, {"paperId": + "7cbc2a7843411a1768ab762930707af0a3c33a19", "externalIds": {"DBLP": "journals/corr/abs-2201-11990", + "ArXiv": "2201.11990", "CorpusId": 246411325}, "corpusId": 246411325, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7cbc2a7843411a1768ab762930707af0a3c33a19", "title": "Using DeepSpeed and Megatron to Train Megatron-Turing NLG 530B, A Large-Scale Generative Language Model", "abstract": "Pretrained general-purpose language models can achieve state-of-the-art accuracies in various natural @@ -88,27 +90,32 @@ interactions: NLP benchmarks and establishes new state-of-the-art results. We believe that our contributions will help further the development of large-scale training infrastructures, large-scale language models, and natural language generations.", - "venue": "ArXiv", "year": 2022, "referenceCount": 69, "citationCount": 156, - "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-28", "journal": - {"name": "ArXiv", "volume": "abs/2201.11990"}, "authors": [{"authorId": "2110486618", - "name": "Shaden Smith"}, {"authorId": "66870756", "name": "M. Patwary"}, {"authorId": - "2172095", "name": "Brandon Norick"}, {"authorId": "3081566", "name": "P. - LeGresley"}, {"authorId": "32817044", "name": "Samyam Rajbhandari"}, {"authorId": - "48991386", "name": "J. Casper"}, {"authorId": "49293070", "name": "Zhun Liu"}, - {"authorId": "9358910", "name": "Shrimai Prabhumoye"}, {"authorId": "30647302", - "name": "George Zerveas"}, {"authorId": "3111334", "name": "V. Korthikanti"}, - {"authorId": "2151686157", "name": "Elton Zhang"}, {"authorId": "48422824", - "name": "Rewon Child"}, {"authorId": "3394222", "name": "Reza Yazdani Aminabadi"}, - {"authorId": "2745589", "name": "J. Bernauer"}, {"authorId": "50706785", "name": - "Xia Song"}, {"authorId": "1911755", "name": "M. Shoeybi"}, {"authorId": "2145020341", - "name": "Yuxiong He"}, {"authorId": "122523478", "name": "Michael Houston"}, - {"authorId": "40070335", "name": "Saurabh Tiwary"}, {"authorId": "2301680", - "name": "Bryan Catanzaro"}]}, {"paperId": "9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", - "externalIds": {"MAG": "2803058542", "DOI": "10.1126/science.aar6308", "CorpusId": - 19100947, "PubMed": "29724951"}, "url": "https://www.semanticscholar.org/paper/9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", + "venue": "ArXiv", "year": 2022, "referenceCount": 69, "citationCount": 161, + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-01-28", "journal": {"name": "ArXiv", "volume": "abs/2201.11990"}, "authors": + [{"authorId": "2110486618", "name": "Shaden Smith"}, {"authorId": "66870756", + "name": "M. Patwary"}, {"authorId": "2172095", "name": "Brandon Norick"}, + {"authorId": "3081566", "name": "P. LeGresley"}, {"authorId": "32817044", + "name": "Samyam Rajbhandari"}, {"authorId": "48991386", "name": "J. Casper"}, + {"authorId": "49293070", "name": "Zhun Liu"}, {"authorId": "9358910", "name": + "Shrimai Prabhumoye"}, {"authorId": "30647302", "name": "George Zerveas"}, + {"authorId": "3111334", "name": "V. Korthikanti"}, {"authorId": "2151686157", + "name": "Elton Zhang"}, {"authorId": "48422824", "name": "Rewon Child"}, {"authorId": + "3394222", "name": "Reza Yazdani Aminabadi"}, {"authorId": "2745589", "name": + "J. Bernauer"}, {"authorId": "50706785", "name": "Xia Song"}, {"authorId": + "1911755", "name": "M. Shoeybi"}, {"authorId": "2145020341", "name": "Yuxiong + He"}, {"authorId": "122523478", "name": "Michael Houston"}, {"authorId": "40070335", + "name": "Saurabh Tiwary"}, {"authorId": "2301680", "name": "Bryan Catanzaro"}]}, + {"paperId": "9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", "externalIds": {"MAG": + "2803058542", "DOI": "10.1126/science.aar6308", "CorpusId": 19100947, "PubMed": + "29724951"}, "corpusId": 19100947, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", "title": "Polyamide membranes with nanoscale Turing structures for water purification", "abstract": "Turing structures at the nanoscale Turing structures arise when imbalances in diffusion rates make a stable steady-state system sensitive @@ -130,19 +137,23 @@ interactions: that surpasses the upper-bound line of traditional desalination membranes. Furthermore, we show the existence of high water permeability sites in the Turing structures, where water transport through the membranes is enhanced.", - "venue": "Science", "year": 2018, "referenceCount": 35, "citationCount": 653, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Materials - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-05-04", "journal": {"name": "Science", "pages": "518 - - 521", "volume": "360"}, "authors": [{"authorId": "2343556", "name": "Zhe - Tan"}, {"authorId": "153064608", "name": "Sheng-Gang Chen"}, {"authorId": - "18239828", "name": "Xinsheng Peng"}, {"authorId": "2143835330", "name": "Lin - Zhang"}, {"authorId": "2148805809", "name": "Cong-jie Gao"}]}, {"paperId": - "bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "externalIds": {"ArXiv": "1908.07219", - "MAG": "2999960596", "DOI": "10.1098/rsif.2019.0621", "CorpusId": 201103943, - "PubMed": "31937231"}, "url": "https://www.semanticscholar.org/paper/bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", + "venue": "Science", "year": 2018, "referenceCount": 35, "citationCount": 665, + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-05-04", "journal": + {"name": "Science", "pages": "518 - 521", "volume": "360"}, "authors": [{"authorId": + "2343556", "name": "Zhe Tan"}, {"authorId": "153064608", "name": "Sheng-Gang + Chen"}, {"authorId": "18239828", "name": "Xinsheng Peng"}, {"authorId": "2143835330", + "name": "Lin Zhang"}, {"authorId": "2148805809", "name": "Cong-jie Gao"}]}, + {"paperId": "bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "externalIds": {"ArXiv": + "1908.07219", "MAG": "2999960596", "DOI": "10.1098/rsif.2019.0621", "CorpusId": + 201103943, "PubMed": "31937231"}, "corpusId": 201103943, "publicationVenue": + {"id": "f6537e0e-c3a9-4de5-bd36-19eda0434065", "name": "Journal of the Royal + Society Interface", "type": "journal", "alternate_names": ["J R Soc Interface"], + "issn": "1742-5662", "url": "http://rsif.royalsocietypublishing.org/"}, "url": + "https://www.semanticscholar.org/paper/bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "title": "From one pattern into another: analysis of Turing patterns in heterogeneous domains via WKBJ", "abstract": "Pattern formation from homogeneity is well studied, but less is known concerning symmetry-breaking instabilities in heterogeneous @@ -166,17 +177,23 @@ interactions: original thesis to a far wider and more realistic class of systems.", "venue": "Journal of the Royal Society Interface", "year": 2019, "referenceCount": 135, "citationCount": 38, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-08-20", "journal": {"name": "Journal of the Royal - Society Interface", "volume": "17"}, "authors": [{"authorId": "22256586", - "name": "Andrew L. Krause"}, {"authorId": "2691918", "name": "V. Klika"}, - {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "2662569", "name": - "E. Gaffney"}]}, {"paperId": "339c6e6d46836c173fb6a23b493c724896d4cc70", "externalIds": - {"ArXiv": "1708.07149", "MAG": "2963527228", "DBLP": "journals/corr/abs-1708-07149", - "ACL": "P17-1103", "DOI": "10.18653/v1/P17-1103", "CorpusId": 1880070}, "url": - "https://www.semanticscholar.org/paper/339c6e6d46836c173fb6a23b493c724896d4cc70", + "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsif.2019.0621", + "status": "HYBRID"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-08-20", "journal": {"name": "Journal + of the Royal Society Interface", "volume": "17"}, "authors": [{"authorId": + "22256586", "name": "Andrew L. Krause"}, {"authorId": "2691918", "name": "V. + Klika"}, {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "2662569", + "name": "E. Gaffney"}]}, {"paperId": "339c6e6d46836c173fb6a23b493c724896d4cc70", + "externalIds": {"ArXiv": "1708.07149", "MAG": "2963527228", "DBLP": "journals/corr/abs-1708-07149", + "ACL": "P17-1103", "DOI": "10.18653/v1/P17-1103", "CorpusId": 1880070}, "corpusId": + 1880070, "publicationVenue": {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", + "name": "Annual Meeting of the Association for Computational Linguistics", + "type": "conference", "alternate_names": ["Annu Meet Assoc Comput Linguistics", + "Meeting of the Association for Computational Linguistics", "ACL", "Meet Assoc + Comput Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, + "url": "https://www.semanticscholar.org/paper/339c6e6d46836c173fb6a23b493c724896d4cc70", "title": "Towards an Automatic Turing Test: Learning to Evaluate Dialogue Responses", "abstract": "Automatically evaluating the quality of dialogue responses for unstructured domains is a challenging problem. Unfortunately, @@ -194,7 +211,8 @@ interactions: training, an important step for automatic dialogue evaluation.", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2017, "referenceCount": 57, "citationCount": 302, "influentialCitationCount": - 54, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 54, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.aclweb.org/anthology/P17-1103.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-02-17", "journal": {"name": "ArXiv", @@ -204,20 +222,21 @@ interactions: Angelard-Gontier"}, {"authorId": "1751762", "name": "Yoshua Bengio"}, {"authorId": "145134886", "name": "Joelle Pineau"}]}, {"paperId": "ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", "externalIds": {"MAG": "2808618339", "DOI": "10.17863/CAM.42246", "CorpusId": - 46998004}, "url": "https://www.semanticscholar.org/paper/ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", + 46998004}, "corpusId": 46998004, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", "title": "Turing: A Language for Flexible Probabilistic Inference", "abstract": "HG and ZG acknowledge support from the Alan Turing Institute (EPSRC Grant EP/N510129/1) and EPSRC Grant EP/N014162/1, and donations from Google and Microsoft Research.", "venue": "", "year": 2018, "referenceCount": 21, "citationCount": - 151, "influentialCitationCount": 18, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "1682-1690", "volume": ""}, "authors": [{"authorId": "49365036", - "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, {"authorId": - "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", + 153, "influentialCitationCount": 18, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "1682-1690", "volume": ""}, "authors": [{"authorId": + "49365036", "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, + {"authorId": "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", "externalIds": {"MAG": "2920798074", "ArXiv": "1903.07486", "DBLP": "journals/corr/abs-1903-07486", - "CorpusId": 81981887}, "url": "https://www.semanticscholar.org/paper/01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", + "CorpusId": 81981887}, "corpusId": 81981887, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", "title": "Dissecting the NVidia Turing T4 GPU via Microbenchmarking", "abstract": "In 2019, the rapid rate at which GPU manufacturers refresh their designs, coupled with their reluctance to disclose microarchitectural details, is still @@ -243,16 +262,19 @@ interactions: \nMany of our findings are novel, published here for the first time. All of them can guide high-performance software developers get closer to the GPU''s peak performance.", "venue": "ArXiv", "year": 2019, "referenceCount": 8, "citationCount": - 63, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-03-18", "journal": - {"name": "ArXiv", "volume": "abs/1903.07486"}, "authors": [{"authorId": "48813086", - "name": "Zhe Jia"}, {"authorId": "138304679", "name": "Marco Maggioni"}, {"authorId": - "2109849147", "name": "Jeffrey K. Smith"}, {"authorId": "3277273", "name": - "D. Scarpazza"}]}, {"paperId": "be17d3f111f31d97f8b61499d5aae274043e9f14", + 64, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2019-03-18", "journal": {"name": "ArXiv", "volume": "abs/1903.07486"}, "authors": + [{"authorId": "48813086", "name": "Zhe Jia"}, {"authorId": "138304679", "name": + "Marco Maggioni"}, {"authorId": "2109849147", "name": "Jeffrey K. Smith"}, + {"authorId": "3277273", "name": "D. Scarpazza"}]}, {"paperId": "be17d3f111f31d97f8b61499d5aae274043e9f14", "externalIds": {"DBLP": "journals/corr/abs-1901-03429", "MAG": "2962749806", - "ArXiv": "1901.03429", "CorpusId": 57825721}, "url": "https://www.semanticscholar.org/paper/be17d3f111f31d97f8b61499d5aae274043e9f14", + "ArXiv": "1901.03429", "CorpusId": 57825721}, "corpusId": 57825721, "publicationVenue": + {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", "name": "International Conference + on Learning Representations", "type": "conference", "alternate_names": ["Int + Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, "url": "https://www.semanticscholar.org/paper/be17d3f111f31d97f8b61499d5aae274043e9f14", "title": "On the Turing Completeness of Modern Neural Network Architectures", "abstract": "Alternatives to recurrent neural networks, in particular, architectures based on attention or convolutions, have been gaining momentum for processing @@ -267,30 +289,37 @@ interactions: minimal sets of elements needed to obtain these completeness results.", "venue": "International Conference on Learning Representations", "year": 2019, "referenceCount": 23, "citationCount": 58, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-01-10", "journal": - {"name": "ArXiv", "volume": "abs/1901.03429"}, "authors": [{"authorId": "144022533", - "name": "Jorge P\u00e9rez"}, {"authorId": "66941060", "name": "Javier Marinkovic"}, - {"authorId": "35106192", "name": "P. Barcel\u00f3"}]}, {"paperId": "74e281384ed8340956989bc2a93f8387458a09bf", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-01-10", "journal": {"name": "ArXiv", "volume": "abs/1901.03429"}, + "authors": [{"authorId": "144022533", "name": "Jorge P\u00e9rez"}, {"authorId": + "66941060", "name": "Javier Marinkovic"}, {"authorId": "35106192", "name": + "P. Barcel\u00f3"}]}, {"paperId": "74e281384ed8340956989bc2a93f8387458a09bf", "externalIds": {"PubMedCentral": "6484223", "MAG": "2938327216", "DOI": "10.1038/s41467-018-08212-8", - "CorpusId": 58014273, "PubMed": "30651543"}, "url": "https://www.semanticscholar.org/paper/74e281384ed8340956989bc2a93f8387458a09bf", + "CorpusId": 58014273, "PubMed": "30651543"}, "corpusId": 58014273, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/74e281384ed8340956989bc2a93f8387458a09bf", "title": "Image-based modeling of kidney branching morphogenesis reveals GDNF-RET based Turing-type mechanism and pattern-modulating WNT11 feedback", "abstract": null, "venue": "Nature Communications", "year": 2019, "referenceCount": 85, - "citationCount": 47, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-01-16", "journal": {"name": "Nature Communications", - "volume": "10"}, "authors": [{"authorId": "2261511", "name": "D. Menshykau"}, - {"authorId": "49174222", "name": "Odyss\u00e9 Michos"}, {"authorId": "145185799", - "name": "C. Lang"}, {"authorId": "52261411", "name": "L. Conrad"}, {"authorId": - "2149854", "name": "A. McMahon"}, {"authorId": "2962540", "name": "D. Iber"}]}, - {"paperId": "d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "externalIds": {"MAG": - "2808367373", "DOI": "10.1073/pnas.1720770115", "CorpusId": 48357941, "PubMed": - "29891706"}, "url": "https://www.semanticscholar.org/paper/d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", + "citationCount": 48, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.nature.com/articles/s41467-018-08212-8.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-01-16", "journal": {"name": "Nature + Communications", "volume": "10"}, "authors": [{"authorId": "2261511", "name": + "D. Menshykau"}, {"authorId": "49174222", "name": "Odyss\u00e9 Michos"}, {"authorId": + "145185799", "name": "C. Lang"}, {"authorId": "52261411", "name": "L. Conrad"}, + {"authorId": "2149854", "name": "A. McMahon"}, {"authorId": "2962540", "name": + "D. Iber"}]}, {"paperId": "d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "externalIds": + {"MAG": "2808367373", "DOI": "10.1073/pnas.1720770115", "CorpusId": 48357941, + "PubMed": "29891706"}, "corpusId": 48357941, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "title": "Stochastic Turing patterns in a synthetic bacterial population", "abstract": "Significance In 1952, Alan Turing proposed that biological morphogenesis could arise from a dynamical process in reaction systems with a rapidly diffusing @@ -327,8 +356,9 @@ interactions: patterns. These findings provide the groundwork for a unified picture of biological morphogenesis, arising from a combination of stochastic gene expression and dynamical instabilities.", "venue": "Proceedings of the National Academy of - Sciences", "year": 2018, "referenceCount": 51, "citationCount": 118, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + Sciences", "year": 2018, "referenceCount": 51, "citationCount": 119, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/115/26/6572.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-11", "journal": {"name": "Proceedings @@ -338,7 +368,12 @@ interactions: "4540871", "name": "Nicholas A. DeLateur"}, {"authorId": "3549131", "name": "N. Goldenfeld"}, {"authorId": "144224740", "name": "R. Weiss"}]}, {"paperId": "12c00512e99b88bf01bbd8662324fa3b61a73347", "externalIds": {"MAG": "2947165724", - "DOI": "10.11948/2156-907X.20190015", "CorpusId": 191165780}, "url": "https://www.semanticscholar.org/paper/12c00512e99b88bf01bbd8662324fa3b61a73347", + "DOI": "10.11948/2156-907X.20190015", "CorpusId": 191165780}, "corpusId": + 191165780, "publicationVenue": {"id": "4fd93153-bfee-4b6a-a124-36e8b51b8316", + "name": "The Journal of Applied Analysis and Computation", "type": "journal", + "alternate_names": ["J Appl Anal Comput", "Journal of Applied Analysis and + Computation"], "issn": "2156-907X", "url": "http://jaac-online.com/"}, "url": + "https://www.semanticscholar.org/paper/12c00512e99b88bf01bbd8662324fa3b61a73347", "title": "TURING-HOPF BIFURCATION IN THE REACTION-DIFFUSION SYSTEM WITH DELAY AND APPLICATION TO A DIFFUSIVE PREDATOR-PREY MODEL", "abstract": "The interactions of diffusion-driven Turing instability and delayinduced Hopf bifurcation always @@ -355,21 +390,26 @@ interactions: inhomogeneous periodic solutions, coexistence of two stable spaially inhomogeneous steady states and the transition from one kind of spatiotemporal patterns to another are found.", "venue": "The Journal of Applied Analysis and Computation", - "year": 2019, "referenceCount": 52, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Journal of Applied Analysis & Computation"}, "authors": + "year": 2019, "referenceCount": 52, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Journal of Applied Analysis & Computation"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, {"paperId": "6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", "externalIds": {"MAG": "2906157279", "DBLP": "journals/cacm/CopelandS19", "DOI": "10.1145/3198448", - "CorpusId": 56894392}, "url": "https://www.semanticscholar.org/paper/6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", + "CorpusId": 56894392}, "corpusId": 56894392, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", "title": "The Church-Turing thesis", "abstract": "In its original form, the Church-Turing thesis concerned computation as Alan Turing and Alonzo Church used the term in 1936---human computation.", "venue": "Communications of the ACM", "year": 2007, "referenceCount": 116, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3198448", + "status": "CLOSED"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2007-09-05", "journal": {"name": "Communications of the ACM", "pages": "66 @@ -377,17 +417,25 @@ interactions: Copeland"}, {"authorId": "1742013", "name": "Oron Shagrir"}]}, {"paperId": "6cda6bf951da823ab8673e659bdca13b9928ed47", "externalIds": {"MAG": "2982236015", "DBLP": "conf/hotchips/Burgess19", "DOI": "10.1109/HOTCHIPS.2019.8875651", - "CorpusId": 204822166}, "url": "https://www.semanticscholar.org/paper/6cda6bf951da823ab8673e659bdca13b9928ed47", + "CorpusId": 204822166}, "corpusId": 204822166, "publicationVenue": {"id": + "6bfb6bd4-4726-46b3-9438-3128e06a28a1", "name": "IEEE Hot Chips Symposium", + "type": "conference", "alternate_names": ["HCS", "IEEE Hot Chip Symp"], "url": + "https://en.wikipedia.org/wiki/Hot_Chips"}, "url": "https://www.semanticscholar.org/paper/6cda6bf951da823ab8673e659bdca13b9928ed47", "title": "RTX ON \u2013 The NVIDIA TURING GPU", "abstract": null, "venue": "IEEE Hot Chips Symposium", "year": 2019, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2019-08-01", "journal": {"name": "2019 IEEE Hot Chips 31 Symposium (HCS)", - "pages": "1-27"}, "authors": [{"authorId": "2059912582", "name": "John Burgess"}]}, - {"paperId": "b0e69af8e8f7f2501cb26290e57a8563dba5d178", "externalIds": {"DBLP": - "journals/ijns/WuBPPN18", "MAG": "2792897601", "DOI": "10.1142/S0129065718500132", - "CorpusId": 46888001, "PubMed": "29759014"}, "url": "https://www.semanticscholar.org/paper/b0e69af8e8f7f2501cb26290e57a8563dba5d178", + 43, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-08-01", "journal": {"name": "2019 IEEE Hot Chips + 31 Symposium (HCS)", "pages": "1-27"}, "authors": [{"authorId": "2059912582", + "name": "John Burgess"}]}, {"paperId": "b0e69af8e8f7f2501cb26290e57a8563dba5d178", + "externalIds": {"DBLP": "journals/ijns/WuBPPN18", "MAG": "2792897601", "DOI": + "10.1142/S0129065718500132", "CorpusId": 46888001, "PubMed": "29759014"}, + "corpusId": 46888001, "publicationVenue": {"id": "a042b147-151c-4d51-97c7-40b8434b377a", + "name": "International Journal of Neural Systems", "type": "journal", "alternate_names": + ["Int J Neural Syst"], "issn": "0129-0657", "url": "http://www.worldscinet.com/ijns", + "alternate_urls": ["http://www.worldscinet.com/ijns/ijns.shtml"]}, "url": + "https://www.semanticscholar.org/paper/b0e69af8e8f7f2501cb26290e57a8563dba5d178", "title": "Simplified and Yet Turing Universal Spiking Neural P Systems with Communication on Request", "abstract": "Spiking neural P systems are a class of third generation neural networks belonging to the framework of membrane @@ -405,18 +453,22 @@ interactions: that SNQ P systems functioning as number generating devices with one type of spike and four unbounded neurons are Turing universal.", "venue": "International Journal of Neural Systems", "year": 2018, "referenceCount": 104, "citationCount": - 70, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-08-26", "journal": {"name": "International - journal of neural systems", "pages": "\n 1850013\n ", "volume": - "28 8"}, "authors": [{"authorId": "3361824", "name": "Tingfang Wu"}, {"authorId": - "51940709", "name": "Florin-Daniel B\u00eelb\u00eee"}, {"authorId": "143936370", - "name": "A. Paun"}, {"authorId": "7356533", "name": "L. Pan"}, {"authorId": - "2614610", "name": "Ferrante Neri"}]}, {"paperId": "bef4ae975a0068484cfa62d3b006991d68716c04", + 70, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dora.dmu.ac.uk/bitstream/2086/15523/1/SNQP_one.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-08-26", "journal": + {"name": "International journal of neural systems", "pages": "\n 1850013\n ", + "volume": "28 8"}, "authors": [{"authorId": "3361824", "name": "Tingfang Wu"}, + {"authorId": "51940709", "name": "Florin-Daniel B\u00eelb\u00eee"}, {"authorId": + "143936370", "name": "A. Paun"}, {"authorId": "7356533", "name": "L. Pan"}, + {"authorId": "2614610", "name": "Ferrante Neri"}]}, {"paperId": "bef4ae975a0068484cfa62d3b006991d68716c04", "externalIds": {"MAG": "2404399993", "DOI": "10.1109/JAS.2016.7471613", "CorpusId": - 35991085}, "url": "https://www.semanticscholar.org/paper/bef4ae975a0068484cfa62d3b006991d68716c04", + 35991085}, "corpusId": 35991085, "publicationVenue": {"id": "ef1356d5-69c7-484e-a110-3efae1e93ecc", + "name": "IEEE/CAA Journal of Automatica Sinica", "type": "journal", "alternate_names": + ["IEEE/CAA J Autom Sin"], "issn": "2329-9266", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=6570654", + "alternate_urls": ["http://www.ieee-jas.org/"]}, "url": "https://www.semanticscholar.org/paper/bef4ae975a0068484cfa62d3b006991d68716c04", "title": "Where does AlphaGo go: from church-turing thesis to AlphaGo thesis and beyond", "abstract": "An investigation on the impact and significance of the AlphaGo vs. Lee Sedol Go match is conducted, and concludes with a conjecture @@ -431,20 +483,20 @@ interactions: thesis ensure the technical soundness of the parallel intelligence approach for intelligent control and management of complex systems and knowledge automation.", "venue": "IEEE/CAA Journal of Automatica Sinica", "year": 2016, "referenceCount": - 39, "citationCount": 189, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-05-19", - "journal": {"name": "IEEE/CAA Journal of Automatica Sinica", "pages": "113-120", - "volume": "3"}, "authors": [{"authorId": "2148954297", "name": "Fei-yue Wang"}, - {"authorId": "2155659664", "name": "J. Zhang"}, {"authorId": "2481151", "name": - "Xinhu Zheng"}, {"authorId": "153315870", "name": "Xiao Wang"}, {"authorId": - "144057336", "name": "Yong Yuan"}, {"authorId": "2142311", "name": "Xiaoxiao - Dai"}, {"authorId": "2159191766", "name": "Jie Zhang"}, {"authorId": "2119062499", - "name": "Liuqing Yang"}]}, {"paperId": "050da5d159fb0dd96143948e1cffeb3dec814673", + 39, "citationCount": 192, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-05-19", "journal": {"name": "IEEE/CAA Journal of Automatica Sinica", + "pages": "113-120", "volume": "3"}, "authors": [{"authorId": "2148954297", + "name": "Fei-yue Wang"}, {"authorId": "2155659664", "name": "J. Zhang"}, {"authorId": + "2481151", "name": "Xinhu Zheng"}, {"authorId": "153315870", "name": "Xiao + Wang"}, {"authorId": "144057336", "name": "Yong Yuan"}, {"authorId": "2142311", + "name": "Xiaoxiao Dai"}, {"authorId": "2159191766", "name": "Jie Zhang"}, + {"authorId": "2119062499", "name": "Liuqing Yang"}]}, {"paperId": "050da5d159fb0dd96143948e1cffeb3dec814673", "externalIds": {"DBLP": "journals/pnas/GemanGHY15", "MAG": "1983927101", "DOI": - "10.1073/pnas.1422953112", "CorpusId": 8687210, "PubMed": "25755262"}, "url": - "https://www.semanticscholar.org/paper/050da5d159fb0dd96143948e1cffeb3dec814673", + "10.1073/pnas.1422953112", "CorpusId": 8687210, "PubMed": "25755262"}, "corpusId": + 8687210, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/050da5d159fb0dd96143948e1cffeb3dec814673", "title": "Visual Turing test for computer vision systems", "abstract": "Significance In computer vision, as in other fields of artificial intelligence, the methods of evaluation largely define the scientific effort. Most current evaluations @@ -474,17 +526,22 @@ interactions: through an exploration of its properties, and on to its relationships with other uniquely instantiated objects.", "venue": "Proceedings of the National Academy of Sciences", "year": 2015, "referenceCount": 29, "citationCount": - 260, "influentialCitationCount": 17, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-03-09", "journal": {"name": "Proceedings - of the National Academy of Sciences", "pages": "3618 - 3623", "volume": "112"}, - "authors": [{"authorId": "1707642", "name": "D. Geman"}, {"authorId": "3194361", - "name": "S. Geman"}, {"authorId": "9588317", "name": "Neil Hallonquist"}, - {"authorId": "1721284", "name": "L. Younes"}]}, {"paperId": "c091bf5bc6e02555b222fe4e15b6108583c14510", - "externalIds": {"MAG": "2963527277", "ArXiv": "1708.09645", "DOI": "10.1103/PhysRevX.8.021071", - "CorpusId": 88511276}, "url": "https://www.semanticscholar.org/paper/c091bf5bc6e02555b222fe4e15b6108583c14510", + 260, "influentialCitationCount": 17, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.pnas.org/content/pnas/112/12/3618.full.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-09", "journal": + {"name": "Proceedings of the National Academy of Sciences", "pages": "3618 + - 3623", "volume": "112"}, "authors": [{"authorId": "1707642", "name": "D. + Geman"}, {"authorId": "3194361", "name": "S. Geman"}, {"authorId": "9588317", + "name": "Neil Hallonquist"}, {"authorId": "1721284", "name": "L. Younes"}]}, + {"paperId": "c091bf5bc6e02555b222fe4e15b6108583c14510", "externalIds": {"MAG": + "2963527277", "ArXiv": "1708.09645", "DOI": "10.1103/PhysRevX.8.021071", "CorpusId": + 88511276}, "corpusId": 88511276, "publicationVenue": {"id": "98eedf55-1e67-4c3d-a25d-79861b87ae04", + "name": "Physical Review X", "type": "journal", "alternate_names": ["Phys + Rev X"], "issn": "2160-3308", "url": "https://journals.aps.org/prx/", "alternate_urls": + ["http://journals.aps.org/prx/", "http://prx.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/c091bf5bc6e02555b222fe4e15b6108583c14510", "title": "Key Features of Turing Systems are Determined Purely by Network Topology", "abstract": "Turing''s theory of pattern formation is a universal model for self-organization, applicable to many systems in physics, chemistry @@ -498,46 +555,22 @@ interactions: rates, the robustness of the system, and the phase relations of the molecular species.", "venue": "Physical Review X", "year": 2017, "referenceCount": 72, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2017-08-31", "journal": {"name": "Physical Review - X"}, "authors": [{"authorId": "4791189", "name": "X. Diego"}, {"authorId": - "2650134", "name": "L. Marcon"}, {"authorId": "50420075", "name": "P. Muller"}, - {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", - "externalIds": {"MAG": "2899964516", "PubMedCentral": "6221541", "DOI": "10.1126/sciadv.aau5484", - "CorpusId": 53237955, "PubMed": "30417097"}, "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", - "title": "An ancient Turing-like patterning mechanism regulates skin denticle - development in sharks", "abstract": "Diverse skin appendages, from shark denticles - to bird feathers, develop via a conserved and ancient Turing patterning mechanism. - Vertebrates have a vast array of epithelial appendages, including scales, - feathers, and hair. The developmental patterning of these diverse structures - can be theoretically explained by Alan Turing\u2019s reaction-diffusion system. - However, the role of this system in epithelial appendage patterning of early - diverging lineages (compared to tetrapods), such as the cartilaginous fishes, - is poorly understood. We investigate patterning of the unique tooth-like skin - denticles of sharks, which closely relates to their hydrodynamic and protective - functions. We demonstrate through simulation models that a Turing-like mechanism - can explain shark denticle patterning and verify this system using gene expression - analysis and gene pathway inhibition experiments. This mechanism bears remarkable - similarity to avian feather patterning, suggesting deep homology of the system. - We propose that a diverse range of vertebrate appendages, from shark denticles - to avian feathers and mammalian hair, use this ancient and conserved system, - with slight genetic modulation accounting for broad variations in patterning.", - "venue": "Science Advances", "year": 2018, "referenceCount": 85, "citationCount": - 49, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-11-01", "journal": {"name": "Science Advances", "volume": "4"}, "authors": - [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": "2054529485", - "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": "A. Fletcher"}, - {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": "5588695", "name": - "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, {"paperId": + "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevX.8.021071", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2017-08-31", "journal": {"name": + "Physical Review X"}, "authors": [{"authorId": "4791189", "name": "X. Diego"}, + {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "50420075", "name": + "P. Muller"}, {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "64f47687daaa84ac1fdb1bc2f85c065007163f06", "externalIds": {"ArXiv": "1803.05378", "MAG": "2790922269", "DOI": "10.1103/PhysRevLett.121.108301", "CorpusId": - 206316772, "PubMed": "30240244"}, "url": "https://www.semanticscholar.org/paper/64f47687daaa84ac1fdb1bc2f85c065007163f06", + 206316772, "PubMed": "30240244"}, "corpusId": 206316772, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/64f47687daaa84ac1fdb1bc2f85c065007163f06", "title": "Information Thermodynamics of Turing Patterns.", "abstract": "We set up a rigorous thermodynamic description of reaction-diffusion systems driven out of equilibrium by time-dependent space-distributed chemostats. @@ -550,17 +583,111 @@ interactions: to study analytically the Turing pattern formation in a prototypical reaction-diffusion system, the one-dimensional Brusselator model, and to classify it as a genuine thermodynamic nonequilibrium phase transition.", "venue": "Physical Review - Letters", "year": 2018, "referenceCount": 58, "citationCount": 48, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + Letters", "year": 2018, "referenceCount": 58, "citationCount": 50, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1803.05378", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2018-03-14", "journal": {"name": "Physical review letters", "pages": "\n 108301\n ", "volume": "121 10"}, "authors": [{"authorId": "6538014", "name": "G. Falasco"}, {"authorId": "2069605670", "name": "Riccardo Rao"}, {"authorId": "40660219", "name": "M. Esposito"}]}, - {"paperId": "fe1077f6b79e14457db77d7477a477f40f87e7e6", "externalIds": {"DBLP": - "journals/neco/GulcehreCCB18", "MAG": "2751304263", "DOI": "10.1162/neco_a_01060", - "CorpusId": 4029193, "PubMed": "29381440"}, "url": "https://www.semanticscholar.org/paper/fe1077f6b79e14457db77d7477a477f40f87e7e6", + {"paperId": "ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", "externalIds": {"MAG": + "2899964516", "PubMedCentral": "6221541", "DOI": "10.1126/sciadv.aau5484", + "CorpusId": 53237955, "PubMed": "30417097"}, "corpusId": 53237955, "publicationVenue": + {"id": "cb30f0c9-2980-4b7d-bbcb-68fc5472b97c", "name": "Science Advances", + "type": "journal", "alternate_names": ["Sci Adv"], "issn": "2375-2548", "url": + "http://www.scienceadvances.org/", "alternate_urls": ["https://advances.sciencemag.org/"]}, + "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", + "title": "An ancient Turing-like patterning mechanism regulates skin denticle + development in sharks", "abstract": "Diverse skin appendages, from shark denticles + to bird feathers, develop via a conserved and ancient Turing patterning mechanism. + Vertebrates have a vast array of epithelial appendages, including scales, + feathers, and hair. The developmental patterning of these diverse structures + can be theoretically explained by Alan Turing\u2019s reaction-diffusion system. + However, the role of this system in epithelial appendage patterning of early + diverging lineages (compared to tetrapods), such as the cartilaginous fishes, + is poorly understood. We investigate patterning of the unique tooth-like skin + denticles of sharks, which closely relates to their hydrodynamic and protective + functions. We demonstrate through simulation models that a Turing-like mechanism + can explain shark denticle patterning and verify this system using gene expression + analysis and gene pathway inhibition experiments. This mechanism bears remarkable + similarity to avian feather patterning, suggesting deep homology of the system. + We propose that a diverse range of vertebrate appendages, from shark denticles + to avian feathers and mammalian hair, use this ancient and conserved system, + with slight genetic modulation accounting for broad variations in patterning.", + "venue": "Science Advances", "year": 2018, "referenceCount": 85, "citationCount": + 49, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-11-01", "journal": {"name": "Science Advances", "volume": + "4"}, "authors": [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": + "2054529485", "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": + "A. Fletcher"}, {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": + "5588695", "name": "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, + {"paperId": "97b47dc9bc0da49f83a7ef2e9d2ac461c222dd73", "externalIds": {"PubMedCentral": + "6047832", "DBLP": "journals/ploscb/BrinkmannMRM18", "MAG": "2810023719", + "DOI": "10.1371/journal.pcbi.1006259", "CorpusId": 49670859, "PubMed": "29969460"}, + "corpusId": 49670859, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/97b47dc9bc0da49f83a7ef2e9d2ac461c222dd73", + "title": "Post-Turing tissue pattern formation: Advent of mechanochemistry", + "abstract": "Chemical and mechanical pattern formation is fundamental during + embryogenesis and tissue development. Yet, the underlying molecular and cellular + mechanisms are still elusive in many cases. Most current theories assume that + tissue development is driven by chemical processes: either as a sequence of + chemical patterns each depending on the previous one, or by patterns spontaneously + arising from specific chemical interactions (such as \u201cTuring-patterns\u201d). + Within both theories, mechanical patterns are usually regarded as passive + by-products of chemical pre-patters. However, several experiments question + these theories, and an increasing number of studies shows that tissue mechanics + can actively influence chemical patterns during development. In this study, + we thus focus on the interplay between chemical and mechanical processes during + tissue development. On one hand, based on recent experimental data, we develop + new mechanochemical simulation models of evolving tissues, in which the full + 3D representation of the tissue appears to be critical for obtaining a realistic + mechanochemical behaviour. The presented modelling approach is flexible and + numerically studied using state of the art finite element methods. Thus, it + may serve as a basis to combine simulations with new experimental methods + in tissue development. On the other hand, we apply the developed approach + and demonstrate that even simple interactions between tissue mechanics and + chemistry spontaneously lead to robust and complex mechanochemical patterns. + Especially, we demonstrate that the main contradictions arising in the framework + of purely chemical theories are naturally and automatically resolved using + the mechanochemical patterning theory.", "venue": "PLoS Comput. Biol.", "year": + 2018, "referenceCount": 102, "citationCount": 41, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.plos.org/ploscompbiol/article/file?id=10.1371/journal.pcbi.1006259&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-07-01", "journal": + {"name": "PLoS Computational Biology", "volume": "14"}, "authors": [{"authorId": + "40663769", "name": "Felix Brinkmann"}, {"authorId": "3262942", "name": "M. + Mercker"}, {"authorId": "144825773", "name": "T. Richter"}, {"authorId": "1389565398", + "name": "A. Marciniak-Czochra"}]}, {"paperId": "1606575fc6f337bde02291a4bf928eb16f58d0e6", + "externalIds": {"DBLP": "journals/corr/abs-1807-08518", "ArXiv": "1807.08518", + "MAG": "2950107633", "DOI": "10.1007/978-3-030-01424-7_10", "CorpusId": 49908746}, + "corpusId": 49908746, "publicationVenue": {"id": "3e64b1c1-745f-4edf-bd92-b8ef122bb49c", + "name": "International Conference on Artificial Neural Networks", "type": + "conference", "alternate_names": ["Int Conf Artif Neural Netw", "ICANN"], + "url": "http://www.e-nns.org/"}, "url": "https://www.semanticscholar.org/paper/1606575fc6f337bde02291a4bf928eb16f58d0e6", + "title": "Implementing Neural Turing Machines", "abstract": null, "venue": + "International Conference on Artificial Neural Networks", "year": 2018, "referenceCount": + 12, "citationCount": 39, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1807.08518", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2018-07-23", + "journal": {"name": "ArXiv", "volume": "abs/1807.08518"}, "authors": [{"authorId": + "153247100", "name": "Mark Collier"}, {"authorId": "1781377", "name": "J. + Beel"}]}, {"paperId": "fe1077f6b79e14457db77d7477a477f40f87e7e6", "externalIds": + {"DBLP": "journals/neco/GulcehreCCB18", "MAG": "2751304263", "DOI": "10.1162/neco_a_01060", + "CorpusId": 4029193, "PubMed": "29381440"}, "corpusId": 4029193, "publicationVenue": + {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", "name": "Neural Computation", + "type": "journal", "alternate_names": ["Neural Comput"], "issn": "0899-7667", + "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", "http://www.mitpressjournals.org/loi/neco", + "https://www.mitpressjournals.org/loi/neco"]}, "url": "https://www.semanticscholar.org/paper/fe1077f6b79e14457db77d7477a477f40f87e7e6", "title": "Dynamic Neural Turing Machine with Continuous and Discrete Addressing Schemes", "abstract": "We extend the neural Turing machine (NTM) model into a dynamic neural Turing machine (D-NTM) by introducing trainable address vectors. @@ -576,29 +703,71 @@ interactions: provide further experimental results on the sequential MNIST, Stanford Natural Language Inference, associative recall, and copy tasks.", "venue": "Neural Computation", "year": 2018, "referenceCount": 53, "citationCount": 38, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-03-20", "journal": {"name": "Neural Computation", "pages": "857-884", - "volume": "30"}, "authors": [{"authorId": "1854385", "name": "\u00c7aglar - G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, {"authorId": - "1979489", "name": "Kyunghyun Cho"}, {"authorId": "1751762", "name": "Yoshua - Bengio"}]}, {"paperId": "1606575fc6f337bde02291a4bf928eb16f58d0e6", "externalIds": - {"DBLP": "journals/corr/abs-1807-08518", "ArXiv": "1807.08518", "MAG": "2950107633", - "DOI": "10.1007/978-3-030-01424-7_10", "CorpusId": 49908746}, "url": "https://www.semanticscholar.org/paper/1606575fc6f337bde02291a4bf928eb16f58d0e6", - "title": "Implementing Neural Turing Machines", "abstract": null, "venue": - "International Conference on Artificial Neural Networks", "year": 2018, "referenceCount": - 12, "citationCount": 39, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2018-07-23", - "journal": {"name": "ArXiv", "volume": "abs/1807.08518"}, "authors": [{"authorId": - "153247100", "name": "Mark Collier"}, {"authorId": "1781377", "name": "J. - Beel"}]}, {"paperId": "079adfb4ec1a617935f4c74763ed57ba0eedecff", "externalIds": - {"MAG": "2003095799", "DOI": "10.1126/science.1252960", "CorpusId": 8400803, - "PubMed": "25082703"}, "url": "https://www.semanticscholar.org/paper/079adfb4ec1a617935f4c74763ed57ba0eedecff", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-03-20", "journal": {"name": "Neural Computation", + "pages": "857-884", "volume": "30"}, "authors": [{"authorId": "1854385", "name": + "\u00c7aglar G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, + {"authorId": "1979489", "name": "Kyunghyun Cho"}, {"authorId": "1751762", + "name": "Yoshua Bengio"}]}, {"paperId": "7633d38345730e3ce80b03b290e41d0d1ff87697", + "externalIds": {"MAG": "2951637662", "ArXiv": "1803.00164", "DOI": "10.1007/s10884-018-9702-y", + "CorpusId": 119314930}, "corpusId": 119314930, "publicationVenue": {"id": + "0e86899d-b2fa-471e-bbc9-db59f1e85e65", "name": "Journal of Dynamics and Differential + Equations", "type": "journal", "alternate_names": ["J Dyn Differ Equ"], "issn": + "1040-7294", "url": "http://www.kluweronline.com/issn/1040-7294/contents", + "alternate_urls": ["https://link.springer.com/journal/10884"]}, "url": "https://www.semanticscholar.org/paper/7633d38345730e3ce80b03b290e41d0d1ff87697", + "title": "Turing Instability and Turing\u2013Hopf Bifurcation in Diffusive + Schnakenberg Systems with Gene Expression Time Delay", "abstract": null, "venue": + "Journal of Dynamics and Differential Equations", "year": 2018, "referenceCount": + 59, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1803.00164", "status": "GREEN"}, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-03-01", "journal": {"name": + "Journal of Dynamics and Differential Equations", "pages": "2223-2247", "volume": + "31"}, "authors": [{"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": + "2004181687", "name": "Hongbin Wang"}, {"authorId": "144861054", "name": "Xun + Cao"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", "externalIds": + {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", "DOI": "10.1137/16M1097560", + "CorpusId": 3849415}, "corpusId": 3849415, "publicationVenue": {"id": "d35d93ad-8e2c-4482-a896-897ce5c326fa", + "name": "SIAM Journal on Applied Dynamical Systems", "type": "journal", "alternate_names": + ["Siam Journal on Applied Dynamical Systems", "Siam J Appl Dyn Syst", "SIAM + J Appl Dyn Syst"], "issn": "1536-0040", "url": "https://epubs.siam.org/journal/sjaday"}, + "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", + "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near + Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize + into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter + to meter scales. The leading mathematical explanations for these phenomena + are the reaction-diffusion-advection model and the phase separation model. + This paper continues the series studies on analytically understanding the + existence of pattern solutions in the reaction-diffusion mussel-algae model. + The stability of the positive constant steady state and the existence of Hopf + and steady-state bifurcations are studied by analyzing the corresponding characteristic + equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain + the explicit dynamical classification in its neighborhood by calculating and + investigating the normal form on the center manifold. Using theoretical and + numerical simulations, we demonstrates that this TH interaction would significantly + enhance the diversity of spatial patterns and trigger the alternative paths + for the pattern development.", "venue": "SIAM Journal on Applied Dynamical + Systems", "year": 2017, "referenceCount": 65, "citationCount": 77, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", + "pages": "2030-2062", "volume": "16"}, "authors": [{"authorId": "1794550", + "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, + {"authorId": "47362020", "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", + "name": "Yuan Yuan"}]}, {"paperId": "079adfb4ec1a617935f4c74763ed57ba0eedecff", + "externalIds": {"MAG": "2003095799", "DOI": "10.1126/science.1252960", "CorpusId": + 8400803, "PubMed": "25082703"}, "corpusId": 8400803, "publicationVenue": {"id": + "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": "journal", + "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/079adfb4ec1a617935f4c74763ed57ba0eedecff", "title": "Digit patterning is controlled by a Bmp-Sox9-Wnt Turing network modulated by morphogen gradients", "abstract": "How do fingers know where to grow? Most researchers today believe that each finger forms because of @@ -624,57 +793,49 @@ interactions: experiments. Our systems biology approach reveals how a combination of growth, morphogen gradients, and a self-organizing Turing network can achieve robust and reproducible pattern formation.", "venue": "Science", "year": 2014, "referenceCount": - 81, "citationCount": 376, "influentialCitationCount": 26, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-08-01", "journal": - {"name": "Science", "pages": "566 - 570", "volume": "345"}, "authors": [{"authorId": - "5407202", "name": "J. Raspopovic"}, {"authorId": "2650134", "name": "L. Marcon"}, - {"authorId": "1392361181", "name": "L. Russo"}, {"authorId": "47254653", "name": - "J. Sharpe"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", "externalIds": - {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", "DOI": "10.1137/16M1097560", - "CorpusId": 3849415}, "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", - "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near - Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize - into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter - to meter scales. The leading mathematical explanations for these phenomena - are the reaction-diffusion-advection model and the phase separation model. - This paper continues the series studies on analytically understanding the - existence of pattern solutions in the reaction-diffusion mussel-algae model. - The stability of the positive constant steady state and the existence of Hopf - and steady-state bifurcations are studied by analyzing the corresponding characteristic - equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain - the explicit dynamical classification in its neighborhood by calculating and - investigating the normal form on the center manifold. Using theoretical and - numerical simulations, we demonstrates that this TH interaction would significantly - enhance the diversity of spatial patterns and trigger the alternative paths - for the pattern development.", "venue": "SIAM Journal on Applied Dynamical - Systems", "year": 2017, "referenceCount": 65, "citationCount": 71, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + 81, "citationCount": 379, "influentialCitationCount": 27, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", "pages": "2030-2062", - "volume": "16"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, - {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "47362020", - "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, - {"paperId": "7633d38345730e3ce80b03b290e41d0d1ff87697", "externalIds": {"MAG": - "2951637662", "ArXiv": "1803.00164", "DOI": "10.1007/s10884-018-9702-y", "CorpusId": - 119314930}, "url": "https://www.semanticscholar.org/paper/7633d38345730e3ce80b03b290e41d0d1ff87697", - "title": "Turing Instability and Turing\u2013Hopf Bifurcation in Diffusive - Schnakenberg Systems with Gene Expression Time Delay", "abstract": null, "venue": - "Journal of Dynamics and Differential Equations", "year": 2018, "referenceCount": - 59, "citationCount": 34, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2018-03-01", "journal": {"name": - "Journal of Dynamics and Differential Equations", "pages": "2223-2247", "volume": - "31"}, "authors": [{"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": - "2004181687", "name": "Hongbin Wang"}, {"authorId": "144861054", "name": "Xun - Cao"}]}, {"paperId": "f10e071292d593fef939e6ef4a59baf0bb3a6c2b", "externalIds": - {"ArXiv": "1505.00521", "MAG": "2125308790", "DBLP": "journals/corr/ZarembaS15", - "CorpusId": 16228924}, "url": "https://www.semanticscholar.org/paper/f10e071292d593fef939e6ef4a59baf0bb3a6c2b", + "2014-08-01", "journal": {"name": "Science", "pages": "566 - 570", "volume": + "345"}, "authors": [{"authorId": "5407202", "name": "J. Raspopovic"}, {"authorId": + "2650134", "name": "L. Marcon"}, {"authorId": "1392361181", "name": "L. Russo"}, + {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", + "externalIds": {"MAG": "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", + "CorpusId": 67906449}, "corpusId": 67906449, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", + "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": + "What can artificial intelligence teach us about the mind? If AI''s underlying + concept is that thinking is a computational process, then how can computation + illuminate thinking? It''s a timely question. AI is all the rage, and the + buzziest AI buzz surrounds adaptive machine learning: computer systems that + learn intelligent behavior from massive amounts of data. This is what powers + a driverless car, for example. In this book, Hector Levesque shifts the conversation + to \"good old fashioned artificial intelligence,\" which is based not on heaps + of data but on understanding commonsense intelligence. This kind of artificial + intelligence is equipped to handle situations that depart from previous patterns + -- as we do in real life, when, for example, we encounter a washed-out bridge + or when the barista informs us there''s no more soy milk. Levesque considers + the role of language in learning. He argues that a computer program that passes + the famous Turing Test could be a mindless zombie, and he proposes another + way to test for intelligence -- the Winograd Schema Test, developed by Levesque + and his colleagues. \"If our goal is to understand intelligent behavior, we + had better understand the difference between making it and faking it,\" he + observes. He identifies a possible mechanism behind common sense and the capacity + to call on background knowledge: the ability to represent objects of thought + symbolically. As AI migrates more and more into everyday life, we should worry + if systems without common sense are making decisions where common sense is + needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": + 69, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2017-02-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "143634377", + "name": "H. Levesque"}]}, {"paperId": "f10e071292d593fef939e6ef4a59baf0bb3a6c2b", + "externalIds": {"ArXiv": "1505.00521", "MAG": "2125308790", "DBLP": "journals/corr/ZarembaS15", + "CorpusId": 16228924}, "corpusId": 16228924, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f10e071292d593fef939e6ef4a59baf0bb3a6c2b", "title": "Reinforcement Learning Neural Turing Machines", "abstract": "The expressive power of a machine learning model is closely related to the number of sequential computational steps it can learn. For example, Deep Neural Networks @@ -698,44 +859,15 @@ interactions: do so, we developed a simple technique for numerically checking arbitrary implementations of models that use Reinforce, which may be of independent interest.", "venue": "ArXiv", "year": 2015, "referenceCount": 28, "citationCount": - 170, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-05-04", "journal": - {"name": "ArXiv", "volume": "abs/1505.00521"}, "authors": [{"authorId": "2563432", - "name": "Wojciech Zaremba"}, {"authorId": "1701686", "name": "Ilya Sutskever"}]}, - {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", "externalIds": {"MAG": - "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", "CorpusId": 67906449}, - "url": "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", - "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": - "What can artificial intelligence teach us about the mind? If AI''s underlying - concept is that thinking is a computational process, then how can computation - illuminate thinking? It''s a timely question. AI is all the rage, and the - buzziest AI buzz surrounds adaptive machine learning: computer systems that - learn intelligent behavior from massive amounts of data. This is what powers - a driverless car, for example. In this book, Hector Levesque shifts the conversation - to \"good old fashioned artificial intelligence,\" which is based not on heaps - of data but on understanding commonsense intelligence. This kind of artificial - intelligence is equipped to handle situations that depart from previous patterns - -- as we do in real life, when, for example, we encounter a washed-out bridge - or when the barista informs us there''s no more soy milk. Levesque considers - the role of language in learning. He argues that a computer program that passes - the famous Turing Test could be a mindless zombie, and he proposes another - way to test for intelligence -- the Winograd Schema Test, developed by Levesque - and his colleagues. \"If our goal is to understand intelligent behavior, we - had better understand the difference between making it and faking it,\" he - observes. He identifies a possible mechanism behind common sense and the capacity - to call on background knowledge: the ability to represent objects of thought - symbolically. As AI migrates more and more into everyday life, we should worry - if systems without common sense are making decisions where common sense is - needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": - 68, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2017-02-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "143634377", "name": "H. Levesque"}]}, - {"paperId": "5259755f9c100e220ffaa7e08439c5d34be7757a", "externalIds": {"MAG": - "2204302769", "CorpusId": 17710225}, "url": "https://www.semanticscholar.org/paper/5259755f9c100e220ffaa7e08439c5d34be7757a", + 170, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-05-04", "journal": {"name": "ArXiv", "volume": "abs/1505.00521"}, "authors": + [{"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", + "name": "Ilya Sutskever"}]}, {"paperId": "5259755f9c100e220ffaa7e08439c5d34be7757a", + "externalIds": {"MAG": "2204302769", "CorpusId": 17710225}, "corpusId": 17710225, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5259755f9c100e220ffaa7e08439c5d34be7757a", "title": "Reinforcement Learning Neural Turing Machines - Revised", "abstract": "The Neural Turing Machine (NTM) is more expressive than all previously considered models because of its external memory. It can be viewed as a broader effort @@ -752,14 +884,18 @@ interactions: to solve simple algorithmic tasks. Our Interfaces are expressive enough to make our model Turing complete.", "venue": "", "year": 2015, "referenceCount": 25, "citationCount": 154, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-05-04", - "journal": {"name": "arXiv: Learning", "volume": ""}, "authors": [{"authorId": - "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", "name": "Ilya - Sutskever"}]}, {"paperId": "2a69c98085c13ddb0e9b5ba4a904312670ed4e65", "externalIds": - {"MAG": "2319249367", "PubMedCentral": "4922859", "DOI": "10.7554/eLife.14022", - "CorpusId": 1077586, "PubMed": "27058171"}, "url": "https://www.semanticscholar.org/paper/2a69c98085c13ddb0e9b5ba4a904312670ed4e65", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-05-04", "journal": {"name": "arXiv: Learning", "volume": ""}, "authors": + [{"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", + "name": "Ilya Sutskever"}]}, {"paperId": "2a69c98085c13ddb0e9b5ba4a904312670ed4e65", + "externalIds": {"MAG": "2319249367", "PubMedCentral": "4922859", "DOI": "10.7554/eLife.14022", + "CorpusId": 1077586, "PubMed": "27058171"}, "corpusId": 1077586, "publicationVenue": + {"id": "07365b9a-c0ce-4dd3-b93b-a02e1c81e0c6", "name": "eLife", "type": "journal", + "issn": "2050-084X", "url": "https://epub.uni-regensburg.de/40444/", "alternate_urls": + ["https://elifesciences.org/", "https://elife.elifesciences.org/", "http://elifesciences.org/"]}, + "url": "https://www.semanticscholar.org/paper/2a69c98085c13ddb0e9b5ba4a904312670ed4e65", "title": "High-throughput mathematical analysis identifies Turing networks for patterning with equally diffusing signals", "abstract": "The Turing reaction-diffusion model explains how identical cells can self-organize to form spatial patterns. @@ -778,17 +914,22 @@ interactions: framework to understand multicellular pattern formation and enables the wide-spread use of mathematical biology to engineer synthetic patterning systems. DOI: http://dx.doi.org/10.7554/eLife.14022.001", "venue": "eLife", "year": 2016, - "referenceCount": 91, "citationCount": 96, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-08", "journal": - {"name": "eLife", "volume": "5"}, "authors": [{"authorId": "2650134", "name": - "L. Marcon"}, {"authorId": "4791189", "name": "X. Diego"}, {"authorId": "47254653", - "name": "J. Sharpe"}, {"authorId": "153207731", "name": "Patrick M\u00fcller"}]}, - {"paperId": "751e5ff25e8186a8fd26ee05c4e29a286f650f1b", "externalIds": {"DBLP": - "journals/corr/Grigore16", "MAG": "2953162524", "ArXiv": "1605.05274", "DOI": - "10.1145/3009837.3009871", "CorpusId": 5698855}, "url": "https://www.semanticscholar.org/paper/751e5ff25e8186a8fd26ee05c4e29a286f650f1b", + "referenceCount": 91, "citationCount": 98, "influentialCitationCount": 4, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-04-08", "journal": {"name": "eLife", "volume": "5"}, "authors": [{"authorId": + "2650134", "name": "L. Marcon"}, {"authorId": "4791189", "name": "X. Diego"}, + {"authorId": "47254653", "name": "J. Sharpe"}, {"authorId": "153207731", "name": + "Patrick M\u00fcller"}]}, {"paperId": "751e5ff25e8186a8fd26ee05c4e29a286f650f1b", + "externalIds": {"DBLP": "journals/corr/Grigore16", "MAG": "2953162524", "ArXiv": + "1605.05274", "DOI": "10.1145/3009837.3009871", "CorpusId": 5698855}, "corpusId": + 5698855, "publicationVenue": {"id": "8a1922a5-8e84-4ec6-9283-01f2ef1981fc", + "name": "ACM-SIGACT Symposium on Principles of Programming Languages", "type": + "conference", "alternate_names": ["Symp Princ Program Lang", "Symposium on + Principles of Programming Languages", "POPL", "ACM-SIGACT Symp Princ Program + Lang"], "url": "http://www.sigplan.org/Conferences/POPL/"}, "url": "https://www.semanticscholar.org/paper/751e5ff25e8186a8fd26ee05c4e29a286f650f1b", "title": "Java generics are turing complete", "abstract": "This paper describes a reduction from the halting problem of Turing machines to subtype checking in Java. It follows that subtype checking in Java is undecidable, which answers @@ -797,14 +938,16 @@ interactions: of Gill and Levy from 2016. The latter point is illustrated by a parser generator for fluent interfaces.", "venue": "ACM-SIGACT Symposium on Principles of Programming Languages", "year": 2016, "referenceCount": 37, "citationCount": 40, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://kar.kent.ac.uk/58183/7/javats.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2016-05-17", "journal": {"name": "Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages"}, "authors": [{"authorId": "2355698", "name": "Radu Grigore"}]}, {"paperId": "3290b0d04025513911923fc51885962b10971783", "externalIds": {"MAG": - "2585714548", "CorpusId": 64349377}, "url": "https://www.semanticscholar.org/paper/3290b0d04025513911923fc51885962b10971783", + "2585714548", "CorpusId": 64349377}, "corpusId": 64349377, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3290b0d04025513911923fc51885962b10971783", "title": "Alan Turing: The Enigma", "abstract": "Feel lonely? What about reading books? Book is one of the greatest friends to accompany while in your lonely time. When you have no friends and activities somewhere and sometimes, reading @@ -812,19 +955,26 @@ interactions: increase the knowledge. Of course the b=benefits to take will relate to what kind of book that you are reading. And now, we will concern you to try reading alan turing the enigma as one of the reading material to finish quickly.", - "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 112, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-12-22", - "journal": {"name": "", "pages": "57", "volume": "62"}, "authors": [{"authorId": - "71860202", "name": "Golda T. Eldridge"}]}, {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", - "externalIds": {"PubMedCentral": "5258822", "MAG": "2443634204", "ArXiv": - "1301.2002", "DOI": "10.1007/s00285-016-1035-z", "CorpusId": 5942606, "PubMed": - "27305913"}, "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", + "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 116, "influentialCitationCount": + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2015-12-22", "journal": {"name": "", "pages": "57", + "volume": "62"}, "authors": [{"authorId": "71860202", "name": "Golda T. Eldridge"}]}, + {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "externalIds": {"PubMedCentral": + "5258822", "MAG": "2443634204", "ArXiv": "1301.2002", "DOI": "10.1007/s00285-016-1035-z", + "CorpusId": 5942606, "PubMed": "27305913"}, "corpusId": 5942606, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "title": "Instability of turing patterns in reaction-diffusion-ODE systems", "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2013, "referenceCount": 49, "citationCount": 38, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc5258822?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-01-09", "journal": @@ -833,20 +983,29 @@ interactions: {"authorId": "101468044", "name": "G. Karch"}, {"authorId": "2118679527", "name": "Kanako Suzuki"}]}, {"paperId": "3b662774599a36d4b281f0ea212d149849fd2ca7", "externalIds": {"PubMedCentral": "4879262", "MAG": "2399203404", "DOI": "10.1038/ncomms11582", - "CorpusId": 2037071, "PubMed": "27211489"}, "url": "https://www.semanticscholar.org/paper/3b662774599a36d4b281f0ea212d149849fd2ca7", + "CorpusId": 2037071, "PubMed": "27211489"}, "corpusId": 2037071, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/3b662774599a36d4b281f0ea212d149849fd2ca7", "title": "The fin-to-limb transition as the re-organization of a Turing pattern", "abstract": null, "venue": "Nature Communications", "year": 2016, "referenceCount": 64, "citationCount": 67, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-05-23", "journal": {"name": "Nature Communications", - "volume": "7"}, "authors": [{"authorId": "4852838", "name": "Koh Onimaru"}, - {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "108029565", "name": - "M. Musy"}, {"authorId": "47675847", "name": "Mikiko Tanaka"}, {"authorId": - "47254653", "name": "J. Sharpe"}]}, {"paperId": "dd547a64a179f0f3defd376455f258500d34d4b8", + "openAccessPdf": {"url": "https://www.nature.com/articles/ncomms11582.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2016-05-23", "journal": {"name": "Nature + Communications", "volume": "7"}, "authors": [{"authorId": "4852838", "name": + "Koh Onimaru"}, {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": + "108029565", "name": "M. Musy"}, {"authorId": "47675847", "name": "Mikiko + Tanaka"}, {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "dd547a64a179f0f3defd376455f258500d34d4b8", "externalIds": {"MAG": "2317259993", "ArXiv": "1512.06055", "DOI": "10.1103/PhysRevLett.116.143901", - "CorpusId": 19175993, "PubMed": "27104711"}, "url": "https://www.semanticscholar.org/paper/dd547a64a179f0f3defd376455f258500d34d4b8", + "CorpusId": 19175993, "PubMed": "27104711"}, "corpusId": 19175993, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dd547a64a179f0f3defd376455f258500d34d4b8", "title": "Competing Turing and Faraday Instabilities in Longitudinally Modulated Passive Resonators.", "abstract": "We experimentally investigate the interplay of Turing (modulational) and Faraday (parametric) instabilities in a bistable @@ -860,6 +1019,7 @@ interactions: structures. The results are well explained in terms of the universal Lugiato-Lefever model.", "venue": "Physical Review Letters", "year": 2015, "referenceCount": 31, "citationCount": 56, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1512.06055", "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -870,10 +1030,14 @@ interactions: "name": "A. Mussot"}, {"authorId": "5414545", "name": "S. Trillo"}]}, {"paperId": "8fb5cf374acbe9fed9939ff2c0aec334b5d26187", "externalIds": {"MAG": "2950930823", "DBLP": "conf/tcc/AnanthS16", "DOI": "10.1007/978-3-662-49096-9_6", "CorpusId": - 15455801}, "url": "https://www.semanticscholar.org/paper/8fb5cf374acbe9fed9939ff2c0aec334b5d26187", + 15455801}, "corpusId": 15455801, "publicationVenue": {"id": "5f558f42-4459-4db5-9c48-77c92ba99511", + "name": "Theory of Cryptography Conference", "type": "conference", "alternate_names": + ["Theory Cryptogr Conf", "TCC"], "url": "https://www.iacr.org/meetings/tcc/"}, + "url": "https://www.semanticscholar.org/paper/8fb5cf374acbe9fed9939ff2c0aec334b5d26187", "title": "Functional Encryption for Turing Machines", "abstract": null, "venue": "Theory of Cryptography Conference", "year": 2016, "referenceCount": 53, "citationCount": - 61, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": + 61, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "http://eprint.iacr.org/2015/776.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", @@ -881,7 +1045,8 @@ interactions: "publicationDate": "2016-01-10", "journal": {"pages": "125-153"}, "authors": [{"authorId": "2616991", "name": "P. Ananth"}, {"authorId": "1695851", "name": "A. Sahai"}]}, {"paperId": "f8e9f0e61d45c8a669391fa00e20d134e71ca388", "externalIds": - {"MAG": "2747885441", "CorpusId": 125663722}, "url": "https://www.semanticscholar.org/paper/f8e9f0e61d45c8a669391fa00e20d134e71ca388", + {"MAG": "2747885441", "CorpusId": 125663722}, "corpusId": 125663722, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f8e9f0e61d45c8a669391fa00e20d134e71ca388", "title": "Turing Computability: Theory and Applications", "abstract": "Turing''s famous 1936 paper introduced a formal definition of a computing machine, a Turing machine. This model led to both the development of actual computers @@ -905,30 +1070,36 @@ interactions: according to importance and difficulty. The book is suitable for advanced undergraduate and graduate students in computer science and mathematics and researchers engaged with computability and mathematical logic.", "venue": - "", "year": 2016, "referenceCount": 0, "citationCount": 52, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2016-06-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1760293", "name": "R. Soare"}]}, {"paperId": "a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", - "externalIds": {"MAG": "2437127566", "DOI": "10.1007/S11071-016-2873-3", "CorpusId": - 124911557}, "url": "https://www.semanticscholar.org/paper/a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", + "", "year": 2016, "referenceCount": 0, "citationCount": 54, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2016-06-21", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, + {"paperId": "a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", "externalIds": {"MAG": + "2437127566", "DOI": "10.1007/S11071-016-2873-3", "CorpusId": 124911557}, + "corpusId": 124911557, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", "title": "Turing\u2013Hopf bifurcation analysis of a predator\u2013prey model with herd behavior and cross-diffusion", "abstract": null, "venue": "", "year": - 2016, "referenceCount": 58, "citationCount": 60, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-06-17", - "journal": {"name": "Nonlinear Dynamics", "pages": "73-89", "volume": "86"}, - "authors": [{"authorId": "143754807", "name": "Xiaosong Tang"}, {"authorId": - "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": "Tonghua - Zhang"}]}, {"paperId": "d89084753b70dbdf589fb5663a609fb47607affb", "externalIds": - {"DBLP": "journals/corr/LiGG16a", "ArXiv": "1603.04904", "MAG": "2301883550", - "DOI": "10.1007/s11721-016-0126-1", "CorpusId": 14259869}, "url": "https://www.semanticscholar.org/paper/d89084753b70dbdf589fb5663a609fb47607affb", + 2016, "referenceCount": 58, "citationCount": 62, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-06-17", "journal": {"name": "Nonlinear Dynamics", "pages": "73-89", + "volume": "86"}, "authors": [{"authorId": "143754807", "name": "Xiaosong Tang"}, + {"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": + "Tonghua Zhang"}]}, {"paperId": "1470b244477529e1627b48c117e78308ede474ab", + "externalIds": {"DBLP": "journals/corr/LiGG16a", "ArXiv": "1603.04904", "MAG": + "2301883550", "DOI": "10.1007/s11721-016-0126-1", "CorpusId": 14259869}, "corpusId": + 14259869, "publicationVenue": {"id": "9bc15867-86e2-4be2-9ff3-2c15aaf07929", + "name": "Swarm Intelligence", "type": "journal", "alternate_names": ["Swarm + Intell"], "issn": "1935-3812", "url": "https://www.springer.com/computer/ai/journal/11721", + "alternate_urls": ["https://link.springer.com/journal/11721"]}, "url": "https://www.semanticscholar.org/paper/1470b244477529e1627b48c117e78308ede474ab", "title": "Turing learning: a metric-free approach to inferring behavior and its application to swarms", "abstract": null, "venue": "Swarm Intelligence", - "year": 2016, "referenceCount": 67, "citationCount": 52, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "year": 2016, "referenceCount": 64, "citationCount": 52, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2Fs11721-016-0126-1.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -937,21 +1108,28 @@ interactions: {"authorId": "7836896", "name": "Melvin Gauci"}, {"authorId": "6586246", "name": "R. Gro\u00df"}]}, {"paperId": "b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "externalIds": {"DBLP": "journals/cnsns/SongZP16", "MAG": "1929947366", "DOI": - "10.1016/J.CNSNS.2015.10.002", "CorpusId": 119973623}, "url": "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", + "10.1016/J.CNSNS.2015.10.002", "CorpusId": 119973623}, "corpusId": 119973623, + "publicationVenue": {"id": "cbeeb5cb-fa82-4ae6-875b-04adb3b61f48", "name": + "Communications in nonlinear science & numerical simulation", "type": "journal", + "alternate_names": ["Communications in Nonlinear Science and Numerical Simulation", + "Commun Nonlinear Sci Numer Simul", "Commun nonlinear sci numer simul"], + "issn": "1007-5704", "url": "http://www.elsevier.com/locate/cnsns"}, "url": + "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "title": "Turing-Hopf bifurcation in the reaction-diffusion equations and its applications", "abstract": null, "venue": "Communications in nonlinear science & numerical simulation", "year": 2016, "referenceCount": 37, "citationCount": - 82, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2016-04-01", "journal": {"name": "Commun. - Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": "33"}, "authors": - [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": - "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong Peng"}]}, {"paperId": - "7c326f661163360efc072214be205c827e742495", "externalIds": {"DBLP": "journals/corr/Aaronson13", - "MAG": "2964289375", "ArXiv": "1306.0159", "DOI": "10.1017/CBO9780511863196.018", - "CorpusId": 17123686}, "url": "https://www.semanticscholar.org/paper/7c326f661163360efc072214be205c827e742495", + 85, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-01", "journal": + {"name": "Commun. Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": + "33"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": + "1742870", "name": "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong + Peng"}]}, {"paperId": "7c326f661163360efc072214be205c827e742495", "externalIds": + {"DBLP": "journals/corr/Aaronson13", "MAG": "2964289375", "ArXiv": "1306.0159", + "DOI": "10.1017/CBO9780511863196.018", "CorpusId": 17123686}, "corpusId": + 17123686, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c326f661163360efc072214be205c827e742495", "title": "The Ghost in the Quantum Turing Machine", "abstract": "In honor of Alan Turing''s hundredth birthday, I unwisely set out some thoughts about one of Turing''s obsessions throughout his life, the question of physics and @@ -974,15 +1152,16 @@ interactions: in neuroscience, physics, and cosmology; and takes a millennia-old philosophical debate into some underexplored territory.", "venue": "The Once and Future Turing", "year": 2013, "referenceCount": 109, "citationCount": 46, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1306.0159.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-06-01", "journal": {"pages": "193-296"}, "authors": [{"authorId": "20996436", "name": "S. Aaronson"}]}, {"paperId": "3d27bbfcf1ebe7390b5250e677e91179a76569e4", "externalIds": {"ArXiv": "1603.00948", "MAG": "2522126998", "DOI": "10.1103/PhysRevX.7.041002", "CorpusId": - 44184751}, "url": "https://www.semanticscholar.org/paper/3d27bbfcf1ebe7390b5250e677e91179a76569e4", + 44184751}, "corpusId": 44184751, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d27bbfcf1ebe7390b5250e677e91179a76569e4", "title": "Globally stable microresonator Turing pattern formation for coherent high-power THz radiation on-chip", "abstract": "In nonlinear microresonators driven by continuous-wave (cw) lasers, Turing patterns have been studied in @@ -1008,8 +1187,9 @@ interactions: system is promising to find applications in astrophysics, medical imaging, and wireless communications.", "venue": "", "year": 2016, "referenceCount": 49, "citationCount": 44, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevX.7.041002", + "status": "GOLD"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-03-03", "journal": {"name": "arXiv: Optics", "volume": ""}, "authors": [{"authorId": "122132133", "name": "Shu-Wei Huang"}, {"authorId": "2046781", "name": "Jinghui Yang"}, {"authorId": @@ -1018,7 +1198,14 @@ interactions: "name": "T. Zelevinsky"}, {"authorId": "2146359", "name": "M. Jarrahi"}, {"authorId": "1727458", "name": "C. Wong"}]}, {"paperId": "902fb60fa3493171b2aa9d485291a54185763a79", "externalIds": {"DBLP": "journals/jetai/WarwickS16", "MAG": "1912133035", - "DOI": "10.1080/0952813X.2015.1055826", "CorpusId": 31251200}, "url": "https://www.semanticscholar.org/paper/902fb60fa3493171b2aa9d485291a54185763a79", + "DOI": "10.1080/0952813X.2015.1055826", "CorpusId": 31251200}, "corpusId": + 31251200, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/902fb60fa3493171b2aa9d485291a54185763a79", "title": "Can machines think? A report on Turing test experiments at the Royal Society", "abstract": "In this article we consider transcripts that originated from a practical series of Turing''s Imitation Game that was held on 6 and @@ -1034,45 +1221,20 @@ interactions: time that results from the Royal Society tests have been disclosed and discussed in a paper.", "venue": "Journal of experimental and theoretical artificial intelligence (Print)", "year": 2016, "referenceCount": 34, "citationCount": - 46, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-11-01", "journal": - {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "1007 - 989", "volume": "28"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": - "95ca0cde71f0258ca99e920f711084a9a3a5fe4b", "externalIds": {"DBLP": "conf/nips/OrlitskyS15", - "MAG": "2187207766", "CorpusId": 15304308}, "url": "https://www.semanticscholar.org/paper/95ca0cde71f0258ca99e920f711084a9a3a5fe4b", - "title": "Competitive Distribution Estimation: Why is Good-Turing Good", "abstract": - "Estimating distributions over large alphabets is a fundamental machine-learning - tenet. Yet no method is known to estimate all distributions well. For example, - add-constant estimators are nearly min-max optimal but often perform poorly - in practice, and practical estimators such as absolute discounting, Jelinek-Mercer, - and Good-Turing are not known to be near optimal for essentially any distribution. - \n \nWe describe the first universally near-optimal probability estimators. - For every discrete distribution, they are provably nearly the best in the - following two competitive ways. First they estimate every distribution nearly - as well as the best estimator designed with prior knowledge of the distribution - up to a permutation. Second, they estimate every distribution nearly as well - as the best estimator designed with prior knowledge of the exact distribution, - but as all natural estimators, restricted to assign the same probability to - all symbols appearing the same number of times. \n \nSpecifically, for distributions - over k symbols and n samples, we show that for both comparisons, a simple - variant of Good-Turing estimator is always within KL divergence of (3 + on(1))/n1/3 - from the best estimator, and that a more involved estimator is within On(min(k/n, - 1/\u221an)). Conversely, we show that any estimator must have a KL divergence - at least \u03a9n(min(k/n, 1/n2/3)) over the best estimator for the first comparison, - and at least \u03a9n(min(k/n, 1/\u221an)) for the second.", "venue": "NIPS", - "year": 2015, "referenceCount": 35, "citationCount": 77, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2015-12-07", "journal": {"pages": "2143-2151"}, "authors": - [{"authorId": "1691155", "name": "A. Orlitsky"}, {"authorId": "9486035", "name": - "A. Suresh"}]}, {"paperId": "df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "externalIds": + 46, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://pure.coventry.ac.uk/ws/files/4019869/warwickcomb.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "History", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-11-01", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "1007 - 989", "volume": "28"}, "authors": [{"authorId": + "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma + Shah"}]}, {"paperId": "df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "externalIds": {"MAG": "2399906603", "DBLP": "conf/aips/000115", "DOI": "10.1609/icaps.v25i1.13684", - "CorpusId": 11168350}, "url": "https://www.semanticscholar.org/paper/df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", + "CorpusId": 11168350}, "corpusId": 11168350, "publicationVenue": {"id": "267934f4-c986-4571-bef8-d0eebc5e0e54", + "name": "International Conference on Automated Planning and Scheduling", "type": + "conference", "alternate_names": ["Int Conf Autom Plan Sched", "ICAPS"], "url": + "http://www.icaps-conference.org/"}, "url": "https://www.semanticscholar.org/paper/df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "title": "Simulated Penetration Testing: From \"Dijkstra\" to \"Turing Test++\"", "abstract": "\n \n Penetration testing (pentesting) is a well established method for identifying security weaknesses, by conducting friendly attacks. @@ -1092,13 +1254,50 @@ interactions: challenges to AI sequential decision making research.\n \n", "venue": "International Conference on Automated Planning and Scheduling", "year": 2015, "referenceCount": 41, "citationCount": 80, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2015-04-08", "journal": {"pages": "364-372"}, "authors": [{"authorId": "144915519", - "name": "J. Hoffmann"}]}, {"paperId": "368a7958ae2b6b8f30454f4405c0bfa090ec5c22", + "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/ICAPS/article/download/13684/13533", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2015-04-08", "journal": {"pages": "364-372"}, + "authors": [{"authorId": "144915519", "name": "J. Hoffmann"}]}, {"paperId": + "95ca0cde71f0258ca99e920f711084a9a3a5fe4b", "externalIds": {"DBLP": "conf/nips/OrlitskyS15", + "MAG": "2187207766", "CorpusId": 15304308}, "corpusId": 15304308, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/95ca0cde71f0258ca99e920f711084a9a3a5fe4b", + "title": "Competitive Distribution Estimation: Why is Good-Turing Good", "abstract": + "Estimating distributions over large alphabets is a fundamental machine-learning + tenet. Yet no method is known to estimate all distributions well. For example, + add-constant estimators are nearly min-max optimal but often perform poorly + in practice, and practical estimators such as absolute discounting, Jelinek-Mercer, + and Good-Turing are not known to be near optimal for essentially any distribution. + \n \nWe describe the first universally near-optimal probability estimators. + For every discrete distribution, they are provably nearly the best in the + following two competitive ways. First they estimate every distribution nearly + as well as the best estimator designed with prior knowledge of the distribution + up to a permutation. Second, they estimate every distribution nearly as well + as the best estimator designed with prior knowledge of the exact distribution, + but as all natural estimators, restricted to assign the same probability to + all symbols appearing the same number of times. \n \nSpecifically, for distributions + over k symbols and n samples, we show that for both comparisons, a simple + variant of Good-Turing estimator is always within KL divergence of (3 + on(1))/n1/3 + from the best estimator, and that a more involved estimator is within On(min(k/n, + 1/\u221an)). Conversely, we show that any estimator must have a KL divergence + at least \u03a9n(min(k/n, 1/n2/3)) over the best estimator for the first comparison, + and at least \u03a9n(min(k/n, 1/\u221an)) for the second.", "venue": "NIPS", + "year": 2015, "referenceCount": 35, "citationCount": 78, "influentialCitationCount": + 11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2015-12-07", "journal": + {"pages": "2143-2151"}, "authors": [{"authorId": "1691155", "name": "A. Orlitsky"}, + {"authorId": "9486035", "name": "A. Suresh"}]}, {"paperId": "368a7958ae2b6b8f30454f4405c0bfa090ec5c22", "externalIds": {"MAG": "2022248835", "DOI": "10.1364/OE.20.003241", "CorpusId": - 24244845, "PubMed": "22330562"}, "url": "https://www.semanticscholar.org/paper/368a7958ae2b6b8f30454f4405c0bfa090ec5c22", + 24244845, "PubMed": "22330562"}, "corpusId": 24244845, "publicationVenue": + {"id": "f06e7ee6-cd20-45a8-91f9-6c84bcddc5fd", "name": "Optics Express", "type": + "journal", "alternate_names": ["Opt Express"], "issn": "1094-4087", "url": + "http://www.opticsexpress.org/Issue.cfm", "alternate_urls": ["http://www.opticsinfobase.org/oe/", + "https://www.osapublishing.org/oe/home.cfm", "http://www.osapublishing.org/oe/", + "http://www.opticsinfobase.org/oe/home.cfm"]}, "url": "https://www.semanticscholar.org/paper/368a7958ae2b6b8f30454f4405c0bfa090ec5c22", "title": "Photonic information processing beyond Turing: an optoelectronic implementation of reservoir computing.", "abstract": "Many information processing challenges are difficult to solve with traditional Turing or von Neumann approaches. @@ -1111,20 +1310,37 @@ interactions: to an input data stream. We employ spoken digit recognition and time series prediction tasks as benchmarks, achieving competitive processing figures of merit.", "venue": "Optics Express", "year": 2012, "referenceCount": 32, "citationCount": - 507, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-01-30", "journal": {"name": "Optics - express", "pages": "\n 3241-9\n ", "volume": "20 3"}, "authors": - [{"authorId": "1760452", "name": "L. Larger"}, {"authorId": "144524298", "name": - "M. C. Soriano"}, {"authorId": "145711155", "name": "D. Brunner"}, {"authorId": - "1829066", "name": "L. Appeltant"}, {"authorId": "144614855", "name": "J. - Guti\u00e9rrez"}, {"authorId": "145682718", "name": "L. Pesquera"}, {"authorId": - "2034306", "name": "C. Mirasso"}, {"authorId": "1795232", "name": "Ingo Fischer"}]}, - {"paperId": "b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "externalIds": {"MAG": - "2242749976", "DOI": "10.1073/pnas.1322005111", "CorpusId": 17626456, "PubMed": - "24616508"}, "url": "https://www.semanticscholar.org/paper/b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", + 510, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-30", "journal": + {"name": "Optics express", "pages": "\n 3241-9\n ", "volume": + "20 3"}, "authors": [{"authorId": "1760452", "name": "L. Larger"}, {"authorId": + "144524298", "name": "M. C. Soriano"}, {"authorId": "145711155", "name": "D. + Brunner"}, {"authorId": "1829066", "name": "L. Appeltant"}, {"authorId": "144614855", + "name": "J. Guti\u00e9rrez"}, {"authorId": "145682718", "name": "L. Pesquera"}, + {"authorId": "2034306", "name": "C. Mirasso"}, {"authorId": "1795232", "name": + "Ingo Fischer"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", + "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": + 28057065, "PubMed": "25544713"}, "corpusId": 28057065, "publicationVenue": + {"id": "e26133f2-2f02-4bc5-a3ad-26bdbdc9636c", "name": "Trends in Genetics", + "type": "journal", "alternate_names": ["Trends Genet"], "issn": "0168-9479", + "alternate_issns": ["1362-4555", "0168-9525"], "url": "http://www.sciencedirect.com/science/journal/01689525", + "alternate_urls": ["http://www.cell.com/trends/genetics/"]}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", + "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", + "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": + 64, "citationCount": 99, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2015-02-01", "journal": + {"name": "Trends in genetics : TIG", "pages": "\n 88-96\n ", + "volume": "31 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu + Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": + "b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "externalIds": {"MAG": "2242749976", + "DOI": "10.1073/pnas.1322005111", "CorpusId": 17626456, "PubMed": "24616508"}, + "corpusId": 17626456, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "title": "Testing Turing\u2019s theory of morphogenesis in chemical cells", "abstract": "Significance Turing proposed that intercellular reaction-diffusion of molecules is responsible for morphogenesis. The impact of this paradigm @@ -1151,7 +1367,8 @@ interactions: original model, which we explain by modifying the theory to include heterogeneity.", "venue": "Proceedings of the National Academy of Sciences", "year": 2014, "referenceCount": 46, "citationCount": 164, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine", "Computer Science"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/111/12/4397.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], @@ -1164,33 +1381,77 @@ interactions: "name": "I. Epstein"}, {"authorId": "2775719", "name": "S. Fraden"}]}, {"paperId": "0c4930885dd3318d39f39278686446752bc305b5", "externalIds": {"DBLP": "journals/isci/AlarifiAA16", "MAG": "2510717748", "DOI": "10.1016/j.ins.2016.08.036", "CorpusId": 19044123}, - "url": "https://www.semanticscholar.org/paper/0c4930885dd3318d39f39278686446752bc305b5", + "corpusId": 19044123, "publicationVenue": {"id": "e46002a1-d7a6-4681-aae9-36bc3a6a1f93", + "name": "Information Sciences", "type": "journal", "alternate_names": ["Information + Scientist", "Inf Sci"], "issn": "0020-0255", "alternate_issns": ["0020-0263"], + "url": "http://www.sciencedirect.com/science/journal/00200255"}, "url": "https://www.semanticscholar.org/paper/0c4930885dd3318d39f39278686446752bc305b5", "title": "Twitter turing test: Identifying social machines", "abstract": null, "venue": "Information Sciences", "year": 2016, "referenceCount": 45, "citationCount": - 68, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2016-12-01", - "journal": {"name": "Inf. Sci.", "pages": "332-346", "volume": "372"}, "authors": - [{"authorId": "2329378", "name": "A. Alarifi"}, {"authorId": "3129812", "name": - "M. Alsaleh"}, {"authorId": "1393386740", "name": "A. Al-Salman"}]}, {"paperId": - "ac7a3d2983b75bd4f44903892a5df295a0f859ff", "externalIds": {"DBLP": "conf/crypto/GoldwasserKPVZ13", - "MAG": "1590453572", "DOI": "10.1007/978-3-642-40084-1_30", "CorpusId": 2561936}, - "url": "https://www.semanticscholar.org/paper/ac7a3d2983b75bd4f44903892a5df295a0f859ff", + 69, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2016-12-01", "journal": {"name": "Inf. Sci.", "pages": + "332-346", "volume": "372"}, "authors": [{"authorId": "2329378", "name": "A. + Alarifi"}, {"authorId": "3129812", "name": "M. Alsaleh"}, {"authorId": "1393386740", + "name": "A. Al-Salman"}]}, {"paperId": "2b352a475a16b3e12b1af1cf9231ba824db9f937", + "externalIds": {"DBLP": "journals/tcas/BuscarinoCFFC16", "MAG": "2485899172", + "DOI": "10.1109/TCSI.2016.2564738", "CorpusId": 36502203}, "corpusId": 36502203, + "publicationVenue": {"id": "65967e36-f7db-476f-9d00-fd080a5a8483", "name": + "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", "type": + "journal", "alternate_names": ["IEEE Trans Circuit Syst Part 1 Regul Pap", + "IEEE Trans Circuit Syst I-regular Pap", "IEEE Transactions on Circuits and + Systems I-regular Papers"], "issn": "1549-8328", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=8919", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8919"]}, + "url": "https://www.semanticscholar.org/paper/2b352a475a16b3e12b1af1cf9231ba824db9f937", + "title": "Turing Patterns in Memristive Cellular Nonlinear Networks", "abstract": + "The formation of ordered structures, in particular Turing patterns, in complex + spatially extended systems has been observed in many different contexts, spanning + from natural sciences (chemistry, physics, and biology) to technology (mechanics + and electronics). In this paper, it is shown that the use of memristors in + a simple cell of a spatially-extended circuit architecture allows us to design + systems able to generate Turing patterns. In addition, the memristor parameters + play a key role in the selection of the type and characteristics of the emerging + pattern, which is also influenced by the initial conditions. The problem of + finding the regions of parameters where Turing patterns may emerge in the + proposed cellular architecture is solved in an analytic way, and numerical + results are shown to illustrate the system behavior with respect to its parameters.", + "venue": "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", + "year": 2016, "referenceCount": 32, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-07-13", "journal": + {"name": "IEEE Transactions on Circuits and Systems I: Regular Papers", "pages": + "1222-1230", "volume": "63"}, "authors": [{"authorId": "1884234", "name": + "A. Buscarino"}, {"authorId": "48285431", "name": "C. Corradino"}, {"authorId": + "143998340", "name": "L. Fortuna"}, {"authorId": "1766733", "name": "M. Frasca"}, + {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "ac7a3d2983b75bd4f44903892a5df295a0f859ff", + "externalIds": {"DBLP": "conf/crypto/GoldwasserKPVZ13", "MAG": "1590453572", + "DOI": "10.1007/978-3-642-40084-1_30", "CorpusId": 2561936}, "corpusId": 2561936, + "publicationVenue": {"id": "212b6868-c374-4ba2-ad32-19fde8004623", "name": + "Annual International Cryptology Conference", "type": "conference", "alternate_names": + ["Int Cryptol Conf", "Annu Int Cryptol Conf", "CRYPTO", "International Cryptology + Conference"], "url": "http://www.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/ac7a3d2983b75bd4f44903892a5df295a0f859ff", "title": "How to Run Turing Machines on Encrypted Data", "abstract": null, "venue": "Annual International Cryptology Conference", "year": 2013, "referenceCount": 58, "citationCount": 181, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2013-08-18", "journal": - {"pages": "536-553"}, "authors": [{"authorId": "1706681", "name": "S. Goldwasser"}, - {"authorId": "1784514", "name": "Y. Kalai"}, {"authorId": "144963510", "name": - "R. A. Popa"}, {"authorId": "1749858", "name": "V. Vaikuntanathan"}, {"authorId": - "1789973", "name": "N. Zeldovich"}]}, {"paperId": "736a8e786d3e8b3a5b06d57648c83b14243a6479", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-642-40084-1_30.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2013-08-18", "journal": {"pages": "536-553"}, "authors": [{"authorId": "1706681", + "name": "S. Goldwasser"}, {"authorId": "1784514", "name": "Y. Kalai"}, {"authorId": + "144963510", "name": "R. A. Popa"}, {"authorId": "1749858", "name": "V. Vaikuntanathan"}, + {"authorId": "1789973", "name": "N. Zeldovich"}]}, {"paperId": "736a8e786d3e8b3a5b06d57648c83b14243a6479", "externalIds": {"DBLP": "journals/corr/abs-1211-1302", "MAG": "2963123289", "ArXiv": "1211.1302", "PubMedCentral": "4014489", "DOI": "10.1371/journal.pone.0096223", - "CorpusId": 10562121, "PubMed": "24809449"}, "url": "https://www.semanticscholar.org/paper/736a8e786d3e8b3a5b06d57648c83b14243a6479", + "CorpusId": 10562121, "PubMed": "24809449"}, "corpusId": 10562121, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/736a8e786d3e8b3a5b06d57648c83b14243a6479", "title": "Calculating Kolmogorov Complexity from the Output Frequency Distributions of Small Turing Machines", "abstract": "Drawing on various notions from theoretical computer science, we present a novel numerical approach, motivated by the @@ -1211,55 +1472,21 @@ interactions: Calculator implementing this technique and making the data available to the research community is accessible at http://www.complexitycalculator.com.", "venue": "PLoS ONE", "year": 2012, "referenceCount": 82, "citationCount": - 142, "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science", "Medicine", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-11-06", "journal": {"name": "PLoS ONE", "volume": "9"}, "authors": [{"authorId": - "1389866422", "name": "F. Soler-Toscano"}, {"authorId": "66445647", "name": - "H. Zenil"}, {"authorId": "2027817702", "name": "J. Delahaye"}, {"authorId": - "3159526", "name": "N. Gauvrit"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", - "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": - 28057065, "PubMed": "25544713"}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", - "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", - "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": - 64, "citationCount": 96, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2015-02-01", "journal": {"name": "Trends - in genetics : TIG", "pages": "\n 88-96\n ", "volume": "31 - 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu Watanabe"}, {"authorId": - "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "2b352a475a16b3e12b1af1cf9231ba824db9f937", - "externalIds": {"DBLP": "journals/tcas/BuscarinoCFFC16", "MAG": "2485899172", - "DOI": "10.1109/TCSI.2016.2564738", "CorpusId": 36502203}, "url": "https://www.semanticscholar.org/paper/2b352a475a16b3e12b1af1cf9231ba824db9f937", - "title": "Turing Patterns in Memristive Cellular Nonlinear Networks", "abstract": - "The formation of ordered structures, in particular Turing patterns, in complex - spatially extended systems has been observed in many different contexts, spanning - from natural sciences (chemistry, physics, and biology) to technology (mechanics - and electronics). In this paper, it is shown that the use of memristors in - a simple cell of a spatially-extended circuit architecture allows us to design - systems able to generate Turing patterns. In addition, the memristor parameters - play a key role in the selection of the type and characteristics of the emerging - pattern, which is also influenced by the initial conditions. The problem of - finding the regions of parameters where Turing patterns may emerge in the - proposed cellular architecture is solved in an analytic way, and numerical - results are shown to illustrate the system behavior with respect to its parameters.", - "venue": "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", - "year": 2016, "referenceCount": 32, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-07-13", "journal": {"name": "IEEE Transactions on - Circuits and Systems I: Regular Papers", "pages": "1222-1230", "volume": "63"}, - "authors": [{"authorId": "1884234", "name": "A. Buscarino"}, {"authorId": - "48285431", "name": "C. Corradino"}, {"authorId": "143998340", "name": "L. - Fortuna"}, {"authorId": "1766733", "name": "M. Frasca"}, {"authorId": "144848684", - "name": "L. Chua"}]}, {"paperId": "ececf989a13264a455ec2898ed361b1c435b5f0c", - "externalIds": {"PubMedCentral": "4360114", "MAG": "2099530148", "DOI": "10.1098/rstb.2014.0218", - "CorpusId": 1594833, "PubMed": "25750229"}, "url": "https://www.semanticscholar.org/paper/ececf989a13264a455ec2898ed361b1c435b5f0c", + 143, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": + {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0096223&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-11-06", "journal": {"name": "PLoS ONE", "volume": + "9"}, "authors": [{"authorId": "1389866422", "name": "F. Soler-Toscano"}, + {"authorId": "66445647", "name": "H. Zenil"}, {"authorId": "2027817702", "name": + "J. Delahaye"}, {"authorId": "3159526", "name": "N. Gauvrit"}]}, {"paperId": + "ececf989a13264a455ec2898ed361b1c435b5f0c", "externalIds": {"PubMedCentral": + "4360114", "MAG": "2099530148", "DOI": "10.1098/rstb.2014.0218", "CorpusId": + 1594833, "PubMed": "25750229"}, "corpusId": 1594833, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/ececf989a13264a455ec2898ed361b1c435b5f0c", "title": "Forging patterns and making waves from biology to geology: a commentary on Turing (1952) \u2018The chemical basis of morphogenesis\u2019", "abstract": "Alan Turing was neither a biologist nor a chemist, and yet the paper he published @@ -1281,7 +1508,8 @@ interactions: the 350th anniversary of the journal Philosophical Transactions of the Royal Society.", "venue": "Philosophical Transactions of the Royal Society B: Biological Sciences", "year": 2015, "referenceCount": 53, "citationCount": 76, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Geology", "Medicine"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rstb.2014.0218", + "status": "HYBRID"}, "fieldsOfStudy": ["Biology", "Geology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Geology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", @@ -1289,24 +1517,31 @@ interactions: Transactions of the Royal Society B: Biological Sciences", "volume": "370"}, "authors": [{"authorId": "145164549", "name": "P. Ball"}]}, {"paperId": "257d834280b58f62e8fcd18980162e3fc8f98138", "externalIds": {"DBLP": "books/sp/Soare16", "DOI": "10.1007/978-3-642-31933-4", - "CorpusId": 1500040}, "url": "https://www.semanticscholar.org/paper/257d834280b58f62e8fcd18980162e3fc8f98138", + "CorpusId": 1500040}, "corpusId": 1500040, "publicationVenue": {"id": "1ef7809b-0640-4615-aa43-9f080f8a9445", + "name": "Theory and Applications of Computability", "alternate_names": ["Theory + Appl Comput"], "issn": "2190-619X"}, "url": "https://www.semanticscholar.org/paper/257d834280b58f62e8fcd18980162e3fc8f98138", "title": "Turing Computability", "abstract": null, "venue": "Theory and Applications of Computability", "year": 2016, "referenceCount": 52, "citationCount": 52, - "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"pages": "3-249"}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, - {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": {"MAG": - "2982569830", "CorpusId": 209946616}, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", + "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/bfm%3A978-3-642-31933-4%2F1", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "3-249"}, "authors": [{"authorId": "1760293", "name": + "R. Soare"}]}, {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": + {"MAG": "2982569830", "CorpusId": 209946616}, "corpusId": 209946616, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", "title": "Turing (1936), On Computable Numbers, with an Application to the Entscheidungsproblem", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 62, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}], "publicationTypes": null, "publicationDate": "2016-02-24", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3045814", - "name": "Rossella Lupacchini"}]}, {"paperId": "51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, + "publicationDate": "2016-02-24", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3045814", "name": "Rossella Lupacchini"}]}, {"paperId": "51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", "externalIds": {"MAG": "3030327058", "DBLP": "journals/iacr/KoppulaLW14", - "DOI": "10.1145/2746539.2746614", "CorpusId": 1368494}, "url": "https://www.semanticscholar.org/paper/51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", + "DOI": "10.1145/2746539.2746614", "CorpusId": 1368494}, "corpusId": 1368494, + "publicationVenue": {"id": "166fd2b5-a928-4a98-a449-3b90935cc101", "name": + "IACR Cryptology ePrint Archive", "type": "journal", "alternate_names": ["IACR + Cryptol eprint Arch"], "url": "http://eprint.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", "title": "Indistinguishability Obfuscation for Turing Machines with Unbounded Memory", "abstract": "We show how to build indistinguishability obfuscation (iO) for Turing Machines where the overhead is polynomial in the security @@ -1323,18 +1558,19 @@ interactions: we are at in a proof. We first build up our enforcement ideas in a simpler context of \"message hiding encodings\" and work our way up to indistinguishability obfuscation.", "venue": "IACR Cryptology ePrint Archive", "year": 2015, "referenceCount": - 64, "citationCount": 123, "influentialCitationCount": 10, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["Book", "JournalArticle"], "publicationDate": "2015-06-14", "journal": {"name": - "Proceedings of the forty-seventh annual ACM symposium on Theory of Computing"}, - "authors": [{"authorId": "1827155", "name": "Venkata Koppula"}, {"authorId": - "145071454", "name": "Allison Bishop"}, {"authorId": "145778768", "name": - "Brent Waters"}]}, {"paperId": "fdadb889d47debf18fe82031af4062b2ccf9de86", + 64, "citationCount": 124, "influentialCitationCount": 10, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2015-06-14", + "journal": {"name": "Proceedings of the forty-seventh annual ACM symposium + on Theory of Computing"}, "authors": [{"authorId": "1827155", "name": "Venkata + Koppula"}, {"authorId": "145071454", "name": "Allison Bishop"}, {"authorId": + "145778768", "name": "Brent Waters"}]}, {"paperId": "fdadb889d47debf18fe82031af4062b2ccf9de86", "externalIds": {"MAG": "1955542456", "DOI": "10.1073/pnas.1505748112", "CorpusId": - 32757767, "PubMed": "26307762"}, "url": "https://www.semanticscholar.org/paper/fdadb889d47debf18fe82031af4062b2ccf9de86", + 32757767, "PubMed": "26307762"}, "corpusId": 32757767, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fdadb889d47debf18fe82031af4062b2ccf9de86", "title": "Diverse set of Turing nanopatterns coat corneae across insect lineages", "abstract": "Significance Corneal surfaces of some insects are coated with nipple-like nanostructures reducing the light reflection. Here we provide @@ -1365,16 +1601,35 @@ interactions: be the first-ever biological example of Turing nanopatterns.", "venue": "Proceedings of the National Academy of Sciences", "year": 2015, "referenceCount": 39, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Study"], "publicationDate": "2015-08-11", "journal": {"name": "Proceedings - of the National Academy of Sciences", "pages": "10750 - 10755", "volume": - "112"}, "authors": [{"authorId": "5960117", "name": "A. Blagodatski"}, {"authorId": - "47141264", "name": "A. Sergeev"}, {"authorId": "145583716", "name": "M. Kryuchkov"}, - {"authorId": "16047326", "name": "Y. Lopatina"}, {"authorId": "3875456", "name": - "V. Katanaev"}]}, {"paperId": "0ae19a6937d504e654a597543779f1b1c027562f", - "externalIds": {"CorpusId": 17049388}, "url": "https://www.semanticscholar.org/paper/0ae19a6937d504e654a597543779f1b1c027562f", + "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/112/34/10750.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Study"], "publicationDate": "2015-08-11", "journal": {"name": + "Proceedings of the National Academy of Sciences", "pages": "10750 - 10755", + "volume": "112"}, "authors": [{"authorId": "5960117", "name": "A. Blagodatski"}, + {"authorId": "47141264", "name": "A. Sergeev"}, {"authorId": "145583716", + "name": "M. Kryuchkov"}, {"authorId": "16047326", "name": "Y. Lopatina"}, + {"authorId": "3875456", "name": "V. Katanaev"}]}, {"paperId": "2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", + "externalIds": {"MAG": "2315683245", "DBLP": "conf/automata/BarbieriKS16", + "ArXiv": "1603.08715", "DOI": "10.1007/978-3-319-39300-1_5", "CorpusId": 12270213}, + "corpusId": 12270213, "publicationVenue": {"id": "1ecbe314-9ae3-4d24-b161-c8dc331acd3b", + "name": "International Workshop on Cellular Automata and Discrete Complex + Systems", "type": "conference", "alternate_names": ["AUTOMATA", "Int Workshop + Cell Autom Discret Complex Syst"]}, "url": "https://www.semanticscholar.org/paper/2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", + "title": "The Group of Reversible Turing Machines", "abstract": null, "venue": + "International Workshop on Cellular Automata and Discrete Complex Systems", + "year": 2016, "referenceCount": 39, "citationCount": 23, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1603.08715", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-03-29", "journal": {"pages": "49-62"}, "authors": [{"authorId": "48429615", + "name": "S. Barbieri"}, {"authorId": "1753080", "name": "J. Kari"}, {"authorId": + "1789048", "name": "V. Salo"}]}, {"paperId": "0ae19a6937d504e654a597543779f1b1c027562f", + "externalIds": {"CorpusId": 17049388}, "corpusId": 17049388, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0ae19a6937d504e654a597543779f1b1c027562f", "title": "The Church-Turing Thesis", "abstract": "cell containing a left end marker ` (never written over) and extends to infinitely many cells to the right. This machine has a head that can move left or right one cell in each @@ -1401,25 +1656,17 @@ interactions: and direction to move the tape head, given the current state and symbol read; it is assumed that no transitions are enabled from either t or r.", "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "37782675", - "name": "Mahesh Viswanathan"}]}, {"paperId": "2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", - "externalIds": {"MAG": "2315683245", "DBLP": "conf/automata/BarbieriKS16", - "ArXiv": "1603.08715", "DOI": "10.1007/978-3-319-39300-1_5", "CorpusId": 12270213}, - "url": "https://www.semanticscholar.org/paper/2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", - "title": "The Group of Reversible Turing Machines", "abstract": null, "venue": - "International Workshop on Cellular Automata and Discrete Complex Systems", - "year": 2016, "referenceCount": 39, "citationCount": 23, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-03-29", "journal": {"pages": "49-62"}, "authors": [{"authorId": "48429615", - "name": "S. Barbieri"}, {"authorId": "1753080", "name": "J. Kari"}, {"authorId": - "1789048", "name": "V. Salo"}]}, {"paperId": "30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "37782675", + "name": "Mahesh Viswanathan"}]}, {"paperId": "30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", "externalIds": {"MAG": "2076118717", "DOI": "10.1126/science.1226804", "CorpusId": - 20013377, "PubMed": "23239739"}, "url": "https://www.semanticscholar.org/paper/30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", + 20013377, "PubMed": "23239739"}, "corpusId": 20013377, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", "title": "Hox Genes Regulate Digit Patterning by Controlling the Wavelength of a Turing-Type Mechanism", "abstract": "Digit Determination Pentadactyly has been an early and rapid innovation of tetrapods. Sheth et al. (p. 1476) @@ -1441,7 +1688,8 @@ interactions: endoskeleton patterns suggests that the pentadactyl state has been achieved through modification of an ancestral Turing-type mechanism.", "venue": "Science", "year": 2012, "referenceCount": 44, "citationCount": 318, "influentialCitationCount": - 16, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 16, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc4486416?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-14", "journal": {"name": "Science", @@ -1451,9 +1699,29 @@ interactions: "name": "Marisa Junco"}, {"authorId": "145631546", "name": "L. Quintana"}, {"authorId": "4351690", "name": "R. Dahn"}, {"authorId": "47986084", "name": "M. Kmita"}, {"authorId": "47254653", "name": "J. Sharpe"}, {"authorId": "3907783", - "name": "M. Ros"}]}, {"paperId": "c5fd63756cc5ac85e25af730e8da710efad43ed5", - "externalIds": {"DBLP": "journals/corr/abs-1205-3856", "ArXiv": "1205.3856", - "MAG": "2963817922", "CorpusId": 2749452}, "url": "https://www.semanticscholar.org/paper/c5fd63756cc5ac85e25af730e8da710efad43ed5", + "name": "M. Ros"}]}, {"paperId": "36fe20dd69b2160b3030fab2c103f02ee2816756", + "externalIds": {"MAG": "1495676205", "PubMedCentral": "4432648", "DOI": "10.1038/ncomms7971", + "CorpusId": 11824324, "PubMed": "25959141"}, "corpusId": 11824324, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/36fe20dd69b2160b3030fab2c103f02ee2816756", + "title": "Pigment cell movement is not required for generation of Turing patterns + in zebrafish skin", "abstract": null, "venue": "Nature Communications", "year": + 2015, "referenceCount": 32, "citationCount": 40, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/ncomms7971.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-05-11", "journal": {"name": "Nature + Communications", "volume": "6"}, "authors": [{"authorId": "4648400", "name": + "D. Bullara"}, {"authorId": "89673540", "name": "Y. De Decker"}]}, {"paperId": + "c5fd63756cc5ac85e25af730e8da710efad43ed5", "externalIds": {"DBLP": "journals/corr/abs-1205-3856", + "ArXiv": "1205.3856", "MAG": "2963817922", "CorpusId": 2749452}, "corpusId": + 2749452, "publicationVenue": {"id": "e6904c24-9546-4135-8344-e3999e375558", + "name": "Network and Distributed System Security Symposium", "type": "conference", + "alternate_names": ["Netw Distrib Syst Secur Symp", "NDSS"], "url": "http://www.isoc.org/"}, + "url": "https://www.semanticscholar.org/paper/c5fd63756cc5ac85e25af730e8da710efad43ed5", "title": "Social Turing Tests: Crowdsourcing Sybil Detection", "abstract": "As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks @@ -1470,45 +1738,41 @@ interactions: study data, we show that this system is scalable, and can be highly effective either as a standalone system or as a complementary technique to current tools.", "venue": "Network and Distributed System Security Symposium", "year": 2012, - "referenceCount": 37, "citationCount": 182, "influentialCitationCount": 13, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2012-05-01", - "journal": {"name": "ArXiv", "volume": "abs/1205.3856"}, "authors": [{"authorId": - "2096527", "name": "G. Wang"}, {"authorId": "2802925", "name": "M. Mohanlal"}, - {"authorId": "35497150", "name": "Christo Wilson"}, {"authorId": "144129720", - "name": "Xiao Wang"}, {"authorId": "1976593", "name": "Miriam J. Metzger"}, - {"authorId": "2704852", "name": "Haitao Zheng"}, {"authorId": "145970007", - "name": "Ben Y. Zhao"}]}, {"paperId": "748a8803deb06c5e51e5cf17496ea01aae923a48", - "externalIds": {"MAG": "2008912593", "DBLP": "journals/algorithmica/HermelinKSWW15", - "DOI": "10.1007/s00453-014-9910-8", "CorpusId": 15612295}, "url": "https://www.semanticscholar.org/paper/748a8803deb06c5e51e5cf17496ea01aae923a48", + "referenceCount": 37, "citationCount": 183, "influentialCitationCount": 13, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2012-05-01", "journal": {"name": "ArXiv", + "volume": "abs/1205.3856"}, "authors": [{"authorId": "2096527", "name": "G. + Wang"}, {"authorId": "2802925", "name": "M. Mohanlal"}, {"authorId": "35497150", + "name": "Christo Wilson"}, {"authorId": "144129720", "name": "Xiao Wang"}, + {"authorId": "1976593", "name": "Miriam J. Metzger"}, {"authorId": "2704852", + "name": "Haitao Zheng"}, {"authorId": "145970007", "name": "Ben Y. Zhao"}]}, + {"paperId": "748a8803deb06c5e51e5cf17496ea01aae923a48", "externalIds": {"MAG": + "2008912593", "DBLP": "journals/algorithmica/HermelinKSWW15", "DOI": "10.1007/s00453-014-9910-8", + "CorpusId": 15612295}, "corpusId": 15612295, "publicationVenue": {"id": "300eb16f-ce6c-495a-8da3-2e691bf9051d", + "name": "Algorithmica", "type": "journal", "issn": "0178-4617", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/453", + "alternate_urls": ["https://link.springer.com/journal/453", "http://www.springer.com/computer/theoretical+computer+science/journal/453"]}, + "url": "https://www.semanticscholar.org/paper/748a8803deb06c5e51e5cf17496ea01aae923a48", "title": "A Completeness Theory for Polynomial (Turing) Kernelization", "abstract": null, "venue": "Algorithmica", "year": 2013, "referenceCount": 62, "citationCount": - 95, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-09-04", "journal": {"name": "Algorithmica", - "pages": "702-730", "volume": "71"}, "authors": [{"authorId": "1736630", "name": - "D. Hermelin"}, {"authorId": "1692122", "name": "Stefan Kratsch"}, {"authorId": - "3164252", "name": "Karolina Soltys"}, {"authorId": "1849901", "name": "Magnus - Wahlstr\u00f6m"}, {"authorId": "37785191", "name": "Xi Wu"}]}, {"paperId": - "36fe20dd69b2160b3030fab2c103f02ee2816756", "externalIds": {"MAG": "1495676205", - "PubMedCentral": "4432648", "DOI": "10.1038/ncomms7971", "CorpusId": 11824324, - "PubMed": "25959141"}, "url": "https://www.semanticscholar.org/paper/36fe20dd69b2160b3030fab2c103f02ee2816756", - "title": "Pigment cell movement is not required for generation of Turing patterns - in zebrafish skin", "abstract": null, "venue": "Nature Communications", "year": - 2015, "referenceCount": 32, "citationCount": 37, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-05-11", "journal": {"name": "Nature - Communications", "volume": "6"}, "authors": [{"authorId": "4648400", "name": - "D. Bullara"}, {"authorId": "89673540", "name": "Y. De Decker"}]}, {"paperId": - "7281183d1b510a75fc32a9713133c242e6fcc718", "externalIds": {"PubMedCentral": - "4384830", "MAG": "2051172976", "DOI": "10.1021/sb500233u", "CorpusId": 508239, - "PubMed": "25122550"}, "url": "https://www.semanticscholar.org/paper/7281183d1b510a75fc32a9713133c242e6fcc718", + 95, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2013-09-04", "journal": {"name": "Algorithmica", "pages": "702-730", "volume": + "71"}, "authors": [{"authorId": "1736630", "name": "D. Hermelin"}, {"authorId": + "1692122", "name": "Stefan Kratsch"}, {"authorId": "3164252", "name": "Karolina + Soltys"}, {"authorId": "1849901", "name": "Magnus Wahlstr\u00f6m"}, {"authorId": + "37785191", "name": "Xi Wu"}]}, {"paperId": "7281183d1b510a75fc32a9713133c242e6fcc718", + "externalIds": {"PubMedCentral": "4384830", "MAG": "2051172976", "DOI": "10.1021/sb500233u", + "CorpusId": 508239, "PubMed": "25122550"}, "corpusId": 508239, "publicationVenue": + {"id": "ba560e30-4944-4dde-ac86-d977062fe0c5", "name": "ACS Synthetic Biology", + "type": "journal", "alternate_names": ["AC Synth Biology"], "issn": "2161-5063", + "url": "https://pubs.acs.org/journal/asbcd6", "alternate_urls": ["http://pubs.acs.org/journal/asbcd6"]}, + "url": "https://www.semanticscholar.org/paper/7281183d1b510a75fc32a9713133c242e6fcc718", "title": "Cooperativity To Increase Turing Pattern Space for Synthetic Biology", "abstract": "It is hard to bridge the gap between mathematical formulations and biological implementations of Turing patterns, yet this is necessary for @@ -1529,17 +1793,18 @@ interactions: of the limitations of linear scenarios for reaction\u2013diffusion systems and will help to guide projects to engineer synthetic Turing patterns.", "venue": "ACS Synthetic Biology", "year": 2014, "referenceCount": 52, "citationCount": - 39, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-08-14", "journal": {"name": "ACS Synthetic Biology", - "pages": "177 - 186", "volume": "4"}, "authors": [{"authorId": "2372067", - "name": "Luis Diambra"}, {"authorId": "6561683", "name": "V. Senthivel"}, - {"authorId": "47123946", "name": "Diego B\u00e1rcena Men\u00e9ndez"}, {"authorId": - "3091939", "name": "M. Isalan"}]}, {"paperId": "3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", - "externalIds": {"MAG": "300525892", "DBLP": "journals/corr/MalinowskiF14a", - "ArXiv": "1410.8027", "CorpusId": 811868}, "url": "https://www.semanticscholar.org/paper/3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", + 39, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-08-14", "journal": + {"name": "ACS Synthetic Biology", "pages": "177 - 186", "volume": "4"}, "authors": + [{"authorId": "2372067", "name": "Luis Diambra"}, {"authorId": "6561683", + "name": "V. Senthivel"}, {"authorId": "47123946", "name": "Diego B\u00e1rcena + Men\u00e9ndez"}, {"authorId": "3091939", "name": "M. Isalan"}]}, {"paperId": + "3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", "externalIds": {"MAG": "300525892", + "DBLP": "journals/corr/MalinowskiF14a", "ArXiv": "1410.8027", "CorpusId": + 811868}, "corpusId": 811868, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", "title": "Towards a Visual Turing Challenge", "abstract": "As language and visual understanding by machines progresses rapidly, we are observing an increasing interest in holistic architectures that tightly interlink both modalities @@ -1559,38 +1824,42 @@ interactions: driving force to create suitable benchmarks. Providing coverage in this inherently ambiguous output space is an emerging challenge that we face in order to make quantifiable progress in this area.", "venue": "ArXiv", "year": 2014, "referenceCount": - 83, "citationCount": 67, "influentialCitationCount": 12, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-10-29", "journal": {"name": "ArXiv", "volume": "abs/1410.8027"}, "authors": - [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": "1739548", - "name": "Mario Fritz"}]}, {"paperId": "358e1c04f03c2ede4b913a7430e99e78e66f2597", + 83, "citationCount": 68, "influentialCitationCount": 12, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-10-29", "journal": {"name": "ArXiv", "volume": "abs/1410.8027"}, + "authors": [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": + "1739548", "name": "Mario Fritz"}]}, {"paperId": "358e1c04f03c2ede4b913a7430e99e78e66f2597", "externalIds": {"MAG": "1990010228", "DOI": "10.1016/J.ECOCOM.2014.09.002", - "CorpusId": 84059947}, "url": "https://www.semanticscholar.org/paper/358e1c04f03c2ede4b913a7430e99e78e66f2597", + "CorpusId": 84059947}, "corpusId": 84059947, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/358e1c04f03c2ede4b913a7430e99e78e66f2597", "title": "Beyond Turing: The response of patterned ecosystems to environmental change", "abstract": null, "venue": "", "year": 2014, "referenceCount": 60, - "citationCount": 107, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2014-12-01", "journal": {"name": "Ecological Complexity", "pages": "81-96", - "volume": "20"}, "authors": [{"authorId": "3922814", "name": "K. Siteur"}, - {"authorId": "143978708", "name": "E. Siero"}, {"authorId": "6326314", "name": - "M. Eppinga"}, {"authorId": "144207734", "name": "J. Rademacher"}, {"authorId": - "1727787", "name": "A. Doelman"}, {"authorId": "2096458905", "name": "M. Rietkerk"}]}, - {"paperId": "999f90eebe8b3504b1ee3a8a689513b26e18772e", "externalIds": {"MAG": - "2490062034", "DOI": "10.1016/B978-0-12-386980-7.50021-6", "CorpusId": 63444001}, - "url": "https://www.semanticscholar.org/paper/999f90eebe8b3504b1ee3a8a689513b26e18772e", + "citationCount": 108, "influentialCitationCount": 8, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dspace.library.uu.nl/bitstream/1874/307590/1/14.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2014-12-01", "journal": {"name": "Ecological Complexity", + "pages": "81-96", "volume": "20"}, "authors": [{"authorId": "3922814", "name": + "K. Siteur"}, {"authorId": "143978708", "name": "E. Siero"}, {"authorId": + "6326314", "name": "M. Eppinga"}, {"authorId": "144207734", "name": "J. Rademacher"}, + {"authorId": "1727787", "name": "A. Doelman"}, {"authorId": "2096458905", + "name": "M. Rietkerk"}]}, {"paperId": "999f90eebe8b3504b1ee3a8a689513b26e18772e", + "externalIds": {"MAG": "2490062034", "DOI": "10.1016/B978-0-12-386980-7.50021-6", + "CorpusId": 63444001}, "corpusId": 63444001, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/999f90eebe8b3504b1ee3a8a689513b26e18772e", "title": "Turing\u2019s Lecture to the London Mathematical Society on 20 February 1947", "abstract": null, "venue": "", "year": 2013, "referenceCount": 5, "citationCount": - 156, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "481-497", "volume": ""}, "authors": [{"authorId": - "98630872", "name": "S. Cooper"}]}, {"paperId": "9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", + 157, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "481-497", "volume": ""}, "authors": + [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", "externalIds": {"DBLP": "books/cu/D2014", "MAG": "577185743", "DOI": "10.1017/CBO9781107338579.001", - "CorpusId": 19315498}, "url": "https://www.semanticscholar.org/paper/9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", + "CorpusId": 19315498}, "corpusId": 19315498, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", "title": "Turing''s legacy: developments from Turing''s ideas in logic", "abstract": "Turing''s legacy: developments from Turing''s ideas in logic Rod Downey 1. Computability and analysis: the legacy of Alan Turing Jeremy Avigad and Vasco @@ -1607,13 +1876,16 @@ interactions: by recursive step: Church''s analysis of effective calculability Wilfried Sieg 13. Turing and the discovery of computability Robert Irving Soare 14. Transfinite machine models P. D. Welch.", "venue": "Turing''s Legacy", "year": - 2014, "referenceCount": 0, "citationCount": 74, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "vii-x"}, "authors": [{"authorId": - "2134049919", "name": "R. Downey"}]}, {"paperId": "b3b262de503bd160ffcfd33e180d4e56fb41e53b", - "externalIds": {"MAG": "2059483036", "DBLP": "conf/3dim/ShanACFS13", "DOI": - "10.1109/3DV.2013.12", "CorpusId": 1315955}, "url": "https://www.semanticscholar.org/paper/b3b262de503bd160ffcfd33e180d4e56fb41e53b", + 2014, "referenceCount": 0, "citationCount": 76, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "vii-x"}, "authors": [{"authorId": "2134049919", "name": "R. Downey"}]}, + {"paperId": "b3b262de503bd160ffcfd33e180d4e56fb41e53b", "externalIds": {"MAG": + "2059483036", "DBLP": "conf/3dim/ShanACFS13", "DOI": "10.1109/3DV.2013.12", + "CorpusId": 1315955}, "corpusId": 1315955, "publicationVenue": {"id": "4b02e809-1c26-4203-b9ba-311a418f664b", + "name": "International Conference on 3D Vision", "type": "conference", "alternate_names": + ["Int Conf 3D Vis", "3DV"]}, "url": "https://www.semanticscholar.org/paper/b3b262de503bd160ffcfd33e180d4e56fb41e53b", "title": "The Visual Turing Test for Scene Reconstruction", "abstract": "We present the first large scale system for capturing and rendering relight able scene reconstructions from massive unstructured photo collections taken under @@ -1626,16 +1898,23 @@ interactions: the observer has to guess which is which. While we cannot yet fool human perception, the gap is closing.", "venue": "International Conference on 3D Vision", "year": 2013, "referenceCount": 12, "citationCount": 102, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2013-06-01", "journal": {"name": "2013 - International Conference on 3D Vision", "pages": "25-32"}, "authors": [{"authorId": - "2141964", "name": "Qi Shan"}, {"authorId": "30658914", "name": "R. Adams"}, - {"authorId": "143800609", "name": "B. Curless"}, {"authorId": "1798912", "name": - "Yasutaka Furukawa"}, {"authorId": "1679223", "name": "S. Seitz"}]}, {"paperId": - "a12d167d42e7960f3fd7ecbf9600aa036cc73def", "externalIds": {"DBLP": "journals/jetai/WarwickS15", - "MAG": "2049800859", "DOI": "10.1080/0952813X.2014.921734", "CorpusId": 45773196}, + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-06-01", + "journal": {"name": "2013 International Conference on 3D Vision", "pages": + "25-32"}, "authors": [{"authorId": "2141964", "name": "Qi Shan"}, {"authorId": + "30658914", "name": "R. Adams"}, {"authorId": "143800609", "name": "B. Curless"}, + {"authorId": "1798912", "name": "Yasutaka Furukawa"}, {"authorId": "1679223", + "name": "S. Seitz"}]}, {"paperId": "a12d167d42e7960f3fd7ecbf9600aa036cc73def", + "externalIds": {"DBLP": "journals/jetai/WarwickS15", "MAG": "2049800859", + "DOI": "10.1080/0952813X.2014.921734", "CorpusId": 45773196}, "corpusId": + 45773196, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, "url": "https://www.semanticscholar.org/paper/a12d167d42e7960f3fd7ecbf9600aa036cc73def", "title": "Human misidentification in Turing tests", "abstract": "This paper presents some important issues on misidentification of human interlocutors @@ -1652,14 +1931,15 @@ interactions: that performs well on the Turing test.", "venue": "Journal of experimental and theoretical artificial intelligence (Print)", "year": 2015, "referenceCount": 38, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-04", "journal": - {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "123 - 135", "volume": "27"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": - "01dde81924fc37171a93e2f4115b7beec8f349d9", "externalIds": {"MAG": "2221398315", - "DOI": "10.1080/01445340.2015.1082050", "CorpusId": 61921161}, "url": "https://www.semanticscholar.org/paper/01dde81924fc37171a93e2f4115b7beec8f349d9", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-03-04", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "123 - 135", "volume": "27"}, "authors": [{"authorId": + "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma + Shah"}]}, {"paperId": "01dde81924fc37171a93e2f4115b7beec8f349d9", "externalIds": + {"MAG": "2221398315", "DOI": "10.1080/01445340.2015.1082050", "CorpusId": + 61921161}, "corpusId": 61921161, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/01dde81924fc37171a93e2f4115b7beec8f349d9", "title": "Towards a Historical Notion of \u2018Turing\u2014the Father of Computer Science\u2019", "abstract": "In the popular imagination, the relevance of Turing''s theoretical ideas to people producing actual machines was significant @@ -1689,24 +1969,34 @@ interactions: in Turing''s work and provided the original vector by which Turing became to be appreciated in retrospect as the father of computer science.", "venue": "", "year": 2015, "referenceCount": 128, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-07-03", "journal": {"name": "History and Philosophy of Logic", "pages": - "205 - 228", "volume": "36"}, "authors": [{"authorId": "1745926", "name": - "E. Daylight"}]}, {"paperId": "7224596e2cbafff3c027021fb19410a63f76487b", - "externalIds": {"MAG": "840746988", "DBLP": "conf/mpc/McBride15", "DOI": "10.1007/978-3-319-19797-5_13", - "CorpusId": 1010375}, "url": "https://www.semanticscholar.org/paper/7224596e2cbafff3c027021fb19410a63f76487b", + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://lirias.kuleuven.be/bitstream/123456789/626462/2/A.main.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-07-03", + "journal": {"name": "History and Philosophy of Logic", "pages": "205 - 228", + "volume": "36"}, "authors": [{"authorId": "1745926", "name": "E. Daylight"}]}, + {"paperId": "7224596e2cbafff3c027021fb19410a63f76487b", "externalIds": {"MAG": + "840746988", "DBLP": "conf/mpc/McBride15", "DOI": "10.1007/978-3-319-19797-5_13", + "CorpusId": 1010375}, "corpusId": 1010375, "publicationVenue": {"id": "5d23a701-baa7-4e77-ba87-db9d97e270f7", + "name": "International Conference on Mathematics of Program Construction", + "type": "conference", "alternate_names": ["Math Program Constr", "Int Conf + Math Program Constr", "MPC", "Mathematics of Program Construction"]}, "url": + "https://www.semanticscholar.org/paper/7224596e2cbafff3c027021fb19410a63f76487b", "title": "Turing-Completeness Totally Free", "abstract": null, "venue": "International Conference on Mathematics of Program Construction", "year": 2015, "referenceCount": 25, "citationCount": 38, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2015-06-29", "journal": {"pages": "257-275"}, "authors": [{"authorId": "144883222", - "name": "Conor McBride"}]}, {"paperId": "dda277ca05684e9a56bea891a9c1478e8e531918", + "openAccessPdf": {"url": "https://strathprints.strath.ac.uk/60166/1/McBride_LNCS2015_Turing_completeness_totally_free.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2015-06-29", "journal": {"pages": "257-275"}, "authors": + [{"authorId": "144883222", "name": "Conor McBride"}]}, {"paperId": "dda277ca05684e9a56bea891a9c1478e8e531918", "externalIds": {"MAG": "2081273570", "DOI": "10.1103/PHYSREVLETT.111.024103", - "CorpusId": 14238651, "PubMed": "23889406"}, "url": "https://www.semanticscholar.org/paper/dda277ca05684e9a56bea891a9c1478e8e531918", + "CorpusId": 14238651, "PubMed": "23889406"}, "corpusId": 14238651, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dda277ca05684e9a56bea891a9c1478e8e531918", "title": "Transition from amplitude to oscillation death via Turing bifurcation.", "abstract": "Coupled oscillators are shown to experience two structurally different oscillation quenching types: amplitude death (AD) and oscillation @@ -1717,16 +2007,16 @@ interactions: (OD) steady state, as well as their significance for physical and biological applications and control studies, are also pointed out.", "venue": "Physical Review Letters", "year": 2013, "referenceCount": 64, "citationCount": 104, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2013-07-10", "journal": {"name": "Physical review letters", "pages": "\n 024103\n ", - "volume": "111 2"}, "authors": [{"authorId": "2850131", "name": "A. Koseska"}, - {"authorId": "2046767", "name": "E. Volkov"}, {"authorId": "143842718", "name": - "J. Kurths"}]}, {"paperId": "a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", "externalIds": - {"MAG": "2074603814", "DOI": "10.1093/IMAMAT/HXR050", "CorpusId": 527810}, - "url": "https://www.semanticscholar.org/paper/a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-07-10", "journal": {"name": "Physical review letters", + "pages": "\n 024103\n ", "volume": "111 2"}, "authors": [{"authorId": + "2850131", "name": "A. Koseska"}, {"authorId": "2046767", "name": "E. Volkov"}, + {"authorId": "143842718", "name": "J. Kurths"}]}, {"paperId": "a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", + "externalIds": {"MAG": "2074603814", "DOI": "10.1093/IMAMAT/HXR050", "CorpusId": + 527810}, "corpusId": 527810, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", "title": "Hopf bifurcation and Turing instability in the reaction\u2013diffusion Holling\u2013Tanner predator\u2013prey model", "abstract": "The reaction\u2013diffusion Holling\u2013Tanner predator\u2013prey model with Neumann boundary condition @@ -1738,31 +2028,38 @@ interactions: numerical simulations, we show the bistability of a stable equilibrium solution and a stable periodic solution for ordinary differential equation and the phenomenon that a periodic solution becomes Turing unstable for PDE.", "venue": - "", "year": 2013, "referenceCount": 24, "citationCount": 89, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-04-01", - "journal": {"name": "Ima Journal of Applied Mathematics", "pages": "287-306", - "volume": "78"}, "authors": [{"authorId": "2153897014", "name": "Xin Li"}, - {"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": "1728518", - "name": "Junping Shi"}]}, {"paperId": "bf4bf19f021c48910048741873627691d8277a61", + "", "year": 2013, "referenceCount": 24, "citationCount": 93, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-04-01", "journal": {"name": "Ima Journal of Applied Mathematics", "pages": + "287-306", "volume": "78"}, "authors": [{"authorId": "2153897014", "name": + "Xin Li"}, {"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": + "1728518", "name": "Junping Shi"}]}, {"paperId": "bf4bf19f021c48910048741873627691d8277a61", "externalIds": {"MAG": "101492982", "DBLP": "series/sci/Yampolskiy13", "DOI": - "10.1007/978-3-642-29694-9_1", "CorpusId": 7880844}, "url": "https://www.semanticscholar.org/paper/bf4bf19f021c48910048741873627691d8277a61", + "10.1007/978-3-642-29694-9_1", "CorpusId": 7880844}, "corpusId": 7880844, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf4bf19f021c48910048741873627691d8277a61", "title": "Turing Test as a Defining Feature of AI-Completeness", "abstract": null, "venue": "Artificial Intelligence, Evolutionary Computing and Metaheuristics", "year": 2013, "referenceCount": 77, "citationCount": 80, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://cecs.louisville.edu/ry/TuringTestasaDefiningFeature04270003.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "3-17"}, "authors": [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "710daed4f84e16e16a3a336e734a21f6a5e1f7d5", "externalIds": {"PubMedCentral": "3303118", "MAG": "2039888453", "DOI": "10.1038/ng.1090", - "CorpusId": 4649834, "PubMed": "22344222"}, "url": "https://www.semanticscholar.org/paper/710daed4f84e16e16a3a336e734a21f6a5e1f7d5", + "CorpusId": 4649834, "PubMed": "22344222"}, "corpusId": 4649834, "publicationVenue": + {"id": "bb27e645-e57c-42c3-bcbc-c7b443c58209", "name": "Nature Genetics", + "type": "journal", "alternate_names": ["Nat Genet"], "issn": "1061-4036", + "url": "http://www.nature.com/ng/", "alternate_urls": ["http://www.nature.com/ng/index.html"]}, + "url": "https://www.semanticscholar.org/paper/710daed4f84e16e16a3a336e734a21f6a5e1f7d5", "title": "Periodic stripe formation by a Turing-mechanism operating at growth zones in the mammalian palate", "abstract": null, "venue": "Nature Genetics", - "year": 2012, "referenceCount": 38, "citationCount": 220, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + "year": 2012, "referenceCount": 38, "citationCount": 222, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc3303118?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-09", "journal": {"name": "Nature @@ -1772,9 +2069,43 @@ interactions: "name": "P. Sharpe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}, {"authorId": "145155351", "name": "M. A. Basson"}, {"authorId": "1398203964", "name": "A. Gritli-Linde"}, {"authorId": "3748305", "name": "M. Cobourne"}, {"authorId": - "2113478488", "name": "Jeremy B. A. Green"}]}, {"paperId": "4368e42c838d031625def660ed724455a393883f", - "externalIds": {"MAG": "2001888401", "DOI": "10.1103/PHYSREVE.90.052908", - "CorpusId": 37161709, "PubMed": "25493859"}, "url": "https://www.semanticscholar.org/paper/4368e42c838d031625def660ed724455a393883f", + "2113478488", "name": "Jeremy B. A. Green"}]}, {"paperId": "25b65ca65ce0499855df6be6ab1a6575ad60f10a", + "externalIds": {"MAG": "2168169421", "ArXiv": "1310.6571", "DOI": "10.1103/PhysRevE.88.042925", + "CorpusId": 715587, "PubMed": "24229267"}, "corpusId": 715587, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/25b65ca65ce0499855df6be6ab1a6575ad60f10a", + "title": "Turing pattern formation in the Brusselator system with nonlinear + diffusion.", "abstract": "In this work we investigate the effect of density-dependent + nonlinear diffusion on pattern formation in the Brusselator system. Through + linear stability analysis of the basic solution we determine the Turing and + the oscillatory instability boundaries. A comparison with the classical linear + diffusion shows how nonlinear diffusion favors the occurrence of Turing pattern + formation. We study the process of pattern formation both in one-dimensional + and two-dimensional spatial domains. Through a weakly nonlinear multiple scales + analysis we derive the equations for the amplitude of the stationary patterns. + The analysis of the amplitude equations shows the occurrence of a number of + different phenomena, including stable supercritical and subcritical Turing + patterns with multiple branches of stable solutions leading to hysteresis. + Moreover, we consider traveling patterning waves: When the domain size is + large, the pattern forms sequentially and traveling wave fronts are the precursors + to patterning. We derive the Ginzburg-Landau equation and describe the traveling + front enveloping a pattern which invades the domain. We show the emergence + of radially symmetric target patterns, and, through a matching procedure, + we construct the outer amplitude equation and the inner core solution.", "venue": + "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": + 2013, "referenceCount": 69, "citationCount": 79, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1310.6571", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2013-10-01", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042925\n ", + "volume": "88 4"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, + {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": + "M. Sammartino"}, {"authorId": "6832964", "name": "V. Sciacca"}]}, {"paperId": + "4368e42c838d031625def660ed724455a393883f", "externalIds": {"MAG": "2001888401", + "DOI": "10.1103/PHYSREVE.90.052908", "CorpusId": 37161709, "PubMed": "25493859"}, + "corpusId": 37161709, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4368e42c838d031625def660ed724455a393883f", "title": "Delay-induced Turing instability in reaction-diffusion equations.", "abstract": "Time delays have been commonly used in modeling biological systems and can significantly change the dynamics of these systems. Quite a few works @@ -1791,16 +2122,21 @@ interactions: that the critical delay is a decreasing function of the ratio of carrying capacity to half saturation of the prey density.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": - 8, "citationCount": 59, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-11-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 052908\n ", + 8, "citationCount": 63, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://researchbank.swinburne.edu.au/file/f8bb9895-ebea-4537-9dac-ab6a888c67fc/1/PDF + (Published version).pdf", "status": "GREEN"}, "fieldsOfStudy": ["Medicine", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-11-01", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 052908\n ", "volume": "90 5-1"}, "authors": [{"authorId": "1742870", "name": "Tonghua Zhang"}, {"authorId": "144921840", "name": "Hong Zang"}]}, {"paperId": "2be24c021f2548c7d4da649748aa1f53ba035732", "externalIds": {"MAG": "2161045785", "DOI": "10.1098/rsfs.2011.0113", "CorpusId": - 18186798, "PubMed": "23919129"}, "url": "https://www.semanticscholar.org/paper/2be24c021f2548c7d4da649748aa1f53ba035732", + 18186798, "PubMed": "23919129"}, "corpusId": 18186798, "publicationVenue": + {"id": "692a1437-389a-429a-b9b0-7a8182722f06", "name": "Interface Focus", + "type": "journal", "issn": "2042-8898", "url": "http://rsfs.royalsocietypublishing.org/"}, + "url": "https://www.semanticscholar.org/paper/2be24c021f2548c7d4da649748aa1f53ba035732", "title": "Turing''s model for biological pattern formation and the robustness problem", "abstract": "One of the fundamental questions in developmental biology is how the vast range of pattern and structure we observe in nature emerges @@ -1815,18 +2151,23 @@ interactions: basic properties of Turing''s theory, we highlight the successes and pitfalls of using it as a model for biological systems, and discuss emerging developments in the area.", "venue": "Interface Focus", "year": 2012, "referenceCount": - 50, "citationCount": 196, "influentialCitationCount": 7, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2012-08-06", "journal": - {"name": "Interface Focus", "pages": "487 - 496", "volume": "2"}, "authors": - [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "6566804", "name": - "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": + 50, "citationCount": 201, "influentialCitationCount": 7, "isOpenAccess": true, + "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsfs.2011.0113", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2012-08-06", + "journal": {"name": "Interface Focus", "pages": "487 - 496", "volume": "2"}, + "authors": [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "6566804", + "name": "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "37236426", "name": "S. S. Lee"}]}, {"paperId": "79c13947d11cc1bb4461dea03a8c084333f255cc", "externalIds": {"MAG": "2149257324", "DBLP": "journals/ijns/CabessaS14", "DOI": "10.1142/S0129065714500294", - "CorpusId": 13188177, "PubMed": "25354762"}, "url": "https://www.semanticscholar.org/paper/79c13947d11cc1bb4461dea03a8c084333f255cc", + "CorpusId": 13188177, "PubMed": "25354762"}, "corpusId": 13188177, "publicationVenue": + {"id": "a042b147-151c-4d51-97c7-40b8434b377a", "name": "International Journal + of Neural Systems", "type": "journal", "alternate_names": ["Int J Neural Syst"], + "issn": "0129-0657", "url": "http://www.worldscinet.com/ijns", "alternate_urls": + ["http://www.worldscinet.com/ijns/ijns.shtml"]}, "url": "https://www.semanticscholar.org/paper/79c13947d11cc1bb4461dea03a8c084333f255cc", "title": "The Super-Turing Computational Power of plastic Recurrent Neural Networks", "abstract": "We study the computational capabilities of a biologically inspired neural model where the synaptic weights, the connectivity pattern, @@ -1849,26 +2190,42 @@ interactions: suitable way the capabilities of brain-like models of computation.", "venue": "International Journal of Neural Systems", "year": 2014, "referenceCount": 67, "citationCount": 54, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-11-20", "journal": - {"name": "International journal of neural systems", "pages": "\n 1450029\n ", - "volume": "24 8"}, "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie - Cabessa"}, {"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": - "25c161313411aea736e72cebd626b41ed8fcef82", "externalIds": {"PubMedCentral": - "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", "CorpusId": 1789930, - "PubMed": "24145394"}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-11-20", "journal": {"name": "International journal of neural systems", + "pages": "\n 1450029\n ", "volume": "24 8"}, "authors": [{"authorId": + "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "2797623", "name": + "H. Siegelmann"}]}, {"paperId": "0e410c91207e835c9cad7618491291e3935e7b91", + "externalIds": {"MAG": "2014564062", "DOI": "10.1007/S11071-013-1114-2", "CorpusId": + 122082126}, "corpusId": 122082126, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e410c91207e835c9cad7618491291e3935e7b91", + "title": "Turing instability and pattern formation of neural networks with + reaction\u2013diffusion terms", "abstract": null, "venue": "", "year": 2014, + "referenceCount": 29, "citationCount": 46, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2014-04-01", "journal": {"name": "Nonlinear Dynamics", "pages": "115-124", + "volume": "76"}, "authors": [{"authorId": "3343834", "name": "Hongyong Zhao"}, + {"authorId": "2048884404", "name": "Xuanxuan Huang"}, {"authorId": "2108177604", + "name": "Xuebing Zhang"}]}, {"paperId": "25c161313411aea736e72cebd626b41ed8fcef82", + "externalIds": {"PubMedCentral": "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", + "CorpusId": 1789930, "PubMed": "24145394"}, "corpusId": 1789930, "publicationVenue": + {"id": "bc96f9bd-89da-4c9a-ab24-27749617f6ff", "name": "Conference on Lasers + and Electro-Optics", "type": "conference", "alternate_names": ["CLEO", "Conf + Laser Electro-optics"]}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", "title": "Formation and control of Turing patterns in a coherent quantum fluid", "abstract": null, "venue": "Conference on Lasers and Electro-Optics", "year": - 2013, "referenceCount": 67, "citationCount": 45, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2013-10-22", "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": - [{"authorId": "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", - "name": "P. Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": + 2013, "referenceCount": 67, "citationCount": 46, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03016.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-10-22", + "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": [{"authorId": + "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", "name": "P. + Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": "93534597", "name": "Y. Tse"}, {"authorId": "118567298", "name": "N. Kwong"}, {"authorId": "34750791", "name": "A. L\u00fccke"}, {"authorId": "5207467", "name": "M. Abbarchi"}, {"authorId": "5012276", "name": "E. Baudin"}, {"authorId": @@ -1878,7 +2235,13 @@ interactions: {"authorId": "2829334", "name": "R. Binder"}, {"authorId": "35055521", "name": "J. Tignon"}, {"authorId": "49371199", "name": "S. Schumacher"}]}, {"paperId": "4901daf067430f3dca14ab32f348c86915021d16", "externalIds": {"MAG": "2130797746", - "DOI": "10.1017/S0956792514000370", "CorpusId": 122542423}, "url": "https://www.semanticscholar.org/paper/4901daf067430f3dca14ab32f348c86915021d16", + "DOI": "10.1017/S0956792514000370", "CorpusId": 122542423}, "corpusId": 122542423, + "publicationVenue": {"id": "04d04afc-8e5c-4c06-98fc-64bd52fa7c8b", "name": + "European journal of applied mathematics", "type": "journal", "alternate_names": + ["Eur J Appl Math", "European Journal of Applied Mathematics", "Eur j appl + math"], "issn": "0956-7925", "url": "https://www.cambridge.org/core/journals/european-journal-of-applied-mathematics", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=EJM"]}, + "url": "https://www.semanticscholar.org/paper/4901daf067430f3dca14ab32f348c86915021d16", "title": "Spatio-temporal organization in a morphochemical electrodeposition model: Hopf and Turing instabilities and their interplay", "abstract": "In this paper, we investigate from a theoretical point of view the 2D reaction-diffusion @@ -1896,15 +2259,32 @@ interactions: approximations of Turing patterns at the steady state and for the simulation of the oscillating Turing\u2013Hopf dynamics.", "venue": "European journal of applied mathematics", "year": 2014, "referenceCount": 80, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2014-12-22", "journal": {"name": "European Journal - of Applied Mathematics", "pages": "143 - 173", "volume": "26"}, "authors": - [{"authorId": "2663085", "name": "D. Lacitignola"}, {"authorId": "2081619", - "name": "B. Bozzini"}, {"authorId": "1914459", "name": "I. Sgura"}]}, {"paperId": - "0bbcd935186d5173766256de636b02974dcd7808", "externalIds": {"MAG": "564330425", - "DOI": "10.2307/j.ctvc77913", "CorpusId": 132210151}, "url": "https://www.semanticscholar.org/paper/0bbcd935186d5173766256de636b02974dcd7808", + 43, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E44F32B9BF463A0C4E752D57B846AF4D/S0956792514000370a.pdf/div-class-title-spatio-temporal-organization-in-a-morphochemical-electrodeposition-model-hopf-and-turing-instabilities-and-their-interplay-div.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-12-22", + "journal": {"name": "European Journal of Applied Mathematics", "pages": "143 + - 173", "volume": "26"}, "authors": [{"authorId": "2663085", "name": "D. Lacitignola"}, + {"authorId": "2081619", "name": "B. Bozzini"}, {"authorId": "1914459", "name": + "I. Sgura"}]}, {"paperId": "e007587c6904551c28d8590c0bbe871978ed1fc3", "externalIds": + {"ArXiv": "1403.0351", "MAG": "1865693766", "DOI": "10.1007/s10440-014-9903-2", + "CorpusId": 119094472}, "corpusId": 119094472, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e007587c6904551c28d8590c0bbe871978ed1fc3", + "title": "Turing Instability and Pattern Formation for the Lengyel\u2013Epstein + System with Nonlinear Diffusion", "abstract": null, "venue": "", "year": 2014, + "referenceCount": 38, "citationCount": 42, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1403.0351", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2014-03-03", "journal": {"name": + "Acta Applicandae Mathematicae", "pages": "283-294", "volume": "132"}, "authors": + [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", + "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, + {"paperId": "0bbcd935186d5173766256de636b02974dcd7808", "externalIds": {"MAG": + "564330425", "DOI": "10.2307/j.ctvc77913", "CorpusId": 132210151}, "corpusId": + 132210151, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0bbcd935186d5173766256de636b02974dcd7808", "title": "Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition", "abstract": "Alan Turing died in 1954, but the themes of his life epitomize the turn of the millennium. A pure mathematician from @@ -1931,70 +2311,16 @@ interactions: admits what all biographers know, but few admit, about their subjects: \"his inner code remains unbroken.\" Alan Turing is still an enigma. --Mary Ellen Curtin", "venue": "", "year": 2014, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2014-11-10", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "25b65ca65ce0499855df6be6ab1a6575ad60f10a", - "externalIds": {"MAG": "2168169421", "ArXiv": "1310.6571", "DOI": "10.1103/PhysRevE.88.042925", - "CorpusId": 715587, "PubMed": "24229267"}, "url": "https://www.semanticscholar.org/paper/25b65ca65ce0499855df6be6ab1a6575ad60f10a", - "title": "Turing pattern formation in the Brusselator system with nonlinear - diffusion.", "abstract": "In this work we investigate the effect of density-dependent - nonlinear diffusion on pattern formation in the Brusselator system. Through - linear stability analysis of the basic solution we determine the Turing and - the oscillatory instability boundaries. A comparison with the classical linear - diffusion shows how nonlinear diffusion favors the occurrence of Turing pattern - formation. We study the process of pattern formation both in one-dimensional - and two-dimensional spatial domains. Through a weakly nonlinear multiple scales - analysis we derive the equations for the amplitude of the stationary patterns. - The analysis of the amplitude equations shows the occurrence of a number of - different phenomena, including stable supercritical and subcritical Turing - patterns with multiple branches of stable solutions leading to hysteresis. - Moreover, we consider traveling patterning waves: When the domain size is - large, the pattern forms sequentially and traveling wave fronts are the precursors - to patterning. We derive the Ginzburg-Landau equation and describe the traveling - front enveloping a pattern which invades the domain. We show the emergence - of radially symmetric target patterns, and, through a matching procedure, - we construct the outer amplitude equation and the inner core solution.", "venue": - "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2013, "referenceCount": 69, "citationCount": 69, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-10-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042925\n ", - "volume": "88 4"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, - {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": - "M. Sammartino"}, {"authorId": "6832964", "name": "V. Sciacca"}]}, {"paperId": - "0e410c91207e835c9cad7618491291e3935e7b91", "externalIds": {"MAG": "2014564062", - "DOI": "10.1007/S11071-013-1114-2", "CorpusId": 122082126}, "url": "https://www.semanticscholar.org/paper/0e410c91207e835c9cad7618491291e3935e7b91", - "title": "Turing instability and pattern formation of neural networks with - reaction\u2013diffusion terms", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 29, "citationCount": 38, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-04-01", - "journal": {"name": "Nonlinear Dynamics", "pages": "115-124", "volume": "76"}, - "authors": [{"authorId": "3343834", "name": "Hongyong Zhao"}, {"authorId": - "2048884404", "name": "Xuanxuan Huang"}, {"authorId": "2108177604", "name": - "Xuebing Zhang"}]}, {"paperId": "e007587c6904551c28d8590c0bbe871978ed1fc3", - "externalIds": {"ArXiv": "1403.0351", "MAG": "1865693766", "DOI": "10.1007/s10440-014-9903-2", - "CorpusId": 119094472}, "url": "https://www.semanticscholar.org/paper/e007587c6904551c28d8590c0bbe871978ed1fc3", - "title": "Turing Instability and Pattern Formation for the Lengyel\u2013Epstein - System with Nonlinear Diffusion", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 38, "citationCount": 36, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2014-03-03", "journal": {"name": - "Acta Applicandae Mathematicae", "pages": "283-294", "volume": "132"}, "authors": - [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", - "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, - {"paperId": "6525b2627f3f304e785dd299c7fa28dbceba52a6", "externalIds": {"ArXiv": - "1206.3431", "MAG": "1827134935", "DBLP": "books/cu/p/AvigadB14", "DOI": "10.1017/CBO9781107338579.002", - "CorpusId": 4495614}, "url": "https://www.semanticscholar.org/paper/6525b2627f3f304e785dd299c7fa28dbceba52a6", + 42, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2014-11-10", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "6525b2627f3f304e785dd299c7fa28dbceba52a6", "externalIds": {"ArXiv": "1206.3431", + "MAG": "1827134935", "DBLP": "books/cu/p/AvigadB14", "DOI": "10.1017/CBO9781107338579.002", + "CorpusId": 4495614}, "corpusId": 4495614, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6525b2627f3f304e785dd299c7fa28dbceba52a6", "title": "Computability and analysis: the legacy of Alan Turing", "abstract": "For most of its history, mathematics was algorithmic in nature. The geometric claims in Euclid\u2019s Elements fall into two distinct categories: \u201cproblems,\u201d @@ -2016,8 +2342,9 @@ interactions: de Fermat in 1654 and developed further by Christian Huygens and Jakob Bernoulli, provided methods for calculating odds related to games of chance. Abraham de Moivre\u2019s 1718 monograph on the subject was", "venue": "Turing''s Legacy", - "year": 2012, "referenceCount": 258, "citationCount": 75, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "year": 2012, "referenceCount": 258, "citationCount": 76, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1206.3431", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -2025,21 +2352,30 @@ interactions: "name": "J. Avigad"}, {"authorId": "1805099", "name": "V. Brattka"}]}, {"paperId": "4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", "externalIds": {"PubMedCentral": "3882759", "MAG": "2950247578", "ArXiv": "1310.6738", "DOI": "10.1038/srep03585", - "CorpusId": 11517888, "PubMed": "24394959"}, "url": "https://www.semanticscholar.org/paper/4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", + "CorpusId": 11517888, "PubMed": "24394959"}, "corpusId": 11517888, "publicationVenue": + {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", "name": "Scientific Reports", + "type": "journal", "alternate_names": ["Sci Rep"], "issn": "2045-2322", "url": + "http://www.nature.com/srep/", "alternate_urls": ["http://www.nature.com/srep/index.html"]}, + "url": "https://www.semanticscholar.org/paper/4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", "title": "Dispersal-induced destabilization of metapopulations and oscillatory Turing patterns in ecological networks", "abstract": null, "venue": "Scientific - Reports", "year": 2013, "referenceCount": 59, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science", - "Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-10-24", "journal": {"name": "Scientific - Reports", "volume": "4"}, "authors": [{"authorId": "6061448", "name": "S. - Hata"}, {"authorId": "3259202", "name": "H. Nakao"}, {"authorId": "2490613", - "name": "A. Mikhailov"}]}, {"paperId": "1518e7c855f47ed9fefde59dd8104c8bc3f10604", - "externalIds": {"ArXiv": "1305.6262", "MAG": "2020305723", "DOI": "10.1088/1478-3975/10/4/046003", - "CorpusId": 3130652, "PubMed": "23770927"}, "url": "https://www.semanticscholar.org/paper/1518e7c855f47ed9fefde59dd8104c8bc3f10604", + Reports", "year": 2013, "referenceCount": 59, "citationCount": 35, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03585.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Physics", "Computer Science", "Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-10-24", "journal": {"name": "Scientific Reports", + "volume": "4"}, "authors": [{"authorId": "6061448", "name": "S. Hata"}, {"authorId": + "3259202", "name": "H. Nakao"}, {"authorId": "2490613", "name": "A. Mikhailov"}]}, + {"paperId": "1518e7c855f47ed9fefde59dd8104c8bc3f10604", "externalIds": {"ArXiv": + "1305.6262", "MAG": "2020305723", "DOI": "10.1088/1478-3975/10/4/046003", + "CorpusId": 3130652, "PubMed": "23770927"}, "corpusId": 3130652, "publicationVenue": + {"id": "dbc23552-b067-4548-b1b7-e6ce9f0ebcbe", "name": "Physical Biology", + "type": "journal", "alternate_names": ["Phys Biology"], "issn": "1478-3967", + "url": "http://iopscience.iop.org/1478-3975/", "alternate_urls": ["https://iopscience.iop.org/journal/1478-3975", + "http://iopscience.org/pb"]}, "url": "https://www.semanticscholar.org/paper/1518e7c855f47ed9fefde59dd8104c8bc3f10604", "title": "Kidney branching morphogenesis under the control of a ligand\u2013receptor-based Turing mechanism", "abstract": "The main signalling proteins that control early kidney branching have been defined. Yet the underlying mechanism is @@ -2060,46 +2396,36 @@ interactions: are met also by other receptor\u2013ligand systems. We propose that ligand\u2013receptor-based Turing patterns represent a general mechanism to control branching morphogenesis and other developmental processes.", "venue": "Physical Biology", "year": - 2013, "referenceCount": 81, "citationCount": 59, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], - "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 2013, "referenceCount": 81, "citationCount": 60, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1305.6262", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-05-27", "journal": {"name": "Physical Biology", "volume": "10"}, "authors": [{"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", "name": "D. Iber"}]}, {"paperId": "647746026ab21765a506f406072bd7359211cd24", "externalIds": {"MAG": "2045982128", "DBLP": "conf/lics/BojanczykKLT13", "DOI": - "10.1109/LICS.2013.24", "CorpusId": 2163160}, "url": "https://www.semanticscholar.org/paper/647746026ab21765a506f406072bd7359211cd24", + "10.1109/LICS.2013.24", "CorpusId": 2163160}, "corpusId": 2163160, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/647746026ab21765a506f406072bd7359211cd24", "title": "Turing Machines with Atoms", "abstract": "We study Turing machines over sets with atoms, also known as nominal sets. Our main result is that deterministic machines are weaker than nondeterministic ones; in particular, P\u2260NP in sets with atoms. Our main construction is closely related to the Cai-Furer-Immerman graphs used in descriptive complexity theory.", "venue": "2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science", "year": - 2013, "referenceCount": 15, "citationCount": 52, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-06-25", "journal": {"name": "2013 28th Annual ACM/IEEE - Symposium on Logic in Computer Science", "pages": "183-192"}, "authors": [{"authorId": - "1706643", "name": "M. Bojanczyk"}, {"authorId": "35244823", "name": "Bartek - Klin"}, {"authorId": "2447489", "name": "S. Lasota"}, {"authorId": "2964062", - "name": "Szymon Toru\u0144czyk"}]}, {"paperId": "417cd61563f870cb19541f4afc639a85ec1c6628", - "externalIds": {"MAG": "2337525307", "ArXiv": "1209.2772", "DOI": "10.1007/s11538-013-9834-5", - "CorpusId": 16968855, "PubMed": "23546926"}, "url": "https://www.semanticscholar.org/paper/417cd61563f870cb19541f4afc639a85ec1c6628", - "title": "Turing Patterns from Dynamics of Early HIV Infection", "abstract": - null, "venue": "Bulletin of Mathematical Biology", "year": 2012, "referenceCount": - 41, "citationCount": 53, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-09-13", "journal": {"name": "Bulletin of Mathematical - Biology", "pages": "774-795", "volume": "75"}, "authors": [{"authorId": "4874286", - "name": "O. Stancevic"}, {"authorId": "2813671", "name": "C. Angstmann"}, - {"authorId": "47465046", "name": "J. M. Murray"}, {"authorId": "39683695", - "name": "B. Henry"}]}, {"paperId": "d1f47aad6d196823abebc2b5d5a85b6dcada3707", - "externalIds": {"MAG": "609368779", "DOI": "10.5860/choice.51-2125", "CorpusId": - 44009886}, "url": "https://www.semanticscholar.org/paper/d1f47aad6d196823abebc2b5d5a85b6dcada3707", + 2013, "referenceCount": 15, "citationCount": 53, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-06-25", "journal": + {"name": "2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science", + "pages": "183-192"}, "authors": [{"authorId": "1706643", "name": "M. Bojanczyk"}, + {"authorId": "35244823", "name": "Bartek Klin"}, {"authorId": "2447489", "name": + "S. Lasota"}, {"authorId": "2964062", "name": "Szymon Toru\u0144czyk"}]}, + {"paperId": "d1f47aad6d196823abebc2b5d5a85b6dcada3707", "externalIds": {"MAG": + "609368779", "DOI": "10.5860/choice.51-2125", "CorpusId": 44009886}, "corpusId": + 44009886, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d1f47aad6d196823abebc2b5d5a85b6dcada3707", "title": "Alan Turing: His Work and Impact", "abstract": "\"The fact remains that everyone who taps at a keyboard, opening a spreadsheet or a word-processing program, is working on an incarnation of a Turing machine.\"-TIME In this @@ -2120,14 +2446,37 @@ interactions: most significant papers by A.M. Turing.Commentary explaining the significance of each seminal paper by preeminent leaders in the field. Additional resources available online.", "venue": "", "year": 2013, "referenceCount": 0, "citationCount": - 51, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-05-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, - {"authorId": "143817739", "name": "J. V. Leeuwen"}]}, {"paperId": "3bd7858df71adb919d1d4b137cf1c78134d7f33e", + 52, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-05-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "98630872", + "name": "S. Cooper"}, {"authorId": "143817739", "name": "J. V. Leeuwen"}]}, + {"paperId": "417cd61563f870cb19541f4afc639a85ec1c6628", "externalIds": {"MAG": + "2337525307", "ArXiv": "1209.2772", "DOI": "10.1007/s11538-013-9834-5", "CorpusId": + 16968855, "PubMed": "23546926"}, "corpusId": 16968855, "publicationVenue": + {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/417cd61563f870cb19541f4afc639a85ec1c6628", + "title": "Turing Patterns from Dynamics of Early HIV Infection", "abstract": + null, "venue": "Bulletin of Mathematical Biology", "year": 2012, "referenceCount": + 41, "citationCount": 55, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1209.2772", "status": "GREEN"}, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-09-13", "journal": {"name": "Bulletin of Mathematical + Biology", "pages": "774-795", "volume": "75"}, "authors": [{"authorId": "4874286", + "name": "O. Stancevic"}, {"authorId": "2813671", "name": "C. Angstmann"}, + {"authorId": "47465046", "name": "J. M. Murray"}, {"authorId": "39683695", + "name": "B. Henry"}]}, {"paperId": "3bd7858df71adb919d1d4b137cf1c78134d7f33e", "externalIds": {"DBLP": "journals/aicom/Muggleton14", "MAG": "1589462974", - "DOI": "10.3233/AIC-130579", "CorpusId": 14046484}, "url": "https://www.semanticscholar.org/paper/3bd7858df71adb919d1d4b137cf1c78134d7f33e", + "DOI": "10.3233/AIC-130579", "CorpusId": 14046484}, "corpusId": 14046484, + "publicationVenue": {"id": "4c57b6f2-ebab-420d-baf9-cd595e2f2a63", "name": + "AI Communications", "type": "journal", "alternate_names": ["Ai Communications", + "AI Commun", "Ai Commun"], "issn": "0921-7126", "url": "http://content.iospress.com/journals/ai-communications", + "alternate_urls": ["https://www.iospress.nl/html/09217126.php", "https://www.iospress.nl/journal/ai-communications/"]}, + "url": "https://www.semanticscholar.org/paper/3bd7858df71adb919d1d4b137cf1c78134d7f33e", "title": "Alan Turing and the development of Artificial Intelligence", "abstract": "During the centennial year of his birth Alan Turing 1912--1954 has been widely celebrated as having laid the foundations for Computer Science, Automated @@ -2148,46 +2497,15 @@ interactions: within AI, and conclude with a discussion of some of the unresolved challenges he posed within the paper.", "venue": "AI Communications", "year": 2014, "referenceCount": 72, "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "AI Commun.", "pages": "3-10", "volume": "27"}, - "authors": [{"authorId": "145147566", "name": "S. Muggleton"}]}, {"paperId": - "6089b4474ed94a06aba42974fade7009bc77ee4e", "externalIds": {"MAG": "2159039200", - "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", "CorpusId": 18322775}, - "url": "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", - "title": "On Turing dynamical systems and the Atiyah problem", "abstract": - null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", - "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz - Grabowski"}]}, {"paperId": "7d4518f7ba6528967244114a5daaed2884b9b86c", "externalIds": - {"DBLP": "phd/ethos/Rendell14", "MAG": "89603295", "DOI": "10.1007/978-3-319-19842-2", - "CorpusId": 33250805}, "url": "https://www.semanticscholar.org/paper/7d4518f7ba6528967244114a5daaed2884b9b86c", - "title": "Turing machine universality of the game of life", "abstract": null, - "venue": "", "year": 2015, "referenceCount": 29, "citationCount": 31, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-07-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "4692459f05bd9ad5cd672327f23884ad46237fc2", - "externalIds": {"MAG": "50191166", "DBLP": "conf/itp/XuZU13", "DOI": "10.1007/978-3-642-39634-2_13", - "CorpusId": 18610926}, "url": "https://www.semanticscholar.org/paper/4692459f05bd9ad5cd672327f23884ad46237fc2", - "title": "Mechanising Turing Machines and Computability Theory in Isabelle/HOL", - "abstract": null, "venue": "International Conference on Interactive Theorem - Proving", "year": 2013, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "openAccessPdf": {"url": "http://www.doc.ic.ac.uk/~shm/Papers/TuringAI_1.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-07-22", "journal": {"pages": "147-162"}, "authors": - [{"authorId": "2110979820", "name": "Jian Xu"}, {"authorId": "2153647569", - "name": "Xingyuan Zhang"}, {"authorId": "144231186", "name": "Christian Urban"}]}, + "publicationDate": null, "journal": {"name": "AI Commun.", "pages": "3-10", + "volume": "27"}, "authors": [{"authorId": "145147566", "name": "S. Muggleton"}]}, {"paperId": "d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "externalIds": {"MAG": "2016568588", "DOI": "10.1103/PHYSREVE.90.062915", "CorpusId": 42727592, "PubMed": - "25615172"}, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", + "25615172"}, "corpusId": 42727592, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "title": "Turing pattern dynamics in an activator-inhibitor system with superdiffusion.", "abstract": "The fractional operator is introduced to an activator-inhibitor system to describe species anomalous superdiffusion. The effects of the superdiffusive @@ -2207,17 +2525,71 @@ interactions: exponent between the inhibitor and activator is more likely to promote the emergence of the Turing pattern, relative to the normal diffusion.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2014, "referenceCount": 47, "citationCount": 31, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + 2014, "referenceCount": 47, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-12-19", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 062915\n ", "volume": + "90 6"}, "authors": [{"authorId": "2037744526", "name": "Lai Zhang"}, {"authorId": + "1990780", "name": "Canrong Tian"}]}, {"paperId": "7d4518f7ba6528967244114a5daaed2884b9b86c", + "externalIds": {"DBLP": "phd/ethos/Rendell14", "MAG": "89603295", "DOI": "10.1007/978-3-319-19842-2", + "CorpusId": 33250805}, "corpusId": 33250805, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7d4518f7ba6528967244114a5daaed2884b9b86c", + "title": "Turing machine universality of the game of life", "abstract": null, + "venue": "", "year": 2015, "referenceCount": 29, "citationCount": 31, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://uwe-repository.worktribe.com/preview/822581/thesis.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-07-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "6089b4474ed94a06aba42974fade7009bc77ee4e", + "externalIds": {"MAG": "2159039200", "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", + "CorpusId": 18322775}, "corpusId": 18322775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", + "title": "On Turing dynamical systems and the Atiyah problem", "abstract": + null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, + "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1004.2030", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", + "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz + Grabowski"}]}, {"paperId": "4692459f05bd9ad5cd672327f23884ad46237fc2", "externalIds": + {"MAG": "50191166", "DBLP": "conf/itp/XuZU13", "DOI": "10.1007/978-3-642-39634-2_13", + "CorpusId": 18610926}, "corpusId": 18610926, "publicationVenue": {"id": "1b356608-ca93-40d2-8553-8925a463dab9", + "name": "International Conference on Interactive Theorem Proving", "type": + "conference", "alternate_names": ["Interactive Theorem Proving", "Interact + Theorem Proving", "Int Conf Interact Theorem Proving", "ITP"], "url": "https://en.wikipedia.org/wiki/Interactive_Theorem_Proving_(conference)"}, + "url": "https://www.semanticscholar.org/paper/4692459f05bd9ad5cd672327f23884ad46237fc2", + "title": "Mechanising Turing Machines and Computability Theory in Isabelle/HOL", + "abstract": null, "venue": "International Conference on Interactive Theorem + Proving", "year": 2013, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-07-22", "journal": + {"pages": "147-162"}, "authors": [{"authorId": "2110979820", "name": "Jian + Xu"}, {"authorId": "2153647569", "name": "Xingyuan Zhang"}, {"authorId": "144231186", + "name": "Christian Urban"}]}, {"paperId": "6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "externalIds": {"MAG": "2039471684", "DOI": "10.1140/EPJB/E2013-30649-7", + "CorpusId": 121119740}, "corpusId": 121119740, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "title": "Turing instabilities in reaction-diffusion systems with cross diffusion", + "abstract": null, "venue": "", "year": 2013, "referenceCount": 27, "citationCount": + 37, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-12-19", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 062915\n ", "volume": "90 6"}, "authors": [{"authorId": - "2037744526", "name": "Lai Zhang"}, {"authorId": "1990780", "name": "Canrong - Tian"}]}, {"paperId": "f4aaf0a780cd02138aade2a51f99989cc2c962fd", "externalIds": - {"MAG": "2006131432", "ArXiv": "1406.6401", "DOI": "10.1103/PhysRevE.90.042814", - "CorpusId": 9743163, "PubMed": "25375556"}, "url": "https://www.semanticscholar.org/paper/f4aaf0a780cd02138aade2a51f99989cc2c962fd", + "publicationTypes": null, "publicationDate": "2013-04-10", "journal": {"name": + "The European Physical Journal B", "pages": "1-8", "volume": "86"}, "authors": + [{"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "46848249", "name": + "C. Cianci"}, {"authorId": "39866244", "name": "F. Patti"}]}, {"paperId": + "f4aaf0a780cd02138aade2a51f99989cc2c962fd", "externalIds": {"MAG": "2006131432", + "ArXiv": "1406.6401", "DOI": "10.1103/PhysRevE.90.042814", "CorpusId": 9743163, + "PubMed": "25375556"}, "corpusId": 9743163, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f4aaf0a780cd02138aade2a51f99989cc2c962fd", "title": "Turing patterns in multiplex networks.", "abstract": "The theory of patterns formation for a reaction-diffusion system defined on a multiplex is developed by means of a perturbative approach. The interlayer diffusion @@ -2229,7 +2601,8 @@ interactions: away due to cross-talking between layers. Analytical results are compared to direct simulations.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": 32, "citationCount": - 59, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": + 61, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1406.6401", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], @@ -2239,9 +2612,34 @@ interactions: "5903846", "name": "M. Asllani"}, {"authorId": "48664134", "name": "D. M. Busiello"}, {"authorId": "1809355", "name": "T. Carletti"}, {"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "4546397", "name": "Gwendoline Planchon"}]}, - {"paperId": "295572e7977c0fa5dfc388c77a921e6bb9d87c28", "externalIds": {"MAG": - "2032685465", "DOI": "10.1002/adma.201103053", "CorpusId": 11416263, "PubMed": - "22329003"}, "url": "https://www.semanticscholar.org/paper/295572e7977c0fa5dfc388c77a921e6bb9d87c28", + {"paperId": "a68eacfad1978b0c53c113b1884c440193cb8e18", "externalIds": {"DBLP": + "journals/itpro/Strawn14", "DOI": "10.1109/MITP.2014.2", "CorpusId": 24377977}, + "corpusId": 24377977, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a68eacfad1978b0c53c113b1884c440193cb8e18", + "title": "Alan Turing", "abstract": "In this first installment of IT Professional''s + new Mastermind department, which will profile innovators, inventors, and key + people in the fields of IT, computer science, and information systems, George + Strawn reflects on the father of computer science, Alan Turing. He focuses + on Turing''s early theoretical work, noting how unusual it is for a major + theoretical result to precede any practice in a field. Turing devised a simple + process for creating theoretical machines that could implement such procedures, + and he conjectured that these machines could compute anything that was computable + (in other words, they defined computability).", "venue": "IT Professional", + "year": 2018, "referenceCount": 6, "citationCount": 26, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-23", "journal": + {"name": "IT Professional", "pages": "5-7", "volume": "16"}, "authors": [{"authorId": + "2013713", "name": "George O. Strawn"}]}, {"paperId": "295572e7977c0fa5dfc388c77a921e6bb9d87c28", + "externalIds": {"MAG": "2032685465", "DOI": "10.1002/adma.201103053", "CorpusId": + 11416263, "PubMed": "22329003"}, "corpusId": 11416263, "publicationVenue": + {"id": "71697426-616f-45b4-b9d8-d647335a32e6", "name": "Advances in Materials", + "type": "journal", "alternate_names": ["Adv Mater", "Advanced Materials"], + "issn": "2327-2503", "alternate_issns": ["0935-9648"], "url": "http://www.sciencepublishinggroup.com/journal/archive.aspx?amp;issueid=-1&journalid=129", + "alternate_urls": ["http://www.advmat.de/", "https://onlinelibrary.wiley.com/journal/15214095", + "http://www.sciencepublishinggroup.com/journal/archive.aspx?issueid=-1&journalid=129", + "http://www.wiley-vch.de/publish/en/journals/alphabeticIndex/2089/"]}, "url": + "https://www.semanticscholar.org/paper/295572e7977c0fa5dfc388c77a921e6bb9d87c28", "title": "Emergent Criticality in Complex Turing B\u2010Type Atomic Switch Networks", "abstract": "Recent advances in the neuromorphic operation of atomic switches as individual synapse\u2010like devices demonstrate the ability to @@ -2262,95 +2660,16 @@ interactions: networks as an implementable hardware\u2010based platform toward the creation of physically intelligent machines.", "venue": "Advances in Materials", "year": 2012, "referenceCount": 69, "citationCount": 131, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Materials Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-01-10", "journal": {"name": "Advanced Materials", "volume": "24"}, "authors": - [{"authorId": "6408870", "name": "A. Stieg"}, {"authorId": "3469690", "name": - "Audrius V. Avizienis"}, {"authorId": "5991538", "name": "H. O. Sillin"}, - {"authorId": "1402392982", "name": "C. Martin-Olmos"}, {"authorId": "38567152", - "name": "M. Aono"}, {"authorId": "1902938", "name": "J. Gimzewski"}]}, {"paperId": - "a68eacfad1978b0c53c113b1884c440193cb8e18", "externalIds": {"DBLP": "journals/itpro/Strawn14", - "DOI": "10.1109/MITP.2014.2", "CorpusId": 24377977}, "url": "https://www.semanticscholar.org/paper/a68eacfad1978b0c53c113b1884c440193cb8e18", - "title": "Alan Turing", "abstract": "In this first installment of IT Professional''s - new Mastermind department, which will profile innovators, inventors, and key - people in the fields of IT, computer science, and information systems, George - Strawn reflects on the father of computer science, Alan Turing. He focuses - on Turing''s early theoretical work, noting how unusual it is for a major - theoretical result to precede any practice in a field. Turing devised a simple - process for creating theoretical machines that could implement such procedures, - and he conjectured that these machines could compute anything that was computable - (in other words, they defined computability).", "venue": "IT Professional", - "year": 2018, "referenceCount": 6, "citationCount": 25, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-06-23", "journal": {"name": "IT Professional", "pages": - "5-7", "volume": "16"}, "authors": [{"authorId": "2013713", "name": "George - O. Strawn"}]}, {"paperId": "85b093fad42e510598da9a6bb8e81375016ce98c", "externalIds": - {"MAG": "2095518058", "ArXiv": "1407.7114", "DOI": "10.1103/PhysRevE.90.022716", - "CorpusId": 18341472, "PubMed": "25215767"}, "url": "https://www.semanticscholar.org/paper/85b093fad42e510598da9a6bb8e81375016ce98c", - "title": "Feedback, receptor clustering, and receptor restriction to single - cells yield large Turing spaces for ligand-receptor-based Turing models.", - "abstract": "Turing mechanisms can yield a large variety of patterns from - noisy, homogenous initial conditions and have been proposed as patterning - mechanism for many developmental processes. However, the molecular components - that give rise to Turing patterns have remained elusive, and the small size - of the parameter space that permits Turing patterns to emerge makes it difficult - to explain how Turing patterns could evolve. We have recently shown that Turing - patterns can be obtained with a single ligand if the ligand-receptor interaction - is taken into account. Here we show that the general properties of ligand-receptor - systems result in very large Turing spaces. Thus, the restriction of receptors - to single cells, negative feedbacks, regulatory interactions among different - ligand-receptor systems, and the clustering of receptors on the cell surface - all greatly enlarge the Turing space. We further show that the feedbacks that - occur in the FGF10-SHH network that controls lung branching morphogenesis - are sufficient to result in large Turing spaces. We conclude that the cellular - restriction of receptors provides a mechanism to sufficiently increase the - size of the Turing space to make the evolution of Turing patterns likely. - Additional feedbacks may then have further enlarged the Turing space. Given - their robustness and flexibility, we propose that receptor-ligand-based Turing - mechanisms present a general mechanism for patterning in biology.", "venue": - "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2014, "referenceCount": 94, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Mathematics", "source": "external"}, {"category": "Biology", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-07-26", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 022716\n ", - "volume": "90 2"}, "authors": [{"authorId": "2094723809", "name": "Tam\u00e1s - Kurics"}, {"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", - "name": "D. Iber"}]}, {"paperId": "3a0bc3500260b9a5c19a09a0a2b5349c41383145", - "externalIds": {"MAG": "2119455906", "DOI": "10.1098/rsfs.2011.0097", "CorpusId": - 10041916, "PubMed": "23919125"}, "url": "https://www.semanticscholar.org/paper/3a0bc3500260b9a5c19a09a0a2b5349c41383145", - "title": "Turing''s theory of morphogenesis of 1952 and the subsequent discovery - of the crucial role of local self-enhancement and long-range inhibition", - "abstract": "In his pioneering work, Alan Turing showed that de novo pattern - formation is possible if two substances interact that differ in their diffusion - range. Since then, we have shown that pattern formation is possible if, and - only if, a self-enhancing reaction is coupled with an antagonistic process - of longer range. Knowing this crucial condition has enabled us to include - nonlinear interactions, which are required to design molecularly realistic - interactions. Different reaction schemes and their relation to Turing''s proposal - are discussed and compared with more recent observations on the molecular\u2013genetic - level. The antagonistic reaction may be accomplished by an inhibitor that - is produced in the activated region or by a depletion of a component that - is used up during the self-enhancing reaction. The autocatalysis may be realized - by an inhibition of an inhibition. Activating molecules can be processed into - molecules that have an inhibiting function; patterning of the Wnt pathway - is proposed to depend on such a mechanism. Three-component systems, as discussed - in Turing''s paper, are shown to play a major role in the generation of highly - dynamic patterns that never reach a stable state.", "venue": "Interface Focus", - "year": 2012, "referenceCount": 52, "citationCount": 109, "influentialCitationCount": - 9, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-08-06", "journal": {"name": "Interface Focus", "pages": "407 - 416", - "volume": "2"}, "authors": [{"authorId": "145191224", "name": "H. Meinhardt"}]}]} + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Materials Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-01-10", "journal": {"name": "Advanced Materials", + "volume": "24"}, "authors": [{"authorId": "6408870", "name": "A. Stieg"}, + {"authorId": "3469690", "name": "Audrius V. Avizienis"}, {"authorId": "5991538", + "name": "H. O. Sillin"}, {"authorId": "1402392982", "name": "C. Martin-Olmos"}, + {"authorId": "38567152", "name": "M. Aono"}, {"authorId": "1902938", "name": + "J. Gimzewski"}]}]} ' headers: @@ -2359,31 +2678,31 @@ interactions: Connection: - keep-alive Content-Length: - - '189773' + - '216565' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:12 GMT + - Tue, 03 Jan 2023 20:52:43 GMT Via: - - 1.1 089473bef8bc5f21a05ea772689d22f6.cloudfront.net (CloudFront) + - 1.1 3e22c3ef3ef50cb31c6d94b0de030d68.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - 9n7Oen5O-LUnEBRmpT72cXYbQ6cZauBdhYTxkLRVzeaKH4oHXnrGLA== + - uVhAHgb6PbggjGh41J3nH0mvbs4YpSSz3eiEIoPz2wsc5FFopiB8ZQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detC_HHJPHcFfjg= + - eLxQKHVuPHcFavA= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '189773' + - '216565' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:12 GMT + - Tue, 03 Jan 2023 20:52:43 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 1207a193-82bc-4f9d-abad-fd44bc1155e9 + - 1499a982-31fd-4160-a9be-3a2b09621f8c status: code: 200 message: OK @@ -2399,17 +2718,66 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=100&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=100&limit=100 response: body: - string: '{"total": 133388, "offset": 100, "next": 200, "data": [{"paperId": - "b6bacd6d52ef06599369d873a019854358d2868e", "externalIds": {"MAG": "2117828664", - "DOI": "10.1007/s00285-011-0495-4", "CorpusId": 7981873, "PubMed": "22127438"}, + string: '{"total": 133751, "offset": 100, "next": 200, "data": [{"paperId": + "3a0bc3500260b9a5c19a09a0a2b5349c41383145", "externalIds": {"MAG": "2119455906", + "DOI": "10.1098/rsfs.2011.0097", "CorpusId": 10041916, "PubMed": "23919125"}, + "corpusId": 10041916, "publicationVenue": {"id": "692a1437-389a-429a-b9b0-7a8182722f06", + "name": "Interface Focus", "type": "journal", "issn": "2042-8898", "url": + "http://rsfs.royalsocietypublishing.org/"}, "url": "https://www.semanticscholar.org/paper/3a0bc3500260b9a5c19a09a0a2b5349c41383145", + "title": "Turing''s theory of morphogenesis of 1952 and the subsequent discovery + of the crucial role of local self-enhancement and long-range inhibition", + "abstract": "In his pioneering work, Alan Turing showed that de novo pattern + formation is possible if two substances interact that differ in their diffusion + range. Since then, we have shown that pattern formation is possible if, and + only if, a self-enhancing reaction is coupled with an antagonistic process + of longer range. Knowing this crucial condition has enabled us to include + nonlinear interactions, which are required to design molecularly realistic + interactions. Different reaction schemes and their relation to Turing''s proposal + are discussed and compared with more recent observations on the molecular\u2013genetic + level. The antagonistic reaction may be accomplished by an inhibitor that + is produced in the activated region or by a depletion of a component that + is used up during the self-enhancing reaction. The autocatalysis may be realized + by an inhibition of an inhibition. Activating molecules can be processed into + molecules that have an inhibiting function; patterning of the Wnt pathway + is proposed to depend on such a mechanism. Three-component systems, as discussed + in Turing''s paper, are shown to play a major role in the generation of highly + dynamic patterns that never reach a stable state.", "venue": "Interface Focus", + "year": 2012, "referenceCount": 52, "citationCount": 110, "influentialCitationCount": + 9, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc3363033?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-08-06", "journal": + {"name": "Interface Focus", "pages": "407 - 416", "volume": "2"}, "authors": + [{"authorId": "145191224", "name": "H. Meinhardt"}]}, {"paperId": "a8e4100395a3684d7f8523ccf827bad581457a3c", + "externalIds": {"DBLP": "journals/cacm/Haigh14", "MAG": "2142601750", "DOI": + "10.1145/2542504", "CorpusId": 5694189}, "corpusId": 5694189, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a8e4100395a3684d7f8523ccf827bad581457a3c", + "title": "Actually, Turing did not invent the computer", "abstract": "Separating + the origins of computer science and technology.", "venue": "CACM", "year": + 2014, "referenceCount": 6, "citationCount": 32, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Commun. ACM", "pages": "36-41", + "volume": "57"}, "authors": [{"authorId": "1714013", "name": "T. Haigh"}]}, + {"paperId": "b6bacd6d52ef06599369d873a019854358d2868e", "externalIds": {"MAG": + "2117828664", "DOI": "10.1007/s00285-011-0495-4", "CorpusId": 7981873, "PubMed": + "22127438"}, "corpusId": 7981873, "publicationVenue": {"id": "b63919f2-2979-428b-95ba-53029f49a7df", + "name": "Journal of Mathematical Biology", "type": "journal", "alternate_names": + ["J Math Biology"], "issn": "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", + "alternate_urls": ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, "url": "https://www.semanticscholar.org/paper/b6bacd6d52ef06599369d873a019854358d2868e", "title": "Turing instabilities in a mathematical model for signaling networks", "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2012, - "referenceCount": 38, "citationCount": 68, "influentialCitationCount": 7, - "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + "referenceCount": 38, "citationCount": 69, "influentialCitationCount": 8, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1107.1594", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-01", "journal": {"name": "Journal @@ -2418,19 +2786,23 @@ interactions: "name": "Matthias R\u00f6ger"}]}, {"paperId": "8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", "externalIds": {"DBLP": "books/cu/p/Hales14", "ArXiv": "1302.2898", "MAG": "2962739402", "DOI": "10.1017/CBO9781107338579.008", "CorpusId": 37948622}, - "url": "https://www.semanticscholar.org/paper/8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", + "corpusId": 37948622, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", "title": "Mathematics in the age of the Turing machine", "abstract": "The article gives a survey of mathematical proofs that rely on computer calculations and formal proofs.", "venue": "Turing''s Legacy", "year": 2013, "referenceCount": 86, "citationCount": 26, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1302.2898.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2013-02-12", "journal": {"pages": "253-298"}, "authors": [{"authorId": "3312697", "name": "T. Hales"}]}, {"paperId": "a44de800fafc143a1acf781ecde52ebab0ca7f15", "externalIds": {"DBLP": - "conf/woot/HomescuSLBF12", "MAG": "53119127", "CorpusId": 10922062}, "url": - "https://www.semanticscholar.org/paper/a44de800fafc143a1acf781ecde52ebab0ca7f15", + "conf/woot/HomescuSLBF12", "MAG": "53119127", "CorpusId": 10922062}, "corpusId": + 10922062, "publicationVenue": {"id": "340e6ee7-1f78-49e3-b1c0-18d5489035f8", + "name": "Workshop on Offensive Technologies", "type": "conference", "alternate_names": + ["Workshop on Object-Oriented Technology", "Workshop Offensive Technol", "Workshop + Object-oriented Technol", "WOOT"]}, "url": "https://www.semanticscholar.org/paper/a44de800fafc143a1acf781ecde52ebab0ca7f15", "title": "Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming", "abstract": "Return-oriented programming (ROP) has gained a lot of popularity lately, as an attack against currently implemented defenses @@ -2452,29 +2824,35 @@ interactions: to show that many programs indeed contain a Turing-complete set of microgadgets, which attackers can use to perform arbitrary computations.", "venue": "Workshop on Offensive Technologies", "year": 2012, "referenceCount": 20, "citationCount": - 59, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-08-06", "journal": - {"pages": "64-76"}, "authors": [{"authorId": "2069454", "name": "Andrei Homescu"}, - {"authorId": "2067667570", "name": "Michael Stewart"}, {"authorId": "143619283", - "name": "Per Larsen"}, {"authorId": "1742368", "name": "Stefan Brunthaler"}, - {"authorId": "144230973", "name": "M. Franz"}]}, {"paperId": "046f8273608d09f2600e9f33e784ee63193168d7", - "externalIds": {"DBLP": "journals/iandc/BaetenLT13", "ArXiv": "1104.1738", - "MAG": "2951996373", "DOI": "10.1016/j.ic.2013.08.010", "CorpusId": 8550807}, + 59, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-08-06", "journal": {"pages": "64-76"}, "authors": [{"authorId": "2069454", + "name": "Andrei Homescu"}, {"authorId": "2067667570", "name": "Michael Stewart"}, + {"authorId": "143619283", "name": "Per Larsen"}, {"authorId": "1742368", "name": + "Stefan Brunthaler"}, {"authorId": "144230973", "name": "M. Franz"}]}, {"paperId": + "046f8273608d09f2600e9f33e784ee63193168d7", "externalIds": {"DBLP": "journals/iandc/BaetenLT13", + "ArXiv": "1104.1738", "MAG": "2951996373", "DOI": "10.1016/j.ic.2013.08.010", + "CorpusId": 8550807}, "corpusId": 8550807, "publicationVenue": {"id": "d8fc27e3-52dd-4758-bc70-1983b8a26797", + "name": "Information and Computation", "type": "journal", "alternate_names": + ["Inf Comput", "Information & Computation", "Inf Comput"], "issn": "0890-5401", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/622844/description#description", + "alternate_urls": ["http://www.idealibrary.com/links/toc/inco", "http://iandc.csail.mit.edu/", + "http://www.sciencedirect.com/science/journal/08905401", "https://www.journals.elsevier.com/information-and-computation/"]}, "url": "https://www.semanticscholar.org/paper/046f8273608d09f2600e9f33e784ee63193168d7", "title": "Reactive Turing machines", "abstract": null, "venue": "Information and Computation", "year": 2011, "referenceCount": 44, "citationCount": 29, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-04-09", "journal": {"name": "ArXiv", - "volume": "abs/1104.1738"}, "authors": [{"authorId": "1752577", "name": "J. - Baeten"}, {"authorId": "2476141", "name": "B. Luttik"}, {"authorId": "2757605", - "name": "P. V. Tilburg"}]}, {"paperId": "71a45fb7fbaa7abfd2d3af83baca1b926877cdcf", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-04-09", "journal": + {"name": "ArXiv", "volume": "abs/1104.1738"}, "authors": [{"authorId": "1752577", + "name": "J. Baeten"}, {"authorId": "2476141", "name": "B. Luttik"}, {"authorId": + "2757605", "name": "P. V. Tilburg"}]}, {"paperId": "71a45fb7fbaa7abfd2d3af83baca1b926877cdcf", "externalIds": {"MAG": "2467446938", "DOI": "10.5860/choice.50-0319", "CorpusId": - 61137398}, "url": "https://www.semanticscholar.org/paper/71a45fb7fbaa7abfd2d3af83baca1b926877cdcf", + 61137398}, "corpusId": 61137398, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/71a45fb7fbaa7abfd2d3af83baca1b926877cdcf", "title": "Turing''s Cathedral: The Origins of the Digital Universe", "abstract": "George Dyson''s fascinating account of the early years of computers: \"Turing''s Cathedral\" is the story behind how the PC, ipod, smartphone and almost every @@ -2494,14 +2872,15 @@ interactions: as of the discoveries they made, and you do not need any knowledge of computers or mathematics to enjoy the ride. ..a ripping yarn\". (John Gribbin, \"Literary Review\").", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": - 51, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + 51, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2012-12-11", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "28719995", "name": "George B. Dyson"}]}, {"paperId": "1c48a5b52f005c704784ee63b3b7386360e56a75", "externalIds": {"MAG": "2090328157", "DBLP": "journals/corr/Lloyd13", "ArXiv": "1310.3225", "DOI": "10.1098/rsta.2011.0331", - "CorpusId": 5455633, "PubMed": "22711875"}, "url": "https://www.semanticscholar.org/paper/1c48a5b52f005c704784ee63b3b7386360e56a75", + "CorpusId": 5455633, "PubMed": "22711875"}, "corpusId": 5455633, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1c48a5b52f005c704784ee63b3b7386360e56a75", "title": "A Turing test for free will", "abstract": "Before Alan Turing made his crucial contributions to the theory of computation, he studied the question of whether quantum mechanics could throw light on the nature of free will. @@ -2518,19 +2897,25 @@ interactions: this test will tend to believe that he, she, or it possesses free will, whether the world is deterministic or not.", "venue": "Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences", - "year": 2012, "referenceCount": 56, "citationCount": 40, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science", - "Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-07-28", "journal": {"name": "Philosophical - Transactions of the Royal Society A: Mathematical, Physical and Engineering - Sciences", "pages": "3597 - 3610", "volume": "370"}, "authors": [{"authorId": - "145762777", "name": "S. Lloyd"}]}, {"paperId": "440692450a7a79a913906eff75f0e5bca210a2ef", + "year": 2012, "referenceCount": 56, "citationCount": 41, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsta.2011.0331", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine", "Computer Science", "Mathematics", + "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-07-28", "journal": {"name": "Philosophical Transactions + of the Royal Society A: Mathematical, Physical and Engineering Sciences", + "pages": "3597 - 3610", "volume": "370"}, "authors": [{"authorId": "145762777", + "name": "S. Lloyd"}]}, {"paperId": "440692450a7a79a913906eff75f0e5bca210a2ef", "externalIds": {"DBLP": "journals/neco/Zhang12", "MAG": "2141753389", "DOI": - "10.1162/NECO_a_00266", "CorpusId": 15244020, "PubMed": "22295985"}, "url": - "https://www.semanticscholar.org/paper/440692450a7a79a913906eff75f0e5bca210a2ef", + "10.1162/NECO_a_00266", "CorpusId": 15244020, "PubMed": "22295985"}, "corpusId": + 15244020, "publicationVenue": {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", + "name": "Neural Computation", "type": "journal", "alternate_names": ["Neural + Comput"], "issn": "0899-7667", "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", + "http://www.mitpressjournals.org/loi/neco", "https://www.mitpressjournals.org/loi/neco"]}, + "url": "https://www.semanticscholar.org/paper/440692450a7a79a913906eff75f0e5bca210a2ef", "title": "Entropy Estimation in Turing''s Perspective", "abstract": "A new nonparametric estimator of Shannon''s entropy on a countable alphabet is proposed and analyzed against the well-known plug-in estimator. The proposed estimator @@ -2546,29 +2931,35 @@ interactions: for any finite alphabet, the proposed estimator has a bias decaying exponentially in n. Several new bias-adjusted estimators are also discussed.", "venue": "Neural Computation", "year": 2012, "referenceCount": 31, "citationCount": - 45, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": + 45, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-05-01", "journal": {"name": "Neural Computation", "pages": "1368-1389", "volume": "24"}, "authors": [{"authorId": "2117992573", "name": "Zhiyi Zhang"}]}, {"paperId": "4e7804702deecbee5aea58e3205b3fe09df61c3b", "externalIds": {"MAG": "2014027269", "DOI": "10.1016/j.pbiomolbio.2013.03.013", - "CorpusId": 34721095, "PubMed": "23583352"}, "url": "https://www.semanticscholar.org/paper/4e7804702deecbee5aea58e3205b3fe09df61c3b", + "CorpusId": 34721095, "PubMed": "23583352"}, "corpusId": 34721095, "publicationVenue": + {"id": "96513e74-195a-4370-8dc0-e2964f7ef579", "name": "Progress in Biophysics + and Molecular Biology", "type": "journal", "alternate_names": ["Prog Biophys Mol + Biology", "Progress in Biophysics & Molecular Biology", "Prog Biophys Mol + Biology"], "issn": "0079-6107", "url": "http://www.elsevier.com/locate/pbiomolbio", + "alternate_urls": ["https://www.journals.elsevier.com/progress-in-biophysics-and-molecular-biology", + "http://www.sciencedirect.com/science/journal/00796107"]}, "url": "https://www.semanticscholar.org/paper/4e7804702deecbee5aea58e3205b3fe09df61c3b", "title": "Turing on Super-Turing and adaptivity.", "abstract": null, "venue": "Progress in Biophysics and Molecular Biology", "year": 2013, "referenceCount": 63, "citationCount": 21, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2013-09-01", "journal": {"name": "Progress - in biophysics and molecular biology", "pages": "\n 117-26\n ", - "volume": "113 1"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, - {"paperId": "6293bc251cdb48a83deba85aa83064f70f2747bc", "externalIds": {"MAG": - "1606281396", "DOI": "10.5860/choice.51-0322", "CorpusId": 60696647}, "url": - "https://www.semanticscholar.org/paper/6293bc251cdb48a83deba85aa83064f70f2747bc", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2013-09-01", + "journal": {"name": "Progress in biophysics and molecular biology", "pages": + "\n 117-26\n ", "volume": "113 1"}, "authors": [{"authorId": + "2797623", "name": "H. Siegelmann"}]}, {"paperId": "6293bc251cdb48a83deba85aa83064f70f2747bc", + "externalIds": {"MAG": "1606281396", "DOI": "10.5860/choice.51-0322", "CorpusId": + 60696647}, "corpusId": 60696647, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6293bc251cdb48a83deba85aa83064f70f2747bc", "title": "Turing: Pioneer of the Information Age", "abstract": "1. Click to Open 2. Turing''s Universal Machine 3. Sinking Hilbert 4. The Intuitive Mathematician 5. Breaking Enigma 6. Tunny - Hitler''s BlackBerry 7. The Colossus of Computers @@ -2576,82 +2967,140 @@ interactions: 10. Artificial Intelligence 11. The Imitation Game 12. Educating Machinery 13. Computer Chess 14. Artificial Life 15. Epilogue", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 38, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-11-29", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144246233", - "name": "B. Copeland"}]}, {"paperId": "722958e101c8d9caf846c4cb15d0a8d773ae6c6b", - "externalIds": {"MAG": "1518671103", "DOI": "10.1108/03684921211243464", "CorpusId": - 58809660}, "url": "https://www.semanticscholar.org/paper/722958e101c8d9caf846c4cb15d0a8d773ae6c6b", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2012-11-29", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144246233", "name": "B. Copeland"}]}, {"paperId": + "722958e101c8d9caf846c4cb15d0a8d773ae6c6b", "externalIds": {"MAG": "1518671103", + "DOI": "10.1108/03684921211243464", "CorpusId": 58809660}, "corpusId": 58809660, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/722958e101c8d9caf846c4cb15d0a8d773ae6c6b", "title": "Turing''s Cathedral: The Origins of the Digital Universe", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 93, - "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "2012-06-08", "journal": - {"name": "Kybernetes", "pages": "822-823", "volume": "41"}, "authors": [{"authorId": - "16210036", "name": "D. Hutton"}]}, {"paperId": "d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", - "externalIds": {"DBLP": "journals/mcs/GambinoLS12", "MAG": "2169791857", "DOI": - "10.1016/j.matcom.2011.11.004", "CorpusId": 28553827}, "url": "https://www.semanticscholar.org/paper/d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", + "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "2012-06-08", "journal": {"name": "Kybernetes", "pages": "822-823", "volume": + "41"}, "authors": [{"authorId": "16210036", "name": "D. Hutton"}]}, {"paperId": + "d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", "externalIds": {"DBLP": "journals/mcs/GambinoLS12", + "MAG": "2169791857", "DOI": "10.1016/j.matcom.2011.11.004", "CorpusId": 28553827}, + "corpusId": 28553827, "publicationVenue": {"id": "9fb5b1b9-03d6-4b01-96db-b535900babb5", + "name": "Mathematics and Computers in Simulation", "type": "journal", "alternate_names": + ["Math Comput Simul"], "issn": "0378-4754", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505615/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/mathematics-and-computers-in-simulation", + "http://www.sciencedirect.com/science/journal/03784754"]}, "url": "https://www.semanticscholar.org/paper/d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", "title": "Turing instability and traveling fronts for a nonlinear reaction-diffusion system with cross-diffusion", "abstract": null, "venue": "Mathematics and Computers in Simulation", "year": 2012, "referenceCount": 58, "citationCount": - 91, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-02-01", "journal": {"name": "Math. - Comput. Simul.", "pages": "1112-1132", "volume": "82"}, "authors": [{"authorId": - "143670670", "name": "G. Gambino"}, {"authorId": "3106418", "name": "M. Lombardo"}, - {"authorId": "37823401", "name": "M. Sammartino"}]}, {"paperId": "b8a2952ebdd4780bcd8c5f1146c1965f9731437d", + 97, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-02-01", "journal": + {"name": "Math. Comput. Simul.", "pages": "1112-1132", "volume": "82"}, "authors": + [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", + "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, + {"paperId": "55c69622da02f02f5b5a52e42b28b8fec6260796", "externalIds": {"MAG": + "2074371667", "DOI": "10.1016/j.mbs.2011.12.005", "CorpusId": 16409817, "PubMed": + "22207074"}, "corpusId": 16409817, "publicationVenue": {"id": "7ddbf0f3-cc29-4172-b79c-19b9ed50e871", + "name": "Mathematical Biosciences", "alternate_names": ["Math Biosci"], "issn": + "0025-5564", "url": "https://www.journals.elsevier.com/mathematical-biosciences/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00255564"]}, + "url": "https://www.semanticscholar.org/paper/55c69622da02f02f5b5a52e42b28b8fec6260796", + "title": "Turing instabilities and spatio-temporal chaos in ratio-dependent + Holling-Tanner model.", "abstract": null, "venue": "Mathematical Biosciences", + "year": 2012, "referenceCount": 83, "citationCount": 88, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-03-01", "journal": {"name": "Mathematical biosciences", "pages": "\n 64-76\n ", + "volume": "236 1"}, "authors": [{"authorId": "33373208", "name": "M. Banerjee"}, + {"authorId": "2110878825", "name": "Santo Banerjee"}]}, {"paperId": "b8a2952ebdd4780bcd8c5f1146c1965f9731437d", "externalIds": {"MAG": "2057669106", "DOI": "10.1016/j.gde.2012.11.013", "CorpusId": - 24812683, "PubMed": "23276682"}, "url": "https://www.semanticscholar.org/paper/b8a2952ebdd4780bcd8c5f1146c1965f9731437d", + 24812683, "PubMed": "23276682"}, "corpusId": 24812683, "publicationVenue": + {"id": "c828ed19-475e-4afd-ab62-1eac0a2dae95", "name": "Current Opinion in + Genetics and Development", "type": "journal", "alternate_names": ["Current + Opinion in Genetics & Development", "Curr Opin Genet Dev", "Curr Opin Genet Dev"], + "issn": "0959-437X", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/601302/description#description", + "alternate_urls": ["https://www.sciencedirect.com/journal/current-opinion-in-genetics-and-development", + "http://www.sciencedirect.com/science/journal/0959437X"]}, "url": "https://www.semanticscholar.org/paper/b8a2952ebdd4780bcd8c5f1146c1965f9731437d", "title": "Turing patterns in development: what about the horse part?", "abstract": null, "venue": "Current Opinion in Genetics and Development", "year": 2012, "referenceCount": 38, "citationCount": 96, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2012-12-01", "journal": - {"name": "Current opinion in genetics & development", "pages": "\n 578-84\n ", - "volume": "22 6"}, "authors": [{"authorId": "2650134", "name": "L. Marcon"}, - {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "55c69622da02f02f5b5a52e42b28b8fec6260796", - "externalIds": {"MAG": "2074371667", "DOI": "10.1016/j.mbs.2011.12.005", "CorpusId": - 16409817, "PubMed": "22207074"}, "url": "https://www.semanticscholar.org/paper/55c69622da02f02f5b5a52e42b28b8fec6260796", - "title": "Turing instabilities and spatio-temporal chaos in ratio-dependent - Holling-Tanner model.", "abstract": null, "venue": "Mathematical Biosciences", - "year": 2012, "referenceCount": 83, "citationCount": 80, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + "publicationDate": "2012-12-01", "journal": {"name": "Current opinion in genetics + & development", "pages": "\n 578-84\n ", "volume": "22 6"}, + "authors": [{"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "47254653", + "name": "J. Sharpe"}]}, {"paperId": "2ea66fabe4e20f534c848ae69e021c337dc8af60", + "externalIds": {"MAG": "2023622265", "DOI": "10.1103/PHYSREVE.86.026201", + "CorpusId": 25589430, "PubMed": "23005839"}, "corpusId": 25589430, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2ea66fabe4e20f534c848ae69e021c337dc8af60", + "title": "Nonlinear effects on Turing patterns: time oscillations and chaos.", + "abstract": "We show that a model reaction-diffusion system with two species + in a monostable regime and over a large region of parameter space produces + Turing patterns coexisting with a limit cycle which cannot be discerned from + the linear analysis. As a consequence, the patterns oscillate in time. When + varying a single parameter, a series of bifurcations leads to period doubling, + quasiperiodic, and chaotic oscillations without modifying the underlying Turing + pattern. A Ruelle-Takens-Newhouse route to chaos is identified. We also examine + the Turing conditions for obtaining a diffusion-driven instability and show + that the patterns obtained are not necessarily stationary for certain values + of the diffusion coefficients. These results demonstrate the limitations of + the linear analysis for reaction-diffusion systems.", "venue": "Physical review. + E, Statistical, nonlinear, and soft matter physics", "year": 2012, "referenceCount": + 36, "citationCount": 35, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:8025fcc2-1df4-41f2-8d61-c366b39095ae/files/ma8cfc5d1689468435a9b82075b64f6ae", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-03-01", "journal": {"name": "Mathematical - biosciences", "pages": "\n 64-76\n ", "volume": "236 1"}, - "authors": [{"authorId": "33373208", "name": "M. Banerjee"}, {"authorId": - "2110878825", "name": "Santo Banerjee"}]}, {"paperId": "01b66449f7d22fe4845e3e5af57c4828d70ba9af", - "externalIds": {"MAG": "2032619326", "DOI": "10.1038/nrm3120", "CorpusId": - 3480139, "PubMed": "21602907"}, "url": "https://www.semanticscholar.org/paper/01b66449f7d22fe4845e3e5af57c4828d70ba9af", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-08-08", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 026201\n ", "volume": "86 2 Pt 2"}, "authors": + [{"authorId": "145092079", "name": "J. Arag\u00f3n"}, {"authorId": "37747895", + "name": "R. Barrio"}, {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": + "35275545", "name": "R. Baker"}, {"authorId": "2339973", "name": "P. Maini"}]}, + {"paperId": "01b66449f7d22fe4845e3e5af57c4828d70ba9af", "externalIds": {"MAG": + "2032619326", "DOI": "10.1038/nrm3120", "CorpusId": 3480139, "PubMed": "21602907"}, + "corpusId": 3480139, "publicationVenue": {"id": "b3b8f19c-c31b-4847-bc7b-66a18aebedfe", + "name": "Nature reviews. Molecular cell biology", "type": "journal", "alternate_names": + ["Nat Rev Mol Cell Biology", "Nature Reviews Molecular Cell Biology", "Nat + rev Mol cell biology"], "issn": "1471-0072", "url": "https://www.nature.com/nrm/", + "alternate_urls": ["http://www.nature.com/nrm/index.html"]}, "url": "https://www.semanticscholar.org/paper/01b66449f7d22fe4845e3e5af57c4828d70ba9af", "title": "Turing''s next steps: the mechanochemical basis of morphogenesis", "abstract": null, "venue": "Nature reviews. Molecular cell biology", "year": - 2011, "referenceCount": 64, "citationCount": 227, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2011-06-01", "journal": {"name": "Nature Reviews - Molecular Cell Biology", "pages": "392-398", "volume": "12"}, "authors": [{"authorId": - "51027760", "name": "J. Howard"}, {"authorId": "4288008", "name": "S. Grill"}, - {"authorId": "2581310", "name": "J. Bois"}]}, {"paperId": "80b8b1ca9d87902ff7536bfd65dae0d1b715b060", - "externalIds": {"MAG": "2026506642", "DOI": "10.1038/482461a", "CorpusId": - 205070101, "PubMed": "22358811"}, "url": "https://www.semanticscholar.org/paper/80b8b1ca9d87902ff7536bfd65dae0d1b715b060", + 2011, "referenceCount": 64, "citationCount": 228, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2011-06-01", + "journal": {"name": "Nature Reviews Molecular Cell Biology", "pages": "392-398", + "volume": "12"}, "authors": [{"authorId": "51027760", "name": "J. Howard"}, + {"authorId": "4288008", "name": "S. Grill"}, {"authorId": "2581310", "name": + "J. Bois"}]}, {"paperId": "80b8b1ca9d87902ff7536bfd65dae0d1b715b060", "externalIds": + {"MAG": "2026506642", "DOI": "10.1038/482461a", "CorpusId": 205070101, "PubMed": + "22358811"}, "corpusId": 205070101, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/80b8b1ca9d87902ff7536bfd65dae0d1b715b060", "title": "Turing centenary: Life''s code script", "abstract": null, "venue": "Nature", "year": 2012, "referenceCount": 5, "citationCount": 70, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-02-22", "journal": {"name": "Nature", "pages": "461-461", - "volume": "482"}, "authors": [{"authorId": "144284185", "name": "S. Brenner"}]}, - {"paperId": "01980fcdecbb8e4bce9555614629e51f27debcc6", "externalIds": {"DBLP": - "journals/jlms/JockuschS12", "MAG": "2969348684", "ArXiv": "1010.5212", "DOI": - "10.1112/jlms/jdr051", "CorpusId": 883075}, "url": "https://www.semanticscholar.org/paper/01980fcdecbb8e4bce9555614629e51f27debcc6", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-02-22", "journal": {"name": "Nature", + "pages": "461-461", "volume": "482"}, "authors": [{"authorId": "144284185", + "name": "S. Brenner"}]}, {"paperId": "01980fcdecbb8e4bce9555614629e51f27debcc6", + "externalIds": {"DBLP": "journals/jlms/JockuschS12", "MAG": "2969348684", + "ArXiv": "1010.5212", "DOI": "10.1112/jlms/jdr051", "CorpusId": 883075}, "corpusId": + 883075, "publicationVenue": {"id": "71068c9d-6403-4b1c-9f6e-56c01246fe2b", + "name": "Journal of the London Mathematical Society", "type": "journal", "alternate_names": + ["J Lond Math Soc"], "issn": "0024-6107", "url": "https://londmathsoc.onlinelibrary.wiley.com/journal/14697750"}, + "url": "https://www.semanticscholar.org/paper/01980fcdecbb8e4bce9555614629e51f27debcc6", "title": "Generic computability, Turing degrees, and asymptotic density", "abstract": "Generic decidability has been extensively studied in group theory, and we now study it in the context of classical computability theory. A set @@ -2660,6 +3109,7 @@ interactions: domain D, and furthermore D has density 1, that is, lim n\u2192\u221e |{k", "venue": "Journal of the London Mathematical Society", "year": 2010, "referenceCount": 29, "citationCount": 51, "influentialCitationCount": 9, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1010.5212", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": @@ -2667,34 +3117,10 @@ interactions: "publicationDate": "2010-10-25", "journal": {"name": "Journal of the London Mathematical Society", "volume": "85"}, "authors": [{"authorId": "1888089", "name": "C. Jockusch"}, {"authorId": "1705448", "name": "P. Schupp"}]}, {"paperId": - "2ea66fabe4e20f534c848ae69e021c337dc8af60", "externalIds": {"MAG": "2023622265", - "DOI": "10.1103/PHYSREVE.86.026201", "CorpusId": 25589430, "PubMed": "23005839"}, - "url": "https://www.semanticscholar.org/paper/2ea66fabe4e20f534c848ae69e021c337dc8af60", - "title": "Nonlinear effects on Turing patterns: time oscillations and chaos.", - "abstract": "We show that a model reaction-diffusion system with two species - in a monostable regime and over a large region of parameter space produces - Turing patterns coexisting with a limit cycle which cannot be discerned from - the linear analysis. As a consequence, the patterns oscillate in time. When - varying a single parameter, a series of bifurcations leads to period doubling, - quasiperiodic, and chaotic oscillations without modifying the underlying Turing - pattern. A Ruelle-Takens-Newhouse route to chaos is identified. We also examine - the Turing conditions for obtaining a diffusion-driven instability and show - that the patterns obtained are not necessarily stationary for certain values - of the diffusion coefficients. These results demonstrate the limitations of - the linear analysis for reaction-diffusion systems.", "venue": "Physical review. - E, Statistical, nonlinear, and soft matter physics", "year": 2012, "referenceCount": - 36, "citationCount": 34, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-08-08", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 026201\n ", - "volume": "86 2 Pt 2"}, "authors": [{"authorId": "145092079", "name": "J. - Arag\u00f3n"}, {"authorId": "37747895", "name": "R. Barrio"}, {"authorId": - "6566804", "name": "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, - {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": "900d0c1cde69e3b499e4fe32850e604e151a9183", - "externalIds": {"MAG": "2128019864", "ArXiv": "1204.1475", "DOI": "10.1103/PhysRevE.86.046105", - "CorpusId": 21775794, "PubMed": "23214650"}, "url": "https://www.semanticscholar.org/paper/900d0c1cde69e3b499e4fe32850e604e151a9183", + "900d0c1cde69e3b499e4fe32850e604e151a9183", "externalIds": {"MAG": "2128019864", + "ArXiv": "1204.1475", "DOI": "10.1103/PhysRevE.86.046105", "CorpusId": 21775794, + "PubMed": "23214650"}, "corpusId": 21775794, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/900d0c1cde69e3b499e4fe32850e604e151a9183", "title": "Stochastic Turing patterns on a network.", "abstract": "The process of stochastic Turing instability on a scale-free network is discussed for a specific case study: the stochastic Brusselator model. The system is shown @@ -2704,8 +3130,9 @@ interactions: is explained analytically and eventually traced back to the finite-size corrections stemming from the inherent graininess of the scrutinized medium.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2012, "referenceCount": 24, "citationCount": 32, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + 2012, "referenceCount": 24, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1204.1475", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-04-06", "journal": {"name": "Physical @@ -2714,7 +3141,8 @@ interactions: Asslani"}, {"authorId": "2815566", "name": "F. Di Patti"}, {"authorId": "2334449", "name": "D. Fanelli"}]}, {"paperId": "e81db824ddf7499cd10d094f38fefd466a93c611", "externalIds": {"MAG": "2397007421", "DBLP": "conf/birthday/MikkilineniCM12", - "DOI": "10.29007/44jw", "CorpusId": 9893787}, "url": "https://www.semanticscholar.org/paper/e81db824ddf7499cd10d094f38fefd466a93c611", + "DOI": "10.29007/44jw", "CorpusId": 9893787}, "corpusId": 9893787, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e81db824ddf7499cd10d094f38fefd466a93c611", "title": "The Turing O-Machine and the DIME Network Architecture: Injecting the Architectural Resiliency into Distributed Computing", "abstract": "Turing\u2019s o-machine discussed in his PhD thesis can perform all of the usual operations @@ -2741,14 +3169,15 @@ interactions: layers of ad-hoc management software in today\u2019s distributed computing environments.", "venue": "Turing-100", "year": 2012, "referenceCount": 33, "citationCount": 32, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "openAccessPdf": {"url": "https://easychair.org/publications/open/gBD", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-22", "journal": {"pages": "239-251"}, "authors": [{"authorId": "3289961", "name": "Rao V. Mikkilineni"}, {"authorId": "120341528", "name": "A. Comparini"}, {"authorId": "49792148", "name": "G. Morana"}]}, {"paperId": "eaf6596754237bbbabb63ca23738348fb3c44d3d", "externalIds": {"MAG": "2084736067", "DOI": "10.2996/KMJ/1341401049", "CorpusId": - 122190331}, "url": "https://www.semanticscholar.org/paper/eaf6596754237bbbabb63ca23738348fb3c44d3d", + 122190331}, "corpusId": 122190331, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eaf6596754237bbbabb63ca23738348fb3c44d3d", "title": "Unstable subsystems cause Turing instability", "abstract": "We study Turing instabilities in 3-component reaction-di\u00a4usion systems. The existence of a complementary pair of stable-unstable subsystems always gives rise to @@ -2798,39 +3227,47 @@ interactions: stability-instability properties of sub-matrices coexist, and give a perspective for remaining problems. 1.1. Statement of problem. We consider the 3-component system of reaction-di\u00a4usion equations;", "venue": "", "year": 2012, "referenceCount": - 26, "citationCount": 29, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2012-06-01", "journal": {"name": - "Kodai Mathematical Journal", "pages": "215-247", "volume": "35"}, "authors": - [{"authorId": "2188637", "name": "A. Anma"}, {"authorId": "70032451", "name": - "K. Sakamoto"}, {"authorId": "11389399", "name": "Tohru Yoneda"}]}, {"paperId": - "1b842c91d4c25c30f1f3e0f2a710cb922afc639a", "externalIds": {"DBLP": "journals/cacm/Hyman12e", - "MAG": "2003681217", "DOI": "10.1145/2330667.2330675", "CorpusId": 34144242}, - "url": "https://www.semanticscholar.org/paper/1b842c91d4c25c30f1f3e0f2a710cb922afc639a", + 26, "citationCount": 30, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://projecteuclid.org/journals/kodai-mathematical-journal/volume-35/issue-2/Unstable-subsystems-cause-Turing-instability/10.2996/kmj/1341401049.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-06-01", + "journal": {"name": "Kodai Mathematical Journal", "pages": "215-247", "volume": + "35"}, "authors": [{"authorId": "2188637", "name": "A. Anma"}, {"authorId": + "70032451", "name": "K. Sakamoto"}, {"authorId": "11389399", "name": "Tohru + Yoneda"}]}, {"paperId": "1b842c91d4c25c30f1f3e0f2a710cb922afc639a", "externalIds": + {"DBLP": "journals/cacm/Hyman12e", "MAG": "2003681217", "DOI": "10.1145/2330667.2330675", + "CorpusId": 34144242}, "corpusId": 34144242, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1b842c91d4c25c30f1f3e0f2a710cb922afc639a", "title": "In honor of Alan Turing", "abstract": "Thirty-two of the 39 living A.M. Turing Award laureates gathered in San Francisco to pay tribute to \"the father of CS\" and discuss the past, present, and future of computing.", "venue": "CACM", "year": 2012, "referenceCount": 0, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Geology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-09-01", "journal": {"name": "Commun. ACM", "pages": "20-23", "volume": - "55"}, "authors": [{"authorId": "71942287", "name": "P. Hyman"}]}, {"paperId": - "fe7670bf0429a6f4bc5d2d73d30008b95ab28858", "externalIds": {"DBLP": "journals/cacm/Cooper12", - "MAG": "2099294866", "DOI": "10.1145/2093548.2093569", "CorpusId": 38236507}, - "url": "https://www.semanticscholar.org/paper/fe7670bf0429a6f4bc5d2d73d30008b95ab28858", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Geology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-09-01", "journal": {"name": "Commun. ACM", "pages": + "20-23", "volume": "55"}, "authors": [{"authorId": "71942287", "name": "P. + Hyman"}]}, {"paperId": "fe7670bf0429a6f4bc5d2d73d30008b95ab28858", "externalIds": + {"DBLP": "journals/cacm/Cooper12", "MAG": "2099294866", "DOI": "10.1145/2093548.2093569", + "CorpusId": 38236507}, "corpusId": 38236507, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/fe7670bf0429a6f4bc5d2d73d30008b95ab28858", "title": "Turing''s Titanic machine?", "abstract": "Embodied and disembodied computing at the Turing Centenary.", "venue": "Communications of the ACM", "year": 2012, "referenceCount": 46, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=2093569&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-01", "journal": {"name": "Communications of the ACM", "pages": "74 - 83", "volume": "55"}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "3da7e3419d879fad9b02e993758a40e4d205d0e8", - "externalIds": {"CorpusId": 16301943}, "url": "https://www.semanticscholar.org/paper/3da7e3419d879fad9b02e993758a40e4d205d0e8", + "externalIds": {"CorpusId": 16301943}, "corpusId": 16301943, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3da7e3419d879fad9b02e993758a40e4d205d0e8", "title": "The Chemical Bases of Morphogenesis (Reprinted in AM Turing", "abstract": "The construction of redundancy is a private obstacle. It might seem unexpected but is supported by prior work in the field. In fact, few computational biologists @@ -2838,19 +3275,20 @@ interactions: algorithms to verify that the Turing machine and superblock s can interfere to address this problem.", "venue": "", "year": 2011, "referenceCount": 248, "citationCount": 171, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": []}, {"paperId": "4972e61ee8e16b8b2db2535531576151fc5e6e8a", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": []}, {"paperId": "4972e61ee8e16b8b2db2535531576151fc5e6e8a", "externalIds": {"MAG": "2491278050", "DOI": "10.1515/9781400844975", "CorpusId": - 123763078}, "url": "https://www.semanticscholar.org/paper/4972e61ee8e16b8b2db2535531576151fc5e6e8a", + 123763078}, "corpusId": 123763078, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4972e61ee8e16b8b2db2535531576151fc5e6e8a", "title": "Alan Turing: The Enigma: The Centenary Edition", "abstract": null, - "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 38, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}], "publicationTypes": null, - "publicationDate": "2012-05-27", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "040707dc83f9b0b680ad6594cedd455e47bfb1b4", - "externalIds": {"MAG": "2404728161", "DBLP": "conf/birthday/Hernandez-OralloIDH12", - "DOI": "10.29007/9n7d", "CorpusId": 5875412}, "url": "https://www.semanticscholar.org/paper/040707dc83f9b0b680ad6594cedd455e47bfb1b4", + "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 39, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History"], + "s2FieldsOfStudy": [{"category": "History", "source": "external"}], "publicationTypes": + null, "publicationDate": "2012-05-27", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "040707dc83f9b0b680ad6594cedd455e47bfb1b4", "externalIds": {"MAG": "2404728161", + "DBLP": "conf/birthday/Hernandez-OralloIDH12", "DOI": "10.29007/9n7d", "CorpusId": + 5875412}, "corpusId": 5875412, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/040707dc83f9b0b680ad6594cedd455e47bfb1b4", "title": "Turing Tests with Turing Machines", "abstract": "Comparative tests work by finding the difference (or the absence of difference) between a reference subject and an evaluee. The Turing Test, in its standard interpretation, takes @@ -2864,7 +3302,8 @@ interactions: perspective of game theory and others. Around these issues, this paper finally brings the Turing Test to the realm of Turing machines.", "venue": "Turing-100", "year": 2012, "referenceCount": 56, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://easychair.org/publications/open/qD", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-22", "journal": {"pages": "140-156"}, "authors": @@ -2872,7 +3311,8 @@ interactions: "1403897525", "name": "Javier Insa-Cabrera"}, {"authorId": "1745871", "name": "D. Dowe"}, {"authorId": "39109261", "name": "B. Hibbard"}]}, {"paperId": "0267a54606d17c33ad4acc23a8461dee5e0ab093", "externalIds": {"DOI": "10.1093/oso/9780198250791.001.0001", - "CorpusId": 1696047}, "url": "https://www.semanticscholar.org/paper/0267a54606d17c33ad4acc23a8461dee5e0ab093", + "CorpusId": 1696047}, "corpusId": 1696047, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0267a54606d17c33ad4acc23a8461dee5e0ab093", "title": "The Essential Turing", "abstract": "Many physicists would agree that, had it not been for rasterization, the exploration of IPv7 might never have occurred. In fact, few endusers would disagree with the simulation of @@ -2880,36 +3320,40 @@ interactions: split and congestion control are generally incompatible, but rather on exploring a novel application for the analysis of systems (Juge).", "venue": "", "year": 2011, "referenceCount": 284, "citationCount": 215, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "1489573598", "name": "O. - Bhabha"}]}, {"paperId": "ccdef928e9b9a078408d8b0b6a8e81502d4117c7", "externalIds": - {"DBLP": "journals/cacm/French12", "MAG": "2037051762", "DOI": "10.1145/2380656.2380674", - "CorpusId": 36762802}, "url": "https://www.semanticscholar.org/paper/ccdef928e9b9a078408d8b0b6a8e81502d4117c7", + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1489573598", + "name": "O. Bhabha"}]}, {"paperId": "ccdef928e9b9a078408d8b0b6a8e81502d4117c7", + "externalIds": {"DBLP": "journals/cacm/French12", "MAG": "2037051762", "DOI": + "10.1145/2380656.2380674", "CorpusId": 36762802}, "corpusId": 36762802, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ccdef928e9b9a078408d8b0b6a8e81502d4117c7", "title": "Moving beyond the Turing test", "abstract": "Computers interacting with, not imitating, humans is the way forward.", "venue": "CACM", "year": 2012, "referenceCount": 24, "citationCount": 32, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.eng.auburn.edu/~vagrawal/COURSE/READING/ARCH/CACM_BeyondTuringTest.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-01", "journal": {"name": "Commun. ACM", "pages": "74-77", "volume": "55"}, "authors": [{"authorId": "2440747", "name": "R. French"}]}, {"paperId": "6bfcd88733dff025bff449607b7b2ba0217e141d", "externalIds": {"DBLP": "conf/birthday/Freivalds12a", - "MAG": "2407743706", "DOI": "10.29007/tdf5", "CorpusId": 2642013}, "url": - "https://www.semanticscholar.org/paper/6bfcd88733dff025bff449607b7b2ba0217e141d", + "MAG": "2407743706", "DOI": "10.29007/tdf5", "CorpusId": 2642013}, "corpusId": + 2642013, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6bfcd88733dff025bff449607b7b2ba0217e141d", "title": "Ultrametric automata and Turing machines", "abstract": "We introduce a notion of ultrametric automata and Turing machines using p-adic numbers to describe random branching of the process of computation. These automata have properties similar to the properties of probabilistic automata but complexity of probabilistic automata and complexity of ultrametric automata can differ very much.", "venue": "Turing-100", "year": 2012, "referenceCount": 25, "citationCount": - 14, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "98-112"}, "authors": [{"authorId": "1723667", "name": "R. Freivalds"}]}, - {"paperId": "cd4b4c05dce06439f65a90dfc0146b9b958f81fa", "externalIds": {"CorpusId": - 17212761}, "url": "https://www.semanticscholar.org/paper/cd4b4c05dce06439f65a90dfc0146b9b958f81fa", + 14, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "https://easychair.org/publications/open/K3", "status": "BRONZE"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "98-112"}, "authors": [{"authorId": "1723667", + "name": "R. Freivalds"}]}, {"paperId": "cd4b4c05dce06439f65a90dfc0146b9b958f81fa", + "externalIds": {"CorpusId": 17212761}, "corpusId": 17212761, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/cd4b4c05dce06439f65a90dfc0146b9b958f81fa", "title": "The Collected Works of AM Turing : Mechanical Intelligence", "abstract": "Many leading analysts would agree that, had it not been for multimodal epistemologies, the development of congestion control might never have occurred. In this work, @@ -2917,11 +3361,12 @@ interactions: we confirm not only that the infamous symbiotic algorithm for the visualization of digital-to-analog converters by Z. Nehru runs in \u0398(2) time, but that the same is true for ebusiness.", "venue": "", "year": 2011, "referenceCount": - 152, "citationCount": 171, "influentialCitationCount": 6, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": []}, {"paperId": "b948b8efa46927fd1f7c2d34ff4e659620ddc5f5", - "externalIds": {"CorpusId": 10117333}, "url": "https://www.semanticscholar.org/paper/b948b8efa46927fd1f7c2d34ff4e659620ddc5f5", + 152, "citationCount": 172, "influentialCitationCount": 6, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": []}, {"paperId": "b948b8efa46927fd1f7c2d34ff4e659620ddc5f5", + "externalIds": {"CorpusId": 10117333}, "corpusId": 10117333, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b948b8efa46927fd1f7c2d34ff4e659620ddc5f5", "title": "Collected Works : Mathematical Logic Amsterdam etc Universal Turing Machine", "abstract": "The synthesis of the Ethernet is an appropriate riddle. In fact, few systems engineers would disagree with the visualization of hierarchical @@ -2929,11 +3374,12 @@ interactions: 148, 99, 58, 129, 168, 128]. We use omniscient methodologies to verify that context-free grammar and writeahead logging can synchronize to answer this quandary.", "venue": "", "year": 2011, "referenceCount": 245, "citationCount": - 149, "influentialCitationCount": 20, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "52f2febf8568dbb995c67e83e8299680f2cecb79", "externalIds": - {"CorpusId": 18601793}, "url": "https://www.semanticscholar.org/paper/52f2febf8568dbb995c67e83e8299680f2cecb79", + 149, "influentialCitationCount": 20, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "52f2febf8568dbb995c67e83e8299680f2cecb79", + "externalIds": {"CorpusId": 18601793}, "corpusId": 18601793, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/52f2febf8568dbb995c67e83e8299680f2cecb79", "title": "Can a Machine Think ? The World of Mathematics Universal Turing Machine", "abstract": "The refinement of checksums is an essential grand challenge. Given the current status of lossless information, theorists clearly desire @@ -2942,10 +3388,11 @@ interactions: IPv4 can be made relational, constant-time, and decentralized, but rather on proposing new linear-time symmetries (YEW).", "venue": "", "year": 2011, "referenceCount": 243, "citationCount": 173, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": "35d0488b3c521367dee74af8185856336b5b8a0a", - "externalIds": {"CorpusId": 14061847}, "url": "https://www.semanticscholar.org/paper/35d0488b3c521367dee74af8185856336b5b8a0a", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "35d0488b3c521367dee74af8185856336b5b8a0a", "externalIds": {"CorpusId": 14061847}, + "corpusId": 14061847, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/35d0488b3c521367dee74af8185856336b5b8a0a", "title": "The Legacy of Alan Turing : Connectionism concepts and folk psychology", "abstract": "In recent years, much research has been devoted to the simulation of write-ahead logging; unfortunately, few hav e simulated the study of Markov @@ -2955,10 +3402,11 @@ interactions: [188], [62], [70], [179], [68], [95], [18 8], [54], [152], [191], [59], [168], [148], [99], [58], [129], [ 179], [128], [106] is maximally efficient.", "venue": "", "year": 2011, "referenceCount": 264, "citationCount": 170, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "3301167d98d4b1f55a51517671dc4a92417f2ed9", - "externalIds": {"CorpusId": 16068434}, "url": "https://www.semanticscholar.org/paper/3301167d98d4b1f55a51517671dc4a92417f2ed9", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "3301167d98d4b1f55a51517671dc4a92417f2ed9", "externalIds": {"CorpusId": 16068434}, + "corpusId": 16068434, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3301167d98d4b1f55a51517671dc4a92417f2ed9", "title": "AM Turing\u2019s Original Proposal for the Development of an Electronic Computer: Reprinted with a Foreword by DW Davies", "abstract": "Signed algorithms and scatter/gather I/O have garnered tremendous interest from both system @@ -2967,12 +3415,13 @@ interactions: of IPv4. In this work, we concentrate our efforts on proving that online algorithms and XML can interfere to accomplish this aim.", "venue": "", "year": 2011, "referenceCount": 157, "citationCount": 170, "influentialCitationCount": 5, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": "e127369c02476cfa65184dff4ca02a66e419f263", "externalIds": - {"CorpusId": 11867028}, "url": "https://www.semanticscholar.org/paper/e127369c02476cfa65184dff4ca02a66e419f263", + {"CorpusId": 11867028}, "corpusId": 11867028, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e127369c02476cfa65184dff4ca02a66e419f263", "title": "Systems of logic defined by ordinals Universal Turing Machine", "abstract": "The machine learning approach to kernels is defined not only by the synthesis of consistent hashing, but also by the confusing need for @@ -2981,35 +3430,72 @@ interactions: which embodies the technical principles of steganography. We present a framework for mobile theory, which we call Deed. This is crucial to the success of our work.", "venue": "", "year": 2011, "referenceCount": 234, "citationCount": - 113, "influentialCitationCount": 41, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "91e5ff3ddf09eb3ea561cc040d0b877d654ad67a", "externalIds": - {"MAG": "2135544531", "DOI": "10.1016/j.tics.2011.05.007", "CorpusId": 30677, - "PubMed": "21696998"}, "url": "https://www.semanticscholar.org/paper/91e5ff3ddf09eb3ea561cc040d0b877d654ad67a", + 114, "influentialCitationCount": 41, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "91e5ff3ddf09eb3ea561cc040d0b877d654ad67a", + "externalIds": {"MAG": "2135544531", "DOI": "10.1016/j.tics.2011.05.007", + "CorpusId": 30677, "PubMed": "21696998"}, "corpusId": 30677, "publicationVenue": + {"id": "20cb626a-518d-4016-826a-0157cf2f8fd6", "name": "Trends in Cognitive + Sciences", "type": "journal", "alternate_names": ["Trends Cogn Sci"], "issn": + "1364-6613", "url": "https://www.cell.com/trends/cognitive-sciences/home", + "alternate_urls": ["http://www.cell.com/trends/cognitive-sciences/home", "https://www.journals.elsevier.com/trends-in-cognitive-sciences", + "http://www.sciencedirect.com/science/journal/13646613"]}, "url": "https://www.semanticscholar.org/paper/91e5ff3ddf09eb3ea561cc040d0b877d654ad67a", "title": "The human Turing machine: a neural framework for mental programs", "abstract": null, "venue": "Trends in Cognitive Sciences", "year": 2011, "referenceCount": 77, "citationCount": 142, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-07-01", "journal": {"name": "Trends in Cognitive - Sciences", "pages": "293-300", "volume": "15"}, "authors": [{"authorId": "2023576", - "name": "Ariel Zylberberg"}, {"authorId": "1787332", "name": "S. Dehaene"}, - {"authorId": "1698275", "name": "P. Roelfsema"}, {"authorId": "2100043776", - "name": "M. Sigman"}]}, {"paperId": "52dc63ae951df6cf0c53744cfaf01475bd0938f1", - "externalIds": {"CorpusId": 12621683}, "url": "https://www.semanticscholar.org/paper/52dc63ae951df6cf0c53744cfaf01475bd0938f1", + "openAccessPdf": null, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-07-01", "journal": + {"name": "Trends in Cognitive Sciences", "pages": "293-300", "volume": "15"}, + "authors": [{"authorId": "2023576", "name": "Ariel Zylberberg"}, {"authorId": + "1787332", "name": "S. Dehaene"}, {"authorId": "1698275", "name": "P. Roelfsema"}, + {"authorId": "2100043776", "name": "M. Sigman"}]}, {"paperId": "e8d4a179a04aca15c2b99ee9d15b08ea5134a7e5", + "externalIds": {"MAG": "1983410640", "ArXiv": "1011.0466", "DOI": "10.1103/PhysRevE.84.011112", + "CorpusId": 328339, "PubMed": "21867118"}, "corpusId": 328339, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e8d4a179a04aca15c2b99ee9d15b08ea5134a7e5", + "title": "Fluctuation-driven Turing patterns.", "abstract": "Models of diffusion-driven + pattern formation that rely on the Turing mechanism are utilized in many areas + of science. However, many such models suffer from the defect of requiring + fine tuning of parameters or an unrealistic separation of scales in the diffusivities + of the constituents of the system in order to predict the formation of spatial + patterns. In the context of a very generic model of ecological pattern formation, + we show that the inclusion of intrinsic noise in Turing models leads to the + formation of \"quasipatterns\" that form in generic regions of parameter space + and are experimentally distinguishable from standard Turing patterns. The + existence of quasipatterns removes the need for unphysical fine tuning or + separation of scales in the application of Turing models to real systems.", + "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "year": 2010, "referenceCount": 32, "citationCount": 90, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.aps.org/accepted/10.1103/PhysRevE.84.011112", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Biology", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-11-01", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 011112\n ", + "volume": "84 1 Pt 1"}, "authors": [{"authorId": "46825432", "name": "Thomas + Butler"}, {"authorId": "3549131", "name": "N. Goldenfeld"}]}, {"paperId": + "52dc63ae951df6cf0c53744cfaf01475bd0938f1", "externalIds": {"CorpusId": 12621683}, + "corpusId": 12621683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/52dc63ae951df6cf0c53744cfaf01475bd0938f1", "title": "The p functions in K conversion Universal Turing Machine", "abstract": "Cache coherence must work. In this position paper, we prove the construction of IPv7, which embodies the typical principles of cryptoanalysis. In this position paper we con centrate our efforts on confirming that reinforcement learning can be made mobile, scalable, and wireless.", "venue": "", "year": 2011, "referenceCount": 248, "citationCount": 99, "influentialCitationCount": - 26, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "14a0e8679a6575c6d8ec10cac77492f89645a9b3", - "externalIds": {"ArXiv": "1105.3986", "MAG": "2007771417", "DOI": "10.1103/PhysRevLett.107.120501", - "CorpusId": 11322270, "PubMed": "22026760"}, "url": "https://www.semanticscholar.org/paper/14a0e8679a6575c6d8ec10cac77492f89645a9b3", + 26, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "14a0e8679a6575c6d8ec10cac77492f89645a9b3", "externalIds": {"ArXiv": "1105.3986", + "MAG": "2007771417", "DOI": "10.1103/PhysRevLett.107.120501", "CorpusId": + 11322270, "PubMed": "22026760"}, "corpusId": 11322270, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/14a0e8679a6575c6d8ec10cac77492f89645a9b3", "title": "Dissipative quantum Church-Turing theorem.", "abstract": "We show that the time evolution of an open quantum system, described by a possibly time dependent Liouvillian, can be simulated by a unitary quantum circuit @@ -3024,6 +3510,7 @@ interactions: operators. We also demonstrate that most quantum states cannot be prepared efficiently.", "venue": "Physical Review Letters", "year": 2011, "referenceCount": 8, "citationCount": 91, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1105.3986", "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": @@ -3033,34 +3520,13 @@ interactions: "2040995", "name": "M. Kliesch"}, {"authorId": "48582879", "name": "T. Barthel"}, {"authorId": "3348073", "name": "C. Gogolin"}, {"authorId": "15866728", "name": "M. Kastoryano"}, {"authorId": "2334630", "name": "J. Eisert"}]}, {"paperId": - "e8d4a179a04aca15c2b99ee9d15b08ea5134a7e5", "externalIds": {"MAG": "1983410640", - "ArXiv": "1011.0466", "DOI": "10.1103/PhysRevE.84.011112", "CorpusId": 328339, - "PubMed": "21867118"}, "url": "https://www.semanticscholar.org/paper/e8d4a179a04aca15c2b99ee9d15b08ea5134a7e5", - "title": "Fluctuation-driven Turing patterns.", "abstract": "Models of diffusion-driven - pattern formation that rely on the Turing mechanism are utilized in many areas - of science. However, many such models suffer from the defect of requiring - fine tuning of parameters or an unrealistic separation of scales in the diffusivities - of the constituents of the system in order to predict the formation of spatial - patterns. In the context of a very generic model of ecological pattern formation, - we show that the inclusion of intrinsic noise in Turing models leads to the - formation of \"quasipatterns\" that form in generic regions of parameter space - and are experimentally distinguishable from standard Turing patterns. The - existence of quasipatterns removes the need for unphysical fine tuning or - separation of scales in the application of Turing models to real systems.", - "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "year": 2010, "referenceCount": 32, "citationCount": 88, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine", "Biology", - "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-11-01", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 011112\n ", - "volume": "84 1 Pt 1"}, "authors": [{"authorId": "46825432", "name": "Thomas - Butler"}, {"authorId": "3549131", "name": "N. Goldenfeld"}]}, {"paperId": "ec8d9283159adca6cc4fb2c1d29382096218eb80", "externalIds": {"MAG": "2091354445", "DOI": "10.1126/science.1200815", "CorpusId": 206531319, "PubMed": "21310963"}, - "url": "https://www.semanticscholar.org/paper/ec8d9283159adca6cc4fb2c1d29382096218eb80", + "corpusId": 206531319, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/ec8d9283159adca6cc4fb2c1d29382096218eb80", "title": "Tomography of Reaction-Diffusion Microemulsions Reveals Three-Dimensional Turing Patterns", "abstract": "Tomography reveals three-dimensional Turing patterns created by the Belousov-Zhabotinsky reaction running in a microemulsion. @@ -3075,14 +3541,16 @@ interactions: including curved surfaces, hexagonally packed cylinders, spots, and labyrinthine and lamellar patterns.", "venue": "Science", "year": 2011, "referenceCount": 35, "citationCount": 102, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-03-11", "journal": {"name": "Science", "pages": "1309 - - 1312", "volume": "331"}, "authors": [{"authorId": "50453551", "name": "T. - B\u00e1ns\u00e1gi"}, {"authorId": "2258489", "name": "V. Vanag"}, {"authorId": - "144854275", "name": "I. Epstein"}]}, {"paperId": "bce9af7654176bfb41bf4ad9c8e536f64e163ea3", - "externalIds": {"MAG": "2973143215", "CorpusId": 14353358}, "url": "https://www.semanticscholar.org/paper/bce9af7654176bfb41bf4ad9c8e536f64e163ea3", + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-03-11", "journal": + {"name": "Science", "pages": "1309 - 1312", "volume": "331"}, "authors": [{"authorId": + "50453551", "name": "T. B\u00e1ns\u00e1gi"}, {"authorId": "2258489", "name": + "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": + "bce9af7654176bfb41bf4ad9c8e536f64e163ea3", "externalIds": {"MAG": "2973143215", + "CorpusId": 14353358}, "corpusId": 14353358, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bce9af7654176bfb41bf4ad9c8e536f64e163ea3", "title": "On impact and evaluation in computational creativity: a discussion of the Turing Test and an alternative proposal", "abstract": "Computational Creativity is the AI subfield in which we study how to build computational @@ -3217,13 +3685,14 @@ interactions: novel with respect to the whole of human history ), they do argue that much creative work is carried out within a particular style. They cite Garnham\u2019s response ", "venue": "", "year": 2011, "referenceCount": 47, "citationCount": - 77, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2011-12-01", "journal": {"name": "", "pages": "15-22", - "volume": ""}, "authors": [{"authorId": "145516989", "name": "A. Pease"}, - {"authorId": "1687610", "name": "S. Colton"}]}, {"paperId": "d408100f3c87e746ee4a0838333b342384fd380c", - "externalIds": {"CorpusId": 8042983}, "url": "https://www.semanticscholar.org/paper/d408100f3c87e746ee4a0838333b342384fd380c", + 77, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2011-12-01", "journal": {"name": + "", "pages": "15-22", "volume": ""}, "authors": [{"authorId": "145516989", + "name": "A. Pease"}, {"authorId": "1687610", "name": "S. Colton"}]}, {"paperId": + "d408100f3c87e746ee4a0838333b342384fd380c", "externalIds": {"CorpusId": 8042983}, + "corpusId": 8042983, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d408100f3c87e746ee4a0838333b342384fd380c", "title": "Lecture on the automatic computing engine ; reprinted in ( Copeland 2004 ) Universal Turing Machine", "abstract": "Amphibious communication and RAID have garnered tremendous interest from both biologists and cyberinforma @@ -3231,22 +3700,29 @@ interactions: gigabit switches, we prove the evaluation of Boolean logic. We describe a novel application for the exploration o f access points, which we call Die.", "venue": "", "year": 2011, "referenceCount": 341, "citationCount": 111, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "433ec58bba197c101fbee9ac63e8899ab90041ba", - "externalIds": {"DBLP": "journals/corr/abs-1105-1215", "MAG": "2982228946", - "DOI": "10.1007/978-3-642-23638-9_15", "CorpusId": 25615667}, "url": "https://www.semanticscholar.org/paper/433ec58bba197c101fbee9ac63e8899ab90041ba", + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "433ec58bba197c101fbee9ac63e8899ab90041ba", "externalIds": {"DBLP": "journals/corr/abs-1105-1215", + "MAG": "2982228946", "DOI": "10.1007/978-3-642-23638-9_15", "CorpusId": 25615667}, + "corpusId": 25615667, "publicationVenue": {"id": "31f44e5f-f988-4a14-a236-2ecf8d216061", + "name": "DNA", "type": "conference", "alternate_names": ["International Meeting + on DNA Computing", "Int Meet DNA Comput"], "issn": "0198-0238", "alternate_issns": + ["2673-8856", "1557-7430"], "url": "http://www.liebertonline.com/loi/dna", + "alternate_urls": ["https://www.liebertpub.com/loi/dna", "http://www.liebertpub.com/DNA"]}, + "url": "https://www.semanticscholar.org/paper/433ec58bba197c101fbee9ac63e8899ab90041ba", "title": "Exact Shapes and Turing Universality at Temperature 1 with a Single Negative Glue", "abstract": null, "venue": "DNA", "year": 2011, "referenceCount": 25, "citationCount": 59, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2011-05-06", "journal": {"pages": "175-189"}, "authors": [{"authorId": "1766539", "name": "Matthew J. Patitz"}, {"authorId": "2205907", "name": "R. Schweller"}, {"authorId": "1794328", "name": "Scott M. Summers"}]}, {"paperId": "6f1087e5e0d7ce7da15d364a4ea60a563cc000bf", - "externalIds": {"CorpusId": 16547112}, "url": "https://www.semanticscholar.org/paper/6f1087e5e0d7ce7da15d364a4ea60a563cc000bf", + "externalIds": {"CorpusId": 16547112}, "corpusId": 16547112, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6f1087e5e0d7ce7da15d364a4ea60a563cc000bf", "title": "A chemical basis for biological morphogenesis Universal Turing Machine", "abstract": "Unified probabilistic communication have led to many private advances, including information retrieval systems and digital-to-analog converters @@ -3256,11 +3732,17 @@ interactions: we use perfect theory to validate that the well-known secure algorithm for the visualization of reinforcement learning by R. Tarjan is recursively enumerable.", "venue": "", "year": 2011, "referenceCount": 155, "citationCount": 71, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "a4cc37f6ed8ba00e28869ab0ebd6ddafd5028fd0", - "externalIds": {"MAG": "2005295914", "DOI": "10.1093/bjps/axr016", "CorpusId": - 5577525}, "url": "https://www.semanticscholar.org/paper/a4cc37f6ed8ba00e28869ab0ebd6ddafd5028fd0", + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "a4cc37f6ed8ba00e28869ab0ebd6ddafd5028fd0", "externalIds": {"MAG": "2005295914", + "DOI": "10.1093/bjps/axr016", "CorpusId": 5577525}, "corpusId": 5577525, "publicationVenue": + {"id": "ccf23a34-337a-4763-916a-9c16c580e0e1", "name": "British Journal for + the Philosophy of Science", "type": "journal", "alternate_names": ["Br J Philos + Sci", "The British Journal for the Philosophy of Science"], "issn": "0007-0882", + "url": "https://www.journals.uchicago.edu/toc/bjps/current", "alternate_urls": + ["https://www.jstor.org/journal/britjphilscie", "http://bjps.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/a4cc37f6ed8ba00e28869ab0ebd6ddafd5028fd0", "title": "The Physical Church\u2013Turing Thesis: Modest or Bold?", "abstract": "This article defends a modest version of the Physical Church-Turing thesis (CT). Following an established recent trend, I distinguish between what I @@ -3296,15 +3778,23 @@ interactions: and spurious \u2003\u20034.2\u2003Relativistic hypercomputers \u2003\u20034.3\u2003Other challenges to Modest Physical CT 5\u2003Conclusion", "venue": "British Journal for the Philosophy of Science", "year": 2011, "referenceCount": 153, "citationCount": - 42, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-12-01", "journal": {"name": - "The British Journal for the Philosophy of Science", "pages": "733 - 769", - "volume": "62"}, "authors": [{"authorId": "144363427", "name": "G. Piccinini"}]}, - {"paperId": "3f155b09cd5570fe650afdd63fdc93055150c198", "externalIds": {"DBLP": - "conf/ieeehpcs/Rendell11", "MAG": "2170257345", "DOI": "10.1109/HPCSim.2011.5999906", - "CorpusId": 35957181}, "url": "https://www.semanticscholar.org/paper/3f155b09cd5570fe650afdd63fdc93055150c198", + 43, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-12-01", + "journal": {"name": "The British Journal for the Philosophy of Science", "pages": + "733 - 769", "volume": "62"}, "authors": [{"authorId": "144363427", "name": + "G. Piccinini"}]}, {"paperId": "3f155b09cd5570fe650afdd63fdc93055150c198", + "externalIds": {"DBLP": "conf/ieeehpcs/Rendell11", "MAG": "2170257345", "DOI": + "10.1109/HPCSim.2011.5999906", "CorpusId": 35957181}, "corpusId": 35957181, + "publicationVenue": {"id": "e1ce0fed-d655-40bd-b678-9adc73f2e582", "name": + "International Symposium on High Performance Computing Systems and Applications", + "type": "conference", "alternate_names": ["International Conference on High + Performance Computing and Simulation", "Int Conf High Perform Comput Simul", + "Int Symp High Perform Comput Syst Appl", "High Performance Computing Systems + and Applications", "High Perform Comput Syst Appl", "Int Conf High Perform + Comput Simul", "HPCS", "International Conference on High Performance Computing + & Simulation"]}, "url": "https://www.semanticscholar.org/paper/3f155b09cd5570fe650afdd63fdc93055150c198", "title": "A Universal Turing Machine in Conway''s Game of Life", "abstract": "In this paper we present a Universal Turing Machine build in the Cellular Automaton Conway''s Game of Life. This is an extension of the Turing Machine @@ -3316,24 +3806,49 @@ interactions: in the stack construction is described.", "venue": "International Symposium on High Performance Computing Systems and Applications", "year": 2011, "referenceCount": 16, "citationCount": 43, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2011-07-04", "journal": {"name": "2011 International Conference on High Performance - Computing & Simulation", "pages": "764-772"}, "authors": [{"authorId": "11060403", - "name": "Paul W. Rendell"}]}, {"paperId": "b13649eda87136d5b7b6319606fafcfac5a1ec6a", - "externalIds": {"CorpusId": 582065}, "url": "https://www.semanticscholar.org/paper/b13649eda87136d5b7b6319606fafcfac5a1ec6a", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2011-07-04", "journal": {"name": "2011 + International Conference on High Performance Computing & Simulation", "pages": + "764-772"}, "authors": [{"authorId": "11060403", "name": "Paul W. Rendell"}]}, + {"paperId": "cd68ad831ecc68e7adf302685cce68e930c22b57", "externalIds": {"MAG": + "2080980244", "DOI": "10.1103/PHYSREVE.84.016222", "CorpusId": 27395299, "PubMed": + "21867288"}, "corpusId": 27395299, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cd68ad831ecc68e7adf302685cce68e930c22b57", + "title": "Control of the Hopf-Turing transition by time-delayed global feedback + in a reaction-diffusion system.", "abstract": "Application of time-delayed + feedback is a practical method of controlling bifurcations in reaction-diffusion + systems. It has been shown that for a suitable feedback strength, time delay + beyond a threshold may induce spatiotemporal instabilities. For an appropriate + parameter space with differential diffusivities of the activator-inhibitor + species, delayed feedback may generate Turing instability via a Hopf-Turing + transition, resulting in stationary patterns. This is explored by a theoretical + scheme in a photosensitive chlorine dioxide-iodine-malonic acid reaction-diffusion + system where the delayed feedback is externally tuned by photoillumination + intensity. Our analytical results corroborate with direct numerical simulations.", + "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "year": 2011, "referenceCount": 0, "citationCount": 42, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-07-25", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 016222\n ", "volume": + "84 1 Pt 2"}, "authors": [{"authorId": "4032821", "name": "Pushpita Ghosh"}]}, + {"paperId": "b13649eda87136d5b7b6319606fafcfac5a1ec6a", "externalIds": {"CorpusId": + 582065}, "corpusId": 582065, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b13649eda87136d5b7b6319606fafcfac5a1ec6a", "title": "The automatic computing machine : Papers by Alan Turing and", "abstract": "Context-free grammar must work. Given the current status of symbiotic modalities, information theorists predictably desire the visualization of Scheme. Our focus in this position paper is not on whether agents can be made heterogeneous, adaptive, and constant-time, but rather on presenting new client-server theory (Tat).", "venue": "", "year": 2011, "referenceCount": 158, "citationCount": - 133, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "11125381", "name": "M. Woodger"}]}, {"paperId": "cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", - "externalIds": {"CorpusId": 31729897}, "url": "https://www.semanticscholar.org/paper/cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", + 133, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "11125381", "name": "M. Woodger"}]}, + {"paperId": "cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", "externalIds": {"CorpusId": + 31729897}, "corpusId": 31729897, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", "title": "Truth and Turing : Systems of Logic based on Ordinals", "abstract": "We should like to link Turing\u2019s construction in Systems of Logic based on Ordinals on progressions of theories, with some recent similar looking @@ -3378,10 +3893,49 @@ interactions: unprovable in PA (assuming that it was itself consistent). Martin Davis refers to the paper in his introduction in a volume of collected sources", "venue": "", "year": 2011, "referenceCount": 6, "citationCount": 32, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "671ab0ee2621fdf4466c4973cca944e70696c856", - "externalIds": {"CorpusId": 14519482}, "url": "https://www.semanticscholar.org/paper/671ab0ee2621fdf4466c4973cca944e70696c856", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "50642580e304025d23a2e8c035262c845e037569", "externalIds": {"MAG": "2055942395", + "DOI": "10.1007/s11538-011-9634-8", "CorpusId": 5075750, "PubMed": "21347815"}, + "corpusId": 5075750, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/50642580e304025d23a2e8c035262c845e037569", + "title": "The Dynamics of Turing Patterns for\u00a0Morphogen-Regulated Growing + Domains with\u00a0Cellular Response Delays", "abstract": null, "venue": "Bulletin + of Mathematical Biology", "year": 2011, "referenceCount": 51, "citationCount": + 36, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-02-24", "journal": + {"name": "Bulletin of Mathematical Biology", "pages": "2527-2551", "volume": + "73"}, "authors": [{"authorId": "4875488", "name": "S. Seirin Lee"}, {"authorId": + "2662569", "name": "E. Gaffney"}, {"authorId": "35275545", "name": "R. Baker"}]}, + {"paperId": "2e4c4ed4c1f8bc2440b5c92815a4f5163a7075d1", "externalIds": {"MAG": + "2092424552", "DOI": "10.1103/PHYSREVLETT.64.2953", "CorpusId": 36147997, + "PubMed": "10041855"}, "corpusId": 36147997, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/2e4c4ed4c1f8bc2440b5c92815a4f5163a7075d1", + "title": "Experimental evidence of a sustained standing Turing-type nonequilibrium + chemical pattern.", "abstract": "We report the experimental observation of + a sustained standing nonequilibrium chemical pattern in a single-phase open + reactor. Considering the properties of the pattern (symmetry breaking, intrinsic + wavelength), it is interpreted as the first unambiguous experimental evidence + of a Turing structure.", "venue": "Physical Review Letters", "year": 1990, + "referenceCount": 1, "citationCount": 950, "influentialCitationCount": 8, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1990-06-11", "journal": {"name": "Physical review letters", "pages": "\n 2953-2956\n ", + "volume": "64 24"}, "authors": [{"authorId": "50371129", "name": "Castets"}, + {"authorId": "30093755", "name": "Dulos"}, {"authorId": "30159233", "name": + "Boissonade"}, {"authorId": "30068722", "name": "De Kepper P"}]}, {"paperId": + "671ab0ee2621fdf4466c4973cca944e70696c856", "externalIds": {"CorpusId": 14519482}, + "corpusId": 14519482, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/671ab0ee2621fdf4466c4973cca944e70696c856", "title": "Machines and Thought : Machines and thought Universal Turing Machine", "abstract": "Futurists agree that interposable symmetries are an interesting new topic in the field of theory, and information theorists concur. After @@ -3390,10 +3944,11 @@ interactions: we confirm not only that digital-to-analog converters and digital-toanalog converters are generally incompatible, but that the same is true for Web services.", "venue": "", "year": 2011, "referenceCount": 235, "citationCount": 70, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": "07dd65bd4eb09525e75a7208494bb4108a58a406", - "externalIds": {"CorpusId": 17664634}, "url": "https://www.semanticscholar.org/paper/07dd65bd4eb09525e75a7208494bb4108a58a406", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "07dd65bd4eb09525e75a7208494bb4108a58a406", "externalIds": {"CorpusId": 17664634}, + "corpusId": 17664634, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/07dd65bd4eb09525e75a7208494bb4108a58a406", "title": "The Automatic Computing Engine : Papers by Alan Turing and Michael Woodger Universal Turing Machine", "abstract": "The exploration of A* search has studied telephony, and current trends suggest that the visualization of @@ -3404,26 +3959,13 @@ interactions: is the solution to all of these obstacles. Though such a hypothesis might seem perverse, it has ample historical precedence.", "venue": "", "year": 2011, "referenceCount": 332, "citationCount": 106, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "11125381", - "name": "M. Woodger"}]}, {"paperId": "50642580e304025d23a2e8c035262c845e037569", - "externalIds": {"MAG": "2055942395", "DOI": "10.1007/s11538-011-9634-8", "CorpusId": - 5075750, "PubMed": "21347815"}, "url": "https://www.semanticscholar.org/paper/50642580e304025d23a2e8c035262c845e037569", - "title": "The Dynamics of Turing Patterns for\u00a0Morphogen-Regulated Growing - Domains with\u00a0Cellular Response Delays", "abstract": null, "venue": "Bulletin - of Mathematical Biology", "year": 2011, "referenceCount": 51, "citationCount": - 34, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-02-24", "journal": {"name": "Bulletin - of Mathematical Biology", "pages": "2527-2551", "volume": "73"}, "authors": - [{"authorId": "4875488", "name": "S. Seirin Lee"}, {"authorId": "2662569", - "name": "E. Gaffney"}, {"authorId": "35275545", "name": "R. Baker"}]}, {"paperId": - "a1124aca43b60b1e5777ae9a9c9a34695f247a30", "externalIds": {"MAG": "2158797310", - "DBLP": "conf/ijcnn/CabessaS11", "DOI": "10.1109/IJCNN.2011.6033645", "CorpusId": - 14243016}, "url": "https://www.semanticscholar.org/paper/a1124aca43b60b1e5777ae9a9c9a34695f247a30", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "11125381", + "name": "M. Woodger"}]}, {"paperId": "a1124aca43b60b1e5777ae9a9c9a34695f247a30", + "externalIds": {"MAG": "2158797310", "DBLP": "conf/ijcnn/CabessaS11", "DOI": + "10.1109/IJCNN.2011.6033645", "CorpusId": 14243016}, "corpusId": 14243016, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1124aca43b60b1e5777ae9a9c9a34695f247a30", "title": "Evolving recurrent neural networks are super-Turing", "abstract": "The computational power of recurrent neural networks is intimately related to the nature of their synaptic weights. In particular, neural networks with @@ -3436,23 +3978,32 @@ interactions: These results suggest that evolution might play a crucial role in the computational capabilities of neural networks.", "venue": "The 2011 International Joint Conference on Neural Networks", "year": 2011, "referenceCount": 10, "citationCount": - 32, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2011-10-03", - "journal": {"name": "The 2011 International Joint Conference on Neural Networks", - "pages": "3200-3206"}, "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie - Cabessa"}, {"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": - "b5ec106c9ef346d01f45fbd56ba169589279e4f1", "externalIds": {"DBLP": "journals/moc/Trudgian11", - "MAG": "2949624891", "ArXiv": "0903.1885", "DOI": "10.1090/S0025-5718-2011-02470-1", - "CorpusId": 11044586}, "url": "https://www.semanticscholar.org/paper/b5ec106c9ef346d01f45fbd56ba169589279e4f1", + 32, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2011-10-03", "journal": {"name": "The 2011 International + Joint Conference on Neural Networks", "pages": "3200-3206"}, "authors": [{"authorId": + "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "2797623", "name": + "H. Siegelmann"}]}, {"paperId": "b5ec106c9ef346d01f45fbd56ba169589279e4f1", + "externalIds": {"DBLP": "journals/moc/Trudgian11", "MAG": "2949624891", "ArXiv": + "0903.1885", "DOI": "10.1090/S0025-5718-2011-02470-1", "CorpusId": 11044586}, + "corpusId": 11044586, "publicationVenue": {"id": "f1022129-db8f-4da5-b0c4-89602aeaea04", + "name": "Mathematics of Computation", "type": "journal", "alternate_names": + ["Mathematical computation", "Math comput", "Math Comput"], "issn": "0025-5718", + "alternate_issns": ["2327-0519", "2327-0527"], "url": "http://www.ams.org/mcom/", + "alternate_urls": ["http://www.ivypub.org/mc/", "http://www.ams.org/publications/journals/journalsframework/mcom", + "https://www.jstor.org/journal/mathcomp", "http://www.jstor.org/journals/00255718.html", + "https://www.ams.org/publications/journals/journalsframework/mcom"]}, "url": + "https://www.semanticscholar.org/paper/b5ec106c9ef346d01f45fbd56ba169589279e4f1", "title": "Improvements to Turing''s method", "abstract": "This paper refines the argument of Lehman by reducing the size of the constants in Turing''s method. This improvement is given in Theorem 1 and scope for further improvements is also given. Analogous improvements to Dirichlet L-functions and Dedekind zeta-functions are also included.", "venue": "Mathematics of Computation", "year": 2009, "referenceCount": 26, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/mcom/2011-80-276/S0025-5718-2011-02470-1/S0025-5718-2011-02470-1.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -3460,7 +4011,7 @@ interactions: "80"}, "authors": [{"authorId": "71763228", "name": "T. Trudgian"}]}, {"paperId": "04bebc8d70bf8980b33bc5449a4882d07d8994af", "externalIds": {"MAG": "2040570894", "DOI": "10.1103/PHYSREVE.83.036105", "CorpusId": 44534379, "PubMed": "21517556"}, - "url": "https://www.semanticscholar.org/paper/04bebc8d70bf8980b33bc5449a4882d07d8994af", + "corpusId": 44534379, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/04bebc8d70bf8980b33bc5449a4882d07d8994af", "title": "Effects of cross diffusion on Turing bifurcations in two-species reaction-transport systems.", "abstract": "We study the Turing bifurcation in general two-species reaction-transport systems, where particle dispersal @@ -3470,27 +4021,33 @@ interactions: model systems, the Lengyel-Epstein model and the Brusselator, and find strong effects of cross diffusion on the Turing bifurcation.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2011, - "referenceCount": 33, "citationCount": 29, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-03-11", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 036105\n ", "volume": "83 3 Pt 2"}, "authors": - [{"authorId": "37796184", "name": "Niraj Kumar"}, {"authorId": "3041313", - "name": "W. Horsthemke"}]}, {"paperId": "f57ad33088ff5f468b8d9ca1e36fd62308444335", + "referenceCount": 33, "citationCount": 30, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-03-11", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 036105\n ", "volume": + "83 3 Pt 2"}, "authors": [{"authorId": "37796184", "name": "Niraj Kumar"}, + {"authorId": "3041313", "name": "W. Horsthemke"}]}, {"paperId": "f57ad33088ff5f468b8d9ca1e36fd62308444335", "externalIds": {"MAG": "2008363747", "DBLP": "journals/mima/CopelandS11", - "DOI": "10.1007/s11023-011-9238-y", "CorpusId": 44276296}, "url": "https://www.semanticscholar.org/paper/f57ad33088ff5f468b8d9ca1e36fd62308444335", + "DOI": "10.1007/s11023-011-9238-y", "CorpusId": 44276296}, "corpusId": 44276296, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/f57ad33088ff5f468b8d9ca1e36fd62308444335", "title": "Do Accelerating Turing Machines Compute the Uncomputable?", "abstract": null, "venue": "Minds and Machines", "year": 2011, "referenceCount": 70, "citationCount": - 27, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-05-01", "journal": - {"name": "Minds and Machines", "pages": "221-239", "volume": "21"}, "authors": - [{"authorId": "144246233", "name": "B. Copeland"}, {"authorId": "1742013", - "name": "Oron Shagrir"}]}, {"paperId": "78d2642a4233527ea00c33eb1de442991e1645bc", - "externalIds": {"MAG": "102537316", "CorpusId": 115304740}, "url": "https://www.semanticscholar.org/paper/78d2642a4233527ea00c33eb1de442991e1645bc", + 27, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-05-01", "journal": {"name": "Minds and Machines", "pages": "221-239", + "volume": "21"}, "authors": [{"authorId": "144246233", "name": "B. Copeland"}, + {"authorId": "1742013", "name": "Oron Shagrir"}]}, {"paperId": "78d2642a4233527ea00c33eb1de442991e1645bc", + "externalIds": {"MAG": "102537316", "CorpusId": 115304740}, "corpusId": 115304740, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/78d2642a4233527ea00c33eb1de442991e1645bc", "title": "Turing instability and wave patterns for a symmetric discrete competitive Lotka-Volterra system", "abstract": "In this paper, Turing instability of a symmetric discrete competitive Lotka-Volterra system is considered. To this @@ -3504,29 +4061,35 @@ interactions: be obtained for the corresponding continuous models. On the other hand, the number of the eigenvalues is illuminated by calculation and the unstable spaces can be clearly expressed. Thus, the Turing mechanism is also explained.", - "venue": "", "year": 2011, "referenceCount": 13, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-05-01", - "journal": {"name": "WSEAS Transactions on Mathematics archive", "pages": - "181-189", "volume": "10"}, "authors": [{"authorId": "46874617", "name": "Yutao - Han"}, {"authorId": "49651241", "name": "B. Han"}, {"authorId": "2156145375", - "name": "Lu Zhang"}, {"authorId": "2112318467", "name": "Li Xu"}, {"authorId": - "10704678", "name": "Mei-Feng Li"}, {"authorId": "144690211", "name": "Guang - Zhang"}]}, {"paperId": "0963df3e3b614b884cca413043b46ec646cc8979", "externalIds": - {"DBLP": "journals/ai/Proudfoot11", "MAG": "2089192547", "DOI": "10.1016/j.artint.2011.01.006", - "CorpusId": 30906848}, "url": "https://www.semanticscholar.org/paper/0963df3e3b614b884cca413043b46ec646cc8979", + "venue": "", "year": 2011, "referenceCount": 13, "citationCount": 26, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2011-05-01", "journal": {"name": "WSEAS Transactions on Mathematics archive", + "pages": "181-189", "volume": "10"}, "authors": [{"authorId": "46874617", + "name": "Yutao Han"}, {"authorId": "49651241", "name": "B. Han"}, {"authorId": + "2156145375", "name": "Lu Zhang"}, {"authorId": "2112318467", "name": "Li + Xu"}, {"authorId": "10704678", "name": "Mei-Feng Li"}, {"authorId": "144690211", + "name": "Guang Zhang"}]}, {"paperId": "0963df3e3b614b884cca413043b46ec646cc8979", + "externalIds": {"DBLP": "journals/ai/Proudfoot11", "MAG": "2089192547", "DOI": + "10.1016/j.artint.2011.01.006", "CorpusId": 30906848}, "corpusId": 30906848, + "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", "name": + "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif Intell"], + "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", "2710-1681"], + "url": "http://www.elsevier.com/locate/artint", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00043702", + "https://www.journals.elsevier.com/artificial-intelligence"]}, "url": "https://www.semanticscholar.org/paper/0963df3e3b614b884cca413043b46ec646cc8979", "title": "Anthropomorphism and AI: Turing\u02bcs much misunderstood imitation game", "abstract": null, "venue": "Artificial Intelligence", "year": 2011, "referenceCount": 3, "citationCount": 60, "influentialCitationCount": 5, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-04-01", "journal": - {"name": "Artif. Intell.", "pages": "950-957", "volume": "175"}, "authors": - [{"authorId": "144239027", "name": "D. Proudfoot"}]}, {"paperId": "f77599f1414ac104adf5e186693adcec71e569dd", - "externalIds": {"ArXiv": "1005.1986", "MAG": "2132688627", "DOI": "10.1209/0295-5075/98/64004", - "CorpusId": 39049759}, "url": "https://www.semanticscholar.org/paper/f77599f1414ac104adf5e186693adcec71e569dd", + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-04-01", "journal": {"name": "Artif. Intell.", "pages": "950-957", "volume": + "175"}, "authors": [{"authorId": "144239027", "name": "D. Proudfoot"}]}, {"paperId": + "f77599f1414ac104adf5e186693adcec71e569dd", "externalIds": {"ArXiv": "1005.1986", + "MAG": "2132688627", "DOI": "10.1209/0295-5075/98/64004", "CorpusId": 39049759}, + "corpusId": 39049759, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f77599f1414ac104adf5e186693adcec71e569dd", "title": "Global feedback control of Turing patterns in network-organized activator-inhibitor systems", "abstract": "Results of the first systematic study on feedback control of nonequilibrium pattern formation in networks @@ -3537,14 +4100,16 @@ interactions: instability corresponded to a subcritical bifurcation and hysteresis effects were observed. Sufficiently strong feedback control rendered, however, the bifurcation supercritical and eliminated the hysteresis effects.", "venue": - "", "year": 2010, "referenceCount": 66, "citationCount": 187, "influentialCitationCount": - 14, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-05-12", - "journal": {"name": "Europhysics Letters", "volume": "98"}, "authors": [{"authorId": - "6061448", "name": "S. Hata"}, {"authorId": "3259202", "name": "H. Nakao"}, - {"authorId": "2490613", "name": "A. Mikhailov"}]}, {"paperId": "c6d8e311625908d9da3761cf6faa91348d170fc6", - "externalIds": {"CorpusId": 7541236}, "url": "https://www.semanticscholar.org/paper/c6d8e311625908d9da3761cf6faa91348d170fc6", + "", "year": 2010, "referenceCount": 66, "citationCount": 190, "influentialCitationCount": + 14, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0807.1230", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2010-05-12", "journal": {"name": + "Europhysics Letters", "volume": "98"}, "authors": [{"authorId": "6061448", + "name": "S. Hata"}, {"authorId": "3259202", "name": "H. Nakao"}, {"authorId": + "2490613", "name": "A. Mikhailov"}]}, {"paperId": "c6d8e311625908d9da3761cf6faa91348d170fc6", + "externalIds": {"CorpusId": 7541236}, "corpusId": 7541236, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c6d8e311625908d9da3761cf6faa91348d170fc6", "title": "Programmers \u2019 handbook for Manchester electronic computer Universal Turing Machine", "abstract": "Multimodal technology and red-black trees have gar-nered profound interest from both end-users and biologists in the last @@ -3553,10 +4118,11 @@ interactions: the confirmed principles of theory. We concentrate our efforts on disconfirm-ing that web browsers can be made interposable, mobile , and ubiquitous.", "venue": "", "year": null, "referenceCount": 139, "citationCount": 142, "influentialCitationCount": - 19, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "af16f1a39e8498845ef9a06900d4d1dbb91a0248", - "externalIds": {"CorpusId": 9067483}, "url": "https://www.semanticscholar.org/paper/af16f1a39e8498845ef9a06900d4d1dbb91a0248", + 19, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "af16f1a39e8498845ef9a06900d4d1dbb91a0248", "externalIds": {"CorpusId": 9067483}, + "corpusId": 9067483, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/af16f1a39e8498845ef9a06900d4d1dbb91a0248", "title": "Proposed electronic calculator ; reprinted in ( Copeland 2005 ) Universal Turing Machine", "abstract": "The implications of lossless models have been far-reaching and pervasive. After years of appropriate research @@ -3565,29 +4131,13 @@ interactions: is not on whether web browsers and evolutionary programming can collude to solve this problem, but rather on presenting a framework for efficient modalities (Solemp-neCadet).", "venue": "", "year": null, "referenceCount": 109, "citationCount": - 114, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "2e4c4ed4c1f8bc2440b5c92815a4f5163a7075d1", "externalIds": - {"MAG": "2092424552", "DOI": "10.1103/PHYSREVLETT.64.2953", "CorpusId": 36147997, - "PubMed": "10041855"}, "url": "https://www.semanticscholar.org/paper/2e4c4ed4c1f8bc2440b5c92815a4f5163a7075d1", - "title": "Experimental evidence of a sustained standing Turing-type nonequilibrium - chemical pattern.", "abstract": "We report the experimental observation of - a sustained standing nonequilibrium chemical pattern in a single-phase open - reactor. Considering the properties of the pattern (symmetry breaking, intrinsic - wavelength), it is interpreted as the first unambiguous experimental evidence - of a Turing structure.", "venue": "Physical Review Letters", "year": 1990, - "referenceCount": 1, "citationCount": 945, "influentialCitationCount": 8, - "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1990-06-11", "journal": {"name": "Physical - review letters", "pages": "\n 2953-2956\n ", "volume": "64 - 24"}, "authors": [{"authorId": "50371129", "name": "Castets"}, {"authorId": - "30093755", "name": "Dulos"}, {"authorId": "30159233", "name": "Boissonade"}, - {"authorId": "30068722", "name": "De Kepper P"}]}, {"paperId": "1d973000573811cc6403c2ee274b9b594523be7e", + 114, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "1d973000573811cc6403c2ee274b9b594523be7e", "externalIds": {"DBLP": "conf/ecal/Kauffman11", "MAG": "2401454054", "DOI": - "10.1017/CBO9780511863196.017", "CorpusId": 489283}, "url": "https://www.semanticscholar.org/paper/1d973000573811cc6403c2ee274b9b594523be7e", + "10.1017/CBO9780511863196.017", "CorpusId": 489283}, "corpusId": 489283, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1d973000573811cc6403c2ee274b9b594523be7e", "title": "Answering Descartes: Beyond Turing", "abstract": "Introduction The first half of the twentieth Century was filled with a stunning group of scientists, Einstein, Bohr, von Neumann and others. Alan Turing ranks near the top of @@ -3619,13 +4169,14 @@ interactions: that I believe grows out of \u201csum over all possible histories\u201d formulation of quantum mechanics (Feynman,1948).", "venue": "ECAL", "year": 2016, "referenceCount": 67, "citationCount": 22, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-03-01", "journal": - {"pages": "11-22"}, "authors": [{"authorId": "143980023", "name": "S. Kauffman"}]}, - {"paperId": "ee4a747282f6a7bbcdddf599d13c81ca48c1fdd3", "externalIds": {"MAG": - "2017296776", "DOI": "10.1073/pnas.0808622106", "CorpusId": 17355137, "PubMed": - "19433782"}, "url": "https://www.semanticscholar.org/paper/ee4a747282f6a7bbcdddf599d13c81ca48c1fdd3", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-03-01", "journal": {"pages": "11-22"}, "authors": [{"authorId": "143980023", + "name": "S. Kauffman"}]}, {"paperId": "ee4a747282f6a7bbcdddf599d13c81ca48c1fdd3", + "externalIds": {"MAG": "2017296776", "DOI": "10.1073/pnas.0808622106", "CorpusId": + 17355137, "PubMed": "19433782"}, "corpusId": 17355137, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ee4a747282f6a7bbcdddf599d13c81ca48c1fdd3", "title": "Interactions between zebrafish pigment cells responsible for the generation of Turing patterns", "abstract": "The reaction\u2013diffusion system is one of the most studied nonlinear mechanisms that generate spatially periodic @@ -3650,8 +4201,9 @@ interactions: pigment patterns as well as other mutant patterns. Our findings here allow further investigation of Turing pattern formation within the context of cell biology.", "venue": "Proceedings of the National Academy of Sciences", "year": - 2009, "referenceCount": 34, "citationCount": 300, "influentialCitationCount": - 13, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 2009, "referenceCount": 34, "citationCount": 302, "influentialCitationCount": + 15, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.pnas.org/content/106/21/8429.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2009-05-26", "journal": {"name": "Proceedings @@ -3659,7 +4211,8 @@ interactions: "authors": [{"authorId": "6643962", "name": "Akiko M. Nakamasu"}, {"authorId": "122562665", "name": "G. Takahashi"}, {"authorId": "34943307", "name": "Akio Kanbe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "2e842fcd9b30aaf88378f395cb49bf54d962b9b4", - "externalIds": {"CorpusId": 15659696}, "url": "https://www.semanticscholar.org/paper/2e842fcd9b30aaf88378f395cb49bf54d962b9b4", + "externalIds": {"CorpusId": 15659696}, "corpusId": 15659696, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2e842fcd9b30aaf88378f395cb49bf54d962b9b4", "title": "The chemical basis of morphogenesis reprinted from Philosophical Transactions of the Royal Society ( Part B ) 237 37-72 ( 1953 ) Universal Turing Machine", "abstract": "The evaluation of SCSI disks is an unfortunate @@ -3668,24 +4221,33 @@ interactions: we present a classical tool for analyzing e-business (AIL), which we use to disconfirm that telephony and scatter/gather I/O can interfere to accomplish this intent.", "venue": "", "year": null, "referenceCount": 149, "citationCount": - 207, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", - "name": "Machine R I P"}]}, {"paperId": "cf58fc20e9174b4eb3307d96d2f3e616b951d254", - "externalIds": {"DBLP": "conf/dna/QianSW10", "MAG": "1842664382", "DOI": "10.1007/978-3-642-18305-8_12", - "CorpusId": 14953337}, "url": "https://www.semanticscholar.org/paper/cf58fc20e9174b4eb3307d96d2f3e616b951d254", + 207, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal + Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": + "cf58fc20e9174b4eb3307d96d2f3e616b951d254", "externalIds": {"DBLP": "conf/dna/QianSW10", + "MAG": "1842664382", "DOI": "10.1007/978-3-642-18305-8_12", "CorpusId": 14953337}, + "corpusId": 14953337, "publicationVenue": {"id": "31f44e5f-f988-4a14-a236-2ecf8d216061", + "name": "DNA", "type": "conference", "alternate_names": ["International Meeting + on DNA Computing", "Int Meet DNA Comput"], "issn": "0198-0238", "alternate_issns": + ["2673-8856", "1557-7430"], "url": "http://www.liebertonline.com/loi/dna", + "alternate_urls": ["https://www.liebertpub.com/loi/dna", "http://www.liebertpub.com/DNA"]}, + "url": "https://www.semanticscholar.org/paper/cf58fc20e9174b4eb3307d96d2f3e616b951d254", "title": "Efficient Turing-Universal Computation with DNA Polymers", "abstract": null, "venue": "DNA", "year": 2010, "referenceCount": 34, "citationCount": - 123, "influentialCitationCount": 11, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2010-06-14", "journal": - {"pages": "123-140"}, "authors": [{"authorId": "2282317", "name": "L. Qian"}, - {"authorId": "1788421", "name": "D. Soloveichik"}, {"authorId": "3094920", - "name": "E. Winfree"}]}, {"paperId": "6a5d97b55eb79cedee116b219eaed5a6a162ae90", - "externalIds": {"MAG": "2042727098", "ArXiv": "0910.4984", "DOI": "10.1103/PhysRevE.81.046215", - "CorpusId": 4029462, "PubMed": "20481815"}, "url": "https://www.semanticscholar.org/paper/6a5d97b55eb79cedee116b219eaed5a6a162ae90", + 123, "influentialCitationCount": 11, "isOpenAccess": true, "openAccessPdf": + {"url": "https://authors.library.caltech.edu/27111/3/DNA_stack_machines2010_DNA16.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-06-14", "journal": {"pages": "123-140"}, "authors": + [{"authorId": "2282317", "name": "L. Qian"}, {"authorId": "1788421", "name": + "D. Soloveichik"}, {"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": + "6a5d97b55eb79cedee116b219eaed5a6a162ae90", "externalIds": {"MAG": "2042727098", + "ArXiv": "0910.4984", "DOI": "10.1103/PhysRevE.81.046215", "CorpusId": 4029462, + "PubMed": "20481815"}, "corpusId": 4029462, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6a5d97b55eb79cedee116b219eaed5a6a162ae90", "title": "Stochastic Turing patterns in the Brusselator model.", "abstract": "A stochastic version of the Brusselator model is proposed and studied via the system size expansion. The mean-field equations are derived and shown @@ -3699,8 +4261,9 @@ interactions: than that determined via the conventional Turing approach, suggesting that the condition for spatial order to appear can be less stringent than customarily believed.", "venue": "Physical review. E, Statistical, nonlinear, and soft - matter physics", "year": 2009, "referenceCount": 14, "citationCount": 117, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Physics", + matter physics", "year": 2009, "referenceCount": 14, "citationCount": 120, + "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/0910.4984", "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], @@ -3711,7 +4274,7 @@ interactions: "name": "D. Fanelli"}, {"authorId": "2815566", "name": "F. Di Patti"}]}, {"paperId": "0838819fb4c0397e4312eca58def6f2bd60708c8", "externalIds": {"DBLP": "conf/cig/Hingston10", "MAG": "2067279781", "DOI": "10.1109/ITW.2010.5593336", "CorpusId": 11259370}, - "url": "https://www.semanticscholar.org/paper/0838819fb4c0397e4312eca58def6f2bd60708c8", + "corpusId": 11259370, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0838819fb4c0397e4312eca58def6f2bd60708c8", "title": "A new design for a Turing Test for Bots", "abstract": "Interesting, human-like opponents add to the entertainment value of a video game, and creating such opponents is a difficult challenge for programmers. Can artificial intelligence @@ -3726,27 +4289,38 @@ interactions: that is designed to learn how to appear more human using feedback obtained during play.", "venue": "Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games", "year": 2010, "referenceCount": 21, "citationCount": - 76, "influentialCitationCount": 9, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2010-09-30", - "journal": {"name": "Proceedings of the 2010 IEEE Conference on Computational - Intelligence and Games", "pages": "345-350"}, "authors": [{"authorId": "1747011", - "name": "P. Hingston"}]}, {"paperId": "10f3a92dc74f0f52023952146b292af90e01131e", - "externalIds": {"MAG": "1566935473", "DBLP": "conf/sle/BarrocaLAFS10", "DOI": - "10.1007/978-3-642-19440-5_19", "CorpusId": 16016675}, "url": "https://www.semanticscholar.org/paper/10f3a92dc74f0f52023952146b292af90e01131e", + 76, "influentialCitationCount": 9, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=7339&context=ecuworks", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2010-09-30", "journal": {"name": "Proceedings + of the 2010 IEEE Conference on Computational Intelligence and Games", "pages": + "345-350"}, "authors": [{"authorId": "1747011", "name": "P. Hingston"}]}, + {"paperId": "10f3a92dc74f0f52023952146b292af90e01131e", "externalIds": {"MAG": + "1566935473", "DBLP": "conf/sle/BarrocaLAFS10", "DOI": "10.1007/978-3-642-19440-5_19", + "CorpusId": 16016675}, "corpusId": 16016675, "publicationVenue": {"id": "b147e0ad-dec8-401c-87b9-3ff4c341adf3", + "name": "Software Language Engineering", "type": "conference", "alternate_names": + ["SLE", "Softw Lang Eng"]}, "url": "https://www.semanticscholar.org/paper/10f3a92dc74f0f52023952146b292af90e01131e", "title": "DSLTrans: A Turing Incomplete Transformation Language", "abstract": null, "venue": "Software Language Engineering", "year": 2010, "referenceCount": 12, "citationCount": 49, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-10-12", "journal": {"pages": "296-305"}, "authors": [{"authorId": "2161340", - "name": "B. Barroca"}, {"authorId": "144773751", "name": "L. Lucio"}, {"authorId": - "1698810", "name": "Vasco Amaral"}, {"authorId": "2058650330", "name": "Roberto - F\u00e9lix"}, {"authorId": "1865326", "name": "V. Sousa"}]}, {"paperId": "49056fb537329fbd2c5af4f57841a985914f087f", - "externalIds": {"MAG": "2952998734", "ArXiv": "1203.3298", "DBLP": "journals/corr/abs-1203-3298", - "DOI": "10.15388/INFORMATICA.2010.298", "CorpusId": 4675493}, "url": "https://www.semanticscholar.org/paper/49056fb537329fbd2c5af4f57841a985914f087f", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-10-12", "journal": {"pages": "296-305"}, "authors": + [{"authorId": "2161340", "name": "B. Barroca"}, {"authorId": "144773751", + "name": "L. Lucio"}, {"authorId": "1698810", "name": "Vasco Amaral"}, {"authorId": + "2058650330", "name": "Roberto F\u00e9lix"}, {"authorId": "1865326", "name": + "V. Sousa"}]}, {"paperId": "49056fb537329fbd2c5af4f57841a985914f087f", "externalIds": + {"MAG": "2952998734", "ArXiv": "1203.3298", "DBLP": "journals/corr/abs-1203-3298", + "DOI": "10.15388/INFORMATICA.2010.298", "CorpusId": 4675493}, "corpusId": + 4675493, "publicationVenue": {"id": "729a1139-78df-40c0-899b-17b6212e786f", + "name": "Informatica", "type": "journal", "alternate_names": ["Inform (lithuanian + Acad Sci", "Informatica (lithuanian Academy of Sciences)"], "issn": "0868-4952", + "alternate_issns": ["0134-8639"], "url": "http://content.iospress.com/journals/informatica", + "alternate_urls": ["http://eia.libis.lt/isteklius.php?url=http://www.mii.lt/informatica/index.html", + "https://www.mii.lt/informatics_in_education/"]}, "url": "https://www.semanticscholar.org/paper/49056fb537329fbd2c5af4f57841a985914f087f", "title": "Observability of Turing Machines: A Refinement of the Theory of Computation", "abstract": "The Turing machine is one of the simple abstract computational devices that can be used to investigate the limits of computability. @@ -3767,7 +4341,8 @@ interactions: This research was partially supported by the Russian Federal Program \u201cScientists and Educators in Russia of Innovations\u201d, contract number 02.740.11.5018.", "venue": "Informatica", "year": 2010, "referenceCount": 63, "citationCount": - 64, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": + 64, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1203.3298", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": @@ -3775,19 +4350,23 @@ interactions: {"name": "Informatica", "pages": "425-454", "volume": "21"}, "authors": [{"authorId": "1713953", "name": "Y. Sergeyev"}, {"authorId": "1764116", "name": "A. Garro"}]}, {"paperId": "02ec0afd083460c475850a1f4adf555495561261", "externalIds": {"MAG": - "2085426595", "DOI": "10.1007/BF01011339", "CorpusId": 122949592}, "url": - "https://www.semanticscholar.org/paper/02ec0afd083460c475850a1f4adf555495561261", + "2085426595", "DOI": "10.1007/BF01011339", "CorpusId": 122949592}, "corpusId": + 122949592, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/02ec0afd083460c475850a1f4adf555495561261", "title": "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines", "abstract": - null, "venue": "", "year": 1980, "referenceCount": 20, "citationCount": 876, - "influentialCitationCount": 30, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Journal of Statistical Physics", "pages": "563-591", - "volume": "22"}, "authors": [{"authorId": "2542436", "name": "P. Benioff"}]}, - {"paperId": "8f31d04b3186c9214a7944e529064c723628d423", "externalIds": {"DBLP": - "journals/kybernetes/Boden10", "MAG": "2081759870", "DOI": "10.1108/03684921011036132", - "CorpusId": 26516394}, "url": "https://www.semanticscholar.org/paper/8f31d04b3186c9214a7944e529064c723628d423", + null, "venue": "", "year": 1980, "referenceCount": 20, "citationCount": 891, + "influentialCitationCount": 30, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Journal + of Statistical Physics", "pages": "563-591", "volume": "22"}, "authors": [{"authorId": + "2542436", "name": "P. Benioff"}]}, {"paperId": "8f31d04b3186c9214a7944e529064c723628d423", + "externalIds": {"DBLP": "journals/kybernetes/Boden10", "MAG": "2081759870", + "DOI": "10.1108/03684921011036132", "CorpusId": 26516394}, "corpusId": 26516394, + "publicationVenue": {"id": "aa8f57e2-d5cf-4f0d-afcb-8577fb02e10a", "name": + "Kybernetes", "type": "journal", "issn": "0368-492X", "url": "https://www.emerald.com/insight/publication/issn/0368-492X", + "alternate_urls": ["http://www.emeraldinsight.com/0368-492X.htm", "http://www.emeraldinsight.com/loi/k"]}, + "url": "https://www.semanticscholar.org/paper/8f31d04b3186c9214a7944e529064c723628d423", "title": "The Turing test and artistic creativity", "abstract": "Purpose \u2013 The purpose of this paper is to consider the Turing test (TT) in relation to artistic creativity.Design/methodology/approach \u2013 Considers the TT @@ -3804,25 +4383,35 @@ interactions: relevance of the TT to artistic creativity and computer artworks and also in relation to musical creativity.Ori...", "venue": "Kybernetes", "year": 2010, "referenceCount": 9, "citationCount": 35, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2010-05-04", "journal": - {"name": "Kybernetes", "pages": "409-413", "volume": "39"}, "authors": [{"authorId": - "20986652", "name": "M. Boden"}]}, {"paperId": "0bc317e9f7a875d0553350f898a3057dddf0f1c5", - "externalIds": {"MAG": "1985482228", "DOI": "10.1016/j.febslet.2008.03.029", - "CorpusId": 7490013, "PubMed": "18381072"}, "url": "https://www.semanticscholar.org/paper/0bc317e9f7a875d0553350f898a3057dddf0f1c5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2010-05-04", "journal": {"name": "Kybernetes", "pages": "409-413", "volume": + "39"}, "authors": [{"authorId": "20986652", "name": "M. Boden"}]}, {"paperId": + "0bc317e9f7a875d0553350f898a3057dddf0f1c5", "externalIds": {"MAG": "1985482228", + "DOI": "10.1016/j.febslet.2008.03.029", "CorpusId": 7490013, "PubMed": "18381072"}, + "corpusId": 7490013, "publicationVenue": {"id": "310b8694-2328-4181-ba5b-47c46dfc8dfa", + "name": "FEBS Letters", "type": "journal", "alternate_names": ["FEB Lett"], + "issn": "0014-5793", "url": "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1873-3468", + "alternate_urls": ["https://febs.onlinelibrary.wiley.com/journal/18733468"]}, + "url": "https://www.semanticscholar.org/paper/0bc317e9f7a875d0553350f898a3057dddf0f1c5", "title": "Dynamics of Cdc42 network embodies a Turing\u2010type mechanism of yeast cell polarity", "abstract": null, "venue": "FEBS Letters", "year": - 2008, "referenceCount": 38, "citationCount": 309, "influentialCitationCount": - 38, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2008-04-30", "journal": {"name": "FEBS - Letters", "volume": "582"}, "authors": [{"authorId": "2010904", "name": "A. - Goryachev"}, {"authorId": "1858852", "name": "A. Pokhilko"}]}, {"paperId": - "f2acd4ed92017a31222358c0076ccc98e753de0d", "externalIds": {"MAG": "2143489502", - "DOI": "10.1126/science.1169973", "CorpusId": 206518190, "PubMed": "19423823"}, + 2008, "referenceCount": 38, "citationCount": 310, "influentialCitationCount": + 38, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-04-30", "journal": {"name": "FEBS Letters", "volume": "582"}, "authors": + [{"authorId": "2010904", "name": "A. Goryachev"}, {"authorId": "1858852", + "name": "A. Pokhilko"}]}, {"paperId": "f2acd4ed92017a31222358c0076ccc98e753de0d", + "externalIds": {"MAG": "2143489502", "DOI": "10.1126/science.1169973", "CorpusId": + 206518190, "PubMed": "19423823"}, "corpusId": 206518190, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/f2acd4ed92017a31222358c0076ccc98e753de0d", "title": "An Experimental Design Method Leading to Chemical Turing Patterns", "abstract": "Adding a Turing Pattern Reaction Two chemical-reaction systems @@ -3852,35 +4441,55 @@ interactions: stationary hexagonal arrays of spots and parallel stripes of pH patterns attributed to a Turing bifurcation. This method could be extended to biochemical reactions.", "venue": "Science", "year": 2009, "referenceCount": 24, "citationCount": 170, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", - "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Materials Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2009-05-08", "journal": {"name": "Science", "pages": "772 - 775", "volume": - "324"}, "authors": [{"authorId": "49679905", "name": "J. Horv\u00e1th"}, {"authorId": - "3642365", "name": "I. Szalai"}, {"authorId": "3242769", "name": "P. De Kepper"}]}, - {"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": - "3030363341", "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", - "CorpusId": 14636783}, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", - "title": "Computing Machinery and Intelligence", "abstract": "I propose to - consider the question, \u201cCan machines think?\u201d\u2663 This should begin - with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. - The definitions might be framed so as to reflect so far as possible the normal - use of the words, but this attitude is dangerous. If the meaning of the words - \u201cmachine\u201d and \u201cthink\u201d are to be found by examining how - they are commonly used it is difficult to escape the conclusion that the meaning - and the answer to the question, \u201cCan machines think?\u201d is to be sought - in a statistical survey such as a Gallup poll.", "venue": "The Philosophy - of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": - 8557, "influentialCitationCount": 492, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "1950-10-01", "journal": - {"name": "Mind", "pages": "433-460", "volume": "LIX"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2009-05-08", "journal": {"name": "Science", + "pages": "772 - 775", "volume": "324"}, "authors": [{"authorId": "49679905", + "name": "J. Horv\u00e1th"}, {"authorId": "3642365", "name": "I. Szalai"}, + {"authorId": "3242769", "name": "P. De Kepper"}]}, {"paperId": "f8feaf2c35879be54c939df2a12178751122ec33", + "externalIds": {"MAG": "2009354787", "DOI": "10.1016/J.JTBI.2006.09.036", + "CorpusId": 24963731, "PubMed": "17140604"}, "corpusId": 24963731, "publicationVenue": + {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", "name": "Journal of Theoretical + Biology", "type": "journal", "alternate_names": ["J Theor Biology"], "issn": + "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/f8feaf2c35879be54c939df2a12178751122ec33", + "title": "Instabilities in spatially extended predator-prey systems: spatio-temporal + patterns in the neighborhood of Turing-Hopf bifurcations.", "abstract": null, + "venue": "Journal of Theoretical Biology", "year": 2007, "referenceCount": + 43, "citationCount": 320, "influentialCitationCount": 11, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-03-21", "journal": + {"name": "Journal of theoretical biology", "pages": "\n 220-9\n ", + "volume": "245 2"}, "authors": [{"authorId": "6992140", "name": "M. Baurmann"}, + {"authorId": "37973754", "name": "Thilo Gross"}, {"authorId": "1719120", "name": + "U. Feudel"}]}, {"paperId": "7a35e89e1e23ba3148873390305993dea7a93e6e", "externalIds": + {"MAG": "2047506587", "DOI": "10.1038/352610A0", "CorpusId": 4316122}, "corpusId": + 4316122, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/7a35e89e1e23ba3148873390305993dea7a93e6e", + "title": "Transition from a uniform state to hexagonal and striped Turing + patterns", "abstract": null, "venue": "Nature", "year": 1991, "referenceCount": + 20, "citationCount": 718, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Nature", "pages": "610-612", "volume": "352"}, + "authors": [{"authorId": "143803550", "name": "Q. Ouyang"}, {"authorId": "2421446", + "name": "H. Swinney"}]}, {"paperId": "d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", "externalIds": {"MAG": "1985072454", "DOI": "10.1098/rstb.1952.0012", "CorpusId": - 937133}, "url": "https://www.semanticscholar.org/paper/d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", + 937133}, "corpusId": 937133, "publicationVenue": {"id": "6de51a3e-86d6-4b08-92f5-a2a4a3a1c47b", + "name": "Philosophical transactions of the Royal Society of London. Series + B, Biological sciences", "alternate_names": ["Philos trans R Soc Lond Ser + B Biological sci"], "issn": "0080-4622", "alternate_issns": ["2054-0280"], + "url": "http://www.jstor.org/action/showPublication?journalCode=philtranroyasoc2"}, + "url": "https://www.semanticscholar.org/paper/d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", "title": "The chemical basis of morphogenesis", "abstract": "It is suggested that a system of chemical substances, called morphogens, reacting together and diffusing through a tissue, is adequate to account for the main phenomena @@ -3907,30 +4516,41 @@ interactions: facts are explained, which can be found in text-books, but whose omission would make the paper difficult reading.", "venue": "Philosophical transactions of the Royal Society of London. Series B, Biological sciences", "year": 1952, - "referenceCount": 63, "citationCount": 10796, "influentialCitationCount": - 616, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Environmental Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1952-08-14", - "journal": {"name": "Bulletin of Mathematical Biology", "pages": "153-197", - "volume": "52"}, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, - {"paperId": "f8feaf2c35879be54c939df2a12178751122ec33", "externalIds": {"MAG": - "2009354787", "DOI": "10.1016/J.JTBI.2006.09.036", "CorpusId": 24963731, "PubMed": - "17140604"}, "url": "https://www.semanticscholar.org/paper/f8feaf2c35879be54c939df2a12178751122ec33", - "title": "Instabilities in spatially extended predator-prey systems: spatio-temporal - patterns in the neighborhood of Turing-Hopf bifurcations.", "abstract": null, - "venue": "Journal of Theoretical Biology", "year": 2007, "referenceCount": - 43, "citationCount": 307, "influentialCitationCount": 11, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-03-21", "journal": {"name": "Journal - of theoretical biology", "pages": "\n 220-9\n ", "volume": - "245 2"}, "authors": [{"authorId": "6992140", "name": "M. Baurmann"}, {"authorId": - "37973754", "name": "Thilo Gross"}, {"authorId": "1719120", "name": "U. Feudel"}]}, - {"paperId": "61e972ce10138b742825b851c35a04155bbc34ae", "externalIds": {"MAG": - "2151162056", "DBLP": "journals/tciaig/Hingston09", "DOI": "10.1109/TCIAIG.2009.2032534", - "CorpusId": 13988179}, "url": "https://www.semanticscholar.org/paper/61e972ce10138b742825b851c35a04155bbc34ae", + "referenceCount": 59, "citationCount": 10868, "influentialCitationCount": + 626, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1952-08-14", "journal": {"name": "Bulletin of Mathematical + Biology", "pages": "153-197", "volume": "52"}, "authors": [{"authorId": "2079681794", + "name": "A. Turing"}]}, {"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", + "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": + "10.1093/MIND/LIX.236.433", "CorpusId": 14636783}, "corpusId": 14636783, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", + "title": "Computing Machinery and Intelligence", "abstract": "I propose to + consider the question, \u201cCan machines think?\u201d\u2663 This should begin + with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. + The definitions might be framed so as to reflect so far as possible the normal + use of the words, but this attitude is dangerous. If the meaning of the words + \u201cmachine\u201d and \u201cthink\u201d are to be found by examining how + they are commonly used it is difficult to escape the conclusion that the meaning + and the answer to the question, \u201cCan machines think?\u201d is to be sought + in a statistical survey such as a Gallup poll.", "venue": "The Philosophy + of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": + 8596, "influentialCitationCount": 493, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1950-10-01", + "journal": {"name": "Mind", "pages": "433-460", "volume": "LIX"}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "61e972ce10138b742825b851c35a04155bbc34ae", + "externalIds": {"MAG": "2151162056", "DBLP": "journals/tciaig/Hingston09", + "DOI": "10.1109/TCIAIG.2009.2032534", "CorpusId": 13988179}, "corpusId": 13988179, + "publicationVenue": {"id": "c56495e2-32b0-440c-b5e2-839c615cfbe5", "name": + "IEEE Transactions on Computational Intelligence and AI in Games", "type": + "journal", "alternate_names": ["IEEE Trans Comput Intell AI Game"], "issn": + "1943-068X", "alternate_issns": ["1943-0698"], "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=4804728", + "alternate_urls": ["http://ieee-cis.org/pubs/tciaig/"]}, "url": "https://www.semanticscholar.org/paper/61e972ce10138b742825b851c35a04155bbc34ae", "title": "A Turing Test for Computer Game Bots", "abstract": "In this paper, a version of the Turing Test is proposed, to test the ability of computer game playing agents (ldquobotsrdquo) to imitate human game players. The proposed @@ -3940,25 +4560,16 @@ interactions: show promise. We also suggest probable future directions for developing improved bots.", "venue": "IEEE Transactions on Computational Intelligence and AI in Games", "year": 2009, "referenceCount": 57, "citationCount": 146, "influentialCitationCount": - 15, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-09-18", "journal": {"name": "IEEE Transactions on - Computational Intelligence and AI in Games", "pages": "169-186", "volume": - "1"}, "authors": [{"authorId": "1747011", "name": "P. Hingston"}]}, {"paperId": - "7a35e89e1e23ba3148873390305993dea7a93e6e", "externalIds": {"MAG": "2047506587", - "DOI": "10.1038/352610A0", "CorpusId": 4316122}, "url": "https://www.semanticscholar.org/paper/7a35e89e1e23ba3148873390305993dea7a93e6e", - "title": "Transition from a uniform state to hexagonal and striped Turing - patterns", "abstract": null, "venue": "Nature", "year": 1991, "referenceCount": - 20, "citationCount": 712, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Nature", - "pages": "610-612", "volume": "352"}, "authors": [{"authorId": "143803550", - "name": "Q. Ouyang"}, {"authorId": "2421446", "name": "H. Swinney"}]}, {"paperId": - "ab7790485f26ce65f9d83dd700c43e49058bdd2b", "externalIds": {"MAG": "2022731279", - "DBLP": "journals/x/Turing37", "DOI": "10.1112/PLMS/S2-42.1.230", "CorpusId": - 73712}, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-09-18", "journal": + {"name": "IEEE Transactions on Computational Intelligence and AI in Games", + "pages": "169-186", "volume": "1"}, "authors": [{"authorId": "1747011", "name": + "P. Hingston"}]}, {"paperId": "ab7790485f26ce65f9d83dd700c43e49058bdd2b", + "externalIds": {"MAG": "2022731279", "DBLP": "journals/x/Turing37", "DOI": + "10.1112/PLMS/S2-42.1.230", "CorpusId": 73712}, "corpusId": 73712, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", "title": "On computable numbers, with an application to the Entscheidungsproblem", "abstract": "1. Computing machines. 2. Definitions. Automatic machines. Computing machines. Circle and circle-free numbers. Computable sequences and numbers. @@ -3967,16 +4578,23 @@ interactions: 7. Detailed description of the universal machine. 8. Application of the diagonal process. Pagina 1 di 38 On computable numbers, with an application to the Entscheidungsproblem A. M. ...", "venue": "Proc. London Math. Soc.", "year": - 2021, "referenceCount": 81, "citationCount": 8327, "influentialCitationCount": - 535, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-02-02", "journal": {"name": "Proc. London Math. Soc.", - "pages": "230-265", "volume": "s2-42"}, "authors": [{"authorId": "2079681794", - "name": "A. Turing"}]}, {"paperId": "1ce2d442c9b539e8d6631fc82eda6704da80d8fc", + 2021, "referenceCount": 81, "citationCount": 8348, "influentialCitationCount": + 536, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"name": "Proc. + London Math. Soc.", "pages": "230-265", "volume": "s2-42"}, "authors": [{"authorId": + "2079681794", "name": "A. Turing"}]}, {"paperId": "1ce2d442c9b539e8d6631fc82eda6704da80d8fc", "externalIds": {"DBLP": "journals/comj/Ariza09", "MAG": "1979720880", "DOI": - "10.1162/comj.2009.33.2.48", "CorpusId": 11268522}, "url": "https://www.semanticscholar.org/paper/1ce2d442c9b539e8d6631fc82eda6704da80d8fc", + "10.1162/comj.2009.33.2.48", "CorpusId": 11268522}, "corpusId": 11268522, + "publicationVenue": {"id": "48ce6bf2-7773-4d99-9db8-4bb1b71c69b8", "name": + "Computer Music Journal", "type": "journal", "alternate_names": ["Comput Music + J"], "issn": "0148-9267", "url": "http://muse.jhu.edu/journals/computer_music_journal/", + "alternate_urls": ["http://www.computermusicjournal.org/", "https://www.jstor.org/journal/computermusicj", + "http://newfirstsearch.oclc.org/dbname=ECO;journal=0148-9267;screen=info;done=referer;FSIP", + "http://mitpress.mit.edu/e-journals/Computer-Music-Journal/", "https://www.mitpressjournals.org/loi/comj", + "http://www.jstor.org/journals/01489267.html"]}, "url": "https://www.semanticscholar.org/paper/1ce2d442c9b539e8d6631fc82eda6704da80d8fc", "title": "The Interrogator as Critic: The Turing Test and the Evaluation of Generative Music Systems", "abstract": "Procedural or algorithmic approaches to generating music have been explored in the medium of software for over @@ -3995,26 +4613,31 @@ interactions: argues that Turing''s well-known proposal cannot be applied to executing and evaluating listener surveys.", "venue": "Computer Music Journal", "year": 2009, "referenceCount": 158, "citationCount": 114, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2009-06-01", "journal": {"name": "Computer - Music Journal", "pages": "48-70", "volume": "33"}, "authors": [{"authorId": - "34588118", "name": "C. Ariza"}]}, {"paperId": "6517271a707e8de4aab98a7b92276edfec89f577", - "externalIds": {"DBLP": "journals/jns/RicardM09", "MAG": "2060665770", "DOI": - "10.1007/s00332-009-9041-6", "CorpusId": 32800311}, "url": "https://www.semanticscholar.org/paper/6517271a707e8de4aab98a7b92276edfec89f577", + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2009-06-01", + "journal": {"name": "Computer Music Journal", "pages": "48-70", "volume": + "33"}, "authors": [{"authorId": "34588118", "name": "C. Ariza"}]}, {"paperId": + "6517271a707e8de4aab98a7b92276edfec89f577", "externalIds": {"DBLP": "journals/jns/RicardM09", + "MAG": "2060665770", "DOI": "10.1007/s00332-009-9041-6", "CorpusId": 32800311}, + "corpusId": 32800311, "publicationVenue": {"id": "619f4cc3-1d00-4060-b88d-9854843ac2c2", + "name": "Journal of nonlinear science", "type": "journal", "alternate_names": + ["J Nonlinear Sci", "Journal of Nonlinear Science", "J nonlinear sci"], "issn": + "0938-8974", "url": "https://link.springer.com/journal/332"}, "url": "https://www.semanticscholar.org/paper/6517271a707e8de4aab98a7b92276edfec89f577", "title": "Turing Instabilities at Hopf Bifurcation", "abstract": null, "venue": "Journal of nonlinear science", "year": 2009, "referenceCount": 37, "citationCount": - 45, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-02-19", "journal": {"name": "Journal - of Nonlinear Science", "pages": "467-496", "volume": "19"}, "authors": [{"authorId": - "144673205", "name": "M. R. Ricard"}, {"authorId": "48072518", "name": "S. - Mischler"}]}, {"paperId": "57f66d4dd71a94a4254866cf4591bd10fd187de5", "externalIds": - {"MAG": "2499551314", "DOI": "10.5948/UPO9780883859742.031", "CorpusId": 57183014}, - "url": "https://www.semanticscholar.org/paper/57f66d4dd71a94a4254866cf4591bd10fd187de5", + 46, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-02-19", "journal": + {"name": "Journal of Nonlinear Science", "pages": "467-496", "volume": "19"}, + "authors": [{"authorId": "144673205", "name": "M. R. Ricard"}, {"authorId": + "48072518", "name": "S. Mischler"}]}, {"paperId": "57f66d4dd71a94a4254866cf4591bd10fd187de5", + "externalIds": {"MAG": "2499551314", "DOI": "10.5948/UPO9780883859742.031", + "CorpusId": 57183014}, "corpusId": 57183014, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/57f66d4dd71a94a4254866cf4591bd10fd187de5", "title": "Resources for Teaching Discrete Mathematics: A Study of Logic and Programming via Turing Machines", "abstract": "During the International Congress of Mathematicians in Paris in 1900 David Hilbert (1862\u20131943), one of @@ -4033,14 +4656,15 @@ interactions: known as a Turing machine. Let\u2019s first study a few excerpts from Turing\u2019s original paper [13, p. 231\u2013234], and then design a few machines to perform certain tasks.", "venue": "", "year": 2009, "referenceCount": 16, "citationCount": - 48, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "3024181", "name": "Jerry Lodder"}]}, - {"paperId": "572527f774793778cc6a4bbfbcacf144890ffbff", "externalIds": {"MAG": - "2102075452", "DBLP": "journals/cacm/BohmJ66", "DOI": "10.1145/355592.365646", - "CorpusId": 10236439}, "url": "https://www.semanticscholar.org/paper/572527f774793778cc6a4bbfbcacf144890ffbff", + 48, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "3024181", "name": "Jerry + M. Lodder"}]}, {"paperId": "572527f774793778cc6a4bbfbcacf144890ffbff", "externalIds": + {"MAG": "2102075452", "DBLP": "journals/cacm/BohmJ66", "DOI": "10.1145/355592.365646", + "CorpusId": 10236439}, "corpusId": 10236439, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/572527f774793778cc6a4bbfbcacf144890ffbff", "title": "Flow diagrams, turing machines and languages with only two formation rules", "abstract": "In the first part of the paper, flow diagrams are introduced to represent inter ah mappings of a set into itself. Although not every diagram @@ -4055,8 +4679,9 @@ interactions: squares. The new machine belongs to the family, elsewhere introduced, generated by composition and iteration from the two machines X and R. That family is a proper subfamily of the whole family of Turing machines.", "venue": "CACM", - "year": 1966, "referenceCount": 10, "citationCount": 852, "influentialCitationCount": - 32, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "year": 1966, "referenceCount": 10, "citationCount": 853, "influentialCitationCount": + 32, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/355592.365646", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -4065,19 +4690,28 @@ interactions: B\u00f6hm"}, {"authorId": "47000664", "name": "G. Jacopini"}]}, {"paperId": "7a69c29d0eef3e2921af908aeb308b8031826c3e", "externalIds": {"ArXiv": "0707.4489", "DBLP": "conf/fct/NearyW09", "MAG": "2950858429", "DOI": "10.1007/978-3-642-03409-1_24", - "CorpusId": 3063694}, "url": "https://www.semanticscholar.org/paper/7a69c29d0eef3e2921af908aeb308b8031826c3e", + "CorpusId": 3063694}, "corpusId": 3063694, "publicationVenue": {"id": "6c136c4c-2f76-4921-ab03-81775cf4530f", + "name": "International Symposium on Fundamentals of Computation Theory", "type": + "conference", "alternate_names": ["Fundam Comput Theory", "Int Symp Fundam + Comput Theory", "Fundamentals of Computation Theory", "FCT"]}, "url": "https://www.semanticscholar.org/paper/7a69c29d0eef3e2921af908aeb308b8031826c3e", "title": "Small Weakly Universal Turing Machines", "abstract": null, "venue": "International Symposium on Fundamentals of Computation Theory", "year": 2007, "referenceCount": 34, "citationCount": 34, "influentialCitationCount": 3, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://mural.maynoothuniversity.ie/15730/1/DW_small%20weakly.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2007-07-30", "journal": {"name": "ArXiv", - "volume": "abs/0707.4489"}, "authors": [{"authorId": "2221070", "name": "T. + "volume": "abs/0707.4489"}, "authors": [{"authorId": "2221070", "name": "Turlough Neary"}, {"authorId": "145284748", "name": "D. Woods"}]}, {"paperId": "687684749814cbe54672d3b53ea08df6c66382bb", "externalIds": {"MAG": "2003363530", "DBLP": "journals/computer/ArelL09", - "DOI": "10.1109/MC.2009.67", "CorpusId": 6844420}, "url": "https://www.semanticscholar.org/paper/687684749814cbe54672d3b53ea08df6c66382bb", + "DOI": "10.1109/MC.2009.67", "CorpusId": 6844420}, "corpusId": 6844420, "publicationVenue": + {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", "name": "Computer", "type": + "journal", "alternate_names": ["IEEE Computer", "IEEE Comput"], "issn": "0018-9162", + "url": "http://www.computer.org/computer", "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/687684749814cbe54672d3b53ea08df6c66382bb", "title": "Beyond the Turing Test", "abstract": "Despite the technological marvel of the Internet and the rapidly proliferating mobile technologies that are fundamentally changing the way we interact, AI''s original \"grand dream\" @@ -4086,15 +4720,17 @@ interactions: creating important benchmarks, we may yet achieve that dream. However, this will only happen if the nascent AGI community coalesces and works toward a common vision.", "venue": "Computer", "year": 2009, "referenceCount": 0, "citationCount": - 101, "influentialCitationCount": 16, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-03-01", "journal": - {"name": "Computer", "pages": "90-91", "volume": "42"}, "authors": [{"authorId": - "1804314", "name": "I. Arel"}, {"authorId": "112907736", "name": "Scott Livingston"}]}, - {"paperId": "2842d53d0f2389618f8ad1c47d2ffef2c344d22f", "externalIds": {"MAG": - "2059442002", "DBLP": "conf/stoc/Gill74", "DOI": "10.1145/800119.803889", - "CorpusId": 15320656}, "url": "https://www.semanticscholar.org/paper/2842d53d0f2389618f8ad1c47d2ffef2c344d22f", + 102, "influentialCitationCount": 16, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-03-01", "journal": {"name": "Computer", "pages": "90-91", "volume": + "42"}, "authors": [{"authorId": "1804314", "name": "I. Arel"}, {"authorId": + "112907736", "name": "Scott Livingston"}]}, {"paperId": "2842d53d0f2389618f8ad1c47d2ffef2c344d22f", + "externalIds": {"MAG": "2059442002", "DBLP": "conf/stoc/Gill74", "DOI": "10.1145/800119.803889", + "CorpusId": 15320656}, "corpusId": 15320656, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/2842d53d0f2389618f8ad1c47d2ffef2c344d22f", "title": "Computational complexity of probabilistic Turing machines", "abstract": "Probabilistic Turing machines are Turing machines with the ability to flip coins in order to make random decisions. We allow probabilistic Turing machines @@ -4104,27 +4740,33 @@ interactions: linear-bounded automata can simulate nondeterministic linear-bounded automata.", "venue": "Symposium on the Theory of Computing", "year": 1974, "referenceCount": 7, "citationCount": 740, "influentialCitationCount": 54, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1974-04-30", "journal": - {"name": "SIAM J. Comput.", "pages": "675-695", "volume": "6"}, "authors": - [{"authorId": "145896360", "name": "John Gill"}]}, {"paperId": "c073816dbbffa47e66be8bf3cb02e5f8d538f7db", - "externalIds": {"MAG": "1646814793", "DBLP": "journals/tcs/WoodsN09", "ArXiv": - "1110.2230", "DOI": "10.1016/j.tcs.2008.09.051", "CorpusId": 10257004}, "url": - "https://www.semanticscholar.org/paper/c073816dbbffa47e66be8bf3cb02e5f8d538f7db", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800119.803889", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1974-04-30", "journal": {"name": "SIAM J. Comput.", "pages": + "675-695", "volume": "6"}, "authors": [{"authorId": "145896360", "name": "John + Gill"}]}, {"paperId": "c073816dbbffa47e66be8bf3cb02e5f8d538f7db", "externalIds": + {"MAG": "1646814793", "DBLP": "journals/tcs/WoodsN09", "ArXiv": "1110.2230", + "DOI": "10.1016/j.tcs.2008.09.051", "CorpusId": 10257004}, "corpusId": 10257004, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/c073816dbbffa47e66be8bf3cb02e5f8d538f7db", "title": "The complexity of small universal Turing machines: A survey", "abstract": null, "venue": "Theoretical Computer Science", "year": 2009, "referenceCount": - 104, "citationCount": 80, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2009-02-10", - "journal": {"name": "ArXiv", "volume": "abs/1110.2230"}, "authors": [{"authorId": - "145284748", "name": "D. Woods"}, {"authorId": "2221070", "name": "T. Neary"}]}, - {"paperId": "bc2efe31591b6d7ff80cfb32448d99d48fd83c31", "externalIds": {"DBLP": - "books/daglib/0006735", "MAG": "1496937667", "CorpusId": 118988352}, "url": - "https://www.semanticscholar.org/paper/bc2efe31591b6d7ff80cfb32448d99d48fd83c31", + 104, "citationCount": 81, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2009-02-10", "journal": {"name": "ArXiv", "volume": + "abs/1110.2230"}, "authors": [{"authorId": "145284748", "name": "D. Woods"}, + {"authorId": "2221070", "name": "Turlough Neary"}]}, {"paperId": "bc2efe31591b6d7ff80cfb32448d99d48fd83c31", + "externalIds": {"DBLP": "books/daglib/0006735", "MAG": "1496937667", "CorpusId": + 118988352}, "corpusId": 118988352, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc2efe31591b6d7ff80cfb32448d99d48fd83c31", "title": "Neural networks and analog computation - beyond the Turing limit", "abstract": "1 Computational Complexity.- 1.1 Neural Networks.- 1.2 Automata: A General Introduction.- 1.2.1 Input Sets in Computability Theory.- 1.3 Finite @@ -4168,15 +4810,18 @@ interactions: Limit.- 12.1 The Analog Shift Map.- 12.2 Analog Shift and Computation.- 12.3 Physical Relevance.- 12.4 Conclusions.", "venue": "Progress in theoretical computer science", "year": 1999, "referenceCount": 1, "citationCount": 418, - "influentialCitationCount": 28, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1999-03-01", "journal": {"pages": "I-XIII, 1-181"}, - "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": - "044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", "externalIds": {"ArXiv": "2007.14062", - "DBLP": "journals/corr/abs-2007-14062", "MAG": "3104613728", "CorpusId": 220831004}, - "url": "https://www.semanticscholar.org/paper/044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", + "influentialCitationCount": 28, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-03-01", "journal": {"pages": + "I-XIII, 1-181"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, + {"paperId": "044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", "externalIds": {"ArXiv": + "2007.14062", "DBLP": "journals/corr/abs-2007-14062", "MAG": "3104613728", + "CorpusId": 220831004}, "corpusId": 220831004, "publicationVenue": {"id": + "d9720b90-d60b-48bc-9df8-87a30b9a60dd", "name": "Neural Information Processing + Systems", "type": "conference", "alternate_names": ["Neural Inf Process Syst", + "NeurIPS"], "url": "http://neurips.cc/"}, "url": "https://www.semanticscholar.org/paper/044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", "title": "Big Bird: Transformers for Longer Sequences", "abstract": "Transformers-based models, such as BERT, have been one of the most successful deep learning models for NLP. Unfortunately, one of their core limitations is the quadratic dependency @@ -4193,10 +4838,10 @@ interactions: improves performance on various NLP tasks such as question answering and summarization. We also propose novel applications to genomics data.", "venue": "Neural Information Processing Systems", "year": 2020, "referenceCount": 117, "citationCount": - 753, "influentialCitationCount": 131, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics", "Geography"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Geography", "source": "external"}, {"category": + 770, "influentialCitationCount": 132, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics", "Geography"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Geography", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-07-28", "journal": {"name": "ArXiv", "volume": "abs/2007.14062"}, "authors": [{"authorId": "1771307", "name": "M. Zaheer"}, {"authorId": "1947314", @@ -4208,7 +4853,8 @@ interactions: {"authorId": "113906155", "name": "Li Yang"}, {"authorId": "143629707", "name": "Amr Ahmed"}]}, {"paperId": "571b0750085ae3d939525e62af510ee2cee9d5ea", "externalIds": {"MAG": "2963373786", "ArXiv": "1606.03498", "DBLP": "conf/nips/SalimansGZCRCC16", - "CorpusId": 1687220}, "url": "https://www.semanticscholar.org/paper/571b0750085ae3d939525e62af510ee2cee9d5ea", + "CorpusId": 1687220}, "corpusId": 1687220, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/571b0750085ae3d939525e62af510ee2cee9d5ea", "title": "Improved Techniques for Training GANs", "abstract": "We present a variety of new architectural features and training procedures that we apply to the generative adversarial networks (GANs) framework. We focus on two applications @@ -4223,22 +4869,24 @@ interactions: a human error rate of 21.3%. We also present ImageNet samples with unprecedented resolution and show that our methods enable the model to learn recognizable features of ImageNet classes.", "venue": "NIPS", "year": 2016, "referenceCount": - 27, "citationCount": 6281, "influentialCitationCount": 821, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2016-06-10", - "journal": {"name": "ArXiv", "volume": "abs/1606.03498"}, "authors": [{"authorId": - "2887364", "name": "Tim Salimans"}, {"authorId": "153440022", "name": "Ian - J. Goodfellow"}, {"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": - "34415167", "name": "Vicki Cheung"}, {"authorId": "38909097", "name": "Alec - Radford"}, {"authorId": "41192764", "name": "Xi Chen"}]}, {"paperId": "f0a55c114e79b8a802fceaad7881a94dbcab790e", + 27, "citationCount": 6322, "influentialCitationCount": 832, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2016-06-10", "journal": {"name": "ArXiv", + "volume": "abs/1606.03498"}, "authors": [{"authorId": "2887364", "name": "Tim + Salimans"}, {"authorId": "153440022", "name": "Ian J. Goodfellow"}, {"authorId": + "2563432", "name": "Wojciech Zaremba"}, {"authorId": "34415167", "name": "Vicki + Cheung"}, {"authorId": "38909097", "name": "Alec Radford"}, {"authorId": "41192764", + "name": "Xi Chen"}]}, {"paperId": "f0a55c114e79b8a802fceaad7881a94dbcab790e", "externalIds": {"MAG": "240375037", "DOI": "10.1007/978-1-4020-6710-5", "CorpusId": - 60070108}, "url": "https://www.semanticscholar.org/paper/f0a55c114e79b8a802fceaad7881a94dbcab790e", + 60070108}, "corpusId": 60070108, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f0a55c114e79b8a802fceaad7881a94dbcab790e", "title": "Parsing the Turing Test: Philosophical and Methodological Issues in the Quest for the Thinking Computer", "abstract": null, "venue": "", "year": 2008, "referenceCount": 347, "citationCount": 132, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-1-4020-6710-5%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": "2008-12-03", "journal": {"name": "Parsing the Turing Test"}, "authors": [{"authorId": @@ -4246,19 +4894,49 @@ interactions: Roberts"}, {"authorId": "69358556", "name": "Grace Beber"}]}, {"paperId": "916023340b51142c48d5a75c27b1b962f6e665d9", "externalIds": {"DBLP": "journals/mima/SayginCA00", "MAG": "1648383461", "DOI": "10.1023/A:1011288000451", "CorpusId": 990084}, - "url": "https://www.semanticscholar.org/paper/916023340b51142c48d5a75c27b1b962f6e665d9", + "corpusId": 990084, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/916023340b51142c48d5a75c27b1b962f6e665d9", "title": "Turing Test: 50 Years Later", "abstract": null, "venue": "Minds - and Machines", "year": 2000, "referenceCount": 196, "citationCount": 327, - "influentialCitationCount": 11, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2000-11-01", "journal": {"name": "Minds and - Machines", "pages": "463-518", "volume": "10"}, "authors": [{"authorId": "2277803", - "name": "A. Saygin"}, {"authorId": "3188981", "name": "I. \u00c7i\u00e7ekli"}, - {"authorId": "2407157", "name": "Varol Akman"}]}, {"paperId": "e40054dd660f12eba7e06b07dde718602a544dee", + and Machines", "year": 2000, "referenceCount": 196, "citationCount": 331, + "influentialCitationCount": 11, "isOpenAccess": true, "openAccessPdf": {"url": + "http://repository.bilkent.edu.tr/bitstream/11693/24987/1/Turing%20Test%2050%20Years%20Later.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2000-11-01", + "journal": {"name": "Minds and Machines", "pages": "463-518", "volume": "10"}, + "authors": [{"authorId": "2277803", "name": "A. Saygin"}, {"authorId": "3188981", + "name": "I. \u00c7i\u00e7ekli"}, {"authorId": null, "name": "Varol Akman"}]}, + {"paperId": "118af918b5b39fada864417090b3f4c7ceacb63c", "externalIds": {"MAG": + "649147738", "CorpusId": 57640893}, "corpusId": 57640893, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/118af918b5b39fada864417090b3f4c7ceacb63c", + "title": "Hypercomputation: Computing Beyond the Church-Turing Barrier", "abstract": + "This book provides a thorough description of hypercomputation. It covers + all attempts at devising conceptual hypermachines and all new promising computational + paradigms that may eventually lead to the construction of a hypermachine. + Readers will gain a deeper understanding of what computability is, and why + the Church-Turing thesis poses an arbitrary limit to what can be actually + computed. Hypercomputing is a relatively novel idea. However, the books most + important features are its description of the various attempts of hypercomputation, + from trial-and-error machines to the exploration of the human mind, if we + treat it as a computing device.", "venue": "", "year": 2008, "referenceCount": + 0, "citationCount": 72, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1678557", + "name": "A. Syropoulos"}]}, {"paperId": "e40054dd660f12eba7e06b07dde718602a544dee", "externalIds": {"MAG": "2061393260", "DBLP": "journals/siamam/GolovinMV08", - "DOI": "10.1137/070703454", "CorpusId": 207057334}, "url": "https://www.semanticscholar.org/paper/e40054dd660f12eba7e06b07dde718602a544dee", + "DOI": "10.1137/070703454", "CorpusId": 207057334}, "corpusId": 207057334, + "publicationVenue": {"id": "9b3052dd-9e29-41cb-927c-28df9e08a68b", "name": + "SIAM Journal on Applied Mathematics", "type": "journal", "alternate_names": + ["SIAM J Appl Math", "Siam Journal on Applied Mathematics", "Siam J Appl Math"], + "issn": "0036-1399", "url": "https://www.jstor.org/journal/siamjapplmath", + "alternate_urls": ["https://epubs.siam.org/journal/smjmap", "http://www.jstor.org/journals/00361399.html"]}, + "url": "https://www.semanticscholar.org/paper/e40054dd660f12eba7e06b07dde718602a544dee", "title": "Turing Pattern Formation in the Brusselator Model with Superdiffusion", "abstract": "The effect of superdiffusion on pattern formation and pattern selection in the Brusselator model is studied. Our linear stability analysis @@ -4270,16 +4948,17 @@ interactions: Brusselator model near the stability boundaries confirm the results of the analysis. In addition, further from the stability boundaries, we find a regime of self-replicating spots.", "venue": "SIAM Journal on Applied Mathematics", - "year": 2008, "referenceCount": 65, "citationCount": 90, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-10-13", "journal": {"name": "SIAM J. Appl. Math.", "pages": "251-272", - "volume": "69"}, "authors": [{"authorId": "3343606", "name": "A. Golovin"}, - {"authorId": "1767738", "name": "B. Matkowsky"}, {"authorId": "153486742", - "name": "V. Volpert"}]}, {"paperId": "fc756d1f45ea1c6ce9d2f4a23677eb3966bc00e2", - "externalIds": {"MAG": "595947030", "CorpusId": 60268691}, "url": "https://www.semanticscholar.org/paper/fc756d1f45ea1c6ce9d2f4a23677eb3966bc00e2", + "year": 2008, "referenceCount": 65, "citationCount": 93, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-10-13", "journal": {"name": "SIAM J. Appl. Math.", + "pages": "251-272", "volume": "69"}, "authors": [{"authorId": "3343606", "name": + "A. Golovin"}, {"authorId": "1767738", "name": "B. Matkowsky"}, {"authorId": + "153486742", "name": "V. Volpert"}]}, {"paperId": "fc756d1f45ea1c6ce9d2f4a23677eb3966bc00e2", + "externalIds": {"MAG": "595947030", "CorpusId": 60268691}, "corpusId": 60268691, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc756d1f45ea1c6ce9d2f4a23677eb3966bc00e2", "title": "The Annotated Turing: A Guided Tour Through Alan Turing''s Historic Paper on Computability and the Turing Machine", "abstract": "Programming Legend Charles Petzold unlocks the secrets of the extraordinary and prescient 1936 @@ -4296,99 +4975,45 @@ interactions: World War II, his involvement in seminal computer projects, his speculations about artificial intelligence, his arrest and prosecution for the crime of \"gross indecency,\" and his early death by apparent suicide at the age of - 41.", "venue": "", "year": 2008, "referenceCount": 20, "citationCount": 73, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "50033100", "name": "C. Petzold"}]}, - {"paperId": "3818c41db935df7d5c21348e5630de1a209da054", "externalIds": {"ArXiv": - "0807.1230", "DOI": "10.1038/nphys1651", "CorpusId": 222175726}, "url": "https://www.semanticscholar.org/paper/3818c41db935df7d5c21348e5630de1a209da054", - "title": "Turing patterns on networks", "abstract": null, "venue": "", "year": - 2008, "referenceCount": 14, "citationCount": 95, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-07-08", - "journal": null, "authors": [{"authorId": "3259202", "name": "H. Nakao"}, - {"authorId": "2490613", "name": "A. Mikhailov"}]}, {"paperId": "118af918b5b39fada864417090b3f4c7ceacb63c", - "externalIds": {"MAG": "649147738", "CorpusId": 57640893}, "url": "https://www.semanticscholar.org/paper/118af918b5b39fada864417090b3f4c7ceacb63c", - "title": "Hypercomputation: Computing Beyond the Church-Turing Barrier", "abstract": - "This book provides a thorough description of hypercomputation. It covers - all attempts at devising conceptual hypermachines and all new promising computational - paradigms that may eventually lead to the construction of a hypermachine. - Readers will gain a deeper understanding of what computability is, and why - the Church-Turing thesis poses an arbitrary limit to what can be actually - computed. Hypercomputing is a relatively novel idea. However, the books most - important features are its description of the various attempts of hypercomputation, - from trial-and-error machines to the exploration of the human mind, if we - treat it as a computing device.", "venue": "", "year": 2008, "referenceCount": - 0, "citationCount": 72, "influentialCitationCount": 5, "isOpenAccess": false, + 41.", "venue": "", "year": 2008, "referenceCount": 19, "citationCount": 72, + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "1678557", "name": "A. - Syropoulos"}]}, {"paperId": "d304686801a3c9563939b7c88853569ab89b9258", "externalIds": - {"MAG": "1509006216", "DOI": "10.1007/978-1-4020-6710-5_2", "CorpusId": 58530775}, - "url": "https://www.semanticscholar.org/paper/d304686801a3c9563939b7c88853569ab89b9258", + {"name": "", "volume": ""}, "authors": [{"authorId": "50033100", "name": "C. + Petzold"}]}, {"paperId": "3818c41db935df7d5c21348e5630de1a209da054", "externalIds": + {"ArXiv": "0807.1230", "DOI": "10.1038/nphys1651", "CorpusId": 222175726}, + "corpusId": 222175726, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3818c41db935df7d5c21348e5630de1a209da054", + "title": "Turing patterns on networks", "abstract": null, "venue": "", "year": + 2008, "referenceCount": 5, "citationCount": 96, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0807.1230", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-07-08", + "journal": null, "authors": [{"authorId": "3259202", "name": "H. Nakao"}, + {"authorId": "2490613", "name": "A. Mikhailov"}]}, {"paperId": "d304686801a3c9563939b7c88853569ab89b9258", + "externalIds": {"MAG": "1509006216", "DOI": "10.1007/978-1-4020-6710-5_2", + "CorpusId": 58530775}, "corpusId": 58530775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d304686801a3c9563939b7c88853569ab89b9258", "title": "Alan Turing and the Turing Test", "abstract": null, "venue": "", "year": 2009, "referenceCount": 7, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "13-22", "volume": ""}, "authors": [{"authorId": - "144443425", "name": "A. Hodges"}]}, {"paperId": "48b0b047f9288d2310a2dffd7cd181dbfcfcce70", - "externalIds": {"MAG": "2169961916", "DBLP": "conf/birthday/BokerD08", "DOI": - "10.1007/978-3-540-78127-1_12", "CorpusId": 7263836}, "url": "https://www.semanticscholar.org/paper/48b0b047f9288d2310a2dffd7cd181dbfcfcce70", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "pages": "13-22", "volume": + ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "48b0b047f9288d2310a2dffd7cd181dbfcfcce70", "externalIds": {"MAG": "2169961916", + "DBLP": "conf/birthday/BokerD08", "DOI": "10.1007/978-3-540-78127-1_12", "CorpusId": + 7263836}, "corpusId": 7263836, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48b0b047f9288d2310a2dffd7cd181dbfcfcce70", "title": "The Church-Turing Thesis over Arbitrary Domains", "abstract": null, "venue": "Pillars of Computer Science", "year": 2008, "referenceCount": 49, "citationCount": 49, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "199-229"}, "authors": [{"authorId": "2875305", "name": "Udi Boker"}, - {"authorId": "1759551", "name": "N. Dershowitz"}]}, {"paperId": "692dfc2923a49a6e43c927fe21ac9f21f41d031b", - "externalIds": {"MAG": "2057794837", "DBLP": "journals/cim/Mendel07b", "DOI": - "10.1109/MCI.2007.9066897", "CorpusId": 16970447}, "url": "https://www.semanticscholar.org/paper/692dfc2923a49a6e43c927fe21ac9f21f41d031b", - "title": "Computing with Words: Zadeh, Turing, Popper and Occam", "abstract": - "In this article, after explaining Zadeh''s computing with words (CWW) paradigm, - I argue that for this paradigm to be embraced, it must be validated using - a Turinglike test, use a scientifically correct fuzzy set model for words, - namely interval type-2 fuzzy sets (IT2 FSs), and be simple, meaning that fuzzy - set operations should be as simple as possible. These conclusions are drawn - using the ideas of Turing, Popper and Occam. Short descriptions are provided - for a Perceptual Computer (Per-C), which is an architecture for CWW for making - subjective judgments, IT2 FSs, IT2 FS models for words, and why an IT2 FS - model captures first-order uncertainties about a word. Short biographies of - Zadeh, Turing, Popper and Occam are also provided.", "venue": "IEEE Computational - Intelligence Magazine", "year": 2007, "referenceCount": 52, "citationCount": - 166, "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2007-11-01", "journal": - {"name": "IEEE Computational Intelligence Magazine", "pages": "10-17", "volume": - "2"}, "authors": [{"authorId": "1728505", "name": "J. Mendel"}]}, {"paperId": - "f63d587692f80651916f0f3c6177b14cae21919d", "externalIds": {"MAG": "1580999956", - "DOI": "10.1007/978-3-7091-6597-3", "CorpusId": 60687871}, "url": "https://www.semanticscholar.org/paper/f63d587692f80651916f0f3c6177b14cae21919d", - "title": "The Universal Turing Machine: A Half-Century Survey", "abstract": - null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 471, - "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1992-02-01", "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "6259065", "name": "R. - Herken"}]}, {"paperId": "00b24a31690241e32b63ede66940d416b3284d64", "externalIds": - {"MAG": "1520047165", "DOI": "10.1007/978-1-4020-6710-5_23", "CorpusId": 5153049}, - "url": "https://www.semanticscholar.org/paper/00b24a31690241e32b63ede66940d416b3284d64", - "title": "Laplace, Turing and the \"imitation game\" impossible geometry: - randomness, determinism and programs in Turing''s test 1 .", "abstract": null, - "venue": "", "year": 2008, "referenceCount": 92, "citationCount": 33, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145529421", - "name": "G. Longo"}]}]} + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "199-229"}, "authors": [{"authorId": "2875305", + "name": "Udi Boker"}, {"authorId": "1759551", "name": "N. Dershowitz"}]}]} ' headers: @@ -4397,31 +5022,31 @@ interactions: Connection: - keep-alive Content-Length: - - '161918' + - '188086' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:14 GMT + - Tue, 03 Jan 2023 20:52:44 GMT Via: - - 1.1 1904c7aff4976cd4798f07f5b45f7f70.cloudfront.net (CloudFront) + - 1.1 089473bef8bc5f21a05ea772689d22f6.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - EqnznYyUKRqb0XqZStczqxqF_iyFCi_oSjC1crFk0qzuqbT5OnQ4WA== + - CQaEsVGZak5Fg8rIhe0VmNOhkrOBe1j3i1jBBA53U6dINPLzJpbxWA== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detDTFpmPHcFb6Q= + - eLxQbHzUvHcF43g= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '161918' + - '188086' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:14 GMT + - Tue, 03 Jan 2023 20:52:44 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - c50eb904-3978-427e-b12f-2204957a129a + - 60e49b57-917a-41cf-9d8a-cb1443a9f86d status: code: 200 message: OK diff --git a/tests/data/test_search_paper_traversing_results.yaml b/tests/data/test_search_paper_traversing_results.yaml index af1806a..d6cfe37 100644 --- a/tests/data/test_search_paper_traversing_results.yaml +++ b/tests/data/test_search_paper_traversing_results.yaml @@ -11,12 +11,12 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=0&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=0&limit=100 response: body: - string: '{"total": 133388, "offset": 0, "next": 100, "data": [{"paperId": "6b0f06617d9f5256a80ed62d9398acb92a55a6bd", + string: '{"total": 133751, "offset": 0, "next": 100, "data": [{"paperId": "6b0f06617d9f5256a80ed62d9398acb92a55a6bd", "externalIds": {"MAG": "136785111", "DOI": "10.1098/rspa.1985.0070", "CorpusId": - 1438116}, "url": "https://www.semanticscholar.org/paper/6b0f06617d9f5256a80ed62d9398acb92a55a6bd", + 1438116}, "corpusId": 1438116, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6b0f06617d9f5256a80ed62d9398acb92a55a6bd", "title": "Quantum theory, the Church\u2013Turing principle and the universal quantum computer", "abstract": "It is argued that underlying the Church\u2013Turing hypothesis there is an implicit physical assertion. Here, this assertion is @@ -41,16 +41,17 @@ interactions: or \u2018knowledge\u2019 in a physical system than does classical complexity theory.", "venue": "Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences", "year": 1985, "referenceCount": 19, "citationCount": - 4048, "influentialCitationCount": 210, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1985-07-08", "journal": {"name": "Proceedings of the Royal Society of London. - A. Mathematical and Physical Sciences", "pages": "117 - 97", "volume": "400"}, - "authors": [{"authorId": "145346874", "name": "D. Deutsch"}]}, {"paperId": - "c3823aacea60bc1f2cabb9283144690a3d015db5", "externalIds": {"ArXiv": "1410.5401", - "DBLP": "journals/corr/GravesWD14", "MAG": "2950527759", "CorpusId": 15299054}, - "url": "https://www.semanticscholar.org/paper/c3823aacea60bc1f2cabb9283144690a3d015db5", + 4119, "influentialCitationCount": 215, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1985-07-08", "journal": {"name": "Proceedings of + the Royal Society of London. A. Mathematical and Physical Sciences", "pages": + "117 - 97", "volume": "400"}, "authors": [{"authorId": "145346874", "name": + "D. Deutsch"}]}, {"paperId": "c3823aacea60bc1f2cabb9283144690a3d015db5", "externalIds": + {"ArXiv": "1410.5401", "DBLP": "journals/corr/GravesWD14", "MAG": "2950527759", + "CorpusId": 15299054}, "corpusId": 15299054, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c3823aacea60bc1f2cabb9283144690a3d015db5", "title": "Neural Turing Machines", "abstract": "We extend the capabilities of neural networks by coupling them to external memory resources, which they can interact with by attentional processes. The combined system is analogous @@ -58,16 +59,17 @@ interactions: allowing it to be efficiently trained with gradient descent. Preliminary results demonstrate that Neural Turing Machines can infer simple algorithms such as copying, sorting, and associative recall from input and output examples.", - "venue": "ArXiv", "year": 2014, "referenceCount": 44, "citationCount": 1764, - "influentialCitationCount": 222, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-10-20", "journal": - {"name": "ArXiv", "volume": "abs/1410.5401"}, "authors": [{"authorId": "1753223", - "name": "A. Graves"}, {"authorId": "89504302", "name": "Greg Wayne"}, {"authorId": - "1841008", "name": "Ivo Danihelka"}]}, {"paperId": "7cbc2a7843411a1768ab762930707af0a3c33a19", - "externalIds": {"DBLP": "journals/corr/abs-2201-11990", "ArXiv": "2201.11990", - "CorpusId": 246411325}, "url": "https://www.semanticscholar.org/paper/7cbc2a7843411a1768ab762930707af0a3c33a19", + "venue": "ArXiv", "year": 2014, "referenceCount": 44, "citationCount": 1772, + "influentialCitationCount": 222, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-10-20", "journal": {"name": "ArXiv", "volume": "abs/1410.5401"}, "authors": + [{"authorId": "1753223", "name": "A. Graves"}, {"authorId": "89504302", "name": + "Greg Wayne"}, {"authorId": "1841008", "name": "Ivo Danihelka"}]}, {"paperId": + "7cbc2a7843411a1768ab762930707af0a3c33a19", "externalIds": {"DBLP": "journals/corr/abs-2201-11990", + "ArXiv": "2201.11990", "CorpusId": 246411325}, "corpusId": 246411325, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7cbc2a7843411a1768ab762930707af0a3c33a19", "title": "Using DeepSpeed and Megatron to Train Megatron-Turing NLG 530B, A Large-Scale Generative Language Model", "abstract": "Pretrained general-purpose language models can achieve state-of-the-art accuracies in various natural @@ -88,27 +90,32 @@ interactions: NLP benchmarks and establishes new state-of-the-art results. We believe that our contributions will help further the development of large-scale training infrastructures, large-scale language models, and natural language generations.", - "venue": "ArXiv", "year": 2022, "referenceCount": 69, "citationCount": 156, - "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2022-01-28", "journal": - {"name": "ArXiv", "volume": "abs/2201.11990"}, "authors": [{"authorId": "2110486618", - "name": "Shaden Smith"}, {"authorId": "66870756", "name": "M. Patwary"}, {"authorId": - "2172095", "name": "Brandon Norick"}, {"authorId": "3081566", "name": "P. - LeGresley"}, {"authorId": "32817044", "name": "Samyam Rajbhandari"}, {"authorId": - "48991386", "name": "J. Casper"}, {"authorId": "49293070", "name": "Zhun Liu"}, - {"authorId": "9358910", "name": "Shrimai Prabhumoye"}, {"authorId": "30647302", - "name": "George Zerveas"}, {"authorId": "3111334", "name": "V. Korthikanti"}, - {"authorId": "2151686157", "name": "Elton Zhang"}, {"authorId": "48422824", - "name": "Rewon Child"}, {"authorId": "3394222", "name": "Reza Yazdani Aminabadi"}, - {"authorId": "2745589", "name": "J. Bernauer"}, {"authorId": "50706785", "name": - "Xia Song"}, {"authorId": "1911755", "name": "M. Shoeybi"}, {"authorId": "2145020341", - "name": "Yuxiong He"}, {"authorId": "122523478", "name": "Michael Houston"}, - {"authorId": "40070335", "name": "Saurabh Tiwary"}, {"authorId": "2301680", - "name": "Bryan Catanzaro"}]}, {"paperId": "9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", - "externalIds": {"MAG": "2803058542", "DOI": "10.1126/science.aar6308", "CorpusId": - 19100947, "PubMed": "29724951"}, "url": "https://www.semanticscholar.org/paper/9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", + "venue": "ArXiv", "year": 2022, "referenceCount": 69, "citationCount": 161, + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2022-01-28", "journal": {"name": "ArXiv", "volume": "abs/2201.11990"}, "authors": + [{"authorId": "2110486618", "name": "Shaden Smith"}, {"authorId": "66870756", + "name": "M. Patwary"}, {"authorId": "2172095", "name": "Brandon Norick"}, + {"authorId": "3081566", "name": "P. LeGresley"}, {"authorId": "32817044", + "name": "Samyam Rajbhandari"}, {"authorId": "48991386", "name": "J. Casper"}, + {"authorId": "49293070", "name": "Zhun Liu"}, {"authorId": "9358910", "name": + "Shrimai Prabhumoye"}, {"authorId": "30647302", "name": "George Zerveas"}, + {"authorId": "3111334", "name": "V. Korthikanti"}, {"authorId": "2151686157", + "name": "Elton Zhang"}, {"authorId": "48422824", "name": "Rewon Child"}, {"authorId": + "3394222", "name": "Reza Yazdani Aminabadi"}, {"authorId": "2745589", "name": + "J. Bernauer"}, {"authorId": "50706785", "name": "Xia Song"}, {"authorId": + "1911755", "name": "M. Shoeybi"}, {"authorId": "2145020341", "name": "Yuxiong + He"}, {"authorId": "122523478", "name": "Michael Houston"}, {"authorId": "40070335", + "name": "Saurabh Tiwary"}, {"authorId": "2301680", "name": "Bryan Catanzaro"}]}, + {"paperId": "9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", "externalIds": {"MAG": + "2803058542", "DOI": "10.1126/science.aar6308", "CorpusId": 19100947, "PubMed": + "29724951"}, "corpusId": 19100947, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/9cd1dfaa3c86c71ae74b4c02ebc59cb56c4a396d", "title": "Polyamide membranes with nanoscale Turing structures for water purification", "abstract": "Turing structures at the nanoscale Turing structures arise when imbalances in diffusion rates make a stable steady-state system sensitive @@ -130,19 +137,23 @@ interactions: that surpasses the upper-bound line of traditional desalination membranes. Furthermore, we show the existence of high water permeability sites in the Turing structures, where water transport through the membranes is enhanced.", - "venue": "Science", "year": 2018, "referenceCount": 35, "citationCount": 653, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Materials - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-05-04", "journal": {"name": "Science", "pages": "518 - - 521", "volume": "360"}, "authors": [{"authorId": "2343556", "name": "Zhe - Tan"}, {"authorId": "153064608", "name": "Sheng-Gang Chen"}, {"authorId": - "18239828", "name": "Xinsheng Peng"}, {"authorId": "2143835330", "name": "Lin - Zhang"}, {"authorId": "2148805809", "name": "Cong-jie Gao"}]}, {"paperId": - "bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "externalIds": {"ArXiv": "1908.07219", - "MAG": "2999960596", "DOI": "10.1098/rsif.2019.0621", "CorpusId": 201103943, - "PubMed": "31937231"}, "url": "https://www.semanticscholar.org/paper/bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", + "venue": "Science", "year": 2018, "referenceCount": 35, "citationCount": 665, + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-05-04", "journal": + {"name": "Science", "pages": "518 - 521", "volume": "360"}, "authors": [{"authorId": + "2343556", "name": "Zhe Tan"}, {"authorId": "153064608", "name": "Sheng-Gang + Chen"}, {"authorId": "18239828", "name": "Xinsheng Peng"}, {"authorId": "2143835330", + "name": "Lin Zhang"}, {"authorId": "2148805809", "name": "Cong-jie Gao"}]}, + {"paperId": "bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "externalIds": {"ArXiv": + "1908.07219", "MAG": "2999960596", "DOI": "10.1098/rsif.2019.0621", "CorpusId": + 201103943, "PubMed": "31937231"}, "corpusId": 201103943, "publicationVenue": + {"id": "f6537e0e-c3a9-4de5-bd36-19eda0434065", "name": "Journal of the Royal + Society Interface", "type": "journal", "alternate_names": ["J R Soc Interface"], + "issn": "1742-5662", "url": "http://rsif.royalsocietypublishing.org/"}, "url": + "https://www.semanticscholar.org/paper/bbd531d46cc4cafcffd6f432a4cfe2bf248fc228", "title": "From one pattern into another: analysis of Turing patterns in heterogeneous domains via WKBJ", "abstract": "Pattern formation from homogeneity is well studied, but less is known concerning symmetry-breaking instabilities in heterogeneous @@ -166,17 +177,23 @@ interactions: original thesis to a far wider and more realistic class of systems.", "venue": "Journal of the Royal Society Interface", "year": 2019, "referenceCount": 135, "citationCount": 38, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-08-20", "journal": {"name": "Journal of the Royal - Society Interface", "volume": "17"}, "authors": [{"authorId": "22256586", - "name": "Andrew L. Krause"}, {"authorId": "2691918", "name": "V. Klika"}, - {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "2662569", "name": - "E. Gaffney"}]}, {"paperId": "339c6e6d46836c173fb6a23b493c724896d4cc70", "externalIds": - {"ArXiv": "1708.07149", "MAG": "2963527228", "DBLP": "journals/corr/abs-1708-07149", - "ACL": "P17-1103", "DOI": "10.18653/v1/P17-1103", "CorpusId": 1880070}, "url": - "https://www.semanticscholar.org/paper/339c6e6d46836c173fb6a23b493c724896d4cc70", + "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsif.2019.0621", + "status": "HYBRID"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-08-20", "journal": {"name": "Journal + of the Royal Society Interface", "volume": "17"}, "authors": [{"authorId": + "22256586", "name": "Andrew L. Krause"}, {"authorId": "2691918", "name": "V. + Klika"}, {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "2662569", + "name": "E. Gaffney"}]}, {"paperId": "339c6e6d46836c173fb6a23b493c724896d4cc70", + "externalIds": {"ArXiv": "1708.07149", "MAG": "2963527228", "DBLP": "journals/corr/abs-1708-07149", + "ACL": "P17-1103", "DOI": "10.18653/v1/P17-1103", "CorpusId": 1880070}, "corpusId": + 1880070, "publicationVenue": {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", + "name": "Annual Meeting of the Association for Computational Linguistics", + "type": "conference", "alternate_names": ["Annu Meet Assoc Comput Linguistics", + "Meeting of the Association for Computational Linguistics", "ACL", "Meet Assoc + Comput Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, + "url": "https://www.semanticscholar.org/paper/339c6e6d46836c173fb6a23b493c724896d4cc70", "title": "Towards an Automatic Turing Test: Learning to Evaluate Dialogue Responses", "abstract": "Automatically evaluating the quality of dialogue responses for unstructured domains is a challenging problem. Unfortunately, @@ -194,7 +211,8 @@ interactions: training, an important step for automatic dialogue evaluation.", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2017, "referenceCount": 57, "citationCount": 302, "influentialCitationCount": - 54, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 54, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.aclweb.org/anthology/P17-1103.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-02-17", "journal": {"name": "ArXiv", @@ -204,20 +222,21 @@ interactions: Angelard-Gontier"}, {"authorId": "1751762", "name": "Yoshua Bengio"}, {"authorId": "145134886", "name": "Joelle Pineau"}]}, {"paperId": "ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", "externalIds": {"MAG": "2808618339", "DOI": "10.17863/CAM.42246", "CorpusId": - 46998004}, "url": "https://www.semanticscholar.org/paper/ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", + 46998004}, "corpusId": 46998004, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca8f792d1abe13bb7233a0fa939dc6d5b0d2805d", "title": "Turing: A Language for Flexible Probabilistic Inference", "abstract": "HG and ZG acknowledge support from the Alan Turing Institute (EPSRC Grant EP/N510129/1) and EPSRC Grant EP/N014162/1, and donations from Google and Microsoft Research.", "venue": "", "year": 2018, "referenceCount": 21, "citationCount": - 151, "influentialCitationCount": 18, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "1682-1690", "volume": ""}, "authors": [{"authorId": "49365036", - "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, {"authorId": - "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", + 153, "influentialCitationCount": 18, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "1682-1690", "volume": ""}, "authors": [{"authorId": + "49365036", "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, + {"authorId": "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", "externalIds": {"MAG": "2920798074", "ArXiv": "1903.07486", "DBLP": "journals/corr/abs-1903-07486", - "CorpusId": 81981887}, "url": "https://www.semanticscholar.org/paper/01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", + "CorpusId": 81981887}, "corpusId": 81981887, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/01baca4fa7ad5d28b95f6f72fe33de9a34633bc6", "title": "Dissecting the NVidia Turing T4 GPU via Microbenchmarking", "abstract": "In 2019, the rapid rate at which GPU manufacturers refresh their designs, coupled with their reluctance to disclose microarchitectural details, is still @@ -243,16 +262,19 @@ interactions: \nMany of our findings are novel, published here for the first time. All of them can guide high-performance software developers get closer to the GPU''s peak performance.", "venue": "ArXiv", "year": 2019, "referenceCount": 8, "citationCount": - 63, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-03-18", "journal": - {"name": "ArXiv", "volume": "abs/1903.07486"}, "authors": [{"authorId": "48813086", - "name": "Zhe Jia"}, {"authorId": "138304679", "name": "Marco Maggioni"}, {"authorId": - "2109849147", "name": "Jeffrey K. Smith"}, {"authorId": "3277273", "name": - "D. Scarpazza"}]}, {"paperId": "be17d3f111f31d97f8b61499d5aae274043e9f14", + 64, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2019-03-18", "journal": {"name": "ArXiv", "volume": "abs/1903.07486"}, "authors": + [{"authorId": "48813086", "name": "Zhe Jia"}, {"authorId": "138304679", "name": + "Marco Maggioni"}, {"authorId": "2109849147", "name": "Jeffrey K. Smith"}, + {"authorId": "3277273", "name": "D. Scarpazza"}]}, {"paperId": "be17d3f111f31d97f8b61499d5aae274043e9f14", "externalIds": {"DBLP": "journals/corr/abs-1901-03429", "MAG": "2962749806", - "ArXiv": "1901.03429", "CorpusId": 57825721}, "url": "https://www.semanticscholar.org/paper/be17d3f111f31d97f8b61499d5aae274043e9f14", + "ArXiv": "1901.03429", "CorpusId": 57825721}, "corpusId": 57825721, "publicationVenue": + {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", "name": "International Conference + on Learning Representations", "type": "conference", "alternate_names": ["Int + Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, "url": "https://www.semanticscholar.org/paper/be17d3f111f31d97f8b61499d5aae274043e9f14", "title": "On the Turing Completeness of Modern Neural Network Architectures", "abstract": "Alternatives to recurrent neural networks, in particular, architectures based on attention or convolutions, have been gaining momentum for processing @@ -267,30 +289,37 @@ interactions: minimal sets of elements needed to obtain these completeness results.", "venue": "International Conference on Learning Representations", "year": 2019, "referenceCount": 23, "citationCount": 58, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-01-10", "journal": - {"name": "ArXiv", "volume": "abs/1901.03429"}, "authors": [{"authorId": "144022533", - "name": "Jorge P\u00e9rez"}, {"authorId": "66941060", "name": "Javier Marinkovic"}, - {"authorId": "35106192", "name": "P. Barcel\u00f3"}]}, {"paperId": "74e281384ed8340956989bc2a93f8387458a09bf", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-01-10", "journal": {"name": "ArXiv", "volume": "abs/1901.03429"}, + "authors": [{"authorId": "144022533", "name": "Jorge P\u00e9rez"}, {"authorId": + "66941060", "name": "Javier Marinkovic"}, {"authorId": "35106192", "name": + "P. Barcel\u00f3"}]}, {"paperId": "74e281384ed8340956989bc2a93f8387458a09bf", "externalIds": {"PubMedCentral": "6484223", "MAG": "2938327216", "DOI": "10.1038/s41467-018-08212-8", - "CorpusId": 58014273, "PubMed": "30651543"}, "url": "https://www.semanticscholar.org/paper/74e281384ed8340956989bc2a93f8387458a09bf", + "CorpusId": 58014273, "PubMed": "30651543"}, "corpusId": 58014273, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/74e281384ed8340956989bc2a93f8387458a09bf", "title": "Image-based modeling of kidney branching morphogenesis reveals GDNF-RET based Turing-type mechanism and pattern-modulating WNT11 feedback", "abstract": null, "venue": "Nature Communications", "year": 2019, "referenceCount": 85, - "citationCount": 47, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-01-16", "journal": {"name": "Nature Communications", - "volume": "10"}, "authors": [{"authorId": "2261511", "name": "D. Menshykau"}, - {"authorId": "49174222", "name": "Odyss\u00e9 Michos"}, {"authorId": "145185799", - "name": "C. Lang"}, {"authorId": "52261411", "name": "L. Conrad"}, {"authorId": - "2149854", "name": "A. McMahon"}, {"authorId": "2962540", "name": "D. Iber"}]}, - {"paperId": "d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "externalIds": {"MAG": - "2808367373", "DOI": "10.1073/pnas.1720770115", "CorpusId": 48357941, "PubMed": - "29891706"}, "url": "https://www.semanticscholar.org/paper/d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", + "citationCount": 48, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.nature.com/articles/s41467-018-08212-8.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-01-16", "journal": {"name": "Nature + Communications", "volume": "10"}, "authors": [{"authorId": "2261511", "name": + "D. Menshykau"}, {"authorId": "49174222", "name": "Odyss\u00e9 Michos"}, {"authorId": + "145185799", "name": "C. Lang"}, {"authorId": "52261411", "name": "L. Conrad"}, + {"authorId": "2149854", "name": "A. McMahon"}, {"authorId": "2962540", "name": + "D. Iber"}]}, {"paperId": "d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "externalIds": + {"MAG": "2808367373", "DOI": "10.1073/pnas.1720770115", "CorpusId": 48357941, + "PubMed": "29891706"}, "corpusId": 48357941, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d340cffb1b5f1ba919bf55227f2f66cdbc9cfbbb", "title": "Stochastic Turing patterns in a synthetic bacterial population", "abstract": "Significance In 1952, Alan Turing proposed that biological morphogenesis could arise from a dynamical process in reaction systems with a rapidly diffusing @@ -327,8 +356,9 @@ interactions: patterns. These findings provide the groundwork for a unified picture of biological morphogenesis, arising from a combination of stochastic gene expression and dynamical instabilities.", "venue": "Proceedings of the National Academy of - Sciences", "year": 2018, "referenceCount": 51, "citationCount": 118, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + Sciences", "year": 2018, "referenceCount": 51, "citationCount": 119, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/115/26/6572.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-11", "journal": {"name": "Proceedings @@ -338,7 +368,12 @@ interactions: "4540871", "name": "Nicholas A. DeLateur"}, {"authorId": "3549131", "name": "N. Goldenfeld"}, {"authorId": "144224740", "name": "R. Weiss"}]}, {"paperId": "12c00512e99b88bf01bbd8662324fa3b61a73347", "externalIds": {"MAG": "2947165724", - "DOI": "10.11948/2156-907X.20190015", "CorpusId": 191165780}, "url": "https://www.semanticscholar.org/paper/12c00512e99b88bf01bbd8662324fa3b61a73347", + "DOI": "10.11948/2156-907X.20190015", "CorpusId": 191165780}, "corpusId": + 191165780, "publicationVenue": {"id": "4fd93153-bfee-4b6a-a124-36e8b51b8316", + "name": "The Journal of Applied Analysis and Computation", "type": "journal", + "alternate_names": ["J Appl Anal Comput", "Journal of Applied Analysis and + Computation"], "issn": "2156-907X", "url": "http://jaac-online.com/"}, "url": + "https://www.semanticscholar.org/paper/12c00512e99b88bf01bbd8662324fa3b61a73347", "title": "TURING-HOPF BIFURCATION IN THE REACTION-DIFFUSION SYSTEM WITH DELAY AND APPLICATION TO A DIFFUSIVE PREDATOR-PREY MODEL", "abstract": "The interactions of diffusion-driven Turing instability and delayinduced Hopf bifurcation always @@ -355,21 +390,26 @@ interactions: inhomogeneous periodic solutions, coexistence of two stable spaially inhomogeneous steady states and the transition from one kind of spatiotemporal patterns to another are found.", "venue": "The Journal of Applied Analysis and Computation", - "year": 2019, "referenceCount": 52, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Journal of Applied Analysis & Computation"}, "authors": + "year": 2019, "referenceCount": 52, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Journal of Applied Analysis & Computation"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, {"paperId": "6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", "externalIds": {"MAG": "2906157279", "DBLP": "journals/cacm/CopelandS19", "DOI": "10.1145/3198448", - "CorpusId": 56894392}, "url": "https://www.semanticscholar.org/paper/6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", + "CorpusId": 56894392}, "corpusId": 56894392, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/6a9ece2e42839c0d353c43ab9cd333d5cf3b479f", "title": "The Church-Turing thesis", "abstract": "In its original form, the Church-Turing thesis concerned computation as Alan Turing and Alonzo Church used the term in 1936---human computation.", "venue": "Communications of the ACM", "year": 2007, "referenceCount": 116, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3198448", + "status": "CLOSED"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2007-09-05", "journal": {"name": "Communications of the ACM", "pages": "66 @@ -377,17 +417,25 @@ interactions: Copeland"}, {"authorId": "1742013", "name": "Oron Shagrir"}]}, {"paperId": "6cda6bf951da823ab8673e659bdca13b9928ed47", "externalIds": {"MAG": "2982236015", "DBLP": "conf/hotchips/Burgess19", "DOI": "10.1109/HOTCHIPS.2019.8875651", - "CorpusId": 204822166}, "url": "https://www.semanticscholar.org/paper/6cda6bf951da823ab8673e659bdca13b9928ed47", + "CorpusId": 204822166}, "corpusId": 204822166, "publicationVenue": {"id": + "6bfb6bd4-4726-46b3-9438-3128e06a28a1", "name": "IEEE Hot Chips Symposium", + "type": "conference", "alternate_names": ["HCS", "IEEE Hot Chip Symp"], "url": + "https://en.wikipedia.org/wiki/Hot_Chips"}, "url": "https://www.semanticscholar.org/paper/6cda6bf951da823ab8673e659bdca13b9928ed47", "title": "RTX ON \u2013 The NVIDIA TURING GPU", "abstract": null, "venue": "IEEE Hot Chips Symposium", "year": 2019, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2019-08-01", "journal": {"name": "2019 IEEE Hot Chips 31 Symposium (HCS)", - "pages": "1-27"}, "authors": [{"authorId": "2059912582", "name": "John Burgess"}]}, - {"paperId": "b0e69af8e8f7f2501cb26290e57a8563dba5d178", "externalIds": {"DBLP": - "journals/ijns/WuBPPN18", "MAG": "2792897601", "DOI": "10.1142/S0129065718500132", - "CorpusId": 46888001, "PubMed": "29759014"}, "url": "https://www.semanticscholar.org/paper/b0e69af8e8f7f2501cb26290e57a8563dba5d178", + 43, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-08-01", "journal": {"name": "2019 IEEE Hot Chips + 31 Symposium (HCS)", "pages": "1-27"}, "authors": [{"authorId": "2059912582", + "name": "John Burgess"}]}, {"paperId": "b0e69af8e8f7f2501cb26290e57a8563dba5d178", + "externalIds": {"DBLP": "journals/ijns/WuBPPN18", "MAG": "2792897601", "DOI": + "10.1142/S0129065718500132", "CorpusId": 46888001, "PubMed": "29759014"}, + "corpusId": 46888001, "publicationVenue": {"id": "a042b147-151c-4d51-97c7-40b8434b377a", + "name": "International Journal of Neural Systems", "type": "journal", "alternate_names": + ["Int J Neural Syst"], "issn": "0129-0657", "url": "http://www.worldscinet.com/ijns", + "alternate_urls": ["http://www.worldscinet.com/ijns/ijns.shtml"]}, "url": + "https://www.semanticscholar.org/paper/b0e69af8e8f7f2501cb26290e57a8563dba5d178", "title": "Simplified and Yet Turing Universal Spiking Neural P Systems with Communication on Request", "abstract": "Spiking neural P systems are a class of third generation neural networks belonging to the framework of membrane @@ -405,18 +453,22 @@ interactions: that SNQ P systems functioning as number generating devices with one type of spike and four unbounded neurons are Turing universal.", "venue": "International Journal of Neural Systems", "year": 2018, "referenceCount": 104, "citationCount": - 70, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-08-26", "journal": {"name": "International - journal of neural systems", "pages": "\n 1850013\n ", "volume": - "28 8"}, "authors": [{"authorId": "3361824", "name": "Tingfang Wu"}, {"authorId": - "51940709", "name": "Florin-Daniel B\u00eelb\u00eee"}, {"authorId": "143936370", - "name": "A. Paun"}, {"authorId": "7356533", "name": "L. Pan"}, {"authorId": - "2614610", "name": "Ferrante Neri"}]}, {"paperId": "bef4ae975a0068484cfa62d3b006991d68716c04", + 70, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dora.dmu.ac.uk/bitstream/2086/15523/1/SNQP_one.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-08-26", "journal": + {"name": "International journal of neural systems", "pages": "\n 1850013\n ", + "volume": "28 8"}, "authors": [{"authorId": "3361824", "name": "Tingfang Wu"}, + {"authorId": "51940709", "name": "Florin-Daniel B\u00eelb\u00eee"}, {"authorId": + "143936370", "name": "A. Paun"}, {"authorId": "7356533", "name": "L. Pan"}, + {"authorId": "2614610", "name": "Ferrante Neri"}]}, {"paperId": "bef4ae975a0068484cfa62d3b006991d68716c04", "externalIds": {"MAG": "2404399993", "DOI": "10.1109/JAS.2016.7471613", "CorpusId": - 35991085}, "url": "https://www.semanticscholar.org/paper/bef4ae975a0068484cfa62d3b006991d68716c04", + 35991085}, "corpusId": 35991085, "publicationVenue": {"id": "ef1356d5-69c7-484e-a110-3efae1e93ecc", + "name": "IEEE/CAA Journal of Automatica Sinica", "type": "journal", "alternate_names": + ["IEEE/CAA J Autom Sin"], "issn": "2329-9266", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=6570654", + "alternate_urls": ["http://www.ieee-jas.org/"]}, "url": "https://www.semanticscholar.org/paper/bef4ae975a0068484cfa62d3b006991d68716c04", "title": "Where does AlphaGo go: from church-turing thesis to AlphaGo thesis and beyond", "abstract": "An investigation on the impact and significance of the AlphaGo vs. Lee Sedol Go match is conducted, and concludes with a conjecture @@ -431,20 +483,20 @@ interactions: thesis ensure the technical soundness of the parallel intelligence approach for intelligent control and management of complex systems and knowledge automation.", "venue": "IEEE/CAA Journal of Automatica Sinica", "year": 2016, "referenceCount": - 39, "citationCount": 189, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-05-19", - "journal": {"name": "IEEE/CAA Journal of Automatica Sinica", "pages": "113-120", - "volume": "3"}, "authors": [{"authorId": "2148954297", "name": "Fei-yue Wang"}, - {"authorId": "2155659664", "name": "J. Zhang"}, {"authorId": "2481151", "name": - "Xinhu Zheng"}, {"authorId": "153315870", "name": "Xiao Wang"}, {"authorId": - "144057336", "name": "Yong Yuan"}, {"authorId": "2142311", "name": "Xiaoxiao - Dai"}, {"authorId": "2159191766", "name": "Jie Zhang"}, {"authorId": "2119062499", - "name": "Liuqing Yang"}]}, {"paperId": "050da5d159fb0dd96143948e1cffeb3dec814673", + 39, "citationCount": 192, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-05-19", "journal": {"name": "IEEE/CAA Journal of Automatica Sinica", + "pages": "113-120", "volume": "3"}, "authors": [{"authorId": "2148954297", + "name": "Fei-yue Wang"}, {"authorId": "2155659664", "name": "J. Zhang"}, {"authorId": + "2481151", "name": "Xinhu Zheng"}, {"authorId": "153315870", "name": "Xiao + Wang"}, {"authorId": "144057336", "name": "Yong Yuan"}, {"authorId": "2142311", + "name": "Xiaoxiao Dai"}, {"authorId": "2159191766", "name": "Jie Zhang"}, + {"authorId": "2119062499", "name": "Liuqing Yang"}]}, {"paperId": "050da5d159fb0dd96143948e1cffeb3dec814673", "externalIds": {"DBLP": "journals/pnas/GemanGHY15", "MAG": "1983927101", "DOI": - "10.1073/pnas.1422953112", "CorpusId": 8687210, "PubMed": "25755262"}, "url": - "https://www.semanticscholar.org/paper/050da5d159fb0dd96143948e1cffeb3dec814673", + "10.1073/pnas.1422953112", "CorpusId": 8687210, "PubMed": "25755262"}, "corpusId": + 8687210, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/050da5d159fb0dd96143948e1cffeb3dec814673", "title": "Visual Turing test for computer vision systems", "abstract": "Significance In computer vision, as in other fields of artificial intelligence, the methods of evaluation largely define the scientific effort. Most current evaluations @@ -474,17 +526,22 @@ interactions: through an exploration of its properties, and on to its relationships with other uniquely instantiated objects.", "venue": "Proceedings of the National Academy of Sciences", "year": 2015, "referenceCount": 29, "citationCount": - 260, "influentialCitationCount": 17, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-03-09", "journal": {"name": "Proceedings - of the National Academy of Sciences", "pages": "3618 - 3623", "volume": "112"}, - "authors": [{"authorId": "1707642", "name": "D. Geman"}, {"authorId": "3194361", - "name": "S. Geman"}, {"authorId": "9588317", "name": "Neil Hallonquist"}, - {"authorId": "1721284", "name": "L. Younes"}]}, {"paperId": "c091bf5bc6e02555b222fe4e15b6108583c14510", - "externalIds": {"MAG": "2963527277", "ArXiv": "1708.09645", "DOI": "10.1103/PhysRevX.8.021071", - "CorpusId": 88511276}, "url": "https://www.semanticscholar.org/paper/c091bf5bc6e02555b222fe4e15b6108583c14510", + 260, "influentialCitationCount": 17, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.pnas.org/content/pnas/112/12/3618.full.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-09", "journal": + {"name": "Proceedings of the National Academy of Sciences", "pages": "3618 + - 3623", "volume": "112"}, "authors": [{"authorId": "1707642", "name": "D. + Geman"}, {"authorId": "3194361", "name": "S. Geman"}, {"authorId": "9588317", + "name": "Neil Hallonquist"}, {"authorId": "1721284", "name": "L. Younes"}]}, + {"paperId": "c091bf5bc6e02555b222fe4e15b6108583c14510", "externalIds": {"MAG": + "2963527277", "ArXiv": "1708.09645", "DOI": "10.1103/PhysRevX.8.021071", "CorpusId": + 88511276}, "corpusId": 88511276, "publicationVenue": {"id": "98eedf55-1e67-4c3d-a25d-79861b87ae04", + "name": "Physical Review X", "type": "journal", "alternate_names": ["Phys + Rev X"], "issn": "2160-3308", "url": "https://journals.aps.org/prx/", "alternate_urls": + ["http://journals.aps.org/prx/", "http://prx.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/c091bf5bc6e02555b222fe4e15b6108583c14510", "title": "Key Features of Turing Systems are Determined Purely by Network Topology", "abstract": "Turing''s theory of pattern formation is a universal model for self-organization, applicable to many systems in physics, chemistry @@ -498,46 +555,22 @@ interactions: rates, the robustness of the system, and the phase relations of the molecular species.", "venue": "Physical Review X", "year": 2017, "referenceCount": 72, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2017-08-31", "journal": {"name": "Physical Review - X"}, "authors": [{"authorId": "4791189", "name": "X. Diego"}, {"authorId": - "2650134", "name": "L. Marcon"}, {"authorId": "50420075", "name": "P. Muller"}, - {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", - "externalIds": {"MAG": "2899964516", "PubMedCentral": "6221541", "DOI": "10.1126/sciadv.aau5484", - "CorpusId": 53237955, "PubMed": "30417097"}, "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", - "title": "An ancient Turing-like patterning mechanism regulates skin denticle - development in sharks", "abstract": "Diverse skin appendages, from shark denticles - to bird feathers, develop via a conserved and ancient Turing patterning mechanism. - Vertebrates have a vast array of epithelial appendages, including scales, - feathers, and hair. The developmental patterning of these diverse structures - can be theoretically explained by Alan Turing\u2019s reaction-diffusion system. - However, the role of this system in epithelial appendage patterning of early - diverging lineages (compared to tetrapods), such as the cartilaginous fishes, - is poorly understood. We investigate patterning of the unique tooth-like skin - denticles of sharks, which closely relates to their hydrodynamic and protective - functions. We demonstrate through simulation models that a Turing-like mechanism - can explain shark denticle patterning and verify this system using gene expression - analysis and gene pathway inhibition experiments. This mechanism bears remarkable - similarity to avian feather patterning, suggesting deep homology of the system. - We propose that a diverse range of vertebrate appendages, from shark denticles - to avian feathers and mammalian hair, use this ancient and conserved system, - with slight genetic modulation accounting for broad variations in patterning.", - "venue": "Science Advances", "year": 2018, "referenceCount": 85, "citationCount": - 49, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-11-01", "journal": {"name": "Science Advances", "volume": "4"}, "authors": - [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": "2054529485", - "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": "A. Fletcher"}, - {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": "5588695", "name": - "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, {"paperId": + "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevX.8.021071", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2017-08-31", "journal": {"name": + "Physical Review X"}, "authors": [{"authorId": "4791189", "name": "X. Diego"}, + {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "50420075", "name": + "P. Muller"}, {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "64f47687daaa84ac1fdb1bc2f85c065007163f06", "externalIds": {"ArXiv": "1803.05378", "MAG": "2790922269", "DOI": "10.1103/PhysRevLett.121.108301", "CorpusId": - 206316772, "PubMed": "30240244"}, "url": "https://www.semanticscholar.org/paper/64f47687daaa84ac1fdb1bc2f85c065007163f06", + 206316772, "PubMed": "30240244"}, "corpusId": 206316772, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/64f47687daaa84ac1fdb1bc2f85c065007163f06", "title": "Information Thermodynamics of Turing Patterns.", "abstract": "We set up a rigorous thermodynamic description of reaction-diffusion systems driven out of equilibrium by time-dependent space-distributed chemostats. @@ -550,29 +583,57 @@ interactions: to study analytically the Turing pattern formation in a prototypical reaction-diffusion system, the one-dimensional Brusselator model, and to classify it as a genuine thermodynamic nonequilibrium phase transition.", "venue": "Physical Review - Letters", "year": 2018, "referenceCount": 58, "citationCount": 48, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + Letters", "year": 2018, "referenceCount": 58, "citationCount": 50, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1803.05378", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2018-03-14", "journal": {"name": "Physical review letters", "pages": "\n 108301\n ", "volume": "121 10"}, "authors": [{"authorId": "6538014", "name": "G. Falasco"}, {"authorId": "2069605670", "name": "Riccardo Rao"}, {"authorId": "40660219", "name": "M. Esposito"}]}, - {"paperId": "1606575fc6f337bde02291a4bf928eb16f58d0e6", "externalIds": {"DBLP": - "journals/corr/abs-1807-08518", "ArXiv": "1807.08518", "MAG": "2950107633", - "DOI": "10.1007/978-3-030-01424-7_10", "CorpusId": 49908746}, "url": "https://www.semanticscholar.org/paper/1606575fc6f337bde02291a4bf928eb16f58d0e6", - "title": "Implementing Neural Turing Machines", "abstract": null, "venue": - "International Conference on Artificial Neural Networks", "year": 2018, "referenceCount": - 12, "citationCount": 39, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2018-07-23", - "journal": {"name": "ArXiv", "volume": "abs/1807.08518"}, "authors": [{"authorId": - "153247100", "name": "Mark Collier"}, {"authorId": "1781377", "name": "J. - Beel"}]}, {"paperId": "fe1077f6b79e14457db77d7477a477f40f87e7e6", "externalIds": - {"DBLP": "journals/neco/GulcehreCCB18", "MAG": "2751304263", "DOI": "10.1162/neco_a_01060", - "CorpusId": 4029193, "PubMed": "29381440"}, "url": "https://www.semanticscholar.org/paper/fe1077f6b79e14457db77d7477a477f40f87e7e6", + {"paperId": "ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", "externalIds": {"MAG": + "2899964516", "PubMedCentral": "6221541", "DOI": "10.1126/sciadv.aau5484", + "CorpusId": 53237955, "PubMed": "30417097"}, "corpusId": 53237955, "publicationVenue": + {"id": "cb30f0c9-2980-4b7d-bbcb-68fc5472b97c", "name": "Science Advances", + "type": "journal", "alternate_names": ["Sci Adv"], "issn": "2375-2548", "url": + "http://www.scienceadvances.org/", "alternate_urls": ["https://advances.sciencemag.org/"]}, + "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", + "title": "An ancient Turing-like patterning mechanism regulates skin denticle + development in sharks", "abstract": "Diverse skin appendages, from shark denticles + to bird feathers, develop via a conserved and ancient Turing patterning mechanism. + Vertebrates have a vast array of epithelial appendages, including scales, + feathers, and hair. The developmental patterning of these diverse structures + can be theoretically explained by Alan Turing\u2019s reaction-diffusion system. + However, the role of this system in epithelial appendage patterning of early + diverging lineages (compared to tetrapods), such as the cartilaginous fishes, + is poorly understood. We investigate patterning of the unique tooth-like skin + denticles of sharks, which closely relates to their hydrodynamic and protective + functions. We demonstrate through simulation models that a Turing-like mechanism + can explain shark denticle patterning and verify this system using gene expression + analysis and gene pathway inhibition experiments. This mechanism bears remarkable + similarity to avian feather patterning, suggesting deep homology of the system. + We propose that a diverse range of vertebrate appendages, from shark denticles + to avian feathers and mammalian hair, use this ancient and conserved system, + with slight genetic modulation accounting for broad variations in patterning.", + "venue": "Science Advances", "year": 2018, "referenceCount": 85, "citationCount": + 49, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-11-01", "journal": {"name": "Science Advances", "volume": + "4"}, "authors": [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": + "2054529485", "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": + "A. Fletcher"}, {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": + "5588695", "name": "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, + {"paperId": "fe1077f6b79e14457db77d7477a477f40f87e7e6", "externalIds": {"DBLP": + "journals/neco/GulcehreCCB18", "MAG": "2751304263", "DOI": "10.1162/neco_a_01060", + "CorpusId": 4029193, "PubMed": "29381440"}, "corpusId": 4029193, "publicationVenue": + {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", "name": "Neural Computation", + "type": "journal", "alternate_names": ["Neural Comput"], "issn": "0899-7667", + "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", "http://www.mitpressjournals.org/loi/neco", + "https://www.mitpressjournals.org/loi/neco"]}, "url": "https://www.semanticscholar.org/paper/fe1077f6b79e14457db77d7477a477f40f87e7e6", "title": "Dynamic Neural Turing Machine with Continuous and Discrete Addressing Schemes", "abstract": "We extend the neural Turing machine (NTM) model into a dynamic neural Turing machine (D-NTM) by introducing trainable address vectors. @@ -588,17 +649,88 @@ interactions: provide further experimental results on the sequential MNIST, Stanford Natural Language Inference, associative recall, and copy tasks.", "venue": "Neural Computation", "year": 2018, "referenceCount": 53, "citationCount": 38, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-03-20", "journal": {"name": "Neural Computation", "pages": "857-884", - "volume": "30"}, "authors": [{"authorId": "1854385", "name": "\u00c7aglar - G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, {"authorId": - "1979489", "name": "Kyunghyun Cho"}, {"authorId": "1751762", "name": "Yoshua - Bengio"}]}, {"paperId": "079adfb4ec1a617935f4c74763ed57ba0eedecff", "externalIds": - {"MAG": "2003095799", "DOI": "10.1126/science.1252960", "CorpusId": 8400803, - "PubMed": "25082703"}, "url": "https://www.semanticscholar.org/paper/079adfb4ec1a617935f4c74763ed57ba0eedecff", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-03-20", "journal": {"name": "Neural Computation", + "pages": "857-884", "volume": "30"}, "authors": [{"authorId": "1854385", "name": + "\u00c7aglar G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, + {"authorId": "1979489", "name": "Kyunghyun Cho"}, {"authorId": "1751762", + "name": "Yoshua Bengio"}]}, {"paperId": "1606575fc6f337bde02291a4bf928eb16f58d0e6", + "externalIds": {"DBLP": "journals/corr/abs-1807-08518", "ArXiv": "1807.08518", + "MAG": "2950107633", "DOI": "10.1007/978-3-030-01424-7_10", "CorpusId": 49908746}, + "corpusId": 49908746, "publicationVenue": {"id": "3e64b1c1-745f-4edf-bd92-b8ef122bb49c", + "name": "International Conference on Artificial Neural Networks", "type": + "conference", "alternate_names": ["Int Conf Artif Neural Netw", "ICANN"], + "url": "http://www.e-nns.org/"}, "url": "https://www.semanticscholar.org/paper/1606575fc6f337bde02291a4bf928eb16f58d0e6", + "title": "Implementing Neural Turing Machines", "abstract": null, "venue": + "International Conference on Artificial Neural Networks", "year": 2018, "referenceCount": + 12, "citationCount": 39, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1807.08518", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2018-07-23", + "journal": {"name": "ArXiv", "volume": "abs/1807.08518"}, "authors": [{"authorId": + "153247100", "name": "Mark Collier"}, {"authorId": "1781377", "name": "J. + Beel"}]}, {"paperId": "7633d38345730e3ce80b03b290e41d0d1ff87697", "externalIds": + {"MAG": "2951637662", "ArXiv": "1803.00164", "DOI": "10.1007/s10884-018-9702-y", + "CorpusId": 119314930}, "corpusId": 119314930, "publicationVenue": {"id": + "0e86899d-b2fa-471e-bbc9-db59f1e85e65", "name": "Journal of Dynamics and Differential + Equations", "type": "journal", "alternate_names": ["J Dyn Differ Equ"], "issn": + "1040-7294", "url": "http://www.kluweronline.com/issn/1040-7294/contents", + "alternate_urls": ["https://link.springer.com/journal/10884"]}, "url": "https://www.semanticscholar.org/paper/7633d38345730e3ce80b03b290e41d0d1ff87697", + "title": "Turing Instability and Turing\u2013Hopf Bifurcation in Diffusive + Schnakenberg Systems with Gene Expression Time Delay", "abstract": null, "venue": + "Journal of Dynamics and Differential Equations", "year": 2018, "referenceCount": + 59, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1803.00164", "status": "GREEN"}, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-03-01", "journal": {"name": + "Journal of Dynamics and Differential Equations", "pages": "2223-2247", "volume": + "31"}, "authors": [{"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": + "2004181687", "name": "Hongbin Wang"}, {"authorId": "144861054", "name": "Xun + Cao"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", "externalIds": + {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", "DOI": "10.1137/16M1097560", + "CorpusId": 3849415}, "corpusId": 3849415, "publicationVenue": {"id": "d35d93ad-8e2c-4482-a896-897ce5c326fa", + "name": "SIAM Journal on Applied Dynamical Systems", "type": "journal", "alternate_names": + ["Siam Journal on Applied Dynamical Systems", "Siam J Appl Dyn Syst", "SIAM + J Appl Dyn Syst"], "issn": "1536-0040", "url": "https://epubs.siam.org/journal/sjaday"}, + "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", + "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near + Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize + into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter + to meter scales. The leading mathematical explanations for these phenomena + are the reaction-diffusion-advection model and the phase separation model. + This paper continues the series studies on analytically understanding the + existence of pattern solutions in the reaction-diffusion mussel-algae model. + The stability of the positive constant steady state and the existence of Hopf + and steady-state bifurcations are studied by analyzing the corresponding characteristic + equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain + the explicit dynamical classification in its neighborhood by calculating and + investigating the normal form on the center manifold. Using theoretical and + numerical simulations, we demonstrates that this TH interaction would significantly + enhance the diversity of spatial patterns and trigger the alternative paths + for the pattern development.", "venue": "SIAM Journal on Applied Dynamical + Systems", "year": 2017, "referenceCount": 65, "citationCount": 77, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", + "pages": "2030-2062", "volume": "16"}, "authors": [{"authorId": "1794550", + "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, + {"authorId": "47362020", "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", + "name": "Yuan Yuan"}]}, {"paperId": "079adfb4ec1a617935f4c74763ed57ba0eedecff", + "externalIds": {"MAG": "2003095799", "DOI": "10.1126/science.1252960", "CorpusId": + 8400803, "PubMed": "25082703"}, "corpusId": 8400803, "publicationVenue": {"id": + "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": "journal", + "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/079adfb4ec1a617935f4c74763ed57ba0eedecff", "title": "Digit patterning is controlled by a Bmp-Sox9-Wnt Turing network modulated by morphogen gradients", "abstract": "How do fingers know where to grow? Most researchers today believe that each finger forms because of @@ -624,57 +756,49 @@ interactions: experiments. Our systems biology approach reveals how a combination of growth, morphogen gradients, and a self-organizing Turing network can achieve robust and reproducible pattern formation.", "venue": "Science", "year": 2014, "referenceCount": - 81, "citationCount": 376, "influentialCitationCount": 26, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-08-01", "journal": - {"name": "Science", "pages": "566 - 570", "volume": "345"}, "authors": [{"authorId": - "5407202", "name": "J. Raspopovic"}, {"authorId": "2650134", "name": "L. Marcon"}, - {"authorId": "1392361181", "name": "L. Russo"}, {"authorId": "47254653", "name": - "J. Sharpe"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", "externalIds": - {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", "DOI": "10.1137/16M1097560", - "CorpusId": 3849415}, "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", - "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near - Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize - into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter - to meter scales. The leading mathematical explanations for these phenomena - are the reaction-diffusion-advection model and the phase separation model. - This paper continues the series studies on analytically understanding the - existence of pattern solutions in the reaction-diffusion mussel-algae model. - The stability of the positive constant steady state and the existence of Hopf - and steady-state bifurcations are studied by analyzing the corresponding characteristic - equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain - the explicit dynamical classification in its neighborhood by calculating and - investigating the normal form on the center manifold. Using theoretical and - numerical simulations, we demonstrates that this TH interaction would significantly - enhance the diversity of spatial patterns and trigger the alternative paths - for the pattern development.", "venue": "SIAM Journal on Applied Dynamical - Systems", "year": 2017, "referenceCount": 65, "citationCount": 71, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + 81, "citationCount": 379, "influentialCitationCount": 27, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", "pages": "2030-2062", - "volume": "16"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, - {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "47362020", - "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, - {"paperId": "7633d38345730e3ce80b03b290e41d0d1ff87697", "externalIds": {"MAG": - "2951637662", "ArXiv": "1803.00164", "DOI": "10.1007/s10884-018-9702-y", "CorpusId": - 119314930}, "url": "https://www.semanticscholar.org/paper/7633d38345730e3ce80b03b290e41d0d1ff87697", - "title": "Turing Instability and Turing\u2013Hopf Bifurcation in Diffusive - Schnakenberg Systems with Gene Expression Time Delay", "abstract": null, "venue": - "Journal of Dynamics and Differential Equations", "year": 2018, "referenceCount": - 59, "citationCount": 34, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2018-03-01", "journal": {"name": - "Journal of Dynamics and Differential Equations", "pages": "2223-2247", "volume": - "31"}, "authors": [{"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": - "2004181687", "name": "Hongbin Wang"}, {"authorId": "144861054", "name": "Xun - Cao"}]}, {"paperId": "f10e071292d593fef939e6ef4a59baf0bb3a6c2b", "externalIds": - {"ArXiv": "1505.00521", "MAG": "2125308790", "DBLP": "journals/corr/ZarembaS15", - "CorpusId": 16228924}, "url": "https://www.semanticscholar.org/paper/f10e071292d593fef939e6ef4a59baf0bb3a6c2b", + "2014-08-01", "journal": {"name": "Science", "pages": "566 - 570", "volume": + "345"}, "authors": [{"authorId": "5407202", "name": "J. Raspopovic"}, {"authorId": + "2650134", "name": "L. Marcon"}, {"authorId": "1392361181", "name": "L. Russo"}, + {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", + "externalIds": {"MAG": "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", + "CorpusId": 67906449}, "corpusId": 67906449, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", + "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": + "What can artificial intelligence teach us about the mind? If AI''s underlying + concept is that thinking is a computational process, then how can computation + illuminate thinking? It''s a timely question. AI is all the rage, and the + buzziest AI buzz surrounds adaptive machine learning: computer systems that + learn intelligent behavior from massive amounts of data. This is what powers + a driverless car, for example. In this book, Hector Levesque shifts the conversation + to \"good old fashioned artificial intelligence,\" which is based not on heaps + of data but on understanding commonsense intelligence. This kind of artificial + intelligence is equipped to handle situations that depart from previous patterns + -- as we do in real life, when, for example, we encounter a washed-out bridge + or when the barista informs us there''s no more soy milk. Levesque considers + the role of language in learning. He argues that a computer program that passes + the famous Turing Test could be a mindless zombie, and he proposes another + way to test for intelligence -- the Winograd Schema Test, developed by Levesque + and his colleagues. \"If our goal is to understand intelligent behavior, we + had better understand the difference between making it and faking it,\" he + observes. He identifies a possible mechanism behind common sense and the capacity + to call on background knowledge: the ability to represent objects of thought + symbolically. As AI migrates more and more into everyday life, we should worry + if systems without common sense are making decisions where common sense is + needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": + 69, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2017-02-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "143634377", + "name": "H. Levesque"}]}, {"paperId": "f10e071292d593fef939e6ef4a59baf0bb3a6c2b", + "externalIds": {"ArXiv": "1505.00521", "MAG": "2125308790", "DBLP": "journals/corr/ZarembaS15", + "CorpusId": 16228924}, "corpusId": 16228924, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f10e071292d593fef939e6ef4a59baf0bb3a6c2b", "title": "Reinforcement Learning Neural Turing Machines", "abstract": "The expressive power of a machine learning model is closely related to the number of sequential computational steps it can learn. For example, Deep Neural Networks @@ -698,44 +822,15 @@ interactions: do so, we developed a simple technique for numerically checking arbitrary implementations of models that use Reinforce, which may be of independent interest.", "venue": "ArXiv", "year": 2015, "referenceCount": 28, "citationCount": - 170, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-05-04", "journal": - {"name": "ArXiv", "volume": "abs/1505.00521"}, "authors": [{"authorId": "2563432", - "name": "Wojciech Zaremba"}, {"authorId": "1701686", "name": "Ilya Sutskever"}]}, - {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", "externalIds": {"MAG": - "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", "CorpusId": 67906449}, - "url": "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", - "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": - "What can artificial intelligence teach us about the mind? If AI''s underlying - concept is that thinking is a computational process, then how can computation - illuminate thinking? It''s a timely question. AI is all the rage, and the - buzziest AI buzz surrounds adaptive machine learning: computer systems that - learn intelligent behavior from massive amounts of data. This is what powers - a driverless car, for example. In this book, Hector Levesque shifts the conversation - to \"good old fashioned artificial intelligence,\" which is based not on heaps - of data but on understanding commonsense intelligence. This kind of artificial - intelligence is equipped to handle situations that depart from previous patterns - -- as we do in real life, when, for example, we encounter a washed-out bridge - or when the barista informs us there''s no more soy milk. Levesque considers - the role of language in learning. He argues that a computer program that passes - the famous Turing Test could be a mindless zombie, and he proposes another - way to test for intelligence -- the Winograd Schema Test, developed by Levesque - and his colleagues. \"If our goal is to understand intelligent behavior, we - had better understand the difference between making it and faking it,\" he - observes. He identifies a possible mechanism behind common sense and the capacity - to call on background knowledge: the ability to represent objects of thought - symbolically. As AI migrates more and more into everyday life, we should worry - if systems without common sense are making decisions where common sense is - needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": - 68, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2017-02-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "143634377", "name": "H. Levesque"}]}, - {"paperId": "5259755f9c100e220ffaa7e08439c5d34be7757a", "externalIds": {"MAG": - "2204302769", "CorpusId": 17710225}, "url": "https://www.semanticscholar.org/paper/5259755f9c100e220ffaa7e08439c5d34be7757a", + 170, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-05-04", "journal": {"name": "ArXiv", "volume": "abs/1505.00521"}, "authors": + [{"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", + "name": "Ilya Sutskever"}]}, {"paperId": "5259755f9c100e220ffaa7e08439c5d34be7757a", + "externalIds": {"MAG": "2204302769", "CorpusId": 17710225}, "corpusId": 17710225, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5259755f9c100e220ffaa7e08439c5d34be7757a", "title": "Reinforcement Learning Neural Turing Machines - Revised", "abstract": "The Neural Turing Machine (NTM) is more expressive than all previously considered models because of its external memory. It can be viewed as a broader effort @@ -752,14 +847,18 @@ interactions: to solve simple algorithmic tasks. Our Interfaces are expressive enough to make our model Turing complete.", "venue": "", "year": 2015, "referenceCount": 25, "citationCount": 154, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-05-04", - "journal": {"name": "arXiv: Learning", "volume": ""}, "authors": [{"authorId": - "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", "name": "Ilya - Sutskever"}]}, {"paperId": "2a69c98085c13ddb0e9b5ba4a904312670ed4e65", "externalIds": - {"MAG": "2319249367", "PubMedCentral": "4922859", "DOI": "10.7554/eLife.14022", - "CorpusId": 1077586, "PubMed": "27058171"}, "url": "https://www.semanticscholar.org/paper/2a69c98085c13ddb0e9b5ba4a904312670ed4e65", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-05-04", "journal": {"name": "arXiv: Learning", "volume": ""}, "authors": + [{"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": "1701686", + "name": "Ilya Sutskever"}]}, {"paperId": "2a69c98085c13ddb0e9b5ba4a904312670ed4e65", + "externalIds": {"MAG": "2319249367", "PubMedCentral": "4922859", "DOI": "10.7554/eLife.14022", + "CorpusId": 1077586, "PubMed": "27058171"}, "corpusId": 1077586, "publicationVenue": + {"id": "07365b9a-c0ce-4dd3-b93b-a02e1c81e0c6", "name": "eLife", "type": "journal", + "issn": "2050-084X", "url": "https://epub.uni-regensburg.de/40444/", "alternate_urls": + ["https://elifesciences.org/", "https://elife.elifesciences.org/", "http://elifesciences.org/"]}, + "url": "https://www.semanticscholar.org/paper/2a69c98085c13ddb0e9b5ba4a904312670ed4e65", "title": "High-throughput mathematical analysis identifies Turing networks for patterning with equally diffusing signals", "abstract": "The Turing reaction-diffusion model explains how identical cells can self-organize to form spatial patterns. @@ -778,17 +877,22 @@ interactions: framework to understand multicellular pattern formation and enables the wide-spread use of mathematical biology to engineer synthetic patterning systems. DOI: http://dx.doi.org/10.7554/eLife.14022.001", "venue": "eLife", "year": 2016, - "referenceCount": 91, "citationCount": 96, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-08", "journal": - {"name": "eLife", "volume": "5"}, "authors": [{"authorId": "2650134", "name": - "L. Marcon"}, {"authorId": "4791189", "name": "X. Diego"}, {"authorId": "47254653", - "name": "J. Sharpe"}, {"authorId": "153207731", "name": "Patrick M\u00fcller"}]}, - {"paperId": "751e5ff25e8186a8fd26ee05c4e29a286f650f1b", "externalIds": {"DBLP": - "journals/corr/Grigore16", "MAG": "2953162524", "ArXiv": "1605.05274", "DOI": - "10.1145/3009837.3009871", "CorpusId": 5698855}, "url": "https://www.semanticscholar.org/paper/751e5ff25e8186a8fd26ee05c4e29a286f650f1b", + "referenceCount": 91, "citationCount": 98, "influentialCitationCount": 4, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-04-08", "journal": {"name": "eLife", "volume": "5"}, "authors": [{"authorId": + "2650134", "name": "L. Marcon"}, {"authorId": "4791189", "name": "X. Diego"}, + {"authorId": "47254653", "name": "J. Sharpe"}, {"authorId": "153207731", "name": + "Patrick M\u00fcller"}]}, {"paperId": "751e5ff25e8186a8fd26ee05c4e29a286f650f1b", + "externalIds": {"DBLP": "journals/corr/Grigore16", "MAG": "2953162524", "ArXiv": + "1605.05274", "DOI": "10.1145/3009837.3009871", "CorpusId": 5698855}, "corpusId": + 5698855, "publicationVenue": {"id": "8a1922a5-8e84-4ec6-9283-01f2ef1981fc", + "name": "ACM-SIGACT Symposium on Principles of Programming Languages", "type": + "conference", "alternate_names": ["Symp Princ Program Lang", "Symposium on + Principles of Programming Languages", "POPL", "ACM-SIGACT Symp Princ Program + Lang"], "url": "http://www.sigplan.org/Conferences/POPL/"}, "url": "https://www.semanticscholar.org/paper/751e5ff25e8186a8fd26ee05c4e29a286f650f1b", "title": "Java generics are turing complete", "abstract": "This paper describes a reduction from the halting problem of Turing machines to subtype checking in Java. It follows that subtype checking in Java is undecidable, which answers @@ -797,14 +901,16 @@ interactions: of Gill and Levy from 2016. The latter point is illustrated by a parser generator for fluent interfaces.", "venue": "ACM-SIGACT Symposium on Principles of Programming Languages", "year": 2016, "referenceCount": 37, "citationCount": 40, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://kar.kent.ac.uk/58183/7/javats.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "2016-05-17", "journal": {"name": "Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages"}, "authors": [{"authorId": "2355698", "name": "Radu Grigore"}]}, {"paperId": "3290b0d04025513911923fc51885962b10971783", "externalIds": {"MAG": - "2585714548", "CorpusId": 64349377}, "url": "https://www.semanticscholar.org/paper/3290b0d04025513911923fc51885962b10971783", + "2585714548", "CorpusId": 64349377}, "corpusId": 64349377, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3290b0d04025513911923fc51885962b10971783", "title": "Alan Turing: The Enigma", "abstract": "Feel lonely? What about reading books? Book is one of the greatest friends to accompany while in your lonely time. When you have no friends and activities somewhere and sometimes, reading @@ -812,19 +918,26 @@ interactions: increase the knowledge. Of course the b=benefits to take will relate to what kind of book that you are reading. And now, we will concern you to try reading alan turing the enigma as one of the reading material to finish quickly.", - "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 112, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-12-22", - "journal": {"name": "", "pages": "57", "volume": "62"}, "authors": [{"authorId": - "71860202", "name": "Golda T. Eldridge"}]}, {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", - "externalIds": {"PubMedCentral": "5258822", "MAG": "2443634204", "ArXiv": - "1301.2002", "DOI": "10.1007/s00285-016-1035-z", "CorpusId": 5942606, "PubMed": - "27305913"}, "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", + "venue": "", "year": 2015, "referenceCount": 0, "citationCount": 116, "influentialCitationCount": + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2015-12-22", "journal": {"name": "", "pages": "57", + "volume": "62"}, "authors": [{"authorId": "71860202", "name": "Golda T. Eldridge"}]}, + {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "externalIds": {"PubMedCentral": + "5258822", "MAG": "2443634204", "ArXiv": "1301.2002", "DOI": "10.1007/s00285-016-1035-z", + "CorpusId": 5942606, "PubMed": "27305913"}, "corpusId": 5942606, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "title": "Instability of turing patterns in reaction-diffusion-ODE systems", "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2013, "referenceCount": 49, "citationCount": 38, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc5258822?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-01-09", "journal": @@ -833,20 +946,29 @@ interactions: {"authorId": "101468044", "name": "G. Karch"}, {"authorId": "2118679527", "name": "Kanako Suzuki"}]}, {"paperId": "3b662774599a36d4b281f0ea212d149849fd2ca7", "externalIds": {"PubMedCentral": "4879262", "MAG": "2399203404", "DOI": "10.1038/ncomms11582", - "CorpusId": 2037071, "PubMed": "27211489"}, "url": "https://www.semanticscholar.org/paper/3b662774599a36d4b281f0ea212d149849fd2ca7", + "CorpusId": 2037071, "PubMed": "27211489"}, "corpusId": 2037071, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/3b662774599a36d4b281f0ea212d149849fd2ca7", "title": "The fin-to-limb transition as the re-organization of a Turing pattern", "abstract": null, "venue": "Nature Communications", "year": 2016, "referenceCount": 64, "citationCount": 67, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-05-23", "journal": {"name": "Nature Communications", - "volume": "7"}, "authors": [{"authorId": "4852838", "name": "Koh Onimaru"}, - {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "108029565", "name": - "M. Musy"}, {"authorId": "47675847", "name": "Mikiko Tanaka"}, {"authorId": - "47254653", "name": "J. Sharpe"}]}, {"paperId": "dd547a64a179f0f3defd376455f258500d34d4b8", + "openAccessPdf": {"url": "https://www.nature.com/articles/ncomms11582.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2016-05-23", "journal": {"name": "Nature + Communications", "volume": "7"}, "authors": [{"authorId": "4852838", "name": + "Koh Onimaru"}, {"authorId": "2650134", "name": "L. Marcon"}, {"authorId": + "108029565", "name": "M. Musy"}, {"authorId": "47675847", "name": "Mikiko + Tanaka"}, {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "dd547a64a179f0f3defd376455f258500d34d4b8", "externalIds": {"MAG": "2317259993", "ArXiv": "1512.06055", "DOI": "10.1103/PhysRevLett.116.143901", - "CorpusId": 19175993, "PubMed": "27104711"}, "url": "https://www.semanticscholar.org/paper/dd547a64a179f0f3defd376455f258500d34d4b8", + "CorpusId": 19175993, "PubMed": "27104711"}, "corpusId": 19175993, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dd547a64a179f0f3defd376455f258500d34d4b8", "title": "Competing Turing and Faraday Instabilities in Longitudinally Modulated Passive Resonators.", "abstract": "We experimentally investigate the interplay of Turing (modulational) and Faraday (parametric) instabilities in a bistable @@ -860,6 +982,7 @@ interactions: structures. The results are well explained in terms of the universal Lugiato-Lefever model.", "venue": "Physical Review Letters", "year": 2015, "referenceCount": 31, "citationCount": 56, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1512.06055", "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -870,10 +993,14 @@ interactions: "name": "A. Mussot"}, {"authorId": "5414545", "name": "S. Trillo"}]}, {"paperId": "8fb5cf374acbe9fed9939ff2c0aec334b5d26187", "externalIds": {"MAG": "2950930823", "DBLP": "conf/tcc/AnanthS16", "DOI": "10.1007/978-3-662-49096-9_6", "CorpusId": - 15455801}, "url": "https://www.semanticscholar.org/paper/8fb5cf374acbe9fed9939ff2c0aec334b5d26187", + 15455801}, "corpusId": 15455801, "publicationVenue": {"id": "5f558f42-4459-4db5-9c48-77c92ba99511", + "name": "Theory of Cryptography Conference", "type": "conference", "alternate_names": + ["Theory Cryptogr Conf", "TCC"], "url": "https://www.iacr.org/meetings/tcc/"}, + "url": "https://www.semanticscholar.org/paper/8fb5cf374acbe9fed9939ff2c0aec334b5d26187", "title": "Functional Encryption for Turing Machines", "abstract": null, "venue": "Theory of Cryptography Conference", "year": 2016, "referenceCount": 53, "citationCount": - 61, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": + 61, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "http://eprint.iacr.org/2015/776.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", @@ -881,7 +1008,8 @@ interactions: "publicationDate": "2016-01-10", "journal": {"pages": "125-153"}, "authors": [{"authorId": "2616991", "name": "P. Ananth"}, {"authorId": "1695851", "name": "A. Sahai"}]}, {"paperId": "f8e9f0e61d45c8a669391fa00e20d134e71ca388", "externalIds": - {"MAG": "2747885441", "CorpusId": 125663722}, "url": "https://www.semanticscholar.org/paper/f8e9f0e61d45c8a669391fa00e20d134e71ca388", + {"MAG": "2747885441", "CorpusId": 125663722}, "corpusId": 125663722, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f8e9f0e61d45c8a669391fa00e20d134e71ca388", "title": "Turing Computability: Theory and Applications", "abstract": "Turing''s famous 1936 paper introduced a formal definition of a computing machine, a Turing machine. This model led to both the development of actual computers @@ -905,30 +1033,36 @@ interactions: according to importance and difficulty. The book is suitable for advanced undergraduate and graduate students in computer science and mathematics and researchers engaged with computability and mathematical logic.", "venue": - "", "year": 2016, "referenceCount": 0, "citationCount": 52, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2016-06-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1760293", "name": "R. Soare"}]}, {"paperId": "a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", - "externalIds": {"MAG": "2437127566", "DOI": "10.1007/S11071-016-2873-3", "CorpusId": - 124911557}, "url": "https://www.semanticscholar.org/paper/a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", + "", "year": 2016, "referenceCount": 0, "citationCount": 54, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2016-06-21", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, + {"paperId": "a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", "externalIds": {"MAG": + "2437127566", "DOI": "10.1007/S11071-016-2873-3", "CorpusId": 124911557}, + "corpusId": 124911557, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a80e6b67715d6315cc607a414fd6fe2eb9edc3b2", "title": "Turing\u2013Hopf bifurcation analysis of a predator\u2013prey model with herd behavior and cross-diffusion", "abstract": null, "venue": "", "year": - 2016, "referenceCount": 58, "citationCount": 60, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-06-17", - "journal": {"name": "Nonlinear Dynamics", "pages": "73-89", "volume": "86"}, - "authors": [{"authorId": "143754807", "name": "Xiaosong Tang"}, {"authorId": - "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": "Tonghua - Zhang"}]}, {"paperId": "d89084753b70dbdf589fb5663a609fb47607affb", "externalIds": - {"DBLP": "journals/corr/LiGG16a", "ArXiv": "1603.04904", "MAG": "2301883550", - "DOI": "10.1007/s11721-016-0126-1", "CorpusId": 14259869}, "url": "https://www.semanticscholar.org/paper/d89084753b70dbdf589fb5663a609fb47607affb", + 2016, "referenceCount": 58, "citationCount": 62, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-06-17", "journal": {"name": "Nonlinear Dynamics", "pages": "73-89", + "volume": "86"}, "authors": [{"authorId": "143754807", "name": "Xiaosong Tang"}, + {"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": + "Tonghua Zhang"}]}, {"paperId": "1470b244477529e1627b48c117e78308ede474ab", + "externalIds": {"DBLP": "journals/corr/LiGG16a", "ArXiv": "1603.04904", "MAG": + "2301883550", "DOI": "10.1007/s11721-016-0126-1", "CorpusId": 14259869}, "corpusId": + 14259869, "publicationVenue": {"id": "9bc15867-86e2-4be2-9ff3-2c15aaf07929", + "name": "Swarm Intelligence", "type": "journal", "alternate_names": ["Swarm + Intell"], "issn": "1935-3812", "url": "https://www.springer.com/computer/ai/journal/11721", + "alternate_urls": ["https://link.springer.com/journal/11721"]}, "url": "https://www.semanticscholar.org/paper/1470b244477529e1627b48c117e78308ede474ab", "title": "Turing learning: a metric-free approach to inferring behavior and its application to swarms", "abstract": null, "venue": "Swarm Intelligence", - "year": 2016, "referenceCount": 67, "citationCount": 52, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "year": 2016, "referenceCount": 64, "citationCount": 52, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2Fs11721-016-0126-1.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -937,21 +1071,28 @@ interactions: {"authorId": "7836896", "name": "Melvin Gauci"}, {"authorId": "6586246", "name": "R. Gro\u00df"}]}, {"paperId": "b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "externalIds": {"DBLP": "journals/cnsns/SongZP16", "MAG": "1929947366", "DOI": - "10.1016/J.CNSNS.2015.10.002", "CorpusId": 119973623}, "url": "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", + "10.1016/J.CNSNS.2015.10.002", "CorpusId": 119973623}, "corpusId": 119973623, + "publicationVenue": {"id": "cbeeb5cb-fa82-4ae6-875b-04adb3b61f48", "name": + "Communications in nonlinear science & numerical simulation", "type": "journal", + "alternate_names": ["Communications in Nonlinear Science and Numerical Simulation", + "Commun Nonlinear Sci Numer Simul", "Commun nonlinear sci numer simul"], + "issn": "1007-5704", "url": "http://www.elsevier.com/locate/cnsns"}, "url": + "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "title": "Turing-Hopf bifurcation in the reaction-diffusion equations and its applications", "abstract": null, "venue": "Communications in nonlinear science & numerical simulation", "year": 2016, "referenceCount": 37, "citationCount": - 82, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2016-04-01", "journal": {"name": "Commun. - Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": "33"}, "authors": - [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": - "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong Peng"}]}, {"paperId": - "7c326f661163360efc072214be205c827e742495", "externalIds": {"DBLP": "journals/corr/Aaronson13", - "MAG": "2964289375", "ArXiv": "1306.0159", "DOI": "10.1017/CBO9780511863196.018", - "CorpusId": 17123686}, "url": "https://www.semanticscholar.org/paper/7c326f661163360efc072214be205c827e742495", + 85, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-01", "journal": + {"name": "Commun. Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": + "33"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": + "1742870", "name": "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong + Peng"}]}, {"paperId": "7c326f661163360efc072214be205c827e742495", "externalIds": + {"DBLP": "journals/corr/Aaronson13", "MAG": "2964289375", "ArXiv": "1306.0159", + "DOI": "10.1017/CBO9780511863196.018", "CorpusId": 17123686}, "corpusId": + 17123686, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c326f661163360efc072214be205c827e742495", "title": "The Ghost in the Quantum Turing Machine", "abstract": "In honor of Alan Turing''s hundredth birthday, I unwisely set out some thoughts about one of Turing''s obsessions throughout his life, the question of physics and @@ -974,15 +1115,16 @@ interactions: in neuroscience, physics, and cosmology; and takes a millennia-old philosophical debate into some underexplored territory.", "venue": "The Once and Future Turing", "year": 2013, "referenceCount": 109, "citationCount": 46, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1306.0159.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-06-01", "journal": {"pages": "193-296"}, "authors": [{"authorId": "20996436", "name": "S. Aaronson"}]}, {"paperId": "3d27bbfcf1ebe7390b5250e677e91179a76569e4", "externalIds": {"ArXiv": "1603.00948", "MAG": "2522126998", "DOI": "10.1103/PhysRevX.7.041002", "CorpusId": - 44184751}, "url": "https://www.semanticscholar.org/paper/3d27bbfcf1ebe7390b5250e677e91179a76569e4", + 44184751}, "corpusId": 44184751, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d27bbfcf1ebe7390b5250e677e91179a76569e4", "title": "Globally stable microresonator Turing pattern formation for coherent high-power THz radiation on-chip", "abstract": "In nonlinear microresonators driven by continuous-wave (cw) lasers, Turing patterns have been studied in @@ -1008,8 +1150,9 @@ interactions: system is promising to find applications in astrophysics, medical imaging, and wireless communications.", "venue": "", "year": 2016, "referenceCount": 49, "citationCount": 44, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevX.7.041002", + "status": "GOLD"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-03-03", "journal": {"name": "arXiv: Optics", "volume": ""}, "authors": [{"authorId": "122132133", "name": "Shu-Wei Huang"}, {"authorId": "2046781", "name": "Jinghui Yang"}, {"authorId": @@ -1018,7 +1161,14 @@ interactions: "name": "T. Zelevinsky"}, {"authorId": "2146359", "name": "M. Jarrahi"}, {"authorId": "1727458", "name": "C. Wong"}]}, {"paperId": "902fb60fa3493171b2aa9d485291a54185763a79", "externalIds": {"DBLP": "journals/jetai/WarwickS16", "MAG": "1912133035", - "DOI": "10.1080/0952813X.2015.1055826", "CorpusId": 31251200}, "url": "https://www.semanticscholar.org/paper/902fb60fa3493171b2aa9d485291a54185763a79", + "DOI": "10.1080/0952813X.2015.1055826", "CorpusId": 31251200}, "corpusId": + 31251200, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/902fb60fa3493171b2aa9d485291a54185763a79", "title": "Can machines think? A report on Turing test experiments at the Royal Society", "abstract": "In this article we consider transcripts that originated from a practical series of Turing''s Imitation Game that was held on 6 and @@ -1034,15 +1184,17 @@ interactions: time that results from the Royal Society tests have been disclosed and discussed in a paper.", "venue": "Journal of experimental and theoretical artificial intelligence (Print)", "year": 2016, "referenceCount": 34, "citationCount": - 46, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-11-01", "journal": - {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "1007 - 989", "volume": "28"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": - "95ca0cde71f0258ca99e920f711084a9a3a5fe4b", "externalIds": {"DBLP": "conf/nips/OrlitskyS15", - "MAG": "2187207766", "CorpusId": 15304308}, "url": "https://www.semanticscholar.org/paper/95ca0cde71f0258ca99e920f711084a9a3a5fe4b", + 46, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://pure.coventry.ac.uk/ws/files/4019869/warwickcomb.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "History", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-11-01", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "1007 - 989", "volume": "28"}, "authors": [{"authorId": + "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma + Shah"}]}, {"paperId": "95ca0cde71f0258ca99e920f711084a9a3a5fe4b", "externalIds": + {"DBLP": "conf/nips/OrlitskyS15", "MAG": "2187207766", "CorpusId": 15304308}, + "corpusId": 15304308, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/95ca0cde71f0258ca99e920f711084a9a3a5fe4b", "title": "Competitive Distribution Estimation: Why is Good-Turing Good", "abstract": "Estimating distributions over large alphabets is a fundamental machine-learning tenet. Yet no method is known to estimate all distributions well. For example, @@ -1063,16 +1215,19 @@ interactions: 1/\u221an)). Conversely, we show that any estimator must have a KL divergence at least \u03a9n(min(k/n, 1/n2/3)) over the best estimator for the first comparison, and at least \u03a9n(min(k/n, 1/\u221an)) for the second.", "venue": "NIPS", - "year": 2015, "referenceCount": 35, "citationCount": 77, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2015-12-07", "journal": {"pages": "2143-2151"}, "authors": - [{"authorId": "1691155", "name": "A. Orlitsky"}, {"authorId": "9486035", "name": - "A. Suresh"}]}, {"paperId": "df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "externalIds": - {"MAG": "2399906603", "DBLP": "conf/aips/000115", "DOI": "10.1609/icaps.v25i1.13684", - "CorpusId": 11168350}, "url": "https://www.semanticscholar.org/paper/df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", + "year": 2015, "referenceCount": 35, "citationCount": 78, "influentialCitationCount": + 11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2015-12-07", "journal": + {"pages": "2143-2151"}, "authors": [{"authorId": "1691155", "name": "A. Orlitsky"}, + {"authorId": "9486035", "name": "A. Suresh"}]}, {"paperId": "df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", + "externalIds": {"MAG": "2399906603", "DBLP": "conf/aips/000115", "DOI": "10.1609/icaps.v25i1.13684", + "CorpusId": 11168350}, "corpusId": 11168350, "publicationVenue": {"id": "267934f4-c986-4571-bef8-d0eebc5e0e54", + "name": "International Conference on Automated Planning and Scheduling", "type": + "conference", "alternate_names": ["Int Conf Autom Plan Sched", "ICAPS"], "url": + "http://www.icaps-conference.org/"}, "url": "https://www.semanticscholar.org/paper/df9b2cf56a90dcfcc22ea4bb07878547eb9744ea", "title": "Simulated Penetration Testing: From \"Dijkstra\" to \"Turing Test++\"", "abstract": "\n \n Penetration testing (pentesting) is a well established method for identifying security weaknesses, by conducting friendly attacks. @@ -1092,13 +1247,20 @@ interactions: challenges to AI sequential decision making research.\n \n", "venue": "International Conference on Automated Planning and Scheduling", "year": 2015, "referenceCount": 41, "citationCount": 80, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2015-04-08", "journal": {"pages": "364-372"}, "authors": [{"authorId": "144915519", - "name": "J. Hoffmann"}]}, {"paperId": "368a7958ae2b6b8f30454f4405c0bfa090ec5c22", - "externalIds": {"MAG": "2022248835", "DOI": "10.1364/OE.20.003241", "CorpusId": - 24244845, "PubMed": "22330562"}, "url": "https://www.semanticscholar.org/paper/368a7958ae2b6b8f30454f4405c0bfa090ec5c22", + "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/ICAPS/article/download/13684/13533", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2015-04-08", "journal": {"pages": "364-372"}, + "authors": [{"authorId": "144915519", "name": "J. Hoffmann"}]}, {"paperId": + "368a7958ae2b6b8f30454f4405c0bfa090ec5c22", "externalIds": {"MAG": "2022248835", + "DOI": "10.1364/OE.20.003241", "CorpusId": 24244845, "PubMed": "22330562"}, + "corpusId": 24244845, "publicationVenue": {"id": "f06e7ee6-cd20-45a8-91f9-6c84bcddc5fd", + "name": "Optics Express", "type": "journal", "alternate_names": ["Opt Express"], + "issn": "1094-4087", "url": "http://www.opticsexpress.org/Issue.cfm", "alternate_urls": + ["http://www.opticsinfobase.org/oe/", "https://www.osapublishing.org/oe/home.cfm", + "http://www.osapublishing.org/oe/", "http://www.opticsinfobase.org/oe/home.cfm"]}, + "url": "https://www.semanticscholar.org/paper/368a7958ae2b6b8f30454f4405c0bfa090ec5c22", "title": "Photonic information processing beyond Turing: an optoelectronic implementation of reservoir computing.", "abstract": "Many information processing challenges are difficult to solve with traditional Turing or von Neumann approaches. @@ -1111,20 +1273,37 @@ interactions: to an input data stream. We employ spoken digit recognition and time series prediction tasks as benchmarks, achieving competitive processing figures of merit.", "venue": "Optics Express", "year": 2012, "referenceCount": 32, "citationCount": - 507, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-01-30", "journal": {"name": "Optics - express", "pages": "\n 3241-9\n ", "volume": "20 3"}, "authors": - [{"authorId": "1760452", "name": "L. Larger"}, {"authorId": "144524298", "name": - "M. C. Soriano"}, {"authorId": "145711155", "name": "D. Brunner"}, {"authorId": - "1829066", "name": "L. Appeltant"}, {"authorId": "144614855", "name": "J. - Guti\u00e9rrez"}, {"authorId": "145682718", "name": "L. Pesquera"}, {"authorId": - "2034306", "name": "C. Mirasso"}, {"authorId": "1795232", "name": "Ingo Fischer"}]}, - {"paperId": "b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "externalIds": {"MAG": - "2242749976", "DOI": "10.1073/pnas.1322005111", "CorpusId": 17626456, "PubMed": - "24616508"}, "url": "https://www.semanticscholar.org/paper/b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", + 510, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-30", "journal": + {"name": "Optics express", "pages": "\n 3241-9\n ", "volume": + "20 3"}, "authors": [{"authorId": "1760452", "name": "L. Larger"}, {"authorId": + "144524298", "name": "M. C. Soriano"}, {"authorId": "145711155", "name": "D. + Brunner"}, {"authorId": "1829066", "name": "L. Appeltant"}, {"authorId": "144614855", + "name": "J. Guti\u00e9rrez"}, {"authorId": "145682718", "name": "L. Pesquera"}, + {"authorId": "2034306", "name": "C. Mirasso"}, {"authorId": "1795232", "name": + "Ingo Fischer"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", + "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": + 28057065, "PubMed": "25544713"}, "corpusId": 28057065, "publicationVenue": + {"id": "e26133f2-2f02-4bc5-a3ad-26bdbdc9636c", "name": "Trends in Genetics", + "type": "journal", "alternate_names": ["Trends Genet"], "issn": "0168-9479", + "alternate_issns": ["1362-4555", "0168-9525"], "url": "http://www.sciencedirect.com/science/journal/01689525", + "alternate_urls": ["http://www.cell.com/trends/genetics/"]}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", + "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", + "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": + 64, "citationCount": 99, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2015-02-01", "journal": + {"name": "Trends in genetics : TIG", "pages": "\n 88-96\n ", + "volume": "31 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu + Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": + "b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "externalIds": {"MAG": "2242749976", + "DOI": "10.1073/pnas.1322005111", "CorpusId": 17626456, "PubMed": "24616508"}, + "corpusId": 17626456, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b9e537ee71488bb30de3337b7f55e4c6a44aeb8d", "title": "Testing Turing\u2019s theory of morphogenesis in chemical cells", "abstract": "Significance Turing proposed that intercellular reaction-diffusion of molecules is responsible for morphogenesis. The impact of this paradigm @@ -1151,7 +1330,8 @@ interactions: original model, which we explain by modifying the theory to include heterogeneity.", "venue": "Proceedings of the National Academy of Sciences", "year": 2014, "referenceCount": 46, "citationCount": 164, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine", "Computer Science"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/111/12/4397.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], @@ -1164,33 +1344,77 @@ interactions: "name": "I. Epstein"}, {"authorId": "2775719", "name": "S. Fraden"}]}, {"paperId": "0c4930885dd3318d39f39278686446752bc305b5", "externalIds": {"DBLP": "journals/isci/AlarifiAA16", "MAG": "2510717748", "DOI": "10.1016/j.ins.2016.08.036", "CorpusId": 19044123}, - "url": "https://www.semanticscholar.org/paper/0c4930885dd3318d39f39278686446752bc305b5", + "corpusId": 19044123, "publicationVenue": {"id": "e46002a1-d7a6-4681-aae9-36bc3a6a1f93", + "name": "Information Sciences", "type": "journal", "alternate_names": ["Information + Scientist", "Inf Sci"], "issn": "0020-0255", "alternate_issns": ["0020-0263"], + "url": "http://www.sciencedirect.com/science/journal/00200255"}, "url": "https://www.semanticscholar.org/paper/0c4930885dd3318d39f39278686446752bc305b5", "title": "Twitter turing test: Identifying social machines", "abstract": null, "venue": "Information Sciences", "year": 2016, "referenceCount": 45, "citationCount": - 68, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2016-12-01", - "journal": {"name": "Inf. Sci.", "pages": "332-346", "volume": "372"}, "authors": - [{"authorId": "2329378", "name": "A. Alarifi"}, {"authorId": "3129812", "name": - "M. Alsaleh"}, {"authorId": "1393386740", "name": "A. Al-Salman"}]}, {"paperId": - "ac7a3d2983b75bd4f44903892a5df295a0f859ff", "externalIds": {"DBLP": "conf/crypto/GoldwasserKPVZ13", - "MAG": "1590453572", "DOI": "10.1007/978-3-642-40084-1_30", "CorpusId": 2561936}, - "url": "https://www.semanticscholar.org/paper/ac7a3d2983b75bd4f44903892a5df295a0f859ff", + 69, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2016-12-01", "journal": {"name": "Inf. Sci.", "pages": + "332-346", "volume": "372"}, "authors": [{"authorId": "2329378", "name": "A. + Alarifi"}, {"authorId": "3129812", "name": "M. Alsaleh"}, {"authorId": "1393386740", + "name": "A. Al-Salman"}]}, {"paperId": "2b352a475a16b3e12b1af1cf9231ba824db9f937", + "externalIds": {"DBLP": "journals/tcas/BuscarinoCFFC16", "MAG": "2485899172", + "DOI": "10.1109/TCSI.2016.2564738", "CorpusId": 36502203}, "corpusId": 36502203, + "publicationVenue": {"id": "65967e36-f7db-476f-9d00-fd080a5a8483", "name": + "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", "type": + "journal", "alternate_names": ["IEEE Trans Circuit Syst Part 1 Regul Pap", + "IEEE Trans Circuit Syst I-regular Pap", "IEEE Transactions on Circuits and + Systems I-regular Papers"], "issn": "1549-8328", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=8919", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8919"]}, + "url": "https://www.semanticscholar.org/paper/2b352a475a16b3e12b1af1cf9231ba824db9f937", + "title": "Turing Patterns in Memristive Cellular Nonlinear Networks", "abstract": + "The formation of ordered structures, in particular Turing patterns, in complex + spatially extended systems has been observed in many different contexts, spanning + from natural sciences (chemistry, physics, and biology) to technology (mechanics + and electronics). In this paper, it is shown that the use of memristors in + a simple cell of a spatially-extended circuit architecture allows us to design + systems able to generate Turing patterns. In addition, the memristor parameters + play a key role in the selection of the type and characteristics of the emerging + pattern, which is also influenced by the initial conditions. The problem of + finding the regions of parameters where Turing patterns may emerge in the + proposed cellular architecture is solved in an analytic way, and numerical + results are shown to illustrate the system behavior with respect to its parameters.", + "venue": "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", + "year": 2016, "referenceCount": 32, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-07-13", "journal": + {"name": "IEEE Transactions on Circuits and Systems I: Regular Papers", "pages": + "1222-1230", "volume": "63"}, "authors": [{"authorId": "1884234", "name": + "A. Buscarino"}, {"authorId": "48285431", "name": "C. Corradino"}, {"authorId": + "143998340", "name": "L. Fortuna"}, {"authorId": "1766733", "name": "M. Frasca"}, + {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "ac7a3d2983b75bd4f44903892a5df295a0f859ff", + "externalIds": {"DBLP": "conf/crypto/GoldwasserKPVZ13", "MAG": "1590453572", + "DOI": "10.1007/978-3-642-40084-1_30", "CorpusId": 2561936}, "corpusId": 2561936, + "publicationVenue": {"id": "212b6868-c374-4ba2-ad32-19fde8004623", "name": + "Annual International Cryptology Conference", "type": "conference", "alternate_names": + ["Int Cryptol Conf", "Annu Int Cryptol Conf", "CRYPTO", "International Cryptology + Conference"], "url": "http://www.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/ac7a3d2983b75bd4f44903892a5df295a0f859ff", "title": "How to Run Turing Machines on Encrypted Data", "abstract": null, "venue": "Annual International Cryptology Conference", "year": 2013, "referenceCount": 58, "citationCount": 181, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2013-08-18", "journal": - {"pages": "536-553"}, "authors": [{"authorId": "1706681", "name": "S. Goldwasser"}, - {"authorId": "1784514", "name": "Y. Kalai"}, {"authorId": "144963510", "name": - "R. A. Popa"}, {"authorId": "1749858", "name": "V. Vaikuntanathan"}, {"authorId": - "1789973", "name": "N. Zeldovich"}]}, {"paperId": "736a8e786d3e8b3a5b06d57648c83b14243a6479", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-642-40084-1_30.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2013-08-18", "journal": {"pages": "536-553"}, "authors": [{"authorId": "1706681", + "name": "S. Goldwasser"}, {"authorId": "1784514", "name": "Y. Kalai"}, {"authorId": + "144963510", "name": "R. A. Popa"}, {"authorId": "1749858", "name": "V. Vaikuntanathan"}, + {"authorId": "1789973", "name": "N. Zeldovich"}]}, {"paperId": "736a8e786d3e8b3a5b06d57648c83b14243a6479", "externalIds": {"DBLP": "journals/corr/abs-1211-1302", "MAG": "2963123289", "ArXiv": "1211.1302", "PubMedCentral": "4014489", "DOI": "10.1371/journal.pone.0096223", - "CorpusId": 10562121, "PubMed": "24809449"}, "url": "https://www.semanticscholar.org/paper/736a8e786d3e8b3a5b06d57648c83b14243a6479", + "CorpusId": 10562121, "PubMed": "24809449"}, "corpusId": 10562121, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/736a8e786d3e8b3a5b06d57648c83b14243a6479", "title": "Calculating Kolmogorov Complexity from the Output Frequency Distributions of Small Turing Machines", "abstract": "Drawing on various notions from theoretical computer science, we present a novel numerical approach, motivated by the @@ -1211,55 +1435,21 @@ interactions: Calculator implementing this technique and making the data available to the research community is accessible at http://www.complexitycalculator.com.", "venue": "PLoS ONE", "year": 2012, "referenceCount": 82, "citationCount": - 142, "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science", "Medicine", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-11-06", "journal": {"name": "PLoS ONE", "volume": "9"}, "authors": [{"authorId": - "1389866422", "name": "F. Soler-Toscano"}, {"authorId": "66445647", "name": - "H. Zenil"}, {"authorId": "2027817702", "name": "J. Delahaye"}, {"authorId": - "3159526", "name": "N. Gauvrit"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", - "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": - 28057065, "PubMed": "25544713"}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", - "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", - "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": - 64, "citationCount": 96, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2015-02-01", "journal": {"name": "Trends - in genetics : TIG", "pages": "\n 88-96\n ", "volume": "31 - 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu Watanabe"}, {"authorId": - "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "2b352a475a16b3e12b1af1cf9231ba824db9f937", - "externalIds": {"DBLP": "journals/tcas/BuscarinoCFFC16", "MAG": "2485899172", - "DOI": "10.1109/TCSI.2016.2564738", "CorpusId": 36502203}, "url": "https://www.semanticscholar.org/paper/2b352a475a16b3e12b1af1cf9231ba824db9f937", - "title": "Turing Patterns in Memristive Cellular Nonlinear Networks", "abstract": - "The formation of ordered structures, in particular Turing patterns, in complex - spatially extended systems has been observed in many different contexts, spanning - from natural sciences (chemistry, physics, and biology) to technology (mechanics - and electronics). In this paper, it is shown that the use of memristors in - a simple cell of a spatially-extended circuit architecture allows us to design - systems able to generate Turing patterns. In addition, the memristor parameters - play a key role in the selection of the type and characteristics of the emerging - pattern, which is also influenced by the initial conditions. The problem of - finding the regions of parameters where Turing patterns may emerge in the - proposed cellular architecture is solved in an analytic way, and numerical - results are shown to illustrate the system behavior with respect to its parameters.", - "venue": "IEEE Transactions on Circuits and Systems Part 1: Regular Papers", - "year": 2016, "referenceCount": 32, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-07-13", "journal": {"name": "IEEE Transactions on - Circuits and Systems I: Regular Papers", "pages": "1222-1230", "volume": "63"}, - "authors": [{"authorId": "1884234", "name": "A. Buscarino"}, {"authorId": - "48285431", "name": "C. Corradino"}, {"authorId": "143998340", "name": "L. - Fortuna"}, {"authorId": "1766733", "name": "M. Frasca"}, {"authorId": "144848684", - "name": "L. Chua"}]}, {"paperId": "ececf989a13264a455ec2898ed361b1c435b5f0c", - "externalIds": {"PubMedCentral": "4360114", "MAG": "2099530148", "DOI": "10.1098/rstb.2014.0218", - "CorpusId": 1594833, "PubMed": "25750229"}, "url": "https://www.semanticscholar.org/paper/ececf989a13264a455ec2898ed361b1c435b5f0c", + 143, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": + {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0096223&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-11-06", "journal": {"name": "PLoS ONE", "volume": + "9"}, "authors": [{"authorId": "1389866422", "name": "F. Soler-Toscano"}, + {"authorId": "66445647", "name": "H. Zenil"}, {"authorId": "2027817702", "name": + "J. Delahaye"}, {"authorId": "3159526", "name": "N. Gauvrit"}]}, {"paperId": + "ececf989a13264a455ec2898ed361b1c435b5f0c", "externalIds": {"PubMedCentral": + "4360114", "MAG": "2099530148", "DOI": "10.1098/rstb.2014.0218", "CorpusId": + 1594833, "PubMed": "25750229"}, "corpusId": 1594833, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/ececf989a13264a455ec2898ed361b1c435b5f0c", "title": "Forging patterns and making waves from biology to geology: a commentary on Turing (1952) \u2018The chemical basis of morphogenesis\u2019", "abstract": "Alan Turing was neither a biologist nor a chemist, and yet the paper he published @@ -1281,7 +1471,8 @@ interactions: the 350th anniversary of the journal Philosophical Transactions of the Royal Society.", "venue": "Philosophical Transactions of the Royal Society B: Biological Sciences", "year": 2015, "referenceCount": 53, "citationCount": 76, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Geology", "Medicine"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rstb.2014.0218", + "status": "HYBRID"}, "fieldsOfStudy": ["Biology", "Geology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Geology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", @@ -1289,24 +1480,31 @@ interactions: Transactions of the Royal Society B: Biological Sciences", "volume": "370"}, "authors": [{"authorId": "145164549", "name": "P. Ball"}]}, {"paperId": "257d834280b58f62e8fcd18980162e3fc8f98138", "externalIds": {"DBLP": "books/sp/Soare16", "DOI": "10.1007/978-3-642-31933-4", - "CorpusId": 1500040}, "url": "https://www.semanticscholar.org/paper/257d834280b58f62e8fcd18980162e3fc8f98138", + "CorpusId": 1500040}, "corpusId": 1500040, "publicationVenue": {"id": "1ef7809b-0640-4615-aa43-9f080f8a9445", + "name": "Theory and Applications of Computability", "alternate_names": ["Theory + Appl Comput"], "issn": "2190-619X"}, "url": "https://www.semanticscholar.org/paper/257d834280b58f62e8fcd18980162e3fc8f98138", "title": "Turing Computability", "abstract": null, "venue": "Theory and Applications of Computability", "year": 2016, "referenceCount": 52, "citationCount": 52, - "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"pages": "3-249"}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, - {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": {"MAG": - "2982569830", "CorpusId": 209946616}, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", + "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/bfm%3A978-3-642-31933-4%2F1", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "3-249"}, "authors": [{"authorId": "1760293", "name": + "R. Soare"}]}, {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": + {"MAG": "2982569830", "CorpusId": 209946616}, "corpusId": 209946616, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", "title": "Turing (1936), On Computable Numbers, with an Application to the Entscheidungsproblem", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 62, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}], "publicationTypes": null, "publicationDate": "2016-02-24", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3045814", - "name": "Rossella Lupacchini"}]}, {"paperId": "51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, + "publicationDate": "2016-02-24", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3045814", "name": "Rossella Lupacchini"}]}, {"paperId": "51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", "externalIds": {"MAG": "3030327058", "DBLP": "journals/iacr/KoppulaLW14", - "DOI": "10.1145/2746539.2746614", "CorpusId": 1368494}, "url": "https://www.semanticscholar.org/paper/51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", + "DOI": "10.1145/2746539.2746614", "CorpusId": 1368494}, "corpusId": 1368494, + "publicationVenue": {"id": "166fd2b5-a928-4a98-a449-3b90935cc101", "name": + "IACR Cryptology ePrint Archive", "type": "journal", "alternate_names": ["IACR + Cryptol eprint Arch"], "url": "http://eprint.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084", "title": "Indistinguishability Obfuscation for Turing Machines with Unbounded Memory", "abstract": "We show how to build indistinguishability obfuscation (iO) for Turing Machines where the overhead is polynomial in the security @@ -1323,18 +1521,19 @@ interactions: we are at in a proof. We first build up our enforcement ideas in a simpler context of \"message hiding encodings\" and work our way up to indistinguishability obfuscation.", "venue": "IACR Cryptology ePrint Archive", "year": 2015, "referenceCount": - 64, "citationCount": 123, "influentialCitationCount": 10, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["Book", "JournalArticle"], "publicationDate": "2015-06-14", "journal": {"name": - "Proceedings of the forty-seventh annual ACM symposium on Theory of Computing"}, - "authors": [{"authorId": "1827155", "name": "Venkata Koppula"}, {"authorId": - "145071454", "name": "Allison Bishop"}, {"authorId": "145778768", "name": - "Brent Waters"}]}, {"paperId": "fdadb889d47debf18fe82031af4062b2ccf9de86", + 64, "citationCount": 124, "influentialCitationCount": 10, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2015-06-14", + "journal": {"name": "Proceedings of the forty-seventh annual ACM symposium + on Theory of Computing"}, "authors": [{"authorId": "1827155", "name": "Venkata + Koppula"}, {"authorId": "145071454", "name": "Allison Bishop"}, {"authorId": + "145778768", "name": "Brent Waters"}]}, {"paperId": "fdadb889d47debf18fe82031af4062b2ccf9de86", "externalIds": {"MAG": "1955542456", "DOI": "10.1073/pnas.1505748112", "CorpusId": - 32757767, "PubMed": "26307762"}, "url": "https://www.semanticscholar.org/paper/fdadb889d47debf18fe82031af4062b2ccf9de86", + 32757767, "PubMed": "26307762"}, "corpusId": 32757767, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fdadb889d47debf18fe82031af4062b2ccf9de86", "title": "Diverse set of Turing nanopatterns coat corneae across insect lineages", "abstract": "Significance Corneal surfaces of some insects are coated with nipple-like nanostructures reducing the light reflection. Here we provide @@ -1365,16 +1564,18 @@ interactions: be the first-ever biological example of Turing nanopatterns.", "venue": "Proceedings of the National Academy of Sciences", "year": 2015, "referenceCount": 39, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Study"], "publicationDate": "2015-08-11", "journal": {"name": "Proceedings - of the National Academy of Sciences", "pages": "10750 - 10755", "volume": - "112"}, "authors": [{"authorId": "5960117", "name": "A. Blagodatski"}, {"authorId": - "47141264", "name": "A. Sergeev"}, {"authorId": "145583716", "name": "M. Kryuchkov"}, - {"authorId": "16047326", "name": "Y. Lopatina"}, {"authorId": "3875456", "name": - "V. Katanaev"}]}, {"paperId": "0ae19a6937d504e654a597543779f1b1c027562f", - "externalIds": {"CorpusId": 17049388}, "url": "https://www.semanticscholar.org/paper/0ae19a6937d504e654a597543779f1b1c027562f", + "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/112/34/10750.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Study"], "publicationDate": "2015-08-11", "journal": {"name": + "Proceedings of the National Academy of Sciences", "pages": "10750 - 10755", + "volume": "112"}, "authors": [{"authorId": "5960117", "name": "A. Blagodatski"}, + {"authorId": "47141264", "name": "A. Sergeev"}, {"authorId": "145583716", + "name": "M. Kryuchkov"}, {"authorId": "16047326", "name": "Y. Lopatina"}, + {"authorId": "3875456", "name": "V. Katanaev"}]}, {"paperId": "0ae19a6937d504e654a597543779f1b1c027562f", + "externalIds": {"CorpusId": 17049388}, "corpusId": 17049388, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0ae19a6937d504e654a597543779f1b1c027562f", "title": "The Church-Turing Thesis", "abstract": "cell containing a left end marker ` (never written over) and extends to infinitely many cells to the right. This machine has a head that can move left or right one cell in each @@ -1401,17 +1602,21 @@ interactions: and direction to move the tape head, given the current state and symbol read; it is assumed that no transitions are enabled from either t or r.", "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "37782675", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "37782675", "name": "Mahesh Viswanathan"}]}, {"paperId": "2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", "externalIds": {"MAG": "2315683245", "DBLP": "conf/automata/BarbieriKS16", "ArXiv": "1603.08715", "DOI": "10.1007/978-3-319-39300-1_5", "CorpusId": 12270213}, - "url": "https://www.semanticscholar.org/paper/2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", + "corpusId": 12270213, "publicationVenue": {"id": "1ecbe314-9ae3-4d24-b161-c8dc331acd3b", + "name": "International Workshop on Cellular Automata and Discrete Complex + Systems", "type": "conference", "alternate_names": ["AUTOMATA", "Int Workshop + Cell Autom Discret Complex Syst"]}, "url": "https://www.semanticscholar.org/paper/2e1d407355a94ddcf2920d677bb83c0d3aeaa21b", "title": "The Group of Reversible Turing Machines", "abstract": null, "venue": "International Workshop on Cellular Automata and Discrete Complex Systems", "year": 2016, "referenceCount": 39, "citationCount": 23, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1603.08715", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -1419,7 +1624,12 @@ interactions: "name": "S. Barbieri"}, {"authorId": "1753080", "name": "J. Kari"}, {"authorId": "1789048", "name": "V. Salo"}]}, {"paperId": "30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", "externalIds": {"MAG": "2076118717", "DOI": "10.1126/science.1226804", "CorpusId": - 20013377, "PubMed": "23239739"}, "url": "https://www.semanticscholar.org/paper/30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", + 20013377, "PubMed": "23239739"}, "corpusId": 20013377, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/30f120e9bc4743c8a12e6e95f3f8e3a582f05ef2", "title": "Hox Genes Regulate Digit Patterning by Controlling the Wavelength of a Turing-Type Mechanism", "abstract": "Digit Determination Pentadactyly has been an early and rapid innovation of tetrapods. Sheth et al. (p. 1476) @@ -1441,7 +1651,8 @@ interactions: endoskeleton patterns suggests that the pentadactyl state has been achieved through modification of an ancestral Turing-type mechanism.", "venue": "Science", "year": 2012, "referenceCount": 44, "citationCount": 318, "influentialCitationCount": - 16, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 16, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc4486416?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-14", "journal": {"name": "Science", @@ -1451,9 +1662,29 @@ interactions: "name": "Marisa Junco"}, {"authorId": "145631546", "name": "L. Quintana"}, {"authorId": "4351690", "name": "R. Dahn"}, {"authorId": "47986084", "name": "M. Kmita"}, {"authorId": "47254653", "name": "J. Sharpe"}, {"authorId": "3907783", - "name": "M. Ros"}]}, {"paperId": "c5fd63756cc5ac85e25af730e8da710efad43ed5", - "externalIds": {"DBLP": "journals/corr/abs-1205-3856", "ArXiv": "1205.3856", - "MAG": "2963817922", "CorpusId": 2749452}, "url": "https://www.semanticscholar.org/paper/c5fd63756cc5ac85e25af730e8da710efad43ed5", + "name": "M. Ros"}]}, {"paperId": "36fe20dd69b2160b3030fab2c103f02ee2816756", + "externalIds": {"MAG": "1495676205", "PubMedCentral": "4432648", "DOI": "10.1038/ncomms7971", + "CorpusId": 11824324, "PubMed": "25959141"}, "corpusId": 11824324, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/36fe20dd69b2160b3030fab2c103f02ee2816756", + "title": "Pigment cell movement is not required for generation of Turing patterns + in zebrafish skin", "abstract": null, "venue": "Nature Communications", "year": + 2015, "referenceCount": 32, "citationCount": 40, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/ncomms7971.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-05-11", "journal": {"name": "Nature + Communications", "volume": "6"}, "authors": [{"authorId": "4648400", "name": + "D. Bullara"}, {"authorId": "89673540", "name": "Y. De Decker"}]}, {"paperId": + "c5fd63756cc5ac85e25af730e8da710efad43ed5", "externalIds": {"DBLP": "journals/corr/abs-1205-3856", + "ArXiv": "1205.3856", "MAG": "2963817922", "CorpusId": 2749452}, "corpusId": + 2749452, "publicationVenue": {"id": "e6904c24-9546-4135-8344-e3999e375558", + "name": "Network and Distributed System Security Symposium", "type": "conference", + "alternate_names": ["Netw Distrib Syst Secur Symp", "NDSS"], "url": "http://www.isoc.org/"}, + "url": "https://www.semanticscholar.org/paper/c5fd63756cc5ac85e25af730e8da710efad43ed5", "title": "Social Turing Tests: Crowdsourcing Sybil Detection", "abstract": "As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks @@ -1470,45 +1701,41 @@ interactions: study data, we show that this system is scalable, and can be highly effective either as a standalone system or as a complementary technique to current tools.", "venue": "Network and Distributed System Security Symposium", "year": 2012, - "referenceCount": 37, "citationCount": 182, "influentialCitationCount": 13, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2012-05-01", - "journal": {"name": "ArXiv", "volume": "abs/1205.3856"}, "authors": [{"authorId": - "2096527", "name": "G. Wang"}, {"authorId": "2802925", "name": "M. Mohanlal"}, - {"authorId": "35497150", "name": "Christo Wilson"}, {"authorId": "144129720", - "name": "Xiao Wang"}, {"authorId": "1976593", "name": "Miriam J. Metzger"}, - {"authorId": "2704852", "name": "Haitao Zheng"}, {"authorId": "145970007", - "name": "Ben Y. Zhao"}]}, {"paperId": "748a8803deb06c5e51e5cf17496ea01aae923a48", - "externalIds": {"MAG": "2008912593", "DBLP": "journals/algorithmica/HermelinKSWW15", - "DOI": "10.1007/s00453-014-9910-8", "CorpusId": 15612295}, "url": "https://www.semanticscholar.org/paper/748a8803deb06c5e51e5cf17496ea01aae923a48", + "referenceCount": 37, "citationCount": 183, "influentialCitationCount": 13, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2012-05-01", "journal": {"name": "ArXiv", + "volume": "abs/1205.3856"}, "authors": [{"authorId": "2096527", "name": "G. + Wang"}, {"authorId": "2802925", "name": "M. Mohanlal"}, {"authorId": "35497150", + "name": "Christo Wilson"}, {"authorId": "144129720", "name": "Xiao Wang"}, + {"authorId": "1976593", "name": "Miriam J. Metzger"}, {"authorId": "2704852", + "name": "Haitao Zheng"}, {"authorId": "145970007", "name": "Ben Y. Zhao"}]}, + {"paperId": "748a8803deb06c5e51e5cf17496ea01aae923a48", "externalIds": {"MAG": + "2008912593", "DBLP": "journals/algorithmica/HermelinKSWW15", "DOI": "10.1007/s00453-014-9910-8", + "CorpusId": 15612295}, "corpusId": 15612295, "publicationVenue": {"id": "300eb16f-ce6c-495a-8da3-2e691bf9051d", + "name": "Algorithmica", "type": "journal", "issn": "0178-4617", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/453", + "alternate_urls": ["https://link.springer.com/journal/453", "http://www.springer.com/computer/theoretical+computer+science/journal/453"]}, + "url": "https://www.semanticscholar.org/paper/748a8803deb06c5e51e5cf17496ea01aae923a48", "title": "A Completeness Theory for Polynomial (Turing) Kernelization", "abstract": null, "venue": "Algorithmica", "year": 2013, "referenceCount": 62, "citationCount": - 95, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-09-04", "journal": {"name": "Algorithmica", - "pages": "702-730", "volume": "71"}, "authors": [{"authorId": "1736630", "name": - "D. Hermelin"}, {"authorId": "1692122", "name": "Stefan Kratsch"}, {"authorId": - "3164252", "name": "Karolina Soltys"}, {"authorId": "1849901", "name": "Magnus - Wahlstr\u00f6m"}, {"authorId": "37785191", "name": "Xi Wu"}]}, {"paperId": - "36fe20dd69b2160b3030fab2c103f02ee2816756", "externalIds": {"MAG": "1495676205", - "PubMedCentral": "4432648", "DOI": "10.1038/ncomms7971", "CorpusId": 11824324, - "PubMed": "25959141"}, "url": "https://www.semanticscholar.org/paper/36fe20dd69b2160b3030fab2c103f02ee2816756", - "title": "Pigment cell movement is not required for generation of Turing patterns - in zebrafish skin", "abstract": null, "venue": "Nature Communications", "year": - 2015, "referenceCount": 32, "citationCount": 37, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-05-11", "journal": {"name": "Nature - Communications", "volume": "6"}, "authors": [{"authorId": "4648400", "name": - "D. Bullara"}, {"authorId": "89673540", "name": "Y. De Decker"}]}, {"paperId": - "7281183d1b510a75fc32a9713133c242e6fcc718", "externalIds": {"PubMedCentral": - "4384830", "MAG": "2051172976", "DOI": "10.1021/sb500233u", "CorpusId": 508239, - "PubMed": "25122550"}, "url": "https://www.semanticscholar.org/paper/7281183d1b510a75fc32a9713133c242e6fcc718", + 95, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2013-09-04", "journal": {"name": "Algorithmica", "pages": "702-730", "volume": + "71"}, "authors": [{"authorId": "1736630", "name": "D. Hermelin"}, {"authorId": + "1692122", "name": "Stefan Kratsch"}, {"authorId": "3164252", "name": "Karolina + Soltys"}, {"authorId": "1849901", "name": "Magnus Wahlstr\u00f6m"}, {"authorId": + "37785191", "name": "Xi Wu"}]}, {"paperId": "7281183d1b510a75fc32a9713133c242e6fcc718", + "externalIds": {"PubMedCentral": "4384830", "MAG": "2051172976", "DOI": "10.1021/sb500233u", + "CorpusId": 508239, "PubMed": "25122550"}, "corpusId": 508239, "publicationVenue": + {"id": "ba560e30-4944-4dde-ac86-d977062fe0c5", "name": "ACS Synthetic Biology", + "type": "journal", "alternate_names": ["AC Synth Biology"], "issn": "2161-5063", + "url": "https://pubs.acs.org/journal/asbcd6", "alternate_urls": ["http://pubs.acs.org/journal/asbcd6"]}, + "url": "https://www.semanticscholar.org/paper/7281183d1b510a75fc32a9713133c242e6fcc718", "title": "Cooperativity To Increase Turing Pattern Space for Synthetic Biology", "abstract": "It is hard to bridge the gap between mathematical formulations and biological implementations of Turing patterns, yet this is necessary for @@ -1529,17 +1756,18 @@ interactions: of the limitations of linear scenarios for reaction\u2013diffusion systems and will help to guide projects to engineer synthetic Turing patterns.", "venue": "ACS Synthetic Biology", "year": 2014, "referenceCount": 52, "citationCount": - 39, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-08-14", "journal": {"name": "ACS Synthetic Biology", - "pages": "177 - 186", "volume": "4"}, "authors": [{"authorId": "2372067", - "name": "Luis Diambra"}, {"authorId": "6561683", "name": "V. Senthivel"}, - {"authorId": "47123946", "name": "Diego B\u00e1rcena Men\u00e9ndez"}, {"authorId": - "3091939", "name": "M. Isalan"}]}, {"paperId": "3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", - "externalIds": {"MAG": "300525892", "DBLP": "journals/corr/MalinowskiF14a", - "ArXiv": "1410.8027", "CorpusId": 811868}, "url": "https://www.semanticscholar.org/paper/3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", + 39, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-08-14", "journal": + {"name": "ACS Synthetic Biology", "pages": "177 - 186", "volume": "4"}, "authors": + [{"authorId": "2372067", "name": "Luis Diambra"}, {"authorId": "6561683", + "name": "V. Senthivel"}, {"authorId": "47123946", "name": "Diego B\u00e1rcena + Men\u00e9ndez"}, {"authorId": "3091939", "name": "M. Isalan"}]}, {"paperId": + "3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", "externalIds": {"MAG": "300525892", + "DBLP": "journals/corr/MalinowskiF14a", "ArXiv": "1410.8027", "CorpusId": + 811868}, "corpusId": 811868, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d29e1c4f1c2b079cf6b5dd458fa6cee246955f9", "title": "Towards a Visual Turing Challenge", "abstract": "As language and visual understanding by machines progresses rapidly, we are observing an increasing interest in holistic architectures that tightly interlink both modalities @@ -1559,38 +1787,42 @@ interactions: driving force to create suitable benchmarks. Providing coverage in this inherently ambiguous output space is an emerging challenge that we face in order to make quantifiable progress in this area.", "venue": "ArXiv", "year": 2014, "referenceCount": - 83, "citationCount": 67, "influentialCitationCount": 12, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-10-29", "journal": {"name": "ArXiv", "volume": "abs/1410.8027"}, "authors": - [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": "1739548", - "name": "Mario Fritz"}]}, {"paperId": "358e1c04f03c2ede4b913a7430e99e78e66f2597", + 83, "citationCount": 68, "influentialCitationCount": 12, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-10-29", "journal": {"name": "ArXiv", "volume": "abs/1410.8027"}, + "authors": [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": + "1739548", "name": "Mario Fritz"}]}, {"paperId": "358e1c04f03c2ede4b913a7430e99e78e66f2597", "externalIds": {"MAG": "1990010228", "DOI": "10.1016/J.ECOCOM.2014.09.002", - "CorpusId": 84059947}, "url": "https://www.semanticscholar.org/paper/358e1c04f03c2ede4b913a7430e99e78e66f2597", + "CorpusId": 84059947}, "corpusId": 84059947, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/358e1c04f03c2ede4b913a7430e99e78e66f2597", "title": "Beyond Turing: The response of patterned ecosystems to environmental change", "abstract": null, "venue": "", "year": 2014, "referenceCount": 60, - "citationCount": 107, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2014-12-01", "journal": {"name": "Ecological Complexity", "pages": "81-96", - "volume": "20"}, "authors": [{"authorId": "3922814", "name": "K. Siteur"}, - {"authorId": "143978708", "name": "E. Siero"}, {"authorId": "6326314", "name": - "M. Eppinga"}, {"authorId": "144207734", "name": "J. Rademacher"}, {"authorId": - "1727787", "name": "A. Doelman"}, {"authorId": "2096458905", "name": "M. Rietkerk"}]}, - {"paperId": "999f90eebe8b3504b1ee3a8a689513b26e18772e", "externalIds": {"MAG": - "2490062034", "DOI": "10.1016/B978-0-12-386980-7.50021-6", "CorpusId": 63444001}, - "url": "https://www.semanticscholar.org/paper/999f90eebe8b3504b1ee3a8a689513b26e18772e", + "citationCount": 108, "influentialCitationCount": 8, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dspace.library.uu.nl/bitstream/1874/307590/1/14.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2014-12-01", "journal": {"name": "Ecological Complexity", + "pages": "81-96", "volume": "20"}, "authors": [{"authorId": "3922814", "name": + "K. Siteur"}, {"authorId": "143978708", "name": "E. Siero"}, {"authorId": + "6326314", "name": "M. Eppinga"}, {"authorId": "144207734", "name": "J. Rademacher"}, + {"authorId": "1727787", "name": "A. Doelman"}, {"authorId": "2096458905", + "name": "M. Rietkerk"}]}, {"paperId": "999f90eebe8b3504b1ee3a8a689513b26e18772e", + "externalIds": {"MAG": "2490062034", "DOI": "10.1016/B978-0-12-386980-7.50021-6", + "CorpusId": 63444001}, "corpusId": 63444001, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/999f90eebe8b3504b1ee3a8a689513b26e18772e", "title": "Turing\u2019s Lecture to the London Mathematical Society on 20 February 1947", "abstract": null, "venue": "", "year": 2013, "referenceCount": 5, "citationCount": - 156, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "481-497", "volume": ""}, "authors": [{"authorId": - "98630872", "name": "S. Cooper"}]}, {"paperId": "9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", + 157, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "481-497", "volume": ""}, "authors": + [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", "externalIds": {"DBLP": "books/cu/D2014", "MAG": "577185743", "DOI": "10.1017/CBO9781107338579.001", - "CorpusId": 19315498}, "url": "https://www.semanticscholar.org/paper/9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", + "CorpusId": 19315498}, "corpusId": 19315498, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9cea15989cc2e0c86c8c8402412e0e9a3f4a55a1", "title": "Turing''s legacy: developments from Turing''s ideas in logic", "abstract": "Turing''s legacy: developments from Turing''s ideas in logic Rod Downey 1. Computability and analysis: the legacy of Alan Turing Jeremy Avigad and Vasco @@ -1607,13 +1839,16 @@ interactions: by recursive step: Church''s analysis of effective calculability Wilfried Sieg 13. Turing and the discovery of computability Robert Irving Soare 14. Transfinite machine models P. D. Welch.", "venue": "Turing''s Legacy", "year": - 2014, "referenceCount": 0, "citationCount": 74, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "vii-x"}, "authors": [{"authorId": - "2134049919", "name": "R. Downey"}]}, {"paperId": "b3b262de503bd160ffcfd33e180d4e56fb41e53b", - "externalIds": {"MAG": "2059483036", "DBLP": "conf/3dim/ShanACFS13", "DOI": - "10.1109/3DV.2013.12", "CorpusId": 1315955}, "url": "https://www.semanticscholar.org/paper/b3b262de503bd160ffcfd33e180d4e56fb41e53b", + 2014, "referenceCount": 0, "citationCount": 76, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "vii-x"}, "authors": [{"authorId": "2134049919", "name": "R. Downey"}]}, + {"paperId": "b3b262de503bd160ffcfd33e180d4e56fb41e53b", "externalIds": {"MAG": + "2059483036", "DBLP": "conf/3dim/ShanACFS13", "DOI": "10.1109/3DV.2013.12", + "CorpusId": 1315955}, "corpusId": 1315955, "publicationVenue": {"id": "4b02e809-1c26-4203-b9ba-311a418f664b", + "name": "International Conference on 3D Vision", "type": "conference", "alternate_names": + ["Int Conf 3D Vis", "3DV"]}, "url": "https://www.semanticscholar.org/paper/b3b262de503bd160ffcfd33e180d4e56fb41e53b", "title": "The Visual Turing Test for Scene Reconstruction", "abstract": "We present the first large scale system for capturing and rendering relight able scene reconstructions from massive unstructured photo collections taken under @@ -1626,16 +1861,23 @@ interactions: the observer has to guess which is which. While we cannot yet fool human perception, the gap is closing.", "venue": "International Conference on 3D Vision", "year": 2013, "referenceCount": 12, "citationCount": 102, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2013-06-01", "journal": {"name": "2013 - International Conference on 3D Vision", "pages": "25-32"}, "authors": [{"authorId": - "2141964", "name": "Qi Shan"}, {"authorId": "30658914", "name": "R. Adams"}, - {"authorId": "143800609", "name": "B. Curless"}, {"authorId": "1798912", "name": - "Yasutaka Furukawa"}, {"authorId": "1679223", "name": "S. Seitz"}]}, {"paperId": - "a12d167d42e7960f3fd7ecbf9600aa036cc73def", "externalIds": {"DBLP": "journals/jetai/WarwickS15", - "MAG": "2049800859", "DOI": "10.1080/0952813X.2014.921734", "CorpusId": 45773196}, + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-06-01", + "journal": {"name": "2013 International Conference on 3D Vision", "pages": + "25-32"}, "authors": [{"authorId": "2141964", "name": "Qi Shan"}, {"authorId": + "30658914", "name": "R. Adams"}, {"authorId": "143800609", "name": "B. Curless"}, + {"authorId": "1798912", "name": "Yasutaka Furukawa"}, {"authorId": "1679223", + "name": "S. Seitz"}]}, {"paperId": "a12d167d42e7960f3fd7ecbf9600aa036cc73def", + "externalIds": {"DBLP": "journals/jetai/WarwickS15", "MAG": "2049800859", + "DOI": "10.1080/0952813X.2014.921734", "CorpusId": 45773196}, "corpusId": + 45773196, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, "url": "https://www.semanticscholar.org/paper/a12d167d42e7960f3fd7ecbf9600aa036cc73def", "title": "Human misidentification in Turing tests", "abstract": "This paper presents some important issues on misidentification of human interlocutors @@ -1652,14 +1894,15 @@ interactions: that performs well on the Turing test.", "venue": "Journal of experimental and theoretical artificial intelligence (Print)", "year": 2015, "referenceCount": 38, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-04", "journal": - {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "123 - 135", "volume": "27"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": - "01dde81924fc37171a93e2f4115b7beec8f349d9", "externalIds": {"MAG": "2221398315", - "DOI": "10.1080/01445340.2015.1082050", "CorpusId": 61921161}, "url": "https://www.semanticscholar.org/paper/01dde81924fc37171a93e2f4115b7beec8f349d9", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-03-04", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "123 - 135", "volume": "27"}, "authors": [{"authorId": + "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma + Shah"}]}, {"paperId": "01dde81924fc37171a93e2f4115b7beec8f349d9", "externalIds": + {"MAG": "2221398315", "DOI": "10.1080/01445340.2015.1082050", "CorpusId": + 61921161}, "corpusId": 61921161, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/01dde81924fc37171a93e2f4115b7beec8f349d9", "title": "Towards a Historical Notion of \u2018Turing\u2014the Father of Computer Science\u2019", "abstract": "In the popular imagination, the relevance of Turing''s theoretical ideas to people producing actual machines was significant @@ -1689,24 +1932,34 @@ interactions: in Turing''s work and provided the original vector by which Turing became to be appreciated in retrospect as the father of computer science.", "venue": "", "year": 2015, "referenceCount": 128, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-07-03", "journal": {"name": "History and Philosophy of Logic", "pages": - "205 - 228", "volume": "36"}, "authors": [{"authorId": "1745926", "name": - "E. Daylight"}]}, {"paperId": "7224596e2cbafff3c027021fb19410a63f76487b", - "externalIds": {"MAG": "840746988", "DBLP": "conf/mpc/McBride15", "DOI": "10.1007/978-3-319-19797-5_13", - "CorpusId": 1010375}, "url": "https://www.semanticscholar.org/paper/7224596e2cbafff3c027021fb19410a63f76487b", + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://lirias.kuleuven.be/bitstream/123456789/626462/2/A.main.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-07-03", + "journal": {"name": "History and Philosophy of Logic", "pages": "205 - 228", + "volume": "36"}, "authors": [{"authorId": "1745926", "name": "E. Daylight"}]}, + {"paperId": "7224596e2cbafff3c027021fb19410a63f76487b", "externalIds": {"MAG": + "840746988", "DBLP": "conf/mpc/McBride15", "DOI": "10.1007/978-3-319-19797-5_13", + "CorpusId": 1010375}, "corpusId": 1010375, "publicationVenue": {"id": "5d23a701-baa7-4e77-ba87-db9d97e270f7", + "name": "International Conference on Mathematics of Program Construction", + "type": "conference", "alternate_names": ["Math Program Constr", "Int Conf + Math Program Constr", "MPC", "Mathematics of Program Construction"]}, "url": + "https://www.semanticscholar.org/paper/7224596e2cbafff3c027021fb19410a63f76487b", "title": "Turing-Completeness Totally Free", "abstract": null, "venue": "International Conference on Mathematics of Program Construction", "year": 2015, "referenceCount": 25, "citationCount": 38, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2015-06-29", "journal": {"pages": "257-275"}, "authors": [{"authorId": "144883222", - "name": "Conor McBride"}]}, {"paperId": "dda277ca05684e9a56bea891a9c1478e8e531918", + "openAccessPdf": {"url": "https://strathprints.strath.ac.uk/60166/1/McBride_LNCS2015_Turing_completeness_totally_free.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2015-06-29", "journal": {"pages": "257-275"}, "authors": + [{"authorId": "144883222", "name": "Conor McBride"}]}, {"paperId": "dda277ca05684e9a56bea891a9c1478e8e531918", "externalIds": {"MAG": "2081273570", "DOI": "10.1103/PHYSREVLETT.111.024103", - "CorpusId": 14238651, "PubMed": "23889406"}, "url": "https://www.semanticscholar.org/paper/dda277ca05684e9a56bea891a9c1478e8e531918", + "CorpusId": 14238651, "PubMed": "23889406"}, "corpusId": 14238651, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dda277ca05684e9a56bea891a9c1478e8e531918", "title": "Transition from amplitude to oscillation death via Turing bifurcation.", "abstract": "Coupled oscillators are shown to experience two structurally different oscillation quenching types: amplitude death (AD) and oscillation @@ -1717,16 +1970,16 @@ interactions: (OD) steady state, as well as their significance for physical and biological applications and control studies, are also pointed out.", "venue": "Physical Review Letters", "year": 2013, "referenceCount": 64, "citationCount": 104, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2013-07-10", "journal": {"name": "Physical review letters", "pages": "\n 024103\n ", - "volume": "111 2"}, "authors": [{"authorId": "2850131", "name": "A. Koseska"}, - {"authorId": "2046767", "name": "E. Volkov"}, {"authorId": "143842718", "name": - "J. Kurths"}]}, {"paperId": "a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", "externalIds": - {"MAG": "2074603814", "DOI": "10.1093/IMAMAT/HXR050", "CorpusId": 527810}, - "url": "https://www.semanticscholar.org/paper/a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-07-10", "journal": {"name": "Physical review letters", + "pages": "\n 024103\n ", "volume": "111 2"}, "authors": [{"authorId": + "2850131", "name": "A. Koseska"}, {"authorId": "2046767", "name": "E. Volkov"}, + {"authorId": "143842718", "name": "J. Kurths"}]}, {"paperId": "a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", + "externalIds": {"MAG": "2074603814", "DOI": "10.1093/IMAMAT/HXR050", "CorpusId": + 527810}, "corpusId": 527810, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a8bf4e9456443bc6b4e8cb28fc412e1f54617df0", "title": "Hopf bifurcation and Turing instability in the reaction\u2013diffusion Holling\u2013Tanner predator\u2013prey model", "abstract": "The reaction\u2013diffusion Holling\u2013Tanner predator\u2013prey model with Neumann boundary condition @@ -1738,31 +1991,38 @@ interactions: numerical simulations, we show the bistability of a stable equilibrium solution and a stable periodic solution for ordinary differential equation and the phenomenon that a periodic solution becomes Turing unstable for PDE.", "venue": - "", "year": 2013, "referenceCount": 24, "citationCount": 89, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-04-01", - "journal": {"name": "Ima Journal of Applied Mathematics", "pages": "287-306", - "volume": "78"}, "authors": [{"authorId": "2153897014", "name": "Xin Li"}, - {"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": "1728518", - "name": "Junping Shi"}]}, {"paperId": "bf4bf19f021c48910048741873627691d8277a61", + "", "year": 2013, "referenceCount": 24, "citationCount": 93, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-04-01", "journal": {"name": "Ima Journal of Applied Mathematics", "pages": + "287-306", "volume": "78"}, "authors": [{"authorId": "2153897014", "name": + "Xin Li"}, {"authorId": "144382267", "name": "Weihua Jiang"}, {"authorId": + "1728518", "name": "Junping Shi"}]}, {"paperId": "bf4bf19f021c48910048741873627691d8277a61", "externalIds": {"MAG": "101492982", "DBLP": "series/sci/Yampolskiy13", "DOI": - "10.1007/978-3-642-29694-9_1", "CorpusId": 7880844}, "url": "https://www.semanticscholar.org/paper/bf4bf19f021c48910048741873627691d8277a61", + "10.1007/978-3-642-29694-9_1", "CorpusId": 7880844}, "corpusId": 7880844, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf4bf19f021c48910048741873627691d8277a61", "title": "Turing Test as a Defining Feature of AI-Completeness", "abstract": null, "venue": "Artificial Intelligence, Evolutionary Computing and Metaheuristics", "year": 2013, "referenceCount": 77, "citationCount": 80, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://cecs.louisville.edu/ry/TuringTestasaDefiningFeature04270003.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"pages": "3-17"}, "authors": [{"authorId": "1976753", "name": "Roman V Yampolskiy"}]}, {"paperId": "710daed4f84e16e16a3a336e734a21f6a5e1f7d5", "externalIds": {"PubMedCentral": "3303118", "MAG": "2039888453", "DOI": "10.1038/ng.1090", - "CorpusId": 4649834, "PubMed": "22344222"}, "url": "https://www.semanticscholar.org/paper/710daed4f84e16e16a3a336e734a21f6a5e1f7d5", + "CorpusId": 4649834, "PubMed": "22344222"}, "corpusId": 4649834, "publicationVenue": + {"id": "bb27e645-e57c-42c3-bcbc-c7b443c58209", "name": "Nature Genetics", + "type": "journal", "alternate_names": ["Nat Genet"], "issn": "1061-4036", + "url": "http://www.nature.com/ng/", "alternate_urls": ["http://www.nature.com/ng/index.html"]}, + "url": "https://www.semanticscholar.org/paper/710daed4f84e16e16a3a336e734a21f6a5e1f7d5", "title": "Periodic stripe formation by a Turing-mechanism operating at growth zones in the mammalian palate", "abstract": null, "venue": "Nature Genetics", - "year": 2012, "referenceCount": 38, "citationCount": 220, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + "year": 2012, "referenceCount": 38, "citationCount": 222, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc3303118?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-09", "journal": {"name": "Nature @@ -1772,9 +2032,43 @@ interactions: "name": "P. Sharpe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}, {"authorId": "145155351", "name": "M. A. Basson"}, {"authorId": "1398203964", "name": "A. Gritli-Linde"}, {"authorId": "3748305", "name": "M. Cobourne"}, {"authorId": - "2113478488", "name": "Jeremy B. A. Green"}]}, {"paperId": "4368e42c838d031625def660ed724455a393883f", - "externalIds": {"MAG": "2001888401", "DOI": "10.1103/PHYSREVE.90.052908", - "CorpusId": 37161709, "PubMed": "25493859"}, "url": "https://www.semanticscholar.org/paper/4368e42c838d031625def660ed724455a393883f", + "2113478488", "name": "Jeremy B. A. Green"}]}, {"paperId": "25b65ca65ce0499855df6be6ab1a6575ad60f10a", + "externalIds": {"MAG": "2168169421", "ArXiv": "1310.6571", "DOI": "10.1103/PhysRevE.88.042925", + "CorpusId": 715587, "PubMed": "24229267"}, "corpusId": 715587, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/25b65ca65ce0499855df6be6ab1a6575ad60f10a", + "title": "Turing pattern formation in the Brusselator system with nonlinear + diffusion.", "abstract": "In this work we investigate the effect of density-dependent + nonlinear diffusion on pattern formation in the Brusselator system. Through + linear stability analysis of the basic solution we determine the Turing and + the oscillatory instability boundaries. A comparison with the classical linear + diffusion shows how nonlinear diffusion favors the occurrence of Turing pattern + formation. We study the process of pattern formation both in one-dimensional + and two-dimensional spatial domains. Through a weakly nonlinear multiple scales + analysis we derive the equations for the amplitude of the stationary patterns. + The analysis of the amplitude equations shows the occurrence of a number of + different phenomena, including stable supercritical and subcritical Turing + patterns with multiple branches of stable solutions leading to hysteresis. + Moreover, we consider traveling patterning waves: When the domain size is + large, the pattern forms sequentially and traveling wave fronts are the precursors + to patterning. We derive the Ginzburg-Landau equation and describe the traveling + front enveloping a pattern which invades the domain. We show the emergence + of radially symmetric target patterns, and, through a matching procedure, + we construct the outer amplitude equation and the inner core solution.", "venue": + "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": + 2013, "referenceCount": 69, "citationCount": 79, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1310.6571", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2013-10-01", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042925\n ", + "volume": "88 4"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, + {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": + "M. Sammartino"}, {"authorId": "6832964", "name": "V. Sciacca"}]}, {"paperId": + "4368e42c838d031625def660ed724455a393883f", "externalIds": {"MAG": "2001888401", + "DOI": "10.1103/PHYSREVE.90.052908", "CorpusId": 37161709, "PubMed": "25493859"}, + "corpusId": 37161709, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4368e42c838d031625def660ed724455a393883f", "title": "Delay-induced Turing instability in reaction-diffusion equations.", "abstract": "Time delays have been commonly used in modeling biological systems and can significantly change the dynamics of these systems. Quite a few works @@ -1791,16 +2085,21 @@ interactions: that the critical delay is a decreasing function of the ratio of carrying capacity to half saturation of the prey density.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": - 8, "citationCount": 59, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-11-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 052908\n ", + 8, "citationCount": 63, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://researchbank.swinburne.edu.au/file/f8bb9895-ebea-4537-9dac-ab6a888c67fc/1/PDF + (Published version).pdf", "status": "GREEN"}, "fieldsOfStudy": ["Medicine", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-11-01", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 052908\n ", "volume": "90 5-1"}, "authors": [{"authorId": "1742870", "name": "Tonghua Zhang"}, {"authorId": "144921840", "name": "Hong Zang"}]}, {"paperId": "2be24c021f2548c7d4da649748aa1f53ba035732", "externalIds": {"MAG": "2161045785", "DOI": "10.1098/rsfs.2011.0113", "CorpusId": - 18186798, "PubMed": "23919129"}, "url": "https://www.semanticscholar.org/paper/2be24c021f2548c7d4da649748aa1f53ba035732", + 18186798, "PubMed": "23919129"}, "corpusId": 18186798, "publicationVenue": + {"id": "692a1437-389a-429a-b9b0-7a8182722f06", "name": "Interface Focus", + "type": "journal", "issn": "2042-8898", "url": "http://rsfs.royalsocietypublishing.org/"}, + "url": "https://www.semanticscholar.org/paper/2be24c021f2548c7d4da649748aa1f53ba035732", "title": "Turing''s model for biological pattern formation and the robustness problem", "abstract": "One of the fundamental questions in developmental biology is how the vast range of pattern and structure we observe in nature emerges @@ -1815,18 +2114,23 @@ interactions: basic properties of Turing''s theory, we highlight the successes and pitfalls of using it as a model for biological systems, and discuss emerging developments in the area.", "venue": "Interface Focus", "year": 2012, "referenceCount": - 50, "citationCount": 196, "influentialCitationCount": 7, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2012-08-06", "journal": - {"name": "Interface Focus", "pages": "487 - 496", "volume": "2"}, "authors": - [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "6566804", "name": - "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": + 50, "citationCount": 201, "influentialCitationCount": 7, "isOpenAccess": true, + "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsfs.2011.0113", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2012-08-06", + "journal": {"name": "Interface Focus", "pages": "487 - 496", "volume": "2"}, + "authors": [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "6566804", + "name": "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "37236426", "name": "S. S. Lee"}]}, {"paperId": "79c13947d11cc1bb4461dea03a8c084333f255cc", "externalIds": {"MAG": "2149257324", "DBLP": "journals/ijns/CabessaS14", "DOI": "10.1142/S0129065714500294", - "CorpusId": 13188177, "PubMed": "25354762"}, "url": "https://www.semanticscholar.org/paper/79c13947d11cc1bb4461dea03a8c084333f255cc", + "CorpusId": 13188177, "PubMed": "25354762"}, "corpusId": 13188177, "publicationVenue": + {"id": "a042b147-151c-4d51-97c7-40b8434b377a", "name": "International Journal + of Neural Systems", "type": "journal", "alternate_names": ["Int J Neural Syst"], + "issn": "0129-0657", "url": "http://www.worldscinet.com/ijns", "alternate_urls": + ["http://www.worldscinet.com/ijns/ijns.shtml"]}, "url": "https://www.semanticscholar.org/paper/79c13947d11cc1bb4461dea03a8c084333f255cc", "title": "The Super-Turing Computational Power of plastic Recurrent Neural Networks", "abstract": "We study the computational capabilities of a biologically inspired neural model where the synaptic weights, the connectivity pattern, @@ -1849,26 +2153,42 @@ interactions: suitable way the capabilities of brain-like models of computation.", "venue": "International Journal of Neural Systems", "year": 2014, "referenceCount": 67, "citationCount": 54, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-11-20", "journal": - {"name": "International journal of neural systems", "pages": "\n 1450029\n ", - "volume": "24 8"}, "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie - Cabessa"}, {"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": - "25c161313411aea736e72cebd626b41ed8fcef82", "externalIds": {"PubMedCentral": - "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", "CorpusId": 1789930, - "PubMed": "24145394"}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-11-20", "journal": {"name": "International journal of neural systems", + "pages": "\n 1450029\n ", "volume": "24 8"}, "authors": [{"authorId": + "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "2797623", "name": + "H. Siegelmann"}]}, {"paperId": "0e410c91207e835c9cad7618491291e3935e7b91", + "externalIds": {"MAG": "2014564062", "DOI": "10.1007/S11071-013-1114-2", "CorpusId": + 122082126}, "corpusId": 122082126, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e410c91207e835c9cad7618491291e3935e7b91", + "title": "Turing instability and pattern formation of neural networks with + reaction\u2013diffusion terms", "abstract": null, "venue": "", "year": 2014, + "referenceCount": 29, "citationCount": 46, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2014-04-01", "journal": {"name": "Nonlinear Dynamics", "pages": "115-124", + "volume": "76"}, "authors": [{"authorId": "3343834", "name": "Hongyong Zhao"}, + {"authorId": "2048884404", "name": "Xuanxuan Huang"}, {"authorId": "2108177604", + "name": "Xuebing Zhang"}]}, {"paperId": "25c161313411aea736e72cebd626b41ed8fcef82", + "externalIds": {"PubMedCentral": "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", + "CorpusId": 1789930, "PubMed": "24145394"}, "corpusId": 1789930, "publicationVenue": + {"id": "bc96f9bd-89da-4c9a-ab24-27749617f6ff", "name": "Conference on Lasers + and Electro-Optics", "type": "conference", "alternate_names": ["CLEO", "Conf + Laser Electro-optics"]}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", "title": "Formation and control of Turing patterns in a coherent quantum fluid", "abstract": null, "venue": "Conference on Lasers and Electro-Optics", "year": - 2013, "referenceCount": 67, "citationCount": 45, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2013-10-22", "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": - [{"authorId": "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", - "name": "P. Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": + 2013, "referenceCount": 67, "citationCount": 46, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03016.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-10-22", + "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": [{"authorId": + "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", "name": "P. + Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": "93534597", "name": "Y. Tse"}, {"authorId": "118567298", "name": "N. Kwong"}, {"authorId": "34750791", "name": "A. L\u00fccke"}, {"authorId": "5207467", "name": "M. Abbarchi"}, {"authorId": "5012276", "name": "E. Baudin"}, {"authorId": @@ -1877,34 +2197,9 @@ interactions: "102296643", "name": "P. Leung"}, {"authorId": "5362311", "name": "P. Roussignol"}, {"authorId": "2829334", "name": "R. Binder"}, {"authorId": "35055521", "name": "J. Tignon"}, {"authorId": "49371199", "name": "S. Schumacher"}]}, {"paperId": - "4901daf067430f3dca14ab32f348c86915021d16", "externalIds": {"MAG": "2130797746", - "DOI": "10.1017/S0956792514000370", "CorpusId": 122542423}, "url": "https://www.semanticscholar.org/paper/4901daf067430f3dca14ab32f348c86915021d16", - "title": "Spatio-temporal organization in a morphochemical electrodeposition - model: Hopf and Turing instabilities and their interplay", "abstract": "In - this paper, we investigate from a theoretical point of view the 2D reaction-diffusion - system for electrodeposition coupling morphology and surface chemistry, presented - and experimentally validated in Bozzini et al. (2013J. Solid State Electr.17, - 467\u2013479). We analyse the mechanisms responsible for spatio-temporal organization. - As a first step, spatially uniform dynamics is discussed and the occurrence - of a supercritical Hopf bifurcation for the local kinetics is proved. In the - spatial case, initiation of morphological patterns induced by diffusion is - shown to occur in a suitable region of the parameter space. The intriguing - interplay between Hopf and Turing instability is also considered, by investigating - the spatio-temporal behaviour of the system in the neighbourhood of the codimension-two - Turing--Hopf bifurcation point. An ADI (Alternating Direction Implicit) scheme - based on high-order finite differences in space is applied to obtain numerical - approximations of Turing patterns at the steady state and for the simulation - of the oscillating Turing\u2013Hopf dynamics.", "venue": "European journal - of applied mathematics", "year": 2014, "referenceCount": 80, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2014-12-22", "journal": {"name": "European Journal - of Applied Mathematics", "pages": "143 - 173", "volume": "26"}, "authors": - [{"authorId": "2663085", "name": "D. Lacitignola"}, {"authorId": "2081619", - "name": "B. Bozzini"}, {"authorId": "1914459", "name": "I. Sgura"}]}, {"paperId": "0bbcd935186d5173766256de636b02974dcd7808", "externalIds": {"MAG": "564330425", - "DOI": "10.2307/j.ctvc77913", "CorpusId": 132210151}, "url": "https://www.semanticscholar.org/paper/0bbcd935186d5173766256de636b02974dcd7808", + "DOI": "10.2307/j.ctvc77913", "CorpusId": 132210151}, "corpusId": 132210151, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0bbcd935186d5173766256de636b02974dcd7808", "title": "Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition", "abstract": "Alan Turing died in 1954, but the themes of his life epitomize the turn of the millennium. A pure mathematician from @@ -1931,70 +2226,63 @@ interactions: admits what all biographers know, but few admit, about their subjects: \"his inner code remains unbroken.\" Alan Turing is still an enigma. --Mary Ellen Curtin", "venue": "", "year": 2014, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2014-11-10", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "25b65ca65ce0499855df6be6ab1a6575ad60f10a", - "externalIds": {"MAG": "2168169421", "ArXiv": "1310.6571", "DOI": "10.1103/PhysRevE.88.042925", - "CorpusId": 715587, "PubMed": "24229267"}, "url": "https://www.semanticscholar.org/paper/25b65ca65ce0499855df6be6ab1a6575ad60f10a", - "title": "Turing pattern formation in the Brusselator system with nonlinear - diffusion.", "abstract": "In this work we investigate the effect of density-dependent - nonlinear diffusion on pattern formation in the Brusselator system. Through - linear stability analysis of the basic solution we determine the Turing and - the oscillatory instability boundaries. A comparison with the classical linear - diffusion shows how nonlinear diffusion favors the occurrence of Turing pattern - formation. We study the process of pattern formation both in one-dimensional - and two-dimensional spatial domains. Through a weakly nonlinear multiple scales - analysis we derive the equations for the amplitude of the stationary patterns. - The analysis of the amplitude equations shows the occurrence of a number of - different phenomena, including stable supercritical and subcritical Turing - patterns with multiple branches of stable solutions leading to hysteresis. - Moreover, we consider traveling patterning waves: When the domain size is - large, the pattern forms sequentially and traveling wave fronts are the precursors - to patterning. We derive the Ginzburg-Landau equation and describe the traveling - front enveloping a pattern which invades the domain. We show the emergence - of radially symmetric target patterns, and, through a matching procedure, - we construct the outer amplitude equation and the inner core solution.", "venue": - "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2013, "referenceCount": 69, "citationCount": 69, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-10-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042925\n ", - "volume": "88 4"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, - {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": - "M. Sammartino"}, {"authorId": "6832964", "name": "V. Sciacca"}]}, {"paperId": - "0e410c91207e835c9cad7618491291e3935e7b91", "externalIds": {"MAG": "2014564062", - "DOI": "10.1007/S11071-013-1114-2", "CorpusId": 122082126}, "url": "https://www.semanticscholar.org/paper/0e410c91207e835c9cad7618491291e3935e7b91", - "title": "Turing instability and pattern formation of neural networks with - reaction\u2013diffusion terms", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 29, "citationCount": 38, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-04-01", - "journal": {"name": "Nonlinear Dynamics", "pages": "115-124", "volume": "76"}, - "authors": [{"authorId": "3343834", "name": "Hongyong Zhao"}, {"authorId": - "2048884404", "name": "Xuanxuan Huang"}, {"authorId": "2108177604", "name": - "Xuebing Zhang"}]}, {"paperId": "e007587c6904551c28d8590c0bbe871978ed1fc3", - "externalIds": {"ArXiv": "1403.0351", "MAG": "1865693766", "DOI": "10.1007/s10440-014-9903-2", - "CorpusId": 119094472}, "url": "https://www.semanticscholar.org/paper/e007587c6904551c28d8590c0bbe871978ed1fc3", + 42, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2014-11-10", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "e007587c6904551c28d8590c0bbe871978ed1fc3", "externalIds": {"ArXiv": "1403.0351", + "MAG": "1865693766", "DOI": "10.1007/s10440-014-9903-2", "CorpusId": 119094472}, + "corpusId": 119094472, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e007587c6904551c28d8590c0bbe871978ed1fc3", "title": "Turing Instability and Pattern Formation for the Lengyel\u2013Epstein System with Nonlinear Diffusion", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 38, "citationCount": 36, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": + "referenceCount": 38, "citationCount": 42, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1403.0351", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-03-03", "journal": {"name": "Acta Applicandae Mathematicae", "pages": "283-294", "volume": "132"}, "authors": [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, - {"paperId": "6525b2627f3f304e785dd299c7fa28dbceba52a6", "externalIds": {"ArXiv": - "1206.3431", "MAG": "1827134935", "DBLP": "books/cu/p/AvigadB14", "DOI": "10.1017/CBO9781107338579.002", - "CorpusId": 4495614}, "url": "https://www.semanticscholar.org/paper/6525b2627f3f304e785dd299c7fa28dbceba52a6", + {"paperId": "4901daf067430f3dca14ab32f348c86915021d16", "externalIds": {"MAG": + "2130797746", "DOI": "10.1017/S0956792514000370", "CorpusId": 122542423}, + "corpusId": 122542423, "publicationVenue": {"id": "04d04afc-8e5c-4c06-98fc-64bd52fa7c8b", + "name": "European journal of applied mathematics", "type": "journal", "alternate_names": + ["Eur J Appl Math", "European Journal of Applied Mathematics", "Eur j appl + math"], "issn": "0956-7925", "url": "https://www.cambridge.org/core/journals/european-journal-of-applied-mathematics", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=EJM"]}, + "url": "https://www.semanticscholar.org/paper/4901daf067430f3dca14ab32f348c86915021d16", + "title": "Spatio-temporal organization in a morphochemical electrodeposition + model: Hopf and Turing instabilities and their interplay", "abstract": "In + this paper, we investigate from a theoretical point of view the 2D reaction-diffusion + system for electrodeposition coupling morphology and surface chemistry, presented + and experimentally validated in Bozzini et al. (2013J. Solid State Electr.17, + 467\u2013479). We analyse the mechanisms responsible for spatio-temporal organization. + As a first step, spatially uniform dynamics is discussed and the occurrence + of a supercritical Hopf bifurcation for the local kinetics is proved. In the + spatial case, initiation of morphological patterns induced by diffusion is + shown to occur in a suitable region of the parameter space. The intriguing + interplay between Hopf and Turing instability is also considered, by investigating + the spatio-temporal behaviour of the system in the neighbourhood of the codimension-two + Turing--Hopf bifurcation point. An ADI (Alternating Direction Implicit) scheme + based on high-order finite differences in space is applied to obtain numerical + approximations of Turing patterns at the steady state and for the simulation + of the oscillating Turing\u2013Hopf dynamics.", "venue": "European journal + of applied mathematics", "year": 2014, "referenceCount": 80, "citationCount": + 43, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E44F32B9BF463A0C4E752D57B846AF4D/S0956792514000370a.pdf/div-class-title-spatio-temporal-organization-in-a-morphochemical-electrodeposition-model-hopf-and-turing-instabilities-and-their-interplay-div.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-12-22", + "journal": {"name": "European Journal of Applied Mathematics", "pages": "143 + - 173", "volume": "26"}, "authors": [{"authorId": "2663085", "name": "D. Lacitignola"}, + {"authorId": "2081619", "name": "B. Bozzini"}, {"authorId": "1914459", "name": + "I. Sgura"}]}, {"paperId": "6525b2627f3f304e785dd299c7fa28dbceba52a6", "externalIds": + {"ArXiv": "1206.3431", "MAG": "1827134935", "DBLP": "books/cu/p/AvigadB14", + "DOI": "10.1017/CBO9781107338579.002", "CorpusId": 4495614}, "corpusId": 4495614, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6525b2627f3f304e785dd299c7fa28dbceba52a6", "title": "Computability and analysis: the legacy of Alan Turing", "abstract": "For most of its history, mathematics was algorithmic in nature. The geometric claims in Euclid\u2019s Elements fall into two distinct categories: \u201cproblems,\u201d @@ -2016,8 +2304,9 @@ interactions: de Fermat in 1654 and developed further by Christian Huygens and Jakob Bernoulli, provided methods for calculating odds related to games of chance. Abraham de Moivre\u2019s 1718 monograph on the subject was", "venue": "Turing''s Legacy", - "year": 2012, "referenceCount": 258, "citationCount": 75, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "year": 2012, "referenceCount": 258, "citationCount": 76, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1206.3431", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -2025,21 +2314,30 @@ interactions: "name": "J. Avigad"}, {"authorId": "1805099", "name": "V. Brattka"}]}, {"paperId": "4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", "externalIds": {"PubMedCentral": "3882759", "MAG": "2950247578", "ArXiv": "1310.6738", "DOI": "10.1038/srep03585", - "CorpusId": 11517888, "PubMed": "24394959"}, "url": "https://www.semanticscholar.org/paper/4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", + "CorpusId": 11517888, "PubMed": "24394959"}, "corpusId": 11517888, "publicationVenue": + {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", "name": "Scientific Reports", + "type": "journal", "alternate_names": ["Sci Rep"], "issn": "2045-2322", "url": + "http://www.nature.com/srep/", "alternate_urls": ["http://www.nature.com/srep/index.html"]}, + "url": "https://www.semanticscholar.org/paper/4e3ba3feedf5f6e29460ebed0b0f08df19156bd7", "title": "Dispersal-induced destabilization of metapopulations and oscillatory Turing patterns in ecological networks", "abstract": null, "venue": "Scientific Reports", "year": 2013, "referenceCount": 59, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science", - "Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-10-24", "journal": {"name": "Scientific - Reports", "volume": "4"}, "authors": [{"authorId": "6061448", "name": "S. - Hata"}, {"authorId": "3259202", "name": "H. Nakao"}, {"authorId": "2490613", - "name": "A. Mikhailov"}]}, {"paperId": "1518e7c855f47ed9fefde59dd8104c8bc3f10604", - "externalIds": {"ArXiv": "1305.6262", "MAG": "2020305723", "DOI": "10.1088/1478-3975/10/4/046003", - "CorpusId": 3130652, "PubMed": "23770927"}, "url": "https://www.semanticscholar.org/paper/1518e7c855f47ed9fefde59dd8104c8bc3f10604", + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03585.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Physics", "Computer Science", "Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-10-24", "journal": {"name": "Scientific Reports", + "volume": "4"}, "authors": [{"authorId": "6061448", "name": "S. Hata"}, {"authorId": + "3259202", "name": "H. Nakao"}, {"authorId": "2490613", "name": "A. Mikhailov"}]}, + {"paperId": "1518e7c855f47ed9fefde59dd8104c8bc3f10604", "externalIds": {"ArXiv": + "1305.6262", "MAG": "2020305723", "DOI": "10.1088/1478-3975/10/4/046003", + "CorpusId": 3130652, "PubMed": "23770927"}, "corpusId": 3130652, "publicationVenue": + {"id": "dbc23552-b067-4548-b1b7-e6ce9f0ebcbe", "name": "Physical Biology", + "type": "journal", "alternate_names": ["Phys Biology"], "issn": "1478-3967", + "url": "http://iopscience.iop.org/1478-3975/", "alternate_urls": ["https://iopscience.iop.org/journal/1478-3975", + "http://iopscience.org/pb"]}, "url": "https://www.semanticscholar.org/paper/1518e7c855f47ed9fefde59dd8104c8bc3f10604", "title": "Kidney branching morphogenesis under the control of a ligand\u2013receptor-based Turing mechanism", "abstract": "The main signalling proteins that control early kidney branching have been defined. Yet the underlying mechanism is @@ -2060,33 +2358,53 @@ interactions: are met also by other receptor\u2013ligand systems. We propose that ligand\u2013receptor-based Turing patterns represent a general mechanism to control branching morphogenesis and other developmental processes.", "venue": "Physical Biology", "year": - 2013, "referenceCount": 81, "citationCount": 59, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], - "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 2013, "referenceCount": 81, "citationCount": 60, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1305.6262", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-05-27", "journal": {"name": "Physical Biology", "volume": "10"}, "authors": [{"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", "name": "D. Iber"}]}, {"paperId": "647746026ab21765a506f406072bd7359211cd24", "externalIds": {"MAG": "2045982128", "DBLP": "conf/lics/BojanczykKLT13", "DOI": - "10.1109/LICS.2013.24", "CorpusId": 2163160}, "url": "https://www.semanticscholar.org/paper/647746026ab21765a506f406072bd7359211cd24", + "10.1109/LICS.2013.24", "CorpusId": 2163160}, "corpusId": 2163160, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/647746026ab21765a506f406072bd7359211cd24", "title": "Turing Machines with Atoms", "abstract": "We study Turing machines over sets with atoms, also known as nominal sets. Our main result is that deterministic machines are weaker than nondeterministic ones; in particular, P\u2260NP in sets with atoms. Our main construction is closely related to the Cai-Furer-Immerman graphs used in descriptive complexity theory.", "venue": "2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science", "year": - 2013, "referenceCount": 15, "citationCount": 52, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-06-25", "journal": {"name": "2013 28th Annual ACM/IEEE - Symposium on Logic in Computer Science", "pages": "183-192"}, "authors": [{"authorId": - "1706643", "name": "M. Bojanczyk"}, {"authorId": "35244823", "name": "Bartek - Klin"}, {"authorId": "2447489", "name": "S. Lasota"}, {"authorId": "2964062", - "name": "Szymon Toru\u0144czyk"}]}, {"paperId": "d1f47aad6d196823abebc2b5d5a85b6dcada3707", + 2013, "referenceCount": 15, "citationCount": 53, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-06-25", "journal": + {"name": "2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science", + "pages": "183-192"}, "authors": [{"authorId": "1706643", "name": "M. Bojanczyk"}, + {"authorId": "35244823", "name": "Bartek Klin"}, {"authorId": "2447489", "name": + "S. Lasota"}, {"authorId": "2964062", "name": "Szymon Toru\u0144czyk"}]}, + {"paperId": "417cd61563f870cb19541f4afc639a85ec1c6628", "externalIds": {"MAG": + "2337525307", "ArXiv": "1209.2772", "DOI": "10.1007/s11538-013-9834-5", "CorpusId": + 16968855, "PubMed": "23546926"}, "corpusId": 16968855, "publicationVenue": + {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/417cd61563f870cb19541f4afc639a85ec1c6628", + "title": "Turing Patterns from Dynamics of Early HIV Infection", "abstract": + null, "venue": "Bulletin of Mathematical Biology", "year": 2012, "referenceCount": + 41, "citationCount": 55, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1209.2772", "status": "GREEN"}, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-09-13", "journal": {"name": "Bulletin of Mathematical + Biology", "pages": "774-795", "volume": "75"}, "authors": [{"authorId": "4874286", + "name": "O. Stancevic"}, {"authorId": "2813671", "name": "C. Angstmann"}, + {"authorId": "47465046", "name": "J. M. Murray"}, {"authorId": "39683695", + "name": "B. Henry"}]}, {"paperId": "d1f47aad6d196823abebc2b5d5a85b6dcada3707", "externalIds": {"MAG": "609368779", "DOI": "10.5860/choice.51-2125", "CorpusId": - 44009886}, "url": "https://www.semanticscholar.org/paper/d1f47aad6d196823abebc2b5d5a85b6dcada3707", + 44009886}, "corpusId": 44009886, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d1f47aad6d196823abebc2b5d5a85b6dcada3707", "title": "Alan Turing: His Work and Impact", "abstract": "\"The fact remains that everyone who taps at a keyboard, opening a spreadsheet or a word-processing program, is working on an incarnation of a Turing machine.\"-TIME In this @@ -2107,27 +2425,19 @@ interactions: most significant papers by A.M. Turing.Commentary explaining the significance of each seminal paper by preeminent leaders in the field. Additional resources available online.", "venue": "", "year": 2013, "referenceCount": 0, "citationCount": - 51, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-05-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, - {"authorId": "143817739", "name": "J. V. Leeuwen"}]}, {"paperId": "417cd61563f870cb19541f4afc639a85ec1c6628", - "externalIds": {"MAG": "2337525307", "ArXiv": "1209.2772", "DOI": "10.1007/s11538-013-9834-5", - "CorpusId": 16968855, "PubMed": "23546926"}, "url": "https://www.semanticscholar.org/paper/417cd61563f870cb19541f4afc639a85ec1c6628", - "title": "Turing Patterns from Dynamics of Early HIV Infection", "abstract": - null, "venue": "Bulletin of Mathematical Biology", "year": 2012, "referenceCount": - 41, "citationCount": 53, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-09-13", "journal": {"name": "Bulletin of Mathematical - Biology", "pages": "774-795", "volume": "75"}, "authors": [{"authorId": "4874286", - "name": "O. Stancevic"}, {"authorId": "2813671", "name": "C. Angstmann"}, - {"authorId": "47465046", "name": "J. M. Murray"}, {"authorId": "39683695", - "name": "B. Henry"}]}, {"paperId": "3bd7858df71adb919d1d4b137cf1c78134d7f33e", - "externalIds": {"DBLP": "journals/aicom/Muggleton14", "MAG": "1589462974", - "DOI": "10.3233/AIC-130579", "CorpusId": 14046484}, "url": "https://www.semanticscholar.org/paper/3bd7858df71adb919d1d4b137cf1c78134d7f33e", + 52, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-05-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "98630872", + "name": "S. Cooper"}, {"authorId": "143817739", "name": "J. V. Leeuwen"}]}, + {"paperId": "3bd7858df71adb919d1d4b137cf1c78134d7f33e", "externalIds": {"DBLP": + "journals/aicom/Muggleton14", "MAG": "1589462974", "DOI": "10.3233/AIC-130579", + "CorpusId": 14046484}, "corpusId": 14046484, "publicationVenue": {"id": "4c57b6f2-ebab-420d-baf9-cd595e2f2a63", + "name": "AI Communications", "type": "journal", "alternate_names": ["Ai Communications", + "AI Commun", "Ai Commun"], "issn": "0921-7126", "url": "http://content.iospress.com/journals/ai-communications", + "alternate_urls": ["https://www.iospress.nl/html/09217126.php", "https://www.iospress.nl/journal/ai-communications/"]}, + "url": "https://www.semanticscholar.org/paper/3bd7858df71adb919d1d4b137cf1c78134d7f33e", "title": "Alan Turing and the development of Artificial Intelligence", "abstract": "During the centennial year of his birth Alan Turing 1912--1954 has been widely celebrated as having laid the foundations for Computer Science, Automated @@ -2148,46 +2458,15 @@ interactions: within AI, and conclude with a discussion of some of the unresolved challenges he posed within the paper.", "venue": "AI Communications", "year": 2014, "referenceCount": 72, "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "AI Commun.", "pages": "3-10", "volume": "27"}, - "authors": [{"authorId": "145147566", "name": "S. Muggleton"}]}, {"paperId": - "7d4518f7ba6528967244114a5daaed2884b9b86c", "externalIds": {"DBLP": "phd/ethos/Rendell14", - "MAG": "89603295", "DOI": "10.1007/978-3-319-19842-2", "CorpusId": 33250805}, - "url": "https://www.semanticscholar.org/paper/7d4518f7ba6528967244114a5daaed2884b9b86c", - "title": "Turing machine universality of the game of life", "abstract": null, - "venue": "", "year": 2015, "referenceCount": 29, "citationCount": 31, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-07-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "6089b4474ed94a06aba42974fade7009bc77ee4e", - "externalIds": {"MAG": "2159039200", "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", - "CorpusId": 18322775}, "url": "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", - "title": "On Turing dynamical systems and the Atiyah problem", "abstract": - null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", - "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz - Grabowski"}]}, {"paperId": "4692459f05bd9ad5cd672327f23884ad46237fc2", "externalIds": - {"MAG": "50191166", "DBLP": "conf/itp/XuZU13", "DOI": "10.1007/978-3-642-39634-2_13", - "CorpusId": 18610926}, "url": "https://www.semanticscholar.org/paper/4692459f05bd9ad5cd672327f23884ad46237fc2", - "title": "Mechanising Turing Machines and Computability Theory in Isabelle/HOL", - "abstract": null, "venue": "International Conference on Interactive Theorem - Proving", "year": 2013, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "openAccessPdf": {"url": "http://www.doc.ic.ac.uk/~shm/Papers/TuringAI_1.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-07-22", "journal": {"pages": "147-162"}, "authors": - [{"authorId": "2110979820", "name": "Jian Xu"}, {"authorId": "2153647569", - "name": "Xingyuan Zhang"}, {"authorId": "144231186", "name": "Christian Urban"}]}, + "publicationDate": null, "journal": {"name": "AI Commun.", "pages": "3-10", + "volume": "27"}, "authors": [{"authorId": "145147566", "name": "S. Muggleton"}]}, {"paperId": "d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "externalIds": {"MAG": "2016568588", "DOI": "10.1103/PHYSREVE.90.062915", "CorpusId": 42727592, "PubMed": - "25615172"}, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", + "25615172"}, "corpusId": 42727592, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "title": "Turing pattern dynamics in an activator-inhibitor system with superdiffusion.", "abstract": "The fractional operator is introduced to an activator-inhibitor system to describe species anomalous superdiffusion. The effects of the superdiffusive @@ -2207,17 +2486,71 @@ interactions: exponent between the inhibitor and activator is more likely to promote the emergence of the Turing pattern, relative to the normal diffusion.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2014, "referenceCount": 47, "citationCount": 31, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + 2014, "referenceCount": 47, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-12-19", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 062915\n ", "volume": + "90 6"}, "authors": [{"authorId": "2037744526", "name": "Lai Zhang"}, {"authorId": + "1990780", "name": "Canrong Tian"}]}, {"paperId": "7d4518f7ba6528967244114a5daaed2884b9b86c", + "externalIds": {"DBLP": "phd/ethos/Rendell14", "MAG": "89603295", "DOI": "10.1007/978-3-319-19842-2", + "CorpusId": 33250805}, "corpusId": 33250805, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7d4518f7ba6528967244114a5daaed2884b9b86c", + "title": "Turing machine universality of the game of life", "abstract": null, + "venue": "", "year": 2015, "referenceCount": 29, "citationCount": 31, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://uwe-repository.worktribe.com/preview/822581/thesis.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-07-21", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "6089b4474ed94a06aba42974fade7009bc77ee4e", + "externalIds": {"MAG": "2159039200", "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", + "CorpusId": 18322775}, "corpusId": 18322775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", + "title": "On Turing dynamical systems and the Atiyah problem", "abstract": + null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, + "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1004.2030", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", + "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz + Grabowski"}]}, {"paperId": "4692459f05bd9ad5cd672327f23884ad46237fc2", "externalIds": + {"MAG": "50191166", "DBLP": "conf/itp/XuZU13", "DOI": "10.1007/978-3-642-39634-2_13", + "CorpusId": 18610926}, "corpusId": 18610926, "publicationVenue": {"id": "1b356608-ca93-40d2-8553-8925a463dab9", + "name": "International Conference on Interactive Theorem Proving", "type": + "conference", "alternate_names": ["Interactive Theorem Proving", "Interact + Theorem Proving", "Int Conf Interact Theorem Proving", "ITP"], "url": "https://en.wikipedia.org/wiki/Interactive_Theorem_Proving_(conference)"}, + "url": "https://www.semanticscholar.org/paper/4692459f05bd9ad5cd672327f23884ad46237fc2", + "title": "Mechanising Turing Machines and Computability Theory in Isabelle/HOL", + "abstract": null, "venue": "International Conference on Interactive Theorem + Proving", "year": 2013, "referenceCount": 12, "citationCount": 39, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-07-22", "journal": + {"pages": "147-162"}, "authors": [{"authorId": "2110979820", "name": "Jian + Xu"}, {"authorId": "2153647569", "name": "Xingyuan Zhang"}, {"authorId": "144231186", + "name": "Christian Urban"}]}, {"paperId": "6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "externalIds": {"MAG": "2039471684", "DOI": "10.1140/EPJB/E2013-30649-7", + "CorpusId": 121119740}, "corpusId": 121119740, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "title": "Turing instabilities in reaction-diffusion systems with cross diffusion", + "abstract": null, "venue": "", "year": 2013, "referenceCount": 27, "citationCount": + 37, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-12-19", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 062915\n ", "volume": "90 6"}, "authors": [{"authorId": - "2037744526", "name": "Lai Zhang"}, {"authorId": "1990780", "name": "Canrong - Tian"}]}, {"paperId": "f4aaf0a780cd02138aade2a51f99989cc2c962fd", "externalIds": - {"MAG": "2006131432", "ArXiv": "1406.6401", "DOI": "10.1103/PhysRevE.90.042814", - "CorpusId": 9743163, "PubMed": "25375556"}, "url": "https://www.semanticscholar.org/paper/f4aaf0a780cd02138aade2a51f99989cc2c962fd", + "publicationTypes": null, "publicationDate": "2013-04-10", "journal": {"name": + "The European Physical Journal B", "pages": "1-8", "volume": "86"}, "authors": + [{"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "46848249", "name": + "C. Cianci"}, {"authorId": "39866244", "name": "F. Patti"}]}, {"paperId": + "f4aaf0a780cd02138aade2a51f99989cc2c962fd", "externalIds": {"MAG": "2006131432", + "ArXiv": "1406.6401", "DOI": "10.1103/PhysRevE.90.042814", "CorpusId": 9743163, + "PubMed": "25375556"}, "corpusId": 9743163, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f4aaf0a780cd02138aade2a51f99989cc2c962fd", "title": "Turing patterns in multiplex networks.", "abstract": "The theory of patterns formation for a reaction-diffusion system defined on a multiplex is developed by means of a perturbative approach. The interlayer diffusion @@ -2229,7 +2562,8 @@ interactions: away due to cross-talking between layers. Analytical results are compared to direct simulations.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": 32, "citationCount": - 59, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": + 61, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1406.6401", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], @@ -2239,9 +2573,34 @@ interactions: "5903846", "name": "M. Asllani"}, {"authorId": "48664134", "name": "D. M. Busiello"}, {"authorId": "1809355", "name": "T. Carletti"}, {"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "4546397", "name": "Gwendoline Planchon"}]}, - {"paperId": "295572e7977c0fa5dfc388c77a921e6bb9d87c28", "externalIds": {"MAG": - "2032685465", "DOI": "10.1002/adma.201103053", "CorpusId": 11416263, "PubMed": - "22329003"}, "url": "https://www.semanticscholar.org/paper/295572e7977c0fa5dfc388c77a921e6bb9d87c28", + {"paperId": "a68eacfad1978b0c53c113b1884c440193cb8e18", "externalIds": {"DBLP": + "journals/itpro/Strawn14", "DOI": "10.1109/MITP.2014.2", "CorpusId": 24377977}, + "corpusId": 24377977, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a68eacfad1978b0c53c113b1884c440193cb8e18", + "title": "Alan Turing", "abstract": "In this first installment of IT Professional''s + new Mastermind department, which will profile innovators, inventors, and key + people in the fields of IT, computer science, and information systems, George + Strawn reflects on the father of computer science, Alan Turing. He focuses + on Turing''s early theoretical work, noting how unusual it is for a major + theoretical result to precede any practice in a field. Turing devised a simple + process for creating theoretical machines that could implement such procedures, + and he conjectured that these machines could compute anything that was computable + (in other words, they defined computability).", "venue": "IT Professional", + "year": 2018, "referenceCount": 6, "citationCount": 26, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-23", "journal": + {"name": "IT Professional", "pages": "5-7", "volume": "16"}, "authors": [{"authorId": + "2013713", "name": "George O. Strawn"}]}, {"paperId": "295572e7977c0fa5dfc388c77a921e6bb9d87c28", + "externalIds": {"MAG": "2032685465", "DOI": "10.1002/adma.201103053", "CorpusId": + 11416263, "PubMed": "22329003"}, "corpusId": 11416263, "publicationVenue": + {"id": "71697426-616f-45b4-b9d8-d647335a32e6", "name": "Advances in Materials", + "type": "journal", "alternate_names": ["Adv Mater", "Advanced Materials"], + "issn": "2327-2503", "alternate_issns": ["0935-9648"], "url": "http://www.sciencepublishinggroup.com/journal/archive.aspx?amp;issueid=-1&journalid=129", + "alternate_urls": ["http://www.advmat.de/", "https://onlinelibrary.wiley.com/journal/15214095", + "http://www.sciencepublishinggroup.com/journal/archive.aspx?issueid=-1&journalid=129", + "http://www.wiley-vch.de/publish/en/journals/alphabeticIndex/2089/"]}, "url": + "https://www.semanticscholar.org/paper/295572e7977c0fa5dfc388c77a921e6bb9d87c28", "title": "Emergent Criticality in Complex Turing B\u2010Type Atomic Switch Networks", "abstract": "Recent advances in the neuromorphic operation of atomic switches as individual synapse\u2010like devices demonstrate the ability to @@ -2262,35 +2621,19 @@ interactions: networks as an implementable hardware\u2010based platform toward the creation of physically intelligent machines.", "venue": "Advances in Materials", "year": 2012, "referenceCount": 69, "citationCount": 131, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Materials Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-01-10", "journal": {"name": "Advanced Materials", "volume": "24"}, "authors": - [{"authorId": "6408870", "name": "A. Stieg"}, {"authorId": "3469690", "name": - "Audrius V. Avizienis"}, {"authorId": "5991538", "name": "H. O. Sillin"}, - {"authorId": "1402392982", "name": "C. Martin-Olmos"}, {"authorId": "38567152", - "name": "M. Aono"}, {"authorId": "1902938", "name": "J. Gimzewski"}]}, {"paperId": - "a68eacfad1978b0c53c113b1884c440193cb8e18", "externalIds": {"DBLP": "journals/itpro/Strawn14", - "DOI": "10.1109/MITP.2014.2", "CorpusId": 24377977}, "url": "https://www.semanticscholar.org/paper/a68eacfad1978b0c53c113b1884c440193cb8e18", - "title": "Alan Turing", "abstract": "In this first installment of IT Professional''s - new Mastermind department, which will profile innovators, inventors, and key - people in the fields of IT, computer science, and information systems, George - Strawn reflects on the father of computer science, Alan Turing. He focuses - on Turing''s early theoretical work, noting how unusual it is for a major - theoretical result to precede any practice in a field. Turing devised a simple - process for creating theoretical machines that could implement such procedures, - and he conjectured that these machines could compute anything that was computable - (in other words, they defined computability).", "venue": "IT Professional", - "year": 2018, "referenceCount": 6, "citationCount": 25, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-06-23", "journal": {"name": "IT Professional", "pages": - "5-7", "volume": "16"}, "authors": [{"authorId": "2013713", "name": "George - O. Strawn"}]}, {"paperId": "85b093fad42e510598da9a6bb8e81375016ce98c", "externalIds": - {"MAG": "2095518058", "ArXiv": "1407.7114", "DOI": "10.1103/PhysRevE.90.022716", - "CorpusId": 18341472, "PubMed": "25215767"}, "url": "https://www.semanticscholar.org/paper/85b093fad42e510598da9a6bb8e81375016ce98c", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Materials Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-01-10", "journal": {"name": "Advanced Materials", + "volume": "24"}, "authors": [{"authorId": "6408870", "name": "A. Stieg"}, + {"authorId": "3469690", "name": "Audrius V. Avizienis"}, {"authorId": "5991538", + "name": "H. O. Sillin"}, {"authorId": "1402392982", "name": "C. Martin-Olmos"}, + {"authorId": "38567152", "name": "M. Aono"}, {"authorId": "1902938", "name": + "J. Gimzewski"}]}, {"paperId": "85b093fad42e510598da9a6bb8e81375016ce98c", + "externalIds": {"MAG": "2095518058", "ArXiv": "1407.7114", "DOI": "10.1103/PhysRevE.90.022716", + "CorpusId": 18341472, "PubMed": "25215767"}, "corpusId": 18341472, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/85b093fad42e510598da9a6bb8e81375016ce98c", "title": "Feedback, receptor clustering, and receptor restriction to single cells yield large Turing spaces for ligand-receptor-based Turing models.", "abstract": "Turing mechanisms can yield a large variety of patterns from @@ -2314,7 +2657,8 @@ interactions: mechanisms present a general mechanism for patterning in biology.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": 94, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://real.mtak.hu/14410/1/XQ10067E.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer @@ -2323,34 +2667,7 @@ interactions: Statistical, nonlinear, and soft matter physics", "pages": "\n 022716\n ", "volume": "90 2"}, "authors": [{"authorId": "2094723809", "name": "Tam\u00e1s Kurics"}, {"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", - "name": "D. Iber"}]}, {"paperId": "3a0bc3500260b9a5c19a09a0a2b5349c41383145", - "externalIds": {"MAG": "2119455906", "DOI": "10.1098/rsfs.2011.0097", "CorpusId": - 10041916, "PubMed": "23919125"}, "url": "https://www.semanticscholar.org/paper/3a0bc3500260b9a5c19a09a0a2b5349c41383145", - "title": "Turing''s theory of morphogenesis of 1952 and the subsequent discovery - of the crucial role of local self-enhancement and long-range inhibition", - "abstract": "In his pioneering work, Alan Turing showed that de novo pattern - formation is possible if two substances interact that differ in their diffusion - range. Since then, we have shown that pattern formation is possible if, and - only if, a self-enhancing reaction is coupled with an antagonistic process - of longer range. Knowing this crucial condition has enabled us to include - nonlinear interactions, which are required to design molecularly realistic - interactions. Different reaction schemes and their relation to Turing''s proposal - are discussed and compared with more recent observations on the molecular\u2013genetic - level. The antagonistic reaction may be accomplished by an inhibitor that - is produced in the activated region or by a depletion of a component that - is used up during the self-enhancing reaction. The autocatalysis may be realized - by an inhibition of an inhibition. Activating molecules can be processed into - molecules that have an inhibiting function; patterning of the Wnt pathway - is proposed to depend on such a mechanism. Three-component systems, as discussed - in Turing''s paper, are shown to play a major role in the generation of highly - dynamic patterns that never reach a stable state.", "venue": "Interface Focus", - "year": 2012, "referenceCount": 52, "citationCount": 109, "influentialCitationCount": - 9, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-08-06", "journal": {"name": "Interface Focus", "pages": "407 - 416", - "volume": "2"}, "authors": [{"authorId": "145191224", "name": "H. Meinhardt"}]}]} + "name": "D. Iber"}]}]} ' headers: @@ -2359,31 +2676,31 @@ interactions: Connection: - keep-alive Content-Length: - - '189773' + - '216427' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:16 GMT + - Tue, 03 Jan 2023 20:52:46 GMT Via: - - 1.1 88c333921d5c405e037b84bb8c2dc33e.cloudfront.net (CloudFront) + - 1.1 1904c7aff4976cd4798f07f5b45f7f70.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - 56sJOWR8xJO2w7rX5IE1ch4G9IQWOswoFOWUHzCcZJoFxsJZ_xNzwg== + - fmBtc693wp4PdRbU_q8isHIFzNRIJIZC4Khp7bWNfmxlHqj4TeDRxQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detDnFJkvHcFk1g= + - eLxQtGvbvHcFmIg= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '189773' + - '216427' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:16 GMT + - Tue, 03 Jan 2023 20:52:46 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - df277406-9e7c-4c92-af1a-6b0102dea499 + - d6db718c-f306-43de-a26c-30e25641cf64 status: code: 200 message: OK @@ -2399,17 +2716,66 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=100&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=100&limit=100 response: body: - string: '{"total": 133388, "offset": 100, "next": 200, "data": [{"paperId": - "b6bacd6d52ef06599369d873a019854358d2868e", "externalIds": {"MAG": "2117828664", - "DOI": "10.1007/s00285-011-0495-4", "CorpusId": 7981873, "PubMed": "22127438"}, + string: '{"total": 133751, "offset": 100, "next": 200, "data": [{"paperId": + "3a0bc3500260b9a5c19a09a0a2b5349c41383145", "externalIds": {"MAG": "2119455906", + "DOI": "10.1098/rsfs.2011.0097", "CorpusId": 10041916, "PubMed": "23919125"}, + "corpusId": 10041916, "publicationVenue": {"id": "692a1437-389a-429a-b9b0-7a8182722f06", + "name": "Interface Focus", "type": "journal", "issn": "2042-8898", "url": + "http://rsfs.royalsocietypublishing.org/"}, "url": "https://www.semanticscholar.org/paper/3a0bc3500260b9a5c19a09a0a2b5349c41383145", + "title": "Turing''s theory of morphogenesis of 1952 and the subsequent discovery + of the crucial role of local self-enhancement and long-range inhibition", + "abstract": "In his pioneering work, Alan Turing showed that de novo pattern + formation is possible if two substances interact that differ in their diffusion + range. Since then, we have shown that pattern formation is possible if, and + only if, a self-enhancing reaction is coupled with an antagonistic process + of longer range. Knowing this crucial condition has enabled us to include + nonlinear interactions, which are required to design molecularly realistic + interactions. Different reaction schemes and their relation to Turing''s proposal + are discussed and compared with more recent observations on the molecular\u2013genetic + level. The antagonistic reaction may be accomplished by an inhibitor that + is produced in the activated region or by a depletion of a component that + is used up during the self-enhancing reaction. The autocatalysis may be realized + by an inhibition of an inhibition. Activating molecules can be processed into + molecules that have an inhibiting function; patterning of the Wnt pathway + is proposed to depend on such a mechanism. Three-component systems, as discussed + in Turing''s paper, are shown to play a major role in the generation of highly + dynamic patterns that never reach a stable state.", "venue": "Interface Focus", + "year": 2012, "referenceCount": 52, "citationCount": 110, "influentialCitationCount": + 9, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc3363033?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-08-06", "journal": + {"name": "Interface Focus", "pages": "407 - 416", "volume": "2"}, "authors": + [{"authorId": "145191224", "name": "H. Meinhardt"}]}, {"paperId": "a8e4100395a3684d7f8523ccf827bad581457a3c", + "externalIds": {"DBLP": "journals/cacm/Haigh14", "MAG": "2142601750", "DOI": + "10.1145/2542504", "CorpusId": 5694189}, "corpusId": 5694189, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a8e4100395a3684d7f8523ccf827bad581457a3c", + "title": "Actually, Turing did not invent the computer", "abstract": "Separating + the origins of computer science and technology.", "venue": "CACM", "year": + 2014, "referenceCount": 6, "citationCount": 32, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Commun. ACM", "pages": "36-41", + "volume": "57"}, "authors": [{"authorId": "1714013", "name": "T. Haigh"}]}, + {"paperId": "b6bacd6d52ef06599369d873a019854358d2868e", "externalIds": {"MAG": + "2117828664", "DOI": "10.1007/s00285-011-0495-4", "CorpusId": 7981873, "PubMed": + "22127438"}, "corpusId": 7981873, "publicationVenue": {"id": "b63919f2-2979-428b-95ba-53029f49a7df", + "name": "Journal of Mathematical Biology", "type": "journal", "alternate_names": + ["J Math Biology"], "issn": "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", + "alternate_urls": ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, "url": "https://www.semanticscholar.org/paper/b6bacd6d52ef06599369d873a019854358d2868e", "title": "Turing instabilities in a mathematical model for signaling networks", "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2012, - "referenceCount": 38, "citationCount": 68, "influentialCitationCount": 7, - "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + "referenceCount": 38, "citationCount": 69, "influentialCitationCount": 8, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1107.1594", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-01", "journal": {"name": "Journal @@ -2418,19 +2784,23 @@ interactions: "name": "Matthias R\u00f6ger"}]}, {"paperId": "8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", "externalIds": {"DBLP": "books/cu/p/Hales14", "ArXiv": "1302.2898", "MAG": "2962739402", "DOI": "10.1017/CBO9781107338579.008", "CorpusId": 37948622}, - "url": "https://www.semanticscholar.org/paper/8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", + "corpusId": 37948622, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", "title": "Mathematics in the age of the Turing machine", "abstract": "The article gives a survey of mathematical proofs that rely on computer calculations and formal proofs.", "venue": "Turing''s Legacy", "year": 2013, "referenceCount": 86, "citationCount": 26, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1302.2898.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2013-02-12", "journal": {"pages": "253-298"}, "authors": [{"authorId": "3312697", "name": "T. Hales"}]}, {"paperId": "a44de800fafc143a1acf781ecde52ebab0ca7f15", "externalIds": {"DBLP": - "conf/woot/HomescuSLBF12", "MAG": "53119127", "CorpusId": 10922062}, "url": - "https://www.semanticscholar.org/paper/a44de800fafc143a1acf781ecde52ebab0ca7f15", + "conf/woot/HomescuSLBF12", "MAG": "53119127", "CorpusId": 10922062}, "corpusId": + 10922062, "publicationVenue": {"id": "340e6ee7-1f78-49e3-b1c0-18d5489035f8", + "name": "Workshop on Offensive Technologies", "type": "conference", "alternate_names": + ["Workshop on Object-Oriented Technology", "Workshop Offensive Technol", "Workshop + Object-oriented Technol", "WOOT"]}, "url": "https://www.semanticscholar.org/paper/a44de800fafc143a1acf781ecde52ebab0ca7f15", "title": "Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming", "abstract": "Return-oriented programming (ROP) has gained a lot of popularity lately, as an attack against currently implemented defenses @@ -2452,29 +2822,35 @@ interactions: to show that many programs indeed contain a Turing-complete set of microgadgets, which attackers can use to perform arbitrary computations.", "venue": "Workshop on Offensive Technologies", "year": 2012, "referenceCount": 20, "citationCount": - 59, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-08-06", "journal": - {"pages": "64-76"}, "authors": [{"authorId": "2069454", "name": "Andrei Homescu"}, - {"authorId": "2067667570", "name": "Michael Stewart"}, {"authorId": "143619283", - "name": "Per Larsen"}, {"authorId": "1742368", "name": "Stefan Brunthaler"}, - {"authorId": "144230973", "name": "M. Franz"}]}, {"paperId": "046f8273608d09f2600e9f33e784ee63193168d7", - "externalIds": {"DBLP": "journals/iandc/BaetenLT13", "ArXiv": "1104.1738", - "MAG": "2951996373", "DOI": "10.1016/j.ic.2013.08.010", "CorpusId": 8550807}, + 59, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-08-06", "journal": {"pages": "64-76"}, "authors": [{"authorId": "2069454", + "name": "Andrei Homescu"}, {"authorId": "2067667570", "name": "Michael Stewart"}, + {"authorId": "143619283", "name": "Per Larsen"}, {"authorId": "1742368", "name": + "Stefan Brunthaler"}, {"authorId": "144230973", "name": "M. Franz"}]}, {"paperId": + "046f8273608d09f2600e9f33e784ee63193168d7", "externalIds": {"DBLP": "journals/iandc/BaetenLT13", + "ArXiv": "1104.1738", "MAG": "2951996373", "DOI": "10.1016/j.ic.2013.08.010", + "CorpusId": 8550807}, "corpusId": 8550807, "publicationVenue": {"id": "d8fc27e3-52dd-4758-bc70-1983b8a26797", + "name": "Information and Computation", "type": "journal", "alternate_names": + ["Inf Comput", "Information & Computation", "Inf Comput"], "issn": "0890-5401", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/622844/description#description", + "alternate_urls": ["http://www.idealibrary.com/links/toc/inco", "http://iandc.csail.mit.edu/", + "http://www.sciencedirect.com/science/journal/08905401", "https://www.journals.elsevier.com/information-and-computation/"]}, "url": "https://www.semanticscholar.org/paper/046f8273608d09f2600e9f33e784ee63193168d7", "title": "Reactive Turing machines", "abstract": null, "venue": "Information and Computation", "year": 2011, "referenceCount": 44, "citationCount": 29, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-04-09", "journal": {"name": "ArXiv", - "volume": "abs/1104.1738"}, "authors": [{"authorId": "1752577", "name": "J. - Baeten"}, {"authorId": "2476141", "name": "B. Luttik"}, {"authorId": "2757605", - "name": "P. V. Tilburg"}]}, {"paperId": "71a45fb7fbaa7abfd2d3af83baca1b926877cdcf", + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-04-09", "journal": + {"name": "ArXiv", "volume": "abs/1104.1738"}, "authors": [{"authorId": "1752577", + "name": "J. Baeten"}, {"authorId": "2476141", "name": "B. Luttik"}, {"authorId": + "2757605", "name": "P. V. Tilburg"}]}, {"paperId": "71a45fb7fbaa7abfd2d3af83baca1b926877cdcf", "externalIds": {"MAG": "2467446938", "DOI": "10.5860/choice.50-0319", "CorpusId": - 61137398}, "url": "https://www.semanticscholar.org/paper/71a45fb7fbaa7abfd2d3af83baca1b926877cdcf", + 61137398}, "corpusId": 61137398, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/71a45fb7fbaa7abfd2d3af83baca1b926877cdcf", "title": "Turing''s Cathedral: The Origins of the Digital Universe", "abstract": "George Dyson''s fascinating account of the early years of computers: \"Turing''s Cathedral\" is the story behind how the PC, ipod, smartphone and almost every @@ -2494,14 +2870,50 @@ interactions: as of the discoveries they made, and you do not need any knowledge of computers or mathematics to enjoy the ride. ..a ripping yarn\". (John Gribbin, \"Literary Review\").", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": - 51, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + 51, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2012-12-11", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "28719995", "name": "George B. Dyson"}]}, {"paperId": - "440692450a7a79a913906eff75f0e5bca210a2ef", "externalIds": {"DBLP": "journals/neco/Zhang12", - "MAG": "2141753389", "DOI": "10.1162/NECO_a_00266", "CorpusId": 15244020, - "PubMed": "22295985"}, "url": "https://www.semanticscholar.org/paper/440692450a7a79a913906eff75f0e5bca210a2ef", + "1c48a5b52f005c704784ee63b3b7386360e56a75", "externalIds": {"MAG": "2090328157", + "DBLP": "journals/corr/Lloyd13", "ArXiv": "1310.3225", "DOI": "10.1098/rsta.2011.0331", + "CorpusId": 5455633, "PubMed": "22711875"}, "corpusId": 5455633, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1c48a5b52f005c704784ee63b3b7386360e56a75", + "title": "A Turing test for free will", "abstract": "Before Alan Turing made + his crucial contributions to the theory of computation, he studied the question + of whether quantum mechanics could throw light on the nature of free will. + This paper investigates the roles of quantum mechanics and computation in + free will. Although quantum mechanics implies that events are intrinsically + unpredictable, the \u2018pure stochasticity\u2019 of quantum mechanics adds + randomness only to decision-making processes, not freedom. By contrast, the + theory of computation implies that, even when our decisions arise from a completely + deterministic decision-making process, the outcomes of that process can be + intrinsically unpredictable, even to\u2014especially to\u2014ourselves. I + argue that this intrinsic computational unpredictability of the decision-making + process is what gives rise to our impression that we possess free will. Finally, + I propose a \u2018Turing test\u2019 for free will: a decision-maker who passes + this test will tend to believe that he, she, or it possesses free will, whether + the world is deterministic or not.", "venue": "Philosophical Transactions + of the Royal Society A: Mathematical, Physical and Engineering Sciences", + "year": 2012, "referenceCount": 56, "citationCount": 41, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsta.2011.0331", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine", "Computer Science", "Mathematics", + "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-07-28", "journal": {"name": "Philosophical Transactions + of the Royal Society A: Mathematical, Physical and Engineering Sciences", + "pages": "3597 - 3610", "volume": "370"}, "authors": [{"authorId": "145762777", + "name": "S. Lloyd"}]}, {"paperId": "440692450a7a79a913906eff75f0e5bca210a2ef", + "externalIds": {"DBLP": "journals/neco/Zhang12", "MAG": "2141753389", "DOI": + "10.1162/NECO_a_00266", "CorpusId": 15244020, "PubMed": "22295985"}, "corpusId": + 15244020, "publicationVenue": {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", + "name": "Neural Computation", "type": "journal", "alternate_names": ["Neural + Comput"], "issn": "0899-7667", "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", + "http://www.mitpressjournals.org/loi/neco", "https://www.mitpressjournals.org/loi/neco"]}, + "url": "https://www.semanticscholar.org/paper/440692450a7a79a913906eff75f0e5bca210a2ef", "title": "Entropy Estimation in Turing''s Perspective", "abstract": "A new nonparametric estimator of Shannon''s entropy on a countable alphabet is proposed and analyzed against the well-known plug-in estimator. The proposed estimator @@ -2517,58 +2929,35 @@ interactions: for any finite alphabet, the proposed estimator has a bias decaying exponentially in n. Several new bias-adjusted estimators are also discussed.", "venue": "Neural Computation", "year": 2012, "referenceCount": 31, "citationCount": - 45, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": + 45, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-05-01", "journal": {"name": "Neural Computation", "pages": "1368-1389", "volume": "24"}, "authors": [{"authorId": "2117992573", - "name": "Zhiyi Zhang"}]}, {"paperId": "1c48a5b52f005c704784ee63b3b7386360e56a75", - "externalIds": {"MAG": "2090328157", "DBLP": "journals/corr/Lloyd13", "ArXiv": - "1310.3225", "DOI": "10.1098/rsta.2011.0331", "CorpusId": 5455633, "PubMed": - "22711875"}, "url": "https://www.semanticscholar.org/paper/1c48a5b52f005c704784ee63b3b7386360e56a75", - "title": "A Turing test for free will", "abstract": "Before Alan Turing made - his crucial contributions to the theory of computation, he studied the question - of whether quantum mechanics could throw light on the nature of free will. - This paper investigates the roles of quantum mechanics and computation in - free will. Although quantum mechanics implies that events are intrinsically - unpredictable, the \u2018pure stochasticity\u2019 of quantum mechanics adds - randomness only to decision-making processes, not freedom. By contrast, the - theory of computation implies that, even when our decisions arise from a completely - deterministic decision-making process, the outcomes of that process can be - intrinsically unpredictable, even to\u2014especially to\u2014ourselves. I - argue that this intrinsic computational unpredictability of the decision-making - process is what gives rise to our impression that we possess free will. Finally, - I propose a \u2018Turing test\u2019 for free will: a decision-maker who passes - this test will tend to believe that he, she, or it possesses free will, whether - the world is deterministic or not.", "venue": "Philosophical Transactions - of the Royal Society A: Mathematical, Physical and Engineering Sciences", - "year": 2012, "referenceCount": 56, "citationCount": 40, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science", - "Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-07-28", "journal": {"name": "Philosophical - Transactions of the Royal Society A: Mathematical, Physical and Engineering - Sciences", "pages": "3597 - 3610", "volume": "370"}, "authors": [{"authorId": - "145762777", "name": "S. Lloyd"}]}, {"paperId": "4e7804702deecbee5aea58e3205b3fe09df61c3b", + "name": "Zhiyi Zhang"}]}, {"paperId": "4e7804702deecbee5aea58e3205b3fe09df61c3b", "externalIds": {"MAG": "2014027269", "DOI": "10.1016/j.pbiomolbio.2013.03.013", - "CorpusId": 34721095, "PubMed": "23583352"}, "url": "https://www.semanticscholar.org/paper/4e7804702deecbee5aea58e3205b3fe09df61c3b", + "CorpusId": 34721095, "PubMed": "23583352"}, "corpusId": 34721095, "publicationVenue": + {"id": "96513e74-195a-4370-8dc0-e2964f7ef579", "name": "Progress in Biophysics + and Molecular Biology", "type": "journal", "alternate_names": ["Prog Biophys Mol + Biology", "Progress in Biophysics & Molecular Biology", "Prog Biophys Mol + Biology"], "issn": "0079-6107", "url": "http://www.elsevier.com/locate/pbiomolbio", + "alternate_urls": ["https://www.journals.elsevier.com/progress-in-biophysics-and-molecular-biology", + "http://www.sciencedirect.com/science/journal/00796107"]}, "url": "https://www.semanticscholar.org/paper/4e7804702deecbee5aea58e3205b3fe09df61c3b", "title": "Turing on Super-Turing and adaptivity.", "abstract": null, "venue": "Progress in Biophysics and Molecular Biology", "year": 2013, "referenceCount": 63, "citationCount": 21, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2013-09-01", "journal": {"name": "Progress - in biophysics and molecular biology", "pages": "\n 117-26\n ", - "volume": "113 1"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, - {"paperId": "6293bc251cdb48a83deba85aa83064f70f2747bc", "externalIds": {"MAG": - "1606281396", "DOI": "10.5860/choice.51-0322", "CorpusId": 60696647}, "url": - "https://www.semanticscholar.org/paper/6293bc251cdb48a83deba85aa83064f70f2747bc", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2013-09-01", + "journal": {"name": "Progress in biophysics and molecular biology", "pages": + "\n 117-26\n ", "volume": "113 1"}, "authors": [{"authorId": + "2797623", "name": "H. Siegelmann"}]}, {"paperId": "6293bc251cdb48a83deba85aa83064f70f2747bc", + "externalIds": {"MAG": "1606281396", "DOI": "10.5860/choice.51-0322", "CorpusId": + 60696647}, "corpusId": 60696647, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6293bc251cdb48a83deba85aa83064f70f2747bc", "title": "Turing: Pioneer of the Information Age", "abstract": "1. Click to Open 2. Turing''s Universal Machine 3. Sinking Hilbert 4. The Intuitive Mathematician 5. Breaking Enigma 6. Tunny - Hitler''s BlackBerry 7. The Colossus of Computers @@ -2576,82 +2965,140 @@ interactions: 10. Artificial Intelligence 11. The Imitation Game 12. Educating Machinery 13. Computer Chess 14. Artificial Life 15. Epilogue", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 38, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-11-29", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144246233", - "name": "B. Copeland"}]}, {"paperId": "d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", - "externalIds": {"DBLP": "journals/mcs/GambinoLS12", "MAG": "2169791857", "DOI": - "10.1016/j.matcom.2011.11.004", "CorpusId": 28553827}, "url": "https://www.semanticscholar.org/paper/d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2012-11-29", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144246233", "name": "B. Copeland"}]}, {"paperId": + "d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", "externalIds": {"DBLP": "journals/mcs/GambinoLS12", + "MAG": "2169791857", "DOI": "10.1016/j.matcom.2011.11.004", "CorpusId": 28553827}, + "corpusId": 28553827, "publicationVenue": {"id": "9fb5b1b9-03d6-4b01-96db-b535900babb5", + "name": "Mathematics and Computers in Simulation", "type": "journal", "alternate_names": + ["Math Comput Simul"], "issn": "0378-4754", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505615/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/mathematics-and-computers-in-simulation", + "http://www.sciencedirect.com/science/journal/03784754"]}, "url": "https://www.semanticscholar.org/paper/d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", "title": "Turing instability and traveling fronts for a nonlinear reaction-diffusion system with cross-diffusion", "abstract": null, "venue": "Mathematics and Computers in Simulation", "year": 2012, "referenceCount": 58, "citationCount": - 91, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-02-01", "journal": {"name": "Math. - Comput. Simul.", "pages": "1112-1132", "volume": "82"}, "authors": [{"authorId": - "143670670", "name": "G. Gambino"}, {"authorId": "3106418", "name": "M. Lombardo"}, - {"authorId": "37823401", "name": "M. Sammartino"}]}, {"paperId": "722958e101c8d9caf846c4cb15d0a8d773ae6c6b", - "externalIds": {"MAG": "1518671103", "DOI": "10.1108/03684921211243464", "CorpusId": - 58809660}, "url": "https://www.semanticscholar.org/paper/722958e101c8d9caf846c4cb15d0a8d773ae6c6b", + 97, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-02-01", "journal": + {"name": "Math. Comput. Simul.", "pages": "1112-1132", "volume": "82"}, "authors": + [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", + "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, + {"paperId": "722958e101c8d9caf846c4cb15d0a8d773ae6c6b", "externalIds": {"MAG": + "1518671103", "DOI": "10.1108/03684921211243464", "CorpusId": 58809660}, "corpusId": + 58809660, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/722958e101c8d9caf846c4cb15d0a8d773ae6c6b", "title": "Turing''s Cathedral: The Origins of the Digital Universe", "abstract": null, "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 93, - "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "2012-06-08", "journal": - {"name": "Kybernetes", "pages": "822-823", "volume": "41"}, "authors": [{"authorId": - "16210036", "name": "D. Hutton"}]}, {"paperId": "b8a2952ebdd4780bcd8c5f1146c1965f9731437d", + "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "2012-06-08", "journal": {"name": "Kybernetes", "pages": "822-823", "volume": + "41"}, "authors": [{"authorId": "16210036", "name": "D. Hutton"}]}, {"paperId": + "55c69622da02f02f5b5a52e42b28b8fec6260796", "externalIds": {"MAG": "2074371667", + "DOI": "10.1016/j.mbs.2011.12.005", "CorpusId": 16409817, "PubMed": "22207074"}, + "corpusId": 16409817, "publicationVenue": {"id": "7ddbf0f3-cc29-4172-b79c-19b9ed50e871", + "name": "Mathematical Biosciences", "alternate_names": ["Math Biosci"], "issn": + "0025-5564", "url": "https://www.journals.elsevier.com/mathematical-biosciences/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00255564"]}, + "url": "https://www.semanticscholar.org/paper/55c69622da02f02f5b5a52e42b28b8fec6260796", + "title": "Turing instabilities and spatio-temporal chaos in ratio-dependent + Holling-Tanner model.", "abstract": null, "venue": "Mathematical Biosciences", + "year": 2012, "referenceCount": 83, "citationCount": 88, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-03-01", "journal": {"name": "Mathematical biosciences", "pages": "\n 64-76\n ", + "volume": "236 1"}, "authors": [{"authorId": "33373208", "name": "M. Banerjee"}, + {"authorId": "2110878825", "name": "Santo Banerjee"}]}, {"paperId": "b8a2952ebdd4780bcd8c5f1146c1965f9731437d", "externalIds": {"MAG": "2057669106", "DOI": "10.1016/j.gde.2012.11.013", "CorpusId": - 24812683, "PubMed": "23276682"}, "url": "https://www.semanticscholar.org/paper/b8a2952ebdd4780bcd8c5f1146c1965f9731437d", + 24812683, "PubMed": "23276682"}, "corpusId": 24812683, "publicationVenue": + {"id": "c828ed19-475e-4afd-ab62-1eac0a2dae95", "name": "Current Opinion in + Genetics and Development", "type": "journal", "alternate_names": ["Current + Opinion in Genetics & Development", "Curr Opin Genet Dev", "Curr Opin Genet Dev"], + "issn": "0959-437X", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/601302/description#description", + "alternate_urls": ["https://www.sciencedirect.com/journal/current-opinion-in-genetics-and-development", + "http://www.sciencedirect.com/science/journal/0959437X"]}, "url": "https://www.semanticscholar.org/paper/b8a2952ebdd4780bcd8c5f1146c1965f9731437d", "title": "Turing patterns in development: what about the horse part?", "abstract": null, "venue": "Current Opinion in Genetics and Development", "year": 2012, "referenceCount": 38, "citationCount": 96, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2012-12-01", "journal": - {"name": "Current opinion in genetics & development", "pages": "\n 578-84\n ", - "volume": "22 6"}, "authors": [{"authorId": "2650134", "name": "L. Marcon"}, - {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "55c69622da02f02f5b5a52e42b28b8fec6260796", - "externalIds": {"MAG": "2074371667", "DOI": "10.1016/j.mbs.2011.12.005", "CorpusId": - 16409817, "PubMed": "22207074"}, "url": "https://www.semanticscholar.org/paper/55c69622da02f02f5b5a52e42b28b8fec6260796", - "title": "Turing instabilities and spatio-temporal chaos in ratio-dependent - Holling-Tanner model.", "abstract": null, "venue": "Mathematical Biosciences", - "year": 2012, "referenceCount": 83, "citationCount": 80, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + "publicationDate": "2012-12-01", "journal": {"name": "Current opinion in genetics + & development", "pages": "\n 578-84\n ", "volume": "22 6"}, + "authors": [{"authorId": "2650134", "name": "L. Marcon"}, {"authorId": "47254653", + "name": "J. Sharpe"}]}, {"paperId": "2ea66fabe4e20f534c848ae69e021c337dc8af60", + "externalIds": {"MAG": "2023622265", "DOI": "10.1103/PHYSREVE.86.026201", + "CorpusId": 25589430, "PubMed": "23005839"}, "corpusId": 25589430, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2ea66fabe4e20f534c848ae69e021c337dc8af60", + "title": "Nonlinear effects on Turing patterns: time oscillations and chaos.", + "abstract": "We show that a model reaction-diffusion system with two species + in a monostable regime and over a large region of parameter space produces + Turing patterns coexisting with a limit cycle which cannot be discerned from + the linear analysis. As a consequence, the patterns oscillate in time. When + varying a single parameter, a series of bifurcations leads to period doubling, + quasiperiodic, and chaotic oscillations without modifying the underlying Turing + pattern. A Ruelle-Takens-Newhouse route to chaos is identified. We also examine + the Turing conditions for obtaining a diffusion-driven instability and show + that the patterns obtained are not necessarily stationary for certain values + of the diffusion coefficients. These results demonstrate the limitations of + the linear analysis for reaction-diffusion systems.", "venue": "Physical review. + E, Statistical, nonlinear, and soft matter physics", "year": 2012, "referenceCount": + 36, "citationCount": 35, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:8025fcc2-1df4-41f2-8d61-c366b39095ae/files/ma8cfc5d1689468435a9b82075b64f6ae", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-03-01", "journal": {"name": "Mathematical - biosciences", "pages": "\n 64-76\n ", "volume": "236 1"}, - "authors": [{"authorId": "33373208", "name": "M. Banerjee"}, {"authorId": - "2110878825", "name": "Santo Banerjee"}]}, {"paperId": "01b66449f7d22fe4845e3e5af57c4828d70ba9af", - "externalIds": {"MAG": "2032619326", "DOI": "10.1038/nrm3120", "CorpusId": - 3480139, "PubMed": "21602907"}, "url": "https://www.semanticscholar.org/paper/01b66449f7d22fe4845e3e5af57c4828d70ba9af", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-08-08", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 026201\n ", "volume": "86 2 Pt 2"}, "authors": + [{"authorId": "145092079", "name": "J. Arag\u00f3n"}, {"authorId": "37747895", + "name": "R. Barrio"}, {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": + "35275545", "name": "R. Baker"}, {"authorId": "2339973", "name": "P. Maini"}]}, + {"paperId": "01b66449f7d22fe4845e3e5af57c4828d70ba9af", "externalIds": {"MAG": + "2032619326", "DOI": "10.1038/nrm3120", "CorpusId": 3480139, "PubMed": "21602907"}, + "corpusId": 3480139, "publicationVenue": {"id": "b3b8f19c-c31b-4847-bc7b-66a18aebedfe", + "name": "Nature reviews. Molecular cell biology", "type": "journal", "alternate_names": + ["Nat Rev Mol Cell Biology", "Nature Reviews Molecular Cell Biology", "Nat + rev Mol cell biology"], "issn": "1471-0072", "url": "https://www.nature.com/nrm/", + "alternate_urls": ["http://www.nature.com/nrm/index.html"]}, "url": "https://www.semanticscholar.org/paper/01b66449f7d22fe4845e3e5af57c4828d70ba9af", "title": "Turing''s next steps: the mechanochemical basis of morphogenesis", "abstract": null, "venue": "Nature reviews. Molecular cell biology", "year": - 2011, "referenceCount": 64, "citationCount": 227, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2011-06-01", "journal": {"name": "Nature Reviews - Molecular Cell Biology", "pages": "392-398", "volume": "12"}, "authors": [{"authorId": - "51027760", "name": "J. Howard"}, {"authorId": "4288008", "name": "S. Grill"}, - {"authorId": "2581310", "name": "J. Bois"}]}, {"paperId": "80b8b1ca9d87902ff7536bfd65dae0d1b715b060", - "externalIds": {"MAG": "2026506642", "DOI": "10.1038/482461a", "CorpusId": - 205070101, "PubMed": "22358811"}, "url": "https://www.semanticscholar.org/paper/80b8b1ca9d87902ff7536bfd65dae0d1b715b060", + 2011, "referenceCount": 64, "citationCount": 228, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2011-06-01", + "journal": {"name": "Nature Reviews Molecular Cell Biology", "pages": "392-398", + "volume": "12"}, "authors": [{"authorId": "51027760", "name": "J. Howard"}, + {"authorId": "4288008", "name": "S. Grill"}, {"authorId": "2581310", "name": + "J. Bois"}]}, {"paperId": "80b8b1ca9d87902ff7536bfd65dae0d1b715b060", "externalIds": + {"MAG": "2026506642", "DOI": "10.1038/482461a", "CorpusId": 205070101, "PubMed": + "22358811"}, "corpusId": 205070101, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/80b8b1ca9d87902ff7536bfd65dae0d1b715b060", "title": "Turing centenary: Life''s code script", "abstract": null, "venue": "Nature", "year": 2012, "referenceCount": 5, "citationCount": 70, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-02-22", "journal": {"name": "Nature", "pages": "461-461", - "volume": "482"}, "authors": [{"authorId": "144284185", "name": "S. Brenner"}]}, - {"paperId": "01980fcdecbb8e4bce9555614629e51f27debcc6", "externalIds": {"DBLP": - "journals/jlms/JockuschS12", "MAG": "2969348684", "ArXiv": "1010.5212", "DOI": - "10.1112/jlms/jdr051", "CorpusId": 883075}, "url": "https://www.semanticscholar.org/paper/01980fcdecbb8e4bce9555614629e51f27debcc6", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-02-22", "journal": {"name": "Nature", + "pages": "461-461", "volume": "482"}, "authors": [{"authorId": "144284185", + "name": "S. Brenner"}]}, {"paperId": "01980fcdecbb8e4bce9555614629e51f27debcc6", + "externalIds": {"DBLP": "journals/jlms/JockuschS12", "MAG": "2969348684", + "ArXiv": "1010.5212", "DOI": "10.1112/jlms/jdr051", "CorpusId": 883075}, "corpusId": + 883075, "publicationVenue": {"id": "71068c9d-6403-4b1c-9f6e-56c01246fe2b", + "name": "Journal of the London Mathematical Society", "type": "journal", "alternate_names": + ["J Lond Math Soc"], "issn": "0024-6107", "url": "https://londmathsoc.onlinelibrary.wiley.com/journal/14697750"}, + "url": "https://www.semanticscholar.org/paper/01980fcdecbb8e4bce9555614629e51f27debcc6", "title": "Generic computability, Turing degrees, and asymptotic density", "abstract": "Generic decidability has been extensively studied in group theory, and we now study it in the context of classical computability theory. A set @@ -2660,6 +3107,7 @@ interactions: domain D, and furthermore D has density 1, that is, lim n\u2192\u221e |{k", "venue": "Journal of the London Mathematical Society", "year": 2010, "referenceCount": 29, "citationCount": 51, "influentialCitationCount": 9, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1010.5212", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": @@ -2669,7 +3117,7 @@ interactions: "name": "C. Jockusch"}, {"authorId": "1705448", "name": "P. Schupp"}]}, {"paperId": "e81db824ddf7499cd10d094f38fefd466a93c611", "externalIds": {"MAG": "2397007421", "DBLP": "conf/birthday/MikkilineniCM12", "DOI": "10.29007/44jw", "CorpusId": - 9893787}, "url": "https://www.semanticscholar.org/paper/e81db824ddf7499cd10d094f38fefd466a93c611", + 9893787}, "corpusId": 9893787, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e81db824ddf7499cd10d094f38fefd466a93c611", "title": "The Turing O-Machine and the DIME Network Architecture: Injecting the Architectural Resiliency into Distributed Computing", "abstract": "Turing\u2019s o-machine discussed in his PhD thesis can perform all of the usual operations @@ -2696,39 +3144,16 @@ interactions: layers of ad-hoc management software in today\u2019s distributed computing environments.", "venue": "Turing-100", "year": 2012, "referenceCount": 33, "citationCount": 32, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "openAccessPdf": {"url": "https://easychair.org/publications/open/gBD", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-22", "journal": {"pages": "239-251"}, "authors": [{"authorId": "3289961", "name": "Rao V. Mikkilineni"}, {"authorId": "120341528", "name": "A. Comparini"}, - {"authorId": "49792148", "name": "G. Morana"}]}, {"paperId": "2ea66fabe4e20f534c848ae69e021c337dc8af60", - "externalIds": {"MAG": "2023622265", "DOI": "10.1103/PHYSREVE.86.026201", - "CorpusId": 25589430, "PubMed": "23005839"}, "url": "https://www.semanticscholar.org/paper/2ea66fabe4e20f534c848ae69e021c337dc8af60", - "title": "Nonlinear effects on Turing patterns: time oscillations and chaos.", - "abstract": "We show that a model reaction-diffusion system with two species - in a monostable regime and over a large region of parameter space produces - Turing patterns coexisting with a limit cycle which cannot be discerned from - the linear analysis. As a consequence, the patterns oscillate in time. When - varying a single parameter, a series of bifurcations leads to period doubling, - quasiperiodic, and chaotic oscillations without modifying the underlying Turing - pattern. A Ruelle-Takens-Newhouse route to chaos is identified. We also examine - the Turing conditions for obtaining a diffusion-driven instability and show - that the patterns obtained are not necessarily stationary for certain values - of the diffusion coefficients. These results demonstrate the limitations of - the linear analysis for reaction-diffusion systems.", "venue": "Physical review. - E, Statistical, nonlinear, and soft matter physics", "year": 2012, "referenceCount": - 36, "citationCount": 34, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-08-08", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 026201\n ", - "volume": "86 2 Pt 2"}, "authors": [{"authorId": "145092079", "name": "J. - Arag\u00f3n"}, {"authorId": "37747895", "name": "R. Barrio"}, {"authorId": - "6566804", "name": "T. Woolley"}, {"authorId": "35275545", "name": "R. Baker"}, - {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": "900d0c1cde69e3b499e4fe32850e604e151a9183", + {"authorId": "49792148", "name": "G. Morana"}]}, {"paperId": "900d0c1cde69e3b499e4fe32850e604e151a9183", "externalIds": {"MAG": "2128019864", "ArXiv": "1204.1475", "DOI": "10.1103/PhysRevE.86.046105", - "CorpusId": 21775794, "PubMed": "23214650"}, "url": "https://www.semanticscholar.org/paper/900d0c1cde69e3b499e4fe32850e604e151a9183", + "CorpusId": 21775794, "PubMed": "23214650"}, "corpusId": 21775794, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/900d0c1cde69e3b499e4fe32850e604e151a9183", "title": "Stochastic Turing patterns on a network.", "abstract": "The process of stochastic Turing instability on a scale-free network is discussed for a specific case study: the stochastic Brusselator model. The system is shown @@ -2738,8 +3163,9 @@ interactions: is explained analytically and eventually traced back to the finite-size corrections stemming from the inherent graininess of the scrutinized medium.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2012, "referenceCount": 24, "citationCount": 32, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + 2012, "referenceCount": 24, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1204.1475", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-04-06", "journal": {"name": "Physical @@ -2748,7 +3174,7 @@ interactions: Asslani"}, {"authorId": "2815566", "name": "F. Di Patti"}, {"authorId": "2334449", "name": "D. Fanelli"}]}, {"paperId": "eaf6596754237bbbabb63ca23738348fb3c44d3d", "externalIds": {"MAG": "2084736067", "DOI": "10.2996/KMJ/1341401049", "CorpusId": - 122190331}, "url": "https://www.semanticscholar.org/paper/eaf6596754237bbbabb63ca23738348fb3c44d3d", + 122190331}, "corpusId": 122190331, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eaf6596754237bbbabb63ca23738348fb3c44d3d", "title": "Unstable subsystems cause Turing instability", "abstract": "We study Turing instabilities in 3-component reaction-di\u00a4usion systems. The existence of a complementary pair of stable-unstable subsystems always gives rise to @@ -2798,39 +3224,47 @@ interactions: stability-instability properties of sub-matrices coexist, and give a perspective for remaining problems. 1.1. Statement of problem. We consider the 3-component system of reaction-di\u00a4usion equations;", "venue": "", "year": 2012, "referenceCount": - 26, "citationCount": 29, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2012-06-01", "journal": {"name": - "Kodai Mathematical Journal", "pages": "215-247", "volume": "35"}, "authors": - [{"authorId": "2188637", "name": "A. Anma"}, {"authorId": "70032451", "name": - "K. Sakamoto"}, {"authorId": "11389399", "name": "Tohru Yoneda"}]}, {"paperId": - "1b842c91d4c25c30f1f3e0f2a710cb922afc639a", "externalIds": {"DBLP": "journals/cacm/Hyman12e", - "MAG": "2003681217", "DOI": "10.1145/2330667.2330675", "CorpusId": 34144242}, - "url": "https://www.semanticscholar.org/paper/1b842c91d4c25c30f1f3e0f2a710cb922afc639a", + 26, "citationCount": 30, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://projecteuclid.org/journals/kodai-mathematical-journal/volume-35/issue-2/Unstable-subsystems-cause-Turing-instability/10.2996/kmj/1341401049.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-06-01", + "journal": {"name": "Kodai Mathematical Journal", "pages": "215-247", "volume": + "35"}, "authors": [{"authorId": "2188637", "name": "A. Anma"}, {"authorId": + "70032451", "name": "K. Sakamoto"}, {"authorId": "11389399", "name": "Tohru + Yoneda"}]}, {"paperId": "1b842c91d4c25c30f1f3e0f2a710cb922afc639a", "externalIds": + {"DBLP": "journals/cacm/Hyman12e", "MAG": "2003681217", "DOI": "10.1145/2330667.2330675", + "CorpusId": 34144242}, "corpusId": 34144242, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1b842c91d4c25c30f1f3e0f2a710cb922afc639a", "title": "In honor of Alan Turing", "abstract": "Thirty-two of the 39 living A.M. Turing Award laureates gathered in San Francisco to pay tribute to \"the father of CS\" and discuss the past, present, and future of computing.", "venue": "CACM", "year": 2012, "referenceCount": 0, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Geology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-09-01", "journal": {"name": "Commun. ACM", "pages": "20-23", "volume": - "55"}, "authors": [{"authorId": "71942287", "name": "P. Hyman"}]}, {"paperId": - "fe7670bf0429a6f4bc5d2d73d30008b95ab28858", "externalIds": {"DBLP": "journals/cacm/Cooper12", - "MAG": "2099294866", "DOI": "10.1145/2093548.2093569", "CorpusId": 38236507}, - "url": "https://www.semanticscholar.org/paper/fe7670bf0429a6f4bc5d2d73d30008b95ab28858", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Geology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-09-01", "journal": {"name": "Commun. ACM", "pages": + "20-23", "volume": "55"}, "authors": [{"authorId": "71942287", "name": "P. + Hyman"}]}, {"paperId": "fe7670bf0429a6f4bc5d2d73d30008b95ab28858", "externalIds": + {"DBLP": "journals/cacm/Cooper12", "MAG": "2099294866", "DOI": "10.1145/2093548.2093569", + "CorpusId": 38236507}, "corpusId": 38236507, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/fe7670bf0429a6f4bc5d2d73d30008b95ab28858", "title": "Turing''s Titanic machine?", "abstract": "Embodied and disembodied computing at the Turing Centenary.", "venue": "Communications of the ACM", "year": 2012, "referenceCount": 46, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=2093569&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-01", "journal": {"name": "Communications of the ACM", "pages": "74 - 83", "volume": "55"}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "3da7e3419d879fad9b02e993758a40e4d205d0e8", - "externalIds": {"CorpusId": 16301943}, "url": "https://www.semanticscholar.org/paper/3da7e3419d879fad9b02e993758a40e4d205d0e8", + "externalIds": {"CorpusId": 16301943}, "corpusId": 16301943, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3da7e3419d879fad9b02e993758a40e4d205d0e8", "title": "The Chemical Bases of Morphogenesis (Reprinted in AM Turing", "abstract": "The construction of redundancy is a private obstacle. It might seem unexpected but is supported by prior work in the field. In fact, few computational biologists @@ -2838,19 +3272,20 @@ interactions: algorithms to verify that the Turing machine and superblock s can interfere to address this problem.", "venue": "", "year": 2011, "referenceCount": 248, "citationCount": 171, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": []}, {"paperId": "4972e61ee8e16b8b2db2535531576151fc5e6e8a", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": []}, {"paperId": "4972e61ee8e16b8b2db2535531576151fc5e6e8a", "externalIds": {"MAG": "2491278050", "DOI": "10.1515/9781400844975", "CorpusId": - 123763078}, "url": "https://www.semanticscholar.org/paper/4972e61ee8e16b8b2db2535531576151fc5e6e8a", + 123763078}, "corpusId": 123763078, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4972e61ee8e16b8b2db2535531576151fc5e6e8a", "title": "Alan Turing: The Enigma: The Centenary Edition", "abstract": null, - "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 38, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}], "publicationTypes": null, - "publicationDate": "2012-05-27", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "040707dc83f9b0b680ad6594cedd455e47bfb1b4", - "externalIds": {"MAG": "2404728161", "DBLP": "conf/birthday/Hernandez-OralloIDH12", - "DOI": "10.29007/9n7d", "CorpusId": 5875412}, "url": "https://www.semanticscholar.org/paper/040707dc83f9b0b680ad6594cedd455e47bfb1b4", + "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 39, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History"], + "s2FieldsOfStudy": [{"category": "History", "source": "external"}], "publicationTypes": + null, "publicationDate": "2012-05-27", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "040707dc83f9b0b680ad6594cedd455e47bfb1b4", "externalIds": {"MAG": "2404728161", + "DBLP": "conf/birthday/Hernandez-OralloIDH12", "DOI": "10.29007/9n7d", "CorpusId": + 5875412}, "corpusId": 5875412, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/040707dc83f9b0b680ad6594cedd455e47bfb1b4", "title": "Turing Tests with Turing Machines", "abstract": "Comparative tests work by finding the difference (or the absence of difference) between a reference subject and an evaluee. The Turing Test, in its standard interpretation, takes @@ -2864,7 +3299,8 @@ interactions: perspective of game theory and others. Around these issues, this paper finally brings the Turing Test to the realm of Turing machines.", "venue": "Turing-100", "year": 2012, "referenceCount": 56, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://easychair.org/publications/open/qD", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-22", "journal": {"pages": "140-156"}, "authors": @@ -2872,7 +3308,8 @@ interactions: "1403897525", "name": "Javier Insa-Cabrera"}, {"authorId": "1745871", "name": "D. Dowe"}, {"authorId": "39109261", "name": "B. Hibbard"}]}, {"paperId": "0267a54606d17c33ad4acc23a8461dee5e0ab093", "externalIds": {"DOI": "10.1093/oso/9780198250791.001.0001", - "CorpusId": 1696047}, "url": "https://www.semanticscholar.org/paper/0267a54606d17c33ad4acc23a8461dee5e0ab093", + "CorpusId": 1696047}, "corpusId": 1696047, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0267a54606d17c33ad4acc23a8461dee5e0ab093", "title": "The Essential Turing", "abstract": "Many physicists would agree that, had it not been for rasterization, the exploration of IPv7 might never have occurred. In fact, few endusers would disagree with the simulation of @@ -2880,36 +3317,40 @@ interactions: split and congestion control are generally incompatible, but rather on exploring a novel application for the analysis of systems (Juge).", "venue": "", "year": 2011, "referenceCount": 284, "citationCount": 215, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "1489573598", "name": "O. - Bhabha"}]}, {"paperId": "ccdef928e9b9a078408d8b0b6a8e81502d4117c7", "externalIds": - {"DBLP": "journals/cacm/French12", "MAG": "2037051762", "DOI": "10.1145/2380656.2380674", - "CorpusId": 36762802}, "url": "https://www.semanticscholar.org/paper/ccdef928e9b9a078408d8b0b6a8e81502d4117c7", + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1489573598", + "name": "O. Bhabha"}]}, {"paperId": "ccdef928e9b9a078408d8b0b6a8e81502d4117c7", + "externalIds": {"DBLP": "journals/cacm/French12", "MAG": "2037051762", "DOI": + "10.1145/2380656.2380674", "CorpusId": 36762802}, "corpusId": 36762802, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ccdef928e9b9a078408d8b0b6a8e81502d4117c7", "title": "Moving beyond the Turing test", "abstract": "Computers interacting with, not imitating, humans is the way forward.", "venue": "CACM", "year": 2012, "referenceCount": 24, "citationCount": 32, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.eng.auburn.edu/~vagrawal/COURSE/READING/ARCH/CACM_BeyondTuringTest.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-01", "journal": {"name": "Commun. ACM", "pages": "74-77", "volume": "55"}, "authors": [{"authorId": "2440747", "name": "R. French"}]}, {"paperId": "6bfcd88733dff025bff449607b7b2ba0217e141d", "externalIds": {"DBLP": "conf/birthday/Freivalds12a", - "MAG": "2407743706", "DOI": "10.29007/tdf5", "CorpusId": 2642013}, "url": - "https://www.semanticscholar.org/paper/6bfcd88733dff025bff449607b7b2ba0217e141d", + "MAG": "2407743706", "DOI": "10.29007/tdf5", "CorpusId": 2642013}, "corpusId": + 2642013, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6bfcd88733dff025bff449607b7b2ba0217e141d", "title": "Ultrametric automata and Turing machines", "abstract": "We introduce a notion of ultrametric automata and Turing machines using p-adic numbers to describe random branching of the process of computation. These automata have properties similar to the properties of probabilistic automata but complexity of probabilistic automata and complexity of ultrametric automata can differ very much.", "venue": "Turing-100", "year": 2012, "referenceCount": 25, "citationCount": - 14, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "98-112"}, "authors": [{"authorId": "1723667", "name": "R. Freivalds"}]}, - {"paperId": "cd4b4c05dce06439f65a90dfc0146b9b958f81fa", "externalIds": {"CorpusId": - 17212761}, "url": "https://www.semanticscholar.org/paper/cd4b4c05dce06439f65a90dfc0146b9b958f81fa", + 14, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "https://easychair.org/publications/open/K3", "status": "BRONZE"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "98-112"}, "authors": [{"authorId": "1723667", + "name": "R. Freivalds"}]}, {"paperId": "cd4b4c05dce06439f65a90dfc0146b9b958f81fa", + "externalIds": {"CorpusId": 17212761}, "corpusId": 17212761, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/cd4b4c05dce06439f65a90dfc0146b9b958f81fa", "title": "The Collected Works of AM Turing : Mechanical Intelligence", "abstract": "Many leading analysts would agree that, had it not been for multimodal epistemologies, the development of congestion control might never have occurred. In this work, @@ -2917,11 +3358,12 @@ interactions: we confirm not only that the infamous symbiotic algorithm for the visualization of digital-to-analog converters by Z. Nehru runs in \u0398(2) time, but that the same is true for ebusiness.", "venue": "", "year": 2011, "referenceCount": - 152, "citationCount": 171, "influentialCitationCount": 6, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": []}, {"paperId": "b948b8efa46927fd1f7c2d34ff4e659620ddc5f5", - "externalIds": {"CorpusId": 10117333}, "url": "https://www.semanticscholar.org/paper/b948b8efa46927fd1f7c2d34ff4e659620ddc5f5", + 152, "citationCount": 172, "influentialCitationCount": 6, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": []}, {"paperId": "b948b8efa46927fd1f7c2d34ff4e659620ddc5f5", + "externalIds": {"CorpusId": 10117333}, "corpusId": 10117333, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b948b8efa46927fd1f7c2d34ff4e659620ddc5f5", "title": "Collected Works : Mathematical Logic Amsterdam etc Universal Turing Machine", "abstract": "The synthesis of the Ethernet is an appropriate riddle. In fact, few systems engineers would disagree with the visualization of hierarchical @@ -2929,11 +3371,12 @@ interactions: 148, 99, 58, 129, 168, 128]. We use omniscient methodologies to verify that context-free grammar and writeahead logging can synchronize to answer this quandary.", "venue": "", "year": 2011, "referenceCount": 245, "citationCount": - 149, "influentialCitationCount": 20, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "52f2febf8568dbb995c67e83e8299680f2cecb79", "externalIds": - {"CorpusId": 18601793}, "url": "https://www.semanticscholar.org/paper/52f2febf8568dbb995c67e83e8299680f2cecb79", + 149, "influentialCitationCount": 20, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "52f2febf8568dbb995c67e83e8299680f2cecb79", + "externalIds": {"CorpusId": 18601793}, "corpusId": 18601793, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/52f2febf8568dbb995c67e83e8299680f2cecb79", "title": "Can a Machine Think ? The World of Mathematics Universal Turing Machine", "abstract": "The refinement of checksums is an essential grand challenge. Given the current status of lossless information, theorists clearly desire @@ -2942,10 +3385,11 @@ interactions: IPv4 can be made relational, constant-time, and decentralized, but rather on proposing new linear-time symmetries (YEW).", "venue": "", "year": 2011, "referenceCount": 243, "citationCount": 173, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": "35d0488b3c521367dee74af8185856336b5b8a0a", - "externalIds": {"CorpusId": 14061847}, "url": "https://www.semanticscholar.org/paper/35d0488b3c521367dee74af8185856336b5b8a0a", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "35d0488b3c521367dee74af8185856336b5b8a0a", "externalIds": {"CorpusId": 14061847}, + "corpusId": 14061847, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/35d0488b3c521367dee74af8185856336b5b8a0a", "title": "The Legacy of Alan Turing : Connectionism concepts and folk psychology", "abstract": "In recent years, much research has been devoted to the simulation of write-ahead logging; unfortunately, few hav e simulated the study of Markov @@ -2955,10 +3399,11 @@ interactions: [188], [62], [70], [179], [68], [95], [18 8], [54], [152], [191], [59], [168], [148], [99], [58], [129], [ 179], [128], [106] is maximally efficient.", "venue": "", "year": 2011, "referenceCount": 264, "citationCount": 170, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "3301167d98d4b1f55a51517671dc4a92417f2ed9", - "externalIds": {"CorpusId": 16068434}, "url": "https://www.semanticscholar.org/paper/3301167d98d4b1f55a51517671dc4a92417f2ed9", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "3301167d98d4b1f55a51517671dc4a92417f2ed9", "externalIds": {"CorpusId": 16068434}, + "corpusId": 16068434, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3301167d98d4b1f55a51517671dc4a92417f2ed9", "title": "AM Turing\u2019s Original Proposal for the Development of an Electronic Computer: Reprinted with a Foreword by DW Davies", "abstract": "Signed algorithms and scatter/gather I/O have garnered tremendous interest from both system @@ -2967,12 +3412,13 @@ interactions: of IPv4. In this work, we concentrate our efforts on proving that online algorithms and XML can interfere to accomplish this aim.", "venue": "", "year": 2011, "referenceCount": 157, "citationCount": 170, "influentialCitationCount": 5, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": "e127369c02476cfa65184dff4ca02a66e419f263", "externalIds": - {"CorpusId": 11867028}, "url": "https://www.semanticscholar.org/paper/e127369c02476cfa65184dff4ca02a66e419f263", + {"CorpusId": 11867028}, "corpusId": 11867028, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e127369c02476cfa65184dff4ca02a66e419f263", "title": "Systems of logic defined by ordinals Universal Turing Machine", "abstract": "The machine learning approach to kernels is defined not only by the synthesis of consistent hashing, but also by the confusing need for @@ -2981,35 +3427,72 @@ interactions: which embodies the technical principles of steganography. We present a framework for mobile theory, which we call Deed. This is crucial to the success of our work.", "venue": "", "year": 2011, "referenceCount": 234, "citationCount": - 113, "influentialCitationCount": 41, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "91e5ff3ddf09eb3ea561cc040d0b877d654ad67a", "externalIds": - {"MAG": "2135544531", "DOI": "10.1016/j.tics.2011.05.007", "CorpusId": 30677, - "PubMed": "21696998"}, "url": "https://www.semanticscholar.org/paper/91e5ff3ddf09eb3ea561cc040d0b877d654ad67a", + 114, "influentialCitationCount": 41, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "91e5ff3ddf09eb3ea561cc040d0b877d654ad67a", + "externalIds": {"MAG": "2135544531", "DOI": "10.1016/j.tics.2011.05.007", + "CorpusId": 30677, "PubMed": "21696998"}, "corpusId": 30677, "publicationVenue": + {"id": "20cb626a-518d-4016-826a-0157cf2f8fd6", "name": "Trends in Cognitive + Sciences", "type": "journal", "alternate_names": ["Trends Cogn Sci"], "issn": + "1364-6613", "url": "https://www.cell.com/trends/cognitive-sciences/home", + "alternate_urls": ["http://www.cell.com/trends/cognitive-sciences/home", "https://www.journals.elsevier.com/trends-in-cognitive-sciences", + "http://www.sciencedirect.com/science/journal/13646613"]}, "url": "https://www.semanticscholar.org/paper/91e5ff3ddf09eb3ea561cc040d0b877d654ad67a", "title": "The human Turing machine: a neural framework for mental programs", "abstract": null, "venue": "Trends in Cognitive Sciences", "year": 2011, "referenceCount": 77, "citationCount": 142, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-07-01", "journal": {"name": "Trends in Cognitive - Sciences", "pages": "293-300", "volume": "15"}, "authors": [{"authorId": "2023576", - "name": "Ariel Zylberberg"}, {"authorId": "1787332", "name": "S. Dehaene"}, - {"authorId": "1698275", "name": "P. Roelfsema"}, {"authorId": "2100043776", - "name": "M. Sigman"}]}, {"paperId": "52dc63ae951df6cf0c53744cfaf01475bd0938f1", - "externalIds": {"CorpusId": 12621683}, "url": "https://www.semanticscholar.org/paper/52dc63ae951df6cf0c53744cfaf01475bd0938f1", + "openAccessPdf": null, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-07-01", "journal": + {"name": "Trends in Cognitive Sciences", "pages": "293-300", "volume": "15"}, + "authors": [{"authorId": "2023576", "name": "Ariel Zylberberg"}, {"authorId": + "1787332", "name": "S. Dehaene"}, {"authorId": "1698275", "name": "P. Roelfsema"}, + {"authorId": "2100043776", "name": "M. Sigman"}]}, {"paperId": "e8d4a179a04aca15c2b99ee9d15b08ea5134a7e5", + "externalIds": {"MAG": "1983410640", "ArXiv": "1011.0466", "DOI": "10.1103/PhysRevE.84.011112", + "CorpusId": 328339, "PubMed": "21867118"}, "corpusId": 328339, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e8d4a179a04aca15c2b99ee9d15b08ea5134a7e5", + "title": "Fluctuation-driven Turing patterns.", "abstract": "Models of diffusion-driven + pattern formation that rely on the Turing mechanism are utilized in many areas + of science. However, many such models suffer from the defect of requiring + fine tuning of parameters or an unrealistic separation of scales in the diffusivities + of the constituents of the system in order to predict the formation of spatial + patterns. In the context of a very generic model of ecological pattern formation, + we show that the inclusion of intrinsic noise in Turing models leads to the + formation of \"quasipatterns\" that form in generic regions of parameter space + and are experimentally distinguishable from standard Turing patterns. The + existence of quasipatterns removes the need for unphysical fine tuning or + separation of scales in the application of Turing models to real systems.", + "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "year": 2010, "referenceCount": 32, "citationCount": 90, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.aps.org/accepted/10.1103/PhysRevE.84.011112", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Biology", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-11-01", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 011112\n ", + "volume": "84 1 Pt 1"}, "authors": [{"authorId": "46825432", "name": "Thomas + Butler"}, {"authorId": "3549131", "name": "N. Goldenfeld"}]}, {"paperId": + "52dc63ae951df6cf0c53744cfaf01475bd0938f1", "externalIds": {"CorpusId": 12621683}, + "corpusId": 12621683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/52dc63ae951df6cf0c53744cfaf01475bd0938f1", "title": "The p functions in K conversion Universal Turing Machine", "abstract": "Cache coherence must work. In this position paper, we prove the construction of IPv7, which embodies the typical principles of cryptoanalysis. In this position paper we con centrate our efforts on confirming that reinforcement learning can be made mobile, scalable, and wireless.", "venue": "", "year": 2011, "referenceCount": 248, "citationCount": 99, "influentialCitationCount": - 26, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "14a0e8679a6575c6d8ec10cac77492f89645a9b3", - "externalIds": {"ArXiv": "1105.3986", "MAG": "2007771417", "DOI": "10.1103/PhysRevLett.107.120501", - "CorpusId": 11322270, "PubMed": "22026760"}, "url": "https://www.semanticscholar.org/paper/14a0e8679a6575c6d8ec10cac77492f89645a9b3", + 26, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "14a0e8679a6575c6d8ec10cac77492f89645a9b3", "externalIds": {"ArXiv": "1105.3986", + "MAG": "2007771417", "DOI": "10.1103/PhysRevLett.107.120501", "CorpusId": + 11322270, "PubMed": "22026760"}, "corpusId": 11322270, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/14a0e8679a6575c6d8ec10cac77492f89645a9b3", "title": "Dissipative quantum Church-Turing theorem.", "abstract": "We show that the time evolution of an open quantum system, described by a possibly time dependent Liouvillian, can be simulated by a unitary quantum circuit @@ -3024,6 +3507,7 @@ interactions: operators. We also demonstrate that most quantum states cannot be prepared efficiently.", "venue": "Physical Review Letters", "year": 2011, "referenceCount": 8, "citationCount": 91, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1105.3986", "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": @@ -3033,34 +3517,13 @@ interactions: "2040995", "name": "M. Kliesch"}, {"authorId": "48582879", "name": "T. Barthel"}, {"authorId": "3348073", "name": "C. Gogolin"}, {"authorId": "15866728", "name": "M. Kastoryano"}, {"authorId": "2334630", "name": "J. Eisert"}]}, {"paperId": - "e8d4a179a04aca15c2b99ee9d15b08ea5134a7e5", "externalIds": {"MAG": "1983410640", - "ArXiv": "1011.0466", "DOI": "10.1103/PhysRevE.84.011112", "CorpusId": 328339, - "PubMed": "21867118"}, "url": "https://www.semanticscholar.org/paper/e8d4a179a04aca15c2b99ee9d15b08ea5134a7e5", - "title": "Fluctuation-driven Turing patterns.", "abstract": "Models of diffusion-driven - pattern formation that rely on the Turing mechanism are utilized in many areas - of science. However, many such models suffer from the defect of requiring - fine tuning of parameters or an unrealistic separation of scales in the diffusivities - of the constituents of the system in order to predict the formation of spatial - patterns. In the context of a very generic model of ecological pattern formation, - we show that the inclusion of intrinsic noise in Turing models leads to the - formation of \"quasipatterns\" that form in generic regions of parameter space - and are experimentally distinguishable from standard Turing patterns. The - existence of quasipatterns removes the need for unphysical fine tuning or - separation of scales in the application of Turing models to real systems.", - "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "year": 2010, "referenceCount": 32, "citationCount": 88, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine", "Biology", - "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-11-01", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 011112\n ", - "volume": "84 1 Pt 1"}, "authors": [{"authorId": "46825432", "name": "Thomas - Butler"}, {"authorId": "3549131", "name": "N. Goldenfeld"}]}, {"paperId": "ec8d9283159adca6cc4fb2c1d29382096218eb80", "externalIds": {"MAG": "2091354445", "DOI": "10.1126/science.1200815", "CorpusId": 206531319, "PubMed": "21310963"}, - "url": "https://www.semanticscholar.org/paper/ec8d9283159adca6cc4fb2c1d29382096218eb80", + "corpusId": 206531319, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/ec8d9283159adca6cc4fb2c1d29382096218eb80", "title": "Tomography of Reaction-Diffusion Microemulsions Reveals Three-Dimensional Turing Patterns", "abstract": "Tomography reveals three-dimensional Turing patterns created by the Belousov-Zhabotinsky reaction running in a microemulsion. @@ -3075,14 +3538,16 @@ interactions: including curved surfaces, hexagonally packed cylinders, spots, and labyrinthine and lamellar patterns.", "venue": "Science", "year": 2011, "referenceCount": 35, "citationCount": 102, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-03-11", "journal": {"name": "Science", "pages": "1309 - - 1312", "volume": "331"}, "authors": [{"authorId": "50453551", "name": "T. - B\u00e1ns\u00e1gi"}, {"authorId": "2258489", "name": "V. Vanag"}, {"authorId": - "144854275", "name": "I. Epstein"}]}, {"paperId": "bce9af7654176bfb41bf4ad9c8e536f64e163ea3", - "externalIds": {"MAG": "2973143215", "CorpusId": 14353358}, "url": "https://www.semanticscholar.org/paper/bce9af7654176bfb41bf4ad9c8e536f64e163ea3", + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-03-11", "journal": + {"name": "Science", "pages": "1309 - 1312", "volume": "331"}, "authors": [{"authorId": + "50453551", "name": "T. B\u00e1ns\u00e1gi"}, {"authorId": "2258489", "name": + "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": + "bce9af7654176bfb41bf4ad9c8e536f64e163ea3", "externalIds": {"MAG": "2973143215", + "CorpusId": 14353358}, "corpusId": 14353358, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bce9af7654176bfb41bf4ad9c8e536f64e163ea3", "title": "On impact and evaluation in computational creativity: a discussion of the Turing Test and an alternative proposal", "abstract": "Computational Creativity is the AI subfield in which we study how to build computational @@ -3217,13 +3682,14 @@ interactions: novel with respect to the whole of human history ), they do argue that much creative work is carried out within a particular style. They cite Garnham\u2019s response ", "venue": "", "year": 2011, "referenceCount": 47, "citationCount": - 77, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2011-12-01", "journal": {"name": "", "pages": "15-22", - "volume": ""}, "authors": [{"authorId": "145516989", "name": "A. Pease"}, - {"authorId": "1687610", "name": "S. Colton"}]}, {"paperId": "d408100f3c87e746ee4a0838333b342384fd380c", - "externalIds": {"CorpusId": 8042983}, "url": "https://www.semanticscholar.org/paper/d408100f3c87e746ee4a0838333b342384fd380c", + 77, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2011-12-01", "journal": {"name": + "", "pages": "15-22", "volume": ""}, "authors": [{"authorId": "145516989", + "name": "A. Pease"}, {"authorId": "1687610", "name": "S. Colton"}]}, {"paperId": + "d408100f3c87e746ee4a0838333b342384fd380c", "externalIds": {"CorpusId": 8042983}, + "corpusId": 8042983, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d408100f3c87e746ee4a0838333b342384fd380c", "title": "Lecture on the automatic computing engine ; reprinted in ( Copeland 2004 ) Universal Turing Machine", "abstract": "Amphibious communication and RAID have garnered tremendous interest from both biologists and cyberinforma @@ -3231,22 +3697,29 @@ interactions: gigabit switches, we prove the evaluation of Boolean logic. We describe a novel application for the exploration o f access points, which we call Die.", "venue": "", "year": 2011, "referenceCount": 341, "citationCount": 111, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "433ec58bba197c101fbee9ac63e8899ab90041ba", - "externalIds": {"DBLP": "journals/corr/abs-1105-1215", "MAG": "2982228946", - "DOI": "10.1007/978-3-642-23638-9_15", "CorpusId": 25615667}, "url": "https://www.semanticscholar.org/paper/433ec58bba197c101fbee9ac63e8899ab90041ba", + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "433ec58bba197c101fbee9ac63e8899ab90041ba", "externalIds": {"DBLP": "journals/corr/abs-1105-1215", + "MAG": "2982228946", "DOI": "10.1007/978-3-642-23638-9_15", "CorpusId": 25615667}, + "corpusId": 25615667, "publicationVenue": {"id": "31f44e5f-f988-4a14-a236-2ecf8d216061", + "name": "DNA", "type": "conference", "alternate_names": ["International Meeting + on DNA Computing", "Int Meet DNA Comput"], "issn": "0198-0238", "alternate_issns": + ["2673-8856", "1557-7430"], "url": "http://www.liebertonline.com/loi/dna", + "alternate_urls": ["https://www.liebertpub.com/loi/dna", "http://www.liebertpub.com/DNA"]}, + "url": "https://www.semanticscholar.org/paper/433ec58bba197c101fbee9ac63e8899ab90041ba", "title": "Exact Shapes and Turing Universality at Temperature 1 with a Single Negative Glue", "abstract": null, "venue": "DNA", "year": 2011, "referenceCount": 25, "citationCount": 59, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2011-05-06", "journal": {"pages": "175-189"}, "authors": [{"authorId": "1766539", "name": "Matthew J. Patitz"}, {"authorId": "2205907", "name": "R. Schweller"}, {"authorId": "1794328", "name": "Scott M. Summers"}]}, {"paperId": "6f1087e5e0d7ce7da15d364a4ea60a563cc000bf", - "externalIds": {"CorpusId": 16547112}, "url": "https://www.semanticscholar.org/paper/6f1087e5e0d7ce7da15d364a4ea60a563cc000bf", + "externalIds": {"CorpusId": 16547112}, "corpusId": 16547112, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6f1087e5e0d7ce7da15d364a4ea60a563cc000bf", "title": "A chemical basis for biological morphogenesis Universal Turing Machine", "abstract": "Unified probabilistic communication have led to many private advances, including information retrieval systems and digital-to-analog converters @@ -3256,11 +3729,17 @@ interactions: we use perfect theory to validate that the well-known secure algorithm for the visualization of reinforcement learning by R. Tarjan is recursively enumerable.", "venue": "", "year": 2011, "referenceCount": 155, "citationCount": 71, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "a4cc37f6ed8ba00e28869ab0ebd6ddafd5028fd0", - "externalIds": {"MAG": "2005295914", "DOI": "10.1093/bjps/axr016", "CorpusId": - 5577525}, "url": "https://www.semanticscholar.org/paper/a4cc37f6ed8ba00e28869ab0ebd6ddafd5028fd0", + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "a4cc37f6ed8ba00e28869ab0ebd6ddafd5028fd0", "externalIds": {"MAG": "2005295914", + "DOI": "10.1093/bjps/axr016", "CorpusId": 5577525}, "corpusId": 5577525, "publicationVenue": + {"id": "ccf23a34-337a-4763-916a-9c16c580e0e1", "name": "British Journal for + the Philosophy of Science", "type": "journal", "alternate_names": ["Br J Philos + Sci", "The British Journal for the Philosophy of Science"], "issn": "0007-0882", + "url": "https://www.journals.uchicago.edu/toc/bjps/current", "alternate_urls": + ["https://www.jstor.org/journal/britjphilscie", "http://bjps.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/a4cc37f6ed8ba00e28869ab0ebd6ddafd5028fd0", "title": "The Physical Church\u2013Turing Thesis: Modest or Bold?", "abstract": "This article defends a modest version of the Physical Church-Turing thesis (CT). Following an established recent trend, I distinguish between what I @@ -3296,15 +3775,23 @@ interactions: and spurious \u2003\u20034.2\u2003Relativistic hypercomputers \u2003\u20034.3\u2003Other challenges to Modest Physical CT 5\u2003Conclusion", "venue": "British Journal for the Philosophy of Science", "year": 2011, "referenceCount": 153, "citationCount": - 42, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-12-01", "journal": {"name": - "The British Journal for the Philosophy of Science", "pages": "733 - 769", - "volume": "62"}, "authors": [{"authorId": "144363427", "name": "G. Piccinini"}]}, - {"paperId": "3f155b09cd5570fe650afdd63fdc93055150c198", "externalIds": {"DBLP": - "conf/ieeehpcs/Rendell11", "MAG": "2170257345", "DOI": "10.1109/HPCSim.2011.5999906", - "CorpusId": 35957181}, "url": "https://www.semanticscholar.org/paper/3f155b09cd5570fe650afdd63fdc93055150c198", + 43, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-12-01", + "journal": {"name": "The British Journal for the Philosophy of Science", "pages": + "733 - 769", "volume": "62"}, "authors": [{"authorId": "144363427", "name": + "G. Piccinini"}]}, {"paperId": "3f155b09cd5570fe650afdd63fdc93055150c198", + "externalIds": {"DBLP": "conf/ieeehpcs/Rendell11", "MAG": "2170257345", "DOI": + "10.1109/HPCSim.2011.5999906", "CorpusId": 35957181}, "corpusId": 35957181, + "publicationVenue": {"id": "e1ce0fed-d655-40bd-b678-9adc73f2e582", "name": + "International Symposium on High Performance Computing Systems and Applications", + "type": "conference", "alternate_names": ["International Conference on High + Performance Computing and Simulation", "Int Conf High Perform Comput Simul", + "Int Symp High Perform Comput Syst Appl", "High Performance Computing Systems + and Applications", "High Perform Comput Syst Appl", "Int Conf High Perform + Comput Simul", "HPCS", "International Conference on High Performance Computing + & Simulation"]}, "url": "https://www.semanticscholar.org/paper/3f155b09cd5570fe650afdd63fdc93055150c198", "title": "A Universal Turing Machine in Conway''s Game of Life", "abstract": "In this paper we present a Universal Turing Machine build in the Cellular Automaton Conway''s Game of Life. This is an extension of the Turing Machine @@ -3316,24 +3803,49 @@ interactions: in the stack construction is described.", "venue": "International Symposium on High Performance Computing Systems and Applications", "year": 2011, "referenceCount": 16, "citationCount": 43, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2011-07-04", "journal": {"name": "2011 International Conference on High Performance - Computing & Simulation", "pages": "764-772"}, "authors": [{"authorId": "11060403", - "name": "Paul W. Rendell"}]}, {"paperId": "b13649eda87136d5b7b6319606fafcfac5a1ec6a", - "externalIds": {"CorpusId": 582065}, "url": "https://www.semanticscholar.org/paper/b13649eda87136d5b7b6319606fafcfac5a1ec6a", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2011-07-04", "journal": {"name": "2011 + International Conference on High Performance Computing & Simulation", "pages": + "764-772"}, "authors": [{"authorId": "11060403", "name": "Paul W. Rendell"}]}, + {"paperId": "cd68ad831ecc68e7adf302685cce68e930c22b57", "externalIds": {"MAG": + "2080980244", "DOI": "10.1103/PHYSREVE.84.016222", "CorpusId": 27395299, "PubMed": + "21867288"}, "corpusId": 27395299, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cd68ad831ecc68e7adf302685cce68e930c22b57", + "title": "Control of the Hopf-Turing transition by time-delayed global feedback + in a reaction-diffusion system.", "abstract": "Application of time-delayed + feedback is a practical method of controlling bifurcations in reaction-diffusion + systems. It has been shown that for a suitable feedback strength, time delay + beyond a threshold may induce spatiotemporal instabilities. For an appropriate + parameter space with differential diffusivities of the activator-inhibitor + species, delayed feedback may generate Turing instability via a Hopf-Turing + transition, resulting in stationary patterns. This is explored by a theoretical + scheme in a photosensitive chlorine dioxide-iodine-malonic acid reaction-diffusion + system where the delayed feedback is externally tuned by photoillumination + intensity. Our analytical results corroborate with direct numerical simulations.", + "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "year": 2011, "referenceCount": 0, "citationCount": 42, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-07-25", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 016222\n ", "volume": + "84 1 Pt 2"}, "authors": [{"authorId": "4032821", "name": "Pushpita Ghosh"}]}, + {"paperId": "b13649eda87136d5b7b6319606fafcfac5a1ec6a", "externalIds": {"CorpusId": + 582065}, "corpusId": 582065, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b13649eda87136d5b7b6319606fafcfac5a1ec6a", "title": "The automatic computing machine : Papers by Alan Turing and", "abstract": "Context-free grammar must work. Given the current status of symbiotic modalities, information theorists predictably desire the visualization of Scheme. Our focus in this position paper is not on whether agents can be made heterogeneous, adaptive, and constant-time, but rather on presenting new client-server theory (Tat).", "venue": "", "year": 2011, "referenceCount": 158, "citationCount": - 133, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "11125381", "name": "M. Woodger"}]}, {"paperId": "cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", - "externalIds": {"CorpusId": 31729897}, "url": "https://www.semanticscholar.org/paper/cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", + 133, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "11125381", "name": "M. Woodger"}]}, + {"paperId": "cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", "externalIds": {"CorpusId": + 31729897}, "corpusId": 31729897, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", "title": "Truth and Turing : Systems of Logic based on Ordinals", "abstract": "We should like to link Turing\u2019s construction in Systems of Logic based on Ordinals on progressions of theories, with some recent similar looking @@ -3378,10 +3890,49 @@ interactions: unprovable in PA (assuming that it was itself consistent). Martin Davis refers to the paper in his introduction in a volume of collected sources", "venue": "", "year": 2011, "referenceCount": 6, "citationCount": 32, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "671ab0ee2621fdf4466c4973cca944e70696c856", - "externalIds": {"CorpusId": 14519482}, "url": "https://www.semanticscholar.org/paper/671ab0ee2621fdf4466c4973cca944e70696c856", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "50642580e304025d23a2e8c035262c845e037569", "externalIds": {"MAG": "2055942395", + "DOI": "10.1007/s11538-011-9634-8", "CorpusId": 5075750, "PubMed": "21347815"}, + "corpusId": 5075750, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/50642580e304025d23a2e8c035262c845e037569", + "title": "The Dynamics of Turing Patterns for\u00a0Morphogen-Regulated Growing + Domains with\u00a0Cellular Response Delays", "abstract": null, "venue": "Bulletin + of Mathematical Biology", "year": 2011, "referenceCount": 51, "citationCount": + 36, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-02-24", "journal": + {"name": "Bulletin of Mathematical Biology", "pages": "2527-2551", "volume": + "73"}, "authors": [{"authorId": "4875488", "name": "S. Seirin Lee"}, {"authorId": + "2662569", "name": "E. Gaffney"}, {"authorId": "35275545", "name": "R. Baker"}]}, + {"paperId": "2e4c4ed4c1f8bc2440b5c92815a4f5163a7075d1", "externalIds": {"MAG": + "2092424552", "DOI": "10.1103/PHYSREVLETT.64.2953", "CorpusId": 36147997, + "PubMed": "10041855"}, "corpusId": 36147997, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/2e4c4ed4c1f8bc2440b5c92815a4f5163a7075d1", + "title": "Experimental evidence of a sustained standing Turing-type nonequilibrium + chemical pattern.", "abstract": "We report the experimental observation of + a sustained standing nonequilibrium chemical pattern in a single-phase open + reactor. Considering the properties of the pattern (symmetry breaking, intrinsic + wavelength), it is interpreted as the first unambiguous experimental evidence + of a Turing structure.", "venue": "Physical Review Letters", "year": 1990, + "referenceCount": 1, "citationCount": 950, "influentialCitationCount": 8, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1990-06-11", "journal": {"name": "Physical review letters", "pages": "\n 2953-2956\n ", + "volume": "64 24"}, "authors": [{"authorId": "50371129", "name": "Castets"}, + {"authorId": "30093755", "name": "Dulos"}, {"authorId": "30159233", "name": + "Boissonade"}, {"authorId": "30068722", "name": "De Kepper P"}]}, {"paperId": + "671ab0ee2621fdf4466c4973cca944e70696c856", "externalIds": {"CorpusId": 14519482}, + "corpusId": 14519482, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/671ab0ee2621fdf4466c4973cca944e70696c856", "title": "Machines and Thought : Machines and thought Universal Turing Machine", "abstract": "Futurists agree that interposable symmetries are an interesting new topic in the field of theory, and information theorists concur. After @@ -3390,10 +3941,11 @@ interactions: we confirm not only that digital-to-analog converters and digital-toanalog converters are generally incompatible, but that the same is true for Web services.", "venue": "", "year": 2011, "referenceCount": 235, "citationCount": 70, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": []}, {"paperId": "07dd65bd4eb09525e75a7208494bb4108a58a406", - "externalIds": {"CorpusId": 17664634}, "url": "https://www.semanticscholar.org/paper/07dd65bd4eb09525e75a7208494bb4108a58a406", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "07dd65bd4eb09525e75a7208494bb4108a58a406", "externalIds": {"CorpusId": 17664634}, + "corpusId": 17664634, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/07dd65bd4eb09525e75a7208494bb4108a58a406", "title": "The Automatic Computing Engine : Papers by Alan Turing and Michael Woodger Universal Turing Machine", "abstract": "The exploration of A* search has studied telephony, and current trends suggest that the visualization of @@ -3404,26 +3956,13 @@ interactions: is the solution to all of these obstacles. Though such a hypothesis might seem perverse, it has ample historical precedence.", "venue": "", "year": 2011, "referenceCount": 332, "citationCount": 106, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "11125381", - "name": "M. Woodger"}]}, {"paperId": "50642580e304025d23a2e8c035262c845e037569", - "externalIds": {"MAG": "2055942395", "DOI": "10.1007/s11538-011-9634-8", "CorpusId": - 5075750, "PubMed": "21347815"}, "url": "https://www.semanticscholar.org/paper/50642580e304025d23a2e8c035262c845e037569", - "title": "The Dynamics of Turing Patterns for\u00a0Morphogen-Regulated Growing - Domains with\u00a0Cellular Response Delays", "abstract": null, "venue": "Bulletin - of Mathematical Biology", "year": 2011, "referenceCount": 51, "citationCount": - 34, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-02-24", "journal": {"name": "Bulletin - of Mathematical Biology", "pages": "2527-2551", "volume": "73"}, "authors": - [{"authorId": "4875488", "name": "S. Seirin Lee"}, {"authorId": "2662569", - "name": "E. Gaffney"}, {"authorId": "35275545", "name": "R. Baker"}]}, {"paperId": - "a1124aca43b60b1e5777ae9a9c9a34695f247a30", "externalIds": {"MAG": "2158797310", - "DBLP": "conf/ijcnn/CabessaS11", "DOI": "10.1109/IJCNN.2011.6033645", "CorpusId": - 14243016}, "url": "https://www.semanticscholar.org/paper/a1124aca43b60b1e5777ae9a9c9a34695f247a30", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "11125381", + "name": "M. Woodger"}]}, {"paperId": "a1124aca43b60b1e5777ae9a9c9a34695f247a30", + "externalIds": {"MAG": "2158797310", "DBLP": "conf/ijcnn/CabessaS11", "DOI": + "10.1109/IJCNN.2011.6033645", "CorpusId": 14243016}, "corpusId": 14243016, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1124aca43b60b1e5777ae9a9c9a34695f247a30", "title": "Evolving recurrent neural networks are super-Turing", "abstract": "The computational power of recurrent neural networks is intimately related to the nature of their synaptic weights. In particular, neural networks with @@ -3436,23 +3975,32 @@ interactions: These results suggest that evolution might play a crucial role in the computational capabilities of neural networks.", "venue": "The 2011 International Joint Conference on Neural Networks", "year": 2011, "referenceCount": 10, "citationCount": - 32, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2011-10-03", - "journal": {"name": "The 2011 International Joint Conference on Neural Networks", - "pages": "3200-3206"}, "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie - Cabessa"}, {"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": - "b5ec106c9ef346d01f45fbd56ba169589279e4f1", "externalIds": {"DBLP": "journals/moc/Trudgian11", - "MAG": "2949624891", "ArXiv": "0903.1885", "DOI": "10.1090/S0025-5718-2011-02470-1", - "CorpusId": 11044586}, "url": "https://www.semanticscholar.org/paper/b5ec106c9ef346d01f45fbd56ba169589279e4f1", + 32, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2011-10-03", "journal": {"name": "The 2011 International + Joint Conference on Neural Networks", "pages": "3200-3206"}, "authors": [{"authorId": + "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "2797623", "name": + "H. Siegelmann"}]}, {"paperId": "b5ec106c9ef346d01f45fbd56ba169589279e4f1", + "externalIds": {"DBLP": "journals/moc/Trudgian11", "MAG": "2949624891", "ArXiv": + "0903.1885", "DOI": "10.1090/S0025-5718-2011-02470-1", "CorpusId": 11044586}, + "corpusId": 11044586, "publicationVenue": {"id": "f1022129-db8f-4da5-b0c4-89602aeaea04", + "name": "Mathematics of Computation", "type": "journal", "alternate_names": + ["Mathematical computation", "Math comput", "Math Comput"], "issn": "0025-5718", + "alternate_issns": ["2327-0519", "2327-0527"], "url": "http://www.ams.org/mcom/", + "alternate_urls": ["http://www.ivypub.org/mc/", "http://www.ams.org/publications/journals/journalsframework/mcom", + "https://www.jstor.org/journal/mathcomp", "http://www.jstor.org/journals/00255718.html", + "https://www.ams.org/publications/journals/journalsframework/mcom"]}, "url": + "https://www.semanticscholar.org/paper/b5ec106c9ef346d01f45fbd56ba169589279e4f1", "title": "Improvements to Turing''s method", "abstract": "This paper refines the argument of Lehman by reducing the size of the constants in Turing''s method. This improvement is given in Theorem 1 and scope for further improvements is also given. Analogous improvements to Dirichlet L-functions and Dedekind zeta-functions are also included.", "venue": "Mathematics of Computation", "year": 2009, "referenceCount": 26, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/mcom/2011-80-276/S0025-5718-2011-02470-1/S0025-5718-2011-02470-1.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -3460,7 +4008,7 @@ interactions: "80"}, "authors": [{"authorId": "71763228", "name": "T. Trudgian"}]}, {"paperId": "04bebc8d70bf8980b33bc5449a4882d07d8994af", "externalIds": {"MAG": "2040570894", "DOI": "10.1103/PHYSREVE.83.036105", "CorpusId": 44534379, "PubMed": "21517556"}, - "url": "https://www.semanticscholar.org/paper/04bebc8d70bf8980b33bc5449a4882d07d8994af", + "corpusId": 44534379, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/04bebc8d70bf8980b33bc5449a4882d07d8994af", "title": "Effects of cross diffusion on Turing bifurcations in two-species reaction-transport systems.", "abstract": "We study the Turing bifurcation in general two-species reaction-transport systems, where particle dispersal @@ -3470,16 +4018,33 @@ interactions: model systems, the Lengyel-Epstein model and the Brusselator, and find strong effects of cross diffusion on the Turing bifurcation.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2011, - "referenceCount": 33, "citationCount": 29, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-03-11", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 036105\n ", "volume": "83 3 Pt 2"}, "authors": - [{"authorId": "37796184", "name": "Niraj Kumar"}, {"authorId": "3041313", - "name": "W. Horsthemke"}]}, {"paperId": "78d2642a4233527ea00c33eb1de442991e1645bc", - "externalIds": {"MAG": "102537316", "CorpusId": 115304740}, "url": "https://www.semanticscholar.org/paper/78d2642a4233527ea00c33eb1de442991e1645bc", + "referenceCount": 33, "citationCount": 30, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-03-11", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 036105\n ", "volume": + "83 3 Pt 2"}, "authors": [{"authorId": "37796184", "name": "Niraj Kumar"}, + {"authorId": "3041313", "name": "W. Horsthemke"}]}, {"paperId": "f57ad33088ff5f468b8d9ca1e36fd62308444335", + "externalIds": {"MAG": "2008363747", "DBLP": "journals/mima/CopelandS11", + "DOI": "10.1007/s11023-011-9238-y", "CorpusId": 44276296}, "corpusId": 44276296, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/f57ad33088ff5f468b8d9ca1e36fd62308444335", + "title": "Do Accelerating Turing Machines Compute the Uncomputable?", "abstract": + null, "venue": "Minds and Machines", "year": 2011, "referenceCount": 70, "citationCount": + 27, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-05-01", "journal": {"name": "Minds and Machines", "pages": "221-239", + "volume": "21"}, "authors": [{"authorId": "144246233", "name": "B. Copeland"}, + {"authorId": "1742013", "name": "Oron Shagrir"}]}, {"paperId": "78d2642a4233527ea00c33eb1de442991e1645bc", + "externalIds": {"MAG": "102537316", "CorpusId": 115304740}, "corpusId": 115304740, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/78d2642a4233527ea00c33eb1de442991e1645bc", "title": "Turing instability and wave patterns for a symmetric discrete competitive Lotka-Volterra system", "abstract": "In this paper, Turing instability of a symmetric discrete competitive Lotka-Volterra system is considered. To this @@ -3493,40 +4058,35 @@ interactions: be obtained for the corresponding continuous models. On the other hand, the number of the eigenvalues is illuminated by calculation and the unstable spaces can be clearly expressed. Thus, the Turing mechanism is also explained.", - "venue": "", "year": 2011, "referenceCount": 13, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-05-01", - "journal": {"name": "WSEAS Transactions on Mathematics archive", "pages": - "181-189", "volume": "10"}, "authors": [{"authorId": "46874617", "name": "Yutao - Han"}, {"authorId": "49651241", "name": "B. Han"}, {"authorId": "2156145375", - "name": "Lu Zhang"}, {"authorId": "2112318467", "name": "Li Xu"}, {"authorId": - "10704678", "name": "Mei-Feng Li"}, {"authorId": "144690211", "name": "Guang - Zhang"}]}, {"paperId": "f57ad33088ff5f468b8d9ca1e36fd62308444335", "externalIds": - {"MAG": "2008363747", "DBLP": "journals/mima/CopelandS11", "DOI": "10.1007/s11023-011-9238-y", - "CorpusId": 44276296}, "url": "https://www.semanticscholar.org/paper/f57ad33088ff5f468b8d9ca1e36fd62308444335", - "title": "Do Accelerating Turing Machines Compute the Uncomputable?", "abstract": - null, "venue": "Minds and Machines", "year": 2011, "referenceCount": 70, "citationCount": - 27, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-05-01", "journal": - {"name": "Minds and Machines", "pages": "221-239", "volume": "21"}, "authors": - [{"authorId": "144246233", "name": "B. Copeland"}, {"authorId": "1742013", - "name": "Oron Shagrir"}]}, {"paperId": "0963df3e3b614b884cca413043b46ec646cc8979", + "venue": "", "year": 2011, "referenceCount": 13, "citationCount": 26, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2011-05-01", "journal": {"name": "WSEAS Transactions on Mathematics archive", + "pages": "181-189", "volume": "10"}, "authors": [{"authorId": "46874617", + "name": "Yutao Han"}, {"authorId": "49651241", "name": "B. Han"}, {"authorId": + "2156145375", "name": "Lu Zhang"}, {"authorId": "2112318467", "name": "Li + Xu"}, {"authorId": "10704678", "name": "Mei-Feng Li"}, {"authorId": "144690211", + "name": "Guang Zhang"}]}, {"paperId": "0963df3e3b614b884cca413043b46ec646cc8979", "externalIds": {"DBLP": "journals/ai/Proudfoot11", "MAG": "2089192547", "DOI": - "10.1016/j.artint.2011.01.006", "CorpusId": 30906848}, "url": "https://www.semanticscholar.org/paper/0963df3e3b614b884cca413043b46ec646cc8979", + "10.1016/j.artint.2011.01.006", "CorpusId": 30906848}, "corpusId": 30906848, + "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", "name": + "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif Intell"], + "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", "2710-1681"], + "url": "http://www.elsevier.com/locate/artint", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00043702", + "https://www.journals.elsevier.com/artificial-intelligence"]}, "url": "https://www.semanticscholar.org/paper/0963df3e3b614b884cca413043b46ec646cc8979", "title": "Anthropomorphism and AI: Turing\u02bcs much misunderstood imitation game", "abstract": null, "venue": "Artificial Intelligence", "year": 2011, "referenceCount": 3, "citationCount": 60, "influentialCitationCount": 5, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-04-01", "journal": - {"name": "Artif. Intell.", "pages": "950-957", "volume": "175"}, "authors": - [{"authorId": "144239027", "name": "D. Proudfoot"}]}, {"paperId": "f77599f1414ac104adf5e186693adcec71e569dd", - "externalIds": {"ArXiv": "1005.1986", "MAG": "2132688627", "DOI": "10.1209/0295-5075/98/64004", - "CorpusId": 39049759}, "url": "https://www.semanticscholar.org/paper/f77599f1414ac104adf5e186693adcec71e569dd", + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-04-01", "journal": {"name": "Artif. Intell.", "pages": "950-957", "volume": + "175"}, "authors": [{"authorId": "144239027", "name": "D. Proudfoot"}]}, {"paperId": + "f77599f1414ac104adf5e186693adcec71e569dd", "externalIds": {"ArXiv": "1005.1986", + "MAG": "2132688627", "DOI": "10.1209/0295-5075/98/64004", "CorpusId": 39049759}, + "corpusId": 39049759, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f77599f1414ac104adf5e186693adcec71e569dd", "title": "Global feedback control of Turing patterns in network-organized activator-inhibitor systems", "abstract": "Results of the first systematic study on feedback control of nonequilibrium pattern formation in networks @@ -3537,14 +4097,16 @@ interactions: instability corresponded to a subcritical bifurcation and hysteresis effects were observed. Sufficiently strong feedback control rendered, however, the bifurcation supercritical and eliminated the hysteresis effects.", "venue": - "", "year": 2010, "referenceCount": 66, "citationCount": 187, "influentialCitationCount": - 14, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-05-12", - "journal": {"name": "Europhysics Letters", "volume": "98"}, "authors": [{"authorId": - "6061448", "name": "S. Hata"}, {"authorId": "3259202", "name": "H. Nakao"}, - {"authorId": "2490613", "name": "A. Mikhailov"}]}, {"paperId": "c6d8e311625908d9da3761cf6faa91348d170fc6", - "externalIds": {"CorpusId": 7541236}, "url": "https://www.semanticscholar.org/paper/c6d8e311625908d9da3761cf6faa91348d170fc6", + "", "year": 2010, "referenceCount": 66, "citationCount": 190, "influentialCitationCount": + 14, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0807.1230", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2010-05-12", "journal": {"name": + "Europhysics Letters", "volume": "98"}, "authors": [{"authorId": "6061448", + "name": "S. Hata"}, {"authorId": "3259202", "name": "H. Nakao"}, {"authorId": + "2490613", "name": "A. Mikhailov"}]}, {"paperId": "c6d8e311625908d9da3761cf6faa91348d170fc6", + "externalIds": {"CorpusId": 7541236}, "corpusId": 7541236, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c6d8e311625908d9da3761cf6faa91348d170fc6", "title": "Programmers \u2019 handbook for Manchester electronic computer Universal Turing Machine", "abstract": "Multimodal technology and red-black trees have gar-nered profound interest from both end-users and biologists in the last @@ -3553,10 +4115,11 @@ interactions: the confirmed principles of theory. We concentrate our efforts on disconfirm-ing that web browsers can be made interposable, mobile , and ubiquitous.", "venue": "", "year": null, "referenceCount": 139, "citationCount": 142, "influentialCitationCount": - 19, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "af16f1a39e8498845ef9a06900d4d1dbb91a0248", - "externalIds": {"CorpusId": 9067483}, "url": "https://www.semanticscholar.org/paper/af16f1a39e8498845ef9a06900d4d1dbb91a0248", + 19, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "af16f1a39e8498845ef9a06900d4d1dbb91a0248", "externalIds": {"CorpusId": 9067483}, + "corpusId": 9067483, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/af16f1a39e8498845ef9a06900d4d1dbb91a0248", "title": "Proposed electronic calculator ; reprinted in ( Copeland 2005 ) Universal Turing Machine", "abstract": "The implications of lossless models have been far-reaching and pervasive. After years of appropriate research @@ -3565,29 +4128,13 @@ interactions: is not on whether web browsers and evolutionary programming can collude to solve this problem, but rather on presenting a framework for efficient modalities (Solemp-neCadet).", "venue": "", "year": null, "referenceCount": 109, "citationCount": - 114, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "2e4c4ed4c1f8bc2440b5c92815a4f5163a7075d1", "externalIds": - {"MAG": "2092424552", "DOI": "10.1103/PHYSREVLETT.64.2953", "CorpusId": 36147997, - "PubMed": "10041855"}, "url": "https://www.semanticscholar.org/paper/2e4c4ed4c1f8bc2440b5c92815a4f5163a7075d1", - "title": "Experimental evidence of a sustained standing Turing-type nonequilibrium - chemical pattern.", "abstract": "We report the experimental observation of - a sustained standing nonequilibrium chemical pattern in a single-phase open - reactor. Considering the properties of the pattern (symmetry breaking, intrinsic - wavelength), it is interpreted as the first unambiguous experimental evidence - of a Turing structure.", "venue": "Physical Review Letters", "year": 1990, - "referenceCount": 1, "citationCount": 945, "influentialCitationCount": 8, - "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1990-06-11", "journal": {"name": "Physical - review letters", "pages": "\n 2953-2956\n ", "volume": "64 - 24"}, "authors": [{"authorId": "50371129", "name": "Castets"}, {"authorId": - "30093755", "name": "Dulos"}, {"authorId": "30159233", "name": "Boissonade"}, - {"authorId": "30068722", "name": "De Kepper P"}]}, {"paperId": "1d973000573811cc6403c2ee274b9b594523be7e", + 114, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "1d973000573811cc6403c2ee274b9b594523be7e", "externalIds": {"DBLP": "conf/ecal/Kauffman11", "MAG": "2401454054", "DOI": - "10.1017/CBO9780511863196.017", "CorpusId": 489283}, "url": "https://www.semanticscholar.org/paper/1d973000573811cc6403c2ee274b9b594523be7e", + "10.1017/CBO9780511863196.017", "CorpusId": 489283}, "corpusId": 489283, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1d973000573811cc6403c2ee274b9b594523be7e", "title": "Answering Descartes: Beyond Turing", "abstract": "Introduction The first half of the twentieth Century was filled with a stunning group of scientists, Einstein, Bohr, von Neumann and others. Alan Turing ranks near the top of @@ -3619,13 +4166,14 @@ interactions: that I believe grows out of \u201csum over all possible histories\u201d formulation of quantum mechanics (Feynman,1948).", "venue": "ECAL", "year": 2016, "referenceCount": 67, "citationCount": 22, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-03-01", "journal": - {"pages": "11-22"}, "authors": [{"authorId": "143980023", "name": "S. Kauffman"}]}, - {"paperId": "ee4a747282f6a7bbcdddf599d13c81ca48c1fdd3", "externalIds": {"MAG": - "2017296776", "DOI": "10.1073/pnas.0808622106", "CorpusId": 17355137, "PubMed": - "19433782"}, "url": "https://www.semanticscholar.org/paper/ee4a747282f6a7bbcdddf599d13c81ca48c1fdd3", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-03-01", "journal": {"pages": "11-22"}, "authors": [{"authorId": "143980023", + "name": "S. Kauffman"}]}, {"paperId": "ee4a747282f6a7bbcdddf599d13c81ca48c1fdd3", + "externalIds": {"MAG": "2017296776", "DOI": "10.1073/pnas.0808622106", "CorpusId": + 17355137, "PubMed": "19433782"}, "corpusId": 17355137, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ee4a747282f6a7bbcdddf599d13c81ca48c1fdd3", "title": "Interactions between zebrafish pigment cells responsible for the generation of Turing patterns", "abstract": "The reaction\u2013diffusion system is one of the most studied nonlinear mechanisms that generate spatially periodic @@ -3650,8 +4198,9 @@ interactions: pigment patterns as well as other mutant patterns. Our findings here allow further investigation of Turing pattern formation within the context of cell biology.", "venue": "Proceedings of the National Academy of Sciences", "year": - 2009, "referenceCount": 34, "citationCount": 300, "influentialCitationCount": - 13, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 2009, "referenceCount": 34, "citationCount": 302, "influentialCitationCount": + 15, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.pnas.org/content/106/21/8429.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2009-05-26", "journal": {"name": "Proceedings @@ -3659,7 +4208,8 @@ interactions: "authors": [{"authorId": "6643962", "name": "Akiko M. Nakamasu"}, {"authorId": "122562665", "name": "G. Takahashi"}, {"authorId": "34943307", "name": "Akio Kanbe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "2e842fcd9b30aaf88378f395cb49bf54d962b9b4", - "externalIds": {"CorpusId": 15659696}, "url": "https://www.semanticscholar.org/paper/2e842fcd9b30aaf88378f395cb49bf54d962b9b4", + "externalIds": {"CorpusId": 15659696}, "corpusId": 15659696, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2e842fcd9b30aaf88378f395cb49bf54d962b9b4", "title": "The chemical basis of morphogenesis reprinted from Philosophical Transactions of the Royal Society ( Part B ) 237 37-72 ( 1953 ) Universal Turing Machine", "abstract": "The evaluation of SCSI disks is an unfortunate @@ -3668,24 +4218,33 @@ interactions: we present a classical tool for analyzing e-business (AIL), which we use to disconfirm that telephony and scatter/gather I/O can interfere to accomplish this intent.", "venue": "", "year": null, "referenceCount": 149, "citationCount": - 207, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2087393471", "name": "Universal Turing"}, {"authorId": "2087368940", - "name": "Machine R I P"}]}, {"paperId": "cf58fc20e9174b4eb3307d96d2f3e616b951d254", - "externalIds": {"DBLP": "conf/dna/QianSW10", "MAG": "1842664382", "DOI": "10.1007/978-3-642-18305-8_12", - "CorpusId": 14953337}, "url": "https://www.semanticscholar.org/paper/cf58fc20e9174b4eb3307d96d2f3e616b951d254", + 207, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2087393471", "name": "Universal + Turing"}, {"authorId": "2087368940", "name": "Machine R I P"}]}, {"paperId": + "cf58fc20e9174b4eb3307d96d2f3e616b951d254", "externalIds": {"DBLP": "conf/dna/QianSW10", + "MAG": "1842664382", "DOI": "10.1007/978-3-642-18305-8_12", "CorpusId": 14953337}, + "corpusId": 14953337, "publicationVenue": {"id": "31f44e5f-f988-4a14-a236-2ecf8d216061", + "name": "DNA", "type": "conference", "alternate_names": ["International Meeting + on DNA Computing", "Int Meet DNA Comput"], "issn": "0198-0238", "alternate_issns": + ["2673-8856", "1557-7430"], "url": "http://www.liebertonline.com/loi/dna", + "alternate_urls": ["https://www.liebertpub.com/loi/dna", "http://www.liebertpub.com/DNA"]}, + "url": "https://www.semanticscholar.org/paper/cf58fc20e9174b4eb3307d96d2f3e616b951d254", "title": "Efficient Turing-Universal Computation with DNA Polymers", "abstract": null, "venue": "DNA", "year": 2010, "referenceCount": 34, "citationCount": - 123, "influentialCitationCount": 11, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2010-06-14", "journal": - {"pages": "123-140"}, "authors": [{"authorId": "2282317", "name": "L. Qian"}, - {"authorId": "1788421", "name": "D. Soloveichik"}, {"authorId": "3094920", - "name": "E. Winfree"}]}, {"paperId": "6a5d97b55eb79cedee116b219eaed5a6a162ae90", - "externalIds": {"MAG": "2042727098", "ArXiv": "0910.4984", "DOI": "10.1103/PhysRevE.81.046215", - "CorpusId": 4029462, "PubMed": "20481815"}, "url": "https://www.semanticscholar.org/paper/6a5d97b55eb79cedee116b219eaed5a6a162ae90", + 123, "influentialCitationCount": 11, "isOpenAccess": true, "openAccessPdf": + {"url": "https://authors.library.caltech.edu/27111/3/DNA_stack_machines2010_DNA16.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-06-14", "journal": {"pages": "123-140"}, "authors": + [{"authorId": "2282317", "name": "L. Qian"}, {"authorId": "1788421", "name": + "D. Soloveichik"}, {"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": + "6a5d97b55eb79cedee116b219eaed5a6a162ae90", "externalIds": {"MAG": "2042727098", + "ArXiv": "0910.4984", "DOI": "10.1103/PhysRevE.81.046215", "CorpusId": 4029462, + "PubMed": "20481815"}, "corpusId": 4029462, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6a5d97b55eb79cedee116b219eaed5a6a162ae90", "title": "Stochastic Turing patterns in the Brusselator model.", "abstract": "A stochastic version of the Brusselator model is proposed and studied via the system size expansion. The mean-field equations are derived and shown @@ -3699,8 +4258,9 @@ interactions: than that determined via the conventional Turing approach, suggesting that the condition for spatial order to appear can be less stringent than customarily believed.", "venue": "Physical review. E, Statistical, nonlinear, and soft - matter physics", "year": 2009, "referenceCount": 14, "citationCount": 117, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Physics", + matter physics", "year": 2009, "referenceCount": 14, "citationCount": 120, + "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/0910.4984", "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], @@ -3711,7 +4271,7 @@ interactions: "name": "D. Fanelli"}, {"authorId": "2815566", "name": "F. Di Patti"}]}, {"paperId": "0838819fb4c0397e4312eca58def6f2bd60708c8", "externalIds": {"DBLP": "conf/cig/Hingston10", "MAG": "2067279781", "DOI": "10.1109/ITW.2010.5593336", "CorpusId": 11259370}, - "url": "https://www.semanticscholar.org/paper/0838819fb4c0397e4312eca58def6f2bd60708c8", + "corpusId": 11259370, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0838819fb4c0397e4312eca58def6f2bd60708c8", "title": "A new design for a Turing Test for Bots", "abstract": "Interesting, human-like opponents add to the entertainment value of a video game, and creating such opponents is a difficult challenge for programmers. Can artificial intelligence @@ -3726,27 +4286,38 @@ interactions: that is designed to learn how to appear more human using feedback obtained during play.", "venue": "Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games", "year": 2010, "referenceCount": 21, "citationCount": - 76, "influentialCitationCount": 9, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2010-09-30", - "journal": {"name": "Proceedings of the 2010 IEEE Conference on Computational - Intelligence and Games", "pages": "345-350"}, "authors": [{"authorId": "1747011", - "name": "P. Hingston"}]}, {"paperId": "10f3a92dc74f0f52023952146b292af90e01131e", - "externalIds": {"MAG": "1566935473", "DBLP": "conf/sle/BarrocaLAFS10", "DOI": - "10.1007/978-3-642-19440-5_19", "CorpusId": 16016675}, "url": "https://www.semanticscholar.org/paper/10f3a92dc74f0f52023952146b292af90e01131e", + 76, "influentialCitationCount": 9, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=7339&context=ecuworks", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2010-09-30", "journal": {"name": "Proceedings + of the 2010 IEEE Conference on Computational Intelligence and Games", "pages": + "345-350"}, "authors": [{"authorId": "1747011", "name": "P. Hingston"}]}, + {"paperId": "10f3a92dc74f0f52023952146b292af90e01131e", "externalIds": {"MAG": + "1566935473", "DBLP": "conf/sle/BarrocaLAFS10", "DOI": "10.1007/978-3-642-19440-5_19", + "CorpusId": 16016675}, "corpusId": 16016675, "publicationVenue": {"id": "b147e0ad-dec8-401c-87b9-3ff4c341adf3", + "name": "Software Language Engineering", "type": "conference", "alternate_names": + ["SLE", "Softw Lang Eng"]}, "url": "https://www.semanticscholar.org/paper/10f3a92dc74f0f52023952146b292af90e01131e", "title": "DSLTrans: A Turing Incomplete Transformation Language", "abstract": null, "venue": "Software Language Engineering", "year": 2010, "referenceCount": 12, "citationCount": 49, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-10-12", "journal": {"pages": "296-305"}, "authors": [{"authorId": "2161340", - "name": "B. Barroca"}, {"authorId": "144773751", "name": "L. Lucio"}, {"authorId": - "1698810", "name": "Vasco Amaral"}, {"authorId": "2058650330", "name": "Roberto - F\u00e9lix"}, {"authorId": "1865326", "name": "V. Sousa"}]}, {"paperId": "49056fb537329fbd2c5af4f57841a985914f087f", - "externalIds": {"MAG": "2952998734", "ArXiv": "1203.3298", "DBLP": "journals/corr/abs-1203-3298", - "DOI": "10.15388/INFORMATICA.2010.298", "CorpusId": 4675493}, "url": "https://www.semanticscholar.org/paper/49056fb537329fbd2c5af4f57841a985914f087f", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-10-12", "journal": {"pages": "296-305"}, "authors": + [{"authorId": "2161340", "name": "B. Barroca"}, {"authorId": "144773751", + "name": "L. Lucio"}, {"authorId": "1698810", "name": "Vasco Amaral"}, {"authorId": + "2058650330", "name": "Roberto F\u00e9lix"}, {"authorId": "1865326", "name": + "V. Sousa"}]}, {"paperId": "49056fb537329fbd2c5af4f57841a985914f087f", "externalIds": + {"MAG": "2952998734", "ArXiv": "1203.3298", "DBLP": "journals/corr/abs-1203-3298", + "DOI": "10.15388/INFORMATICA.2010.298", "CorpusId": 4675493}, "corpusId": + 4675493, "publicationVenue": {"id": "729a1139-78df-40c0-899b-17b6212e786f", + "name": "Informatica", "type": "journal", "alternate_names": ["Inform (lithuanian + Acad Sci", "Informatica (lithuanian Academy of Sciences)"], "issn": "0868-4952", + "alternate_issns": ["0134-8639"], "url": "http://content.iospress.com/journals/informatica", + "alternate_urls": ["http://eia.libis.lt/isteklius.php?url=http://www.mii.lt/informatica/index.html", + "https://www.mii.lt/informatics_in_education/"]}, "url": "https://www.semanticscholar.org/paper/49056fb537329fbd2c5af4f57841a985914f087f", "title": "Observability of Turing Machines: A Refinement of the Theory of Computation", "abstract": "The Turing machine is one of the simple abstract computational devices that can be used to investigate the limits of computability. @@ -3767,7 +4338,8 @@ interactions: This research was partially supported by the Russian Federal Program \u201cScientists and Educators in Russia of Innovations\u201d, contract number 02.740.11.5018.", "venue": "Informatica", "year": 2010, "referenceCount": 63, "citationCount": - 64, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": + 64, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1203.3298", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": @@ -3775,19 +4347,23 @@ interactions: {"name": "Informatica", "pages": "425-454", "volume": "21"}, "authors": [{"authorId": "1713953", "name": "Y. Sergeyev"}, {"authorId": "1764116", "name": "A. Garro"}]}, {"paperId": "02ec0afd083460c475850a1f4adf555495561261", "externalIds": {"MAG": - "2085426595", "DOI": "10.1007/BF01011339", "CorpusId": 122949592}, "url": - "https://www.semanticscholar.org/paper/02ec0afd083460c475850a1f4adf555495561261", + "2085426595", "DOI": "10.1007/BF01011339", "CorpusId": 122949592}, "corpusId": + 122949592, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/02ec0afd083460c475850a1f4adf555495561261", "title": "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines", "abstract": - null, "venue": "", "year": 1980, "referenceCount": 20, "citationCount": 876, - "influentialCitationCount": 30, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Journal of Statistical Physics", "pages": "563-591", - "volume": "22"}, "authors": [{"authorId": "2542436", "name": "P. Benioff"}]}, - {"paperId": "8f31d04b3186c9214a7944e529064c723628d423", "externalIds": {"DBLP": - "journals/kybernetes/Boden10", "MAG": "2081759870", "DOI": "10.1108/03684921011036132", - "CorpusId": 26516394}, "url": "https://www.semanticscholar.org/paper/8f31d04b3186c9214a7944e529064c723628d423", + null, "venue": "", "year": 1980, "referenceCount": 20, "citationCount": 891, + "influentialCitationCount": 30, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Journal + of Statistical Physics", "pages": "563-591", "volume": "22"}, "authors": [{"authorId": + "2542436", "name": "P. Benioff"}]}, {"paperId": "8f31d04b3186c9214a7944e529064c723628d423", + "externalIds": {"DBLP": "journals/kybernetes/Boden10", "MAG": "2081759870", + "DOI": "10.1108/03684921011036132", "CorpusId": 26516394}, "corpusId": 26516394, + "publicationVenue": {"id": "aa8f57e2-d5cf-4f0d-afcb-8577fb02e10a", "name": + "Kybernetes", "type": "journal", "issn": "0368-492X", "url": "https://www.emerald.com/insight/publication/issn/0368-492X", + "alternate_urls": ["http://www.emeraldinsight.com/0368-492X.htm", "http://www.emeraldinsight.com/loi/k"]}, + "url": "https://www.semanticscholar.org/paper/8f31d04b3186c9214a7944e529064c723628d423", "title": "The Turing test and artistic creativity", "abstract": "Purpose \u2013 The purpose of this paper is to consider the Turing test (TT) in relation to artistic creativity.Design/methodology/approach \u2013 Considers the TT @@ -3804,25 +4380,35 @@ interactions: relevance of the TT to artistic creativity and computer artworks and also in relation to musical creativity.Ori...", "venue": "Kybernetes", "year": 2010, "referenceCount": 9, "citationCount": 35, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2010-05-04", "journal": - {"name": "Kybernetes", "pages": "409-413", "volume": "39"}, "authors": [{"authorId": - "20986652", "name": "M. Boden"}]}, {"paperId": "0bc317e9f7a875d0553350f898a3057dddf0f1c5", - "externalIds": {"MAG": "1985482228", "DOI": "10.1016/j.febslet.2008.03.029", - "CorpusId": 7490013, "PubMed": "18381072"}, "url": "https://www.semanticscholar.org/paper/0bc317e9f7a875d0553350f898a3057dddf0f1c5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2010-05-04", "journal": {"name": "Kybernetes", "pages": "409-413", "volume": + "39"}, "authors": [{"authorId": "20986652", "name": "M. Boden"}]}, {"paperId": + "0bc317e9f7a875d0553350f898a3057dddf0f1c5", "externalIds": {"MAG": "1985482228", + "DOI": "10.1016/j.febslet.2008.03.029", "CorpusId": 7490013, "PubMed": "18381072"}, + "corpusId": 7490013, "publicationVenue": {"id": "310b8694-2328-4181-ba5b-47c46dfc8dfa", + "name": "FEBS Letters", "type": "journal", "alternate_names": ["FEB Lett"], + "issn": "0014-5793", "url": "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1873-3468", + "alternate_urls": ["https://febs.onlinelibrary.wiley.com/journal/18733468"]}, + "url": "https://www.semanticscholar.org/paper/0bc317e9f7a875d0553350f898a3057dddf0f1c5", "title": "Dynamics of Cdc42 network embodies a Turing\u2010type mechanism of yeast cell polarity", "abstract": null, "venue": "FEBS Letters", "year": - 2008, "referenceCount": 38, "citationCount": 309, "influentialCitationCount": - 38, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2008-04-30", "journal": {"name": "FEBS - Letters", "volume": "582"}, "authors": [{"authorId": "2010904", "name": "A. - Goryachev"}, {"authorId": "1858852", "name": "A. Pokhilko"}]}, {"paperId": - "f2acd4ed92017a31222358c0076ccc98e753de0d", "externalIds": {"MAG": "2143489502", - "DOI": "10.1126/science.1169973", "CorpusId": 206518190, "PubMed": "19423823"}, + 2008, "referenceCount": 38, "citationCount": 310, "influentialCitationCount": + 38, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-04-30", "journal": {"name": "FEBS Letters", "volume": "582"}, "authors": + [{"authorId": "2010904", "name": "A. Goryachev"}, {"authorId": "1858852", + "name": "A. Pokhilko"}]}, {"paperId": "f2acd4ed92017a31222358c0076ccc98e753de0d", + "externalIds": {"MAG": "2143489502", "DOI": "10.1126/science.1169973", "CorpusId": + 206518190, "PubMed": "19423823"}, "corpusId": 206518190, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/f2acd4ed92017a31222358c0076ccc98e753de0d", "title": "An Experimental Design Method Leading to Chemical Turing Patterns", "abstract": "Adding a Turing Pattern Reaction Two chemical-reaction systems @@ -3852,16 +4438,51 @@ interactions: stationary hexagonal arrays of spots and parallel stripes of pH patterns attributed to a Turing bifurcation. This method could be extended to biochemical reactions.", "venue": "Science", "year": 2009, "referenceCount": 24, "citationCount": 170, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", - "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Materials Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2009-05-08", "journal": {"name": "Science", "pages": "772 - 775", "volume": - "324"}, "authors": [{"authorId": "49679905", "name": "J. Horv\u00e1th"}, {"authorId": - "3642365", "name": "I. Szalai"}, {"authorId": "3242769", "name": "P. De Kepper"}]}, - {"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"MAG": - "3030363341", "DBLP": "journals/x/Turing50", "DOI": "10.1093/MIND/LIX.236.433", - "CorpusId": 14636783}, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2009-05-08", "journal": {"name": "Science", + "pages": "772 - 775", "volume": "324"}, "authors": [{"authorId": "49679905", + "name": "J. Horv\u00e1th"}, {"authorId": "3642365", "name": "I. Szalai"}, + {"authorId": "3242769", "name": "P. De Kepper"}]}, {"paperId": "f8feaf2c35879be54c939df2a12178751122ec33", + "externalIds": {"MAG": "2009354787", "DOI": "10.1016/J.JTBI.2006.09.036", + "CorpusId": 24963731, "PubMed": "17140604"}, "corpusId": 24963731, "publicationVenue": + {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", "name": "Journal of Theoretical + Biology", "type": "journal", "alternate_names": ["J Theor Biology"], "issn": + "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/f8feaf2c35879be54c939df2a12178751122ec33", + "title": "Instabilities in spatially extended predator-prey systems: spatio-temporal + patterns in the neighborhood of Turing-Hopf bifurcations.", "abstract": null, + "venue": "Journal of Theoretical Biology", "year": 2007, "referenceCount": + 43, "citationCount": 320, "influentialCitationCount": 11, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-03-21", "journal": + {"name": "Journal of theoretical biology", "pages": "\n 220-9\n ", + "volume": "245 2"}, "authors": [{"authorId": "6992140", "name": "M. Baurmann"}, + {"authorId": "37973754", "name": "Thilo Gross"}, {"authorId": "1719120", "name": + "U. Feudel"}]}, {"paperId": "7a35e89e1e23ba3148873390305993dea7a93e6e", "externalIds": + {"MAG": "2047506587", "DOI": "10.1038/352610A0", "CorpusId": 4316122}, "corpusId": + 4316122, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/7a35e89e1e23ba3148873390305993dea7a93e6e", + "title": "Transition from a uniform state to hexagonal and striped Turing + patterns", "abstract": null, "venue": "Nature", "year": 1991, "referenceCount": + 20, "citationCount": 718, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Nature", "pages": "610-612", "volume": "352"}, + "authors": [{"authorId": "143803550", "name": "Q. Ouyang"}, {"authorId": "2421446", + "name": "H. Swinney"}]}, {"paperId": "2d5673caa9e6af3a7b82a43f19ee920992db07ad", + "externalIds": {"MAG": "3030363341", "DBLP": "journals/x/Turing50", "DOI": + "10.1093/MIND/LIX.236.433", "CorpusId": 14636783}, "corpusId": 14636783, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad", "title": "Computing Machinery and Intelligence", "abstract": "I propose to consider the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. @@ -3872,15 +4493,20 @@ interactions: and the answer to the question, \u201cCan machines think?\u201d is to be sought in a statistical survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence", "year": 1950, "referenceCount": 16, "citationCount": - 8557, "influentialCitationCount": 492, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Sociology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "1950-10-01", "journal": - {"name": "Mind", "pages": "433-460", "volume": "LIX"}, "authors": [{"authorId": - "2262347", "name": "A. Turing"}]}, {"paperId": "d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", + 8596, "influentialCitationCount": 493, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1950-10-01", + "journal": {"name": "Mind", "pages": "433-460", "volume": "LIX"}, "authors": + [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", "externalIds": {"MAG": "1985072454", "DOI": "10.1098/rstb.1952.0012", "CorpusId": - 937133}, "url": "https://www.semanticscholar.org/paper/d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", + 937133}, "corpusId": 937133, "publicationVenue": {"id": "6de51a3e-86d6-4b08-92f5-a2a4a3a1c47b", + "name": "Philosophical transactions of the Royal Society of London. Series + B, Biological sciences", "alternate_names": ["Philos trans R Soc Lond Ser + B Biological sci"], "issn": "0080-4622", "alternate_issns": ["2054-0280"], + "url": "http://www.jstor.org/action/showPublication?journalCode=philtranroyasoc2"}, + "url": "https://www.semanticscholar.org/paper/d635e2843c6fb034e9126aa73ef9c2e4e2c4714d", "title": "The chemical basis of morphogenesis", "abstract": "It is suggested that a system of chemical substances, called morphogens, reacting together and diffusing through a tissue, is adequate to account for the main phenomena @@ -3907,30 +4533,21 @@ interactions: facts are explained, which can be found in text-books, but whose omission would make the paper difficult reading.", "venue": "Philosophical transactions of the Royal Society of London. Series B, Biological sciences", "year": 1952, - "referenceCount": 63, "citationCount": 10796, "influentialCitationCount": - 616, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Environmental Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1952-08-14", - "journal": {"name": "Bulletin of Mathematical Biology", "pages": "153-197", - "volume": "52"}, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, - {"paperId": "f8feaf2c35879be54c939df2a12178751122ec33", "externalIds": {"MAG": - "2009354787", "DOI": "10.1016/J.JTBI.2006.09.036", "CorpusId": 24963731, "PubMed": - "17140604"}, "url": "https://www.semanticscholar.org/paper/f8feaf2c35879be54c939df2a12178751122ec33", - "title": "Instabilities in spatially extended predator-prey systems: spatio-temporal - patterns in the neighborhood of Turing-Hopf bifurcations.", "abstract": null, - "venue": "Journal of Theoretical Biology", "year": 2007, "referenceCount": - 43, "citationCount": 307, "influentialCitationCount": 11, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-03-21", "journal": {"name": "Journal - of theoretical biology", "pages": "\n 220-9\n ", "volume": - "245 2"}, "authors": [{"authorId": "6992140", "name": "M. Baurmann"}, {"authorId": - "37973754", "name": "Thilo Gross"}, {"authorId": "1719120", "name": "U. Feudel"}]}, - {"paperId": "61e972ce10138b742825b851c35a04155bbc34ae", "externalIds": {"MAG": - "2151162056", "DBLP": "journals/tciaig/Hingston09", "DOI": "10.1109/TCIAIG.2009.2032534", - "CorpusId": 13988179}, "url": "https://www.semanticscholar.org/paper/61e972ce10138b742825b851c35a04155bbc34ae", + "referenceCount": 59, "citationCount": 10868, "influentialCitationCount": + 626, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1952-08-14", "journal": {"name": "Bulletin of Mathematical + Biology", "pages": "153-197", "volume": "52"}, "authors": [{"authorId": "2079681794", + "name": "A. Turing"}]}, {"paperId": "61e972ce10138b742825b851c35a04155bbc34ae", + "externalIds": {"MAG": "2151162056", "DBLP": "journals/tciaig/Hingston09", + "DOI": "10.1109/TCIAIG.2009.2032534", "CorpusId": 13988179}, "corpusId": 13988179, + "publicationVenue": {"id": "c56495e2-32b0-440c-b5e2-839c615cfbe5", "name": + "IEEE Transactions on Computational Intelligence and AI in Games", "type": + "journal", "alternate_names": ["IEEE Trans Comput Intell AI Game"], "issn": + "1943-068X", "alternate_issns": ["1943-0698"], "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=4804728", + "alternate_urls": ["http://ieee-cis.org/pubs/tciaig/"]}, "url": "https://www.semanticscholar.org/paper/61e972ce10138b742825b851c35a04155bbc34ae", "title": "A Turing Test for Computer Game Bots", "abstract": "In this paper, a version of the Turing Test is proposed, to test the ability of computer game playing agents (ldquobotsrdquo) to imitate human game players. The proposed @@ -3940,25 +4557,16 @@ interactions: show promise. We also suggest probable future directions for developing improved bots.", "venue": "IEEE Transactions on Computational Intelligence and AI in Games", "year": 2009, "referenceCount": 57, "citationCount": 146, "influentialCitationCount": - 15, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-09-18", "journal": {"name": "IEEE Transactions on - Computational Intelligence and AI in Games", "pages": "169-186", "volume": - "1"}, "authors": [{"authorId": "1747011", "name": "P. Hingston"}]}, {"paperId": - "7a35e89e1e23ba3148873390305993dea7a93e6e", "externalIds": {"MAG": "2047506587", - "DOI": "10.1038/352610A0", "CorpusId": 4316122}, "url": "https://www.semanticscholar.org/paper/7a35e89e1e23ba3148873390305993dea7a93e6e", - "title": "Transition from a uniform state to hexagonal and striped Turing - patterns", "abstract": null, "venue": "Nature", "year": 1991, "referenceCount": - 20, "citationCount": 712, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Nature", - "pages": "610-612", "volume": "352"}, "authors": [{"authorId": "143803550", - "name": "Q. Ouyang"}, {"authorId": "2421446", "name": "H. Swinney"}]}, {"paperId": - "ab7790485f26ce65f9d83dd700c43e49058bdd2b", "externalIds": {"MAG": "2022731279", - "DBLP": "journals/x/Turing37", "DOI": "10.1112/PLMS/S2-42.1.230", "CorpusId": - 73712}, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-09-18", "journal": + {"name": "IEEE Transactions on Computational Intelligence and AI in Games", + "pages": "169-186", "volume": "1"}, "authors": [{"authorId": "1747011", "name": + "P. Hingston"}]}, {"paperId": "ab7790485f26ce65f9d83dd700c43e49058bdd2b", + "externalIds": {"MAG": "2022731279", "DBLP": "journals/x/Turing37", "DOI": + "10.1112/PLMS/S2-42.1.230", "CorpusId": 73712}, "corpusId": 73712, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ab7790485f26ce65f9d83dd700c43e49058bdd2b", "title": "On computable numbers, with an application to the Entscheidungsproblem", "abstract": "1. Computing machines. 2. Definitions. Automatic machines. Computing machines. Circle and circle-free numbers. Computable sequences and numbers. @@ -3967,16 +4575,23 @@ interactions: 7. Detailed description of the universal machine. 8. Application of the diagonal process. Pagina 1 di 38 On computable numbers, with an application to the Entscheidungsproblem A. M. ...", "venue": "Proc. London Math. Soc.", "year": - 2021, "referenceCount": 81, "citationCount": 8327, "influentialCitationCount": - 535, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2021-02-02", "journal": {"name": "Proc. London Math. Soc.", - "pages": "230-265", "volume": "s2-42"}, "authors": [{"authorId": "2079681794", - "name": "A. Turing"}]}, {"paperId": "1ce2d442c9b539e8d6631fc82eda6704da80d8fc", + 2021, "referenceCount": 81, "citationCount": 8348, "influentialCitationCount": + 536, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2021-02-02", "journal": {"name": "Proc. + London Math. Soc.", "pages": "230-265", "volume": "s2-42"}, "authors": [{"authorId": + "2079681794", "name": "A. Turing"}]}, {"paperId": "1ce2d442c9b539e8d6631fc82eda6704da80d8fc", "externalIds": {"DBLP": "journals/comj/Ariza09", "MAG": "1979720880", "DOI": - "10.1162/comj.2009.33.2.48", "CorpusId": 11268522}, "url": "https://www.semanticscholar.org/paper/1ce2d442c9b539e8d6631fc82eda6704da80d8fc", + "10.1162/comj.2009.33.2.48", "CorpusId": 11268522}, "corpusId": 11268522, + "publicationVenue": {"id": "48ce6bf2-7773-4d99-9db8-4bb1b71c69b8", "name": + "Computer Music Journal", "type": "journal", "alternate_names": ["Comput Music + J"], "issn": "0148-9267", "url": "http://muse.jhu.edu/journals/computer_music_journal/", + "alternate_urls": ["http://www.computermusicjournal.org/", "https://www.jstor.org/journal/computermusicj", + "http://newfirstsearch.oclc.org/dbname=ECO;journal=0148-9267;screen=info;done=referer;FSIP", + "http://mitpress.mit.edu/e-journals/Computer-Music-Journal/", "https://www.mitpressjournals.org/loi/comj", + "http://www.jstor.org/journals/01489267.html"]}, "url": "https://www.semanticscholar.org/paper/1ce2d442c9b539e8d6631fc82eda6704da80d8fc", "title": "The Interrogator as Critic: The Turing Test and the Evaluation of Generative Music Systems", "abstract": "Procedural or algorithmic approaches to generating music have been explored in the medium of software for over @@ -3995,26 +4610,31 @@ interactions: argues that Turing''s well-known proposal cannot be applied to executing and evaluating listener surveys.", "venue": "Computer Music Journal", "year": 2009, "referenceCount": 158, "citationCount": 114, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2009-06-01", "journal": {"name": "Computer - Music Journal", "pages": "48-70", "volume": "33"}, "authors": [{"authorId": - "34588118", "name": "C. Ariza"}]}, {"paperId": "6517271a707e8de4aab98a7b92276edfec89f577", - "externalIds": {"DBLP": "journals/jns/RicardM09", "MAG": "2060665770", "DOI": - "10.1007/s00332-009-9041-6", "CorpusId": 32800311}, "url": "https://www.semanticscholar.org/paper/6517271a707e8de4aab98a7b92276edfec89f577", + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2009-06-01", + "journal": {"name": "Computer Music Journal", "pages": "48-70", "volume": + "33"}, "authors": [{"authorId": "34588118", "name": "C. Ariza"}]}, {"paperId": + "6517271a707e8de4aab98a7b92276edfec89f577", "externalIds": {"DBLP": "journals/jns/RicardM09", + "MAG": "2060665770", "DOI": "10.1007/s00332-009-9041-6", "CorpusId": 32800311}, + "corpusId": 32800311, "publicationVenue": {"id": "619f4cc3-1d00-4060-b88d-9854843ac2c2", + "name": "Journal of nonlinear science", "type": "journal", "alternate_names": + ["J Nonlinear Sci", "Journal of Nonlinear Science", "J nonlinear sci"], "issn": + "0938-8974", "url": "https://link.springer.com/journal/332"}, "url": "https://www.semanticscholar.org/paper/6517271a707e8de4aab98a7b92276edfec89f577", "title": "Turing Instabilities at Hopf Bifurcation", "abstract": null, "venue": "Journal of nonlinear science", "year": 2009, "referenceCount": 37, "citationCount": - 45, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-02-19", "journal": {"name": "Journal - of Nonlinear Science", "pages": "467-496", "volume": "19"}, "authors": [{"authorId": - "144673205", "name": "M. R. Ricard"}, {"authorId": "48072518", "name": "S. - Mischler"}]}, {"paperId": "57f66d4dd71a94a4254866cf4591bd10fd187de5", "externalIds": - {"MAG": "2499551314", "DOI": "10.5948/UPO9780883859742.031", "CorpusId": 57183014}, - "url": "https://www.semanticscholar.org/paper/57f66d4dd71a94a4254866cf4591bd10fd187de5", + 46, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-02-19", "journal": + {"name": "Journal of Nonlinear Science", "pages": "467-496", "volume": "19"}, + "authors": [{"authorId": "144673205", "name": "M. R. Ricard"}, {"authorId": + "48072518", "name": "S. Mischler"}]}, {"paperId": "57f66d4dd71a94a4254866cf4591bd10fd187de5", + "externalIds": {"MAG": "2499551314", "DOI": "10.5948/UPO9780883859742.031", + "CorpusId": 57183014}, "corpusId": 57183014, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/57f66d4dd71a94a4254866cf4591bd10fd187de5", "title": "Resources for Teaching Discrete Mathematics: A Study of Logic and Programming via Turing Machines", "abstract": "During the International Congress of Mathematicians in Paris in 1900 David Hilbert (1862\u20131943), one of @@ -4033,14 +4653,15 @@ interactions: known as a Turing machine. Let\u2019s first study a few excerpts from Turing\u2019s original paper [13, p. 231\u2013234], and then design a few machines to perform certain tasks.", "venue": "", "year": 2009, "referenceCount": 16, "citationCount": - 48, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "3024181", "name": "Jerry Lodder"}]}, - {"paperId": "572527f774793778cc6a4bbfbcacf144890ffbff", "externalIds": {"MAG": - "2102075452", "DBLP": "journals/cacm/BohmJ66", "DOI": "10.1145/355592.365646", - "CorpusId": 10236439}, "url": "https://www.semanticscholar.org/paper/572527f774793778cc6a4bbfbcacf144890ffbff", + 48, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "3024181", "name": "Jerry + M. Lodder"}]}, {"paperId": "572527f774793778cc6a4bbfbcacf144890ffbff", "externalIds": + {"MAG": "2102075452", "DBLP": "journals/cacm/BohmJ66", "DOI": "10.1145/355592.365646", + "CorpusId": 10236439}, "corpusId": 10236439, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/572527f774793778cc6a4bbfbcacf144890ffbff", "title": "Flow diagrams, turing machines and languages with only two formation rules", "abstract": "In the first part of the paper, flow diagrams are introduced to represent inter ah mappings of a set into itself. Although not every diagram @@ -4055,8 +4676,9 @@ interactions: squares. The new machine belongs to the family, elsewhere introduced, generated by composition and iteration from the two machines X and R. That family is a proper subfamily of the whole family of Turing machines.", "venue": "CACM", - "year": 1966, "referenceCount": 10, "citationCount": 852, "influentialCitationCount": - 32, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "year": 1966, "referenceCount": 10, "citationCount": 853, "influentialCitationCount": + 32, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/355592.365646", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -4065,19 +4687,28 @@ interactions: B\u00f6hm"}, {"authorId": "47000664", "name": "G. Jacopini"}]}, {"paperId": "7a69c29d0eef3e2921af908aeb308b8031826c3e", "externalIds": {"ArXiv": "0707.4489", "DBLP": "conf/fct/NearyW09", "MAG": "2950858429", "DOI": "10.1007/978-3-642-03409-1_24", - "CorpusId": 3063694}, "url": "https://www.semanticscholar.org/paper/7a69c29d0eef3e2921af908aeb308b8031826c3e", + "CorpusId": 3063694}, "corpusId": 3063694, "publicationVenue": {"id": "6c136c4c-2f76-4921-ab03-81775cf4530f", + "name": "International Symposium on Fundamentals of Computation Theory", "type": + "conference", "alternate_names": ["Fundam Comput Theory", "Int Symp Fundam + Comput Theory", "Fundamentals of Computation Theory", "FCT"]}, "url": "https://www.semanticscholar.org/paper/7a69c29d0eef3e2921af908aeb308b8031826c3e", "title": "Small Weakly Universal Turing Machines", "abstract": null, "venue": "International Symposium on Fundamentals of Computation Theory", "year": 2007, "referenceCount": 34, "citationCount": 34, "influentialCitationCount": 3, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://mural.maynoothuniversity.ie/15730/1/DW_small%20weakly.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2007-07-30", "journal": {"name": "ArXiv", - "volume": "abs/0707.4489"}, "authors": [{"authorId": "2221070", "name": "T. + "volume": "abs/0707.4489"}, "authors": [{"authorId": "2221070", "name": "Turlough Neary"}, {"authorId": "145284748", "name": "D. Woods"}]}, {"paperId": "687684749814cbe54672d3b53ea08df6c66382bb", "externalIds": {"MAG": "2003363530", "DBLP": "journals/computer/ArelL09", - "DOI": "10.1109/MC.2009.67", "CorpusId": 6844420}, "url": "https://www.semanticscholar.org/paper/687684749814cbe54672d3b53ea08df6c66382bb", + "DOI": "10.1109/MC.2009.67", "CorpusId": 6844420}, "corpusId": 6844420, "publicationVenue": + {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", "name": "Computer", "type": + "journal", "alternate_names": ["IEEE Computer", "IEEE Comput"], "issn": "0018-9162", + "url": "http://www.computer.org/computer", "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/687684749814cbe54672d3b53ea08df6c66382bb", "title": "Beyond the Turing Test", "abstract": "Despite the technological marvel of the Internet and the rapidly proliferating mobile technologies that are fundamentally changing the way we interact, AI''s original \"grand dream\" @@ -4086,15 +4717,17 @@ interactions: creating important benchmarks, we may yet achieve that dream. However, this will only happen if the nascent AGI community coalesces and works toward a common vision.", "venue": "Computer", "year": 2009, "referenceCount": 0, "citationCount": - 101, "influentialCitationCount": 16, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-03-01", "journal": - {"name": "Computer", "pages": "90-91", "volume": "42"}, "authors": [{"authorId": - "1804314", "name": "I. Arel"}, {"authorId": "112907736", "name": "Scott Livingston"}]}, - {"paperId": "2842d53d0f2389618f8ad1c47d2ffef2c344d22f", "externalIds": {"MAG": - "2059442002", "DBLP": "conf/stoc/Gill74", "DOI": "10.1145/800119.803889", - "CorpusId": 15320656}, "url": "https://www.semanticscholar.org/paper/2842d53d0f2389618f8ad1c47d2ffef2c344d22f", + 102, "influentialCitationCount": 16, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-03-01", "journal": {"name": "Computer", "pages": "90-91", "volume": + "42"}, "authors": [{"authorId": "1804314", "name": "I. Arel"}, {"authorId": + "112907736", "name": "Scott Livingston"}]}, {"paperId": "2842d53d0f2389618f8ad1c47d2ffef2c344d22f", + "externalIds": {"MAG": "2059442002", "DBLP": "conf/stoc/Gill74", "DOI": "10.1145/800119.803889", + "CorpusId": 15320656}, "corpusId": 15320656, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/2842d53d0f2389618f8ad1c47d2ffef2c344d22f", "title": "Computational complexity of probabilistic Turing machines", "abstract": "Probabilistic Turing machines are Turing machines with the ability to flip coins in order to make random decisions. We allow probabilistic Turing machines @@ -4104,27 +4737,33 @@ interactions: linear-bounded automata can simulate nondeterministic linear-bounded automata.", "venue": "Symposium on the Theory of Computing", "year": 1974, "referenceCount": 7, "citationCount": 740, "influentialCitationCount": 54, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1974-04-30", "journal": - {"name": "SIAM J. Comput.", "pages": "675-695", "volume": "6"}, "authors": - [{"authorId": "145896360", "name": "John Gill"}]}, {"paperId": "c073816dbbffa47e66be8bf3cb02e5f8d538f7db", - "externalIds": {"MAG": "1646814793", "DBLP": "journals/tcs/WoodsN09", "ArXiv": - "1110.2230", "DOI": "10.1016/j.tcs.2008.09.051", "CorpusId": 10257004}, "url": - "https://www.semanticscholar.org/paper/c073816dbbffa47e66be8bf3cb02e5f8d538f7db", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800119.803889", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1974-04-30", "journal": {"name": "SIAM J. Comput.", "pages": + "675-695", "volume": "6"}, "authors": [{"authorId": "145896360", "name": "John + Gill"}]}, {"paperId": "c073816dbbffa47e66be8bf3cb02e5f8d538f7db", "externalIds": + {"MAG": "1646814793", "DBLP": "journals/tcs/WoodsN09", "ArXiv": "1110.2230", + "DOI": "10.1016/j.tcs.2008.09.051", "CorpusId": 10257004}, "corpusId": 10257004, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/c073816dbbffa47e66be8bf3cb02e5f8d538f7db", "title": "The complexity of small universal Turing machines: A survey", "abstract": null, "venue": "Theoretical Computer Science", "year": 2009, "referenceCount": - 104, "citationCount": 80, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2009-02-10", - "journal": {"name": "ArXiv", "volume": "abs/1110.2230"}, "authors": [{"authorId": - "145284748", "name": "D. Woods"}, {"authorId": "2221070", "name": "T. Neary"}]}, - {"paperId": "bc2efe31591b6d7ff80cfb32448d99d48fd83c31", "externalIds": {"DBLP": - "books/daglib/0006735", "MAG": "1496937667", "CorpusId": 118988352}, "url": - "https://www.semanticscholar.org/paper/bc2efe31591b6d7ff80cfb32448d99d48fd83c31", + 104, "citationCount": 81, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2009-02-10", "journal": {"name": "ArXiv", "volume": + "abs/1110.2230"}, "authors": [{"authorId": "145284748", "name": "D. Woods"}, + {"authorId": "2221070", "name": "Turlough Neary"}]}, {"paperId": "bc2efe31591b6d7ff80cfb32448d99d48fd83c31", + "externalIds": {"DBLP": "books/daglib/0006735", "MAG": "1496937667", "CorpusId": + 118988352}, "corpusId": 118988352, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc2efe31591b6d7ff80cfb32448d99d48fd83c31", "title": "Neural networks and analog computation - beyond the Turing limit", "abstract": "1 Computational Complexity.- 1.1 Neural Networks.- 1.2 Automata: A General Introduction.- 1.2.1 Input Sets in Computability Theory.- 1.3 Finite @@ -4168,15 +4807,18 @@ interactions: Limit.- 12.1 The Analog Shift Map.- 12.2 Analog Shift and Computation.- 12.3 Physical Relevance.- 12.4 Conclusions.", "venue": "Progress in theoretical computer science", "year": 1999, "referenceCount": 1, "citationCount": 418, - "influentialCitationCount": 28, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1999-03-01", "journal": {"pages": "I-XIII, 1-181"}, - "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": - "044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", "externalIds": {"ArXiv": "2007.14062", - "DBLP": "journals/corr/abs-2007-14062", "MAG": "3104613728", "CorpusId": 220831004}, - "url": "https://www.semanticscholar.org/paper/044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", + "influentialCitationCount": 28, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-03-01", "journal": {"pages": + "I-XIII, 1-181"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, + {"paperId": "044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", "externalIds": {"ArXiv": + "2007.14062", "DBLP": "journals/corr/abs-2007-14062", "MAG": "3104613728", + "CorpusId": 220831004}, "corpusId": 220831004, "publicationVenue": {"id": + "d9720b90-d60b-48bc-9df8-87a30b9a60dd", "name": "Neural Information Processing + Systems", "type": "conference", "alternate_names": ["Neural Inf Process Syst", + "NeurIPS"], "url": "http://neurips.cc/"}, "url": "https://www.semanticscholar.org/paper/044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", "title": "Big Bird: Transformers for Longer Sequences", "abstract": "Transformers-based models, such as BERT, have been one of the most successful deep learning models for NLP. Unfortunately, one of their core limitations is the quadratic dependency @@ -4193,10 +4835,10 @@ interactions: improves performance on various NLP tasks such as question answering and summarization. We also propose novel applications to genomics data.", "venue": "Neural Information Processing Systems", "year": 2020, "referenceCount": 117, "citationCount": - 753, "influentialCitationCount": 131, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics", "Geography"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Geography", "source": "external"}, {"category": + 770, "influentialCitationCount": 132, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics", "Geography"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Geography", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-07-28", "journal": {"name": "ArXiv", "volume": "abs/2007.14062"}, "authors": [{"authorId": "1771307", "name": "M. Zaheer"}, {"authorId": "1947314", @@ -4208,7 +4850,8 @@ interactions: {"authorId": "113906155", "name": "Li Yang"}, {"authorId": "143629707", "name": "Amr Ahmed"}]}, {"paperId": "571b0750085ae3d939525e62af510ee2cee9d5ea", "externalIds": {"MAG": "2963373786", "ArXiv": "1606.03498", "DBLP": "conf/nips/SalimansGZCRCC16", - "CorpusId": 1687220}, "url": "https://www.semanticscholar.org/paper/571b0750085ae3d939525e62af510ee2cee9d5ea", + "CorpusId": 1687220}, "corpusId": 1687220, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/571b0750085ae3d939525e62af510ee2cee9d5ea", "title": "Improved Techniques for Training GANs", "abstract": "We present a variety of new architectural features and training procedures that we apply to the generative adversarial networks (GANs) framework. We focus on two applications @@ -4223,22 +4866,24 @@ interactions: a human error rate of 21.3%. We also present ImageNet samples with unprecedented resolution and show that our methods enable the model to learn recognizable features of ImageNet classes.", "venue": "NIPS", "year": 2016, "referenceCount": - 27, "citationCount": 6281, "influentialCitationCount": 821, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2016-06-10", - "journal": {"name": "ArXiv", "volume": "abs/1606.03498"}, "authors": [{"authorId": - "2887364", "name": "Tim Salimans"}, {"authorId": "153440022", "name": "Ian - J. Goodfellow"}, {"authorId": "2563432", "name": "Wojciech Zaremba"}, {"authorId": - "34415167", "name": "Vicki Cheung"}, {"authorId": "38909097", "name": "Alec - Radford"}, {"authorId": "41192764", "name": "Xi Chen"}]}, {"paperId": "f0a55c114e79b8a802fceaad7881a94dbcab790e", + 27, "citationCount": 6322, "influentialCitationCount": 832, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2016-06-10", "journal": {"name": "ArXiv", + "volume": "abs/1606.03498"}, "authors": [{"authorId": "2887364", "name": "Tim + Salimans"}, {"authorId": "153440022", "name": "Ian J. Goodfellow"}, {"authorId": + "2563432", "name": "Wojciech Zaremba"}, {"authorId": "34415167", "name": "Vicki + Cheung"}, {"authorId": "38909097", "name": "Alec Radford"}, {"authorId": "41192764", + "name": "Xi Chen"}]}, {"paperId": "f0a55c114e79b8a802fceaad7881a94dbcab790e", "externalIds": {"MAG": "240375037", "DOI": "10.1007/978-1-4020-6710-5", "CorpusId": - 60070108}, "url": "https://www.semanticscholar.org/paper/f0a55c114e79b8a802fceaad7881a94dbcab790e", + 60070108}, "corpusId": 60070108, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f0a55c114e79b8a802fceaad7881a94dbcab790e", "title": "Parsing the Turing Test: Philosophical and Methodological Issues in the Quest for the Thinking Computer", "abstract": null, "venue": "", "year": 2008, "referenceCount": 347, "citationCount": 132, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-1-4020-6710-5%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Book"], "publicationDate": "2008-12-03", "journal": {"name": "Parsing the Turing Test"}, "authors": [{"authorId": @@ -4246,27 +4891,25 @@ interactions: Roberts"}, {"authorId": "69358556", "name": "Grace Beber"}]}, {"paperId": "916023340b51142c48d5a75c27b1b962f6e665d9", "externalIds": {"DBLP": "journals/mima/SayginCA00", "MAG": "1648383461", "DOI": "10.1023/A:1011288000451", "CorpusId": 990084}, - "url": "https://www.semanticscholar.org/paper/916023340b51142c48d5a75c27b1b962f6e665d9", + "corpusId": 990084, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/916023340b51142c48d5a75c27b1b962f6e665d9", "title": "Turing Test: 50 Years Later", "abstract": null, "venue": "Minds - and Machines", "year": 2000, "referenceCount": 196, "citationCount": 327, - "influentialCitationCount": 11, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2000-11-01", "journal": {"name": "Minds and - Machines", "pages": "463-518", "volume": "10"}, "authors": [{"authorId": "2277803", - "name": "A. Saygin"}, {"authorId": "3188981", "name": "I. \u00c7i\u00e7ekli"}, - {"authorId": "2407157", "name": "Varol Akman"}]}, {"paperId": "3818c41db935df7d5c21348e5630de1a209da054", - "externalIds": {"ArXiv": "0807.1230", "DOI": "10.1038/nphys1651", "CorpusId": - 222175726}, "url": "https://www.semanticscholar.org/paper/3818c41db935df7d5c21348e5630de1a209da054", - "title": "Turing patterns on networks", "abstract": null, "venue": "", "year": - 2008, "referenceCount": 14, "citationCount": 95, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-07-08", - "journal": null, "authors": [{"authorId": "3259202", "name": "H. Nakao"}, - {"authorId": "2490613", "name": "A. Mikhailov"}]}, {"paperId": "fc756d1f45ea1c6ce9d2f4a23677eb3966bc00e2", - "externalIds": {"MAG": "595947030", "CorpusId": 60268691}, "url": "https://www.semanticscholar.org/paper/fc756d1f45ea1c6ce9d2f4a23677eb3966bc00e2", + and Machines", "year": 2000, "referenceCount": 196, "citationCount": 331, + "influentialCitationCount": 11, "isOpenAccess": true, "openAccessPdf": {"url": + "http://repository.bilkent.edu.tr/bitstream/11693/24987/1/Turing%20Test%2050%20Years%20Later.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2000-11-01", + "journal": {"name": "Minds and Machines", "pages": "463-518", "volume": "10"}, + "authors": [{"authorId": "2277803", "name": "A. Saygin"}, {"authorId": "3188981", + "name": "I. \u00c7i\u00e7ekli"}, {"authorId": null, "name": "Varol Akman"}]}, + {"paperId": "fc756d1f45ea1c6ce9d2f4a23677eb3966bc00e2", "externalIds": {"MAG": + "595947030", "CorpusId": 60268691}, "corpusId": 60268691, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fc756d1f45ea1c6ce9d2f4a23677eb3966bc00e2", "title": "The Annotated Turing: A Guided Tour Through Alan Turing''s Historic Paper on Computability and the Turing Machine", "abstract": "Programming Legend Charles Petzold unlocks the secrets of the extraordinary and prescient 1936 @@ -4283,14 +4926,15 @@ interactions: World War II, his involvement in seminal computer projects, his speculations about artificial intelligence, his arrest and prosecution for the crime of \"gross indecency,\" and his early death by apparent suicide at the age of - 41.", "venue": "", "year": 2008, "referenceCount": 20, "citationCount": 73, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "50033100", "name": "C. Petzold"}]}, - {"paperId": "118af918b5b39fada864417090b3f4c7ceacb63c", "externalIds": {"MAG": - "649147738", "CorpusId": 57640893}, "url": "https://www.semanticscholar.org/paper/118af918b5b39fada864417090b3f4c7ceacb63c", + 41.", "venue": "", "year": 2008, "referenceCount": 19, "citationCount": 72, + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "50033100", "name": "C. + Petzold"}]}, {"paperId": "118af918b5b39fada864417090b3f4c7ceacb63c", "externalIds": + {"MAG": "649147738", "CorpusId": 57640893}, "corpusId": 57640893, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/118af918b5b39fada864417090b3f4c7ceacb63c", "title": "Hypercomputation: Computing Beyond the Church-Turing Barrier", "abstract": "This book provides a thorough description of hypercomputation. It covers all attempts at devising conceptual hypermachines and all new promising computational @@ -4302,13 +4946,19 @@ interactions: from trial-and-error machines to the exploration of the human mind, if we treat it as a computing device.", "venue": "", "year": 2008, "referenceCount": 0, "citationCount": 72, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "1678557", "name": "A. - Syropoulos"}]}, {"paperId": "e40054dd660f12eba7e06b07dde718602a544dee", "externalIds": - {"MAG": "2061393260", "DBLP": "journals/siamam/GolovinMV08", "DOI": "10.1137/070703454", - "CorpusId": 207057334}, "url": "https://www.semanticscholar.org/paper/e40054dd660f12eba7e06b07dde718602a544dee", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1678557", + "name": "A. Syropoulos"}]}, {"paperId": "e40054dd660f12eba7e06b07dde718602a544dee", + "externalIds": {"MAG": "2061393260", "DBLP": "journals/siamam/GolovinMV08", + "DOI": "10.1137/070703454", "CorpusId": 207057334}, "corpusId": 207057334, + "publicationVenue": {"id": "9b3052dd-9e29-41cb-927c-28df9e08a68b", "name": + "SIAM Journal on Applied Mathematics", "type": "journal", "alternate_names": + ["SIAM J Appl Math", "Siam Journal on Applied Mathematics", "Siam J Appl Math"], + "issn": "0036-1399", "url": "https://www.jstor.org/journal/siamjapplmath", + "alternate_urls": ["https://epubs.siam.org/journal/smjmap", "http://www.jstor.org/journals/00361399.html"]}, + "url": "https://www.semanticscholar.org/paper/e40054dd660f12eba7e06b07dde718602a544dee", "title": "Turing Pattern Formation in the Brusselator Model with Superdiffusion", "abstract": "The effect of superdiffusion on pattern formation and pattern selection in the Brusselator model is studied. Our linear stability analysis @@ -4320,76 +4970,47 @@ interactions: Brusselator model near the stability boundaries confirm the results of the analysis. In addition, further from the stability boundaries, we find a regime of self-replicating spots.", "venue": "SIAM Journal on Applied Mathematics", - "year": 2008, "referenceCount": 65, "citationCount": 90, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-10-13", "journal": {"name": "SIAM J. Appl. Math.", "pages": "251-272", - "volume": "69"}, "authors": [{"authorId": "3343606", "name": "A. Golovin"}, - {"authorId": "1767738", "name": "B. Matkowsky"}, {"authorId": "153486742", - "name": "V. Volpert"}]}, {"paperId": "d304686801a3c9563939b7c88853569ab89b9258", + "year": 2008, "referenceCount": 65, "citationCount": 93, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-10-13", "journal": {"name": "SIAM J. Appl. Math.", + "pages": "251-272", "volume": "69"}, "authors": [{"authorId": "3343606", "name": + "A. Golovin"}, {"authorId": "1767738", "name": "B. Matkowsky"}, {"authorId": + "153486742", "name": "V. Volpert"}]}, {"paperId": "3818c41db935df7d5c21348e5630de1a209da054", + "externalIds": {"ArXiv": "0807.1230", "DOI": "10.1038/nphys1651", "CorpusId": + 222175726}, "corpusId": 222175726, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3818c41db935df7d5c21348e5630de1a209da054", + "title": "Turing patterns on networks", "abstract": null, "venue": "", "year": + 2008, "referenceCount": 5, "citationCount": 96, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0807.1230", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-07-08", + "journal": null, "authors": [{"authorId": "3259202", "name": "H. Nakao"}, + {"authorId": "2490613", "name": "A. Mikhailov"}]}, {"paperId": "d304686801a3c9563939b7c88853569ab89b9258", "externalIds": {"MAG": "1509006216", "DOI": "10.1007/978-1-4020-6710-5_2", - "CorpusId": 58530775}, "url": "https://www.semanticscholar.org/paper/d304686801a3c9563939b7c88853569ab89b9258", + "CorpusId": 58530775}, "corpusId": 58530775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d304686801a3c9563939b7c88853569ab89b9258", "title": "Alan Turing and the Turing Test", "abstract": null, "venue": "", "year": 2009, "referenceCount": 7, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "13-22", "volume": ""}, "authors": [{"authorId": - "144443425", "name": "A. Hodges"}]}, {"paperId": "48b0b047f9288d2310a2dffd7cd181dbfcfcce70", - "externalIds": {"MAG": "2169961916", "DBLP": "conf/birthday/BokerD08", "DOI": - "10.1007/978-3-540-78127-1_12", "CorpusId": 7263836}, "url": "https://www.semanticscholar.org/paper/48b0b047f9288d2310a2dffd7cd181dbfcfcce70", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "pages": "13-22", "volume": + ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "48b0b047f9288d2310a2dffd7cd181dbfcfcce70", "externalIds": {"MAG": "2169961916", + "DBLP": "conf/birthday/BokerD08", "DOI": "10.1007/978-3-540-78127-1_12", "CorpusId": + 7263836}, "corpusId": 7263836, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48b0b047f9288d2310a2dffd7cd181dbfcfcce70", "title": "The Church-Turing Thesis over Arbitrary Domains", "abstract": null, "venue": "Pillars of Computer Science", "year": 2008, "referenceCount": 49, "citationCount": 49, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "199-229"}, "authors": [{"authorId": "2875305", "name": "Udi Boker"}, - {"authorId": "1759551", "name": "N. Dershowitz"}]}, {"paperId": "692dfc2923a49a6e43c927fe21ac9f21f41d031b", - "externalIds": {"MAG": "2057794837", "DBLP": "journals/cim/Mendel07b", "DOI": - "10.1109/MCI.2007.9066897", "CorpusId": 16970447}, "url": "https://www.semanticscholar.org/paper/692dfc2923a49a6e43c927fe21ac9f21f41d031b", - "title": "Computing with Words: Zadeh, Turing, Popper and Occam", "abstract": - "In this article, after explaining Zadeh''s computing with words (CWW) paradigm, - I argue that for this paradigm to be embraced, it must be validated using - a Turinglike test, use a scientifically correct fuzzy set model for words, - namely interval type-2 fuzzy sets (IT2 FSs), and be simple, meaning that fuzzy - set operations should be as simple as possible. These conclusions are drawn - using the ideas of Turing, Popper and Occam. Short descriptions are provided - for a Perceptual Computer (Per-C), which is an architecture for CWW for making - subjective judgments, IT2 FSs, IT2 FS models for words, and why an IT2 FS - model captures first-order uncertainties about a word. Short biographies of - Zadeh, Turing, Popper and Occam are also provided.", "venue": "IEEE Computational - Intelligence Magazine", "year": 2007, "referenceCount": 52, "citationCount": - 166, "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2007-11-01", "journal": - {"name": "IEEE Computational Intelligence Magazine", "pages": "10-17", "volume": - "2"}, "authors": [{"authorId": "1728505", "name": "J. Mendel"}]}, {"paperId": - "f63d587692f80651916f0f3c6177b14cae21919d", "externalIds": {"MAG": "1580999956", - "DOI": "10.1007/978-3-7091-6597-3", "CorpusId": 60687871}, "url": "https://www.semanticscholar.org/paper/f63d587692f80651916f0f3c6177b14cae21919d", - "title": "The Universal Turing Machine: A Half-Century Survey", "abstract": - null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 471, - "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1992-02-01", "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "6259065", "name": "R. - Herken"}]}, {"paperId": "00b24a31690241e32b63ede66940d416b3284d64", "externalIds": - {"MAG": "1520047165", "DOI": "10.1007/978-1-4020-6710-5_23", "CorpusId": 5153049}, - "url": "https://www.semanticscholar.org/paper/00b24a31690241e32b63ede66940d416b3284d64", - "title": "Laplace, Turing and the \"imitation game\" impossible geometry: - randomness, determinism and programs in Turing''s test 1 .", "abstract": null, - "venue": "", "year": 2008, "referenceCount": 92, "citationCount": 33, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145529421", - "name": "G. Longo"}]}]} + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "199-229"}, "authors": [{"authorId": "2875305", + "name": "Udi Boker"}, {"authorId": "1759551", "name": "N. Dershowitz"}]}]} ' headers: @@ -4398,31 +5019,31 @@ interactions: Connection: - keep-alive Content-Length: - - '161918' + - '188086' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:18 GMT + - Tue, 03 Jan 2023 20:52:47 GMT Via: - - 1.1 b119d190fd68a1b5c82101503504cff2.cloudfront.net (CloudFront) + - 1.1 5798112148ae9e672af737182da15f62.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - ivGRpNpZyGK-s1C89JhvYSBNQvHjs640b1YQDvOEUxnr1RFqsaWJyA== + - IGY-n7lQX3BTljTFPN3ZIAC99HJ_mUxBXhemhbYTpaBI689wKO9Jfw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detD3EqcPHcFmSg= + - eLxQ5ESlPHcFafg= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '161918' + - '188086' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:18 GMT + - Tue, 03 Jan 2023 20:52:47 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - bfe49496-4a3f-423b-9279-8351a98162ed + - 367e9904-47fe-42e7-8f37-77bb34062304 status: code: 200 message: OK @@ -4438,13 +5059,62 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=200&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=200&limit=100 response: body: - string: '{"total": 133388, "offset": 200, "next": 300, "data": [{"paperId": - "08245022f6b376397ebce43c8e00af0fa3d7a28c", "externalIds": {"MAG": "2188388535", - "DBLP": "books/acm/19/0001MW19a", "DOI": "10.1145/3335741.3335755", "CorpusId": - 207758533}, "url": "https://www.semanticscholar.org/paper/08245022f6b376397ebce43c8e00af0fa3d7a28c", + string: '{"total": 133751, "offset": 200, "next": 300, "data": [{"paperId": + "692dfc2923a49a6e43c927fe21ac9f21f41d031b", "externalIds": {"MAG": "2057794837", + "DBLP": "journals/cim/Mendel07b", "DOI": "10.1109/MCI.2007.9066897", "CorpusId": + 16970447}, "corpusId": 16970447, "publicationVenue": {"id": "ee372de7-efda-4907-a03f-359292ea27f6", + "name": "IEEE Computational Intelligence Magazine", "type": "journal", "alternate_names": + ["IEEE Comput Intell Mag"], "issn": "1556-603X", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=10207", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10207"]}, + "url": "https://www.semanticscholar.org/paper/692dfc2923a49a6e43c927fe21ac9f21f41d031b", + "title": "Computing with Words: Zadeh, Turing, Popper and Occam", "abstract": + "In this article, after explaining Zadeh''s computing with words (CWW) paradigm, + I argue that for this paradigm to be embraced, it must be validated using + a Turinglike test, use a scientifically correct fuzzy set model for words, + namely interval type-2 fuzzy sets (IT2 FSs), and be simple, meaning that fuzzy + set operations should be as simple as possible. These conclusions are drawn + using the ideas of Turing, Popper and Occam. Short descriptions are provided + for a Perceptual Computer (Per-C), which is an architecture for CWW for making + subjective judgments, IT2 FSs, IT2 FS models for words, and why an IT2 FS + model captures first-order uncertainties about a word. Short biographies of + Zadeh, Turing, Popper and Occam are also provided.", "venue": "IEEE Computational + Intelligence Magazine", "year": 2007, "referenceCount": 52, "citationCount": + 166, "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-11-01", "journal": {"name": "IEEE Computational Intelligence Magazine", + "pages": "10-17", "volume": "2"}, "authors": [{"authorId": "1728505", "name": + "J. Mendel"}]}, {"paperId": "f63d587692f80651916f0f3c6177b14cae21919d", "externalIds": + {"MAG": "1580999956", "DOI": "10.1007/978-3-7091-6597-3", "CorpusId": 60687871}, + "corpusId": 60687871, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f63d587692f80651916f0f3c6177b14cae21919d", + "title": "The Universal Turing Machine: A Half-Century Survey", "abstract": + null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 470, + "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1992-02-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "6259065", + "name": "R. Herken"}]}, {"paperId": "00b24a31690241e32b63ede66940d416b3284d64", + "externalIds": {"MAG": "1520047165", "DOI": "10.1007/978-1-4020-6710-5_23", + "CorpusId": 5153049}, "corpusId": 5153049, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/00b24a31690241e32b63ede66940d416b3284d64", + "title": "Laplace, Turing and the \"imitation game\" impossible geometry: + randomness, determinism and programs in Turing''s test 1 .", "abstract": null, + "venue": "", "year": 2008, "referenceCount": 92, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal-ens.archives-ouvertes.fr/hal-03319368/file/2021_08_12_turing-game.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145529421", + "name": "G. Longo"}]}, {"paperId": "08245022f6b376397ebce43c8e00af0fa3d7a28c", + "externalIds": {"MAG": "2188388535", "DBLP": "books/acm/19/0001MW19a", "DOI": + "10.1145/3335741.3335755", "CorpusId": 207758533}, "corpusId": 207758533, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/08245022f6b376397ebce43c8e00af0fa3d7a28c", "title": "How to play any mental game, or a completeness theorem for protocols with honest majority", "abstract": "Permission to copy without fee all or part of this material is granted provided that the copies are not made or @@ -4461,27 +5131,70 @@ interactions: In this case, all playen want to agree on a single string y, selected with the right probability distribution, as M\u2019s output.", "venue": "Providing Sound Foundations for Cryptography", "year": 2019, "referenceCount": 6, "citationCount": - 938, "influentialCitationCount": 131, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "307-328"}, "authors": - [{"authorId": "1707322", "name": "Oded Goldreich"}, {"authorId": "1689467", - "name": "S. Micali"}, {"authorId": "1718867", "name": "A. Wigderson"}]}, {"paperId": - "562425c089b87fb339633557c8e18912766be3a4", "externalIds": {"DBLP": "journals/jsyml/HamkinsL00", - "MAG": "2950858234", "ArXiv": "math/9808093", "DOI": "10.1023/A:1021180801870", - "CorpusId": 14579486}, "url": "https://www.semanticscholar.org/paper/562425c089b87fb339633557c8e18912766be3a4", + 947, "influentialCitationCount": 130, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"pages": "307-328"}, + "authors": [{"authorId": "1707322", "name": "Oded Goldreich"}, {"authorId": + "1689467", "name": "S. Micali"}, {"authorId": "1718867", "name": "A. Wigderson"}]}, + {"paperId": "562425c089b87fb339633557c8e18912766be3a4", "externalIds": {"DBLP": + "journals/jsyml/HamkinsL00", "MAG": "2950858234", "ArXiv": "math/9808093", + "DOI": "10.1023/A:1021180801870", "CorpusId": 14579486}, "corpusId": 14579486, + "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": + "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J + Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/562425c089b87fb339633557c8e18912766be3a4", "title": "Infinite Time Turing Machines", "abstract": null, "venue": "Journal of Symbolic Logic (JSL)", "year": 1998, "referenceCount": 38, "citationCount": - 319, "influentialCitationCount": 50, "isOpenAccess": true, "fieldsOfStudy": + 321, "influentialCitationCount": 50, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/math/9808093", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1998-08-21", "journal": {"name": "Minds and Machines", "pages": "521-539", "volume": "12"}, "authors": [{"authorId": "1755318", "name": - "J. Hamkins"}]}, {"paperId": "6a5477375a2a420ecfcf2e1b89227fc38114b657", "externalIds": - {"DBLP": "conf/mcu/NearyW07", "MAG": "1838451616", "DOI": "10.3233/FI-2009-0036", - "CorpusId": 1090650}, "url": "https://www.semanticscholar.org/paper/6a5477375a2a420ecfcf2e1b89227fc38114b657", + "J. Hamkins"}]}, {"paperId": "d95384296470194f48de6a716609680f966c5507", "externalIds": + {"MAG": "2149937309", "DBLP": "journals/jsyml/KnightMB07", "DOI": "10.2178/JSL/1191333847", + "CorpusId": 26331040}, "corpusId": 26331040, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/d95384296470194f48de6a716609680f966c5507", + "title": "Turing computable embeddings", "abstract": "Abstract In [3]. two + different effective versions of Borel embedding are defined. The first, called + computable embedding, is based on uniform enumeration reducibility. while + the second, called Turing computable embedding, is based on uniform Turing + reducibility. While [3] focused mainly on computable embeddings, the present + paper considers Turing computable embeddings. Although the two notions are + not equivalent, we can show that they behave alike on the mathematically interesting + classes chosen for investigation in [3]. We give a \u201cPull-back Theorem\u201d, + saying that if \u0424 is a Turing computable embedding of K into K\u2032, + then for any computable infinitary sentence \u03c6 in the language of K\u2032, + we can find a computable infinitary sentence \u03c6* in the language of K + such that for all A \u2208 K A \u22a8 \u03c6* iff \u03a6 (A) \u22a8 \u03c6 + and \u03c6* has the same \u201ccomplexity\u201d as \u03c6 (i.e., if \u03c6 + is computable \u03a3\u03b1 or computable \u03a0\u03b1, for \u03b1 \u2265 1, + then so is \u03c6*). The Pull-back Theorem is useful in proving non-embeddability, + and it has other applications as well.", "venue": "Journal of Symbolic Logic + (JSL)", "year": 2007, "referenceCount": 8, "citationCount": 51, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2007-09-01", "journal": {"name": "Journal + of Symbolic Logic", "pages": "901 - 918", "volume": "72"}, "authors": [{"authorId": + "2490044", "name": "J. Knight"}, {"authorId": "2110280183", "name": "S. Miller"}, + {"authorId": "3066490", "name": "M. V. Boom"}]}, {"paperId": "6a5477375a2a420ecfcf2e1b89227fc38114b657", + "externalIds": {"DBLP": "conf/mcu/NearyW07", "MAG": "1838451616", "DOI": "10.3233/FI-2009-0036", + "CorpusId": 1090650}, "corpusId": 1090650, "publicationVenue": {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", + "name": "Fundamenta Informaticae", "type": "journal", "alternate_names": ["Fundam + Informaticae"], "issn": "0169-2968", "url": "http://content.iospress.com/journals/fundamenta-informaticae", + "alternate_urls": ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, + "url": "https://www.semanticscholar.org/paper/6a5477375a2a420ecfcf2e1b89227fc38114b657", "title": "Four Small Universal Turing Machines", "abstract": "We present universal Turing machines with state-symbol pairs of (5, 5), (6, 4), (9, 3) and (15, 2). These machines simulate our new variant of tag system, the bi-tag system @@ -4491,13 +5204,15 @@ interactions: Also, all of the universalmachines we present here simulate Turing machines in polynomial time.", "venue": "Fundamenta Informaticae", "year": 2007, "referenceCount": 32, "citationCount": 72, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "242-254"}, "authors": [{"authorId": "2221070", - "name": "T. Neary"}, {"authorId": "145284748", "name": "D. Woods"}]}, {"paperId": - "d740fb6468222c0647adfc968eb6379fff1b12d3", "externalIds": {"MAG": "1966623121", - "DOI": "10.1112/jlms/jdl015", "CorpusId": 15423785}, "url": "https://www.semanticscholar.org/paper/d740fb6468222c0647adfc968eb6379fff1b12d3", + "openAccessPdf": {"url": "http://mural.maynoothuniversity.ie/12416/1/Woods_FourSmall_2009.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "242-254"}, "authors": [{"authorId": + "2221070", "name": "Turlough Neary"}, {"authorId": "145284748", "name": "D. + Woods"}]}, {"paperId": "d740fb6468222c0647adfc968eb6379fff1b12d3", "externalIds": + {"MAG": "1966623121", "DOI": "10.1112/jlms/jdl015", "CorpusId": 15423785}, + "corpusId": 15423785, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d740fb6468222c0647adfc968eb6379fff1b12d3", "title": "An extension of the recursively enumerable Turing degrees", "abstract": "Consider the countable semilattice \u211bT consisting of the recursively enumerable Turing degrees. Although \u211bT is known to be structurally rich, @@ -4522,51 +5237,46 @@ interactions: that all of the degrees in \u211bT except 0 and 1 are incomparable with the specific degrees d, r1, and\u2208f(r2, 1) in \ud835\udcabw.", "venue": "", "year": 2007, "referenceCount": 93, "citationCount": 56, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-04-01", - "journal": {"name": "Journal of the London Mathematical Society", "volume": - "75"}, "authors": [{"authorId": "2292634", "name": "S. G. Simpson"}]}, {"paperId": - "d95384296470194f48de6a716609680f966c5507", "externalIds": {"DBLP": "journals/jsyml/KnightMB07", - "MAG": "2149937309", "DOI": "10.2178/JSL/1191333847", "CorpusId": 26331040}, - "url": "https://www.semanticscholar.org/paper/d95384296470194f48de6a716609680f966c5507", - "title": "Turing computable embeddings", "abstract": "Abstract In [3]. two - different effective versions of Borel embedding are defined. The first, called - computable embedding, is based on uniform enumeration reducibility. while - the second, called Turing computable embedding, is based on uniform Turing - reducibility. While [3] focused mainly on computable embeddings, the present - paper considers Turing computable embeddings. Although the two notions are - not equivalent, we can show that they behave alike on the mathematically interesting - classes chosen for investigation in [3]. We give a \u201cPull-back Theorem\u201d, - saying that if \u0424 is a Turing computable embedding of K into K\u2032, - then for any computable infinitary sentence \u03c6 in the language of K\u2032, - we can find a computable infinitary sentence \u03c6* in the language of K - such that for all A \u2208 K A \u22a8 \u03c6* iff \u03a6 (A) \u22a8 \u03c6 - and \u03c6* has the same \u201ccomplexity\u201d as \u03c6 (i.e., if \u03c6 - is computable \u03a3\u03b1 or computable \u03a0\u03b1, for \u03b1 \u2265 1, - then so is \u03c6*). The Pull-back Theorem is useful in proving non-embeddability, - and it has other applications as well.", "venue": "Journal of Symbolic Logic - (JSL)", "year": 2007, "referenceCount": 8, "citationCount": 50, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2007-09-01", "journal": {"name": "Journal of Symbolic - Logic", "pages": "901 - 918", "volume": "72"}, "authors": [{"authorId": "2490044", - "name": "J. Knight"}, {"authorId": "2110280183", "name": "S. Miller"}, {"authorId": - "3066490", "name": "M. V. Boom"}]}, {"paperId": "96758b9fb0e61a99df2dfc7dc6184d62ddd70cc8", - "externalIds": {"MAG": "1568039907", "DOI": "10.1007/978-3-662-05642-4", "CorpusId": - 12552947}, "url": "https://www.semanticscholar.org/paper/96758b9fb0e61a99df2dfc7dc6184d62ddd70cc8", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2007-04-01", "journal": {"name": "Journal of the London Mathematical Society", + "volume": "75"}, "authors": [{"authorId": "2292634", "name": "S. G. Simpson"}]}, + {"paperId": "96758b9fb0e61a99df2dfc7dc6184d62ddd70cc8", "externalIds": {"MAG": + "1568039907", "DOI": "10.1007/978-3-662-05642-4", "CorpusId": 12552947}, "corpusId": + 12552947, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/96758b9fb0e61a99df2dfc7dc6184d62ddd70cc8", "title": "Alan Turing: Life and Legacy of a Great Thinker", "abstract": null, "venue": "Springer Berlin Heidelberg", "year": 2003, "referenceCount": 35, - "citationCount": 274, "influentialCitationCount": 17, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-11-20", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "1759304", "name": "C. Teuscher"}]}, - {"paperId": "0a88c716f901efa817627ea33fa55c61a4819207", "externalIds": {"MAG": - "1970529802", "DOI": "10.1103/PHYSREVLETT.98.230601", "CorpusId": 8621091, - "PubMed": "17677891"}, "url": "https://www.semanticscholar.org/paper/0a88c716f901efa817627ea33fa55c61a4819207", + "citationCount": 275, "influentialCitationCount": 17, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-662-05642-4%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-11-20", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1759304", + "name": "C. Teuscher"}]}, {"paperId": "4ea1492caa105f54632ba16f3afc5d576d5e6aae", + "externalIds": {"MAG": "2121397369", "DBLP": "journals/mima/GoldinW08", "DOI": + "10.1007/s11023-007-9083-1", "CorpusId": 14327123}, "corpusId": 14327123, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/4ea1492caa105f54632ba16f3afc5d576d5e6aae", + "title": "The Interactive Nature of Computing: Refuting the Strong Church\u2013Turing + Thesis", "abstract": null, "venue": "Minds and Machines", "year": 2008, "referenceCount": + 49, "citationCount": 55, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.cs.brown.edu/people/pw/strong-cct.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-03-01", "journal": {"name": "Minds and Machines", + "pages": "17-38", "volume": "18"}, "authors": [{"authorId": "27353259", "name": + "Dina Q. Goldin"}, {"authorId": "2103444", "name": "P. Wegner"}]}, {"paperId": + "0a88c716f901efa817627ea33fa55c61a4819207", "externalIds": {"MAG": "1970529802", + "DOI": "10.1103/PHYSREVLETT.98.230601", "CorpusId": 8621091, "PubMed": "17677891"}, + "corpusId": 8621091, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/0a88c716f901efa817627ea33fa55c61a4819207", "title": "Additive global noise delays Turing bifurcations.", "abstract": "We apply a stochastic center manifold method to the calculation of noise-induced phase transitions in the stochastic Swift-Hohenberg equation. This analysis @@ -4578,26 +5288,18 @@ interactions: system. The results are generalizable to a broad class of nonlinear spatial systems.", "venue": "Physical Review Letters", "year": 2007, "referenceCount": 25, "citationCount": 50, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2007-06-06", "journal": {"name": "Physical review letters", - "pages": "\n 230601\n ", "volume": "98 23"}, "authors": [{"authorId": - "2268158", "name": "A. Hutt"}, {"authorId": "1748730", "name": "A. Longtin"}, - {"authorId": "1400946717", "name": "L. Schimansky-Geier"}]}, {"paperId": "4ea1492caa105f54632ba16f3afc5d576d5e6aae", - "externalIds": {"MAG": "2121397369", "DBLP": "journals/mima/GoldinW08", "DOI": - "10.1007/s11023-007-9083-1", "CorpusId": 14327123}, "url": "https://www.semanticscholar.org/paper/4ea1492caa105f54632ba16f3afc5d576d5e6aae", - "title": "The Interactive Nature of Computing: Refuting the Strong Church\u2013Turing - Thesis", "abstract": null, "venue": "Minds and Machines", "year": 2008, "referenceCount": - 49, "citationCount": 55, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-03-01", "journal": {"name": "Minds and Machines", "pages": "17-38", - "volume": "18"}, "authors": [{"authorId": "27353259", "name": "Dina Q. Goldin"}, - {"authorId": "2103444", "name": "P. Wegner"}]}, {"paperId": "1a8d2e5bb9c646d85308fbd6ce33fce8765e2c26", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-06-06", "journal": + {"name": "Physical review letters", "pages": "\n 230601\n ", + "volume": "98 23"}, "authors": [{"authorId": "2268158", "name": "A. Hutt"}, + {"authorId": "1748730", "name": "A. Longtin"}, {"authorId": "1400946717", + "name": "L. Schimansky-Geier"}]}, {"paperId": "1a8d2e5bb9c646d85308fbd6ce33fce8765e2c26", "externalIds": {"DBLP": "conf/stoc/Cook71", "MAG": "2036265926", "DOI": "10.1145/800157.805047", - "CorpusId": 7573663}, "url": "https://www.semanticscholar.org/paper/1a8d2e5bb9c646d85308fbd6ce33fce8765e2c26", + "CorpusId": 7573663}, "corpusId": 7573663, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/1a8d2e5bb9c646d85308fbd6ce33fce8765e2c26", "title": "The complexity of theorem-proving procedures", "abstract": "It is shown that any recognition problem solved by a polynomial time-bounded nondeterministic Turing machine can be \u201creduced\u201d to the problem of determining whether @@ -4610,38 +5312,18 @@ interactions: is isomorphic to a subgraph of the second. Other examples are discussed. A method of measuring the complexity of proof procedures for the predicate calculus is introduced and discussed.", "venue": "Symposium on the Theory of Computing", - "year": 1971, "referenceCount": 9, "citationCount": 6782, "influentialCitationCount": - 569, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "year": 1971, "referenceCount": 9, "citationCount": 6802, "influentialCitationCount": + 572, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800157.805047", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": "1971-05-03", "journal": {"name": "Proceedings of the third annual ACM symposium on Theory of computing"}, "authors": [{"authorId": "1765456", "name": "S. - Cook"}]}, {"paperId": "33618d79c8dc21de95859d2da9a329a57e15939b", "externalIds": - {"MAG": "1997660092", "DOI": "10.1103/PHYSREVE.75.046212", "CorpusId": 23374977, - "PubMed": "17500983"}, "url": "https://www.semanticscholar.org/paper/33618d79c8dc21de95859d2da9a329a57e15939b", - "title": "Turing patterns in three dimensions.", "abstract": "We investigate - three-dimensional Turing patterns in two-component reaction diffusion systems. - The FitzHugh-Nagumo equation, the Brusselator, and the Gray-Scott model are - solved numerically in three dimensions. Several interconnected structures - of domains as well as lamellar, hexagonal, and spherical domains are obtained - as stable motionless equilibrium patterns. The relative stability of these - structures is studied analytically based on the reduction approximation. The - relation with the microphase-separated structures in block copolymers is also - discussed.", "venue": "Physical review. E, Statistical, nonlinear, and soft - matter physics", "year": 2007, "referenceCount": 47, "citationCount": 44, - "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2007-04-24", "journal": {"name": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "pages": "\n 046212\n ", "volume": - "75 4 Pt 2"}, "authors": [{"authorId": "5764218", "name": "Hiroto Shoji"}, - {"authorId": "47274108", "name": "Kohtaro Yamada"}, {"authorId": "1947465", - "name": "D. Ueyama"}, {"authorId": "90756570", "name": "T. Ohta"}]}, {"paperId": - "9cd99ae57a407af5ab413e232eaa97f157c3c8b9", "externalIds": {"MAG": "2169989266", - "DOI": "10.1088/0953-8984/19/6/065115", "CorpusId": 6704606}, "url": "https://www.semanticscholar.org/paper/9cd99ae57a407af5ab413e232eaa97f157c3c8b9", + Cook"}]}, {"paperId": "9cd99ae57a407af5ab413e232eaa97f157c3c8b9", "externalIds": + {"MAG": "2169989266", "DOI": "10.1088/0953-8984/19/6/065115", "CorpusId": + 6704606}, "corpusId": 6704606, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9cd99ae57a407af5ab413e232eaa97f157c3c8b9", "title": "Turing pattern formation with fractional diffusion and fractional reactions", "abstract": "We have investigated Turing pattern formation through linear stability analysis and numerical simulations in a two-species reaction\u2013diffusion @@ -4657,26 +5339,59 @@ interactions: linear instability analysis is an excellent predictor of both the onset of and the nature of pattern formation in fractional nonlinear reaction\u2013diffusion equations.", "venue": "", "year": 2007, "referenceCount": 59, "citationCount": - 43, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2007-01-22", "journal": {"name": "Journal of Physics: - Condensed Matter", "pages": "065115", "volume": "19"}, "authors": [{"authorId": - "143728613", "name": "T. Langlands"}, {"authorId": "39683695", "name": "B. - Henry"}, {"authorId": "2590109", "name": "S. Wearne"}]}, {"paperId": "f7b95c9e70143fd4ae9859884aee9284c3a7b562", + 43, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://eprints.usq.edu.au/5442/4/Langlands_Henry_Wearne__JPhys_2007_AV.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2007-01-22", "journal": {"name": + "Journal of Physics: Condensed Matter", "pages": "065115", "volume": "19"}, + "authors": [{"authorId": "143728613", "name": "T. Langlands"}, {"authorId": + "39683695", "name": "B. Henry"}, {"authorId": "2590109", "name": "S. Wearne"}]}, + {"paperId": "33618d79c8dc21de95859d2da9a329a57e15939b", "externalIds": {"MAG": + "1997660092", "DOI": "10.1103/PHYSREVE.75.046212", "CorpusId": 23374977, "PubMed": + "17500983"}, "corpusId": 23374977, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/33618d79c8dc21de95859d2da9a329a57e15939b", + "title": "Turing patterns in three dimensions.", "abstract": "We investigate + three-dimensional Turing patterns in two-component reaction diffusion systems. + The FitzHugh-Nagumo equation, the Brusselator, and the Gray-Scott model are + solved numerically in three dimensions. Several interconnected structures + of domains as well as lamellar, hexagonal, and spherical domains are obtained + as stable motionless equilibrium patterns. The relative stability of these + structures is studied analytically based on the reduction approximation. The + relation with the microphase-separated structures in block copolymers is also + discussed.", "venue": "Physical review. E, Statistical, nonlinear, and soft + matter physics", "year": 2007, "referenceCount": 47, "citationCount": 44, + "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": {"url": + "https://repository.kulib.kyoto-u.ac.jp/dspace/bitstream/2433/49964/1/PhysRevE_75_046212.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-04-24", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 046212\n ", "volume": "75 4 Pt 2"}, "authors": + [{"authorId": "5764218", "name": "Hiroto Shoji"}, {"authorId": "47274108", + "name": "Kohtaro Yamada"}, {"authorId": "1947465", "name": "D. Ueyama"}, {"authorId": + "90756570", "name": "T. Ohta"}]}, {"paperId": "f7b95c9e70143fd4ae9859884aee9284c3a7b562", "externalIds": {"MAG": "1489834609", "DBLP": "conf/mcu/MoritaY07", "DOI": - "10.1007/978-3-540-74593-8_8", "CorpusId": 35189062}, "url": "https://www.semanticscholar.org/paper/f7b95c9e70143fd4ae9859884aee9284c3a7b562", + "10.1007/978-3-540-74593-8_8", "CorpusId": 35189062}, "corpusId": 35189062, + "publicationVenue": {"id": "c70b16dd-3be4-41cc-8494-33d2b373f5b9", "name": + "Machines, Computations, and Universality", "type": "conference", "alternate_names": + ["Mach Comput Universality", "MCU"]}, "url": "https://www.semanticscholar.org/paper/f7b95c9e70143fd4ae9859884aee9284c3a7b562", "title": "A Universal Reversible Turing Machine", "abstract": null, "venue": "Machines, Computations, and Universality", "year": 2007, "referenceCount": 17, "citationCount": 39, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2007-09-10", "journal": {"pages": "90-98"}, "authors": [{"authorId": "144254676", - "name": "K. Morita"}, {"authorId": "2087042096", "name": "Y. Yamaguchi"}]}, - {"paperId": "815c84ab906e43f3e6322f2ca3fd5e1360c64285", "externalIds": {"MAG": - "2194321275", "DOI": "10.1126/science.aab3050", "CorpusId": 11790493, "PubMed": - "26659050"}, "url": "https://www.semanticscholar.org/paper/815c84ab906e43f3e6322f2ca3fd5e1360c64285", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2007-09-10", "journal": {"pages": "90-98"}, "authors": + [{"authorId": "144254676", "name": "K. Morita"}, {"authorId": "2087042096", + "name": "Y. Yamaguchi"}]}, {"paperId": "815c84ab906e43f3e6322f2ca3fd5e1360c64285", + "externalIds": {"MAG": "2194321275", "DOI": "10.1126/science.aab3050", "CorpusId": + 11790493, "PubMed": "26659050"}, "corpusId": 11790493, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/815c84ab906e43f3e6322f2ca3fd5e1360c64285", "title": "Human-level concept learning through probabilistic program induction", "abstract": "Handwritten characters drawn by a model Not only do children learn effortlessly, they do so quickly and with a remarkable ability to use @@ -4700,17 +5415,22 @@ interactions: outperforming recent deep learning approaches. We also present several \u201cvisual Turing tests\u201d probing the model\u2019s creative generalization abilities, which in many cases are indistinguishable from human behavior.", "venue": - "Science", "year": 2015, "referenceCount": 94, "citationCount": 2337, "influentialCitationCount": - 268, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2015-12-11", "journal": {"name": "Science", "pages": "1332 - 1338", "volume": - "350"}, "authors": [{"authorId": "2373318", "name": "B. Lake"}, {"authorId": - "145124475", "name": "R. Salakhutdinov"}, {"authorId": "1763295", "name": - "J. Tenenbaum"}]}, {"paperId": "7932c28353f70c9793303a0ec240562b8576bd3e", + "Science", "year": 2015, "referenceCount": 94, "citationCount": 2347, "influentialCitationCount": + 268, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2015-12-11", "journal": {"name": "Science", "pages": "1332 + - 1338", "volume": "350"}, "authors": [{"authorId": "2373318", "name": "B. + Lake"}, {"authorId": "145124475", "name": "R. Salakhutdinov"}, {"authorId": + "1763295", "name": "J. Tenenbaum"}]}, {"paperId": "7932c28353f70c9793303a0ec240562b8576bd3e", "externalIds": {"MAG": "2068769173", "DOI": "10.1126/science.251.4994.650", - "CorpusId": 33862517, "PubMed": "17741380"}, "url": "https://www.semanticscholar.org/paper/7932c28353f70c9793303a0ec240562b8576bd3e", + "CorpusId": 33862517, "PubMed": "17741380"}, "corpusId": 33862517, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/7932c28353f70c9793303a0ec240562b8576bd3e", "title": "Modeling of Turing Structures in the Chlorite\u2014Iodide\u2014Malonic Acid\u2014Starch Reaction System", "abstract": "Recent experiments on the chlorite-iodide-malonic acid-starch reaction in a gel reactor give the first @@ -4722,16 +5442,20 @@ interactions: role by binding key iodine species, thereby creating the necessary difference in the effective diffusion coefficients of the activator and inhibitor species, iodide and chlorite ions, respectively.", "venue": "Science", "year": 1991, - "referenceCount": 21, "citationCount": 423, "influentialCitationCount": 11, - "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1991-02-08", "journal": - {"name": "Science", "pages": "650 - 652", "volume": "251"}, "authors": [{"authorId": - "1768811670", "name": "I. Lengyel"}, {"authorId": "144854275", "name": "I. - Epstein"}]}, {"paperId": "764d63f121c3cfab7a39e0ee2ff474bf74e61d5c", "externalIds": - {"MAG": "1977083964", "PubMedCentral": "2013944", "DOI": "10.1371/journal.pone.0001053", - "CorpusId": 7253250, "PubMed": "17940616"}, "url": "https://www.semanticscholar.org/paper/764d63f121c3cfab7a39e0ee2ff474bf74e61d5c", + "referenceCount": 21, "citationCount": 426, "influentialCitationCount": 11, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1991-02-08", "journal": {"name": "Science", "pages": "650 - 652", "volume": + "251"}, "authors": [{"authorId": "1768811670", "name": "I. Lengyel"}, {"authorId": + "144854275", "name": "I. Epstein"}]}, {"paperId": "764d63f121c3cfab7a39e0ee2ff474bf74e61d5c", + "externalIds": {"MAG": "1977083964", "PubMedCentral": "2013944", "DOI": "10.1371/journal.pone.0001053", + "CorpusId": 7253250, "PubMed": "17940616"}, "corpusId": 7253250, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/764d63f121c3cfab7a39e0ee2ff474bf74e61d5c", "title": "Turing Patterns Inside Cells", "abstract": "Concentration gradients inside cells are involved in key processes such as cell division and morphogenesis. Here we show that a model of the enzymatic step catalized by phosphofructokinase @@ -4748,18 +5472,23 @@ interactions: could provide a check-point that combines mechanical and biochemical information to trigger events during the cell division process.", "venue": "PLoS ONE", "year": 2007, "referenceCount": 31, "citationCount": 33, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-10-17", "journal": {"name": "PLoS - ONE", "volume": "2"}, "authors": [{"authorId": "6985055", "name": "D. Strier"}, - {"authorId": "2143194", "name": "S. Ponce Dawson"}]}, {"paperId": "8201e6e687f2de477258e9be53ba7b73ee30d7de", - "externalIds": {"ArXiv": "1603.08511", "DBLP": "journals/corr/ZhangIE16", - "MAG": "2951708950", "DOI": "10.1007/978-3-319-46487-9_40", "CorpusId": 50698}, + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-10-17", "journal": {"name": "PLoS ONE", "volume": "2"}, "authors": [{"authorId": + "6985055", "name": "D. Strier"}, {"authorId": "2143194", "name": "S. Ponce + Dawson"}]}, {"paperId": "8201e6e687f2de477258e9be53ba7b73ee30d7de", "externalIds": + {"ArXiv": "1603.08511", "DBLP": "journals/corr/ZhangIE16", "MAG": "2951708950", + "DOI": "10.1007/978-3-319-46487-9_40", "CorpusId": 50698}, "corpusId": 50698, + "publicationVenue": {"id": "167fa0ca-e88a-4ef7-a16f-bc66c457c806", "name": + "European Conference on Computer Vision", "type": "conference", "alternate_names": + ["ECCV", "Eur Conf Comput Vis"], "url": "https://link.springer.com/conference/eccv"}, "url": "https://www.semanticscholar.org/paper/8201e6e687f2de477258e9be53ba7b73ee30d7de", "title": "Colorful Image Colorization", "abstract": null, "venue": "European Conference on Computer Vision", "year": 2016, "referenceCount": 56, "citationCount": - 2689, "influentialCitationCount": 266, "isOpenAccess": true, "fieldsOfStudy": + 2711, "influentialCitationCount": 270, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1603.08511", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2016-03-28", @@ -4767,7 +5496,8 @@ interactions: "Richard Zhang"}, {"authorId": "2094770", "name": "Phillip Isola"}, {"authorId": "1763086", "name": "Alexei A. Efros"}]}, {"paperId": "be05a00f0177fa966b6bb6eb36ad132928c9fe81", "externalIds": {"MAG": "2103809326", "DOI": "10.1111/J.1468-0068.2007.00636.X", - "CorpusId": 215753805}, "url": "https://www.semanticscholar.org/paper/be05a00f0177fa966b6bb6eb36ad132928c9fe81", + "CorpusId": 215753805}, "corpusId": 215753805, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/be05a00f0177fa966b6bb6eb36ad132928c9fe81", "title": "The Turing Test as Interactive Proof", "abstract": "In 1950, Alan Turing proposed his eponymous test based on indistinguisha-bility of verbal behavior as a replacement for the question \"Can machines think?\" Since then, @@ -4791,34 +5521,40 @@ interactions: make no conceivable difference from a practical standpoint. Thus, the Gordian knot between the two opposing views of the sufficiency of the Turing Test can be cut.", "venue": "", "year": 2007, "referenceCount": 24, "citationCount": - 32, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2007-12-01", "journal": {"name": - "No\u00fbs", "pages": "686-713", "volume": "41"}, "authors": [{"authorId": - "1692491", "name": "S. Shieber"}]}, {"paperId": "b076683a8ed69881cafe1ad84466a2e5355999b0", + 32, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "http://people.deas.harvard.edu/%7Eshieber/Biblio/Papers/turing-interactive-proof.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-12-01", + "journal": {"name": "No\u00fbs", "pages": "686-713", "volume": "41"}, "authors": + [{"authorId": "1692491", "name": "S. Shieber"}]}, {"paperId": "b076683a8ed69881cafe1ad84466a2e5355999b0", "externalIds": {"MAG": "1979127885", "DBLP": "journals/apal/CockettH08", "DOI": - "10.1016/j.apal.2008.04.005", "CorpusId": 10632866}, "url": "https://www.semanticscholar.org/paper/b076683a8ed69881cafe1ad84466a2e5355999b0", + "10.1016/j.apal.2008.04.005", "CorpusId": 10632866}, "corpusId": 10632866, + "publicationVenue": {"id": "5db9b91a-29ce-4a4c-a224-e3cf658c4bd1", "name": + "Annals of Pure and Applied Logic", "type": "journal", "alternate_names": + ["Ann Pure Appl Log"], "issn": "0168-0072", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505603/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/annals-of-pure-and-applied-logic", + "http://www.sciencedirect.com/science/journal/01680072"]}, "url": "https://www.semanticscholar.org/paper/b076683a8ed69881cafe1ad84466a2e5355999b0", "title": "Introduction to Turing categories", "abstract": null, "venue": "Annals of Pure and Applied Logic", "year": 2008, "referenceCount": 73, "citationCount": - 35, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-12-01", "journal": - {"name": "Ann. Pure Appl. Log.", "pages": "183-209", "volume": "156"}, "authors": - [{"authorId": "1761790", "name": "J. Cockett"}, {"authorId": "32888961", "name": - "Pieter J. W. Hofstra"}]}, {"paperId": "f5634975d919b869923b5745d17480755ef72aca", + 35, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-12-01", "journal": {"name": "Ann. Pure Appl. Log.", "pages": "183-209", + "volume": "156"}, "authors": [{"authorId": "1761790", "name": "J. Cockett"}, + {"authorId": "32888961", "name": "Pieter J. W. Hofstra"}]}, {"paperId": "f5634975d919b869923b5745d17480755ef72aca", "externalIds": {"MAG": "1490126823", "DOI": "10.1108/03684920710747147", "CorpusId": - 60536086}, "url": "https://www.semanticscholar.org/paper/f5634975d919b869923b5745d17480755ef72aca", + 60536086}, "corpusId": 60536086, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f5634975d919b869923b5745d17480755ef72aca", "title": "The Essential Turing", "abstract": null, "venue": "", "year": 2007, "referenceCount": 19, "citationCount": 158, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "2007-04-17", "journal": {"name": "Kybernetes", "pages": - "550-551", "volume": "36"}, "authors": [{"authorId": "16210036", "name": "D. - Hutton"}]}, {"paperId": "28d9dbee97eba9f11a87edf3b44fabb4a8db082e", "externalIds": - {"MAG": "2061970672", "DOI": "10.2307/1970290", "CorpusId": 14797679}, "url": - "https://www.semanticscholar.org/paper/28d9dbee97eba9f11a87edf3b44fabb4a8db082e", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "2007-04-17", "journal": + {"name": "Kybernetes", "pages": "550-551", "volume": "36"}, "authors": [{"authorId": + "16210036", "name": "D. Hutton"}]}, {"paperId": "28d9dbee97eba9f11a87edf3b44fabb4a8db082e", + "externalIds": {"MAG": "2061970672", "DOI": "10.2307/1970290", "CorpusId": + 14797679}, "corpusId": 14797679, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/28d9dbee97eba9f11a87edf3b44fabb4a8db082e", "title": "Recursive Unsolvability of Post''s Problem of \"Tag\" and other Topics in Theory of Turing Machines", "abstract": "The equivalence of the notions of effective computability as based (1) on formal systems (e.g., those @@ -4838,13 +5574,15 @@ interactions: machine corresponds to a set of productions in a system which has the monogenic property (for each string in the Post system just one production can operate). This settles the questions raised", "venue": "", "year": 1961, "referenceCount": - 9, "citationCount": 689, "influentialCitationCount": 30, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1961-11-01", "journal": {"name": - "Annals of Mathematics", "pages": "437", "volume": "74"}, "authors": [{"authorId": - "1847175", "name": "M. Minsky"}]}, {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f", - "externalIds": {"MAG": "2967838196", "CorpusId": 17359642}, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f", + 9, "citationCount": 691, "influentialCitationCount": 31, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1961-11-01", "journal": {"name": "Annals of Mathematics", "pages": "437", + "volume": "74"}, "authors": [{"authorId": "1847175", "name": "M. Minsky"}]}, + {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f", "externalIds": {"MAG": + "2967838196", "CorpusId": 17359642}, "corpusId": 17359642, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f", "title": "Computing Machinery and Intelligence A.M. Turing", "abstract": "I propose to consider the question, \"Can machines think?\" This should begin with definitions of the meaning of the terms \"machine\" and \"think.\" The @@ -4857,13 +5595,14 @@ interactions: a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 129, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2262347", - "name": "A. Turing"}]}, {"paperId": "9a2b317f021e7ea8d0c57af72f40774df4f4065a", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "9a2b317f021e7ea8d0c57af72f40774df4f4065a", "externalIds": {"DBLP": "books/el/RV01/ClarkeS01", "MAG": "2583148105", "DOI": - "10.1145/1592761.1592781", "CorpusId": 5857292}, "url": "https://www.semanticscholar.org/paper/9a2b317f021e7ea8d0c57af72f40774df4f4065a", + "10.1145/1592761.1592781", "CorpusId": 5857292}, "corpusId": 5857292, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9a2b317f021e7ea8d0c57af72f40774df4f4065a", "title": "Model checking", "abstract": "Turing Lecture from the winners of the 2007 ACM A.M. Turing Award. In 1981, Edmund M. Clarke and E. Allen Emerson, working in the USA, and Joseph Sifakis working independently in France, authored @@ -4891,8 +5630,9 @@ interactions: correctness of their initial designs. Model checking promises to have an even greater impact on the hardware and software industries in the future. ---Moshe Y. Vardi, Editor-in-Chief", "venue": "Handbook of Automated Reasoning", "year": - 1996, "referenceCount": 231, "citationCount": 4606, "influentialCitationCount": - 119, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1996, "referenceCount": 231, "citationCount": 4608, "influentialCitationCount": + 119, "isOpenAccess": true, "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=1592781&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1996-09-01", "journal": {"name": "Communications of the @@ -4900,7 +5640,10 @@ interactions: "name": "E. Clarke"}, {"authorId": "1784380", "name": "H. Schlingloff"}]}, {"paperId": "cddeb5149f4de157d4daeb609a8b1432a8126e7b", "externalIds": {"MAG": "2063918473", "DBLP": "journals/jql/GaleS95", "DOI": "10.1080/09296179508590051", - "CorpusId": 46217277}, "url": "https://www.semanticscholar.org/paper/cddeb5149f4de157d4daeb609a8b1432a8126e7b", + "CorpusId": 46217277}, "corpusId": 46217277, "publicationVenue": {"id": "c0503267-3ea4-41cd-aeb2-f8b244ff5a33", + "name": "Journal of Quantitative Linguistics", "type": "journal", "alternate_names": + ["J Quant Linguistics"], "issn": "0929-6174", "url": "http://www.tandfonline.com/loi/njql20"}, + "url": "https://www.semanticscholar.org/paper/cddeb5149f4de157d4daeb609a8b1432a8126e7b", "title": "Good-Turing Frequency Estimation Without Tears", "abstract": "Linguists and speech researchers who use statistical methods often need to estimate the frequency of some type of item in a population containing items of various @@ -4917,32 +5660,15 @@ interactions: and relative both to the approaches just discussed and to other, more sophisticated techniques.", "venue": "Journal of Quantitative Linguistics", "year": 1995, "referenceCount": 29, "citationCount": 334, "influentialCitationCount": 24, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "J. Quant. Linguistics", "pages": - "217-237", "volume": "2"}, "authors": [{"authorId": "34938639", "name": "W. - Gale"}, {"authorId": "3215185", "name": "G. Sampson"}]}, {"paperId": "e27777fb4e2f6ef91a2352a97f0148cbfcca4b83", - "externalIds": {"ArXiv": "cs/0512100", "DBLP": "journals/jsyml/Japaridze07", - "MAG": "2126691354", "DOI": "10.2178/jsl/1174668394", "CorpusId": 8604718}, - "url": "https://www.semanticscholar.org/paper/e27777fb4e2f6ef91a2352a97f0148cbfcca4b83", - "title": "The logic of interactive turing reduction", "abstract": "Abstract - The paper gives a soundness and completeness proof for the implicative fragment - of intuitionistic calculus with respect to the semantics of computability - logic, which understands intuitionistic implication as interactive algorithmic - reduction. This concept \u2014 more precisely, the associated concept of reducibility - \u2014 is a generalization of Turing reducibility from the traditional, input/output - sorts of problems to computational tasks of arbitrary degrees of interactivity.", - "venue": "Journal of Symbolic Logic (JSL)", "year": 2005, "referenceCount": - 28, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2005-12-27", "journal": - {"name": "Journal of Symbolic Logic", "pages": "243 - 276", "volume": "72"}, - "authors": [{"authorId": "6810356", "name": "G. Japaridze"}]}, {"paperId": - "4c7671550671deba9ec318d867522897f20e19ba", "externalIds": {"MAG": "2105259569", - "DOI": "10.1147/RD.176.0525", "CorpusId": 14641793}, "url": "https://www.semanticscholar.org/paper/4c7671550671deba9ec318d867522897f20e19ba", + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "J. Quant. Linguistics", "pages": "217-237", "volume": "2"}, "authors": + [{"authorId": "34938639", "name": "W. Gale"}, {"authorId": "3215185", "name": + "G. Sampson"}]}, {"paperId": "4c7671550671deba9ec318d867522897f20e19ba", "externalIds": + {"MAG": "2105259569", "DOI": "10.1147/RD.176.0525", "CorpusId": 14641793}, + "corpusId": 14641793, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4c7671550671deba9ec318d867522897f20e19ba", "title": "Logical reversibility of computation", "abstract": "The usual general-purpose computing automaton (e.g.. a Turing machine) is logically irreversible- its transition function lacks a single-valued inverse. Here it is shown that such @@ -4964,15 +5690,113 @@ interactions: data. The foregoing results are demonstrated explicitly using a type of three-tape Turing machine. The biosynthesis of messenger RNA is discussed as a physical example of reversible computation.", "venue": "", "year": 1973, "referenceCount": - 5, "citationCount": 3601, "influentialCitationCount": 222, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1973-11-01", - "journal": {"name": "Ibm Journal of Research and Development", "pages": "525-532", - "volume": "17"}, "authors": [{"authorId": "2623914", "name": "Charles H. Bennett"}]}, - {"paperId": "a6b0d2ffce204205da10abb360b5d93f7b25ad5d", "externalIds": {"MAG": - "2095308719", "DOI": "10.1073/PNAS.0511061103", "CorpusId": 16307148, "PubMed": - "16574775"}, "url": "https://www.semanticscholar.org/paper/a6b0d2ffce204205da10abb360b5d93f7b25ad5d", + 5, "citationCount": 3624, "influentialCitationCount": 224, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1973-11-01", "journal": {"name": "Ibm Journal of Research and Development", + "pages": "525-532", "volume": "17"}, "authors": [{"authorId": "2623914", "name": + "Charles H. Bennett"}]}, {"paperId": "9a5fce28c31967b8d1710fd7a2dded03e21461c2", + "externalIds": {"DBLP": "journals/iacr/Kusters06", "MAG": "2168537649", "DOI": + "10.1109/CSFW.2006.30", "CorpusId": 8739568}, "corpusId": 8739568, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9a5fce28c31967b8d1710fd7a2dded03e21461c2", + "title": "Simulation-based security with inexhaustible interactive Turing + machines", "abstract": "Recently, there has been much interest in extending + models for simulation-based security in such a way that the runtime of protocols + may depend on the length of their input. Finding such extensions has turned + out to be a non-trivial task. In this work, we propose a simple, yet expressive + general computational model for systems of interactive Turing machines (ITMs) + where the runtime of the ITMs may be polynomial per activation and may depend + on the length of the input received. One distinguishing feature of our model + is that the systems of ITMs that we consider involve a generic mechanism for + addressing dynamically generated copies of ITMs. We study properties of such + systems and, in particular, show that systems satisfying a certain acyclicity + condition run in polynomial time. Based on our general computational model, + we state different notions of simulation-based security in a uniform and concise + way, study their relationships, and prove a general composition theorem for + composing a polynomial number of copies of protocols, where the polynomial + is determined by the environment. The simplicity of our model is demonstrated + by the fact that many of our results can be proved by mere equational reasoning + based on a few equational principles on systems", "venue": "19th IEEE Computer + Security Foundations Workshop (CSFW''06)", "year": 2006, "referenceCount": + 22, "citationCount": 98, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-07-05", "journal": {"name": "19th IEEE Computer Security Foundations + Workshop (CSFW''06)", "pages": "12 pp.-320"}, "authors": [{"authorId": "1729507", + "name": "Ralf K\u00fcsters"}]}, {"paperId": "b622acfe5587aba462f0931de24ccb6c11ca1fda", + "externalIds": {"MAG": "1580995538", "DBLP": "conf/fossacs/OuaknineW06", "DOI": + "10.1007/11690634_15", "CorpusId": 7781913}, "corpusId": 7781913, "publicationVenue": + {"id": "e95f057c-b69a-4fed-b6cf-64d35d3d54d9", "name": "Foundations of Software + Science and Computation Structure", "type": "conference", "alternate_names": + ["Found Softw Sci Comput Struct", "FoSSaCS"], "url": "http://www.wikicfp.com/cfp/program?id=1079"}, + "url": "https://www.semanticscholar.org/paper/b622acfe5587aba462f0931de24ccb6c11ca1fda", + "title": "On Metric Temporal Logic and Faulty Turing Machines", "abstract": + null, "venue": "Foundations of Software Science and Computation Structure", + "year": 2006, "referenceCount": 31, "citationCount": 85, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/11690634_15.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2006-03-25", "journal": {"pages": "217-230"}, + "authors": [{"authorId": "1702514", "name": "J. Ouaknine"}, {"authorId": "1683653", + "name": "J. Worrell"}]}, {"paperId": "959be317a144a324e45850c91eb3ceb436fd024d", + "externalIds": {"MAG": "2124915201", "DOI": "10.1103/PHYSREVE.74.011914", + "CorpusId": 15722008, "PubMed": "16907134"}, "corpusId": 15722008, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/959be317a144a324e45850c91eb3ceb436fd024d", + "title": "Two-stage Turing model for generating pigment patterns on the leopard + and the jaguar.", "abstract": "Based on the results of phylogenetic analysis, + which showed that flecks are the primitive pattern of the felid family and + all other patterns including rosettes and blotches develop from it, we construct + a Turing reaction-diffusion model which generates spot patterns initially. + Starting from this spotted pattern, we successfully generate patterns of adult + leopards and jaguars by tuning parameters of the model in the subsequent phase + of patterning.", "venue": "Physical review. E, Statistical, nonlinear, and + soft matter physics", "year": 2006, "referenceCount": 52, "citationCount": + 87, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ora.ox.ac.uk/objects/uuid:ca05b88a-0de3-4b0e-9c82-bde6776ad097/download_file?safe_filename=212.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2006-07-21", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 011914\n ", "volume": "74 1 Pt 1"}, "authors": + [{"authorId": "2143537543", "name": "R. T. Liu"}, {"authorId": "32582426", + "name": "S. Liaw"}, {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": + "d1521832720167f4fac5bc3c6860d06601b9d568", "externalIds": {"MAG": "1968909098", + "DBLP": "journals/cie/Livingstone06", "DOI": "10.1145/1111293.1111303", "CorpusId": + 18719050}, "corpusId": 18719050, "publicationVenue": {"id": "ce5f5d49-2807-4aa0-9db3-64a03084444d", + "name": "Conference on Computability in Europe", "type": "conference", "alternate_names": + ["CiE", "CIE", "International Conference on Computers and Industrial Engineering", + "Conf Comput Eur", "Int Conf Comput Ind Eng"], "url": "http://www.illc.uva.nl/CiE/"}, + "url": "https://www.semanticscholar.org/paper/d1521832720167f4fac5bc3c6860d06601b9d568", + "title": "Turing''s test and believable AI in games", "abstract": "The Turing + test is perhaps the most famous, most quoted, and probably most often misrepresented + and misunderstood measure of machine intelligence. In this article we''ll + briefly review the Turing test and some of its key criticisms. In particular, + we will try to answer whether the Turing test -- or something derived from + it -- can be of use in developing and assessing game AI. We will also present + a brief overview of a methodology for conducting believability testing for + games and highlight some of the problems inherent in any attempt to categorically + determine whether or not some AI behavior is capable of convincing, life-like + behavior.", "venue": "Conference on Computability in Europe", "year": 2006, + "referenceCount": 27, "citationCount": 124, "influentialCitationCount": 16, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, + "journal": {"name": "Comput. Entertain.", "pages": "6", "volume": "4"}, "authors": + [{"authorId": "145084600", "name": "D. Livingstone"}]}, {"paperId": "a6b0d2ffce204205da10abb360b5d93f7b25ad5d", + "externalIds": {"MAG": "2095308719", "DOI": "10.1073/PNAS.0511061103", "CorpusId": + 16307148, "PubMed": "16574775"}, "corpusId": 16307148, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/a6b0d2ffce204205da10abb360b5d93f7b25ad5d", "title": "Turing instability mediated by voltage and calcium diffusion in paced cardiac cells.", "abstract": "In cardiac cells, the coupling between the voltage across the cell membrane (V(m)) and the release of calcium (Ca) @@ -4998,7 +5822,8 @@ interactions: on subcellular scales and life-threatening cardiac disorders.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 2006, "referenceCount": 48, "citationCount": 110, "influentialCitationCount": - 12, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + 12, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc1458631?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2006-04-11", "journal": @@ -5007,98 +5832,20 @@ interactions: "authors": [{"authorId": "4579892", "name": "Y. Shiferaw"}, {"authorId": "2267937", "name": "A. Karma"}]}, {"paperId": "ceaa956361937b608c08b86249fd5ae528eb4e05", "externalIds": {"ArXiv": "math/0611519", "MAG": "2147740750", "CorpusId": - 13484531}, "url": "https://www.semanticscholar.org/paper/ceaa956361937b608c08b86249fd5ae528eb4e05", + 13484531}, "corpusId": 13484531, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ceaa956361937b608c08b86249fd5ae528eb4e05", "title": "On the Church-Turing thesis", "abstract": "After a brief description of the Church-Turing Thesis, we suggest that, according to the latest results on classical recursive probabilistic solution of the Halting Problem, such thesis is asymptotically false.", "venue": "", "year": 2006, "referenceCount": - 15, "citationCount": 98, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2006-11-17", "journal": {"name": "arXiv: History - and Overview", "volume": ""}, "authors": [{"authorId": "104754701", "name": - "G. D\u2019Abramo"}]}, {"paperId": "d1521832720167f4fac5bc3c6860d06601b9d568", - "externalIds": {"MAG": "1968909098", "DBLP": "journals/cie/Livingstone06", - "DOI": "10.1145/1111293.1111303", "CorpusId": 18719050}, "url": "https://www.semanticscholar.org/paper/d1521832720167f4fac5bc3c6860d06601b9d568", - "title": "Turing''s test and believable AI in games", "abstract": "The Turing - test is perhaps the most famous, most quoted, and probably most often misrepresented - and misunderstood measure of machine intelligence. In this article we''ll - briefly review the Turing test and some of its key criticisms. In particular, - we will try to answer whether the Turing test -- or something derived from - it -- can be of use in developing and assessing game AI. We will also present - a brief overview of a methodology for conducting believability testing for - games and highlight some of the problems inherent in any attempt to categorically - determine whether or not some AI behavior is capable of convincing, life-like - behavior.", "venue": "Conference on Computability in Europe", "year": 2006, - "referenceCount": 27, "citationCount": 124, "influentialCitationCount": 16, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": null, "journal": {"name": "Comput. Entertain.", - "pages": "6", "volume": "4"}, "authors": [{"authorId": "145084600", "name": - "D. Livingstone"}]}, {"paperId": "9a5fce28c31967b8d1710fd7a2dded03e21461c2", - "externalIds": {"DBLP": "journals/iacr/Kusters06", "MAG": "2168537649", "DOI": - "10.1109/CSFW.2006.30", "CorpusId": 8739568}, "url": "https://www.semanticscholar.org/paper/9a5fce28c31967b8d1710fd7a2dded03e21461c2", - "title": "Simulation-based security with inexhaustible interactive Turing - machines", "abstract": "Recently, there has been much interest in extending - models for simulation-based security in such a way that the runtime of protocols - may depend on the length of their input. Finding such extensions has turned - out to be a non-trivial task. In this work, we propose a simple, yet expressive - general computational model for systems of interactive Turing machines (ITMs) - where the runtime of the ITMs may be polynomial per activation and may depend - on the length of the input received. One distinguishing feature of our model - is that the systems of ITMs that we consider involve a generic mechanism for - addressing dynamically generated copies of ITMs. We study properties of such - systems and, in particular, show that systems satisfying a certain acyclicity - condition run in polynomial time. Based on our general computational model, - we state different notions of simulation-based security in a uniform and concise - way, study their relationships, and prove a general composition theorem for - composing a polynomial number of copies of protocols, where the polynomial - is determined by the environment. The simplicity of our model is demonstrated - by the fact that many of our results can be proved by mere equational reasoning - based on a few equational principles on systems", "venue": "19th IEEE Computer - Security Foundations Workshop (CSFW''06)", "year": 2006, "referenceCount": - 22, "citationCount": 98, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-07-05", "journal": {"name": "19th - IEEE Computer Security Foundations Workshop (CSFW''06)", "pages": "12 pp.-320"}, - "authors": [{"authorId": "1729507", "name": "Ralf K\u00fcsters"}]}, {"paperId": - "959be317a144a324e45850c91eb3ceb436fd024d", "externalIds": {"MAG": "2124915201", - "DOI": "10.1103/PHYSREVE.74.011914", "CorpusId": 15722008, "PubMed": "16907134"}, - "url": "https://www.semanticscholar.org/paper/959be317a144a324e45850c91eb3ceb436fd024d", - "title": "Two-stage Turing model for generating pigment patterns on the leopard - and the jaguar.", "abstract": "Based on the results of phylogenetic analysis, - which showed that flecks are the primitive pattern of the felid family and - all other patterns including rosettes and blotches develop from it, we construct - a Turing reaction-diffusion model which generates spot patterns initially. - Starting from this spotted pattern, we successfully generate patterns of adult - leopards and jaguars by tuning parameters of the model in the subsequent phase - of patterning.", "venue": "Physical review. E, Statistical, nonlinear, and - soft matter physics", "year": 2006, "referenceCount": 52, "citationCount": - 87, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-07-21", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 011914\n ", - "volume": "74 1 Pt 1"}, "authors": [{"authorId": "2143537543", "name": "R. - T. Liu"}, {"authorId": "32582426", "name": "S. Liaw"}, {"authorId": "2339973", - "name": "P. Maini"}]}, {"paperId": "b622acfe5587aba462f0931de24ccb6c11ca1fda", - "externalIds": {"MAG": "1580995538", "DBLP": "conf/fossacs/OuaknineW06", "DOI": - "10.1007/11690634_15", "CorpusId": 7781913}, "url": "https://www.semanticscholar.org/paper/b622acfe5587aba462f0931de24ccb6c11ca1fda", - "title": "On Metric Temporal Logic and Faulty Turing Machines", "abstract": - null, "venue": "Foundations of Software Science and Computation Structure", - "year": 2006, "referenceCount": 31, "citationCount": 84, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2006-03-25", "journal": {"pages": "217-230"}, - "authors": [{"authorId": "1702514", "name": "J. Ouaknine"}, {"authorId": "1683653", - "name": "J. Worrell"}]}, {"paperId": "4997f116b2698f7f20de2f7b657d44f388769a0d", - "externalIds": {"MAG": "1585656097", "CorpusId": 60930892}, "url": "https://www.semanticscholar.org/paper/4997f116b2698f7f20de2f7b657d44f388769a0d", + 15, "citationCount": 99, "influentialCitationCount": 8, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2006-11-17", "journal": {"name": + "arXiv: History and Overview", "volume": ""}, "authors": [{"authorId": "104754701", + "name": "G. D\u2019Abramo"}]}, {"paperId": "4997f116b2698f7f20de2f7b657d44f388769a0d", + "externalIds": {"MAG": "1585656097", "CorpusId": 60930892}, "corpusId": 60930892, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4997f116b2698f7f20de2f7b657d44f388769a0d", "title": "The Annotation Game: On Turing (1950) on Computing, Machinery, and Intelligence (PUBLISHED VERSION BOWDLERIZED)", "abstract": "This is Turing''s classical paper with every passage quote/commented to highlight what Turing @@ -5110,22 +5857,30 @@ interactions: are resolved, Turing''s Test remains cognitive science''s rightful (and sole) empirical criterion today.", "venue": "", "year": 2006, "referenceCount": 23, "citationCount": 51, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-07-01", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2293327", - "name": "S. Harnad"}]}, {"paperId": "ae9464ac7d56f7b24960bd639ca65ef0db27042b", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2006-07-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "2293327", "name": "S. Harnad"}]}, {"paperId": "ae9464ac7d56f7b24960bd639ca65ef0db27042b", "externalIds": {"MAG": "2267693527", "DOI": "10.1007/978-3-642-70911-1_16", - "CorpusId": 61721698}, "url": "https://www.semanticscholar.org/paper/ae9464ac7d56f7b24960bd639ca65ef0db27042b", + "CorpusId": 61721698}, "corpusId": 61721698, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ae9464ac7d56f7b24960bd639ca65ef0db27042b", "title": "Alan Turing: The Chemical Basis of Morphogenesis", "abstract": null, "venue": "", "year": 1986, "referenceCount": 1, "citationCount": 426, "influentialCitationCount": - 16, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "235-236", "volume": ""}, "authors": [{"authorId": - "144784302", "name": "W. Freeman"}]}, {"paperId": "0daf97c9e3817305ec4a2032913dfb9bfda33705", - "externalIds": {"MAG": "2950308024", "DBLP": "journals/em/Booker06", "ArXiv": - "math/0507502", "DOI": "10.1080/10586458.2006.10128976", "CorpusId": 28459118}, + 16, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "pages": "235-236", + "volume": ""}, "authors": [{"authorId": "144784302", "name": "W. Freeman"}]}, + {"paperId": "0daf97c9e3817305ec4a2032913dfb9bfda33705", "externalIds": {"MAG": + "2950308024", "DBLP": "journals/em/Booker06", "ArXiv": "math/0507502", "DOI": + "10.1080/10586458.2006.10128976", "CorpusId": 28459118}, "corpusId": 28459118, + "publicationVenue": {"id": "030417fe-9d82-425b-b780-8edc58d04ce7", "name": + "Experimental Mathematics", "type": "journal", "alternate_names": ["Exp Math"], + "issn": "1058-6458", "url": "http://www.tandfonline.com/toc/uexm20/current", + "alternate_urls": ["http://www.tandf.co.uk/journals/authors/uexmauth.asp", + "http://www.emis.de/journals/EM/index.html", "http://www.emis.de/journals/EM/", + "http://www.expmath.org/", "https://projecteuclid.org/DPubS?handle=euclid.em&service=UI&verb=Display&version=1.0"]}, "url": "https://www.semanticscholar.org/paper/0daf97c9e3817305ec4a2032913dfb9bfda33705", "title": "Artin''s Conjecture, Turing''s Method, and the Riemann Hypothesis", "abstract": "We present a group-theoretic criterion under which one may verify @@ -5143,7 +5898,8 @@ interactions: testing Artin''s conjecture for S 5 representations, and the Riemann hypothesis for Dedekind zeta functions of S 5 and A 5 fields.", "venue": "Experimental Mathematics", "year": 2005, "referenceCount": 48, "citationCount": 48, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 6, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/math/0507502", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -5151,7 +5907,9 @@ interactions: - 407", "volume": "15"}, "authors": [{"authorId": "3063921", "name": "A. Booker"}]}, {"paperId": "da68a6989d839fe22dfc34a88a3ef653eef30007", "externalIds": {"MAG": "2063348015", "DOI": "10.1063/1.2214167", "CorpusId": 19274300, "PubMed": - "17014248"}, "url": "https://www.semanticscholar.org/paper/da68a6989d839fe22dfc34a88a3ef653eef30007", + "17014248"}, "corpusId": 19274300, "publicationVenue": {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", + "name": "Chaos", "type": "journal", "issn": "1054-1500", "url": "http://chaos.aip.org/", + "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, "url": "https://www.semanticscholar.org/paper/da68a6989d839fe22dfc34a88a3ef653eef30007", "title": "Turing patterns beyond hexagons and stripes.", "abstract": "The best known Turing patterns are composed of stripes or simple hexagonal arrangements of spots. Until recently, Turing patterns with other geometries have been @@ -5168,18 +5926,21 @@ interactions: examples of time-independent square Turing patterns. We also demonstrate that in a system where the Turing band is slightly below criticality, spatially uniform internal or external oscillations can create oscillating square patterns.", - "venue": "Chaos", "year": 2006, "referenceCount": 43, "citationCount": 62, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-09-27", "journal": {"name": "Chaos", "pages": "\n 037114\n ", + "venue": "Chaos", "year": 2006, "referenceCount": 43, "citationCount": 64, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-09-27", "journal": {"name": "Chaos", "pages": "\n 037114\n ", "volume": "16 3"}, "authors": [{"authorId": "2586119", "name": "L. Yang"}, {"authorId": "4978913", "name": "M. Dolnik"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "fd1970e13697489d8a4a64c795af3a485b39ca4f", "externalIds": {"DBLP": "conf/focs/WoodsN06", "ArXiv": "cs/0612089", "MAG": "2037124586", "DOI": "10.1109/FOCS.2006.58", - "CorpusId": 1284511}, "url": "https://www.semanticscholar.org/paper/fd1970e13697489d8a4a64c795af3a485b39ca4f", + "CorpusId": 1284511}, "corpusId": 1284511, "publicationVenue": {"id": "68cf0e99-5164-4480-8ed4-8b8416a091df", + "name": "IEEE Annual Symposium on Foundations of Computer Science", "type": + "conference", "alternate_names": ["FOCS", "IEEE Annu Symp Found Comput Sci"], + "url": "http://ieee-focs.org/"}, "url": "https://www.semanticscholar.org/paper/fd1970e13697489d8a4a64c795af3a485b39ca4f", "title": "On the time complexity of 2-tag systems and small universal Turing machines", "abstract": "We show that 2-tag systems efficiently simulate Turing machines. As a corollary we find that the small universal Turing machines @@ -5188,27 +5949,35 @@ interactions: overhead and improves a forty year old result in the area of small universal Turing machines", "venue": "IEEE Annual Symposium on Foundations of Computer Science", "year": 2006, "referenceCount": 28, "citationCount": 56, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://mural.maynoothuniversity.ie/15735/1/DW_on%20the%20time.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2006-10-21", "journal": {"name": "2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS''06)", "pages": "439-448"}, "authors": [{"authorId": "145284748", "name": "D. Woods"}, {"authorId": "2221070", - "name": "T. Neary"}]}, {"paperId": "733b17d65b453efb4fca1219d9d5620365929f05", + "name": "Turlough Neary"}]}, {"paperId": "733b17d65b453efb4fca1219d9d5620365929f05", "externalIds": {"DBLP": "journals/tcs/BecherFP07", "MAG": "2163847791", "DOI": - "10.1016/J.TCS.2007.02.022", "CorpusId": 6892208}, "url": "https://www.semanticscholar.org/paper/733b17d65b453efb4fca1219d9d5620365929f05", + "10.1016/J.TCS.2007.02.022", "CorpusId": 6892208}, "corpusId": 6892208, "publicationVenue": + {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": "Theoretical Computer + Science", "type": "journal", "alternate_names": ["Theor Comput Sci"], "issn": + "0304-3975", "url": "http://www.elsevier.com/locate/tcs", "alternate_urls": + ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/733b17d65b453efb4fca1219d9d5620365929f05", "title": "Turing''s unpublished algorithm for normal numbers", "abstract": null, "venue": "Theoretical Computer Science", "year": 2007, "referenceCount": - 17, "citationCount": 41, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-05-25", "journal": {"name": "Theor. - Comput. Sci.", "pages": "126-138", "volume": "377"}, "authors": [{"authorId": - "1960042", "name": "V. Becher"}, {"authorId": "1743296", "name": "S. Figueira"}, - {"authorId": "1954430", "name": "R. Picchi"}]}, {"paperId": "51a3d5ee450fdcdaed8afcf30a4e91e0ad810c92", - "externalIds": {"MAG": "2135247172", "ArXiv": "cs/0607014", "DBLP": "journals/corr/abs-cs-0607014", - "DOI": "10.1109/ISIT.2006.262066", "CorpusId": 9631}, "url": "https://www.semanticscholar.org/paper/51a3d5ee450fdcdaed8afcf30a4e91e0ad810c92", + 17, "citationCount": 42, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-05-25", "journal": {"name": "Theor. Comput. Sci.", "pages": "126-138", + "volume": "377"}, "authors": [{"authorId": "1960042", "name": "V. Becher"}, + {"authorId": "1743296", "name": "S. Figueira"}, {"authorId": "1954430", "name": + "R. Picchi"}]}, {"paperId": "51a3d5ee450fdcdaed8afcf30a4e91e0ad810c92", "externalIds": + {"MAG": "2135247172", "ArXiv": "cs/0607014", "DBLP": "journals/corr/abs-cs-0607014", + "DOI": "10.1109/ISIT.2006.262066", "CorpusId": 9631}, "corpusId": 9631, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/51a3d5ee450fdcdaed8afcf30a4e91e0ad810c92", "title": "Strong Consistency of the Good-Turing Estimator", "abstract": "We consider the problem of estimating the total probability of all symbols that appear with a given frequency in a string of i.i.d. random variables with @@ -5220,7 +5989,8 @@ interactions: We then show that the good-turing total probability estimator is strongly consistent", "venue": "2006 IEEE International Symposium on Information Theory", "year": 2006, "referenceCount": 22, "citationCount": 32, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/cs/0607014", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -5228,7 +5998,8 @@ interactions: Theory", "pages": "2526-2530"}, "authors": [{"authorId": "145606712", "name": "A. Wagner"}, {"authorId": "144768649", "name": "P. Viswanath"}, {"authorId": "1697413", "name": "S. Kulkarni"}]}, {"paperId": "7d6f62e13d4a9d878d1e1aac7d4f82c1bd8b85a0", - "externalIds": {"CorpusId": 2947929}, "url": "https://www.semanticscholar.org/paper/7d6f62e13d4a9d878d1e1aac7d4f82c1bd8b85a0", + "externalIds": {"CorpusId": 2947929}, "corpusId": 2947929, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7d6f62e13d4a9d878d1e1aac7d4f82c1bd8b85a0", "title": "Super-Turing or Non-Turing ? Extending the Concept of Computation", "abstract": "\u201cHypercomputation\u201d is often defined as transcending Turing computation in the sense of computing a larger class of functions than @@ -5247,22 +6018,27 @@ interactions: to achieve computational goals, which will increase in importance as we approach the limits of electronic binary logic.", "venue": "", "year": 2007, "referenceCount": 35, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1710647", "name": "B. MacLennan"}]}, - {"paperId": "d812a327b48845eb4cc1566ad15c27b1f0e3489c", "externalIds": {"MAG": - "1874507637", "DOI": "10.1007/3-540-34874-3_1", "CorpusId": 60682237}, "url": - "https://www.semanticscholar.org/paper/d812a327b48845eb4cc1566ad15c27b1f0e3489c", + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1710647", + "name": "B. MacLennan"}]}, {"paperId": "d812a327b48845eb4cc1566ad15c27b1f0e3489c", + "externalIds": {"MAG": "1874507637", "DOI": "10.1007/3-540-34874-3_1", "CorpusId": + 60682237}, "corpusId": 60682237, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d812a327b48845eb4cc1566ad15c27b1f0e3489c", "title": "Turing, Computing and Communication", "abstract": null, "venue": "", "year": 2006, "referenceCount": 0, "citationCount": 27, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "1-8", "volume": ""}, "authors": [{"authorId": - "144889520", "name": "R. Milner"}]}, {"paperId": "e0535dedb8607d83cd2614317c99913378e89e26", - "externalIds": {"MAG": "2103179919", "DBLP": "journals/neco/MaassNM02", "DOI": - "10.1162/089976602760407955", "CorpusId": 1045112, "PubMed": "12433288"}, - "url": "https://www.semanticscholar.org/paper/e0535dedb8607d83cd2614317c99913378e89e26", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "pages": "1-8", "volume": + ""}, "authors": [{"authorId": "144889520", "name": "R. Milner"}]}, {"paperId": + "e0535dedb8607d83cd2614317c99913378e89e26", "externalIds": {"MAG": "2103179919", + "DBLP": "journals/neco/MaassNM02", "DOI": "10.1162/089976602760407955", "CorpusId": + 1045112, "PubMed": "12433288"}, "corpusId": 1045112, "publicationVenue": {"id": + "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", "name": "Neural Computation", "type": + "journal", "alternate_names": ["Neural Comput"], "issn": "0899-7667", "url": + "http://cognet.mit.edu/library/journals/journal?issn=08997667", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", "http://www.mitpressjournals.org/loi/neco", + "https://www.mitpressjournals.org/loi/neco"]}, "url": "https://www.semanticscholar.org/paper/e0535dedb8607d83cd2614317c99913378e89e26", "title": "Real-Time Computing Without Stable States: A New Framework for Neural Computation Based on Perturbations", "abstract": "A key challenge for neural modeling is to explain how a continuous stream of multimodal input from a @@ -5290,36 +6066,17 @@ interactions: inputs. Our approach provides new perspectives for the interpretation of neural coding, the design of experiments and data analysis in neurophysiology, and the solution of problems in robotics and neurotechnology.", "venue": "Neural - Computation", "year": 2002, "referenceCount": 34, "citationCount": 3014, "influentialCitationCount": - 254, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2002-11-01", "journal": {"name": "Neural Computation", "pages": "2531-2560", - "volume": "14"}, "authors": [{"authorId": "145247053", "name": "W. Maass"}, - {"authorId": "1792142", "name": "T. Natschl\u00e4ger"}, {"authorId": "1754307", - "name": "H. Markram"}]}, {"paperId": "8edb52262478e3d0c0b46e4db75bb8b36fe96c7f", - "externalIds": {"MAG": "182486616", "DBLP": "conf/aaai/Schubert06", "CorpusId": - 6325617}, "url": "https://www.semanticscholar.org/paper/8edb52262478e3d0c0b46e4db75bb8b36fe96c7f", - "title": "Turing''s Dream and the Knowledge Challenge", "abstract": "There - is a set of clear-cut challenges, all centering around knowledge, that have - received insufficient attention in AI, and whose solution could bring the - realization of Turing''s dream - the dream of a machine we can talk with just - like a person, and which is therefore (at least) our intellectual equal. These - challenges have to do with the representation of linguistically expressible - knowledge, the role of knowledge in language understanding, the use of knowledge - for several sorts of commonsense reasoning, and knowledge accumulation. Concerning - the last topic, I briefly present preliminary results of some of our recent - efforts to extract \"shallow\" general knowledge about the world from large - text corpora.", "venue": "AAAI", "year": 2006, "referenceCount": 32, "citationCount": - 28, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2006-07-16", - "journal": {"pages": "1534-1538"}, "authors": [{"authorId": "2404386", "name": - "Lenhart K. Schubert"}]}, {"paperId": "845ae6d7dd9139e37152e95f716a3c9b1a33c728", - "externalIds": {"DOI": "10.5860/choice.43-6496", "CorpusId": 14630748}, "url": - "https://www.semanticscholar.org/paper/845ae6d7dd9139e37152e95f716a3c9b1a33c728", + Computation", "year": 2002, "referenceCount": 34, "citationCount": 3020, "influentialCitationCount": + 253, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-11-01", "journal": {"name": "Neural Computation", + "pages": "2531-2560", "volume": "14"}, "authors": [{"authorId": "145247053", + "name": "W. Maass"}, {"authorId": "1792142", "name": "T. Natschl\u00e4ger"}, + {"authorId": "1754307", "name": "H. Markram"}]}, {"paperId": "845ae6d7dd9139e37152e95f716a3c9b1a33c728", + "externalIds": {"DOI": "10.5860/choice.43-6496", "CorpusId": 14630748}, "corpusId": + 14630748, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/845ae6d7dd9139e37152e95f716a3c9b1a33c728", "title": "The Man Who Knew Too Much : Alan Turing and the Invention of the Computer", "abstract": "Mathematicians like to think of themselves as seekers after truth. At the same time, there is an optimistic modeling of mathematics @@ -5355,36 +6112,62 @@ interactions: \u201cis one that many will find congenial and that will at least introduce new readers to the still tingling enigma of Alan Turing.\u201d Book Review", "venue": "", "year": 2006, "referenceCount": 0, "citationCount": 28, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": null, "authors": [{"authorId": "145350111", "name": "B. Cooper"}]}, - {"paperId": "cee5d4d123d6d289a14d41baffa73723dcd3e9e7", "externalIds": {"MAG": - "2799667009", "DOI": "10.2307/2316720", "CorpusId": 122951574}, "url": "https://www.semanticscholar.org/paper/cee5d4d123d6d289a14d41baffa73723dcd3e9e7", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": null, "authors": [{"authorId": "145350111", + "name": "B. Cooper"}]}, {"paperId": "8edb52262478e3d0c0b46e4db75bb8b36fe96c7f", + "externalIds": {"MAG": "182486616", "DBLP": "conf/aaai/Schubert06", "CorpusId": + 6325617}, "corpusId": 6325617, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8edb52262478e3d0c0b46e4db75bb8b36fe96c7f", + "title": "Turing''s Dream and the Knowledge Challenge", "abstract": "There + is a set of clear-cut challenges, all centering around knowledge, that have + received insufficient attention in AI, and whose solution could bring the + realization of Turing''s dream - the dream of a machine we can talk with just + like a person, and which is therefore (at least) our intellectual equal. These + challenges have to do with the representation of linguistically expressible + knowledge, the role of knowledge in language understanding, the use of knowledge + for several sorts of commonsense reasoning, and knowledge accumulation. Concerning + the last topic, I briefly present preliminary results of some of our recent + efforts to extract \"shallow\" general knowledge about the world from large + text corpora.", "venue": "AAAI", "year": 2006, "referenceCount": 32, "citationCount": + 28, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2006-07-16", "journal": {"pages": "1534-1538"}, "authors": + [{"authorId": "2404386", "name": "Lenhart K. Schubert"}]}, {"paperId": "cee5d4d123d6d289a14d41baffa73723dcd3e9e7", + "externalIds": {"MAG": "2799667009", "DOI": "10.2307/2316720", "CorpusId": + 122951574}, "corpusId": 122951574, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cee5d4d123d6d289a14d41baffa73723dcd3e9e7", "title": "Theory of Recursive Functions and Effective Computability", "abstract": "Central concerns of the book are related theories of recursively enumerable sets, of degree of un-solvability and turing degrees in particular. A second group of topics has to do with generalizations of recursion theory. The third topics group mentioned is subrecursive computability and subrecursive hierarchies", "venue": "", "year": 1969, "referenceCount": 0, "citationCount": 3375, "influentialCitationCount": - 138, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1969-05-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1423404594", "name": "Jr. Hartley Rogers"}]}, {"paperId": "3093155142ac6e5b29a6f9e98c341ef78e403dab", + 138, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1969-05-01", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "1423404594", "name": "Jr. Hartley Rogers"}]}, {"paperId": "3093155142ac6e5b29a6f9e98c341ef78e403dab", "externalIds": {"MAG": "1516984117", "DOI": "10.1126/SCIENCE.1136396", "CorpusId": - 206508685}, "url": "https://www.semanticscholar.org/paper/3093155142ac6e5b29a6f9e98c341ef78e403dab", + 206508685}, "corpusId": 206508685, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/3093155142ac6e5b29a6f9e98c341ef78e403dab", "title": "The Turing Model Comes of Molecular Age", "abstract": "Molecular analyses of hair follicle formation provide evidence to support the most well-known mathematical model for biological pattern formation.", "venue": "Science", - "year": 2006, "referenceCount": 18, "citationCount": 169, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-12-01", - "journal": {"name": "Science", "pages": "1397 - 1398", "volume": "314"}, "authors": - [{"authorId": "2339973", "name": "P. Maini"}, {"authorId": "35275545", "name": - "R. Baker"}, {"authorId": "1965740", "name": "C. Chuong"}]}, {"paperId": "58f2e11e74aa28293b77ebfe6868cfd0f266a639", + "year": 2006, "referenceCount": 18, "citationCount": 172, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc4383235?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2006-12-01", "journal": {"name": + "Science", "pages": "1397 - 1398", "volume": "314"}, "authors": [{"authorId": + "2339973", "name": "P. Maini"}, {"authorId": "35275545", "name": "R. Baker"}, + {"authorId": "1965740", "name": "C. Chuong"}]}, {"paperId": "58f2e11e74aa28293b77ebfe6868cfd0f266a639", "externalIds": {"MAG": "1555527843", "DOI": "10.1090/S0002-9947-05-04010-9", - "CorpusId": 36509363}, "url": "https://www.semanticscholar.org/paper/58f2e11e74aa28293b77ebfe6868cfd0f266a639", + "CorpusId": 36509363}, "corpusId": 36509363, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/58f2e11e74aa28293b77ebfe6868cfd0f266a639", "title": "Turing patterns in the Lengyel-Epstein system for the CIMA reaction", "abstract": "The first experimental evidence of the Turing pattern was observed by De Kepper and her associates (1990) on the CIMA reaction in an open unstirred @@ -5397,15 +6180,31 @@ interactions: steady states. A priori estimates are fundamental to our approach for this nonexistence result. The degree theory was combined with the a priori estimates to derive existence of nonconstant steady states.", "venue": "", "year": 2005, - "referenceCount": 27, "citationCount": 146, "influentialCitationCount": 4, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + "referenceCount": 27, "citationCount": 153, "influentialCitationCount": 6, + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/tran/2005-357-10/S0002-9947-05-04010-9/S0002-9947-05-04010-9.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-05-20", "journal": {"name": "Transactions of the American Mathematical Society", "pages": "3953-3969", "volume": "357"}, "authors": [{"authorId": "2531648", "name": "W. Ni"}, {"authorId": "50627764", "name": "M. Tang"}]}, - {"paperId": "bdd49b4a0b7de03b00412e3b807a855504e1d3af", "externalIds": {"MAG": - "1549671171", "DBLP": "conf/aaai/Mauldin94", "CorpusId": 17382073}, "url": + {"paperId": "7509b472cbe7b1fe71a8fccf60f34cc873d1ab63", "externalIds": {"MAG": + "2094149843", "DOI": "10.1016/0893-9659(91)90080-F", "CorpusId": 5909565}, + "corpusId": 5909565, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7509b472cbe7b1fe71a8fccf60f34cc873d1ab63", + "title": "Turing computability with neural nets", "abstract": null, "venue": + "", "year": 1991, "referenceCount": 13, "citationCount": 374, "influentialCitationCount": + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Applied Mathematics Letters", + "pages": "77-80", "volume": "4"}, "authors": [{"authorId": "2797623", "name": + "H. Siegelmann"}, {"authorId": "1790264", "name": "Eduardo Sontag"}]}, {"paperId": + "bdd49b4a0b7de03b00412e3b807a855504e1d3af", "externalIds": {"MAG": "1549671171", + "DBLP": "conf/aaai/Mauldin94", "CorpusId": 17382073}, "corpusId": 17382073, + "publicationVenue": {"id": "bdc2e585-4e48-4e36-8af1-6d859763d405", "name": + "AAAI Conference on Artificial Intelligence", "type": "conference", "alternate_names": + ["National Conference on Artificial Intelligence", "National Conf Artif Intell", + "AAAI Conf Artif Intell", "AAAI"], "url": "http://www.aaai.org/"}, "url": "https://www.semanticscholar.org/paper/bdd49b4a0b7de03b00412e3b807a855504e1d3af", "title": "CHATTERBOTS, TINYMUDS, and the Turing Test: Entering the Loebner Prize Competition", "abstract": "The Turing Test was proposed by Alan Turing @@ -5421,14 +6220,19 @@ interactions: Finally, we discuss the design of the Loebner competition itself, and address its usefulness in furthering the development of Artificial Intelligence.", "venue": "AAAI Conference on Artificial Intelligence", "year": 1994, "referenceCount": - 10, "citationCount": 319, "influentialCitationCount": 17, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1994-08-01", "journal": {"pages": "16-21"}, "authors": - [{"authorId": "35497738", "name": "M. Mauldin"}]}, {"paperId": "bad73e1b3203d62c82df18c4065b603a15f9ea40", - "externalIds": {"MAG": "2053429109", "DOI": "10.1126/science.268.5210.545", - "CorpusId": 17495161, "PubMed": "17756722"}, "url": "https://www.semanticscholar.org/paper/bad73e1b3203d62c82df18c4065b603a15f9ea40", + 10, "citationCount": 321, "influentialCitationCount": 17, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1994-08-01", "journal": {"pages": "16-21"}, + "authors": [{"authorId": "35497738", "name": "M. Mauldin"}]}, {"paperId": + "bad73e1b3203d62c82df18c4065b603a15f9ea40", "externalIds": {"MAG": "2053429109", + "DOI": "10.1126/science.268.5210.545", "CorpusId": 17495161, "PubMed": "17756722"}, + "corpusId": 17495161, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/bad73e1b3203d62c82df18c4065b603a15f9ea40", "title": "Computation Beyond the Turing Limit", "abstract": "Extensive efforts have been made to prove the Church-Turing thesis, which suggests that all realizable dynamical and physical systems cannot be more powerful than classical @@ -5438,41 +6242,26 @@ interactions: and analog machines. This dynamical system is conjectured to describe natural physical phenomena.", "venue": "Science", "year": 1995, "referenceCount": 30, "citationCount": 293, "influentialCitationCount": 16, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1995-04-28", "journal": - {"name": "Science", "pages": "545 - 548", "volume": "268"}, "authors": [{"authorId": - "2797623", "name": "H. Siegelmann"}]}, {"paperId": "1db1e2609852ed8843981386a94c868d4e642bf3", - "externalIds": {"MAG": "2026402424", "DOI": "10.1007/BF01342185", "CorpusId": - 14956017}, "url": "https://www.semanticscholar.org/paper/1db1e2609852ed8843981386a94c868d4e642bf3", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1995-04-28", "journal": {"name": "Science", "pages": "545 - 548", "volume": + "268"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": + "1db1e2609852ed8843981386a94c868d4e642bf3", "externalIds": {"MAG": "2026402424", + "DOI": "10.1007/BF01342185", "CorpusId": 14956017}, "corpusId": 14956017, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1db1e2609852ed8843981386a94c868d4e642bf3", "title": "Quantum mechanical hamiltonian models of turing machines", "abstract": - null, "venue": "", "year": 1982, "referenceCount": 28, "citationCount": 367, - "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1982-11-01", "journal": {"name": "Journal of Statistical Physics", "pages": - "515-546", "volume": "29"}, "authors": [{"authorId": "2542436", "name": "P. - Benioff"}]}, {"paperId": "c397331a7beb55c99a99506bc2cd1920e0322efb", "externalIds": - {"DBLP": "journals/bsl/Koepke05", "MAG": "2951220694", "ArXiv": "math/0502264", - "DOI": "10.2178/bsl/1122038993", "CorpusId": 918786}, "url": "https://www.semanticscholar.org/paper/c397331a7beb55c99a99506bc2cd1920e0322efb", - "title": "Turing computations on ordinals", "abstract": "We define the notion - of ordinal computability by generalizing standard Turing computability on - tapes of length $\\omega$ to computations on tapes of arbitrary ordinal length. - We show that a set of ordinals is ordinal computable from a finite set of - ordinal parameters if and only if it is an element of Goedel''s constructible - universe L. This characterization can be used to prove the generalized continuum - hypothesis in L.", "venue": "Bulletin of Symbolic Logic", "year": 2005, "referenceCount": - 11, "citationCount": 92, "influentialCitationCount": 11, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-02-13", "journal": {"name": "Bull. Symb. Log.", "pages": - "377-397", "volume": "11"}, "authors": [{"authorId": "1931365", "name": "P. - Koepke"}]}, {"paperId": "1402b56236b60ab5dedc4faa08d6bad0ec241796", "externalIds": - {"MAG": "2005646444", "DOI": "10.1103/PHYSREVE.72.061912", "CorpusId": 30098991, - "PubMed": "16485979"}, "url": "https://www.semanticscholar.org/paper/1402b56236b60ab5dedc4faa08d6bad0ec241796", + null, "venue": "", "year": 1982, "referenceCount": 28, "citationCount": 373, + "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1982-11-01", "journal": {"name": + "Journal of Statistical Physics", "pages": "515-546", "volume": "29"}, "authors": + [{"authorId": "2542436", "name": "P. Benioff"}]}, {"paperId": "1402b56236b60ab5dedc4faa08d6bad0ec241796", + "externalIds": {"MAG": "2005646444", "DOI": "10.1103/PHYSREVE.72.061912", + "CorpusId": 30098991, "PubMed": "16485979"}, "corpusId": 30098991, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1402b56236b60ab5dedc4faa08d6bad0ec241796", "title": "Membrane-bound Turing patterns.", "abstract": "Motivated by recent observations in biological cells, we study Turing patterns in bounded regions where the nonlinear chemical reactions occur on the boundary and where reagent @@ -5483,16 +6272,17 @@ interactions: computation technique is utilized to follow the nascent pattern into the highly nonlinear regime.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2005, "referenceCount": 24, "citationCount": - 105, "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-12-19", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 061912\n ", + 105, "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-12-19", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 061912\n ", "volume": "72 6 Pt 1"}, "authors": [{"authorId": "145876343", "name": "H. Levine"}, {"authorId": "2200058", "name": "W. Rappel"}]}, {"paperId": "403699167d709c22c375fbd5dd2524212505e09a", "externalIds": {"MAG": "2001168415", "DOI": "10.1103/PHYSREVE.72.026101", - "CorpusId": 17973322, "PubMed": "16196638"}, "url": "https://www.semanticscholar.org/paper/403699167d709c22c375fbd5dd2524212505e09a", + "CorpusId": 17973322, "PubMed": "16196638"}, "corpusId": 17973322, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/403699167d709c22c375fbd5dd2524212505e09a", "title": "Turing pattern formation in fractional activator-inhibitor systems.", "abstract": "Activator-inhibitor systems of reaction-diffusion equations have been used to describe pattern formation in numerous applications in biology, @@ -5523,29 +6313,63 @@ interactions: we find stable stationary Turing patterns for values of d well below the threshold values for pattern formation in standard activator-inhibitor systems.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2005, "referenceCount": 90, "citationCount": 104, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2005-08-01", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 026101\n ", - "volume": "72 2 Pt 2"}, "authors": [{"authorId": "39683695", "name": "B. Henry"}, - {"authorId": "143728613", "name": "T. Langlands"}, {"authorId": "2590109", - "name": "S. Wearne"}]}, {"paperId": "a1186adfc59095fbadc57fe0b8cc629291e8c9f7", - "externalIds": {"DBLP": "journals/amc/NemetiD06", "MAG": "2117289751", "DOI": - "10.1016/j.amc.2005.09.075", "CorpusId": 12392204}, "url": "https://www.semanticscholar.org/paper/a1186adfc59095fbadc57fe0b8cc629291e8c9f7", + 2005, "referenceCount": 90, "citationCount": 106, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2005-08-01", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 026101\n ", "volume": + "72 2 Pt 2"}, "authors": [{"authorId": "39683695", "name": "B. Henry"}, {"authorId": + "143728613", "name": "T. Langlands"}, {"authorId": "2590109", "name": "S. + Wearne"}]}, {"paperId": "c397331a7beb55c99a99506bc2cd1920e0322efb", "externalIds": + {"DBLP": "journals/bsl/Koepke05", "MAG": "2951220694", "ArXiv": "math/0502264", + "DOI": "10.2178/bsl/1122038993", "CorpusId": 918786}, "corpusId": 918786, + "publicationVenue": {"id": "2e016c78-9f89-4c7f-9072-c015f5de55eb", "name": + "Bulletin of Symbolic Logic", "type": "journal", "alternate_names": ["Bull + Symb Log", "The Bulletin of Symbolic Logic"], "issn": "1079-8986", "url": + "https://www.math.ucla.edu/~asl/bsltoc.htm", "alternate_urls": ["https://www.jstor.org/journal/bullsymblogi", + "http://journals.cambridge.org/BSL", "https://www.cambridge.org/core/journals/bulletin-of-symbolic-logic", + "http://journals.cambridge.org/action/displayJournal?jid=BSL"]}, "url": "https://www.semanticscholar.org/paper/c397331a7beb55c99a99506bc2cd1920e0322efb", + "title": "Turing computations on ordinals", "abstract": "We define the notion + of ordinal computability by generalizing standard Turing computability on + tapes of length $\\omega$ to computations on tapes of arbitrary ordinal length. + We show that a set of ordinals is ordinal computable from a finite set of + ordinal parameters if and only if it is an element of Goedel''s constructible + universe L. This characterization can be used to prove the generalized continuum + hypothesis in L.", "venue": "Bulletin of Symbolic Logic", "year": 2005, "referenceCount": + 11, "citationCount": 93, "influentialCitationCount": 11, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/math/0502264", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-02-13", "journal": {"name": "Bull. Symb. Log.", "pages": + "377-397", "volume": "11"}, "authors": [{"authorId": "1931365", "name": "P. + Koepke"}]}, {"paperId": "a1186adfc59095fbadc57fe0b8cc629291e8c9f7", "externalIds": + {"DBLP": "journals/amc/NemetiD06", "MAG": "2117289751", "DOI": "10.1016/j.amc.2005.09.075", + "CorpusId": 12392204}, "corpusId": 12392204, "publicationVenue": {"id": "e593a63a-bfb7-45ac-aa27-5c320ac7a952", + "name": "Applied Mathematics and Computation", "type": "journal", "alternate_names": + ["Appl Math Comput"], "issn": "0096-3003", "url": "http://www.sciencedirect.com/science/journal/00963003", + "alternate_urls": ["https://www.sciencedirect.com/journal/applied-mathematics-and-computation"]}, + "url": "https://www.semanticscholar.org/paper/a1186adfc59095fbadc57fe0b8cc629291e8c9f7", "title": "Relativistic computers and the Turing barrier", "abstract": null, "venue": "Applied Mathematics and Computation", "year": 2006, "referenceCount": - 152, "citationCount": 80, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-07-01", "journal": - {"name": "Appl. Math. Comput.", "pages": "118-142", "volume": "178"}, "authors": - [{"authorId": "1778493", "name": "I. N\u00e9meti"}, {"authorId": "95512045", - "name": "Gyula D\u00e1vid"}]}, {"paperId": "176f1d608b918eec8dc4b75e7b6e0acaba84a447", + 152, "citationCount": 82, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-07-01", "journal": {"name": "Appl. Math. Comput.", "pages": "118-142", + "volume": "178"}, "authors": [{"authorId": "1778493", "name": "I. N\u00e9meti"}, + {"authorId": "95512045", "name": "Gyula D\u00e1vid"}]}, {"paperId": "176f1d608b918eec8dc4b75e7b6e0acaba84a447", "externalIds": {"DBLP": "conf/emnlp/LiMSJRJ17", "ArXiv": "1701.06547", "MAG": "2951520714", "ACL": "D17-1230", "DOI": "10.18653/v1/D17-1230", "CorpusId": - 98180}, "url": "https://www.semanticscholar.org/paper/176f1d608b918eec8dc4b75e7b6e0acaba84a447", + 98180}, "corpusId": 98180, "publicationVenue": {"id": "41bf9ed3-85b3-4c90-b015-150e31690253", + "name": "Conference on Empirical Methods in Natural Language Processing", + "type": "conference", "alternate_names": ["Empir Method Nat Lang Process", + "Empirical Methods in Natural Language Processing", "Conf Empir Method Nat + Lang Process", "EMNLP"], "url": "https://www.aclweb.org/portal/emnlp"}, "url": + "https://www.semanticscholar.org/paper/176f1d608b918eec8dc4b75e7b6e0acaba84a447", "title": "Adversarial Learning for Neural Dialogue Generation", "abstract": "We apply adversarial training to open-domain dialogue generation, training a system to produce sequences that are indistinguishable from human-generated @@ -5561,8 +6385,9 @@ interactions: metrics, including adversarial evaluation, demonstrate that the adversarially-trained system generates higher-quality responses than previous baselines", "venue": "Conference on Empirical Methods in Natural Language Processing", "year": - 2017, "referenceCount": 52, "citationCount": 805, "influentialCitationCount": - 113, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2017, "referenceCount": 52, "citationCount": 809, "influentialCitationCount": + 113, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.aclweb.org/anthology/D17-1230.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-01-23", "journal": {"pages": "2157-2169"}, @@ -5570,31 +6395,43 @@ interactions: "name": "Will Monroe"}, {"authorId": "10238549", "name": "Tianlin Shi"}, {"authorId": "152857609", "name": "S\u00e9bastien Jean"}, {"authorId": "1863425", "name": "Alan Ritter"}, {"authorId": "1746807", "name": "Dan Jurafsky"}]}, {"paperId": - "8e18e8d0879b2acc5d1892afac751ec79a9d1916", "externalIds": {"MAG": "1864787446", - "DBLP": "conf/cie/GoldinW05", "DOI": "10.1007/11494645_20", "CorpusId": 17441096}, - "url": "https://www.semanticscholar.org/paper/8e18e8d0879b2acc5d1892afac751ec79a9d1916", + "c3fff98ef60b7d71c652b4c1c094eb2af84064df", "externalIds": {"MAG": "2050245438", + "DOI": "10.1038/nbt0405-495", "CorpusId": 34517208, "PubMed": "15815679"}, + "corpusId": 34517208, "publicationVenue": {"id": "458166b3-de17-4bf3-bbbb-e53782de2f0f", + "name": "Nature Biotechnology", "type": "journal", "alternate_names": ["Nat + Biotechnol"], "issn": "1087-0156", "url": "http://www.nature.com/nbt/", "alternate_urls": + ["http://www.nature.com/nbt"]}, "url": "https://www.semanticscholar.org/paper/c3fff98ef60b7d71c652b4c1c094eb2af84064df", + "title": "A Turing-like test for biological modeling", "abstract": null, "venue": + "Nature Biotechnology", "year": 2005, "referenceCount": 12, "citationCount": + 53, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-04-01", "journal": + {"name": "Nature Biotechnology", "pages": "495-496", "volume": "23"}, "authors": + [{"authorId": "145771081", "name": "D. Harel"}]}, {"paperId": "8e18e8d0879b2acc5d1892afac751ec79a9d1916", + "externalIds": {"MAG": "1864787446", "DBLP": "conf/cie/GoldinW05", "DOI": + "10.1007/11494645_20", "CorpusId": 17441096}, "corpusId": 17441096, "publicationVenue": + {"id": "ce5f5d49-2807-4aa0-9db3-64a03084444d", "name": "Conference on Computability + in Europe", "type": "conference", "alternate_names": ["CiE", "CIE", "International + Conference on Computers and Industrial Engineering", "Conf Comput Eur", "Int + Conf Comput Ind Eng"], "url": "http://www.illc.uva.nl/CiE/"}, "url": "https://www.semanticscholar.org/paper/8e18e8d0879b2acc5d1892afac751ec79a9d1916", "title": "The Church-Turing Thesis: Breaking the Myth", "abstract": null, "venue": "Conference on Computability in Europe", "year": 2005, "referenceCount": 22, "citationCount": 79, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-06-08", "journal": {"pages": "152-168"}, "authors": [{"authorId": "27353259", - "name": "Dina Q. Goldin"}, {"authorId": "2103444", "name": "P. Wegner"}]}, - {"paperId": "c3fff98ef60b7d71c652b4c1c094eb2af84064df", "externalIds": {"MAG": - "2050245438", "DOI": "10.1038/nbt0405-495", "CorpusId": 34517208, "PubMed": - "15815679"}, "url": "https://www.semanticscholar.org/paper/c3fff98ef60b7d71c652b4c1c094eb2af84064df", - "title": "A Turing-like test for biological modeling", "abstract": null, "venue": - "Nature Biotechnology", "year": 2005, "referenceCount": 12, "citationCount": - 53, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2005-04-01", "journal": {"name": "Nature - Biotechnology", "pages": "495-496", "volume": "23"}, "authors": [{"authorId": - "145771081", "name": "D. Harel"}]}, {"paperId": "784ed4f5737e98d70808b2d3ce7932b2d05bcc63", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-06-08", "journal": {"pages": "152-168"}, "authors": + [{"authorId": "27353259", "name": "Dina Q. Goldin"}, {"authorId": "2103444", + "name": "P. Wegner"}]}, {"paperId": "784ed4f5737e98d70808b2d3ce7932b2d05bcc63", "externalIds": {"MAG": "2067172337", "DOI": "10.1073/PNAS.89.9.3977", "CorpusId": - 1939038, "PubMed": "11607288"}, "url": "https://www.semanticscholar.org/paper/784ed4f5737e98d70808b2d3ce7932b2d05bcc63", + 1939038, "PubMed": "11607288"}, "corpusId": 1939038, "publicationVenue": {"id": + "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the National + Academy of Sciences of the United States of America", "type": "journal", "alternate_names": + ["Proc National Acad Sci u s Am"], "issn": "0027-8424", "url": "https://www.jstor.org/journal/procnatiacadscie", + "alternate_urls": ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", + "http://www.pnas.org/"]}, "url": "https://www.semanticscholar.org/paper/784ed4f5737e98d70808b2d3ce7932b2d05bcc63", "title": "A chemical approach to designing Turing patterns in reaction-diffusion systems.", "abstract": "A systematic approach is suggested to design chemical systems capable of displaying stationary, symmetry-breaking reaction diffusion @@ -5605,8 +6442,9 @@ interactions: reaction is examined as an example, and it is suggested that a similar phenomenon may occur in some biological pattern formation processes.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": - 1992, "referenceCount": 2, "citationCount": 269, "influentialCitationCount": - 12, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + 1992, "referenceCount": 2, "citationCount": 271, "influentialCitationCount": + 12, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pnas.org/content/pnas/89/9/3977.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1992-05-01", "journal": @@ -5615,19 +6453,27 @@ interactions: "1768811670", "name": "I. Lengyel"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "fc19a3d159fb91b9752e1ff9e5ca0bf71bd641d9", "externalIds": {"MAG": "1574049752", "DBLP": "books/sp/DowneyH10", "DOI": "10.1007/978-0-387-68441-3", - "CorpusId": 267836}, "url": "https://www.semanticscholar.org/paper/fc19a3d159fb91b9752e1ff9e5ca0bf71bd641d9", + "CorpusId": 267836}, "corpusId": 267836, "publicationVenue": {"id": "1ef7809b-0640-4615-aa43-9f080f8a9445", + "name": "Theory and Applications of Computability", "alternate_names": ["Theory + Appl Comput"], "issn": "2190-619X"}, "url": "https://www.semanticscholar.org/paper/fc19a3d159fb91b9752e1ff9e5ca0bf71bd641d9", "title": "Algorithmic Randomness and Complexity", "abstract": null, "venue": "Theory and Applications of Computability", "year": 2010, "referenceCount": - 213, "citationCount": 857, "influentialCitationCount": 134, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2010-10-29", "journal": {"pages": "1-766"}, "authors": - [{"authorId": "145948982", "name": "R. Downey"}, {"authorId": "1989269", "name": - "D. Hirschfeldt"}]}, {"paperId": "ad87ea93651476c97106c70c25e598160027cefe", + 213, "citationCount": 858, "influentialCitationCount": 135, "isOpenAccess": + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-0-387-68441-3%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2010-10-29", "journal": {"pages": + "1-766"}, "authors": [{"authorId": "145948982", "name": "R. Downey"}, {"authorId": + "1989269", "name": "D. Hirschfeldt"}]}, {"paperId": "ad87ea93651476c97106c70c25e598160027cefe", "externalIds": {"DBLP": "journals/aim/Cohen05", "MAG": "1498326106", "DOI": - "10.1609/aimag.v26i4.1849", "CorpusId": 6949260}, "url": "https://www.semanticscholar.org/paper/ad87ea93651476c97106c70c25e598160027cefe", + "10.1609/aimag.v26i4.1849", "CorpusId": 6949260}, "corpusId": 6949260, "publicationVenue": + {"id": "6fedff74-7525-4b7f-bbb4-4df4e23948e4", "name": "The AI Magazine", + "type": "journal", "alternate_names": ["AI Mag", "Ai Mag", "Ai Magazine"], + "issn": "0738-4602", "url": "https://www.aaai.org/Library/Magazine/magazine-library.php", + "alternate_urls": ["https://www.aaai.org/ojs/index.php/aimagazine/", "https://www.aaai.org/Magazine/magazine.php"]}, + "url": "https://www.semanticscholar.org/paper/ad87ea93651476c97106c70c25e598160027cefe", "title": "If Not Turing''s Test, Then What?", "abstract": "If it is true that good problems produce good science, then it will be worthwhile to identify good problems, and even more worthwhile to discover the attributes that make @@ -5639,41 +6485,14 @@ interactions: strategy -- and we conclude that good challenge problems encourage the latter strategy.", "venue": "The AI Magazine", "year": 2005, "referenceCount": 17, "citationCount": 56, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2005-12-15", "journal": - {"name": "AI Mag.", "pages": "61-67", "volume": "26"}, "authors": [{"authorId": - "144580830", "name": "P. Cohen"}]}, {"paperId": "d5b4021831be33f77569c4442841c682dcc888be", - "externalIds": {"MAG": "1996197315", "DOI": "10.1073/PNAS.88.24.10983", "CorpusId": - 31718014, "PubMed": "1763012"}, "url": "https://www.semanticscholar.org/paper/d5b4021831be33f77569c4442841c682dcc888be", - "title": "Chemical implementation of neural networks and Turing machines.", - "abstract": "We propose a reversible reaction mechanism with a single stationary - state in which certain concentrations assume either high or low values dependent - on the concentration of a catalyst. The properties of this mechanism are those - of a McCulloch-Pitts neuron. We suggest a mechanism of interneuronal connections - in which the stationary state of a chemical neuron is determined by the state - of other neurons in a homogeneous chemical system and is thus a \"hardware\" - chemical implementation of neural networks. Specific connections are determined - for the construction of logic gates: AND, NOR, etc. Neural networks may be - constructed in which the flow of time is continuous and computations are achieved - by the attainment of a stationary state of the entire chemical reaction system, - or in which the flow of time is discretized by an oscillatory reaction. In - another article, we will give a chemical implementation of finite state machines - and stack memories, with which in principle the construction of a universal - Turing machine is possible.", "venue": "Proceedings of the National Academy - of Sciences of the United States of America", "year": 1991, "referenceCount": - 3, "citationCount": 241, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1991-12-15", "journal": - {"name": "Proceedings of the National Academy of Sciences of the United States - of America", "pages": "\n 10983-7\n ", "volume": "88 24"}, - "authors": [{"authorId": "4461731", "name": "A. Hjelmfelt"}, {"authorId": - "27431174", "name": "E. Weinberger"}, {"authorId": "2150934501", "name": "J. - Ross"}]}, {"paperId": "4cbacf2cb4ff61dc66a845dee8cb6a661bf35d2e", "externalIds": - {"DBLP": "journals/cacm/Milner93", "MAG": "2093236316", "DOI": "10.1145/151233.151240", - "CorpusId": 14586773}, "url": "https://www.semanticscholar.org/paper/4cbacf2cb4ff61dc66a845dee8cb6a661bf35d2e", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2005-12-15", "journal": {"name": "AI Mag.", "pages": "61-67", "volume": "26"}, + "authors": [{"authorId": "144580830", "name": "P. Cohen"}]}, {"paperId": "4cbacf2cb4ff61dc66a845dee8cb6a661bf35d2e", + "externalIds": {"DBLP": "journals/cacm/Milner93", "MAG": "2093236316", "DOI": + "10.1145/151233.151240", "CorpusId": 14586773}, "corpusId": 14586773, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4cbacf2cb4ff61dc66a845dee8cb6a661bf35d2e", "title": "Elements of interaction: Turing award lecture", "abstract": "this award, bearing the name of Pdan Turing. Perhaps Turing would be pleased that it should go to someone educated at his old college, King''s College at Cambridge. @@ -5706,36 +6525,82 @@ interactions: there can be a unique conceptual model, or one preferred formalism , for all aspects of something as large as concurrent \u2026", "venue": "CACM", "year": 1993, "referenceCount": 38, "citationCount": 252, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=151240&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "Commun. ACM", "pages": "78-89", "volume": "36"}, "authors": [{"authorId": "144889520", "name": "R. Milner"}]}, {"paperId": - "1ac18bff7508302cf9febad58ff0b8538af867ff", "externalIds": {"MAG": "1879184788", - "DBLP": "conf/cie/GracaCB05", "DOI": "10.1007/11494645_21", "CorpusId": 14492595}, + "d5b4021831be33f77569c4442841c682dcc888be", "externalIds": {"MAG": "1996197315", + "DOI": "10.1073/PNAS.88.24.10983", "CorpusId": 31718014, "PubMed": "1763012"}, + "corpusId": 31718014, "publicationVenue": {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", + "name": "Proceedings of the National Academy of Sciences of the United States + of America", "type": "journal", "alternate_names": ["Proc National Acad Sci + u s Am"], "issn": "0027-8424", "url": "https://www.jstor.org/journal/procnatiacadscie", + "alternate_urls": ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", + "http://www.pnas.org/"]}, "url": "https://www.semanticscholar.org/paper/d5b4021831be33f77569c4442841c682dcc888be", + "title": "Chemical implementation of neural networks and Turing machines.", + "abstract": "We propose a reversible reaction mechanism with a single stationary + state in which certain concentrations assume either high or low values dependent + on the concentration of a catalyst. The properties of this mechanism are those + of a McCulloch-Pitts neuron. We suggest a mechanism of interneuronal connections + in which the stationary state of a chemical neuron is determined by the state + of other neurons in a homogeneous chemical system and is thus a \"hardware\" + chemical implementation of neural networks. Specific connections are determined + for the construction of logic gates: AND, NOR, etc. Neural networks may be + constructed in which the flow of time is continuous and computations are achieved + by the attainment of a stationary state of the entire chemical reaction system, + or in which the flow of time is discretized by an oscillatory reaction. In + another article, we will give a chemical implementation of finite state machines + and stack memories, with which in principle the construction of a universal + Turing machine is possible.", "venue": "Proceedings of the National Academy + of Sciences of the United States of America", "year": 1991, "referenceCount": + 3, "citationCount": 241, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.pnas.org/content/88/24/10983.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1991-12-15", "journal": + {"name": "Proceedings of the National Academy of Sciences of the United States + of America", "pages": "\n 10983-7\n ", "volume": "88 24"}, + "authors": [{"authorId": "4461731", "name": "A. Hjelmfelt"}, {"authorId": + "27431174", "name": "E. Weinberger"}, {"authorId": "2150934501", "name": "J. + Ross"}]}, {"paperId": "1ac18bff7508302cf9febad58ff0b8538af867ff", "externalIds": + {"MAG": "1879184788", "DBLP": "conf/cie/GracaCB05", "DOI": "10.1007/11494645_21", + "CorpusId": 14492595}, "corpusId": 14492595, "publicationVenue": {"id": "ce5f5d49-2807-4aa0-9db3-64a03084444d", + "name": "Conference on Computability in Europe", "type": "conference", "alternate_names": + ["CiE", "CIE", "International Conference on Computers and Industrial Engineering", + "Conf Comput Eur", "Int Conf Comput Ind Eng"], "url": "http://www.illc.uva.nl/CiE/"}, "url": "https://www.semanticscholar.org/paper/1ac18bff7508302cf9febad58ff0b8538af867ff", "title": "Robust Simulations of Turing Machines with Analytic Maps and Flows", "abstract": null, "venue": "Conference on Computability in Europe", "year": 2005, "referenceCount": 29, "citationCount": 45, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://sapientia.ualg.pt/bitstream/10400.1/1008/1/05-GCB-stable.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2005-06-08", "journal": {"pages": "169-179"}, "authors": [{"authorId": "144473423", "name": "D. Gra\u00e7a"}, {"authorId": "2812847", "name": "M. Campagnolo"}, {"authorId": "2509079", "name": "J. Buescu"}]}, {"paperId": "4168591fcb0bb47a7bb0172840addb946af9f6b6", "externalIds": {"DBLP": "journals/tcs/NearyW06", "MAG": "2081142955", "DOI": - "10.1016/j.tcs.2006.06.002", "CorpusId": 30818598}, "url": "https://www.semanticscholar.org/paper/4168591fcb0bb47a7bb0172840addb946af9f6b6", + "10.1016/j.tcs.2006.06.002", "CorpusId": 30818598}, "corpusId": 30818598, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/4168591fcb0bb47a7bb0172840addb946af9f6b6", "title": "Small fast universal Turing machines", "abstract": null, "venue": "Theoretical Computer Science", "year": 2006, "referenceCount": 25, "citationCount": - 41, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-10-11", "journal": {"name": "Theor. - Comput. Sci.", "pages": "171-195", "volume": "362"}, "authors": [{"authorId": - "2221070", "name": "T. Neary"}, {"authorId": "145284748", "name": "D. Woods"}]}, - {"paperId": "df26d8efd7a5a22222284e9b7301804c73f57e93", "externalIds": {"MAG": - "1507743872", "DOI": "10.2307/2695463", "CorpusId": 60569664}, "url": "https://www.semanticscholar.org/paper/df26d8efd7a5a22222284e9b7301804c73f57e93", + 41, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-10-11", "journal": {"name": "Theor. Comput. Sci.", "pages": "171-195", + "volume": "362"}, "authors": [{"authorId": "2221070", "name": "Turlough Neary"}, + {"authorId": "145284748", "name": "D. Woods"}]}, {"paperId": "df26d8efd7a5a22222284e9b7301804c73f57e93", + "externalIds": {"MAG": "1507743872", "DOI": "10.2307/2695463", "CorpusId": + 60569664}, "corpusId": 60569664, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/df26d8efd7a5a22222284e9b7301804c73f57e93", "title": "The Universal Computer: The Road from Leibniz to Turing", "abstract": "The breathtakingly rapid pace of change in computing makes it easy to overlook the pioneers who began it all. Written by Martin Davis, respected logician @@ -5757,24 +6622,35 @@ interactions: and computer science. His expertise, combined with his genuine love of the subject and excellent storytelling, make him the perfect person to tell this story.", "venue": "", "year": 2002, "referenceCount": 14, "citationCount": - 226, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2002-06-01", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "100651835", "name": "Martin Davis"}]}, {"paperId": "3ed959bde0ede5119aa3190547465ed9849c4139", - "externalIds": {"MAG": "2113235751", "DBLP": "journals/mima/Copeland00", "DOI": - "10.1023/A:1011285919106", "CorpusId": 65284}, "url": "https://www.semanticscholar.org/paper/3ed959bde0ede5119aa3190547465ed9849c4139", + 228, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-06-01", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "100651835", "name": "Martin Davis"}]}, + {"paperId": "3ed959bde0ede5119aa3190547465ed9849c4139", "externalIds": {"MAG": + "2113235751", "DBLP": "journals/mima/Copeland00", "DOI": "10.1023/A:1011285919106", + "CorpusId": 65284}, "corpusId": 65284, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/3ed959bde0ede5119aa3190547465ed9849c4139", "title": "The Turing Test*", "abstract": null, "venue": "Minds and Machines", - "year": 2000, "referenceCount": 29, "citationCount": 182, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2000-11-01", "journal": {"name": "Minds and Machines", "pages": "519-539", - "volume": "10"}, "authors": [{"authorId": "144246233", "name": "B. Copeland"}]}, - {"paperId": "6faf53eafb10a709db49283131c5790a76136d02", "externalIds": {"MAG": - "1508649316", "DBLP": "journals/coling/Rapaport05", "DOI": "10.1162/089120105774321127", - "CorpusId": 160011529}, "url": "https://www.semanticscholar.org/paper/6faf53eafb10a709db49283131c5790a76136d02", + "year": 2000, "referenceCount": 29, "citationCount": 183, "influentialCitationCount": + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2000-11-01", "journal": {"name": "Minds + and Machines", "pages": "519-539", "volume": "10"}, "authors": [{"authorId": + "144246233", "name": "B. Copeland"}]}, {"paperId": "6faf53eafb10a709db49283131c5790a76136d02", + "externalIds": {"MAG": "1508649316", "DBLP": "journals/coling/Rapaport05", + "DOI": "10.1162/089120105774321127", "CorpusId": 160011529}, "corpusId": 160011529, + "publicationVenue": {"id": "ee37a78c-f3d8-407a-bd24-bb97fe6dbab9", "name": + "Computational Linguistics", "type": "journal", "alternate_names": ["Comput + Linguistics"], "issn": "0891-2017", "alternate_issns": ["1530-9312", "0362-613x", + "0362-613X"], "url": "http://aclanthology.info/venues/cl", "alternate_urls": + ["http://mitpress.mit.edu/catalog/item/default.asp?ttype=4&tid=10", "https://www.mitpressjournals.org/loi/coli"]}, + "url": "https://www.semanticscholar.org/paper/6faf53eafb10a709db49283131c5790a76136d02", "title": "The Turing Test: Verbal Behavior as the Hallmark of Intelligence edited by Stuart Shieber", "abstract": "This eagerly awaited anthology, while surely not the last word on the Turing Test, equally surely deserves to become @@ -5814,45 +6690,83 @@ interactions: Test.\u201d Next, in more of a logical than a chronological order, comes a trio consisting of John", "venue": "Computational Linguistics", "year": 2005, "referenceCount": 21, "citationCount": 45, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Philosophy", "Computer Science"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/coli/article-pdf/31/3/407/1798209/089120105774321127.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Philosophy", "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2005-09-01", "journal": {"name": "Comput. Linguistics", "pages": "407-412", "volume": "31"}, "authors": - [{"authorId": "1712022", "name": "W. Rapaport"}]}, {"paperId": "7509b472cbe7b1fe71a8fccf60f34cc873d1ab63", - "externalIds": {"MAG": "2094149843", "DOI": "10.1016/0893-9659(91)90080-F", - "CorpusId": 5909565}, "url": "https://www.semanticscholar.org/paper/7509b472cbe7b1fe71a8fccf60f34cc873d1ab63", - "title": "Turing computability with neural nets", "abstract": null, "venue": - "", "year": 1991, "referenceCount": 13, "citationCount": 372, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Applied Mathematics Letters", "pages": "77-80", - "volume": "4"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}, - {"authorId": "1790264", "name": "Eduardo Sontag"}]}, {"paperId": "91b0969c89b5957d5d8fc9b0def1514fa18640f3", + [{"authorId": "1712022", "name": "W. Rapaport"}]}, {"paperId": "91b0969c89b5957d5d8fc9b0def1514fa18640f3", "externalIds": {"MAG": "2496493741", "DOI": "10.1007/978-3-7091-9381-5", "CorpusId": - 64533503}, "url": "https://www.semanticscholar.org/paper/91b0969c89b5957d5d8fc9b0def1514fa18640f3", + 64533503}, "corpusId": 64533503, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/91b0969c89b5957d5d8fc9b0def1514fa18640f3", "title": "Alan Turing, Enigma", "abstract": null, "venue": "", "year": 1983, "referenceCount": 0, "citationCount": 337, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, - {"paperId": "7d1cdb2ee83716065ca24ccb33921bf53b0262be", "externalIds": {"DBLP": - "journals/fac/Stannett90", "MAG": "2076861421", "DOI": "10.1007/BF01888233", - "CorpusId": 7406983}, "url": "https://www.semanticscholar.org/paper/7d1cdb2ee83716065ca24ccb33921bf53b0262be", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144443425", + "name": "A. Hodges"}]}, {"paperId": "7d1cdb2ee83716065ca24ccb33921bf53b0262be", + "externalIds": {"DBLP": "journals/fac/Stannett90", "MAG": "2076861421", "DOI": + "10.1007/BF01888233", "CorpusId": 7406983}, "corpusId": 7406983, "publicationVenue": + {"id": "18571b83-47ca-4d90-9e2c-736893f81958", "name": "Formal Aspects of + Computing", "type": "journal", "alternate_names": ["Form Asp Comput"], "issn": + "0934-5043", "url": "https://www.springer.com/journal/00165/", "alternate_urls": + ["http://www.springer.com/journal/00165/", "https://link.springer.com/journal/165"]}, + "url": "https://www.semanticscholar.org/paper/7d1cdb2ee83716065ca24ccb33921bf53b0262be", "title": "X-machines and the halting problem: Building a super-turing machine", "abstract": null, "venue": "Formal Aspects of Computing", "year": 1990, "referenceCount": 7, "citationCount": 41, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1990-03-01", "journal": {"name": "Formal Aspects of Computing", "pages": - "331-341", "volume": "2"}, "authors": [{"authorId": "2459698", "name": "M. - Stannett"}]}, {"paperId": "b094bea6e3ac02b7ff38daa530448df3a048f72c", "externalIds": - {"DBLP": "journals/jacm/HennieS66", "MAG": "2004471951", "DOI": "10.1145/321356.321362", - "CorpusId": 2347143}, "url": "https://www.semanticscholar.org/paper/b094bea6e3ac02b7ff38daa530448df3a048f72c", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1990-03-01", "journal": {"name": "Formal Aspects of Computing", + "pages": "331-341", "volume": "2"}, "authors": [{"authorId": "2459698", "name": + "M. Stannett"}]}, {"paperId": "128cb6b891aee1b5df099acb48e2efecfcff689f", + "externalIds": {"DBLP": "conf/kr/LevesqueDM12", "MAG": "1599016936", "CorpusId": + 15710851}, "corpusId": 15710851, "publicationVenue": {"id": "10be65de-ea9f-4203-8156-9e9ece78df6c", + "name": "International Conference on Principles of Knowledge Representation + and Reasoning", "type": "conference", "alternate_names": ["KR", "Princ Knowl + Represent Reason", "Int Conf Princ Knowl Represent Reason", "Principles of + Knowledge Representation and Reasoning"], "url": "http://www.kr.org/"}, "url": + "https://www.semanticscholar.org/paper/128cb6b891aee1b5df099acb48e2efecfcff689f", + "title": "The Winograd Schema Challenge", "abstract": "In this paper, we present + an alternative to the Turing Test that has some conceptual and practical advantages. + Like the original, it involves responding to typed English sentences, and + English-speaking adults will have no difficulty with it. Unlike the original, + the subject is not required to engage in a conversation and fool an interrogator + into believing she is dealing with a person. Moreover, the test is arranged + in such a way that having full access to a large corpus of English text might + not help much. Finally, the interrogator or a third party will be able to + decide unambiguously after a few minutes whether or not a subject has passed + the test.", "venue": "International Conference on Principles of Knowledge + Representation and Reasoning", "year": 2011, "referenceCount": 42, "citationCount": + 821, "influentialCitationCount": 181, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Linguistics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2011-03-20", "journal": {"name": "", "pages": "552-561", "volume": ""}, "authors": + [{"authorId": "143634377", "name": "H. Levesque"}, {"authorId": "144883814", + "name": "E. Davis"}, {"authorId": "40429476", "name": "L. Morgenstern"}]}, + {"paperId": "3553dad8dc27942eff5b1d3ae0c5104fb47a353a", "externalIds": {"MAG": + "2000201689", "DOI": "10.1103/PHYSREVLETT.48.1581", "CorpusId": 120445186}, + "corpusId": 120445186, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3553dad8dc27942eff5b1d3ae0c5104fb47a353a", + "title": "Quantum Mechanical Models of Turing Machines That Dissipate No Energy", + "abstract": "Quantum mechanical Hamiltonian models of Turing machines are + constructed here on a finite lattice of spin-\\textonehalf{} systems. The + models do not dissipate any energy and they operate at the quantum limit in + that the system (energy uncertainty)/(computation speed) is close to the limit + given by the time-energy uncertainty principle.", "venue": "", "year": 1982, + "referenceCount": 4, "citationCount": 263, "influentialCitationCount": 8, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1982-06-07", "journal": {"name": "Physical Review Letters", "pages": "1581-1585", + "volume": "48"}, "authors": [{"authorId": "2542436", "name": "P. Benioff"}]}, + {"paperId": "b094bea6e3ac02b7ff38daa530448df3a048f72c", "externalIds": {"DBLP": + "journals/jacm/HennieS66", "MAG": "2004471951", "DOI": "10.1145/321356.321362", + "CorpusId": 2347143}, "corpusId": 2347143, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b094bea6e3ac02b7ff38daa530448df3a048f72c", "title": "Two-Tape Simulation of Multitape Turing Machines", "abstract": "It has long been known that increasing the number of tapes used by a Turing machine does not provide the ability to compute any new functions. On the other hand, @@ -5873,53 +6787,26 @@ interactions: = 0 then there exists a function that can be computed within the time bound U(n) but not within the time bound T(n).", "venue": "JACM", "year": 1966, "referenceCount": 6, "citationCount": 271, - "influentialCitationCount": 13, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1966-10-01", "journal": {"name": "J. ACM", "pages": "533-546", - "volume": "13"}, "authors": [{"authorId": "16820982", "name": "F. Hennie"}, - {"authorId": "2520473", "name": "R. Stearns"}]}, {"paperId": "3553dad8dc27942eff5b1d3ae0c5104fb47a353a", - "externalIds": {"MAG": "2000201689", "DOI": "10.1103/PHYSREVLETT.48.1581", - "CorpusId": 120445186}, "url": "https://www.semanticscholar.org/paper/3553dad8dc27942eff5b1d3ae0c5104fb47a353a", - "title": "Quantum Mechanical Models of Turing Machines That Dissipate No Energy", - "abstract": "Quantum mechanical Hamiltonian models of Turing machines are - constructed here on a finite lattice of spin-\\textonehalf{} systems. The - models do not dissipate any energy and they operate at the quantum limit in - that the system (energy uncertainty)/(computation speed) is close to the limit - given by the time-energy uncertainty principle.", "venue": "", "year": 1982, - "referenceCount": 4, "citationCount": 259, "influentialCitationCount": 8, - "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1982-06-07", "journal": {"name": - "Physical Review Letters", "pages": "1581-1585", "volume": "48"}, "authors": - [{"authorId": "2542436", "name": "P. Benioff"}]}, {"paperId": "128cb6b891aee1b5df099acb48e2efecfcff689f", - "externalIds": {"DBLP": "conf/kr/LevesqueDM12", "MAG": "1599016936", "CorpusId": - 15710851}, "url": "https://www.semanticscholar.org/paper/128cb6b891aee1b5df099acb48e2efecfcff689f", - "title": "The Winograd Schema Challenge", "abstract": "In this paper, we present - an alternative to the Turing Test that has some conceptual and practical advantages. - Like the original, it involves responding to typed English sentences, and - English-speaking adults will have no difficulty with it. Unlike the original, - the subject is not required to engage in a conversation and fool an interrogator - into believing she is dealing with a person. Moreover, the test is arranged - in such a way that having full access to a large corpus of English text might - not help much. Finally, the interrogator or a third party will be able to - decide unambiguously after a few minutes whether or not a subject has passed - the test.", "venue": "International Conference on Principles of Knowledge - Representation and Reasoning", "year": 2011, "referenceCount": 42, "citationCount": - 819, "influentialCitationCount": 181, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2011-03-20", - "journal": {"name": "", "pages": "552-561", "volume": ""}, "authors": [{"authorId": - "143634377", "name": "H. Levesque"}, {"authorId": "144883814", "name": "E. - Davis"}, {"authorId": "40429476", "name": "L. Morgenstern"}]}, {"paperId": + "influentialCitationCount": 13, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1966-10-01", "journal": {"name": "J. + ACM", "pages": "533-546", "volume": "13"}, "authors": [{"authorId": "16820982", + "name": "F. Hennie"}, {"authorId": "2520473", "name": "R. Stearns"}]}, {"paperId": "43776898de550556da70eb5198d554284147f022", "externalIds": {"MAG": "2953175265", "ArXiv": "q-bio/0506036", "DOI": "10.1016/J.JTBI.2005.06.016", "CorpusId": - 336883, "PubMed": "16098989"}, "url": "https://www.semanticscholar.org/paper/43776898de550556da70eb5198d554284147f022", + 336883, "PubMed": "16098989"}, "corpusId": 336883, "publicationVenue": {"id": + "15797df0-99d5-49c7-bb2d-58f3a9692c57", "name": "Journal of Theoretical Biology", + "type": "journal", "alternate_names": ["J Theor Biology"], "issn": "0022-5193", + "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/43776898de550556da70eb5198d554284147f022", "title": "Turing pattern with proportion preservation.", "abstract": null, "venue": "Journal of Theoretical Biology", "year": 2005, "referenceCount": 29, "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/q-bio/0506036", "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": @@ -5927,21 +6814,14 @@ interactions: "publicationDate": "2005-06-23", "journal": {"name": "Journal of theoretical biology", "pages": "\n 683-93\n ", "volume": "238 3"}, "authors": [{"authorId": "3028443", "name": "S. Ishihara"}, {"authorId": "1739497", "name": - "K. Kaneko"}]}, {"paperId": "f5aa747f6dcd593e08816561eb8570c2e1881fbc", "externalIds": - {"ArXiv": "gr-qc/0104023", "MAG": "1874721034", "DOI": "10.1023/A:1014019225365", - "CorpusId": 17081866}, "url": "https://www.semanticscholar.org/paper/f5aa747f6dcd593e08816561eb8570c2e1881fbc", - "title": "Non-Turing Computations Via Malament\u2013Hogarth Space-Times", - "abstract": null, "venue": "", "year": 2001, "referenceCount": 32, "citationCount": - 206, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2001-04-09", "journal": {"name": "International - Journal of Theoretical Physics", "pages": "341-370", "volume": "41"}, "authors": - [{"authorId": "2413462", "name": "G. Etesi"}, {"authorId": "1778493", "name": - "I. N\u00e9meti"}]}, {"paperId": "3b498f29c38d4bb8765051076b8dffd8e88300c7", - "externalIds": {"MAG": "2069241007", "DBLP": "conf/focs/OrlitskySZ03", "DOI": - "10.1109/SFCS.2003.1238192", "CorpusId": 3749762, "PubMed": "14564004"}, "url": - "https://www.semanticscholar.org/paper/3b498f29c38d4bb8765051076b8dffd8e88300c7", + "K. Kaneko"}]}, {"paperId": "3b498f29c38d4bb8765051076b8dffd8e88300c7", "externalIds": + {"MAG": "2069241007", "DBLP": "conf/focs/OrlitskySZ03", "DOI": "10.1109/SFCS.2003.1238192", + "CorpusId": 3749762, "PubMed": "14564004"}, "corpusId": 3749762, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/3b498f29c38d4bb8765051076b8dffd8e88300c7", "title": "Always Good Turing: Asymptotically Optimal Probability Estimation", "abstract": "While deciphering the Enigma code, Good and Turing derived an unintuitive, yet effective, formula for estimating a probability distribution @@ -5953,60 +6833,35 @@ interactions: is low, yet greater than 1. We then derive an estimator whose attenuation is 1; that is, asymptotically it does not underestimate the probability of any sequence.", "venue": "Science", "year": 2003, "referenceCount": 35, "citationCount": - 177, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-10-11", "journal": {"name": "Science", "pages": "427 - 431", "volume": - "302"}, "authors": [{"authorId": "1691155", "name": "A. Orlitsky"}, {"authorId": - "1749038", "name": "N. Santhanam"}, {"authorId": "2107964352", "name": "Junan - Zhang"}]}, {"paperId": "663329ef21f3d625e6a13468367424b75edf867b", "externalIds": - {"MAG": "2115619606", "DOI": "10.1006/BULM.1998.0093", "CorpusId": 21363468, - "PubMed": "17883228"}, "url": "https://www.semanticscholar.org/paper/663329ef21f3d625e6a13468367424b75edf867b", - "title": "A two-dimensional numerical study of spatial pattern formation in - interacting Turing systems", "abstract": "For many years Turing systems have - been proposed to account for spatial and spatiotemporal pattern formation - in chemistry and biology. We extend the study of Turing systems to investigate - the r\u00f4le of boundary conditions, domain shape, non-linearities, and coupling - of such systems. We show that such modifications lead to a wide variety of - patterns that bear a striking resemblance to pigmentation patterns in fish, - particularly those involving stripes, spots and transitions between them. - Using the Turing system as a metaphor for activator\u2014inhibitor models - we conclude that such a mechanism, with the aforementioned modifications, - may play a r\u00f4le in fish patterning.", "venue": "Bulletin of Mathematical - Biology", "year": 1999, "referenceCount": 29, "citationCount": 205, "influentialCitationCount": - 12, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Study"], "publicationDate": "1999-05-01", - "journal": {"name": "Bulletin of Mathematical Biology", "pages": "483-505", - "volume": "61"}, "authors": [{"authorId": "37747895", "name": "R. Barrio"}, - {"authorId": "70988914", "name": "C. Varea"}, {"authorId": "145092079", "name": - "J. Arag\u00f3n"}, {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": - "4bcda7bada106b9954912bbdc105ad6ba77a04b5", "externalIds": {"DBLP": "journals/cryptologia/Gladwin03", - "MAG": "1978845525", "DOI": "10.1080/0161-110391891757", "CorpusId": 42722847}, - "url": "https://www.semanticscholar.org/paper/4bcda7bada106b9954912bbdc105ad6ba77a04b5", - "title": "ALAN M. TURING''S CRITIQUE OF RUNNING SHORT CRIBS ON THE US NAVY - BOMBE", "abstract": "Declassified documents from the \u201cCrane Collection\u201d - at the National Archives (USA) reveal much of the cryptanalytical collaboration - that defeated the German Naval Enigma machine. As researchers continue to - work through these papers, new light is shed on that relationship. In May, - 2002 a manuscript, typed and handwritten, by Alan M. Turing was found by the - author in the \u201dCrane Collection\u201d. Written at the time of his United - States visit during the winter of 1942\u20131943, it reflects Government Code - and Cypher School (GC&CS) interests and skepticism regarding the US Naval - Intelligence (OP-20-G) effort to independently design and construct its own - rapid analytical machines (RAMs).", "venue": "Cryptologia", "year": 2003, - "referenceCount": 0, "citationCount": 178, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-01-01", "journal": {"name": "Cryptologia", "pages": "50 - 54", "volume": - "27"}, "authors": [{"authorId": "3091583", "name": "L. A. Gladwin"}]}, {"paperId": - "e59fc120e44cca98edca76f44dca7cfdf221f6e7", "externalIds": {"MAG": "2101539302", - "DOI": "10.1073/PNAS.96.10.5549", "CorpusId": 18147419, "PubMed": "10318921"}, + 178, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-10-11", "journal": {"name": "Science", "pages": "427 + - 431", "volume": "302"}, "authors": [{"authorId": "1691155", "name": "A. + Orlitsky"}, {"authorId": "1749038", "name": "N. Santhanam"}, {"authorId": + "2107964352", "name": "Junan Zhang"}]}, {"paperId": "f5aa747f6dcd593e08816561eb8570c2e1881fbc", + "externalIds": {"ArXiv": "gr-qc/0104023", "MAG": "1874721034", "DOI": "10.1023/A:1014019225365", + "CorpusId": 17081866}, "corpusId": 17081866, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f5aa747f6dcd593e08816561eb8570c2e1881fbc", + "title": "Non-Turing Computations Via Malament\u2013Hogarth Space-Times", + "abstract": null, "venue": "", "year": 2001, "referenceCount": 32, "citationCount": + 206, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-04-09", "journal": {"name": + "International Journal of Theoretical Physics", "pages": "341-370", "volume": + "41"}, "authors": [{"authorId": "2413462", "name": "G. Etesi"}, {"authorId": + "1778493", "name": "I. N\u00e9meti"}]}, {"paperId": "e59fc120e44cca98edca76f44dca7cfdf221f6e7", + "externalIds": {"MAG": "2101539302", "DOI": "10.1073/PNAS.96.10.5549", "CorpusId": + 18147419, "PubMed": "10318921"}, "corpusId": 18147419, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, "url": "https://www.semanticscholar.org/paper/e59fc120e44cca98edca76f44dca7cfdf221f6e7", "title": "Stripe formation in juvenile Pomacanthus explained by a generalized turing mechanism with chemotaxis.", "abstract": "Current interest in pattern @@ -6029,53 +6884,22 @@ interactions: of one type of pigment cell into a striped spatial pattern.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 1999, "referenceCount": 51, "citationCount": 224, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc21897?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1999-05-11", "journal": {"name": "Proceedings of the National Academy of Sciences of the United States of America", "pages": "\n 5549-54\n ", "volume": "96 10"}, "authors": [{"authorId": "1964371", "name": "K. Painter"}, {"authorId": "2339973", "name": "P. Maini"}, - {"authorId": "2892576", "name": "H. Othmer"}]}, {"paperId": "cb96431acc231641d1bd7dc0d032e4de61d7c784", - "externalIds": {"DBLP": "conf/spw/Yan06a", "MAG": "2466655566", "DOI": "10.1007/978-3-642-04904-0_26", - "CorpusId": 12515260}, "url": "https://www.semanticscholar.org/paper/cb96431acc231641d1bd7dc0d032e4de61d7c784", - "title": "Bot, Cyborg and Automated Turing Test", "abstract": null, "venue": - "Security Protocols Workshop", "year": 2009, "referenceCount": 5, "citationCount": - 37, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2009-10-13", "journal": {"pages": "198-201"}, "authors": [{"authorId": "1704945", - "name": "Jeff Yan"}]}, {"paperId": "2d3af6d510d7cdbeb07ab88fd5d28088408d853e", - "externalIds": {"DBLP": "conf/ccs/MoreinSCKMR03", "MAG": "1974319290", "DOI": - "10.1145/948109.948114", "CorpusId": 1369440}, "url": "https://www.semanticscholar.org/paper/2d3af6d510d7cdbeb07ab88fd5d28088408d853e", - "title": "Using graphic turing tests to counter automated DDoS attacks against - web servers", "abstract": "We present WebSOS, a novel overlay-based architecture - that provides guaranteed access to a web server that is targeted by a denial - of service (DoS) attack. Our approach exploits two key characteristics of - the web environment: its design around a human-centric interface, and the - extensibility inherent in many browsers through downloadable \"applets.\" - We guarantee access to a web server for a large number of previously unknown - users, without requiring pre-existing trust relationships between users and - the system.Our prototype requires no modifications to either servers or browsers, - and makes use of graphical Turing tests, web proxies, and client authentication - using the SSL/TLS protocol, all readily supported by modern browsers. We use - the WebSOS prototype to conduct a performance evaluation over the Internet - using PlanetLab, a testbed for experimentation with network overlays. We determine - the end-to-end latency using both a Chord-based approach and our shortcut - extension. Our evaluation shows the latency increase by a factor of 7 and - 2 respectively, confirming our simulation results.", "venue": "Conference - on Computer and Communications Security", "year": 2003, "referenceCount": - 51, "citationCount": 163, "influentialCitationCount": 12, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-10-27", "journal": {"pages": "8-19"}, "authors": [{"authorId": "2720960", - "name": "William G. Morein"}, {"authorId": "1709571", "name": "A. Stavrou"}, - {"authorId": "1762324", "name": "Debra L. Cook"}, {"authorId": "1720824", - "name": "A. Keromytis"}, {"authorId": "145502289", "name": "V. Misra"}, {"authorId": - "1926685", "name": "D. Rubenstein"}]}, {"paperId": "1ee28bcd4f9c809078a2a5c0bec115aa14278602", + {"authorId": "2892576", "name": "H. Othmer"}]}, {"paperId": "1ee28bcd4f9c809078a2a5c0bec115aa14278602", "externalIds": {"DBLP": "journals/siamam/HenryW02", "MAG": "2024584971", "DOI": - "10.1137/S0036139900375227", "CorpusId": 5672954}, "url": "https://www.semanticscholar.org/paper/1ee28bcd4f9c809078a2a5c0bec115aa14278602", + "10.1137/S0036139900375227", "CorpusId": 5672954}, "corpusId": 5672954, "publicationVenue": + {"id": "9b3052dd-9e29-41cb-927c-28df9e08a68b", "name": "SIAM Journal on Applied + Mathematics", "type": "journal", "alternate_names": ["SIAM J Appl Math", "Siam + Journal on Applied Mathematics", "Siam J Appl Math"], "issn": "0036-1399", + "url": "https://www.jstor.org/journal/siamjapplmath", "alternate_urls": ["https://epubs.siam.org/journal/smjmap", + "http://www.jstor.org/journals/00361399.html"]}, "url": "https://www.semanticscholar.org/paper/1ee28bcd4f9c809078a2a5c0bec115aa14278602", "title": "Existence of Turing Instabilities in a Two-Species Fractional Reaction-Diffusion System", "abstract": "We introduce a two-species fractional reaction-diffusion system to model activator- inhibitor dynamics with anomalous diffusion such @@ -6092,15 +6916,103 @@ interactions: inhibitor is regular, is that Turing instabilities can exist even when the diffusion coefficient of the activator exceeds that of the inhibitor.", "venue": "SIAM Journal on Applied Mathematics", "year": 2002, "referenceCount": 59, - "citationCount": 178, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "SIAM J. - Appl. Math.", "pages": "870-887", "volume": "62"}, "authors": [{"authorId": - "39683695", "name": "B. Henry"}, {"authorId": "2590109", "name": "S. Wearne"}]}, - {"paperId": "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": {"MAG": - "593056538", "CorpusId": 60423929}, "url": "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", + "citationCount": 182, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "SIAM J. Appl. Math.", "pages": "870-887", "volume": + "62"}, "authors": [{"authorId": "39683695", "name": "B. Henry"}, {"authorId": + "2590109", "name": "S. Wearne"}]}, {"paperId": "663329ef21f3d625e6a13468367424b75edf867b", + "externalIds": {"MAG": "2115619606", "DOI": "10.1006/BULM.1998.0093", "CorpusId": + 21363468, "PubMed": "17883228"}, "corpusId": 21363468, "publicationVenue": + {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/663329ef21f3d625e6a13468367424b75edf867b", + "title": "A two-dimensional numerical study of spatial pattern formation in + interacting Turing systems", "abstract": "For many years Turing systems have + been proposed to account for spatial and spatiotemporal pattern formation + in chemistry and biology. We extend the study of Turing systems to investigate + the r\u00f4le of boundary conditions, domain shape, non-linearities, and coupling + of such systems. We show that such modifications lead to a wide variety of + patterns that bear a striking resemblance to pigmentation patterns in fish, + particularly those involving stripes, spots and transitions between them. + Using the Turing system as a metaphor for activator\u2014inhibitor models + we conclude that such a mechanism, with the aforementioned modifications, + may play a r\u00f4le in fish patterning.", "venue": "Bulletin of Mathematical + Biology", "year": 1999, "referenceCount": 29, "citationCount": 208, "influentialCitationCount": + 12, "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:2628c647-60b4-4498-bcbd-508482f93e47/files/m4744996cf8256b6a7221cc2945def76e", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Study"], "publicationDate": "1999-05-01", + "journal": {"name": "Bulletin of Mathematical Biology", "pages": "483-505", + "volume": "61"}, "authors": [{"authorId": "37747895", "name": "R. Barrio"}, + {"authorId": "70988914", "name": "C. Varea"}, {"authorId": "145092079", "name": + "J. Arag\u00f3n"}, {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": + "4bcda7bada106b9954912bbdc105ad6ba77a04b5", "externalIds": {"DBLP": "journals/cryptologia/Gladwin03", + "MAG": "1978845525", "DOI": "10.1080/0161-110391891757", "CorpusId": 42722847}, + "corpusId": 42722847, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4bcda7bada106b9954912bbdc105ad6ba77a04b5", + "title": "ALAN M. TURING''S CRITIQUE OF RUNNING SHORT CRIBS ON THE US NAVY + BOMBE", "abstract": "Declassified documents from the \u201cCrane Collection\u201d + at the National Archives (USA) reveal much of the cryptanalytical collaboration + that defeated the German Naval Enigma machine. As researchers continue to + work through these papers, new light is shed on that relationship. In May, + 2002 a manuscript, typed and handwritten, by Alan M. Turing was found by the + author in the \u201dCrane Collection\u201d. Written at the time of his United + States visit during the winter of 1942\u20131943, it reflects Government Code + and Cypher School (GC&CS) interests and skepticism regarding the US Naval + Intelligence (OP-20-G) effort to independently design and construct its own + rapid analytical machines (RAMs).", "venue": "Cryptologia", "year": 2003, + "referenceCount": 0, "citationCount": 178, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2003-01-01", "journal": {"name": "Cryptologia", + "pages": "50 - 54", "volume": "27"}, "authors": [{"authorId": "3091583", "name": + "L. A. Gladwin"}]}, {"paperId": "cb96431acc231641d1bd7dc0d032e4de61d7c784", + "externalIds": {"DBLP": "conf/spw/Yan06a", "MAG": "2466655566", "DOI": "10.1007/978-3-642-04904-0_26", + "CorpusId": 12515260}, "corpusId": 12515260, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cb96431acc231641d1bd7dc0d032e4de61d7c784", + "title": "Bot, Cyborg and Automated Turing Test", "abstract": null, "venue": + "Security Protocols Workshop", "year": 2009, "referenceCount": 5, "citationCount": + 37, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2009-10-13", "journal": {"pages": "198-201"}, "authors": + [{"authorId": "1704945", "name": "Jeff Yan"}]}, {"paperId": "3904315e2eca50d0086e4b7273f7fd707c652230", + "externalIds": {"MAG": "2472819217", "DBLP": "conf/icml/SantoroBBWL16", "CorpusId": + 6466088}, "corpusId": 6466088, "publicationVenue": {"id": "fc0a208c-acb7-47dc-a0d4-af8190e21d29", + "name": "International Conference on Machine Learning", "type": "conference", + "alternate_names": ["ICML", "Int Conf Mach Learn"], "url": "https://icml.cc/"}, + "url": "https://www.semanticscholar.org/paper/3904315e2eca50d0086e4b7273f7fd707c652230", + "title": "Meta-Learning with Memory-Augmented Neural Networks", "abstract": + "Despite recent breakthroughs in the applications of deep neural networks, + one setting that presents a persistent challenge is that of \"one-shot learning.\" + Traditional gradient-based networks require a lot of data to learn, often + through extensive iterative training. When new data is encountered, the models + must inefficiently relearn their parameters to adequately incorporate the + new information without catastrophic interference. Architectures with augmented + memory capacities, such as Neural Turing Machines (NTMs), offer the ability + to quickly encode and retrieve new information, and hence can potentially + obviate the downsides of conventional models. Here, we demonstrate the ability + of a memory-augmented neural network to rapidly assimilate new data, and leverage + this data to make accurate predictions after only a few samples. We also introduce + a new method for accessing an external memory that focuses on memory content, + unlike previous methods that additionally use memory location-based focusing + mechanisms.", "venue": "International Conference on Machine Learning", "year": + 2016, "referenceCount": 22, "citationCount": 1085, "influentialCitationCount": + 65, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2016-06-19", + "journal": {"pages": "1842-1850"}, "authors": [{"authorId": "35030998", "name": + "Adam Santoro"}, {"authorId": "2258504", "name": "Sergey Bartunov"}, {"authorId": + "46378362", "name": "M. Botvinick"}, {"authorId": "1688276", "name": "Daan + Wierstra"}, {"authorId": "2542999", "name": "T. Lillicrap"}]}, {"paperId": + "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": {"MAG": "593056538", + "CorpusId": 60423929}, "corpusId": 60423929, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "title": "The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma", "abstract": "Alan Turing 1912-1954 Computable Numbers: A Guide 1. On Computable @@ -6115,61 +7027,41 @@ interactions: Calculating Machines Be Said to Think? (1952) Artificial Life 15. The Chemical Basis of Morphogenesis (1952) 16. Chess (1953) 17. Solvable and Unsolvable Problems (1954)", "venue": "", "year": 2004, "referenceCount": 39, "citationCount": - 151, "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": - "118975427", "name": "J. Copeland"}]}, {"paperId": "f18804d68d67712aec03d984050114a752113927", - "externalIds": {"MAG": "1570408932", "DBLP": "conf/icalp/AsarinC05", "DOI": - "10.1007/11523468_83", "CorpusId": 17373784}, "url": "https://www.semanticscholar.org/paper/f18804d68d67712aec03d984050114a752113927", - "title": "Noisy Turing Machines", "abstract": null, "venue": "ICALP", "year": - 2005, "referenceCount": 14, "citationCount": 27, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2005-07-11", "journal": {"pages": "1031-1042"}, - "authors": [{"authorId": "1736198", "name": "E. Asarin"}, {"authorId": "11176649", - "name": "Pieter Collins"}]}, {"paperId": "532d6858d5f5333c3d5a22d5f0c594b6f31582c8", - "externalIds": {"DBLP": "journals/synthese/Piccinini07", "MAG": "2125082193", - "DOI": "10.1007/s11229-005-0194-z", "CorpusId": 494161}, "url": "https://www.semanticscholar.org/paper/532d6858d5f5333c3d5a22d5f0c594b6f31582c8", + 152, "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}, {"authorId": "118975427", "name": "J. Copeland"}]}, + {"paperId": "532d6858d5f5333c3d5a22d5f0c594b6f31582c8", "externalIds": {"DBLP": + "journals/synthese/Piccinini07", "MAG": "2125082193", "DOI": "10.1007/s11229-005-0194-z", + "CorpusId": 494161}, "corpusId": 494161, "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", + "name": "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", + "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, + "url": "https://www.semanticscholar.org/paper/532d6858d5f5333c3d5a22d5f0c594b6f31582c8", "title": "Computationalism, The Church\u2013Turing Thesis, and the Church\u2013Turing Fallacy", "abstract": null, "venue": "Synthese", "year": 2005, "referenceCount": 61, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "Synthese", - "pages": "97-120", "volume": "154"}, "authors": [{"authorId": "144363427", - "name": "G. Piccinini"}]}, {"paperId": "3904315e2eca50d0086e4b7273f7fd707c652230", - "externalIds": {"MAG": "2472819217", "DBLP": "conf/icml/SantoroBBWL16", "CorpusId": - 6466088}, "url": "https://www.semanticscholar.org/paper/3904315e2eca50d0086e4b7273f7fd707c652230", - "title": "Meta-Learning with Memory-Augmented Neural Networks", "abstract": - "Despite recent breakthroughs in the applications of deep neural networks, - one setting that presents a persistent challenge is that of \"one-shot learning.\" - Traditional gradient-based networks require a lot of data to learn, often - through extensive iterative training. When new data is encountered, the models - must inefficiently relearn their parameters to adequately incorporate the - new information without catastrophic interference. Architectures with augmented - memory capacities, such as Neural Turing Machines (NTMs), offer the ability - to quickly encode and retrieve new information, and hence can potentially - obviate the downsides of conventional models. Here, we demonstrate the ability - of a memory-augmented neural network to rapidly assimilate new data, and leverage - this data to make accurate predictions after only a few samples. We also introduce - a new method for accessing an external memory that focuses on memory content, - unlike previous methods that additionally use memory location-based focusing - mechanisms.", "venue": "International Conference on Machine Learning", "year": - 2016, "referenceCount": 22, "citationCount": 1079, "influentialCitationCount": - 63, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2016-06-19", "journal": {"pages": "1842-1850"}, - "authors": [{"authorId": "35030998", "name": "Adam Santoro"}, {"authorId": - "2258504", "name": "Sergey Bartunov"}, {"authorId": "46378362", "name": "M. - Botvinick"}, {"authorId": "1688276", "name": "Daan Wierstra"}, {"authorId": - "2542999", "name": "T. Lillicrap"}]}, {"paperId": "86bb5811e8eb8c835e2b942f7e45530b87856561", - "externalIds": {"MAG": "1988374166", "DBLP": "journals/jacm/GoldreichO96", - "DOI": "10.1145/233551.233553", "CorpusId": 7502114}, "url": "https://www.semanticscholar.org/paper/86bb5811e8eb8c835e2b942f7e45530b87856561", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Synthese", "pages": "97-120", "volume": "154"}, + "authors": [{"authorId": "144363427", "name": "G. Piccinini"}]}, {"paperId": + "f18804d68d67712aec03d984050114a752113927", "externalIds": {"MAG": "1570408932", + "DBLP": "conf/icalp/AsarinC05", "DOI": "10.1007/11523468_83", "CorpusId": + 17373784}, "corpusId": 17373784, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f18804d68d67712aec03d984050114a752113927", + "title": "Noisy Turing Machines", "abstract": null, "venue": "ICALP", "year": + 2005, "referenceCount": 14, "citationCount": 27, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-07-11", + "journal": {"pages": "1031-1042"}, "authors": [{"authorId": "1736198", "name": + "E. Asarin"}, {"authorId": "11176649", "name": "Pieter Collins"}]}, {"paperId": + "86bb5811e8eb8c835e2b942f7e45530b87856561", "externalIds": {"MAG": "1988374166", + "DBLP": "journals/jacm/GoldreichO96", "DOI": "10.1145/233551.233553", "CorpusId": + 7502114}, "corpusId": 7502114, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/86bb5811e8eb8c835e2b942f7e45530b87856561", "title": "Software protection and simulation on oblivious RAMs", "abstract": "Software protection is one of the most important issues concerning computer practice. There exist many heuristics and ad-hoc methods for protection, but @@ -6188,16 +7080,22 @@ interactions: In particular, we show how to do an on-line simulation of an arbitrary RAM by a probabilistic oblivious RAM with a polylogaithmic slowdown in the running time. On the other hand, we show that a logarithmic slowdown is a lower bound.", - "venue": "JACM", "year": 1996, "referenceCount": 38, "citationCount": 1594, - "influentialCitationCount": 368, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-05-01", "journal": {"name": "J. ACM", "pages": "431-473", - "volume": "43"}, "authors": [{"authorId": "1748224", "name": "R. Ostrovsky"}]}, - {"paperId": "57c202f6b08c620c99cd6b242e8bcd4f4f3133b3", "externalIds": {"MAG": - "2058444173", "DBLP": "journals/jsyml/NiesST05", "DOI": "10.2178/jsl/1120224726", - "CorpusId": 8144169}, "url": "https://www.semanticscholar.org/paper/57c202f6b08c620c99cd6b242e8bcd4f4f3133b3", + "venue": "JACM", "year": 1996, "referenceCount": 38, "citationCount": 1598, + "influentialCitationCount": 370, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dspace.mit.edu/bitstream/1721.1/103684/1/26903873-MIT.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-05-01", "journal": + {"name": "J. ACM", "pages": "431-473", "volume": "43"}, "authors": [{"authorId": + "1748224", "name": "R. Ostrovsky"}]}, {"paperId": "57c202f6b08c620c99cd6b242e8bcd4f4f3133b3", + "externalIds": {"MAG": "2058444173", "DBLP": "journals/jsyml/NiesST05", "DOI": + "10.2178/jsl/1120224726", "CorpusId": 8144169}, "corpusId": 8144169, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/57c202f6b08c620c99cd6b242e8bcd4f4f3133b3", "title": "Randomness, relativization and Turing degrees", "abstract": "Abstract We compare various notions of algorithmic randomness. First we consider relativized randomness. A set is n-random if it is Martin-L\u00f6f random relative to @@ -6214,83 +7112,33 @@ interactions: degree while the same notions coincide in every non-high degree. We make some remarks about hyperimmune-free and PA-complete degrees.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2005, "referenceCount": 62, "citationCount": - 154, "influentialCitationCount": 29, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 154, "influentialCitationCount": 29, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.cs.auckland.ac.nz/~nies/papers/NST.pdf", "status": "GREEN"}, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2005-06-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "515 - 535", "volume": "70"}, "authors": [{"authorId": "2350687", "name": "A. Nies"}, {"authorId": "1699450", "name": "F. Stephan"}, {"authorId": - "3200486", "name": "S. Terwijn"}]}, {"paperId": "b4132e951fc5f5e16f4c01a9cd5cc3545d817c28", - "externalIds": {"MAG": "1990903593", "DOI": "10.1103/PHYSREVLETT.78.1190", - "CorpusId": 14374263}, "url": "https://www.semanticscholar.org/paper/b4132e951fc5f5e16f4c01a9cd5cc3545d817c28", - "title": "CHEMICAL KINETICS IS TURING UNIVERSAL", "abstract": "Interest in - chemical computation has followed four different paths. It is one of the natural - extensions of discussions about information and thermodynamics, which go back - to Maxwell demon arguments and Szilard\u2019s work [1\u20135]. It is also - a rather natural extension to the application of dynamical systems theory - to chemical reactions [6\u20138], in particular logic networks stemming from - bistable reaction systems [9]. A lot of effort has been devoted to trying - to devise nonstandard computational architectures, and chemical implementations - provide a distinct enough backdrop to silicon [10\u201312]. Finally, in recent - years biology has presented us with what looks to be actual chemical computers: - the enzymatic cascades of cell signaling [13\u201315]. One of the first questions - that can be asked in this subject is whether universal (Turing) computation - can be achieved within some theoretical model of chemistry; the most immediate - one is standard chemical kinetics. This question has been recently studied - in some detail [16\u201322], and even subject to experimental tests [23]. - In [18\u201320], Hjelmfelt et al. argued quite convincingly that building - blocks for universal computation indeed can be constructed within ideal chemical - kinetics, and that they could be interconnected to achieve computation. However, - many difficulties still lie in the way. An issue not addressed by Hjelmfelt - et al. is structural stability: the tolerance of a system to changes in parameters - and functional structure. In particular, \u201cgluing\u201d together two groups - of chemical reactions will have appreciable effects on the kinetics of both - groups; the basic unit and the couplings used in [18\u201320] require case-by-case - adjustment of individual parameters for proper functioning. The purpose of - this Letter is to provide a slightly more formal proof that chemical kinetics - can be used to construct universal computers. I will concentrate on the \u201cnext\u201d - level of difficulty, which is that of the global behavior of a fully coupled - system and its structural stability. I will do it through the simplest approach: - I will show that classical digital electronics can be implemented through - chemical reactions. Since my key problem in this scheme is showing global - consistency, and the proof requires arbitrarily large circuits, I will have - to show that the output of one gate can be plugged into the input of", "venue": - "", "year": 1997, "referenceCount": 39, "citationCount": 144, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-02-10", - "journal": {"name": "Physical Review Letters", "pages": "1190-1193", "volume": - "78"}, "authors": [{"authorId": "2239538", "name": "M. Magnasco"}]}, {"paperId": - "7341f4d05904406e0efa5d376ffa96c0ace47ccd", "externalIds": {"MAG": "1839356836", - "DBLP": "conf/dimacs/Rothemund95", "DOI": "10.1090/dimacs/027/06", "CorpusId": - 12149420}, "url": "https://www.semanticscholar.org/paper/7341f4d05904406e0efa5d376ffa96c0ace47ccd", - "title": "A DNA and restriction enzyme implementation of Turing machines", - "abstract": "Bacteria employ restriction enzymes to cut or restrict DNA \nat - or near specific words in a unique way. Many restriction \nenzymes cut the - two strands of double-stranded DNA at \ndifferent positions leaving overhangs - of single-stranded DNA. Two pieces of DNA may be rejoined or ligated if their - \nterminal overhangs are complementary. Using these operations \nfragments - of DNA, or oligonucleotides, may be inserted and \ndeleted from a circular - piece of plasmid DNA. We propose \nan encoding for the transition table of - a Turing machine in \nDNA oligonucleotides and a corresponding series of restrictions - and ligations of those oligonucleotides that, when performed on circular DNA - encoding an instantaneous description of a Turing machine, simulate the operation - of the Turing machine encoded in those oligonucleotides. DNA based Turing - machines have been proposed by Charles Bennett but they invoke imaginary enzymes - to perform the state-symbol transitions. Our approach differs in that every - operation can be performed using commercially available restriction enzymes - and ligases.", "venue": "DNA Based Computers", "year": 1995, "referenceCount": - 36, "citationCount": 172, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"pages": "75-119"}, - "authors": [{"authorId": "145477156", "name": "P. Rothemund"}]}, {"paperId": + "3200486", "name": "S. Terwijn"}]}, {"paperId": "19e382bb1a947a6537632bd7442685ce0bf81469", + "externalIds": {"DBLP": "books/sp/02/Rendell02", "MAG": "2160653514", "DOI": + "10.1007/978-1-4471-0129-1_18", "CorpusId": 122804909}, "corpusId": 122804909, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19e382bb1a947a6537632bd7442685ce0bf81469", + "title": "Turing Universality of the Game of Life", "abstract": null, "venue": + "Collision-Based Computing", "year": 2002, "referenceCount": 18, "citationCount": + 146, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"pages": "513-539"}, + "authors": [{"authorId": "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "8858fbddeff466c25687e44528dcb3e893d38902", "externalIds": {"MAG": "1993999944", "DOI": "10.1103/PHYSREVLETT.90.178303", "CorpusId": 12801125, "PubMed": "12786111"}, - "url": "https://www.semanticscholar.org/paper/8858fbddeff466c25687e44528dcb3e893d38902", + "corpusId": 12801125, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/8858fbddeff466c25687e44528dcb3e893d38902", "title": "Oscillatory Turing patterns in reaction-diffusion systems with two coupled layers.", "abstract": "A model reaction-diffusion system with two coupled layers yields oscillatory Turing patterns when oscillation occurs @@ -6299,16 +7147,21 @@ interactions: a hexagonal lattice, and localized spiral or concentric waves within spot-like or stripe-like Turing structures. A new approach to generating the short-wave instability is proposed.", "venue": "Physical Review Letters", "year": 2003, - "referenceCount": 5, "citationCount": 105, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2003-05-01", "journal": {"name": "Physical - review letters", "pages": "\n 178303\n ", "volume": "90 17"}, - "authors": [{"authorId": "2586119", "name": "L. Yang"}, {"authorId": "144854275", - "name": "I. Epstein"}]}, {"paperId": "a0e594acd98494aa596c506b6cd2d584c6a01798", + "referenceCount": 5, "citationCount": 106, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-05-01", "journal": {"name": "Physical review letters", "pages": "\n 178303\n ", + "volume": "90 17"}, "authors": [{"authorId": "2586119", "name": "L. Yang"}, + {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "a0e594acd98494aa596c506b6cd2d584c6a01798", "externalIds": {"MAG": "2299867375", "DOI": "10.1086/psaprocbienmeetp.1994.1.193018", - "CorpusId": 7284589}, "url": "https://www.semanticscholar.org/paper/a0e594acd98494aa596c506b6cd2d584c6a01798", + "CorpusId": 7284589}, "corpusId": 7284589, "publicationVenue": {"id": "ab9bd373-63c8-475b-a85d-50574b345c4c", + "name": "PSA Proceedings of the Biennial Meeting of the Philosophy of Science + Association", "alternate_names": ["PSA Proc Bienn Meet Philos Sci Assoc"], + "issn": "0270-8647", "url": "https://www.jstor.org/journal/psaprocbienmeetp", + "alternate_urls": ["http://www.jstor.org/journals/02708647.html"]}, "url": + "https://www.semanticscholar.org/paper/a0e594acd98494aa596c506b6cd2d584c6a01798", "title": "Non-Turing Computers and Non-Turing Computability", "abstract": "A true Turing machine (TM) requires an infinitely long paper tape. Thus a TM can be housed in the infinite world of Newtonian spacetime (the spacetime @@ -6329,16 +7182,104 @@ interactions: than orthodox computability theory. Some ideas about this new mathematical theory are given.", "venue": "PSA Proceedings of the Biennial Meeting of the Philosophy of Science Association", "year": 1994, "referenceCount": 9, "citationCount": - 139, "influentialCitationCount": 12, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1994-01-01", "journal": {"name": - "PSA: Proceedings of the Biennial Meeting of the Philosophy of Science Association", - "pages": "126 - 138", "volume": "1994"}, "authors": [{"authorId": "37952418", - "name": "M. Hogarth"}]}, {"paperId": "5e5073fa1b723b8861050f2dba5f38e19574740e", + 140, "influentialCitationCount": 13, "isOpenAccess": true, "openAccessPdf": + {"url": "http://hypercomputation.net/download/1994a_hogarth.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-01-01", + "journal": {"name": "PSA: Proceedings of the Biennial Meeting of the Philosophy + of Science Association", "pages": "126 - 138", "volume": "1994"}, "authors": + [{"authorId": "37952418", "name": "M. Hogarth"}]}, {"paperId": "7341f4d05904406e0efa5d376ffa96c0ace47ccd", + "externalIds": {"MAG": "1839356836", "DBLP": "conf/dimacs/Rothemund95", "DOI": + "10.1090/dimacs/027/06", "CorpusId": 12149420}, "corpusId": 12149420, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7341f4d05904406e0efa5d376ffa96c0ace47ccd", + "title": "A DNA and restriction enzyme implementation of Turing machines", + "abstract": "Bacteria employ restriction enzymes to cut or restrict DNA \nat + or near specific words in a unique way. Many restriction \nenzymes cut the + two strands of double-stranded DNA at \ndifferent positions leaving overhangs + of single-stranded DNA. Two pieces of DNA may be rejoined or ligated if their + \nterminal overhangs are complementary. Using these operations \nfragments + of DNA, or oligonucleotides, may be inserted and \ndeleted from a circular + piece of plasmid DNA. We propose \nan encoding for the transition table of + a Turing machine in \nDNA oligonucleotides and a corresponding series of restrictions + and ligations of those oligonucleotides that, when performed on circular DNA + encoding an instantaneous description of a Turing machine, simulate the operation + of the Turing machine encoded in those oligonucleotides. DNA based Turing + machines have been proposed by Charles Bennett but they invoke imaginary enzymes + to perform the state-symbol transitions. Our approach differs in that every + operation can be performed using commercially available restriction enzymes + and ligases.", "venue": "DNA Based Computers", "year": 1995, "referenceCount": + 36, "citationCount": 173, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "https://authors.library.caltech.edu/27384/2/DNA_Restriction.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "75-119"}, "authors": [{"authorId": "145477156", "name": "P. Rothemund"}]}, + {"paperId": "ae839811640200fb6b5a8adc85b26b1c7be8d4bf", "externalIds": {"MAG": + "1591095982", "CorpusId": 60604558}, "corpusId": 60604558, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ae839811640200fb6b5a8adc85b26b1c7be8d4bf", + "title": "Good-Turing Smoothing Without Tears", "abstract": "The performance + of statistically based techniques for many tasks such as spelling correction, + sense disambiguation, and translation is improved if one can estimate a probability + for an object of interest which has not been seen before. Good-Turing methods + are one means of estimating these probabilities for previously unseen objects. + However, the use of Good-Turing methods requires a smoothing step which must + smooth in regions of vastly different accuracy. Such smoothers are difficult + to use, and may have hindered the use of Good-Turing methods in computational + linguistics.", "venue": "", "year": 2001, "referenceCount": 3, "citationCount": + 111, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "34938639", + "name": "W. Gale"}]}, {"paperId": "68c0194d205b3cbf152d828175b21cb3a5ce5268", + "externalIds": {"MAG": "1973729402", "DOI": "10.1007/S002850000056", "CorpusId": + 12004159, "PubMed": "11196582"}, "corpusId": 12004159, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/68c0194d205b3cbf152d828175b21cb3a5ce5268", + "title": "Turing instabilities in general systems", "abstract": null, "venue": + "Journal of Mathematical Biology", "year": 2000, "referenceCount": 28, "citationCount": + 137, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ora.ox.ac.uk/objects/uuid:9594c7e9-d780-4f58-831f-98614ec21d1c/download_file?safe_filename=122.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2000-12-01", "journal": + {"name": "Journal of Mathematical Biology", "pages": "493-512", "volume": + "41"}, "authors": [{"authorId": "50340687", "name": "R. Satnoianu"}, {"authorId": + "91541349", "name": "M. Menzinger"}, {"authorId": "2339973", "name": "P. Maini"}]}, + {"paperId": "ad3c04be895133b4e714b2291b756aa101b04e9a", "externalIds": {"MAG": + "2043838333", "DOI": "10.1063/1.1507110", "CorpusId": 17476174}, "corpusId": + 17476174, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad3c04be895133b4e714b2291b756aa101b04e9a", + "title": "Pattern formation arising from interactions between Turing and wave + instabilities", "abstract": "We study pattern formation arising from the interaction + of the stationary Turing and wave (oscillatory Turing) instabilities. Interaction + and competition between these symmetry-breaking modes lead to the emergence + of a large variety of spatiotemporal patterns, including modulated Turing + structures, modulated standing waves, and combinations of Turing structures + and spiral waves. Spatial resonances are obtained near codimension-two Turing-wave + bifurcations. Far from bifurcation lines, we obtain inwardly propagating spiral + waves with Turing spots at their tips. We demonstrate that the coexistence + of Turing spots and traveling waves is a result of interaction between Turing + and oscillatory modes, while the inwardly propagating waves (antispirals) + do not require this interaction; they can arise from the wave instability + combined with a negative group velocity.", "venue": "", "year": 2002, "referenceCount": + 47, "citationCount": 126, "influentialCitationCount": 8, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-09-30", + "journal": {"name": "Journal of Chemical Physics", "pages": "7259-7265", "volume": + "117"}, "authors": [{"authorId": "2586119", "name": "L. Yang"}, {"authorId": + "4978913", "name": "M. Dolnik"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, + {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "5e5073fa1b723b8861050f2dba5f38e19574740e", "externalIds": {"DBLP": "journals/corr/Shieber94", "ArXiv": "cmp-lg/9404002", "MAG": "2003453784", "DOI": "10.1145/175208.175217", "CorpusId": 215823854}, - "url": "https://www.semanticscholar.org/paper/5e5073fa1b723b8861050f2dba5f38e19574740e", + "corpusId": 215823854, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5e5073fa1b723b8861050f2dba5f38e19574740e", "title": "Lessons from a restricted Turing test", "abstract": "We report on the recent Loebner prize competition inspired by Turing''s test of intelligent behavior. The presentation covers the structure of the competition and the @@ -6382,177 +7323,97 @@ interactions: Prize is administered by an 1 of 14 03/03/99 17:24 Lessons from a Restricted Turing Test http://www.eecs.harvard.edu/shieber/papers/loebner-rev-html/loebner-rev-html.html", "venue": "CACM", "year": 1994, "referenceCount": 32, "citationCount": 150, - "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/175208.175217", "status": "BRONZE"}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1994-04-03", "journal": {"name": "Commun. ACM", "pages": "70-78", "volume": "37"}, "authors": [{"authorId": - "1692491", "name": "S. Shieber"}]}, {"paperId": "68c0194d205b3cbf152d828175b21cb3a5ce5268", - "externalIds": {"MAG": "1973729402", "DOI": "10.1007/S002850000056", "CorpusId": - 12004159, "PubMed": "11196582"}, "url": "https://www.semanticscholar.org/paper/68c0194d205b3cbf152d828175b21cb3a5ce5268", - "title": "Turing instabilities in general systems", "abstract": null, "venue": - "Journal of Mathematical Biology", "year": 2000, "referenceCount": 28, "citationCount": - 135, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-12-01", "journal": {"name": "Journal of Mathematical - Biology", "pages": "493-512", "volume": "41"}, "authors": [{"authorId": "50340687", - "name": "R. Satnoianu"}, {"authorId": "91541349", "name": "M. Menzinger"}, - {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": "ad3c04be895133b4e714b2291b756aa101b04e9a", - "externalIds": {"MAG": "2043838333", "DOI": "10.1063/1.1507110", "CorpusId": - 17476174}, "url": "https://www.semanticscholar.org/paper/ad3c04be895133b4e714b2291b756aa101b04e9a", - "title": "Pattern formation arising from interactions between Turing and wave - instabilities", "abstract": "We study pattern formation arising from the interaction - of the stationary Turing and wave (oscillatory Turing) instabilities. Interaction - and competition between these symmetry-breaking modes lead to the emergence - of a large variety of spatiotemporal patterns, including modulated Turing - structures, modulated standing waves, and combinations of Turing structures - and spiral waves. Spatial resonances are obtained near codimension-two Turing-wave - bifurcations. Far from bifurcation lines, we obtain inwardly propagating spiral - waves with Turing spots at their tips. We demonstrate that the coexistence - of Turing spots and traveling waves is a result of interaction between Turing - and oscillatory modes, while the inwardly propagating waves (antispirals) - do not require this interaction; they can arise from the wave instability - combined with a negative group velocity.", "venue": "", "year": 2002, "referenceCount": - 47, "citationCount": 125, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "1692491", "name": "S. Shieber"}]}, {"paperId": "7a8a3a935794513bcc8f03e2cc252ee81050824c", + "externalIds": {"MAG": "2107680798", "DOI": "10.1103/PHYSREVE.64.056213", + "CorpusId": 17929977, "PubMed": "11736060"}, "corpusId": 17929977, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7a8a3a935794513bcc8f03e2cc252ee81050824c", + "title": "Stability of Turing patterns in the Brusselator model.", "abstract": + "The selection and competition of Turing patterns in the Brusselator model + are reviewed. The stability of stripes and hexagons towards spatial perturbations + is studied using the amplitude equation formalism. For hexagonal patterns + these equations include both linear and nonpotential spatial terms enabling + distorted solutions. The latter modify substantially the stability diagrams + and select patterns with wave numbers quite different from the critical value. + The analytical results from the amplitude formalism agree with direct simulations + of the model. Moreover, we show that slightly squeezed hexagons are locally + stable in a full range of distortion angles. The stability regions resulting + from the phase equation are similar to those obtained numerically by other + authors and to those observed in experiments.", "venue": "Physical review. + E, Statistical, nonlinear, and soft matter physics", "year": 2001, "referenceCount": + 34, "citationCount": 107, "influentialCitationCount": 6, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dadun.unav.edu/bitstream/10171/1788/1/2001.PRE64.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2002-09-30", "journal": {"name": - "Journal of Chemical Physics", "pages": "7259-7265", "volume": "117"}, "authors": - [{"authorId": "2586119", "name": "L. Yang"}, {"authorId": "4978913", "name": - "M. Dolnik"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": - "144854275", "name": "I. Epstein"}]}, {"paperId": "ccb1d1ac0bb92b196b18389c5b6bc1a2d75c8d86", - "externalIds": {"MAG": "1556077482", "DOI": "10.1162/089120105774321127", - "CorpusId": 170201386}, "url": "https://www.semanticscholar.org/paper/ccb1d1ac0bb92b196b18389c5b6bc1a2d75c8d86", - "title": "The Turing Test: Verbal Behavior as the Hallmark of Intelligence", - "abstract": "This eagerly awaited anthology, while surely not the last word - on the Turing Test, equally surely deserves to become the principal source - of information on the test. It includes not only Turing\u2019s classic paper, - but a fine selection of the main replies to date, all tied together by an - engaging and penetrating essay by the editor. Stuart M. Shieber\u2019s name - is well known to computational linguists for his research and to computer - scientists more generally for his debate on the Loebner Turing Test competition, - which appeared a decade earlier in Communications of the ACM (Shieber 1994a, - 1994b; Loebner 1994).1 With this collection, I expect it to become equally - well known to philosophers. The collection begins with historical \u201cprecursors\u201d - to Turing\u2019s paper: two pieces by Descartes\u2014his Discourse on the - Method, Chap. V (1637), and his \u201cLetter to the Marquess of Newcastle\u201d\u2014followed - by selections from La Mettrie\u2019s Machine Man (1748). The second part contains - the centerpiece: Turing\u2019s 1950 paper from Mind, \u201cComputing Machinery - and Intelligence,\u201d accompanied by three \u201cephemera\u201d: two early - (1951) and difficult-to-find articles by Turing\u2014\u201cIntelligent Machinery, - a Heretical Theory\u201d and \u201cCan Digital Computers Think?\u201d\u2014and - a transcript of a 1952 BBC radio interview with Turing, M. H. A. Newman, Sir - Geoffrey Jefferson, and R. B. Braithwaite, \u201cCan automatic Calculating - Machines Be Said to Think?\u201d Shieber\u2019s presentation of the piece - de resistance (Turing 1950) devotes great attention to the sanctity of the - text and is replete with scholarly paraphernalia comparing his carefully edited - reprint with the original (which, by the way, is now available online, courtesy - of JSTOR.org). The third, and final, part contains the immediate reactions - to Turing\u2019s Mind paper as they appeared in that journal, followed by - now-classic responses and some more-recent, important papers, some arranged - chronologically, others logically. The first published response was Leonard - Pinsky\u2019s early (1951)\u2014and satirical\u2014\u201cDo Machines Think - about Machines Thinking?\u201d for which Shieber offers a brief, wry introduction. - Next we have a quartet consisting of Keith Gunderson\u2019s important \u201cThe - Imitation Game\u201d (1964), Richard Purtill\u2019s response (\u201cBeating - the Imitation Game,\u201d 1971), and Geoffrey Sampson\u2019s (\u201cIn Defence - of Turing\u201d) and P. H. Millar\u2019s (\u201cOn the Point of the Imitation - Game\u201d) 1973 replies to Purtill. Jumping ahead a couple of decades comes - Robert M. French\u2019s 1990 \u201cSubcognition and the Limits of the Turing - Test.\u201d Next, in more of a logical than a chronological order, comes a - trio consisting of John", "venue": "", "year": 2004, "referenceCount": 13, - "citationCount": 86, "influentialCitationCount": 7, "isOpenAccess": true, - "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2004-06-01", "journal": {"name": "Computational - Linguistics", "pages": "407-412", "volume": "31"}, "authors": [{"authorId": - "1692491", "name": "S. Shieber"}]}, {"paperId": "19e382bb1a947a6537632bd7442685ce0bf81469", - "externalIds": {"DBLP": "books/sp/02/Rendell02", "MAG": "2160653514", "DOI": - "10.1007/978-1-4471-0129-1_18", "CorpusId": 122804909}, "url": "https://www.semanticscholar.org/paper/19e382bb1a947a6537632bd7442685ce0bf81469", - "title": "Turing Universality of the Game of Life", "abstract": null, "venue": - "Collision-Based Computing", "year": 2002, "referenceCount": 18, "citationCount": - 145, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"pages": "513-539"}, "authors": [{"authorId": - "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "463fdca2faba8804783cef7453a7bed0f9a933b0", - "externalIds": {"DBLP": "conf/icdar/CoatesFB01", "DOI": "10.1109/ICDAR.2001.953966", - "CorpusId": 43033571}, "url": "https://www.semanticscholar.org/paper/463fdca2faba8804783cef7453a7bed0f9a933b0", - "title": "Pessimal print: a reverse Turing test", "abstract": "We exploit - the gap in ability between human and machine vision systems to craft a family - of automatic challenges that tell human and machine users apart via graphical - interfaces including Internet browsers. Turing proposed (1950) a method whereby - human judges might validate \"artificial intelligence\" by failing to distinguish - between human and machine interlocutors. Stimulated by the \"chat room problem\", - and influenced by the CAPTCHA project of Blum et al. (2000), we propose a - variant of the Turing test using pessimal print: that is, low-quality images - of machine-printed text synthesized pseudo-randomly over certain ranges of - words, typefaces, and image degradations. We show experimentally that judicious - choice of these ranges can ensure that the images are legible to human readers - but illegible to several of the best present-day optical character recognition - (OCR) machines. Our approach is motivated by a decade of research on performance - evaluation of OCR machines and on quantitative stochastic models of document - image quality. The slow pace of evolution of OCR and other species of machine - vision over many decades suggests that pessimal print will defy automated - attack for many years. Applications include ''bot'' barriers and database - rationing.", "venue": "Proceedings of Sixth International Conference on Document - Analysis and Recognition", "year": 2001, "referenceCount": 5, "citationCount": - 134, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": null, - "journal": {"name": "Proceedings of Sixth International Conference on Document - Analysis and Recognition", "pages": "1154-1158"}, "authors": [{"authorId": - "40458942", "name": "Allison L. Coates"}, {"authorId": "1807480", "name": - "R. Fateman"}, {"authorId": "1723766", "name": "H. Baird"}]}, {"paperId": - "d3d2781b092facc03c81da14ef257f5f38b7cf9c", "externalIds": {"MAG": "1996333888", - "DOI": "10.1007/S10884-004-2782-X", "CorpusId": 120911696}, "url": "https://www.semanticscholar.org/paper/d3d2781b092facc03c81da14ef257f5f38b7cf9c", - "title": "Global Bifurcation and Structure of Turing Patterns in the 1-D Lengyel\u2013Epstein - Model", "abstract": null, "venue": "", "year": 2004, "referenceCount": 20, - "citationCount": 96, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-04-01", "journal": {"name": - "Journal of Dynamics and Differential Equations", "pages": "297-320", "volume": - "16"}, "authors": [{"authorId": "10192095", "name": "Jaeduck Jang"}, {"authorId": - "2531648", "name": "W. Ni"}, {"authorId": "50627764", "name": "M. Tang"}]}, - {"paperId": "006eeb3d5b78c6dd6f7401da35c5760ed6fae5ab", "externalIds": {"MAG": - "1965552352", "DOI": "10.1103/PHYSREVE.60.4588", "CorpusId": 41705336, "PubMed": - "11970318"}, "url": "https://www.semanticscholar.org/paper/006eeb3d5b78c6dd6f7401da35c5760ed6fae5ab", - "title": "Turing patterns on a sphere.", "abstract": "We address the problem - of pattern formation on the surface of a sphere using Turing equations. By - considering a generic reaction-diffusion model, we numerically investigate - the patterns formed under different conditions on the parameter values. Our - results show that a closed surface with curvature, as a sphere, imposes geometrical - restrictions on the shape of the pattern. This is important in some biological - systems where curvature plays an important role in guiding chemical, biochemical, - and embryological processes.", "venue": "Physical review. E, Statistical physics, - plasmas, fluids, and related interdisciplinary topics", "year": 1999, "referenceCount": - 2, "citationCount": 128, "influentialCitationCount": 9, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2001-10-22", + "journal": {"name": "Physical review. E, Statistical, nonlinear, and soft + matter physics", "pages": "\n 056213\n ", "volume": "64 5 + Pt 2"}, "authors": [{"authorId": "123477968", "name": "B. Pe\u00f1a"}, {"authorId": + "82361775", "name": "C. P\u00e9rez-Garc\u00eda"}]}, {"paperId": "b0847bbdca60a2483f1875a429e07df809c01695", + "externalIds": {"MAG": "1585701772", "DBLP": "conf/colt/McAllesterS00", "CorpusId": + 7928401}, "corpusId": 7928401, "publicationVenue": {"id": "24b0721b-0592-414a-ac79-7271515aaab0", + "name": "Annual Conference Computational Learning Theory", "type": "conference", + "alternate_names": ["Conf Learn Theory", "COLT", "Conference on Learning Theory", + "Annu Conf Comput Learn Theory"], "url": "http://www.wikicfp.com/cfp/program?id=536"}, + "url": "https://www.semanticscholar.org/paper/b0847bbdca60a2483f1875a429e07df809c01695", + "title": "On the Convergence Rate of Good-Turing Estimators", "abstract": + "Good-Turing adjustments of word frequencies are an important tool in natural + language modeling. In particular, for any sample of words, there is a set + of words not occuring in that sample. The total probability mass of the words + not in the sample is the so-called missing mass. Good showed that the fraction + of the sample consisting of words that occur only once in the sample is a + nearly unbiased estimate of the missing mass. Here, we give a high-probability + confidence interval for the actual missing mass. More generally, for 0, we + give a confidence interval for the true probability mass of the set of words + occuring times in the sample.", "venue": "Annual Conference Computational + Learning Theory", "year": 2000, "referenceCount": 8, "citationCount": 136, + "influentialCitationCount": 19, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2000-06-28", "journal": + {"pages": "1-6"}, "authors": [{"authorId": "145689002", "name": "David A. + McAllester"}, {"authorId": "1716301", "name": "R. Schapire"}]}, {"paperId": + "521c6fa5c47e1bb26067550b59cdd46801df6109", "externalIds": {"MAG": "1999747351", + "DOI": "10.1103/PHYSREVLETT.88.208303", "CorpusId": 39227870, "PubMed": "12005611"}, + "corpusId": 39227870, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/521c6fa5c47e1bb26067550b59cdd46801df6109", + "title": "Spatial resonances and superposition patterns in a reaction-diffusion + model with interacting Turing modes.", "abstract": "Spatial resonances leading + to superlattice hexagonal patterns, known as \"black-eyes,\" and superposition + patterns combining stripes and/or spots are studied in a reaction-diffusion + model of two interacting Turing modes with different wavelengths. A three-phase + oscillatory interlacing hexagonal lattice pattern is also found, and its appearance + is attributed to resonance between a Turing mode and its subharmonic.", "venue": + "Physical Review Letters", "year": 2002, "referenceCount": 20, "citationCount": + 107, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1999-10-01", "journal": {"name": "Physical - review. E, Statistical physics, plasmas, fluids, and related interdisciplinary - topics", "pages": "\n 4588-92\n ", "volume": "60 4 Pt B"}, - "authors": [{"authorId": "70988914", "name": "C. Varea"}, {"authorId": "145092079", - "name": "J. Arag\u00f3n"}, {"authorId": "37747895", "name": "R. Barrio"}]}, - {"paperId": "52f40003253c1301f78d0f95e77f44e48c80cb9e", "externalIds": {"DBLP": - "journals/mima/BringsjordBF01", "MAG": "2170862681", "DOI": "10.1023/A:1011206622741", - "CorpusId": 28209961}, "url": "https://www.semanticscholar.org/paper/52f40003253c1301f78d0f95e77f44e48c80cb9e", - "title": "Creativity, the Turing Test, and the (Better) Lovelace Test", "abstract": - null, "venue": "Minds and Machines", "year": 2001, "referenceCount": 34, "citationCount": - 109, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Philosophy", "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-02-01", "journal": {"name": "Minds and Machines", - "pages": "3-27", "volume": "11"}, "authors": [{"authorId": "1797985", "name": - "S. Bringsjord"}, {"authorId": "144093093", "name": "P. Bello"}, {"authorId": - "2295799", "name": "D. Ferrucci"}]}]} + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-05-06", "journal": {"name": "Physical review letters", + "pages": "\n 208303\n ", "volume": "88 20"}, "authors": [{"authorId": + "2586119", "name": "L. Yang"}, {"authorId": "4978913", "name": "M. Dolnik"}, + {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", + "name": "I. Epstein"}]}, {"paperId": "8834e53e848d27119000438b0202ab9949c8a010", + "externalIds": {"MAG": "2090248486", "DOI": "10.1007/BF00160165", "CorpusId": + 18141184}, "corpusId": 18141184, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8834e53e848d27119000438b0202ab9949c8a010", + "title": "Pattern formation in generalized Turing systems", "abstract": null, + "venue": "", "year": 1994, "referenceCount": 42, "citationCount": 149, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Journal of Mathematical Biology", "pages": "345-393", + "volume": "32"}, "authors": [{"authorId": "145262321", "name": "R. Dillon"}, + {"authorId": "2339973", "name": "P. Maini"}, {"authorId": "2892576", "name": + "H. Othmer"}]}]} ' headers: @@ -6561,31 +7422,31 @@ interactions: Connection: - keep-alive Content-Length: - - '171057' + - '192917' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:19 GMT + - Tue, 03 Jan 2023 20:52:49 GMT Via: - - 1.1 5798112148ae9e672af737182da15f62.cloudfront.net (CloudFront) + - 1.1 e40594d191a88dc4bce1cbdfa1173f2a.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - AQ4WQs2s5aYVx1CmkpTzC6IK8FGjtn-dP119R27PupXhuKljr1k18w== + - sHx3nI3oWtC5GfsuM96QWBz1iBx6kwAS9mWfdaOXCUimrZRqL9q2bQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detEJEuUvHcFS6g= + - eLxRLErSPHcFUEg= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '171057' + - '192917' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:19 GMT + - Tue, 03 Jan 2023 20:52:49 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 350657ba-8526-4694-8266-b088ec8800e7 + - d2d78e3d-fee4-4e26-ad3b-350f36c2848b status: code: 200 message: OK @@ -6601,64 +7462,36 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=300&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=300&limit=100 response: body: - string: '{"total": 133388, "offset": 300, "next": 400, "data": [{"paperId": - "19e382bb1a947a6537632bd7442685ce0bf81469", "externalIds": {"DBLP": "books/sp/02/Rendell02", - "MAG": "2160653514", "DOI": "10.1007/978-1-4471-0129-1_18", "CorpusId": 122804909}, - "url": "https://www.semanticscholar.org/paper/19e382bb1a947a6537632bd7442685ce0bf81469", - "title": "Turing Universality of the Game of Life", "abstract": null, "venue": - "Collision-Based Computing", "year": 2002, "referenceCount": 18, "citationCount": - 145, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"pages": "513-539"}, "authors": [{"authorId": - "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "a0e594acd98494aa596c506b6cd2d584c6a01798", - "externalIds": {"MAG": "2299867375", "DOI": "10.1086/psaprocbienmeetp.1994.1.193018", - "CorpusId": 7284589}, "url": "https://www.semanticscholar.org/paper/a0e594acd98494aa596c506b6cd2d584c6a01798", - "title": "Non-Turing Computers and Non-Turing Computability", "abstract": - "A true Turing machine (TM) requires an infinitely long paper tape. Thus a - TM can be housed in the infinite world of Newtonian spacetime (the spacetime - of common sense), but not necessarily in our world, because our world-at least - according to our best spacetime theory, general relativity-may be finite. - All the same, one can argue for the \"existence\" of a TM on the basis that - there is no such housing problem in some other relativistic worlds that are - similar (\"close\") to our world. But curiously enough-and this is the main - point of this paper-some of these close worlds have a special spacetime structure - that allows TMs to perform certain Turing unsolvable tasks. For example, in - one kind of spacetime a TM can be used to solve first-order predicate logic - and the halting problem. And in a more complicated spacetime, TMs can be used - to decide arithmetic. These new computers serve to show that Church''s thesis - is a thoroughly contingent claim. Moreover, since these new computers share - the fundamental properties of a TM in ordinary operation (e.g. intuitive, - finitely programmed, limited in computational capability), a computability - theory based on these non-Turing computers is no less worthy of investigation - than orthodox computability theory. Some ideas about this new mathematical - theory are given.", "venue": "PSA Proceedings of the Biennial Meeting of the - Philosophy of Science Association", "year": 1994, "referenceCount": 9, "citationCount": - 139, "influentialCitationCount": 12, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1994-01-01", "journal": {"name": - "PSA: Proceedings of the Biennial Meeting of the Philosophy of Science Association", - "pages": "126 - 138", "volume": "1994"}, "authors": [{"authorId": "37952418", - "name": "M. Hogarth"}]}, {"paperId": "68c0194d205b3cbf152d828175b21cb3a5ce5268", - "externalIds": {"MAG": "1973729402", "DOI": "10.1007/S002850000056", "CorpusId": - 12004159, "PubMed": "11196582"}, "url": "https://www.semanticscholar.org/paper/68c0194d205b3cbf152d828175b21cb3a5ce5268", - "title": "Turing instabilities in general systems", "abstract": null, "venue": - "Journal of Mathematical Biology", "year": 2000, "referenceCount": 28, "citationCount": - 135, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-12-01", "journal": {"name": "Journal of Mathematical - Biology", "pages": "493-512", "volume": "41"}, "authors": [{"authorId": "50340687", - "name": "R. Satnoianu"}, {"authorId": "91541349", "name": "M. Menzinger"}, - {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": "006eeb3d5b78c6dd6f7401da35c5760ed6fae5ab", - "externalIds": {"MAG": "1965552352", "DOI": "10.1103/PHYSREVE.60.4588", "CorpusId": - 41705336, "PubMed": "11970318"}, "url": "https://www.semanticscholar.org/paper/006eeb3d5b78c6dd6f7401da35c5760ed6fae5ab", + string: '{"total": 133751, "offset": 300, "next": 400, "data": [{"paperId": + "3e6fe52651a9c1ca2bb932e1d8387dd0278737c8", "externalIds": {"DBLP": "journals/ijdar/BairdCF03", + "MAG": "2129824148", "DOI": "10.1007/s10032-002-0089-1", "CorpusId": 5223340}, + "corpusId": 5223340, "publicationVenue": {"id": "46722266-4327-4a22-871d-5a9fe3c5ad0c", + "name": "International Journal on Document Analysis and Recognition", "type": + "journal", "alternate_names": ["Int J Doc Anal Recognit"], "issn": "1433-2825", + "url": "https://link.springer.com/journal/10032"}, "url": "https://www.semanticscholar.org/paper/3e6fe52651a9c1ca2bb932e1d8387dd0278737c8", + "title": "PessimalPrint: a reverse Turing test", "abstract": null, "venue": + "International Journal on Document Analysis and Recognition", "year": 2001, + "referenceCount": 22, "citationCount": 95, "influentialCitationCount": 2, + "isOpenAccess": true, "openAccessPdf": {"url": "http://www.aladdin.cs.cmu.edu/papers/pdfs/y2001/pessimalprint.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-09-10", "journal": {"name": "International Journal + on Document Analysis and Recognition", "pages": "158-163", "volume": "5"}, + "authors": [{"authorId": "1723766", "name": "H. Baird"}, {"authorId": "40458942", + "name": "Allison L. Coates"}, {"authorId": "1807480", "name": "R. Fateman"}]}, + {"paperId": "006eeb3d5b78c6dd6f7401da35c5760ed6fae5ab", "externalIds": {"MAG": + "1965552352", "DOI": "10.1103/PHYSREVE.60.4588", "CorpusId": 41705336, "PubMed": + "11970318"}, "corpusId": 41705336, "publicationVenue": {"id": "f7dc890d-13a2-4e06-9f76-95c9fd4f8def", + "name": "Physical review. E, Statistical physics, plasmas, fluids, and related + interdisciplinary topics", "alternate_names": ["Phys rev Stat phys plasma + fluid relat interdiscip top"], "issn": "1063-651X", "alternate_issns": ["1095-3787"], + "url": "http://ejournals.ebsco.com/direct.asp?JournalID=101127", "alternate_urls": + ["https://journals.aps.org/pre/", "http://pre.aps.org/", "http://prola.aps.org/"]}, + "url": "https://www.semanticscholar.org/paper/006eeb3d5b78c6dd6f7401da35c5760ed6fae5ab", "title": "Turing patterns on a sphere.", "abstract": "We address the problem of pattern formation on the surface of a sphere using Turing equations. By considering a generic reaction-diffusion model, we numerically investigate @@ -6669,50 +7502,20 @@ interactions: and embryological processes.", "venue": "Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics", "year": 1999, "referenceCount": 2, "citationCount": 128, "influentialCitationCount": 9, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1999-10-01", "journal": {"name": "Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics", "pages": "\n 4588-92\n ", "volume": "60 4 Pt B"}, "authors": [{"authorId": "70988914", "name": "C. Varea"}, {"authorId": "145092079", "name": "J. Arag\u00f3n"}, {"authorId": "37747895", "name": "R. Barrio"}]}, - {"paperId": "b0847bbdca60a2483f1875a429e07df809c01695", "externalIds": {"MAG": - "1585701772", "DBLP": "conf/colt/McAllesterS00", "CorpusId": 7928401}, "url": - "https://www.semanticscholar.org/paper/b0847bbdca60a2483f1875a429e07df809c01695", - "title": "On the Convergence Rate of Good-Turing Estimators", "abstract": - "Good-Turing adjustments of word frequencies are an important tool in natural - language modeling. In particular, for any sample of words, there is a set - of words not occuring in that sample. The total probability mass of the words - not in the sample is the so-called missing mass. Good showed that the fraction - of the sample consisting of words that occur only once in the sample is a - nearly unbiased estimate of the missing mass. Here, we give a high-probability - confidence interval for the actual missing mass. More generally, for 0, we - give a confidence interval for the true probability mass of the set of words - occuring times in the sample.", "venue": "Annual Conference Computational - Learning Theory", "year": 2000, "referenceCount": 8, "citationCount": 134, - "influentialCitationCount": 17, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2000-06-28", "journal": {"pages": "1-6"}, - "authors": [{"authorId": "145689002", "name": "David A. McAllester"}, {"authorId": - "1716301", "name": "R. Schapire"}]}, {"paperId": "3e6fe52651a9c1ca2bb932e1d8387dd0278737c8", - "externalIds": {"DBLP": "journals/ijdar/BairdCF03", "MAG": "2129824148", "DOI": - "10.1007/s10032-002-0089-1", "CorpusId": 5223340}, "url": "https://www.semanticscholar.org/paper/3e6fe52651a9c1ca2bb932e1d8387dd0278737c8", - "title": "PessimalPrint: a reverse Turing test", "abstract": null, "venue": - "International Journal on Document Analysis and Recognition", "year": 2001, - "referenceCount": 22, "citationCount": 95, "influentialCitationCount": 2, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-09-10", "journal": {"name": "International Journal - on Document Analysis and Recognition", "pages": "158-163", "volume": "5"}, - "authors": [{"authorId": "1723766", "name": "H. Baird"}, {"authorId": "40458942", - "name": "Allison L. Coates"}, {"authorId": "1807480", "name": "R. Fateman"}]}, {"paperId": "1acef31c0a07f5d11d9de475c5eb26ebe2032df1", "externalIds": {"MAG": "2036423516", "DOI": "10.1103/PHYSREVLETT.92.198303", "CorpusId": 6675237, - "PubMed": "15169455"}, "url": "https://www.semanticscholar.org/paper/1acef31c0a07f5d11d9de475c5eb26ebe2032df1", + "PubMed": "15169455"}, "corpusId": 6675237, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/1acef31c0a07f5d11d9de475c5eb26ebe2032df1", "title": "Stable squares and other oscillatory turing patterns in a reaction-diffusion model.", "abstract": "We study the Brusselator reaction-diffusion model under conditions where the Hopf mode is supercritical and the Turing band is subcritical. @@ -6722,17 +7525,33 @@ interactions: Hopf modes are subcritical in the autonomous system. Most of the symmetric patterns show period doubling in both space and time. Patterns observed include squares, rhombi, stripes, and hexagons.", "venue": "Physical Review Letters", - "year": 2004, "referenceCount": 12, "citationCount": 90, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2004-05-13", "journal": {"name": "Physical - review letters", "pages": "\n 198303\n ", "volume": "92 19"}, - "authors": [{"authorId": "2586119", "name": "L. Yang"}, {"authorId": "3012371", - "name": "A. Zhabotinsky"}, {"authorId": "144854275", "name": "I. Epstein"}]}, - {"paperId": "5f7ad1d9c17c01e3321b44ad996ff3fcd3ddbea3", "externalIds": {"DBLP": - "conf/extreme/Kepser04", "MAG": "166194785", "CorpusId": 31902936}, "url": - "https://www.semanticscholar.org/paper/5f7ad1d9c17c01e3321b44ad996ff3fcd3ddbea3", + "year": 2004, "referenceCount": 12, "citationCount": 91, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-05-13", "journal": {"name": "Physical review letters", "pages": "\n 198303\n ", + "volume": "92 19"}, "authors": [{"authorId": "2586119", "name": "L. Yang"}, + {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", + "name": "I. Epstein"}]}, {"paperId": "3793f8da0dc67fe02d447c017c168ebb7212f761", + "externalIds": {"MAG": "1505364149", "DOI": "10.1007/978-3-642-56478-9_59", + "CorpusId": 15927690}, "corpusId": 15927690, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3793f8da0dc67fe02d447c017c168ebb7212f761", + "title": "The Turing machine paradigm in contemporary computing", "abstract": + null, "venue": "", "year": 2001, "referenceCount": 79, "citationCount": 118, + "influentialCitationCount": 10, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dspace.library.uu.nl/bitstream/1874/1972/1/2000-33.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-02-19", + "journal": {"name": "", "pages": "1139-1155", "volume": ""}, "authors": [{"authorId": + "143817739", "name": "J. V. Leeuwen"}, {"authorId": "1815433", "name": "J. + Wiedermann"}]}, {"paperId": "5f7ad1d9c17c01e3321b44ad996ff3fcd3ddbea3", "externalIds": + {"DBLP": "conf/extreme/Kepser04", "MAG": "166194785", "CorpusId": 31902936}, + "corpusId": 31902936, "publicationVenue": {"id": "213eff65-f865-4982-8723-2d52f4bc7ca9", + "name": "Extreme Markup Languages\u00ae", "type": "conference", "alternate_names": + ["Extreme Markup Lang"], "url": "http://www.extrememarkup.com/extreme/"}, + "url": "https://www.semanticscholar.org/paper/5f7ad1d9c17c01e3321b44ad996ff3fcd3ddbea3", "title": "A Simple Proof for the Turing-Completeness of XSLT and XQuery", "abstract": "The World Wide Web Consortium recommends both XSLT and XQuery as query languages for XML documents. XSLT, originally designed to transform @@ -6743,106 +7562,351 @@ interactions: by coding -recursive functions thereby showing that Turing-completeness is a consequence of a few basic and fundamental features of both languages.", "venue": "Extreme Markup Languages\u00ae", "year": 2004, "referenceCount": - 17, "citationCount": 90, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2804646", - "name": "Stephan Kepser"}]}, {"paperId": "b4132e951fc5f5e16f4c01a9cd5cc3545d817c28", - "externalIds": {"MAG": "1990903593", "DOI": "10.1103/PHYSREVLETT.78.1190", - "CorpusId": 14374263}, "url": "https://www.semanticscholar.org/paper/b4132e951fc5f5e16f4c01a9cd5cc3545d817c28", - "title": "CHEMICAL KINETICS IS TURING UNIVERSAL", "abstract": "Interest in - chemical computation has followed four different paths. It is one of the natural - extensions of discussions about information and thermodynamics, which go back - to Maxwell demon arguments and Szilard\u2019s work [1\u20135]. It is also - a rather natural extension to the application of dynamical systems theory - to chemical reactions [6\u20138], in particular logic networks stemming from - bistable reaction systems [9]. A lot of effort has been devoted to trying - to devise nonstandard computational architectures, and chemical implementations - provide a distinct enough backdrop to silicon [10\u201312]. Finally, in recent - years biology has presented us with what looks to be actual chemical computers: - the enzymatic cascades of cell signaling [13\u201315]. One of the first questions - that can be asked in this subject is whether universal (Turing) computation - can be achieved within some theoretical model of chemistry; the most immediate - one is standard chemical kinetics. This question has been recently studied - in some detail [16\u201322], and even subject to experimental tests [23]. - In [18\u201320], Hjelmfelt et al. argued quite convincingly that building - blocks for universal computation indeed can be constructed within ideal chemical - kinetics, and that they could be interconnected to achieve computation. However, - many difficulties still lie in the way. An issue not addressed by Hjelmfelt - et al. is structural stability: the tolerance of a system to changes in parameters - and functional structure. In particular, \u201cgluing\u201d together two groups - of chemical reactions will have appreciable effects on the kinetics of both - groups; the basic unit and the couplings used in [18\u201320] require case-by-case - adjustment of individual parameters for proper functioning. The purpose of - this Letter is to provide a slightly more formal proof that chemical kinetics - can be used to construct universal computers. I will concentrate on the \u201cnext\u201d - level of difficulty, which is that of the global behavior of a fully coupled - system and its structural stability. I will do it through the simplest approach: - I will show that classical digital electronics can be implemented through - chemical reactions. Since my key problem in this scheme is showing global - consistency, and the proof requires arbitrarily large circuits, I will have - to show that the output of one gate can be plugged into the input of", "venue": - "", "year": 1997, "referenceCount": 39, "citationCount": 144, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-02-10", - "journal": {"name": "Physical Review Letters", "pages": "1190-1193", "volume": - "78"}, "authors": [{"authorId": "2239538", "name": "M. Magnasco"}]}, {"paperId": - "ae839811640200fb6b5a8adc85b26b1c7be8d4bf", "externalIds": {"MAG": "1591095982", - "CorpusId": 60604558}, "url": "https://www.semanticscholar.org/paper/ae839811640200fb6b5a8adc85b26b1c7be8d4bf", - "title": "Good-Turing Smoothing Without Tears", "abstract": "The performance - of statistically based techniques for many tasks such as spelling correction, - sense disambiguation, and translation is improved if one can estimate a probability - for an object of interest which has not been seen before. Good-Turing methods - are one means of estimating these probabilities for previously unseen objects. - However, the use of Good-Turing methods requires a smoothing step which must - smooth in regions of vastly different accuracy. Such smoothers are difficult - to use, and may have hindered the use of Good-Turing methods in computational - linguistics.", "venue": "", "year": 2001, "referenceCount": 3, "citationCount": - 111, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": + 17, "citationCount": 90, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "2804646", "name": "Stephan Kepser"}]}, {"paperId": "5e5073fa1b723b8861050f2dba5f38e19574740e", + "externalIds": {"DBLP": "journals/corr/Shieber94", "ArXiv": "cmp-lg/9404002", + "MAG": "2003453784", "DOI": "10.1145/175208.175217", "CorpusId": 215823854}, + "corpusId": 215823854, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5e5073fa1b723b8861050f2dba5f38e19574740e", + "title": "Lessons from a restricted Turing test", "abstract": "We report on + the recent Loebner prize competition inspired by Turing''s test of intelligent + behavior. The presentation covers the structure of the competition and the + outcome of its first instantiation in an actual event, and an analysis of + the purpose, design, and appropriateness of such a competition. We argue that + the competition has no clear purpose, that its design prevents any useful + outcome, and that such a competition is inappropriate given the current level + of technology. We then speculate as to suitable alternatives to the Loebner + prize. This report appeared in Communications of the Association for Computing + Machinery, volume 37, number 6, pages 70-78, 1994. Also available as cmp-lg/9404002 + and from the Center for Research in Computing Technology, Harvard University, + as Technical Report TR-19-92. The Turing Test and the Loebner Prize The English + logician and mathematician Alan Turing, in an attempt to develop a working + definition of intelligence free of the difficulties and philosophical pitfalls + of defining exactly what constitutes the mental process of intelligent reasoning, + devised a test, instead, of intelligent behavior. The idea, codified in his + celebrated 1950 paper ``Computing Machinery and Intelligence'''' [28], was + specified as an ``imitation game'''' in which a judge attempts to distinguish + which of two agents is a human and which a computer imitating human responses + by engaging each in a wide-ranging conversation of any topic and tenor. Turing''s + reasoning was that, presuming that intelligence was only practically determinable + behaviorally, then any agent that was indistinguishable in behavior from an + intelligent agent was, for all intents and purposes, intelligent. It is presumably + uncontroversial that humans are intelligent as evidenced by their conversational + behavior. Thus, any agent that can be mistaken by virtue of its conversational + behavior with a human must be intelligent. As Turing himself noted, this syllogism + argues that the criterion provides a sufficient, but not necessary, condition + for intelligent behavior. The game has since become known as the ``Turing + test'''', a term that has eclipsed even his eponymous machine in Turing''s + terminological legacy. Turing predicted that by the year 2000, computers would + be able to pass the Turing test at a reasonably sophisticated level, in particular, + that the average interrogator would not be able to identify the computer correctly + more than 70 per cent of the time after a five minute conversation. On November + 8, 1991, an eclectic group including academics, business people, press, and + passers-by filled two floors of Boston''s Computer Museum for a tournament + billed as the first actual administration of the Turing test. The tournament + was the first attempt on the recently constituted Loebner Prize established + by New York theater equipment manufacturer Dr. Hugh Loebner and organized + by Dr. Robert Epstein, President Emeritus of the Cambridge Center for Behavioral + Studies, a research center specializing in behaviorist psychology. The Loebner + Prize is administered by an 1 of 14 03/03/99 17:24 Lessons from a Restricted + Turing Test http://www.eecs.harvard.edu/shieber/papers/loebner-rev-html/loebner-rev-html.html", + "venue": "CACM", "year": 1994, "referenceCount": 32, "citationCount": 150, + "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": {"url": + "https://dl.acm.org/doi/pdf/10.1145/175208.175217", "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "34938639", "name": "W. Gale"}]}, - {"paperId": "2e5d18b07eb5398baabc369cc96aeb47a8f11822", "externalIds": {"DOI": - "10.1142/9789812815675_0006", "CorpusId": 7319146}, "url": "https://www.semanticscholar.org/paper/2e5d18b07eb5398baabc369cc96aeb47a8f11822", - "title": "Turing Machines", "abstract": "In 1 900 David Hilbert, the preeminent - mathematician of his time, chal\u00ad lenged the world of mathematics with - a list of unsolved problems, pre\u00ad sented in Paris before the International - Congress of M athematicians. The 2 3 r d problem on the list w a s to d iscover - a method for establishing the truth or fal\u00ad sity of any statement in - a language of formal logic called the predicate calcu\u00ad lus. Thirty-six - years were to pass before the problem was settled, and its resolu\u00ad tion - marked an extraord inary and un\u00ad expected turn in mathematics. At the - University of Cambridge a young fel\u00ad low of mathematics in King''s College - named Alan M athison Turing had be\u00ad come familiar with Hilbert''s 2 3 - r d prob\u00ad lem through a series of lectures given by M. H. A. Newman. - Turing pondered the problem d uring long afternoon r uns in the English countryside, - and it was after one of these r uns that the answer came to him. Hilbert''s - problem was im\u00ad possible to solve. The publication in which T uring an\u00ad - nounced his result has had a significance far beyond the immediate problem - it ad\u00ad dressed. In attacking Hilbert''s problem, Turing was forced to - ask how the con\u00ad cept of method might be given a precise definition. - Beginning with the intuitive idea that a method is an algorithm-a proced ure - that can be mechanically car\u00ad ried out witho ut creative intervention\u00ad - he showed how the idea can b\ufffd refined into a detailed model of the process - of computation in which any algorithm is broken down into a sequence of sim\u00ad - ple, atomic steps. The resulting model of computation is the logical construct - called a Turing machine. The simplest way to describe the Tu\u00ad ring machine - is in terms of mechanical parts such as wheels, punched tape and a scanner - that can move back and forth over the tape. The machinery is not es\u00ad - sential-at the most fundamental level Turing''s device is the embodiment of - a method of mathematical reasoning\u00ad but it would be misleading to dispense - entirely with the mechanical metaphor. That metaphor was suggestive to Turing", - "venue": "", "year": 2002, "referenceCount": 167, "citationCount": 69, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2599162", "name": "E. Zalta"}, - {"authorId": "2687250", "name": "U. Nodelman"}, {"authorId": "30308222", "name": - "C. Allen"}, {"authorId": "48525894", "name": "Jack Perry"}]}, {"paperId": - "e9f5e91a3e0db775118575788d1c517ab2bc3492", "externalIds": {"MAG": "2162720870", - "DOI": "10.1080/00949650008812016", "CorpusId": 122004436}, "url": "https://www.semanticscholar.org/paper/e9f5e91a3e0db775118575788d1c517ab2bc3492", + "publicationTypes": ["JournalArticle"], "publicationDate": "1994-04-03", "journal": + {"name": "Commun. ACM", "pages": "70-78", "volume": "37"}, "authors": [{"authorId": + "1692491", "name": "S. Shieber"}]}, {"paperId": "19e382bb1a947a6537632bd7442685ce0bf81469", + "externalIds": {"DBLP": "books/sp/02/Rendell02", "MAG": "2160653514", "DOI": + "10.1007/978-1-4471-0129-1_18", "CorpusId": 122804909}, "corpusId": 122804909, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19e382bb1a947a6537632bd7442685ce0bf81469", + "title": "Turing Universality of the Game of Life", "abstract": null, "venue": + "Collision-Based Computing", "year": 2002, "referenceCount": 18, "citationCount": + 146, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"pages": "513-539"}, + "authors": [{"authorId": "11060403", "name": "Paul W. Rendell"}]}, {"paperId": + "a0e594acd98494aa596c506b6cd2d584c6a01798", "externalIds": {"MAG": "2299867375", + "DOI": "10.1086/psaprocbienmeetp.1994.1.193018", "CorpusId": 7284589}, "corpusId": + 7284589, "publicationVenue": {"id": "ab9bd373-63c8-475b-a85d-50574b345c4c", + "name": "PSA Proceedings of the Biennial Meeting of the Philosophy of Science + Association", "alternate_names": ["PSA Proc Bienn Meet Philos Sci Assoc"], + "issn": "0270-8647", "url": "https://www.jstor.org/journal/psaprocbienmeetp", + "alternate_urls": ["http://www.jstor.org/journals/02708647.html"]}, "url": + "https://www.semanticscholar.org/paper/a0e594acd98494aa596c506b6cd2d584c6a01798", + "title": "Non-Turing Computers and Non-Turing Computability", "abstract": + "A true Turing machine (TM) requires an infinitely long paper tape. Thus a + TM can be housed in the infinite world of Newtonian spacetime (the spacetime + of common sense), but not necessarily in our world, because our world-at least + according to our best spacetime theory, general relativity-may be finite. + All the same, one can argue for the \"existence\" of a TM on the basis that + there is no such housing problem in some other relativistic worlds that are + similar (\"close\") to our world. But curiously enough-and this is the main + point of this paper-some of these close worlds have a special spacetime structure + that allows TMs to perform certain Turing unsolvable tasks. For example, in + one kind of spacetime a TM can be used to solve first-order predicate logic + and the halting problem. And in a more complicated spacetime, TMs can be used + to decide arithmetic. These new computers serve to show that Church''s thesis + is a thoroughly contingent claim. Moreover, since these new computers share + the fundamental properties of a TM in ordinary operation (e.g. intuitive, + finitely programmed, limited in computational capability), a computability + theory based on these non-Turing computers is no less worthy of investigation + than orthodox computability theory. Some ideas about this new mathematical + theory are given.", "venue": "PSA Proceedings of the Biennial Meeting of the + Philosophy of Science Association", "year": 1994, "referenceCount": 9, "citationCount": + 140, "influentialCitationCount": 13, "isOpenAccess": true, "openAccessPdf": + {"url": "http://hypercomputation.net/download/1994a_hogarth.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-01-01", + "journal": {"name": "PSA: Proceedings of the Biennial Meeting of the Philosophy + of Science Association", "pages": "126 - 138", "volume": "1994"}, "authors": + [{"authorId": "37952418", "name": "M. Hogarth"}]}, {"paperId": "ad3c04be895133b4e714b2291b756aa101b04e9a", + "externalIds": {"MAG": "2043838333", "DOI": "10.1063/1.1507110", "CorpusId": + 17476174}, "corpusId": 17476174, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad3c04be895133b4e714b2291b756aa101b04e9a", + "title": "Pattern formation arising from interactions between Turing and wave + instabilities", "abstract": "We study pattern formation arising from the interaction + of the stationary Turing and wave (oscillatory Turing) instabilities. Interaction + and competition between these symmetry-breaking modes lead to the emergence + of a large variety of spatiotemporal patterns, including modulated Turing + structures, modulated standing waves, and combinations of Turing structures + and spiral waves. Spatial resonances are obtained near codimension-two Turing-wave + bifurcations. Far from bifurcation lines, we obtain inwardly propagating spiral + waves with Turing spots at their tips. We demonstrate that the coexistence + of Turing spots and traveling waves is a result of interaction between Turing + and oscillatory modes, while the inwardly propagating waves (antispirals) + do not require this interaction; they can arise from the wave instability + combined with a negative group velocity.", "venue": "", "year": 2002, "referenceCount": + 47, "citationCount": 126, "influentialCitationCount": 8, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-09-30", + "journal": {"name": "Journal of Chemical Physics", "pages": "7259-7265", "volume": + "117"}, "authors": [{"authorId": "2586119", "name": "L. Yang"}, {"authorId": + "4978913", "name": "M. Dolnik"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, + {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "ceae60c2718b05ac7f8a6d369003b55af424e0a0", + "externalIds": {"MAG": "1580681732", "CorpusId": 14442641}, "corpusId": 14442641, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ceae60c2718b05ac7f8a6d369003b55af424e0a0", + "title": "VERI CATION OF A HUMAN IN THE LOOP OR IDENTI CATION VIA THE TURING + TEST", "abstract": "We propose using a \\Turing Test\" in order to verify + that a human is the one making a query to a service over the web. Thus, before + a request is processed the user should answer as a challenge an instance of + a problem chosen so that it is easy for humans to solve but the best known + programs fail on a non-negligible fraction of the instances. We discuss several + scenarios where such tests are desired and several potential sources for problems + instances. We also dicuss the application of this idea for combatting junk + mail.", "venue": "", "year": 1996, "referenceCount": 10, "citationCount": + 147, "influentialCitationCount": 16, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "1693267", "name": "M. Naor"}]}, + {"paperId": "7341f4d05904406e0efa5d376ffa96c0ace47ccd", "externalIds": {"MAG": + "1839356836", "DBLP": "conf/dimacs/Rothemund95", "DOI": "10.1090/dimacs/027/06", + "CorpusId": 12149420}, "corpusId": 12149420, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7341f4d05904406e0efa5d376ffa96c0ace47ccd", + "title": "A DNA and restriction enzyme implementation of Turing machines", + "abstract": "Bacteria employ restriction enzymes to cut or restrict DNA \nat + or near specific words in a unique way. Many restriction \nenzymes cut the + two strands of double-stranded DNA at \ndifferent positions leaving overhangs + of single-stranded DNA. Two pieces of DNA may be rejoined or ligated if their + \nterminal overhangs are complementary. Using these operations \nfragments + of DNA, or oligonucleotides, may be inserted and \ndeleted from a circular + piece of plasmid DNA. We propose \nan encoding for the transition table of + a Turing machine in \nDNA oligonucleotides and a corresponding series of restrictions + and ligations of those oligonucleotides that, when performed on circular DNA + encoding an instantaneous description of a Turing machine, simulate the operation + of the Turing machine encoded in those oligonucleotides. DNA based Turing + machines have been proposed by Charles Bennett but they invoke imaginary enzymes + to perform the state-symbol transitions. Our approach differs in that every + operation can be performed using commercially available restriction enzymes + and ligases.", "venue": "DNA Based Computers", "year": 1995, "referenceCount": + 36, "citationCount": 173, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "https://authors.library.caltech.edu/27384/2/DNA_Restriction.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Biology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "75-119"}, "authors": [{"authorId": "145477156", "name": "P. Rothemund"}]}, + {"paperId": "a1b7a47368b885f1f52d7bba5eadcf422d739941", "externalIds": {"MAG": + "2418826542", "DOI": "10.1103/PHYSREVE.55.6690", "CorpusId": 122798545}, "corpusId": + 122798545, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1b7a47368b885f1f52d7bba5eadcf422d739941", + "title": "Generic spatiotemporal dynamics near codimension-two Turing-Hopf + bifurcations", "abstract": "The coupling of spatial and temporal symmetry + breaking instabilities is studied in a two-variable reaction-diffusion model + describing semiconductor transport. A variety of spatiotemporal patterns corresponding + to pure Hopf and Turing modes, localized patterns, and mixed Turing-Hopf modes + including subharmonic spatiotemporal spiking are found. By organizing the + results in a time-scale versus space-scale diagram, and by comparing them + with a chemical reaction-diffusion model, it is shown that such behavior is + generic for a class of extended nonlinear dynamic systems near codimension-two + Turing-Hopf bifurcations.", "venue": "", "year": 1997, "referenceCount": 5, + "citationCount": 83, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-06-01", + "journal": {"name": "Physical Review E", "pages": "6690-6697", "volume": "55"}, + "authors": [{"authorId": "145780580", "name": "M. Meixner"}, {"authorId": + "7418281", "name": "A. Wit"}, {"authorId": "2061627162", "name": "S. Bose"}, + {"authorId": "2167329", "name": "E. Sch\u00f6ll"}]}, {"paperId": "6c59c9ca3e3ea13cc3ec6921833c3334f02653cd", + "externalIds": {"MAG": "2054678443", "DBLP": "journals/qip/CaludeP02", "ArXiv": + "quant-ph/0112087", "DOI": "10.1023/A:1019623616675", "CorpusId": 13018379}, + "corpusId": 13018379, "publicationVenue": {"id": "f509d2f6-f64c-4a9d-a468-4d226978713f", + "name": "Quantum Information Processing", "type": "journal", "alternate_names": + ["Quantum Inf Process"], "issn": "1570-0755", "url": "https://link.springer.com/journal/11128"}, + "url": "https://www.semanticscholar.org/paper/6c59c9ca3e3ea13cc3ec6921833c3334f02653cd", + "title": "Coins, Quantum Measurements, and Turing''s Barrier", "abstract": + null, "venue": "Quantum Information Processing", "year": 2001, "referenceCount": + 64, "citationCount": 86, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-12-15", "journal": + {"name": "Quantum Information Processing", "pages": "107-127", "volume": "1"}, + "authors": [{"authorId": "1685717", "name": "Cristian S. Calude"}, {"authorId": + "35003302", "name": "B. Pavlov"}]}, {"paperId": "1befd2ddc9cf384d56f280da7e905b1d695cde4b", + "externalIds": {"MAG": "2018285346", "DOI": "10.1145/141420.141422", "CorpusId": + 36356326}, "corpusId": 36356326, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1befd2ddc9cf384d56f280da7e905b1d695cde4b", + "title": "The Turing Test is not a trick: Turing indistinguishability is a + scientific criterion", "abstract": "It is important to understand that the + Turing Test (TT) is not, nor was it intended to be, a trick; how well one + can fool someone is not a measure of scientific progress. The TT is an empirical + criterion: It sets AI''s empirical goal to be to generate human scale performance + capacity. This goal will be met when the candidate''s performance is totally + indistinguishable from a human''s. Until then, the TT simply represents what + it is that AI must endeavor eventually to accomplish scientifically.", "venue": + "SGAR", "year": 1992, "referenceCount": 11, "citationCount": 102, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1992-10-01", "journal": {"name": + "Intelligence\\/sigart Bulletin", "pages": "9-10", "volume": "3"}, "authors": + [{"authorId": "2293327", "name": "S. Harnad"}]}, {"paperId": "442245bcdb192400e04a076cd4108ee34323eeec", + "externalIds": {"MAG": "2167588735", "DOI": "10.2307/3104379", "CorpusId": + 61169804}, "corpusId": 61169804, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/442245bcdb192400e04a076cd4108ee34323eeec", + "title": "Turing''s Man: Western Culture in the Computer Age", "abstract": + "Part 1 Introduction: the measure of technological change the computer as + a defining technology Turing''s man. Part 2 Defining technologies in western + culture: manual technology and the ancient world mechanical technology and + western Europe dynamic technology and western Europe electronic technology + from the clock to the computer the electronic brain. Part 3 Principles of + operation: the Turing machine - states and symbols the von Neumann computer + hardware and software. Part 4 Embodied symbol - mathematics by computer: binary + representation and numerical analysis mathematics and culture embodied mathematics. + Part 5 Embodied symbol - logic by computer: truth and the von Neumann machine + the triumph of logic the embodiment of logical thought. Part 6 Electronic + space: physical space logical space finite space infinite space the geometry + of electronic space. Part 7 Time and progress in the computer age: electronic + clocks time experienced and measured progress in circles the idea of progress. + Part 8 Electronic language: natural and artificial language the hierarchy + of computer language poetry and logic the ancient view the western European + view silent structures. Part 9 Electronic memory: digital memory technology + the art of memory information retrieval and electronic power. Part 10 Creator + and creation: coherence and correspondence electronic limits creating by hand + and by machine reason and necessity electronic play. Part 11 Artificial intelligence: + Turing''s game language, memory, and other games the technology of making + man the electronic image of man artifact and artificer. Part 12 Conclusion: + natural man from Socrates to Faust to Turing living with Turing''s man invention + and discovery the computer as a tool synthetic intelligence.", "venue": "", + "year": 1985, "referenceCount": 0, "citationCount": 175, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1985-04-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "66493855", "name": "David J. Bolter"}]}, {"paperId": "be8c4df9ad0182e974407e3e3e5014e5aace661c", + "externalIds": {"MAG": "2039248591", "DBLP": "journals/synthese/CopelandP96", + "DOI": "10.1007/BF00413694", "CorpusId": 44179645}, "corpusId": 44179645, + "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": + "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", + "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, + "url": "https://www.semanticscholar.org/paper/be8c4df9ad0182e974407e3e3e5014e5aace661c", + "title": "On Alan Turing''s anticipation of connectionism", "abstract": null, + "venue": "Synthese", "year": 1996, "referenceCount": 56, "citationCount": + 63, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1996-09-01", "journal": {"name": "Synthese", "pages": "361-377", "volume": + "108"}, "authors": [{"authorId": "144246233", "name": "B. Copeland"}, {"authorId": + "144239027", "name": "D. Proudfoot"}]}, {"paperId": "896c112f03986e6ee597d3caa67e25a31503300e", + "externalIds": {"MAG": "2210317531", "DOI": "10.1109/9780470544242.CH53", + "CorpusId": 62293869}, "corpusId": 62293869, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/896c112f03986e6ee597d3caa67e25a31503300e", + "title": "A Universal Turing Machine with Two Internal States", "abstract": + "This chapter contains sections titled: Introduction The two-State Universal + Turing Machine Impossibility of a One-State Universal Turing Machine Modeling + a Turing Machine with Only Two Tape Symbols", "venue": "", "year": 1993, "referenceCount": + 0, "citationCount": 89, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "733-741", "volume": ""}, "authors": [{"authorId": + "143992833", "name": "N. Sloane"}, {"authorId": "1734614", "name": "A. Wyner"}]}, + {"paperId": "5702846f73273a9bd339547583eb3df352e573bb", "externalIds": {"MAG": + "1603940370", "DBLP": "conf/icga/NordinB95a", "CorpusId": 16122959}, "corpusId": + 16122959, "publicationVenue": {"id": "34fcc5a6-2504-4caa-be37-c8a9911df57c", + "name": "International Conference on Genetic Algorithms", "type": "conference", + "alternate_names": ["Int Conf Genet Algorithm", "international conference + on Genetic algorithms", "ICGA", "int conf Genet algorithm"]}, "url": "https://www.semanticscholar.org/paper/5702846f73273a9bd339547583eb3df352e573bb", + "title": "Evolving Turing-Complete Programs for a Register Machine with Self-modifying + Code", "abstract": "The majority of commercial computers today are register + machines of von Neumann type. We have developed a method to evolve Turing-complete + programs for a register machine. The described implementation enables the + use of most program constructs, such as arithmetic operators, large indexed + memory, automatic decomposition into subfunctions and subroutines (ADFs), + conditional constructs i.e. if-then-else, jumps, loop structures , recursion, + protected functions, string and list functions. Any C-function can be compiled + and linked into the function set of the system. The use of register machine + language allows us to work at the lowest level of binary machine code without + any interpreting steps. In a von Neumann machine , programs and data reside + in the same memory and the genetic operators can thus directly manipulate + the binary machine code in memory. The genetic operators themselves are written + in C-language but they modify individuals in binary representation. The result + is an execution speed enhancement of up to 100 times compared to an interpreting + C-language implementation, and up to 2000 times compared to a LISP implementation. + The use of binary machine code demands a very compact coding of about one + byte per node in the individual. The resulting evolved programs are disassembled + into C-modules and can be incorporated into a conventional software development + environment. The low memory requirements and the signiicant speed enhancement + of this technique could be of use when applying genetic programming to new + application areas, platforms and research domains.", "venue": "International + Conference on Genetic Algorithms", "year": 1995, "referenceCount": 5, "citationCount": + 119, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1995-07-15", "journal": {"pages": "318-327"}, "authors": [{"authorId": "1835888", + "name": "P. Nordin"}, {"authorId": "2507766", "name": "W. Banzhaf"}]}, {"paperId": + "a7344323d5ae0c027b0552abe7b93a0acd31277d", "externalIds": {"MAG": "2164169526", + "DOI": "10.1207/S15326969ECO1403_3", "CorpusId": 61452099}, "corpusId": 61452099, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7344323d5ae0c027b0552abe7b93a0acd31277d", + "title": "Gibson''s Affordances and Turing''s Theory of Computation", "abstract": + "The concept of affordance is a central component of the ecological psychology + of J. J. Gibson (1966, 1977, 1979/1986). Affordances are properties of the + environment taken relative to an observer. Ecological theorists have developed + formal models for the analysis of affordances. Models proposed by Shaw and + Turvey (1981), Turvey (1992), and Greeno (1994) are described and evaluated, + and another approach, using Turing''s (1936-1937/1965) theory of computation, + is outlined. Affordances are characterized as the configurations of Turing + machines. It is shown that Turing''s work provides a natural vehicle for exploring + Gibson''s ideas.", "venue": "", "year": 2002, "referenceCount": 38, "citationCount": + 76, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "http://eprints.lse.ac.uk/2606/1/Affordances_and_Computation_APA_style_%28LSERO%29.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-07-01", "journal": {"name": + "Ecological Psychology", "pages": "140 - 180", "volume": "14"}, "authors": + [{"authorId": "48060981", "name": "A. Wells"}]}, {"paperId": "e9f5e91a3e0db775118575788d1c517ab2bc3492", + "externalIds": {"MAG": "2162720870", "DOI": "10.1080/00949650008812016", "CorpusId": + 122004436}, "corpusId": 122004436, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e9f5e91a3e0db775118575788d1c517ab2bc3492", "title": "Turing\u2019s anticipation of empirical bayes in connection with the cryptanalysis of the naval enigma", "abstract": "The Enigma was a cryptographic (enciphering) machine used by the German military during WWII. The German @@ -6862,14 +7926,47 @@ interactions: of Emdrical Baves in which a physical prior is assumed to eist but no apbroxiGate functional fonn is assumed for it.", "venue": "", "year": 2000, "referenceCount": 10, "citationCount": 71, "influentialCitationCount": 12, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-05-01", "journal": {"name": - "Journal of Statistical Computation and Simulation", "pages": "101 - 111", - "volume": "66"}, "authors": [{"authorId": "145179124", "name": "I. Good"}]}, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2000-05-01", + "journal": {"name": "Journal of Statistical Computation and Simulation", "pages": + "101 - 111", "volume": "66"}, "authors": [{"authorId": "145179124", "name": + "I. Good"}]}, {"paperId": "7306df441c399654c31cce482fb3ad6df48b38df", "externalIds": + {"MAG": "2068063761", "DBLP": "journals/cacm/HoltC88", "DOI": "10.1145/53580.53581", + "CorpusId": 40859457}, "corpusId": 40859457, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7306df441c399654c31cce482fb3ad6df48b38df", + "title": "The Turing programming language", "abstract": "Turing, a new general + purpose programming language, is designed to have Basic''s clean interactive + syntax, Pascal''s elegance, and C''s flexibility.", "venue": "CACM", "year": + 1988, "referenceCount": 36, "citationCount": 117, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1988-12-01", "journal": + {"name": "Commun. ACM", "pages": "1410-1423", "volume": "31"}, "authors": + [{"authorId": "144345125", "name": "R. Holt"}, {"authorId": "1683822", "name": + "J. Cordy"}]}, {"paperId": "7e86fd605e432c968f4b83648cda3e3aef38d12e", "externalIds": + {"MAG": "2051808374", "DOI": "10.1109/81.473568", "CorpusId": 122058288}, + "corpusId": 122058288, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e86fd605e432c968f4b83648cda3e3aef38d12e", + "title": "Turing patterns in CNNs. II. Equations and behaviors", "abstract": + "For part I, see ibid., vol. 42, no. 10, pp. 602-11 (Oct. 1995). The general + state equations describing two-grid coupled CNNs based on the reduced Chua''s + circuit are derived, and the analysis of Turing pattern formation is approached + from a specific point of view: spatial-eigenfunction based equation decoupling. + Discrete spatial eigenfunctions for two common types of boundary conditions + are presented, and the way the dynamics is influenced by the shape and position + of the dispersion curve is analyzed. >", "venue": "", "year": 1995, "referenceCount": + 5, "citationCount": 85, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1995-10-01", "journal": {"name": "IEEE Transactions on Circuits and Systems + I-regular Papers", "pages": "612-626", "volume": "42"}, "authors": [{"authorId": + "1876298", "name": "L. Goras"}, {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "a4b17db39c60977c9ee72402c01d7f870f431a4c", "externalIds": {"DBLP": "journals/eccc/ECCC-TR02-062", "MAG": "296017150", "DOI": "10.1145/602382.602411", - "CorpusId": 207698349}, "url": "https://www.semanticscholar.org/paper/a4b17db39c60977c9ee72402c01d7f870f431a4c", + "CorpusId": 207698349}, "corpusId": 207698349, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a4b17db39c60977c9ee72402c01d7f870f431a4c", "title": "Classical physics and the Church--Turing Thesis", "abstract": "Would physical laws permit the construction of computing machines that are capable of solving some problems much faster than the standard computational model? @@ -6881,45 +7978,121 @@ interactions: this incompatibility could both advance our knowledge of the theory of computation, as well as serve the needs of scientific computing.", "venue": "JACM", "year": 2003, "referenceCount": 15, "citationCount": 73, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cs.princeton.edu/courses/archive/fall06/cos576/papers/yao_acm03.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "Electron. Colloquium Comput. Complex.", "volume": "TR02"}, "authors": [{"authorId": "1770729", "name": "A. Yao"}]}, {"paperId": - "7e86fd605e432c968f4b83648cda3e3aef38d12e", "externalIds": {"MAG": "2051808374", - "DOI": "10.1109/81.473568", "CorpusId": 122058288}, "url": "https://www.semanticscholar.org/paper/7e86fd605e432c968f4b83648cda3e3aef38d12e", - "title": "Turing patterns in CNNs. II. Equations and behaviors", "abstract": - "For part I, see ibid., vol. 42, no. 10, pp. 602-11 (Oct. 1995). The general - state equations describing two-grid coupled CNNs based on the reduced Chua''s - circuit are derived, and the analysis of Turing pattern formation is approached - from a specific point of view: spatial-eigenfunction based equation decoupling. - Discrete spatial eigenfunctions for two common types of boundary conditions - are presented, and the way the dynamics is influenced by the shape and position - of the dispersion curve is analyzed. >", "venue": "", "year": 1995, "referenceCount": - 5, "citationCount": 85, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1995-10-01", "journal": {"name": - "IEEE Transactions on Circuits and Systems I-regular Papers", "pages": "612-626", - "volume": "42"}, "authors": [{"authorId": "1876298", "name": "L. Goras"}, - {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "20eab76a4045701a2b502a7ec609638e03ba53a3", - "externalIds": {"ArXiv": "nlin/0211001", "MAG": "2157563074", "DOI": "10.1006/jtbi.2002.3012", - "CorpusId": 13540813, "PubMed": "12183134"}, "url": "https://www.semanticscholar.org/paper/20eab76a4045701a2b502a7ec609638e03ba53a3", - "title": "Labyrinthine Turing pattern formation in the cerebral cortex.", - "abstract": "I propose that the labyrinthine patterns of the cortices of mammalian - brains may be formed by a Turing instability of interacting axonal guidance - species acting together with the mechanical strain imposed by the interconnecting - axons.", "venue": "Journal of Theoretical Biology", "year": 2002, "referenceCount": - 45, "citationCount": 67, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Physics", "Biology"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2002-07-07", "journal": {"name": "Journal of theoretical biology", "pages": - "\n 97-103\n ", "volume": "217 1"}, "authors": [{"authorId": - "2116296", "name": "J. Cartwright"}]}, {"paperId": "c65a431762dc8a2e25c833be4cd7c4b7e5ab16e5", - "externalIds": {"DBLP": "journals/tfs/WangQ03", "MAG": "2111568603", "DOI": - "10.1109/TFUZZ.2003.819841", "CorpusId": 206683332}, "url": "https://www.semanticscholar.org/paper/c65a431762dc8a2e25c833be4cd7c4b7e5ab16e5", + "799a2d30635ac76805aae841561f8a8026d7f74f", "externalIds": {"DBLP": "books/daglib/0007527", + "MAG": "659510237", "CorpusId": 60084081}, "corpusId": 60084081, "publicationVenue": + {"id": "b001aef8-ff25-4ada-adfb-dc103291ff5f", "name": "Discrete Mathematics + & Theoretical Computer Science", "type": "journal", "alternate_names": ["Discret + Math Theor Comput Sci"], "issn": "1365-8050", "url": "https://www.dmtcs.org/dmtcs-ojs/", + "alternate_urls": ["http://www.dmtcs.org/dmtcs-ojs/index.php/dmtcs"]}, "url": + "https://www.semanticscholar.org/paper/799a2d30635ac76805aae841561f8a8026d7f74f", + "title": "Turing''s connectionism - an investigation of neural network architectures", + "abstract": "Turing''s Connectionism provides a detailed and in-depth analysis + of Turing''s almost forgotten ideas on connectionist machines. In a little + known paper entitled \"Intelligent Machinery\", Turing already investigated + connectionist models as early as 1948. Unfortunately, his work was dismissed + by his employer as a \"schoolboy essay\" and went unpublished until 1968, + 14 years after his death. In this book, Christof Teuscher analyzes all aspects + of Turing''s \"unorganized machines\". Turing himself also proposed a sort + of genetic algorithm to train the networks. This idea has been resumed by + the author and genetic algorithms are used to build and train Turing''s unorganized + machines. Teuscher''s work starts from Turing''s initial ideas, but importantly + goes beyond them. Many new kinds of machines and new aspects are considered, + e.g., hardware implementation, analysis of the complex dynamics of the networks, + hypercomputation, and learning algorithms.", "venue": "Discrete Mathematics + & Theoretical Computer Science", "year": 2001, "referenceCount": 0, "citationCount": + 69, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-10-01", + "journal": {"pages": "I-XVII, 1-200"}, "authors": [{"authorId": "1759304", + "name": "C. Teuscher"}]}, {"paperId": "39e420b74c09d4120c0cf063e4a6abe92054b8d1", + "externalIds": {"MAG": "1684033657", "DOI": "10.1090/S0002-9939-98-04314-7", + "CorpusId": 17658501}, "corpusId": 17658501, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/39e420b74c09d4120c0cf063e4a6abe92054b8d1", + "title": "Enumerations, countable structures and Turing degrees", "abstract": + "It is proven that there is a family of sets of natural numbers which has + enumerations in every Turing degree except for the recursive degree. This + implies that there is a countable structure which has representations in all + but the recursive degree. Moreover, it is shown that there is such a structure + which has a recursively represented elementary extension.", "venue": "", "year": + 1998, "referenceCount": 9, "citationCount": 91, "influentialCitationCount": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/proc/1998-126-07/S0002-9939-98-04314-7/S0002-9939-98-04314-7.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "2131-2139", "volume": "126"}, "authors": + [{"authorId": "3344968", "name": "S. Wehner"}]}, {"paperId": "d20417a741121624642505a9174d6c6ffecf8127", + "externalIds": {"MAG": "2473956334", "DOI": "10.5840/JPHIL20009716", "CorpusId": + 171288711}, "corpusId": 171288711, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d20417a741121624642505a9174d6c6ffecf8127", + "title": "Narrow Versus Wide Mechanism: Including a Re-Examination of Turing\u2019s + Views on the Mind-Machine Issue", "abstract": "Designant par l''expression + de mecanisme historique la proposition selon laquelle l''esprit est une machine, + l''A. distingue, parmi les developpements de la these mecaniste au cours du + XX e siecle, un mecanisme etroit (narrow) affirmant que l''esprit est une + machine de Turing, d''une part, et un mecanisme etendu (wide) affirmant que + l''esprit est une machine, certes, mais une machine qui contient la possibilite + d''autres machines traitant des processus de l''information et qui ne se reduisent + pas a la machine universelle de Turing. L''A. montre que Turing et Church + eux-memes ne peuvent accepter la version etroite du mecanisme, refutee par + les developpements recents des modeles de calcul non-conventionnels tels que + l''hypothese dynamique dans la domaine des sciences cognitives", "venue": + "", "year": 2000, "referenceCount": 7, "citationCount": 82, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "The Journal of Philosophy", + "pages": "5-32", "volume": "97"}, "authors": [{"authorId": "144246233", "name": + "B. Copeland"}]}, {"paperId": "ba47de24709d420f40237974c70a3b36193f2e5e", + "externalIds": {"MAG": "1900357389", "DBLP": "conf/icec/Teller94", "DOI": + "10.1109/ICEC.1994.350027", "CorpusId": 18714045}, "corpusId": 18714045, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ba47de24709d420f40237974c70a3b36193f2e5e", + "title": "Turing completeness in the language of genetic programming with + indexed memory", "abstract": "Genetic programming is a method for evolving + functions that find approximate or exact solutions to problems. There are + many problems that traditional genetic programming (GP) cannot solve, due + to the theoretical limitations of its paradigm. A Turing machine (TM) is a + theoretical abstraction that expresses the extent of the computational power + of algorithms. Any system that is Turing complete is sufficiently powerful + to recognize all possible algorithms. GP is not Turing complete. This paper + proves that when GP is combined with the technique of indexed memory, the + resulting system is Turing complete. This means that, in theory, GP with indexed + memory can be used to evolve any algorithm.<>", "venue": "Proceedings + of the First IEEE Conference on Evolutionary Computation. IEEE World Congress + on Computational Intelligence", "year": 1994, "referenceCount": 4, "citationCount": + 91, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1994-06-27", "journal": {"name": "Proceedings of the First + IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational + Intelligence", "pages": "136-141 vol.1"}, "authors": [{"authorId": "2862181", + "name": "Astro Teller"}]}, {"paperId": "d0e3486aea0e970b32b207f8240d94a2a4c1f091", + "externalIds": {"MAG": "2058270991", "DOI": "10.1080/00048409912348801", "CorpusId": + 170597294}, "corpusId": 170597294, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0e3486aea0e970b32b207f8240d94a2a4c1f091", + "title": "Beyond the universal Turing machine", "abstract": "We describe an + emerging field, that of nonclassical computability and nonclassical computing + machinery. According to the nonclassicist, the set of well-defined computations + is not exhausted by the computations that can be carried out by a Turing machine. + We provide an overview of the field and a philosophical defence of its foundations", + "venue": "", "year": 1999, "referenceCount": 67, "citationCount": 96, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "1999-03-01", "journal": {"name": "Australasian Journal + of Philosophy", "pages": "46-66", "volume": "77"}, "authors": [{"authorId": + "144246233", "name": "B. Copeland"}, {"authorId": "2691328", "name": "R. Sylvan"}]}, + {"paperId": "c65a431762dc8a2e25c833be4cd7c4b7e5ab16e5", "externalIds": {"DBLP": + "journals/tfs/WangQ03", "MAG": "2111568603", "DOI": "10.1109/TFUZZ.2003.819841", + "CorpusId": 206683332}, "corpusId": 206683332, "publicationVenue": {"id": + "c6b969a5-d295-4c65-bbe8-a2dc52990db8", "name": "IEEE transactions on fuzzy + systems", "type": "journal", "alternate_names": ["IEEE trans fuzzy syst", + "IEEE Trans Fuzzy Syst", "IEEE Transactions on Fuzzy Systems"], "issn": "1063-6706", + "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=91"}, "url": "https://www.semanticscholar.org/paper/c65a431762dc8a2e25c833be4cd7c4b7e5ab16e5", "title": "Computing with words via Turing machines: a formal approach", "abstract": "Computing with words (CW) as a methodology, means computing and reasoning by the use of words in place of numbers or symbols, which may conform more @@ -6940,28 +8113,31 @@ interactions: formal aspect of CW is more systematically established more deeply dealt with while some new problems also emerge.", "venue": "IEEE transactions on fuzzy systems", "year": 2003, "referenceCount": 31, "citationCount": 64, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-12-01", "journal": {"name": "IEEE Trans. Fuzzy Syst.", "pages": "742-753", - "volume": "11"}, "authors": [{"authorId": "7644437", "name": "Huaiqing Wang"}, - {"authorId": "145924537", "name": "Daowen Qiu"}]}, {"paperId": "dfd734b2de2cbcce6ac07e909011b0ed6ba32b01", - "externalIds": {"MAG": "2033914241", "DBLP": "journals/annals/MorrisJ84", - "DOI": "10.1109/MAHC.1984.10017", "CorpusId": 11906342}, "url": "https://www.semanticscholar.org/paper/dfd734b2de2cbcce6ac07e909011b0ed6ba32b01", - "title": "An Early Program Proof by Alan Turing", "abstract": "The paper reproduces, - with typographical corrections and comments, a 1949 paper by Alan Turing that - foreshadows much subsequent work in program proving.", "venue": "Annals of - the History of Computing", "year": 1984, "referenceCount": 7, "citationCount": - 113, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1984-04-01", "journal": - {"name": "Annals of the History of Computing", "pages": "139-143", "volume": - "6"}, "authors": [{"authorId": "145965540", "name": "F. L. Morris"}, {"authorId": - "2109260410", "name": "Cliff B. Jones"}]}, {"paperId": "879b428b03abdb6cd2a3aa45e403e5be7a587f8a", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-12-01", "journal": {"name": "IEEE Trans. Fuzzy Syst.", + "pages": "742-753", "volume": "11"}, "authors": [{"authorId": "7644437", "name": + "Huaiqing Wang"}, {"authorId": "145924537", "name": "Daowen Qiu"}]}, {"paperId": + "c5287010313c8c6f4cb09919a50f241e494b90db", "externalIds": {"DBLP": "journals/mima/Copeland02", + "MAG": "1852397043", "DOI": "10.1023/A:1015607401307", "CorpusId": 29828453}, + "corpusId": 29828453, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/c5287010313c8c6f4cb09919a50f241e494b90db", + "title": "Accelerating Turing Machines", "abstract": null, "venue": "Minds + and Machines", "year": 2002, "referenceCount": 61, "citationCount": 85, "influentialCitationCount": + 10, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2002-05-01", "journal": {"name": "Minds + and Machines", "pages": "281-300", "volume": "12"}, "authors": [{"authorId": + "144246233", "name": "B. Copeland"}]}, {"paperId": "879b428b03abdb6cd2a3aa45e403e5be7a587f8a", "externalIds": {"ArXiv": "math/0209332", "DBLP": "journals/corr/math-LO-0209332", - "MAG": "1556623397", "CorpusId": 1825}, "url": "https://www.semanticscholar.org/paper/879b428b03abdb6cd2a3aa45e403e5be7a587f8a", + "MAG": "1556623397", "CorpusId": 1825}, "corpusId": 1825, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/879b428b03abdb6cd2a3aa45e403e5be7a587f8a", "title": "Hypercomputation: computing more than the Turing machine", "abstract": "Due to common misconceptions about the Church-Turing thesis, it has been widely assumed that the Turing machine provides an upper bound on what is @@ -6976,229 +8152,38 @@ interactions: of Godel''s Incompleteness Theorem and Chaitin''s discovery of ''randomness'' within arithmetic.", "venue": "ArXiv", "year": 2002, "referenceCount": 59, "citationCount": 82, "influentialCitationCount": 10, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2002-09-25", "journal": {"name": "ArXiv", "volume": - "math.LO/0209332"}, "authors": [{"authorId": "46277517", "name": "Toby Ord"}]}, - {"paperId": "a7344323d5ae0c027b0552abe7b93a0acd31277d", "externalIds": {"MAG": - "2164169526", "DOI": "10.1207/S15326969ECO1403_3", "CorpusId": 61452099}, - "url": "https://www.semanticscholar.org/paper/a7344323d5ae0c027b0552abe7b93a0acd31277d", - "title": "Gibson''s Affordances and Turing''s Theory of Computation", "abstract": - "The concept of affordance is a central component of the ecological psychology - of J. J. Gibson (1966, 1977, 1979/1986). Affordances are properties of the - environment taken relative to an observer. Ecological theorists have developed - formal models for the analysis of affordances. Models proposed by Shaw and - Turvey (1981), Turvey (1992), and Greeno (1994) are described and evaluated, - and another approach, using Turing''s (1936-1937/1965) theory of computation, - is outlined. Affordances are characterized as the configurations of Turing - machines. It is shown that Turing''s work provides a natural vehicle for exploring - Gibson''s ideas.", "venue": "", "year": 2002, "referenceCount": 38, "citationCount": - 75, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2002-07-01", "journal": {"name": "Ecological Psychology", - "pages": "140 - 180", "volume": "14"}, "authors": [{"authorId": "48060981", - "name": "A. Wells"}]}, {"paperId": "d8a29ced02e5d2cc1a6144e4bb915ae3671f3dd2", - "externalIds": {"MAG": "2089421660", "DOI": "10.1007/s10676-004-6491-2", "CorpusId": - 41059415}, "url": "https://www.semanticscholar.org/paper/d8a29ced02e5d2cc1a6144e4bb915ae3671f3dd2", - "title": "The Turing Triage Test", "abstract": null, "venue": "Ethics and - Information Technology", "year": 2004, "referenceCount": 49, "citationCount": - 59, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2004-12-01", "journal": {"name": "Ethics and Information - Technology", "pages": "203-213", "volume": "6"}, "authors": [{"authorId": - "52504962", "name": "R. Sparrow"}]}, {"paperId": "ba47de24709d420f40237974c70a3b36193f2e5e", - "externalIds": {"MAG": "1900357389", "DBLP": "conf/icec/Teller94", "DOI": - "10.1109/ICEC.1994.350027", "CorpusId": 18714045}, "url": "https://www.semanticscholar.org/paper/ba47de24709d420f40237974c70a3b36193f2e5e", - "title": "Turing completeness in the language of genetic programming with - indexed memory", "abstract": "Genetic programming is a method for evolving - functions that find approximate or exact solutions to problems. There are - many problems that traditional genetic programming (GP) cannot solve, due - to the theoretical limitations of its paradigm. A Turing machine (TM) is a - theoretical abstraction that expresses the extent of the computational power - of algorithms. Any system that is Turing complete is sufficiently powerful - to recognize all possible algorithms. GP is not Turing complete. This paper - proves that when GP is combined with the technique of indexed memory, the - resulting system is Turing complete. This means that, in theory, GP with indexed - memory can be used to evolve any algorithm.<>", "venue": "Proceedings - of the First IEEE Conference on Evolutionary Computation. IEEE World Congress - on Computational Intelligence", "year": 1994, "referenceCount": 4, "citationCount": - 91, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1994-06-27", - "journal": {"name": "Proceedings of the First IEEE Conference on Evolutionary - Computation. IEEE World Congress on Computational Intelligence", "pages": - "136-141 vol.1"}, "authors": [{"authorId": "2862181", "name": "Astro Teller"}]}, - {"paperId": "6c59c9ca3e3ea13cc3ec6921833c3334f02653cd", "externalIds": {"MAG": - "2054678443", "DBLP": "journals/qip/CaludeP02", "ArXiv": "quant-ph/0112087", - "DOI": "10.1023/A:1019623616675", "CorpusId": 13018379}, "url": "https://www.semanticscholar.org/paper/6c59c9ca3e3ea13cc3ec6921833c3334f02653cd", - "title": "Coins, Quantum Measurements, and Turing''s Barrier", "abstract": - null, "venue": "Quantum Information Processing", "year": 2001, "referenceCount": - 64, "citationCount": 86, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2001-12-15", "journal": {"name": "Quantum - Information Processing", "pages": "107-127", "volume": "1"}, "authors": [{"authorId": - "1685717", "name": "Cristian S. Calude"}, {"authorId": "35003302", "name": - "B. Pavlov"}]}, {"paperId": "1befd2ddc9cf384d56f280da7e905b1d695cde4b", "externalIds": - {"MAG": "2018285346", "DOI": "10.1145/141420.141422", "CorpusId": 36356326}, - "url": "https://www.semanticscholar.org/paper/1befd2ddc9cf384d56f280da7e905b1d695cde4b", - "title": "The Turing Test is not a trick: Turing indistinguishability is a - scientific criterion", "abstract": "It is important to understand that the - Turing Test (TT) is not, nor was it intended to be, a trick; how well one - can fool someone is not a measure of scientific progress. The TT is an empirical - criterion: It sets AI''s empirical goal to be to generate human scale performance - capacity. This goal will be met when the candidate''s performance is totally - indistinguishable from a human''s. Until then, the TT simply represents what - it is that AI must endeavor eventually to accomplish scientifically.", "venue": - "SGAR", "year": 1992, "referenceCount": 11, "citationCount": 102, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1992-10-01", "journal": {"name": "Intelligence\\/sigart Bulletin", "pages": - "9-10", "volume": "3"}, "authors": [{"authorId": "2293327", "name": "S. Harnad"}]}, - {"paperId": "39e420b74c09d4120c0cf063e4a6abe92054b8d1", "externalIds": {"MAG": - "1684033657", "DOI": "10.1090/S0002-9939-98-04314-7", "CorpusId": 17658501}, - "url": "https://www.semanticscholar.org/paper/39e420b74c09d4120c0cf063e4a6abe92054b8d1", - "title": "Enumerations, countable structures and Turing degrees", "abstract": - "It is proven that there is a family of sets of natural numbers which has - enumerations in every Turing degree except for the recursive degree. This - implies that there is a countable structure which has representations in all - but the recursive degree. Moreover, it is shown that there is such a structure - which has a recursively represented elementary extension.", "venue": "", "year": - 1998, "referenceCount": 9, "citationCount": 90, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "2131-2139", "volume": "126"}, "authors": - [{"authorId": "3344968", "name": "S. Wehner"}]}, {"paperId": "d20417a741121624642505a9174d6c6ffecf8127", - "externalIds": {"MAG": "2473956334", "DOI": "10.5840/JPHIL20009716", "CorpusId": - 171288711}, "url": "https://www.semanticscholar.org/paper/d20417a741121624642505a9174d6c6ffecf8127", - "title": "Narrow Versus Wide Mechanism: Including a Re-Examination of Turing\u2019s - Views on the Mind-Machine Issue", "abstract": "Designant par l''expression - de mecanisme historique la proposition selon laquelle l''esprit est une machine, - l''A. distingue, parmi les developpements de la these mecaniste au cours du - XX e siecle, un mecanisme etroit (narrow) affirmant que l''esprit est une - machine de Turing, d''une part, et un mecanisme etendu (wide) affirmant que - l''esprit est une machine, certes, mais une machine qui contient la possibilite - d''autres machines traitant des processus de l''information et qui ne se reduisent - pas a la machine universelle de Turing. L''A. montre que Turing et Church - eux-memes ne peuvent accepter la version etroite du mecanisme, refutee par - les developpements recents des modeles de calcul non-conventionnels tels que - l''hypothese dynamique dans la domaine des sciences cognitives", "venue": - "", "year": 2000, "referenceCount": 7, "citationCount": 82, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "The Journal of Philosophy", - "pages": "5-32", "volume": "97"}, "authors": [{"authorId": "144246233", "name": - "B. Copeland"}]}, {"paperId": "b9d69a78a026fea8a81e5b4891d818df8a4c1239", - "externalIds": {"MAG": "2071230339", "DOI": "10.1021/JP983210V", "CorpusId": - 96974683}, "url": "https://www.semanticscholar.org/paper/b9d69a78a026fea8a81e5b4891d818df8a4c1239", - "title": "Experimental Studies and Quantitative Modeling of Turing Patterns - in the (Chlorine Dioxide, Iodine, Malonic Acid) Reaction", "abstract": "Experimental - studies of the formation of Turing patterns in the (chlorine dioxide, iodine, - malonic acid) reaction are performed in a spatial open gel disk reactor where - all the input species are fed onto one side by a continuous stirred tank reactor. - This setup is shown to fit the pool-chemical approximation used in most theoretical - approaches. Nonequilibrium phase diagrams are established as a function of - concentrations in the input flows. In agreement with theoretical predictions, - the location of the transition from uniform steady states to Turing patterns - is found to be almost independent of the concentrations of the complexing - agent which controls the effective diffusion of activatory species. Extensive - analytical and numerical calculations in two and three dimensions are performed - on the basis of the Lengyel\u2212Rabai\u2212Epstein kinetic model and its - two-variable reduction. This particular experimental configuration is shown - to minimize the problems encountered with more commonly used versions of spatial - op...", "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 84, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], - "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": - "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1999-03-06", "journal": {"name": "Journal of Physical - Chemistry A", "pages": "1790-1800", "volume": "103"}, "authors": [{"authorId": - "12105027", "name": "B. Rudovics"}, {"authorId": "34881139", "name": "E. Barillot"}, - {"authorId": "47459850", "name": "P. W. Davies"}, {"authorId": "3250971", - "name": "E. Dulos"}, {"authorId": "2313078", "name": "J. Boissonade"}, {"authorId": - "50010680", "name": "P. Kepper"}]}, {"paperId": "799a2d30635ac76805aae841561f8a8026d7f74f", - "externalIds": {"DBLP": "books/daglib/0007527", "MAG": "659510237", "CorpusId": - 60084081}, "url": "https://www.semanticscholar.org/paper/799a2d30635ac76805aae841561f8a8026d7f74f", - "title": "Turing''s connectionism - an investigation of neural network architectures", - "abstract": "Turing''s Connectionism provides a detailed and in-depth analysis - of Turing''s almost forgotten ideas on connectionist machines. In a little - known paper entitled \"Intelligent Machinery\", Turing already investigated - connectionist models as early as 1948. Unfortunately, his work was dismissed - by his employer as a \"schoolboy essay\" and went unpublished until 1968, - 14 years after his death. In this book, Christof Teuscher analyzes all aspects - of Turing''s \"unorganized machines\". Turing himself also proposed a sort - of genetic algorithm to train the networks. This idea has been resumed by - the author and genetic algorithms are used to build and train Turing''s unorganized - machines. Teuscher''s work starts from Turing''s initial ideas, but importantly - goes beyond them. Many new kinds of machines and new aspects are considered, - e.g., hardware implementation, analysis of the complex dynamics of the networks, - hypercomputation, and learning algorithms.", "venue": "Discrete Mathematics - & Theoretical Computer Science", "year": 2001, "referenceCount": 0, "citationCount": - 68, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2001-10-01", "journal": {"pages": - "I-XVII, 1-200"}, "authors": [{"authorId": "1759304", "name": "C. Teuscher"}]}, - {"paperId": "a1b7a47368b885f1f52d7bba5eadcf422d739941", "externalIds": {"MAG": - "2418826542", "DOI": "10.1103/PHYSREVE.55.6690", "CorpusId": 122798545}, "url": - "https://www.semanticscholar.org/paper/a1b7a47368b885f1f52d7bba5eadcf422d739941", - "title": "Generic spatiotemporal dynamics near codimension-two Turing-Hopf - bifurcations", "abstract": "The coupling of spatial and temporal symmetry - breaking instabilities is studied in a two-variable reaction-diffusion model - describing semiconductor transport. A variety of spatiotemporal patterns corresponding - to pure Hopf and Turing modes, localized patterns, and mixed Turing-Hopf modes - including subharmonic spatiotemporal spiking are found. By organizing the - results in a time-scale versus space-scale diagram, and by comparing them - with a chemical reaction-diffusion model, it is shown that such behavior is - generic for a class of extended nonlinear dynamic systems near codimension-two - Turing-Hopf bifurcations.", "venue": "", "year": 1997, "referenceCount": 5, - "citationCount": 81, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1997-06-01", "journal": {"name": - "Physical Review E", "pages": "6690-6697", "volume": "55"}, "authors": [{"authorId": - "145780580", "name": "M. Meixner"}, {"authorId": "7418281", "name": "A. Wit"}, - {"authorId": "2061627162", "name": "S. Bose"}, {"authorId": "2167329", "name": - "E. Sch\u00f6ll"}]}, {"paperId": "55a1417c034899636e736cfb168071555641dece", - "externalIds": {"MAG": "141766473", "CorpusId": 116147851}, "url": "https://www.semanticscholar.org/paper/55a1417c034899636e736cfb168071555641dece", - "title": "C++ Templates are Turing Complete", "abstract": "We sketch a proof - of a well-known folk theorem that C++ templates are Turing complete. The absence - of a formal semantics for C++ template instantiation makes a rigorous proof - unlikely.", "venue": "", "year": 2003, "referenceCount": 4, "citationCount": - 78, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "1918653", "name": "T. Veldhuizen"}]}, - {"paperId": "73e2210cd378087537ad3c034210a4933174cdde", "externalIds": {"MAG": - "2147090476", "DOI": "10.1112/S0024609399006657", "CorpusId": 16582106}, "url": - "https://www.semanticscholar.org/paper/73e2210cd378087537ad3c034210a4933174cdde", - "title": "The Length of Infinite Time Turing Machine Computations", "abstract": - "We show that the halting times of infinite time Turing machines (considered - as ordinals coded by sets of integers) are themselves all capable of being - halting outputs of such machines. This gives a clarification of the nature - of \u2018supertasks\u2019 or infinite time computations. The proof further - yields that the class of sets coded by outputs of halting computations coincides - with a level of G\u00f6del''s constructible hierarchy: namely that of L\u03bb - where \u03bb is the supremum of halting times. A number of other open questions - are thereby answered. 1991 Mathematics Subject Classification 03D10, 03D60, - 03E45.", "venue": "", "year": 2000, "referenceCount": 13, "citationCount": - 69, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2000-03-01", "journal": {"name": "Bulletin of the - London Mathematical Society", "volume": "32"}, "authors": [{"authorId": "2060034625", - "name": "P. Welch"}]}, {"paperId": "0f13c2bc097d169cc9e63385586787af4aad4467", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics", + "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2002-09-25", "journal": {"name": "ArXiv", "volume": "math.LO/0209332"}, "authors": + [{"authorId": "46277517", "name": "Toby Ord"}]}, {"paperId": "c28f3b5b4ee357c57f333e92a4388b1b46c3a66f", + "externalIds": {"MAG": "1603433725", "DBLP": "conf/ijcai/HayesF95", "CorpusId": + 15322886}, "corpusId": 15322886, "publicationVenue": {"id": "67f7f831-711a-43c8-8785-1e09005359b5", + "name": "International Joint Conference on Artificial Intelligence", "type": + "conference", "alternate_names": ["Int Jt Conf Artif Intell", "IJCAI"], "url": + "http://www.ijcai.org/"}, "url": "https://www.semanticscholar.org/paper/c28f3b5b4ee357c57f333e92a4388b1b46c3a66f", + "title": "Turing Test Considered Harmful", "abstract": "Passing the Turing + Test is not a sensible goal for Artificial Intelligence. Adherence to Turing''s + vision from 1950 is now actively harmful to our field. We review problems + with Turing''s idea, and suggest that, ironically, the very cognitive science + that he tried to create must reject his research goal.", "venue": "International + Joint Conference on Artificial Intelligence", "year": 1995, "referenceCount": + 7, "citationCount": 124, "influentialCitationCount": 10, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", + "Review"], "publicationDate": "1995-08-20", "journal": {"pages": "972-977"}, + "authors": [{"authorId": "145222158", "name": "P. Hayes"}, {"authorId": "32159199", + "name": "K. Ford"}]}, {"paperId": "0f13c2bc097d169cc9e63385586787af4aad4467", "externalIds": {"DBLP": "journals/coling/Moor04", "MAG": "1720739885", "DOI": - "10.1162/089120104773633420", "CorpusId": 118721}, "url": "https://www.semanticscholar.org/paper/0f13c2bc097d169cc9e63385586787af4aad4467", + "10.1162/089120104773633420", "CorpusId": 118721}, "corpusId": 118721, "publicationVenue": + {"id": "ee37a78c-f3d8-407a-bd24-bb97fe6dbab9", "name": "Computational Linguistics", + "type": "journal", "alternate_names": ["Comput Linguistics"], "issn": "0891-2017", + "alternate_issns": ["1530-9312", "0362-613x", "0362-613X"], "url": "http://aclanthology.info/venues/cl", + "alternate_urls": ["http://mitpress.mit.edu/catalog/item/default.asp?ttype=4&tid=10", + "https://www.mitpressjournals.org/loi/coli"]}, "url": "https://www.semanticscholar.org/paper/0f13c2bc097d169cc9e63385586787af4aad4467", "title": "The Turing Test: The Elusive Standard of Artificial Intelligence", "abstract": "Origins of the Articles. Preface. 1: History. The Turing Test B. J. Copeland. Turing Test: 50 Years Later A.P. Saygin, I. Cicekli, V. Akman. @@ -7213,163 +8198,207 @@ interactions: Alternatives. Creativity, the Turing Test, and the (Better) Lovelace Test S. Bringsjord, P. Bello, D. Ferrucci. The Cartesian Test for Automatism G.J. Erion. Minds, Machines and Turing S. Harnad.", "venue": "Computational Linguistics", - "year": 1989, "referenceCount": 25, "citationCount": 83, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "year": 1989, "referenceCount": 25, "citationCount": 84, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://direct.mit.edu/coli/article-pdf/30/1/115/1798046/089120104773633420.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1989-12-31", "journal": {"name": "Computational Linguistics", "pages": "115-116", "volume": "30"}, "authors": [{"authorId": "31925555", - "name": "J. Moor"}]}, {"paperId": "d0e3486aea0e970b32b207f8240d94a2a4c1f091", - "externalIds": {"MAG": "2058270991", "DOI": "10.1080/00048409912348801", "CorpusId": - 170597294}, "url": "https://www.semanticscholar.org/paper/d0e3486aea0e970b32b207f8240d94a2a4c1f091", - "title": "Beyond the universal Turing machine", "abstract": "We describe an - emerging field, that of nonclassical computability and nonclassical computing - machinery. According to the nonclassicist, the set of well-defined computations - is not exhausted by the computations that can be carried out by a Turing machine. - We provide an overview of the field and a philosophical defence of its foundations", - "venue": "", "year": 1999, "referenceCount": 67, "citationCount": 96, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1999-03-01", "journal": {"name": "Australasian Journal of Philosophy", "pages": - "46-66", "volume": "77"}, "authors": [{"authorId": "144246233", "name": "B. - Copeland"}, {"authorId": "2691328", "name": "R. Sylvan"}]}, {"paperId": "c28f3b5b4ee357c57f333e92a4388b1b46c3a66f", - "externalIds": {"MAG": "1603433725", "DBLP": "conf/ijcai/HayesF95", "CorpusId": - 15322886}, "url": "https://www.semanticscholar.org/paper/c28f3b5b4ee357c57f333e92a4388b1b46c3a66f", - "title": "Turing Test Considered Harmful", "abstract": "Passing the Turing - Test is not a sensible goal for Artificial Intelligence. Adherence to Turing''s - vision from 1950 is now actively harmful to our field. We review problems - with Turing''s idea, and suggest that, ironically, the very cognitive science - that he tried to create must reject his research goal.", "venue": "International - Joint Conference on Artificial Intelligence", "year": 1995, "referenceCount": - 7, "citationCount": 124, "influentialCitationCount": 10, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": - "1995-08-20", "journal": {"pages": "972-977"}, "authors": [{"authorId": "145222158", - "name": "P. Hayes"}, {"authorId": "32159199", "name": "K. Ford"}]}, {"paperId": - "be8c4df9ad0182e974407e3e3e5014e5aace661c", "externalIds": {"MAG": "2039248591", - "DBLP": "journals/synthese/CopelandP96", "DOI": "10.1007/BF00413694", "CorpusId": - 44179645}, "url": "https://www.semanticscholar.org/paper/be8c4df9ad0182e974407e3e3e5014e5aace661c", - "title": "On Alan Turing''s anticipation of connectionism", "abstract": null, - "venue": "Synthese", "year": 1996, "referenceCount": 56, "citationCount": - 63, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1996-09-01", "journal": - {"name": "Synthese", "pages": "361-377", "volume": "108"}, "authors": [{"authorId": - "144246233", "name": "B. Copeland"}, {"authorId": "144239027", "name": "D. - Proudfoot"}]}, {"paperId": "7306df441c399654c31cce482fb3ad6df48b38df", "externalIds": - {"MAG": "2068063761", "DBLP": "journals/cacm/HoltC88", "DOI": "10.1145/53580.53581", - "CorpusId": 40859457}, "url": "https://www.semanticscholar.org/paper/7306df441c399654c31cce482fb3ad6df48b38df", - "title": "The Turing programming language", "abstract": "Turing, a new general - purpose programming language, is designed to have Basic''s clean interactive - syntax, Pascal''s elegance, and C''s flexibility.", "venue": "CACM", "year": - 1988, "referenceCount": 36, "citationCount": 117, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "name": "J. Moor"}]}, {"paperId": "1afed45b419c8ca8c2201b933156cb81dffa2868", + "externalIds": {"MAG": "2949716256", "DBLP": "conf/fse/RoseH03", "DOI": "10.1007/978-3-540-39887-5_22", + "CorpusId": 14997404}, "corpusId": 14997404, "publicationVenue": {"id": "89a13061-deba-4155-a533-2c60ea096c6f", + "name": "Fast Software Encryption Workshop", "type": "conference", "alternate_names": + ["Foundations of Software Engineering", "Found Softw Eng", "Fast Software + Encryption", "ACM SIGSOFT Conf Found Softw Eng", "FSE", "Fast Softw Encryption + Workshop", "ACM SIGSOFT Conference on the Foundations of Software Engineering", + "Fast Softw Encryption"], "url": "http://www.wikicfp.com/cfp/program?id=1092", + "alternate_urls": ["http://www.wikicfp.com/cfp/program?id=1093"]}, "url": + "https://www.semanticscholar.org/paper/1afed45b419c8ca8c2201b933156cb81dffa2868", + "title": "Turing: A Fast Stream Cipher", "abstract": null, "venue": "Fast + Software Encryption Workshop", "year": 2003, "referenceCount": 62, "citationCount": + 61, "influentialCitationCount": 9, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007%2F978-3-540-39887-5_22.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1988-12-01", "journal": {"name": "Commun. ACM", "pages": - "1410-1423", "volume": "31"}, "authors": [{"authorId": "144345125", "name": - "R. Holt"}, {"authorId": "1683822", "name": "J. Cordy"}]}, {"paperId": "b7552a8cc5ae3e199e09e50736508afe01f2be00", - "externalIds": {"DBLP": "books/sp/Szepietowski94", "MAG": "1496964377", "DOI": - "10.1007/3-540-58355-6", "CorpusId": 44312772}, "url": "https://www.semanticscholar.org/paper/b7552a8cc5ae3e199e09e50736508afe01f2be00", + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2003-02-24", "journal": {"name": "IACR + Cryptol. ePrint Arch.", "pages": "185", "volume": "2002"}, "authors": [{"authorId": + "35053821", "name": "Gregory G. Rose"}, {"authorId": "1696315", "name": "P. + Hawkes"}]}, {"paperId": "55a1417c034899636e736cfb168071555641dece", "externalIds": + {"MAG": "141766473", "CorpusId": 116147851}, "corpusId": 116147851, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/55a1417c034899636e736cfb168071555641dece", + "title": "C++ Templates are Turing Complete", "abstract": "We sketch a proof + of a well-known folk theorem that C++ templates are Turing complete. The absence + of a formal semantics for C++ template instantiation makes a rigorous proof + unlikely.", "venue": "", "year": 2003, "referenceCount": 4, "citationCount": + 78, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "1918653", "name": "T. Veldhuizen"}]}, + {"paperId": "20eab76a4045701a2b502a7ec609638e03ba53a3", "externalIds": {"ArXiv": + "nlin/0211001", "MAG": "2157563074", "DOI": "10.1006/jtbi.2002.3012", "CorpusId": + 13540813, "PubMed": "12183134"}, "corpusId": 13540813, "publicationVenue": + {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", "name": "Journal of Theoretical + Biology", "type": "journal", "alternate_names": ["J Theor Biology"], "issn": + "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/20eab76a4045701a2b502a7ec609638e03ba53a3", + "title": "Labyrinthine Turing pattern formation in the cerebral cortex.", + "abstract": "I propose that the labyrinthine patterns of the cortices of mammalian + brains may be formed by a Turing instability of interacting axonal guidance + species acting together with the mechanical strain imposed by the interconnecting + axons.", "venue": "Journal of Theoretical Biology", "year": 2002, "referenceCount": + 45, "citationCount": 67, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/nlin/0211001", "status": "GREEN"}, + "fieldsOfStudy": ["Medicine", "Physics", "Biology"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Biology", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-07-07", "journal": {"name": "Journal of theoretical biology", "pages": + "\n 97-103\n ", "volume": "217 1"}, "authors": [{"authorId": + "2116296", "name": "J. Cartwright"}]}, {"paperId": "2e5d18b07eb5398baabc369cc96aeb47a8f11822", + "externalIds": {"DOI": "10.1142/9789812815675_0006", "CorpusId": 7319146}, + "corpusId": 7319146, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2e5d18b07eb5398baabc369cc96aeb47a8f11822", + "title": "Turing Machines", "abstract": "In 1 900 David Hilbert, the preeminent + mathematician of his time, chal\u00ad lenged the world of mathematics with + a list of unsolved problems, pre\u00ad sented in Paris before the International + Congress of M athematicians. The 2 3 r d problem on the list w a s to d iscover + a method for establishing the truth or fal\u00ad sity of any statement in + a language of formal logic called the predicate calcu\u00ad lus. Thirty-six + years were to pass before the problem was settled, and its resolu\u00ad tion + marked an extraord inary and un\u00ad expected turn in mathematics. At the + University of Cambridge a young fel\u00ad low of mathematics in King''s College + named Alan M athison Turing had be\u00ad come familiar with Hilbert''s 2 3 + r d prob\u00ad lem through a series of lectures given by M. H. A. Newman. + Turing pondered the problem d uring long afternoon r uns in the English countryside, + and it was after one of these r uns that the answer came to him. Hilbert''s + problem was im\u00ad possible to solve. The publication in which T uring an\u00ad + nounced his result has had a significance far beyond the immediate problem + it ad\u00ad dressed. In attacking Hilbert''s problem, Turing was forced to + ask how the con\u00ad cept of method might be given a precise definition. + Beginning with the intuitive idea that a method is an algorithm-a proced ure + that can be mechanically car\u00ad ried out witho ut creative intervention\u00ad + he showed how the idea can b\ufffd refined into a detailed model of the process + of computation in which any algorithm is broken down into a sequence of sim\u00ad + ple, atomic steps. The resulting model of computation is the logical construct + called a Turing machine. The simplest way to describe the Tu\u00ad ring machine + is in terms of mechanical parts such as wheels, punched tape and a scanner + that can move back and forth over the tape. The machinery is not es\u00ad + sential-at the most fundamental level Turing''s device is the embodiment of + a method of mathematical reasoning\u00ad but it would be misleading to dispense + entirely with the mechanical metaphor. That metaphor was suggestive to Turing", + "venue": "", "year": 2002, "referenceCount": 167, "citationCount": 70, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2599162", + "name": "E. Zalta"}, {"authorId": "2687250", "name": "U. Nodelman"}, {"authorId": + "30308222", "name": "C. Allen"}, {"authorId": "48525894", "name": "Jack Perry"}]}, + {"paperId": "b7552a8cc5ae3e199e09e50736508afe01f2be00", "externalIds": {"DBLP": + "books/sp/Szepietowski94", "MAG": "1496964377", "DOI": "10.1007/3-540-58355-6", + "CorpusId": 44312772}, "corpusId": 44312772, "publicationVenue": {"id": "2f5d0e8a-faad-4f10-b323-2b2e3c439a78", + "name": "Lecture Notes in Computer Science", "type": "journal", "alternate_names": + ["LNCS", "Transactions on Computational Systems Biology", "Trans Comput Syst + Biology", "Lect Note Comput Sci"], "issn": "0302-9743", "alternate_issns": + ["1861-2059", "1861-2075", "1866-4733"], "url": "http://www.springer.com/lncs", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-164-2-73659-0,00.html", + "https://link.springer.com/bookseries/558", "http://link.springer.com/search?query=\"Transactions+on+Computational+Systems+Biology\""]}, + "url": "https://www.semanticscholar.org/paper/b7552a8cc5ae3e199e09e50736508afe01f2be00", "title": "Turing Machines with Sublogarithmic Space", "abstract": null, "venue": "Lecture Notes in Computer Science", "year": 1994, "referenceCount": 0, "citationCount": - 110, "influentialCitationCount": 16, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1994-08-01", "journal": {"volume": "843"}, "authors": - [{"authorId": "3111434", "name": "Andrzej Szepietowski"}]}, {"paperId": "5702846f73273a9bd339547583eb3df352e573bb", - "externalIds": {"MAG": "1603940370", "DBLP": "conf/icga/NordinB95a", "CorpusId": - 16122959}, "url": "https://www.semanticscholar.org/paper/5702846f73273a9bd339547583eb3df352e573bb", - "title": "Evolving Turing-Complete Programs for a Register Machine with Self-modifying - Code", "abstract": "The majority of commercial computers today are register - machines of von Neumann type. We have developed a method to evolve Turing-complete - programs for a register machine. The described implementation enables the - use of most program constructs, such as arithmetic operators, large indexed - memory, automatic decomposition into subfunctions and subroutines (ADFs), - conditional constructs i.e. if-then-else, jumps, loop structures , recursion, - protected functions, string and list functions. Any C-function can be compiled - and linked into the function set of the system. The use of register machine - language allows us to work at the lowest level of binary machine code without - any interpreting steps. In a von Neumann machine , programs and data reside - in the same memory and the genetic operators can thus directly manipulate - the binary machine code in memory. The genetic operators themselves are written - in C-language but they modify individuals in binary representation. The result - is an execution speed enhancement of up to 100 times compared to an interpreting - C-language implementation, and up to 2000 times compared to a LISP implementation. - The use of binary machine code demands a very compact coding of about one - byte per node in the individual. The resulting evolved programs are disassembled - into C-modules and can be incorporated into a conventional software development - environment. The low memory requirements and the signiicant speed enhancement - of this technique could be of use when applying genetic programming to new - application areas, platforms and research domains.", "venue": "International - Conference on Genetic Algorithms", "year": 1995, "referenceCount": 5, "citationCount": - 119, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1995-07-15", "journal": - {"pages": "318-327"}, "authors": [{"authorId": "1835888", "name": "P. Nordin"}, - {"authorId": "2507766", "name": "W. Banzhaf"}]}, {"paperId": "442245bcdb192400e04a076cd4108ee34323eeec", - "externalIds": {"MAG": "2167588735", "DOI": "10.2307/3104379", "CorpusId": - 61169804}, "url": "https://www.semanticscholar.org/paper/442245bcdb192400e04a076cd4108ee34323eeec", - "title": "Turing''s Man: Western Culture in the Computer Age", "abstract": - "Part 1 Introduction: the measure of technological change the computer as - a defining technology Turing''s man. Part 2 Defining technologies in western - culture: manual technology and the ancient world mechanical technology and - western Europe dynamic technology and western Europe electronic technology - from the clock to the computer the electronic brain. Part 3 Principles of - operation: the Turing machine - states and symbols the von Neumann computer - hardware and software. Part 4 Embodied symbol - mathematics by computer: binary - representation and numerical analysis mathematics and culture embodied mathematics. - Part 5 Embodied symbol - logic by computer: truth and the von Neumann machine - the triumph of logic the embodiment of logical thought. Part 6 Electronic - space: physical space logical space finite space infinite space the geometry - of electronic space. Part 7 Time and progress in the computer age: electronic - clocks time experienced and measured progress in circles the idea of progress. - Part 8 Electronic language: natural and artificial language the hierarchy - of computer language poetry and logic the ancient view the western European - view silent structures. Part 9 Electronic memory: digital memory technology - the art of memory information retrieval and electronic power. Part 10 Creator - and creation: coherence and correspondence electronic limits creating by hand - and by machine reason and necessity electronic play. Part 11 Artificial intelligence: - Turing''s game language, memory, and other games the technology of making - man the electronic image of man artifact and artificer. Part 12 Conclusion: - natural man from Socrates to Faust to Turing living with Turing''s man invention - and discovery the computer as a tool synthetic intelligence.", "venue": "", - "year": 1985, "referenceCount": 0, "citationCount": 175, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1985-04-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "66493855", "name": "David J. - Bolter"}]}, {"paperId": "c5287010313c8c6f4cb09919a50f241e494b90db", "externalIds": - {"DBLP": "journals/mima/Copeland02", "MAG": "1852397043", "DOI": "10.1023/A:1015607401307", - "CorpusId": 29828453}, "url": "https://www.semanticscholar.org/paper/c5287010313c8c6f4cb09919a50f241e494b90db", - "title": "Accelerating Turing Machines", "abstract": null, "venue": "Minds - and Machines", "year": 2002, "referenceCount": 61, "citationCount": 85, "influentialCitationCount": - 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", + 110, "influentialCitationCount": 16, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-540-48669-5%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1994-08-01", "journal": {"volume": "843"}, "authors": [{"authorId": "3111434", + "name": "Andrzej Szepietowski"}]}, {"paperId": "73e2210cd378087537ad3c034210a4933174cdde", + "externalIds": {"MAG": "2147090476", "DOI": "10.1112/S0024609399006657", "CorpusId": + 16582106}, "corpusId": 16582106, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/73e2210cd378087537ad3c034210a4933174cdde", + "title": "The Length of Infinite Time Turing Machine Computations", "abstract": + "We show that the halting times of infinite time Turing machines (considered + as ordinals coded by sets of integers) are themselves all capable of being + halting outputs of such machines. This gives a clarification of the nature + of \u2018supertasks\u2019 or infinite time computations. The proof further + yields that the class of sets coded by outputs of halting computations coincides + with a level of G\u00f6del''s constructible hierarchy: namely that of L\u03bb + where \u03bb is the supremum of halting times. A number of other open questions + are thereby answered. 1991 Mathematics Subject Classification 03D10, 03D60, + 03E45.", "venue": "", "year": 2000, "referenceCount": 13, "citationCount": + 69, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-03-01", "journal": {"name": + "Bulletin of the London Mathematical Society", "volume": "32"}, "authors": + [{"authorId": "2060034625", "name": "P. Welch"}]}, {"paperId": "b9d69a78a026fea8a81e5b4891d818df8a4c1239", + "externalIds": {"MAG": "2071230339", "DOI": "10.1021/JP983210V", "CorpusId": + 96974683}, "corpusId": 96974683, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b9d69a78a026fea8a81e5b4891d818df8a4c1239", + "title": "Experimental Studies and Quantitative Modeling of Turing Patterns + in the (Chlorine Dioxide, Iodine, Malonic Acid) Reaction", "abstract": "Experimental + studies of the formation of Turing patterns in the (chlorine dioxide, iodine, + malonic acid) reaction are performed in a spatial open gel disk reactor where + all the input species are fed onto one side by a continuous stirred tank reactor. + This setup is shown to fit the pool-chemical approximation used in most theoretical + approaches. Nonequilibrium phase diagrams are established as a function of + concentrations in the input flows. In agreement with theoretical predictions, + the location of the transition from uniform steady states to Turing patterns + is found to be almost independent of the concentrations of the complexing + agent which controls the effective diffusion of activatory species. Extensive + analytical and numerical calculations in two and three dimensions are performed + on the basis of the Lengyel\u2212Rabai\u2212Epstein kinetic model and its + two-variable reduction. This particular experimental configuration is shown + to minimize the problems encountered with more commonly used versions of spatial + op...", "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 84, + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-03-06", "journal": {"name": + "Journal of Physical Chemistry A", "pages": "1790-1800", "volume": "103"}, + "authors": [{"authorId": "12105027", "name": "B. Rudovics"}, {"authorId": + "34881139", "name": "E. Barillot"}, {"authorId": "47459850", "name": "P. W. + Davies"}, {"authorId": "3250971", "name": "E. Dulos"}, {"authorId": "2313078", + "name": "J. Boissonade"}, {"authorId": "50010680", "name": "P. Kepper"}]}, + {"paperId": "d8a29ced02e5d2cc1a6144e4bb915ae3671f3dd2", "externalIds": {"MAG": + "2089421660", "DOI": "10.1007/s10676-004-6491-2", "CorpusId": 41059415}, "corpusId": + 41059415, "publicationVenue": {"id": "09bb329a-45bc-4561-860f-c8ac0e958895", + "name": "Ethics and Information Technology", "type": "journal", "alternate_names": + ["Ethics Inf Technol"], "issn": "1388-1957", "url": "https://www.springer.com/computer/swe/journal/10676", + "alternate_urls": ["https://link.springer.com/journal/10676"]}, "url": "https://www.semanticscholar.org/paper/d8a29ced02e5d2cc1a6144e4bb915ae3671f3dd2", + "title": "The Turing Triage Test", "abstract": null, "venue": "Ethics and + Information Technology", "year": 2004, "referenceCount": 49, "citationCount": + 59, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-12-01", "journal": {"name": + "Ethics and Information Technology", "pages": "203-213", "volume": "6"}, "authors": + [{"authorId": "52504962", "name": "R. Sparrow"}]}, {"paperId": "dfd734b2de2cbcce6ac07e909011b0ed6ba32b01", + "externalIds": {"MAG": "2033914241", "DBLP": "journals/annals/MorrisJ84", + "DOI": "10.1109/MAHC.1984.10017", "CorpusId": 11906342}, "corpusId": 11906342, + "publicationVenue": {"id": "45584fb0-6eed-4c30-87fc-7e3691efb8c8", "name": + "Annals of the History of Computing", "alternate_names": ["Ann Hist Comput"], + "issn": "0164-1239", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=5488650"}, + "url": "https://www.semanticscholar.org/paper/dfd734b2de2cbcce6ac07e909011b0ed6ba32b01", + "title": "An Early Program Proof by Alan Turing", "abstract": "The paper reproduces, + with typographical corrections and comments, a 1949 paper by Alan Turing that + foreshadows much subsequent work in program proving.", "venue": "Annals of + the History of Computing", "year": 1984, "referenceCount": 7, "citationCount": + 114, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2002-05-01", "journal": {"name": "Minds and Machines", "pages": "281-300", - "volume": "12"}, "authors": [{"authorId": "144246233", "name": "B. Copeland"}]}, - {"paperId": "896c112f03986e6ee597d3caa67e25a31503300e", "externalIds": {"MAG": - "2210317531", "DOI": "10.1109/9780470544242.CH53", "CorpusId": 62293869}, - "url": "https://www.semanticscholar.org/paper/896c112f03986e6ee597d3caa67e25a31503300e", - "title": "A Universal Turing Machine with Two Internal States", "abstract": - "This chapter contains sections titled: Introduction The two-State Universal - Turing Machine Impossibility of a One-State Universal Turing Machine Modeling - a Turing Machine with Only Two Tape Symbols", "venue": "", "year": 1993, "referenceCount": - 0, "citationCount": 87, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "733-741", "volume": ""}, "authors": [{"authorId": "143992833", "name": - "N. Sloane"}, {"authorId": "1734614", "name": "A. Wyner"}]}, {"paperId": "25f6bcf74cfe92c6be30d038fe71c1b86b83d58c", - "externalIds": {"MAG": "2090409893", "DOI": "10.1126/SCIENCE.1057830", "CorpusId": - 260766, "PubMed": "11264532"}, "url": "https://www.semanticscholar.org/paper/25f6bcf74cfe92c6be30d038fe71c1b86b83d58c", + "1984-04-01", "journal": {"name": "Annals of the History of Computing", "pages": + "139-143", "volume": "6"}, "authors": [{"authorId": "145965540", "name": "F. + L. Morris"}, {"authorId": "2109260410", "name": "Cliff B. Jones"}]}, {"paperId": + "25f6bcf74cfe92c6be30d038fe71c1b86b83d58c", "externalIds": {"MAG": "2090409893", + "DOI": "10.1126/SCIENCE.1057830", "CorpusId": 260766, "PubMed": "11264532"}, + "corpusId": 260766, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/25f6bcf74cfe92c6be30d038fe71c1b86b83d58c", "title": "Turing-Type Patterns on Electrode Surfaces", "abstract": "We report stationary, nonequilibrium potential and adsorbate patterns with an intrinsic wavelength that were observed in an electrochemical system with a specific @@ -7385,49 +8414,18 @@ interactions: biological systems that have gradients in the electric potential and may open new paths for fabricating patterned electrodes.", "venue": "Science", "year": 2001, "referenceCount": 14, "citationCount": 110, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2001-02-22", "journal": - {"name": "Science", "pages": "2395 - 2398", "volume": "291"}, "authors": [{"authorId": - "2110515200", "name": "Yong\u2010Jun Li"}, {"authorId": "7797612", "name": - "Julia Oslonovitch"}, {"authorId": "31579523", "name": "N. Mazouz"}, {"authorId": - "7827430", "name": "F. Plenge"}, {"authorId": "2372632", "name": "K. Krischer"}, - {"authorId": "91892472", "name": "G. Ertl"}]}, {"paperId": "e194cdb60c53128b11dfb2fefe742cb6b8dd233b", - "externalIds": {"DBLP": "journals/mima/Moor01", "MAG": "1547668604", "DOI": - "10.1023/A:1011218925467", "CorpusId": 35233851}, "url": "https://www.semanticscholar.org/paper/e194cdb60c53128b11dfb2fefe742cb6b8dd233b", - "title": "The Status and Future of the Turing Test", "abstract": null, "venue": - "Minds and Machines", "year": 2001, "referenceCount": 39, "citationCount": - 53, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2001-02-01", "journal": - {"name": "Minds and Machines", "pages": "77-93", "volume": "11"}, "authors": - [{"authorId": "31925555", "name": "J. Moor"}]}, {"paperId": "1afed45b419c8ca8c2201b933156cb81dffa2868", - "externalIds": {"MAG": "2949716256", "DBLP": "conf/fse/RoseH03", "DOI": "10.1007/978-3-540-39887-5_22", - "CorpusId": 14997404}, "url": "https://www.semanticscholar.org/paper/1afed45b419c8ca8c2201b933156cb81dffa2868", - "title": "Turing: A Fast Stream Cipher", "abstract": null, "venue": "Fast - Software Encryption Workshop", "year": 2003, "referenceCount": 62, "citationCount": - 60, "influentialCitationCount": 9, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2003-02-24", - "journal": {"name": "IACR Cryptol. ePrint Arch.", "pages": "185", "volume": - "2002"}, "authors": [{"authorId": "35053821", "name": "Gregory G. Rose"}, - {"authorId": "1696315", "name": "P. Hawkes"}]}, {"paperId": "803426e55ac3da6b5a16ba5ece0de7a634daccf6", - "externalIds": {"MAG": "1503960328", "DBLP": "conf/foiks/Goldin00", "DOI": - "10.1007/3-540-46564-2_8", "CorpusId": 9427060}, "url": "https://www.semanticscholar.org/paper/803426e55ac3da6b5a16ba5ece0de7a634daccf6", - "title": "Persistent Turing Machines as a Model of Interactive Computation", - "abstract": null, "venue": "International Symposium on Foundations of Information - and Knowledge Systems", "year": 2000, "referenceCount": 32, "citationCount": - 65, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-02-14", "journal": - {"pages": "116-135"}, "authors": [{"authorId": "27353259", "name": "Dina Q. - Goldin"}]}, {"paperId": "7d46f6e3b6307cd67f93de59dcd9e934c8c45271", "externalIds": - {"MAG": "2017193571", "DOI": "10.4310/MRL.1999.V6.N6.A10", "CorpusId": 59289390}, - "url": "https://www.semanticscholar.org/paper/7d46f6e3b6307cd67f93de59dcd9e934c8c45271", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2001-02-22", "journal": {"name": "Science", "pages": "2395 - 2398", "volume": + "291"}, "authors": [{"authorId": "2110515200", "name": "Yong\u2010Jun Li"}, + {"authorId": "7797612", "name": "Julia Oslonovitch"}, {"authorId": "31579523", + "name": "N. Mazouz"}, {"authorId": "7827430", "name": "F. Plenge"}, {"authorId": + "2372632", "name": "K. Krischer"}, {"authorId": "91892472", "name": "G. Ertl"}]}, + {"paperId": "7d46f6e3b6307cd67f93de59dcd9e934c8c45271", "externalIds": {"MAG": + "2017193571", "DOI": "10.4310/MRL.1999.V6.N6.A10", "CorpusId": 59289390}, + "corpusId": 59289390, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7d46f6e3b6307cd67f93de59dcd9e934c8c45271", "title": "Defining the Turing Jump", "abstract": "The primary notion of effective computability is that provided by Turing machines (or equivalently any of the other common models of computation). We denote the partial function computed @@ -7446,15 +8444,51 @@ interactions: degrees and the equivalence class of a set A \u2286 \u03c9 is called its degree. It is typically denoted by a or deg(A). \u2217Partially supported by NSF Grant DMS-9802843. \u2020Partially supported by NSF Grant DMS-97-96121.", "venue": - "", "year": 1999, "referenceCount": 12, "citationCount": 66, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + "", "year": 1999, "referenceCount": 12, "citationCount": 67, "influentialCitationCount": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.intlpress.com/site/pub/files/_fulltext/journals/mrl/1999/0006/0006/MRL-1999-0006-0006-a010.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Mathematical Research Letters", "pages": "711-722", "volume": "6"}, "authors": [{"authorId": "1817824", "name": "R. Shore"}, {"authorId": - "2867082", "name": "T. Slaman"}]}, {"paperId": "75caeb5274630bd52cbcd8f549237c30d108e2ff", + "2867082", "name": "T. Slaman"}]}, {"paperId": "e194cdb60c53128b11dfb2fefe742cb6b8dd233b", + "externalIds": {"DBLP": "journals/mima/Moor01", "MAG": "1547668604", "DOI": + "10.1023/A:1011218925467", "CorpusId": 35233851}, "corpusId": 35233851, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/e194cdb60c53128b11dfb2fefe742cb6b8dd233b", + "title": "The Status and Future of the Turing Test", "abstract": null, "venue": + "Minds and Machines", "year": 2001, "referenceCount": 39, "citationCount": + 53, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2001-02-01", "journal": {"name": "Minds and Machines", "pages": "77-93", + "volume": "11"}, "authors": [{"authorId": "31925555", "name": "J. Moor"}]}, + {"paperId": "803426e55ac3da6b5a16ba5ece0de7a634daccf6", "externalIds": {"MAG": + "1503960328", "DBLP": "conf/foiks/Goldin00", "DOI": "10.1007/3-540-46564-2_8", + "CorpusId": 9427060}, "corpusId": 9427060, "publicationVenue": {"id": "3aee9c64-fe65-4456-9ec3-c62a4b2424b6", + "name": "International Symposium on Foundations of Information and Knowledge + Systems", "type": "conference", "alternate_names": ["Foundations of Information + and Knowledge Systems", "Found Inf Knowl Syst", "Int Symp Found Inf Knowl + Syst", "FoIKS"], "url": "http://www.wikicfp.com/cfp/program?id=1067"}, "url": + "https://www.semanticscholar.org/paper/803426e55ac3da6b5a16ba5ece0de7a634daccf6", + "title": "Persistent Turing Machines as a Model of Interactive Computation", + "abstract": null, "venue": "International Symposium on Foundations of Information + and Knowledge Systems", "year": 2000, "referenceCount": 32, "citationCount": + 65, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-02-14", "journal": {"pages": "116-135"}, "authors": [{"authorId": "27353259", + "name": "Dina Q. Goldin"}]}, {"paperId": "75caeb5274630bd52cbcd8f549237c30d108e2ff", "externalIds": {"DBLP": "conf/stoc/BernsteinV93", "MAG": "1993688167", "DOI": - "10.1145/167088.167097", "CorpusId": 676378}, "url": "https://www.semanticscholar.org/paper/75caeb5274630bd52cbcd8f549237c30d108e2ff", + "10.1145/167088.167097", "CorpusId": 676378}, "corpusId": 676378, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/75caeb5274630bd52cbcd8f549237c30d108e2ff", "title": "Quantum complexity theory", "abstract": "In this paper we study quantum computation from a complexity theoretic viewpoint. Our first result is the existence of an efficient universal quantum Turing machine in Deutsch''s @@ -7482,39 +8516,46 @@ interactions: than classical probabilistic Turing machines (in the unrelativized setting) unless there is a major breakthrough in complexity theory.", "venue": "Symposium on the Theory of Computing", "year": 1993, "referenceCount": 45, "citationCount": - 1745, "influentialCitationCount": 236, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": - "1993-06-01", "journal": {"name": "Proceedings of the twenty-fifth annual - ACM symposium on Theory of Computing"}, "authors": [{"authorId": "48863272", - "name": "Ethan S. Bernstein"}, {"authorId": "46753437", "name": "U. Vazirani"}]}, - {"paperId": "e57c784bdacea220354d473f9fbc5cfd8d9c4d6d", "externalIds": {"MAG": - "20672278", "DOI": "10.1112/S0024611502013643", "CorpusId": 16272483}, "url": - "https://www.semanticscholar.org/paper/e57c784bdacea220354d473f9fbc5cfd8d9c4d6d", - "title": "Is wave propagation computable or can wave computers beat the turing - machine?", "abstract": "According to the Church\u2010Turing Thesis a number - function is computable by the mathematically defined Turing machine if and - only if it is computable by a physical machine. In 1983 Pour\u2010El and Richards - defined a three\u2010dimensional wave u(t,x) such that the amplitude u(0,x) - at time 0 is computable and the amplitude u(1,x) at time 1 is continuous but - not computable. Therefore, there might be some kind of wave computer beating - the Turing machine. By applying the framework of Type 2 Theory of Effectivity - (TTE), in this paper we analyze computability of wave propagation. In particular, - we prove that the wave propagator is computable on continuously differentiable - waves, where one derivative is lost, and on waves from Sobolev spaces. Finally, - we explain why the Pour\u2010El\u2010Richards result probably does not help - to design a wave computer which beats the Turing machine.", "venue": "", "year": - 2002, "referenceCount": 30, "citationCount": 88, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + 1778, "influentialCitationCount": 241, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "1993-06-01", "journal": {"name": "Proceedings + of the twenty-fifth annual ACM symposium on Theory of Computing"}, "authors": + [{"authorId": "48863272", "name": "Ethan S. Bernstein"}, {"authorId": "46753437", + "name": "U. Vazirani"}]}, {"paperId": "e7a75093cc7514bfa2959db9a5a2e0b61c096d72", + "externalIds": {"DBLP": "conf/ictai/Chan03", "MAG": "2155915840", "DOI": "10.1109/TAI.2003.1250195", + "CorpusId": 9083441}, "corpusId": 9083441, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e7a75093cc7514bfa2959db9a5a2e0b61c096d72", + "title": "Using a test-to-speech synthesizer to generate a reverse Turing + test", "abstract": "Recognition of synthesized speech by a diphone synthesizer + is thought to be easy for a machine due to the small variation of the synthesized + speech. In this paper, we report the recognition rate of synthesized utterances + in a noisy environment. Our experiments show that the performance of a HMM + recognizer is not too bad even in the presence of background noise. These + recognition results nearly approach the performance of a human. Thus, although + there seems to be a gap in the ability of understanding synthesized speech + with background noise between humans and computers, our results discourage + using this gap to build an audio-based CAPTCHA (completely automated public + Turing test to tell computers and humans apart) (i.e., a reverse Turing test + which can tell computers and humans apart). Moreover, we explored the possible + use of a classification and regression tree to control the hardness of our + CAPTCHA.", "venue": "Proceedings. 15th IEEE International Conference on Tools + with Artificial Intelligence", "year": 2003, "referenceCount": 5, "citationCount": + 89, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-09-01", - "journal": {"name": "Proceedings of the London Mathematical Society", "volume": - "85"}, "authors": [{"authorId": "1696520", "name": "K. Weihrauch"}, {"authorId": - "2778649", "name": "Ning Zhong"}]}, {"paperId": "f1db4b4df6ce6d88acedd32cf5b3ca637e436f78", - "externalIds": {"MAG": "18310804", "DBLP": "conf/interspeech/KochanskiLS02", - "DOI": "10.21437/icslp.2002-412", "CorpusId": 6072887}, "url": "https://www.semanticscholar.org/paper/f1db4b4df6ce6d88acedd32cf5b3ca637e436f78", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2003-11-03", "journal": {"name": "Proceedings. 15th IEEE + International Conference on Tools with Artificial Intelligence", "pages": + "226-232"}, "authors": [{"authorId": "32044034", "name": "Tsz-Yan Chan"}]}, + {"paperId": "f1db4b4df6ce6d88acedd32cf5b3ca637e436f78", "externalIds": {"MAG": + "18310804", "DBLP": "conf/interspeech/KochanskiLS02", "DOI": "10.21437/icslp.2002-412", + "CorpusId": 6072887}, "corpusId": 6072887, "publicationVenue": {"id": "af90489e-312f-4514-bea2-bcb399cb8ece", + "name": "Interspeech", "type": "conference", "alternate_names": ["Conf Int + Speech Commun Assoc", "INTERSPEECH", "Conference of the International Speech + Communication Association"], "issn": "2308-457X", "url": "https://www.isca-speech.org/iscaweb/index.php/conferences/interspeech", + "alternate_urls": ["http://www.isca-speech.org/"]}, "url": "https://www.semanticscholar.org/paper/f1db4b4df6ce6d88acedd32cf5b3ca637e436f78", "title": "A reverse turing test using speech", "abstract": "\"Hackers\" have written malicious programs to exploit online services intended for human users. As a result, service providers need a method to tell whether a web site is @@ -7528,54 +8569,64 @@ interactions: and speech recognition systems make different kinds of mistakes, and this difference can be employed to improve discrimination.", "venue": "Interspeech", "year": 2002, "referenceCount": 13, "citationCount": 73, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://kochanski.org/gpk/papers/2002/rtt.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2002-09-16", "journal": {"name": "7th International Conference on Spoken Language Processing (ICSLP 2002)"}, "authors": [{"authorId": "2942286", "name": "G. Kochanski"}, {"authorId": "1828940", "name": "D. Lopresti"}, {"authorId": - "145115135", "name": "Chilin Shih"}]}, {"paperId": "e7a75093cc7514bfa2959db9a5a2e0b61c096d72", - "externalIds": {"DBLP": "conf/ictai/Chan03", "MAG": "2155915840", "DOI": "10.1109/TAI.2003.1250195", - "CorpusId": 9083441}, "url": "https://www.semanticscholar.org/paper/e7a75093cc7514bfa2959db9a5a2e0b61c096d72", - "title": "Using a test-to-speech synthesizer to generate a reverse Turing - test", "abstract": "Recognition of synthesized speech by a diphone synthesizer - is thought to be easy for a machine due to the small variation of the synthesized - speech. In this paper, we report the recognition rate of synthesized utterances - in a noisy environment. Our experiments show that the performance of a HMM - recognizer is not too bad even in the presence of background noise. These - recognition results nearly approach the performance of a human. Thus, although - there seems to be a gap in the ability of understanding synthesized speech - with background noise between humans and computers, our results discourage - using this gap to build an audio-based CAPTCHA (completely automated public - Turing test to tell computers and humans apart) (i.e., a reverse Turing test - which can tell computers and humans apart). Moreover, we explored the possible - use of a classification and regression tree to control the hardness of our - CAPTCHA.", "venue": "Proceedings. 15th IEEE International Conference on Tools - with Artificial Intelligence", "year": 2003, "referenceCount": 5, "citationCount": - 89, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2003-11-03", - "journal": {"name": "Proceedings. 15th IEEE International Conference on Tools - with Artificial Intelligence", "pages": "226-232"}, "authors": [{"authorId": - "32044034", "name": "Tsz-Yan Chan"}]}, {"paperId": "0016e05f4221d8f07d2fbe1ffcaea38c510fd6b5", - "externalIds": {"MAG": "2592879695", "ArXiv": "quant-ph/9710052", "CorpusId": - 2306113}, "url": "https://www.semanticscholar.org/paper/0016e05f4221d8f07d2fbe1ffcaea38c510fd6b5", - "title": "The Church-Turing thesis as a guiding principle for physics", "abstract": - "Two aspects of the physical side of the Church-Turing thesis are discussed. - The first issue is a variant of the Eleatic argument against motion, dealing - with Zeno squeezed time cycles of computers. The second argument reviews the - issue of one-to-one computation, that is, the bijective (unique and reversible) - evolution of computations and its relation to the measurement process.", "venue": - "", "year": 1997, "referenceCount": 59, "citationCount": 54, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1997-10-22", "journal": - {"name": "arXiv: Quantum Physics", "volume": ""}, "authors": [{"authorId": - "1756061", "name": "K. Svozil"}]}, {"paperId": "8099dc8d9ac365d0320c751ee59cd7820df906a5", + "145115135", "name": "Chilin Shih"}]}, {"paperId": "e57c784bdacea220354d473f9fbc5cfd8d9c4d6d", + "externalIds": {"MAG": "20672278", "DOI": "10.1112/S0024611502013643", "CorpusId": + 16272483}, "corpusId": 16272483, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e57c784bdacea220354d473f9fbc5cfd8d9c4d6d", + "title": "Is wave propagation computable or can wave computers beat the turing + machine?", "abstract": "According to the Church\u2010Turing Thesis a number + function is computable by the mathematically defined Turing machine if and + only if it is computable by a physical machine. In 1983 Pour\u2010El and Richards + defined a three\u2010dimensional wave u(t,x) such that the amplitude u(0,x) + at time 0 is computable and the amplitude u(1,x) at time 1 is continuous but + not computable. Therefore, there might be some kind of wave computer beating + the Turing machine. By applying the framework of Type 2 Theory of Effectivity + (TTE), in this paper we analyze computability of wave propagation. In particular, + we prove that the wave propagator is computable on continuously differentiable + waves, where one derivative is lost, and on waves from Sobolev spaces. Finally, + we explain why the Pour\u2010El\u2010Richards result probably does not help + to design a wave computer which beats the Turing machine.", "venue": "", "year": + 2002, "referenceCount": 30, "citationCount": 88, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2002-09-01", "journal": {"name": "Proceedings of the London + Mathematical Society", "volume": "85"}, "authors": [{"authorId": "1696520", + "name": "K. Weihrauch"}, {"authorId": "2778649", "name": "Ning Zhong"}]}, + {"paperId": "61ee579a37c6d72ac9893b1514b93bf8eb3bff77", "externalIds": {"MAG": + "2289358840", "CorpusId": 61836603}, "corpusId": 61836603, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/61ee579a37c6d72ac9893b1514b93bf8eb3bff77", + "title": "A 1-Tape 2-Symbol Reversible Turing Machine", "abstract": "Bennett + proved that any irreversible Turing machine can be simulated by a reversible + one. However, Bennett'' s reversible machine uses 3 tapes and many tape symbols. + Previ\u00ad ously, Gono and Morita showed that the number of symbols can be + reduced to 2. In this paper, by improving these methods, we give a procedure + to convert an irreversible machine into an equivalent 1-tape 2-symbol reversible + machine. First, it is shown that the \"state-degeneration degree\" of any + Turing machine can be reduced to 2 or less. Using this result and some other + tech\u00ad niques, a given irreversible machine is converted into a 1-tape + 32-symbol (i. e., 5-track 2-symbol) reversible machine. Finally the 32-symbol + machine is converted into a 1-tape 2-symbol reversible machine. From this + result, it is seen that a 1-tape 2-symbol reversible Turing machine is computation + universal.", "venue": "", "year": 1989, "referenceCount": 5, "citationCount": + 62, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-03-25", + "journal": {"name": "IEICE Transactions on Fundamentals of Electronics, Communications + and Computer Sciences", "pages": "223-228", "volume": "72"}, "authors": [{"authorId": + "144254676", "name": "K. Morita"}, {"authorId": "93171949", "name": "A. Shirasaki"}, + {"authorId": "92737699", "name": "Y. Gono"}]}, {"paperId": "8099dc8d9ac365d0320c751ee59cd7820df906a5", "externalIds": {"DBLP": "journals/jacm/HopcroftU69", "MAG": "2089690927", - "DOI": "10.1145/321495.321508", "CorpusId": 14316563}, "url": "https://www.semanticscholar.org/paper/8099dc8d9ac365d0320c751ee59cd7820df906a5", + "DOI": "10.1145/321495.321508", "CorpusId": 14316563}, "corpusId": 14316563, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8099dc8d9ac365d0320c751ee59cd7820df906a5", "title": "Some Results on Tape-Bounded Turing Machines", "abstract": "Classes of tape-bounded Turing machines similar to the on-line and off-line Turing machines, but without the restrictions that each machine halt and be deterministic, @@ -7588,249 +8639,51 @@ interactions: large complexity are not closed under complementation and are larger that the corresponding deterministic complexity class.", "venue": "JACM", "year": 1969, "referenceCount": 5, "citationCount": 96, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "J. ACM", "pages": "168-177", "volume": "16"}, "authors": - [{"authorId": "1706504", "name": "J. Hopcroft"}, {"authorId": "1742391", "name": - "J. Ullman"}]}, {"paperId": "ef7d99880c4ae742c88b84d26f321d9e87dc4d4e", "externalIds": - {"MAG": "1512610407", "DOI": "10.21236/ada444284", "CorpusId": 12466742}, - "url": "https://www.semanticscholar.org/paper/ef7d99880c4ae742c88b84d26f321d9e87dc4d4e", - "title": "Quasi-Delay-Insensitive Circuits are Turing-Complete", "abstract": - "Quasi-delay-insensitive (QDI) circuits are those whose correct operation - does not depend on the delays of operators or wires, except for certain wires - that form isochronic forks. In this paper we show that quasi-delay-insensitivity, - stability and noninterference, and strong confluence are equivalent properties - of a computation. In particular, this shows that QDI computations are deterministic. - We show that the class of Turing-computable functions have QDI implementations - by constructing a QDI Turing machine.", "venue": "", "year": 1995, "referenceCount": - 8, "citationCount": 53, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1995-11-01", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "144576833", "name": "R. Manohar"}, {"authorId": - "79041834", "name": "Alain J. Martin"}]}, {"paperId": "5907d387091a81b860b1c8c83a5ecbda28256aab", - "externalIds": {"MAG": "2025766729", "DOI": "10.1007/S002850050042", "CorpusId": - 35630203}, "url": "https://www.semanticscholar.org/paper/5907d387091a81b860b1c8c83a5ecbda28256aab", - "title": "A Turing model with correlated random walk", "abstract": null, "venue": - "", "year": 1996, "referenceCount": 26, "citationCount": 56, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-11-14", - "journal": {"name": "Journal of Mathematical Biology", "pages": "49-72", "volume": - "35"}, "authors": [{"authorId": "1682566", "name": "T. Hillen"}]}, {"paperId": - "a2115fed790cf3e20666ac51bfc728cfdcc30b70", "externalIds": {"MAG": "1570445405", - "DBLP": "journals/cogsci/Wells98", "DOI": "10.1207/s15516709cog2203_1", "CorpusId": - 15463981}, "url": "https://www.semanticscholar.org/paper/a2115fed790cf3e20666ac51bfc728cfdcc30b70", - "title": "Turing''s Analysis of Computation and Theories of Cognitive Architecture", - "abstract": "Turing''s analysis of computation is a fundamental part of the - background of cognitive science. In this paper it is argued that a re-interpretation - of Turing''s work is required to underpin theorizing about cognitive architecture. - It is claimed that the symbol systems view of the mind, which is the conventional - way of understanding how Turing''s work impacts on cognitive science, is deeply - flawed. There is an alternative interpretation that is more faithful to Turing''s - original insights, avoids the criticisms made of the symbol systems approach - and is compatible with the growing interest in agent-environment interaction. - It is argued that this interpretation should form the basis for theories of - cognitive architecture.", "venue": "Cognitive Sciences", "year": 1998, "referenceCount": - 71, "citationCount": 49, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Chemistry"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Chemistry", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1998-07-01", "journal": {"name": "Cogn. - Sci.", "pages": "269-294", "volume": "22"}, "authors": [{"authorId": "48060981", - "name": "A. Wells"}]}, {"paperId": "41ac1aeada172897fd83a629e28a68f7ca53c15c", - "externalIds": {"DBLP": "journals/jsyml/Hooper66", "MAG": "2161843469", "DOI": - "10.2307/2269811", "CorpusId": 8930758}, "url": "https://www.semanticscholar.org/paper/41ac1aeada172897fd83a629e28a68f7ca53c15c", - "title": "The undecidability of the Turing machine immortality problem", "abstract": - "A Turing Machine (TM) is an abstract, synchronous, deterministic computer - with a finite number of internal states. It operates on the set of infinite - words, or tapes, over some finite alphabet, scanning exactly one symbol of - the tape at a time. (Only a 2-symbol alphabet, consisting of \u201c0\u201d - and \u201c|\u201d, will be considered here, and the scanned symbol of a tape - will be distinguished by an underscore.) depending upon its internal state - and the symbol under scan, it can perform one or more of the following operations: - replace the scanned symbol with a new symbol, focus its attention on an adjacent - square, and transfer control to a new state.", "venue": "Journal of Symbolic - Logic (JSL)", "year": 1966, "referenceCount": 13, "citationCount": 112, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1966-06-01", "journal": {"name": "Journal of Symbolic - Logic", "pages": "219 - 234", "volume": "31"}, "authors": [{"authorId": "21406268", - "name": "Philip K. Hooper"}]}, {"paperId": "fef16efae0d584905f9d15c4ca032978ccbff629", - "externalIds": {"MAG": "2001772727", "DBLP": "journals/mima/Cleland93", "DOI": - "10.1007/BF00976283", "CorpusId": 742039}, "url": "https://www.semanticscholar.org/paper/fef16efae0d584905f9d15c4ca032978ccbff629", - "title": "Is the Church-Turing thesis true?", "abstract": null, "venue": "Minds - and Machines", "year": 1993, "referenceCount": 37, "citationCount": 50, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1993-08-01", "journal": {"name": "Minds and Machines", "pages": "283-312", - "volume": "3"}, "authors": [{"authorId": "32624486", "name": "Carol E. Cleland"}]}, - {"paperId": "f6bdf9382d7d629d416ca36c40ffcf348f28ab12", "externalIds": {"MAG": - "2051481378", "DOI": "10.1093/bjps/54.2.181", "CorpusId": 17915665}, "url": - "https://www.semanticscholar.org/paper/f6bdf9382d7d629d416ca36c40ffcf348f28ab12", - "title": "Hypercomputation and the Physical Church\u2010Turing Thesis", "abstract": - "A version of the Church\u2010Turing Thesis states that every effectively - realizable physical system can be defined by Turing Machines (\u2018Thesis - P\u2019); in this formulation the Thesis appears an empirical, more than a - logico\u2010mathematical, proposition. We review the main approaches to computation - beyond Turing definability (\u2018hypercomputation\u2019): supertask, non\u2010well\u2010founded, - analog, quantum, and retrocausal computation. These models depend on infinite - computation, explicitly or implicitly, and appear physically implausible; - moreover, even if infinite computation were realizable, the Halting Problem - would not be affected. Therefore, Thesis P is not essentially different from - the standard Church\u2010Turing Thesis. 1Introduction 2Computability and incomputability - 3The physical interpretation of the Church\u2010Turing Thesis 4Supertasks - and infinite computation 5Computation on non\u2010well\u2010founded domains - 6Analog computation 7Quantum computation 8Retrocausal computation 9Conclusions", - "venue": "British Journal for the Philosophy of Science", "year": 2003, "referenceCount": - 146, "citationCount": 52, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2003-06-01", "journal": {"name": "The British - Journal for the Philosophy of Science", "pages": "181 - 223", "volume": "54"}, - "authors": [{"authorId": "1700111", "name": "Paolo Cotogno"}]}, {"paperId": - "cd5b743cd9a667990009e179bf947307da525f39", "externalIds": {"DBLP": "conf/lics/AsarinB01", - "MAG": "1884366842", "DOI": "10.1109/LICS.2001.932503", "CorpusId": 3142958}, - "url": "https://www.semanticscholar.org/paper/cd5b743cd9a667990009e179bf947307da525f39", - "title": "Perturbed Turing machines and hybrid systems", "abstract": "Investigates - the computational power of several models of dynamical systems under infinitesimal - perturbations of their dynamics. We consider models for both discrete- and - continuous-time dynamical systems: Turing machines, piecewise affine maps, - linear hybrid automata and piecewise-constant derivative systems (a simple - model of hybrid systems). We associate with each of these models a notion - of perturbed dynamics by a small /spl epsi/ (w.r.t. to a suitable metric), - and define the perturbed reachability relation as the intersection of all - reachability relations obtained by /spl epsi/-perturbations, for all possible - values of /spl epsi/. We show that, for the four kinds of models we consider, - the perturbed reachability relation is co-recursively enumerable (co-r.e.), - and that any co-r.e. relation can be defined as the perturbed reachability - relation of such models. A corollary of this result is that systems that are - robust (i.e. whose reachability relation is stable under infinitesimal perturbation) - are decidable.", "venue": "Proceedings 16th Annual IEEE Symposium on Logic - in Computer Science", "year": 2001, "referenceCount": 23, "citationCount": - 54, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2001-06-16", "journal": {"name": "Proceedings - 16th Annual IEEE Symposium on Logic in Computer Science", "pages": "269-278"}, - "authors": [{"authorId": "1736198", "name": "E. Asarin"}, {"authorId": "1718634", - "name": "A. Bouajjani"}]}, {"paperId": "b75d31665efcb6e4e6d136e7d9ef5f4b5754b6f4", - "externalIds": {"MAG": "2951408860", "DBLP": "journals/mlq/HamkinsS01", "ArXiv": - "math/9907044", "DOI": "10.1002/1521-3870(200105)47:2%3C271::AID-MALQ271%3E3.0.CO;2-6", - "CorpusId": 14582921}, "url": "https://www.semanticscholar.org/paper/b75d31665efcb6e4e6d136e7d9ef5f4b5754b6f4", - "title": "Infinite Time Turing Machines With Only One Tape", "abstract": "Infinite - time Turing machines with only one tape are in many respects fully as powerful - as their multi-tape cousins. In particular, the two models of machine give - rise to the same class of decidable sets, the same degree structure and, at - least for partial functions f : \u211d \u2115, the same class of computable - functions. Nevertheless, there are infinite time computable functions f : - \u211d \u211d that are not one-tape computable, and so the two models of infinitary - computation are not equivalent. Surprisingly, the class of one-tape computable - functions is not closed under composition; but closing it under composition - yields the full class of all infinite time computable functions. Finally, - every ordinal that is clockable by an infinite time Turing machine is clockable - by a one-tape machine, except certain isolated ordinals that end gaps in the - clockable ordinals.", "venue": "Math. Log. Q.", "year": 1999, "referenceCount": - 3, "citationCount": 40, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1999-07-07", "journal": {"name": "Math. - Log. Q.", "pages": "271-287", "volume": "47"}, "authors": [{"authorId": "1755318", - "name": "J. Hamkins"}, {"authorId": "39604321", "name": "D. Seabold"}]}, {"paperId": - "9d14202106fec52c53bbb5d5d292cd7204843767", "externalIds": {"MAG": "2169290950", - "DOI": "10.1093/ANALYS/58.2.128", "CorpusId": 123570820}, "url": "https://www.semanticscholar.org/paper/9d14202106fec52c53bbb5d5d292cd7204843767", - "title": "Turing\u2019s O-machines, Searle, Penrose and the brain", "abstract": - "Analogies offered in the literature include hurricanes, the motion of the - planets around the sun, and the digestion of pizza. None of these phenomena - is itself computational in nature yet, supposedly, all can be simulated perfectly - by a Turing machine (in the sense that the machine can compute descriptions - of the phenomena to any desired number of decimal places and on any temporal - grid). (2) is Searle''s position (1992, 1997).", "venue": "", "year": 1998, - "referenceCount": 30, "citationCount": 53, "influentialCitationCount": 6, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-04-01", - "journal": {"name": "Analysis", "pages": "128-138", "volume": "58"}, "authors": - [{"authorId": "144246233", "name": "B. Copeland"}]}, {"paperId": "715ce9ca8b3ce2c740aba91c4b7d83ef926e9492", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "J. ACM", "pages": "168-177", + "volume": "16"}, "authors": [{"authorId": "1706504", "name": "J. Hopcroft"}, + {"authorId": "1742391", "name": "J. Ullman"}]}, {"paperId": "715ce9ca8b3ce2c740aba91c4b7d83ef926e9492", "externalIds": {"DBLP": "conf/dlt/KudlekR01", "MAG": "1513287292", "DOI": - "10.1007/3-540-46011-X_27", "CorpusId": 3441659}, "url": "https://www.semanticscholar.org/paper/715ce9ca8b3ce2c740aba91c4b7d83ef926e9492", + "10.1007/3-540-46011-X_27", "CorpusId": 3441659}, "corpusId": 3441659, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/715ce9ca8b3ce2c740aba91c4b7d83ef926e9492", "title": "A Universal Turing Machine with 3 States and 9 Symbols", "abstract": null, "venue": "Developments in Language Theory", "year": 2001, "referenceCount": 16, "citationCount": 47, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-07-16", "journal": {"pages": "311-318"}, "authors": [{"authorId": "1686711", - "name": "M. Kudlek"}, {"authorId": "1691124", "name": "Yurii Rogozhin"}]}, - {"paperId": "b0890d6c90519ac22aec1fa6b0386b74e5db09fa", "externalIds": {"DBLP": - "journals/mima/Sterrett00", "MAG": "1896925553", "DOI": "10.1023/A:1011242120015", - "CorpusId": 9600264}, "url": "https://www.semanticscholar.org/paper/b0890d6c90519ac22aec1fa6b0386b74e5db09fa", - "title": "Turing''s Two Tests for Intelligence*", "abstract": null, "venue": - "Minds and Machines", "year": 2000, "referenceCount": 36, "citationCount": - 42, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-11-01", "journal": - {"name": "Minds and Machines", "pages": "541-559", "volume": "10"}, "authors": - [{"authorId": "2663291", "name": "S. G. Sterrett"}]}, {"paperId": "d8edc75260b167816a023e77ae579f61365ffab5", - "externalIds": {"MAG": "1999453928", "DOI": "10.1109/81.224308", "CorpusId": - 61517189}, "url": "https://www.semanticscholar.org/paper/d8edc75260b167816a023e77ae579f61365ffab5", - "title": "The CNN is universal as the Turing machine", "abstract": "It is - shown that the game of life algorithm, which is equivalent to a Turing machine, - can be realized by a cellular neural network (CNN). Thus the CNN is also universal. - >", "venue": "", "year": 1993, "referenceCount": 8, "citationCount": 61, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1993-04-01", "journal": {"name": "IEEE Transactions on Circuits and Systems - I-regular Papers", "pages": "289-291", "volume": "40"}, "authors": [{"authorId": - "144848684", "name": "L. Chua"}, {"authorId": "1772490", "name": "T. Roska"}, - {"authorId": "39661376", "name": "P. L. Venetianer"}]}, {"paperId": "db8d6a236588e7d82f5c8df42a66b26802914bce", - "externalIds": {"MAG": "2031388675", "DOI": "10.1063/1.462450", "CorpusId": - 95776507}, "url": "https://www.semanticscholar.org/paper/db8d6a236588e7d82f5c8df42a66b26802914bce", - "title": "Conventional and unconventional Turing patterns", "abstract": "The - formation of two\u2010dimensional Turing patterns in nonequilibrium chemical - systems is studied by numerical simulations with an activator\u2010substrate - depletion model. The relative stabilities of the different hexagonal patterns - and the striped patterns are discussed, in particular in the vicinity of the - transition, and compared with the present state theory. The generic instabilities - of the striped patterns are evidenced. In particular, we report the formation - of stable zigzag patterns which share features both of one\u2010dimensional - and two\u2010dimensional patterns. We also provide examples of temporal evolution - in a weakly confined system.", "venue": "", "year": 1992, "referenceCount": - 26, "citationCount": 78, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Journal - of Chemical Physics", "pages": "664-673", "volume": "96"}, "authors": [{"authorId": - "91298566", "name": "V. Dufiet"}, {"authorId": "2313078", "name": "J. Boissonade"}]}, - {"paperId": "592e55584ba946992beb03602f012d492a2d649e", "externalIds": {"MAG": - "2082778556", "DBLP": "journals/jsyml/JonesS74", "DOI": "10.1145/800152.804909", - "CorpusId": 10173313}, "url": "https://www.semanticscholar.org/paper/592e55584ba946992beb03602f012d492a2d649e", - "title": "Turing machines and the spectra of first-order formulas with equality", - "abstract": "In this paper we show that these similarities are not accidental - - that spectra and context sensitive languages are closely related, and that - their open questions are merely special cases of a family of open questions - which relate to the difference (if any) between deterministic and non-deterministic - time-or space-bounded Turing machines.", "venue": "Journal of Symbolic Logic - (JSL)", "year": 1972, "referenceCount": 13, "citationCount": 124, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book"], "publicationDate": "1972-05-01", "journal": {"name": "Proceedings - of the fourth annual ACM symposium on Theory of computing"}, "authors": [{"authorId": - "1700623", "name": "N. Jones"}, {"authorId": "2411373", "name": "A. Selman"}]}, - {"paperId": "8fa7bbe0a6ded0f7216c1fea9d6c62015a5839a5", "externalIds": {"MAG": - "273047393", "CorpusId": 408631}, "url": "https://www.semanticscholar.org/paper/8fa7bbe0a6ded0f7216c1fea9d6c62015a5839a5", + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-07-16", "journal": {"pages": "311-318"}, "authors": + [{"authorId": "1686711", "name": "M. Kudlek"}, {"authorId": "1691124", "name": + "Yurii Rogozhin"}]}, {"paperId": "3012f2504ddb9d527ad57a56561f4f72aa04285c", + "externalIds": {"MAG": "1566710022", "CorpusId": 54125748}, "corpusId": 54125748, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3012f2504ddb9d527ad57a56561f4f72aa04285c", + "title": "How to Pass the Turing Test by Cheating", "abstract": "Back in the + heyday of computer hardware, some notable people actually believed that sentient + computer programs were literally just around the corner. This prompted the + great British mathemetician, Alan Turing, to devise a simple test of intelligence. + If a computer program could pass the Turing test, then it could be said to + be exhibiting intelligence. In 1991, the Cambridge Centre for Behavioural + Studies held the first formal instantiation of the Turing Test. In this incarnation + the test was known as the Loebner contest, as Dr. Hugh Loebner pledged a $100,000 + grand prize for the first computer program to pass the test. I have submitted + two computer programs to the 1996 Loebner contest, which is to be held on + Friday April 19 in New York city. These computer programs are nothing more + than glorious hacks, but in constructing them I have learned a great deal + about how language works. In this paper I will describe in detail how my computer + programs work, and will make comparisons with similar computer programs such + as ELIZA. After this, I will explain why the Loebner contest is doomed to + failure.", "venue": "", "year": 1997, "referenceCount": 15, "citationCount": + 44, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2537971", + "name": "Jason L. Hutchens"}]}, {"paperId": "8fa7bbe0a6ded0f7216c1fea9d6c62015a5839a5", + "externalIds": {"MAG": "273047393", "CorpusId": 408631}, "corpusId": 408631, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8fa7bbe0a6ded0f7216c1fea9d6c62015a5839a5", "title": "Computing over the Reals: Where Turing Meets Newton", "abstract": "The classical (Turing) theory of computation has been extraordinarily successful in providing the foundations and framework for theoretical computer science. @@ -7916,95 +8769,221 @@ interactions: some background (section 2) and motivation (section 3), then we present our unifying model (section 4) and main complexity results (section 5) and finally, we see Turing meet Newton and fundamental links introduced (section 6).", - "venue": "", "year": 2004, "referenceCount": 98, "citationCount": 47, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "40642563", - "name": "L. Blum"}]}, {"paperId": "30340ced6413176c1b708f74229eb25b7ee70afd", - "externalIds": {"DBLP": "journals/jacm/Wang57", "MAG": "1981789328", "DOI": - "10.1145/320856.320867", "CorpusId": 29040872}, "url": "https://www.semanticscholar.org/paper/30340ced6413176c1b708f74229eb25b7ee70afd", - "title": "A Variant to Turing''s Theory of Computing Machines", "abstract": - "The principal purpose of this paper is to offer a theory which is closely - related to Turing''s [1] but is more economical in the basic operations. I - t will be proved that a theoretically simple basic machine can be imagined - and specified such tha t all partial recursive functions (and hence all solvable - computation problems) can be computed by it and tha t only four basic types - of instruction are employed for the programs: shift left one space, shift - right one space, mark a blank space, conditional transfer. In particular, - erasing is dispensable, one symbol for marking is sufficient, and one kind - of transfer is enough. The reduction is somewhat similar to the realization - of, for instance, the definability of conjunction and implication in terms - of negation and disjunction, or of the definability of all these in terms - of Sheffer''s stroke function. As a result, i t becomes less direct to prove - that certain things can be done by the machines, but a little easier to prove - that certain things cannot be done. This serf-contained theory will b e presented, - as far as possible, in a language which is familiar to those who are engaged - in the use and construction of largescale computers. Turing''s theory of computable - functions antedated but has not much influenced the extensive actual construction - of digital computers. These two aspects of theory and practice have been developed - almost entirely independently of each other. The main reason is undoubtedly - that logicians are interested in questions radically different from those - with which the applied mathematicians and electrical engineers are primarily - concerned. I t cannot, however, fail to strike one as rather strange that - often the same concepts are expressed by very different terms in the two developments. - One is even inclined to ask whether a rapprochement might not produce some - good effect. This paper wiU, it is believed, be of use to those who wish to - compare and connect the two approaches. Extensive use of Turing [1] and Kleene - [2] (Chapter XI I I ) will be made, although the exposition is sufficient - in itself.", "venue": "JACM", "year": 1957, "referenceCount": 6, "citationCount": - 146, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "J. ACM", "pages": "63-92", "volume": "4"}, "authors": [{"authorId": - "48016786", "name": "Hao Wang"}]}, {"paperId": "4641554df1edc503f448e7603a7c869541eded51", - "externalIds": {"DBLP": "conf/mcu/Baiocchi01", "MAG": "1573866315", "DOI": - "10.1007/3-540-45132-3_1", "CorpusId": 46212367}, "url": "https://www.semanticscholar.org/paper/4641554df1edc503f448e7603a7c869541eded51", - "title": "Three Small Universal Turing Machines", "abstract": null, "venue": - "Machines, Computations, and Universality", "year": 2001, "referenceCount": - 4, "citationCount": 47, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-05-23", "journal": {"pages": "1-10"}, "authors": [{"authorId": "3221721", - "name": "C. Baiocchi"}]}, {"paperId": "515bb8fc0a718185375a6bc2d885ca9311308897", - "externalIds": {"DBLP": "conf/sofsem/LeeuwenW01", "MAG": "1572083989", "DOI": - "10.1007/3-540-45627-9_8", "CorpusId": 22290151}, "url": "https://www.semanticscholar.org/paper/515bb8fc0a718185375a6bc2d885ca9311308897", - "title": "Beyond the Turing Limit: Evolving Interactive Systems", "abstract": - null, "venue": "Conference on Current Trends in Theory and Practice of Informatics", - "year": 2001, "referenceCount": 39, "citationCount": 56, "influentialCitationCount": - 10, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-11-24", "journal": {"pages": "90-109"}, "authors": - [{"authorId": "143817739", "name": "J. V. Leeuwen"}, {"authorId": "1815433", - "name": "J. Wiedermann"}]}, {"paperId": "f5c213e2318ea524e2fa7e8eba1cafc24efee43d", - "externalIds": {"DBLP": "conf/its/PersonG02", "MAG": "142045955", "DOI": "10.1007/3-540-47987-2_82", - "CorpusId": 26440193}, "url": "https://www.semanticscholar.org/paper/f5c213e2318ea524e2fa7e8eba1cafc24efee43d", - "title": "Human or Computer? AutoTutor in a Bystander Turing Test", "abstract": - null, "venue": "International Conference on Intelligent Tutoring Systems", - "year": 2002, "referenceCount": 20, "citationCount": 46, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2002-06-02", "journal": {"pages": "821-830"}, "authors": - [{"authorId": "1781613", "name": "N. Person"}, {"authorId": "1769251", "name": - "A. Graesser"}]}, {"paperId": "7eae4aaf2a93925c08fbaa48f4420100e432eac2", - "externalIds": {"MAG": "203509298", "CorpusId": 60310493}, "url": "https://www.semanticscholar.org/paper/7eae4aaf2a93925c08fbaa48f4420100e432eac2", + "venue": "", "year": 2004, "referenceCount": 98, "citationCount": 49, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "40642563", "name": "L. Blum"}]}, + {"paperId": "af81e7c823221e30b35edfd65053310b718ac7b7", "externalIds": {"MAG": + "2145013194", "DBLP": "journals/mima/Piccinini03", "DOI": "10.1023/A:1021348629167", + "CorpusId": 5866238}, "corpusId": 5866238, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/af81e7c823221e30b35edfd65053310b718ac7b7", + "title": "Alan Turing and the Mathematical Objection", "abstract": null, "venue": + "Minds and Machines", "year": 2003, "referenceCount": 110, "citationCount": + 46, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-02-01", "journal": {"name": "Minds and Machines", "pages": "23-48", + "volume": "13"}, "authors": [{"authorId": "144363427", "name": "G. Piccinini"}]}, + {"paperId": "b75d31665efcb6e4e6d136e7d9ef5f4b5754b6f4", "externalIds": {"MAG": + "2951408860", "DBLP": "journals/mlq/HamkinsS01", "ArXiv": "math/9907044", + "DOI": "10.1002/1521-3870(200105)47:2%3C271::AID-MALQ271%3E3.0.CO;2-6", "CorpusId": + 14582921}, "corpusId": 14582921, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b75d31665efcb6e4e6d136e7d9ef5f4b5754b6f4", + "title": "Infinite Time Turing Machines With Only One Tape", "abstract": "Infinite + time Turing machines with only one tape are in many respects fully as powerful + as their multi-tape cousins. In particular, the two models of machine give + rise to the same class of decidable sets, the same degree structure and, at + least for partial functions f : \u211d \u2115, the same class of computable + functions. Nevertheless, there are infinite time computable functions f : + \u211d \u211d that are not one-tape computable, and so the two models of infinitary + computation are not equivalent. Surprisingly, the class of one-tape computable + functions is not closed under composition; but closing it under composition + yields the full class of all infinite time computable functions. Finally, + every ordinal that is clockable by an infinite time Turing machine is clockable + by a one-tape machine, except certain isolated ordinals that end gaps in the + clockable ordinals.", "venue": "Math. Log. Q.", "year": 1999, "referenceCount": + 3, "citationCount": 40, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/math/9907044", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1999-07-07", "journal": {"name": "Math. + Log. Q.", "pages": "271-287", "volume": "47"}, "authors": [{"authorId": "1755318", + "name": "J. Hamkins"}, {"authorId": "39604321", "name": "D. Seabold"}]}, {"paperId": + "592e55584ba946992beb03602f012d492a2d649e", "externalIds": {"MAG": "2082778556", + "DBLP": "journals/jsyml/JonesS74", "DOI": "10.1145/800152.804909", "CorpusId": + 10173313}, "corpusId": 10173313, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/592e55584ba946992beb03602f012d492a2d649e", + "title": "Turing machines and the spectra of first-order formulas with equality", + "abstract": "In this paper we show that these similarities are not accidental + - that spectra and context sensitive languages are closely related, and that + their open questions are merely special cases of a family of open questions + which relate to the difference (if any) between deterministic and non-deterministic + time-or space-bounded Turing machines.", "venue": "Journal of Symbolic Logic + (JSL)", "year": 1972, "referenceCount": 13, "citationCount": 124, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "1972-05-01", + "journal": {"name": "Proceedings of the fourth annual ACM symposium on Theory + of computing"}, "authors": [{"authorId": "1700623", "name": "N. Jones"}, {"authorId": + "2411373", "name": "A. Selman"}]}, {"paperId": "3210145910ce47d8822988fb8baac20f0502b247", + "externalIds": {"MAG": "2019481580", "DOI": "10.1007/BF00280170", "CorpusId": + 9875501, "PubMed": "3351393"}, "corpusId": 9875501, "publicationVenue": {"id": + "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical Biology", + "type": "journal", "alternate_names": ["J Math Biology"], "issn": "0303-6812", + "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/3210145910ce47d8822988fb8baac20f0502b247", + "title": "Size adaptation of turing prepatterns", "abstract": null, "venue": + "Journal of Mathematical Biology", "year": 1988, "referenceCount": 19, "citationCount": + 66, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Journal of Mathematical Biology", + "pages": "27-39", "volume": "26"}, "authors": [{"authorId": "3259338", "name": + "A. Hunding"}, {"authorId": "1452226406", "name": "Preben Graae S\u00f8rensen"}]}, + {"paperId": "f6bdf9382d7d629d416ca36c40ffcf348f28ab12", "externalIds": {"MAG": + "2051481378", "DOI": "10.1093/bjps/54.2.181", "CorpusId": 17915665}, "corpusId": + 17915665, "publicationVenue": {"id": "ccf23a34-337a-4763-916a-9c16c580e0e1", + "name": "British Journal for the Philosophy of Science", "type": "journal", + "alternate_names": ["Br J Philos Sci", "The British Journal for the Philosophy + of Science"], "issn": "0007-0882", "url": "https://www.journals.uchicago.edu/toc/bjps/current", + "alternate_urls": ["https://www.jstor.org/journal/britjphilscie", "http://bjps.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/f6bdf9382d7d629d416ca36c40ffcf348f28ab12", + "title": "Hypercomputation and the Physical Church\u2010Turing Thesis", "abstract": + "A version of the Church\u2010Turing Thesis states that every effectively + realizable physical system can be defined by Turing Machines (\u2018Thesis + P\u2019); in this formulation the Thesis appears an empirical, more than a + logico\u2010mathematical, proposition. We review the main approaches to computation + beyond Turing definability (\u2018hypercomputation\u2019): supertask, non\u2010well\u2010founded, + analog, quantum, and retrocausal computation. These models depend on infinite + computation, explicitly or implicitly, and appear physically implausible; + moreover, even if infinite computation were realizable, the Halting Problem + would not be affected. Therefore, Thesis P is not essentially different from + the standard Church\u2010Turing Thesis. 1Introduction 2Computability and incomputability + 3The physical interpretation of the Church\u2010Turing Thesis 4Supertasks + and infinite computation 5Computation on non\u2010well\u2010founded domains + 6Analog computation 7Quantum computation 8Retrocausal computation 9Conclusions", + "venue": "British Journal for the Philosophy of Science", "year": 2003, "referenceCount": + 146, "citationCount": 52, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2003-06-01", "journal": + {"name": "The British Journal for the Philosophy of Science", "pages": "181 + - 223", "volume": "54"}, "authors": [{"authorId": "1700111", "name": "Paolo + Cotogno"}]}, {"paperId": "7eae4aaf2a93925c08fbaa48f4420100e432eac2", "externalIds": + {"MAG": "203509298", "CorpusId": 60310493}, "corpusId": 60310493, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7eae4aaf2a93925c08fbaa48f4420100e432eac2", "title": "EVEN TURING MACHINES CAN COMPUTE UNCOMPUTABLE FUNCTIONS", "abstract": "Accelerated Turing machines are Turing machines that perform tasks commonly regarded as impossible, such as computing the halting function. The existence of these notional machines has obvious implications concerning the theoretical limits of computability.", "venue": "", "year": 1998, "referenceCount": 24, "citationCount": 66, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "144246233", "name": - "B. Copeland"}]}, {"paperId": "4d44e5aff974e9b23443a8c5ef8d5d24dc6ff500", - "externalIds": {"DBLP": "conf/focs/Kozen76", "MAG": "2026191634", "DOI": "10.1109/SFCS.1976.20", - "CorpusId": 10055267}, "url": "https://www.semanticscholar.org/paper/4d44e5aff974e9b23443a8c5ef8d5d24dc6ff500", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144246233", + "name": "B. Copeland"}]}, {"paperId": "8d0a0be84735f4448d893ec80a78168e1f0547e8", + "externalIds": {"MAG": "2114485587", "DBLP": "journals/jolli/Hernandez-Orallo00", + "DOI": "10.1023/A:1008367325700", "CorpusId": 14481982}, "corpusId": 14481982, + "publicationVenue": {"id": "9bbf8016-cf61-4c32-9314-fb8139ad6697", "name": + "Journal of Logic, Language and Information", "type": "journal", "alternate_names": + ["J Log Lang Inf"], "issn": "0925-8531", "url": "http://www.springer.com/philosophy/logic/journal/10849", + "alternate_urls": ["http://www.jstor.org/action/showPublication?journalCode=jlogiclanginfo", + "https://www.jstor.org/journal/jlogiclanginfo"]}, "url": "https://www.semanticscholar.org/paper/8d0a0be84735f4448d893ec80a78168e1f0547e8", + "title": "Beyond the Turing Test", "abstract": null, "venue": "Journal of + Logic, Language and Information", "year": 2000, "referenceCount": 89, "citationCount": + 54, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-10-01", "journal": {"name": "Journal of Logic, Language and Information", + "pages": "447-466", "volume": "9"}, "authors": [{"authorId": "1398777358", + "name": "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "e685e94db384d5d684cdac6789dead7882060d06", + "externalIds": {"DBLP": "journals/ita/OzawaN00", "MAG": "2953353263", "ArXiv": + "quant-ph/9811069", "DOI": "10.1051/ita:2000123", "CorpusId": 9934267}, "corpusId": + 9934267, "publicationVenue": {"id": "d12c3a65-648c-4215-a74e-25ab6c85d42f", + "name": "RAIRO - Theoretical Informatics and Applications", "type": "journal", + "alternate_names": ["RAIRO Theor Informatics Appl", "Theoretical Informatics + and Applications", "Theor Informatics Appl"], "issn": "0988-3754", "url": + "http://www.numdam.org/journals/ITA/", "alternate_urls": ["http://www.rairo-ita.org/action/displayJournal?jid=ITA", + "https://www.rairo-ita.org/"]}, "url": "https://www.semanticscholar.org/paper/e685e94db384d5d684cdac6789dead7882060d06", + "title": "Local transition functions of quantum Turing machines", "abstract": + "Foundations of the notion of quantum Turing machines are investigated. According + to Deutsch''s formulation, the time evolution of a quantum Turing machine + is to be determined by the local transition function. In this paper, the local + transition functions are characterized for fully general quantum Turing machines, + including multi-tape quantum Turing machines, extending the results due to + Bernstein and Vazirani.", "venue": "RAIRO - Theoretical Informatics and Applications", + "year": 1998, "referenceCount": 10, "citationCount": 42, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/9811069", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1998-11-25", "journal": + {"name": "RAIRO Theor. Informatics Appl.", "pages": "379-402", "volume": "34"}, + "authors": [{"authorId": "1744207", "name": "M. Ozawa"}, {"authorId": "1735518", + "name": "H. Nishimura"}]}, {"paperId": "41ac1aeada172897fd83a629e28a68f7ca53c15c", + "externalIds": {"DBLP": "journals/jsyml/Hooper66", "MAG": "2161843469", "DOI": + "10.2307/2269811", "CorpusId": 8930758}, "corpusId": 8930758, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/41ac1aeada172897fd83a629e28a68f7ca53c15c", + "title": "The undecidability of the Turing machine immortality problem", "abstract": + "A Turing Machine (TM) is an abstract, synchronous, deterministic computer + with a finite number of internal states. It operates on the set of infinite + words, or tapes, over some finite alphabet, scanning exactly one symbol of + the tape at a time. (Only a 2-symbol alphabet, consisting of \u201c0\u201d + and \u201c|\u201d, will be considered here, and the scanned symbol of a tape + will be distinguished by an underscore.) depending upon its internal state + and the symbol under scan, it can perform one or more of the following operations: + replace the scanned symbol with a new symbol, focus its attention on an adjacent + square, and transfer control to a new state.", "venue": "Journal of Symbolic + Logic (JSL)", "year": 1966, "referenceCount": 13, "citationCount": 112, "influentialCitationCount": + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1966-06-01", "journal": {"name": "Journal + of Symbolic Logic", "pages": "219 - 234", "volume": "31"}, "authors": [{"authorId": + "21406268", "name": "Philip K. Hooper"}]}, {"paperId": "ad0a60d597c34163f80c0268961288352eb30102", + "externalIds": {"MAG": "1526571572", "DBLP": "conf/sofsem/TadakiYL04", "ArXiv": + "cs/0310046", "DOI": "10.1007/978-3-540-24618-3_29", "CorpusId": 6455654}, + "corpusId": 6455654, "publicationVenue": {"id": "74136324-6e61-46d3-912f-8be85580ef40", + "name": "Conference on Current Trends in Theory and Practice of Informatics", + "type": "conference", "alternate_names": ["SOFSEM", "Conf Curr Trends Theory + Pract Informatics"]}, "url": "https://www.semanticscholar.org/paper/ad0a60d597c34163f80c0268961288352eb30102", + "title": "Theory of One Tape Linear Time Turing Machines", "abstract": null, + "venue": "Conference on Current Trends in Theory and Practice of Informatics", + "year": 2003, "referenceCount": 60, "citationCount": 46, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/cs/0310046", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-10-23", "journal": {"name": "ArXiv", "volume": "cs.CC/0310046"}, + "authors": [{"authorId": "145138821", "name": "K. Tadaki"}, {"authorId": "1699072", + "name": "T. Yamakami"}, {"authorId": "22986494", "name": "Jack C. H. Lin"}]}, + {"paperId": "4d44e5aff974e9b23443a8c5ef8d5d24dc6ff500", "externalIds": {"DBLP": + "conf/focs/Kozen76", "MAG": "2026191634", "DOI": "10.1109/SFCS.1976.20", "CorpusId": + 10055267}, "corpusId": 10055267, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4d44e5aff974e9b23443a8c5ef8d5d24dc6ff500", "title": "On parallelism in turing machines", "abstract": "A model of parallel computation based on a generalization of nondeterminism in Turing machines is introduced. Complexity classes //T(n)-TIME, //L(n)-SPACE, //LOGSPACE, //PTIME, @@ -8023,152 +9002,216 @@ interactions: regular sets, in general 22k states are necessary and sufficient to simulate a k-state parallel finite automaton deterministically.", "venue": "17th Annual Symposium on Foundations of Computer Science (sfcs 1976)", "year": 1976, "referenceCount": - 7, "citationCount": 117, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1976-10-25", "journal": - {"name": "17th Annual Symposium on Foundations of Computer Science (sfcs 1976)", - "pages": "89-97"}, "authors": [{"authorId": "1700801", "name": "D. Kozen"}]}, - {"paperId": "61ee579a37c6d72ac9893b1514b93bf8eb3bff77", "externalIds": {"MAG": - "2289358840", "CorpusId": 61836603}, "url": "https://www.semanticscholar.org/paper/61ee579a37c6d72ac9893b1514b93bf8eb3bff77", - "title": "A 1-Tape 2-Symbol Reversible Turing Machine", "abstract": "Bennett - proved that any irreversible Turing machine can be simulated by a reversible - one. However, Bennett'' s reversible machine uses 3 tapes and many tape symbols. - Previ\u00ad ously, Gono and Morita showed that the number of symbols can be - reduced to 2. In this paper, by improving these methods, we give a procedure - to convert an irreversible machine into an equivalent 1-tape 2-symbol reversible - machine. First, it is shown that the \"state-degeneration degree\" of any - Turing machine can be reduced to 2 or less. Using this result and some other - tech\u00ad niques, a given irreversible machine is converted into a 1-tape - 32-symbol (i. e., 5-track 2-symbol) reversible machine. Finally the 32-symbol - machine is converted into a 1-tape 2-symbol reversible machine. From this - result, it is seen that a 1-tape 2-symbol reversible Turing machine is computation - universal.", "venue": "", "year": 1989, "referenceCount": 5, "citationCount": - 62, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1989-03-25", "journal": {"name": - "IEICE Transactions on Fundamentals of Electronics, Communications and Computer - Sciences", "pages": "223-228", "volume": "72"}, "authors": [{"authorId": "144254676", - "name": "K. Morita"}, {"authorId": "93171949", "name": "A. Shirasaki"}, {"authorId": - "92737699", "name": "Y. Gono"}]}, {"paperId": "2b5e03a3d1453a3f1c9b9a9aad9fdecd339d9f6f", + 7, "citationCount": 117, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1976-10-25", "journal": {"name": "17th Annual Symposium on Foundations of + Computer Science (sfcs 1976)", "pages": "89-97"}, "authors": [{"authorId": + "1700801", "name": "D. Kozen"}]}, {"paperId": "2b5e03a3d1453a3f1c9b9a9aad9fdecd339d9f6f", "externalIds": {"MAG": "2074800791", "DBLP": "journals/jolli/Harnad00", "DOI": - "10.1023/A:1008315308862", "CorpusId": 1911720}, "url": "https://www.semanticscholar.org/paper/2b5e03a3d1453a3f1c9b9a9aad9fdecd339d9f6f", + "10.1023/A:1008315308862", "CorpusId": 1911720}, "corpusId": 1911720, "publicationVenue": + {"id": "9bbf8016-cf61-4c32-9314-fb8139ad6697", "name": "Journal of Logic, + Language and Information", "type": "journal", "alternate_names": ["J Log Lang + Inf"], "issn": "0925-8531", "url": "http://www.springer.com/philosophy/logic/journal/10849", + "alternate_urls": ["http://www.jstor.org/action/showPublication?journalCode=jlogiclanginfo", + "https://www.jstor.org/journal/jlogiclanginfo"]}, "url": "https://www.semanticscholar.org/paper/2b5e03a3d1453a3f1c9b9a9aad9fdecd339d9f6f", "title": "Minds, Machines and Turing", "abstract": null, "venue": "Journal of Logic, Language and Information", "year": 2000, "referenceCount": 41, "citationCount": - 45, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2000-10-01", "journal": {"name": "Journal - of Logic, Language and Information", "pages": "425-445", "volume": "9"}, "authors": - [{"authorId": "2293327", "name": "S. Harnad"}]}, {"paperId": "3210145910ce47d8822988fb8baac20f0502b247", - "externalIds": {"MAG": "2019481580", "DOI": "10.1007/BF00280170", "CorpusId": - 9875501, "PubMed": "3351393"}, "url": "https://www.semanticscholar.org/paper/3210145910ce47d8822988fb8baac20f0502b247", - "title": "Size adaptation of turing prepatterns", "abstract": null, "venue": - "Journal of Mathematical Biology", "year": 1988, "referenceCount": 19, "citationCount": - 66, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Journal of Mathematical Biology", - "pages": "27-39", "volume": "26"}, "authors": [{"authorId": "3259338", "name": - "A. Hunding"}, {"authorId": "1452226406", "name": "Preben Graae S\u00f8rensen"}]}, - {"paperId": "8d0a0be84735f4448d893ec80a78168e1f0547e8", "externalIds": {"MAG": - "2114485587", "DBLP": "journals/jolli/Hernandez-Orallo00", "DOI": "10.1023/A:1008367325700", - "CorpusId": 14481982}, "url": "https://www.semanticscholar.org/paper/8d0a0be84735f4448d893ec80a78168e1f0547e8", - "title": "Beyond the Turing Test", "abstract": null, "venue": "Journal of - Logic, Language and Information", "year": 2000, "referenceCount": 89, "citationCount": - 54, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 45, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2000-10-01", "journal": - {"name": "Journal of Logic, Language and Information", "pages": "447-466", - "volume": "9"}, "authors": [{"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}]}, - {"paperId": "204a50270ccadcbc8da2687e85858b1f87297c03", "externalIds": {"MAG": - "2137950128", "DOI": "10.1007/S002850050135", "CorpusId": 14463923}, "url": - "https://www.semanticscholar.org/paper/204a50270ccadcbc8da2687e85858b1f87297c03", - "title": "Unravelling the Turing bifurcation using spatially varying diffusion - coefficients", "abstract": null, "venue": "", "year": 1998, "referenceCount": - 34, "citationCount": 66, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-11-05", "journal": {"name": - "Journal of Mathematical Biology", "pages": "381-417", "volume": "37"}, "authors": - [{"authorId": "46180663", "name": "D. L. Benson"}, {"authorId": "2339973", - "name": "P. Maini"}, {"authorId": "1890610", "name": "J. Sherratt"}]}, {"paperId": - "3888028ecc976f5a5786152ebc418559896da53c", "externalIds": {"DBLP": "journals/tsp/Nadas85a", - "MAG": "2168938909", "DOI": "10.1109/TASSP.1985.1164728", "CorpusId": 39705397}, - "url": "https://www.semanticscholar.org/paper/3888028ecc976f5a5786152ebc418559896da53c", - "title": "On Turing''s formula for word probabilities", "abstract": "A. M. - Turing, in a 1941 personal communication to I. J. Good, suggested a formula - for estimating probabilities of words in text and, more generally, of species - in a mixed population of various species. It is remarkable that Turing''s - formula can be obtained by significantly different statistical methods; we - compare three ways to obtain it.", "venue": "IEEE Transactions on Acoustics - Speech and Signal Processing", "year": 1985, "referenceCount": 4, "citationCount": - 100, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1985-12-01", "journal": - {"name": "IEEE Trans. Acoust. Speech Signal Process.", "pages": "1414-1416", - "volume": "33"}, "authors": [{"authorId": "150023694", "name": "A. N\u00e1das"}]}, - {"paperId": "af81e7c823221e30b35edfd65053310b718ac7b7", "externalIds": {"MAG": - "2145013194", "DBLP": "journals/mima/Piccinini03", "DOI": "10.1023/A:1021348629167", - "CorpusId": 5866238}, "url": "https://www.semanticscholar.org/paper/af81e7c823221e30b35edfd65053310b718ac7b7", - "title": "Alan Turing and the Mathematical Objection", "abstract": null, "venue": - "Minds and Machines", "year": 2003, "referenceCount": 110, "citationCount": - 46, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-02-01", "journal": - {"name": "Minds and Machines", "pages": "23-48", "volume": "13"}, "authors": - [{"authorId": "144363427", "name": "G. Piccinini"}]}, {"paperId": "e685e94db384d5d684cdac6789dead7882060d06", - "externalIds": {"DBLP": "journals/ita/OzawaN00", "MAG": "2953353263", "ArXiv": - "quant-ph/9811069", "DOI": "10.1051/ita:2000123", "CorpusId": 9934267}, "url": - "https://www.semanticscholar.org/paper/e685e94db384d5d684cdac6789dead7882060d06", - "title": "Local transition functions of quantum Turing machines", "abstract": - "Foundations of the notion of quantum Turing machines are investigated. According - to Deutsch''s formulation, the time evolution of a quantum Turing machine - is to be determined by the local transition function. In this paper, the local - transition functions are characterized for fully general quantum Turing machines, - including multi-tape quantum Turing machines, extending the results due to - Bernstein and Vazirani.", "venue": "RAIRO - Theoretical Informatics and Applications", - "year": 1998, "referenceCount": 10, "citationCount": 42, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": + {"name": "Journal of Logic, Language and Information", "pages": "425-445", + "volume": "9"}, "authors": [{"authorId": "2293327", "name": "S. Harnad"}]}, + {"paperId": "db8d6a236588e7d82f5c8df42a66b26802914bce", "externalIds": {"MAG": + "2031388675", "DOI": "10.1063/1.462450", "CorpusId": 95776507}, "corpusId": + 95776507, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/db8d6a236588e7d82f5c8df42a66b26802914bce", + "title": "Conventional and unconventional Turing patterns", "abstract": "The + formation of two\u2010dimensional Turing patterns in nonequilibrium chemical + systems is studied by numerical simulations with an activator\u2010substrate + depletion model. The relative stabilities of the different hexagonal patterns + and the striped patterns are discussed, in particular in the vicinity of the + transition, and compared with the present state theory. The generic instabilities + of the striped patterns are evidenced. In particular, we report the formation + of stable zigzag patterns which share features both of one\u2010dimensional + and two\u2010dimensional patterns. We also provide examples of temporal evolution + in a weakly confined system.", "venue": "", "year": 1992, "referenceCount": + 26, "citationCount": 78, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-11-25", "journal": - {"name": "RAIRO Theor. Informatics Appl.", "pages": "379-402", "volume": "34"}, - "authors": [{"authorId": "1744207", "name": "M. Ozawa"}, {"authorId": "1735518", - "name": "H. Nishimura"}]}, {"paperId": "ad0a60d597c34163f80c0268961288352eb30102", - "externalIds": {"MAG": "1526571572", "DBLP": "conf/sofsem/TadakiYL04", "ArXiv": - "cs/0310046", "DOI": "10.1007/978-3-540-24618-3_29", "CorpusId": 6455654}, - "url": "https://www.semanticscholar.org/paper/ad0a60d597c34163f80c0268961288352eb30102", - "title": "Theory of One Tape Linear Time Turing Machines", "abstract": null, - "venue": "SOFSEM", "year": 2003, "referenceCount": 60, "citationCount": 46, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2003-10-23", "journal": {"name": "ArXiv", - "volume": "cs.CC/0310046"}, "authors": [{"authorId": "145138821", "name": - "K. Tadaki"}, {"authorId": "1699072", "name": "T. Yamakami"}, {"authorId": - "22986494", "name": "Jack C. H. Lin"}]}, {"paperId": "42087341ddc543d864fac17fd06f377906a6e6dc", + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Journal + of Chemical Physics", "pages": "664-673", "volume": "96"}, "authors": [{"authorId": + "91298566", "name": "V. Dufiet"}, {"authorId": "2313078", "name": "J. Boissonade"}]}, + {"paperId": "cd5b743cd9a667990009e179bf947307da525f39", "externalIds": {"DBLP": + "conf/lics/AsarinB01", "MAG": "1884366842", "DOI": "10.1109/LICS.2001.932503", + "CorpusId": 3142958}, "corpusId": 3142958, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cd5b743cd9a667990009e179bf947307da525f39", + "title": "Perturbed Turing machines and hybrid systems", "abstract": "Investigates + the computational power of several models of dynamical systems under infinitesimal + perturbations of their dynamics. We consider models for both discrete- and + continuous-time dynamical systems: Turing machines, piecewise affine maps, + linear hybrid automata and piecewise-constant derivative systems (a simple + model of hybrid systems). We associate with each of these models a notion + of perturbed dynamics by a small /spl epsi/ (w.r.t. to a suitable metric), + and define the perturbed reachability relation as the intersection of all + reachability relations obtained by /spl epsi/-perturbations, for all possible + values of /spl epsi/. We show that, for the four kinds of models we consider, + the perturbed reachability relation is co-recursively enumerable (co-r.e.), + and that any co-r.e. relation can be defined as the perturbed reachability + relation of such models. A corollary of this result is that systems that are + robust (i.e. whose reachability relation is stable under infinitesimal perturbation) + are decidable.", "venue": "Proceedings 16th Annual IEEE Symposium on Logic + in Computer Science", "year": 2001, "referenceCount": 23, "citationCount": + 54, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-06-16", "journal": + {"name": "Proceedings 16th Annual IEEE Symposium on Logic in Computer Science", + "pages": "269-278"}, "authors": [{"authorId": "1736198", "name": "E. Asarin"}, + {"authorId": "1718634", "name": "A. Bouajjani"}]}, {"paperId": "9d14202106fec52c53bbb5d5d292cd7204843767", + "externalIds": {"MAG": "2169290950", "DOI": "10.1093/ANALYS/58.2.128", "CorpusId": + 123570820}, "corpusId": 123570820, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9d14202106fec52c53bbb5d5d292cd7204843767", + "title": "Turing\u2019s O-machines, Searle, Penrose and the brain", "abstract": + "Analogies offered in the literature include hurricanes, the motion of the + planets around the sun, and the digestion of pizza. None of these phenomena + is itself computational in nature yet, supposedly, all can be simulated perfectly + by a Turing machine (in the sense that the machine can compute descriptions + of the phenomena to any desired number of decimal places and on any temporal + grid). (2) is Searle''s position (1992, 1997).", "venue": "", "year": 1998, + "referenceCount": 30, "citationCount": 53, "influentialCitationCount": 6, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1998-04-01", "journal": {"name": "Analysis", "pages": + "128-138", "volume": "58"}, "authors": [{"authorId": "144246233", "name": + "B. Copeland"}]}, {"paperId": "42087341ddc543d864fac17fd06f377906a6e6dc", "externalIds": {"MAG": "1597925351", "DBLP": "journals/mima/Schweizer98", - "DOI": "10.1023/A:1008229619541", "CorpusId": 29591523}, "url": "https://www.semanticscholar.org/paper/42087341ddc543d864fac17fd06f377906a6e6dc", + "DOI": "10.1023/A:1008229619541", "CorpusId": 29591523}, "corpusId": 29591523, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/42087341ddc543d864fac17fd06f377906a6e6dc", "title": "The Truly Total Turing Test*", "abstract": null, "venue": "Minds and Machines", "year": 1998, "referenceCount": 4, "citationCount": 41, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1998-05-01", "journal": {"name": "Minds + and Machines", "pages": "263-272", "volume": "8"}, "authors": [{"authorId": + "71717006", "name": "P. Schweizer"}]}, {"paperId": "515bb8fc0a718185375a6bc2d885ca9311308897", + "externalIds": {"DBLP": "conf/sofsem/LeeuwenW01", "MAG": "1572083989", "DOI": + "10.1007/3-540-45627-9_8", "CorpusId": 22290151}, "corpusId": 22290151, "publicationVenue": + {"id": "74136324-6e61-46d3-912f-8be85580ef40", "name": "Conference on Current + Trends in Theory and Practice of Informatics", "type": "conference", "alternate_names": + ["SOFSEM", "Conf Curr Trends Theory Pract Informatics"]}, "url": "https://www.semanticscholar.org/paper/515bb8fc0a718185375a6bc2d885ca9311308897", + "title": "Beyond the Turing Limit: Evolving Interactive Systems", "abstract": + null, "venue": "Conference on Current Trends in Theory and Practice of Informatics", + "year": 2001, "referenceCount": 39, "citationCount": 56, "influentialCitationCount": + 10, "isOpenAccess": true, "openAccessPdf": {"url": "https://invenio.nusl.cz/record/33998/files/content.csg.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-11-24", "journal": {"pages": "90-109"}, "authors": + [{"authorId": "143817739", "name": "J. V. Leeuwen"}, {"authorId": "1815433", + "name": "J. Wiedermann"}]}, {"paperId": "f5c213e2318ea524e2fa7e8eba1cafc24efee43d", + "externalIds": {"DBLP": "conf/its/PersonG02", "MAG": "142045955", "DOI": "10.1007/3-540-47987-2_82", + "CorpusId": 26440193}, "corpusId": 26440193, "publicationVenue": {"id": "6514cc81-db1c-4551-bb94-8f80cb99e085", + "name": "International Conference on Intelligent Tutoring Systems", "type": + "conference", "alternate_names": ["ACM Int Conf Interact Tabletop Surf", "Intell + Tutoring Syst", "IEEE Intell Transp Syst", "ITS", "Int Conf Intell Tutoring + Syst", "International Scientific and Practical Conference \"Information Technologies + and Security\"", "IEEE International Telecommunications Symposium", "IEEE + Intelligent Transportation Systems", "Int Sci Pract Conf \"information Technol + Secur", "Intelligent Tutoring Systems", "ACM International Conference on Interactive + Tabletops and Surfaces", "IEEE Int Telecommun Symp", "Interactive Tabletops + and Surfaces", "Interact Tabletop Surf"], "url": "https://link.springer.com/conference/its", + "alternate_urls": ["https://its.ipri.kiev.ua/", "https://dl.acm.org/conference/iss/proceedings"]}, + "url": "https://www.semanticscholar.org/paper/f5c213e2318ea524e2fa7e8eba1cafc24efee43d", + "title": "Human or Computer? AutoTutor in a Bystander Turing Test", "abstract": + null, "venue": "International Conference on Intelligent Tutoring Systems", + "year": 2002, "referenceCount": 20, "citationCount": 46, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2002-06-02", "journal": + {"pages": "821-830"}, "authors": [{"authorId": "1781613", "name": "N. Person"}, + {"authorId": "1769251", "name": "A. Graesser"}]}, {"paperId": "5907d387091a81b860b1c8c83a5ecbda28256aab", + "externalIds": {"MAG": "2025766729", "DOI": "10.1007/S002850050042", "CorpusId": + 35630203}, "corpusId": 35630203, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5907d387091a81b860b1c8c83a5ecbda28256aab", + "title": "A Turing model with correlated random walk", "abstract": null, "venue": + "", "year": 1996, "referenceCount": 26, "citationCount": 57, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1996-11-14", "journal": {"name": "Journal of Mathematical Biology", "pages": + "49-72", "volume": "35"}, "authors": [{"authorId": "1682566", "name": "T. + Hillen"}]}, {"paperId": "204a50270ccadcbc8da2687e85858b1f87297c03", "externalIds": + {"MAG": "2137950128", "DOI": "10.1007/S002850050135", "CorpusId": 14463923}, + "corpusId": 14463923, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/204a50270ccadcbc8da2687e85858b1f87297c03", + "title": "Unravelling the Turing bifurcation using spatially varying diffusion + coefficients", "abstract": null, "venue": "", "year": 1998, "referenceCount": + 34, "citationCount": 66, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.ma.hw.ac.uk/~jas/paperpdfs/dlb.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-11-05", + "journal": {"name": "Journal of Mathematical Biology", "pages": "381-417", + "volume": "37"}, "authors": [{"authorId": "46180663", "name": "D. L. Benson"}, + {"authorId": "2339973", "name": "P. Maini"}, {"authorId": "1890610", "name": + "J. Sherratt"}]}, {"paperId": "ef7d99880c4ae742c88b84d26f321d9e87dc4d4e", + "externalIds": {"MAG": "1512610407", "DOI": "10.21236/ada444284", "CorpusId": + 12466742}, "corpusId": 12466742, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ef7d99880c4ae742c88b84d26f321d9e87dc4d4e", + "title": "Quasi-Delay-Insensitive Circuits are Turing-Complete", "abstract": + "Quasi-delay-insensitive (QDI) circuits are those whose correct operation + does not depend on the delays of operators or wires, except for certain wires + that form isochronic forks. In this paper we show that quasi-delay-insensitivity, + stability and noninterference, and strong confluence are equivalent properties + of a computation. In particular, this shows that QDI computations are deterministic. + We show that the class of Turing-computable functions have QDI implementations + by constructing a QDI Turing machine.", "venue": "", "year": 1995, "referenceCount": + 8, "citationCount": 53, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "https://authors.library.caltech.edu/26884/2/95-11.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1995-11-01", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "144576833", "name": "R. Manohar"}, {"authorId": + "79041834", "name": "Alain J. Martin"}]}, {"paperId": "a2115fed790cf3e20666ac51bfc728cfdcc30b70", + "externalIds": {"MAG": "1570445405", "DBLP": "journals/cogsci/Wells98", "DOI": + "10.1207/s15516709cog2203_1", "CorpusId": 15463981}, "corpusId": 15463981, + "publicationVenue": {"id": "c33b01b0-31b4-470e-a9f9-8432e02c3cb9", "name": + "Cognitive Sciences", "type": "journal", "alternate_names": ["Cognitive Science", + "Cogn Sci"], "issn": "1935-8059", "alternate_issns": ["0364-0213"], "url": + "http://www.informaworld.com/openurl?genre=journal&issn=1551-6709", "alternate_urls": + ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1551-6709", "http://www3.interscience.wiley.com/cgi-bin/jtoc?ID=121670282", + "https://onlinelibrary.wiley.com/journal/15516709", "http://www.sciencedirect.com/science/journal/03640213", + "http://www.leaonline.com/loi/cog"]}, "url": "https://www.semanticscholar.org/paper/a2115fed790cf3e20666ac51bfc728cfdcc30b70", + "title": "Turing''s Analysis of Computation and Theories of Cognitive Architecture", + "abstract": "Turing''s analysis of computation is a fundamental part of the + background of cognitive science. In this paper it is argued that a re-interpretation + of Turing''s work is required to underpin theorizing about cognitive architecture. + It is claimed that the symbol systems view of the mind, which is the conventional + way of understanding how Turing''s work impacts on cognitive science, is deeply + flawed. There is an alternative interpretation that is more faithful to Turing''s + original insights, avoids the criticisms made of the symbol systems approach + and is compatible with the growing interest in agent-environment interaction. + It is argued that this interpretation should form the basis for theories of + cognitive architecture.", "venue": "Cognitive Sciences", "year": 1998, "referenceCount": + 71, "citationCount": 49, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Chemistry"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Chemistry", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1998-05-01", "journal": {"name": "Minds and Machines", "pages": "263-272", - "volume": "8"}, "authors": [{"authorId": "71717006", "name": "P. Schweizer"}]}, - {"paperId": "ff433838bb2b178e1d6b1f045b0215385e1757f5", "externalIds": {"MAG": - "2479583503", "DOI": "10.1515/9781400882618-009", "CorpusId": 63812173}, "url": - "https://www.semanticscholar.org/paper/ff433838bb2b178e1d6b1f045b0215385e1757f5", + "1998-07-01", "journal": {"name": "Cogn. Sci.", "pages": "269-294", "volume": + "22"}, "authors": [{"authorId": "48060981", "name": "A. Wells"}]}, {"paperId": + "ff433838bb2b178e1d6b1f045b0215385e1757f5", "externalIds": {"MAG": "2479583503", + "DOI": "10.1515/9781400882618-009", "CorpusId": 63812173}, "corpusId": 63812173, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ff433838bb2b178e1d6b1f045b0215385e1757f5", "title": "The Inversion of Functions Defined by Turing Machines", "abstract": "Consider the problem of designing a machine to solve well-defined intellectual problems. We call a problem well-defined if there is a test which can be applied @@ -8189,75 +9232,148 @@ interactions: a stop and print a 1 if g(m, r) does not exist. In spite of this, it is easy to show that a Turing machine exists which will", "venue": "", "year": 1956, "referenceCount": 0, "citationCount": 123, "influentialCitationCount": 7, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1956-01-31", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "143805236", - "name": "J. McCarthy"}]}, {"paperId": "3012f2504ddb9d527ad57a56561f4f72aa04285c", - "externalIds": {"MAG": "1566710022", "CorpusId": 54125748}, "url": "https://www.semanticscholar.org/paper/3012f2504ddb9d527ad57a56561f4f72aa04285c", - "title": "How to Pass the Turing Test by Cheating", "abstract": "Back in the - heyday of computer hardware, some notable people actually believed that sentient - computer programs were literally just around the corner. This prompted the - great British mathemetician, Alan Turing, to devise a simple test of intelligence. - If a computer program could pass the Turing test, then it could be said to - be exhibiting intelligence. In 1991, the Cambridge Centre for Behavioural - Studies held the first formal instantiation of the Turing Test. In this incarnation - the test was known as the Loebner contest, as Dr. Hugh Loebner pledged a $100,000 - grand prize for the first computer program to pass the test. I have submitted - two computer programs to the 1996 Loebner contest, which is to be held on - Friday April 19 in New York city. These computer programs are nothing more - than glorious hacks, but in constructing them I have learned a great deal - about how language works. In this paper I will describe in detail how my computer - programs work, and will make comparisons with similar computer programs such - as ELIZA. After this, I will explain why the Loebner contest is doomed to - failure.", "venue": "", "year": 1997, "referenceCount": 15, "citationCount": - 44, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "2537971", "name": "Jason L. Hutchens"}]}, - {"paperId": "2a21d8d83619bdf2e967ae5550c75f7f968b55bd", "externalIds": {"MAG": - "1543681585", "DBLP": "journals/mima/Siegelmann03", "DOI": "10.1023/A:1021376718708", - "CorpusId": 2943253}, "url": "https://www.semanticscholar.org/paper/2a21d8d83619bdf2e967ae5550c75f7f968b55bd", - "title": "Neural and Super-Turing Computing", "abstract": null, "venue": "Minds - and Machines", "year": 2003, "referenceCount": 32, "citationCount": 61, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1956-01-31", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "143805236", "name": "J. McCarthy"}]}, {"paperId": + "0016e05f4221d8f07d2fbe1ffcaea38c510fd6b5", "externalIds": {"MAG": "2592879695", + "ArXiv": "quant-ph/9710052", "CorpusId": 2306113}, "corpusId": 2306113, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0016e05f4221d8f07d2fbe1ffcaea38c510fd6b5", + "title": "The Church-Turing thesis as a guiding principle for physics", "abstract": + "Two aspects of the physical side of the Church-Turing thesis are discussed. + The first issue is a variant of the Eleatic argument against motion, dealing + with Zeno squeezed time cycles of computers. The second argument reviews the + issue of one-to-one computation, that is, the bijective (unique and reversible) + evolution of computations and its relation to the measurement process.", "venue": + "", "year": 1997, "referenceCount": 59, "citationCount": 54, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1997-10-22", "journal": {"name": "arXiv: Quantum Physics", "volume": ""}, + "authors": [{"authorId": "1756061", "name": "K. Svozil"}]}, {"paperId": "fef16efae0d584905f9d15c4ca032978ccbff629", + "externalIds": {"MAG": "2001772727", "DBLP": "journals/mima/Cleland93", "DOI": + "10.1007/BF00976283", "CorpusId": 742039}, "corpusId": 742039, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/fef16efae0d584905f9d15c4ca032978ccbff629", + "title": "Is the Church-Turing thesis true?", "abstract": null, "venue": "Minds + and Machines", "year": 1993, "referenceCount": 37, "citationCount": 50, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1993-08-01", "journal": {"name": "Minds + and Machines", "pages": "283-312", "volume": "3"}, "authors": [{"authorId": + "32624486", "name": "Carol E. Cleland"}]}, {"paperId": "d8edc75260b167816a023e77ae579f61365ffab5", + "externalIds": {"MAG": "1999453928", "DOI": "10.1109/81.224308", "CorpusId": + 61517189}, "corpusId": 61517189, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d8edc75260b167816a023e77ae579f61365ffab5", + "title": "The CNN is universal as the Turing machine", "abstract": "It is + shown that the game of life algorithm, which is equivalent to a Turing machine, + can be realized by a cellular neural network (CNN). Thus the CNN is also universal. + >", "venue": "", "year": 1993, "referenceCount": 8, "citationCount": 61, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1993-04-01", "journal": {"name": + "IEEE Transactions on Circuits and Systems I-regular Papers", "pages": "289-291", + "volume": "40"}, "authors": [{"authorId": "144848684", "name": "L. Chua"}, + {"authorId": "1772490", "name": "T. Roska"}, {"authorId": "39661376", "name": + "P. L. Venetianer"}]}, {"paperId": "4641554df1edc503f448e7603a7c869541eded51", + "externalIds": {"DBLP": "conf/mcu/Baiocchi01", "MAG": "1573866315", "DOI": + "10.1007/3-540-45132-3_1", "CorpusId": 46212367}, "corpusId": 46212367, "publicationVenue": + {"id": "c70b16dd-3be4-41cc-8494-33d2b373f5b9", "name": "Machines, Computations, + and Universality", "type": "conference", "alternate_names": ["Mach Comput + Universality", "MCU"]}, "url": "https://www.semanticscholar.org/paper/4641554df1edc503f448e7603a7c869541eded51", + "title": "Three Small Universal Turing Machines", "abstract": null, "venue": + "Machines, Computations, and Universality", "year": 2001, "referenceCount": + 4, "citationCount": 47, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-02-01", "journal": {"name": "Minds and Machines", - "pages": "103-114", "volume": "13"}, "authors": [{"authorId": "2797623", "name": - "H. Siegelmann"}]}, {"paperId": "3bc6ca8221338957fa5ea918ca35307464d0a2e4", - "externalIds": {"MAG": "1519751442", "DBLP": "journals/mima/ShagrirP03", "DOI": - "10.1023/A:1021365222692", "CorpusId": 12788899}, "url": "https://www.semanticscholar.org/paper/3bc6ca8221338957fa5ea918ca35307464d0a2e4", - "title": "Physical Hypercomputation and the Church\u2013Turing Thesis", "abstract": - null, "venue": "Minds and Machines", "year": 2003, "referenceCount": 41, "citationCount": - 72, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-02-01", "journal": - {"name": "Minds and Machines", "pages": "87-101", "volume": "13"}, "authors": - [{"authorId": "1742013", "name": "Oron Shagrir"}, {"authorId": "3341037", - "name": "I. Pitowsky"}]}, {"paperId": "36dec9a6fdf8d2788103989ee40c7aebecc5e7b8", - "externalIds": {"MAG": "2009118438", "DOI": "10.1126/science.259.5094.493", - "CorpusId": 23151115, "PubMed": "17734167"}, "url": "https://www.semanticscholar.org/paper/36dec9a6fdf8d2788103989ee40c7aebecc5e7b8", - "title": "Transient Turing Structures in a Gradient-Free Closed System", "abstract": - "Transient, symmetry-breaking, spatial patterns were obtained in a closed, - gradient-free, aqueous medium containing chlorine dioxide, iodine, malonic - acid, and starch at 4\ufffd to 5\ufffdC. The conditions under which these - Turing-type structures appear can be accurately predicted from a simple mathematical - model of the system. The patterns, which consist of spots, stripes, or both - spots and stripes, require about 25 minutes to form and remain stationary - for 10 to 30 minutes.", "venue": "Science", "year": 1993, "referenceCount": - 15, "citationCount": 95, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-01-22", "journal": {"name": "Science", "pages": "493 - - 495", "volume": "259"}, "authors": [{"authorId": "1768811670", "name": "I. - Lengyel"}, {"authorId": "1768813191", "name": "S\ufffdndor K\ufffdd\ufffdr"}, - {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "9bd513385ad45060bc53088cddf67b4cd2cf21bd", + "publicationDate": "2001-05-23", "journal": {"pages": "1-10"}, "authors": + [{"authorId": "3221721", "name": "C. Baiocchi"}]}, {"paperId": "b0890d6c90519ac22aec1fa6b0386b74e5db09fa", + "externalIds": {"DBLP": "journals/mima/Sterrett00", "MAG": "1896925553", "DOI": + "10.1023/A:1011242120015", "CorpusId": 9600264}, "corpusId": 9600264, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/b0890d6c90519ac22aec1fa6b0386b74e5db09fa", + "title": "Turing''s Two Tests for Intelligence*", "abstract": null, "venue": + "Minds and Machines", "year": 2000, "referenceCount": 36, "citationCount": + 42, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://soar.wichita.edu/bitstream/10057/10701/1/10701_Turing_Two_Tests.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-11-01", "journal": {"name": "Minds and Machines", + "pages": "541-559", "volume": "10"}, "authors": [{"authorId": "2663291", "name": + "S. G. Sterrett"}]}, {"paperId": "3888028ecc976f5a5786152ebc418559896da53c", + "externalIds": {"DBLP": "journals/tsp/Nadas85a", "MAG": "2168938909", "DOI": + "10.1109/TASSP.1985.1164728", "CorpusId": 39705397}, "corpusId": 39705397, + "publicationVenue": {"id": "d186589f-48a7-41f1-b5ff-31139cf8ac78", "name": + "IEEE Transactions on Acoustics Speech and Signal Processing", "type": "journal", + "alternate_names": ["IEEE Trans Acoust Speech Signal Process", "IEEE Transactions + on Acoustics, Speech, and Signal Processing"], "issn": "0096-3518", "url": + "http://ieeexplore.ieee.org/servlet/opac?punumber=29"}, "url": "https://www.semanticscholar.org/paper/3888028ecc976f5a5786152ebc418559896da53c", + "title": "On Turing''s formula for word probabilities", "abstract": "A. M. + Turing, in a 1941 personal communication to I. J. Good, suggested a formula + for estimating probabilities of words in text and, more generally, of species + in a mixed population of various species. It is remarkable that Turing''s + formula can be obtained by significantly different statistical methods; we + compare three ways to obtain it.", "venue": "IEEE Transactions on Acoustics + Speech and Signal Processing", "year": 1985, "referenceCount": 4, "citationCount": + 100, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1985-12-01", "journal": {"name": "IEEE Trans. Acoust. Speech Signal Process.", + "pages": "1414-1416", "volume": "33"}, "authors": [{"authorId": "150023694", + "name": "A. N\u00e1das"}]}, {"paperId": "30340ced6413176c1b708f74229eb25b7ee70afd", + "externalIds": {"DBLP": "journals/jacm/Wang57", "MAG": "1981789328", "DOI": + "10.1145/320856.320867", "CorpusId": 29040872}, "corpusId": 29040872, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/30340ced6413176c1b708f74229eb25b7ee70afd", + "title": "A Variant to Turing''s Theory of Computing Machines", "abstract": + "The principal purpose of this paper is to offer a theory which is closely + related to Turing''s [1] but is more economical in the basic operations. I + t will be proved that a theoretically simple basic machine can be imagined + and specified such tha t all partial recursive functions (and hence all solvable + computation problems) can be computed by it and tha t only four basic types + of instruction are employed for the programs: shift left one space, shift + right one space, mark a blank space, conditional transfer. In particular, + erasing is dispensable, one symbol for marking is sufficient, and one kind + of transfer is enough. The reduction is somewhat similar to the realization + of, for instance, the definability of conjunction and implication in terms + of negation and disjunction, or of the definability of all these in terms + of Sheffer''s stroke function. As a result, i t becomes less direct to prove + that certain things can be done by the machines, but a little easier to prove + that certain things cannot be done. This serf-contained theory will b e presented, + as far as possible, in a language which is familiar to those who are engaged + in the use and construction of largescale computers. Turing''s theory of computable + functions antedated but has not much influenced the extensive actual construction + of digital computers. These two aspects of theory and practice have been developed + almost entirely independently of each other. The main reason is undoubtedly + that logicians are interested in questions radically different from those + with which the applied mathematicians and electrical engineers are primarily + concerned. I t cannot, however, fail to strike one as rather strange that + often the same concepts are expressed by very different terms in the two developments. + One is even inclined to ask whether a rapprochement might not produce some + good effect. This paper wiU, it is believed, be of use to those who wish to + compare and connect the two approaches. Extensive use of Turing [1] and Kleene + [2] (Chapter XI I I ) will be made, although the exposition is sufficient + in itself.", "venue": "JACM", "year": 1957, "referenceCount": 6, "citationCount": + 146, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "J. ACM", "pages": "63-92", "volume": "4"}, "authors": + [{"authorId": "48016786", "name": "Hao Wang"}]}, {"paperId": "9bd513385ad45060bc53088cddf67b4cd2cf21bd", "externalIds": {"MAG": "2102321274", "DOI": "10.1103/PHYSREVLETT.83.2950", - "CorpusId": 54785905}, "url": "https://www.semanticscholar.org/paper/9bd513385ad45060bc53088cddf67b4cd2cf21bd", + "CorpusId": 54785905}, "corpusId": 54785905, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9bd513385ad45060bc53088cddf67b4cd2cf21bd", "title": "Control of Turing Structures by Periodic Illumination", "abstract": "Spatially uniform illumination of Turing structures in the chlorine dioxide-iodine-malonic acid reaction-diffusion system affects the pattern characteristics and, at @@ -8267,17 +9383,33 @@ interactions: the frequency of autonomous oscillations in the corresponding well-stirred system. Numerical simulations demonstrate a similar resonant behavior of periodically illuminated Turing structures.", "venue": "", "year": 1999, "referenceCount": - 9, "citationCount": 74, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1999-10-11", "journal": {"name": - "Physical Review Letters", "pages": "2950-2952", "volume": "83"}, "authors": - [{"authorId": "153246014", "name": "A. Horv\u00e1th"}, {"authorId": "4978913", - "name": "M. Dolnik"}, {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}, + 9, "citationCount": 75, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-10-11", + "journal": {"name": "Physical Review Letters", "pages": "2950-2952", "volume": + "83"}, "authors": [{"authorId": "153246014", "name": "A. Horv\u00e1th"}, {"authorId": + "4978913", "name": "M. Dolnik"}, {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", - "name": "I. Epstein"}]}, {"paperId": "27da7d1458231e3fc5d051244b43933f3809962a", + "name": "I. Epstein"}]}, {"paperId": "f17adc26afa468a510fca21f0f0399f5cc61612b", + "externalIds": {"MAG": "1970543329", "DOI": "10.1007/978-3-662-05642-4_7", + "CorpusId": 7028778}, "corpusId": 7028778, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f17adc26afa468a510fca21f0f0399f5cc61612b", + "title": "Turing\u2019s Ideas and Models of Computation", "abstract": null, + "venue": "", "year": 2004, "referenceCount": 52, "citationCount": 82, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "159-194", "volume": ""}, "authors": [{"authorId": "2882381", "name": + "E. Eberbach"}, {"authorId": "27353259", "name": "Dina Q. Goldin"}, {"authorId": + "2103444", "name": "P. Wegner"}]}, {"paperId": "27da7d1458231e3fc5d051244b43933f3809962a", "externalIds": {"ArXiv": "physics/0301079", "MAG": "1989328982", "DOI": "10.1103/PhysRevLett.90.128301", - "CorpusId": 20784615, "PubMed": "12688908"}, "url": "https://www.semanticscholar.org/paper/27da7d1458231e3fc5d051244b43933f3809962a", + "CorpusId": 20784615, "PubMed": "12688908"}, "corpusId": 20784615, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/27da7d1458231e3fc5d051244b43933f3809962a", "title": "Dynamics of Turing patterns under spatiotemporal forcing.", "abstract": "We study, both theoretically and experimentally, the dynamical response of Turing patterns to a spatiotemporal forcing in the form of a traveling-wave @@ -8291,7 +9423,8 @@ interactions: with light modulations in the photosensitive chlorine dioxide-iodine-malonic acid reaction are also reported.", "venue": "Physical Review Letters", "year": 2003, "referenceCount": 0, "citationCount": 77, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://diposit.ub.edu/dspace/bitstream/2445/12827/1/510577.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2003-01-31", "journal": {"name": "Physical @@ -8299,29 +9432,75 @@ interactions: "authors": [{"authorId": "39434501", "name": "S. R\u00fcdiger"}, {"authorId": "2701200", "name": "D. G. M\u00edguez"}, {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}, {"authorId": "2236462", "name": "F. Sagu\u00e9s"}, {"authorId": - "2440383", "name": "J. Casademunt"}]}, {"paperId": "f17adc26afa468a510fca21f0f0399f5cc61612b", - "externalIds": {"MAG": "1970543329", "DOI": "10.1007/978-3-662-05642-4_7", - "CorpusId": 7028778}, "url": "https://www.semanticscholar.org/paper/f17adc26afa468a510fca21f0f0399f5cc61612b", - "title": "Turing\u2019s Ideas and Models of Computation", "abstract": null, - "venue": "", "year": 2004, "referenceCount": 52, "citationCount": 82, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "159-194", "volume": ""}, "authors": - [{"authorId": "2882381", "name": "E. Eberbach"}, {"authorId": "27353259", - "name": "Dina Q. Goldin"}, {"authorId": "2103444", "name": "P. Wegner"}]}, - {"paperId": "fbdff64589e1c4ed93c00749fec206cae270c77d", "externalIds": {"MAG": - "2500042688", "DOI": "10.1007/978-94-010-0105-2", "CorpusId": 64075445}, "url": - "https://www.semanticscholar.org/paper/fbdff64589e1c4ed93c00749fec206cae270c77d", + "2440383", "name": "J. Casademunt"}]}, {"paperId": "3bc6ca8221338957fa5ea918ca35307464d0a2e4", + "externalIds": {"MAG": "1519751442", "DBLP": "journals/mima/ShagrirP03", "DOI": + "10.1023/A:1021365222692", "CorpusId": 12788899}, "corpusId": 12788899, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/3bc6ca8221338957fa5ea918ca35307464d0a2e4", + "title": "Physical Hypercomputation and the Church\u2013Turing Thesis", "abstract": + null, "venue": "Minds and Machines", "year": 2003, "referenceCount": 41, "citationCount": + 73, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-02-01", "journal": {"name": "Minds and Machines", "pages": "87-101", + "volume": "13"}, "authors": [{"authorId": "1742013", "name": "Oron Shagrir"}, + {"authorId": "3341037", "name": "I. Pitowsky"}]}, {"paperId": "2a21d8d83619bdf2e967ae5550c75f7f968b55bd", + "externalIds": {"MAG": "1543681585", "DBLP": "journals/mima/Siegelmann03", + "DOI": "10.1023/A:1021376718708", "CorpusId": 2943253}, "corpusId": 2943253, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/2a21d8d83619bdf2e967ae5550c75f7f968b55bd", + "title": "Neural and Super-Turing Computing", "abstract": null, "venue": "Minds + and Machines", "year": 2003, "referenceCount": 32, "citationCount": 61, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-02-01", "journal": + {"name": "Minds and Machines", "pages": "103-114", "volume": "13"}, "authors": + [{"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": "36dec9a6fdf8d2788103989ee40c7aebecc5e7b8", + "externalIds": {"MAG": "2009118438", "DOI": "10.1126/science.259.5094.493", + "CorpusId": 23151115, "PubMed": "17734167"}, "corpusId": 23151115, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/36dec9a6fdf8d2788103989ee40c7aebecc5e7b8", + "title": "Transient Turing Structures in a Gradient-Free Closed System", "abstract": + "Transient, symmetry-breaking, spatial patterns were obtained in a closed, + gradient-free, aqueous medium containing chlorine dioxide, iodine, malonic + acid, and starch at 4\ufffd to 5\ufffdC. The conditions under which these + Turing-type structures appear can be accurately predicted from a simple mathematical + model of the system. The patterns, which consist of spots, stripes, or both + spots and stripes, require about 25 minutes to form and remain stationary + for 10 to 30 minutes.", "venue": "Science", "year": 1993, "referenceCount": + 15, "citationCount": 95, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1993-01-22", "journal": + {"name": "Science", "pages": "493 - 495", "volume": "259"}, "authors": [{"authorId": + "1768811670", "name": "I. Lengyel"}, {"authorId": "1768813191", "name": "S\ufffdndor + K\ufffdd\ufffdr"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": + "fbdff64589e1c4ed93c00749fec206cae270c77d", "externalIds": {"MAG": "2500042688", + "DOI": "10.1007/978-94-010-0105-2", "CorpusId": 64075445}, "corpusId": 64075445, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fbdff64589e1c4ed93c00749fec206cae270c77d", "title": "The Turing Test", "abstract": null, "venue": "", "year": 2003, "referenceCount": 5, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "31925555", "name": "J. Moor"}]}, - {"paperId": "2811bb4c2e1dc64a95efadf66b4ba09908c2338d", "externalIds": {"MAG": - "2049852697", "DOI": "10.1103/PHYSREVA.46.6315", "CorpusId": 10388434, "PubMed": - "9907943"}, "url": "https://www.semanticscholar.org/paper/2811bb4c2e1dc64a95efadf66b4ba09908c2338d", + "openAccessPdf": {"url": "http://repository.bilkent.edu.tr/bitstream/11693/51097/1/Turing_test_50_years_later.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "31925555", + "name": "J. Moor"}]}, {"paperId": "2811bb4c2e1dc64a95efadf66b4ba09908c2338d", + "externalIds": {"MAG": "2049852697", "DOI": "10.1103/PHYSREVA.46.6315", "CorpusId": + 10388434, "PubMed": "9907943"}, "corpusId": 10388434, "publicationVenue": + {"id": "1324e6c3-be3d-41e7-bec6-5aa766654ad6", "name": "Physical Review A. + Atomic, Molecular, and Optical Physics", "type": "journal", "alternate_names": + ["Physical Review A", "Phys Rev At Mol Opt Phys", "Phys Rev A"], "issn": "1050-2947", + "url": "https://journals.aps.org/pra/", "alternate_urls": ["http://journals.aps.org/pra/", + "http://pra.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/2811bb4c2e1dc64a95efadf66b4ba09908c2338d", "title": "Interaction of Turing and Hopf bifurcations in chemical systems.", "abstract": "When a Turing bifurcation occurs close to a Hopf bifurcation in the parameter space of a reaction-diffusion system, the Turing and Hopf @@ -8337,29 +9516,54 @@ interactions: bistability. Mixed-mode (spatiotemporal) patterns do not occur in the models considered except for a very small region in the parameter space for two-dimensional hexagonal patterns.", "venue": "Physical Review A. Atomic, Molecular, and - Optical Physics", "year": 1992, "referenceCount": 0, "citationCount": 84, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-11-01", "journal": {"name": "Physical review. A, Atomic, molecular, - and optical physics", "pages": "\n 6315-6322\n ", "volume": - "46 10"}, "authors": [{"authorId": "30145492", "name": "Rovinsky"}, {"authorId": - "121778916", "name": "Menzinger"}]}, {"paperId": "706a3bf428d4bd181f4a008066e0efd9c046e2a6", - "externalIds": {"MAG": "2250364400", "CorpusId": 61828838}, "url": "https://www.semanticscholar.org/paper/706a3bf428d4bd181f4a008066e0efd9c046e2a6", + Optical Physics", "year": 1992, "referenceCount": 0, "citationCount": 86, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1992-11-01", "journal": {"name": "Physical + review. A, Atomic, molecular, and optical physics", "pages": "\n 6315-6322\n ", + "volume": "46 10"}, "authors": [{"authorId": "30145492", "name": "Rovinsky"}, + {"authorId": "121778916", "name": "Menzinger"}]}, {"paperId": "706a3bf428d4bd181f4a008066e0efd9c046e2a6", + "externalIds": {"MAG": "2250364400", "CorpusId": 61828838}, "corpusId": 61828838, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/706a3bf428d4bd181f4a008066e0efd9c046e2a6", "title": "Turing, Alan M.", "abstract": "Alan Mathison Turing (1912-1954) was born in London, the son of Julius Mathison Turing of the Indian Civil Service and of Ethel Sara Turing (nee Stoney). The Stoneys were a family of considerable scientific distinction, three of them having been Fellows of the Royal Society.", "venue": "", "year": 2003, "referenceCount": 2, "citationCount": - 57, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "1803-1804", "volume": ""}, "authors": [{"authorId": "2056940608", - "name": "J. H. Wilkinson"}]}, {"paperId": "50f63b66a6999dbd7bbb9b46abad5e3c0e53e22f", - "externalIds": {"MAG": "2060434897", "DBLP": "journals/jsyml/Welch00", "DOI": - "10.2307/2586695", "CorpusId": 17859315}, "url": "https://www.semanticscholar.org/paper/50f63b66a6999dbd7bbb9b46abad5e3c0e53e22f", + 57, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "History", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "pages": "1803-1804", "volume": ""}, "authors": [{"authorId": + "2056940608", "name": "J. H. Wilkinson"}]}, {"paperId": "48d28d8e6900c30105b50b48ad64c8606a137268", + "externalIds": {"MAG": "2026259231", "DOI": "10.1063/1.119735", "CorpusId": + 122270550}, "corpusId": 122270550, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48d28d8e6900c30105b50b48ad64c8606a137268", + "title": "SEMICONDUCTOR NANOSTRUCTURES FORMED BY THE TURING INSTABILITY", + "abstract": "We describe the surface topography domain in a strained InGaAs/AlGaAs + system on the GaAs (311)B substrate during metalorganic-vapor-phase-epitaxial + growth. The surface rearrangement resulting in the formation of nanostructures + seems to belong to a Turing-type self-organization phenomenon that results + from a spontaneous symmetry-breaking instability in nonlinear dynamical systems. + The unique surface morphologies on the high Miller index faces suggest a novel + fourth growth mode due to Turing-type self-organization.", "venue": "", "year": + 1997, "referenceCount": 11, "citationCount": 44, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1997-08-25", "journal": {"name": + "Applied Physics Letters", "pages": "1086-1088", "volume": "71"}, "authors": + [{"authorId": "11598670", "name": "J. Temmyo"}, {"authorId": "145671363", + "name": "R. N\u00f6tzel"}, {"authorId": "49111733", "name": "T. Tamamura"}]}, + {"paperId": "50f63b66a6999dbd7bbb9b46abad5e3c0e53e22f", "externalIds": {"MAG": + "2060434897", "DBLP": "journals/jsyml/Welch00", "DOI": "10.2307/2586695", + "CorpusId": 17859315}, "corpusId": 17859315, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/50f63b66a6999dbd7bbb9b46abad5e3c0e53e22f", "title": "Eventually infinite time Turing machine degrees: infinite time decidable reals", "abstract": "Abstract We characterise explicitly the decidable predicates on integers of Infinite Time Turing machines, in terms of admissibility theory @@ -8374,14 +9578,49 @@ interactions: least upper bounds of an \u201ceventual jump\u201d hierarchy exist on an initial segment.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2000, "referenceCount": 9, "citationCount": 54, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-09-01", "journal": - {"name": "Journal of Symbolic Logic", "pages": "1193 - 1203", "volume": "65"}, - "authors": [{"authorId": "144797585", "name": "P. Welch"}]}, {"paperId": "8a1ae7d7fa1f5f8d0ca1b0dc2966d65afc0c31f5", - "externalIds": {"MAG": "1980466156", "DOI": "10.1006/BULM.2002.0328", "CorpusId": - 41684042, "PubMed": "12597120"}, "url": "https://www.semanticscholar.org/paper/8a1ae7d7fa1f5f8d0ca1b0dc2966d65afc0c31f5", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-09-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "1193 - 1203", "volume": "65"}, "authors": [{"authorId": + "144797585", "name": "P. Welch"}]}, {"paperId": "c24f7825989959f991fe0416f0e35ef5a5eaa5c9", + "externalIds": {"MAG": "2065184494", "DOI": "10.1007/BF01857725", "CorpusId": + 122151269}, "corpusId": 122151269, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c24f7825989959f991fe0416f0e35ef5a5eaa5c9", + "title": "Quantum mechanical Hamiltonian models of discrete processes that + erase their own histories: Application to Turing machines", "abstract": null, + "venue": "", "year": 1982, "referenceCount": 16, "citationCount": 102, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1982-04-01", "journal": {"name": "International Journal + of Theoretical Physics", "pages": "177-201", "volume": "21"}, "authors": [{"authorId": + "2542436", "name": "P. Benioff"}]}, {"paperId": "de800fabc3158e2b5badad533957f1ccabf1297b", + "externalIds": {"MAG": "2141608805", "DOI": "10.1103/PHYSREVE.64.041909", + "CorpusId": 13636066, "PubMed": "11690054"}, "corpusId": 13636066, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/de800fabc3158e2b5badad533957f1ccabf1297b", + "title": "Turing model for the patterns of lady beetles.", "abstract": "We + simulate the patterns on the hard wings of lady beetles using a reaction-diffusion + equation based on the Turing model. A part of a spherical surface is used + to approximate the geometry of the hard wings. Various patterns common to + lady beetles in Taiwan can be produced on this curved surface by adjusting + the parameters of the model.", "venue": "Physical review. E, Statistical, + nonlinear, and soft matter physics", "year": 2001, "referenceCount": 0, "citationCount": + 43, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-09-21", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 041909\n ", + "volume": "64 4 Pt 1"}, "authors": [{"authorId": "32582426", "name": "S. Liaw"}, + {"authorId": "2117953694", "name": "C. C. Yang"}, {"authorId": "2143537543", + "name": "R. T. Liu"}, {"authorId": "2157231817", "name": "J. Hong"}]}, {"paperId": + "8a1ae7d7fa1f5f8d0ca1b0dc2966d65afc0c31f5", "externalIds": {"MAG": "1980466156", + "DOI": "10.1006/BULM.2002.0328", "CorpusId": 41684042, "PubMed": "12597120"}, + "corpusId": 41684042, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/8a1ae7d7fa1f5f8d0ca1b0dc2966d65afc0c31f5", "title": "Interspecific influence on mobility and Turing instability", "abstract": "In this paper we formulate a multi-patch multi-species model in which the percapita emigration rate of one species depends on the density of some other @@ -8398,25 +9637,16 @@ interactions: strong. We conclude that the cross-emigration response is an important factor that should not be ignored when pattern formation is the issue.", "venue": "Bulletin of Mathematical Biology", "year": 2003, "referenceCount": 34, "citationCount": - 50, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Bulletin of Mathematical Biology", - "pages": "143-156", "volume": "65"}, "authors": [{"authorId": "4701119", "name": - "Yunxin Huang"}, {"authorId": "145714745", "name": "O. Diekmann"}]}, {"paperId": - "c24f7825989959f991fe0416f0e35ef5a5eaa5c9", "externalIds": {"MAG": "2065184494", - "DOI": "10.1007/BF01857725", "CorpusId": 122151269}, "url": "https://www.semanticscholar.org/paper/c24f7825989959f991fe0416f0e35ef5a5eaa5c9", - "title": "Quantum mechanical Hamiltonian models of discrete processes that - erase their own histories: Application to Turing machines", "abstract": null, - "venue": "", "year": 1982, "referenceCount": 16, "citationCount": 101, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1982-04-01", "journal": {"name": "International Journal of Theoretical Physics", - "pages": "177-201", "volume": "21"}, "authors": [{"authorId": "2542436", "name": - "P. Benioff"}]}, {"paperId": "8abd5493201de8b734b81a7432fc056871388cff", "externalIds": - {"MAG": "1597867279", "CorpusId": 118277483}, "url": "https://www.semanticscholar.org/paper/8abd5493201de8b734b81a7432fc056871388cff", + 50, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"name": "Bulletin + of Mathematical Biology", "pages": "143-156", "volume": "65"}, "authors": + [{"authorId": "4701119", "name": "Yunxin Huang"}, {"authorId": "145714745", + "name": "O. Diekmann"}]}, {"paperId": "8abd5493201de8b734b81a7432fc056871388cff", + "externalIds": {"MAG": "1597867279", "CorpusId": 118277483}, "corpusId": 118277483, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8abd5493201de8b734b81a7432fc056871388cff", "title": "Minds, Machines and Turing: The Indistinguishability of Indistinguishables", "abstract": "Turing''s celebrated 1950 paper proposes a very general methodological criterion for modelling mental function: total functional equivalence and @@ -8434,69 +9664,11 @@ interactions: of the mind/body problem and the other-minds problem, both of which are inherent in this empirical domain, even though Turing hardly mentions them.", "venue": "", "year": 2000, "referenceCount": 38, "citationCount": 60, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2293327", - "name": "S. Harnad"}]}, {"paperId": "48d28d8e6900c30105b50b48ad64c8606a137268", - "externalIds": {"MAG": "2026259231", "DOI": "10.1063/1.119735", "CorpusId": - 122270550}, "url": "https://www.semanticscholar.org/paper/48d28d8e6900c30105b50b48ad64c8606a137268", - "title": "SEMICONDUCTOR NANOSTRUCTURES FORMED BY THE TURING INSTABILITY", - "abstract": "We describe the surface topography domain in a strained InGaAs/AlGaAs - system on the GaAs (311)B substrate during metalorganic-vapor-phase-epitaxial - growth. The surface rearrangement resulting in the formation of nanostructures - seems to belong to a Turing-type self-organization phenomenon that results - from a spontaneous symmetry-breaking instability in nonlinear dynamical systems. - The unique surface morphologies on the high Miller index faces suggest a novel - fourth growth mode due to Turing-type self-organization.", "venue": "", "year": - 1997, "referenceCount": 11, "citationCount": 44, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1997-08-25", "journal": {"name": "Applied Physics Letters", "pages": "1086-1088", - "volume": "71"}, "authors": [{"authorId": "11598670", "name": "J. Temmyo"}, - {"authorId": "145671363", "name": "R. N\u00f6tzel"}, {"authorId": "49111733", - "name": "T. Tamamura"}]}, {"paperId": "ed099f2bc012ab0bb3b354dc198209a430ddaa76", - "externalIds": {"MAG": "2396091976", "DOI": "10.1103/PHYSREVE.65.051913", - "CorpusId": 15952695, "PubMed": "12059599"}, "url": "https://www.semanticscholar.org/paper/ed099f2bc012ab0bb3b354dc198209a430ddaa76", - "title": "Turing patterns with pentagonal symmetry.", "abstract": "We explore - numerically the formation of Turing patterns in a confined circular domain - with small aspect ratio. Our results show that stable fivefold patterns are - formed over a well defined range of disk sizes, offering a possible mechanism - for inducing the fivefold symmetry observed in early development of regular - echinoids. Using this pattern as a seed, more complex biological structures - can be mimicked, such as the pigmentation pattern of sea urchins and the plate - arrangements of the calyxes of primitive camerate crinoids.", "venue": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "year": 2002, - "referenceCount": 20, "citationCount": 49, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2002-05-01", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 051913\n ", "volume": "65 5 Pt 1"}, "authors": - [{"authorId": "145092079", "name": "J. Arag\u00f3n"}, {"authorId": "144380679", - "name": "M. Torres"}, {"authorId": "2060055274", "name": "D. Gil"}, {"authorId": - "37747895", "name": "R. Barrio"}, {"authorId": "2339973", "name": "P. Maini"}]}, - {"paperId": "de800fabc3158e2b5badad533957f1ccabf1297b", "externalIds": {"MAG": - "2141608805", "DOI": "10.1103/PHYSREVE.64.041909", "CorpusId": 13636066, "PubMed": - "11690054"}, "url": "https://www.semanticscholar.org/paper/de800fabc3158e2b5badad533957f1ccabf1297b", - "title": "Turing model for the patterns of lady beetles.", "abstract": "We - simulate the patterns on the hard wings of lady beetles using a reaction-diffusion - equation based on the Turing model. A part of a spherical surface is used - to approximate the geometry of the hard wings. Various patterns common to - lady beetles in Taiwan can be produced on this curved surface by adjusting - the parameters of the model.", "venue": "Physical review. E, Statistical, - nonlinear, and soft matter physics", "year": 2001, "referenceCount": 0, "citationCount": - 43, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-09-21", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 041909\n ", - "volume": "64 4 Pt 1"}, "authors": [{"authorId": "32582426", "name": "S. Liaw"}, - {"authorId": "2117953694", "name": "C. C. Yang"}, {"authorId": "2143537543", - "name": "R. T. Liu"}, {"authorId": "2157231817", "name": "J. Hong"}]}]} + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2293327", + "name": "S. Harnad"}]}]} ' headers: @@ -8505,31 +9677,31 @@ interactions: Connection: - keep-alive Content-Length: - - '154160' + - '180899' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:21 GMT + - Tue, 03 Jan 2023 20:52:51 GMT Via: - - 1.1 e40594d191a88dc4bce1cbdfa1173f2a.cloudfront.net (CloudFront) + - 1.1 b119d190fd68a1b5c82101503504cff2.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - oo6qgTojSw3vI8gfq7G0l0fyHiX2ZOE3BjHLqvoA8-WO5etABKR1JQ== + - 4JXth8JG_T3QtUpAPwxZBQPYPSWfuUEb3fOPn2eiweb9TLZ0OcLviw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detEcHx6vHcFTmg= + - eLxRbGqUvHcFd9w= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '154160' + - '180899' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:21 GMT + - Tue, 03 Jan 2023 20:52:51 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 73d3ce16-f90f-4978-9074-b038b93097f3 + - 89017c3e-a375-40bc-9d26-c86ae1f4ab38 status: code: 200 message: OK @@ -8545,38 +9717,99 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=400&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=400&limit=100 response: body: - string: '{"total": 133388, "offset": 400, "next": 500, "data": [{"paperId": - "a13a18de0619cf3d652246d37049d73d0e4f35bd", "externalIds": {"MAG": "2566852838", - "CorpusId": 16650592}, "url": "https://www.semanticscholar.org/paper/a13a18de0619cf3d652246d37049d73d0e4f35bd", - "title": "Wadge degrees of \u03c9-languages of deterministic Turing machines", - "abstract": "We describe Wadge degrees of \u03c9-languages recognizable by - deterministic Turing machines. In particular, it is shown that the ordinal - corresponding to these degrees is \u03be \u03c9 where \u03be = \u03c9 CK 1 - is the first non-recursive ordinal known as the Church-Kleene ordinal. This - answers a question raised in [Du0?].", "venue": "", "year": 2003, "referenceCount": - 17, "citationCount": 37, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Lecture - Notes in Computer Science", "pages": "97-108", "volume": ""}, "authors": [{"authorId": - "1759890", "name": "V. Selivanov"}]}, {"paperId": "240ee79d85c6d6d380d2194fd185c4050e047c8e", - "externalIds": {"MAG": "1542205957", "DOI": "10.1215/IJM/1256044641", "CorpusId": - 14541212}, "url": "https://www.semanticscholar.org/paper/240ee79d85c6d6d380d2194fd185c4050e047c8e", - "title": "Definability in the Turing degrees", "abstract": "On etend a toutes - les relations denombrables le theoreme de Spector selon lequel tout ideal - denombrable dans les degres de Turing ordonnes D est uniformement definissable - a partir des parametres de D", "venue": "", "year": 1986, "referenceCount": - 13, "citationCount": 53, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}], "publicationTypes": null, "publicationDate": "1986-06-01", - "journal": {"name": "Illinois Journal of Mathematics", "pages": "320-334", - "volume": "30"}, "authors": [{"authorId": "2867082", "name": "T. Slaman"}, - {"authorId": "2174419", "name": "W. Woodin"}]}, {"paperId": "8adb4f682086978515ecb0a2cea5b68ac1c9397a", + string: '{"total": 133751, "offset": 400, "next": 500, "data": [{"paperId": + "de800fabc3158e2b5badad533957f1ccabf1297b", "externalIds": {"MAG": "2141608805", + "DOI": "10.1103/PHYSREVE.64.041909", "CorpusId": 13636066, "PubMed": "11690054"}, + "corpusId": 13636066, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de800fabc3158e2b5badad533957f1ccabf1297b", + "title": "Turing model for the patterns of lady beetles.", "abstract": "We + simulate the patterns on the hard wings of lady beetles using a reaction-diffusion + equation based on the Turing model. A part of a spherical surface is used + to approximate the geometry of the hard wings. Various patterns common to + lady beetles in Taiwan can be produced on this curved surface by adjusting + the parameters of the model.", "venue": "Physical review. E, Statistical, + nonlinear, and soft matter physics", "year": 2001, "referenceCount": 0, "citationCount": + 43, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-09-21", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 041909\n ", + "volume": "64 4 Pt 1"}, "authors": [{"authorId": "32582426", "name": "S. Liaw"}, + {"authorId": "2117953694", "name": "C. C. Yang"}, {"authorId": "2143537543", + "name": "R. T. Liu"}, {"authorId": "2157231817", "name": "J. Hong"}]}, {"paperId": + "8abd5493201de8b734b81a7432fc056871388cff", "externalIds": {"MAG": "1597867279", + "CorpusId": 118277483}, "corpusId": 118277483, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8abd5493201de8b734b81a7432fc056871388cff", + "title": "Minds, Machines and Turing: The Indistinguishability of Indistinguishables", + "abstract": "Turing''s celebrated 1950 paper proposes a very general methodological + criterion for modelling mental function: total functional equivalence and + indistinguishability. His criterion gives rise to a hierarchy of Turing Tests, + from subtotal (\"toy\") fragments of our functions (t1), to total symbolic + (pen-pal) function (T2 -- the standard Turing Test), to total external sensorimotor + (robotic) function (T3), to total internal microfunction (T4), to total indistinguishability + in every empirically discernible respect (T5). This is a \"reverse-engineering\" + hierarchy of (decreasing) empirical underdetermination of the theory by the + data. Level t1 is clearly too underdetermined, T2 is vulnerable to a counterexample + (Searle''s Chinese Room Argument), and T4 and T5 are arbitrarily overdetermined. + Hence T3 is the appropriate target level for cognitive science. When it is + reached, however, there will still remain more unanswerable questions than + when Physics reaches its Grand Unified Theory of Everything (GUTE), because + of the mind/body problem and the other-minds problem, both of which are inherent + in this empirical domain, even though Turing hardly mentions them.", "venue": + "", "year": 2000, "referenceCount": 38, "citationCount": 60, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2293327", + "name": "S. Harnad"}]}, {"paperId": "c24f7825989959f991fe0416f0e35ef5a5eaa5c9", + "externalIds": {"MAG": "2065184494", "DOI": "10.1007/BF01857725", "CorpusId": + 122151269}, "corpusId": 122151269, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c24f7825989959f991fe0416f0e35ef5a5eaa5c9", + "title": "Quantum mechanical Hamiltonian models of discrete processes that + erase their own histories: Application to Turing machines", "abstract": null, + "venue": "", "year": 1982, "referenceCount": 16, "citationCount": 102, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1982-04-01", "journal": {"name": "International Journal + of Theoretical Physics", "pages": "177-201", "volume": "21"}, "authors": [{"authorId": + "2542436", "name": "P. Benioff"}]}, {"paperId": "e8881898c249d59cf1a4d3034ec1b1240b15ee3a", + "externalIds": {"DBLP": "journals/tc/Hennie66", "MAG": "2125468385", "DOI": + "10.1109/PGEC.1966.264374", "CorpusId": 2057763}, "corpusId": 2057763, "publicationVenue": + {"id": "dd69e9c1-7863-4b95-bff7-23c27239d5a6", "name": "IEEE Transactions + on Electronic Computers", "type": "journal", "alternate_names": ["IEEE Trans + Electron Comput"], "issn": "0367-7508", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=4037753"}, + "url": "https://www.semanticscholar.org/paper/e8881898c249d59cf1a4d3034ec1b1240b15ee3a", + "title": "On-Line Turing Machine Computations", "abstract": "This paper investigates + 1) the problem of finding lower bounds on the computation times of on-line + Turing machines, and 2) the trade-off relationship between computation time + and tape dimensionality. It considers problems in which a Turing machine is + supplied with a sequence of inputs representing data to be stored on the machine''s + tape(s), followed by a sequence of inputs requesting the machine to find and + examine various portions of the stored data. The approach taken is to assume + that the machine has been designed to read in and store data in such a way + as to minimize the time required to subsequently locate arbitrary portions + of that data. This approach sometimes makes it possible to find good lower + bouds on the computation time (number of machine steps) needed to process + the portion of the input sequence that calls for the retrieval of data. It + is shown that there are some problems in which an increase in tape dimensionality + appreciably reduces the computation time needed. But it is already known that + increasing the number of a machine''s tapes (beyond two) does not appreciably + decrease the computation time needed. Thus, tape dimensionality and tape multiplicity + are parameters that affect computation time in basically different ways.", + "venue": "IEEE Transactions on Electronic Computers", "year": 1966, "referenceCount": + 4, "citationCount": 82, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1966-02-01", "journal": + {"name": "IEEE Trans. Electron. Comput.", "pages": "35-44", "volume": "15"}, + "authors": [{"authorId": "16820982", "name": "F. Hennie"}]}, {"paperId": "8adb4f682086978515ecb0a2cea5b68ac1c9397a", "externalIds": {"DBLP": "journals/jacm/LinR65", "MAG": "2068988322", "DOI": - "10.1145/321264.321270", "CorpusId": 17789208}, "url": "https://www.semanticscholar.org/paper/8adb4f682086978515ecb0a2cea5b68ac1c9397a", + "10.1145/321264.321270", "CorpusId": 17789208}, "corpusId": 17789208, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8adb4f682086978515ecb0a2cea5b68ac1c9397a", "title": "Computer Studies of Turing Machine Problems", "abstract": "This paper solves a problem relating to Turing machines arising in connection with the Busy Beaver logical game [21. Specifically, with the help of a computer @@ -8584,14 +9817,21 @@ interactions: are determined to b~ 6 and 21 respectively. The functions Y2(n) and SH(n), however, are noncomputable fune. tions.", "venue": "JACM", "year": 1965, "referenceCount": 2, "citationCount": 82, "influentialCitationCount": 12, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1965-04-01", "journal": {"name": "J. ACM", "pages": "196-212", "volume": - "12"}, "authors": [{"authorId": "2108776742", "name": "Shen Lin"}, {"authorId": - "48665617", "name": "T. Rado"}]}, {"paperId": "02d7d62924049c522e99837582713d54aa44245e", + "openAccessPdf": {"url": "https://etd.ohiolink.edu/apexprod/rws_etd/send_file/send?accession=osu1486554418657614&disposition=inline", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1965-04-01", "journal": {"name": "J. ACM", "pages": "196-212", + "volume": "12"}, "authors": [{"authorId": "2108776742", "name": "Shen Lin"}, + {"authorId": "48665617", "name": "T. Rado"}]}, {"paperId": "02d7d62924049c522e99837582713d54aa44245e", "externalIds": {"MAG": "2109999909", "DOI": "10.1073/PNAS.94.24.12765", "CorpusId": - 36626578, "PubMed": "11038594"}, "url": "https://www.semanticscholar.org/paper/02d7d62924049c522e99837582713d54aa44245e", + 36626578, "PubMed": "11038594"}, "corpusId": 36626578, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/02d7d62924049c522e99837582713d54aa44245e", "title": "Twist grain boundaries in three-dimensional lamellar Turing structures.", "abstract": "Steady spatial self-organization of three-dimensional chemical reaction-diffusion systems is discussed with the emphasis put on the possible @@ -8600,7 +9840,8 @@ interactions: boundary embedding a Scherk minimal surface.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 1997, "referenceCount": 35, "citationCount": 38, "influentialCitationCount": 3, - "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc24211?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1997-11-25", "journal": @@ -8608,79 +9849,52 @@ interactions: of America", "pages": "\n 12765-8\n ", "volume": "94 24"}, "authors": [{"authorId": "16167615", "name": "De Wit A"}, {"authorId": "92147854", "name": "P. Borckmans"}, {"authorId": "49808656", "name": "G. Dewel"}]}, {"paperId": - "e8881898c249d59cf1a4d3034ec1b1240b15ee3a", "externalIds": {"DBLP": "journals/tc/Hennie66", - "MAG": "2125468385", "DOI": "10.1109/PGEC.1966.264374", "CorpusId": 2057763}, - "url": "https://www.semanticscholar.org/paper/e8881898c249d59cf1a4d3034ec1b1240b15ee3a", - "title": "On-Line Turing Machine Computations", "abstract": "This paper investigates - 1) the problem of finding lower bounds on the computation times of on-line - Turing machines, and 2) the trade-off relationship between computation time - and tape dimensionality. It considers problems in which a Turing machine is - supplied with a sequence of inputs representing data to be stored on the machine''s - tape(s), followed by a sequence of inputs requesting the machine to find and - examine various portions of the stored data. The approach taken is to assume - that the machine has been designed to read in and store data in such a way - as to minimize the time required to subsequently locate arbitrary portions - of that data. This approach sometimes makes it possible to find good lower - bouds on the computation time (number of machine steps) needed to process - the portion of the input sequence that calls for the retrieval of data. It - is shown that there are some problems in which an increase in tape dimensionality - appreciably reduces the computation time needed. But it is already known that - increasing the number of a machine''s tapes (beyond two) does not appreciably - decrease the computation time needed. Thus, tape dimensionality and tape multiplicity - are parameters that affect computation time in basically different ways.", - "venue": "IEEE Transactions on Electronic Computers", "year": 1966, "referenceCount": - 4, "citationCount": 82, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1966-02-01", "journal": {"name": "IEEE - Trans. Electron. Comput.", "pages": "35-44", "volume": "15"}, "authors": [{"authorId": - "16820982", "name": "F. Hennie"}]}, {"paperId": "c6b117456f19e17955217532299933b11ab9075b", - "externalIds": {"MAG": "1968629600", "DOI": "10.1021/JP000203+", "CorpusId": - 93936924}, "url": "https://www.semanticscholar.org/paper/c6b117456f19e17955217532299933b11ab9075b", - "title": "A Theoretical Study on Turing Patterns in Electrochemical Systems", - "abstract": "We present theoretical studies on pattern formation in electrochemical - systems with an S-shaped current potential curve (S\u2212NDR systems) under - potentiostatic control. Linear stability analysis and simulations of the reaction\u2212migration - equation give evidence that stationary patterns with a defined wavelength - exist in a large parameter range. As it is the case for Turing structures, - the patterns form due to an interplay of short-range activation and long-range - inhibition. It is shown that the constraint on the ratio of the diffusion - constants of activator and inhibitor in reaction\u2212diffusion equations - transforms into a condition involving diffusion and migration lengths of the - system. This condition is fulfilled in practically all electrochemical systems. - The experimental parameters under which the patterns form should be readily - accessible.", "venue": "", "year": 2000, "referenceCount": 0, "citationCount": - 45, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2000-06-01", "journal": {"name": "Journal of Physical - Chemistry B", "pages": "6081-6090", "volume": "104"}, "authors": [{"authorId": - "31579523", "name": "N. Mazouz"}, {"authorId": "2372632", "name": "K. Krischer"}]}, - {"paperId": "daff27fe4f75c5a5baa28f3217cded252d1d6eba", "externalIds": {"MAG": - "2079230941", "DOI": "10.1103/PHYSREVLETT.87.238301", "CorpusId": 16827989, - "PubMed": "11736479"}, "url": "https://www.semanticscholar.org/paper/daff27fe4f75c5a5baa28f3217cded252d1d6eba", - "title": "Spatial periodic forcing of Turing structures.", "abstract": "Spontaneously - evolving Turing structures in the chlorine dioxide-iodine-malonic acid reaction-diffusion - system typically exhibit many defects that break the symmetry of the pattern. - Periodic spatial forcing interacts with the Turing structures and modifies - the pattern symmetry and wavelength. We investigate the role of the amplitude - and wavelength of spatial periodic forcing on the hexagonal pattern of Turing - structures. Experimental results and numerical simulations reveal that forcing - at wavelengths slightly larger than the natural wavelength of the pattern - is most effective in removing defects and producing ordered symmetric hexagonal - patterns.", "venue": "Physical Review Letters", "year": 2001, "referenceCount": - 39, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2001-11-13", "journal": {"name": "Physical - review letters", "pages": "\n 238301\n ", "volume": "87 23"}, - "authors": [{"authorId": "4978913", "name": "M. Dolnik"}, {"authorId": "6742967", - "name": "I. Berenstein"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, - {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "a0746f19b3ebe88de887ad9fdcdfc30d88a794fd", - "externalIds": {"MAG": "2098979122", "DOI": "10.1103/PHYSREVLETT.91.058302", - "CorpusId": 31789658, "PubMed": "12906637"}, "url": "https://www.semanticscholar.org/paper/a0746f19b3ebe88de887ad9fdcdfc30d88a794fd", + "240ee79d85c6d6d380d2194fd185c4050e047c8e", "externalIds": {"MAG": "1542205957", + "DOI": "10.1215/IJM/1256044641", "CorpusId": 14541212}, "corpusId": 14541212, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/240ee79d85c6d6d380d2194fd185c4050e047c8e", + "title": "Definability in the Turing degrees", "abstract": "On etend a toutes + les relations denombrables le theoreme de Spector selon lequel tout ideal + denombrable dans les degres de Turing ordonnes D est uniformement definissable + a partir des parametres de D", "venue": "", "year": 1986, "referenceCount": + 13, "citationCount": 54, "influentialCitationCount": 9, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, + "publicationDate": "1986-06-01", "journal": {"name": "Illinois Journal of + Mathematics", "pages": "320-334", "volume": "30"}, "authors": [{"authorId": + "2867082", "name": "T. Slaman"}, {"authorId": "2174419", "name": "W. Woodin"}]}, + {"paperId": "fd69973f46dadfae90fdfc7fd373abfd190fe726", "externalIds": {"MAG": + "2078932910", "DOI": "10.1103/PHYSREVE.63.026101", "CorpusId": 5415835, "PubMed": + "11308536"}, "corpusId": 5415835, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd69973f46dadfae90fdfc7fd373abfd190fe726", + "title": "Resonant suppression of Turing patterns by periodic illumination.", + "abstract": "We study the resonant behavior of Turing pattern suppression + in a model of the chlorine dioxide-iodine-malonic acid reaction with periodic + illumination. The results of simulations based on integration of partial differential + equations display resonance at the frequency of autonomous oscillations in + the corresponding well stirred system. The resonance in Turing pattern suppression + is sharper at lower complexing agent concentration and is affected by the + waveform of the periodic driving force. Square wave (on-off) periodic forcing + is more effective in suppressing Turing patterns than sinusoidal forcing. + We compare the dynamics of periodically forced Turing patterns with the dynamics + of periodically forced nonhomogeneous states in a system of two identical + coupled cells. Bifurcation analysis based on numerical continuation of the + latter system gives good predictions for the boundaries of the major resonance + regions of the periodically forced patterns.", "venue": "Physical review. + E, Statistical, nonlinear, and soft matter physics", "year": 2001, "referenceCount": + 0, "citationCount": 50, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-01-12", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 026101\n ", "volume": "63 2 Pt 2"}, "authors": + [{"authorId": "4978913", "name": "M. Dolnik"}, {"authorId": "3012371", "name": + "A. Zhabotinsky"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": + "a0746f19b3ebe88de887ad9fdcdfc30d88a794fd", "externalIds": {"MAG": "2098979122", + "DOI": "10.1103/PHYSREVLETT.91.058302", "CorpusId": 31789658, "PubMed": "12906637"}, + "corpusId": 31789658, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/a0746f19b3ebe88de887ad9fdcdfc30d88a794fd", "title": "Superlattice Turing structures in a photosensitive reaction-diffusion system.", "abstract": "Families of complex superlattice structures, consisting of combinations of basic hexagonal or square patterns, are found in a photosensitive @@ -8690,40 +9904,18 @@ interactions: their stability. The technique offers a general approach to generating superlattices for use in information storage and other applications.", "venue": "Physical Review Letters", "year": 2003, "referenceCount": 29, "citationCount": 48, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Materials - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-07-29", "journal": {"name": "Physical review letters", - "pages": "\n 058302\n ", "volume": "91 5"}, "authors": [{"authorId": - "6742967", "name": "I. Berenstein"}, {"authorId": "2586119", "name": "L. Yang"}, - {"authorId": "4978913", "name": "M. Dolnik"}, {"authorId": "3012371", "name": - "A. Zhabotinsky"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": - "79fa28f48eb570e5bda8f8ea46de10ee27ac2ac0", "externalIds": {"MAG": "1970559017", - "DOI": "10.1063/1.456051", "CorpusId": 93459249}, "url": "https://www.semanticscholar.org/paper/79fa28f48eb570e5bda8f8ea46de10ee27ac2ac0", - "title": "Turing instabilities with nearly equal diffusion coefficients", - "abstract": "We show that if a Turing instability occurs in a reaction\u2013diffusion - system with a nearly scalar diffusion matrix, then the parameters of the corresponding - well\u2010mixed system are necessarily such that the well\u2010mixed system - has at least two eigenvalues near zero. Conversely, if the corresponding well\u2010mixed - system is sufficiently close to a coalescence point of Hopf and saddle\u2010node - bifurcations (two eigenvalues are zero at such a point), and if the spatial - domain is sufficiently large, then there exists a nearly scalar diffusion - matrix such that a Turing instability occurs. These results imply that information - on bifurcation loci from experiments in continuous\u2010flow stirred tank - reactor suffices to locate regions of parameter space where Turing instabilities - are likely to occur; no knowledge of the reaction mechanism and rate constants - is needed. In order to illustrate these results, we have analyzed a six\u2010step - model of the Belousov\u2013Zhabotinskii reaction due to Showalter, Noyes, - and Bar\u2010Eli. In this model, the...", "venue": "", "year": 1989, "referenceCount": - 39, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1989-02-01", "journal": {"name": - "Journal of Chemical Physics", "pages": "1588-1599", "volume": "90"}, "authors": - [{"authorId": "78612126", "name": "J. Pearson"}, {"authorId": "3041313", "name": - "W. Horsthemke"}]}, {"paperId": "6e337a017534d269b8b239c26f67824437ee86b1", - "externalIds": {"MAG": "122152775", "CorpusId": 6896193}, "url": "https://www.semanticscholar.org/paper/6e337a017534d269b8b239c26f67824437ee86b1", + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2003-07-29", "journal": {"name": "Physical + review letters", "pages": "\n 058302\n ", "volume": "91 5"}, + "authors": [{"authorId": "6742967", "name": "I. Berenstein"}, {"authorId": + "2586119", "name": "L. Yang"}, {"authorId": "4978913", "name": "M. Dolnik"}, + {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", + "name": "I. Epstein"}]}, {"paperId": "6e337a017534d269b8b239c26f67824437ee86b1", + "externalIds": {"MAG": "122152775", "CorpusId": 6896193}, "corpusId": 6896193, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e337a017534d269b8b239c26f67824437ee86b1", "title": "The Irrelevance of Turing Machines to AI", "abstract": "The common view that the notion of a Turing machine is directly relevant to AI is criticised. It is argued that computers are the result of a convergence of two strands @@ -8743,13 +9935,14 @@ interactions: human or animal intelligence and the engineering applications of AI, as well as other applications of", "venue": "", "year": 2004, "referenceCount": 42, "citationCount": 39, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "145788442", "name": - "A. Sloman"}]}, {"paperId": "57fecee103d7469bb622c774b8c58042decb7982", "externalIds": - {"MAG": "1992267419", "DOI": "10.1103/PHYSREVE.64.026219", "CorpusId": 43328609, - "PubMed": "11497689"}, "url": "https://www.semanticscholar.org/paper/57fecee103d7469bb622c774b8c58042decb7982", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145788442", + "name": "A. Sloman"}]}, {"paperId": "57fecee103d7469bb622c774b8c58042decb7982", + "externalIds": {"MAG": "1992267419", "DOI": "10.1103/PHYSREVE.64.026219", + "CorpusId": 43328609, "PubMed": "11497689"}, "corpusId": 43328609, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/57fecee103d7469bb622c774b8c58042decb7982", "title": "Spatiotemporal dynamics near a supercritical Turing-Hopf bifurcation in a two-dimensional reaction-diffusion system.", "abstract": "Pattern formation in semiconductor heterostructures is studied on the basis of a spatially two-dimensional @@ -8762,18 +9955,42 @@ interactions: of the weakly nonlinear analysis explain the observations in large portions of the parameter space at least qualitatively", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2001, "referenceCount": - 0, "citationCount": 46, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-07-23", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 026219\n ", - "volume": "64 2 Pt 2"}, "authors": [{"authorId": "6627819", "name": "W. Just"}, - {"authorId": "103130993", "name": "M. Bose"}, {"authorId": "2061627162", "name": - "S. Bose"}, {"authorId": "38661493", "name": "H. Engel"}, {"authorId": "2167329", - "name": "E. Sch\u00f6ll"}]}, {"paperId": "f43d04fa9fee0172c3f5757ec6937b19cf4bf487", + 0, "citationCount": 47, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-07-23", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 026219\n ", "volume": "64 2 Pt 2"}, "authors": + [{"authorId": "6627819", "name": "W. Just"}, {"authorId": "103130993", "name": + "M. Bose"}, {"authorId": "2061627162", "name": "S. Bose"}, {"authorId": "38661493", + "name": "H. Engel"}, {"authorId": "2167329", "name": "E. Sch\u00f6ll"}]}, + {"paperId": "c6b117456f19e17955217532299933b11ab9075b", "externalIds": {"MAG": + "1968629600", "DOI": "10.1021/JP000203+", "CorpusId": 93936924}, "corpusId": + 93936924, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6b117456f19e17955217532299933b11ab9075b", + "title": "A Theoretical Study on Turing Patterns in Electrochemical Systems", + "abstract": "We present theoretical studies on pattern formation in electrochemical + systems with an S-shaped current potential curve (S\u2212NDR systems) under + potentiostatic control. Linear stability analysis and simulations of the reaction\u2212migration + equation give evidence that stationary patterns with a defined wavelength + exist in a large parameter range. As it is the case for Turing structures, + the patterns form due to an interplay of short-range activation and long-range + inhibition. It is shown that the constraint on the ratio of the diffusion + constants of activator and inhibitor in reaction\u2212diffusion equations + transforms into a condition involving diffusion and migration lengths of the + system. This condition is fulfilled in practically all electrochemical systems. + The experimental parameters under which the patterns form should be readily + accessible.", "venue": "", "year": 2000, "referenceCount": 0, "citationCount": + 46, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-06-01", "journal": {"name": + "Journal of Physical Chemistry B", "pages": "6081-6090", "volume": "104"}, + "authors": [{"authorId": "31579523", "name": "N. Mazouz"}, {"authorId": "2372632", + "name": "K. Krischer"}]}, {"paperId": "f43d04fa9fee0172c3f5757ec6937b19cf4bf487", "externalIds": {"MAG": "2114865313", "DOI": "10.1103/PHYSREVE.63.056124", - "CorpusId": 39333363, "PubMed": "11414978"}, "url": "https://www.semanticscholar.org/paper/f43d04fa9fee0172c3f5757ec6937b19cf4bf487", + "CorpusId": 39333363, "PubMed": "11414978"}, "corpusId": 39333363, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f43d04fa9fee0172c3f5757ec6937b19cf4bf487", "title": "Turing pattern formation induced by spatially correlated noise.", "abstract": "The effect of spatially correlated noise on Turing structures is analyzed both experimentally and numerically. Using the photosensitive @@ -8783,18 +10000,19 @@ interactions: would be more than sufficient to suppress pattern formation in the case of homogeneous illumination.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2001, "referenceCount": 1, "citationCount": - 45, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-04-25", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 056124\n ", - "volume": "63 5 Pt 2"}, "authors": [{"authorId": "1403379734", "name": "A. - Sanz-Anchelergues"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": - "144854275", "name": "I. Epstein"}, {"authorId": "2614851", "name": "A. P. - Mu\u00f1uzuri"}]}, {"paperId": "f2ac49caaa4e60ff7ae4bde7f2bf41e7b70fd9b0", - "externalIds": {"MAG": "1999075400", "DOI": "10.1142/S0218127494000915", "CorpusId": - 120215795}, "url": "https://www.semanticscholar.org/paper/f2ac49caaa4e60ff7ae4bde7f2bf41e7b70fd9b0", + 45, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-04-25", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 056124\n ", "volume": "63 5 Pt 2"}, "authors": + [{"authorId": "1403379734", "name": "A. Sanz-Anchelergues"}, {"authorId": + "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", "name": "I. + Epstein"}, {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}]}, {"paperId": + "f2ac49caaa4e60ff7ae4bde7f2bf41e7b70fd9b0", "externalIds": {"MAG": "1999075400", + "DOI": "10.1142/S0218127494000915", "CorpusId": 120215795}, "corpusId": 120215795, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f2ac49caaa4e60ff7ae4bde7f2bf41e7b70fd9b0", "title": "EXPERIMENTAL STUDY OF STATIONARY TURING PATTERNS AND THEIR INTERACTION WITH TRAVELING WAVES IN A CHEMICAL SYSTEM", "abstract": "We give a brief review of recent observations of Turing patterns in an isothermal single-phase chemical @@ -8810,15 +10028,61 @@ interactions: growth mechanism of stationary patterns after a supercritical change in parameter value beyond the onset of the Turing instability.", "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 50, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1994-10-01", "journal": - {"name": "International Journal of Bifurcation and Chaos", "pages": "1215-1231", - "volume": "04"}, "authors": [{"authorId": "50010680", "name": "P. Kepper"}, - {"authorId": "145073148", "name": "J. Perraud"}, {"authorId": "12105027", - "name": "B. Rudovics"}, {"authorId": "3250971", "name": "E. Dulos"}]}, {"paperId": - "a3bb1c4be7c8b714ae1b0739c6205f4e88c8ef9c", "externalIds": {"MAG": "2016935008", - "DOI": "10.1103/PHYSREVE.53.4883", "CorpusId": 12087904, "PubMed": "9964816"}, + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1994-10-01", "journal": {"name": "International Journal of Bifurcation and + Chaos", "pages": "1215-1231", "volume": "04"}, "authors": [{"authorId": "50010680", + "name": "P. Kepper"}, {"authorId": "145073148", "name": "J. Perraud"}, {"authorId": + "12105027", "name": "B. Rudovics"}, {"authorId": "3250971", "name": "E. Dulos"}]}, + {"paperId": "925dde3e6d24559e68b725fbb180758c39601581", "externalIds": {"MAG": + "1992153901", "DOI": "10.1103/PHYSREVLETT.81.81", "CorpusId": 120972158}, + "corpusId": 120972158, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/925dde3e6d24559e68b725fbb180758c39601581", + "title": "THREE-DIMENSIONAL TURING STRUCTURES AND SPATIAL SOLITONS IN OPTICAL + PARAMETRIC OSCILLATORS", "abstract": "An order parameter equation is derived + for degenerate optical parametric oscillators in the form of a three-dimensional + Swift-Hohenberg equation. Three-dimensional Turing structures (lamellae and + tetrahedral patterns) and three-dimensional spatial solitons (dark spherical + bubbles) are predicted as stable structures.", "venue": "", "year": 1998, + "referenceCount": 0, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-07-06", + "journal": {"name": "Physical Review Letters", "pages": "81-84", "volume": + "81"}, "authors": [{"authorId": "2640938", "name": "K. Stali\u016bnas"}]}, + {"paperId": "daff27fe4f75c5a5baa28f3217cded252d1d6eba", "externalIds": {"MAG": + "2079230941", "DOI": "10.1103/PHYSREVLETT.87.238301", "CorpusId": 16827989, + "PubMed": "11736479"}, "corpusId": 16827989, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/daff27fe4f75c5a5baa28f3217cded252d1d6eba", + "title": "Spatial periodic forcing of Turing structures.", "abstract": "Spontaneously + evolving Turing structures in the chlorine dioxide-iodine-malonic acid reaction-diffusion + system typically exhibit many defects that break the symmetry of the pattern. + Periodic spatial forcing interacts with the Turing structures and modifies + the pattern symmetry and wavelength. We investigate the role of the amplitude + and wavelength of spatial periodic forcing on the hexagonal pattern of Turing + structures. Experimental results and numerical simulations reveal that forcing + at wavelengths slightly larger than the natural wavelength of the pattern + is most effective in removing defects and producing ordered symmetric hexagonal + patterns.", "venue": "Physical Review Letters", "year": 2001, "referenceCount": + 39, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-11-13", "journal": + {"name": "Physical review letters", "pages": "\n 238301\n ", + "volume": "87 23"}, "authors": [{"authorId": "4978913", "name": "M. Dolnik"}, + {"authorId": "6742967", "name": "I. Berenstein"}, {"authorId": "3012371", + "name": "A. Zhabotinsky"}, {"authorId": "144854275", "name": "I. Epstein"}]}, + {"paperId": "a3bb1c4be7c8b714ae1b0739c6205f4e88c8ef9c", "externalIds": {"MAG": + "2016935008", "DOI": "10.1103/PHYSREVE.53.4883", "CorpusId": 12087904, "PubMed": + "9964816"}, "corpusId": 12087904, "publicationVenue": {"id": "f7dc890d-13a2-4e06-9f76-95c9fd4f8def", + "name": "Physical review. E, Statistical physics, plasmas, fluids, and related + interdisciplinary topics", "alternate_names": ["Phys rev Stat phys plasma + fluid relat interdiscip top"], "issn": "1063-651X", "alternate_issns": ["1095-3787"], + "url": "http://ejournals.ebsco.com/direct.asp?JournalID=101127", "alternate_urls": + ["https://journals.aps.org/pre/", "http://pre.aps.org/", "http://prola.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/a3bb1c4be7c8b714ae1b0739c6205f4e88c8ef9c", "title": "Dynamics of Turing pattern monolayers close to onset.", "abstract": "We perform simulations of Turing patterns confined to a monolayer by a gradient @@ -8830,57 +10094,41 @@ interactions: that in the monolayers, hexagonal phases are restabilized as a result of the longitudinal instability.", "venue": "Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics", "year": 1996, "referenceCount": - 0, "citationCount": 65, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-05-01", "journal": {"name": "Physical review. E, - Statistical physics, plasmas, fluids, and related interdisciplinary topics", - "pages": "\n 4883-4892\n ", "volume": "53 5"}, "authors": - [{"authorId": "29943266", "name": "Dufiet"}, {"authorId": "30159233", "name": - "Boissonade"}]}, {"paperId": "925dde3e6d24559e68b725fbb180758c39601581", "externalIds": - {"MAG": "1992153901", "DOI": "10.1103/PHYSREVLETT.81.81", "CorpusId": 120972158}, - "url": "https://www.semanticscholar.org/paper/925dde3e6d24559e68b725fbb180758c39601581", - "title": "THREE-DIMENSIONAL TURING STRUCTURES AND SPATIAL SOLITONS IN OPTICAL - PARAMETRIC OSCILLATORS", "abstract": "An order parameter equation is derived - for degenerate optical parametric oscillators in the form of a three-dimensional - Swift-Hohenberg equation. Three-dimensional Turing structures (lamellae and - tetrahedral patterns) and three-dimensional spatial solitons (dark spherical - bubbles) are predicted as stable structures.", "venue": "", "year": 1998, - "referenceCount": 0, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + 0, "citationCount": 68, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-07-06", "journal": {"name": - "Physical Review Letters", "pages": "81-84", "volume": "81"}, "authors": [{"authorId": - "2640938", "name": "K. Stali\u016bnas"}]}, {"paperId": "fd69973f46dadfae90fdfc7fd373abfd190fe726", - "externalIds": {"MAG": "2078932910", "DOI": "10.1103/PHYSREVE.63.026101", - "CorpusId": 5415835, "PubMed": "11308536"}, "url": "https://www.semanticscholar.org/paper/fd69973f46dadfae90fdfc7fd373abfd190fe726", - "title": "Resonant suppression of Turing patterns by periodic illumination.", - "abstract": "We study the resonant behavior of Turing pattern suppression - in a model of the chlorine dioxide-iodine-malonic acid reaction with periodic - illumination. The results of simulations based on integration of partial differential - equations display resonance at the frequency of autonomous oscillations in - the corresponding well stirred system. The resonance in Turing pattern suppression - is sharper at lower complexing agent concentration and is affected by the - waveform of the periodic driving force. Square wave (on-off) periodic forcing - is more effective in suppressing Turing patterns than sinusoidal forcing. - We compare the dynamics of periodically forced Turing patterns with the dynamics - of periodically forced nonhomogeneous states in a system of two identical - coupled cells. Bifurcation analysis based on numerical continuation of the - latter system gives good predictions for the boundaries of the major resonance - regions of the periodically forced patterns.", "venue": "Physical review. - E, Statistical, nonlinear, and soft matter physics", "year": 2001, "referenceCount": - 0, "citationCount": 50, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-01-12", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 026101\n ", - "volume": "63 2 Pt 2"}, "authors": [{"authorId": "4978913", "name": "M. Dolnik"}, - {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", - "name": "I. Epstein"}]}, {"paperId": "0530e522b58f76cd46301c5f4ea5128d97463c39", + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-05-01", "journal": + {"name": "Physical review. E, Statistical physics, plasmas, fluids, and related + interdisciplinary topics", "pages": "\n 4883-4892\n ", "volume": + "53 5"}, "authors": [{"authorId": "29943266", "name": "Dufiet"}, {"authorId": + "30159233", "name": "Boissonade"}]}, {"paperId": "79fa28f48eb570e5bda8f8ea46de10ee27ac2ac0", + "externalIds": {"MAG": "1970559017", "DOI": "10.1063/1.456051", "CorpusId": + 93459249}, "corpusId": 93459249, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79fa28f48eb570e5bda8f8ea46de10ee27ac2ac0", + "title": "Turing instabilities with nearly equal diffusion coefficients", + "abstract": "We show that if a Turing instability occurs in a reaction\u2013diffusion + system with a nearly scalar diffusion matrix, then the parameters of the corresponding + well\u2010mixed system are necessarily such that the well\u2010mixed system + has at least two eigenvalues near zero. Conversely, if the corresponding well\u2010mixed + system is sufficiently close to a coalescence point of Hopf and saddle\u2010node + bifurcations (two eigenvalues are zero at such a point), and if the spatial + domain is sufficiently large, then there exists a nearly scalar diffusion + matrix such that a Turing instability occurs. These results imply that information + on bifurcation loci from experiments in continuous\u2010flow stirred tank + reactor suffices to locate regions of parameter space where Turing instabilities + are likely to occur; no knowledge of the reaction mechanism and rate constants + is needed. In order to illustrate these results, we have analyzed a six\u2010step + model of the Belousov\u2013Zhabotinskii reaction due to Showalter, Noyes, + and Bar\u2010Eli. In this model, the...", "venue": "", "year": 1989, "referenceCount": + 39, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-02-01", + "journal": {"name": "Journal of Chemical Physics", "pages": "1588-1599", "volume": + "90"}, "authors": [{"authorId": "78612126", "name": "J. Pearson"}, {"authorId": + "3041313", "name": "W. Horsthemke"}]}, {"paperId": "0530e522b58f76cd46301c5f4ea5128d97463c39", "externalIds": {"MAG": "2045914180", "DOI": "10.1109/81.473567", "CorpusId": - 120835822}, "url": "https://www.semanticscholar.org/paper/0530e522b58f76cd46301c5f4ea5128d97463c39", + 120835822}, "corpusId": 120835822, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0530e522b58f76cd46301c5f4ea5128d97463c39", "title": "Turing patterns in CNNs. I. Once over lightly", "abstract": "The aim of this three part tutorial is to focus the reader''s attention to a new exciting behavior of a particular class of cellular neural networks (CNNs): @@ -8895,15 +10143,21 @@ interactions: equilibrium points of a CNN increases rapidly even though each isolated cell has only one equilibrium point. >", "venue": "", "year": 1995, "referenceCount": 10, "citationCount": 62, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1995-10-01", "journal": - {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", "pages": - "602-611", "volume": "42"}, "authors": [{"authorId": "1876298", "name": "L. - Goras"}, {"authorId": "144848684", "name": "L. Chua"}, {"authorId": "1828440", + "openAccessPdf": {"url": "https://pure.tue.nl/ws/files/1537602/Metis122878.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1995-10-01", + "journal": {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", + "pages": "602-611", "volume": "42"}, "authors": [{"authorId": "1876298", "name": + "L. Goras"}, {"authorId": "144848684", "name": "L. Chua"}, {"authorId": "1828440", "name": "D. Leenaerts"}]}, {"paperId": "5a9bb4750818b756e68e91347fd7618cf96e019b", "externalIds": {"MAG": "2022710553", "DOI": "10.1126/science.1160379", "CorpusId": - 18371056, "PubMed": "18703711"}, "url": "https://www.semanticscholar.org/paper/5a9bb4750818b756e68e91347fd7618cf96e019b", + 18371056, "PubMed": "18703711"}, "corpusId": 18371056, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/5a9bb4750818b756e68e91347fd7618cf96e019b", "title": "reCAPTCHA: Human-Based Character Recognition via Web Security Measures", "abstract": "CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that @@ -8917,17 +10171,22 @@ interactions: of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.", "venue": "Science", "year": 2008, "referenceCount": 20, "citationCount": 1176, "influentialCitationCount": - 53, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-09-12", "journal": {"name": "Science", "pages": "1465 - 1468", "volume": - "321"}, "authors": [{"authorId": "35552151", "name": "L. von Ahn"}, {"authorId": - "2054265110", "name": "Benjamin Maurer"}, {"authorId": "50258677", "name": - "Colin McMillen"}, {"authorId": "2058339483", "name": "David J. Abraham"}, - {"authorId": "143624243", "name": "M. Blum"}]}, {"paperId": "b3296c877ed52b3961990507714b434058977ec9", - "externalIds": {"MAG": "2037486322", "DOI": "10.1126/science.1179047", "CorpusId": - 10194433, "PubMed": "20929839"}, "url": "https://www.semanticscholar.org/paper/b3296c877ed52b3961990507714b434058977ec9", + 53, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cs.cmu.edu/~biglou/reCAPTCHA_Science.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2008-09-12", "journal": + {"name": "Science", "pages": "1465 - 1468", "volume": "321"}, "authors": [{"authorId": + "35552151", "name": "L. von Ahn"}, {"authorId": "2054265110", "name": "Benjamin + Maurer"}, {"authorId": "50258677", "name": "Colin McMillen"}, {"authorId": + "2058339483", "name": "David J. Abraham"}, {"authorId": "143624243", "name": + "M. Blum"}]}, {"paperId": "b3296c877ed52b3961990507714b434058977ec9", "externalIds": + {"MAG": "2037486322", "DOI": "10.1126/science.1179047", "CorpusId": 10194433, + "PubMed": "20929839"}, "corpusId": 10194433, "publicationVenue": {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", + "name": "Science", "type": "journal", "issn": "0193-4511", "alternate_issns": + ["0036-8075"], "url": "https://www.jstor.org/journal/science", "alternate_urls": + ["https://www.sciencemag.org/", "http://www.sciencemag.org/", "http://www.jstor.org/journals/00368075.html", + "http://www.sciencemag.org/archive/"]}, "url": "https://www.semanticscholar.org/paper/b3296c877ed52b3961990507714b434058977ec9", "title": "Reaction-Diffusion Model as a Framework for Understanding Biological Pattern Formation", "abstract": "Turing Model Explained The reaction-diffusion (Turing) model is a theoretical model used to explain self-regulated pattern @@ -8949,16 +10208,17 @@ interactions: describe the essence of this theory for experimental biologists unfamiliar with the model, using examples from experimental studies in which the RD model is effectively incorporated.", "venue": "Science", "year": 2010, "referenceCount": - 41, "citationCount": 1225, "influentialCitationCount": 35, "isOpenAccess": - false, "fieldsOfStudy": ["Medicine", "Engineering", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2010-09-24", "journal": {"name": "Science", - "pages": "1616 - 1620", "volume": "329"}, "authors": [{"authorId": "2636335", - "name": "Shigeru Kondo"}, {"authorId": "47938934", "name": "T. Miura"}]}, - {"paperId": "2abd1507a84a44469395116ef30d394560f4d463", "externalIds": {"MAG": - "2597136551", "CorpusId": 63981862}, "url": "https://www.semanticscholar.org/paper/2abd1507a84a44469395116ef30d394560f4d463", + 41, "citationCount": 1241, "influentialCitationCount": 35, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": + "external"}, {"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2010-09-24", "journal": {"name": "Science", "pages": "1616 - 1620", "volume": + "329"}, "authors": [{"authorId": "2636335", "name": "Shigeru Kondo"}, {"authorId": + "47938934", "name": "T. Miura"}]}, {"paperId": "2abd1507a84a44469395116ef30d394560f4d463", + "externalIds": {"MAG": "2597136551", "CorpusId": 63981862}, "corpusId": 63981862, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2abd1507a84a44469395116ef30d394560f4d463", "title": "Computational studies of pattern formation in Turing systems", "abstract": "This thesis is an analytical and computational treatment of Turing models, which are coupled partial differential equations describing the reaction and @@ -8993,48 +10253,34 @@ interactions: Turing pattern formation brings new insight concerning the state selection problem of non-equilibrium physics.", "venue": "", "year": 2004, "referenceCount": 166, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-11-27", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "35202419", "name": "T. Lepp\u00e4nen"}]}, - {"paperId": "9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", "externalIds": {"MAG": - "2040323430", "DOI": "10.1021/J100195A045", "CorpusId": 95843255}, "url": - "https://www.semanticscholar.org/paper/9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", - "title": "Spatial bistability of two-dimensional turing patterns in a reaction-diffusion - system", "abstract": "A Turing bifurcation from an uniform state to a striped - patterned state was observed in experiments conducted in a single-phase spatial - open gel reactor with the chlorite-iodide-malonic acid-starch (CIMA) reaction; - previous experiments had revealed a bifurcation from a uniform state to hexagons - rather than stripes. A modified reactor is used to demonstrate that the hexagonal - and striped patterns are quasi-two-dimensional; this is further confirmed - by a direct measurement of the third dimension of patterns with a camera of - high resolution in depth of field. For some range of chemical concentrations - the hexagonal and striped patterns are bistable; this is the first evidence - of spatial bistability between Turing structures. 24 refs., 5 tabs.", "venue": - "", "year": 1992, "referenceCount": 0, "citationCount": 42, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "The Journal of Physical Chemistry", "pages": "6773-6776", - "volume": "96"}, "authors": [{"authorId": "143803550", "name": "Q. Ouyang"}, - {"authorId": "5289890", "name": "Z. Noszticzius"}, {"authorId": "2421446", - "name": "H. Swinney"}]}, {"paperId": "abe25dc1a87b5e73eef2baf10fce86aba5679b2a", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-11-27", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "35202419", + "name": "T. Lepp\u00e4nen"}]}, {"paperId": "abe25dc1a87b5e73eef2baf10fce86aba5679b2a", "externalIds": {"MAG": "2048353152", "DBLP": "journals/siamcomp/CuckerG97", - "DOI": "10.1137/S0097539794270340", "CorpusId": 16162743}, "url": "https://www.semanticscholar.org/paper/abe25dc1a87b5e73eef2baf10fce86aba5679b2a", + "DOI": "10.1137/S0097539794270340", "CorpusId": 16162743}, "corpusId": 16162743, + "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": + "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/abe25dc1a87b5e73eef2baf10fce86aba5679b2a", "title": "On the Power of Real Turing Machines Over Binary Inputs", "abstract": "In this paper, we study the computational power of real Turing machines over binary inputs. Our main result is that the class of binary sets that can be decided by real Turing machines in parallel polynomial time is exactly the class PSPACE/poly.", "venue": "SIAM journal on computing (Print)", "year": 1997, "referenceCount": 29, "citationCount": 42, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03049470/file/cucker4%5B1%5D.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1997-02-01", "journal": {"name": "SIAM J. Comput.", "pages": "243-254", "volume": "26"}, "authors": [{"authorId": "1755208", "name": "F. Cucker"}, {"authorId": "144025262", "name": "D. Grigoriev"}]}, {"paperId": "0c9535400d4c75ecbd1d80c74803e218060b4eaa", - "externalIds": {"MAG": "1501224804", "CorpusId": 2880790}, "url": "https://www.semanticscholar.org/paper/0c9535400d4c75ecbd1d80c74803e218060b4eaa", + "externalIds": {"MAG": "1501224804", "CorpusId": 2880790}, "corpusId": 2880790, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0c9535400d4c75ecbd1d80c74803e218060b4eaa", "title": "A. M. Turing''s ACE Report of 1946 and Other Papers", "abstract": "Volume 10 in the Babbage Reprint Series contains two archival papers by Alan Turing-the ACE report (1945), a seminal paper detailing the design for an @@ -9047,25 +10293,48 @@ interactions: Laboratory (1958) gives a brief history of the construction of the pilot ACE, the first functional version of Turing''s universal machine.", "venue": "", "year": 1986, "referenceCount": 117, "citationCount": 55, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1986-04-03", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1690789", "name": "B. Carpenter"}, {"authorId": "1893096", "name": "R. W. - Doran"}]}, {"paperId": "ef9190e7669ea5523c3ef61180b35385b0ea345f", "externalIds": - {"MAG": "2059800182", "DOI": "10.1016/0885-2308(91)90016-J", "CorpusId": 121808836}, - "url": "https://www.semanticscholar.org/paper/ef9190e7669ea5523c3ef61180b35385b0ea345f", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1986-04-03", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "1690789", "name": "B. Carpenter"}, + {"authorId": "1893096", "name": "R. W. Doran"}]}, {"paperId": "9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", + "externalIds": {"MAG": "2040323430", "DOI": "10.1021/J100195A045", "CorpusId": + 95843255}, "corpusId": 95843255, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", + "title": "Spatial bistability of two-dimensional turing patterns in a reaction-diffusion + system", "abstract": "A Turing bifurcation from an uniform state to a striped + patterned state was observed in experiments conducted in a single-phase spatial + open gel reactor with the chlorite-iodide-malonic acid-starch (CIMA) reaction; + previous experiments had revealed a bifurcation from a uniform state to hexagons + rather than stripes. A modified reactor is used to demonstrate that the hexagonal + and striped patterns are quasi-two-dimensional; this is further confirmed + by a direct measurement of the third dimension of patterns with a camera of + high resolution in depth of field. For some range of chemical concentrations + the hexagonal and striped patterns are bistable; this is the first evidence + of spatial bistability between Turing structures. 24 refs., 5 tabs.", "venue": + "", "year": 1992, "referenceCount": 0, "citationCount": 42, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "The Journal of Physical Chemistry", "pages": "6773-6776", + "volume": "96"}, "authors": [{"authorId": "143803550", "name": "Q. Ouyang"}, + {"authorId": "5289890", "name": "Z. Noszticzius"}, {"authorId": "2421446", + "name": "H. Swinney"}]}, {"paperId": "ef9190e7669ea5523c3ef61180b35385b0ea345f", + "externalIds": {"MAG": "2059800182", "DOI": "10.1016/0885-2308(91)90016-J", + "CorpusId": 121808836}, "corpusId": 121808836, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ef9190e7669ea5523c3ef61180b35385b0ea345f", "title": "A comparison of the enhanced Good-Turing and deleted estimation methods for estimating probabilities of English bigrams", "abstract": null, "venue": "", "year": 1991, "referenceCount": 7, "citationCount": 294, "influentialCitationCount": - 10, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Computer Speech & Language", "pages": "19-54", - "volume": "5"}, "authors": [{"authorId": "2244184", "name": "Kenneth Ward - Church"}, {"authorId": "34938639", "name": "W. Gale"}]}, {"paperId": "eb35108a8903c75b96c426b420144353f7f16c7a", - "externalIds": {"MAG": "2008399088", "DBLP": "journals/jacm/Minsky70", "DOI": - "10.1145/321574.321575", "CorpusId": 15661281}, "url": "https://www.semanticscholar.org/paper/eb35108a8903c75b96c426b420144353f7f16c7a", + 10, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Computer Speech & Language", + "pages": "19-54", "volume": "5"}, "authors": [{"authorId": "2244184", "name": + "Kenneth Ward Church"}, {"authorId": "34938639", "name": "W. Gale"}]}, {"paperId": + "eb35108a8903c75b96c426b420144353f7f16c7a", "externalIds": {"MAG": "2008399088", + "DBLP": "journals/jacm/Minsky70", "DOI": "10.1145/321574.321575", "CorpusId": + 15661281}, "corpusId": 15661281, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eb35108a8903c75b96c426b420144353f7f16c7a", "title": "Form and Content in Computer Science (1970 ACM turing lecture)", "abstract": "The trouble with computer science today is an obsessive concern with form instead of content. No, that is the wrong way to begin. By any previous @@ -9087,14 +10356,17 @@ interactions: this essay. This essay has three parts, suggesting form-content confusion in theory of computation, in programming languages, and in education.", "venue": "JACM", "year": 1970, "referenceCount": 21, "citationCount": 80, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1970-04-01", "journal": {"name": "J. ACM", "pages": "197-215", "volume": - "17"}, "authors": [{"authorId": "1847175", "name": "M. Minsky"}]}, {"paperId": - "a74a59c36c5afdea6c42ee43a9c8a3b829ee0491", "externalIds": {"DBLP": "conf/stoc/CuckerKKLW95", - "MAG": "2004419188", "DOI": "10.1145/225058.225155", "CorpusId": 8734358}, - "url": "https://www.semanticscholar.org/paper/a74a59c36c5afdea6c42ee43a9c8a3b829ee0491", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1970-04-01", "journal": {"name": "J. + ACM", "pages": "197-215", "volume": "17"}, "authors": [{"authorId": "1847175", + "name": "M. Minsky"}]}, {"paperId": "a74a59c36c5afdea6c42ee43a9c8a3b829ee0491", + "externalIds": {"DBLP": "conf/stoc/CuckerKKLW95", "MAG": "2004419188", "DOI": + "10.1145/225058.225155", "CorpusId": 8734358}, "corpusId": 8734358, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/a74a59c36c5afdea6c42ee43a9c8a3b829ee0491", "title": "On real Turing machines that toss coins", "abstract": "In this paper we consider real counterparts of classical probabilistic complexity classes in the framework of real Turing machines as introduced by Blum, Shub, and @@ -9108,15 +10380,16 @@ interactions: and arithmetic at unit cost provided we restrict branching to equality tests.", "venue": "Symposium on the Theory of Computing", "year": 1995, "referenceCount": 44, "citationCount": 43, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1995-05-29", "journal": {"pages": "335-342"}, "authors": [{"authorId": "1755208", - "name": "F. Cucker"}, {"authorId": "1729473", "name": "M. Karpinski"}, {"authorId": - "1710207", "name": "P. Koiran"}, {"authorId": "2585736", "name": "Thomas Lickteig"}, - {"authorId": "2663273", "name": "K. Werther"}]}, {"paperId": "31d3b4277d0fef70e86a91704e11019f0a039452", - "externalIds": {"MAG": "1965445146", "DOI": "10.1021/J100185A002", "CorpusId": - 94531267}, "url": "https://www.semanticscholar.org/paper/31d3b4277d0fef70e86a91704e11019f0a039452", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1995-05-29", "journal": {"pages": "335-342"}, "authors": + [{"authorId": "1755208", "name": "F. Cucker"}, {"authorId": "1729473", "name": + "M. Karpinski"}, {"authorId": "1710207", "name": "P. Koiran"}, {"authorId": + "2585736", "name": "Thomas Lickteig"}, {"authorId": "2663273", "name": "K. + Werther"}]}, {"paperId": "31d3b4277d0fef70e86a91704e11019f0a039452", "externalIds": + {"MAG": "1965445146", "DOI": "10.1021/J100185A002", "CorpusId": 94531267}, + "corpusId": 94531267, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/31d3b4277d0fef70e86a91704e11019f0a039452", "title": "Turing Patterns in Confined Gel and Gel-Free Media", "abstract": "We show that the Turing structures recently discovered with the chlorite-iodide-malonic acid oscillating reaction in open gel-filled reactors depend neither on the @@ -9126,15 +10399,19 @@ interactions: complex mediates the relative differences in the diffusivity of reacting species necessary to obtain Turing structures", "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 44, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1992-03-01", "journal": {"name": - "The Journal of Physical Chemistry", "pages": "2400-2403", "volume": "96"}, - "authors": [{"authorId": "46530384", "name": "K. Agladze"}, {"authorId": "3250971", - "name": "E. Dulos"}, {"authorId": "50010680", "name": "P. Kepper"}]}, {"paperId": - "4f99c43a99c5f410d3cdcb3875598c2ea84c2fa7", "externalIds": {"MAG": "2017659568", - "DOI": "10.1103/PHYSREVLETT.69.2729", "CorpusId": 29361907, "PubMed": "10046569"}, - "url": "https://www.semanticscholar.org/paper/4f99c43a99c5f410d3cdcb3875598c2ea84c2fa7", + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1992-03-01", "journal": {"name": "The Journal of Physical Chemistry", "pages": + "2400-2403", "volume": "96"}, "authors": [{"authorId": "46530384", "name": + "K. Agladze"}, {"authorId": "3250971", "name": "E. Dulos"}, {"authorId": "50010680", + "name": "P. Kepper"}]}, {"paperId": "4f99c43a99c5f410d3cdcb3875598c2ea84c2fa7", + "externalIds": {"MAG": "2017659568", "DOI": "10.1103/PHYSREVLETT.69.2729", + "CorpusId": 29361907, "PubMed": "10046569"}, "corpusId": 29361907, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/4f99c43a99c5f410d3cdcb3875598c2ea84c2fa7", "title": "Quasi-two-dimensional Turing patterns in an imposed gradient.", "abstract": "In experiments on quasi-two-dimensional Turing structures, patterns form perpendicular to a concentration gradient imposed by the boundary conditions. @@ -9146,49 +10423,44 @@ interactions: patterns even with equal diffusion coefficients for the activator and inhibitor species", "venue": "Physical Review Letters", "year": 1992, "referenceCount": 0, "citationCount": 44, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1992-11-02", "journal": {"name": "Physical - review letters", "pages": "\n 2729-2732\n ", "volume": "69 - 18"}, "authors": [{"authorId": "2099379248", "name": "Lengyel"}, {"authorId": - "122270121", "name": "K\u00e1d\u00e1r"}, {"authorId": "118781065", "name": - "Epstein"}]}, {"paperId": "0501a27f93ab03f2605e53c9ee7c8084a0a5708e", "externalIds": - {"DBLP": "journals/jolli/Rapaport00", "MAG": "1561013155", "DOI": "10.1023/A:1008319409770", - "CorpusId": 19551177}, "url": "https://www.semanticscholar.org/paper/0501a27f93ab03f2605e53c9ee7c8084a0a5708e", + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1992-11-02", "journal": + {"name": "Physical review letters", "pages": "\n 2729-2732\n ", + "volume": "69 18"}, "authors": [{"authorId": "2099379248", "name": "Lengyel"}, + {"authorId": "122270121", "name": "K\u00e1d\u00e1r"}, {"authorId": "118781065", + "name": "Epstein"}]}, {"paperId": "0501a27f93ab03f2605e53c9ee7c8084a0a5708e", + "externalIds": {"DBLP": "journals/jolli/Rapaport00", "MAG": "1561013155", + "DOI": "10.1023/A:1008319409770", "CorpusId": 19551177}, "corpusId": 19551177, + "publicationVenue": {"id": "9bbf8016-cf61-4c32-9314-fb8139ad6697", "name": + "Journal of Logic, Language and Information", "type": "journal", "alternate_names": + ["J Log Lang Inf"], "issn": "0925-8531", "url": "http://www.springer.com/philosophy/logic/journal/10849", + "alternate_urls": ["http://www.jstor.org/action/showPublication?journalCode=jlogiclanginfo", + "https://www.jstor.org/journal/jlogiclanginfo"]}, "url": "https://www.semanticscholar.org/paper/0501a27f93ab03f2605e53c9ee7c8084a0a5708e", "title": "How to Pass a Turing Test", "abstract": null, "venue": "Journal of Logic, Language and Information", "year": 2000, "referenceCount": 60, "citationCount": - 34, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-10-01", "journal": - {"name": "Journal of Logic, Language and Information", "pages": "467-490", - "volume": "9"}, "authors": [{"authorId": "1712022", "name": "W. Rapaport"}]}, - {"paperId": "6e0dd4045eb019513aec535b0208ea3e75dd3563", "externalIds": {"MAG": - "2318848039", "DOI": "10.2307/2268810", "CorpusId": 117790504}, "url": "https://www.semanticscholar.org/paper/6e0dd4045eb019513aec535b0208ea3e75dd3563", + 34, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-10-01", "journal": {"name": "Journal of Logic, Language and Information", + "pages": "467-490", "volume": "9"}, "authors": [{"authorId": "1712022", "name": + "W. Rapaport"}]}, {"paperId": "6e0dd4045eb019513aec535b0208ea3e75dd3563", + "externalIds": {"MAG": "2318848039", "DOI": "10.2307/2268810", "CorpusId": + 117790504}, "corpusId": 117790504, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e0dd4045eb019513aec535b0208ea3e75dd3563", "title": "Review: A. M. Turing, On Computable Numbers, with an Application to the Entscheidungsproblem", "abstract": null, "venue": "", "year": 1937, - "referenceCount": 0, "citationCount": 393, "influentialCitationCount": 14, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1937-03-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "42-43", - "volume": "2"}, "authors": [{"authorId": "144144981", "name": "A. Church"}]}, - {"paperId": "19f1f54955328d968801915577e1d2a703b0a315", "externalIds": {"MAG": - "1575867194", "DBLP": "conf/mfcs/KanepsF90", "DOI": "10.1007/BFb0029629", - "CorpusId": 2018920}, "url": "https://www.semanticscholar.org/paper/19f1f54955328d968801915577e1d2a703b0a315", - "title": "Minimal Nontrivial Space Complexity of Probabilistic One-Way Turing - Machines", "abstract": null, "venue": "International Symposium on Mathematical - Foundations of Computer Science", "year": 1990, "referenceCount": 6, "citationCount": - 44, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1990-09-01", "journal": - {"pages": "355-361"}, "authors": [{"authorId": "101099519", "name": "J. Kaneps"}, - {"authorId": "1723667", "name": "R. Freivalds"}]}, {"paperId": "e5e44b3ee7a44b56212b1f19a8df042e4e1617cd", + "referenceCount": 0, "citationCount": 392, "influentialCitationCount": 14, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "1937-03-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "42-43", "volume": "2"}, "authors": [{"authorId": "144144981", + "name": "A. Church"}]}, {"paperId": "e5e44b3ee7a44b56212b1f19a8df042e4e1617cd", "externalIds": {"MAG": "2087008115", "DBLP": "journals/jacm/Hartmanis68", - "DOI": "10.1145/321450.321464", "CorpusId": 16544447}, "url": "https://www.semanticscholar.org/paper/e5e44b3ee7a44b56212b1f19a8df042e4e1617cd", + "DOI": "10.1145/321450.321464", "CorpusId": 16544447}, "corpusId": 16544447, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e5e44b3ee7a44b56212b1f19a8df042e4e1617cd", "title": "Computational Complexity of One-Tape Turing Machine Computations", "abstract": "The quantitative aspects of one-tape Turing machine computations are considered. It is shown, for instance, that there exists a sharp time @@ -9200,14 +10472,34 @@ interactions: undecidable how much time is required to recognize a nonregular context-free language on a one-tape Turing machine. Several unsolved problems are discussed.", "venue": "JACM", "year": 1968, "referenceCount": 19, "citationCount": 71, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1968-04-01", "journal": - {"name": "J. ACM", "pages": "325-339", "volume": "15"}, "authors": [{"authorId": - "1747181", "name": "J. Hartmanis"}]}, {"paperId": "f2af440ac6d87c0e3580014da18d060bc50adcc9", - "externalIds": {"DBLP": "conf/cec/Woodward03", "MAG": "2141109918", "DOI": - "10.1109/CEC.2003.1299753", "CorpusId": 16661634}, "url": "https://www.semanticscholar.org/paper/f2af440ac6d87c0e3580014da18d060bc50adcc9", + "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": {"url": + "https://ecommons.cornell.edu/bitstream/1813/5880/1/68-3.pdf", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1968-04-01", "journal": {"name": "J. ACM", "pages": "325-339", "volume": + "15"}, "authors": [{"authorId": "1747181", "name": "J. Hartmanis"}]}, {"paperId": + "19f1f54955328d968801915577e1d2a703b0a315", "externalIds": {"MAG": "1575867194", + "DBLP": "conf/mfcs/KanepsF90", "DOI": "10.1007/BFb0029629", "CorpusId": 2018920}, + "corpusId": 2018920, "publicationVenue": {"id": "8341fde2-3e67-4fde-bb5c-6f0320d7f114", + "name": "International Symposium on Mathematical Foundations of Computer Science", + "type": "conference", "alternate_names": ["Int Symp Math Found Comput Sci", + "MFCS", "Math Found Comput Sci", "Mathematical Foundations of Computer Science"], + "url": "https://en.wikipedia.org/wiki/International_Symposium_on_Mathematical_Foundations_of_Computer_Science"}, + "url": "https://www.semanticscholar.org/paper/19f1f54955328d968801915577e1d2a703b0a315", + "title": "Minimal Nontrivial Space Complexity of Probabilistic One-Way Turing + Machines", "abstract": null, "venue": "International Symposium on Mathematical + Foundations of Computer Science", "year": 1990, "referenceCount": 6, "citationCount": + 44, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1990-09-01", "journal": {"pages": "355-361"}, "authors": [{"authorId": "101099519", + "name": "J. Kaneps"}, {"authorId": "1723667", "name": "R. Freivalds"}]}, {"paperId": + "f2af440ac6d87c0e3580014da18d060bc50adcc9", "externalIds": {"DBLP": "conf/cec/Woodward03", + "MAG": "2141109918", "DOI": "10.1109/CEC.2003.1299753", "CorpusId": 16661634}, + "corpusId": 16661634, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f2af440ac6d87c0e3580014da18d060bc50adcc9", "title": "Evolving Turing Complete representations", "abstract": "Standard GP, chiefly concerned with evolving functions, which are mappings from inputs to output, is not Turing Complete. We raise issues resulting from attempts @@ -9227,14 +10519,49 @@ interactions: terminating programs, thus saving time when testing.", "venue": "The 2003 Congress on Evolutionary Computation, 2003. CEC ''03.", "year": 2003, "referenceCount": 17, "citationCount": 31, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-12-08", "journal": {"name": "The 2003 Congress on Evolutionary Computation, - 2003. CEC ''03.", "pages": "830-837 Vol.2", "volume": "2"}, "authors": [{"authorId": - "143889197", "name": "J. Woodward"}]}, {"paperId": "ac64fb7e6d2ddf236332ec9f371fe85d308c114d", - "externalIds": {"DBLP": "conf/nips/MalinowskiF14", "MAG": "2151498684", "ArXiv": - "1410.0210", "CorpusId": 3158329}, "url": "https://www.semanticscholar.org/paper/ac64fb7e6d2ddf236332ec9f371fe85d308c114d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-12-08", "journal": {"name": "The 2003 Congress on + Evolutionary Computation, 2003. CEC ''03.", "pages": "830-837 Vol.2", "volume": + "2"}, "authors": [{"authorId": "143889197", "name": "J. Woodward"}]}, {"paperId": + "f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", "externalIds": {"MAG": "1882313281", + "DOI": "10.1075/aicr.34.04har", "CorpusId": 143324564}, "corpusId": 143324564, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", + "title": "Turing Indistinguishability and the Blind Watchmaker", "abstract": + "Many special problems crop up when evolutionary theory turns, quite naturally, + to the question of the adaptive value and causal role of consciousness in + human and nonhuman organisms. One problem is that -- unless we are to be dualists, + treating it as an independent nonphysical force -- consciousness could not + have had an independent adaptive function of its own, over and above whatever + behavioral and physiological functions it \"supervenes\" on, because evolution + is completely blind to the difference between a conscious organism and a functionally + equivalent (Turing Indistinguishable) nonconscious \"Zombie\" organism: In + other words, the Blind Watchmaker, a functionalist if ever there was one, + is no more a mind reader than we are. Hence Turing-Indistinguishability = + Darwin-Indistinguishability. It by no means follows from this, however, that + human behavior is therefore to be explained only by the push-pull dynamics + of Zombie determinism, as dictated by calculations of \"inclusive fitness\" + and \"evolutionarily stable strategies.\" We are conscious, and, more important, + that consciousness is piggy-backing somehow on the vast complex of unobservable + internal activity -- call it \"cognition\" -- that is really responsible for + generating all of our behavioral capacities. Hence, except in the palpable + presence of the irrational (e.g., our sexual urges) where distal Darwinian + factors still have some proximal sway, it is as sensible to seek a Darwinian + rather than a cognitive explanation for most of our current behavior as it + is to seek a cosmological rather than an engineering explanation of an automobile''s + behavior. Let evolutionary theory explain what shaped our cognitive capacity + (Steklis & Harnad 1976; Harnad 1996, but let cognitive theory explain our + resulting behavior.", "venue": "", "year": 2002, "referenceCount": 34, "citationCount": + 29, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2002-04-08", "journal": {"name": "", "pages": "3-18", + "volume": ""}, "authors": [{"authorId": "2293327", "name": "S. Harnad"}]}, + {"paperId": "ac64fb7e6d2ddf236332ec9f371fe85d308c114d", "externalIds": {"DBLP": + "conf/nips/MalinowskiF14", "MAG": "2151498684", "ArXiv": "1410.0210", "CorpusId": + 3158329}, "corpusId": 3158329, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ac64fb7e6d2ddf236332ec9f371fe85d308c114d", "title": "A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input", "abstract": "We propose a method for automatically answering questions about images by bringing together recent advances from @@ -9246,54 +10573,41 @@ interactions: The system is directly trained from question-answer pairs. We establish a first benchmark for this task that can be seen as a modern attempt at a visual turing test.", "venue": "NIPS", "year": 2014, "referenceCount": 30, "citationCount": - 587, "influentialCitationCount": 83, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2014-10-01", - "journal": {"name": "ArXiv", "volume": "abs/1410.0210"}, "authors": [{"authorId": - "145478807", "name": "Mateusz Malinowski"}, {"authorId": "1739548", "name": - "Mario Fritz"}]}, {"paperId": "f50bb4e7cfe1cb3f4ad8f6a2d9f5ad5aa8e15192", - "externalIds": {"MAG": "1982435421", "DOI": "10.1103/PHYSREVLETT.90.118302", - "CorpusId": 25208783, "PubMed": "12688972"}, "url": "https://www.semanticscholar.org/paper/f50bb4e7cfe1cb3f4ad8f6a2d9f5ad5aa8e15192", - "title": "Destabilization of Turing structures by electric fields.", "abstract": - "The dynamic behavior of hexagonal Turing patterns in the chlorine dioxide-iodine-malonic - acid reaction was studied in a newly developed open reactor under the influence - of externally applied weak directed current up to 17.5 mA. A transition from - stationary hexagonal patterns to spots moving parallel to the direction of - the applied electric field could be observed. The velocity of the drift increases - monotonously with the applied current. Experimental results could be qualitatively - reproduced in numerical simulations with a reaction-diffusion-advection model, - based on a realistic kinetic mechanism.", "venue": "Physical Review Letters", - "year": 2003, "referenceCount": 18, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-03-21", "journal": - {"name": "Physical review letters", "pages": "\n 118302\n ", - "volume": "90 11"}, "authors": [{"authorId": "48112240", "name": "B. Schmidt"}, - {"authorId": "3242769", "name": "P. De Kepper"}, {"authorId": "144424814", - "name": "S. M\u00fcller"}]}, {"paperId": "c889b18e290312ac956d4041d1a4ff6267b9d43d", + 590, "influentialCitationCount": 85, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2014-10-01", "journal": {"name": "ArXiv", "volume": "abs/1410.0210"}, + "authors": [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": + "1739548", "name": "Mario Fritz"}]}, {"paperId": "c889b18e290312ac956d4041d1a4ff6267b9d43d", "externalIds": {"MAG": "1491862487", "DBLP": "journals/mima/MacLennan03", - "DOI": "10.1023/A:1021397712328", "CorpusId": 22996442}, "url": "https://www.semanticscholar.org/paper/c889b18e290312ac956d4041d1a4ff6267b9d43d", + "DOI": "10.1023/A:1021397712328", "CorpusId": 22996442}, "corpusId": 22996442, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/c889b18e290312ac956d4041d1a4ff6267b9d43d", "title": "Transcending Turing Computability", "abstract": null, "venue": "Minds and Machines", "year": 2003, "referenceCount": 42, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-02-01", "journal": {"name": "Minds and Machines", - "pages": "3-22", "volume": "13"}, "authors": [{"authorId": "1710647", "name": - "B. MacLennan"}]}, {"paperId": "04c85515e21df88d45a4ba3fd3067131a72662b5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-02-01", "journal": + {"name": "Minds and Machines", "pages": "3-22", "volume": "13"}, "authors": + [{"authorId": "1710647", "name": "B. MacLennan"}]}, {"paperId": "04c85515e21df88d45a4ba3fd3067131a72662b5", "externalIds": {"MAG": "2483954911", "DOI": "10.1093/ACPROF:OSO/9780198565932.001.0001", - "CorpusId": 63851068}, "url": "https://www.semanticscholar.org/paper/04c85515e21df88d45a4ba3fd3067131a72662b5", + "CorpusId": 63851068}, "corpusId": 63851068, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/04c85515e21df88d45a4ba3fd3067131a72662b5", "title": "Alan Turing''s Automatic Computing Engine", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 60, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2005-04-14", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "144246233", "name": "B. Copeland"}]}, {"paperId": "e4d2eec1f811a7b12ec84d98fdfd5d3d291cd0c7", - "externalIds": {"MAG": "2089770018", "DOI": "10.1063/1.454456", "CorpusId": - 96882025}, "url": "https://www.semanticscholar.org/paper/e4d2eec1f811a7b12ec84d98fdfd5d3d291cd0c7", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2005-04-14", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "144246233", "name": "B. Copeland"}]}, + {"paperId": "e4d2eec1f811a7b12ec84d98fdfd5d3d291cd0c7", "externalIds": {"MAG": + "2089770018", "DOI": "10.1063/1.454456", "CorpusId": 96882025}, "corpusId": + 96882025, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4d2eec1f811a7b12ec84d98fdfd5d3d291cd0c7", "title": "Turing patterns in an open reactor", "abstract": "Steady spatial chemical patterns have been found in model reaction\u2013diffusion systems but have not yet been observed in any laboratory experiments. The reasons @@ -9308,45 +10622,33 @@ interactions: and a steady\u2010state continuation technique is used to follow stable and unstable branches of bifurcating solutions.", "venue": "", "year": 1988, "referenceCount": 21, "citationCount": 46, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1988-05-15", "journal": {"name": - "Journal of Chemical Physics", "pages": "6175-6181", "volume": "88"}, "authors": - [{"authorId": "65757961", "name": "J. A. Vastano"}, {"authorId": "78612126", - "name": "J. Pearson"}, {"authorId": "3041313", "name": "W. Horsthemke"}, {"authorId": - "2421446", "name": "H. Swinney"}]}, {"paperId": "09b8457827ef183aa20ed02faefb266492e2dfad", - "externalIds": {"MAG": "2120841922", "DOI": "10.1109/81.488819", "CorpusId": - 53126888}, "url": "https://www.semanticscholar.org/paper/09b8457827ef183aa20ed02faefb266492e2dfad", - "title": "The CNN Universal Machine is as universal as a Turing Machine", - "abstract": "It is shown that the simplest integrated circuit implementations - of the CNN Universal Machine can play the \"game of life\", and are therefore - equivalent to Turing Machines. In addition, a constructive proof is given - for the direct implementation of general first-order cellular automata on - such machines.", "venue": "", "year": 1996, "referenceCount": 14, "citationCount": - 36, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1996-04-01", "journal": {"name": - "IEEE Transactions on Circuits and Systems I-regular Papers", "pages": "353-355", - "volume": "43"}, "authors": [{"authorId": "2694304", "name": "K. R. Crounse"}, - {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "d0e6e45312b41eaaa3c3484ca98792e1846f0f95", + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1988-05-15", + "journal": {"name": "Journal of Chemical Physics", "pages": "6175-6181", "volume": + "88"}, "authors": [{"authorId": "65757961", "name": "J. A. Vastano"}, {"authorId": + "78612126", "name": "J. Pearson"}, {"authorId": "3041313", "name": "W. Horsthemke"}, + {"authorId": "2421446", "name": "H. Swinney"}]}, {"paperId": "d0e6e45312b41eaaa3c3484ca98792e1846f0f95", "externalIds": {"DBLP": "journals/ndjfl/Shanker87", "MAG": "2021065331", "DOI": - "10.1305/ndjfl/1093637650", "CorpusId": 13389456}, "url": "https://www.semanticscholar.org/paper/d0e6e45312b41eaaa3c3484ca98792e1846f0f95", + "10.1305/ndjfl/1093637650", "CorpusId": 13389456}, "corpusId": 13389456, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d0e6e45312b41eaaa3c3484ca98792e1846f0f95", "title": "Wittgenstein versus Turing on the nature of Church''s thesis", "abstract": "Discussion des raisons du scepticisme wittgensteinnien vis-a-vis de l''importance de la these de Church, et des machines de Turing pour les fondements des mathematiques et de la psychologie. L''A. commence par reconstituer la doctrine de Wittgenstein, a partir de textes disperses, puis en discute la pertinence", "venue": "Notre Dame J. Formal Log.", "year": 1987, "referenceCount": 0, "citationCount": - 41, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "external"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1987-10-01", "journal": - {"name": "Notre Dame J. Formal Log.", "pages": "615-649", "volume": "28"}, - "authors": [{"authorId": "50638441", "name": "S. Shanker"}]}, {"paperId": - "b72a7bff47d2a982c2070f601586b68177c5a699", "externalIds": {"DBLP": "conf/stoc/InoueTT82", - "MAG": "1989554258", "DOI": "10.1145/800070.802175", "CorpusId": 11897231}, - "url": "https://www.semanticscholar.org/paper/b72a7bff47d2a982c2070f601586b68177c5a699", + 41, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1987-10-01", "journal": {"name": "Notre Dame J. Formal Log.", "pages": "615-649", + "volume": "28"}, "authors": [{"authorId": "50638441", "name": "S. Shanker"}]}, + {"paperId": "b72a7bff47d2a982c2070f601586b68177c5a699", "externalIds": {"DBLP": + "conf/stoc/InoueTT82", "MAG": "1989554258", "DOI": "10.1145/800070.802175", + "CorpusId": 11897231}, "corpusId": 11897231, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/b72a7bff47d2a982c2070f601586b68177c5a699", "title": "Two-dimensional alternating Turing machines", "abstract": "This paper introduces a two-dimensional alternating Turing machine (2-ATM) which is an extension of an alternating Turing machine to two-dimensions. This paper @@ -9360,17 +10662,23 @@ interactions: based on leaf-size bounded computations. We finally investigate the recognizability of connected patterns by 2-ATM''s (or TR2-ATM''s).", "venue": "Symposium on the Theory of Computing", "year": 1982, "referenceCount": 16, "citationCount": - 46, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1982-05-05", "journal": {"name": "Theor. Comput. Sci.", - "pages": "61-83", "volume": "27"}, "authors": [{"authorId": "1737209", "name": - "Katsushi Inoue"}, {"authorId": "2339053", "name": "I. Takanami"}, {"authorId": - "2054314776", "name": "H. Taniguchi"}]}, {"paperId": "fdf84a06c78d67acfcba0a8d9739e8ffd58e4e88", - "externalIds": {"MAG": "2135479512", "DOI": "10.1021/JP0505882", "CorpusId": - 20283317, "PubMed": "16839063"}, "url": "https://www.semanticscholar.org/paper/fdf84a06c78d67acfcba0a8d9739e8ffd58e4e88", + 46, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1982-05-05", "journal": {"name": "Theor. + Comput. Sci.", "pages": "61-83", "volume": "27"}, "authors": [{"authorId": + "1737209", "name": "Katsushi Inoue"}, {"authorId": "2339053", "name": "I. + Takanami"}, {"authorId": "2054314776", "name": "H. Taniguchi"}]}, {"paperId": + "fdf84a06c78d67acfcba0a8d9739e8ffd58e4e88", "externalIds": {"MAG": "2135479512", + "DOI": "10.1021/JP0505882", "CorpusId": 20283317, "PubMed": "16839063"}, "corpusId": + 20283317, "publicationVenue": {"id": "5f859516-15a8-4333-8460-9fcabe48d75e", + "name": "Journal of Physical Chemistry A", "type": "journal", "alternate_names": + ["J Phys Chem A", "The Journal of Physical Chemistry", "J Phys Chem"], "issn": + "1089-5639", "alternate_issns": ["0092-7325", "0022-3654"], "url": "https://pubs.acs.org/journal/jpcafh", + "alternate_urls": ["http://pubs.acs.org/journals/jpcafh/", "http://pubs.acs.org/journal/jpcafh", + "https://pubs.acs.org/loi/jpchax"]}, "url": "https://www.semanticscholar.org/paper/fdf84a06c78d67acfcba0a8d9739e8ffd58e4e88", "title": "Dynamic mechanism of photochemical induction of turing superlattices in the chlorine dioxide-iodine-malonic acid reaction-diffusion system.", "abstract": "We study the mechanism of development of superlattice Turing structures from @@ -9385,9 +10693,10 @@ interactions: illumination ceases, while photochemically generated harmonics outside the Turing band tend to decay.", "venue": "Journal of Physical Chemistry A", "year": 2005, "referenceCount": 2, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://hopf.chem.brandeis.edu/pubs/pub313 + rep.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Chemistry", "Medicine"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2005-06-23", "journal": {"name": "The journal of physical chemistry. A", "pages": "\n 5382-7\n ", "volume": "109 24"}, "authors": [{"authorId": "6742967", "name": "I. Berenstein"}, @@ -9395,16 +10704,56 @@ interactions: "M. Dolnik"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "cfc8aaccf67a98223105b07217f069dd7d4e3ca6", "externalIds": {"DBLP": "journals/mima/Piccinini00", "MAG": "1585299760", - "DOI": "10.1023/A:1011246220923", "CorpusId": 23502398}, "url": "https://www.semanticscholar.org/paper/cfc8aaccf67a98223105b07217f069dd7d4e3ca6", + "DOI": "10.1023/A:1011246220923", "CorpusId": 23502398}, "corpusId": 23502398, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/cfc8aaccf67a98223105b07217f069dd7d4e3ca6", "title": "Turing''s Rules for the Imitation Game", "abstract": null, "venue": "Minds and Machines", "year": 2000, "referenceCount": 15, "citationCount": - 25, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-11-01", "journal": - {"name": "Minds and Machines", "pages": "573-582", "volume": "10"}, "authors": - [{"authorId": "144363427", "name": "G. Piccinini"}]}, {"paperId": "dd133f7f4a7ed84cb80e32796b3ec4b2a0617e0b", - "externalIds": {"MAG": "1510753393", "CorpusId": 16832400}, "url": "https://www.semanticscholar.org/paper/dd133f7f4a7ed84cb80e32796b3ec4b2a0617e0b", + 25, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Education", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-11-01", "journal": {"name": "Minds and Machines", "pages": "573-582", + "volume": "10"}, "authors": [{"authorId": "144363427", "name": "G. Piccinini"}]}, + {"paperId": "f1bab49343a36a5fe39ba7c238277195bb965aa2", "externalIds": {"MAG": + "75914733", "CorpusId": 11154599}, "corpusId": 11154599, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f1bab49343a36a5fe39ba7c238277195bb965aa2", + "title": "Beyond Turing Equivalence", "abstract": "What is the relation between + intelligence and computation? Although the difficulty of defining `intelligence'' + is widely recognized, many are unaware that it is hard to give a satisfactory + definition of `computational'' if computation is supposed to provide a non-circular + explanation for intelligent abilities. The only well-defined notion of `computation'' + is what can be generated by a Turing machine or a formally equivalent mechanism. + This is not adequate for the key role in explaining the nature of mental processes, + because it is too general, as many computations involve nothing mental, nor + even processes: they are simply abstract structures. We need to combine the + notion of `computation'' with that of `machine''. This may still be too restrictive, + if some non-computational mechanisms prove to be useful for intelligence. + We need a theory-based taxonomy of {\\em architectures} and {\\em mechanisms} + and corresponding process types. Computational machines my turn out to be + a sub-class of the machines available for implementing intelligent agents. + The more general analysis starts with the notion of a system with independently + variable, causally interacting sub-states that have different causal roles, + including both `belief-like'' and `desire-like'' sub-states, and many others. + There are many significantly different such architectures. For certain architectures + (including simple computers), some sub-states have a semantic interpretation + for the system. The relevant concept of semantics is defined partly in terms + of a kind of Tarski-like structural correspondence (not to be confused with + isomorphism). This always leaves some semantic indeterminacy, which can be + reduced by causal loops involving the environment. But the causal links are + complex, can share causal pathways, and always leave mental states to some + extent semantically indeterminate.", "venue": "", "year": 1996, "referenceCount": + 44, "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145788442", + "name": "A. Sloman"}]}, {"paperId": "dd133f7f4a7ed84cb80e32796b3ec4b2a0617e0b", + "externalIds": {"MAG": "1510753393", "CorpusId": 16832400}, "corpusId": 16832400, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dd133f7f4a7ed84cb80e32796b3ec4b2a0617e0b", "title": "The Turing Completeness of Multimodal Categorial Grammars", "abstract": "In this paper, we demonstrate that the multimodal categorial grammars are in fact Turing-complete in their weak generative capacity. The result follows @@ -9412,14 +10761,14 @@ interactions: associative and modal categorial calculus. We conclude with a discussion of a restriction to the so-caled weak Sahlqvist lexical rules, for which we can ensure decidability.", "venue": "", "year": 1999, "referenceCount": 21, "citationCount": - 32, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "2579894", "name": "B. Carpenter"}]}, - {"paperId": "5ba38241f9b4b1eae9ed110ea1a36a1b95a14c02", "externalIds": {"DBLP": - "journals/cai/Wiedermann02", "MAG": "1598387104", "CorpusId": 2856100}, "url": - "https://www.semanticscholar.org/paper/5ba38241f9b4b1eae9ed110ea1a36a1b95a14c02", + 32, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Linguistics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "2579894", "name": "B. + Carpenter"}]}, {"paperId": "5ba38241f9b4b1eae9ed110ea1a36a1b95a14c02", "externalIds": + {"DBLP": "journals/cai/Wiedermann02", "MAG": "1598387104", "CorpusId": 2856100}, + "corpusId": 2856100, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5ba38241f9b4b1eae9ed110ea1a36a1b95a14c02", "title": "Fuzzy Turing Machines Revised", "abstract": "Fuzzy Turing machines and fuzzy languages were introduced by Zadeh, Lee and Santos in nineteen seventies. Unfortunately, it appears that from computability point of view their model @@ -9431,46 +10780,28 @@ interactions: Its acceptance criterion is modified so that the resulting model obeys the Church--Turing Thesis.", "venue": "Comput. Artif. Intell.", "year": 2002, "referenceCount": 5, "citationCount": 27, "influentialCitationCount": 3, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Comput. Artif. Intell.", "pages": "251-263", "volume": - "21"}, "authors": [{"authorId": "1815433", "name": "J. Wiedermann"}]}, {"paperId": - "f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", "externalIds": {"MAG": "1882313281", - "DOI": "10.1075/aicr.34.04har", "CorpusId": 143324564}, "url": "https://www.semanticscholar.org/paper/f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", - "title": "Turing Indistinguishability and the Blind Watchmaker", "abstract": - "Many special problems crop up when evolutionary theory turns, quite naturally, - to the question of the adaptive value and causal role of consciousness in - human and nonhuman organisms. One problem is that -- unless we are to be dualists, - treating it as an independent nonphysical force -- consciousness could not - have had an independent adaptive function of its own, over and above whatever - behavioral and physiological functions it \"supervenes\" on, because evolution - is completely blind to the difference between a conscious organism and a functionally - equivalent (Turing Indistinguishable) nonconscious \"Zombie\" organism: In - other words, the Blind Watchmaker, a functionalist if ever there was one, - is no more a mind reader than we are. Hence Turing-Indistinguishability = - Darwin-Indistinguishability. It by no means follows from this, however, that - human behavior is therefore to be explained only by the push-pull dynamics - of Zombie determinism, as dictated by calculations of \"inclusive fitness\" - and \"evolutionarily stable strategies.\" We are conscious, and, more important, - that consciousness is piggy-backing somehow on the vast complex of unobservable - internal activity -- call it \"cognition\" -- that is really responsible for - generating all of our behavioral capacities. Hence, except in the palpable - presence of the irrational (e.g., our sexual urges) where distal Darwinian - factors still have some proximal sway, it is as sensible to seek a Darwinian - rather than a cognitive explanation for most of our current behavior as it - is to seek a cosmological rather than an engineering explanation of an automobile''s - behavior. Let evolutionary theory explain what shaped our cognitive capacity - (Steklis & Harnad 1976; Harnad 1996, but let cognitive theory explain our - resulting behavior.", "venue": "", "year": 2002, "referenceCount": 34, "citationCount": - 28, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-04-08", - "journal": {"name": "", "pages": "3-18", "volume": ""}, "authors": [{"authorId": - "2293327", "name": "S. Harnad"}]}, {"paperId": "509788d7ec9cadf78ae0de309802ea25e1d29233", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Comput. Artif. Intell.", "pages": + "251-263", "volume": "21"}, "authors": [{"authorId": "1815433", "name": "J. + Wiedermann"}]}, {"paperId": "0af772cd976b87dfd40c1d8694baa361e80f78ba", "externalIds": + {"DBLP": "journals/corr/quant-ph-9906084", "MAG": "1848471706", "ArXiv": "quant-ph/9906084", + "DOI": "10.1007/3-540-48340-3_39", "CorpusId": 15316349}, "corpusId": 15316349, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0af772cd976b87dfd40c1d8694baa361e80f78ba", + "title": "A Foundation of Programming a Multi-tape Quantum Turing Machine", + "abstract": null, "venue": "MFCS", "year": 1999, "referenceCount": 4, "citationCount": + 31, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/quant-ph/9906084v1.pdf", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "1999-06-23", "journal": + {"name": "ArXiv", "volume": "quant-ph/9906084"}, "authors": [{"authorId": + "1699072", "name": "T. Yamakami"}]}, {"paperId": "509788d7ec9cadf78ae0de309802ea25e1d29233", "externalIds": {"MAG": "1964968645", "DOI": "10.1103/PHYSREVE.66.046202", - "CorpusId": 45344436, "PubMed": "12443294"}, "url": "https://www.semanticscholar.org/paper/509788d7ec9cadf78ae0de309802ea25e1d29233", + "CorpusId": 45344436, "PubMed": "12443294"}, "corpusId": 45344436, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/509788d7ec9cadf78ae0de309802ea25e1d29233", "title": "Switching-induced Turing instability.", "abstract": "We propose a mechanism for inducing a Turing instability in systems whose only stable state is pattern-free and homogeneous. Global alternation between two dynamics, @@ -9484,74 +10815,51 @@ interactions: models that are relevant in morphogenesis.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2002, "referenceCount": 2, "citationCount": 28, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2002-10-04", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 046202\n ", - "volume": "66 4 Pt 2"}, "authors": [{"authorId": "2513796", "name": "J. Buceta"}, - {"authorId": "143811754", "name": "K. Lindenberg"}]}, {"paperId": "0af772cd976b87dfd40c1d8694baa361e80f78ba", - "externalIds": {"DBLP": "journals/corr/quant-ph-9906084", "MAG": "1848471706", - "ArXiv": "quant-ph/9906084", "DOI": "10.1007/3-540-48340-3_39", "CorpusId": - 15316349}, "url": "https://www.semanticscholar.org/paper/0af772cd976b87dfd40c1d8694baa361e80f78ba", - "title": "A Foundation of Programming a Multi-tape Quantum Turing Machine", - "abstract": null, "venue": "MFCS", "year": 1999, "referenceCount": 4, "citationCount": - 31, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1999-06-23", "journal": {"name": "ArXiv", - "volume": "quant-ph/9906084"}, "authors": [{"authorId": "1699072", "name": - "T. Yamakami"}]}, {"paperId": "886d6bd88f6bb060b01b42f5afc237ae66c3a77c", - "externalIds": {"MAG": "2074590458", "DOI": "10.1063/1.165967", "CorpusId": - 40407057, "PubMed": "12780009"}, "url": "https://www.semanticscholar.org/paper/886d6bd88f6bb060b01b42f5afc237ae66c3a77c", - "title": "Molecular Turing structures in the biochemistry of the cell.", "abstract": - "Reactive lattice gas automata simulations show that Turing structure can - form on a mesoscopic scale and are stable to molecular fluctuations in this - domain. Calculations on the Sel''kov model suggest that Turing instabilities - can give rise to global spatial symmetry breaking in ATP concentration within - the cell cytoplasm with a mesoscopic Turing scale well within typical cell - dimensions. This leads to a new mechanism for the global breaking of energy - distribution in the cell. It also leads to reappraisal of the importance of - the Turing effect on extended biochemical spatial structures and energy transport - available to cell morphogenesis.", "venue": "Chaos", "year": 1993, "referenceCount": - 18, "citationCount": 38, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Chaos", "pages": "\n 7-13\n ", - "volume": "3 1"}, "authors": [{"authorId": "2880149", "name": "B. Hasslacher"}, - {"authorId": "2433318", "name": "R. Kapral"}, {"authorId": "1774400", "name": - "A. Lawniczak"}]}, {"paperId": "c23e618a2be0cea6a5a10bb89ddae53f3f74dfc5", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2002-10-04", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 046202\n ", "volume": "66 4 Pt 2"}, "authors": + [{"authorId": "2513796", "name": "J. Buceta"}, {"authorId": "143811754", "name": + "K. Lindenberg"}]}, {"paperId": "c23e618a2be0cea6a5a10bb89ddae53f3f74dfc5", "externalIds": {"MAG": "1520909268", "DOI": "10.1007/978-3-662-21963-8_7", - "CorpusId": 27296761}, "url": "https://www.semanticscholar.org/paper/c23e618a2be0cea6a5a10bb89ddae53f3f74dfc5", + "CorpusId": 27296761}, "corpusId": 27296761, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c23e618a2be0cea6a5a10bb89ddae53f3f74dfc5", "title": "K-graph machines : generalizing Turing''s machines and arguments", "abstract": null, "venue": "", "year": 1996, "referenceCount": 41, "citationCount": - 32, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "98-119", "volume": ""}, "authors": [{"authorId": "1795549", "name": - "W. Sieg"}, {"authorId": "145480284", "name": "John Byrnes"}]}, {"paperId": - "167df65b92ddc6c87e88d43f43445df28086bd9c", "externalIds": {"MAG": "1497032174", - "CorpusId": 15642803}, "url": "https://www.semanticscholar.org/paper/167df65b92ddc6c87e88d43f43445df28086bd9c", - "title": "Naive psychology and the inverted Turing test", "abstract": "This - paper argues that the Turing test implicitly rests on a \u2018naive psychology,\u2019 - a naturally evolved psychological faculty which is used to predict and understand - the behaviour of others in complex societies. This natural faculty is an important - and implicit bias in the observer\u2019s tendency to ascribe mentality to - the system in the test. The paper analyses the effects of this naive psychology - on the Turing test, both from the side of the system and the side of the observer, - and then proposes and justifies an inverted version of the test which allows - the processes of ascription to be analysed more directly than in the standard - version.", "venue": "", "year": 1996, "referenceCount": 24, "citationCount": - 32, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "50744247", "name": "S. Watt"}]}, {"paperId": "d58a4012c6d4306836096061a63ef1d771f97b07", + 32, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://projecteuclid.org/ebooks/lecture-notes-in-logic/G%c3%b6del-96--Logical-foundations-of-mathematics-computer-science-and/chapter/K-graph-machines-generalizing-Turings-machines-and-arguments/lnl/1235417017.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "98-119", "volume": ""}, "authors": + [{"authorId": "1795549", "name": "W. Sieg"}, {"authorId": "145480284", "name": + "John Byrnes"}]}, {"paperId": "fa11e37b04cbf4eb55145fa5ac0f632c291b12aa", + "externalIds": {"CorpusId": 11565012}, "corpusId": 11565012, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fa11e37b04cbf4eb55145fa5ac0f632c291b12aa", + "title": "The Turing Test : The First Fifty Years", "abstract": "The Turing + Test, originally proposed as a simple operational definition of intelligence, + has now been with us for exactly half a century. It is safe to say that no + other single article in computer science, and few other articles in science + in general, have generated so much discussion. The present article chronicles + the comments and controversy surrounding Turing\u2019s classic article from + its publication to the present. The changing perception of the Turing Test + over the last fifty years has paralleled the changing attitudes in the scientific + community towards artificial intelligence: from the unbridled optimism of + 1960\u2019s to the current realization of the immense difficulties that still + lie ahead. I conclude with the prediction that the Turing Test will remain + important, not only as a landmark in the history of the development of intelligent + machines, but also with real relevance to future generations of people living + in a world in which the cognitive capacities of machines will be vastly greater + than they are now.", "venue": "", "year": 2000, "referenceCount": 45, "citationCount": + 27, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2440747", "name": "R. French"}, + {"authorId": "52070849", "name": "Alan Mathison"}]}, {"paperId": "d58a4012c6d4306836096061a63ef1d771f97b07", "externalIds": {"DOI": "10.1080/00029890.1995.12004608", "CorpusId": 123447686}, - "url": "https://www.semanticscholar.org/paper/d58a4012c6d4306836096061a63ef1d771f97b07", + "corpusId": 123447686, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d58a4012c6d4306836096061a63ef1d771f97b07", "title": "ALAN TURING AND THE CENTRAL LIMIT THEOREM", "abstract": "Although the English mathematician Alan Mathison Turing (1912-1954) is remembered today primarily for his work in mathematical logic (Turing machines and the \" Entscheidungsproblem\"), @@ -9567,33 +10875,32 @@ interactions: its surprising aftermath: his use of statistical methods during World War II to break key German military codes.", "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 32, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2347279", "name": "S. Zabell"}]}, {"paperId": "fa11e37b04cbf4eb55145fa5ac0f632c291b12aa", - "externalIds": {"CorpusId": 11565012}, "url": "https://www.semanticscholar.org/paper/fa11e37b04cbf4eb55145fa5ac0f632c291b12aa", - "title": "The Turing Test : The First Fifty Years", "abstract": "The Turing - Test, originally proposed as a simple operational definition of intelligence, - has now been with us for exactly half a century. It is safe to say that no - other single article in computer science, and few other articles in science - in general, have generated so much discussion. The present article chronicles - the comments and controversy surrounding Turing\u2019s classic article from - its publication to the present. The changing perception of the Turing Test - over the last fifty years has paralleled the changing attitudes in the scientific - community towards artificial intelligence: from the unbridled optimism of - 1960\u2019s to the current realization of the immense difficulties that still - lie ahead. I conclude with the prediction that the Turing Test will remain - important, not only as a landmark in the history of the development of intelligent - machines, but also with real relevance to future generations of people living - in a world in which the cognitive capacities of machines will be vastly greater - than they are now.", "venue": "", "year": 2000, "referenceCount": 45, "citationCount": - 27, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2440747", "name": "R. French"}, {"authorId": "52070849", "name": - "Alan Mathison"}]}, {"paperId": "534a819e0b8d199cf1ffedbbdff68a076ea77ecd", - "externalIds": {"MAG": "2140188317", "DBLP": "journals/jetai/French00", "DOI": - "10.1080/09528130050111464", "CorpusId": 9022405}, "url": "https://www.semanticscholar.org/paper/534a819e0b8d199cf1ffedbbdff68a076ea77ecd", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2347279", "name": "S. Zabell"}]}, + {"paperId": "167df65b92ddc6c87e88d43f43445df28086bd9c", "externalIds": {"MAG": + "1497032174", "CorpusId": 15642803}, "corpusId": 15642803, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/167df65b92ddc6c87e88d43f43445df28086bd9c", + "title": "Naive psychology and the inverted Turing test", "abstract": "This + paper argues that the Turing test implicitly rests on a \u2018naive psychology,\u2019 + a naturally evolved psychological faculty which is used to predict and understand + the behaviour of others in complex societies. This natural faculty is an important + and implicit bias in the observer\u2019s tendency to ascribe mentality to + the system in the test. The paper analyses the effects of this naive psychology + on the Turing test, both from the side of the system and the side of the observer, + and then proposes and justifies an inverted version of the test which allows + the processes of ascription to be analysed more directly than in the standard + version.", "venue": "", "year": 1996, "referenceCount": 24, "citationCount": + 32, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "50744247", "name": "S. Watt"}]}, + {"paperId": "534a819e0b8d199cf1ffedbbdff68a076ea77ecd", "externalIds": {"MAG": + "2140188317", "DBLP": "journals/jetai/French00", "DOI": "10.1080/09528130050111464", + "CorpusId": 9022405}, "corpusId": 9022405, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/534a819e0b8d199cf1ffedbbdff68a076ea77ecd", "title": "Peeking behind the screen: the unsuspected power of the standard Turing Test", "abstract": "No computer that had not experienced the world as we humans had could pass a rigorously administered standard Turing Test. @@ -9613,46 +10920,16 @@ interactions: is not a reasonable test for general machine intelligence. There is no need for an even stronger version of the Test.", "venue": "J. Exp. Theor. Artif. Intell.", "year": 2000, "referenceCount": 20, "citationCount": 28, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-07-01", "journal": {"name": "Journal of Experimental - & Theoretical Artificial Intelligence", "pages": "331 - 340", "volume": "12"}, - "authors": [{"authorId": "2440747", "name": "R. French"}]}, {"paperId": "f1bab49343a36a5fe39ba7c238277195bb965aa2", - "externalIds": {"MAG": "75914733", "CorpusId": 11154599}, "url": "https://www.semanticscholar.org/paper/f1bab49343a36a5fe39ba7c238277195bb965aa2", - "title": "Beyond Turing Equivalence", "abstract": "What is the relation between - intelligence and computation? Although the difficulty of defining `intelligence'' - is widely recognized, many are unaware that it is hard to give a satisfactory - definition of `computational'' if computation is supposed to provide a non-circular - explanation for intelligent abilities. The only well-defined notion of `computation'' - is what can be generated by a Turing machine or a formally equivalent mechanism. - This is not adequate for the key role in explaining the nature of mental processes, - because it is too general, as many computations involve nothing mental, nor - even processes: they are simply abstract structures. We need to combine the - notion of `computation'' with that of `machine''. This may still be too restrictive, - if some non-computational mechanisms prove to be useful for intelligence. - We need a theory-based taxonomy of {\\em architectures} and {\\em mechanisms} - and corresponding process types. Computational machines my turn out to be - a sub-class of the machines available for implementing intelligent agents. - The more general analysis starts with the notion of a system with independently - variable, causally interacting sub-states that have different causal roles, - including both `belief-like'' and `desire-like'' sub-states, and many others. - There are many significantly different such architectures. For certain architectures - (including simple computers), some sub-states have a semantic interpretation - for the system. The relevant concept of semantics is defined partly in terms - of a kind of Tarski-like structural correspondence (not to be confused with - isomorphism). This always leaves some semantic indeterminacy, which can be - reduced by causal loops involving the environment. But the causal links are - complex, can share causal pathways, and always leave mental states to some - extent semantically indeterminate.", "venue": "", "year": 1996, "referenceCount": - 44, "citationCount": 34, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "145788442", "name": - "A. Sloman"}]}, {"paperId": "3696b30d042ccd6d0d9cf953d1821678b143d14e", "externalIds": - {"MAG": "2123995545", "DOI": "10.1890/0012-9658(2002)083[0028:MIBPCG]2.0.CO;2", - "CorpusId": 52243065}, "url": "https://www.semanticscholar.org/paper/3696b30d042ccd6d0d9cf953d1821678b143d14e", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2000-07-01", "journal": + {"name": "Journal of Experimental & Theoretical Artificial Intelligence", + "pages": "331 - 340", "volume": "12"}, "authors": [{"authorId": "2440747", + "name": "R. French"}]}, {"paperId": "3696b30d042ccd6d0d9cf953d1821678b143d14e", + "externalIds": {"MAG": "2123995545", "DOI": "10.1890/0012-9658(2002)083[0028:MIBPCG]2.0.CO;2", + "CorpusId": 52243065}, "corpusId": 52243065, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3696b30d042ccd6d0d9cf953d1821678b143d14e", "title": "MUTUAL INTERFERENCE BETWEEN PREDATORS CAN GIVE RISE TO TURING SPATIAL PATTERNS", "abstract": "The study of spatial patterns in the distribution of organisms is a central issue in ecology. Here we address the question of @@ -9670,35 +10947,41 @@ interactions: Therefore, we show that this mechanism can generate patch- iness in a homogeneous environment under certain conditions of trophic interaction and predator-prey relative diffusion.", "venue": "", "year": 2002, "referenceCount": 31, "citationCount": - 180, "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": null, "journal": {"name": "Ecology", "pages": - "28-34", "volume": "83"}, "authors": [{"authorId": "8644206", "name": "D. - Alonso"}, {"authorId": "2362456", "name": "F. Bartumeus"}, {"authorId": "116401283", - "name": "J. Catal\u00e1n"}]}, {"paperId": "240d6f58fd18c2e2f54182401ff2383495baf15c", - "externalIds": {"ArXiv": "quant-ph/0304128", "MAG": "2963429934", "DOI": "10.1142/9789812702449_0005", - "CorpusId": 13033690}, "url": "https://www.semanticscholar.org/paper/240d6f58fd18c2e2f54182401ff2383495baf15c", - "title": "Transcending the Limits of Turing Computability", "abstract": "Hypercomputation - or super-Turing computation is a ``computation'''' that transcends the limit - imposed by Turing''s model of computability. The field still faces some basic - questions, technical (can we mathematically and/or physically build a hypercomputer?), - cognitive (can hypercomputers realize the AI dream?), philosophical (is thinking - more than computing?). The aim of this paper is to address the question: can - we mathematically build a hypercomputer? We will discuss the solutions of - the Infinite Merchant Problem, a decision problem equivalent to the Halting - Problem, based on results obtained in \\cite{Coins,acp}. The accent will be - on the new computational technique and results rather than formal proofs.", - "venue": "", "year": 2003, "referenceCount": 33, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-04-19", "journal": {"name": - "arXiv: Quantum Physics", "volume": ""}, "authors": [{"authorId": "91183946", - "name": "V. A. Adamyan"}, {"authorId": "1685717", "name": "Cristian S. Calude"}, - {"authorId": "35003302", "name": "B. Pavlov"}]}, {"paperId": "d843826814a8c0898be1e53224640cb0bacd4892", - "externalIds": {"DBLP": "journals/cca/CorlessJ97", "MAG": "2070679587", "DOI": - "10.1145/271130.271135", "CorpusId": 7891754}, "url": "https://www.semanticscholar.org/paper/d843826814a8c0898be1e53224640cb0bacd4892", + 189, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": + {"url": "https://digital.csic.es/bitstream/10261/150140/1/alonso%202002.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, + "journal": {"name": "Ecology", "pages": "28-34", "volume": "83"}, "authors": + [{"authorId": "8644206", "name": "D. Alonso"}, {"authorId": "2362456", "name": + "F. Bartumeus"}, {"authorId": "116401283", "name": "J. Catal\u00e1n"}]}, {"paperId": + "886d6bd88f6bb060b01b42f5afc237ae66c3a77c", "externalIds": {"MAG": "2074590458", + "DOI": "10.1063/1.165967", "CorpusId": 40407057, "PubMed": "12780009"}, "corpusId": + 40407057, "publicationVenue": {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", + "name": "Chaos", "type": "journal", "issn": "1054-1500", "url": "http://chaos.aip.org/", + "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, "url": "https://www.semanticscholar.org/paper/886d6bd88f6bb060b01b42f5afc237ae66c3a77c", + "title": "Molecular Turing structures in the biochemistry of the cell.", "abstract": + "Reactive lattice gas automata simulations show that Turing structure can + form on a mesoscopic scale and are stable to molecular fluctuations in this + domain. Calculations on the Sel''kov model suggest that Turing instabilities + can give rise to global spatial symmetry breaking in ATP concentration within + the cell cytoplasm with a mesoscopic Turing scale well within typical cell + dimensions. This leads to a new mechanism for the global breaking of energy + distribution in the cell. It also leads to reappraisal of the importance of + the Turing effect on extended biochemical spatial structures and energy transport + available to cell morphogenesis.", "venue": "Chaos", "year": 1993, "referenceCount": + 18, "citationCount": 37, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Chaos", "pages": "\n 7-13\n ", "volume": "3 1"}, + "authors": [{"authorId": "2880149", "name": "B. Hasslacher"}, {"authorId": + "2433318", "name": "R. Kapral"}, {"authorId": "1774400", "name": "A. Lawniczak"}]}, + {"paperId": "d843826814a8c0898be1e53224640cb0bacd4892", "externalIds": {"DBLP": + "journals/cca/CorlessJ97", "MAG": "2070679587", "DOI": "10.1145/271130.271135", + "CorpusId": 7891754}, "corpusId": 7891754, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d843826814a8c0898be1e53224640cb0bacd4892", "title": "The Turing factorization of a rectangular matrix", "abstract": "The Turing factorization is a generalization of the standard LU factoring of a square matrix. Among other advantages, it allows us to meet demands that arise @@ -9712,16 +10995,39 @@ interactions: computing the Moore-Penrose inverse of a matrix containing symbolic entries.We also give a separate generalization of LU factoring to fraction-free Gaussian elimination.", "venue": "SIGS", "year": 1997, "referenceCount": 20, "citationCount": - 32, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 32, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/271130.271135", "status": "BRONZE"}, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1997-09-01", "journal": {"name": "SIGSAM Bull.", "pages": "20-30", "volume": "31"}, "authors": [{"authorId": "2119294", "name": "Robert M Corless"}, {"authorId": "3350328", "name": "D. Jeffrey"}]}, {"paperId": - "a8d950ee51a84c61db5ce461cdf7ece3f9be93dc", "externalIds": {"MAG": "2143127637", - "DOI": "10.1109/IJCNN.1991.155360", "CorpusId": 62329925}, "url": "https://www.semanticscholar.org/paper/a8d950ee51a84c61db5ce461cdf7ece3f9be93dc", + "240d6f58fd18c2e2f54182401ff2383495baf15c", "externalIds": {"ArXiv": "quant-ph/0304128", + "MAG": "2963429934", "DOI": "10.1142/9789812702449_0005", "CorpusId": 13033690}, + "corpusId": 13033690, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/240d6f58fd18c2e2f54182401ff2383495baf15c", + "title": "Transcending the Limits of Turing Computability", "abstract": "Hypercomputation + or super-Turing computation is a ``computation'''' that transcends the limit + imposed by Turing''s model of computability. The field still faces some basic + questions, technical (can we mathematically and/or physically build a hypercomputer?), + cognitive (can hypercomputers realize the AI dream?), philosophical (is thinking + more than computing?). The aim of this paper is to address the question: can + we mathematically build a hypercomputer? We will discuss the solutions of + the Infinite Merchant Problem, a decision problem equivalent to the Halting + Problem, based on results obtained in \\cite{Coins,acp}. The accent will be + on the new computational technique and results rather than formal proofs.", + "venue": "", "year": 2003, "referenceCount": 33, "citationCount": 24, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/0304128v2.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2003-04-19", "journal": {"name": + "arXiv: Quantum Physics", "volume": ""}, "authors": [{"authorId": "91183946", + "name": "V. A. Adamyan"}, {"authorId": "1685717", "name": "Cristian S. Calude"}, + {"authorId": "35003302", "name": "B. Pavlov"}]}, {"paperId": "a8d950ee51a84c61db5ce461cdf7ece3f9be93dc", + "externalIds": {"MAG": "2143127637", "DOI": "10.1109/IJCNN.1991.155360", "CorpusId": + 62329925}, "corpusId": 62329925, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a8d950ee51a84c61db5ce461cdf7ece3f9be93dc", "title": "Turing equivalence of neural networks with second order connection weights", "abstract": "In principle, a potentially infinitely large neural network (either in number of neurons or in the precision of a single neural @@ -9734,26 +11040,32 @@ interactions: can simulate it. The numerical implementation and learning of such a neural Turing machine are also discussed.<>", "venue": "IJCNN-91-Seattle International Joint Conference on Neural Networks", "year": 1991, "referenceCount": 7, "citationCount": - 35, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Conference"], "publicationDate": "1991-07-08", "journal": - {"name": "IJCNN-91-Seattle International Joint Conference on Neural Networks", - "pages": "357-362 vol.2", "volume": "ii"}, "authors": [{"authorId": "2148800040", - "name": "G. Sun"}, {"authorId": "2108324032", "name": "H. Chen"}, {"authorId": - "2109251232", "name": "Y. Lee"}]}, {"paperId": "18a302b819a47947f73a0c4688238766c250a615", - "externalIds": {"DBLP": "journals/tcs/Rogozhin96", "MAG": "2065105492", "DOI": - "10.1016/S0304-3975(96)00077-1", "CorpusId": 8880912}, "url": "https://www.semanticscholar.org/paper/18a302b819a47947f73a0c4688238766c250a615", + 35, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": + "1991-07-08", "journal": {"name": "IJCNN-91-Seattle International Joint Conference + on Neural Networks", "pages": "357-362 vol.2", "volume": "ii"}, "authors": + [{"authorId": "2148800040", "name": "G. Sun"}, {"authorId": "2108324032", + "name": "H. Chen"}, {"authorId": "2109251232", "name": "Y. Lee"}]}, {"paperId": + "18a302b819a47947f73a0c4688238766c250a615", "externalIds": {"DBLP": "journals/tcs/Rogozhin96", + "MAG": "2065105492", "DOI": "10.1016/S0304-3975(96)00077-1", "CorpusId": 8880912}, + "corpusId": 8880912, "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", + "name": "Theoretical Computer Science", "type": "journal", "alternate_names": + ["Theor Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/18a302b819a47947f73a0c4688238766c250a615", "title": "Small Universal Turing Machines", "abstract": null, "venue": "Theoretical Computer Science", "year": 1996, "referenceCount": 125, "citationCount": 206, - "influentialCitationCount": 19, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-11-20", "journal": {"name": "Theor. - Comput. Sci.", "pages": "215-240", "volume": "168"}, "authors": [{"authorId": - "1691124", "name": "Yurii Rogozhin"}]}, {"paperId": "2f6c3af2dfd8b5e412b3d16c5c678735fa4527be", - "externalIds": {"MAG": "434931221", "CorpusId": 60277399}, "url": "https://www.semanticscholar.org/paper/2f6c3af2dfd8b5e412b3d16c5c678735fa4527be", + "influentialCitationCount": 19, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-11-20", "journal": + {"name": "Theor. Comput. Sci.", "pages": "215-240", "volume": "168"}, "authors": + [{"authorId": "1691124", "name": "Yurii Rogozhin"}]}, {"paperId": "2f6c3af2dfd8b5e412b3d16c5c678735fa4527be", + "externalIds": {"MAG": "434931221", "CorpusId": 60277399}, "corpusId": 60277399, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2f6c3af2dfd8b5e412b3d16c5c678735fa4527be", "title": "Turing: A natural philosopher", "abstract": "Alan Turing''s 1936 paper ON COMPUTABLE NUMBERS, introducing the Turing machine, was a landmark of twentieth century thought. It provided the principle of the post-war electronic @@ -9763,25 +11075,31 @@ interactions: of modern Artificial Intelligence. Andrew Hodgesgives a fresh and interesting analysis of Turing''s developing thought, relating it to his extraordinary life.", "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 26, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "40de397b76c02a2684167c6745f89ab31525830d", - "externalIds": {"DBLP": "journals/ijfcs/HemaspaandraJV93", "MAG": "2030549984", - "DOI": "10.1007/BFb0023873", "CorpusId": 15265101}, "url": "https://www.semanticscholar.org/paper/40de397b76c02a2684167c6745f89ab31525830d", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, + {"paperId": "40de397b76c02a2684167c6745f89ab31525830d", "externalIds": {"DBLP": + "journals/ijfcs/HemaspaandraJV93", "MAG": "2030549984", "DOI": "10.1007/BFb0023873", + "CorpusId": 15265101}, "corpusId": 15265101, "publicationVenue": {"id": "216bc2e0-616d-4c10-a796-bd7fa61aa3ac", + "name": "Symposium on Logical Foundations of Computer Science", "type": "conference", + "alternate_names": ["LFCS", "Symp Log Found Comput Sci"], "url": "http://www.lfcs.info/"}, + "url": "https://www.semanticscholar.org/paper/40de397b76c02a2684167c6745f89ab31525830d", "title": "Banishing Robust Turing Completeness", "abstract": null, "venue": "Symposium on Logical Foundations of Computer Science", "year": 1992, "referenceCount": 48, "citationCount": 33, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1992-07-20", "journal": {"pages": - "186-197"}, "authors": [{"authorId": "1704511", "name": "L. A. Hemaspaandra"}, - {"authorId": "145489652", "name": "Sanjay Jain"}, {"authorId": "10665169", - "name": "N. Vereshchagin"}]}, {"paperId": "f9fdf9bf7b67b2319140b5122df84d577204213f", + "openAccessPdf": {"url": "https://urresearch.rochester.edu/fileDownloadForInstitutionalItem.action?itemId=4670&itemFileId=7026", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1992-07-20", "journal": {"pages": "186-197"}, "authors": [{"authorId": "1704511", + "name": "L. A. Hemaspaandra"}, {"authorId": "145489652", "name": "Sanjay Jain"}, + {"authorId": "10665169", "name": "N. Vereshchagin"}]}, {"paperId": "f9fdf9bf7b67b2319140b5122df84d577204213f", "externalIds": {"MAG": "2079471126", "DOI": "10.1103/PHYSREVE.69.026211", - "CorpusId": 45723037, "PubMed": "14995552"}, "url": "https://www.semanticscholar.org/paper/f9fdf9bf7b67b2319140b5122df84d577204213f", + "CorpusId": 45723037, "PubMed": "14995552"}, "corpusId": 45723037, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f9fdf9bf7b67b2319140b5122df84d577204213f", "title": "Symmetric, asymmetric, and antiphase Turing patterns in a model system with two identical coupled layers.", "abstract": "We study Turing pattern formation in a model reaction-diffusion system with two coupled identical @@ -9794,122 +11112,106 @@ interactions: of Turing patterns are studied. A one-dimensional localized structure exhibits striking curvature effects.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2004, "referenceCount": 18, "citationCount": - 21, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 21, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2004-02-27", "journal": {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 026211\n ", "volume": "69 2 Pt 2"}, "authors": [{"authorId": "2586119", "name": "L. Yang"}, - {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "4af29844b4a2ea5fc4692ef1070a18e6825a57e8", - "externalIds": {"MAG": "2071635705", "DOI": "10.1209/EPL/I2000-00352-3", "CorpusId": - 55125609}, "url": "https://www.semanticscholar.org/paper/4af29844b4a2ea5fc4692ef1070a18e6825a57e8", - "title": "Selection and competition of Turing patterns", "abstract": "We examine - the selection and competition of patterns in the Brusselator model, one of - the simplest reaction-diffusion systems giving rise to Turing instabilities. - Simulations of this model show a significant change in the wave number of - stable patterns as the control parameter is increased. A weakly nonlinear - analysis makes it possible to obtain the amplitude equations for the concentration - fields near the instability threshold. Together with the linear diffusive - terms, these equations also contain nonvariational spatial terms. When these - terms are included, the stability diagrams and the thresholds for secondary - instabilities are heavily modified with respect to the usual diffusive case. - The results obtained from the numerical simulations fit very well into the - calculated stability regions.", "venue": "", "year": 2000, "referenceCount": - 4, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-08-01", "journal": {"name": - "EPL", "pages": "300-306", "volume": "51"}, "authors": [{"authorId": "123477968", - "name": "B. Pe\u00f1a"}, {"authorId": "82361775", "name": "C. P\u00e9rez-Garc\u00eda"}]}, - {"paperId": "6407680b5b551bccf50e62eaf94ab036a4d7eaa9", "externalIds": {"DBLP": - "journals/iandc/Hennie65", "MAG": "2029872977", "DOI": "10.1016/S0019-9958(65)90399-2", - "CorpusId": 18587794}, "url": "https://www.semanticscholar.org/paper/6407680b5b551bccf50e62eaf94ab036a4d7eaa9", + {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "6407680b5b551bccf50e62eaf94ab036a4d7eaa9", + "externalIds": {"DBLP": "journals/iandc/Hennie65", "MAG": "2029872977", "DOI": + "10.1016/S0019-9958(65)90399-2", "CorpusId": 18587794}, "corpusId": 18587794, + "publicationVenue": {"id": "feadd011-44f6-4649-bc71-8c9a604eee42", "name": + "Information and Control", "alternate_names": ["Inf Control"], "issn": "0019-9958", + "url": "https://www.sciencedirect.com/journal/information-and-control", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/00199958", "http://www.sciencedirect.com/science/journal/00199958/1/1"]}, + "url": "https://www.semanticscholar.org/paper/6407680b5b551bccf50e62eaf94ab036a4d7eaa9", "title": "One-Tape, Off-Line Turing Machine Computations", "abstract": null, "venue": "Information and Control", "year": 1965, "referenceCount": 3, "citationCount": - 221, "influentialCitationCount": 22, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1965-12-01", "journal": - {"name": "Inf. Control.", "pages": "553-578", "volume": "8"}, "authors": [{"authorId": - "16820982", "name": "F. Hennie"}]}, {"paperId": "e0ba1d5b65eb537f37fb2c1dba9a40e366358686", - "externalIds": {"MAG": "2111129500", "DBLP": "journals/tcs/MacLennan04", "DOI": - "10.1016/j.tcs.2003.12.008", "CorpusId": 5991447}, "url": "https://www.semanticscholar.org/paper/e0ba1d5b65eb537f37fb2c1dba9a40e366358686", - "title": "Natural computation and non-Turing models of computation", "abstract": - null, "venue": "Theoretical Computer Science", "year": 2004, "referenceCount": - 66, "citationCount": 113, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2004-06-04", "journal": {"name": "Theor. Comput. Sci.", "pages": "115-145", - "volume": "317"}, "authors": [{"authorId": "1710647", "name": "B. MacLennan"}]}, - {"paperId": "6f983d27912903190971d52fc35bf2dd3b878b5b", "externalIds": {"MAG": - "2546822621", "DOI": "10.7551/mitpress/6928.003.0028", "CorpusId": 125425902}, - "url": "https://www.semanticscholar.org/paper/6f983d27912903190971d52fc35bf2dd3b878b5b", - "title": "Subcognition and the Limits of the Turing Test", "abstract": null, - "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 93, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "1692491", - "name": "S. Shieber"}]}, {"paperId": "c3e512e835cc30dc99296c9055cb1da142bafee7", - "externalIds": {"MAG": "2029883711", "DBLP": "journals/cacm/WegnerG03", "DOI": - "10.1145/641205.641235", "CorpusId": 1972113}, "url": "https://www.semanticscholar.org/paper/c3e512e835cc30dc99296c9055cb1da142bafee7", + 221, "influentialCitationCount": 22, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1965-12-01", "journal": {"name": "Inf. Control.", "pages": "553-578", "volume": + "8"}, "authors": [{"authorId": "16820982", "name": "F. Hennie"}]}, {"paperId": + "c3e512e835cc30dc99296c9055cb1da142bafee7", "externalIds": {"MAG": "2029883711", + "DBLP": "journals/cacm/WegnerG03", "DOI": "10.1145/641205.641235", "CorpusId": + 1972113}, "corpusId": 1972113, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c3e512e835cc30dc99296c9055cb1da142bafee7", "title": "Computation beyond turing machines", "abstract": "Seeking appropriate methods to model computing and human thought.", "venue": "CACM", "year": 2003, "referenceCount": 15, "citationCount": 122, "influentialCitationCount": 7, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-04-01", "journal": {"name": "Commun. ACM", "pages": "100-102", "volume": - "46"}, "authors": [{"authorId": "2103444", "name": "P. Wegner"}, {"authorId": - "27353259", "name": "Dina Q. Goldin"}]}, {"paperId": "891c0b91e4fe640aab8a8ce3739a514248c8b250", - "externalIds": {"MAG": "2039234396", "DOI": "10.1016/S1364-6613(00)01453-4", - "CorpusId": 1930455, "PubMed": "10689346"}, "url": "https://www.semanticscholar.org/paper/891c0b91e4fe640aab8a8ce3739a514248c8b250", - "title": "The Turing Test: the first 50 years", "abstract": null, "venue": - "Trends in Cognitive Sciences", "year": 2000, "referenceCount": 76, "citationCount": - 127, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Psychology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Psychology", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-03-01", "journal": {"name": "Trends in Cognitive - Sciences", "pages": "115-122", "volume": "4"}, "authors": [{"authorId": "2440747", - "name": "R. French"}]}, {"paperId": "65584e3d5a87da9c35f355b8db45db6709be67fd", - "externalIds": {"MAG": "2021098950", "DBLP": "journals/ipm/Cole96", "DOI": - "10.1016/0306-4573(96)82605-7", "CorpusId": 40218823}, "url": "https://www.semanticscholar.org/paper/65584e3d5a87da9c35f355b8db45db6709be67fd", - "title": "The Universal Turing Machine: A Half-Century Survey", "abstract": - null, "venue": "Information Processing & Management", "year": 1996, "referenceCount": - 1, "citationCount": 130, "influentialCitationCount": 10, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1996-09-01", - "journal": {"name": "Inf. Process. Manag.", "pages": "640-641", "volume": - "32"}, "authors": [{"authorId": "144614321", "name": "C. Cole"}]}, {"paperId": - "81b8439aa5525a94eb74a09abd3e868c7e1adeb2", "externalIds": {"MAG": "2026702408", - "DOI": "10.1016/0167-2789(91)90204-M", "CorpusId": 121202905}, "url": "https://www.semanticscholar.org/paper/81b8439aa5525a94eb74a09abd3e868c7e1adeb2", - "title": "Turing-type chemical patterns in the chlorite-iodide-malonic acid - reaction", "abstract": null, "venue": "", "year": 1991, "referenceCount": - 29, "citationCount": 202, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1991-04-01", "journal": {"name": - "Physica D: Nonlinear Phenomena", "pages": "161-169", "volume": "49"}, "authors": - [{"authorId": "50010680", "name": "P. Kepper"}, {"authorId": "91354797", "name": - "V. Castets"}, {"authorId": "3250971", "name": "E. Dulos"}, {"authorId": "2313078", - "name": "J. Boissonade"}]}, {"paperId": "148ccc559d94dee98048d645fd0e8d1414dbeeac", - "externalIds": {"DBLP": "journals/entcs/GoldinSW01", "MAG": "2079779258", - "DOI": "10.1016/S1571-0661(04)00220-8", "CorpusId": 255679}, "url": "https://www.semanticscholar.org/paper/148ccc559d94dee98048d645fd0e8d1414dbeeac", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2003-04-01", "journal": {"name": "Commun. + ACM", "pages": "100-102", "volume": "46"}, "authors": [{"authorId": "2103444", + "name": "P. Wegner"}, {"authorId": "27353259", "name": "Dina Q. Goldin"}]}, + {"paperId": "148ccc559d94dee98048d645fd0e8d1414dbeeac", "externalIds": {"DBLP": + "journals/entcs/GoldinSW01", "MAG": "2079779258", "DOI": "10.1016/S1571-0661(04)00220-8", + "CorpusId": 255679}, "corpusId": 255679, "publicationVenue": {"id": "9828e623-666b-4033-96b2-f340f9d6d2a9", + "name": "International Workshop on Expressiveness in Concurrency", "type": + "conference", "alternate_names": ["EXPRESS", "Int Workshop Expressiveness + Concurr"]}, "url": "https://www.semanticscholar.org/paper/148ccc559d94dee98048d645fd0e8d1414dbeeac", "title": "Turing Machines, Transition Systems, and Interaction", "abstract": null, "venue": "International Workshop on Expressiveness in Concurrency", "year": 2002, "referenceCount": 66, "citationCount": 131, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2002-02-01", "journal": {"pages": + "120-136"}, "authors": [{"authorId": "27353259", "name": "Dina Q. Goldin"}, + {"authorId": "145940172", "name": "S. Smolka"}, {"authorId": "2103444", "name": + "P. Wegner"}]}, {"paperId": "d38c59cd29ee163bf495063865e0a480e4b97d1e", "externalIds": + {"DBLP": "conf/mm/RuiL03", "MAG": "2060853104", "DOI": "10.1007/s00530-003-0122-3", + "CorpusId": 14865190}, "corpusId": 14865190, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d38c59cd29ee163bf495063865e0a480e4b97d1e", + "title": "ARTiFACIAL: Automated Reverse Turing test using FACIAL features", + "abstract": null, "venue": "MULTIMEDIA ''03", "year": 2003, "referenceCount": + 30, "citationCount": 126, "influentialCitationCount": 11, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2002-02-01", "journal": {"pages": "120-136"}, "authors": - [{"authorId": "27353259", "name": "Dina Q. Goldin"}, {"authorId": "145940172", - "name": "S. Smolka"}, {"authorId": "2103444", "name": "P. Wegner"}]}, {"paperId": - "511f0458206178bad5cf38528d1c4d198ee6ce16", "externalIds": {"MAG": "2038633631", - "DOI": "10.1109/MAHC.1996.539927", "CorpusId": 33113110}, "url": "https://www.semanticscholar.org/paper/511f0458206178bad5cf38528d1c4d198ee6ce16", + "publicationDate": "2003-11-02", "journal": {"name": "Multimedia Systems", + "pages": "493-502", "volume": "9"}, "authors": [{"authorId": "145459057", + "name": "Y. Rui"}, {"authorId": "2145253544", "name": "Zicheng Liu"}]}, {"paperId": + "81b8439aa5525a94eb74a09abd3e868c7e1adeb2", "externalIds": {"MAG": "2026702408", + "DOI": "10.1016/0167-2789(91)90204-M", "CorpusId": 121202905}, "corpusId": + 121202905, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/81b8439aa5525a94eb74a09abd3e868c7e1adeb2", + "title": "Turing-type chemical patterns in the chlorite-iodide-malonic acid + reaction", "abstract": null, "venue": "", "year": 1991, "referenceCount": + 29, "citationCount": 204, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1991-04-01", + "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": "161-169", + "volume": "49"}, "authors": [{"authorId": "50010680", "name": "P. Kepper"}, + {"authorId": "91354797", "name": "V. Castets"}, {"authorId": "3250971", "name": + "E. Dulos"}, {"authorId": "2313078", "name": "J. Boissonade"}]}, {"paperId": + "891c0b91e4fe640aab8a8ce3739a514248c8b250", "externalIds": {"MAG": "2039234396", + "DOI": "10.1016/S1364-6613(00)01453-4", "CorpusId": 1930455, "PubMed": "10689346"}, + "corpusId": 1930455, "publicationVenue": {"id": "20cb626a-518d-4016-826a-0157cf2f8fd6", + "name": "Trends in Cognitive Sciences", "type": "journal", "alternate_names": + ["Trends Cogn Sci"], "issn": "1364-6613", "url": "https://www.cell.com/trends/cognitive-sciences/home", + "alternate_urls": ["http://www.cell.com/trends/cognitive-sciences/home", "https://www.journals.elsevier.com/trends-in-cognitive-sciences", + "http://www.sciencedirect.com/science/journal/13646613"]}, "url": "https://www.semanticscholar.org/paper/891c0b91e4fe640aab8a8ce3739a514248c8b250", + "title": "The Turing Test: the first 50 years", "abstract": null, "venue": + "Trends in Cognitive Sciences", "year": 2000, "referenceCount": 76, "citationCount": + 127, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Psychology"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Psychology", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2000-03-01", "journal": {"name": "Trends + in Cognitive Sciences", "pages": "115-122", "volume": "4"}, "authors": [{"authorId": + "2440747", "name": "R. French"}]}, {"paperId": "511f0458206178bad5cf38528d1c4d198ee6ce16", + "externalIds": {"MAG": "2038633631", "DOI": "10.1109/MAHC.1996.539927", "CorpusId": + 33113110}, "corpusId": 33113110, "publicationVenue": {"id": "22ec5dc2-bb5e-4fea-a7dd-61676b6e7f78", + "name": "IEEE Annals of the History of Computing", "type": "journal", "alternate_names": + ["IEEE Ann Hist Comput"], "issn": "1058-6180", "url": "http://muse.jhu.edu/journals/ahc", + "alternate_urls": ["http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", + "https://ieeexplore.ieee.org/servlet/opac?punumber=85", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", + "http://www.computer.org/annals/"]}, "url": "https://www.semanticscholar.org/paper/511f0458206178bad5cf38528d1c4d198ee6ce16", "title": "The universal turing machine: a half-century survey", "abstract": "large number of repeated myths and oversimplifications that intersperse the text. An editor with a background in the history of computing should have @@ -9943,41 +11245,35 @@ interactions: by the caption, \" Admiral [she is shown in the uniform of a Commander] Grace Hopper (designer of COBOL language). \" We would hope that the publishers will provide an errata \u2026", "venue": "IEEE Annals of the History of Computing", - "year": 1996, "referenceCount": 0, "citationCount": 172, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1996-12-01", "journal": {"name": "IEEE Annals of the History of Computing", - "pages": "73-", "volume": "18"}, "authors": [{"authorId": "145324717", "name": - "P. Kidwell"}]}, {"paperId": "dd9c21ab3ce1becf8c75b395c35151de7ac9a1bd", "externalIds": - {"MAG": "2081054179", "DOI": "10.1038/SCIENTIFICAMERICAN0499-98", "CorpusId": - 62557040}, "url": "https://www.semanticscholar.org/paper/dd9c21ab3ce1becf8c75b395c35151de7ac9a1bd", - "title": "Alan Turing\u2019s Forgotten Ideas in Computer Science", "abstract": - null, "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 165, - "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer + "year": 1996, "referenceCount": 0, "citationCount": 176, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1999-04-01", "journal": {"name": "Scientific American", - "pages": "98-103", "volume": "280"}, "authors": [{"authorId": "144246233", - "name": "B. Copeland"}, {"authorId": "144239027", "name": "D. Proudfoot"}]}, - {"paperId": "d38c59cd29ee163bf495063865e0a480e4b97d1e", "externalIds": {"DBLP": - "conf/mm/RuiL03", "MAG": "2060853104", "DOI": "10.1007/s00530-003-0122-3", - "CorpusId": 14865190}, "url": "https://www.semanticscholar.org/paper/d38c59cd29ee163bf495063865e0a480e4b97d1e", - "title": "ARTiFACIAL: Automated Reverse Turing test using FACIAL features", - "abstract": null, "venue": "MULTIMEDIA ''03", "year": 2003, "referenceCount": - 30, "citationCount": 126, "influentialCitationCount": 11, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-11-02", "journal": {"name": "Multimedia Systems", "pages": "493-502", - "volume": "9"}, "authors": [{"authorId": "145459057", "name": "Y. Rui"}, {"authorId": - "2145253544", "name": "Zicheng Liu"}]}, {"paperId": "423e5a3643209010c53b1ab5a9caaaa2547da4b3", + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "1996-12-01", "journal": {"name": "IEEE Annals + of the History of Computing", "pages": "73-", "volume": "18"}, "authors": + [{"authorId": "145324717", "name": "P. Kidwell"}]}, {"paperId": "6f983d27912903190971d52fc35bf2dd3b878b5b", + "externalIds": {"MAG": "2546822621", "DOI": "10.7551/mitpress/6928.003.0028", + "CorpusId": 125425902}, "corpusId": 125425902, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6f983d27912903190971d52fc35bf2dd3b878b5b", + "title": "Subcognition and the Limits of the Turing Test", "abstract": null, + "venue": "", "year": 2004, "referenceCount": 0, "citationCount": 95, "influentialCitationCount": + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1692491", + "name": "S. Shieber"}]}, {"paperId": "423e5a3643209010c53b1ab5a9caaaa2547da4b3", "externalIds": {"MAG": "2080748624", "DOI": "10.1007/S00285-003-0258-Y", "CorpusId": - 26112618, "PubMed": "15657795"}, "url": "https://www.semanticscholar.org/paper/423e5a3643209010c53b1ab5a9caaaa2547da4b3", + 26112618, "PubMed": "15657795"}, "corpusId": 26112618, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/423e5a3643209010c53b1ab5a9caaaa2547da4b3", "title": "Stability analysis of Turing patterns generated by the Schnakenberg model", "abstract": null, "venue": "Journal of Mathematical Biology", "year": - 2004, "referenceCount": 35, "citationCount": 94, "influentialCitationCount": - 9, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + 2004, "referenceCount": 35, "citationCount": 97, "influentialCitationCount": + 9, "isOpenAccess": true, "openAccessPdf": {"url": "http://bura.brunel.ac.uk/bitstream/2438/3774/1/29-schn1d6.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": @@ -9985,8 +11281,78 @@ interactions: of Mathematical Biology", "pages": "358-390", "volume": "49"}, "authors": [{"authorId": "1860175", "name": "D. Iron"}, {"authorId": "46296799", "name": "Juncheng Wei"}, {"authorId": "14427164", "name": "M. Winter"}]}, {"paperId": - "796c70a1bc549c6d618831f2bf919b04e249ef51", "externalIds": {"MAG": "2050026975", - "DOI": "10.1080/02691729408578758", "CorpusId": 144562861}, "url": "https://www.semanticscholar.org/paper/796c70a1bc549c6d618831f2bf919b04e249ef51", + "dd9c21ab3ce1becf8c75b395c35151de7ac9a1bd", "externalIds": {"MAG": "2081054179", + "DOI": "10.1038/SCIENTIFICAMERICAN0499-98", "CorpusId": 62557040}, "corpusId": + 62557040, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dd9c21ab3ce1becf8c75b395c35151de7ac9a1bd", + "title": "Alan Turing\u2019s Forgotten Ideas in Computer Science", "abstract": + null, "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 165, + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-04-01", "journal": {"name": + "Scientific American", "pages": "98-103", "volume": "280"}, "authors": [{"authorId": + "144246233", "name": "B. Copeland"}, {"authorId": "144239027", "name": "D. + Proudfoot"}]}, {"paperId": "65584e3d5a87da9c35f355b8db45db6709be67fd", "externalIds": + {"MAG": "2021098950", "DBLP": "journals/ipm/Cole96", "DOI": "10.1016/0306-4573(96)82605-7", + "CorpusId": 40218823}, "corpusId": 40218823, "publicationVenue": {"id": "37f5b9b7-f828-4ae1-a174-45b538cbd4e4", + "name": "Information Processing & Management", "type": "journal", "alternate_names": + ["Inf Process Manag", "Inf Process Manag", "Information Processing and Management"], + "issn": "0306-4573", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/244/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/information-processing-and-management/", + "http://www.sciencedirect.com/science/journal/03064573", "http://www.journals.elsevier.com/information-processing-and-management/"]}, + "url": "https://www.semanticscholar.org/paper/65584e3d5a87da9c35f355b8db45db6709be67fd", + "title": "The Universal Turing Machine: A Half-Century Survey", "abstract": + null, "venue": "Information Processing & Management", "year": 1996, "referenceCount": + 1, "citationCount": 131, "influentialCitationCount": 10, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "1996-09-01", "journal": {"name": "Inf. Process. Manag.", + "pages": "640-641", "volume": "32"}, "authors": [{"authorId": "144614321", + "name": "C. Cole"}]}, {"paperId": "e0ba1d5b65eb537f37fb2c1dba9a40e366358686", + "externalIds": {"MAG": "2111129500", "DBLP": "journals/tcs/MacLennan04", "DOI": + "10.1016/j.tcs.2003.12.008", "CorpusId": 5991447}, "corpusId": 5991447, "publicationVenue": + {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": "Theoretical Computer + Science", "type": "journal", "alternate_names": ["Theor Comput Sci"], "issn": + "0304-3975", "url": "http://www.elsevier.com/locate/tcs", "alternate_urls": + ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/e0ba1d5b65eb537f37fb2c1dba9a40e366358686", + "title": "Natural computation and non-Turing models of computation", "abstract": + null, "venue": "Theoretical Computer Science", "year": 2004, "referenceCount": + 66, "citationCount": 113, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2004-06-04", "journal": {"name": "Theor. Comput. + Sci.", "pages": "115-145", "volume": "317"}, "authors": [{"authorId": "1710647", + "name": "B. MacLennan"}]}, {"paperId": "d34a810719d6c132d9fb697df1b5a38e2fd0dc05", + "externalIds": {"MAG": "2137005141", "DBLP": "journals/siamcomp/Simon97a", + "DOI": "10.1109/SFCS.1994.365701", "CorpusId": 7457814}, "corpusId": 7457814, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d34a810719d6c132d9fb697df1b5a38e2fd0dc05", + "title": "On the power of quantum computation", "abstract": "The quantum model + of computation is a probabilistic model, similar to the probabilistic Turing + Machine, in which the laws of chance are those obeyed by particles on a quantum + mechanical scale, rather than the rules familiar to us from the macroscopic + world. We present here a problem of distinguishing between two fairly natural + classes of function, which can provably be solved exponentially faster in + the quantum model than in the classical probabilistic one, when the function + is given as an oracle drawn equiprobably from the uniform distribution on + either class. We thus offer compelling evidence that the quantum model may + have significantly more complexity theoretic power than the probabilistic + Turing Machine. In fact, drawing on this work, Shor (1994) has recently developed + remarkable new quantum polynomial-time algorithms for the discrete logarithm + and integer factoring problems.<>", "venue": "Proceedings 35th Annual + Symposium on Foundations of Computer Science", "year": 1994, "referenceCount": + 33, "citationCount": 1445, "influentialCitationCount": 127, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-11-20", "journal": {"name": "Proceedings 35th Annual + Symposium on Foundations of Computer Science", "pages": "116-123"}, "authors": + [{"authorId": "1973111", "name": "Daniel R. Simon"}]}, {"paperId": "796c70a1bc549c6d618831f2bf919b04e249ef51", + "externalIds": {"MAG": "2050026975", "DOI": "10.1080/02691729408578758", "CorpusId": + 144562861}, "corpusId": 144562861, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/796c70a1bc549c6d618831f2bf919b04e249ef51", "title": "Turing''s sexual guessing game", "abstract": "Bien qu''importante, la question: L''ordinateur, pense-t-il? n''est pas la seule question sur la nature de la pensee posee, consciemment ou inconsciemment, par Turing dans @@ -9995,13 +11361,17 @@ interactions: sont les questions sur la nature du sexe, le naturel et l''artificiel, l''analogue et le discret, le biologique et le culturel", "venue": "", "year": 1994, "referenceCount": 15, "citationCount": 27, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", - "source": "external"}], "publicationTypes": null, "publicationDate": "1994-10-01", - "journal": {"name": "Social Epistemology", "pages": "313-326", "volume": "8"}, - "authors": [{"authorId": "103019356", "name": "J. Genova"}]}, {"paperId": - "bd7bd1d2945a58cdcc1797ba9698b8810fe68f60", "externalIds": {"MAG": "2952246170", - "ArXiv": "1505.01121", "DBLP": "conf/iccv/MalinowskiRF15", "DOI": "10.1109/ICCV.2015.9", - "CorpusId": 738850}, "url": "https://www.semanticscholar.org/paper/bd7bd1d2945a58cdcc1797ba9698b8810fe68f60", + "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, + "publicationDate": "1994-10-01", "journal": {"name": "Social Epistemology", + "pages": "313-326", "volume": "8"}, "authors": [{"authorId": "103019356", + "name": "J. Genova"}]}, {"paperId": "bd7bd1d2945a58cdcc1797ba9698b8810fe68f60", + "externalIds": {"MAG": "2952246170", "ArXiv": "1505.01121", "DBLP": "conf/iccv/MalinowskiRF15", + "DOI": "10.1109/ICCV.2015.9", "CorpusId": 738850}, "corpusId": 738850, "publicationVenue": + {"id": "7654260e-79f9-45c5-9663-d72027cf88f3", "name": "IEEE International + Conference on Computer Vision", "type": "conference", "alternate_names": ["ICCV", + "IEEE Int Conf Comput Vis", "ICCV Workshops", "ICCV Work"], "url": "https://ieeexplore.ieee.org/xpl/conhome/1000149/all-proceedings"}, + "url": "https://www.semanticscholar.org/paper/bd7bd1d2945a58cdcc1797ba9698b8810fe68f60", "title": "Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images", "abstract": "We address a question answering task on real-world images that is set up as a Visual Turing Test. By combining latest advances @@ -10017,73 +11387,65 @@ interactions: propose two novel metrics and collect additional answers which extends the original DAQUAR dataset to DAQUAR-Consensus.", "venue": "IEEE International Conference on Computer Vision", "year": 2015, "referenceCount": 44, "citationCount": - 547, "influentialCitationCount": 53, "isOpenAccess": true, "fieldsOfStudy": + 548, "influentialCitationCount": 53, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1505.01121", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2015-05-05", "journal": {"name": "2015 IEEE International Conference on Computer Vision (ICCV)", "pages": "1-9"}, "authors": [{"authorId": "145478807", "name": "Mateusz Malinowski"}, {"authorId": "34849128", "name": "Marcus Rohrbach"}, {"authorId": - "1739548", "name": "Mario Fritz"}]}, {"paperId": "ec0d23ea1bae452922e2a081bf877d0db436b985", - "externalIds": {"DBLP": "books/daglib/0080802", "MAG": "1581260235", "CorpusId": - 43269451}, "url": "https://www.semanticscholar.org/paper/ec0d23ea1bae452922e2a081bf877d0db436b985", - "title": "Fast algorithms - a multitape Turing machine implementation", "abstract": - null, "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 96, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"pages": "I-X, - 1-297"}, "authors": [{"authorId": "1764338", "name": "A. Sch\u00f6nhage"}, - {"authorId": "3096826", "name": "Andreas F. Grotefeld"}, {"authorId": "12707488", - "name": "Ekkehart Vetter"}]}, {"paperId": "96a9104f5d39f733e94efa1abd31d52177cad30f", - "externalIds": {"MAG": "2074373676", "DBLP": "journals/jcss/Cesati03", "DOI": - "10.1016/S0022-0000(03)00073-4", "CorpusId": 7721380}, "url": "https://www.semanticscholar.org/paper/96a9104f5d39f733e94efa1abd31d52177cad30f", - "title": "The Turing way to parameterized complexity", "abstract": null, "venue": - "Journal of computer and system sciences (Print)", "year": 2003, "referenceCount": - 11, "citationCount": 67, "influentialCitationCount": 10, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2003-12-01", "journal": {"name": "J. - Comput. Syst. Sci.", "pages": "654-685", "volume": "67"}, "authors": [{"authorId": - "3163518", "name": "M. Cesati"}]}, {"paperId": "af251b5f3a6a103b7512c3c8cc62403436ae8d6d", - "externalIds": {"MAG": "2081299191", "DBLP": "journals/jcss/Kadin89", "DOI": - "10.1016/0022-0000(89)90024-X", "CorpusId": 23446943}, "url": "https://www.semanticscholar.org/paper/af251b5f3a6a103b7512c3c8cc62403436ae8d6d", - "title": "P^(NP[O(log n)]) and Sparse Turing-Complete Sets for NP", "abstract": - null, "venue": "Journal of computer and system sciences (Print)", "year": - 1989, "referenceCount": 22, "citationCount": 114, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-12-01", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "282-298", - "volume": "39"}, "authors": [{"authorId": "30743227", "name": "Jim Kadin"}]}, - {"paperId": "da1b6a677c2f36dd2f4f09f68cc734b007d4dcbf", "externalIds": {"MAG": - "2030638423", "DOI": "10.1016/0022-5193(74)90128-3", "CorpusId": 40495884, - "PubMed": "4844631"}, "url": "https://www.semanticscholar.org/paper/da1b6a677c2f36dd2f4f09f68cc734b007d4dcbf", + "1739548", "name": "Mario Fritz"}]}, {"paperId": "da1b6a677c2f36dd2f4f09f68cc734b007d4dcbf", + "externalIds": {"MAG": "2030638423", "DOI": "10.1016/0022-5193(74)90128-3", + "CorpusId": 40495884, "PubMed": "4844631"}, "corpusId": 40495884, "publicationVenue": + {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", "name": "Journal of Theoretical + Biology", "type": "journal", "alternate_names": ["J Theor Biology"], "issn": + "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/da1b6a677c2f36dd2f4f09f68cc734b007d4dcbf", "title": "How well does Turing''s theory of morphogenesis work?", "abstract": null, "venue": "Journal of Theoretical Biology", "year": 1974, "referenceCount": - 11, "citationCount": 143, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1974-06-01", "journal": {"name": "Journal of theoretical - biology", "pages": "\n 501-31\n ", "volume": "45 2"}, "authors": - [{"authorId": "31393808", "name": "J. Bard"}, {"authorId": "34917922", "name": - "I. Lauder"}]}, {"paperId": "6d1d32017c5f15b9937d7b22ed34e347db43a6e2", "externalIds": - {"DBLP": "journals/tcs/Zak83", "MAG": "2144345645", "DOI": "10.1016/0304-3975(83)90015-4", - "CorpusId": 2387846}, "url": "https://www.semanticscholar.org/paper/6d1d32017c5f15b9937d7b22ed34e347db43a6e2", + 11, "citationCount": 144, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1974-06-01", "journal": + {"name": "Journal of theoretical biology", "pages": "\n 501-31\n ", + "volume": "45 2"}, "authors": [{"authorId": "31393808", "name": "J. Bard"}, + {"authorId": "34917922", "name": "I. Lauder"}]}, {"paperId": "6d1d32017c5f15b9937d7b22ed34e347db43a6e2", + "externalIds": {"DBLP": "journals/tcs/Zak83", "MAG": "2144345645", "DOI": + "10.1016/0304-3975(83)90015-4", "CorpusId": 2387846}, "corpusId": 2387846, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/6d1d32017c5f15b9937d7b22ed34e347db43a6e2", "title": "A Turing Machine Time Hierarchy", "abstract": null, "venue": "Theoretical - Computer Science", "year": 1983, "referenceCount": 6, "citationCount": 169, - "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1983-10-01", "journal": - {"name": "Theor. Comput. Sci.", "pages": "327-333", "volume": "26"}, "authors": - [{"authorId": "144772962", "name": "S. Z\u00e1k"}]}, {"paperId": "e0fd490af920d23627fa45790e88aa39567067b3", - "externalIds": {"DBLP": "journals/cacm/Hartmanis94", "MAG": "2080920278", - "DOI": "10.1145/194313.214781", "CorpusId": 14859828}, "url": "https://www.semanticscholar.org/paper/e0fd490af920d23627fa45790e88aa39567067b3", + Computer Science", "year": 1983, "referenceCount": 6, "citationCount": 170, + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1983-10-01", "journal": {"name": "Theor. Comput. Sci.", "pages": "327-333", + "volume": "26"}, "authors": [{"authorId": "144772962", "name": "S. Z\u00e1k"}]}, + {"paperId": "a74528bf70100b292285dc7ea684df1547fa8af7", "externalIds": {"MAG": + "2019067745", "DOI": "10.1016/J.BIOSYSTEMS.2004.05.032", "CorpusId": 17620984, + "PubMed": "15527956"}, "corpusId": 17620984, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a74528bf70100b292285dc7ea684df1547fa8af7", + "title": "Bio-steps beyond Turing.", "abstract": null, "venue": "Bio Systems", + "year": 2004, "referenceCount": 69, "citationCount": 77, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2004-11-01", "journal": {"name": "Bio Systems", "pages": + "\n 175-94\n ", "volume": "77 1-3"}, "authors": [{"authorId": + "1685717", "name": "Cristian S. Calude"}, {"authorId": "1698119", "name": + "G. Paun"}]}, {"paperId": "e0fd490af920d23627fa45790e88aa39567067b3", "externalIds": + {"DBLP": "journals/cacm/Hartmanis94", "MAG": "2080920278", "DOI": "10.1145/194313.214781", + "CorpusId": 14859828}, "corpusId": 14859828, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e0fd490af920d23627fa45790e88aa39567067b3", "title": "Turing Award lecture on computational complexity and the nature of computer science", "abstract": "computer model in our later work. I personally was deeply impressed with Shannon''s communication theory [12]. Shannon''s @@ -10209,37 +11571,18 @@ interactions: inherent prop2Personal conmmnication. March 10, 1992 letter. COMMUNICAT IONSOFTHE ACM Octobcr 1994/Vo1.37, No.lO ~", "venue": "CACM", "year": 1994, "referenceCount": 23, "citationCount": 90, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1994-10-01", "journal": {"name": "Commun. ACM", "pages": "37-43", "volume": - "37"}, "authors": [{"authorId": "1747181", "name": "J. Hartmanis"}]}, {"paperId": - "b18ced271f9fb56d237cf9d8e24f12cf61382d23", "externalIds": {"MAG": "2028541846", - "DOI": "10.1016/0022-5193(82)90063-7", "CorpusId": 31345040, "PubMed": "7176665"}, - "url": "https://www.semanticscholar.org/paper/b18ced271f9fb56d237cf9d8e24f12cf61382d23", - "title": "Parameter space for turing instability in reaction diffusion mechanisms: - a comparison of models.", "abstract": null, "venue": "Journal of Theoretical - Biology", "year": 1982, "referenceCount": 15, "citationCount": 160, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Study"], "publicationDate": "1982-09-07", - "journal": {"name": "Journal of theoretical biology", "pages": "\n 143-63\n ", - "volume": "98 1"}, "authors": [{"authorId": "88251269", "name": "J. Murray"}]}, - {"paperId": "a74528bf70100b292285dc7ea684df1547fa8af7", "externalIds": {"MAG": - "2019067745", "DOI": "10.1016/J.BIOSYSTEMS.2004.05.032", "CorpusId": 17620984, - "PubMed": "15527956"}, "url": "https://www.semanticscholar.org/paper/a74528bf70100b292285dc7ea684df1547fa8af7", - "title": "Bio-steps beyond Turing.", "abstract": null, "venue": "Bio Systems", - "year": 2004, "referenceCount": 69, "citationCount": 77, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2004-11-01", "journal": {"name": "Bio Systems", "pages": "\n 175-94\n ", - "volume": "77 1-3"}, "authors": [{"authorId": "1685717", "name": "Cristian - S. Calude"}, {"authorId": "1698119", "name": "G. Paun"}]}, {"paperId": "9a32aa2733ddfe63303ba62114b780302083c673", - "externalIds": {"MAG": "2110491871", "CorpusId": 7526568, "PubMed": "6747520"}, - "url": "https://www.semanticscholar.org/paper/9a32aa2733ddfe63303ba62114b780302083c673", + "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=214781&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-10-01", "journal": {"name": "Commun. ACM", "pages": + "37-43", "volume": "37"}, "authors": [{"authorId": "1747181", "name": "J. + Hartmanis"}]}, {"paperId": "9a32aa2733ddfe63303ba62114b780302083c673", "externalIds": + {"MAG": "2110491871", "CorpusId": 7526568, "PubMed": "6747520"}, "corpusId": + 7526568, "publicationVenue": {"id": "3b1f8d0d-0e08-46e4-81a3-2560a21b0198", + "name": "Journal of embryology and experimental morphology", "type": "journal", + "alternate_names": ["J embryol exp morphol"], "issn": "0022-0752"}, "url": + "https://www.semanticscholar.org/paper/9a32aa2733ddfe63303ba62114b780302083c673", "title": "Generation of spatially periodic patterns by a mechanical instability: a mechanical alternative to the Turing model.", "abstract": "We have studied the generation of spatial patterns created by mechanical (rather than chemical) @@ -10275,40 +11618,81 @@ interactions: of differentiation, usually attributed to diffusible ''morphogens''.", "venue": "Journal of embryology and experimental morphology", "year": 1984, "referenceCount": 39, "citationCount": 129, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1984-04-01", "journal": {"name": "Journal of embryology - and experimental morphology", "pages": "\n 1-20\n ", "volume": - "80"}, "authors": [{"authorId": "81609616", "name": "A. Harris"}, {"authorId": - "6892641", "name": "D. Stopak"}, {"authorId": "145507278", "name": "P. Warner"}]}, - {"paperId": "d34a810719d6c132d9fb697df1b5a38e2fd0dc05", "externalIds": {"MAG": - "2137005141", "DBLP": "journals/siamcomp/Simon97a", "DOI": "10.1109/SFCS.1994.365701", - "CorpusId": 7457814}, "url": "https://www.semanticscholar.org/paper/d34a810719d6c132d9fb697df1b5a38e2fd0dc05", - "title": "On the power of quantum computation", "abstract": "The quantum model - of computation is a probabilistic model, similar to the probabilistic Turing - Machine, in which the laws of chance are those obeyed by particles on a quantum - mechanical scale, rather than the rules familiar to us from the macroscopic - world. We present here a problem of distinguishing between two fairly natural - classes of function, which can provably be solved exponentially faster in - the quantum model than in the classical probabilistic one, when the function - is given as an oracle drawn equiprobably from the uniform distribution on - either class. We thus offer compelling evidence that the quantum model may - have significantly more complexity theoretic power than the probabilistic - Turing Machine. In fact, drawing on this work, Shor (1994) has recently developed - remarkable new quantum polynomial-time algorithms for the discrete logarithm - and integer factoring problems.<>", "venue": "Proceedings 35th Annual - Symposium on Foundations of Computer Science", "year": 1994, "referenceCount": - 33, "citationCount": 1410, "influentialCitationCount": 122, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1994-11-20", "journal": - {"name": "Proceedings 35th Annual Symposium on Foundations of Computer Science", - "pages": "116-123"}, "authors": [{"authorId": "1973111", "name": "Daniel R. - Simon"}]}, {"paperId": "836a29d263fc9c65fa530ecc10676454ad4b0904", "externalIds": - {"DBLP": "journals/jacm/Watanabe61", "MAG": "2077804036", "DOI": "10.1145/321088.321090", - "CorpusId": 6477495}, "url": "https://www.semanticscholar.org/paper/836a29d263fc9c65fa530ecc10676454ad4b0904", + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1984-04-01", "journal": {"name": "Journal + of embryology and experimental morphology", "pages": "\n 1-20\n ", + "volume": "80"}, "authors": [{"authorId": "81609616", "name": "A. Harris"}, + {"authorId": "6892641", "name": "D. Stopak"}, {"authorId": "145507278", "name": + "P. Warner"}]}, {"paperId": "b18ced271f9fb56d237cf9d8e24f12cf61382d23", "externalIds": + {"MAG": "2028541846", "DOI": "10.1016/0022-5193(82)90063-7", "CorpusId": 31345040, + "PubMed": "7176665"}, "corpusId": 31345040, "publicationVenue": {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", + "name": "Journal of Theoretical Biology", "type": "journal", "alternate_names": + ["J Theor Biology"], "issn": "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/b18ced271f9fb56d237cf9d8e24f12cf61382d23", + "title": "Parameter space for turing instability in reaction diffusion mechanisms: + a comparison of models.", "abstract": null, "venue": "Journal of Theoretical + Biology", "year": 1982, "referenceCount": 15, "citationCount": 161, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Study"], + "publicationDate": "1982-09-07", "journal": {"name": "Journal of theoretical + biology", "pages": "\n 143-63\n ", "volume": "98 1"}, "authors": + [{"authorId": "88251269", "name": "J. Murray"}]}, {"paperId": "af251b5f3a6a103b7512c3c8cc62403436ae8d6d", + "externalIds": {"MAG": "2081299191", "DBLP": "journals/jcss/Kadin89", "DOI": + "10.1016/0022-0000(89)90024-X", "CorpusId": 23446943}, "corpusId": 23446943, + "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", "name": + "Journal of computer and system sciences (Print)", "type": "journal", "alternate_names": + ["Journal of Computer and System Sciences", "J comput syst sci (print", "J + Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/af251b5f3a6a103b7512c3c8cc62403436ae8d6d", + "title": "P^(NP[O(log n)]) and Sparse Turing-Complete Sets for NP", "abstract": + null, "venue": "Journal of computer and system sciences (Print)", "year": + 1989, "referenceCount": 22, "citationCount": 114, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1989-12-01", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "282-298", + "volume": "39"}, "authors": [{"authorId": "30743227", "name": "Jim Kadin"}]}, + {"paperId": "96a9104f5d39f733e94efa1abd31d52177cad30f", "externalIds": {"MAG": + "2074373676", "DBLP": "journals/jcss/Cesati03", "DOI": "10.1016/S0022-0000(03)00073-4", + "CorpusId": 7721380}, "corpusId": 7721380, "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", + "name": "Journal of computer and system sciences (Print)", "type": "journal", + "alternate_names": ["Journal of Computer and System Sciences", "J comput syst + sci (print", "J Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/96a9104f5d39f733e94efa1abd31d52177cad30f", + "title": "The Turing way to parameterized complexity", "abstract": null, "venue": + "Journal of computer and system sciences (Print)", "year": 2003, "referenceCount": + 11, "citationCount": 67, "influentialCitationCount": 10, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-12-01", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "654-685", + "volume": "67"}, "authors": [{"authorId": "3163518", "name": "M. Cesati"}]}, + {"paperId": "ec0d23ea1bae452922e2a081bf877d0db436b985", "externalIds": {"DBLP": + "books/daglib/0080802", "MAG": "1581260235", "CorpusId": 43269451}, "corpusId": + 43269451, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ec0d23ea1bae452922e2a081bf877d0db436b985", + "title": "Fast algorithms - a multitape Turing machine implementation", "abstract": + null, "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 96, + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "I-X, 1-297"}, "authors": [{"authorId": "1764338", "name": "A. Sch\u00f6nhage"}, + {"authorId": "3096826", "name": "Andreas F. Grotefeld"}, {"authorId": "12707488", + "name": "Ekkehart Vetter"}]}, {"paperId": "836a29d263fc9c65fa530ecc10676454ad4b0904", + "externalIds": {"DBLP": "journals/jacm/Watanabe61", "MAG": "2077804036", "DOI": + "10.1145/321088.321090", "CorpusId": 6477495}, "corpusId": 6477495, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/836a29d263fc9c65fa530ecc10676454ad4b0904", "title": "5-Symbol 8-State and 5-Symbol 6-State Universal Turing Machines", "abstract": "I t is of interest to design a universal Turing machine smaller than any ever previously published in the literature. According to Shannon''s @@ -10326,14 +11710,15 @@ interactions: certain given symbols is spliced onto the end of the tape. Some published results are listed in Table 1.", "venue": "JACM", "year": 1961, "referenceCount": 3, "citationCount": 43, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1961-10-01", "journal": {"name": "J. ACM", "pages": "476-483", "volume": - "8"}, "authors": [{"authorId": "2115592298", "name": "Shigeru Watanabe"}]}, + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/321088.321090", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1961-10-01", "journal": {"name": "J. ACM", "pages": "476-483", + "volume": "8"}, "authors": [{"authorId": "2115592298", "name": "Shigeru Watanabe"}]}, {"paperId": "de0deae1f655c37b10a33c9ef32d9972474260b6", "externalIds": {"MAG": "2080640642", "DOI": "10.1142/S0129167X91000302", "CorpusId": 123706235}, - "url": "https://www.semanticscholar.org/paper/de0deae1f655c37b10a33c9ef32d9972474260b6", + "corpusId": 123706235, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de0deae1f655c37b10a33c9ef32d9972474260b6", "title": "MINSKY''S SMALL UNIVERSAL TURING MACHINE", "abstract": "Marvin L. Minsky constructed a 4-symbol 7-state universal Turing machine in 1962. It was first announced in a postscript to [2] and is also described in [3, Sec. @@ -10349,114 +11734,29 @@ interactions: machine, for q2b2bLq2 read . A generalized Turing machine with 4 symbols and 7 states, closely related to Minsky''s, was constructed and used in [5].", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": 29, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1991-10-01", "journal": {"name": "International Journal of Mathematics", - "pages": "551-562", "volume": "02"}, "authors": [{"authorId": "49253220", - "name": "R. Robinson"}]}, {"paperId": "8c9bee18b3389793a451b9f815835e4dc430e66c", - "externalIds": {"DBLP": "journals/cj/Randell00", "MAG": "2032044999", "DOI": - "10.1093/comjnl/43.2.95", "CorpusId": 41943010}, "url": "https://www.semanticscholar.org/paper/8c9bee18b3389793a451b9f815835e4dc430e66c", - "title": "Turing Memorial Lecture Facing Up to Faults", "abstract": "As individuals, - organizations and indeed the world at large have become more dependent on - computer-based systems, so there has been an ever-growing amount of research - into means for improving the dependability of these systems. In particular, - there has been much work on trying to gain an increased understanding of the - many and varied types of faults that need to be prevented or tolerated in - order to reduce the probability and severity of system failures. In this talk - I discuss the assumptions that are often made by computing system designers - regarding faults, survey a number of continuing issues related to fault tolerance, - and identify some of the latest challenges facing researchers in this arena.", - "venue": "Computer/law journal", "year": 2000, "referenceCount": 28, "citationCount": - 49, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, - "journal": {"name": "Comput. J.", "pages": "95-106", "volume": "43"}, "authors": - [{"authorId": "145586245", "name": "B. Randell"}]}, {"paperId": "a39f1b82f035bac6a0aa60a3c0b33dca02b77f7d", - "externalIds": {"DBLP": "journals/cryptologia/Erskine84a", "MAG": "2076208656", - "DOI": "10.1080/0161-118491859178", "CorpusId": 33721922}, "url": "https://www.semanticscholar.org/paper/a39f1b82f035bac6a0aa60a3c0b33dca02b77f7d", - "title": "Alan Turing: the Enigma - Book Reviem", "abstract": null, "venue": - "Cryptologia", "year": 1984, "referenceCount": 0, "citationCount": 66, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1984-10-01", "journal": {"name": "Cryptologia", "pages": - "332-336", "volume": "8"}, "authors": [{"authorId": "14260955", "name": "R. - Erskine"}]}, {"paperId": "250d0cbc6db22802feb72410af127c9b05183450", "externalIds": - {"MAG": "1457540691", "DOI": "10.1016/S0049-237X(08)71238-2", "CorpusId": - 117485003}, "url": "https://www.semanticscholar.org/paper/250d0cbc6db22802feb72410af127c9b05183450", - "title": "Algorithmic Procedures, Generalized Turing Algorithms, and Elementary - Recursion Theory", "abstract": null, "venue": "", "year": 1971, "referenceCount": - 3, "citationCount": 110, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Studies in logic and the foundations of mathematics", "pages": "361-389", - "volume": "61"}, "authors": [{"authorId": "49664058", "name": "H. Friedman"}]}, - {"paperId": "5bffcda9d526cf81948211607504068e8ebac452", "externalIds": {"MAG": - "130863730", "DOI": "10.1007/978-1-4612-6374-6_24", "CorpusId": 50621379}, - "url": "https://www.semanticscholar.org/paper/5bffcda9d526cf81948211607504068e8ebac452", - "title": "A Mathematical Model of Two Cells Via Turing\u2019s Equation", "abstract": - null, "venue": "", "year": 1976, "referenceCount": 0, "citationCount": 104, - "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "354-367", "volume": ""}, "authors": - [{"authorId": "34911188", "name": "S. Smale"}]}, {"paperId": "19c278e06339c5a3e7dd94403ea70b7e919579bb", - "externalIds": {"MAG": "2049848227", "DBLP": "journals/iandc/Fischer66", "DOI": - "10.1016/S0019-9958(66)80003-7", "CorpusId": 40020778}, "url": "https://www.semanticscholar.org/paper/19c278e06339c5a3e7dd94403ea70b7e919579bb", - "title": "Turing Machines with Restricted Memory Access", "abstract": null, - "venue": "Information and Control", "year": 1966, "referenceCount": 9, "citationCount": - 108, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1966-08-01", "journal": - {"name": "Inf. Control.", "pages": "364-379", "volume": "9"}, "authors": [{"authorId": - "1691253", "name": "P. C. Fischer"}]}, {"paperId": "dffc33a3dfc73e03ca30f1f73fcbf22a21f268ea", - "externalIds": {"MAG": "4245645", "CorpusId": 59800146}, "url": "https://www.semanticscholar.org/paper/dffc33a3dfc73e03ca30f1f73fcbf22a21f268ea", - "title": "A computational extension to the Turing test", "abstract": null, - "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 59, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "1745871", "name": "D. Dowe"}, {"authorId": "145033113", "name": - "A. H\u00e1jek"}]}, {"paperId": "21e82025a71e01b7f157c2a37197cd3a4d4ac722", - "externalIds": {"DBLP": "journals/pieee/Norberg85", "MAG": "2017377819", "DOI": - "10.1109/PROC.1985.13384", "CorpusId": 13439481}, "url": "https://www.semanticscholar.org/paper/21e82025a71e01b7f157c2a37197cd3a4d4ac722", - "title": "Turing''s man: Western culture in computer age", "abstract": null, - "venue": "Proceedings of the IEEE", "year": 1985, "referenceCount": 0, "citationCount": - 94, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Engineering", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1985-12-01", "journal": {"name": "Proceedings of the IEEE", - "pages": "1865-1866", "volume": "73"}, "authors": [{"authorId": "2183358442", - "name": "Artur L. Norberg"}]}, {"paperId": "43965c9aebd0f2ef450069ccf3d41d818cd1583f", - "externalIds": {"MAG": "684736", "CorpusId": 59679402}, "url": "https://www.semanticscholar.org/paper/43965c9aebd0f2ef450069ccf3d41d818cd1583f", - "title": "A Non-Behavioural, Computational Extension to the Turing Test", - "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": - 62, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "101-106", "volume": ""}, "authors": [{"authorId": - "1745871", "name": "D. Dowe"}, {"authorId": "145033113", "name": "A. H\u00e1jek"}]}, - {"paperId": "da173b19205747eceb603e7d2618307415e3e706", "externalIds": {"MAG": - "1968630830", "DBLP": "journals/ai/ColbyHWK72", "DOI": "10.1016/0004-3702(72)90049-5", - "CorpusId": 31542633}, "url": "https://www.semanticscholar.org/paper/da173b19205747eceb603e7d2618307415e3e706", - "title": "Turing-like Indistinguishability Tests for the Calidation of a Computer - Simulation of Paranoid Processes", "abstract": null, "venue": "Artificial - Intelligence", "year": 1972, "referenceCount": 5, "citationCount": 121, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Artif. Intell.", "pages": "199-221", "volume": - "3"}, "authors": [{"authorId": "3123001", "name": "K. Colby"}, {"authorId": - "5981444", "name": "F. D. Hilf"}, {"authorId": "47864374", "name": "S. Weber"}, - {"authorId": "1921060", "name": "H. Kraemer"}]}, {"paperId": "899fe4df330371e242444e4fac10cc02ca0665e6", + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1991-10-01", "journal": {"name": "International Journal + of Mathematics", "pages": "551-562", "volume": "02"}, "authors": [{"authorId": + "49253220", "name": "R. Robinson"}]}, {"paperId": "483e080efb1b3dfb8777f71dcb6e7cf16af3b70f", + "externalIds": {"DBLP": "journals/complexity/Copeland98", "MAG": "2051790376", + "DOI": "10.1002/(SICI)1099-0526(199809/10)4:1%3C30::AID-CPLX9%3E3.0.CO;2-8", + "CorpusId": 44982181}, "corpusId": 44982181, "publicationVenue": {"id": "8bc59e8b-e251-4201-839a-ec83ae78859d", + "name": "Complex", "type": "conference", "alternate_names": ["Int Conf Complex + Sci", "International Conference on Complex Sciences"], "issn": "0806-1912", + "alternate_issns": ["1538-6848"], "url": "http://wo.uio.no/as/WebObjects/nettlogg.woa/1/wa/logg?logg=5904", + "alternate_urls": ["http://www.wikicfp.com/cfp/program?id=545", "https://www.complex.com/"]}, + "url": "https://www.semanticscholar.org/paper/483e080efb1b3dfb8777f71dcb6e7cf16af3b70f", + "title": "Super Turing-machines", "abstract": null, "venue": "Complex", "year": + 1998, "referenceCount": 11, "citationCount": 53, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1998-09-01", + "journal": {"name": "Complex.", "pages": "30-32", "volume": "4"}, "authors": + [{"authorId": "144246233", "name": "B. Copeland"}]}, {"paperId": "899fe4df330371e242444e4fac10cc02ca0665e6", "externalIds": {"MAG": "608833252", "DOI": "10.5860/choice.31-3278", "CorpusId": - 169907902}, "url": "https://www.semanticscholar.org/paper/899fe4df330371e242444e4fac10cc02ca0665e6", + 169907902}, "corpusId": 169907902, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/899fe4df330371e242444e4fac10cc02ca0665e6", "title": "Ad Infinitum... The Ghost in Turing''s Machine: Taking God Out of Mathematics and Putting the Body Back In. An Essay in Corporeal Semiotics", "abstract": "By searching the title, publisher, or authors of guide you in @@ -10469,11 +11769,145 @@ interactions: in turings machine taking god out of mathematics and putting the body back in an essay in corporeal semiotics consequently simple!", "venue": "", "year": 1993, "referenceCount": 0, "citationCount": 75, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1993-09-01", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "27739767", - "name": "B. Rotman"}]}]} + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1993-09-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "27739767", "name": "B. Rotman"}]}, {"paperId": "84d5d651df741ac6628804cbc46cf28ee835135a", + "externalIds": {"MAG": "2164189437", "DBLP": "journals/tcs/Kurka97", "DOI": + "10.1016/S0304-3975(96)00025-4", "CorpusId": 29656895}, "corpusId": 29656895, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/84d5d651df741ac6628804cbc46cf28ee835135a", + "title": "On Topological Dynamics of Turing Machines", "abstract": null, "venue": + "Theoretical Computer Science", "year": 1997, "referenceCount": 13, "citationCount": + 53, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1997-03-15", "journal": + {"name": "Theor. Comput. Sci.", "pages": "203-216", "volume": "174"}, "authors": + [{"authorId": "1786485", "name": "P. Kurka"}]}, {"paperId": "43965c9aebd0f2ef450069ccf3d41d818cd1583f", + "externalIds": {"MAG": "684736", "CorpusId": 59679402}, "corpusId": 59679402, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43965c9aebd0f2ef450069ccf3d41d818cd1583f", + "title": "A Non-Behavioural, Computational Extension to the Turing Test", + "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": + 62, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "101-106", "volume": ""}, "authors": + [{"authorId": "1745871", "name": "D. Dowe"}, {"authorId": "145033113", "name": + "A. H\u00e1jek"}]}, {"paperId": "a39f1b82f035bac6a0aa60a3c0b33dca02b77f7d", + "externalIds": {"DBLP": "journals/cryptologia/Erskine84a", "MAG": "2076208656", + "DOI": "10.1080/0161-118491859178", "CorpusId": 33721922}, "corpusId": 33721922, + "publicationVenue": {"id": "ec317d71-24e9-4750-b911-76378b2fa378", "name": + "Cryptologia", "type": "journal", "issn": "0161-1194", "url": "http://www.informaworld.com/1558-1586", + "alternate_urls": ["http://www.tandfonline.com/loi/ucry20", "http://www.tandfonline.com/toc/ucry20/current#.UkSZ03nD_Qw"]}, + "url": "https://www.semanticscholar.org/paper/a39f1b82f035bac6a0aa60a3c0b33dca02b77f7d", + "title": "Alan Turing: the Enigma - Book Reviem", "abstract": null, "venue": + "Cryptologia", "year": 1984, "referenceCount": 0, "citationCount": 66, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": + "external"}, {"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1984-10-01", "journal": {"name": "Cryptologia", + "pages": "332-336", "volume": "8"}, "authors": [{"authorId": "14260955", "name": + "R. Erskine"}]}, {"paperId": "2863929240377cda5eacf3031093aa7efe3dfb7a", "externalIds": + {"DBLP": "journals/tcs/Wiedermann04", "MAG": "2026220857", "DOI": "10.1016/J.TCS.2003.12.004", + "CorpusId": 14716784}, "corpusId": 14716784, "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", + "name": "Theoretical Computer Science", "type": "journal", "alternate_names": + ["Theor Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/2863929240377cda5eacf3031093aa7efe3dfb7a", + "title": "Characterizing the super-Turing computing power and efficiency of + classical fuzzy Turing machines", "abstract": null, "venue": "Theoretical + Computer Science", "year": 2004, "referenceCount": 21, "citationCount": 44, + "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-06-04", "journal": {"name": "Theor. Comput. Sci.", "pages": "61-69", + "volume": "317"}, "authors": [{"authorId": "1815433", "name": "J. Wiedermann"}]}, + {"paperId": "da173b19205747eceb603e7d2618307415e3e706", "externalIds": {"MAG": + "1968630830", "DBLP": "journals/ai/ColbyHWK72", "DOI": "10.1016/0004-3702(72)90049-5", + "CorpusId": 31542633}, "corpusId": 31542633, "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", + "name": "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif + Intell"], "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", + "2710-1681"], "url": "http://www.elsevier.com/locate/artint", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/00043702", "https://www.journals.elsevier.com/artificial-intelligence"]}, + "url": "https://www.semanticscholar.org/paper/da173b19205747eceb603e7d2618307415e3e706", + "title": "Turing-like Indistinguishability Tests for the Calidation of a Computer + Simulation of Paranoid Processes", "abstract": null, "venue": "Artificial + Intelligence", "year": 1972, "referenceCount": 5, "citationCount": 121, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Artif. Intell.", "pages": "199-221", + "volume": "3"}, "authors": [{"authorId": "3123001", "name": "K. Colby"}, {"authorId": + "5981444", "name": "F. D. Hilf"}, {"authorId": "47864374", "name": "S. Weber"}, + {"authorId": "1921060", "name": "H. Kraemer"}]}, {"paperId": "7f13f90795e6ba8d50bb5d6e1e5527de9b08e834", + "externalIds": {"MAG": "2085656217", "DBLP": "journals/entcs/BusiGZ97", "DOI": + "10.1016/S1571-0661(05)80467-0", "CorpusId": 25712935}, "corpusId": 25712935, + "publicationVenue": {"id": "9828e623-666b-4033-96b2-f340f9d6d2a9", "name": + "International Workshop on Expressiveness in Concurrency", "type": "conference", + "alternate_names": ["EXPRESS", "Int Workshop Expressiveness Concurr"]}, "url": + "https://www.semanticscholar.org/paper/7f13f90795e6ba8d50bb5d6e1e5527de9b08e834", + "title": "On the Turing equivalence of Linda coordination primitives", "abstract": + null, "venue": "International Workshop on Expressiveness in Concurrency", + "year": 1999, "referenceCount": 14, "citationCount": 49, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1999-12-06", "journal": + {"pages": "75"}, "authors": [{"authorId": "1789091", "name": "N. Busi"}, {"authorId": + "1743074", "name": "R. Gorrieri"}, {"authorId": "1777352", "name": "G. Zavattaro"}]}, + {"paperId": "41f43864eb56bf624c46f02c7f382e9d2d633acf", "externalIds": {"MAG": + "1965308320", "DOI": "10.1177/135485650100700307", "CorpusId": 143127434}, + "corpusId": 143127434, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/41f43864eb56bf624c46f02c7f382e9d2d633acf", + "title": "The Turing Game", "abstract": "Do men and women behave differently + online? Can you tell how old someone is, or determine their race or national + origin based on how they communicate on the internet? Issues of personal identity + affect how we relate to others in everyday life, both online and offline. + However, identity in this new medium is still poorly understood by internet + users.", "venue": "", "year": 2001, "referenceCount": 15, "citationCount": + 56, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-09-01", "journal": + {"name": "Convergence: The International Journal of Research into New Media + Technologies", "pages": "102 - 83", "volume": "7"}, "authors": [{"authorId": + "2054325292", "name": "Josh Berman"}, {"authorId": "143709703", "name": "A. + Bruckman"}]}, {"paperId": "21e82025a71e01b7f157c2a37197cd3a4d4ac722", "externalIds": + {"DBLP": "journals/pieee/Norberg85", "MAG": "2017377819", "DOI": "10.1109/PROC.1985.13384", + "CorpusId": 13439481}, "corpusId": 13439481, "publicationVenue": {"id": "6faaccca-1cc4-45a9-aeb6-96a4901d2606", + "name": "Proceedings of the IEEE", "type": "journal", "alternate_names": ["Proc + IEEE"], "issn": "0018-9219", "alternate_issns": ["1558-2256"], "url": "http://www.ieee.org/portal/pages/pubs/proceedings/", + "alternate_urls": ["http://www.ieee.org/products/onlinepubs/pub/about_conference.html", + "https://ieeexplore.ieee.org/servlet/opac?punumber=5", "http://proceedingsoftheieee.ieee.org/"]}, + "url": "https://www.semanticscholar.org/paper/21e82025a71e01b7f157c2a37197cd3a4d4ac722", + "title": "Turing''s man: Western culture in computer age", "abstract": null, + "venue": "Proceedings of the IEEE", "year": 1985, "referenceCount": 0, "citationCount": + 95, "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1985-12-01", "journal": {"name": "Proceedings + of the IEEE", "pages": "1865-1866", "volume": "73"}, "authors": [{"authorId": + "2183358442", "name": "Artur L. Norberg"}]}, {"paperId": "91a1ea04ec35a55344f98b914ad10280bcced51f", + "externalIds": {"MAG": "2054571151", "DOI": "10.1016/0378-4371(92)90261-N", + "CorpusId": 122111391}, "corpusId": 122111391, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/91a1ea04ec35a55344f98b914ad10280bcced51f", + "title": "Competition in ramped Turing structures", "abstract": null, "venue": + "", "year": 1992, "referenceCount": 68, "citationCount": 66, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1992-09-01", "journal": {"name": "Physica A-statistical Mechanics and Its + Applications", "pages": "137-157", "volume": "188"}, "authors": [{"authorId": + "92147854", "name": "P. Borckmans"}, {"authorId": "7418281", "name": "A. Wit"}, + {"authorId": "49808656", "name": "G. Dewel"}]}]} ' headers: @@ -10482,31 +11916,31 @@ interactions: Connection: - keep-alive Content-Length: - - '157265' + - '179518' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:23 GMT + - Tue, 03 Jan 2023 20:52:52 GMT Via: - - 1.1 94d1b34d858b1d0f17042496999ab014.cloudfront.net (CloudFront) + - 1.1 80e150c3cd619899dc38fb20936dc086.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - LcBwY23L2hQ9VhQL-pwNGgQ5iBeZbrLeETLWjrFk-fF2rtPDmLe22w== + - l599_-ioYO-zlhSy8FQ4VNtcJ04sHWS-m1coBN6DqQq4a_sJy7QRYQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detEwE0hvHcFqkA= + - eLxRvH7MvHcFnaw= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '157265' + - '179518' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:23 GMT + - Tue, 03 Jan 2023 20:52:52 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 5b714045-7d4c-42a3-b2c7-e7d2aaaa4606 + - 3329578e-ef6b-4519-bdc4-0fc8f4ea1c8b status: code: 200 message: OK @@ -10522,77 +11956,113 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=500&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=500&limit=100 response: body: - string: '{"total": 133388, "offset": 500, "next": 600, "data": [{"paperId": + string: '{"total": 133751, "offset": 500, "next": 600, "data": [{"paperId": "da173b19205747eceb603e7d2618307415e3e706", "externalIds": {"MAG": "1968630830", "DBLP": "journals/ai/ColbyHWK72", "DOI": "10.1016/0004-3702(72)90049-5", "CorpusId": - 31542633}, "url": "https://www.semanticscholar.org/paper/da173b19205747eceb603e7d2618307415e3e706", + 31542633}, "corpusId": 31542633, "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", + "name": "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif + Intell"], "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", + "2710-1681"], "url": "http://www.elsevier.com/locate/artint", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/00043702", "https://www.journals.elsevier.com/artificial-intelligence"]}, + "url": "https://www.semanticscholar.org/paper/da173b19205747eceb603e7d2618307415e3e706", "title": "Turing-like Indistinguishability Tests for the Calidation of a Computer Simulation of Paranoid Processes", "abstract": null, "venue": "Artificial Intelligence", "year": 1972, "referenceCount": 5, "citationCount": 121, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Artif. Intell.", "pages": "199-221", "volume": - "3"}, "authors": [{"authorId": "3123001", "name": "K. Colby"}, {"authorId": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Artif. Intell.", "pages": "199-221", + "volume": "3"}, "authors": [{"authorId": "3123001", "name": "K. Colby"}, {"authorId": "5981444", "name": "F. D. Hilf"}, {"authorId": "47864374", "name": "S. Weber"}, - {"authorId": "1921060", "name": "H. Kraemer"}]}, {"paperId": "43965c9aebd0f2ef450069ccf3d41d818cd1583f", - "externalIds": {"MAG": "684736", "CorpusId": 59679402}, "url": "https://www.semanticscholar.org/paper/43965c9aebd0f2ef450069ccf3d41d818cd1583f", - "title": "A Non-Behavioural, Computational Extension to the Turing Test", - "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": - 62, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "101-106", "volume": ""}, "authors": [{"authorId": - "1745871", "name": "D. Dowe"}, {"authorId": "145033113", "name": "A. H\u00e1jek"}]}, - {"paperId": "21e82025a71e01b7f157c2a37197cd3a4d4ac722", "externalIds": {"DBLP": - "journals/pieee/Norberg85", "MAG": "2017377819", "DOI": "10.1109/PROC.1985.13384", - "CorpusId": 13439481}, "url": "https://www.semanticscholar.org/paper/21e82025a71e01b7f157c2a37197cd3a4d4ac722", - "title": "Turing''s man: Western culture in computer age", "abstract": null, - "venue": "Proceedings of the IEEE", "year": 1985, "referenceCount": 0, "citationCount": - 94, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Engineering", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1985-12-01", "journal": {"name": "Proceedings of the IEEE", - "pages": "1865-1866", "volume": "73"}, "authors": [{"authorId": "2183358442", - "name": "Artur L. Norberg"}]}, {"paperId": "483e080efb1b3dfb8777f71dcb6e7cf16af3b70f", - "externalIds": {"DBLP": "journals/complexity/Copeland98", "MAG": "2051790376", - "DOI": "10.1002/(SICI)1099-0526(199809/10)4:1%3C30::AID-CPLX9%3E3.0.CO;2-8", - "CorpusId": 44982181}, "url": "https://www.semanticscholar.org/paper/483e080efb1b3dfb8777f71dcb6e7cf16af3b70f", - "title": "Super Turing-machines", "abstract": null, "venue": "Complex.", "year": - 1998, "referenceCount": 11, "citationCount": 52, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1998-09-01", "journal": {"name": "Complex.", - "pages": "30-32", "volume": "4"}, "authors": [{"authorId": "144246233", "name": - "B. Copeland"}]}, {"paperId": "a39f1b82f035bac6a0aa60a3c0b33dca02b77f7d", - "externalIds": {"DBLP": "journals/cryptologia/Erskine84a", "MAG": "2076208656", - "DOI": "10.1080/0161-118491859178", "CorpusId": 33721922}, "url": "https://www.semanticscholar.org/paper/a39f1b82f035bac6a0aa60a3c0b33dca02b77f7d", - "title": "Alan Turing: the Enigma - Book Reviem", "abstract": null, "venue": - "Cryptologia", "year": 1984, "referenceCount": 0, "citationCount": 66, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1984-10-01", "journal": {"name": "Cryptologia", "pages": - "332-336", "volume": "8"}, "authors": [{"authorId": "14260955", "name": "R. - Erskine"}]}, {"paperId": "2863929240377cda5eacf3031093aa7efe3dfb7a", "externalIds": - {"DBLP": "journals/tcs/Wiedermann04", "MAG": "2026220857", "DOI": "10.1016/J.TCS.2003.12.004", - "CorpusId": 14716784}, "url": "https://www.semanticscholar.org/paper/2863929240377cda5eacf3031093aa7efe3dfb7a", + {"authorId": "1921060", "name": "H. Kraemer"}]}, {"paperId": "2863929240377cda5eacf3031093aa7efe3dfb7a", + "externalIds": {"DBLP": "journals/tcs/Wiedermann04", "MAG": "2026220857", + "DOI": "10.1016/J.TCS.2003.12.004", "CorpusId": 14716784}, "corpusId": 14716784, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/2863929240377cda5eacf3031093aa7efe3dfb7a", "title": "Characterizing the super-Turing computing power and efficiency of classical fuzzy Turing machines", "abstract": null, "venue": "Theoretical Computer Science", "year": 2004, "referenceCount": 21, "citationCount": 44, - "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer + "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-06-04", "journal": {"name": "Theor. Comput. Sci.", "pages": "61-69", + "volume": "317"}, "authors": [{"authorId": "1815433", "name": "J. Wiedermann"}]}, + {"paperId": "7f13f90795e6ba8d50bb5d6e1e5527de9b08e834", "externalIds": {"MAG": + "2085656217", "DBLP": "journals/entcs/BusiGZ97", "DOI": "10.1016/S1571-0661(05)80467-0", + "CorpusId": 25712935}, "corpusId": 25712935, "publicationVenue": {"id": "9828e623-666b-4033-96b2-f340f9d6d2a9", + "name": "International Workshop on Expressiveness in Concurrency", "type": + "conference", "alternate_names": ["EXPRESS", "Int Workshop Expressiveness + Concurr"]}, "url": "https://www.semanticscholar.org/paper/7f13f90795e6ba8d50bb5d6e1e5527de9b08e834", + "title": "On the Turing equivalence of Linda coordination primitives", "abstract": + null, "venue": "International Workshop on Expressiveness in Concurrency", + "year": 1999, "referenceCount": 14, "citationCount": 49, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-06-04", "journal": - {"name": "Theor. Comput. Sci.", "pages": "61-69", "volume": "317"}, "authors": - [{"authorId": "1815433", "name": "J. Wiedermann"}]}, {"paperId": "682611aa7f449b4605f2c5a5efbcbcb2e31bf7da", - "externalIds": {"MAG": "2001446412", "DOI": "10.1098/rsbm.1955.0019", "CorpusId": - 711366}, "url": "https://www.semanticscholar.org/paper/682611aa7f449b4605f2c5a5efbcbcb2e31bf7da", + "publicationTypes": ["JournalArticle"], "publicationDate": "1999-12-06", "journal": + {"pages": "75"}, "authors": [{"authorId": "1789091", "name": "N. Busi"}, {"authorId": + "1743074", "name": "R. Gorrieri"}, {"authorId": "1777352", "name": "G. Zavattaro"}]}, + {"paperId": "899fe4df330371e242444e4fac10cc02ca0665e6", "externalIds": {"MAG": + "608833252", "DOI": "10.5860/choice.31-3278", "CorpusId": 169907902}, "corpusId": + 169907902, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/899fe4df330371e242444e4fac10cc02ca0665e6", + "title": "Ad Infinitum... The Ghost in Turing''s Machine: Taking God Out of + Mathematics and Putting the Body Back In. An Essay in Corporeal Semiotics", + "abstract": "By searching the title, publisher, or authors of guide you in + reality want, you can discover them rapidly. In the house, workplace, or perhaps + in your method can be all best area within net connections. If you take aim + to download and install the ad infinitum the ghost in turings machine taking + god out of mathematics and putting the body back in an essay in corporeal + semiotics, it is entirely easy then, in the past currently we extend the partner + to buy and create bargains to download and install ad infinitum the ghost + in turings machine taking god out of mathematics and putting the body back + in an essay in corporeal semiotics consequently simple!", "venue": "", "year": + 1993, "referenceCount": 0, "citationCount": 75, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1993-09-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "27739767", "name": "B. Rotman"}]}, {"paperId": "21e82025a71e01b7f157c2a37197cd3a4d4ac722", + "externalIds": {"DBLP": "journals/pieee/Norberg85", "MAG": "2017377819", "DOI": + "10.1109/PROC.1985.13384", "CorpusId": 13439481}, "corpusId": 13439481, "publicationVenue": + {"id": "6faaccca-1cc4-45a9-aeb6-96a4901d2606", "name": "Proceedings of the + IEEE", "type": "journal", "alternate_names": ["Proc IEEE"], "issn": "0018-9219", + "alternate_issns": ["1558-2256"], "url": "http://www.ieee.org/portal/pages/pubs/proceedings/", + "alternate_urls": ["http://www.ieee.org/products/onlinepubs/pub/about_conference.html", + "https://ieeexplore.ieee.org/servlet/opac?punumber=5", "http://proceedingsoftheieee.ieee.org/"]}, + "url": "https://www.semanticscholar.org/paper/21e82025a71e01b7f157c2a37197cd3a4d4ac722", + "title": "Turing''s man: Western culture in computer age", "abstract": null, + "venue": "Proceedings of the IEEE", "year": 1985, "referenceCount": 0, "citationCount": + 95, "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Engineering"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1985-12-01", "journal": {"name": "Proceedings + of the IEEE", "pages": "1865-1866", "volume": "73"}, "authors": [{"authorId": + "2183358442", "name": "Artur L. Norberg"}]}, {"paperId": "dffc33a3dfc73e03ca30f1f73fcbf22a21f268ea", + "externalIds": {"MAG": "4245645", "CorpusId": 59800146}, "corpusId": 59800146, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dffc33a3dfc73e03ca30f1f73fcbf22a21f268ea", + "title": "A computational extension to the Turing test", "abstract": null, + "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 60, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "1745871", "name": "D. + Dowe"}, {"authorId": "145033113", "name": "A. H\u00e1jek"}]}, {"paperId": + "682611aa7f449b4605f2c5a5efbcbcb2e31bf7da", "externalIds": {"MAG": "2001446412", + "DOI": "10.1098/rsbm.1955.0019", "CorpusId": 711366}, "corpusId": 711366, + "publicationVenue": {"id": "d78981da-e33b-4f95-99d3-226d7968c2bb", "name": + "Biographical Memoirs of Fellows of the Royal Society", "type": "journal", + "alternate_names": ["Biogr Mem Fellow R Soc"], "issn": "0080-4606", "url": + "https://www.jstor.org/journal/biogmemofellroya", "alternate_urls": ["http://www.jstor.org/journals/00804606.html", + "http://rsbm.royalsocietypublishing.org/"]}, "url": "https://www.semanticscholar.org/paper/682611aa7f449b4605f2c5a5efbcbcb2e31bf7da", "title": "Alan Mathison Turing, 1912-1954", "abstract": "The sudden death of Alan Turing on 7 June 1954 deprived mathematics and science of a great original mind at the height of its power. After some years of scientific indecision, @@ -10618,13 +12088,15 @@ interactions: perplexed and distressed his teachers, bent on giving him a well-balanced education.", "venue": "Biographical Memoirs of Fellows of the Royal Society", "year": 1955, "referenceCount": 13, "citationCount": 46, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsbm.1955.0019", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1955-11-01", "journal": {"name": "Biographical Memoirs of Fellows of the Royal Society", "pages": "253 - 263"}, "authors": [{"authorId": "143697232", "name": "M. Newman"}]}, {"paperId": "b5394e76607f2cdd58c45d18511699da11beb229", "externalIds": {"MAG": - "2528534253", "CorpusId": 64461042}, "url": "https://www.semanticscholar.org/paper/b5394e76607f2cdd58c45d18511699da11beb229", + "2528534253", "CorpusId": 64461042}, "corpusId": 64461042, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b5394e76607f2cdd58c45d18511699da11beb229", "title": "On Alan Turing and the Origins of Digital Computers", "abstract": "This paper documents an investigation into the role that the late Alan Turing played in the development of electronic computers. Evidence is presented that @@ -10633,14 +12105,15 @@ interactions: sense \u2018program controlled\u2019, and that the origins of several post-war general purpose computer projects in Britain can be traced back to these wartime computers.", "venue": "", "year": 1972, "referenceCount": 32, "citationCount": - 38, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Machine - intelligence", "volume": ""}, "authors": [{"authorId": "145586245", "name": - "B. Randell"}]}, {"paperId": "7722f74a9a7c9cbae92646e524b2969c5f0a9b97", "externalIds": - {"DBLP": "journals/jacm/Fischer65a", "MAG": "2069980124", "DOI": "10.1145/321296.321308", - "CorpusId": 11481198}, "url": "https://www.semanticscholar.org/paper/7722f74a9a7c9cbae92646e524b2969c5f0a9b97", + 38, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Machine intelligence", "volume": ""}, "authors": [{"authorId": + "145586245", "name": "B. Randell"}]}, {"paperId": "7722f74a9a7c9cbae92646e524b2969c5f0a9b97", + "externalIds": {"DBLP": "journals/jacm/Fischer65a", "MAG": "2069980124", "DOI": + "10.1145/321296.321308", "CorpusId": 11481198}, "corpusId": 11481198, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7722f74a9a7c9cbae92646e524b2969c5f0a9b97", "title": "On Formalisms for Turing Machines", "abstract": "Turing''s original quintuple formalism for an abstract computing machine is compared with the quadruple approach of Post and with some new alterr~atives. In each case the @@ -10675,34 +12148,14 @@ interactions: discrete squares. Upon each square of the tape is written one symbol selected from a finite alphabet; all but a \u2026", "venue": "JACM", "year": 1964, "referenceCount": 9, "citationCount": 45, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1964-11-11", "journal": {"pages": "68-75"}, "authors": [{"authorId": "1691253", - "name": "P. C. Fischer"}]}, {"paperId": "2c5ecf28ed657d935f866032c2ba81e17969b7fc", - "externalIds": {"MAG": "2069413150", "DOI": "10.1090/S0002-9947-1971-0281555-3", - "CorpusId": 6653549}, "url": "https://www.semanticscholar.org/paper/2c5ecf28ed657d935f866032c2ba81e17969b7fc", - "title": "Computability by probabilistic Turing machines", "abstract": "In - the present paper, the definition of probabilistic Turing machines is extended - to allow the introduction of relative computability. Relative computable functions, - predicates and sets are discussed and their operations investigated. It is - shown that, despite the fact that randomness is involved, most of the conventional - results hold in the probabilistic case. Various classes of ordinary functions - characterizable by computable random functions are introduced, and their relations - are examined. Perhaps somewhat unexpectedly, it is shown that, in some sense, - probabilistic Turing machines are capable of computing any given function. - Finally, a necessary and sufficient condition for an ordinary function to - be partially recursive is established via computable probabilistic Turing - machines.", "venue": "", "year": 1971, "referenceCount": 12, "citationCount": - 34, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1971-09-01", "journal": {"name": - "Transactions of the American Mathematical Society", "pages": "165-184", "volume": - "159"}, "authors": [{"authorId": "143844809", "name": "Eugene S. Santos"}]}, - {"paperId": "241a09bfd35bbc65871051c22a7a058605d12e35", "externalIds": {"ArXiv": - "quant-ph/9708054", "MAG": "2048424641", "DOI": "10.1002/(SICI)1521-3978(199806)46:4/5<423::AID-PROP423>3.0.CO;2-G", - "CorpusId": 2733830}, "url": "https://www.semanticscholar.org/paper/241a09bfd35bbc65871051c22a7a058605d12e35", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1964-11-11", "journal": {"pages": "68-75"}, "authors": + [{"authorId": "1691253", "name": "P. C. Fischer"}]}, {"paperId": "241a09bfd35bbc65871051c22a7a058605d12e35", + "externalIds": {"ArXiv": "quant-ph/9708054", "MAG": "2048424641", "DOI": "10.1002/(SICI)1521-3978(199806)46:4/5<423::AID-PROP423>3.0.CO;2-G", + "CorpusId": 2733830}, "corpusId": 2733830, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/241a09bfd35bbc65871051c22a7a058605d12e35", "title": "Models of Quantum Turing Machines", "abstract": "Quantum Turing machines are discussed and reviewed in this paper. Most of the paper is concerned with processes defined by a step operator T that is used to construct a Hamiltonian @@ -10725,137 +12178,194 @@ interactions: are discussed in which the graph structures correspond to interferometers and iterations of interferometers.\u00ab\u00a0less", "venue": "", "year": 1997, "referenceCount": 20, "citationCount": 22, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1997-08-28", - "journal": {"name": "Protein Science", "pages": "423-441", "volume": "46"}, - "authors": [{"authorId": "2542436", "name": "P. Benioff"}]}, {"paperId": "1c8c87c9009f4e435ce3e079c22e2d66c73d96e6", - "externalIds": {"MAG": "2957366883", "CorpusId": 837336}, "url": "https://www.semanticscholar.org/paper/1c8c87c9009f4e435ce3e079c22e2d66c73d96e6", + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/9708054", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "1997-08-28", "journal": + {"name": "Protein Science", "pages": "423-441", "volume": "46"}, "authors": + [{"authorId": "2542436", "name": "P. Benioff"}]}, {"paperId": "2c5ecf28ed657d935f866032c2ba81e17969b7fc", + "externalIds": {"MAG": "2069413150", "DOI": "10.1090/S0002-9947-1971-0281555-3", + "CorpusId": 6653549}, "corpusId": 6653549, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2c5ecf28ed657d935f866032c2ba81e17969b7fc", + "title": "Computability by probabilistic Turing machines", "abstract": "In + the present paper, the definition of probabilistic Turing machines is extended + to allow the introduction of relative computability. Relative computable functions, + predicates and sets are discussed and their operations investigated. It is + shown that, despite the fact that randomness is involved, most of the conventional + results hold in the probabilistic case. Various classes of ordinary functions + characterizable by computable random functions are introduced, and their relations + are examined. Perhaps somewhat unexpectedly, it is shown that, in some sense, + probabilistic Turing machines are capable of computing any given function. + Finally, a necessary and sufficient condition for an ordinary function to + be partially recursive is established via computable probabilistic Turing + machines.", "venue": "", "year": 1971, "referenceCount": 12, "citationCount": + 34, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1971-09-01", "journal": {"name": + "Transactions of the American Mathematical Society", "pages": "165-184", "volume": + "159"}, "authors": [{"authorId": "143844809", "name": "Eugene S. Santos"}]}, + {"paperId": "4a54a442809f986732e8601a87d97e5bdc61489a", "externalIds": {"MAG": + "2138509834", "DOI": "10.1007/S001990050157", "CorpusId": 15398169}, "corpusId": + 15398169, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4a54a442809f986732e8601a87d97e5bdc61489a", + "title": "Arrow''s Theorem and Turing computability", "abstract": null, "venue": + "", "year": 1997, "referenceCount": 21, "citationCount": 43, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://conservancy.umn.edu/bitstream/11299/55723/1/1994-276.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Economics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-02-05", + "journal": {"name": "Economic Theory", "pages": "257-276", "volume": "10"}, + "authors": [{"authorId": "144037684", "name": "H. R. Mihara"}]}, {"paperId": + "1c8c87c9009f4e435ce3e079c22e2d66c73d96e6", "externalIds": {"MAG": "2957366883", + "CorpusId": 837336}, "corpusId": 837336, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1c8c87c9009f4e435ce3e079c22e2d66c73d96e6", "title": "Turing Machines Are Recurrent Neural Networks", "abstract": "Any algebraically computable function can be expressed as a recurrent neural network structure consisting of identical computing elements (or, equivalently, as a nonlinear discrete-time system of the form x(k + 1) = f(Ax(k)), where f() is a simpl\u00e8cut'' function). A constructive proof is presented in this paper.", "venue": "", "year": 1996, "referenceCount": 9, "citationCount": - 40, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "152149960", "name": "H. Hyotyniemi"}]}, - {"paperId": "57d55b340454ee64bb912ee9a8d73971000cdb77", "externalIds": {"MAG": - "2151345003", "DBLP": "journals/tcs/Siegelmann96", "DOI": "10.1016/S0304-3975(96)00087-4", - "CorpusId": 11409873}, "url": "https://www.semanticscholar.org/paper/57d55b340454ee64bb912ee9a8d73971000cdb77", - "title": "The Simple Dynamics of Super Turing Theories", "abstract": null, - "venue": "Theoretical Computer Science", "year": 1996, "referenceCount": 29, - "citationCount": 40, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-11-20", "journal": {"name": "Theor. Comput. Sci.", "pages": "461-472", - "volume": "168"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, - {"paperId": "57bd1b4b04cd46177992b29972067681cd7042c8", "externalIds": {"MAG": - "2071294192", "DOI": "10.1016/0375-9601(93)90655-J", "CorpusId": 123183064}, - "url": "https://www.semanticscholar.org/paper/57bd1b4b04cd46177992b29972067681cd7042c8", - "title": "Subcritical transitions to Turing structures", "abstract": null, - "venue": "", "year": 1993, "referenceCount": 18, "citationCount": 43, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Materials Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1993-08-02", - "journal": {"name": "Physics Letters A", "pages": "91-96", "volume": "179"}, - "authors": [{"authorId": "145003228", "name": "O. Jensen"}, {"authorId": "93349652", - "name": "V. O. Pannbacker"}, {"authorId": "49808656", "name": "G. Dewel"}, - {"authorId": "92147854", "name": "P. Borckmans"}]}, {"paperId": "b3901067e7a805ca9b25abc529269f2fdf25887b", + 40, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "152149960", + "name": "H. Hyotyniemi"}]}, {"paperId": "b3901067e7a805ca9b25abc529269f2fdf25887b", "externalIds": {"DBLP": "journals/ai/Michie93", "MAG": "1993380272", "DOI": - "10.1016/0004-3702(93)90032-7", "CorpusId": 29510502}, "url": "https://www.semanticscholar.org/paper/b3901067e7a805ca9b25abc529269f2fdf25887b", + "10.1016/0004-3702(93)90032-7", "CorpusId": 29510502}, "corpusId": 29510502, + "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", "name": + "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif Intell"], + "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", "2710-1681"], + "url": "http://www.elsevier.com/locate/artint", "alternate_urls": ["http://www.sciencedirect.com/science/journal/00043702", + "https://www.journals.elsevier.com/artificial-intelligence"]}, "url": "https://www.semanticscholar.org/paper/b3901067e7a805ca9b25abc529269f2fdf25887b", "title": "Turing''s Test and Conscious Thought", "abstract": null, "venue": "Artificial Intelligence", "year": 1993, "referenceCount": 11, "citationCount": - 42, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1993-03-01", "journal": - {"name": "Artif. Intell.", "pages": "1-22", "volume": "60"}, "authors": [{"authorId": - "145878706", "name": "D. Michie"}]}, {"paperId": "4a54a442809f986732e8601a87d97e5bdc61489a", - "externalIds": {"MAG": "2138509834", "DOI": "10.1007/S001990050157", "CorpusId": - 15398169}, "url": "https://www.semanticscholar.org/paper/4a54a442809f986732e8601a87d97e5bdc61489a", - "title": "Arrow''s Theorem and Turing computability", "abstract": null, "venue": - "", "year": 1997, "referenceCount": 21, "citationCount": 41, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-02-05", - "journal": {"name": "Economic Theory", "pages": "257-276", "volume": "10"}, - "authors": [{"authorId": "144037684", "name": "H. R. Mihara"}]}, {"paperId": - "71c651772c3a606c1fb48e893117ed4896dc5f1e", "externalIds": {"DBLP": "journals/tcs/Kudlek96", - "MAG": "2023042027", "DOI": "10.1016/S0304-3975(96)00078-3", "CorpusId": 36330903}, - "url": "https://www.semanticscholar.org/paper/71c651772c3a606c1fb48e893117ed4896dc5f1e", - "title": "Small Deterministic Turing Machines", "abstract": null, "venue": - "Theoretical Computer Science", "year": 1996, "referenceCount": 4, "citationCount": - 39, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-11-20", "journal": {"name": "Theor. Comput. Sci.", "pages": "241-255", - "volume": "168"}, "authors": [{"authorId": "1686711", "name": "M. Kudlek"}]}, - {"paperId": "921d04d697f7af03f774de8ba5bdba1ce81326d2", "externalIds": {"MAG": - "1568750096", "DOI": "10.1007/978-94-011-1156-0_10", "CorpusId": 118795438}, - "url": "https://www.semanticscholar.org/paper/921d04d697f7af03f774de8ba5bdba1ce81326d2", - "title": "Turing Bifurcations and Pattern Selection", "abstract": null, "venue": - "", "year": 1995, "referenceCount": 107, "citationCount": 38, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "", "pages": "323-363", "volume": ""}, "authors": [{"authorId": - "92147854", "name": "P. Borckmans"}, {"authorId": "49808656", "name": "G. - Dewel"}, {"authorId": "7418281", "name": "A. Wit"}, {"authorId": "4851082", - "name": "D. Walgraef"}]}, {"paperId": "e77e131297b22e49ad034bf0ab0abd44ec14d4f0", - "externalIds": {"DBLP": "journals/ai/Biermann72", "MAG": "2090943474", "DOI": - "10.1016/0004-3702(72)90048-3", "CorpusId": 39447612}, "url": "https://www.semanticscholar.org/paper/e77e131297b22e49ad034bf0ab0abd44ec14d4f0", + 42, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "http://eprints.cs.vt.edu/archive/00000284/01/TR-92-04.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1993-03-01", "journal": {"name": "Artif. Intell.", "pages": "1-22", "volume": + "60"}, "authors": [{"authorId": "145878706", "name": "D. Michie"}]}, {"paperId": + "e77e131297b22e49ad034bf0ab0abd44ec14d4f0", "externalIds": {"DBLP": "journals/ai/Biermann72", + "MAG": "2090943474", "DOI": "10.1016/0004-3702(72)90048-3", "CorpusId": 39447612}, + "corpusId": 39447612, "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", + "name": "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif + Intell"], "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", + "2710-1681"], "url": "http://www.elsevier.com/locate/artint", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/00043702", "https://www.journals.elsevier.com/artificial-intelligence"]}, + "url": "https://www.semanticscholar.org/paper/e77e131297b22e49ad034bf0ab0abd44ec14d4f0", "title": "On the Inference of Turing Machines from Sample Computations", "abstract": null, "venue": "Artificial Intelligence", "year": 1972, "referenceCount": 21, "citationCount": 81, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Artif. Intell.", "pages": "181-198", "volume": - "3"}, "authors": [{"authorId": "1727680", "name": "A. Biermann"}]}, {"paperId": - "6190b1f31e6c0f92cd37715760f6da481b2e97d0", "externalIds": {"DBLP": "journals/tcs/Dauchet92", - "MAG": "2024726864", "DOI": "10.1016/0304-3975(92)90022-8", "CorpusId": 23787605}, - "url": "https://www.semanticscholar.org/paper/6190b1f31e6c0f92cd37715760f6da481b2e97d0", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Artif. Intell.", "pages": "181-198", + "volume": "3"}, "authors": [{"authorId": "1727680", "name": "A. Biermann"}]}, + {"paperId": "3d099b0f00f0af8b71941a2f5a9acc62b85dafc2", "externalIds": {"MAG": + "1976751890", "DOI": "10.1038/SCIENTIFICAMERICAN0994-104", "CorpusId": 119777526}, + "corpusId": 119777526, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d099b0f00f0af8b71941a2f5a9acc62b85dafc2", + "title": "A Subway Named Turing", "abstract": null, "venue": "", "year": 1994, + "referenceCount": 0, "citationCount": 41, "influentialCitationCount": 5, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}], "publicationTypes": null, + "publicationDate": "1994-09-01", "journal": {"name": "Scientific American", + "pages": "104-107", "volume": "271"}, "authors": [{"authorId": "144925593", + "name": "I. Stewart"}]}, {"paperId": "6190b1f31e6c0f92cd37715760f6da481b2e97d0", + "externalIds": {"DBLP": "journals/tcs/Dauchet92", "MAG": "2024726864", "DOI": + "10.1016/0304-3975(92)90022-8", "CorpusId": 23787605}, "corpusId": 23787605, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/6190b1f31e6c0f92cd37715760f6da481b2e97d0", "title": "Simulation of Turing Machines by a Regular Rewrite Rule", "abstract": null, "venue": "Theoretical Computer Science", "year": 1992, "referenceCount": 6, "citationCount": 50, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-09-14", "journal": {"name": "Theor. Comput. Sci.", "pages": "409-420", - "volume": "103"}, "authors": [{"authorId": "1766675", "name": "M. Dauchet"}]}, - {"paperId": "caf36b35cc9b5b49d36569801ede293ac07f90a2", "externalIds": {"MAG": - "2291705646", "CorpusId": 116348646}, "url": "https://www.semanticscholar.org/paper/caf36b35cc9b5b49d36569801ede293ac07f90a2", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-09-14", "journal": {"name": "Theor. Comput. Sci.", + "pages": "409-420", "volume": "103"}, "authors": [{"authorId": "1766675", + "name": "M. Dauchet"}]}, {"paperId": "921d04d697f7af03f774de8ba5bdba1ce81326d2", + "externalIds": {"MAG": "1568750096", "DOI": "10.1007/978-94-011-1156-0_10", + "CorpusId": 118795438}, "corpusId": 118795438, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/921d04d697f7af03f774de8ba5bdba1ce81326d2", + "title": "Turing Bifurcations and Pattern Selection", "abstract": null, "venue": + "", "year": 1995, "referenceCount": 107, "citationCount": 40, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "", "pages": "323-363", "volume": ""}, "authors": + [{"authorId": "92147854", "name": "P. Borckmans"}, {"authorId": "49808656", + "name": "G. Dewel"}, {"authorId": "7418281", "name": "A. Wit"}, {"authorId": + "4851082", "name": "D. Walgraef"}]}, {"paperId": "caf36b35cc9b5b49d36569801ede293ac07f90a2", + "externalIds": {"MAG": "2291705646", "CorpusId": 116348646}, "corpusId": 116348646, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/caf36b35cc9b5b49d36569801ede293ac07f90a2", "title": "Turing in the land of O(z)", "abstract": null, "venue": "", "year": 1988, "referenceCount": 34, "citationCount": 49, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": - "Mathematics", "source": "external"}], "publicationTypes": null, "publicationDate": - "1988-10-01", "journal": {"name": "", "pages": "113-147", "volume": ""}, "authors": - [{"authorId": "104174712", "name": "S. Feferman"}]}, {"paperId": "3d099b0f00f0af8b71941a2f5a9acc62b85dafc2", - "externalIds": {"MAG": "1976751890", "DOI": "10.1038/SCIENTIFICAMERICAN0994-104", - "CorpusId": 119777526}, "url": "https://www.semanticscholar.org/paper/3d099b0f00f0af8b71941a2f5a9acc62b85dafc2", - "title": "A Subway Named Turing", "abstract": null, "venue": "", "year": 1994, - "referenceCount": 0, "citationCount": 41, "influentialCitationCount": 5, "isOpenAccess": - false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}], "publicationTypes": null, "publicationDate": "1994-09-01", - "journal": {"name": "Scientific American", "pages": "104-107", "volume": "271"}, - "authors": [{"authorId": "144925593", "name": "I. Stewart"}]}, {"paperId": - "19e16ec71a0be98e5ba988a556c15d43694dbc75", "externalIds": {"MAG": "2091590954", - "DOI": "10.1103/PHYSREVE.56.1250", "CorpusId": 123501887}, "url": "https://www.semanticscholar.org/paper/19e16ec71a0be98e5ba988a556c15d43694dbc75", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, + {"category": "Mathematics", "source": "external"}], "publicationTypes": null, + "publicationDate": "1988-10-01", "journal": {"name": "", "pages": "113-147", + "volume": ""}, "authors": [{"authorId": "104174712", "name": "S. Feferman"}]}, + {"paperId": "57d55b340454ee64bb912ee9a8d73971000cdb77", "externalIds": {"MAG": + "2151345003", "DBLP": "journals/tcs/Siegelmann96", "DOI": "10.1016/S0304-3975(96)00087-4", + "CorpusId": 11409873}, "corpusId": 11409873, "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", + "name": "Theoretical Computer Science", "type": "journal", "alternate_names": + ["Theor Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/57d55b340454ee64bb912ee9a8d73971000cdb77", + "title": "The Simple Dynamics of Super Turing Theories", "abstract": null, + "venue": "Theoretical Computer Science", "year": 1996, "referenceCount": 29, + "citationCount": 40, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1996-11-20", "journal": {"name": "Theor. Comput. Sci.", + "pages": "461-472", "volume": "168"}, "authors": [{"authorId": "2797623", + "name": "H. Siegelmann"}]}, {"paperId": "57bd1b4b04cd46177992b29972067681cd7042c8", + "externalIds": {"MAG": "2071294192", "DOI": "10.1016/0375-9601(93)90655-J", + "CorpusId": 123183064}, "corpusId": 123183064, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/57bd1b4b04cd46177992b29972067681cd7042c8", + "title": "Subcritical transitions to Turing structures", "abstract": null, + "venue": "", "year": 1993, "referenceCount": 18, "citationCount": 43, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1993-08-02", "journal": {"name": "Physics Letters A", + "pages": "91-96", "volume": "179"}, "authors": [{"authorId": "145003228", + "name": "O. Jensen"}, {"authorId": "93349652", "name": "V. O. Pannbacker"}, + {"authorId": "49808656", "name": "G. Dewel"}, {"authorId": "92147854", "name": + "P. Borckmans"}]}, {"paperId": "71c651772c3a606c1fb48e893117ed4896dc5f1e", + "externalIds": {"DBLP": "journals/tcs/Kudlek96", "MAG": "2023042027", "DOI": + "10.1016/S0304-3975(96)00078-3", "CorpusId": 36330903}, "corpusId": 36330903, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/71c651772c3a606c1fb48e893117ed4896dc5f1e", + "title": "Small Deterministic Turing Machines", "abstract": null, "venue": + "Theoretical Computer Science", "year": 1996, "referenceCount": 4, "citationCount": + 39, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1996-11-20", "journal": {"name": "Theor. Comput. Sci.", + "pages": "241-255", "volume": "168"}, "authors": [{"authorId": "1686711", + "name": "M. Kudlek"}]}, {"paperId": "19e16ec71a0be98e5ba988a556c15d43694dbc75", + "externalIds": {"MAG": "2091590954", "DOI": "10.1103/PHYSREVE.56.1250", "CorpusId": + 123501887}, "corpusId": 123501887, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19e16ec71a0be98e5ba988a556c15d43694dbc75", "title": "Confined Turing patterns in growing systems", "abstract": null, - "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 80, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}], "publicationTypes": null, - "publicationDate": "1997-07-01", "journal": {"name": "Physical Review E", - "pages": "1250-1253", "volume": "56"}, "authors": [{"authorId": "70988914", + "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 81, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}], "publicationTypes": + null, "publicationDate": "1997-07-01", "journal": {"name": "Physical Review + E", "pages": "1250-1253", "volume": "56"}, "authors": [{"authorId": "70988914", "name": "C. Varea"}, {"authorId": "145092079", "name": "J. Arag\u00f3n"}, {"authorId": "37747895", "name": "R. Barrio"}]}, {"paperId": "c76b9be9bb99b11508ec47c36490093287ee0b6c", "externalIds": {"MAG": "1481328742", "DOI": "10.1090/conm/029/08", "CorpusId": - 17362777}, "url": "https://www.semanticscholar.org/paper/c76b9be9bb99b11508ec47c36490093287ee0b6c", + 17362777}, "corpusId": 17362777, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c76b9be9bb99b11508ec47c36490093287ee0b6c", "title": "A Mechanical Proof of the Turing Completeness of Pure LISP.", "abstract": "Abstract : The authors describe a proof by a computer program of the Turing completeness of a computational paradigm akin to Pure LISP. That is, they @@ -10864,32 +12374,45 @@ interactions: by LISP. While this result is straightforward, they believe this is the first instance of a machine proving the Turing completeness of another computational paradigm. (Author)", "venue": "", "year": 1983, "referenceCount": 8, "citationCount": - 33, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1983-05-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "2404260", "name": "R. Boyer"}, - {"authorId": "12725412", "name": "J. S. Moore"}]}, {"paperId": "60cbd808e9bc8857a039f41f05cb2256f71c7dd7", - "externalIds": {"DBLP": "conf/csl/Aanderaa92", "MAG": "1526857708", "DOI": - "10.1007/3-540-56992-8_1", "CorpusId": 81954}, "url": "https://www.semanticscholar.org/paper/60cbd808e9bc8857a039f41f05cb2256f71c7dd7", + 33, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.cs.utexas.edu/users/boyer/ftp/ics-reports/cmp37.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1983-05-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "2404260", "name": "R. Boyer"}, {"authorId": "12725412", "name": "J. S. Moore"}]}, + {"paperId": "60cbd808e9bc8857a039f41f05cb2256f71c7dd7", "externalIds": {"DBLP": + "conf/csl/Aanderaa92", "MAG": "1526857708", "DOI": "10.1007/3-540-56992-8_1", + "CorpusId": 81954}, "corpusId": 81954, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/60cbd808e9bc8857a039f41f05cb2256f71c7dd7", "title": "A Universal Turing Machine", "abstract": null, "venue": "CSL", "year": 1992, "referenceCount": 98, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://1ydown.free.fr/Turing/137.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1992-09-28", "journal": {"pages": "1-4"}, "authors": [{"authorId": - "2917104", "name": "St\u00e5l O. Aanderaa"}]}, {"paperId": "5c92ba26686f7af4044c643620c2380c08bd7b4d", - "externalIds": {"MAG": "2146240810", "DOI": "10.1007/978-1-4612-0863-1_2", - "CorpusId": 61523472}, "url": "https://www.semanticscholar.org/paper/5c92ba26686f7af4044c643620c2380c08bd7b4d", - "title": "What Is a Turing Machine", "abstract": null, "venue": "", "year": - 1994, "referenceCount": 0, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "5-17", "volume": ""}, "authors": [{"authorId": - "1763362", "name": "D. Bridges"}]}, {"paperId": "cce5a025c2f953b5c8784a9b8d31d2c5b5d71e43", - "externalIds": {"MAG": "2395895426", "DBLP": "journals/kybernetika/Zak79", - "CorpusId": 15846418}, "url": "https://www.semanticscholar.org/paper/cce5a025c2f953b5c8784a9b8d31d2c5b5d71e43", + "2917104", "name": "St\u00e5l O. Aanderaa"}]}, {"paperId": "190b9673387e7d2e027a20ecef5925c0ece3973b", + "externalIds": {"MAG": "1546460626", "DBLP": "conf/fct/Alberts85", "DOI": + "10.1007/BFb0028785", "CorpusId": 32179081}, "corpusId": 32179081, "publicationVenue": + {"id": "6c136c4c-2f76-4921-ab03-81775cf4530f", "name": "International Symposium + on Fundamentals of Computation Theory", "type": "conference", "alternate_names": + ["Fundam Comput Theory", "Int Symp Fundam Comput Theory", "Fundamentals of + Computation Theory", "FCT"]}, "url": "https://www.semanticscholar.org/paper/190b9673387e7d2e027a20ecef5925c0ece3973b", + "title": "Space complexity of alternating Turing machines", "abstract": null, + "venue": "International Symposium on Fundamentals of Computation Theory", + "year": 1985, "referenceCount": 5, "citationCount": 25, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1985-09-09", + "journal": {"pages": "1-7"}, "authors": [{"authorId": "32041116", "name": + "M. Alberts"}]}, {"paperId": "cce5a025c2f953b5c8784a9b8d31d2c5b5d71e43", "externalIds": + {"MAG": "2395895426", "DBLP": "journals/kybernetika/Zak79", "CorpusId": 15846418}, + "corpusId": 15846418, "publicationVenue": {"id": "28393a23-f5d0-4c70-9e62-3766df8c65c1", + "name": "Kybernetika (Praha)", "type": "journal", "alternate_names": ["Kybern + (praha", "Kybernetika"], "issn": "0023-5954", "alternate_issns": ["1805-949X"], + "url": "https://dml.cz/handle/10338.dmlcz/134236", "alternate_urls": ["http://www.kybernetika.cz/"]}, + "url": "https://www.semanticscholar.org/paper/cce5a025c2f953b5c8784a9b8d31d2c5b5d71e43", "title": "A Turing machine space hierarchy", "abstract": "This paper introduces a new, finer space complexity measure of computations on Turing machines. The complexity of a computation on a Turing machine now takes into account @@ -10900,81 +12423,56 @@ interactions: auxiliary pushdown automata, auxiliary counter automata and also for their versions with an oracle.", "venue": "Kybernetika (Praha)", "year": 1979, "referenceCount": 15, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Kybernetika", "pages": "100-121", + "volume": "15"}, "authors": [{"authorId": "144772962", "name": "S. Z\u00e1k"}]}, + {"paperId": "5c92ba26686f7af4044c643620c2380c08bd7b4d", "externalIds": {"MAG": + "2146240810", "DOI": "10.1007/978-1-4612-0863-1_2", "CorpusId": 61523472}, + "corpusId": 61523472, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c92ba26686f7af4044c643620c2380c08bd7b4d", + "title": "What Is a Turing Machine", "abstract": null, "venue": "", "year": + 1994, "referenceCount": 0, "citationCount": 26, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Kybernetika", "pages": "100-121", "volume": "15"}, "authors": [{"authorId": - "144772962", "name": "S. Z\u00e1k"}]}, {"paperId": "190b9673387e7d2e027a20ecef5925c0ece3973b", - "externalIds": {"MAG": "1546460626", "DBLP": "conf/fct/Alberts85", "DOI": - "10.1007/BFb0028785", "CorpusId": 32179081}, "url": "https://www.semanticscholar.org/paper/190b9673387e7d2e027a20ecef5925c0ece3973b", - "title": "Space complexity of alternating Turing machines", "abstract": null, - "venue": "International Symposium on Fundamentals of Computation Theory", - "year": 1985, "referenceCount": 5, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1985-09-09", "journal": {"pages": "1-7"}, - "authors": [{"authorId": "32041116", "name": "M. Alberts"}]}, {"paperId": - "ecc4192e02a0b7c06c7c8367cf29818ac5e78bbe", "externalIds": {"MAG": "2035349405", - "DOI": "10.1016/0370-2693(82)90169-1", "CorpusId": 121574702}, "url": "https://www.semanticscholar.org/paper/ecc4192e02a0b7c06c7c8367cf29818ac5e78bbe", - "title": "Two state systems in media and \u201cTuring''s paradox\u201d", "abstract": - null, "venue": "", "year": 1982, "referenceCount": 8, "citationCount": 101, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1982-10-28", "journal": {"name": "Physics Letters B", "pages": "464-468", - "volume": "116"}, "authors": [{"authorId": "46854992", "name": "Robert A. - Harris"}, {"authorId": "3403863", "name": "L. Stodolsky"}]}, {"paperId": "ef2aa11a9e5dac4577a90b65978f894fa3f4b193", - "externalIds": {"MAG": "2506342332", "DOI": "10.1515/9781400882618-007", "CorpusId": - 64221000}, "url": "https://www.semanticscholar.org/paper/ef2aa11a9e5dac4577a90b65978f894fa3f4b193", + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "5-17", "volume": ""}, "authors": [{"authorId": "1763362", "name": + "D. Bridges"}]}, {"paperId": "ef2aa11a9e5dac4577a90b65978f894fa3f4b193", "externalIds": + {"MAG": "2506342332", "DOI": "10.1515/9781400882618-007", "CorpusId": 64221000}, + "corpusId": 64221000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ef2aa11a9e5dac4577a90b65978f894fa3f4b193", "title": "A Universal Turing Machine with Two Internal States", "abstract": null, "venue": "", "year": 1956, "referenceCount": 0, "citationCount": 135, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "1956-01-31", "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "144461837", "name": - "C. Shannon"}]}, {"paperId": "e339dd1747c554bcf09fcbec6be74c45efb73110", "externalIds": - {"MAG": "2798840070", "CorpusId": 196118693}, "url": "https://www.semanticscholar.org/paper/e339dd1747c554bcf09fcbec6be74c45efb73110", - "title": "The Universal Turing Machine", "abstract": null, "venue": "", "year": - 1988, "referenceCount": 0, "citationCount": 72, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "6259065", "name": "R. Herken"}]}, {"paperId": "f7b7c8fda250f1fe2035c131437ee8e7ed84efad", - "externalIds": {"DBLP": "journals/eatcs/EberbachW03", "MAG": "86221320", "CorpusId": - 43687544}, "url": "https://www.semanticscholar.org/paper/f7b7c8fda250f1fe2035c131437ee8e7ed84efad", - "title": "Beyond Turing Machines", "abstract": null, "venue": "Bull. EATCS", - "year": 2003, "referenceCount": 24, "citationCount": 41, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Bull. EATCS", "pages": "279-304", "volume": "81"}, - "authors": [{"authorId": "2882381", "name": "E. Eberbach"}, {"authorId": "2103444", - "name": "P. Wegner"}]}, {"paperId": "ea3a1edb45702252891b7816695c2cdea4711cf6", - "externalIds": {"MAG": "2008061806", "DOI": "10.1016/0375-9601(95)00926-4", - "CorpusId": 119400783}, "url": "https://www.semanticscholar.org/paper/ea3a1edb45702252891b7816695c2cdea4711cf6", - "title": "Hexagon and stripe Turing structures in a gas discharge system", - "abstract": null, "venue": "", "year": 1996, "referenceCount": 14, "citationCount": - 54, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1996-02-12", "journal": {"name": "Physics Letters A", - "pages": "184-190", "volume": "211"}, "authors": [{"authorId": "3227869", - "name": "Y. Astrov"}, {"authorId": "91977538", "name": "E. Ammelt"}, {"authorId": - "102751350", "name": "S. Teperick"}, {"authorId": "91811809", "name": "H. - Purwins"}]}, {"paperId": "712f89f50792ef2e172b12ea06be0e35b2ad726c", "externalIds": - {"MAG": "171656090", "CorpusId": 59926209}, "url": "https://www.semanticscholar.org/paper/712f89f50792ef2e172b12ea06be0e35b2ad726c", + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "1956-01-31", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "144461837", "name": "C. Shannon"}]}, {"paperId": "ecc4192e02a0b7c06c7c8367cf29818ac5e78bbe", + "externalIds": {"MAG": "2035349405", "DOI": "10.1016/0370-2693(82)90169-1", + "CorpusId": 121574702}, "corpusId": 121574702, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ecc4192e02a0b7c06c7c8367cf29818ac5e78bbe", + "title": "Two state systems in media and \u201cTuring''s paradox\u201d", "abstract": + null, "venue": "", "year": 1982, "referenceCount": 8, "citationCount": 101, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1982-10-28", "journal": {"name": + "Physics Letters B", "pages": "464-468", "volume": "116"}, "authors": [{"authorId": + "46854992", "name": "Robert A. Harris"}, {"authorId": "3403863", "name": "L. + Stodolsky"}]}, {"paperId": "712f89f50792ef2e172b12ea06be0e35b2ad726c", "externalIds": + {"MAG": "171656090", "CorpusId": 59926209}, "corpusId": 59926209, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/712f89f50792ef2e172b12ea06be0e35b2ad726c", "title": "The Turing Test: AI''s biggest blind alley?", "abstract": null, "venue": "", "year": 1996, "referenceCount": 0, "citationCount": 55, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1996-04-01", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "145708034", "name": "Blay Whitby"}]}, {"paperId": - "fb30f8e5981810ac3fbfe6dabc2e08c42917a26f", "externalIds": {"DBLP": "conf/acm/Karp85", - "MAG": "2026352711", "DOI": "10.1145/320435.320497", "CorpusId": 37766537}, - "url": "https://www.semanticscholar.org/paper/fb30f8e5981810ac3fbfe6dabc2e08c42917a26f", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1996-04-01", "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "145708034", "name": + "Blay Whitby"}]}, {"paperId": "fb30f8e5981810ac3fbfe6dabc2e08c42917a26f", + "externalIds": {"DBLP": "conf/acm/Karp85", "MAG": "2026352711", "DOI": "10.1145/320435.320497", + "CorpusId": 37766537}, "corpusId": 37766537, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fb30f8e5981810ac3fbfe6dabc2e08c42917a26f", "title": "Turing award lecture", "abstract": "For his continuing contributions to the theory of algorithms, including the development of efficient algorithms for network flow and other combinatorial optimization problems, the identification @@ -10984,111 +12482,165 @@ interactions: which has led to the identification of many theoretical and practical problems as being computationally difficult.", "venue": "ACM ''85", "year": 1985, "referenceCount": 0, "citationCount": 66, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1985-10-01", "journal": {"pages": "193"}, "authors": [{"authorId": "47546648", - "name": "R. Karp"}]}, {"paperId": "7b675d944fff8576cc6e700353829a162434a510", - "externalIds": {"MAG": "1674969227", "DOI": "10.1093/obo/9780195396577-0356", - "CorpusId": 57708119}, "url": "https://www.semanticscholar.org/paper/7b675d944fff8576cc6e700353829a162434a510", - "title": "The Turing Test", "abstract": null, "venue": "", "year": 2003, "referenceCount": - 20, "citationCount": 37, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - "2003-04-09", "journal": {"name": "Stanford Encyclopedia of Philosophy", "pages": - "1-26", "volume": ""}, "authors": [{"authorId": "66264751", "name": "G. Oppy"}, - {"authorId": "1745871", "name": "D. Dowe"}]}, {"paperId": "06927faf64761458217c623a7520ed946cb81adb", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1985-10-01", "journal": {"pages": "193"}, "authors": [{"authorId": + "47546648", "name": "R. Karp"}]}, {"paperId": "e339dd1747c554bcf09fcbec6be74c45efb73110", + "externalIds": {"MAG": "2798840070", "CorpusId": 196118693}, "corpusId": 196118693, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e339dd1747c554bcf09fcbec6be74c45efb73110", + "title": "The Universal Turing Machine", "abstract": null, "venue": "", "year": + 1988, "referenceCount": 0, "citationCount": 72, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "6259065", "name": "R. + Herken"}]}, {"paperId": "ea3a1edb45702252891b7816695c2cdea4711cf6", "externalIds": + {"MAG": "2008061806", "DOI": "10.1016/0375-9601(95)00926-4", "CorpusId": 119400783}, + "corpusId": 119400783, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea3a1edb45702252891b7816695c2cdea4711cf6", + "title": "Hexagon and stripe Turing structures in a gas discharge system", + "abstract": null, "venue": "", "year": 1996, "referenceCount": 14, "citationCount": + 54, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1996-02-12", "journal": {"name": + "Physics Letters A", "pages": "184-190", "volume": "211"}, "authors": [{"authorId": + "3227869", "name": "Y. Astrov"}, {"authorId": "91977538", "name": "E. Ammelt"}, + {"authorId": "102751350", "name": "S. Teperick"}, {"authorId": "91811809", + "name": "H. Purwins"}]}, {"paperId": "f7b7c8fda250f1fe2035c131437ee8e7ed84efad", + "externalIds": {"DBLP": "journals/eatcs/EberbachW03", "MAG": "86221320", "CorpusId": + 43687544}, "corpusId": 43687544, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f7b7c8fda250f1fe2035c131437ee8e7ed84efad", + "title": "Beyond Turing Machines", "abstract": null, "venue": "Bull. EATCS", + "year": 2003, "referenceCount": 24, "citationCount": 41, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Bull. EATCS", "pages": "279-304", + "volume": "81"}, "authors": [{"authorId": "2882381", "name": "E. Eberbach"}, + {"authorId": "2103444", "name": "P. Wegner"}]}, {"paperId": "06927faf64761458217c623a7520ed946cb81adb", "externalIds": {"ArXiv": "cond-mat/0211283", "MAG": "1981040333", "DOI": "10.1016/S0167-2789(02)00493-1", - "CorpusId": 8245594}, "url": "https://www.semanticscholar.org/paper/06927faf64761458217c623a7520ed946cb81adb", + "CorpusId": 8245594}, "corpusId": 8245594, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/06927faf64761458217c623a7520ed946cb81adb", "title": "A new dimension to Turing patterns", "abstract": null, "venue": "", "year": 2002, "referenceCount": 28, "citationCount": 36, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2002-08-01", "journal": {"name": - "Physica D: Nonlinear Phenomena", "pages": "35-44", "volume": "168"}, "authors": - [{"authorId": "48183548", "name": "T. Leppanen"}, {"authorId": "2155202", - "name": "M. Karttunen"}, {"authorId": "145670814", "name": "K. Kaski"}, {"authorId": - "37747895", "name": "R. Barrio"}, {"authorId": "2144164942", "name": "Limei - Zhang"}]}, {"paperId": "cc46866356cce89c354cc87d2eb90bd6dc6fccc4", "externalIds": - {"MAG": "1583356492", "CorpusId": 60850942}, "url": "https://www.semanticscholar.org/paper/cc46866356cce89c354cc87d2eb90bd6dc6fccc4", - "title": "The Turing Programming Language: Design and Definition", "abstract": - null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 47, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1987-11-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "144345125", "name": "R. Holt"}, - {"authorId": "2065846923", "name": "P. A. Matthews"}, {"authorId": "114982998", - "name": "J. Rosselet"}, {"authorId": "1683822", "name": "J. Cordy"}]}, {"paperId": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/cond-mat/0211283", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics", + "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2002-08-01", "journal": {"name": "Physica D: Nonlinear + Phenomena", "pages": "35-44", "volume": "168"}, "authors": [{"authorId": "48183548", + "name": "T. Leppanen"}, {"authorId": "2155202", "name": "M. Karttunen"}, {"authorId": + "145670814", "name": "K. Kaski"}, {"authorId": "37747895", "name": "R. Barrio"}, + {"authorId": "2144164942", "name": "Limei Zhang"}]}, {"paperId": "7b675d944fff8576cc6e700353829a162434a510", + "externalIds": {"MAG": "1674969227", "DOI": "10.1093/obo/9780195396577-0356", + "CorpusId": 57708119}, "corpusId": 57708119, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7b675d944fff8576cc6e700353829a162434a510", + "title": "The Turing Test", "abstract": null, "venue": "", "year": 2003, "referenceCount": + 20, "citationCount": 37, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": "2003-04-09", "journal": {"name": "Stanford Encyclopedia + of Philosophy", "pages": "1-26", "volume": ""}, "authors": [{"authorId": "66264751", + "name": "G. Oppy"}, {"authorId": "1745871", "name": "D. Dowe"}]}, {"paperId": "cf6d1ecc9735424a0eb28461294dc5437a53efc7", "externalIds": {"MAG": "2252885734", - "DOI": "10.1007/978-3-7091-6597-3_2", "CorpusId": 119080460}, "url": "https://www.semanticscholar.org/paper/cf6d1ecc9735424a0eb28461294dc5437a53efc7", + "DOI": "10.1007/978-3-7091-6597-3_2", "CorpusId": 119080460}, "corpusId": + 119080460, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cf6d1ecc9735424a0eb28461294dc5437a53efc7", "title": "Turing''s analysis of computability, and major applications of it", "abstract": null, "venue": "", "year": 1988, "referenceCount": 28, "citationCount": - 46, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}], - "publicationTypes": null, "publicationDate": "1988-10-01", "journal": {"name": - "", "pages": "17-54", "volume": ""}, "authors": [{"authorId": "1723068", "name": - "S. Kleene"}]}, {"paperId": "a2a2c0e157827de69234994edff78356f945408f", "externalIds": - {"MAG": "1565312120", "DOI": "10.1007/978-94-011-1156-0_7", "CorpusId": 58955023}, - "url": "https://www.semanticscholar.org/paper/a2a2c0e157827de69234994edff78356f945408f", + 46, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}], "publicationTypes": null, "publicationDate": "1988-10-01", + "journal": {"name": "", "pages": "17-54", "volume": ""}, "authors": [{"authorId": + "1723068", "name": "S. Kleene"}]}, {"paperId": "cc46866356cce89c354cc87d2eb90bd6dc6fccc4", + "externalIds": {"MAG": "1583356492", "CorpusId": 60850942}, "corpusId": 60850942, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc46866356cce89c354cc87d2eb90bd6dc6fccc4", + "title": "The Turing Programming Language: Design and Definition", "abstract": + null, "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 47, + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1987-11-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144345125", + "name": "R. Holt"}, {"authorId": "2065846923", "name": "P. A. Matthews"}, + {"authorId": "114982998", "name": "J. Rosselet"}, {"authorId": "1683822", + "name": "J. Cordy"}]}, {"paperId": "a2a2c0e157827de69234994edff78356f945408f", + "externalIds": {"MAG": "1565312120", "DOI": "10.1007/978-94-011-1156-0_7", + "CorpusId": 58955023}, "corpusId": 58955023, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a2a2c0e157827de69234994edff78356f945408f", "title": "Turing Patterns: From Myth to Reality", "abstract": null, "venue": "", "year": 1995, "referenceCount": 63, "citationCount": 39, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "221-268", "volume": ""}, "authors": [{"authorId": - "2313078", "name": "J. Boissonade"}, {"authorId": "3250971", "name": "E. Dulos"}, - {"authorId": "50010680", "name": "P. Kepper"}]}, {"paperId": "ee9448985622faecc805c8e6070cd132b7bff866", - "externalIds": {"MAG": "2070061690", "DOI": "10.1103/PHYSREVE.48.R4191", "CorpusId": - 38173267, "PubMed": "9961185"}, "url": "https://www.semanticscholar.org/paper/ee9448985622faecc805c8e6070cd132b7bff866", - "title": "Chaotic Turing-Hopf mixed mode.", "abstract": null, "venue": "Physical - review. E, Statistical physics, plasmas, fluids, and related interdisciplinary - topics", "year": 1993, "referenceCount": 0, "citationCount": 49, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1993-12-01", "journal": {"name": "Physical review. E, Statistical physics, - plasmas, fluids, and related interdisciplinary topics", "pages": "\n R4191-R4194\n ", - "volume": "48 6"}, "authors": [{"authorId": "16167615", "name": "De Wit A"}, - {"authorId": "30030198", "name": "Dewel"}, {"authorId": "30192222", "name": - "Borckmans"}]}, {"paperId": "9b6efa7280457ff0e2c2b903282b67bbc9d95339", "externalIds": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "pages": "221-268", + "volume": ""}, "authors": [{"authorId": "2313078", "name": "J. Boissonade"}, + {"authorId": "3250971", "name": "E. Dulos"}, {"authorId": "50010680", "name": + "P. Kepper"}]}, {"paperId": "9b6efa7280457ff0e2c2b903282b67bbc9d95339", "externalIds": {"MAG": "2162248636", "DOI": "10.1016/0378-4371(92)90248-O", "CorpusId": 15193139}, - "url": "https://www.semanticscholar.org/paper/9b6efa7280457ff0e2c2b903282b67bbc9d95339", + "corpusId": 15193139, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9b6efa7280457ff0e2c2b903282b67bbc9d95339", "title": "Turing patterns in a simple gel reactor", "abstract": null, "venue": "", "year": 1992, "referenceCount": 23, "citationCount": 44, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-09-01", - "journal": {"name": "Physica A-statistical Mechanics and Its Applications", - "pages": "17-25", "volume": "188"}, "authors": [{"authorId": "36438867", "name": - "R. D. Vigil"}, {"authorId": "143803550", "name": "Q. Ouyang"}, {"authorId": - "2421446", "name": "H. Swinney"}]}, {"paperId": "df91df46bdb977ce8a77afea8690eddbc8610319", - "externalIds": {"MAG": "47394416", "DOI": "10.1007/978-3-642-78872-7", "CorpusId": - 58298501}, "url": "https://www.semanticscholar.org/paper/df91df46bdb977ce8a77afea8690eddbc8610319", - "title": "New Turing Omnibus", "abstract": null, "venue": "", "year": 1993, - "referenceCount": 0, "citationCount": 38, "influentialCitationCount": 2, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": - "1993-04-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "2078547235", "name": "A. K. Dewdney"}]}, {"paperId": "40a8bf9fd1d9f72d3aceaab956259a9284455eec", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1992-09-01", "journal": {"name": "Physica A-statistical + Mechanics and Its Applications", "pages": "17-25", "volume": "188"}, "authors": + [{"authorId": "36438867", "name": "R. D. Vigil"}, {"authorId": "143803550", + "name": "Q. Ouyang"}, {"authorId": "2421446", "name": "H. Swinney"}]}, {"paperId": + "ee9448985622faecc805c8e6070cd132b7bff866", "externalIds": {"MAG": "2070061690", + "DOI": "10.1103/PHYSREVE.48.R4191", "CorpusId": 38173267, "PubMed": "9961185"}, + "corpusId": 38173267, "publicationVenue": {"id": "f7dc890d-13a2-4e06-9f76-95c9fd4f8def", + "name": "Physical review. E, Statistical physics, plasmas, fluids, and related + interdisciplinary topics", "alternate_names": ["Phys rev Stat phys plasma + fluid relat interdiscip top"], "issn": "1063-651X", "alternate_issns": ["1095-3787"], + "url": "http://ejournals.ebsco.com/direct.asp?JournalID=101127", "alternate_urls": + ["https://journals.aps.org/pre/", "http://pre.aps.org/", "http://prola.aps.org/"]}, + "url": "https://www.semanticscholar.org/paper/ee9448985622faecc805c8e6070cd132b7bff866", + "title": "Chaotic Turing-Hopf mixed mode.", "abstract": null, "venue": "Physical + review. E, Statistical physics, plasmas, fluids, and related interdisciplinary + topics", "year": 1993, "referenceCount": 0, "citationCount": 50, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1993-12-01", "journal": {"name": "Physical review. E, + Statistical physics, plasmas, fluids, and related interdisciplinary topics", + "pages": "\n R4191-R4194\n ", "volume": "48 6"}, "authors": + [{"authorId": "16167615", "name": "De Wit A"}, {"authorId": "30030198", "name": + "Dewel"}, {"authorId": "30192222", "name": "Borckmans"}]}, {"paperId": "40a8bf9fd1d9f72d3aceaab956259a9284455eec", "externalIds": {"MAG": "168020868", "DOI": "10.1090/psapm/019/0235938", "CorpusId": - 59891095}, "url": "https://www.semanticscholar.org/paper/40a8bf9fd1d9f72d3aceaab956259a9284455eec", + 59891095}, "corpusId": 59891095, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/40a8bf9fd1d9f72d3aceaab956259a9284455eec", "title": "Context-free languages and turing machine computations", "abstract": null, "venue": "", "year": 1967, "referenceCount": 0, "citationCount": 65, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "1747181", "name": "J. Hartmanis"}]}, {"paperId": "d2ade568abdbcde73c8a75a5fabb48fc8d878e8b", - "externalIds": {"MAG": "2131652429", "DBLP": "journals/jsyml/SlamanS89", "DOI": - "10.2307/2275022", "CorpusId": 37558368}, "url": "https://www.semanticscholar.org/paper/d2ade568abdbcde73c8a75a5fabb48fc8d878e8b", - "title": "Complementation in the Turing degrees", "abstract": "Abstract Posner - [6] has shown, by a nonuniform proof, that every degree has a complement below + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + null, "authors": [{"authorId": "1747181", "name": "J. Hartmanis"}]}, {"paperId": + "df91df46bdb977ce8a77afea8690eddbc8610319", "externalIds": {"MAG": "47394416", + "DOI": "10.1007/978-3-642-78872-7", "CorpusId": 58298501}, "corpusId": 58298501, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/df91df46bdb977ce8a77afea8690eddbc8610319", + "title": "New Turing Omnibus", "abstract": null, "venue": "", "year": 1993, + "referenceCount": 0, "citationCount": 38, "influentialCitationCount": 2, "isOpenAccess": + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm:978-3-642-78872-7/1?pdf=chapter%20toc", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": "1993-04-01", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "2078547235", "name": "A. K. Dewdney"}]}, {"paperId": + "d2ade568abdbcde73c8a75a5fabb48fc8d878e8b", "externalIds": {"MAG": "2131652429", + "DBLP": "journals/jsyml/SlamanS89", "DOI": "10.2307/2275022", "CorpusId": + 37558368}, "corpusId": 37558368, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/d2ade568abdbcde73c8a75a5fabb48fc8d878e8b", + "title": "Complementation in the Turing degrees", "abstract": "Abstract Posner + [6] has shown, by a nonuniform proof, that every degree has a complement below 0\u2032. We show that a 1-generic complement for each set of degree between 0 and 0\u2032 can be found uniformly. Moreover, the methods just as easily can be used to produce a complement whose jump has the degree of any real @@ -11099,83 +12651,103 @@ interactions: a joins b above a. (This result is independently due to S. B. Cooper.) We end with some open problems.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1989, "referenceCount": 16, "citationCount": 45, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1989-03-01", "journal": - {"name": "Journal of Symbolic Logic", "pages": "160 - 176", "volume": "54"}, - "authors": [{"authorId": "2867082", "name": "T. Slaman"}, {"authorId": "2129072", - "name": "J. Steel"}]}, {"paperId": "6c9ce718e62f68d98e1bfd7ce46caaf421735fea", - "externalIds": {"MAG": "1987331423", "DBLP": "journals/jcss/BookGW70", "DOI": - "10.1016/S0022-0000(70)80031-9", "CorpusId": 46731348}, "url": "https://www.semanticscholar.org/paper/6c9ce718e62f68d98e1bfd7ce46caaf421735fea", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1989-03-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "160 - 176", "volume": "54"}, "authors": [{"authorId": "2867082", + "name": "T. Slaman"}, {"authorId": "2129072", "name": "J. Steel"}]}, {"paperId": + "6c9ce718e62f68d98e1bfd7ce46caaf421735fea", "externalIds": {"MAG": "1987331423", + "DBLP": "journals/jcss/BookGW70", "DOI": "10.1016/S0022-0000(70)80031-9", + "CorpusId": 46731348}, "corpusId": 46731348, "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", + "name": "Journal of computer and system sciences (Print)", "type": "journal", + "alternate_names": ["Journal of Computer and System Sciences", "J comput syst + sci (print", "J Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/6c9ce718e62f68d98e1bfd7ce46caaf421735fea", "title": "Time- and Tape-Bounded Turing Acceptors and AFLs", "abstract": null, "venue": "Journal of computer and system sciences (Print)", "year": 1970, "referenceCount": 14, "citationCount": 69, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1970-12-01", "journal": {"name": "J. Comput. Syst. Sci.", - "pages": "606-621", "volume": "4"}, "authors": [{"authorId": "1699267", "name": - "R. V. Book"}, {"authorId": "2408866", "name": "S. Greibach"}, {"authorId": - "3290722", "name": "B. Wegbreit"}]}, {"paperId": "957a801ee7d845d853d52a430a7d8d531ac15271", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1970-12-01", "journal": {"name": "J. + Comput. Syst. Sci.", "pages": "606-621", "volume": "4"}, "authors": [{"authorId": + "1699267", "name": "R. V. Book"}, {"authorId": "2408866", "name": "S. Greibach"}, + {"authorId": "3290722", "name": "B. Wegbreit"}]}, {"paperId": "957a801ee7d845d853d52a430a7d8d531ac15271", "externalIds": {"MAG": "2091970782", "DOI": "10.1016/0375-9601(92)90574-6", - "CorpusId": 123574993}, "url": "https://www.semanticscholar.org/paper/957a801ee7d845d853d52a430a7d8d531ac15271", + "CorpusId": 123574993}, "corpusId": 123574993, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/957a801ee7d845d853d52a430a7d8d531ac15271", "title": "Reentrant hexagonal Turing structures", "abstract": null, "venue": "", "year": 1992, "referenceCount": 13, "citationCount": 41, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-08-24", - "journal": {"name": "Physics Letters A", "pages": "194-198", "volume": "168"}, - "authors": [{"authorId": "2128988958", "name": "J. Verdasca"}, {"authorId": - "7418281", "name": "A. Wit"}, {"authorId": "49808656", "name": "G. Dewel"}, - {"authorId": "92147854", "name": "P. Borckmans"}]}, {"paperId": "05df71637e23a185045c8b4716cac126d9fa017b", - "externalIds": {"MAG": "1842133761", "DOI": "10.1007/978-1-4613-8928-6_34", - "CorpusId": 120128991}, "url": "https://www.semanticscholar.org/paper/05df71637e23a185045c8b4716cac126d9fa017b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1992-08-24", "journal": {"name": "Physics Letters A", "pages": "194-198", + "volume": "168"}, "authors": [{"authorId": "2128988958", "name": "J. Verdasca"}, + {"authorId": "7418281", "name": "A. Wit"}, {"authorId": "49808656", "name": + "G. Dewel"}, {"authorId": "92147854", "name": "P. Borckmans"}]}, {"paperId": + "05df71637e23a185045c8b4716cac126d9fa017b", "externalIds": {"MAG": "1842133761", + "DOI": "10.1007/978-1-4613-8928-6_34", "CorpusId": 120128991}, "corpusId": + 120128991, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05df71637e23a185045c8b4716cac126d9fa017b", "title": "Turing-machines and the Entscheidungsproblem", "abstract": null, "venue": "", "year": 1962, "referenceCount": 5, "citationCount": 73, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1962-06-01", - "journal": {"name": "Mathematische Annalen", "pages": "201-213", "volume": - "148"}, "authors": [{"authorId": "49445950", "name": "J. R. B\u00fcchi"}]}, + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1962-06-01", "journal": {"name": "Mathematische Annalen", "pages": "201-213", + "volume": "148"}, "authors": [{"authorId": "49445950", "name": "J. R. B\u00fcchi"}]}, {"paperId": "46b94ab147903e45a05d86cd1f529ed6cc3ec964", "externalIds": {"MAG": "1504457781", "DOI": "10.1016/b978-044450423-4/50020-6", "CorpusId": 60975077}, - "url": "https://www.semanticscholar.org/paper/46b94ab147903e45a05d86cd1f529ed6cc3ec964", + "corpusId": 60975077, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/46b94ab147903e45a05d86cd1f529ed6cc3ec964", "title": "Alan Mathison Turing", "abstract": null, "venue": "", "year": 2000, "referenceCount": 58, "citationCount": 28, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "227-232", "volume": ""}, "authors": [{"authorId": - "69938888", "name": "Coromoto Le\u00f3n Hern\u00e1ndez"}, {"authorId": "69027452", - "name": "C. Le\u00f3n"}]}, {"paperId": "f5b7cda43199ae6b8462b8274f11ed6ad1661c5c", - "externalIds": {"DBLP": "journals/tcs/CohenG78", "MAG": "1969470083", "DOI": - "10.1016/0304-3975(78)90002-6", "CorpusId": 44399700}, "url": "https://www.semanticscholar.org/paper/f5b7cda43199ae6b8462b8274f11ed6ad1661c5c", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "pages": "227-232", + "volume": ""}, "authors": [{"authorId": "69938888", "name": "Coromoto Le\u00f3n + Hern\u00e1ndez"}, {"authorId": "69027452", "name": "C. Le\u00f3n"}]}, {"paperId": + "f5b7cda43199ae6b8462b8274f11ed6ad1661c5c", "externalIds": {"DBLP": "journals/tcs/CohenG78", + "MAG": "1969470083", "DOI": "10.1016/0304-3975(78)90002-6", "CorpusId": 44399700}, + "corpusId": 44399700, "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", + "name": "Theoretical Computer Science", "type": "journal", "alternate_names": + ["Theor Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/f5b7cda43199ae6b8462b8274f11ed6ad1661c5c", "title": "omega-Computations on Turing Machines", "abstract": null, "venue": "Theoretical Computer Science", "year": 1978, "referenceCount": 11, "citationCount": - 41, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "Theor. Comput. - Sci.", "pages": "1-23", "volume": "6"}, "authors": [{"authorId": "2114392068", - "name": "Rina S. Cohen"}, {"authorId": "2788127", "name": "A. Y. Gold"}]}, - {"paperId": "adf030a98090cedbd6cbb829e5f40bf59a7e55d1", "externalIds": {"MAG": - "1980572240", "DBLP": "journals/jcss/Paterson72", "DOI": "10.1016/S0022-0000(72)80017-5", - "CorpusId": 19801484}, "url": "https://www.semanticscholar.org/paper/adf030a98090cedbd6cbb829e5f40bf59a7e55d1", + 41, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Theor. Comput. Sci.", "pages": "1-23", "volume": "6"}, "authors": + [{"authorId": "2114392068", "name": "Rina S. Cohen"}, {"authorId": "2788127", + "name": "A. Y. Gold"}]}, {"paperId": "adf030a98090cedbd6cbb829e5f40bf59a7e55d1", + "externalIds": {"MAG": "1980572240", "DBLP": "journals/jcss/Paterson72", "DOI": + "10.1016/S0022-0000(72)80017-5", "CorpusId": 19801484}, "corpusId": 19801484, + "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", "name": + "Journal of computer and system sciences (Print)", "type": "journal", "alternate_names": + ["Journal of Computer and System Sciences", "J comput syst sci (print", "J + Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/adf030a98090cedbd6cbb829e5f40bf59a7e55d1", "title": "Tape Bounds for Time-Bounded Turing Machines", "abstract": null, "venue": "Journal of computer and system sciences (Print)", "year": 1972, "referenceCount": 3, "citationCount": 47, "influentialCitationCount": 4, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1972-04-01", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "116-124", - "volume": "6"}, "authors": [{"authorId": "143607434", "name": "M. Paterson"}]}, - {"paperId": "e91764d4fd73730cf72dcebdaefa3c90c8f9626f", "externalIds": {"DBLP": - "journals/siamcomp/Priese79", "MAG": "2052389354", "DOI": "10.1137/0208041", - "CorpusId": 46285718}, "url": "https://www.semanticscholar.org/paper/e91764d4fd73730cf72dcebdaefa3c90c8f9626f", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1972-04-01", "journal": {"name": "J. Comput. Syst. Sci.", + "pages": "116-124", "volume": "6"}, "authors": [{"authorId": "143607434", + "name": "M. Paterson"}]}, {"paperId": "e91764d4fd73730cf72dcebdaefa3c90c8f9626f", + "externalIds": {"DBLP": "journals/siamcomp/Priese79", "MAG": "2052389354", + "DOI": "10.1137/0208041", "CorpusId": 46285718}, "corpusId": 46285718, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e91764d4fd73730cf72dcebdaefa3c90c8f9626f", "title": "Towards a Precise Characterization of the Complexity of Universal and Nonuniversal Turing Machines", "abstract": "A computation universal Turing machine, U, with 2 states, 4 letters, 1 head and 1 two-dimensional tape is @@ -11188,89 +12760,107 @@ interactions: tape Turing machine, giving a first sharp boundary of the necessary complexity of universal Turing machines.", "venue": "SIAM J. Comput.", "year": 1979, "referenceCount": 6, "citationCount": 26, "influentialCitationCount": 2, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1979-11-01", "journal": {"name": "SIAM J. Comput.", "pages": "508-523", "volume": - "8"}, "authors": [{"authorId": "1697081", "name": "L. Priese"}]}, {"paperId": - "c2754b055e2f19fa9aa897c2476f06ff96313d4e", "externalIds": {"MAG": "2043646456", - "DOI": "10.1090/S0002-9939-1969-0249221-4", "CorpusId": 57968797}, "url": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1979-11-01", "journal": {"name": "SIAM J. Comput.", "pages": + "508-523", "volume": "8"}, "authors": [{"authorId": "1697081", "name": "L. + Priese"}]}, {"paperId": "802805d39333abd2034d11b04278a58a315b92cc", "externalIds": + {"MAG": "2170050103", "DOI": "10.1007/BF02134290", "CorpusId": 124404873}, + "corpusId": 124404873, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/802805d39333abd2034d11b04278a58a315b92cc", + "title": "Intension in terms of Turing machines", "abstract": null, "venue": + "", "year": 1969, "referenceCount": 1, "citationCount": 43, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1969-12-01", "journal": + {"name": "Studia Logica", "pages": "7-21", "volume": "24"}, "authors": [{"authorId": + "1841774", "name": "P. Tich\u00fd"}]}, {"paperId": "c2754b055e2f19fa9aa897c2476f06ff96313d4e", + "externalIds": {"MAG": "2043646456", "DOI": "10.1090/S0002-9939-1969-0249221-4", + "CorpusId": 57968797}, "corpusId": 57968797, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c2754b055e2f19fa9aa897c2476f06ff96313d4e", "title": "Probabilistic Turing machines and computability", "abstract": null, "venue": "", "year": 1969, "referenceCount": 3, "citationCount": 46, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/proc/1969-022-03/S0002-9939-1969-0249221-4/S0002-9939-1969-0249221-4.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1969-03-01", "journal": {"name": "", "pages": "704-710", "volume": "22"}, "authors": [{"authorId": "143844809", "name": "Eugene S. Santos"}]}, {"paperId": - "802805d39333abd2034d11b04278a58a315b92cc", "externalIds": {"MAG": "2170050103", - "DOI": "10.1007/BF02134290", "CorpusId": 124404873}, "url": "https://www.semanticscholar.org/paper/802805d39333abd2034d11b04278a58a315b92cc", - "title": "Intension in terms of Turing machines", "abstract": null, "venue": - "", "year": 1969, "referenceCount": 1, "citationCount": 42, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1969-12-01", "journal": {"name": "Studia Logica", - "pages": "7-21", "volume": "24"}, "authors": [{"authorId": "1841774", "name": - "P. Tich\u00fd"}]}, {"paperId": "cfaf3616f9a253abfcd754a4b4fb95279dece24d", - "externalIds": {"MAG": "932081378", "DOI": "10.1515/9781400882618-008", "CorpusId": - 117988492}, "url": "https://www.semanticscholar.org/paper/cfaf3616f9a253abfcd754a4b4fb95279dece24d", + "cfaf3616f9a253abfcd754a4b4fb95279dece24d", "externalIds": {"MAG": "932081378", + "DOI": "10.1515/9781400882618-008", "CorpusId": 117988492}, "corpusId": 117988492, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cfaf3616f9a253abfcd754a4b4fb95279dece24d", "title": "A Note on Universal Turing Machines", "abstract": null, "venue": "", "year": 1970, "referenceCount": 0, "citationCount": 44, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145564203", "name": "Miles Davis"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "cc449a5bc819faed948f296fde5e3b81cd3ca064", "externalIds": {"MAG": "2070849434", "DOI": "10.1007/BF02460606", "CorpusId": - 40826634, "PubMed": "743570"}, "url": "https://www.semanticscholar.org/paper/cc449a5bc819faed948f296fde5e3b81cd3ca064", + 40826634, "PubMed": "743570"}, "corpusId": 40826634, "publicationVenue": {"id": + "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/cc449a5bc819faed948f296fde5e3b81cd3ca064", "title": "Turing''s theory in morphogenesis", "abstract": null, "venue": "Bulletin of Mathematical Biology", "year": 1978, "referenceCount": 20, "citationCount": - 26, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 26, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "Bulletin of Mathematical Biology", "pages": "771-789", "volume": "40"}, "authors": [{"authorId": "1942291", "name": "T. Erneux"}, {"authorId": "47521463", "name": "J. Hiernaux"}, {"authorId": "46872722", "name": "G. Nicolis"}]}, {"paperId": "a13af5f29bc745bd08a8f87e05545c20954bb0c2", "externalIds": {"MAG": "1979172959", "DOI": "10.1111/J.1469-8137.1953.TB05203.X", - "CorpusId": 84106352}, "url": "https://www.semanticscholar.org/paper/a13af5f29bc745bd08a8f87e05545c20954bb0c2", + "CorpusId": 84106352}, "corpusId": 84106352, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a13af5f29bc745bd08a8f87e05545c20954bb0c2", "title": "A COMMENTARY ON TURING''S DIFFUSION\u2010REACTION THEORY OF MORPHOGENESIS", "abstract": null, "venue": "", "year": 1953, "referenceCount": 4, "citationCount": - 47, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}], - "publicationTypes": null, "publicationDate": "1953-02-01", "journal": {"name": - "New Phytologist", "pages": "40-47", "volume": "52"}, "authors": [{"authorId": - "40705436", "name": "C. Wardlaw"}]}, {"paperId": "7fc115aca61c76be672a87f0cfd22e971c630503", - "externalIds": {"MAG": "645671899", "CorpusId": 141561542}, "url": "https://www.semanticscholar.org/paper/7fc115aca61c76be672a87f0cfd22e971c630503", + 47, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://nph.onlinelibrary.wiley.com/doi/pdfdirect/10.1111/j.1469-8137.1953.tb05203.x", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}], "publicationTypes": null, "publicationDate": + "1953-02-01", "journal": {"name": "New Phytologist", "pages": "40-47", "volume": + "52"}, "authors": [{"authorId": "40705436", "name": "C. Wardlaw"}]}, {"paperId": + "83bfb38106820975a4a55a32c382457118f916be", "externalIds": {"MAG": "2319994324", + "DOI": "10.1007/978-3-7091-6597-3_1", "CorpusId": 58279946}, "corpusId": 58279946, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/83bfb38106820975a4a55a32c382457118f916be", + "title": "Alan Turing and the Turing machine", "abstract": null, "venue": + "", "year": 1988, "referenceCount": 8, "citationCount": 25, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1988-10-01", "journal": {"name": "", "pages": "3-14", + "volume": ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, + {"paperId": "7fc115aca61c76be672a87f0cfd22e971c630503", "externalIds": {"MAG": + "645671899", "CorpusId": 141561542}, "corpusId": 141561542, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7fc115aca61c76be672a87f0cfd22e971c630503", "title": "The Turing Option", "abstract": null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144825410", - "name": "H. Harrison"}, {"authorId": "1847175", "name": "M. Minsky"}]}, {"paperId": - "7e31327e2e25c1a46ccaa1691a110d57772048cc", "externalIds": {"MAG": "2034880908", - "DBLP": "journals/cj/CarpenterD77", "DOI": "10.1093/comjnl/20.3.269", "CorpusId": - 30814429}, "url": "https://www.semanticscholar.org/paper/7e31327e2e25c1a46ccaa1691a110d57772048cc", + false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "144825410", "name": "H. Harrison"}, {"authorId": "1847175", + "name": "M. Minsky"}]}, {"paperId": "7e31327e2e25c1a46ccaa1691a110d57772048cc", + "externalIds": {"MAG": "2034880908", "DBLP": "journals/cj/CarpenterD77", "DOI": + "10.1093/comjnl/20.3.269", "CorpusId": 30814429}, "corpusId": 30814429, "publicationVenue": + {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", "name": "Computer/law journal", + "type": "journal", "alternate_names": ["Computer journal", "The Computer Journal", + "Comput j", "Comput J"], "issn": "0164-8756", "alternate_issns": ["0010-4620"], + "url": "https://repository.jmls.edu/jitpl/all_issues.html", "alternate_urls": + ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/7e31327e2e25c1a46ccaa1691a110d57772048cc", "title": "The Other Turing Machine", "abstract": null, "venue": "Computer/law journal", "year": 1977, "referenceCount": 0, "citationCount": 34, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/comjnl/article-pdf/20/3/269/2256995/200269.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "Comput. J.", "pages": "269-279", "volume": "20"}, "authors": [{"authorId": "1690789", "name": "B. Carpenter"}, {"authorId": "1893096", "name": "R. W. Doran"}]}, - {"paperId": "83bfb38106820975a4a55a32c382457118f916be", "externalIds": {"MAG": - "2319994324", "DOI": "10.1007/978-3-7091-6597-3_1", "CorpusId": 58279946}, - "url": "https://www.semanticscholar.org/paper/83bfb38106820975a4a55a32c382457118f916be", - "title": "Alan Turing and the Turing machine", "abstract": null, "venue": - "", "year": 1988, "referenceCount": 8, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1988-10-01", - "journal": {"name": "", "pages": "3-14", "volume": ""}, "authors": [{"authorId": - "144443425", "name": "A. Hodges"}]}, {"paperId": "bbd0e204f48a45735e1065c8b90b298077b73192", - "externalIds": {"ArXiv": "1605.06065", "DBLP": "journals/corr/SantoroBBWL16", - "MAG": "2399033357", "CorpusId": 16660179}, "url": "https://www.semanticscholar.org/paper/bbd0e204f48a45735e1065c8b90b298077b73192", + {"paperId": "bbd0e204f48a45735e1065c8b90b298077b73192", "externalIds": {"ArXiv": + "1605.06065", "DBLP": "journals/corr/SantoroBBWL16", "MAG": "2399033357", + "CorpusId": 16660179}, "corpusId": 16660179, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bbd0e204f48a45735e1065c8b90b298077b73192", "title": "One-shot Learning with Memory-Augmented Neural Networks", "abstract": "Despite recent breakthroughs in the applications of deep neural networks, one setting that presents a persistent challenge is that of \u201cone-shot @@ -11286,25 +12876,27 @@ interactions: samples. We also introduce a new method for accessing an external memory that focuses on memory content, unlike previous methods that additionally use memory locationbased focusing mechanisms.", "venue": "ArXiv", "year": 2016, "referenceCount": - 21, "citationCount": 484, "influentialCitationCount": 30, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-05-19", "journal": {"name": "ArXiv", "volume": "abs/1605.06065"}, "authors": - [{"authorId": "35030998", "name": "Adam Santoro"}, {"authorId": "2258504", - "name": "Sergey Bartunov"}, {"authorId": "46378362", "name": "M. Botvinick"}, - {"authorId": "1688276", "name": "Daan Wierstra"}, {"authorId": "2542999", - "name": "T. Lillicrap"}]}, {"paperId": "475f840912351f61fcafce6163c45cd60a9cfcbe", - "externalIds": {"MAG": "166232225", "CorpusId": 59918610}, "url": "https://www.semanticscholar.org/paper/475f840912351f61fcafce6163c45cd60a9cfcbe", + 21, "citationCount": 488, "influentialCitationCount": 30, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2016-05-19", "journal": {"name": "ArXiv", "volume": "abs/1605.06065"}, + "authors": [{"authorId": "35030998", "name": "Adam Santoro"}, {"authorId": + "2258504", "name": "Sergey Bartunov"}, {"authorId": "46378362", "name": "M. + Botvinick"}, {"authorId": "1688276", "name": "Daan Wierstra"}, {"authorId": + "2542999", "name": "T. Lillicrap"}]}, {"paperId": "475f840912351f61fcafce6163c45cd60a9cfcbe", + "externalIds": {"MAG": "166232225", "CorpusId": 59918610}, "corpusId": 59918610, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/475f840912351f61fcafce6163c45cd60a9cfcbe", "title": "Turing''s World", "abstract": null, "venue": "", "year": 1990, "referenceCount": 0, "citationCount": 21, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "152219342", - "name": "J. Barwise"}, {"authorId": "3141819", "name": "J. Etchemendy"}]}, - {"paperId": "62f0b0e6852978d1aee47008fd621a34f1d7725a", "externalIds": {"DBLP": - "conf/acm/Moore52", "MAG": "2094800151", "DOI": "10.1145/800259.808993", "CorpusId": - 43586647}, "url": "https://www.semanticscholar.org/paper/62f0b0e6852978d1aee47008fd621a34f1d7725a", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "152219342", "name": "J. Barwise"}, {"authorId": "3141819", + "name": "J. Etchemendy"}]}, {"paperId": "62f0b0e6852978d1aee47008fd621a34f1d7725a", + "externalIds": {"DBLP": "conf/acm/Moore52", "MAG": "2094800151", "DOI": "10.1145/800259.808993", + "CorpusId": 43586647}, "corpusId": 43586647, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/62f0b0e6852978d1aee47008fd621a34f1d7725a", "title": "A simplified universal Turing machine", "abstract": "In 1936 Turing (1) defined a class of logical machines (which he called a - machines, but which are now generally called Turing machines) which he used as an aid in @@ -11314,13 +12906,14 @@ interactions: for carrying out can be supplied, it is possible to design a Turing machine which can perform this operation.", "venue": "ACM ''52", "year": 1952, "referenceCount": 1, "citationCount": 26, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1952-09-08", "journal": - {"pages": "50-54"}, "authors": [{"authorId": "34166566", "name": "E. F. Moore"}]}, - {"paperId": "19897daea7d6eba13bd6fe8a59686cc064502968", "externalIds": {"DBLP": - "journals/jacm/Curtis65", "MAG": "2107437354", "DOI": "10.1145/321250.321251", - "CorpusId": 5423504}, "url": "https://www.semanticscholar.org/paper/19897daea7d6eba13bd6fe8a59686cc064502968", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1952-09-08", "journal": {"pages": "50-54"}, "authors": [{"authorId": "34166566", + "name": "E. F. Moore"}]}, {"paperId": "19897daea7d6eba13bd6fe8a59686cc064502968", + "externalIds": {"DBLP": "journals/jacm/Curtis65", "MAG": "2107437354", "DOI": + "10.1145/321250.321251", "CorpusId": 5423504}, "corpusId": 5423504, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/19897daea7d6eba13bd6fe8a59686cc064502968", "title": "A Turing Machine Simulator", "abstract": "Abstracl. A descript ion of a Tur ing machine s imulator , programmed on the IBM 1620, is given. As in the papers by Wang and Lee, Turing machines are represented as programs @@ -11329,14 +12922,20 @@ interactions: Tur ing Machine Program and some exper imental evidenee t ha t the s ta te-symbol product is not the only inca.sure of complexi ty of a Tur ing machine.", "venue": "JACM", "year": 1965, "referenceCount": 7, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "J. ACM", "pages": "1-13", "volume": - "12"}, "authors": [{"authorId": "114597244", "name": "M. W. Curtis"}]}, {"paperId": - "7eb5d2f86438d1e9c72bff87894209f1ce84717a", "externalIds": {"DBLP": "journals/annals/Neumann93", - "MAG": "2117489143", "DOI": "10.1109/85.238389", "CorpusId": 5572149}, "url": - "https://www.semanticscholar.org/paper/7eb5d2f86438d1e9c72bff87894209f1ce84717a", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "J. ACM", "pages": "1-13", "volume": "12"}, "authors": [{"authorId": + "114597244", "name": "M. W. Curtis"}]}, {"paperId": "7eb5d2f86438d1e9c72bff87894209f1ce84717a", + "externalIds": {"DBLP": "journals/annals/Neumann93", "MAG": "2117489143", + "DOI": "10.1109/85.238389", "CorpusId": 5572149}, "corpusId": 5572149, "publicationVenue": + {"id": "22ec5dc2-bb5e-4fea-a7dd-61676b6e7f78", "name": "IEEE Annals of the + History of Computing", "type": "journal", "alternate_names": ["IEEE Ann Hist + Comput"], "issn": "1058-6180", "url": "http://muse.jhu.edu/journals/ahc", + "alternate_urls": ["http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", + "https://ieeexplore.ieee.org/servlet/opac?punumber=85", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85", + "http://www.computer.org/annals/"]}, "url": "https://www.semanticscholar.org/paper/7eb5d2f86438d1e9c72bff87894209f1ce84717a", "title": "First draft of a report on the EDVAC", "abstract": "The first draft of a report on the EDVAC written by John von Neumann is presented. This first draft contains a wealth of information, and it had a pervasive influence when @@ -11344,16 +12943,16 @@ interactions: for the Pilot automatic computing engine (ACE) as the definitive source for understanding the nature and design of a general-purpose digital computer.<>", "venue": "IEEE Annals of the History of Computing", "year": 1993, "referenceCount": - 6, "citationCount": 1144, "influentialCitationCount": 66, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + 6, "citationCount": 1147, "influentialCitationCount": 66, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1993-10-01", "journal": {"name": "IEEE Annals of the History of Computing", "pages": "27-75", "volume": "15"}, "authors": [{"authorId": "41224665", "name": "J. Neumann"}]}, {"paperId": "5f2b37697f66a172d8708c8c6c75b870040f5c02", "externalIds": {"MAG": "2048924606", "DOI": "10.1090/S0002-9939-1957-0095781-8", "CorpusId": - 62634172}, "url": "https://www.semanticscholar.org/paper/5f2b37697f66a172d8708c8c6c75b870040f5c02", + 62634172}, "corpusId": 62634172, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5f2b37697f66a172d8708c8c6c75b870040f5c02", "title": "The definition of universal Turing machine", "abstract": "In [l], the author has proposed a definition of the notion, \"universal Turing machine.\" The definition in [l] is open to the objection that a Turing machine may qualify @@ -11373,15 +12972,24 @@ interactions: functions g(a) (defined on the set of instantaneous descriptions, but with numerical values) and p(z, x) (defined on the set of pairs of non-negative integers, but with instantaneous descriptions as values) such that3", "venue": - "", "year": 1957, "referenceCount": 1, "citationCount": 24, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "", "year": 1957, "referenceCount": 2, "citationCount": 24, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/proc/1957-008-06/S0002-9939-1957-0095781-8/S0002-9939-1957-0095781-8.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1957-06-01", "journal": {"name": "", "pages": "1125-1126", "volume": "8"}, "authors": [{"authorId": "2110853158", "name": "Martin Davis"}]}, {"paperId": "5190dab1e43e5e42833beaf12cc155ff16f23808", "externalIds": {"DBLP": "conf/ccs/CheckowayDDSSW10", "MAG": "1996931407", "DOI": "10.1145/1866307.1866370", "CorpusId": 207182734}, - "url": "https://www.semanticscholar.org/paper/5190dab1e43e5e42833beaf12cc155ff16f23808", + "corpusId": 207182734, "publicationVenue": {"id": "73f7fe95-b68b-468f-b7ba-3013ca879e50", + "name": "Conference on Computer and Communications Security", "type": "conference", + "alternate_names": ["Int Workshop Cogn Cell Syst", "CCS", "Comput Commun Secur", + "CcS", "International Symposium on Community-centric Systems", "International + Workshop on Cognitive Cellular Systems", "Conf Comput Commun Secur", "Comb + Comput Sci", "Int Symp Community-centric Syst", "Combinatorics and Computer + Science", "Circuits, Signals, and Systems", "Computer and Communications Security", + "Circuit Signal Syst"], "url": "https://dl.acm.org/conference/ccs"}, "url": + "https://www.semanticscholar.org/paper/5190dab1e43e5e42833beaf12cc155ff16f23808", "title": "Return-oriented programming without returns", "abstract": "We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using return instructions. Our attacks instead @@ -11395,17 +13003,25 @@ interactions: maintained for the return-address stack; and those that modify compilers to produce code that avoids the return instruction.", "venue": "Conference on Computer and Communications Security", "year": 2010, "referenceCount": 48, - "citationCount": 564, "influentialCitationCount": 60, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-10-04", "journal": {"pages": "559-572"}, "authors": [{"authorId": "2642533", - "name": "Stephen Checkoway"}, {"authorId": "2597368", "name": "Lucas Davi"}, - {"authorId": "1731382", "name": "A. Dmitrienko"}, {"authorId": "145897166", - "name": "A. Sadeghi"}, {"authorId": "1786752", "name": "H. Shacham"}, {"authorId": - "3192956", "name": "M. Winandy"}]}, {"paperId": "0f1c31aa40a7d0b3ba68a6d1ef2bfc92e7f8ae0d", + "citationCount": 567, "influentialCitationCount": 61, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.cse.ucsd.edu/%7Ehovav/dist/noret-ccs.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-10-04", "journal": {"pages": "559-572"}, "authors": + [{"authorId": "2642533", "name": "Stephen Checkoway"}, {"authorId": "2597368", + "name": "Lucas Davi"}, {"authorId": "1731382", "name": "A. Dmitrienko"}, {"authorId": + "145897166", "name": "A. Sadeghi"}, {"authorId": "1786752", "name": "H. Shacham"}, + {"authorId": "3192956", "name": "M. Winandy"}]}, {"paperId": "0f1c31aa40a7d0b3ba68a6d1ef2bfc92e7f8ae0d", "externalIds": {"MAG": "2916559661", "DOI": "10.1080/13645706.2019.1575882", - "CorpusId": 73491821, "PubMed": "30810430"}, "url": "https://www.semanticscholar.org/paper/0f1c31aa40a7d0b3ba68a6d1ef2bfc92e7f8ae0d", + "CorpusId": 73491821, "PubMed": "30810430"}, "corpusId": 73491821, "publicationVenue": + {"id": "03809e9a-cd5e-4e48-bfcf-d44a19fe9c36", "name": "MITAT. Minimally invasive + therapy & allied technologies", "type": "journal", "alternate_names": ["MITAT + Minim invasive ther allied technol", "Minim Invasive Ther Allied Technol", + "Minimally Invasive Therapy & Allied Technologies"], "issn": "1364-5706", + "url": "http://informahealthcare.com/loi/mit", "alternate_urls": ["http://www.tandfonline.com/openurl?genre=journal&stitle=imit20", + "http://www.tandfonline.com/loi/imit20?amp;repitition=0&open=18#vol_18"]}, + "url": "https://www.semanticscholar.org/paper/0f1c31aa40a7d0b3ba68a6d1ef2bfc92e7f8ae0d", "title": "Introduction to artificial intelligence in medicine", "abstract": "Abstract The term Artificial Intelligence (AI) was coined by John McCarthy in 1956 during a conference held on this subject. However, the possibility @@ -11424,17 +13040,20 @@ interactions: and augmenting physicians\u2019 capabilities. Herein we describe the current status of AI in medicine, the way it is used in the different disciplines and future trends.", "venue": "MITAT. Minimally invasive therapy & allied - technologies", "year": 2019, "referenceCount": 48, "citationCount": 162, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": - "2019-02-27", "journal": {"name": "Minimally Invasive Therapy & Allied Technologies", - "pages": "73 - 81", "volume": "28"}, "authors": [{"authorId": "4272386", "name": - "Y. Mintz"}, {"authorId": "33386144", "name": "Ronit Brodie"}]}, {"paperId": - "60b0826411421cf5226790efb0afb5b4674795d8", "externalIds": {"ArXiv": "1507.00996", - "MAG": "2950113781", "DBLP": "conf/aistats/WoodMM14", "DOI": "10.14288/1.0044249", - "CorpusId": 768906}, "url": "https://www.semanticscholar.org/paper/60b0826411421cf5226790efb0afb5b4674795d8", + technologies", "year": 2019, "referenceCount": 48, "citationCount": 165, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + "publicationDate": "2019-02-27", "journal": {"name": "Minimally Invasive Therapy + & Allied Technologies", "pages": "73 - 81", "volume": "28"}, "authors": [{"authorId": + "4272386", "name": "Y. Mintz"}, {"authorId": "33386144", "name": "Ronit Brodie"}]}, + {"paperId": "60b0826411421cf5226790efb0afb5b4674795d8", "externalIds": {"ArXiv": + "1507.00996", "MAG": "2950113781", "DBLP": "conf/aistats/WoodMM14", "DOI": + "10.14288/1.0044249", "CorpusId": 768906}, "corpusId": 768906, "publicationVenue": + {"id": "2d136b11-c2b5-484b-b008-7f4a852fd61e", "name": "International Conference + on Artificial Intelligence and Statistics", "type": "conference", "alternate_names": + ["AISTATS", "Int Conf Artif Intell Stat"]}, "url": "https://www.semanticscholar.org/paper/60b0826411421cf5226790efb0afb5b4674795d8", "title": "A New Approach to Probabilistic Programming Inference", "abstract": "We introduce and demonstrate a new approach to inference in expressive probabilistic programming languages based on particle Markov chain Monte Carlo. Our approach @@ -11445,16 +13064,20 @@ interactions: show that this approach can be more ecient than previously introduced single-site Metropolis-Hastings methods.", "venue": "International Conference on Artificial Intelligence and Statistics", "year": 2014, "referenceCount": 12, "citationCount": - 307, "influentialCitationCount": 38, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-03-03", "journal": {"name": "ArXiv", - "volume": "abs/1507.00996"}, "authors": [{"authorId": "2347189", "name": "Frank - D. Wood"}, {"authorId": "3237420", "name": "Jan-Willem van de Meent"}, {"authorId": - "1735083", "name": "Vikash K. Mansinghka"}]}, {"paperId": "2062d25a470e69e2363d35c8ca9cb71600e655e3", + 311, "influentialCitationCount": 40, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-03-03", "journal": {"name": "ArXiv", "volume": "abs/1507.00996"}, "authors": + [{"authorId": "2347189", "name": "Frank D. Wood"}, {"authorId": "3237420", + "name": "Jan-Willem van de Meent"}, {"authorId": "1735083", "name": "Vikash + K. Mansinghka"}]}, {"paperId": "2062d25a470e69e2363d35c8ca9cb71600e655e3", "externalIds": {"DBLP": "conf/sp/HuSACSL16", "MAG": "2512784977", "DOI": "10.1109/SP.2016.62", - "CorpusId": 978061}, "url": "https://www.semanticscholar.org/paper/2062d25a470e69e2363d35c8ca9cb71600e655e3", + "CorpusId": 978061}, "corpusId": 978061, "publicationVenue": {"id": "29b9c461-963e-4d11-b2ab-92c182243942", + "name": "IEEE Symposium on Security and Privacy", "type": "conference", "alternate_names": + ["S&P", "IEEE Symp Secur Priv"], "url": "http://www.ieee-security.org/"}, + "url": "https://www.semanticscholar.org/paper/2062d25a470e69e2363d35c8ca9cb71600e655e3", "title": "Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks", "abstract": "As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via @@ -11474,19 +13097,25 @@ interactions: to alter the memory permissions. All the attacks work in the presence of ASLR and DEP, demonstrating how the expressiveness offered by DOP significantly empowers the attacker.", "venue": "IEEE Symposium on Security and Privacy", - "year": 2016, "referenceCount": 66, "citationCount": 280, "influentialCitationCount": - 41, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-05-22", "journal": {"name": "2016 IEEE Symposium - on Security and Privacy (SP)", "pages": "969-986"}, "authors": [{"authorId": - "145531222", "name": "Hong Hu"}, {"authorId": "32939696", "name": "Shweta - Shinde"}, {"authorId": "13551726", "name": "Sendroiu Adrian"}, {"authorId": - "2775791", "name": "Zheng Leong Chua"}, {"authorId": "1750032", "name": "P. - Saxena"}, {"authorId": "2728022", "name": "Zhenkai Liang"}]}, {"paperId": - "06354570d5f6be803d4a79bf59ecbb097bca8755", "externalIds": {"MAG": "2951060295", - "DBLP": "conf/acl/WeissGY18", "ACL": "P18-2117", "ArXiv": "1805.04908", "DOI": - "10.18653/v1/P18-2117", "CorpusId": 44115640}, "url": "https://www.semanticscholar.org/paper/06354570d5f6be803d4a79bf59ecbb097bca8755", + "year": 2016, "referenceCount": 66, "citationCount": 283, "influentialCitationCount": + 41, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-05-22", "journal": + {"name": "2016 IEEE Symposium on Security and Privacy (SP)", "pages": "969-986"}, + "authors": [{"authorId": "145531222", "name": "Hong Hu"}, {"authorId": "32939696", + "name": "Shweta Shinde"}, {"authorId": "13551726", "name": "Sendroiu Adrian"}, + {"authorId": "2775791", "name": "Zheng Leong Chua"}, {"authorId": "1750032", + "name": "P. Saxena"}, {"authorId": "2728022", "name": "Zhenkai Liang"}]}, + {"paperId": "06354570d5f6be803d4a79bf59ecbb097bca8755", "externalIds": {"MAG": + "2951060295", "DBLP": "conf/acl/WeissGY18", "ACL": "P18-2117", "ArXiv": "1805.04908", + "DOI": "10.18653/v1/P18-2117", "CorpusId": 44115640}, "corpusId": 44115640, + "publicationVenue": {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", "name": + "Annual Meeting of the Association for Computational Linguistics", "type": + "conference", "alternate_names": ["Annu Meet Assoc Comput Linguistics", "Meeting + of the Association for Computational Linguistics", "ACL", "Meet Assoc Comput + Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, "url": + "https://www.semanticscholar.org/paper/06354570d5f6be803d4a79bf59ecbb097bca8755", "title": "On the Practical Computational Power of Finite Precision RNNs for Language Recognition", "abstract": "While Recurrent Neural Networks (RNNs) are famously known to be Turing complete, this relies on infinite precision @@ -11499,26 +13128,30 @@ interactions: counting behavior. We show empirically that the LSTM does indeed learn to effectively use the counting mechanism.", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2018, "referenceCount": - 19, "citationCount": 190, "influentialCitationCount": 27, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2018-05-13", - "journal": {"pages": "740-745"}, "authors": [{"authorId": "145909798", "name": - "Gail Weiss"}, {"authorId": "2089067", "name": "Yoav Goldberg"}, {"authorId": - "1743232", "name": "Eran Yahav"}]}, {"paperId": "6c9df56377359945f7ef7e06f0b22d52f288c0bc", - "externalIds": {"MAG": "2083368929", "DBLP": "journals/computing/SchonhageS71", - "DOI": "10.1007/BF02242355", "CorpusId": 9738629}, "url": "https://www.semanticscholar.org/paper/6c9df56377359945f7ef7e06f0b22d52f288c0bc", + 19, "citationCount": 191, "influentialCitationCount": 27, "isOpenAccess": + true, "openAccessPdf": {"url": "https://www.aclweb.org/anthology/P18-2117.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2018-05-13", "journal": {"pages": "740-745"}, + "authors": [{"authorId": "145909798", "name": "Gail Weiss"}, {"authorId": + "2089067", "name": "Yoav Goldberg"}, {"authorId": "1743232", "name": "Eran + Yahav"}]}, {"paperId": "6c9df56377359945f7ef7e06f0b22d52f288c0bc", "externalIds": + {"MAG": "2083368929", "DBLP": "journals/computing/SchonhageS71", "DOI": "10.1007/BF02242355", + "CorpusId": 9738629}, "corpusId": 9738629, "publicationVenue": {"id": "48433268-b689-457a-8e57-36895fd4f04e", + "name": "Computing", "type": "journal", "issn": "0010-485X", "url": "https://link.springer.com/journal/607"}, + "url": "https://www.semanticscholar.org/paper/6c9df56377359945f7ef7e06f0b22d52f288c0bc", "title": "Schnelle Multiplikation gro\u00dfer Zahlen", "abstract": null, "venue": - "Computing", "year": 1971, "referenceCount": 10, "citationCount": 716, "influentialCitationCount": - 53, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1971-09-01", "journal": {"name": "Computing", - "pages": "281-292", "volume": "7"}, "authors": [{"authorId": "100714861", - "name": "Arnold Sch\u00f6nhage"}, {"authorId": "2089818231", "name": "V. Strassen"}]}, - {"paperId": "569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", "externalIds": {"MAG": - "1651552693", "DOI": "10.1017/CBO9781139105736", "CorpusId": 56689702}, "url": - "https://www.semanticscholar.org/paper/569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", + "Computing", "year": 1971, "referenceCount": 10, "citationCount": 722, "influentialCitationCount": + 53, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1971-09-01", + "journal": {"name": "Computing", "pages": "281-292", "volume": "7"}, "authors": + [{"authorId": "100714861", "name": "Arnold Sch\u00f6nhage"}, {"authorId": + "2089818231", "name": "V. Strassen"}]}, {"paperId": "569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", + "externalIds": {"MAG": "1651552693", "DOI": "10.1017/CBO9781139105736", "CorpusId": + 56689702}, "corpusId": 56689702, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/569b6c2bb5db1bce76d1fbeb44d77bb8d7a1021d", "title": "Alan M. Turing: Frontmatter", "abstract": "Foreword to the Centenary Edition Martin Davis Preface to the First Edition Foreword to the First Edition Lyn Irvine Preface Part I. Mainly Biographical: 1. Family background 2. Childhood @@ -11530,15 +13163,31 @@ interactions: Machinery and Morphogenesis: 14. Computing machinery 15. Chemical theory of morphogenesis considered My brother Alan John Turing Bibliography Index.", "venue": "", "year": 1961, "referenceCount": 1, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1961-10-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "52266406", "name": "Sara Turing"}, {"authorId": "52278265", "name": "John - F. Turing"}, {"authorId": "48254365", "name": "L. Irvine"}, {"authorId": "2110853158", - "name": "Martin Davis"}]}, {"paperId": "df823b567790e457b76dbf662dfb06384f839aa5", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1961-10-01", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "52266406", "name": "Sara Turing"}, + {"authorId": "52278265", "name": "John F. Turing"}, {"authorId": "48254365", + "name": "L. Irvine"}, {"authorId": "2110853158", "name": "Martin Davis"}]}, + {"paperId": "2518002fbb475b6ba6f3ac46e7d89c655cc19f86", "externalIds": {"DBLP": + "books/teu/Wegener87", "MAG": "1517585663", "DOI": "10.1007/3-540-27477-4_16", + "CorpusId": 9300832}, "corpusId": 9300832, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2518002fbb475b6ba6f3ac46e7d89c655cc19f86", + "title": "The complexity of Boolean functions", "abstract": null, "venue": + "", "year": 1987, "referenceCount": 0, "citationCount": 1112, "influentialCitationCount": + 66, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "1681615", "name": "I. Wegener"}]}, {"paperId": "df823b567790e457b76dbf662dfb06384f839aa5", "externalIds": {"MAG": "1969357685", "DOI": "10.1242/dev.114991", "CorpusId": - 207159635, "PubMed": "25804733"}, "url": "https://www.semanticscholar.org/paper/df823b567790e457b76dbf662dfb06384f839aa5", + 207159635, "PubMed": "25804733"}, "corpusId": 207159635, "publicationVenue": + {"id": "179847ef-8e79-48e2-99ee-769211d3e729", "name": "Development", "type": + "journal", "issn": "0950-1991", "alternate_issns": ["0212-2448"], "url": "https://dev.biologists.org/", + "alternate_urls": ["http://dev.biologists.org/", "http://journals.ecs.soton.ac.uk/journals/dev.html"]}, + "url": "https://www.semanticscholar.org/paper/df823b567790e457b76dbf662dfb06384f839aa5", "title": "Positional information and reaction-diffusion: two big ideas in developmental biology combine", "abstract": "One of the most fundamental questions in biology is that of biological pattern: how do the structures and shapes @@ -11551,26 +13200,21 @@ interactions: Summary: This Hypothesis discusses the relationship between positional information and reaction-diffusion, two fundamental principles governing the arisal of structures and shapes in organisms.", "venue": "Development", "year": 2015, - "referenceCount": 45, "citationCount": 273, "influentialCitationCount": 6, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2015-04-01", "journal": - {"name": "Development", "pages": "1203 - 1211", "volume": "142"}, "authors": - [{"authorId": "2113478488", "name": "Jeremy B. A. Green"}, {"authorId": "47254653", - "name": "J. Sharpe"}]}, {"paperId": "2518002fbb475b6ba6f3ac46e7d89c655cc19f86", - "externalIds": {"DBLP": "books/teu/Wegener87", "MAG": "1517585663", "DOI": - "10.1007/3-540-27477-4_16", "CorpusId": 9300832}, "url": "https://www.semanticscholar.org/paper/2518002fbb475b6ba6f3ac46e7d89c655cc19f86", - "title": "The complexity of Boolean functions", "abstract": null, "venue": - "", "year": 1987, "referenceCount": 0, "citationCount": 1111, "influentialCitationCount": - 66, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1681615", - "name": "I. Wegener"}]}, {"paperId": "17594df98c222217a11510dd454ba52a5a737378", + "referenceCount": 45, "citationCount": 276, "influentialCitationCount": 6, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2015-04-01", "journal": {"name": "Development", "pages": "1203 - 1211", "volume": + "142"}, "authors": [{"authorId": "2113478488", "name": "Jeremy B. A. Green"}, + {"authorId": "47254653", "name": "J. Sharpe"}]}, {"paperId": "17594df98c222217a11510dd454ba52a5a737378", "externalIds": {"MAG": "2067619114", "DBLP": "journals/jcss/SiegelmannS95", - "DOI": "10.1145/130385.130432", "CorpusId": 44597102}, "url": "https://www.semanticscholar.org/paper/17594df98c222217a11510dd454ba52a5a737378", + "DOI": "10.1145/130385.130432", "CorpusId": 44597102}, "corpusId": 44597102, + "publicationVenue": {"id": "24b0721b-0592-414a-ac79-7271515aaab0", "name": + "Annual Conference Computational Learning Theory", "type": "conference", "alternate_names": + ["Conf Learn Theory", "COLT", "Conference on Learning Theory", "Annu Conf + Comput Learn Theory"], "url": "http://www.wikicfp.com/cfp/program?id=536"}, + "url": "https://www.semanticscholar.org/paper/17594df98c222217a11510dd454ba52a5a737378", "title": "On the computational power of neural nets", "abstract": "This paper deals with finite networks which consist of interconnections of synchronously evolving processors. Each processor updates its state by applying a \u201csigmoidal\u201d @@ -11582,21 +13226,27 @@ interactions: in the literature. Furthermore, we assert a similar theorem about non-deterministic Turing Machines. Consequences for undecidability and complexity issues about nets are discussed too.", "venue": "Annual Conference Computational Learning - Theory", "year": 1992, "referenceCount": 62, "citationCount": 909, "influentialCitationCount": - 50, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + Theory", "year": 1992, "referenceCount": 62, "citationCount": 911, "influentialCitationCount": + 50, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/130385.130432", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1992-07-01", "journal": {"pages": "440-449"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}, {"authorId": "1790264", "name": "Eduardo Sontag"}]}, {"paperId": "5b4f38765365f21088d336ebf428c491e270edc0", "externalIds": {"DBLP": "conf/ijcai/McAllisterGKWSC17", "MAG": "2740379828", - "DOI": "10.17863/CAM.12760", "CorpusId": 5631404}, "url": "https://www.semanticscholar.org/paper/5b4f38765365f21088d336ebf428c491e270edc0", + "DOI": "10.17863/CAM.12760", "CorpusId": 5631404}, "corpusId": 5631404, "publicationVenue": + {"id": "67f7f831-711a-43c8-8785-1e09005359b5", "name": "International Joint + Conference on Artificial Intelligence", "type": "conference", "alternate_names": + ["Int Jt Conf Artif Intell", "IJCAI"], "url": "http://www.ijcai.org/"}, "url": + "https://www.semanticscholar.org/paper/5b4f38765365f21088d336ebf428c491e270edc0", "title": "Concrete Problems for Autonomous Vehicle Safety: Advantages of Bayesian Deep Learning", "abstract": "Adrian Weller acknowledges support by the Alan Turing Institute under the EPSRC grant EP/N510129/1, and by the Leverhulme Trust via the CFI.", "venue": "International Joint Conference on Artificial - Intelligence", "year": 2017, "referenceCount": 69, "citationCount": 228, "influentialCitationCount": - 17, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + Intelligence", "year": 2017, "referenceCount": 69, "citationCount": 230, "influentialCitationCount": + 17, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ijcai.org/proceedings/2017/0661.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-08-19", "journal": {"pages": "4745-4753"}, @@ -11606,7 +13256,12 @@ interactions: "name": "Amar Shah"}, {"authorId": "1745672", "name": "R. Cipolla"}, {"authorId": "145689461", "name": "Adrian Weller"}]}, {"paperId": "0a7683a93d633f60cc7acb8c278da77d25b50821", "externalIds": {"MAG": "2019177912", "DOI": "10.1126/SCIENCE.284.5421.1826", - "CorpusId": 24057117, "PubMed": "10364553"}, "url": "https://www.semanticscholar.org/paper/0a7683a93d633f60cc7acb8c278da77d25b50821", + "CorpusId": 24057117, "PubMed": "10364553"}, "corpusId": 24057117, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/0a7683a93d633f60cc7acb8c278da77d25b50821", "title": "Regular and irregular patterns in semiarid vegetation", "abstract": "Vegetation in many semiarid regions is strikingly patterned, forming regular stripes on hillsides and irregular mosaics on flat ground. A simple model @@ -11618,15 +13273,18 @@ interactions: theoretical results, this system provides a clear example of how nonlinear mechanisms can be important in determining the spatial structure of plant communities.", "venue": "Science", "year": 1999, "referenceCount": 16, "citationCount": - 740, "influentialCitationCount": 103, "isOpenAccess": false, "fieldsOfStudy": - ["Geology", "Medicine"], "s2FieldsOfStudy": [{"category": "Geology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1999-06-11", "journal": {"name": "Science", "pages": "\n 1826-8\n ", - "volume": "284 5421"}, "authors": [{"authorId": "30154779", "name": "Klausmeier"}]}, - {"paperId": "98da568adc7858630e26d0563304a495f90608d0", "externalIds": {"DBLP": - "conf/stoc/FortuneW78", "MAG": "2004618348", "DOI": "10.1145/800133.804339", - "CorpusId": 11283448}, "url": "https://www.semanticscholar.org/paper/98da568adc7858630e26d0563304a495f90608d0", + 748, "influentialCitationCount": 105, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Geology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1999-06-11", "journal": {"name": "Science", + "pages": "\n 1826-8\n ", "volume": "284 5421"}, "authors": + [{"authorId": "30154779", "name": "Klausmeier"}]}, {"paperId": "98da568adc7858630e26d0563304a495f90608d0", + "externalIds": {"DBLP": "conf/stoc/FortuneW78", "MAG": "2004618348", "DOI": + "10.1145/800133.804339", "CorpusId": 11283448}, "corpusId": 11283448, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/98da568adc7858630e26d0563304a495f90608d0", "title": "Parallelism in random access machines", "abstract": "A model of computation based on random access machines operating in parallel and sharing a common memory is presented. The computational power of this model is related @@ -11637,14 +13295,17 @@ interactions: Turing machines. Similar results hold for other classes. The effect of limiting the size of the common memory is also considered.", "venue": "Symposium on the Theory of Computing", "year": 1978, "referenceCount": 11, "citationCount": - 993, "influentialCitationCount": 103, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": - "1978-05-01", "journal": {"name": "Proceedings of the tenth annual ACM symposium - on Theory of computing"}, "authors": [{"authorId": "1798254", "name": "S. - Fortune"}, {"authorId": "40005350", "name": "J. Wyllie"}]}, {"paperId": "8dbcd1bf0d69caa17ac972e1a452946dff6788bd", - "externalIds": {"MAG": "85792028", "CorpusId": 140937666}, "url": "https://www.semanticscholar.org/paper/8dbcd1bf0d69caa17ac972e1a452946dff6788bd", + 993, "influentialCitationCount": 103, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ecommons.cornell.edu/bitstream/1813/7454/1/78-334.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", + "Conference"], "publicationDate": "1978-05-01", "journal": {"name": "Proceedings + of the tenth annual ACM symposium on Theory of computing"}, "authors": [{"authorId": + "1798254", "name": "S. Fortune"}, {"authorId": "40005350", "name": "J. Wyllie"}]}, + {"paperId": "8dbcd1bf0d69caa17ac972e1a452946dff6788bd", "externalIds": {"MAG": + "85792028", "CorpusId": 140937666}, "corpusId": 140937666, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8dbcd1bf0d69caa17ac972e1a452946dff6788bd", "title": "The Move toward Transformational Leadership.", "abstract": "Instructional leadership\" is an idea that has served many schools well throughout the 1980s and the early 1990s. But in light of current restructuring initiatives designed @@ -11672,14 +13333,15 @@ interactions: professional development. One cannot do away with this form of power without losing one''s share. It is a zero-sum gain. In contrast. Type Z organizations rely on strong cultures to influence", "venue": "", "year": 1992, "referenceCount": - 29, "citationCount": 792, "influentialCitationCount": 115, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Educational - Leadership", "pages": "8-12", "volume": "49"}, "authors": [{"authorId": "113108457", - "name": "K. Leithwood"}]}, {"paperId": "385582ab0f16acc9b1367bffd41127579058f996", - "externalIds": {"MAG": "2032407678", "DOI": "10.1088/1751-8113/45/3/033001", - "CorpusId": 122332789}, "url": "https://www.semanticscholar.org/paper/385582ab0f16acc9b1367bffd41127579058f996", + 29, "citationCount": 793, "influentialCitationCount": 115, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Educational Leadership", "pages": "8-12", "volume": "49"}, + "authors": [{"authorId": "113108457", "name": "K. Leithwood"}]}, {"paperId": + "385582ab0f16acc9b1367bffd41127579058f996", "externalIds": {"MAG": "2032407678", + "DOI": "10.1088/1751-8113/45/3/033001", "CorpusId": 122332789}, "corpusId": + 122332789, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/385582ab0f16acc9b1367bffd41127579058f996", "title": "Spatiotemporal dynamics of continuum neural fields", "abstract": "We survey recent analytical approaches to studying the spatiotemporal dynamics of continuum neural fields. Neural fields model the large-scale dynamics of @@ -11689,15 +13351,17 @@ interactions: extended excitable systems with nonlocal interactions and exhibit a wide range of spatially coherent dynamics including traveling waves oscillations and Turing-like patterns.", "venue": "", "year": 2012, "referenceCount": 374, - "citationCount": 353, "influentialCitationCount": 29, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2012-01-27", "journal": {"name": "Journal of Physics A: - Mathematical and Theoretical", "volume": "45"}, "authors": [{"authorId": "2235933", - "name": "P. Bressloff"}]}, {"paperId": "b85ae9f4367548a7dac7eae1a2a8d5866d27813a", - "externalIds": {"DBLP": "journals/jacm/Chaitin66", "MAG": "1969678783", "DOI": - "10.1145/321356.321363", "CorpusId": 207698337}, "url": "https://www.semanticscholar.org/paper/b85ae9f4367548a7dac7eae1a2a8d5866d27813a", + "citationCount": 355, "influentialCitationCount": 29, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.math.utah.edu/~bresslof/publications/11-7.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2012-01-27", "journal": + {"name": "Journal of Physics A: Mathematical and Theoretical", "volume": "45"}, + "authors": [{"authorId": "2235933", "name": "P. Bressloff"}]}, {"paperId": + "b85ae9f4367548a7dac7eae1a2a8d5866d27813a", "externalIds": {"DBLP": "journals/jacm/Chaitin66", + "MAG": "1969678783", "DOI": "10.1145/321356.321363", "CorpusId": 207698337}, + "corpusId": 207698337, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b85ae9f4367548a7dac7eae1a2a8d5866d27813a", "title": "On the Length of Programs for Computing Finite Binary Sequences", "abstract": "The use of Turing machines for calculating finite binary sequences is studied from the point of view of information theory and the theory of @@ -11705,16 +13369,19 @@ interactions: instructions in programs. A modified form of Turing machine is studied from the same point of view. An application to the problem of defining a patternless sequence is proposed in terms of the concepts here developed.", "venue": "JACM", - "year": 1966, "referenceCount": 20, "citationCount": 1123, "influentialCitationCount": - 61, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1966-10-01", "journal": {"name": "J. ACM", "pages": "547-569", "volume": - "13"}, "authors": [{"authorId": "1756533", "name": "G. Chaitin"}]}, {"paperId": - "f64ed54b6d8e75ffeb422f94c14f12e07d57ad8e", "externalIds": {"DBLP": "conf/focs/Yao93", - "MAG": "2160083149", "DOI": "10.1109/SFCS.1993.366852", "CorpusId": 2870099}, - "url": "https://www.semanticscholar.org/paper/f64ed54b6d8e75ffeb422f94c14f12e07d57ad8e", + "year": 1966, "referenceCount": 20, "citationCount": 1125, "influentialCitationCount": + 61, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1966-10-01", "journal": {"name": "J. ACM", "pages": "547-569", + "volume": "13"}, "authors": [{"authorId": "1756533", "name": "G. Chaitin"}]}, + {"paperId": "f64ed54b6d8e75ffeb422f94c14f12e07d57ad8e", "externalIds": {"DBLP": + "conf/focs/Yao93", "MAG": "2160083149", "DOI": "10.1109/SFCS.1993.366852", + "CorpusId": 2870099}, "corpusId": 2870099, "publicationVenue": {"id": "68cf0e99-5164-4480-8ed4-8b8416a091df", + "name": "IEEE Annual Symposium on Foundations of Computer Science", "type": + "conference", "alternate_names": ["FOCS", "IEEE Annu Symp Found Comput Sci"], + "url": "http://ieee-focs.org/"}, "url": "https://www.semanticscholar.org/paper/f64ed54b6d8e75ffeb422f94c14f12e07d57ad8e", "title": "Quantum Circuit Complexity", "abstract": "We propose a complexity model of quantum circuits analogous to the standard (acyclic) Boolean circuit model. It is shown that any function computable in polynomial time by a quantum @@ -11725,15 +13392,19 @@ interactions: by them. We also develop a theory of quantum communication complexity, and use it as a tool to prove that the majority function does not have a linear-size quantum formula. >", "venue": "IEEE Annual Symposium on Foundations of Computer - Science", "year": 1993, "referenceCount": 18, "citationCount": 715, "influentialCitationCount": - 81, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1993-11-03", "journal": {"pages": "352-361"}, "authors": - [{"authorId": "1770729", "name": "A. Yao"}]}, {"paperId": "730091c46c13943bef832d8b602d9c2aaca12fe5", - "externalIds": {"MAG": "1487337216", "DBLP": "conf/nsdi/MurraySSSMH10", "CorpusId": - 16966186}, "url": "https://www.semanticscholar.org/paper/730091c46c13943bef832d8b602d9c2aaca12fe5", + Science", "year": 1993, "referenceCount": 18, "citationCount": 721, "influentialCitationCount": + 81, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1993-11-03", "journal": {"pages": "352-361"}, + "authors": [{"authorId": "1770729", "name": "A. Yao"}]}, {"paperId": "730091c46c13943bef832d8b602d9c2aaca12fe5", + "externalIds": {"DBLP": "conf/nsdi/MurraySSSMH10", "MAG": "1487337216", "CorpusId": + 16966186}, "corpusId": 16966186, "publicationVenue": {"id": "38e1b942-a62d-4d74-8e5d-677db6ed425f", + "name": "Symposium on Networked Systems Design and Implementation", "type": + "conference", "alternate_names": ["NSDI", "Symp Networked Syst Des Implement", + "Networked Systems Design and Implementation", "Networked Syst Des Implement"]}, + "url": "https://www.semanticscholar.org/paper/730091c46c13943bef832d8b602d9c2aaca12fe5", "title": "CIEL: A Universal Execution Engine for Distributed Data-Flow Computing", "abstract": "This paper introduces CIEL, a universal execution engine for distributed data-flow programs. Like previous execution engines, CIEL masks @@ -11746,21 +13417,26 @@ interactions: We have deployed CIEL on a cloud computing platform, and demonstrate that it achieves scalable performance for both iterative and non-iterative algorithms.", "venue": "Symposium on Networked Systems Design and Implementation", "year": - 2011, "referenceCount": 45, "citationCount": 294, "influentialCitationCount": - 25, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2011-03-30", "journal": {"name": "", "pages": - "113-126", "volume": ""}, "authors": [{"authorId": "20154699", "name": "D. - Murray"}, {"authorId": "1962485", "name": "Malte Schwarzkopf"}, {"authorId": - "2446329", "name": "Christopher Smowton"}, {"authorId": "2111047966", "name": - "Steven Smith"}, {"authorId": "3235603", "name": "A. Madhavapeddy"}, {"authorId": - "38424357", "name": "S. Hand"}]}, {"paperId": "ba3975cd4dea504142b6d423c8b70790407cfb07", + 2011, "referenceCount": 45, "citationCount": 295, "influentialCitationCount": + 25, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2011-03-30", + "journal": {"name": "", "pages": "113-126", "volume": ""}, "authors": [{"authorId": + "20154699", "name": "D. Murray"}, {"authorId": "1962485", "name": "Malte Schwarzkopf"}, + {"authorId": "2446329", "name": "Christopher Smowton"}, {"authorId": "2111047966", + "name": "Steven Smith"}, {"authorId": "3235603", "name": "A. Madhavapeddy"}, + {"authorId": "38424357", "name": "S. Hand"}]}, {"paperId": "2094bd9f69699787c3d0212045dbb53dc798a97f", "externalIds": {"MAG": "2949253326", "ArXiv": "1701.02073", "DBLP": "journals/corr/ZhangLWZ17", - "DOI": "10.1007/s11280-018-0598-6", "CorpusId": 6862403}, "url": "https://www.semanticscholar.org/paper/ba3975cd4dea504142b6d423c8b70790407cfb07", + "DOI": "10.1007/s11280-018-0598-6", "CorpusId": 6862403}, "corpusId": 6862403, + "publicationVenue": {"id": "9cf86359-a093-42b4-8bc0-6fd56465c360", "name": + "World wide web (Bussum)", "type": "journal", "alternate_names": ["World Wide + Web", "World wide web (bussum"], "issn": "1386-145X", "url": "https://link.springer.com/journal/11280"}, + "url": "https://www.semanticscholar.org/paper/2094bd9f69699787c3d0212045dbb53dc798a97f", "title": "Neural personalized response generation as domain adaptation", "abstract": null, "venue": "World wide web (Bussum)", "year": 2017, "referenceCount": 72, "citationCount": 86, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1701.02073", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -11769,7 +13445,7 @@ interactions: {"authorId": "40282288", "name": "Ting Liu"}, {"authorId": "2115568958", "name": "Yifa Wang"}, {"authorId": "50736467", "name": "Qingfu Zhu"}]}, {"paperId": "a2076448a07051a76babe63878be613fce123e12", "externalIds": {"CorpusId": 1122952}, - "url": "https://www.semanticscholar.org/paper/a2076448a07051a76babe63878be613fce123e12", + "corpusId": 1122952, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a2076448a07051a76babe63878be613fce123e12", "title": "Shadows of the Mind: A Search for the Missing Science of Consciousness", "abstract": "mere algorithm, formal system, computer, or robot. A few minutes of reading and pondering is a small price to pay for this distinction. Penrose @@ -11792,24 +13468,29 @@ interactions: can run the machine, but what if it runs for a long time without halting? Can one conclude that it will never halt? The difficulty of this problem is the key to this version", "venue": "", "year": 1997, "referenceCount": 5, - "citationCount": 639, "influentialCitationCount": 63, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2627135", "name": "William G. Faris"}]}, - {"paperId": "5778ddc676188f2b8197a9a25b8a389b8ccc6e44", "externalIds": {"MAG": - "1992963104", "DOI": "10.1038/376765A0", "CorpusId": 4327563, "PubMed": "24547605"}, + "citationCount": 642, "influentialCitationCount": 62, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2627135", + "name": "William G. Faris"}]}, {"paperId": "5778ddc676188f2b8197a9a25b8a389b8ccc6e44", + "externalIds": {"MAG": "1992963104", "DOI": "10.1038/376765A0", "CorpusId": + 4327563, "PubMed": "24547605"}, "corpusId": 4327563, "publicationVenue": {"id": + "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/5778ddc676188f2b8197a9a25b8a389b8ccc6e44", "title": "A reaction\u0096diffusion wave on the skin of the marine angelfish Pomacanthus", "abstract": null, "venue": "Nature", "year": 1995, "referenceCount": - 12, "citationCount": 720, "influentialCitationCount": 27, "isOpenAccess": - false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-08-31", "journal": {"name": "Nature", "pages": "765-768", - "volume": "376"}, "authors": [{"authorId": "2061373966", "name": "S. Kondo"}, - {"authorId": "40664700", "name": "Rihito Asai"}]}, {"paperId": "80eed20e59e248880c4f63d14837bea22f28bb8c", - "externalIds": {"DBLP": "journals/jacm/ChandraKS81", "DOI": "10.1145/322234.322243", - "CorpusId": 238863413}, "url": "https://www.semanticscholar.org/paper/80eed20e59e248880c4f63d14837bea22f28bb8c", + 12, "citationCount": 723, "influentialCitationCount": 27, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1995-08-31", "journal": {"name": "Nature", + "pages": "765-768", "volume": "376"}, "authors": [{"authorId": "2061373966", + "name": "S. Kondo"}, {"authorId": "40664700", "name": "Rihito Asai"}]}, {"paperId": + "80eed20e59e248880c4f63d14837bea22f28bb8c", "externalIds": {"DBLP": "journals/jacm/ChandraKS81", + "DOI": "10.1145/322234.322243", "CorpusId": 238863413}, "corpusId": 238863413, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/80eed20e59e248880c4f63d14837bea22f28bb8c", "title": "Alternation", "abstract": "We define alternating Turing Machines which are like nondeterministic Turing Machines, except that existential and universal quantifiers alternate. Alternation links up time and space complexities @@ -11824,43 +13505,37 @@ interactions: automata, alternating pushdown automata accept all languages accepted by Turing machines in deterministic exponential time.", "venue": "17th Annual Symposium on Foundations of Computer Science (sfcs 1976)", "year": 1976, "referenceCount": - 41, "citationCount": 799, "influentialCitationCount": 124, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "17th Annual Symposium on Foundations of Computer - Science (sfcs 1976)", "pages": "98-108"}, "authors": [{"authorId": "1757332", - "name": "A. K. Chandra"}, {"authorId": "1678332", "name": "L. Stockmeyer"}]}, + 41, "citationCount": 801, "influentialCitationCount": 124, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "17th Annual Symposium on Foundations + of Computer Science (sfcs 1976)", "pages": "98-108"}, "authors": [{"authorId": + "1757332", "name": "A. K. Chandra"}, {"authorId": "1678332", "name": "L. Stockmeyer"}]}, {"paperId": "7a212b81eced0408c66c2957b5d713580f18a3ee", "externalIds": {"MAG": "1628582474", "DOI": "10.1038/35035038", "CorpusId": 2497066, "PubMed": "11028996"}, - "url": "https://www.semanticscholar.org/paper/7a212b81eced0408c66c2957b5d713580f18a3ee", + "corpusId": 2497066, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/7a212b81eced0408c66c2957b5d713580f18a3ee", "title": "Logical computation using algorithmic self-assembly of DNA triple-crossover molecules", "abstract": null, "venue": "Nature", "year": 2000, "referenceCount": 48, "citationCount": 694, "influentialCitationCount": 7, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-09-28", "journal": {"name": "Nature", "pages": "493-496", - "volume": "407"}, "authors": [{"authorId": "2719263", "name": "C. Mao"}, {"authorId": - "2994966", "name": "T. LaBean"}, {"authorId": "1749706", "name": "J. Reif"}, - {"authorId": "3206516", "name": "N. Seeman"}]}, {"paperId": "7cb02959fbeb885d94c317d8137b04589e523020", - "externalIds": {"MAG": "2025494030", "DBLP": "conf/ACMse/Curran82", "DOI": - "10.1145/503896.503935", "CorpusId": 29417600}, "url": "https://www.semanticscholar.org/paper/7cb02959fbeb885d94c317d8137b04589e523020", - "title": "A/I: a synthesis", "abstract": "There has never been a serious effort - made to produce a program which would pass Turing''s well known test for artificial - intelligence. The present paper describes a program which, although not intended - to meet the test, is a tentative step in that direction. It is a synthesis - of earlier work on emotions, purpose, conversation, knowledge/belief acquisition. - Provision for the incorporation of additional aspects of A/I has been made.", - "venue": "ACM-SE 20", "year": 1982, "referenceCount": 2, "citationCount": - 783, "influentialCitationCount": 37, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1982-04-01", "journal": - {"pages": "226-229"}, "authors": [{"authorId": "46733278", "name": "Will Curran"}]}, + "openAccessPdf": {"url": "http://www.cs.duke.edu/~reif/paper/SELFASSEMBLE/AlgorithmicAssembly.web.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2000-09-28", "journal": {"name": "Nature", + "pages": "493-496", "volume": "407"}, "authors": [{"authorId": "2719263", + "name": "C. Mao"}, {"authorId": "2994966", "name": "T. LaBean"}, {"authorId": + "1749706", "name": "J. Reif"}, {"authorId": "3206516", "name": "N. Seeman"}]}, {"paperId": "67979ea92b2cba0e504a596a4c552de4047a39f8", "externalIds": {"DBLP": "journals/siamcomp/Toda91", "MAG": "2137407595", "DOI": "10.1137/0220053", - "CorpusId": 7351808}, "url": "https://www.semanticscholar.org/paper/67979ea92b2cba0e504a596a4c552de4047a39f8", + "CorpusId": 7351808}, "corpusId": 7351808, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/67979ea92b2cba0e504a596a4c552de4047a39f8", "title": "PP is as Hard as the Polynomial-Time Hierarchy", "abstract": "In this paper, two interesting complexity classes, PP and $ \\oplus {\\text{P}}$, are compared with PH, the polynomial-time hierarchy. It is shown that every @@ -11870,36 +13545,54 @@ interactions: \\subseteq {\\text{PH}}$) implies a collapse of PH. A stronger result is also shown: every set in PP(PH) is polynomial-time Turing reducible to a set in PP.", "venue": "SIAM journal on computing (Print)", "year": 1991, "referenceCount": - 27, "citationCount": 670, "influentialCitationCount": 63, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + 27, "citationCount": 672, "influentialCitationCount": 63, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1991-10-01", "journal": {"name": "SIAM J. Comput.", "pages": "865-877", "volume": "20"}, "authors": [{"authorId": "2872350", "name": "Seinosuke Toda"}]}, {"paperId": - "e2f48976e5e7763309eabfedc72240e9685b5b17", "externalIds": {"MAG": "314138997", - "CorpusId": 15222467}, "url": "https://www.semanticscholar.org/paper/e2f48976e5e7763309eabfedc72240e9685b5b17", + "7cb02959fbeb885d94c317d8137b04589e523020", "externalIds": {"MAG": "2025494030", + "DBLP": "conf/ACMse/Curran82", "DOI": "10.1145/503896.503935", "CorpusId": + 29417600}, "corpusId": 29417600, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7cb02959fbeb885d94c317d8137b04589e523020", + "title": "A/I: a synthesis", "abstract": "There has never been a serious effort + made to produce a program which would pass Turing''s well known test for artificial + intelligence. The present paper describes a program which, although not intended + to meet the test, is a tentative step in that direction. It is a synthesis + of earlier work on emotions, purpose, conversation, knowledge/belief acquisition. + Provision for the incorporation of additional aspects of A/I has been made.", + "venue": "ACM-SE 20", "year": 1982, "referenceCount": 2, "citationCount": + 787, "influentialCitationCount": 37, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1982-04-01", "journal": {"pages": "226-229"}, "authors": [{"authorId": "46733278", + "name": "Will Curran"}]}, {"paperId": "e2f48976e5e7763309eabfedc72240e9685b5b17", + "externalIds": {"MAG": "314138997", "CorpusId": 15222467}, "corpusId": 15222467, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2f48976e5e7763309eabfedc72240e9685b5b17", "title": "The Riemann Hypothesis", "abstract": "In this article I describe a proof of the fact that ZFC cannot decide whether a certain modified Turing machine, or computer (satisfying a certain condition) will ever halt successfully in finite time. The consequences of this fact in relation to the Riemann Hypothesis are presented.", "venue": "", "year": 2013, "referenceCount": 54, "citationCount": - 174, "influentialCitationCount": 16, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2013-05-01", "journal": {"name": "viXra", "volume": - ""}, "authors": [{"authorId": "48524458", "name": "C. Dumitrescu"}]}, {"paperId": - "ed326e621ecb92320d702bfb66fc8459ffb81a36", "externalIds": {"MAG": "1646777016", - "DOI": "10.1007/978-1-4020-6710-5_13", "CorpusId": 58758111}, "url": "https://www.semanticscholar.org/paper/ed326e621ecb92320d702bfb66fc8459ffb81a36", + 176, "influentialCitationCount": 16, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-05-01", "journal": {"name": + "viXra", "volume": ""}, "authors": [{"authorId": "48524458", "name": "C. Dumitrescu"}]}, + {"paperId": "ed326e621ecb92320d702bfb66fc8459ffb81a36", "externalIds": {"MAG": + "1646777016", "DOI": "10.1007/978-1-4020-6710-5_13", "CorpusId": 58758111}, + "corpusId": 58758111, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ed326e621ecb92320d702bfb66fc8459ffb81a36", "title": "The Anatomy of A.L.I.C.E.", "abstract": null, "venue": "", "year": 2009, "referenceCount": 10, "citationCount": 290, "influentialCitationCount": - 27, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "pages": "181-210", "volume": ""}, "authors": - [{"authorId": "145356886", "name": "R. Wallace"}]}, {"paperId": "f855f8ca7f468be13f189c40c7f52461814c97d5", - "externalIds": {"MAG": "2264913609", "DOI": "10.1201/9780429500442", "CorpusId": - 53898623}, "url": "https://www.semanticscholar.org/paper/f855f8ca7f468be13f189c40c7f52461814c97d5", + 27, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": {"name": "", "pages": "181-210", + "volume": ""}, "authors": [{"authorId": "145356886", "name": "R. Wallace"}]}, + {"paperId": "f855f8ca7f468be13f189c40c7f52461814c97d5", "externalIds": {"MAG": + "2264913609", "DOI": "10.1201/9780429500442", "CorpusId": 53898623}, "corpusId": + 53898623, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f855f8ca7f468be13f189c40c7f52461814c97d5", "title": "Feynman Lectures on Computation", "abstract": "From the Publisher: \nFrom 1983 to 1986, the legendary physicist and teacher Richard Feynman gave a course at Caltech called \"Potentialities and Limitations of Computing Machines.\" @@ -11918,15 +13611,15 @@ interactions: the complexities of your solutions - for the fun of it - then one day you''ll turn around and discover that nobody actually did that one! And that''s the way to become a computer scientist.\"", "venue": "", "year": 1996, "referenceCount": - 0, "citationCount": 604, "influentialCitationCount": 29, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1996-09-08", "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "16806099", "name": "R. - Feynman"}, {"authorId": "1720066", "name": "A. Hey"}, {"authorId": "2113591601", - "name": "Robin Allen"}]}, {"paperId": "78fc3b741828124d8a79667466516a544143bf68", + 0, "citationCount": 608, "influentialCitationCount": 29, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1996-09-08", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "16806099", "name": "R. Feynman"}, {"authorId": "1720066", "name": "A. Hey"}, + {"authorId": "2113591601", "name": "Robin Allen"}]}, {"paperId": "78fc3b741828124d8a79667466516a544143bf68", "externalIds": {"MAG": "1628475528", "DOI": "10.1049/sqj.1964.0069", "CorpusId": - 142554420}, "url": "https://www.semanticscholar.org/paper/78fc3b741828124d8a79667466516a544143bf68", + 142554420}, "corpusId": 142554420, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/78fc3b741828124d8a79667466516a544143bf68", "title": "Computers and Thought", "abstract": "Computers and Thought showcases the work of the scientists who not only defined the field of Artificial Intelligence, but who are responsible for having developed it into what it is today. Originally @@ -11947,14 +13640,17 @@ interactions: Minsky. Ulric Neisser. Allen Newell. A. L. Samuel. Oliver G. Selfridge. J. C. Shaw. Herbert A. Simon. James R. Slagle. Fred M. Tonge. A. M. Turing. Leonard Uhr. Charles Vossler. Alice K. Wolf.", "venue": "", "year": 1963, "referenceCount": - 0, "citationCount": 1026, "influentialCitationCount": 10, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "1792280", "name": "E. Feigenbaum"}, {"authorId": "144005334", - "name": "J. Feldman"}]}, {"paperId": "167ff88fbcad256710c2bbee906c33f2bb420310", - "externalIds": {"MAG": "1998084650", "DBLP": "conf/stoc/StockmeyerM73", "DOI": - "10.1145/800125.804029", "CorpusId": 13876459}, "url": "https://www.semanticscholar.org/paper/167ff88fbcad256710c2bbee906c33f2bb420310", + 0, "citationCount": 1029, "influentialCitationCount": 10, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "1792280", "name": "E. + Feigenbaum"}, {"authorId": "144005334", "name": "J. Feldman"}]}, {"paperId": + "167ff88fbcad256710c2bbee906c33f2bb420310", "externalIds": {"MAG": "1998084650", + "DBLP": "conf/stoc/StockmeyerM73", "DOI": "10.1145/800125.804029", "CorpusId": + 13876459}, "corpusId": 13876459, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/167ff88fbcad256710c2bbee906c33f2bb420310", "title": "Word problems requiring exponential time(Preliminary Report)", "abstract": "The equivalence problem for Kleene''s regular expressions has several effective solutions, all of which are computationally inefficient. In [1], we showed @@ -11972,17 +13668,19 @@ interactions: in the remaining sections. Complete proofs will appear in the forthcoming papers [9, 10, 13]. In the final section we describe some open problems.", "venue": "Symposium on the Theory of Computing", "year": 1973, "referenceCount": - 16, "citationCount": 832, "influentialCitationCount": 67, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": - "1973-04-30", "journal": {"name": "Proceedings of the fifth annual ACM symposium - on Theory of computing"}, "authors": [{"authorId": "1678332", "name": "L. - Stockmeyer"}, {"authorId": "39792203", "name": "A. Meyer"}]}, {"paperId": - "6262462d541fb6475b2de41a1700ad53803c89da", "externalIds": {"DBLP": "journals/corr/abs-1711-03028", - "ArXiv": "1711.03028", "MAG": "2765547782", "DOI": "10.1145/3139337.3139340", - "CorpusId": 20320624}, "url": "https://www.semanticscholar.org/paper/6262462d541fb6475b2de41a1700ad53803c89da", + 16, "citationCount": 833, "influentialCitationCount": 67, "isOpenAccess": + true, "openAccessPdf": {"url": "http://theory.csail.mit.edu/~meyer/meyer-stockmeyer-word-probs.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], + "publicationDate": "1973-04-30", "journal": {"name": "Proceedings of the fifth + annual ACM symposium on Theory of computing"}, "authors": [{"authorId": "1678332", + "name": "L. Stockmeyer"}, {"authorId": "39792203", "name": "A. Meyer"}]}, + {"paperId": "6262462d541fb6475b2de41a1700ad53803c89da", "externalIds": {"DBLP": + "journals/corr/abs-1711-03028", "ArXiv": "1711.03028", "MAG": "2765547782", + "DOI": "10.1145/3139337.3139340", "CorpusId": 20320624}, "corpusId": 20320624, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6262462d541fb6475b2de41a1700ad53803c89da", "title": "Simplicity: A New Language for Blockchains", "abstract": "Simplicity is a typed, combinator-based, functional language without loops and recursion, designed to be used for crypto-currencies and blockchain applications. It @@ -11998,15 +13696,18 @@ interactions: incomplete, Simplicity can express any finitary function, which we believe is enough to build useful ``smart contracts'''' for blockchain applications.", "venue": "PLAS@CCS", "year": 2017, "referenceCount": 32, "citationCount": - 82, "influentialCitationCount": 7, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "2017-10-30", - "journal": {"name": "Proceedings of the 2017 Workshop on Programming Languages - and Analysis for Security"}, "authors": [{"authorId": "1400522909", "name": - "Russell O''Connor"}]}, {"paperId": "b70a659636df261b1054721f35b6661848c0321c", + 82, "influentialCitationCount": 7, "isOpenAccess": true, "openAccessPdf": + {"url": "http://dl.acm.org/ft_gateway.cfm?id=3139340&type=pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], + "publicationDate": "2017-10-30", "journal": {"name": "Proceedings of the 2017 + Workshop on Programming Languages and Analysis for Security"}, "authors": + [{"authorId": "1400522909", "name": "Russell O''Connor"}]}, {"paperId": "b70a659636df261b1054721f35b6661848c0321c", "externalIds": {"MAG": "2170835539", "DBLP": "conf/stoc/Furer07", "DOI": "10.1145/1250790.1250800", - "CorpusId": 8437794}, "url": "https://www.semanticscholar.org/paper/b70a659636df261b1054721f35b6661848c0321c", + "CorpusId": 8437794}, "corpusId": 8437794, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/b70a659636df261b1054721f35b6661848c0321c", "title": "Faster integer multiplication", "abstract": "For more than 35 years, the fastest known method for integer multiplication has been the Sch\u00f6nhage-Strassen algorithm running in time O(n log n log log n). Under certain restrictive @@ -12017,15 +13718,21 @@ interactions: result is for boolean circuits as well as for multitape Turing machines, but it has consequences to other models of computation as well.", "venue": "Symposium on the Theory of Computing", "year": 2007, "referenceCount": 34, "citationCount": - 429, "influentialCitationCount": 19, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-06-11", "journal": {"name": "SIAM - J. Comput.", "pages": "979-1005", "volume": "39"}, "authors": [{"authorId": - "3306188", "name": "Martin F\u00fcrer"}]}, {"paperId": "9ac9423df2be670e9210472c11b408bc4cae0594", - "externalIds": {"DBLP": "journals/mscs/Selinger04", "MAG": "1999626800", "DOI": - "10.1017/S0960129504004256", "CorpusId": 54738}, "url": "https://www.semanticscholar.org/paper/9ac9423df2be670e9210472c11b408bc4cae0594", + 433, "influentialCitationCount": 19, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-06-11", "journal": {"name": "SIAM J. Comput.", "pages": "979-1005", + "volume": "39"}, "authors": [{"authorId": "3306188", "name": "Martin F\u00fcrer"}]}, + {"paperId": "9ac9423df2be670e9210472c11b408bc4cae0594", "externalIds": {"DBLP": + "journals/mscs/Selinger04", "MAG": "1999626800", "DOI": "10.1017/S0960129504004256", + "CorpusId": 54738}, "corpusId": 54738, "publicationVenue": {"id": "1a00fc67-b5a0-4dae-993c-023e6c11659a", + "name": "Mathematical Structures in Computer Science", "type": "journal", + "alternate_names": ["Math Struct Comput Sci"], "issn": "0960-1295", "url": + "https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=MSC", + "http://journals.cambridge.org/MSC"]}, "url": "https://www.semanticscholar.org/paper/9ac9423df2be670e9210472c11b408bc4cae0594", "title": "Towards a quantum programming language", "abstract": "We propose the design of a programming language for quantum computing. Traditionally, quantum algorithms are frequently expressed at the hardware level, for instance @@ -12037,15 +13744,19 @@ interactions: free of run-time errors, and has an interesting denotational semantics in terms of complete partial orders of superoperators.", "venue": "Mathematical Structures in Computer Science", "year": 2004, "referenceCount": 19, "citationCount": - 452, "influentialCitationCount": 62, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-08-01", "journal": - {"name": "Mathematical Structures in Computer Science", "pages": "527 - 586", - "volume": "14"}, "authors": [{"authorId": "2837600", "name": "P. Selinger"}]}, - {"paperId": "d8a67b13e2d4051dd7a451232314a5d778a1b047", "externalIds": {"MAG": - "2050487400", "DBLP": "journals/ieeecc/Garraway99", "DOI": "10.1109/MCC.1999.766975", - "CorpusId": 39508510}, "url": "https://www.semanticscholar.org/paper/d8a67b13e2d4051dd7a451232314a5d778a1b047", + 455, "influentialCitationCount": 62, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-08-01", "journal": {"name": "Mathematical Structures in Computer Science", + "pages": "527 - 586", "volume": "14"}, "authors": [{"authorId": "2837600", + "name": "P. Selinger"}]}, {"paperId": "d8a67b13e2d4051dd7a451232314a5d778a1b047", + "externalIds": {"MAG": "2050487400", "DBLP": "journals/ieeecc/Garraway99", + "DOI": "10.1109/MCC.1999.766975", "CorpusId": 39508510}, "corpusId": 39508510, + "publicationVenue": {"id": "c9717137-4a4b-4e45-8ae9-af53cdbf8aa5", "name": + "IEEE Concurrency", "type": "journal", "alternate_names": ["IEEE Concurr"], + "issn": "1092-3063", "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=4434"}, + "url": "https://www.semanticscholar.org/paper/d8a67b13e2d4051dd7a451232314a5d778a1b047", "title": "Parallel Computer Architecture: A Hardware/Software Approach", "abstract": "enter the circuit several times, possibly via different input processors. More elaborate combinatorial considerations than for standard VLSI circuits @@ -12059,12 +13770,13 @@ interactions: of Turing machines. Finally, he shows how communication complexity can be used to obtain lower bounds on the size and the depth of decisions nees and branching programs.", "venue": "IEEE Concurrency", "year": 1999, "referenceCount": - 0, "citationCount": 516, "influentialCitationCount": 51, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1999-04-01", "journal": {"name": "IEEE Concurrency", "pages": "83-84", "volume": - "7"}, "authors": [{"authorId": "2234212", "name": "Hugh Garraway"}]}]} + 0, "citationCount": 515, "influentialCitationCount": 51, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-04-01", "journal": {"name": "IEEE Concurrency", "pages": + "83-84", "volume": "7"}, "authors": [{"authorId": "2234212", "name": "Hugh + Garraway"}]}]} ' headers: @@ -12073,31 +13785,31 @@ interactions: Connection: - keep-alive Content-Length: - - '126680' + - '149769' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:25 GMT + - Tue, 03 Jan 2023 20:52:54 GMT Via: - - 1.1 e40594d191a88dc4bce1cbdfa1173f2a.cloudfront.net (CloudFront) + - 1.1 b0cb9245c8703f606e2b3987ee6890c0.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - 69V3yUOUOX6kXTFCmYYvxuIDSaGXGtG74qpiiP4RaxATTCsoX7z_Nw== + - dQluELithyzvVDkctoe5-i4mJpypIF7M8NNYblMpSEW3fFwweVTfnA== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detFCER4PHcFxnQ= + - eLxR-FLvPHcFuxg= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '126680' + - '149769' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:25 GMT + - Tue, 03 Jan 2023 20:52:54 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 1ca3fd7e-d5f6-4c6a-a29b-e4740839bac3 + - 63744602-56d7-49d2-b91e-22b77341bc67 status: code: 200 message: OK @@ -12113,78 +13825,49 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=600&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=600&limit=100 response: body: - string: '{"total": 133388, "offset": 600, "next": 700, "data": [{"paperId": - "c15a3e684f0704ad7da7156447a56836262ddc51", "externalIds": {"MAG": "1965688143", - "DOI": "10.1063/1.882734", "CorpusId": 117031276}, "url": "https://www.semanticscholar.org/paper/c15a3e684f0704ad7da7156447a56836262ddc51", - "title": "An Introduction to Nonlinear Chemical Dynamics: Oscillations, Waves, - Patterns, and Chaos", "abstract": "Part I: Overview 1. Introduction - A Bit - of History 2. Fundamentals 3. Apparatus 4. Chemical Oscillations: Synthesis - 5. Chemical Oscillations: Analysis 6. Waves and Patterns 7. Computational - Tools Part II: Special Topics 8. Complex Oscillations and Chaos 9. Transport - and External Field Effects 10. Delays and Differential Delay Equations 11. - Polymer Systems 12. Coupled Oscillators 13. Biological Oscillators 14. Turing - Patterns 15. Stirring and Mixing Effects Appendix I Demonstrations A1.1 The - Briggs-Rauscher Reaction A1.2 The Belousov-Zhabotinsky Reaction A1.3 BZ Waves - A1.4 A Propagating pH Front Appendix 2 Experiments for the Undergraduate Lab - A2.1 Frontal Polymerization A2.2 Oscillations in the Homogeneous Belousov-Zhabotinsky - Reaction A2.3 Unstirred BZ System: \"Measuring Rate Constants with a Ruler\" - Bibliography", "venue": "", "year": 1998, "referenceCount": 0, "citationCount": - 548, "influentialCitationCount": 18, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "1998-10-22", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144854275", "name": "I. Epstein"}, {"authorId": "5602064", - "name": "J. Pojman"}]}, {"paperId": "c7fc263ee928468efccddd751b7e6a0e92cf69f6", - "externalIds": {"MAG": "2184303230", "DBLP": "journals/iacr/AnanthBGSZ13", - "CorpusId": 8302612}, "url": "https://www.semanticscholar.org/paper/c7fc263ee928468efccddd751b7e6a0e92cf69f6", - "title": "Differing-Inputs Obfuscation and Applications", "abstract": "In - this paper, we study of the notion of differing-input obfuscation, introduced - by Barak et al. (CRYPTO 2001, JACM 2012). For any two circuits C0 and C1, - a differing-input obfuscator diO guarantees that the non-existence of an adversary - that can find an input on which C0 and C1 differ implies that diO(C0) and - diO(C1) are computationally indistinguishable. We show many applications of - this notion: We define the notion of a differing-input obfuscator for Turing - machines and give a construction for the same (without converting it to a - circuit) with input-specific running times. More specifically, for each input, - our obfuscated Turning machine takes time proportional to the running time - of the Turing machine on that specific input rather than the machine\u2019s - worst-case running time. We give a functional encryption scheme that allows - for secret-keys to be associated with Turing machines, and thereby achieves - input-specific running times. Further, we can equip our functional encryption - scheme with delegation properties. We construct a multi-party non-interactive - key exchange protocol with no trusted setup where all parties post only logarithmic-size - messages. It is the first such scheme with such short messages. We similarly - obtain a broadcast encryption system where the ciphertext overhead and secret-key - size is constant (i.e. independent of the number of users), and the public - key is logarithmic in the number of users. All our constructions make inherent - use of the power provided by differing-input obfuscation. It is not currently - known how to construct systems with these properties from the weaker notion - of indistinguishability obfuscation.", "venue": "IACR Cryptology ePrint Archive", - "year": 2013, "referenceCount": 37, "citationCount": 132, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "IACR Cryptol. ePrint Arch.", "pages": "689", "volume": - "2013"}, "authors": [{"authorId": "2616991", "name": "P. Ananth"}, {"authorId": - "1752788", "name": "D. Boneh"}, {"authorId": "38430392", "name": "Sanjam Garg"}, - {"authorId": "1695851", "name": "A. Sahai"}, {"authorId": "2240075", "name": - "Mark Zhandry"}]}, {"paperId": "24cb409b8887aecccafe90c186c870e46517f7e6", - "externalIds": {"MAG": "1536945077", "DOI": "10.1007/978-94-011-1156-0", "CorpusId": - 118853206}, "url": "https://www.semanticscholar.org/paper/24cb409b8887aecccafe90c186c870e46517f7e6", + string: '{"total": 133751, "offset": 600, "next": 700, "data": [{"paperId": + "24cb409b8887aecccafe90c186c870e46517f7e6", "externalIds": {"MAG": "1536945077", + "DOI": "10.1007/978-94-011-1156-0", "CorpusId": 118853206}, "corpusId": 118853206, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/24cb409b8887aecccafe90c186c870e46517f7e6", "title": "Chemical waves and patterns", "abstract": null, "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 641, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2433318", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2433318", "name": "R. Kapral"}, {"authorId": "6286893", "name": "K. Showalter"}]}, {"paperId": - "7abd1da0a8c724c48ac1954d160c45e500cc481e", "externalIds": {"MAG": "2038569833", - "DBLP": "journals/corr/TraversaV14", "ArXiv": "1405.0931", "DOI": "10.1109/TNNLS.2015.2391182", - "CorpusId": 1406042, "PubMed": "25667360"}, "url": "https://www.semanticscholar.org/paper/7abd1da0a8c724c48ac1954d160c45e500cc481e", + "7aeb11dad225684675d56e767686e7d02df5cb3b", "externalIds": {"ArXiv": "quant-ph/9607014", + "DBLP": "journals/corr/quant-ph-9607014", "MAG": "2153887174", "CorpusId": + 13957550}, "corpusId": 13957550, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7aeb11dad225684675d56e767686e7d02df5cb3b", + "title": "A Quantum Algorithm for Finding the Minimum", "abstract": "Let T[0..N\u22121] + be an unsorted table of N items, eachholding a value from an ordered set. + For simplicity,assume that all values are distinct. The minimumsearchingproblem + is to \ufb01nd the index ysuch that T[y]is minimum. This clearly requires + a linear number ofprobes on a classical probabilistic Turing machine.Here, + we give a simple quantum algorithm whichsolves the problem using O(\u221aN) + probes. The mainsubroutine is the quantum exponential searching al-gorithm + of [2], which itself is a generalization ofGrover\u2019s recent quantum searching + algorithm [3].Due to a general lower bound of [1], this is withina constant + factor of the optimum.", "venue": "ArXiv", "year": 1996, "referenceCount": + 6, "citationCount": 475, "influentialCitationCount": 94, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-07-18", "journal": + {"name": "ArXiv", "volume": "quant-ph/9607014"}, "authors": [{"authorId": + "144494202", "name": "C. D\u00fcrr"}, {"authorId": "47231509", "name": "P. + H\u00f8yer"}]}, {"paperId": "7abd1da0a8c724c48ac1954d160c45e500cc481e", "externalIds": + {"MAG": "2038569833", "DBLP": "journals/corr/TraversaV14", "ArXiv": "1405.0931", + "DOI": "10.1109/TNNLS.2015.2391182", "CorpusId": 1406042, "PubMed": "25667360"}, + "corpusId": 1406042, "publicationVenue": {"id": "79c5a18d-0295-432c-aaa5-961d73de6d88", + "name": "IEEE Transactions on Neural Networks and Learning Systems", "alternate_names": + ["IEEE Trans Neural Netw Learn Syst"], "issn": "2162-237X", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=5962385", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5962385"]}, + "url": "https://www.semanticscholar.org/paper/7abd1da0a8c724c48ac1954d160c45e500cc481e", "title": "Universal Memcomputing Machines", "abstract": "We introduce the notion of universal memcomputing machines (UMMs): a class of brain-inspired general-purpose computing machines based on systems with memory, whereby processing @@ -12203,38 +13886,19 @@ interactions: practical realization of these UMMs would represent a paradigm shift from the present von Neumann architectures, bringing us closer to brain-like neural computation.", "venue": "IEEE Transactions on Neural Networks and Learning - Systems", "year": 2014, "referenceCount": 55, "citationCount": 106, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science", - "Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, + Systems", "year": 2014, "referenceCount": 55, "citationCount": 107, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1405.0931", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Computer Science", "Physics", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2014-05-05", "journal": {"name": "IEEE Transactions on Neural Networks and Learning Systems", "pages": "2702-2715", "volume": "26"}, "authors": [{"authorId": "2346297", "name": "F. Traversa"}, - {"authorId": "4700102", "name": "M. Ventra"}]}, {"paperId": "7aeb11dad225684675d56e767686e7d02df5cb3b", - "externalIds": {"ArXiv": "quant-ph/9607014", "DBLP": "journals/corr/quant-ph-9607014", - "MAG": "2153887174", "CorpusId": 13957550}, "url": "https://www.semanticscholar.org/paper/7aeb11dad225684675d56e767686e7d02df5cb3b", - "title": "A Quantum Algorithm for Finding the Minimum", "abstract": "Let T[0..N\u22121] - be an unsorted table of N items, eachholding a value from an ordered set. - For simplicity,assume that all values are distinct. The minimumsearchingproblem - is to \ufb01nd the index ysuch that T[y]is minimum. This clearly requires - a linear number ofprobes on a classical probabilistic Turing machine.Here, - we give a simple quantum algorithm whichsolves the problem using O(\u221aN) - probes. The mainsubroutine is the quantum exponential searching al-gorithm - of [2], which itself is a generalization ofGrover\u2019s recent quantum searching - algorithm [3].Due to a general lower bound of [1], this is withina constant - factor of the optimum.", "venue": "ArXiv", "year": 1996, "referenceCount": - 6, "citationCount": 457, "influentialCitationCount": 85, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-07-18", "journal": {"name": "ArXiv", - "volume": "quant-ph/9607014"}, "authors": [{"authorId": "144494202", "name": - "C. D\u00fcrr"}, {"authorId": "47231509", "name": "P. H\u00f8yer"}]}, {"paperId": - "cb46fa7f43d7d5fd45287057675d448db88b4f8a", "externalIds": {"MAG": "1599279755", - "CorpusId": 153321403}, "url": "https://www.semanticscholar.org/paper/cb46fa7f43d7d5fd45287057675d448db88b4f8a", + {"authorId": "4700102", "name": "M. Ventra"}]}, {"paperId": "cb46fa7f43d7d5fd45287057675d448db88b4f8a", + "externalIds": {"MAG": "1599279755", "CorpusId": 153321403}, "corpusId": 153321403, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cb46fa7f43d7d5fd45287057675d448db88b4f8a", "title": "The Cyclical Behavior of Marginal Cost and Price", "abstract": "The author examines the cyclical behavior of price/marginal cost margins for U.S. manufac turing after 1956. Short-run marginal cost is markedly procyclical. @@ -12246,14 +13910,15 @@ interactions: producing; they support theories that explain low production in a recession by the inability of firms to sell their output. Copyright 1987 by American Economic Association.", "venue": "", "year": 1987, "referenceCount": 16, "citationCount": - 549, "influentialCitationCount": 83, "isOpenAccess": false, "fieldsOfStudy": - ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, - {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "The American Economic - Review", "pages": "838-855", "volume": "77"}, "authors": [{"authorId": "119336246", - "name": "M. Bils"}]}, {"paperId": "4dcf27fa98e8d36a29270b0e100ebe46d74a27ce", + 551, "influentialCitationCount": 83, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "The + American Economic Review", "pages": "838-855", "volume": "77"}, "authors": + [{"authorId": "119336246", "name": "M. Bils"}]}, {"paperId": "4dcf27fa98e8d36a29270b0e100ebe46d74a27ce", "externalIds": {"MAG": "2156184725", "DBLP": "conf/focs/AleliunasKLLR79", - "DOI": "10.1109/SFCS.1979.34", "CorpusId": 18719861}, "url": "https://www.semanticscholar.org/paper/4dcf27fa98e8d36a29270b0e100ebe46d74a27ce", + "DOI": "10.1109/SFCS.1979.34", "CorpusId": 18719861}, "corpusId": 18719861, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4dcf27fa98e8d36a29270b0e100ebe46d74a27ce", "title": "Random walks, universal traversal sequences, and the complexity of maze problems", "abstract": "It is well known that the reachability problem for directed graphs is logspace-complete for the complexity class NSPACE(log @@ -12267,18 +13932,20 @@ interactions: the undirected reachability problem is structurally different from, and easier than, the directed version. These results are an affirmative answer to a question of S. Cook.", "venue": "20th Annual Symposium on Foundations of Computer Science - (sfcs 1979)", "year": 1979, "referenceCount": 7, "citationCount": 686, "influentialCitationCount": - 36, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1979-10-29", "journal": {"name": "20th Annual Symposium - on Foundations of Computer Science (sfcs 1979)", "pages": "218-223"}, "authors": - [{"authorId": "2500179", "name": "R. Aleliunas"}, {"authorId": "47546648", - "name": "R. Karp"}, {"authorId": "1728571", "name": "R. Lipton"}, {"authorId": - "1725557", "name": "L. Lov\u00e1sz"}, {"authorId": "1693615", "name": "C. - Rackoff"}]}, {"paperId": "6c25fd7bc3855f706fe7653fb6ec0a4761d401dd", "externalIds": - {"DBLP": "conf/stoc/KarpL80", "MAG": "1970089350", "DOI": "10.1145/800141.804678", - "CorpusId": 1458043}, "url": "https://www.semanticscholar.org/paper/6c25fd7bc3855f706fe7653fb6ec0a4761d401dd", + (sfcs 1979)", "year": 1979, "referenceCount": 7, "citationCount": 687, "influentialCitationCount": + 36, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1979-10-29", "journal": + {"name": "20th Annual Symposium on Foundations of Computer Science (sfcs 1979)", + "pages": "218-223"}, "authors": [{"authorId": "2500179", "name": "R. Aleliunas"}, + {"authorId": "47546648", "name": "R. Karp"}, {"authorId": "1728571", "name": + "R. Lipton"}, {"authorId": "1725557", "name": "L. Lov\u00e1sz"}, {"authorId": + "1693615", "name": "C. Rackoff"}]}, {"paperId": "6c25fd7bc3855f706fe7653fb6ec0a4761d401dd", + "externalIds": {"DBLP": "conf/stoc/KarpL80", "MAG": "1970089350", "DOI": "10.1145/800141.804678", + "CorpusId": 1458043}, "corpusId": 1458043, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/6c25fd7bc3855f706fe7653fb6ec0a4761d401dd", "title": "Some connections between nonuniform and uniform complexity classes", "abstract": "It is well known that every set in P has small circuits [13]. Adleman [1] has recently proved the stronger result that every set accepted @@ -12291,56 +13958,17 @@ interactions: our basic notion of nonuniform complexity. Then we will show how to relate it to more common notions.", "venue": "Symposium on the Theory of Computing", "year": 1980, "referenceCount": 19, "citationCount": 606, "influentialCitationCount": - 61, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 61, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800141.804678", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1980-04-28", "journal": {"pages": "302-309"}, "authors": [{"authorId": "47546648", "name": "R. Karp"}, - {"authorId": "1728571", "name": "R. Lipton"}]}, {"paperId": "f208e8cf2b8ba9e251a19293b6088f3ddafaa757", - "externalIds": {"MAG": "1545666019", "DBLP": "books/daglib/0080645", "CorpusId": - 5126012}, "url": "https://www.semanticscholar.org/paper/f208e8cf2b8ba9e251a19293b6088f3ddafaa757", - "title": "Theory of computation", "abstract": "Part 1 Introduction: Preliminaries - Languages and Computation. Part 2 Models: Finite Automata Regular Expressions - Context-Free Grammars Pushdown Automata Turing Machines Functions, Relations, - and Translations. Part 3 Properties: Family Relationships Closure Properties - Decision Problems. Part 4 Onward: Further Topics.", "venue": "", "year": 1986, - "referenceCount": 7, "citationCount": 529, "influentialCitationCount": 32, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"pages": "I-XVIII, 1-558"}, "authors": [{"authorId": "145252366", - "name": "D. Wood"}]}, {"paperId": "2f2cde71ae370c940a0e838372d35c9ea0258569", - "externalIds": {"DBLP": "journals/jns/SteltDHR13", "MAG": "2155145973", "DOI": - "10.1007/s00332-012-9139-0", "CorpusId": 8861764}, "url": "https://www.semanticscholar.org/paper/2f2cde71ae370c940a0e838372d35c9ea0258569", - "title": "Rise and Fall of Periodic Patterns for a Generalized Klausmeier\u2013Gray\u2013Scott - Model", "abstract": null, "venue": "Journal of nonlinear science", "year": - 2013, "referenceCount": 129, "citationCount": 99, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2013-02-01", "journal": {"name": "Journal of Nonlinear Science", "pages": - "39-95", "volume": "23"}, "authors": [{"authorId": "2108140", "name": "S. - V. D. Stelt"}, {"authorId": "1727787", "name": "A. Doelman"}, {"authorId": - "40541372", "name": "G. Hek"}, {"authorId": "144207734", "name": "J. Rademacher"}]}, - {"paperId": "e0f60a5d692d3ebf9a3cebdd238735080939c513", "externalIds": {"PubMedCentral": - "4901335", "MAG": "2409440453", "DOI": "10.1038/srep27624", "CorpusId": 4597119, - "PubMed": "27283843"}, "url": "https://www.semanticscholar.org/paper/e0f60a5d692d3ebf9a3cebdd238735080939c513", - "title": "On the Computational Power of Spiking Neural P Systems with Self-Organization", - "abstract": null, "venue": "Scientific Reports", "year": 2016, "referenceCount": - 73, "citationCount": 78, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-06-10", "journal": - {"name": "Scientific Reports", "volume": "6"}, "authors": [{"authorId": "2115535535", - "name": "Xun Wang"}, {"authorId": "2001220881", "name": "Tao Song"}, {"authorId": - "51417783", "name": "Faming Gong"}, {"authorId": "2054597023", "name": "Pan - Zheng"}]}, {"paperId": "02d4f7fda209c811637dbbf224d1a4f41e12e3c5", "externalIds": - {"MAG": "2964040521", "DOI": "10.7551/mitpress/6270.003.0003", "CorpusId": - 8924840}, "url": "https://www.semanticscholar.org/paper/02d4f7fda209c811637dbbf224d1a4f41e12e3c5", + {"authorId": "1728571", "name": "R. Lipton"}]}, {"paperId": "02d4f7fda209c811637dbbf224d1a4f41e12e3c5", + "externalIds": {"MAG": "2964040521", "DOI": "10.7551/mitpress/6270.003.0003", + "CorpusId": 8924840}, "corpusId": 8924840, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/02d4f7fda209c811637dbbf224d1a4f41e12e3c5", "title": "The Computational Theory of Mind", "abstract": "computational description that could be physically implemented in diverse ways (e.g. through silicon chips, or neurons, or pulleys and levers). CCTM holds that a suitable abstract @@ -12365,39 +13993,102 @@ interactions: A Turing machine has a central processor that operates serially, executing one instruction at a time. Other computational formalisms relax this assumption, allowing multiple processing units that operate in parallel. Classical computationalists - can", "venue": "", "year": 2015, "referenceCount": 197, "citationCount": 89, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3089727", - "name": "Michael Rescorla"}]}, {"paperId": "7935de13b301f69c42b18bd6d55ed900a56fb03b", - "externalIds": {"DBLP": "conf/tamc/2012", "DOI": "10.1007/978-3-642-29952-0", - "CorpusId": 34575949}, "url": "https://www.semanticscholar.org/paper/7935de13b301f69c42b18bd6d55ed900a56fb03b", - "title": "Theory and Applications of Models of Computation", "abstract": null, - "venue": "Lecture Notes in Computer Science", "year": 2012, "referenceCount": - 27, "citationCount": 114, "influentialCitationCount": 7, "isOpenAccess": true, + can", "venue": "", "year": 2015, "referenceCount": 197, "citationCount": 92, + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"volume": "7287"}, "authors": [{"authorId": "49037170", "name": "Rahul Jain"}, - {"authorId": "2048227327", "name": "Sanjay Jain"}, {"authorId": "1699450", - "name": "F. Stephan"}]}, {"paperId": "536589df45c420fc3d491ddb4e00b5c73dfff7b5", + "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3089727", "name": "Michael Rescorla"}]}, {"paperId": "2f2cde71ae370c940a0e838372d35c9ea0258569", + "externalIds": {"DBLP": "journals/jns/SteltDHR13", "MAG": "2155145973", "DOI": + "10.1007/s00332-012-9139-0", "CorpusId": 8861764}, "corpusId": 8861764, "publicationVenue": + {"id": "619f4cc3-1d00-4060-b88d-9854843ac2c2", "name": "Journal of nonlinear + science", "type": "journal", "alternate_names": ["J Nonlinear Sci", "Journal + of Nonlinear Science", "J nonlinear sci"], "issn": "0938-8974", "url": "https://link.springer.com/journal/332"}, + "url": "https://www.semanticscholar.org/paper/2f2cde71ae370c940a0e838372d35c9ea0258569", + "title": "Rise and Fall of Periodic Patterns for a Generalized Klausmeier\u2013Gray\u2013Scott + Model", "abstract": null, "venue": "Journal of nonlinear science", "year": + 2013, "referenceCount": 129, "citationCount": 102, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.math.leidenuniv.nl/%7Edoelman/HP_PUB/ThesisSvdS.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2013-02-01", "journal": {"name": "Journal of Nonlinear Science", "pages": + "39-95", "volume": "23"}, "authors": [{"authorId": "2108140", "name": "S. + V. D. Stelt"}, {"authorId": "1727787", "name": "A. Doelman"}, {"authorId": + "40541372", "name": "G. Hek"}, {"authorId": "144207734", "name": "J. Rademacher"}]}, + {"paperId": "f208e8cf2b8ba9e251a19293b6088f3ddafaa757", "externalIds": {"MAG": + "1545666019", "DBLP": "books/daglib/0080645", "CorpusId": 5126012}, "corpusId": + 5126012, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f208e8cf2b8ba9e251a19293b6088f3ddafaa757", + "title": "Theory of computation", "abstract": "Part 1 Introduction: Preliminaries + Languages and Computation. Part 2 Models: Finite Automata Regular Expressions + Context-Free Grammars Pushdown Automata Turing Machines Functions, Relations, + and Translations. Part 3 Properties: Family Relationships Closure Properties + Decision Problems. Part 4 Onward: Further Topics.", "venue": "", "year": 1986, + "referenceCount": 7, "citationCount": 529, "influentialCitationCount": 32, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"pages": "I-XVIII, 1-558"}, "authors": + [{"authorId": "145252366", "name": "D. Wood"}]}, {"paperId": "e0f60a5d692d3ebf9a3cebdd238735080939c513", + "externalIds": {"PubMedCentral": "4901335", "MAG": "2409440453", "DOI": "10.1038/srep27624", + "CorpusId": 4597119, "PubMed": "27283843"}, "corpusId": 4597119, "publicationVenue": + {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", "name": "Scientific Reports", + "type": "journal", "alternate_names": ["Sci Rep"], "issn": "2045-2322", "url": + "http://www.nature.com/srep/", "alternate_urls": ["http://www.nature.com/srep/index.html"]}, + "url": "https://www.semanticscholar.org/paper/e0f60a5d692d3ebf9a3cebdd238735080939c513", + "title": "On the Computational Power of Spiking Neural P Systems with Self-Organization", + "abstract": null, "venue": "Scientific Reports", "year": 2016, "referenceCount": + 73, "citationCount": 78, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.nature.com/articles/srep27624.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-06-10", "journal": + {"name": "Scientific Reports", "volume": "6"}, "authors": [{"authorId": "2115535535", + "name": "Xun Wang"}, {"authorId": "2001220881", "name": "Tao Song"}, {"authorId": + "51417783", "name": "Faming Gong"}, {"authorId": "2054597023", "name": "Pan + Zheng"}]}, {"paperId": "7935de13b301f69c42b18bd6d55ed900a56fb03b", "externalIds": + {"DBLP": "conf/tamc/2012", "DOI": "10.1007/978-3-642-29952-0", "CorpusId": + 34575949}, "corpusId": 34575949, "publicationVenue": {"id": "2f5d0e8a-faad-4f10-b323-2b2e3c439a78", + "name": "Lecture Notes in Computer Science", "type": "journal", "alternate_names": + ["LNCS", "Transactions on Computational Systems Biology", "Trans Comput Syst + Biology", "Lect Note Comput Sci"], "issn": "0302-9743", "alternate_issns": + ["1861-2059", "1861-2075", "1866-4733"], "url": "http://www.springer.com/lncs", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-164-2-73659-0,00.html", + "https://link.springer.com/bookseries/558", "http://link.springer.com/search?query=\"Transactions+on+Computational+Systems+Biology\""]}, + "url": "https://www.semanticscholar.org/paper/7935de13b301f69c42b18bd6d55ed900a56fb03b", + "title": "Theory and Applications of Models of Computation", "abstract": null, + "venue": "Lecture Notes in Computer Science", "year": 2012, "referenceCount": + 27, "citationCount": 119, "influentialCitationCount": 7, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-642-29952-0%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "7287"}, "authors": [{"authorId": "49037170", + "name": "Rahul Jain"}, {"authorId": "2048227327", "name": "Sanjay Jain"}, + {"authorId": "1699450", "name": "F. Stephan"}]}, {"paperId": "536589df45c420fc3d491ddb4e00b5c73dfff7b5", "externalIds": {"DOI": "10.1038/35106533", "CorpusId": 4423828, "PubMed": - "11719800"}, "url": "https://www.semanticscholar.org/paper/536589df45c420fc3d491ddb4e00b5c73dfff7b5", + "11719800"}, "corpusId": 4423828, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/536589df45c420fc3d491ddb4e00b5c73dfff7b5", "title": "Programmable and autonomous computing machine made of biomolecules", "abstract": null, "venue": "Nature", "year": 2001, "referenceCount": 38, "citationCount": - 410, "influentialCitationCount": 14, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "Nature", - "pages": "430-434", "volume": "414"}, "authors": [{"authorId": "3390736", - "name": "Y. Benenson"}, {"authorId": "1402796662", "name": "T. Paz-Elizur"}, - {"authorId": "2430171", "name": "R. Adar"}, {"authorId": "2234245", "name": - "E. Keinan"}, {"authorId": "5637279", "name": "Z. Livneh"}, {"authorId": "143752440", - "name": "E. Shapiro"}]}, {"paperId": "4e9ba5df1937f230fc6000b6feac6afde83f3aa0", - "externalIds": {"DBLP": "journals/corr/Dube10", "CorpusId": 5773521}, "url": - "https://www.semanticscholar.org/paper/4e9ba5df1937f230fc6000b6feac6afde83f3aa0", + 410, "influentialCitationCount": 14, "isOpenAccess": true, "openAccessPdf": + {"url": "https://europepmc.org/articles/pmc3838952?pdf=render", "status": + "GREEN"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Nature", "pages": "430-434", "volume": "414"}, + "authors": [{"authorId": "3390736", "name": "Y. Benenson"}, {"authorId": "1402796662", + "name": "T. Paz-Elizur"}, {"authorId": "2430171", "name": "R. Adar"}, {"authorId": + "2234245", "name": "E. Keinan"}, {"authorId": "5637279", "name": "Z. Livneh"}, + {"authorId": "143752440", "name": "E. Shapiro"}]}, {"paperId": "4e9ba5df1937f230fc6000b6feac6afde83f3aa0", + "externalIds": {"DBLP": "journals/corr/Dube10", "CorpusId": 5773521}, "corpusId": + 5773521, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4e9ba5df1937f230fc6000b6feac6afde83f3aa0", "title": "The P versus NP Problem", "abstract": "The P versus NP problem is to determine whether every language accepted by some nondeterministic algorithm in polynomial time is also accepted by some (deterministic) algorithm in polynomial @@ -12427,25 +14118,55 @@ interactions: this computation ends in the rejecting state, or if the computation fails to terminate. The language accepted by M , denoted L(M), has associated alphabet \u03a3 and is defined by L(M) = {w \u2208 \u03a3\u2217 | M accepts w}.", "venue": - "ArXiv", "year": 2010, "referenceCount": 65, "citationCount": 168, "influentialCitationCount": - 28, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "ArXiv", "volume": "abs/1001.3816"}, - "authors": [{"authorId": "1765456", "name": "S. Cook"}]}, {"paperId": "f3534b4ba0bf29e3f913e3489aab4f73983a031f", + "ArXiv", "year": 2010, "referenceCount": 65, "citationCount": 171, "influentialCitationCount": + 28, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "ArXiv", "volume": "abs/1001.3816"}, "authors": [{"authorId": "1765456", + "name": "S. Cook"}]}, {"paperId": "f3534b4ba0bf29e3f913e3489aab4f73983a031f", "externalIds": {"MAG": "1987309612", "PubMedCentral": "7088525", "DOI": "10.1007/s11071-012-0330-5", - "CorpusId": 119772634, "PubMed": "32214667"}, "url": "https://www.semanticscholar.org/paper/f3534b4ba0bf29e3f913e3489aab4f73983a031f", + "CorpusId": 119772634, "PubMed": "32214667"}, "corpusId": 119772634, "publicationVenue": + {"id": "10925c1c-0929-4ec5-8268-a8a52bd84631", "name": "Nonlinear dynamics", + "type": "journal", "alternate_names": ["Nonlinear Dyn", "Nonlinear Dynamics", + "Nonlinear dyn"], "issn": "0924-090X", "url": "http://www.springer.com/11071", + "alternate_urls": ["https://link.springer.com/journal/11071"]}, "url": "https://www.semanticscholar.org/paper/f3534b4ba0bf29e3f913e3489aab4f73983a031f", "title": "Pattern formation of an epidemic model with diffusion", "abstract": null, "venue": "Nonlinear dynamics", "year": 2012, "referenceCount": 37, "citationCount": - 109, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-01-28", "journal": {"name": "Nonlinear Dynamics", - "pages": "1097 - 1104", "volume": "69"}, "authors": [{"authorId": "47334108", - "name": "Gui\u2010Quan Sun"}]}, {"paperId": "d255fc36f014311b3d12616c3271712b054984b8", + 116, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://europepmc.org/articles/pmc7088525?pdf=render", "status": + "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-01-28", "journal": {"name": "Nonlinear + Dynamics", "pages": "1097 - 1104", "volume": "69"}, "authors": [{"authorId": + "47334108", "name": "Gui\u2010Quan Sun"}]}, {"paperId": "3a34baf9434f8d785bfe34f69c0a5e2f0b13f6c7", + "externalIds": {"MAG": "1495630617", "DBLP": "conf/raid/TranEBJFN11", "DOI": + "10.1007/978-3-642-23644-0_7", "CorpusId": 17451039}, "corpusId": 17451039, + "publicationVenue": {"id": "e3577b87-36a2-4ea4-ad53-88a885af1223", "name": + "International Symposium on Recent Advances in Intrusion Detection", "type": + "conference", "alternate_names": ["Recent Adv Intrusion Detect", "Recent Advances + in Intrusion Detection", "Int Symp Recent Adv Intrusion Detect", "RAID"], + "url": "http://www.raid-symposium.org/"}, "url": "https://www.semanticscholar.org/paper/3a34baf9434f8d785bfe34f69c0a5e2f0b13f6c7", + "title": "On the Expressiveness of Return-into-libc Attacks", "abstract": + null, "venue": "International Symposium on Recent Advances in Intrusion Detection", + "year": 2011, "referenceCount": 39, "citationCount": 149, "influentialCitationCount": + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2011-09-20", + "journal": {"pages": "121-141"}, "authors": [{"authorId": "2054039687", "name": + "M. Tran"}, {"authorId": "47684264", "name": "M. Etheridge"}, {"authorId": + "3139420", "name": "T. Bletsch"}, {"authorId": "1740888", "name": "Xuxian + Jiang"}, {"authorId": "1752331", "name": "V. Freeh"}, {"authorId": "1756489", + "name": "P. Ning"}]}, {"paperId": "d255fc36f014311b3d12616c3271712b054984b8", "externalIds": {"DBLP": "journals/cacm/Vardi12a", "MAG": "2072055022", "DOI": - "10.1145/2093548.2093549", "CorpusId": 35705197}, "url": "https://www.semanticscholar.org/paper/d255fc36f014311b3d12616c3271712b054984b8", + "10.1145/2093548.2093549", "CorpusId": 35705197}, "corpusId": 35705197, "publicationVenue": + {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", "name": "Communications of + the ACM", "type": "journal", "alternate_names": ["Commun ACM", "Communications + of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/d255fc36f014311b3d12616c3271712b054984b8", "title": "What is an algorithm?", "abstract": "This may seem to be a strange question to ask just before the Turing Centenary Year, which is now being celebrated by numerous events around the world (see http://www.turingcentenary.eu/). @@ -12498,15 +14219,29 @@ interactions: is. An algorithm is both an abstract state machine and a recursor, and neither view by itself fully describes what an algorithm is. This algorithmic duality seems to be a fundamental principle of computer science.", "venue": "Communications - of the ACM", "year": 2012, "referenceCount": 0, "citationCount": 95, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + of the ACM", "year": 2012, "referenceCount": 0, "citationCount": 97, "influentialCitationCount": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/2093548.2093549", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-01", "journal": {"name": "Communications of the ACM", "pages": "5 - 5", "volume": "55"}, "authors": [{"authorId": "9083969", - "name": "Moshe Y. Vardi"}]}, {"paperId": "ba69646e1c7dd4212a9b75eb1ae38773a6528878", - "externalIds": {"MAG": "1540715591", "DBLP": "books/lib/BoolosJ74", "DOI": - "10.1017/cbo9781139164931", "CorpusId": 45864339}, "url": "https://www.semanticscholar.org/paper/ba69646e1c7dd4212a9b75eb1ae38773a6528878", + "name": "Moshe Y. Vardi"}]}, {"paperId": "f7604cae3e8f5e4d1dbd4f176c214071ae8f5825", + "externalIds": {"MAG": "2102265921", "DOI": "10.1007/S11071-014-1438-6", "CorpusId": + 122568821}, "corpusId": 122568821, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f7604cae3e8f5e4d1dbd4f176c214071ae8f5825", + "title": "Spatio-temporal dynamics of a reaction-diffusion system for a predator\u2013prey + model with hyperbolic mortality", "abstract": null, "venue": "", "year": 2014, + "referenceCount": 37, "citationCount": 90, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2014-05-27", "journal": {"name": "Nonlinear Dynamics", "pages": "265-277", + "volume": "78"}, "authors": [{"authorId": "1742870", "name": "Tonghua Zhang"}, + {"authorId": "3329591", "name": "Yepeng Xing"}, {"authorId": "144921840", + "name": "Hong Zang"}, {"authorId": "6828401", "name": "Maoan Han"}]}, {"paperId": + "ba69646e1c7dd4212a9b75eb1ae38773a6528878", "externalIds": {"MAG": "1540715591", + "DBLP": "books/lib/BoolosJ74", "DOI": "10.1017/cbo9781139164931", "CorpusId": + 45864339}, "corpusId": 45864339, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba69646e1c7dd4212a9b75eb1ae38773a6528878", "title": "Computability and logic", "abstract": "Part I. Computability Theory: 1. Enumerability 2. Diagonalization 3. Turing computability 4. Uncomputability 5. Abacus computability 6. Recursive functions 7. Recursive sets and relations @@ -12520,41 +14255,79 @@ interactions: Second-order logic 23. Arithmetical definability 24. Decidability of arithmetic without multiplication 25. Non-standard models 26. Ramsey''s theorem 27. Modal logic and provability.", "venue": "", "year": 1974, "referenceCount": 3, "citationCount": - 659, "influentialCitationCount": 17, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"pages": "I-X, 1-262"}, "authors": [{"authorId": "1740268", "name": - "G. Boolos"}, {"authorId": "39260028", "name": "R. Jeffrey"}]}, {"paperId": - "3a34baf9434f8d785bfe34f69c0a5e2f0b13f6c7", "externalIds": {"MAG": "1495630617", - "DBLP": "conf/raid/TranEBJFN11", "DOI": "10.1007/978-3-642-23644-0_7", "CorpusId": - 17451039}, "url": "https://www.semanticscholar.org/paper/3a34baf9434f8d785bfe34f69c0a5e2f0b13f6c7", - "title": "On the Expressiveness of Return-into-libc Attacks", "abstract": - null, "venue": "International Symposium on Recent Advances in Intrusion Detection", - "year": 2011, "referenceCount": 39, "citationCount": 148, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2011-09-20", "journal": {"pages": "121-141"}, - "authors": [{"authorId": "2054039687", "name": "M. Tran"}, {"authorId": "47684264", - "name": "M. Etheridge"}, {"authorId": "3139420", "name": "T. Bletsch"}, {"authorId": - "1740888", "name": "Xuxian Jiang"}, {"authorId": "1752331", "name": "V. Freeh"}, - {"authorId": "1756489", "name": "P. Ning"}]}, {"paperId": "f7604cae3e8f5e4d1dbd4f176c214071ae8f5825", - "externalIds": {"MAG": "2102265921", "DOI": "10.1007/S11071-014-1438-6", "CorpusId": - 122568821}, "url": "https://www.semanticscholar.org/paper/f7604cae3e8f5e4d1dbd4f176c214071ae8f5825", - "title": "Spatio-temporal dynamics of a reaction-diffusion system for a predator\u2013prey - model with hyperbolic mortality", "abstract": null, "venue": "", "year": 2014, - "referenceCount": 37, "citationCount": 84, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-05-27", - "journal": {"name": "Nonlinear Dynamics", "pages": "265-277", "volume": "78"}, - "authors": [{"authorId": "1742870", "name": "Tonghua Zhang"}, {"authorId": - "3329591", "name": "Yepeng Xing"}, {"authorId": "144921840", "name": "Hong - Zang"}, {"authorId": "6828401", "name": "Maoan Han"}]}, {"paperId": "965a6451ba5eca2dc17d0bacac4cabb551edb050", - "externalIds": {"MAG": "1506196175", "DOI": "10.5860/choice.47-1978", "CorpusId": - 60660766}, "url": "https://www.semanticscholar.org/paper/965a6451ba5eca2dc17d0bacac4cabb551edb050", + 659, "influentialCitationCount": 17, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"pages": "I-X, 1-262"}, "authors": + [{"authorId": "1740268", "name": "G. Boolos"}, {"authorId": "39260028", "name": + "R. Jeffrey"}]}, {"paperId": "0d6e83809db5c8071e153b62f7a916d1498a9f4c", "externalIds": + {"MAG": "2057783419", "DOI": "10.1103/PHYSREVE.85.021924", "CorpusId": 25754302, + "PubMed": "22463261"}, "corpusId": 25754302, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0d6e83809db5c8071e153b62f7a916d1498a9f4c", + "title": "Spatial dynamics in a predator-prey model with Beddington-DeAngelis + functional response.", "abstract": "In this paper spatial dynamics of the + Beddington-DeAngelis predator-prey model is investigated. We analyze the linear + stability and obtain the condition of Turing instability of this model. Moreover, + we deduce the amplitude equations and determine the stability of different + patterns. In Turing space, we found that this model has coexistence of H(0) + hexagon patterns and stripe patterns, H(\u03c0) hexagon patterns, and H(0) + hexagon patterns. To better describe the real ecosystem, we consider the ecosystem + as an open system and take the environmental noise into account. It is found + that noise can decrease the number of the patterns and make the patterns more + regular. What is more, noise can induce two kinds of typical pattern transitions. + One is from the H(\u03c0) hexagon patterns to the regular stripe patterns, + and the other is from the coexistence of H(0) hexagon patterns and stripe + patterns to the regular stripe patterns. The obtained results enrich the finding + in the Beddington-DeAngelis predator-prey model well.", "venue": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "year": 2012, + "referenceCount": 64, "citationCount": 96, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-02-28", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 021924\n ", "volume": + "85 2 Pt 1"}, "authors": [{"authorId": "2108192884", "name": "Xiao-Chong Zhang"}, + {"authorId": "47334108", "name": "Gui\u2010Quan Sun"}, {"authorId": "145752193", + "name": "Zhen Jin"}]}, {"paperId": "19b7b3a330d8f4f07cd8752d1e58cccd7f419fe4", + "externalIds": {"DBLP": "journals/tsmc/SiegelmannHG97", "MAG": "2171800554", + "DOI": "10.1109/3477.558801", "CorpusId": 1872756, "PubMed": "18255858"}, + "corpusId": 1872756, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19b7b3a330d8f4f07cd8752d1e58cccd7f419fe4", + "title": "Computational capabilities of recurrent NARX neural networks", "abstract": + "Recently, fully connected recurrent neural networks have been proven to be + computationally rich-at least as powerful as Turing machines. This work focuses + on another network which is popular in control applications and has been found + to be very effective at learning a variety of problems. These networks are + based upon Nonlinear AutoRegressive models with eXogenous Inputs (NARX models), + and are therefore called NARX networks. As opposed to other recurrent networks, + NARX networks have a limited feedback which comes only from the output neuron + rather than from hidden states. They are formalized by y(t)=Psi(u(t-n(u)), + ..., u(t-1), u(t), y(t-n(y)), ..., y(t-1)) where u(t) and y(t) represent input + and output of the network at time t, n(u) and n(y) are the input and output + order, and the function Psi is the mapping performed by a Multilayer Perceptron. + We constructively prove that the NARX networks with a finite number of parameters + are computationally as strong as fully connected recurrent networks and thus + Turing machines. We conclude that in theory one can use the NARX models, rather + than conventional recurrent networks without any computational loss even though + their feedback is limited. Furthermore, these results raise the issue of what + amount of feedback or recurrence is necessary for any network to be Turing + equivalent and what restrictions on feedback limit computational power.", + "venue": "IEEE Trans. Syst. Man Cybern. Part B", "year": 1997, "referenceCount": + 32, "citationCount": 445, "influentialCitationCount": 14, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1997-04-01", "journal": {"name": "IEEE transactions on systems, man, and + cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, + and Cybernetics Society", "pages": "\n 208-15\n ", "volume": + "27 2"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}, {"authorId": + "35216199", "name": "B. Horne"}, {"authorId": "145157784", "name": "C. Lee + Giles"}]}, {"paperId": "965a6451ba5eca2dc17d0bacac4cabb551edb050", "externalIds": + {"MAG": "1506196175", "DOI": "10.5860/choice.47-1978", "CorpusId": 60660766}, + "corpusId": 60660766, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/965a6451ba5eca2dc17d0bacac4cabb551edb050", "title": "Memory and the Computational Brain: Why Cognitive Science will Transform Neuroscience", "abstract": "Preface. 1. Information. Shannon''s Theory of Communication. Measuring Information. Efficient Coding. Information and the @@ -12596,13 +14369,43 @@ interactions: Not Synaptic Conductance? A Molecular or Sub-Molecular Mechanism? Bringing the Data to the Computational Machinery. Is It Universal? References. Glossary. Index.", "venue": "", "year": 2009, "referenceCount": 172, "citationCount": - 226, "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2009-04-20", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "2646034", "name": "C. Gallistel"}, - {"authorId": "2093373961", "name": "A. King"}]}, {"paperId": "ec2df5bc36682ffab59d5e1d774467ce90be5adc", - "externalIds": {"MAG": "187069360", "CorpusId": 118410420}, "url": "https://www.semanticscholar.org/paper/ec2df5bc36682ffab59d5e1d774467ce90be5adc", + 228, "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-04-20", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2646034", + "name": "C. Gallistel"}, {"authorId": "2093373961", "name": "A. King"}]}, + {"paperId": "b771cdafadff9a1697565fea1152a7839ec74108", "externalIds": {"MAG": + "2120108060", "DOI": "10.1093/IMAMAT/HXV006", "CorpusId": 16782895}, "corpusId": + 16782895, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b771cdafadff9a1697565fea1152a7839ec74108", + "title": "Spatial, temporal and spatiotemporal patterns of diffusive predator-prey + models with mutual interference", "abstract": "In this paper, the spatial, + temporal and spatiotemporal dynamics of a reaction\u2013diffusion predator\u2013prey + system with mutual interference described by the Crowley\u2013Martin-type + functional response, under homogeneous Neumann boundary conditions, are studied. + Preliminary analysis on the local asymptotic stability and Hopf bifurcation + of the spatially homogeneous model based on ordinary differential equations + is presented. For the reaction\u2013diffusion model, firstly the invariance, + uniform persistence and global asymptotic stability of the coexistence equilibrium + are discussed. Then it is shown that Turing (diffusion-driven) instability + occurs, which induces spatial inhomogeneous patterns. Next it is proved that + the model exhibits Hopf bifurcation which produces temporal inhomogeneous + patterns. Furthermore, at the points where the Turing instability curve and + Hopf bifurcation curve intersect, it is demonstrated that the model undergoes + Turing\u2013Hopf bifurcation and exhibits spatiotemporal patterns. Finally, + the existence and non-existence of positive non-constant steady states of + the reaction\u2013diffusion model are established. Numerical simulations are + presented to verify and illustrate the theoretical results.", "venue": "", + "year": 2015, "referenceCount": 49, "citationCount": 71, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-10-01", "journal": {"name": "Ima Journal of Applied Mathematics", "pages": + "1534-1568", "volume": "80"}, "authors": [{"authorId": "47115094", "name": + "Hong-bo Shi"}, {"authorId": "145482898", "name": "S. Ruan"}]}, {"paperId": + "ec2df5bc36682ffab59d5e1d774467ce90be5adc", "externalIds": {"MAG": "187069360", + "CorpusId": 118410420}, "corpusId": 118410420, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ec2df5bc36682ffab59d5e1d774467ce90be5adc", "title": "Reaction-Transport Systems: Mesoscopic Foundations, Fronts, and Spatial Instabilities", "abstract": "General Concepts.- Reaction Kinetics.- Reactions and Transport: Diffusion, Inertia, and Subdiffusion.- Random Walks @@ -12614,48 +14417,15 @@ interactions: in Reaction-Diffusion Systems with Temporally or Spatially Varying Parameters..- Chemical and Biological Applications of Turing Systems.- Pattern Formation in Spatially Discrete Systems.", "venue": "", "year": 2010, "referenceCount": - 0, "citationCount": 162, "influentialCitationCount": 10, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2010-06-15", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "143769213", "name": "V. M\u00e9ndez"}, - {"authorId": "145483998", "name": "S. Fedotov"}, {"authorId": "3041313", "name": - "W. Horsthemke"}]}, {"paperId": "19b7b3a330d8f4f07cd8752d1e58cccd7f419fe4", - "externalIds": {"DBLP": "journals/tsmc/SiegelmannHG97", "MAG": "2171800554", - "DOI": "10.1109/3477.558801", "CorpusId": 1872756, "PubMed": "18255858"}, - "url": "https://www.semanticscholar.org/paper/19b7b3a330d8f4f07cd8752d1e58cccd7f419fe4", - "title": "Computational capabilities of recurrent NARX neural networks", "abstract": - "Recently, fully connected recurrent neural networks have been proven to be - computationally rich-at least as powerful as Turing machines. This work focuses - on another network which is popular in control applications and has been found - to be very effective at learning a variety of problems. These networks are - based upon Nonlinear AutoRegressive models with eXogenous Inputs (NARX models), - and are therefore called NARX networks. As opposed to other recurrent networks, - NARX networks have a limited feedback which comes only from the output neuron - rather than from hidden states. They are formalized by y(t)=Psi(u(t-n(u)), - ..., u(t-1), u(t), y(t-n(y)), ..., y(t-1)) where u(t) and y(t) represent input - and output of the network at time t, n(u) and n(y) are the input and output - order, and the function Psi is the mapping performed by a Multilayer Perceptron. - We constructively prove that the NARX networks with a finite number of parameters - are computationally as strong as fully connected recurrent networks and thus - Turing machines. We conclude that in theory one can use the NARX models, rather - than conventional recurrent networks without any computational loss even though - their feedback is limited. Furthermore, these results raise the issue of what - amount of feedback or recurrence is necessary for any network to be Turing - equivalent and what restrictions on feedback limit computational power.", - "venue": "IEEE Trans. Syst. Man Cybern. Part B", "year": 1997, "referenceCount": - 32, "citationCount": 443, "influentialCitationCount": 14, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1997-04-01", "journal": - {"name": "IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics - : a publication of the IEEE Systems, Man, and Cybernetics Society", "pages": - "\n 208-15\n ", "volume": "27 2"}, "authors": [{"authorId": - "2797623", "name": "H. Siegelmann"}, {"authorId": "35216199", "name": "B. - Horne"}, {"authorId": "145157784", "name": "C. Lee Giles"}]}, {"paperId": - "af66165c454a0e94afbab36271fe3deaae0b421a", "externalIds": {"MAG": "2152907450", - "CorpusId": 61491815}, "url": "https://www.semanticscholar.org/paper/af66165c454a0e94afbab36271fe3deaae0b421a", + 0, "citationCount": 163, "influentialCitationCount": 10, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-06-15", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "143769213", + "name": "V. M\u00e9ndez"}, {"authorId": "145483998", "name": "S. Fedotov"}, + {"authorId": "3041313", "name": "W. Horsthemke"}]}, {"paperId": "af66165c454a0e94afbab36271fe3deaae0b421a", + "externalIds": {"MAG": "2152907450", "CorpusId": 61491815}, "corpusId": 61491815, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/af66165c454a0e94afbab36271fe3deaae0b421a", "title": "An Efficient Recognition and Syntax-Analysis Algorithm for Context-Free Languages", "abstract": "Abstract : An efficient algorithm of recognition and syntaxanalysis for the full class of context-free languages without the @@ -12676,14 +14446,15 @@ interactions: is upperbounded by C(5)n cubed (1 + N). The size of required memory can be reduced to the order of n squared, but the computing time rises to the order of n to the 4th power. (Author)", "venue": "", "year": 1965, "referenceCount": - 0, "citationCount": 615, "influentialCitationCount": 41, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1965-07-11", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2612754", - "name": "T. Kasami"}]}, {"paperId": "ed71ebe0eee4f88f095247c8b62ba1d3b217a68d", + 0, "citationCount": 616, "influentialCitationCount": 41, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1965-07-11", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "2612754", "name": "T. Kasami"}]}, {"paperId": "ed71ebe0eee4f88f095247c8b62ba1d3b217a68d", "externalIds": {"MAG": "2045033949", "DOI": "10.1090/S0002-9904-1944-08111-1", - "CorpusId": 2560730}, "url": "https://www.semanticscholar.org/paper/ed71ebe0eee4f88f095247c8b62ba1d3b217a68d", + "CorpusId": 2560730}, "corpusId": 2560730, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ed71ebe0eee4f88f095247c8b62ba1d3b217a68d", "title": "Recursively enumerable sets of positive integers and their decision problems", "abstract": "Introduction. Recent developments of symbolic logic have considerable importance for mathematics both with respect to its philosophy @@ -12710,80 +14481,66 @@ interactions: turned out to be a routine chore. We shall not here reproduce the formal definition of recursive function of positive integers. A simple example of such a function is an", "venue": "", "year": 1944, "referenceCount": 23, "citationCount": - 713, "influentialCitationCount": 62, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1944-05-01", "journal": {"name": "Bulletin of the - American Mathematical Society", "pages": "284-316", "volume": "50"}, "authors": - [{"authorId": "31707060", "name": "Emil L. Post"}]}, {"paperId": "b771cdafadff9a1697565fea1152a7839ec74108", - "externalIds": {"MAG": "2120108060", "DOI": "10.1093/IMAMAT/HXV006", "CorpusId": - 16782895}, "url": "https://www.semanticscholar.org/paper/b771cdafadff9a1697565fea1152a7839ec74108", - "title": "Spatial, temporal and spatiotemporal patterns of diffusive predator-prey - models with mutual interference", "abstract": "In this paper, the spatial, - temporal and spatiotemporal dynamics of a reaction\u2013diffusion predator\u2013prey - system with mutual interference described by the Crowley\u2013Martin-type - functional response, under homogeneous Neumann boundary conditions, are studied. - Preliminary analysis on the local asymptotic stability and Hopf bifurcation - of the spatially homogeneous model based on ordinary differential equations - is presented. For the reaction\u2013diffusion model, firstly the invariance, - uniform persistence and global asymptotic stability of the coexistence equilibrium - are discussed. Then it is shown that Turing (diffusion-driven) instability - occurs, which induces spatial inhomogeneous patterns. Next it is proved that - the model exhibits Hopf bifurcation which produces temporal inhomogeneous - patterns. Furthermore, at the points where the Turing instability curve and - Hopf bifurcation curve intersect, it is demonstrated that the model undergoes - Turing\u2013Hopf bifurcation and exhibits spatiotemporal patterns. Finally, - the existence and non-existence of positive non-constant steady states of - the reaction\u2013diffusion model are established. Numerical simulations are - presented to verify and illustrate the theoretical results.", "venue": "", - "year": 2015, "referenceCount": 49, "citationCount": 67, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-10-01", - "journal": {"name": "Ima Journal of Applied Mathematics", "pages": "1534-1568", - "volume": "80"}, "authors": [{"authorId": "47115094", "name": "Hong-bo Shi"}, - {"authorId": "145482898", "name": "S. Ruan"}]}, {"paperId": "0d6e83809db5c8071e153b62f7a916d1498a9f4c", - "externalIds": {"MAG": "2057783419", "DOI": "10.1103/PHYSREVE.85.021924", - "CorpusId": 25754302, "PubMed": "22463261"}, "url": "https://www.semanticscholar.org/paper/0d6e83809db5c8071e153b62f7a916d1498a9f4c", - "title": "Spatial dynamics in a predator-prey model with Beddington-DeAngelis - functional response.", "abstract": "In this paper spatial dynamics of the - Beddington-DeAngelis predator-prey model is investigated. We analyze the linear - stability and obtain the condition of Turing instability of this model. Moreover, - we deduce the amplitude equations and determine the stability of different - patterns. In Turing space, we found that this model has coexistence of H(0) - hexagon patterns and stripe patterns, H(\u03c0) hexagon patterns, and H(0) - hexagon patterns. To better describe the real ecosystem, we consider the ecosystem - as an open system and take the environmental noise into account. It is found - that noise can decrease the number of the patterns and make the patterns more - regular. What is more, noise can induce two kinds of typical pattern transitions. - One is from the H(\u03c0) hexagon patterns to the regular stripe patterns, - and the other is from the coexistence of H(0) hexagon patterns and stripe - patterns to the regular stripe patterns. The obtained results enrich the finding - in the Beddington-DeAngelis predator-prey model well.", "venue": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "year": 2012, - "referenceCount": 64, "citationCount": 86, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-02-28", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 021924\n ", "volume": "85 2 Pt 1"}, "authors": - [{"authorId": "2108192884", "name": "Xiao-Chong Zhang"}, {"authorId": "47334108", - "name": "Gui\u2010Quan Sun"}, {"authorId": "145752193", "name": "Zhen Jin"}]}, + 714, "influentialCitationCount": 62, "isOpenAccess": true, "openAccessPdf": + {"url": "https://projecteuclid.org/journals/bulletin-of-the-american-mathematical-society/volume-50/issue-5/Recursively-enumerable-sets-of-positive-integers-and-their-decision-problems/bams/1183505800.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1944-05-01", + "journal": {"name": "Bulletin of the American Mathematical Society", "pages": + "284-316", "volume": "50"}, "authors": [{"authorId": "31707060", "name": "Emil + L. Post"}]}, {"paperId": "5cb7c64f7ed8d7cd72f967e5d0d243cdb686680e", "externalIds": + {"MAG": "2249335336", "DOI": "10.1109/TNB.2015.2503603", "CorpusId": 12996654, + "PubMed": "26625420"}, "corpusId": 12996654, "publicationVenue": {"id": "94dbcf01-6b5d-4424-b243-c41a1790a898", + "name": "IEEE Transactions on Nanobioscience", "type": "journal", "alternate_names": + ["IEEE Trans Nanobioscience"], "issn": "1536-1241", "alternate_issns": ["1558-2639"], + "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=7728"}, "url": "https://www.semanticscholar.org/paper/5cb7c64f7ed8d7cd72f967e5d0d243cdb686680e", + "title": "On the Universality and Non-Universality of Spiking Neural P Systems + With Rules on Synapses", "abstract": "Spiking neural P systems with rules + on synapses are a new variant of spiking neural P systems. In the systems, + the neuron contains only spikes, while the spiking/forgetting rules are moved + on the synapses. It was obtained that such system with 30 neurons (using extended + spiking rules) or with 39 neurons (using standard spiking rules) is Turing + universal. In this work, this number is improved to 6. Specifically, we construct + a Turing universal spiking neural P system with rules on synapses having 6 + neurons, which can generate any set of Turing computable natural numbers. + As well, it is obtained that spiking neural P system with rules on synapses + having less than two neurons are not Turing universal: i) such systems having + one neuron can characterize the family of finite sets of natural numbers; + ii) the family of sets of numbers generated by the systems having two neurons + is included in the family of semi-linear sets of natural numbers.", "venue": + "IEEE Transactions on Nanobioscience", "year": 2015, "referenceCount": 44, + "citationCount": 69, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-11-25", "journal": + {"name": "IEEE Transactions on NanoBioscience", "pages": "960-966", "volume": + "14"}, "authors": [{"authorId": "145147427", "name": "Tao Song"}, {"authorId": + "2784483", "name": "Jinbang Xu"}, {"authorId": "7356533", "name": "L. Pan"}]}, {"paperId": "77ba8c7fcffb676758bece2bb3107f1706c1dde7", "externalIds": {"MAG": "2039590334", "DOI": "10.1038/SCIENTIFICAMERICAN0190-26", "CorpusId": 32968509, - "PubMed": "2294583"}, "url": "https://www.semanticscholar.org/paper/77ba8c7fcffb676758bece2bb3107f1706c1dde7", + "PubMed": "2294583"}, "corpusId": 32968509, "publicationVenue": {"id": "fb27311b-7236-4828-ac26-ffbf0eec5dc8", + "name": "Scientific American", "type": "journal", "alternate_names": ["Sci + Am"], "issn": "0036-8733", "url": "http://search.epnet.com/login.aspx?authtype=ip,uid&defaultdb=sfh&profile=sciamehost", + "alternate_urls": ["https://www.jstor.org/journal/scieamer", "http://www.sciam.com/sciammag/issues.cfm", + "http://cdl.library.cornell.edu/moa/browse.journals/scia.html", "https://www.scientificamerican.com/", + "http://proquest.umi.com/pqdweb?RQT=318&VName=HNP&pmid=42280"]}, "url": "https://www.semanticscholar.org/paper/77ba8c7fcffb676758bece2bb3107f1706c1dde7", "title": "Is the brain''s mind a computer program?", "abstract": null, "venue": "Scientific American", "year": 1990, "referenceCount": 0, "citationCount": - 504, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Scientific American", "pages": - "\n 26-31\n ", "volume": "262 1"}, "authors": [{"authorId": - "2104298462", "name": "Searle"}]}, {"paperId": "8f4d7c17a9e6cd3994078c97d1741cc42e383624", + 505, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"name": "Scientific + American", "pages": "\n 26-31\n ", "volume": "262 1"}, "authors": + [{"authorId": "2104298462", "name": "Searle"}]}, {"paperId": "8f4d7c17a9e6cd3994078c97d1741cc42e383624", "externalIds": {"MAG": "2038882764", "DOI": "10.1242/dev.116202", "CorpusId": - 17762429, "PubMed": "25359721"}, "url": "https://www.semanticscholar.org/paper/8f4d7c17a9e6cd3994078c97d1741cc42e383624", + 17762429, "PubMed": "25359721"}, "corpusId": 17762429, "publicationVenue": + {"id": "179847ef-8e79-48e2-99ee-769211d3e729", "name": "Development", "type": + "journal", "issn": "0950-1991", "alternate_issns": ["0212-2448"], "url": "https://dev.biologists.org/", + "alternate_urls": ["http://dev.biologists.org/", "http://journals.ecs.soton.ac.uk/journals/dev.html"]}, + "url": "https://www.semanticscholar.org/paper/8f4d7c17a9e6cd3994078c97d1741cc42e383624", "title": "An interplay of geometry and signaling enables robust lung branching morphogenesis", "abstract": "Early branching events during lung development are stereotyped. Although key regulatory components have been defined, the @@ -12801,53 +14558,31 @@ interactions: therefore propose that a signaling mechanism based on FGF10 and SHH directs outgrowth of the lung bud via a ligand-receptor-based Turing mechanism and a geometry effect.", "venue": "Development", "year": 2014, "referenceCount": - 63, "citationCount": 68, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-12-01", "journal": {"name": "Development", "pages": - "4526 - 4536", "volume": "141"}, "authors": [{"authorId": "2261511", "name": - "D. Menshykau"}, {"authorId": "153796328", "name": "P. Blanc"}, {"authorId": + 63, "citationCount": 69, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://dev.biologists.org/content/141/23/4526.full.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2014-12-01", "journal": {"name": "Development", + "pages": "4526 - 4536", "volume": "141"}, "authors": [{"authorId": "2261511", + "name": "D. Menshykau"}, {"authorId": "153796328", "name": "P. Blanc"}, {"authorId": "9334641", "name": "E. Unal"}, {"authorId": "3753934", "name": "V. Sapin"}, - {"authorId": "2962540", "name": "D. Iber"}]}, {"paperId": "5cb7c64f7ed8d7cd72f967e5d0d243cdb686680e", - "externalIds": {"MAG": "2249335336", "DOI": "10.1109/TNB.2015.2503603", "CorpusId": - 12996654, "PubMed": "26625420"}, "url": "https://www.semanticscholar.org/paper/5cb7c64f7ed8d7cd72f967e5d0d243cdb686680e", - "title": "On the Universality and Non-Universality of Spiking Neural P Systems - With Rules on Synapses", "abstract": "Spiking neural P systems with rules - on synapses are a new variant of spiking neural P systems. In the systems, - the neuron contains only spikes, while the spiking/forgetting rules are moved - on the synapses. It was obtained that such system with 30 neurons (using extended - spiking rules) or with 39 neurons (using standard spiking rules) is Turing - universal. In this work, this number is improved to 6. Specifically, we construct - a Turing universal spiking neural P system with rules on synapses having 6 - neurons, which can generate any set of Turing computable natural numbers. - As well, it is obtained that spiking neural P system with rules on synapses - having less than two neurons are not Turing universal: i) such systems having - one neuron can characterize the family of finite sets of natural numbers; - ii) the family of sets of numbers generated by the systems having two neurons - is included in the family of semi-linear sets of natural numbers.", "venue": - "IEEE Transactions on Nanobioscience", "year": 2015, "referenceCount": 44, - "citationCount": 68, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2015-11-25", "journal": {"name": "IEEE Transactions on - NanoBioscience", "pages": "960-966", "volume": "14"}, "authors": [{"authorId": - "145147427", "name": "Tao Song"}, {"authorId": "2784483", "name": "Jinbang - Xu"}, {"authorId": "7356533", "name": "L. Pan"}]}, {"paperId": "86c1e74e82764c52de737061c8272755ba542b70", + {"authorId": "2962540", "name": "D. Iber"}]}, {"paperId": "86c1e74e82764c52de737061c8272755ba542b70", "externalIds": {"MAG": "1563342424", "DBLP": "books/daglib/0088160", "DOI": - "10.1007/978-1-4612-1844-9", "CorpusId": 6556008}, "url": "https://www.semanticscholar.org/paper/86c1e74e82764c52de737061c8272755ba542b70", + "10.1007/978-1-4612-1844-9", "CorpusId": 6556008}, "corpusId": 6556008, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/86c1e74e82764c52de737061c8272755ba542b70", "title": "Automata and Computability", "abstract": null, "venue": "Undergraduate Texts in Computer Science", "year": 1997, "referenceCount": 8, "citationCount": - 387, "influentialCitationCount": 38, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1997-08-01", "journal": {"pages": "I-XIII, 1-400"}, - "authors": [{"authorId": "1700801", "name": "D. Kozen"}]}, {"paperId": "280bec8468e364acd0fe90c7afa1235d790be736", + 390, "influentialCitationCount": 38, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/bfm:978-1-4612-1844-9/1?pdf=chapter%20toc", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-08-01", + "journal": {"pages": "I-XIII, 1-400"}, "authors": [{"authorId": "1700801", + "name": "D. Kozen"}]}, {"paperId": "280bec8468e364acd0fe90c7afa1235d790be736", "externalIds": {"MAG": "1489795503", "DOI": "10.4324/9780203965535", "CorpusId": - 107037618}, "url": "https://www.semanticscholar.org/paper/280bec8468e364acd0fe90c7afa1235d790be736", + 107037618}, "corpusId": 107037618, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/280bec8468e364acd0fe90c7afa1235d790be736", "title": "Open and Distance Learning in the Developing World", "abstract": "1. Introduction: Golden Goose or Ugly Duckling Evidence 2. Nonformal Education: The Light That Never Shone 3. Schooling: The Door is Ajar 4. Teachers: Educating @@ -12856,15 +14591,16 @@ interactions: Say 8. Technology: After Gutenberg and Turing 9. Globalisation: And Culture Follows Trade 10. Political Economy: Who Benefits, Who Pays? Evaluation 11. Legitimacy: A Problem or a Solution", "venue": "", "year": 2000, "referenceCount": - 1, "citationCount": 330, "influentialCitationCount": 42, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology", "Engineering"], "s2FieldsOfStudy": [{"category": - "Sociology", "source": "external"}, {"category": "Engineering", "source": - "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2000-01-22", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "16294089", "name": "Hilary Perraton"}]}, {"paperId": - "917a64d581f080f0c2fb83125bee539fc6b4f406", "externalIds": {"MAG": "1607601471", - "DBLP": "journals/jalc/Paun01", "DOI": "10.25596/jalc-2001-075", "CorpusId": - 6870898}, "url": "https://www.semanticscholar.org/paper/917a64d581f080f0c2fb83125bee539fc6b4f406", + 1, "citationCount": 331, "influentialCitationCount": 43, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Sociology", "Engineering"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Engineering", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-01-22", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "16294089", "name": "Hilary Perraton"}]}, + {"paperId": "917a64d581f080f0c2fb83125bee539fc6b4f406", "externalIds": {"MAG": + "1607601471", "DBLP": "journals/jalc/Paun01", "DOI": "10.25596/jalc-2001-075", + "CorpusId": 6870898}, "corpusId": 6870898, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/917a64d581f080f0c2fb83125bee539fc6b4f406", "title": "P Systems with Active Membranes: Attacking NP-Complete Problems", "abstract": "P systems are parallel Molecular Computing models based on processing multisets of objects in cell-like membrane structures. Various variants were @@ -12876,32 +14612,42 @@ interactions: but also able to solve NP complete problems in polynomial (actually, linear) time. We exemplify this assertion with the well-known SAT problem.", "venue": "J. Autom. Lang. Comb.", "year": 2001, "referenceCount": 12, "citationCount": - 366, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "J. Autom. - Lang. Comb.", "pages": "75-90", "volume": "6"}, "authors": [{"authorId": "1698119", - "name": "G. Paun"}]}, {"paperId": "94f12a0ec72aa60fb86d089f9209be3885d71001", - "externalIds": {"DBLP": "journals/nc/SoloveichikCWB08", "MAG": "2008591003", - "DOI": "10.1007/s11047-008-9067-y", "CorpusId": 8741578}, "url": "https://www.semanticscholar.org/paper/94f12a0ec72aa60fb86d089f9209be3885d71001", + 366, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "J. Autom. Lang. Comb.", "pages": "75-90", "volume": + "6"}, "authors": [{"authorId": "1698119", "name": "G. Paun"}]}, {"paperId": + "94f12a0ec72aa60fb86d089f9209be3885d71001", "externalIds": {"DBLP": "journals/nc/SoloveichikCWB08", + "MAG": "2008591003", "DOI": "10.1007/s11047-008-9067-y", "CorpusId": 8741578}, + "corpusId": 8741578, "publicationVenue": {"id": "22ef711f-3d9c-4da7-a563-9238f938bb5b", + "name": "Natural Computing", "type": "journal", "alternate_names": ["Nat Comput"], + "issn": "1567-7818", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/11047?changeHeader", + "alternate_urls": ["https://link.springer.com/journal/11047"]}, "url": "https://www.semanticscholar.org/paper/94f12a0ec72aa60fb86d089f9209be3885d71001", "title": "Computation with finite stochastic chemical reaction networks", "abstract": null, "venue": "Natural Computing", "year": 2008, "referenceCount": - 43, "citationCount": 239, "influentialCitationCount": 13, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-12-01", "journal": {"name": "Natural Computing", "pages": "615-633", - "volume": "7"}, "authors": [{"authorId": "1788421", "name": "D. Soloveichik"}, - {"authorId": "2057342974", "name": "Matthew Cook"}, {"authorId": "3094920", - "name": "E. Winfree"}, {"authorId": "143742406", "name": "Jehoshua Bruck"}]}, - {"paperId": "864bbec892cb9663e461a45d5e5259e65c4d04ce", "externalIds": {"PubMedCentral": - "3524521", "MAG": "3105119993", "ArXiv": "1301.0736", "DOI": "10.1038/srep00991", - "CorpusId": 16894691, "PubMed": "23251777"}, "url": "https://www.semanticscholar.org/paper/864bbec892cb9663e461a45d5e5259e65c4d04ce", + 43, "citationCount": 240, "influentialCitationCount": 13, "isOpenAccess": + true, "openAccessPdf": {"url": "https://authors.library.caltech.edu/26115/1/etr085v2.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-12-01", "journal": {"name": "Natural Computing", + "pages": "615-633", "volume": "7"}, "authors": [{"authorId": "1788421", "name": + "D. Soloveichik"}, {"authorId": "2057342974", "name": "Matthew Cook"}, {"authorId": + "3094920", "name": "E. Winfree"}, {"authorId": "143742406", "name": "Jehoshua + Bruck"}]}, {"paperId": "864bbec892cb9663e461a45d5e5259e65c4d04ce", "externalIds": + {"PubMedCentral": "3524521", "MAG": "3105119993", "ArXiv": "1301.0736", "DOI": + "10.1038/srep00991", "CorpusId": 16894691, "PubMed": "23251777"}, "corpusId": + 16894691, "publicationVenue": {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", + "name": "Scientific Reports", "type": "journal", "alternate_names": ["Sci + Rep"], "issn": "2045-2322", "url": "http://www.nature.com/srep/", "alternate_urls": + ["http://www.nature.com/srep/index.html"]}, "url": "https://www.semanticscholar.org/paper/864bbec892cb9663e461a45d5e5259e65c4d04ce", "title": "Digit patterning during limb development as a result of the BMP-receptor interaction", "abstract": null, "venue": "Scientific Reports", "year": 2012, "referenceCount": 106, "citationCount": 80, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep00991.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-18", "journal": {"name": "Scientific @@ -12910,17 +14656,30 @@ interactions: "name": "Philipp Germann"}, {"authorId": "2261511", "name": "D. Menshykau"}, {"authorId": "2962540", "name": "D. Iber"}]}, {"paperId": "5a4b29fb93e4397b332c30da0938c0f17876cb43", "externalIds": {"DBLP": "conf/birthday/1997brauer", "MAG": "1562684525", "DOI": - "10.1007/BFb0052071", "CorpusId": 21317070}, "url": "https://www.semanticscholar.org/paper/5a4b29fb93e4397b332c30da0938c0f17876cb43", + "10.1007/BFb0052071", "CorpusId": 21317070}, "corpusId": 21317070, "publicationVenue": + {"id": "2f5d0e8a-faad-4f10-b323-2b2e3c439a78", "name": "Lecture Notes in Computer + Science", "type": "journal", "alternate_names": ["LNCS", "Transactions on + Computational Systems Biology", "Trans Comput Syst Biology", "Lect Note Comput + Sci"], "issn": "0302-9743", "alternate_issns": ["1861-2059", "1861-2075", + "1866-4733"], "url": "http://www.springer.com/lncs", "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-164-2-73659-0,00.html", + "https://link.springer.com/bookseries/558", "http://link.springer.com/search?query=\"Transactions+on+Computational+Systems+Biology\""]}, + "url": "https://www.semanticscholar.org/paper/5a4b29fb93e4397b332c30da0938c0f17876cb43", "title": "Foundations of Computer Science", "abstract": null, "venue": "Lecture Notes in Computer Science", "year": 2001, "referenceCount": 2, "citationCount": - 390, "influentialCitationCount": 25, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2001-07-01", "journal": {"name": - "Mathematics eJournal"}, "authors": [{"authorId": "34919560", "name": "K. - Nambiar"}]}, {"paperId": "5c92f2fb1e673f87bda5bf3301aa7bbe06871f5d", "externalIds": - {"DBLP": "journals/cj/Denning12a", "MAG": "1979656032", "DOI": "10.1093/comjnl/bxs066", - "CorpusId": 44861785}, "url": "https://www.semanticscholar.org/paper/5c92f2fb1e673f87bda5bf3301aa7bbe06871f5d", + 391, "influentialCitationCount": 26, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.cl.cam.ac.uk/teaching/1999/FoundsCS/notes.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-07-01", + "journal": {"name": "Mathematics eJournal"}, "authors": [{"authorId": "34919560", + "name": "K. Nambiar"}]}, {"paperId": "5c92f2fb1e673f87bda5bf3301aa7bbe06871f5d", + "externalIds": {"DBLP": "journals/cj/Denning12a", "MAG": "1979656032", "DOI": + "10.1093/comjnl/bxs066", "CorpusId": 44861785}, "corpusId": 44861785, "publicationVenue": + {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", "name": "Computer/law journal", + "type": "journal", "alternate_names": ["Computer journal", "The Computer Journal", + "Comput j", "Comput J"], "issn": "0164-8756", "alternate_issns": ["0010-4620"], + "url": "https://repository.jmls.edu/jitpl/all_issues.html", "alternate_urls": + ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/5c92f2fb1e673f87bda5bf3301aa7bbe06871f5d", "title": "Opening Statement: What is Computation?", "abstract": "Most people understand a computation as a process evoked when a computational agent acts on its inputs under the control of an algorithm. The classical Turing machine @@ -12935,14 +14694,42 @@ interactions: running time and space. Models based on transforming representations may be useful.", "venue": "Computer/law journal", "year": 2012, "referenceCount": 169, "citationCount": 81, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-07-01", "journal": {"name": "Comput. J.", "pages": "805-810", "volume": - "55"}, "authors": [{"authorId": "1729148", "name": "P. Denning"}]}, {"paperId": - "7eaf5c84745a0599549ca58761ec1bfff7c5fc2a", "externalIds": {"MAG": "1967645131", - "DOI": "10.1242/dev.107441", "CorpusId": 5453514, "PubMed": "25605777"}, "url": - "https://www.semanticscholar.org/paper/7eaf5c84745a0599549ca58761ec1bfff7c5fc2a", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-07-01", "journal": {"name": "Comput. J.", "pages": + "805-810", "volume": "55"}, "authors": [{"authorId": "1729148", "name": "P. + Denning"}]}, {"paperId": "abfbd396b86728f3a122071b222c723a1f527848", "externalIds": + {"MAG": "1972963245", "DOI": "10.1063/1.1841255", "CorpusId": 93103054}, "corpusId": + 93103054, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/abfbd396b86728f3a122071b222c723a1f527848", + "title": "On symmetry-breaking instabilities in dissipative systems", "abstract": + "The theory of hydrodynamic instability has always been an important part + of fluid dynamics [see, e.g., Chandrasekhar, in Hydrodynamic and Hydromagnetic + Stability (Clarendon Press, Oxford, England, 1961) and Non\u2010Equilibrium + Thermodynamics, Variation Techniques, and Stability, R. J. Donnelly, R. Herman, + and I. Prigogine, Eds. (University of Chicago Press, Chicago, Ill., 1966)]. + Such instabilities involve both convective processes (such as mechanical flow) + and dissipative processes (such as viscous dissipation). We investigate the + possibility of an instability in purely dissipative systems involving chemical + reactions and transport processes such as diffusion, but no hydrodynamic motion. + We demonstrate that for well\u2010defined values of the constraints such as + the chemical affinities of the over\u2010all reactions and the constants involved, + such systems can indeed become unstable. Such an instability is investigated + following an example of autocatalytic reactions first proposed by Turing. + The major feature of this ...", "venue": "", "year": 1967, "referenceCount": + 6, "citationCount": 527, "influentialCitationCount": 33, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1967-05-01", + "journal": {"name": "Journal of Chemical Physics", "pages": "3542-3550", "volume": + "46"}, "authors": [{"authorId": "71075022", "name": "I. Prigogine"}, {"authorId": + "46872722", "name": "G. Nicolis"}]}, {"paperId": "7eaf5c84745a0599549ca58761ec1bfff7c5fc2a", + "externalIds": {"MAG": "1967645131", "DOI": "10.1242/dev.107441", "CorpusId": + 5453514, "PubMed": "25605777"}, "corpusId": 5453514, "publicationVenue": {"id": + "179847ef-8e79-48e2-99ee-769211d3e729", "name": "Development", "type": "journal", + "issn": "0950-1991", "alternate_issns": ["0212-2448"], "url": "https://dev.biologists.org/", + "alternate_urls": ["http://dev.biologists.org/", "http://journals.ecs.soton.ac.uk/journals/dev.html"]}, + "url": "https://www.semanticscholar.org/paper/7eaf5c84745a0599549ca58761ec1bfff7c5fc2a", "title": "Mathematically guided approaches to distinguish models of periodic patterning", "abstract": "How periodic patterns are generated is an open question. A number of mechanisms have been proposed \u2013 most famously, Turing''s @@ -12957,16 +14744,16 @@ interactions: with specific biological examples. Summary: This Hypothesis presents a mathematical approach to understanding periodic patterning during development, and suggests ways in which molecular, cellular or mechanical models can be tested.", "venue": - "Development", "year": 2015, "referenceCount": 100, "citationCount": 58, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2015-02-01", "journal": - {"name": "Development", "pages": "409 - 419", "volume": "142"}, "authors": - [{"authorId": "120216900", "name": "T. Hiscock"}, {"authorId": "2756673", - "name": "S. Megason"}]}, {"paperId": "250d5adbf769d4a977319a02c5ce1ad937170617", + "Development", "year": 2015, "referenceCount": 100, "citationCount": 59, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2015-02-01", "journal": {"name": "Development", "pages": "409 - 419", "volume": + "142"}, "authors": [{"authorId": "120216900", "name": "T. Hiscock"}, {"authorId": + "2756673", "name": "S. Megason"}]}, {"paperId": "250d5adbf769d4a977319a02c5ce1ad937170617", "externalIds": {"MAG": "2169730245", "DOI": "10.1177/0967010614539719", "CorpusId": - 123947417}, "url": "https://www.semanticscholar.org/paper/250d5adbf769d4a977319a02c5ce1ad937170617", + 123947417}, "corpusId": 123947417, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/250d5adbf769d4a977319a02c5ce1ad937170617", "title": "Security and the incalculable", "abstract": "In this article, I explore a specific relation between mathematics and security calculations. Recalling the confrontations between the mathematician Alan Turing and the @@ -12987,14 +14774,16 @@ interactions: then, are always already political because they precisely involve combinatorial possibilities whose arrangement has effects in the world.", "venue": "", "year": 2014, "referenceCount": 40, "citationCount": 63, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://dro.dur.ac.uk/14908/1/14908.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2014-07-07", "journal": {"name": "Security Dialogue", "pages": "423 - 439", "volume": "45"}, "authors": [{"authorId": "73032120", "name": "Louise Amoore"}]}, {"paperId": "97c4e7f0812c367760bafd4eb6f981e825ad304e", "externalIds": {"DBLP": "journals/corr/abs-1102-4225", "ArXiv": "1102.4225", "MAG": "2159652932", - "CorpusId": 17032411}, "url": "https://www.semanticscholar.org/paper/97c4e7f0812c367760bafd4eb6f981e825ad304e", + "CorpusId": 17032411}, "corpusId": 17032411, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/97c4e7f0812c367760bafd4eb6f981e825ad304e", "title": "Model-checking ATL under Imperfect Information and Perfect Recall Semantics is Undecidable", "abstract": "We propose a formal proof of the undecidability of the model checking problem for alternatingtime temporal logic under imperfect @@ -13003,15 +14792,20 @@ interactions: imperfect information, but no formal proof was ever published. Our proof is based on a direct reduction from the non-halting problem for Turing machines.", "venue": "ArXiv", "year": 2011, "referenceCount": 6, "citationCount": 103, - "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-02-21", "journal": {"name": "ArXiv", - "volume": "abs/1102.4225"}, "authors": [{"authorId": "1804576", "name": "C. - Dima"}, {"authorId": "1716633", "name": "F. \u0162iplea"}]}, {"paperId": "935319d9ac6f5af3c0f8be62571fc9726e525751", - "externalIds": {"ArXiv": "1411.2359", "MAG": "1974276287", "DOI": "10.1103/PhysRevLett.114.138101", - "CorpusId": 9697331, "PubMed": "25884138"}, "url": "https://www.semanticscholar.org/paper/935319d9ac6f5af3c0f8be62571fc9726e525751", + "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-02-21", "journal": + {"name": "ArXiv", "volume": "abs/1102.4225"}, "authors": [{"authorId": "1804576", + "name": "C. Dima"}, {"authorId": "1716633", "name": "F. \u0162iplea"}]}, {"paperId": + "935319d9ac6f5af3c0f8be62571fc9726e525751", "externalIds": {"ArXiv": "1411.2359", + "MAG": "1974276287", "DOI": "10.1103/PhysRevLett.114.138101", "CorpusId": + 9697331, "PubMed": "25884138"}, "corpusId": 9697331, "publicationVenue": {"id": + "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/935319d9ac6f5af3c0f8be62571fc9726e525751", "title": "Scaling and regeneration of self-organized patterns.", "abstract": "Biological patterns generated during development and regeneration often scale with organism size. Some organisms, e.g., flatworms, can regenerate a rescaled @@ -13021,19 +14815,40 @@ interactions: the reaction rates of a Turing system, thereby adjusting pattern length scales proportional to system size. Our model captures essential features of body plan regeneration in flatworms as observed in experiments.", "venue": "Physical - Review Letters", "year": 2014, "referenceCount": 31, "citationCount": 51, - "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Biology", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-11-10", "journal": {"name": "Physical review letters", "pages": "\n 138101\n ", - "volume": "114 13"}, "authors": [{"authorId": "2172186260", "name": "Steffen - Werner"}, {"authorId": "3909094", "name": "Tom St\u00fcckemann"}, {"authorId": - "6976930", "name": "Manuel Beir\u00e1n Amigo"}, {"authorId": "2795867", "name": - "J. Rink"}, {"authorId": "3141258", "name": "F. J\u00fclicher"}, {"authorId": - "2092387", "name": "B. Friedrich"}]}, {"paperId": "37ddf2ea3feb5ceafce669c7c31070213bd51375", - "externalIds": {"MAG": "1514735749", "CorpusId": 118421004}, "url": "https://www.semanticscholar.org/paper/37ddf2ea3feb5ceafce669c7c31070213bd51375", + Review Letters", "year": 2014, "referenceCount": 31, "citationCount": 52, + "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": {"url": + "https://pure.mpg.de/pubman/item/item_3193576_2/component/file_3193578/3193576.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Biology", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2014-11-10", "journal": {"name": "Physical + review letters", "pages": "\n 138101\n ", "volume": "114 13"}, + "authors": [{"authorId": "2172186260", "name": "Steffen Werner"}, {"authorId": + "3909094", "name": "Tom St\u00fcckemann"}, {"authorId": "6976930", "name": + "Manuel Beir\u00e1n Amigo"}, {"authorId": "2795867", "name": "J. Rink"}, {"authorId": + "3141258", "name": "F. J\u00fclicher"}, {"authorId": "2092387", "name": "B. + Friedrich"}]}, {"paperId": "8a147227a2c94a4256fea2f7b4779c98fba65206", "externalIds": + {"MAG": "2063814962", "DOI": "10.1007/s11538-011-9699-4", "CorpusId": 1832196, + "PubMed": "22072186"}, "corpusId": 1832196, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/8a147227a2c94a4256fea2f7b4779c98fba65206", + "title": "The Influence of Receptor-Mediated Interactions on Reaction-Diffusion + Mechanisms of Cellular Self-organisation", "abstract": null, "venue": "Bulletin + of Mathematical Biology", "year": 2012, "referenceCount": 53, "citationCount": + 66, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ora.ox.ac.uk/objects/uuid:fb170dde-dd67-44ad-a225-4e5b4ae744d7/files/m15b863a72e0a06b1ad8cf8164e55207d", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-04-01", "journal": + {"name": "Bulletin of Mathematical Biology", "pages": "935-957", "volume": + "74"}, "authors": [{"authorId": "2691918", "name": "V. Klika"}, {"authorId": + "35275545", "name": "R. Baker"}, {"authorId": "30410804", "name": "D. Headon"}, + {"authorId": "2662569", "name": "E. Gaffney"}]}, {"paperId": "37ddf2ea3feb5ceafce669c7c31070213bd51375", + "externalIds": {"MAG": "1514735749", "CorpusId": 118421004}, "corpusId": 118421004, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/37ddf2ea3feb5ceafce669c7c31070213bd51375", "title": "STRING-MATCHING AND OTHER PRODUCTS", "abstract": "Abstract : The string-matching problem considered is to find all occurrences of a given pattern as a substring of another longer string. When the pattern is simply a given @@ -13045,14 +14860,15 @@ interactions: similarity of string-matching with integer multiplication, a new algorithm has been obtained with a running time which is only slightly worse than linear. (Author)", "venue": "", "year": 1974, "referenceCount": 0, "citationCount": - 462, "influentialCitationCount": 55, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 462, "influentialCitationCount": 55, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145298802", "name": "M. Fischer"}, {"authorId": "143607434", "name": "M. Paterson"}]}, {"paperId": "93aaf126443643fb0835df896ab07b523f2c9613", "externalIds": {"DBLP": "journals/tcs/SiegelmannS94", "MAG": "2050778826", - "DOI": "10.1109/ISTCS.1993.253479", "CorpusId": 2456483}, "url": "https://www.semanticscholar.org/paper/93aaf126443643fb0835df896ab07b523f2c9613", + "DOI": "10.1109/ISTCS.1993.253479", "CorpusId": 2456483}, "corpusId": 2456483, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/93aaf126443643fb0835df896ab07b523f2c9613", "title": "Analog computation via neural networks", "abstract": "The authors pursue a particular approach to analog computation, based on dynamical systems of the type used in neural networks research. The systems have a fixed structure, @@ -13065,29 +14881,16 @@ interactions: In contrast to classical computational models, the models studied exhibit at least some robustness with respect to noise and implementation errors.<>", "venue": "[1993] The 2nd Israel Symposium on Theory and Computing Systems", - "year": 1993, "referenceCount": 33, "citationCount": 403, "influentialCitationCount": - 18, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-06-07", "journal": {"name": "[1993] The 2nd Israel - Symposium on Theory and Computing Systems", "pages": "98-107"}, "authors": - [{"authorId": "2797623", "name": "H. Siegelmann"}, {"authorId": "1790264", - "name": "Eduardo Sontag"}]}, {"paperId": "8a147227a2c94a4256fea2f7b4779c98fba65206", - "externalIds": {"MAG": "2063814962", "DOI": "10.1007/s11538-011-9699-4", "CorpusId": - 1832196, "PubMed": "22072186"}, "url": "https://www.semanticscholar.org/paper/8a147227a2c94a4256fea2f7b4779c98fba65206", - "title": "The Influence of Receptor-Mediated Interactions on Reaction-Diffusion - Mechanisms of Cellular Self-organisation", "abstract": null, "venue": "Bulletin - of Mathematical Biology", "year": 2012, "referenceCount": 53, "citationCount": - 65, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-04-01", "journal": {"name": "Bulletin of Mathematical - Biology", "pages": "935-957", "volume": "74"}, "authors": [{"authorId": "2691918", - "name": "V. Klika"}, {"authorId": "35275545", "name": "R. Baker"}, {"authorId": - "30410804", "name": "D. Headon"}, {"authorId": "2662569", "name": "E. Gaffney"}]}, - {"paperId": "805b3f6cc8d6bc2f9e083e47ef52656342b49de6", "externalIds": {"MAG": - "1983265956", "DOI": "10.1063/1.464316", "CorpusId": 94527674}, "url": "https://www.semanticscholar.org/paper/805b3f6cc8d6bc2f9e083e47ef52656342b49de6", + "year": 1993, "referenceCount": 33, "citationCount": 404, "influentialCitationCount": + 18, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1993-06-07", "journal": + {"name": "[1993] The 2nd Israel Symposium on Theory and Computing Systems", + "pages": "98-107"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}, + {"authorId": "1790264", "name": "Eduardo Sontag"}]}, {"paperId": "805b3f6cc8d6bc2f9e083e47ef52656342b49de6", + "externalIds": {"MAG": "1983265956", "DOI": "10.1063/1.464316", "CorpusId": + 94527674}, "corpusId": 94527674, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/805b3f6cc8d6bc2f9e083e47ef52656342b49de6", "title": "Lattice Boltzmann computations for reaction\u2010diffusion equations", "abstract": "A lattice Boltzmann model for reaction\u2010diffusion systems is developed. The method provides an efficient computational scheme for simulating @@ -13097,15 +14900,19 @@ interactions: with the lattice gas method and with theoretical predictions, showing quantitative agreement. The model is extended to include velocity convection in chemically reacting fluid flows.", "venue": "", "year": 1993, "referenceCount": 11, "citationCount": - 381, "influentialCitationCount": 13, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1993-01-15", "journal": {"name": "Journal of Chemical - Physics", "pages": "1514-1523", "volume": "98"}, "authors": [{"authorId": - "4496756", "name": "S. Dawson"}, {"authorId": "2144305484", "name": "Shiyi - Chen"}, {"authorId": "30086297", "name": "G. Doolen"}]}, {"paperId": "5249023de579a0009715597aa6717b8d75035d7b", - "externalIds": {"MAG": "2137685059", "DOI": "10.1364/OL.39.001529", "CorpusId": - 24710712, "PubMed": "24690830"}, "url": "https://www.semanticscholar.org/paper/5249023de579a0009715597aa6717b8d75035d7b", + 381, "influentialCitationCount": 13, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1993-01-15", "journal": {"name": + "Journal of Chemical Physics", "pages": "1514-1523", "volume": "98"}, "authors": + [{"authorId": "4496756", "name": "S. Dawson"}, {"authorId": "2144305484", + "name": "Shiyi Chen"}, {"authorId": "30086297", "name": "G. Doolen"}]}, {"paperId": + "5249023de579a0009715597aa6717b8d75035d7b", "externalIds": {"MAG": "2137685059", + "DOI": "10.1364/OL.39.001529", "CorpusId": 24710712, "PubMed": "24690830"}, + "corpusId": 24710712, "publicationVenue": {"id": "60fa7b8c-1159-4120-b6f8-3d2e36f6f29d", + "name": "Optics Letters", "type": "journal", "alternate_names": ["Opt Lett"], + "issn": "0146-9592", "url": "http://www.opticsinfobase.org/", "alternate_urls": + ["http://www.opticsinfobase.org/ol/"]}, "url": "https://www.semanticscholar.org/paper/5249023de579a0009715597aa6717b8d75035d7b", "title": "On the robustness of phase locking in Kerr optical frequency combs.", "abstract": "We theoretically investigate the phase locking phenomena between the spectral components of Kerr optical frequency combs in the dynamical regime @@ -13120,7 +14927,8 @@ interactions: generation of such combs is also discussed in detail, and is in excellent agreement with the numerical simulations.", "venue": "Optics Letters", "year": 2014, "referenceCount": 17, "citationCount": 46, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-03222044/file/Coillet2014.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2014-03-15", "journal": {"name": "Optics @@ -13128,7 +14936,10 @@ interactions: [{"authorId": "143662508", "name": "A. Coillet"}, {"authorId": "5948493", "name": "Y. Chembo"}]}, {"paperId": "35fc8ab44b16655b9c610816feba9635ca19cbca", "externalIds": {"MAG": "1849386499", "DOI": "10.1111/j.1755-148X.2012.00984.x", - "CorpusId": 8714012, "PubMed": "22313791"}, "url": "https://www.semanticscholar.org/paper/35fc8ab44b16655b9c610816feba9635ca19cbca", + "CorpusId": 8714012, "PubMed": "22313791"}, "corpusId": 8714012, "publicationVenue": + {"id": "d4fab1a0-4b1b-43b8-a2e5-4d2a5d0dc3d6", "name": "Pigment Cell & Melanoma + Research", "type": "journal", "alternate_names": ["Pigment Cell Melanoma + Res"], "issn": "1755-1471", "url": "http://www.pigment.org/"}, "url": "https://www.semanticscholar.org/paper/35fc8ab44b16655b9c610816feba9635ca19cbca", "title": "Changing clothes easily: connexin41.8 regulates skin pattern variation", "abstract": "The skin patterns of animals are very important for their survival, yet the mechanisms involved in skin pattern formation remain unresolved. Turing\u2019s @@ -13145,14 +14956,16 @@ interactions: patterns and that the reaction\u2013diffusion principle can predict skin patterns of animals.", "venue": "Pigment Cell & Melanoma Research", "year": 2012, "referenceCount": 23, "citationCount": 59, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-05-01", "journal": {"name": "Pigment Cell & Melanoma - Research", "volume": "25"}, "authors": [{"authorId": "2894944", "name": "Masakatsu - Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": - "d30b4fa151fcb9dc78e714a89c846e242a382693", "externalIds": {"MAG": "2033736907", - "DOI": "10.1021/JP953547M", "CorpusId": 7558499}, "url": "https://www.semanticscholar.org/paper/d30b4fa151fcb9dc78e714a89c846e242a382693", + "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1111/j.1755-148X.2012.00984.x", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-05-01", "journal": {"name": "Pigment + Cell & Melanoma Research", "volume": "25"}, "authors": [{"authorId": "2894944", + "name": "Masakatsu Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, + {"paperId": "d30b4fa151fcb9dc78e714a89c846e242a382693", "externalIds": {"MAG": + "2033736907", "DOI": "10.1021/JP953547M", "CorpusId": 7558499}, "corpusId": + 7558499, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d30b4fa151fcb9dc78e714a89c846e242a382693", "title": "Nonlinear Chemical Dynamics: Oscillations, Patterns, and Chaos", "abstract": "Chemical reactions with nonlinear kinetic behavior can give rise to a remarkable set of spatiotemporal phenomena. These include periodic and @@ -13162,38 +14975,16 @@ interactions: has been made in the past two decades in characterizing, designing, modeling, and understanding them. Several nonlinear dynamical phenomena in chemical systems provide simpler analogues of behaviors found in biological systems.", - "venue": "", "year": 1996, "referenceCount": 159, "citationCount": 412, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-08-01", - "journal": {"name": "The Journal of Physical Chemistry", "pages": "13132-13147", - "volume": "100"}, "authors": [{"authorId": "144854275", "name": "I. Epstein"}, - {"authorId": "6286893", "name": "K. Showalter"}]}, {"paperId": "abfbd396b86728f3a122071b222c723a1f527848", - "externalIds": {"MAG": "1972963245", "DOI": "10.1063/1.1841255", "CorpusId": - 93103054}, "url": "https://www.semanticscholar.org/paper/abfbd396b86728f3a122071b222c723a1f527848", - "title": "On symmetry-breaking instabilities in dissipative systems", "abstract": - "The theory of hydrodynamic instability has always been an important part - of fluid dynamics [see, e.g., Chandrasekhar, in Hydrodynamic and Hydromagnetic - Stability (Clarendon Press, Oxford, England, 1961) and Non\u2010Equilibrium - Thermodynamics, Variation Techniques, and Stability, R. J. Donnelly, R. Herman, - and I. Prigogine, Eds. (University of Chicago Press, Chicago, Ill., 1966)]. - Such instabilities involve both convective processes (such as mechanical flow) - and dissipative processes (such as viscous dissipation). We investigate the - possibility of an instability in purely dissipative systems involving chemical - reactions and transport processes such as diffusion, but no hydrodynamic motion. - We demonstrate that for well\u2010defined values of the constraints such as - the chemical affinities of the over\u2010all reactions and the constants involved, - such systems can indeed become unstable. Such an instability is investigated - following an example of autocatalytic reactions first proposed by Turing. - The major feature of this ...", "venue": "", "year": 1967, "referenceCount": - 6, "citationCount": 521, "influentialCitationCount": 32, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1967-05-01", "journal": {"name": - "Journal of Chemical Physics", "pages": "3542-3550", "volume": "46"}, "authors": - [{"authorId": "71075022", "name": "I. Prigogine"}, {"authorId": "46872722", - "name": "G. Nicolis"}]}, {"paperId": "2256419b2e5f0d0f55d9eb2eb81fecdadf5104d8", - "externalIds": {"MAG": "1581889689", "CorpusId": 16210543}, "url": "https://www.semanticscholar.org/paper/2256419b2e5f0d0f55d9eb2eb81fecdadf5104d8", + "venue": "", "year": 1996, "referenceCount": 159, "citationCount": 415, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1996-08-01", "journal": {"name": "The Journal of Physical Chemistry", "pages": + "13132-13147", "volume": "100"}, "authors": [{"authorId": "144854275", "name": + "I. Epstein"}, {"authorId": "6286893", "name": "K. Showalter"}]}, {"paperId": + "2256419b2e5f0d0f55d9eb2eb81fecdadf5104d8", "externalIds": {"MAG": "1581889689", + "CorpusId": 16210543}, "corpusId": 16210543, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2256419b2e5f0d0f55d9eb2eb81fecdadf5104d8", "title": "Nudge nudge wink wink: elements of face-to-face conversation for embodied conversational agents", "abstract": "It will not be possible to apply exactly the same teaching process to the machine as to a normal child. It @@ -13203,13 +14994,14 @@ interactions: could not send the creature to school without the other children making excessive fun of it. \u2014Alan Turing, \"Computing Machinery and Intelligence,\" 1950", "venue": "", "year": 2001, "referenceCount": 61, "citationCount": 275, "influentialCitationCount": - 16, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-12-01", "journal": {"name": "", "pages": "1-27", "volume": ""}, "authors": - [{"authorId": "145431806", "name": "J. Cassell"}]}, {"paperId": "df0c3d0d4c82629fdbd3e60adf2592f98d4817cc", - "externalIds": {"MAG": "2014916692", "DOI": "10.1068/b2802ed", "CorpusId": - 18575773}, "url": "https://www.semanticscholar.org/paper/df0c3d0d4c82629fdbd3e60adf2592f98d4817cc", + 16, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2001-12-01", "journal": {"name": "", "pages": "1-27", + "volume": ""}, "authors": [{"authorId": "145431806", "name": "J. Cassell"}]}, + {"paperId": "df0c3d0d4c82629fdbd3e60adf2592f98d4817cc", "externalIds": {"MAG": + "2014916692", "DOI": "10.1068/b2802ed", "CorpusId": 18575773}, "corpusId": + 18575773, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/df0c3d0d4c82629fdbd3e60adf2592f98d4817cc", "title": "Cellular Automata and Urban Simulation: Where Do We Go from Here?", "abstract": "Introduction `\u0300He figured out that mathematicians, unlike carpenters, only needed to have one tool in their toolbox, if it were the @@ -13219,15 +15011,19 @@ interactions: that could turn into any tool you could ever need. Like a pipe organ changing into a different instrument every time you hit a preset button.'''' Stephenson (1999, page 197)", "venue": "", "year": 2001, "referenceCount": 21, "citationCount": - 295, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["Editorial"], "publicationDate": "2001-04-01", "journal": {"name": "Environment - and Planning B: Planning and Design", "pages": "163 - 168", "volume": "28"}, - "authors": [{"authorId": "1782705", "name": "P. Torrens"}, {"authorId": "2064638351", - "name": "David O''Sullivan"}]}, {"paperId": "500470befb771a5cb10095103f50b4cda75ff008", + 296, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Editorial"], "publicationDate": "2001-04-01", "journal": + {"name": "Environment and Planning B: Planning and Design", "pages": "163 + - 168", "volume": "28"}, "authors": [{"authorId": "1782705", "name": "P. Torrens"}, + {"authorId": "2064638351", "name": "David O''Sullivan"}]}, {"paperId": "500470befb771a5cb10095103f50b4cda75ff008", "externalIds": {"DBLP": "journals/siamcomp/Bennett89", "MAG": "2061073612", - "DOI": "10.1137/0218053", "CorpusId": 2797942}, "url": "https://www.semanticscholar.org/paper/500470befb771a5cb10095103f50b4cda75ff008", + "DOI": "10.1137/0218053", "CorpusId": 2797942}, "corpusId": 2797942, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/500470befb771a5cb10095103f50b4cda75ff008", "title": "Time/Space Trade-Offs for Reversible Computation", "abstract": "A reversible Turing machine is one whose transition function is $1:1$, so that no instantaneous description (ID) has more than one predecessor. Using a pebbling @@ -13243,38 +15039,66 @@ interactions: provide a Godel numbering of such functions. The time/space cost of computing a $1:1$ function on such a machine is equal within a small polynomial to the cost of co...", "venue": "SIAM journal on computing (Print)", "year": 1989, - "referenceCount": 17, "citationCount": 373, "influentialCitationCount": 38, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-08-01", "journal": {"name": "SIAM J. Comput.", "pages": "766-776", "volume": - "18"}, "authors": [{"authorId": "2623914", "name": "Charles H. Bennett"}]}, - {"paperId": "9dc903f4be38b7582ea664905815a399f558341a", "externalIds": {"MAG": - "2018647056", "DOI": "10.1007/s12080-010-0073-1", "CorpusId": 24516886}, "url": - "https://www.semanticscholar.org/paper/9dc903f4be38b7582ea664905815a399f558341a", + "referenceCount": 17, "citationCount": 376, "influentialCitationCount": 38, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1989-08-01", "journal": {"name": "SIAM J. Comput.", "pages": + "766-776", "volume": "18"}, "authors": [{"authorId": "2623914", "name": "Charles + H. Bennett"}]}, {"paperId": "9dc903f4be38b7582ea664905815a399f558341a", "externalIds": + {"MAG": "2018647056", "DOI": "10.1007/s12080-010-0073-1", "CorpusId": 24516886}, + "corpusId": 24516886, "publicationVenue": {"id": "b0c434b8-9cf0-4eee-ad2f-c7d3b57c2ee2", + "name": "Theoretical Ecology", "type": "journal", "alternate_names": ["Theor + Ecol"], "issn": "1874-1738", "url": "https://link.springer.com/journal/12080"}, + "url": "https://www.semanticscholar.org/paper/9dc903f4be38b7582ea664905815a399f558341a", "title": "Self-organised spatial patterns and chaos in a ratio-dependent predator\u2013prey system", "abstract": null, "venue": "Theoretical Ecology", "year": 2011, "referenceCount": - 65, "citationCount": 112, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-02-01", "journal": {"name": - "Theoretical Ecology", "pages": "37-53", "volume": "4"}, "authors": [{"authorId": - "33373208", "name": "M. Banerjee"}, {"authorId": "145476093", "name": "S. - Petrovskii"}]}, {"paperId": "46aebf6842058dcb9a30ef4df4f965839e4ad06c", "externalIds": - {"MAG": "1590283810", "DBLP": "journals/acta/Szelepcsenyi88", "DOI": "10.1007/BF00299636", - "CorpusId": 10838178}, "url": "https://www.semanticscholar.org/paper/46aebf6842058dcb9a30ef4df4f965839e4ad06c", + 65, "citationCount": 113, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2011-02-01", "journal": {"name": "Theoretical Ecology", "pages": "37-53", + "volume": "4"}, "authors": [{"authorId": "33373208", "name": "M. Banerjee"}, + {"authorId": "145476093", "name": "S. Petrovskii"}]}, {"paperId": "a23882033d21f9add31d5dda6716a6f2a16d7678", + "externalIds": {"MAG": "2162507613", "DOI": "10.1007/s00285-009-0293-4", "CorpusId": + 2954573, "PubMed": "19727733"}, "corpusId": 2954573, "publicationVenue": {"id": + "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical Biology", + "type": "journal", "alternate_names": ["J Math Biology"], "issn": "0303-6812", + "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/a23882033d21f9add31d5dda6716a6f2a16d7678", + "title": "Stability analysis of non-autonomous reaction-diffusion systems: + the effects of growing domains", "abstract": null, "venue": "Journal of Mathematical + Biology", "year": 2010, "referenceCount": 42, "citationCount": 108, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:b50107fd-f13b-4569-9e20-61af3a4e3de7/files/me80538d9f3fb515217b4ad7f8f358a20", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2010-07-01", "journal": + {"name": "Journal of Mathematical Biology", "pages": "133-164", "volume": + "61"}, "authors": [{"authorId": "2731718", "name": "A. Madzvamuse"}, {"authorId": + "2662569", "name": "E. Gaffney"}, {"authorId": "2339973", "name": "P. Maini"}]}, + {"paperId": "46aebf6842058dcb9a30ef4df4f965839e4ad06c", "externalIds": {"MAG": + "1590283810", "DBLP": "journals/acta/Szelepcsenyi88", "DOI": "10.1007/BF00299636", + "CorpusId": 10838178}, "corpusId": 10838178, "publicationVenue": {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", + "name": "Acta Informatica", "type": "journal", "alternate_names": ["Acta Inform"], + "issn": "0001-5903", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/46aebf6842058dcb9a30ef4df4f965839e4ad06c", "title": "The method of forced enumeration for nondeterministic automata", "abstract": null, "venue": "Acta Informatica", "year": 1988, "referenceCount": 5, "citationCount": 251, "influentialCitationCount": 11, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1988-11-01", "journal": {"name": "Acta Informatica", "pages": "279-284", - "volume": "26"}, "authors": [{"authorId": "1981939", "name": "R\u00f3bert + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1988-11-01", "journal": {"name": "Acta Informatica", "pages": + "279-284", "volume": "26"}, "authors": [{"authorId": "1981939", "name": "R\u00f3bert Szelepcs\u00e9nyi"}]}, {"paperId": "fa56ca6b8db0447fae1a31b3a84bda09ca085fcb", "externalIds": {"MAG": "2120210041", "DBLP": "conf/focs/BabaiFS86", "DOI": - "10.1109/SFCS.1986.15", "CorpusId": 11870480}, "url": "https://www.semanticscholar.org/paper/fa56ca6b8db0447fae1a31b3a84bda09ca085fcb", + "10.1109/SFCS.1986.15", "CorpusId": 11870480}, "corpusId": 11870480, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fa56ca6b8db0447fae1a31b3a84bda09ca085fcb", "title": "Complexity classes in communication complexity theory", "abstract": "We take a complexity theoretic view of A. C. Yao''s theory of communication complexity. A rich structure of natural complexity classes is introduced. @@ -13304,40 +15128,73 @@ interactions: \u03a02cc. Another major problem is to show that PSPACEcc and the probabilistic class UPPcc are not comparable.", "venue": "27th Annual Symposium on Foundations of Computer Science (sfcs 1986)", "year": 1986, "referenceCount": 34, "citationCount": - 318, "influentialCitationCount": 48, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1986-10-27", "journal": {"name": "27th - Annual Symposium on Foundations of Computer Science (sfcs 1986)", "pages": - "337-347"}, "authors": [{"authorId": "1794932", "name": "L. Babai"}, {"authorId": - "1678770", "name": "P. Frankl"}, {"authorId": "143688145", "name": "Janos - Simon"}]}, {"paperId": "a23882033d21f9add31d5dda6716a6f2a16d7678", "externalIds": - {"MAG": "2162507613", "DOI": "10.1007/s00285-009-0293-4", "CorpusId": 2954573, - "PubMed": "19727733"}, "url": "https://www.semanticscholar.org/paper/a23882033d21f9add31d5dda6716a6f2a16d7678", - "title": "Stability analysis of non-autonomous reaction-diffusion systems: - the effects of growing domains", "abstract": null, "venue": "Journal of Mathematical - Biology", "year": 2010, "referenceCount": 42, "citationCount": 105, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2010-07-01", "journal": - {"name": "Journal of Mathematical Biology", "pages": "133-164", "volume": - "61"}, "authors": [{"authorId": "2731718", "name": "A. Madzvamuse"}, {"authorId": - "2662569", "name": "E. Gaffney"}, {"authorId": "2339973", "name": "P. Maini"}]}, + 318, "influentialCitationCount": 49, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1986-10-27", "journal": {"name": "27th Annual Symposium on Foundations of + Computer Science (sfcs 1986)", "pages": "337-347"}, "authors": [{"authorId": + "1794932", "name": "L. Babai"}, {"authorId": "1678770", "name": "P. Frankl"}, + {"authorId": "143688145", "name": "Janos Simon"}]}, {"paperId": "8058d2c4dcf0d2b2de248304be9414c8230c0ff0", + "externalIds": {"DBLP": "journals/aml/FokinaKM10", "MAG": "2043078465", "DOI": + "10.1007/s00153-009-0160-4", "CorpusId": 18340253}, "corpusId": 18340253, + "publicationVenue": {"id": "baf6e768-e94b-48e9-9326-6aad748d4c61", "name": + "Archive for Mathematical Logic", "type": "journal", "alternate_names": ["Arch + Math Log"], "issn": "0933-5846", "url": "https://www.springer.com/mathematics/journal/153", + "alternate_urls": ["http://link.springer.com/journal/153", "http://www.springer.com/mathematics/journal/153"]}, + "url": "https://www.semanticscholar.org/paper/8058d2c4dcf0d2b2de248304be9414c8230c0ff0", + "title": "Degrees of categoricity of computable structures", "abstract": null, + "venue": "Archive for Mathematical Logic", "year": 2010, "referenceCount": + 24, "citationCount": 96, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Archive for Mathematical Logic", "pages": "51-67", "volume": "49"}, + "authors": [{"authorId": "3242657", "name": "E. Fokina"}, {"authorId": "2935517", + "name": "I. Kalimullin"}, {"authorId": "2110456077", "name": "Russell G. Miller"}]}, {"paperId": "1c0230cc790ab89e3cf197014d960e45aeecc1ed", "externalIds": {"DBLP": "journals/cacm/Papadimitriou12", "MAG": "2165391701", "DOI": "10.1145/2330667.2330681", - "CorpusId": 7237716}, "url": "https://www.semanticscholar.org/paper/1c0230cc790ab89e3cf197014d960e45aeecc1ed", + "CorpusId": 7237716}, "corpusId": 7237716, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1c0230cc790ab89e3cf197014d960e45aeecc1ed", "title": "Alan and I", "abstract": "A personal account of Alan Turing''s life and impact.", "venue": "CACM", "year": 2012, "referenceCount": 0, "citationCount": - 50, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-09-01", "journal": - {"name": "Commun. ACM", "pages": "42-43", "volume": "55"}, "authors": [{"authorId": - "144102674", "name": "C. Papadimitriou"}]}, {"paperId": "ee4a654206fb707c659015a98d55cde42fab3b51", + 50, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-09-01", "journal": {"name": "Commun. ACM", "pages": "42-43", "volume": + "55"}, "authors": [{"authorId": "144102674", "name": "C. Papadimitriou"}]}, + {"paperId": "7572a8c20c14452e9323d765cd23c72439d13c4a", "externalIds": {"MAG": + "2139215311", "DOI": "10.1039/A702602A", "CorpusId": 9103671}, "corpusId": + 9103671, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7572a8c20c14452e9323d765cd23c72439d13c4a", + "title": "Spatial pattern formation in chemical and biological systems", "abstract": + "One of the central issues in developmental biology is the formation of spatial + pattern in the embryo. A number of theories have been proposed to account + for this phenomenon. The most widely studied is reaction diffusion theory, + which proposes that a chemical pre-pattern is first set up due to a system + of reacting and diffusing chemicals, and cells respond to this pre-pattern + by differentiating accordingly. Such patterns, known as Turing structures, + were first identified in chemical systems only recently. This article reviews + the application of reaction diffusion theory to chemical systems and then + considers a number of biological applications.", "venue": "", "year": 1997, + "referenceCount": 133, "citationCount": 298, "influentialCitationCount": 10, + "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:669d6131-8e3d-401c-9ade-2c1aa3ad4de8/download_file?safe_filename=96.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "Journal of the Chemical Society, Faraday Transactions", "pages": "3601-3610", + "volume": "93"}, "authors": [{"authorId": "2339973", "name": "P. Maini"}, + {"authorId": "1964371", "name": "K. Painter"}, {"authorId": "94346140", "name": + "Helene Nguyen Phong Chau"}]}, {"paperId": "ee4a654206fb707c659015a98d55cde42fab3b51", "externalIds": {"MAG": "2065597356", "DOI": "10.1103/PHYSREVLETT.64.2354", - "CorpusId": 2908796, "PubMed": "10041691"}, "url": "https://www.semanticscholar.org/paper/ee4a654206fb707c659015a98d55cde42fab3b51", + "CorpusId": 2908796, "PubMed": "10041691"}, "corpusId": 2908796, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/ee4a654206fb707c659015a98d55cde42fab3b51", "title": "Unpredictability and undecidability in dynamical systems.", "abstract": "We show that motion with as few as three degrees of freedom (for instance, a particle moving in a three-dimensional potential) can be equivalent to a @@ -13347,25 +15204,30 @@ interactions: conditions are known exactly, virtually any question about their long-term dynamics is undecidable.", "venue": "Physical Review Letters", "year": 1990, "referenceCount": 13, "citationCount": 369, "influentialCitationCount": 24, - "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1990-05-14", "journal": {"name": "Physical - review letters", "pages": "\n 2354-2357\n ", "volume": "64 - 20"}, "authors": [{"authorId": "123147792", "name": "Moore"}]}, {"paperId": - "e8058bf4ea9ff8e29221e7fd3180f1e9ec13a3f1", "externalIds": {"MAG": "2348519128", - "DOI": "10.1038/369215A0", "CorpusId": 4257570}, "url": "https://www.semanticscholar.org/paper/e8058bf4ea9ff8e29221e7fd3180f1e9ec13a3f1", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1990-05-14", "journal": {"name": "Physical review letters", "pages": "\n 2354-2357\n ", + "volume": "64 20"}, "authors": [{"authorId": "123147792", "name": "Moore"}]}, + {"paperId": "e8058bf4ea9ff8e29221e7fd3180f1e9ec13a3f1", "externalIds": {"MAG": + "2348519128", "DOI": "10.1038/369215A0", "CorpusId": 4257570}, "corpusId": + 4257570, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/e8058bf4ea9ff8e29221e7fd3180f1e9ec13a3f1", "title": "Experimental observation of self-replicating spots in a reaction\u2013diffusion system", "abstract": null, "venue": "Nature", "year": 1994, "referenceCount": - 11, "citationCount": 372, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1994-05-19", "journal": {"name": - "Nature", "pages": "215-218", "volume": "369"}, "authors": [{"authorId": "2110246847", - "name": "K. Lee"}, {"authorId": "38890112", "name": "W. Mccormick"}, {"authorId": - "78612126", "name": "J. Pearson"}, {"authorId": "2421446", "name": "H. Swinney"}]}, - {"paperId": "ffaf636f56a0eb8d17a0cbe9bfeaebbe3df3d93b", "externalIds": {"MAG": - "2002942454", "DOI": "10.2307/1969481", "CorpusId": 119497966}, "url": "https://www.semanticscholar.org/paper/ffaf636f56a0eb8d17a0cbe9bfeaebbe3df3d93b", + 11, "citationCount": 374, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-05-19", + "journal": {"name": "Nature", "pages": "215-218", "volume": "369"}, "authors": + [{"authorId": "2110246847", "name": "K. Lee"}, {"authorId": "38890112", "name": + "W. Mccormick"}, {"authorId": "78612126", "name": "J. Pearson"}, {"authorId": + "2421446", "name": "H. Swinney"}]}, {"paperId": "ffaf636f56a0eb8d17a0cbe9bfeaebbe3df3d93b", + "externalIds": {"MAG": "2002942454", "DOI": "10.2307/1969481", "CorpusId": + 119497966}, "corpusId": 119497966, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ffaf636f56a0eb8d17a0cbe9bfeaebbe3df3d93b", "title": "THE WORD PROBLEM IN SEMI-GROUPS WITH CANCELLATION", "abstract": "It will be shown that the word problem in semi-groups with cancellation is not solvable. The method depends on reducing the unsolvability of the problem @@ -13373,13 +15235,14 @@ interactions: machines introduced by Post (Post, [1]) and the author (Turing, [1]). In this we follow Post (Post, [2]) who reduced the problem of Thue to this same unsolvable problem.", "venue": "", "year": 1950, "referenceCount": 93, "citationCount": - 236, "influentialCitationCount": 24, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1950-09-01", "journal": {"name": "Annals of Mathematics", - "pages": "491", "volume": "52"}, "authors": [{"authorId": "2079681794", "name": - "A. Turing"}]}, {"paperId": "401226dbe808714439b7f4fe6ce17e3fb5a6e790", "externalIds": - {"CorpusId": 7990676}, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790", + 237, "influentialCitationCount": 24, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1950-09-01", "journal": {"name": + "Annals of Mathematics", "pages": "491", "volume": "52"}, "authors": [{"authorId": + "2079681794", "name": "A. Turing"}]}, {"paperId": "401226dbe808714439b7f4fe6ce17e3fb5a6e790", + "externalIds": {"CorpusId": 7990676}, "corpusId": 7990676, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790", "title": "Artificial Intelligence : Usfssg Computers to Think about Thinking . Part 1", "abstract": "In 1950, Alan M. Turing, the late deputy director of the University of Manchester\u2019s Computing Laboratory in England, proposed @@ -13420,12 +15283,48 @@ interactions: tasks, but not very well. For example, chess programs were successful at following the step-by-step instructions for moving chessmen. But computers couldn\u2019t independently gen-", "venue": "", "year": 1983, "referenceCount": 143, "citationCount": - 181, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": null, - "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "8964838cb60e31c13fda81e10fa75f476e10a126", + 181, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, + {"paperId": "b054eded4231b8d14378702c1862352512701855", "externalIds": {"DBLP": + "journals/siamcomp/Valiant02", "MAG": "2032292489", "DOI": "10.1137/S0097539700377025", + "CorpusId": 40855984}, "corpusId": 40855984, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/b054eded4231b8d14378702c1862352512701855", + "title": "Quantum Circuits That Can Be Simulated Classically in Polynomial + Time", "abstract": "A model of quantum computation based on unitary matrix + operations was introduced by Feynman and Deutsch. It has been asked whether + the power of this model exceeds that of classical Turing machines. We show + here that a significant class of these quantum computations can be simulated + classically in polynomial time. In particular we show that two-bit operations + characterized by 4 \u00d7 4 matrices in which the sixteen entries obey a set + of five polynomial relations can be composed according to certain rules to + yield a class of circuits that can be simulated classically in polynomial + time. This contrasts with the known universality of two-bit operations and + demonstrates that efficient quantum computation of restricted classes is reconcilable + with the Polynomial Time Turing Hypothesis. Therefore, it is possible that, + The techniques introduced bring the quantum computational model within the + realm of algebraic complexity theory. In a manner consistent with one view + of quantum physics, the wave function is simulated deterministically, and + randomization arises only in the course of making measurements. The results + generalize the quantum model in that they do not require the matrices to be + unitary. In a different direction these techniques also yield deterministic + polynomial time algorithms for the decision and parity problems for certain + classes of read-twice Boolean formulae. All our results are based on the use + of gates that are defined in terms of their graph matching properties.", "venue": + "SIAM journal on computing (Print)", "year": 2002, "referenceCount": 0, "citationCount": + 244, "influentialCitationCount": 29, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2002-04-01", "journal": + {"name": "SIAM J. Comput.", "pages": "1229-1254", "volume": "31"}, "authors": + [{"authorId": "1741124", "name": "L. Valiant"}]}, {"paperId": "8964838cb60e31c13fda81e10fa75f476e10a126", "externalIds": {"MAG": "1997924127", "DOI": "10.1112/PLMS/S2-48.1.180", "CorpusId": - 14463084}, "url": "https://www.semanticscholar.org/paper/8964838cb60e31c13fda81e10fa75f476e10a126", + 14463084}, "corpusId": 14463084, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8964838cb60e31c13fda81e10fa75f476e10a126", "title": "A Method for the Calculation of the Zeta\u2010Function", "abstract": "In recent years, much research has been devoted to the refinement of information retrieval systems; however, few have explored the investigation of the Turing @@ -13434,14 +15333,14 @@ interactions: paper is not on whether symmetric encryption can be made gametheoretic, cooperative, and scalable, but rather on constructing a novel heuristic for the simulation of XML", "venue": "", "year": 1945, "referenceCount": 92, "citationCount": - 227, "influentialCitationCount": 29, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 227, "influentialCitationCount": 29, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Proceedings of The London Mathematical Society", "pages": "180-197", "volume": ""}, "authors": [{"authorId": "2079681794", "name": "A. Turing"}]}, {"paperId": "f360abcacb739b0441e22bde40dcdfa48dfd97fa", "externalIds": {"MAG": "1906710615", "DOI": "10.5860/choice.44-5094", "CorpusId": - 60874772}, "url": "https://www.semanticscholar.org/paper/f360abcacb739b0441e22bde40dcdfa48dfd97fa", + 60874772}, "corpusId": 60874772, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f360abcacb739b0441e22bde40dcdfa48dfd97fa", "title": "Interactive Computation: The New Paradigm", "abstract": "The interaction paradigm is a new conceptualization of computational phenomena that emphasizes interaction over algorithms, reflecting the shift in technology from main-frame @@ -13454,68 +15353,61 @@ interactions: applications. The book challenges traditional Turing machine-based answers to fundamental questions of problem solving and the scope of computation.", "venue": "", "year": 2006, "referenceCount": 0, "citationCount": 201, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-540-34874-0%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-10-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "27353259", "name": "Dina Q. Goldin"}, {"authorId": "145940172", "name": "S. Smolka"}, - {"authorId": "2103444", "name": "P. Wegner"}]}, {"paperId": "b054eded4231b8d14378702c1862352512701855", - "externalIds": {"DBLP": "journals/siamcomp/Valiant02", "MAG": "2032292489", - "DOI": "10.1137/S0097539700377025", "CorpusId": 40855984}, "url": "https://www.semanticscholar.org/paper/b054eded4231b8d14378702c1862352512701855", - "title": "Quantum Circuits That Can Be Simulated Classically in Polynomial - Time", "abstract": "A model of quantum computation based on unitary matrix - operations was introduced by Feynman and Deutsch. It has been asked whether - the power of this model exceeds that of classical Turing machines. We show - here that a significant class of these quantum computations can be simulated - classically in polynomial time. In particular we show that two-bit operations - characterized by 4 \u00d7 4 matrices in which the sixteen entries obey a set - of five polynomial relations can be composed according to certain rules to - yield a class of circuits that can be simulated classically in polynomial - time. This contrasts with the known universality of two-bit operations and - demonstrates that efficient quantum computation of restricted classes is reconcilable - with the Polynomial Time Turing Hypothesis. Therefore, it is possible that, - The techniques introduced bring the quantum computational model within the - realm of algebraic complexity theory. In a manner consistent with one view - of quantum physics, the wave function is simulated deterministically, and - randomization arises only in the course of making measurements. The results - generalize the quantum model in that they do not require the matrices to be - unitary. In a different direction these techniques also yield deterministic - polynomial time algorithms for the decision and parity problems for certain - classes of read-twice Boolean formulae. All our results are based on the use - of gates that are defined in terms of their graph matching properties.", "venue": - "SIAM journal on computing (Print)", "year": 2002, "referenceCount": 0, "citationCount": - 242, "influentialCitationCount": 28, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2002-04-01", "journal": {"name": "SIAM - J. Comput.", "pages": "1229-1254", "volume": "31"}, "authors": [{"authorId": - "1741124", "name": "L. Valiant"}]}, {"paperId": "894311993c89e9c83d7f4a0f5451f388ba06f436", + {"authorId": "2103444", "name": "P. Wegner"}]}, {"paperId": "894311993c89e9c83d7f4a0f5451f388ba06f436", "externalIds": {"DBLP": "conf/icalp/DufourdFS98", "MAG": "1513999490", "DOI": - "10.1007/BFb0055044", "CorpusId": 10209919}, "url": "https://www.semanticscholar.org/paper/894311993c89e9c83d7f4a0f5451f388ba06f436", + "10.1007/BFb0055044", "CorpusId": 10209919}, "corpusId": 10209919, "publicationVenue": + {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", "name": "International Colloquium + on Automata, Languages and Programming", "type": "conference", "alternate_names": + ["Int Conf Arab Lang Process", "International Conference on Arabic Language + Processing", "Int Colloq Autom Lang Program", "ICALP"], "url": "http://www.eatcs.org/"}, + "url": "https://www.semanticscholar.org/paper/894311993c89e9c83d7f4a0f5451f388ba06f436", "title": "Reset Nets Between Decidability and Undecidability", "abstract": null, "venue": "International Colloquium on Automata, Languages and Programming", "year": 1998, "referenceCount": 16, "citationCount": 278, "influentialCitationCount": - 22, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1998-07-13", "journal": {"pages": "103-115"}, "authors": - [{"authorId": "1804163", "name": "C. Dufourd"}, {"authorId": "1713149", "name": - "A. Finkel"}, {"authorId": "1720600", "name": "P. Schnoebelen"}]}, {"paperId": - "19f3736764655f018783e40b7b6e862b99df929c", "externalIds": {"MAG": "2015931928", - "DOI": "10.1038/SCIENTIFICAMERICAN0785-48", "CorpusId": 14196434}, "url": - "https://www.semanticscholar.org/paper/19f3736764655f018783e40b7b6e862b99df929c", + 22, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1998-07-13", "journal": {"pages": "103-115"}, + "authors": [{"authorId": "1804163", "name": "C. Dufourd"}, {"authorId": "1713149", + "name": "A. Finkel"}, {"authorId": "1720600", "name": "P. Schnoebelen"}]}, + {"paperId": "19f3736764655f018783e40b7b6e862b99df929c", "externalIds": {"MAG": + "2015931928", "DOI": "10.1038/SCIENTIFICAMERICAN0785-48", "CorpusId": 14196434}, + "corpusId": 14196434, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19f3736764655f018783e40b7b6e862b99df929c", "title": "The Fundamental Physical Limits of Computation.", "abstract": null, - "venue": "", "year": 1985, "referenceCount": 135, "citationCount": 367, "influentialCitationCount": - 17, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1985-07-01", - "journal": {"name": "Scientific American", "pages": "48-56", "volume": "253"}, - "authors": [{"authorId": "2055127325", "name": "Charles H. Bennett"}, {"authorId": - "145139743", "name": "R. Landauer"}]}, {"paperId": "aa63c0c2c102e3cb755eb21b1adfce933f0acfc9", - "externalIds": {"DBLP": "journals/siamcomp/AdlemanDH97", "MAG": "2913788899", - "DOI": "10.1137/S0097539795293639", "CorpusId": 18968219}, "url": "https://www.semanticscholar.org/paper/aa63c0c2c102e3cb755eb21b1adfce933f0acfc9", + "venue": "", "year": 1985, "referenceCount": 135, "citationCount": 368, "influentialCitationCount": + 17, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1985-07-01", "journal": {"name": "Scientific American", + "pages": "48-56", "volume": "253"}, "authors": [{"authorId": "2055127325", + "name": "Charles H. Bennett"}, {"authorId": "145139743", "name": "R. Landauer"}]}, + {"paperId": "de6f5b8646f8bfe709588339475f9e013fd48505", "externalIds": {"MAG": + "2005657676", "DOI": "10.1007/S11071-008-9462-Z", "CorpusId": 119436015}, + "corpusId": 119436015, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de6f5b8646f8bfe709588339475f9e013fd48505", + "title": "Predator cannibalism can give rise to regular spatial pattern in + a predator\u2013prey system", "abstract": null, "venue": "", "year": 2009, + "referenceCount": 35, "citationCount": 121, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2009-01-09", "journal": {"name": "Nonlinear Dynamics", + "pages": "75-84", "volume": "58"}, "authors": [{"authorId": "47334108", "name": + "Gui\u2010Quan Sun"}, {"authorId": "144690211", "name": "Guang Zhang"}, {"authorId": + "145752193", "name": "Zhen Jin"}, {"authorId": "103314097", "name": "Li Li"}]}, + {"paperId": "aa63c0c2c102e3cb755eb21b1adfce933f0acfc9", "externalIds": {"DBLP": + "journals/siamcomp/AdlemanDH97", "MAG": "2913788899", "DOI": "10.1137/S0097539795293639", + "CorpusId": 18968219}, "corpusId": 18968219, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/aa63c0c2c102e3cb755eb21b1adfce933f0acfc9", "title": "Quantum Computability", "abstract": "In this paper some theoretical and (potentially) practical aspects of quantum computing are considered. Using the tools of transcendental number theory it is demonstrated that quantum @@ -13539,49 +15431,19 @@ interactions: all quantum computers, even if the underlying unitary transformations are unknown to the programmer and the device builder.", "venue": "SIAM journal on computing (Print)", "year": 1997, "referenceCount": 18, "citationCount": - 255, "influentialCitationCount": 34, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1997-10-01", "journal": {"name": "SIAM - J. Comput.", "pages": "1524-1540", "volume": "26"}, "authors": [{"authorId": - "1787024", "name": "L. Adleman"}, {"authorId": "2027813", "name": "Jonathan - DeMarrais"}, {"authorId": "1867304", "name": "Ming-Deh A. Huang"}]}, {"paperId": - "7572a8c20c14452e9323d765cd23c72439d13c4a", "externalIds": {"MAG": "2139215311", - "DOI": "10.1039/A702602A", "CorpusId": 9103671}, "url": "https://www.semanticscholar.org/paper/7572a8c20c14452e9323d765cd23c72439d13c4a", - "title": "Spatial pattern formation in chemical and biological systems", "abstract": - "One of the central issues in developmental biology is the formation of spatial - pattern in the embryo. A number of theories have been proposed to account - for this phenomenon. The most widely studied is reaction diffusion theory, - which proposes that a chemical pre-pattern is first set up due to a system - of reacting and diffusing chemicals, and cells respond to this pre-pattern - by differentiating accordingly. Such patterns, known as Turing structures, - were first identified in chemical systems only recently. This article reviews - the application of reaction diffusion theory to chemical systems and then - considers a number of biological applications.", "venue": "", "year": 1997, - "referenceCount": 133, "citationCount": 295, "influentialCitationCount": 10, - "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": - "Journal of the Chemical Society, Faraday Transactions", "pages": "3601-3610", - "volume": "93"}, "authors": [{"authorId": "2339973", "name": "P. Maini"}, - {"authorId": "1964371", "name": "K. Painter"}, {"authorId": "94346140", "name": - "Helene Nguyen Phong Chau"}]}, {"paperId": "8058d2c4dcf0d2b2de248304be9414c8230c0ff0", - "externalIds": {"DBLP": "journals/aml/FokinaKM10", "MAG": "2043078465", "DOI": - "10.1007/s00153-009-0160-4", "CorpusId": 18340253}, "url": "https://www.semanticscholar.org/paper/8058d2c4dcf0d2b2de248304be9414c8230c0ff0", - "title": "Degrees of categoricity of computable structures", "abstract": null, - "venue": "Archive for Mathematical Logic", "year": 2010, "referenceCount": - 24, "citationCount": 94, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Archive for Mathematical Logic", - "pages": "51-67", "volume": "49"}, "authors": [{"authorId": "3242657", "name": - "E. Fokina"}, {"authorId": "2935517", "name": "I. Kalimullin"}, {"authorId": - "2110456077", "name": "Russell G. Miller"}]}, {"paperId": "74596dc8853d4b386018d514b4184b3ba679d118", - "externalIds": {"MAG": "2076623138", "DBLP": "conf/stoc/Ostrovsky90", "DOI": - "10.1145/100216.100289", "CorpusId": 11987830}, "url": "https://www.semanticscholar.org/paper/74596dc8853d4b386018d514b4184b3ba679d118", + 257, "influentialCitationCount": 34, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1997-10-01", "journal": + {"name": "SIAM J. Comput.", "pages": "1524-1540", "volume": "26"}, "authors": + [{"authorId": "1787024", "name": "L. Adleman"}, {"authorId": "2027813", "name": + "Jonathan DeMarrais"}, {"authorId": "1867304", "name": "Ming-Deh A. Huang"}]}, + {"paperId": "74596dc8853d4b386018d514b4184b3ba679d118", "externalIds": {"MAG": + "2076623138", "DBLP": "conf/stoc/Ostrovsky90", "DOI": "10.1145/100216.100289", + "CorpusId": 11987830}, "corpusId": 11987830, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/74596dc8853d4b386018d514b4184b3ba679d118", "title": "Efficient computation on oblivious RAMs", "abstract": "A machine is oblivious if the sequence in which it accesses memory locations is equivalent for any two programs with the same running time. For example, an oblivious @@ -13600,25 +15462,27 @@ interactions: of the applications, we exhibit a simple and efficient software protection scheme for a generic oneprocessor RAM model of computation.", "venue": "Symposium on the Theory of Computing", "year": 1990, "referenceCount": 16, "citationCount": - 276, "influentialCitationCount": 38, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1990-04-01", "journal": - {"pages": "514-523"}, "authors": [{"authorId": "1748224", "name": "R. Ostrovsky"}]}, - {"paperId": "9ddf890f5c2818985496b65aa36d1d00f168a010", "externalIds": {"DBLP": - "books/daglib/0090683", "MAG": "1494177512", "DOI": "10.1007/978-94-010-0413-8_4", - "CorpusId": 41762324}, "url": "https://www.semanticscholar.org/paper/9ddf890f5c2818985496b65aa36d1d00f168a010", + 276, "influentialCitationCount": 38, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1990-04-01", "journal": {"pages": "514-523"}, "authors": [{"authorId": "1748224", + "name": "R. Ostrovsky"}]}, {"paperId": "9ddf890f5c2818985496b65aa36d1d00f168a010", + "externalIds": {"DBLP": "books/daglib/0090683", "MAG": "1494177512", "DOI": + "10.1007/978-94-010-0413-8_4", "CorpusId": 41762324}, "corpusId": 41762324, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9ddf890f5c2818985496b65aa36d1d00f168a010", "title": "Computability and complexity - from a programming perspective", "abstract": null, "venue": "Foundations of computing series", "year": 1997, "referenceCount": 16, "citationCount": 257, "influentialCitationCount": 24, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-03-14", - "journal": {"pages": "I-XVI, 1-466"}, "authors": [{"authorId": "1700623", - "name": "N. Jones"}]}, {"paperId": "7718e95a70123583a3c0a5da25e6441435dda936", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1997-03-14", "journal": {"pages": "I-XVI, 1-466"}, "authors": + [{"authorId": "1700623", "name": "N. Jones"}]}, {"paperId": "7718e95a70123583a3c0a5da25e6441435dda936", "externalIds": {"ArXiv": "1109.1875", "MAG": "1926310776", "DOI": "10.1017/CBO9781139519694.017", - "CorpusId": 632893}, "url": "https://www.semanticscholar.org/paper/7718e95a70123583a3c0a5da25e6441435dda936", + "CorpusId": 632893}, "corpusId": 632893, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7718e95a70123583a3c0a5da25e6441435dda936", "title": "Martin''s conjecture, arithmetic equivalence, and countable Borel equivalence relations", "abstract": "Introduction. There is a fascinating interplay and overlap between recursion theory and descriptive set theory. @@ -13652,28 +15516,35 @@ interactions: we will discuss all \u201clocalize\u201d so that the assumption of AD essentially amounts to studying definable functions assuming definable determinacy, for instance, Borel functions using Borel determinacy.", "venue": "", "year": - 2011, "referenceCount": 63, "citationCount": 29, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2011-09-09", "journal": {"name": "arXiv: Logic", "pages": "493-520", "volume": - ""}, "authors": [{"authorId": "144836295", "name": "Andrew S. Marks"}, {"authorId": - "2867082", "name": "T. Slaman"}, {"authorId": "2129072", "name": "J. Steel"}]}, - {"paperId": "bac8680b5af4fceb9a8e7dcb5bbb88f11468c74c", "externalIds": {"DBLP": - "books/daglib/0034034", "MAG": "576604117", "DOI": "10.1007/b138451", "CorpusId": - 9513765}, "url": "https://www.semanticscholar.org/paper/bac8680b5af4fceb9a8e7dcb5bbb88f11468c74c", + 2011, "referenceCount": 45, "citationCount": 29, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1109.1875", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2011-09-09", + "journal": {"name": "arXiv: Logic", "pages": "493-520", "volume": ""}, "authors": + [{"authorId": "144836295", "name": "Andrew S. Marks"}, {"authorId": "2867082", + "name": "T. Slaman"}, {"authorId": "2129072", "name": "J. Steel"}]}, {"paperId": + "bac8680b5af4fceb9a8e7dcb5bbb88f11468c74c", "externalIds": {"DBLP": "books/daglib/0034034", + "MAG": "576604117", "DOI": "10.1007/b138451", "CorpusId": 9513765}, "corpusId": + 9513765, "publicationVenue": {"id": "93e1ead9-4333-4cea-8bc6-445bea8f62cb", + "name": "Modeling and Simulation in Science, Engineering and Technology", + "alternate_names": ["Model Simul Sci Eng Technol"], "issn": "2164-3725", "url": + "https://www.springer.com/series/4960"}, "url": "https://www.semanticscholar.org/paper/bac8680b5af4fceb9a8e7dcb5bbb88f11468c74c", "title": "Cellular Automaton Modeling of Biological Pattern Formation - Characterization, Applications, and Analysis", "abstract": null, "venue": "Modeling and Simulation in Science, Engineering and Technology", "year": 2004, "referenceCount": 0, "citationCount": 220, "influentialCitationCount": 7, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2004-10-28", "journal": {"pages": "I-XXIII, 1-331"}, - "authors": [{"authorId": "144557462", "name": "A. Deutsch"}, {"authorId": - "71371594", "name": "S. Dormann"}]}, {"paperId": "c53a23a99cdc2ed0168ea2a6b9b6bf044a5ef4d9", + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-0-8176-4415-4%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-10-28", "journal": {"pages": + "I-XXIII, 1-331"}, "authors": [{"authorId": "144557462", "name": "A. Deutsch"}, + {"authorId": "71371594", "name": "S. Dormann"}]}, {"paperId": "c53a23a99cdc2ed0168ea2a6b9b6bf044a5ef4d9", "externalIds": {"DBLP": "conf/stoc/Pass11", "MAG": "2067109782", "DOI": "10.1145/1993636.1993652", - "CorpusId": 14465753}, "url": "https://www.semanticscholar.org/paper/c53a23a99cdc2ed0168ea2a6b9b6bf044a5ef4d9", + "CorpusId": 14465753}, "corpusId": 14465753, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/c53a23a99cdc2ed0168ea2a6b9b6bf044a5ef4d9", "title": "Limits of provable security from standard assumptions", "abstract": "We show that the security of some well-known cryptographic protocols, primitives and assumptions (e.g., the Schnorr identification scheme, commitments secure @@ -13685,15 +15556,21 @@ interactions: on standard assumptions; we emphasize that this result holds even if the protocol makes non-black-box use of the underlying assumption.", "venue": "Symposium on the Theory of Computing", "year": 2011, "referenceCount": 63, "citationCount": - 71, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2011-06-06", "journal": {"pages": "109-118"}, "authors": [{"authorId": "1811683", - "name": "R. Pass"}]}, {"paperId": "51ee2dc6231a66d30943277e39c20ba002154b14", - "externalIds": {"DBLP": "journals/siamcomp/Sahni74", "MAG": "1995246641", - "DOI": "10.1137/0203021", "CorpusId": 44962500}, "url": "https://www.semanticscholar.org/paper/51ee2dc6231a66d30943277e39c20ba002154b14", + 71, "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.cs.cornell.edu/%7Erafael/papers/schnorr.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2011-06-06", "journal": {"pages": + "109-118"}, "authors": [{"authorId": "1811683", "name": "R. Pass"}]}, {"paperId": + "51ee2dc6231a66d30943277e39c20ba002154b14", "externalIds": {"DBLP": "journals/siamcomp/Sahni74", + "MAG": "1995246641", "DOI": "10.1137/0203021", "CorpusId": 44962500}, "corpusId": + 44962500, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/51ee2dc6231a66d30943277e39c20ba002154b14", "title": "Computationally Related Problems", "abstract": "We look at several problems from areas such as network flows, game theory, artificial intelligence, graph theory, integer programming and nonlinear programming and show that @@ -13709,15 +15586,20 @@ interactions: a class of problems that cannot be solved in deterministic polynomial time.", "venue": "SIAM journal on computing (Print)", "year": 1974, "referenceCount": 10, "citationCount": 375, "influentialCitationCount": 34, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1974-12-01", "journal": {"name": "SIAM - J. Comput.", "pages": "262-279", "volume": "3"}, "authors": [{"authorId": - "145342444", "name": "S. Sahni"}]}, {"paperId": "4b5a9490e85b90925a28079e541029bdc3561bf2", + true, "openAccessPdf": {"url": "http://www.cise.ufl.edu/~sahni/papers/comp.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1974-12-01", "journal": + {"name": "SIAM J. Comput.", "pages": "262-279", "volume": "3"}, "authors": + [{"authorId": "145342444", "name": "S. Sahni"}]}, {"paperId": "4b5a9490e85b90925a28079e541029bdc3561bf2", "externalIds": {"MAG": "2088141885", "DBLP": "journals/siamcomp/Borodin77", - "DOI": "10.1137/0206054", "CorpusId": 15940983}, "url": "https://www.semanticscholar.org/paper/4b5a9490e85b90925a28079e541029bdc3561bf2", + "DOI": "10.1137/0206054", "CorpusId": 15940983}, "corpusId": 15940983, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/4b5a9490e85b90925a28079e541029bdc3561bf2", "title": "On Relating Time and Space to Size and Depth", "abstract": "Turing machine space complexity is related to circuit depth complexity. The relationship complements the known connection between Turing machine time and circuit size, @@ -13726,14 +15608,16 @@ interactions: some connection between Turing machine complexity and arithmetic complexity.", "venue": "SIAM journal on computing (Print)", "year": 1977, "referenceCount": 28, "citationCount": 350, "influentialCitationCount": 31, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + true, "openAccessPdf": {"url": "http://www.cs.toronto.edu/~bor/Papers/relating-time-space-size-depth.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1977-12-01", "journal": {"name": "SIAM J. Comput.", "pages": "733-744", "volume": "6"}, "authors": [{"authorId": "145354960", "name": "A. Borodin"}]}, {"paperId": "b39f2b6ce1014f90992f493d76c00fe06854ca0e", "externalIds": {"MAG": "2145964906", - "DOI": "10.1017/S0305004100049252", "CorpusId": 122817056}, "url": "https://www.semanticscholar.org/paper/b39f2b6ce1014f90992f493d76c00fe06854ca0e", + "DOI": "10.1017/S0305004100049252", "CorpusId": 122817056}, "corpusId": 122817056, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b39f2b6ce1014f90992f493d76c00fe06854ca0e", "title": "Theorems on factorization and primality testing", "abstract": "1. Introduction. This paper is concerned with the problem of obtaining theoretical estimates for the number of arithmetical operations required to factorize @@ -13745,48 +15629,17 @@ interactions: \u2018prime\u2019 or \u2018composite\u2019. There are, of course, other definitions which could be used; but the differences between these are unimportant for our purpose.", "venue": "Mathematical Proceedings of the Cambridge Philosophical - Society", "year": 1974, "referenceCount": 17, "citationCount": 415, "influentialCitationCount": - 23, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1974-11-01", "journal": {"name": "Mathematical Proceedings of the Cambridge - Philosophical Society", "pages": "521 - 528", "volume": "76"}, "authors": - [{"authorId": "2204492", "name": "J. Pollard"}]}, {"paperId": "de6f5b8646f8bfe709588339475f9e013fd48505", - "externalIds": {"MAG": "2005657676", "DOI": "10.1007/S11071-008-9462-Z", "CorpusId": - 119436015}, "url": "https://www.semanticscholar.org/paper/de6f5b8646f8bfe709588339475f9e013fd48505", - "title": "Predator cannibalism can give rise to regular spatial pattern in - a predator\u2013prey system", "abstract": null, "venue": "", "year": 2009, - "referenceCount": 35, "citationCount": 111, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2009-01-09", "journal": {"name": "Nonlinear Dynamics", "pages": "75-84", - "volume": "58"}, "authors": [{"authorId": "47334108", "name": "Gui\u2010Quan - Sun"}, {"authorId": "144690211", "name": "Guang Zhang"}, {"authorId": "145752193", - "name": "Zhen Jin"}, {"authorId": "103314097", "name": "Li Li"}]}, {"paperId": - "db1bf3fcabfa7970aa64233d985ab419513b5376", "externalIds": {"MAG": "563127568", - "CorpusId": 92868762}, "url": "https://www.semanticscholar.org/paper/db1bf3fcabfa7970aa64233d985ab419513b5376", - "title": "Chemical Oscillations and Instabilities: Non-Linear Chemical Kinetics", - "abstract": "1. Introduction Part 1: The Techniques 2. Oscillations in a closed - isothermal system 3. Oscillations in a closed isothermal system: mathematical - analysis 4. Thermokinetic oscillations in a closed system 5. Hopf bifurcations, - the growth of small oscillations, relaxation oscillations, and excitability - 6. Autocatalysis in well-stirred open systems: the isothermal CSTR 7. Reaction - in a non-isothermal CSTR: Stationary states and singularity theory 8. Oscillatory - behaviour in the isothermal CSTR: autocatalytic systems 9. Autocatalytic reactions - in plug-flow and diffusion reactors 10. Chemical diffusion pattern formation - (Turing structures) 11. Travelling waves 12. Heterogeneous reactions 13. Complex - oscillations and chemical chaos Part 2: Experiments 14. Experimental systems - 1: solution-phase reactions 15. Experimental systems 2: gas-phase reactions - References Index", "venue": "", "year": 1990, "referenceCount": 0, "citationCount": - 299, "influentialCitationCount": 19, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1990-04-26", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "40510727", "name": "P. Gray"}, {"authorId": "35030196", - "name": "S. Scott"}]}, {"paperId": "7193b80cf00dae4a878fda6d13a27b4af6d032c2", - "externalIds": {"DBLP": "conf/cvpr/MoyJHP04", "MAG": "2107612984", "DOI": - "10.1109/CVPR.2004.84", "CorpusId": 497690}, "url": "https://www.semanticscholar.org/paper/7193b80cf00dae4a878fda6d13a27b4af6d032c2", + Society", "year": 1974, "referenceCount": 17, "citationCount": 416, "influentialCitationCount": + 23, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1974-11-01", "journal": {"name": + "Mathematical Proceedings of the Cambridge Philosophical Society", "pages": + "521 - 528", "volume": "76"}, "authors": [{"authorId": "2204492", "name": + "J. Pollard"}]}, {"paperId": "7193b80cf00dae4a878fda6d13a27b4af6d032c2", "externalIds": + {"DBLP": "conf/cvpr/MoyJHP04", "MAG": "2107612984", "DOI": "10.1109/CVPR.2004.84", + "CorpusId": 497690}, "corpusId": 497690, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7193b80cf00dae4a878fda6d13a27b4af6d032c2", "title": "Distortion estimation techniques in solving visual CAPTCHAs", "abstract": "This paper describes two distortion estimation techniques for object recognition that solve EZ-Gimpy and Gimpy-r, two of the visual CAPTCHAs (\"completely @@ -13799,7 +15652,8 @@ interactions: image 78% of the time.", "venue": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "year": 2004, "referenceCount": 8, "citationCount": 231, "influentialCitationCount": - 9, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 9, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cs.duke.edu/courses/spring07/cps296.3/breaking_captchas.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2004-06-27", "journal": {"name": "Proceedings @@ -13809,7 +15663,8 @@ interactions: "name": "N. Jones"}, {"authorId": "2722859", "name": "C. Harkless"}, {"authorId": "47331819", "name": "R. Potter"}]}, {"paperId": "1cd22c01081061ca193ce4fb30c7759ce140f842", "externalIds": {"MAG": "2109200086", "DBLP": "journals/jsac/Mitola99", "DOI": - "10.1109/49.761033", "CorpusId": 34265181}, "url": "https://www.semanticscholar.org/paper/1cd22c01081061ca193ce4fb30c7759ce140f842", + "10.1109/49.761033", "CorpusId": 34265181}, "corpusId": 34265181, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1cd22c01081061ca193ce4fb30c7759ce140f842", "title": "Software radio architecture: a mathematical perspective", "abstract": "As the software radio makes its transition from research to practice, it becomes increasingly important to establish provable properties of the software @@ -13831,15 +15686,68 @@ interactions: radio. These criteria may be useful in defining interfaces among hardware, middleware, and higher level software components that are needed for cost-effective software reuse.", "venue": "IEEE J. Sel. Areas Commun.", "year": 1999, "referenceCount": - 37, "citationCount": 254, "influentialCitationCount": 12, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1999-04-01", "journal": {"name": "IEEE J. Sel. Areas Commun.", - "pages": "514-538", "volume": "17"}, "authors": [{"authorId": "48168298", - "name": "J. Mitola"}]}, {"paperId": "a5fa13231ca2cefcf60ae97eafee8d772fdfdfc5", + 37, "citationCount": 255, "influentialCitationCount": 12, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1999-04-01", "journal": {"name": "IEEE J. Sel. + Areas Commun.", "pages": "514-538", "volume": "17"}, "authors": [{"authorId": + "48168298", "name": "J. Mitola"}]}, {"paperId": "81c7b1fb64add1498a358fb946229d2ba5b05ecb", + "externalIds": {"MAG": "1991279350", "DOI": "10.1007/S11071-015-1988-2", "CorpusId": + 120004448}, "corpusId": 120004448, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/81c7b1fb64add1498a358fb946229d2ba5b05ecb", + "title": "Pattern formation and spatiotemporal chaos in a reaction\u2013diffusion + predator\u2013prey system", "abstract": null, "venue": "", "year": 2015, "referenceCount": + 46, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-02-25", + "journal": {"name": "Nonlinear Dynamics", "pages": "265-275", "volume": "81"}, + "authors": [{"authorId": "2853286", "name": "Guangping Hu"}, {"authorId": + "2127399824", "name": "Xiaolin Li"}, {"authorId": "40566176", "name": "Yuepeng + Wang"}]}, {"paperId": "16f3886e5418ae9f3f698834e42a1e4f54ee4d22", "externalIds": + {"DBLP": "journals/ijbc/Chua05", "MAG": "2018341541", "DOI": "10.1142/S0218127405014337", + "CorpusId": 32989367}, "corpusId": 32989367, "publicationVenue": {"id": "f3358047-5fa1-4315-9473-4bb4c19cb756", + "name": "International Journal of Bifurcation and Chaos in Applied Sciences + and Engineering", "type": "journal", "alternate_names": ["Int J Bifurc Chaos", + "Int J Bifurc Chaos Appl Sci Eng", "International Journal of Bifurcation and + Chaos"], "issn": "0218-1274", "url": "http://www.worldscinet.com/ijbc/ijbc.shtml", + "alternate_urls": ["http://www.worldscinet.com/ijbc/mkt/archive.shtml"]}, + "url": "https://www.semanticscholar.org/paper/16f3886e5418ae9f3f698834e42a1e4f54ee4d22", + "title": "Local Activity is the Origin of Complexity", "abstract": "Many scientists + have struggled to uncover the elusive origin of \"complexity\", and its many + equivalent jargons, such as emergence, self-organization, synergetics, collective + behaviors, nonequilibrium phenomena, etc. They have provided some qualitative, + but not quantitative, characterizations of numerous fascinating examples from + many disciplines. For example, Schrodinger had identified \"the exchange of + energy\" from open systems as a necessary condition for complexity. Prigogine + has argued for the need to introduce a new principle of nature which he dubbed + \"the instability of the homogeneous\". Turing had proposed \"symmetry breaking\" + as an origin of morphogenesis. Smale had asked what \"axiomatic\" properties + must a reaction\u2013diffusion system possess to make the Turing interacting + system oscillate. The purpose of this paper is to show that all the jargons + and issues cited above are mere manifestations of a new fundamental principle + called local activity, which is mathematically precise and testable. The local + activity theorem provides the quantitative characterization of Prigogine''s + \"instability of the homogeneous\" and Smale''s quest for an axiomatic principle + on Turing instability. Among other things, a mathematical proof is given which + shows none of the complexity-related jargons cited above is possible without + local activity. Explicit mathematical criteria are given to identify a relatively + small subset of the locally-active parameter region, called the edge of chaos, + where most complex phenomena emerge.", "venue": "International Journal of + Bifurcation and Chaos in Applied Sciences and Engineering", "year": 2005, + "referenceCount": 12, "citationCount": 155, "influentialCitationCount": 27, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-11-01", "journal": {"name": "Int. + J. Bifurc. Chaos", "pages": "3435-3456", "volume": "15"}, "authors": [{"authorId": + "144848684", "name": "L. Chua"}]}, {"paperId": "a5fa13231ca2cefcf60ae97eafee8d772fdfdfc5", "externalIds": {"DBLP": "journals/jacm/Cook71", "MAG": "2079275582", "DOI": - "10.1145/321623.321625", "CorpusId": 17737326}, "url": "https://www.semanticscholar.org/paper/a5fa13231ca2cefcf60ae97eafee8d772fdfdfc5", + "10.1145/321623.321625", "CorpusId": 17737326}, "corpusId": 17737326, "publicationVenue": + {"id": "5c1ee4fd-f14f-4d2a-9d42-1a1be373786a", "name": "Journal of the ACM", + "type": "journal", "alternate_names": ["J ACM"], "issn": "1535-9921", "alternate_issns": + ["0004-5411"], "url": "http://www.acm.org/jacm/", "alternate_urls": ["http://portal.acm.org/jacm", + "http://jacm.acm.org/", "https://jacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/a5fa13231ca2cefcf60ae97eafee8d772fdfdfc5", "title": "Characterizations of Pushdown Machines in Terms of Time-Bounded Computers", "abstract": "A class of machines called auxiliary pushdown machines is introduced. Several types of pushdown automata, including stack automata, @@ -13847,15 +15755,16 @@ interactions: class of machines in question is characterized in terms of time-bounded Turing machines, and corollaries are derived which answer some open questions in the field. ~", "venue": "Journal of the ACM", "year": 1971, "referenceCount": - 26, "citationCount": 363, "influentialCitationCount": 42, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1971-01-01", "journal": {"name": "Journal of the ACM (JACM)", "pages": "4 - - 18", "volume": "18"}, "authors": [{"authorId": "1765456", "name": "S. Cook"}]}, - {"paperId": "9471963f4874dc55ee9f8860309b1c7e966be9e7", "externalIds": {"MAG": - "2013455832", "DBLP": "conf/focs/Mahaney80", "DOI": "10.1109/SFCS.1980.40", - "CorpusId": 7449729}, "url": "https://www.semanticscholar.org/paper/9471963f4874dc55ee9f8860309b1c7e966be9e7", + 26, "citationCount": 363, "influentialCitationCount": 41, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1971-01-01", "journal": {"name": "Journal of the ACM (JACM)", + "pages": "4 - 18", "volume": "18"}, "authors": [{"authorId": "1765456", "name": + "S. Cook"}]}, {"paperId": "9471963f4874dc55ee9f8860309b1c7e966be9e7", "externalIds": + {"MAG": "2013455832", "DBLP": "conf/focs/Mahaney80", "DOI": "10.1109/SFCS.1980.40", + "CorpusId": 7449729}, "corpusId": 7449729, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9471963f4874dc55ee9f8860309b1c7e966be9e7", "title": "Sparse complete sets for NP: Solution of a conjecture of Berman and Hartmanis", "abstract": "A set S \u2282 {0,1}* is sparse if there is a polynomial p such that the number of strings in S of size at most n is at @@ -13865,16 +15774,18 @@ interactions: set under Turing reductions, then the polynomial time hierarchy collapses to \u03942P.", "venue": "21st Annual Symposium on Foundations of Computer Science (sfcs 1980)", "year": 1980, "referenceCount": 23, "citationCount": - 329, "influentialCitationCount": 15, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1980-10-13", "journal": {"name": "21st Annual Symposium - on Foundations of Computer Science (sfcs 1980)", "pages": "54-60"}, "authors": - [{"authorId": "1697974", "name": "Stephen R. Mahaney"}]}, {"paperId": "cc23399cf739fc18cc92df6627583f4e52dfe063", - "externalIds": {"DBLP": "books/daglib/0070485", "MAG": "1938103548", "DOI": - "10.5860/choice.32-0356", "CorpusId": 31066756}, "url": "https://www.semanticscholar.org/paper/cc23399cf739fc18cc92df6627583f4e52dfe063", + 329, "influentialCitationCount": 15, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1980-10-13", "journal": {"name": "21st + Annual Symposium on Foundations of Computer Science (sfcs 1980)", "pages": + "54-60"}, "authors": [{"authorId": "1697974", "name": "Stephen R. Mahaney"}]}, + {"paperId": "cc23399cf739fc18cc92df6627583f4e52dfe063", "externalIds": {"DBLP": + "books/daglib/0070485", "MAG": "1938103548", "DOI": "10.5860/choice.32-0356", + "CorpusId": 31066756}, "corpusId": 31066756, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cc23399cf739fc18cc92df6627583f4e52dfe063", "title": "Computability, complexity, and languages - fundamentals of theoretical computer science", "abstract": "Preliminaries. Computability: Programs and Computable Functions. Primitive Recursive Functions. A Universal Program. @@ -13885,27 +15796,29 @@ interactions: Approximation Orderings. Denotational Semantics of Recursion Equations. Operational Semantics of Recursion Equations. Suggestions for Further Reading. Subject Index.", "venue": "Computer science and applied mathematics", "year": 2014, - "referenceCount": 0, "citationCount": 302, "influentialCitationCount": 13, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-09-23", - "journal": {"pages": "I-XIX, 1-425"}, "authors": [{"authorId": "113641402", - "name": "Martin D. Davis"}, {"authorId": "1739966", "name": "E. Weyuker"}]}, - {"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", "externalIds": {"MAG": - "1482735464", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": 64330274}, "url": - "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7", + "referenceCount": 0, "citationCount": 303, "influentialCitationCount": 13, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2014-09-23", "journal": {"pages": "I-XIX, 1-425"}, "authors": + [{"authorId": "113641402", "name": "Martin D. Davis"}, {"authorId": "1739966", + "name": "E. Weyuker"}]}, {"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", + "externalIds": {"MAG": "1482735464", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": + 64330274}, "corpusId": 64330274, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7", "title": "Studies in the History of Probability and Statistics. XXXVII", "abstract": "SUMMARY An account is given of A. M. Turing''s unpublished contributions to statistics during 1941 or 1940.", "venue": "", "year": 1979, "referenceCount": 15, "citationCount": 164, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1979-08-01", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "145179124", - "name": "I. Good"}]}, {"paperId": "24d2b44919461eba96daeec4c446154dba302fef", - "externalIds": {"MAG": "1556174207", "CorpusId": 15358725}, "url": "https://www.semanticscholar.org/paper/24d2b44919461eba96daeec4c446154dba302fef", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1979-08-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2262347", + "name": "A. Turing"}, {"authorId": "145179124", "name": "I. Good"}]}, {"paperId": + "24d2b44919461eba96daeec4c446154dba302fef", "externalIds": {"MAG": "1556174207", + "CorpusId": 15358725}, "corpusId": 15358725, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/24d2b44919461eba96daeec4c446154dba302fef", "title": "Simulations of Computing by Self-Assembly", "abstract": "Winfree (1996) proposed a Turing-universal model of DNA self-assembly. In this abstract model, DNA double-crossover molecules self-assemble to form an algorithmically-patterned @@ -13918,13 +15831,19 @@ interactions: growth is slowest, and that error rates can be made arbitrarily low by decreasing concentration and increasing binding strengths.", "venue": "", "year": 1998, "referenceCount": 39, "citationCount": 236, "influentialCitationCount": 31, - "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1998-05-31", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "3094920", "name": "E. Winfree"}]}, {"paperId": "9cf7d29b0b5ecde981d9360f5a3edc96145e8a9b", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1998-05-31", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": "9cf7d29b0b5ecde981d9360f5a3edc96145e8a9b", "externalIds": {"DBLP": "journals/bsl/DershowitzG08", "MAG": "2121136774", - "DOI": "10.2178/bsl/1231081370", "CorpusId": 645290}, "url": "https://www.semanticscholar.org/paper/9cf7d29b0b5ecde981d9360f5a3edc96145e8a9b", + "DOI": "10.2178/bsl/1231081370", "CorpusId": 645290}, "corpusId": 645290, + "publicationVenue": {"id": "2e016c78-9f89-4c7f-9072-c015f5de55eb", "name": + "Bulletin of Symbolic Logic", "type": "journal", "alternate_names": ["Bull + Symb Log", "The Bulletin of Symbolic Logic"], "issn": "1079-8986", "url": + "https://www.math.ucla.edu/~asl/bsltoc.htm", "alternate_urls": ["https://www.jstor.org/journal/bullsymblogi", + "http://journals.cambridge.org/BSL", "https://www.cambridge.org/core/journals/bulletin-of-symbolic-logic", + "http://journals.cambridge.org/action/displayJournal?jid=BSL"]}, "url": "https://www.semanticscholar.org/paper/9cf7d29b0b5ecde981d9360f5a3edc96145e8a9b", "title": "A Natural Axiomatization of Computability and Proof of Church''s Thesis", "abstract": "Abstract Church''s Thesis asserts that the only numeric functions that can be calculated by effective means are the recursive ones, @@ -13939,14 +15858,17 @@ interactions: Thesis, characterizing the effective string functions, and\u2014in particular\u2014the effectively-computable functions on string representations of numbers.", "venue": "Bulletin of Symbolic Logic", "year": 2008, "referenceCount": 181, "citationCount": - 111, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-09-01", "journal": - {"name": "Bulletin of Symbolic Logic", "pages": "299 - 350", "volume": "14"}, - "authors": [{"authorId": "1759551", "name": "N. Dershowitz"}, {"authorId": - "1721396", "name": "Y. Gurevich"}]}, {"paperId": "3e7fb6cfec5703a9e8cf3a0a821a3183ec25f961", - "externalIds": {"MAG": "1496947201", "CorpusId": 117845433}, "url": "https://www.semanticscholar.org/paper/3e7fb6cfec5703a9e8cf3a0a821a3183ec25f961", + 111, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/A63FCE2FEF1F59E42FFFD5980451DB02/S1079898600001591a.pdf/div-class-title-a-natural-axiomatization-of-computability-and-proof-of-church-s-thesis-div.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-09-01", "journal": {"name": "Bulletin of Symbolic + Logic", "pages": "299 - 350", "volume": "14"}, "authors": [{"authorId": "1759551", + "name": "N. Dershowitz"}, {"authorId": "1721396", "name": "Y. Gurevich"}]}, + {"paperId": "3e7fb6cfec5703a9e8cf3a0a821a3183ec25f961", "externalIds": {"MAG": + "1496947201", "CorpusId": 117845433}, "corpusId": 117845433, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3e7fb6cfec5703a9e8cf3a0a821a3183ec25f961", "title": "The theory of functions and sets of natural numbers", "abstract": "Recursiveness and Computability. Induction. Systems of Equations. Arithmetical Formal Systems. Turing Machines. Flowcharts. Functions as Rules. Arithmetization. @@ -13965,13 +15887,15 @@ interactions: Distributivity. Countable Initial Segments. Uncountable Initial Segments. Global Properties. Comparison of Degree Theories. Structure Inside Degrees. Bibliography. Index.", "venue": "", "year": 1989, "referenceCount": 0, "citationCount": - 255, "influentialCitationCount": 22, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "2442311", "name": "P. Odifreddi"}]}, {"paperId": "2a9d6137c95cc7c106bf84f18fb13449eded7826", - "externalIds": {"MAG": "2048808408", "DBLP": "journals/jacm/LewisS68", "DOI": - "10.1145/321466.321477", "CorpusId": 16512120}, "url": "https://www.semanticscholar.org/paper/2a9d6137c95cc7c106bf84f18fb13449eded7826", + 255, "influentialCitationCount": 22, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "2442311", "name": "P. Odifreddi"}]}, + {"paperId": "2a9d6137c95cc7c106bf84f18fb13449eded7826", "externalIds": {"MAG": + "2048808408", "DBLP": "journals/jacm/LewisS68", "DOI": "10.1145/321466.321477", + "CorpusId": 16512120}, "corpusId": 16512120, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2a9d6137c95cc7c106bf84f18fb13449eded7826", "title": "Syntax-Directed Transduction", "abstract": "A transduction is a mapping from one set of sequences to another. A syntax-directed transduction is a particular type of transduction which is defined on the grammar of a @@ -13983,15 +15907,16 @@ interactions: which syntax-directed translations can be performed on (deterministic) pushdown machines. In addition, some time bounds for translations on Turing machines are derived.", "venue": "JACM", "year": 1968, "referenceCount": 12, "citationCount": - 387, "influentialCitationCount": 23, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1968-07-01", "journal": - {"name": "J. ACM", "pages": "465-488", "volume": "15"}, "authors": [{"authorId": - "147812033", "name": "P. M. Lewis"}, {"authorId": "2520473", "name": "R. Stearns"}]}, - {"paperId": "4df48cf2567336e982d352976e4bde21f03be4e2", "externalIds": {"DBLP": - "journals/jacm/ShepherdsonS63", "MAG": "2094542439", "DOI": "10.1145/321160.321170", - "CorpusId": 17328540}, "url": "https://www.semanticscholar.org/paper/4df48cf2567336e982d352976e4bde21f03be4e2", + 387, "influentialCitationCount": 23, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1968-07-01", "journal": {"name": "J. ACM", "pages": "465-488", "volume": + "15"}, "authors": [{"authorId": "147812033", "name": "P. M. Lewis"}, {"authorId": + "2520473", "name": "R. Stearns"}]}, {"paperId": "4df48cf2567336e982d352976e4bde21f03be4e2", + "externalIds": {"DBLP": "journals/jacm/ShepherdsonS63", "MAG": "2094542439", + "DOI": "10.1145/321160.321170", "CorpusId": 17328540}, "corpusId": 17328540, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4df48cf2567336e982d352976e4bde21f03be4e2", "title": "Computability of Recursive Functions", "abstract": "As a result of the work of Turing, Post, Kleene and Church [1, 2, 3, 9, 10, l l 12, 17, 18] it is now widely accepted ~ that the concept of \"computable\" as applied @@ -14010,45 +15935,18 @@ interactions: functions can be computed by Turing machines, ~ which are certainly machines in the above sense. Although", "venue": "JACM", "year": 1963, "referenceCount": 28, "citationCount": 407, "influentialCitationCount": 21, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1963-04-01", "journal": {"name": "J. ACM", "pages": "217-255", "volume": - "10"}, "authors": [{"authorId": "2026764", "name": "J. Shepherdson"}, {"authorId": - "2232957", "name": "Howard E. Sturgis"}]}, {"paperId": "16f3886e5418ae9f3f698834e42a1e4f54ee4d22", - "externalIds": {"DBLP": "journals/ijbc/Chua05", "MAG": "2018341541", "DOI": - "10.1142/S0218127405014337", "CorpusId": 32989367}, "url": "https://www.semanticscholar.org/paper/16f3886e5418ae9f3f698834e42a1e4f54ee4d22", - "title": "Local Activity is the Origin of Complexity", "abstract": "Many scientists - have struggled to uncover the elusive origin of \"complexity\", and its many - equivalent jargons, such as emergence, self-organization, synergetics, collective - behaviors, nonequilibrium phenomena, etc. They have provided some qualitative, - but not quantitative, characterizations of numerous fascinating examples from - many disciplines. For example, Schrodinger had identified \"the exchange of - energy\" from open systems as a necessary condition for complexity. Prigogine - has argued for the need to introduce a new principle of nature which he dubbed - \"the instability of the homogeneous\". Turing had proposed \"symmetry breaking\" - as an origin of morphogenesis. Smale had asked what \"axiomatic\" properties - must a reaction\u2013diffusion system possess to make the Turing interacting - system oscillate. The purpose of this paper is to show that all the jargons - and issues cited above are mere manifestations of a new fundamental principle - called local activity, which is mathematically precise and testable. The local - activity theorem provides the quantitative characterization of Prigogine''s - \"instability of the homogeneous\" and Smale''s quest for an axiomatic principle - on Turing instability. Among other things, a mathematical proof is given which - shows none of the complexity-related jargons cited above is possible without - local activity. Explicit mathematical criteria are given to identify a relatively - small subset of the locally-active parameter region, called the edge of chaos, - where most complex phenomena emerge.", "venue": "International Journal of - Bifurcation and Chaos in Applied Sciences and Engineering", "year": 2005, - "referenceCount": 12, "citationCount": 148, "influentialCitationCount": 26, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-11-01", "journal": {"name": "Int. J. Bifurc. Chaos", "pages": "3435-3456", - "volume": "15"}, "authors": [{"authorId": "144848684", "name": "L. Chua"}]}, - {"paperId": "1b4132232b72be3dceef8bacb3189db6e42fb978", "externalIds": {"DBLP": - "books/crc/99/00010RR99", "DOI": "10.1201/9781420049503-c27", "CorpusId": - 218489742}, "url": "https://www.semanticscholar.org/paper/1b4132232b72be3dceef8bacb3189db6e42fb978", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1963-04-01", "journal": {"name": "J. ACM", "pages": "217-255", + "volume": "10"}, "authors": [{"authorId": "2026764", "name": "J. Shepherdson"}, + {"authorId": "2232957", "name": "Howard E. Sturgis"}]}, {"paperId": "1b4132232b72be3dceef8bacb3189db6e42fb978", + "externalIds": {"DBLP": "books/crc/99/00010RR99", "DOI": "10.1201/9781420049503-c27", + "CorpusId": 218489742}, "corpusId": 218489742, "publicationVenue": {"id": + "15c4dc7a-ad4a-47ad-b4c5-28668ee498a2", "name": "Algorithms and Theory of + Computation Handbook", "alternate_names": ["Algorithm Theory Comput Handb"], + "issn": "2154-4034", "url": "http://www.crcnetbase.com/series/chappalgdat"}, + "url": "https://www.semanticscholar.org/paper/1b4132232b72be3dceef8bacb3189db6e42fb978", "title": "Computability", "abstract": ". In this article, we pursue our investigation of the connections between the theory of computation and hydrodynamics. We prove the existence of stationary solutions of the Euler equations in Euclidean @@ -14071,16 +15969,22 @@ interactions: disclosing a certain degree of independence within di\ufb00erent hierarchies of complexity.", "venue": "Algorithms and Theory of Computation Handbook", "year": 2022, "referenceCount": 33, "citationCount": 219, "influentialCitationCount": - 34, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2022-02-01", - "journal": {"name": "Set Theory and Foundations of Mathematics: An Introduction - to Mathematical Logic"}, "authors": [{"authorId": "143872547", "name": "T. - Jiang"}, {"authorId": "50652024", "name": "Ming Li"}, {"authorId": "144871185", - "name": "B. Ravikumar"}, {"authorId": "2231884", "name": "Kenneth W. Regan"}]}, - {"paperId": "b3a36b7b76593d3e6efa068938a6911ededa16bb", "externalIds": {"MAG": - "262829378", "DBLP": "journals/eccc/ECCC-TR94-019", "DOI": "10.1162/neco.1996.8.1.1", - "CorpusId": 15424085}, "url": "https://www.semanticscholar.org/paper/b3a36b7b76593d3e6efa068938a6911ededa16bb", + 34, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2022-02-01", "journal": {"name": "Set Theory and + Foundations of Mathematics: An Introduction to Mathematical Logic"}, "authors": + [{"authorId": "143872547", "name": "T. Jiang"}, {"authorId": "50652024", "name": + "Ming Li"}, {"authorId": "144871185", "name": "B. Ravikumar"}, {"authorId": + "2231884", "name": "Kenneth W. Regan"}]}, {"paperId": "b3a36b7b76593d3e6efa068938a6911ededa16bb", + "externalIds": {"MAG": "262829378", "DBLP": "journals/eccc/ECCC-TR94-019", + "DOI": "10.1162/neco.1996.8.1.1", "CorpusId": 15424085}, "corpusId": 15424085, + "publicationVenue": {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", "name": + "Neural Computation", "type": "journal", "alternate_names": ["Neural Comput"], + "issn": "0899-7667", "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", + "http://www.mitpressjournals.org/loi/neco", "https://www.mitpressjournals.org/loi/neco"]}, + "url": "https://www.semanticscholar.org/paper/b3a36b7b76593d3e6efa068938a6911ededa16bb", "title": "Lower Bounds for the Computational Power of Networks of Spiking Neurons", "abstract": "We investigate the computational power of a formal model for networks of spiking neurons. It is shown that simple operations @@ -14092,37 +15996,43 @@ interactions: relatively weak basic assumptions about the response and threshold functions of the spiking neurons are sufficient to employ them for such computations.", "venue": "Neural Computation", "year": 1996, "referenceCount": 47, "citationCount": - 245, "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "Neural Computation", - "pages": "1-40", "volume": "8"}, "authors": [{"authorId": "145247053", "name": - "W. Maass"}]}, {"paperId": "54264e5a2700a93854179b7631719d3223246bd3", "externalIds": - {"MAG": "1582555793", "DOI": "10.1007/978-1-4613-8177-8_6", "CorpusId": 117157637}, - "url": "https://www.semanticscholar.org/paper/54264e5a2700a93854179b7631719d3223246bd3", - "title": "Monadic Computation And Iterative Algebraic Theories", "abstract": - null, "venue": "", "year": 1982, "referenceCount": 11, "citationCount": 267, - "influentialCitationCount": 26, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Studies in logic and the foundations of mathematics", - "pages": "179-234", "volume": "80"}, "authors": [{"authorId": "2499818", "name": - "C. C. Elgot"}]}, {"paperId": "f6d5f813ca0ba9fbf871067babdf8689302daa7b", - "externalIds": {"MAG": "1525845143", "CorpusId": 142952857}, "url": "https://www.semanticscholar.org/paper/f6d5f813ca0ba9fbf871067babdf8689302daa7b", + 245, "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Neural Computation", "pages": "1-40", "volume": "8"}, "authors": + [{"authorId": "145247053", "name": "W. Maass"}]}, {"paperId": "f6d5f813ca0ba9fbf871067babdf8689302daa7b", + "externalIds": {"MAG": "1525845143", "CorpusId": 142952857}, "corpusId": 142952857, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6d5f813ca0ba9fbf871067babdf8689302daa7b", "title": "The information processing approach to cognition", "abstract": "Five underlying assumptions to the information processing approach to psychology are presented and are contrasted with cognitivism, behaviorism, ecologism, computationalism, functionalism and Turing-machine functionalism.", "venue": "", "year": 1984, "referenceCount": 75, "citationCount": 267, "influentialCitationCount": - 26, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1984-11-01", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2359839", - "name": "S. Palmer"}, {"authorId": "5980237", "name": "R. Kimchi"}]}, {"paperId": + 25, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1984-11-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "2359839", "name": "S. Palmer"}, {"authorId": "5980237", "name": "R. Kimchi"}]}, + {"paperId": "54264e5a2700a93854179b7631719d3223246bd3", "externalIds": {"MAG": + "1582555793", "DOI": "10.1007/978-1-4613-8177-8_6", "CorpusId": 117157637}, + "corpusId": 117157637, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/54264e5a2700a93854179b7631719d3223246bd3", + "title": "Monadic Computation And Iterative Algebraic Theories", "abstract": + null, "venue": "", "year": 1982, "referenceCount": 11, "citationCount": 267, + "influentialCitationCount": 26, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Studies + in logic and the foundations of mathematics", "pages": "179-234", "volume": + "80"}, "authors": [{"authorId": "2499818", "name": "C. C. Elgot"}]}, {"paperId": "577ff5a5ad298e484fafa3471cd49fdea1130044", "externalIds": {"MAG": "3104126502", "DBLP": "journals/corr/quant-ph-0307150", "ArXiv": "quant-ph/0307150", "DOI": - "10.1137/S0097539703432165", "CorpusId": 613571}, "url": "https://www.semanticscholar.org/paper/577ff5a5ad298e484fafa3471cd49fdea1130044", + "10.1137/S0097539703432165", "CorpusId": 613571}, "corpusId": 613571, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/577ff5a5ad298e484fafa3471cd49fdea1130044", "title": "A Lambda Calculus for Quantum Computation", "abstract": "The classical lambda calculus may be regarded both as a programming language and as a formal algebraic system for reasoning about computation. It provides a computational @@ -14137,16 +16047,22 @@ interactions: model and an equational proof system for this calculus, and we argue that it is equivalent to the quantum Turing machine.", "venue": "SIAM journal on computing (Print)", "year": 2003, "referenceCount": 64, "citationCount": 195, - "influentialCitationCount": 17, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-07-21", "journal": {"name": "SIAM J. Comput.", "pages": - "1109-1135", "volume": "33"}, "authors": [{"authorId": "145045139", "name": - "A. V. Tonder"}]}, {"paperId": "99022f12654eaefd0f86ee92968fa0e259ae9ed5", + "influentialCitationCount": 16, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/quant-ph/0307150", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2003-07-21", "journal": {"name": "SIAM + J. Comput.", "pages": "1109-1135", "volume": "33"}, "authors": [{"authorId": + "145045139", "name": "A. V. Tonder"}]}, {"paperId": "99022f12654eaefd0f86ee92968fa0e259ae9ed5", "externalIds": {"MAG": "2122772951", "DBLP": "journals/neco/CabessaS12", "DOI": - "10.1162/NECO_a_00263", "CorpusId": 5826757, "PubMed": "22295978"}, "url": - "https://www.semanticscholar.org/paper/99022f12654eaefd0f86ee92968fa0e259ae9ed5", + "10.1162/NECO_a_00263", "CorpusId": 5826757, "PubMed": "22295978"}, "corpusId": + 5826757, "publicationVenue": {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", + "name": "Neural Computation", "type": "journal", "alternate_names": ["Neural + Comput"], "issn": "0899-7667", "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", + "http://www.mitpressjournals.org/loi/neco", "https://www.mitpressjournals.org/loi/neco"]}, + "url": "https://www.semanticscholar.org/paper/99022f12654eaefd0f86ee92968fa0e259ae9ed5", "title": "The Computational Power of Interactive Recurrent Neural Networks", "abstract": "Abstract In classical computation, rational- and real-weighted recurrent neural networks were shown to be respectively equivalent to and @@ -14161,16 +16077,54 @@ interactions: neural networks can perform uncountably many more translations of information than interactive Turing machines, making them capable of super-Turing capabilities.", "venue": "Neural Computation", "year": 2012, "referenceCount": 24, "citationCount": - 37, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-04-01", "journal": {"name": "Neural - Computation", "pages": "996-1019", "volume": "24"}, "authors": [{"authorId": - "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "2797623", "name": - "H. Siegelmann"}]}, {"paperId": "d07a86317eb14daa091eaf24a6353941d6e0891d", - "externalIds": {"MAG": "2121673078", "DOI": "10.1111/J.0268-1064.2005.00274.X", - "CorpusId": 732874}, "url": "https://www.semanticscholar.org/paper/d07a86317eb14daa091eaf24a6353941d6e0891d", + 37, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://binds.cs.umass.edu/papers/CabessaSiegelmannNC12.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-04-01", "journal": + {"name": "Neural Computation", "pages": "996-1019", "volume": "24"}, "authors": + [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, {"authorId": + "2797623", "name": "H. Siegelmann"}]}, {"paperId": "e7a09e8a8c6dbdcafb94cf66db021fedddb4d7fc", + "externalIds": {"MAG": "2154462988", "DBLP": "journals/jacm/Chaitin69", "DOI": + "10.1145/321495.321506", "CorpusId": 8209877}, "corpusId": 8209877, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e7a09e8a8c6dbdcafb94cf66db021fedddb4d7fc", + "title": "On the Length of Programs for Computing Finite Binary Sequences: + statistical considerations", "abstract": "An attempt is made to carry out + a program (outlined in a previous paper) for defining the concept of a random + or patternless, finite binary sequence, and for subsequently defining a random + or patternless, infinite binary sequence to be a sequence whose initial segments + are all random or patternless finite binary sequences. A definition based + on the bounded-transfer Turing machine is given detailed study, but insufficient + understanding of this computing machine precludes a complete treatment. A + computing machine is introduced which avoids these difficulties.", "venue": + "JACM", "year": 1969, "referenceCount": 39, "citationCount": 352, "influentialCitationCount": + 20, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/321495.321506", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "J. ACM", "pages": "145-159", + "volume": "16"}, "authors": [{"authorId": "1756533", "name": "G. Chaitin"}]}, + {"paperId": "88c17901b3d37dd261d687d3c04108066ffb2259", "externalIds": {"MAG": + "2153575924", "DOI": "10.1007/s11538-010-9532-5", "CorpusId": 10251022, "PubMed": + "20309645"}, "corpusId": 10251022, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/88c17901b3d37dd261d687d3c04108066ffb2259", + "title": "The Influence of Gene Expression Time Delays on\u00a0Gierer\u2013Meinhardt + Pattern Formation Systems", "abstract": null, "venue": "Bulletin of Mathematical + Biology", "year": 2010, "referenceCount": 37, "citationCount": 66, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:06da368c-d1ed-4a87-b54b-49133d9b6848/files/m4aede6ca3c5c538bcc686c2b90c9dd38", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-03-23", "journal": {"name": "Bulletin + of Mathematical Biology", "pages": "2139-2160", "volume": "72"}, "authors": + [{"authorId": "4875488", "name": "S. Seirin Lee"}, {"authorId": "2662569", + "name": "E. Gaffney"}, {"authorId": "38146134", "name": "N. Monk"}]}, {"paperId": + "d07a86317eb14daa091eaf24a6353941d6e0891d", "externalIds": {"MAG": "2121673078", + "DOI": "10.1111/J.0268-1064.2005.00274.X", "CorpusId": 732874}, "corpusId": + 732874, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d07a86317eb14daa091eaf24a6353941d6e0891d", "title": "So How Does the Mind Work", "abstract": "In my book How the Mind Works, I defended the theory that the human mind is a naturally selected system of organs of computation. Jerry Fodor claims that ''the mind doesn''t work @@ -14189,15 +16143,21 @@ interactions: seen in organ systems, is distinct from Fodor''s own notion of encapsulated modules, so the limitations of the latter are irrelevant. Fourth, Fodor''s arguments dismissing of the relevance of evolution to psychology are unsound.", - "venue": "", "year": 2005, "referenceCount": 38, "citationCount": 185, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2005-02-01", "journal": - {"name": "Mind & Language", "pages": "1-24", "volume": "20"}, "authors": [{"authorId": - "2693903", "name": "S. Pinker"}]}, {"paperId": "f4655fb7bb182ad64775040710c425c5b891d59b", + "venue": "", "year": 2005, "referenceCount": 38, "citationCount": 187, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2005-02-01", + "journal": {"name": "Mind & Language", "pages": "1-24", "volume": "20"}, "authors": + [{"authorId": "2693903", "name": "S. Pinker"}]}, {"paperId": "f4655fb7bb182ad64775040710c425c5b891d59b", "externalIds": {"MAG": "1965306495", "DBLP": "journals/ibmrd/ElgotM65", "DOI": - "10.1147/rd.91.0047", "CorpusId": 6911028}, "url": "https://www.semanticscholar.org/paper/f4655fb7bb182ad64775040710c425c5b891d59b", + "10.1147/rd.91.0047", "CorpusId": 6911028}, "corpusId": 6911028, "publicationVenue": + {"id": "555db9fd-8025-4984-8082-971e1e6bdb24", "name": "IBM Journal of Research + and Development", "type": "journal", "alternate_names": ["IBM J Res Dev", + "Ibm J Res Dev", "Ibm Journal of Research and Development"], "issn": "0018-8646", + "alternate_issns": ["2151-8556"], "url": "http://www.research.ibm.com/journal/index.html", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=5288520"]}, + "url": "https://www.semanticscholar.org/paper/f4655fb7bb182ad64775040710c425c5b891d59b", "title": "On Relations Defined by Generalized Finite Automata", "abstract": "A transduction, in the sense of this paper, is a n-ary word relation (which may be a function) describable by a finite directed labeled graph. The notion @@ -14214,14 +16174,15 @@ interactions: The decomposition of transductions into simpler ones is also studied.", "venue": "IBM Journal of Research and Development", "year": 1965, "referenceCount": 7, "citationCount": 360, "influentialCitationCount": 19, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "IBM J. Res. - Dev.", "pages": "47-68", "volume": "9"}, "authors": [{"authorId": "2499818", - "name": "C. C. Elgot"}, {"authorId": "47689217", "name": "J. Mezei"}]}, {"paperId": - "067f0e873923f6f0bb085dcdc961c7d58e9bfea2", "externalIds": {"MAG": "2019232231", - "DOI": "10.1112/jlms/jdm041", "CorpusId": 9180151}, "url": "https://www.semanticscholar.org/paper/067f0e873923f6f0bb085dcdc961c7d58e9bfea2", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "IBM J. Res. Dev.", "pages": "47-68", "volume": + "9"}, "authors": [{"authorId": "2499818", "name": "C. C. Elgot"}, {"authorId": + "47689217", "name": "J. Mezei"}]}, {"paperId": "067f0e873923f6f0bb085dcdc961c7d58e9bfea2", + "externalIds": {"MAG": "2019232231", "DOI": "10.1112/jlms/jdm041", "CorpusId": + 9180151}, "corpusId": 9180151, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/067f0e873923f6f0bb085dcdc961c7d58e9bfea2", "title": "Using random sets as oracles", "abstract": "Let R be a notion of algorithmic randomness for individual subsets of \u2115. A set B is a base for R randomness if there is a Z \u2a7eT B such that Z is R random relative @@ -14231,14 +16192,14 @@ interactions: diagonally noncomputable, but no set of PA\u2010degree. As a consequence, an n\u2010c.e. set is a base for computable randomness if and only if it is Turing incomplete.", "venue": "", "year": 2007, "referenceCount": 32, "citationCount": - 102, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2007-06-01", "journal": {"name": "Journal of the London Mathematical Society", - "volume": "75"}, "authors": [{"authorId": "1989269", "name": "D. Hirschfeldt"}, - {"authorId": "2350687", "name": "A. Nies"}, {"authorId": "1699450", "name": - "F. Stephan"}]}]} + 102, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2007-06-01", "journal": {"name": "Journal of the + London Mathematical Society", "volume": "75"}, "authors": [{"authorId": "1989269", + "name": "D. Hirschfeldt"}, {"authorId": "2350687", "name": "A. Nies"}, {"authorId": + "1699450", "name": "F. Stephan"}]}]} ' headers: @@ -14247,31 +16208,31 @@ interactions: Connection: - keep-alive Content-Length: - - '172458' + - '194495' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:27 GMT + - Tue, 03 Jan 2023 20:52:57 GMT Via: - - 1.1 1bcfe6258d4a13f2b6f9b5ee43e42254.cloudfront.net (CloudFront) + - 1.1 5798112148ae9e672af737182da15f62.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - mtG2jLCkI5CqhK9H7iHlRGgCnogGp6abMJ7u2QOp_YmW3nU0rtfHXw== + - sgz4PP4S_NOJtDHrGoMwkfLdG0U5W3u_CJFoEL2d3HatlxXCms42qw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detFUHQSPHcFuVQ= + - eLxSUFFivHcF19w= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '172458' + - '194495' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:27 GMT + - Tue, 03 Jan 2023 20:52:57 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 1a6e525d-9dba-468a-ae12-31daa646f10a + - 259a9c85-c069-4bc3-bcac-f6e2f404f90d status: code: 200 message: OK @@ -14287,53 +16248,30 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=700&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=700&limit=100 response: body: - string: '{"total": 133388, "offset": 700, "next": 800, "data": [{"paperId": - "420d8fdb2e988ac5a92cfe139900ad9a2c33e79e", "externalIds": {"DBLP": "journals/bsl/Soare96", - "MAG": "2132161762", "DOI": "10.2307/420992", "CorpusId": 5894394}, "url": - "https://www.semanticscholar.org/paper/420d8fdb2e988ac5a92cfe139900ad9a2c33e79e", - "title": "Computability and Recursion", "abstract": "Abstract We consider - the informal concept of \u201ccomputability\u201d or \u201ceffective calculability\u201d - and two of the formalisms commonly used to define it, \u201c(Turing) computability\u201d - and \u201c(general) recursiveness\u201d. We consider their origin, exact technical - definition, concepts, history, general English meanings, how they became fixed - in their present roles, how they were first and are now used, their impact - on nonspecialists, how their use will affect the future content of the subject - of computability theory, and its connection to other related areas. After - a careful historical and conceptual analysis of computability and recursion - we make several recommendations in section \u00a77 about preserving the intensional - differences between the concepts of \u201ccomputability\u201d and \u201crecursion.\u201d - Specifically we recommend that: the term \u201crecursive\u201d should no longer - carry the additional meaning of \u201ccomputable\u201d or \u201cdecidable;\u201d - functions defined using Turing machines, register machines, or their variants - should be called \u201ccomputable\u201d rather than \u201crecursive;\u201d - we should distinguish the intensional difference between Church''s Thesis - and Turing''s Thesis, and use the latter particularly in dealing with mechanistic - questions; the name of the subject should be \u201cComputability Theory\u201d - or simply Computability rather than \u201cRecursive Function Theory.\u201d", - "venue": "Bulletin of Symbolic Logic", "year": 1996, "referenceCount": 136, - "citationCount": 233, "influentialCitationCount": 17, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-09-01", "journal": {"name": "Bulletin of Symbolic Logic", "pages": "284 - - 321", "volume": "2"}, "authors": [{"authorId": "1760293", "name": "R. Soare"}]}, - {"paperId": "040356483c2f0f4e698bfead2fd2ceb35e80ac43", "externalIds": {"MAG": - "1996446142", "DOI": "10.1038/nri2102", "CorpusId": 205490523, "PubMed": "17558422"}, + string: '{"total": 133751, "offset": 700, "next": 800, "data": [{"paperId": + "040356483c2f0f4e698bfead2fd2ceb35e80ac43", "externalIds": {"MAG": "1996446142", + "DOI": "10.1038/nri2102", "CorpusId": 205490523, "PubMed": "17558422"}, "corpusId": + 205490523, "publicationVenue": {"id": "dbf292d2-556a-4a6e-9bda-974ae86b8b2f", + "name": "Nature reviews. Immunology", "type": "journal", "alternate_names": + ["Nat rev Immunol", "Nature Reviews Immunology", "Nat Rev Immunol"], "issn": + "1474-1733", "url": "https://www.nature.com/nri/", "alternate_urls": ["http://www.nature.com/nrmicro/index.html"]}, "url": "https://www.semanticscholar.org/paper/040356483c2f0f4e698bfead2fd2ceb35e80ac43", "title": "Real and artificial immune systems: computing the state of the body", "abstract": null, "venue": "Nature reviews. Immunology", "year": 2007, "referenceCount": 69, "citationCount": 117, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2007-07-01", "journal": - {"name": "Nature Reviews Immunology", "pages": "569-574", "volume": "7"}, - "authors": [{"authorId": "3172217", "name": "I. Cohen"}]}, {"paperId": "a90a9e2160161d47db7d9a84a6aa57e7ef065751", - "externalIds": {"DBLP": "conf/focs/StearnsHL65", "MAG": "2533977282", "DOI": - "10.1109/FOCS.1965.11", "CorpusId": 45543629}, "url": "https://www.semanticscholar.org/paper/a90a9e2160161d47db7d9a84a6aa57e7ef065751", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2007-07-01", "journal": {"name": "Nature Reviews Immunology", "pages": "569-574", + "volume": "7"}, "authors": [{"authorId": "3172217", "name": "I. Cohen"}]}, + {"paperId": "a90a9e2160161d47db7d9a84a6aa57e7ef065751", "externalIds": {"DBLP": + "conf/focs/StearnsHL65", "MAG": "2533977282", "DOI": "10.1109/FOCS.1965.11", + "CorpusId": 45543629}, "corpusId": 45543629, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a90a9e2160161d47db7d9a84a6aa57e7ef065751", "title": "Hierarchies of memory limited computations", "abstract": "This paper investigates the computational complexity of binary sequences as measured by the rapidity of their generation by multitape Turing machines. A \"translational\" @@ -14341,16 +16279,17 @@ interactions: a refinement of the established hierarchy. The previous complexity classes are shown to possess certain translational properties. An related hierarchy of complexity classes of monotonic functions is examined", "venue": "SWCT", - "year": 1965, "referenceCount": 6, "citationCount": 346, "influentialCitationCount": - 17, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1965-10-06", "journal": {"pages": "179-190"}, "authors": - [{"authorId": "2520473", "name": "R. Stearns"}, {"authorId": "1747181", "name": - "J. Hartmanis"}, {"authorId": "147812033", "name": "P. M. Lewis"}]}, {"paperId": - "947b7d533cd970c9f68cbed96f7c4a6b6c345a4c", "externalIds": {"MAG": "2062934582", - "DBLP": "journals/jacm/HopcroftPV77", "DOI": "10.1145/322003.322015", "CorpusId": - 12935839}, "url": "https://www.semanticscholar.org/paper/947b7d533cd970c9f68cbed96f7c4a6b6c345a4c", + "year": 1965, "referenceCount": 6, "citationCount": 347, "influentialCitationCount": + 18, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1965-10-06", "journal": + {"pages": "179-190"}, "authors": [{"authorId": "2520473", "name": "R. Stearns"}, + {"authorId": "1747181", "name": "J. Hartmanis"}, {"authorId": "147812033", + "name": "P. M. Lewis"}]}, {"paperId": "947b7d533cd970c9f68cbed96f7c4a6b6c345a4c", + "externalIds": {"MAG": "2062934582", "DBLP": "journals/jacm/HopcroftPV77", + "DOI": "10.1145/322003.322015", "CorpusId": 12935839}, "corpusId": 12935839, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/947b7d533cd970c9f68cbed96f7c4a6b6c345a4c", "title": "On Time Versus Space", "abstract": "It is shown that every deterministic multitape Turing machine of time complexity t(n) can be simulated by a deterministic Turing machine of tape complexity t(n)/logt(n). @@ -14360,16 +16299,17 @@ interactions: of languages recognized by Turing machines of tape complexity t(n). In particular the context-sensitive languages cannot be recognized in linear time by deterministic multitape Turing machines.", "venue": "JACM", "year": - 1977, "referenceCount": 15, "citationCount": 266, "influentialCitationCount": - 24, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1977-04-01", "journal": {"name": "J. ACM", "pages": "332-337", - "volume": "24"}, "authors": [{"authorId": "1706504", "name": "J. Hopcroft"}, - {"authorId": "1727613", "name": "W. Paul"}, {"authorId": "1741124", "name": - "L. Valiant"}]}, {"paperId": "5af2c612fc9db9a99475a04a4735070627b28586", "externalIds": - {"MAG": "1970498526", "DOI": "10.1103/PHYSREVE.80.046212", "CorpusId": 22921022, - "PubMed": "19905420"}, "url": "https://www.semanticscholar.org/paper/5af2c612fc9db9a99475a04a4735070627b28586", + 1977, "referenceCount": 15, "citationCount": 267, "influentialCitationCount": + 24, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1977-04-01", "journal": + {"name": "J. ACM", "pages": "332-337", "volume": "24"}, "authors": [{"authorId": + "1706504", "name": "J. Hopcroft"}, {"authorId": "1727613", "name": "W. Paul"}, + {"authorId": "1741124", "name": "L. Valiant"}]}, {"paperId": "5af2c612fc9db9a99475a04a4735070627b28586", + "externalIds": {"MAG": "1970498526", "DOI": "10.1103/PHYSREVE.80.046212", + "CorpusId": 22921022, "PubMed": "19905420"}, "corpusId": 22921022, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5af2c612fc9db9a99475a04a4735070627b28586", "title": "Time-delay-induced instabilities in reaction-diffusion systems.", "abstract": "Time delay in the kinetic terms of reaction-diffusion systems has been investigated. It has been shown that short delay beyond a critical @@ -14379,31 +16319,21 @@ interactions: formation of spirals. The theoretical scheme has been numerically explored in two different prototypical reaction-diffusion systems.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2009, - "referenceCount": 28, "citationCount": 71, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-10-22", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 046212\n ", "volume": "80 4 Pt 2"}, "authors": - [{"authorId": "4541159", "name": "Shrabani Sen"}, {"authorId": "4032821", - "name": "Pushpita Ghosh"}, {"authorId": "6297770", "name": "Syed Shahed Riaz"}, - {"authorId": "2370016", "name": "D. Ray"}]}, {"paperId": "88c17901b3d37dd261d687d3c04108066ffb2259", - "externalIds": {"MAG": "2153575924", "DOI": "10.1007/s11538-010-9532-5", "CorpusId": - 10251022, "PubMed": "20309645"}, "url": "https://www.semanticscholar.org/paper/88c17901b3d37dd261d687d3c04108066ffb2259", - "title": "The Influence of Gene Expression Time Delays on\u00a0Gierer\u2013Meinhardt - Pattern Formation Systems", "abstract": null, "venue": "Bulletin of Mathematical - Biology", "year": 2010, "referenceCount": 37, "citationCount": 63, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2010-03-23", "journal": {"name": "Bulletin - of Mathematical Biology", "pages": "2139-2160", "volume": "72"}, "authors": - [{"authorId": "4875488", "name": "S. Seirin Lee"}, {"authorId": "2662569", - "name": "E. Gaffney"}, {"authorId": "38146134", "name": "N. Monk"}]}, {"paperId": - "6fa63ac8b519c1340c4e0460abe736a87026fca5", "externalIds": {"DBLP": "journals/eccc/ECCC-TR99-040", - "MAG": "1990932978", "DOI": "10.1145/335305.335347", "CorpusId": 7565108}, - "url": "https://www.semanticscholar.org/paper/6fa63ac8b519c1340c4e0460abe736a87026fca5", + "referenceCount": 28, "citationCount": 73, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-10-22", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 046212\n ", "volume": + "80 4 Pt 2"}, "authors": [{"authorId": "4541159", "name": "Shrabani Sen"}, + {"authorId": "4032821", "name": "Pushpita Ghosh"}, {"authorId": "6297770", + "name": "Syed Shahed Riaz"}, {"authorId": "2370016", "name": "D. Ray"}]}, + {"paperId": "6fa63ac8b519c1340c4e0460abe736a87026fca5", "externalIds": {"DBLP": + "journals/eccc/ECCC-TR99-040", "MAG": "1990932978", "DOI": "10.1145/335305.335347", + "CorpusId": 7565108}, "corpusId": 7565108, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/6fa63ac8b519c1340c4e0460abe736a87026fca5", "title": "Space complexity in propositional calculus", "abstract": "We study space complexity in the framework of propositional proofs. We consider a natural model analogous to Turing machines with a read-only input tape and such popular @@ -14414,17 +16344,19 @@ interactions: structural results concerning the clause space for resolution and Frege systems.", "venue": "Symposium on the Theory of Computing", "year": 2000, "referenceCount": 19, "citationCount": 156, "influentialCitationCount": 38, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2000-05-01", "journal": {"name": "Electron. - Colloquium Comput. Complex.", "volume": "TR99"}, "authors": [{"authorId": - "1741072", "name": "M. Alekhnovich"}, {"authorId": "1393608183", "name": "Eli - Ben-Sasson"}, {"authorId": "1791067", "name": "A. Razborov"}, {"authorId": - "1718867", "name": "A. Wigderson"}]}, {"paperId": "3f8806d3a71e8b7df82d92c77946385ce0a28090", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2000-05-01", "journal": + {"name": "Electron. Colloquium Comput. Complex.", "volume": "TR99"}, "authors": + [{"authorId": "1741072", "name": "M. Alekhnovich"}, {"authorId": "1393608183", + "name": "Eli Ben-Sasson"}, {"authorId": "1791067", "name": "A. Razborov"}, + {"authorId": "1718867", "name": "A. Wigderson"}]}, {"paperId": "3f8806d3a71e8b7df82d92c77946385ce0a28090", "externalIds": {"MAG": "2083222410", "DBLP": "conf/stoc/CookR72", "DOI": "10.1145/800152.804898", - "CorpusId": 1089018}, "url": "https://www.semanticscholar.org/paper/3f8806d3a71e8b7df82d92c77946385ce0a28090", + "CorpusId": 1089018}, "corpusId": 1089018, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/3f8806d3a71e8b7df82d92c77946385ce0a28090", "title": "Time-bounded random access machines", "abstract": "In this paper we introduce a formal model for random access computers and argue that the model is a good one to use in the theory of computational complexity. Results @@ -14435,15 +16367,38 @@ interactions: programming language is introduced which facilitates proofs of the theorems.", "venue": "Symposium on the Theory of Computing", "year": 1972, "referenceCount": 7, "citationCount": 265, "influentialCitationCount": 17, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], - "publicationDate": "1972-05-01", "journal": {"name": "Proceedings of the fourth - annual ACM symposium on Theory of computing"}, "authors": [{"authorId": "1765456", - "name": "S. Cook"}, {"authorId": "1998855", "name": "R. Reckhow"}]}, {"paperId": - "d8f79807ee19818c1c3ad452c2930d135780a454", "externalIds": {"MAG": "2024748736", - "DOI": "10.1103/PHYSREVLETT.87.228301", "CorpusId": 40309121, "PubMed": "11736430"}, - "url": "https://www.semanticscholar.org/paper/d8f79807ee19818c1c3ad452c2930d135780a454", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "1972-05-01", "journal": {"name": "Proceedings + of the fourth annual ACM symposium on Theory of computing"}, "authors": [{"authorId": + "1765456", "name": "S. Cook"}, {"authorId": "1998855", "name": "R. Reckhow"}]}, + {"paperId": "0b9c28ba7f71ab5e878f940d007ccaeffe4490c1", "externalIds": {"DBLP": + "conf/umc/2002", "MAG": "1593993808", "DOI": "10.1007/3-540-45833-6", "CorpusId": + 29314845}, "corpusId": 29314845, "publicationVenue": {"id": "2f5d0e8a-faad-4f10-b323-2b2e3c439a78", + "name": "Lecture Notes in Computer Science", "type": "journal", "alternate_names": + ["LNCS", "Transactions on Computational Systems Biology", "Trans Comput Syst + Biology", "Lect Note Comput Sci"], "issn": "0302-9743", "alternate_issns": + ["1861-2059", "1861-2075", "1866-4733"], "url": "http://www.springer.com/lncs", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-164-2-73659-0,00.html", + "https://link.springer.com/bookseries/558", "http://link.springer.com/search?query=\"Transactions+on+Computational+Systems+Biology\""]}, + "url": "https://www.semanticscholar.org/paper/0b9c28ba7f71ab5e878f940d007ccaeffe4490c1", + "title": "Unconventional Models of Computation", "abstract": null, "venue": + "Lecture Notes in Computer Science", "year": 2002, "referenceCount": 0, "citationCount": + 206, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-540-45833-3%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Geology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "2509"}, "authors": [{"authorId": "1685717", "name": + "Cristian S. Calude"}, {"authorId": "1682108", "name": "J. Casti"}, {"authorId": + "1784879", "name": "M. Dinneen"}]}, {"paperId": "d8f79807ee19818c1c3ad452c2930d135780a454", + "externalIds": {"MAG": "2024748736", "DOI": "10.1103/PHYSREVLETT.87.228301", + "CorpusId": 40309121, "PubMed": "11736430"}, "corpusId": 40309121, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/d8f79807ee19818c1c3ad452c2930d135780a454", "title": "Pattern formation in a tunable medium: the Belousov-Zhabotinsky reaction in an aerosol OT microemulsion.", "abstract": "Turing structures, standing waves, oscillatory clusters, and accelerating waves have been found @@ -14452,27 +16407,22 @@ interactions: tunable microstructure of the medium, i.e., by the concentration and size of water droplets. We propose a simple model to describe this system.", "venue": "Physical Review Letters", "year": 2001, "referenceCount": 13, "citationCount": - 228, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-11-07", "journal": {"name": "Physical review letters", - "pages": "\n 228301\n ", "volume": "87 22"}, "authors": [{"authorId": - "2258489", "name": "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, - {"paperId": "0b9c28ba7f71ab5e878f940d007ccaeffe4490c1", "externalIds": {"DBLP": - "conf/umc/2002", "MAG": "1593993808", "DOI": "10.1007/3-540-45833-6", "CorpusId": - 29314845}, "url": "https://www.semanticscholar.org/paper/0b9c28ba7f71ab5e878f940d007ccaeffe4490c1", - "title": "Unconventional Models of Computation", "abstract": null, "venue": - "Lecture Notes in Computer Science", "year": 2002, "referenceCount": 0, "citationCount": - 204, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "2509"}, - "authors": [{"authorId": "1685717", "name": "Cristian S. Calude"}, {"authorId": - "1682108", "name": "J. Casti"}, {"authorId": "1784879", "name": "M. Dinneen"}]}, - {"paperId": "8e02819e3182df4b529ee0db15f1e09410dbea4e", "externalIds": {"DBLP": - "journals/jcss/Cook74", "MAG": "2061739322", "DOI": "10.1145/800125.804032", - "CorpusId": 15959898}, "url": "https://www.semanticscholar.org/paper/8e02819e3182df4b529ee0db15f1e09410dbea4e", + 228, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-11-07", "journal": + {"name": "Physical review letters", "pages": "\n 228301\n ", + "volume": "87 22"}, "authors": [{"authorId": "2258489", "name": "V. Vanag"}, + {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "8e02819e3182df4b529ee0db15f1e09410dbea4e", + "externalIds": {"DBLP": "journals/jcss/Cook74", "MAG": "2061739322", "DOI": + "10.1145/800125.804032", "CorpusId": 15959898}, "corpusId": 15959898, "publicationVenue": + {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", "name": "Journal of computer + and system sciences (Print)", "type": "journal", "alternate_names": ["Journal + of Computer and System Sciences", "J comput syst sci (print", "J Comput Syst + Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/8e02819e3182df4b529ee0db15f1e09410dbea4e", "title": "An observation on time-storage trade off", "abstract": "Recently there have been several attempts to prove that every set of strings in @@@@ (i.e., recognizable in deterministic polynomial time) can be recognized in @@ -14486,15 +16436,35 @@ interactions: false, then in fact every member of @@@@ can be recognized within storage (log n)2.", "venue": "Journal of computer and system sciences (Print)", "year": 1973, "referenceCount": 9, "citationCount": 270, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], - "publicationDate": "1973-04-30", "journal": {"name": "Proceedings of the fifth - annual ACM symposium on Theory of computing"}, "authors": [{"authorId": "1765456", - "name": "S. Cook"}]}, {"paperId": "b861fe85df4a6f19e00fb85379973caf32004082", - "externalIds": {"MAG": "2140180489", "DOI": "10.1006/BULM.2002.0295", "CorpusId": - 13772599, "PubMed": "12216419"}, "url": "https://www.semanticscholar.org/paper/b861fe85df4a6f19e00fb85379973caf32004082", + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Book", "JournalArticle"], "publicationDate": "1973-04-30", "journal": {"name": + "Proceedings of the fifth annual ACM symposium on Theory of computing"}, "authors": + [{"authorId": "1765456", "name": "S. Cook"}]}, {"paperId": "2fe829b533783f9dede4029046dae25d1aad6f24", + "externalIds": {"MAG": "1896677180", "DBLP": "journals/mima/Harnad91", "DOI": + "10.1007/BF00360578", "CorpusId": 37089511}, "corpusId": 37089511, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/2fe829b533783f9dede4029046dae25d1aad6f24", + "title": "Other bodies, other minds: A machine incarnation of an old philosophical + problem", "abstract": null, "venue": "Minds and Machines", "year": 1991, "referenceCount": + 44, "citationCount": 145, "influentialCitationCount": 11, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1991-02-01", "journal": {"name": "Minds and Machines", "pages": "43-54", + "volume": "1"}, "authors": [{"authorId": "2293327", "name": "S. Harnad"}]}, + {"paperId": "b861fe85df4a6f19e00fb85379973caf32004082", "externalIds": {"MAG": + "2140180489", "DOI": "10.1006/BULM.2002.0295", "CorpusId": 13772599, "PubMed": + "12216419"}, "corpusId": 13772599, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/b861fe85df4a6f19e00fb85379973caf32004082", "title": "Pattern formation in reaction-diffusion models with nonuniform domain growth", "abstract": "Recent examples of biological pattern formation where a pattern changes qualitatively as the underlying domain grows have given @@ -14517,27 +16487,61 @@ interactions: domain expansion and boundary (apical) growth are unified in a consistent manner. The results have implications for all reaction-diffusion type models subject to underlying domain growth.", "venue": "Bulletin of Mathematical - Biology", "year": 2002, "referenceCount": 45, "citationCount": 158, "influentialCitationCount": - 10, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + Biology", "year": 2002, "referenceCount": 45, "citationCount": 160, "influentialCitationCount": + 10, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-07-01", "journal": {"name": "Bulletin of Mathematical Biology", "pages": + "747-769", "volume": "64"}, "authors": [{"authorId": "2434078", "name": "E. + Crampin"}, {"authorId": "2970451", "name": "W. Hackborn"}, {"authorId": "2339973", + "name": "P. Maini"}]}, {"paperId": "26506d868a6cbf68992ef129bbe6248591f5414a", + "externalIds": {"DBLP": "journals/corr/cs-CC-9812012", "ArXiv": "cs/9812012", + "MAG": "1872909421", "DOI": "10.1109/CCC.1999.766275", "CorpusId": 7468066}, + "corpusId": 7468066, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/26506d868a6cbf68992ef129bbe6248591f5414a", + "title": "Quantum simulations of classical random walks and undirected graph + connectivity", "abstract": "There are a number of questions in quantum complexity + that have been resolved in the time-bounded setting, but remain open in the + space-bounded setting. For example, it is not currently known if space-bounded + probabilistic computations can be simulated by space-bounded quantum machines + without allowing measurements during the computation, while it is known that + an analogous statement holds in the time-bounded case. A more general question + asks if measurements during a quantum computation can allow for more space-efficient + solutions to certain problems. In this paper we show that space-bounded quantum + Turing machines can efficiently simulate a limited class of random processes-random + walks on undirected graphs-without relying on measurements during the computation. + By means of such simulations, it is demonstrated that the undirected graph + connectivity problem for regular graphs can be solved by one-sided error quantum + Turing machines that run in logspace and require a single measurement at the + end of their computations. It follows that symmetric logspace is contained + in the quantum analogue of randomized logspace, i.e., SL/spl sube/QR/sub H/L.", + "venue": "Proceedings. Fourteenth Annual IEEE Conference on Computational + Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)", + "year": 1998, "referenceCount": 24, "citationCount": 183, "influentialCitationCount": + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1998-12-10", "journal": {"name": "Proceedings. + Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure + in Complexity Theory Conference) (Cat.No.99CB36317)", "pages": "180-187"}, + "authors": [{"authorId": "145264143", "name": "J. Watrous"}]}, {"paperId": + "1e4de297f98e886530ed01beef06111cc46c613e", "externalIds": {"MAG": "1569000027", + "ArXiv": "2104.07106", "DOI": "10.1007/978-3-7908-1856-7_11", "CorpusId": + 9099722}, "corpusId": 9099722, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1e4de297f98e886530ed01beef06111cc46c613e", + "title": "Quantum Neural Networks", "abstract": null, "venue": "", "year": + 2021, "referenceCount": 55, "citationCount": 190, "influentialCitationCount": + 8, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.triniti.ru/CTF&VM/Articles/Ezhov1.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2002-07-01", "journal": - {"name": "Bulletin of Mathematical Biology", "pages": "747-769", "volume": - "64"}, "authors": [{"authorId": "2434078", "name": "E. Crampin"}, {"authorId": - "2970451", "name": "W. Hackborn"}, {"authorId": "2339973", "name": "P. Maini"}]}, - {"paperId": "2fe829b533783f9dede4029046dae25d1aad6f24", "externalIds": {"MAG": - "1896677180", "DBLP": "journals/mima/Harnad91", "DOI": "10.1007/BF00360578", - "CorpusId": 37089511}, "url": "https://www.semanticscholar.org/paper/2fe829b533783f9dede4029046dae25d1aad6f24", - "title": "Other bodies, other minds: A machine incarnation of an old philosophical - problem", "abstract": null, "venue": "Minds and Machines", "year": 1991, "referenceCount": - 44, "citationCount": 145, "influentialCitationCount": 11, "isOpenAccess": - false, "fieldsOfStudy": ["Philosophy", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1991-02-01", "journal": - {"name": "Minds and Machines", "pages": "43-54", "volume": "1"}, "authors": - [{"authorId": "2293327", "name": "S. Harnad"}]}, {"paperId": "a510b16a624e512de69e4ede947d5989b44823b3", - "externalIds": {"MAG": "2165432485", "CorpusId": 17118014}, "url": "https://www.semanticscholar.org/paper/a510b16a624e512de69e4ede947d5989b44823b3", + "publicationTypes": null, "publicationDate": "2021-04-12", "journal": {"name": + "", "pages": "213-235", "volume": ""}, "authors": [{"authorId": "34518911", + "name": "A. Ezhov"}, {"authorId": "1777419", "name": "D. Ventura"}]}, {"paperId": + "a510b16a624e512de69e4ede947d5989b44823b3", "externalIds": {"MAG": "2165432485", + "CorpusId": 17118014}, "corpusId": 17118014, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a510b16a624e512de69e4ede947d5989b44823b3", "title": "A PRELIMINARY REPORT ON A GENERAL THEORY OF INDUCTIVE INFERENCE", "abstract": "Some preliminary work is presented on a very general new theory of inductive inference. The extrapolation of an ordered sequence of symbols @@ -14555,48 +16559,51 @@ interactions: of inductive inference are presented whose validities appear to be corollaries of the validity of the first method described.", "venue": "", "year": 2001, "referenceCount": 2, "citationCount": 177, "influentialCitationCount": 5, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1727567", - "name": "R. Solomonoff"}]}, {"paperId": "1e4de297f98e886530ed01beef06111cc46c613e", - "externalIds": {"MAG": "1569000027", "ArXiv": "2104.07106", "DOI": "10.1007/978-3-7908-1856-7_11", - "CorpusId": 9099722}, "url": "https://www.semanticscholar.org/paper/1e4de297f98e886530ed01beef06111cc46c613e", - "title": "Quantum Neural Networks", "abstract": null, "venue": "", "year": - 2021, "referenceCount": 55, "citationCount": 187, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Physics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-04-12", - "journal": {"name": "", "pages": "213-235", "volume": ""}, "authors": [{"authorId": - "34518911", "name": "A. Ezhov"}, {"authorId": "1777419", "name": "D. Ventura"}]}, - {"paperId": "37f31fae33ef4ced69b2915853a552463cc6b7f5", "externalIds": {"DBLP": - "conf/icalp/NearyW06", "MAG": "2583894071", "DOI": "10.1007/11786986_13", - "CorpusId": 14404152}, "url": "https://www.semanticscholar.org/paper/37f31fae33ef4ced69b2915853a552463cc6b7f5", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1727567", + "name": "R. Solomonoff"}]}, {"paperId": "37f31fae33ef4ced69b2915853a552463cc6b7f5", + "externalIds": {"DBLP": "conf/icalp/NearyW06", "MAG": "2583894071", "DOI": + "10.1007/11786986_13", "CorpusId": 14404152}, "corpusId": 14404152, "publicationVenue": + {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", "name": "International Colloquium + on Automata, Languages and Programming", "type": "conference", "alternate_names": + ["Int Conf Arab Lang Process", "International Conference on Arabic Language + Processing", "Int Colloq Autom Lang Program", "ICALP"], "url": "http://www.eatcs.org/"}, + "url": "https://www.semanticscholar.org/paper/37f31fae33ef4ced69b2915853a552463cc6b7f5", "title": "P-completeness of Cellular Automaton Rule 110", "abstract": null, "venue": "International Colloquium on Automata, Languages and Programming", "year": 2006, "referenceCount": 21, "citationCount": 97, "influentialCitationCount": - 8, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 8, "isOpenAccess": true, "openAccessPdf": {"url": "https://mural.maynoothuniversity.ie/15737/1/DW_P-completeness.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2006-07-10", "journal": {"pages": "132-143"}, - "authors": [{"authorId": "2221070", "name": "T. Neary"}, {"authorId": "145284748", - "name": "D. Woods"}]}, {"paperId": "31b1beb7a33feee7853fe195e5bc554d581154c6", + "authors": [{"authorId": "2221070", "name": "Turlough Neary"}, {"authorId": + "145284748", "name": "D. Woods"}]}, {"paperId": "31b1beb7a33feee7853fe195e5bc554d581154c6", "externalIds": {"DBLP": "journals/mst/FischerMR68", "MAG": "2056647002", "DOI": - "10.1007/BF01694011", "CorpusId": 13006433}, "url": "https://www.semanticscholar.org/paper/31b1beb7a33feee7853fe195e5bc554d581154c6", + "10.1007/BF01694011", "CorpusId": 13006433}, "corpusId": 13006433, "publicationVenue": + {"id": "cc43107f-e671-4f87-99f5-ae12f9992c0d", "name": "Mathematical Systems + Theory", "type": "journal", "alternate_names": ["Math Syst Theory", "Theory + Comput Syst Math Syst Theory", "Theory of Computing Systems \\/ Mathematical + Systems Theory"], "issn": "0025-5661", "url": "https://link.springer.com/journal/224"}, + "url": "https://www.semanticscholar.org/paper/31b1beb7a33feee7853fe195e5bc554d581154c6", "title": "Counter machines and counter languages", "abstract": null, "venue": "Mathematical Systems Theory", "year": 1968, "referenceCount": 19, "citationCount": - 117, "influentialCitationCount": 15, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1968-09-01", "journal": - {"name": "Mathematical systems theory", "pages": "265-283", "volume": "2"}, - "authors": [{"authorId": "1691253", "name": "P. C. Fischer"}, {"authorId": - "39792203", "name": "A. Meyer"}, {"authorId": "34896921", "name": "A. Rosenberg"}]}, - {"paperId": "b605e24acda4c0f6922de4ff6e8381ef2c60b1f2", "externalIds": {"MAG": - "1974959615", "DBLP": "conf/stoc/AbiteboulV91", "DOI": "10.1145/103418.103444", - "CorpusId": 12707902}, "url": "https://www.semanticscholar.org/paper/b605e24acda4c0f6922de4ff6e8381ef2c60b1f2", + 117, "influentialCitationCount": 15, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1968-09-01", "journal": {"name": "Mathematical systems theory", "pages": + "265-283", "volume": "2"}, "authors": [{"authorId": "1691253", "name": "P. + C. Fischer"}, {"authorId": "39792203", "name": "A. Meyer"}, {"authorId": "34896921", + "name": "A. Rosenberg"}]}, {"paperId": "b605e24acda4c0f6922de4ff6e8381ef2c60b1f2", + "externalIds": {"MAG": "1974959615", "DBLP": "conf/stoc/AbiteboulV91", "DOI": + "10.1145/103418.103444", "CorpusId": 12707902}, "corpusId": 12707902, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/b605e24acda4c0f6922de4ff6e8381ef2c60b1f2", "title": "Generic Computation and its complexity", "abstract": "There is a fundamental mismatch between the hardness of database queries and their Turing complexity. For example, the even query on a set has low Turing complexity @@ -14628,18 +16635,25 @@ interactions: of the Association for Computing Machinery. To copy otherwise , or to republish, requires a fee and/or specific permission. Victor Vianu", "venue": "Symposium on the Theory of Computing", "year": 1991, "referenceCount": 32, "citationCount": - 210, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1991-01-03", "journal": - {"pages": "209-219"}, "authors": [{"authorId": "69026873", "name": "S. Abiteboul"}, - {"authorId": "1765187", "name": "V. Vianu"}]}, {"paperId": "ed15d6de3d61774549f88ea218adc248b7b1535f", - "externalIds": {"DBLP": "journals/jcss/BuchfuhrerU11", "MAG": "2070023605", - "DOI": "10.1007/978-3-540-70575-8_3", "CorpusId": 9456054}, "url": "https://www.semanticscholar.org/paper/ed15d6de3d61774549f88ea218adc248b7b1535f", + 210, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1991-01-03", "journal": {"pages": "209-219"}, "authors": [{"authorId": "69026873", + "name": "S. Abiteboul"}, {"authorId": "1765187", "name": "V. Vianu"}]}, {"paperId": + "ed15d6de3d61774549f88ea218adc248b7b1535f", "externalIds": {"DBLP": "journals/jcss/BuchfuhrerU11", + "MAG": "2070023605", "DOI": "10.1007/978-3-540-70575-8_3", "CorpusId": 9456054}, + "corpusId": 9456054, "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", + "name": "Journal of computer and system sciences (Print)", "type": "journal", + "alternate_names": ["Journal of Computer and System Sciences", "J comput syst + sci (print", "J Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/ed15d6de3d61774549f88ea218adc248b7b1535f", "title": "The complexity of Boolean formula minimization", "abstract": null, "venue": "Journal of computer and system sciences (Print)", "year": 2008, "referenceCount": 19, "citationCount": 77, "influentialCitationCount": 3, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://authors.library.caltech.edu/23422/1/E44467B7d01.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -14647,17 +16661,22 @@ interactions: "name": "David Buchfuhrer"}, {"authorId": "8259074", "name": "C. Umans"}]}, {"paperId": "56c02b7ae0dbd215b0fc1cfd218ad544dc02ef7c", "externalIds": {"MAG": "1485836178", "DBLP": "conf/tcs/PapadimitriouZ83", "DOI": "10.1007/BFb0009651", - "CorpusId": 38539316}, "url": "https://www.semanticscholar.org/paper/56c02b7ae0dbd215b0fc1cfd218ad544dc02ef7c", + "CorpusId": 38539316}, "corpusId": 38539316, "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", + "name": "Theoretical Computer Science", "type": "journal", "alternate_names": + ["Theor Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/56c02b7ae0dbd215b0fc1cfd218ad544dc02ef7c", "title": "Two remarks on the power of counting", "abstract": null, "venue": "Theoretical Computer Science", "year": 1983, "referenceCount": 8, "citationCount": - 246, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1983-01-05", "journal": - {"pages": "269-276"}, "authors": [{"authorId": "144102674", "name": "C. Papadimitriou"}, - {"authorId": "1722512", "name": "S. Zachos"}]}, {"paperId": "ff9490042eaff9aa9ec77f77b67ad4bbb69fee20", - "externalIds": {"MAG": "1967629533", "DOI": "10.2307/1969708", "CorpusId": - 119834731}, "url": "https://www.semanticscholar.org/paper/ff9490042eaff9aa9ec77f77b67ad4bbb69fee20", + 246, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1983-01-05", "journal": {"pages": "269-276"}, "authors": [{"authorId": "144102674", + "name": "C. Papadimitriou"}, {"authorId": "1722512", "name": "S. Zachos"}]}, + {"paperId": "ff9490042eaff9aa9ec77f77b67ad4bbb69fee20", "externalIds": {"MAG": + "1967629533", "DOI": "10.2307/1969708", "CorpusId": 119834731}, "corpusId": + 119834731, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ff9490042eaff9aa9ec77f77b67ad4bbb69fee20", "title": "The Upper Semi-Lattice of Degrees of Recursive Unsolvability", "abstract": "The concept ''degree of recursive unsolvability'' was introduced briefly in Post [16]. In his abstract [17] the concept was formulated precisely via @@ -14694,33 +16713,37 @@ interactions: when it comes to giving rigorous demonstrations under one or another of the equivalent concepts of reducibility, there are advantages in using", "venue": "", "year": 1954, "referenceCount": 2, "citationCount": 257, "influentialCitationCount": - 32, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1954-05-01", "journal": {"name": "Annals of Mathematics", "pages": "379", - "volume": "59"}, "authors": [{"authorId": "1723068", "name": "S. Kleene"}, - {"authorId": "31707060", "name": "Emil L. Post"}]}, {"paperId": "92ceeca922b7c0ad397e1bc6ef4af84e140b5fb7", - "externalIds": {"MAG": "2145955413", "DOI": "10.1038/nbt1006-1203", "CorpusId": - 4664573, "PubMed": "17033651"}, "url": "https://www.semanticscholar.org/paper/92ceeca922b7c0ad397e1bc6ef4af84e140b5fb7", + 32, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1954-05-01", "journal": {"name": "Annals of Mathematics", + "pages": "379", "volume": "59"}, "authors": [{"authorId": "1723068", "name": + "S. Kleene"}, {"authorId": "31707060", "name": "Emil L. Post"}]}, {"paperId": + "92ceeca922b7c0ad397e1bc6ef4af84e140b5fb7", "externalIds": {"MAG": "2145955413", + "DOI": "10.1038/nbt1006-1203", "CorpusId": 4664573, "PubMed": "17033651"}, + "corpusId": 4664573, "publicationVenue": {"id": "458166b3-de17-4bf3-bbbb-e53782de2f0f", + "name": "Nature Biotechnology", "type": "journal", "alternate_names": ["Nat + Biotechnol"], "issn": "1087-0156", "url": "http://www.nature.com/nbt/", "alternate_urls": + ["http://www.nature.com/nbt"]}, "url": "https://www.semanticscholar.org/paper/92ceeca922b7c0ad397e1bc6ef4af84e140b5fb7", "title": "The imitation game\u2014a computational chemical approach to recognizing life", "abstract": null, "venue": "Nature Biotechnology", "year": 2006, "referenceCount": 31, "citationCount": 91, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-10-01", "journal": {"name": "Nature Biotechnology", - "pages": "1203-1206", "volume": "24"}, "authors": [{"authorId": "2065601922", - "name": "Leroy Cronin"}, {"authorId": "1712183", "name": "N. Krasnogor"}, - {"authorId": "50360795", "name": "B. Davis"}, {"authorId": "2064615544", "name": - "Cameron Alexander"}, {"authorId": "2070318117", "name": "Neil Robertson"}, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2006-10-01", "journal": {"name": "Nature + Biotechnology", "pages": "1203-1206", "volume": "24"}, "authors": [{"authorId": + "2065601922", "name": "Leroy Cronin"}, {"authorId": "1712183", "name": "N. + Krasnogor"}, {"authorId": "50360795", "name": "B. Davis"}, {"authorId": "2064615544", + "name": "Cameron Alexander"}, {"authorId": "2070318117", "name": "Neil Robertson"}, {"authorId": "3805910", "name": "J. Steinke"}, {"authorId": "16788123", "name": "S. Schroeder"}, {"authorId": "6207488", "name": "A. Khlobystov"}, {"authorId": "2057468635", "name": "Geoff Cooper"}, {"authorId": "49957446", "name": "P. M. Gardner"}, {"authorId": "3068237", "name": "P. Siepmann"}, {"authorId": "2987749", "name": "B. J. Whitaker"}, {"authorId": "2070001343", "name": "Dan Marsh"}]}, {"paperId": "7a73f74c2943e5aafef364735302a36ee2f17b26", "externalIds": - {"MAG": "1555005026", "DOI": "10.7939/R3JM23K33", "CorpusId": 61114368}, "url": - "https://www.semanticscholar.org/paper/7a73f74c2943e5aafef364735302a36ee2f17b26", + {"MAG": "1555005026", "DOI": "10.7939/R3JM23K33", "CorpusId": 61114368}, "corpusId": + 61114368, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7a73f74c2943e5aafef364735302a36ee2f17b26", "title": "Sokoban is PSPACE-complete", "abstract": "It is shown that the popular puzzle Sokoban can be used to emulate a linear bounded automata ((nite tape Turing Machine (TM)). In particular, a construction is given that has a solution @@ -14730,44 +16753,15 @@ interactions: tape, and t(n) is the number of transitions made by the TM during its computation. This construction shows that the puzzles are PSPACE-complete, solving the open problem stated in 1].", "venue": "", "year": 1997, "referenceCount": - 4, "citationCount": 152, "influentialCitationCount": 17, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "3038110", "name": "J. - Culberson"}]}, {"paperId": "26506d868a6cbf68992ef129bbe6248591f5414a", "externalIds": - {"DBLP": "journals/corr/cs-CC-9812012", "ArXiv": "cs/9812012", "MAG": "1872909421", - "DOI": "10.1109/CCC.1999.766275", "CorpusId": 7468066}, "url": "https://www.semanticscholar.org/paper/26506d868a6cbf68992ef129bbe6248591f5414a", - "title": "Quantum simulations of classical random walks and undirected graph - connectivity", "abstract": "There are a number of questions in quantum complexity - that have been resolved in the time-bounded setting, but remain open in the - space-bounded setting. For example, it is not currently known if space-bounded - probabilistic computations can be simulated by space-bounded quantum machines - without allowing measurements during the computation, while it is known that - an analogous statement holds in the time-bounded case. A more general question - asks if measurements during a quantum computation can allow for more space-efficient - solutions to certain problems. In this paper we show that space-bounded quantum - Turing machines can efficiently simulate a limited class of random processes-random - walks on undirected graphs-without relying on measurements during the computation. - By means of such simulations, it is demonstrated that the undirected graph - connectivity problem for regular graphs can be solved by one-sided error quantum - Turing machines that run in logspace and require a single measurement at the - end of their computations. It follows that symmetric logspace is contained - in the quantum analogue of randomized logspace, i.e., SL/spl sube/QR/sub H/L.", - "venue": "Proceedings. Fourteenth Annual IEEE Conference on Computational - Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)", - "year": 1998, "referenceCount": 24, "citationCount": 172, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics", - "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1998-12-10", - "journal": {"name": "Proceedings. Fourteenth Annual IEEE Conference on Computational - Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)", - "pages": "180-187"}, "authors": [{"authorId": "145264143", "name": "J. Watrous"}]}, - {"paperId": "4f6b2f6a9b3d5e4a35a80a5205f63bac75b3b1aa", "externalIds": {"DBLP": - "conf/focs/Watrous95", "MAG": "2142902085", "DOI": "10.1109/SFCS.1995.492583", - "CorpusId": 7441203}, "url": "https://www.semanticscholar.org/paper/4f6b2f6a9b3d5e4a35a80a5205f63bac75b3b1aa", + 4, "citationCount": 153, "influentialCitationCount": 17, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3038110", + "name": "J. Culberson"}]}, {"paperId": "4f6b2f6a9b3d5e4a35a80a5205f63bac75b3b1aa", + "externalIds": {"DBLP": "conf/focs/Watrous95", "MAG": "2142902085", "DOI": + "10.1109/SFCS.1995.492583", "CorpusId": 7441203}, "corpusId": 7441203, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4f6b2f6a9b3d5e4a35a80a5205f63bac75b3b1aa", "title": "On one-dimensional quantum cellular automata", "abstract": "Since Richard Feynman introduced the notion of quantum computation in 1982, various models of \"quantum computers\" have been proposed (R. Feynman, 1992). These @@ -14783,17 +16777,24 @@ interactions: cellular automaton with a quantum Turing machine is left open. From this discussion, some interesting facts concerning these models are easily deduced.", "venue": "Proceedings of IEEE 36th Annual Foundations of Computer Science", "year": - 1995, "referenceCount": 9, "citationCount": 171, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1995-10-23", "journal": - {"name": "Proceedings of IEEE 36th Annual Foundations of Computer Science", - "pages": "528-537"}, "authors": [{"authorId": "145264143", "name": "J. Watrous"}]}, - {"paperId": "b06afb285b1afbaec8c9e152a9d9217b6716177f", "externalIds": {"MAG": - "2169316270", "DBLP": "journals/jetai/Harnad89", "DOI": "10.1080/09528138908953691", - "CorpusId": 16701736}, "url": "https://www.semanticscholar.org/paper/b06afb285b1afbaec8c9e152a9d9217b6716177f", + 1995, "referenceCount": 9, "citationCount": 173, "influentialCitationCount": + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1995-10-23", "journal": {"name": "Proceedings of IEEE 36th Annual Foundations + of Computer Science", "pages": "528-537"}, "authors": [{"authorId": "145264143", + "name": "J. Watrous"}]}, {"paperId": "b06afb285b1afbaec8c9e152a9d9217b6716177f", + "externalIds": {"MAG": "2169316270", "DBLP": "journals/jetai/Harnad89", "DOI": + "10.1080/09528138908953691", "CorpusId": 16701736}, "corpusId": 16701736, + "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", "name": + "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/b06afb285b1afbaec8c9e152a9d9217b6716177f", "title": "Minds, machines and Searle", "abstract": "Searle''s celebrated Chinese Room Argument has shaken the foundations of Artificial Intelligence. Many refutations have been attempted, but none seem convincing. This paper is an @@ -14806,14 +16807,31 @@ interactions: Test, modularity, neural modeling, robotics, causality and the symbol-grounding problem.", "venue": "Journal of experimental and theoretical artificial intelligence (Print)", "year": 1989, "referenceCount": 66, "citationCount": 212, "influentialCitationCount": - 11, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 11, "isOpenAccess": true, "openAccessPdf": {"url": "http://web.comlab.ox.ac.uk/oucl/research/areas/ieg/e-library/sources/harnad89_searle.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "J. Exp. Theor. Artif. Intell.", "pages": "5-25", "volume": "1"}, "authors": [{"authorId": "2293327", "name": "S. Harnad"}]}, - {"paperId": "3bc8afd26768368f73fe239d85e2a66946604798", "externalIds": {"MAG": - "1244836833", "DBLP": "journals/compsys/LindgrenN90", "CorpusId": 27054113}, - "url": "https://www.semanticscholar.org/paper/3bc8afd26768368f73fe239d85e2a66946604798", + {"paperId": "0558d5b91184d241e2e3b7b87a43e4936e64dfdc", "externalIds": {"MAG": + "2076040483", "DOI": "10.1134/S0081543811060071", "CorpusId": 122567880}, + "corpusId": 122567880, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0558d5b91184d241e2e3b7b87a43e4936e64dfdc", + "title": "Degrees of autostability relative to strong constructivizations", + "abstract": null, "venue": "", "year": 2011, "referenceCount": 33, "citationCount": + 40, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2011-10-16", "journal": {"name": "Proceedings of + the Steklov Institute of Mathematics", "pages": "105-115", "volume": "274"}, + "authors": [{"authorId": "144121388", "name": "S. Goncharov"}]}, {"paperId": + "3bc8afd26768368f73fe239d85e2a66946604798", "externalIds": {"MAG": "1244836833", + "DBLP": "journals/compsys/LindgrenN90", "CorpusId": 27054113}, "corpusId": + 27054113, "publicationVenue": {"id": "7f30f248-48d1-479a-a293-a82c1124630c", + "name": "Complex Systems", "type": "journal", "alternate_names": ["Complex + Syst"], "issn": "0891-2513", "url": "https://www.complex-systems.com/", "alternate_urls": + ["http://www.complex-systems.com/archives.html", "http://www.complex-systems.com/index.html", + "http://www.complex-systems.com/"]}, "url": "https://www.semanticscholar.org/paper/3bc8afd26768368f73fe239d85e2a66946604798", "title": "Universal Computation in Simple One-Dimensional Cellular Automata", "abstract": "The existence of computation-universal one-dimensional cellular automata with seven states per cell for a transition function depending on @@ -14823,36 +16841,42 @@ interactions: states can be simulated by a cellular automaton of range r= 1 with m+ n+ 2 states per cell.", "venue": "Complex Systems", "year": 1990, "referenceCount": 11, "citationCount": 208, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Complex Syst.", "volume": "4"}, "authors": [{"authorId": "144107346", - "name": "K. Lindgren"}, {"authorId": "2320024", "name": "M. Nordahl"}]}, {"paperId": - "b0be6aa3fb0b6611d22015fb42975304c16f3b92", "externalIds": {"MAG": "1485501806", - "DOI": "10.1007/978-3-662-05642-4_8", "CorpusId": 118322434}, "url": "https://www.semanticscholar.org/paper/b0be6aa3fb0b6611d22015fb42975304c16f3b92", - "title": "The Myth of Hypercomputation", "abstract": null, "venue": "", "year": - 2004, "referenceCount": 23, "citationCount": 137, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "195-211", "volume": ""}, "authors": [{"authorId": - "113641402", "name": "Martin D. Davis"}]}, {"paperId": "cd9ec3c63844db468cde75f794cbc30769993690", - "externalIds": {"MAG": "2962143937", "DOI": "10.5860/choice.30-2642", "CorpusId": - 142926057}, "url": "https://www.semanticscholar.org/paper/cd9ec3c63844db468cde75f794cbc30769993690", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Complex Syst.", "volume": "4"}, "authors": [{"authorId": + "144107346", "name": "K. Lindgren"}, {"authorId": "2320024", "name": "M. Nordahl"}]}, + {"paperId": "cd9ec3c63844db468cde75f794cbc30769993690", "externalIds": {"MAG": + "2962143937", "DOI": "10.5860/choice.30-2642", "CorpusId": 142926057}, "corpusId": + 142926057, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cd9ec3c63844db468cde75f794cbc30769993690", "title": "Fearful Symmetry: Is God a Geometer?", "abstract": "Geometer God what is symmetry where did it go forever stones striped water the universe and anything Turing''s tiger the patterns of tiny feet icons of chaos well, is She. Appendices: equations for icons computer programs for quilts.", "venue": - "", "year": 1992, "referenceCount": 0, "citationCount": 203, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Psychology", "Philosophy"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1992-06-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "144925593", "name": "I. Stewart"}, - {"authorId": "3318430", "name": "M. Golubitsky"}]}, {"paperId": "97098025869d89e6ea6ae2cd41226425d4637060", + "", "year": 1992, "referenceCount": 0, "citationCount": 206, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology", + "Philosophy"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, + {"category": "Philosophy", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-06-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144925593", + "name": "I. Stewart"}, {"authorId": "3318430", "name": "M. Golubitsky"}]}, + {"paperId": "b0be6aa3fb0b6611d22015fb42975304c16f3b92", "externalIds": {"MAG": + "1485501806", "DOI": "10.1007/978-3-662-05642-4_8", "CorpusId": 118322434}, + "corpusId": 118322434, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b0be6aa3fb0b6611d22015fb42975304c16f3b92", + "title": "The Myth of Hypercomputation", "abstract": null, "venue": "", "year": + 2004, "referenceCount": 23, "citationCount": 137, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "195-211", "volume": ""}, "authors": + [{"authorId": "113641402", "name": "Martin D. Davis"}]}, {"paperId": "97098025869d89e6ea6ae2cd41226425d4637060", "externalIds": {"MAG": "2009798194", "DBLP": "conf/tcs/Schonhage79", "DOI": - "10.1137/0209036", "CorpusId": 27072031}, "url": "https://www.semanticscholar.org/paper/97098025869d89e6ea6ae2cd41226425d4637060", + "10.1137/0209036", "CorpusId": 27072031}, "corpusId": 27072031, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/97098025869d89e6ea6ae2cd41226425d4637060", "title": "Storage Modification Machines", "abstract": "In 1970 the author introduced a new machine model [A. Schonhage, Universelle Turing Speicherung, Dorr, Hotz, eds., Automatentheorie and Formale Sprachen, Bibliogr. Institut, @@ -14868,15 +16892,15 @@ interactions: contains a brief comment on the relationship between SMMs and Kolmogorov algorithms [A. N. Kolmogorov and V. A. Uspenskii, On the definition of an algo...", "venue": "SIAM journal on computing (Print)", "year": 1979, "referenceCount": 5, "citationCount": - 227, "influentialCitationCount": 15, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1979-03-26", "journal": {"name": "SIAM - J. Comput.", "pages": "490-508", "volume": "9"}, "authors": [{"authorId": - "1764338", "name": "A. Sch\u00f6nhage"}]}, {"paperId": "80edde97ddab0949b9b921215c72731dd52c2ea1", + 228, "influentialCitationCount": 15, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1979-03-26", "journal": + {"name": "SIAM J. Comput.", "pages": "490-508", "volume": "9"}, "authors": + [{"authorId": "1764338", "name": "A. Sch\u00f6nhage"}]}, {"paperId": "80edde97ddab0949b9b921215c72731dd52c2ea1", "externalIds": {"MAG": "1766349993", "DBLP": "phd/us/Wyllie79", "CorpusId": - 60530982}, "url": "https://www.semanticscholar.org/paper/80edde97ddab0949b9b921215c72731dd52c2ea1", + 60530982}, "corpusId": 60530982, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/80edde97ddab0949b9b921215c72731dd52c2ea1", "title": "The Complexity of Parallel Computations", "abstract": "Recent advances in microelectronics have brought closer to feasibility the construction of computers containing thousands (or more) of processing elements. This thesis @@ -14909,13 +16933,14 @@ interactions: binary tree. Finally, we present an algorithm for undirected graph connectivity that relies on redundancy in its representation of the input graph.", "venue": "", "year": 1979, "referenceCount": 0, "citationCount": 223, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "123-123", "volume": ""}, "authors": - [{"authorId": "40005350", "name": "J. Wyllie"}]}, {"paperId": "6c4a5551d86dfe04b51d1b5e2ca2d423d30ea3af", - "externalIds": {"MAG": "2117628472", "DOI": "10.1088/1742-5468/2007/11/P11011", - "CorpusId": 122525929}, "url": "https://www.semanticscholar.org/paper/6c4a5551d86dfe04b51d1b5e2ca2d423d30ea3af", + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "123-123", "volume": ""}, "authors": [{"authorId": "40005350", "name": + "J. Wyllie"}]}, {"paperId": "6c4a5551d86dfe04b51d1b5e2ca2d423d30ea3af", "externalIds": + {"MAG": "2117628472", "DOI": "10.1088/1742-5468/2007/11/P11011", "CorpusId": + 122525929}, "corpusId": 122525929, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6c4a5551d86dfe04b51d1b5e2ca2d423d30ea3af", "title": "Pattern formation in a spatial S\u2013I model with non-linear incidence rates", "abstract": "In this paper, we investigate a spatial S\u2013I model with non-linear incidence rates \u03b2SpIq, and obtain the conditions for @@ -14929,41 +16954,49 @@ interactions: but also a spot pattern, or coexistence of the two. The results obtained extend well the finding of pattern formation in the epidemic model and may well explain the field observed in some areas.", "venue": "", "year": 2007, "referenceCount": - 41, "citationCount": 85, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2007-11-27", "journal": {"name": "Journal of Statistical - Mechanics: Theory and Experiment", "pages": "P11011 - P11011", "volume": "2007"}, - "authors": [{"authorId": "47334108", "name": "Gui\u2010Quan Sun"}, {"authorId": - "145752193", "name": "Zhen Jin"}, {"authorId": "47362020", "name": "Quan\u2010Xing - Liu"}, {"authorId": "103314097", "name": "Li Li"}]}, {"paperId": "d58e37773d2b90704ba8a1023c7bab03a0f97775", - "externalIds": {"MAG": "2805778219", "DOI": "10.1038/SCIENTIFICAMERICAN0190-32", - "CorpusId": 5684982, "PubMed": "2294584"}, "url": "https://www.semanticscholar.org/paper/d58e37773d2b90704ba8a1023c7bab03a0f97775", + 41, "citationCount": 87, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2007-11-27", "journal": {"name": + "Journal of Statistical Mechanics: Theory and Experiment", "pages": "P11011 + - P11011", "volume": "2007"}, "authors": [{"authorId": "47334108", "name": + "Gui\u2010Quan Sun"}, {"authorId": "145752193", "name": "Zhen Jin"}, {"authorId": + "47362020", "name": "Quan\u2010Xing Liu"}, {"authorId": "103314097", "name": + "Li Li"}]}, {"paperId": "d58e37773d2b90704ba8a1023c7bab03a0f97775", "externalIds": + {"MAG": "2805778219", "DOI": "10.1038/SCIENTIFICAMERICAN0190-32", "CorpusId": + 5684982, "PubMed": "2294584"}, "corpusId": 5684982, "publicationVenue": {"id": + "fb27311b-7236-4828-ac26-ffbf0eec5dc8", "name": "Scientific American", "type": + "journal", "alternate_names": ["Sci Am"], "issn": "0036-8733", "url": "http://search.epnet.com/login.aspx?authtype=ip,uid&defaultdb=sfh&profile=sciamehost", + "alternate_urls": ["https://www.jstor.org/journal/scieamer", "http://www.sciam.com/sciammag/issues.cfm", + "http://cdl.library.cornell.edu/moa/browse.journals/scia.html", "https://www.scientificamerican.com/", + "http://proquest.umi.com/pqdweb?RQT=318&VName=HNP&pmid=42280"]}, "url": "https://www.semanticscholar.org/paper/d58e37773d2b90704ba8a1023c7bab03a0f97775", "title": "Could a machine think?", "abstract": null, "venue": "Scientific American", "year": 1990, "referenceCount": 1, "citationCount": 238, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "Scientific American", "pages": "\n 32-7\n ", "volume": "262 1"}, "authors": [{"authorId": "37069078", "name": "P. Churchland"}, {"authorId": "1769074", "name": "P. Churchland"}]}, {"paperId": "d0772f124e88b565ebdb1d66bc84d2e1d6c545e0", - "externalIds": {"MAG": "2517471289", "CorpusId": 13917283}, "url": "https://www.semanticscholar.org/paper/d0772f124e88b565ebdb1d66bc84d2e1d6c545e0", + "externalIds": {"MAG": "2517471289", "CorpusId": 13917283}, "corpusId": 13917283, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d0772f124e88b565ebdb1d66bc84d2e1d6c545e0", "title": "Approximation algorithms for finding highly connected subgraphs", "abstract": "This chapter is dedicated to Prof. Richard Karp whose Turing Award Lecture \\Combinatorics, Complexity and Randomness\" (Communications of the ACM, Feb 1986) inspired this author to start working in the eld of algorithms.", "venue": "", "year": 1996, "referenceCount": 36, "citationCount": - 148, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 148, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-08-01", "journal": {"name": "", "pages": "236-265", "volume": ""}, "authors": [{"authorId": "1737147", "name": "S. Khuller"}]}, {"paperId": "84e482768349292ef910dfb9a50a065b2797315f", "externalIds": {"DBLP": "conf/coco/Beigel93", "MAG": "2147154704", "DOI": - "10.1109/SCT.1993.336538", "CorpusId": 16952683}, "url": "https://www.semanticscholar.org/paper/84e482768349292ef910dfb9a50a065b2797315f", + "10.1109/SCT.1993.336538", "CorpusId": 16952683}, "corpusId": 16952683, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/84e482768349292ef910dfb9a50a065b2797315f", "title": "The polynomial method in circuit complexity", "abstract": "The basic techniques for using polynomials in complexity theory are examined, emphasizing intuition at the expense of formality. The focus is on the connections to @@ -14971,16 +17004,22 @@ interactions: The closure properties, upper bounds, and lower bounds obtained by this approach are surveyed.<>", "venue": "[1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference", "year": 1993, "referenceCount": 64, "citationCount": - 184, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference", "Review"], "publicationDate": "1993-05-18", - "journal": {"name": "[1993] Proceedings of the Eigth Annual Structure in Complexity - Theory Conference", "pages": "82-95"}, "authors": [{"authorId": "2516122", - "name": "R. Beigel"}]}, {"paperId": "4c5098ef0cb1885ee1036abb0dd211305d90ab83", + 184, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], + "publicationDate": "1993-05-18", "journal": {"name": "[1993] Proceedings of + the Eigth Annual Structure in Complexity Theory Conference", "pages": "82-95"}, + "authors": [{"authorId": "2516122", "name": "R. Beigel"}]}, {"paperId": "4c5098ef0cb1885ee1036abb0dd211305d90ab83", "externalIds": {"MAG": "1991146349", "DBLP": "conf/stoc/Venkateswaran87", - "DOI": "10.1145/28395.28411", "CorpusId": 15453831}, "url": "https://www.semanticscholar.org/paper/4c5098ef0cb1885ee1036abb0dd211305d90ab83", + "DOI": "10.1145/28395.28411", "CorpusId": 15453831}, "corpusId": 15453831, + "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", "name": + "Journal of computer and system sciences (Print)", "type": "journal", "alternate_names": + ["Journal of Computer and System Sciences", "J comput syst sci (print", "J + Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/4c5098ef0cb1885ee1036abb0dd211305d90ab83", "title": "Properties that characterize LOGCFL", "abstract": "Two properties, called semi-unboundedness, and polynomial proof-size, are identified as key properties shared by the definitions of LOGCFL on several models of computations. @@ -14993,26 +17032,16 @@ interactions: auxiliary pushdown automata [Co71], and bounded fan-in Boolean circuits [Co85].", "venue": "Journal of computer and system sciences (Print)", "year": 1987, "referenceCount": 24, "citationCount": 153, "influentialCitationCount": 20, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/28395.28411", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "1987-01-01", "journal": {"name": "Proceedings of the nineteenth annual ACM symposium on Theory of computing"}, "authors": - [{"authorId": "2519792", "name": "H. Venkateswaran"}]}, {"paperId": "0558d5b91184d241e2e3b7b87a43e4936e64dfdc", - "externalIds": {"MAG": "2076040483", "DOI": "10.1134/S0081543811060071", "CorpusId": - 122567880}, "url": "https://www.semanticscholar.org/paper/0558d5b91184d241e2e3b7b87a43e4936e64dfdc", - "title": "Degrees of autostability relative to strong constructivizations", - "abstract": null, "venue": "", "year": 2011, "referenceCount": 33, "citationCount": - 37, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2011-10-16", "journal": {"name": "Proceedings of the Steklov - Institute of Mathematics", "pages": "105-115", "volume": "274"}, "authors": - [{"authorId": "144121388", "name": "S. Goncharov"}]}, {"paperId": "b6cf15c725d8993d6a65653c041e9ff155e4ff4f", + [{"authorId": "2519792", "name": "H. Venkateswaran"}]}, {"paperId": "b6cf15c725d8993d6a65653c041e9ff155e4ff4f", "externalIds": {"MAG": "2097057772", "DOI": "10.1177/0261927X04269586", "CorpusId": - 27165641}, "url": "https://www.semanticscholar.org/paper/b6cf15c725d8993d6a65653c041e9ff155e4ff4f", + 27165641}, "corpusId": 27165641, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b6cf15c725d8993d6a65653c041e9ff155e4ff4f", "title": "Assessing Gender Authenticity in Computer-Mediated Language Use", "abstract": "Although a substantial body of research exists on gender differences in computer-mediated communication, relatively little empirical attention @@ -15029,14 +17058,15 @@ interactions: to a high rate of error. These findings are interpreted in terms of signal costs and conscious accessibility of cues.", "venue": "", "year": 2004, "referenceCount": 39, "citationCount": 111, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-12-01", "journal": - {"name": "Journal of Language and Social Psychology", "pages": "424 - 446", - "volume": "23"}, "authors": [{"authorId": "2961462", "name": "S. Herring"}, - {"authorId": "145703795", "name": "Anna Martinson"}]}, {"paperId": "593b618a61319a9cc137414185eb911f00a69403", - "externalIds": {"MAG": "40819056", "DOI": "10.1088/0951-7715/4/2/002", "CorpusId": - 18344156}, "url": "https://www.semanticscholar.org/paper/593b618a61319a9cc137414185eb911f00a69403", + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-12-01", "journal": {"name": "Journal of Language and Social Psychology", + "pages": "424 - 446", "volume": "23"}, "authors": [{"authorId": "2961462", + "name": "S. Herring"}, {"authorId": "145703795", "name": "Anna Martinson"}]}, + {"paperId": "593b618a61319a9cc137414185eb911f00a69403", "externalIds": {"MAG": + "40819056", "DOI": "10.1088/0951-7715/4/2/002", "CorpusId": 18344156}, "corpusId": + 18344156, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/593b618a61319a9cc137414185eb911f00a69403", "title": "Generalized shifts: unpredictability and undecidability in dynamical systems Nonlinearity 4 199-230", "abstract": "A class of shift-like dynamical systems is presented that displays a wide variety of behaviours. Three examples @@ -15049,14 +17079,21 @@ interactions: points, basins of attraction, and time series. Finally, he shows that they can be embedded in smooth maps in R2, or smooth flows in R3.", "venue": "", "year": 1991, "referenceCount": 43, "citationCount": 153, "influentialCitationCount": - 12, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 12, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.santafe.edu/~moore/nonlinearity-gs.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1991-05-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144869677", "name": "C. Moore"}]}, {"paperId": "d1d53727049685efcdee51b4f679c1164da59676", "externalIds": {"DBLP": "journals/bsl/Simpson05", "MAG": "2135114591", "DOI": - "10.2178/bsl/1107959497", "CorpusId": 2041663}, "url": "https://www.semanticscholar.org/paper/d1d53727049685efcdee51b4f679c1164da59676", + "10.2178/bsl/1107959497", "CorpusId": 2041663}, "corpusId": 2041663, "publicationVenue": + {"id": "2e016c78-9f89-4c7f-9072-c015f5de55eb", "name": "Bulletin of Symbolic + Logic", "type": "journal", "alternate_names": ["Bull Symb Log", "The Bulletin + of Symbolic Logic"], "issn": "1079-8986", "url": "https://www.math.ucla.edu/~asl/bsltoc.htm", + "alternate_urls": ["https://www.jstor.org/journal/bullsymblogi", "http://journals.cambridge.org/BSL", + "https://www.cambridge.org/core/journals/bulletin-of-symbolic-logic", "http://journals.cambridge.org/action/displayJournal?jid=BSL"]}, + "url": "https://www.semanticscholar.org/paper/d1d53727049685efcdee51b4f679c1164da59676", "title": "Mass Problems and Randomness", "abstract": "Abstract A mass problem is a set of Turing oracles. If P and Q are mass problems, we say that P is weakly reducible to Q if every member of Q Turing computes a member of P. @@ -15077,25 +17114,30 @@ interactions: in \u03c9. We relate these examples to reverse mathematics, computational complexity, and Gentzen-style proof theory.", "venue": "Bulletin of Symbolic Logic", "year": 2005, "referenceCount": 117, "citationCount": 85, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-03-01", "journal": {"name": "Bulletin of Symbolic Logic", "pages": "1 - - 27", "volume": "11"}, "authors": [{"authorId": "2292634", "name": "S. G. - Simpson"}]}, {"paperId": "71f3033a57350d23564cd798d2e7ef4e672c61c0", "externalIds": - {"MAG": "1971033056", "DBLP": "journals/synthese/Copeland96", "DOI": "10.1007/BF00413693", - "CorpusId": 15217009}, "url": "https://www.semanticscholar.org/paper/71f3033a57350d23564cd798d2e7ef4e672c61c0", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-03-01", "journal": {"name": "Bulletin + of Symbolic Logic", "pages": "1 - 27", "volume": "11"}, "authors": [{"authorId": + "2292634", "name": "S. G. Simpson"}]}, {"paperId": "71f3033a57350d23564cd798d2e7ef4e672c61c0", + "externalIds": {"MAG": "1971033056", "DBLP": "journals/synthese/Copeland96", + "DOI": "10.1007/BF00413693", "CorpusId": 15217009}, "corpusId": 15217009, + "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": + "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", + "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, + "url": "https://www.semanticscholar.org/paper/71f3033a57350d23564cd798d2e7ef4e672c61c0", "title": "What is computation?", "abstract": null, "venue": "Synthese", "year": 1996, "referenceCount": 40, "citationCount": 121, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-09-01", "journal": {"name": "Synthese", "pages": - "335-359", "volume": "108"}, "authors": [{"authorId": "144246233", "name": - "B. Copeland"}]}, {"paperId": "3bd9206c979e32950f8690268106dac8d0adf6f4", + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-09-01", "journal": + {"name": "Synthese", "pages": "335-359", "volume": "108"}, "authors": [{"authorId": + "144246233", "name": "B. Copeland"}]}, {"paperId": "3bd9206c979e32950f8690268106dac8d0adf6f4", "externalIds": {"MAG": "2795285943", "DBLP": "conf/coco/LangeMT97", "DOI": - "10.1109/CCC.1997.612299", "CorpusId": 9909845}, "url": "https://www.semanticscholar.org/paper/3bd9206c979e32950f8690268106dac8d0adf6f4", + "10.1109/CCC.1997.612299", "CorpusId": 9909845}, "corpusId": 9909845, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3bd9206c979e32950f8690268106dac8d0adf6f4", "title": "Reversible space equals deterministic space", "abstract": "This paper describes the simulation of an S(n) space-bounded deterministic Turing machine by a reversible Turing machine operating in space S(n). It thus answers @@ -15103,18 +17145,21 @@ interactions: M. Li and P. Vitanyi (1996), that any reversible simulation of an irreversible computation must obey Bennett''s reversible pebble game rules.", "venue": "Proceedings of Computational Complexity. Twelfth Annual IEEE Conference", - "year": 1997, "referenceCount": 30, "citationCount": 119, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "1997-06-24", "journal": {"name": "Proceedings of Computational Complexity. - Twelfth Annual IEEE Conference", "pages": "45-50"}, "authors": [{"authorId": - "143953624", "name": "Klaus-J\u00f6rn Lange"}, {"authorId": "144264797", "name": - "P. McKenzie"}, {"authorId": "1909393", "name": "A. Tapp"}]}, {"paperId": - "1a218bdb627051dc1530905bfdc33ebbc76e17a5", "externalIds": {"MAG": "2058942256", - "DOI": "10.1103/PHYSREVLETT.69.1193", "CorpusId": 42051680, "PubMed": "10047151"}, - "url": "https://www.semanticscholar.org/paper/1a218bdb627051dc1530905bfdc33ebbc76e17a5", + "year": 1997, "referenceCount": 30, "citationCount": 120, "influentialCitationCount": + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1997-06-24", "journal": {"name": "Proceedings + of Computational Complexity. Twelfth Annual IEEE Conference", "pages": "45-50"}, + "authors": [{"authorId": "143953624", "name": "Klaus-J\u00f6rn Lange"}, {"authorId": + "144264797", "name": "P. McKenzie"}, {"authorId": "1909393", "name": "A. Tapp"}]}, + {"paperId": "1a218bdb627051dc1530905bfdc33ebbc76e17a5", "externalIds": {"MAG": + "2058942256", "DOI": "10.1103/PHYSREVLETT.69.1193", "CorpusId": 42051680, + "PubMed": "10047151"}, "corpusId": 42051680, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/1a218bdb627051dc1530905bfdc33ebbc76e17a5", "title": "Chemical instability induced by a differential flow.", "abstract": "A new kind of instability is predicted for a system involving activator and inhibitor kinetics in a reactive flow. It is shown that a differential flow @@ -15125,16 +17170,22 @@ interactions: traveling-wave type. It is free from the restrictions of the Turing instability on the diffusion coefficients and can thus be expected to occur in a wide variety of natural and artificial systems", "venue": "Physical Review Letters", - "year": 1992, "referenceCount": 0, "citationCount": 181, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1992-08-24", "journal": {"name": "Physical - review letters", "pages": "\n 1193-1196\n ", "volume": "69 - 8"}, "authors": [{"authorId": "30145492", "name": "Rovinsky"}, {"authorId": - "121778916", "name": "Menzinger"}]}, {"paperId": "078cf910a125919b2fe1ae0dcdc34400f3073d0e", + "year": 1992, "referenceCount": 0, "citationCount": 183, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1992-08-24", "journal": {"name": "Physical review letters", "pages": "\n 1193-1196\n ", + "volume": "69 8"}, "authors": [{"authorId": "30145492", "name": "Rovinsky"}, + {"authorId": "121778916", "name": "Menzinger"}]}, {"paperId": "078cf910a125919b2fe1ae0dcdc34400f3073d0e", "externalIds": {"MAG": "2066396564", "DBLP": "journals/iandc/KilianS96", "DOI": - "10.1006/inco.1996.0062", "CorpusId": 7111824}, "url": "https://www.semanticscholar.org/paper/078cf910a125919b2fe1ae0dcdc34400f3073d0e", + "10.1006/inco.1996.0062", "CorpusId": 7111824}, "corpusId": 7111824, "publicationVenue": + {"id": "d8fc27e3-52dd-4758-bc70-1983b8a26797", "name": "Information and Computation", + "type": "journal", "alternate_names": ["Inf Comput", "Information & Computation", + "Inf Comput"], "issn": "0890-5401", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/622844/description#description", + "alternate_urls": ["http://www.idealibrary.com/links/toc/inco", "http://iandc.csail.mit.edu/", + "http://www.sciencedirect.com/science/journal/08905401", "https://www.journals.elsevier.com/information-and-computation/"]}, + "url": "https://www.semanticscholar.org/paper/078cf910a125919b2fe1ae0dcdc34400f3073d0e", "title": "The Dynamic Universality of Sigmoidal Neural Networks", "abstract": "We investigate the computational power of recurrent neural networks that apply the sigmoid activation function?(x)=2/(1+e?x)]?1. These networks are @@ -15149,15 +17200,16 @@ interactions: more general class of \u201csigmoidal-like\u201d activation functions, suggesting that Turing universality is a relatively common property of recurrent neural network models.", "venue": "Information and Computation", "year": 1996, "referenceCount": - 14, "citationCount": 124, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-07-10", "journal": {"name": "Inf. Comput.", "pages": "48-56", "volume": - "128"}, "authors": [{"authorId": "144747292", "name": "J. Kilian"}, {"authorId": - "2797623", "name": "H. Siegelmann"}]}, {"paperId": "b49376c78fc66dc4d4b30cea98268aa919492f3c", - "externalIds": {"MAG": "2911810069", "DOI": "10.1142/9789814541893_0016", - "CorpusId": 128255429}, "url": "https://www.semanticscholar.org/paper/b49376c78fc66dc4d4b30cea98268aa919492f3c", + 14, "citationCount": 125, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1996-07-10", "journal": {"name": "Inf. Comput.", "pages": + "48-56", "volume": "128"}, "authors": [{"authorId": "144747292", "name": "J. + Kilian"}, {"authorId": "2797623", "name": "H. Siegelmann"}]}, {"paperId": + "b49376c78fc66dc4d4b30cea98268aa919492f3c", "externalIds": {"MAG": "2911810069", + "DOI": "10.1142/9789814541893_0016", "CorpusId": 128255429}, "corpusId": 128255429, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b49376c78fc66dc4d4b30cea98268aa919492f3c", "title": "Quantum computation", "abstract": "Historically, Turing machines have been the paradigm by which we define computability and efficiency. This is based on Church''s thesis that every thing effectively computable can also @@ -15169,14 +17221,16 @@ interactions: quantum computing and briefly looks at a few results in quantum computation, not the least of which is Shor''s polynomial-time factoring algorithm.", "venue": "", "year": 1998, "referenceCount": 36, "citationCount": 179, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-12-01", "journal": {"name": - "", "pages": "23-51", "volume": ""}, "authors": [{"authorId": "2376065", "name": - "A. Berthiaume"}]}, {"paperId": "ee7384f216fe8272f9677b03147b986574e53372", - "externalIds": {"DBLP": "journals/jacm/Feigenbaum03", "MAG": "2018387902", - "DOI": "10.1145/602382.602400", "CorpusId": 15379263}, "url": "https://www.semanticscholar.org/paper/ee7384f216fe8272f9677b03147b986574e53372", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1998-12-01", "journal": {"name": "", "pages": "23-51", + "volume": ""}, "authors": [{"authorId": "2376065", "name": "A. Berthiaume"}]}, + {"paperId": "ee7384f216fe8272f9677b03147b986574e53372", "externalIds": {"DBLP": + "journals/jacm/Feigenbaum03", "MAG": "2018387902", "DOI": "10.1145/602382.602400", + "CorpusId": 15379263}, "corpusId": 15379263, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ee7384f216fe8272f9677b03147b986574e53372", "title": "Some challenges and grand challenges for computational intelligence", "abstract": "When the terms \u201cintelligence\u201d or \u201cintelligent\u201d are used by scientists, they are referring to a large collection of human @@ -15216,12 +17270,14 @@ interactions: intelligence is very multidimensional. However, the judge must fuse all of these dimensions into a", "venue": "JACM", "year": 2003, "referenceCount": 11, "citationCount": 119, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "J. ACM", "pages": "32-40", "volume": "50"}, "authors": - [{"authorId": "1792280", "name": "E. Feigenbaum"}]}, {"paperId": "320bb81f3ec39660a71819f00b5bebe28dc39658", - "externalIds": {"MAG": "2243794391", "CorpusId": 60897935}, "url": "https://www.semanticscholar.org/paper/320bb81f3ec39660a71819f00b5bebe28dc39658", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "J. ACM", "pages": "32-40", "volume": + "50"}, "authors": [{"authorId": "1792280", "name": "E. Feigenbaum"}]}, {"paperId": + "320bb81f3ec39660a71819f00b5bebe28dc39658", "externalIds": {"MAG": "2243794391", + "CorpusId": 60897935}, "corpusId": 60897935, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/320bb81f3ec39660a71819f00b5bebe28dc39658", "title": "Algorithmics: The Spirit of Computing", "abstract": "Computer science is the science of the future, and already underlies every facet of business and technology, and much of our everyday lives. In addition, it will play @@ -15238,15 +17294,16 @@ interactions: of the book is published to celebrate 25 years since its first edition, and in honor of the Alan M. Turing Centennial year. Turing was a true pioneer of computer science, whose work forms the underlying basis of much of this - book.", "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 206, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "145771081", "name": "D. Harel"}, - {"authorId": "49394812", "name": "Y. Feldman"}]}, {"paperId": "46f730daed250779a1e6615cbfdee7aecb07dd4c", - "externalIds": {"MAG": "1935999715", "DOI": "10.4324/9781315889443-4", "CorpusId": - 143246918}, "url": "https://www.semanticscholar.org/paper/46f730daed250779a1e6615cbfdee7aecb07dd4c", + book.", "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 205, + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "145771081", "name": + "D. Harel"}, {"authorId": "49394812", "name": "Y. Feldman"}]}, {"paperId": + "46f730daed250779a1e6615cbfdee7aecb07dd4c", "externalIds": {"MAG": "1935999715", + "DOI": "10.4324/9781315889443-4", "CorpusId": 143246918}, "corpusId": 143246918, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/46f730daed250779a1e6615cbfdee7aecb07dd4c", "title": "The structure of knowledge", "abstract": "The article discusses the structure of knowledge, abilities and skills. There are some types of knowledge/ability/skill that cannot be transferred simply by passing signals @@ -15258,14 +17315,19 @@ interactions: what intelligence means under this approach depends upon how the test is set up. Under the extended protocol, the Turing Test becomes a test of membership...", "venue": "", "year": 1993, "referenceCount": 0, "citationCount": 174, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Social Research", "pages": "95-116", "volume": - "60"}, "authors": [{"authorId": "83595901", "name": "H. M. Collins"}]}, {"paperId": - "a49877a506a83731fa171da9f2c52e439ced0c36", "externalIds": {"MAG": "2146750910", - "DBLP": "journals/jsyml/Knight86a", "DOI": "10.2307/2273915", "CorpusId": - 27994670}, "url": "https://www.semanticscholar.org/paper/a49877a506a83731fa171da9f2c52e439ced0c36", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Social + Research", "pages": "95-116", "volume": "60"}, "authors": [{"authorId": "83595901", + "name": "H. M. Collins"}]}, {"paperId": "a49877a506a83731fa171da9f2c52e439ced0c36", + "externalIds": {"MAG": "2146750910", "DBLP": "journals/jsyml/Knight86a", "DOI": + "10.2307/2273915", "CorpusId": 27994670}, "corpusId": 27994670, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/a49877a506a83731fa171da9f2c52e439ced0c36", "title": "Degrees coded in jumps of orderings", "abstract": "All structures to be considered here have universe \u03c9, and all languages come equipped with G\u00f6del numberings. If is a structure, then D(), the open diagram @@ -15283,25 +17345,31 @@ interactions: the recursion-theoretic complexity of the isomorphism type and was independent of the presentation. Jockusch suggested the following.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1986, "referenceCount": 8, "citationCount": - 145, "influentialCitationCount": 22, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1986-12-01", "journal": {"name": "Journal - of Symbolic Logic", "pages": "1034 - 1042", "volume": "51"}, "authors": [{"authorId": - "2490044", "name": "J. Knight"}]}, {"paperId": "149039495457f7b591c4aac3a479a6bb3e928c5f", + 147, "influentialCitationCount": 22, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1986-12-01", "journal": + {"name": "Journal of Symbolic Logic", "pages": "1034 - 1042", "volume": "51"}, + "authors": [{"authorId": "2490044", "name": "J. Knight"}]}, {"paperId": "149039495457f7b591c4aac3a479a6bb3e928c5f", "externalIds": {"MAG": "2502794726", "DOI": "10.1007/978-0-387-68546-5", "CorpusId": - 124780197}, "url": "https://www.semanticscholar.org/paper/149039495457f7b591c4aac3a479a6bb3e928c5f", + 124780197}, "corpusId": 124780197, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/149039495457f7b591c4aac3a479a6bb3e928c5f", "title": "New Computational Paradigms", "abstract": null, "venue": "", "year": 2005, "referenceCount": 4, "citationCount": 102, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-0-387-68546-5%2F1.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, {"authorId": "1740372", "name": "B. L\u00f6we"}, {"authorId": "3049789", "name": "L. Torenvliet"}]}, {"paperId": "c4b10f5fc3170cafa7f7645dd6502329da9febba", "externalIds": {"DBLP": "journals/jsyml/TerwijnZ01", "MAG": "2158555299", - "DOI": "10.2307/2695101", "CorpusId": 14427968}, "url": "https://www.semanticscholar.org/paper/c4b10f5fc3170cafa7f7645dd6502329da9febba", + "DOI": "10.2307/2695101", "CorpusId": 14427968}, "corpusId": 14427968, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/c4b10f5fc3170cafa7f7645dd6502329da9febba", "title": "Computational randomness and lowness*", "abstract": "Abstract We prove that there are uncountably many sets that are low for the class of Schnorr random reals. We give a purely recursion theoretic characterization of these @@ -15309,15 +17377,17 @@ interactions: contrasts with a result of Ku\u010dera and Terwijn [5] on sets that are low for the class of Martin-L\u00f6f random reals.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2001, "referenceCount": 14, "citationCount": 99, "influentialCitationCount": - 17, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-09-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "1199 - - 1205", "volume": "66"}, "authors": [{"authorId": "3200486", "name": "S. - Terwijn"}, {"authorId": "1963105", "name": "D. Zambella"}]}, {"paperId": "6d9794be1073b41855d9962983b8956e35baa7e1", - "externalIds": {"ArXiv": "cs/9911005", "MAG": "2048049618", "DBLP": "journals/corr/cs-GL-9911005", - "DOI": "10.1145/602382.602401", "CorpusId": 10336312}, "url": "https://www.semanticscholar.org/paper/6d9794be1073b41855d9962983b8956e35baa7e1", + 17, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2001-09-01", "journal": {"name": "Journal + of Symbolic Logic", "pages": "1199 - 1205", "volume": "66"}, "authors": [{"authorId": + "3200486", "name": "S. Terwijn"}, {"authorId": "1963105", "name": "D. Zambella"}]}, + {"paperId": "6d9794be1073b41855d9962983b8956e35baa7e1", "externalIds": {"ArXiv": + "cs/9911005", "MAG": "2048049618", "DBLP": "journals/corr/cs-GL-9911005", + "DOI": "10.1145/602382.602401", "CorpusId": 10336312}, "corpusId": 10336312, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6d9794be1073b41855d9962983b8956e35baa7e1", "title": "What next?: A dozen information-technology research goals", "abstract": "Charles Babbage''s vision of computing has largely been realized. We are on the verge of realizing Vannevar Bush''s Memex. But, we are some distance @@ -15334,12 +17404,14 @@ interactions: is simply stated and each is orthogonal from the others, though they share some common core technologies.", "venue": "JACM", "year": 1999, "referenceCount": 48, "citationCount": 116, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/cs/9911005", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1999-11-11", "journal": {"name": "J. ACM", "pages": "41-57", "volume": "50"}, "authors": [{"authorId": "39941882", "name": "J. Gray"}]}, {"paperId": "ba7b505eae0e337fe961a69651cf7525ce9651c1", - "externalIds": {"MAG": "10359634", "CorpusId": 12015667}, "url": "https://www.semanticscholar.org/paper/ba7b505eae0e337fe961a69651cf7525ce9651c1", + "externalIds": {"MAG": "10359634", "CorpusId": 12015667}, "corpusId": 12015667, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba7b505eae0e337fe961a69651cf7525ce9651c1", "title": "A computer program capable of passing I.Q. tests", "abstract": "The Imitation Game (Alan M. Turing, 1950), now commonly known as the Turing Test (see, e.g., Oppy and Dowe, http://plato.stanford.edu/entries/turing-test, @@ -15374,17 +17446,24 @@ interactions: administer a more challenging test and this notion can be continued recursively (Dowe and Hajek, 1998).", "venue": "", "year": 2008, "referenceCount": 30, "citationCount": 58, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "2782488", "name": "P. - Sanghi"}, {"authorId": "1745871", "name": "D. Dowe"}]}, {"paperId": "c6475d72059b4e1807d5aa3951b7f95c080112ff", - "externalIds": {"DBLP": "conf/mfcs/KariO08", "MAG": "1856886728", "DOI": "10.1007/978-3-540-85238-4_34", - "CorpusId": 13644055}, "url": "https://www.semanticscholar.org/paper/c6475d72059b4e1807d5aa3951b7f95c080112ff", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2782488", + "name": "P. Sanghi"}, {"authorId": "1745871", "name": "D. Dowe"}]}, {"paperId": + "c6475d72059b4e1807d5aa3951b7f95c080112ff", "externalIds": {"DBLP": "conf/mfcs/KariO08", + "MAG": "1856886728", "DOI": "10.1007/978-3-540-85238-4_34", "CorpusId": 13644055}, + "corpusId": 13644055, "publicationVenue": {"id": "8341fde2-3e67-4fde-bb5c-6f0320d7f114", + "name": "International Symposium on Mathematical Foundations of Computer Science", + "type": "conference", "alternate_names": ["Int Symp Math Found Comput Sci", + "MFCS", "Math Found Comput Sci", "Mathematical Foundations of Computer Science"], + "url": "https://en.wikipedia.org/wiki/International_Symposium_on_Mathematical_Foundations_of_Computer_Science"}, + "url": "https://www.semanticscholar.org/paper/c6475d72059b4e1807d5aa3951b7f95c080112ff", "title": "Periodicity and Immortality in Reversible Computing", "abstract": null, "venue": "International Symposium on Mathematical Foundations of Computer Science", "year": 2008, "referenceCount": 12, "citationCount": 61, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 7, "isOpenAccess": true, "openAccessPdf": {"url": "http://hal.archives-ouvertes.fr/docs/00/27/08/15/PDF/mfcs.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", @@ -15392,7 +17471,7 @@ interactions: "authors": [{"authorId": "1753080", "name": "J. Kari"}, {"authorId": "3007205", "name": "Nicolas Ollinger"}]}, {"paperId": "19febfabc80aa27e87697b40a5da0604e12c66d9", "externalIds": {"MAG": "1965700596", "DOI": "10.1364/AO.25.003054", "CorpusId": - 120577402}, "url": "https://www.semanticscholar.org/paper/19febfabc80aa27e87697b40a5da0604e12c66d9", + 120577402}, "corpusId": 120577402, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19febfabc80aa27e87697b40a5da0604e12c66d9", "title": "Digital optical computing with symbolic substitution.", "abstract": "Symbolic substitution logic is based on optical pattern transformations. This space-invariant mechanism is shown to be capable of supporting space-variant @@ -15404,14 +17483,20 @@ interactions: logic can be used to implement Boolean logic, binary arithmetic, cellular logic, and Turing machines.", "venue": "", "year": 1986, "referenceCount": 3, "citationCount": 192, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1986-09-15", "journal": {"name": - "Applied Optics", "pages": "3054-3060", "volume": "25"}, "authors": [{"authorId": - "152597331", "name": "K. Brenner"}, {"authorId": "49393373", "name": "A. Huang"}, - {"authorId": "3214892", "name": "N. Streibl"}]}, {"paperId": "419cb947256af2cb87df34d160059c1c7b4ac942", - "externalIds": {"MAG": "1980879781", "DBLP": "conf/stoc/Cook72", "DOI": "10.1145/800152.804913", - "CorpusId": 9317629}, "url": "https://www.semanticscholar.org/paper/419cb947256af2cb87df34d160059c1c7b4ac942", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1986-09-15", + "journal": {"name": "Applied Optics", "pages": "3054-3060", "volume": "25"}, + "authors": [{"authorId": "152597331", "name": "K. Brenner"}, {"authorId": + "49393373", "name": "A. Huang"}, {"authorId": "3214892", "name": "N. Streibl"}]}, + {"paperId": "419cb947256af2cb87df34d160059c1c7b4ac942", "externalIds": {"MAG": + "1980879781", "DBLP": "conf/stoc/Cook72", "DOI": "10.1145/800152.804913", + "CorpusId": 9317629}, "corpusId": 9317629, "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", + "name": "Journal of computer and system sciences (Print)", "type": "journal", + "alternate_names": ["Journal of Computer and System Sciences", "J comput syst + sci (print", "J Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/419cb947256af2cb87df34d160059c1c7b4ac942", "title": "A hierarchy for nondeterministic time complexity", "abstract": "The purpose of this paper is to prove the following result: Theorem 1 For any real numbers r1, r2, 1 \u2264 r1 < r2, there is a set A of strings which has @@ -15419,15 +17504,52 @@ interactions: nr1 The computing devices are non-deterministic multitape Turing machines.", "venue": "Journal of computer and system sciences (Print)", "year": 1972, "referenceCount": 17, "citationCount": 187, "influentialCitationCount": 11, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800152.804913", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book"], "publicationDate": "1972-05-01", "journal": {"name": "Proceedings of the fourth annual ACM symposium on Theory of computing"}, "authors": [{"authorId": - "1765456", "name": "S. Cook"}]}, {"paperId": "ef4579f9ec88af1f234821d94423a3043f1b89b5", + "1765456", "name": "S. Cook"}]}, {"paperId": "a62da7cf6b29179d8fcc1dfd4b751b2e44fb8d30", + "externalIds": {"MAG": "105184356", "DOI": "10.5860/choice.34-5726", "CorpusId": + 15056286}, "corpusId": 15056286, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a62da7cf6b29179d8fcc1dfd4b751b2e44fb8d30", + "title": "Artificial intelligence and scientific method", "abstract": "Preface + Acknowledgements Chapter 1: The Inductivist Controversy, or Bacon versus Popper + 1.1 Bacon''s Inductivism 1.2 Popper''s Falsificationism 1.3 Kepler''s Discovery + of the Laws of Planetary Motion 1.4 The Discovery of the Sulphonamide Drugs + Chapter 2: Machine Learning in the Turing Tradition 2.1 The Turing Tradition + 2.2 The Practical Problem: Expert Systems and Feigenbaum''s Bottleneck 2.3 + Attribute-based Learning, Decision Trees, and Quinlan''s ID3 2.4 GOLEM as + an example of Relational Learning 2.5 Bratko''s summary of the successes of + Machine Learning in the Turing Tradition, 1992 2.6 GOLEM''s Discovery of a + Law of Nature Chapter 3: How Advances in Machine Learning affect the Inductivist + Controversy 3.1 Bacon''s Example of Heat 3.2 The Importance of Falsification + 3.3 Bacon''s Method has only recently come to be used 3.4 The Need for Background + Knowledge Chapter 4: Logic and Programming and a New Framework for Logic 4.1 + The Development of PROLOG 4.2 PROLOG as a Non-Monotonic Logic 4.3 Two Examples + of Translations from One Logical System to Another 4.4 Logic = Inference + + Control 4.5 PROLOG introduces Control into Deductive Logic 4.6 PROLOG and + Certainty. Is Logic a priori or empirical? Chapter 5: Can there be an Inductive + Logic? 5.1 The Divergence between Deductive and Inductive Logic (up to the + early 1970s) 5.2 Inductive Logic as Inference + Control 5.3 Confirmation Values + as Control in a Deductive Logic 5.4 The Empirical Testing of Rival Logics + Chapter 6: Do Godel''s Incompleteness Theorems place a Limit on Artificial + Intelligence? 6.1 Anxieties caused by Advances in AI 6.2 Informal Exposition + of Godel''s Incompleteness Theorems 6.3 The Lucas Argument 6.4 Objections + to the Lucas Argument: i) Possible Limitations on Self-Knowledge 6.5 Objections + to the Lucas Argument: ii) Possible Additions of Learning Systems 6.6 Why + Advances in Computing are more likely to Stimulate Human Thinking than to + Render it Superfluous Notes References Index", "venue": "", "year": 1996, + "referenceCount": 0, "citationCount": 118, "influentialCitationCount": 6, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144903192", + "name": "D. Gillies"}]}, {"paperId": "ef4579f9ec88af1f234821d94423a3043f1b89b5", "externalIds": {"MAG": "143607683", "DBLP": "journals/eatcs/BlassG03", "DOI": - "10.1515/9783110325461.24", "CorpusId": 9360618}, "url": "https://www.semanticscholar.org/paper/ef4579f9ec88af1f234821d94423a3043f1b89b5", + "10.1515/9783110325461.24", "CorpusId": 9360618}, "corpusId": 9360618, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ef4579f9ec88af1f234821d94423a3043f1b89b5", "title": "Algorithms: A Quest for Absolute Definitions", "abstract": "What is an algorithm? The interest in this foundational problem is not only theoretical; applications include specification, validation and verification of software @@ -15435,15 +17557,16 @@ interactions: of algorithm. We start with the Church-Turing thesis and contrast Church\u2019s and Turing\u2019s approaches, and we finish with some recent investigations.", "venue": "Bull. EATCS", "year": 2003, "referenceCount": 63, "citationCount": - 95, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "Bull. EATCS", - "pages": "195-225", "volume": "81"}, "authors": [{"authorId": "1689667", "name": - "A. Blass"}, {"authorId": "1721396", "name": "Y. Gurevich"}]}, {"paperId": - "8fa8429ffe7db8495c4babdc62566dc76c29f1ac", "externalIds": {"DBLP": "phd/us/Simon75", - "MAG": "1553952730", "CorpusId": 118077321}, "url": "https://www.semanticscholar.org/paper/8fa8429ffe7db8495c4babdc62566dc76c29f1ac", + 95, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Bull. EATCS", "pages": "195-225", "volume": "81"}, + "authors": [{"authorId": "1689667", "name": "A. Blass"}, {"authorId": "1721396", + "name": "Y. Gurevich"}]}, {"paperId": "8fa8429ffe7db8495c4babdc62566dc76c29f1ac", + "externalIds": {"DBLP": "phd/us/Simon75", "MAG": "1553952730", "CorpusId": + 118077321}, "corpusId": 118077321, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8fa8429ffe7db8495c4babdc62566dc76c29f1ac", "title": "On some central problems in computational complexity", "abstract": "In this thesis we examine some of the central problems in the theory of computational complexity, like the trade-offs between time and memory, the power of nondeterminism @@ -15464,13 +17587,15 @@ interactions: nondeterministic time bounded computations with larger and larger bounds. Finally, we discuss some deterministic computations, and conclude with a look at some open problems.", "venue": "", "year": 1975, "referenceCount": 0, "citationCount": - 189, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "143688145", "name": "Janos Simon"}]}, {"paperId": "7f9ca0264225c66f12729d81ce3aacfb86f78db4", - "externalIds": {"MAG": "2183460877", "CorpusId": 123743132}, "url": "https://www.semanticscholar.org/paper/7f9ca0264225c66f12729d81ce3aacfb86f78db4", + 189, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "143688145", "name": "Janos Simon"}]}, + {"paperId": "7f9ca0264225c66f12729d81ce3aacfb86f78db4", "externalIds": {"MAG": + "2183460877", "CorpusId": 123743132}, "corpusId": 123743132, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7f9ca0264225c66f12729d81ce3aacfb86f78db4", "title": "Computation universality of one-dimensional reversible (injective) cellular automata", "abstract": "A reversible cellular automaton (CA) is a \"backward deterministic\" CA, i. e_, every configuration of it has at most @@ -15485,15 +17610,16 @@ interactions: (i. e., injectivity of a local function) is equivalent to the global reversibility, and thus it facilitates to design a reversible CA.", "venue": "", "year": 1989, "referenceCount": 2, "citationCount": 150, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1989-06-25", "journal": {"name": "IEICE Transactions on Fundamentals of Electronics, - Communications and Computer Sciences", "pages": "758-762", "volume": "72"}, - "authors": [{"authorId": "144254676", "name": "K. Morita"}, {"authorId": "2983149", - "name": "M. Harao"}]}, {"paperId": "9e770e5455e6e73eb871da5c4f6b8e039153c006", + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1989-06-25", "journal": {"name": "IEICE Transactions on + Fundamentals of Electronics, Communications and Computer Sciences", "pages": + "758-762", "volume": "72"}, "authors": [{"authorId": "144254676", "name": + "K. Morita"}, {"authorId": "2983149", "name": "M. Harao"}]}, {"paperId": "9e770e5455e6e73eb871da5c4f6b8e039153c006", "externalIds": {"MAG": "2949123768", "ArXiv": "math/9811106", "DOI": "10.2307/3597196", - "CorpusId": 14155715}, "url": "https://www.semanticscholar.org/paper/9e770e5455e6e73eb871da5c4f6b8e039153c006", + "CorpusId": 14155715}, "corpusId": 14155715, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9e770e5455e6e73eb871da5c4f6b8e039153c006", "title": "Isoperimetric functions of groups and computational complexity of the word problem", "abstract": "We prove that the word problem of a finitely generated group G is in NP (solvable in polynomial time by a nondeterministic @@ -15502,6 +17628,7 @@ interactions: in such a way that G has bounded distortion in H. This completes the work started in [6] and [25].", "venue": "", "year": 1998, "referenceCount": 31, "citationCount": 105, "influentialCitationCount": 12, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/math/9811106", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-11-18", "journal": {"name": @@ -15510,17 +17637,55 @@ interactions: "name": "A. Olshanskii"}, {"authorId": "2499056", "name": "E. Rips"}, {"authorId": "1403385288", "name": "M.Sapir"}]}, {"paperId": "ced1af805a9eb48c54f3078c72b36710fa853698", "externalIds": {"MAG": "1604669046", "DBLP": "conf/ab/CardelliZ08", "DOI": - "10.1007/978-3-540-85101-1_6", "CorpusId": 15614348}, "url": "https://www.semanticscholar.org/paper/ced1af805a9eb48c54f3078c72b36710fa853698", + "10.1007/978-3-540-85101-1_6", "CorpusId": 15614348}, "corpusId": 15614348, + "publicationVenue": {"id": "507efd30-febe-4430-bada-57d03c262d41", "name": + "Algebraic Biology", "type": "conference", "alternate_names": ["AB"], "url": + "http://www.wikicfp.com/cfp/program?id=11"}, "url": "https://www.semanticscholar.org/paper/ced1af805a9eb48c54f3078c72b36710fa853698", "title": "On the Computational Power of Biochemistry", "abstract": null, "venue": "Algebraic Biology", "year": 2008, "referenceCount": 31, "citationCount": - 57, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-07-31", "journal": - {"pages": "65-80"}, "authors": [{"authorId": "145457097", "name": "L. Cardelli"}, - {"authorId": "1777352", "name": "G. Zavattaro"}]}, {"paperId": "242d7edee503e27a7236a4c7737c314712c3fbdd", - "externalIds": {"DBLP": "conf/focs/LewisSH65", "MAG": "2532500577", "DOI": - "10.1109/FOCS.1965.14", "CorpusId": 21196496}, "url": "https://www.semanticscholar.org/paper/242d7edee503e27a7236a4c7737c314712c3fbdd", + 57, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.risc.uni-linz.ac.at/about/conferences/ab2008/prelim/51470066.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-07-31", "journal": {"pages": "65-80"}, "authors": + [{"authorId": "145457097", "name": "L. Cardelli"}, {"authorId": "1777352", + "name": "G. Zavattaro"}]}, {"paperId": "f9029f549b7cfd05f2f5dc2c1ae679f3080bba72", + "externalIds": {"MAG": "1970563444", "DOI": "10.1073/pnas.2534816100", "CorpusId": + 9699670}, "corpusId": 9699670, "publicationVenue": {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", + "name": "Proceedings of the National Academy of Sciences of the United States + of America", "type": "journal", "alternate_names": ["Proc National Acad Sci + u s Am"], "issn": "0027-8424", "url": "https://www.jstor.org/journal/procnatiacadscie", + "alternate_urls": ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", + "http://www.pnas.org/"]}, "url": "https://www.semanticscholar.org/paper/f9029f549b7cfd05f2f5dc2c1ae679f3080bba72", + "title": "Segmented spiral waves in a reaction-diffusion system", "abstract": + "Pattern formation in reaction-diffusion systems is often invoked as a mechanism + for biological morphogenesis. Patterns in chemical systems typically occur + either as propagating waves or as stationary, spatially periodic, Turing structures. + The spiral and concentric (target) waves found to date in spatially extended + chemical or physical systems are smooth and continuous; only living systems, + such as seashells, lichens, pine cones, or flowers, have been shown to demonstrate + segmentation of these patterns. Here, we report observations of segmented + spiral and target waves in the Belousov\u2013Zhabotinsky reaction dispersed + in water nanodroplets of a water-in-oil microemulsion. These highly ordered + chemical patterns, consisting of short wave segments regularly separated by + gaps, form a link between Turing and trigger wave patterns and narrow the + disparity between chemistry and biology. They exhibit aspects of such fundamental + biological behavior as self-replication of structural elements and preservation + of morphology during evolutionary development from a simpler precursor to + a more complex structure.", "venue": "Proceedings of the National Academy + of Sciences of the United States of America", "year": 2003, "referenceCount": + 22, "citationCount": 101, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.pnas.org/content/100/25/14635.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2003-11-26", "journal": {"name": + "Proceedings of the National Academy of Sciences of the United States of America", + "pages": "14635 - 14638", "volume": "100"}, "authors": [{"authorId": "2258489", + "name": "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": + "242d7edee503e27a7236a4c7737c314712c3fbdd", "externalIds": {"DBLP": "conf/focs/LewisSH65", + "MAG": "2532500577", "DOI": "10.1109/FOCS.1965.14", "CorpusId": 21196496}, + "corpusId": 21196496, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/242d7edee503e27a7236a4c7737c314712c3fbdd", "title": "Memory bounds for recognition of context-free and context-sensitive languages", "abstract": "This paper investigates the computational complexity of binary sequences as measured by the rapidity of their generation by multitape @@ -15529,27 +17694,27 @@ interactions: The previous complexity classes are shown to possess certain translational properties. An related hierarchy of complexity classes of monotonic functions is examined", "venue": "SWCT", "year": 1965, "referenceCount": 4, "citationCount": - 213, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1965-10-06", "journal": {"pages": - "191-202"}, "authors": [{"authorId": "147812033", "name": "P. M. Lewis"}, - {"authorId": "2520473", "name": "R. Stearns"}, {"authorId": "1747181", "name": - "J. Hartmanis"}]}, {"paperId": "57995c8ad6b6eb17a0b457045572f3d2c376d2ac", + 213, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1965-10-06", "journal": + {"pages": "191-202"}, "authors": [{"authorId": "147812033", "name": "P. M. + Lewis"}, {"authorId": "2520473", "name": "R. Stearns"}, {"authorId": "1747181", + "name": "J. Hartmanis"}]}, {"paperId": "57995c8ad6b6eb17a0b457045572f3d2c376d2ac", "externalIds": {"MAG": "2111376735", "DOI": "10.1112/jlms/jdp049", "CorpusId": - 41621025}, "url": "https://www.semanticscholar.org/paper/57995c8ad6b6eb17a0b457045572f3d2c376d2ac", + 41621025}, "corpusId": 41621025, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/57995c8ad6b6eb17a0b457045572f3d2c376d2ac", "title": "A fixed\u2010point\u2010free minimal degree", "abstract": "We show that there exists a Turing degree that is minimal and fixed\u2010point\u2010free.", "venue": "", "year": 2009, "referenceCount": 11, "citationCount": 41, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-12-01", - "journal": {"name": "Journal of the London Mathematical Society", "volume": - "80"}, "authors": [{"authorId": "1682134", "name": "Masahiro Kumabe"}, {"authorId": - "145421803", "name": "A. Lewis"}]}, {"paperId": "db2e35bb875bce89474e60e814881dff30fb3228", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2009-12-01", "journal": {"name": "Journal of the London Mathematical Society", + "volume": "80"}, "authors": [{"authorId": "1682134", "name": "Masahiro Kumabe"}, + {"authorId": "145421803", "name": "A. Lewis"}]}, {"paperId": "db2e35bb875bce89474e60e814881dff30fb3228", "externalIds": {"MAG": "2054935170", "DOI": "10.1093/MIND/XCIX.393.53", "CorpusId": - 38063853}, "url": "https://www.semanticscholar.org/paper/db2e35bb875bce89474e60e814881dff30fb3228", + 38063853}, "corpusId": 38063853, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/db2e35bb875bce89474e60e814881dff30fb3228", "title": "Subcognition and the Limits of the TuringTest", "abstract": "Alan Turing, in his original article'' about an imitation-game definition of intelligence, seems to be making two separate claims. The first, the philosophical claim, @@ -15579,13 +17744,13 @@ interactions: that have experienced the world as we have experienced it, and this leads to the central point of the present paper,", "venue": "", "year": 1990, "referenceCount": 4, "citationCount": 129, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Mind", - "pages": "53-65", "volume": "99"}, "authors": [{"authorId": "2440747", "name": - "R. French"}]}, {"paperId": "bf4efeb5257695c6d859611a643a94d38ebb2f79", "externalIds": - {"MAG": "2169349244", "DOI": "10.1002/PROP.2190371104", "CorpusId": 85658074}, - "url": "https://www.semanticscholar.org/paper/bf4efeb5257695c6d859611a643a94d38ebb2f79", + "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": + [{"category": "Philosophy", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Mind", "pages": "53-65", "volume": "99"}, "authors": + [{"authorId": "2440747", "name": "R. French"}]}, {"paperId": "bf4efeb5257695c6d859611a643a94d38ebb2f79", + "externalIds": {"MAG": "2169349244", "DOI": "10.1002/PROP.2190371104", "CorpusId": + 85658074}, "corpusId": 85658074, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf4efeb5257695c6d859611a643a94d38ebb2f79", "title": "The Physical Basis of Morphogenesis", "abstract": "A general review is presented of some of the approaches to the general problem of morphogenesis which originate either directly or indirectly in the work of Turing. The main @@ -15593,27 +17758,31 @@ interactions: discussion on the applicability to biological systems of the concepts and techniques of field theory.", "venue": "", "year": 1989, "referenceCount": 17, "citationCount": 109, "influentialCitationCount": 23, "isOpenAccess": - false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": - "Protein Science", "pages": "857-877", "volume": "37"}, "authors": [{"authorId": - "12026057", "name": "I. Doroban\u0163u"}, {"authorId": "92397394", "name": - "M. Visinescu"}]}, {"paperId": "05114e4012724080ac323c90664e3abf7c796000", - "externalIds": {"MAG": "1595768576", "CorpusId": 60713475}, "url": "https://www.semanticscholar.org/paper/05114e4012724080ac323c90664e3abf7c796000", + false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Geology", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, + "journal": {"name": "Protein Science", "pages": "857-877", "volume": "37"}, + "authors": [{"authorId": "12026057", "name": "I. Doroban\u0163u"}, {"authorId": + "92397394", "name": "M. Visinescu"}]}, {"paperId": "05114e4012724080ac323c90664e3abf7c796000", + "externalIds": {"MAG": "1595768576", "CorpusId": 60713475}, "corpusId": 60713475, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05114e4012724080ac323c90664e3abf7c796000", "title": "Computers, Minds and Conduct", "abstract": "From the Publisher: \nThis book provides a sustained and penetrating critique of a wide range view in modern cognitive science and the philosophy of mind, from Turing''s famous test for intelligence in machines to recent work in computational linguistic theory.", "venue": "", "year": 1995, "referenceCount": 0, "citationCount": - 123, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1995-11-15", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "145218181", "name": "G. Button"}, {"authorId": "2108487432", - "name": "John R. E. Lee"}, {"authorId": "31352018", "name": "J. Coulter"}, - {"authorId": "143882558", "name": "W. Sharrock"}]}, {"paperId": "ee745da17043fbde6cec81dd0c7e4bf7b78c2c16", - "externalIds": {"DBLP": "conf/stoc/Cook79", "MAG": "2081926325", "DOI": "10.1145/800135.804426", - "CorpusId": 20043831}, "url": "https://www.semanticscholar.org/paper/ee745da17043fbde6cec81dd0c7e4bf7b78c2c16", + 123, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1995-11-15", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "145218181", "name": "G. Button"}, + {"authorId": "2108487432", "name": "John R. E. Lee"}, {"authorId": "31352018", + "name": "J. Coulter"}, {"authorId": "143882558", "name": "W. Sharrock"}]}, + {"paperId": "ee745da17043fbde6cec81dd0c7e4bf7b78c2c16", "externalIds": {"DBLP": + "conf/stoc/Cook79", "MAG": "2081926325", "DOI": "10.1145/800135.804426", "CorpusId": + 20043831}, "corpusId": 20043831, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/ee745da17043fbde6cec81dd0c7e4bf7b78c2c16", "title": "Deterministic CFL''s are accepted simultaneously in polynomial time and log squared space", "abstract": "We propose to prove the theorem in the title. Let PLOSS be the class of sets recognizable on a deterministic Turing @@ -15621,88 +17790,31 @@ interactions: notation of Bruss and Meyer [1], PLOSS = &ugr;k TISP(nk,k log2n).", "venue": "Symposium on the Theory of Computing", "year": 1979, "referenceCount": 5, "citationCount": 130, "influentialCitationCount": 14, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["Book", "JournalArticle", "Conference"], "publicationDate": "1979-04-30", - "journal": {"name": "Proceedings of the eleventh annual ACM symposium on Theory - of computing"}, "authors": [{"authorId": "1765456", "name": "S. Cook"}]}, - {"paperId": "272769880e1eaf93318a56b5b8a6ed7bedea4a1b", "externalIds": {"ArXiv": - "quant-ph/0110136", "DBLP": "journals/corr/quant-ph-0110136", "MAG": "2089555907", - "DOI": "10.1023/A:1025780028846", "CorpusId": 6634980}, "url": "https://www.semanticscholar.org/paper/272769880e1eaf93318a56b5b8a6ed7bedea4a1b", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "1979-04-30", "journal": {"name": "Proceedings + of the eleventh annual ACM symposium on Theory of computing"}, "authors": + [{"authorId": "1765456", "name": "S. Cook"}]}, {"paperId": "272769880e1eaf93318a56b5b8a6ed7bedea4a1b", + "externalIds": {"ArXiv": "quant-ph/0110136", "DBLP": "journals/corr/quant-ph-0110136", + "MAG": "2089555907", "DOI": "10.1023/A:1025780028846", "CorpusId": 6634980}, + "corpusId": 6634980, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/272769880e1eaf93318a56b5b8a6ed7bedea4a1b", "title": "Quantum Algorithm for Hilbert''s Tenth Problem", "abstract": null, "venue": "ArXiv", "year": 2001, "referenceCount": 38, "citationCount": 98, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-10-23", "journal": {"name": "International Journal of Theoretical Physics", - "pages": "1461-1478", "volume": "42"}, "authors": [{"authorId": "2063540", - "name": "T. Kieu"}]}, {"paperId": "f9029f549b7cfd05f2f5dc2c1ae679f3080bba72", - "externalIds": {"MAG": "1970563444", "DOI": "10.1073/pnas.2534816100", "CorpusId": - 9699670}, "url": "https://www.semanticscholar.org/paper/f9029f549b7cfd05f2f5dc2c1ae679f3080bba72", - "title": "Segmented spiral waves in a reaction-diffusion system", "abstract": - "Pattern formation in reaction-diffusion systems is often invoked as a mechanism - for biological morphogenesis. Patterns in chemical systems typically occur - either as propagating waves or as stationary, spatially periodic, Turing structures. - The spiral and concentric (target) waves found to date in spatially extended - chemical or physical systems are smooth and continuous; only living systems, - such as seashells, lichens, pine cones, or flowers, have been shown to demonstrate - segmentation of these patterns. Here, we report observations of segmented - spiral and target waves in the Belousov\u2013Zhabotinsky reaction dispersed - in water nanodroplets of a water-in-oil microemulsion. These highly ordered - chemical patterns, consisting of short wave segments regularly separated by - gaps, form a link between Turing and trigger wave patterns and narrow the - disparity between chemistry and biology. They exhibit aspects of such fundamental - biological behavior as self-replication of structural elements and preservation - of morphology during evolutionary development from a simpler precursor to - a more complex structure.", "venue": "Proceedings of the National Academy - of Sciences of the United States of America", "year": 2003, "referenceCount": - 22, "citationCount": 100, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-11-26", "journal": {"name": - "Proceedings of the National Academy of Sciences of the United States of America", - "pages": "14635 - 14638", "volume": "100"}, "authors": [{"authorId": "2258489", - "name": "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": - "a62da7cf6b29179d8fcc1dfd4b751b2e44fb8d30", "externalIds": {"MAG": "105184356", - "DOI": "10.5860/choice.34-5726", "CorpusId": 15056286}, "url": "https://www.semanticscholar.org/paper/a62da7cf6b29179d8fcc1dfd4b751b2e44fb8d30", - "title": "Artificial intelligence and scientific method", "abstract": "Preface - Acknowledgements Chapter 1: The Inductivist Controversy, or Bacon versus Popper - 1.1 Bacon''s Inductivism 1.2 Popper''s Falsificationism 1.3 Kepler''s Discovery - of the Laws of Planetary Motion 1.4 The Discovery of the Sulphonamide Drugs - Chapter 2: Machine Learning in the Turing Tradition 2.1 The Turing Tradition - 2.2 The Practical Problem: Expert Systems and Feigenbaum''s Bottleneck 2.3 - Attribute-based Learning, Decision Trees, and Quinlan''s ID3 2.4 GOLEM as - an example of Relational Learning 2.5 Bratko''s summary of the successes of - Machine Learning in the Turing Tradition, 1992 2.6 GOLEM''s Discovery of a - Law of Nature Chapter 3: How Advances in Machine Learning affect the Inductivist - Controversy 3.1 Bacon''s Example of Heat 3.2 The Importance of Falsification - 3.3 Bacon''s Method has only recently come to be used 3.4 The Need for Background - Knowledge Chapter 4: Logic and Programming and a New Framework for Logic 4.1 - The Development of PROLOG 4.2 PROLOG as a Non-Monotonic Logic 4.3 Two Examples - of Translations from One Logical System to Another 4.4 Logic = Inference + - Control 4.5 PROLOG introduces Control into Deductive Logic 4.6 PROLOG and - Certainty. Is Logic a priori or empirical? Chapter 5: Can there be an Inductive - Logic? 5.1 The Divergence between Deductive and Inductive Logic (up to the - early 1970s) 5.2 Inductive Logic as Inference + Control 5.3 Confirmation Values - as Control in a Deductive Logic 5.4 The Empirical Testing of Rival Logics - Chapter 6: Do Godel''s Incompleteness Theorems place a Limit on Artificial - Intelligence? 6.1 Anxieties caused by Advances in AI 6.2 Informal Exposition - of Godel''s Incompleteness Theorems 6.3 The Lucas Argument 6.4 Objections - to the Lucas Argument: i) Possible Limitations on Self-Knowledge 6.5 Objections - to the Lucas Argument: ii) Possible Additions of Learning Systems 6.6 Why - Advances in Computing are more likely to Stimulate Human Thinking than to - Render it Superfluous Notes References Index", "venue": "", "year": 1996, - "referenceCount": 0, "citationCount": 115, "influentialCitationCount": 5, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144903192", - "name": "D. Gillies"}]}, {"paperId": "f9718b4fcd627831c0d92284ac1ebb9ffca060ff", + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-10-23", "journal": {"name": "International Journal + of Theoretical Physics", "pages": "1461-1478", "volume": "42"}, "authors": + [{"authorId": "2063540", "name": "T. Kieu"}]}, {"paperId": "f9718b4fcd627831c0d92284ac1ebb9ffca060ff", "externalIds": {"MAG": "1993695344", "DBLP": "conf/stoc/KfouryTU90", "DOI": - "10.1145/100216.100279", "CorpusId": 6436309}, "url": "https://www.semanticscholar.org/paper/f9718b4fcd627831c0d92284ac1ebb9ffca060ff", + "10.1145/100216.100279", "CorpusId": 6436309}, "corpusId": 6436309, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/f9718b4fcd627831c0d92284ac1ebb9ffca060ff", "title": "The undecidability of the semi-unification problem", "abstract": "Abstract The Semi-Unification Problem (SUP) is a natural generalization of both first-order unification and matching. The problem arises in various branches @@ -15713,16 +17825,22 @@ interactions: problem is established by a technique developed in the mid-1960s to prove related results about Turing machines", "venue": "Symposium on the Theory of Computing", "year": 1990, "referenceCount": 19, "citationCount": 123, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1990-04-01", "journal": {"name": "Inf. Comput.", "pages": "83-101", "volume": - "102"}, "authors": [{"authorId": "2712330", "name": "A. Kfoury"}, {"authorId": - "1695546", "name": "J. Tiuryn"}, {"authorId": "3349502", "name": "P. Urzyczyn"}]}, - {"paperId": "677c32787b098dcb0e452cc5286ec84105b58294", "externalIds": {"DBLP": - "journals/iandc/BusiGZ00", "MAG": "2040821818", "DOI": "10.1006/inco.1999.2823", - "CorpusId": 14386387}, "url": "https://www.semanticscholar.org/paper/677c32787b098dcb0e452cc5286ec84105b58294", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1990-04-01", "journal": {"name": "Inf. Comput.", "pages": + "83-101", "volume": "102"}, "authors": [{"authorId": "2712330", "name": "A. + Kfoury"}, {"authorId": "1695546", "name": "J. Tiuryn"}, {"authorId": "3349502", + "name": "P. Urzyczyn"}]}, {"paperId": "677c32787b098dcb0e452cc5286ec84105b58294", + "externalIds": {"DBLP": "journals/iandc/BusiGZ00", "MAG": "2040821818", "DOI": + "10.1006/inco.1999.2823", "CorpusId": 14386387}, "corpusId": 14386387, "publicationVenue": + {"id": "d8fc27e3-52dd-4758-bc70-1983b8a26797", "name": "Information and Computation", + "type": "journal", "alternate_names": ["Inf Comput", "Information & Computation", + "Inf Comput"], "issn": "0890-5401", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/622844/description#description", + "alternate_urls": ["http://www.idealibrary.com/links/toc/inco", "http://iandc.csail.mit.edu/", + "http://www.sciencedirect.com/science/journal/08905401", "https://www.journals.elsevier.com/information-and-computation/"]}, + "url": "https://www.semanticscholar.org/paper/677c32787b098dcb0e452cc5286ec84105b58294", "title": "On the Expressiveness of Linda Coordination Primitives", "abstract": "We introduce a process algebra containing the coordination primitives of Linda (asynchronous communication via a shared data space, read operation, @@ -15738,15 +17856,21 @@ interactions: showing that there exists a deadlock-preserving simulation of such nets by finite P/T nets, a formalism where termination is decidable.", "venue": "Information and Computation", "year": 2000, "referenceCount": 33, "citationCount": 90, - "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-01-29", "journal": - {"name": "Inf. Comput.", "pages": "90-121", "volume": "156"}, "authors": [{"authorId": - "1789091", "name": "N. Busi"}, {"authorId": "1743074", "name": "R. Gorrieri"}, - {"authorId": "1777352", "name": "G. Zavattaro"}]}, {"paperId": "c0dbe69f523366ef1451e64e0efa0933bf246edf", - "externalIds": {"DBLP": "journals/informs/SavageSY05", "MAG": "2109973477", - "DOI": "10.1287/ijoc.1030.0053", "CorpusId": 207224459}, "url": "https://www.semanticscholar.org/paper/c0dbe69f523366ef1451e64e0efa0933bf246edf", + "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-01-29", "journal": {"name": "Inf. Comput.", "pages": "90-121", "volume": + "156"}, "authors": [{"authorId": "1789091", "name": "N. Busi"}, {"authorId": + "1743074", "name": "R. Gorrieri"}, {"authorId": "1777352", "name": "G. Zavattaro"}]}, + {"paperId": "c0dbe69f523366ef1451e64e0efa0933bf246edf", "externalIds": {"DBLP": + "journals/informs/SavageSY05", "MAG": "2109973477", "DOI": "10.1287/ijoc.1030.0053", + "CorpusId": 207224459}, "corpusId": 207224459, "publicationVenue": {"id": + "b76a26bb-18f2-4155-bb35-7e7de85d01bb", "name": "INFORMS journal on computing", + "type": "journal", "alternate_names": ["INFORMS j comput", "Informs J Comput", + "Informs Journal on Computing"], "issn": "1091-9856", "url": "https://www.informs.org/", + "alternate_urls": ["http://joc.pubs.informs.org/BackIssues.html"]}, "url": + "https://www.semanticscholar.org/paper/c0dbe69f523366ef1451e64e0efa0933bf246edf", "title": "On the Generality of Event-Graph Models", "abstract": "Event graphs model the dynamics of a discrete-event simulation model. This paper demonstrates the modeling power of event graphs by presenting a model that simulates a @@ -15755,15 +17879,16 @@ interactions: Theoretical and practical implications of this assertion are also discussed.", "venue": "INFORMS journal on computing", "year": 2005, "referenceCount": 27, "citationCount": 67, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "INFORMS J. Comput.", "pages": "3-9", "volume": - "17"}, "authors": [{"authorId": "31756758", "name": "E. L. Savage"}, {"authorId": - "2813182", "name": "L. Schruben"}, {"authorId": "3091207", "name": "E. Y\u00fccesan"}]}, - {"paperId": "279a03ac78998e9ae851bedc79877e6aee894012", "externalIds": {"MAG": - "2057638793", "DBLP": "journals/jacm/DworkS92", "DOI": "10.1145/146585.146599", - "CorpusId": 18649585}, "url": "https://www.semanticscholar.org/paper/279a03ac78998e9ae851bedc79877e6aee894012", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "INFORMS J. Comput.", "pages": + "3-9", "volume": "17"}, "authors": [{"authorId": "31756758", "name": "E. L. + Savage"}, {"authorId": "2813182", "name": "L. Schruben"}, {"authorId": "3091207", + "name": "E. Y\u00fccesan"}]}, {"paperId": "279a03ac78998e9ae851bedc79877e6aee894012", + "externalIds": {"MAG": "2057638793", "DBLP": "journals/jacm/DworkS92", "DOI": + "10.1145/146585.146599", "CorpusId": 18649585}, "corpusId": 18649585, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/279a03ac78998e9ae851bedc79877e6aee894012", "title": "Finite state verifiers I: the power of interaction", "abstract": "An investigation of interactive proof systems (IPSs) where the verifier is a 2-way probabilistic finite state automaton (2pfa) is initiated. In this @@ -15778,36 +17903,20 @@ interactions: time. In particular, IPSs with verifiers in the latter class are as powerful as IPSs where verifiers are polynomial-time probabilistic Turing machines. In a companion paper [7], zero knowledge IPSs with 2pfa verifiers are investigated.", - "venue": "JACM", "year": 1992, "referenceCount": 30, "citationCount": 104, - "influentialCitationCount": 19, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1992-10-01", "journal": - {"name": "J. ACM", "pages": "800-828", "volume": "39"}, "authors": [{"authorId": - "1781565", "name": "C. Dwork"}, {"authorId": "1678332", "name": "L. Stockmeyer"}]}, - {"paperId": "d99f430ccd996e3fb2312421ae5cbc919dca0eb1", "externalIds": {"DBLP": - "conf/focs/SkyumV81", "MAG": "2089857781", "DOI": "10.1145/3149.3158", "CorpusId": - 10950623}, "url": "https://www.semanticscholar.org/paper/d99f430ccd996e3fb2312421ae5cbc919dca0eb1", - "title": "A complexity theory based on Boolean algebra", "abstract": "A projection - of a Boolean function is a function obtained by substituting for each of its - variables a variable, the negation of a variable, or a constant. Reducibilities - among computational problems under this relation of projection are considered. - It is shown that much of what is of everyday relevance in Turing-machine-based - complexity theory can be replicated easily and naturally in this elementary - framework. Finer distinctions about the computational relationships among - natural problems can be made than in previous formulations and some negative - results are proved.", "venue": "22nd Annual Symposium on Foundations of Computer - Science (sfcs 1981)", "year": 1981, "referenceCount": 27, "citationCount": - 140, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1981-10-28", "journal": {"name": "22nd - Annual Symposium on Foundations of Computer Science (sfcs 1981)", "pages": - "244-253"}, "authors": [{"authorId": "2131506", "name": "Sven Skyum"}, {"authorId": - "1741124", "name": "L. Valiant"}]}, {"paperId": "1a60ecce6e960fd37c94be070cb45a5389c39525", + "venue": "JACM", "year": 1992, "referenceCount": 30, "citationCount": 105, + "influentialCitationCount": 19, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1992-10-01", "journal": {"name": "J. ACM", "pages": "800-828", "volume": + "39"}, "authors": [{"authorId": "1781565", "name": "C. Dwork"}, {"authorId": + "1678332", "name": "L. Stockmeyer"}]}, {"paperId": "1a60ecce6e960fd37c94be070cb45a5389c39525", "externalIds": {"DBLP": "journals/siamcomp/Greibach73", "MAG": "1996878052", - "DOI": "10.1137/0202025", "CorpusId": 38360964}, "url": "https://www.semanticscholar.org/paper/1a60ecce6e960fd37c94be070cb45a5389c39525", + "DOI": "10.1137/0202025", "CorpusId": 38360964}, "corpusId": 38360964, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/1a60ecce6e960fd37c94be070cb45a5389c39525", "title": "The Hardest Context-Free Language", "abstract": "There is a context-free language $L_0 $ such that every context-free language is an inverse homomorphic image of $L_0 $ or $L_0 - \\{ e\\} $. Hence the time complexity of recognition @@ -15817,15 +17926,40 @@ interactions: time acceptance are equivalent if and only if any one of them is deterministic polynomial time acceptable.", "venue": "SIAM journal on computing (Print)", "year": 1973, "referenceCount": 0, "citationCount": 169, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1973-12-01", "journal": {"name": "SIAM J. Comput.", "pages": "304-310", "volume": - "2"}, "authors": [{"authorId": "2408866", "name": "S. Greibach"}]}, {"paperId": - "d6a1485566eb2340d4428f896f3bb9643597d010", "externalIds": {"MAG": "2004491847", - "DOI": "10.1103/PHYSREVLETT.70.778", "CorpusId": 32378130, "PubMed": "10054201"}, - "url": "https://www.semanticscholar.org/paper/d6a1485566eb2340d4428f896f3bb9643597d010", + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1973-12-01", "journal": {"name": "SIAM J. Comput.", "pages": + "304-310", "volume": "2"}, "authors": [{"authorId": "2408866", "name": "S. + Greibach"}]}, {"paperId": "d99f430ccd996e3fb2312421ae5cbc919dca0eb1", "externalIds": + {"DBLP": "conf/focs/SkyumV81", "MAG": "2089857781", "DOI": "10.1145/3149.3158", + "CorpusId": 10950623}, "corpusId": 10950623, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d99f430ccd996e3fb2312421ae5cbc919dca0eb1", + "title": "A complexity theory based on Boolean algebra", "abstract": "A projection + of a Boolean function is a function obtained by substituting for each of its + variables a variable, the negation of a variable, or a constant. Reducibilities + among computational problems under this relation of projection are considered. + It is shown that much of what is of everyday relevance in Turing-machine-based + complexity theory can be replicated easily and naturally in this elementary + framework. Finer distinctions about the computational relationships among + natural problems can be made than in previous formulations and some negative + results are proved.", "venue": "22nd Annual Symposium on Foundations of Computer + Science (sfcs 1981)", "year": 1981, "referenceCount": 27, "citationCount": + 140, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1981-10-28", "journal": + {"name": "22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)", + "pages": "244-253"}, "authors": [{"authorId": "2131506", "name": "Sven Skyum"}, + {"authorId": "1741124", "name": "L. Valiant"}]}, {"paperId": "d6a1485566eb2340d4428f896f3bb9643597d010", + "externalIds": {"MAG": "2004491847", "DOI": "10.1103/PHYSREVLETT.70.778", + "CorpusId": 32378130, "PubMed": "10054201"}, "corpusId": 32378130, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/d6a1485566eb2340d4428f896f3bb9643597d010", "title": "Self-organization induced by the differential flow of activator and inhibitor.", "abstract": "We have experimentally verified the prediction that a homogeneous steady state of an activatorinhibitor system can be destabilised @@ -15838,27 +17972,34 @@ interactions: can thus be expected to operate in a larger class of chemical, physical, and biological systems", "venue": "Physical Review Letters", "year": 1993, "referenceCount": 0, "citationCount": 128, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-02-08", "journal": {"name": "Physical review letters", - "pages": "\n 778-781\n ", "volume": "70 6"}, "authors": [{"authorId": - "30145492", "name": "Rovinsky"}, {"authorId": "121778916", "name": "Menzinger"}]}, - {"paperId": "73041744d949804c5b770a540879fcbf230d7c82", "externalIds": {"MAG": - "1484522079", "DOI": "10.2307/3615866", "CorpusId": 60778395}, "url": "https://www.semanticscholar.org/paper/73041744d949804c5b770a540879fcbf230d7c82", + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1993-02-08", "journal": {"name": "Physical + review letters", "pages": "\n 778-781\n ", "volume": "70 6"}, + "authors": [{"authorId": "30145492", "name": "Rovinsky"}, {"authorId": "121778916", + "name": "Menzinger"}]}, {"paperId": "73041744d949804c5b770a540879fcbf230d7c82", + "externalIds": {"MAG": "1484522079", "DOI": "10.2307/3615866", "CorpusId": + 60778395}, "corpusId": 60778395, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/73041744d949804c5b770a540879fcbf230d7c82", "title": "Computation and Automata", "abstract": "Editor''s statement Foreword G. Rozenberg Acknowledgements 1. Introduction: models of computation 2. Rudiments of language theory 3. Restricted automata 4. Turing machines and recursive functions 5. Famous decision problems 6. Computational complexity 7. Cryptography 8. Trends in automata and language theory Historical and bibliographical remarks", "venue": "", "year": 1984, "referenceCount": 0, "citationCount": 140, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1984-06-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1739643", "name": "A. Salomaa"}]}, {"paperId": "5a49e6406231aa099a695a90d82e8b003e7d4288", - "externalIds": {"MAG": "2026367516", "DOI": "10.1093/bjps/55.4.681", "CorpusId": - 121774588}, "url": "https://www.semanticscholar.org/paper/5a49e6406231aa099a695a90d82e8b003e7d4288", + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1984-06-01", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "1739643", "name": "A. Salomaa"}]}, + {"paperId": "5a49e6406231aa099a695a90d82e8b003e7d4288", "externalIds": {"MAG": + "2026367516", "DOI": "10.1093/bjps/55.4.681", "CorpusId": 121774588}, "corpusId": + 121774588, "publicationVenue": {"id": "ccf23a34-337a-4763-916a-9c16c580e0e1", + "name": "British Journal for the Philosophy of Science", "type": "journal", + "alternate_names": ["Br J Philos Sci", "The British Journal for the Philosophy + of Science"], "issn": "0007-0882", "url": "https://www.journals.uchicago.edu/toc/bjps/current", + "alternate_urls": ["https://www.jstor.org/journal/britjphilscie", "http://bjps.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/5a49e6406231aa099a695a90d82e8b003e7d4288", "title": "Deciding Arithmetic Using SAD Computers", "abstract": "Presented here is a new result concerning the computational power of so-called SADn computers, a class of Turing-machine-based computers that can perform some @@ -15870,28 +18011,54 @@ interactions: concept of computability Introduction Axiomatising computers The power of SAD computers Remarks regarding the concept of computability", "venue": "British Journal for the Philosophy of Science", "year": 2004, "referenceCount": 10, - "citationCount": 72, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-12-01", "journal": {"name": - "The British Journal for the Philosophy of Science", "pages": "681 - 691", - "volume": "55"}, "authors": [{"authorId": "37952418", "name": "M. Hogarth"}]}, - {"paperId": "7d607b885bf454001f9e76d6a4ea2849ae4a4955", "externalIds": {"MAG": - "2058241424", "DBLP": "journals/ijac/McKenzie96b", "DOI": "10.1142/S0218196796000040", - "CorpusId": 207134262}, "url": "https://www.semanticscholar.org/paper/7d607b885bf454001f9e76d6a4ea2849ae4a4955", + "citationCount": 74, "influentialCitationCount": 8, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-12-01", "journal": {"name": "The British Journal for the Philosophy + of Science", "pages": "681 - 691", "volume": "55"}, "authors": [{"authorId": + "37952418", "name": "M. Hogarth"}]}, {"paperId": "7d607b885bf454001f9e76d6a4ea2849ae4a4955", + "externalIds": {"MAG": "2058241424", "DBLP": "journals/ijac/McKenzie96b", + "DOI": "10.1142/S0218196796000040", "CorpusId": 207134262}, "corpusId": 207134262, + "publicationVenue": {"id": "810c01e7-7569-4a8c-8bb0-720d2d690e15", "name": + "International journal of algebra and computation", "type": "journal", "alternate_names": + ["Int J Algebra Comput", "Int j algebra comput", "International Journal of + Algebra and Computation"], "issn": "0218-1967", "url": "http://www.worldscinet.com/ijac/ijac.shtml"}, + "url": "https://www.semanticscholar.org/paper/7d607b885bf454001f9e76d6a4ea2849ae4a4955", "title": "Tarski''s Finite Basis Problem is Undecidable", "abstract": "We exhibit a construction which produces for every Turing machine , an algebra (finite and of finite type) such that the Turing machine halts iff the algebra has a finite basis for its equations.", "venue": "International journal of algebra and computation", "year": 1996, "referenceCount": 0, "citationCount": - 103, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-02-01", "journal": {"name": "Int. - J. Algebra Comput.", "pages": "49-104", "volume": "6"}, "authors": [{"authorId": - "50877492", "name": "R. McKenzie"}]}, {"paperId": "00885d8ceea8d5254cf6b46b67f7f6910200b38c", - "externalIds": {"MAG": "1583398797", "CorpusId": 142923226}, "url": "https://www.semanticscholar.org/paper/00885d8ceea8d5254cf6b46b67f7f6910200b38c", + 104, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-02-01", "journal": + {"name": "Int. J. Algebra Comput.", "pages": "49-104", "volume": "6"}, "authors": + [{"authorId": "50877492", "name": "R. McKenzie"}]}, {"paperId": "5cfdf55865c2f405ef803d00c82d3652784bde35", + "externalIds": {"MAG": "2123514264", "DOI": "10.1103/PHYSREVLETT.92.128301", + "CorpusId": 7385229, "PubMed": "15089714"}, "corpusId": 7385229, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/5cfdf55865c2f405ef803d00c82d3652784bde35", + "title": "Stationary and oscillatory localized patterns, and subcritical bifurcations.", + "abstract": "Stationary and oscillatory localized patterns (oscillons) are + found in the Belousov-Zhabotinsky reaction dispersed in Aerosol OT water-in-oil + microemulsion. The experimental findings are analyzed in terms of subcritical + Hopf instability, subcritical Turing instability, and their combination.", + "venue": "Physical Review Letters", "year": 2004, "referenceCount": 68, "citationCount": + 83, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2004-03-24", "journal": {"name": "Physical review letters", + "pages": "\n 128301\n ", "volume": "92 12"}, "authors": [{"authorId": + "2258489", "name": "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, + {"paperId": "00885d8ceea8d5254cf6b46b67f7f6910200b38c", "externalIds": {"MAG": + "1583398797", "CorpusId": 142923226}, "corpusId": 142923226, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/00885d8ceea8d5254cf6b46b67f7f6910200b38c", "title": "Consciousness: An Afterthought", "abstract": "ABSTRACT: Our sense that we do something deliberately may be an afterthought that arises after our brains have already triggered our action unconsciously. Consciousness @@ -15899,14 +18066,21 @@ interactions: In any case, Methodological epiphenomenalism, together with the Turing Test, seem to be be the best strategy for cognitive modelling.", "venue": "", "year": 1982, "referenceCount": 0, "citationCount": 168, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "2293327", "name": "S. Harnad"}]}, - {"paperId": "4a433e912f48865d068fc00eabb284776a80b76a", "externalIds": {"MAG": - "2127076297", "DOI": "10.1098/rspa.2008.0085", "CorpusId": 13253732}, "url": - "https://www.semanticscholar.org/paper/4a433e912f48865d068fc00eabb284776a80b76a", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "2293327", "name": "S. + Harnad"}]}, {"paperId": "4a433e912f48865d068fc00eabb284776a80b76a", "externalIds": + {"MAG": "2127076297", "DOI": "10.1098/rspa.2008.0085", "CorpusId": 13253732}, + "corpusId": 13253732, "publicationVenue": {"id": "b61ce141-a434-431b-a154-68fc26e348f3", + "name": "Proceedings of the Royal Society A", "type": "journal", "alternate_names": + ["Proc R Soc A", "Proc R Soc Math Phys Eng Sci", "Proceedings of The Royal + Society A: Mathematical, Physical and Engineering Sciences"], "issn": "1364-5021", + "url": "https://www.jstor.org/journal/procmathphysengi", "alternate_urls": + ["http://rspa.royalsocietypublishing.org/content/by/year", "http://rspa.royalsocietypublishing.org/about", + "http://rspa.royalsocietypublishing.org/", "https://royalsocietypublishing.org/journal/rspa"]}, + "url": "https://www.semanticscholar.org/paper/4a433e912f48865d068fc00eabb284776a80b76a", "title": "Computational complexity with experiments as oracles", "abstract": "We discuss combining physical experiments with machine computations and introduce a form of analogue\u2013digital (AD) Turing machine. We examine in detail @@ -15917,27 +18091,33 @@ interactions: that show that these machines can compute more than classical Turing machines.", "venue": "Proceedings of the Royal Society A", "year": 2008, "referenceCount": 39, "citationCount": 51, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-10-08", - "journal": {"name": "Proceedings of the Royal Society A: Mathematical, Physical - and Engineering Sciences", "pages": "2777 - 2801", "volume": "464"}, "authors": - [{"authorId": "1919705", "name": "E. Beggs"}, {"authorId": "143698164", "name": - "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": "1762843", "name": "B. Loff"}, - {"authorId": "145744796", "name": "J. V. Tucker"}]}, {"paperId": "72b93561b67080d24f45d51c91674eb3c9bd207f", + "openAccessPdf": {"url": "http://www-compsci.swan.ac.uk/~csjvt/JVTPublications/CC_Experimental_Oracles.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2008-10-08", "journal": {"name": "Proceedings of the Royal Society A: Mathematical, + Physical and Engineering Sciences", "pages": "2777 - 2801", "volume": "464"}, + "authors": [{"authorId": "1919705", "name": "E. Beggs"}, {"authorId": "143698164", + "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": "1762843", "name": "B. + Loff"}, {"authorId": "145744796", "name": "J. V. Tucker"}]}, {"paperId": "72b93561b67080d24f45d51c91674eb3c9bd207f", "externalIds": {"DBLP": "journals/acta/Hartmanis72", "MAG": "2006253309", - "DOI": "10.1007/BF00289513", "CorpusId": 22870067}, "url": "https://www.semanticscholar.org/paper/72b93561b67080d24f45d51c91674eb3c9bd207f", + "DOI": "10.1007/BF00289513", "CorpusId": 22870067}, "corpusId": 22870067, + "publicationVenue": {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", "name": + "Acta Informatica", "type": "journal", "alternate_names": ["Acta Inform"], + "issn": "0001-5903", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/72b93561b67080d24f45d51c91674eb3c9bd207f", "title": "On non-determinancy in simple computing devices", "abstract": null, "venue": "Acta Informatica", "year": 1972, "referenceCount": 9, "citationCount": - 70, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1972-12-01", "journal": {"name": "Acta Informatica", "pages": - "336-344", "volume": "1"}, "authors": [{"authorId": "1747181", "name": "J. - Hartmanis"}]}, {"paperId": "c2e259dddf4bbb897452d8e285370cefd1e3cf8a", "externalIds": - {"MAG": "2096824107", "DOI": "10.2139/ssrn.643761", "CorpusId": 16536331}, - "url": "https://www.semanticscholar.org/paper/c2e259dddf4bbb897452d8e285370cefd1e3cf8a", + 70, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1972-12-01", "journal": + {"name": "Acta Informatica", "pages": "336-344", "volume": "1"}, "authors": + [{"authorId": "1747181", "name": "J. Hartmanis"}]}, {"paperId": "c2e259dddf4bbb897452d8e285370cefd1e3cf8a", + "externalIds": {"MAG": "2096824107", "DOI": "10.2139/ssrn.643761", "CorpusId": + 16536331}, "corpusId": 16536331, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c2e259dddf4bbb897452d8e285370cefd1e3cf8a", "title": "Spatial Analysis: Development of Descriptive and Normative Methods with Applications to Economic-Ecological Modelling", "abstract": "This paper adapts Turing analysis and applies it to dynamic bioeconomic problems where @@ -15955,21 +18135,24 @@ interactions: associated with dispersion relationship to recursive infinite horizon optimal control settings is new.", "venue": "", "year": 2004, "referenceCount": 167, "citationCount": 84, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-12-01", "journal": {"name": - "Environmental Economics"}, "authors": [{"authorId": "3993495", "name": "A. - Xepapadeas"}, {"authorId": "48680294", "name": "W. Brock"}]}, {"paperId": - "8e3661f19ddbd2cdc4f4e48a1ecaf82f39689905", "externalIds": {"MAG": "63087356", - "DBLP": "conf/focs/PaulPST83", "DOI": "10.1109/SFCS.1983.39", "CorpusId": - 620285}, "url": "https://www.semanticscholar.org/paper/8e3661f19ddbd2cdc4f4e48a1ecaf82f39689905", + "openAccessPdf": {"url": "http://economics.soc.uoc.gr/wpa/docs/SpatialMethodsinEcologicalApplicationsSubmAER20Oct04.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Economics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-12-01", + "journal": {"name": "Environmental Economics"}, "authors": [{"authorId": "3993495", + "name": "A. Xepapadeas"}, {"authorId": "48680294", "name": "W. Brock"}]}, + {"paperId": "8e3661f19ddbd2cdc4f4e48a1ecaf82f39689905", "externalIds": {"MAG": + "63087356", "DBLP": "conf/focs/PaulPST83", "DOI": "10.1109/SFCS.1983.39", + "CorpusId": 620285}, "corpusId": 620285, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8e3661f19ddbd2cdc4f4e48a1ecaf82f39689905", "title": "On determinism versus non-determinism and related problems", "abstract": "We show that, for multi-tape Turing machines, non-deterministic linear time is more powerful than deterministic linear time. We also discuss the prospects for extending this result to more general Turing machines.", "venue": "24th Annual Symposium on Foundations of Computer Science (sfcs 1983)", "year": 1983, "referenceCount": 22, "citationCount": 123, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "https://scholarship.claremont.edu/cgi/viewcontent.cgi?article=2049&context=hmc_fac_pub", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1983-11-07", "journal": @@ -15977,33 +18160,14 @@ interactions: "pages": "429-438"}, "authors": [{"authorId": "1727613", "name": "W. Paul"}, {"authorId": "1687945", "name": "N. Pippenger"}, {"authorId": "1723843", "name": "E. Szemer\u00e9di"}, {"authorId": "1713984", "name": "W. T. Trotter"}]}, - {"paperId": "c7a001c6c47301ff3489ff4f307ebb2fcb628344", "externalIds": {"DBLP": - "conf/coco/BerthiaumeB92", "MAG": "2156313614", "DOI": "10.1109/SCT.1992.215388", - "CorpusId": 17667879}, "url": "https://www.semanticscholar.org/paper/c7a001c6c47301ff3489ff4f307ebb2fcb628344", - "title": "The quantum challenge to structural complexity theory", "abstract": - "A nontechnical survey of recent quantum-mechanical discoveries that challenge - generally accepted complexity-theoretic versions of the Church-Turing thesis - is presented. In particular, the authors construct an oracle relative to which - there exists a set that can be recognized in quantum polynomal time (QP), - yet any Turing machine that recognizes it would require exponential time even - if allowed to be probabilistic, provided that errors are not tolerated. In - particular, QP is not contained in or equal to ZPP relative to this oracle. - Furthermore, there are cryptographic tasks that are demonstrably impossible - to implement with unlimited computing power probabilistic interactive turning - machines, yet they can be implemented even in practice by quantum mechanical - apparatus.<>", "venue": "[1992] Proceedings of the Seventh Annual Structure - in Complexity Theory Conference", "year": 1992, "referenceCount": 27, "citationCount": - 96, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference", "Review"], "publicationDate": "1992-06-22", - "journal": {"name": "[1992] Proceedings of the Seventh Annual Structure in - Complexity Theory Conference", "pages": "132-137"}, "authors": [{"authorId": - "2376065", "name": "A. Berthiaume"}, {"authorId": "1771605", "name": "G. Brassard"}]}, {"paperId": "461d44a5636b5908f53084bb6a4364dfb9d342bf", "externalIds": {"DBLP": "journals/pami/NeyEK95", "MAG": "2155520241", "DOI": "10.1109/34.476512", - "CorpusId": 30170130}, "url": "https://www.semanticscholar.org/paper/461d44a5636b5908f53084bb6a4364dfb9d342bf", + "CorpusId": 30170130}, "corpusId": 30170130, "publicationVenue": {"id": "25248f80-fe99-48e5-9b8e-9baef3b8e23b", + "name": "IEEE Transactions on Pattern Analysis and Machine Intelligence", + "type": "journal", "alternate_names": ["IEEE Trans Pattern Anal Mach Intell"], + "issn": "0162-8828", "url": "http://www.computer.org/tpami/", "alternate_urls": + ["http://www.computer.org/portal/web/tpami", "http://ieeexplore.ieee.org/servlet/opac?punumber=34"]}, + "url": "https://www.semanticscholar.org/paper/461d44a5636b5908f53084bb6a4364dfb9d342bf", "title": "On the Estimation of ''Small'' Probabilities by Leaving-One-Out", "abstract": "We apply the leaving-one-out concept to the estimation of ''small'' probabilities, i.e., the case where the number of training samples is much @@ -16015,15 +18179,44 @@ interactions: language modeling. Experimental results are presented for a German and an English corpus.", "venue": "IEEE Transactions on Pattern Analysis and Machine Intelligence", "year": 1995, "referenceCount": 14, "citationCount": 95, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-12-01", "journal": {"name": "IEEE Trans. Pattern - Anal. Mach. Intell.", "pages": "1202-1212", "volume": "17"}, "authors": [{"authorId": - "145322333", "name": "H. Ney"}, {"authorId": "2037240", "name": "U. Essen"}, - {"authorId": "1795942", "name": "Reinhard Kneser"}]}, {"paperId": "261f4e1cc03dcfc2b5aa80fa48201e7955a3b8eb", + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-12-01", "journal": + {"name": "IEEE Trans. Pattern Anal. Mach. Intell.", "pages": "1202-1212", + "volume": "17"}, "authors": [{"authorId": "145322333", "name": "H. Ney"}, + {"authorId": "2037240", "name": "U. Essen"}, {"authorId": "1795942", "name": + "Reinhard Kneser"}]}, {"paperId": "c7a001c6c47301ff3489ff4f307ebb2fcb628344", + "externalIds": {"DBLP": "conf/coco/BerthiaumeB92", "MAG": "2156313614", "DOI": + "10.1109/SCT.1992.215388", "CorpusId": 17667879}, "corpusId": 17667879, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c7a001c6c47301ff3489ff4f307ebb2fcb628344", + "title": "The quantum challenge to structural complexity theory", "abstract": + "A nontechnical survey of recent quantum-mechanical discoveries that challenge + generally accepted complexity-theoretic versions of the Church-Turing thesis + is presented. In particular, the authors construct an oracle relative to which + there exists a set that can be recognized in quantum polynomal time (QP), + yet any Turing machine that recognizes it would require exponential time even + if allowed to be probabilistic, provided that errors are not tolerated. In + particular, QP is not contained in or equal to ZPP relative to this oracle. + Furthermore, there are cryptographic tasks that are demonstrably impossible + to implement with unlimited computing power probabilistic interactive turning + machines, yet they can be implemented even in practice by quantum mechanical + apparatus.<>", "venue": "[1992] Proceedings of the Seventh Annual Structure + in Complexity Theory Conference", "year": 1992, "referenceCount": 27, "citationCount": + 96, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference", "Review"], "publicationDate": + "1992-06-22", "journal": {"name": "[1992] Proceedings of the Seventh Annual + Structure in Complexity Theory Conference", "pages": "132-137"}, "authors": + [{"authorId": "2376065", "name": "A. Berthiaume"}, {"authorId": "1771605", + "name": "G. Brassard"}]}, {"paperId": "261f4e1cc03dcfc2b5aa80fa48201e7955a3b8eb", "externalIds": {"DBLP": "journals/jcss/RuzzoST84", "MAG": "2012539169", "DOI": - "10.1145/800070.802194", "CorpusId": 248544}, "url": "https://www.semanticscholar.org/paper/261f4e1cc03dcfc2b5aa80fa48201e7955a3b8eb", + "10.1145/800070.802194", "CorpusId": 248544}, "corpusId": 248544, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/261f4e1cc03dcfc2b5aa80fa48201e7955a3b8eb", "title": "Space-bounded hierarchies and probabilistic computations", "abstract": "This paper studies two aspects of the power of space-bounded probabilistic Turing machines. Section 2 presents a simple alternative proof of Simon''s @@ -16037,63 +18230,117 @@ interactions: alternating Turing machines with a constant number of alternations [4].", "venue": "Symposium on the Theory of Computing", "year": 1982, "referenceCount": 21, "citationCount": 132, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1982-05-05", "journal": - {"name": "J. Comput. Syst. Sci.", "pages": "216-230", "volume": "28"}, "authors": - [{"authorId": "1719325", "name": "W. L. Ruzzo"}, {"authorId": "143688145", - "name": "Janos Simon"}, {"authorId": "1699741", "name": "M. Tompa"}]}, {"paperId": - "1098929b4b3fbf8ffed02985eea5602fbeec37dc", "externalIds": {"MAG": "1509485343", - "DBLP": "conf/fm/MandelC99", "DOI": "10.1007/3-540-48119-2_47", "CorpusId": - 21090032}, "url": "https://www.semanticscholar.org/paper/1098929b4b3fbf8ffed02985eea5602fbeec37dc", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1982-05-05", "journal": {"name": "J. Comput. Syst. Sci.", + "pages": "216-230", "volume": "28"}, "authors": [{"authorId": "1719325", "name": + "W. L. Ruzzo"}, {"authorId": "143688145", "name": "Janos Simon"}, {"authorId": + "1699741", "name": "M. Tompa"}]}, {"paperId": "0d781f47ca6e3bfdafbed007e0fdc3c715407b3a", + "externalIds": {"MAG": "2156920703", "DOI": "10.1088/1674-1056/17/11/003", + "CorpusId": 122019789}, "corpusId": 122019789, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0d781f47ca6e3bfdafbed007e0fdc3c715407b3a", + "title": "Pattern formation induced by cross-diffusion in a predator\u2013prey + system", "abstract": "This paper considers the Holling\u2013Tanner model for + predator\u2013prey with self and cross-diffusion. From the Turing theory, + it is believed that there is no Turing pattern formation for the equal self-diffusion + coefficients. However, combined with cross-diffusion, it shows that the system + will exhibit spotted pattern by both mathematical analysis and numerical simulations. + Furthermore, asynchrony of the predator and the prey in the space. The obtained + results show that cross-diffusion plays an important role on the pattern formation + of the predator\u2013prey system.", "venue": "", "year": 2008, "referenceCount": + 21, "citationCount": 52, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-11-01", "journal": {"name": + "Chinese Physics B", "pages": "3936-3941", "volume": "17"}, "authors": [{"authorId": + "1413740825", "name": "Sun Gui-quan"}, {"authorId": "46540388", "name": "Jin + Zhen"}, {"authorId": "1413716815", "name": "Liu Quan-xing"}, {"authorId": + "103314097", "name": "Li Li"}]}, {"paperId": "1098929b4b3fbf8ffed02985eea5602fbeec37dc", + "externalIds": {"MAG": "1509485343", "DBLP": "conf/fm/MandelC99", "DOI": "10.1007/3-540-48119-2_47", + "CorpusId": 21090032}, "corpusId": 21090032, "publicationVenue": {"id": "77f160ec-5456-49f9-8bd4-00b24025de18", + "name": "World Congress on Formal Methods", "type": "conference", "alternate_names": + ["FM", "Form Method", "World Congr Form Method", "Formal Methods"], "url": + "http://www.fmeurope.org/"}, "url": "https://www.semanticscholar.org/paper/1098929b4b3fbf8ffed02985eea5602fbeec37dc", "title": "On the Expressive Power of OCL", "abstract": null, "venue": "World Congress on Formal Methods", "year": 1999, "referenceCount": 15, "citationCount": - 82, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1999-09-20", "journal": - {"pages": "854-874"}, "authors": [{"authorId": "11527269", "name": "L. Mandel"}, - {"authorId": "2106343", "name": "M. V. Cengarle"}]}, {"paperId": "c9b4e108495924279056a8de210926b256754162", + 82, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007%2F3-540-48119-2_47.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-09-20", "journal": {"pages": "854-874"}, "authors": + [{"authorId": "11527269", "name": "L. Mandel"}, {"authorId": "2106343", "name": + "M. V. Cengarle"}]}, {"paperId": "987fce10342c8541d899c2796fe2766adf3b1fc7", + "externalIds": {"DBLP": "journals/ijfcs/Schmidhuber02", "MAG": "2030492659", + "DOI": "10.1142/S0129054102001291", "CorpusId": 22256479}, "corpusId": 22256479, + "publicationVenue": {"id": "0f60ff8e-f0b7-47a2-9927-2b94f9e44e82", "name": + "International Journal of Foundations of Computer Science", "type": "journal", + "alternate_names": ["Int J Found Comput Sci"], "issn": "0129-0541", "url": + "http://www.cs.ucsb.edu/~ijfcs/"}, "url": "https://www.semanticscholar.org/paper/987fce10342c8541d899c2796fe2766adf3b1fc7", + "title": "Hierarchies of Generalized Kolmogorov Complexities and Nonenumerable + Universal Measures Computable in the Limit", "abstract": "The traditional + theory of Kolmogorov complexity and algorithmic probability focuses on monotone + Turing machines with one-way write-only output tape. This naturally leads + to the universal enumerable Solomonoff-Levin measure. Here we introduce more + general, nonenumerable but cumulatively enumerable measures (CEMs) derived + from Turing machines with lexicographically nondecreasing output and random + input, and even more general approximable measures and distributions computable + in the limit. We obtain a natural hierarchy of generalizations of algorithmic + probability and Kolmogorov complexity, suggesting that the \"true\" information + content of some (possibly infinite) bitstring x is the size of the shortest + nonhalting program that converges to x and nothing but x on a Turing machine + that can edit its previous outputs. Among other things we show that there + are objects computable in the limit yet more random than Chaitin''s \"number + of wisdom\" Omega, that any approximable measure of x is small for any x lacking + a sh...", "venue": "International Journal of Foundations of Computer Science", + "year": 2002, "referenceCount": 37, "citationCount": 77, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-08-01", "journal": {"name": "Int. J. Found. Comput. + Sci.", "pages": "587-612", "volume": "13"}, "authors": [{"authorId": "145341374", + "name": "J. Schmidhuber"}]}, {"paperId": "c9b4e108495924279056a8de210926b256754162", "externalIds": {"MAG": "1588811107", "DOI": "10.1007/978-0-387-68546-5_7", - "CorpusId": 1897672}, "url": "https://www.semanticscholar.org/paper/c9b4e108495924279056a8de210926b256754162", + "CorpusId": 1897672}, "corpusId": 1897672, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c9b4e108495924279056a8de210926b256754162", "title": "Church Without Dogma: Axioms for Computability", "abstract": null, "venue": "", "year": 2008, "referenceCount": 26, "citationCount": 46, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "139-152", "volume": ""}, "authors": - [{"authorId": "1795549", "name": "W. Sieg"}]}, {"paperId": "207496873b8bc1f4255a34bcc4cf10cbebb6e4a2", + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://people.ucalgary.ca/~rzach/static/banff/sieg.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "pages": "139-152", "volume": ""}, "authors": [{"authorId": "1795549", + "name": "W. Sieg"}]}, {"paperId": "207496873b8bc1f4255a34bcc4cf10cbebb6e4a2", "externalIds": {"MAG": "2096200279", "DBLP": "conf/dna/MargensternMP04", "DOI": - "10.1007/11493785_21", "CorpusId": 7388124}, "url": "https://www.semanticscholar.org/paper/207496873b8bc1f4255a34bcc4cf10cbebb6e4a2", + "10.1007/11493785_21", "CorpusId": 7388124}, "corpusId": 7388124, "publicationVenue": + {"id": "31f44e5f-f988-4a14-a236-2ecf8d216061", "name": "DNA", "type": "conference", + "alternate_names": ["International Meeting on DNA Computing", "Int Meet DNA + Comput"], "issn": "0198-0238", "alternate_issns": ["2673-8856", "1557-7430"], + "url": "http://www.liebertonline.com/loi/dna", "alternate_urls": ["https://www.liebertpub.com/loi/dna", + "http://www.liebertpub.com/DNA"]}, "url": "https://www.semanticscholar.org/paper/207496873b8bc1f4255a34bcc4cf10cbebb6e4a2", "title": "Accepting Hybrid Networks of Evolutionary Processors", "abstract": null, "venue": "DNA", "year": 2004, "referenceCount": 13, "citationCount": - 75, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2004-06-07", "journal": {"pages": - "235-246"}, "authors": [{"authorId": "1697682", "name": "M. Margenstern"}, - {"authorId": "1715143", "name": "V. Mitrana"}, {"authorId": "1393653632", - "name": "M. P\u00e9rez-Jim\u00e9nez"}]}, {"paperId": "5cfdf55865c2f405ef803d00c82d3652784bde35", - "externalIds": {"MAG": "2123514264", "DOI": "10.1103/PHYSREVLETT.92.128301", - "CorpusId": 7385229, "PubMed": "15089714"}, "url": "https://www.semanticscholar.org/paper/5cfdf55865c2f405ef803d00c82d3652784bde35", - "title": "Stationary and oscillatory localized patterns, and subcritical bifurcations.", - "abstract": "Stationary and oscillatory localized patterns (oscillons) are - found in the Belousov-Zhabotinsky reaction dispersed in Aerosol OT water-in-oil - microemulsion. The experimental findings are analyzed in terms of subcritical - Hopf instability, subcritical Turing instability, and their combination.", - "venue": "Physical Review Letters", "year": 2004, "referenceCount": 68, "citationCount": - 82, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-03-24", "journal": {"name": "Physical review letters", - "pages": "\n 128301\n ", "volume": "92 12"}, "authors": [{"authorId": - "2258489", "name": "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, - {"paperId": "3bbd53bb53ff3132b99619be4ba032843c0cf3bc", "externalIds": {"DBLP": - "journals/mlq/Simpson07", "MAG": "2159451345", "DOI": "10.1002/malq.200710012", - "CorpusId": 358428}, "url": "https://www.semanticscholar.org/paper/3bbd53bb53ff3132b99619be4ba032843c0cf3bc", + 75, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-06-07", "journal": {"pages": "235-246"}, "authors": [{"authorId": "1697682", + "name": "M. Margenstern"}, {"authorId": "1715143", "name": "V. Mitrana"}, + {"authorId": "1393653632", "name": "M. P\u00e9rez-Jim\u00e9nez"}]}, {"paperId": + "3bbd53bb53ff3132b99619be4ba032843c0cf3bc", "externalIds": {"DBLP": "journals/mlq/Simpson07", + "MAG": "2159451345", "DOI": "10.1002/malq.200710012", "CorpusId": 358428}, + "corpusId": 358428, "publicationVenue": {"id": "e89761de-4f9a-4024-b7b3-29e0b13cb157", + "name": "Mathematical Logic Quarterly", "type": "journal", "alternate_names": + ["Math log q", "Math Log Q", "Mathematical logic quarterly"], "issn": "0044-3050", + "alternate_issns": ["0942-5616", "1521-3870"], "url": "https://onlinelibrary.wiley.com/journal/15213870", + "alternate_urls": ["http://www.onlinelibrary.wiley.com/journal/10.1002/(ISSN)1521-3870"]}, + "url": "https://www.semanticscholar.org/paper/3bbd53bb53ff3132b99619be4ba032843c0cf3bc", "title": "Almost everywhere domination and superhighness", "abstract": "Let \u03c9 be the set of natural numbers. For functions f, g: \u03c9 \u2192 \u03c9, we say f is dominated by g if f (n) < g (n) for all but finitely many n \u2208 @@ -16111,92 +18358,101 @@ interactions: \u2032, the Turing jump of B. (\u00a9 2007 WILEY\u2010VCH Verlag GmbH & Co. KGaA, Weinheim)", "venue": "Mathematical Logic Quarterly", "year": 2007, "referenceCount": 44, "citationCount": 47, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-07-26", "journal": {"name": "Mathematical - Logic Quarterly", "volume": "53"}, "authors": [{"authorId": "2292634", "name": - "S. G. Simpson"}]}, {"paperId": "be2eba7064cff003b2fa0dae636ac7df4c76b1bf", - "externalIds": {"DBLP": "journals/ndjfl/HamkinsM06", "ArXiv": "math/0504351", - "MAG": "2950045384", "DOI": "10.1305/NDJFL/1168352664", "CorpusId": 15005164}, - "url": "https://www.semanticscholar.org/paper/be2eba7064cff003b2fa0dae636ac7df4c76b1bf", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-07-26", "journal": {"name": "Mathematical Logic Quarterly", "volume": + "53"}, "authors": [{"authorId": "2292634", "name": "S. G. Simpson"}]}, {"paperId": + "be2eba7064cff003b2fa0dae636ac7df4c76b1bf", "externalIds": {"DBLP": "journals/ndjfl/HamkinsM06", + "ArXiv": "math/0504351", "MAG": "2950045384", "DOI": "10.1305/NDJFL/1168352664", + "CorpusId": 15005164}, "corpusId": 15005164, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/be2eba7064cff003b2fa0dae636ac7df4c76b1bf", "title": "The Halting Problem Is Decidable on a Set of Asymptotic Probability One", "abstract": "The halting problem for Turing machines is decidable on a set of asymptotic probability one. The proof is sensitive to the particular compu- tational model.", "venue": "Notre Dame J. Formal Log.", "year": 2005, "referenceCount": 5, "citationCount": 50, "influentialCitationCount": 3, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2005-04-18", "journal": {"name": "Notre - Dame J. Formal Log.", "pages": "515-524", "volume": "47"}, "authors": [{"authorId": - "1755318", "name": "J. Hamkins"}, {"authorId": "5751803", "name": "A. Myasnikov"}]}, - {"paperId": "ae614ca819a4fb5131197e6162273be6d14248bc", "externalIds": {"DBLP": - "journals/mst/Case74", "MAG": "2041249678", "DOI": "10.1007/BF01761704", "CorpusId": - 12588467}, "url": "https://www.semanticscholar.org/paper/ae614ca819a4fb5131197e6162273be6d14248bc", + true, "openAccessPdf": {"url": "https://projecteuclid.org/journals/notre-dame-journal-of-formal-logic/volume-47/issue-4/The-Halting-Problem-Is-Decidable-on-a-Set-of-Asymptotic/10.1305/ndjfl/1168352664.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-04-18", "journal": + {"name": "Notre Dame J. Formal Log.", "pages": "515-524", "volume": "47"}, + "authors": [{"authorId": "1755318", "name": "J. Hamkins"}, {"authorId": "5751803", + "name": "A. Myasnikov"}]}, {"paperId": "ae614ca819a4fb5131197e6162273be6d14248bc", + "externalIds": {"DBLP": "journals/mst/Case74", "MAG": "2041249678", "DOI": + "10.1007/BF01761704", "CorpusId": 12588467}, "corpusId": 12588467, "publicationVenue": + {"id": "cc43107f-e671-4f87-99f5-ae12f9992c0d", "name": "Mathematical Systems + Theory", "type": "journal", "alternate_names": ["Math Syst Theory", "Theory + Comput Syst Math Syst Theory", "Theory of Computing Systems \\/ Mathematical + Systems Theory"], "issn": "0025-5661", "url": "https://link.springer.com/journal/224"}, + "url": "https://www.semanticscholar.org/paper/ae614ca819a4fb5131197e6162273be6d14248bc", "title": "Periodicity in generations of automata", "abstract": null, "venue": "Mathematical Systems Theory", "year": 1974, "referenceCount": 25, "citationCount": - 61, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1974-03-01", "journal": {"name": "Mathematical - systems theory", "pages": "15-32", "volume": "8"}, "authors": [{"authorId": - "118163360", "name": "J. Case"}]}, {"paperId": "0c63faba55b52a47ede7f1a726e65979a9b6cc49", - "externalIds": {"DBLP": "journals/mst/LadnerL76", "MAG": "2015413218", "DOI": - "10.1007/BF01683260", "CorpusId": 11980748}, "url": "https://www.semanticscholar.org/paper/0c63faba55b52a47ede7f1a726e65979a9b6cc49", + 61, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1974-03-01", "journal": {"name": "Mathematical systems theory", "pages": + "15-32", "volume": "8"}, "authors": [{"authorId": "118163360", "name": "J. + Case"}]}, {"paperId": "0c63faba55b52a47ede7f1a726e65979a9b6cc49", "externalIds": + {"DBLP": "journals/mst/LadnerL76", "MAG": "2015413218", "DOI": "10.1007/BF01683260", + "CorpusId": 11980748}, "corpusId": 11980748, "publicationVenue": {"id": "cc43107f-e671-4f87-99f5-ae12f9992c0d", + "name": "Mathematical Systems Theory", "type": "journal", "alternate_names": + ["Math Syst Theory", "Theory Comput Syst Math Syst Theory", "Theory of Computing + Systems \\/ Mathematical Systems Theory"], "issn": "0025-5661", "url": "https://link.springer.com/journal/224"}, + "url": "https://www.semanticscholar.org/paper/0c63faba55b52a47ede7f1a726e65979a9b6cc49", "title": "Relativization of questions about log space computability", "abstract": null, "venue": "Mathematical Systems Theory", "year": 1976, "referenceCount": 21, "citationCount": 54, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1976-12-01", "journal": - {"name": "Mathematical systems theory", "pages": "19-32", "volume": "10"}, - "authors": [{"authorId": "1762656", "name": "R. Ladner"}, {"authorId": "145390591", - "name": "N. Lynch"}]}, {"paperId": "987fce10342c8541d899c2796fe2766adf3b1fc7", - "externalIds": {"DBLP": "journals/ijfcs/Schmidhuber02", "MAG": "2030492659", - "DOI": "10.1142/S0129054102001291", "CorpusId": 22256479}, "url": "https://www.semanticscholar.org/paper/987fce10342c8541d899c2796fe2766adf3b1fc7", - "title": "Hierarchies of Generalized Kolmogorov Complexities and Nonenumerable - Universal Measures Computable in the Limit", "abstract": "The traditional - theory of Kolmogorov complexity and algorithmic probability focuses on monotone - Turing machines with one-way write-only output tape. This naturally leads - to the universal enumerable Solomonoff-Levin measure. Here we introduce more - general, nonenumerable but cumulatively enumerable measures (CEMs) derived - from Turing machines with lexicographically nondecreasing output and random - input, and even more general approximable measures and distributions computable - in the limit. We obtain a natural hierarchy of generalizations of algorithmic - probability and Kolmogorov complexity, suggesting that the \"true\" information - content of some (possibly infinite) bitstring x is the size of the shortest - nonhalting program that converges to x and nothing but x on a Turing machine - that can edit its previous outputs. Among other things we show that there - are objects computable in the limit yet more random than Chaitin''s \"number - of wisdom\" Omega, that any approximable measure of x is small for any x lacking - a sh...", "venue": "International Journal of Foundations of Computer Science", - "year": 2002, "referenceCount": 37, "citationCount": 75, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2002-08-01", "journal": - {"name": "Int. J. Found. Comput. Sci.", "pages": "587-612", "volume": "13"}, - "authors": [{"authorId": "145341374", "name": "J. Schmidhuber"}]}, {"paperId": - "63e1811a32042d609bf80d4f61e071b2f9df65b1", "externalIds": {"DBLP": "books/daglib/0016469", - "MAG": "1505749614", "DOI": "10.1017/cbo9780511607202", "CorpusId": 5052092}, - "url": "https://www.semanticscholar.org/paper/63e1811a32042d609bf80d4f61e071b2f9df65b1", + "openAccessPdf": {"url": "http://groups.csail.mit.edu/tds/papers/Lynch/mst76.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1976-12-01", "journal": {"name": "Mathematical systems theory", "pages": + "19-32", "volume": "10"}, "authors": [{"authorId": "1762656", "name": "R. + Ladner"}, {"authorId": "145390591", "name": "N. Lynch"}]}, {"paperId": "63e1811a32042d609bf80d4f61e071b2f9df65b1", + "externalIds": {"DBLP": "books/daglib/0016469", "MAG": "1505749614", "DOI": + "10.1017/cbo9780511607202", "CorpusId": 5052092}, "corpusId": 5052092, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/63e1811a32042d609bf80d4f61e071b2f9df65b1", "title": "Automata theory with modern applications", "abstract": "1. Introduction 2. Languages and codes 3. Automata 4. Grammars 5. Turing machines 6. A visual approach to formal languages 7. From biopolymers to formal language theory Bibliography Index.", "venue": "", "year": 2006, "referenceCount": 0, "citationCount": - 61, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2006-06-22", "journal": {"pages": - "I-VIII, 1-255"}, "authors": [{"authorId": "2110869671", "name": "James A. - Anderson"}]}, {"paperId": "cb8835ad70af924eed10038176abd13b12a2b88d", "externalIds": - {"MAG": "1685591268", "DBLP": "journals/fuin/Plump98", "DOI": "10.3233/FI-1998-33204", - "CorpusId": 7285827}, "url": "https://www.semanticscholar.org/paper/cb8835ad70af924eed10038176abd13b12a2b88d", + 61, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-06-22", + "journal": {"pages": "I-VIII, 1-255"}, "authors": [{"authorId": "2110869671", + "name": "James A. Anderson"}]}, {"paperId": "678a61c9a17dc1a74769b05ac8783425cac1eba3", + "externalIds": {"MAG": "2132137137", "DOI": "10.1007/s11538-010-9533-4", "CorpusId": + 18609839, "PubMed": "20309644"}, "corpusId": 18609839, "publicationVenue": + {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/678a61c9a17dc1a74769b05ac8783425cac1eba3", + "title": "Aberrant Behaviours of Reaction Diffusion Self-organisation Models + on\u00a0Growing Domains in\u00a0the\u00a0Presence of\u00a0Gene Expression + Time Delays", "abstract": null, "venue": "Bulletin of Mathematical Biology", + "year": 2010, "referenceCount": 52, "citationCount": 30, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:ac51a023-1201-4974-8fa8-77dfe2cd0388/files/m2324a537df7f4afcc0a70116ac14236b", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-03-23", "journal": {"name": "Bulletin + of Mathematical Biology", "pages": "2161-2179", "volume": "72"}, "authors": + [{"authorId": "148135541", "name": "S. Seirin\u00a0Lee"}, {"authorId": "2662569", + "name": "E. Gaffney"}]}, {"paperId": "cb8835ad70af924eed10038176abd13b12a2b88d", + "externalIds": {"MAG": "1685591268", "DBLP": "journals/fuin/Plump98", "DOI": + "10.3233/FI-1998-33204", "CorpusId": 7285827}, "corpusId": 7285827, "publicationVenue": + {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", "name": "Fundamenta Informaticae", + "type": "journal", "alternate_names": ["Fundam Informaticae"], "issn": "0169-2968", + "url": "http://content.iospress.com/journals/fundamenta-informaticae", "alternate_urls": + ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, "url": + "https://www.semanticscholar.org/paper/cb8835ad70af924eed10038176abd13b12a2b88d", "title": "Termination of Graph Rewriting is Undecidable", "abstract": "It is shown that it is undecidable in general whether a graph rewriting system (in the \u201cdouble pushout approach\u201d) is terminating. The proof is @@ -16205,32 +18461,29 @@ interactions: or of the termination problem for string rewriting systems to the present problem.", "venue": "Fundamenta Informaticae", "year": 1998, "referenceCount": 7, "citationCount": 89, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-04-01", "journal": - {"name": "Fundam. Informaticae", "pages": "201-209", "volume": "33"}, "authors": - [{"authorId": "2968742", "name": "D. Plump"}]}, {"paperId": "0d781f47ca6e3bfdafbed007e0fdc3c715407b3a", - "externalIds": {"MAG": "2156920703", "DOI": "10.1088/1674-1056/17/11/003", - "CorpusId": 122019789}, "url": "https://www.semanticscholar.org/paper/0d781f47ca6e3bfdafbed007e0fdc3c715407b3a", - "title": "Pattern formation induced by cross-diffusion in a predator\u2013prey - system", "abstract": "This paper considers the Holling\u2013Tanner model for - predator\u2013prey with self and cross-diffusion. From the Turing theory, - it is believed that there is no Turing pattern formation for the equal self-diffusion - coefficients. However, combined with cross-diffusion, it shows that the system - will exhibit spotted pattern by both mathematical analysis and numerical simulations. - Furthermore, asynchrony of the predator and the prey in the space. The obtained - results show that cross-diffusion plays an important role on the pattern formation - of the predator\u2013prey system.", "venue": "", "year": 2008, "referenceCount": - 21, "citationCount": 48, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2008-11-01", "journal": {"name": "Chinese Physics - B", "pages": "3936-3941", "volume": "17"}, "authors": [{"authorId": "1413740825", - "name": "Sun Gui-quan"}, {"authorId": "46540388", "name": "Jin Zhen"}, {"authorId": - "1413716815", "name": "Liu Quan-xing"}, {"authorId": "103314097", "name": - "Li Li"}]}]} + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1998-04-01", "journal": {"name": "Fundam. Informaticae", "pages": "201-209", + "volume": "33"}, "authors": [{"authorId": "2968742", "name": "D. Plump"}]}, + {"paperId": "ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", "externalIds": {"MAG": + "423839556", "DBLP": "conf/icalp/Selman79", "DOI": "10.1007/3-540-09510-1_44", + "CorpusId": 19866482}, "corpusId": 19866482, "publicationVenue": {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", + "name": "International Colloquium on Automata, Languages and Programming", + "type": "conference", "alternate_names": ["Int Conf Arab Lang Process", "International + Conference on Arabic Language Processing", "Int Colloq Autom Lang Program", + "ICALP"], "url": "http://www.eatcs.org/"}, "url": "https://www.semanticscholar.org/paper/ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", + "title": "P-Selective Sets, Tally Languages, and the Behavior of Polynomial + Time Reducibilities on NP", "abstract": null, "venue": "International Colloquium + on Automata, Languages and Programming", "year": 1979, "referenceCount": 14, + "citationCount": 126, "influentialCitationCount": 9, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1979-07-16", "journal": {"pages": "546-555"}, "authors": [{"authorId": "2411373", + "name": "A. Selman"}]}]} ' headers: @@ -16239,31 +18492,31 @@ interactions: Connection: - keep-alive Content-Length: - - '158104' + - '183331' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:28 GMT + - Tue, 03 Jan 2023 20:52:58 GMT Via: - - 1.1 66e033c5d10bcbd4e2ec7dc233d3bb5a.cloudfront.net (CloudFront) + - 1.1 5df90d8b07f873c947e7e3d9ff174026.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - p_neCXM9Wpu72H3ltlo7YTOUpZCzYggSM844mpTg8_AqW0uXrvvRiQ== + - 23WB0Kr7lxf84raGs-Wso5bPWxvGkz-iOJA25J0hdGsdykn48oQtcQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detFmHx5vHcFw2w= + - eLxSqF-TvHcF6nQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '158104' + - '183331' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:28 GMT + - Tue, 03 Jan 2023 20:52:58 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - f8ddce84-870d-4696-8b8b-0e0a192efdbb + - 0343f14e-b2a5-44a9-96f6-88d6f1167ccf status: code: 200 message: OK @@ -16279,25 +18532,34 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=800&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=800&limit=100 response: body: - string: '{"total": 133388, "offset": 800, "next": 900, "data": [{"paperId": + string: '{"total": 133751, "offset": 800, "next": 900, "data": [{"paperId": "ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", "externalIds": {"MAG": "423839556", "DBLP": "conf/icalp/Selman79", "DOI": "10.1007/3-540-09510-1_44", "CorpusId": - 19866482}, "url": "https://www.semanticscholar.org/paper/ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", + 19866482}, "corpusId": 19866482, "publicationVenue": {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", + "name": "International Colloquium on Automata, Languages and Programming", + "type": "conference", "alternate_names": ["Int Conf Arab Lang Process", "International + Conference on Arabic Language Processing", "Int Colloq Autom Lang Program", + "ICALP"], "url": "http://www.eatcs.org/"}, "url": "https://www.semanticscholar.org/paper/ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", "title": "P-Selective Sets, Tally Languages, and the Behavior of Polynomial Time Reducibilities on NP", "abstract": null, "venue": "International Colloquium on Automata, Languages and Programming", "year": 1979, "referenceCount": 14, "citationCount": 126, "influentialCitationCount": 9, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1979-07-16", "journal": - {"pages": "546-555"}, "authors": [{"authorId": "2411373", "name": "A. Selman"}]}, - {"paperId": "a6b4c28ec03e7de37db312a00ff18c29df6c635f", "externalIds": {"MAG": - "2118835180", "DBLP": "journals/jsyml/Miller04", "DOI": "10.2178/jsl/1082418543", - "CorpusId": 6077600}, "url": "https://www.semanticscholar.org/paper/a6b4c28ec03e7de37db312a00ff18c29df6c635f", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1979-07-16", "journal": {"pages": "546-555"}, "authors": [{"authorId": "2411373", + "name": "A. Selman"}]}, {"paperId": "a6b4c28ec03e7de37db312a00ff18c29df6c635f", + "externalIds": {"MAG": "2118835180", "DBLP": "journals/jsyml/Miller04", "DOI": + "10.2178/jsl/1082418543", "CorpusId": 6077600}, "corpusId": 6077600, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/a6b4c28ec03e7de37db312a00ff18c29df6c635f", "title": "Degrees of unsolvability of continuous functions", "abstract": "Abstract. We show that the Turing degrees are not sufficient to measure the complexity of continuous functions on [0, 1]. Computability of continuous real functions @@ -16315,28 +18577,32 @@ interactions: f, g \u2208 [0,1] which compute exactly the same subsets of \u2115. Proofs draw from classical analysis and constructive analysis as well as from computability theory.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2004, "referenceCount": - 85, "citationCount": 61, "influentialCitationCount": 11, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-06-01", "journal": {"name": "Journal of Symbolic - Logic", "pages": "555 - 584", "volume": "69"}, "authors": [{"authorId": "2116336200", - "name": "Joseph S. Miller"}]}, {"paperId": "ae763fea6d225d48e6d803d0988a8b28378927b0", - "externalIds": {"DBLP": "journals/cacm/Karp86", "MAG": "2175294340", "DOI": - "10.1145/5657.5658", "CorpusId": 13284490}, "url": "https://www.semanticscholar.org/paper/ae763fea6d225d48e6d803d0988a8b28378927b0", + 85, "citationCount": 62, "influentialCitationCount": 11, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.math.wisc.edu/~jmiller/Papers/continuous.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2004-06-01", "journal": + {"name": "Journal of Symbolic Logic", "pages": "555 - 584", "volume": "69"}, + "authors": [{"authorId": "2116336200", "name": "Joseph S. Miller"}]}, {"paperId": + "ae763fea6d225d48e6d803d0988a8b28378927b0", "externalIds": {"DBLP": "journals/cacm/Karp86", + "MAG": "2175294340", "DOI": "10.1145/5657.5658", "CorpusId": 13284490}, "corpusId": + 13284490, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ae763fea6d225d48e6d803d0988a8b28378927b0", "title": "Combinatorics, complexity, and randomness", "abstract": "The 1985 Turing Award winner presents his perspective on the development of the field that has come to be called theoretical computer science.", "venue": "CACM", "year": 1986, "referenceCount": 1, "citationCount": 112, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=5658&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1986-02-01", "journal": {"name": "Commun. ACM", "pages": "97-109", "volume": "29"}, "authors": [{"authorId": "47546648", "name": "R. Karp"}]}, {"paperId": "63d497cc5d6344db34f7b0237547cdf1bed3d212", "externalIds": {"MAG": "2010262242", - "DOI": "10.3934/DCDSB.2007.8.95", "CorpusId": 11966633}, "url": "https://www.semanticscholar.org/paper/63d497cc5d6344db34f7b0237547cdf1bed3d212", + "DOI": "10.3934/DCDSB.2007.8.95", "CorpusId": 11966633}, "corpusId": 11966633, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/63d497cc5d6344db34f7b0237547cdf1bed3d212", "title": "INTERACTION OF DIFFUSION AND DELAY", "abstract": "For reaction-diffusion equations with delay, the joint effects of \ndiffusion and delay are studied. In particular, for \ntwo-dimensional systems where only the interaction between @@ -16345,15 +18611,20 @@ interactions: occur largely independent of delay. But \nperiodic oscillations, constant in space or with low spatial \nfrequency, can be achieved via increasing the delay or changing \nthe diffusion rates.", "venue": "", "year": 2007, "referenceCount": - 30, "citationCount": 49, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2007-04-01", "journal": {"name": - "Discrete and Continuous Dynamical Systems-series B", "pages": "95-105", "volume": - "8"}, "authors": [{"authorId": "2421983", "name": "K. Hadeler"}, {"authorId": - "145482898", "name": "S. Ruan"}]}, {"paperId": "17efc80ed75e3ad5bcc34cb28d755c96b5b4632e", - "externalIds": {"DBLP": "journals/siamcomp/LadnerLS84", "MAG": "1971842919", - "DOI": "10.1137/0213010", "CorpusId": 36478048}, "url": "https://www.semanticscholar.org/paper/17efc80ed75e3ad5bcc34cb28d755c96b5b4632e", + 30, "citationCount": 49, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2007-04-01", "journal": {"name": "Discrete and Continuous Dynamical Systems-series + B", "pages": "95-105", "volume": "8"}, "authors": [{"authorId": "2421983", + "name": "K. Hadeler"}, {"authorId": "145482898", "name": "S. Ruan"}]}, {"paperId": + "17efc80ed75e3ad5bcc34cb28d755c96b5b4632e", "externalIds": {"DBLP": "journals/siamcomp/LadnerLS84", + "MAG": "1971842919", "DOI": "10.1137/0213010", "CorpusId": 36478048}, "corpusId": + 36478048, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/17efc80ed75e3ad5bcc34cb28d755c96b5b4632e", "title": "Alternating Pushdown and Stack Automata", "abstract": "The classes of languages accepted by alternating pushdown automata, alternating stack automata, and alternating nonerasing stack automata, both with and without @@ -16362,16 +18633,19 @@ interactions: shown that alternating 2-way finite state machines accept only regular languages.", "venue": "SIAM journal on computing (Print)", "year": 1984, "referenceCount": 15, "citationCount": 104, "influentialCitationCount": 13, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1984-02-01", "journal": {"name": "SIAM J. Comput.", "pages": "135-155", "volume": "13"}, "authors": [{"authorId": "1762656", "name": "R. Ladner"}, {"authorId": "1728571", "name": "R. Lipton"}, {"authorId": "1678332", "name": "L. Stockmeyer"}]}, {"paperId": "2131fe72ba88fc11388ac82812189449c0b5592f", "externalIds": {"DBLP": "journals/jagi/Hibbard09", "MAG": "2121281219", "DOI": "10.2478/v10229-011-0004-6", - "CorpusId": 15355394}, "url": "https://www.semanticscholar.org/paper/2131fe72ba88fc11388ac82812189449c0b5592f", + "CorpusId": 15355394}, "corpusId": 15355394, "publicationVenue": {"id": "1dfcf1f0-80c5-4324-b2a5-b12ae03ea631", + "name": "Journal of Artificial General Intelligence", "type": "journal", "alternate_names": + ["J Artif Gen Intell"], "issn": "1946-0163", "url": "http://journal.agi-network.org/Home/tabid/72/Default.aspx"}, + "url": "https://www.semanticscholar.org/paper/2131fe72ba88fc11388ac82812189449c0b5592f", "title": "Bias and No Free Lunch in Formal Measures of Intelligence", "abstract": "Bias and No Free Lunch in Formal Measures of Intelligence This paper shows that a constraint on universal Turing machines is necessary for Legg''s and @@ -16379,14 +18653,20 @@ interactions: in terms of Turing machines, is adapted to finite state machines. A No Free Lunch result is proved for the finite version of the measure.", "venue": "Journal of Artificial General Intelligence", "year": 2009, "referenceCount": 12, "citationCount": - 36, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-12-01", "journal": - {"pages": "54 - 61", "volume": "1"}, "authors": [{"authorId": "39109261", - "name": "B. Hibbard"}]}, {"paperId": "1b494f2759fab9af40151ab78ca69a742fc74240", + 36, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://sciendo.com/pdf/10.2478/v10229-011-0004-6", "status": "HYBRID"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-12-01", "journal": {"pages": "54 - 61", "volume": "1"}, "authors": [{"authorId": + "39109261", "name": "B. Hibbard"}]}, {"paperId": "1b494f2759fab9af40151ab78ca69a742fc74240", "externalIds": {"MAG": "1974032946", "DBLP": "journals/jc/BrattkaH98", "DOI": - "10.1006/jcom.1998.0488", "CorpusId": 13094957}, "url": "https://www.semanticscholar.org/paper/1b494f2759fab9af40151ab78ca69a742fc74240", + "10.1006/jcom.1998.0488", "CorpusId": 13094957}, "corpusId": 13094957, "publicationVenue": + {"id": "fba01985-ff50-4c79-84af-551a22b63d72", "name": "Journal of Complexity", + "type": "journal", "alternate_names": ["J Complex"], "issn": "0885-064X", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/622865/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/0885064X", + "https://www.journals.elsevier.com/journal-of-complexity"]}, "url": "https://www.semanticscholar.org/paper/1b494f2759fab9af40151ab78ca69a742fc74240", "title": "Feasible Real Random Access Machines", "abstract": "We present a modified real RAM model which is equipped with the usual discrete and real-valued arithmetic operations and with a finite precision test >", "venue": "[1988] Proceedings. Structure in Complexity Theory Third Annual Conference", "year": 1988, "referenceCount": 10, "citationCount": 33, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1988-06-14", "journal": {"name": "[1988] - Proceedings. Structure in Complexity Theory Third Annual Conference", "pages": - "252-257"}, "authors": [{"authorId": "1982506", "name": "Juichi Shinoda"}, - {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": "474e3ccb078316be8cffaa72c1fe6e81029d3e57", - "externalIds": {"DBLP": "journals/jacm/LeongS81", "MAG": "2155561512", "DOI": - "10.1145/800105.803414", "CorpusId": 53223184}, "url": "https://www.semanticscholar.org/paper/474e3ccb078316be8cffaa72c1fe6e81029d3e57", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1988-06-14", "journal": {"name": "[1988] Proceedings. Structure in Complexity + Theory Third Annual Conference", "pages": "252-257"}, "authors": [{"authorId": + "1982506", "name": "Juichi Shinoda"}, {"authorId": "2867082", "name": "T. + Slaman"}]}, {"paperId": "474e3ccb078316be8cffaa72c1fe6e81029d3e57", "externalIds": + {"DBLP": "journals/jacm/LeongS81", "MAG": "2155561512", "DOI": "10.1145/800105.803414", + "CorpusId": 53223184}, "corpusId": 53223184, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/474e3ccb078316be8cffaa72c1fe6e81029d3e57", "title": "New real-time simulations of multihead tape units", "abstract": "Just as the Church-Turing thesis has simplified proofs of computability [8], efficient simulations of one computer model by another have simplified proofs @@ -18030,30 +20564,33 @@ interactions: best simulation brings the number of tapes for a multitape Turing machine implementation down from 41 to 20.", "venue": "Symposium on the Theory of Computing", "year": 1977, "referenceCount": 11, "citationCount": 31, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800105.803414", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "J. ACM", "pages": "166-180", "volume": "28"}, "authors": [{"authorId": "1828841", "name": "Benton L. Leong"}, {"authorId": "1704840", "name": "J. Seiferas"}]}, {"paperId": "11a5ea74651527da22b8de1d3cd55c313204427d", "externalIds": {"DBLP": "conf/focs/PaulR79", "MAG": "2017210730", "DOI": "10.1109/SFCS.1979.30", - "CorpusId": 5961693}, "url": "https://www.semanticscholar.org/paper/11a5ea74651527da22b8de1d3cd55c313204427d", + "CorpusId": 5961693}, "corpusId": 5961693, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/11a5ea74651527da22b8de1d3cd55c313204427d", "title": "On time versus space II", "abstract": "Logarithmically t(n)-time bounded RAMs can be simulated by t(n)/log t(n)-tape bounded Turing machines, t(n)-time bounded multidimensional multitape Turing machines can be simulated by t(n) loglog t(n)/log t(n)-tape bounded Turing machines.", "venue": "20th Annual Symposium on Foundations of Computer Science (sfcs 1979)", "year": 1979, "referenceCount": 12, "citationCount": 31, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1979-10-29", "journal": {"name": "20th Annual Symposium on Foundations of - Computer Science (sfcs 1979)", "pages": "298-306"}, "authors": [{"authorId": - "1727613", "name": "W. Paul"}, {"authorId": "2715951", "name": "R. Reischuk"}]}, - {"paperId": "8e746952cc08e6e0d6174faca3d3038ce06ea35b", "externalIds": {"MAG": - "1963576748", "DBLP": "journals/jacm/HopcroftU68a", "DOI": "10.1145/321466.321474", - "CorpusId": 17590217}, "url": "https://www.semanticscholar.org/paper/8e746952cc08e6e0d6174faca3d3038ce06ea35b", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1979-10-29", "journal": {"name": "20th Annual Symposium + on Foundations of Computer Science (sfcs 1979)", "pages": "298-306"}, "authors": + [{"authorId": "1727613", "name": "W. Paul"}, {"authorId": "2715951", "name": + "R. Reischuk"}]}, {"paperId": "8e746952cc08e6e0d6174faca3d3038ce06ea35b", + "externalIds": {"MAG": "1963576748", "DBLP": "journals/jacm/HopcroftU68a", + "DOI": "10.1145/321466.321474", "CorpusId": 17590217}, "corpusId": 17590217, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8e746952cc08e6e0d6174faca3d3038ce06ea35b", "title": "Relations Between Time and Tape Complexities", "abstract": "It is shown that if a language L is recognized by a (nondeterministic) single-tape Turing machine of time complexity T(n), @@ -18070,13 +20607,15 @@ interactions: if T (n) \u2265 n2/log n.", "venue": "JACM", "year": 1968, "referenceCount": 5, "citationCount": 35, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1968-07-01", "journal": - {"name": "J. ACM", "pages": "414-427", "volume": "15"}, "authors": [{"authorId": - "1706504", "name": "J. Hopcroft"}, {"authorId": "1742391", "name": "J. Ullman"}]}, - {"paperId": "c87041ddec5837d4a6dffb7ad91e48ab5fbf2474", "externalIds": {"DOI": - "10.32388/mu91ps", "CorpusId": 240909469}, "url": "https://www.semanticscholar.org/paper/c87041ddec5837d4a6dffb7ad91e48ab5fbf2474", + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/321466.321474", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1968-07-01", "journal": {"name": "J. ACM", "pages": "414-427", "volume": + "15"}, "authors": [{"authorId": "1706504", "name": "J. Hopcroft"}, {"authorId": + "1742391", "name": "J. Ullman"}]}, {"paperId": "c87041ddec5837d4a6dffb7ad91e48ab5fbf2474", + "externalIds": {"DOI": "10.32388/mu91ps", "CorpusId": 240909469}, "corpusId": + 240909469, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c87041ddec5837d4a6dffb7ad91e48ab5fbf2474", "title": "Graph", "abstract": "\u2014The incomplete information about the Web struc- ture causes inaccurate results of various ranking algorithms. In this paper, we propose a solution to this problem by formulating a new framework @@ -18088,25 +20627,34 @@ interactions: show that the Predictive Random Graph Ranking framework can improve the accuracy of the ranking algorithms such as PageRank, Common Neighbor, and Jaccard\u2019s Coef\ufb01cient.", "venue": "Data Structure and Algorithms Using C++", "year": - 2020, "referenceCount": 4, "citationCount": 366, "influentialCitationCount": - 25, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + 2020, "referenceCount": 4, "citationCount": 368, "influentialCitationCount": + 26, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.qeios.com/read/MU91PS/pdf", + "status": "HYBRID"}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-02-07", "journal": {"name": "Data Structure and Algorithms Using C++"}, "authors": [{"authorId": "35187534", "name": "C. Cal\u00ec"}]}, {"paperId": "256fd16c3434e31a92752c3a253cf53ea96b1f37", "externalIds": {"MAG": "2339540635", "DOI": "10.1038/532435a", "CorpusId": 4396530, "PubMed": "27121824"}, - "url": "https://www.semanticscholar.org/paper/256fd16c3434e31a92752c3a253cf53ea96b1f37", + "corpusId": 4396530, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/256fd16c3434e31a92752c3a253cf53ea96b1f37", "title": "Seven chemical separations to change the world", "abstract": null, - "venue": "Nature", "year": 2016, "referenceCount": 6, "citationCount": 1726, - "influentialCitationCount": 17, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry", - "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-04-28", "journal": {"name": "Nature", "pages": "435-437", "volume": - "532"}, "authors": [{"authorId": "2061805", "name": "D. Sholl"}, {"authorId": - "2832408", "name": "Ryan P. Lively"}]}, {"paperId": "941f318e41147773ae69d9da4f8de9b8dbea70f4", - "externalIds": {"DBLP": "conf/www/ShenHGDM14", "MAG": "2186845332", "DOI": - "10.1145/2567948.2577348", "CorpusId": 207210855}, "url": "https://www.semanticscholar.org/paper/941f318e41147773ae69d9da4f8de9b8dbea70f4", + "venue": "Nature", "year": 2016, "referenceCount": 6, "citationCount": 1743, + "influentialCitationCount": 17, "isOpenAccess": true, "openAccessPdf": {"url": + "http://www.nature.com:80/polopoly_fs/1.19799!/menu/main/topColumns/topLeftColumn/pdf/532435a-corr.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-28", "journal": + {"name": "Nature", "pages": "435-437", "volume": "532"}, "authors": [{"authorId": + "2061805", "name": "D. Sholl"}, {"authorId": "2832408", "name": "Ryan P. Lively"}]}, + {"paperId": "941f318e41147773ae69d9da4f8de9b8dbea70f4", "externalIds": {"DBLP": + "conf/www/ShenHGDM14", "MAG": "2186845332", "DOI": "10.1145/2567948.2577348", + "CorpusId": 207210855}, "corpusId": 207210855, "publicationVenue": {"id": + "e07422f9-c065-40c3-a37b-75e98dce79fe", "name": "The Web Conference", "type": + "conference", "alternate_names": ["Web Conf", "WWW"], "url": "http://www.iw3c2.org/"}, + "url": "https://www.semanticscholar.org/paper/941f318e41147773ae69d9da4f8de9b8dbea70f4", "title": "Learning semantic representations using convolutional neural networks for web search", "abstract": "This paper presents a series of new latent semantic models based on a convolutional neural network (CNN) to learn low-dimensional @@ -18121,17 +20669,19 @@ interactions: a large-scale, real-world data set. Results show that our model significantly outperforms other se-mantic models, which were state-of-the-art in retrieval performance prior to this work.", "venue": "The Web Conference", "year": 2014, - "referenceCount": 12, "citationCount": 617, "influentialCitationCount": 59, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", - "Conference"], "publicationDate": "2014-04-07", "journal": {"name": "Proceedings - of the 23rd International Conference on World Wide Web"}, "authors": [{"authorId": - "1752875", "name": "Yelong Shen"}, {"authorId": "144137069", "name": "Xiaodong - He"}, {"authorId": "1800422", "name": "Jianfeng Gao"}, {"authorId": "144718788", - "name": "L. Deng"}, {"authorId": "1935910", "name": "G. Mesnil"}]}, {"paperId": - "2e5a0041de93c4c19a1ef6abc0d08589c226ad59", "externalIds": {"MAG": "2136309462", - "DOI": "10.4208/CICP.291210.290411S", "CorpusId": 9268377}, "url": "https://www.semanticscholar.org/paper/2e5a0041de93c4c19a1ef6abc0d08589c226ad59", + "referenceCount": 12, "citationCount": 621, "influentialCitationCount": 59, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": + "2014-04-07", "journal": {"name": "Proceedings of the 23rd International Conference + on World Wide Web"}, "authors": [{"authorId": "1752875", "name": "Yelong Shen"}, + {"authorId": "144137069", "name": "Xiaodong He"}, {"authorId": "1800422", + "name": "Jianfeng Gao"}, {"authorId": "144718788", "name": "L. Deng"}, {"authorId": + "1935910", "name": "Gr\u00e9goire Mesnil"}]}, {"paperId": "2e5a0041de93c4c19a1ef6abc0d08589c226ad59", + "externalIds": {"MAG": "2136309462", "DOI": "10.4208/CICP.291210.290411S", + "CorpusId": 9268377}, "corpusId": 9268377, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2e5a0041de93c4c19a1ef6abc0d08589c226ad59", "title": "Numerical Methods for Fluid-Structure Interaction \u2014 A Review", "abstract": "The interactions between incompressible fluid flows and immersed struc- tures are nonlinear multi-physics phenomena that have applications @@ -18143,16 +20693,17 @@ interactions: efficiency. We discuss challenges faced by researchers in this field, and we emphasize the importance of interdisciplinary effort for advancing the study in fluid-structure interactions.", "venue": "", "year": 2012, "referenceCount": - 181, "citationCount": 545, "influentialCitationCount": 21, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2012-08-01", "journal": - {"name": "Communications in Computational Physics", "pages": "337-377", "volume": - "12"}, "authors": [{"authorId": "2103607", "name": "G. Hou"}, {"authorId": - "2143719184", "name": "Jin Wang"}, {"authorId": "1741629", "name": "A. Layton"}]}, - {"paperId": "70031c04b064599eea66255d2ac2acb679969858", "externalIds": {"MAG": - "2189533845", "DOI": "10.2307/j.ctv1mgm7ng", "CorpusId": 61218822}, "url": - "https://www.semanticscholar.org/paper/70031c04b064599eea66255d2ac2acb679969858", + 181, "citationCount": 548, "influentialCitationCount": 21, "isOpenAccess": + true, "openAccessPdf": {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/359AE654882EAFB08CAAA862AC7B05AC/S1815240600003029a.pdf/div-class-title-numerical-methods-for-fluid-structure-interaction-a-review-div.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2012-08-01", "journal": {"name": "Communications in Computational Physics", + "pages": "337-377", "volume": "12"}, "authors": [{"authorId": "2103607", "name": + "G. Hou"}, {"authorId": "2143719184", "name": "Jin Wang"}, {"authorId": "1741629", + "name": "A. Layton"}]}, {"paperId": "70031c04b064599eea66255d2ac2acb679969858", + "externalIds": {"MAG": "2189533845", "DOI": "10.2307/j.ctv1mgm7ng", "CorpusId": + 61218822}, "corpusId": 61218822, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/70031c04b064599eea66255d2ac2acb679969858", "title": "The Tacit Dimension", "abstract": "''Without symbolism the life of man would be like that of the prisoners in the cave of Plato''s simile\u2026confined within the limits of his biological needs and practical interests; it could @@ -18179,14 +20730,16 @@ interactions: agents that use them to achieve their purposes. Only if the processing of symbolic representations is related to the tacit context within which they become meaningful, does a semantic engine becomes possible.", "venue": "", - "year": 2003, "referenceCount": 32, "citationCount": 6379, "influentialCitationCount": - 438, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "year": 2003, "referenceCount": 32, "citationCount": 6434, "influentialCitationCount": + 442, "isOpenAccess": true, "openAccessPdf": {"url": "https://library.oapen.org/bitstream/20.500.12657/48467/1/9789461663801.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145922372", "name": "C. P. Goodman"}]}, {"paperId": "12e77f2f563d1464fa299e066f4ef4a9673a7afb", "externalIds": {"MAG": "2051576146", "DOI": "10.1111/1467-8721.EP10768783", - "CorpusId": 144390805}, "url": "https://www.semanticscholar.org/paper/12e77f2f563d1464fa299e066f4ef4a9673a7afb", + "CorpusId": 144390805}, "corpusId": 144390805, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/12e77f2f563d1464fa299e066f4ef4a9673a7afb", "title": "Statistical Power Analysis", "abstract": "pression, Journal of Clinical Psychiatry, 51, 61-69 (1990). 11. L.R. Baxter, Jr., J.M. Schwartz, B.H. Guze, J.C. Mazziotta, M.P. Szuba, K. Bergman, A. Alazraki, C.E. Selin, H.K. Freng, @@ -18202,15 +20755,15 @@ interactions: M. Gross, T.A. Mellman, M.B. Stein, P. Goyer, A.C. King, T.W. Uhde, and R.M. Cohen, Cerebral glucose metabolic differences in patients with panic disorder, Neuro psychopharmacology, 3, 261-272 (1990).", "venue": "", "year": 1992, - "referenceCount": 10, "citationCount": 4221, "influentialCitationCount": 818, - "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-06-01", "journal": {"name": "Current Directions in Psychological Science", - "pages": "101 - 98", "volume": "1"}, "authors": [{"authorId": "145670758", - "name": "Jacob Cohen"}]}, {"paperId": "3835e277046e162b960e007808b54fea44753397", + "referenceCount": 10, "citationCount": 4229, "influentialCitationCount": 819, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-06-01", "journal": {"name": "Current Directions in + Psychological Science", "pages": "101 - 98", "volume": "1"}, "authors": [{"authorId": + "145670758", "name": "Jacob Cohen"}]}, {"paperId": "3835e277046e162b960e007808b54fea44753397", "externalIds": {"MAG": "95649271", "DOI": "10.1002/SMJ.4250171107", "CorpusId": - 17368130}, "url": "https://www.semanticscholar.org/paper/3835e277046e162b960e007808b54fea44753397", + 17368130}, "corpusId": 17368130, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3835e277046e162b960e007808b54fea44753397", "title": "Modularity, flexibility, and knowledge management in product and organization design", "abstract": "This pczper investigcztes irzterrelationslzi~~s of product design, orgcznization design, processes for leartlirzg and managing @@ -18231,16 +20784,17 @@ interactions: based on cztz irztentionczl, carefully mcznaged loose coupling of (I firm''s learning processes czt architec- tural cznd comporzent levels of product crecztiorz processes.", "venue": "", "year": 1996, "referenceCount": 89, "citationCount": - 2511, "influentialCitationCount": 199, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Economics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Economics", "source": "external"}, - {"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-12-01", - "journal": {"name": "IEEE Engineering Management Review", "pages": "50-61", - "volume": "25"}, "authors": [{"authorId": "39949692", "name": "R. Sanchez"}, - {"authorId": "31655029", "name": "Joseph T. Mahoney"}]}, {"paperId": "389e37775bc407d17e4e0a3c05b22b92c3a16b69", - "externalIds": {"MAG": "2026444402", "DOI": "10.1103/REVMODPHYS.71.1253", - "CorpusId": 33553705}, "url": "https://www.semanticscholar.org/paper/389e37775bc407d17e4e0a3c05b22b92c3a16b69", + 2517, "influentialCitationCount": 199, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Economics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Economics", + "source": "external"}, {"category": "Computer Science", "source": "external"}, + {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1996-12-01", "journal": {"name": "IEEE Engineering Management + Review", "pages": "50-61", "volume": "25"}, "authors": [{"authorId": "39949692", + "name": "R. Sanchez"}, {"authorId": "31655029", "name": "Joseph T. Mahoney"}]}, + {"paperId": "389e37775bc407d17e4e0a3c05b22b92c3a16b69", "externalIds": {"MAG": + "2026444402", "DOI": "10.1103/REVMODPHYS.71.1253", "CorpusId": 33553705}, + "corpusId": 33553705, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/389e37775bc407d17e4e0a3c05b22b92c3a16b69", "title": "Nobel Lecture: Electronic structure of matter-wave functions and density functionals", "abstract": "In the intervening more than six decades enormous progress has been made in finding approximate solutions of Schrodinger''s @@ -18257,23 +20811,13 @@ interactions: The first is in the area of fundamental understanding. Theoretical chemists and physicists, following the path of the Schrodinger equation, have become accustomed to think in terms of a truncated Hilbert space of single-", "venue": - "", "year": 1999, "referenceCount": 6, "citationCount": 1830, "influentialCitationCount": - 81, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-10-01", - "journal": {"name": "Reviews of Modern Physics", "pages": "1253-1266", "volume": - "71"}, "authors": [{"authorId": "38338926", "name": "W. Kohn"}]}, {"paperId": - "1a97ecaf1f067c44135fd3161a5c80a3497cb344", "externalIds": {"DBLP": "books/daglib/0025273", - "MAG": "1605417594", "DOI": "10.1007/978-1-4612-0003-1", "CorpusId": 117710456}, - "url": "https://www.semanticscholar.org/paper/1a97ecaf1f067c44135fd3161a5c80a3497cb344", - "title": "Foundations of Time-Frequency Analysis", "abstract": null, "venue": - "Applied and Numerical Harmonic Analysis", "year": 2000, "referenceCount": - 0, "citationCount": 1401, "influentialCitationCount": 132, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-12-15", "journal": {"pages": - "I-XV, 1-359"}, "authors": [{"authorId": "2986384", "name": "K. Gr\u00f6chenig"}]}]} + "", "year": 1999, "referenceCount": 6, "citationCount": 1836, "influentialCitationCount": + 83, "isOpenAccess": true, "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/RevModPhys.71.1253", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-10-01", "journal": {"name": + "Reviews of Modern Physics", "pages": "1253-1266", "volume": "71"}, "authors": + [{"authorId": "38338926", "name": "W. Kohn"}]}]} ' headers: @@ -18282,31 +20826,31 @@ interactions: Connection: - keep-alive Content-Length: - - '161878' + - '187736' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:32 GMT + - Tue, 03 Jan 2023 20:53:00 GMT Via: - - 1.1 66e033c5d10bcbd4e2ec7dc233d3bb5a.cloudfront.net (CloudFront) + - 1.1 b119d190fd68a1b5c82101503504cff2.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - C53v2RoOcJh8VzT2NlGNkVFk1ix7Jio8Qq3_m1qviUaWKf01qdNKkQ== + - 7kHz3qAbGMgAcJ5uGEDU_PNTtK1RU-2efGRk2nQg2vaieyL5UZWIbQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detF-Hv0vHcFvsQ= + - eLxS9HB_vHcFXqg= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '161878' + - '187736' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:32 GMT + - Tue, 03 Jan 2023 20:53:00 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 95e5bc07-f704-4804-967b-d6d30aca7a77 + - dbff4a46-9c1b-46a7-ab5a-35faaa20a4fa status: code: 200 message: OK @@ -18322,127 +20866,28 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=900&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=900&limit=100 response: body: - string: '{"total": 133388, "offset": 900, "next": 1000, "data": [{"paperId": - "70031c04b064599eea66255d2ac2acb679969858", "externalIds": {"MAG": "2189533845", - "DOI": "10.2307/j.ctv1mgm7ng", "CorpusId": 61218822}, "url": "https://www.semanticscholar.org/paper/70031c04b064599eea66255d2ac2acb679969858", - "title": "The Tacit Dimension", "abstract": "''Without symbolism the life - of man would be like that of the prisoners in the cave of Plato''s simile\u2026confined - within the limits of his biological needs and practical interests; it could - find no access to the \"ideal world\" which is opened to him from different - sides by religion, art, philosophy, science.'' Ernst Cassirer 1 ABSTRACT I - begin by outlining some of the positions that have been taken by those who - have reflected upon the nature of language. In his early work Wittgenstein - asserts that language becomes meaningful when we tacitly adhere to the rules - of logic. In his later work he claims that lan- guages become meaningful when - they are situated within forms of life. Polanyi describes language as a toolbox - for deploying our tacit awareness. A meaning is generated when a point of - view attends from a subsidiary to a focal awareness. Languages re-present - these meanings. Although all languages rely upon rules, what it is to be a - meaning is not reduc- ible to rules. Nor is there a universal grammar. Because - it renders abstract reflection possi- ble, language renders minds possible. - A mind is not the product of an innate language of thought; it is a consequence - of indwelling within a natural language. Indwelling within languages enables - us to access new realities. Languages however do not supply us with the boundaries - of the world. Not only do we know more than we can say, we can also say more - than we know. The ultimate context of our linguistic meanings is not our social - practices; it is our embodied awareness of the world. A representationalist - account is in accordance with the view that minds are Turing machines. But - the symbols processed by a Turing ma- chine derive their meaning from the - agents that use them to achieve their purposes. Only if the processing of - symbolic representations is related to the tacit context within which they - become meaningful, does a semantic engine becomes possible.", "venue": "", - "year": 2003, "referenceCount": 32, "citationCount": 6379, "influentialCitationCount": - 438, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145922372", - "name": "C. P. Goodman"}]}, {"paperId": "3835e277046e162b960e007808b54fea44753397", - "externalIds": {"MAG": "95649271", "DOI": "10.1002/SMJ.4250171107", "CorpusId": - 17368130}, "url": "https://www.semanticscholar.org/paper/3835e277046e162b960e007808b54fea44753397", - "title": "Modularity, flexibility, and knowledge management in product and - organization design", "abstract": "This pczper investigcztes irzterrelationslzi~~s - of product design, orgcznization design, processes for leartlirzg and managing - knowledge, arzd competitive strategy. This paper uses the principles of nearly - decotnposable systems to investigate the ability of strind(irdized interfcices - between components in cz product design to embed coordination of product development - processes. Embedded coordination creates ''hierczrchical coordination'' without - the need to continually exercise authority-erzcrblirlg effective coordination - of processes without the tight coupling of orgcznizationczl structures. We - develop concepts of modularity in product and organization designs based orz - smndcirdized component and organization interjczces. Modular product architec- - tures create information structures that provide the ''glue'' that holds together - the loosely coupled parts of a modular orgatzizatiorz design. By fczcilitriting - loose coupling, modularity can czlso reduce the cost and dyficulty of adaptive - coordination, thereby incrensing the strategic flexibility of firms to respond - to erzvironmentnl change. Modularity in product and organizcztion designs - therefore etznbles cz new strcitegic approach to the management of knowledge - based on cztz irztentionczl, carefully mcznaged loose coupling of (I firm''s - learning processes czt architec- tural cznd comporzent levels of product crecztiorz - processes.", "venue": "", "year": 1996, "referenceCount": 89, "citationCount": - 2511, "influentialCitationCount": 199, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Economics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Economics", "source": "external"}, - {"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-12-01", - "journal": {"name": "IEEE Engineering Management Review", "pages": "50-61", - "volume": "25"}, "authors": [{"authorId": "39949692", "name": "R. Sanchez"}, - {"authorId": "31655029", "name": "Joseph T. Mahoney"}]}, {"paperId": "389e37775bc407d17e4e0a3c05b22b92c3a16b69", - "externalIds": {"MAG": "2026444402", "DOI": "10.1103/REVMODPHYS.71.1253", - "CorpusId": 33553705}, "url": "https://www.semanticscholar.org/paper/389e37775bc407d17e4e0a3c05b22b92c3a16b69", - "title": "Nobel Lecture: Electronic structure of matter-wave functions and - density functionals", "abstract": "In the intervening more than six decades - enormous progress has been made in finding approximate solutions of Schrodinger''s - wave equation for systems with several electrons, decisively aided by modern - electronic com- puters. The outstanding contributions of my Nobel Prize co-winner - John Pople are in this area. The main objec- tive of the present account is - to explicate DFT, which is an alternative approach to the theory of electronic - struc- ture, in which the electron density distribution n(r), rather than - the many-electron wave function, plays a central role. I felt that it would - be useful to do this in a comparative context; hence the wording ''''Wave - Func- tions and Density Functionals'''' in the title. In my view DFT makes - two kinds of contribution to the science of multiparticle quantum systems, - including problems of electronic structure of molecules and of condensed matter. - The first is in the area of fundamental understanding. Theoretical chemists - and physicists, following the path of the Schrodinger equation, have become - accustomed to think in terms of a truncated Hilbert space of single-", "venue": - "", "year": 1999, "referenceCount": 6, "citationCount": 1830, "influentialCitationCount": - 81, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-10-01", - "journal": {"name": "Reviews of Modern Physics", "pages": "1253-1266", "volume": - "71"}, "authors": [{"authorId": "38338926", "name": "W. Kohn"}]}, {"paperId": - "1a97ecaf1f067c44135fd3161a5c80a3497cb344", "externalIds": {"DBLP": "books/daglib/0025273", - "MAG": "1605417594", "DOI": "10.1007/978-1-4612-0003-1", "CorpusId": 117710456}, - "url": "https://www.semanticscholar.org/paper/1a97ecaf1f067c44135fd3161a5c80a3497cb344", - "title": "Foundations of Time-Frequency Analysis", "abstract": null, "venue": - "Applied and Numerical Harmonic Analysis", "year": 2000, "referenceCount": - 0, "citationCount": 1401, "influentialCitationCount": 132, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-12-15", "journal": {"pages": - "I-XV, 1-359"}, "authors": [{"authorId": "2986384", "name": "K. Gr\u00f6chenig"}]}, - {"paperId": "9d5085f3008a60abd7e53bc7f16963c4db32e342", "externalIds": {"MAG": - "2049410986", "DOI": "10.1177/027836498500400201", "CorpusId": 121737271}, - "url": "https://www.semanticscholar.org/paper/9d5085f3008a60abd7e53bc7f16963c4db32e342", + string: '{"total": 133751, "offset": 900, "next": 1000, "data": [{"paperId": + "9d5085f3008a60abd7e53bc7f16963c4db32e342", "externalIds": {"MAG": "2049410986", + "DOI": "10.1177/027836498500400201", "CorpusId": 121737271}, "corpusId": 121737271, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9d5085f3008a60abd7e53bc7f16963c4db32e342", "title": "Manipulability of Robotic Mechanisms", "abstract": "This paper discusses the manipulating ability of robotic mechanisms in positioning and orienting end-effectors and proposes a measure of manipulability. Some properties of this measure are obtained, the best postures of various types of manipulators are given, and a four-degree-of-freedom finger is considered from the viewpoint of the measure. The pos tures somewhat resemble those of human arms and fingers.", - "venue": "", "year": 1985, "referenceCount": 7, "citationCount": 2227, "influentialCitationCount": - 120, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1985-06-01", "journal": {"name": "The International Journal of Robotics Research", - "pages": "3 - 9", "volume": "4"}, "authors": [{"authorId": "1796280", "name": - "T. Yoshikawa"}]}, {"paperId": "f45b8c829c51803eaf6383c2b2486e9eacfa03c2", + "venue": "", "year": 1985, "referenceCount": 7, "citationCount": 2245, "influentialCitationCount": + 121, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1985-06-01", "journal": {"name": "The International Journal + of Robotics Research", "pages": "3 - 9", "volume": "4"}, "authors": [{"authorId": + "1796280", "name": "T. Yoshikawa"}]}, {"paperId": "f45b8c829c51803eaf6383c2b2486e9eacfa03c2", "externalIds": {"MAG": "2128974637", "DOI": "10.5194/TC-6-1295-2012", "CorpusId": - 73540534}, "url": "https://www.semanticscholar.org/paper/f45b8c829c51803eaf6383c2b2486e9eacfa03c2", + 73540534}, "corpusId": 73540534, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f45b8c829c51803eaf6383c2b2486e9eacfa03c2", "title": "Past and future sea-level change from the surface mass balance of glaciers", "abstract": "We present estimates of sea-level change caused by the global surface mass balance of glaciers, based on the reconstruction and @@ -18468,16 +20913,22 @@ interactions: the biggest source of uncer- tainty. Ice mass loss rates are projected to peak 2040 2050 (RCP26), 2050 2060 (RCP45), 2070 2090 (RCP60), or 2070 2100 (RCP85).", "venue": "", "year": 2012, "referenceCount": 56, "citationCount": - 471, "influentialCitationCount": 48, "isOpenAccess": true, "fieldsOfStudy": - ["Environmental Science"], "s2FieldsOfStudy": [{"category": "Environmental - Science", "source": "external"}, {"category": "Environmental Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-11-12", - "journal": {"name": "The Cryosphere", "pages": "1295-1322", "volume": "6"}, - "authors": [{"authorId": "4623587", "name": "B. Marzeion"}, {"authorId": "50301282", - "name": "A. Jarosch"}, {"authorId": "9366178", "name": "Marlis Hofer"}]}, - {"paperId": "a574e320d899e7e82e341eb64baef7dfe8a24642", "externalIds": {"MAG": - "2977626681", "ACL": "W96-0213", "DBLP": "conf/emnlp/Ratnaparkhi96", "CorpusId": - 5914287}, "url": "https://www.semanticscholar.org/paper/a574e320d899e7e82e341eb64baef7dfe8a24642", + 473, "influentialCitationCount": 48, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.the-cryosphere.net/6/1295/2012/tc-6-1295-2012.pdf", "status": + "GOLD"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": + "Environmental Science", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2012-11-12", "journal": {"name": "The Cryosphere", "pages": "1295-1322", + "volume": "6"}, "authors": [{"authorId": "4623587", "name": "B. Marzeion"}, + {"authorId": "50301282", "name": "A. Jarosch"}, {"authorId": "9366178", "name": + "Marlis Hofer"}]}, {"paperId": "a574e320d899e7e82e341eb64baef7dfe8a24642", + "externalIds": {"MAG": "2977626681", "ACL": "W96-0213", "DBLP": "conf/emnlp/Ratnaparkhi96", + "CorpusId": 5914287}, "corpusId": 5914287, "publicationVenue": {"id": "41bf9ed3-85b3-4c90-b015-150e31690253", + "name": "Conference on Empirical Methods in Natural Language Processing", + "type": "conference", "alternate_names": ["Empir Method Nat Lang Process", + "Empirical Methods in Natural Language Processing", "Conf Empir Method Nat + Lang Process", "EMNLP"], "url": "https://www.aclweb.org/portal/emnlp"}, "url": + "https://www.semanticscholar.org/paper/a574e320d899e7e82e341eb64baef7dfe8a24642", "title": "A Maximum Entropy Model for Part-Of-Speech Tagging", "abstract": "This paper presents a statistical model which trains from a corpus annotated with Part Of Speech tags and assigns them to previously unseen text with state @@ -18488,13 +20939,14 @@ interactions: the implementation of these features and proposes a training strategy that mitigates these problems", "venue": "Conference on Empirical Methods in Natural Language Processing", "year": 1996, "referenceCount": 21, "citationCount": - 1571, "influentialCitationCount": 118, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1793475", - "name": "A. Ratnaparkhi"}]}, {"paperId": "1a709a5309048ef6badb80deb66c6d6ed774446e", - "externalIds": {"MAG": "101096562", "CorpusId": 37493104}, "url": "https://www.semanticscholar.org/paper/1a709a5309048ef6badb80deb66c6d6ed774446e", + 1572, "influentialCitationCount": 118, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "1793475", "name": "A. Ratnaparkhi"}]}, {"paperId": "1a709a5309048ef6badb80deb66c6d6ed774446e", + "externalIds": {"MAG": "101096562", "CorpusId": 37493104}, "corpusId": 37493104, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1a709a5309048ef6badb80deb66c6d6ed774446e", "title": "TEMPERATURE AND PHYTOPLANKTON GROWTH IN THE SEA", "abstract": "The variation in growth rate with temperature of unicellular algae suggests that an equation can be written to describe the maximum expected growth rate for @@ -18516,13 +20968,19 @@ interactions: expectation. The variation in maximum expected growth rate with temperature seems a logical starting point for modeling phytoplankton growth and photosynthesis in the sea.", "venue": "", "year": 1972, "referenceCount": 94, "citationCount": - 2371, "influentialCitationCount": 229, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": null, "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "96804368", "name": "W. Richard"}]}, {"paperId": - "deefeb755e5dd7aebf5ef1715e433d0311cca973", "externalIds": {"DOI": "10.1021/ac60315a742", - "CorpusId": 206367494, "PubMed": "22741866"}, "url": "https://www.semanticscholar.org/paper/deefeb755e5dd7aebf5ef1715e433d0311cca973", + 2373, "influentialCitationCount": 229, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "96804368", "name": "W. Richard"}]}, + {"paperId": "deefeb755e5dd7aebf5ef1715e433d0311cca973", "externalIds": {"DOI": + "10.1021/ac60315a742", "CorpusId": 206367494, "PubMed": "22741866"}, "corpusId": + 206367494, "publicationVenue": {"id": "164cf9d6-c9e8-41f0-b15d-00fa34cb4bd1", + "name": "Analytical Chemistry", "type": "journal", "alternate_names": ["Anal + Chem"], "issn": "0003-2700", "alternate_issns": ["2154-2686"], "url": "https://pubs.acs.org/journal/ancham", + "alternate_urls": ["http://pubs.acs.org/journals/ancham/index.html", "http://pubs.acs.org/journals/ancham/", + "http://www.crcnetbase.com/series/crcanalytche", "http://pubs.acs.org/journal/ancham", + "https://pubs.acs.org/loi/ancham"]}, "url": "https://www.semanticscholar.org/paper/deefeb755e5dd7aebf5ef1715e433d0311cca973", "title": "Academic press.", "abstract": "CONTENTS: Basic Principles, Definitions, and Units. ORD and CD of Organic Functional Groups. Solvent and Tempera\u00ad ture Effects. Amides, Peptides, Nucleosides, Nucleotides, Pigments, and Porphyrins. @@ -18530,15 +20988,20 @@ interactions: Dispersion and Magnetic Circular Dichroism. Appendix. Problems. Table of Rules Presently Available in ORD-CD. Table of Compounds, Functional Groups, and Chromophores.", "venue": "Analytical Chemistry", "year": 1972, "referenceCount": - 0, "citationCount": 2186, "influentialCitationCount": 158, "isOpenAccess": - false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Analytical chemistry", "pages": "\n 56A\n ", "volume": - "44 7"}, "authors": [{"authorId": "3272681", "name": "O. H. Lowry"}]}, {"paperId": - "33a9d1a702eb75da709d26c44aaeb7c2015c870b", "externalIds": {"DBLP": "conf/acl/FlaniganTCDS14", - "ACL": "P14-1134", "MAG": "2149837184", "DOI": "10.3115/v1/P14-1134", "CorpusId": - 5000956}, "url": "https://www.semanticscholar.org/paper/33a9d1a702eb75da709d26c44aaeb7c2015c870b", + 0, "citationCount": 2188, "influentialCitationCount": 159, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Analytical chemistry", "pages": "\n 56A\n ", + "volume": "44 7"}, "authors": [{"authorId": "3272681", "name": "O. H. Lowry"}]}, + {"paperId": "33a9d1a702eb75da709d26c44aaeb7c2015c870b", "externalIds": {"DBLP": + "conf/acl/FlaniganTCDS14", "ACL": "P14-1134", "MAG": "2149837184", "DOI": + "10.3115/v1/P14-1134", "CorpusId": 5000956}, "corpusId": 5000956, "publicationVenue": + {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", "name": "Annual Meeting of + the Association for Computational Linguistics", "type": "conference", "alternate_names": + ["Annu Meet Assoc Comput Linguistics", "Meeting of the Association for Computational + Linguistics", "ACL", "Meet Assoc Comput Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, + "url": "https://www.semanticscholar.org/paper/33a9d1a702eb75da709d26c44aaeb7c2015c870b", "title": "A Discriminative Graph-Based Parser for the Abstract Meaning Representation", "abstract": "Abstract Meaning Representation (AMR) is a semantic formalism for which a grow- ing set of annotated examples is avail- able. We introduce @@ -18552,7 +21015,8 @@ interactions: open-source sys- tem, JAMR, is available at: http://github.com/jflanigan/jamr", "venue": "Annual Meeting of the Association for Computational Linguistics", "year": 2014, "referenceCount": 46, "citationCount": 304, "influentialCitationCount": - 86, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 86, "isOpenAccess": true, "openAccessPdf": {"url": "https://aclanthology.org/P14-1134.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2014-06-01", "journal": {"pages": "1426-1436"}, @@ -18561,7 +21025,11 @@ interactions: Carbonell"}, {"authorId": "1745899", "name": "Chris Dyer"}, {"authorId": "144365875", "name": "Noah A. Smith"}]}, {"paperId": "17d451204a460a4739c7b1627a128a125f4af120", "externalIds": {"MAG": "1568555062", "DBLP": "conf/uai/VermaP90", "DOI": "10.1145/3501714.3501732", - "CorpusId": 27807863}, "url": "https://www.semanticscholar.org/paper/17d451204a460a4739c7b1627a128a125f4af120", + "CorpusId": 27807863}, "corpusId": 27807863, "publicationVenue": {"id": "f9af8000-42f8-410d-a622-e8811e41660a", + "name": "Conference on Uncertainty in Artificial Intelligence", "type": "conference", + "alternate_names": ["Uncertainty in Artificial Intelligence", "UAI", "Conf + Uncertain Artif Intell", "Uncertain Artif Intell"], "url": "http://www.auai.org/"}, + "url": "https://www.semanticscholar.org/paper/17d451204a460a4739c7b1627a128a125f4af120", "title": "Equivalence and Synthesis of Causal Models", "abstract": "Abstract Scientists often use directed acyclic graphs (dags) to model the qualitative struc\u00ad ture of causal theories, allowing the parameters to be estimated @@ -18577,15 +21045,16 @@ interactions: to a model theoretic definition of causation in terms of statistical dependencies. Equivalence and Synthesis of Causal Models", "venue": "Conference on Uncertainty in Artificial Intelligence", "year": 1990, "referenceCount": 20, "citationCount": - 1289, "influentialCitationCount": 126, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": - "1990-07-27", "journal": {"name": "Probabilistic and Causal Inference"}, "authors": - [{"authorId": "1988445", "name": "Thomas Verma"}, {"authorId": "145430701", - "name": "J. Pearl"}]}, {"paperId": "1b07c0a4e9537bebcef46b30e06acda288f7cfbd", + 1300, "influentialCitationCount": 126, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "1990-07-27", "journal": {"name": "Probabilistic + and Causal Inference"}, "authors": [{"authorId": "1988445", "name": "Thomas + Verma"}, {"authorId": "145430701", "name": "J. Pearl"}]}, {"paperId": "1b07c0a4e9537bebcef46b30e06acda288f7cfbd", "externalIds": {"MAG": "2147307405", "DOI": "10.1177/017084069701800104", - "CorpusId": 145691109}, "url": "https://www.semanticscholar.org/paper/1b07c0a4e9537bebcef46b30e06acda288f7cfbd", + "CorpusId": 145691109}, "corpusId": 145691109, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1b07c0a4e9537bebcef46b30e06acda288f7cfbd", "title": "Strategic Choice in the Analysis of Action, Structure, Organizations and Environment: Retrospect and Prospect", "abstract": "This paper examines the place of the strategic choice perspective in the study of organizations @@ -18594,14 +21063,15 @@ interactions: from it. The paper discusses the integrative potential of strategic choice theory within organization studies and examines its contribu tion to an evolutionary perspective on the subject.", "venue": "", "year": 1997, "referenceCount": - 82, "citationCount": 1136, "influentialCitationCount": 83, "isOpenAccess": - false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1997-01-01", - "journal": {"name": "Organization Studies", "pages": "43 - 76", "volume": - "18"}, "authors": [{"authorId": "145515380", "name": "J. Child"}]}, {"paperId": - "5a9e85af0bc45472e9c14e956819f1324085aaa1", "externalIds": {"MAG": "1965398296", - "DOI": "10.4304/JAIT.1.1.4-20", "CorpusId": 14774186}, "url": "https://www.semanticscholar.org/paper/5a9e85af0bc45472e9c14e956819f1324085aaa1", + 82, "citationCount": 1144, "influentialCitationCount": 84, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "1997-01-01", "journal": {"name": "Organization Studies", + "pages": "43 - 76", "volume": "18"}, "authors": [{"authorId": "145515380", + "name": "J. Child"}]}, {"paperId": "5a9e85af0bc45472e9c14e956819f1324085aaa1", + "externalIds": {"MAG": "1965398296", "DOI": "10.4304/JAIT.1.1.4-20", "CorpusId": + 14774186}, "corpusId": 14774186, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a9e85af0bc45472e9c14e956819f1324085aaa1", "title": "A Review of Machine Learning Algorithms for Text-Documents Classification", "abstract": "With the increasing availability of electronic documents and the rapid growth of the World Wide Web, the task of automatic categorization @@ -18615,16 +21085,50 @@ interactions: on text representation and machine learning techniques. This paper provides a review of the theory and methods of document classification and text mining, focusing on the existing litera- ture.", "venue": "", "year": 2010, "referenceCount": - 120, "citationCount": 572, "influentialCitationCount": 29, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + 120, "citationCount": 573, "influentialCitationCount": 29, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2010-01-02", "journal": {"name": "Journal of Advances in Information Technology", "pages": "4-20", "volume": "1"}, "authors": [{"authorId": "144828657", "name": "B. Baharudin"}, {"authorId": "1704695", "name": "Lam Hong Lee"}, {"authorId": - "39488669", "name": "Khairullah Khan"}]}, {"paperId": "d58a86b7f353455c324449b1ea47cb315aa5578a", + "39488669", "name": "Khairullah Khan"}]}, {"paperId": "8b934aad7112262d1260c2d9296fc68985fe5bfe", + "externalIds": {"MAG": "2183600202", "DOI": "10.1172/JCI119750", "CorpusId": + 12628862, "PubMed": "9410890"}, "corpusId": 12628862, "publicationVenue": + {"id": "8c9a9e1b-acf2-4274-8d73-6ea0ecd11fd1", "name": "Journal of Clinical + Investigation", "type": "journal", "alternate_names": ["J Clin Investig"], + "issn": "0021-9738", "url": "https://www.jci.org/", "alternate_urls": ["http://www.jci.org/", + "https://www.jci.org/archive", "http://www.jci.org/impact"]}, "url": "https://www.semanticscholar.org/paper/8b934aad7112262d1260c2d9296fc68985fe5bfe", + "title": "Nitric oxide synthases: which, where, how, and why?", "abstract": + "ture that clearly identifies the specific enzyme isoform. A widely accepted + nomenclature (3), which will be used in these Perspective articles, identifies + the three mammalian enzyme isoforms as nNOS, iNOS, and eNOS, reflecting the + tissues of origin for the original protein and cDNA isolates. As denoted by + its prefix, nNOS was originally purified and cloned from neuronal tissues. + However, nNOS is now known to be much more widely distributed, with an important + level of expression in skeletal muscle. iNOS, originally purified and cloned + from an immunoactivated macrophage cell line, has since been identified in + myriad mammalian tissues, and iNOS expression has been studied in cells as + diverse as cardiac myocytes, glial cells, and vascular smooth muscle cells + (to name only a few). eNOS, the last of the three mammalian NOS isoforms to + be isolated, was originally purified and cloned from vascular endothelium, + but has since been discovered in cardiac myocytes, blood platelets, brain + (hippocampus), and elsewhere. To add to the confusion, the human genes for + the NOS isoforms are officially categorized in the order of their isolation + and characterization; thus, the human genes encoding nNOS, iNOS, and eNOS + are termed NOS1 , NOS2 , and NOS3 , respectively.", "venue": "Journal of Clinical + Investigation", "year": 1997, "referenceCount": 58, "citationCount": 1024, + "influentialCitationCount": 36, "isOpenAccess": true, "openAccessPdf": {"url": + "http://www.jci.org/articles/view/119750/files/pdf", "status": "BRONZE"}, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", + "JournalArticle"], "publicationDate": "1997-11-01", "journal": {"name": "The + Journal of clinical investigation", "pages": "\n 2146-52\n ", + "volume": "100 9"}, "authors": [{"authorId": "2153763", "name": "T. Michel"}, + {"authorId": "2110687", "name": "O. Feron"}]}, {"paperId": "d58a86b7f353455c324449b1ea47cb315aa5578a", "externalIds": {"MAG": "2001588151", "DOI": "10.1117/1.2336196", "CorpusId": - 8620059}, "url": "https://www.semanticscholar.org/paper/d58a86b7f353455c324449b1ea47cb315aa5578a", + 8620059}, "corpusId": 8620059, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d58a86b7f353455c324449b1ea47cb315aa5578a", "title": "Novel method for structured light system calibration", "abstract": "System calibration, which usually involves complicated and time-consuming procedures, is crucial for any 3-D shape measurement system. In this work, @@ -18640,14 +21144,15 @@ interactions: method and presents some experimental results that demonstrate its performance. \u00a9 2006 Society of Photo-Optical Instrumentation Engineers.", "venue": "", "year": 2006, "referenceCount": 25, "citationCount": 642, "influentialCitationCount": - 37, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2006-08-01", "journal": {"name": "Optical Engineering", "pages": "083601", - "volume": "45"}, "authors": [{"authorId": "2108963250", "name": "Song Zhang"}, - {"authorId": "145873747", "name": "Peisen Huang"}]}, {"paperId": "ceb90588b49f4af3b06af7edd7b81540ffd2ca99", - "externalIds": {"DBLP": "books/lib/HopcroftU69", "MAG": "1817451992", "CorpusId": - 29997534}, "url": "https://www.semanticscholar.org/paper/ceb90588b49f4af3b06af7edd7b81540ffd2ca99", + 37, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2006-08-01", "journal": {"name": + "Optical Engineering", "pages": "083601", "volume": "45"}, "authors": [{"authorId": + "2108963250", "name": "Song Zhang"}, {"authorId": "145873747", "name": "Peisen + Huang"}]}, {"paperId": "ceb90588b49f4af3b06af7edd7b81540ffd2ca99", "externalIds": + {"DBLP": "books/lib/HopcroftU69", "MAG": "1817451992", "CorpusId": 29997534}, + "corpusId": 29997534, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ceb90588b49f4af3b06af7edd7b81540ffd2ca99", "title": "Formal languages and their relation to automata", "abstract": "From the Preface (See Front Matter for full Preface) \n \nThe study of formal languages constitutes an important subarea of computer science. This area sprang to @@ -18676,14 +21181,19 @@ interactions: grammars, stack automata, and decidability.", "venue": "Addison-Wesley series in computer science and information processing", "year": 1969, "referenceCount": 0, "citationCount": 1618, "influentialCitationCount": 69, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"pages": "I-VII, 1-242"}, "authors": [{"authorId": "1706504", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "I-VII, 1-242"}, "authors": [{"authorId": "1706504", "name": "J. Hopcroft"}, {"authorId": "1742391", "name": "J. Ullman"}]}, {"paperId": "67b2918c1804a76552002aa2ea6f35e0722d3b8f", "externalIds": {"MAG": "2062802768", "PubMedCentral": "534809", "DOI": "10.1371/JOURNAL.PBIO.0020424", "CorpusId": - 5095069, "PubMed": "15583715"}, "url": "https://www.semanticscholar.org/paper/67b2918c1804a76552002aa2ea6f35e0722d3b8f", + 5095069, "PubMed": "15583715"}, "corpusId": 5095069, "publicationVenue": {"id": + "83ff973b-8a0e-4e00-a06a-2cfd9e222de9", "name": "PLoS Biology", "type": "journal", + "alternate_names": ["Plo Biology", "PLOS Biology", "PLO Biology"], "issn": + "1544-9173", "url": "http://www.pubmedcentral.nih.gov/tocrender.fcgi?journal=212", + "alternate_urls": ["http://www.plosbiology.org/", "https://journals.plos.org/plosbiology/"]}, + "url": "https://www.semanticscholar.org/paper/67b2918c1804a76552002aa2ea6f35e0722d3b8f", "title": "Algorithmic Self-Assembly of DNA Sierpinski Triangles", "abstract": "Algorithms and information, fundamental to technological and biological organization, are also an essential aspect of many elementary physical phenomena, such as @@ -18701,8 +21211,9 @@ interactions: of arbitrary cellular automata. This shows that engineered DNA self-assembly can be treated as a Turing-universal biomolecular system, capable of implementing any desired algorithm for computation or construction tasks.", "venue": "PLoS - Biology", "year": 2004, "referenceCount": 60, "citationCount": 799, "influentialCitationCount": - 33, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + Biology", "year": 2004, "referenceCount": 60, "citationCount": 801, "influentialCitationCount": + 33, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.plos.org/plosbiology/article/file?id=10.1371/journal.pbio.0020424&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2004-12-01", "journal": {"name": "PLoS @@ -18710,7 +21221,7 @@ interactions: Rothemund"}, {"authorId": "92381867", "name": "N. Papadakis"}, {"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": "cb65693481f95e81523e3b88bc18731d4f4aebeb", "externalIds": {"MAG": "2104043570", "DOI": "10.5194/BG-9-3857-2012", "CorpusId": - 21736127}, "url": "https://www.semanticscholar.org/paper/cb65693481f95e81523e3b88bc18731d4f4aebeb", + 21736127}, "corpusId": 21736127, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cb65693481f95e81523e3b88bc18731d4f4aebeb", "title": "A framework for benchmarking land models", "abstract": "Land models, which have been developed by the modeling community in the past few decades to predict fu- ture states of ecosystems and climate, have to be critically @@ -18721,7 +21232,8 @@ interactions: and, meanwhile, highlights major chal- lenges at this infant stage of benchmark analysis. The frame- work includes (1) targeted aspects of model performance", "venue": "", "year": 2012, "referenceCount": 158, "citationCount": 296, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.biogeosciences.net/9/3857/2012/bg-9-3857-2012.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-10-09", "journal": {"name": "Biogeosciences", "pages": "3857-3874", "volume": "9"}, @@ -18746,7 +21258,8 @@ interactions: "name": "J. Xia"}, {"authorId": "4640770", "name": "S. Zaehle"}, {"authorId": "8453845", "name": "Xu-Zhao Zhou"}]}, {"paperId": "a3319cc89ae585483a570d786d0406a09c3f2d46", "externalIds": {"MAG": "1991129227", "DOI": "10.1177/002199837601000101", - "CorpusId": 51321995}, "url": "https://www.semanticscholar.org/paper/a3319cc89ae585483a570d786d0406a09c3f2d46", + "CorpusId": 51321995}, "corpusId": 51321995, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a3319cc89ae585483a570d786d0406a09c3f2d46", "title": "Moisture Absorption and Desorption of Composite Materials", "abstract": "Expressions are presented for the moisture distribution and the mois ture content as a function of time of one dimensional homogeneous and composite @@ -18761,15 +21274,16 @@ interactions: the analytical results and pro vide the moisture absorption and desorption characteristics of such com posites. Extension of the results to materials exposed to time varying envi ronmental conditions is indicated.", "venue": - "", "year": 1976, "referenceCount": 5, "citationCount": 1136, "influentialCitationCount": - 59, "isOpenAccess": true, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + "", "year": 1976, "referenceCount": 5, "citationCount": 1138, "influentialCitationCount": + 59, "isOpenAccess": true, "openAccessPdf": {"url": "http://deepblue.lib.umich.edu/bitstream/2027.42/67521/2/10.1177_002199837601000101.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1976-01-01", "journal": {"name": "Journal of Composite Materials", "pages": "2 - 20", "volume": "10"}, "authors": [{"authorId": "103089376", "name": "C. Shen"}, {"authorId": "49215868", "name": "G. Springer"}]}, {"paperId": "d055636ebdca03646818e270c08dff92ce2fb501", "externalIds": {"MAG": "2288879222", "DOI": "10.2307/1534637", "CorpusId": - 147071249}, "url": "https://www.semanticscholar.org/paper/d055636ebdca03646818e270c08dff92ce2fb501", + 147071249}, "corpusId": 147071249, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d055636ebdca03646818e270c08dff92ce2fb501", "title": "Laumann (E.O), Gagnon (J.H), Michael (R.T), Michaels (S) \u2014 The Social Organization of Sexuality. Sexual Practices in the United States; Michael (R.), Gagnon (J.), Laumann (E.), Kolata (G.) \u2014 Sex in America. @@ -18788,13 +21302,17 @@ interactions: imbued in our culture and the toll it takes on gay children who struggle to keep their stigmatized identity a secret to avoid", "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 1098, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1997-11-01", "journal": {"name": "Population", "pages": "1548-1551", "volume": - "52"}, "authors": [{"authorId": "5236175", "name": "A. Giami"}]}, {"paperId": - "7285ee82aa0cde847fafb8b1109dd19dbdc04e35", "externalIds": {"DBLP": "conf/icml/LiuS96", - "MAG": "187357405", "CorpusId": 17123515}, "url": "https://www.semanticscholar.org/paper/7285ee82aa0cde847fafb8b1109dd19dbdc04e35", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "1997-11-01", "journal": {"name": "Population", "pages": + "1548-1551", "volume": "52"}, "authors": [{"authorId": "5236175", "name": + "A. Giami"}]}, {"paperId": "7285ee82aa0cde847fafb8b1109dd19dbdc04e35", "externalIds": + {"DBLP": "conf/icml/LiuS96", "MAG": "187357405", "CorpusId": 17123515}, "corpusId": + 17123515, "publicationVenue": {"id": "fc0a208c-acb7-47dc-a0d4-af8190e21d29", + "name": "International Conference on Machine Learning", "type": "conference", + "alternate_names": ["ICML", "Int Conf Mach Learn"], "url": "https://icml.cc/"}, + "url": "https://www.semanticscholar.org/paper/7285ee82aa0cde847fafb8b1109dd19dbdc04e35", "title": "A Probabilistic Approach to Feature Selection - A Filter Solution", "abstract": "Feature selection can be de ned as a problem of nding a minimum set of M relevant at tributes that describes the dataset as well as the original @@ -18808,15 +21326,19 @@ interactions: the e ectiveness and scalability of the proposed algorithm Discussed also are various aspects and applications of this fea ture selection algorithm", "venue": "International Conference on Machine Learning", "year": 1996, "referenceCount": - 20, "citationCount": 790, "influentialCitationCount": 51, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1996-07-03", "journal": {"pages": "319-327"}, "authors": - [{"authorId": "38746648", "name": "Huan Liu"}, {"authorId": "1697083", "name": - "R. Setiono"}]}, {"paperId": "9c43f38658314f84af49cf655b7f577d6735a5b9", "externalIds": - {"MAG": "2144879192", "DOI": "10.1177/109019818701400404", "CorpusId": 20428357, - "PubMed": "3319971"}, "url": "https://www.semanticscholar.org/paper/9c43f38658314f84af49cf655b7f577d6735a5b9", + 20, "citationCount": 791, "influentialCitationCount": 51, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1996-07-03", "journal": {"pages": "319-327"}, + "authors": [{"authorId": "38746648", "name": "Huan Liu"}, {"authorId": "1697083", + "name": "R. Setiono"}]}, {"paperId": "9c43f38658314f84af49cf655b7f577d6735a5b9", + "externalIds": {"MAG": "2144879192", "DOI": "10.1177/109019818701400404", + "CorpusId": 20428357, "PubMed": "3319971"}, "corpusId": 20428357, "publicationVenue": + {"id": "bdc23241-251e-45bd-a94e-2ca99aa6218f", "name": "Health Education Quarterly", + "alternate_names": ["Health Educ Q"], "issn": "0195-8402", "alternate_issns": + ["2732-5601"], "url": "https://journals.sagepub.com/home/heb", "alternate_urls": + ["https://www.jstor.org/journal/healeducquar"]}, "url": "https://www.semanticscholar.org/paper/9c43f38658314f84af49cf655b7f577d6735a5b9", "title": "Focus Group Interview: An Underutilized Research Technique for Improving Theory and Practice in Health Education", "abstract": "The purpose of this article is to increase awareness about and stimulate interest in using focus @@ -18835,14 +21357,20 @@ interactions: preparation faculty to consider increasing emphasis on qualita tive research methods.", "venue": "Health Education Quarterly", "year": 1987, "referenceCount": 193, "citationCount": 893, "influentialCitationCount": 45, "isOpenAccess": - false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "1987-12-01", "journal": {"name": "Health - Education & Behavior", "pages": "411 - 448", "volume": "14"}, "authors": [{"authorId": - "3739409", "name": "C. Basch"}]}, {"paperId": "573fe245b59eee4341ca0fe35baac7af21ce5e88", - "externalIds": {"MAG": "2120549061", "DBLP": "conf/chi/RicoB10", "DOI": "10.1145/1753326.1753458", - "CorpusId": 16118067}, "url": "https://www.semanticscholar.org/paper/573fe245b59eee4341ca0fe35baac7af21ce5e88", + false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "1987-12-01", + "journal": {"name": "Health Education & Behavior", "pages": "411 - 448", "volume": + "14"}, "authors": [{"authorId": "3739409", "name": "C. Basch"}]}, {"paperId": + "573fe245b59eee4341ca0fe35baac7af21ce5e88", "externalIds": {"MAG": "2120549061", + "DBLP": "conf/chi/RicoB10", "DOI": "10.1145/1753326.1753458", "CorpusId": + 16118067}, "corpusId": 16118067, "publicationVenue": {"id": "b55b50b1-aae7-47a7-b042-8aecc930073d", + "name": "International Conference on Human Factors in Computing Systems", + "type": "conference", "alternate_names": ["CHI", "Int Conf Hum Factor Comput + Syst", "Human Factors in Computing Systems", "Conference on Human Interface", + "Conf Hum Interface", "Hum Factor Comput Syst"], "url": "http://www.acm.org/sigchi/"}, + "url": "https://www.semanticscholar.org/paper/573fe245b59eee4341ca0fe35baac7af21ce5e88", "title": "Usable gestures for mobile interfaces: evaluating social acceptability", "abstract": "Gesture-based mobile interfaces require users to change the way they use technology in public settings. Since mobile phones are part of our @@ -18859,15 +21387,19 @@ interactions: well as social acceptability evaluation guidelines.", "venue": "International Conference on Human Factors in Computing Systems", "year": 2010, "referenceCount": 29, "citationCount": 326, "influentialCitationCount": 34, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference", "Review"], "publicationDate": "2010-04-10", "journal": {"name": "Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"}, "authors": [{"authorId": "145265792", "name": "J. Williamson"}, {"authorId": "1721608", "name": "S. Brewster"}]}, {"paperId": "9b706573a450967c3e2ffd26490895301f96cc41", "externalIds": {"MAG": "2214790235", "DOI": "10.1242/dev.130112", "CorpusId": - 13170565, "PubMed": "26721501"}, "url": "https://www.semanticscholar.org/paper/9b706573a450967c3e2ffd26490895301f96cc41", + 13170565, "PubMed": "26721501"}, "corpusId": 13170565, "publicationVenue": + {"id": "179847ef-8e79-48e2-99ee-769211d3e729", "name": "Development", "type": + "journal", "issn": "0950-1991", "alternate_issns": ["0212-2448"], "url": "https://dev.biologists.org/", + "alternate_urls": ["http://dev.biologists.org/", "http://journals.ecs.soton.ac.uk/journals/dev.html"]}, + "url": "https://www.semanticscholar.org/paper/9b706573a450967c3e2ffd26490895301f96cc41", "title": "Villification in the mouse: Bmp signals control intestinal villus patterning", "abstract": "In the intestine, finger-like villi provide abundant surface area for nutrient absorption. During murine villus development, epithelial @@ -18896,12 +21428,12 @@ interactions: BMP signaling, not mechanical forces, and behaves in accordance with a reaction-diffusion Turing mechanism.", "venue": "Development", "year": 2016, "referenceCount": 60, "citationCount": 99, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-02-01", "journal": {"name": "Development", "pages": - "427 - 436", "volume": "143"}, "authors": [{"authorId": "40087768", "name": - "K. Walton"}, {"authorId": "6107591", "name": "M. Whidden"}, {"authorId": + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2016-02-01", "journal": {"name": "Development", + "pages": "427 - 436", "volume": "143"}, "authors": [{"authorId": "40087768", + "name": "K. Walton"}, {"authorId": "6107591", "name": "M. Whidden"}, {"authorId": "5904251", "name": "\u00c5. Kolterud"}, {"authorId": "1736661913", "name": "Suzanne K. Shoffner"}, {"authorId": "31903028", "name": "M. Czerwinski"}, {"authorId": "2059407537", "name": "Juhi Kushwaha"}, {"authorId": "2047126223", @@ -18910,7 +21442,10 @@ interactions: "S. Schnell"}, {"authorId": "2181070", "name": "D. Gumucio"}]}, {"paperId": "19c7e66db52f06b365ac9888a8a82620d2351da0", "externalIds": {"MAG": "2096147331", "DBLP": "conf/siggraph/RuspiniKK97", "DOI": "10.1145/258734.258878", "CorpusId": - 10648660}, "url": "https://www.semanticscholar.org/paper/19c7e66db52f06b365ac9888a8a82620d2351da0", + 10648660}, "corpusId": 10648660, "publicationVenue": {"id": "cf6b5e76-9274-46e6-a2dd-7c190ec2ec5f", + "name": "International Conference on Computer Graphics and Interactive Techniques", + "type": "conference", "alternate_names": ["Int Conf Comput Graph Interact + Tech", "SIGGRAPH"], "url": "http://www.siggraph.org/"}, "url": "https://www.semanticscholar.org/paper/19c7e66db52f06b365ac9888a8a82620d2351da0", "title": "The haptic display of complex graphical environments", "abstract": "Force feedback coupled with visual display allows people to interact intuitiv ely with complex virtual environments. For this synergy of haptics and graphics @@ -18924,7 +21459,8 @@ interactions: the limits of the renderer\u2019s capabilities are reached.", "venue": "International Conference on Computer Graphics and Interactive Techniques", "year": 1997, "referenceCount": 30, "citationCount": 668, "influentialCitationCount": 35, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/258734.258878", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": "1997-08-03", "journal": {"name": "Proceedings @@ -18932,7 +21468,8 @@ interactions: "authors": [{"authorId": "1888252", "name": "D. Ruspini"}, {"authorId": "2443957", "name": "K. Kolarov"}, {"authorId": "1717425", "name": "O. Khatib"}]}, {"paperId": "5af5b125d2cce906ae3828ccdb45d9d59e3de24e", "externalIds": {"MAG": "2185681858", - "CorpusId": 26404788}, "url": "https://www.semanticscholar.org/paper/5af5b125d2cce906ae3828ccdb45d9d59e3de24e", + "CorpusId": 26404788}, "corpusId": 26404788, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5af5b125d2cce906ae3828ccdb45d9d59e3de24e", "title": "Comparative Growth, Mortality, and Energetics of Marine Fish Larvae: Temperature and Implied Latitudinal Effects", "abstract": "Vital rates and energetics of marine fish larvae were examined in relation to tempera\u00ad @@ -18964,13 +21501,14 @@ interactions: larvae can cause fluctuations in recruit\u00ad ment levels. The two processes, growth and death, may interact and can be viewed as a", "venue": "", "year": 1989, "referenceCount": 150, "citationCount": 722, "influentialCitationCount": - 72, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "93949792", - "name": "E. Houde"}]}, {"paperId": "bd23993b09fc2669a690acba9e7320a187f0f3b4", + 72, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "93949792", "name": "E. Houde"}]}, {"paperId": "bd23993b09fc2669a690acba9e7320a187f0f3b4", "externalIds": {"MAG": "2085099674", "DOI": "10.1002/anie.201307443", "CorpusId": - 19159246, "PubMed": "24218278"}, "url": "https://www.semanticscholar.org/paper/bd23993b09fc2669a690acba9e7320a187f0f3b4", + 19159246, "PubMed": "24218278"}, "corpusId": 19159246, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bd23993b09fc2669a690acba9e7320a187f0f3b4", "title": "A cryogenically flexible covalent organic framework for efficient hydrogen isotope separation by quantum sieving.", "abstract": "Conventional molecular sieves are often utilized in industryfor the purification of gas @@ -18981,7 +21519,8 @@ interactions: and the Girdlersulfide process, but these methods have a low separationfactor and are excessively time- and energy-intensive.", "venue": "Angewandte Chemie", "year": 2013, "referenceCount": 16, "citationCount": 153, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://scholarworks.unist.ac.kr/bitstream/201301/57856/1/000327802100011%20%282%29.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": @@ -18993,7 +21532,8 @@ interactions: Schmid"}, {"authorId": "2314522", "name": "R. Fischer"}, {"authorId": "9169989", "name": "M. Hirscher"}]}, {"paperId": "82eaec5b553fd8a73e68664bcdf4d0adb9b39b97", "externalIds": {"MAG": "2159182966", "DOI": "10.1002/anie.201106652", "CorpusId": - 33092076, "PubMed": "22253053"}, "url": "https://www.semanticscholar.org/paper/82eaec5b553fd8a73e68664bcdf4d0adb9b39b97", + 33092076, "PubMed": "22253053"}, "corpusId": 33092076, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/82eaec5b553fd8a73e68664bcdf4d0adb9b39b97", "title": "Reversibly shape-shifting organic optical waveguides: formation of organic nanorings, nanotubes, and nanosheets.", "abstract": "because the functions of thenanoobjects are dependent on their shape and dimensions. Inthe @@ -19004,16 +21544,18 @@ interactions: of reversiblyshape-shifting organic nanostructures that have dimension-ally dependent optical waveguiding properties have beenavailable. Most of the reported organic waveguides havedefined shapes", "venue": "Angewandte Chemie", "year": - 2012, "referenceCount": 36, "citationCount": 161, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-04-10", "journal": {"name": "Angewandte Chemie", "pages": "\n 3556-61\n ", - "volume": "51 15"}, "authors": [{"authorId": "49514957", "name": "N. Chandrasekhar"}, - {"authorId": "2364809", "name": "Rajadurai Chandrasekar"}]}, {"paperId": "401acb32763d448c507229fcdf3c8e4eedeedfa5", + 2012, "referenceCount": 36, "citationCount": 162, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-04-10", "journal": {"name": "Angewandte Chemie", + "pages": "\n 3556-61\n ", "volume": "51 15"}, "authors": [{"authorId": + "49514957", "name": "N. Chandrasekhar"}, {"authorId": "2364809", "name": "Rajadurai + Chandrasekar"}]}, {"paperId": "401acb32763d448c507229fcdf3c8e4eedeedfa5", "externalIds": {"MAG": "2007041450", "DOI": "10.1177/106939719302700301", - "CorpusId": 143843772}, "url": "https://www.semanticscholar.org/paper/401acb32763d448c507229fcdf3c8e4eedeedfa5", + "CorpusId": 143843772}, "corpusId": 143843772, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/401acb32763d448c507229fcdf3c8e4eedeedfa5", "title": "Collectivism and Individualism as Cultural Syndromes", "abstract": "A cultural syndrome can be identified when shared attitudes, be liefs, norms, roles, values, and other such elements of subjective cul ture, identified @@ -19023,14 +21565,40 @@ interactions: and (c) there is a link between these patterns of subjective culture and geography. This article reviews evidence suggesting that the collectivism and individualism constructs are cultural syndromes.", "venue": "", "year": 1993, "referenceCount": - 44, "citationCount": 660, "influentialCitationCount": 30, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1993-08-01", - "journal": {"name": "Cross-Cultural Research", "pages": "155 - 180", "volume": - "27"}, "authors": [{"authorId": "48118075", "name": "H. Triandis"}]}, {"paperId": - "5ca3afa7ed2167f1c1d6105fd91e3f069bd32f64", "externalIds": {"MAG": "2239278662", - "CorpusId": 54613941}, "url": "https://www.semanticscholar.org/paper/5ca3afa7ed2167f1c1d6105fd91e3f069bd32f64", + 44, "citationCount": 664, "influentialCitationCount": 31, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "1993-08-01", "journal": {"name": "Cross-Cultural Research", + "pages": "155 - 180", "volume": "27"}, "authors": [{"authorId": "48118075", + "name": "H. Triandis"}]}, {"paperId": "8fe5713419f903697a0155b3a5465ff2586e2c1b", + "externalIds": {"MAG": "606616652", "DOI": "10.1142/8306", "CorpusId": 60058501}, + "corpusId": 60058501, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8fe5713419f903697a0155b3a5465ff2586e2c1b", + "title": "A Computable Universe: Understanding and Exploring Nature As Computation", + "abstract": "This volume, with a foreword by Sir Roger Penrose, discusses + the foundations of computation in relation to nature. It focuses on two main + questions: What is computation? How does nature compute? The contributors + are world-renowned experts who have helped shape a cutting-edge computational + understanding of the universe. They discuss computation in the world from + a variety of perspectives, ranging from foundational concepts to pragmatic + models to ontological conceptions and philosophical implications. The volume + provides a state-of-the-art collection of technical papers and non-technical + essays, representing a field that assumes information and computation to be + key in understanding and explaining the basic structure underpinning physical + reality. It also includes a new edition of Konrad Zuse''s \"Calculating Space\" + (the MIT translation), and a panel discussion transcription on the topic, + featuring worldwide experts in quantum mechanics, physics, cognition, computation + and algorithmic complexity. The volume is dedicated to the memory of Alan + M Turing -- the inventor of universal computation, on the 100th anniversary + of his birth, and is part of the Turing Centenary celebrations.", "venue": + "", "year": 2012, "referenceCount": 17, "citationCount": 126, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2012-10-30", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "66445647", "name": "H. Zenil"}]}, {"paperId": "5ca3afa7ed2167f1c1d6105fd91e3f069bd32f64", + "externalIds": {"MAG": "2239278662", "CorpusId": 54613941}, "corpusId": 54613941, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5ca3afa7ed2167f1c1d6105fd91e3f069bd32f64", "title": "An Effective Temperature Scale Based on a Simple Model of Human Physiological Regulatiry Response", "abstract": "for the whole body and the probable values of the three principal parameters related to thejudgement @@ -19042,16 +21610,16 @@ interactions: and a!l must ultimateiy be taken into account by a more elaborate model and by more extensive experimentation, than there is avail- able this date in the literature.", "venue": "", "year": 1972, "referenceCount": 1, "citationCount": - 858, "influentialCitationCount": 46, "isOpenAccess": false, "fieldsOfStudy": - ["Environmental Science", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1972-05-01", "journal": {"name": - "", "pages": "21-36", "volume": "13"}, "authors": [{"authorId": "15954971", - "name": "A. Gagge"}, {"authorId": "3776206", "name": "J. Stolwijk"}, {"authorId": - "103585769", "name": "Y. Nishi"}]}, {"paperId": "da0a00b2ba19c72b6cc38f3d9e62884106e51013", + 859, "influentialCitationCount": 46, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Environmental Science", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1972-05-01", + "journal": {"name": "", "pages": "21-36", "volume": "13"}, "authors": [{"authorId": + "15954971", "name": "A. Gagge"}, {"authorId": "3776206", "name": "J. Stolwijk"}, + {"authorId": "103585769", "name": "Y. Nishi"}]}, {"paperId": "da0a00b2ba19c72b6cc38f3d9e62884106e51013", "externalIds": {"MAG": "2016121228", "DOI": "10.2307/2998317", "CorpusId": - 143454649}, "url": "https://www.semanticscholar.org/paper/da0a00b2ba19c72b6cc38f3d9e62884106e51013", + 143454649}, "corpusId": 143454649, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/da0a00b2ba19c72b6cc38f3d9e62884106e51013", "title": "Philosophy of Mind", "abstract": "Preface 1. Introduction What Is Philosophy of Mind? Metaphysical Preliminaries Mind-Body Supervenience Materialism and Physicalism Varieties of Mental Phenomena Is There a \"Mark of the Mental\"? @@ -19098,38 +21666,15 @@ interactions: Reductive Explanation Consciousness and Brain Science What Mary, the Super Vision Scientist, Didn''t Know The Limits of Physicalism For Further Reading Notes References Index", "venue": "", "year": 1996, "referenceCount": 81, - "citationCount": 559, "influentialCitationCount": 26, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "2021662", "name": "Jaegwon Kim"}]}, {"paperId": "8fe5713419f903697a0155b3a5465ff2586e2c1b", - "externalIds": {"MAG": "606616652", "DOI": "10.1142/8306", "CorpusId": 60058501}, - "url": "https://www.semanticscholar.org/paper/8fe5713419f903697a0155b3a5465ff2586e2c1b", - "title": "A Computable Universe: Understanding and Exploring Nature As Computation", - "abstract": "This volume, with a foreword by Sir Roger Penrose, discusses - the foundations of computation in relation to nature. It focuses on two main - questions: What is computation? How does nature compute? The contributors - are world-renowned experts who have helped shape a cutting-edge computational - understanding of the universe. They discuss computation in the world from - a variety of perspectives, ranging from foundational concepts to pragmatic - models to ontological conceptions and philosophical implications. The volume - provides a state-of-the-art collection of technical papers and non-technical - essays, representing a field that assumes information and computation to be - key in understanding and explaining the basic structure underpinning physical - reality. It also includes a new edition of Konrad Zuse''s \"Calculating Space\" - (the MIT translation), and a panel discussion transcription on the topic, - featuring worldwide experts in quantum mechanics, physics, cognition, computation - and algorithmic complexity. The volume is dedicated to the memory of Alan - M Turing -- the inventor of universal computation, on the 100th anniversary - of his birth, and is part of the Turing Centenary celebrations.", "venue": - "", "year": 2012, "referenceCount": 17, "citationCount": 123, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-10-30", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "66445647", - "name": "H. Zenil"}]}, {"paperId": "2a2011c1152e38d41d6088903d4945383b489776", - "externalIds": {"MAG": "2116442710", "CorpusId": 744509}, "url": "https://www.semanticscholar.org/paper/2a2011c1152e38d41d6088903d4945383b489776", + "citationCount": 558, "influentialCitationCount": 26, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "2021662", "name": "Jaegwon Kim"}]}, + {"paperId": "2a2011c1152e38d41d6088903d4945383b489776", "externalIds": {"MAG": + "2116442710", "CorpusId": 744509}, "corpusId": 744509, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2a2011c1152e38d41d6088903d4945383b489776", "title": "ORTHOGONAL-MAXIMIN LATIN HYPERCUBE DESIGNS", "abstract": "A randomly generated Latin hypercube design (LHD) can be quite struc- tured: the variables may be highly correlated or the design may not have good space-filling properties. @@ -19141,15 +21686,22 @@ interactions: generating such designs. Several examples are presented to show that the new algorithm is fast, and that the optimal designs are good in terms of both the correlation and distance criteria.", "venue": "", "year": 2008, "referenceCount": - 24, "citationCount": 279, "influentialCitationCount": 23, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Statistica Sinica", "pages": "171-186", "volume": "18"}, "authors": - [{"authorId": "144296196", "name": "V. R. Joseph"}, {"authorId": "144646110", - "name": "Ying Hung"}]}, {"paperId": "7b0b3aa94a053cadd730a0158c3fe0ce3dd147a2", + 24, "citationCount": 282, "influentialCitationCount": 23, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Statistica Sinica", "pages": "171-186", "volume": + "18"}, "authors": [{"authorId": "144296196", "name": "V. R. Joseph"}, {"authorId": + "144646110", "name": "Ying Hung"}]}, {"paperId": "7b0b3aa94a053cadd730a0158c3fe0ce3dd147a2", "externalIds": {"MAG": "2154479855", "DOI": "10.1002/adma.201002320", "CorpusId": - 205238057, "PubMed": "20824669"}, "url": "https://www.semanticscholar.org/paper/7b0b3aa94a053cadd730a0158c3fe0ce3dd147a2", + 205238057, "PubMed": "20824669"}, "corpusId": 205238057, "publicationVenue": + {"id": "71697426-616f-45b4-b9d8-d647335a32e6", "name": "Advances in Materials", + "type": "journal", "alternate_names": ["Adv Mater", "Advanced Materials"], + "issn": "2327-2503", "alternate_issns": ["0935-9648"], "url": "http://www.sciencepublishinggroup.com/journal/archive.aspx?amp;issueid=-1&journalid=129", + "alternate_urls": ["http://www.advmat.de/", "https://onlinelibrary.wiley.com/journal/15214095", + "http://www.sciencepublishinggroup.com/journal/archive.aspx?issueid=-1&journalid=129", + "http://www.wiley-vch.de/publish/en/journals/alphabeticIndex/2089/"]}, "url": + "https://www.semanticscholar.org/paper/7b0b3aa94a053cadd730a0158c3fe0ce3dd147a2", "title": "Switchable Transparency and Wetting of Elastomeric Smart Windows", "abstract": "Smart windows with switchable light transmittance properties have recently attracted signi\ufb01 cant attention because of their many applications, @@ -19157,18 +21709,19 @@ interactions: To date, reversible switching has been achieved either by a change in molecular arrange-ments or by the oxidation\u2013reduction reaction of chromogenic materials activated by light, electrical voltage, or tempera-ture.", "venue": "Advances - in Materials", "year": 2010, "referenceCount": 30, "citationCount": 249, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Materials Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "external"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-11-24", "journal": {"name": "Advanced Materials", "volume": "22"}, "authors": - [{"authorId": "2160106307", "name": "Seung Goo Lee"}, {"authorId": "3981933", - "name": "Dong Yun Lee"}, {"authorId": "2110551341", "name": "H. Lim"}, {"authorId": - "2155184433", "name": "D. Lee"}, {"authorId": "93737983", "name": "Shichoon - Lee"}, {"authorId": "143915336", "name": "K. Cho"}]}, {"paperId": "5d828990e497ad234641c1be56f14b0b946a27a3", - "externalIds": {"MAG": "2950083190", "DOI": "10.1055/S-2003-42473", "CorpusId": - 1494931}, "url": "https://www.semanticscholar.org/paper/5d828990e497ad234641c1be56f14b0b946a27a3", + in Materials", "year": 2010, "referenceCount": 30, "citationCount": 250, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Materials Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": + "external"}, {"category": "Materials Science", "source": "external"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-11-24", "journal": {"name": "Advanced Materials", + "volume": "22"}, "authors": [{"authorId": "2160106307", "name": "Seung Goo + Lee"}, {"authorId": "3981933", "name": "Dong Yun Lee"}, {"authorId": "2110551341", + "name": "H. Lim"}, {"authorId": "2155184433", "name": "D. Lee"}, {"authorId": + "93737983", "name": "Shichoon Lee"}, {"authorId": "143915336", "name": "K. + Cho"}]}, {"paperId": "5d828990e497ad234641c1be56f14b0b946a27a3", "externalIds": + {"MAG": "2950083190", "DOI": "10.1055/S-2003-42473", "CorpusId": 1494931}, + "corpusId": 1494931, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d828990e497ad234641c1be56f14b0b946a27a3", "title": "Renaissance of Ullmann and Goldberg Reactions - Progress in Copper Catalyzed C-N-, C-O- and C-S-Coupling", "abstract": "Copper-catalyzed C-N-, C-O- and C-S-coupling reac- tions are powerful tools in organic synthesis @@ -19181,15 +21734,16 @@ interactions: in this overview. Among a growing set of ligands and optimized reaction protocols, the most promising procedures are highlighted, covering the litera- ture published through May 2003.", "venue": "", "year": 2003, "referenceCount": 1, "citationCount": - 579, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2003-12-01", "journal": {"name": "Synlett", - "pages": "2428-2439", "volume": "2003"}, "authors": [{"authorId": "46806400", - "name": "K. Kunz"}, {"authorId": "153734272", "name": "U. Scholz"}, {"authorId": - "35106534", "name": "D. Ganzer"}]}, {"paperId": "6a7c6133fb76f2780115ec71397259c052f37219", + 579, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2003-12-01", "journal": + {"name": "Synlett", "pages": "2428-2439", "volume": "2003"}, "authors": [{"authorId": + "46806400", "name": "K. Kunz"}, {"authorId": "153734272", "name": "U. Scholz"}, + {"authorId": "35106534", "name": "D. Ganzer"}]}, {"paperId": "6a7c6133fb76f2780115ec71397259c052f37219", "externalIds": {"MAG": "2028706992", "DOI": "10.12921/CMST.2006.12.01.33-45", - "CorpusId": 8070007}, "url": "https://www.semanticscholar.org/paper/6a7c6133fb76f2780115ec71397259c052f37219", + "CorpusId": 8070007}, "corpusId": 8070007, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6a7c6133fb76f2780115ec71397259c052f37219", "title": "Programming the Grid with gLite", "abstract": "The past few years have seen the creation of the first production level Grid infrastructures that offer their users a dependable service at an unprecedented scale. Depending @@ -19201,7 +21755,8 @@ interactions: we describe the middleware (gLite) and services deployed on the EGEE Grid infrastructure and explain how applica- tions can interface to them.", "venue": "", "year": 2006, "referenceCount": 24, "citationCount": 366, "influentialCitationCount": - 18, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 18, "isOpenAccess": true, "openAccessPdf": {"url": "https://cmst.eu/wp-content/uploads/files/10.12921_cmst.2006.12.01.33-45_Laure.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-03-22", "journal": {"name": "computational methods in science and technology", @@ -19216,7 +21771,12 @@ interactions: "94994094", "name": "F. Hemmer"}, {"authorId": "3912023", "name": "A. D. Meglio"}, {"authorId": "3110340", "name": "\u00c5ke Edlund"}]}, {"paperId": "e69665366c402ca990282d89c8f8626b6dfa7d4f", "externalIds": {"DBLP": "conf/chi/KirkSRW06", "MAG": "2296297747", "DOI": - "10.1145/1124772.1124885", "CorpusId": 15568767}, "url": "https://www.semanticscholar.org/paper/e69665366c402ca990282d89c8f8626b6dfa7d4f", + "10.1145/1124772.1124885", "CorpusId": 15568767}, "corpusId": 15568767, "publicationVenue": + {"id": "b55b50b1-aae7-47a7-b042-8aecc930073d", "name": "International Conference + on Human Factors in Computing Systems", "type": "conference", "alternate_names": + ["CHI", "Int Conf Hum Factor Comput Syst", "Human Factors in Computing Systems", + "Conference on Human Interface", "Conf Hum Interface", "Hum Factor Comput + Syst"], "url": "http://www.acm.org/sigchi/"}, "url": "https://www.semanticscholar.org/paper/e69665366c402ca990282d89c8f8626b6dfa7d4f", "title": "Understanding photowork", "abstract": "In this paper we introduce the notion of \"photowork\" as the activities people perform with their digital photos after cap-ture but prior to end use such as sharing. Surprisingly, @@ -19231,33 +21791,69 @@ interactions: browsing in support of the photowork activi-ties we describe.", "venue": "International Conference on Human Factors in Computing Systems", "year": 2006, "referenceCount": 19, "citationCount": 311, "influentialCitationCount": 28, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", - "Conference", "Review"], "publicationDate": "2006-04-22", "journal": {"name": - "Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"}, - "authors": [{"authorId": "1698434", "name": "David S. Kirk"}, {"authorId": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Book", "Conference", "Review"], "publicationDate": "2006-04-22", "journal": + {"name": "Proceedings of the SIGCHI Conference on Human Factors in Computing + Systems"}, "authors": [{"authorId": "1698434", "name": "David S. Kirk"}, {"authorId": "144221985", "name": "A. Sellen"}, {"authorId": "1756036", "name": "C. Rother"}, - {"authorId": "2053320673", "name": "Kenneth R. Wood"}]}, {"paperId": "fec8955d9f0f2e553156efd693ea830ba7c77b8b", + {"authorId": "2053320673", "name": "Kenneth R. Wood"}]}, {"paperId": "c363fde2695be2413a18c3b070947a73e99c926e", + "externalIds": {"MAG": "2189001997", "CorpusId": 138647257}, "corpusId": 138647257, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c363fde2695be2413a18c3b070947a73e99c926e", + "title": "A Critical Evaluation of Indentation Techniques for Measuring Fracture + Toughness: I, Direct Crack Measurements", "abstract": "The application of + indentation techniques to the evaluation of fracture toughness is examined + critically, in two parts. In this flrst part, attention is focused on an approach + which involves direct measurement of Vickers-produced radial cracks as a function + of indentation load. A theoretical basis for the method is first established, + in terms of elasticlplastic indentation frac- ture mechanics. It is thereby + asserted that the key to the radial crack response lies In the residual component + of the contact fkld. This residual term has important implications concerning + the crack evolution, including the possibility of postindentation slow growth + under environment-sensitive conditions. Frac- tographic observations of cracks + in selected \"reference\" mater- Ys are used to determine the magnitude of + this effect and to investigate other potential complications associated with + de- partures from ideal indentation fracture behavior. The data from these + observations provide a convenient calibration of the indentation toughness + equations for general application to other well-behaved ceramics. The technique + is uniquely hpie in procedure and economic in its use of material.", "venue": + "", "year": 1981, "referenceCount": 12, "citationCount": 600, "influentialCitationCount": + 29, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "40764774", "name": "R. Garvie"}, + {"authorId": "152867287", "name": "R. Hannink"}, {"authorId": "91477243", + "name": "R. Hughan"}, {"authorId": "40757117", "name": "N. A. Mckinnon"}, + {"authorId": "40758202", "name": "R. T. Pascoe"}, {"authorId": "112974371", + "name": "R. K. Shinger"}, {"authorId": "2082672758", "name": "D. Porter"}, + {"authorId": "47454742", "name": "A. Heuer"}]}, {"paperId": "fec8955d9f0f2e553156efd693ea830ba7c77b8b", "externalIds": {"MAG": "1971003485", "DOI": "10.1007/s000180050082", "CorpusId": - 8153688, "PubMed": "9351466"}, "url": "https://www.semanticscholar.org/paper/fec8955d9f0f2e553156efd693ea830ba7c77b8b", + 8153688, "PubMed": "9351466"}, "corpusId": 8153688, "publicationVenue": {"id": + "563620d2-609c-44db-90eb-6ee90a0487a8", "name": "Cellular and Molecular Life + Sciences (CMLS)", "type": "journal", "alternate_names": ["Cell Mol Life Sci + (CMLS", "Cell Mol Life Sci", "Cellular and Molecular Life Sciences"], "issn": + "1420-682X", "url": "https://www.springer.com/life+sciences/cell+biology/journal/18", + "alternate_urls": ["http://link.springer.com/journal/18", "http://www.springer.com/life+sciences/cell+biology/journal/18"]}, + "url": "https://www.semanticscholar.org/paper/fec8955d9f0f2e553156efd693ea830ba7c77b8b", "title": "Deciphering protein sequence information through hydrophobic cluster analysis (HCA): current status and perspectives", "abstract": null, "venue": "Cellular and Molecular Life Sciences (CMLS)", "year": 1997, "referenceCount": 83, "citationCount": 483, "influentialCitationCount": 34, "isOpenAccess": - false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "1997-08-01", "journal": {"name": "Cellular - and Molecular Life Sciences CMLS", "pages": "621-645", "volume": "53"}, "authors": - [{"authorId": "1754778", "name": "I. Callebaut"}, {"authorId": "1708664", - "name": "G. Labesse"}, {"authorId": "87063353", "name": "P. Durand"}, {"authorId": - "2842969", "name": "A. Poupon"}, {"authorId": "48595069", "name": "L. Canard"}, - {"authorId": "1901829", "name": "J. Chomilier"}, {"authorId": "1950529", "name": - "B. Henrissat"}, {"authorId": "48845592", "name": "J. Mornon"}]}, {"paperId": - "d6fa5b2c975dbd12e2636d3ab419c7a89f87d502", "externalIds": {"MAG": "2102032362", - "DOI": "10.1146/ANNUREV.FL.15.010183.001143", "CorpusId": 123550931}, "url": - "https://www.semanticscholar.org/paper/d6fa5b2c975dbd12e2636d3ab419c7a89f87d502", + false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "1997-08-01", "journal": + {"name": "Cellular and Molecular Life Sciences CMLS", "pages": "621-645", + "volume": "53"}, "authors": [{"authorId": "1754778", "name": "I. Callebaut"}, + {"authorId": "1708664", "name": "G. Labesse"}, {"authorId": "87063353", "name": + "P. Durand"}, {"authorId": "2842969", "name": "A. Poupon"}, {"authorId": "48595069", + "name": "L. Canard"}, {"authorId": "1901829", "name": "J. Chomilier"}, {"authorId": + "1950529", "name": "B. Henrissat"}, {"authorId": "48845592", "name": "J. Mornon"}]}, + {"paperId": "d6fa5b2c975dbd12e2636d3ab419c7a89f87d502", "externalIds": {"MAG": + "2102032362", "DOI": "10.1146/ANNUREV.FL.15.010183.001143", "CorpusId": 123550931}, + "corpusId": 123550931, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d6fa5b2c975dbd12e2636d3ab419c7a89f87d502", "title": "Instabilities, Pattern Formation, and Turbulence in Flames", "abstract": "l.1 Premixed flames It is well known that the rate of a chemical reaction (W) in a gaseous mixture is an increasing function of tempera\u00ad ture; @@ -19272,65 +21868,15 @@ interactions: (via conduction) in the adjacent layer of the mixture, inducing a chemical reaction there, and so on. Thus the reaction, once begun, will spread through the mixture,", "venue": "", "year": 1983, "referenceCount": 0, "citationCount": - 666, "influentialCitationCount": 16, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Annual Review of Fluid Mechanics", - "pages": "179-199", "volume": "15"}, "authors": [{"authorId": "2993071", "name": - "G. Sivashinsky"}]}, {"paperId": "c363fde2695be2413a18c3b070947a73e99c926e", - "externalIds": {"MAG": "2189001997", "CorpusId": 138647257}, "url": "https://www.semanticscholar.org/paper/c363fde2695be2413a18c3b070947a73e99c926e", - "title": "A Critical Evaluation of Indentation Techniques for Measuring Fracture - Toughness: I, Direct Crack Measurements", "abstract": "The application of - indentation techniques to the evaluation of fracture toughness is examined - critically, in two parts. In this flrst part, attention is focused on an approach - which involves direct measurement of Vickers-produced radial cracks as a function - of indentation load. A theoretical basis for the method is first established, - in terms of elasticlplastic indentation frac- ture mechanics. It is thereby - asserted that the key to the radial crack response lies In the residual component - of the contact fkld. This residual term has important implications concerning - the crack evolution, including the possibility of postindentation slow growth - under environment-sensitive conditions. Frac- tographic observations of cracks - in selected \"reference\" mater- Ys are used to determine the magnitude of - this effect and to investigate other potential complications associated with - de- partures from ideal indentation fracture behavior. The data from these - observations provide a convenient calibration of the indentation toughness - equations for general application to other well-behaved ceramics. The technique - is uniquely hpie in procedure and economic in its use of material.", "venue": - "", "year": 1981, "referenceCount": 12, "citationCount": 590, "influentialCitationCount": - 29, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "40764774", - "name": "R. Garvie"}, {"authorId": "152867287", "name": "R. Hannink"}, {"authorId": - "91477243", "name": "R. Hughan"}, {"authorId": "40757117", "name": "N. A. - Mckinnon"}, {"authorId": "40758202", "name": "R. T. Pascoe"}, {"authorId": - "112974371", "name": "R. K. Shinger"}, {"authorId": "2082672758", "name": - "D. Porter"}, {"authorId": "47454742", "name": "A. Heuer"}]}, {"paperId": - "17a32e15b0cc963b3a331919051335de8cc0c75c", "externalIds": {"MAG": "2007879855", - "DOI": "10.1002/cbic.201000074", "CorpusId": 32126363, "PubMed": "20491139"}, - "url": "https://www.semanticscholar.org/paper/17a32e15b0cc963b3a331919051335de8cc0c75c", - "title": "Guanine, Adenine, and Hypoxanthine Production in UV\u2010Irradiated - Formamide Solutions: Relaxation of the Requirements for Prebiotic Purine Nucleobase - Formation", "abstract": "Here, we show for the first time that gua-nine, adenine, - and hypoxanthine can be produced from forma-mide in a single model prebiotic - reaction at lower tempera-tures than previously reported, if formamide is - subjected to UVirradiation during heating; this observation relaxes the require-ments - for prebiotic purine nucleobase formation. The yieldand diversity of purines - produced in heated/UV-irradiated for-mamide are further enhanced by the presence - of inorganiccatalysts, as solids or as dissolved ions. We also analyzed theproducts - of formamide solutions to which specific hydrogencyanide (HCN) condensation - products", "venue": "ChemBioChem", "year": 2010, "referenceCount": 26, "citationCount": - 156, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-06-14", "journal": {"name": "ChemBioChem", "volume": - "11"}, "authors": [{"authorId": "1932281129", "name": "Hannah L. Barks\u2009"}, - {"authorId": "1932176448", "name": "Ragan Buckley\u2009"}, {"authorId": "13760566", - "name": "G. Grieves"}, {"authorId": "8515086", "name": "E. Di Mauro"}, {"authorId": - "4879072", "name": "N. Hud"}, {"authorId": "21519323", "name": "T. Orlando"}]}, - {"paperId": "a836c11ab969aed7eea655adca09e05a829e24ca", "externalIds": {"MAG": - "2028472174", "DOI": "10.3354/ESR00197", "CorpusId": 30749051}, "url": "https://www.semanticscholar.org/paper/a836c11ab969aed7eea655adca09e05a829e24ca", + 670, "influentialCitationCount": 16, "isOpenAccess": true, "openAccessPdf": + {"url": "https://escholarship.org/content/qt0fd3z5fz/qt0fd3z5fz.pdf?t=p0uwpz", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Annual + Review of Fluid Mechanics", "pages": "179-199", "volume": "15"}, "authors": + [{"authorId": "2993071", "name": "G. Sivashinsky"}]}, {"paperId": "a836c11ab969aed7eea655adca09e05a829e24ca", + "externalIds": {"MAG": "2028472174", "DOI": "10.3354/ESR00197", "CorpusId": + 30749051}, "corpusId": 30749051, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a836c11ab969aed7eea655adca09e05a829e24ca", "title": "Global climate change, range changes and potential implications for the conservation of marine cetaceans: a review and synthesis", "abstract": "Global climate change has already resulted in an increase in oceanic water @@ -19353,14 +21899,43 @@ interactions: As a result, species in these taxa are potentially at par- ticular risk from changes in range in response to increasing water temperatures. However, further research is required to assess whether these predictions are, indeed, correct.", - "venue": "", "year": 2009, "referenceCount": 41, "citationCount": 194, "influentialCitationCount": - 11, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2009-05-14", "journal": {"name": "Endangered Species Research", "pages": - "125-136", "volume": "7"}, "authors": [{"authorId": "153094577", "name": "C. - MacLeod"}]}, {"paperId": "fb3176f552c7249d45fae18389991c37d9df50eb", "externalIds": - {"MAG": "1554261089", "CorpusId": 57820416}, "url": "https://www.semanticscholar.org/paper/fb3176f552c7249d45fae18389991c37d9df50eb", + "venue": "", "year": 2009, "referenceCount": 41, "citationCount": 195, "influentialCitationCount": + 11, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/esr2009/7/n007p125.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2009-05-14", + "journal": {"name": "Endangered Species Research", "pages": "125-136", "volume": + "7"}, "authors": [{"authorId": "153094577", "name": "C. MacLeod"}]}, {"paperId": + "17a32e15b0cc963b3a331919051335de8cc0c75c", "externalIds": {"MAG": "2007879855", + "DOI": "10.1002/cbic.201000074", "CorpusId": 32126363, "PubMed": "20491139"}, + "corpusId": 32126363, "publicationVenue": {"id": "7dac70ab-f755-4a38-8b1f-28f1f1d5aaff", + "name": "ChemBioChem", "type": "journal", "issn": "1439-4227", "url": "http://www3.interscience.wiley.com/journal/72510898/home?CRETRY=1&SRETRY=0", + "alternate_urls": ["https://onlinelibrary.wiley.com/journal/14397633", "http://www.chembiochem.org/"]}, + "url": "https://www.semanticscholar.org/paper/17a32e15b0cc963b3a331919051335de8cc0c75c", + "title": "Guanine, Adenine, and Hypoxanthine Production in UV\u2010Irradiated + Formamide Solutions: Relaxation of the Requirements for Prebiotic Purine Nucleobase + Formation", "abstract": "Here, we show for the first time that gua-nine, adenine, + and hypoxanthine can be produced from forma-mide in a single model prebiotic + reaction at lower tempera-tures than previously reported, if formamide is + subjected to UVirradiation during heating; this observation relaxes the require-ments + for prebiotic purine nucleobase formation. The yieldand diversity of purines + produced in heated/UV-irradiated for-mamide are further enhanced by the presence + of inorganiccatalysts, as solids or as dissolved ions. We also analyzed theproducts + of formamide solutions to which specific hydrogencyanide (HCN) condensation + products", "venue": "ChemBioChem", "year": 2010, "referenceCount": 26, "citationCount": + 156, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cbic.201000074", + "status": "BRONZE"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2010-06-14", "journal": + {"name": "ChemBioChem", "volume": "11"}, "authors": [{"authorId": "1932281129", + "name": "Hannah L. Barks\u2009"}, {"authorId": "1932176448", "name": "Ragan + Buckley\u2009"}, {"authorId": "13760566", "name": "G. Grieves"}, {"authorId": + "8515086", "name": "E. Di Mauro"}, {"authorId": "4879072", "name": "N. Hud"}, + {"authorId": "21519323", "name": "T. Orlando"}]}, {"paperId": "fb3176f552c7249d45fae18389991c37d9df50eb", + "externalIds": {"MAG": "1554261089", "CorpusId": 57820416}, "corpusId": 57820416, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fb3176f552c7249d45fae18389991c37d9df50eb", "title": "Reflection in Service Learning: Making Meaning or Experience", "abstract": "Traditional methods of instruction based on lec\u00ad tures and textbook readings can be effective in some instances and for some types of! earning, @@ -19370,14 +21945,15 @@ interactions: specific learning. Students are taught a particular mod\u00ad ule of content, they are provided examples of how to", "venue": "", "year": 1999, "referenceCount": 15, "citationCount": 408, "influentialCitationCount": 25, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "educational - HORIZONS", "pages": "179", "volume": "77"}, "authors": [{"authorId": "5938876", - "name": "R. Bringle"}, {"authorId": "4334787", "name": "Julie A. Hatcher"}]}, - {"paperId": "e39d53a0cf80651303210833fa36d89c93a07328", "externalIds": {"MAG": - "2155456686", "DOI": "10.1146/ANNUREV.PS.43.020192.001025", "CorpusId": 145280803}, - "url": "https://www.semanticscholar.org/paper/e39d53a0cf80651303210833fa36d89c93a07328", + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "educational HORIZONS", "pages": "179", "volume": "77"}, + "authors": [{"authorId": "5938876", "name": "R. Bringle"}, {"authorId": "4334787", + "name": "Julie A. Hatcher"}]}, {"paperId": "e39d53a0cf80651303210833fa36d89c93a07328", + "externalIds": {"MAG": "2155456686", "DOI": "10.1146/ANNUREV.PS.43.020192.001025", + "CorpusId": 145280803}, "corpusId": 145280803, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e39d53a0cf80651303210833fa36d89c93a07328", "title": "Interpersonal Processes Involving Impression Regulation and Management", "abstract": "INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . .. . . . @@ -19411,25 +21987,30 @@ interactions: . . . . .. . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . 162 CONCLUSIONS.. . . . . . . . . . . . . . . . . . . . . . . ..... . . . ......... . . . . . 163", "venue": "", "year": - 1992, "referenceCount": 48, "citationCount": 516, "influentialCitationCount": - 23, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Annual Review of Psychology", "pages": "133-168", "volume": - "43"}, "authors": [{"authorId": "34424326", "name": "B. R. Schlenker"}, {"authorId": - "1763183", "name": "M. Weigold"}]}, {"paperId": "1d484f4f0b99644c04c0c9b7a4d52432b0a5e68a", + 1992, "referenceCount": 48, "citationCount": 518, "influentialCitationCount": + 23, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Annual Review of Psychology", "pages": "133-168", + "volume": "43"}, "authors": [{"authorId": "34424326", "name": "B. R. Schlenker"}, + {"authorId": "1763183", "name": "M. Weigold"}]}, {"paperId": "1d484f4f0b99644c04c0c9b7a4d52432b0a5e68a", "externalIds": {"MAG": "609648047", "DOI": "10.1007/978-3-642-81574-4", "CorpusId": - 92871057}, "url": "https://www.semanticscholar.org/paper/1d484f4f0b99644c04c0c9b7a4d52432b0a5e68a", + 92871057}, "corpusId": 92871057, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1d484f4f0b99644c04c0c9b7a4d52432b0a5e68a", "title": "Point Defects in Semiconductors II", "abstract": null, "venue": "", "year": 1981, "referenceCount": 0, "citationCount": 575, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "49041225", "name": "M. Lannoo"}, - {"authorId": "31079943", "name": "J. Bourgoin"}]}, {"paperId": "c2461033bf65fb99ce9d92a110dabcb980a67096", + 7, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-642-81574-4%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "49041225", "name": "M. Lannoo"}, {"authorId": "31079943", "name": + "J. Bourgoin"}]}, {"paperId": "c2461033bf65fb99ce9d92a110dabcb980a67096", "externalIds": {"DBLP": "conf/icse/LiuBL06", "MAG": "2169671088", "DOI": "10.1145/1134285.1134303", - "CorpusId": 16758719}, "url": "https://www.semanticscholar.org/paper/c2461033bf65fb99ce9d92a110dabcb980a67096", + "CorpusId": 16758719}, "corpusId": 16758719, "publicationVenue": {"id": "a36dc29e-4ea1-4567-b0fe-1c06daf8bee8", + "name": "International Conference on Software Engineering", "type": "conference", + "alternate_names": ["IEEE Int Conf Semicond Electron", "IEEE International + Conference on Semiconductor Electronics", "ICSE", "Int Conf Softw Eng"], "url": + "http://www.icse-conferences.org/"}, "url": "https://www.semanticscholar.org/paper/c2461033bf65fb99ce9d92a110dabcb980a67096", "title": "Feature oriented refactoring of legacy applications", "abstract": "Feature oriented refactoring (FOR) is the process of decomposinga program into features, where a feature is an increment in programfunctionality. We @@ -19439,16 +22020,21 @@ interactions: We describe a tool and refactoring methodologybased on our theory, and present a validating case study.", "venue": "International Conference on Software Engineering", "year": 2006, "referenceCount": 31, "citationCount": 264, "influentialCitationCount": - 16, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", - "Conference"], "publicationDate": "2006-05-28", "journal": {"name": "Proceedings - of the 28th international conference on Software engineering"}, "authors": - [{"authorId": "48210927", "name": "Jia Liu"}, {"authorId": "1751603", "name": - "D. Batory"}, {"authorId": "1714483", "name": "C. Lengauer"}]}, {"paperId": - "d5a124de0f37c1ea0f219135d430b251915dde70", "externalIds": {"DBLP": "conf/chi/Bardzell09", - "MAG": "1984331918", "DOI": "10.1145/1518701.1519063", "CorpusId": 15009547}, - "url": "https://www.semanticscholar.org/paper/d5a124de0f37c1ea0f219135d430b251915dde70", + 16, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": + "2006-05-28", "journal": {"name": "Proceedings of the 28th international conference + on Software engineering"}, "authors": [{"authorId": "48210927", "name": "Jia + Liu"}, {"authorId": "1751603", "name": "D. Batory"}, {"authorId": "1714483", + "name": "C. Lengauer"}]}, {"paperId": "d5a124de0f37c1ea0f219135d430b251915dde70", + "externalIds": {"DBLP": "conf/chi/Bardzell09", "MAG": "1984331918", "DOI": + "10.1145/1518701.1519063", "CorpusId": 15009547}, "corpusId": 15009547, "publicationVenue": + {"id": "b55b50b1-aae7-47a7-b042-8aecc930073d", "name": "International Conference + on Human Factors in Computing Systems", "type": "conference", "alternate_names": + ["CHI", "Int Conf Hum Factor Comput Syst", "Human Factors in Computing Systems", + "Conference on Human Interface", "Conf Hum Interface", "Hum Factor Comput + Syst"], "url": "http://www.acm.org/sigchi/"}, "url": "https://www.semanticscholar.org/paper/d5a124de0f37c1ea0f219135d430b251915dde70", "title": "Interaction criticism and aesthetics", "abstract": "As HCI becomes more self-consciously implicated in cul-ture, theories from cultural studies, in particular aesthetics and critical theory, are increasingly working their @@ -19461,29 +22047,33 @@ interactions: design, both as a practice and as a discipline.", "venue": "International Conference on Human Factors in Computing Systems", "year": 2009, "referenceCount": 65, "citationCount": 148, "influentialCitationCount": 9, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Sociology", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + "openAccessPdf": {"url": "https://files.t-square.gatech.edu/access/content/attachment/f853f7ad-ba3b-40f7-aea6-f7c6c07a7121/p2357-bardzell.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": "2009-04-04", "journal": {"name": "Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"}, "authors": [{"authorId": "1804390", "name": "Jeffrey Bardzell"}]}, {"paperId": "ba3413dd469bd1425f53943f8317f53190e6c4ab", "externalIds": {"MAG": "2067917889", "DOI": "10.1038/359851A0", "CorpusId": 4254768, "PubMed": - "1279434"}, "url": "https://www.semanticscholar.org/paper/ba3413dd469bd1425f53943f8317f53190e6c4ab", + "1279434"}, "corpusId": 4254768, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/ba3413dd469bd1425f53943f8317f53190e6c4ab", "title": "Crystal structure of a Src-homology 3 (SH3) domain", "abstract": null, "venue": "Nature", "year": 1992, "referenceCount": 32, "citationCount": - 459, "influentialCitationCount": 15, "isOpenAccess": false, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "1992-10-29", "journal": {"name": "Nature", "pages": "851-855", "volume": - "359"}, "authors": [{"authorId": "4370379", "name": "A. Musacchio"}, {"authorId": - "80900100", "name": "M. Noble"}, {"authorId": "7989727", "name": "R. Pauptit"}, - {"authorId": "144412866", "name": "R. Wierenga"}, {"authorId": "4969937", - "name": "M. Saraste"}]}, {"paperId": "b850f89973963d0145ed64af29772b0c3072dc80", + 460, "influentialCitationCount": 15, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "1992-10-29", "journal": {"name": "Nature", "pages": "851-855", + "volume": "359"}, "authors": [{"authorId": "4370379", "name": "A. Musacchio"}, + {"authorId": "80900100", "name": "M. Noble"}, {"authorId": "7989727", "name": + "R. Pauptit"}, {"authorId": "144412866", "name": "R. Wierenga"}, {"authorId": + "4969937", "name": "M. Saraste"}]}, {"paperId": "b850f89973963d0145ed64af29772b0c3072dc80", "externalIds": {"MAG": "2021662348", "DOI": "10.1107/S0365110X59001499", "CorpusId": - 95829921}, "url": "https://www.semanticscholar.org/paper/b850f89973963d0145ed64af29772b0c3072dc80", + 95829921}, "corpusId": 95829921, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b850f89973963d0145ed64af29772b0c3072dc80", "title": "Complex alloy structures regarded as sphere packings. II. Analysis and classification of representative structures", "abstract": "The general principles and properties which have been deduced previously (Frank & Kasper, @@ -19494,15 +22084,16 @@ interactions: skeletons. Many hypothet ica l s tructures result ing from the analysis are listed and procedures are given for predict ing other s t ructure types. The relationship between alloy structures and inert gas hydra tes is discussed.", - "venue": "", "year": 1959, "referenceCount": 0, "citationCount": 642, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1959-07-10", "journal": {"name": "Acta Crystallographica", "pages": "483-499", - "volume": "12"}, "authors": [{"authorId": "40702768", "name": "F. Frank"}, - {"authorId": "40116616", "name": "J. Kasper"}]}, {"paperId": "530f4bad667dda61bf69fde10856445ccb3e1b7e", - "externalIds": {"MAG": "2121170854", "DOI": "10.1590/S0100-46702006000300002", - "CorpusId": 32805152}, "url": "https://www.semanticscholar.org/paper/530f4bad667dda61bf69fde10856445ccb3e1b7e", + "venue": "", "year": 1959, "referenceCount": 0, "citationCount": 645, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1959-07-10", "journal": {"name": "Acta Crystallographica", + "pages": "483-499", "volume": "12"}, "authors": [{"authorId": "40702768", + "name": "F. Frank"}, {"authorId": "40116616", "name": "J. Kasper"}]}, {"paperId": + "530f4bad667dda61bf69fde10856445ccb3e1b7e", "externalIds": {"MAG": "2121170854", + "DOI": "10.1590/S0100-46702006000300002", "CorpusId": 32805152}, "corpusId": + 32805152, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/530f4bad667dda61bf69fde10856445ccb3e1b7e", "title": "Analysis of the structure and vibrational spectra of glucose and fructose", "abstract": "Molecular modelling using semiempirical methods AM1, PM3, PM5 and, MINDO as well as the Density Functional Theory method BLYP/DZVP @@ -19514,15 +22105,17 @@ interactions: modes of both molecules. It is concluded that DFT could be used to study both the structural and vibrational spectra of glucose and fructose.", "venue": "", "year": 2006, "referenceCount": 28, "citationCount": 249, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Ecl\u00e9tica Qu\u00edmica", "pages": "15-21", "volume": - "31"}, "authors": [{"authorId": "49348255", "name": "M. Ibrahim"}, {"authorId": - "2097473769", "name": "Moussa Alaam"}, {"authorId": "14934178", "name": "H. - Elhaes"}, {"authorId": "6014194", "name": "A. Jalbout"}, {"authorId": "39189524", - "name": "A. D. Leon"}]}, {"paperId": "31834acf60e32b97dab2387f89f53e416a7747b0", - "externalIds": {"MAG": "1532940241", "CorpusId": 13225337}, "url": "https://www.semanticscholar.org/paper/31834acf60e32b97dab2387f89f53e416a7747b0", + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.scielo.br/j/eq/a/cXpbqLxTpq8CZTPhtdgHBjw/?lang=en&format=pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Ecl\u00e9tica + Qu\u00edmica", "pages": "15-21", "volume": "31"}, "authors": [{"authorId": + "49348255", "name": "M. Ibrahim"}, {"authorId": "2097473769", "name": "Moussa + Alaam"}, {"authorId": "14934178", "name": "H. Elhaes"}, {"authorId": "6014194", + "name": "A. Jalbout"}, {"authorId": "39189524", "name": "A. D. Leon"}]}, {"paperId": + "31834acf60e32b97dab2387f89f53e416a7747b0", "externalIds": {"MAG": "1532940241", + "CorpusId": 13225337}, "corpusId": 13225337, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/31834acf60e32b97dab2387f89f53e416a7747b0", "title": "Distortion Analysis in Analog Integrated Circuits", "abstract": "This paper reviews different techniques used in the litera ture to analyze distortion in analog integrated circuits. It concentrates on analytical techniques @@ -19530,27 +22123,32 @@ interactions: injection method, and modeling of circuit non-linearities, are discussed with emphasis on the last tw o techniques. The theory behind each technique is e xplained, and they are compared together.", "venue": "", "year": 2002, "referenceCount": - 12, "citationCount": 273, "influentialCitationCount": 28, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2334293", + 12, "citationCount": 274, "influentialCitationCount": 28, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2334293", "name": "Mohamed Abdulla"}]}, {"paperId": "7405e3df870f8eba640f368e9d55b85e0ad8c53c", "externalIds": {"ArXiv": "math/0406507", "MAG": "2952146964", "DOI": "10.1090/S0002-9947-06-03987-0", - "CorpusId": 16178164}, "url": "https://www.semanticscholar.org/paper/7405e3df870f8eba640f368e9d55b85e0ad8c53c", + "CorpusId": 16178164}, "corpusId": 16178164, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7405e3df870f8eba640f368e9d55b85e0ad8c53c", "title": "A model category structure on the category of simplicial categories", "abstract": "In this paper we put a cofibrantly generated model category struc- ture on the category of small simplicial categories. The weak equivalences are a simplicial analogue of the notion of equivalence of categories.", "venue": "", "year": 2004, "referenceCount": 13, "citationCount": 249, "influentialCitationCount": - 37, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + 37, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/tran/2007-359-05/S0002-9947-06-03987-0/S0002-9947-06-03987-0.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-06-24", "journal": {"name": "Transactions of the American Mathematical Society", "pages": "2043-2058", "volume": "359"}, "authors": [{"authorId": "46227128", "name": "J. Bergner"}]}, {"paperId": "fbb8b6d2fb85701f8a5e2e5f73601fef33e78628", "externalIds": {"MAG": "2067367392", "DOI": "10.1002/SMLL.200600101", "CorpusId": 27291111, - "PubMed": "17193152"}, "url": "https://www.semanticscholar.org/paper/fbb8b6d2fb85701f8a5e2e5f73601fef33e78628", + "PubMed": "17193152"}, "corpusId": 27291111, "publicationVenue": {"id": "59eaa32d-b026-4d64-beaa-c422bc2629ed", + "name": "Small", "type": "journal", "issn": "1613-6810", "url": "http://www.small-journal.com/", + "alternate_urls": ["https://onlinelibrary.wiley.com/journal/16136829", "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1613-6829"]}, + "url": "https://www.semanticscholar.org/paper/fbb8b6d2fb85701f8a5e2e5f73601fef33e78628", "title": "Reversible and controllable switching of a single-molecule junction.", "abstract": "This phenomen-on is caused by statisticalfluctuations in the moleculeitself or the molecule\u2013metalcontact. The lack of controlover @@ -19558,33 +22156,40 @@ interactions: ap-plication. Recent experi-ments aiming to identify thefundamental mechanisms re-sponsibleforvoltage-inducedswitching in sandwich struc-tures", "venue": "Small", "year": 2006, "referenceCount": 32, "citationCount": 237, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-08-01", "journal": - {"name": "Small", "pages": "\n 973-7\n ", "volume": "2 8-9"}, - "authors": [{"authorId": "5504068", "name": "E. L\u00f6rtscher"}, {"authorId": - "50447908", "name": "J. Ciszek"}, {"authorId": "2175219", "name": "J. Tour"}, - {"authorId": "3219108", "name": "H. Riel"}]}, {"paperId": "9a55a10f7c5f5ad335cacdc6821c09e4d75a19d1", - "externalIds": {"MAG": "1568220999", "CorpusId": 60869938}, "url": "https://www.semanticscholar.org/paper/9a55a10f7c5f5ad335cacdc6821c09e4d75a19d1", + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-08-01", "journal": {"name": "Small", "pages": "\n 973-7\n ", + "volume": "2 8-9"}, "authors": [{"authorId": "5504068", "name": "E. L\u00f6rtscher"}, + {"authorId": "50447908", "name": "J. Ciszek"}, {"authorId": "2175219", "name": + "J. Tour"}, {"authorId": "3219108", "name": "H. Riel"}]}, {"paperId": "9a55a10f7c5f5ad335cacdc6821c09e4d75a19d1", + "externalIds": {"MAG": "1568220999", "CorpusId": 60869938}, "corpusId": 60869938, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a55a10f7c5f5ad335cacdc6821c09e4d75a19d1", "title": "Yoid: Extending the Internet Multicast Architec-ture", "abstract": - null, "venue": "", "year": 2000, "referenceCount": 2, "citationCount": 274, - "influentialCitationCount": 28, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "144674610", "name": - "P. Francis"}]}, {"paperId": "d63f8a8a2bdfba955a8c3a1df9eeba82ac4829d6", "externalIds": - {"MAG": "2418582869", "DOI": "10.1038/084538a0", "CorpusId": 3977174, "PubMed": - "14273308"}, "url": "https://www.semanticscholar.org/paper/d63f8a8a2bdfba955a8c3a1df9eeba82ac4829d6", + null, "venue": "", "year": 2000, "referenceCount": 2, "citationCount": 275, + "influentialCitationCount": 27, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144674610", + "name": "P. Francis"}]}, {"paperId": "d63f8a8a2bdfba955a8c3a1df9eeba82ac4829d6", + "externalIds": {"MAG": "2418582869", "DOI": "10.1038/084538a0", "CorpusId": + 3977174, "PubMed": "14273308"}, "corpusId": 3977174, "publicationVenue": {"id": + "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, + "url": "https://www.semanticscholar.org/paper/d63f8a8a2bdfba955a8c3a1df9eeba82ac4829d6", "title": "Structure and Function.", "abstract": null, "venue": "Nature", "year": - 1910, "referenceCount": 0, "citationCount": 4541, "influentialCitationCount": - 244, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 1910, "referenceCount": 0, "citationCount": 4549, "influentialCitationCount": + 245, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/084538a0.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1910-10-01", "journal": {"name": "Nature", "pages": "538-538", "volume": "84"}, "authors": [{"authorId": "15019588", "name": "H. Kowarzyk"}]}, {"paperId": "4261630f62ed4d787d9f4929d8c9bda9feae8bd5", - "externalIds": {"MAG": "76349267", "CorpusId": 16058513}, "url": "https://www.semanticscholar.org/paper/4261630f62ed4d787d9f4929d8c9bda9feae8bd5", + "externalIds": {"MAG": "76349267", "CorpusId": 16058513}, "corpusId": 16058513, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4261630f62ed4d787d9f4929d8c9bda9feae8bd5", "title": "Jadex: Implementing a BDI-Infrastructure for JADE Agents", "abstract": "INTELLIGENT AGENTS ARE A MODELLING PARADIGM, BASED ON THE NOTION OF AGENTS WITH MENTAL STATES. THE AGENT METAPHOR IS NOWADAYS USED IN MANY RESEARCH AND @@ -19598,14 +22203,18 @@ interactions: AND THE DESIGN AND REALIZATION IN JADEX, AS WELL AS THE INTEGRATION OF THE ADD-ON INTO THE JADE AGENT FRAMEWORK.", "venue": "", "year": 2003, "referenceCount": 17, "citationCount": 254, "influentialCitationCount": 19, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1764412", + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1764412", "name": "L. Braubach"}, {"authorId": "1692146", "name": "W. Lamersdorf"}, {"authorId": "1793305", "name": "A. Pokahr"}]}, {"paperId": "30e35a043af1ffdab9100cea9a7d3189f9e4cf12", "externalIds": {"MAG": "2137826503", "DOI": "10.1177/036354659602400606", - "CorpusId": 23120172, "PubMed": "8947393"}, "url": "https://www.semanticscholar.org/paper/30e35a043af1ffdab9100cea9a7d3189f9e4cf12", + "CorpusId": 23120172, "PubMed": "8947393"}, "corpusId": 23120172, "publicationVenue": + {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", "name": "American Journal of + Sports Medicine", "type": "journal", "alternate_names": ["Am J Sport Med"], + "issn": "0363-5465", "url": "http://ajs.sagepub.com/", "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, + "url": "https://www.semanticscholar.org/paper/30e35a043af1ffdab9100cea9a7d3189f9e4cf12", "title": "The Posterolateral Aspect of the Knee", "abstract": "Thirty cadaveric knees were dissected to obtain a de tailed understanding of the anatomic structures of the posterolateral aspect of the knee, and a dependable surgical approach @@ -19624,14 +22233,19 @@ interactions: and clin ical studies of the posterolateral aspect of the knee.", "venue": "American Journal of Sports Medicine", "year": 1996, "referenceCount": 40, "citationCount": 359, "influentialCitationCount": 12, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1996-11-01", "journal": {"name": "The American Journal of Sports Medicine", "pages": "732 - 739", "volume": "24"}, "authors": [{"authorId": "35037951", "name": "G. C. Terry"}, {"authorId": "4772881", "name": "R. LaPrade"}]}, {"paperId": "86f6d15302b960da07e1a21c83bc0f3f3afdc61a", "externalIds": {"MAG": "2175970545", "DOI": "10.1146/ANNUREV.PH.44.030182.003205", - "CorpusId": 38039154, "PubMed": "7041809"}, "url": "https://www.semanticscholar.org/paper/86f6d15302b960da07e1a21c83bc0f3f3afdc61a", + "CorpusId": 38039154, "PubMed": "7041809"}, "corpusId": 38039154, "publicationVenue": + {"id": "eedc6e61-e846-485a-a273-0cc8bb06d7d3", "name": "Annual Review of Physiology", + "type": "journal", "alternate_names": ["Annu Rev Physiol"], "issn": "0066-4278", + "url": "https://www.annualreviews.org/journal/physiol", "alternate_urls": + ["https://www.annualreviews.org/loi/physiol", "http://physiol.annualreviews.org/", + "http://arjournals.annualreviews.org/loi/physiol"]}, "url": "https://www.semanticscholar.org/paper/86f6d15302b960da07e1a21c83bc0f3f3afdc61a", "title": "Post-translational proteolysis in polypeptide hormone biosynthesis.", "abstract": "be further conveniently subdivided into the preproteins and proproteins. These two large groups differ significantly in their processing kinetics, @@ -19643,15 +22257,15 @@ interactions: tures requiring additional enzymes for several of the prohormonal systems.", "venue": "Annual Review of Physiology", "year": 1982, "referenceCount": 1, "citationCount": 486, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": null, "journal": {"name": "Annual review - of physiology", "pages": "\n 625-38\n ", "volume": "44"}, - "authors": [{"authorId": "3799470", "name": "K. Docherty"}, {"authorId": "1710073", - "name": "D. Steiner"}]}, {"paperId": "ebf1606a381ee973313d9e3467f06e62b7e34527", + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": null, "journal": {"name": + "Annual review of physiology", "pages": "\n 625-38\n ", "volume": + "44"}, "authors": [{"authorId": "3799470", "name": "K. Docherty"}, {"authorId": + "1710073", "name": "D. Steiner"}]}, {"paperId": "ebf1606a381ee973313d9e3467f06e62b7e34527", "externalIds": {"MAG": "2070580569", "DOI": "10.1080/87567550009596080", "CorpusId": - 144252000}, "url": "https://www.semanticscholar.org/paper/ebf1606a381ee973313d9e3467f06e62b7e34527", + 144252000}, "corpusId": 144252000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ebf1606a381ee973313d9e3467f06e62b7e34527", "title": "Integrating Teaching Styles and Learning Styles with Instructional Technology", "abstract": "present instructional modules on a variety of topics. Web pages allow teachers to post lec tures, assignments, and exams in an elec @@ -19660,24 +22274,15 @@ interactions: visual presentations, and the telephone and television bring guest experts from distant locations into a classroom. Course information can be accessed from a dis", "venue": "", "year": 2000, "referenceCount": 23, "citationCount": - 287, "influentialCitationCount": 13, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2000-01-01", "journal": {"name": "College Teaching", - "pages": "10 - 2", "volume": "48"}, "authors": [{"authorId": "98653859", "name": - "A. Grasha"}, {"authorId": "1421116751", "name": "Natalia Yangarber-Hicks"}]}, - {"paperId": "df5bbf19470a53ebed72ab1c275662112cf3d1df", "externalIds": {"MAG": - "1532594806", "DOI": "10.1007/978-1-4612-1954-5", "CorpusId": 93016073}, "url": - "https://www.semanticscholar.org/paper/df5bbf19470a53ebed72ab1c275662112cf3d1df", - "title": "Nuclear Magnetic Resonance of Liquid Crystals", "abstract": null, - "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 370, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "8054635", "name": "R. Y. Dong"}]}, - {"paperId": "16c109faec8d3730a06d5beb7b8562011d43b6d6", "externalIds": {"MAG": - "420692389", "CorpusId": 118605902}, "url": "https://www.semanticscholar.org/paper/16c109faec8d3730a06d5beb7b8562011d43b6d6", + 287, "influentialCitationCount": 13, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-01-01", "journal": {"name": + "College Teaching", "pages": "10 - 2", "volume": "48"}, "authors": [{"authorId": + "98653859", "name": "A. Grasha"}, {"authorId": "1421116751", "name": "Natalia + Yangarber-Hicks"}]}, {"paperId": "16c109faec8d3730a06d5beb7b8562011d43b6d6", + "externalIds": {"MAG": "420692389", "CorpusId": 118605902}, "corpusId": 118605902, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/16c109faec8d3730a06d5beb7b8562011d43b6d6", "title": "Quantum Information: An Overview", "abstract": "Foreword.- Section 1 Qubits: Quantum state purity.- The representation of qubits.- Stokes parameters.- Single-qubit gates.- The double-slit experiment.- The Mach-Zehnder interferometer.- @@ -19726,14 +22331,46 @@ interactions: algorithm.- The Simon algorithm.- Appendix A Mathematical elements: Boolean algebra and Galois fields.- Random variables.- Hilbert space.- The standard quantum formalism.- Dirac notation.- Groups o", "venue": "", "year": 2006, - "referenceCount": 0, "citationCount": 179, "influentialCitationCount": 9, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "referenceCount": 0, "citationCount": 181, "influentialCitationCount": 9, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2006-11-15", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "38615982", "name": "G. Jaeger"}]}, {"paperId": "9d5bdad1b7afc09cce5ebd49f5208193ffcdcbf5", - "externalIds": {"MAG": "2088129573", "DOI": "10.2307/2098561", "CorpusId": - 154351414}, "url": "https://www.semanticscholar.org/paper/9d5bdad1b7afc09cce5ebd49f5208193ffcdcbf5", + "38615982", "name": "G. Jaeger"}]}, {"paperId": "df5bbf19470a53ebed72ab1c275662112cf3d1df", + "externalIds": {"MAG": "1532594806", "DOI": "10.1007/978-1-4612-1954-5", "CorpusId": + 93016073}, "corpusId": 93016073, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/df5bbf19470a53ebed72ab1c275662112cf3d1df", + "title": "Nuclear Magnetic Resonance of Liquid Crystals", "abstract": null, + "venue": "", "year": 1994, "referenceCount": 0, "citationCount": 371, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm:978-1-4612-1954-5/1?pdf=chapter%20toc", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "8054635", "name": "R. Y. Dong"}]}, {"paperId": "97ef8662d4d4e23ba769e5b1d8d369644a4a5928", + "externalIds": {"MAG": "2120002200", "DOI": "10.1590/S0101-73302002008100008", + "CorpusId": 145334201}, "corpusId": 145334201, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/97ef8662d4d4e23ba769e5b1d8d369644a4a5928", + "title": "Novas pr\u00e1ticas de leitura e escrita: letramento na cibercultura", + "abstract": "In the context of two different cultures - print cul- ture and + electronic culture, or cyberculture -, this article seeks a clearer comprehension + of literacy opposing typographic and digi- tal technologies of reading and + writing. Through the differences regarding the writing space and the mechanisms + of producing, re- producing and diffusing ideas, it argues that different + kinds of lit- eracy - that is, different social, cognitive and discursive + effects - have resulted from such different modalities of written communi- + cation. Since literacy is not a single, homogeneous phenomenon, it finally + suggests this word should be used in its plural rather than singular form: + literacies.", "venue": "", "year": 2002, "referenceCount": 12, "citationCount": + 243, "influentialCitationCount": 16, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.scielo.br/j/es/a/zG4cBvLkSZfcZnXfZGLzsXb/?lang=pt&format=pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-12-01", "journal": {"name": + "Educa\u00e7\u00e3o & Sociedade", "pages": "143-160", "volume": "23"}, "authors": + [{"authorId": "2072905082", "name": "Magda Becker Soares"}]}, {"paperId": + "9d5bdad1b7afc09cce5ebd49f5208193ffcdcbf5", "externalIds": {"MAG": "2088129573", + "DOI": "10.2307/2098561", "CorpusId": 154351414}, "corpusId": 154351414, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9d5bdad1b7afc09cce5ebd49f5208193ffcdcbf5", "title": "Strategy, Structure and Performance of Korean Business Groups: A Transactions Cost Approach", "abstract": "The authors use the transactions cost approach to analyze the diversification strategy and the resulting structure @@ -19747,15 +22384,16 @@ interactions: empirical result tha t group-affiliated firms show superior economic performance. Copyright 1988 by Blackwell Publishing Ltd.", "venue": "", "year": 1988, "referenceCount": 20, "citationCount": 397, "influentialCitationCount": 16, "isOpenAccess": - false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1988-12-01", "journal": {"name": "Journal of Industrial - Economics", "pages": "141-158", "volume": "37"}, "authors": [{"authorId": - "2186027763", "name": "Sea-Jin Chang"}, {"authorId": "144842719", "name": - "Ung-Yong Choi"}]}, {"paperId": "c5be8677479d89ac485833648f1c441d58482768", + false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1988-12-01", "journal": {"name": + "Journal of Industrial Economics", "pages": "141-158", "volume": "37"}, "authors": + [{"authorId": "2186027763", "name": "Sea-Jin Chang"}, {"authorId": "144842719", + "name": "Ung-Yong Choi"}]}, {"paperId": "c5be8677479d89ac485833648f1c441d58482768", "externalIds": {"MAG": "2138551966", "DOI": "10.1080/00220671.1995.9941309", - "CorpusId": 145072316}, "url": "https://www.semanticscholar.org/paper/c5be8677479d89ac485833648f1c441d58482768", + "CorpusId": 145072316}, "corpusId": 145072316, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c5be8677479d89ac485833648f1c441d58482768", "title": "Advances in research on instruction.", "abstract": "A major area of research, one with important impli cations for teaching, has been the research on cognitive processing, research on how information is stored and retrieved. @@ -19767,27 +22405,31 @@ interactions: and richness of the relationships are all im portant for processing information and solving prob lems. It is easier to assimilate new information and it is easier", "venue": "", "year": 1995, "referenceCount": 15, "citationCount": - 260, "influentialCitationCount": 25, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1995-05-01", "journal": {"name": "Journal of Educational - Research", "pages": "262-268", "volume": "88"}, "authors": [{"authorId": "69018495", - "name": "B. Rosenshine"}]}, {"paperId": "c9f0f3d7d20e7adc1ef8a5b336fb6a970f49f272", + 261, "influentialCitationCount": 25, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1995-05-01", "journal": {"name": + "Journal of Educational Research", "pages": "262-268", "volume": "88"}, "authors": + [{"authorId": "69018495", "name": "B. Rosenshine"}]}, {"paperId": "c9f0f3d7d20e7adc1ef8a5b336fb6a970f49f272", "externalIds": {"MAG": "2082063162", "DOI": "10.1038/352213A0", "CorpusId": - 4369312, "PubMed": "1857417"}, "url": "https://www.semanticscholar.org/paper/c9f0f3d7d20e7adc1ef8a5b336fb6a970f49f272", + 4369312, "PubMed": "1857417"}, "corpusId": 4369312, "publicationVenue": {"id": + "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, + "url": "https://www.semanticscholar.org/paper/c9f0f3d7d20e7adc1ef8a5b336fb6a970f49f272", "title": "Structural basis of anticodon loop recognition by glutaminyl-tRNA synthetase", "abstract": null, "venue": "Nature", "year": 1991, "referenceCount": 26, "citationCount": 323, "influentialCitationCount": 14, "isOpenAccess": - false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1991-07-18", "journal": {"name": "Nature", "pages": "213-218", "volume": - "352"}, "authors": [{"authorId": "4105107", "name": "M. A. Rould"}, {"authorId": - "153748576", "name": "J. Perona"}, {"authorId": "5719602", "name": "T. Steitz"}]}, - {"paperId": "af86eda1e2fb70e1320b0d4f2651ecc8d5c28de3", "externalIds": {"MAG": - "2159989667", "DOI": "10.1006/ICAR.1996.5583", "CorpusId": 17693544}, "url": - "https://www.semanticscholar.org/paper/af86eda1e2fb70e1320b0d4f2651ecc8d5c28de3", + false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Chemistry", "source": "s2-fos-model"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1991-07-18", "journal": {"name": "Nature", "pages": "213-218", + "volume": "352"}, "authors": [{"authorId": "4105107", "name": "M. A. Rould"}, + {"authorId": "153748576", "name": "J. Perona"}, {"authorId": "5719602", "name": + "T. Steitz"}]}, {"paperId": "af86eda1e2fb70e1320b0d4f2651ecc8d5c28de3", "externalIds": + {"MAG": "2159989667", "DOI": "10.1006/ICAR.1996.5583", "CorpusId": 17693544}, + "corpusId": 17693544, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/af86eda1e2fb70e1320b0d4f2651ecc8d5c28de3", "title": "Effects of Hyperfine Particles on Reflectance Spectra from 0.3 to 25 \u03bcm", "abstract": "Fine grained particles ,50 mm in size dominate particle size changes in the volume scattering region, the Christiansen feadistributions @@ -19801,33 +22443,15 @@ interactions: The effects of fine particles that are approximately the same size as the wavelength of light on reflectance", "venue": "", "year": 1997, "referenceCount": 39, "citationCount": 262, "influentialCitationCount": 20, "isOpenAccess": - false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "external"}, {"category": "Environmental Science", - "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], + false, "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Icarus", "pages": "145-163", "volume": "125"}, "authors": [{"authorId": "33488956", "name": "J. Mustard"}, {"authorId": "92643071", "name": "J. Hays"}]}, {"paperId": - "97ef8662d4d4e23ba769e5b1d8d369644a4a5928", "externalIds": {"MAG": "2120002200", - "DOI": "10.1590/S0101-73302002008100008", "CorpusId": 145334201}, "url": "https://www.semanticscholar.org/paper/97ef8662d4d4e23ba769e5b1d8d369644a4a5928", - "title": "Novas pr\u00e1ticas de leitura e escrita: letramento na cibercultura", - "abstract": "In the context of two different cultures - print cul- ture and - electronic culture, or cyberculture -, this article seeks a clearer comprehension - of literacy opposing typographic and digi- tal technologies of reading and - writing. Through the differences regarding the writing space and the mechanisms - of producing, re- producing and diffusing ideas, it argues that different - kinds of lit- eracy - that is, different social, cognitive and discursive - effects - have resulted from such different modalities of written communi- - cation. Since literacy is not a single, homogeneous phenomenon, it finally - suggests this word should be used in its plural rather than singular form: - literacies.", "venue": "", "year": 2002, "referenceCount": 12, "citationCount": - 241, "influentialCitationCount": 16, "isOpenAccess": true, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2002-12-01", "journal": {"name": "Educa\u00e7\u00e3o - & Sociedade", "pages": "143-160", "volume": "23"}, "authors": [{"authorId": - "2072905082", "name": "Magda Becker Soares"}]}, {"paperId": "9021358a8dd1443cebfdc6e45cafd0cc33e61f26", - "externalIds": {"MAG": "1989481315", "DOI": "10.1177/017084069401500602", - "CorpusId": 143721170}, "url": "https://www.semanticscholar.org/paper/9021358a8dd1443cebfdc6e45cafd0cc33e61f26", + "9021358a8dd1443cebfdc6e45cafd0cc33e61f26", "externalIds": {"MAG": "1989481315", + "DOI": "10.1177/017084069401500602", "CorpusId": 143721170}, "corpusId": 143721170, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9021358a8dd1443cebfdc6e45cafd0cc33e61f26", "title": "Institutional Pressures and Isomorphic Change: An Empirical Test", "abstract": "This paper examines the process of isomorphic change. It does so by examin ing the dynamics of the change process and looking at change @@ -19839,14 +22463,18 @@ interactions: of struc ture do not change as much as others, thus demonstrating resistance to institu tional pressures. The processes by which the changes that occurred took place are explored.", "venue": "", "year": 1994, "referenceCount": 43, - "citationCount": 271, "influentialCitationCount": 17, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1994-11-01", "journal": - {"name": "Organization Studies", "pages": "803 - 827", "volume": "15"}, "authors": - [{"authorId": "49660065", "name": "T. Slack"}, {"authorId": "3335139", "name": - "B. Hinings"}]}, {"paperId": "6407529ff47996872055d20bf795fc4e1b90c773", "externalIds": - {"MAG": "71910563", "CorpusId": 45555725, "PubMed": "171067"}, "url": "https://www.semanticscholar.org/paper/6407529ff47996872055d20bf795fc4e1b90c773", + "citationCount": 273, "influentialCitationCount": 17, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1994-11-01", "journal": {"name": "Organization Studies", "pages": "803 - + 827", "volume": "15"}, "authors": [{"authorId": "49660065", "name": "T. Slack"}, + {"authorId": "3335139", "name": "B. Hinings"}]}, {"paperId": "6407529ff47996872055d20bf795fc4e1b90c773", + "externalIds": {"MAG": "71910563", "CorpusId": 45555725, "PubMed": "171067"}, + "corpusId": 45555725, "publicationVenue": {"id": "b0bd78b2-6591-460e-af71-196409b62e2c", + "name": "Cancer Research", "type": "journal", "alternate_names": ["Cancer + Res"], "issn": "0008-5472", "url": "https://cancerres.aacrjournals.org/", + "alternate_urls": ["http://cancerres.aacrjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/6407529ff47996872055d20bf795fc4e1b90c773", "title": "Report of a workshop on classification of specific hepatocellular lesions in rats.", "abstract": "On December 1 1 to 13, 1974, The Na t iona l Cancer Institute sponsored a workshop in Silver Spring, Md. on the classif @@ -19878,14 +22506,18 @@ interactions: were submit ted anonymous ly and the results were tabulated and distr ibuted at the workshop.", "venue": "Cancer Research", "year": 1975, "referenceCount": 2, "citationCount": 403, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1975-11-01", "journal": {"name": "Cancer research", "pages": "\n 3214-23\n ", "volume": "35 11 Pt 1"}, "authors": [{"authorId": "7848244", "name": "R. Squire"}, {"authorId": "2058484597", "name": "M. Levitt"}]}, {"paperId": "8c024bb95365d943d4c62aa2ce2ca8228c85bbd0", "externalIds": {"MAG": - "2883371642", "CorpusId": 11265741, "PubMed": "15888949"}, "url": "https://www.semanticscholar.org/paper/8c024bb95365d943d4c62aa2ce2ca8228c85bbd0", + "2883371642", "CorpusId": 11265741, "PubMed": "15888949"}, "corpusId": 11265741, + "publicationVenue": {"id": "96fa7399-a724-43de-bec7-f09a913e77da", "name": + "Journal of clinical orthodontics", "type": "journal", "alternate_names": + ["J clin orthod"], "issn": "0022-3875", "alternate_issns": ["1945-225X"], + "url": "https://www.jco-online.com/"}, "url": "https://www.semanticscholar.org/paper/8c024bb95365d943d4c62aa2ce2ca8228c85bbd0", "title": "The eight components of a balanced smile.", "abstract": "n orthodontic treatment, esthetics has tradition-ally been associated with profile enhancement.Both the Angle classification of malocclusionand the cephalometric analysis have @@ -19896,26 +22528,35 @@ interactions: article is to review theeight major components of the smile (Fig. 1) anddiscuss their impact on orthodontic diagnosis andtreatment planning.", "venue": "Journal of clinical orthodontics", "year": 2005, "referenceCount": 44, "citationCount": - 148, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2005-03-01", "journal": {"name": "Journal of - clinical orthodontics : JCO", "pages": "\n 155-67; quiz 154\n ", - "volume": "39 3"}, "authors": [{"authorId": "80043339", "name": "R. Sabri"}]}, - {"paperId": "215ab4ba681329b6b0d6ca79fb03f5628394095b", "externalIds": {"MAG": - "2048804838", "DOI": "10.1023/B:LAND.0000004184.03500.a8", "CorpusId": 5667349}, - "url": "https://www.semanticscholar.org/paper/215ab4ba681329b6b0d6ca79fb03f5628394095b", + 148, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2005-03-01", + "journal": {"name": "Journal of clinical orthodontics : JCO", "pages": "\n 155-67; + quiz 154\n ", "volume": "39 3"}, "authors": [{"authorId": "80043339", + "name": "R. Sabri"}]}, {"paperId": "215ab4ba681329b6b0d6ca79fb03f5628394095b", + "externalIds": {"MAG": "2048804838", "DOI": "10.1023/B:LAND.0000004184.03500.a8", + "CorpusId": 5667349}, "corpusId": 5667349, "publicationVenue": {"id": "3efe0b58-b06e-42c1-8a30-01b13201c739", + "name": "Landscape Ecology", "type": "journal", "alternate_names": ["Landsc + Ecol"], "issn": "0921-2973", "url": "http://www.springer.com/east/home?SGWID=5-102-70-35541277-detailsPage%3Djournal|description&SHORTCUT=www.springer.com/journal/10980/about&changeHeader=true", + "alternate_urls": ["https://link.springer.com/journal/10980"]}, "url": "https://www.semanticscholar.org/paper/215ab4ba681329b6b0d6ca79fb03f5628394095b", "title": "Is landscape connectivity a dependent or independent variable?", "abstract": null, "venue": "Landscape Ecology", "year": 2003, "referenceCount": 112, "citationCount": 163, "influentialCitationCount": 10, "isOpenAccess": - false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2003-10-01", "journal": - {"name": "Landscape Ecology", "pages": "687-699", "volume": "18"}, "authors": - [{"authorId": "36293785", "name": "B. J. Goodwin"}]}, {"paperId": "c809b349dee7d7f0e5947b05432b2b172c975811", - "externalIds": {"MAG": "2001029260", "DOI": "10.1359/jbmr.2000.15.2.183", - "CorpusId": 36463659, "PubMed": "10703919"}, "url": "https://www.semanticscholar.org/paper/c809b349dee7d7f0e5947b05432b2b172c975811", + false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2003-10-01", "journal": {"name": "Landscape Ecology", "pages": "687-699", + "volume": "18"}, "authors": [{"authorId": "36293785", "name": "B. J. Goodwin"}]}, + {"paperId": "c809b349dee7d7f0e5947b05432b2b172c975811", "externalIds": {"MAG": + "2001029260", "DOI": "10.1359/jbmr.2000.15.2.183", "CorpusId": 36463659, "PubMed": + "10703919"}, "corpusId": 36463659, "publicationVenue": {"id": "3b438704-c051-48f5-b845-623aaf356acb", + "name": "Journal of Bone and Mineral Research", "type": "journal", "alternate_names": + ["J Bone Miner Res"], "issn": "0884-0431", "url": "http://www3.interscience.wiley.com/journal/122662747/home", + "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1002/(issn)1523-4681", + "http://www.jbmr-online.org/", "https://www.asbmr.org/Publications/JBMR/Default.aspx"]}, + "url": "https://www.semanticscholar.org/paper/c809b349dee7d7f0e5947b05432b2b172c975811", "title": "Bone Matters: Are Density Increases Necessary to Reduce Fracture Risk?", "abstract": "As aconsequence of the exponential BMD/fracture risk relationship,very small increases in BMD can be expected to have very largeeffects @@ -19926,13 +22567,15 @@ interactions: different therapies havebeen shown to increase bone density and reduce frac-tures.", "venue": "Journal of Bone and Mineral Research", "year": 2000, "referenceCount": 28, "citationCount": 218, "influentialCitationCount": 10, "isOpenAccess": - true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1359/jbmr.2000.15.2.183", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2000-02-01", "journal": {"name": "Journal of Bone and Mineral Research", "volume": "15"}, "authors": [{"authorId": "1817757", "name": "K. Faulkner"}]}, {"paperId": "9b2de8a6675750664bf2113d0dbbbef6800c1de5", "externalIds": {"MAG": "173798632", - "CorpusId": 118046102}, "url": "https://www.semanticscholar.org/paper/9b2de8a6675750664bf2113d0dbbbef6800c1de5", + "CorpusId": 118046102}, "corpusId": 118046102, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9b2de8a6675750664bf2113d0dbbbef6800c1de5", "title": "Lectures on algebraic cycles", "abstract": "These lecture notes form an expanded version of a series of lec- tures delivered by the author during 13-19 August 2000 at the Instituto de Matematicas at UNAM in Cuernavaca, @@ -19940,15 +22583,15 @@ interactions: as part of the conference activity on Geometria Algebraica y Algebra Conmutativa. They are intended to give a survey of the subject on Algebraic Cycles to non-specialists, and from the point of view of a transcendental algebraic geometer.", "venue": - "", "year": 2001, "referenceCount": 8, "citationCount": 176, "influentialCitationCount": - 15, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "Boletin De La Sociedad Matematica Mexicana", "pages": - "137-192", "volume": "7"}, "authors": [{"authorId": "2109240389", "name": - "James D. Lewis"}]}, {"paperId": "34cd14dd38fc5d46337af4501486b3944344f394", + "", "year": 2001, "referenceCount": 8, "citationCount": 178, "influentialCitationCount": + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": {"name": "Boletin De La Sociedad Matematica + Mexicana", "pages": "137-192", "volume": "7"}, "authors": [{"authorId": "2109240389", + "name": "James D. Lewis"}]}, {"paperId": "34cd14dd38fc5d46337af4501486b3944344f394", "externalIds": {"MAG": "2952115949", "ArXiv": "astro-ph/9801174", "CorpusId": - 15153690}, "url": "https://www.semanticscholar.org/paper/34cd14dd38fc5d46337af4501486b3944344f394", + 15153690}, "corpusId": 15153690, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/34cd14dd38fc5d46337af4501486b3944344f394", "title": "ROLE OF THE SCALAR FIELD IN GRAVITATIONAL LENSING", "abstract": "A static and circularly symmetric lens character- ized by mass and scalar charge parameters is constructed. For the small values of the scalar charge @@ -19959,31 +22602,36 @@ interactions: formation of two or four images and possibility of detecting three images near the lens for sources located at relatively large angular positions. Such a novel lens may also be treated as a naked singularity lens.", "venue": "", - "year": 1998, "referenceCount": 22, "citationCount": 220, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-01-18", - "journal": {"name": "Astronomy and Astrophysics", "pages": "1-8", "volume": - "337"}, "authors": [{"authorId": null, "name": "K. S. Virbhadra"}, {"authorId": - "46654329", "name": "D. Narasimha"}, {"authorId": "102417191", "name": "S. - S. T. I. O. F. Research"}, {"authorId": "122671767", "name": "India."}, {"authorId": - "118652294", "name": "Universityof Zululand"}, {"authorId": "66097677", "name": - "S. Africa"}]}, {"paperId": "3223e59b0d79750b2451d360aebf880f99e51cad", "externalIds": - {"MAG": "2048931419", "DOI": "10.1038/371626A0", "CorpusId": 4315547, "PubMed": - "7935798"}, "url": "https://www.semanticscholar.org/paper/3223e59b0d79750b2451d360aebf880f99e51cad", + "year": 1998, "referenceCount": 22, "citationCount": 221, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1998-01-18", "journal": {"name": "Astronomy and Astrophysics", "pages": "1-8", + "volume": "337"}, "authors": [{"authorId": null, "name": "K. S. Virbhadra"}, + {"authorId": "46654329", "name": "D. Narasimha"}, {"authorId": "102417191", + "name": "S. S. T. I. O. F. Research"}, {"authorId": "122671767", "name": "India."}, + {"authorId": "118652294", "name": "Universityof Zululand"}, {"authorId": "66097677", + "name": "S. Africa"}]}, {"paperId": "3223e59b0d79750b2451d360aebf880f99e51cad", + "externalIds": {"MAG": "2048931419", "DOI": "10.1038/371626A0", "CorpusId": + 4315547, "PubMed": "7935798"}, "corpusId": 4315547, "publicationVenue": {"id": + "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, + "url": "https://www.semanticscholar.org/paper/3223e59b0d79750b2451d360aebf880f99e51cad", "title": "Three-dimensional structure of a peptide extending from one end of a class I MHC binding site", "abstract": null, "venue": "Nature", "year": - 1994, "referenceCount": 24, "citationCount": 229, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": - "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "1994-10-13", "journal": {"name": "Nature", - "pages": "626-629", "volume": "371"}, "authors": [{"authorId": "47937577", - "name": "E. Collins"}, {"authorId": "6680830", "name": "D. Garboczi"}, {"authorId": - "2435364", "name": "D. Wiley"}]}, {"paperId": "91bfd31f5960b0de9e9313cedf1c5cc5bd503166", + 1994, "referenceCount": 24, "citationCount": 230, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "1994-10-13", "journal": + {"name": "Nature", "pages": "626-629", "volume": "371"}, "authors": [{"authorId": + "47937577", "name": "E. Collins"}, {"authorId": "6680830", "name": "D. Garboczi"}, + {"authorId": "2435364", "name": "D. Wiley"}]}, {"paperId": "91bfd31f5960b0de9e9313cedf1c5cc5bd503166", "externalIds": {"MAG": "2128609762", "DOI": "10.1177/002194360003700101", - "CorpusId": 145089990}, "url": "https://www.semanticscholar.org/paper/91bfd31f5960b0de9e9313cedf1c5cc5bd503166", + "CorpusId": 145089990}, "corpusId": 145089990, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/91bfd31f5960b0de9e9313cedf1c5cc5bd503166", "title": "Telling the Investment Story: A Narrative Analysis of Shareholder Reports", "abstract": "Narrative analysis helps us better understand how writers handle complex business communication challenges. This study analyzed shareholder @@ -20000,14 +22648,44 @@ interactions: story affect how readers experience a text. Applied similarly, narrative analysis could elucidate other business communication genres, principles, problems, and questions.", "venue": "", "year": 2000, "referenceCount": 50, "citationCount": - 153, "influentialCitationCount": 20, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-01-01", "journal": {"name": "Journal of Business - Communication", "pages": "38 - 7", "volume": "37"}, "authors": [{"authorId": - "88603000", "name": "Daphne A. Jameson"}]}, {"paperId": "b3d07495b9bd65d744eb2eb92f57610348b917f9", - "externalIds": {"MAG": "1841162023", "DOI": "10.1152/AJPLEGACY.1971.220.4.1053", - "CorpusId": 14381561, "PubMed": "4323901"}, "url": "https://www.semanticscholar.org/paper/b3d07495b9bd65d744eb2eb92f57610348b917f9", + 153, "influentialCitationCount": 20, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2000-01-01", "journal": {"name": "Journal + of Business Communication", "pages": "38 - 7", "volume": "37"}, "authors": + [{"authorId": "88603000", "name": "Daphne A. Jameson"}]}, {"paperId": "ef2fb09d175826dac75ab450b1f2fe6925a9adf2", + "externalIds": {"MAG": "1971117297", "DOI": "10.1177/106939719402800301", + "CorpusId": 30868079}, "corpusId": 30868079, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ef2fb09d175826dac75ab450b1f2fe6925a9adf2", + "title": "Street Children in the Developing World: A Review of Their Condition", + "abstract": "The article reviews the literature on street children and points + out why there are street children in certain cultures and not in others. The + reasons for their existence are related to poverty, abuse, and modernizing + factors. Street children are defined and distinguished from working and refugee + children. Details about the family struc ture of street children are given. + How the children cope and their level of psychological functioning are discussed. + The article gives reasons for why the children are treated with such violence + and gives attention to methodological research problems that include the children''s + ability to distort information, the researcher''s procliv ity to under- or + overestimate the children''s emotional condition, distortions of facts created + by the press and international organiza tions, and general cross-cultural + research issues.", "venue": "", "year": 1994, "referenceCount": 161, "citationCount": + 209, "influentialCitationCount": 16, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.sjsu.edu/faculty/laptekar/download/crossculturalresearch.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1994-08-01", + "journal": {"name": "Cross-Cultural Research", "pages": "195 - 224", "volume": + "28"}, "authors": [{"authorId": "66663062", "name": "L. Aptekar"}]}, {"paperId": + "b3d07495b9bd65d744eb2eb92f57610348b917f9", "externalIds": {"MAG": "1841162023", + "DOI": "10.1152/AJPLEGACY.1971.220.4.1053", "CorpusId": 14381561, "PubMed": + "4323901"}, "corpusId": 14381561, "publicationVenue": {"id": "998813ea-da72-494a-90fc-783751929f3c", + "name": "American Journal of Physiology", "type": "journal", "alternate_names": + ["Am J Physiol"], "issn": "0002-9513", "alternate_issns": ["2163-5773"], "url": + "http://search.epnet.com/direct.asp?db=aph&jid=AHY", "alternate_urls": ["http://www.physiology.org/", + "http://www.physiology.org/journal/ajplegacy", "https://www.physiology.org/journal/ajpcell", + "http://ajpcon.physiology.org/", "https://www.biodiversitylibrary.org/bibliography/38917"]}, + "url": "https://www.semanticscholar.org/paper/b3d07495b9bd65d744eb2eb92f57610348b917f9", "title": "Temperature, skeletal muscle mitochondrial functions, and oxygen debt.", "abstract": "E. BEYER. Temperature, skeletal muscle mitochondrid functions, and oxygen debt. Am. J* Physiol. 220(4): 1053-1059. 1971 .-Compared to resting @@ -20017,17 +22695,18 @@ interactions: muscle mitochondria was measured at temperatures between 25 and 45 C in vitro. Increasing temperature had", "venue": "American Journal of Physiology", "year": 1971, "referenceCount": 35, "citationCount": 256, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1971-04-01", "journal": - {"name": "The American journal of physiology", "pages": "\n 1053-9\n ", - "volume": "220 4"}, "authors": [{"authorId": "122408892", "name": "G. Brooks"}, - {"authorId": "13670311", "name": "K. Hittelman"}, {"authorId": "144626191", - "name": "J. Faulkner"}, {"authorId": "11415813", "name": "R. E. Beyer"}]}, - {"paperId": "014675a49aecc1488fb9197b9f6261a993f21aaa", "externalIds": {"MAG": - "2096830445", "DOI": "10.1177/105960117600100405", "CorpusId": 116601603}, - "url": "https://www.semanticscholar.org/paper/014675a49aecc1488fb9197b9f6261a993f21aaa", + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1971-04-01", "journal": {"name": "The American journal of physiology", "pages": + "\n 1053-9\n ", "volume": "220 4"}, "authors": [{"authorId": + "122408892", "name": "G. Brooks"}, {"authorId": "13670311", "name": "K. Hittelman"}, + {"authorId": "144626191", "name": "J. Faulkner"}, {"authorId": "11415813", + "name": "R. E. Beyer"}]}, {"paperId": "014675a49aecc1488fb9197b9f6261a993f21aaa", + "externalIds": {"MAG": "2096830445", "DOI": "10.1177/105960117600100405", + "CorpusId": 116601603}, "corpusId": 116601603, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/014675a49aecc1488fb9197b9f6261a993f21aaa", "title": "Organizational Diagnosis: Six Places To Look for Trouble with or Without a Theory", "abstract": "This article presents a practice theory for diagnosing organizations -that is, a combination of many ideas in a relatively @@ -20041,14 +22720,17 @@ interactions: show up as blocked work that can be freed by understanding and intervening in one or more of the six boxes.", "venue": "", "year": 1976, "referenceCount": 29, "citationCount": 247, "influentialCitationCount": 11, "isOpenAccess": - false, "fieldsOfStudy": ["Physics", "Sociology"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Sociology", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1976-12-01", "journal": {"name": "Group & Organization - Management", "pages": "430 - 447", "volume": "1"}, "authors": [{"authorId": - "14704304", "name": "M. Weisbord"}]}, {"paperId": "4480a000829436f6e23b807b563959512331bbe4", - "externalIds": {"DBLP": "journals/tapos/RemyV98", "MAG": "1506833497", "DOI": - "10.1002/(SICI)1096-9942(1998)4:1<27::AID-TAPO3>3.0.CO;2-4", "CorpusId": 11335104}, + false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Sociology"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1976-12-01", "journal": + {"name": "Group & Organization Management", "pages": "430 - 447", "volume": + "1"}, "authors": [{"authorId": "14704304", "name": "M. Weisbord"}]}, {"paperId": + "4480a000829436f6e23b807b563959512331bbe4", "externalIds": {"DBLP": "journals/tapos/RemyV98", + "MAG": "1506833497", "DOI": "10.1002/(SICI)1096-9942(1998)4:1<27::AID-TAPO3>3.0.CO;2-4", + "CorpusId": 11335104}, "corpusId": 11335104, "publicationVenue": {"id": "d003fbf6-1063-44e4-8db3-9c4f1026318f", + "name": "Theory and Practice of Object Systems", "type": "journal", "alternate_names": + ["Theory Pract Object Syst"], "issn": "1074-3227", "url": "http://www3.interscience.wiley.com/cgi-bin/jtoc?ID=38768"}, "url": "https://www.semanticscholar.org/paper/4480a000829436f6e23b807b563959512331bbe4", "title": "Objective ML: An Effective Object-Oriented Extension to ML", "abstract": "Objective ML is a small practical extension to ML with ob- jects and top @@ -20060,7 +22742,8 @@ interactions: be added to strongly typed languages based on ML polymorphism. c \u221e 1997 John Wiley & Sons", "venue": "Theory and Practice of Object Systems", "year": 1998, "referenceCount": 59, "citationCount": 147, "influentialCitationCount": - 13, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 13, "isOpenAccess": true, "openAccessPdf": {"url": "http://caml.inria.fr/pub/papers/remy_vouillon-objective_ml-tapos98.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "Theory Pract. Object Syst.", "pages": "27-50", @@ -20068,7 +22751,10 @@ interactions: {"authorId": "2468087", "name": "J\u00e9r\u00f4me Vouillon"}]}, {"paperId": "dfb455b1ce5291443a918caffb6fce1084509814", "externalIds": {"MAG": "1985352847", "DOI": "10.1177/036354658501300510", "CorpusId": 37374627, "PubMed": "4051093"}, - "url": "https://www.semanticscholar.org/paper/dfb455b1ce5291443a918caffb6fce1084509814", + "corpusId": 37374627, "publicationVenue": {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", + "name": "American Journal of Sports Medicine", "type": "journal", "alternate_names": + ["Am J Sport Med"], "issn": "0363-5465", "url": "http://ajs.sagepub.com/", + "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, "url": "https://www.semanticscholar.org/paper/dfb455b1ce5291443a918caffb6fce1084509814", "title": "Avulsion fractures of the pelvis", "abstract": "Avulsion fractures of the pelvic apophyses are seen infrequently but they show a consistent pattern in mechanism, patient''s age, symptoms, physical findings, and roentgenographic @@ -20079,29 +22765,15 @@ interactions: of the pelvis were successfully treated in a directed nonoperative program.", "venue": "American Journal of Sports Medicine", "year": 1985, "referenceCount": 24, "citationCount": 225, "influentialCitationCount": 12, "isOpenAccess": - false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1985-09-01", "journal": - {"name": "The American Journal of Sports Medicine", "pages": "349 - 358", - "volume": "13"}, "authors": [{"authorId": "14579075", "name": "J. Metzmaker"}, - {"authorId": "34633968", "name": "A. Pappas"}]}, {"paperId": "e7955f0c95486cc0cca865cc0093b28ded39b874", - "externalIds": {"MAG": "2135850259", "CorpusId": 18706492}, "url": "https://www.semanticscholar.org/paper/e7955f0c95486cc0cca865cc0093b28ded39b874", - "title": "The Path to Teacher Leadership in Educational Technology", "abstract": - "(Carvin, 2000), found that with federal funding, network infrastruc-ture - deployment accelerated and Internet access significantly expanded inthe schools - that were investigated. Yet, even with the infrastructure inplace, critical - \u201chuman questions\u201d must still be addressed. Reporting theresults - of a recent study of schools in Silicon Valley, California, Cuban andhis colleagues - stated:", "venue": "", "year": 2002, "referenceCount": 49, "citationCount": - 131, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Contemporary - Issues in Technology and Teacher Education", "pages": "178-203", "volume": - "2"}, "authors": [{"authorId": "3661951", "name": "L. Sherry"}, {"authorId": - "143818036", "name": "D. Gibson"}]}, {"paperId": "539a90e0ad9e0bf4f774cff7e0e90c140e2d4984", - "externalIds": {"MAG": "1606075021", "DOI": "10.1029/96GL01671", "CorpusId": - 128796166}, "url": "https://www.semanticscholar.org/paper/539a90e0ad9e0bf4f774cff7e0e90c140e2d4984", + false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1985-09-01", "journal": {"name": "The American Journal of Sports Medicine", + "pages": "349 - 358", "volume": "13"}, "authors": [{"authorId": "14579075", + "name": "J. Metzmaker"}, {"authorId": "34633968", "name": "A. Pappas"}]}, + {"paperId": "539a90e0ad9e0bf4f774cff7e0e90c140e2d4984", "externalIds": {"MAG": + "1606075021", "DOI": "10.1029/96GL01671", "CorpusId": 128796166}, "corpusId": + 128796166, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/539a90e0ad9e0bf4f774cff7e0e90c140e2d4984", "title": "Genetic algorithm inversion for receiver functions with application to crust and uppermost mantle structure", "abstract": "Genetic algorithm (GA) inversion, a nonlin- ear global optimization technique, has been applied to @@ -20113,13 +22785,29 @@ interactions: generated at boundaries beneath the recording site. The receiver function waveform can be inverted in the", "venue": "", "year": 1996, "referenceCount": 13, "citationCount": 174, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", - "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": + "Geology", "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-07-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1960973", "name": "M. Sambridge"}, - {"authorId": "78899786", "name": "B. Kennett"}]}, {"paperId": "238cc40b11122c52958d60b4966724fb988e1bd8", + {"authorId": "78899786", "name": "B. Kennett"}]}, {"paperId": "e7955f0c95486cc0cca865cc0093b28ded39b874", + "externalIds": {"MAG": "2135850259", "CorpusId": 18706492}, "corpusId": 18706492, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e7955f0c95486cc0cca865cc0093b28ded39b874", + "title": "The Path to Teacher Leadership in Educational Technology", "abstract": + "(Carvin, 2000), found that with federal funding, network infrastruc-ture + deployment accelerated and Internet access significantly expanded inthe schools + that were investigated. Yet, even with the infrastructure inplace, critical + \u201chuman questions\u201d must still be addressed. Reporting theresults + of a recent study of schools in Silicon Valley, California, Cuban andhis colleagues + stated:", "venue": "", "year": 2002, "referenceCount": 49, "citationCount": + 131, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": + "Political Science", "source": "external"}, {"category": "Education", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "Contemporary Issues in Technology and Teacher Education", "pages": + "178-203", "volume": "2"}, "authors": [{"authorId": "3661951", "name": "L. + Sherry"}, {"authorId": "143818036", "name": "D. Gibson"}]}, {"paperId": "238cc40b11122c52958d60b4966724fb988e1bd8", "externalIds": {"MAG": "2126384825", "DOI": "10.2307/3236393", "CorpusId": - 86056685}, "url": "https://www.semanticscholar.org/paper/238cc40b11122c52958d60b4966724fb988e1bd8", + 86056685}, "corpusId": 86056685, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/238cc40b11122c52958d60b4966724fb988e1bd8", "title": "Effects of temperature, light and gibberellic acid on the germination of seeds of 43 species native to Western Australia", "abstract": "Species native to the southwest of Western Aus- tralia, representing a range of plant @@ -20133,15 +22821,16 @@ interactions: GA3 conditions. The test environmental condi- tions related to differences between winter and autumn tem-", "venue": "", "year": 1995, "referenceCount": 26, "citationCount": 162, "influentialCitationCount": 12, "isOpenAccess": - false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1995-12-01", "journal": {"name": - "Journal of Vegetation Science", "pages": "797-806", "volume": "6"}, "authors": - [{"authorId": "46899226", "name": "D. Bell"}, {"authorId": "87138264", "name": - "Deanna P. Rokich"}, {"authorId": "143662967", "name": "C. McChesney"}, {"authorId": - "143629027", "name": "J. Plummer"}]}, {"paperId": "6403b5f02116f4e287550e63aece108448b76ebb", - "externalIds": {"MAG": "2062823178", "DOI": "10.1177/002199838702100406", - "CorpusId": 135632080}, "url": "https://www.semanticscholar.org/paper/6403b5f02116f4e287550e63aece108448b76ebb", + false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1995-12-01", "journal": {"name": "Journal of Vegetation Science", "pages": + "797-806", "volume": "6"}, "authors": [{"authorId": "46899226", "name": "D. + Bell"}, {"authorId": "87138264", "name": "Deanna P. Rokich"}, {"authorId": + "143662967", "name": "C. McChesney"}, {"authorId": "143629027", "name": "J. + Plummer"}]}, {"paperId": "6403b5f02116f4e287550e63aece108448b76ebb", "externalIds": + {"MAG": "2062823178", "DOI": "10.1177/002199838702100406", "CorpusId": 135632080}, + "corpusId": 135632080, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6403b5f02116f4e287550e63aece108448b76ebb", "title": "A Mathematical Model to Predict the Thermal Response of Decomposing, Expanding Polymer Composites", "abstract": "A one-dimensional transient thermal model has been developed to predict the thermal response of a decomposing, @@ -20152,16 +22841,19 @@ interactions: tempera ture profiles for a widely used glass-filled phenolic. The predicted temperatures agreed with the measured values with an average difference of 15.7\u00b0C and a standard deviation of 36.9\u00b0C.", "venue": "", "year": - 1987, "referenceCount": 16, "citationCount": 194, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1987-04-01", "journal": {"name": "Journal of Composite Materials", "pages": - "373 - 393", "volume": "21"}, "authors": [{"authorId": "46712118", "name": - "J. Henderson"}, {"authorId": "11922812", "name": "T. Wi\u0119cek"}]}, {"paperId": - "4c0ec00edeb19497c2599d006faa5319ab4c3f52", "externalIds": {"MAG": "2017440950", - "DOI": "10.1177/036354658801600411", "CorpusId": 24898325, "PubMed": "2315577"}, - "url": "https://www.semanticscholar.org/paper/4c0ec00edeb19497c2599d006faa5319ab4c3f52", + 1987, "referenceCount": 16, "citationCount": 195, "influentialCitationCount": + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1987-04-01", "journal": {"name": "Journal + of Composite Materials", "pages": "373 - 393", "volume": "21"}, "authors": + [{"authorId": "46712118", "name": "J. Henderson"}, {"authorId": "11922812", + "name": "T. Wi\u0119cek"}]}, {"paperId": "4c0ec00edeb19497c2599d006faa5319ab4c3f52", + "externalIds": {"MAG": "2017440950", "DOI": "10.1177/036354658801600411", + "CorpusId": 24898325, "PubMed": "2315577"}, "corpusId": 24898325, "publicationVenue": + {"id": "d57d6457-583b-4da6-b561-fb52d9902e1b", "name": "Sports Medicine", + "type": "journal", "alternate_names": ["Sport Med"], "issn": "0112-1642", + "url": "https://link.springer.com/journal/40279"}, "url": "https://www.semanticscholar.org/paper/4c0ec00edeb19497c2599d006faa5319ab4c3f52", "title": "Femoral neck stress fractures", "abstract": "Fifty-four femoral neck stress fractures were studied prospectively to evaluate treatment methods. Fifty-four fractures in 49 patients were identified in a 4 year prospective @@ -20171,15 +22863,18 @@ interactions: earlier studies were noted in racial diversity, in nonprogression of tension-side frac tures, and in return to function.", "venue": "Sports Medicine", "year": 1988, "referenceCount": 21, "citationCount": 176, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1988-07-01", "journal": {"name": "The American Journal of Sports Medicine", - "pages": "365 - 377", "volume": "16"}, "authors": [{"authorId": "113148368", - "name": "L. R. Fullerton"}, {"authorId": "14017736", "name": "H. Snowdy"}]}, - {"paperId": "fd9991f48d017cfe4b1d38d4ee1cc61435cb2968", "externalIds": {"MAG": - "2111847017", "DOI": "10.1177/036354658401200508", "CorpusId": 23981128, "PubMed": - "6496835"}, "url": "https://www.semanticscholar.org/paper/fd9991f48d017cfe4b1d38d4ee1cc61435cb2968", + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1988-07-01", "journal": {"name": "The American Journal + of Sports Medicine", "pages": "365 - 377", "volume": "16"}, "authors": [{"authorId": + "113148368", "name": "L. R. Fullerton"}, {"authorId": "14017736", "name": + "H. Snowdy"}]}, {"paperId": "fd9991f48d017cfe4b1d38d4ee1cc61435cb2968", "externalIds": + {"MAG": "2111847017", "DOI": "10.1177/036354658401200508", "CorpusId": 23981128, + "PubMed": "6496835"}, "corpusId": 23981128, "publicationVenue": {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", + "name": "American Journal of Sports Medicine", "type": "journal", "alternate_names": + ["Am J Sport Med"], "issn": "0363-5465", "url": "http://ajs.sagepub.com/", + "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, "url": "https://www.semanticscholar.org/paper/fd9991f48d017cfe4b1d38d4ee1cc61435cb2968", "title": "Patellar and quadriceps tendon ru p tures\u2014 jumper''s knee", "abstract": "We reviewed 13 patients with end stage jumper''s knee, 10 with patellar tendon ruptures, and 3 with ruptures of the quadriceps tendon to @@ -20205,16 +22900,16 @@ interactions: are usually incomplete and all degenerative tissue may not be involved in the healing response.", "venue": "American Journal of Sports Medicine", "year": 1984, "referenceCount": 10, "citationCount": 226, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1984-09-01", "journal": {"name": "The American Journal - of Sports Medicine", "pages": "375 - 380", "volume": "12"}, "authors": [{"authorId": - "145224771", "name": "D. W. Kelly"}, {"authorId": "47379477", "name": "V. - S. Carter"}, {"authorId": "6294414", "name": "F. Jobe"}, {"authorId": "5498248", - "name": "R. Kerlan"}]}, {"paperId": "bb339207344482b2fa9a023d7475284b3ba1c8d4", + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1984-09-01", "journal": {"name": "The American + Journal of Sports Medicine", "pages": "375 - 380", "volume": "12"}, "authors": + [{"authorId": "145224771", "name": "D. W. Kelly"}, {"authorId": "47379477", + "name": "V. S. Carter"}, {"authorId": "6294414", "name": "F. Jobe"}, {"authorId": + "5498248", "name": "R. Kerlan"}]}, {"paperId": "bb339207344482b2fa9a023d7475284b3ba1c8d4", "externalIds": {"MAG": "2016895140", "DOI": "10.2307/1941172", "CorpusId": - 84550121}, "url": "https://www.semanticscholar.org/paper/bb339207344482b2fa9a023d7475284b3ba1c8d4", + 84550121}, "corpusId": 84550121, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb339207344482b2fa9a023d7475284b3ba1c8d4", "title": "Estimation of Small\u2010Mammal Population Size", "abstract": "Two methods of estimating small-mammal population size from multiple capture-mark-recapture occasions, the Lincoln-Petersen estimator and program CAP- TURE, were evaluated @@ -20230,15 +22925,16 @@ interactions: in capture probabilities. If these influences are not present, the Lincoln-Petersen estimator may be the best method for estimation of small-mammal population size.", "venue": "", "year": 1988, "referenceCount": 13, "citationCount": - 163, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + 163, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1988-12-01", "journal": {"name": "Ecology", "pages": "1952-1959", "volume": "69"}, "authors": [{"authorId": "87215677", "name": "George E. Menkens"}, {"authorId": "19637527", "name": "S. Anderson"}]}, {"paperId": "009698aa931a83ae4ab4c1f172e5eefe38a329b3", "externalIds": {"MAG": "2029846398", "DOI": "10.1524/ZKRI.1974.139.1-2.103", - "CorpusId": 95715012}, "url": "https://www.semanticscholar.org/paper/009698aa931a83ae4ab4c1f172e5eefe38a329b3", + "CorpusId": 95715012}, "corpusId": 95715012, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/009698aa931a83ae4ab4c1f172e5eefe38a329b3", "title": "Structure cristalline du monophosphate KTiPO5", "abstract": "The crystal s t ruc ture of KTiPOs, deterrained by a s imul taneous use of t h e tangentformula method and the Pa t t e r son method , is described in space @@ -20247,15 +22943,15 @@ interactions: formula m u s t be wr i t ten K T i 0 P 0 4 . Distor ted TiOe groups have a shor t Ti\u2014O distance.", "venue": "", "year": 1974, "referenceCount": 4, "citationCount": 284, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1974-01-02", "journal": {"name": - "Zeitschrift f\u00fcr Kristallographie - Crystalline Materials", "pages": - "103 - 115", "volume": "139"}, "authors": [{"authorId": "11447793", "name": - "I. Tordjman"}, {"authorId": "2074549406", "name": "R. Masse"}, {"authorId": + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1974-01-02", + "journal": {"name": "Zeitschrift f\u00fcr Kristallographie - Crystalline Materials", + "pages": "103 - 115", "volume": "139"}, "authors": [{"authorId": "11447793", + "name": "I. Tordjman"}, {"authorId": "2074549406", "name": "R. Masse"}, {"authorId": "89428281", "name": "J. Guitel"}]}, {"paperId": "c97b79701ae6a629ad3bc4e6916ecadab9630983", "externalIds": {"MAG": "2018836510", "DOI": "10.2307/4129630", "CorpusId": - 143806831}, "url": "https://www.semanticscholar.org/paper/c97b79701ae6a629ad3bc4e6916ecadab9630983", + 143806831}, "corpusId": 143806831, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c97b79701ae6a629ad3bc4e6916ecadab9630983", "title": "Ready for revolution : the life and struggles of Stokely Carmichael (Kwame Ture)", "abstract": "Ready for Revolution: The Life and Struggles of Stokely Carmichael (Kwame Ture), by Stokely Carmichael with Ekwueme Michael @@ -20309,14 +23005,30 @@ interactions: that fought Jim Crow in Washington, D.C., sent volunteers to the Freedom Rides, and worked closely with Gloria Richardson in Cambridge, Maryland. \u2026", "venue": "", "year": 2003, "referenceCount": 0, "citationCount": 139, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "115898730", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "115898730", "name": "H. Jeffries"}, {"authorId": "144036171", "name": "S. Carmichael"}, {"authorId": "104334572", "name": "Ekwueme Michael Thelwell"}]}, {"paperId": - "5182c2011eebfbd403972f28c29968688d1f3a05", "externalIds": {"MAG": "2149695636", - "DOI": "10.1002/ANIE.200600400", "CorpusId": 5424241, "PubMed": "16570336"}, + "089e177467e855a806bb62307459849777367f1e", "externalIds": {"MAG": "85856132", + "CorpusId": 59794952}, "corpusId": 59794952, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/089e177467e855a806bb62307459849777367f1e", + "title": "Security in a Web Services World: A Proposed Architec - ture and + Roadmap", "abstract": "A flexible backing member is provided to bear in supporting + relation against one side of a moveable ribbon sideplate in a stuffer box + crimper to provide a smooth, elastic curved surfaced path for the ribbon sideplate + to move thereagainst in all positions of its adjustment, with one end of the + flexible backing member being connected in cantilevered manner at a location + in or beyond the exit end of the crimping chamber.", "venue": "", "year": + 2002, "referenceCount": 6, "citationCount": 112, "influentialCitationCount": + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "148011374", "name": "S. Baum"}]}, {"paperId": "5182c2011eebfbd403972f28c29968688d1f3a05", + "externalIds": {"MAG": "2149695636", "DOI": "10.1002/ANIE.200600400", "CorpusId": + 5424241, "PubMed": "16570336"}, "corpusId": 5424241, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5182c2011eebfbd403972f28c29968688d1f3a05", "title": "A reaction-diffusion memory device.", "abstract": "Any computer consists of processor and memory elements. Patterns and waves in excitable @@ -20397,16 +23109,19 @@ interactions: 015 Brandeis University Waltham, MA 02454 (USA) Fax: (+1)781-736-2516 E-mail: epstein@brandeis.edu", "venue": "Angewandte Chemie", "year": 2006, "referenceCount": 31, "citationCount": 97, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-05-05", "journal": {"name": "Angewandte - Chemie", "pages": "\n 3087-9\n ", "volume": "45 19"}, "authors": - [{"authorId": "6335623", "name": "A. Kaminaga"}, {"authorId": "2258489", "name": - "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": - "e17ec595af179a92cb530d92388b971995062222", "externalIds": {"MAG": "2010192669", - "DOI": "10.1177/036354659202000411", "CorpusId": 26966009, "PubMed": "1415886"}, - "url": "https://www.semanticscholar.org/paper/e17ec595af179a92cb530d92388b971995062222", + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-05-05", "journal": {"name": "Angewandte Chemie", "pages": "\n 3087-9\n ", + "volume": "45 19"}, "authors": [{"authorId": "6335623", "name": "A. Kaminaga"}, + {"authorId": "2258489", "name": "V. Vanag"}, {"authorId": "144854275", "name": + "I. Epstein"}]}, {"paperId": "e17ec595af179a92cb530d92388b971995062222", "externalIds": + {"MAG": "2010192669", "DOI": "10.1177/036354659202000411", "CorpusId": 26966009, + "PubMed": "1415886"}, "corpusId": 26966009, "publicationVenue": {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", + "name": "American Journal of Sports Medicine", "type": "journal", "alternate_names": + ["Am J Sport Med"], "issn": "0363-5465", "url": "http://ajs.sagepub.com/", + "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, "url": "https://www.semanticscholar.org/paper/e17ec595af179a92cb530d92388b971995062222", "title": "Occurrence of free nerve endings in the soft tissue of the knee joint", "abstract": "We present a comprehensive histologic study of neu rologic structures in 18 static and dynamic knee struc tures of 8 cadaveric knees. @@ -20418,16 +23133,16 @@ interactions: the number of mechanoreceptors per standardized area unit and the clinical presentation of certain knee disorders.", "venue": "American Journal of Sports Medicine", "year": 1992, "referenceCount": 17, "citationCount": 158, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1992-07-01", "journal": {"name": "The American Journal of Sports Medicine", "pages": "430 - 433", "volume": "20"}, "authors": [{"authorId": "40099151", "name": "R. Biedert"}, {"authorId": "118155784", "name": "Edith R. Stauffer"}, {"authorId": "5180168", "name": "N. Friederich"}]}, {"paperId": "2989c0611ed954bce2f8e5ba5fda52e4b5763e4f", "externalIds": {"MAG": "2011942048", "DOI": "10.1143/PTP.41.705", "CorpusId": - 121911518}, "url": "https://www.semanticscholar.org/paper/2989c0611ed954bce2f8e5ba5fda52e4b5763e4f", + 121911518}, "corpusId": 121911518, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2989c0611ed954bce2f8e5ba5fda52e4b5763e4f", "title": "Interaction between Clusters and Pauli Principle", "abstract": "The Pauli principle characterizes. the relative state between clusters in the overlapping region of them. A theory to clarify the role of the Pauli principle @@ -20442,14 +23157,18 @@ interactions: repulsive core, are produced by this orthogonality condition. The fea\u00ad tures of the a:-a: scattering are clarified on the basis of the theory proposed.", "venue": "", "year": 1969, "referenceCount": 0, "citationCount": 266, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1969-03-01", - "journal": {"name": "Progress of Theoretical Physics", "pages": "705-722", - "volume": "41"}, "authors": [{"authorId": "92573870", "name": "S. Sait\u014d"}]}, - {"paperId": "5eb13e6b89804af8503d6e8261ad92242f6d1e79", "externalIds": {"MAG": - "2288799448", "DOI": "10.1086/physzool.40.1.30152438", "CorpusId": 88369693}, - "url": "https://www.semanticscholar.org/paper/5eb13e6b89804af8503d6e8261ad92242f6d1e79", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/ptp/article-pdf/41/3/705/5367248/41-3-705.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1969-03-01", "journal": {"name": + "Progress of Theoretical Physics", "pages": "705-722", "volume": "41"}, "authors": + [{"authorId": "92573870", "name": "S. Sait\u014d"}]}, {"paperId": "5eb13e6b89804af8503d6e8261ad92242f6d1e79", + "externalIds": {"MAG": "2288799448", "DOI": "10.1086/physzool.40.1.30152438", + "CorpusId": 88369693}, "corpusId": 88369693, "publicationVenue": {"id": "4d6b26f7-8ba7-43ff-92c9-5f02c4814957", + "name": "Physiological Zoology", "alternate_names": ["Physiol Zo\u00f6l"], + "issn": "0031-935X", "url": "https://www.journals.uchicago.edu/loi/pbz", "alternate_urls": + ["https://www.jstor.org/journal/physzool", "http://www.jstor.org/journals/0031935X", + "http://www.jstor.org/journals/0031935X.html"]}, "url": "https://www.semanticscholar.org/paper/5eb13e6b89804af8503d6e8261ad92242f6d1e79", "title": "Precision of Thermoregulation and Its Relation to Environmental Factors in the Desert Iguana, Dipsosaurus dorsalis", "abstract": "SUMMARY 1. Desert iguanas exercise control over their body temperature by appropriate @@ -20472,43 +23191,47 @@ interactions: in the presence of predators but generally are not permitted to do this during feed- ing and courtship.", "venue": "Physiological Zoology", "year": 1967, "referenceCount": 20, "citationCount": 197, "influentialCitationCount": 11, - "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Environmental Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1967-01-01", - "journal": {"name": "Physiological Zoology", "pages": "49 - 66", "volume": - "40"}, "authors": [{"authorId": "50422609", "name": "C. DeWitt"}]}, {"paperId": - "01f0c2506a478c1e108ba5a5def2c82720d4a83f", "externalIds": {"MAG": "2037114971", - "DOI": "10.13031/2013.34276", "CorpusId": 110324157}, "url": "https://www.semanticscholar.org/paper/01f0c2506a478c1e108ba5a5def2c82720d4a83f", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1967-01-01", "journal": {"name": "Physiological Zoology", + "pages": "49 - 66", "volume": "40"}, "authors": [{"authorId": "50422609", + "name": "C. DeWitt"}]}, {"paperId": "01f0c2506a478c1e108ba5a5def2c82720d4a83f", + "externalIds": {"MAG": "2037114971", "DOI": "10.13031/2013.34276", "CorpusId": + 110324157}, "corpusId": 110324157, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/01f0c2506a478c1e108ba5a5def2c82720d4a83f", "title": "Fully-Exposed Drying of Popcorn", "abstract": "ABSTRACT POPCORN harvested at moisture contents ranging from 20 to 42 percent (d.b.) has been hand shelled and dried under fully-exposed conditions at tempera-tures ranging from 38 to 82 \u00b0C. A drying model has been fitted to the drying data and equations developed to predict required drying parameters in terms of initial moisture content, desired final moisture content and drying air temperature.", - "venue": "", "year": 1981, "referenceCount": 0, "citationCount": 186, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Transactions of the ASABE", + "venue": "", "year": 1981, "referenceCount": 0, "citationCount": 187, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Transactions of the ASABE", "pages": "466-0468", "volume": "24"}, "authors": [{"authorId": "34673039", "name": "G. White"}, {"authorId": "38823182", "name": "I. J. Ross"}, {"authorId": "48356516", "name": "C. Poneleit"}]}, {"paperId": "0112f000fcf461a4a1af120705d0a5f8afb0a77c", "externalIds": {"MAG": "2106751475", "DOI": "10.1002/ANIE.200601038", "CorpusId": - 29697555, "PubMed": "16789037"}, "url": "https://www.semanticscholar.org/paper/0112f000fcf461a4a1af120705d0a5f8afb0a77c", + 29697555, "PubMed": "16789037"}, "corpusId": 29697555, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0112f000fcf461a4a1af120705d0a5f8afb0a77c", "title": "Formation of self-organized dynamic structure patterns of barium carbonate crystals in polymer-controlled crystallization.", "abstract": "Ofthemanychallenges facing materials science, the development ofbottom-up crystallization strategies enabling the directgrowthofnanocrystalassemblieswithpatternsremainsanattractive,butelusivegoal.Livingorganismsaccuratelyandroutinelycreatecom-plex,spatiallywell-definedfunctionalmesoscopicsuperstruc-tures,whichcannowbepartlymimicked.", "venue": "Angewandte Chemie", "year": 2006, "referenceCount": 59, "citationCount": - 70, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-07-03", "journal": {"name": "Angewandte Chemie", - "pages": "\n 4451-5\n ", "volume": "45 27"}, "authors": [{"authorId": - "48469711", "name": "Tongxin Wang"}, {"authorId": "145030050", "name": "A. - Xu"}, {"authorId": "144174519", "name": "H. C\u00f6lfen"}]}, {"paperId": "73da82f45c5a758604ebb59d6332564a8df4f844", - "externalIds": {"MAG": "1482318206", "CorpusId": 118069528}, "url": "https://www.semanticscholar.org/paper/73da82f45c5a758604ebb59d6332564a8df4f844", + 70, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2006-07-03", "journal": {"name": "Angewandte + Chemie", "pages": "\n 4451-5\n ", "volume": "45 27"}, "authors": + [{"authorId": "48469711", "name": "Tongxin Wang"}, {"authorId": "145030050", + "name": "A. Xu"}, {"authorId": "144174519", "name": "H. C\u00f6lfen"}]}, {"paperId": + "73da82f45c5a758604ebb59d6332564a8df4f844", "externalIds": {"MAG": "1482318206", + "CorpusId": 118069528}, "corpusId": 118069528, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/73da82f45c5a758604ebb59d6332564a8df4f844", "title": "Automata, Computability and Complexity: Theory and Applications", "abstract": "PART I: INTRODUCTION 1 Why Study Automata Theory? 2 Review of Mathematical Concepts 2.1 Logic 2.2 Sets 2.3 Relations 2.4 Functions 2.5 Closures @@ -20580,13 +23303,16 @@ interactions: and Computational Reasoning* Art & Entertainment: Music & Games* Using Regular Expressions* Using Finite State Machines and Transducers* Using Grammars", "venue": "", "year": 2007, "referenceCount": 78, "citationCount": 57, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3116626", - "name": "E. Rich"}]}, {"paperId": "83b776a122dd23cf73503f84ea6905647f6948ca", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3116626", "name": "E. Rich"}]}, {"paperId": "83b776a122dd23cf73503f84ea6905647f6948ca", "externalIds": {"DBLP": "conf/stoc/BabaiNS89", "MAG": "2086814302", "DOI": - "10.1145/73007.73008", "CorpusId": 13026395}, "url": "https://www.semanticscholar.org/paper/83b776a122dd23cf73503f84ea6905647f6948ca", + "10.1145/73007.73008", "CorpusId": 13026395}, "corpusId": 13026395, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/83b776a122dd23cf73503f84ea6905647f6948ca", "title": "Multiparty protocols and logspace-hard pseudorandom sequences", "abstract": "Let \u0192(x1, \u00b7\u00b7\u00b7\u00b7 xk) be a Boolean function that k @@ -20616,16 +23342,20 @@ interactions: arbitrary branching programs, or on the size of Boolean formulas (over an arbitrary finite base).", "venue": "Symposium on the Theory of Computing", "year": 1989, "referenceCount": 23, "citationCount": 122, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1989-02-01", "journal": - {"pages": "1-11"}, "authors": [{"authorId": "1794932", "name": "L. Babai"}, - {"authorId": "1689609", "name": "N. Nisan"}, {"authorId": "1686872", "name": - "M. Szegedy"}]}, {"paperId": "b803f4ff1691a188691a8b60aabac3fe70e3f55f", "externalIds": - {"MAG": "2128980385", "DOI": "10.3171/JNS.1965.23.5.0457", "CorpusId": 1503031, - "PubMed": "5858437"}, "url": "https://www.semanticscholar.org/paper/b803f4ff1691a188691a8b60aabac3fe70e3f55f", + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1989-02-01", "journal": {"pages": "1-11"}, "authors": [{"authorId": "1794932", + "name": "L. Babai"}, {"authorId": "1689609", "name": "N. Nisan"}, {"authorId": + "1686872", "name": "M. Szegedy"}]}, {"paperId": "b803f4ff1691a188691a8b60aabac3fe70e3f55f", + "externalIds": {"MAG": "2128980385", "DOI": "10.3171/JNS.1965.23.5.0457", + "CorpusId": 1503031, "PubMed": "5858437"}, "corpusId": 1503031, "publicationVenue": + {"id": "e83e3600-6a07-4327-98ac-3a8a1b559b4f", "name": "Journal of Neurosurgery", + "type": "journal", "alternate_names": ["J Neurosurg"], "issn": "0022-3085", + "alternate_issns": ["1933-0693"], "url": "http://www.thejns.org/"}, "url": + "https://www.semanticscholar.org/paper/b803f4ff1691a188691a8b60aabac3fe70e3f55f", "title": "Surgical treatment of ruptured aneurysms of the basilar artery. Experience with 14 cases.", "abstract": "I N 1961 a discussion of the surgical t reatlnent of 4 rup tured aneurysms of the basilar a r te ry was presented, @@ -20651,14 +23381,18 @@ interactions: bifurcation bu t was unable to occlude the sacs. H55k et al. 4 have described in some", "venue": "Journal of Neurosurgery", "year": 1965, "referenceCount": 7, "citationCount": 177, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport", "Review"], "publicationDate": "1965-11-01", "journal": {"name": "Journal of neurosurgery", "pages": "\n 457-73\n ", "volume": "23 5"}, "authors": [{"authorId": "144103700", "name": "C. Drake"}]}, {"paperId": "77f8a588e80123ef3ae482f7f659be85194bfa8c", "externalIds": {"DBLP": "conf/popl/Mairson90", "MAG": "2021217869", "DOI": "10.1145/96709.96748", - "CorpusId": 75336}, "url": "https://www.semanticscholar.org/paper/77f8a588e80123ef3ae482f7f659be85194bfa8c", + "CorpusId": 75336}, "corpusId": 75336, "publicationVenue": {"id": "8a1922a5-8e84-4ec6-9283-01f2ef1981fc", + "name": "ACM-SIGACT Symposium on Principles of Programming Languages", "type": + "conference", "alternate_names": ["Symp Princ Program Lang", "Symposium on + Principles of Programming Languages", "POPL", "ACM-SIGACT Symp Princ Program + Lang"], "url": "http://www.sigplan.org/Conferences/POPL/"}, "url": "https://www.semanticscholar.org/paper/77f8a588e80123ef3ae482f7f659be85194bfa8c", "title": "Deciding ML typability is complete for deterministic exponential time", "abstract": "A well known but incorrect piece of functional programming folklore is that ML expressions can be efficiently typed in polynomial time. @@ -20692,14 +23426,15 @@ interactions: would be in PSPACE, as would be the actual computation of the principal type of the expression, were it indeed typable.", "venue": "ACM-SIGACT Symposium on Principles of Programming Languages", "year": 1989, "referenceCount": 15, - "citationCount": 124, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-12-01", "journal": {"pages": "382-401"}, "authors": [{"authorId": "1758045", - "name": "Harry G. Mairson"}]}, {"paperId": "7f1f3aed0750b5bebd271b84786351aa20336e15", + "citationCount": 124, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/96709.96748", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1989-12-01", "journal": {"pages": "382-401"}, "authors": + [{"authorId": "1758045", "name": "Harry G. Mairson"}]}, {"paperId": "7f1f3aed0750b5bebd271b84786351aa20336e15", "externalIds": {"MAG": "2010114179", "DOI": "10.1163/036551658X00010", "CorpusId": - 84777978}, "url": "https://www.semanticscholar.org/paper/7f1f3aed0750b5bebd271b84786351aa20336e15", + 84777978}, "corpusId": 84777978, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f1f3aed0750b5bebd271b84786351aa20336e15", "title": "An Experimental Study On the Timing of Breeding and Migration in the Three-Spined Stickleback", "abstract": "III. The influence of temperature on development of the gonads between December and May ...................... @@ -20710,39 +23445,72 @@ interactions: ................... 123 b. Nestbuilding ....................... 124 4. Discussion ......................... 126", "venue": "", "year": 1956, "referenceCount": 0, "citationCount": 148, "influentialCitationCount": 10, "isOpenAccess": false, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", "pages": "105-317", "volume": "12"}, "authors": [{"authorId": "15098414", "name": "B. Baggerman"}]}, {"paperId": "e4c9edecac9ec4ca8fd526c78fe5255c7dc257a0", "externalIds": {"MAG": "2045502372", "DOI": "10.1103/PHYSREVLETT.15.491", - "CorpusId": 121310860}, "url": "https://www.semanticscholar.org/paper/e4c9edecac9ec4ca8fd526c78fe5255c7dc257a0", + "CorpusId": 121310860}, "corpusId": 121310860, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e4c9edecac9ec4ca8fd526c78fe5255c7dc257a0", "title": "Surface Structures on the Clean Platinum (100) Surface", "abstract": "We have found surface structures to be present on the (100) face of.clean platinum single crystals which are. different from the substrate structure. One of these struc--\u00b7\u00b7\u00b7\u00b7 tures .is st.able \u00b7\"In the temperature range of T . and the other structure in the range T :::: 750\u00b0C to the melting of", "venue": "", "year": 1965, "referenceCount": 0, "citationCount": - 174, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1965-08-01", "journal": {"name": "Physical Review - Letters", "pages": "491-493", "volume": "15"}, "authors": [{"authorId": "91494181", - "name": "S. Hagstrom"}, {"authorId": "35155316", "name": "H. Lyon"}, {"authorId": - "3713713", "name": "G. Somorjai"}]}, {"paperId": "ffe38af068953cd9c6b7dfdf4fc042308bd115f4", - "externalIds": {"MAG": "1483357104", "CorpusId": 979785}, "url": "https://www.semanticscholar.org/paper/ffe38af068953cd9c6b7dfdf4fc042308bd115f4", + 174, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://escholarship.org/content/qt62v5w069/qt62v5w069.pdf?t=p0jvrl", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1965-08-01", + "journal": {"name": "Physical Review Letters", "pages": "491-493", "volume": + "15"}, "authors": [{"authorId": "91494181", "name": "S. Hagstrom"}, {"authorId": + "35155316", "name": "H. Lyon"}, {"authorId": "3713713", "name": "G. Somorjai"}]}, + {"paperId": "ffe38af068953cd9c6b7dfdf4fc042308bd115f4", "externalIds": {"MAG": + "1483357104", "CorpusId": 979785}, "corpusId": 979785, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ffe38af068953cd9c6b7dfdf4fc042308bd115f4", "title": "A NOTE ON THE NUMERICAL SOLUTION OF COMPLEX HAMILTONIAN AND SKEW-HAMILTONIAN EIGENVALUE PROBLEMS", "abstract": "In this paper we describe a simple observation that can be used to extend two recently proposed struc- ture preserving methods for the eigenvalue problem for real Hamiltonian matrices to the case of complex Hamiltonian and skew-Hamiltonian matrices.", "venue": "", "year": 1999, "referenceCount": 41, "citationCount": 75, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Electronic - Transactions on Numerical Analysis", "pages": "115-126", "volume": "8"}, "authors": - [{"authorId": "144175464", "name": "P. Benner"}, {"authorId": "1757226", "name": - "V. Mehrmann"}, {"authorId": "2424377", "name": "Hongguo Xu"}]}]} + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Electronic Transactions on Numerical Analysis", "pages": + "115-126", "volume": "8"}, "authors": [{"authorId": "144175464", "name": "P. + Benner"}, {"authorId": "1757226", "name": "V. Mehrmann"}, {"authorId": "2424377", + "name": "Hongguo Xu"}]}, {"paperId": "97877a8c9bdaa228c1ce7a680e7b6aff581ee2e5", + "externalIds": {"MAG": "2140390167", "DOI": "10.1146/ANNUREV.PH.42.030180.002353", + "CorpusId": 45425955, "PubMed": "6996593"}, "corpusId": 45425955, "publicationVenue": + {"id": "eedc6e61-e846-485a-a273-0cc8bb06d7d3", "name": "Annual Review of Physiology", + "type": "journal", "alternate_names": ["Annu Rev Physiol"], "issn": "0066-4278", + "url": "https://www.annualreviews.org/journal/physiol", "alternate_urls": + ["https://www.annualreviews.org/loi/physiol", "http://physiol.annualreviews.org/", + "http://arjournals.annualreviews.org/loi/physiol"]}, "url": "https://www.semanticscholar.org/paper/97877a8c9bdaa228c1ce7a680e7b6aff581ee2e5", + "title": "Temperature regulation in vertebrates.", "abstract": "Vertebrates + moderate the stresses associated with varying temperatures through subdivisions + of the nervous system that sense skin and deep body temperatures and compare + these temperatures with a neuronally repre\u00ad sented ref erence. Resultant + output responses characteristical ly involve sys\u00ad tems that subserve + or compete with other physiological functions, thereby establishing a strong + interdependence between regulations of body tempera\u00ad ture and of cardiovascular, + respiratory, energetic, ionic, and osmotic vari\u00ad ables. The precisely + adjusted effector outputs have been carefully docu\u00ad mented (13, 42) and + characterized by a number qf models (11) relating thermal input and output + functions. When the participating brain struc\u00ad tures are closely investigated, + however, it is apparent that the precision of the total thermoregulatory system + involves a complex overlay of neuronal networks evolved at different times", + "venue": "Annual Review of Physiology", "year": 1980, "referenceCount": 46, + "citationCount": 87, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": null, "journal": {"name": + "Annual review of physiology", "pages": "\n 473-91\n ", "volume": + "42"}, "authors": [{"authorId": "6697250", "name": "L. Crawshaw"}]}]} ' headers: @@ -20751,31 +23519,31 @@ interactions: Connection: - keep-alive Content-Length: - - '194556' + - '215341' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:34 GMT + - Tue, 03 Jan 2023 20:53:02 GMT Via: - - 1.1 f63be8f3fba8836f46fef0415dbf70ce.cloudfront.net (CloudFront) + - 1.1 f88bd4c15622473fc18eef7d15f4b8d4.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - W9tLMENuIFaouQyCKndOkC0sGWJXIqANLLbT8LUC1r_R1we6l2UReQ== + - ZTHJ9yMR2g2djFLzKCHhP8pw8rtkEd1OdtM97aM5CLXj9D77SCxzUw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detGYFAVPHcFpBQ= + - eLxTMG7SvHcFgDA= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '194556' + - '215341' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:34 GMT + - Tue, 03 Jan 2023 20:53:02 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 8e0d5953-1b5c-4ae7-8c3c-e7754f586edf + - 5adc4a9b-e5ea-4ab6-a7cb-29f3cbef935d status: code: 200 message: OK @@ -20791,233 +23559,423 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1000&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1000&limit=100 response: body: - string: '{"total": 65539, "offset": 1000, "next": 1100, "data": [{"paperId": - "d5a124de0f37c1ea0f219135d430b251915dde70", "externalIds": {"DBLP": "conf/chi/Bardzell09", - "MAG": "1984331918", "DOI": "10.1145/1518701.1519063", "CorpusId": 15009547}, - "url": "https://www.semanticscholar.org/paper/d5a124de0f37c1ea0f219135d430b251915dde70", - "title": "Interaction criticism and aesthetics", "abstract": "As HCI becomes - more self-consciously implicated in cul-ture, theories from cultural studies, - in particular aesthetics and critical theory, are increasingly working their - way into the field. However, the use of aesthetics and critical theory in - HCI remains both marginal and uneven in quality. This paper explores the state - of the art of aesthetics and critical theory in the field, before going on - to explore the role of these cultural theories in the analysis and deployment - of the twin anchors of interaction: the user and the artifact. In concludes - with a proposed mapping of aesthetics and criti-cal theory into interaction - design, both as a practice and as a discipline.", "venue": "International - Conference on Human Factors in Computing Systems", "year": 2009, "referenceCount": - 65, "citationCount": 148, "influentialCitationCount": 9, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Sociology"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Sociology", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["Book", "JournalArticle", "Conference"], "publicationDate": "2009-04-04", - "journal": {"name": "Proceedings of the SIGCHI Conference on Human Factors - in Computing Systems"}, "authors": [{"authorId": "1804390", "name": "Jeffrey - Bardzell"}]}, {"paperId": "9a32aa2733ddfe63303ba62114b780302083c673", "externalIds": - {"MAG": "2110491871", "CorpusId": 7526568, "PubMed": "6747520"}, "url": "https://www.semanticscholar.org/paper/9a32aa2733ddfe63303ba62114b780302083c673", - "title": "Generation of spatially periodic patterns by a mechanical instability: - a mechanical alternative to the Turing model.", "abstract": "We have studied - the generation of spatial patterns created by mechanical (rather than chemical) - instabilities. When dissociated fibroblasts are suspended in a gel of reprecipitated - collagen, and the contraction of the gel as a whole is physically restrained - by attachment of its margin to a glass fibre meshwork, then the effect of - the fibroblasts'' traction is to break up the cell-matrix mixture into a series - of clumps or aggregations of cells and compressed matrix. These aggregations - are interconnected by linear tracts of collagen fibres aligned under the tensile - stress exerted by fibroblast traction. The patterns generated by this mechanical - instability vary depending upon cell population density and other factors. - Over a certain range of cell concentrations, this mechanical instability yields - geometric patterns which resemble but are usually much less regular than the - patterns which develop normally in the dermis of developing bird skin. We - propose that an equivalent mechanical instability, occurring during the embryonic - development of this skin, could be the cause not only of the clumping of dermal - fibroblasts to form the feather papillae, but also of the alignment of collagen - fibres into the characteristic polygonal network of fibre bundles - which - interconnect these papillae and which presage the subsequent pattern of the - dermal muscles serving to control feather movements. More generally, we suggest - that this type of mechanical instability can serve the morphogenetic functions - for which Turing''s chemical instability and other reaction-diffusion systems - have been proposed. Mechanical instabilities can create physical structures - directly, in one step, in contrast to the two or more steps which would be - required if positional information first had to be specified by chemical gradients - and then only secondarily implemented in physical form. In addition, physical - forces can act more quickly and at much longer range than can diffusing chemicals - and can generate a greater range of possible geometries than is possible using - gradients of scalar properties. In cases (such as chondrogenesis) where cell - differentiation is influenced by the local population density of cells and - extracellular matrix, the physical patterns of force and distortion within - this extracellular matrix should even be able to accomplish the spatial control - of differentiation, usually attributed to diffusible ''morphogens''.", "venue": - "Journal of embryology and experimental morphology", "year": 1984, "referenceCount": - 39, "citationCount": 129, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1984-04-01", "journal": {"name": "Journal of embryology - and experimental morphology", "pages": "\n 1-20\n ", "volume": - "80"}, "authors": [{"authorId": "81609616", "name": "A. Harris"}, {"authorId": - "6892641", "name": "D. Stopak"}, {"authorId": "145507278", "name": "P. Warner"}]}, - {"paperId": "cd68ad831ecc68e7adf302685cce68e930c22b57", "externalIds": {"MAG": - "2080980244", "DOI": "10.1103/PHYSREVE.84.016222", "CorpusId": 27395299, "PubMed": - "21867288"}, "url": "https://www.semanticscholar.org/paper/cd68ad831ecc68e7adf302685cce68e930c22b57", - "title": "Control of the Hopf-Turing transition by time-delayed global feedback - in a reaction-diffusion system.", "abstract": "Application of time-delayed - feedback is a practical method of controlling bifurcations in reaction-diffusion - systems. It has been shown that for a suitable feedback strength, time delay - beyond a threshold may induce spatiotemporal instabilities. For an appropriate - parameter space with differential diffusivities of the activator-inhibitor - species, delayed feedback may generate Turing instability via a Hopf-Turing - transition, resulting in stationary patterns. This is explored by a theoretical - scheme in a photosensitive chlorine dioxide-iodine-malonic acid reaction-diffusion - system where the delayed feedback is externally tuned by photoillumination - intensity. Our analytical results corroborate with direct numerical simulations.", - "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "year": 2011, "referenceCount": 0, "citationCount": 40, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-07-25", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 016222\n ", - "volume": "84 1 Pt 2"}, "authors": [{"authorId": "4032821", "name": "Pushpita - Ghosh"}]}, {"paperId": "d843826814a8c0898be1e53224640cb0bacd4892", "externalIds": - {"DBLP": "journals/cca/CorlessJ97", "MAG": "2070679587", "DOI": "10.1145/271130.271135", - "CorpusId": 7891754}, "url": "https://www.semanticscholar.org/paper/d843826814a8c0898be1e53224640cb0bacd4892", - "title": "The Turing factorization of a rectangular matrix", "abstract": "The - Turing factorization is a generalization of the standard LU factoring of a - square matrix. Among other advantages, it allows us to meet demands that arise - in a symbolic context. For a rectangular matrix A, the generalized factors - are written PA = LDU R, where R is the row-echelon form of A. For matrices - with symbolic entries, the LDU R factoring is superior to the standard reduction - to row-echelon form, because special case information can be recorded in a - natural way. Special interest attaches to the continuity properties of the - factors, and it is shown that conditions for discontinuous behaviour can be - given using the factor D. We show that this is important, for example, in - computing the Moore-Penrose inverse of a matrix containing symbolic entries.We - also give a separate generalization of LU factoring to fraction-free Gaussian - elimination.", "venue": "SIGS", "year": 1997, "referenceCount": 20, "citationCount": - 32, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, + string: '{"total": 65730, "offset": 1000, "next": 1100, "data": [{"paperId": + "0f4cec34b339cb8a58a0169d9f7b8530827046ec", "externalIds": {"MAG": "1963486600", + "DOI": "10.1177/002199837601000203", "CorpusId": 137321616}, "corpusId": 137321616, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0f4cec34b339cb8a58a0169d9f7b8530827046ec", + "title": "On the Hygrothermal Response of Laminated Composite Systems \u2020", + "abstract": "The hygroscopic nature of polymeric systems, which find widespread + application as matrices in advanced composite materials, requires that dila + tations induced by the absorption of moisture be considered m the stress analysis + of composite laminates. Considerable attention has recently been focused upon + the reduction m both strength and constitutive properties of fiber-reinforced + polymeric composites at elevated temperatures when the composite has been + subjected to environments which enhance moisture diffusion. This apparent + degradation in elevated temperature properties may be magnified even more + by residual stresses induced by both the hygroscopic and thermoelastic characteristics + of the unidirectional com posite. A unified treatment of the hygrothermal + response of the laminated composite plate element is derived. The analysis + develops effective mois ture inplane force resultants and bending resultants, + which when coupled with mechanical and thermal loadings, yield laminae stresses + resulting from the total hygrothermal and mechanical loading environment. + Solutions of the classical diffusion equation are obtained yielding mois ture + profiles through the laminate thickness. Typical composite laminates consisting + of T300/5208 graphite-epoxy are analyzed. Results reveal both the magnitude + and distribution of hygrothermally induced stresses.", "venue": "", "year": + 1976, "referenceCount": 3, "citationCount": 121, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1976-04-01", "journal": {"name": "Journal + of Composite Materials", "pages": "129 - 148", "volume": "10"}, "authors": + [{"authorId": "115362420", "name": "R. Pipes"}, {"authorId": "94246417", "name": + "J. Vinson"}, {"authorId": "34736264", "name": "T. Chou"}]}, {"paperId": "c6f8d26b4aeaba1c449719b797a1014fc75e918f", + "externalIds": {"DBLP": "conf/focs/Sudborough73", "MAG": "1980407366", "DOI": + "10.1109/SWAT.1973.20", "CorpusId": 6490036}, "corpusId": 6490036, "publicationVenue": + {"id": "98af7d9d-37d6-49f4-b260-a15295f441a5", "name": "Scandinavian Workshop + on Algorithm Theory", "type": "conference", "alternate_names": ["Scand Workshop + Algorithm Theory", "SWAT"]}, "url": "https://www.semanticscholar.org/paper/c6f8d26b4aeaba1c449719b797a1014fc75e918f", + "title": "On Tape-Bounded Complexity Classes and Multi-Head Finite Automata", + "abstract": "The principal result described in this paper is the equivalence + of the following statements: (1) Every set accepted by a nondeterministic + one-way two-head finite automaton can be accepted by a deterministic two-way + k-head finite automaton, for some k. (2) The context-free language LP\u03a3 + (described in the paper) is recognized by a (log n)-tape bounded deterministic + Turing machine. (3) Every set accepted by a L(n)-tape bounded nondeterministic + Turing machine is recognized by a L(n)-tape bounded deterministic Turing machine, + provided L(n) \u2265 log n. This work extends results reported earlier by + Hartmanis [2], Savitch [9,10], and Lewis, Stearns, and Hartmanis [6].", "venue": + "Scandinavian Workshop on Algorithm Theory", "year": 1973, "referenceCount": + 6, "citationCount": 29, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1973-10-15", "journal": {"pages": "138-144"}, + "authors": [{"authorId": "1809944", "name": "I. H. Sudborough"}]}, {"paperId": + "5a61ea5a0e3ea782c7e3360625e1b258b3a63487", "externalIds": {"MAG": "1997574238", + "DOI": "10.1038/NPHYS1722", "CorpusId": 119845465}, "corpusId": 119845465, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a61ea5a0e3ea782c7e3360625e1b258b3a63487", + "title": "Complex networks: Patterns of complexity", "abstract": null, "venue": + "", "year": 2010, "referenceCount": 8, "citationCount": 27, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2010-07-01", "journal": {"name": "Nature Physics", "pages": + "480-481", "volume": "6"}, "authors": [{"authorId": "1397426946", "name": + "R. Pastor-Satorras"}, {"authorId": "1690690", "name": "Alessandro Vespignani"}]}, + {"paperId": "db1bf3fcabfa7970aa64233d985ab419513b5376", "externalIds": {"MAG": + "563127568", "CorpusId": 92868762}, "corpusId": 92868762, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/db1bf3fcabfa7970aa64233d985ab419513b5376", + "title": "Chemical Oscillations and Instabilities: Non-Linear Chemical Kinetics", + "abstract": "1. Introduction Part 1: The Techniques 2. Oscillations in a closed + isothermal system 3. Oscillations in a closed isothermal system: mathematical + analysis 4. Thermokinetic oscillations in a closed system 5. Hopf bifurcations, + the growth of small oscillations, relaxation oscillations, and excitability + 6. Autocatalysis in well-stirred open systems: the isothermal CSTR 7. Reaction + in a non-isothermal CSTR: Stationary states and singularity theory 8. Oscillatory + behaviour in the isothermal CSTR: autocatalytic systems 9. Autocatalytic reactions + in plug-flow and diffusion reactors 10. Chemical diffusion pattern formation + (Turing structures) 11. Travelling waves 12. Heterogeneous reactions 13. Complex + oscillations and chemical chaos Part 2: Experiments 14. Experimental systems + 1: solution-phase reactions 15. Experimental systems 2: gas-phase reactions + References Index", "venue": "", "year": 1990, "referenceCount": 0, "citationCount": + 299, "influentialCitationCount": 19, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1990-04-26", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "40510727", "name": "P. Gray"}, + {"authorId": "35030196", "name": "S. Scott"}]}, {"paperId": "a0746f19b3ebe88de887ad9fdcdfc30d88a794fd", + "externalIds": {"MAG": "2098979122", "DOI": "10.1103/PHYSREVLETT.91.058302", + "CorpusId": 31789658, "PubMed": "12906637"}, "corpusId": 31789658, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/a0746f19b3ebe88de887ad9fdcdfc30d88a794fd", + "title": "Superlattice Turing structures in a photosensitive reaction-diffusion + system.", "abstract": "Families of complex superlattice structures, consisting + of combinations of basic hexagonal or square patterns, are found in a photosensitive + reaction-diffusion system. The structures are induced by simple illumination + patterns whose wavelengths are appropriately related to that of the system''s + intrinsic Turing pattern. Computer simulations agree with the structures and + their stability. The technique offers a general approach to generating superlattices + for use in information storage and other applications.", "venue": "Physical + Review Letters", "year": 2003, "referenceCount": 29, "citationCount": 48, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2003-07-29", "journal": {"name": "Physical + review letters", "pages": "\n 058302\n ", "volume": "91 5"}, + "authors": [{"authorId": "6742967", "name": "I. Berenstein"}, {"authorId": + "2586119", "name": "L. Yang"}, {"authorId": "4978913", "name": "M. Dolnik"}, + {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": "144854275", + "name": "I. Epstein"}]}, {"paperId": "b4caf104716872be5aa87f49fd806890d42c6ff2", + "externalIds": {"MAG": "1997478649", "PubMedCentral": "2791196", "DOI": "10.1371/journal.pone.0008337", + "CorpusId": 14998630, "PubMed": "20016781"}, "corpusId": 14998630, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/b4caf104716872be5aa87f49fd806890d42c6ff2", + "title": "A Theoretical Model for ROP Localisation by Auxin in Arabidopsis + Root Hair Cells", "abstract": "Background Local activation of Rho GTPases + is important for many functions including cell polarity, morphology, movement, + and growth. Although a number of molecules affecting Rho-of-Plants small GTPase + (ROP) signalling are known, it remains unclear how ROP activity becomes spatially + organised. Arabidopsis root hair cells produce patches of ROP at consistent + and predictable subcellular locations, where root hair growth subsequently + occurs. Methodology/Principal Findings We present a mathematical model to + show how interaction of the plant hormone auxin with ROPs could spontaneously + lead to localised patches of active ROP via a Turing or Turing-like mechanism. + Our results suggest that correct positioning of the ROP patch depends on the + cell length, low diffusion of active ROP, a gradient in auxin concentration, + and ROP levels. Our theory provides a unique explanation linking the molecular + biology to the root hair phenotypes of multiple mutants and transgenic lines, + including OX-ROP, CA-rop, aux1, axr3, tip1, eto1, etr1, and the triple mutant + aux1 ein2 gnom eb. Conclusions/Significance We show how interactions between + Rho GTPases (in this case ROPs) and regulatory molecules (in this case auxin) + could produce characteristic subcellular patterning that subsequently affects + cell shape. This has important implications for research on the morphogenesis + of plants and other eukaryotes. Our results also illustrate how gradient-regulated + Turing systems provide a particularly robust and flexible mechanism for pattern + formation.", "venue": "PLoS ONE", "year": 2009, "referenceCount": 54, "citationCount": + 59, "influentialCitationCount": 7, "isOpenAccess": true, "openAccessPdf": + {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0008337&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-12-16", "journal": + {"name": "PLoS ONE", "volume": "4"}, "authors": [{"authorId": "8574882", "name": + "R. J. Payne"}, {"authorId": "2919117", "name": "C. Grierson"}]}, {"paperId": + "f8feaf2c35879be54c939df2a12178751122ec33", "externalIds": {"MAG": "2009354787", + "DOI": "10.1016/J.JTBI.2006.09.036", "CorpusId": 24963731, "PubMed": "17140604"}, + "corpusId": 24963731, "publicationVenue": {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", + "name": "Journal of Theoretical Biology", "type": "journal", "alternate_names": + ["J Theor Biology"], "issn": "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/f8feaf2c35879be54c939df2a12178751122ec33", + "title": "Instabilities in spatially extended predator-prey systems: spatio-temporal + patterns in the neighborhood of Turing-Hopf bifurcations.", "abstract": null, + "venue": "Journal of Theoretical Biology", "year": 2007, "referenceCount": + 43, "citationCount": 320, "influentialCitationCount": 11, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-03-21", "journal": + {"name": "Journal of theoretical biology", "pages": "\n 220-9\n ", + "volume": "245 2"}, "authors": [{"authorId": "6992140", "name": "M. Baurmann"}, + {"authorId": "37973754", "name": "Thilo Gross"}, {"authorId": "1719120", "name": + "U. Feudel"}]}, {"paperId": "d055636ebdca03646818e270c08dff92ce2fb501", "externalIds": + {"MAG": "2288879222", "DOI": "10.2307/1534637", "CorpusId": 147071249}, "corpusId": + 147071249, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d055636ebdca03646818e270c08dff92ce2fb501", + "title": "Laumann (E.O), Gagnon (J.H), Michael (R.T), Michaels (S) \u2014 + The Social Organization of Sexuality. Sexual Practices in the United States; + Michael (R.), Gagnon (J.), Laumann (E.), Kolata (G.) \u2014 Sex in America. + A Definitive Survey", "abstract": "PSYCHIATRIC SERVIcES . February 1996 Vol.47 + No.2 205 ture, doubting hen adequacy as a parent, and feeling isolated in + what she at first believed to be a unique situation, Dew describes an initial + attempt to nun away from society and to hide in order to protect her son, + her family, and herself. \u201cOur house had taken on the dimensions ofa single + closet, and a closet is no place like home.\u201d The author gives exacting + attention to her efforts to integrate her son\u2019s newly disclosed identity + into a redefined relationship. Mother and son\u2019s ultimately successful + attempts to help one another come to terms with Stephen s sexuality, starting + from mitial faltering missteps, are chronicled with dialogues that read almost + like process recordings, so vivid are they in their detail. Drawing on hen + own initial reaction to her son s homosexuality, Dew confronts the homophobia + imbued in our culture and the toll it takes on gay children who struggle to + keep their stigmatized identity a secret to avoid", "venue": "", "year": 1997, + "referenceCount": 0, "citationCount": 1098, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "1997-11-01", "journal": {"name": "Population", "pages": + "1548-1551", "volume": "52"}, "authors": [{"authorId": "5236175", "name": + "A. Giami"}]}, {"paperId": "a0e9f19d82537e18496d406b604f48fa428a8625", "externalIds": + {"DBLP": "journals/jetai/Eliasmith02", "MAG": "2061278547", "DOI": "10.1080/09528130210153514", + "CorpusId": 7678094}, "corpusId": 7678094, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/a0e9f19d82537e18496d406b604f48fa428a8625", + "title": "The myth of the Turing machine: the failings of functionalism and + related theses", "abstract": "The properties of Turing''s famous \u2018universal + machine\u2019 has long sustained functionalist intuitions about the nature + of cognition. This paper shows that there is a logical problem with standard + functionalist arguments for multiple realizability. These arguments rely essentially + on Turing''s powerful insights regarding computation. In addressing a possible + reply to this criticism, it is further argued that functionalism is not a + useful approach for understanding what it is to have a mind. In particular, + it is shown that the difficulties involved in distinguishing implementation + from function make multiple realizability claims untestable and uninformative. + As a result, it is concluded that the role of Turing machines in philosophy + of mind needs to be reconsidered.", "venue": "Journal of experimental and + theoretical artificial intelligence (Print)", "year": 2002, "referenceCount": + 16, "citationCount": 27, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-03-01", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "1 - 8", "volume": "14"}, "authors": [{"authorId": + "1690396", "name": "C. Eliasmith"}]}, {"paperId": "a398cf6af06a04b32d5095417bcb1df3ded0a27e", + "externalIds": {"DBLP": "journals/jsyml/ShoreS93", "MAG": "2077721565", "DOI": + "10.2307/2275099", "CorpusId": 195347356}, "corpusId": 195347356, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/a398cf6af06a04b32d5095417bcb1df3ded0a27e", + "title": "Working below a high recursively enumerable degree", "abstract": + "In recent work, Cooper [3, 1990] has extended results of Jockusch and Shore + [6, 1984] to show that the Turing jump is definable in the structure given + by the Turing degrees and the ordering of Turing reducibility. In his definition + of x\u2032 from x, Cooper identifies an order-theoretic property shared by + all of the degrees that are recursively enumerable in x and above x. He then + shows that x\u2032 is the least upper bound of all the degrees with this property. + Thus, the jump of x is identified by comparing the recursively enumerable + degrees with other degrees which are not recursively enumerable. Of course, + once the jump operator is known to be definable, the relation of jump equivalence + x\u2032 = y\u2032 is also known to be a definable relation on x and y. If + we consider how much of the global theory of the Turing degrees is sufficient + for Cooper''s methods, it is immediately clear that his methods can be implemented + to show that the jump operator and its weakening to the relation of jump equivalence + are definable in any ideal closed under the Turing jump. However, his methods + do not localize to , the degrees, or to the recursively enumerable degrees. + This paper fits, as do Shore and Slaman [16, 1990] and [17, to appear], within + the general project to develop an understanding of the relationship between + the local degree-theoretic properties of a recursively enumerable set A and + its jump class. For an analysis of the possibility of defining jump equivalence + in , consult Shore [15, to appear] who shows that the relation x(3) = y(3) + is definable. In this paper, we will restrict our attention to definitions + expressed completely in \u211b (Note: All sets and degrees discussed for the + remainder of this paper will be recursively enumerable.) Ultimately, one would + like to find some degree-theoretic properties definable in terms of the ordering + of Turing reducibility and quantifiers over the recursively enumerable degrees + that would define the relation of jump equivalence or define one or more of + the jump classes Hn = {w\u2223 wn = 0n+1} or Ln = {w \u2223 wn = 0n}. Such + a result could very likely then be used as a springboard to other general + definability results for the recursively enumerable degrees. It would be especially + interesting to know whether every recursively enumerable degree is definable + and whether every arithmetical degree-invariant property of the recursively + enumerable sets is definable in .", "venue": "Journal of Symbolic Logic (JSL)", + "year": 1993, "referenceCount": 28, "citationCount": 44, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1997-09-01", "journal": {"name": "SIGSAM Bull.", "pages": - "20-30", "volume": "31"}, "authors": [{"authorId": "2119294", "name": "Robert - M Corless"}, {"authorId": "3350328", "name": "D. Jeffrey"}]}, {"paperId": - "d304686801a3c9563939b7c88853569ab89b9258", "externalIds": {"MAG": "1509006216", - "DOI": "10.1007/978-1-4020-6710-5_2", "CorpusId": 58530775}, "url": "https://www.semanticscholar.org/paper/d304686801a3c9563939b7c88853569ab89b9258", - "title": "Alan Turing and the Turing Test", "abstract": null, "venue": "", - "year": 2009, "referenceCount": 7, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "publicationDate": "1993-09-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "824 - 859", "volume": "58"}, "authors": [{"authorId": "1817824", + "name": "R. Shore"}, {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": + "5abeda27c55b5b23b126f092b9dad53dd43a18f5", "externalIds": {"MAG": "2911435940", + "DOI": "10.1007/BF01300131", "CorpusId": 118624008}, "corpusId": 118624008, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5abeda27c55b5b23b126f092b9dad53dd43a18f5", + "title": "Complexity of the Frobenius problem", "abstract": null, "venue": + "", "year": 1996, "referenceCount": 8, "citationCount": 72, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1996-03-01", "journal": {"name": "Combinatorica", "pages": "143-147", "volume": + "16"}, "authors": [{"authorId": "1452074227", "name": "J. L. Ram\u00edrez-Alfons\u00edn"}]}, + {"paperId": "bd918d40e956dd16781b8a04c24eb1a46f0d5771", "externalIds": {"MAG": + "82678045", "CorpusId": 141442931}, "corpusId": 141442931, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bd918d40e956dd16781b8a04c24eb1a46f0d5771", + "title": "Essential Elements of Strong Parent Involvement Programs.", "abstract": + "F rom 1986-1988, the Southwest Educational Development Labo ratory (SEDL) + sought to identify and describe the characteristics of \"promising parent + involvement pro grams\" in their five-state region, which includes Arkansas, + Louisiana, New Mexico, Oklahoma, and Texas SEDL staff gathered information + concerning elements that made parent involvement programs successful by interviewing + \"key informants\" edu cators with expertise in this area. Staff members visited + selected programs across the region and obtained reports of their activities; + they also obtained evaluations of the programs from local and district-level + staff members to de termine their effectiveness. Those pro grams identified + as \"promising\" fea tured several types of parent involvement and included + many roles for parents: audience, home tutor, program supporter, co-learner, + advo cate, and decision maker (Epstein 1988) Although some programs were affiliated + with resources such as the National Education Association or the National + School Volunteer Program, others were small, homegrown efforts. Thus, each + program had its own na ture and had taken its own steps toward developing + stronger links be tween parents and schools", "venue": "", "year": 1989, "referenceCount": + 0, "citationCount": 123, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "13-22", "volume": ""}, "authors": [{"authorId": - "144443425", "name": "A. Hodges"}]}, {"paperId": "b0eb7313ff54c986894f5fbcc5aaa085eb2bbea2", - "externalIds": {"DBLP": "journals/mscs/CaludeS10", "MAG": "2054560760", "DOI": - "10.1017/S0960129510000344", "CorpusId": 9942920}, "url": "https://www.semanticscholar.org/paper/b0eb7313ff54c986894f5fbcc5aaa085eb2bbea2", - "title": "A note on accelerated Turing machines", "abstract": "In this paper - we prove that any Turing machine that uses only a finite computational space - for every input cannot solve an uncomputable problem even when it runs in - accelerated mode. We also propose two ways to define the language accepted - by an accelerated Turing machine. Accordingly, the classes of languages accepted - by accelerated Turing machines are the closure under Boolean operations of - the sets \u03a31 and \u03a32.", "venue": "Mathematical Structures in Computer - Science", "year": 2010, "referenceCount": 41, "citationCount": 22, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-11-08", "journal": {"name": "Mathematical Structures - in Computer Science", "pages": "1011 - 1017", "volume": "20"}, "authors": - [{"authorId": "1685717", "name": "Cristian S. Calude"}, {"authorId": "1685429", - "name": "L. Staiger"}]}, {"paperId": "57d55b340454ee64bb912ee9a8d73971000cdb77", + "journal": {"name": "Educational Leadership", "pages": "18-20", "volume": + "47"}, "authors": [{"authorId": "144431199", "name": "David L. Williams"}, + {"authorId": "14777787", "name": "N. Chavkin"}]}, {"paperId": "57d55b340454ee64bb912ee9a8d73971000cdb77", "externalIds": {"MAG": "2151345003", "DBLP": "journals/tcs/Siegelmann96", - "DOI": "10.1016/S0304-3975(96)00087-4", "CorpusId": 11409873}, "url": "https://www.semanticscholar.org/paper/57d55b340454ee64bb912ee9a8d73971000cdb77", + "DOI": "10.1016/S0304-3975(96)00087-4", "CorpusId": 11409873}, "corpusId": + 11409873, "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", + "name": "Theoretical Computer Science", "type": "journal", "alternate_names": + ["Theor Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/57d55b340454ee64bb912ee9a8d73971000cdb77", "title": "The Simple Dynamics of Super Turing Theories", "abstract": null, "venue": "Theoretical Computer Science", "year": 1996, "referenceCount": 29, "citationCount": 40, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-11-20", "journal": {"name": "Theor. Comput. Sci.", "pages": "461-472", - "volume": "168"}, "authors": [{"authorId": "2797623", "name": "H. Siegelmann"}]}, - {"paperId": "4972e61ee8e16b8b2db2535531576151fc5e6e8a", "externalIds": {"MAG": - "2491278050", "DOI": "10.1515/9781400844975", "CorpusId": 123763078}, "url": - "https://www.semanticscholar.org/paper/4972e61ee8e16b8b2db2535531576151fc5e6e8a", - "title": "Alan Turing: The Enigma: The Centenary Edition", "abstract": null, - "venue": "", "year": 2012, "referenceCount": 0, "citationCount": 38, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}], "publicationTypes": null, - "publicationDate": "2012-05-27", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "af8bb9332200b10cef0935857cddc47245ff245d", - "externalIds": {"CorpusId": 5413109}, "url": "https://www.semanticscholar.org/paper/af8bb9332200b10cef0935857cddc47245ff245d", - "title": "Computability and Complexity", "abstract": "y Church-Turing thesis - y Halting Problem y Cardinality of infinite sets y Undecidable/unsolvable - problems y Computational Complexity y In 1936, Church and Turing independently - proposed models of computations y Church: lambda calculus y Turing: Turing - machines y Both capture the notion of computation y Turing showed that these - two very different models were equivalent", "venue": "", "year": 2008, "referenceCount": - 14, "citationCount": 18, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "113641402", "name": "Martin D. Davis"}]}, {"paperId": "69832a7223b909b7f4c3e7c9c1b9c63a4a15c964", - "externalIds": {"MAG": "1782272891", "DOI": "10.1007/978-3-662-05642-4_21", - "CorpusId": 58827313}, "url": "https://www.semanticscholar.org/paper/69832a7223b909b7f4c3e7c9c1b9c63a4a15c964", - "title": "Turing''s Connectionism", "abstract": null, "venue": "", "year": - 2001, "referenceCount": 53, "citationCount": 15, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-10-25", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1759304", - "name": "C. Teuscher"}]}, {"paperId": "d8bf54ba7ddab2e1f6bc9b90daeacb274eedb730", - "externalIds": {"CorpusId": 15744334}, "url": "https://www.semanticscholar.org/paper/d8bf54ba7ddab2e1f6bc9b90daeacb274eedb730", - "title": "Rounding-o errors in matrix processes Universal Turing Machine", - "abstract": "The analysis of replication is an important problem. In this - work, we prove the study of red-black trees. In this work, we introduce a - heuristic for simulated annealing (Zoon), confirming that randomized algorithms - and cache coherence can cooperate to fulfill this purpose.", "venue": "", - "year": 2011, "referenceCount": 153, "citationCount": 57, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "5abeda27c55b5b23b126f092b9dad53dd43a18f5", - "externalIds": {"MAG": "2911435940", "DOI": "10.1007/BF01300131", "CorpusId": - 118624008}, "url": "https://www.semanticscholar.org/paper/5abeda27c55b5b23b126f092b9dad53dd43a18f5", - "title": "Complexity of the Frobenius problem", "abstract": null, "venue": - "", "year": 1996, "referenceCount": 8, "citationCount": 72, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-03-01", - "journal": {"name": "Combinatorica", "pages": "143-147", "volume": "16"}, - "authors": [{"authorId": "1452074227", "name": "J. L. Ram\u00edrez-Alfons\u00edn"}]}, - {"paperId": "80d8b09a6acf10fb85f3c7e7f08592be5d9a8c27", "externalIds": {"MAG": - "1981620787", "DOI": "10.1103/PHYSREVLETT.64.1409", "CorpusId": 42322193, - "PubMed": "10041388"}, "url": "https://www.semanticscholar.org/paper/80d8b09a6acf10fb85f3c7e7f08592be5d9a8c27", - "title": "Spatial pattern formation in a catalytic surface reaction: The facetting - of Pt(110) in CO+O2.", "abstract": "The term \u201cdissipative structures\u201d - which was introduced by Prigogihe [17] describes a broad class of non-equilibrium - systems where a constant flow of energy and/or matter leads to structures - ordered in space or time, e.g. causes kinetic oscillations or spatial pattern - formation. Temporal oscillations and spatial pattern formation are closely - related since the same kinetic instabilities which lead to a periodic variation - of the system variables in time may also induce a periodic variation in space. - Consequently one often observes spatio-temporal structures, but one may also - consider the case of a non-equilibrium structure which is only periodic in - space. Such structures which rarely have been observed in chemical reaction - systems were first discussed by Turing [20] and have been termed accordingly - as \u201cTuring structures\u201d.", "venue": "Physical Review Letters", "year": - 1990, "referenceCount": 17, "citationCount": 64, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1990-03-19", "journal": {"name": "Physical - review letters", "pages": "\n 1409-1412\n ", "volume": "64 - 12"}, "authors": [{"authorId": "115079846", "name": "Falta"}, {"authorId": - "30066773", "name": "Imbihl"}, {"authorId": "29984568", "name": "Henzler"}]}, - {"paperId": "4480a000829436f6e23b807b563959512331bbe4", "externalIds": {"DBLP": - "journals/tapos/RemyV98", "MAG": "1506833497", "DOI": "10.1002/(SICI)1096-9942(1998)4:1<27::AID-TAPO3>3.0.CO;2-4", - "CorpusId": 11335104}, "url": "https://www.semanticscholar.org/paper/4480a000829436f6e23b807b563959512331bbe4", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1996-11-20", "journal": {"name": "Theor. Comput. Sci.", + "pages": "461-472", "volume": "168"}, "authors": [{"authorId": "2797623", + "name": "H. Siegelmann"}]}, {"paperId": "f94feceb5b725c6b303b758a0e5e90215b0174d3", + "externalIds": {"MAG": "2612624696", "DBLP": "journals/corr/HosangBS17", "ArXiv": + "1705.02950", "DOI": "10.1109/CVPR.2017.685", "CorpusId": 7211062}, "corpusId": + 7211062, "publicationVenue": {"id": "768b87bb-8a18-4d9c-a161-4d483c776bcf", + "name": "Computer Vision and Pattern Recognition", "type": "conference", "alternate_names": + ["CVPR", "Comput Vis Pattern Recognit"], "issn": "1063-6919", "url": "https://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000147", + "alternate_urls": ["https://en.wikipedia.org/wiki/Conference_on_Computer_Vision_and_Pattern_Recognition"]}, + "url": "https://www.semanticscholar.org/paper/f94feceb5b725c6b303b758a0e5e90215b0174d3", + "title": "Learning Non-maximum Suppression", "abstract": "Object detectors + have hugely profited from moving towards an end-to-end learning paradigm: + proposals, fea tures, and the classifier becoming one neural network improved + results two-fold on general object detection. One indispensable component + is non-maximum suppression (NMS), a post-processing algorithm responsible + for merging all detections that belong to the same object. The de facto standard + NMS algorithm is still fully hand-crafted, suspiciously simple, and — + being based on greedy clustering with a fixed distance threshold — + forces a trade-off between recall and precision. We propose a new network + architecture designed to perform NMS, using only boxes and their score. We + report experiments for person detection on PETS and for general object categories + on the COCO dataset. Our approach shows promise providing improved localization + and occlusion handling.", "venue": "Computer Vision and Pattern Recognition", + "year": 2017, "referenceCount": 37, "citationCount": 293, "influentialCitationCount": + 51, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1705.02950", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2017-05-08", "journal": {"name": "2017 + IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "pages": + "6469-6477"}, "authors": [{"authorId": "2536361", "name": "J. Hosang"}, {"authorId": + "1798000", "name": "Rodrigo Benenson"}, {"authorId": "48920094", "name": "B. + Schiele"}]}, {"paperId": "3bbb972fdde76dafb316640ae57a498f6fa8abaa", "externalIds": + {"MAG": "2121659875", "DOI": "10.1142/S0218339009002843", "CorpusId": 86010933}, + "corpusId": 86010933, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3bbb972fdde76dafb316640ae57a498f6fa8abaa", + "title": "SPATIAL PATTERN IN AN EPIDEMIC SYSTEM WITH CROSS-DIFFUSION OF THE + SUSCEPTIBLE", "abstract": "In this paper, pattern formation of a spatial model + with cross diffusion of the susceptible is investigated. We compute Hopf and + Turing bifurcations for the model. In particular, the exact Turing domain + is delineated in the parameter space. When the parameters are in that domain, + a series of numerical simulations reveals that the typical dynamics of the + infecteds class typically involves the formation of isolated groups, i.e., + striped, spotted or labyrinthine patterns. Furthermore, spatial oscillatory + and anti-phase dynamics of different spatial points were also found. These + results demonstrate that cross diffusion of susceptibles may have great influence + on the spread of the epidemic.", "venue": "", "year": 2009, "referenceCount": + 17, "citationCount": 45, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-03-01", + "journal": {"name": "Journal of Biological Systems", "pages": "141-152", "volume": + "17"}, "authors": [{"authorId": "47334108", "name": "Gui\u2010Quan Sun"}, + {"authorId": "145752193", "name": "Zhen Jin"}, {"authorId": "47362020", "name": + "Quan\u2010Xing Liu"}, {"authorId": "103314097", "name": "Li Li"}]}, {"paperId": + "ba9a128a3e332975ae6d8dec897d09603e6f994d", "externalIds": {"DBLP": "conf/chi/BrewsterLBHT03", + "MAG": "2110576487", "DOI": "10.1145/642611.642694", "CorpusId": 5345242}, + "corpusId": 5345242, "publicationVenue": {"id": "b55b50b1-aae7-47a7-b042-8aecc930073d", + "name": "International Conference on Human Factors in Computing Systems", + "type": "conference", "alternate_names": ["CHI", "Int Conf Hum Factor Comput + Syst", "Human Factors in Computing Systems", "Conference on Human Interface", + "Conf Hum Interface", "Hum Factor Comput Syst"], "url": "http://www.acm.org/sigchi/"}, + "url": "https://www.semanticscholar.org/paper/ba9a128a3e332975ae6d8dec897d09603e6f994d", + "title": "Multimodal ''eyes-free'' interaction techniques for wearable devices", + "abstract": "Mobile and wearable computers present input/output prob-lems + due to limited screen space and interaction techniques. When mobile, users + typically focus their visual attention on navigating their environment - making + visually demanding interface designs hard to operate. This paper presents + two multimodal interaction techniques designed to overcome these problems + and allow truly mobile, ''eyes-free'' device use. The first is a 3D audio + radial pie menu that uses head gestures for selecting items. An evaluation + of a range of different audio designs showed that egocentric sounds re-duced + task completion time, perceived annoyance, and al-lowed users to walk closer + to their preferred walking speed. The second is a sonically enhanced 2D gesture + recognition system for use on a belt-mounted PDA. An evaluation of the system + with and without audio feedback showed users'' ges-tures were more accurate + when dynamically guided by au-dio-feedback. These novel interaction techniques + demon-strate effective alternatives to visual-centric interface de-signs on + mobile devices.", "venue": "International Conference on Human Factors in Computing + Systems", "year": 2003, "referenceCount": 16, "citationCount": 289, "influentialCitationCount": + 19, "isOpenAccess": true, "openAccessPdf": {"url": "http://eprints.gla.ac.uk/3274/1/eyes2free327403.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-04-05", "journal": {"pages": "473-480"}, "authors": + [{"authorId": "1721608", "name": "S. Brewster"}, {"authorId": "34304805", + "name": "J. Lumsden"}, {"authorId": "36644020", "name": "M. Bell"}, {"authorId": + "144186664", "name": "Malcolm Hall"}, {"authorId": "1941426", "name": "Stuart + Tasker"}]}, {"paperId": "4480a000829436f6e23b807b563959512331bbe4", "externalIds": + {"DBLP": "journals/tapos/RemyV98", "MAG": "1506833497", "DOI": "10.1002/(SICI)1096-9942(1998)4:1<27::AID-TAPO3>3.0.CO;2-4", + "CorpusId": 11335104}, "corpusId": 11335104, "publicationVenue": {"id": "d003fbf6-1063-44e4-8db3-9c4f1026318f", + "name": "Theory and Practice of Object Systems", "type": "journal", "alternate_names": + ["Theory Pract Object Syst"], "issn": "1074-3227", "url": "http://www3.interscience.wiley.com/cgi-bin/jtoc?ID=38768"}, + "url": "https://www.semanticscholar.org/paper/4480a000829436f6e23b807b563959512331bbe4", "title": "Objective ML: An Effective Object-Oriented Extension to ML", "abstract": "Objective ML is a small practical extension to ML with ob- jects and top level classes. It is fully compatible with ML; its type system is based on @@ -21028,44 +23986,43 @@ interactions: be added to strongly typed languages based on ML polymorphism. c \u221e 1997 John Wiley & Sons", "venue": "Theory and Practice of Object Systems", "year": 1998, "referenceCount": 59, "citationCount": 147, "influentialCitationCount": - 13, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 13, "isOpenAccess": true, "openAccessPdf": {"url": "http://caml.inria.fr/pub/papers/remy_vouillon-objective_ml-tapos98.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": {"name": "Theory Pract. Object Syst.", "pages": "27-50", "volume": "4"}, "authors": [{"authorId": "2268671", "name": "Didier R\u00e9my"}, {"authorId": "2468087", "name": "J\u00e9r\u00f4me Vouillon"}]}, {"paperId": - "8b934aad7112262d1260c2d9296fc68985fe5bfe", "externalIds": {"MAG": "2183600202", - "DOI": "10.1172/JCI119750", "CorpusId": 12628862, "PubMed": "9410890"}, "url": - "https://www.semanticscholar.org/paper/8b934aad7112262d1260c2d9296fc68985fe5bfe", - "title": "Nitric oxide synthases: which, where, how, and why?", "abstract": - "ture that clearly identifies the specific enzyme isoform. A widely accepted - nomenclature (3), which will be used in these Perspective articles, identifies - the three mammalian enzyme isoforms as nNOS, iNOS, and eNOS, reflecting the - tissues of origin for the original protein and cDNA isolates. As denoted by - its prefix, nNOS was originally purified and cloned from neuronal tissues. - However, nNOS is now known to be much more widely distributed, with an important - level of expression in skeletal muscle. iNOS, originally purified and cloned - from an immunoactivated macrophage cell line, has since been identified in - myriad mammalian tissues, and iNOS expression has been studied in cells as - diverse as cardiac myocytes, glial cells, and vascular smooth muscle cells - (to name only a few). eNOS, the last of the three mammalian NOS isoforms to - be isolated, was originally purified and cloned from vascular endothelium, - but has since been discovered in cardiac myocytes, blood platelets, brain - (hippocampus), and elsewhere. To add to the confusion, the human genes for - the NOS isoforms are officially categorized in the order of their isolation - and characterization; thus, the human genes encoding nNOS, iNOS, and eNOS - are termed NOS1 , NOS2 , and NOS3 , respectively.", "venue": "Journal of Clinical - Investigation", "year": 1997, "referenceCount": 58, "citationCount": 1024, - "influentialCitationCount": 36, "isOpenAccess": true, "fieldsOfStudy": ["Biology", - "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": - "1997-11-01", "journal": {"name": "The Journal of clinical investigation", - "pages": "\n 2146-52\n ", "volume": "100 9"}, "authors": [{"authorId": - "2153763", "name": "T. Michel"}, {"authorId": "2110687", "name": "O. Feron"}]}, - {"paperId": "508a78a7bdba1487e929b4f88c1cbac7b0231ffd", "externalIds": {"MAG": - "2320801978", "DOI": "10.1103/PHYSREVLETT.114.093902", "CorpusId": 25170537, - "PubMed": "25793816"}, "url": "https://www.semanticscholar.org/paper/508a78a7bdba1487e929b4f88c1cbac7b0231ffd", + "5e099574ae04feddf4e19cff801c8848a0e020ba", "externalIds": {"CorpusId": 17316546}, + "corpusId": 17316546, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5e099574ae04feddf4e19cff801c8848a0e020ba", + "title": "Series Randomness , Relativization and Turing Degrees", "abstract": + "We compare various notions of algorithmic randomness. First we consider relativized + randomness. A set is n-random if it is Martin-L\u00f6f random relative to + \u2205(n\u22121). We show that a set is 2-random if and only if there is a + constant c such that infinitely many initial segments x of the set are c-incompressible: + C(x) \u2265 |x| \u2212 c. The \u2018only if\u2019 direction was obtained independently + by Joseph Miller. This characterization can be extended to the case of time-bounded + C-complexity. Next we prove some results on lowness. Among other things, we + characterize the 2-random sets as those 1-random sets that are low for Chaitin\u2019s + \u03a9. Also, 2-random sets form minimal pairs with 2-generic sets. The r.e. + low for \u03a9 sets coincide with the r.e. K-trivial ones. Finally we show + that the notions of Martin-L\u00f6f randomness, recursive randomness, and + Schnorr randomness can be separated in every high degree while the same notions + coincide in every non-high degree. We make some remarks about hyperimmune-free + and PA-complete degrees. Mathematical Subject Classification: 68Q30, 03D15, + 03D28, 03D80, 28E15.", "venue": "", "year": 2004, "referenceCount": 34, "citationCount": + 36, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + [{"authorId": "2350687", "name": "A. Nies"}, {"authorId": "1699450", "name": + "F. Stephan"}, {"authorId": "3200486", "name": "S. Terwijn"}]}, {"paperId": + "508a78a7bdba1487e929b4f88c1cbac7b0231ffd", "externalIds": {"MAG": "2320801978", + "DOI": "10.1103/PHYSREVLETT.114.093902", "CorpusId": 25170537, "PubMed": "25793816"}, + "corpusId": 25170537, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/508a78a7bdba1487e929b4f88c1cbac7b0231ffd", "title": "Optimally coherent Kerr combs generated with crystalline whispering gallery mode resonators for ultrahigh capacity fiber communications.", "abstract": "Optical Kerr frequency combs are known to be effective coherent multiwavelength @@ -21091,35 +24048,132 @@ interactions: generation of coherent fiber communication networks, alongside fully integrated systems.", "venue": "Physical Review Letters", "year": 2015, "referenceCount": 31, "citationCount": 119, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2015-03-02", "journal": {"name": "Physical review letters", - "pages": "\n 093902\n ", "volume": "114 9"}, "authors": [{"authorId": - "144048393", "name": "J. Pfeifle"}, {"authorId": "143662508", "name": "A. - Coillet"}, {"authorId": "47646675", "name": "R. Henriet"}, {"authorId": "6051755", - "name": "K. Saleh"}, {"authorId": "40129764", "name": "P. Schindler"}, {"authorId": - "143909317", "name": "C. Weimann"}, {"authorId": "1746996", "name": "W. Freude"}, - {"authorId": "2085567933", "name": "I. Balakireva"}, {"authorId": "1760452", - "name": "L. Larger"}, {"authorId": "2521468", "name": "C. Koos"}, {"authorId": - "5948493", "name": "Y. Chembo"}]}, {"paperId": "1716c4b9a49c151a950c0d87d6a186ba3974c229", + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-03-02", "journal": {"name": "Physical + review letters", "pages": "\n 093902\n ", "volume": "114 9"}, + "authors": [{"authorId": "144048393", "name": "J. Pfeifle"}, {"authorId": + "143662508", "name": "A. Coillet"}, {"authorId": "47646675", "name": "R. Henriet"}, + {"authorId": "6051755", "name": "K. Saleh"}, {"authorId": "40129764", "name": + "P. Schindler"}, {"authorId": "143909317", "name": "C. Weimann"}, {"authorId": + "1746996", "name": "W. Freude"}, {"authorId": "2085567933", "name": "I. Balakireva"}, + {"authorId": "1760452", "name": "L. Larger"}, {"authorId": "2521468", "name": + "C. Koos"}, {"authorId": "5948493", "name": "Y. Chembo"}]}, {"paperId": "1716c4b9a49c151a950c0d87d6a186ba3974c229", "externalIds": {"MAG": "2169193227", "DBLP": "conf/rtss/EisenbrandR08", "DOI": - "10.1109/RTSS.2008.25", "CorpusId": 3203411}, "url": "https://www.semanticscholar.org/paper/1716c4b9a49c151a950c0d87d6a186ba3974c229", + "10.1109/RTSS.2008.25", "CorpusId": 3203411}, "corpusId": 3203411, "publicationVenue": + {"id": "c43b7adc-9683-46d3-a4a1-f6edfd9695b2", "name": "IEEE Real-Time Systems + Symposium", "type": "conference", "alternate_names": ["Real-time Syst Symp", + "Real-Time Systems Symposium", "IEEE Real-time Syst Symp", "RTSS"], "url": + "http://www.cs.bu.edu/pub/ieee-rts/Home.html"}, "url": "https://www.semanticscholar.org/paper/1716c4b9a49c151a950c0d87d6a186ba3974c229", "title": "Static-Priority Real-Time Scheduling: Response Time Computation Is NP-Hard", "abstract": "We show that response time computation for rate-monotonic,preemptive scheduling of periodic tasks is NP-hard under Turing reductions. More precisely, we show that the response time of a task cannot be approximated within any constant factor, unless P=NP.", "venue": "IEEE Real-Time Systems Symposium", "year": 2008, "referenceCount": 31, "citationCount": 73, "influentialCitationCount": - 12, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 12, "isOpenAccess": true, "openAccessPdf": {"url": "http://infoscience.epfl.ch/record/126024/files/rtsfeasibility.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2008-11-30", "journal": {"name": "2008 Real-Time Systems Symposium", "pages": "397-406"}, "authors": [{"authorId": "1749931", "name": "F. Eisenbrand"}, {"authorId": "1702257", "name": "T. Rothvoss"}]}, {"paperId": + "5702846f73273a9bd339547583eb3df352e573bb", "externalIds": {"MAG": "1603940370", + "DBLP": "conf/icga/NordinB95a", "CorpusId": 16122959}, "corpusId": 16122959, + "publicationVenue": {"id": "34fcc5a6-2504-4caa-be37-c8a9911df57c", "name": + "International Conference on Genetic Algorithms", "type": "conference", "alternate_names": + ["Int Conf Genet Algorithm", "international conference on Genetic algorithms", + "ICGA", "int conf Genet algorithm"]}, "url": "https://www.semanticscholar.org/paper/5702846f73273a9bd339547583eb3df352e573bb", + "title": "Evolving Turing-Complete Programs for a Register Machine with Self-modifying + Code", "abstract": "The majority of commercial computers today are register + machines of von Neumann type. We have developed a method to evolve Turing-complete + programs for a register machine. The described implementation enables the + use of most program constructs, such as arithmetic operators, large indexed + memory, automatic decomposition into subfunctions and subroutines (ADFs), + conditional constructs i.e. if-then-else, jumps, loop structures , recursion, + protected functions, string and list functions. Any C-function can be compiled + and linked into the function set of the system. The use of register machine + language allows us to work at the lowest level of binary machine code without + any interpreting steps. In a von Neumann machine , programs and data reside + in the same memory and the genetic operators can thus directly manipulate + the binary machine code in memory. The genetic operators themselves are written + in C-language but they modify individuals in binary representation. The result + is an execution speed enhancement of up to 100 times compared to an interpreting + C-language implementation, and up to 2000 times compared to a LISP implementation. + The use of binary machine code demands a very compact coding of about one + byte per node in the individual. The resulting evolved programs are disassembled + into C-modules and can be incorporated into a conventional software development + environment. The low memory requirements and the signiicant speed enhancement + of this technique could be of use when applying genetic programming to new + application areas, platforms and research domains.", "venue": "International + Conference on Genetic Algorithms", "year": 1995, "referenceCount": 5, "citationCount": + 119, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1995-07-15", "journal": {"pages": "318-327"}, "authors": [{"authorId": "1835888", + "name": "P. Nordin"}, {"authorId": "2507766", "name": "W. Banzhaf"}]}, {"paperId": + "4b0570aeee18237aeee5fbb255204ffe01d36497", "externalIds": {"MAG": "2952069979", + "DBLP": "conf/csr/YakaryilmazS09", "ArXiv": "0809.0073", "DOI": "10.1007/978-3-642-03351-3_33", + "CorpusId": 18081592}, "corpusId": 18081592, "publicationVenue": {"id": "334fe43b-8712-418a-80a4-064bf088c79e", + "name": "Computer Science Symposium in Russia", "type": "conference", "alternate_names": + ["CSR", "Corporate Social Responsibility & Sustainable Development", "Corp + Soc Responsib Sustain Dev", "Int Conf Cyber Secur Resil", "Comput Sci Symp + Russ", "International Conference on Cyber Security and Resilience"], "url": + "http://www.wikicfp.com/cfp/program?id=610"}, "url": "https://www.semanticscholar.org/paper/4b0570aeee18237aeee5fbb255204ffe01d36497", + "title": "Languages Recognized with Unbounded Error by Quantum Finite Automata", + "abstract": null, "venue": "Computer Science Symposium in Russia", "year": + 2008, "referenceCount": 33, "citationCount": 35, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0809.0073v2.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2008-08-30", "journal": + {"pages": "356-367"}, "authors": [{"authorId": "1969092", "name": "Abuzer + Yakary\u0131lmaz"}, {"authorId": "144714718", "name": "A. Say"}]}, {"paperId": + "b0eb7313ff54c986894f5fbcc5aaa085eb2bbea2", "externalIds": {"DBLP": "journals/mscs/CaludeS10", + "MAG": "2054560760", "DOI": "10.1017/S0960129510000344", "CorpusId": 9942920}, + "corpusId": 9942920, "publicationVenue": {"id": "1a00fc67-b5a0-4dae-993c-023e6c11659a", + "name": "Mathematical Structures in Computer Science", "type": "journal", + "alternate_names": ["Math Struct Comput Sci"], "issn": "0960-1295", "url": + "https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=MSC", + "http://journals.cambridge.org/MSC"]}, "url": "https://www.semanticscholar.org/paper/b0eb7313ff54c986894f5fbcc5aaa085eb2bbea2", + "title": "A note on accelerated Turing machines", "abstract": "In this paper + we prove that any Turing machine that uses only a finite computational space + for every input cannot solve an uncomputable problem even when it runs in + accelerated mode. We also propose two ways to define the language accepted + by an accelerated Turing machine. Accordingly, the classes of languages accepted + by accelerated Turing machines are the closure under Boolean operations of + the sets \u03a31 and \u03a32.", "venue": "Mathematical Structures in Computer + Science", "year": 2010, "referenceCount": 41, "citationCount": 22, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.cs.auckland.ac.nz/research/groups/CDMTCS/researchreports/350cris.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-11-08", "journal": {"name": "Mathematical Structures + in Computer Science", "pages": "1011 - 1017", "volume": "20"}, "authors": + [{"authorId": "1685717", "name": "Cristian S. Calude"}, {"authorId": "1685429", + "name": "L. Staiger"}]}, {"paperId": "d8bf54ba7ddab2e1f6bc9b90daeacb274eedb730", + "externalIds": {"CorpusId": 15744334}, "corpusId": 15744334, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d8bf54ba7ddab2e1f6bc9b90daeacb274eedb730", + "title": "Rounding-o errors in matrix processes Universal Turing Machine", + "abstract": "The analysis of replication is an important problem. In this + work, we prove the study of red-black trees. In this work, we introduce a + heuristic for simulated annealing (Zoon), confirming that randomized algorithms + and cache coherence can cooperate to fulfill this purpose.", "venue": "", + "year": 2011, "referenceCount": 153, "citationCount": 57, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": "ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", "externalIds": {"MAG": "2899964516", "PubMedCentral": "6221541", "DOI": "10.1126/sciadv.aau5484", "CorpusId": 53237955, - "PubMed": "30417097"}, "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", + "PubMed": "30417097"}, "corpusId": 53237955, "publicationVenue": {"id": "cb30f0c9-2980-4b7d-bbcb-68fc5472b97c", + "name": "Science Advances", "type": "journal", "alternate_names": ["Sci Adv"], + "issn": "2375-2548", "url": "http://www.scienceadvances.org/", "alternate_urls": + ["https://advances.sciencemag.org/"]}, "url": "https://www.semanticscholar.org/paper/ef2dde81f9c215e0a69dd81ca9222ca178fe42ce", "title": "An ancient Turing-like patterning mechanism regulates skin denticle development in sharks", "abstract": "Diverse skin appendages, from shark denticles to bird feathers, develop via a conserved and ancient Turing patterning mechanism. @@ -21138,18 +24192,122 @@ interactions: to avian feathers and mammalian hair, use this ancient and conserved system, with slight genetic modulation accounting for broad variations in patterning.", "venue": "Science Advances", "year": 2018, "referenceCount": 85, "citationCount": - 49, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-11-01", "journal": {"name": "Science Advances", "volume": "4"}, "authors": - [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": "2054529485", - "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": "A. Fletcher"}, - {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": "5588695", "name": - "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, {"paperId": - "4c719d44a89d42b2aac574de25e5ea0f631f0469", "externalIds": {"DBLP": "journals/pami/DyerR81", - "MAG": "2091868829", "DOI": "10.1109/TPAMI.1981.4767048", "CorpusId": 8713097, - "PubMed": "21868917"}, "url": "https://www.semanticscholar.org/paper/4c719d44a89d42b2aac574de25e5ea0f631f0469", + 49, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-11-01", "journal": {"name": "Science Advances", "volume": + "4"}, "authors": [{"authorId": "10680525", "name": "Rory L. Cooper"}, {"authorId": + "2054529485", "name": "Alexandre P. Thiery"}, {"authorId": "2443569", "name": + "A. Fletcher"}, {"authorId": "8344738", "name": "D. Delbarre"}, {"authorId": + "5588695", "name": "Liam J. Rasch"}, {"authorId": "4508898", "name": "G. Fraser"}]}, + {"paperId": "fb45a5b1caf186b5f65425481a690c38f887075c", "externalIds": {"MAG": + "2102326230", "CorpusId": 6130527, "PubMed": "13695232"}, "corpusId": 6130527, + "publicationVenue": {"id": "02bf11d4-dd88-4e0e-b7c4-084d3fa17c2f", "name": + "Pediatrics", "type": "journal", "issn": "0031-4005", "alternate_issns": ["1098-4275"], + "url": "https://pediatrics.aappublications.org/", "alternate_urls": ["http://pediatrics.aappublications.org/", + "http://www.pediatrics.org/"]}, "url": "https://www.semanticscholar.org/paper/fb45a5b1caf186b5f65425481a690c38f887075c", + "title": "Systemic lupus erythematosus. Description of 37 cases in children + and a discussion of endocrine therapy in 32 of the cases.", "abstract": "dren + is generally a progressive disease terminating fatally. With the advent of + adrenocorticotropic and adrenal steroid hor mones and subsequent reports1-3 + of success ful treatment in adults, it seemed possible that the prognosis + in children might also be improved. This paper presents a detailed description + of clinical and pathologic fea tures of systemic lupus erythematosus in 37 + children, 32 of whom were treated with adrenal steroids or adrenocorticotropin.", + "venue": "Pediatrics", "year": 1960, "referenceCount": 8, "citationCount": + 94, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1960-10-01", "journal": + {"name": "Pediatrics", "pages": "\n 570-85\n ", "volume": + "26"}, "authors": [{"authorId": "2267572", "name": "C. Cook"}, {"authorId": + "144406416", "name": "R. Wedgwood"}, {"authorId": "4660052", "name": "J. Craig"}, + {"authorId": "35862546", "name": "J. Hartmann"}, {"authorId": "4491316", "name": + "C. Janeway"}]}, {"paperId": "0daf97c9e3817305ec4a2032913dfb9bfda33705", "externalIds": + {"MAG": "2950308024", "DBLP": "journals/em/Booker06", "ArXiv": "math/0507502", + "DOI": "10.1080/10586458.2006.10128976", "CorpusId": 28459118}, "corpusId": + 28459118, "publicationVenue": {"id": "030417fe-9d82-425b-b780-8edc58d04ce7", + "name": "Experimental Mathematics", "type": "journal", "alternate_names": + ["Exp Math"], "issn": "1058-6458", "url": "http://www.tandfonline.com/toc/uexm20/current", + "alternate_urls": ["http://www.tandf.co.uk/journals/authors/uexmauth.asp", + "http://www.emis.de/journals/EM/index.html", "http://www.emis.de/journals/EM/", + "http://www.expmath.org/", "https://projecteuclid.org/DPubS?handle=euclid.em&service=UI&verb=Display&version=1.0"]}, + "url": "https://www.semanticscholar.org/paper/0daf97c9e3817305ec4a2032913dfb9bfda33705", + "title": "Artin''s Conjecture, Turing''s Method, and the Riemann Hypothesis", + "abstract": "We present a group-theoretic criterion under which one may verify + the Artin conjecture for some (nonmonomial) Galois representations, up to + finite height in the complex plane. In particular, the criterion applies to + S 5 and A 5 representations. Under more general conditions, the technique + allows for the possibility of verifying the Riemann hypothesis for Dedekind + zeta functions of nonabelian extensions of \u211a. In addition, we discuss + two methods for locating zeros of arbitrary L-functions. The first uses the + explicit formula and techniques developed in [Booker and Str\u00f6mbergsson + 07] for computing with trace formulas. The second method generalizes that + of Turing for verifying the Riemann hypothesis. In order to apply it we develop + a rigorous algorithm for computing general L-functions on the critical line + via the fast Fourier transform. Finally, we present some numerical results + testing Artin''s conjecture for S 5 representations, and the Riemann hypothesis + for Dedekind zeta functions of S 5 and A 5 fields.", "venue": "Experimental + Mathematics", "year": 2005, "referenceCount": 48, "citationCount": 48, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/math/0507502", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2005-07-25", "journal": {"name": "Experimental Mathematics", "pages": "385 + - 407", "volume": "15"}, "authors": [{"authorId": "3063921", "name": "A. Booker"}]}, + {"paperId": "c09bef5f2efee6e1c8a09bc70a53f38631ab3e62", "externalIds": {"MAG": + "2496760711", "DBLP": "conf/iwsas/2000", "DOI": "10.1007/3-540-44584-6", "CorpusId": + 790456}, "corpusId": 790456, "publicationVenue": {"id": "2f5d0e8a-faad-4f10-b323-2b2e3c439a78", + "name": "Lecture Notes in Computer Science", "type": "journal", "alternate_names": + ["LNCS", "Transactions on Computational Systems Biology", "Trans Comput Syst + Biology", "Lect Note Comput Sci"], "issn": "0302-9743", "alternate_issns": + ["1861-2059", "1861-2075", "1866-4733"], "url": "http://www.springer.com/lncs", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-164-2-73659-0,00.html", + "https://link.springer.com/bookseries/558", "http://link.springer.com/search?query=\"Transactions+on+Computational+Systems+Biology\""]}, + "url": "https://www.semanticscholar.org/paper/c09bef5f2efee6e1c8a09bc70a53f38631ab3e62", + "title": "Self-Adaptive Software", "abstract": null, "venue": "Lecture Notes + in Computer Science", "year": 2001, "referenceCount": 98, "citationCount": + 142, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-540-44584-5%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"volume": "1936"}, "authors": [{"authorId": "46553314", + "name": "P. Robertson"}, {"authorId": "1716356", "name": "H. Shrobe"}, {"authorId": + "1685676", "name": "R. Laddaga"}]}, {"paperId": "51a3d5ee450fdcdaed8afcf30a4e91e0ad810c92", + "externalIds": {"MAG": "2135247172", "ArXiv": "cs/0607014", "DBLP": "journals/corr/abs-cs-0607014", + "DOI": "10.1109/ISIT.2006.262066", "CorpusId": 9631}, "corpusId": 9631, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/51a3d5ee450fdcdaed8afcf30a4e91e0ad810c92", + "title": "Strong Consistency of the Good-Turing Estimator", "abstract": "We + consider the problem of estimating the total probability of all symbols that + appear with a given frequency in a string of i.i.d. random variables with + unknown distribution. We focus on the regime in which the block length is + large yet no symbol appears frequently in the string. This is accomplished + by allowing the distribution to change with the block length. Under a natural + convergence assumption on the sequence of underlying distributions, we show + that the total probabilities converge to a deterministic limit, which we characterize. + We then show that the good-turing total probability estimator is strongly + consistent", "venue": "2006 IEEE International Symposium on Information Theory", + "year": 2006, "referenceCount": 22, "citationCount": 32, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/cs/0607014", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-07-05", "journal": {"name": "2006 IEEE International Symposium on Information + Theory", "pages": "2526-2530"}, "authors": [{"authorId": "145606712", "name": + "A. Wagner"}, {"authorId": "144768649", "name": "P. Viswanath"}, {"authorId": + "1697413", "name": "S. Kulkarni"}]}, {"paperId": "4c719d44a89d42b2aac574de25e5ea0f631f0469", + "externalIds": {"DBLP": "journals/pami/DyerR81", "MAG": "2091868829", "DOI": + "10.1109/TPAMI.1981.4767048", "CorpusId": 8713097, "PubMed": "21868917"}, + "corpusId": 8713097, "publicationVenue": {"id": "25248f80-fe99-48e5-9b8e-9baef3b8e23b", + "name": "IEEE Transactions on Pattern Analysis and Machine Intelligence", + "type": "journal", "alternate_names": ["IEEE Trans Pattern Anal Mach Intell"], + "issn": "0162-8828", "url": "http://www.computer.org/tpami/", "alternate_urls": + ["http://www.computer.org/portal/web/tpami", "http://ieeexplore.ieee.org/servlet/opac?punumber=34"]}, + "url": "https://www.semanticscholar.org/paper/4c719d44a89d42b2aac574de25e5ea0f631f0469", "title": "Parallel Image Processing by Memory-Augmented Cellular Automata", "abstract": "This paper introduces a generalization of cellular automata in which each celi is a tape-bounded Turing machine rather than a finite-state @@ -21158,52 +24316,193 @@ interactions: is a very suitable one for studying the advantages of parallelism in this domain.", "venue": "IEEE Transactions on Pattern Analysis and Machine Intelligence", "year": 1981, "referenceCount": 17, "citationCount": 73, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "IEEE Transactions on Pattern Analysis and Machine - Intelligence", "pages": "29-41", "volume": "PAMI-3"}, "authors": [{"authorId": - "1724754", "name": "C. Dyer"}, {"authorId": "143766793", "name": "A. Rosenfeld"}]}, - {"paperId": "5a61ea5a0e3ea782c7e3360625e1b258b3a63487", "externalIds": {"MAG": - "1997574238", "DOI": "10.1038/NPHYS1722", "CorpusId": 119845465}, "url": "https://www.semanticscholar.org/paper/5a61ea5a0e3ea782c7e3360625e1b258b3a63487", - "title": "Complex networks: Patterns of complexity", "abstract": null, "venue": - "", "year": 2010, "referenceCount": 8, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-07-01", - "journal": {"name": "Nature Physics", "pages": "480-481", "volume": "6"}, - "authors": [{"authorId": "1397426946", "name": "R. Pastor-Satorras"}, {"authorId": - "1690690", "name": "Alessandro Vespignani"}]}, {"paperId": "ba9a128a3e332975ae6d8dec897d09603e6f994d", - "externalIds": {"DBLP": "conf/chi/BrewsterLBHT03", "MAG": "2110576487", "DOI": - "10.1145/642611.642694", "CorpusId": 5345242}, "url": "https://www.semanticscholar.org/paper/ba9a128a3e332975ae6d8dec897d09603e6f994d", - "title": "Multimodal ''eyes-free'' interaction techniques for wearable devices", - "abstract": "Mobile and wearable computers present input/output prob-lems - due to limited screen space and interaction techniques. When mobile, users - typically focus their visual attention on navigating their environment - making - visually demanding interface designs hard to operate. This paper presents - two multimodal interaction techniques designed to overcome these problems - and allow truly mobile, ''eyes-free'' device use. The first is a 3D audio - radial pie menu that uses head gestures for selecting items. An evaluation - of a range of different audio designs showed that egocentric sounds re-duced - task completion time, perceived annoyance, and al-lowed users to walk closer - to their preferred walking speed. The second is a sonically enhanced 2D gesture - recognition system for use on a belt-mounted PDA. An evaluation of the system - with and without audio feedback showed users'' ges-tures were more accurate - when dynamically guided by au-dio-feedback. These novel interaction techniques - demon-strate effective alternatives to visual-centric interface de-signs on - mobile devices.", "venue": "International Conference on Human Factors in Computing - Systems", "year": 2003, "referenceCount": 16, "citationCount": 288, "influentialCitationCount": - 19, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "IEEE Transactions on Pattern + Analysis and Machine Intelligence", "pages": "29-41", "volume": "PAMI-3"}, + "authors": [{"authorId": "1724754", "name": "C. Dyer"}, {"authorId": "143766793", + "name": "A. Rosenfeld"}]}, {"paperId": "953819e4cb4703d7cd21556032530403771768b5", + "externalIds": {"MAG": "2066742923", "DOI": "10.14219/JADA.ARCHIVE.1962.0184", + "CorpusId": 42540978, "PubMed": "14489483"}, "corpusId": 42540978, "publicationVenue": + {"id": "137df871-0be4-4ea4-9f85-52b2b36070a3", "name": "The Journal of the + American Dental Association (1939)", "type": "journal", "alternate_names": + ["Journal of the American Dental Association", "J Am Dent Assoc (1939", "J + Am Dent Assoc"], "issn": "0002-8177", "url": "http://www.sciencedirect.com/science/journal/00028177", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00028177/146", + "http://jada.ada.org/", "https://jada.ada.org/"]}, "url": "https://www.semanticscholar.org/paper/953819e4cb4703d7cd21556032530403771768b5", + "title": "Comparative cleansing efficiency of manual and power brushing.", + "abstract": "The purpose of the studies described in this report was to evaluate + the efficiency of a reciprocating motion toothbrush as an instrument for cleaning + the teeth. These studies were initiated during the early stages of the development + of the device; therefore, they reflect both pro\u00ad gressive engineering + improvements and the accumulation of information showing that the danger of + hard tissue abrasion and soft tissue laceration was not an im\u00ad portant + consideration with this device. The two main criteria that could be used to + judge efficiency were speed of cleaning and thoroughness of cleaning. From + a practical standpoint, however, speed per se is not a reliable measure of + efficiency because the factor of pleasure cannot be disregarded. For example, + if the use of a power device encouraged the subject to brush longer than he + ordinarily did with a hand brush and this factor alone resulted in an improved + state of oral hygiene, the application of power to the toothbrush would be + justified. Since early studies with the electric device re\u00ad vealed that + important pleasurable fea\u00ad tures were associated with its use, the criterion + of thoroughness of cleaning in\u00ad dependent of time was adopted as the + main measure of cleaning efficiency.", "venue": "The Journal of the American + Dental Association (1939)", "year": 1962, "referenceCount": 0, "citationCount": + 979, "influentialCitationCount": 34, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1962-07-01", "journal": + {"name": "Journal of the American Dental Association", "pages": "\n 26-9\n ", + "volume": "65"}, "authors": [{"authorId": "2077120856", "name": "G. A. Quigley"}, + {"authorId": "34096356", "name": "J. Hein"}]}, {"paperId": "b04e147ecc871473585dc8cd6ff86a9631ba951b", + "externalIds": {"DBLP": "journals/jacm/Rosenberg67", "MAG": "2041013848", + "DOI": "10.1145/321420.321423", "CorpusId": 17928715}, "corpusId": 17928715, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b04e147ecc871473585dc8cd6ff86a9631ba951b", + "title": "Real-Time Definable Languages", "abstract": "The closure properties + of the class of languages defined by real-time, online, multi-tape Turing + machines are proved. The results obtained are, for the most part, negative + and, as one would expect, asymmetric. It is shown that the results remain + valid for a broad class of real-time devices. Finally, the position of the + class of real-time definable languages in the \u201cclassical\u201d linguistic + hierarchy is established.", "venue": "JACM", "year": 1967, "referenceCount": + 20, "citationCount": 91, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-04-05", "journal": {"pages": "473-480"}, "authors": - [{"authorId": "1721608", "name": "S. Brewster"}, {"authorId": "34304805", - "name": "J. Lumsden"}, {"authorId": "36644020", "name": "M. Bell"}, {"authorId": - "144186664", "name": "Malcolm Hall"}, {"authorId": "1941426", "name": "Stuart - Tasker"}]}, {"paperId": "371d7ecd00d5cc9ddd6fbbc89e7e92a1e0645b81", "externalIds": - {"MAG": "1986855527", "DOI": "10.1177/000331978803900607", "CorpusId": 25244094, - "PubMed": "3377273"}, "url": "https://www.semanticscholar.org/paper/371d7ecd00d5cc9ddd6fbbc89e7e92a1e0645b81", + "publicationDate": "1967-10-01", "journal": {"name": "J. ACM", "pages": "645-662", + "volume": "14"}, "authors": [{"authorId": "34896921", "name": "A. Rosenberg"}]}, + {"paperId": "69832a7223b909b7f4c3e7c9c1b9c63a4a15c964", "externalIds": {"MAG": + "1782272891", "DOI": "10.1007/978-3-662-05642-4_21", "CorpusId": 58827313}, + "corpusId": 58827313, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/69832a7223b909b7f4c3e7c9c1b9c63a4a15c964", + "title": "Turing''s Connectionism", "abstract": null, "venue": "", "year": + 2001, "referenceCount": 53, "citationCount": 15, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2001-10-25", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "1759304", "name": "C. Teuscher"}]}, {"paperId": + "cbb2d9dbec980f5038185363ab37490ff17f0a88", "externalIds": {"MAG": "2063994740", + "DOI": "10.1111/1467-8721.EP11512349", "CorpusId": 144754833}, "corpusId": + 144754833, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cbb2d9dbec980f5038185363ab37490ff17f0a88", + "title": "Social Cognition Is Thinking About Relationships", "abstract": "they + may refer to the attributes of individuals, such as their genders, races, + ages, and personalities. All of these attributes inhere in per sons, or are + socially construed as inhering in them: Whether in nately given or bestowed + by a cul ture, whether enduring or change able, these attributes are features + of individuals. Some characteris tics, on the other hand, cannot be ascribed + to individuals, but only to the relations between them. Whereas individual + attributes de", "venue": "", "year": 1996, "referenceCount": 20, "citationCount": + 92, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-10-01", "journal": + {"name": "Current Directions in Psychological Science", "pages": "143 - 148", + "volume": "5"}, "authors": [{"authorId": "26569010", "name": "A. Fiske"}, + {"authorId": "3041938", "name": "N. Haslam"}]}, {"paperId": "ef9190e7669ea5523c3ef61180b35385b0ea345f", + "externalIds": {"MAG": "2059800182", "DOI": "10.1016/0885-2308(91)90016-J", + "CorpusId": 121808836}, "corpusId": 121808836, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ef9190e7669ea5523c3ef61180b35385b0ea345f", + "title": "A comparison of the enhanced Good-Turing and deleted estimation + methods for estimating probabilities of English bigrams", "abstract": null, + "venue": "", "year": 1991, "referenceCount": 7, "citationCount": 294, "influentialCitationCount": + 10, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Computer Speech & Language", + "pages": "19-54", "volume": "5"}, "authors": [{"authorId": "2244184", "name": + "Kenneth Ward Church"}, {"authorId": "34938639", "name": "W. Gale"}]}, {"paperId": + "2f3fe3c70209286c93c6a598f017204f9227592c", "externalIds": {"MAG": "2099179560", + "DBLP": "journals/cj/Fortnow12", "DOI": "10.1093/comjnl/bxs073", "CorpusId": + 659201}, "corpusId": 659201, "publicationVenue": {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", + "name": "Computer/law journal", "type": "journal", "alternate_names": ["Computer + journal", "The Computer Journal", "Comput j", "Comput J"], "issn": "0164-8756", + "alternate_issns": ["0010-4620"], "url": "https://repository.jmls.edu/jitpl/all_issues.html", + "alternate_urls": ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/2f3fe3c70209286c93c6a598f017204f9227592c", + "title": "The Enduring Legacy of the Turing Machine", "abstract": "The Church-Turing + thesis has stood the test of time, capturing computation models Turing could + not have conceived of, including digital computation, probabilistic, parallel + and quantum computers and the Internet. The thesis has become accepted doctrine + in computer science and the ACM has named its highest honor after Turing. + Many now view computation as a fundamental part of nature, like atoms or the + integers.", "venue": "Computer/law journal", "year": 2012, "referenceCount": + 6, "citationCount": 20, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-07-01", "journal": {"name": "Comput. J.", "pages": + "830-831", "volume": "55"}, "authors": [{"authorId": "1691447", "name": "L. + Fortnow"}]}, {"paperId": "3e9a89c69af90f4a7032130e1fc98621a8d7c746", "externalIds": + {"MAG": "2051610690", "DOI": "10.1007/s00285-014-0816-5", "CorpusId": 12377643, + "PubMed": "25053475"}, "corpusId": 12377643, "publicationVenue": {"id": "b63919f2-2979-428b-95ba-53029f49a7df", + "name": "Journal of Mathematical Biology", "type": "journal", "alternate_names": + ["J Math Biology"], "issn": "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", + "alternate_urls": ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/3e9a89c69af90f4a7032130e1fc98621a8d7c746", + "title": "Turing instabilities in prey\u2013predator systems with dormancy + of predators", "abstract": null, "venue": "Journal of Mathematical Biology", + "year": 2015, "referenceCount": 30, "citationCount": 19, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-07-01", "journal": {"name": "Journal of Mathematical Biology", "pages": + "125-149", "volume": "71"}, "authors": [{"authorId": "1885672", "name": "M. + Kuwamura"}]}, {"paperId": "2a2011c1152e38d41d6088903d4945383b489776", "externalIds": + {"MAG": "2116442710", "CorpusId": 744509}, "corpusId": 744509, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2a2011c1152e38d41d6088903d4945383b489776", + "title": "ORTHOGONAL-MAXIMIN LATIN HYPERCUBE DESIGNS", "abstract": "A randomly + generated Latin hypercube design (LHD) can be quite struc- tured: the variables + may be highly correlated or the design may not have good space-filling properties. + There are procedures for finding good LHDs by minimizing the pairwise correlations + or by maximizing the inter-site distances. In this article we show that these + two criteria need not be in close agreement. We propose a multi-objective + optimization approach to find good LHDs by combining correlation and distance + performance measures. We also propose a new exchange algorithm for efficiently + generating such designs. Several examples are presented to show that the new + algorithm is fast, and that the optimal designs are good in terms of both + the correlation and distance criteria.", "venue": "", "year": 2008, "referenceCount": + 24, "citationCount": 282, "influentialCitationCount": 23, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Statistica Sinica", "pages": "171-186", "volume": + "18"}, "authors": [{"authorId": "144296196", "name": "V. R. Joseph"}, {"authorId": + "144646110", "name": "Ying Hung"}]}, {"paperId": "76d86bb6d931c69045b5a41a949e102ce46c0803", + "externalIds": {"MAG": "2084394121", "DOI": "10.1103/PHYSREVE.78.026116", + "CorpusId": 34730328, "PubMed": "18850906"}, "corpusId": 34730328, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/76d86bb6d931c69045b5a41a949e102ce46c0803", + "title": "Turing instability in reaction-subdiffusion systems.", "abstract": + "We determine the conditions for the occurrence of Turing instabilities in + activator-inhibitor systems, where one component undergoes subdiffusion and + the other normal diffusion. If the subdiffusing species has a nonlinear death + rate, then coupling between the nonlinear kinetics and the memory effects + of the non-Markovian transport process advances the Turing instability if + the inhibitor subdiffuses and delays the Turing instability if the activator + subdiffuses. We apply the results of our analysis to the Schnakenberg model, + the Gray-Scott model, the Oregonator model of the Belousov-Zhabotinsky reaction, + and the Lengyel-Epstein model of the chlorine dioxide-iodine-malonic acid + reaction.", "venue": "Physical review. E, Statistical, nonlinear, and soft + matter physics", "year": 2008, "referenceCount": 29, "citationCount": 25, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-08-21", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 026116\n ", + "volume": "78 2 Pt 2"}, "authors": [{"authorId": "152597231", "name": "A. + Yadav"}, {"authorId": "13858806", "name": "Shane M Milu"}, {"authorId": "3041313", + "name": "W. Horsthemke"}]}, {"paperId": "371d7ecd00d5cc9ddd6fbbc89e7e92a1e0645b81", + "externalIds": {"MAG": "1986855527", "DOI": "10.1177/000331978803900607", + "CorpusId": 25244094, "PubMed": "3377273"}, "corpusId": 25244094, "publicationVenue": + {"id": "27e8b4a5-e292-40a1-b4cc-4e3fcff718ba", "name": "Angiology", "type": + "journal", "issn": "0003-3197", "url": "http://galenet.galegroup.com/servlet/HWRC?locID=lcml_main", + "alternate_urls": ["https://journals.sagepub.com/home/ang", "http://www.westminsterpublications.com/ANG/index.htm", + "http://ang.sagepub.com/"]}, "url": "https://www.semanticscholar.org/paper/371d7ecd00d5cc9ddd6fbbc89e7e92a1e0645b81", "title": "Morphodynamic Interpretation of Acute Coronary Thrombosis, with Special Reference to Volcano-Like Eruption of Atheromatous Plaque Caused by Coronary Artery Spasm", "abstract": "Routine autopsy studies of hearts with @@ -21220,109 +24519,166 @@ interactions: or artery spasm that accounts for these fea tures and the rupture of soft ather omatous plaques.", "venue": "Angiology", "year": 1988, "referenceCount": 24, "citationCount": 62, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport"], "publicationDate": "1988-06-01", "journal": {"name": "Angiology", "pages": "535 - 547", "volume": "39"}, "authors": [{"authorId": "15652700", "name": "P. D. Penha"}, {"authorId": "144979410", "name": "F. Zak"}, {"authorId": "2110810937", "name": "Judith C. Lin"}, {"authorId": - "84226184", "name": "Ching-Shen Lin"}]}, {"paperId": "cbb2d9dbec980f5038185363ab37490ff17f0a88", - "externalIds": {"MAG": "2063994740", "DOI": "10.1111/1467-8721.EP11512349", - "CorpusId": 144754833}, "url": "https://www.semanticscholar.org/paper/cbb2d9dbec980f5038185363ab37490ff17f0a88", - "title": "Social Cognition Is Thinking About Relationships", "abstract": "they - may refer to the attributes of individuals, such as their genders, races, - ages, and personalities. All of these attributes inhere in per sons, or are - socially construed as inhering in them: Whether in nately given or bestowed - by a cul ture, whether enduring or change able, these attributes are features - of individuals. Some characteris tics, on the other hand, cannot be ascribed - to individuals, but only to the relations between them. Whereas individual - attributes de", "venue": "", "year": 1996, "referenceCount": 20, "citationCount": - 92, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-10-01", "journal": {"name": "Current - Directions in Psychological Science", "pages": "143 - 148", "volume": "5"}, - "authors": [{"authorId": "26569010", "name": "A. Fiske"}, {"authorId": "3041938", - "name": "N. Haslam"}]}, {"paperId": "5e099574ae04feddf4e19cff801c8848a0e020ba", - "externalIds": {"CorpusId": 17316546}, "url": "https://www.semanticscholar.org/paper/5e099574ae04feddf4e19cff801c8848a0e020ba", - "title": "Series Randomness , Relativization and Turing Degrees", "abstract": - "We compare various notions of algorithmic randomness. First we consider relativized - randomness. A set is n-random if it is Martin-L\u00f6f random relative to - \u2205(n\u22121). We show that a set is 2-random if and only if there is a - constant c such that infinitely many initial segments x of the set are c-incompressible: - C(x) \u2265 |x| \u2212 c. The \u2018only if\u2019 direction was obtained independently - by Joseph Miller. This characterization can be extended to the case of time-bounded - C-complexity. Next we prove some results on lowness. Among other things, we - characterize the 2-random sets as those 1-random sets that are low for Chaitin\u2019s - \u03a9. Also, 2-random sets form minimal pairs with 2-generic sets. The r.e. - low for \u03a9 sets coincide with the r.e. K-trivial ones. Finally we show - that the notions of Martin-L\u00f6f randomness, recursive randomness, and - Schnorr randomness can be separated in every high degree while the same notions - coincide in every non-high degree. We make some remarks about hyperimmune-free - and PA-complete degrees. Mathematical Subject Classification: 68Q30, 03D15, - 03D28, 03D80, 28E15.", "venue": "", "year": 2004, "referenceCount": 34, "citationCount": - 36, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2350687", - "name": "A. Nies"}, {"authorId": "1699450", "name": "F. Stephan"}, {"authorId": - "3200486", "name": "S. Terwijn"}]}, {"paperId": "78d2642a4233527ea00c33eb1de442991e1645bc", - "externalIds": {"MAG": "102537316", "CorpusId": 115304740}, "url": "https://www.semanticscholar.org/paper/78d2642a4233527ea00c33eb1de442991e1645bc", - "title": "Turing instability and wave patterns for a symmetric discrete competitive - Lotka-Volterra system", "abstract": "In this paper, Turing instability of - a symmetric discrete competitive Lotka-Volterra system is considered. To this - end, conditions for producing Turing instability of a general discrete system - is attained and this conclusion is applied to the discrete competition Lotka-Volterra - system. Then a series of numerical simulations of the discrete model are performed - with different parameters. Results show that the discrete competitive Lotka-Volterra - system can generate a large variety of wave patterns in the Turing instability - region. Particularly, the diffusion coefficients can be equivalent, that is, - there is neither \"activator\" nor \"inhibitor\". Similar results can not - be obtained for the corresponding continuous models. On the other hand, the - number of the eigenvalues is illuminated by calculation and the unstable spaces - can be clearly expressed. Thus, the Turing mechanism is also explained.", - "venue": "", "year": 2011, "referenceCount": 13, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-05-01", - "journal": {"name": "WSEAS Transactions on Mathematics archive", "pages": - "181-189", "volume": "10"}, "authors": [{"authorId": "46874617", "name": "Yutao - Han"}, {"authorId": "49651241", "name": "B. Han"}, {"authorId": "2156145375", - "name": "Lu Zhang"}, {"authorId": "2112318467", "name": "Li Xu"}, {"authorId": - "10704678", "name": "Mei-Feng Li"}, {"authorId": "144690211", "name": "Guang - Zhang"}]}, {"paperId": "16738fc6a520171a303524801bd5969056dd7608", "externalIds": - {"DBLP": "journals/osid/MiyaderaO05", "ArXiv": "quant-ph/0302051", "MAG": - "2149052326", "DOI": "10.1007/s11080-005-0923-2", "CorpusId": 207223447}, - "url": "https://www.semanticscholar.org/paper/16738fc6a520171a303524801bd5969056dd7608", - "title": "On Halting Process of Quantum Turing Machine", "abstract": null, - "venue": "Open systems & information dynamics", "year": 2003, "referenceCount": - 11, "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Physics", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2003-02-07", "journal": {"name": "Open - Systems & Information Dynamics", "pages": "261-264", "volume": "12"}, "authors": - [{"authorId": "2290815", "name": "T. Miyadera"}, {"authorId": "1685591", "name": - "M. Ohya"}]}, {"paperId": "b04e147ecc871473585dc8cd6ff86a9631ba951b", "externalIds": - {"DBLP": "journals/jacm/Rosenberg67", "MAG": "2041013848", "DOI": "10.1145/321420.321423", - "CorpusId": 17928715}, "url": "https://www.semanticscholar.org/paper/b04e147ecc871473585dc8cd6ff86a9631ba951b", - "title": "Real-Time Definable Languages", "abstract": "The closure properties - of the class of languages defined by real-time, online, multi-tape Turing - machines are proved. The results obtained are, for the most part, negative - and, as one would expect, asymmetric. It is shown that the results remain - valid for a broad class of real-time devices. Finally, the position of the - class of real-time definable languages in the \u201cclassical\u201d linguistic - hierarchy is established.", "venue": "JACM", "year": 1967, "referenceCount": - 20, "citationCount": 91, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1967-10-01", "journal": {"name": "J. ACM", "pages": "645-662", "volume": - "14"}, "authors": [{"authorId": "34896921", "name": "A. Rosenberg"}]}, {"paperId": - "d8eb5c184db65945981a7a8dc125b54c6c22653f", "externalIds": {"DBLP": "journals/corr/cs-CC-9907033", - "ArXiv": "cs/9907033", "MAG": "2950070060", "DOI": "10.1137/S0097539794261970", - "CorpusId": 59952}, "url": "https://www.semanticscholar.org/paper/d8eb5c184db65945981a7a8dc125b54c6c22653f", + "84226184", "name": "Ching-Shen Lin"}]}, {"paperId": "128a522b1be3b0ffae6a31fd190a33368fd9b8ad", + "externalIds": {"MAG": "1992692415", "DOI": "10.1080/07391102.2000.10506630", + "CorpusId": 17071062, "PubMed": "22607433"}, "corpusId": 17071062, "publicationVenue": + {"id": "9f814bbe-0b77-43ab-b0b8-61ba1b86ca52", "name": "Journal of Biomolecular + Structure and Dynamics", "type": "journal", "alternate_names": ["J Biomol + Struct Dyn", "Journal of Biomolecular Structure & Dynamics", "J Biomol Struct Dyn"], + "issn": "0739-1102", "url": "http://www.adeninepress.com/jbsd/", "alternate_urls": + ["http://www.jbsdonline.com/", "https://www.tandfonline.com/toc/tbsd20/current", + "http://www.tandfonline.com/loi/tbsd20"]}, "url": "https://www.semanticscholar.org/paper/128a522b1be3b0ffae6a31fd190a33368fd9b8ad", + "title": "Algorithmic Self-Assembly of DNA: Theoretical Motivations and 2D + Assembly Experiments", "abstract": "Abstract Biology makes things far smaller + and more complex than anything produced by human engineering. The biotechnology + revolution has for the first time given us the tools necessary to consider + engineering on the molecular level. Research in DNA computation, launched + by Len Adleman, has opened the door for experimental study of programmable + biochemical reactions. Here we focus on a single biochemical mechanism, the + self-assembly of DNA structures, that is theoretically sufficient for Turing-universal + computation. The theory combines Hao Wang''s purely mathematical Tiling Problem + with the branched DNA constructions of Ned Seeman. In the context of mathematical + logic, Wang showed how jigsaw-shaped tiles can be designed to simulate the + operation of any Turing Machine. For a biochemical implementation, we will + need molecular Wang tiles. DNA molecular structures and intermolecular interactions + are particularly amenable to design and are sufficient for the creation of + complex molecular objects. The structure of individual molecules can be designed + by maximizing desired and minimizing undesired Watson-Crick complementarity. + Intermolecular interactions are programmed by the design of sticky ends that + determine which molecules associate, and how. The theory has been demonstrated + experimentally using a system of synthetic DNA double-crossover molecules + that self-assemble into two-dimensional crystals that have been visualized + by atomic force microscopy. This experimental system provides an excellent + platform for exploring the relationship between computation and molecular + self-assembly, and thus represents a first step toward the ability to program + molecular reactions and molecular structures.", "venue": "Journal of Biomolecular + Structure and Dynamics", "year": 2000, "referenceCount": 48, "citationCount": + 115, "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": + {"url": "https://authors.library.caltech.edu/22774/1/algSA_JBSD.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2000-01-01", "journal": {"name": "Journal + of Biomolecular Structure and Dynamics", "pages": "263 - 270", "volume": "17"}, + "authors": [{"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": "0de895f46092531b4ba172ccf30d2d30b886e931", + "externalIds": {"MAG": "1986063028", "DOI": "10.1007/S11071-011-9971-Z", "CorpusId": + 119806786}, "corpusId": 119806786, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0de895f46092531b4ba172ccf30d2d30b886e931", + "title": "Influence of prey refuge on predator\u2013prey dynamics", "abstract": + null, "venue": "", "year": 2012, "referenceCount": 37, "citationCount": 44, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Nonlinear + Dynamics", "pages": "191-201", "volume": "67"}, "authors": [{"authorId": "2154457955", + "name": "Yi Wang"}, {"authorId": "2145296103", "name": "Jianzhong Wang"}]}, + {"paperId": "25c161313411aea736e72cebd626b41ed8fcef82", "externalIds": {"PubMedCentral": + "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", "CorpusId": 1789930, + "PubMed": "24145394"}, "corpusId": 1789930, "publicationVenue": {"id": "bc96f9bd-89da-4c9a-ab24-27749617f6ff", + "name": "Conference on Lasers and Electro-Optics", "type": "conference", "alternate_names": + ["CLEO", "Conf Laser Electro-optics"]}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", + "title": "Formation and control of Turing patterns in a coherent quantum fluid", + "abstract": null, "venue": "Conference on Lasers and Electro-Optics", "year": + 2013, "referenceCount": 67, "citationCount": 46, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep03016.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-10-22", + "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": [{"authorId": + "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", "name": "P. + Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": + "93534597", "name": "Y. Tse"}, {"authorId": "118567298", "name": "N. Kwong"}, + {"authorId": "34750791", "name": "A. L\u00fccke"}, {"authorId": "5207467", + "name": "M. Abbarchi"}, {"authorId": "5012276", "name": "E. Baudin"}, {"authorId": + "6087584", "name": "\u00c9. Galopin"}, {"authorId": "47481840", "name": "J. + Bloch"}, {"authorId": "2499862", "name": "A. Lema\u00eetre"}, {"authorId": + "102296643", "name": "P. Leung"}, {"authorId": "5362311", "name": "P. Roussignol"}, + {"authorId": "2829334", "name": "R. Binder"}, {"authorId": "35055521", "name": + "J. Tignon"}, {"authorId": "49371199", "name": "S. Schumacher"}]}, {"paperId": + "8b934aad7112262d1260c2d9296fc68985fe5bfe", "externalIds": {"MAG": "2183600202", + "DOI": "10.1172/JCI119750", "CorpusId": 12628862, "PubMed": "9410890"}, "corpusId": + 12628862, "publicationVenue": {"id": "8c9a9e1b-acf2-4274-8d73-6ea0ecd11fd1", + "name": "Journal of Clinical Investigation", "type": "journal", "alternate_names": + ["J Clin Investig"], "issn": "0021-9738", "url": "https://www.jci.org/", "alternate_urls": + ["http://www.jci.org/", "https://www.jci.org/archive", "http://www.jci.org/impact"]}, + "url": "https://www.semanticscholar.org/paper/8b934aad7112262d1260c2d9296fc68985fe5bfe", + "title": "Nitric oxide synthases: which, where, how, and why?", "abstract": + "ture that clearly identifies the specific enzyme isoform. A widely accepted + nomenclature (3), which will be used in these Perspective articles, identifies + the three mammalian enzyme isoforms as nNOS, iNOS, and eNOS, reflecting the + tissues of origin for the original protein and cDNA isolates. As denoted by + its prefix, nNOS was originally purified and cloned from neuronal tissues. + However, nNOS is now known to be much more widely distributed, with an important + level of expression in skeletal muscle. iNOS, originally purified and cloned + from an immunoactivated macrophage cell line, has since been identified in + myriad mammalian tissues, and iNOS expression has been studied in cells as + diverse as cardiac myocytes, glial cells, and vascular smooth muscle cells + (to name only a few). eNOS, the last of the three mammalian NOS isoforms to + be isolated, was originally purified and cloned from vascular endothelium, + but has since been discovered in cardiac myocytes, blood platelets, brain + (hippocampus), and elsewhere. To add to the confusion, the human genes for + the NOS isoforms are officially categorized in the order of their isolation + and characterization; thus, the human genes encoding nNOS, iNOS, and eNOS + are termed NOS1 , NOS2 , and NOS3 , respectively.", "venue": "Journal of Clinical + Investigation", "year": 1997, "referenceCount": 58, "citationCount": 1024, + "influentialCitationCount": 36, "isOpenAccess": true, "openAccessPdf": {"url": + "http://www.jci.org/articles/view/119750/files/pdf", "status": "BRONZE"}, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", + "JournalArticle"], "publicationDate": "1997-11-01", "journal": {"name": "The + Journal of clinical investigation", "pages": "\n 2146-52\n ", + "volume": "100 9"}, "authors": [{"authorId": "2153763", "name": "T. Michel"}, + {"authorId": "2110687", "name": "O. Feron"}]}, {"paperId": "43965c9aebd0f2ef450069ccf3d41d818cd1583f", + "externalIds": {"MAG": "684736", "CorpusId": 59679402}, "corpusId": 59679402, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43965c9aebd0f2ef450069ccf3d41d818cd1583f", + "title": "A Non-Behavioural, Computational Extension to the Turing Test", + "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": + 62, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "101-106", "volume": ""}, "authors": + [{"authorId": "1745871", "name": "D. Dowe"}, {"authorId": "145033113", "name": + "A. H\u00e1jek"}]}, {"paperId": "65ae5f79db9fa302b98d718d24dca64bb7103fb5", + "externalIds": {"MAG": "242918004", "CorpusId": 49534085}, "corpusId": 49534085, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/65ae5f79db9fa302b98d718d24dca64bb7103fb5", + "title": "Positive degree-day factors for ablation on the Greenland ice sheet + studied by energy-balance ll1.odelling", "abstract": "ABSTR ACT. Ice a b la + tion is rel a ted to a ir temperature b y the positive d egree-day factor. + V a ri a tions of th e positi ve degree-d ay fac tor in \\Ves t Greenland + a re st ud ied using a n energy-ba la n ce m odel to simulate ablation under + differen t condi tions. Degree-d ay factors for simula ted a nd m easured + ice a bla tio n at ;.Jordbogle tscher a nd Q amana rss up sermia agree well + with valu es a round 8 mm d 1oC I. Degree-d ay factors for snow a re less + tha n h a lf those for ice. Energy-bala nce m od ell ing shows th a t degreeday + factors va ry with summer mean tempera ture, surface a lbedo and turbulence + but there is only evidence of la rge positive d egree-day facto rs a t lower + tempera tures and with low a lbedo (0. 3) . Th e greates t effec t of albedo + varia ti o ns (0.30. 7) is a t lower tempera tures while vari a tio ns in + turbulen ce have grea ter e ITeC ! a t higher tempera tures. Current m odels + may underes tima te rllnoff from the Green la nd ice shee t b y severa l tenths + becallse they use a d egree-day facto r for melting ice tha t is too sm a + ll fo r the cold er pa rts of the ice shee t, i.e. the upper a bla tion a + rea a nd the northerly m a rgin.", "venue": "", "year": 1995, "referenceCount": + 60, "citationCount": 49, "influentialCitationCount": 11, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": + "Geology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "103485778", "name": + "Roger J. Braith"}]}, {"paperId": "d8eb5c184db65945981a7a8dc125b54c6c22653f", + "externalIds": {"DBLP": "journals/corr/cs-CC-9907033", "ArXiv": "cs/9907033", + "MAG": "2950070060", "DOI": "10.1137/S0097539794261970", "CorpusId": 59952}, + "corpusId": 59952, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/d8eb5c184db65945981a7a8dc125b54c6c22653f", "title": "Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete Sets", "abstract": "This paper studies, for UP, two topics that have been intensely studied for NP: Boolean hierarchies and the consequences of the @@ -21345,107 +24701,88 @@ interactions: promise unambiguous polynomial hierarchy. We obtain related results under the weaker assumption that UP has sparse Turing-hard sets.", "venue": "SIAM journal on computing (Print)", "year": 1999, "referenceCount": 92, "citationCount": - 34, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": + 34, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/cs/9907033", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1999-07-26", "journal": {"name": "ArXiv", "volume": "cs.CC/9907033"}, "authors": [{"authorId": "1704511", "name": "L. A. Hemaspaandra"}, {"authorId": "145200357", "name": "J. Rothe"}]}, {"paperId": - "3bbb972fdde76dafb316640ae57a498f6fa8abaa", "externalIds": {"MAG": "2121659875", - "DOI": "10.1142/S0218339009002843", "CorpusId": 86010933}, "url": "https://www.semanticscholar.org/paper/3bbb972fdde76dafb316640ae57a498f6fa8abaa", - "title": "SPATIAL PATTERN IN AN EPIDEMIC SYSTEM WITH CROSS-DIFFUSION OF THE - SUSCEPTIBLE", "abstract": "In this paper, pattern formation of a spatial model - with cross diffusion of the susceptible is investigated. We compute Hopf and - Turing bifurcations for the model. In particular, the exact Turing domain - is delineated in the parameter space. When the parameters are in that domain, - a series of numerical simulations reveals that the typical dynamics of the - infecteds class typically involves the formation of isolated groups, i.e., - striped, spotted or labyrinthine patterns. Furthermore, spatial oscillatory - and anti-phase dynamics of different spatial points were also found. These - results demonstrate that cross diffusion of susceptibles may have great influence - on the spread of the epidemic.", "venue": "", "year": 2009, "referenceCount": - 17, "citationCount": 44, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2009-03-01", "journal": {"name": - "Journal of Biological Systems", "pages": "141-152", "volume": "17"}, "authors": - [{"authorId": "47334108", "name": "Gui\u2010Quan Sun"}, {"authorId": "145752193", - "name": "Zhen Jin"}, {"authorId": "47362020", "name": "Quan\u2010Xing Liu"}, - {"authorId": "103314097", "name": "Li Li"}]}, {"paperId": "3f6f5b1003cc4073c2679c91b2dda42deed79127", - "externalIds": {"ArXiv": "nlin/0312029", "MAG": "1666619124", "CorpusId": - 117319617}, "url": "https://www.semanticscholar.org/paper/3f6f5b1003cc4073c2679c91b2dda42deed79127", - "title": "Transverse Patterns in Nonlinear Optical Resonators", "abstract": - "Order Parameter Equations for Lasers.- Order Parameter Equations for Other - Nonlinear Resonators.- Zero Detuning: Laser Hydrodynamics and Optical Vortices.- - Finite Detuning: Vortex Sheets and Vortex Lattices.- Resonators with Curved - Mirrors.- The Restless Vortex.- Domains and Spatial Solitons.- Subcritical - Solitons I: Saturable Absorber.- Subcritical Solitons II: Nonlinear Resonance.- - Phase Domains and Phase Solitons.- Turing Patterns in Nonlinear Optics.- Three-Dimensional - Patterns.- Patterns and Noise.", "venue": "", "year": 2003, "referenceCount": - 237, "citationCount": 71, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-12-12", "journal": {"name": - "arXiv: Pattern Formation and Solitons", "volume": ""}, "authors": [{"authorId": - "2640938", "name": "K. Stali\u016bnas"}, {"authorId": "1399239669", "name": - "V. S\u00e1nchez-Morcillo"}]}, {"paperId": "82e542fa6af52b766456aa998e9de2be1d05c901", - "externalIds": {"MAG": "2018369793", "DOI": "10.1300/J130v06n01_06", "CorpusId": - 167394919}, "url": "https://www.semanticscholar.org/paper/82e542fa6af52b766456aa998e9de2be1d05c901", - "title": "Organizational Cul ture and Job Satisfaction in Jordan", "abstract": - "Abstract Or ga ni za tional cul ture and job sat is faction were ex am-ined - across four in dus tries in Jor dan. The sam ple con sisted of 234 man -agers - and non-managerial employees. The sam ple was randomly selected. The par tic - i pants in di cated that the pre vail ing or ga ni za tional cul ture is power, - and that the most de sired cul ture is achieve ment. In ad-di tion, par tic - i pants showed high sat is fac tion with their jobs. There was a significant - correlation be tween job sat is fac tion and power, role, and achieve ment - cul tures.", "venue": "", "year": 2001, "referenceCount": 1, "citationCount": - 25, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2001-09-01", "journal": {"name": "Journal of Transnational - Management Development", "pages": "105 - 118", "volume": "6"}, "authors": - [{"authorId": "114287811", "name": "Abbas J. Ali"}, {"authorId": "118833693", - "name": "H. Sabri"}]}, {"paperId": "5ba7963c168527f50c9479c1a97d313d2111079e", - "externalIds": {"DBLP": "journals/mst/BookG70", "MAG": "1986188250", "DOI": - "10.1007/BF01705890", "CorpusId": 27678211}, "url": "https://www.semanticscholar.org/paper/5ba7963c168527f50c9479c1a97d313d2111079e", - "title": "Quasi-realtime languages", "abstract": null, "venue": "Mathematical - Systems Theory", "year": 1970, "referenceCount": 17, "citationCount": 43, - "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1970-03-01", "journal": - {"name": "Mathematical systems theory", "pages": "97-111", "volume": "4"}, - "authors": [{"authorId": "1699267", "name": "R. V. Book"}, {"authorId": "2408866", - "name": "S. Greibach"}]}, {"paperId": "8fe5713419f903697a0155b3a5465ff2586e2c1b", - "externalIds": {"MAG": "606616652", "DOI": "10.1142/8306", "CorpusId": 60058501}, - "url": "https://www.semanticscholar.org/paper/8fe5713419f903697a0155b3a5465ff2586e2c1b", - "title": "A Computable Universe: Understanding and Exploring Nature As Computation", - "abstract": "This volume, with a foreword by Sir Roger Penrose, discusses - the foundations of computation in relation to nature. It focuses on two main - questions: What is computation? How does nature compute? The contributors - are world-renowned experts who have helped shape a cutting-edge computational - understanding of the universe. They discuss computation in the world from - a variety of perspectives, ranging from foundational concepts to pragmatic - models to ontological conceptions and philosophical implications. The volume - provides a state-of-the-art collection of technical papers and non-technical - essays, representing a field that assumes information and computation to be - key in understanding and explaining the basic structure underpinning physical - reality. It also includes a new edition of Konrad Zuse''s \"Calculating Space\" - (the MIT translation), and a panel discussion transcription on the topic, - featuring worldwide experts in quantum mechanics, physics, cognition, computation - and algorithmic complexity. The volume is dedicated to the memory of Alan - M Turing -- the inventor of universal computation, on the 100th anniversary - of his birth, and is part of the Turing Centenary celebrations.", "venue": - "", "year": 2012, "referenceCount": 17, "citationCount": 123, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-10-30", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "66445647", - "name": "H. Zenil"}]}, {"paperId": "1ba07bad505883965b378c168d7e847b63bf918b", - "externalIds": {"MAG": "2024127981", "DOI": "10.2307/1937836", "CorpusId": - 84596160}, "url": "https://www.semanticscholar.org/paper/1ba07bad505883965b378c168d7e847b63bf918b", + "026509e37936d1f266b263c013b325a019deecfb", "externalIds": {"DBLP": "journals/eccc/HiraharaW15", + "MAG": "2469381561", "DOI": "10.4230/LIPIcs.CCC.2016.18", "CorpusId": 6725240}, + "corpusId": 6725240, "publicationVenue": {"id": "23f8fe4c-6537-4027-a334-6a5863115984", + "name": "Cybersecurity and Cyberforensics Conference", "type": "conference", + "alternate_names": ["Chin Control Conf", "Computational Complexity Conference", + "CCC", "Comput Complex Conf", "Cybersecur Cyberforensics Conf", "Conference + on Computational Complexity", "Computing Colombian Conference", "Conf Comput + Complex", "Comput Colomb Conf", "Chinese Control Conference"], "url": "http://computationalcomplexity.org/"}, + "url": "https://www.semanticscholar.org/paper/026509e37936d1f266b263c013b325a019deecfb", + "title": "Limits of Minimum Circuit Size Problem as Oracle", "abstract": "The + Minimum Circuit Size Problem (MCSP) is known to be hard for statistical zero + knowledge via a BPP-Turing reduction (Allender and Das, 2014), whereas establishing + NP-hardness of MCSP via a polynomial-time many-one reduction is difficult + (Murray and Williams, 2015) in the sense that it implies ZPP \u2260 EXP, which + is a major open problem in computational complexity. \n \nIn this paper, we + provide strong evidence that current techniques cannot establish NP-hardness + of MCSP, even under polynomial-time Turing reductions or randomized reductions: + Specifically, we introduce the notion of oracle-independent reduction to MCSP, + which captures all the currently known reductions. We say that a reduction + to MCSP is oracle-independent if the reduction can be generalized to a reduction + to MCSPA for any oracle A, where MCSPA denotes an oracle version of MCSP. + We prove that no language outside P is reducible to MCSP via an oracle-independent + polynomial-time Turing reduction. We also show that the class of languages + reducible to MCSP via an oracle-independent randomized reduction that makes + at most one query is contained in AM \u2229 coAM. Thus, NP-hardness of MCSP + cannot be established via such oracle-independent reductions unless the polynomial + hierarchy collapses. \n \nWe also extend the previous results to the case + of more general reductions: We prove that establishing NP-hardness of MCSP + via a polynomial-time nonadaptive reduction implies ZPP \u2260 EXP, and that + establishing NP-hardness of approximating circuit complexity via a polynomial-time + Turing reduction also implies ZPP \u2260 EXP. Along the way, we prove that + approximating Levin''s Kolmogorov complexity is provably not EXP-hard under + polynomial-time Turing reductions, which is of independent interest.", "venue": + "Cybersecurity and Cyberforensics Conference", "year": 2016, "referenceCount": + 22, "citationCount": 38, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2016-05-29", "journal": {"name": "Electron. + Colloquium Comput. Complex.", "volume": "TR15"}, "authors": [{"authorId": + "2921974", "name": "Shuichi Hirahara"}, {"authorId": "145581400", "name": + "O. Watanabe"}]}, {"paperId": "92ac61b13eab6a710ac8253ad549df38ff7802c8", + "externalIds": {"ACL": "S17-2083", "MAG": "2963277000", "DBLP": "journals/corr/KochkinaLA17", + "ArXiv": "1704.07221", "DOI": "10.18653/v1/S17-2083", "CorpusId": 5462493}, + "corpusId": 5462493, "publicationVenue": {"id": "70713d09-6e4b-4554-9d3f-94d08aba320c", + "name": "International Workshop on Semantic Evaluation", "type": "conference", + "alternate_names": ["SemEval ", "Int Workshop Semantic Evaluation"]}, "url": + "https://www.semanticscholar.org/paper/92ac61b13eab6a710ac8253ad549df38ff7802c8", + "title": "Turing at SemEval-2017 Task 8: Sequential Approach to Rumour Stance + Classification with Branch-LSTM", "abstract": "This paper describes team Turing\u2019s + submission to SemEval 2017 RumourEval: Determining rumour veracity and support + for rumours (SemEval 2017 Task 8, Subtask A). Subtask A addresses the challenge + of rumour stance classification, which involves identifying the attitude of + Twitter users towards the truthfulness of the rumour they are discussing. + Stance classification is considered to be an important step towards rumour + verification, therefore performing well in this task is expected to be useful + in debunking false rumours. In this work we classify a set of Twitter posts + discussing rumours into either supporting, denying, questioning or commenting + on the underlying rumours. We propose a LSTM-based sequential model that, + through modelling the conversational structure of tweets, which achieves an + accuracy of 0.784 on the RumourEval test set outperforming all other systems + in Subtask A.", "venue": "International Workshop on Semantic Evaluation", + "year": 2017, "referenceCount": 20, "citationCount": 102, "influentialCitationCount": + 19, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.aclweb.org/anthology/S17-2083.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-04-03", "journal": {"name": "ArXiv", "volume": "abs/1704.07221"}, + "authors": [{"authorId": "144318711", "name": "E. Kochkina"}, {"authorId": + "1991548", "name": "Maria Liakata"}, {"authorId": "1736067", "name": "Isabelle + Augenstein"}]}, {"paperId": "1ba07bad505883965b378c168d7e847b63bf918b", "externalIds": + {"MAG": "2024127981", "DOI": "10.2307/1937836", "CorpusId": 84596160}, "corpusId": + 84596160, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1ba07bad505883965b378c168d7e847b63bf918b", "title": "Some Observations of the Use of Discriminant Analysis in Ecology", "abstract": "The application of discriminant analysis in ecological investigations is discussed. The appropriate statistical assumptions for discriminant analysis @@ -21461,206 +24798,68 @@ interactions: limitations of representation of data in canonical space are considered, and some cautionary points are made concerning ecological interpretation of patterns in canonical space.", "venue": "", "year": 1983, "referenceCount": 24, "citationCount": - 276, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1983-10-01", "journal": {"name": "Ecology", "pages": - "1283-1291", "volume": "64"}, "authors": [{"authorId": "40642431", "name": - "B. Williams"}]}, {"paperId": "ef9190e7669ea5523c3ef61180b35385b0ea345f", - "externalIds": {"MAG": "2059800182", "DOI": "10.1016/0885-2308(91)90016-J", - "CorpusId": 121808836}, "url": "https://www.semanticscholar.org/paper/ef9190e7669ea5523c3ef61180b35385b0ea345f", - "title": "A comparison of the enhanced Good-Turing and deleted estimation - methods for estimating probabilities of English bigrams", "abstract": null, - "venue": "", "year": 1991, "referenceCount": 7, "citationCount": 294, "influentialCitationCount": - 10, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Computer Speech & Language", "pages": "19-54", - "volume": "5"}, "authors": [{"authorId": "2244184", "name": "Kenneth Ward - Church"}, {"authorId": "34938639", "name": "W. Gale"}]}, {"paperId": "51a3d5ee450fdcdaed8afcf30a4e91e0ad810c92", - "externalIds": {"MAG": "2135247172", "ArXiv": "cs/0607014", "DBLP": "journals/corr/abs-cs-0607014", - "DOI": "10.1109/ISIT.2006.262066", "CorpusId": 9631}, "url": "https://www.semanticscholar.org/paper/51a3d5ee450fdcdaed8afcf30a4e91e0ad810c92", - "title": "Strong Consistency of the Good-Turing Estimator", "abstract": "We - consider the problem of estimating the total probability of all symbols that - appear with a given frequency in a string of i.i.d. random variables with - unknown distribution. We focus on the regime in which the block length is - large yet no symbol appears frequently in the string. This is accomplished - by allowing the distribution to change with the block length. Under a natural - convergence assumption on the sequence of underlying distributions, we show - that the total probabilities converge to a deterministic limit, which we characterize. - We then show that the good-turing total probability estimator is strongly - consistent", "venue": "2006 IEEE International Symposium on Information Theory", - "year": 2006, "referenceCount": 22, "citationCount": 32, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-07-05", "journal": {"name": "2006 IEEE International Symposium on Information - Theory", "pages": "2526-2530"}, "authors": [{"authorId": "145606712", "name": - "A. Wagner"}, {"authorId": "144768649", "name": "P. Viswanath"}, {"authorId": - "1697413", "name": "S. Kulkarni"}]}, {"paperId": "678a61c9a17dc1a74769b05ac8783425cac1eba3", - "externalIds": {"MAG": "2132137137", "DOI": "10.1007/s11538-010-9533-4", "CorpusId": - 18609839, "PubMed": "20309644"}, "url": "https://www.semanticscholar.org/paper/678a61c9a17dc1a74769b05ac8783425cac1eba3", - "title": "Aberrant Behaviours of Reaction Diffusion Self-organisation Models - on\u00a0Growing Domains in\u00a0the\u00a0Presence of\u00a0Gene Expression - Time Delays", "abstract": null, "venue": "Bulletin of Mathematical Biology", - "year": 2010, "referenceCount": 52, "citationCount": 28, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2010-03-23", "journal": {"name": "Bulletin - of Mathematical Biology", "pages": "2161-2179", "volume": "72"}, "authors": - [{"authorId": "148135541", "name": "S. Seirin\u00a0Lee"}, {"authorId": "2662569", - "name": "E. Gaffney"}]}, {"paperId": "c09bef5f2efee6e1c8a09bc70a53f38631ab3e62", - "externalIds": {"MAG": "2496760711", "DBLP": "conf/iwsas/2000", "DOI": "10.1007/3-540-44584-6", - "CorpusId": 790456}, "url": "https://www.semanticscholar.org/paper/c09bef5f2efee6e1c8a09bc70a53f38631ab3e62", - "title": "Self-Adaptive Software", "abstract": null, "venue": "Lecture Notes - in Computer Science", "year": 2001, "referenceCount": 98, "citationCount": - 141, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "1936"}, - "authors": [{"authorId": "46553314", "name": "P. Robertson"}, {"authorId": - "1716356", "name": "H. Shrobe"}, {"authorId": "1685676", "name": "R. Laddaga"}]}, - {"paperId": "241a09bfd35bbc65871051c22a7a058605d12e35", "externalIds": {"ArXiv": - "quant-ph/9708054", "MAG": "2048424641", "DOI": "10.1002/(SICI)1521-3978(199806)46:4/5<423::AID-PROP423>3.0.CO;2-G", - "CorpusId": 2733830}, "url": "https://www.semanticscholar.org/paper/241a09bfd35bbc65871051c22a7a058605d12e35", - "title": "Models of Quantum Turing Machines", "abstract": "Quantum Turing - machines are discussed and reviewed in this paper. Most of the paper is concerned - with processes defined by a step operator T that is used to construct a Hamiltonian - H according to Feynman''s prescription. Differences between these models and - the models of Deutsch are discussed and reviewed. It is emphasized that the - models with H constructed from T include fully quantum mechanical processes - that take computation basis states into linear superpositions of these states. - The requirement that T be distinct path generating is reviewed. The advantage - of this requirement is that Schr{umlt o}dinger evolution under H is one dimensional - along distinct finite or infinite paths of nonoverlapping states in some basis - B{sub C}. It is emphasized that B{sub C} can be arbitrarily complex with extreme - entanglements between states of component systems. The new aspect of quantum - Turing machines introduced here is the emphasis on the structure of graphs - obtained when the states in the B{sub C} paths are expanded as linear superpositions - of states in a reference basis such as the computation basis B{sub C}. Examples - are discussed that illustrate the main points of the paper. For one example - the graph structures of the paths in B{sub C}more\u00a0\u00bb expanded as - states in B{sub C} include finite stage binary trees and concatenated finite - stage binary trees with or without terminal infinite binary trees. Other examples - are discussed in which the graph structures correspond to interferometers - and iterations of interferometers.\u00ab\u00a0less", "venue": "", "year": - 1997, "referenceCount": 20, "citationCount": 22, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1997-08-28", - "journal": {"name": "Protein Science", "pages": "423-441", "volume": "46"}, - "authors": [{"authorId": "2542436", "name": "P. Benioff"}]}, {"paperId": "fb45a5b1caf186b5f65425481a690c38f887075c", - "externalIds": {"MAG": "2102326230", "CorpusId": 6130527, "PubMed": "13695232"}, - "url": "https://www.semanticscholar.org/paper/fb45a5b1caf186b5f65425481a690c38f887075c", - "title": "Systemic lupus erythematosus. Description of 37 cases in children - and a discussion of endocrine therapy in 32 of the cases.", "abstract": "dren - is generally a progressive disease terminating fatally. With the advent of - adrenocorticotropic and adrenal steroid hor mones and subsequent reports1-3 - of success ful treatment in adults, it seemed possible that the prognosis - in children might also be improved. This paper presents a detailed description - of clinical and pathologic fea tures of systemic lupus erythematosus in 37 - children, 32 of whom were treated with adrenal steroids or adrenocorticotropin.", - "venue": "Pediatrics", "year": 1960, "referenceCount": 8, "citationCount": - 94, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1960-10-01", "journal": {"name": "Pediatrics", "pages": - "\n 570-85\n ", "volume": "26"}, "authors": [{"authorId": - "2267572", "name": "C. Cook"}, {"authorId": "144406416", "name": "R. Wedgwood"}, - {"authorId": "4660052", "name": "J. Craig"}, {"authorId": "35862546", "name": - "J. Hartmann"}, {"authorId": "4491316", "name": "C. Janeway"}]}, {"paperId": - "2a2011c1152e38d41d6088903d4945383b489776", "externalIds": {"MAG": "2116442710", - "CorpusId": 744509}, "url": "https://www.semanticscholar.org/paper/2a2011c1152e38d41d6088903d4945383b489776", - "title": "ORTHOGONAL-MAXIMIN LATIN HYPERCUBE DESIGNS", "abstract": "A randomly - generated Latin hypercube design (LHD) can be quite struc- tured: the variables - may be highly correlated or the design may not have good space-filling properties. - There are procedures for finding good LHDs by minimizing the pairwise correlations - or by maximizing the inter-site distances. In this article we show that these - two criteria need not be in close agreement. We propose a multi-objective - optimization approach to find good LHDs by combining correlation and distance - performance measures. We also propose a new exchange algorithm for efficiently - generating such designs. Several examples are presented to show that the new - algorithm is fast, and that the optimal designs are good in terms of both - the correlation and distance criteria.", "venue": "", "year": 2008, "referenceCount": - 24, "citationCount": 279, "influentialCitationCount": 23, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Statistica Sinica", "pages": "171-186", "volume": "18"}, "authors": - [{"authorId": "144296196", "name": "V. R. Joseph"}, {"authorId": "144646110", - "name": "Ying Hung"}]}, {"paperId": "65ae5f79db9fa302b98d718d24dca64bb7103fb5", - "externalIds": {"MAG": "242918004", "CorpusId": 49534085}, "url": "https://www.semanticscholar.org/paper/65ae5f79db9fa302b98d718d24dca64bb7103fb5", - "title": "Positive degree-day factors for ablation on the Greenland ice sheet - studied by energy-balance ll1.odelling", "abstract": "ABSTR ACT. Ice a b la - tion is rel a ted to a ir temperature b y the positive d egree-day factor. - V a ri a tions of th e positi ve degree-d ay fac tor in \\Ves t Greenland - a re st ud ied using a n energy-ba la n ce m odel to simulate ablation under - differen t condi tions. Degree-d ay factors for simula ted a nd m easured - ice a bla tio n at ;.Jordbogle tscher a nd Q amana rss up sermia agree well - with valu es a round 8 mm d 1oC I. Degree-d ay factors for snow a re less - tha n h a lf those for ice. Energy-bala nce m od ell ing shows th a t degreeday - factors va ry with summer mean tempera ture, surface a lbedo and turbulence - but there is only evidence of la rge positive d egree-day facto rs a t lower - tempera tures and with low a lbedo (0. 3) . Th e greates t effec t of albedo - varia ti o ns (0.30. 7) is a t lower tempera tures while vari a tio ns in - turbulen ce have grea ter e ITeC ! a t higher tempera tures. Current m odels - may underes tima te rllnoff from the Green la nd ice shee t b y severa l tenths - becallse they use a d egree-day facto r for melting ice tha t is too sm a - ll fo r the cold er pa rts of the ice shee t, i.e. the upper a bla tion a - rea a nd the northerly m a rgin.", "venue": "", "year": 1995, "referenceCount": - 60, "citationCount": 49, "influentialCitationCount": 11, "isOpenAccess": false, - "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", + 276, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "103485778", "name": "Roger J. Braith"}]}, - {"paperId": "c15da4c3088fb92268cbee0cb9e125fa6992a3d7", "externalIds": {"DBLP": - "books/cu/CH2016", "MAG": "2486235541", "DOI": "10.1017/CBO9780511863196", - "CorpusId": 19691388}, "url": "https://www.semanticscholar.org/paper/c15da4c3088fb92268cbee0cb9e125fa6992a3d7", - "title": "The Once and Future Turing: Computing the World", "abstract": "Alan - Turing (1912\u20131954) made seminal contributions to mathematical logic, - computation, computer science, artificial intelligence, cryptography and theoretical - biology. In this volume, outstanding scientific thinkers take a fresh look - at the great range of Turing\u2019s contributions, on how the subjects have - developed since his time, and how they might develop still further. These - specially commissioned essays will provoke and engross the reader who wishes - to understand better the lasting significance of one of the twentieth century\u2019s - deepest thinkers.", "venue": "", "year": 2016, "referenceCount": 0, "citationCount": - 30, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "98630872", "name": "S. Cooper"}, {"authorId": "144443425", - "name": "A. Hodges"}]}, {"paperId": "0daf97c9e3817305ec4a2032913dfb9bfda33705", - "externalIds": {"MAG": "2950308024", "DBLP": "journals/em/Booker06", "ArXiv": - "math/0507502", "DOI": "10.1080/10586458.2006.10128976", "CorpusId": 28459118}, - "url": "https://www.semanticscholar.org/paper/0daf97c9e3817305ec4a2032913dfb9bfda33705", - "title": "Artin''s Conjecture, Turing''s Method, and the Riemann Hypothesis", - "abstract": "We present a group-theoretic criterion under which one may verify - the Artin conjecture for some (nonmonomial) Galois representations, up to - finite height in the complex plane. In particular, the criterion applies to - S 5 and A 5 representations. Under more general conditions, the technique - allows for the possibility of verifying the Riemann hypothesis for Dedekind - zeta functions of nonabelian extensions of \u211a. In addition, we discuss - two methods for locating zeros of arbitrary L-functions. The first uses the - explicit formula and techniques developed in [Booker and Str\u00f6mbergsson - 07] for computing with trace formulas. The second method generalizes that - of Turing for verifying the Riemann hypothesis. In order to apply it we develop - a rigorous algorithm for computing general L-functions on the critical line - via the fast Fourier transform. Finally, we present some numerical results - testing Artin''s conjecture for S 5 representations, and the Riemann hypothesis - for Dedekind zeta functions of S 5 and A 5 fields.", "venue": "Experimental - Mathematics", "year": 2005, "referenceCount": 48, "citationCount": 48, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "publicationTypes": null, "publicationDate": "1983-10-01", "journal": {"name": + "Ecology", "pages": "1283-1291", "volume": "64"}, "authors": [{"authorId": + "40642431", "name": "B. Williams"}]}, {"paperId": "483e37cfefe4772633dbb5d26a2392128dedca6e", + "externalIds": {"MAG": "2163806694", "DOI": "10.1103/PHYSREVE.70.046219", + "CorpusId": 30201869, "PubMed": "15600507"}, "corpusId": 30201869, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/483e37cfefe4772633dbb5d26a2392128dedca6e", + "title": "Turing pattern formation in a two-layer system: superposition and + superlattice patterns.", "abstract": "Turing patterns in the chlorine dioxide-iodine-malonic + acid reaction are studied in a system consisting of two coupled gel layers. + Patterns with two wavelengths are observed. Changing the strength of the interlayer + coupling causes a transition between a superposition of Turing patterns and + a superlattice pattern. The effects of the reactant concentrations on the + pattern wavelengths are delineated.", "venue": "Physical review. E, Statistical, + nonlinear, and soft matter physics", "year": 2004, "referenceCount": 0, "citationCount": + 26, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2004-10-01", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 046219\n ", + "volume": "70 4 Pt 2"}, "authors": [{"authorId": "6742967", "name": "I. Berenstein"}, + {"authorId": "4978913", "name": "M. Dolnik"}, {"authorId": "2586119", "name": + "L. Yang"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": + "144854275", "name": "I. Epstein"}]}, {"paperId": "06927faf64761458217c623a7520ed946cb81adb", + "externalIds": {"ArXiv": "cond-mat/0211283", "MAG": "1981040333", "DOI": "10.1016/S0167-2789(02)00493-1", + "CorpusId": 8245594}, "corpusId": 8245594, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/06927faf64761458217c623a7520ed946cb81adb", + "title": "A new dimension to Turing patterns", "abstract": null, "venue": + "", "year": 2002, "referenceCount": 28, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/cond-mat/0211283", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics", + "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2002-08-01", "journal": {"name": "Physica D: Nonlinear + Phenomena", "pages": "35-44", "volume": "168"}, "authors": [{"authorId": "48183548", + "name": "T. Leppanen"}, {"authorId": "2155202", "name": "M. Karttunen"}, {"authorId": + "145670814", "name": "K. Kaski"}, {"authorId": "37747895", "name": "R. Barrio"}, + {"authorId": "2144164942", "name": "Limei Zhang"}]}, {"paperId": "5ba7963c168527f50c9479c1a97d313d2111079e", + "externalIds": {"DBLP": "journals/mst/BookG70", "MAG": "1986188250", "DOI": + "10.1007/BF01705890", "CorpusId": 27678211}, "corpusId": 27678211, "publicationVenue": + {"id": "cc43107f-e671-4f87-99f5-ae12f9992c0d", "name": "Mathematical Systems + Theory", "type": "journal", "alternate_names": ["Math Syst Theory", "Theory + Comput Syst Math Syst Theory", "Theory of Computing Systems \\/ Mathematical + Systems Theory"], "issn": "0025-5661", "url": "https://link.springer.com/journal/224"}, + "url": "https://www.semanticscholar.org/paper/5ba7963c168527f50c9479c1a97d313d2111079e", + "title": "Quasi-realtime languages", "abstract": null, "venue": "Mathematical + Systems Theory", "year": 1970, "referenceCount": 17, "citationCount": 43, + "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-07-25", "journal": {"name": "Experimental Mathematics", "pages": "385 - - 407", "volume": "15"}, "authors": [{"authorId": "3063921", "name": "A. Booker"}]}, - {"paperId": "534a819e0b8d199cf1ffedbbdff68a076ea77ecd", "externalIds": {"MAG": - "2140188317", "DBLP": "journals/jetai/French00", "DOI": "10.1080/09528130050111464", - "CorpusId": 9022405}, "url": "https://www.semanticscholar.org/paper/534a819e0b8d199cf1ffedbbdff68a076ea77ecd", + "1970-03-01", "journal": {"name": "Mathematical systems theory", "pages": + "97-111", "volume": "4"}, "authors": [{"authorId": "1699267", "name": "R. + V. Book"}, {"authorId": "2408866", "name": "S. Greibach"}]}, {"paperId": "534a819e0b8d199cf1ffedbbdff68a076ea77ecd", + "externalIds": {"MAG": "2140188317", "DBLP": "journals/jetai/French00", "DOI": + "10.1080/09528130050111464", "CorpusId": 9022405}, "corpusId": 9022405, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/534a819e0b8d199cf1ffedbbdff68a076ea77ecd", "title": "Peeking behind the screen: the unsuspected power of the standard Turing Test", "abstract": "No computer that had not experienced the world as we humans had could pass a rigorously administered standard Turing Test. @@ -21680,68 +24879,145 @@ interactions: is not a reasonable test for general machine intelligence. There is no need for an even stronger version of the Test.", "venue": "J. Exp. Theor. Artif. Intell.", "year": 2000, "referenceCount": 20, "citationCount": 28, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-07-01", "journal": {"name": "Journal of Experimental - & Theoretical Artificial Intelligence", "pages": "331 - 340", "volume": "12"}, - "authors": [{"authorId": "2440747", "name": "R. French"}]}, {"paperId": "953819e4cb4703d7cd21556032530403771768b5", - "externalIds": {"MAG": "2066742923", "DOI": "10.14219/JADA.ARCHIVE.1962.0184", - "CorpusId": 42540978, "PubMed": "14489483"}, "url": "https://www.semanticscholar.org/paper/953819e4cb4703d7cd21556032530403771768b5", - "title": "Comparative cleansing efficiency of manual and power brushing.", - "abstract": "The purpose of the studies described in this report was to evaluate - the efficiency of a reciprocating motion toothbrush as an instrument for cleaning - the teeth. These studies were initiated during the early stages of the development - of the device; therefore, they reflect both pro\u00ad gressive engineering - improvements and the accumulation of information showing that the danger of - hard tissue abrasion and soft tissue laceration was not an im\u00ad portant - consideration with this device. The two main criteria that could be used to - judge efficiency were speed of cleaning and thoroughness of cleaning. From - a practical standpoint, however, speed per se is not a reliable measure of - efficiency because the factor of pleasure cannot be disregarded. For example, - if the use of a power device encouraged the subject to brush longer than he - ordinarily did with a hand brush and this factor alone resulted in an improved - state of oral hygiene, the application of power to the toothbrush would be - justified. Since early studies with the electric device re\u00ad vealed that - important pleasurable fea\u00ad tures were associated with its use, the criterion - of thoroughness of cleaning in\u00ad dependent of time was adopted as the - main measure of cleaning efficiency.", "venue": "The Journal of the American - Dental Association (1939)", "year": 1962, "referenceCount": 0, "citationCount": - 977, "influentialCitationCount": 34, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1962-07-01", "journal": {"name": "Journal of the American - Dental Association", "pages": "\n 26-9\n ", "volume": "65"}, - "authors": [{"authorId": "2077120856", "name": "G. A. Quigley"}, {"authorId": - "34096356", "name": "J. Hein"}]}, {"paperId": "f94feceb5b725c6b303b758a0e5e90215b0174d3", - "externalIds": {"MAG": "2612624696", "DBLP": "journals/corr/HosangBS17", "ArXiv": - "1705.02950", "DOI": "10.1109/CVPR.2017.685", "CorpusId": 7211062}, "url": - "https://www.semanticscholar.org/paper/f94feceb5b725c6b303b758a0e5e90215b0174d3", - "title": "Learning Non-maximum Suppression", "abstract": "Object detectors - have hugely profited from moving towards an end-to-end learning paradigm: - proposals, fea tures, and the classifier becoming one neural network improved - results two-fold on general object detection. One indispensable component - is non-maximum suppression (NMS), a post-processing algorithm responsible - for merging all detections that belong to the same object. The de facto standard - NMS algorithm is still fully hand-crafted, suspiciously simple, and — - being based on greedy clustering with a fixed distance threshold — - forces a trade-off between recall and precision. We propose a new network - architecture designed to perform NMS, using only boxes and their score. We - report experiments for person detection on PETS and for general object categories - on the COCO dataset. Our approach shows promise providing improved localization - and occlusion handling.", "venue": "Computer Vision and Pattern Recognition", - "year": 2017, "referenceCount": 37, "citationCount": 288, "influentialCitationCount": - 51, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2017-05-08", "journal": {"name": "2017 - IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "pages": - "6469-6477"}, "authors": [{"authorId": "2536361", "name": "J. Hosang"}, {"authorId": - "1798000", "name": "Rodrigo Benenson"}, {"authorId": "48920094", "name": "B. - Schiele"}]}, {"paperId": "c6b117456f19e17955217532299933b11ab9075b", "externalIds": - {"MAG": "1968629600", "DOI": "10.1021/JP000203+", "CorpusId": 93936924}, "url": - "https://www.semanticscholar.org/paper/c6b117456f19e17955217532299933b11ab9075b", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2000-07-01", "journal": + {"name": "Journal of Experimental & Theoretical Artificial Intelligence", + "pages": "331 - 340", "volume": "12"}, "authors": [{"authorId": "2440747", + "name": "R. French"}]}, {"paperId": "82e542fa6af52b766456aa998e9de2be1d05c901", + "externalIds": {"MAG": "2018369793", "DOI": "10.1300/J130v06n01_06", "CorpusId": + 167394919}, "corpusId": 167394919, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82e542fa6af52b766456aa998e9de2be1d05c901", + "title": "Organizational Cul ture and Job Satisfaction in Jordan", "abstract": + "Abstract Or ga ni za tional cul ture and job sat is faction were ex am-ined + across four in dus tries in Jor dan. The sam ple con sisted of 234 man -agers + and non-managerial employees. The sam ple was randomly selected. The par tic + i pants in di cated that the pre vail ing or ga ni za tional cul ture is power, + and that the most de sired cul ture is achieve ment. In ad-di tion, par tic + i pants showed high sat is fac tion with their jobs. There was a significant + correlation be tween job sat is fac tion and power, role, and achieve ment + cul tures.", "venue": "", "year": 2001, "referenceCount": 1, "citationCount": + 25, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-09-01", "journal": {"name": + "Journal of Transnational Management Development", "pages": "105 - 118", "volume": + "6"}, "authors": [{"authorId": "114287811", "name": "Abbas J. Ali"}, {"authorId": + "118833693", "name": "H. Sabri"}]}, {"paperId": "3bd11f1afcf7ce33264699f649b9d8f8336ddcd8", + "externalIds": {"DBLP": "journals/jacm/Zeigler72", "MAG": "2147379954", "DOI": + "10.1145/321724.321737", "CorpusId": 16680841}, "corpusId": 16680841, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3bd11f1afcf7ce33264699f649b9d8f8336ddcd8", + "title": "Toward a Formal Theory of Modeling and Simulation: Structure Preserving + Morphisms", "abstract": "A s imula t ion consists of a tr iple of au toma + ta (system to be s imulated, model of this system, computer realizing the + model). In a val id s imulat ion these elements are connected by behavior + and s t ruc ture preserving morphisms. In format iona l and complexity considerat + ions mot iva te the development of s t ruc tu re preserving morphisms which + can preserve not only global, bu t also local dynamic s t ruc ture . A formalism + for au tomaton s t ruc tu re ass ignment and the re levant weak and s t rong + s t ruc tu re preserving morphisms are introduced. I t is shown tha t these + preserva t ion not ions proper ly refine the usual au tomaton homomorphism + concepts. Sufficient condit ions are given under which preserva t ion of the + local s ta te space s t ruc tu re (weak morphism) also forces the preserva + t ion of component in teract ion. The s t rong sense in which these condit + ions are necessary is also demons t ra ted . This provides a ra t ionale for + making valid inferences about the local s t ruc ture of a sys tem when t h + a t of a behaviora l ly val id model is known.", "venue": "JACM", "year": + 1972, "referenceCount": 24, "citationCount": 56, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1972-10-01", "journal": + {"name": "J. ACM", "pages": "742-764", "volume": "19"}, "authors": [{"authorId": + "1755591", "name": "B. Zeigler"}]}, {"paperId": "ae732fe9654e194116e9ac54893610a3f2846001", + "externalIds": {"CorpusId": 4825283}, "corpusId": 4825283, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ae732fe9654e194116e9ac54893610a3f2846001", + "title": "Gene Expression Time Delays and Turing Pattern Formation Systems", + "abstract": "The incorporation of time delays can greatly affect the behaviour + of partial differential equations and dynamical systems. In addition, there + is evidence that time delays in gene expression due to transcription and translation + play an important role in the dynamics of cellular systems. In this paper, + we investigate the effects of incorporating gene expression time delays into + a one-dimensional putative reaction diffusion pattern formation mechanism + on both stationary domains and domains with spatially uniform exponential + growth. While oscillatory behaviour is rare, we find that the time taken to + initiate and stabilise patterns increases dramatically as the time delay is + increased. In addition, we observe that on rapidly growing domains the time + delay can induce a failure of the Turing instability which cannot be predicted + by a naive linear analysis of the underlying equations about the homogeneous + steady state. The dramatic lag in the induction of patterning, or even its + complete absence on occasions, highlights the importance of considering explicit + gene expression time delays in models for cellular reaction diffusion patterning.", + "venue": "", "year": 2006, "referenceCount": 40, "citationCount": 47, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2082826015", + "name": "E. A. Gaffneya"}, {"authorId": "2105453702", "name": "N. A. M. Monkb"}]}, + {"paperId": "1ac18bff7508302cf9febad58ff0b8538af867ff", "externalIds": {"MAG": + "1879184788", "DBLP": "conf/cie/GracaCB05", "DOI": "10.1007/11494645_21", + "CorpusId": 14492595}, "corpusId": 14492595, "publicationVenue": {"id": "ce5f5d49-2807-4aa0-9db3-64a03084444d", + "name": "Conference on Computability in Europe", "type": "conference", "alternate_names": + ["CiE", "CIE", "International Conference on Computers and Industrial Engineering", + "Conf Comput Eur", "Int Conf Comput Ind Eng"], "url": "http://www.illc.uva.nl/CiE/"}, + "url": "https://www.semanticscholar.org/paper/1ac18bff7508302cf9febad58ff0b8538af867ff", + "title": "Robust Simulations of Turing Machines with Analytic Maps and Flows", + "abstract": null, "venue": "Conference on Computability in Europe", "year": + 2005, "referenceCount": 29, "citationCount": 45, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://sapientia.ualg.pt/bitstream/10400.1/1008/1/05-GCB-stable.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2005-06-08", "journal": {"pages": "169-179"}, "authors": [{"authorId": "144473423", + "name": "D. Gra\u00e7a"}, {"authorId": "2812847", "name": "M. Campagnolo"}, + {"authorId": "2509079", "name": "J. Buescu"}]}, {"paperId": "3f6f5b1003cc4073c2679c91b2dda42deed79127", + "externalIds": {"ArXiv": "nlin/0312029", "MAG": "1666619124", "CorpusId": + 117319617}, "corpusId": 117319617, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f6f5b1003cc4073c2679c91b2dda42deed79127", + "title": "Transverse Patterns in Nonlinear Optical Resonators", "abstract": + "Order Parameter Equations for Lasers.- Order Parameter Equations for Other + Nonlinear Resonators.- Zero Detuning: Laser Hydrodynamics and Optical Vortices.- + Finite Detuning: Vortex Sheets and Vortex Lattices.- Resonators with Curved + Mirrors.- The Restless Vortex.- Domains and Spatial Solitons.- Subcritical + Solitons I: Saturable Absorber.- Subcritical Solitons II: Nonlinear Resonance.- + Phase Domains and Phase Solitons.- Turing Patterns in Nonlinear Optics.- Three-Dimensional + Patterns.- Patterns and Noise.", "venue": "", "year": 2003, "referenceCount": + 237, "citationCount": 71, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2003-12-12", "journal": {"name": + "arXiv: Pattern Formation and Solitons", "volume": ""}, "authors": [{"authorId": + "2640938", "name": "K. Stali\u016bnas"}, {"authorId": "1399239669", "name": + "V. S\u00e1nchez-Morcillo"}]}, {"paperId": "943e8f069a64820bda77bdc724ea1d1230268f9b", + "externalIds": {"MAG": "68923906", "DBLP": "journals/acta/CastellanosMMS03", + "DOI": "10.1007/s00236-003-0114-y", "CorpusId": 8371226}, "corpusId": 8371226, + "publicationVenue": {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", "name": + "Acta Informatica", "type": "journal", "alternate_names": ["Acta Inform"], + "issn": "0001-5903", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/943e8f069a64820bda77bdc724ea1d1230268f9b", + "title": "Networks of evolutionary processors", "abstract": null, "venue": + "Acta Informatica", "year": 2003, "referenceCount": 14, "citationCount": 134, + "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-06-01", "journal": + {"name": "Acta Informatica", "pages": "517-529", "volume": "39"}, "authors": + [{"authorId": "145622741", "name": "J. Castellanos"}, {"authorId": "1397242142", + "name": "C. Mart\u00edn-Vide"}, {"authorId": "1715143", "name": "V. Mitrana"}, + {"authorId": "144571199", "name": "J. Sempere"}]}, {"paperId": "d304686801a3c9563939b7c88853569ab89b9258", + "externalIds": {"MAG": "1509006216", "DOI": "10.1007/978-1-4020-6710-5_2", + "CorpusId": 58530775}, "corpusId": 58530775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d304686801a3c9563939b7c88853569ab89b9258", + "title": "Alan Turing and the Turing Test", "abstract": null, "venue": "", + "year": 2009, "referenceCount": 7, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "pages": "13-22", "volume": + ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": + "c6b117456f19e17955217532299933b11ab9075b", "externalIds": {"MAG": "1968629600", + "DOI": "10.1021/JP000203+", "CorpusId": 93936924}, "corpusId": 93936924, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c6b117456f19e17955217532299933b11ab9075b", "title": "A Theoretical Study on Turing Patterns in Electrochemical Systems", "abstract": "We present theoretical studies on pattern formation in electrochemical systems with an S-shaped current potential curve (S\u2212NDR systems) under @@ -21755,86 +25031,96 @@ interactions: system. This condition is fulfilled in practically all electrochemical systems. The experimental parameters under which the patterns form should be readily accessible.", "venue": "", "year": 2000, "referenceCount": 0, "citationCount": - 45, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2000-06-01", "journal": {"name": "Journal of Physical - Chemistry B", "pages": "6081-6090", "volume": "104"}, "authors": [{"authorId": - "31579523", "name": "N. Mazouz"}, {"authorId": "2372632", "name": "K. Krischer"}]}, - {"paperId": "128a522b1be3b0ffae6a31fd190a33368fd9b8ad", "externalIds": {"MAG": - "1992692415", "DOI": "10.1080/07391102.2000.10506630", "CorpusId": 17071062, - "PubMed": "22607433"}, "url": "https://www.semanticscholar.org/paper/128a522b1be3b0ffae6a31fd190a33368fd9b8ad", - "title": "Algorithmic Self-Assembly of DNA: Theoretical Motivations and 2D - Assembly Experiments", "abstract": "Abstract Biology makes things far smaller - and more complex than anything produced by human engineering. The biotechnology - revolution has for the first time given us the tools necessary to consider - engineering on the molecular level. Research in DNA computation, launched - by Len Adleman, has opened the door for experimental study of programmable - biochemical reactions. Here we focus on a single biochemical mechanism, the - self-assembly of DNA structures, that is theoretically sufficient for Turing-universal - computation. The theory combines Hao Wang''s purely mathematical Tiling Problem - with the branched DNA constructions of Ned Seeman. In the context of mathematical - logic, Wang showed how jigsaw-shaped tiles can be designed to simulate the - operation of any Turing Machine. For a biochemical implementation, we will - need molecular Wang tiles. DNA molecular structures and intermolecular interactions - are particularly amenable to design and are sufficient for the creation of - complex molecular objects. The structure of individual molecules can be designed - by maximizing desired and minimizing undesired Watson-Crick complementarity. - Intermolecular interactions are programmed by the design of sticky ends that - determine which molecules associate, and how. The theory has been demonstrated - experimentally using a system of synthetic DNA double-crossover molecules - that self-assemble into two-dimensional crystals that have been visualized - by atomic force microscopy. This experimental system provides an excellent - platform for exploring the relationship between computation and molecular - self-assembly, and thus represents a first step toward the ability to program - molecular reactions and molecular structures.", "venue": "Journal of Biomolecular - Structure and Dynamics", "year": 2000, "referenceCount": 48, "citationCount": - 115, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-01-01", "journal": {"name": "Journal of Biomolecular - Structure and Dynamics", "pages": "263 - 270", "volume": "17"}, "authors": - [{"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": "2f3fe3c70209286c93c6a598f017204f9227592c", - "externalIds": {"MAG": "2099179560", "DBLP": "journals/cj/Fortnow12", "DOI": - "10.1093/comjnl/bxs073", "CorpusId": 659201}, "url": "https://www.semanticscholar.org/paper/2f3fe3c70209286c93c6a598f017204f9227592c", - "title": "The Enduring Legacy of the Turing Machine", "abstract": "The Church-Turing - thesis has stood the test of time, capturing computation models Turing could - not have conceived of, including digital computation, probabilistic, parallel - and quantum computers and the Internet. The thesis has become accepted doctrine - in computer science and the ACM has named its highest honor after Turing. - Many now view computation as a fundamental part of nature, like atoms or the - integers.", "venue": "Computer/law journal", "year": 2012, "referenceCount": - 6, "citationCount": 20, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-07-01", "journal": {"name": "Comput. J.", "pages": "830-831", "volume": - "55"}, "authors": [{"authorId": "1691447", "name": "L. Fortnow"}]}, {"paperId": - "4b0570aeee18237aeee5fbb255204ffe01d36497", "externalIds": {"MAG": "2952069979", - "DBLP": "conf/csr/YakaryilmazS09", "ArXiv": "0809.0073", "DOI": "10.1007/978-3-642-03351-3_33", - "CorpusId": 18081592}, "url": "https://www.semanticscholar.org/paper/4b0570aeee18237aeee5fbb255204ffe01d36497", - "title": "Languages Recognized with Unbounded Error by Quantum Finite Automata", - "abstract": null, "venue": "Computer Science Symposium in Russia", "year": - 2008, "referenceCount": 33, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-08-30", "journal": {"pages": "356-367"}, "authors": [{"authorId": "1969092", - "name": "Abuzer Yakaryilmaz"}, {"authorId": "144714718", "name": "A. Say"}]}, - {"paperId": "43965c9aebd0f2ef450069ccf3d41d818cd1583f", "externalIds": {"MAG": - "684736", "CorpusId": 59679402}, "url": "https://www.semanticscholar.org/paper/43965c9aebd0f2ef450069ccf3d41d818cd1583f", - "title": "A Non-Behavioural, Computational Extension to the Turing Test", - "abstract": null, "venue": "", "year": 1998, "referenceCount": 0, "citationCount": - 62, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "101-106", "volume": ""}, "authors": [{"authorId": - "1745871", "name": "D. Dowe"}, {"authorId": "145033113", "name": "A. H\u00e1jek"}]}, - {"paperId": "c4bd2f89039031f09b9ddec07e6d456b0d08aab4", "externalIds": {"MAG": - "1565169809", "CorpusId": 60513637}, "url": "https://www.semanticscholar.org/paper/c4bd2f89039031f09b9ddec07e6d456b0d08aab4", + 46, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-06-01", "journal": {"name": + "Journal of Physical Chemistry B", "pages": "6081-6090", "volume": "104"}, + "authors": [{"authorId": "31579523", "name": "N. Mazouz"}, {"authorId": "2372632", + "name": "K. Krischer"}]}, {"paperId": "8e02819e3182df4b529ee0db15f1e09410dbea4e", + "externalIds": {"DBLP": "journals/jcss/Cook74", "MAG": "2061739322", "DOI": + "10.1145/800125.804032", "CorpusId": 15959898}, "corpusId": 15959898, "publicationVenue": + {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", "name": "Journal of computer + and system sciences (Print)", "type": "journal", "alternate_names": ["Journal + of Computer and System Sciences", "J comput syst sci (print", "J Comput Syst + Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/8e02819e3182df4b529ee0db15f1e09410dbea4e", + "title": "An observation on time-storage trade off", "abstract": "Recently + there have been several attempts to prove that every set of strings in @@@@ + (i.e., recognizable in deterministic polynomial time) can be recognized in + deterministic storage (log n)2. The methods used in the attempts were based + on that of [1], in which it is shown that every context free language can + be accepted in storage (log n)2 Our thesis in the present paper is that these + attempts must fail. We define a specific set SP of strings which is clearly + in @@@@, but in a certain well-defined sense cannot be recognized in storage + (log n)2 using the techniques in [1]. We conjecture that no Turing machine + recognizes SP within storage (log n)2, and show that if this conjecture is + false, then in fact every member of @@@@ can be recognized within storage + (log n)2.", "venue": "Journal of computer and system sciences (Print)", "year": + 1973, "referenceCount": 9, "citationCount": 270, "influentialCitationCount": + 14, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Book", "JournalArticle"], "publicationDate": "1973-04-30", "journal": {"name": + "Proceedings of the fifth annual ACM symposium on Theory of computing"}, "authors": + [{"authorId": "1765456", "name": "S. Cook"}]}, {"paperId": "c15da4c3088fb92268cbee0cb9e125fa6992a3d7", + "externalIds": {"DBLP": "books/cu/CH2016", "MAG": "2486235541", "DOI": "10.1017/CBO9780511863196", + "CorpusId": 19691388}, "corpusId": 19691388, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c15da4c3088fb92268cbee0cb9e125fa6992a3d7", + "title": "The Once and Future Turing: Computing the World", "abstract": "Alan + Turing (1912\u20131954) made seminal contributions to mathematical logic, + computation, computer science, artificial intelligence, cryptography and theoretical + biology. In this volume, outstanding scientific thinkers take a fresh look + at the great range of Turing\u2019s contributions, on how the subjects have + developed since his time, and how they might develop still further. These + specially commissioned essays will provoke and engross the reader who wishes + to understand better the lasting significance of one of the twentieth century\u2019s + deepest thinkers.", "venue": "", "year": 2016, "referenceCount": 0, "citationCount": + 30, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, + {"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": "340a8482b05aaa54e1e710b248cd725e24ba452f", + "externalIds": {"MAG": "1967231120", "DBLP": "journals/npl/SongW15", "DOI": + "10.1007/s11063-014-9352-y", "CorpusId": 3060492}, "corpusId": 3060492, "publicationVenue": + {"id": "03101d6e-e317-48fe-ab55-f82ed4f0727f", "name": "Neural Processing + Letters", "type": "journal", "alternate_names": ["Neural Process Lett"], "issn": + "1370-4621", "url": "https://link.springer.com/journal/11063"}, "url": "https://www.semanticscholar.org/paper/340a8482b05aaa54e1e710b248cd725e24ba452f", + "title": "Homogenous Spiking Neural P Systems with Inhibitory Synapses", "abstract": + null, "venue": "Neural Processing Letters", "year": 2015, "referenceCount": + 46, "citationCount": 36, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2015-08-01", "journal": {"name": "Neural Processing Letters", "pages": "199-214", + "volume": "42"}, "authors": [{"authorId": "2001220881", "name": "Tao Song"}, + {"authorId": "2115535535", "name": "Xun Wang"}]}, {"paperId": "c08e588080fc1ffec76c43dbf96ad3af572a7211", + "externalIds": {"MAG": "2951723186", "ArXiv": "physics/0106045", "DBLP": "journals/corr/physics-0106045", + "DOI": "10.1063/1.882660", "CorpusId": 3265308}, "corpusId": 3265308, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c08e588080fc1ffec76c43dbf96ad3af572a7211", + "title": "A Continuous Model of Computation", "abstract": "A central dogma + of computer science is that the Turing\u2010machine model is the appropriate + abstraction of a digital computer. Physicists who''ve thought about the matter + also seem to favor the Turing\u2010machine model. For example, Roger Penrose + devoted some 60 pages of a book to a description of this abstract model of + computation and its implications. I argue here that physicists should consider + the real\u2010number model of computation as more appropriate and useful for + scientific computation.", "venue": "ArXiv", "year": 1999, "referenceCount": + 25, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://academiccommons.columbia.edu/doi/10.7916/D8CZ3J70/download", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1999-05-01", "journal": {"name": "ArXiv", + "volume": "physics/0106045"}, "authors": [{"authorId": "1682927", "name": + "J. Traub"}]}, {"paperId": "c4bd2f89039031f09b9ddec07e6d456b0d08aab4", "externalIds": + {"MAG": "1565169809", "CorpusId": 60513637}, "corpusId": 60513637, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c4bd2f89039031f09b9ddec07e6d456b0d08aab4", "title": "A Relational Model for Large Shared Data Banks", "abstract": "ion, not implementation. His goal is to describe data, not to build a model of computation (which one would then be expected to prove equivalent to Turing @@ -21857,130 +25143,83 @@ interactions: are some clear ways to analyze problems to determine potential relations, but I expect that there is also some art (and therefore some experience) required.", "venue": "", "year": 1970, "referenceCount": 0, "citationCount": 904, "influentialCitationCount": - 41, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Communications of The ACM", "volume": ""}, "authors": - [{"authorId": "3075265", "name": "E. Codd"}]}, {"paperId": "af86eda1e2fb70e1320b0d4f2651ecc8d5c28de3", - "externalIds": {"MAG": "2159989667", "DOI": "10.1006/ICAR.1996.5583", "CorpusId": - 17693544}, "url": "https://www.semanticscholar.org/paper/af86eda1e2fb70e1320b0d4f2651ecc8d5c28de3", - "title": "Effects of Hyperfine Particles on Reflectance Spectra from 0.3 to - 25 \u03bcm", "abstract": "Fine grained particles ,50 mm in size dominate particle - size changes in the volume scattering region, the Christiansen feadistributions - of many planetary surfaces. Despite the predomi- ture, restrahlen bands, and - transparency features. The quartz nance of fine particles in planetary regoliths, - there have been particle size series were less well modeled, with the greatest - few investigations of the systematic effects of the finest particles discrepancies - in the restrahlen bands and the overall spectral on reflectance spectra, and - on the ability of quantitative models contrast. \u00a9 1997 Academic Press - to extract compositional and/or textural information from remote observations. - The effects of fine particles that are approximately the same size as the - wavelength of light on reflectance", "venue": "", "year": 1997, "referenceCount": - 39, "citationCount": 262, "influentialCitationCount": 20, "isOpenAccess": - false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "external"}, {"category": "Environmental Science", - "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Icarus", - "pages": "145-163", "volume": "125"}, "authors": [{"authorId": "33488956", - "name": "J. Mustard"}, {"authorId": "92643071", "name": "J. Hays"}]}, {"paperId": - "943e8f069a64820bda77bdc724ea1d1230268f9b", "externalIds": {"MAG": "68923906", - "DBLP": "journals/acta/CastellanosMMS03", "DOI": "10.1007/s00236-003-0114-y", - "CorpusId": 8371226}, "url": "https://www.semanticscholar.org/paper/943e8f069a64820bda77bdc724ea1d1230268f9b", - "title": "Networks of evolutionary processors", "abstract": null, "venue": - "Acta Informatica", "year": 2003, "referenceCount": 14, "citationCount": 134, - "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-06-01", "journal": {"name": "Acta Informatica", "pages": - "517-529", "volume": "39"}, "authors": [{"authorId": "145622741", "name": - "J. Castellanos"}, {"authorId": "1397242142", "name": "C. Mart\u00edn-Vide"}, - {"authorId": "1715143", "name": "V. Mitrana"}, {"authorId": "144571199", "name": - "J. Sempere"}]}, {"paperId": "026509e37936d1f266b263c013b325a019deecfb", "externalIds": - {"DBLP": "journals/eccc/HiraharaW15", "MAG": "2469381561", "DOI": "10.4230/LIPIcs.CCC.2016.18", - "CorpusId": 6725240}, "url": "https://www.semanticscholar.org/paper/026509e37936d1f266b263c013b325a019deecfb", - "title": "Limits of Minimum Circuit Size Problem as Oracle", "abstract": "The - Minimum Circuit Size Problem (MCSP) is known to be hard for statistical zero - knowledge via a BPP-Turing reduction (Allender and Das, 2014), whereas establishing - NP-hardness of MCSP via a polynomial-time many-one reduction is difficult - (Murray and Williams, 2015) in the sense that it implies ZPP \u2260 EXP, which - is a major open problem in computational complexity. \n \nIn this paper, we - provide strong evidence that current techniques cannot establish NP-hardness - of MCSP, even under polynomial-time Turing reductions or randomized reductions: - Specifically, we introduce the notion of oracle-independent reduction to MCSP, - which captures all the currently known reductions. We say that a reduction - to MCSP is oracle-independent if the reduction can be generalized to a reduction - to MCSPA for any oracle A, where MCSPA denotes an oracle version of MCSP. - We prove that no language outside P is reducible to MCSP via an oracle-independent - polynomial-time Turing reduction. We also show that the class of languages - reducible to MCSP via an oracle-independent randomized reduction that makes - at most one query is contained in AM \u2229 coAM. Thus, NP-hardness of MCSP - cannot be established via such oracle-independent reductions unless the polynomial - hierarchy collapses. \n \nWe also extend the previous results to the case - of more general reductions: We prove that establishing NP-hardness of MCSP - via a polynomial-time nonadaptive reduction implies ZPP \u2260 EXP, and that - establishing NP-hardness of approximating circuit complexity via a polynomial-time - Turing reduction also implies ZPP \u2260 EXP. Along the way, we prove that - approximating Levin''s Kolmogorov complexity is provably not EXP-hard under - polynomial-time Turing reductions, which is of independent interest.", "venue": - "Cybersecurity and Cyberforensics Conference", "year": 2016, "referenceCount": - 22, "citationCount": 38, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + 41, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2016-05-29", - "journal": {"name": "Electron. Colloquium Comput. Complex.", "volume": "TR15"}, - "authors": [{"authorId": "2921974", "name": "Shuichi Hirahara"}, {"authorId": - "145581400", "name": "O. Watanabe"}]}, {"paperId": "ae732fe9654e194116e9ac54893610a3f2846001", - "externalIds": {"CorpusId": 4825283}, "url": "https://www.semanticscholar.org/paper/ae732fe9654e194116e9ac54893610a3f2846001", - "title": "Gene Expression Time Delays and Turing Pattern Formation Systems", - "abstract": "The incorporation of time delays can greatly affect the behaviour - of partial differential equations and dynamical systems. In addition, there - is evidence that time delays in gene expression due to transcription and translation - play an important role in the dynamics of cellular systems. In this paper, - we investigate the effects of incorporating gene expression time delays into - a one-dimensional putative reaction diffusion pattern formation mechanism - on both stationary domains and domains with spatially uniform exponential - growth. While oscillatory behaviour is rare, we find that the time taken to - initiate and stabilise patterns increases dramatically as the time delay is - increased. In addition, we observe that on rapidly growing domains the time - delay can induce a failure of the Turing instability which cannot be predicted - by a naive linear analysis of the underlying equations about the homogeneous - steady state. The dramatic lag in the induction of patterning, or even its - complete absence on occasions, highlights the importance of considering explicit - gene expression time delays in models for cellular reaction diffusion patterning.", - "venue": "", "year": 2006, "referenceCount": 40, "citationCount": 46, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "2082826015", "name": "E. - A. Gaffneya"}, {"authorId": "2105453702", "name": "N. A. M. Monkb"}]}, {"paperId": - "92ac61b13eab6a710ac8253ad549df38ff7802c8", "externalIds": {"ACL": "S17-2083", - "MAG": "2963277000", "DBLP": "journals/corr/KochkinaLA17", "ArXiv": "1704.07221", - "DOI": "10.18653/v1/S17-2083", "CorpusId": 5462493}, "url": "https://www.semanticscholar.org/paper/92ac61b13eab6a710ac8253ad549df38ff7802c8", - "title": "Turing at SemEval-2017 Task 8: Sequential Approach to Rumour Stance - Classification with Branch-LSTM", "abstract": "This paper describes team Turing\u2019s - submission to SemEval 2017 RumourEval: Determining rumour veracity and support - for rumours (SemEval 2017 Task 8, Subtask A). Subtask A addresses the challenge - of rumour stance classification, which involves identifying the attitude of - Twitter users towards the truthfulness of the rumour they are discussing. - Stance classification is considered to be an important step towards rumour - verification, therefore performing well in this task is expected to be useful - in debunking false rumours. In this work we classify a set of Twitter posts - discussing rumours into either supporting, denying, questioning or commenting - on the underlying rumours. We propose a LSTM-based sequential model that, - through modelling the conversational structure of tweets, which achieves an - accuracy of 0.784 on the RumourEval test set outperforming all other systems - in Subtask A.", "venue": "International Workshop on Semantic Evaluation", - "year": 2017, "referenceCount": 20, "citationCount": 100, "influentialCitationCount": - 19, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-04-03", "journal": {"name": "ArXiv", "volume": "abs/1704.07221"}, - "authors": [{"authorId": "144318711", "name": "E. Kochkina"}, {"authorId": - "1991548", "name": "Maria Liakata"}, {"authorId": "1736067", "name": "Isabelle - Augenstein"}]}, {"paperId": "d9a879ce2c4b2b962384534370bc424469280138", "externalIds": - {"MAG": "1594865592", "DOI": "10.5749/minnesota/9780816677665.001.0001", "CorpusId": - 154098173}, "url": "https://www.semanticscholar.org/paper/d9a879ce2c4b2b962384534370bc424469280138", + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Communications + of The ACM", "volume": ""}, "authors": [{"authorId": "3075265", "name": "E. + Codd"}]}, {"paperId": "b0be6aa3fb0b6611d22015fb42975304c16f3b92", "externalIds": + {"MAG": "1485501806", "DOI": "10.1007/978-3-662-05642-4_8", "CorpusId": 118322434}, + "corpusId": 118322434, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b0be6aa3fb0b6611d22015fb42975304c16f3b92", + "title": "The Myth of Hypercomputation", "abstract": null, "venue": "", "year": + 2004, "referenceCount": 23, "citationCount": 137, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "195-211", "volume": ""}, "authors": + [{"authorId": "113641402", "name": "Martin D. Davis"}]}, {"paperId": "089e177467e855a806bb62307459849777367f1e", + "externalIds": {"MAG": "85856132", "CorpusId": 59794952}, "corpusId": 59794952, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/089e177467e855a806bb62307459849777367f1e", + "title": "Security in a Web Services World: A Proposed Architec - ture and + Roadmap", "abstract": "A flexible backing member is provided to bear in supporting + relation against one side of a moveable ribbon sideplate in a stuffer box + crimper to provide a smooth, elastic curved surfaced path for the ribbon sideplate + to move thereagainst in all positions of its adjustment, with one end of the + flexible backing member being connected in cantilevered manner at a location + in or beyond the exit end of the crimping chamber.", "venue": "", "year": + 2002, "referenceCount": 6, "citationCount": 112, "influentialCitationCount": + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "148011374", "name": "S. Baum"}]}, {"paperId": "640092f74066d7405020664daa516abba158217f", + "externalIds": {"MAG": "2153395438", "DBLP": "journals/jql/ZhangH07", "DOI": + "10.1080/09296170701514189", "CorpusId": 5232432}, "corpusId": 5232432, "publicationVenue": + {"id": "c0503267-3ea4-41cd-aeb2-f8b244ff5a33", "name": "Journal of Quantitative + Linguistics", "type": "journal", "alternate_names": ["J Quant Linguistics"], + "issn": "0929-6174", "url": "http://www.tandfonline.com/loi/njql20"}, "url": + "https://www.semanticscholar.org/paper/640092f74066d7405020664daa516abba158217f", + "title": "Turing''s formula revisited*", "abstract": "Abstract A simple frequentist''s + justification of Turing''s formula, an improvement to Turing''s formula by + means of reduced bias, a clarification of the relationships among various + objects related to Turing''s formula, a conservative confidence interval to + Turing''s target, and a conservative testing procedure using observed rank-frequencies + under a hypothesized known infinite-dimensional multinomial distribution are + given in this paper. As an example, the authorship of the nine-stanza poem + \u201cShall I Die?\u201d is tested against Shakespeare''s canon and statistically + significant evidence is found for a difference in word type usage.", "venue": + "Journal of Quantitative Linguistics", "year": 2007, "referenceCount": 28, + "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-08-01", "journal": {"name": "Journal of Quantitative Linguistics", "pages": + "222 - 241", "volume": "14"}, "authors": [{"authorId": "2117992573", "name": + "Zhiyi Zhang"}, {"authorId": "2146282191", "name": "Hongwei Huang"}]}, {"paperId": + "8edb52262478e3d0c0b46e4db75bb8b36fe96c7f", "externalIds": {"MAG": "182486616", + "DBLP": "conf/aaai/Schubert06", "CorpusId": 6325617}, "corpusId": 6325617, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8edb52262478e3d0c0b46e4db75bb8b36fe96c7f", + "title": "Turing''s Dream and the Knowledge Challenge", "abstract": "There + is a set of clear-cut challenges, all centering around knowledge, that have + received insufficient attention in AI, and whose solution could bring the + realization of Turing''s dream - the dream of a machine we can talk with just + like a person, and which is therefore (at least) our intellectual equal. These + challenges have to do with the representation of linguistically expressible + knowledge, the role of knowledge in language understanding, the use of knowledge + for several sorts of commonsense reasoning, and knowledge accumulation. Concerning + the last topic, I briefly present preliminary results of some of our recent + efforts to extract \"shallow\" general knowledge about the world from large + text corpora.", "venue": "AAAI", "year": 2006, "referenceCount": 32, "citationCount": + 28, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2006-07-16", "journal": {"pages": "1534-1538"}, "authors": + [{"authorId": "2404386", "name": "Lenhart K. Schubert"}]}, {"paperId": "d9a879ce2c4b2b962384534370bc424469280138", + "externalIds": {"MAG": "1594865592", "DOI": "10.5749/minnesota/9780816677665.001.0001", + "CorpusId": 154098173}, "corpusId": 154098173, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d9a879ce2c4b2b962384534370bc424469280138", "title": "Digital Memory and the Archive", "abstract": "Contents Archival Media Theory: An Introduction to Wolfgang Ernst''s Media Archaeology Jussi Parikka Media Archaeology as a Trans-Atlantic Bridge Part I. The Media Archaeological @@ -21997,39 +25236,46 @@ interactions: Pythagoras, Hertz, Turing Appendix. Archive Rumblings: An Interview with Wolfgang Ernst Geert Lovink Acknowledgments Notes Publication History Index", "venue": "", "year": 2012, "referenceCount": 260, "citationCount": 254, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": - "Art", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2012-12-20", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "49709079", "name": "W. Ernst"}, - {"authorId": "1809521", "name": "J. Parikka"}]}, {"paperId": "1ac18bff7508302cf9febad58ff0b8538af867ff", - "externalIds": {"MAG": "1879184788", "DBLP": "conf/cie/GracaCB05", "DOI": - "10.1007/11494645_21", "CorpusId": 14492595}, "url": "https://www.semanticscholar.org/paper/1ac18bff7508302cf9febad58ff0b8538af867ff", - "title": "Robust Simulations of Turing Machines with Analytic Maps and Flows", - "abstract": null, "venue": "Conference on Computability in Europe", "year": - 2005, "referenceCount": 29, "citationCount": 45, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-06-08", "journal": {"pages": "169-179"}, "authors": [{"authorId": "144473423", - "name": "D. Gra\u00e7a"}, {"authorId": "2812847", "name": "M. Campagnolo"}, - {"authorId": "2509079", "name": "J. Buescu"}]}, {"paperId": "06927faf64761458217c623a7520ed946cb81adb", - "externalIds": {"ArXiv": "cond-mat/0211283", "MAG": "1981040333", "DOI": "10.1016/S0167-2789(02)00493-1", - "CorpusId": 8245594}, "url": "https://www.semanticscholar.org/paper/06927faf64761458217c623a7520ed946cb81adb", - "title": "A new dimension to Turing patterns", "abstract": null, "venue": - "", "year": 2002, "referenceCount": 28, "citationCount": 36, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics", "Biology"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2002-08-01", "journal": {"name": - "Physica D: Nonlinear Phenomena", "pages": "35-44", "volume": "168"}, "authors": - [{"authorId": "48183548", "name": "T. Leppanen"}, {"authorId": "2155202", - "name": "M. Karttunen"}, {"authorId": "145670814", "name": "K. Kaski"}, {"authorId": - "37747895", "name": "R. Barrio"}, {"authorId": "2144164942", "name": "Limei - Zhang"}]}, {"paperId": "dcea1444c795d7e57ba987bd5557633ae2cab819", "externalIds": - {"MAG": "1970504992", "DOI": "10.1002/anie.201007829", "CorpusId": 28059479, - "PubMed": "21504030"}, "url": "https://www.semanticscholar.org/paper/dcea1444c795d7e57ba987bd5557633ae2cab819", + 11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], + "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2012-12-20", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "49709079", "name": "W. Ernst"}, {"authorId": "1809521", "name": "J. Parikka"}]}, + {"paperId": "241a09bfd35bbc65871051c22a7a058605d12e35", "externalIds": {"ArXiv": + "quant-ph/9708054", "MAG": "2048424641", "DOI": "10.1002/(SICI)1521-3978(199806)46:4/5<423::AID-PROP423>3.0.CO;2-G", + "CorpusId": 2733830}, "corpusId": 2733830, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/241a09bfd35bbc65871051c22a7a058605d12e35", + "title": "Models of Quantum Turing Machines", "abstract": "Quantum Turing + machines are discussed and reviewed in this paper. Most of the paper is concerned + with processes defined by a step operator T that is used to construct a Hamiltonian + H according to Feynman''s prescription. Differences between these models and + the models of Deutsch are discussed and reviewed. It is emphasized that the + models with H constructed from T include fully quantum mechanical processes + that take computation basis states into linear superpositions of these states. + The requirement that T be distinct path generating is reviewed. The advantage + of this requirement is that Schr{umlt o}dinger evolution under H is one dimensional + along distinct finite or infinite paths of nonoverlapping states in some basis + B{sub C}. It is emphasized that B{sub C} can be arbitrarily complex with extreme + entanglements between states of component systems. The new aspect of quantum + Turing machines introduced here is the emphasis on the structure of graphs + obtained when the states in the B{sub C} paths are expanded as linear superpositions + of states in a reference basis such as the computation basis B{sub C}. Examples + are discussed that illustrate the main points of the paper. For one example + the graph structures of the paths in B{sub C}more\u00a0\u00bb expanded as + states in B{sub C} include finite stage binary trees and concatenated finite + stage binary trees with or without terminal infinite binary trees. Other examples + are discussed in which the graph structures correspond to interferometers + and iterations of interferometers.\u00ab\u00a0less", "venue": "", "year": + 1997, "referenceCount": 20, "citationCount": 22, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/9708054", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "1997-08-28", "journal": + {"name": "Protein Science", "pages": "423-441", "volume": "46"}, "authors": + [{"authorId": "2542436", "name": "P. Benioff"}]}, {"paperId": "dcea1444c795d7e57ba987bd5557633ae2cab819", + "externalIds": {"MAG": "1970504992", "DOI": "10.1002/anie.201007829", "CorpusId": + 28059479, "PubMed": "21504030"}, "corpusId": 28059479, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/dcea1444c795d7e57ba987bd5557633ae2cab819", "title": "Viral-capsid-type vesicle-like structures assembled from M12L24 metal-organic hybrid nanocages.", "abstract": "Viral capsids contain multiple copies of identical monomer ordimer proteins arranged into monolayered spherical @@ -22037,18 +25283,21 @@ interactions: hepatitis B virus (HBV) have a diameter of approx-imately 20 nm and contain 120 copies of a dimer protein.", "venue": "Angewandte Chemie", "year": 2011, "referenceCount": 36, "citationCount": 69, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-05-23", "journal": - {"name": "Angewandte Chemie", "pages": "\n 5182-7\n ", "volume": - "50 22"}, "authors": [{"authorId": "2108820221", "name": "Dong Li"}, {"authorId": - "143854026", "name": "Wu Zhou"}, {"authorId": "6089083", "name": "K. Landskron"}, - {"authorId": "7738205", "name": "Sota Sato"}, {"authorId": "2800281", "name": - "C. Kiely"}, {"authorId": "10781718", "name": "M. Fujita"}, {"authorId": "50021832", - "name": "Tianbo Liu"}]}, {"paperId": "35fc8ab44b16655b9c610816feba9635ca19cbca", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-05-23", "journal": {"name": "Angewandte Chemie", "pages": "\n 5182-7\n ", + "volume": "50 22"}, "authors": [{"authorId": "2108820221", "name": "Dong Li"}, + {"authorId": "143854026", "name": "Wu Zhou"}, {"authorId": "6089083", "name": + "K. Landskron"}, {"authorId": "7738205", "name": "Sota Sato"}, {"authorId": + "2800281", "name": "C. Kiely"}, {"authorId": "10781718", "name": "M. Fujita"}, + {"authorId": "50021832", "name": "Tianbo Liu"}]}, {"paperId": "35fc8ab44b16655b9c610816feba9635ca19cbca", "externalIds": {"MAG": "1849386499", "DOI": "10.1111/j.1755-148X.2012.00984.x", - "CorpusId": 8714012, "PubMed": "22313791"}, "url": "https://www.semanticscholar.org/paper/35fc8ab44b16655b9c610816feba9635ca19cbca", + "CorpusId": 8714012, "PubMed": "22313791"}, "corpusId": 8714012, "publicationVenue": + {"id": "d4fab1a0-4b1b-43b8-a2e5-4d2a5d0dc3d6", "name": "Pigment Cell & Melanoma + Research", "type": "journal", "alternate_names": ["Pigment Cell Melanoma + Res"], "issn": "1755-1471", "url": "http://www.pigment.org/"}, "url": "https://www.semanticscholar.org/paper/35fc8ab44b16655b9c610816feba9635ca19cbca", "title": "Changing clothes easily: connexin41.8 regulates skin pattern variation", "abstract": "The skin patterns of animals are very important for their survival, yet the mechanisms involved in skin pattern formation remain unresolved. Turing\u2019s @@ -22065,231 +25314,21 @@ interactions: patterns and that the reaction\u2013diffusion principle can predict skin patterns of animals.", "venue": "Pigment Cell & Melanoma Research", "year": 2012, "referenceCount": 23, "citationCount": 59, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-05-01", "journal": {"name": "Pigment Cell & Melanoma - Research", "volume": "25"}, "authors": [{"authorId": "2894944", "name": "Masakatsu - Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": - "f9f7730b3578cb0838c956d8c53c8db17a65d234", "externalIds": {"MAG": "2500514655", - "DOI": "10.1093/0198237545.003.0005", "CorpusId": 63123970}, "url": "https://www.semanticscholar.org/paper/f9f7730b3578cb0838c956d8c53c8db17a65d234", - "title": "Turing''s Test", "abstract": null, "venue": "", "year": 2004, "referenceCount": - 0, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - "2004-03-25", "journal": {"name": "", "pages": "77-86", "volume": ""}, "authors": - [{"authorId": "47824154", "name": "D. Davidson"}]}, {"paperId": "9021358a8dd1443cebfdc6e45cafd0cc33e61f26", - "externalIds": {"MAG": "1989481315", "DOI": "10.1177/017084069401500602", - "CorpusId": 143721170}, "url": "https://www.semanticscholar.org/paper/9021358a8dd1443cebfdc6e45cafd0cc33e61f26", - "title": "Institutional Pressures and Isomorphic Change: An Empirical Test", - "abstract": "This paper examines the process of isomorphic change. It does - so by examin ing the dynamics of the change process and looking at change - holistically. Using a population of 36 national-level sport organizations, - subject to environ mental pressures from a state agency to adopt a more professional - and bureau cratic design, the paper shows that over time there is an increase - in the level of homogeneity of these organizations. Although the general shift - is to a more professional and bureaucratic type of organization, certain elements - of struc ture do not change as much as others, thus demonstrating resistance - to institu tional pressures. The processes by which the changes that occurred - took place are explored.", "venue": "", "year": 1994, "referenceCount": 43, - "citationCount": 271, "influentialCitationCount": 17, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1994-11-01", "journal": - {"name": "Organization Studies", "pages": "803 - 827", "volume": "15"}, "authors": - [{"authorId": "49660065", "name": "T. Slack"}, {"authorId": "3335139", "name": - "B. Hinings"}]}, {"paperId": "c70cd87b7b4c0b68c81cb71999eba87c18d80df8", "externalIds": - {"DBLP": "conf/stoc/MaassSS87", "MAG": "1981197081", "DOI": "10.1145/28395.28406", - "CorpusId": 16374195}, "url": "https://www.semanticscholar.org/paper/c70cd87b7b4c0b68c81cb71999eba87c18d80df8", - "title": "Two tapes are better than one for off-line Turing machines", "abstract": - "We prove the first superlinear lower bound for a concrete decision problem - in P on a Turing machine with one work tape and a two-way input tape (also - called: off-line 1-tape Turing machine). In particular we show for off-line - Turing machines that 2 tapes are better than 1 and that 3 pushdown stores - are better than 2 (both in the deterministic and in the nondeterministic case).", - "venue": "Symposium on the Theory of Computing", "year": 1987, "referenceCount": - 13, "citationCount": 22, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", "Conference"], - "publicationDate": "1987-01-01", "journal": {"name": "Proceedings of the nineteenth - annual ACM symposium on Theory of computing"}, "authors": [{"authorId": "145247053", - "name": "W. Maass"}, {"authorId": "1809682", "name": "G. Schnitger"}, {"authorId": - "1723843", "name": "E. Szemer\u00e9di"}]}, {"paperId": "089e177467e855a806bb62307459849777367f1e", - "externalIds": {"MAG": "85856132", "CorpusId": 59794952}, "url": "https://www.semanticscholar.org/paper/089e177467e855a806bb62307459849777367f1e", - "title": "Security in a Web Services World: A Proposed Architec - ture and - Roadmap", "abstract": "A flexible backing member is provided to bear in supporting - relation against one side of a moveable ribbon sideplate in a stuffer box - crimper to provide a smooth, elastic curved surfaced path for the ribbon sideplate - to move thereagainst in all positions of its adjustment, with one end of the - flexible backing member being connected in cantilevered manner at a location - in or beyond the exit end of the crimping chamber.", "venue": "", "year": - 2002, "referenceCount": 6, "citationCount": 112, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "148011374", - "name": "S. Baum"}]}, {"paperId": "640092f74066d7405020664daa516abba158217f", - "externalIds": {"MAG": "2153395438", "DBLP": "journals/jql/ZhangH07", "DOI": - "10.1080/09296170701514189", "CorpusId": 5232432}, "url": "https://www.semanticscholar.org/paper/640092f74066d7405020664daa516abba158217f", - "title": "Turing''s formula revisited*", "abstract": "Abstract A simple frequentist''s - justification of Turing''s formula, an improvement to Turing''s formula by - means of reduced bias, a clarification of the relationships among various - objects related to Turing''s formula, a conservative confidence interval to - Turing''s target, and a conservative testing procedure using observed rank-frequencies - under a hypothesized known infinite-dimensional multinomial distribution are - given in this paper. As an example, the authorship of the nine-stanza poem - \u201cShall I Die?\u201d is tested against Shakespeare''s canon and statistically - significant evidence is found for a difference in word type usage.", "venue": - "Journal of Quantitative Linguistics", "year": 2007, "referenceCount": 28, - "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-08-01", "journal": {"name": "Journal - of Quantitative Linguistics", "pages": "222 - 241", "volume": "14"}, "authors": - [{"authorId": "2117992573", "name": "Zhiyi Zhang"}, {"authorId": "2146282191", - "name": "Hongwei Huang"}]}, {"paperId": "25c161313411aea736e72cebd626b41ed8fcef82", - "externalIds": {"PubMedCentral": "3804860", "MAG": "2072839058", "DOI": "10.1038/srep03016", - "CorpusId": 1789930, "PubMed": "24145394"}, "url": "https://www.semanticscholar.org/paper/25c161313411aea736e72cebd626b41ed8fcef82", - "title": "Formation and control of Turing patterns in a coherent quantum fluid", - "abstract": null, "venue": "Conference on Lasers and Electro-Optics", "year": - 2013, "referenceCount": 67, "citationCount": 45, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2013-10-22", "journal": {"name": "Scientific Reports", "volume": "3"}, "authors": - [{"authorId": "40322205", "name": "V. Ardizzone"}, {"authorId": "102565740", - "name": "P. Lewandowski"}, {"authorId": "3058659", "name": "M. H. Luk"}, {"authorId": - "93534597", "name": "Y. Tse"}, {"authorId": "118567298", "name": "N. Kwong"}, - {"authorId": "34750791", "name": "A. L\u00fccke"}, {"authorId": "5207467", - "name": "M. Abbarchi"}, {"authorId": "5012276", "name": "E. Baudin"}, {"authorId": - "6087584", "name": "\u00c9. Galopin"}, {"authorId": "47481840", "name": "J. - Bloch"}, {"authorId": "2499862", "name": "A. Lema\u00eetre"}, {"authorId": - "102296643", "name": "P. Leung"}, {"authorId": "5362311", "name": "P. Roussignol"}, - {"authorId": "2829334", "name": "R. Binder"}, {"authorId": "35055521", "name": - "J. Tignon"}, {"authorId": "49371199", "name": "S. Schumacher"}]}, {"paperId": - "354aded6443eff3468bbfeac81d3b5c3f7bcbf45", "externalIds": {"MAG": "2149003114", - "DOI": "10.1002/anie.200802325", "CorpusId": 746400, "PubMed": "18752242"}, - "url": "https://www.semanticscholar.org/paper/354aded6443eff3468bbfeac81d3b5c3f7bcbf45", - "title": "Trimodular engineering of linear supramolecular miniatures on Ag(111) - surfaces controlled by complementary triple hydrogen bonds.", "abstract": - "Thespecificity, directionality, dynamics, and complementarity ofsuchinteractionscanallowforthedesignofalargelibraryoforganic - modules bearing H-bond donor (D) and/or acceptor(A) moieties with specific - programmed functions and struc-tures that could ultimately lead to the construction - of manydesired functional assemblies. So far, this method has beensuccessfullyemployedonsolidsurfacesforthepreparationofextendedone-", - "venue": "Angewandte Chemie", "year": 2008, "referenceCount": 33, "citationCount": - 69, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2008-09-22", "journal": {"name": "Angewandte Chemie", - "pages": "\n 7726-30\n ", "volume": "47 40"}, "authors": [{"authorId": - "1399263035", "name": "Anna Llanes-Pall\u00e1s"}, {"authorId": "8321881", - "name": "M. Matena"}, {"authorId": "32750622", "name": "T. Jung"}, {"authorId": - "145439685", "name": "M. Prato"}, {"authorId": "16654729", "name": "M. St\u00f6hr"}, - {"authorId": "9997913", "name": "D. Bonifazi"}]}, {"paperId": "3bd11f1afcf7ce33264699f649b9d8f8336ddcd8", - "externalIds": {"DBLP": "journals/jacm/Zeigler72", "MAG": "2147379954", "DOI": - "10.1145/321724.321737", "CorpusId": 16680841}, "url": "https://www.semanticscholar.org/paper/3bd11f1afcf7ce33264699f649b9d8f8336ddcd8", - "title": "Toward a Formal Theory of Modeling and Simulation: Structure Preserving - Morphisms", "abstract": "A s imula t ion consists of a tr iple of au toma - ta (system to be s imulated, model of this system, computer realizing the - model). In a val id s imulat ion these elements are connected by behavior - and s t ruc ture preserving morphisms. In format iona l and complexity considerat - ions mot iva te the development of s t ruc tu re preserving morphisms which - can preserve not only global, bu t also local dynamic s t ruc ture . A formalism - for au tomaton s t ruc tu re ass ignment and the re levant weak and s t rong - s t ruc tu re preserving morphisms are introduced. I t is shown tha t these - preserva t ion not ions proper ly refine the usual au tomaton homomorphism - concepts. Sufficient condit ions are given under which preserva t ion of the - local s ta te space s t ruc tu re (weak morphism) also forces the preserva - t ion of component in teract ion. The s t rong sense in which these condit - ions are necessary is also demons t ra ted . This provides a ra t ionale for - making valid inferences about the local s t ruc ture of a sys tem when t h - a t of a behaviora l ly val id model is known.", "venue": "JACM", "year": - 1972, "referenceCount": 24, "citationCount": 56, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1972-10-01", "journal": {"name": "J. ACM", "pages": "742-764", - "volume": "19"}, "authors": [{"authorId": "1755591", "name": "B. Zeigler"}]}, - {"paperId": "8e02819e3182df4b529ee0db15f1e09410dbea4e", "externalIds": {"DBLP": - "journals/jcss/Cook74", "MAG": "2061739322", "DOI": "10.1145/800125.804032", - "CorpusId": 15959898}, "url": "https://www.semanticscholar.org/paper/8e02819e3182df4b529ee0db15f1e09410dbea4e", - "title": "An observation on time-storage trade off", "abstract": "Recently - there have been several attempts to prove that every set of strings in @@@@ - (i.e., recognizable in deterministic polynomial time) can be recognized in - deterministic storage (log n)2. The methods used in the attempts were based - on that of [1], in which it is shown that every context free language can - be accepted in storage (log n)2 Our thesis in the present paper is that these - attempts must fail. We define a specific set SP of strings which is clearly - in @@@@, but in a certain well-defined sense cannot be recognized in storage - (log n)2 using the techniques in [1]. We conjecture that no Turing machine - recognizes SP within storage (log n)2, and show that if this conjecture is - false, then in fact every member of @@@@ can be recognized within storage - (log n)2.", "venue": "Journal of computer and system sciences (Print)", "year": - 1973, "referenceCount": 9, "citationCount": 270, "influentialCitationCount": - 14, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], - "publicationDate": "1973-04-30", "journal": {"name": "Proceedings of the fifth - annual ACM symposium on Theory of computing"}, "authors": [{"authorId": "1765456", - "name": "S. Cook"}]}, {"paperId": "8dee5a2a843e1c3bce36c93f523b85a01395e4d1", - "externalIds": {"DBLP": "conf/stoc/Savitch69", "MAG": "2014357220", "DOI": - "10.1145/800169.805439", "CorpusId": 20356778}, "url": "https://www.semanticscholar.org/paper/8dee5a2a843e1c3bce36c93f523b85a01395e4d1", - "title": "Deterministic simulation of non-deterministic turing machines (Detailed - Abstract)", "abstract": "Computations of non-deterministic Turing machines - are shown to correspond to \u201csolving\u201d certain mazes. The storage - needed to \u201csolve\u201d mazes is related to the storage needed to deterministically - simulate non-deterministic Turing machines. In particular, it is shown that - a non-deterministic L(n)-tape bounded Turing machine can be simulated by an - (L(n))2-tape bounded Turing machine, provided L(n)\u2265log2n.", "venue": - "Symposium on the Theory of Computing", "year": 1969, "referenceCount": 2, - "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["Book", "JournalArticle", "Conference"], "publicationDate": "1969-05-05", - "journal": {"name": "Proceedings of the first annual ACM symposium on Theory - of computing"}, "authors": [{"authorId": "2859514", "name": "W. Savitch"}]}, - {"paperId": "b0be6aa3fb0b6611d22015fb42975304c16f3b92", "externalIds": {"MAG": - "1485501806", "DOI": "10.1007/978-3-662-05642-4_8", "CorpusId": 118322434}, - "url": "https://www.semanticscholar.org/paper/b0be6aa3fb0b6611d22015fb42975304c16f3b92", - "title": "The Myth of Hypercomputation", "abstract": null, "venue": "", "year": - 2004, "referenceCount": 23, "citationCount": 137, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "195-211", "volume": ""}, "authors": [{"authorId": - "113641402", "name": "Martin D. Davis"}]}, {"paperId": "d79c539711904539c52e5ee4ebab01a693a42161", - "externalIds": {"MAG": "1651525653", "DBLP": "journals/aim/Grosz12", "DOI": - "10.1609/aimag.v33i4.2441", "CorpusId": 8701482}, "url": "https://www.semanticscholar.org/paper/d79c539711904539c52e5ee4ebab01a693a42161", - "title": "What Question Would Turing Pose Today?", "abstract": "In 1950, when - Turing proposed to replace the question \"Can machines think?\" with the question - \"Are there imaginable digital computers which would do well in the imitation - game?\" computer science was not yet a field of study, Shannon\u2019s theory - of information had just begun to change the way people thought about communication, - and psychology was only starting to look beyond behaviorism. It is stunning - that so many predictions in Turing\u2019s 1950 Mind paper were right. In the - decades since that paper appeared, with its inspiring challenges, research - in computer science, neuroscience, and the behavioral sciences has radically - changed thinking about mental processes and communication, and the ways in - which people use computers has evolved even more dramatically. Turing, were - he writing now, might still replace \"Can machines think?\" with an operational - challenge, but it is likely he would propose a very different test. This paper - considers what that might be in light of Turing\u2019s paper and advances - in the decades since it was written.", "venue": "The AI Magazine", "year": - 2012, "referenceCount": 34, "citationCount": 28, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Psychology", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-12-21", "journal": {"name": "AI Mag.", "pages": "73-81", "volume": "33"}, - "authors": [{"authorId": "1692242", "name": "B. Grosz"}]}, {"paperId": "c0dbe69f523366ef1451e64e0efa0933bf246edf", - "externalIds": {"DBLP": "journals/informs/SavageSY05", "MAG": "2109973477", - "DOI": "10.1287/ijoc.1030.0053", "CorpusId": 207224459}, "url": "https://www.semanticscholar.org/paper/c0dbe69f523366ef1451e64e0efa0933bf246edf", + "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1111/j.1755-148X.2012.00984.x", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-05-01", "journal": {"name": "Pigment + Cell & Melanoma Research", "volume": "25"}, "authors": [{"authorId": "2894944", + "name": "Masakatsu Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, + {"paperId": "c0dbe69f523366ef1451e64e0efa0933bf246edf", "externalIds": {"DBLP": + "journals/informs/SavageSY05", "MAG": "2109973477", "DOI": "10.1287/ijoc.1030.0053", + "CorpusId": 207224459}, "corpusId": 207224459, "publicationVenue": {"id": + "b76a26bb-18f2-4155-bb35-7e7de85d01bb", "name": "INFORMS journal on computing", + "type": "journal", "alternate_names": ["INFORMS j comput", "Informs J Comput", + "Informs Journal on Computing"], "issn": "1091-9856", "url": "https://www.informs.org/", + "alternate_urls": ["http://joc.pubs.informs.org/BackIssues.html"]}, "url": + "https://www.semanticscholar.org/paper/c0dbe69f523366ef1451e64e0efa0933bf246edf", "title": "On the Generality of Event-Graph Models", "abstract": "Event graphs model the dynamics of a discrete-event simulation model. This paper demonstrates the modeling power of event graphs by presenting a model that simulates a @@ -22298,27 +25337,87 @@ interactions: Theoretical and practical implications of this assertion are also discussed.", "venue": "INFORMS journal on computing", "year": 2005, "referenceCount": 27, "citationCount": 67, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "INFORMS J. Comput.", "pages": "3-9", "volume": - "17"}, "authors": [{"authorId": "31756758", "name": "E. L. Savage"}, {"authorId": - "2813182", "name": "L. Schruben"}, {"authorId": "3091207", "name": "E. Y\u00fccesan"}]}, - {"paperId": "340a8482b05aaa54e1e710b248cd725e24ba452f", "externalIds": {"MAG": - "1967231120", "DBLP": "journals/npl/SongW15", "DOI": "10.1007/s11063-014-9352-y", - "CorpusId": 3060492}, "url": "https://www.semanticscholar.org/paper/340a8482b05aaa54e1e710b248cd725e24ba452f", - "title": "Homogenous Spiking Neural P Systems with Inhibitory Synapses", "abstract": - null, "venue": "Neural Processing Letters", "year": 2015, "referenceCount": - 46, "citationCount": 35, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-08-01", "journal": - {"name": "Neural Processing Letters", "pages": "199-214", "volume": "42"}, - "authors": [{"authorId": "2001220881", "name": "Tao Song"}, {"authorId": "2115535535", - "name": "Xun Wang"}]}, {"paperId": "d99f430ccd996e3fb2312421ae5cbc919dca0eb1", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "INFORMS J. Comput.", "pages": + "3-9", "volume": "17"}, "authors": [{"authorId": "31756758", "name": "E. L. + Savage"}, {"authorId": "2813182", "name": "L. Schruben"}, {"authorId": "3091207", + "name": "E. Y\u00fccesan"}]}, {"paperId": "6e352e241b8e06e8175d39d6176c756e388b3ba2", + "externalIds": {"MAG": "1991142451", "DOI": "10.2307/2937180", "CorpusId": + 83570585}, "corpusId": 83570585, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e352e241b8e06e8175d39d6176c756e388b3ba2", + "title": "Competition Among Grasses Along a Nitrogen Gradient: Initial Conditions + and Mechanisms of Competition", "abstract": "We grew four perennial grass + species (Poapratensis, Agropyron repens, Agros- tis scabra, and Schizachyrium + scoparium) for 5 yr in monocultures and in pairwise com- petition plots on + an experimental nitrogen gradient. The gradient contained plots ranging from + 100% sand to 100% black soil, plus plots that received additional N fertilizer. + To examine the impact of initial conditions on the long-term outcome of interspecific + com- petition, three competitive situations were created: seed vs. seed competition + (both species planted simultaneously), seed invasions (each species added + as seed to year-old monocul- tures of the other), and vegetative invasions + (dividers separating adjacent monocultures of two species removed after 1 + yr). Extractable soil NO3 and NH4, were measured to test if species differences + in the concentration of available soil N in monoculture (i.e., R* for N, Tilman + 1982) could predict the long-term outcome of competition. By year 5, Schizachyrium + displaced or greatly reduced the biomass of both Poa and Agropyron on the + soil mixture gradient (the mixed soils but not the added-N plots) inde- pendent + of the wide range of starting conditions. On these soils, Schizachyrium monocul- + tures had significantly lower soil concentrations of both NO3 and NH4, than + either Poa or Agropyron monocultures. Similarly, Agropyron displaced or greatly + reduced the biomass of Agrostis by year 5. Agropyron monocultures had significantly + lower concentrations of N03- and NO3 + NH4+, but not NH4+, than Agrostis monocultures. + In contrast, no competitive displacement occurred in competition between Poa + and Agropyron, and initial differences persisted over 5 yr. Monocultures of + these two species did not differ in NO3 concentration, but did differ for + NH4+ and NO3 + NH4+. Thus, species differences in ability to deplete soil + NO3 successfully predicted the outcome of competition for all four species + pairs on the soil mixture gradient. If resource preemption or asymmetric compe- + tition had been the mechanism of competition, initial conditions would have + affected the long-term outcome of competition. Rather, these results support + the R* (i.e., resource reduction) model for competition for soil N. In the + added-N fertilizer plots, Schizachyrium had decreased biomass in competition + with both Poa and Agropyron. However, neither Agropyron nor Poa appeared to + have an advantage when they competed with each other in the added-N plots. + For these three species pairs, the 5-yr results of competition in the added-N + plots, which had greatly reduced light availability because of increased production + and litter accumulation, depended on initial conditions. In the fourth pair, + Agrostis was displaced by Agropyron in all competition treatments in the added-N + plots. Thus, we cannot reject the hypothesis that resource preemption (i.e., + asymmetric competition) is important in light competition.", "venue": "", + "year": 1993, "referenceCount": 26, "citationCount": 446, "influentialCitationCount": + 16, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1993-02-01", "journal": {"name": "Ecological Monographs", + "pages": "199-229", "volume": "63"}, "authors": [{"authorId": "3670751", "name": + "D. Wedin"}, {"authorId": "144913121", "name": "D. Tilman"}]}, {"paperId": + "2989c0611ed954bce2f8e5ba5fda52e4b5763e4f", "externalIds": {"MAG": "2011942048", + "DOI": "10.1143/PTP.41.705", "CorpusId": 121911518}, "corpusId": 121911518, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2989c0611ed954bce2f8e5ba5fda52e4b5763e4f", + "title": "Interaction between Clusters and Pauli Principle", "abstract": "The + Pauli principle characterizes. the relative state between clusters in the + overlapping region of them. A theory to clarify the role of the Pauli principle + in the interaction be\u00ad tween clusters in a simple way'' is proposed. + The equation of motion, for the relative state, obtained as a consequence + of the total antisymmetrization, excludes naturally the states for\u00ad bidden + by the Pauli principle. The relative state is mainly determined by the orthogonality + . condition to the forbidden states for the inside and by a local potential + for the outside. It is shown that both the characteristic inner oscillation + and the almost energy-independent nodes of the relative wave function, which + appear in the a:-a: scattering and are interpreted as the origin of the effective + repulsive core, are produced by this orthogonality condition. The fea\u00ad + tures of the a:-a: scattering are clarified on the basis of the theory proposed.", + "venue": "", "year": 1969, "referenceCount": 0, "citationCount": 266, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/ptp/article-pdf/41/3/705/5367248/41-3-705.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1969-03-01", "journal": {"name": + "Progress of Theoretical Physics", "pages": "705-722", "volume": "41"}, "authors": + [{"authorId": "92573870", "name": "S. Sait\u014d"}]}, {"paperId": "d99f430ccd996e3fb2312421ae5cbc919dca0eb1", "externalIds": {"DBLP": "conf/focs/SkyumV81", "MAG": "2089857781", "DOI": - "10.1145/3149.3158", "CorpusId": 10950623}, "url": "https://www.semanticscholar.org/paper/d99f430ccd996e3fb2312421ae5cbc919dca0eb1", + "10.1145/3149.3158", "CorpusId": 10950623}, "corpusId": 10950623, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d99f430ccd996e3fb2312421ae5cbc919dca0eb1", "title": "A complexity theory based on Boolean algebra", "abstract": "A projection of a Boolean function is a function obtained by substituting for each of its variables a variable, the negation of a variable, or a constant. Reducibilities @@ -22329,52 +25428,36 @@ interactions: natural problems can be made than in previous formulations and some negative results are proved.", "venue": "22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)", "year": 1981, "referenceCount": 27, "citationCount": - 140, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1981-10-28", "journal": {"name": "22nd - Annual Symposium on Foundations of Computer Science (sfcs 1981)", "pages": - "244-253"}, "authors": [{"authorId": "2131506", "name": "Sven Skyum"}, {"authorId": - "1741124", "name": "L. Valiant"}]}, {"paperId": "8b0438883268a2f2bdddfbd1e6264fe3d9411d92", - "externalIds": {"MAG": "1997341646", "DOI": "10.1021/JP982034N", "CorpusId": - 95844464}, "url": "https://www.semanticscholar.org/paper/8b0438883268a2f2bdddfbd1e6264fe3d9411d92", - "title": "Dividing Blobs, Chemical Flowers, and Patterned Islands in a Reaction\u2212Diffusion - System", "abstract": "In an one-side-fed open spatial reactor operated with - the chlorine dioxide\u2212iodine\u2212malonic acid reaction in the presence - of polyvinyl alcohol, we systematically studied the growth dynamics of Turing - patterns after a supercritical parameter change. We describe different modes - of propagation of the patterned state in an absolutely unstable uniform state, - among which are a spot division and a finger splitting mode. We attribute - these peculiar growth modes to the existence of two different uniform states - and to a morphological instability of a propagating front linking these two - states. In regions where bistability between the Turing state and a uniform - state is obtained, the interface between the patterned state and the uniform - state can be brought to a halt and thus localized patterned states are observed.", - "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 57, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1998-10-01", "journal": {"name": "Journal of Physical Chemistry A", "pages": - "8236-8244", "volume": "102"}, "authors": [{"authorId": "47459850", "name": - "P. W. Davies"}, {"authorId": "92487367", "name": "P. Blanchedeau"}, {"authorId": - "3250971", "name": "E. Dulos"}, {"authorId": "50010680", "name": "P. Kepper"}]}, - {"paperId": "585ce48f12fbe9ca2ddf07c3807ec4ce8d6f35b1", "externalIds": {"MAG": - "2481222381", "DOI": "10.1142/9789812794055_0002", "CorpusId": 15526259}, - "url": "https://www.semanticscholar.org/paper/585ce48f12fbe9ca2ddf07c3807ec4ce8d6f35b1", + 140, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1981-10-28", "journal": + {"name": "22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)", + "pages": "244-253"}, "authors": [{"authorId": "2131506", "name": "Sven Skyum"}, + {"authorId": "1741124", "name": "L. Valiant"}]}, {"paperId": "585ce48f12fbe9ca2ddf07c3807ec4ce8d6f35b1", + "externalIds": {"MAG": "2481222381", "DOI": "10.1142/9789812794055_0002", + "CorpusId": 15526259}, "corpusId": 15526259, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/585ce48f12fbe9ca2ddf07c3807ec4ce8d6f35b1", "title": "GLOBAL PROPERTIES OF THE TURING DEGREES AND THE TURING JUMP", "abstract": "We present a summary of the lectures delivered to the Institute for Mathematical Sciences, Singapore, during the 2005 Summer School in Mathematical Logic. The lectures covered topics on the global structure of the Turing degrees D, the countability of its automorphism group, and the definability of the Turing jump within D.", "venue": "", "year": 2007, "referenceCount": 20, "citationCount": - 15, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": "2450e953e4a7f30e2ed0efb2ce7f19be07a0e19d", - "externalIds": {"MAG": "2160097635", "DBLP": "conf/cdc/CollinsS04", "DOI": - "10.1109/CDC.2004.1428598", "CorpusId": 6693052}, "url": "https://www.semanticscholar.org/paper/2450e953e4a7f30e2ed0efb2ce7f19be07a0e19d", + 15, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://math.berkeley.edu/%7Eslaman/papers/IMS_slaman.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "2867082", "name": "T. + Slaman"}]}, {"paperId": "2450e953e4a7f30e2ed0efb2ce7f19be07a0e19d", "externalIds": + {"MAG": "2160097635", "DBLP": "conf/cdc/CollinsS04", "DOI": "10.1109/CDC.2004.1428598", + "CorpusId": 6693052}, "corpusId": 6693052, "publicationVenue": {"id": "ab066af1-bfee-42da-84bb-42f7e199d0d0", + "name": "IEEE Conference on Decision and Control", "type": "conference", "alternate_names": + ["Conference on Decision and Control", "IEEE Conf Decis Control", "Conf Decis + Control", "CDC"], "url": "http://www.wikicfp.com/cfp/program?id=403"}, "url": + "https://www.semanticscholar.org/paper/2450e953e4a7f30e2ed0efb2ce7f19be07a0e19d", "title": "Observability of hybrid systems and turing machines", "abstract": "In this paper we discuss the observability of hybrid systems and turing machines. We give an elementary example to show that observability is undecidable for @@ -22383,7 +25466,8 @@ interactions: We discuss the observability of piecewise-affine hybrid systems, and give examples illustrating different observability properties.", "venue": "IEEE Conference on Decision and Control", "year": 2004, "referenceCount": 24, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": + 19, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ir.cwi.nl/pub/11003/11003D.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": @@ -22391,86 +25475,128 @@ interactions: "2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601)", "pages": "7-12 Vol.1", "volume": "1"}, "authors": [{"authorId": "11176649", "name": "Pieter Collins"}, {"authorId": "1725714", "name": "J. H. Schuppen"}]}, - {"paperId": "c08e588080fc1ffec76c43dbf96ad3af572a7211", "externalIds": {"MAG": - "2951723186", "ArXiv": "physics/0106045", "DBLP": "journals/corr/physics-0106045", - "DOI": "10.1063/1.882660", "CorpusId": 3265308}, "url": "https://www.semanticscholar.org/paper/c08e588080fc1ffec76c43dbf96ad3af572a7211", - "title": "A Continuous Model of Computation", "abstract": "A central dogma - of computer science is that the Turing\u2010machine model is the appropriate - abstraction of a digital computer. Physicists who''ve thought about the matter - also seem to favor the Turing\u2010machine model. For example, Roger Penrose - devoted some 60 pages of a book to a description of this abstract model of - computation and its implications. I argue here that physicists should consider - the real\u2010number model of computation as more appropriate and useful for - scientific computation.", "venue": "ArXiv", "year": 1999, "referenceCount": - 25, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1999-05-01", "journal": {"name": "ArXiv", "volume": "physics/0106045"}, - "authors": [{"authorId": "1682927", "name": "J. Traub"}]}, {"paperId": "b2702edbf4925cdbf6cba2b10a971ecf59f96888", + {"paperId": "5d8b055721669c6b8cd97daeab330c4f4eab8f87", "externalIds": {"MAG": + "2142375024", "DOI": "10.1023/A:1007744304422", "CorpusId": 121942766}, "corpusId": + 121942766, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d8b055721669c6b8cd97daeab330c4f4eab8f87", + "title": "La conjecture de Baum-Connes pour les feuilletages moyennables", + "abstract": null, "venue": "", "year": 1999, "referenceCount": 41, "citationCount": + 269, "influentialCitationCount": 31, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}], "publicationTypes": null, "publicationDate": "1999-07-01", + "journal": {"name": "K-theory", "pages": "215-264", "volume": "17"}, "authors": + [{"authorId": "2112280906", "name": "Jean-Louis Tu"}]}, {"paperId": "b2702edbf4925cdbf6cba2b10a971ecf59f96888", "externalIds": {"MAG": "2036341750", "DOI": "10.2298/PIM1308111D", "CorpusId": - 51829558}, "url": "https://www.semanticscholar.org/paper/b2702edbf4925cdbf6cba2b10a971ecf59f96888", + 51829558}, "corpusId": 51829558, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b2702edbf4925cdbf6cba2b10a971ecf59f96888", "title": "On Riemann and Weyl Compatible Tensors", "abstract": "We investigate semi-Riemannian manifolds satisfying some curva- ture conditions. Those conditions are strongly related to pseudosymmetry.", "venue": "", "year": 2013, "referenceCount": 43, "citationCount": 38, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Publications - De L''institut Mathematique", "pages": "111-124", "volume": "94"}, "authors": - [{"authorId": "2048392", "name": "R. Deszcz"}, {"authorId": "1405273648", - "name": "M. Glogowska"}, {"authorId": "2086515689", "name": "Jan Je\u0142owicki"}, - {"authorId": "1405273586", "name": "M. Petrovi\u0107-Torgas\u0306ev"}, {"authorId": - "2746281", "name": "G. Zafindratafa"}]}, {"paperId": "8edb52262478e3d0c0b46e4db75bb8b36fe96c7f", - "externalIds": {"MAG": "182486616", "DBLP": "conf/aaai/Schubert06", "CorpusId": - 6325617}, "url": "https://www.semanticscholar.org/paper/8edb52262478e3d0c0b46e4db75bb8b36fe96c7f", - "title": "Turing''s Dream and the Knowledge Challenge", "abstract": "There - is a set of clear-cut challenges, all centering around knowledge, that have - received insufficient attention in AI, and whose solution could bring the - realization of Turing''s dream - the dream of a machine we can talk with just - like a person, and which is therefore (at least) our intellectual equal. These - challenges have to do with the representation of linguistically expressible - knowledge, the role of knowledge in language understanding, the use of knowledge - for several sorts of commonsense reasoning, and knowledge accumulation. Concerning - the last topic, I briefly present preliminary results of some of our recent - efforts to extract \"shallow\" general knowledge about the world from large - text corpora.", "venue": "AAAI", "year": 2006, "referenceCount": 32, "citationCount": - 28, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2006-07-16", - "journal": {"pages": "1534-1538"}, "authors": [{"authorId": "2404386", "name": - "Lenhart K. Schubert"}]}, {"paperId": "049c9370d8d8d8ffe31c84f4cf9224a946427b37", - "externalIds": {"MAG": "2118322961", "DOI": "10.1112/S0024610700001459", "CorpusId": - 8740953}, "url": "https://www.semanticscholar.org/paper/049c9370d8d8d8ffe31c84f4cf9224a946427b37", - "title": "Every Set has a Least Jump Enumeration", "abstract": "Given a computably - enumerable set W, there is a Turing degree which is the least jump of any - set in which W is computably enumerable, namely 0\u2032. Remarkably, this - is not a phenomenon of computably enumerable sets. It is shown that for every - subset A of N, there is a Turing degree, c\u2032\u03bc(A), which is the least - degree of the jumps of all sets X for which A is \u221110(X) . In addition - this result provides an isomorphism invariant method for assigning Turing - degrees to certain torsion\u2010free abelian groups.", "venue": "", "year": - 2000, "referenceCount": 10, "citationCount": 27, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-12-01", "journal": {"name": - "Journal of the London Mathematical Society", "volume": "62"}, "authors": - [{"authorId": "47223989", "name": "R. Coles"}, {"authorId": "2134049919", - "name": "R. Downey"}, {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": - "5d8b055721669c6b8cd97daeab330c4f4eab8f87", "externalIds": {"MAG": "2142375024", - "DOI": "10.1023/A:1007744304422", "CorpusId": 121942766}, "url": "https://www.semanticscholar.org/paper/5d8b055721669c6b8cd97daeab330c4f4eab8f87", - "title": "La conjecture de Baum-Connes pour les feuilletages moyennables", - "abstract": null, "venue": "", "year": 1999, "referenceCount": 41, "citationCount": - 268, "influentialCitationCount": 31, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}], "publicationTypes": null, "publicationDate": "1999-07-01", "journal": - {"name": "K-theory", "pages": "215-264", "volume": "17"}, "authors": [{"authorId": - "2112280906", "name": "Jean-Louis Tu"}]}, {"paperId": "42414b70fc61def8adcf5c159604c72e4508e9c1", - "externalIds": {"MAG": "2032374895", "DBLP": "conf/sigmod/LiJ14", "DOI": "10.1145/2588555.2594519", - "CorpusId": 16356678}, "url": "https://www.semanticscholar.org/paper/42414b70fc61def8adcf5c159604c72e4508e9c1", + "openAccessPdf": {"url": "http://www.doiserbia.nb.rs/ft.aspx?id=0350-13021308111D", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "Publications De L''institut Mathematique", "pages": "111-124", "volume": + "94"}, "authors": [{"authorId": "2048392", "name": "R. Deszcz"}, {"authorId": + "1405273648", "name": "M. Glogowska"}, {"authorId": "2086515689", "name": + "Jan Je\u0142owicki"}, {"authorId": "1405273586", "name": "M. Petrovi\u0107-Torgas\u0306ev"}, + {"authorId": "2746281", "name": "G. Zafindratafa"}]}, {"paperId": "d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", + "externalIds": {"MAG": "2016568588", "DOI": "10.1103/PHYSREVE.90.062915", + "CorpusId": 42727592, "PubMed": "25615172"}, "corpusId": 42727592, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", + "title": "Turing pattern dynamics in an activator-inhibitor system with superdiffusion.", + "abstract": "The fractional operator is introduced to an activator-inhibitor + system to describe species anomalous superdiffusion. The effects of the superdiffusive + exponent on pattern formation and pattern selection are studied. Our linear + stability analysis shows that the wave number of the Turing pattern increases + with the superdiffusive exponent. A weakly nonlinear analysis yields a system + of amplitude equations and the analysis of these amplitude equations predicts + parameter regimes where hexagons, stripes, and their coexistence are expected. + Numerical simulations of the activator-inhibitor model near the stability + boundaries confirm our analytical results. Since diffusion rate manifests + in both diffusion constant and diffusion exponent, we numerically explore + their interactions on the emergence of Turing patterns. When the activator + and inhibitor have different superdiffusive exponents, we find that the critical + ratio of the diffusion rate of the inhibitor to the activator, required for + the formation of the Turing pattern, increases monotonically with the superdiffusive + exponent. We conclude that small ratio (than unity) of anomalous diffusion + exponent between the inhibitor and activator is more likely to promote the + emergence of the Turing pattern, relative to the normal diffusion.", "venue": + "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": + 2014, "referenceCount": 47, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-12-19", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 062915\n ", "volume": + "90 6"}, "authors": [{"authorId": "2037744526", "name": "Lai Zhang"}, {"authorId": + "1990780", "name": "Canrong Tian"}]}, {"paperId": "c70cd87b7b4c0b68c81cb71999eba87c18d80df8", + "externalIds": {"DBLP": "conf/stoc/MaassSS87", "MAG": "1981197081", "DOI": + "10.1145/28395.28406", "CorpusId": 16374195}, "corpusId": 16374195, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/c70cd87b7b4c0b68c81cb71999eba87c18d80df8", + "title": "Two tapes are better than one for off-line Turing machines", "abstract": + "We prove the first superlinear lower bound for a concrete decision problem + in P on a Turing machine with one work tape and a two-way input tape (also + called: off-line 1-tape Turing machine). In particular we show for off-line + Turing machines that 2 tapes are better than 1 and that 3 pushdown stores + are better than 2 (both in the deterministic and in the nondeterministic case).", + "venue": "Symposium on the Theory of Computing", "year": 1987, "referenceCount": + 13, "citationCount": 22, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.igi.tugraz.at/maass/psfiles/33.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Book", "Conference"], "publicationDate": "1987-01-01", "journal": {"name": + "Proceedings of the nineteenth annual ACM symposium on Theory of computing"}, + "authors": [{"authorId": "145247053", "name": "W. Maass"}, {"authorId": "1809682", + "name": "G. Schnitger"}, {"authorId": "1723843", "name": "E. Szemer\u00e9di"}]}, + {"paperId": "8dee5a2a843e1c3bce36c93f523b85a01395e4d1", "externalIds": {"DBLP": + "conf/stoc/Savitch69", "MAG": "2014357220", "DOI": "10.1145/800169.805439", + "CorpusId": 20356778}, "corpusId": 20356778, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/8dee5a2a843e1c3bce36c93f523b85a01395e4d1", + "title": "Deterministic simulation of non-deterministic turing machines (Detailed + Abstract)", "abstract": "Computations of non-deterministic Turing machines + are shown to correspond to \u201csolving\u201d certain mazes. The storage + needed to \u201csolve\u201d mazes is related to the storage needed to deterministically + simulate non-deterministic Turing machines. In particular, it is shown that + a non-deterministic L(n)-tape bounded Turing machine can be simulated by an + (L(n))2-tape bounded Turing machine, provided L(n)\u2265log2n.", "venue": + "Symposium on the Theory of Computing", "year": 1969, "referenceCount": 2, + "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": + "1969-05-05", "journal": {"name": "Proceedings of the first annual ACM symposium + on Theory of computing"}, "authors": [{"authorId": "2859514", "name": "W. + Savitch"}]}, {"paperId": "af86eda1e2fb70e1320b0d4f2651ecc8d5c28de3", "externalIds": + {"MAG": "2159989667", "DOI": "10.1006/ICAR.1996.5583", "CorpusId": 17693544}, + "corpusId": 17693544, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/af86eda1e2fb70e1320b0d4f2651ecc8d5c28de3", + "title": "Effects of Hyperfine Particles on Reflectance Spectra from 0.3 to + 25 \u03bcm", "abstract": "Fine grained particles ,50 mm in size dominate particle + size changes in the volume scattering region, the Christiansen feadistributions + of many planetary surfaces. Despite the predomi- ture, restrahlen bands, and + transparency features. The quartz nance of fine particles in planetary regoliths, + there have been particle size series were less well modeled, with the greatest + few investigations of the systematic effects of the finest particles discrepancies + in the restrahlen bands and the overall spectral on reflectance spectra, and + on the ability of quantitative models contrast. \u00a9 1997 Academic Press + to extract compositional and/or textural information from remote observations. + The effects of fine particles that are approximately the same size as the + wavelength of light on reflectance", "venue": "", "year": 1997, "referenceCount": + 39, "citationCount": 262, "influentialCitationCount": 20, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Icarus", + "pages": "145-163", "volume": "125"}, "authors": [{"authorId": "33488956", + "name": "J. Mustard"}, {"authorId": "92643071", "name": "J. Hays"}]}, {"paperId": + "42414b70fc61def8adcf5c159604c72e4508e9c1", "externalIds": {"MAG": "2032374895", + "DBLP": "conf/sigmod/LiJ14", "DOI": "10.1145/2588555.2594519", "CorpusId": + 16356678}, "corpusId": 16356678, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42414b70fc61def8adcf5c159604c72e4508e9c1", "title": "NaLIR: an interactive natural language interface for querying relational databases", "abstract": "In this demo, we present NaLIR, a generic interactive natural language interface for querying relational databases. NaLIR can accept @@ -22482,16 +25608,45 @@ interactions: handle even quite complex queries in a variety of application domains. In addition, we also demonstrate how carefully designed interactive communication can avoid misinterpretation with minimum user burden.", "venue": "SIGMOD Conference", - "year": 2014, "referenceCount": 12, "citationCount": 129, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", - "Conference"], "publicationDate": "2014-06-18", "journal": {"name": "Proceedings - of the 2014 ACM SIGMOD International Conference on Management of Data"}, "authors": - [{"authorId": "2115373983", "name": "Fei Li"}, {"authorId": "145531067", "name": - "H. Jagadish"}]}, {"paperId": "db39e8e938abb5234ebf36c413022ab839ed2e40", + "year": 2014, "referenceCount": 12, "citationCount": 130, "influentialCitationCount": + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": + "2014-06-18", "journal": {"name": "Proceedings of the 2014 ACM SIGMOD International + Conference on Management of Data"}, "authors": [{"authorId": "2115373983", + "name": "Fei Li"}, {"authorId": "145531067", "name": "H. Jagadish"}]}, {"paperId": + "da5b21c0b1f0809fba2e772705b79edeac9ac015", "externalIds": {"MAG": "2135316487", + "DBLP": "conf/icalp/LagoM09", "ArXiv": "1208.0515", "DOI": "10.2168/LMCS-8(3:12)2012", + "CorpusId": 6483969}, "corpusId": 6483969, "publicationVenue": {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", + "name": "International Colloquium on Automata, Languages and Programming", + "type": "conference", "alternate_names": ["Int Conf Arab Lang Process", "International + Conference on Arabic Language Processing", "Int Colloq Autom Lang Program", + "ICALP"], "url": "http://www.eatcs.org/"}, "url": "https://www.semanticscholar.org/paper/da5b21c0b1f0809fba2e772705b79edeac9ac015", + "title": "On Constructor Rewrite Systems and the Lambda-Calculus", "abstract": + "We prove that orthogonal constructor term rewrite systems and lambda-calculus + with weak (i.e., no reduction is allowed under the scope of a lambda-abstraction) + call-by-value reduction can simulate each other with a linear overhead. In + particular, weak call-by-value beta-reduction can be simulated by an orthogonal + constructor term rewrite system in the same number of reduction steps. Conversely, + each reduction in a term rewrite system can be simulated by a constant number + of beta-reduction steps. This is relevant to implicit computational complexity, + because the number of beta steps to normal form is polynomially related to + the actual cost (that is, as performed on a Turing machine) of normalization, + under weak call-by-value reduction. Orthogonal constructor term rewrite systems + and lambda-calculus are thus both polynomially related to Turing machines, + taking as notion of cost their natural parameters.", "venue": "International + Colloquium on Automata, Languages and Programming", "year": 2009, "referenceCount": + 34, "citationCount": 59, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://lmcs.episciences.org/1213/pdf", "status": + "GOLD"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2009-04-27", "journal": {"name": "ArXiv", "volume": "abs/0904.4120"}, + "authors": [{"authorId": "9127840", "name": "Ugo Dal Lago"}, {"authorId": + "34997688", "name": "S. Martini"}]}, {"paperId": "db39e8e938abb5234ebf36c413022ab839ed2e40", "externalIds": {"MAG": "2069883806", "DOI": "10.3354/MEPS329099", "CorpusId": - 54003007}, "url": "https://www.semanticscholar.org/paper/db39e8e938abb5234ebf36c413022ab839ed2e40", + 54003007}, "corpusId": 54003007, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/db39e8e938abb5234ebf36c413022ab839ed2e40", "title": "Predicting the distribution of the scyphomedusa Chrysaora quinquecirrha in Chesapeake Bay", "abstract": "Jellyfish blooms are important events controlling plankton dynamics in coastal waters worldwide, yet factors that influence @@ -22513,159 +25668,21 @@ interactions: in order to better understand how this top predator varies in space and time, and how this species could potentially affect energy flow through the Chesapeake Bay system.", "venue": "", "year": 2007, "referenceCount": 41, "citationCount": - 103, "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2007-01-11", "journal": {"name": "Marine Ecology - Progress Series", "pages": "99-113", "volume": "329"}, "authors": [{"authorId": - "46528674", "name": "M. B. Decker"}, {"authorId": "2111161962", "name": "C. - Brown"}, {"authorId": "3833276", "name": "R. Hood"}, {"authorId": "31411980", - "name": "J. Purcell"}, {"authorId": "11725370", "name": "T. Gross"}, {"authorId": - "88256237", "name": "J. C. Matanoski"}, {"authorId": "12498554", "name": "R. - O. Bannon"}, {"authorId": "1403128332", "name": "E. Setzler-Hamilton"}]}, - {"paperId": "483e37cfefe4772633dbb5d26a2392128dedca6e", "externalIds": {"MAG": - "2163806694", "DOI": "10.1103/PHYSREVE.70.046219", "CorpusId": 30201869, "PubMed": - "15600507"}, "url": "https://www.semanticscholar.org/paper/483e37cfefe4772633dbb5d26a2392128dedca6e", - "title": "Turing pattern formation in a two-layer system: superposition and - superlattice patterns.", "abstract": "Turing patterns in the chlorine dioxide-iodine-malonic - acid reaction are studied in a system consisting of two coupled gel layers. - Patterns with two wavelengths are observed. Changing the strength of the interlayer - coupling causes a transition between a superposition of Turing patterns and - a superlattice pattern. The effects of the reactant concentrations on the - pattern wavelengths are delineated.", "venue": "Physical review. E, Statistical, - nonlinear, and soft matter physics", "year": 2004, "referenceCount": 0, "citationCount": - 25, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-10-01", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 046219\n ", - "volume": "70 4 Pt 2"}, "authors": [{"authorId": "6742967", "name": "I. Berenstein"}, - {"authorId": "4978913", "name": "M. Dolnik"}, {"authorId": "2586119", "name": - "L. Yang"}, {"authorId": "3012371", "name": "A. Zhabotinsky"}, {"authorId": - "144854275", "name": "I. Epstein"}]}, {"paperId": "76d86bb6d931c69045b5a41a949e102ce46c0803", - "externalIds": {"MAG": "2084394121", "DOI": "10.1103/PHYSREVE.78.026116", - "CorpusId": 34730328, "PubMed": "18850906"}, "url": "https://www.semanticscholar.org/paper/76d86bb6d931c69045b5a41a949e102ce46c0803", - "title": "Turing instability in reaction-subdiffusion systems.", "abstract": - "We determine the conditions for the occurrence of Turing instabilities in - activator-inhibitor systems, where one component undergoes subdiffusion and - the other normal diffusion. If the subdiffusing species has a nonlinear death - rate, then coupling between the nonlinear kinetics and the memory effects - of the non-Markovian transport process advances the Turing instability if - the inhibitor subdiffuses and delays the Turing instability if the activator - subdiffuses. We apply the results of our analysis to the Schnakenberg model, - the Gray-Scott model, the Oregonator model of the Belousov-Zhabotinsky reaction, - and the Lengyel-Epstein model of the chlorine dioxide-iodine-malonic acid - reaction.", "venue": "Physical review. E, Statistical, nonlinear, and soft - matter physics", "year": 2008, "referenceCount": 29, "citationCount": 24, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-08-21", "journal": {"name": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "pages": "\n 026116\n ", "volume": - "78 2 Pt 2"}, "authors": [{"authorId": "152597231", "name": "A. Yadav"}, {"authorId": - "13858806", "name": "Shane M Milu"}, {"authorId": "3041313", "name": "W. Horsthemke"}]}, - {"paperId": "925dde3e6d24559e68b725fbb180758c39601581", "externalIds": {"MAG": - "1992153901", "DOI": "10.1103/PHYSREVLETT.81.81", "CorpusId": 120972158}, - "url": "https://www.semanticscholar.org/paper/925dde3e6d24559e68b725fbb180758c39601581", - "title": "THREE-DIMENSIONAL TURING STRUCTURES AND SPATIAL SOLITONS IN OPTICAL - PARAMETRIC OSCILLATORS", "abstract": "An order parameter equation is derived - for degenerate optical parametric oscillators in the form of a three-dimensional - Swift-Hohenberg equation. Three-dimensional Turing structures (lamellae and - tetrahedral patterns) and three-dimensional spatial solitons (dark spherical - bubbles) are predicted as stable structures.", "venue": "", "year": 1998, - "referenceCount": 0, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-07-06", "journal": {"name": - "Physical Review Letters", "pages": "81-84", "volume": "81"}, "authors": [{"authorId": - "2640938", "name": "K. Stali\u016bnas"}]}, {"paperId": "b3d673cbb71101e60563efab8509fc57634748ec", - "externalIds": {"MAG": "2028323972", "DOI": "10.1063/1.165893", "CorpusId": - 38080987, "PubMed": "12780000"}, "url": "https://www.semanticscholar.org/paper/b3d673cbb71101e60563efab8509fc57634748ec", - "title": "Pattern formation in an N+Q component reaction-diffusion system.", - "abstract": "A general N+Q component reaction-diffusion system is analyzed - with regard to pattern forming instabilities (Turing bifurcations). The system - consists of N mobile species and Q immobile species. The Q immobile species - form in response to reactions between the N mobile species and an immobile - substrate and allow the Turing instability to occur. These results are valid - both for bifurcations from a spatially uniform state and for systems with - an externally imposed gradient as in the experimental systems in which Turing - patterns have been observed. It is shown that the critical wave number and - the location of the instability in parameter space are independent of the - substrate concentration. It is also found that the system necessarily undergoes - a Hopf bifurcation as the total substrate concentration is decreased. Further, - in the case that all the mobile species diffuse at identical rates we show - that if the full system is at a point of Turing bifurcation then the N component - mobile subsystem is at transition from an unstable focus to an unstable node, - and the critical wave number is simply related to the degenerate positive - eigenvalue of the mobile subsystem. A sequence of bifurcations that occur - in the eigenspectra as the total substrate concentration is decreased to zero - is also discussed.", "venue": "Chaos", "year": 1992, "referenceCount": 20, - "citationCount": 37, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1992-10-01", "journal": {"name": "Chaos", "pages": "\n 513-524\n ", - "volume": "2 4"}, "authors": [{"authorId": "78612126", "name": "J. Pearson"}, - {"authorId": "48709667", "name": "W. Bruno"}]}, {"paperId": "167ff88fbcad256710c2bbee906c33f2bb420310", - "externalIds": {"MAG": "1998084650", "DBLP": "conf/stoc/StockmeyerM73", "DOI": - "10.1145/800125.804029", "CorpusId": 13876459}, "url": "https://www.semanticscholar.org/paper/167ff88fbcad256710c2bbee906c33f2bb420310", - "title": "Word problems requiring exponential time(Preliminary Report)", "abstract": - "The equivalence problem for Kleene''s regular expressions has several effective - solutions, all of which are computationally inefficient. In [1], we showed - that this inefficiency is an inherent property of the problem by showing that - the problem of membership in any arbitrary context-sensitive language was - easily reducible to the equivalence problem for regular expressions. We also - showed that with a squaring abbreviation ( writing (E)2 for E\u00d7E) the - equivalence problem for expressions required computing space exponential in - the size of the expressions. In this paper we consider a number of similar - decidable word problems from automata theory and logic whose inherent computational - complexity can be precisely characterized in terms of time or space requirements - on deterministic or nondeterministic Turing machines. The definitions of the - word problems and a table summarizing their complexity appears in the next - section. More detailed comments and an outline of some of the proofs follows - in the remaining sections. Complete proofs will appear in the forthcoming - papers [9, 10, 13]. In the final section we describe some open problems.", - "venue": "Symposium on the Theory of Computing", "year": 1973, "referenceCount": - 16, "citationCount": 832, "influentialCitationCount": 67, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": - "1973-04-30", "journal": {"name": "Proceedings of the fifth annual ACM symposium - on Theory of computing"}, "authors": [{"authorId": "1678332", "name": "L. - Stockmeyer"}, {"authorId": "39792203", "name": "A. Meyer"}]}, {"paperId": - "1ee641b0aa9f6ba78f6d56a3e103e14ebf8c838c", "externalIds": {"DBLP": "series/aikp/BoschettiG08", - "MAG": "1498537883", "DOI": "10.1007/978-1-4471-5113-5_15", "CorpusId": 53889303}, - "url": "https://www.semanticscholar.org/paper/1ee641b0aa9f6ba78f6d56a3e103e14ebf8c838c", - "title": "A Turing Test for Emergence", "abstract": null, "venue": "Advances - in Applied Self-organizing Systems", "year": 2008, "referenceCount": 55, "citationCount": - 24, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"pages": "349-364"}, - "authors": [{"authorId": "1928446", "name": "F. Boschetti"}, {"authorId": - "2069553115", "name": "Randall Gray"}]}, {"paperId": "7df575c1e9325cbb0f137ee0a5a3094ccff81dc0", - "externalIds": {"MAG": "2337946189", "DOI": "10.1145/1057947.1057949", "CorpusId": - 14003257}, "url": "https://www.semanticscholar.org/paper/7df575c1e9325cbb0f137ee0a5a3094ccff81dc0", - "title": "Numerical Turing", "abstract": "Numerical Turing is an extension - of the Turing programming language. Turing is a Pascal-like language (with - convenient string handling, dynamic arrays, modules and more general parameter - lists) developed at the University of Toronto [4]. Turing has been in use - since May, 1983, and is now available on several machines.", "venue": "SGNM", - "year": 1985, "referenceCount": 23, "citationCount": 14, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1985-07-01", "journal": {"name": "ACM Signum Newsletter", "pages": "26", - "volume": "20"}, "authors": [{"authorId": "145984515", "name": "T. E. Hull"}, - {"authorId": "2598619", "name": "A. Abrham"}, {"authorId": "2111364005", "name": - "M. S. Cohen"}, {"authorId": "1409937352", "name": "A. F. X."}, {"authorId": - "1383095992", "name": "C. Hall"}, {"authorId": "38269500", "name": "D. A. - Penny"}, {"authorId": "2070056518", "name": "J. M"}]}, {"paperId": "c5be8677479d89ac485833648f1c441d58482768", + 104, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.int-res.com/articles/meps2007/329/m329p099.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2007-01-11", + "journal": {"name": "Marine Ecology Progress Series", "pages": "99-113", "volume": + "329"}, "authors": [{"authorId": "46528674", "name": "M. B. Decker"}, {"authorId": + "2111161962", "name": "C. Brown"}, {"authorId": "3833276", "name": "R. Hood"}, + {"authorId": "31411980", "name": "J. Purcell"}, {"authorId": "11725370", "name": + "T. Gross"}, {"authorId": "88256237", "name": "J. C. Matanoski"}, {"authorId": + "12498554", "name": "R. O. Bannon"}, {"authorId": "1403128332", "name": "E. + Setzler-Hamilton"}]}, {"paperId": "c5be8677479d89ac485833648f1c441d58482768", "externalIds": {"MAG": "2138551966", "DOI": "10.1080/00220671.1995.9941309", - "CorpusId": 145072316}, "url": "https://www.semanticscholar.org/paper/c5be8677479d89ac485833648f1c441d58482768", + "CorpusId": 145072316}, "corpusId": 145072316, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c5be8677479d89ac485833648f1c441d58482768", "title": "Advances in research on instruction.", "abstract": "A major area of research, one with important impli cations for teaching, has been the research on cognitive processing, research on how information is stored and retrieved. @@ -22677,119 +25694,229 @@ interactions: and richness of the relationships are all im portant for processing information and solving prob lems. It is easier to assimilate new information and it is easier", "venue": "", "year": 1995, "referenceCount": 15, "citationCount": - 260, "influentialCitationCount": 25, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1995-05-01", "journal": {"name": "Journal of Educational - Research", "pages": "262-268", "volume": "88"}, "authors": [{"authorId": "69018495", - "name": "B. Rosenshine"}]}, {"paperId": "7f5cad93da4407db724c519b194ef23d89f6310c", - "externalIds": {"MAG": "1967342602", "DOI": "10.1007/S002850100105", "CorpusId": - 6149086, "PubMed": "11767205"}, "url": "https://www.semanticscholar.org/paper/7f5cad93da4407db724c519b194ef23d89f6310c", - "title": "Pattern formation in discrete cell lattices", "abstract": null, - "venue": "Journal of Mathematical Biology", "year": 2001, "referenceCount": - 0, "citationCount": 75, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2001-11-01", "journal": {"name": "Journal - of Mathematical Biology", "pages": "411-445", "volume": "43"}, "authors": - [{"authorId": "2750362", "name": "E. Plahte"}]}, {"paperId": "71a494eac8189146424ea75c6b6e52ee542bbff4", - "externalIds": {"MAG": "1964116027", "DOI": "10.1063/1.482006", "CorpusId": - 93035935}, "url": "https://www.semanticscholar.org/paper/71a494eac8189146424ea75c6b6e52ee542bbff4", - "title": "Turing patterns in a self-replicating mechanism with a self-complementary - template", "abstract": "A variety of nonlinear chemical models, such as the - Selkov\u2013Schnakenberg, exhibit Turing patterns. The Templator, which is - based on a minimal autocatalytic monomer\u2013dimer system, is a newer two-variable - model also able to show Turing patterns. Here we find that the dynamic behavior - of the Templator is quite similar to other models with cubic nonlinearities. - This is demonstrated through a series of computer simulations in two dimensions - utilizing the cellular automata approach. The selection of parameter values - is based on linear stability analysis, which provides a relatively simple - method of predicting Turing pattern formation. The simulations reveal spot, - labyrinth, and striped patterns, in agreement with the predictions of the - analysis. Other behaviors, such as honeycomb patterns, are also observed. - For some parameter values, we study transient spot replication. Our findings - strongly suggest that the Templator may belong to the same class of models - previously studied by Pearson.", "venue": "", "year": 2000, "referenceCount": - 28, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + 261, "influentialCitationCount": 25, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1995-05-01", "journal": {"name": + "Journal of Educational Research", "pages": "262-268", "volume": "88"}, "authors": + [{"authorId": "69018495", "name": "B. Rosenshine"}]}, {"paperId": "3b65a3424e9ceb2df7318a43fd23ad3ce7b044d4", + "externalIds": {"MAG": "2142033633", "DOI": "10.3938/JKPS.50.234", "CorpusId": + 34700894}, "corpusId": 34700894, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3b65a3424e9ceb2df7318a43fd23ad3ce7b044d4", + "title": "Oscillatory Turing Patterns in a Simple Reaction-Diffusion System", + "abstract": "Turing suggested that, under certain conditions, chemicals can + react and diffuse in such a way as to produce steady-state inhomogeneous spatial + patterns of chemical concentrations. We consider a simple two-variable reaction-diffusion + system and find there is a spatio-temporally oscillating solution (STOS) in + parameter regions where linear analysis predicts a pure Turing instability + and no Hopf instability. We compute the boundary of the STOS and spatially + non-uniform solution (SSNS) regions and investigate what features control + its behavior.", "venue": "", "year": 2007, "referenceCount": 20, "citationCount": + 29, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ora.ox.ac.uk/objects/uuid:2ffe9d6b-1d3c-4859-a323-4898715d023d/download_file?safe_filename=225.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2007-01-15", "journal": {"name": + "Journal of the Korean Physical Society", "pages": "234", "volume": "50"}, + "authors": [{"authorId": "50268394", "name": "R. Liu"}, {"authorId": "32582426", + "name": "S. Liaw"}, {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": + "3d4e24139687eee1d97f09a874d515b1827a4af2", "externalIds": {"DBLP": "journals/cacm/TanWA05", + "MAG": "2088514722", "DOI": "10.1145/1060710.1060737", "CorpusId": 2123776}, + "corpusId": 2123776, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d4e24139687eee1d97f09a874d515b1827a4af2", + "title": "Health care and services delivery systems as complex adaptive systems", + "abstract": "Alan Turing and John von Neumann pioneered the study of complex + systems. In analyzing feedback processes, they were interested in how complex + interacting systems can respond to new information. Among other things, they + found that some systems with many interactions among highly differentiated + parts can produce surprisingly simple, predictable behavior (such as a programmable + mechanical routine or process), while others generate behavior that may be + impossible to predict, even though these systems feature simple laws and few + actors or agents (such as an evolving living organism).", "venue": "CACM", + "year": 2005, "referenceCount": 12, "citationCount": 133, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-05-01", "journal": {"name": "Commun. + ACM", "pages": "36-44", "volume": "48"}, "authors": [{"authorId": "143712972", + "name": "Joseph K. Tan"}, {"authorId": "1699952", "name": "H. Wen"}, {"authorId": + "2208719", "name": "N. Awad"}]}, {"paperId": "f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", + "externalIds": {"MAG": "1882313281", "DOI": "10.1075/aicr.34.04har", "CorpusId": + 143324564}, "corpusId": 143324564, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", + "title": "Turing Indistinguishability and the Blind Watchmaker", "abstract": + "Many special problems crop up when evolutionary theory turns, quite naturally, + to the question of the adaptive value and causal role of consciousness in + human and nonhuman organisms. One problem is that -- unless we are to be dualists, + treating it as an independent nonphysical force -- consciousness could not + have had an independent adaptive function of its own, over and above whatever + behavioral and physiological functions it \"supervenes\" on, because evolution + is completely blind to the difference between a conscious organism and a functionally + equivalent (Turing Indistinguishable) nonconscious \"Zombie\" organism: In + other words, the Blind Watchmaker, a functionalist if ever there was one, + is no more a mind reader than we are. Hence Turing-Indistinguishability = + Darwin-Indistinguishability. It by no means follows from this, however, that + human behavior is therefore to be explained only by the push-pull dynamics + of Zombie determinism, as dictated by calculations of \"inclusive fitness\" + and \"evolutionarily stable strategies.\" We are conscious, and, more important, + that consciousness is piggy-backing somehow on the vast complex of unobservable + internal activity -- call it \"cognition\" -- that is really responsible for + generating all of our behavioral capacities. Hence, except in the palpable + presence of the irrational (e.g., our sexual urges) where distal Darwinian + factors still have some proximal sway, it is as sensible to seek a Darwinian + rather than a cognitive explanation for most of our current behavior as it + is to seek a cosmological rather than an engineering explanation of an automobile''s + behavior. Let evolutionary theory explain what shaped our cognitive capacity + (Steklis & Harnad 1976; Harnad 1996, but let cognitive theory explain our + resulting behavior.", "venue": "", "year": 2002, "referenceCount": 34, "citationCount": + 29, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2002-04-08", "journal": {"name": "", "pages": "3-18", + "volume": ""}, "authors": [{"authorId": "2293327", "name": "S. Harnad"}]}, + {"paperId": "9a0cd57ced7485195ece85dc10bd384b1f5f1d90", "externalIds": {"MAG": + "2067983825", "DOI": "10.2307/1940243", "CorpusId": 85118454}, "corpusId": + 85118454, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a0cd57ced7485195ece85dc10bd384b1f5f1d90", + "title": "Estimation of Recruitment from Immigration Versus In Situ Reproduction + Using Pollock''s Robust Design", "abstract": "Recruitment to animal populations + can occur through both immigration and in situ reproduction. These two components + of recruitment are conceptually distinct and lead to different mechanistic + models of population dynamics. We describe a capture- recapture design that + can be used to obtain separate estimates of these two recruitment components. + We then illustrate the use of our method and estimators with capture-recap- + ture data from a population of Microtus pennsylvanicus at the Patuxent Wildlife + Research Center in Maryland.", "venue": "", "year": 1990, "referenceCount": + 16, "citationCount": 88, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1990-02-01", + "journal": {"name": "Ecology", "pages": "21-26", "volume": "71"}, "authors": + [{"authorId": "1928752", "name": "J. Nichols"}, {"authorId": "3781563", "name": + "K. Pollock"}]}, {"paperId": "354aded6443eff3468bbfeac81d3b5c3f7bcbf45", "externalIds": + {"MAG": "2149003114", "DOI": "10.1002/anie.200802325", "CorpusId": 746400, + "PubMed": "18752242"}, "corpusId": 746400, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/354aded6443eff3468bbfeac81d3b5c3f7bcbf45", + "title": "Trimodular engineering of linear supramolecular miniatures on Ag(111) + surfaces controlled by complementary triple hydrogen bonds.", "abstract": + "Thespecificity, directionality, dynamics, and complementarity ofsuchinteractionscanallowforthedesignofalargelibraryoforganic + modules bearing H-bond donor (D) and/or acceptor(A) moieties with specific + programmed functions and struc-tures that could ultimately lead to the construction + of manydesired functional assemblies. So far, this method has beensuccessfullyemployedonsolidsurfacesforthepreparationofextendedone-", + "venue": "Angewandte Chemie", "year": 2008, "referenceCount": 33, "citationCount": + 69, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://pure.rug.nl/ws/files/2763725/2008AngewChemIntEdLlanesPallasSupp.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2008-09-22", "journal": + {"name": "Angewandte Chemie", "pages": "\n 7726-30\n ", "volume": + "47 40"}, "authors": [{"authorId": "1399263035", "name": "Anna Llanes-Pall\u00e1s"}, + {"authorId": "8321881", "name": "M. Matena"}, {"authorId": "32750622", "name": + "T. Jung"}, {"authorId": "145439685", "name": "M. Prato"}, {"authorId": "16654729", + "name": "M. St\u00f6hr"}, {"authorId": "9997913", "name": "D. Bonifazi"}]}, + {"paperId": "35b74d763e74b0ec7e29f3f106e9402bc6ccc5ea", "externalIds": {"MAG": + "2168723754", "DBLP": "journals/tc/Yamada62a", "DOI": "10.1109/TEC.1962.5219459", + "CorpusId": 46179502}, "corpusId": 46179502, "publicationVenue": {"id": "82773eef-76e4-4cdf-8492-5694856ea2dc", + "name": "IRE Transactions on Electronic Computers", "type": "journal", "alternate_names": + ["IRE Trans Electron Comput", "Ire Trans Electron Comput", "Ire Transactions + on Electronic Computers"], "issn": "0367-9950", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=5407885"}, + "url": "https://www.semanticscholar.org/paper/35b74d763e74b0ec7e29f3f106e9402bc6ccc5ea", + "title": "Real-Time Computation and Recursive Functions Not Real-Time Computable", + "abstract": "As an attempt to investigate a general theory of real-time computability + in digital computers, a subclass of Turing machines is formally introduced + together with some classes of functions that are computable by them in real + time. Then the existence is established of a class of recursive functions + that are not computable in real time by use of a class of machines, no matter + how general we make the machines subject to a given constraint.", "venue": + "IRE Transactions on Electronic Computers", "year": 1962, "referenceCount": + 3, "citationCount": 90, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1962-12-01", "journal": {"name": "IRE Trans. Electron. + Comput.", "pages": "753-760", "volume": "11"}, "authors": [{"authorId": "93475256", + "name": "H. Yamada"}]}, {"paperId": "b3d673cbb71101e60563efab8509fc57634748ec", + "externalIds": {"MAG": "2028323972", "DOI": "10.1063/1.165893", "CorpusId": + 38080987, "PubMed": "12780000"}, "corpusId": 38080987, "publicationVenue": + {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", "name": "Chaos", "type": "journal", + "issn": "1054-1500", "url": "http://chaos.aip.org/", "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, + "url": "https://www.semanticscholar.org/paper/b3d673cbb71101e60563efab8509fc57634748ec", + "title": "Pattern formation in an N+Q component reaction-diffusion system.", + "abstract": "A general N+Q component reaction-diffusion system is analyzed + with regard to pattern forming instabilities (Turing bifurcations). The system + consists of N mobile species and Q immobile species. The Q immobile species + form in response to reactions between the N mobile species and an immobile + substrate and allow the Turing instability to occur. These results are valid + both for bifurcations from a spatially uniform state and for systems with + an externally imposed gradient as in the experimental systems in which Turing + patterns have been observed. It is shown that the critical wave number and + the location of the instability in parameter space are independent of the + substrate concentration. It is also found that the system necessarily undergoes + a Hopf bifurcation as the total substrate concentration is decreased. Further, + in the case that all the mobile species diffuse at identical rates we show + that if the full system is at a point of Turing bifurcation then the N component + mobile subsystem is at transition from an unstable focus to an unstable node, + and the critical wave number is simply related to the degenerate positive + eigenvalue of the mobile subsystem. A sequence of bifurcations that occur + in the eigenspectra as the total substrate concentration is decreased to zero + is also discussed.", "venue": "Chaos", "year": 1992, "referenceCount": 20, + "citationCount": 37, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-07-20", "journal": {"name": - "Journal of Chemical Physics", "pages": "2003-2006", "volume": "113"}, "authors": - [{"authorId": "2066282998", "name": "L. L. Tsai"}, {"authorId": "1767563", - "name": "G. Hutchison"}, {"authorId": "1403262523", "name": "E. Peacock-L\u00f3pez"}]}, - {"paperId": "6e352e241b8e06e8175d39d6176c756e388b3ba2", "externalIds": {"MAG": - "1991142451", "DOI": "10.2307/2937180", "CorpusId": 83570585}, "url": "https://www.semanticscholar.org/paper/6e352e241b8e06e8175d39d6176c756e388b3ba2", - "title": "Competition Among Grasses Along a Nitrogen Gradient: Initial Conditions - and Mechanisms of Competition", "abstract": "We grew four perennial grass - species (Poapratensis, Agropyron repens, Agros- tis scabra, and Schizachyrium - scoparium) for 5 yr in monocultures and in pairwise com- petition plots on - an experimental nitrogen gradient. The gradient contained plots ranging from - 100% sand to 100% black soil, plus plots that received additional N fertilizer. - To examine the impact of initial conditions on the long-term outcome of interspecific - com- petition, three competitive situations were created: seed vs. seed competition - (both species planted simultaneously), seed invasions (each species added - as seed to year-old monocul- tures of the other), and vegetative invasions - (dividers separating adjacent monocultures of two species removed after 1 - yr). Extractable soil NO3 and NH4, were measured to test if species differences - in the concentration of available soil N in monoculture (i.e., R* for N, Tilman - 1982) could predict the long-term outcome of competition. By year 5, Schizachyrium - displaced or greatly reduced the biomass of both Poa and Agropyron on the - soil mixture gradient (the mixed soils but not the added-N plots) inde- pendent - of the wide range of starting conditions. On these soils, Schizachyrium monocul- - tures had significantly lower soil concentrations of both NO3 and NH4, than - either Poa or Agropyron monocultures. Similarly, Agropyron displaced or greatly - reduced the biomass of Agrostis by year 5. Agropyron monocultures had significantly - lower concentrations of N03- and NO3 + NH4+, but not NH4+, than Agrostis monocultures. - In contrast, no competitive displacement occurred in competition between Poa - and Agropyron, and initial differences persisted over 5 yr. Monocultures of - these two species did not differ in NO3 concentration, but did differ for - NH4+ and NO3 + NH4+. Thus, species differences in ability to deplete soil - NO3 successfully predicted the outcome of competition for all four species - pairs on the soil mixture gradient. If resource preemption or asymmetric compe- - tition had been the mechanism of competition, initial conditions would have - affected the long-term outcome of competition. Rather, these results support - the R* (i.e., resource reduction) model for competition for soil N. In the - added-N fertilizer plots, Schizachyrium had decreased biomass in competition - with both Poa and Agropyron. However, neither Agropyron nor Poa appeared to - have an advantage when they competed with each other in the added-N plots. - For these three species pairs, the 5-yr results of competition in the added-N - plots, which had greatly reduced light availability because of increased production - and litter accumulation, depended on initial conditions. In the fourth pair, - Agrostis was displaced by Agropyron in all competition treatments in the added-N - plots. Thus, we cannot reject the hypothesis that resource preemption (i.e., - asymmetric competition) is important in light competition.", "venue": "", - "year": 1993, "referenceCount": 26, "citationCount": 446, "influentialCitationCount": - 16, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1993-02-01", "journal": {"name": "Ecological Monographs", - "pages": "199-229", "volume": "63"}, "authors": [{"authorId": "3670751", "name": - "D. Wedin"}, {"authorId": "144913121", "name": "D. Tilman"}]}, {"paperId": - "da5b21c0b1f0809fba2e772705b79edeac9ac015", "externalIds": {"MAG": "2135316487", - "DBLP": "conf/icalp/LagoM09", "ArXiv": "1208.0515", "DOI": "10.2168/LMCS-8(3:12)2012", - "CorpusId": 6483969}, "url": "https://www.semanticscholar.org/paper/da5b21c0b1f0809fba2e772705b79edeac9ac015", - "title": "On Constructor Rewrite Systems and the Lambda-Calculus", "abstract": - "We prove that orthogonal constructor term rewrite systems and lambda-calculus - with weak (i.e., no reduction is allowed under the scope of a lambda-abstraction) - call-by-value reduction can simulate each other with a linear overhead. In - particular, weak call-by-value beta-reduction can be simulated by an orthogonal - constructor term rewrite system in the same number of reduction steps. Conversely, - each reduction in a term rewrite system can be simulated by a constant number - of beta-reduction steps. This is relevant to implicit computational complexity, - because the number of beta steps to normal form is polynomially related to - the actual cost (that is, as performed on a Turing machine) of normalization, - under weak call-by-value reduction. Orthogonal constructor term rewrite systems - and lambda-calculus are thus both polynomially related to Turing machines, - taking as notion of cost their natural parameters.", "venue": "International - Colloquium on Automata, Languages and Programming", "year": 2009, "referenceCount": - 34, "citationCount": 59, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2009-04-27", "journal": {"name": "ArXiv", "volume": "abs/0904.4120"}, "authors": - [{"authorId": "9127840", "name": "Ugo Dal Lago"}, {"authorId": "34997688", - "name": "S. Martini"}]}]} + "publicationTypes": ["JournalArticle"], "publicationDate": "1992-10-01", "journal": + {"name": "Chaos", "pages": "\n 513-524\n ", "volume": "2 4"}, + "authors": [{"authorId": "78612126", "name": "J. Pearson"}, {"authorId": "48709667", + "name": "W. Bruno"}]}, {"paperId": "8b0438883268a2f2bdddfbd1e6264fe3d9411d92", + "externalIds": {"MAG": "1997341646", "DOI": "10.1021/JP982034N", "CorpusId": + 95844464}, "corpusId": 95844464, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8b0438883268a2f2bdddfbd1e6264fe3d9411d92", + "title": "Dividing Blobs, Chemical Flowers, and Patterned Islands in a Reaction\u2212Diffusion + System", "abstract": "In an one-side-fed open spatial reactor operated with + the chlorine dioxide\u2212iodine\u2212malonic acid reaction in the presence + of polyvinyl alcohol, we systematically studied the growth dynamics of Turing + patterns after a supercritical parameter change. We describe different modes + of propagation of the patterned state in an absolutely unstable uniform state, + among which are a spot division and a finger splitting mode. We attribute + these peculiar growth modes to the existence of two different uniform states + and to a morphological instability of a propagating front linking these two + states. In regions where bistability between the Turing state and a uniform + state is obtained, the interface between the patterned state and the uniform + state can be brought to a halt and thus localized patterned states are observed.", + "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 57, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1998-10-01", "journal": {"name": "Journal of Physical + Chemistry A", "pages": "8236-8244", "volume": "102"}, "authors": [{"authorId": + "47459850", "name": "P. W. Davies"}, {"authorId": "92487367", "name": "P. + Blanchedeau"}, {"authorId": "3250971", "name": "E. Dulos"}, {"authorId": "50010680", + "name": "P. Kepper"}]}, {"paperId": "7eaf5c84745a0599549ca58761ec1bfff7c5fc2a", + "externalIds": {"MAG": "1967645131", "DOI": "10.1242/dev.107441", "CorpusId": + 5453514, "PubMed": "25605777"}, "corpusId": 5453514, "publicationVenue": {"id": + "179847ef-8e79-48e2-99ee-769211d3e729", "name": "Development", "type": "journal", + "issn": "0950-1991", "alternate_issns": ["0212-2448"], "url": "https://dev.biologists.org/", + "alternate_urls": ["http://dev.biologists.org/", "http://journals.ecs.soton.ac.uk/journals/dev.html"]}, + "url": "https://www.semanticscholar.org/paper/7eaf5c84745a0599549ca58761ec1bfff7c5fc2a", + "title": "Mathematically guided approaches to distinguish models of periodic + patterning", "abstract": "How periodic patterns are generated is an open question. + A number of mechanisms have been proposed \u2013 most famously, Turing''s + reaction-diffusion model. However, many theoretical and experimental studies + focus on the Turing mechanism while ignoring other possible mechanisms. Here, + we use a general model of periodic patterning to show that different types + of mechanism (molecular, cellular, mechanical) can generate qualitatively + similar final patterns. Observation of final patterns is therefore not sufficient + to favour one mechanism over others. However, we propose that a mathematical + approach can help to guide the design of experiments that can distinguish + between different mechanisms, and illustrate the potential value of this approach + with specific biological examples. Summary: This Hypothesis presents a mathematical + approach to understanding periodic patterning during development, and suggests + ways in which molecular, cellular or mechanical models can be tested.", "venue": + "Development", "year": 2015, "referenceCount": 100, "citationCount": 59, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "2015-02-01", "journal": {"name": "Development", "pages": "409 - 419", "volume": + "142"}, "authors": [{"authorId": "120216900", "name": "T. Hiscock"}, {"authorId": + "2756673", "name": "S. Megason"}]}]} ' headers: @@ -22798,31 +25925,31 @@ interactions: Connection: - keep-alive Content-Length: - - '162436' + - '192642' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:35 GMT + - Tue, 03 Jan 2023 20:53:04 GMT Via: - - 1.1 a18ffd49cb0150d72aa8f289eec6fa1e.cloudfront.net (CloudFront) + - 1.1 f88bd4c15622473fc18eef7d15f4b8d4.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - ci43E2hM8fk9lqsst1aW9xp8AtXn6yV6t8Q9tX3jJZHaDnEQw5hZ8A== + - kGEXRhuBnVPz_4FFiGKx5UUy3vnixKK-eosujov4JfHpSdUBrYAL2A== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detGuEzqPHcF4CQ= + - eLxThEImvHcF9GQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '162436' + - '192642' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:35 GMT + - Tue, 03 Jan 2023 20:53:04 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 4268417c-43a2-4222-a6c8-edc08f255dcc + - 8d5d082c-d710-4895-ba72-52924dd8a181 status: code: 200 message: OK @@ -22838,163 +25965,339 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1100&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1100&limit=100 response: body: - string: '{"total": 65539, "offset": 1100, "next": 1200, "data": [{"paperId": - "3d4e24139687eee1d97f09a874d515b1827a4af2", "externalIds": {"DBLP": "journals/cacm/TanWA05", - "MAG": "2088514722", "DOI": "10.1145/1060710.1060737", "CorpusId": 2123776}, - "url": "https://www.semanticscholar.org/paper/3d4e24139687eee1d97f09a874d515b1827a4af2", - "title": "Health care and services delivery systems as complex adaptive systems", - "abstract": "Alan Turing and John von Neumann pioneered the study of complex - systems. In analyzing feedback processes, they were interested in how complex - interacting systems can respond to new information. Among other things, they - found that some systems with many interactions among highly differentiated - parts can produce surprisingly simple, predictable behavior (such as a programmable - mechanical routine or process), while others generate behavior that may be - impossible to predict, even though these systems feature simple laws and few - actors or agents (such as an evolving living organism).", "venue": "CACM", - "year": 2005, "referenceCount": 12, "citationCount": 132, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-05-01", "journal": {"name": "Commun. ACM", "pages": "36-44", "volume": - "48"}, "authors": [{"authorId": "143712972", "name": "Joseph K. Tan"}, {"authorId": - "1699952", "name": "H. Wen"}, {"authorId": "2208719", "name": "N. Awad"}]}, - {"paperId": "6e352e241b8e06e8175d39d6176c756e388b3ba2", "externalIds": {"MAG": - "1991142451", "DOI": "10.2307/2937180", "CorpusId": 83570585}, "url": "https://www.semanticscholar.org/paper/6e352e241b8e06e8175d39d6176c756e388b3ba2", - "title": "Competition Among Grasses Along a Nitrogen Gradient: Initial Conditions - and Mechanisms of Competition", "abstract": "We grew four perennial grass - species (Poapratensis, Agropyron repens, Agros- tis scabra, and Schizachyrium - scoparium) for 5 yr in monocultures and in pairwise com- petition plots on - an experimental nitrogen gradient. The gradient contained plots ranging from - 100% sand to 100% black soil, plus plots that received additional N fertilizer. - To examine the impact of initial conditions on the long-term outcome of interspecific - com- petition, three competitive situations were created: seed vs. seed competition - (both species planted simultaneously), seed invasions (each species added - as seed to year-old monocul- tures of the other), and vegetative invasions - (dividers separating adjacent monocultures of two species removed after 1 - yr). Extractable soil NO3 and NH4, were measured to test if species differences - in the concentration of available soil N in monoculture (i.e., R* for N, Tilman - 1982) could predict the long-term outcome of competition. By year 5, Schizachyrium - displaced or greatly reduced the biomass of both Poa and Agropyron on the - soil mixture gradient (the mixed soils but not the added-N plots) inde- pendent - of the wide range of starting conditions. On these soils, Schizachyrium monocul- - tures had significantly lower soil concentrations of both NO3 and NH4, than - either Poa or Agropyron monocultures. Similarly, Agropyron displaced or greatly - reduced the biomass of Agrostis by year 5. Agropyron monocultures had significantly - lower concentrations of N03- and NO3 + NH4+, but not NH4+, than Agrostis monocultures. - In contrast, no competitive displacement occurred in competition between Poa - and Agropyron, and initial differences persisted over 5 yr. Monocultures of - these two species did not differ in NO3 concentration, but did differ for - NH4+ and NO3 + NH4+. Thus, species differences in ability to deplete soil - NO3 successfully predicted the outcome of competition for all four species - pairs on the soil mixture gradient. If resource preemption or asymmetric compe- - tition had been the mechanism of competition, initial conditions would have - affected the long-term outcome of competition. Rather, these results support - the R* (i.e., resource reduction) model for competition for soil N. In the - added-N fertilizer plots, Schizachyrium had decreased biomass in competition - with both Poa and Agropyron. However, neither Agropyron nor Poa appeared to - have an advantage when they competed with each other in the added-N plots. - For these three species pairs, the 5-yr results of competition in the added-N - plots, which had greatly reduced light availability because of increased production - and litter accumulation, depended on initial conditions. In the fourth pair, - Agrostis was displaced by Agropyron in all competition treatments in the added-N - plots. Thus, we cannot reject the hypothesis that resource preemption (i.e., - asymmetric competition) is important in light competition.", "venue": "", - "year": 1993, "referenceCount": 26, "citationCount": 446, "influentialCitationCount": - 16, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1993-02-01", "journal": {"name": "Ecological Monographs", - "pages": "199-229", "volume": "63"}, "authors": [{"authorId": "3670751", "name": - "D. Wedin"}, {"authorId": "144913121", "name": "D. Tilman"}]}, {"paperId": - "518b15e7ec07edeed911e65e51cf174f3a894b46", "externalIds": {"DBLP": "conf/uc/AmanC09", - "MAG": "1839299395", "DOI": "10.1007/978-3-642-03745-0_12", "CorpusId": 13300558}, - "url": "https://www.semanticscholar.org/paper/518b15e7ec07edeed911e65e51cf174f3a894b46", - "title": "Turing Completeness Using Three Mobile Membranes", "abstract": null, - "venue": "International Conference on Unconventional Computation", "year": - 2009, "referenceCount": 16, "citationCount": 28, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + string: '{"total": 65729, "offset": 1100, "next": 1200, "data": [{"paperId": + "167ff88fbcad256710c2bbee906c33f2bb420310", "externalIds": {"MAG": "1998084650", + "DBLP": "conf/stoc/StockmeyerM73", "DOI": "10.1145/800125.804029", "CorpusId": + 13876459}, "corpusId": 13876459, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/167ff88fbcad256710c2bbee906c33f2bb420310", + "title": "Word problems requiring exponential time(Preliminary Report)", "abstract": + "The equivalence problem for Kleene''s regular expressions has several effective + solutions, all of which are computationally inefficient. In [1], we showed + that this inefficiency is an inherent property of the problem by showing that + the problem of membership in any arbitrary context-sensitive language was + easily reducible to the equivalence problem for regular expressions. We also + showed that with a squaring abbreviation ( writing (E)2 for E\u00d7E) the + equivalence problem for expressions required computing space exponential in + the size of the expressions. In this paper we consider a number of similar + decidable word problems from automata theory and logic whose inherent computational + complexity can be precisely characterized in terms of time or space requirements + on deterministic or nondeterministic Turing machines. The definitions of the + word problems and a table summarizing their complexity appears in the next + section. More detailed comments and an outline of some of the proofs follows + in the remaining sections. Complete proofs will appear in the forthcoming + papers [9, 10, 13]. In the final section we describe some open problems.", + "venue": "Symposium on the Theory of Computing", "year": 1973, "referenceCount": + 16, "citationCount": 833, "influentialCitationCount": 67, "isOpenAccess": + true, "openAccessPdf": {"url": "http://theory.csail.mit.edu/~meyer/meyer-stockmeyer-word-probs.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-09-03", "journal": - {"pages": "42-55"}, "authors": [{"authorId": "2436033", "name": "Bogdan Aman"}, - {"authorId": "1800122", "name": "Gabriel Ciobanu"}]}, {"paperId": "a488ce086ae4a7f154e3dd0ce9c6d28d80e36f98", - "externalIds": {"MAG": "2040174528", "DOI": "10.1086/284352", "CorpusId": - 84548380}, "url": "https://www.semanticscholar.org/paper/a488ce086ae4a7f154e3dd0ce9c6d28d80e36f98", - "title": "Temporal Variation, Spatial Heterogeneity, and Competition for Resources - in Plankton Systems: A Theoretical Model", "abstract": "We present a model - of two species competing for two resources in a spatially nonuniform (i.e., - spatially disaggregated) environment. The formulation is based upon our experience - with phytoplankton competing for nutrients in lakes and the ocean. The organisms - may diffuse, be carried by currents, grow (controlled by the resources), sink, - and die; the resources may diffuse, be carried by currents, be taken up by - growing organisms, and be regenerated from dying organisms. External sources - (or sinks) of resources are allowed. For reasonable choices of parameters, - our model shows much more variable behavior in space and time than the usual - smooth approach to coexistence (or exclusion of one of the species) seen in - previous resource competition models. For example, damped oscillations and - \"limit-cycle-like\" behavior are exhibited. These are not the result of time - delays or varying environmental factors, but are inherent in the theory in - which sinking plays a large role. Diffusion in the spatially heterogeneous - environment can allow coexistence of two species for situations in which dominance - of one is predicted by other models. Conversely, through Turing instability, - diffusion can destabilize an otherwise stable, uniform coexistence situation. - Turing-type behavior may occur when organisms and nutrients diffuse at different - rates and when perturbations in species densities or nutrient concentrations - occur at intermediate spatial scales. The upper and lower limits of the intermediate - scale region are set by the interaction of physical and biological processes; - such regions (and thus Turing behavior) may be common in lake and ocean environments. - The results of other models of resource-based competition depend upon behavior - found near equilibrium. The conclusions of these equilibrium models may not - apply in environments with realistic temporal and spatial variation.", "venue": - "American Naturalist", "year": 1985, "referenceCount": 114, "citationCount": - 77, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1985-03-01", "journal": {"name": "The American Naturalist", - "pages": "431 - 464", "volume": "125"}, "authors": [{"authorId": "31912040", - "name": "T. Powell"}, {"authorId": "3176261", "name": "P. Richerson"}]}, {"paperId": - "945070c7bf5d48a99fff7144455a3ef21a9773e9", "externalIds": {"DBLP": "journals/jsyml/Given-WilsonJ11", - "MAG": "2046825040", "DOI": "10.2178/jsl/1309952521", "CorpusId": 12898505}, - "url": "https://www.semanticscholar.org/paper/945070c7bf5d48a99fff7144455a3ef21a9773e9", - "title": "A combinatory account of internal structure", "abstract": "Abstract - Traditional combinatory logic uses combinators S and K to represent all Turing-computable - functions on natural numbers, but there are Turing-computable functions on - the combinators themselves that cannot be so represented, because they access - internal structure in ways that S and K cannot. Much of this expressive power - is captured by adding a factorisation combinator F. The resulting SF-calculus - is structure complete, in that it supports all pattern-matching functions - whose patterns are in normal form, including a function that decides structural - equality of arbitrary normal forms. A general characterisation of the structure - complete, confluent combinatory calculi is given along with some examples. - These are able to represent all their Turing-computable functions whose domain - is limited to normal forms. The combinator F can be typed using an existential - type to represent internal type information.", "venue": "Journal of Symbolic - Logic (JSL)", "year": 2011, "referenceCount": 35, "citationCount": 34, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-09-01", "journal": {"name": "The Journal of Symbolic - Logic", "pages": "807 - 826", "volume": "76"}, "authors": [{"authorId": "1401782411", - "name": "Thomas Given-Wilson"}, {"authorId": "145365344", "name": "B. Jay"}]}, + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", "Conference"], + "publicationDate": "1973-04-30", "journal": {"name": "Proceedings of the fifth + annual ACM symposium on Theory of computing"}, "authors": [{"authorId": "1678332", + "name": "L. Stockmeyer"}, {"authorId": "39792203", "name": "A. Meyer"}]}, + {"paperId": "049c9370d8d8d8ffe31c84f4cf9224a946427b37", "externalIds": {"MAG": + "2118322961", "DOI": "10.1112/S0024610700001459", "CorpusId": 8740953}, "corpusId": + 8740953, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/049c9370d8d8d8ffe31c84f4cf9224a946427b37", + "title": "Every Set has a Least Jump Enumeration", "abstract": "Given a computably + enumerable set W, there is a Turing degree which is the least jump of any + set in which W is computably enumerable, namely 0\u2032. Remarkably, this + is not a phenomenon of computably enumerable sets. It is shown that for every + subset A of N, there is a Turing degree, c\u2032\u03bc(A), which is the least + degree of the jumps of all sets X for which A is \u221110(X) . In addition + this result provides an isomorphism invariant method for assigning Turing + degrees to certain torsion\u2010free abelian groups.", "venue": "", "year": + 2000, "referenceCount": 10, "citationCount": 27, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2000-12-01", + "journal": {"name": "Journal of the London Mathematical Society", "volume": + "62"}, "authors": [{"authorId": "47223989", "name": "R. Coles"}, {"authorId": + "2134049919", "name": "R. Downey"}, {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": "d3d2781b092facc03c81da14ef257f5f38b7cf9c", "externalIds": {"MAG": "1996333888", "DOI": "10.1007/S10884-004-2782-X", "CorpusId": 120911696}, - "url": "https://www.semanticscholar.org/paper/d3d2781b092facc03c81da14ef257f5f38b7cf9c", + "corpusId": 120911696, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d3d2781b092facc03c81da14ef257f5f38b7cf9c", "title": "Global Bifurcation and Structure of Turing Patterns in the 1-D Lengyel\u2013Epstein Model", "abstract": null, "venue": "", "year": 2004, "referenceCount": 20, - "citationCount": 96, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-04-01", "journal": {"name": - "Journal of Dynamics and Differential Equations", "pages": "297-320", "volume": - "16"}, "authors": [{"authorId": "10192095", "name": "Jaeduck Jang"}, {"authorId": - "2531648", "name": "W. Ni"}, {"authorId": "50627764", "name": "M. Tang"}]}, + "citationCount": 98, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-04-01", "journal": {"name": "Journal of Dynamics and Differential Equations", + "pages": "297-320", "volume": "16"}, "authors": [{"authorId": "10192095", + "name": "Jaeduck Jang"}, {"authorId": "2531648", "name": "W. Ni"}, {"authorId": + "50627764", "name": "M. Tang"}]}, {"paperId": "925dde3e6d24559e68b725fbb180758c39601581", + "externalIds": {"MAG": "1992153901", "DOI": "10.1103/PHYSREVLETT.81.81", "CorpusId": + 120972158}, "corpusId": 120972158, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/925dde3e6d24559e68b725fbb180758c39601581", + "title": "THREE-DIMENSIONAL TURING STRUCTURES AND SPATIAL SOLITONS IN OPTICAL + PARAMETRIC OSCILLATORS", "abstract": "An order parameter equation is derived + for degenerate optical parametric oscillators in the form of a three-dimensional + Swift-Hohenberg equation. Three-dimensional Turing structures (lamellae and + tetrahedral patterns) and three-dimensional spatial solitons (dark spherical + bubbles) are predicted as stable structures.", "venue": "", "year": 1998, + "referenceCount": 0, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-07-06", + "journal": {"name": "Physical Review Letters", "pages": "81-84", "volume": + "81"}, "authors": [{"authorId": "2640938", "name": "K. Stali\u016bnas"}]}, + {"paperId": "f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", "externalIds": {"MAG": + "1882313281", "DOI": "10.1075/aicr.34.04har", "CorpusId": 143324564}, "corpusId": + 143324564, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", + "title": "Turing Indistinguishability and the Blind Watchmaker", "abstract": + "Many special problems crop up when evolutionary theory turns, quite naturally, + to the question of the adaptive value and causal role of consciousness in + human and nonhuman organisms. One problem is that -- unless we are to be dualists, + treating it as an independent nonphysical force -- consciousness could not + have had an independent adaptive function of its own, over and above whatever + behavioral and physiological functions it \"supervenes\" on, because evolution + is completely blind to the difference between a conscious organism and a functionally + equivalent (Turing Indistinguishable) nonconscious \"Zombie\" organism: In + other words, the Blind Watchmaker, a functionalist if ever there was one, + is no more a mind reader than we are. Hence Turing-Indistinguishability = + Darwin-Indistinguishability. It by no means follows from this, however, that + human behavior is therefore to be explained only by the push-pull dynamics + of Zombie determinism, as dictated by calculations of \"inclusive fitness\" + and \"evolutionarily stable strategies.\" We are conscious, and, more important, + that consciousness is piggy-backing somehow on the vast complex of unobservable + internal activity -- call it \"cognition\" -- that is really responsible for + generating all of our behavioral capacities. Hence, except in the palpable + presence of the irrational (e.g., our sexual urges) where distal Darwinian + factors still have some proximal sway, it is as sensible to seek a Darwinian + rather than a cognitive explanation for most of our current behavior as it + is to seek a cosmological rather than an engineering explanation of an automobile''s + behavior. Let evolutionary theory explain what shaped our cognitive capacity + (Steklis & Harnad 1976; Harnad 1996, but let cognitive theory explain our + resulting behavior.", "venue": "", "year": 2002, "referenceCount": 34, "citationCount": + 29, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2002-04-08", "journal": {"name": "", "pages": "3-18", + "volume": ""}, "authors": [{"authorId": "2293327", "name": "S. Harnad"}]}, + {"paperId": "71a494eac8189146424ea75c6b6e52ee542bbff4", "externalIds": {"MAG": + "1964116027", "DOI": "10.1063/1.482006", "CorpusId": 93035935}, "corpusId": + 93035935, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/71a494eac8189146424ea75c6b6e52ee542bbff4", + "title": "Turing patterns in a self-replicating mechanism with a self-complementary + template", "abstract": "A variety of nonlinear chemical models, such as the + Selkov\u2013Schnakenberg, exhibit Turing patterns. The Templator, which is + based on a minimal autocatalytic monomer\u2013dimer system, is a newer two-variable + model also able to show Turing patterns. Here we find that the dynamic behavior + of the Templator is quite similar to other models with cubic nonlinearities. + This is demonstrated through a series of computer simulations in two dimensions + utilizing the cellular automata approach. The selection of parameter values + is based on linear stability analysis, which provides a relatively simple + method of predicting Turing pattern formation. The simulations reveal spot, + labyrinth, and striped patterns, in agreement with the predictions of the + analysis. Other behaviors, such as honeycomb patterns, are also observed. + For some parameter values, we study transient spot replication. Our findings + strongly suggest that the Templator may belong to the same class of models + previously studied by Pearson.", "venue": "", "year": 2000, "referenceCount": + 28, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://zenodo.org/record/45954/files/article.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-07-20", "journal": {"name": + "Journal of Chemical Physics", "pages": "2003-2006", "volume": "113"}, "authors": + [{"authorId": "2066282998", "name": "L. L. Tsai"}, {"authorId": "1767563", + "name": "G. Hutchison"}, {"authorId": "1403262523", "name": "E. Peacock-L\u00f3pez"}]}, + {"paperId": "d79c539711904539c52e5ee4ebab01a693a42161", "externalIds": {"MAG": + "1651525653", "DBLP": "journals/aim/Grosz12", "DOI": "10.1609/aimag.v33i4.2441", + "CorpusId": 8701482}, "corpusId": 8701482, "publicationVenue": {"id": "6fedff74-7525-4b7f-bbb4-4df4e23948e4", + "name": "The AI Magazine", "type": "journal", "alternate_names": ["AI Mag", + "Ai Mag", "Ai Magazine"], "issn": "0738-4602", "url": "https://www.aaai.org/Library/Magazine/magazine-library.php", + "alternate_urls": ["https://www.aaai.org/ojs/index.php/aimagazine/", "https://www.aaai.org/Magazine/magazine.php"]}, + "url": "https://www.semanticscholar.org/paper/d79c539711904539c52e5ee4ebab01a693a42161", + "title": "What Question Would Turing Pose Today?", "abstract": "In 1950, when + Turing proposed to replace the question \"Can machines think?\" with the question + \"Are there imaginable digital computers which would do well in the imitation + game?\" computer science was not yet a field of study, Shannon\u2019s theory + of information had just begun to change the way people thought about communication, + and psychology was only starting to look beyond behaviorism. It is stunning + that so many predictions in Turing\u2019s 1950 Mind paper were right. In the + decades since that paper appeared, with its inspiring challenges, research + in computer science, neuroscience, and the behavioral sciences has radically + changed thinking about mental processes and communication, and the ways in + which people use computers has evolved even more dramatically. Turing, were + he writing now, might still replace \"Can machines think?\" with an operational + challenge, but it is likely he would propose a very different test. This paper + considers what that might be in light of Turing\u2019s paper and advances + in the decades since it was written.", "venue": "The AI Magazine", "year": + 2012, "referenceCount": 34, "citationCount": 28, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/aimagazine/article/download/2441/2335", + "status": "BRONZE"}, "fieldsOfStudy": ["Psychology", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-12-21", "journal": {"name": "AI Mag.", "pages": "73-81", "volume": "33"}, + "authors": [{"authorId": "1692242", "name": "B. Grosz"}]}, {"paperId": "7f5cad93da4407db724c519b194ef23d89f6310c", + "externalIds": {"MAG": "1967342602", "DOI": "10.1007/S002850100105", "CorpusId": + 6149086, "PubMed": "11767205"}, "corpusId": 6149086, "publicationVenue": {"id": + "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical Biology", + "type": "journal", "alternate_names": ["J Math Biology"], "issn": "0303-6812", + "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/7f5cad93da4407db724c519b194ef23d89f6310c", + "title": "Pattern formation in discrete cell lattices", "abstract": null, + "venue": "Journal of Mathematical Biology", "year": 2001, "referenceCount": + 0, "citationCount": 75, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-11-01", "journal": + {"name": "Journal of Mathematical Biology", "pages": "411-445", "volume": + "43"}, "authors": [{"authorId": "2750362", "name": "E. Plahte"}]}, {"paperId": + "1707c9d43c31d6475f1548b98b4a557ea592fc40", "externalIds": {"MAG": "2087699091", + "DBLP": "journals/logcom/Zheng03", "DOI": "10.1093/logcom/13.2.159", "CorpusId": + 17263806}, "corpusId": 17263806, "publicationVenue": {"id": "6832033a-c52f-4a30-a719-822a07bbd8fb", + "name": "Journal of Logic and Computation", "type": "journal", "alternate_names": + ["J Log Comput"], "issn": "0955-792X", "url": "https://academic.oup.com/logcom/issue", + "alternate_urls": ["http://logcom.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/1707c9d43c31d6475f1548b98b4a557ea592fc40", + "title": "On the Turing Degrees of Weakly Computable Real Numbers", "abstract": + "The Turing degree of a real number x is defined as the Turing degree of its + binary expansion. This definition is quite natural and robust. In this paper + we discuss some basic degree properties of semi-computable and weakly computable + real numbers introduced by Weihrauch and Zheng [19]. Among others we show + that, there are two real numbers of c.e. binary expansions such that their + difference does not have an \u03c9.c.e. Turing degree.", "venue": "Journal + of Logic and Computation", "year": 2003, "referenceCount": 21, "citationCount": + 21, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2003-04-01", "journal": {"name": "J. + Log. Comput.", "pages": "159-172", "volume": "13"}, "authors": [{"authorId": + "36711028", "name": "Xizhong Zheng"}]}, {"paperId": "03b57770387aee919b1f5c89333ee65a426f32e2", + "externalIds": {"DBLP": "journals/siamcomp/MaassS87", "MAG": "2017609259", + "DOI": "10.1137/0216016", "CorpusId": 42506546}, "corpusId": 42506546, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/03b57770387aee919b1f5c89333ee65a426f32e2", + "title": "Speed-Up of Turing Machines with One Work Tape and a Two-Way Input + Tape", "abstract": "In this paper we consider the next more powerful restricted + type of Turing machine, which cannot be handled by the existing lower bound + arguments: Turing machines with one work tape and a two-way input tape. We + show that one can simulate a deterministic Turing machine of this type with + time bound $O(n^3 )$ by $\\Sigma _2 $-Turing machine of the same type with + time bound $O(n^2 \\cdot \\log ^2 n)$. This implies the new separation result + $\\Sigma _2 {\\operatorname{TIME}}_1 (n) \\nsubseteq {\\operatorname{DTIME}}_1 + ({{n^{{3 / 2}} } / {\\log ^6 n}})$. Further, we improve Kannan\u2019s separation + result ${\\operatorname{NTIME}}(n) \\nsubseteq {\\operatorname{DTIME}}_1 (n^{1.104} + )$ to ${\\operatorname{NTIME}}(n) \\nsubseteq {\\operatorname{DTIME}}_1 (n^{1.22} + )$. Finally we show that with Turing machines of the considered type that + use $2k$ alternations, the achieved speed-up increases and for large k approximates + $t^{{1 / 2}} (n)$. In view of the close relationship between spacebounded + Turing machines and time-bounded Turing m...", "venue": "SIAM journal on computing + (Print)", "year": 1987, "referenceCount": 0, "citationCount": 21, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1987-02-01", "journal": {"name": "SIAM J. Comput.", "pages": + "195-202", "volume": "16"}, "authors": [{"authorId": "145247053", "name": + "W. Maass"}, {"authorId": "2372497", "name": "Amir Schorr"}]}, {"paperId": + "7df575c1e9325cbb0f137ee0a5a3094ccff81dc0", "externalIds": {"MAG": "2337946189", + "DOI": "10.1145/1057947.1057949", "CorpusId": 14003257}, "corpusId": 14003257, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7df575c1e9325cbb0f137ee0a5a3094ccff81dc0", + "title": "Numerical Turing", "abstract": "Numerical Turing is an extension + of the Turing programming language. Turing is a Pascal-like language (with + convenient string handling, dynamic arrays, modules and more general parameter + lists) developed at the University of Toronto [4]. Turing has been in use + since May, 1983, and is now available on several machines.", "venue": "SGNM", + "year": 1985, "referenceCount": 23, "citationCount": 14, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1985-07-01", "journal": {"name": + "ACM Signum Newsletter", "pages": "26", "volume": "20"}, "authors": [{"authorId": + "145984515", "name": "T. E. Hull"}, {"authorId": "2598619", "name": "A. Abrham"}, + {"authorId": "2111364005", "name": "M. S. Cohen"}, {"authorId": "1409937352", + "name": "A. F. X."}, {"authorId": "1383095992", "name": "C. Hall"}, {"authorId": + "38269500", "name": "D. A. Penny"}, {"authorId": "2070056518", "name": "J. + M"}]}, {"paperId": "6df2435ad7cbc5f23044779df9f8b6ec50e14b2a", "externalIds": + {"MAG": "2004808014", "DOI": "10.3354/MEPS07182", "CorpusId": 600504}, "corpusId": + 600504, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6df2435ad7cbc5f23044779df9f8b6ec50e14b2a", + "title": "Consequences of increased temperature and CO2 for phytoplankton + community structure in the Bering Sea", "abstract": "Global climate change + is predicted to have large effects on the ocean that could cause shifts in + current algal community structure, major nutrient cycles, and carbon export. + The Bering Sea is already experiencing changes in sea surface temperature + (SST), unprecedented algal blooms, and alterations to trophic level dynamics. + We incubated phytoplankton communities from 2 Bering Sea regimes under conditions + of elevated SST and/or partial pressure of carbon dioxide (pCO2) similar to + predicted values for 2100. In our ''greenhouse ocean'' simulations, maximum + biomass-normalized photosynthetic rates increased 2.6 to 3.5 times and community + composition shifted away from diatoms and towards nanophytoplankton. These + changes were driven largely by elevated tempera- ture, with secondary effects + from increased pCO2. If these results are indicative of future climate responses, + community shifts towards nanophytoplankton dominance could reduce the ability + of the Bering Sea to maintain the productive diatom-based food webs that currently + support one of the world''s most productive fisheries.", "venue": "", "year": + 2007, "referenceCount": 33, "citationCount": 243, "influentialCitationCount": + 12, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/meps2008/352/m352p009.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-12-20", + "journal": {"name": "Marine Ecology Progress Series", "pages": "9-16", "volume": + "352"}, "authors": [{"authorId": "87022738", "name": "C. E. Hare"}, {"authorId": + "46737800", "name": "K. Leblanc"}, {"authorId": "5227711", "name": "G. DiTullio"}, + {"authorId": "1739716", "name": "R. Kudela"}, {"authorId": "2118390795", "name": + "Yaohong Zhang"}, {"authorId": "2111214614", "name": "Peter A. Lee"}, {"authorId": + "87437890", "name": "S. F. Riseman"}, {"authorId": "153837627", "name": "D. + Hutchins"}]}, {"paperId": "0a73def4ac5a1c2aa12baeac85aa57680cdb29e8", "externalIds": + {"MAG": "1596618321", "CorpusId": 142543364}, "corpusId": 142543364, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0a73def4ac5a1c2aa12baeac85aa57680cdb29e8", + "title": "The Man Who Knew Too Much: Alan Turing and the Invention of the + Computer", "abstract": "A \"skillful and literate\" (New York Times Book Review) + biography of the persecuted genius who helped create the modern computer.To + solve one of the great mathematical problems of his day, Alan Turing proposed + an imaginary computer. Then, attempting to break a Nazi code during World + War Ii, he successfully designed and built one, thus ensuring the Allied victory. + Turing became a champion of artificial intelligence, but his work was cut + short. As an openly gay man at a time when homosexuality was illegal in England, + he was convicted and forced to undergo a humiliating \"treatment\" that may + have led to his suicide. With a novelist''s sensitivity, David Leavitt portrays + Turing in all his humanity? his eccentricities, his brilliance, his fatal + candor? and elegantly explains his work and its implications.", "venue": "", + "year": 2006, "referenceCount": 0, "citationCount": 30, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History", + "Psychology"], "s2FieldsOfStudy": [{"category": "History", "source": "external"}, + {"category": "Psychology", "source": "external"}, {"category": "Art", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2006-11-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2056749597", + "name": "D. Leavitt"}]}, {"paperId": "f9f7730b3578cb0838c956d8c53c8db17a65d234", + "externalIds": {"MAG": "2500514655", "DOI": "10.1093/0198237545.003.0005", + "CorpusId": 63123970}, "corpusId": 63123970, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f9f7730b3578cb0838c956d8c53c8db17a65d234", + "title": "Turing''s Test", "abstract": null, "venue": "", "year": 2004, "referenceCount": + 0, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": "2004-03-25", "journal": {"name": "", "pages": "77-86", + "volume": ""}, "authors": [{"authorId": "47824154", "name": "D. Davidson"}]}, + {"paperId": "a8e4100395a3684d7f8523ccf827bad581457a3c", "externalIds": {"DBLP": + "journals/cacm/Haigh14", "MAG": "2142601750", "DOI": "10.1145/2542504", "CorpusId": + 5694189}, "corpusId": 5694189, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a8e4100395a3684d7f8523ccf827bad581457a3c", + "title": "Actually, Turing did not invent the computer", "abstract": "Separating + the origins of computer science and technology.", "venue": "CACM", "year": + 2014, "referenceCount": 6, "citationCount": 32, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Commun. ACM", "pages": "36-41", + "volume": "57"}, "authors": [{"authorId": "1714013", "name": "T. Haigh"}]}, {"paperId": "6e1f07ac8a9859083ac37289cd901ccc7a85c344", "externalIds": {"MAG": "2017877147", "DOI": "10.1524/zkri.1959.111.16.350", "CorpusId": 201843166}, - "url": "https://www.semanticscholar.org/paper/6e1f07ac8a9859083ac37289cd901ccc7a85c344", + "corpusId": 201843166, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e1f07ac8a9859083ac37289cd901ccc7a85c344", "title": "Synthesis and crystallography of the wurtzite form of silicon carbide", "abstract": "Auszug Durch thermische Zersetzung von SiCI4 CeH-CH ; )-Mischungeii oder von CH3S1CI3 bei 1400 bis 1500\u00b0C in einer Wassers toffa tmosph\u00e4re @@ -23012,120 +26315,15 @@ interactions: those calculated f rom the observed intensities. Thus the s t ruc ture is proved to be tha t of the h i ther tofore unobserved 2\u0397 polytype.", "venue": "", "year": 1959, "referenceCount": 0, "citationCount": 52, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Zeitschrift f\u00fcr Kristallographie - - Crystalline Materials", "pages": "350 - 361", "volume": "111"}, "authors": - [{"authorId": "92034186", "name": "R. Adamsky"}, {"authorId": "144556947", - "name": "K. Merz"}]}, {"paperId": "3012f2504ddb9d527ad57a56561f4f72aa04285c", - "externalIds": {"MAG": "1566710022", "CorpusId": 54125748}, "url": "https://www.semanticscholar.org/paper/3012f2504ddb9d527ad57a56561f4f72aa04285c", - "title": "How to Pass the Turing Test by Cheating", "abstract": "Back in the - heyday of computer hardware, some notable people actually believed that sentient - computer programs were literally just around the corner. This prompted the - great British mathemetician, Alan Turing, to devise a simple test of intelligence. - If a computer program could pass the Turing test, then it could be said to - be exhibiting intelligence. In 1991, the Cambridge Centre for Behavioural - Studies held the first formal instantiation of the Turing Test. In this incarnation - the test was known as the Loebner contest, as Dr. Hugh Loebner pledged a $100,000 - grand prize for the first computer program to pass the test. I have submitted - two computer programs to the 1996 Loebner contest, which is to be held on - Friday April 19 in New York city. These computer programs are nothing more - than glorious hacks, but in constructing them I have learned a great deal - about how language works. In this paper I will describe in detail how my computer - programs work, and will make comparisons with similar computer programs such - as ELIZA. After this, I will explain why the Loebner contest is doomed to - failure.", "venue": "", "year": 1997, "referenceCount": 15, "citationCount": - 44, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "2537971", "name": "Jason L. Hutchens"}]}, - {"paperId": "7eaf5c84745a0599549ca58761ec1bfff7c5fc2a", "externalIds": {"MAG": - "1967645131", "DOI": "10.1242/dev.107441", "CorpusId": 5453514, "PubMed": - "25605777"}, "url": "https://www.semanticscholar.org/paper/7eaf5c84745a0599549ca58761ec1bfff7c5fc2a", - "title": "Mathematically guided approaches to distinguish models of periodic - patterning", "abstract": "How periodic patterns are generated is an open question. - A number of mechanisms have been proposed \u2013 most famously, Turing''s - reaction-diffusion model. However, many theoretical and experimental studies - focus on the Turing mechanism while ignoring other possible mechanisms. Here, - we use a general model of periodic patterning to show that different types - of mechanism (molecular, cellular, mechanical) can generate qualitatively - similar final patterns. Observation of final patterns is therefore not sufficient - to favour one mechanism over others. However, we propose that a mathematical - approach can help to guide the design of experiments that can distinguish - between different mechanisms, and illustrate the potential value of this approach - with specific biological examples. Summary: This Hypothesis presents a mathematical - approach to understanding periodic patterning during development, and suggests - ways in which molecular, cellular or mechanical models can be tested.", "venue": - "Development", "year": 2015, "referenceCount": 100, "citationCount": 58, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2015-02-01", "journal": - {"name": "Development", "pages": "409 - 419", "volume": "142"}, "authors": - [{"authorId": "120216900", "name": "T. Hiscock"}, {"authorId": "2756673", - "name": "S. Megason"}]}, {"paperId": "9ddf890f5c2818985496b65aa36d1d00f168a010", - "externalIds": {"DBLP": "books/daglib/0090683", "MAG": "1494177512", "DOI": - "10.1007/978-94-010-0413-8_4", "CorpusId": 41762324}, "url": "https://www.semanticscholar.org/paper/9ddf890f5c2818985496b65aa36d1d00f168a010", - "title": "Computability and complexity - from a programming perspective", - "abstract": null, "venue": "Foundations of computing series", "year": 1997, - "referenceCount": 16, "citationCount": 257, "influentialCitationCount": 24, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-03-14", - "journal": {"pages": "I-XVI, 1-466"}, "authors": [{"authorId": "1700623", - "name": "N. Jones"}]}, {"paperId": "35b74d763e74b0ec7e29f3f106e9402bc6ccc5ea", - "externalIds": {"MAG": "2168723754", "DBLP": "journals/tc/Yamada62a", "DOI": - "10.1109/TEC.1962.5219459", "CorpusId": 46179502}, "url": "https://www.semanticscholar.org/paper/35b74d763e74b0ec7e29f3f106e9402bc6ccc5ea", - "title": "Real-Time Computation and Recursive Functions Not Real-Time Computable", - "abstract": "As an attempt to investigate a general theory of real-time computability - in digital computers, a subclass of Turing machines is formally introduced - together with some classes of functions that are computable by them in real - time. Then the existence is established of a class of recursive functions - that are not computable in real time by use of a class of machines, no matter - how general we make the machines subject to a given constraint.", "venue": - "IRE Transactions on Electronic Computers", "year": 1962, "referenceCount": - 3, "citationCount": 90, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1962-12-01", "journal": {"name": "IRE Trans. Electron. Comput.", "pages": - "753-760", "volume": "11"}, "authors": [{"authorId": "93475256", "name": "H. - Yamada"}]}, {"paperId": "0a73def4ac5a1c2aa12baeac85aa57680cdb29e8", "externalIds": - {"MAG": "1596618321", "CorpusId": 142543364}, "url": "https://www.semanticscholar.org/paper/0a73def4ac5a1c2aa12baeac85aa57680cdb29e8", - "title": "The Man Who Knew Too Much: Alan Turing and the Invention of the - Computer", "abstract": "A \"skillful and literate\" (New York Times Book Review) - biography of the persecuted genius who helped create the modern computer.To - solve one of the great mathematical problems of his day, Alan Turing proposed - an imaginary computer. Then, attempting to break a Nazi code during World - War Ii, he successfully designed and built one, thus ensuring the Allied victory. - Turing became a champion of artificial intelligence, but his work was cut - short. As an openly gay man at a time when homosexuality was illegal in England, - he was convicted and forced to undergo a humiliating \"treatment\" that may - have led to his suicide. With a novelist''s sensitivity, David Leavitt portrays - Turing in all his humanity? his eccentricities, his brilliance, his fatal - candor? and elegantly explains his work and its implications.", "venue": "", - "year": 2006, "referenceCount": 0, "citationCount": 30, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["History", "Psychology"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}, {"category": "Psychology", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2006-11-01", "journal": {"name": "", "volume": - ""}, "authors": [{"authorId": "2056749597", "name": "D. Leavitt"}]}, {"paperId": - "ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", "externalIds": {"MAG": "423839556", - "DBLP": "conf/icalp/Selman79", "DOI": "10.1007/3-540-09510-1_44", "CorpusId": - 19866482}, "url": "https://www.semanticscholar.org/paper/ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", - "title": "P-Selective Sets, Tally Languages, and the Behavior of Polynomial - Time Reducibilities on NP", "abstract": null, "venue": "International Colloquium - on Automata, Languages and Programming", "year": 1979, "referenceCount": 14, - "citationCount": 126, "influentialCitationCount": 9, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1979-07-16", "journal": - {"pages": "546-555"}, "authors": [{"authorId": "2411373", "name": "A. Selman"}]}, - {"paperId": "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "externalIds": {"MAG": - "2741266234", "CorpusId": 125093480}, "url": "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "Zeitschrift f\u00fcr Kristallographie - Crystalline Materials", + "pages": "350 - 361", "volume": "111"}, "authors": [{"authorId": "92034186", + "name": "R. Adamsky"}, {"authorId": "144556947", "name": "K. Merz"}]}, {"paperId": + "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "externalIds": {"MAG": "2741266234", + "CorpusId": 125093480}, "corpusId": 125093480, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565", "title": "Dusting Off the Turing Test", "abstract": "then inter- est theory and a problem about the observation of quantum systems (now as the quantum Zeno effect). With his death, train was lost, but the question computa- tion @@ -23141,52 +26339,48 @@ interactions: discrete symbols a complete the world? If it does, how can make this connection manifest? If it does not, where does fail, and what would this tell us about fundamental science?", "venue": "", "year": 2012, "referenceCount": 1, "citationCount": - 6, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "144443425", "name": "A. Hodges"}, {"authorId": "2262347", "name": - "A. Turing"}]}, {"paperId": "da173b19205747eceb603e7d2618307415e3e706", "externalIds": - {"MAG": "1968630830", "DBLP": "journals/ai/ColbyHWK72", "DOI": "10.1016/0004-3702(72)90049-5", - "CorpusId": 31542633}, "url": "https://www.semanticscholar.org/paper/da173b19205747eceb603e7d2618307415e3e706", - "title": "Turing-like Indistinguishability Tests for the Calidation of a Computer - Simulation of Paranoid Processes", "abstract": null, "venue": "Artificial - Intelligence", "year": 1972, "referenceCount": 5, "citationCount": 121, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Psychology"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Artif. Intell.", "pages": "199-221", "volume": - "3"}, "authors": [{"authorId": "3123001", "name": "K. Colby"}, {"authorId": - "5981444", "name": "F. D. Hilf"}, {"authorId": "47864374", "name": "S. Weber"}, - {"authorId": "1921060", "name": "H. Kraemer"}]}, {"paperId": "71a494eac8189146424ea75c6b6e52ee542bbff4", - "externalIds": {"MAG": "1964116027", "DOI": "10.1063/1.482006", "CorpusId": - 93035935}, "url": "https://www.semanticscholar.org/paper/71a494eac8189146424ea75c6b6e52ee542bbff4", - "title": "Turing patterns in a self-replicating mechanism with a self-complementary - template", "abstract": "A variety of nonlinear chemical models, such as the - Selkov\u2013Schnakenberg, exhibit Turing patterns. The Templator, which is - based on a minimal autocatalytic monomer\u2013dimer system, is a newer two-variable - model also able to show Turing patterns. Here we find that the dynamic behavior - of the Templator is quite similar to other models with cubic nonlinearities. - This is demonstrated through a series of computer simulations in two dimensions - utilizing the cellular automata approach. The selection of parameter values - is based on linear stability analysis, which provides a relatively simple - method of predicting Turing pattern formation. The simulations reveal spot, - labyrinth, and striped patterns, in agreement with the predictions of the - analysis. Other behaviors, such as honeycomb patterns, are also observed. - For some parameter values, we study transient spot replication. Our findings - strongly suggest that the Templator may belong to the same class of models - previously studied by Pearson.", "venue": "", "year": 2000, "referenceCount": - 28, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + 6, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-07-20", "journal": {"name": - "Journal of Chemical Physics", "pages": "2003-2006", "volume": "113"}, "authors": - [{"authorId": "2066282998", "name": "L. L. Tsai"}, {"authorId": "1767563", - "name": "G. Hutchison"}, {"authorId": "1403262523", "name": "E. Peacock-L\u00f3pez"}]}, - {"paperId": "42350ff09ef0951099ddff481ba95edc2874cb16", "externalIds": {"DBLP": - "journals/jacm/Case71", "MAG": "1975010759", "DOI": "10.1145/321650.321651", - "CorpusId": 16139321}, "url": "https://www.semanticscholar.org/paper/42350ff09ef0951099ddff481ba95edc2874cb16", + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}, + {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "1ee641b0aa9f6ba78f6d56a3e103e14ebf8c838c", + "externalIds": {"DBLP": "series/aikp/BoschettiG08", "MAG": "1498537883", "DOI": + "10.1007/978-1-4471-5113-5_15", "CorpusId": 53889303}, "corpusId": 53889303, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1ee641b0aa9f6ba78f6d56a3e103e14ebf8c838c", + "title": "A Turing Test for Emergence", "abstract": null, "venue": "Advances + in Applied Self-organizing Systems", "year": 2008, "referenceCount": 55, "citationCount": + 24, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "349-364"}, "authors": [{"authorId": "1928446", "name": "F. Boschetti"}, + {"authorId": "2069553115", "name": "Randall Gray"}]}, {"paperId": "014675a49aecc1488fb9197b9f6261a993f21aaa", + "externalIds": {"MAG": "2096830445", "DOI": "10.1177/105960117600100405", + "CorpusId": 116601603}, "corpusId": 116601603, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/014675a49aecc1488fb9197b9f6261a993f21aaa", + "title": "Organizational Diagnosis: Six Places To Look for Trouble with or + Without a Theory", "abstract": "This article presents a practice theory for + diagnosing organizations -that is, a combination of many ideas in a relatively + simple framework that can be applied in various settings. It brings together + organization/environ ment, sociotechnical, and formal/informal systems concepts, + and pro poses six broad categories for looking at an organization: purposes; + struc ture ; relationships; rewards; leadership; and helpful mechanisms. The + author illustrates how these six factors influence each other and provides + clues about what to diagnose in each category, considering the infinite number + of possibilities. He also suggests that what are called \"process\" issues + show up as blocked work that can be freed by understanding and intervening + in one or more of the six boxes.", "venue": "", "year": 1976, "referenceCount": + 29, "citationCount": 247, "influentialCitationCount": 11, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Sociology"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1976-12-01", "journal": + {"name": "Group & Organization Management", "pages": "430 - 447", "volume": + "1"}, "authors": [{"authorId": "14704304", "name": "M. Weisbord"}]}, {"paperId": + "42350ff09ef0951099ddff481ba95edc2874cb16", "externalIds": {"DBLP": "journals/jacm/Case71", + "MAG": "1975010759", "DOI": "10.1145/321650.321651", "CorpusId": 16139321}, + "corpusId": 16139321, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42350ff09ef0951099ddff481ba95edc2874cb16", "title": "A Note on Degrees of Self-Describing Turing Machines", "abstract": "Certain automata which build other automata are considered. Each such automaton contains a Turing machine. The properties of the Turing machine, of an offspring @@ -23205,125 +26399,136 @@ interactions: decision problems have successively better partial algorithmic solutions which can be obtained algorithmically.", "venue": "JACM", "year": 1971, "referenceCount": 18, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1971-07-01", "journal": {"name": "J. ACM", "pages": "329-338", "volume": - "18"}, "authors": [{"authorId": "118163360", "name": "J. Case"}]}, {"paperId": - "e9609d3255b771887507785e5e4f5d39bd06ce84", "externalIds": {"MAG": "2162656310", - "DOI": "10.1177/003368820303400103", "CorpusId": 146350694}, "url": "https://www.semanticscholar.org/paper/e9609d3255b771887507785e5e4f5d39bd06ce84", - "title": "Eil Curriculum Development", "abstract": "In this paper the author - argues that current changes in the nature of English and English language - learners warrants a re-evaluation of two widely accepted notions of ELT curriculum - development, namely, that the goal of English learning is native speaker competence - and that native speaker cul ture should inform instructional materials and - teaching methods. Recogniz ing the current status of English as an international - language (EIL), the author describes central features of an international - language and how these influence the relationship between language and culture. - The paper then proceeds to demonstrate how native speaker models and culture - need to be carefully examined in reference to EIL curriculum development.", - "venue": "", "year": 2003, "referenceCount": 19, "citationCount": 130, "influentialCitationCount": - 19, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Linguistics", - "source": "s2-fos-model"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-04-01", "journal": - {"name": "RELC Journal", "pages": "31 - 47", "volume": "34"}, "authors": [{"authorId": - "71960707", "name": "S. Mckay"}]}, {"paperId": "3d523d3f5fe7e1b24d84234e2b9a6567c0b0f797", - "externalIds": {"MAG": "2134233117", "DOI": "10.1063/1.2397073", "CorpusId": - 9479679, "PubMed": "17144685"}, "url": "https://www.semanticscholar.org/paper/3d523d3f5fe7e1b24d84234e2b9a6567c0b0f797", - "title": "A graph-theoretic method for detecting potential Turing bifurcations.", - "abstract": "The conditions for diffusion-driven (Turing) instabilities in - systems with two reactive species are well known. General methods for detecting - potential Turing bifurcations in larger reaction schemes are, on the other - hand, not well developed. We prove a theorem for a graph-theoretic condition - originally given by Volpert and Ivanova [Mathematical Modeling (Nauka, Moscow, - 1987) (in Russian), p. 57] for Turing instabilities in a mass-action reaction-diffusion - system involving n substances. The method is based on the representation of - a reaction mechanism as a bipartite graph with two types of nodes representing - chemical species and reactions, respectively. The condition for diffusion-driven - instability is related to the existence of a structure in the graph known - as a critical fragment. The technique is illustrated using a substrate-inhibited - bifunctional enzyme mechanism which involves seven chemical species.", "venue": - "Journal of Chemical Physics", "year": 2006, "referenceCount": 62, "citationCount": - 29, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-11-22", "journal": {"name": "The - Journal of chemical physics", "pages": "\n 204102\n ", "volume": - "125 20"}, "authors": [{"authorId": "3291335", "name": "Maya Mincheva"}, {"authorId": - "2535009", "name": "M. Roussel"}]}, {"paperId": "9021358a8dd1443cebfdc6e45cafd0cc33e61f26", - "externalIds": {"MAG": "1989481315", "DOI": "10.1177/017084069401500602", - "CorpusId": 143721170}, "url": "https://www.semanticscholar.org/paper/9021358a8dd1443cebfdc6e45cafd0cc33e61f26", - "title": "Institutional Pressures and Isomorphic Change: An Empirical Test", - "abstract": "This paper examines the process of isomorphic change. It does - so by examin ing the dynamics of the change process and looking at change - holistically. Using a population of 36 national-level sport organizations, - subject to environ mental pressures from a state agency to adopt a more professional - and bureau cratic design, the paper shows that over time there is an increase - in the level of homogeneity of these organizations. Although the general shift - is to a more professional and bureaucratic type of organization, certain elements - of struc ture do not change as much as others, thus demonstrating resistance - to institu tional pressures. The processes by which the changes that occurred - took place are explored.", "venue": "", "year": 1994, "referenceCount": 43, - "citationCount": 271, "influentialCitationCount": 17, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1994-11-01", "journal": - {"name": "Organization Studies", "pages": "803 - 827", "volume": "15"}, "authors": - [{"authorId": "49660065", "name": "T. Slack"}, {"authorId": "3335139", "name": - "B. Hinings"}]}, {"paperId": "1707c9d43c31d6475f1548b98b4a557ea592fc40", "externalIds": - {"MAG": "2087699091", "DBLP": "journals/logcom/Zheng03", "DOI": "10.1093/logcom/13.2.159", - "CorpusId": 17263806}, "url": "https://www.semanticscholar.org/paper/1707c9d43c31d6475f1548b98b4a557ea592fc40", - "title": "On the Turing Degrees of Weakly Computable Real Numbers", "abstract": - "The Turing degree of a real number x is defined as the Turing degree of its - binary expansion. This definition is quite natural and robust. In this paper - we discuss some basic degree properties of semi-computable and weakly computable - real numbers introduced by Weihrauch and Zheng [19]. Among others we show - that, there are two real numbers of c.e. binary expansions such that their - difference does not have an \u03c9.c.e. Turing degree.", "venue": "Journal - of Logic and Computation", "year": 2003, "referenceCount": 21, "citationCount": - 21, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-04-01", "journal": {"name": "J. Log. Comput.", "pages": "159-172", "volume": - "13"}, "authors": [{"authorId": "36711028", "name": "Xizhong Zheng"}]}, {"paperId": - "205de126d6d2532887f1ba5b1a55ffbc5a20d0b1", "externalIds": {"MAG": "1967219734", - "DBLP": "conf/stoc/Simon81", "DOI": "10.1145/800076.802469", "CorpusId": 17225421}, - "url": "https://www.semanticscholar.org/paper/205de126d6d2532887f1ba5b1a55ffbc5a20d0b1", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1971-07-01", "journal": {"name": "J. ACM", "pages": "329-338", + "volume": "18"}, "authors": [{"authorId": "118163360", "name": "J. Case"}]}, + {"paperId": "da173b19205747eceb603e7d2618307415e3e706", "externalIds": {"MAG": + "1968630830", "DBLP": "journals/ai/ColbyHWK72", "DOI": "10.1016/0004-3702(72)90049-5", + "CorpusId": 31542633}, "corpusId": 31542633, "publicationVenue": {"id": "96018464-22dc-4b5c-a172-c2f4a30ce131", + "name": "Artificial Intelligence", "type": "journal", "alternate_names": ["Artif + Intell"], "issn": "0004-3702", "alternate_issns": ["2633-1403", "2710-1673", + "2710-1681"], "url": "http://www.elsevier.com/locate/artint", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/00043702", "https://www.journals.elsevier.com/artificial-intelligence"]}, + "url": "https://www.semanticscholar.org/paper/da173b19205747eceb603e7d2618307415e3e706", + "title": "Turing-like Indistinguishability Tests for the Calidation of a Computer + Simulation of Paranoid Processes", "abstract": null, "venue": "Artificial + Intelligence", "year": 1972, "referenceCount": 5, "citationCount": 121, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Artif. Intell.", "pages": "199-221", + "volume": "3"}, "authors": [{"authorId": "3123001", "name": "K. Colby"}, {"authorId": + "5981444", "name": "F. D. Hilf"}, {"authorId": "47864374", "name": "S. Weber"}, + {"authorId": "1921060", "name": "H. Kraemer"}]}, {"paperId": "205de126d6d2532887f1ba5b1a55ffbc5a20d0b1", + "externalIds": {"MAG": "1967219734", "DBLP": "conf/stoc/Simon81", "DOI": "10.1145/800076.802469", + "CorpusId": 17225421}, "corpusId": 17225421, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/205de126d6d2532887f1ba5b1a55ffbc5a20d0b1", "title": "Space-bounded probabilistic turing machine complexity classes are closed under complement (Preliminary Version)", "abstract": "For tape constructible functions S(n)\u2265log n, if a language L is accepted by an S(n) tape bounded probabilistic Turing machine, then there is an S(n) tape bounded probabilistic Turing machine that accepts &Lmarc;, the complement of L.", "venue": "Symposium on the Theory of Computing", "year": 1981, "referenceCount": 19, "citationCount": - 25, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1981-05-11", "journal": {"pages": - "158-167"}, "authors": [{"authorId": "143688145", "name": "Janos Simon"}]}, - {"paperId": "defa9bf463917f54b0348b35425691d52785891f", "externalIds": {"PubMedCentral": - "5504628", "MAG": "2163218935", "DOI": "10.1039/c5sc02317c", "CorpusId": 214843745, - "PubMed": "28717447"}, "url": "https://www.semanticscholar.org/paper/defa9bf463917f54b0348b35425691d52785891f", - "title": "Molecular computing: paths to chemical Turing machines", "abstract": - "In this perspective, we highlight some of the recent advances in the development - of molecular and biomolecular systems for performing logic operations and - computing. We also present a blueprint of a chemical Turing machine using - a processive catalytic approach.", "venue": "Chemical Science", "year": 2015, - "referenceCount": 98, "citationCount": 29, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-08-06", "journal": - {"name": "Chemical Science", "pages": "6050 - 6058", "volume": "6"}, "authors": - [{"authorId": "2049164834", "name": "S. Varghese"}, {"authorId": "5865958", - "name": "J. Elemans"}, {"authorId": "2433624", "name": "A. Rowan"}, {"authorId": - "51409252", "name": "R. Nolte"}]}, {"paperId": "5ba28396d4f75f362920bf939bbd703f593049b5", + 25, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1981-05-11", "journal": {"pages": "158-167"}, "authors": [{"authorId": "143688145", + "name": "Janos Simon"}]}, {"paperId": "fc89bca016bf74e929dada0594b672b2f98f5ef0", + "externalIds": {"MAG": "1989556826", "DOI": "10.13031/2013.34692", "CorpusId": + 108834126}, "corpusId": 108834126, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc89bca016bf74e929dada0594b672b2f98f5ef0", + "title": "ANSWERS: A Model for Watershed Planning", "abstract": "ABSTRACT + IN recent years, a greatly increased emphasis has been placed on improving + and maintaining the quality of our national water resources. Agencies and + individuals from the various levels of government, industry and private life + are seeking information concerning the ef-fects that land use, management, + and conservation prac-tices or structures might have on the quality and quantity + of water from both agricultural and non-agricultural watersheds. ANSWERS (Areal + Nonpoint Source Watershed En-vironment Response Simulation) was developed + in an ef-fort to supply the desired information described above for primarily + agricultural watersheds. The overall struc-ture consists of a hydrologic model, + a sediment detachment/transport model and several routing com-ponents necessary + to describe the movement of water in overland, subsurface and channel flow + phases. ANSWERS, unlike many large-scale watershed model structures, uses + distributed (rather than lumped) parameters and is event (rather than long-term) + oriented. These operational features generally yield a better understanding + of the hydrologic and water quality interactions involved in a watershed by + allowing the user to physically describe those processes both spatially and + temporally. The purpose of this report is to present the operational concepts, + the basic mathematical model used in ANSWERS, general data needs and user + considerations. In addition, the potential utility of ANSWERS as a plan-ning + tool is demonstrated by simulating several manage-ment alternatives for a + primarily agricultural watershed in northeastern Indiana subjected to several + different precipitation events.", "venue": "", "year": 1980, "referenceCount": + 6, "citationCount": 867, "influentialCitationCount": 40, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Transactions of the ASABE", "pages": "938-0944", + "volume": "23"}, "authors": [{"authorId": "35430713", "name": "D. Beasley"}, + {"authorId": "2627781", "name": "L. F. Huggins"}, {"authorId": "91181404", + "name": "E. Monke"}]}, {"paperId": "945070c7bf5d48a99fff7144455a3ef21a9773e9", + "externalIds": {"DBLP": "journals/jsyml/Given-WilsonJ11", "MAG": "2046825040", + "DOI": "10.2178/jsl/1309952521", "CorpusId": 12898505}, "corpusId": 12898505, + "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": + "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J + Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/945070c7bf5d48a99fff7144455a3ef21a9773e9", + "title": "A combinatory account of internal structure", "abstract": "Abstract + Traditional combinatory logic uses combinators S and K to represent all Turing-computable + functions on natural numbers, but there are Turing-computable functions on + the combinators themselves that cannot be so represented, because they access + internal structure in ways that S and K cannot. Much of this expressive power + is captured by adding a factorisation combinator F. The resulting SF-calculus + is structure complete, in that it supports all pattern-matching functions + whose patterns are in normal form, including a function that decides structural + equality of arbitrary normal forms. A general characterisation of the structure + complete, confluent combinatory calculi is given along with some examples. + These are able to represent all their Turing-computable functions whose domain + is limited to normal forms. The combinator F can be typed using an existential + type to represent internal type information.", "venue": "Journal of Symbolic + Logic (JSL)", "year": 2011, "referenceCount": 35, "citationCount": 34, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://opus.lib.uts.edu.au/bitstream/10453/14486/1/2010003973.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2011-09-01", "journal": {"name": "The Journal of Symbolic + Logic", "pages": "807 - 826", "volume": "76"}, "authors": [{"authorId": "1401782411", + "name": "Thomas Given-Wilson"}, {"authorId": "145365344", "name": "B. Jay"}]}, + {"paperId": "f50bb4e7cfe1cb3f4ad8f6a2d9f5ad5aa8e15192", "externalIds": {"MAG": + "1982435421", "DOI": "10.1103/PHYSREVLETT.90.118302", "CorpusId": 25208783, + "PubMed": "12688972"}, "corpusId": 25208783, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/f50bb4e7cfe1cb3f4ad8f6a2d9f5ad5aa8e15192", + "title": "Destabilization of Turing structures by electric fields.", "abstract": + "The dynamic behavior of hexagonal Turing patterns in the chlorine dioxide-iodine-malonic + acid reaction was studied in a newly developed open reactor under the influence + of externally applied weak directed current up to 17.5 mA. A transition from + stationary hexagonal patterns to spots moving parallel to the direction of + the applied electric field could be observed. The velocity of the drift increases + monotonously with the applied current. Experimental results could be qualitatively + reproduced in numerical simulations with a reaction-diffusion-advection model, + based on a realistic kinetic mechanism.", "venue": "Physical Review Letters", + "year": 2003, "referenceCount": 18, "citationCount": 29, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-03-21", "journal": {"name": "Physical review letters", "pages": "\n 118302\n ", + "volume": "90 11"}, "authors": [{"authorId": "48112240", "name": "B. Schmidt"}, + {"authorId": "3242769", "name": "P. De Kepper"}, {"authorId": "144424814", + "name": "S. M\u00fcller"}]}, {"paperId": "5ba28396d4f75f362920bf939bbd703f593049b5", "externalIds": {"MAG": "1899330423", "DOI": "10.5772/54223", "CorpusId": 14747604}, - "url": "https://www.semanticscholar.org/paper/5ba28396d4f75f362920bf939bbd703f593049b5", + "corpusId": 14747604, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5ba28396d4f75f362920bf939bbd703f593049b5", "title": "Comparison Between the Water and Salt Stress Effects on Plant Growth and Development", "abstract": "Abiotic stress limits crop productivity [1], and plays a major role in determining the distri\u2010 bution of plant species @@ -23336,15 +26541,17 @@ interactions: distinct abiotic stresses either concurrently or at different times through the growing season [2].", "venue": "", "year": 2013, "referenceCount": 107, "citationCount": 124, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}, {"category": "Agricultural And Food Sciences", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-01-16", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "40392179", - "name": "A. B. D. Oliveira"}, {"authorId": "7342364", "name": "N. L. M. Alencar"}, - {"authorId": "1402957714", "name": "E. Gomes-Filho"}]}, {"paperId": "de800fabc3158e2b5badad533957f1ccabf1297b", - "externalIds": {"MAG": "2141608805", "DOI": "10.1103/PHYSREVE.64.041909", - "CorpusId": 13636066, "PubMed": "11690054"}, "url": "https://www.semanticscholar.org/paper/de800fabc3158e2b5badad533957f1ccabf1297b", + "openAccessPdf": {"url": "https://www.intechopen.com/citation-pdf-url/41315", + "status": "HYBRID"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}, {"category": "Agricultural + And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2013-01-16", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "40392179", "name": "A. B. D. Oliveira"}, {"authorId": "7342364", + "name": "N. L. M. Alencar"}, {"authorId": "1402957714", "name": "E. Gomes-Filho"}]}, + {"paperId": "de800fabc3158e2b5badad533957f1ccabf1297b", "externalIds": {"MAG": + "2141608805", "DOI": "10.1103/PHYSREVE.64.041909", "CorpusId": 13636066, "PubMed": + "11690054"}, "corpusId": 13636066, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de800fabc3158e2b5badad533957f1ccabf1297b", "title": "Turing model for the patterns of lady beetles.", "abstract": "We simulate the patterns on the hard wings of lady beetles using a reaction-diffusion equation based on the Turing model. A part of a spherical surface is used @@ -23352,79 +26559,73 @@ interactions: lady beetles in Taiwan can be produced on this curved surface by adjusting the parameters of the model.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2001, "referenceCount": 0, "citationCount": - 43, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 43, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2001-09-21", "journal": {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 041909\n ", "volume": "64 4 Pt 1"}, "authors": [{"authorId": "32582426", "name": "S. Liaw"}, {"authorId": "2117953694", "name": "C. C. Yang"}, {"authorId": "2143537543", "name": "R. T. Liu"}, {"authorId": "2157231817", "name": "J. Hong"}]}, {"paperId": - "ed896b2e47c92d532d1184f29edef44d7103085a", "externalIds": {"MAG": "2110256471", - "DOI": "10.1117/1.2931681", "CorpusId": 56109577}, "url": "https://www.semanticscholar.org/paper/ed896b2e47c92d532d1184f29edef44d7103085a", - "title": "Corner detector based on global and local curvature properties", - "abstract": "This paper proposes a curvature-based corner detector that detects - both fine and coarse features accurately at low computational cost. First, - it extracts contours from a Canny edge map. Second, it com- putes the absolute - value of curvature of each point on a contour at a low scale and regards local - maxima of absolute curvature as initial corner candidates. Third, it uses - an adaptive curvature threshold to remove round corners from the initial list. - Finally, false corners due to quantiza- tion noise and trivial details are - eliminated by evaluating the angles of corner candidates in a dynamic region - of support. The proposed detector was compared with popular corner detectors - on planar curves and gray- level images, respectively, in a subjective manner - as well as with a fea- ture correspondence test. Results reveal that the proposed - detector per- forms extremely well in both fields. \u00a9 2008 Society of - Photo-Optical", "venue": "", "year": 2008, "referenceCount": 40, "citationCount": - 248, "influentialCitationCount": 27, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2008-05-01", "journal": {"name": - "Optical Engineering", "pages": "057008", "volume": "47"}, "authors": [{"authorId": - "4039776", "name": "X. He"}, {"authorId": "144465628", "name": "N. Yung"}]}, - {"paperId": "3b65a3424e9ceb2df7318a43fd23ad3ce7b044d4", "externalIds": {"MAG": - "2142033633", "DOI": "10.3938/JKPS.50.234", "CorpusId": 34700894}, "url": - "https://www.semanticscholar.org/paper/3b65a3424e9ceb2df7318a43fd23ad3ce7b044d4", - "title": "Oscillatory Turing Patterns in a Simple Reaction-Diffusion System", - "abstract": "Turing suggested that, under certain conditions, chemicals can - react and diffuse in such a way as to produce steady-state inhomogeneous spatial - patterns of chemical concentrations. We consider a simple two-variable reaction-diffusion - system and find there is a spatio-temporally oscillating solution (STOS) in - parameter regions where linear analysis predicts a pure Turing instability - and no Hopf instability. We compute the boundary of the STOS and spatially - non-uniform solution (SSNS) regions and investigate what features control - its behavior.", "venue": "", "year": 2007, "referenceCount": 20, "citationCount": - 28, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2007-01-15", "journal": {"name": "Journal of the - Korean Physical Society", "pages": "234", "volume": "50"}, "authors": [{"authorId": - "50268394", "name": "R. Liu"}, {"authorId": "32582426", "name": "S. Liaw"}, - {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": "014675a49aecc1488fb9197b9f6261a993f21aaa", - "externalIds": {"MAG": "2096830445", "DOI": "10.1177/105960117600100405", - "CorpusId": 116601603}, "url": "https://www.semanticscholar.org/paper/014675a49aecc1488fb9197b9f6261a993f21aaa", - "title": "Organizational Diagnosis: Six Places To Look for Trouble with or - Without a Theory", "abstract": "This article presents a practice theory for - diagnosing organizations -that is, a combination of many ideas in a relatively - simple framework that can be applied in various settings. It brings together - organization/environ ment, sociotechnical, and formal/informal systems concepts, - and pro poses six broad categories for looking at an organization: purposes; - struc ture ; relationships; rewards; leadership; and helpful mechanisms. The - author illustrates how these six factors influence each other and provides - clues about what to diagnose in each category, considering the infinite number - of possibilities. He also suggests that what are called \"process\" issues - show up as blocked work that can be freed by understanding and intervening - in one or more of the six boxes.", "venue": "", "year": 1976, "referenceCount": - 29, "citationCount": 247, "influentialCitationCount": 11, "isOpenAccess": - false, "fieldsOfStudy": ["Physics", "Sociology"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Sociology", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1976-12-01", "journal": {"name": "Group & Organization - Management", "pages": "430 - 447", "volume": "1"}, "authors": [{"authorId": - "14704304", "name": "M. Weisbord"}]}, {"paperId": "36dc1835202f7afb3961b396a76ba8f3cf18ba6d", + "3012f2504ddb9d527ad57a56561f4f72aa04285c", "externalIds": {"MAG": "1566710022", + "CorpusId": 54125748}, "corpusId": 54125748, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3012f2504ddb9d527ad57a56561f4f72aa04285c", + "title": "How to Pass the Turing Test by Cheating", "abstract": "Back in the + heyday of computer hardware, some notable people actually believed that sentient + computer programs were literally just around the corner. This prompted the + great British mathemetician, Alan Turing, to devise a simple test of intelligence. + If a computer program could pass the Turing test, then it could be said to + be exhibiting intelligence. In 1991, the Cambridge Centre for Behavioural + Studies held the first formal instantiation of the Turing Test. In this incarnation + the test was known as the Loebner contest, as Dr. Hugh Loebner pledged a $100,000 + grand prize for the first computer program to pass the test. I have submitted + two computer programs to the 1996 Loebner contest, which is to be held on + Friday April 19 in New York city. These computer programs are nothing more + than glorious hacks, but in constructing them I have learned a great deal + about how language works. In this paper I will describe in detail how my computer + programs work, and will make comparisons with similar computer programs such + as ELIZA. After this, I will explain why the Loebner contest is doomed to + failure.", "venue": "", "year": 1997, "referenceCount": 15, "citationCount": + 44, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2537971", + "name": "Jason L. Hutchens"}]}, {"paperId": "b99e28bf59a8d0b327ad64b18661544cf3e99108", + "externalIds": {"MAG": "1975217814", "DOI": "10.1109/mcd.2004.1317948", "CorpusId": + 28628444}, "corpusId": 28628444, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b99e28bf59a8d0b327ad64b18661544cf3e99108", + "title": "Problem solving in automata, languages, and complexity", "abstract": + "Preface. Leverages. Finite Automata. Context-Free Languages. Turing Machines. + Computability Theory. Computational Complexity. NP-Completeness. References. + Index.", "venue": "IEEE Circuits and Devices Magazine", "year": 2001, "referenceCount": + 0, "citationCount": 36, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2001-09-15", "journal": {"name": "IEEE Circuits and Devices Magazine", "pages": + "31-31", "volume": "20"}, "authors": [{"authorId": "1405625001", "name": "Ding-Zhu + Du"}, {"authorId": "1704334", "name": "K. Ko"}]}, {"paperId": "03a9097077cebac0786f2d889b9ff661aab1e708", + "externalIds": {"MAG": "2034636167", "DBLP": "journals/jacm/BoyerM84", "DOI": + "10.1145/828.1882", "CorpusId": 19592599}, "corpusId": 19592599, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/03a9097077cebac0786f2d889b9ff661aab1e708", + "title": "A Mechanical Proof of the Unsolvability of the Halting Problem", + "abstract": "Abstract : The authors describe a proof by a computer program + of the unsolvability of the halting problem. The halting problem is posed + in a constructive, formal language. The computational paradigm formalized + is Pure LISP, not Turing machines. They believe this is the first instance + of a machine proving that a given problem is not solvable by machine.", "venue": + "JACM", "year": 1984, "referenceCount": 14, "citationCount": 64, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/828.1882", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1984-06-26", "journal": {"name": "J. ACM", "pages": "441-458", "volume": + "31"}, "authors": [{"authorId": "2404260", "name": "R. Boyer"}, {"authorId": + "12725412", "name": "J. S. Moore"}]}, {"paperId": "36dc1835202f7afb3961b396a76ba8f3cf18ba6d", "externalIds": {"MAG": "2325319182", "DOI": "10.2307/2096210", "CorpusId": - 147535178}, "url": "https://www.semanticscholar.org/paper/36dc1835202f7afb3961b396a76ba8f3cf18ba6d", + 147535178}, "corpusId": 147535178, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/36dc1835202f7afb3961b396a76ba8f3cf18ba6d", "title": "VISIBLE COLLEGES: THE SOCIAL AND CONCEPTUAL STRUCTURE OF SOCIOLOGY SPECIALTIES*", "abstract": "We examine the structure of sociology using data on overlapping memberships in the disci- pline''s \"visible colleges, \" the @@ -23455,336 +26656,150 @@ interactions: Association (ASA), we construct visual representations of the struc- ture of sociology. We then interpret this struc- ture, drawing on independent measures of sec-", "venue": "", "year": 1992, "referenceCount": 34, "citationCount": - 73, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1992-04-01", "journal": {"name": "American Sociological - Review", "pages": "266", "volume": "57"}, "authors": [{"authorId": "21155633", - "name": "Charles L. Cappell"}, {"authorId": "2750205", "name": "T. Guterbock"}]}, - {"paperId": "7a6100e739be584e95bdcf02a6e6eb581462da14", "externalIds": {"CorpusId": - 5640696}, "url": "https://www.semanticscholar.org/paper/7a6100e739be584e95bdcf02a6e6eb581462da14", - "title": "The chemical theory of 185 . morphogenesis Universal Turing Machine", - "abstract": "In recent years, much research has been devoted to the simulation - of forward-error correction; however, few have investigated the synthesis - of information retrieval syste ms. In this position paper, we argue the synthesis - of hierarchical databases, which embodies the compelling principles of evoting - technology. In this position paper, we use collabora tive configurations to - verify that the much-tauted replicated al gorithm for the study of consistent - hashing by Michael O. Rabin runs in\u03a9(n) time.", "venue": "", "year": - 2011, "referenceCount": 247, "citationCount": 50, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "f7e85315a740ccb06924e4b01dcd8804065f9c20", - "externalIds": {"MAG": "1994077918", "DBLP": "journals/jacm/Perlis67", "DOI": - "10.1145/321371.321372", "CorpusId": 12937998}, "url": "https://www.semanticscholar.org/paper/f7e85315a740ccb06924e4b01dcd8804065f9c20", - "title": "The Synthesis of Algorithmic Systems", "abstract": "On what does - the fame of Turing rest? That he proved a theorem showing that for a general - computing device later dubbed a \"Turing machine\" -there existed functions - which it could not compute? I doubt it. More likely it is because of the model - he invented and employed: his formal mechanism. This~ model has captured the - imagination and mobilized the thoughts of a generation Of scientists. It has - provided a base for arguments leading to theories. His model has proved so - useful that its generated activity has been distributed not only in mathematics, - but through several technologies as well. The arguments employed were not - always formal and the consequent creations were not all abstract. Indeed a - most fruitful consequence of the Turing machine has been with the creation, - study, and computation of functions which are computable, i.e., in computer - programming. I am sure that all here will agree that this model has been enormously - valuable. History will forgive me for not devoting any attention in this lecture - to the affect which Turing had on the development of the general purpose digital - computer which has further accelerated our involvement with the theory and - practice of computation. Since the appearance of Turing''s model there have - been others which have concerned and benefited us in computing. I think that - only one has had an affect like Turing''s: the formal mechanism called ALGOL. - Many will immediately disagree, pointing out that too few of us have understood - it or used it. While such has unhappily been the case, it is not the point. - The impulse given to the development of research in computer science is relevant - while the number of adherents is not. ALGOL has mobilized our thoughts and - has provided us a base for our arguments. I have long puzzled over why ALGOL - has been such a useful model in our field. Perhaps some of the reasons are:", - "venue": "JACM", "year": 1967, "referenceCount": 0, "citationCount": 29, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 73, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1992-04-01", "journal": {"name": + "American Sociological Review", "pages": "266", "volume": "57"}, "authors": + [{"authorId": "21155633", "name": "Charles L. Cappell"}, {"authorId": "2750205", + "name": "T. Guterbock"}]}, {"paperId": "d879ec775495a789a1622811e04ad6b206c9d850", + "externalIds": {"MAG": "2097071540", "DOI": "10.1051/AGRO:19980501", "CorpusId": + 59129924}, "corpusId": 59129924, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d879ec775495a789a1622811e04ad6b206c9d850", + "title": "STICS : a generic model for the simulation of crops and their water + and nitrogen balances. I. Theory, and parameterization applied to wheat and + corn", "abstract": "STICS (Simulateur mulTJdiscplinaire pour les Cultures + Standard) is a crop model constructed as a simula- tion tool capable of working + under agricultural conditions. Outputs comprise the production (amount and + quality) and the environment. Inputs take into account the climate, the soi1 + and the cropping system. STICS is presented as a model exhibiting the following + qualities: robustness, an easy access to inputs and an uncomplicated f~~ture + evolution thanks to a modular (easy adaptation to various types of plant) + nature and generic. However, STICS is not an entirely new model since most + parts use classic formalisms or stem from existing models. The main simulated + processes are the growth, the development of the crop and the water and nitrogenous + balance of the soil-crop system. The seven modules of STICS - development, + shoot growth, yield components, root growth, water balance, thermal environment + and nitrogen balance - are presented in tum with a discussion about the theoretical + choices in comparison to other models. These choices should render the model + capable of exhibiting the announced qualities in classic environmental contexts. + However, because some processes (e.g. ammoniac volatilization, clrought resistance, + etc.) are not taken into account, the use of STICS is presently limited to + several cropping systems. (O InraIElsevier, Paris.) crop modelling / wheat + / corn / water balance / nitrogen balance", "venue": "", "year": 1998, "referenceCount": + 184, "citationCount": 793, "influentialCitationCount": 60, "isOpenAccess": + true, "openAccessPdf": {"url": "http://www.agronomy-journal.org/articles/agro/pdf/1998/05/Agronomie_0249-5627_1998_18_5-6_ART0001.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Agricultural + And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Agronomie", "pages": "311-346", + "volume": "18"}, "authors": [{"authorId": "38790799", "name": "N. Brisson"}, + {"authorId": "145203365", "name": "B. Mary"}, {"authorId": "37776542", "name": + "D. Ripoche"}, {"authorId": "87016684", "name": "M. Jeuffroy"}, {"authorId": + "50361447", "name": "F. Ruget"}, {"authorId": "5013988", "name": "B. Nicoullaud"}, + {"authorId": "67257350", "name": "P. Gate"}, {"authorId": "1422450571", "name": + "F. Devienne-Barret"}, {"authorId": "2093848045", "name": "R. Antonioletti"}, + {"authorId": "3361730", "name": "C. D\u00fcrr"}, {"authorId": "71446502", + "name": "G. Richard"}, {"authorId": "34164773", "name": "N. Beaudoin"}, {"authorId": + "5857379", "name": "S. Recous"}, {"authorId": "2100288896", "name": "Xavier + Tayot"}, {"authorId": "6920014", "name": "D. Pl\u00e9net"}, {"authorId": "3344305", + "name": "P. Cellier"}, {"authorId": "21631542", "name": "J. Machet"}, {"authorId": + "46620245", "name": "J. Meynard"}, {"authorId": "12285465", "name": "R. Del\u00e9colle"}]}, + {"paperId": "19d178c72c2fdd33c25760d0fa7db92198db2b18", "externalIds": {"MAG": + "2952798347", "DBLP": "journals/mst/BienvenuDS09", "ArXiv": "cs/0701089", + "DOI": "10.1007/s00224-009-9170-1", "CorpusId": 13701100}, "corpusId": 13701100, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/19d178c72c2fdd33c25760d0fa7db92198db2b18", + "title": "Constructive Dimension and Turing Degrees", "abstract": null, "venue": + "Theory of Computing Systems", "year": 2007, "referenceCount": 41, "citationCount": + 17, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/cs/0701089", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2007-01-14", "journal": {"name": "Theory + of Computing Systems", "pages": "740-755", "volume": "45"}, "authors": [{"authorId": + "1713248", "name": "L. Bienvenu"}, {"authorId": "145586123", "name": "David + Doty"}, {"authorId": "1699450", "name": "F. Stephan"}]}, {"paperId": "b103e87c7727134927d3ffb06934a95c10c02fc0", + "externalIds": {"DBLP": "journals/mima/FloridiC20", "MAG": "3095319910", "DOI": + "10.1007/s11023-020-09548-1", "CorpusId": 228954221}, "corpusId": 228954221, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b103e87c7727134927d3ffb06934a95c10c02fc0", + "title": "GPT-3: Its Nature, Scope, Limits, and Consequences", "abstract": + null, "venue": "Minds Mach.", "year": 2020, "referenceCount": 33, "citationCount": + 250, "influentialCitationCount": 10, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007/s11023-020-09548-1.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "J. ACM", "pages": "1-9", "volume": - "14"}, "authors": [{"authorId": "1790022", "name": "A. Perlis"}]}, {"paperId": - "f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", "externalIds": {"MAG": "1882313281", - "DOI": "10.1075/aicr.34.04har", "CorpusId": 143324564}, "url": "https://www.semanticscholar.org/paper/f1b0e2aa7d6c54d9d994922d62b95d756e0665e7", - "title": "Turing Indistinguishability and the Blind Watchmaker", "abstract": - "Many special problems crop up when evolutionary theory turns, quite naturally, - to the question of the adaptive value and causal role of consciousness in - human and nonhuman organisms. One problem is that -- unless we are to be dualists, - treating it as an independent nonphysical force -- consciousness could not - have had an independent adaptive function of its own, over and above whatever - behavioral and physiological functions it \"supervenes\" on, because evolution - is completely blind to the difference between a conscious organism and a functionally - equivalent (Turing Indistinguishable) nonconscious \"Zombie\" organism: In - other words, the Blind Watchmaker, a functionalist if ever there was one, - is no more a mind reader than we are. Hence Turing-Indistinguishability = - Darwin-Indistinguishability. It by no means follows from this, however, that - human behavior is therefore to be explained only by the push-pull dynamics - of Zombie determinism, as dictated by calculations of \"inclusive fitness\" - and \"evolutionarily stable strategies.\" We are conscious, and, more important, - that consciousness is piggy-backing somehow on the vast complex of unobservable - internal activity -- call it \"cognition\" -- that is really responsible for - generating all of our behavioral capacities. Hence, except in the palpable - presence of the irrational (e.g., our sexual urges) where distal Darwinian - factors still have some proximal sway, it is as sensible to seek a Darwinian - rather than a cognitive explanation for most of our current behavior as it - is to seek a cosmological rather than an engineering explanation of an automobile''s - behavior. Let evolutionary theory explain what shaped our cognitive capacity - (Steklis & Harnad 1976; Harnad 1996, but let cognitive theory explain our - resulting behavior.", "venue": "", "year": 2002, "referenceCount": 34, "citationCount": - 28, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-04-08", - "journal": {"name": "", "pages": "3-18", "volume": ""}, "authors": [{"authorId": - "2293327", "name": "S. Harnad"}]}, {"paperId": "6df2435ad7cbc5f23044779df9f8b6ec50e14b2a", - "externalIds": {"MAG": "2004808014", "DOI": "10.3354/MEPS07182", "CorpusId": - 600504}, "url": "https://www.semanticscholar.org/paper/6df2435ad7cbc5f23044779df9f8b6ec50e14b2a", - "title": "Consequences of increased temperature and CO2 for phytoplankton - community structure in the Bering Sea", "abstract": "Global climate change - is predicted to have large effects on the ocean that could cause shifts in - current algal community structure, major nutrient cycles, and carbon export. - The Bering Sea is already experiencing changes in sea surface temperature - (SST), unprecedented algal blooms, and alterations to trophic level dynamics. - We incubated phytoplankton communities from 2 Bering Sea regimes under conditions - of elevated SST and/or partial pressure of carbon dioxide (pCO2) similar to - predicted values for 2100. In our ''greenhouse ocean'' simulations, maximum - biomass-normalized photosynthetic rates increased 2.6 to 3.5 times and community - composition shifted away from diatoms and towards nanophytoplankton. These - changes were driven largely by elevated tempera- ture, with secondary effects - from increased pCO2. If these results are indicative of future climate responses, - community shifts towards nanophytoplankton dominance could reduce the ability - of the Bering Sea to maintain the productive diatom-based food webs that currently - support one of the world''s most productive fisheries.", "venue": "", "year": - 2007, "referenceCount": 33, "citationCount": 243, "influentialCitationCount": - 12, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2007-12-20", "journal": {"name": "Marine Ecology Progress Series", "pages": - "9-16", "volume": "352"}, "authors": [{"authorId": "87022738", "name": "C. - E. Hare"}, {"authorId": "46737800", "name": "K. Leblanc"}, {"authorId": "5227711", - "name": "G. DiTullio"}, {"authorId": "1739716", "name": "R. Kudela"}, {"authorId": - "2118390795", "name": "Yaohong Zhang"}, {"authorId": "2111214614", "name": - "Peter A. Lee"}, {"authorId": "87437890", "name": "S. F. Riseman"}, {"authorId": - "153837627", "name": "D. Hutchins"}]}, {"paperId": "fa11e37b04cbf4eb55145fa5ac0f632c291b12aa", - "externalIds": {"CorpusId": 11565012}, "url": "https://www.semanticscholar.org/paper/fa11e37b04cbf4eb55145fa5ac0f632c291b12aa", - "title": "The Turing Test : The First Fifty Years", "abstract": "The Turing - Test, originally proposed as a simple operational definition of intelligence, - has now been with us for exactly half a century. It is safe to say that no - other single article in computer science, and few other articles in science - in general, have generated so much discussion. The present article chronicles - the comments and controversy surrounding Turing\u2019s classic article from - its publication to the present. The changing perception of the Turing Test - over the last fifty years has paralleled the changing attitudes in the scientific - community towards artificial intelligence: from the unbridled optimism of - 1960\u2019s to the current realization of the immense difficulties that still - lie ahead. I conclude with the prediction that the Turing Test will remain - important, not only as a landmark in the history of the development of intelligent - machines, but also with real relevance to future generations of people living - in a world in which the cognitive capacities of machines will be vastly greater - than they are now.", "venue": "", "year": 2000, "referenceCount": 45, "citationCount": - 27, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2440747", "name": "R. French"}, {"authorId": "52070849", "name": - "Alan Mathison"}]}, {"paperId": "c47c6320cbbeae7e9a1469b2ed480422aeb5bc2a", - "externalIds": {"MAG": "2156382870", "DOI": "10.1177/036354659602400422", - "CorpusId": 45284710, "PubMed": "8827317"}, "url": "https://www.semanticscholar.org/paper/c47c6320cbbeae7e9a1469b2ed480422aeb5bc2a", - "title": "Meniscal Repair Supplemented With Exogenous Fibrin Clot and Autogenous - Cultured Marrow Cells in the Goat Model", "abstract": "This study was undertaken - to evaluate the placement of fibrin clot and cultured autologous marrow cells - in surgically created, full-thickness, meniscal lesions in the avascular zone - in 32 female Spanish goats. The menisci were repaired with two vertically - oriented su tures (N = 8), exogenous fibrin clot was placed into the meniscal - defect before placement of the two sutures (N = 8), fibrin clot plus cultured - adherent bone marrow cells were placed in the defect (N = 8), or the meniscal - lesions were left unrepaired (N = 8). On gross and manual inspection, meniscal - lesions showed some de gree of healing in all animals except for the eight - unrepaired lesions. All the experimental specimens had decreased tensile strength - compared with the con tralateral control medial menisci. Ultimate load to - fail ure, energy absorbed to failure, and stiffness were less than 40% of - the controls for all groups. Histologic sections demonstrated focal cellular - areas consisting of giant cells and macrophages in the repair sites. Our observations - failed to demonstrate a statistically signif icant enhancement of healing - with the use of exoge nous fibrin clot compared with vertically oriented su - tures alone. The addition of cultured adherent autologous bone marrow-derived - cells in conjunction with the fibrin clot did not enhance the meniscal healing.", - "venue": "The American journal of sports medicine", "year": 1996, "referenceCount": - 33, "citationCount": 103, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1996-07-01", "journal": - {"name": "The American Journal of Sports Medicine", "pages": "547 - 555", - "volume": "24"}, "authors": [{"authorId": "2058303501", "name": "J. Port"}, - {"authorId": "39531679", "name": "D. W. Jackson"}, {"authorId": "152240991", - "name": "T. Lee"}, {"authorId": "46773644", "name": "T. Simon"}]}, {"paperId": - "7e9ff71d9305ac0baee458e1ee52216d87705f6b", "externalIds": {"MAG": "1650957208", - "DOI": "10.1088/2058-7058/11/3/32", "CorpusId": 116975308}, "url": "https://www.semanticscholar.org/paper/7e9ff71d9305ac0baee458e1ee52216d87705f6b", - "title": "Decoherence: the obstacle to quantum computation", "abstract": "Alan - Turing laid the foundation for the modern computer in 1936 when he introduced - the concept of a universal computer; now known as a Turing machine. But it - took another 10 years of research before the first electronic computer, the - ENIAC, was actually built by scientists at the University of Pennsylvania. - The ENIAC was capable of performing arithmetic on numbers Up to 10 digits - long.", "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 31, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-03-01", "journal": {"name": - "Physics World", "pages": "53-57", "volume": "11"}, "authors": [{"authorId": - "2804168", "name": "D. DiVincenzo"}, {"authorId": "2094968", "name": "B. Terhal"}]}, - {"paperId": "03a9097077cebac0786f2d889b9ff661aab1e708", "externalIds": {"MAG": - "2034636167", "DBLP": "journals/jacm/BoyerM84", "DOI": "10.1145/828.1882", - "CorpusId": 19592599}, "url": "https://www.semanticscholar.org/paper/03a9097077cebac0786f2d889b9ff661aab1e708", - "title": "A Mechanical Proof of the Unsolvability of the Halting Problem", - "abstract": "Abstract : The authors describe a proof by a computer program - of the unsolvability of the halting problem. The halting problem is posed - in a constructive, formal language. The computational paradigm formalized - is Pure LISP, not Turing machines. They believe this is the first instance - of a machine proving that a given problem is not solvable by machine.", "venue": - "JACM", "year": 1984, "referenceCount": 14, "citationCount": 64, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1984-06-26", "journal": {"name": "J. ACM", "pages": "441-458", "volume": - "31"}, "authors": [{"authorId": "2404260", "name": "R. Boyer"}, {"authorId": - "12725412", "name": "J. S. Moore"}]}, {"paperId": "ec3b28e255c1938f72b467ec5a0bb96fa78ea667", - "externalIds": {"MAG": "2038431675", "DOI": "10.1007/BF01009531", "CorpusId": - 120443794}, "url": "https://www.semanticscholar.org/paper/ec3b28e255c1938f72b467ec5a0bb96fa78ea667", - "title": "The search for Turing structures", "abstract": null, "venue": "", - "year": 1987, "referenceCount": 43, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1987-09-01", - "journal": {"name": "Journal of Statistical Physics", "pages": "1031-1044", - "volume": "48"}, "authors": [{"authorId": "92147854", "name": "P. Borckmans"}, - {"authorId": "49808656", "name": "G. Dewel"}, {"authorId": "4851082", "name": - "D. Walgraef"}, {"authorId": "2055973640", "name": "Y. Katayama"}]}, {"paperId": - "f50bb4e7cfe1cb3f4ad8f6a2d9f5ad5aa8e15192", "externalIds": {"MAG": "1982435421", - "DOI": "10.1103/PHYSREVLETT.90.118302", "CorpusId": 25208783, "PubMed": "12688972"}, - "url": "https://www.semanticscholar.org/paper/f50bb4e7cfe1cb3f4ad8f6a2d9f5ad5aa8e15192", - "title": "Destabilization of Turing structures by electric fields.", "abstract": - "The dynamic behavior of hexagonal Turing patterns in the chlorine dioxide-iodine-malonic - acid reaction was studied in a newly developed open reactor under the influence - of externally applied weak directed current up to 17.5 mA. A transition from - stationary hexagonal patterns to spots moving parallel to the direction of - the applied electric field could be observed. The velocity of the drift increases - monotonously with the applied current. Experimental results could be qualitatively - reproduced in numerical simulations with a reaction-diffusion-advection model, - based on a realistic kinetic mechanism.", "venue": "Physical Review Letters", - "year": 2003, "referenceCount": 18, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-03-21", "journal": - {"name": "Physical review letters", "pages": "\n 118302\n ", - "volume": "90 11"}, "authors": [{"authorId": "48112240", "name": "B. Schmidt"}, - {"authorId": "3242769", "name": "P. De Kepper"}, {"authorId": "144424814", - "name": "S. M\u00fcller"}]}, {"paperId": "19d178c72c2fdd33c25760d0fa7db92198db2b18", - "externalIds": {"MAG": "2952798347", "DBLP": "journals/mst/BienvenuDS09", - "ArXiv": "cs/0701089", "DOI": "10.1007/s00224-009-9170-1", "CorpusId": 13701100}, - "url": "https://www.semanticscholar.org/paper/19d178c72c2fdd33c25760d0fa7db92198db2b18", - "title": "Constructive Dimension and Turing Degrees", "abstract": null, "venue": - "Theory of Computing Systems", "year": 2007, "referenceCount": 41, "citationCount": - 17, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-01-14", "journal": {"name": "Theory - of Computing Systems", "pages": "740-755", "volume": "45"}, "authors": [{"authorId": - "1713248", "name": "L. Bienvenu"}, {"authorId": "145586123", "name": "David - Doty"}, {"authorId": "1699450", "name": "F. Stephan"}]}, {"paperId": "a81798ec4bb0b30ead61b0cbeb1a1a466636829d", - "externalIds": {"MAG": "3080357941", "DOI": "10.1021/acs.chemmater.0c02814", - "CorpusId": 225189536}, "url": "https://www.semanticscholar.org/paper/a81798ec4bb0b30ead61b0cbeb1a1a466636829d", - "title": "Abnormal Bi3+-Activated NIR Emission in Highly Symmetric XAl12O19 - (X = Ba, Sr, Ca) by Selective Sites Occupation", "abstract": "Near-infrared - light-emitting diodes (NIR-LEDs) have been a potential candidate in food composition - analysis, tempera-ture and security monitoring, biometrics, and medical applications. - To realize t...", "venue": "", "year": 2020, "referenceCount": 30, "citationCount": - 39, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2020-08-20", "journal": {"name": - "Chemistry of Materials", "volume": ""}, "authors": [{"authorId": "152410568", - "name": "Yi Wei"}, {"authorId": "49538778", "name": "Zhiyu Gao"}, {"authorId": - "1484281734", "name": "Xiaohan Yun"}, {"authorId": "144955350", "name": "Hang - Yang"}, {"authorId": "2108176426", "name": "Yixin Liu"}, {"authorId": "2108461707", - "name": "Guogang Li"}]}, {"paperId": "b99e28bf59a8d0b327ad64b18661544cf3e99108", - "externalIds": {"MAG": "1975217814", "DOI": "10.1109/mcd.2004.1317948", "CorpusId": - 28628444}, "url": "https://www.semanticscholar.org/paper/b99e28bf59a8d0b327ad64b18661544cf3e99108", - "title": "Problem solving in automata, languages, and complexity", "abstract": - "Preface. Leverages. Finite Automata. Context-Free Languages. Turing Machines. - Computability Theory. Computational Complexity. NP-Completeness. References. - Index.", "venue": "IEEE Circuits and Devices Magazine", "year": 2001, "referenceCount": - 0, "citationCount": 36, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-09-15", - "journal": {"name": "IEEE Circuits and Devices Magazine", "pages": "31-31", - "volume": "20"}, "authors": [{"authorId": "1405625001", "name": "Ding-Zhu - Du"}, {"authorId": "1704334", "name": "K. Ko"}]}, {"paperId": "ea3a1edb45702252891b7816695c2cdea4711cf6", - "externalIds": {"MAG": "2008061806", "DOI": "10.1016/0375-9601(95)00926-4", - "CorpusId": 119400783}, "url": "https://www.semanticscholar.org/paper/ea3a1edb45702252891b7816695c2cdea4711cf6", - "title": "Hexagon and stripe Turing structures in a gas discharge system", - "abstract": null, "venue": "", "year": 1996, "referenceCount": 14, "citationCount": - 54, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1996-02-12", "journal": {"name": "Physics Letters A", - "pages": "184-190", "volume": "211"}, "authors": [{"authorId": "3227869", - "name": "Y. Astrov"}, {"authorId": "91977538", "name": "E. Ammelt"}, {"authorId": - "102751350", "name": "S. Teperick"}, {"authorId": "91811809", "name": "H. - Purwins"}]}, {"paperId": "00f3bb0591f56c6bc735d8d912d0769944005cda", "externalIds": - {"DBLP": "journals/fuin/BurginE09", "MAG": "1512266229", "DOI": "10.3233/FI-2009-0033", - "CorpusId": 42860966}, "url": "https://www.semanticscholar.org/paper/00f3bb0591f56c6bc735d8d912d0769944005cda", - "title": "Universality for Turing Machines, Inductive Turing Machines and - Evolutionary Algorithms", "abstract": "The aim of this paper is the development - of foundations for evolutionary computations. To achieve this goal, a mathematical - model of evolutionary automata is introduced and studied. The main classes - of evolutionary automata considered in this paper are evolutionary Turing - machines and evolutionary inductive Turing machines. Various subclasses and - modes of evolutionary computation are defined. Problems of existence of universal - objects in these classes are explored. Relations between Turing machines, - inductive Turing machines, evolutionary Turing machines, and evolutionary - inductive Turing machines are investigated.", "venue": "Fundam. Informaticae", - "year": 2009, "referenceCount": 18, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-04-03", "journal": {"name": "Fundam. Informaticae", - "pages": "53-77", "volume": "91"}, "authors": [{"authorId": "51006192", "name": - "M. Burgin"}, {"authorId": "2882381", "name": "E. Eberbach"}]}, {"paperId": - "af251b5f3a6a103b7512c3c8cc62403436ae8d6d", "externalIds": {"MAG": "2081299191", - "DBLP": "journals/jcss/Kadin89", "DOI": "10.1016/0022-0000(89)90024-X", "CorpusId": - 23446943}, "url": "https://www.semanticscholar.org/paper/af251b5f3a6a103b7512c3c8cc62403436ae8d6d", - "title": "P^(NP[O(log n)]) and Sparse Turing-Complete Sets for NP", "abstract": - null, "venue": "Journal of computer and system sciences (Print)", "year": - 1989, "referenceCount": 22, "citationCount": 114, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-12-01", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "282-298", - "volume": "39"}, "authors": [{"authorId": "30743227", "name": "Jim Kadin"}]}, - {"paperId": "df59104f706282f9e0e2cf1f328bf97052affa4e", "externalIds": {"MAG": - "3101610980", "ArXiv": "1408.2171", "DOI": "10.1090/S0002-9939-07-08648-0", - "CorpusId": 578779}, "url": "https://www.semanticscholar.org/paper/df59104f706282f9e0e2cf1f328bf97052affa4e", - "title": "Low for random reals and positive-measure domination", "abstract": - "The low for random reals are characterized topologically, as well as in terms - of domination of Turing functionals on a set of positive measure.", "venue": - "", "year": 2007, "referenceCount": 14, "citationCount": 40, "influentialCitationCount": - 8, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-11-01", - "journal": {"name": "", "pages": "3703-3709", "volume": "135"}, "authors": - [{"authorId": "1401914011", "name": "B. Kjos-Hanssen"}]}, {"paperId": "77d5577ff19235502dd9cf88c31202a3dc8876b4", + "publicationDate": "2020-11-01", "journal": {"name": "Minds and Machines", + "pages": "681-694", "volume": "30"}, "authors": [{"authorId": "1982425", "name": + "L. Floridi"}, {"authorId": "2037605322", "name": "Massimo Chiriatti"}]}, + {"paperId": "4261630f62ed4d787d9f4929d8c9bda9feae8bd5", "externalIds": {"MAG": + "76349267", "CorpusId": 16058513}, "corpusId": 16058513, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4261630f62ed4d787d9f4929d8c9bda9feae8bd5", + "title": "Jadex: Implementing a BDI-Infrastructure for JADE Agents", "abstract": + "INTELLIGENT AGENTS ARE A MODELLING PARADIGM, BASED ON THE NOTION OF AGENTS + WITH MENTAL STATES. THE AGENT METAPHOR IS NOWADAYS USED IN MANY RESEARCH AND + INDUSTRY PROJECTS, AND SEVERAL GENERIC AGENT PLATFORMS ARE AVAILABLE. NEVERTHELESS, + THERE IS A GAP BETWEEN PLATFORMS CONCENTRATING ON AGENT COMMUNI- CATION INFRASTRUCTURE + AND PLATFORMS CONCERNED WITH THE REPRESENTATION OF INTERNAL AGENT CONCEPTS. + THIS ARTICLE PRESENTS AN APPROACH TO BRIDGE THIS GAP: JADEX, AN ADD- ON TO + THE WIDELY USED JADE AGENT PLATFORM. THE ADD-ON FOLLOWS THE BDI ARCHITEC- + TURE, A WELL-KNOWN MODEL FOR REPRESENTING MENTALISTIC CONCEPTS IN THE SYSTEM + DESIGN AND IMPLEMENTATION. THE ARTICLE PROVIDES AN OVERVIEW OF THE BDI MODEL, + AND THE DESIGN AND REALIZATION IN JADEX, AS WELL AS THE INTEGRATION OF THE + ADD-ON INTO THE JADE AGENT FRAMEWORK.", "venue": "", "year": 2003, "referenceCount": + 17, "citationCount": 254, "influentialCitationCount": 19, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1764412", + "name": "L. Braubach"}, {"authorId": "1692146", "name": "W. Lamersdorf"}, + {"authorId": "1793305", "name": "A. Pokahr"}]}, {"paperId": "defa9bf463917f54b0348b35425691d52785891f", + "externalIds": {"PubMedCentral": "5504628", "MAG": "2163218935", "DOI": "10.1039/c5sc02317c", + "CorpusId": 214843745, "PubMed": "28717447"}, "corpusId": 214843745, "publicationVenue": + {"id": "2a0713ba-a4af-4a0a-ae49-81b8edeca660", "name": "Chemical Science", + "type": "journal", "alternate_names": ["Chem Sci", "Chem sci", "Chemical science"], + "issn": "2041-6520", "alternate_issns": ["1478-6524"], "url": "http://www.rsc.org/chemicalscience", + "alternate_urls": ["http://xlink.rsc.org/?genre=journal&journal_code=SC", + "http://www.rsc.org/is/journals/current/chemscience/chemscience.htm", "https://pubs.rsc.org/en/Content/ArticleLanding/2012/SC/c1sc00582k"]}, + "url": "https://www.semanticscholar.org/paper/defa9bf463917f54b0348b35425691d52785891f", + "title": "Molecular computing: paths to chemical Turing machines", "abstract": + "In this perspective, we highlight some of the recent advances in the development + of molecular and biomolecular systems for performing logic operations and + computing. We also present a blueprint of a chemical Turing machine using + a processive catalytic approach.", "venue": "Chemical Science", "year": 2015, + "referenceCount": 98, "citationCount": 29, "influentialCitationCount": 1, + "isOpenAccess": true, "openAccessPdf": {"url": "https://pubs.rsc.org/en/content/articlepdf/2015/sc/c5sc02317c", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-08-06", "journal": + {"name": "Chemical Science", "pages": "6050 - 6058", "volume": "6"}, "authors": + [{"authorId": "2049164834", "name": "S. Varghese"}, {"authorId": "5865958", + "name": "J. Elemans"}, {"authorId": "2433624", "name": "A. Rowan"}, {"authorId": + "51409252", "name": "R. Nolte"}]}, {"paperId": "9021358a8dd1443cebfdc6e45cafd0cc33e61f26", + "externalIds": {"MAG": "1989481315", "DOI": "10.1177/017084069401500602", + "CorpusId": 143721170}, "corpusId": 143721170, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9021358a8dd1443cebfdc6e45cafd0cc33e61f26", + "title": "Institutional Pressures and Isomorphic Change: An Empirical Test", + "abstract": "This paper examines the process of isomorphic change. It does + so by examin ing the dynamics of the change process and looking at change + holistically. Using a population of 36 national-level sport organizations, + subject to environ mental pressures from a state agency to adopt a more professional + and bureau cratic design, the paper shows that over time there is an increase + in the level of homogeneity of these organizations. Although the general shift + is to a more professional and bureaucratic type of organization, certain elements + of struc ture do not change as much as others, thus demonstrating resistance + to institu tional pressures. The processes by which the changes that occurred + took place are explored.", "venue": "", "year": 1994, "referenceCount": 43, + "citationCount": 273, "influentialCitationCount": 17, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1994-11-01", "journal": {"name": "Organization Studies", "pages": "803 - + 827", "volume": "15"}, "authors": [{"authorId": "49660065", "name": "T. Slack"}, + {"authorId": "3335139", "name": "B. Hinings"}]}, {"paperId": "77d5577ff19235502dd9cf88c31202a3dc8876b4", "externalIds": {"MAG": "1857431113", "DOI": "10.3386/W5220", "CorpusId": 153935973}, - "url": "https://www.semanticscholar.org/paper/77d5577ff19235502dd9cf88c31202a3dc8876b4", + "corpusId": 153935973, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/77d5577ff19235502dd9cf88c31202a3dc8876b4", "title": "The Seamless World: A Spatial Model of International Specialization", "abstract": "This paper is an effort to do international trade theory without mentioning countries. Nearly all models of the international economy assume @@ -23796,241 +26811,121 @@ interactions: analytically intractable, but we are able to gain considerable insight through a combination of simulations and an analytical approach originally suggested in a biological context by Alan Turing.", "venue": "", "year": 1995, "referenceCount": - 4, "citationCount": 123, "influentialCitationCount": 1, "isOpenAccess": true, + 4, "citationCount": 124, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://doi.org/10.3386/w5220", "status": "BRONZE"}, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1995-08-01", "journal": {"name": "NBER Working Paper Series"}, "authors": [{"authorId": "33345159", "name": "P. Krugman"}, {"authorId": "1771823", "name": "A. Venables"}]}, {"paperId": - "7f4a26a2203334a78d0b94951bc2a46cac8aafca", "externalIds": {"MAG": "2128325320", - "DBLP": "journals/jsyml/GreenbergN11", "DOI": "10.2178/jsl/1294171001", "CorpusId": - 6066800}, "url": "https://www.semanticscholar.org/paper/7f4a26a2203334a78d0b94951bc2a46cac8aafca", - "title": "Benign cost functions and lowness properties", "abstract": "Abstract - We show that the class of strongly jump-traceable c.e. sets can be characterised - as those which have sufficiently slow enumerations so they obey a class of - well-behaved cost functions, called benign. This characterisation implies - the containment of the class of strongly jump-traceable c.e. Turing degrees - in a number of lowness classes, in particular the classes of the degrees which - lie below incomplete random degrees, indeed all LR-hard random degrees, and - all \u03c9-c.e. random degrees. The last result implies recent results of - Diamondstone''s and Ng''s regarding cupping with superlow c.e. degrees and - thus gives a use of algorithmic randomness in the study of the c.e. Turing - degrees.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2011, "referenceCount": - 26, "citationCount": 38, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-03-01", "journal": {"name": "The - Journal of Symbolic Logic", "pages": "289 - 312", "volume": "76"}, "authors": - [{"authorId": "34695773", "name": "Noam Greenberg"}, {"authorId": "2350687", - "name": "A. Nies"}]}, {"paperId": "4261630f62ed4d787d9f4929d8c9bda9feae8bd5", - "externalIds": {"MAG": "76349267", "CorpusId": 16058513}, "url": "https://www.semanticscholar.org/paper/4261630f62ed4d787d9f4929d8c9bda9feae8bd5", - "title": "Jadex: Implementing a BDI-Infrastructure for JADE Agents", "abstract": - "INTELLIGENT AGENTS ARE A MODELLING PARADIGM, BASED ON THE NOTION OF AGENTS - WITH MENTAL STATES. THE AGENT METAPHOR IS NOWADAYS USED IN MANY RESEARCH AND - INDUSTRY PROJECTS, AND SEVERAL GENERIC AGENT PLATFORMS ARE AVAILABLE. NEVERTHELESS, - THERE IS A GAP BETWEEN PLATFORMS CONCENTRATING ON AGENT COMMUNI- CATION INFRASTRUCTURE - AND PLATFORMS CONCERNED WITH THE REPRESENTATION OF INTERNAL AGENT CONCEPTS. - THIS ARTICLE PRESENTS AN APPROACH TO BRIDGE THIS GAP: JADEX, AN ADD- ON TO - THE WIDELY USED JADE AGENT PLATFORM. THE ADD-ON FOLLOWS THE BDI ARCHITEC- - TURE, A WELL-KNOWN MODEL FOR REPRESENTING MENTALISTIC CONCEPTS IN THE SYSTEM - DESIGN AND IMPLEMENTATION. THE ARTICLE PROVIDES AN OVERVIEW OF THE BDI MODEL, - AND THE DESIGN AND REALIZATION IN JADEX, AS WELL AS THE INTEGRATION OF THE - ADD-ON INTO THE JADE AGENT FRAMEWORK.", "venue": "", "year": 2003, "referenceCount": - 17, "citationCount": 254, "influentialCitationCount": 19, "isOpenAccess": - false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1764412", - "name": "L. Braubach"}, {"authorId": "1692146", "name": "W. Lamersdorf"}, - {"authorId": "1793305", "name": "A. Pokahr"}]}, {"paperId": "9de31efb5110cbc965d120fa40db670f50b8bd89", - "externalIds": {"DBLP": "journals/mscs/CardelliZ10", "MAG": "2138171721", - "DOI": "10.1017/S0960129509990259", "CorpusId": 15923154}, "url": "https://www.semanticscholar.org/paper/9de31efb5110cbc965d120fa40db670f50b8bd89", - "title": "Turing universality of the Biochemical Ground Form", "abstract": - "We explore the expressive power of languages that naturally model biochemical - interactions relative to languages that only naturally model basic chemical - reactions, identifying molecular association as the basic mechanism that distinguishes - the former from the latter. We use a process algebra, the Biochemical Ground - Form (BGF), that adds primitives for molecular association to CGF, which is - a process algebra that has been proved to be equivalent to the traditional - notations for describing basic chemical reactions. We first observe that, - unlike CGF, BGF is Turing universal as it supports a finite precise encoding - of Random Access Machines, which comprise a well-known Turing powerful formalism. - Then we prove that the Turing universality of BGF derives from the interplay - between the molecular primitives of association and dissociation. In fact, - the elimination from BGF of the primitives already present in CGF does not - reduce the computational strength of the process algebra, but if either association - or dissociation is removed, BGF ceases to be Turing complete.", "venue": "Mathematical - Structures in Computer Science", "year": 2010, "referenceCount": 23, "citationCount": - 22, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2010-02-01", "journal": - {"name": "Mathematical Structures in Computer Science", "pages": "45 - 73", - "volume": "20"}, "authors": [{"authorId": "145457097", "name": "L. Cardelli"}, - {"authorId": "1777352", "name": "G. Zavattaro"}]}, {"paperId": "e5400440a11f575458e0834302b1ca247929c9fd", - "externalIds": {"MAG": "2004320988", "DOI": "10.1090/S0002-9947-1990-0955487-0", - "CorpusId": 53360900}, "url": "https://www.semanticscholar.org/paper/e5400440a11f575458e0834302b1ca247929c9fd", - "title": "Jumps of orderings", "abstract": "Here it is shown that for each - recursive ordinal a > 2 and each Turing degree d > 0('') , there is a linear - ordering A such that d is least among the ath jumps of degrees of (open diagrams - of) isomorphic copies of A and for ,B < a, the set of ,3 th jumps of degrees - of copies of A has no least element.", "venue": "", "year": 1990, "referenceCount": - 21, "citationCount": 61, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1990-02-01", "journal": {"name": - "Transactions of the American Mathematical Society", "pages": "573-599", "volume": - "319"}, "authors": [{"authorId": "39372474", "name": "C. Ash"}, {"authorId": - "1888089", "name": "C. Jockusch"}, {"authorId": "2061861694", "name": "Julia - A. Knight"}]}, {"paperId": "f5d2a6c68e3db50da56f87c105eb6c02c702b0f5", "externalIds": - {"MAG": "636001276", "DOI": "10.1007/978-94-015-9223-9", "CorpusId": 60165199}, - "url": "https://www.semanticscholar.org/paper/f5d2a6c68e3db50da56f87c105eb6c02c702b0f5", - "title": "Cellular automata and complex systems", "abstract": null, "venue": - "", "year": 1999, "referenceCount": 0, "citationCount": 61, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "4739296", - "name": "E. Goles"}, {"authorId": "144194173", "name": "S. Mart\u00ednez"}]}, - {"paperId": "a08a66499faa8ecc705af7ad348815e4080eb0f5", "externalIds": {"ArXiv": - "quant-ph/0405191", "MAG": "2953017418", "DOI": "10.1142/9789812774491_0017", - "CorpusId": 14421775}, "url": "https://www.semanticscholar.org/paper/a08a66499faa8ecc705af7ad348815e4080eb0f5", - "title": "Generalized Quantum Turing Machine and its Application to the SAT - Chaos Algorithm", "abstract": "Ohya and Volovich have proposed a new quantum - computation model with chaotic amplification to solve the SAT problem, which - went beyond usual quantum algorithm. In this paper, we generalize quantum - Turing machine, and we show in this general quantum Turing machine (GQTM) - that we can treat the Ohya-Volovich (OV) SAT algorithm.", "venue": "", "year": - 2004, "referenceCount": 13, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-05-31", "journal": {"name": - "", "pages": "204-225", "volume": ""}, "authors": [{"authorId": "2073439", - "name": "S. Iriyama"}, {"authorId": "1685591", "name": "M. Ohya"}, {"authorId": - "3045058", "name": "I. Volovich"}]}, {"paperId": "a6b8e1aed0b47a4f68c19600a6943c6625adc4b0", - "externalIds": {"MAG": "2401794038", "DBLP": "conf/birthday/Fiske12", "DOI": - "10.29007/x5g2", "CorpusId": 14718443}, "url": "https://www.semanticscholar.org/paper/a6b8e1aed0b47a4f68c19600a6943c6625adc4b0", - "title": "Turing Incomputable Computation", "abstract": "Recent cyberattacks - have demonstrated that current approaches to the malware problem (e.g., detection) - are inadequate. This is not surprising as virus detection is Turing undecidable. - 1 Further, some recent malware implementations use NP problems to encrypt - and hide the malware. 2 Two goals guide an alternative approach: (a) Program - execution should hide computational steps in order to hinder \u201creverse - engineering\u201d efforts by malware hackers; (b) New computational models - should be explored that make it more difficult to hijack the purpose of program - execution. The methods explained here pertain to (a) implemented with a new - computational model, called the active element machine (AEM). 3 An AEM is - composed of computational primitives called active elements that simultaneously - transmit and receive pulses to and from other active elements. Each pulse - has an amplitude and a width, representing how long the pulse amplitude lasts - as input to the active element receiving the pulse. If active element Ei simultaneously - receives pulses with amplitudes summing to a value greater than Ei\u2019s - threshold and Ei\u2019s refractory period has expired, then Ei fires. When - Ei fires, it sends pulses to other active elements. If Ei fires at time t, - a pulse reaches element Ek at time t+ \u03c4ik where \u03c4ik is the transmission - time from Ei to Ek. The AEM language uses five commands \u2013 Element, Connection, - Fire, Program and Meta \u2013 to write AEM programs, where time is explicitly - specified and multiple commands may simultaneously execute. An Element command - creates, at the time specified in the command, an active element with a threshold - value, a refractory period and a most recent firing time. A Connection command - sets, at the time specified in the command, a pulse amplitude, a pulse width - and a transmission time from element Ei to element Ek. The Fire command fires - an input element at a particular time. The Program command defines the execution - of multiple commands with a single command. Element and Connection commands - establish the AEM architecture and firing activity. The Meta command can change - the AEM architecture during AEM program execution. This model uses quantum - random input to generate random firing patterns that deterministically execute - a universal Turing machine (UTM) program \u03b7. Random firing interpretations - are constructed with dynamic level sets on boolean functions that compute - \u03b7. The quantum randomness is an essential component for building the - random firing patterns that are Turing incomputable. 4 It is assumed that - the following are all kept perfectly secret: the state and tape of the UTM, - represented by the active elements and connections; the quantum random bits - determining how \u03b7 is computed for each computational step; and the dynamic - connections in the AEM. Formally, let f1j , f2j , . . . fmj represent the - random firing pattern computing \u03b7 during the jth computational step and - assume an adversary can eavesdrop on f1j , f2j , . . . fmj . Let q denote - the current state of the UTM, ak a UTM alphabet symbol and qk a UTM state. - Perfect secrecy means that probabilities P (q = qk|f1j = b1 . . . fmj = bm) - = P (q = qk) and P (Tk = ak|f1j = b1 . . . fmj = bm) = P (Tk = ak) for each - bi \u2208 {0, 1} and each Tk which is the contents of the kth tape square. - If these secrecy conditions hold, then there doesn\u2019t exist a \u201creverse - engineer\u201d Turing machine that can map the random firing patterns back - to an unbounded sequence of UTM instructions. For an unbounded number of computational - steps, define function g : N\u2192 {0, 1} where g((j \u2212 1)m+ r) = f(r+1)j - and 0 \u2264 r < m. Then g is incomputable. Proposed methods of hypercomputation - currently have no physical realization. 5 The methods described here can be - physically realized using an off-the-shelf quantum random generator device - with a USB plug connected to a laptop computer executing a finite AEM program.", - "venue": "Turing-100", "year": 2012, "referenceCount": 55, "citationCount": - 7, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer + "9ddf890f5c2818985496b65aa36d1d00f168a010", "externalIds": {"DBLP": "books/daglib/0090683", + "MAG": "1494177512", "DOI": "10.1007/978-94-010-0413-8_4", "CorpusId": 41762324}, + "corpusId": 41762324, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9ddf890f5c2818985496b65aa36d1d00f168a010", + "title": "Computability and complexity - from a programming perspective", + "abstract": null, "venue": "Foundations of computing series", "year": 1997, + "referenceCount": 16, "citationCount": 257, "influentialCitationCount": 24, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1997-03-14", "journal": {"pages": "I-XVI, 1-466"}, "authors": + [{"authorId": "1700623", "name": "N. Jones"}]}, {"paperId": "518b15e7ec07edeed911e65e51cf174f3a894b46", + "externalIds": {"DBLP": "conf/uc/AmanC09", "MAG": "1839299395", "DOI": "10.1007/978-3-642-03745-0_12", + "CorpusId": 13300558}, "corpusId": 13300558, "publicationVenue": {"id": "e07802ce-97d7-4ae3-a04d-62c297fe3a79", + "name": "International Conference on Unconventional Computation", "type": + "conference", "alternate_names": ["UC", "Int Conf Unconv Comput"]}, "url": + "https://www.semanticscholar.org/paper/518b15e7ec07edeed911e65e51cf174f3a894b46", + "title": "Turing Completeness Using Three Mobile Membranes", "abstract": null, + "venue": "International Conference on Unconventional Computation", "year": + 2009, "referenceCount": 16, "citationCount": 28, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-22", "journal": - {"pages": "66-91"}, "authors": [{"authorId": "2040922", "name": "Michael Stephen - Fiske"}]}, {"paperId": "932e9ba58196b117634e6b2c2fb879254f052745", "externalIds": - {"MAG": "2174016208", "DOI": "10.1146/ANNUREV.EN.28.010183.002203", "CorpusId": - 85807937}, "url": "https://www.semanticscholar.org/paper/932e9ba58196b117634e6b2c2fb879254f052745", - "title": "Insects as Flower Visitors and Pollinators", "abstract": "Pollination - ecology has been a fast growing field since the 1960s. A previous review by - Baker & Hurd (18) together with books (77, 84, 220, 221 , 244, 264) and various - symposia (e.g. 5, 12, 17, 24, 149, 167, 239) have promoted anthecology so - that it remains at the heart of evolutionary and ecological research. This - review concentrates on the entomologically relevant litera\u00ad ture published - since 1967. Botanical works must be included, as both insects and flowers - mutually aSsure reproductive success. We have attempted to cover concepts, - related disciplines, and insect taxa by reference to publica\u00ad tions through - which the reader may delve deeper. We apologize to our colleagues for not - citing their works more fully. We dedicate this review to the memory of Paul - D. Hurd Jr. His en\u00ad thusiasm for bees and their relations with flowers, - and for insects in general, have been an inspiration to us. His contributions - would form the hub of a separate review in itself and we have not attempted - to cover his works.", "venue": "", "year": 1983, "referenceCount": 166, "citationCount": - 831, "influentialCitationCount": 35, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": {"name": "Annual Review of Entomology", - "pages": "407-453", "volume": "28"}, "authors": [{"authorId": "90293798", - "name": "and P G Kevan"}, {"authorId": "40683982", "name": "H. G. Baker"}]}, - {"paperId": "1098929b4b3fbf8ffed02985eea5602fbeec37dc", "externalIds": {"MAG": - "1509485343", "DBLP": "conf/fm/MandelC99", "DOI": "10.1007/3-540-48119-2_47", - "CorpusId": 21090032}, "url": "https://www.semanticscholar.org/paper/1098929b4b3fbf8ffed02985eea5602fbeec37dc", - "title": "On the Expressive Power of OCL", "abstract": null, "venue": "World - Congress on Formal Methods", "year": 1999, "referenceCount": 15, "citationCount": - 82, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1999-09-20", "journal": - {"pages": "854-874"}, "authors": [{"authorId": "11527269", "name": "L. Mandel"}, - {"authorId": "2106343", "name": "M. V. Cengarle"}]}, {"paperId": "c4e8e8cdfd8342b1bcd08a33b67f77f3df562460", - "externalIds": {"DBLP": "series/leus/Floyd12", "MAG": "73077042", "DOI": "10.1007/978-94-007-4435-6_2", - "CorpusId": 6844141}, "url": "https://www.semanticscholar.org/paper/c4e8e8cdfd8342b1bcd08a33b67f77f3df562460", - "title": "Wittgenstein''s Diagonal Argument: A Variation on Cantor and Turing", - "abstract": null, "venue": "Epistemology versus Ontology", "year": 2012, "referenceCount": - 60, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"pages": "25-44"}, "authors": [{"authorId": - "39423496", "name": "J. Floyd"}]}, {"paperId": "d0e6e45312b41eaaa3c3484ca98792e1846f0f95", - "externalIds": {"DBLP": "journals/ndjfl/Shanker87", "MAG": "2021065331", "DOI": - "10.1305/ndjfl/1093637650", "CorpusId": 13389456}, "url": "https://www.semanticscholar.org/paper/d0e6e45312b41eaaa3c3484ca98792e1846f0f95", - "title": "Wittgenstein versus Turing on the nature of Church''s thesis", "abstract": - "Discussion des raisons du scepticisme wittgensteinnien vis-a-vis de l''importance - de la these de Church, et des machines de Turing pour les fondements des mathematiques - et de la psychologie. L''A. commence par reconstituer la doctrine de Wittgenstein, - a partir de textes disperses, puis en discute la pertinence", "venue": "Notre - Dame J. Formal Log.", "year": 1987, "referenceCount": 0, "citationCount": - 41, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "external"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1987-10-01", "journal": - {"name": "Notre Dame J. Formal Log.", "pages": "615-649", "volume": "28"}, - "authors": [{"authorId": "50638441", "name": "S. Shanker"}]}, {"paperId": - "6407529ff47996872055d20bf795fc4e1b90c773", "externalIds": {"MAG": "71910563", - "CorpusId": 45555725, "PubMed": "171067"}, "url": "https://www.semanticscholar.org/paper/6407529ff47996872055d20bf795fc4e1b90c773", + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2009-09-03", "journal": {"pages": "42-55"}, "authors": + [{"authorId": "2436033", "name": "Bogdan Aman"}, {"authorId": "1800122", "name": + "Gabriel Ciobanu"}]}, {"paperId": "df59104f706282f9e0e2cf1f328bf97052affa4e", + "externalIds": {"MAG": "3101610980", "ArXiv": "1408.2171", "DOI": "10.1090/S0002-9939-07-08648-0", + "CorpusId": 578779}, "corpusId": 578779, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/df59104f706282f9e0e2cf1f328bf97052affa4e", + "title": "Low for random reals and positive-measure domination", "abstract": + "The low for random reals are characterized topologically, as well as in terms + of domination of Turing functionals on a set of positive measure.", "venue": + "", "year": 2007, "referenceCount": 14, "citationCount": 40, "influentialCitationCount": + 8, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/proc/2007-135-11/S0002-9939-07-08648-0/S0002-9939-07-08648-0.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-11-01", + "journal": {"name": "", "pages": "3703-3709", "volume": "135"}, "authors": + [{"authorId": "1401914011", "name": "B. Kjos-Hanssen"}]}, {"paperId": "ed896b2e47c92d532d1184f29edef44d7103085a", + "externalIds": {"MAG": "2110256471", "DOI": "10.1117/1.2931681", "CorpusId": + 56109577}, "corpusId": 56109577, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ed896b2e47c92d532d1184f29edef44d7103085a", + "title": "Corner detector based on global and local curvature properties", + "abstract": "This paper proposes a curvature-based corner detector that detects + both fine and coarse features accurately at low computational cost. First, + it extracts contours from a Canny edge map. Second, it com- putes the absolute + value of curvature of each point on a contour at a low scale and regards local + maxima of absolute curvature as initial corner candidates. Third, it uses + an adaptive curvature threshold to remove round corners from the initial list. + Finally, false corners due to quantiza- tion noise and trivial details are + eliminated by evaluating the angles of corner candidates in a dynamic region + of support. The proposed detector was compared with popular corner detectors + on planar curves and gray- level images, respectively, in a subjective manner + as well as with a fea- ture correspondence test. Results reveal that the proposed + detector per- forms extremely well in both fields. \u00a9 2008 Society of + Photo-Optical", "venue": "", "year": 2008, "referenceCount": 40, "citationCount": + 249, "influentialCitationCount": 27, "isOpenAccess": true, "openAccessPdf": + {"url": "http://hub.hku.hk/bitstream/10722/57246/1/142282.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-05-01", + "journal": {"name": "Optical Engineering", "pages": "057008", "volume": "47"}, + "authors": [{"authorId": "4039776", "name": "X. He"}, {"authorId": "144465628", + "name": "N. Yung"}]}, {"paperId": "e9609d3255b771887507785e5e4f5d39bd06ce84", + "externalIds": {"MAG": "2162656310", "DOI": "10.1177/003368820303400103", + "CorpusId": 146350694}, "corpusId": 146350694, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e9609d3255b771887507785e5e4f5d39bd06ce84", + "title": "Eil Curriculum Development", "abstract": "In this paper the author + argues that current changes in the nature of English and English language + learners warrants a re-evaluation of two widely accepted notions of ELT curriculum + development, namely, that the goal of English learning is native speaker competence + and that native speaker cul ture should inform instructional materials and + teaching methods. Recogniz ing the current status of English as an international + language (EIL), the author describes central features of an international + language and how these influence the relationship between language and culture. + The paper then proceeds to demonstrate how native speaker models and culture + need to be carefully examined in reference to EIL curriculum development.", + "venue": "", "year": 2003, "referenceCount": 19, "citationCount": 130, "influentialCitationCount": + 19, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Linguistics", "source": "s2-fos-model"}, {"category": "Education", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-04-01", "journal": {"name": "RELC Journal", "pages": "31 - 47", "volume": + "34"}, "authors": [{"authorId": "71960707", "name": "S. Mckay"}]}, {"paperId": + "af251b5f3a6a103b7512c3c8cc62403436ae8d6d", "externalIds": {"MAG": "2081299191", + "DBLP": "journals/jcss/Kadin89", "DOI": "10.1016/0022-0000(89)90024-X", "CorpusId": + 23446943}, "corpusId": 23446943, "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", + "name": "Journal of computer and system sciences (Print)", "type": "journal", + "alternate_names": ["Journal of Computer and System Sciences", "J comput syst + sci (print", "J Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/af251b5f3a6a103b7512c3c8cc62403436ae8d6d", + "title": "P^(NP[O(log n)]) and Sparse Turing-Complete Sets for NP", "abstract": + null, "venue": "Journal of computer and system sciences (Print)", "year": + 1989, "referenceCount": 22, "citationCount": 114, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1989-12-01", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "282-298", + "volume": "39"}, "authors": [{"authorId": "30743227", "name": "Jim Kadin"}]}, + {"paperId": "6407529ff47996872055d20bf795fc4e1b90c773", "externalIds": {"MAG": + "71910563", "CorpusId": 45555725, "PubMed": "171067"}, "corpusId": 45555725, + "publicationVenue": {"id": "b0bd78b2-6591-460e-af71-196409b62e2c", "name": + "Cancer Research", "type": "journal", "alternate_names": ["Cancer Res"], "issn": + "0008-5472", "url": "https://cancerres.aacrjournals.org/", "alternate_urls": + ["http://cancerres.aacrjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/6407529ff47996872055d20bf795fc4e1b90c773", "title": "Report of a workshop on classification of specific hepatocellular lesions in rats.", "abstract": "On December 1 1 to 13, 1974, The Na t iona l Cancer Institute sponsored a workshop in Silver Spring, Md. on the classif @@ -24062,52 +26957,217 @@ interactions: were submit ted anonymous ly and the results were tabulated and distr ibuted at the workshop.", "venue": "Cancer Research", "year": 1975, "referenceCount": 2, "citationCount": 403, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1975-11-01", "journal": {"name": "Cancer research", "pages": "\n 3214-23\n ", "volume": "35 11 Pt 1"}, "authors": [{"authorId": "7848244", "name": "R. Squire"}, {"authorId": "2058484597", "name": "M. Levitt"}]}, - {"paperId": "d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", "externalIds": {"MAG": - "2016568588", "DOI": "10.1103/PHYSREVE.90.062915", "CorpusId": 42727592, "PubMed": - "25615172"}, "url": "https://www.semanticscholar.org/paper/d4e7fd1769b0a6ab68b8cd48d4c8fc4f08415120", - "title": "Turing pattern dynamics in an activator-inhibitor system with superdiffusion.", - "abstract": "The fractional operator is introduced to an activator-inhibitor - system to describe species anomalous superdiffusion. The effects of the superdiffusive - exponent on pattern formation and pattern selection are studied. Our linear - stability analysis shows that the wave number of the Turing pattern increases - with the superdiffusive exponent. A weakly nonlinear analysis yields a system - of amplitude equations and the analysis of these amplitude equations predicts - parameter regimes where hexagons, stripes, and their coexistence are expected. - Numerical simulations of the activator-inhibitor model near the stability - boundaries confirm our analytical results. Since diffusion rate manifests - in both diffusion constant and diffusion exponent, we numerically explore - their interactions on the emergence of Turing patterns. When the activator - and inhibitor have different superdiffusive exponents, we find that the critical - ratio of the diffusion rate of the inhibitor to the activator, required for - the formation of the Turing pattern, increases monotonically with the superdiffusive - exponent. We conclude that small ratio (than unity) of anomalous diffusion - exponent between the inhibitor and activator is more likely to promote the - emergence of the Turing pattern, relative to the normal diffusion.", "venue": - "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2014, "referenceCount": 47, "citationCount": 31, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-12-19", "journal": - {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 062915\n ", "volume": "90 6"}, "authors": [{"authorId": - "2037744526", "name": "Lai Zhang"}, {"authorId": "1990780", "name": "Canrong - Tian"}]}, {"paperId": "eba2376347299ffe7434d280c1387c0a2f0c82dc", "externalIds": - {"MAG": "2034286284", "DOI": "10.1007/978-3-662-01462-2_3", "CorpusId": 170200950}, - "url": "https://www.semanticscholar.org/paper/eba2376347299ffe7434d280c1387c0a2f0c82dc", - "title": "\u03bc-Rekursive Funktionen", "abstract": null, "venue": "", "year": - 1961, "referenceCount": 1, "citationCount": 28, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "pages": "59-95", "volume": - ""}, "authors": [{"authorId": "2069011124", "name": "Hans Hermes"}]}, {"paperId": - "15bd2c20e69c82bfe9ad06402c23f428fb614ca5", "externalIds": {"MAG": "2166264480", - "DOI": "10.1524/ZKRI.1959.112.1-6.80", "CorpusId": 96721760}, "url": "https://www.semanticscholar.org/paper/15bd2c20e69c82bfe9ad06402c23f428fb614ca5", + {"paperId": "b652ef03b980e770fb9dcba12e406af253328925", "externalIds": {"DBLP": + "journals/corr/abs-0906-3248", "MAG": "2949348026", "ArXiv": "0906.3248", + "DOI": "10.4204/EPTCS.1.4", "CorpusId": 10266058}, "corpusId": 10266058, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b652ef03b980e770fb9dcba12e406af253328925", + "title": "A Concrete View of Rule 110 Computation", "abstract": "Rule 110 + is a cellular automaton that performs repeated simultaneous updates of an + infinite row of binary values. The values are updated in the following way: + 0s are changed to 1s at all positions where the value to the right is a 1, + while 1s are changed to 0s at all positions where the values to the left and + right are both 1. Though trivial to define, the behavior exhibited by Rule + 110 is surprisingly intricate, and in (Cook, 2004) we showed that it is capable + of emulating the activity of a Turing machine by encoding the Turing machine + and its tape into a repeating left pattern, a central pattern, and a repeating + right pattern, which Rule 110 then acts on. In this paper we provide an explicit + compiler for converting a Turing machine into a Rule 110 initial state, and + we present a general approach for proving that such constructions will work + as intended. The simulation was originally assumed to require exponential + time, but surprising results of Neary and Woods (2006) have shown that in + fact, only polynomial time is required. We use the methods of Neary and Woods + to exhibit a direct simulation of a Turing machine by a tag system in polynomial + time.", "venue": "CSP", "year": 2009, "referenceCount": 12, "citationCount": + 35, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://arxiv.org/pdf/0906.3248", "status": "GOLD"}, "fieldsOfStudy": + ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2009-06-17", "journal": {"pages": + "31-55"}, "authors": [{"authorId": "2057342974", "name": "Matthew Cook"}]}, + {"paperId": "932e9ba58196b117634e6b2c2fb879254f052745", "externalIds": {"MAG": + "2174016208", "DOI": "10.1146/ANNUREV.EN.28.010183.002203", "CorpusId": 85807937}, + "corpusId": 85807937, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/932e9ba58196b117634e6b2c2fb879254f052745", + "title": "Insects as Flower Visitors and Pollinators", "abstract": "Pollination + ecology has been a fast growing field since the 1960s. A previous review by + Baker & Hurd (18) together with books (77, 84, 220, 221 , 244, 264) and various + symposia (e.g. 5, 12, 17, 24, 149, 167, 239) have promoted anthecology so + that it remains at the heart of evolutionary and ecological research. This + review concentrates on the entomologically relevant litera\u00ad ture published + since 1967. Botanical works must be included, as both insects and flowers + mutually aSsure reproductive success. We have attempted to cover concepts, + related disciplines, and insect taxa by reference to publica\u00ad tions through + which the reader may delve deeper. We apologize to our colleagues for not + citing their works more fully. We dedicate this review to the memory of Paul + D. Hurd Jr. His en\u00ad thusiasm for bees and their relations with flowers, + and for insects in general, have been an inspiration to us. His contributions + would form the hub of a separate review in itself and we have not attempted + to cover his works.", "venue": "", "year": 1983, "referenceCount": 166, "citationCount": + 831, "influentialCitationCount": 35, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "Annual Review of Entomology", "pages": "407-453", "volume": "28"}, "authors": + [{"authorId": "90293798", "name": "and P G Kevan"}, {"authorId": "40683982", + "name": "H. G. Baker"}]}, {"paperId": "7a6100e739be584e95bdcf02a6e6eb581462da14", + "externalIds": {"CorpusId": 5640696}, "corpusId": 5640696, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7a6100e739be584e95bdcf02a6e6eb581462da14", + "title": "The chemical theory of 185 . morphogenesis Universal Turing Machine", + "abstract": "In recent years, much research has been devoted to the simulation + of forward-error correction; however, few have investigated the synthesis + of information retrieval syste ms. In this position paper, we argue the synthesis + of hierarchical databases, which embodies the compelling principles of evoting + technology. In this position paper, we use collabora tive configurations to + verify that the much-tauted replicated al gorithm for the study of consistent + hashing by Michael O. Rabin runs in\u03a9(n) time.", "venue": "", "year": + 2011, "referenceCount": 247, "citationCount": 50, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "7e9ff71d9305ac0baee458e1ee52216d87705f6b", "externalIds": {"MAG": "1650957208", + "DOI": "10.1088/2058-7058/11/3/32", "CorpusId": 116975308}, "corpusId": 116975308, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e9ff71d9305ac0baee458e1ee52216d87705f6b", + "title": "Decoherence: the obstacle to quantum computation", "abstract": "Alan + Turing laid the foundation for the modern computer in 1936 when he introduced + the concept of a universal computer; now known as a Turing machine. But it + took another 10 years of research before the first electronic computer, the + ENIAC, was actually built by scientists at the University of Pennsylvania. + The ENIAC was capable of performing arithmetic on numbers Up to 10 digits + long.", "venue": "", "year": 1998, "referenceCount": 0, "citationCount": 32, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-03-01", + "journal": {"name": "Physics World", "pages": "53-57", "volume": "11"}, "authors": + [{"authorId": "2804168", "name": "D. DiVincenzo"}, {"authorId": "2094968", + "name": "B. Terhal"}]}, {"paperId": "c47c6320cbbeae7e9a1469b2ed480422aeb5bc2a", + "externalIds": {"MAG": "2156382870", "DOI": "10.1177/036354659602400422", + "CorpusId": 45284710, "PubMed": "8827317"}, "corpusId": 45284710, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c47c6320cbbeae7e9a1469b2ed480422aeb5bc2a", + "title": "Meniscal Repair Supplemented With Exogenous Fibrin Clot and Autogenous + Cultured Marrow Cells in the Goat Model", "abstract": "This study was undertaken + to evaluate the placement of fibrin clot and cultured autologous marrow cells + in surgically created, full-thickness, meniscal lesions in the avascular zone + in 32 female Spanish goats. The menisci were repaired with two vertically + oriented su tures (N = 8), exogenous fibrin clot was placed into the meniscal + defect before placement of the two sutures (N = 8), fibrin clot plus cultured + adherent bone marrow cells were placed in the defect (N = 8), or the meniscal + lesions were left unrepaired (N = 8). On gross and manual inspection, meniscal + lesions showed some de gree of healing in all animals except for the eight + unrepaired lesions. All the experimental specimens had decreased tensile strength + compared with the con tralateral control medial menisci. Ultimate load to + fail ure, energy absorbed to failure, and stiffness were less than 40% of + the controls for all groups. Histologic sections demonstrated focal cellular + areas consisting of giant cells and macrophages in the repair sites. Our observations + failed to demonstrate a statistically signif icant enhancement of healing + with the use of exoge nous fibrin clot compared with vertically oriented su + tures alone. The addition of cultured adherent autologous bone marrow-derived + cells in conjunction with the fibrin clot did not enhance the meniscal healing.", + "venue": "The American journal of sports medicine", "year": 1996, "referenceCount": + 33, "citationCount": 103, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-07-01", "journal": + {"name": "The American Journal of Sports Medicine", "pages": "547 - 555", + "volume": "24"}, "authors": [{"authorId": "2058303501", "name": "J. Port"}, + {"authorId": "39531679", "name": "D. W. Jackson"}, {"authorId": "152240991", + "name": "T. Lee"}, {"authorId": "46773644", "name": "T. Simon"}]}, {"paperId": + "fa11e37b04cbf4eb55145fa5ac0f632c291b12aa", "externalIds": {"CorpusId": 11565012}, + "corpusId": 11565012, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fa11e37b04cbf4eb55145fa5ac0f632c291b12aa", + "title": "The Turing Test : The First Fifty Years", "abstract": "The Turing + Test, originally proposed as a simple operational definition of intelligence, + has now been with us for exactly half a century. It is safe to say that no + other single article in computer science, and few other articles in science + in general, have generated so much discussion. The present article chronicles + the comments and controversy surrounding Turing\u2019s classic article from + its publication to the present. The changing perception of the Turing Test + over the last fifty years has paralleled the changing attitudes in the scientific + community towards artificial intelligence: from the unbridled optimism of + 1960\u2019s to the current realization of the immense difficulties that still + lie ahead. I conclude with the prediction that the Turing Test will remain + important, not only as a landmark in the history of the development of intelligent + machines, but also with real relevance to future generations of people living + in a world in which the cognitive capacities of machines will be vastly greater + than they are now.", "venue": "", "year": 2000, "referenceCount": 45, "citationCount": + 27, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "2440747", "name": "R. French"}, + {"authorId": "52070849", "name": "Alan Mathison"}]}, {"paperId": "00f3bb0591f56c6bc735d8d912d0769944005cda", + "externalIds": {"DBLP": "journals/fuin/BurginE09", "MAG": "1512266229", "DOI": + "10.3233/FI-2009-0033", "CorpusId": 42860966}, "corpusId": 42860966, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/00f3bb0591f56c6bc735d8d912d0769944005cda", + "title": "Universality for Turing Machines, Inductive Turing Machines and + Evolutionary Algorithms", "abstract": "The aim of this paper is the development + of foundations for evolutionary computations. To achieve this goal, a mathematical + model of evolutionary automata is introduced and studied. The main classes + of evolutionary automata considered in this paper are evolutionary Turing + machines and evolutionary inductive Turing machines. Various subclasses and + modes of evolutionary computation are defined. Problems of existence of universal + objects in these classes are explored. Relations between Turing machines, + inductive Turing machines, evolutionary Turing machines, and evolutionary + inductive Turing machines are investigated.", "venue": "Fundam. Informaticae", + "year": 2009, "referenceCount": 18, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-04-03", "journal": + {"name": "Fundam. Informaticae", "pages": "53-77", "volume": "91"}, "authors": + [{"authorId": "51006192", "name": "M. Burgin"}, {"authorId": "2882381", "name": + "E. Eberbach"}]}, {"paperId": "e5400440a11f575458e0834302b1ca247929c9fd", + "externalIds": {"MAG": "2004320988", "DOI": "10.1090/S0002-9947-1990-0955487-0", + "CorpusId": 53360900}, "corpusId": 53360900, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e5400440a11f575458e0834302b1ca247929c9fd", + "title": "Jumps of orderings", "abstract": "Here it is shown that for each + recursive ordinal a > 2 and each Turing degree d > 0('') , there is a linear + ordering A such that d is least among the ath jumps of degrees of (open diagrams + of) isomorphic copies of A and for ,B < a, the set of ,3 th jumps of degrees + of copies of A has no least element.", "venue": "", "year": 1990, "referenceCount": + 21, "citationCount": 61, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.ams.org/tran/1990-319-02/S0002-9947-1990-0955487-0/S0002-9947-1990-0955487-0.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1990-02-01", + "journal": {"name": "Transactions of the American Mathematical Society", "pages": + "573-599", "volume": "319"}, "authors": [{"authorId": "39372474", "name": + "C. Ash"}, {"authorId": "1888089", "name": "C. Jockusch"}, {"authorId": "2061861694", + "name": "Julia A. Knight"}]}, {"paperId": "f5d2a6c68e3db50da56f87c105eb6c02c702b0f5", + "externalIds": {"MAG": "636001276", "DOI": "10.1007/978-94-015-9223-9", "CorpusId": + 60165199}, "corpusId": 60165199, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f5d2a6c68e3db50da56f87c105eb6c02c702b0f5", + "title": "Cellular automata and complex systems", "abstract": null, "venue": + "", "year": 1999, "referenceCount": 0, "citationCount": 61, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-94-015-9223-9%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "4739296", + "name": "E. Goles"}, {"authorId": "144194173", "name": "S. Mart\u00ednez"}]}, + {"paperId": "ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", "externalIds": {"MAG": + "423839556", "DBLP": "conf/icalp/Selman79", "DOI": "10.1007/3-540-09510-1_44", + "CorpusId": 19866482}, "corpusId": 19866482, "publicationVenue": {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", + "name": "International Colloquium on Automata, Languages and Programming", + "type": "conference", "alternate_names": ["Int Conf Arab Lang Process", "International + Conference on Arabic Language Processing", "Int Colloq Autom Lang Program", + "ICALP"], "url": "http://www.eatcs.org/"}, "url": "https://www.semanticscholar.org/paper/ec0c8b7d9b167b387a7e2338fe437d7eb3525b53", + "title": "P-Selective Sets, Tally Languages, and the Behavior of Polynomial + Time Reducibilities on NP", "abstract": null, "venue": "International Colloquium + on Automata, Languages and Programming", "year": 1979, "referenceCount": 14, + "citationCount": 126, "influentialCitationCount": 9, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1979-07-16", "journal": {"pages": "546-555"}, "authors": [{"authorId": "2411373", + "name": "A. Selman"}]}, {"paperId": "15bd2c20e69c82bfe9ad06402c23f428fb614ca5", + "externalIds": {"MAG": "2166264480", "DOI": "10.1524/ZKRI.1959.112.1-6.80", + "CorpusId": 96721760}, "corpusId": 96721760, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/15bd2c20e69c82bfe9ad06402c23f428fb614ca5", "title": "Die Kristallstruktur des AuJ", "abstract": "The crystal s t ruc ture of A u J was determined by means of t he powder method with focussing monochromators . A u J belongs to the te t ragonal space group Pljncm ( = @@ -24117,30 +27177,40 @@ interactions: The crystal s t ruc ture consists of Au\u2014J chains with the remarkably shor t A u J distance of 2.62 A.", "venue": "", "year": 1959, "referenceCount": 0, "citationCount": 39, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Zeitschrift f\u00fcr Kristallographie - Crystalline - Materials", "pages": "80 - 87", "volume": "112"}, "authors": [{"authorId": - "2171613697", "name": "\u0397. Jagodzinski"}]}, {"paperId": "0ac1ab736aa626a896dc0f26f8fc2b31dc65d384", - "externalIds": {"MAG": "2401755623", "DOI": "10.1177/000348945906800414", - "CorpusId": 19864273, "PubMed": "14446883"}, "url": "https://www.semanticscholar.org/paper/0ac1ab736aa626a896dc0f26f8fc2b31dc65d384", - "title": "LXXIX Middle Ear Muscle Activity at Moderate Sound Levels", "abstract": - "The role of the middle ear muscles in everyday audition has apparently received - little emphasis in the past. A review of the litera\u00ad ture leaves one - with the impression that the tensor tympani and stapedius muscles are at best - interesting masses in the middle ear, inert unless very loud sounds are presented; - that with the introduction of loud sounds (80-90 db) these muscles suddenly - spring to life, con\u00ad tracting and reducing the sound amplitude reaching - the cochlea.", "venue": "The Annals of otology, rhinology, and laryngology", - "year": 1959, "referenceCount": 10, "citationCount": 82, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "1959-12-01", "journal": {"name": "Annals of Otology, Rhinology & Laryngology", - "pages": "1126 - 1143", "volume": "68"}, "authors": [{"authorId": "3034753", - "name": "F. B. Simmons"}]}, {"paperId": "619d6462cf8d2da980186f3b5b923d8d1433af98", + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Zeitschrift f\u00fcr Kristallographie + - Crystalline Materials", "pages": "80 - 87", "volume": "112"}, "authors": + [{"authorId": "2171613697", "name": "\u0397. Jagodzinski"}]}, {"paperId": + "a81798ec4bb0b30ead61b0cbeb1a1a466636829d", "externalIds": {"MAG": "3080357941", + "DOI": "10.1021/acs.chemmater.0c02814", "CorpusId": 225189536}, "corpusId": + 225189536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a81798ec4bb0b30ead61b0cbeb1a1a466636829d", + "title": "Abnormal Bi3+-Activated NIR Emission in Highly Symmetric XAl12O19 + (X = Ba, Sr, Ca) by Selective Sites Occupation", "abstract": "Near-infrared + light-emitting diodes (NIR-LEDs) have been a potential candidate in food composition + analysis, tempera-ture and security monitoring, biometrics, and medical applications. + To realize t...", "venue": "", "year": 2020, "referenceCount": 30, "citationCount": + 39, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-08-20", + "journal": {"name": "Chemistry of Materials", "volume": ""}, "authors": [{"authorId": + "152410568", "name": "Yi Wei"}, {"authorId": "49538778", "name": "Zhiyu Gao"}, + {"authorId": "1484281734", "name": "Xiaohan Yun"}, {"authorId": "144955350", + "name": "Hang Yang"}, {"authorId": "2108176426", "name": "Yixin Liu"}, {"authorId": + "2108461707", "name": "Guogang Li"}]}, {"paperId": "7001ebad878397eee1b2544c6c72bd2845c76590", + "externalIds": {"MAG": "2026387762", "DOI": "10.1007/BF00134103", "CorpusId": + 121630807}, "corpusId": 121630807, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7001ebad878397eee1b2544c6c72bd2845c76590", + "title": "Some notes on Church''s thesis and the theory of games", "abstract": + null, "venue": "", "year": 1990, "referenceCount": 17, "citationCount": 55, + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1990-07-01", "journal": {"name": + "Theory and Decision", "pages": "19-52", "volume": "29"}, "authors": [{"authorId": + "2312899", "name": "L. Anderlini"}]}, {"paperId": "619d6462cf8d2da980186f3b5b923d8d1433af98", "externalIds": {"MAG": "2248579931", "DOI": "10.21273/HORTSCI.38.5.984", "CorpusId": - 32252818}, "url": "https://www.semanticscholar.org/paper/619d6462cf8d2da980186f3b5b923d8d1433af98", + 32252818}, "corpusId": 32252818, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/619d6462cf8d2da980186f3b5b923d8d1433af98", "title": "Human issues in horticulture.", "abstract": "the definition of horticulture to a combination of \u2018garden\u2019 and \u2018cultivation of soil,\u2019 we have severely limited the understanding of what horticulture means in terms @@ -24150,44 +27220,337 @@ interactions: plants and individuals, psychological well-being, quality of life, response to na ture , soc iocul tura l envi ronment", "venue": "", "year": 2003, "referenceCount": 159, "citationCount": 84, "influentialCitationCount": 7, "isOpenAccess": true, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Agricultural And Food Sciences", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-08-01", + "openAccessPdf": {"url": "https://journals.ashs.org/downloadpdf/journals/hortsci/38/5/article-p984.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Agricultural And Food Sciences", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-08-01", "journal": {"name": "Hortscience", "pages": "984-993", "volume": "38"}, "authors": [{"authorId": "46516731", "name": "P. D. Relf"}, {"authorId": "11356080", - "name": "V. I. Lohr"}]}, {"paperId": "9a60dd734f6fe5c4056538606b6a2340ad8ba2cd", - "externalIds": {"MAG": "288220014", "CorpusId": 166995322}, "url": "https://www.semanticscholar.org/paper/9a60dd734f6fe5c4056538606b6a2340ad8ba2cd", - "title": "Organizational Innovation as Competitive Advantage during Global - Recession", "abstract": "The paper aims to discovering the organizational - macro variables which make innovation to take place at workplace and to develop - a con ceptual model for use in the indus try which has been grappling with - financial downturn. The meta-analy sis of the literature explicitly pro vides - an insight in to the interplay of macro variables viz. organiza tional culture, - organizational struc ture, organizational learning, and knowledge management - architec tures to have organizational innova tion in full swing. The paper - de scribes the impact of all these vari ables towards innovation at organi - zational level. A conceptual model of organizational innovation has been proposed, - which may be uti lized for creating suitable architec tures to make innovation - in organi zations. The proposed model of or ganizational innovation needs - to be empirically validated across cul", "venue": "", "year": 2011, "referenceCount": - 38, "citationCount": 32, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": "Business", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-04-01", "journal": {"name": - "The Indian Journal of Industrial Relations", "pages": "713-725", "volume": - "46"}, "authors": [{"authorId": "2118413239", "name": "S. Singh"}]}, {"paperId": - "30a64bdf778b8f561af9ae589e822c2c800920b1", "externalIds": {"MAG": "2782975919", - "DOI": "10.1007/b138233", "CorpusId": 33352850}, "url": "https://www.semanticscholar.org/paper/30a64bdf778b8f561af9ae589e822c2c800920b1", - "title": "Universal Artificial Intelligence", "abstract": null, "venue": "Texts - in Theoretical Computer Science. An EATCS Series", "year": 2004, "referenceCount": - 22, "citationCount": 237, "influentialCitationCount": 27, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-10-12", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1406347404", - "name": "Dr. Marcus Hutter"}]}, {"paperId": "0135c9f9a0c7907594c968dee97f12cbbb3c3284", - "externalIds": {"MAG": "2181310123", "DOI": "10.1093/FORESTSCIENCE/50.2.162", - "CorpusId": 85975560}, "url": "https://www.semanticscholar.org/paper/0135c9f9a0c7907594c968dee97f12cbbb3c3284", + "name": "V. I. Lohr"}]}, {"paperId": "ec3b28e255c1938f72b467ec5a0bb96fa78ea667", + "externalIds": {"MAG": "2038431675", "DOI": "10.1007/BF01009531", "CorpusId": + 120443794}, "corpusId": 120443794, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ec3b28e255c1938f72b467ec5a0bb96fa78ea667", + "title": "The search for Turing structures", "abstract": null, "venue": "", + "year": 1987, "referenceCount": 43, "citationCount": 21, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1987-09-01", "journal": {"name": "Journal of Statistical Physics", "pages": + "1031-1044", "volume": "48"}, "authors": [{"authorId": "92147854", "name": + "P. Borckmans"}, {"authorId": "49808656", "name": "G. Dewel"}, {"authorId": + "4851082", "name": "D. Walgraef"}, {"authorId": "2055973640", "name": "Y. + Katayama"}]}, {"paperId": "a08a66499faa8ecc705af7ad348815e4080eb0f5", "externalIds": + {"ArXiv": "quant-ph/0405191", "MAG": "2953017418", "DOI": "10.1142/9789812774491_0017", + "CorpusId": 14421775}, "corpusId": 14421775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a08a66499faa8ecc705af7ad348815e4080eb0f5", + "title": "Generalized Quantum Turing Machine and its Application to the SAT + Chaos Algorithm", "abstract": "Ohya and Volovich have proposed a new quantum + computation model with chaotic amplification to solve the SAT problem, which + went beyond usual quantum algorithm. In this paper, we generalize quantum + Turing machine, and we show in this general quantum Turing machine (GQTM) + that we can treat the Ohya-Volovich (OV) SAT algorithm.", "venue": "", "year": + 2004, "referenceCount": 13, "citationCount": 25, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Physics", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-05-31", + "journal": {"name": "", "pages": "204-225", "volume": ""}, "authors": [{"authorId": + "2073439", "name": "S. Iriyama"}, {"authorId": "1685591", "name": "M. Ohya"}, + {"authorId": "3045058", "name": "I. Volovich"}]}, {"paperId": "0ac1ab736aa626a896dc0f26f8fc2b31dc65d384", + "externalIds": {"MAG": "2401755623", "DOI": "10.1177/000348945906800414", + "CorpusId": 19864273, "PubMed": "14446883"}, "corpusId": 19864273, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0ac1ab736aa626a896dc0f26f8fc2b31dc65d384", + "title": "LXXIX Middle Ear Muscle Activity at Moderate Sound Levels", "abstract": + "The role of the middle ear muscles in everyday audition has apparently received + little emphasis in the past. A review of the litera\u00ad ture leaves one + with the impression that the tensor tympani and stapedius muscles are at best + interesting masses in the middle ear, inert unless very loud sounds are presented; + that with the introduction of loud sounds (80-90 db) these muscles suddenly + spring to life, con\u00ad tracting and reducing the sound amplitude reaching + the cochlea.", "venue": "The Annals of otology, rhinology, and laryngology", + "year": 1959, "referenceCount": 10, "citationCount": 82, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1959-12-01", "journal": {"name": "Annals of + Otology, Rhinology & Laryngology", "pages": "1126 - 1143", "volume": "68"}, + "authors": [{"authorId": "3034753", "name": "F. B. Simmons"}]}, {"paperId": + "ea3a1edb45702252891b7816695c2cdea4711cf6", "externalIds": {"MAG": "2008061806", + "DOI": "10.1016/0375-9601(95)00926-4", "CorpusId": 119400783}, "corpusId": + 119400783, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea3a1edb45702252891b7816695c2cdea4711cf6", + "title": "Hexagon and stripe Turing structures in a gas discharge system", + "abstract": null, "venue": "", "year": 1996, "referenceCount": 14, "citationCount": + 54, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1996-02-12", "journal": {"name": + "Physics Letters A", "pages": "184-190", "volume": "211"}, "authors": [{"authorId": + "3227869", "name": "Y. Astrov"}, {"authorId": "91977538", "name": "E. Ammelt"}, + {"authorId": "102751350", "name": "S. Teperick"}, {"authorId": "91811809", + "name": "H. Purwins"}]}, {"paperId": "08e786fbcab43da41201047cdd04cf1def9a2f89", + "externalIds": {"MAG": "2978205342", "DBLP": "conf/dna/2012", "DOI": "10.1007/978-3-642-32208-2", + "CorpusId": 5681455}, "corpusId": 5681455, "publicationVenue": {"id": "2f5d0e8a-faad-4f10-b323-2b2e3c439a78", + "name": "Lecture Notes in Computer Science", "type": "journal", "alternate_names": + ["LNCS", "Transactions on Computational Systems Biology", "Trans Comput Syst + Biology", "Lect Note Comput Sci"], "issn": "0302-9743", "alternate_issns": + ["1861-2059", "1861-2075", "1866-4733"], "url": "http://www.springer.com/lncs", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-164-2-73659-0,00.html", + "https://link.springer.com/bookseries/558", "http://link.springer.com/search?query=\"Transactions+on+Computational+Systems+Biology\""]}, + "url": "https://www.semanticscholar.org/paper/08e786fbcab43da41201047cdd04cf1def9a2f89", + "title": "DNA Computing and Molecular Programming", "abstract": null, "venue": + "Lecture Notes in Computer Science", "year": 2012, "referenceCount": 29, "citationCount": + 28, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-642-32208-2%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"volume": "7433"}, "authors": [{"authorId": "2111306", "name": + "D. Stefanovic"}, {"authorId": "2529541", "name": "A. Turberfield"}]}, {"paperId": + "f7e85315a740ccb06924e4b01dcd8804065f9c20", "externalIds": {"MAG": "1994077918", + "DBLP": "journals/jacm/Perlis67", "DOI": "10.1145/321371.321372", "CorpusId": + 12937998}, "corpusId": 12937998, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f7e85315a740ccb06924e4b01dcd8804065f9c20", + "title": "The Synthesis of Algorithmic Systems", "abstract": "On what does + the fame of Turing rest? That he proved a theorem showing that for a general + computing device later dubbed a \"Turing machine\" -there existed functions + which it could not compute? I doubt it. More likely it is because of the model + he invented and employed: his formal mechanism. This~ model has captured the + imagination and mobilized the thoughts of a generation Of scientists. It has + provided a base for arguments leading to theories. His model has proved so + useful that its generated activity has been distributed not only in mathematics, + but through several technologies as well. The arguments employed were not + always formal and the consequent creations were not all abstract. Indeed a + most fruitful consequence of the Turing machine has been with the creation, + study, and computation of functions which are computable, i.e., in computer + programming. I am sure that all here will agree that this model has been enormously + valuable. History will forgive me for not devoting any attention in this lecture + to the affect which Turing had on the development of the general purpose digital + computer which has further accelerated our involvement with the theory and + practice of computation. Since the appearance of Turing''s model there have + been others which have concerned and benefited us in computing. I think that + only one has had an affect like Turing''s: the formal mechanism called ALGOL. + Many will immediately disagree, pointing out that too few of us have understood + it or used it. While such has unhappily been the case, it is not the point. + The impulse given to the development of research in computer science is relevant + while the number of adherents is not. ALGOL has mobilized our thoughts and + has provided us a base for our arguments. I have long puzzled over why ALGOL + has been such a useful model in our field. Perhaps some of the reasons are:", + "venue": "JACM", "year": 1967, "referenceCount": 0, "citationCount": 29, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "J. ACM", "pages": "1-9", "volume": "14"}, "authors": [{"authorId": + "1790022", "name": "A. Perlis"}]}, {"paperId": "eba2376347299ffe7434d280c1387c0a2f0c82dc", + "externalIds": {"MAG": "2034286284", "DOI": "10.1007/978-3-662-01462-2_3", + "CorpusId": 170200950}, "corpusId": 170200950, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/eba2376347299ffe7434d280c1387c0a2f0c82dc", + "title": "\u03bc-Rekursive Funktionen", "abstract": null, "venue": "", "year": + 1961, "referenceCount": 1, "citationCount": 28, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": {"name": + "", "pages": "59-95", "volume": ""}, "authors": [{"authorId": "2069011124", + "name": "Hans Hermes"}]}, {"paperId": "22d0b9e61fd52c0edb2cf2855c8eaa10ba7b10e7", + "externalIds": {"MAG": "2092632611", "ArXiv": "1207.3424", "DOI": "10.1103/PhysRevE.86.056203", + "CorpusId": 15977964, "PubMed": "23214853"}, "corpusId": 15977964, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/22d0b9e61fd52c0edb2cf2855c8eaa10ba7b10e7", + "title": "Turing patterns and apparent competition in predator-prey food webs + on networks.", "abstract": "Reaction-diffusion systems may lead to the formation + of steady-state heterogeneous spatial patterns, known as Turing patterns. + Their mathematical formulation is important for the study of pattern formation + in general and plays central roles in many fields of biology, such as ecology + and morphogenesis. Here we show that Turing patterns may have a decisive role + in shaping the abundance distribution of predators and prey living in patchy + landscapes. We extend the original model proposed by Nakao and Mikhailov [Nat. + Phys. 6, 544 (2010)] by considering food chains with several interacting pairs + of prey and predators distributed on a scale-free network of patches. We identify + patterns of species distribution displaying high degrees of apparent competition + driven by Turing instabilities. Our results provide further indication that + differences in abundance distribution among patches can be generated dynamically + by self organized Turing patterns and not only by intrinsic environmental + heterogeneity.", "venue": "Physical review. E, Statistical, nonlinear, and + soft matter physics", "year": 2012, "referenceCount": 72, "citationCount": + 23, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1207.3424", "status": "GREEN"}, "fieldsOfStudy": + ["Biology", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-07-14", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 056203\n ", "volume": + "86 5 Pt 2"}, "authors": [{"authorId": "145166357", "name": "L. D. Fernandes"}, + {"authorId": "6866640", "name": "M. D. de Aguiar"}]}, {"paperId": "dc4b752cbf7d55838d6a9cd9b07a00462b2d9348", + "externalIds": {"MAG": "2108509888", "DOI": "10.1007/S11538-006-9106-8", "CorpusId": + 16453074, "PubMed": "16832735"}, "corpusId": 16453074, "publicationVenue": + {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/dc4b752cbf7d55838d6a9cd9b07a00462b2d9348", + "title": "Mode Transitions in a Model Reaction\u2013Diffusion System Driven + by Domain Growth and Noise", "abstract": null, "venue": "Bulletin of Mathematical + Biology", "year": 2006, "referenceCount": 20, "citationCount": 54, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:9689107d-f23c-4952-91e3-97bf12290845/download_file?safe_filename=211.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2006-06-06", "journal": + {"name": "Bulletin of Mathematical Biology", "pages": "981-995", "volume": + "68"}, "authors": [{"authorId": "48768399", "name": "Iain Barrass"}, {"authorId": + "2434078", "name": "E. Crampin"}, {"authorId": "2339973", "name": "P. Maini"}]}, + {"paperId": "c001406d9fc02bc9dabef72a05a8803ed7a60d67", "externalIds": {"DBLP": + "conf/icann/CabessaV13", "MAG": "2215138167", "DOI": "10.1007/978-3-642-40728-4_8", + "CorpusId": 6101310}, "corpusId": 6101310, "publicationVenue": {"id": "3e64b1c1-745f-4edf-bd92-b8ef122bb49c", + "name": "International Conference on Artificial Neural Networks", "type": + "conference", "alternate_names": ["Int Conf Artif Neural Netw", "ICANN"], + "url": "http://www.e-nns.org/"}, "url": "https://www.semanticscholar.org/paper/c001406d9fc02bc9dabef72a05a8803ed7a60d67", + "title": "The Super-Turing Computational Power of Interactive Evolving Recurrent + Neural Networks", "abstract": null, "venue": "International Conference on + Artificial Neural Networks", "year": 2013, "referenceCount": 20, "citationCount": + 23, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-09-10", + "journal": {"pages": "58-65"}, "authors": [{"authorId": "1788189", "name": + "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "1754229", "name": "A. Villa"}]}, + {"paperId": "3d523d3f5fe7e1b24d84234e2b9a6567c0b0f797", "externalIds": {"MAG": + "2134233117", "DOI": "10.1063/1.2397073", "CorpusId": 9479679, "PubMed": "17144685"}, + "corpusId": 9479679, "publicationVenue": {"id": "1bb63b2b-3f57-4387-aaf6-b2a33dfcdcc5", + "name": "Journal of Chemical Physics", "type": "journal", "alternate_names": + ["J Chem Phys"], "issn": "0021-9606", "url": "http://jcp.aip.org/", "alternate_urls": + ["https://aip.scitation.org/journal/jcp"]}, "url": "https://www.semanticscholar.org/paper/3d523d3f5fe7e1b24d84234e2b9a6567c0b0f797", + "title": "A graph-theoretic method for detecting potential Turing bifurcations.", + "abstract": "The conditions for diffusion-driven (Turing) instabilities in + systems with two reactive species are well known. General methods for detecting + potential Turing bifurcations in larger reaction schemes are, on the other + hand, not well developed. We prove a theorem for a graph-theoretic condition + originally given by Volpert and Ivanova [Mathematical Modeling (Nauka, Moscow, + 1987) (in Russian), p. 57] for Turing instabilities in a mass-action reaction-diffusion + system involving n substances. The method is based on the representation of + a reaction mechanism as a bipartite graph with two types of nodes representing + chemical species and reactions, respectively. The condition for diffusion-driven + instability is related to the existence of a structure in the graph known + as a critical fragment. The technique is illustrated using a substrate-inhibited + bifunctional enzyme mechanism which involves seven chemical species.", "venue": + "Journal of Chemical Physics", "year": 2006, "referenceCount": 62, "citationCount": + 29, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2006-11-22", "journal": {"name": "The + Journal of chemical physics", "pages": "\n 204102\n ", "volume": + "125 20"}, "authors": [{"authorId": "3291335", "name": "Maya Mincheva"}, {"authorId": + "2535009", "name": "M. Roussel"}]}, {"paperId": "3a22528197286360e80b83ce205825d024a1c3b8", + "externalIds": {"MAG": "2791394758", "DOI": "10.21423/R11H2H", "CorpusId": + 139678999}, "corpusId": 139678999, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a22528197286360e80b83ce205825d024a1c3b8", + "title": "Tilting Pad Bearing Design.", "abstract": "The basics of tilting + pad bearing design are discussed to include limits of operation for load, + speed, and metal tempera\u00ad ture. Optimum temperature sensor locations + are recommended for self aligning and nonaligning tilting pads. Tilting pad + bear\u00ad ing geometric properties and their influence on bearing and rotordynamics + are addressed including the advantages and dis\u00ad advantages of zero preloaded + pads. Also, the advantages of increasing the pad axial length are shown. Example + calculations are presented for the tilting pad pivot film thickness which + is necessary to determine if the top pads are loaded or unloaded. Tilting + pad static shaft sink and clearance measurement techniques are addressed. + The equations to calcu\u00ad late normal force and break away torque are derived + including an example calculation comparing a tilting pad bearing to a two + axial groove bearing. Tilting pad bearing oil flow and tempera\u00ad ture + rise are included along with a discussion of reduced temper\u00ad ature tilting + pad designs.", "venue": "", "year": 1994, "referenceCount": 6, "citationCount": + 52, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "73463816", "name": "J. + Nicholas"}]}, {"paperId": "a84f376a8217a10ade875966eb18e1c851cfee66", "externalIds": + {"DOI": "10.21203/rs.3.rs-39890/v1", "CorpusId": 231596570, "PubMed": "33438257"}, + "corpusId": 231596570, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a84f376a8217a10ade875966eb18e1c851cfee66", + "title": "An efficient Turing-type Ag2Se-CoSe2 multi-interfacial oxygen-evolving + electrocatalyst.", "abstract": "Although the Turing structures, or stationary + reaction-diffusion patterns, have received increasing attention in biology + and chemistry, making such unusual patterns on inorganic solids is fundamentally + challenging. We report a simple cation exchange approach to produce Turing-type + Ag 2 Se on CoSe 2 nanobelts relied on diffusion-driven instability. The resultant + Turing-type Ag 2 Se-CoSe 2 material is highly effective to catalyze the oxygen + evolution reaction (OER) in alkaline electrolytes with an 84.5% anodic energy + efficiency. Electrochemical measurements show that the intrinsic OER activity + correlates linearly with the length of Ag 2 Se-CoSe 2 interfaces, determining + that such Turing-type interfaces are more active sites for OER. Combing X-ray + absorption and computational simulations, we ascribe the excellent OER performance + to the optimized adsorption energies for critical oxygen-containing intermediates + at the unconventional interfaces.", "venue": "Angewandte Chemie", "year": + 2020, "referenceCount": 60, "citationCount": 23, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.researchsquare.com/article/rs-39890/latest.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-07-15", "journal": + {"name": "Angewandte Chemie"}, "authors": [{"authorId": "39488118", "name": + "Minrui Gao"}, {"authorId": "2141906408", "name": "Xiao-Long Zhang"}, {"authorId": + "2119185235", "name": "Peng-Peng Yang"}, {"authorId": "4847366", "name": "Ya-Rong + Zheng"}, {"authorId": "2087104539", "name": "Yu Duan"}, {"authorId": "12341323", + "name": "Shaojin Hu"}, {"authorId": "2087909594", "name": "Tao Ma"}, {"authorId": + "51022972", "name": "Fei-Yue Gao"}, {"authorId": "95471198", "name": "Zhuang-Zhuang + Niu"}, {"authorId": "121809055", "name": "Zhi-Zheng Wu"}, {"authorId": "2054559200", + "name": "Shuai Qin"}, {"authorId": "2046862107", "name": "Li-Ping Chi"}, {"authorId": + "143677825", "name": "Xingxin Yu"}, {"authorId": "28250749", "name": "R. Wu"}, + {"authorId": "79853843", "name": "Chao Gu"}, {"authorId": "93721435", "name": + "Cheng\u2010Ming Wang"}, {"authorId": "36052262", "name": "Xusheng Zheng"}, + {"authorId": "2152196383", "name": "Xiao Zheng"}, {"authorId": "6377164", + "name": "Junfa Zhu"}]}, {"paperId": "06996e180cab25c3644387bd93fb6bad6cb76556", + "externalIds": {"MAG": "2320648065", "DBLP": "series/synthesis/2016Raedt", + "DOI": "10.2200/S00692ED1V01Y201601AIM032", "CorpusId": 26726745}, "corpusId": + 26726745, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/06996e180cab25c3644387bd93fb6bad6cb76556", + "title": "Statistical Relational Artificial Intelligence: Logic, Probability, + and Computation", "abstract": "An intelligent agent interacting with the real + world will encounter individual people, courses, test results, drugs prescriptions, + chairs, boxes, etc., and needs to reason about properties of these individuals + and relations among them as well as cope with uncertainty. Uncertainty has + been studied in probability theory and graphical models, and relations have + been studied in logic, in particular in the predicate calculus and its extensions. + This book examines the foundations of combining logic and probability into + what are called relational probabilistic models. It introduces representations, + inference, and learning techniques for probability, logic, and their combinations. + The book focuses on two representations in detail: Markov logic networks, + a relational extension of undirected graphical models and weighted first-order + predicate calculus formula, and Problog, a probabilistic extension of logic + programs that can also be viewed as a Turing-complete relational extension + of Bayesian networks.", "venue": "Statistical Relational Artificial Intelligence: + Logic, Probability, and Computation", "year": 2016, "referenceCount": 261, + "citationCount": 237, "influentialCitationCount": 12, "isOpenAccess": true, + "openAccessPdf": {"url": "https://zbmath.org/pdf/1352.68005.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-03-24", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1740042", + "name": "L. D. Raedt"}, {"authorId": "1746871", "name": "K. Kersting"}, {"authorId": + "145986014", "name": "Sriraam Natarajan"}, {"authorId": "143715817", "name": + "D. Poole"}]}, {"paperId": "df45f088d1a4ac460e6001b3e834bf1d6fd6988f", "externalIds": + {"MAG": "2069518818", "DOI": "10.2307/1939265", "CorpusId": 85210550}, "corpusId": + 85210550, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/df45f088d1a4ac460e6001b3e834bf1d6fd6988f", + "title": "ADULT RECRUITMENT IN CHORUS FROGS: EFFECTS OF SIZE AND DATE AT METAMORPHOSIS''", + "abstract": "A cohort of tadpoles of the chorus frog, Pseudacris triseriata, + on Isle Royale, Michigan, was marked to determine the effect of body size + and date at metamorphosis on survivorship to maturity. The cohort was classified + at metamorphosis into four categories based on size and date of metamorphosis: + large-early, small-early, large-late, and small- late. The number of frogs + in each category that returned to breed on the study area was monitored for + the following 2 yr. Long larval period and small body size at metamorphosis + influenced recruitment to the breeding population by delaying maturity. Frogs + that meta- morphosed at large size maintained their size advantage at maturity. + Large body size and early date at metamorphosis increased survivorship to + maturity by enhancing the chance that reproductive size was attained within + 1 yr of metamorphosis. Frogs that were recap- tured in the 2nd yr after metamorphosis, + when all frogs had attained mature size, were from all four categories in + the same proportions marked at metamorphosis, indicating that unless breeding + during the Ist yr led to higher mortality of large individuals, survival rate + after metamorphosis was not related to size or date at metamorphosis.", "venue": + "", "year": 1987, "referenceCount": 32, "citationCount": 805, "influentialCitationCount": + 44, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1987-04-01", "journal": {"name": "Ecology", "pages": "344-350", + "volume": "68"}, "authors": [{"authorId": "38561720", "name": "David C. Smith"}]}, + {"paperId": "0135c9f9a0c7907594c968dee97f12cbbb3c3284", "externalIds": {"MAG": + "2181310123", "DOI": "10.1093/FORESTSCIENCE/50.2.162", "CorpusId": 85975560}, + "corpusId": 85975560, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0135c9f9a0c7907594c968dee97f12cbbb3c3284", "title": "Comparison of Historical and Contemporary Forest Structure and Composition on Permanent Plots in Southwestern Ponderosa Pine Forests", "abstract": "We compared historical (1909-1913) and contemporary (1997-1999) forest struc- @@ -24216,64 +27579,128 @@ interactions: beetle epidemics and stand replacing wildfire over large areas in the Southwest. FOR .S CI. 50(2):162-176.", "venue": "", "year": 2004, "referenceCount": 41, "citationCount": 173, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-04-01", "journal": {"name": - "Forest Science", "pages": "162-176", "volume": "50"}, "authors": [{"authorId": - "38359895", "name": "M. M. Moore"}, {"authorId": "49962199", "name": "D. Huffman"}, - {"authorId": "2608827", "name": "P. Ful\u00e9"}, {"authorId": "21519577", - "name": "W. Covington"}, {"authorId": "21506403", "name": "Joseph E. Crouse"}]}, - {"paperId": "b103e87c7727134927d3ffb06934a95c10c02fc0", "externalIds": {"DBLP": - "journals/mima/FloridiC20", "MAG": "3095319910", "DOI": "10.1007/s11023-020-09548-1", - "CorpusId": 228954221}, "url": "https://www.semanticscholar.org/paper/b103e87c7727134927d3ffb06934a95c10c02fc0", - "title": "GPT-3: Its Nature, Scope, Limits, and Consequences", "abstract": - null, "venue": "Minds Mach.", "year": 2020, "referenceCount": 33, "citationCount": - 239, "influentialCitationCount": 10, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2020-11-01", "journal": - {"name": "Minds and Machines", "pages": "681-694", "volume": "30"}, "authors": - [{"authorId": "1982425", "name": "L. Floridi"}, {"authorId": "2037605322", - "name": "Massimo Chiriatti"}]}, {"paperId": "a8e4100395a3684d7f8523ccf827bad581457a3c", - "externalIds": {"DBLP": "journals/cacm/Haigh14", "MAG": "2142601750", "DOI": - "10.1145/2542504", "CorpusId": 5694189}, "url": "https://www.semanticscholar.org/paper/a8e4100395a3684d7f8523ccf827bad581457a3c", - "title": "Actually, Turing did not invent the computer", "abstract": "Separating - the origins of computer science and technology.", "venue": "CACM", "year": - 2014, "referenceCount": 6, "citationCount": 30, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-04-01", + "journal": {"name": "Forest Science", "pages": "162-176", "volume": "50"}, + "authors": [{"authorId": "38359895", "name": "M. M. Moore"}, {"authorId": + "49962199", "name": "D. Huffman"}, {"authorId": "2608827", "name": "P. Ful\u00e9"}, + {"authorId": "21519577", "name": "W. Covington"}, {"authorId": "21506403", + "name": "Joseph E. Crouse"}]}, {"paperId": "884bfee7c2c6a874fad2a34207eb266f97a6cc77", + "externalIds": {"MAG": "1990236474", "DOI": "10.1162/artl.1995.2.3.333", "CorpusId": + 44710180}, "corpusId": 44710180, "publicationVenue": {"id": "5ed9f470-65a3-4077-8dab-163b0c5cb9e6", + "name": "Artificial Life", "type": "journal", "alternate_names": ["Artif Life"], + "issn": "1064-5462", "url": "http://cognet.mit.edu/library/journals/journal?issn=10645462", + "alternate_urls": ["http://www.mitpressjournals.org/loi/artl", "https://www.mitpressjournals.org/loi/artl", + "https://www.mitpressjournals.org/doi/10.1162/ARTL_a_00243"]}, "url": "https://www.semanticscholar.org/paper/884bfee7c2c6a874fad2a34207eb266f97a6cc77", + "title": "Hidden Order: How Adaptation Builds Complexity.", "abstract": "Computer + simulations of artificial ecologies typically model the interactions of a + population of independently acting, spatially situated, resource-restricted, + differently structured, self-reproducing agents. The interactions in such + systems are typically highly nonlinear, subject to random perturbation, executed + in parallel, and coevolutionary in the sense that the agents interact with + each other as well as their environment. Examples of artificial ecologies + that possess the above characteristics include Skipper''s \"computer zoo\" + of migrating flocks of hierarchically invokable fragments of assembly code + [10], Shanahan''s populations of evolutionary automata [9], Lindgren''s coevolving + populations of strategies for playing the iterated prisoner''s dilemma game + [5], the Turing gas of self-organizing groups of autocatalytic algorithmic + fragments of Rasmussen, KnudLsen, and Feldberg [6], Ray''s populations of + parasitic and symbiotic self-reproducing assembly code programs [8], the populations + of redcode coreworld creatures of Rasmussen, Knudsen, Feldberg, and Hindsholm + [7], Werner and Dyer''s populations of males and females that coevolve communication + [11], and Ackley and Littman''s artificial world for testing the Baldwin effect + concerning learning and evolution [1]. Each of these complex adaptive systems + (and many others like them) succeed in illustrating one or more key features + of living systems. However, each of these systems live up to their name in + the worst possible way\u2014they are all exceedingly complex. The emergent + behavior and other interesting phenomena are obscured by so much modelspecific + detail that it is rarely clear whether the observed phenomena represent any + important general principles or are merely artifacts of the details. Moreover, + all of these existing systems are computationally expensive and deliver little + in the way of important emergent phenomena in relation to the amount of computational + effort expended. This excessive overhead is not merely a matter of inefficiency + or inconvenience; it may actually preclude emergence of important phenomena + that can only materialize in the presence of certain minimum amounts of time + or matter. John Holland''s new book, Hidden Order: How Adaptation Builds Complexity + [3],", "venue": "Artificial Life", "year": 1995, "referenceCount": 2, "citationCount": + 2307, "influentialCitationCount": 277, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Commun. ACM", "pages": "36-41", "volume": "57"}, - "authors": [{"authorId": "1714013", "name": "T. Haigh"}]}, {"paperId": "67b2918c1804a76552002aa2ea6f35e0722d3b8f", - "externalIds": {"MAG": "2062802768", "PubMedCentral": "534809", "DOI": "10.1371/JOURNAL.PBIO.0020424", - "CorpusId": 5095069, "PubMed": "15583715"}, "url": "https://www.semanticscholar.org/paper/67b2918c1804a76552002aa2ea6f35e0722d3b8f", - "title": "Algorithmic Self-Assembly of DNA Sierpinski Triangles", "abstract": - "Algorithms and information, fundamental to technological and biological organization, - are also an essential aspect of many elementary physical phenomena, such as - molecular self-assembly. Here we report the molecular realization, using two-dimensional - self-assembly of DNA tiles, of a cellular automaton whose update rule computes - the binary function XOR and thus fabricates a fractal pattern\u2014a Sierpinski - triangle\u2014as it grows. To achieve this, abstract tiles were translated - into DNA tiles based on double-crossover motifs. Serving as input for the - computation, long single-stranded DNA molecules were used to nucleate growth - of tiles into algorithmic crystals. For both of two independent molecular - realizations, atomic force microscopy revealed recognizable Sierpinski triangles - containing 100\u2013200 correct tiles. Error rates during assembly appear - to range from 1% to 10%. Although imperfect, the growth of Sierpinski triangles - demonstrates all the necessary mechanisms for the molecular implementation - of arbitrary cellular automata. This shows that engineered DNA self-assembly - can be treated as a Turing-universal biomolecular system, capable of implementing - any desired algorithm for computation or construction tasks.", "venue": "PLoS - Biology", "year": 2004, "referenceCount": 60, "citationCount": 799, "influentialCitationCount": - 33, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2004-12-01", "journal": {"name": "PLoS - Biology", "volume": "2"}, "authors": [{"authorId": "145477156", "name": "P. - Rothemund"}, {"authorId": "92381867", "name": "N. Papadakis"}, {"authorId": - "3094920", "name": "E. Winfree"}]}, {"paperId": "24d2b44919461eba96daeec4c446154dba302fef", - "externalIds": {"MAG": "1556174207", "CorpusId": 15358725}, "url": "https://www.semanticscholar.org/paper/24d2b44919461eba96daeec4c446154dba302fef", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Artificial Life", "pages": "333-335", "volume": "2"}, + "authors": [{"authorId": "1732302", "name": "J. Koza"}]}, {"paperId": "9de31efb5110cbc965d120fa40db670f50b8bd89", + "externalIds": {"DBLP": "journals/mscs/CardelliZ10", "MAG": "2138171721", + "DOI": "10.1017/S0960129509990259", "CorpusId": 15923154}, "corpusId": 15923154, + "publicationVenue": {"id": "1a00fc67-b5a0-4dae-993c-023e6c11659a", "name": + "Mathematical Structures in Computer Science", "type": "journal", "alternate_names": + ["Math Struct Comput Sci"], "issn": "0960-1295", "url": "https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=MSC", + "http://journals.cambridge.org/MSC"]}, "url": "https://www.semanticscholar.org/paper/9de31efb5110cbc965d120fa40db670f50b8bd89", + "title": "Turing universality of the Biochemical Ground Form", "abstract": + "We explore the expressive power of languages that naturally model biochemical + interactions relative to languages that only naturally model basic chemical + reactions, identifying molecular association as the basic mechanism that distinguishes + the former from the latter. We use a process algebra, the Biochemical Ground + Form (BGF), that adds primitives for molecular association to CGF, which is + a process algebra that has been proved to be equivalent to the traditional + notations for describing basic chemical reactions. We first observe that, + unlike CGF, BGF is Turing universal as it supports a finite precise encoding + of Random Access Machines, which comprise a well-known Turing powerful formalism. + Then we prove that the Turing universality of BGF derives from the interplay + between the molecular primitives of association and dissociation. In fact, + the elimination from BGF of the primitives already present in CGF does not + reduce the computational strength of the process algebra, but if either association + or dissociation is removed, BGF ceases to be Turing complete.", "venue": "Mathematical + Structures in Computer Science", "year": 2010, "referenceCount": 23, "citationCount": + 22, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://lucacardelli.name/Papers/Turing%20Universality%20of%20BGF%20(MSCS).pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-02-01", "journal": {"name": "Mathematical Structures + in Computer Science", "pages": "45 - 73", "volume": "20"}, "authors": [{"authorId": + "145457097", "name": "L. Cardelli"}, {"authorId": "1777352", "name": "G. Zavattaro"}]}, + {"paperId": "97b47dc9bc0da49f83a7ef2e9d2ac461c222dd73", "externalIds": {"PubMedCentral": + "6047832", "DBLP": "journals/ploscb/BrinkmannMRM18", "MAG": "2810023719", + "DOI": "10.1371/journal.pcbi.1006259", "CorpusId": 49670859, "PubMed": "29969460"}, + "corpusId": 49670859, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/97b47dc9bc0da49f83a7ef2e9d2ac461c222dd73", + "title": "Post-Turing tissue pattern formation: Advent of mechanochemistry", + "abstract": "Chemical and mechanical pattern formation is fundamental during + embryogenesis and tissue development. Yet, the underlying molecular and cellular + mechanisms are still elusive in many cases. Most current theories assume that + tissue development is driven by chemical processes: either as a sequence of + chemical patterns each depending on the previous one, or by patterns spontaneously + arising from specific chemical interactions (such as \u201cTuring-patterns\u201d). + Within both theories, mechanical patterns are usually regarded as passive + by-products of chemical pre-patters. However, several experiments question + these theories, and an increasing number of studies shows that tissue mechanics + can actively influence chemical patterns during development. In this study, + we thus focus on the interplay between chemical and mechanical processes during + tissue development. On one hand, based on recent experimental data, we develop + new mechanochemical simulation models of evolving tissues, in which the full + 3D representation of the tissue appears to be critical for obtaining a realistic + mechanochemical behaviour. The presented modelling approach is flexible and + numerically studied using state of the art finite element methods. Thus, it + may serve as a basis to combine simulations with new experimental methods + in tissue development. On the other hand, we apply the developed approach + and demonstrate that even simple interactions between tissue mechanics and + chemistry spontaneously lead to robust and complex mechanochemical patterns. + Especially, we demonstrate that the main contradictions arising in the framework + of purely chemical theories are naturally and automatically resolved using + the mechanochemical patterning theory.", "venue": "PLoS Comput. Biol.", "year": + 2018, "referenceCount": 102, "citationCount": 41, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.plos.org/ploscompbiol/article/file?id=10.1371/journal.pcbi.1006259&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-07-01", "journal": + {"name": "PLoS Computational Biology", "volume": "14"}, "authors": [{"authorId": + "40663769", "name": "Felix Brinkmann"}, {"authorId": "3262942", "name": "M. + Mercker"}, {"authorId": "144825773", "name": "T. Richter"}, {"authorId": "1389565398", + "name": "A. Marciniak-Czochra"}]}, {"paperId": "24d2b44919461eba96daeec4c446154dba302fef", + "externalIds": {"MAG": "1556174207", "CorpusId": 15358725}, "corpusId": 15358725, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/24d2b44919461eba96daeec4c446154dba302fef", "title": "Simulations of Computing by Self-Assembly", "abstract": "Winfree (1996) proposed a Turing-universal model of DNA self-assembly. In this abstract model, DNA double-crossover molecules self-assemble to form an algorithmically-patterned @@ -24286,174 +27713,17 @@ interactions: growth is slowest, and that error rates can be made arbitrarily low by decreasing concentration and increasing binding strengths.", "venue": "", "year": 1998, "referenceCount": 39, "citationCount": 236, "influentialCitationCount": 31, - "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1998-05-31", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "3094920", "name": "E. Winfree"}]}, {"paperId": "df45f088d1a4ac460e6001b3e834bf1d6fd6988f", - "externalIds": {"MAG": "2069518818", "DOI": "10.2307/1939265", "CorpusId": - 85210550}, "url": "https://www.semanticscholar.org/paper/df45f088d1a4ac460e6001b3e834bf1d6fd6988f", - "title": "ADULT RECRUITMENT IN CHORUS FROGS: EFFECTS OF SIZE AND DATE AT METAMORPHOSIS''", - "abstract": "A cohort of tadpoles of the chorus frog, Pseudacris triseriata, - on Isle Royale, Michigan, was marked to determine the effect of body size - and date at metamorphosis on survivorship to maturity. The cohort was classified - at metamorphosis into four categories based on size and date of metamorphosis: - large-early, small-early, large-late, and small- late. The number of frogs - in each category that returned to breed on the study area was monitored for - the following 2 yr. Long larval period and small body size at metamorphosis - influenced recruitment to the breeding population by delaying maturity. Frogs - that meta- morphosed at large size maintained their size advantage at maturity. - Large body size and early date at metamorphosis increased survivorship to - maturity by enhancing the chance that reproductive size was attained within - 1 yr of metamorphosis. Frogs that were recap- tured in the 2nd yr after metamorphosis, - when all frogs had attained mature size, were from all four categories in - the same proportions marked at metamorphosis, indicating that unless breeding - during the Ist yr led to higher mortality of large individuals, survival rate - after metamorphosis was not related to size or date at metamorphosis.", "venue": - "", "year": 1987, "referenceCount": 32, "citationCount": 805, "influentialCitationCount": - 44, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1987-04-01", "journal": {"name": "Ecology", "pages": "344-350", "volume": - "68"}, "authors": [{"authorId": "38561720", "name": "David C. Smith"}]}, {"paperId": - "891897f22b080b8bb175c50d5ed2b54bee655978", "externalIds": {"MAG": "2134202663", - "DBLP": "conf/focs/BuhrmanFT95", "DOI": "10.1109/SFCS.1995.492582", "CorpusId": - 16235476}, "url": "https://www.semanticscholar.org/paper/891897f22b080b8bb175c50d5ed2b54bee655978", - "title": "Using autoreducibility to separate complexity classes", "abstract": - "A language is autoreducible if it can be reduced to itself by a Turing machine - that does not ask its own input to the oracle. We use autoreducibility to - separate exponential space from doubly exponential space by showing that all - Turing complete sets for exponential space are autoreducible but there exists - some Turing complete set for doubly exponential space that is not. We immediately - also get a separation of logarithmic space from polynomial space. Although - we already know how to separate these classes using diagonalization, our proofs - separate classes solely by showing they have different structural properties, - thus applying Post''s Program (E. Pos, 1944) to complexity theory. We feel - such techniques may prove unknown separations in the future. In particular - if we could settle the question as to whether all complete sets for doubly - exponential time were autoreducible we would separate polynomial time from - either logarithmic space or polynomial space. We also show several other theorems - about autoreducibility.", "venue": "Proceedings of IEEE 36th Annual Foundations - of Computer Science", "year": 1995, "referenceCount": 28, "citationCount": - 32, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1995-10-23", "journal": {"name": "Proceedings - of IEEE 36th Annual Foundations of Computer Science", "pages": "520-527"}, - "authors": [{"authorId": "1747509", "name": "H. Buhrman"}, {"authorId": "1691447", - "name": "L. Fortnow"}, {"authorId": "3049789", "name": "L. Torenvliet"}]}, - {"paperId": "d879ec775495a789a1622811e04ad6b206c9d850", "externalIds": {"MAG": - "2097071540", "DOI": "10.1051/AGRO:19980501", "CorpusId": 59129924}, "url": - "https://www.semanticscholar.org/paper/d879ec775495a789a1622811e04ad6b206c9d850", - "title": "STICS : a generic model for the simulation of crops and their water - and nitrogen balances. I. Theory, and parameterization applied to wheat and - corn", "abstract": "STICS (Simulateur mulTJdiscplinaire pour les Cultures - Standard) is a crop model constructed as a simula- tion tool capable of working - under agricultural conditions. Outputs comprise the production (amount and - quality) and the environment. Inputs take into account the climate, the soi1 - and the cropping system. STICS is presented as a model exhibiting the following - qualities: robustness, an easy access to inputs and an uncomplicated f~~ture - evolution thanks to a modular (easy adaptation to various types of plant) - nature and generic. However, STICS is not an entirely new model since most - parts use classic formalisms or stem from existing models. The main simulated - processes are the growth, the development of the crop and the water and nitrogenous - balance of the soil-crop system. The seven modules of STICS - development, - shoot growth, yield components, root growth, water balance, thermal environment - and nitrogen balance - are presented in tum with a discussion about the theoretical - choices in comparison to other models. These choices should render the model - capable of exhibiting the announced qualities in classic environmental contexts. - However, because some processes (e.g. ammoniac volatilization, clrought resistance, - etc.) are not taken into account, the use of STICS is presently limited to - several cropping systems. (O InraIElsevier, Paris.) crop modelling / wheat - / corn / water balance / nitrogen balance", "venue": "", "year": 1998, "referenceCount": - 184, "citationCount": 792, "influentialCitationCount": 60, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Agricultural And Food Sciences", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Agronomie", "pages": "311-346", "volume": "18"}, "authors": [{"authorId": - "38790799", "name": "N. Brisson"}, {"authorId": "145203365", "name": "B. Mary"}, - {"authorId": "37776542", "name": "D. Ripoche"}, {"authorId": "87016684", "name": - "M. Jeuffroy"}, {"authorId": "50361447", "name": "F. Ruget"}, {"authorId": - "5013988", "name": "B. Nicoullaud"}, {"authorId": "67257350", "name": "P. - Gate"}, {"authorId": "1422450571", "name": "F. Devienne-Barret"}, {"authorId": - "2093848045", "name": "R. Antonioletti"}, {"authorId": "3361730", "name": - "C. D\u00fcrr"}, {"authorId": "71446502", "name": "G. Richard"}, {"authorId": - "34164773", "name": "N. Beaudoin"}, {"authorId": "5857379", "name": "S. Recous"}, - {"authorId": "2100288896", "name": "Xavier Tayot"}, {"authorId": "6920014", - "name": "D. Pl\u00e9net"}, {"authorId": "3344305", "name": "P. Cellier"}, - {"authorId": "21631542", "name": "J. Machet"}, {"authorId": "46620245", "name": - "J. Meynard"}, {"authorId": "12285465", "name": "R. Del\u00e9colle"}]}, {"paperId": - "0140c47738b29e2348abb1797731299d1716f270", "externalIds": {"MAG": "1502316208", - "DBLP": "books/daglib/0018794", "DOI": "10.1142/9789812708977", "CorpusId": - 30317453}, "url": "https://www.semanticscholar.org/paper/0140c47738b29e2348abb1797731299d1716f270", - "title": "Thinking about G\u00f6del and Turing - Essays on Complexity, 1970 - - 2007", "abstract": "Dr Gregory Chaitin, one of the world s leading mathematicians, - is best known for his discovery of the remarkable number, a concrete example - of irreducible complexity in pure mathematics which shows that mathematics - is infinitely complex. In this volume, Chaitin discusses the evolution of - these ideas, tracing them back to Leibniz and Borel as well as Gdel and Turing. - This book contains 23 non-technical papers by Chaitin, his favorite tutorial - and survey papers, including Chaitin''s three Scientific American articles. - These essays summarize a lifetime effort to use the notion of program-size - complexity or algorithmic information content in order to shed further light - on the fundamental work of Gdel and Turing on the limits of mathematical methods, - both in logic and in computation. Chaitin argues here that his information-theoretic - approach to metamathematics suggests a quasi-empirical view of mathematics - that emphasizes the similarities rather than the differences between mathematics - and physics. He also develops his own brand of digital philosophy, which views - the entire universe as a giant computation, and speculates that perhaps everything - is discrete software, everything is 0''s and 1''s. Chaitin''s fundamental - mathematical work will be of interest to philosophers concerned with the limits - of knowledge and to physicists interested in the nature of complexity.", "venue": - "", "year": 2007, "referenceCount": 0, "citationCount": 41, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"pages": "I-XIX, 1-345"}, "authors": [{"authorId": "1756533", - "name": "G. Chaitin"}]}, {"paperId": "b6827ebba6dd5d83c25b34ca297a2035f6137817", - "externalIds": {"MAG": "2079615149", "DOI": "10.1103/PHYSREVE.70.066202", - "CorpusId": 10155596, "PubMed": "15697479"}, "url": "https://www.semanticscholar.org/paper/b6827ebba6dd5d83c25b34ca297a2035f6137817", - "title": "Morphological transitions and bistability in Turing systems.", "abstract": - "It is well known that in two dimensions Turing systems produce spots, stripes - and labyrinthine patterns, and in three dimensions lamellar and spherical - structures, or their combinations, are observed. In this paper we study transitions - between these states in both two and three dimensions. First, we derive the - regions of stability for different patterns using nonlinear bifurcation analysis. - Then, we apply large scale computer simulations to analyze the pattern selection - in a bistable system by studying the effect of parameter selection on morphological - clustering and the appearance of topological defects. The method elaborated - in this paper presents a probabilistic approach for studying pattern selection - in a bistable reaction-diffusion system.", "venue": "Physical review. E, Statistical, - nonlinear, and soft matter physics", "year": 2004, "referenceCount": 56, "citationCount": - 28, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-12-03", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 066202\n ", - "volume": "70 6 Pt 2"}, "authors": [{"authorId": "35202419", "name": "T. Lepp\u00e4nen"}, - {"authorId": "2155202", "name": "M. Karttunen"}, {"authorId": "37747895", - "name": "R. Barrio"}, {"authorId": "145670814", "name": "K. Kaski"}]}, {"paperId": - "adc7a2138db0bf764af334f5a47e9ab07919c29e", "externalIds": {"MAG": "1608816140", - "DOI": "10.18174/NJAS.V29I3.17008", "CorpusId": 83834700}, "url": "https://www.semanticscholar.org/paper/adc7a2138db0bf764af334f5a47e9ab07919c29e", - "title": "The effect of pH on copper toxicity to hydroponically grown maize", - "abstract": "The effect of pH on copper toxicity to maize was studied in three - solution cul\u00ad ture experiments of different design. Raising the pH intensified - the toxic effect of Cu, which presented itself first of all by a reduction - in root growth and by a reduction in uptake of phosphate and iron. This result - was explained from an enhanced association of Cu2+ ions with physiologically - essential sites in the roots, when competition from protons was lowered.", - "venue": "", "year": 1981, "referenceCount": 40, "citationCount": 80, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1981-08-01", "journal": {"name": "Netherlands Journal - of Agricultural Science", "pages": "217-238", "volume": "29"}, "authors": - [{"authorId": "10034170", "name": "T. Lexmond"}, {"authorId": "2598923", "name": - "P. Vorm"}]}, {"paperId": "4d4ffd17aaeccc710f288e0bf08ce497e6eeca04", "externalIds": - {"MAG": "2118987716", "DOI": "10.1103/PHYSREVLETT.93.048303", "CorpusId": - 38316219, "PubMed": "15323800"}, "url": "https://www.semanticscholar.org/paper/4d4ffd17aaeccc710f288e0bf08ce497e6eeca04", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1998-05-31", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": "4d4ffd17aaeccc710f288e0bf08ce497e6eeca04", + "externalIds": {"MAG": "2118987716", "DOI": "10.1103/PHYSREVLETT.93.048303", + "CorpusId": 38316219, "PubMed": "15323800"}, "corpusId": 38316219, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/4d4ffd17aaeccc710f288e0bf08ce497e6eeca04", "title": "Traveling-stripe forcing generates hexagonal patterns.", "abstract": "We study the response of Turing stripe patterns to a simple spatiotemporal forcing. This forcing has the form of a traveling wave and is spatially resonant @@ -24464,105 +27734,61 @@ interactions: phenomenon is understood in the framework of the corresponding amplitude equations, which unveils a complex scenario of dynamical behaviors.", "venue": "Physical Review Letters", "year": 2004, "referenceCount": 12, "citationCount": 38, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-07-23", "journal": - {"name": "Physical review letters", "pages": "\n 048303\n ", - "volume": "93 4"}, "authors": [{"authorId": "2701200", "name": "D. G. M\u00edguez"}, - {"authorId": "11508448", "name": "E. M. Nicola"}, {"authorId": "2614851", - "name": "A. P. Mu\u00f1uzuri"}, {"authorId": "2440383", "name": "J. Casademunt"}, - {"authorId": "2236462", "name": "F. Sagu\u00e9s"}, {"authorId": "78546816", - "name": "L. Kramer"}]}, {"paperId": "06996e180cab25c3644387bd93fb6bad6cb76556", - "externalIds": {"MAG": "2320648065", "DBLP": "series/synthesis/2016Raedt", - "DOI": "10.2200/S00692ED1V01Y201601AIM032", "CorpusId": 26726745}, "url": - "https://www.semanticscholar.org/paper/06996e180cab25c3644387bd93fb6bad6cb76556", - "title": "Statistical Relational Artificial Intelligence: Logic, Probability, - and Computation", "abstract": "An intelligent agent interacting with the real - world will encounter individual people, courses, test results, drugs prescriptions, - chairs, boxes, etc., and needs to reason about properties of these individuals - and relations among them as well as cope with uncertainty. Uncertainty has - been studied in probability theory and graphical models, and relations have - been studied in logic, in particular in the predicate calculus and its extensions. - This book examines the foundations of combining logic and probability into - what are called relational probabilistic models. It introduces representations, - inference, and learning techniques for probability, logic, and their combinations. - The book focuses on two representations in detail: Markov logic networks, - a relational extension of undirected graphical models and weighted first-order - predicate calculus formula, and Problog, a probabilistic extension of logic - programs that can also be viewed as a Turing-complete relational extension - of Bayesian networks.", "venue": "Statistical Relational Artificial Intelligence: - Logic, Probability, and Computation", "year": 2016, "referenceCount": 261, - "citationCount": 237, "influentialCitationCount": 12, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-03-24", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1740042", - "name": "L. D. Raedt"}, {"authorId": "1746871", "name": "K. Kersting"}, {"authorId": - "145986014", "name": "Sriraam Natarajan"}, {"authorId": "143715817", "name": - "D. Poole"}]}, {"paperId": "53ca7f200c074a148ea1a3d906819cc1b490d727", "externalIds": - {"DBLP": "conf/mcu/WoodsN07", "MAG": "1740357362", "DOI": "10.3233/FI-2009-0039", - "CorpusId": 34986076}, "url": "https://www.semanticscholar.org/paper/53ca7f200c074a148ea1a3d906819cc1b490d727", - "title": "Small Semi-Weakly Universal Turing Machines", "abstract": "We present - three small universal Turing machines that have 3 states and 7 symbols, 4 - states and 5 symbols, and 2 states and 13 symbols, respectively. These machines - are semi-weakly universal which means that on one side of the input they have - an infinitely repeated word, and on the other side there is the usual infinitely - repeated blank symbol. This work can be regarded as a continuation of early - work by Watanabe on semi-weak machines. One of our machines has only 17 transition - rules, making it the smallest known semi-weakly universal Turing machine. - Interestingly, two of our machines are symmetric with Watanabe''s 7-state - and 3-symbol, and 5-state and 4-symbol machines, even though we use a different - simulation technique.", "venue": "Fundam. Informaticae", "year": 2007, "referenceCount": - 40, "citationCount": 28, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "303-315"}, "authors": [{"authorId": "145284748", "name": "D. Woods"}, - {"authorId": "2221070", "name": "T. Neary"}]}, {"paperId": "884bfee7c2c6a874fad2a34207eb266f97a6cc77", - "externalIds": {"MAG": "1990236474", "DOI": "10.1162/artl.1995.2.3.333", "CorpusId": - 44710180}, "url": "https://www.semanticscholar.org/paper/884bfee7c2c6a874fad2a34207eb266f97a6cc77", - "title": "Hidden Order: How Adaptation Builds Complexity.", "abstract": "Computer - simulations of artificial ecologies typically model the interactions of a - population of independently acting, spatially situated, resource-restricted, - differently structured, self-reproducing agents. The interactions in such - systems are typically highly nonlinear, subject to random perturbation, executed - in parallel, and coevolutionary in the sense that the agents interact with - each other as well as their environment. Examples of artificial ecologies - that possess the above characteristics include Skipper''s \"computer zoo\" - of migrating flocks of hierarchically invokable fragments of assembly code - [10], Shanahan''s populations of evolutionary automata [9], Lindgren''s coevolving - populations of strategies for playing the iterated prisoner''s dilemma game - [5], the Turing gas of self-organizing groups of autocatalytic algorithmic - fragments of Rasmussen, KnudLsen, and Feldberg [6], Ray''s populations of - parasitic and symbiotic self-reproducing assembly code programs [8], the populations - of redcode coreworld creatures of Rasmussen, Knudsen, Feldberg, and Hindsholm - [7], Werner and Dyer''s populations of males and females that coevolve communication - [11], and Ackley and Littman''s artificial world for testing the Baldwin effect - concerning learning and evolution [1]. Each of these complex adaptive systems - (and many others like them) succeed in illustrating one or more key features - of living systems. However, each of these systems live up to their name in - the worst possible way\u2014they are all exceedingly complex. The emergent - behavior and other interesting phenomena are obscured by so much modelspecific - detail that it is rarely clear whether the observed phenomena represent any - important general principles or are merely artifacts of the details. Moreover, - all of these existing systems are computationally expensive and deliver little - in the way of important emergent phenomena in relation to the amount of computational - effort expended. This excessive overhead is not merely a matter of inefficiency - or inconvenience; it may actually preclude emergence of important phenomena - that can only materialize in the presence of certain minimum amounts of time - or matter. John Holland''s new book, Hidden Order: How Adaptation Builds Complexity - [3],", "venue": "Artificial Life", "year": 1995, "referenceCount": 2, "citationCount": - 2294, "influentialCitationCount": 275, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Artificial - Life", "pages": "333-335", "volume": "2"}, "authors": [{"authorId": "1732302", - "name": "J. Koza"}]}, {"paperId": "77f8a588e80123ef3ae482f7f659be85194bfa8c", - "externalIds": {"DBLP": "conf/popl/Mairson90", "MAG": "2021217869", "DOI": - "10.1145/96709.96748", "CorpusId": 75336}, "url": "https://www.semanticscholar.org/paper/77f8a588e80123ef3ae482f7f659be85194bfa8c", + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://diposit.ub.edu/dspace/bitstream/2445/12833/1/515715.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2004-07-23", "journal": {"name": "Physical review letters", + "pages": "\n 048303\n ", "volume": "93 4"}, "authors": [{"authorId": + "2701200", "name": "D. G. M\u00edguez"}, {"authorId": "11508448", "name": + "E. M. Nicola"}, {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}, {"authorId": + "2440383", "name": "J. Casademunt"}, {"authorId": "2236462", "name": "F. Sagu\u00e9s"}, + {"authorId": "78546816", "name": "L. Kramer"}]}, {"paperId": "fc681ea7e3eab3b5631fe70ad58009da2e103d5a", + "externalIds": {"MAG": "2105337422", "DOI": "10.1142/S0219199710003968", "CorpusId": + 122578116}, "corpusId": 122578116, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc681ea7e3eab3b5631fe70ad58009da2e103d5a", + "title": "TURING PATTERNS IN GENERAL REACTION-DIFFUSION SYSTEMS OF BRUSSELATOR + TYPE", "abstract": "We study the reaction-diffusion system Here \u03a9 is + a smooth and bounded domain in \u211dN (N \u2265 1), a, b, d1, d2 > 0 and + f \u2208 C1[0, \u221e) is a non-decreasing function. The case f(u) = u2 corresponds + to the standard Brusselator model for autocatalytic oscillating chemical reactions. + Our analysis points out the crucial role played by the nonlinearity f in the + existence of Turing patterns. More precisely, we show that if f has a sublinear + growth then no Turing patterns occur, while if f has a superlinear growth + then existence of such patterns is strongly related to the inter-dependence + between the parameters a, b and the diffusion coefficients d1, d2.", "venue": + "", "year": 2010, "referenceCount": 38, "citationCount": 33, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://math.ucv.ro/~radulescu/articles/ccm09.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-08-01", + "journal": {"name": "Communications in Contemporary Mathematics", "pages": + "661-679", "volume": "12"}, "authors": [{"authorId": "3088137", "name": "M. + Ghergu"}, {"authorId": "1797382", "name": "Vicentiu D. R\u0103dulescu"}]}, + {"paperId": "d0e6e45312b41eaaa3c3484ca98792e1846f0f95", "externalIds": {"DBLP": + "journals/ndjfl/Shanker87", "MAG": "2021065331", "DOI": "10.1305/ndjfl/1093637650", + "CorpusId": 13389456}, "corpusId": 13389456, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d0e6e45312b41eaaa3c3484ca98792e1846f0f95", + "title": "Wittgenstein versus Turing on the nature of Church''s thesis", "abstract": + "Discussion des raisons du scepticisme wittgensteinnien vis-a-vis de l''importance + de la these de Church, et des machines de Turing pour les fondements des mathematiques + et de la psychologie. L''A. commence par reconstituer la doctrine de Wittgenstein, + a partir de textes disperses, puis en discute la pertinence", "venue": "Notre + Dame J. Formal Log.", "year": 1987, "referenceCount": 0, "citationCount": + 41, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1987-10-01", "journal": {"name": "Notre Dame J. Formal Log.", "pages": "615-649", + "volume": "28"}, "authors": [{"authorId": "50638441", "name": "S. Shanker"}]}, + {"paperId": "77f8a588e80123ef3ae482f7f659be85194bfa8c", "externalIds": {"DBLP": + "conf/popl/Mairson90", "MAG": "2021217869", "DOI": "10.1145/96709.96748", + "CorpusId": 75336}, "corpusId": 75336, "publicationVenue": {"id": "8a1922a5-8e84-4ec6-9283-01f2ef1981fc", + "name": "ACM-SIGACT Symposium on Principles of Programming Languages", "type": + "conference", "alternate_names": ["Symp Princ Program Lang", "Symposium on + Principles of Programming Languages", "POPL", "ACM-SIGACT Symp Princ Program + Lang"], "url": "http://www.sigplan.org/Conferences/POPL/"}, "url": "https://www.semanticscholar.org/paper/77f8a588e80123ef3ae482f7f659be85194bfa8c", "title": "Deciding ML typability is complete for deterministic exponential time", "abstract": "A well known but incorrect piece of functional programming folklore is that ML expressions can be efficiently typed in polynomial time. @@ -24596,14 +27822,58 @@ interactions: would be in PSPACE, as would be the actual computation of the principal type of the expression, were it indeed typable.", "venue": "ACM-SIGACT Symposium on Principles of Programming Languages", "year": 1989, "referenceCount": 15, - "citationCount": 124, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-12-01", "journal": {"pages": "382-401"}, "authors": [{"authorId": "1758045", - "name": "Harry G. Mairson"}]}, {"paperId": "803262a04e0642f7e84ce25e1e36fd76d45a2f5e", + "citationCount": 124, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/96709.96748", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1989-12-01", "journal": {"pages": "382-401"}, "authors": + [{"authorId": "1758045", "name": "Harry G. Mairson"}]}, {"paperId": "9a60dd734f6fe5c4056538606b6a2340ad8ba2cd", + "externalIds": {"MAG": "288220014", "CorpusId": 166995322}, "corpusId": 166995322, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a60dd734f6fe5c4056538606b6a2340ad8ba2cd", + "title": "Organizational Innovation as Competitive Advantage during Global + Recession", "abstract": "The paper aims to discovering the organizational + macro variables which make innovation to take place at workplace and to develop + a con ceptual model for use in the indus try which has been grappling with + financial downturn. The meta-analy sis of the literature explicitly pro vides + an insight in to the interplay of macro variables viz. organiza tional culture, + organizational struc ture, organizational learning, and knowledge management + architec tures to have organizational innova tion in full swing. The paper + de scribes the impact of all these vari ables towards innovation at organi + zational level. A conceptual model of organizational innovation has been proposed, + which may be uti lized for creating suitable architec tures to make innovation + in organi zations. The proposed model of or ganizational innovation needs + to be empirically validated across cul", "venue": "", "year": 2011, "referenceCount": + 38, "citationCount": 32, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2011-04-01", "journal": {"name": + "The Indian Journal of Industrial Relations", "pages": "713-725", "volume": + "46"}, "authors": [{"authorId": "2118413239", "name": "S. Singh"}]}, {"paperId": + "1098929b4b3fbf8ffed02985eea5602fbeec37dc", "externalIds": {"MAG": "1509485343", + "DBLP": "conf/fm/MandelC99", "DOI": "10.1007/3-540-48119-2_47", "CorpusId": + 21090032}, "corpusId": 21090032, "publicationVenue": {"id": "77f160ec-5456-49f9-8bd4-00b24025de18", + "name": "World Congress on Formal Methods", "type": "conference", "alternate_names": + ["FM", "Form Method", "World Congr Form Method", "Formal Methods"], "url": + "http://www.fmeurope.org/"}, "url": "https://www.semanticscholar.org/paper/1098929b4b3fbf8ffed02985eea5602fbeec37dc", + "title": "On the Expressive Power of OCL", "abstract": null, "venue": "World + Congress on Formal Methods", "year": 1999, "referenceCount": 15, "citationCount": + 82, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007%2F3-540-48119-2_47.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-09-20", "journal": {"pages": "854-874"}, "authors": + [{"authorId": "11527269", "name": "L. Mandel"}, {"authorId": "2106343", "name": + "M. V. Cengarle"}]}, {"paperId": "803262a04e0642f7e84ce25e1e36fd76d45a2f5e", "externalIds": {"MAG": "2067371846", "DOI": "10.1098/rsta.1994.0071", "CorpusId": - 122907405}, "url": "https://www.semanticscholar.org/paper/803262a04e0642f7e84ce25e1e36fd76d45a2f5e", + 122907405}, "corpusId": 122907405, "publicationVenue": {"id": "2b71d7d5-8510-4903-99a8-f6c4fffc78e2", + "name": "Philosophical Transactions of the Royal Society of London Series + A Physical and Engineering Sciences", "alternate_names": ["Philos Trans R + Soc Lond Ser Phys Eng Sci"], "issn": "0962-8428", "alternate_issns": ["2054-0299"], + "url": "http://www.jstor.org/action/showPublication?journalCode=philtranphysscie", + "alternate_urls": ["http://rsta.royalsocietypublishing.org/content/by/year"]}, + "url": "https://www.semanticscholar.org/paper/803262a04e0642f7e84ce25e1e36fd76d45a2f5e", "title": "Excitability, wave reflection, and wave splitting in a cubic autocatalysis reaction-diffusion system", "abstract": "The excitability properties of a two-variable cubic autocatalysis model for chemical oscillations are examined. @@ -24617,53 +27887,45 @@ interactions: Turing patterns at long times.", "venue": "Philosophical Transactions of the Royal Society of London Series A Physical and Engineering Sciences", "year": 1994, "referenceCount": 11, "citationCount": 119, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-06-15", - "journal": {"name": "Philosophical Transactions of the Royal Society of London. - Series A: Physical and Engineering Sciences", "pages": "631 - 642", "volume": - "347"}, "authors": [{"authorId": "70072348", "name": "V. Petrov"}, {"authorId": - "35030196", "name": "S. Scott"}, {"authorId": "6286893", "name": "K. Showalter"}]}, - {"paperId": "d408100f3c87e746ee4a0838333b342384fd380c", "externalIds": {"CorpusId": - 8042983}, "url": "https://www.semanticscholar.org/paper/d408100f3c87e746ee4a0838333b342384fd380c", - "title": "Lecture on the automatic computing engine ; reprinted in ( Copeland - 2004 ) Universal Turing Machine", "abstract": "Amphibious communication and - RAID have garnered tremendous interest from both biologists and cyberinforma - ticians in the last several years. After years of technical res earch into - gigabit switches, we prove the evaluation of Boolean logic. We describe a - novel application for the exploration o f access points, which we call Die.", - "venue": "", "year": 2011, "referenceCount": 341, "citationCount": 111, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "b652ef03b980e770fb9dcba12e406af253328925", - "externalIds": {"DBLP": "journals/corr/abs-0906-3248", "MAG": "2949348026", - "ArXiv": "0906.3248", "DOI": "10.4204/EPTCS.1.4", "CorpusId": 10266058}, "url": - "https://www.semanticscholar.org/paper/b652ef03b980e770fb9dcba12e406af253328925", - "title": "A Concrete View of Rule 110 Computation", "abstract": "Rule 110 - is a cellular automaton that performs repeated simultaneous updates of an - infinite row of binary values. The values are updated in the following way: - 0s are changed to 1s at all positions where the value to the right is a 1, - while 1s are changed to 0s at all positions where the values to the left and - right are both 1. Though trivial to define, the behavior exhibited by Rule - 110 is surprisingly intricate, and in (Cook, 2004) we showed that it is capable - of emulating the activity of a Turing machine by encoding the Turing machine - and its tape into a repeating left pattern, a central pattern, and a repeating - right pattern, which Rule 110 then acts on. In this paper we provide an explicit - compiler for converting a Turing machine into a Rule 110 initial state, and - we present a general approach for proving that such constructions will work - as intended. The simulation was originally assumed to require exponential - time, but surprising results of Neary and Woods (2006) have shown that in - fact, only polynomial time is required. We use the methods of Neary and Woods - to exhibit a direct simulation of a Turing machine by a tag system in polynomial - time.", "venue": "CSP", "year": 2009, "referenceCount": 12, "citationCount": - 34, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-06-17", "journal": {"pages": - "31-55"}, "authors": [{"authorId": "2057342974", "name": "Matthew Cook"}]}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1994-06-15", "journal": {"name": "Philosophical Transactions of the Royal + Society of London. Series A: Physical and Engineering Sciences", "pages": + "631 - 642", "volume": "347"}, "authors": [{"authorId": "70072348", "name": + "V. Petrov"}, {"authorId": "35030196", "name": "S. Scott"}, {"authorId": "6286893", + "name": "K. Showalter"}]}, {"paperId": "891897f22b080b8bb175c50d5ed2b54bee655978", + "externalIds": {"MAG": "2134202663", "DBLP": "conf/focs/BuhrmanFT95", "DOI": + "10.1109/SFCS.1995.492582", "CorpusId": 16235476}, "corpusId": 16235476, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/891897f22b080b8bb175c50d5ed2b54bee655978", + "title": "Using autoreducibility to separate complexity classes", "abstract": + "A language is autoreducible if it can be reduced to itself by a Turing machine + that does not ask its own input to the oracle. We use autoreducibility to + separate exponential space from doubly exponential space by showing that all + Turing complete sets for exponential space are autoreducible but there exists + some Turing complete set for doubly exponential space that is not. We immediately + also get a separation of logarithmic space from polynomial space. Although + we already know how to separate these classes using diagonalization, our proofs + separate classes solely by showing they have different structural properties, + thus applying Post''s Program (E. Pos, 1944) to complexity theory. We feel + such techniques may prove unknown separations in the future. In particular + if we could settle the question as to whether all complete sets for doubly + exponential time were autoreducible we would separate polynomial time from + either logarithmic space or polynomial space. We also show several other theorems + about autoreducibility.", "venue": "Proceedings of IEEE 36th Annual Foundations + of Computer Science", "year": 1995, "referenceCount": 28, "citationCount": + 32, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ir.cwi.nl/pub/1930/1930D.pdf", "status": "GREEN"}, "fieldsOfStudy": + ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1995-10-23", "journal": {"name": "Proceedings + of IEEE 36th Annual Foundations of Computer Science", "pages": "520-527"}, + "authors": [{"authorId": "1747509", "name": "H. Buhrman"}, {"authorId": "1691447", + "name": "L. Fortnow"}, {"authorId": "3049789", "name": "L. Torenvliet"}]}, {"paperId": "2434fb016f3b324d4128e3f60f2c953c14315867", "externalIds": {"MAG": - "2060220713", "DOI": "10.1063/1.473763", "CorpusId": 40764093}, "url": "https://www.semanticscholar.org/paper/2434fb016f3b324d4128e3f60f2c953c14315867", + "2060220713", "DOI": "10.1063/1.473763", "CorpusId": 40764093}, "corpusId": + 40764093, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2434fb016f3b324d4128e3f60f2c953c14315867", "title": "Absolute and convective instabilities in a one-dimensional Brusselator flow model", "abstract": "The paper considers a one-dimensional Brusselator model with a uniform flow of the mixture of reaction components. An absolute @@ -24673,274 +27935,153 @@ interactions: the condition for spatially undamped tails (the Cherenkov condition) is obtained. This represents a new mechanism for pattern formation in chemical reaction-diffusion systems.", "venue": "", "year": 1997, "referenceCount": 18, "citationCount": - 81, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1997-05-08", "journal": {"name": "Journal of Chemical - Physics", "pages": "7609-7616", "volume": "106"}, "authors": [{"authorId": - "34596490", "name": "S. Kuznetsov"}, {"authorId": "2203242", "name": "E. Mosekilde"}, - {"authorId": "49808656", "name": "G. Dewel"}, {"authorId": "92147854", "name": - "P. Borckmans"}]}, {"paperId": "08e786fbcab43da41201047cdd04cf1def9a2f89", - "externalIds": {"MAG": "2978205342", "DBLP": "conf/dna/2012", "DOI": "10.1007/978-3-642-32208-2", - "CorpusId": 5681455}, "url": "https://www.semanticscholar.org/paper/08e786fbcab43da41201047cdd04cf1def9a2f89", - "title": "DNA Computing and Molecular Programming", "abstract": null, "venue": - "Lecture Notes in Computer Science", "year": 2012, "referenceCount": 29, "citationCount": - 28, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"volume": "7433"}, - "authors": [{"authorId": "2111306", "name": "D. Stefanovic"}, {"authorId": - "2529541", "name": "A. Turberfield"}]}, {"paperId": "fc89bca016bf74e929dada0594b672b2f98f5ef0", - "externalIds": {"MAG": "1989556826", "DOI": "10.13031/2013.34692", "CorpusId": - 108834126}, "url": "https://www.semanticscholar.org/paper/fc89bca016bf74e929dada0594b672b2f98f5ef0", - "title": "ANSWERS: A Model for Watershed Planning", "abstract": "ABSTRACT - IN recent years, a greatly increased emphasis has been placed on improving - and maintaining the quality of our national water resources. Agencies and - individuals from the various levels of government, industry and private life - are seeking information concerning the ef-fects that land use, management, - and conservation prac-tices or structures might have on the quality and quantity - of water from both agricultural and non-agricultural watersheds. ANSWERS (Areal - Nonpoint Source Watershed En-vironment Response Simulation) was developed - in an ef-fort to supply the desired information described above for primarily - agricultural watersheds. The overall struc-ture consists of a hydrologic model, - a sediment detachment/transport model and several routing com-ponents necessary - to describe the movement of water in overland, subsurface and channel flow - phases. ANSWERS, unlike many large-scale watershed model structures, uses - distributed (rather than lumped) parameters and is event (rather than long-term) - oriented. These operational features generally yield a better understanding - of the hydrologic and water quality interactions involved in a watershed by - allowing the user to physically describe those processes both spatially and - temporally. The purpose of this report is to present the operational concepts, - the basic mathematical model used in ANSWERS, general data needs and user - considerations. In addition, the potential utility of ANSWERS as a plan-ning - tool is demonstrated by simulating several manage-ment alternatives for a - primarily agricultural watershed in northeastern Indiana subjected to several - different precipitation events.", "venue": "", "year": 1980, "referenceCount": - 6, "citationCount": 866, "influentialCitationCount": 40, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Transactions - of the ASABE", "pages": "938-0944", "volume": "23"}, "authors": [{"authorId": - "35430713", "name": "D. Beasley"}, {"authorId": "2627781", "name": "L. F. - Huggins"}, {"authorId": "91181404", "name": "E. Monke"}]}, {"paperId": "3a22528197286360e80b83ce205825d024a1c3b8", - "externalIds": {"MAG": "2791394758", "DOI": "10.21423/R11H2H", "CorpusId": - 139678999}, "url": "https://www.semanticscholar.org/paper/3a22528197286360e80b83ce205825d024a1c3b8", - "title": "Tilting Pad Bearing Design.", "abstract": "The basics of tilting - pad bearing design are discussed to include limits of operation for load, - speed, and metal tempera\u00ad ture. Optimum temperature sensor locations - are recommended for self aligning and nonaligning tilting pads. Tilting pad - bear\u00ad ing geometric properties and their influence on bearing and rotordynamics - are addressed including the advantages and dis\u00ad advantages of zero preloaded - pads. Also, the advantages of increasing the pad axial length are shown. Example - calculations are presented for the tilting pad pivot film thickness which - is necessary to determine if the top pads are loaded or unloaded. Tilting - pad static shaft sink and clearance measurement techniques are addressed. - The equations to calcu\u00ad late normal force and break away torque are derived - including an example calculation comparing a tilting pad bearing to a two - axial groove bearing. Tilting pad bearing oil flow and tempera\u00ad ture - rise are included along with a discussion of reduced temper\u00ad ature tilting - pad designs.", "venue": "", "year": 1994, "referenceCount": 6, "citationCount": - 52, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "73463816", "name": "J. Nicholas"}]}, - {"paperId": "a84f376a8217a10ade875966eb18e1c851cfee66", "externalIds": {"DOI": - "10.21203/rs.3.rs-39890/v1", "CorpusId": 231596570, "PubMed": "33438257"}, - "url": "https://www.semanticscholar.org/paper/a84f376a8217a10ade875966eb18e1c851cfee66", - "title": "An efficient Turing-type Ag2Se-CoSe2 multi-interfacial oxygen-evolving - electrocatalyst.", "abstract": "Although the Turing structures, or stationary - reaction-diffusion patterns, have received increasing attention in biology - and chemistry, making such unusual patterns on inorganic solids is fundamentally - challenging. We report a simple cation exchange approach to produce Turing-type - Ag 2 Se on CoSe 2 nanobelts relied on diffusion-driven instability. The resultant - Turing-type Ag 2 Se-CoSe 2 material is highly effective to catalyze the oxygen - evolution reaction (OER) in alkaline electrolytes with an 84.5% anodic energy - efficiency. Electrochemical measurements show that the intrinsic OER activity - correlates linearly with the length of Ag 2 Se-CoSe 2 interfaces, determining - that such Turing-type interfaces are more active sites for OER. Combing X-ray - absorption and computational simulations, we ascribe the excellent OER performance - to the optimized adsorption energies for critical oxygen-containing intermediates - at the unconventional interfaces.", "venue": "Angewandte Chemie", "year": - 2020, "referenceCount": 60, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2020-07-15", "journal": {"name": "Angewandte Chemie"}, "authors": [{"authorId": - "39488118", "name": "Minrui Gao"}, {"authorId": "2141906408", "name": "Xiao-Long - Zhang"}, {"authorId": "2119185235", "name": "Peng-Peng Yang"}, {"authorId": - "4847366", "name": "Ya-Rong Zheng"}, {"authorId": "2087104539", "name": "Yu - Duan"}, {"authorId": "12341323", "name": "Shaojin Hu"}, {"authorId": "2087909594", - "name": "Tao Ma"}, {"authorId": "51022972", "name": "Fei-Yue Gao"}, {"authorId": - "95471198", "name": "Zhuang-Zhuang Niu"}, {"authorId": "121809055", "name": - "Zhi-Zheng Wu"}, {"authorId": "2054559200", "name": "Shuai Qin"}, {"authorId": - "2046862107", "name": "Li-Ping Chi"}, {"authorId": "143677825", "name": "Xingxin - Yu"}, {"authorId": "28250749", "name": "R. Wu"}, {"authorId": "79853843", - "name": "Chao Gu"}, {"authorId": "93721435", "name": "Cheng\u2010Ming Wang"}, - {"authorId": "36052262", "name": "Xusheng Zheng"}, {"authorId": "2152196383", - "name": "Xiao Zheng"}, {"authorId": "6377164", "name": "Junfa Zhu"}]}, {"paperId": - "59397f23838be0d3355d3a89b6f0ff6362600b7d", "externalIds": {"DBLP": "conf/nime/HiragaBHK04", - "MAG": "1538016033", "DOI": "10.5072/ZENODO.205317", "CorpusId": 17942617}, - "url": "https://www.semanticscholar.org/paper/59397f23838be0d3355d3a89b6f0ff6362600b7d", - "title": "Rencon 2004: Turing Test for Musical Expression", "abstract": "Rencon - is an annual international event that started in 2002. It has roles of (1) - pursuing evaluation methods for systems whose output includes subjective issues, - and (2) providing a forum for researches of several fields related to musical - expression. In the past. Rencon was held as a workshop associated with a musical - contest that provided a forum for presenting and discussing the latest research - in automatic performance rendering. This year we introduce new evaluation - methods of performance expression to Rencon: a Turing Test and a Gnirut Test, - which is a reverse Turing Test, for performance expression. We have opened - a section of the contests to any instruments and genre of music, including - synthesized human voices.", "venue": "New Interfaces for Musical Expression", - "year": 2004, "referenceCount": 25, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2004-06-01", "journal": {"pages": "120-123"}, "authors": [{"authorId": "2761516", - "name": "R. Hiraga"}, {"authorId": "2535114", "name": "R. Bresin"}, {"authorId": - "49293253", "name": "K. Hirata"}, {"authorId": "2279056", "name": "H. Katayose"}]}, - {"paperId": "c001406d9fc02bc9dabef72a05a8803ed7a60d67", "externalIds": {"DBLP": - "conf/icann/CabessaV13", "MAG": "2215138167", "DOI": "10.1007/978-3-642-40728-4_8", - "CorpusId": 6101310}, "url": "https://www.semanticscholar.org/paper/c001406d9fc02bc9dabef72a05a8803ed7a60d67", - "title": "The Super-Turing Computational Power of Interactive Evolving Recurrent - Neural Networks", "abstract": null, "venue": "International Conference on - Artificial Neural Networks", "year": 2013, "referenceCount": 20, "citationCount": - 23, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2013-09-10", "journal": {"pages": "58-65"}, - "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, - {"authorId": "1754229", "name": "A. Villa"}]}, {"paperId": "178a716bcb8eabd0b0e9a83ad940fbb17b5597b4", - "externalIds": {"MAG": "2169514524", "ArXiv": "math/0507128", "DOI": "10.1112/jlms/jdl012", - "CorpusId": 979189}, "url": "https://www.semanticscholar.org/paper/178a716bcb8eabd0b0e9a83ad940fbb17b5597b4", - "title": "Turing degrees of isomorphism types of algebraic objects", "abstract": - "The Turing degree spectrum of a countable structure \ud835\udc9c is the set - of all Turing degrees of isomorphic copies of \ud835\udc9c. The Turing degree - of the isomorphism type of \ud835\udc9c, is the least Turing degree in its - degree spectrum. We show that there are structures with isomorphism types - of arbitrary Turing degrees in each of the following classes: countable fields, - rings, and torsion\u2010free Abelian groups of any finite rank. We also show - that there are structures in each of these classes the isomorphism types of - which do not have Turing degrees. The case of torsion\u2010free Abelian groups - of finite rank settles a question left open by Knight, Downey and Jockusch - [Downey, Complexity, logic, and recursion theory, Lecture Notes in Pure and - Applied Mathematics 187 (ed. A. Sorbi; Marcel Dekker, New York, 1997) 157\u2013205].", - "venue": "", "year": 2005, "referenceCount": 51, "citationCount": 17, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-07-06", - "journal": {"name": "Journal of the London Mathematical Society", "volume": - "75"}, "authors": [{"authorId": "3101723", "name": "W. Calvert"}, {"authorId": - "3187833", "name": "V. Harizanov"}, {"authorId": "1752260", "name": "Alexandra - Shlapentokh"}]}, {"paperId": "1ed45d8762132b251b3e3e17e0ddc1ecca3e57d1", "externalIds": - {"DBLP": "journals/cacm/Sutherland12", "MAG": "2168647360", "DOI": "10.1145/2347736.2347749", - "CorpusId": 24814640}, "url": "https://www.semanticscholar.org/paper/1ed45d8762132b251b3e3e17e0ddc1ecca3e57d1", - "title": "The tyranny of the clock", "abstract": "Promoting a clock-free paradigm - that fits everything learned about programming since Turing.", "venue": "Commun. - ACM", "year": 2012, "referenceCount": 4, "citationCount": 31, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-10-01", "journal": {"name": "Communications of the ACM", "pages": "35 - - 36", "volume": "55"}, "authors": [{"authorId": "32979967", "name": "I. Sutherland"}]}, - {"paperId": "da525dfee3d758cba876cd9485c4c0f12efd71a8", "externalIds": {"MAG": - "2037357767", "DOI": "10.1007/BF02858614", "CorpusId": 30654473}, "url": "https://www.semanticscholar.org/paper/da525dfee3d758cba876cd9485c4c0f12efd71a8", - "title": "Algae in relation to soil fertility", "abstract": null, "venue": - "The Botanical review", "year": 2008, "referenceCount": 114, "citationCount": - 81, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "The - Botanical Review", "pages": "92-128", "volume": "30"}, "authors": [{"authorId": - "32402318", "name": "L. M. Shields"}, {"authorId": "49239266", "name": "L. - Durrell"}]}, {"paperId": "ee2ba85581b2310a638f346743383d89e57da353", "externalIds": - {"MAG": "1968786175", "DOI": "10.1111/J.1365-2621.2000.TB16025.X", "CorpusId": - 94281049}, "url": "https://www.semanticscholar.org/paper/ee2ba85581b2310a638f346743383d89e57da353", - "title": "Plasticizing-Antiplasticizing Effects of Water on Physical Properties - of Tapioca Starch Films in the Glassy State", "abstract": "The effects of - moisture sorption on physical properties of native and cross-linked starch - films in the glassy state were studied. Water played a dual role as a plasticizer - or an antiplasticizer, depending on the physical property measured. Plasticizing - effects were clearly evident in the case of the calorimetric glass transition - tempera- ture (T g ), tensile modulus, linear expansion, and water vapor permeability. - In contrast, antiplasticization by water resulted in maxima in tensile strength, - strain-at-break, and toughness of films that were observed at an intermedi- - ate moisture content ranging from 4% to 8% (RVP 0.1 to 0.4). The seemingly - contradictory effects of water on me- chanical properties associated with - lower and higher deformation of starch films were reconciled by assigning - dif- ferent roles to water operating primarily via opposite entropic/free - volume effects. Relationships, if any, between", "venue": "", "year": 2000, - "referenceCount": 31, "citationCount": 220, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2000-04-01", "journal": {"name": "Journal of Food Science", "pages": "445-451", - "volume": "65"}, "authors": [{"authorId": "2107423495", "name": "Y. P. Chang"}, - {"authorId": "36852960", "name": "P. B. Cheah"}, {"authorId": "49773462", - "name": "C. C. Seow"}]}, {"paperId": "71f3033a57350d23564cd798d2e7ef4e672c61c0", + 81, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://backend.orbit.dtu.dk/ws/files/4064578/Mosekilde.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1997-05-08", "journal": {"name": + "Journal of Chemical Physics", "pages": "7609-7616", "volume": "106"}, "authors": + [{"authorId": "34596490", "name": "S. Kuznetsov"}, {"authorId": "2203242", + "name": "E. Mosekilde"}, {"authorId": "49808656", "name": "G. Dewel"}, {"authorId": + "92147854", "name": "P. Borckmans"}]}, {"paperId": "71f3033a57350d23564cd798d2e7ef4e672c61c0", "externalIds": {"MAG": "1971033056", "DBLP": "journals/synthese/Copeland96", - "DOI": "10.1007/BF00413693", "CorpusId": 15217009}, "url": "https://www.semanticscholar.org/paper/71f3033a57350d23564cd798d2e7ef4e672c61c0", + "DOI": "10.1007/BF00413693", "CorpusId": 15217009}, "corpusId": 15217009, + "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": + "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", + "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, + "url": "https://www.semanticscholar.org/paper/71f3033a57350d23564cd798d2e7ef4e672c61c0", "title": "What is computation?", "abstract": null, "venue": "Synthese", "year": 1996, "referenceCount": 40, "citationCount": 121, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-09-01", "journal": + {"name": "Synthese", "pages": "335-359", "volume": "108"}, "authors": [{"authorId": + "144246233", "name": "B. Copeland"}]}, {"paperId": "044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", + "externalIds": {"ArXiv": "2007.14062", "DBLP": "journals/corr/abs-2007-14062", + "MAG": "3104613728", "CorpusId": 220831004}, "corpusId": 220831004, "publicationVenue": + {"id": "d9720b90-d60b-48bc-9df8-87a30b9a60dd", "name": "Neural Information + Processing Systems", "type": "conference", "alternate_names": ["Neural Inf + Process Syst", "NeurIPS"], "url": "http://neurips.cc/"}, "url": "https://www.semanticscholar.org/paper/044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", + "title": "Big Bird: Transformers for Longer Sequences", "abstract": "Transformers-based + models, such as BERT, have been one of the most successful deep learning models + for NLP. Unfortunately, one of their core limitations is the quadratic dependency + (mainly in terms of memory) on the sequence length due to their full attention + mechanism. To remedy this, we propose, BigBird, a sparse attention mechanism + that reduces this quadratic dependency to linear. We show that BigBird is + a universal approximator of sequence functions and is Turing complete, thereby + preserving these properties of the quadratic, full attention model. Along + the way, our theoretical analysis reveals some of the benefits of having $O(1)$ + global tokens (such as CLS), that attend to the entire sequence as part of + the sparse attention mechanism. The proposed sparse attention can handle sequences + of length up to 8x of what was previously possible using similar hardware. + As a consequence of the capability to handle longer context, BigBird drastically + improves performance on various NLP tasks such as question answering and summarization. + We also propose novel applications to genomics data.", "venue": "Neural Information + Processing Systems", "year": 2020, "referenceCount": 117, "citationCount": + 770, "influentialCitationCount": 132, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics", "Geography"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Geography", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2020-07-28", "journal": {"name": "ArXiv", "volume": "abs/2007.14062"}, + "authors": [{"authorId": "1771307", "name": "M. Zaheer"}, {"authorId": "1947314", + "name": "Guru Guruganesh"}, {"authorId": "89890133", "name": "Kumar Avinava + Dubey"}, {"authorId": "1643737606", "name": "J. Ainslie"}, {"authorId": "114577307", + "name": "Chris Alberti"}, {"authorId": "1722671", "name": "Santiago Onta\u00f1\u00f3n"}, + {"authorId": "38552691", "name": "Philip Pham"}, {"authorId": "101210026", + "name": "Anirudh Ravula"}, {"authorId": "145196279", "name": "Qifan Wang"}, + {"authorId": "113906155", "name": "Li Yang"}, {"authorId": "143629707", "name": + "Amr Ahmed"}]}, {"paperId": "67b2918c1804a76552002aa2ea6f35e0722d3b8f", "externalIds": + {"MAG": "2062802768", "PubMedCentral": "534809", "DOI": "10.1371/JOURNAL.PBIO.0020424", + "CorpusId": 5095069, "PubMed": "15583715"}, "corpusId": 5095069, "publicationVenue": + {"id": "83ff973b-8a0e-4e00-a06a-2cfd9e222de9", "name": "PLoS Biology", "type": + "journal", "alternate_names": ["Plo Biology", "PLOS Biology", "PLO Biology"], + "issn": "1544-9173", "url": "http://www.pubmedcentral.nih.gov/tocrender.fcgi?journal=212", + "alternate_urls": ["http://www.plosbiology.org/", "https://journals.plos.org/plosbiology/"]}, + "url": "https://www.semanticscholar.org/paper/67b2918c1804a76552002aa2ea6f35e0722d3b8f", + "title": "Algorithmic Self-Assembly of DNA Sierpinski Triangles", "abstract": + "Algorithms and information, fundamental to technological and biological organization, + are also an essential aspect of many elementary physical phenomena, such as + molecular self-assembly. Here we report the molecular realization, using two-dimensional + self-assembly of DNA tiles, of a cellular automaton whose update rule computes + the binary function XOR and thus fabricates a fractal pattern\u2014a Sierpinski + triangle\u2014as it grows. To achieve this, abstract tiles were translated + into DNA tiles based on double-crossover motifs. Serving as input for the + computation, long single-stranded DNA molecules were used to nucleate growth + of tiles into algorithmic crystals. For both of two independent molecular + realizations, atomic force microscopy revealed recognizable Sierpinski triangles + containing 100\u2013200 correct tiles. Error rates during assembly appear + to range from 1% to 10%. Although imperfect, the growth of Sierpinski triangles + demonstrates all the necessary mechanisms for the molecular implementation + of arbitrary cellular automata. This shows that engineered DNA self-assembly + can be treated as a Turing-universal biomolecular system, capable of implementing + any desired algorithm for computation or construction tasks.", "venue": "PLoS + Biology", "year": 2004, "referenceCount": 60, "citationCount": 801, "influentialCitationCount": + 33, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.plos.org/plosbiology/article/file?id=10.1371/journal.pbio.0020424&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2004-12-01", "journal": {"name": "PLoS + Biology", "volume": "2"}, "authors": [{"authorId": "145477156", "name": "P. + Rothemund"}, {"authorId": "92381867", "name": "N. Papadakis"}, {"authorId": + "3094920", "name": "E. Winfree"}]}, {"paperId": "53ca7f200c074a148ea1a3d906819cc1b490d727", + "externalIds": {"DBLP": "conf/mcu/WoodsN07", "MAG": "1740357362", "DOI": "10.3233/FI-2009-0039", + "CorpusId": 34986076}, "corpusId": 34986076, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/53ca7f200c074a148ea1a3d906819cc1b490d727", + "title": "Small Semi-Weakly Universal Turing Machines", "abstract": "We present + three small universal Turing machines that have 3 states and 7 symbols, 4 + states and 5 symbols, and 2 states and 13 symbols, respectively. These machines + are semi-weakly universal which means that on one side of the input they have + an infinitely repeated word, and on the other side there is the usual infinitely + repeated blank symbol. This work can be regarded as a continuation of early + work by Watanabe on semi-weak machines. One of our machines has only 17 transition + rules, making it the smallest known semi-weakly universal Turing machine. + Interestingly, two of our machines are symmetric with Watanabe''s 7-state + and 3-symbol, and 5-state and 4-symbol machines, even though we use a different + simulation technique.", "venue": "Fundam. Informaticae", "year": 2007, "referenceCount": + 40, "citationCount": 28, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://mural.maynoothuniversity.ie/12415/1/Woods_SmallSemi_2009.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-09-01", "journal": {"name": "Synthese", "pages": - "335-359", "volume": "108"}, "authors": [{"authorId": "144246233", "name": - "B. Copeland"}]}, {"paperId": "97b47dc9bc0da49f83a7ef2e9d2ac461c222dd73", - "externalIds": {"PubMedCentral": "6047832", "DBLP": "journals/ploscb/BrinkmannMRM18", - "MAG": "2810023719", "DOI": "10.1371/journal.pcbi.1006259", "CorpusId": 49670859, - "PubMed": "29969460"}, "url": "https://www.semanticscholar.org/paper/97b47dc9bc0da49f83a7ef2e9d2ac461c222dd73", - "title": "Post-Turing tissue pattern formation: Advent of mechanochemistry", - "abstract": "Chemical and mechanical pattern formation is fundamental during - embryogenesis and tissue development. Yet, the underlying molecular and cellular - mechanisms are still elusive in many cases. Most current theories assume that - tissue development is driven by chemical processes: either as a sequence of - chemical patterns each depending on the previous one, or by patterns spontaneously - arising from specific chemical interactions (such as \u201cTuring-patterns\u201d). - Within both theories, mechanical patterns are usually regarded as passive - by-products of chemical pre-patters. However, several experiments question - these theories, and an increasing number of studies shows that tissue mechanics - can actively influence chemical patterns during development. In this study, - we thus focus on the interplay between chemical and mechanical processes during - tissue development. On one hand, based on recent experimental data, we develop - new mechanochemical simulation models of evolving tissues, in which the full - 3D representation of the tissue appears to be critical for obtaining a realistic - mechanochemical behaviour. The presented modelling approach is flexible and - numerically studied using state of the art finite element methods. Thus, it - may serve as a basis to combine simulations with new experimental methods - in tissue development. On the other hand, we apply the developed approach - and demonstrate that even simple interactions between tissue mechanics and - chemistry spontaneously lead to robust and complex mechanochemical patterns. - Especially, we demonstrate that the main contradictions arising in the framework - of purely chemical theories are naturally and automatically resolved using - the mechanochemical patterning theory.", "venue": "PLoS Comput. Biol.", "year": - 2018, "referenceCount": 102, "citationCount": 40, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-07-01", "journal": {"name": "PLoS Computational Biology", "volume": - "14"}, "authors": [{"authorId": "40663769", "name": "Felix Brinkmann"}, {"authorId": - "3262942", "name": "M. Mercker"}, {"authorId": "144825773", "name": "T. Richter"}, - {"authorId": "1389565398", "name": "A. Marciniak-Czochra"}]}, {"paperId": - "5014eddf752d1454074fc8a449179521ba59c109", "externalIds": {"MAG": "2093457643", - "DOI": "10.1007/S11538-006-9066-Z", "CorpusId": 22603304, "PubMed": "16794923"}, - "url": "https://www.semanticscholar.org/paper/5014eddf752d1454074fc8a449179521ba59c109", - "title": "Gene Expression Time Delays and Turing Pattern Formation Systems", - "abstract": null, "venue": "Bulletin of Mathematical Biology", "year": 2006, - "referenceCount": 35, "citationCount": 44, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-03-23", "journal": - {"name": "Bulletin of Mathematical Biology", "pages": "99-130", "volume": - "68"}, "authors": [{"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": - "38146134", "name": "N. Monk"}]}, {"paperId": "59eaaf7e22eec69664e89f3a41694bef0bdfd22c", + "publicationDate": null, "journal": {"pages": "303-315"}, "authors": [{"authorId": + "145284748", "name": "D. Woods"}, {"authorId": "2221070", "name": "Turlough + Neary"}]}, {"paperId": "8097630668c8115f03b6d320a7b5cdc1f005066e", "externalIds": + {"DBLP": "conf/siggraph/Deering95", "MAG": "2293644818", "DOI": "10.1145/218380.218391", + "CorpusId": 6040405}, "corpusId": 6040405, "publicationVenue": {"id": "cf6b5e76-9274-46e6-a2dd-7c190ec2ec5f", + "name": "International Conference on Computer Graphics and Interactive Techniques", + "type": "conference", "alternate_names": ["Int Conf Comput Graph Interact + Tech", "SIGGRAPH"], "url": "http://www.siggraph.org/"}, "url": "https://www.semanticscholar.org/paper/8097630668c8115f03b6d320a7b5cdc1f005066e", + "title": "Geometry compression", "abstract": "This paper introduces the concept + of Geometry Compression, lowing 3D triangle data to be represented with a + factor of 6 to times fewer bits than conventional techniques, with only slight + los es in object quality. The technique is amenable to rapid decomp sion in + both software and hardware implementations; if 3D rend ing hardware contains + a geometry decompression unit, applicat geometry can be stored in memory in + compressed format. Geo try is first represented as a generalized triangle + mesh, a data s ture that allows each instance of a vertex in a linear stream + to sp ify an average of two triangles. Then a variable length compress is + applied to individual positions, colors, and normals. Delta com pression followed + by a modified Huffman compression is used f positions and colors; a novel + table-based approach is used for mals. The table allows any useful normal + to be represented by 18-bit index, many normals can be represented with index + deltas 8 bits or less. Geometry compression is a general space-time tr off, + and offers advantages at every level of the memory/interco nect hierarchy: + less storage space is needed on disk, less trans sion time is needed on networks.", + "venue": "International Conference on Computer Graphics and Interactive Techniques", + "year": 1995, "referenceCount": 10, "citationCount": 735, "influentialCitationCount": + 54, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": + "1995-09-15", "journal": {"name": "Proceedings of the 22nd annual conference + on Computer graphics and interactive techniques"}, "authors": [{"authorId": + "3090967", "name": "M. Deering"}]}, {"paperId": "59eaaf7e22eec69664e89f3a41694bef0bdfd22c", "externalIds": {"MAG": "1717598848", "ArXiv": "1411.7178", "DOI": "10.1103/PhysRevE.92.022818", - "CorpusId": 21203159, "PubMed": "26382465"}, "url": "https://www.semanticscholar.org/paper/59eaaf7e22eec69664e89f3a41694bef0bdfd22c", + "CorpusId": 21203159, "PubMed": "26382465"}, "corpusId": 21203159, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/59eaaf7e22eec69664e89f3a41694bef0bdfd22c", "title": "Turing-like instabilities from a limit cycle.", "abstract": "The Turing instability is a paradigmatic route to pattern formation in reaction-diffusion systems. Following a diffusion-driven instability, homogeneous fixed points @@ -24959,7 +28100,8 @@ interactions: of the theory is tested numerically, using different reaction schemes.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2014, "referenceCount": 26, "citationCount": 25, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Physics", "Medicine"], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1411.7178", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": @@ -24967,7 +28109,140 @@ interactions: "Physical review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 022818\n ", "volume": "92 2"}, "authors": [{"authorId": "2965448", "name": "J. D. Challenger"}, {"authorId": "3016256", "name": "R. - Burioni"}, {"authorId": "2334449", "name": "D. Fanelli"}]}]} + Burioni"}, {"authorId": "2334449", "name": "D. Fanelli"}]}, {"paperId": "a6b8e1aed0b47a4f68c19600a6943c6625adc4b0", + "externalIds": {"MAG": "2401794038", "DBLP": "conf/birthday/Fiske12", "DOI": + "10.29007/x5g2", "CorpusId": 14718443}, "corpusId": 14718443, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a6b8e1aed0b47a4f68c19600a6943c6625adc4b0", + "title": "Turing Incomputable Computation", "abstract": "Recent cyberattacks + have demonstrated that current approaches to the malware problem (e.g., detection) + are inadequate. This is not surprising as virus detection is Turing undecidable. + 1 Further, some recent malware implementations use NP problems to encrypt + and hide the malware. 2 Two goals guide an alternative approach: (a) Program + execution should hide computational steps in order to hinder \u201creverse + engineering\u201d efforts by malware hackers; (b) New computational models + should be explored that make it more difficult to hijack the purpose of program + execution. The methods explained here pertain to (a) implemented with a new + computational model, called the active element machine (AEM). 3 An AEM is + composed of computational primitives called active elements that simultaneously + transmit and receive pulses to and from other active elements. Each pulse + has an amplitude and a width, representing how long the pulse amplitude lasts + as input to the active element receiving the pulse. If active element Ei simultaneously + receives pulses with amplitudes summing to a value greater than Ei\u2019s + threshold and Ei\u2019s refractory period has expired, then Ei fires. When + Ei fires, it sends pulses to other active elements. If Ei fires at time t, + a pulse reaches element Ek at time t+ \u03c4ik where \u03c4ik is the transmission + time from Ei to Ek. The AEM language uses five commands \u2013 Element, Connection, + Fire, Program and Meta \u2013 to write AEM programs, where time is explicitly + specified and multiple commands may simultaneously execute. An Element command + creates, at the time specified in the command, an active element with a threshold + value, a refractory period and a most recent firing time. A Connection command + sets, at the time specified in the command, a pulse amplitude, a pulse width + and a transmission time from element Ei to element Ek. The Fire command fires + an input element at a particular time. The Program command defines the execution + of multiple commands with a single command. Element and Connection commands + establish the AEM architecture and firing activity. The Meta command can change + the AEM architecture during AEM program execution. This model uses quantum + random input to generate random firing patterns that deterministically execute + a universal Turing machine (UTM) program \u03b7. Random firing interpretations + are constructed with dynamic level sets on boolean functions that compute + \u03b7. The quantum randomness is an essential component for building the + random firing patterns that are Turing incomputable. 4 It is assumed that + the following are all kept perfectly secret: the state and tape of the UTM, + represented by the active elements and connections; the quantum random bits + determining how \u03b7 is computed for each computational step; and the dynamic + connections in the AEM. Formally, let f1j , f2j , . . . fmj represent the + random firing pattern computing \u03b7 during the jth computational step and + assume an adversary can eavesdrop on f1j , f2j , . . . fmj . Let q denote + the current state of the UTM, ak a UTM alphabet symbol and qk a UTM state. + Perfect secrecy means that probabilities P (q = qk|f1j = b1 . . . fmj = bm) + = P (q = qk) and P (Tk = ak|f1j = b1 . . . fmj = bm) = P (Tk = ak) for each + bi \u2208 {0, 1} and each Tk which is the contents of the kth tape square. + If these secrecy conditions hold, then there doesn\u2019t exist a \u201creverse + engineer\u201d Turing machine that can map the random firing patterns back + to an unbounded sequence of UTM instructions. For an unbounded number of computational + steps, define function g : N\u2192 {0, 1} where g((j \u2212 1)m+ r) = f(r+1)j + and 0 \u2264 r < m. Then g is incomputable. Proposed methods of hypercomputation + currently have no physical realization. 5 The methods described here can be + physically realized using an off-the-shelf quantum random generator device + with a USB plug connected to a laptop computer executing a finite AEM program.", + "venue": "Turing-100", "year": 2012, "referenceCount": 55, "citationCount": + 7, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://easychair.org/publications/open/Jxss", "status": "BRONZE"}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-22", "journal": + {"pages": "66-91"}, "authors": [{"authorId": "2040922", "name": "Michael Stephen + Fiske"}]}, {"paperId": "1ed45d8762132b251b3e3e17e0ddc1ecca3e57d1", "externalIds": + {"DBLP": "journals/cacm/Sutherland12", "MAG": "2168647360", "DOI": "10.1145/2347736.2347749", + "CorpusId": 24814640}, "corpusId": 24814640, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1ed45d8762132b251b3e3e17e0ddc1ecca3e57d1", + "title": "The tyranny of the clock", "abstract": "Promoting a clock-free paradigm + that fits everything learned about programming since Turing.", "venue": "Commun. + ACM", "year": 2012, "referenceCount": 4, "citationCount": 31, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-10-01", "journal": {"name": "Communications + of the ACM", "pages": "35 - 36", "volume": "55"}, "authors": [{"authorId": + "32979967", "name": "I. Sutherland"}]}, {"paperId": "30a64bdf778b8f561af9ae589e822c2c800920b1", + "externalIds": {"MAG": "2782975919", "DOI": "10.1007/b138233", "CorpusId": + 33352850}, "corpusId": 33352850, "publicationVenue": {"id": "0ca99225-6815-4d31-8d51-0319116b3b30", + "name": "Texts in Theoretical Computer Science. An EATCS Series", "alternate_names": + ["Text Theor Comput Sci EATCS Ser"], "issn": "1862-4499"}, "url": "https://www.semanticscholar.org/paper/30a64bdf778b8f561af9ae589e822c2c800920b1", + "title": "Universal Artificial Intelligence", "abstract": null, "venue": "Texts + in Theoretical Computer Science. An EATCS Series", "year": 2004, "referenceCount": + 22, "citationCount": 238, "influentialCitationCount": 27, "isOpenAccess": + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-540-26877-2%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-10-12", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1406347404", "name": "Dr. Marcus Hutter"}]}, {"paperId": "487e349fa82a3d12462dbac6f3c6065be0400002", + "externalIds": {"MAG": "2032145407", "DOI": "10.1021/JP049168N", "CorpusId": + 95028966}, "corpusId": 95028966, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/487e349fa82a3d12462dbac6f3c6065be0400002", + "title": "Turing Patterns, Spatial Bistability, and Front Instabilities in + a Reaction\u2212Diffusion System", "abstract": "The chlorine dioxide-iodine-malonic + acid oscillating reaction produces Turing patterns when operated in open spatial + reactors. In the same operating conditions, the chlorine dioxide-iodide bistable + reaction leads to spatial bistability between two steady states that do not + break the symmetry of boundary conditions. We develop a system combining these + two properties. Phase diagram studies show that the Turing pattern region + cannot be generically made to interact with the phenomenon of spatial bistability. + In the spatial bistability region, stationary pulses and complex transient + domain patterns are observed, a new phenomenon for the chlorite-iodide driven + systems. These have no connection with the previously observed Turing patterns. + We propose a systematic design method to produce permanent domain patterns + in systems exhibiting spatial bistability.", "venue": "", "year": 2004, "referenceCount": + 1, "citationCount": 28, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-05-28", + "journal": {"name": "Journal of Physical Chemistry A", "pages": "5315-5321", + "volume": "108"}, "authors": [{"authorId": "3642365", "name": "I. Szalai"}, + {"authorId": "50010680", "name": "P. Kepper"}]}, {"paperId": "d408100f3c87e746ee4a0838333b342384fd380c", + "externalIds": {"CorpusId": 8042983}, "corpusId": 8042983, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d408100f3c87e746ee4a0838333b342384fd380c", + "title": "Lecture on the automatic computing engine ; reprinted in ( Copeland + 2004 ) Universal Turing Machine", "abstract": "Amphibious communication and + RAID have garnered tremendous interest from both biologists and cyberinforma + ticians in the last several years. After years of technical res earch into + gigabit switches, we prove the evaluation of Boolean logic. We describe a + novel application for the exploration o f access points, which we call Die.", + "venue": "", "year": 2011, "referenceCount": 341, "citationCount": 111, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "3687a728683d9e02d08b2818a3db529c3396df7e", "externalIds": {"MAG": "153746552", + "DOI": "10.1007/978-1-4757-5687-6_12", "CorpusId": 140826830}, "corpusId": + 140826830, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3687a728683d9e02d08b2818a3db529c3396df7e", + "title": "Turn Taking versus Discourse Structure", "abstract": null, "venue": + "", "year": 1999, "referenceCount": 13, "citationCount": 49, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "143-153", "volume": ""}, "authors": + [{"authorId": "145431806", "name": "J. Cassell"}, {"authorId": "120216566", + "name": "Obed E. Torres"}, {"authorId": "35219353", "name": "Scott Prevost"}]}]} ' headers: @@ -24976,31 +28251,31 @@ interactions: Connection: - keep-alive Content-Length: - - '171963' + - '186438' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:37 GMT + - Tue, 03 Jan 2023 20:53:05 GMT Via: - - 1.1 94d1b34d858b1d0f17042496999ab014.cloudfront.net (CloudFront) + - 1.1 88c333921d5c405e037b84bb8c2dc33e.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - h-LneX0IlkTR51YWdH6LCHad9tXVXnG85QfglURhDVdGgJSJMcJFXg== + - tpOjkNHh65-zg9RTL1ftj44ffkYZ0G4a5vm89gITH9Tcchg6PBR2uw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detG-E6WPHcFfRQ= + - eLxTxEKuPHcFcuA= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '171963' + - '186438' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:37 GMT + - Tue, 03 Jan 2023 20:53:05 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 5c78a45e-e4fb-44c0-bcc6-20ba4c0e9372 + - df0a7111-9880-4243-b2fa-0f441c4dd682 status: code: 200 message: OK @@ -25016,115 +28291,104 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1200&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1200&limit=100 response: body: - string: '{"total": 65539, "offset": 1200, "next": 1300, "data": [{"paperId": - "044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", "externalIds": {"ArXiv": "2007.14062", - "DBLP": "journals/corr/abs-2007-14062", "MAG": "3104613728", "CorpusId": 220831004}, - "url": "https://www.semanticscholar.org/paper/044e13d7dd4e0655eb76f0bd00b2c1bdb44e2be3", - "title": "Big Bird: Transformers for Longer Sequences", "abstract": "Transformers-based - models, such as BERT, have been one of the most successful deep learning models - for NLP. Unfortunately, one of their core limitations is the quadratic dependency - (mainly in terms of memory) on the sequence length due to their full attention - mechanism. To remedy this, we propose, BigBird, a sparse attention mechanism - that reduces this quadratic dependency to linear. We show that BigBird is - a universal approximator of sequence functions and is Turing complete, thereby - preserving these properties of the quadratic, full attention model. Along - the way, our theoretical analysis reveals some of the benefits of having $O(1)$ - global tokens (such as CLS), that attend to the entire sequence as part of - the sparse attention mechanism. The proposed sparse attention can handle sequences - of length up to 8x of what was previously possible using similar hardware. - As a consequence of the capability to handle longer context, BigBird drastically - improves performance on various NLP tasks such as question answering and summarization. - We also propose novel applications to genomics data.", "venue": "Neural Information - Processing Systems", "year": 2020, "referenceCount": 117, "citationCount": - 753, "influentialCitationCount": 131, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics", "Geography"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Geography", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-07-28", "journal": {"name": "ArXiv", "volume": "abs/2007.14062"}, - "authors": [{"authorId": "1771307", "name": "M. Zaheer"}, {"authorId": "1947314", - "name": "Guru Guruganesh"}, {"authorId": "89890133", "name": "Kumar Avinava - Dubey"}, {"authorId": "1643737606", "name": "J. Ainslie"}, {"authorId": "114577307", - "name": "Chris Alberti"}, {"authorId": "1722671", "name": "Santiago Onta\u00f1\u00f3n"}, - {"authorId": "38552691", "name": "Philip Pham"}, {"authorId": "101210026", - "name": "Anirudh Ravula"}, {"authorId": "145196279", "name": "Qifan Wang"}, - {"authorId": "113906155", "name": "Li Yang"}, {"authorId": "143629707", "name": - "Amr Ahmed"}]}, {"paperId": "d3f0d534689ec3aebb65a046a04509a0c527409a", "externalIds": - {"MAG": "2145295071", "DBLP": "conf/stacs/CaludeHKW98", "DOI": "10.1007/BFb0028594", - "CorpusId": 5493426}, "url": "https://www.semanticscholar.org/paper/d3f0d534689ec3aebb65a046a04509a0c527409a", - "title": "Recursively enumerable reals and Chaitin Omega numbers", "abstract": - null, "venue": "Theoretical Computer Science", "year": 1998, "referenceCount": - 71, "citationCount": 51, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-02-25", "journal": - {"name": "Theor. Comput. Sci.", "pages": "125-149", "volume": "255"}, "authors": - [{"authorId": "1685717", "name": "Cristian S. Calude"}, {"authorId": "1785054", - "name": "Peter Hertling"}, {"authorId": "1703048", "name": "B. Khoussainov"}, - {"authorId": "2108771041", "name": "Yongge Wang"}]}, {"paperId": "d5e48f0d6dfaf46fc38b31291b3977009b01e634", - "externalIds": {"MAG": "2171407179", "DOI": "10.1214/10-EJS584", "CorpusId": - 16562221}, "url": "https://www.semanticscholar.org/paper/d5e48f0d6dfaf46fc38b31291b3977009b01e634", - "title": "Adaptive Bayesian density estimation with location-scale mixtures", - "abstract": "We study convergence rates of Bayesian density estimators based - on finite location-scale mixtures of exponential power distributions. We construct - approximations of \ufffd-Holder densities be continuous mix- tures of exponential - power distributions, leading to approximations of the \ufffd-Holder densities - by finite mixtures. These results are then used to derive posterior concentration - rates, with priors based on these mixture models. The rates are minimax (up - to a logn term) and since the priors are inde- pendent of the smoothness the - rates are adaptive to the smoothness.", "venue": "", "year": 2010, "referenceCount": - 38, "citationCount": 119, "influentialCitationCount": 23, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + string: '{"total": 65729, "offset": 1200, "next": 1300, "data": [{"paperId": + "c4e8e8cdfd8342b1bcd08a33b67f77f3df562460", "externalIds": {"DBLP": "series/leus/Floyd12", + "MAG": "73077042", "DOI": "10.1007/978-94-007-4435-6_2", "CorpusId": 6844141}, + "corpusId": 6844141, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c4e8e8cdfd8342b1bcd08a33b67f77f3df562460", + "title": "Wittgenstein''s Diagonal Argument: A Variation on Cantor and Turing", + "abstract": null, "venue": "Epistemology versus Ontology", "year": 2012, "referenceCount": + 60, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"pages": "25-44"}, "authors": [{"authorId": "39423496", "name": "J. Floyd"}]}, + {"paperId": "2637d8d75f0c960444167fdb7bec0a34f09062dc", "externalIds": {"MAG": + "1734796177", "DOI": "10.1075/JNLH.5.2.01MOD", "CorpusId": 143102246}, "corpusId": + 143102246, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2637d8d75f0c960444167fdb7bec0a34f09062dc", + "title": "Models of narrative analysis: A typology.", "abstract": "AbstractThe + recent increase in the number of narrative studies in the human sciences is + marked by great diversity in methods and theoretical perspectives. Researchers + offer different answers to many questions, from what constitutes a narrative + and how different genres may be specified to the aims and functions of storytell-ing. + To clarify differences among approaches, a typology of models is proposed + that focuses on which of three alternative problems are defined as the central + task for narrative research: reference and the relation between temporal order-ings + of events and their narrative representation; textual coherence and struc-ture, + and how these are achieved through narrative strategies; and psychological, + cultural, and social contexts and functions of narratives. Within each of + these general categories, subclasses are distinguished in terms of the specific + ways in which the central problem is addressed. Exemplars of each model are + presented and related studies are cited. This comparative analysis demonstrates + the depth, strength, and diversity of current research on narra-tive. It is + suggested that further development of the field would benefit from more inclusive + research strategies that combine what have been separate lines of inquiry.\n(Narrative + Analyses; Types and Functions; Social Sciences; Educa-tion; Psychology", "venue": + "", "year": 1995, "referenceCount": 46, "citationCount": 730, "influentialCitationCount": + 46, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Journal of Narrative and Life History", "pages": + "87-123", "volume": "5"}, "authors": [{"authorId": "4686536", "name": "E. + Mishler"}]}, {"paperId": "178a716bcb8eabd0b0e9a83ad940fbb17b5597b4", "externalIds": + {"MAG": "2169514524", "ArXiv": "math/0507128", "DOI": "10.1112/jlms/jdl012", + "CorpusId": 979189}, "corpusId": 979189, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/178a716bcb8eabd0b0e9a83ad940fbb17b5597b4", + "title": "Turing degrees of isomorphism types of algebraic objects", "abstract": + "The Turing degree spectrum of a countable structure \ud835\udc9c is the set + of all Turing degrees of isomorphic copies of \ud835\udc9c. The Turing degree + of the isomorphism type of \ud835\udc9c, is the least Turing degree in its + degree spectrum. We show that there are structures with isomorphism types + of arbitrary Turing degrees in each of the following classes: countable fields, + rings, and torsion\u2010free Abelian groups of any finite rank. We also show + that there are structures in each of these classes the isomorphism types of + which do not have Turing degrees. The case of torsion\u2010free Abelian groups + of finite rank settles a question left open by Knight, Downey and Jockusch + [Downey, Complexity, logic, and recursion theory, Lecture Notes in Pure and + Applied Mathematics 187 (ed. A. Sorbi; Marcel Dekker, New York, 1997) 157\u2013205].", + "venue": "", "year": 2005, "referenceCount": 51, "citationCount": 17, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/math/0507128", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Electronic - Journal of Statistics", "pages": "1225-1257", "volume": "4"}, "authors": [{"authorId": - "6612680", "name": "W. Kruijer"}, {"authorId": "144915371", "name": "J. Rousseau"}, - {"authorId": "2508221", "name": "A. V. D. Vaart"}]}, {"paperId": "3687a728683d9e02d08b2818a3db529c3396df7e", - "externalIds": {"MAG": "153746552", "DOI": "10.1007/978-1-4757-5687-6_12", - "CorpusId": 140826830}, "url": "https://www.semanticscholar.org/paper/3687a728683d9e02d08b2818a3db529c3396df7e", - "title": "Turn Taking versus Discourse Structure", "abstract": null, "venue": - "", "year": 1999, "referenceCount": 13, "citationCount": 49, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "143-153", "volume": ""}, "authors": [{"authorId": - "145431806", "name": "J. Cassell"}, {"authorId": "120216566", "name": "Obed - E. Torres"}, {"authorId": "35219353", "name": "Scott Prevost"}]}, {"paperId": - "8097630668c8115f03b6d320a7b5cdc1f005066e", "externalIds": {"DBLP": "conf/siggraph/Deering95", - "MAG": "2293644818", "DOI": "10.1145/218380.218391", "CorpusId": 6040405}, - "url": "https://www.semanticscholar.org/paper/8097630668c8115f03b6d320a7b5cdc1f005066e", - "title": "Geometry compression", "abstract": "This paper introduces the concept - of Geometry Compression, lowing 3D triangle data to be represented with a - factor of 6 to times fewer bits than conventional techniques, with only slight - los es in object quality. The technique is amenable to rapid decomp sion in - both software and hardware implementations; if 3D rend ing hardware contains - a geometry decompression unit, applicat geometry can be stored in memory in - compressed format. Geo try is first represented as a generalized triangle - mesh, a data s ture that allows each instance of a vertex in a linear stream - to sp ify an average of two triangles. Then a variable length compress is - applied to individual positions, colors, and normals. Delta com pression followed - by a modified Huffman compression is used f positions and colors; a novel - table-based approach is used for mals. The table allows any useful normal - to be represented by 18-bit index, many normals can be represented with index - deltas 8 bits or less. Geometry compression is a general space-time tr off, - and offers advantages at every level of the memory/interco nect hierarchy: - less storage space is needed on disk, less trans sion time is needed on networks.", - "venue": "International Conference on Computer Graphics and Interactive Techniques", - "year": 1995, "referenceCount": 10, "citationCount": 734, "influentialCitationCount": - 54, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book", "Conference"], "publicationDate": "1995-09-15", "journal": {"name": - "Proceedings of the 22nd annual conference on Computer graphics and interactive - techniques"}, "authors": [{"authorId": "3090967", "name": "M. Deering"}]}, - {"paperId": "0140c47738b29e2348abb1797731299d1716f270", "externalIds": {"MAG": - "1502316208", "DBLP": "books/daglib/0018794", "DOI": "10.1142/9789812708977", - "CorpusId": 30317453}, "url": "https://www.semanticscholar.org/paper/0140c47738b29e2348abb1797731299d1716f270", + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-07-06", + "journal": {"name": "Journal of the London Mathematical Society", "volume": + "75"}, "authors": [{"authorId": "3101723", "name": "W. Calvert"}, {"authorId": + "3187833", "name": "V. Harizanov"}, {"authorId": "1752260", "name": "Alexandra + Shlapentokh"}]}, {"paperId": "89fb323175be1654f7021360db5e9a771b0e2ab8", "externalIds": + {"MAG": "1999435051", "DOI": "10.1090/S0002-9947-2011-05306-7", "CorpusId": + 115171420}, "corpusId": 115171420, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/89fb323175be1654f7021360db5e9a771b0e2ab8", + "title": "Kolmogorov complexity and the Recursion Theorem", "abstract": "Several + classes of diagonally nonrecursive (DNR) functions are characterized in terms + of Kolmogorov complexity. In particular, a set of natural numbers A can wtt-compute + a DNR function iff there is a nontrivial recursive lower bound on the Kolmogorov + complexity of the initial segments of A. Furthermore, A can Turing compute + a DNR function iff there is a nontrivial A-recursive lower bound on the Kolmogorov + complexity of the initial segments of A. A is PA-complete, that is, A can + compute a {0, 1}-valued DNR function, iff A can compute a function F such + that F(n) is a string of length n and maximal C-complexity among the strings + of length n. A \u2265 T K iff A can compute a function F such that F(n) is + a string of length n and maximal H-complexity among the strings of length + n. Further characterizations for these classes are given. The existence of + a DNR function in a Turing degree is equivalent to the failure of the Recursion + Theorem for this degree; thus the provided results characterize those Turing + degrees in terms of Kolmogorov complexity which no longer permit the usage + of the Recursion Theorem.", "venue": "", "year": 2011, "referenceCount": 10, + "citationCount": 48, "influentialCitationCount": 6, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.ams.org/tran/2011-363-10/S0002-9947-2011-05306-7/S0002-9947-2011-05306-7.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-10-01", + "journal": {"name": "Transactions of the American Mathematical Society", "pages": + "5465-5480", "volume": "363"}, "authors": [{"authorId": "1401914011", "name": + "B. Kjos-Hanssen"}, {"authorId": "1691379", "name": "W. Merkle"}, {"authorId": + "1699450", "name": "F. Stephan"}]}, {"paperId": "0140c47738b29e2348abb1797731299d1716f270", + "externalIds": {"MAG": "1502316208", "DBLP": "books/daglib/0018794", "DOI": + "10.1142/9789812708977", "CorpusId": 30317453}, "corpusId": 30317453, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0140c47738b29e2348abb1797731299d1716f270", "title": "Thinking about G\u00f6del and Turing - Essays on Complexity, 1970 - 2007", "abstract": "Dr Gregory Chaitin, one of the world s leading mathematicians, is best known for his discovery of the remarkable number, a concrete example @@ -25145,23 +28409,162 @@ interactions: mathematical work will be of interest to philosophers concerned with the limits of knowledge and to physicists interested in the nature of complexity.", "venue": "", "year": 2007, "referenceCount": 0, "citationCount": 41, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"pages": "I-XIX, 1-345"}, "authors": [{"authorId": "1756533", - "name": "G. Chaitin"}]}, {"paperId": "7001ebad878397eee1b2544c6c72bd2845c76590", - "externalIds": {"MAG": "2026387762", "DOI": "10.1007/BF00134103", "CorpusId": - 121630807}, "url": "https://www.semanticscholar.org/paper/7001ebad878397eee1b2544c6c72bd2845c76590", - "title": "Some notes on Church''s thesis and the theory of games", "abstract": - null, "venue": "", "year": 1990, "referenceCount": 17, "citationCount": 54, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": {"pages": "I-XIX, 1-345"}, + "authors": [{"authorId": "1756533", "name": "G. Chaitin"}]}, {"paperId": "7f4a26a2203334a78d0b94951bc2a46cac8aafca", + "externalIds": {"MAG": "2128325320", "DBLP": "journals/jsyml/GreenbergN11", + "DOI": "10.2178/jsl/1294171001", "CorpusId": 6066800}, "corpusId": 6066800, + "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": + "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J + Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/7f4a26a2203334a78d0b94951bc2a46cac8aafca", + "title": "Benign cost functions and lowness properties", "abstract": "Abstract + We show that the class of strongly jump-traceable c.e. sets can be characterised + as those which have sufficiently slow enumerations so they obey a class of + well-behaved cost functions, called benign. This characterisation implies + the containment of the class of strongly jump-traceable c.e. Turing degrees + in a number of lowness classes, in particular the classes of the degrees which + lie below incomplete random degrees, indeed all LR-hard random degrees, and + all \u03c9-c.e. random degrees. The last result implies recent results of + Diamondstone''s and Ng''s regarding cupping with superlow c.e. degrees and + thus gives a use of algorithmic randomness in the study of the c.e. Turing + degrees.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2011, "referenceCount": + 26, "citationCount": 38, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.cs.auckland.ac.nz/~nies/papers/Benign.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1990-07-01", "journal": {"name": "Theory and Decision", "pages": "19-52", - "volume": "29"}, "authors": [{"authorId": "2312899", "name": "L. Anderlini"}]}, - {"paperId": "fb357ddd004ff5a3b0606ed982b4d95f617fe63e", "externalIds": {"DBLP": - "conf/stoc/Ajtai10", "MAG": "2073236787", "DOI": "10.1145/1806689.1806716", - "CorpusId": 260228}, "url": "https://www.semanticscholar.org/paper/fb357ddd004ff5a3b0606ed982b4d95f617fe63e", + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2011-03-01", "journal": {"name": "The Journal of Symbolic Logic", "pages": + "289 - 312", "volume": "76"}, "authors": [{"authorId": "34695773", "name": + "Noam Greenberg"}, {"authorId": "2350687", "name": "A. Nies"}]}, {"paperId": + "1ed45d8762132b251b3e3e17e0ddc1ecca3e57d1", "externalIds": {"DBLP": "journals/cacm/Sutherland12", + "MAG": "2168647360", "DOI": "10.1145/2347736.2347749", "CorpusId": 24814640}, + "corpusId": 24814640, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1ed45d8762132b251b3e3e17e0ddc1ecca3e57d1", + "title": "The tyranny of the clock", "abstract": "Promoting a clock-free paradigm + that fits everything learned about programming since Turing.", "venue": "Commun. + ACM", "year": 2012, "referenceCount": 4, "citationCount": 31, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-10-01", "journal": {"name": "Communications + of the ACM", "pages": "35 - 36", "volume": "55"}, "authors": [{"authorId": + "32979967", "name": "I. Sutherland"}]}, {"paperId": "7de39928d9857baf083a1d56c58ef133c50a4195", + "externalIds": {"ArXiv": "1710.10411", "MAG": "2787184843", "DOI": "10.3934/DCDSB.2018183", + "CorpusId": 55513740}, "corpusId": 55513740, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7de39928d9857baf083a1d56c58ef133c50a4195", + "title": "Spatiotemporal attractors generated by the Turing-Hopf bifurcation + in a time-delayed reaction-diffusion system", "abstract": "We study the Turing-Hopf + bifurcation and give a simple and explicit calculation formula of the normal + forms for a general two-components system of reaction-diffusion equation with + time delays. We declare that our formula can be automated by Matlab. At first, + we extend the normal forms method given by Faria in 2000 to Hopf-zero singularity. + Then, an explicit formula of the normal forms for Turing-Hopf bifurcation + are given. Finally, we obtain the possible attractors of the original system + near the Turing-Hopf singularity by the further analysis of the normal forms, + which mainly include, the spatially non-homogeneous steady-state solutions, + periodic solutions and quasi-periodic solutions.", "venue": "Discrete & Continuous + Dynamical Systems - B", "year": 2017, "referenceCount": 33, "citationCount": + 23, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2017-10-28", "journal": {"name": + "Discrete & Continuous Dynamical Systems - B"}, "authors": [{"authorId": "1521749343", + "name": "Qi An"}, {"authorId": "144382267", "name": "Weihua Jiang"}]}, {"paperId": + "59eaaf7e22eec69664e89f3a41694bef0bdfd22c", "externalIds": {"MAG": "1717598848", + "ArXiv": "1411.7178", "DOI": "10.1103/PhysRevE.92.022818", "CorpusId": 21203159, + "PubMed": "26382465"}, "corpusId": 21203159, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/59eaaf7e22eec69664e89f3a41694bef0bdfd22c", + "title": "Turing-like instabilities from a limit cycle.", "abstract": "The + Turing instability is a paradigmatic route to pattern formation in reaction-diffusion + systems. Following a diffusion-driven instability, homogeneous fixed points + can become unstable when subject to external perturbation. As a consequence, + the system evolves towards a stationary, nonhomogeneous attractor. Stable + patterns can be also obtained via oscillation quenching of an initially synchronous + state of diffusively coupled oscillators. In the literature this is known + as the oscillation death phenomenon. Here, we show that oscillation death + is nothing but a Turing instability for the first return map of the system + in its synchronous periodic state. In particular, we obtain a set of approximated + closed conditions for identifying the domain in the parameter space that yields + the instability. This is a natural generalization of the original Turing relations, + to the case where the homogeneous solution of the examined system is a periodic + function of time. The obtained framework applies to systems embedded in continuum + space, as well as those defined on a networklike support. The predictive ability + of the theory is tested numerically, using different reaction schemes.", "venue": + "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": + 2014, "referenceCount": 26, "citationCount": 25, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1411.7178", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics", "Medicine"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["Study", "JournalArticle"], "publicationDate": "2014-11-26", "journal": {"name": + "Physical review. E, Statistical, nonlinear, and soft matter physics", "pages": + "\n 022818\n ", "volume": "92 2"}, "authors": [{"authorId": + "2965448", "name": "J. D. Challenger"}, {"authorId": "3016256", "name": "R. + Burioni"}, {"authorId": "2334449", "name": "D. Fanelli"}]}, {"paperId": "c0d14c00911a320e3a13859219cd314d15c4310d", + "externalIds": {"MAG": "2143080257", "DBLP": "journals/mima/Traiger00", "DOI": + "10.1023/A:1011254505902", "CorpusId": 2302024}, "corpusId": 2302024, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c0d14c00911a320e3a13859219cd314d15c4310d", + "title": "Making the Right Identification in the Turing Test1", "abstract": + null, "venue": "Minds and Machines", "year": 2000, "referenceCount": 26, "citationCount": + 23, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-11-01", "journal": {"name": "Minds and Machines", "pages": "561-572", + "volume": "10"}, "authors": [{"authorId": "3149598", "name": "S. Traiger"}]}, + {"paperId": "2434fb016f3b324d4128e3f60f2c953c14315867", "externalIds": {"MAG": + "2060220713", "DOI": "10.1063/1.473763", "CorpusId": 40764093}, "corpusId": + 40764093, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2434fb016f3b324d4128e3f60f2c953c14315867", + "title": "Absolute and convective instabilities in a one-dimensional Brusselator + flow model", "abstract": "The paper considers a one-dimensional Brusselator + model with a uniform flow of the mixture of reaction components. An absolute + as well as a convective instability can arise for both the Hopf and the Turing + modes. The corresponding linear stability analysis is presented and supported + by the results of computer simulations of the nonlinear equations. Finally, + the condition for spatially undamped tails (the Cherenkov condition) is obtained. + This represents a new mechanism for pattern formation in chemical reaction-diffusion + systems.", "venue": "", "year": 1997, "referenceCount": 18, "citationCount": + 81, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://backend.orbit.dtu.dk/ws/files/4064578/Mosekilde.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1997-05-08", "journal": {"name": + "Journal of Chemical Physics", "pages": "7609-7616", "volume": "106"}, "authors": + [{"authorId": "34596490", "name": "S. Kuznetsov"}, {"authorId": "2203242", + "name": "E. Mosekilde"}, {"authorId": "49808656", "name": "G. Dewel"}, {"authorId": + "92147854", "name": "P. Borckmans"}]}, {"paperId": "89d6d6ae09c044c3cca6bdc8857d4802b5d736c4", + "externalIds": {"MAG": "2150583267", "DBLP": "journals/jsyml/Miller09", "DOI": + "10.2178/jsl/1254748694", "CorpusId": 5743788}, "corpusId": 5743788, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/89d6d6ae09c044c3cca6bdc8857d4802b5d736c4", + "title": "d-computable categoricity for algebraic fields", "abstract": "Abstract + We use the Low Basis Theorem of Jockusch and Soare to show that all computable + algebraic fields are d-computably categorical for a particular Turing degree + d with d\u2032 = 0\u2033, but that not all such fields are 0\u2032-computably + categorical. We also prove related results about algebraic fields with splitting + algorithms, and fields of finite transcendence degree over \u211a.", "venue": + "Journal of Symbolic Logic (JSL)", "year": 2009, "referenceCount": 42, "citationCount": + 60, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2009-12-01", "journal": {"name": "The + Journal of Symbolic Logic", "pages": "1325 - 1351", "volume": "74"}, "authors": + [{"authorId": "2110456077", "name": "Russell G. Miller"}]}, {"paperId": "fb357ddd004ff5a3b0606ed982b4d95f617fe63e", + "externalIds": {"DBLP": "conf/stoc/Ajtai10", "MAG": "2073236787", "DOI": "10.1145/1806689.1806716", + "CorpusId": 260228}, "corpusId": 260228, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/fb357ddd004ff5a3b0606ed982b4d95f617fe63e", "title": "Oblivious RAMs without cryptogrpahic assumptions", "abstract": "ithmic increase in the time and space requirements is possible on a probabilistic (coin flipping) RAM without using any cryptographic assumptions. The simulation @@ -25189,52 +28592,99 @@ interactions: RAM, with only a factor of ln increase in time and space requirements, is possible, even without any cryptographic assumptions.", "venue": "Symposium on the Theory of Computing", "year": 2010, "referenceCount": 12, "citationCount": - 67, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-06-05", "journal": {"name": "Electron. Colloquium Comput. Complex.", - "volume": "TR10"}, "authors": [{"authorId": "1704344", "name": "M. Ajtai"}]}, - {"paperId": "2637d8d75f0c960444167fdb7bec0a34f09062dc", "externalIds": {"MAG": - "1734796177", "DOI": "10.1075/JNLH.5.2.01MOD", "CorpusId": 143102246}, "url": - "https://www.semanticscholar.org/paper/2637d8d75f0c960444167fdb7bec0a34f09062dc", - "title": "Models of narrative analysis: A typology.", "abstract": "AbstractThe - recent increase in the number of narrative studies in the human sciences is - marked by great diversity in methods and theoretical perspectives. Researchers - offer different answers to many questions, from what constitutes a narrative - and how different genres may be specified to the aims and functions of storytell-ing. - To clarify differences among approaches, a typology of models is proposed - that focuses on which of three alternative problems are defined as the central - task for narrative research: reference and the relation between temporal order-ings - of events and their narrative representation; textual coherence and struc-ture, - and how these are achieved through narrative strategies; and psychological, - cultural, and social contexts and functions of narratives. Within each of - these general categories, subclasses are distinguished in terms of the specific - ways in which the central problem is addressed. Exemplars of each model are - presented and related studies are cited. This comparative analysis demonstrates - the depth, strength, and diversity of current research on narra-tive. It is - suggested that further development of the field would benefit from more inclusive - research strategies that combine what have been separate lines of inquiry.\n(Narrative - Analyses; Types and Functions; Social Sciences; Educa-tion; Psychology", "venue": - "", "year": 1995, "referenceCount": 46, "citationCount": 729, "influentialCitationCount": - 46, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Journal of Narrative and Life History", "pages": "87-123", - "volume": "5"}, "authors": [{"authorId": "4686536", "name": "E. Mishler"}]}, - {"paperId": "30a64bdf778b8f561af9ae589e822c2c800920b1", "externalIds": {"MAG": - "2782975919", "DOI": "10.1007/b138233", "CorpusId": 33352850}, "url": "https://www.semanticscholar.org/paper/30a64bdf778b8f561af9ae589e822c2c800920b1", - "title": "Universal Artificial Intelligence", "abstract": null, "venue": "Texts - in Theoretical Computer Science. An EATCS Series", "year": 2004, "referenceCount": - 22, "citationCount": 237, "influentialCitationCount": 27, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-10-12", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1406347404", - "name": "Dr. Marcus Hutter"}]}, {"paperId": "ee2ba85581b2310a638f346743383d89e57da353", + 67, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-06-05", "journal": {"name": "Electron. + Colloquium Comput. Complex.", "volume": "TR10"}, "authors": [{"authorId": + "1704344", "name": "M. Ajtai"}]}, {"paperId": "b75d31665efcb6e4e6d136e7d9ef5f4b5754b6f4", + "externalIds": {"MAG": "2951408860", "DBLP": "journals/mlq/HamkinsS01", "ArXiv": + "math/9907044", "DOI": "10.1002/1521-3870(200105)47:2%3C271::AID-MALQ271%3E3.0.CO;2-6", + "CorpusId": 14582921}, "corpusId": 14582921, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b75d31665efcb6e4e6d136e7d9ef5f4b5754b6f4", + "title": "Infinite Time Turing Machines With Only One Tape", "abstract": "Infinite + time Turing machines with only one tape are in many respects fully as powerful + as their multi-tape cousins. In particular, the two models of machine give + rise to the same class of decidable sets, the same degree structure and, at + least for partial functions f : \u211d \u2115, the same class of computable + functions. Nevertheless, there are infinite time computable functions f : + \u211d \u211d that are not one-tape computable, and so the two models of infinitary + computation are not equivalent. Surprisingly, the class of one-tape computable + functions is not closed under composition; but closing it under composition + yields the full class of all infinite time computable functions. Finally, + every ordinal that is clockable by an infinite time Turing machine is clockable + by a one-tape machine, except certain isolated ordinals that end gaps in the + clockable ordinals.", "venue": "Math. Log. Q.", "year": 1999, "referenceCount": + 3, "citationCount": 40, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/math/9907044", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1999-07-07", "journal": {"name": "Math. + Log. Q.", "pages": "271-287", "volume": "47"}, "authors": [{"authorId": "1755318", + "name": "J. Hamkins"}, {"authorId": "39604321", "name": "D. Seabold"}]}, {"paperId": + "a03986f4f3a8739d71b1d3269c1a2259fbaef89b", "externalIds": {"MAG": "1560502112", + "DBLP": "conf/uss/MotoyamaLKMVS10", "CorpusId": 11875247}, "corpusId": 11875247, + "publicationVenue": {"id": "54649c1d-6bcc-4232-9cd1-aa446867b8d0", "name": + "USENIX Security Symposium", "type": "conference", "alternate_names": ["USENIX + Secur Symp"], "url": "http://www.usenix.org/events/bytopic/security.html"}, + "url": "https://www.semanticscholar.org/paper/a03986f4f3a8739d71b1d3269c1a2259fbaef89b", + "title": "Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic + Context", "abstract": "Reverse Turing tests, or CAPTCHAs, have become an ubiquitous + defense used to protect open Web resources from being exploited at scale. + An effective CAPTCHA resists existing mechanistic software solving, yet can + be solved with high probability by a human being. In response, a robust solving + ecosystem has emerged, reselling both automated solving technology and realtime + human labor to bypass these protections. Thus, CAPTCHAs can increasingly be + understood and evaluated in purely economic terms; the market price of a solution + vs the monetizable value of the asset being protected. We examine the market-side + of this question in depth, analyzing the behavior and dynamics of CAPTCHA-solving + service providers, their price performance, and the underlying labor markets + driving this economy.", "venue": "USENIX Security Symposium", "year": 2010, + "referenceCount": 30, "citationCount": 234, "influentialCitationCount": 20, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-08-11", "journal": {"pages": + "435-462"}, "authors": [{"authorId": "1789564", "name": "Marti A. Motoyama"}, + {"authorId": "1763395", "name": "Kirill Levchenko"}, {"authorId": "3110399", + "name": "Chris Kanich"}, {"authorId": "144378428", "name": "Damon McCoy"}, + {"authorId": "1739245", "name": "G. Voelker"}, {"authorId": "1727599", "name": + "S. Savage"}]}, {"paperId": "11c23c68ccb8bd8853de62e639db8d1c769e41c2", "externalIds": + {"MAG": "2181980823", "CorpusId": 2583984}, "corpusId": 2583984, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/11c23c68ccb8bd8853de62e639db8d1c769e41c2", + "title": "Fourier-Laplace transform of a variation of polarized complex Hodge + structure", "abstract": "We show that the Fourier-Laplace transform of a regular + holonomic module over the Weyl algebra of one variable, which generically + underlies a variation of polarized Hodge structure, underlies itself an integrable + variation of polarized twistor struc- ture.", "venue": "", "year": 2008, "referenceCount": + 28, "citationCount": 44, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "65946315", "name": "W. Gruyter"}]}, + {"paperId": "5014eddf752d1454074fc8a449179521ba59c109", "externalIds": {"MAG": + "2093457643", "DOI": "10.1007/S11538-006-9066-Z", "CorpusId": 22603304, "PubMed": + "16794923"}, "corpusId": 22603304, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/5014eddf752d1454074fc8a449179521ba59c109", + "title": "Gene Expression Time Delays and Turing Pattern Formation Systems", + "abstract": null, "venue": "Bulletin of Mathematical Biology", "year": 2006, + "referenceCount": 35, "citationCount": 44, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-03-23", "journal": {"name": "Bulletin of Mathematical Biology", "pages": + "99-130", "volume": "68"}, "authors": [{"authorId": "2662569", "name": "E. + Gaffney"}, {"authorId": "38146134", "name": "N. Monk"}]}, {"paperId": "ee2ba85581b2310a638f346743383d89e57da353", "externalIds": {"MAG": "1968786175", "DOI": "10.1111/J.1365-2621.2000.TB16025.X", - "CorpusId": 94281049}, "url": "https://www.semanticscholar.org/paper/ee2ba85581b2310a638f346743383d89e57da353", + "CorpusId": 94281049}, "corpusId": 94281049, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ee2ba85581b2310a638f346743383d89e57da353", "title": "Plasticizing-Antiplasticizing Effects of Water on Physical Properties of Tapioca Starch Films in the Glassy State", "abstract": "The effects of moisture sorption on physical properties of native and cross-linked starch @@ -25250,51 +28700,203 @@ interactions: dif- ferent roles to water operating primarily via opposite entropic/free volume effects. Relationships, if any, between", "venue": "", "year": 2000, "referenceCount": 31, "citationCount": 220, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2000-04-01", "journal": {"name": "Journal of Food Science", "pages": "445-451", - "volume": "65"}, "authors": [{"authorId": "2107423495", "name": "Y. P. Chang"}, - {"authorId": "36852960", "name": "P. B. Cheah"}, {"authorId": "49773462", - "name": "C. C. Seow"}]}, {"paperId": "df45f088d1a4ac460e6001b3e834bf1d6fd6988f", - "externalIds": {"MAG": "2069518818", "DOI": "10.2307/1939265", "CorpusId": - 85210550}, "url": "https://www.semanticscholar.org/paper/df45f088d1a4ac460e6001b3e834bf1d6fd6988f", - "title": "ADULT RECRUITMENT IN CHORUS FROGS: EFFECTS OF SIZE AND DATE AT METAMORPHOSIS''", - "abstract": "A cohort of tadpoles of the chorus frog, Pseudacris triseriata, - on Isle Royale, Michigan, was marked to determine the effect of body size - and date at metamorphosis on survivorship to maturity. The cohort was classified - at metamorphosis into four categories based on size and date of metamorphosis: - large-early, small-early, large-late, and small- late. The number of frogs - in each category that returned to breed on the study area was monitored for - the following 2 yr. Long larval period and small body size at metamorphosis - influenced recruitment to the breeding population by delaying maturity. Frogs - that meta- morphosed at large size maintained their size advantage at maturity. - Large body size and early date at metamorphosis increased survivorship to - maturity by enhancing the chance that reproductive size was attained within - 1 yr of metamorphosis. Frogs that were recap- tured in the 2nd yr after metamorphosis, - when all frogs had attained mature size, were from all four categories in - the same proportions marked at metamorphosis, indicating that unless breeding - during the Ist yr led to higher mortality of large individuals, survival rate - after metamorphosis was not related to size or date at metamorphosis.", "venue": - "", "year": 1987, "referenceCount": 32, "citationCount": 805, "influentialCitationCount": - 44, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1987-04-01", "journal": {"name": "Ecology", "pages": "344-350", "volume": - "68"}, "authors": [{"authorId": "38561720", "name": "David C. Smith"}]}, {"paperId": - "da525dfee3d758cba876cd9485c4c0f12efd71a8", "externalIds": {"MAG": "2037357767", - "DOI": "10.1007/BF02858614", "CorpusId": 30654473}, "url": "https://www.semanticscholar.org/paper/da525dfee3d758cba876cd9485c4c0f12efd71a8", - "title": "Algae in relation to soil fertility", "abstract": null, "venue": - "The Botanical review", "year": 2008, "referenceCount": 114, "citationCount": - 81, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "The - Botanical Review", "pages": "92-128", "volume": "30"}, "authors": [{"authorId": - "32402318", "name": "L. M. Shields"}, {"authorId": "49239266", "name": "L. - Durrell"}]}, {"paperId": "5bb3f196bec209a2e07c9d43561c4c54efc2c45f", "externalIds": - {"DBLP": "journals/jsyml/Kechris91", "MAG": "2030582980", "DOI": "10.2307/2274913", - "CorpusId": 8875543}, "url": "https://www.semanticscholar.org/paper/5bb3f196bec209a2e07c9d43561c4c54efc2c45f", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-04-01", "journal": {"name": + "Journal of Food Science", "pages": "445-451", "volume": "65"}, "authors": + [{"authorId": "2107423495", "name": "Y. P. Chang"}, {"authorId": "36852960", + "name": "P. B. Cheah"}, {"authorId": "49773462", "name": "C. C. Seow"}]}, + {"paperId": "b6827ebba6dd5d83c25b34ca297a2035f6137817", "externalIds": {"MAG": + "2079615149", "DOI": "10.1103/PHYSREVE.70.066202", "CorpusId": 10155596, "PubMed": + "15697479"}, "corpusId": 10155596, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b6827ebba6dd5d83c25b34ca297a2035f6137817", + "title": "Morphological transitions and bistability in Turing systems.", "abstract": + "It is well known that in two dimensions Turing systems produce spots, stripes + and labyrinthine patterns, and in three dimensions lamellar and spherical + structures, or their combinations, are observed. In this paper we study transitions + between these states in both two and three dimensions. First, we derive the + regions of stability for different patterns using nonlinear bifurcation analysis. + Then, we apply large scale computer simulations to analyze the pattern selection + in a bistable system by studying the effect of parameter selection on morphological + clustering and the appearance of topological defects. The method elaborated + in this paper presents a probabilistic approach for studying pattern selection + in a bistable reaction-diffusion system.", "venue": "Physical review. E, Statistical, + nonlinear, and soft matter physics", "year": 2004, "referenceCount": 56, "citationCount": + 28, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2004-12-03", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 066202\n ", + "volume": "70 6 Pt 2"}, "authors": [{"authorId": "35202419", "name": "T. Lepp\u00e4nen"}, + {"authorId": "2155202", "name": "M. Karttunen"}, {"authorId": "37747895", + "name": "R. Barrio"}, {"authorId": "145670814", "name": "K. Kaski"}]}, {"paperId": + "0d6e83809db5c8071e153b62f7a916d1498a9f4c", "externalIds": {"MAG": "2057783419", + "DOI": "10.1103/PHYSREVE.85.021924", "CorpusId": 25754302, "PubMed": "22463261"}, + "corpusId": 25754302, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0d6e83809db5c8071e153b62f7a916d1498a9f4c", + "title": "Spatial dynamics in a predator-prey model with Beddington-DeAngelis + functional response.", "abstract": "In this paper spatial dynamics of the + Beddington-DeAngelis predator-prey model is investigated. We analyze the linear + stability and obtain the condition of Turing instability of this model. Moreover, + we deduce the amplitude equations and determine the stability of different + patterns. In Turing space, we found that this model has coexistence of H(0) + hexagon patterns and stripe patterns, H(\u03c0) hexagon patterns, and H(0) + hexagon patterns. To better describe the real ecosystem, we consider the ecosystem + as an open system and take the environmental noise into account. It is found + that noise can decrease the number of the patterns and make the patterns more + regular. What is more, noise can induce two kinds of typical pattern transitions. + One is from the H(\u03c0) hexagon patterns to the regular stripe patterns, + and the other is from the coexistence of H(0) hexagon patterns and stripe + patterns to the regular stripe patterns. The obtained results enrich the finding + in the Beddington-DeAngelis predator-prey model well.", "venue": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "year": 2012, + "referenceCount": 64, "citationCount": 96, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-02-28", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 021924\n ", "volume": + "85 2 Pt 1"}, "authors": [{"authorId": "2108192884", "name": "Xiao-Chong Zhang"}, + {"authorId": "47334108", "name": "Gui\u2010Quan Sun"}, {"authorId": "145752193", + "name": "Zhen Jin"}]}, {"paperId": "108dc6541dc31a27af7ee7e72ef8b757a87375ad", + "externalIds": {"MAG": "2111877228", "DOI": "10.1046/J.1365-2605.1998.00111.X", + "CorpusId": 5997559, "PubMed": "9749349"}, "corpusId": 5997559, "publicationVenue": + {"id": "f6126768-cdc9-45f7-b365-9ee5d08ad79a", "name": "International Journal + of Andrology", "type": "journal", "alternate_names": ["Int J Androl"], "issn": + "0105-6263", "alternate_issns": ["1365-2605"], "url": "http://www.interscience.wiley.com/jpages/0105-6263/", + "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1365-2605", + "https://onlinelibrary.wiley.com/journal/13652605"]}, "url": "https://www.semanticscholar.org/paper/108dc6541dc31a27af7ee7e72ef8b757a87375ad", + "title": "Transurethral resection of cystic and non-cystic ejaculatory duct + obstructions.", "abstract": "Ejaculatory duct obstructions are diagnosed in + approximately 5% of azoospermic men and can be treated by transurethral resection + (TURED) or incision of the ducts. Eight patients with azoospermia and ejaculatory + duct obstructions were treated by TURED after clinical examination, semen + analysis, biochemical analysis of seminal plasma, endocrine analysis, transrectal + ultrasonography and testicular biopsy. In 3/3 cases of cystic and in 3/5 cases + of non-cystic obstruction. TURED of the stenosis was possible. During a follow-up + of 12 months there was an increase in semen volume and sperm count in 3/3 + and 3/5 patients, respectively. No pregnancy was achieved during the period + up to 12 months. Clinical symptoms such as haemospermia and pain disappeared + in all cases. In our cases and another 98 cases of ejaculatory duct obstructions + documented in the literature, men of semen quality improved in 38-60% with + a pregnancy rate of men 22-31% after TURED. We conclude that there is a correlation + between the aetiology of ejaculatory duct obstructions and success rate of + TURED.", "venue": "International Journal of Andrology", "year": 1998, "referenceCount": + 19, "citationCount": 28, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1046/j.1365-2605.1998.00111.x", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1998-07-01", "journal": + {"name": "International journal of andrology", "pages": "\n 196-200\n ", + "volume": "21 4"}, "authors": [{"authorId": "4203829", "name": "G. Popken"}, + {"authorId": "5844179", "name": "U. Wetterauer"}, {"authorId": "1402159092", + "name": "W. Schultze-Seemann"}, {"authorId": "12042890", "name": "A. Deckart"}, + {"authorId": "2796084", "name": "H. Sommerkamp"}]}, {"paperId": "f9fdd42c493dd9b2931e94b0de3b583c0f43e6b2", + "externalIds": {"CorpusId": 2958708}, "corpusId": 2958708, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f9fdd42c493dd9b2931e94b0de3b583c0f43e6b2", + "title": "Tomography of Reaction-Diffusion Microemulsions Reveals Three-Dimensional + Turing Patterns", "abstract": null, "venue": "", "year": null, "referenceCount": + 0, "citationCount": 50, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "7747283", + "name": "M. Ichinohe"}, {"authorId": "2672486", "name": "A. Sekiguchi"}]}, + {"paperId": "65d87282bb9b0ed60bc9f0229d55146adba14e84", "externalIds": {"ArXiv": + "1302.1170", "MAG": "2963253516", "DBLP": "conf/stacs/Jeandel14", "DOI": "10.4230/LIPIcs.STACS.2014.421", + "CorpusId": 161781}, "corpusId": 161781, "publicationVenue": {"id": "2e8ac273-26de-40d6-9f96-09286b1016f1", + "name": "Symposium on Theoretical Aspects of Computer Science", "type": "conference", + "alternate_names": ["STACS", "Symp Theor Asp Comput Sci"], "url": "http://www.stacs-conf.org/"}, + "url": "https://www.semanticscholar.org/paper/65d87282bb9b0ed60bc9f0229d55146adba14e84", + "title": "Computability of the entropy of one-tape Turing machines", "abstract": + "We prove that the maximum speed and the entropy of a one-tape Turing machine + are computable, in the sense that we can approximate them to any given precision + $\\epsilon$. This is contrary to popular belief, as all dynamical properties + are usually undecidable for Turing machines. The result is quite specific + to one-tape Turing machines, as it is not true anymore for two-tape Turing + machines by the results of Blondel et al., and uses the approach of crossing + sequences introduced by Hennie.", "venue": "Symposium on Theoretical Aspects + of Computer Science", "year": 2013, "referenceCount": 23, "citationCount": + 18, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-02-05", + "journal": {"pages": "421-432"}, "authors": [{"authorId": "2332997", "name": + "E. Jeandel"}]}, {"paperId": "d5e48f0d6dfaf46fc38b31291b3977009b01e634", "externalIds": + {"MAG": "2171407179", "DOI": "10.1214/10-EJS584", "CorpusId": 16562221}, "corpusId": + 16562221, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d5e48f0d6dfaf46fc38b31291b3977009b01e634", + "title": "Adaptive Bayesian density estimation with location-scale mixtures", + "abstract": "We study convergence rates of Bayesian density estimators based + on finite location-scale mixtures of exponential power distributions. We construct + approximations of \ufffd-Holder densities be continuous mix- tures of exponential + power distributions, leading to approximations of the \ufffd-Holder densities + by finite mixtures. These results are then used to derive posterior concentration + rates, with priors based on these mixture models. The rates are minimax (up + to a logn term) and since the priors are inde- pendent of the smoothness the + rates are adaptive to the smoothness.", "venue": "", "year": 2010, "referenceCount": + 38, "citationCount": 120, "influentialCitationCount": 23, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Electronic + Journal of Statistics", "pages": "1225-1257", "volume": "4"}, "authors": [{"authorId": + "6612680", "name": "W. Kruijer"}, {"authorId": "144915371", "name": "J. Rousseau"}, + {"authorId": "2508221", "name": "A. V. D. Vaart"}]}, {"paperId": "3d108bb39968a2f121b00e4b9984e4db1b9ed9f7", + "externalIds": {"MAG": "2058465502", "DOI": "10.1021/JZ100238U", "CorpusId": + 12073494}, "corpusId": 12073494, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d108bb39968a2f121b00e4b9984e4db1b9ed9f7", + "title": "Synchronization of Chemical Micro-oscillators", "abstract": "Many + phenomena of biological, physical, and chemical importance involve synchronization + of oscillatory elements. We explore here, in several geometries, the behavior + of diffusively coupled, nanoliter volume, aqueous drops separated by oil gaps + and containing the reactants of the oscillatory Belousov- Zhabotinsky (BZ) + reaction. Avariety of synchronous regimes are found, including in- and antiphase + oscillations, stationary Turing patterns, and more complex combinations of + stationary and oscillatory BZ drops, including three-phase pat- terns. A model + consisting of ordinary differential equations based on a simplified description + of the BZ chemistry and diffusion of messenger (primarily inhibitory) species + qualitatively reproduces most of the experimental results. SECTION Kinetics, + Spectroscopy", "venue": "", "year": 2010, "referenceCount": 36, "citationCount": + 117, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2010-03-26", "journal": {"name": + "Journal of Physical Chemistry Letters", "pages": "1241-1246", "volume": "1"}, + "authors": [{"authorId": "48343272", "name": "Masahiro Toiya"}, {"authorId": + "118337083", "name": "Hector O. Gonz"}, {"authorId": "2258489", "name": "V. + Vanag"}, {"authorId": "2775719", "name": "S. Fraden"}, {"authorId": "144854275", + "name": "I. Epstein"}]}, {"paperId": "e27777fb4e2f6ef91a2352a97f0148cbfcca4b83", + "externalIds": {"ArXiv": "cs/0512100", "DBLP": "journals/jsyml/Japaridze07", + "MAG": "2126691354", "DOI": "10.2178/jsl/1174668394", "CorpusId": 8604718}, + "corpusId": 8604718, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/e27777fb4e2f6ef91a2352a97f0148cbfcca4b83", + "title": "The logic of interactive turing reduction", "abstract": "Abstract + The paper gives a soundness and completeness proof for the implicative fragment + of intuitionistic calculus with respect to the semantics of computability + logic, which understands intuitionistic implication as interactive algorithmic + reduction. This concept \u2014 more precisely, the associated concept of reducibility + \u2014 is a generalization of Turing reducibility from the traditional, input/output + sorts of problems to computational tasks of arbitrary degrees of interactivity.", + "venue": "Journal of Symbolic Logic (JSL)", "year": 2005, "referenceCount": + 28, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/cs/0512100", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-12-27", "journal": + {"name": "Journal of Symbolic Logic", "pages": "243 - 276", "volume": "72"}, + "authors": [{"authorId": "6810356", "name": "G. Japaridze"}]}, {"paperId": + "5bb3f196bec209a2e07c9d43561c4c54efc2c45f", "externalIds": {"MAG": "2030582980", + "DBLP": "journals/jsyml/Kechris91", "DOI": "10.2307/2274913", "CorpusId": + 8875543}, "corpusId": 8875543, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/5bb3f196bec209a2e07c9d43561c4c54efc2c45f", "title": "Amenable equivalence relations and Turing degrees", "abstract": "In [12] Slaman and Steel posed the following problem: Assume ZF + DC + AD. Suppose we have a function assigning to each Turing degree d a linear order @@ -25305,16 +28907,43 @@ interactions: \u03b6 was left open. We use here, ideas and methods associated with the concept of amenability (of groups, actions, equivalence relations, etc.) to prove some general results from which one can obtain a positive answer to the above - problem.", "venue": "Journal of Symbolic Logic", "year": 1991, "referenceCount": - 15, "citationCount": 26, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1991-03-01", "journal": {"name": "Journal - of Symbolic Logic", "pages": "182 - 194", "volume": "56"}, "authors": [{"authorId": - "8639665", "name": "A. Kechris"}]}, {"paperId": "5221b4e5e1797796ecb911e28b9c718787ae5c92", + problem.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1991, "referenceCount": + 14, "citationCount": 26, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://authors.library.caltech.edu/38618/1/2274913.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1991-03-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "182 + - 194", "volume": "56"}, "authors": [{"authorId": "8639665", "name": "A. Kechris"}]}, + {"paperId": "59397f23838be0d3355d3a89b6f0ff6362600b7d", "externalIds": {"DBLP": + "conf/nime/HiragaBHK04", "MAG": "1538016033", "DOI": "10.5072/ZENODO.205317", + "CorpusId": 17942617}, "corpusId": 17942617, "publicationVenue": {"id": "a79ec758-3d84-4a42-91e6-114997b26f0a", + "name": "New Interfaces for Musical Expression", "type": "conference", "alternate_names": + ["New Interface Music Expr", "NIME"], "url": "http://www.nime.org/"}, "url": + "https://www.semanticscholar.org/paper/59397f23838be0d3355d3a89b6f0ff6362600b7d", + "title": "Rencon 2004: Turing Test for Musical Expression", "abstract": "Rencon + is an annual international event that started in 2002. It has roles of (1) + pursuing evaluation methods for systems whose output includes subjective issues, + and (2) providing a forum for researches of several fields related to musical + expression. In the past. Rencon was held as a workshop associated with a musical + contest that provided a forum for presenting and discussing the latest research + in automatic performance rendering. This year we introduce new evaluation + methods of performance expression to Rencon: a Turing Test and a Gnirut Test, + which is a reverse Turing Test, for performance expression. We have opened + a section of the contests to any instruments and genre of music, including + synthesized human voices.", "venue": "New Interfaces for Musical Expression", + "year": 2004, "referenceCount": 25, "citationCount": 26, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2004-06-01", "journal": {"pages": + "120-123"}, "authors": [{"authorId": "2761516", "name": "R. Hiraga"}, {"authorId": + "2535114", "name": "R. Bresin"}, {"authorId": "49293253", "name": "K. Hirata"}, + {"authorId": "2279056", "name": "H. Katayose"}]}, {"paperId": "5221b4e5e1797796ecb911e28b9c718787ae5c92", "externalIds": {"DBLP": "journals/neco/Orponen96", "MAG": "2120797099", "DOI": - "10.1162/neco.1996.8.2.403", "CorpusId": 18342217}, "url": "https://www.semanticscholar.org/paper/5221b4e5e1797796ecb911e28b9c718787ae5c92", + "10.1162/neco.1996.8.2.403", "CorpusId": 18342217}, "corpusId": 18342217, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5221b4e5e1797796ecb911e28b9c718787ae5c92", "title": "The Computational Power of Discrete Hopfield Nets with Hidden Units", "abstract": "We prove that polynomial size discrete Hopfield networks with hidden units compute exactly the class of Boolean functions PSPACE/poly, i.e., @@ -25324,197 +28953,80 @@ interactions: the class of functions P/poly, i.e., the class computed by polynomial time-bounded nonuniform Turing machines.", "venue": "Neural Computation", "year": 1996, "referenceCount": 41, "citationCount": 30, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "isOpenAccess": true, "openAccessPdf": {"url": "https://helda.helsinki.fi/bitstream/10138/243062/1/1996_The_computational_power_A1_AM.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1996-02-01", "journal": {"name": "Neural Computation", "pages": "403-415", "volume": "8"}, "authors": [{"authorId": "2557668", "name": "P. Orponen"}]}, - {"paperId": "b9ef7734184bdd6ea4ca574d1b0976fc9252e3e3", "externalIds": {"MAG": - "2941010932", "DOI": "10.4007/ANNALS.2021.193.2.4", "CorpusId": 109934776}, - "url": "https://www.semanticscholar.org/paper/b9ef7734184bdd6ea4ca574d1b0976fc9252e3e3", - "title": "Integer multiplication in time O(n log n)", "abstract": "We present - an algorithm that computes the product of two n-bit integers in O(n log n) - bit operations, thus confirming a conjecture of Schonhage and Strassen from - 1971. Our complexity analysis takes place in the multitape Turing machine - model, with integers encoded in the usual binary representa- tion. Central - to the new algorithm is a novel \u201cGaussian resampling\u201d technique - that enables us to reduce the integer multiplication problem to a collection - of multidimensional discrete Fourier transforms over the complex numbers, - whose dimensions are all powers of two. These transforms may then be evaluated - rapidly by means of Nussbaumer\u2019s fast polynomial transforms.", "venue": - "Annals of Mathematics", "year": 2021, "referenceCount": 35, "citationCount": - 117, "influentialCitationCount": 7, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Annals of Mathematics"}, "authors": [{"authorId": - "144143525", "name": "David Harvey"}, {"authorId": "145086461", "name": "J. - Hoeven"}]}, {"paperId": "4656f1fad8dff5e2bac13f4076cfc0d4a61ce7ff", "externalIds": - {"MAG": "2167784134", "DOI": "10.1007/S00605-002-0545-5", "CorpusId": 123839887}, - "url": "https://www.semanticscholar.org/paper/4656f1fad8dff5e2bac13f4076cfc0d4a61ce7ff", - "title": "P\u2260NP for Infinite Time Turing Machines", "abstract": null, - "venue": "", "year": 2003, "referenceCount": 4, "citationCount": 25, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-08-01", - "journal": {"name": "Monatshefte f\u00fcr Mathematik", "pages": "335-340", - "volume": "139"}, "authors": [{"authorId": "144459126", "name": "R. Schindler"}]}, - {"paperId": "e27777fb4e2f6ef91a2352a97f0148cbfcca4b83", "externalIds": {"ArXiv": - "cs/0512100", "DBLP": "journals/jsyml/Japaridze07", "MAG": "2126691354", "DOI": - "10.2178/jsl/1174668394", "CorpusId": 8604718}, "url": "https://www.semanticscholar.org/paper/e27777fb4e2f6ef91a2352a97f0148cbfcca4b83", - "title": "The logic of interactive turing reduction", "abstract": "Abstract - The paper gives a soundness and completeness proof for the implicative fragment - of intuitionistic calculus with respect to the semantics of computability - logic, which understands intuitionistic implication as interactive algorithmic - reduction. This concept \u2014 more precisely, the associated concept of reducibility - \u2014 is a generalization of Turing reducibility from the traditional, input/output - sorts of problems to computational tasks of arbitrary degrees of interactivity.", - "venue": "Journal of Symbolic Logic (JSL)", "year": 2005, "referenceCount": - 28, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2005-12-27", "journal": - {"name": "Journal of Symbolic Logic", "pages": "243 - 276", "volume": "72"}, - "authors": [{"authorId": "6810356", "name": "G. Japaridze"}]}, {"paperId": - "fcc8c7f193e8b5d71bfe285554fda8948442c189", "externalIds": {"DBLP": "journals/fuin/PaunP06a", - "MAG": "1916645911", "CorpusId": 9670232}, "url": "https://www.semanticscholar.org/paper/fcc8c7f193e8b5d71bfe285554fda8948442c189", - "title": "Membrane Computing and Economics: Numerical P Systems", "abstract": - "With inspiration from the economic reality, where numbers are basic entities - to work with, we propose a genuinely new kind of P systems, where numerical - variables evolve, starting from initial values, by means of production functions - and repartition protocols. We prove that non-deterministic systems of this - type, using polynomial production functions, characterize the Turing computable - sets of natural numbers, while deterministic systems, with polynomial production - functions having non-negative coefficients, compute strictly more than semilinear - sets of natural numbers. A series of research topics to be addressed in this - framework are mentioned.", "venue": "Fundamenta Informaticae", "year": 2006, - "referenceCount": 19, "citationCount": 116, "influentialCitationCount": 8, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-04-01", "journal": {"name": "Fundam. Informaticae", - "pages": "213-227", "volume": "73"}, "authors": [{"authorId": "1698119", "name": - "G. Paun"}, {"authorId": "48823662", "name": "Radu A. Paun"}]}, {"paperId": - "65d87282bb9b0ed60bc9f0229d55146adba14e84", "externalIds": {"ArXiv": "1302.1170", - "MAG": "2963253516", "DBLP": "conf/stacs/Jeandel14", "DOI": "10.4230/LIPIcs.STACS.2014.421", - "CorpusId": 161781}, "url": "https://www.semanticscholar.org/paper/65d87282bb9b0ed60bc9f0229d55146adba14e84", - "title": "Computability of the entropy of one-tape Turing machines", "abstract": - "We prove that the maximum speed and the entropy of a one-tape Turing machine - are computable, in the sense that we can approximate them to any given precision - $\\epsilon$. This is contrary to popular belief, as all dynamical properties - are usually undecidable for Turing machines. The result is quite specific - to one-tape Turing machines, as it is not true anymore for two-tape Turing - machines by the results of Blondel et al., and uses the approach of crossing - sequences introduced by Hennie.", "venue": "Symposium on Theoretical Aspects - of Computer Science", "year": 2013, "referenceCount": 23, "citationCount": - 18, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2013-02-05", "journal": - {"pages": "421-432"}, "authors": [{"authorId": "2332997", "name": "E. Jeandel"}]}, - {"paperId": "b75d31665efcb6e4e6d136e7d9ef5f4b5754b6f4", "externalIds": {"MAG": - "2951408860", "DBLP": "journals/mlq/HamkinsS01", "ArXiv": "math/9907044", - "DOI": "10.1002/1521-3870(200105)47:2%3C271::AID-MALQ271%3E3.0.CO;2-6", "CorpusId": - 14582921}, "url": "https://www.semanticscholar.org/paper/b75d31665efcb6e4e6d136e7d9ef5f4b5754b6f4", - "title": "Infinite Time Turing Machines With Only One Tape", "abstract": "Infinite - time Turing machines with only one tape are in many respects fully as powerful - as their multi-tape cousins. In particular, the two models of machine give - rise to the same class of decidable sets, the same degree structure and, at - least for partial functions f : \u211d \u2115, the same class of computable - functions. Nevertheless, there are infinite time computable functions f : - \u211d \u211d that are not one-tape computable, and so the two models of infinitary - computation are not equivalent. Surprisingly, the class of one-tape computable - functions is not closed under composition; but closing it under composition - yields the full class of all infinite time computable functions. Finally, - every ordinal that is clockable by an infinite time Turing machine is clockable - by a one-tape machine, except certain isolated ordinals that end gaps in the - clockable ordinals.", "venue": "Math. Log. Q.", "year": 1999, "referenceCount": - 3, "citationCount": 40, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1999-07-07", "journal": {"name": "Math. - Log. Q.", "pages": "271-287", "volume": "47"}, "authors": [{"authorId": "1755318", - "name": "J. Hamkins"}, {"authorId": "39604321", "name": "D. Seabold"}]}, {"paperId": - "b652ef03b980e770fb9dcba12e406af253328925", "externalIds": {"DBLP": "journals/corr/abs-0906-3248", - "MAG": "2949348026", "ArXiv": "0906.3248", "DOI": "10.4204/EPTCS.1.4", "CorpusId": - 10266058}, "url": "https://www.semanticscholar.org/paper/b652ef03b980e770fb9dcba12e406af253328925", - "title": "A Concrete View of Rule 110 Computation", "abstract": "Rule 110 - is a cellular automaton that performs repeated simultaneous updates of an - infinite row of binary values. The values are updated in the following way: - 0s are changed to 1s at all positions where the value to the right is a 1, - while 1s are changed to 0s at all positions where the values to the left and - right are both 1. Though trivial to define, the behavior exhibited by Rule - 110 is surprisingly intricate, and in (Cook, 2004) we showed that it is capable - of emulating the activity of a Turing machine by encoding the Turing machine - and its tape into a repeating left pattern, a central pattern, and a repeating - right pattern, which Rule 110 then acts on. In this paper we provide an explicit - compiler for converting a Turing machine into a Rule 110 initial state, and - we present a general approach for proving that such constructions will work - as intended. The simulation was originally assumed to require exponential - time, but surprising results of Neary and Woods (2006) have shown that in - fact, only polynomial time is required. We use the methods of Neary and Woods - to exhibit a direct simulation of a Turing machine by a tag system in polynomial - time.", "venue": "CSP", "year": 2009, "referenceCount": 12, "citationCount": - 34, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-06-17", "journal": {"pages": - "31-55"}, "authors": [{"authorId": "2057342974", "name": "Matthew Cook"}]}, - {"paperId": "e291fcf58e97fd0f0322862aa5ab5d176b9fa9a4", "externalIds": {"MAG": - "2050616527", "DOI": "10.1080/0740770X.2014.973754", "CorpusId": 194086675}, - "url": "https://www.semanticscholar.org/paper/e291fcf58e97fd0f0322862aa5ab5d176b9fa9a4", - "title": "Testo junkie: sex, drugs, and biopolitics in the pharmacopornographic - era", "abstract": "After being arrested in 1952 for public indecency and sexual - perversion, Alan Turing was sentenced to estrogen injections that the Hollywood - film Imitation Game (Tyldum 2014) portrays as destroying his manhood as well - as his mind. Homosexuality was coincident with Turing\u2019s greatness, The - Imitation Game insists, but endogenous hormones were intrinsic to his brilliance.1 - Yet the film also offers a glimpse into the larger political machinery in - which Turing operated, a system that new queer studies scholarship on biopower - helps illuminate. This broader frame renders Turing a figure unwittingly located - at the nexus of three major vectors of Foucauldian biopower: the emergence - of the homosexual as a medicaljuridical subject, the administration of the - population through the calculation of risk, and", "venue": "", "year": 2014, - "referenceCount": 12, "citationCount": 24, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-09-02", - "journal": {"name": "Women & Performance: a journal of feminist theory", "pages": - "247 - 249", "volume": "24"}, "authors": [{"authorId": "1410260778", "name": - "julian gill-peterson"}]}, {"paperId": "dc4b752cbf7d55838d6a9cd9b07a00462b2d9348", - "externalIds": {"MAG": "2108509888", "DOI": "10.1007/S11538-006-9106-8", "CorpusId": - 16453074, "PubMed": "16832735"}, "url": "https://www.semanticscholar.org/paper/dc4b752cbf7d55838d6a9cd9b07a00462b2d9348", - "title": "Mode Transitions in a Model Reaction\u2013Diffusion System Driven - by Domain Growth and Noise", "abstract": null, "venue": "Bulletin of Mathematical - Biology", "year": 2006, "referenceCount": 20, "citationCount": 51, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-06-06", "journal": - {"name": "Bulletin of Mathematical Biology", "pages": "981-995", "volume": - "68"}, "authors": [{"authorId": "48768399", "name": "Iain Barrass"}, {"authorId": - "2434078", "name": "E. Crampin"}, {"authorId": "2339973", "name": "P. Maini"}]}, - {"paperId": "7c89ef19e7e99d471c7ecaa848a1fca564a07146", "externalIds": {"DBLP": - "journals/corr/abs-1108-1012", "MAG": "2953034995", "ArXiv": "1108.1012", - "DOI": "10.1016/j.tcs.2012.08.027", "CorpusId": 1113147}, "url": "https://www.semanticscholar.org/paper/7c89ef19e7e99d471c7ecaa848a1fca564a07146", - "title": "Turing degrees of multidimensional SFTs", "abstract": null, "venue": - "Theoretical Computer Science", "year": 2011, "referenceCount": 31, "citationCount": - 25, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-08-04", "journal": {"name": "Theor. - Comput. Sci.", "pages": "81-92", "volume": "505"}, "authors": [{"authorId": - "2332997", "name": "E. Jeandel"}, {"authorId": "2135628", "name": "Pascal - Vanier"}]}, {"paperId": "f81213f9f7784b262b59cd46abca35b40e1d6f29", "externalIds": - {"PubMedCentral": "3266880", "MAG": "2047941445", "DBLP": "journals/ploscb/HsiaHHAM12", + {"paperId": "2a642923b70a56b3dde33ab8be233eea13b61530", "externalIds": {"MAG": + "1594477603", "DOI": "10.20955/R.66.18-25.GFF", "CorpusId": 17612199}, "corpusId": + 17612199, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2a642923b70a56b3dde33ab8be233eea13b61530", + "title": "Money, debt and economic activity", "abstract": "HE Federal Open + Market Committee (FOMCI decided in October 1982 that, at least for the immediate + fttture, less importance would be attached to movements in the narm-owly defined + monetary aggn-egate (Ml) in establishing monetary policy. \u2018l\u2019his + depan-ture from previous policy was motivated primat-ily by incr-easing expectations + that the intr-oduction of SuperNOW accounts would distot-t Ml\u2019s usefi.rlness + as a reliable policy guide.", "venue": "", "year": 1984, "referenceCount": + 23, "citationCount": 76, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://files.stlouisfed.org/research/publications/review/84/06/Money_Debt_Jun_Jul1984.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": + "Economics", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Canadian + Parliamentary Review", "pages": "18-25", "volume": "66"}, "authors": [{"authorId": + "103101909", "name": "R. Hafer"}]}, {"paperId": "4002326149b7dab8f1f8ded4cdabf4730590dcff", + "externalIds": {"MAG": "2499779297", "DOI": "10.1142/9789814374309_0009", + "CorpusId": 64092132}, "corpusId": 64092132, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4002326149b7dab8f1f8ded4cdabf4730590dcff", + "title": "What is Computation? Actor Model versus Turing''s Model", "abstract": + null, "venue": "", "year": 2012, "referenceCount": 14, "citationCount": 48, + "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "2012-12-01", "journal": {"name": "", "pages": "159-185", "volume": ""}, "authors": + [{"authorId": "34661920", "name": "C. Hewitt"}]}, {"paperId": "6d8ecbc28617b9231f156fc6b1475f92bc9a937b", + "externalIds": {"DBLP": "conf/fossacs/Jacobs11", "MAG": "2109998602", "DOI": + "10.1007/978-3-642-19805-2_2", "CorpusId": 17157145}, "corpusId": 17157145, + "publicationVenue": {"id": "e95f057c-b69a-4fed-b6cf-64d35d3d54d9", "name": + "Foundations of Software Science and Computation Structure", "type": "conference", + "alternate_names": ["Found Softw Sci Comput Struct", "FoSSaCS"], "url": "http://www.wikicfp.com/cfp/program?id=1079"}, + "url": "https://www.semanticscholar.org/paper/6d8ecbc28617b9231f156fc6b1475f92bc9a937b", + "title": "Coalgebraic Walks, in Quantum and Turing Computation", "abstract": + null, "venue": "Foundations of Software Science and Computation Structure", + "year": 2011, "referenceCount": 17, "citationCount": 26, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/978-3-642-19805-2_2.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2011-03-26", "journal": {"pages": "12-26"}, "authors": + [{"authorId": "145511756", "name": "B. Jacobs"}]}, {"paperId": "3b8930a2cab58aedd6cc71e97441a956d8d2f20e", + "externalIds": {"MAG": "2139194456", "DOI": "10.3390/50100051", "CorpusId": + 18427972}, "corpusId": 18427972, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3b8930a2cab58aedd6cc71e97441a956d8d2f20e", + "title": "A Short Review on Cardiotonic Steroids and Their Aminoguanidine + Analogues", "abstract": "Concepcion P. Melero*, Manuel Medarde and Arturo + San FelicianoDepartamento de Quimica Farmaceutica, Facultad de Farmacia, Campus + Miguel de Unamuno, 37007Salamanca, SpainTel.: +34 923 29 45 28, Fax: +34 923 + 29 45 15, E-mail: medarde@gugu.usal.es*Author to whom correspondence should + be addressed.Received: 14 November 1999 / Accepted: 9 December 1999 / Published: + 21 January 2000Abstract: A short review on cardiotonic steroids and their + analogues is presented. The natu-ral, semisynthetic and synthetic derivatives, + as well as their mechanism of action and struc-ture-activity relationships + are shown, with a special reference to aminoguanidine deriva-tives.Keywords: + Digitalis glycosides analogues, structure-activity relationships, inotropic + activ-ity, Na+,K+-ATPase, aminoguanidine analogues.", "venue": "", "year": + 2000, "referenceCount": 179, "citationCount": 121, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.mdpi.com/1420-3049/5/1/51/pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2000-01-21", "journal": + {"name": "Molecules", "pages": "51-81", "volume": "5"}, "authors": [{"authorId": + "33510680", "name": "C. P. Melero"}, {"authorId": "3235568", "name": "M. Medarde"}, + {"authorId": "114381668", "name": "A. S. Feliciano"}]}, {"paperId": "f81213f9f7784b262b59cd46abca35b40e1d6f29", + "externalIds": {"PubMedCentral": "3266880", "MAG": "2047941445", "DBLP": "journals/ploscb/HsiaHHAM12", "DOI": "10.1371/journal.pcbi.1002331", "CorpusId": 8619685, "PubMed": "22291582"}, - "url": "https://www.semanticscholar.org/paper/f81213f9f7784b262b59cd46abca35b40e1d6f29", + "corpusId": 8619685, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f81213f9f7784b262b59cd46abca35b40e1d6f29", "title": "A Feedback Quenched Oscillator Produces Turing Patterning with One Diffuser", "abstract": "Efforts to engineer synthetic gene networks that spontaneously produce patterning in multicellular ensembles have focused on Turing''s original @@ -25534,54 +29046,54 @@ interactions: formation in natural multicellular systems can arise from oscillator-driven mechanisms.", "venue": "PLoS Comput. Biol.", "year": 2012, "referenceCount": 38, "citationCount": 40, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://journals.plos.org/ploscompbiol/article/file?id=10.1371/journal.pcbi.1002331&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-01", "journal": {"name": "PLoS Computational Biology", "volume": "8"}, "authors": [{"authorId": "2219032", "name": "Justin Hsia"}, {"authorId": "144134165", "name": "W. J. Holtz"}, {"authorId": "2110406470", "name": "Daniel C. Huang"}, {"authorId": "1696236", "name": "M. Arcak"}, {"authorId": "2163243", "name": "M. Maharbiz"}]}, - {"paperId": "89d6d6ae09c044c3cca6bdc8857d4802b5d736c4", "externalIds": {"MAG": - "2150583267", "DBLP": "journals/jsyml/Miller09", "DOI": "10.2178/jsl/1254748694", - "CorpusId": 5743788}, "url": "https://www.semanticscholar.org/paper/89d6d6ae09c044c3cca6bdc8857d4802b5d736c4", - "title": "d-computable categoricity for algebraic fields", "abstract": "Abstract - We use the Low Basis Theorem of Jockusch and Soare to show that all computable - algebraic fields are d-computably categorical for a particular Turing degree - d with d\u2032 = 0\u2033, but that not all such fields are 0\u2032-computably - categorical. We also prove related results about algebraic fields with splitting - algorithms, and fields of finite transcendence degree over \u211a.", "venue": - "Journal of Symbolic Logic (JSL)", "year": 2009, "referenceCount": 42, "citationCount": - 59, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-12-01", "journal": {"name": "The Journal of Symbolic - Logic", "pages": "1325 - 1351", "volume": "74"}, "authors": [{"authorId": - "2110456077", "name": "Russell G. Miller"}]}, {"paperId": "7f13f90795e6ba8d50bb5d6e1e5527de9b08e834", - "externalIds": {"MAG": "2085656217", "DBLP": "journals/entcs/BusiGZ97", "DOI": - "10.1016/S1571-0661(05)80467-0", "CorpusId": 25712935}, "url": "https://www.semanticscholar.org/paper/7f13f90795e6ba8d50bb5d6e1e5527de9b08e834", - "title": "On the Turing equivalence of Linda coordination primitives", "abstract": - null, "venue": "International Workshop on Expressiveness in Concurrency", - "year": 1999, "referenceCount": 14, "citationCount": 49, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1999-12-06", "journal": {"pages": "75"}, "authors": [{"authorId": - "1789091", "name": "N. Busi"}, {"authorId": "1743074", "name": "R. Gorrieri"}, - {"authorId": "1777352", "name": "G. Zavattaro"}]}, {"paperId": "4002326149b7dab8f1f8ded4cdabf4730590dcff", - "externalIds": {"MAG": "2499779297", "DOI": "10.1142/9789814374309_0009", - "CorpusId": 64092132}, "url": "https://www.semanticscholar.org/paper/4002326149b7dab8f1f8ded4cdabf4730590dcff", - "title": "What is Computation? Actor Model versus Turing''s Model", "abstract": - null, "venue": "", "year": 2012, "referenceCount": 14, "citationCount": 47, - "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "2012-12-01", "journal": - {"name": "", "pages": "159-185", "volume": ""}, "authors": [{"authorId": "34661920", - "name": "C. Hewitt"}]}, {"paperId": "d995685462d21381ccb9d4b8059c38a94d78ae1e", - "externalIds": {"DBLP": "journals/tocl/AspertiR02", "MAG": "2133538984", "DOI": - "10.1145/504077.504081", "CorpusId": 628072}, "url": "https://www.semanticscholar.org/paper/d995685462d21381ccb9d4b8059c38a94d78ae1e", + {"paperId": "fcc8c7f193e8b5d71bfe285554fda8948442c189", "externalIds": {"DBLP": + "journals/fuin/PaunP06a", "MAG": "1916645911", "CorpusId": 9670232}, "corpusId": + 9670232, "publicationVenue": {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", + "name": "Fundamenta Informaticae", "type": "journal", "alternate_names": ["Fundam + Informaticae"], "issn": "0169-2968", "url": "http://content.iospress.com/journals/fundamenta-informaticae", + "alternate_urls": ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, + "url": "https://www.semanticscholar.org/paper/fcc8c7f193e8b5d71bfe285554fda8948442c189", + "title": "Membrane Computing and Economics: Numerical P Systems", "abstract": + "With inspiration from the economic reality, where numbers are basic entities + to work with, we propose a genuinely new kind of P systems, where numerical + variables evolve, starting from initial values, by means of production functions + and repartition protocols. We prove that non-deterministic systems of this + type, using polynomial production functions, characterize the Turing computable + sets of natural numbers, while deterministic systems, with polynomial production + functions having non-negative coefficients, compute strictly more than semilinear + sets of natural numbers. A series of research topics to be addressed in this + framework are mentioned.", "venue": "Fundamenta Informaticae", "year": 2006, + "referenceCount": 19, "citationCount": 116, "influentialCitationCount": 8, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2006-04-01", "journal": + {"name": "Fundam. Informaticae", "pages": "213-227", "volume": "73"}, "authors": + [{"authorId": "1698119", "name": "G. Paun"}, {"authorId": "48823662", "name": + "Radu A. Paun"}]}, {"paperId": "a13af5f29bc745bd08a8f87e05545c20954bb0c2", + "externalIds": {"MAG": "1979172959", "DOI": "10.1111/J.1469-8137.1953.TB05203.X", + "CorpusId": 84106352}, "corpusId": 84106352, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a13af5f29bc745bd08a8f87e05545c20954bb0c2", + "title": "A COMMENTARY ON TURING''S DIFFUSION\u2010REACTION THEORY OF MORPHOGENESIS", + "abstract": null, "venue": "", "year": 1953, "referenceCount": 4, "citationCount": + 47, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://nph.onlinelibrary.wiley.com/doi/pdfdirect/10.1111/j.1469-8137.1953.tb05203.x", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}], "publicationTypes": null, "publicationDate": + "1953-02-01", "journal": {"name": "New Phytologist", "pages": "40-47", "volume": + "52"}, "authors": [{"authorId": "40705436", "name": "C. Wardlaw"}]}, {"paperId": + "d995685462d21381ccb9d4b8059c38a94d78ae1e", "externalIds": {"DBLP": "journals/tocl/AspertiR02", + "MAG": "2133538984", "DOI": "10.1145/504077.504081", "CorpusId": 628072}, + "corpusId": 628072, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d995685462d21381ccb9d4b8059c38a94d78ae1e", "title": "Intuitionistic Light Affine Logic", "abstract": "This article is a structured introduction to Intuitionistic Light Affine Logic (ILAL). ILAL has a polynomially costing normalization, and it is expressive enough to encode, @@ -25593,15 +29105,51 @@ interactions: power of ILAL is demonstrated in full detail. Such a proof gives a hint of the nontrivial task of programming with resource limitations, using ILAL derivations as programs.", "venue": "TOCL", "year": 2002, "referenceCount": 18, "citationCount": - 111, "influentialCitationCount": 17, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + 111, "influentialCitationCount": 17, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "ACM Trans. Comput. Log.", "pages": "137-175", "volume": + "3"}, "authors": [{"authorId": "1795634", "name": "A. Asperti"}, {"authorId": + "3179527", "name": "Luca Roversi"}]}, {"paperId": "d395856b635e679b321a487ec8e523956901e444", + "externalIds": {"MAG": "2040802713", "DOI": "10.1007/S11071-014-1516-9", "CorpusId": + 121488231}, "corpusId": 121488231, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d395856b635e679b321a487ec8e523956901e444", + "title": "Turing instability in a gene network with cross-diffusion", "abstract": + null, "venue": "", "year": 2014, "referenceCount": 39, "citationCount": 18, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "ACM Trans. Comput. Log.", "pages": "137-175", "volume": "3"}, "authors": - [{"authorId": "1795634", "name": "A. Asperti"}, {"authorId": "3179527", "name": - "Luca Roversi"}]}, {"paperId": "52012db392ae0dffbf990b62682e21cf13bf093e", + "publicationTypes": null, "publicationDate": "2014-07-03", "journal": {"name": + "Nonlinear Dynamics", "pages": "1301-1310", "volume": "78"}, "authors": [{"authorId": + "48809744", "name": "Qianqian Zheng"}, {"authorId": "40275447", "name": "Jianwei + Shen"}]}, {"paperId": "7f49b4d1f3d10b473fc2089984e2407d35391a5e", "externalIds": + {"MAG": "2027063429", "DOI": "10.1093/BIOMET/89.3.669", "CorpusId": 121071800}, + "corpusId": 121071800, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f49b4d1f3d10b473fc2089984e2407d35391a5e", + "title": "A Poisson model for the coverage problem with a genomic application", + "abstract": "Suppose a population has infinitely many individuals and is partitioned + into unknown N disjoint classes. The sample coverage of a random sample from + the population is the total proportion of the classes observed in the sample. + This paper uses a nonparametric Poisson mixture model to give new understanding + and results for inference on the sample coverage. The Poisson mixture model + provides a simplified framework for inferring any general abundance-K coverage, + the sum of the proportions of those classes that contribute exactly k individuals + in the sample for some k in K, with K being a set of nonnegative integers. + A new moment-based derivation of the well-known Turing estimators is presented. + As an application, a gene-categorisation problem in genomic research is addressed. + Since Turing''s approach is a moment-based method, maximum likelihood estimation + and minimum distance estimation are indicated as alternatives for the coverage + problem. Finally, it will be shown that any Turing estimator is asymptotically + fully efficient. Copyright Biometrika Trust 2002, Oxford University Press.", + "venue": "", "year": 2002, "referenceCount": 26, "citationCount": 48, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2002-08-01", "journal": {"name": "Biometrika", "pages": "669-682", "volume": + "89"}, "authors": [{"authorId": "2772215", "name": "C. Mao"}, {"authorId": + "18478271", "name": "B. Lindsay"}]}, {"paperId": "52012db392ae0dffbf990b62682e21cf13bf093e", "externalIds": {"ArXiv": "quant-ph/0002077", "MAG": "2158605123", "DOI": "10.1002/1521-3978(200009)48:9/11<771::AID-PROP771>3.0.CO;2-E", - "CorpusId": 15439711}, "url": "https://www.semanticscholar.org/paper/52012db392ae0dffbf990b62682e21cf13bf093e", + "CorpusId": 15439711}, "corpusId": 15439711, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/52012db392ae0dffbf990b62682e21cf13bf093e", "title": "The Physical Implementation of Quantum Computation", "abstract": "After a brief introduction to the principles and promise of quantum information processing, the requirements for the physical implementation of quantum computation @@ -25629,14 +29177,16 @@ interactions: remarkable fea- tures of this field. The excitement and freshness that has been produced bodes well for the prospect for discovery, invention, and innovation in this endeavor.", "venue": "", "year": 2000, "referenceCount": 41, "citationCount": - 1980, "influentialCitationCount": 80, "isOpenAccess": true, "fieldsOfStudy": + 1998, "influentialCitationCount": 81, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/quant-ph/0002077", "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2000-02-25", "journal": {"name": "Protein Science", "pages": "771-783", "volume": "48"}, "authors": [{"authorId": "2804168", "name": "D. DiVincenzo"}, {"authorId": "102619729", "name": "Ibm"}]}, {"paperId": "1ac933d806a8e65ac9f0dbc34deb71dfd04f4efa", "externalIds": {"MAG": "3037925561", "ArXiv": "math/0212403", "DOI": "10.5802/afst.1065", - "CorpusId": 16064051}, "url": "https://www.semanticscholar.org/paper/1ac933d806a8e65ac9f0dbc34deb71dfd04f4efa", + "CorpusId": 16064051}, "corpusId": 16064051, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1ac933d806a8e65ac9f0dbc34deb71dfd04f4efa", "title": "Galois representations", "abstract": ". - In the first part of this paper we try to explain to a general mathematical audience some of the remarkable web of conjectures linking representations of Galois groups with algebraic @@ -25649,36 +29199,91 @@ interactions: groupes de Lie. Dans la deuxi\u00e8me partie nous mentionnons des progr\u00e8s r\u00e9cents mais limit\u00e9s sur ces conjec- tures.", "venue": "", "year": 2002, "referenceCount": 122, "citationCount": 117, "influentialCitationCount": - 15, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2002-12-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "144588660", "name": "Richard Taylor"}]}, {"paperId": "a03986f4f3a8739d71b1d3269c1a2259fbaef89b", - "externalIds": {"MAG": "1560502112", "DBLP": "conf/uss/MotoyamaLKMVS10", "CorpusId": - 11875247}, "url": "https://www.semanticscholar.org/paper/a03986f4f3a8739d71b1d3269c1a2259fbaef89b", - "title": "Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic - Context", "abstract": "Reverse Turing tests, or CAPTCHAs, have become an ubiquitous - defense used to protect open Web resources from being exploited at scale. - An effective CAPTCHA resists existing mechanistic software solving, yet can - be solved with high probability by a human being. In response, a robust solving - ecosystem has emerged, reselling both automated solving technology and realtime - human labor to bypass these protections. Thus, CAPTCHAs can increasingly be - understood and evaluated in purely economic terms; the market price of a solution - vs the monetizable value of the asset being protected. We examine the market-side - of this question in depth, analyzing the behavior and dynamics of CAPTCHA-solving - service providers, their price performance, and the underlying labor markets - driving this economy.", "venue": "USENIX Security Symposium", "year": 2010, - "referenceCount": 30, "citationCount": 233, "influentialCitationCount": 20, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "2002-12-01", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "144588660", "name": "Richard Taylor"}]}, {"paperId": "e291fcf58e97fd0f0322862aa5ab5d176b9fa9a4", + "externalIds": {"MAG": "2050616527", "DOI": "10.1080/0740770X.2014.973754", + "CorpusId": 194086675}, "corpusId": 194086675, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e291fcf58e97fd0f0322862aa5ab5d176b9fa9a4", + "title": "Testo junkie: sex, drugs, and biopolitics in the pharmacopornographic + era", "abstract": "After being arrested in 1952 for public indecency and sexual + perversion, Alan Turing was sentenced to estrogen injections that the Hollywood + film Imitation Game (Tyldum 2014) portrays as destroying his manhood as well + as his mind. Homosexuality was coincident with Turing\u2019s greatness, The + Imitation Game insists, but endogenous hormones were intrinsic to his brilliance.1 + Yet the film also offers a glimpse into the larger political machinery in + which Turing operated, a system that new queer studies scholarship on biopower + helps illuminate. This broader frame renders Turing a figure unwittingly located + at the nexus of three major vectors of Foucauldian biopower: the emergence + of the homosexual as a medicaljuridical subject, the administration of the + population through the calculation of risk, and", "venue": "", "year": 2014, + "referenceCount": 12, "citationCount": 24, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2014-09-02", "journal": {"name": "Women & Performance: a journal of feminist + theory", "pages": "247 - 249", "volume": "24"}, "authors": [{"authorId": "1410260778", + "name": "julian gill-peterson"}]}, {"paperId": "987b5f2aa1ad2d359cd80f5c6ec04946c8c8c3e3", + "externalIds": {"DBLP": "conf/ecal/LiekensF07", "MAG": "1850807863", "DOI": + "10.1007/978-3-540-74913-4_120", "CorpusId": 5947809}, "corpusId": 5947809, + "publicationVenue": {"id": "3d322ce4-70a7-46ae-bc3d-c4a367f06a3c", "name": + "European Conference on Artificial Life", "type": "conference", "alternate_names": + ["Eur Conf Artif Life", "ECAL"], "url": "http://www.wikicfp.com/cfp/program?id=794"}, + "url": "https://www.semanticscholar.org/paper/987b5f2aa1ad2d359cd80f5c6ec04946c8c8c3e3", + "title": "Turing Complete Catalytic Particle Computers", "abstract": null, + "venue": "European Conference on Artificial Life", "year": 2007, "referenceCount": + 22, "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2007-09-10", "journal": {"pages": "1202-1211"}, "authors": + [{"authorId": "1763163", "name": "A. Liekens"}, {"authorId": "143939165", + "name": "Chrisantha Fernando"}]}, {"paperId": "7c89ef19e7e99d471c7ecaa848a1fca564a07146", + "externalIds": {"DBLP": "journals/corr/abs-1108-1012", "MAG": "2953034995", + "ArXiv": "1108.1012", "DOI": "10.1016/j.tcs.2012.08.027", "CorpusId": 1113147}, + "corpusId": 1113147, "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", + "name": "Theoretical Computer Science", "type": "journal", "alternate_names": + ["Theor Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/7c89ef19e7e99d471c7ecaa848a1fca564a07146", + "title": "Turing degrees of multidimensional SFTs", "abstract": null, "venue": + "Theoretical Computer Science", "year": 2011, "referenceCount": 31, "citationCount": + 25, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-08-04", "journal": + {"name": "Theor. Comput. Sci.", "pages": "81-92", "volume": "505"}, "authors": + [{"authorId": "2332997", "name": "E. Jeandel"}, {"authorId": "2135628", "name": + "Pascal Vanier"}]}, {"paperId": "d3f0d534689ec3aebb65a046a04509a0c527409a", + "externalIds": {"MAG": "2145295071", "DBLP": "conf/stacs/CaludeHKW98", "DOI": + "10.1007/BFb0028594", "CorpusId": 5493426}, "corpusId": 5493426, "publicationVenue": + {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": "Theoretical Computer + Science", "type": "journal", "alternate_names": ["Theor Comput Sci"], "issn": + "0304-3975", "url": "http://www.elsevier.com/locate/tcs", "alternate_urls": + ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/d3f0d534689ec3aebb65a046a04509a0c527409a", + "title": "Recursively enumerable reals and Chaitin Omega numbers", "abstract": + null, "venue": "Theoretical Computer Science", "year": 1998, "referenceCount": + 71, "citationCount": 51, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-08-11", "journal": {"pages": "435-462"}, "authors": [{"authorId": "1789564", - "name": "Marti A. Motoyama"}, {"authorId": "1763395", "name": "Kirill Levchenko"}, - {"authorId": "3110399", "name": "Chris Kanich"}, {"authorId": "144378428", - "name": "Damon McCoy"}, {"authorId": "1739245", "name": "G. Voelker"}, {"authorId": - "1727599", "name": "S. Savage"}]}, {"paperId": "3fbf58cecef71ba24fbaa46f7521938ca31751b8", - "externalIds": {"MAG": "2025591318", "DOI": "10.1387/ijdb.072502sk", "CorpusId": - 29597471, "PubMed": "19557690"}, "url": "https://www.semanticscholar.org/paper/3fbf58cecef71ba24fbaa46f7521938ca31751b8", + "1998-02-25", "journal": {"name": "Theor. Comput. Sci.", "pages": "125-149", + "volume": "255"}, "authors": [{"authorId": "1685717", "name": "Cristian S. + Calude"}, {"authorId": "1785054", "name": "Peter Hertling"}, {"authorId": + "1703048", "name": "B. Khoussainov"}, {"authorId": "2108771041", "name": "Yongge + Wang"}]}, {"paperId": "3fbf58cecef71ba24fbaa46f7521938ca31751b8", "externalIds": + {"MAG": "2025591318", "DOI": "10.1387/ijdb.072502sk", "CorpusId": 29597471, + "PubMed": "19557690"}, "corpusId": 29597471, "publicationVenue": {"id": "f6ba77d2-311a-4f1b-a749-f117a1e9a8f4", + "name": "International Journal of Developmental Biology", "type": "journal", + "alternate_names": ["The International Journal of Developmental Biology", + "Int J Dev Biology"], "issn": "0214-6282", "alternate_issns": ["1696-3547"], + "url": "http://www.ijdb.ehu.es/", "alternate_urls": ["http://www.ijdb.ehu.es/welcome.html"]}, + "url": "https://www.semanticscholar.org/paper/3fbf58cecef71ba24fbaa46f7521938ca31751b8", "title": "How animals get their skin patterns: fish pigment pattern as a live Turing wave.", "abstract": "It is more than fifty years since Alan Turing first presented the reaction-diffusion (RD) model, to account for the mechanism @@ -25697,383 +29302,88 @@ interactions: in the study of zebrafish pigment pattern formation that is uncovering how the RD wave is made and maintained in the skin.", "venue": "International Journal of Developmental Biology", "year": 2009, "referenceCount": 69, "citationCount": - 79, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2009-06-18", "journal": {"name": "The International journal - of developmental biology", "pages": "\n 851-6\n ", "volume": - "53 5-6"}, "authors": [{"authorId": "2636335", "name": "Shigeru Kondo"}, {"authorId": - "5115106", "name": "Motoko Iwashita"}, {"authorId": "4320902", "name": "Motoomi - Yamaguchi"}]}, {"paperId": "6190b1f31e6c0f92cd37715760f6da481b2e97d0", "externalIds": - {"DBLP": "journals/tcs/Dauchet92", "MAG": "2024726864", "DOI": "10.1016/0304-3975(92)90022-8", - "CorpusId": 23787605}, "url": "https://www.semanticscholar.org/paper/6190b1f31e6c0f92cd37715760f6da481b2e97d0", - "title": "Simulation of Turing Machines by a Regular Rewrite Rule", "abstract": - null, "venue": "Theoretical Computer Science", "year": 1992, "referenceCount": - 6, "citationCount": 50, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-09-14", "journal": {"name": "Theor. Comput. Sci.", "pages": "409-420", - "volume": "103"}, "authors": [{"authorId": "1766675", "name": "M. Dauchet"}]}, - {"paperId": "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "externalIds": {"PubMedCentral": - "5258822", "MAG": "2443634204", "ArXiv": "1301.2002", "DOI": "10.1007/s00285-016-1035-z", - "CorpusId": 5942606, "PubMed": "27305913"}, "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", - "title": "Instability of turing patterns in reaction-diffusion-ODE systems", - "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2013, - "referenceCount": 49, "citationCount": 38, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2013-01-09", "journal": - {"name": "Journal of Mathematical Biology", "pages": "583 - 618", "volume": - "74"}, "authors": [{"authorId": "1389565398", "name": "A. Marciniak-Czochra"}, - {"authorId": "101468044", "name": "G. Karch"}, {"authorId": "2118679527", - "name": "Kanako Suzuki"}]}, {"paperId": "172a8802fe3fbf3bab2f1b2baab9a7885c9037ca", - "externalIds": {"MAG": "2039241442", "DOI": "10.1112/S0024611599011818", "CorpusId": - 120438927}, "url": "https://www.semanticscholar.org/paper/172a8802fe3fbf3bab2f1b2baab9a7885c9037ca", - "title": "Cupping the Recursively Enumerable Degrees by D.R.E. Degrees", "abstract": - "We prove that there are two incomplete d.r.e. degrees (the Turing degrees - of differences of two recursively enumerable sets) such that every non\u2010zero - recursively enumerable degree cups at least one of them to 0\u2032, the greatest - recursively enumerable (Turing) degree. 1991 Mathematics Subject Classification: - primary 03D25, 03D30; secondary 03D35.", "venue": "", "year": 1999, "referenceCount": - 20, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1999-07-01", "journal": {"name": "Proceedings of - the London Mathematical Society", "volume": "79"}, "authors": [{"authorId": - "145546987", "name": "Angsheng Li"}, {"authorId": "2096826", "name": "X. Yi"}]}, - {"paperId": "baed896a3b8d07accc122a86a654ffab6b286cc5", "externalIds": {"DBLP": - "journals/tamd/SongRZZ18", "MAG": "2777287263", "DOI": "10.1109/TCDS.2017.2785332", - "CorpusId": 54464286}, "url": "https://www.semanticscholar.org/paper/baed896a3b8d07accc122a86a654ffab6b286cc5", - "title": "Spiking Neural P Systems With Colored Spikes", "abstract": "Spiking - neural P systems (SN P systems) are bio-inspired neural-like computing models, - which are obtained by abstracting the way of biological neurons\u2019 spiking - and communication by means of spikes in central nervous systems. SN P systems - performed well in describing and modeling behaviors that occur simultaneously, - yet weak at modeling complex systems with the limits of using a single spike. - In this paper, drawing on the idea from colored petri nets, SN P systems with - colored spikes are proposed, where a finite set of colors is introduced to - mark the spikes such that each spike is associated with a unique color. The - updated spiking rule is applied by consuming and emitting a number of colored - spikes (with the same or different colors). The computation power of the systems - is investigated. Specifically, it is shown that SN P systems with colored - spikes having three neurons are sufficient to compute Turing computable sets - of numbers, and such system having two neurons is able to compute the family - of recursive functions. These results improved the corresponding ones on the - number of neurons needed to construct universal SN P systems recently appeared - in [Neurocomputing, 2016, 193(12): 193\u2013200]. To our best knowledge, this - is the smallest number of neurons used to construct Turing universal SN P - systems as number generator and function computing device by far.", "venue": - "IEEE Transactions on Cognitive and Developmental Systems", "year": 2018, - "referenceCount": 74, "citationCount": 93, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-12-01", "journal": {"name": "IEEE Transactions on - Cognitive and Developmental Systems", "pages": "1106-1115", "volume": "10"}, - "authors": [{"authorId": "2001220881", "name": "Tao Song"}, {"authorId": "1397793046", - "name": "A. Rodr\u00edguez-Pat\u00f3n"}, {"authorId": "2054597023", "name": - "Pan Zheng"}, {"authorId": "2111549943", "name": "Xiangxiang Zeng"}]}, {"paperId": - "987b5f2aa1ad2d359cd80f5c6ec04946c8c8c3e3", "externalIds": {"DBLP": "conf/ecal/LiekensF07", - "MAG": "1850807863", "DOI": "10.1007/978-3-540-74913-4_120", "CorpusId": 5947809}, - "url": "https://www.semanticscholar.org/paper/987b5f2aa1ad2d359cd80f5c6ec04946c8c8c3e3", - "title": "Turing Complete Catalytic Particle Computers", "abstract": null, - "venue": "European Conference on Artificial Life", "year": 2007, "referenceCount": - 22, "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2007-09-10", "journal": {"pages": "1202-1211"}, "authors": [{"authorId": - "1763163", "name": "A. Liekens"}, {"authorId": "143939165", "name": "Chrisantha - Fernando"}]}, {"paperId": "b5394e76607f2cdd58c45d18511699da11beb229", "externalIds": - {"MAG": "2528534253", "CorpusId": 64461042}, "url": "https://www.semanticscholar.org/paper/b5394e76607f2cdd58c45d18511699da11beb229", - "title": "On Alan Turing and the Origins of Digital Computers", "abstract": - "This paper documents an investigation into the role that the late Alan Turing - played in the development of electronic computers. Evidence is presented that - during the war he was associated with a group that designed and built a series - of special purpose electronic computers, which were in at least a limited - sense \u2018program controlled\u2019, and that the origins of several post-war - general purpose computer projects in Britain can be traced back to these wartime - computers.", "venue": "", "year": 1972, "referenceCount": 32, "citationCount": - 38, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Machine - intelligence", "volume": ""}, "authors": [{"authorId": "145586245", "name": - "B. Randell"}]}, {"paperId": "d1b42ea63e85600659d41f8b570cafc01ee16f44", "externalIds": - {"MAG": "2949894438", "ArXiv": "cmp-lg/9606013", "DBLP": "conf/acl-vlc/Samuelsson96", - "ACL": "W96-0106", "CorpusId": 3266457}, "url": "https://www.semanticscholar.org/paper/d1b42ea63e85600659d41f8b570cafc01ee16f44", - "title": "Relating Turing\u2019s Formula and Zipf\u2019s Law", "abstract": - "An asymptote is derived from Turing''s local reestimation formula for population - frequencies, and a local reestimation formula is derived from Zipf''s law - for the asymptotic behavior of population frequencies. The two are shown to - be qualitatively different asymptotically, but nevertheless to be instances - of a common class of reestimation-formula-asymptote pairs, in which they constitute - the upper and lower bounds of the convergence region of the cumulative of - the frequency function, as rank tends to infinity. The results demonstrate - that Turing''s formula is qualitatively different from the various extensions - to Zipf''s law, and suggest that it smooths the frequency estimates towards - a geometric distribution.", "venue": "VLC@COLING", "year": 1996, "referenceCount": - 15, "citationCount": 25, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1996-06-01", "journal": - {"name": "ArXiv", "volume": "cmp-lg/9606013"}, "authors": [{"authorId": "2403128", - "name": "C. Samuelsson"}]}, {"paperId": "7f49b4d1f3d10b473fc2089984e2407d35391a5e", - "externalIds": {"MAG": "2027063429", "DOI": "10.1093/BIOMET/89.3.669", "CorpusId": - 121071800}, "url": "https://www.semanticscholar.org/paper/7f49b4d1f3d10b473fc2089984e2407d35391a5e", - "title": "A Poisson model for the coverage problem with a genomic application", - "abstract": "Suppose a population has infinitely many individuals and is partitioned - into unknown N disjoint classes. The sample coverage of a random sample from - the population is the total proportion of the classes observed in the sample. - This paper uses a nonparametric Poisson mixture model to give new understanding - and results for inference on the sample coverage. The Poisson mixture model - provides a simplified framework for inferring any general abundance-K coverage, - the sum of the proportions of those classes that contribute exactly k individuals - in the sample for some k in K, with K being a set of nonnegative integers. - A new moment-based derivation of the well-known Turing estimators is presented. - As an application, a gene-categorisation problem in genomic research is addressed. - Since Turing''s approach is a moment-based method, maximum likelihood estimation - and minimum distance estimation are indicated as alternatives for the coverage - problem. Finally, it will be shown that any Turing estimator is asymptotically - fully efficient. Copyright Biometrika Trust 2002, Oxford University Press.", - "venue": "", "year": 2002, "referenceCount": 26, "citationCount": 48, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-08-01", - "journal": {"name": "Biometrika", "pages": "669-682", "volume": "89"}, "authors": - [{"authorId": "2772215", "name": "C. Mao"}, {"authorId": "18478271", "name": - "B. Lindsay"}]}, {"paperId": "f9fdd42c493dd9b2931e94b0de3b583c0f43e6b2", "externalIds": - {"CorpusId": 2958708}, "url": "https://www.semanticscholar.org/paper/f9fdd42c493dd9b2931e94b0de3b583c0f43e6b2", - "title": "Tomography of Reaction-Diffusion Microemulsions Reveals Three-Dimensional - Turing Patterns", "abstract": null, "venue": "", "year": null, "referenceCount": - 0, "citationCount": 48, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "7747283", "name": "M. Ichinohe"}, - {"authorId": "2672486", "name": "A. Sekiguchi"}]}, {"paperId": "dac83c56d04fc8b24e2afdde51fa2543f1c81391", - "externalIds": {"DBLP": "journals/ubiquity/Denning10b", "MAG": "1963498652", - "DOI": "10.1145/1880066.1880067", "CorpusId": 27587951}, "url": "https://www.semanticscholar.org/paper/dac83c56d04fc8b24e2afdde51fa2543f1c81391", - "title": "Ubiquity symposium ''What is computation?'': Opening statement", - "abstract": "Most people understand a computation as a process evoked when - a computational agent acts on its inputs under the control of an algorithm. - The classical Turing machine model has long served as the fundamental reference - model because an appropriate Turing machine can simulate every other computational - model known. The Turing model is a good abstraction for most digital computers - because the number of steps to execute a Turing machine algorithm is predictive - of the running time of the computation on a digital computer. However, the - Turing model is not as well matched for the natural, interactive, and continuous - information processes frequently encountered today. Other models whose structures - more closely match the information processes involved give better predictions - of running time and space. Models based on transforming representations may - be useful.\n", "venue": "UBIQ", "year": 2010, "referenceCount": 38, "citationCount": - 20, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2010-11-01", "journal": - {"name": "Ubiquity", "pages": "1", "volume": "2010"}, "authors": [{"authorId": - "1729148", "name": "P. Denning"}]}, {"paperId": "3d108bb39968a2f121b00e4b9984e4db1b9ed9f7", - "externalIds": {"MAG": "2058465502", "DOI": "10.1021/JZ100238U", "CorpusId": - 12073494}, "url": "https://www.semanticscholar.org/paper/3d108bb39968a2f121b00e4b9984e4db1b9ed9f7", - "title": "Synchronization of Chemical Micro-oscillators", "abstract": "Many - phenomena of biological, physical, and chemical importance involve synchronization - of oscillatory elements. We explore here, in several geometries, the behavior - of diffusively coupled, nanoliter volume, aqueous drops separated by oil gaps - and containing the reactants of the oscillatory Belousov- Zhabotinsky (BZ) - reaction. Avariety of synchronous regimes are found, including in- and antiphase - oscillations, stationary Turing patterns, and more complex combinations of - stationary and oscillatory BZ drops, including three-phase pat- terns. A model - consisting of ordinary differential equations based on a simplified description - of the BZ chemistry and diffusion of messenger (primarily inhibitory) species - qualitatively reproduces most of the experimental results. SECTION Kinetics, - Spectroscopy", "venue": "", "year": 2010, "referenceCount": 36, "citationCount": - 117, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2010-03-26", "journal": {"name": "Journal of Physical - Chemistry Letters", "pages": "1241-1246", "volume": "1"}, "authors": [{"authorId": - "48343272", "name": "Masahiro Toiya"}, {"authorId": "118337083", "name": "Hector - O. Gonz"}, {"authorId": "2258489", "name": "V. Vanag"}, {"authorId": "2775719", - "name": "S. Fraden"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": - "2a642923b70a56b3dde33ab8be233eea13b61530", "externalIds": {"MAG": "1594477603", - "DOI": "10.20955/R.66.18-25.GFF", "CorpusId": 17612199}, "url": "https://www.semanticscholar.org/paper/2a642923b70a56b3dde33ab8be233eea13b61530", - "title": "Money, debt and economic activity", "abstract": "HE Federal Open - Market Committee (FOMCI decided in October 1982 that, at least for the immediate - fttture, less importance would be attached to movements in the narm-owly defined - monetary aggn-egate (Ml) in establishing monetary policy. \u2018l\u2019his - depan-ture from previous policy was motivated primat-ily by incr-easing expectations - that the intr-oduction of SuperNOW accounts would distot-t Ml\u2019s usefi.rlness - as a reliable policy guide.", "venue": "", "year": 1984, "referenceCount": - 23, "citationCount": 73, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Canadian - Parliamentary Review", "pages": "18-25", "volume": "66"}, "authors": [{"authorId": - "103101909", "name": "R. Hafer"}]}, {"paperId": "5546c3a3978f4668a4a5c044148de22f85ffd550", - "externalIds": {"MAG": "2001385353", "DBLP": "journals/tciaig/WarwickS14", - "DOI": "10.1109/TCIAIG.2013.2283538", "CorpusId": 16283359}, "url": "https://www.semanticscholar.org/paper/5546c3a3978f4668a4a5c044148de22f85ffd550", - "title": "Good Machine Performance in Turing''s Imitation Game", "abstract": - "In this paper, we consider transcripts which originated from a practical - series of Turing''s Imitation Game that was held on June 23, 2012, at Bletchley - Park, U.K. In some cases, the tests involved a three-participant simultaneous - comparison of two hidden entities, whereas others were the result of a direct - two-participant interaction. Each of the transcripts considered here resulted - in a human interrogator being fooled, by a machine, into concluding that they - had been conversing with a human. Particular features of the conversation - are highlighted, successful ploys on the part of each machine are discussed, - and likely reasons for the interrogator being fooled are considered. Subsequent - feedback from the interrogators involved is also included.", "venue": "IEEE - Transactions on Computational Intelligence and AI in Games", "year": 2014, - "referenceCount": 33, "citationCount": 26, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-09-01", "journal": {"name": "IEEE Transactions on Computational Intelligence - and AI in Games", "pages": "289-299", "volume": "6"}, "authors": [{"authorId": - "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma - Shah"}]}, {"paperId": "49befb6284053682a7fbf389ff6bf659cf7eb000", "externalIds": - {"MAG": "1608518359", "DBLP": "journals/fuin/DennunzioFM12", "DOI": "10.3233/FI-2012-755", - "CorpusId": 27340159}, "url": "https://www.semanticscholar.org/paper/49befb6284053682a7fbf389ff6bf659cf7eb000", - "title": "Computing Issues of Asynchronous CA", "abstract": "This work studies - some aspects of the computational power of fully asynchronous cellular automata - ACA. We deal with some notions of simulation between ACA and Turing Machines. - In particular, we characterize the updating sequences specifying which are - \u201cuniversal\u201d, i.e., allowing a specific family of ACA to simulate - any Turing machine on any input. We also consider the computational cost of - such simulations. Finally, we deal with ACA equipped with peculiar updating - sequences, namely those generated by random walks.", "venue": "Fundamenta - Informaticae", "year": 2012, "referenceCount": 28, "citationCount": 29, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-04-01", "journal": {"name": "Fundam. Informaticae", - "pages": "165-180", "volume": "120"}, "authors": [{"authorId": "1736354", - "name": "A. Dennunzio"}, {"authorId": "1731945", "name": "E. Formenti"}, {"authorId": - "1740428", "name": "L. Manzoni"}]}, {"paperId": "2c5044c18e4d22d896161a0c670e10e25fe03193", - "externalIds": {"MAG": "2089965269", "DOI": "10.1007/S10910-010-9699-X", "CorpusId": - 122170488}, "url": "https://www.semanticscholar.org/paper/2c5044c18e4d22d896161a0c670e10e25fe03193", - "title": "Turing pattern amplitude equation for a model glycolytic reaction-diffusion - system", "abstract": null, "venue": "", "year": 2010, "referenceCount": 25, - "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2010-06-10", "journal": {"name": - "Journal of Mathematical Chemistry", "pages": "841-855", "volume": "48"}, - "authors": [{"authorId": "27412483", "name": "A. K. Dutt"}]}, {"paperId": - "fc681ea7e3eab3b5631fe70ad58009da2e103d5a", "externalIds": {"MAG": "2105337422", - "DOI": "10.1142/S0219199710003968", "CorpusId": 122578116}, "url": "https://www.semanticscholar.org/paper/fc681ea7e3eab3b5631fe70ad58009da2e103d5a", - "title": "TURING PATTERNS IN GENERAL REACTION-DIFFUSION SYSTEMS OF BRUSSELATOR - TYPE", "abstract": "We study the reaction-diffusion system Here \u03a9 is - a smooth and bounded domain in \u211dN (N \u2265 1), a, b, d1, d2 > 0 and - f \u2208 C1[0, \u221e) is a non-decreasing function. The case f(u) = u2 corresponds - to the standard Brusselator model for autocatalytic oscillating chemical reactions. - Our analysis points out the crucial role played by the nonlinearity f in the - existence of Turing patterns. More precisely, we show that if f has a sublinear - growth then no Turing patterns occur, while if f has a superlinear growth - then existence of such patterns is strongly related to the inter-dependence - between the parameters a, b and the diffusion coefficients d1, d2.", "venue": - "", "year": 2010, "referenceCount": 38, "citationCount": 31, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-08-01", - "journal": {"name": "Communications in Contemporary Mathematics", "pages": - "661-679", "volume": "12"}, "authors": [{"authorId": "3088137", "name": "M. - Ghergu"}, {"authorId": "1797382", "name": "Vicentiu D. R\u0103dulescu"}]}, - {"paperId": "89fb323175be1654f7021360db5e9a771b0e2ab8", "externalIds": {"MAG": - "1999435051", "DOI": "10.1090/S0002-9947-2011-05306-7", "CorpusId": 115171420}, - "url": "https://www.semanticscholar.org/paper/89fb323175be1654f7021360db5e9a771b0e2ab8", - "title": "Kolmogorov complexity and the Recursion Theorem", "abstract": "Several - classes of diagonally nonrecursive (DNR) functions are characterized in terms - of Kolmogorov complexity. In particular, a set of natural numbers A can wtt-compute - a DNR function iff there is a nontrivial recursive lower bound on the Kolmogorov - complexity of the initial segments of A. Furthermore, A can Turing compute - a DNR function iff there is a nontrivial A-recursive lower bound on the Kolmogorov - complexity of the initial segments of A. A is PA-complete, that is, A can - compute a {0, 1}-valued DNR function, iff A can compute a function F such - that F(n) is a string of length n and maximal C-complexity among the strings - of length n. A \u2265 T K iff A can compute a function F such that F(n) is - a string of length n and maximal H-complexity among the strings of length - n. Further characterizations for these classes are given. The existence of - a DNR function in a Turing degree is equivalent to the failure of the Recursion - Theorem for this degree; thus the provided results characterize those Turing - degrees in terms of Kolmogorov complexity which no longer permit the usage - of the Recursion Theorem.", "venue": "", "year": 2011, "referenceCount": 10, - "citationCount": 48, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2011-10-01", "journal": {"name": "Transactions of - the American Mathematical Society", "pages": "5465-5480", "volume": "363"}, - "authors": [{"authorId": "1401914011", "name": "B. Kjos-Hanssen"}, {"authorId": - "1691379", "name": "W. Merkle"}, {"authorId": "1699450", "name": "F. Stephan"}]}, - {"paperId": "6061cc27f87a59ff1478de336fd6a057545e33fa", "externalIds": {"MAG": - "2166008819", "CorpusId": 5899659}, "url": "https://www.semanticscholar.org/paper/6061cc27f87a59ff1478de336fd6a057545e33fa", + 79, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.ijdb.ehu.es/web/descarga/paper/072502sk", "status": "BRONZE"}, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", + "JournalArticle"], "publicationDate": "2009-06-18", "journal": {"name": "The + International journal of developmental biology", "pages": "\n 851-6\n ", + "volume": "53 5-6"}, "authors": [{"authorId": "2636335", "name": "Shigeru + Kondo"}, {"authorId": "5115106", "name": "Motoko Iwashita"}, {"authorId": + "4320902", "name": "Motoomi Yamaguchi"}]}, {"paperId": "6061cc27f87a59ff1478de336fd6a057545e33fa", + "externalIds": {"MAG": "2166008819", "CorpusId": 5899659}, "corpusId": 5899659, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6061cc27f87a59ff1478de336fd6a057545e33fa", "title": "On Integral Forms of Generalised Mathieu Series", "abstract": "Integral representations for generalised Mathieu series are obtained which recap- ture the Mathieu series as a special case. Bounds are obtained through the use of the integral representations.", "venue": "", "year": 2003, "referenceCount": 28, "citationCount": 36, "influentialCitationCount": 12, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-05-05", "journal": {"name": - "Journal of Inequalities in Pure & Applied Mathematics", "volume": "4"}, "authors": - [{"authorId": "2587645", "name": "P. Cerone"}, {"authorId": "145512170", "name": - "C. Lenard"}]}, {"paperId": "457704a70aba87c437a9dd9b39b10da9efb19488", "externalIds": - {"MAG": "2084495697", "DOI": "10.1177/105960117700200408", "CorpusId": 145165096}, - "url": "https://www.semanticscholar.org/paper/457704a70aba87c437a9dd9b39b10da9efb19488", - "title": "Guidelines for Cross-Cultural Communication Effectiveness", "abstract": - "Among cross-cultural trainers and researchers, considerable attention has - been fo cused on problems individuals encounter in adapting to new cultures - or subcul tures. For the many volunteers and professionals who live and work - in a cross- cultural setting, the question of how to effectively transfer - knowledge and skills to persons of different cultural backgrounds is an equally - great concern.", "venue": "", "year": 1977, "referenceCount": 25, "citationCount": - 58, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Sociology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1977-12-01", "journal": {"name": "Group - & Organization Management", "pages": "470 - 479", "volume": "2"}, "authors": - [{"authorId": "51392630", "name": "B. Ruben"}]}, {"paperId": "0292a0e8a638b9d35683bd78f4817385e3d4a2a9", - "externalIds": {"MAG": "582739059", "DOI": "10.1017/cbo9780511498435", "CorpusId": - 142086551}, "url": "https://www.semanticscholar.org/paper/0292a0e8a638b9d35683bd78f4817385e3d4a2a9", - "title": "Neurophilosophy at Work", "abstract": "1. Catching consciousness - in a recurrent network 2. Functionalism at forty: a critical perspective 3. - Toward a cognitive neurobiology of the moral virtues 4. Rules, know-how, and - the future of moral cognition 5. Science, religion, and American educational - policy 6. What happens to reliabilism when it is liberated from the propositional - attitudes 7. On the nature of intelligence: Turing, Church, von Neumann, and - the brain 8. Neurosemantics: on the mapping of minds and the portrayal of - worlds 9. Chimerical colors: some phenomenological predictions from cognitive - neuroscience 10. On the reality (and diversity) of objective colors 11. Into - the brain: where philosophy should go from here.", "venue": "", "year": 2007, - "referenceCount": 144, "citationCount": 113, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-04-09", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "37069078", - "name": "P. Churchland"}]}, {"paperId": "9e0b37866a90047e4db40c7ef534274d445ebfc1", - "externalIds": {"MAG": "613330392", "CorpusId": 152387242}, "url": "https://www.semanticscholar.org/paper/9e0b37866a90047e4db40c7ef534274d445ebfc1", - "title": "MOTOR CARRIER SELECTION IN A DEREGULATED ENVIRONMENT", "abstract": - "The environment created by passage of the Motor Carrier Act of 1980 has provided - the transportation buyer with the opportunity to ex ercise significant market - buying power through such processes as negotiations and contracting. In addition, - growing pressure for cost reduction from foreign competitors and corporate - restruc turing actions (such as leveraged buyouts) have intensified shipper - pursuit of opportunities to reduce transportation costs. Changes thus have - resulted in the transportation buying decision making process utilized by - shippers. Considerable research has been conducted on", "venue": "", "year": - 1989, "referenceCount": 1, "citationCount": 74, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-09-01", - "journal": {"name": "Transportation Journal", "pages": "4-11", "volume": "29"}, - "authors": [{"authorId": "31159588", "name": "E. Bardi"}, {"authorId": "46200219", - "name": "P. K. Bagchi"}, {"authorId": "144227882", "name": "T. Raghunathan"}]}, - {"paperId": "6c9532fdb782cbbda25633ee779f5c4e24f0a9ed", "externalIds": {"DBLP": - "conf/stoc/GalilKS86", "MAG": "2051758697", "DOI": "10.1145/12130.12135", - "CorpusId": 369391}, "url": "https://www.semanticscholar.org/paper/6c9532fdb782cbbda25633ee779f5c4e24f0a9ed", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-05-05", + "journal": {"name": "Journal of Inequalities in Pure & Applied Mathematics", + "volume": "4"}, "authors": [{"authorId": "2587645", "name": "P. Cerone"}, + {"authorId": "145512170", "name": "C. Lenard"}]}, {"paperId": "b9ef7734184bdd6ea4ca574d1b0976fc9252e3e3", + "externalIds": {"MAG": "2941010932", "DOI": "10.4007/ANNALS.2021.193.2.4", + "CorpusId": 109934776}, "corpusId": 109934776, "publicationVenue": {"id": + "1c217a55-a879-4208-a255-20c16fc90bf5", "name": "Annals of Mathematics", "type": + "journal", "alternate_names": ["Ann Math"], "issn": "0003-486X", "url": "http://www.emis.de/journals/Annals/", + "alternate_urls": ["http://www.jstor.org/journals/0003486x.html", "http://www.emis.de/journals/Annals/index.html", + "https://www.jstor.org/journal/annamath", "http://projecteuclid.org/annm", + "http://annals.math.princeton.edu/"]}, "url": "https://www.semanticscholar.org/paper/b9ef7734184bdd6ea4ca574d1b0976fc9252e3e3", + "title": "Integer multiplication in time O(n log n)", "abstract": "We present + an algorithm that computes the product of two n-bit integers in O(n log n) + bit operations, thus confirming a conjecture of Schonhage and Strassen from + 1971. Our complexity analysis takes place in the multitape Turing machine + model, with integers encoded in the usual binary representa- tion. Central + to the new algorithm is a novel \u201cGaussian resampling\u201d technique + that enables us to reduce the integer multiplication problem to a collection + of multidimensional discrete Fourier transforms over the complex numbers, + whose dimensions are all powers of two. These transforms may then be evaluated + rapidly by means of Nussbaumer\u2019s fast polynomial transforms.", "venue": + "Annals of Mathematics", "year": 2021, "referenceCount": 35, "citationCount": + 117, "influentialCitationCount": 7, "isOpenAccess": true, "openAccessPdf": + {"url": "https://hal.archives-ouvertes.fr/hal-02070778v2/file/nlogn.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Annals of Mathematics"}, + "authors": [{"authorId": "144143525", "name": "David Harvey"}, {"authorId": + "145086461", "name": "J. Hoeven"}]}, {"paperId": "6d89738e3e38477a848e9353fb571128a6f2665d", + "externalIds": {"MAG": "21360042", "CorpusId": 115774167}, "corpusId": 115774167, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6d89738e3e38477a848e9353fb571128a6f2665d", + "title": "Space-bounded quantum computation", "abstract": "In this dissertation, + we investigate the computational power of quantum Turing machines operating + in bounded space. \nFirst, we consider space-bounds that are space-constructible + and at least logarithmic in the input size. For such space-bounds, it is shown + that quantum Turing machines and probabilistic Turing machines are equivalent + in power in the unbounded-error setting, in the sense that each model may + simulate the other with at most a constant factor increase in space. From + this, it follows that any quantum Turing machine computation can be simulated + deterministically with at most a quadratic increase in space, and can be simulated + deterministically in time at most exponential in the space-bound. Several + other facts regarding quantum complexity classes defined in terms of such + space-bounds are also proved. \nSecond, we consider the power of quantum Turing + machines restricted to constant space. In this case, we first prove that quantum + Turing machines having one-sided error and running in linear time are strictly + more powerful than probabilistic Turing machines having either one-sided error + or having two-sided bounded error and running in polynomial time. Second, + we prove that exact (i.e., accepting with probability 0 or 1) constant-space + quantum Turing machines upon which no restrictions on running time are placed + can recognize languages that cannot be recognized by any bounded-error constant-space + probabilistic Turing machine.", "venue": "", "year": 1998, "referenceCount": + 0, "citationCount": 18, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145264143", + "name": "J. Watrous"}, {"authorId": "145494759", "name": "E. Bach"}]}, {"paperId": + "6c9532fdb782cbbda25633ee779f5c4e24f0a9ed", "externalIds": {"DBLP": "conf/stoc/GalilKS86", + "MAG": "2051758697", "DOI": "10.1145/12130.12135", "CorpusId": 369391}, "corpusId": + 369391, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/6c9532fdb782cbbda25633ee779f5c4e24f0a9ed", "title": "On nontrivial separators for k-page graphs and simulations by nondeterministic one-tape Turing machines", "abstract": "Abstract We show that the following statements are equivalent: 1. Statement 1. 3-pushdown graphs have sublinear @@ -26101,7 +29411,8 @@ interactions: nondeterministic Turing machine that recognizes L requires \u03c9(n2/ls(n)) time for any positive integer.", "venue": "Symposium on the Theory of Computing", "year": 1986, "referenceCount": 18, "citationCount": 37, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://academiccommons.columbia.edu/doi/10.7916/D83T9R7W/download", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], @@ -26109,82 +29420,10 @@ interactions: {"name": "J. Comput. Syst. Sci.", "pages": "134-149", "volume": "38"}, "authors": [{"authorId": "1694216", "name": "Z. Galil"}, {"authorId": "144632403", "name": "R. Kannan"}, {"authorId": "1723843", "name": "E. Szemer\u00e9di"}]}, {"paperId": - "b63e73d5ddad04f60963499d7cc53ed83d3e2a03", "externalIds": {"MAG": "2091909693", - "DOI": "10.2140/PJM.1984.115.409", "CorpusId": 122419529}, "url": "https://www.semanticscholar.org/paper/b63e73d5ddad04f60963499d7cc53ed83d3e2a03", - "title": "DENSITY OF A FINAL SEGMENT OF THE TRUTH-TABLE DEGREES", "abstract": - "This work answers two questions from the topic of degrees of unsolvability, - which is part of recursive function theory. We give a simple and explicit - example of elementary inequivalence of the Turing degrees to the truth-table - degrees. In constructing this example, we show that every truth-table degree - above that of the halting problem is the jump of another truth-table degree. - The theory of degrees of unsolvability grew directly from the study of questions - about decidability. In 1939, Turing presented the concept of one theory being - decidable with respect to another theory [T]. Later, based on Turing''s work - with decidability, Kleene and Post defined degrees of unsolvability [KIP]. - Refinements of degees of unsolvability were defined in[P]. 2)\u038e is the - structure of all Turing (T) degrees with the induced partial ordering; S)iV - the structure of all truth-table (tt) degrees with the induced partial ordering. - For a discussion of Turing degrees and truth-table degrees see Rogers [R] - or Odifreddi [02]. As is standard we use boldface lower case letters to denote - degrees of unsolvability . The superscript denotes Turing jump and (n\\ the - Turing jump applied n times.", "venue": "", "year": 1984, "referenceCount": - 12, "citationCount": 20, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1984-12-01", "journal": {"name": - "Pacific Journal of Mathematics", "pages": "409-419", "volume": "115"}, "authors": - [{"authorId": "2742669", "name": "J. Mohrherr"}]}, {"paperId": "3b8930a2cab58aedd6cc71e97441a956d8d2f20e", - "externalIds": {"MAG": "2139194456", "DOI": "10.3390/50100051", "CorpusId": - 18427972}, "url": "https://www.semanticscholar.org/paper/3b8930a2cab58aedd6cc71e97441a956d8d2f20e", - "title": "A Short Review on Cardiotonic Steroids and Their Aminoguanidine - Analogues", "abstract": "Concepcion P. Melero*, Manuel Medarde and Arturo - San FelicianoDepartamento de Quimica Farmaceutica, Facultad de Farmacia, Campus - Miguel de Unamuno, 37007Salamanca, SpainTel.: +34 923 29 45 28, Fax: +34 923 - 29 45 15, E-mail: medarde@gugu.usal.es*Author to whom correspondence should - be addressed.Received: 14 November 1999 / Accepted: 9 December 1999 / Published: - 21 January 2000Abstract: A short review on cardiotonic steroids and their - analogues is presented. The natu-ral, semisynthetic and synthetic derivatives, - as well as their mechanism of action and struc-ture-activity relationships - are shown, with a special reference to aminoguanidine deriva-tives.Keywords: - Digitalis glycosides analogues, structure-activity relationships, inotropic - activ-ity, Na+,K+-ATPase, aminoguanidine analogues.", "venue": "", "year": - 2000, "referenceCount": 179, "citationCount": 120, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2000-01-21", "journal": {"name": "Molecules", "pages": "51-81", "volume": - "5"}, "authors": [{"authorId": "33510680", "name": "C. P. Melero"}, {"authorId": - "3235568", "name": "M. Medarde"}, {"authorId": "114381668", "name": "A. S. - Feliciano"}]}, {"paperId": "6d89738e3e38477a848e9353fb571128a6f2665d", "externalIds": - {"MAG": "21360042", "CorpusId": 115774167}, "url": "https://www.semanticscholar.org/paper/6d89738e3e38477a848e9353fb571128a6f2665d", - "title": "Space-bounded quantum computation", "abstract": "In this dissertation, - we investigate the computational power of quantum Turing machines operating - in bounded space. \nFirst, we consider space-bounds that are space-constructible - and at least logarithmic in the input size. For such space-bounds, it is shown - that quantum Turing machines and probabilistic Turing machines are equivalent - in power in the unbounded-error setting, in the sense that each model may - simulate the other with at most a constant factor increase in space. From - this, it follows that any quantum Turing machine computation can be simulated - deterministically with at most a quadratic increase in space, and can be simulated - deterministically in time at most exponential in the space-bound. Several - other facts regarding quantum complexity classes defined in terms of such - space-bounds are also proved. \nSecond, we consider the power of quantum Turing - machines restricted to constant space. In this case, we first prove that quantum - Turing machines having one-sided error and running in linear time are strictly - more powerful than probabilistic Turing machines having either one-sided error - or having two-sided bounded error and running in polynomial time. Second, - we prove that exact (i.e., accepting with probability 0 or 1) constant-space - quantum Turing machines upon which no restrictions on running time are placed - can recognize languages that cannot be recognized by any bounded-error constant-space - probabilistic Turing machine.", "venue": "", "year": 1998, "referenceCount": - 0, "citationCount": 18, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "145264143", "name": "J. Watrous"}, - {"authorId": "145494759", "name": "E. Bach"}]}, {"paperId": "d923fe094b15951318d0723b9cb7bbb3ff2ffe64", - "externalIds": {"ArXiv": "0906.5535", "MAG": "1985514554", "DOI": "10.1103/PhysRevE.80.030902", - "CorpusId": 10233746, "PubMed": "19905053"}, "url": "https://www.semanticscholar.org/paper/d923fe094b15951318d0723b9cb7bbb3ff2ffe64", + "d923fe094b15951318d0723b9cb7bbb3ff2ffe64", "externalIds": {"ArXiv": "0906.5535", + "MAG": "1985514554", "DOI": "10.1103/PhysRevE.80.030902", "CorpusId": 10233746, + "PubMed": "19905053"}, "corpusId": 10233746, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d923fe094b15951318d0723b9cb7bbb3ff2ffe64", "title": "Robust ecological pattern formation induced by demographic noise.", "abstract": "We demonstrate that demographic noise can induce persistent spatial pattern formation and temporal oscillations in the Levin-Segel predator-prey @@ -26197,8 +29436,9 @@ interactions: These results may account for the prevalence of large-scale ecological patterns, beyond that expected from traditional nonstochastic approaches.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": - 2009, "referenceCount": 64, "citationCount": 112, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine", "Biology"], + 2009, "referenceCount": 64, "citationCount": 114, "influentialCitationCount": + 9, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0906.5535", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": @@ -26206,58 +29446,160 @@ interactions: review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 030902\n ", "volume": "80 3 Pt 1"}, "authors": [{"authorId": "46825432", "name": "Thomas Butler"}, {"authorId": "3549131", "name": "N. Goldenfeld"}]}, {"paperId": - "5ee9e297ec4b2e2bcb60848d9659cd7e3209a34d", "externalIds": {"MAG": "1698983042", - "DBLP": "journals/corr/StrasbergCSB15", "ArXiv": "1506.00894", "DOI": "10.1103/PhysRevE.92.042104", - "CorpusId": 7023204, "PubMed": "26565165"}, "url": "https://www.semanticscholar.org/paper/5ee9e297ec4b2e2bcb60848d9659cd7e3209a34d", - "title": "Thermodynamics of stochastic Turing machines", "abstract": "In analogy - to Brownian computers we explicitly show how to construct stochastic models - which mimic the behavior of a general-purpose computer (a Turing machine). - Our models are discrete state systems obeying a Markovian master equation, - which are logically reversible and have a well-defined and consistent thermodynamic - interpretation. The resulting master equation, which describes a simple one-step - process on an enormously large state space, allows us to thoroughly investigate - the thermodynamics of computation for this situation. Especially in the stationary - regime we can well approximate the master equation by a simple Fokker-Planck - equation in one dimension. We then show that the entropy production rate at - steady state can be made arbitrarily small, but the total (integrated) entropy - production is finite and grows logarithmically with the number of computational - steps.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter - physics", "year": 2015, "referenceCount": 64, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-06-02", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042104\n ", - "volume": "92 4"}, "authors": [{"authorId": "49300917", "name": "P. Strasberg"}, - {"authorId": "2960771", "name": "J. Cerrillo"}, {"authorId": "34288407", "name": - "G. Schaller"}, {"authorId": "32675792", "name": "T. Brandes"}]}, {"paperId": - "3e55c7633a9f6f412b87967720bea01d3ac9a9f8", "externalIds": {"MAG": "1822366314", - "CorpusId": 137134530}, "url": "https://www.semanticscholar.org/paper/3e55c7633a9f6f412b87967720bea01d3ac9a9f8", - "title": "Impedance of slowly tapered structures", "abstract": "The transverse - and longitudinal impedances are studied for beam pipe struc\u00ad tures whose - radius is slowly varying as a function of the longitudinal position. The result - is expressed in the form of a simple integral of the radius.", "venue": "", - "year": 1990, "referenceCount": 1, "citationCount": 43, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1990-07-01", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "4430737", - "name": "K. Yokoya"}]}, {"paperId": "0b23d505ea4be3921c776d6c0c567e1479a4bf16", + "dac83c56d04fc8b24e2afdde51fa2543f1c81391", "externalIds": {"DBLP": "journals/ubiquity/Denning10b", + "MAG": "1963498652", "DOI": "10.1145/1880066.1880067", "CorpusId": 27587951}, + "corpusId": 27587951, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dac83c56d04fc8b24e2afdde51fa2543f1c81391", + "title": "Ubiquity symposium ''What is computation?'': Opening statement", + "abstract": "Most people understand a computation as a process evoked when + a computational agent acts on its inputs under the control of an algorithm. + The classical Turing machine model has long served as the fundamental reference + model because an appropriate Turing machine can simulate every other computational + model known. The Turing model is a good abstraction for most digital computers + because the number of steps to execute a Turing machine algorithm is predictive + of the running time of the computation on a digital computer. However, the + Turing model is not as well matched for the natural, interactive, and continuous + information processes frequently encountered today. Other models whose structures + more closely match the information processes involved give better predictions + of running time and space. Models based on transforming representations may + be useful.\n", "venue": "UBIQ", "year": 2010, "referenceCount": 38, "citationCount": + 20, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/1880066.1880067", "status": "BRONZE"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2010-11-01", "journal": {"name": "Ubiquity", "pages": "1", "volume": "2010"}, + "authors": [{"authorId": "1729148", "name": "P. Denning"}]}, {"paperId": "b63e73d5ddad04f60963499d7cc53ed83d3e2a03", + "externalIds": {"MAG": "2091909693", "DOI": "10.2140/PJM.1984.115.409", "CorpusId": + 122419529}, "corpusId": 122419529, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b63e73d5ddad04f60963499d7cc53ed83d3e2a03", + "title": "DENSITY OF A FINAL SEGMENT OF THE TRUTH-TABLE DEGREES", "abstract": + "This work answers two questions from the topic of degrees of unsolvability, + which is part of recursive function theory. We give a simple and explicit + example of elementary inequivalence of the Turing degrees to the truth-table + degrees. In constructing this example, we show that every truth-table degree + above that of the halting problem is the jump of another truth-table degree. + The theory of degrees of unsolvability grew directly from the study of questions + about decidability. In 1939, Turing presented the concept of one theory being + decidable with respect to another theory [T]. Later, based on Turing''s work + with decidability, Kleene and Post defined degrees of unsolvability [KIP]. + Refinements of degees of unsolvability were defined in[P]. 2)\u038e is the + structure of all Turing (T) degrees with the induced partial ordering; S)iV + the structure of all truth-table (tt) degrees with the induced partial ordering. + For a discussion of Turing degrees and truth-table degrees see Rogers [R] + or Odifreddi [02]. As is standard we use boldface lower case letters to denote + degrees of unsolvability . The superscript denotes Turing jump and (n\\ the + Turing jump applied n times.", "venue": "", "year": 1984, "referenceCount": + 12, "citationCount": 20, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "http://msp.org/pjm/1984/115-2/pjm-v115-n2-p12-s.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1984-12-01", + "journal": {"name": "Pacific Journal of Mathematics", "pages": "409-419", + "volume": "115"}, "authors": [{"authorId": "2742669", "name": "J. Mohrherr"}]}, + {"paperId": "9e0b37866a90047e4db40c7ef534274d445ebfc1", "externalIds": {"MAG": + "613330392", "CorpusId": 152387242}, "corpusId": 152387242, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9e0b37866a90047e4db40c7ef534274d445ebfc1", + "title": "MOTOR CARRIER SELECTION IN A DEREGULATED ENVIRONMENT", "abstract": + "The environment created by passage of the Motor Carrier Act of 1980 has provided + the transportation buyer with the opportunity to ex ercise significant market + buying power through such processes as negotiations and contracting. In addition, + growing pressure for cost reduction from foreign competitors and corporate + restruc turing actions (such as leveraged buyouts) have intensified shipper + pursuit of opportunities to reduce transportation costs. Changes thus have + resulted in the transportation buying decision making process utilized by + shippers. Considerable research has been conducted on", "venue": "", "year": + 1989, "referenceCount": 1, "citationCount": 74, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], + "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1989-09-01", "journal": {"name": "Transportation Journal", "pages": "4-11", + "volume": "29"}, "authors": [{"authorId": "31159588", "name": "E. Bardi"}, + {"authorId": "46200219", "name": "P. K. Bagchi"}, {"authorId": "144227882", + "name": "T. Raghunathan"}]}, {"paperId": "0b23d505ea4be3921c776d6c0c567e1479a4bf16", "externalIds": {"MAG": "2763421353", "DOI": "10.1007/S12190-017-1137-9", "CorpusId": - 125270608}, "url": "https://www.semanticscholar.org/paper/0b23d505ea4be3921c776d6c0c567e1479a4bf16", + 125270608}, "corpusId": 125270608, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0b23d505ea4be3921c776d6c0c567e1479a4bf16", "title": "Herd behavior in a predator\u2013prey model with spatial diffusion: bifurcation analysis and Turing instability", "abstract": null, "venue": "", "year": 2018, "referenceCount": 36, "citationCount": 32, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2018-10-01", - "journal": {"name": "Journal of Applied Mathematics and Computing", "pages": - "125-149", "volume": "58"}, "authors": [{"authorId": "103679695", "name": - "S. Djilali"}]}, {"paperId": "4cab0d1cb653754a636efd49fb10efb8772d7a58", "externalIds": - {"MAG": "2162703667", "DOI": "10.1109/81.473586", "CorpusId": 110129120}, - "url": "https://www.semanticscholar.org/paper/4cab0d1cb653754a636efd49fb10efb8772d7a58", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2018-10-01", "journal": {"name": "Journal of Applied Mathematics and Computing", + "pages": "125-149", "volume": "58"}, "authors": [{"authorId": "103679695", + "name": "S. Djilali"}]}, {"paperId": "63d0d034804dcaf73b9acc82ad3ddb593b8d6fdc", + "externalIds": {"MAG": "2062427321", "DOI": "10.1007/S00285-006-0013-2", "CorpusId": + 21671201, "PubMed": "16807749"}, "corpusId": 21671201, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/63d0d034804dcaf73b9acc82ad3ddb593b8d6fdc", + "title": "Diffusion, Cross-diffusion and Competitive Interaction", "abstract": + null, "venue": "Journal of Mathematical Biology", "year": 2006, "referenceCount": + 18, "citationCount": 115, "influentialCitationCount": 14, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2006-06-29", "journal": {"name": "Journal + of Mathematical Biology", "pages": "617-641", "volume": "53"}, "authors": + [{"authorId": "50044131", "name": "M. Iida"}, {"authorId": "34611334", "name": + "M. Mimura"}, {"authorId": "2897870", "name": "H. Ninomiya"}]}, {"paperId": + "b5394e76607f2cdd58c45d18511699da11beb229", "externalIds": {"MAG": "2528534253", + "CorpusId": 64461042}, "corpusId": 64461042, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b5394e76607f2cdd58c45d18511699da11beb229", + "title": "On Alan Turing and the Origins of Digital Computers", "abstract": + "This paper documents an investigation into the role that the late Alan Turing + played in the development of electronic computers. Evidence is presented that + during the war he was associated with a group that designed and built a series + of special purpose electronic computers, which were in at least a limited + sense \u2018program controlled\u2019, and that the origins of several post-war + general purpose computer projects in Britain can be traced back to these wartime + computers.", "venue": "", "year": 1972, "referenceCount": 32, "citationCount": + 38, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Machine intelligence", "volume": ""}, "authors": [{"authorId": + "145586245", "name": "B. Randell"}]}, {"paperId": "baed896a3b8d07accc122a86a654ffab6b286cc5", + "externalIds": {"DBLP": "journals/tamd/SongRZZ18", "MAG": "2777287263", "DOI": + "10.1109/TCDS.2017.2785332", "CorpusId": 54464286}, "corpusId": 54464286, + "publicationVenue": {"id": "f35f148a-0a3c-45db-b610-3d89e09ddf21", "name": + "IEEE Transactions on Cognitive and Developmental Systems", "type": "journal", + "alternate_names": ["IEEE Trans Cogn Dev Syst"], "issn": "2379-8920", "url": + "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=7274989"}, "url": + "https://www.semanticscholar.org/paper/baed896a3b8d07accc122a86a654ffab6b286cc5", + "title": "Spiking Neural P Systems With Colored Spikes", "abstract": "Spiking + neural P systems (SN P systems) are bio-inspired neural-like computing models, + which are obtained by abstracting the way of biological neurons\u2019 spiking + and communication by means of spikes in central nervous systems. SN P systems + performed well in describing and modeling behaviors that occur simultaneously, + yet weak at modeling complex systems with the limits of using a single spike. + In this paper, drawing on the idea from colored petri nets, SN P systems with + colored spikes are proposed, where a finite set of colors is introduced to + mark the spikes such that each spike is associated with a unique color. The + updated spiking rule is applied by consuming and emitting a number of colored + spikes (with the same or different colors). The computation power of the systems + is investigated. Specifically, it is shown that SN P systems with colored + spikes having three neurons are sufficient to compute Turing computable sets + of numbers, and such system having two neurons is able to compute the family + of recursive functions. These results improved the corresponding ones on the + number of neurons needed to construct universal SN P systems recently appeared + in [Neurocomputing, 2016, 193(12): 193\u2013200]. To our best knowledge, this + is the smallest number of neurons used to construct Turing universal SN P + systems as number generator and function computing device by far.", "venue": + "IEEE Transactions on Cognitive and Developmental Systems", "year": 2018, + "referenceCount": 74, "citationCount": 93, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-12-01", "journal": + {"name": "IEEE Transactions on Cognitive and Developmental Systems", "pages": + "1106-1115", "volume": "10"}, "authors": [{"authorId": "2001220881", "name": + "Tao Song"}, {"authorId": "1397793046", "name": "A. Rodr\u00edguez-Pat\u00f3n"}, + {"authorId": "2054597023", "name": "Pan Zheng"}, {"authorId": "2111549943", + "name": "Xiangxiang Zeng"}]}, {"paperId": "4cab0d1cb653754a636efd49fb10efb8772d7a58", + "externalIds": {"MAG": "2162703667", "DOI": "10.1109/81.473586", "CorpusId": + 110129120}, "corpusId": 110129120, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4cab0d1cb653754a636efd49fb10efb8772d7a58", "title": "Application of Kronecker products to the analysis of systems with uniform linear coupling", "abstract": "In this paper, we show how the Kronecker product can be useful in simplifying the notation encountered in the analysis @@ -26268,65 +29610,357 @@ interactions: In the second application we use the Kronecker product to obtain simple sufficient conditions for an array of linearly coupled dynamical systems to synchronize. We discuss briefly extensions to additive nonlinear coupling. >", "venue": - "", "year": 1995, "referenceCount": 4, "citationCount": 113, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + "", "year": 1995, "referenceCount": 4, "citationCount": 115, "influentialCitationCount": + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1995-10-01", "journal": {"name": "IEEE Transactions on Circuits and Systems + I-regular Papers", "pages": "775-778", "volume": "42"}, "authors": [{"authorId": + "1802250", "name": "C. Wu"}, {"authorId": "144848684", "name": "L. Chua"}]}, + {"paperId": "0292a0e8a638b9d35683bd78f4817385e3d4a2a9", "externalIds": {"MAG": + "582739059", "DOI": "10.1017/cbo9780511498435", "CorpusId": 142086551}, "corpusId": + 142086551, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0292a0e8a638b9d35683bd78f4817385e3d4a2a9", + "title": "Neurophilosophy at Work", "abstract": "1. Catching consciousness + in a recurrent network 2. Functionalism at forty: a critical perspective 3. + Toward a cognitive neurobiology of the moral virtues 4. Rules, know-how, and + the future of moral cognition 5. Science, religion, and American educational + policy 6. What happens to reliabilism when it is liberated from the propositional + attitudes 7. On the nature of intelligence: Turing, Church, von Neumann, and + the brain 8. Neurosemantics: on the mapping of minds and the portrayal of + worlds 9. Chimerical colors: some phenomenological predictions from cognitive + neuroscience 10. On the reality (and diversity) of objective colors 11. Into + the brain: where philosophy should go from here.", "venue": "", "year": 2007, + "referenceCount": 144, "citationCount": 116, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2007-04-09", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "37069078", "name": "P. Churchland"}]}, {"paperId": "49befb6284053682a7fbf389ff6bf659cf7eb000", + "externalIds": {"MAG": "1608518359", "DBLP": "journals/fuin/DennunzioFM12", + "DOI": "10.3233/FI-2012-755", "CorpusId": 27340159}, "corpusId": 27340159, + "publicationVenue": {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", "name": + "Fundamenta Informaticae", "type": "journal", "alternate_names": ["Fundam + Informaticae"], "issn": "0169-2968", "url": "http://content.iospress.com/journals/fundamenta-informaticae", + "alternate_urls": ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, + "url": "https://www.semanticscholar.org/paper/49befb6284053682a7fbf389ff6bf659cf7eb000", + "title": "Computing Issues of Asynchronous CA", "abstract": "This work studies + some aspects of the computational power of fully asynchronous cellular automata + ACA. We deal with some notions of simulation between ACA and Turing Machines. + In particular, we characterize the updating sequences specifying which are + \u201cuniversal\u201d, i.e., allowing a specific family of ACA to simulate + any Turing machine on any input. We also consider the computational cost of + such simulations. Finally, we deal with ACA equipped with peculiar updating + sequences, namely those generated by random walks.", "venue": "Fundamenta + Informaticae", "year": 2012, "referenceCount": 28, "citationCount": 29, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-04-01", "journal": + {"name": "Fundam. Informaticae", "pages": "165-180", "volume": "120"}, "authors": + [{"authorId": "1736354", "name": "A. Dennunzio"}, {"authorId": "1731945", + "name": "E. Formenti"}, {"authorId": "1740428", "name": "L. Manzoni"}]}, {"paperId": + "d04a7809a3e09ceab55f62f5c90d82d970c9ac3e", "externalIds": {"ArXiv": "0912.0027", + "DBLP": "conf/soda/CookFS11", "MAG": "2073933131", "DOI": "10.1137/1.9781611973082.45", + "CorpusId": 765445}, "corpusId": 765445, "publicationVenue": {"id": "5545566b-c0b8-418c-83a5-a986a4657572", + "name": "ACM-SIAM Symposium on Discrete Algorithms", "type": "conference", + "alternate_names": ["Symposium on Discrete Algorithms", "ACM-SIAM Symp Discret + Algorithm", "Symp Discret Algorithm", "SODA"], "url": "https://en.wikipedia.org/wiki/Symposium_on_Discrete_Algorithms"}, + "url": "https://www.semanticscholar.org/paper/d04a7809a3e09ceab55f62f5c90d82d970c9ac3e", + "title": "Temperature 1 self-assembly: deterministic assembly in 3D and probabilistic + assembly in 2D", "abstract": "We investigate the power of the Wang tile self-assembly + model at temperature 1, a threshold value that permits attachment between + any two tiles that share even a single bond. When restricted to deterministic + assembly in the plane, no temperature 1 assembly system has been shown to + build a shape with a tile complexity smaller than the diameter of the shape. + In contrast, we show that temperature 1 self-assembly in 3 dimensions, even + when growth is restricted to at most 1 step into the third dimension, is capable + of simulating a large class of temperature 2 systems, in turn permitting the + simulation of arbitrary Turing machines and the assembly of n x n squares + in near optimal O(log n) tile complexity. Further, we consider temperature + 1 probabilistic assembly in 2D, and show that with a logarithmic scale up + of tile complexity and shape scale, the same general class of temperature + \u03c4 = 2 systems can be simulated, yielding Turing machine simulation and + O(log2 n) assembly of n x n squares with high probability. Our results show + a sharp contrast in achievable tile complexity at temperature 1 if either + growth into the third dimension or a small probability of error are permitted. + Motivated by applications in nanotechnology and molecular computing, and the + plausibility of implementing 3 dimensional self-assembly systems, our techniques + may provide the needed power of temperature 2 systems, while at the same time + avoiding the experimental challenges faced by those systems.", "venue": "ACM-SIAM + Symposium on Discrete Algorithms", "year": 2009, "referenceCount": 36, "citationCount": + 92, "influentialCitationCount": 14, "isOpenAccess": true, "openAccessPdf": + {"url": "https://epubs.siam.org/doi/pdf/10.1137/1.9781611973082.45", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-11-30", "journal": + {"name": "ArXiv", "volume": "abs/0912.0027"}, "authors": [{"authorId": "144828543", + "name": "Matthew Cook"}, {"authorId": "1787102", "name": "Yunhui Fu"}, {"authorId": + "2205907", "name": "R. Schweller"}]}, {"paperId": "5546c3a3978f4668a4a5c044148de22f85ffd550", + "externalIds": {"MAG": "2001385353", "DBLP": "journals/tciaig/WarwickS14", + "DOI": "10.1109/TCIAIG.2013.2283538", "CorpusId": 16283359}, "corpusId": 16283359, + "publicationVenue": {"id": "c56495e2-32b0-440c-b5e2-839c615cfbe5", "name": + "IEEE Transactions on Computational Intelligence and AI in Games", "type": + "journal", "alternate_names": ["IEEE Trans Comput Intell AI Game"], "issn": + "1943-068X", "alternate_issns": ["1943-0698"], "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=4804728", + "alternate_urls": ["http://ieee-cis.org/pubs/tciaig/"]}, "url": "https://www.semanticscholar.org/paper/5546c3a3978f4668a4a5c044148de22f85ffd550", + "title": "Good Machine Performance in Turing''s Imitation Game", "abstract": + "In this paper, we consider transcripts which originated from a practical + series of Turing''s Imitation Game that was held on June 23, 2012, at Bletchley + Park, U.K. In some cases, the tests involved a three-participant simultaneous + comparison of two hidden entities, whereas others were the result of a direct + two-participant interaction. Each of the transcripts considered here resulted + in a human interrogator being fooled, by a machine, into concluding that they + had been conversing with a human. Particular features of the conversation + are highlighted, successful ploys on the part of each machine are discussed, + and likely reasons for the interrogator being fooled are considered. Subsequent + feedback from the interrogators involved is also included.", "venue": "IEEE + Transactions on Computational Intelligence and AI in Games", "year": 2014, + "referenceCount": 33, "citationCount": 26, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2014-09-01", "journal": {"name": "IEEE + Transactions on Computational Intelligence and AI in Games", "pages": "289-299", + "volume": "6"}, "authors": [{"authorId": "143636026", "name": "K. Warwick"}, + {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": "bc0f4a361722e56a94078a148b085f4189721cd4", + "externalIds": {"MAG": "1577467529", "CorpusId": 16478785}, "corpusId": 16478785, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc0f4a361722e56a94078a148b085f4189721cd4", + "title": "Turing and the Riemann Hypothesis", "abstract": "The calculations + had been planned some time in advance, but had in fact to be carried out in + great haste. If it had not been for the fact that the computer remained in + serviceable condition for an unusually long period from 3 p.m. one afternoon + to 8 a.m. the following morning it is probable that the calculations would + never have been done at all. As it was, the interval 2\u03c0.632 < t < 2\u03c0.642 + was investigated during that period, and very little more was accomplished.", + "venue": "", "year": 2006, "referenceCount": 19, "citationCount": 22, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2006-11-01", "journal": {"name": "Notices of the American Mathematical Society", + "pages": "1208-1211", "volume": ""}, "authors": [{"authorId": "3063921", "name": + "A. Booker"}]}, {"paperId": "7f13f90795e6ba8d50bb5d6e1e5527de9b08e834", "externalIds": + {"MAG": "2085656217", "DBLP": "journals/entcs/BusiGZ97", "DOI": "10.1016/S1571-0661(05)80467-0", + "CorpusId": 25712935}, "corpusId": 25712935, "publicationVenue": {"id": "9828e623-666b-4033-96b2-f340f9d6d2a9", + "name": "International Workshop on Expressiveness in Concurrency", "type": + "conference", "alternate_names": ["EXPRESS", "Int Workshop Expressiveness + Concurr"]}, "url": "https://www.semanticscholar.org/paper/7f13f90795e6ba8d50bb5d6e1e5527de9b08e834", + "title": "On the Turing equivalence of Linda coordination primitives", "abstract": + null, "venue": "International Workshop on Expressiveness in Concurrency", + "year": 1999, "referenceCount": 14, "citationCount": 49, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1999-12-06", "journal": + {"pages": "75"}, "authors": [{"authorId": "1789091", "name": "N. Busi"}, {"authorId": + "1743074", "name": "R. Gorrieri"}, {"authorId": "1777352", "name": "G. Zavattaro"}]}, + {"paperId": "da26e2b5f6bddfc6398eeb39e191836f6827f08c", "externalIds": {"MAG": + "2315182694", "DOI": "10.1515/TJJ.1990.7.3-4.297", "CorpusId": 113104601}, + "corpusId": 113104601, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/da26e2b5f6bddfc6398eeb39e191836f6827f08c", + "title": "A Review of Friction Damping of Turbine Blade Vibration", "abstract": + "This paper reviews recent research on analyzing and designing friction dampers + to reduce turbine blade vibration. It discusses previous literature reviews, + methods of analysis, models of friction constraint , methods of modelling + the structural aspects of the system, procedures for optimizing the damper + ''s design, and some research on related problems. The author a t t empts + to indicate some of the limitations and advantages of the cited methods. Conclusions + are drawn concerning the current state-ofthe-art and recommendat ions are + made regarding directions for fu ture research and development.", "venue": + "", "year": 1990, "referenceCount": 30, "citationCount": 114, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": {"name": "International Journal of Turbo + and Jet Engines", "pages": "297 - 308", "volume": "7"}, "authors": [{"authorId": + "3118099", "name": "J. Griffin"}]}, {"paperId": "357da8861465de56c05259aeb7bf2116f7e73d21", + "externalIds": {"DBLP": "conf/nips/LakeST13", "MAG": "2114168642", "CorpusId": + 1433222}, "corpusId": 1433222, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/357da8861465de56c05259aeb7bf2116f7e73d21", + "title": "One-shot learning by inverting a compositional causal process", + "abstract": "People can learn a new visual class from just one example, yet + machine learning algorithms typically require hundreds or thousands of examples + to tackle the same problems. Here we present a Hierarchical Bayesian model + based on com-positionality and causality that can learn a wide range of natural + (although simple) visual concepts, generalizing in human-like ways from just + one image. We evaluated performance on a challenging one-shot classification + task, where our model achieved a human-level error rate while substantially + outperforming two deep learning models. We also tested the model on another + conceptual task, generating new examples, by using a \"visual Turing test\" + to show that our model produces human-like performance.", "venue": "NIPS", + "year": 2013, "referenceCount": 30, "citationCount": 214, "influentialCitationCount": + 23, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-12-05", + "journal": {"pages": "2526-2534"}, "authors": [{"authorId": "2373318", "name": + "B. Lake"}, {"authorId": "145124475", "name": "R. Salakhutdinov"}, {"authorId": + "1763295", "name": "J. Tenenbaum"}]}, {"paperId": "457704a70aba87c437a9dd9b39b10da9efb19488", + "externalIds": {"MAG": "2084495697", "DOI": "10.1177/105960117700200408", + "CorpusId": 145165096}, "corpusId": 145165096, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/457704a70aba87c437a9dd9b39b10da9efb19488", + "title": "Guidelines for Cross-Cultural Communication Effectiveness", "abstract": + "Among cross-cultural trainers and researchers, considerable attention has + been fo cused on problems individuals encounter in adapting to new cultures + or subcul tures. For the many volunteers and professionals who live and work + in a cross- cultural setting, the question of how to effectively transfer + knowledge and skills to persons of different cultural backgrounds is an equally + great concern.", "venue": "", "year": 1977, "referenceCount": 25, "citationCount": + 58, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1977-12-01", "journal": + {"name": "Group & Organization Management", "pages": "470 - 479", "volume": + "2"}, "authors": [{"authorId": "51392630", "name": "B. Ruben"}]}, {"paperId": + "07f6b2ceef8c3979b1168fe9ebb1e870470e4585", "externalIds": {"PubMedCentral": + "5258822", "MAG": "2443634204", "ArXiv": "1301.2002", "DOI": "10.1007/s00285-016-1035-z", + "CorpusId": 5942606, "PubMed": "27305913"}, "corpusId": 5942606, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/07f6b2ceef8c3979b1168fe9ebb1e870470e4585", + "title": "Instability of turing patterns in reaction-diffusion-ODE systems", + "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2013, + "referenceCount": 49, "citationCount": 38, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc5258822?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-01-09", "journal": + {"name": "Journal of Mathematical Biology", "pages": "583 - 618", "volume": + "74"}, "authors": [{"authorId": "1389565398", "name": "A. Marciniak-Czochra"}, + {"authorId": "101468044", "name": "G. Karch"}, {"authorId": "2118679527", + "name": "Kanako Suzuki"}]}, {"paperId": "2c5044c18e4d22d896161a0c670e10e25fe03193", + "externalIds": {"MAG": "2089965269", "DOI": "10.1007/S10910-010-9699-X", "CorpusId": + 122170488}, "corpusId": 122170488, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c5044c18e4d22d896161a0c670e10e25fe03193", + "title": "Turing pattern amplitude equation for a model glycolytic reaction-diffusion + system", "abstract": null, "venue": "", "year": 2010, "referenceCount": 25, + "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-06-10", + "journal": {"name": "Journal of Mathematical Chemistry", "pages": "841-855", + "volume": "48"}, "authors": [{"authorId": "27412483", "name": "A. K. Dutt"}]}, + {"paperId": "47c0330eeff24966a98922d91a68a77a9d731159", "externalIds": {"MAG": + "2137989418", "DBLP": "conf/mobicom/PengLLLL11", "DOI": "10.1145/2030613.2030628", + "CorpusId": 1867786}, "corpusId": 1867786, "publicationVenue": {"id": "5440268e-4691-4fc0-8d0e-dcd6df18e77f", + "name": "ACM/IEEE International Conference on Mobile Computing and Networking", + "type": "conference", "alternate_names": ["MOBICOM", "MobiCom", "ACM/IEEE + Int Conf Mob Comput Netw"], "url": "http://www.acm.org/sigs/sigmobile/"}, + "url": "https://www.semanticscholar.org/paper/47c0330eeff24966a98922d91a68a77a9d731159", + "title": "Traffic-driven power saving in operational 3G cellular networks", + "abstract": "Base stations (BSes) in the 3G cellular network are not energy + proportional with respect to their carried traffic load. Our mea- surements + show that 3G traffic exhibits high fluctuations both in time and over space, + thus incurring energy waste. In this paper, we propose a profile-based approach + to green cellular infrastruc- ture. We profile BS traffic and approximate + network-wide energy proportionality using non-load-adaptive BSes. The instrument + is to leverage temporal-spatial traffic diversity and node deployment heterogeneity, + and power off under-utilized BSes under light traf- fic. Our evaluation on + four regional 3G networks shows that this simple scheme yields up to 53% energy + savings in a dense large city and 23% in a sparse, mid-sized city.", "venue": + "ACM/IEEE International Conference on Mobile Computing and Networking", "year": + 2011, "referenceCount": 39, "citationCount": 228, "influentialCitationCount": + 32, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Book", "Conference"], "publicationDate": + "2011-09-19", "journal": {"name": "Proceedings of the 17th annual international + conference on Mobile computing and networking"}, "authors": [{"authorId": + "1798566", "name": "Chunyi Peng"}, {"authorId": "3123308", "name": "Suk-Bok + Lee"}, {"authorId": "2014352", "name": "Songwu Lu"}, {"authorId": "153819036", + "name": "Haiyun Luo"}, {"authorId": "3178200", "name": "Hewu Li"}]}, {"paperId": + "c808910db3bca583093cee0eed09e7d9b4b91eae", "externalIds": {"MAG": "2070405017", + "DOI": "10.5860/choice.36-5731", "CorpusId": 144279226}, "corpusId": 144279226, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c808910db3bca583093cee0eed09e7d9b4b91eae", + "title": "Information Ages: Literacy, Numeracy, and the Computer Revolution", + "abstract": "From the Publisher: \nThe late 20th century is trumpeted as the + Information Age by pundits and politicians alike, and on the face of it, the + claim requires no justification. But in Information Ages, Michael E. Hobart + and Zachary S. Schiffman challenge this widespread assumption. In a sweeping + and captivating history of information technology from the ancient Sumerians + to the world of Alan Turing and John von Neumann, the authors show how revolutions + in the technology of information storage - from the invention of writing approximately + 5000 years ago to the mathematical models for describing physical reality + in the 17th and 18th centuries to the introduction of computers - profoundly + transformed ways of thinking.", "venue": "", "year": 1998, "referenceCount": + 1, "citationCount": 111, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": + "History", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1998-09-30", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "40444882", "name": "M. Hobart"}, + {"authorId": "89462987", "name": "Zachary Schiffman"}]}, {"paperId": "3e55c7633a9f6f412b87967720bea01d3ac9a9f8", + "externalIds": {"MAG": "1822366314", "CorpusId": 137134530}, "corpusId": 137134530, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e55c7633a9f6f412b87967720bea01d3ac9a9f8", + "title": "Impedance of slowly tapered structures", "abstract": "The transverse + and longitudinal impedances are studied for beam pipe struc\u00ad tures whose + radius is slowly varying as a function of the longitudinal position. The result + is expressed in the form of a simple integral of the radius.", "venue": "", + "year": 1990, "referenceCount": 1, "citationCount": 43, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1990-07-01", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "4430737", "name": "K. Yokoya"}]}, {"paperId": "172a8802fe3fbf3bab2f1b2baab9a7885c9037ca", + "externalIds": {"MAG": "2039241442", "DOI": "10.1112/S0024611599011818", "CorpusId": + 120438927}, "corpusId": 120438927, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/172a8802fe3fbf3bab2f1b2baab9a7885c9037ca", + "title": "Cupping the Recursively Enumerable Degrees by D.R.E. Degrees", "abstract": + "We prove that there are two incomplete d.r.e. degrees (the Turing degrees + of differences of two recursively enumerable sets) such that every non\u2010zero + recursively enumerable degree cups at least one of them to 0\u2032, the greatest + recursively enumerable (Turing) degree. 1991 Mathematics Subject Classification: + primary 03D25, 03D30; secondary 03D35.", "venue": "", "year": 1999, "referenceCount": + 20, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1995-10-01", - "journal": {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", - "pages": "775-778", "volume": "42"}, "authors": [{"authorId": "1802250", "name": - "C. Wu"}, {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "cf76dbcf7d7fff4a141fe8a102e96cb0907dc421", - "externalIds": {"DBLP": "journals/corr/Walsh15a", "ArXiv": "1510.09033", "MAG": - "1933538929", "DOI": "10.1145/2838729", "CorpusId": 12970671}, "url": "https://www.semanticscholar.org/paper/cf76dbcf7d7fff4a141fe8a102e96cb0907dc421", - "title": "Turing''s red flag", "abstract": "A proposal for a law to prevent - artificial intelligence systems from being mistaken for humans.", "venue": - "Communications of the ACM", "year": 2015, "referenceCount": 5, "citationCount": - 18, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-10-30", "journal": {"name": "Communications - of the ACM", "pages": "34 - 37", "volume": "59"}, "authors": [{"authorId": - "1733716", "name": "T. Walsh"}]}, {"paperId": "08d239c7c9fee09c6a3a578d337b67e92b506670", - "externalIds": {"MAG": "2148328606", "CorpusId": 1249358}, "url": "https://www.semanticscholar.org/paper/08d239c7c9fee09c6a3a578d337b67e92b506670", - "title": "Facing up to Faults", "abstract": "After the war, Turing re-appeared - on the public scene, so to speak, and was instrumental in initiating the work - at the National Physical Laboratory (NPL) on electronic computers. This provides - me another point of contact with him, since - aside from a brief flirtation - with the IBM 650, a boringly easy computer to program - my initial years as - a programmer were spent trying to cope with the English Electric DEUCE computer. - This computer was a direct descendant of the machine that Turing designed - at NPL in the early years after the war. Thanks to Turing\u2019s design, DEUCE - was typically much faster in operation than its rivals, albeit almost entirely - at the expense of its programmers. Such was the innocence of youth that I - and my colleagues actually enjoyed its intricacies, and the problem of finding - ways of automating, at least partially, the programming task. Indeed, we felt - that contemporary American computer developments, by IBM and others, such - as the provision of what seemed to us to be huge memories, and of floating - point arithmetic hardware, were in effect cheating. Certainly they were depriving - compiler writers such as ourselves of interesting and (we thought) worthwhile - challenges.", "venue": "", "year": 2000, "referenceCount": 35, "citationCount": - 45, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "The - Computer Journal", "volume": ""}, "authors": [{"authorId": "145586245", "name": - "B. Randell"}]}, {"paperId": "39d5978ca6236fe4b9b76cd424c20ebb00afbc3b", "externalIds": - {"DOI": "10.5948/upo9780883859742.031", "CorpusId": 10883078}, "url": "https://www.semanticscholar.org/paper/39d5978ca6236fe4b9b76cd424c20ebb00afbc3b", - "title": "A Study of Logic and Programming via Turing Machines Universal Turing - Machine", "abstract": "Unified replicated information have led to many compelling - advances, including the Turing machine and Moore\u2019s Law. Given the current - status of distributed modalities, security experts predictably desire the - deployment of spreadsheets, which embodies the appropriate principles of e-voting - technology. In this work, we concentrate our efforts on disproving that red-black - trees and congestion control are often incompatible. Despite the fact that - such a hypothesis might seem perverse, it is derived from known results.", - "venue": "", "year": 2011, "referenceCount": 154, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "3024181", - "name": "Jerry Lodder"}]}, {"paperId": "1c762367c8352f85ec5bf00aa1995430c6add293", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-07-01", "journal": {"name": + "Proceedings of the London Mathematical Society", "volume": "79"}, "authors": + [{"authorId": "145546987", "name": "Angsheng Li"}, {"authorId": "2096826", + "name": "X. Yi"}]}, {"paperId": "6190b1f31e6c0f92cd37715760f6da481b2e97d0", + "externalIds": {"DBLP": "journals/tcs/Dauchet92", "MAG": "2024726864", "DOI": + "10.1016/0304-3975(92)90022-8", "CorpusId": 23787605}, "corpusId": 23787605, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/6190b1f31e6c0f92cd37715760f6da481b2e97d0", + "title": "Simulation of Turing Machines by a Regular Rewrite Rule", "abstract": + null, "venue": "Theoretical Computer Science", "year": 1992, "referenceCount": + 6, "citationCount": 50, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1992-09-14", "journal": {"name": "Theor. Comput. Sci.", + "pages": "409-420", "volume": "103"}, "authors": [{"authorId": "1766675", + "name": "M. Dauchet"}]}, {"paperId": "d1b42ea63e85600659d41f8b570cafc01ee16f44", + "externalIds": {"MAG": "2949894438", "ArXiv": "cmp-lg/9606013", "DBLP": "conf/acl-vlc/Samuelsson96", + "ACL": "W96-0106", "CorpusId": 3266457}, "corpusId": 3266457, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d1b42ea63e85600659d41f8b570cafc01ee16f44", + "title": "Relating Turing\u2019s Formula and Zipf\u2019s Law", "abstract": + "An asymptote is derived from Turing''s local reestimation formula for population + frequencies, and a local reestimation formula is derived from Zipf''s law + for the asymptotic behavior of population frequencies. The two are shown to + be qualitatively different asymptotically, but nevertheless to be instances + of a common class of reestimation-formula-asymptote pairs, in which they constitute + the upper and lower bounds of the convergence region of the cumulative of + the frequency function, as rank tends to infinity. The results demonstrate + that Turing''s formula is qualitatively different from the various extensions + to Zipf''s law, and suggest that it smooths the frequency estimates towards + a geometric distribution.", "venue": "VLC@COLING", "year": 1996, "referenceCount": + 15, "citationCount": 25, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1996-06-01", "journal": {"name": "ArXiv", "volume": "cmp-lg/9606013"}, "authors": + [{"authorId": "2403128", "name": "C. Samuelsson"}]}, {"paperId": "1c762367c8352f85ec5bf00aa1995430c6add293", "externalIds": {"MAG": "2552508639", "DBLP": "conf/ijcnn/TkacikK16", "DOI": - "10.1109/IJCNN.2016.7727551", "CorpusId": 17799742}, "url": "https://www.semanticscholar.org/paper/1c762367c8352f85ec5bf00aa1995430c6add293", + "10.1109/IJCNN.2016.7727551", "CorpusId": 17799742}, "corpusId": 17799742, + "publicationVenue": {"id": "f80ba4a3-7aed-4021-b4d8-e4f50668847a", "name": + "IEEE International Joint Conference on Neural Network", "type": "conference", + "alternate_names": ["IJCNN", "IEEE Int Jt Conf Neural Netw", "Int Jt Conf + Neural Netw", "International Joint Conference on Neural Network"], "url": + "http://www.wikicfp.com/cfp/program?id=1573"}, "url": "https://www.semanticscholar.org/paper/1c762367c8352f85ec5bf00aa1995430c6add293", "title": "Neural Turing Machine for sequential learning of human mobility patterns", "abstract": "The capacity of recurrent neural networks to learn complex sequential patterns is improving. Recent developments such as Clockwork @@ -26340,36 +29974,83 @@ interactions: in anti-drug police department to predict mobility of suspects.", "venue": "IEEE International Joint Conference on Neural Network", "year": 2016, "referenceCount": 17, "citationCount": 21, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2016-07-24", "journal": {"name": "2016 International Joint Conference on - Neural Networks (IJCNN)", "pages": "2790-2797"}, "authors": [{"authorId": - "108197474", "name": "John J. Tkacik"}, {"authorId": "2509371", "name": "P. - Kord\u00edk"}]}, {"paperId": "a13af5f29bc745bd08a8f87e05545c20954bb0c2", "externalIds": - {"MAG": "1979172959", "DOI": "10.1111/J.1469-8137.1953.TB05203.X", "CorpusId": - 84106352}, "url": "https://www.semanticscholar.org/paper/a13af5f29bc745bd08a8f87e05545c20954bb0c2", - "title": "A COMMENTARY ON TURING''S DIFFUSION\u2010REACTION THEORY OF MORPHOGENESIS", - "abstract": null, "venue": "", "year": 1953, "referenceCount": 4, "citationCount": - 47, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}], - "publicationTypes": null, "publicationDate": "1953-02-01", "journal": {"name": - "New Phytologist", "pages": "40-47", "volume": "52"}, "authors": [{"authorId": - "40705436", "name": "C. Wardlaw"}]}, {"paperId": "63d0d034804dcaf73b9acc82ad3ddb593b8d6fdc", - "externalIds": {"MAG": "2062427321", "DOI": "10.1007/S00285-006-0013-2", "CorpusId": - 21671201, "PubMed": "16807749"}, "url": "https://www.semanticscholar.org/paper/63d0d034804dcaf73b9acc82ad3ddb593b8d6fdc", - "title": "Diffusion, Cross-diffusion and Competitive Interaction", "abstract": - null, "venue": "Journal of Mathematical Biology", "year": 2006, "referenceCount": - 18, "citationCount": 114, "influentialCitationCount": 13, "isOpenAccess": - false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-06-29", "journal": {"name": "Journal of Mathematical - Biology", "pages": "617-641", "volume": "53"}, "authors": [{"authorId": "50044131", - "name": "M. Iida"}, {"authorId": "34611334", "name": "M. Mimura"}, {"authorId": - "2897870", "name": "H. Ninomiya"}]}, {"paperId": "33ff2e9da3e4ce7d90c5ef7d369ea6c877ed933d", - "externalIds": {"DBLP": "conf/mm/ChenCCL06", "MAG": "2065564506", "DOI": "10.1145/1178782.1178808", - "CorpusId": 1799723}, "url": "https://www.semanticscholar.org/paper/33ff2e9da3e4ce7d90c5ef7d369ea6c877ed933d", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2016-07-24", "journal": {"name": "2016 + International Joint Conference on Neural Networks (IJCNN)", "pages": "2790-2797"}, + "authors": [{"authorId": "108197474", "name": "John J. Tkacik"}, {"authorId": + "2509371", "name": "P. Kord\u00edk"}]}, {"paperId": "4656f1fad8dff5e2bac13f4076cfc0d4a61ce7ff", + "externalIds": {"MAG": "2167784134", "DOI": "10.1007/S00605-002-0545-5", "CorpusId": + 123839887}, "corpusId": 123839887, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4656f1fad8dff5e2bac13f4076cfc0d4a61ce7ff", + "title": "P\u2260NP for Infinite Time Turing Machines", "abstract": null, + "venue": "", "year": 2003, "referenceCount": 4, "citationCount": 25, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/math/0106087v1.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-08-01", + "journal": {"name": "Monatshefte f\u00fcr Mathematik", "pages": "335-340", + "volume": "139"}, "authors": [{"authorId": "144459126", "name": "R. Schindler"}]}, + {"paperId": "3a0535cf9abb931646e07cdf875a4ae081e0dafb", "externalIds": {"CorpusId": + 16610724}, "corpusId": 16610724, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a0535cf9abb931646e07cdf875a4ae081e0dafb", + "title": "Tool Integration in Software Engineering Environments", "abstract": + "This article presents doctoral research on tool int egration within software + engineering environments. Tool int egration concerns the techniques used to + form coalitions of to ls that provide an environment supporting some, or all, + act ivities within the software engineering process. Some inte res ing phenomena + have been observed, such as the ad hoc na ture of tool integration in one + particular software enginee ring company. This observation is at variance + to the com m n perception of widespread integration suggested by t ool vendors + and some previous academic literature. Ini tial results suggest that integration + must be implemented for bu siness reasons, not for its own sake.", "venue": + "", "year": 2005, "referenceCount": 8, "citationCount": 111, "influentialCitationCount": + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "145335707", + "name": "M. Wicks"}]}, {"paperId": "82b8dcab3b1763377df41665a327261fa720514b", + "externalIds": {"DBLP": "journals/iacr/LinPST15", "MAG": "2952950903", "DOI": + "10.1007/978-3-662-49096-9_5", "CorpusId": 16275771}, "corpusId": 16275771, + "publicationVenue": {"id": "5f558f42-4459-4db5-9c48-77c92ba99511", "name": + "Theory of Cryptography Conference", "type": "conference", "alternate_names": + ["Theory Cryptogr Conf", "TCC"], "url": "https://www.iacr.org/meetings/tcc/"}, + "url": "https://www.semanticscholar.org/paper/82b8dcab3b1763377df41665a327261fa720514b", + "title": "Output-Compressing Randomized Encodings and Applications", "abstract": + null, "venue": "Theory of Cryptography Conference", "year": 2016, "referenceCount": + 31, "citationCount": 43, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2016-01-10", + "journal": {"pages": "96-124"}, "authors": [{"authorId": "3596858", "name": + "Huijia Lin"}, {"authorId": "1811683", "name": "R. Pass"}, {"authorId": "34185195", + "name": "Karn Seth"}, {"authorId": "39925569", "name": "Sidharth Telang"}]}, + {"paperId": "ef2fb09d175826dac75ab450b1f2fe6925a9adf2", "externalIds": {"MAG": + "1971117297", "DOI": "10.1177/106939719402800301", "CorpusId": 30868079}, + "corpusId": 30868079, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ef2fb09d175826dac75ab450b1f2fe6925a9adf2", + "title": "Street Children in the Developing World: A Review of Their Condition", + "abstract": "The article reviews the literature on street children and points + out why there are street children in certain cultures and not in others. The + reasons for their existence are related to poverty, abuse, and modernizing + factors. Street children are defined and distinguished from working and refugee + children. Details about the family struc ture of street children are given. + How the children cope and their level of psychological functioning are discussed. + The article gives reasons for why the children are treated with such violence + and gives attention to methodological research problems that include the children''s + ability to distort information, the researcher''s procliv ity to under- or + overestimate the children''s emotional condition, distortions of facts created + by the press and international organiza tions, and general cross-cultural + research issues.", "venue": "", "year": 1994, "referenceCount": 161, "citationCount": + 209, "influentialCitationCount": 16, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.sjsu.edu/faculty/laptekar/download/crossculturalresearch.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1994-08-01", + "journal": {"name": "Cross-Cultural Research", "pages": "195 - 224", "volume": + "28"}, "authors": [{"authorId": "66663062", "name": "L. Aptekar"}]}, {"paperId": + "33ff2e9da3e4ce7d90c5ef7d369ea6c877ed933d", "externalIds": {"DBLP": "conf/mm/ChenCCL06", + "MAG": "2065564506", "DOI": "10.1145/1178782.1178808", "CorpusId": 1799723}, + "corpusId": 1799723, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/33ff2e9da3e4ce7d90c5ef7d369ea6c877ed933d", "title": "Human action recognition using star skeleton", "abstract": "This paper presents a HMM-based methodology for action recogni-tion using star skeleton as a representative descriptor of human posture. Star skeleton is @@ -26398,115 +30079,128 @@ interactions: recognition is achieved by referring a period of posture history using a sliding window scheme. The experimental results show promising performance.", "venue": "VSSN ''06", "year": 2006, "referenceCount": 36, "citationCount": 152, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-10-27", "journal": {"pages": "171-178"}, "authors": - [{"authorId": "2115399299", "name": "Hsuan-Sheng Chen"}, {"authorId": "2138733027", - "name": "Hua-Tsung Chen"}, {"authorId": "2109274776", "name": "Yi-Wen Chen"}, - {"authorId": "1733135", "name": "Suh-Yin Lee"}]}, {"paperId": "031028b77c9bcdb9ec8cbc8da0baaecee81b6a36", - "externalIds": {"DBLP": "conf/wollic/AspertiR12", "MAG": "129348609", "DOI": - "10.1007/978-3-642-32621-9_1", "CorpusId": 44344832}, "url": "https://www.semanticscholar.org/paper/031028b77c9bcdb9ec8cbc8da0baaecee81b6a36", + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2006-10-27", "journal": {"pages": + "171-178"}, "authors": [{"authorId": "2115399299", "name": "Hsuan-Sheng Chen"}, + {"authorId": "2138733027", "name": "Hua-Tsung Chen"}, {"authorId": "2109274776", + "name": "Yi-Wen Chen"}, {"authorId": "1733135", "name": "Suh-Yin Lee"}]}, + {"paperId": "031028b77c9bcdb9ec8cbc8da0baaecee81b6a36", "externalIds": {"DBLP": + "conf/wollic/AspertiR12", "MAG": "129348609", "DOI": "10.1007/978-3-642-32621-9_1", + "CorpusId": 44344832}, "corpusId": 44344832, "publicationVenue": {"id": "92189226-dc95-4ac4-a298-2716351189c6", + "name": "Workshop on Logic, Language, Information and Computation", "type": + "conference", "alternate_names": ["WoLLIC", "Workshop Log Lang Inf Comput"], + "url": "http://www.cin.ufpe.br/~wollic"}, "url": "https://www.semanticscholar.org/paper/031028b77c9bcdb9ec8cbc8da0baaecee81b6a36", "title": "Formalizing Turing Machines", "abstract": null, "venue": "Workshop on Logic, Language, Information and Computation", "year": 2012, "referenceCount": 51, "citationCount": 17, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2012-09-03", "journal": {"pages": "1-25"}, "authors": [{"authorId": "1795634", - "name": "A. Asperti"}, {"authorId": "1775891", "name": "W. Ricciotti"}]}, - {"paperId": "da26e2b5f6bddfc6398eeb39e191836f6827f08c", "externalIds": {"MAG": - "2315182694", "DOI": "10.1515/TJJ.1990.7.3-4.297", "CorpusId": 113104601}, - "url": "https://www.semanticscholar.org/paper/da26e2b5f6bddfc6398eeb39e191836f6827f08c", - "title": "A Review of Friction Damping of Turbine Blade Vibration", "abstract": - "This paper reviews recent research on analyzing and designing friction dampers - to reduce turbine blade vibration. It discusses previous literature reviews, - methods of analysis, models of friction constraint , methods of modelling - the structural aspects of the system, procedures for optimizing the damper - ''s design, and some research on related problems. The author a t t empts - to indicate some of the limitations and advantages of the cited methods. Conclusions - are drawn concerning the current state-ofthe-art and recommendat ions are - made regarding directions for fu ture research and development.", "venue": - "", "year": 1990, "referenceCount": 30, "citationCount": 113, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "International Journal of Turbo and Jet Engines", - "pages": "297 - 308", "volume": "7"}, "authors": [{"authorId": "3118099", - "name": "J. Griffin"}]}, {"paperId": "63ae30af3b6ec28280e1412c0f1af0c9c8f15aba", - "externalIds": {"MAG": "2053684849", "DBLP": "journals/mima/ShahW10", "DOI": - "10.1007/s11023-010-9219-6", "CorpusId": 34076187}, "url": "https://www.semanticscholar.org/paper/63ae30af3b6ec28280e1412c0f1af0c9c8f15aba", - "title": "Hidden Interlocutor Misidentification in Practical Turing Tests", - "abstract": null, "venue": "Minds and Machines", "year": 2010, "referenceCount": - 13, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Psychology", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2010-08-01", "journal": {"name": "Minds - and Machines", "pages": "441-454", "volume": "20"}, "authors": [{"authorId": - "2731715", "name": "Huma Shah"}, {"authorId": "143636026", "name": "K. Warwick"}]}, - {"paperId": "fe4bfdcfa21b912e5cab2f17d26c4432cc410286", "externalIds": {"DBLP": - "conf/coco/FennerFNR96", "MAG": "2567019620", "DOI": "10.1109/CCC.1996.507683", - "CorpusId": 8126086}, "url": "https://www.semanticscholar.org/paper/fe4bfdcfa21b912e5cab2f17d26c4432cc410286", - "title": "Inverting onto functions", "abstract": "We look at the hypothesis - that all honest onto polynomial-time computable functions have a polynomial-time - computable inverse. We show this hypothesis equivalent to several other complexity - conjectures including: One can find accepting paths of nondeterministic polynomial-time - Turing machines that accept /spl Sigma/*. Every total multivalued nondeterministic - function has a polynomial-time computable refinement. One can compute satisfying - assignments for any polynomial-time computable set of satisfiable formulae. - One can convert the accepting computations of any nondeterministic Turing - machine that accepts SAT to satisfying assignments. We compare these hypotheses - with several other important complexity statements. We also examine the complexity - of these statements where we only require a single bit instead of the entire - inverse, path, etc.", "venue": "Proceedings of Computational Complexity (Formerly - Structure in Complexity Theory)", "year": 1995, "referenceCount": 38, "citationCount": - 48, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-06-08", "journal": {"name": "Proceedings of Computational - Complexity (Formerly Structure in Complexity Theory)", "pages": "213-222"}, - "authors": [{"authorId": "3612718", "name": "Stephen A. Fenner"}, {"authorId": - "1691447", "name": "L. Fortnow"}, {"authorId": "3184287", "name": "A. Naik"}, - {"authorId": "145166579", "name": "J. Rogers"}]}, {"paperId": "3ca8c4602b3d6ae32dad6384bd27f27d6e7c2f69", - "externalIds": {"DBLP": "journals/tsmc/Rothstein88", "MAG": "2003288909", - "DOI": "10.1109/21.17370", "CorpusId": 45521917}, "url": "https://www.semanticscholar.org/paper/3ca8c4602b3d6ae32dad6384bd27f27d6e7c2f69", - "title": "Bus automata, brains, and mental models", "abstract": "The author - suggests that bus automata (BAs) may serve as better brain models than sequential - computers of cellular automata. He proposes to view self-simulationability, - together with the use of status flags and the like, as a primitive model of - self-consciousness, analogous to viewing a regulator as exhibiting rudimentary - purposive behavior. A discussion of what meanings might be ascribed in a BA - context to terms like intelligence, pattern, theory, and meaning itself is - also given. It is concluded that the BA-UTM (universal Turing machine) is - a promising candidate for a brain model whose operation may actually be relevant - to mental processes. Prospects for actual BA-UTM realization are briefly discussed. - >", "venue": "IEEE Trans. Syst. Man Cybern.", "year": 1988, "referenceCount": - 11, "citationCount": 105, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1988-07-01", "journal": - {"name": "IEEE Trans. Syst. Man Cybern.", "pages": "522-531", "volume": "18"}, - "authors": [{"authorId": "39522198", "name": "J. Rothstein"}]}, {"paperId": - "a13a18de0619cf3d652246d37049d73d0e4f35bd", "externalIds": {"MAG": "2566852838", - "CorpusId": 16650592}, "url": "https://www.semanticscholar.org/paper/a13a18de0619cf3d652246d37049d73d0e4f35bd", - "title": "Wadge degrees of \u03c9-languages of deterministic Turing machines", - "abstract": "We describe Wadge degrees of \u03c9-languages recognizable by - deterministic Turing machines. In particular, it is shown that the ordinal - corresponding to these degrees is \u03be \u03c9 where \u03be = \u03c9 CK 1 - is the first non-recursive ordinal known as the Church-Kleene ordinal. This - answers a question raised in [Du0?].", "venue": "", "year": 2003, "referenceCount": - 17, "citationCount": 37, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Lecture - Notes in Computer Science", "pages": "97-108", "volume": ""}, "authors": [{"authorId": - "1759890", "name": "V. Selivanov"}]}, {"paperId": "df1e48a3ed03dbc8059deb3a37dbc9f45ef611a5", - "externalIds": {"DBLP": "conf/birthday/WegnerEB12", "MAG": "2403127738", "DOI": - "10.29007/39jj", "CorpusId": 15045638}, "url": "https://www.semanticscholar.org/paper/df1e48a3ed03dbc8059deb3a37dbc9f45ef611a5", + "openAccessPdf": {"url": "http://www.cs.unibo.it/~asperti/PAPERS/turing.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2012-09-03", "journal": {"pages": "1-25"}, + "authors": [{"authorId": "1795634", "name": "A. Asperti"}, {"authorId": "1775891", + "name": "W. Ricciotti"}]}, {"paperId": "f486344114be5679aaa24005e1bc772baf8d8bfa", + "externalIds": {"MAG": "1545979858", "DOI": "10.1017/CBO9780511564154", "CorpusId": + 118003825}, "corpusId": 118003825, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f486344114be5679aaa24005e1bc772baf8d8bfa", + "title": "Chaos, dynamics, and fractals : an algorithmic approach to deterministic + chaos", "abstract": "This book develops deterministic chaos and fractals from + the standpoint of iterated maps, but the emphasis makes it very different + from all other books in the field. It provides the reader with an introduction + to more recent developments, such as weak universality, multifractals, and + shadowing, as well as to older subjects like universal critical exponents, + devil''s staircases and the Farey tree. The author uses a fully discrete method, + a ''theoretical computer arithmetic'', because finite (but not fixed) precision + cannot be avoided in computation or experiment. This leads to a more general + formulation in terms of symbolic dynamics and to the idea of weak universality. + The connection is made with Turing''s ideas of computable numbers and it is + explained why the continuum approach leads to predictions that are not necessarily + realized in computation or in nature, whereas the discrete approach yields + all possible histograms that can be observed or computed.", "venue": "", "year": + 1993, "referenceCount": 0, "citationCount": 209, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1993-01-07", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "9913463", "name": "J. McCauley"}]}, {"paperId": "b3957bd1722db451bba73de17aa919ccdbe5890e", + "externalIds": {"DBLP": "journals/siamam/WollkindS00", "MAG": "1993978775", + "DOI": "10.1137/S0036139997326211", "CorpusId": 12843130}, "corpusId": 12843130, + "publicationVenue": {"id": "9b3052dd-9e29-41cb-927c-28df9e08a68b", "name": + "SIAM Journal on Applied Mathematics", "type": "journal", "alternate_names": + ["SIAM J Appl Math", "Siam Journal on Applied Mathematics", "Siam J Appl Math"], + "issn": "0036-1399", "url": "https://www.jstor.org/journal/siamjapplmath", + "alternate_urls": ["https://epubs.siam.org/journal/smjmap", "http://www.jstor.org/journals/00361399.html"]}, + "url": "https://www.semanticscholar.org/paper/b3957bd1722db451bba73de17aa919ccdbe5890e", + "title": "Chemical Turing Pattern Formation Analyses: Comparison of Theory + with Experiment", "abstract": "The development of one- and two-dimensional + Turing patterns characteristic of the chlorite-iodide-malonic acid/indicator + reaction occurring in an open gel continuously fed unstirred reactor is investigated + by means of various weakly nonlinear stability analyses applied to the appropriately + scaled governing chlorine dioxide-iodine-malonic acid/indicator reaction-diffusion + model system. Then the theoretical predictions deduced from these pattern + formation studies are compared with experimental evidence relevant to the + diffusive instabilities under examination. The latter consist of stripes, + rhombic arrays of rectangles, and hexagonal arrays of spots or nets. Here, + starch (for the case of a polyacrylamide gel) or the gel itself (for a polyvinyl + alcohol gel) serves as the Turing pattern indicator. The main purpose of these + analyses is to explain more fully thetransition to such stationary symmetry-breaking + structures when the malonic acid reservoir concentration is decreased.", "venue": + "SIAM Journal on Applied Mathematics", "year": 2000, "referenceCount": 63, + "citationCount": 37, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "SIAM J. Appl. Math.", "pages": "387-431", "volume": + "61"}, "authors": [{"authorId": "2795654", "name": "D. Wollkind"}, {"authorId": + "153800582", "name": "Laura E. Stephenson"}]}, {"paperId": "08d239c7c9fee09c6a3a578d337b67e92b506670", + "externalIds": {"MAG": "2148328606", "CorpusId": 1249358}, "corpusId": 1249358, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/08d239c7c9fee09c6a3a578d337b67e92b506670", + "title": "Facing up to Faults", "abstract": "After the war, Turing re-appeared + on the public scene, so to speak, and was instrumental in initiating the work + at the National Physical Laboratory (NPL) on electronic computers. This provides + me another point of contact with him, since - aside from a brief flirtation + with the IBM 650, a boringly easy computer to program - my initial years as + a programmer were spent trying to cope with the English Electric DEUCE computer. + This computer was a direct descendant of the machine that Turing designed + at NPL in the early years after the war. Thanks to Turing\u2019s design, DEUCE + was typically much faster in operation than its rivals, albeit almost entirely + at the expense of its programmers. Such was the innocence of youth that I + and my colleagues actually enjoyed its intricacies, and the problem of finding + ways of automating, at least partially, the programming task. Indeed, we felt + that contemporary American computer developments, by IBM and others, such + as the provision of what seemed to us to be huge memories, and of floating + point arithmetic hardware, were in effect cheating. Certainly they were depriving + compiler writers such as ourselves of interesting and (we thought) worthwhile + challenges.", "venue": "", "year": 2000, "referenceCount": 35, "citationCount": + 45, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "The Computer Journal", "volume": ""}, "authors": [{"authorId": + "145586245", "name": "B. Randell"}]}, {"paperId": "fa2eae3a856868155e6fd7df0744f9b1094eb416", + "externalIds": {"DBLP": "conf/sigmod/LuoTWZ05", "MAG": "1985118052", "DOI": + "10.1145/1066157.1066271", "CorpusId": 14876128}, "corpusId": 14876128, "publicationVenue": + {"id": "f68b9e7e-ad3d-46cb-857d-23e49384143c", "name": "ACM SIGMOD Conference", + "type": "conference", "alternate_names": ["SIGMOD", "ACM SIGMOD Conf"], "url": + "https://sigmod.org/conferences/"}, "url": "https://www.semanticscholar.org/paper/fa2eae3a856868155e6fd7df0744f9b1094eb416", + "title": "A native extension of SQL for mining data streams", "abstract": + "ESL1 enables users to develop stream applications in an SQL-like high level + language that provides the ease-of-use of a declarative language, which is + Turing complete in terms of expressive power [11].", "venue": "ACM SIGMOD + Conference", "year": 2005, "referenceCount": 24, "citationCount": 41, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-06-14", "journal": + {"pages": "873-875"}, "authors": [{"authorId": "145896805", "name": "C. Luo"}, + {"authorId": "144974811", "name": "Hetal Thakkar"}, {"authorId": "2109590665", + "name": "Haixun Wang"}, {"authorId": "1712630", "name": "C. Zaniolo"}]}, {"paperId": + "df1e48a3ed03dbc8059deb3a37dbc9f45ef611a5", "externalIds": {"DBLP": "conf/birthday/WegnerEB12", + "MAG": "2403127738", "DOI": "10.29007/39jj", "CorpusId": 15045638}, "corpusId": + 15045638, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/df1e48a3ed03dbc8059deb3a37dbc9f45ef611a5", "title": "Computational Completeness of Interaction Machines and Turing Machines", "abstract": "In the paper we prove in a new and simple way that Interaction machines are more powerful than Turing machines. To do that we extend the @@ -26521,120 +30215,65 @@ interactions: However complete models of computation may and should be approximated indefinitely and our contribution presents one of such attempts.", "venue": "Turing-100", "year": 2012, "referenceCount": 36, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://easychair.org/publications/open/DXKk", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-22", "journal": {"pages": "405-414"}, "authors": [{"authorId": "2103444", "name": "P. Wegner"}, {"authorId": "2882381", "name": "E. Eberbach"}, {"authorId": "51006192", "name": "M. Burgin"}]}, {"paperId": - "a6b90ae3c4d2afadd5c84e5c367d1ae0aa7d9898", "externalIds": {"MAG": "2162155774", - "DBLP": "journals/ijbc/RademacherS07", "DOI": "10.1142/S0218127407018683", - "CorpusId": 16571931}, "url": "https://www.semanticscholar.org/paper/a6b90ae3c4d2afadd5c84e5c367d1ae0aa7d9898", - "title": "Instabilities of Wave Trains and Turing Patterns in Large Domains", - "abstract": "We classify generic instabilities of wave trains in reaction\u2013diffusion - systems on the real line as the wavenumber and system parameters are varied. - We find three types of robust instabilities: Hopf with nonzero modulational - wavenumber, sideband and spatio-temporal period-doubling. Near a fold, the - only other robust instability mechanism, we show that all wave trains are - necessarily unstable. We also discuss the special cases of homogeneous oscillations - and reflection symmetric, stationary Turing patterns.", "venue": "International - Journal of Bifurcation and Chaos in Applied Sciences and Engineering", "year": - 2007, "referenceCount": 46, "citationCount": 37, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "57e9f778382439861d5c8432865e8a400d304e4a", "externalIds": {"MAG": "2989893681", + "DOI": "10.1021/jacs.9b10043", "CorpusId": 208186851, "PubMed": "31746598"}, + "corpusId": 208186851, "publicationVenue": {"id": "4193a393-c091-455e-858d-3d2c151b52b8", + "name": "Journal of the American Chemical Society", "type": "journal", "alternate_names": + ["J Am Chem Soc"], "issn": "0002-7863", "url": "https://pubs.acs.org/journal/jacsat", + "alternate_urls": ["http://pubs.acs.org/journals/jacsat/index.html", "http://pubs.acs.org/journals/jacsat/"]}, + "url": "https://www.semanticscholar.org/paper/57e9f778382439861d5c8432865e8a400d304e4a", + "title": "J-aggregates of Cyanine Dye for NIR-II In-vivo Dynamic Vascular + Imaging Beyond 1500 nm.", "abstract": "Light in the second near-infrared window, + especially beyond 1500 nm, shows enhanced tissue transparency for high-resolution + in-vivo optical bio-imaging due to decreased tissue scattering, absorption + and auto-fluorescence. Despite some inorganic lumi-nescent nanoparticles have + been developed to improve the bio-imaging around 1500 nm, it is still a great + challenge to synthesize organic molecules with the absorption and emission + toward this region. Here, we present J-aggregates with 1360 nm absorption + and 1370 nm emission formed by self-assembly of amphiphilic cyanine dye FD-1080 + and 1,2-dimyristoyl-sn-glycero-3-phosphocholine. Molecular dynamics simulations + were further employed to illustrate the self-assembly process. Superior spatial + resolution and high signal-to-background ratio of J-aggregates were demonstrated + for non-invasive brain and hindlimb vascula-ture bio-imaging beyond 1500 nm. + The efficacy evaluation of the clinically used hypotensor is successfully + achieved by high-resolution in-vivo dynamic vascular imaging with J-aggregates.", + "venue": "Journal of the American Chemical Society", "year": 2019, "referenceCount": + 43, "citationCount": 214, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Chemistry"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Chemistry", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-11-20", "journal": {"name": "Journal + of the American Chemical Society"}, "authors": [{"authorId": "144403585", + "name": "Caixia Sun"}, {"authorId": "9853087", "name": "Benhao Li"}, {"authorId": + "1963020703", "name": "Mengyao Zhao"}, {"authorId": "92783348", "name": "Shan-Teng + Wang"}, {"authorId": "16315711", "name": "Zuhai Lei"}, {"authorId": "19268311", + "name": "Lingfei Lu"}, {"authorId": "2143481989", "name": "Hongxin Zhang"}, + {"authorId": "18135481", "name": "Lishuai Feng"}, {"authorId": "15647107", + "name": "Chaoran Dou"}, {"authorId": "2072397604", "name": "Dongrui Yin"}, + {"authorId": "7271505", "name": "Huixiong Xu"}, {"authorId": "8259797", "name": + "Yingsheng Cheng"}, {"authorId": "145972168", "name": "Fan Zhang"}]}, {"paperId": + "26558a8e5eeedf13a450737db8f3b1360e4dc180", "externalIds": {"MAG": "334685031", + "DOI": "10.1007/BFB0086114", "CorpusId": 8507730}, "corpusId": 8507730, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/26558a8e5eeedf13a450737db8f3b1360e4dc180", + "title": "Enumeration reducibility, nondeterministic computations and relative + computability of partial functions", "abstract": null, "venue": "", "year": + 1990, "referenceCount": 101, "citationCount": 88, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Int. J. Bifurc. Chaos", "pages": "2679-2691", "volume": - "17"}, "authors": [{"authorId": "144207734", "name": "J. Rademacher"}, {"authorId": - "2022973", "name": "A. Scheel"}]}, {"paperId": "b67abfa6a1422f46a0130d9b03a3e6d8f1b3a1aa", - "externalIds": {"MAG": "2045988318", "DOI": "10.1016/S0022-5193(03)00170-X", - "CorpusId": 45634688, "PubMed": "12941592"}, "url": "https://www.semanticscholar.org/paper/b67abfa6a1422f46a0130d9b03a3e6d8f1b3a1aa", - "title": "Stripes, spots, or reversed spots in two-dimensional Turing systems.", - "abstract": null, "venue": "Journal of Theoretical Biology", "year": 2003, - "referenceCount": 18, "citationCount": 46, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-10-07", "journal": - {"name": "Journal of theoretical biology", "pages": "\n 339-50\n ", - "volume": "224 3"}, "authors": [{"authorId": "5764218", "name": "Hiroto Shoji"}, - {"authorId": "3148737", "name": "Y. Iwasa"}, {"authorId": "2636335", "name": - "Shigeru Kondo"}]}, {"paperId": "3a0535cf9abb931646e07cdf875a4ae081e0dafb", - "externalIds": {"CorpusId": 16610724}, "url": "https://www.semanticscholar.org/paper/3a0535cf9abb931646e07cdf875a4ae081e0dafb", - "title": "Tool Integration in Software Engineering Environments", "abstract": - "This article presents doctoral research on tool int egration within software - engineering environments. Tool int egration concerns the techniques used to - form coalitions of to ls that provide an environment supporting some, or all, - act ivities within the software engineering process. Some inte res ing phenomena - have been observed, such as the ad hoc na ture of tool integration in one - particular software enginee ring company. This observation is at variance - to the com m n perception of widespread integration suggested by t ool vendors - and some previous academic literature. Ini tial results suggest that integration - must be implemented for bu siness reasons, not for its own sake.", "venue": - "", "year": 2005, "referenceCount": 8, "citationCount": 109, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "145335707", - "name": "M. Wicks"}]}, {"paperId": "357da8861465de56c05259aeb7bf2116f7e73d21", - "externalIds": {"DBLP": "conf/nips/LakeST13", "MAG": "2114168642", "CorpusId": - 1433222}, "url": "https://www.semanticscholar.org/paper/357da8861465de56c05259aeb7bf2116f7e73d21", - "title": "One-shot learning by inverting a compositional causal process", - "abstract": "People can learn a new visual class from just one example, yet - machine learning algorithms typically require hundreds or thousands of examples - to tackle the same problems. Here we present a Hierarchical Bayesian model - based on com-positionality and causality that can learn a wide range of natural - (although simple) visual concepts, generalizing in human-like ways from just - one image. We evaluated performance on a challenging one-shot classification - task, where our model achieved a human-level error rate while substantially - outperforming two deep learning models. We also tested the model on another - conceptual task, generating new examples, by using a \"visual Turing test\" - to show that our model produces human-like performance.", "venue": "NIPS", - "year": 2013, "referenceCount": 30, "citationCount": 212, "influentialCitationCount": - 22, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2013-12-05", "journal": {"pages": "2526-2534"}, - "authors": [{"authorId": "2373318", "name": "B. Lake"}, {"authorId": "145124475", - "name": "R. Salakhutdinov"}, {"authorId": "1763295", "name": "J. Tenenbaum"}]}, - {"paperId": "6d8ecbc28617b9231f156fc6b1475f92bc9a937b", "externalIds": {"DBLP": - "conf/fossacs/Jacobs11", "MAG": "2109998602", "DOI": "10.1007/978-3-642-19805-2_2", - "CorpusId": 17157145}, "url": "https://www.semanticscholar.org/paper/6d8ecbc28617b9231f156fc6b1475f92bc9a937b", - "title": "Coalgebraic Walks, in Quantum and Turing Computation", "abstract": - null, "venue": "Foundations of Software Science and Computation Structure", - "year": 2011, "referenceCount": 17, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "2011-03-26", "journal": {"pages": "12-26"}, "authors": - [{"authorId": "145511756", "name": "B. Jacobs"}]}, {"paperId": "3e9a89c69af90f4a7032130e1fc98621a8d7c746", - "externalIds": {"MAG": "2051610690", "DOI": "10.1007/s00285-014-0816-5", "CorpusId": - 12377643, "PubMed": "25053475"}, "url": "https://www.semanticscholar.org/paper/3e9a89c69af90f4a7032130e1fc98621a8d7c746", - "title": "Turing instabilities in prey\u2013predator systems with dormancy - of predators", "abstract": null, "venue": "Journal of mathematical biology", - "year": 2015, "referenceCount": 30, "citationCount": 16, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-07-01", "journal": - {"name": "Journal of Mathematical Biology", "pages": "125-149", "volume": - "71"}, "authors": [{"authorId": "1885672", "name": "M. Kuwamura"}]}, {"paperId": - "b6b8523c4e6ab63373fdf5ca584b02e404b14893", "externalIds": {"CorpusId": 14971973}, - "url": "https://www.semanticscholar.org/paper/b6b8523c4e6ab63373fdf5ca584b02e404b14893", - "title": "Intelligent Machinery 1948 Report for National Physical Laboratory - Universal Turing Machine", "abstract": "The artificial intelligence approach - to hierarchical databases is defined not only by the construction of journaling - file systems, but also by the appropriate need for congestion control. Given - the current status of empathic theory, theorists particularly desire the study - of Byzantine fault tolerance, which embodies the significant principles of - hardware and architecture. Our focus in our research is not on whether the - much-tauted highly-available algorithm for the simulation of telephony is - in Co-NP, but rather on motivating new virtual methodologies (Feign).", "venue": - "", "year": null, "referenceCount": 149, "citationCount": 88, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", + "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "", "pages": "57-110", "volume": ""}, "authors": + [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", "externalIds": {"MAG": "2040323430", "DOI": "10.1021/J100195A045", "CorpusId": - 95843255}, "url": "https://www.semanticscholar.org/paper/9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", + 95843255}, "corpusId": 95843255, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", "title": "Spatial bistability of two-dimensional turing patterns in a reaction-diffusion system", "abstract": "A Turing bifurcation from an uniform state to a striped patterned state was observed in experiments conducted in a single-phase spatial @@ -26647,75 +30286,59 @@ interactions: the hexagonal and striped patterns are bistable; this is the first evidence of spatial bistability between Turing structures. 24 refs., 5 tabs.", "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 42, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "The Journal of Physical Chemistry", "pages": "6773-6776", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "The Journal of Physical Chemistry", "pages": "6773-6776", "volume": "96"}, "authors": [{"authorId": "143803550", "name": "Q. Ouyang"}, {"authorId": "5289890", "name": "Z. Noszticzius"}, {"authorId": "2421446", - "name": "H. Swinney"}]}, {"paperId": "26558a8e5eeedf13a450737db8f3b1360e4dc180", - "externalIds": {"MAG": "334685031", "DOI": "10.1007/BFB0086114", "CorpusId": - 8507730}, "url": "https://www.semanticscholar.org/paper/26558a8e5eeedf13a450737db8f3b1360e4dc180", - "title": "Enumeration reducibility, nondeterministic computations and relative - computability of partial functions", "abstract": null, "venue": "", "year": - 1990, "referenceCount": 101, "citationCount": 87, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "", "pages": "57-110", "volume": ""}, "authors": [{"authorId": - "98630872", "name": "S. Cooper"}]}, {"paperId": "fa2eae3a856868155e6fd7df0744f9b1094eb416", - "externalIds": {"DBLP": "conf/sigmod/LuoTWZ05", "MAG": "1985118052", "DOI": - "10.1145/1066157.1066271", "CorpusId": 14876128}, "url": "https://www.semanticscholar.org/paper/fa2eae3a856868155e6fd7df0744f9b1094eb416", - "title": "A native extension of SQL for mining data streams", "abstract": - "ESL1 enables users to develop stream applications in an SQL-like high level - language that provides the ease-of-use of a declarative language, which is - Turing complete in terms of expressive power [11].", "venue": "ACM SIGMOD - Conference", "year": 2005, "referenceCount": 24, "citationCount": 41, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-06-14", "journal": {"pages": "873-875"}, "authors": - [{"authorId": "145896805", "name": "C. Luo"}, {"authorId": "144974811", "name": - "Hetal Thakkar"}, {"authorId": "2109590665", "name": "Haixun Wang"}, {"authorId": - "1712630", "name": "C. Zaniolo"}]}, {"paperId": "d70f9494c845b393ea297c30928205f62ea2cbf2", - "externalIds": {"DBLP": "journals/tcs/Loui82", "MAG": "2074159544", "DOI": - "10.1016/0304-3975(89)90081-9", "CorpusId": 10916088}, "url": "https://www.semanticscholar.org/paper/d70f9494c845b393ea297c30928205f62ea2cbf2", - "title": "Simulations among multidimensional turing machines", "abstract": - null, "venue": "22nd Annual Symposium on Foundations of Computer Science (sfcs - 1981)", "year": 1982, "referenceCount": 17, "citationCount": 22, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1982-11-01", "journal": {"name": "22nd Annual Symposium - on Foundations of Computer Science (sfcs 1981)", "pages": "58-67"}, "authors": - [{"authorId": "46938413", "name": "M. Loui"}]}, {"paperId": "47c0330eeff24966a98922d91a68a77a9d731159", - "externalIds": {"MAG": "2137989418", "DBLP": "conf/mobicom/PengLLLL11", "DOI": - "10.1145/2030613.2030628", "CorpusId": 1867786}, "url": "https://www.semanticscholar.org/paper/47c0330eeff24966a98922d91a68a77a9d731159", - "title": "Traffic-driven power saving in operational 3G cellular networks", - "abstract": "Base stations (BSes) in the 3G cellular network are not energy - proportional with respect to their carried traffic load. Our mea- surements - show that 3G traffic exhibits high fluctuations both in time and over space, - thus incurring energy waste. In this paper, we propose a profile-based approach - to green cellular infrastruc- ture. We profile BS traffic and approximate - network-wide energy proportionality using non-load-adaptive BSes. The instrument - is to leverage temporal-spatial traffic diversity and node deployment heterogeneity, - and power off under-utilized BSes under light traf- fic. Our evaluation on - four regional 3G networks shows that this simple scheme yields up to 53% energy - savings in a dense large city and 23% in a sparse, mid-sized city.", "venue": - "ACM/IEEE International Conference on Mobile Computing and Networking", "year": - 2011, "referenceCount": 39, "citationCount": 224, "influentialCitationCount": - 30, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "name": "H. Swinney"}]}, {"paperId": "310dda18ecb3817aef260239f43a7821faf4cf55", + "externalIds": {"MAG": "2099256741", "DBLP": "conf/cvpr/MoriM03", "DOI": "10.1109/CVPR.2003.1211347", + "CorpusId": 1053619}, "corpusId": 1053619, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/310dda18ecb3817aef260239f43a7821faf4cf55", + "title": "Recognizing objects in adversarial clutter: breaking a visual CAPTCHA", + "abstract": "In this paper we explore object recognition in clutter. We test + our object recognition techniques on Gimpy and EZ-Gimpy, examples of visual + CAPTCHAs. A CAPTCHA (\"Completely Automated Public Turing test to Tell Computers + and Humans Apart\") is a program that can generate and grade tests that most + humans can pass, yet current computer programs can''t pass. EZ-Gimpy, currently + used by Yahoo, and Gimpy are CAPTCHAs based on word recognition in the presence + of clutter. These CAPTCHAs provide excellent test sets since the clutter they + contain is adversarial; it is designed to confuse computer programs. We have + developed efficient methods based on shape context matching that can identify + the word in an EZ-Gimpy image with a success rate of 92%, and the requisite + 3 words in a Gimpy image 33% of the time. The problem of identifying words + in such severe clutter provides valuable insight into the more general problem + of object recognition in scenes. The methods that we present are instances + of a framework designed to tackle this general problem.", "venue": "2003 IEEE + Computer Society Conference on Computer Vision and Pattern Recognition, 2003. + Proceedings.", "year": 2003, "referenceCount": 21, "citationCount": 692, "influentialCitationCount": + 34, "isOpenAccess": true, "openAccessPdf": {"url": "http://http.cs.berkeley.edu/projects/vision/shape/mori-gimpy.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book", "Conference"], "publicationDate": "2011-09-19", "journal": {"name": - "Proceedings of the 17th annual international conference on Mobile computing - and networking"}, "authors": [{"authorId": "1798566", "name": "Chunyi Peng"}, - {"authorId": "3123308", "name": "Suk-Bok Lee"}, {"authorId": "2014352", "name": - "Songwu Lu"}, {"authorId": "153819036", "name": "Haiyun Luo"}, {"authorId": - "3178200", "name": "Hewu Li"}]}, {"paperId": "aba2faad8abc127fa5ae1dbd4436ed7d3c701595", + "Conference"], "publicationDate": "2003-06-18", "journal": {"name": "2003 + IEEE Computer Society Conference on Computer Vision and Pattern Recognition, + 2003. Proceedings.", "pages": "I-I", "volume": "1"}, "authors": [{"authorId": + "10771328", "name": "Greg Mori"}, {"authorId": "143751119", "name": "Jitendra + Malik"}]}, {"paperId": "39d5978ca6236fe4b9b76cd424c20ebb00afbc3b", "externalIds": + {"DOI": "10.5948/upo9780883859742.031", "CorpusId": 10883078}, "corpusId": + 10883078, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/39d5978ca6236fe4b9b76cd424c20ebb00afbc3b", + "title": "A Study of Logic and Programming via Turing Machines Universal Turing + Machine", "abstract": "Unified replicated information have led to many compelling + advances, including the Turing machine and Moore\u2019s Law. Given the current + status of distributed modalities, security experts predictably desire the + deployment of spreadsheets, which embodies the appropriate principles of e-voting + technology. In this work, we concentrate our efforts on disproving that red-black + trees and congestion control are often incompatible. Despite the fact that + such a hypothesis might seem perverse, it is derived from known results.", + "venue": "", "year": 2011, "referenceCount": 154, "citationCount": 21, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "3024181", + "name": "Jerry M. Lodder"}]}, {"paperId": "aba2faad8abc127fa5ae1dbd4436ed7d3c701595", "externalIds": {"MAG": "2023600394", "DOI": "10.1017/S0308210500000238", "CorpusId": - 15929349}, "url": "https://www.semanticscholar.org/paper/aba2faad8abc127fa5ae1dbd4436ed7d3c701595", + 15929349}, "corpusId": 15929349, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aba2faad8abc127fa5ae1dbd4436ed7d3c701595", "title": "Spectral stability of modulated travelling waves bifurcating near essential instabilities", "abstract": "Localized travelling waves to reaction-diffusion systems on the real line are investigated. The issue addressed in this work @@ -26732,53 +30355,111 @@ interactions: This requires an investigation of the period map associated with the time-periodic modulated pulses.", "venue": "Proceedings of the Royal Society of Edinburgh: Section A Mathematics", "year": 2000, "referenceCount": 23, "citationCount": - 30, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2000-04-01", "journal": {"name": "Proceedings of the Royal Society of Edinburgh: - Section A Mathematics", "pages": "419 - 448", "volume": "130"}, "authors": - [{"authorId": "2699904", "name": "B. Sandstede"}, {"authorId": "2022973", - "name": "A. Scheel"}]}, {"paperId": "beaaef6879ccb89f27175f76977988f61e9162e7", - "externalIds": {"MAG": "1996897268", "DBLP": "journals/tc/DuleyD68", "DOI": - "10.1109/TC.1968.229145", "CorpusId": 9215548}, "url": "https://www.semanticscholar.org/paper/beaaef6879ccb89f27175f76977988f61e9162e7", - "title": "A Digital System Design Language (DDL)", "abstract": "Abstract\u2014Successful - design and manufacture of future digital systems will depend upon the availability - of a suitable design language. A precise, concise language is presented which - facilitates the specification of complex digital systems. The language 1) - is independent of any particular technology, design procedure, machine organization, - etc., 2) allows specification at different levels of detail from architecture - to detailed Boolean equations, and 3) may be com- piled into manufacturing - information. Its syntax and semantics per- mit documents with an organization - which parallels the block struc- ture of the systems they specify.", "venue": - "IEEE transactions on computers", "year": 1968, "referenceCount": 16, "citationCount": - 105, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + 30, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2000-04-01", "journal": {"name": "Proceedings of + the Royal Society of Edinburgh: Section A Mathematics", "pages": "419 - 448", + "volume": "130"}, "authors": [{"authorId": "2699904", "name": "B. Sandstede"}, + {"authorId": "2022973", "name": "A. Scheel"}]}, {"paperId": "cf76dbcf7d7fff4a141fe8a102e96cb0907dc421", + "externalIds": {"DBLP": "journals/corr/Walsh15a", "ArXiv": "1510.09033", "MAG": + "1933538929", "DOI": "10.1145/2838729", "CorpusId": 12970671}, "corpusId": + 12970671, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/cf76dbcf7d7fff4a141fe8a102e96cb0907dc421", + "title": "Turing''s red flag", "abstract": "A proposal for a law to prevent + artificial intelligence systems from being mistaken for humans.", "venue": + "Communications of the ACM", "year": 2015, "referenceCount": 5, "citationCount": + 18, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1968-09-01", "journal": - {"name": "IEEE Transactions on Computers", "pages": "850-861", "volume": "C-17"}, - "authors": [{"authorId": "3003359", "name": "J. R. Duley"}, {"authorId": "2010505", - "name": "D. Dietmeyer"}]}, {"paperId": "c4b624904a9684d538d56f2e97fd2f843d8cdc27", - "externalIds": {"DBLP": "journals/cj/ThimblebyAC98", "MAG": "2111496399", - "DOI": "10.1093/comjnl/41.7.444", "CorpusId": 2791988}, "url": "https://www.semanticscholar.org/paper/c4b624904a9684d538d56f2e97fd2f843d8cdc27", - "title": "A Framework for Modelling Trojans and Computer Virus Infection", - "abstract": "It is not possible to view a computer operating in the real world, - including the possibility of Trojan horse programs and computer viruses, as - simply a finite realisation of a Turing machine. We consider the actions of - Trojan horses and viruses in real computer systems and suggest a minimal framework - for an adequate formal understanding of the phenomena. Some conventional approaches, - including biological metaphors, are shown to be inadequate; some suggestions - are made towards constructing virally-resistant systems.", "venue": "Comput. - J.", "year": 1998, "referenceCount": 94, "citationCount": 72, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Comput. J.", "pages": "444-458", - "volume": "41"}, "authors": [{"authorId": "1779970", "name": "H. Thimbleby"}, - {"authorId": "2119047683", "name": "Stuart Anderson"}, {"authorId": "145753642", - "name": "P. Cairns"}]}, {"paperId": "0882545fec691958f8d9387f4a65b7cfdbed63d2", - "externalIds": {"DBLP": "journals/entcs/RettingerW02", "MAG": "1988125590", - "DOI": "10.1145/780542.780570", "CorpusId": 15174612}, "url": "https://www.semanticscholar.org/paper/0882545fec691958f8d9387f4a65b7cfdbed63d2", + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-10-30", "journal": + {"name": "Communications of the ACM", "pages": "34 - 37", "volume": "59"}, + "authors": [{"authorId": "1733716", "name": "T. Walsh"}]}, {"paperId": "488884bf1bd9f3414f95139c96fb07ad9c1bd780", + "externalIds": {"DBLP": "journals/siamjo/Renegar95", "MAG": "2002728800", + "DOI": "10.1137/0805026", "CorpusId": 9445642}, "corpusId": 9445642, "publicationVenue": + {"id": "879e0d01-0445-4ca2-97c3-3147a52fd12b", "name": "SIAM Journal on Optimization", + "type": "journal", "alternate_names": ["Siam J Optim", "Siam Journal on Optimization", + "SIAM J Optim"], "issn": "1052-6234", "url": "http://www.siam.org/journals/siopt.php", + "alternate_urls": ["https://epubs.siam.org/journal/sjope8"]}, "url": "https://www.semanticscholar.org/paper/488884bf1bd9f3414f95139c96fb07ad9c1bd780", + "title": "Incorporating Condition Measures into the Complexity Theory of Linear + Programming", "abstract": "This work is an attempt, among other things, to + begin developing a complexity theory in which problem instance data is allowed + to consist of real, even irrational, numbers and yet computations are of finite + precision.Complexity theory generally assumes that the exact data specifying + a problem instance is used by algorithms. The efficiency of an algorithm is + judged relative to the size of the input. For the Turing model of computation, + size refers to the bit-length of the input, which is required to consist of + integers (or rational numbers separated into numerators and denominators).We + replace customary measures of size with condition measures. These measures + reflect the amount of data accuracy necessary to achieve the desired computational + goal. The measures are similar in spirit, and closely related, to condition + numbers.", "venue": "SIAM Journal on Optimization", "year": 1995, "referenceCount": + 9, "citationCount": 195, "influentialCitationCount": 30, "isOpenAccess": true, + "openAccessPdf": {"url": "https://ecommons.cornell.edu/bitstream/1813/8957/1/TR001073.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-08-01", "journal": + {"name": "SIAM J. Optim.", "pages": "506-524", "volume": "5"}, "authors": + [{"authorId": "1757329", "name": "J. Renegar"}]}, {"paperId": "32461d71bb3b1c5028d9d8d1b85e00644d734377", + "externalIds": {"MAG": "2013892518", "DOI": "10.1216/RMJ-2013-43-5-1637", + "CorpusId": 7320283}, "corpusId": 7320283, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/32461d71bb3b1c5028d9d8d1b85e00644d734377", + "title": "Bifurcations of patterned solutions in the diffusive Lengyel-Epstein + system of Cima chemical reactions", "abstract": "Bifurcations of spatially + nonhomogeneous periodic solutions and steady state solutions are rigorously + proved for a reaction-diffusion system modeling CIMA chemical reaction. The + existence of these patterned solutions shows the richness of the spatiotemporal + dynamics including Turing instability and oscillatory behavior. Examples of + numerical simulation are also shown to support and strengthen the analytical + approach.", "venue": "", "year": 2013, "referenceCount": 37, "citationCount": + 57, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-10-01", "journal": {"name": + "Rocky Mountain Journal of Mathematics", "pages": "1637-1674", "volume": "43"}, + "authors": [{"authorId": "103340106", "name": "Jiayin Jin"}, {"authorId": + "1728518", "name": "Junping Shi"}, {"authorId": "145604974", "name": "Junjie + Wei"}, {"authorId": "36542362", "name": "Fengqi Yi"}]}, {"paperId": "700768a496da0595b0bc999e2f126f5a29a13a2b", + "externalIds": {"DBLP": "conf/cscw/IqbalH10", "MAG": "2166299892", "DOI": + "10.1145/1718918.1718926", "CorpusId": 843427}, "corpusId": 843427, "publicationVenue": + {"id": "63d1595c-87bf-4fd8-be2e-327f299cb9ea", "name": "Conference on Computer + Supported Cooperative Work", "type": "conference", "alternate_names": ["Conf + Comput Support Cooperative Work", "CSCW"], "url": "http://www.acm.org/pubs/contents/proceedings/series/cscw/"}, + "url": "https://www.semanticscholar.org/paper/700768a496da0595b0bc999e2f126f5a29a13a2b", + "title": "Notifications and awareness: a field study of alert usage and preferences", + "abstract": "Desktop notifications are designed to provide awareness of information + while a user is attending to a primary task. Unfortunately the awareness can + come with the price of disruption to the focal task. We review results of + a field study on the use and perceived value of email notifications in the + workplace. We recorded users'' interactions with software applications for + two weeks and studied how notifications or their forced absence influenced + users'' quest for awareness of new email arrival, as well as the impact of + notifications on their overall task focus. Results showed that users view + notifications as a mechanism to provide passive awareness rather than a trigger + to switch tasks. Turing off notifications cause some users to self interrupt + more to explicitly monitor email arrival, while others appear to be able to + better focus on their tasks. Users acknowledge notifications as disruptive, + yet opt for them because of their perceived value in providing awareness.", + "venue": "Conference on Computer Supported Cooperative Work", "year": 2010, + "referenceCount": 10, "citationCount": 201, "influentialCitationCount": 15, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2010-02-06", + "journal": {"pages": "27-30"}, "authors": [{"authorId": "1730570", "name": + "Shamsi T. Iqbal"}, {"authorId": "145479841", "name": "E. Horvitz"}]}, {"paperId": + "0882545fec691958f8d9387f4a65b7cfdbed63d2", "externalIds": {"DBLP": "journals/entcs/RettingerW02", + "MAG": "1988125590", "DOI": "10.1145/780542.780570", "CorpusId": 15174612}, + "corpusId": 15174612, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/0882545fec691958f8d9387f4a65b7cfdbed63d2", "title": "The computational complexity of some julia sets", "abstract": "Although numerous computer programs have been written to compute sets of points which claim to approximate Julia sets, no reliable high precision pictures of non-trivial @@ -26800,149 +30481,42 @@ interactions: (2-k\u2022 Z)2 such that dH(Kk,J)\u2264 2-k.", "venue": "Symposium on the Theory of Computing", "year": 2002, "referenceCount": 14, "citationCount": 90, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2002-07-01", "journal": {"pages": "154-164"}, "authors": - [{"authorId": "1993539", "name": "Robert Rettinger"}, {"authorId": "1696520", - "name": "K. Weihrauch"}]}, {"paperId": "ef2fb09d175826dac75ab450b1f2fe6925a9adf2", - "externalIds": {"MAG": "1971117297", "DOI": "10.1177/106939719402800301", - "CorpusId": 30868079}, "url": "https://www.semanticscholar.org/paper/ef2fb09d175826dac75ab450b1f2fe6925a9adf2", - "title": "Street Children in the Developing World: A Review of Their Condition", - "abstract": "The article reviews the literature on street children and points - out why there are street children in certain cultures and not in others. The - reasons for their existence are related to poverty, abuse, and modernizing - factors. Street children are defined and distinguished from working and refugee - children. Details about the family struc ture of street children are given. - How the children cope and their level of psychological functioning are discussed. - The article gives reasons for why the children are treated with such violence - and gives attention to methodological research problems that include the children''s - ability to distort information, the researcher''s procliv ity to under- or - overestimate the children''s emotional condition, distortions of facts created - by the press and international organiza tions, and general cross-cultural - research issues.", "venue": "", "year": 1994, "referenceCount": 161, "citationCount": - 208, "influentialCitationCount": 16, "isOpenAccess": true, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "1994-08-01", "journal": {"name": "Cross-Cultural - Research", "pages": "195 - 224", "volume": "28"}, "authors": [{"authorId": - "66663062", "name": "L. Aptekar"}]}, {"paperId": "700768a496da0595b0bc999e2f126f5a29a13a2b", - "externalIds": {"DBLP": "conf/cscw/IqbalH10", "MAG": "2166299892", "DOI": - "10.1145/1718918.1718926", "CorpusId": 843427}, "url": "https://www.semanticscholar.org/paper/700768a496da0595b0bc999e2f126f5a29a13a2b", - "title": "Notifications and awareness: a field study of alert usage and preferences", - "abstract": "Desktop notifications are designed to provide awareness of information - while a user is attending to a primary task. Unfortunately the awareness can - come with the price of disruption to the focal task. We review results of - a field study on the use and perceived value of email notifications in the - workplace. We recorded users'' interactions with software applications for - two weeks and studied how notifications or their forced absence influenced - users'' quest for awareness of new email arrival, as well as the impact of - notifications on their overall task focus. Results showed that users view - notifications as a mechanism to provide passive awareness rather than a trigger - to switch tasks. Turing off notifications cause some users to self interrupt - more to explicitly monitor email arrival, while others appear to be able to - better focus on their tasks. Users acknowledge notifications as disruptive, - yet opt for them because of their perceived value in providing awareness.", - "venue": "Conference on Computer Supported Cooperative Work", "year": 2010, - "referenceCount": 10, "citationCount": 201, "influentialCitationCount": 15, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2010-02-06", "journal": {"pages": "27-30"}, - "authors": [{"authorId": "1730570", "name": "Shamsi T. Iqbal"}, {"authorId": - "145479841", "name": "E. Horvitz"}]}, {"paperId": "d04a7809a3e09ceab55f62f5c90d82d970c9ac3e", - "externalIds": {"ArXiv": "0912.0027", "DBLP": "conf/soda/CookFS11", "MAG": - "2073933131", "DOI": "10.1137/1.9781611973082.45", "CorpusId": 765445}, "url": - "https://www.semanticscholar.org/paper/d04a7809a3e09ceab55f62f5c90d82d970c9ac3e", - "title": "Temperature 1 self-assembly: deterministic assembly in 3D and probabilistic - assembly in 2D", "abstract": "We investigate the power of the Wang tile self-assembly - model at temperature 1, a threshold value that permits attachment between - any two tiles that share even a single bond. When restricted to deterministic - assembly in the plane, no temperature 1 assembly system has been shown to - build a shape with a tile complexity smaller than the diameter of the shape. - In contrast, we show that temperature 1 self-assembly in 3 dimensions, even - when growth is restricted to at most 1 step into the third dimension, is capable - of simulating a large class of temperature 2 systems, in turn permitting the - simulation of arbitrary Turing machines and the assembly of n x n squares - in near optimal O(log n) tile complexity. Further, we consider temperature - 1 probabilistic assembly in 2D, and show that with a logarithmic scale up - of tile complexity and shape scale, the same general class of temperature - \u03c4 = 2 systems can be simulated, yielding Turing machine simulation and - O(log2 n) assembly of n x n squares with high probability. Our results show - a sharp contrast in achievable tile complexity at temperature 1 if either - growth into the third dimension or a small probability of error are permitted. - Motivated by applications in nanotechnology and molecular computing, and the - plausibility of implementing 3 dimensional self-assembly systems, our techniques - may provide the needed power of temperature 2 systems, while at the same time - avoiding the experimental challenges faced by those systems.", "venue": "ACM-SIAM - Symposium on Discrete Algorithms", "year": 2009, "referenceCount": 36, "citationCount": - 92, "influentialCitationCount": 14, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-11-30", "journal": {"name": "ArXiv", - "volume": "abs/0912.0027"}, "authors": [{"authorId": "144828543", "name": - "Matthew Cook"}, {"authorId": "1787102", "name": "Yunhui Fu"}, {"authorId": - "2205907", "name": "R. Schweller"}]}, {"paperId": "488884bf1bd9f3414f95139c96fb07ad9c1bd780", - "externalIds": {"DBLP": "journals/siamjo/Renegar95", "MAG": "2002728800", - "DOI": "10.1137/0805026", "CorpusId": 9445642}, "url": "https://www.semanticscholar.org/paper/488884bf1bd9f3414f95139c96fb07ad9c1bd780", - "title": "Incorporating Condition Measures into the Complexity Theory of Linear - Programming", "abstract": "This work is an attempt, among other things, to - begin developing a complexity theory in which problem instance data is allowed - to consist of real, even irrational, numbers and yet computations are of finite - precision.Complexity theory generally assumes that the exact data specifying - a problem instance is used by algorithms. The efficiency of an algorithm is - judged relative to the size of the input. For the Turing model of computation, - size refers to the bit-length of the input, which is required to consist of - integers (or rational numbers separated into numerators and denominators).We - replace customary measures of size with condition measures. These measures - reflect the amount of data accuracy necessary to achieve the desired computational - goal. The measures are similar in spirit, and closely related, to condition - numbers.", "venue": "SIAM Journal on Optimization", "year": 1995, "referenceCount": - 9, "citationCount": 192, "influentialCitationCount": 29, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-08-01", "journal": {"name": "SIAM J. Optim.", "pages": - "506-524", "volume": "5"}, "authors": [{"authorId": "1757329", "name": "J. - Renegar"}]}, {"paperId": "91d10913e4e876a85f24a0a82e7e97fb7f4aa3cc", "externalIds": - {"MAG": "2137692822", "DOI": "10.1002/smll.200800280", "CorpusId": 8563359, - "PubMed": "18702125"}, "url": "https://www.semanticscholar.org/paper/91d10913e4e876a85f24a0a82e7e97fb7f4aa3cc", - "title": "Thin film stress driven self-folding of microstructured containers.", - "abstract": "Lithography, the workhorse of the microelectronics industry,is - routinely used to fabricate micro and nanostructures in ahighly monodisperse - manner, with high accuracy and preci-sion. However, one of the central limitationsof - this technologyis that it is inherently two-dimensional (2D) as a result of - thewafer-based fabrication paradigm. It is extremely challengingto fabricate - three-dimensional (3D) patterned structures, letalone complex structures containing - encapsulated objects, onthe sub-mm scale. Thus, the parallel fabrication of - such struc-tures remains a major challenge that needs to be addressed.Some - solutions have emerged that enable sub-mm-scalelithographic fabrication in - 3D; these include techniques suchas wafer stacking,", "venue": "Small", "year": - 2008, "referenceCount": 23, "citationCount": 107, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Materials Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-10-01", "journal": {"name": "Small", "pages": "\n 1605-9\n ", - "volume": "4 10"}, "authors": [{"authorId": "3721813", "name": "T. Leong"}, - {"authorId": "8910468", "name": "B. Benson"}, {"authorId": "2074172656", "name": - "E. Call"}, {"authorId": "1937208", "name": "D. Gracias"}]}, {"paperId": "82b8dcab3b1763377df41665a327261fa720514b", - "externalIds": {"DBLP": "journals/iacr/LinPST15", "MAG": "2952950903", "DOI": - "10.1007/978-3-662-49096-9_5", "CorpusId": 16275771}, "url": "https://www.semanticscholar.org/paper/82b8dcab3b1763377df41665a327261fa720514b", - "title": "Output-Compressing Randomized Encodings and Applications", "abstract": - null, "venue": "Theory of Cryptography Conference", "year": 2016, "referenceCount": - 31, "citationCount": 42, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2016-01-10", "journal": {"pages": "96-124"}, - "authors": [{"authorId": "3596858", "name": "Huijia Lin"}, {"authorId": "1811683", - "name": "R. Pass"}, {"authorId": "34185195", "name": "Karn Seth"}, {"authorId": - "39925569", "name": "Sidharth Telang"}]}]} + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2002-07-01", "journal": {"pages": + "154-164"}, "authors": [{"authorId": "1993539", "name": "Robert Rettinger"}, + {"authorId": "1696520", "name": "K. Weihrauch"}]}, {"paperId": "5ee9e297ec4b2e2bcb60848d9659cd7e3209a34d", + "externalIds": {"MAG": "1698983042", "DBLP": "journals/corr/StrasbergCSB15", + "ArXiv": "1506.00894", "DOI": "10.1103/PhysRevE.92.042104", "CorpusId": 7023204, + "PubMed": "26565165"}, "corpusId": 7023204, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5ee9e297ec4b2e2bcb60848d9659cd7e3209a34d", + "title": "Thermodynamics of stochastic Turing machines", "abstract": "In analogy + to Brownian computers we explicitly show how to construct stochastic models + which mimic the behavior of a general-purpose computer (a Turing machine). + Our models are discrete state systems obeying a Markovian master equation, + which are logically reversible and have a well-defined and consistent thermodynamic + interpretation. The resulting master equation, which describes a simple one-step + process on an enormously large state space, allows us to thoroughly investigate + the thermodynamics of computation for this situation. Especially in the stationary + regime we can well approximate the master equation by a simple Fokker-Planck + equation in one dimension. We then show that the entropy production rate at + steady state can be made arbitrarily small, but the total (integrated) entropy + production is finite and grows logarithmically with the number of computational + steps.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter + physics", "year": 2015, "referenceCount": 64, "citationCount": 20, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1506.00894", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-06-02", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042104\n ", + "volume": "92 4"}, "authors": [{"authorId": "49300917", "name": "P. Strasberg"}, + {"authorId": "2960771", "name": "J. Cerrillo"}, {"authorId": "34288407", "name": + "G. Schaller"}, {"authorId": "32675792", "name": "T. Brandes"}]}]} ' headers: @@ -26951,31 +30525,31 @@ interactions: Connection: - keep-alive Content-Length: - - '156908' + - '182485' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:38 GMT + - Tue, 03 Jan 2023 20:53:07 GMT Via: - - 1.1 42a549e60dcb35d3c3908f459bdf9f62.cloudfront.net (CloudFront) + - 1.1 a18ffd49cb0150d72aa8f289eec6fa1e.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - kMtOntwYqjDTNUYG3tib7ElH51clKHhZC0DCBX7QllrkadDAtESpXQ== + - XyWisskOw2uKh6hwK2V5AM7Q12B85nK-h3mBA2cQ_plfrCfn1xjQ5g== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detHNHLtPHcFUUw= + - eLxT-Gf-vHcFuTQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '156908' + - '182485' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:38 GMT + - Tue, 03 Jan 2023 20:53:07 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - ad097cf8-eb16-482e-8eb4-816a1eca7af1 + - d699936c-60c1-41ed-8a4e-3e5a06a8e2de status: code: 200 message: OK @@ -26991,128 +30565,202 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1300&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1300&limit=100 response: body: - string: '{"total": 65539, "offset": 1300, "next": 1400, "data": [{"paperId": - "bcecf256121227e4e5454c61ed8aba8d5ce28b9d", "externalIds": {"MAG": "2081550861", - "DOI": "10.1038/338259A0", "CorpusId": 4335615, "PubMed": "2493582"}, "url": - "https://www.semanticscholar.org/paper/bcecf256121227e4e5454c61ed8aba8d5ce28b9d", - "title": "Association of dystrophin and an integral membrane glycoprotein", - "abstract": null, "venue": "Nature", "year": 1989, "referenceCount": 22, "citationCount": - 710, "influentialCitationCount": 20, "isOpenAccess": false, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1989-03-16", "journal": - {"name": "Nature", "pages": "259-262", "volume": "338"}, "authors": [{"authorId": - "2847342", "name": "K. Campbell"}, {"authorId": "34496080", "name": "S. Kahl"}]}, - {"paperId": "e4b8e3b334c084e8bf14c7d576ad03f8b67c4cc2", "externalIds": {"MAG": - "2135010822", "DBLP": "conf/dna/LakinP11", "DOI": "10.1007/978-3-642-23638-9_12", - "CorpusId": 14133888}, "url": "https://www.semanticscholar.org/paper/e4b8e3b334c084e8bf14c7d576ad03f8b67c4cc2", - "title": "Modelling, Simulating and Verifying Turing-Powerful Strand Displacement - Systems", "abstract": null, "venue": "DNA", "year": 2011, "referenceCount": - 20, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2011-09-19", "journal": {"pages": "130-144"}, "authors": [{"authorId": "2650343", - "name": "Matthew R. Lakin"}, {"authorId": "145792830", "name": "A. Phillips"}]}, - {"paperId": "bc0f4a361722e56a94078a148b085f4189721cd4", "externalIds": {"MAG": - "1577467529", "CorpusId": 16478785}, "url": "https://www.semanticscholar.org/paper/bc0f4a361722e56a94078a148b085f4189721cd4", - "title": "Turing and the Riemann Hypothesis", "abstract": "The calculations - had been planned some time in advance, but had in fact to be carried out in - great haste. If it had not been for the fact that the computer remained in - serviceable condition for an unusually long period from 3 p.m. one afternoon - to 8 a.m. the following morning it is probable that the calculations would - never have been done at all. As it was, the interval 2\u03c0.632 < t < 2\u03c0.642 - was investigated during that period, and very little more was accomplished.", - "venue": "", "year": 2006, "referenceCount": 19, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-11-01", - "journal": {"name": "Notices of the American Mathematical Society", "pages": - "1208-1211", "volume": ""}, "authors": [{"authorId": "3063921", "name": "A. - Booker"}]}, {"paperId": "c4adb277e177c6e167638211d38ac00b78a066eb", "externalIds": - {"DBLP": "journals/cj/BurginE12", "MAG": "2159830394", "DOI": "10.1093/comjnl/bxr099", - "CorpusId": 5355558}, "url": "https://www.semanticscholar.org/paper/c4adb277e177c6e167638211d38ac00b78a066eb", - "title": "Evolutionary Automata: Expressiveness and Convergence of Evolutionary - Computation", "abstract": "Expressiveness and convergence of evolutionary - computation (EC) is studied using the evolutionary automata model. It turns - out that all standard classes of evolutionary automata are equally expressive - when they operate in the terminal mode, i.e. in the terminal mode, evolutionary - finite automata (EFA) are as expressive as evolutionary pushdown automata, - evolutionary linearly bounded automata, evolutionary Turing machines or evolutionary - inductive Turing machines. For example, the simplest class of evolutionary - automata, EFA, can accept all recursively enumerable languages (i.e. EFA have - power of Turing machines) and even more\u2014they can accept languages that - are not recursively enumerable. Due to utilization of evolutionary automata, - we obtain also very simple sufficient conditions for convergence of EC.", - "venue": "Comput. J.", "year": 2012, "referenceCount": 33, "citationCount": - 23, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + string: '{"total": 65730, "offset": 1300, "next": 1400, "data": [{"paperId": + "488884bf1bd9f3414f95139c96fb07ad9c1bd780", "externalIds": {"DBLP": "journals/siamjo/Renegar95", + "MAG": "2002728800", "DOI": "10.1137/0805026", "CorpusId": 9445642}, "corpusId": + 9445642, "publicationVenue": {"id": "879e0d01-0445-4ca2-97c3-3147a52fd12b", + "name": "SIAM Journal on Optimization", "type": "journal", "alternate_names": + ["Siam J Optim", "Siam Journal on Optimization", "SIAM J Optim"], "issn": + "1052-6234", "url": "http://www.siam.org/journals/siopt.php", "alternate_urls": + ["https://epubs.siam.org/journal/sjope8"]}, "url": "https://www.semanticscholar.org/paper/488884bf1bd9f3414f95139c96fb07ad9c1bd780", + "title": "Incorporating Condition Measures into the Complexity Theory of Linear + Programming", "abstract": "This work is an attempt, among other things, to + begin developing a complexity theory in which problem instance data is allowed + to consist of real, even irrational, numbers and yet computations are of finite + precision.Complexity theory generally assumes that the exact data specifying + a problem instance is used by algorithms. The efficiency of an algorithm is + judged relative to the size of the input. For the Turing model of computation, + size refers to the bit-length of the input, which is required to consist of + integers (or rational numbers separated into numerators and denominators).We + replace customary measures of size with condition measures. These measures + reflect the amount of data accuracy necessary to achieve the desired computational + goal. The measures are similar in spirit, and closely related, to condition + numbers.", "venue": "SIAM Journal on Optimization", "year": 1995, "referenceCount": + 9, "citationCount": 195, "influentialCitationCount": 30, "isOpenAccess": true, + "openAccessPdf": {"url": "https://ecommons.cornell.edu/bitstream/1813/8957/1/TR001073.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-08-01", "journal": + {"name": "SIAM J. Optim.", "pages": "506-524", "volume": "5"}, "authors": + [{"authorId": "1757329", "name": "J. Renegar"}]}, {"paperId": "32461d71bb3b1c5028d9d8d1b85e00644d734377", + "externalIds": {"MAG": "2013892518", "DOI": "10.1216/RMJ-2013-43-5-1637", + "CorpusId": 7320283}, "corpusId": 7320283, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/32461d71bb3b1c5028d9d8d1b85e00644d734377", + "title": "Bifurcations of patterned solutions in the diffusive Lengyel-Epstein + system of Cima chemical reactions", "abstract": "Bifurcations of spatially + nonhomogeneous periodic solutions and steady state solutions are rigorously + proved for a reaction-diffusion system modeling CIMA chemical reaction. The + existence of these patterned solutions shows the richness of the spatiotemporal + dynamics including Turing instability and oscillatory behavior. Examples of + numerical simulation are also shown to support and strengthen the analytical + approach.", "venue": "", "year": 2013, "referenceCount": 37, "citationCount": + 57, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-10-01", "journal": {"name": + "Rocky Mountain Journal of Mathematics", "pages": "1637-1674", "volume": "43"}, + "authors": [{"authorId": "103340106", "name": "Jiayin Jin"}, {"authorId": + "1728518", "name": "Junping Shi"}, {"authorId": "145604974", "name": "Junjie + Wei"}, {"authorId": "36542362", "name": "Fengqi Yi"}]}, {"paperId": "c4b624904a9684d538d56f2e97fd2f843d8cdc27", + "externalIds": {"DBLP": "journals/cj/ThimblebyAC98", "MAG": "2111496399", + "DOI": "10.1093/comjnl/41.7.444", "CorpusId": 2791988}, "corpusId": 2791988, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c4b624904a9684d538d56f2e97fd2f843d8cdc27", + "title": "A Framework for Modelling Trojans and Computer Virus Infection", + "abstract": "It is not possible to view a computer operating in the real world, + including the possibility of Trojan horse programs and computer viruses, as + simply a finite realisation of a Turing machine. We consider the actions of + Trojan horses and viruses in real computer systems and suggest a minimal framework + for an adequate formal understanding of the phenomena. Some conventional approaches, + including biological metaphors, are shown to be inadequate; some suggestions + are made towards constructing virally-resistant systems.", "venue": "Comput. + J.", "year": 1998, "referenceCount": 94, "citationCount": 72, "influentialCitationCount": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.pure.ed.ac.uk/ws/files/15441550/A_Framework_for_Modelling_Trojans_and_Computer_Virus_Infection.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Comput. J.", "pages": "444-458", + "volume": "41"}, "authors": [{"authorId": "1779970", "name": "H. Thimbleby"}, + {"authorId": "2119047683", "name": "Stuart Anderson"}, {"authorId": "145753642", + "name": "P. Cairns"}]}, {"paperId": "91d10913e4e876a85f24a0a82e7e97fb7f4aa3cc", + "externalIds": {"MAG": "2137692822", "DOI": "10.1002/smll.200800280", "CorpusId": + 8563359, "PubMed": "18702125"}, "corpusId": 8563359, "publicationVenue": {"id": + "59eaa32d-b026-4d64-beaa-c422bc2629ed", "name": "Small", "type": "journal", + "issn": "1613-6810", "url": "http://www.small-journal.com/", "alternate_urls": + ["https://onlinelibrary.wiley.com/journal/16136829", "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1613-6829"]}, + "url": "https://www.semanticscholar.org/paper/91d10913e4e876a85f24a0a82e7e97fb7f4aa3cc", + "title": "Thin film stress driven self-folding of microstructured containers.", + "abstract": "Lithography, the workhorse of the microelectronics industry,is + routinely used to fabricate micro and nanostructures in ahighly monodisperse + manner, with high accuracy and preci-sion. However, one of the central limitationsof + this technologyis that it is inherently two-dimensional (2D) as a result of + thewafer-based fabrication paradigm. It is extremely challengingto fabricate + three-dimensional (3D) patterned structures, letalone complex structures containing + encapsulated objects, onthe sub-mm scale. Thus, the parallel fabrication of + such struc-tures remains a major challenge that needs to be addressed.Some + solutions have emerged that enable sub-mm-scalelithographic fabrication in + 3D; these include techniques suchas wafer stacking,", "venue": "Small", "year": + 2008, "referenceCount": 23, "citationCount": 107, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-10-01", "journal": {"name": "Small", "pages": "\n 1605-9\n ", + "volume": "4 10"}, "authors": [{"authorId": "3721813", "name": "T. Leong"}, + {"authorId": "8910468", "name": "B. Benson"}, {"authorId": "2074172656", "name": + "E. Call"}, {"authorId": "1937208", "name": "D. Gracias"}]}, {"paperId": "c92c4211bdde0b24ed20e5e06d72b061b51584be", + "externalIds": {"DBLP": "conf/uc/YoungerRS14", "MAG": "16982484", "DOI": "10.1007/978-3-319-08123-6_31", + "CorpusId": 9524396}, "corpusId": 9524396, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c92c4211bdde0b24ed20e5e06d72b061b51584be", + "title": "Development of Physical Super-Turing Analog Hardware", "abstract": + null, "venue": "UCNC", "year": 2014, "referenceCount": 13, "citationCount": + 15, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-07-14", "journal": {"pages": "379-391"}, "authors": [{"authorId": "145547836", + "name": "A. S. Younger"}, {"authorId": "2592737", "name": "E. Redd"}, {"authorId": + "2797623", "name": "H. Siegelmann"}]}, {"paperId": "0882545fec691958f8d9387f4a65b7cfdbed63d2", + "externalIds": {"DBLP": "journals/entcs/RettingerW02", "MAG": "1988125590", + "DOI": "10.1145/780542.780570", "CorpusId": 15174612}, "corpusId": 15174612, + "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": + "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/0882545fec691958f8d9387f4a65b7cfdbed63d2", + "title": "The computational complexity of some julia sets", "abstract": "Although + numerous computer programs have been written to compute sets of points which + claim to approximate Julia sets, no reliable high precision pictures of non-trivial + Julia sets are currently known. Usually, no error estimates are added and + even those algorithms which work reliably in theory, become unreliable in + practice due to rounding errors and the use of fixed length floating point + numbers.In this paper we prove the existence of polynomial time algorithms + to approximate the Julia sets of complex functions f(z)=z2+c + for |c|<1/4. We will give a strict computable error estimation w.r.t. + the Hausdorff metric dH which means that the set is recursive + [10]. Although these and many more Julia sets J are proven to be recursive + [12] and furthermore recursive compact subsets of the Euclidean plane are + known to have a computable Turing machine time complexity [10], hardly anything + is known about the computational complexity of non-trivial examples. The algorithms + given in this paper compute the Julia sets locally in time O(k2\u2022 + M(k)) (where M(k) is a time bound for multiplication of two k-bit + integers). Roughly speaking, the local time complexity is the number of Turing + machine steps to decide for a single point whether it belongs to a grid Kk\u2286 + (2-k\u2022 Z)2 such that dH(Kk,J)\u2264 + 2-k.", "venue": "Symposium on the Theory of Computing", "year": + 2002, "referenceCount": 14, "citationCount": 90, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-09-01", "journal": {"name": "Comput. - J.", "pages": "1023-1029", "volume": "55"}, "authors": [{"authorId": "51006192", - "name": "M. Burgin"}, {"authorId": "2882381", "name": "E. Eberbach"}]}, {"paperId": - "26558a8e5eeedf13a450737db8f3b1360e4dc180", "externalIds": {"MAG": "334685031", - "DOI": "10.1007/BFB0086114", "CorpusId": 8507730}, "url": "https://www.semanticscholar.org/paper/26558a8e5eeedf13a450737db8f3b1360e4dc180", - "title": "Enumeration reducibility, nondeterministic computations and relative - computability of partial functions", "abstract": null, "venue": "", "year": - 1990, "referenceCount": 101, "citationCount": 87, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "", "pages": "57-110", "volume": ""}, "authors": [{"authorId": - "98630872", "name": "S. Cooper"}]}, {"paperId": "82b8dcab3b1763377df41665a327261fa720514b", - "externalIds": {"DBLP": "journals/iacr/LinPST15", "MAG": "2952950903", "DOI": - "10.1007/978-3-662-49096-9_5", "CorpusId": 16275771}, "url": "https://www.semanticscholar.org/paper/82b8dcab3b1763377df41665a327261fa720514b", - "title": "Output-Compressing Randomized Encodings and Applications", "abstract": - null, "venue": "Theory of Cryptography Conference", "year": 2016, "referenceCount": - 31, "citationCount": 42, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2016-01-10", "journal": {"pages": "96-124"}, - "authors": [{"authorId": "3596858", "name": "Huijia Lin"}, {"authorId": "1811683", - "name": "R. Pass"}, {"authorId": "34185195", "name": "Karn Seth"}, {"authorId": - "39925569", "name": "Sidharth Telang"}]}, {"paperId": "7a6c06d7393a9863445e2cb020d4eaf70b8eccdb", - "externalIds": {"DBLP": "journals/jcss/Tourlakis01", "MAG": "2006558104", - "DOI": "10.1006/jcss.2001.1767", "CorpusId": 206568996}, "url": "https://www.semanticscholar.org/paper/7a6c06d7393a9863445e2cb020d4eaf70b8eccdb", - "title": "Time-Space Tradeoffs for SAT on Nonuniform Machines", "abstract": - "The arguments used by R. Kannan (1984, Math. Systems Theory17, 29?45), L. - Fortnow (1997, in \u201cProceedings, Twelfth Annual IEEE Conference on Computational - Complexity, Ulm, Germany, 24?27 June, 1997,\u201d pp. 52?60), and R. J. Lipton - and A. Viglas (1999, in \u201c40th Annual Symposium on Foundations of Computer - Science, New York, 17?19 Oct. 1999,\u201d pp. 459?469) are generalized and - combined with an argument for diagonalizing over machines taking n bits of - advice on inputs of length n to obtain the first nontrivial time?space lower - bounds for SAT on nonuniform machines. In particular, we show that for any - a 0, SAT cannot be computed by a random access deterministic Turing machine - using na time, no(1) space, and o(n2/2??) advice nor by a random access deterministic - Turing machine using n1+o(1) time, n1?? space, and n1?? advice. More generally, - we show that if for some ?>0 there exists a random access deterministic Turing - machine solving SAT using na time, nb space, and o(n(a+b)/2??) advice, then - a?12(b2+8?b). Lower bounds for computing \\overline{{\\bfSAT}} on random access - nondeterministic Turing machines taking sublinear advice are also obtained. - Moreover, we show that SAT does not have NC1 circuits of size nl+o(1) generated - by a nondeterministic log?space machine taking no(1) advice. Additionally, - new separations of uniform classes are obtained. We show that for all ?>0 - and all rational numbers r?1, DTISP(nr, n1??) is properly contained in NTIME(nr).", - "venue": "Journal of computer and system sciences (Print)", "year": 2001, - "referenceCount": 27, "citationCount": 31, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], + ["JournalArticle"], "publicationDate": "2002-07-01", "journal": {"pages": + "154-164"}, "authors": [{"authorId": "1993539", "name": "Robert Rettinger"}, + {"authorId": "1696520", "name": "K. Weihrauch"}]}, {"paperId": "63ae30af3b6ec28280e1412c0f1af0c9c8f15aba", + "externalIds": {"MAG": "2053684849", "DBLP": "journals/mima/ShahW10", "DOI": + "10.1007/s11023-010-9219-6", "CorpusId": 34076187}, "corpusId": 34076187, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/63ae30af3b6ec28280e1412c0f1af0c9c8f15aba", + "title": "Hidden Interlocutor Misidentification in Practical Turing Tests", + "abstract": null, "venue": "Minds and Machines", "year": 2010, "referenceCount": + 13, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Medicine", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2010-08-01", "journal": {"name": "Minds and Machines", "pages": "441-454", + "volume": "20"}, "authors": [{"authorId": "2731715", "name": "Huma Shah"}, + {"authorId": "143636026", "name": "K. Warwick"}]}, {"paperId": "ebdd045178c171509e8b6215c8e660bf7495175a", + "externalIds": {"MAG": "2126435179", "DBLP": "conf/eurogp/LangdonP06", "DOI": + "10.1007/11729976_20", "CorpusId": 14250136}, "corpusId": 14250136, "publicationVenue": + {"id": "e5560558-b286-4bd6-827c-5632278860f3", "name": "European Conference + on Genetic Programming", "type": "conference", "alternate_names": ["EuroGP", + "Eur Conf Genet Program"], "url": "http://www.genetic-programming.org/"}, + "url": "https://www.semanticscholar.org/paper/ebdd045178c171509e8b6215c8e660bf7495175a", + "title": "The Halting Probability in Von Neumann Architectures", "abstract": + null, "venue": "European Conference on Genetic Programming", "year": 2006, + "referenceCount": 20, "citationCount": 24, "influentialCitationCount": 1, + "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cs.ucl.ac.uk/staff/W.Langdon/ftp/papers/wbl_egp2002.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-09-01", "journal": {"name": "J. Comput. Syst. Sci.", - "pages": "268-287", "volume": "63"}, "authors": [{"authorId": "2450345", "name": - "Iannis Tourlakis"}]}, {"paperId": "c8bbda6801adc90e6f16c46878e737aee5061866", - "externalIds": {"DBLP": "conf/stoc/Maass84", "MAG": "334939025", "DOI": "10.1145/800057.808706", - "CorpusId": 14840448}, "url": "https://www.semanticscholar.org/paper/c8bbda6801adc90e6f16c46878e737aee5061866", + "publicationDate": "2006-04-10", "journal": {"pages": "225-237"}, "authors": + [{"authorId": "3169349", "name": "W. Langdon"}, {"authorId": "1742664", "name": + "R. Poli"}]}, {"paperId": "a13a18de0619cf3d652246d37049d73d0e4f35bd", "externalIds": + {"MAG": "2566852838", "CorpusId": 16650592}, "corpusId": 16650592, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a13a18de0619cf3d652246d37049d73d0e4f35bd", + "title": "Wadge degrees of \u03c9-languages of deterministic Turing machines", + "abstract": "We describe Wadge degrees of \u03c9-languages recognizable by + deterministic Turing machines. In particular, it is shown that the ordinal + corresponding to these degrees is \u03be \u03c9 where \u03be = \u03c9 CK 1 + is the first non-recursive ordinal known as the Church-Kleene ordinal. This + answers a question raised in [Du0?].", "venue": "", "year": 2003, "referenceCount": + 17, "citationCount": 37, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Lecture Notes in Computer Science", "pages": "97-108", + "volume": ""}, "authors": [{"authorId": "1759890", "name": "V. Selivanov"}]}, + {"paperId": "c8bbda6801adc90e6f16c46878e737aee5061866", "externalIds": {"DBLP": + "conf/stoc/Maass84", "MAG": "334939025", "DOI": "10.1145/800057.808706", "CorpusId": + 14840448}, "corpusId": 14840448, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/c8bbda6801adc90e6f16c46878e737aee5061866", "title": "Quadratic lower bounds for deterministic and nondeterministic one-tape turing machines", "abstract": "We introduce new techniques for proving quadratic lower bounds for deterministic and nondeterministic l-tape Turing machines @@ -27123,55 +30771,240 @@ interactions: a substantial superiority of nondeterminism over determinism and of co-nondeterminism over nondeterminism for l-tape TM''s.", "venue": "Symposium on the Theory of Computing", "year": 1984, "referenceCount": 11, "citationCount": 31, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800057.808706", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1984-12-01", "journal": {"pages": "401-408"}, "authors": [{"authorId": "145247053", - "name": "W. Maass"}]}, {"paperId": "7de39928d9857baf083a1d56c58ef133c50a4195", - "externalIds": {"ArXiv": "1710.10411", "MAG": "2787184843", "DOI": "10.3934/DCDSB.2018183", - "CorpusId": 55513740}, "url": "https://www.semanticscholar.org/paper/7de39928d9857baf083a1d56c58ef133c50a4195", - "title": "Spatiotemporal attractors generated by the Turing-Hopf bifurcation - in a time-delayed reaction-diffusion system", "abstract": "We study the Turing-Hopf - bifurcation and give a simple and explicit calculation formula of the normal - forms for a general two-components system of reaction-diffusion equation with - time delays. We declare that our formula can be automated by Matlab. At first, - we extend the normal forms method given by Faria in 2000 to Hopf-zero singularity. - Then, an explicit formula of the normal forms for Turing-Hopf bifurcation - are given. Finally, we obtain the possible attractors of the original system - near the Turing-Hopf singularity by the further analysis of the normal forms, - which mainly include, the spatially non-homogeneous steady-state solutions, - periodic solutions and quasi-periodic solutions.", "venue": "Discrete & Continuous - Dynamical Systems - B", "year": 2017, "referenceCount": 33, "citationCount": - 21, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2017-10-28", "journal": {"name": "Discrete & Continuous - Dynamical Systems - B"}, "authors": [{"authorId": "1521749343", "name": "Qi - An"}, {"authorId": "144382267", "name": "Weihua Jiang"}]}, {"paperId": "ef2fb09d175826dac75ab450b1f2fe6925a9adf2", - "externalIds": {"MAG": "1971117297", "DOI": "10.1177/106939719402800301", - "CorpusId": 30868079}, "url": "https://www.semanticscholar.org/paper/ef2fb09d175826dac75ab450b1f2fe6925a9adf2", - "title": "Street Children in the Developing World: A Review of Their Condition", - "abstract": "The article reviews the literature on street children and points - out why there are street children in certain cultures and not in others. The - reasons for their existence are related to poverty, abuse, and modernizing - factors. Street children are defined and distinguished from working and refugee - children. Details about the family struc ture of street children are given. - How the children cope and their level of psychological functioning are discussed. - The article gives reasons for why the children are treated with such violence - and gives attention to methodological research problems that include the children''s - ability to distort information, the researcher''s procliv ity to under- or - overestimate the children''s emotional condition, distortions of facts created - by the press and international organiza tions, and general cross-cultural - research issues.", "venue": "", "year": 1994, "referenceCount": 161, "citationCount": - 208, "influentialCitationCount": 16, "isOpenAccess": true, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "1994-08-01", "journal": {"name": "Cross-Cultural - Research", "pages": "195 - 224", "volume": "28"}, "authors": [{"authorId": - "66663062", "name": "L. Aptekar"}]}, {"paperId": "059be8063da919f2855d9800d8183ce460f1faf9", + "name": "W. Maass"}]}, {"paperId": "5ee9e297ec4b2e2bcb60848d9659cd7e3209a34d", + "externalIds": {"MAG": "1698983042", "DBLP": "journals/corr/StrasbergCSB15", + "ArXiv": "1506.00894", "DOI": "10.1103/PhysRevE.92.042104", "CorpusId": 7023204, + "PubMed": "26565165"}, "corpusId": 7023204, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5ee9e297ec4b2e2bcb60848d9659cd7e3209a34d", + "title": "Thermodynamics of stochastic Turing machines", "abstract": "In analogy + to Brownian computers we explicitly show how to construct stochastic models + which mimic the behavior of a general-purpose computer (a Turing machine). + Our models are discrete state systems obeying a Markovian master equation, + which are logically reversible and have a well-defined and consistent thermodynamic + interpretation. The resulting master equation, which describes a simple one-step + process on an enormously large state space, allows us to thoroughly investigate + the thermodynamics of computation for this situation. Especially in the stationary + regime we can well approximate the master equation by a simple Fokker-Planck + equation in one dimension. We then show that the entropy production rate at + steady state can be made arbitrarily small, but the total (integrated) entropy + production is finite and grows logarithmically with the number of computational + steps.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter + physics", "year": 2015, "referenceCount": 64, "citationCount": 20, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1506.00894", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Physics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-06-02", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 042104\n ", + "volume": "92 4"}, "authors": [{"authorId": "49300917", "name": "P. Strasberg"}, + {"authorId": "2960771", "name": "J. Cerrillo"}, {"authorId": "34288407", "name": + "G. Schaller"}, {"authorId": "32675792", "name": "T. Brandes"}]}, {"paperId": + "b6b8523c4e6ab63373fdf5ca584b02e404b14893", "externalIds": {"CorpusId": 14971973}, + "corpusId": 14971973, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b6b8523c4e6ab63373fdf5ca584b02e404b14893", + "title": "Intelligent Machinery 1948 Report for National Physical Laboratory + Universal Turing Machine", "abstract": "The artificial intelligence approach + to hierarchical databases is defined not only by the construction of journaling + file systems, but also by the appropriate need for congestion control. Given + the current status of empathic theory, theorists particularly desire the study + of Byzantine fault tolerance, which embodies the significant principles of + hardware and architecture. Our focus in our research is not on whether the + much-tauted highly-available algorithm for the simulation of telephony is + in Co-NP, but rather on motivating new virtual methodologies (Feign).", "venue": + "", "year": null, "referenceCount": 149, "citationCount": 88, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "62257d6a998cf02a60a93c3b04388e91d7fc1a49", "externalIds": {"MAG": "2105438076", + "DBLP": "journals/jfp/Jones01", "DOI": "10.1017/S0956796800003889", "CorpusId": + 28271234}, "corpusId": 28271234, "publicationVenue": {"id": "58f55ec2-1f5a-4e79-af2a-0046ee1dcd2a", + "name": "Journal of functional programming", "type": "journal", "alternate_names": + ["J funct program", "Journal of Functional Programming", "J Funct Program"], + "issn": "0956-7968", "url": "https://www.cambridge.org/core/journals/journal-of-functional-programming", + "alternate_urls": ["http://journals.cambridge.org/jid_JFP"]}, "url": "https://www.semanticscholar.org/paper/62257d6a998cf02a60a93c3b04388e91d7fc1a49", + "title": "The expressive power of higher-order types or, life without CONS", + "abstract": "Compare first-order functional programs with higher-order programs + allowing functions as function parameters. Can the the first program class + solve fewer problems than the second? The answer is no: both classes are Turing + complete, meaning that they can compute all partial recursive functions. In + particular, higher-order values may be first-order simulated by use of the + list constructor \u2018cons\u2019 to build function closures. This paper uses + complexity theory to prove some expressivity results about small programming + languages that are less than Turing complete. Complexity classes of decision + problems are used to characterize the expressive power of functional programming + language features. An example: second-order programs are more powerful than + first-order, since a function f of type [Bool]-\u3009Bool is computable by + a cons-free first-order functional program if and only if f is in PTIME, whereas + f is computable by a cons-free second-order program if and only if f is in + EXPTIME. Exact characterizations are given for those problems of type [Bool]-\u3009Bool + solvable by programs with several combinations of operations on data: presence + or absence of constructors; the order of data values: 0, 1, or higher; and + program control structures: general recursion, tail recursion, primitive recursion.", + "venue": "Journal of functional programming", "year": 2001, "referenceCount": + 61, "citationCount": 87, "influentialCitationCount": 9, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-01-01", "journal": {"name": "Journal of Functional + Programming", "pages": "55 - 94", "volume": "11"}, "authors": [{"authorId": + "1700623", "name": "N. Jones"}]}, {"paperId": "c4adb277e177c6e167638211d38ac00b78a066eb", + "externalIds": {"DBLP": "journals/cj/BurginE12", "MAG": "2159830394", "DOI": + "10.1093/comjnl/bxr099", "CorpusId": 5355558}, "corpusId": 5355558, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c4adb277e177c6e167638211d38ac00b78a066eb", + "title": "Evolutionary Automata: Expressiveness and Convergence of Evolutionary + Computation", "abstract": "Expressiveness and convergence of evolutionary + computation (EC) is studied using the evolutionary automata model. It turns + out that all standard classes of evolutionary automata are equally expressive + when they operate in the terminal mode, i.e. in the terminal mode, evolutionary + finite automata (EFA) are as expressive as evolutionary pushdown automata, + evolutionary linearly bounded automata, evolutionary Turing machines or evolutionary + inductive Turing machines. For example, the simplest class of evolutionary + automata, EFA, can accept all recursively enumerable languages (i.e. EFA have + power of Turing machines) and even more\u2014they can accept languages that + are not recursively enumerable. Due to utilization of evolutionary automata, + we obtain also very simple sufficient conditions for convergence of EC.", + "venue": "Comput. J.", "year": 2012, "referenceCount": 33, "citationCount": + 23, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-09-01", "journal": + {"name": "Comput. J.", "pages": "1023-1029", "volume": "55"}, "authors": [{"authorId": + "51006192", "name": "M. Burgin"}, {"authorId": "2882381", "name": "E. Eberbach"}]}, + {"paperId": "46c5dfa3e8d276900b24e15bcf0c4a1bd335c373", "externalIds": {"MAG": + "2077457515", "DOI": "10.1007/s11571-012-9194-0", "CorpusId": 9509098, "PubMed": + "23730353"}, "corpusId": 9509098, "publicationVenue": {"id": "fc09dc4b-a753-404e-8b20-85d3d2c5201b", + "name": "Cognitive Neurodynamics", "type": "journal", "alternate_names": ["Cogn + Neurodynamics"], "issn": "1871-4080", "url": "https://www.springer.com/biomed/journal/11571", + "alternate_urls": ["https://link.springer.com/article/10.1007/s11571-015-9362-0", + "https://link.springer.com/journal/11571"]}, "url": "https://www.semanticscholar.org/paper/46c5dfa3e8d276900b24e15bcf0c4a1bd335c373", + "title": "Gap junctions modulate seizures in a mean-field model of general + anesthesia for the cortex", "abstract": null, "venue": "Cognitive Neurodynamics", + "year": 2012, "referenceCount": 52, "citationCount": 31, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc3368060?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-02", "journal": + {"name": "Cognitive Neurodynamics", "pages": "215-225", "volume": "6"}, "authors": + [{"authorId": "1403384168", "name": "M. Steyn-Ross"}, {"authorId": "1401041315", + "name": "D. Steyn-Ross"}, {"authorId": "2328872", "name": "J. Sleigh"}]}, + {"paperId": "a56c992219bca398fe45bc820671e097dbb19b3c", "externalIds": {"MAG": + "2082106534", "DOI": "10.1109/16.830987", "CorpusId": 18362855}, "corpusId": + 18362855, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a56c992219bca398fe45bc820671e097dbb19b3c", + "title": "A Four-Step Method for De-Embedding Gigahertz", "abstract": "In + this paper, a de-embedding method is proposed for conducting accurate on-wafer + device measurements in the gi- gahertz range. The method addresses issues + of substrate coupling and contact effects and is therefore suitable for measurements + with lossy technologies such as CMOS. The method assumes a probe-tip two-port + calibration performed with well-known techniques and impedance substrates. + By employing a physical interpretation of the test-fixture, the method alleviates + a number of known prob- lems with common de-embedding procedures. Four distinct + math- ematical steps are suggested to de-embed parasitics for the test-fix- + ture to give an accurate measurement of the device under test. By introducing + a simple compensation factor for in-fixture stan- dard imperfections, the + proposed method allows large devices to be measured with high accuracy. The + applicability of the method is demonstrated with measurements up to 12 GHz.", + "venue": "", "year": 2000, "referenceCount": 9, "citationCount": 191, "influentialCitationCount": + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2000-04-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1788224", "name": "T. Kolding"}]}, {"paperId": "882a02193f4d2446c1b61a38d7de9fdc3bff057c", + "externalIds": {"MAG": "2899660175", "DBLP": "journals/iacr/ZengHH07", "CorpusId": + 33289203}, "corpusId": 33289203, "publicationVenue": {"id": "166fd2b5-a928-4a98-a449-3b90935cc101", + "name": "IACR Cryptology ePrint Archive", "type": "journal", "alternate_names": + ["IACR Cryptol eprint Arch"], "url": "http://eprint.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/882a02193f4d2446c1b61a38d7de9fdc3bff057c", + "title": "High Efficiency Feedback Shift Register: sigma-LFSR", "abstract": + "We introduce a new kind of word-oriented linear feedback shift register called + \u03c3\u2212LFSR which is constructed with the instructions of the modern + processor and have fast software implementation. We offer an algorithm to + search for good primitive \u03c3\u2212LFSR. In particular, we give two examples + HHZ-1 and HHZ-2 and compare their efficiency and security with those of the + LFSRs appearing in stream ciphers such as SNOW, SOBER and Turing. Our results + show that replacing the LFSRs in SNOW, SOBER and Turing with HHZ-1 will improve + security and the efficiency of fast software implementation.", "venue": "IACR + Cryptology ePrint Archive", "year": 2007, "referenceCount": 7, "citationCount": + 33, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "IACR Cryptol. ePrint Arch.", "pages": "114", "volume": + "2007"}, "authors": [{"authorId": "46525902", "name": "Guang Zeng"}, {"authorId": + "1691373", "name": "Wenbao Han"}, {"authorId": "2414054", "name": "Kaicheng + He"}]}, {"paperId": "310dda18ecb3817aef260239f43a7821faf4cf55", "externalIds": + {"MAG": "2099256741", "DBLP": "conf/cvpr/MoriM03", "DOI": "10.1109/CVPR.2003.1211347", + "CorpusId": 1053619}, "corpusId": 1053619, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/310dda18ecb3817aef260239f43a7821faf4cf55", + "title": "Recognizing objects in adversarial clutter: breaking a visual CAPTCHA", + "abstract": "In this paper we explore object recognition in clutter. We test + our object recognition techniques on Gimpy and EZ-Gimpy, examples of visual + CAPTCHAs. A CAPTCHA (\"Completely Automated Public Turing test to Tell Computers + and Humans Apart\") is a program that can generate and grade tests that most + humans can pass, yet current computer programs can''t pass. EZ-Gimpy, currently + used by Yahoo, and Gimpy are CAPTCHAs based on word recognition in the presence + of clutter. These CAPTCHAs provide excellent test sets since the clutter they + contain is adversarial; it is designed to confuse computer programs. We have + developed efficient methods based on shape context matching that can identify + the word in an EZ-Gimpy image with a success rate of 92%, and the requisite + 3 words in a Gimpy image 33% of the time. The problem of identifying words + in such severe clutter provides valuable insight into the more general problem + of object recognition in scenes. The methods that we present are instances + of a framework designed to tackle this general problem.", "venue": "2003 IEEE + Computer Society Conference on Computer Vision and Pattern Recognition, 2003. + Proceedings.", "year": 2003, "referenceCount": 21, "citationCount": 692, "influentialCitationCount": + 34, "isOpenAccess": true, "openAccessPdf": {"url": "http://http.cs.berkeley.edu/projects/vision/shape/mori-gimpy.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2003-06-18", "journal": {"name": "2003 + IEEE Computer Society Conference on Computer Vision and Pattern Recognition, + 2003. Proceedings.", "pages": "I-I", "volume": "1"}, "authors": [{"authorId": + "10771328", "name": "Greg Mori"}, {"authorId": "143751119", "name": "Jitendra + Malik"}]}, {"paperId": "6d243e465af98130b2a82b2bf7293f6bb8f912b2", "externalIds": + {"MAG": "2039471684", "DOI": "10.1140/EPJB/E2013-30649-7", "CorpusId": 121119740}, + "corpusId": 121119740, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6d243e465af98130b2a82b2bf7293f6bb8f912b2", + "title": "Turing instabilities in reaction-diffusion systems with cross diffusion", + "abstract": null, "venue": "", "year": 2013, "referenceCount": 27, "citationCount": + 37, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-04-10", "journal": {"name": + "The European Physical Journal B", "pages": "1-8", "volume": "86"}, "authors": + [{"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "46848249", "name": + "C. Cianci"}, {"authorId": "39866244", "name": "F. Patti"}]}, {"paperId": + "cb47a545e59c7e17c9e623b2c245bcfcdeea1234", "externalIds": {"MAG": "2018893481", + "DOI": "10.2307/1925527", "CorpusId": 154216422}, "corpusId": 154216422, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/cb47a545e59c7e17c9e623b2c245bcfcdeea1234", + "title": "Cost of Water Delivery Systems: Specification and Ownership Effects", + "abstract": "Three cost models of water delivery systems are replicated as + alternative specifications of a general form. A dual cost function methodology + is followed, usin g firm-specific data and ownership proxies, to trace the + effects that numerous technical constraints and variable specifications have + on t he relative efficiency of firms by ownership type. Results show that + apparent overall efficiency differences reduce to insignificance as s pecification + improves. This partly explains why past studies of overa ll efficiency of + ownership forms have yielded mixed, and in some inst ances, unreliable results. + The partial efficiency results point to fu ture public-private research methods. + Copyright 1987 by MIT Press.", "venue": "", "year": 1987, "referenceCount": + 11, "citationCount": 105, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1987-08-01", + "journal": {"name": "The Review of Economics and Statistics", "pages": "399-408", + "volume": "69"}, "authors": [{"authorId": "104423614", "name": "Ronald K. + Teeples"}, {"authorId": "95161062", "name": "D. Glyer"}]}, {"paperId": "059be8063da919f2855d9800d8183ce460f1faf9", "externalIds": {"ArXiv": "1304.6363", "MAG": "2963306533", "DBLP": "journals/corr/abs-1304-6363", - "DOI": "10.1090/NOTI866", "CorpusId": 12427848}, "url": "https://www.semanticscholar.org/paper/059be8063da919f2855d9800d8183ce460f1faf9", + "DOI": "10.1090/NOTI866", "CorpusId": 12427848}, "corpusId": 12427848, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/059be8063da919f2855d9800d8183ce460f1faf9", "title": "Incomputability after Alan Turing", "abstract": "Incomputability as a mathematical notion arose from work of Alan Turing and Alonzo Church in the 1930s. Like Turing himself, it attracted less attention than it deserved @@ -27187,127 +31020,143 @@ interactions: incomputable may turn out to be a specially important part of the legacy, with consequences that Alan Turing himself could not have envisaged.", "venue": "ArXiv", "year": 2012, "referenceCount": 55, "citationCount": 15, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://doi.org/10.1090/noti866", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-01", "journal": {"name": "ArXiv", "volume": "abs/1304.6363"}, "authors": - [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "488884bf1bd9f3414f95139c96fb07ad9c1bd780", - "externalIds": {"DBLP": "journals/siamjo/Renegar95", "MAG": "2002728800", - "DOI": "10.1137/0805026", "CorpusId": 9445642}, "url": "https://www.semanticscholar.org/paper/488884bf1bd9f3414f95139c96fb07ad9c1bd780", - "title": "Incorporating Condition Measures into the Complexity Theory of Linear - Programming", "abstract": "This work is an attempt, among other things, to - begin developing a complexity theory in which problem instance data is allowed - to consist of real, even irrational, numbers and yet computations are of finite - precision.Complexity theory generally assumes that the exact data specifying - a problem instance is used by algorithms. The efficiency of an algorithm is - judged relative to the size of the input. For the Turing model of computation, - size refers to the bit-length of the input, which is required to consist of - integers (or rational numbers separated into numerators and denominators).We - replace customary measures of size with condition measures. These measures - reflect the amount of data accuracy necessary to achieve the desired computational - goal. The measures are similar in spirit, and closely related, to condition - numbers.", "venue": "SIAM Journal on Optimization", "year": 1995, "referenceCount": - 9, "citationCount": 192, "influentialCitationCount": 29, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-08-01", "journal": {"name": "SIAM J. Optim.", "pages": - "506-524", "volume": "5"}, "authors": [{"authorId": "1757329", "name": "J. - Renegar"}]}, {"paperId": "be0d74cf96ac6afc3f4be8f8537f11d4ad9c922a", "externalIds": - {"DBLP": "journals/combinatorica/Tardos89", "MAG": "2094321606", "DOI": "10.1007/BF02125350", - "CorpusId": 45372592}, "url": "https://www.semanticscholar.org/paper/be0d74cf96ac6afc3f4be8f8537f11d4ad9c922a", - "title": "Query complexity, or why is it difficult to separateNPA\u2229coNPA - fromPA by random oraclesA?", "abstract": null, "venue": "Comb.", "year": 1989, - "referenceCount": 20, "citationCount": 63, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1989-12-01", "journal": - {"name": "Combinatorica", "pages": "385-392", "volume": "9"}, "authors": [{"authorId": - "1738193", "name": "G. Tardos"}]}, {"paperId": "882a02193f4d2446c1b61a38d7de9fdc3bff057c", - "externalIds": {"MAG": "2899660175", "DBLP": "journals/iacr/ZengHH07", "CorpusId": - 33289203}, "url": "https://www.semanticscholar.org/paper/882a02193f4d2446c1b61a38d7de9fdc3bff057c", - "title": "High Efficiency Feedback Shift Register: sigma-LFSR", "abstract": - "We introduce a new kind of word-oriented linear feedback shift register called - \u03c3\u2212LFSR which is constructed with the instructions of the modern - processor and have fast software implementation. We offer an algorithm to - search for good primitive \u03c3\u2212LFSR. In particular, we give two examples - HHZ-1 and HHZ-2 and compare their efficiency and security with those of the - LFSRs appearing in stream ciphers such as SNOW, SOBER and Turing. Our results - show that replacing the LFSRs in SNOW, SOBER and Turing with HHZ-1 will improve - security and the efficiency of fast software implementation.", "venue": "IACR - Cryptology ePrint Archive", "year": 2007, "referenceCount": 7, "citationCount": - 33, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "IACR Cryptol. ePrint Arch.", "pages": "114", "volume": "2007"}, - "authors": [{"authorId": "46525902", "name": "Guang Zeng"}, {"authorId": "1691373", - "name": "Wenbao Han"}, {"authorId": "2414054", "name": "Kaicheng He"}]}, {"paperId": - "0d6e83809db5c8071e153b62f7a916d1498a9f4c", "externalIds": {"MAG": "2057783419", - "DOI": "10.1103/PHYSREVE.85.021924", "CorpusId": 25754302, "PubMed": "22463261"}, - "url": "https://www.semanticscholar.org/paper/0d6e83809db5c8071e153b62f7a916d1498a9f4c", - "title": "Spatial dynamics in a predator-prey model with Beddington-DeAngelis - functional response.", "abstract": "In this paper spatial dynamics of the - Beddington-DeAngelis predator-prey model is investigated. We analyze the linear - stability and obtain the condition of Turing instability of this model. Moreover, - we deduce the amplitude equations and determine the stability of different - patterns. In Turing space, we found that this model has coexistence of H(0) - hexagon patterns and stripe patterns, H(\u03c0) hexagon patterns, and H(0) - hexagon patterns. To better describe the real ecosystem, we consider the ecosystem - as an open system and take the environmental noise into account. It is found - that noise can decrease the number of the patterns and make the patterns more - regular. What is more, noise can induce two kinds of typical pattern transitions. - One is from the H(\u03c0) hexagon patterns to the regular stripe patterns, - and the other is from the coexistence of H(0) hexagon patterns and stripe - patterns to the regular stripe patterns. The obtained results enrich the finding - in the Beddington-DeAngelis predator-prey model well.", "venue": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "year": 2012, - "referenceCount": 64, "citationCount": 86, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-02-28", "journal": + [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "ac1e1d1f56cc4556d240806e175b9c296996566c", + "externalIds": {"MAG": "2148158948", "DOI": "10.1103/PHYSREVE.79.031908", + "CorpusId": 198203, "PubMed": "19391972"}, "corpusId": 198203, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/ac1e1d1f56cc4556d240806e175b9c296996566c", + "title": "Modeling the skin pattern of fishes.", "abstract": "Complicated + patterns showing various spatial scales have been obtained in the past by + coupling Turing systems in such a way that the scales of the independent systems + resonate. This produces superimposed patterns with different length scales. + Here we propose a model consisting of two identical reaction-diffusion systems + coupled together in such a way that one of them produces a simple Turing pattern + of spots or stripes, and the other traveling wave fronts that eventually become + stationary. The basic idea is to assume that one of the systems becomes fixed + after some time and serves as a source of morphogens for the other system. + This mechanism produces patterns very similar to the pigmentation patterns + observed in different species of stingrays and other fishes. The biological + mechanisms that support the realization of this model are discussed.", "venue": + "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": + 2009, "referenceCount": 29, "citationCount": 49, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:a956fb7b-6adb-4aa7-8ed2-54b6661d4efc/download_file?safe_filename=272.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-03-18", "journal": {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 021924\n ", "volume": "85 2 Pt 1"}, "authors": - [{"authorId": "2108192884", "name": "Xiao-Chong Zhang"}, {"authorId": "47334108", - "name": "Gui\u2010Quan Sun"}, {"authorId": "145752193", "name": "Zhen Jin"}]}, - {"paperId": "a22d8af58852bb2560977590b68d177ca31df7da", "externalIds": {"DBLP": - "journals/cacm/Vardi14d", "MAG": "2040141971", "DOI": "10.1145/2643596", "CorpusId": - 12987389}, "url": "https://www.semanticscholar.org/paper/a22d8af58852bb2560977590b68d177ca31df7da", - "title": "Would Turing have passed the Turing Test?", "abstract": "It''s time - to consider the Imitation Game as just a game.", "venue": "Communications - of the ACM", "year": 2014, "referenceCount": 0, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-09-01", "journal": {"name": "Communications of the - ACM", "pages": "5 - 5", "volume": "57"}, "authors": [{"authorId": "9083969", - "name": "Moshe Y. Vardi"}]}, {"paperId": "3ca8c4602b3d6ae32dad6384bd27f27d6e7c2f69", - "externalIds": {"DBLP": "journals/tsmc/Rothstein88", "MAG": "2003288909", - "DOI": "10.1109/21.17370", "CorpusId": 45521917}, "url": "https://www.semanticscholar.org/paper/3ca8c4602b3d6ae32dad6384bd27f27d6e7c2f69", - "title": "Bus automata, brains, and mental models", "abstract": "The author - suggests that bus automata (BAs) may serve as better brain models than sequential - computers of cellular automata. He proposes to view self-simulationability, - together with the use of status flags and the like, as a primitive model of - self-consciousness, analogous to viewing a regulator as exhibiting rudimentary - purposive behavior. A discussion of what meanings might be ascribed in a BA - context to terms like intelligence, pattern, theory, and meaning itself is - also given. It is concluded that the BA-UTM (universal Turing machine) is - a promising candidate for a brain model whose operation may actually be relevant - to mental processes. Prospects for actual BA-UTM realization are briefly discussed. - >", "venue": "IEEE Trans. Syst. Man Cybern.", "year": 1988, "referenceCount": - 11, "citationCount": 105, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1988-07-01", "journal": - {"name": "IEEE Trans. Syst. Man Cybern.", "pages": "522-531", "volume": "18"}, - "authors": [{"authorId": "39522198", "name": "J. Rothstein"}]}, {"paperId": - "5dde6f42f0c2b90810ca83ae8cb6a519ee8b452d", "externalIds": {"MAG": "2029589229", - "DOI": "10.2307/1936670", "CorpusId": 84406450}, "url": "https://www.semanticscholar.org/paper/5dde6f42f0c2b90810ca83ae8cb6a519ee8b452d", + "pages": "\n 031908\n ", "volume": "79 3 Pt 1"}, "authors": + [{"authorId": "37747895", "name": "R. Barrio"}, {"authorId": "35275545", "name": + "R. Baker"}, {"authorId": "40461322", "name": "Benjamin L. Vaughan"}, {"authorId": + "1395791800", "name": "Karla Tribuzy"}, {"authorId": "39227154", "name": "M. + D. de Carvalho"}, {"authorId": "1829624", "name": "R. Bassanezi"}, {"authorId": + "2339973", "name": "P. Maini"}]}, {"paperId": "a6b90ae3c4d2afadd5c84e5c367d1ae0aa7d9898", + "externalIds": {"MAG": "2162155774", "DBLP": "journals/ijbc/RademacherS07", + "DOI": "10.1142/S0218127407018683", "CorpusId": 16571931}, "corpusId": 16571931, + "publicationVenue": {"id": "f3358047-5fa1-4315-9473-4bb4c19cb756", "name": + "International Journal of Bifurcation and Chaos in Applied Sciences and Engineering", + "type": "journal", "alternate_names": ["Int J Bifurc Chaos", "Int J Bifurc + Chaos Appl Sci Eng", "International Journal of Bifurcation and Chaos"], "issn": + "0218-1274", "url": "http://www.worldscinet.com/ijbc/ijbc.shtml", "alternate_urls": + ["http://www.worldscinet.com/ijbc/mkt/archive.shtml"]}, "url": "https://www.semanticscholar.org/paper/a6b90ae3c4d2afadd5c84e5c367d1ae0aa7d9898", + "title": "Instabilities of Wave Trains and Turing Patterns in Large Domains", + "abstract": "We classify generic instabilities of wave trains in reaction\u2013diffusion + systems on the real line as the wavenumber and system parameters are varied. + We find three types of robust instabilities: Hopf with nonzero modulational + wavenumber, sideband and spatio-temporal period-doubling. Near a fold, the + only other robust instability mechanism, we show that all wave trains are + necessarily unstable. We also discuss the special cases of homogeneous oscillations + and reflection symmetric, stationary Turing patterns.", "venue": "International + Journal of Bifurcation and Chaos in Applied Sciences and Engineering", "year": + 2007, "referenceCount": 46, "citationCount": 37, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Int. J. Bifurc. Chaos", "pages": + "2679-2691", "volume": "17"}, "authors": [{"authorId": "144207734", "name": + "J. Rademacher"}, {"authorId": "2022973", "name": "A. Scheel"}]}, {"paperId": + "1ea3cb0b620bade45ae1a23ca891557de4cc258f", "externalIds": {"MAG": "2047703408", + "DOI": "10.1016/J.NONRWA.2011.05.022", "CorpusId": 121471044}, "corpusId": + 121471044, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1ea3cb0b620bade45ae1a23ca891557de4cc258f", + "title": "Turing pattern formation in a predator\u2013prey\u2013mutualist + system", "abstract": null, "venue": "", "year": 2011, "referenceCount": 51, + "citationCount": 44, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-12-01", + "journal": {"name": "Nonlinear Analysis-real World Applications", "pages": + "3224-3237", "volume": "12"}, "authors": [{"authorId": "1990780", "name": + "Canrong Tian"}, {"authorId": "2053397687", "name": "Zhi Ling"}, {"authorId": + "119563901", "name": "Zhigui Lin"}]}, {"paperId": "9306fc0c80d69b1d8475803a09f5c6eb0c896982", + "externalIds": {"MAG": "2508762950", "CorpusId": 152138239}, "corpusId": 152138239, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9306fc0c80d69b1d8475803a09f5c6eb0c896982", + "title": "The Managed Heart", "abstract": "The phrase \"emotional labor\" + was coined by sociologist Arlie Hochschild in 1983 in her classic book, The + Managed Heart. Jobs requiring emotional labor typically necessitate contact + with other people external to or within the organization, usually involving + face-to-face or voice-to-voice contact, especially in service work. In this + article, the authors summarize Hochschild''s pathbreaking work and assess + the state of the current multi- and interdisciplinary litera- ture on emotional + labor. They distinguish between two interrelated areas of research on emotional + labor. The first area involves predomi- nantly, though not exclusively, qualitative + case studies of employees at workplaces in the service sector. A second set + of studies, primarily quantitative, investigates the link between emotional + labor at home, in different jobs, or in nurturing activities (a specific form + of emo- tional labor) and its consequences for individual employees'' job + satis- faction, productivity, and pay.", "venue": "", "year": 2016, "referenceCount": + 19, "citationCount": 201, "influentialCitationCount": 26, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Sociology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "116918398", + "name": "R. Steinberg"}, {"authorId": "104678693", "name": "D. Figart"}]}, + {"paperId": "cf76dbcf7d7fff4a141fe8a102e96cb0907dc421", "externalIds": {"DBLP": + "journals/corr/Walsh15a", "ArXiv": "1510.09033", "MAG": "1933538929", "DOI": + "10.1145/2838729", "CorpusId": 12970671}, "corpusId": 12970671, "publicationVenue": + {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", "name": "Communications of + the ACM", "type": "journal", "alternate_names": ["Commun ACM", "Communications + of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/cf76dbcf7d7fff4a141fe8a102e96cb0907dc421", + "title": "Turing''s red flag", "abstract": "A proposal for a law to prevent + artificial intelligence systems from being mistaken for humans.", "venue": + "Communications of the ACM", "year": 2015, "referenceCount": 5, "citationCount": + 18, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-10-30", "journal": + {"name": "Communications of the ACM", "pages": "34 - 37", "volume": "59"}, + "authors": [{"authorId": "1733716", "name": "T. Walsh"}]}, {"paperId": "9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", + "externalIds": {"MAG": "2040323430", "DOI": "10.1021/J100195A045", "CorpusId": + 95843255}, "corpusId": 95843255, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9774e4cd679aa9cbfb6a22bdd5c28407b6ec476e", + "title": "Spatial bistability of two-dimensional turing patterns in a reaction-diffusion + system", "abstract": "A Turing bifurcation from an uniform state to a striped + patterned state was observed in experiments conducted in a single-phase spatial + open gel reactor with the chlorite-iodide-malonic acid-starch (CIMA) reaction; + previous experiments had revealed a bifurcation from a uniform state to hexagons + rather than stripes. A modified reactor is used to demonstrate that the hexagonal + and striped patterns are quasi-two-dimensional; this is further confirmed + by a direct measurement of the third dimension of patterns with a camera of + high resolution in depth of field. For some range of chemical concentrations + the hexagonal and striped patterns are bistable; this is the first evidence + of spatial bistability between Turing structures. 24 refs., 5 tabs.", "venue": + "", "year": 1992, "referenceCount": 0, "citationCount": 42, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "The Journal of Physical Chemistry", "pages": "6773-6776", + "volume": "96"}, "authors": [{"authorId": "143803550", "name": "Q. Ouyang"}, + {"authorId": "5289890", "name": "Z. Noszticzius"}, {"authorId": "2421446", + "name": "H. Swinney"}]}, {"paperId": "5dde6f42f0c2b90810ca83ae8cb6a519ee8b452d", + "externalIds": {"MAG": "2029589229", "DOI": "10.2307/1936670", "CorpusId": + 84406450}, "corpusId": 84406450, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5dde6f42f0c2b90810ca83ae8cb6a519ee8b452d", "title": "THE EFFECT OF ARCHITECTURAL VARIATION IN HABITAT ON A SPIDER COMMUNITY: AN EXPERIMENTAL FIELD STUDY''", "abstract": "Spider species acceptance of, and segregation by, architectural configuration was in- vestigated for the @@ -27323,529 +31172,140 @@ interactions: The two most abundant jumping spiders were biased toward modules with widely spaced jute, while the two most abundant web-builders preferred closely spaced jute.", "venue": "", "year": 1981, "referenceCount": 18, "citationCount": - 199, "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1981-02-01", "journal": {"name": "Ecology", "pages": - "73-80", "volume": "62"}, "authors": [{"authorId": "39907209", "name": "James - V. Robinson"}]}, {"paperId": "ebdd045178c171509e8b6215c8e660bf7495175a", "externalIds": - {"MAG": "2126435179", "DBLP": "conf/eurogp/LangdonP06", "DOI": "10.1007/11729976_20", - "CorpusId": 14250136}, "url": "https://www.semanticscholar.org/paper/ebdd045178c171509e8b6215c8e660bf7495175a", - "title": "The Halting Probability in Von Neumann Architectures", "abstract": - null, "venue": "European Conference on Genetic Programming", "year": 2006, - "referenceCount": 20, "citationCount": 24, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer + 199, "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1981-02-01", "journal": {"name": + "Ecology", "pages": "73-80", "volume": "62"}, "authors": [{"authorId": "39907209", + "name": "James V. Robinson"}]}, {"paperId": "e2bef9792822745cc56184421a1adf0d10cfe85a", + "externalIds": {"MAG": "613464761", "DOI": "10.2312/GFZ.NMSOP_R1_CH1", "CorpusId": + 127644714}, "corpusId": 127644714, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2bef9792822745cc56184421a1adf0d10cfe85a", + "title": "IASPEI New Manual of seismological observatory practice(NMSOP)", + "abstract": "Most of what we know today about the internal struc ture and + physical properties of the Earth, and thus about the internal forces which + drive plat e motions and produce major geological features, has been derived + from seismological data. Seismology continues to be a fundamental tool for + investigating the kinematics and dynamics of geological processes at all scales. + With continued advances in seismological methods we hope to b tter understand, + predict and use our geological environment and its driving processe s with + their diverse benefits as well as hazards to human society.", "venue": "", + "year": 2002, "referenceCount": 0, "citationCount": 104, "influentialCitationCount": + 10, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], + "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, {"category": + "Geology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2007759", + "name": "P. Bormann"}]}, {"paperId": "51bac5f7bdbe22b7f84164f8204e5c570cf9f29b", + "externalIds": {"DBLP": "journals/eatcs/FortnowH03", "MAG": "2134140745", + "CorpusId": 854161}, "corpusId": 854161, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/51bac5f7bdbe22b7f84164f8204e5c570cf9f29b", + "title": "A Short History of Computational Complexity", "abstract": "It all + started with a machine. In 1936, Turing developed his theoretical computational + model. He based his model on how he perceived mathematicians think. As digital + computers were developed in the 40\u2019s and 50\u2019s, the Turing machine + proved itself as the right theoretical model for computation. Quickly though + we discovered that the basic Turing machine model fails to account for the + amount of time or memory needed by a computer, a critical issue today but + even more so in those early days of computing. The key idea to measure time + and space as a function of the length of the input came in the early 1960\u2019s + by Hartmanis and Stearns. And thus computational complexity was born. In the + early days of complexity, researchers just tried understanding these new measures + and how they related to each other. We saw the first notion of efficient computation + by using time polynomial in the input size. This led to complexity\u2019s + most important concept, NP-completeness, and its most fundamental question, + whether P = NP. The work of Cook and Karp in the early 70\u2019s showed a + large number of combinatorial and logical problems were NP-complete, i.e., + as hard as any problem computable in nondeterministic polynomial time. The + P = NP question is equivalent to an efficient solution of any of these problems. + In the thirty years hence this problem has become one of the outstanding open + questions in computer science and indeed all of mathematics. In the 70\u2019s + we saw the growth of complexity classes as researchers tried to encompass + different models of computations. One of those models, probabilistic computation, + started with a probabilistic test for primality, led to probabilistic complexity + classes and a new kind of interactive proof system that itself led to hardness + results for approximating certain NP-complete problems. We have also seen + strong evidence that we can remove the randomness from computations and most + recently a deterministic algorithm for the original primality problem. In + the 80\u2019s we saw the rise of finite models like circuits that capture + computation in an inherently different way. A new approach to problems like + P = NP arose from these circuits and though they have had limited success + in separating complexity classes, this approach brought combinatorial techniques + into the area and led to a much better understanding of the limits of these + devices. \u2217URL: http://www.neci.nj.nec.com/homepages/fortnow. Email: fortnow@research.nj.nec.com. + \u2020URL: http://www.cs.bu.edu/faculty/homer. Email: homer@cs.bu.edu. Supported + in part by the NSF under grant NSF-CCR-998310 and by the ARO under grant DAAD19-02-1-0058.", + "venue": "Bull. EATCS", "year": 2003, "referenceCount": 151, "citationCount": + 103, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-10-02", "journal": {"name": "Bull. EATCS", "pages": "95-133", "volume": + "80"}, "authors": [{"authorId": "1691447", "name": "L. Fortnow"}, {"authorId": + "143659735", "name": "S. Homer"}]}, {"paperId": "e4b8e3b334c084e8bf14c7d576ad03f8b67c4cc2", + "externalIds": {"MAG": "2135010822", "DBLP": "conf/dna/LakinP11", "DOI": "10.1007/978-3-642-23638-9_12", + "CorpusId": 14133888}, "corpusId": 14133888, "publicationVenue": {"id": "31f44e5f-f988-4a14-a236-2ecf8d216061", + "name": "DNA", "type": "conference", "alternate_names": ["International Meeting + on DNA Computing", "Int Meet DNA Comput"], "issn": "0198-0238", "alternate_issns": + ["2673-8856", "1557-7430"], "url": "http://www.liebertonline.com/loi/dna", + "alternate_urls": ["https://www.liebertpub.com/loi/dna", "http://www.liebertpub.com/DNA"]}, + "url": "https://www.semanticscholar.org/paper/e4b8e3b334c084e8bf14c7d576ad03f8b67c4cc2", + "title": "Modelling, Simulating and Verifying Turing-Powerful Strand Displacement + Systems", "abstract": null, "venue": "DNA", "year": 2011, "referenceCount": + 20, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-04-10", "journal": {"pages": "225-237"}, "authors": - [{"authorId": "3169349", "name": "W. Langdon"}, {"authorId": "1742664", "name": - "R. Poli"}]}, {"paperId": "a56c992219bca398fe45bc820671e097dbb19b3c", "externalIds": - {"MAG": "2082106534", "DOI": "10.1109/16.830987", "CorpusId": 18362855}, "url": - "https://www.semanticscholar.org/paper/a56c992219bca398fe45bc820671e097dbb19b3c", - "title": "A Four-Step Method for De-Embedding Gigahertz", "abstract": "In - this paper, a de-embedding method is proposed for conducting accurate on-wafer - device measurements in the gi- gahertz range. The method addresses issues - of substrate coupling and contact effects and is therefore suitable for measurements - with lossy technologies such as CMOS. The method assumes a probe-tip two-port - calibration performed with well-known techniques and impedance substrates. - By employing a physical interpretation of the test-fixture, the method alleviates - a number of known prob- lems with common de-embedding procedures. Four distinct - math- ematical steps are suggested to de-embed parasitics for the test-fix- - ture to give an accurate measurement of the device under test. By introducing - a simple compensation factor for in-fixture stan- dard imperfections, the - proposed method allows large devices to be measured with high accuracy. The - applicability of the method is demonstrated with measurements up to 12 GHz.", - "venue": "", "year": 2000, "referenceCount": 9, "citationCount": 191, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2000-04-01", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1788224", - "name": "T. Kolding"}]}, {"paperId": "c92c4211bdde0b24ed20e5e06d72b061b51584be", - "externalIds": {"DBLP": "conf/uc/YoungerRS14", "MAG": "16982484", "DOI": "10.1007/978-3-319-08123-6_31", - "CorpusId": 9524396}, "url": "https://www.semanticscholar.org/paper/c92c4211bdde0b24ed20e5e06d72b061b51584be", - "title": "Development of Physical Super-Turing Analog Hardware", "abstract": - null, "venue": "UCNC", "year": 2014, "referenceCount": 13, "citationCount": - 15, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-07-14", "journal": - {"pages": "379-391"}, "authors": [{"authorId": "145547836", "name": "A. S. - Younger"}, {"authorId": "2592737", "name": "E. Redd"}, {"authorId": "2797623", - "name": "H. Siegelmann"}]}, {"paperId": "32461d71bb3b1c5028d9d8d1b85e00644d734377", - "externalIds": {"MAG": "2013892518", "DOI": "10.1216/RMJ-2013-43-5-1637", - "CorpusId": 7320283}, "url": "https://www.semanticscholar.org/paper/32461d71bb3b1c5028d9d8d1b85e00644d734377", - "title": "Bifurcations of patterned solutions in the diffusive Lengyel-Epstein - system of Cima chemical reactions", "abstract": "Bifurcations of spatially - nonhomogeneous periodic solutions and steady state solutions are rigorously - proved for a reaction-diffusion system modeling CIMA chemical reaction. The - existence of these patterned solutions shows the richness of the spatiotemporal - dynamics including Turing instability and oscillatory behavior. Examples of - numerical simulation are also shown to support and strengthen the analytical - approach.", "venue": "", "year": 2013, "referenceCount": 37, "citationCount": - 55, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2013-10-01", "journal": {"name": "Rocky Mountain - Journal of Mathematics", "pages": "1637-1674", "volume": "43"}, "authors": - [{"authorId": "103340106", "name": "Jiayin Jin"}, {"authorId": "1728518", - "name": "Junping Shi"}, {"authorId": "145604974", "name": "Junjie Wei"}, {"authorId": - "36542362", "name": "Fengqi Yi"}]}, {"paperId": "e0fd490af920d23627fa45790e88aa39567067b3", - "externalIds": {"DBLP": "journals/cacm/Hartmanis94", "MAG": "2080920278", - "DOI": "10.1145/194313.214781", "CorpusId": 14859828}, "url": "https://www.semanticscholar.org/paper/e0fd490af920d23627fa45790e88aa39567067b3", - "title": "Turing Award lecture on computational complexity and the nature - of computer science", "abstract": "computer model in our later work. I personally - was deeply impressed with Shannon''s communication theory [12]. Shannon''s - theory gave precise quantitative laws of how much inforlnation can be \"reliably\" - transmitted over a noisy channel in terms of the channel capacity and the - entropy of the inforlnation source, l loved physics for its beautifully precise - laws that govern and explaiu the behavior of the physical world. In Shannon''s - work, ti)r the first time, 1 saw precise quantitative laws that governed the - behavior of the abstract entity of information. For an ex-physicist the idea - that there could be quantitative laws governing such abstract entities as - information and its transmission was surprising and imlnensely fascinating. - Shannon had given a beautiful example of quantitative laws for intbrmation - which by its nature is not directly constrained by physical laws. This raised - the question whether there could be precise quantitative laws that govern - the abstract process of computing, which again was not directly constrained - by physical laws. Could there be quantitative laws that de termine for each - problem how much computing effort (work) is required for its solution and - how to measure and determine it? From these and other considerations grew - our deep conviction that there lnust be quantitative laws that govern the - behavior of information and computing. The results of this research eftbrt - were summarized in our illSt paper on this topic, which also named this new - research area, \"On the computat ional complexity of algorithms\" [5]. To - capture the quantitative behavior of the comput ing effort and to classify - computations by their intrinsic computational complexity, which we were seeking, - we needed a robust computing model and an intuitively satisfying classification - of the complexity of problems. The Tur ing machine was ideally suited for - the computer lnodel, and we modified it to the multi-tape version. To classify - computations (or problems) we introduced the key concept of a complexity class - in terms of the Tur ing machines with bounded computat ional resources. A - complexity class, for example, C,,e in our original notation, consists of - all problems whose instances of length n can be solved in n 2 steps on a multi-tape - Turing machine. In contemporary notation, C,,z = TIME[n2]. Today, complexity - classes are central objects of study, and many results and problems in complexity - theory are expressed in terms of complexity classes. A considerable part of - our early work on complexity theory was dedicated to showing that we had defined - a meaningful classification of problems according to their computat ional - difficulty and deriving results about it. We showed that our classification - was robust and was not essentially altered by minor changes in the model and - that the complexity classification indeed captured the intuitive ideas about - the complexity of numbers and functions. We explored how computat ion speed - changed by going from one-tape to multi-tape machines and even to multidimensional - tapes and derived bounds tbl these \"speed8 October 19941Vol.37, No.10 COMMUN|\u00a2ATIOIHUG - OP THIil ACM ups.\" Somewhat later, Manuel Blum, in his Ph.D. dissertation - at MIT [1 ], developed an axiomatic theory of computational complexity and, - among many other results, showed that all complexity measures are recursively - related. Our speed-up results were special cases of this relationship. For - us it was a delight to meet Manuel while he was writing his dissertation and - to exchange ideas about computational complexity. Similarly, we were impressed - and influenced by H. Yamada''s work on real-time computations in his dissertation - at the University of Pennsylvania [15] under the supervision of Robert McNaughton. - We also proved Hierarchy Theorelns that asserted that a slight increase in - computation time (bounds) permits sohltion of new problelns. More explicity: - if T(n) and U(n) are \"nice\" functions and T(n) ~ lim = 0 '' , >~ U ( n ) - then complexity class TIME[T(n)] is properly contained in TIME[U(n)]. These - results showed that there are problems with very sharp, intrinsic computational - complexity bounds. No lnatter what method and computational algorithm was - used, the problem solution required, say n 2, operation for problem instance - of size n. Blum in his dissertation showed that this is not the case for all - problems and that there can exist exotic problems with less sharply defined - bounds. To relate our classification of the real numbers by their computation - complexity to the classical concepts, we showed that all algebraic numbers - are in the low complexity class TIME[n\"] and found, to our surprise, some - transcendental numbers that were real-time computable (i.e., they were in - TIME[n]). Since we could not prove that any irrational algebraic numbers were - in TIME[n], we conjectured that all real-time computable numbers are either - rational or transcendental. This is still an open problem 30 years later and - only gradually did we realize its mathematical depth and the profound consequences - its p roof would have in mathematics. Toward the end of the introduction of - our first paper on complexity theory [5], we state: \"The final section is - devoted to open questions and problem areas. It is our conviction that numbers - and functions have an intrinsic computational nature according to which they - can be classified, as shown in this paper, and that there is a good opportuni - ty here for further research.\" Indeed there was! We had opened a new computer - science area of research and given it a name. At the GE Research Laboratory, - Phil Louis jo ined us to explore tape(or memory) bounded computations that - yielded many interesting results and established computational space as another - major computational resource measure [7, 13]. We showed that all context-free - languages could be recognized on (log n)2-tape. This result led Savitch [10] - to his elegant result about the relation between deterministic and nondeterministic - tapebounded computations: for \"nice\" functions F(n), NTAPE[F(n)] is contained - in TAPE[F(n)2]. Our colleague at the Laboratory, Daniel Younger [16], showed - that context-free languages were contained in TIME[n:~]. Soon many others - jo ined the exploration of the complexity of computation, and COlnputational - complexity theory grew into a major research area with deep and interesting - results and some of the most notorious open problems in computer science. - Looking at all of computer science and its history, 1 am very impressed by - the scientific and technological achievements, and they far exceed what I - had expected. Computer science has grown into an important science with rich - intellectual achievements, an impressive arsenal of practical results and - exciting fllture challenges. Equally impressive are the unprecedented technological - developments in computing power and communication capacity that have amplified - the scientific achievements and have given computing and computer science - a central role in our scientific, intellectual and commercial activities. - 1 personally believe that computer science is not only a rapidly maturing - science, but that it is more. Computer science differs so basically f iom - the other sciences that it has to be viewed as a new species among the sciences, - and it must be so understood. Computer science deals with intbrmation, its - creation and processing, and with the systems that perform it, much of which - is not directly restrained and governed by physical laws. Thus computer science - is laying the foundations and developing the research paradigms and scientific - methods for the exploration of the world of informat ion and intellectual - processes that are not directly governed by physical laws. This is what sets - it apart from the other sciences and what we vaguely perceived and found fascinating - in our early exploration of computational complexity. One of the defining - characteristics of computer science is the immense difference in scale of - the phenomena computer science deals with. From the individual bits of programs - and data in the computers to billions of operations per second on this infbrmation - by the highly complex machines, their operat ing systems and the various languages - in which the problems are described, the scale changes through many orders - of magnitude. Donald Knuth 2 puts it nicely: Computer Science and Engineering - is a field that attracts a different kind of thinker. I believe that one who - is a natural computer scientist thinks algorithmically. Such people are especiaUy - good at dealing with situations where different rules apply in different cases; - they are individuals who can rapidly change levels of abstraction, simultaneously - seeing thin U \"in the large\" and \"in the small.\" The computer scientist - has to create many levels of abstractions to deal with these problems. One - has to create intellectual tools to conceive, design, control, program, and - reason about the most complicated of human creations. Fur thermore , this - has to be done with unprecedented precision. The underlying hardware that - executes the computations are universal machines and therefore they are chaotic - systems: the slightest change in their instructions or data can result in - arbitrarily large differences in the results. This, as we well know, is an - inherent prop2Personal conmmnication. March 10, 1992 letter. COMMUNICAT IONSOFTHE - ACM Octobcr 1994/Vo1.37, No.lO ~", "venue": "CACM", "year": 1994, "referenceCount": - 23, "citationCount": 90, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1994-10-01", "journal": {"name": "Commun. ACM", "pages": "37-43", "volume": - "37"}, "authors": [{"authorId": "1747181", "name": "J. Hartmanis"}]}, {"paperId": - "d126f4a1385f8dd2fbfdb0bcc74a4485f30c4234", "externalIds": {"MAG": "2887591403", - "DBLP": "journals/corr/abs-1808-01701", "ArXiv": "1808.01701", "DOI": "10.1098/rspa.2018.0767", - "CorpusId": 51925320, "PubMed": "31293355"}, "url": "https://www.semanticscholar.org/paper/d126f4a1385f8dd2fbfdb0bcc74a4485f30c4234", - "title": "Revisiting the simulation of quantum Turing machines by quantum - circuits", "abstract": "Yao''s 1995 publication \u2018Quantum circuit complexity\u2019 - in Proceedings of the 34th Annual IEEE Symposium on Foundations of Computer - Science, pp. 352\u2013361, proved that quantum Turing machines and quantum - circuits are polynomially equivalent computational models: t\u2265n steps - of a quantum Turing machine running on an input of length n can be simulated - by a uniformly generated family of quantum circuits with size quadratic in - t, and a polynomial-time uniformly generated family of quantum circuits can - be simulated by a quantum Turing machine running in polynomial time. We revisit - the simulation of quantum Turing machines with uniformly generated quantum - circuits, which is the more challenging of the two simulation tasks, and present - a variation on the simulation method employed by Yao together with an analysis - of it. This analysis reveals that the simulation of quantum Turing machines - can be performed by quantum circuits having depth linear in t, rather than - quadratic depth, and can be extended to variants of quantum Turing machines, - such as ones having multi-dimensional tapes. Our analysis is based on an extension - of method described by Arright, Nesme and Werner in 2011 in Journal of Computer - and System Sciences 77, 372\u2013378. (doi:10.1016/j.jcss.2010.05.004), that - allows for the localization of causal unitary evolutions.", "venue": "Proceedings - of the Royal Society A", "year": 2018, "referenceCount": 27, "citationCount": - 19, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Medicine", "Computer Science", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2018-08-06", "journal": - {"name": "Proceedings of the Royal Society A", "volume": "475"}, "authors": - [{"authorId": "144791161", "name": "Abel Molina"}, {"authorId": "145264143", - "name": "J. Watrous"}]}, {"paperId": "b67abfa6a1422f46a0130d9b03a3e6d8f1b3a1aa", - "externalIds": {"MAG": "2045988318", "DOI": "10.1016/S0022-5193(03)00170-X", - "CorpusId": 45634688, "PubMed": "12941592"}, "url": "https://www.semanticscholar.org/paper/b67abfa6a1422f46a0130d9b03a3e6d8f1b3a1aa", - "title": "Stripes, spots, or reversed spots in two-dimensional Turing systems.", - "abstract": null, "venue": "Journal of Theoretical Biology", "year": 2003, - "referenceCount": 18, "citationCount": 46, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-10-07", "journal": - {"name": "Journal of theoretical biology", "pages": "\n 339-50\n ", - "volume": "224 3"}, "authors": [{"authorId": "5764218", "name": "Hiroto Shoji"}, - {"authorId": "3148737", "name": "Y. Iwasa"}, {"authorId": "2636335", "name": - "Shigeru Kondo"}]}, {"paperId": "2ff891781733649a786930c9d339066002a1a5a4", - "externalIds": {"MAG": "2069124970", "DBLP": "conf/stoc/BeigelRS91", "DOI": - "10.1145/103418.103426", "CorpusId": 6408368}, "url": "https://www.semanticscholar.org/paper/2ff891781733649a786930c9d339066002a1a5a4", - "title": "PP is closed under intersection", "abstract": "In this seminal paper - on probabilistic Turing machines, Gill asked whether the class PP is closed - under intersection and union. We give a positive answer to this question. - We also show that PP is closed under a variety of polynomial-time truth-table - reductions. Consequences in complexity theory include the definite collapse - and (assuming P ? PP) separation of certain query hierarchies over PP. Similar - techniques allow us to combine several threshold gates into a single threshold - gate. Consequences in the study of circuits include the simulation of circuits - with a small number of threshold gates by circuits having only a single threshold - gate at the root (perceptrons) and a lower bound on the number of threshold - gates that are needed to compute the parity function.", "venue": "Symposium - on the Theory of Computing", "year": 1991, "referenceCount": 46, "citationCount": - 189, "influentialCitationCount": 13, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1991-01-03", "journal": {"name": "J. - Comput. Syst. Sci.", "pages": "191-202", "volume": "50"}, "authors": [{"authorId": - "2516122", "name": "R. Beigel"}, {"authorId": "2657115", "name": "N. Reingold"}, - {"authorId": "2417095", "name": "D. Spielman"}]}, {"paperId": "e2bef9792822745cc56184421a1adf0d10cfe85a", - "externalIds": {"MAG": "613464761", "DOI": "10.2312/GFZ.NMSOP_R1_CH1", "CorpusId": - 127644714}, "url": "https://www.semanticscholar.org/paper/e2bef9792822745cc56184421a1adf0d10cfe85a", - "title": "IASPEI New Manual of seismological observatory practice(NMSOP)", - "abstract": "Most of what we know today about the internal struc ture and - physical properties of the Earth, and thus about the internal forces which - drive plat e motions and produce major geological features, has been derived - from seismological data. Seismology continues to be a fundamental tool for - investigating the kinematics and dynamics of geological processes at all scales. - With continued advances in seismological methods we hope to b tter understand, - predict and use our geological environment and its driving processe s with - their diverse benefits as well as hazards to human society.", "venue": "", - "year": 2002, "referenceCount": 0, "citationCount": 103, "influentialCitationCount": - 10, "isOpenAccess": false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": - [{"category": "Geology", "source": "external"}, {"category": "Geology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "2007759", "name": "P. - Bormann"}]}, {"paperId": "b3957bd1722db451bba73de17aa919ccdbe5890e", "externalIds": - {"DBLP": "journals/siamam/WollkindS00", "MAG": "1993978775", "DOI": "10.1137/S0036139997326211", - "CorpusId": 12843130}, "url": "https://www.semanticscholar.org/paper/b3957bd1722db451bba73de17aa919ccdbe5890e", - "title": "Chemical Turing Pattern Formation Analyses: Comparison of Theory - with Experiment", "abstract": "The development of one- and two-dimensional - Turing patterns characteristic of the chlorite-iodide-malonic acid/indicator - reaction occurring in an open gel continuously fed unstirred reactor is investigated - by means of various weakly nonlinear stability analyses applied to the appropriately - scaled governing chlorine dioxide-iodine-malonic acid/indicator reaction-diffusion - model system. Then the theoretical predictions deduced from these pattern - formation studies are compared with experimental evidence relevant to the - diffusive instabilities under examination. The latter consist of stripes, - rhombic arrays of rectangles, and hexagonal arrays of spots or nets. Here, - starch (for the case of a polyacrylamide gel) or the gel itself (for a polyvinyl - alcohol gel) serves as the Turing pattern indicator. The main purpose of these - analyses is to explain more fully thetransition to such stationary symmetry-breaking - structures when the malonic acid reservoir concentration is decreased.", "venue": - "SIAM Journal on Applied Mathematics", "year": 2000, "referenceCount": 63, - "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "SIAM J. Appl. Math.", "pages": "387-431", "volume": "61"}, "authors": - [{"authorId": "2795654", "name": "D. Wollkind"}, {"authorId": "153800582", - "name": "Laura E. Stephenson"}]}, {"paperId": "240d6f58fd18c2e2f54182401ff2383495baf15c", - "externalIds": {"ArXiv": "quant-ph/0304128", "MAG": "2963429934", "DOI": "10.1142/9789812702449_0005", - "CorpusId": 13033690}, "url": "https://www.semanticscholar.org/paper/240d6f58fd18c2e2f54182401ff2383495baf15c", - "title": "Transcending the Limits of Turing Computability", "abstract": "Hypercomputation - or super-Turing computation is a ``computation'''' that transcends the limit - imposed by Turing''s model of computability. The field still faces some basic - questions, technical (can we mathematically and/or physically build a hypercomputer?), - cognitive (can hypercomputers realize the AI dream?), philosophical (is thinking - more than computing?). The aim of this paper is to address the question: can - we mathematically build a hypercomputer? We will discuss the solutions of - the Infinite Merchant Problem, a decision problem equivalent to the Halting - Problem, based on results obtained in \\cite{Coins,acp}. The accent will be - on the new computational technique and results rather than formal proofs.", - "venue": "", "year": 2003, "referenceCount": 33, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-04-19", "journal": {"name": - "arXiv: Quantum Physics", "volume": ""}, "authors": [{"authorId": "91183946", - "name": "V. A. Adamyan"}, {"authorId": "1685717", "name": "Cristian S. Calude"}, - {"authorId": "35003302", "name": "B. Pavlov"}]}, {"paperId": "2afcc991afa0d94821e57f19436a3139d91e5769", - "externalIds": {"CorpusId": 29936247, "PubMed": "17138885"}, "url": "https://www.semanticscholar.org/paper/2afcc991afa0d94821e57f19436a3139d91e5769", - "title": "Developmental biology. The Turing model comes of molecular age.", - "abstract": null, "venue": "Science", "year": 2006, "referenceCount": 0, "citationCount": - 44, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}], - "publicationTypes": ["JournalArticle", "LettersAndComments"], "publicationDate": - null, "journal": {"name": "Science", "pages": "\n 1397-8\n ", - "volume": "314 5804"}, "authors": [{"authorId": "2339973", "name": "P. Maini"}, - {"authorId": "35275545", "name": "R. Baker"}, {"authorId": "1965740", "name": - "C. Chuong"}]}, {"paperId": "4ec1395698ed9f367775679e5a623e7d1804d413", "externalIds": - {"MAG": "2044455065", "DBLP": "conf/focs/FischerR68", "DOI": "10.1109/SWAT.1968.15", - "CorpusId": 8514586}, "url": "https://www.semanticscholar.org/paper/4ec1395698ed9f367775679e5a623e7d1804d413", - "title": "Limited Random Access Turing Machines", "abstract": "The model of - an online multitape Turing machine is generalized by adding a bounded number - of repositioning operations to the shift repertoire. It is proved that any - such limited random access Turing machine can be effectively replaced by an - equivalent conventional Turing machine which operates in the same time. This - result yields simplified proofs and extensions of several results in the literature.", - "venue": "SWAT", "year": 1968, "referenceCount": 6, "citationCount": 16, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1968-10-15", "journal": {"pages": "356-367"}, "authors": - [{"authorId": "145298802", "name": "M. Fischer"}, {"authorId": "34896921", - "name": "A. Rosenberg"}]}, {"paperId": "87f13f99112282b15e43b0981147bde6d19d1253", - "externalIds": {"MAG": "1560598925", "DOI": "10.5948/UPO9781614445043.007", - "CorpusId": 117116125}, "url": "https://www.semanticscholar.org/paper/87f13f99112282b15e43b0981147bde6d19d1253", - "title": "Who Gave You the Epsilon?: Alan Turing and the Central Limit Theorem", - "abstract": "Because the English mathematician Alan Mathison Turing (1912\u20131954) - is remembered today primarily for his work in mathematical logic (Turing machines - and the \u201cEntscheidungsproblem\u201d), machine computation, and artificial - intelligence (the \u201cTuring test\u201d), his name is not usually thought - of in connection with either probability or statistics. One of the basic tools - in both of these subjects is the use of the normal or Gaussian distribution - as an approximation, one basic result being the Lindeberg-Feller central limit - theorem taught in first-year graduate courses in mathematical probability. - No-one associates Turing with the central limit theorem, but in 1934 Turing, - while still an undergraduate, rediscovered a version of Lindeberg''s 1922 - theorem and much of the Feller-Levy converse to it (then unpublished). This - paper discusses Turing''s connection with the central limit theorem and its - surprising aftermath: his use of statistical methods during World War II to - break key German military codes. 1 Introduction Turing went up to Cambridge - as an undergraduate in the Fall Term of 1931, having gained a scholarship - to King''s College. (Ironically, King''s was his second choice; he had failed - to gain a scholarship to Trinity.) Two years later, during the course of his - studies, Turing attended a series of lectures on the Methodology of Science, - given in the autumn of 1933 by the distinguished astrophysicist Sir Arthur - Stanley Eddington. One topic Eddington discussed was the tendency of experimental - measurements subject to errors of observation to often have an approximately - normal or Gaussian distribution.", "venue": "", "year": 1995, "referenceCount": - 24, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1995-06-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "2347279", "name": "S. Zabell"}]}, - {"paperId": "6cce3b928691cd1c7a66a119ca616db25a8765c3", "externalIds": {"DBLP": - "books/daglib/0025557", "MAG": "1485181793", "DOI": "10.1017/CBO9780511808876", - "CorpusId": 19544604}, "url": "https://www.semanticscholar.org/paper/6cce3b928691cd1c7a66a119ca616db25a8765c3", - "title": "A Second Course in Formal Languages and Automata Theory", "abstract": - "Intended for graduate students and advanced undergraduates in computer science, - A Second Course in Formal Languages and Automata Theory treats topics in the - theory of computation not usually covered in a first course. After a review - of basic concepts, the book covers combinatorics on words, regular languages, - context-free languages, parsing and recognition, Turing machines, and other - language classes. Many topics often absent from other textbooks, such as repetitions - in words, state complexity, the interchange lemma, 2DPDAs, and the incompressibility - method, are covered here. The author places particular emphasis on the resources - needed to represent certain languages. The book also includes a diverse collection - of more than 200 exercises, suggestions for term projects, and research problems - that remain open.", "venue": "", "year": 2008, "referenceCount": 0, "citationCount": - 203, "influentialCitationCount": 17, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2008-09-08", "journal": - {"pages": "I-XI, 1-240"}, "authors": [{"authorId": "1679162", "name": "J. - Shallit"}]}, {"paperId": "51bac5f7bdbe22b7f84164f8204e5c570cf9f29b", "externalIds": - {"DBLP": "journals/eatcs/FortnowH03", "MAG": "2134140745", "CorpusId": 854161}, - "url": "https://www.semanticscholar.org/paper/51bac5f7bdbe22b7f84164f8204e5c570cf9f29b", - "title": "A Short History of Computational Complexity", "abstract": "It all - started with a machine. In 1936, Turing developed his theoretical computational - model. He based his model on how he perceived mathematicians think. As digital - computers were developed in the 40\u2019s and 50\u2019s, the Turing machine - proved itself as the right theoretical model for computation. Quickly though - we discovered that the basic Turing machine model fails to account for the - amount of time or memory needed by a computer, a critical issue today but - even more so in those early days of computing. The key idea to measure time - and space as a function of the length of the input came in the early 1960\u2019s - by Hartmanis and Stearns. And thus computational complexity was born. In the - early days of complexity, researchers just tried understanding these new measures - and how they related to each other. We saw the first notion of efficient computation - by using time polynomial in the input size. This led to complexity\u2019s - most important concept, NP-completeness, and its most fundamental question, - whether P = NP. The work of Cook and Karp in the early 70\u2019s showed a - large number of combinatorial and logical problems were NP-complete, i.e., - as hard as any problem computable in nondeterministic polynomial time. The - P = NP question is equivalent to an efficient solution of any of these problems. - In the thirty years hence this problem has become one of the outstanding open - questions in computer science and indeed all of mathematics. In the 70\u2019s - we saw the growth of complexity classes as researchers tried to encompass - different models of computations. One of those models, probabilistic computation, - started with a probabilistic test for primality, led to probabilistic complexity - classes and a new kind of interactive proof system that itself led to hardness - results for approximating certain NP-complete problems. We have also seen - strong evidence that we can remove the randomness from computations and most - recently a deterministic algorithm for the original primality problem. In - the 80\u2019s we saw the rise of finite models like circuits that capture - computation in an inherently different way. A new approach to problems like - P = NP arose from these circuits and though they have had limited success - in separating complexity classes, this approach brought combinatorial techniques - into the area and led to a much better understanding of the limits of these - devices. \u2217URL: http://www.neci.nj.nec.com/homepages/fortnow. Email: fortnow@research.nj.nec.com. - \u2020URL: http://www.cs.bu.edu/faculty/homer. Email: homer@cs.bu.edu. Supported - in part by the NSF under grant NSF-CCR-998310 and by the ARO under grant DAAD19-02-1-0058.", - "venue": "Bull. EATCS", "year": 2003, "referenceCount": 151, "citationCount": - 103, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-10-02", "journal": - {"name": "Bull. EATCS", "pages": "95-133", "volume": "80"}, "authors": [{"authorId": - "1691447", "name": "L. Fortnow"}, {"authorId": "143659735", "name": "S. Homer"}]}, - {"paperId": "22d0b9e61fd52c0edb2cf2855c8eaa10ba7b10e7", "externalIds": {"MAG": - "2092632611", "ArXiv": "1207.3424", "DOI": "10.1103/PhysRevE.86.056203", "CorpusId": - 15977964, "PubMed": "23214853"}, "url": "https://www.semanticscholar.org/paper/22d0b9e61fd52c0edb2cf2855c8eaa10ba7b10e7", - "title": "Turing patterns and apparent competition in predator-prey food webs - on networks.", "abstract": "Reaction-diffusion systems may lead to the formation - of steady-state heterogeneous spatial patterns, known as Turing patterns. - Their mathematical formulation is important for the study of pattern formation - in general and plays central roles in many fields of biology, such as ecology - and morphogenesis. Here we show that Turing patterns may have a decisive role - in shaping the abundance distribution of predators and prey living in patchy - landscapes. We extend the original model proposed by Nakao and Mikhailov [Nat. - Phys. 6, 544 (2010)] by considering food chains with several interacting pairs - of prey and predators distributed on a scale-free network of patches. We identify - patterns of species distribution displaying high degrees of apparent competition - driven by Turing instabilities. Our results provide further indication that - differences in abundance distribution among patches can be generated dynamically - by self organized Turing patterns and not only by intrinsic environmental - heterogeneity.", "venue": "Physical review. E, Statistical, nonlinear, and - soft matter physics", "year": 2012, "referenceCount": 72, "citationCount": - 20, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Biology", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Environmental Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-07-14", "journal": {"name": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "pages": "\n 056203\n ", "volume": - "86 5 Pt 2"}, "authors": [{"authorId": "145166357", "name": "L. D. Fernandes"}, - {"authorId": "6866640", "name": "M. D. de Aguiar"}]}, {"paperId": "9306fc0c80d69b1d8475803a09f5c6eb0c896982", - "externalIds": {"MAG": "2508762950", "CorpusId": 152138239}, "url": "https://www.semanticscholar.org/paper/9306fc0c80d69b1d8475803a09f5c6eb0c896982", - "title": "The Managed Heart", "abstract": "The phrase \"emotional labor\" - was coined by sociologist Arlie Hochschild in 1983 in her classic book, The - Managed Heart. Jobs requiring emotional labor typically necessitate contact - with other people external to or within the organization, usually involving - face-to-face or voice-to-voice contact, especially in service work. In this - article, the authors summarize Hochschild''s pathbreaking work and assess - the state of the current multi- and interdisciplinary litera- ture on emotional - labor. They distinguish between two interrelated areas of research on emotional - labor. The first area involves predomi- nantly, though not exclusively, qualitative - case studies of employees at workplaces in the service sector. A second set - of studies, primarily quantitative, investigates the link between emotional - labor at home, in different jobs, or in nurturing activities (a specific form - of emo- tional labor) and its consequences for individual employees'' job - satis- faction, productivity, and pay.", "venue": "", "year": 2016, "referenceCount": - 19, "citationCount": 201, "influentialCitationCount": 26, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "116918398", "name": "R. Steinberg"}, - {"authorId": "104678693", "name": "D. Figart"}]}, {"paperId": "7cdbf5b026591a58a4dd5d063adbd2d35ed948ed", - "externalIds": {"MAG": "2326444488", "DOI": "10.1103/PHYSREVLETT.112.078701", - "CorpusId": 8700338, "PubMed": "24579640"}, "url": "https://www.semanticscholar.org/paper/7cdbf5b026591a58a4dd5d063adbd2d35ed948ed", - "title": "Interplay between Turing mechanisms can increase pattern diversity.", - "abstract": "We use the context of dryland vegetation to study a general problem - of complex pattern-forming systems: multiple pattern-forming instabilities - that are driven by distinct mechanisms but share the same spectral properties. - We find that the co-occurrence of two Turing instabilities when the driving - mechanisms counteract each other in some region of the parameter space results - in the growth of a single mode rather than two interacting modes. The interplay - between the two mechanisms compensates for the simpler dynamics of a single - mode by inducing a wider variety of patterns, which implies higher biodiversity - in dryland ecosystems.", "venue": "Physical Review Letters", "year": 2014, - "referenceCount": 0, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-02-20", "journal": - {"name": "Physical review letters", "pages": "\n 078701\n ", - "volume": "112 7"}, "authors": [{"authorId": "6237863", "name": "S. Kinast"}, - {"authorId": "6559912", "name": "Yuval R. Zelnik"}, {"authorId": "47620991", - "name": "G. Bel"}, {"authorId": "2122886", "name": "E. Meron"}]}, {"paperId": - "b218807afbf9225a49a944a53867dbf3ad8d8235", "externalIds": {"MAG": "2573661655", - "CorpusId": 53071308}, "url": "https://www.semanticscholar.org/paper/b218807afbf9225a49a944a53867dbf3ad8d8235", + "publicationDate": "2011-09-19", "journal": {"pages": "130-144"}, "authors": + [{"authorId": "2650343", "name": "Matthew R. Lakin"}, {"authorId": "145792830", + "name": "A. Phillips"}]}, {"paperId": "967dd75ad6e0bfa0f9ebedfe84ab817993f33eca", + "externalIds": {"MAG": "2152106902", "DBLP": "journals/toh/ReedP08", "DOI": + "10.1109/TOH.2008.13", "CorpusId": 2144050, "PubMed": "27788067"}, "corpusId": + 2144050, "publicationVenue": {"id": "b9d30174-cfe1-4e19-8512-9778cbe86d7b", + "name": "IEEE Transactions on Haptics", "type": "journal", "alternate_names": + ["IEEE Trans Haptics"], "issn": "1939-1412", "url": "https://www.computer.org/toh", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=4543165", + "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=4543165"]}, "url": + "https://www.semanticscholar.org/paper/967dd75ad6e0bfa0f9ebedfe84ab817993f33eca", + "title": "Physical Collaboration of Human-Human and Human-Robot Teams", "abstract": + "Human partners working on a target acquisition task perform faster than do + individuals on the same task, even though the partners consider each other + to be an impediment. We recorded the force profile of each partner during + the task, revealing an emergent specialization of roles that could only have + been negotiated through a haptic channel. With this understanding of human + haptic communication we attempted a \"haptic Turing test,\" replicating human + behaviors in a robot partner. Human participants consciously and incorrectly + believed their partner was human. However, force profiles did not show specialization + of roles in the human partner, nor enhanced dyadic performance, suggesting + that haptic interaction holds a greater subconscious subtlety. We further + report observations of a non-zero dyadic steady state force perhaps analogous + to co-contraction within the limb of an individual, where it contributes to + limb stiffness and disturbance rejection. We present results on disturbance + rejection in a dyad, showing lack of an effective dyadic strategy for brief + events.", "venue": "IEEE Transactions on Haptics", "year": 2008, "referenceCount": + 61, "citationCount": 196, "influentialCitationCount": 25, "isOpenAccess": + true, "openAccessPdf": {"url": "http://reedlab.eng.usf.edu/publications/reed2008_physical.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Engineering", "Medicine", "Computer + Science"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-07-01", "journal": {"name": "IEEE Transactions on + Haptics", "pages": "108-120", "volume": "1"}, "authors": [{"authorId": "144478380", + "name": "K. Reed"}, {"authorId": "1789986", "name": "M. Peshkin"}]}, {"paperId": + "d70f9494c845b393ea297c30928205f62ea2cbf2", "externalIds": {"DBLP": "journals/tcs/Loui82", + "MAG": "2074159544", "DOI": "10.1016/0304-3975(89)90081-9", "CorpusId": 10916088}, + "corpusId": 10916088, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d70f9494c845b393ea297c30928205f62ea2cbf2", + "title": "Simulations among multidimensional turing machines", "abstract": + null, "venue": "22nd Annual Symposium on Foundations of Computer Science (sfcs + 1981)", "year": 1982, "referenceCount": 17, "citationCount": 22, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1982-11-01", "journal": + {"name": "22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)", + "pages": "58-67"}, "authors": [{"authorId": "46938413", "name": "M. Loui"}]}, + {"paperId": "b218807afbf9225a49a944a53867dbf3ad8d8235", "externalIds": {"MAG": + "2573661655", "CorpusId": 53071308}, "corpusId": 53071308, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b218807afbf9225a49a944a53867dbf3ad8d8235", "title": "The crystal structure of bobfergusonite", "abstract": "Bobfergusonite Na2MnsFe3+ AI(P04)6 is monoclinic, P2/n, with a 12.776(2), b 12.488(2), c 11.035(2) A, (:J 97.21(1)0, V 1746.7(4) ,A,3, Z=4. The crystal structure, @@ -27868,51 +31328,66 @@ interactions: chains are not cross-linked within the layer, and serve to link the layers of M-cation chains and P04 tetrahedra.", "venue": "", "year": 1986, "referenceCount": 12, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1986-12-01", "journal": {"name": - "Canadian Mineralogist", "pages": "605-614", "volume": "24"}, "authors": [{"authorId": - "92369088", "name": "T. S. Ercit"}, {"authorId": "3783038", "name": "F. Hawthorne"}, - {"authorId": "6899674", "name": "P. \u010cern\u00fd"}]}, {"paperId": "e09b5820e27196e813a05d1267c7d83e712084f3", - "externalIds": {"MAG": "2077457515", "DOI": "10.1007/s11571-012-9194-0", "CorpusId": - 9509098, "PubMed": "23730353"}, "url": "https://www.semanticscholar.org/paper/e09b5820e27196e813a05d1267c7d83e712084f3", - "title": "Gap junctions modulate seizures in a mean-field model of general - anesthesia for the cortex", "abstract": null, "venue": "Cognitive Neurodynamics", - "year": 2012, "referenceCount": 52, "citationCount": 30, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-02", "journal": - {"name": "Cognitive Neurodynamics", "pages": "215-225", "volume": "6"}, "authors": - [{"authorId": "1403384168", "name": "M. Steyn-Ross"}, {"authorId": "1401041315", - "name": "D. Steyn-Ross"}, {"authorId": "2328872", "name": "J. Sleigh"}]}, - {"paperId": "1121e935b2d88550c837cea2e68160bb8b4d5f30", "externalIds": {"MAG": - "1974988355", "DOI": "10.1007/BF00275996", "CorpusId": 37860033, "PubMed": - "3755746"}, "url": "https://www.semanticscholar.org/paper/1121e935b2d88550c837cea2e68160bb8b4d5f30", - "title": "Pattern sensitivity to boundary and initial conditions in reaction-diffusion - models", "abstract": null, "venue": "Journal of Mathematical Biology", "year": - 1986, "referenceCount": 20, "citationCount": 104, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Journal of Mathematical Biology", "pages": "141-165", "volume": - "24"}, "authors": [{"authorId": "2098552726", "name": "P. Arcuri"}, {"authorId": - "88251269", "name": "J. Murray"}]}, {"paperId": "9bf7dce9bff7f90c1c545c014289bf62ddb4a2fa", - "externalIds": {"MAG": "2034863443", "DOI": "10.1007/S11538-005-9007-2", "CorpusId": - 8346325, "PubMed": "16794932"}, "url": "https://www.semanticscholar.org/paper/9bf7dce9bff7f90c1c545c014289bf62ddb4a2fa", - "title": "Modeling the Role of Diffusion Coefficients on Turing Instability - in a Reaction-diffusion Prey-predator System", "abstract": null, "venue": - "Bulletin of Mathematical Biology", "year": 2006, "referenceCount": 26, "citationCount": - 20, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-03-29", "journal": {"name": "Bulletin of Mathematical - Biology", "pages": "293-313", "volume": "68"}, "authors": [{"authorId": "3918172", - "name": "B. Mukhopadhyay"}, {"authorId": "145277605", "name": "R. Bhattacharyya"}]}, - {"paperId": "1f6cfd191f529ed2ae8978597cb0a37c76c862b3", "externalIds": {"MAG": - "2166963303", "CorpusId": 86117312}, "url": "https://www.semanticscholar.org/paper/1f6cfd191f529ed2ae8978597cb0a37c76c862b3", + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1986-12-01", "journal": {"name": "Canadian Mineralogist", "pages": "605-614", + "volume": "24"}, "authors": [{"authorId": "92369088", "name": "T. S. Ercit"}, + {"authorId": "3783038", "name": "F. Hawthorne"}, {"authorId": "6899674", "name": + "P. \u010cern\u00fd"}]}, {"paperId": "c9633ca21dbbf691d5821be41a2b92dbad3d64cf", + "externalIds": {"DBLP": "conf/lfcs/GeN94", "MAG": "1606204101", "DOI": "10.1007/3-540-58140-5_12", + "CorpusId": 46255318}, "corpusId": 46255318, "publicationVenue": {"id": "216bc2e0-616d-4c10-a796-bd7fa61aa3ac", + "name": "Symposium on Logical Foundations of Computer Science", "type": "conference", + "alternate_names": ["LFCS", "Symp Log Found Comput Sci"], "url": "http://www.lfcs.info/"}, + "url": "https://www.semanticscholar.org/paper/c9633ca21dbbf691d5821be41a2b92dbad3d64cf", + "title": "On Extreme Points of Convex Compact Turing Located Set", "abstract": + null, "venue": "Symposium on Logical Foundations of Computer Science", "year": + 1994, "referenceCount": 3, "citationCount": 25, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-07-11", "journal": {"pages": "114-128"}, "authors": + [{"authorId": "2056720326", "name": "Xiaolin Ge"}, {"authorId": "1724242", + "name": "A. Nerode"}]}, {"paperId": "5717e03a85130180ce8722e1b55db4d8bc76778a", + "externalIds": {"DBLP": "conf/stoc/Valiant01", "MAG": "2069149225", "DOI": + "10.1145/380752.380785", "CorpusId": 17054776}, "corpusId": 17054776, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/5717e03a85130180ce8722e1b55db4d8bc76778a", + "title": "Quantum computers that can be simulated classically in polynomial + time", "abstract": "A model of quantum computation based on unitary matrix + operations was introduced by Feynman and Deutsch. It has been asked whether + the power of this model exceeds that of classical Turing machines. We show + here that a significant class of these quantum computations can be simulated + classically in polynomial time. In particular we show that two-bit operations + characterized by 4 \\times 4 matrices in which the sixteen entries obey a + set of five polynomial relations can be composed according to certain rules + to yield a class of circuits that can be simulated classically in polynomial + time. This contrasts with the known universality of two-bit operations, and + demonstrates that efficient quantum computation of restricted classes is reconcilable + with the Polynomial Time Turing Hypothesis. In other words it is possible + that quantum phenomena can be used in a scalable fashion to make computers + but that they do not have superpolynomial speedups compared to Turing machines + for any problem. The techniques introduced bring the quantum computational + model within the realm of algebraic complexity theory. In a manner consistent + will one view of quantum physics, the wave function is simulated deterministically, + and randomization arises only in the course of making measurements. The results + generalize the quantum model in that they do not require the matrices to be + unitary. In a different direction these techniques also yield deterministic + polynomial time algorithms for the decision and parity problems for certain + classes of read-twice Boolean formulae. All our results are based on the use + of gates that are defined in terms of their graph matching properties.", "venue": + "Symposium on the Theory of Computing", "year": 2001, "referenceCount": 41, + "citationCount": 61, "influentialCitationCount": 6, "isOpenAccess": true, + "openAccessPdf": {"url": "http://people.seas.harvard.edu/~valiant/stoc01.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-07-06", "journal": {"pages": "114-123"}, "authors": + [{"authorId": "1741124", "name": "L. Valiant"}]}, {"paperId": "1f6cfd191f529ed2ae8978597cb0a37c76c862b3", + "externalIds": {"MAG": "2166963303", "CorpusId": 86117312}, "corpusId": 86117312, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1f6cfd191f529ed2ae8978597cb0a37c76c862b3", "title": "Correlated Mutations and Residue Contacts", "abstract": "The maintenance of protein function and structure constrains the evolution of amino acid sequences. This fact can be ex- ploited to interpret correlated mutations ob- served @@ -27928,76 +31403,270 @@ interactions: ture, either from sequence information alone or in combination with experimental informa- tion. 0 1994 Wiley-Liss, Inc.", "venue": "", "year": 1994, "referenceCount": 12, "citationCount": 191, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144882390", "name": "C. Sander"}, {"authorId": "2069507994", "name": "R. Schneider"}, {"authorId": "145786321", - "name": "A. Valencia"}]}, {"paperId": "469bac443e71b3e2a98b2fc6457c9f03e4adfd68", - "externalIds": {"MAG": "2089947806", "DOI": "10.1090/S0002-9947-1966-0201299-1", - "CorpusId": 10314809}, "url": "https://www.semanticscholar.org/paper/469bac443e71b3e2a98b2fc6457c9f03e4adfd68", - "title": "POST''S PROBLEM, ADMISSIBLE ORDINALS, AND REGULARITY", "abstract": - "1. Introduction. The basic notions of metarecursion theory were introduced - in [7]. Metarecursioni theory is an attempt to generalize the ideas and arguments - of recursion theory from the natural numbers to the recursive ordinals. Ordinary - recursion theory concerns itself with finite sets of natural numbers. Metarecursion - theory deals in an analogous fashion with metafinite sets of recursive ordinals. - In [7] it was seen that two of the deepest results of ordinary recursion theory, - the solution of Post''s problem [3] and the maximal set construction [4], - generalize to the metarecursive case. Theorem 4 of [7] states that there exist - two metarecursively enumerable sets of recursive ordinals such that neither - is metarecursive in the other. Kreisel [6] casts doubt on the contention that - Theorem 4 of [7] is the correct generalization of Post''s problem. He wonders - how to correctly formulate the notion of Turing reducibility for recursive - ordinals and he discusses four possible choices. It is not our place to decide - the correct notion of Turing reducibility for metarecursion theory; however, - in ?4 we show that there exist two metarecursively enumerable sets such that - neither is reducible to the other by any of the four methods discussed by - Kreisel. In [7] two sets of recursive ordinals are said to have the same metadegree - if each is metarecursive in the other. It is not known if the metadegrees - of metarecursively enumerable sets are order-isomorphic to the Turing degrees - of recursively enumerable sets, but all the existing evidence seems to favor - an affirmative answer. Driscoll [2] has shown the metadegrees of metarecursively", - "venue": "", "year": 1966, "referenceCount": 19, "citationCount": 59, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + "name": "A. Valencia"}]}, {"paperId": "b53e4cbeaf2ec13c06302e7bca533400ef4cbf06", + "externalIds": {"MAG": "2013857407", "DOI": "10.1103/PHYSREVE.85.051914", + "CorpusId": 12164812, "PubMed": "23004794"}, "corpusId": 12164812, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b53e4cbeaf2ec13c06302e7bca533400ef4cbf06", + "title": "Effects of intrinsic stochasticity on delayed reaction-diffusion + patterning systems.", "abstract": "Cellular gene expression is a complex process + involving many steps, including the transcription of DNA and translation of + mRNA; hence the synthesis of proteins requires a considerable amount of time, + from ten minutes to several hours. Since diffusion-driven instability has + been observed to be sensitive to perturbations in kinetic delays, the application + of Turing patterning mechanisms to the problem of producing spatially heterogeneous + differential gene expression has been questioned. In deterministic systems + a small delay in the reactions can cause a large increase in the time it takes + a system to pattern. Recently, it has been observed that in undelayed systems + intrinsic stochasticity can cause pattern initiation to occur earlier than + in the analogous deterministic simulations. Here we are interested in adding + both stochasticity and delays to Turing systems in order to assess whether + stochasticity can reduce the patterning time scale in delayed Turing systems. + As analytical insights to this problem are difficult to attain and often limited + in their use, we focus on stochastically simulating delayed systems. We consider + four different Turing systems and two different forms of delay. Our results + are mixed and lead to the conclusion that, although the sensitivity to delays + in the Turing mechanism is not completely removed by the addition of intrinsic + noise, the effects of the delays are clearly ameliorated in certain specific + cases.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter + physics", "year": 2012, "referenceCount": 78, "citationCount": 25, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:7e2dc7e2-db33-4d46-9c64-50e222511d42/download_file?safe_filename=335.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-05-22", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 051914\n ", "volume": "85 5 Pt 1"}, "authors": + [{"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "35275545", "name": + "R. Baker"}, {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "2339973", + "name": "P. Maini"}, {"authorId": "1413907859", "name": "S. Seirin-Lee"}]}, + {"paperId": "a22d8af58852bb2560977590b68d177ca31df7da", "externalIds": {"DBLP": + "journals/cacm/Vardi14d", "MAG": "2040141971", "DOI": "10.1145/2643596", "CorpusId": + 12987389}, "corpusId": 12987389, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/a22d8af58852bb2560977590b68d177ca31df7da", + "title": "Would Turing have passed the Turing Test?", "abstract": "It''s time + to consider the Imitation Game as just a game.", "venue": "Communications + of the ACM", "year": 2014, "referenceCount": 0, "citationCount": 11, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=2643596&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-09-01", "journal": {"name": "Communications of the + ACM", "pages": "5 - 5", "volume": "57"}, "authors": [{"authorId": "9083969", + "name": "Moshe Y. Vardi"}]}, {"paperId": "e0fd490af920d23627fa45790e88aa39567067b3", + "externalIds": {"DBLP": "journals/cacm/Hartmanis94", "MAG": "2080920278", + "DOI": "10.1145/194313.214781", "CorpusId": 14859828}, "corpusId": 14859828, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e0fd490af920d23627fa45790e88aa39567067b3", + "title": "Turing Award lecture on computational complexity and the nature + of computer science", "abstract": "computer model in our later work. I personally + was deeply impressed with Shannon''s communication theory [12]. Shannon''s + theory gave precise quantitative laws of how much inforlnation can be \"reliably\" + transmitted over a noisy channel in terms of the channel capacity and the + entropy of the inforlnation source, l loved physics for its beautifully precise + laws that govern and explaiu the behavior of the physical world. In Shannon''s + work, ti)r the first time, 1 saw precise quantitative laws that governed the + behavior of the abstract entity of information. For an ex-physicist the idea + that there could be quantitative laws governing such abstract entities as + information and its transmission was surprising and imlnensely fascinating. + Shannon had given a beautiful example of quantitative laws for intbrmation + which by its nature is not directly constrained by physical laws. This raised + the question whether there could be precise quantitative laws that govern + the abstract process of computing, which again was not directly constrained + by physical laws. Could there be quantitative laws that de termine for each + problem how much computing effort (work) is required for its solution and + how to measure and determine it? From these and other considerations grew + our deep conviction that there lnust be quantitative laws that govern the + behavior of information and computing. The results of this research eftbrt + were summarized in our illSt paper on this topic, which also named this new + research area, \"On the computat ional complexity of algorithms\" [5]. To + capture the quantitative behavior of the comput ing effort and to classify + computations by their intrinsic computational complexity, which we were seeking, + we needed a robust computing model and an intuitively satisfying classification + of the complexity of problems. The Tur ing machine was ideally suited for + the computer lnodel, and we modified it to the multi-tape version. To classify + computations (or problems) we introduced the key concept of a complexity class + in terms of the Tur ing machines with bounded computat ional resources. A + complexity class, for example, C,,e in our original notation, consists of + all problems whose instances of length n can be solved in n 2 steps on a multi-tape + Turing machine. In contemporary notation, C,,z = TIME[n2]. Today, complexity + classes are central objects of study, and many results and problems in complexity + theory are expressed in terms of complexity classes. A considerable part of + our early work on complexity theory was dedicated to showing that we had defined + a meaningful classification of problems according to their computat ional + difficulty and deriving results about it. We showed that our classification + was robust and was not essentially altered by minor changes in the model and + that the complexity classification indeed captured the intuitive ideas about + the complexity of numbers and functions. We explored how computat ion speed + changed by going from one-tape to multi-tape machines and even to multidimensional + tapes and derived bounds tbl these \"speed8 October 19941Vol.37, No.10 COMMUN|\u00a2ATIOIHUG + OP THIil ACM ups.\" Somewhat later, Manuel Blum, in his Ph.D. dissertation + at MIT [1 ], developed an axiomatic theory of computational complexity and, + among many other results, showed that all complexity measures are recursively + related. Our speed-up results were special cases of this relationship. For + us it was a delight to meet Manuel while he was writing his dissertation and + to exchange ideas about computational complexity. Similarly, we were impressed + and influenced by H. Yamada''s work on real-time computations in his dissertation + at the University of Pennsylvania [15] under the supervision of Robert McNaughton. + We also proved Hierarchy Theorelns that asserted that a slight increase in + computation time (bounds) permits sohltion of new problelns. More explicity: + if T(n) and U(n) are \"nice\" functions and T(n) ~ lim = 0 '' , >~ U ( n ) + then complexity class TIME[T(n)] is properly contained in TIME[U(n)]. These + results showed that there are problems with very sharp, intrinsic computational + complexity bounds. No lnatter what method and computational algorithm was + used, the problem solution required, say n 2, operation for problem instance + of size n. Blum in his dissertation showed that this is not the case for all + problems and that there can exist exotic problems with less sharply defined + bounds. To relate our classification of the real numbers by their computation + complexity to the classical concepts, we showed that all algebraic numbers + are in the low complexity class TIME[n\"] and found, to our surprise, some + transcendental numbers that were real-time computable (i.e., they were in + TIME[n]). Since we could not prove that any irrational algebraic numbers were + in TIME[n], we conjectured that all real-time computable numbers are either + rational or transcendental. This is still an open problem 30 years later and + only gradually did we realize its mathematical depth and the profound consequences + its p roof would have in mathematics. Toward the end of the introduction of + our first paper on complexity theory [5], we state: \"The final section is + devoted to open questions and problem areas. It is our conviction that numbers + and functions have an intrinsic computational nature according to which they + can be classified, as shown in this paper, and that there is a good opportuni + ty here for further research.\" Indeed there was! We had opened a new computer + science area of research and given it a name. At the GE Research Laboratory, + Phil Louis jo ined us to explore tape(or memory) bounded computations that + yielded many interesting results and established computational space as another + major computational resource measure [7, 13]. We showed that all context-free + languages could be recognized on (log n)2-tape. This result led Savitch [10] + to his elegant result about the relation between deterministic and nondeterministic + tapebounded computations: for \"nice\" functions F(n), NTAPE[F(n)] is contained + in TAPE[F(n)2]. Our colleague at the Laboratory, Daniel Younger [16], showed + that context-free languages were contained in TIME[n:~]. Soon many others + jo ined the exploration of the complexity of computation, and COlnputational + complexity theory grew into a major research area with deep and interesting + results and some of the most notorious open problems in computer science. + Looking at all of computer science and its history, 1 am very impressed by + the scientific and technological achievements, and they far exceed what I + had expected. Computer science has grown into an important science with rich + intellectual achievements, an impressive arsenal of practical results and + exciting fllture challenges. Equally impressive are the unprecedented technological + developments in computing power and communication capacity that have amplified + the scientific achievements and have given computing and computer science + a central role in our scientific, intellectual and commercial activities. + 1 personally believe that computer science is not only a rapidly maturing + science, but that it is more. Computer science differs so basically f iom + the other sciences that it has to be viewed as a new species among the sciences, + and it must be so understood. Computer science deals with intbrmation, its + creation and processing, and with the systems that perform it, much of which + is not directly restrained and governed by physical laws. Thus computer science + is laying the foundations and developing the research paradigms and scientific + methods for the exploration of the world of informat ion and intellectual + processes that are not directly governed by physical laws. This is what sets + it apart from the other sciences and what we vaguely perceived and found fascinating + in our early exploration of computational complexity. One of the defining + characteristics of computer science is the immense difference in scale of + the phenomena computer science deals with. From the individual bits of programs + and data in the computers to billions of operations per second on this infbrmation + by the highly complex machines, their operat ing systems and the various languages + in which the problems are described, the scale changes through many orders + of magnitude. Donald Knuth 2 puts it nicely: Computer Science and Engineering + is a field that attracts a different kind of thinker. I believe that one who + is a natural computer scientist thinks algorithmically. Such people are especiaUy + good at dealing with situations where different rules apply in different cases; + they are individuals who can rapidly change levels of abstraction, simultaneously + seeing thin U \"in the large\" and \"in the small.\" The computer scientist + has to create many levels of abstractions to deal with these problems. One + has to create intellectual tools to conceive, design, control, program, and + reason about the most complicated of human creations. Fur thermore , this + has to be done with unprecedented precision. The underlying hardware that + executes the computations are universal machines and therefore they are chaotic + systems: the slightest change in their instructions or data can result in + arbitrarily large differences in the results. This, as we well know, is an + inherent prop2Personal conmmnication. March 10, 1992 letter. COMMUNICAT IONSOFTHE + ACM Octobcr 1994/Vo1.37, No.lO ~", "venue": "CACM", "year": 1994, "referenceCount": + 23, "citationCount": 90, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=214781&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-10-01", "journal": {"name": "Commun. ACM", "pages": + "37-43", "volume": "37"}, "authors": [{"authorId": "1747181", "name": "J. + Hartmanis"}]}, {"paperId": "7a6c06d7393a9863445e2cb020d4eaf70b8eccdb", "externalIds": + {"DBLP": "journals/jcss/Tourlakis01", "MAG": "2006558104", "DOI": "10.1006/jcss.2001.1767", + "CorpusId": 206568996}, "corpusId": 206568996, "publicationVenue": {"id": + "fa71f5e5-b029-4311-ae45-2ade36048a5d", "name": "Journal of computer and system + sciences (Print)", "type": "journal", "alternate_names": ["Journal of Computer + and System Sciences", "J comput syst sci (print", "J Comput Syst Sci"], "issn": + "0022-0000", "url": "http://www.elsevier.com/locate/jcss", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/00220000", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/7a6c06d7393a9863445e2cb020d4eaf70b8eccdb", + "title": "Time-Space Tradeoffs for SAT on Nonuniform Machines", "abstract": + "The arguments used by R. Kannan (1984, Math. Systems Theory17, 29?45), L. + Fortnow (1997, in \u201cProceedings, Twelfth Annual IEEE Conference on Computational + Complexity, Ulm, Germany, 24?27 June, 1997,\u201d pp. 52?60), and R. J. Lipton + and A. Viglas (1999, in \u201c40th Annual Symposium on Foundations of Computer + Science, New York, 17?19 Oct. 1999,\u201d pp. 459?469) are generalized and + combined with an argument for diagonalizing over machines taking n bits of + advice on inputs of length n to obtain the first nontrivial time?space lower + bounds for SAT on nonuniform machines. In particular, we show that for any + a 0, SAT cannot be computed by a random access deterministic Turing machine + using na time, no(1) space, and o(n2/2??) advice nor by a random access deterministic + Turing machine using n1+o(1) time, n1?? space, and n1?? advice. More generally, + we show that if for some ?>0 there exists a random access deterministic Turing + machine solving SAT using na time, nb space, and o(n(a+b)/2??) advice, then + a?12(b2+8?b). Lower bounds for computing \\overline{{\\bfSAT}} on random access + nondeterministic Turing machines taking sublinear advice are also obtained. + Moreover, we show that SAT does not have NC1 circuits of size nl+o(1) generated + by a nondeterministic log?space machine taking no(1) advice. Additionally, + new separations of uniform classes are obtained. We show that for all ?>0 + and all rational numbers r?1, DTISP(nr, n1??) is properly contained in NTIME(nr).", + "venue": "Journal of computer and system sciences (Print)", "year": 2001, + "referenceCount": 27, "citationCount": 31, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2001-09-01", "journal": {"name": "J. + Comput. Syst. Sci.", "pages": "268-287", "volume": "63"}, "authors": [{"authorId": + "2450345", "name": "Iannis Tourlakis"}]}, {"paperId": "e9f5e91a3e0db775118575788d1c517ab2bc3492", + "externalIds": {"MAG": "2162720870", "DOI": "10.1080/00949650008812016", "CorpusId": + 122004436}, "corpusId": 122004436, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e9f5e91a3e0db775118575788d1c517ab2bc3492", + "title": "Turing\u2019s anticipation of empirical bayes in connection with + the cryptanalysis of the naval enigma", "abstract": "The Enigma was a cryptographic + (enciphering) machine used by the German military during WWII. The German + navy changed part of the Enigma keys every other day. One of the important + cryptanalytic attacks against the naval usage was called Banburismus, a sequentiai + Bayesian procedure (anticipating sequential analysis) which was used from + the sorine of 1941 until the middle of 1943. It was invented mainlv bv A. + M. Turina and was perhaps the first important sequential Bayesian IE is unnecessab + to describe it here. Before Banburismus could be started on a given day it + was necessary to identifv which of nine \u2018biaram\u2019 (or \u2018diaraph\u2019) + tables was in use on that day. In Turing\u2019s approach to this identification + hk had io istimate the probabilities of certain \u2018trigraphs\u2019. rrhese + trigraphs were used. as described below. for determinine the initial wheel + settings of messages). For estimatidg the probabilities, Turing inventedin + important special case o the nonparametric (nonhypermetric) Empirid Bayes + method independently of Herbert Robbins. The techniaue is the sumxisine form + of Emdrical Baves in which a physical prior is assumed to eist but no apbroxiGate + functional fonn is assumed for it.", "venue": "", "year": 2000, "referenceCount": + 10, "citationCount": 71, "influentialCitationCount": 12, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Transactions of the American Mathematical Society", "pages": - "1-23", "volume": "124"}, "authors": [{"authorId": "34913308", "name": "G. - Sacks"}]}, {"paperId": "c9633ca21dbbf691d5821be41a2b92dbad3d64cf", "externalIds": - {"DBLP": "conf/lfcs/GeN94", "MAG": "1606204101", "DOI": "10.1007/3-540-58140-5_12", - "CorpusId": 46255318}, "url": "https://www.semanticscholar.org/paper/c9633ca21dbbf691d5821be41a2b92dbad3d64cf", - "title": "On Extreme Points of Convex Compact Turing Located Set", "abstract": - null, "venue": "Symposium on Logical Foundations of Computer Science", "year": - 1994, "referenceCount": 3, "citationCount": 25, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1994-07-11", "journal": {"pages": "114-128"}, "authors": [{"authorId": "2056720326", - "name": "Xiaolin Ge"}, {"authorId": "1724242", "name": "A. Nerode"}]}, {"paperId": - "cb47a545e59c7e17c9e623b2c245bcfcdeea1234", "externalIds": {"MAG": "2018893481", - "DOI": "10.2307/1925527", "CorpusId": 154216422}, "url": "https://www.semanticscholar.org/paper/cb47a545e59c7e17c9e623b2c245bcfcdeea1234", - "title": "Cost of Water Delivery Systems: Specification and Ownership Effects", - "abstract": "Three cost models of water delivery systems are replicated as - alternative specifications of a general form. A dual cost function methodology - is followed, usin g firm-specific data and ownership proxies, to trace the - effects that numerous technical constraints and variable specifications have - on t he relative efficiency of firms by ownership type. Results show that - apparent overall efficiency differences reduce to insignificance as s pecification - improves. This partly explains why past studies of overa ll efficiency of - ownership forms have yielded mixed, and in some inst ances, unreliable results. - The partial efficiency results point to fu ture public-private research methods. - Copyright 1987 by MIT Press.", "venue": "", "year": 1987, "referenceCount": - 11, "citationCount": 102, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1987-08-01", "journal": {"name": - "The Review of Economics and Statistics", "pages": "399-408", "volume": "69"}, - "authors": [{"authorId": "104423614", "name": "Ronald K. Teeples"}, {"authorId": - "95161062", "name": "D. Glyer"}]}, {"paperId": "80af92d2b295e4131336e7d48031617db11f8cb0", - "externalIds": {"MAG": "2999426777", "DOI": "10.1002/mma.6036", "CorpusId": - 212803874}, "url": "https://www.semanticscholar.org/paper/80af92d2b295e4131336e7d48031617db11f8cb0", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2000-05-01", + "journal": {"name": "Journal of Statistical Computation and Simulation", "pages": + "101 - 111", "volume": "66"}, "authors": [{"authorId": "145179124", "name": + "I. Good"}]}, {"paperId": "80af92d2b295e4131336e7d48031617db11f8cb0", "externalIds": + {"MAG": "2999426777", "DOI": "10.1002/mma.6036", "CorpusId": 212803874}, "corpusId": + 212803874, "publicationVenue": {"id": "23b432dc-5260-46ea-898e-eb5712997f11", + "name": "Mathematical methods in the applied sciences", "type": "journal", + "alternate_names": ["Math method appl sci", "Mathematical Methods in The Applied + Sciences", "Math Method Appl Sci"], "issn": "0170-4214", "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/110550313", + "alternate_urls": ["https://onlinelibrary.wiley.com/journal/10991476"]}, "url": + "https://www.semanticscholar.org/paper/80af92d2b295e4131336e7d48031617db11f8cb0", "title": "Pattern formation of a diffusive predator\u2010prey model with herd behavior and nonlocal prey competition", "abstract": "In this paper, we study the influence of the nonlocal interspecific competition of the prey population @@ -28011,58 +31680,143 @@ interactions: representations are provided to illustrate the theoretical results.", "venue": "Mathematical methods in the applied sciences", "year": 2020, "referenceCount": 37, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2020-01-06", "journal": {"name": - "Mathematical Methods in the Applied Sciences", "pages": "2233 - 2250", "volume": - "43"}, "authors": [{"authorId": "103679695", "name": "S. Djilali"}]}, {"paperId": - "556664b5a8a82fd78a215799c0d50aef4f246332", "externalIds": {"ArXiv": "math/9807185", - "MAG": "2169625092", "DBLP": "journals/siamcomp/BuhrmanFMT00", "DOI": "10.1137/S0097539798334736", - "CorpusId": 13986860}, "url": "https://www.semanticscholar.org/paper/556664b5a8a82fd78a215799c0d50aef4f246332", - "title": "Separating Complexity Classes Using Autoreducibility", "abstract": - "A set is autoreducible if it can be reduced to itself by a Turing machine - that does not ask its own input to the oracle. We use autoreducibility to - separate the polynomial-time hierarchy from exponential space by showing that - all Turing complete sets for certain levels of the exponential-time hierarchy - are autoreducible but there exists some Turing complete set for doubly exponential - space that is not. \nAlthough we already knew how to separate these classes - using diagonalization, our proofs separate classes solely by showing they - have different structural properties, thus applying Post''s program to complexity - theory. We feel such techniques may prove unknown separations in the future. - In particular, if we could settle the question as to whether all Turing complete - sets for doubly exponential time are autoreducible, we would separate either - polynomial time from polynomial space, and nondeterministic logarithmic space - from nondeterministic polynomial time, or else the polynomial-time hierarchy - from exponential time. \nWe also look at the autoreducibility of complete - sets under nonadaptive, bounded query, probabilistic, and nonuniform reductions. - We show how settling some of these autoreducibility questions will also lead - to new complexity class separations.", "venue": "SIAM journal on computing - (Print)", "year": 1998, "referenceCount": 24, "citationCount": 30, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-01-06", + "journal": {"name": "Mathematical Methods in the Applied Sciences", "pages": + "2233 - 2250", "volume": "43"}, "authors": [{"authorId": "103679695", "name": + "S. Djilali"}]}, {"paperId": "87f13f99112282b15e43b0981147bde6d19d1253", "externalIds": + {"MAG": "1560598925", "DOI": "10.5948/UPO9781614445043.007", "CorpusId": 117116125}, + "corpusId": 117116125, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/87f13f99112282b15e43b0981147bde6d19d1253", + "title": "Who Gave You the Epsilon?: Alan Turing and the Central Limit Theorem", + "abstract": "Because the English mathematician Alan Mathison Turing (1912\u20131954) + is remembered today primarily for his work in mathematical logic (Turing machines + and the \u201cEntscheidungsproblem\u201d), machine computation, and artificial + intelligence (the \u201cTuring test\u201d), his name is not usually thought + of in connection with either probability or statistics. One of the basic tools + in both of these subjects is the use of the normal or Gaussian distribution + as an approximation, one basic result being the Lindeberg-Feller central limit + theorem taught in first-year graduate courses in mathematical probability. + No-one associates Turing with the central limit theorem, but in 1934 Turing, + while still an undergraduate, rediscovered a version of Lindeberg''s 1922 + theorem and much of the Feller-Levy converse to it (then unpublished). This + paper discusses Turing''s connection with the central limit theorem and its + surprising aftermath: his use of statistical methods during World War II to + break key German military codes. 1 Introduction Turing went up to Cambridge + as an undergraduate in the Fall Term of 1931, having gained a scholarship + to King''s College. (Ironically, King''s was his second choice; he had failed + to gain a scholarship to Trinity.) Two years later, during the course of his + studies, Turing attended a series of lectures on the Methodology of Science, + given in the autumn of 1933 by the distinguished astrophysicist Sir Arthur + Stanley Eddington. One topic Eddington discussed was the tendency of experimental + measurements subject to errors of observation to often have an approximately + normal or Gaussian distribution.", "venue": "", "year": 1995, "referenceCount": + 24, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1995-06-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2347279", + "name": "S. Zabell"}]}, {"paperId": "21c1e1aab8219dada7062141c3194817f7c315e5", + "externalIds": {"DBLP": "journals/nc/AndrekaNN09", "MAG": "2016555353", "DOI": + "10.1007/s11047-009-9114-3", "CorpusId": 15932583}, "corpusId": 15932583, + "publicationVenue": {"id": "22ef711f-3d9c-4da7-a563-9238f938bb5b", "name": + "Natural Computing", "type": "journal", "alternate_names": ["Nat Comput"], + "issn": "1567-7818", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/11047?changeHeader", + "alternate_urls": ["https://link.springer.com/journal/11047"]}, "url": "https://www.semanticscholar.org/paper/21c1e1aab8219dada7062141c3194817f7c315e5", + "title": "General relativistic hypercomputing and foundation of mathematics", + "abstract": null, "venue": "Natural Computing", "year": 2009, "referenceCount": + 72, "citationCount": 42, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-09-01", "journal": {"name": "Natural Computing", "pages": "499-516", + "volume": "8"}, "authors": [{"authorId": "2639641", "name": "H. Andr\u00e9ka"}, + {"authorId": "1778493", "name": "I. N\u00e9meti"}, {"authorId": "2988847", + "name": "P. N\u00e9meti"}]}, {"paperId": "57facb32b567c36520b4e3d967f1e4bad3d46a77", + "externalIds": {"MAG": "629263589", "DOI": "10.1142/3194", "CorpusId": 118607943}, + "corpusId": 118607943, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/57facb32b567c36520b4e3d967f1e4bad3d46a77", + "title": "Topics in Nonlinear Dynamics: Applications to Physics, Biology and + Economic Systems", "abstract": "A deterministic model of die tossing (to discuss + stochasticity vs. determinism) the forced Duffing''s equation (chaos in a + simple nonlinear system, bifurcations) coupled period-doubling systems coupled + thermostatically controlled radiators (frequency locking and chaos in technical + control systems) kidney pressure and flow regulation (period-doubling and + chaos in a biological system) insulin-glucose metabolism (frequency-locking + in experiments on human subjects) environmental and microbiological population + models (higher order chaos) the beer production distribution system (chaos + in human decision making behaviour) coupled economic sectors (entrainment + in the macroeconomic system) coupled map lattices (transition to spatially + extended systems) pattern formation in chemical reaction-diffusion systems + (Turing structures).", "venue": "", "year": 1997, "referenceCount": 0, "citationCount": + 103, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1997-01-04", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "2203242", "name": "E. Mosekilde"}]}, + {"paperId": "700768a496da0595b0bc999e2f126f5a29a13a2b", "externalIds": {"DBLP": + "conf/cscw/IqbalH10", "MAG": "2166299892", "DOI": "10.1145/1718918.1718926", + "CorpusId": 843427}, "corpusId": 843427, "publicationVenue": {"id": "63d1595c-87bf-4fd8-be2e-327f299cb9ea", + "name": "Conference on Computer Supported Cooperative Work", "type": "conference", + "alternate_names": ["Conf Comput Support Cooperative Work", "CSCW"], "url": + "http://www.acm.org/pubs/contents/proceedings/series/cscw/"}, "url": "https://www.semanticscholar.org/paper/700768a496da0595b0bc999e2f126f5a29a13a2b", + "title": "Notifications and awareness: a field study of alert usage and preferences", + "abstract": "Desktop notifications are designed to provide awareness of information + while a user is attending to a primary task. Unfortunately the awareness can + come with the price of disruption to the focal task. We review results of + a field study on the use and perceived value of email notifications in the + workplace. We recorded users'' interactions with software applications for + two weeks and studied how notifications or their forced absence influenced + users'' quest for awareness of new email arrival, as well as the impact of + notifications on their overall task focus. Results showed that users view + notifications as a mechanism to provide passive awareness rather than a trigger + to switch tasks. Turing off notifications cause some users to self interrupt + more to explicitly monitor email arrival, while others appear to be able to + better focus on their tasks. Users acknowledge notifications as disruptive, + yet opt for them because of their perceived value in providing awareness.", + "venue": "Conference on Computer Supported Cooperative Work", "year": 2010, + "referenceCount": 10, "citationCount": 201, "influentialCitationCount": 15, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2010-02-06", + "journal": {"pages": "27-30"}, "authors": [{"authorId": "1730570", "name": + "Shamsi T. Iqbal"}, {"authorId": "145479841", "name": "E. Horvitz"}]}, {"paperId": + "7d2c3bdcac1d330d11cc4d2a7fd4c6d783ad6bb1", "externalIds": {"MAG": "2076114618", + "DOI": "10.1080/00927879908826793", "CorpusId": 123577637}, "corpusId": 123577637, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7d2c3bdcac1d330d11cc4d2a7fd4c6d783ad6bb1", + "title": "Yang-baxter operators arising from (co)algebra structures", "abstract": + "We construct parametrized Yang-Baxter operators from algebra struc-tures, + transfer the theory to coalgebras, and find the cases where such operators + arising from (co) algebras are isomorphic. We give examples in dimension 2.", + "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 39, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-07-01", "journal": - {"name": "SIAM J. Comput.", "pages": "1497-1520", "volume": "29"}, "authors": - [{"authorId": "1747509", "name": "H. Buhrman"}, {"authorId": "1691447", "name": - "L. Fortnow"}, {"authorId": "1717488", "name": "D. Melkebeek"}, {"authorId": - "3049789", "name": "L. Torenvliet"}]}, {"paperId": "52df377c78f5d00cf53400518117c6bb7d0337c5", - "externalIds": {"DBLP": "conf/stoc/Kosaraju79aa", "MAG": "2045141048", "DOI": - "10.1145/800135.804427", "CorpusId": 1706863}, "url": "https://www.semanticscholar.org/paper/52df377c78f5d00cf53400518117c6bb7d0337c5", - "title": "Real-time simulation of concatenable double-ended queues by double-ended - queues (Preliminary Version)", "abstract": "It is shown that concatenable - double-ended queues can be simulated in real-time by double-ended queues without - concatenation. Consequently, every multihead Turing machine with head-to-head - jumps can be simulated in real-time by multitape Turing machines.", "venue": - "STOC", "year": 1979, "referenceCount": 14, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", - "Conference"], "publicationDate": "1979-04-30", "journal": {"name": "Proceedings - of the eleventh annual ACM symposium on Theory of computing"}, "authors": - [{"authorId": "144777785", "name": "S. Kosaraju"}]}, {"paperId": "06d36239b2d0503c6508be35ee0fe0f90384c05e", - "externalIds": {"MAG": "2327747321", "DOI": "10.2307/2687742", "CorpusId": - 7729892}, "url": "https://www.semanticscholar.org/paper/06d36239b2d0503c6508be35ee0fe0f90384c05e", + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "143940361", "name": "S. Dascalescu"}, + {"authorId": "1692472", "name": "F. Nichita"}]}, {"paperId": "1de0f1d18a35da4df9a39ea0a90bd4298b6b6ba9", + "externalIds": {"MAG": "2333588249", "DOI": "10.2307/2373502", "CorpusId": + 124232916}, "corpusId": 124232916, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1de0f1d18a35da4df9a39ea0a90bd4298b6b6ba9", + "title": "Minimal Hypersurfaces in a Riemannian Manifold of Constant Curvature", + "abstract": "tures and n respectively, dim V1 = m> 1 and dim V2 =n-m ?1. Mr + n-mn In the latter part of this statement, the second fundamental form A has + two eigenvalues of multiplicities dim VI and dim V2. The main purpose of the + present paper is to investigate the converse problem for minimal hypersurfaces + in Sn+1. The author will prove a local theorem on the integrability of the + distributions of the spaces of principal vectors of a hypersurface in a Riemannian + manifold of constant curvature (Theorem 2). Making use of it, he will investigate + minimal hypersurfaces such that the multiplicities of principal curvatures + are constant. He will prove that if the number of principal curvatures is + two and the multiplicities of them are at least two for a minimal hypersurface + of this kind in Sn+'', then it is", "venue": "", "year": 1970, "referenceCount": + 4, "citationCount": 194, "influentialCitationCount": 24, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "American Journal of Mathematics", "pages": "145", "volume": + "92"}, "authors": [{"authorId": "101510641", "name": "T. \u014ctsuki"}]}, + {"paperId": "06d36239b2d0503c6508be35ee0fe0f90384c05e", "externalIds": {"MAG": + "2327747321", "DOI": "10.2307/2687742", "CorpusId": 7729892}, "corpusId": + 7729892, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/06d36239b2d0503c6508be35ee0fe0f90384c05e", "title": "Computability. Computable Functions, Logic, and the Foundations of Mathematics. Second Edition of the Preceding.", "abstract": "Philosophy and mathematics. Some paradoxes. Whole numbers. Functions. An introduction @@ -28077,56 +31831,165 @@ interactions: undecidability of arithmetic. The unprovability of consistency. Church''s thesis. Constructivist view of mathematics. Bibliography. Index of notation. Index.", "venue": "", "year": 2002, "referenceCount": 4, "citationCount": - 33, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2002-03-01", "journal": {"name": "The Bulletin - of Symbolic Logic", "volume": ""}, "authors": [{"authorId": "2129718", "name": - "C. D. Prisco"}, {"authorId": "39223851", "name": "R. L. Epstein"}, {"authorId": - "1755870", "name": "W. Carnielli"}]}, {"paperId": "1de0f1d18a35da4df9a39ea0a90bd4298b6b6ba9", - "externalIds": {"MAG": "2333588249", "DOI": "10.2307/2373502", "CorpusId": - 124232916}, "url": "https://www.semanticscholar.org/paper/1de0f1d18a35da4df9a39ea0a90bd4298b6b6ba9", - "title": "Minimal Hypersurfaces in a Riemannian Manifold of Constant Curvature", - "abstract": "tures and n respectively, dim V1 = m> 1 and dim V2 =n-m ?1. Mr - n-mn In the latter part of this statement, the second fundamental form A has - two eigenvalues of multiplicities dim VI and dim V2. The main purpose of the - present paper is to investigate the converse problem for minimal hypersurfaces - in Sn+1. The author will prove a local theorem on the integrability of the - distributions of the spaces of principal vectors of a hypersurface in a Riemannian - manifold of constant curvature (Theorem 2). Making use of it, he will investigate - minimal hypersurfaces such that the multiplicities of principal curvatures - are constant. He will prove that if the number of principal curvatures is - two and the multiplicities of them are at least two for a minimal hypersurface - of this kind in Sn+'', then it is", "venue": "", "year": 1970, "referenceCount": - 4, "citationCount": 193, "influentialCitationCount": 23, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "American - Journal of Mathematics", "pages": "145", "volume": "92"}, "authors": [{"authorId": - "101510641", "name": "T. \u014ctsuki"}]}, {"paperId": "ae83a87e664fe9ec47b7e033d119c172f87edcbb", - "externalIds": {"MAG": "2152971002", "DOI": "10.1103/PHYSREVLETT.97.178301", - "CorpusId": 15889036, "PubMed": "17155511"}, "url": "https://www.semanticscholar.org/paper/ae83a87e664fe9ec47b7e033d119c172f87edcbb", - "title": "Experimental evidence of localized oscillations in the photosensitive - chlorine dioxide-iodine-malonic acid reaction.", "abstract": "The interaction - between Hopf and Turing modes has been the subject of active research in recent - years. We present here experimental evidence of the existence of mixed Turing-Hopf - modes in a two-dimensional system. Using the photosensitive chlorine dioxide-iodine-malonic - acid reaction (CDIMA) and external constant background illumination as a control - parameter, standing spots oscillating in amplitude and with hexagonal ordering - were observed. Numerical simulations in the Lengyel-Epstein model for the - CDIMA reaction confirmed the results.", "venue": "Physical Review Letters", - "year": 2006, "referenceCount": 0, "citationCount": 27, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Materials Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-10-24", "journal": {"name": "Physical review letters", "pages": "\n 178301\n ", - "volume": "97 17"}, "authors": [{"authorId": "2701200", "name": "D. G. M\u00edguez"}, - {"authorId": "48894113", "name": "S. Alonso"}, {"authorId": "2614851", "name": - "A. P. Mu\u00f1uzuri"}, {"authorId": "2236462", "name": "F. Sagu\u00e9s"}]}, - {"paperId": "da2a30aa08361bd26a350b120d613e26beec4dba", "externalIds": {"PubMedCentral": - "2108342", "MAG": "2113727580", "DOI": "10.1083/JCB.49.2.564", "CorpusId": - 2882922, "PubMed": "19866785"}, "url": "https://www.semanticscholar.org/paper/da2a30aa08361bd26a350b120d613e26beec4dba", + 33, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2002-03-01", "journal": + {"name": "The Bulletin of Symbolic Logic", "volume": ""}, "authors": [{"authorId": + "2129718", "name": "C. D. Prisco"}, {"authorId": "39223851", "name": "R. L. + Epstein"}, {"authorId": "1755870", "name": "W. Carnielli"}]}, {"paperId": + "067f0e873923f6f0bb085dcdc961c7d58e9bfea2", "externalIds": {"MAG": "2019232231", + "DOI": "10.1112/jlms/jdm041", "CorpusId": 9180151}, "corpusId": 9180151, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/067f0e873923f6f0bb085dcdc961c7d58e9bfea2", + "title": "Using random sets as oracles", "abstract": "Let R be a notion of + algorithmic randomness for individual subsets of \u2115. A set B is a base + for R randomness if there is a Z \u2a7eT B such that Z is R random relative + to B. We show that the bases for 1\u2010randomness are exactly the K\u2010trivial + sets, and discuss several consequences of this result. On the other hand, + the bases for computable randomness include every \u039420 set that is not + diagonally noncomputable, but no set of PA\u2010degree. As a consequence, + an n\u2010c.e. set is a base for computable randomness if and only if it is + Turing incomplete.", "venue": "", "year": 2007, "referenceCount": 32, "citationCount": + 102, "influentialCitationCount": 21, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2007-06-01", "journal": {"name": "Journal of the + London Mathematical Society", "volume": "75"}, "authors": [{"authorId": "1989269", + "name": "D. Hirschfeldt"}, {"authorId": "2350687", "name": "A. Nies"}, {"authorId": + "1699450", "name": "F. Stephan"}]}, {"paperId": "d126f4a1385f8dd2fbfdb0bcc74a4485f30c4234", + "externalIds": {"MAG": "2887591403", "DBLP": "journals/corr/abs-1808-01701", + "ArXiv": "1808.01701", "DOI": "10.1098/rspa.2018.0767", "CorpusId": 51925320, + "PubMed": "31293355"}, "corpusId": 51925320, "publicationVenue": {"id": "b61ce141-a434-431b-a154-68fc26e348f3", + "name": "Proceedings of the Royal Society A", "type": "journal", "alternate_names": + ["Proc R Soc A", "Proc R Soc Math Phys Eng Sci", "Proceedings of The Royal + Society A: Mathematical, Physical and Engineering Sciences"], "issn": "1364-5021", + "url": "https://www.jstor.org/journal/procmathphysengi", "alternate_urls": + ["http://rspa.royalsocietypublishing.org/content/by/year", "http://rspa.royalsocietypublishing.org/about", + "http://rspa.royalsocietypublishing.org/", "https://royalsocietypublishing.org/journal/rspa"]}, + "url": "https://www.semanticscholar.org/paper/d126f4a1385f8dd2fbfdb0bcc74a4485f30c4234", + "title": "Revisiting the simulation of quantum Turing machines by quantum + circuits", "abstract": "Yao''s 1995 publication \u2018Quantum circuit complexity\u2019 + in Proceedings of the 34th Annual IEEE Symposium on Foundations of Computer + Science, pp. 352\u2013361, proved that quantum Turing machines and quantum + circuits are polynomially equivalent computational models: t\u2265n steps + of a quantum Turing machine running on an input of length n can be simulated + by a uniformly generated family of quantum circuits with size quadratic in + t, and a polynomial-time uniformly generated family of quantum circuits can + be simulated by a quantum Turing machine running in polynomial time. We revisit + the simulation of quantum Turing machines with uniformly generated quantum + circuits, which is the more challenging of the two simulation tasks, and present + a variation on the simulation method employed by Yao together with an analysis + of it. This analysis reveals that the simulation of quantum Turing machines + can be performed by quantum circuits having depth linear in t, rather than + quadratic depth, and can be extended to variants of quantum Turing machines, + such as ones having multi-dimensional tapes. Our analysis is based on an extension + of method described by Arright, Nesme and Werner in 2011 in Journal of Computer + and System Sciences 77, 372\u2013378. (doi:10.1016/j.jcss.2010.05.004), that + allows for the localization of causal unitary evolutions.", "venue": "Proceedings + of the Royal Society A", "year": 2018, "referenceCount": 27, "citationCount": + 19, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rspa.2018.0767", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics", "Medicine", "Computer + Science", "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-08-06", "journal": {"name": "Proceedings of the Royal + Society A", "volume": "475"}, "authors": [{"authorId": "144791161", "name": + "Abel Molina"}, {"authorId": "145264143", "name": "J. Watrous"}]}, {"paperId": + "20c1a246f621d6329470640ad5588374c3add652", "externalIds": {"MAG": "2119480834", + "DOI": "10.1017/S1355770X10000355", "CorpusId": 154366758}, "corpusId": 154366758, + "publicationVenue": {"id": "f0f5f563-acfb-4fef-b900-26fcf833c9c1", "name": + "Environment and Development Economics", "type": "journal", "alternate_names": + ["Environ Dev Econ"], "issn": "1355-770X", "url": "https://www.cambridge.org/core/product/identifier/ede/type/JOURNAL", + "alternate_urls": ["http://journals.cambridge.org/EDE", "http://journals.cambridge.org/action/displayJournal?jid=EDE", + "https://www.jstor.org/journal/envideveecon"]}, "url": "https://www.semanticscholar.org/paper/20c1a246f621d6329470640ad5588374c3add652", + "title": "The spatial dimension in environmental and resource economics", + "abstract": "ABSTRACT Mechanisms generating patterns in spatial domains have + been extensively studied in biology, but also in economics in the context + of new economic geography. The Turing mechanism or Turing diffusion-induced + instability has been central to the understanding of forces which endogenously + generate spatial patterns, but in a context where agents do not explicitly + optimize an objective. The present paper reviews tools to study, in the spirit + of Turing''s analysis, a mechanism generating optimal diffusion-induced instability + where optimizing agents generate optimal agglomerations. By extending the + maximum principle to the optimal control of partial differential equations, + it is shown how under certain conditions it will be optimal to design controls + so that the price-quantity system implied by the costate\u2013state functions + of the optimal control of distributed parameter systems induces optimal spatial + patterns. These methods might be useful in studying pattern formation both + in problems of resource management and of economic development.", "venue": + "Environment and Development Economics", "year": 2010, "referenceCount": 28, + "citationCount": 28, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2010-10-22", "journal": {"name": "Environment and Development Economics", + "pages": "747 - 758", "volume": "15"}, "authors": [{"authorId": "3993495", + "name": "A. Xepapadeas"}]}, {"paperId": "091dac1c686cb3e74f958d5e38f1c4fe67ef4080", + "externalIds": {"MAG": "2066409459", "DOI": "10.1007/s11538-014-0036-6", "CorpusId": + 5859431, "PubMed": "25338554"}, "corpusId": 5859431, "publicationVenue": {"id": + "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/091dac1c686cb3e74f958d5e38f1c4fe67ef4080", + "title": "Vegetation Pattern Formation Due to Interactions Between Water Availability + and Toxicity in Plant\u2013Soil Feedback", "abstract": null, "venue": "Bulletin + of Mathematical Biology", "year": 2014, "referenceCount": 56, "citationCount": + 46, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Environmental Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-10-23", "journal": {"name": "Bulletin of Mathematical Biology", "pages": + "2866-2883", "volume": "76"}, "authors": [{"authorId": "2634170", "name": + "A. Marasco"}, {"authorId": "49260524", "name": "A. Iuorio"}, {"authorId": + "4816942", "name": "Fabrizio Carteni"}, {"authorId": "5716690", "name": "G. + Bonanomi"}, {"authorId": "1739131", "name": "D. Tartakovsky"}, {"authorId": + "46472889", "name": "S. Mazzoleni"}, {"authorId": "2074336", "name": "F. Giannino"}]}, + {"paperId": "52df377c78f5d00cf53400518117c6bb7d0337c5", "externalIds": {"DBLP": + "conf/stoc/Kosaraju79aa", "MAG": "2045141048", "DOI": "10.1145/800135.804427", + "CorpusId": 1706863}, "corpusId": 1706863, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/52df377c78f5d00cf53400518117c6bb7d0337c5", + "title": "Real-time simulation of concatenable double-ended queues by double-ended + queues (Preliminary Version)", "abstract": "It is shown that concatenable + double-ended queues can be simulated in real-time by double-ended queues without + concatenation. Consequently, every multihead Turing machine with head-to-head + jumps can be simulated in real-time by multitape Turing machines.", "venue": + "STOC", "year": 1979, "referenceCount": 14, "citationCount": 20, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/800135.804427", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "1979-04-30", "journal": {"name": "Proceedings + of the eleventh annual ACM symposium on Theory of computing"}, "authors": + [{"authorId": "144777785", "name": "S. Kosaraju"}]}, {"paperId": "240d6f58fd18c2e2f54182401ff2383495baf15c", + "externalIds": {"ArXiv": "quant-ph/0304128", "MAG": "2963429934", "DOI": "10.1142/9789812702449_0005", + "CorpusId": 13033690}, "corpusId": 13033690, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/240d6f58fd18c2e2f54182401ff2383495baf15c", + "title": "Transcending the Limits of Turing Computability", "abstract": "Hypercomputation + or super-Turing computation is a ``computation'''' that transcends the limit + imposed by Turing''s model of computability. The field still faces some basic + questions, technical (can we mathematically and/or physically build a hypercomputer?), + cognitive (can hypercomputers realize the AI dream?), philosophical (is thinking + more than computing?). The aim of this paper is to address the question: can + we mathematically build a hypercomputer? We will discuss the solutions of + the Infinite Merchant Problem, a decision problem equivalent to the Halting + Problem, based on results obtained in \\cite{Coins,acp}. The accent will be + on the new computational technique and results rather than formal proofs.", + "venue": "", "year": 2003, "referenceCount": 33, "citationCount": 24, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/0304128v2.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2003-04-19", "journal": {"name": + "arXiv: Quantum Physics", "volume": ""}, "authors": [{"authorId": "91183946", + "name": "V. A. Adamyan"}, {"authorId": "1685717", "name": "Cristian S. Calude"}, + {"authorId": "35003302", "name": "B. Pavlov"}]}, {"paperId": "da2a30aa08361bd26a350b120d613e26beec4dba", + "externalIds": {"PubMedCentral": "2108342", "MAG": "2113727580", "DOI": "10.1083/JCB.49.2.564", + "CorpusId": 2882922, "PubMed": "19866785"}, "corpusId": 2882922, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/da2a30aa08361bd26a350b120d613e26beec4dba", "title": "UNIQUENESS AND LOCATION OF THE FRACTURE PLANE IN THE PLASMA MEMBRANE OF BACILLUS SUBTILIS", "abstract": "The structural features observed in freeze-frac-precooled object stage (-150\u00b0C) . After the tempera-tured bacterial membranes have, @@ -28146,15 +32009,181 @@ interactions: along both surfaces of the membrane (11, bacteria. 12). The aim of the present investigation on B . subtilis has been twofold: (a) to verify whether", "venue": "The Journal of cell biology", "year": 1971, "referenceCount": 19, "citationCount": - 43, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1971-05-01", "journal": {"name": "The Journal of Cell - Biology", "pages": "564 - 570", "volume": "49"}, "authors": [{"authorId": - "3903797", "name": "N. Nanninga"}]}, {"paperId": "c835846504d88e8567a121102ae2fe6e89d2e69e", + 43, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://jcb.rupress.org/content/49/2/564.full.pdf", "status": "HYBRID"}, + "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1971-05-01", "journal": {"name": "The Journal + of Cell Biology", "pages": "564 - 570", "volume": "49"}, "authors": [{"authorId": + "3903797", "name": "N. Nanninga"}]}, {"paperId": "5ed56ec67485acdc582e312d6eac993a75e9c057", + "externalIds": {"DBLP": "series/sci/UstimenkoR13a", "MAG": "158450660", "DOI": + "10.1007/978-3-642-29694-9_11", "CorpusId": 13920795}, "corpusId": 13920795, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5ed56ec67485acdc582e312d6eac993a75e9c057", + "title": "On Extremal Graph Theory, Explicit Algebraic Constructions of Extremal + Graphs and Corresponding Turing Encryption Machines", "abstract": null, "venue": + "Artificial Intelligence, Evolutionary Computing and Metaheuristics", "year": + 2013, "referenceCount": 88, "citationCount": 25, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"pages": "257-285"}, "authors": [{"authorId": "1763247", "name": + "V. Ustimenko"}, {"authorId": "1787964", "name": "Urszula Romanczuk"}]}, {"paperId": + "6f2c69a1f76a70ef392efa83cd521c3cf58a9f6f", "externalIds": {"MAG": "2806045398", + "DOI": "10.1177/0263276418769733", "CorpusId": 149791981}, "corpusId": 149791981, + "publicationVenue": {"id": "5ecbe32a-59f8-4b73-8eba-9b88438a0cc1", "name": + "Theory, Culture and Society. Explorations in Critical Social Science", "type": + "journal", "alternate_names": ["Theory Cult Soc Explor Crit Soc Sci", "Theory, + Culture & Society", "Theory Cult Soc"], "issn": "0263-2764", "url": "https://journals.sagepub.com/loi/tcs", + "alternate_urls": ["http://www.sagepub.net/tcs/default.aspx?page=TCS", "http://tcs.sagepub.com/"]}, + "url": "https://www.semanticscholar.org/paper/6f2c69a1f76a70ef392efa83cd521c3cf58a9f6f", + "title": "Letter to Turing", "abstract": "This personal, yet scientific, letter + to Alan Turing, reflects on Turing''s personality in order to better understand + his scientific quest. It then focuses on the impact of his work today. By + joining human attitude and particular scientific method, Turing is able to + \u201cimmerse himself\u201d into the phenomena on which he works. This peculiar + blend justifies the epistolary style. Turing makes himself a \u201chuman computer\u201d, + he lives the dramatic quest for an undetectable imitation of a man, a woman, + a machine. He makes us see the continuous deformations of a material action/reaction/diffusion + dynamics of hardware with no software. Each of these investigations opens + the way to new scientific paths with major consequences for contemporary live + and for knowledge. The uses and the effects of these investigations will be + discussed: the passage from classical AI to today''s neural nets, the relevance + of non-linearity in biological dynamics, but also their abuses, such as the + myth of a computational world, from a Turing-machine like universe to an encoded + homunculus in the DNA. It is shown that these latter ideas, which are sometimes + even made in Turing''s name, contradict his views.", "venue": "Theory, Culture + and Society. Explorations in Critical Social Science", "year": 2018, "referenceCount": + 0, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-02903799/file/_2018_Letter-to-Turing.pdf", + "status": "GREEN"}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["LettersAndComments"], + "publicationDate": "2018-06-07", "journal": {"name": "Theory, Culture & Society", + "pages": "73 - 94", "volume": "36"}, "authors": [{"authorId": "145529421", + "name": "G. Longo"}]}, {"paperId": "6d4fefde3389f26edf0bdde35d6c910c48523c16", + "externalIds": {"MAG": "1572495540", "DOI": "10.1002/SMJ.190", "CorpusId": + 166840894}, "corpusId": 166840894, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6d4fefde3389f26edf0bdde35d6c910c48523c16", + "title": "An operationalization of Stevenson\u2019s conceptualization of entrepreneurship + as opportunity-based firm behavior", "abstract": "Stevenson (1983) holds that + entrepreneurial management, defined as a set of opportunity-based man-agement + practices, can help firms remain vital and contribute to firm and societal + level value creation. While his conceptualization has received much attention, + little progress has been made because of a lack of empirical tools to examine + his propositions. This article seeks to resolve this by describing a new instrument + that was developed specifically for operationalizing Stevenson\u2019s conceptualization. + After two pre-tests, the instrument was tested full scale on a very large + (1200+ cases) stratified random sample of firms with different size, governance + struc-ture, and industry affiliation. The results show that both in the full + sample and in various sub-samples it was pos-sible to identify six sub-dimensions + with high discriminant validity and moderate to high reliability, which rep-resent + dimensions of Stevenson\u2019s theoretical reasoning. We label these Strategic + Orientation, Resource Orienta-tion, Management Structure, Reward Philosophy, + Growth Orientation and Entrepreneurial Culture. We were further able to show + that these dimensions only partly overlap with \u2018Entrepreneurial Orientation\u2019, + the hitherto best established empirical instrument for assessing a firm\u2019s + degree of entrepreneurship. Our instrument should open up opportunities for + researchers to further evaluate entrepreneurship in existing firms.", "venue": + "", "year": 2001, "referenceCount": 32, "citationCount": 651, "influentialCitationCount": + 43, "isOpenAccess": true, "openAccessPdf": {"url": "http://eprints.qut.edu.au/5561/1/5561.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Business", "Sociology"], "s2FieldsOfStudy": + [{"category": "Business", "source": "external"}, {"category": "Sociology", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-10-01", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "73035173", "name": "Terrence + E. Brown"}, {"authorId": "50510596", "name": "P. Davidsson"}, {"authorId": + "2446333", "name": "Johan Wiklund"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", + "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": + 28057065, "PubMed": "25544713"}, "corpusId": 28057065, "publicationVenue": + {"id": "e26133f2-2f02-4bc5-a3ad-26bdbdc9636c", "name": "Trends in Genetics", + "type": "journal", "alternate_names": ["Trends Genet"], "issn": "0168-9479", + "alternate_issns": ["1362-4555", "0168-9525"], "url": "http://www.sciencedirect.com/science/journal/01689525", + "alternate_urls": ["http://www.cell.com/trends/genetics/"]}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", + "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", + "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": + 64, "citationCount": 99, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2015-02-01", "journal": + {"name": "Trends in genetics : TIG", "pages": "\n 88-96\n ", + "volume": "31 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu + Watanabe"}, {"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": + "1121e935b2d88550c837cea2e68160bb8b4d5f30", "externalIds": {"MAG": "1974988355", + "DOI": "10.1007/BF00275996", "CorpusId": 37860033, "PubMed": "3755746"}, "corpusId": + 37860033, "publicationVenue": {"id": "b63919f2-2979-428b-95ba-53029f49a7df", + "name": "Journal of Mathematical Biology", "type": "journal", "alternate_names": + ["J Math Biology"], "issn": "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", + "alternate_urls": ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/1121e935b2d88550c837cea2e68160bb8b4d5f30", + "title": "Pattern sensitivity to boundary and initial conditions in reaction-diffusion + models", "abstract": null, "venue": "Journal of Mathematical Biology", "year": + 1986, "referenceCount": 20, "citationCount": 104, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Journal of Mathematical Biology", "pages": "141-165", + "volume": "24"}, "authors": [{"authorId": "2098552726", "name": "P. Arcuri"}, + {"authorId": "88251269", "name": "J. Murray"}]}, {"paperId": "f6077ea6a4f9008d0843bd8acd379dd2f312fea6", + "externalIds": {"MAG": "2058254290", "DOI": "10.1029/2000JB900229", "CorpusId": + 59382819}, "corpusId": 59382819, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6077ea6a4f9008d0843bd8acd379dd2f312fea6", + "title": "Local earthquake tomography of shallow subduction in north Chile: + A combined onshore and offshore study", "abstract": "Selected travel time + data from the aftershock series of the great Antofagasta earthquake (M w =8.0) + have been inverted simultaneously for both hypocenter locations and three-dimensional + V P and V P / V S struc- ture. The data were collected with a dense 44-station + seismic network including ocean bottom hydrophones. We performed a series + of inversions with increasing complexity: 1-D, 2-D, and 3-D. This approach + was cho- sen to account for the heterogeneous seismicity distribution and + to obtain a smooth regional model in areas of low resolution. Special efforts + were made to assess the solution quality including standard resolution esti- + mates and tests with synthetic travel times. The subducted plate is imaged + between 20 and 50 km in depth as an eastward dipping high- V P feature. High + V P / V S ratios within the oceanic crust possibly indicate elevated fluid + content. Underplating of material eroded close to the trench is found beneath + the Mejillones Peninsula. The lower crust of the overlying plate is characterized + by an average V P of 6.8-6.9 km/s and an average to low V P / V S ratio. Large + areas of anomalously high V P are found in the lower crust south of the city + of Antofagasta; they are interpreted as remants of magmatic intrusions. A + zone of high V P / V S ratios is found within the rup- ture area of the Antofagasta + main shock, just above the subducted slab. Its location within the region + of high- est stress release from the main shock suggests that the main shock + rupture causes the high V P / V S ratio. The high V P / V S ratio could indicate + postseismic fluid migration from the subducted oceanic crust into the overly- + ing lower crust.", "venue": "", "year": 2000, "referenceCount": 67, "citationCount": + 134, "influentialCitationCount": 13, "isOpenAccess": true, "openAccessPdf": + {"url": "https://agupubs.onlinelibrary.wiley.com/doi/pdfdirect/10.1029/2000JB900229", + "status": "BRONZE"}, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": + "Geology", "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-12-10", "journal": {"name": + "Journal of Geophysical Research", "pages": "28183-28198", "volume": "105"}, + "authors": [{"authorId": "66410510", "name": "S. Husen"}, {"authorId": "46375910", + "name": "E. Kissling"}, {"authorId": "30801519", "name": "E. Flueh"}]}, {"paperId": + "4ec1395698ed9f367775679e5a623e7d1804d413", "externalIds": {"MAG": "2044455065", + "DBLP": "conf/focs/FischerR68", "DOI": "10.1109/SWAT.1968.15", "CorpusId": + 8514586}, "corpusId": 8514586, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4ec1395698ed9f367775679e5a623e7d1804d413", + "title": "Limited Random Access Turing Machines", "abstract": "The model of + an online multitape Turing machine is generalized by adding a bounded number + of repositioning operations to the shift repertoire. It is proved that any + such limited random access Turing machine can be effectively replaced by an + equivalent conventional Turing machine which operates in the same time. This + result yields simplified proofs and extensions of several results in the literature.", + "venue": "SWAT", "year": 1968, "referenceCount": 6, "citationCount": 16, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "1968-10-15", "journal": + {"pages": "356-367"}, "authors": [{"authorId": "145298802", "name": "M. Fischer"}, + {"authorId": "34896921", "name": "A. Rosenberg"}]}, {"paperId": "c835846504d88e8567a121102ae2fe6e89d2e69e", "externalIds": {"PubMedCentral": "4858293", "MAG": "2366639313", "DOI": "10.1371/journal.pone.0153679", - "CorpusId": 36493150, "PubMed": "27148743"}, "url": "https://www.semanticscholar.org/paper/c835846504d88e8567a121102ae2fe6e89d2e69e", + "CorpusId": 36493150, "PubMed": "27148743"}, "corpusId": 36493150, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/c835846504d88e8567a121102ae2fe6e89d2e69e", "title": "Turing Patterning Using Gene Circuits with Gas-Induced Degradation of Quorum Sensing Molecules", "abstract": "The Turing instability was proposed more than six decades ago as a mechanism leading to spatial patterning, but @@ -28169,260 +32198,159 @@ interactions: provide a roadmap for optimizing spatial patterns of gene expression based on familiar quorum and gas sensitive E. coli promoters. The circuit design and predictions may be useful for (re)programming spatial dynamics in synthetic - and natural gene expression systems.", "venue": "PloS one", "year": 2016, + and natural gene expression systems.", "venue": "PLoS ONE", "year": 2016, "referenceCount": 64, "citationCount": 25, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0153679&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2016-05-05", "journal": {"name": "PLoS ONE", "volume": "11"}, "authors": [{"authorId": "47351118", "name": "Bart\u0142omiej Borek"}, {"authorId": "2916647", "name": "J. Hasty"}, {"authorId": "1914588", - "name": "L. Tsimring"}]}, {"paperId": "1ec3e5accac9369347595f6927b6a6cee9312426", - "externalIds": {"MAG": "2086963014", "DOI": "10.1007/s11255-012-0253-6", "CorpusId": - 27370541, "PubMed": "22833254"}, "url": "https://www.semanticscholar.org/paper/1ec3e5accac9369347595f6927b6a6cee9312426", - "title": "Transurethral resection of ejaculatory duct in infertile men: outcome - and predictors of success", "abstract": null, "venue": "International Urology - and Nephrology", "year": 2012, "referenceCount": 25, "citationCount": 29, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-07-26", "journal": {"name": "International Urology - and Nephrology", "pages": "1623-1630", "volume": "44"}, "authors": [{"authorId": - "1398659127", "name": "A. El-Assmy"}, {"authorId": "1429631393", "name": "Hosam - El-Tholoth"}, {"authorId": "12641566", "name": "R. Abouelkheir"}, {"authorId": - "1399442544", "name": "M. Abou-El-Ghar"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", - "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": - 28057065, "PubMed": "25544713"}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", - "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", - "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": - 64, "citationCount": 96, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2015-02-01", "journal": {"name": "Trends - in genetics : TIG", "pages": "\n 88-96\n ", "volume": "31 - 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu Watanabe"}, {"authorId": - "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "cf6d1ecc9735424a0eb28461294dc5437a53efc7", - "externalIds": {"MAG": "2252885734", "DOI": "10.1007/978-3-7091-6597-3_2", - "CorpusId": 119080460}, "url": "https://www.semanticscholar.org/paper/cf6d1ecc9735424a0eb28461294dc5437a53efc7", - "title": "Turing''s analysis of computability, and major applications of it", - "abstract": null, "venue": "", "year": 1988, "referenceCount": 28, "citationCount": - 46, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}], - "publicationTypes": null, "publicationDate": "1988-10-01", "journal": {"name": - "", "pages": "17-54", "volume": ""}, "authors": [{"authorId": "1723068", "name": - "S. Kleene"}]}, {"paperId": "267b68f66413d23b1b7ad24ecfad8d8eb29351b8", "externalIds": - {"DBLP": "journals/cogcom/WarwickS16", "MAG": "2260558829", "PubMedCentral": - "4867147", "DOI": "10.1007/s12559-015-9372-6", "CorpusId": 2705846, "PubMed": - "27257441"}, "url": "https://www.semanticscholar.org/paper/267b68f66413d23b1b7ad24ecfad8d8eb29351b8", - "title": "Passing the Turing Test Does Not Mean the End of Humanity", "abstract": - null, "venue": "Cognitive Computation", "year": 2015, "referenceCount": 54, - "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": + "name": "L. Tsimring"}]}, {"paperId": "f294604326972da612cf92ee0d50a14b9cb8d63d", + "externalIds": {"MAG": "2110883968", "DBLP": "journals/jsyml/Cooper82", "DOI": + "10.2307/2273104", "CorpusId": 9947102}, "corpusId": 9947102, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/f294604326972da612cf92ee0d50a14b9cb8d63d", + "title": "Partial degrees and the density problem", "abstract": "A notion + of relative reducibility for partial functions, which coincides with Turing + reducibility on the total functions, was first given by S.C. Kleene in Introduction + to metamathematics [4]. Following Myhill [7], this was made more explicit + in Hartley Rogers, Jr., Theory of recursive functions and effective computability + [8, pp. 146, 279], where some basic properties of the partial degrees or (equivalent, + but notationally more convenient) the enumeration degrees, were derived. The + question of density of this proper extension of the degrees of unsolvability + was left open, although Medvedev''s result [6] that there are quasi-minimal + partial degrees (that is, nonrecursive partial degrees with no nonrecursive + total predecessors) is proved. In 1971, Sasso [9] introduced a finer notion + of partial degree, which also contained the Turing degrees as a proper substructure + (intuitively, Sasso''s notion of reducibility between partial functions differed + from Rogers'' in that computations terminated when the oracle was asked for + an undefined value, whereas a Rogers computation could be thought of as proceeding + simultaneously along a number of different branches of a \u2018consistent\u2019 + computation tree\u2014cf. Sasso [10]). His construction of minimal \u2018partial + degrees\u2019 [11], while of interest in itself, left open the analogous problem + for the more standard partial degree structure.", "venue": "Journal of Symbolic + Logic (JSL)", "year": 1982, "referenceCount": 11, "citationCount": 80, "influentialCitationCount": + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1982-12-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "854 - 859", "volume": "47"}, "authors": [{"authorId": "98630872", + "name": "S. Cooper"}]}, {"paperId": "a0f5b45c53e4d4a795e213d66776ee584c9d9cd5", + "externalIds": {"MAG": "2083480756", "DOI": "10.1103/PHYSREVE.90.032923", + "CorpusId": 39184911, "PubMed": "25314520"}, "corpusId": 39184911, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a0f5b45c53e4d4a795e213d66776ee584c9d9cd5", + "title": "Subcritical Turing bifurcation and the morphogenesis of localized + patterns.", "abstract": "Subcritical Turing bifurcations of reaction-diffusion + systems in large domains lead to spontaneous onset of well-developed localized + patterns via the homoclinic snaking mechanism. This phenomenon is shown to + occur naturally when balancing source and loss effects are included in a typical + reaction-diffusion system, leading to a super- to subcritical transition. + Implications are discussed [corrected]for a range of physical problems, arguing + that subcriticality leads to naturally robust phase transitions to localized + patterns.", "venue": "Physical review. E, Statistical, nonlinear, and soft + matter physics", "year": 2014, "referenceCount": 44, "citationCount": 36, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-09-26", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 032923\n ", + "volume": "90 3"}, "authors": [{"authorId": "1403452105", "name": "V. Bre\u00f1a-Medina"}, + {"authorId": "2718658", "name": "A. Champneys"}]}, {"paperId": "ae83a87e664fe9ec47b7e033d119c172f87edcbb", + "externalIds": {"MAG": "2152971002", "DOI": "10.1103/PHYSREVLETT.97.178301", + "CorpusId": 15889036, "PubMed": "17155511"}, "corpusId": 15889036, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/ae83a87e664fe9ec47b7e033d119c172f87edcbb", + "title": "Experimental evidence of localized oscillations in the photosensitive + chlorine dioxide-iodine-malonic acid reaction.", "abstract": "The interaction + between Hopf and Turing modes has been the subject of active research in recent + years. We present here experimental evidence of the existence of mixed Turing-Hopf + modes in a two-dimensional system. Using the photosensitive chlorine dioxide-iodine-malonic + acid reaction (CDIMA) and external constant background illumination as a control + parameter, standing spots oscillating in amplitude and with hexagonal ordering + were observed. Numerical simulations in the Lengyel-Epstein model for the + CDIMA reaction confirmed the results.", "venue": "Physical Review Letters", + "year": 2006, "referenceCount": 0, "citationCount": 27, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://diposit.ub.edu/dspace/bitstream/2445/13266/1/548449.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2006-10-24", "journal": + {"name": "Physical review letters", "pages": "\n 178301\n ", + "volume": "97 17"}, "authors": [{"authorId": "2701200", "name": "D. G. M\u00edguez"}, + {"authorId": "48894113", "name": "S. Alonso"}, {"authorId": "2614851", "name": + "A. P. Mu\u00f1uzuri"}, {"authorId": "2236462", "name": "F. Sagu\u00e9s"}]}, + {"paperId": "2ff891781733649a786930c9d339066002a1a5a4", "externalIds": {"MAG": + "2069124970", "DBLP": "conf/stoc/BeigelRS91", "DOI": "10.1145/103418.103426", + "CorpusId": 6408368}, "corpusId": 6408368, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/2ff891781733649a786930c9d339066002a1a5a4", + "title": "PP is closed under intersection", "abstract": "In this seminal paper + on probabilistic Turing machines, Gill asked whether the class PP is closed + under intersection and union. We give a positive answer to this question. + We also show that PP is closed under a variety of polynomial-time truth-table + reductions. Consequences in complexity theory include the definite collapse + and (assuming P ? PP) separation of certain query hierarchies over PP. Similar + techniques allow us to combine several threshold gates into a single threshold + gate. Consequences in the study of circuits include the simulation of circuits + with a small number of threshold gates by circuits having only a single threshold + gate at the root (perceptrons) and a lower bound on the number of threshold + gates that are needed to compute the parity function.", "venue": "Symposium + on the Theory of Computing", "year": 1991, "referenceCount": 46, "citationCount": + 189, "influentialCitationCount": 13, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1991-01-03", "journal": + {"name": "J. Comput. Syst. Sci.", "pages": "191-202", "volume": "50"}, "authors": + [{"authorId": "2516122", "name": "R. Beigel"}, {"authorId": "2657115", "name": + "N. Reingold"}, {"authorId": "2417095", "name": "D. Spielman"}]}, {"paperId": + "9f2e0a85f123d699e667a958fd14895b99ce36a8", "externalIds": {"DBLP": "conf/coco/MaassS86", + "MAG": "1556558650", "DOI": "10.1007/3-540-16486-3_103", "CorpusId": 42172000}, + "corpusId": 42172000, "publicationVenue": {"id": "23f8fe4c-6537-4027-a334-6a5863115984", + "name": "Cybersecurity and Cyberforensics Conference", "type": "conference", + "alternate_names": ["Chin Control Conf", "Computational Complexity Conference", + "CCC", "Comput Complex Conf", "Cybersecur Cyberforensics Conf", "Conference + on Computational Complexity", "Computing Colombian Conference", "Conf Comput + Complex", "Comput Colomb Conf", "Chinese Control Conference"], "url": "http://computationalcomplexity.org/"}, + "url": "https://www.semanticscholar.org/paper/9f2e0a85f123d699e667a958fd14895b99ce36a8", + "title": "An Optimal Lower Bound for Turing Machines with One Work Tape and + a Two- way Input Tape", "abstract": null, "venue": "Cybersecurity and Cyberforensics + Conference", "year": 1986, "referenceCount": 11, "citationCount": 17, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2015-12-28", - "journal": {"name": "Cognitive Computation", "pages": "409 - 419", "volume": - "8"}, "authors": [{"authorId": "143636026", "name": "K. Warwick"}, {"authorId": - "2731715", "name": "Huma Shah"}]}, {"paperId": "4d243c53cca88ec3a0dcd7bd4e80f619361d893c", - "externalIds": {"MAG": "2553360915", "DOI": "10.1016/j.clinph.2016.11.005", - "CorpusId": 10350853, "PubMed": "27913148"}, "url": "https://www.semanticscholar.org/paper/4d243c53cca88ec3a0dcd7bd4e80f619361d893c", - "title": "Spike detection: Inter-reader agreement and a statistical Turing - test on a large data set", "abstract": null, "venue": "Clinical Neurophysiology", - "year": 2017, "referenceCount": 15, "citationCount": 103, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Clinical Neurophysiology", "pages": "243-250", "volume": "128"}, - "authors": [{"authorId": "6109721", "name": "M. Scheuer"}, {"authorId": "49567686", - "name": "A. Bagi\u0107"}, {"authorId": "152716954", "name": "Scott B. Wilson"}]}, - {"paperId": "20c1a246f621d6329470640ad5588374c3add652", "externalIds": {"MAG": - "2119480834", "DOI": "10.1017/S1355770X10000355", "CorpusId": 154366758}, - "url": "https://www.semanticscholar.org/paper/20c1a246f621d6329470640ad5588374c3add652", - "title": "The spatial dimension in environmental and resource economics", - "abstract": "ABSTRACT Mechanisms generating patterns in spatial domains have - been extensively studied in biology, but also in economics in the context - of new economic geography. The Turing mechanism or Turing diffusion-induced - instability has been central to the understanding of forces which endogenously - generate spatial patterns, but in a context where agents do not explicitly - optimize an objective. The present paper reviews tools to study, in the spirit - of Turing''s analysis, a mechanism generating optimal diffusion-induced instability - where optimizing agents generate optimal agglomerations. By extending the - maximum principle to the optimal control of partial differential equations, - it is shown how under certain conditions it will be optimal to design controls - so that the price-quantity system implied by the costate\u2013state functions - of the optimal control of distributed parameter systems induces optimal spatial - patterns. These methods might be useful in studying pattern formation both - in problems of resource management and of economic development.", "venue": - "Environment and Development Economics", "year": 2010, "referenceCount": 28, - "citationCount": 28, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2010-10-22", "journal": - {"name": "Environment and Development Economics", "pages": "747 - 758", "volume": - "15"}, "authors": [{"authorId": "3993495", "name": "A. Xepapadeas"}]}, {"paperId": - "9f2e0a85f123d699e667a958fd14895b99ce36a8", "externalIds": {"DBLP": "conf/coco/MaassS86", - "MAG": "1556558650", "DOI": "10.1007/3-540-16486-3_103", "CorpusId": 42172000}, - "url": "https://www.semanticscholar.org/paper/9f2e0a85f123d699e667a958fd14895b99ce36a8", - "title": "An Optimal Lower Bound for Turing Machines with One Work Tape and - a Two- way Input Tape", "abstract": null, "venue": "Computational Complexity - Conference", "year": 1986, "referenceCount": 11, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1986-06-02", "journal": {"pages": "249-264"}, - "authors": [{"authorId": "145247053", "name": "W. Maass"}, {"authorId": "1809682", - "name": "G. Schnitger"}]}, {"paperId": "5ed56ec67485acdc582e312d6eac993a75e9c057", - "externalIds": {"DBLP": "series/sci/UstimenkoR13a", "MAG": "158450660", "DOI": - "10.1007/978-3-642-29694-9_11", "CorpusId": 13920795}, "url": "https://www.semanticscholar.org/paper/5ed56ec67485acdc582e312d6eac993a75e9c057", - "title": "On Extremal Graph Theory, Explicit Algebraic Constructions of Extremal - Graphs and Corresponding Turing Encryption Machines", "abstract": null, "venue": - "Artificial Intelligence, Evolutionary Computing and Metaheuristics", "year": - 2013, "referenceCount": 88, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"pages": "257-285"}, - "authors": [{"authorId": "1763247", "name": "V. Ustimenko"}, {"authorId": - "1787964", "name": "Urszula Romanczuk"}]}, {"paperId": "da4a2b64fb67888ef7e1842c81b25d4b11393377", - "externalIds": {"MAG": "2137396446", "DOI": "10.1063/1.468684", "CorpusId": - 55187132}, "url": "https://www.semanticscholar.org/paper/da4a2b64fb67888ef7e1842c81b25d4b11393377", - "title": "Dependence of Turing pattern wavelength on diffusion rate", "abstract": - "The relation between the diffusion coefficient of reactants and the wavelength - of Turing patterns is examined in experiments on the chlorite\u2013iodide\u2013malonic - acid (CIMA) reaction in gel media. The diffusion coefficients in polyacrylamide - and agarose gels are varied by varying the gel densities. The diffusion coefficient - D of NaCl is found to vary from 0.5\u00d710\u22125 to 1.8\u00d710\u22125 cm2/s - for the gel conditions considered. The CIMA reactants are assumed to have - diffusion coefficients that are directly proportional to that of NaCl. The - wavelength \u03bb of the observed hexagonal patterns (0.13\u20130.28 mm) varies - in accord with the predicted relation for Turing patterns, \u03bb\u223cD1/2. - Moreover, the predicted relationship to a characteristic period of oscillation - \u03c4, \u03bb=(2\u03c0\u03c4D)1/2, is supported by measurements of \u03c4 - just beyond a Hopf bifurcation in a stirred flow reactor.", "venue": "", "year": - 1995, "referenceCount": 13, "citationCount": 36, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1995-02-08", "journal": {"name": "Journal of Chemical Physics", "pages": - "2551-2555", "volume": "102"}, "authors": [{"authorId": "143803550", "name": - "Q. Ouyang"}, {"authorId": "50392001", "name": "Ru\u2010Sheng Li"}, {"authorId": - "2108549867", "name": "Ge Li"}, {"authorId": "2421446", "name": "H. Swinney"}]}, - {"paperId": "b53e4cbeaf2ec13c06302e7bca533400ef4cbf06", "externalIds": {"MAG": - "2013857407", "DOI": "10.1103/PHYSREVE.85.051914", "CorpusId": 12164812, "PubMed": - "23004794"}, "url": "https://www.semanticscholar.org/paper/b53e4cbeaf2ec13c06302e7bca533400ef4cbf06", - "title": "Effects of intrinsic stochasticity on delayed reaction-diffusion - patterning systems.", "abstract": "Cellular gene expression is a complex process - involving many steps, including the transcription of DNA and translation of - mRNA; hence the synthesis of proteins requires a considerable amount of time, - from ten minutes to several hours. Since diffusion-driven instability has - been observed to be sensitive to perturbations in kinetic delays, the application - of Turing patterning mechanisms to the problem of producing spatially heterogeneous - differential gene expression has been questioned. In deterministic systems - a small delay in the reactions can cause a large increase in the time it takes - a system to pattern. Recently, it has been observed that in undelayed systems - intrinsic stochasticity can cause pattern initiation to occur earlier than - in the analogous deterministic simulations. Here we are interested in adding - both stochasticity and delays to Turing systems in order to assess whether - stochasticity can reduce the patterning time scale in delayed Turing systems. - As analytical insights to this problem are difficult to attain and often limited - in their use, we focus on stochastically simulating delayed systems. We consider - four different Turing systems and two different forms of delay. Our results - are mixed and lead to the conclusion that, although the sensitivity to delays - in the Turing mechanism is not completely removed by the addition of intrinsic - noise, the effects of the delays are clearly ameliorated in certain specific - cases.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter - physics", "year": 2012, "referenceCount": 78, "citationCount": 24, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-05-22", "journal": {"name": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "pages": "\n 051914\n ", "volume": - "85 5 Pt 1"}, "authors": [{"authorId": "6566804", "name": "T. Woolley"}, {"authorId": - "35275545", "name": "R. Baker"}, {"authorId": "2662569", "name": "E. Gaffney"}, - {"authorId": "2339973", "name": "P. Maini"}, {"authorId": "1413907859", "name": - "S. Seirin-Lee"}]}, {"paperId": "23af7e9b8ff34f3e946b9fa295dcd0f772004006", - "externalIds": {"MAG": "1599839813", "DBLP": "conf/mcu/Calude04", "DOI": "10.1007/978-3-540-31834-7_1", - "CorpusId": 1510344}, "url": "https://www.semanticscholar.org/paper/23af7e9b8ff34f3e946b9fa295dcd0f772004006", - "title": "Algorithmic Randomness, Quantum Physics, and Incompleteness", "abstract": - null, "venue": "Machines, Computations, and Universality", "year": 2004, "referenceCount": - 66, "citationCount": 53, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2004-09-21", "journal": {"pages": "1-17"}, "authors": [{"authorId": "1685717", - "name": "Cristian S. Calude"}]}, {"paperId": "d1fb73dc083c916cf8a965434fc684b8f0b8762d", - "externalIds": {"MAG": "2396255914", "DBLP": "journals/aim/MarcusRV16", "DOI": - "10.1609/aimag.v37i1.2650", "CorpusId": 29083837}, "url": "https://www.semanticscholar.org/paper/d1fb73dc083c916cf8a965434fc684b8f0b8762d", - "title": "Beyond the Turing Test", "abstract": "The articles in this special - issue of AI Magazine include those that propose specific tests, and those - that look at the challenges inherent in building robust, valid, and reliable - tests for advancing the state of the art in AI.", "venue": "The AI Magazine", - "year": 2016, "referenceCount": 0, "citationCount": 16, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-04-13", "journal": {"name": "AI Mag.", "pages": "3-4", "volume": "37"}, - "authors": [{"authorId": "1923674", "name": "G. Marcus"}, {"authorId": "2052876222", - "name": "Francesca Rossi"}, {"authorId": "1956361", "name": "M. Veloso"}]}, - {"paperId": "7d2c3bdcac1d330d11cc4d2a7fd4c6d783ad6bb1", "externalIds": {"MAG": - "2076114618", "DOI": "10.1080/00927879908826793", "CorpusId": 123577637}, - "url": "https://www.semanticscholar.org/paper/7d2c3bdcac1d330d11cc4d2a7fd4c6d783ad6bb1", - "title": "Yang-baxter operators arising from (co)algebra structures", "abstract": - "We construct parametrized Yang-Baxter operators from algebra struc-tures, - transfer the theory to coalgebras, and find the cases where such operators - arising from (co) algebras are isomorphic. We give examples in dimension 2.", - "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 39, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "143940361", "name": "S. Dascalescu"}, - {"authorId": "1692472", "name": "F. Nichita"}]}, {"paperId": "c5e7f462e3d7b0aff08ef79e1c880704de9a8dd5", - "externalIds": {"DBLP": "conf/eurogp/VallejoR01", "MAG": "1508079160", "DOI": - "10.1007/3-540-45355-5_15", "CorpusId": 28933521}, "url": "https://www.semanticscholar.org/paper/c5e7f462e3d7b0aff08ef79e1c880704de9a8dd5", - "title": "Evolving Turing Machines for Biosequence Recognition and Analysis", - "abstract": null, "venue": "European Conference on Genetic Programming", "year": - 2001, "referenceCount": 13, "citationCount": 17, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2001-04-18", "journal": - {"pages": "192-203"}, "authors": [{"authorId": "145745372", "name": "E. Vallejo"}, - {"authorId": "2054757633", "name": "F. Ramos"}]}, {"paperId": "967dd75ad6e0bfa0f9ebedfe84ab817993f33eca", - "externalIds": {"MAG": "2152106902", "DBLP": "journals/toh/ReedP08", "DOI": - "10.1109/TOH.2008.13", "CorpusId": 2144050, "PubMed": "27788067"}, "url": - "https://www.semanticscholar.org/paper/967dd75ad6e0bfa0f9ebedfe84ab817993f33eca", - "title": "Physical Collaboration of Human-Human and Human-Robot Teams", "abstract": - "Human partners working on a target acquisition task perform faster than do - individuals on the same task, even though the partners consider each other - to be an impediment. We recorded the force profile of each partner during - the task, revealing an emergent specialization of roles that could only have - been negotiated through a haptic channel. With this understanding of human - haptic communication we attempted a \"haptic Turing test,\" replicating human - behaviors in a robot partner. Human participants consciously and incorrectly - believed their partner was human. However, force profiles did not show specialization - of roles in the human partner, nor enhanced dyadic performance, suggesting - that haptic interaction holds a greater subconscious subtlety. We further - report observations of a non-zero dyadic steady state force perhaps analogous - to co-contraction within the limb of an individual, where it contributes to - limb stiffness and disturbance rejection. We present results on disturbance - rejection in a dyad, showing lack of an effective dyadic strategy for brief - events.", "venue": "IEEE Transactions on Haptics", "year": 2008, "referenceCount": - 61, "citationCount": 196, "influentialCitationCount": 25, "isOpenAccess": - true, "fieldsOfStudy": ["Engineering", "Medicine", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-07-01", "journal": {"name": "IEEE Transactions on Haptics", "pages": - "108-120", "volume": "1"}, "authors": [{"authorId": "144478380", "name": "K. - Reed"}, {"authorId": "1789986", "name": "M. Peshkin"}]}, {"paperId": "e239454e9f1ae68d75cff1d354051718644e00e6", + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1986-06-02", + "journal": {"pages": "249-264"}, "authors": [{"authorId": "145247053", "name": + "W. Maass"}, {"authorId": "1809682", "name": "G. Schnitger"}]}, {"paperId": + "9b7e736d5f92eef69186399261addb518b413f88", "externalIds": {"CorpusId": 842310}, + "corpusId": 842310, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9b7e736d5f92eef69186399261addb518b413f88", + "title": "Lecture to the london mathematical society on 20 february 1947 Universal + Turing Machine", "abstract": "Many physicists would agree that, had it not + been for DHTs, the improvement of 802.11 mesh networks might never have occurred. + In fact, few cyberneti-cists would disagree with the understanding of B-trees, + which embodies the important principles of theory. BentNip, our new heuristic + for public-private key pairs, is the solution to all of these challenges.", + "venue": "", "year": null, "referenceCount": 145, "citationCount": 88, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "35033904", + "name": "M. Rabin"}]}, {"paperId": "e239454e9f1ae68d75cff1d354051718644e00e6", "externalIds": {"MAG": "2005065536", "DOI": "10.1890/14-0550.1", "CorpusId": - 41726063, "PubMed": "26236834"}, "url": "https://www.semanticscholar.org/paper/e239454e9f1ae68d75cff1d354051718644e00e6", + 41726063, "PubMed": "26236834"}, "corpusId": 41726063, "publicationVenue": + {"id": "edd5fc4f-2a3a-4fba-a193-6c63ea4cd9e8", "name": "Ecology", "type": + "journal", "issn": "0012-9658", "url": "http://esajournals.onlinelibrary.wiley.com/hub/journal/10.1002/(ISSN)1939-9170/", + "alternate_urls": ["http://www.esapubs.org/esapubs/journals/ecology.htm", + "https://www.jstor.org/journal/ecology", "http://www.jstor.org/journals/00129658.html"]}, + "url": "https://www.semanticscholar.org/paper/e239454e9f1ae68d75cff1d354051718644e00e6", "title": "Unveiling the species-rank abundance distribution by generalizing the Good-Turing sample coverage theory.", "abstract": "Based on a sample of individuals, we focus on inferring the vector of species relative abundance @@ -28455,148 +32383,192 @@ interactions: diversity measures and should be widely useful to analyses of biodiversity and community structure.", "venue": "Ecology", "year": 2015, "referenceCount": 37, "citationCount": 83, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2015-05-01", "journal": - {"name": "Ecology", "pages": "\n 1189-201\n ", "volume": "96 - 5"}, "authors": [{"authorId": "49642270", "name": "A. Chao"}, {"authorId": - "152654765", "name": "T. Hsieh"}, {"authorId": "5759592", "name": "R. Chazdon"}, - {"authorId": "2575768", "name": "Robert K. Colwell"}, {"authorId": "4490352", - "name": "N. Gotelli"}]}, {"paperId": "57facb32b567c36520b4e3d967f1e4bad3d46a77", - "externalIds": {"MAG": "629263589", "DOI": "10.1142/3194", "CorpusId": 118607943}, - "url": "https://www.semanticscholar.org/paper/57facb32b567c36520b4e3d967f1e4bad3d46a77", - "title": "Topics in Nonlinear Dynamics: Applications to Physics, Biology and - Economic Systems", "abstract": "A deterministic model of die tossing (to discuss - stochasticity vs. determinism) the forced Duffing''s equation (chaos in a - simple nonlinear system, bifurcations) coupled period-doubling systems coupled - thermostatically controlled radiators (frequency locking and chaos in technical - control systems) kidney pressure and flow regulation (period-doubling and - chaos in a biological system) insulin-glucose metabolism (frequency-locking - in experiments on human subjects) environmental and microbiological population - models (higher order chaos) the beer production distribution system (chaos - in human decision making behaviour) coupled economic sectors (entrainment - in the macroeconomic system) coupled map lattices (transition to spatially - extended systems) pattern formation in chemical reaction-diffusion systems - (Turing structures).", "venue": "", "year": 1997, "referenceCount": 0, "citationCount": - 101, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1997-01-04", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "2203242", "name": "E. Mosekilde"}]}, {"paperId": - "c072eef2dfb3d9c5339ac3e767120cd691f2ab55", "externalIds": {"CorpusId": 6300232}, - "url": "https://www.semanticscholar.org/paper/c072eef2dfb3d9c5339ac3e767120cd691f2ab55", - "title": "Security Threats in Wireless Sensor Networks", "abstract": "Wireless - Sensor Network (WSN) is an emerging technology that shows great promise for - various futuristic applications both for mass public and military. The sensing - technology combined with processing power and wireless communication makes - it lucrative for being exploited in abundance in fu ture. Wireless sensor - networks are characterized by severely constrained computational and energy - resources, and an ad hoc operational environment. Wireless sensor networks - (WSN) are currently receiving significant attention due to their unlimi ted - potential. However, it is still very early in the l ifetime of such systems - and many research challenges exist. This paper studies the security aspects - of these networks.", "venue": "", "year": 2011, "referenceCount": 10, "citationCount": - 96, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "77871669", "name": "Sushma"}, {"authorId": "66123813", "name": - "D. Nandal"}, {"authorId": "27681450", "name": "V. Nandal"}]}, {"paperId": - "13725be89710acc673d11f94b75bc32500687b15", "externalIds": {"DBLP": "journals/scjapan/Serizawa87", - "MAG": "2027580140", "DOI": "10.1002/scj.4690180404", "CorpusId": 27838375}, - "url": "https://www.semanticscholar.org/paper/13725be89710acc673d11f94b75bc32500687b15", - "title": "Three-state neumann neighbor cellular automata capable of constructing - self-reproducing machines", "abstract": "This paper defines the 3-state Neumann-neighbor - cellular automata, and shows that its space is construction-universal. The - proof for this is achieved by presenting a realization of self-reproducing - machines. The state-transition rule and the basic operations of configurations - of the cellular automata are described first. Then methods are shown to construct - AND circuit, pulse generator, signal-line, delay circuit and memory circuit. - Finally, the structure of the self-reproducing machine is shown, which is - realized by combining those circuits, The machine has two construction arms, - a Turing tape and a timing loop. It can make a replica of its own using the - Turing tape. The machine can also be operated as a universal construction - machine or a universal Turing machine.", "venue": "Systems and Computers in - Japan", "year": 1987, "referenceCount": 2, "citationCount": 28, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Systems and Computers in Japan", - "pages": "33-40", "volume": "18"}, "authors": [{"authorId": "2182642", "name": - "Teruo Serizawa"}]}, {"paperId": "d35fbec265b21d4a6ccdd63ce2b5de5ff57932ff", - "externalIds": {"MAG": "2085725669", "DOI": "10.3354/AME031249", "CorpusId": - 2863925}, "url": "https://www.semanticscholar.org/paper/d35fbec265b21d4a6ccdd63ce2b5de5ff57932ff", - "title": "Regulation of periphytic leucine-aminopeptidase activity", "abstract": - "Short-term ( 9.75) were much greater than those previously reported for planktonic - communities and profundal sediments (pH 7.5 to 8.0), suggesting a mechanism - by which photosynthesis could stimulate LAMP activity. In situ LAMP activity - of natural wetland periphyton communities displayed diurnal patterns consistent - with stimulation of LAMP activity by photosynthetically-induced pH shifts, - but was also directly corre- lated with the potentially causal factors of - dissolved inorganic nitrogen concentration and tempera- ture.", "venue": "", - "year": 2003, "referenceCount": 57, "citationCount": 66, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2003-04-03", "journal": {"name": "Aquatic Microbial Ecology", "pages": "249-258", - "volume": "31"}, "authors": [{"authorId": "5594652", "name": "S. Francoeur"}, - {"authorId": "39803946", "name": "R. Wetzel"}]}, {"paperId": "6f2c69a1f76a70ef392efa83cd521c3cf58a9f6f", - "externalIds": {"MAG": "2806045398", "DOI": "10.1177/0263276418769733", "CorpusId": - 149791981}, "url": "https://www.semanticscholar.org/paper/6f2c69a1f76a70ef392efa83cd521c3cf58a9f6f", - "title": "Letter to Turing", "abstract": "This personal, yet scientific, letter - to Alan Turing, reflects on Turing''s personality in order to better understand - his scientific quest. It then focuses on the impact of his work today. By - joining human attitude and particular scientific method, Turing is able to - \u201cimmerse himself\u201d into the phenomena on which he works. This peculiar - blend justifies the epistolary style. Turing makes himself a \u201chuman computer\u201d, - he lives the dramatic quest for an undetectable imitation of a man, a woman, - a machine. He makes us see the continuous deformations of a material action/reaction/diffusion - dynamics of hardware with no software. Each of these investigations opens - the way to new scientific paths with major consequences for contemporary live - and for knowledge. The uses and the effects of these investigations will be - discussed: the passage from classical AI to today''s neural nets, the relevance - of non-linearity in biological dynamics, but also their abuses, such as the - myth of a computational world, from a Turing-machine like universe to an encoded - homunculus in the DNA. It is shown that these latter ideas, which are sometimes - even made in Turing''s name, contradict his views.", "venue": "Theory, Culture - and Society. Explorations in Critical Social Science", "year": 2018, "referenceCount": - 0, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["LettersAndComments"], "publicationDate": - "2018-06-07", "journal": {"name": "Theory, Culture & Society", "pages": "73 - - 94", "volume": "36"}, "authors": [{"authorId": "145529421", "name": "G. - Longo"}]}, {"paperId": "f294604326972da612cf92ee0d50a14b9cb8d63d", "externalIds": - {"MAG": "2110883968", "DBLP": "journals/jsyml/Cooper82", "DOI": "10.2307/2273104", - "CorpusId": 9947102}, "url": "https://www.semanticscholar.org/paper/f294604326972da612cf92ee0d50a14b9cb8d63d", - "title": "Partial degrees and the density problem", "abstract": "A notion - of relative reducibility for partial functions, which coincides with Turing - reducibility on the total functions, was first given by S.C. Kleene in Introduction - to metamathematics [4]. Following Myhill [7], this was made more explicit - in Hartley Rogers, Jr., Theory of recursive functions and effective computability - [8, pp. 146, 279], where some basic properties of the partial degrees or (equivalent, - but notationally more convenient) the enumeration degrees, were derived. The - question of density of this proper extension of the degrees of unsolvability - was left open, although Medvedev''s result [6] that there are quasi-minimal - partial degrees (that is, nonrecursive partial degrees with no nonrecursive - total predecessors) is proved. In 1971, Sasso [9] introduced a finer notion - of partial degree, which also contained the Turing degrees as a proper substructure - (intuitively, Sasso''s notion of reducibility between partial functions differed - from Rogers'' in that computations terminated when the oracle was asked for - an undefined value, whereas a Rogers computation could be thought of as proceeding - simultaneously along a number of different branches of a \u2018consistent\u2019 - computation tree\u2014cf. Sasso [10]). His construction of minimal \u2018partial - degrees\u2019 [11], while of interest in itself, left open the analogous problem - for the more standard partial degree structure.", "venue": "Journal of Symbolic - Logic (JSL)", "year": 1982, "referenceCount": 11, "citationCount": 80, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "openAccessPdf": {"url": "https://scholarworks.uvm.edu/cgi/viewcontent.cgi?article=1061&context=casfac", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2015-05-01", + "journal": {"name": "Ecology", "pages": "\n 1189-201\n ", + "volume": "96 5"}, "authors": [{"authorId": "49642270", "name": "A. Chao"}, + {"authorId": "152654765", "name": "T. Hsieh"}, {"authorId": "5759592", "name": + "R. Chazdon"}, {"authorId": "2575768", "name": "Robert K. Colwell"}, {"authorId": + "4490352", "name": "N. Gotelli"}]}, {"paperId": "0e34fe23a4487aa1cabe517276295fd4ec2c5115", + "externalIds": {"MAG": "2162943068", "DOI": "10.1177/001979390005300401", + "CorpusId": 154438499}, "corpusId": 154438499, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0e34fe23a4487aa1cabe517276295fd4ec2c5115", + "title": "Explaining Variation in Workplace Restructuring: The Role of Local + Union Capabilities", "abstract": "Using data collected from two matched pairs + of integrated steel- making sites, the author describes variation that occurred + in the process and outcomes of workplace restructuring. Four union capabilities-the + ability to access information, to educate and mobilize the membership, to + communicate with management at multiple levels, and to access decision-making + at multiple points-appear to have been critical to two locals'' success in + negotiating with management over workplace restruc- turing in ways that benefited + themselves, their members, and their firms. The author argues for including + union locals'' capabilities as a key variable in research aimed at understanding + differences in outcomes across otherwise similar settings.", "venue": "", + "year": 2000, "referenceCount": 32, "citationCount": 98, "influentialCitationCount": + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business"], + "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-07-01", "journal": {"name": "Industrial & Labor Relations + Review", "pages": "559 - 578", "volume": "53"}, "authors": [{"authorId": "96299534", + "name": "Ann C. Frost"}]}, {"paperId": "267b68f66413d23b1b7ad24ecfad8d8eb29351b8", + "externalIds": {"DBLP": "journals/cogcom/WarwickS16", "MAG": "2260558829", + "PubMedCentral": "4867147", "DOI": "10.1007/s12559-015-9372-6", "CorpusId": + 2705846, "PubMed": "27257441"}, "corpusId": 2705846, "publicationVenue": {"id": + "d1e87771-68a0-40db-a4d3-6216158cc596", "name": "Cognitive Computation", "type": + "journal", "alternate_names": ["Cogn Comput"], "issn": "1866-9956", "url": + "https://www.springer.com/biomed/neuroscience/journal/12559", "alternate_urls": + ["https://link.springer.com/journal/12559", "http://www.springer.com/biomed/neuroscience/journal/12559"]}, + "url": "https://www.semanticscholar.org/paper/267b68f66413d23b1b7ad24ecfad8d8eb29351b8", + "title": "Passing the Turing Test Does Not Mean the End of Humanity", "abstract": + null, "venue": "Cognitive Computation", "year": 2015, "referenceCount": 54, + "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2Fs12559-015-9372-6.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2015-12-28", + "journal": {"name": "Cognitive Computation", "pages": "409 - 419", "volume": + "8"}, "authors": [{"authorId": "143636026", "name": "K. Warwick"}, {"authorId": + "2731715", "name": "Huma Shah"}]}, {"paperId": "7cdbf5b026591a58a4dd5d063adbd2d35ed948ed", + "externalIds": {"MAG": "2326444488", "DOI": "10.1103/PHYSREVLETT.112.078701", + "CorpusId": 8700338, "PubMed": "24579640"}, "corpusId": 8700338, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/7cdbf5b026591a58a4dd5d063adbd2d35ed948ed", + "title": "Interplay between Turing mechanisms can increase pattern diversity.", + "abstract": "We use the context of dryland vegetation to study a general problem + of complex pattern-forming systems: multiple pattern-forming instabilities + that are driven by distinct mechanisms but share the same spectral properties. + We find that the co-occurrence of two Turing instabilities when the driving + mechanisms counteract each other in some region of the parameter space results + in the growth of a single mode rather than two interacting modes. The interplay + between the two mechanisms compensates for the simpler dynamics of a single + mode by inducing a wider variety of patterns, which implies higher biodiversity + in dryland ecosystems.", "venue": "Physical Review Letters", "year": 2014, + "referenceCount": 0, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-02-20", "journal": {"name": "Physical review letters", "pages": "\n 078701\n ", + "volume": "112 7"}, "authors": [{"authorId": "6237863", "name": "S. Kinast"}, + {"authorId": "6559912", "name": "Yuval R. Zelnik"}, {"authorId": "47620991", + "name": "G. Bel"}, {"authorId": "2122886", "name": "E. Meron"}]}, {"paperId": + "556664b5a8a82fd78a215799c0d50aef4f246332", "externalIds": {"ArXiv": "math/9807185", + "MAG": "2169625092", "DBLP": "journals/siamcomp/BuhrmanFMT00", "DOI": "10.1137/S0097539798334736", + "CorpusId": 13986860}, "corpusId": 13986860, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/556664b5a8a82fd78a215799c0d50aef4f246332", + "title": "Separating Complexity Classes Using Autoreducibility", "abstract": + "A set is autoreducible if it can be reduced to itself by a Turing machine + that does not ask its own input to the oracle. We use autoreducibility to + separate the polynomial-time hierarchy from exponential space by showing that + all Turing complete sets for certain levels of the exponential-time hierarchy + are autoreducible but there exists some Turing complete set for doubly exponential + space that is not. \nAlthough we already knew how to separate these classes + using diagonalization, our proofs separate classes solely by showing they + have different structural properties, thus applying Post''s program to complexity + theory. We feel such techniques may prove unknown separations in the future. + In particular, if we could settle the question as to whether all Turing complete + sets for doubly exponential time are autoreducible, we would separate either + polynomial time from polynomial space, and nondeterministic logarithmic space + from nondeterministic polynomial time, or else the polynomial-time hierarchy + from exponential time. \nWe also look at the autoreducibility of complete + sets under nonadaptive, bounded query, probabilistic, and nonuniform reductions. + We show how settling some of these autoreducibility questions will also lead + to new complexity class separations.", "venue": "SIAM journal on computing + (Print)", "year": 1998, "referenceCount": 24, "citationCount": 30, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://ir.cwi.nl/pub/1211/1211D.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1982-12-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "854 - - 859", "volume": "47"}, "authors": [{"authorId": "98630872", "name": "S. - Cooper"}]}, {"paperId": "281159a53018c9d9df240b67d6f05a0d8b49b3d4", "externalIds": - {"MAG": "2125534966", "DOI": "10.1073/pnas.152302199", "CorpusId": 17714460, - "PubMed": "12114538"}, "url": "https://www.semanticscholar.org/paper/281159a53018c9d9df240b67d6f05a0d8b49b3d4", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1998-07-01", "journal": + {"name": "SIAM J. Comput.", "pages": "1497-1520", "volume": "29"}, "authors": + [{"authorId": "1747509", "name": "H. Buhrman"}, {"authorId": "1691447", "name": + "L. Fortnow"}, {"authorId": "1717488", "name": "D. Melkebeek"}, {"authorId": + "3049789", "name": "L. Torenvliet"}]}, {"paperId": "0eb03b905cb2e47e3278a2a5aa5512a4b9520e93", + "externalIds": {"MAG": "2499574314", "DBLP": "conf/gecco/GreveJR16", "DOI": + "10.1145/2908812.2908930", "CorpusId": 1148071}, "corpusId": 1148071, "publicationVenue": + {"id": "d732841e-83f9-49ec-95ca-389e5568634b", "name": "Annual Conference + on Genetic and Evolutionary Computation", "type": "conference", "alternate_names": + ["GECCO", "Annu Conf Genet Evol Comput", "Genet Evol Comput Conf", "Genetic + and Evolutionary Computation Conference"], "url": "http://www.sigevo.org/"}, + "url": "https://www.semanticscholar.org/paper/0eb03b905cb2e47e3278a2a5aa5512a4b9520e93", + "title": "Evolving Neural Turing Machines for Reward-based Learning", "abstract": + "An unsolved problem in neuroevolution (NE) is to evolve artificial neural + networks (ANN) that can store and use information to change their behavior + online. While plastic neural networks have shown promise in this context, + they have difficulties retaining information over longer periods of time and + integrating new information without losing previously acquired skills. Here + we build on recent work by Graves et al. [5] who extended the capabilities + of an ANN by combining it with an external memory bank trained through gradient + descent. In this paper, we introduce an evolvable version of their Neural + Turing Machine (NTM) and show that such an approach greatly simplifies the + neural model, generalizes better, and does not require accessing the entire + memory content at each time-step. The Evolvable Neural Turing Machine (ENTM) + is able to solve a simple copy tasks and for the first time, the continuous + version of the double T-Maze, a complex reinforcement-like learning problem. + In the T-Maze learning task the agent uses the memory bank to display adaptive + behavior that normally requires a plastic ANN, thereby suggesting a complementary + and effective mechanism for adaptive behavior in NE.", "venue": "Annual Conference + on Genetic and Evolutionary Computation", "year": 2016, "referenceCount": + 16, "citationCount": 35, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Book", "JournalArticle", "Conference"], "publicationDate": "2016-07-20", + "journal": {"name": "Proceedings of the Genetic and Evolutionary Computation + Conference 2016"}, "authors": [{"authorId": "3439774", "name": "R. Greve"}, + {"authorId": "1886166", "name": "E. Jacobsen"}, {"authorId": "1745664", "name": + "S. Risi"}]}, {"paperId": "2afcc991afa0d94821e57f19436a3139d91e5769", "externalIds": + {"CorpusId": 29936247, "PubMed": "17138885"}, "corpusId": 29936247, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/2afcc991afa0d94821e57f19436a3139d91e5769", + "title": "Developmental biology. The Turing model comes of molecular age.", + "abstract": null, "venue": "Science", "year": 2006, "referenceCount": 0, "citationCount": + 44, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}], "publicationTypes": ["JournalArticle", "LettersAndComments"], + "publicationDate": null, "journal": {"name": "Science", "pages": "\n 1397-8\n ", + "volume": "314 5804"}, "authors": [{"authorId": "2339973", "name": "P. Maini"}, + {"authorId": "35275545", "name": "R. Baker"}, {"authorId": "1965740", "name": + "C. Chuong"}]}, {"paperId": "6082819ec0fb72474013c734104b532442e42869", "externalIds": + {"DBLP": "journals/corr/abs-1002-2746", "MAG": "3043122670", "ArXiv": "1002.2746", + "DOI": "10.1007/s00453-012-9631-9", "CorpusId": 2211237}, "corpusId": 2211237, + "publicationVenue": {"id": "300eb16f-ce6c-495a-8da3-2e691bf9051d", "name": + "Algorithmica", "type": "journal", "issn": "0178-4617", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/453", + "alternate_urls": ["https://link.springer.com/journal/453", "http://www.springer.com/computer/theoretical+computer+science/journal/453"]}, + "url": "https://www.semanticscholar.org/paper/6082819ec0fb72474013c734104b532442e42869", + "title": "Negative Interactions in Irreversible Self-assembly", "abstract": + null, "venue": "Algorithmica", "year": 2010, "referenceCount": 13, "citationCount": + 41, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1002.2746", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-02-13", "journal": {"name": "Algorithmica", + "pages": "153-172", "volume": "66"}, "authors": [{"authorId": "145586123", + "name": "David Doty"}, {"authorId": "144073818", "name": "L. Kari"}, {"authorId": + "2072753558", "name": "Beno\u00eet Masson"}]}, {"paperId": "281159a53018c9d9df240b67d6f05a0d8b49b3d4", + "externalIds": {"MAG": "2125534966", "DOI": "10.1073/pnas.152302199", "CorpusId": + 17714460, "PubMed": "12114538"}, "corpusId": 17714460, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/281159a53018c9d9df240b67d6f05a0d8b49b3d4", "title": "Spatial patterns in ant colonies", "abstract": "The origins of large-scale spatial patterns in biology have been an important source of theoretical speculation since the pioneering work by Turing (1952) on the chemical basis of morphogenesis. @@ -28612,8 +32584,9 @@ interactions: behavior in complex biological systems, supporting early conjectures about its role in the organization of insect societies.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": - 2002, "referenceCount": 64, "citationCount": 194, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 2002, "referenceCount": 64, "citationCount": 195, "influentialCitationCount": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc124961?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2002-07-11", "journal": {"name": "Proceedings @@ -28626,215 +32599,60 @@ interactions: "117964487", "name": "J. Joly"}, {"authorId": "145567201", "name": "P. Fern\u00e1ndez"}, {"authorId": "3216456", "name": "A. Grimal"}, {"authorId": "1944126", "name": "P. Dalle"}, {"authorId": "2448757", "name": "J. Deneubourg"}]}, {"paperId": - "067f0e873923f6f0bb085dcdc961c7d58e9bfea2", "externalIds": {"MAG": "2019232231", - "DOI": "10.1112/jlms/jdm041", "CorpusId": 9180151}, "url": "https://www.semanticscholar.org/paper/067f0e873923f6f0bb085dcdc961c7d58e9bfea2", - "title": "Using random sets as oracles", "abstract": "Let R be a notion of - algorithmic randomness for individual subsets of \u2115. A set B is a base - for R randomness if there is a Z \u2a7eT B such that Z is R random relative - to B. We show that the bases for 1\u2010randomness are exactly the K\u2010trivial - sets, and discuss several consequences of this result. On the other hand, - the bases for computable randomness include every \u039420 set that is not - diagonally noncomputable, but no set of PA\u2010degree. As a consequence, - an n\u2010c.e. set is a base for computable randomness if and only if it is - Turing incomplete.", "venue": "", "year": 2007, "referenceCount": 32, "citationCount": - 102, "influentialCitationCount": 21, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2007-06-01", "journal": {"name": "Journal of the London Mathematical Society", - "volume": "75"}, "authors": [{"authorId": "1989269", "name": "D. Hirschfeldt"}, - {"authorId": "2350687", "name": "A. Nies"}, {"authorId": "1699450", "name": - "F. Stephan"}]}, {"paperId": "6d4fefde3389f26edf0bdde35d6c910c48523c16", "externalIds": - {"MAG": "1572495540", "DOI": "10.1002/SMJ.190", "CorpusId": 166840894}, "url": - "https://www.semanticscholar.org/paper/6d4fefde3389f26edf0bdde35d6c910c48523c16", - "title": "An operationalization of Stevenson\u2019s conceptualization of entrepreneurship - as opportunity-based firm behavior", "abstract": "Stevenson (1983) holds that - entrepreneurial management, defined as a set of opportunity-based man-agement - practices, can help firms remain vital and contribute to firm and societal - level value creation. While his conceptualization has received much attention, - little progress has been made because of a lack of empirical tools to examine - his propositions. This article seeks to resolve this by describing a new instrument - that was developed specifically for operationalizing Stevenson\u2019s conceptualization. - After two pre-tests, the instrument was tested full scale on a very large - (1200+ cases) stratified random sample of firms with different size, governance - struc-ture, and industry affiliation. The results show that both in the full - sample and in various sub-samples it was pos-sible to identify six sub-dimensions - with high discriminant validity and moderate to high reliability, which rep-resent - dimensions of Stevenson\u2019s theoretical reasoning. We label these Strategic - Orientation, Resource Orienta-tion, Management Structure, Reward Philosophy, - Growth Orientation and Entrepreneurial Culture. We were further able to show - that these dimensions only partly overlap with \u2018Entrepreneurial Orientation\u2019, - the hitherto best established empirical instrument for assessing a firm\u2019s - degree of entrepreneurship. Our instrument should open up opportunities for - researchers to further evaluate entrepreneurship in existing firms.", "venue": - "", "year": 2001, "referenceCount": 32, "citationCount": 644, "influentialCitationCount": - 42, "isOpenAccess": true, "fieldsOfStudy": ["Business", "Sociology"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Sociology", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2001-10-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "73035173", "name": "Terrence - E. Brown"}, {"authorId": "50510596", "name": "P. Davidsson"}, {"authorId": - "2446333", "name": "Johan Wiklund"}]}, {"paperId": "e9f5e91a3e0db775118575788d1c517ab2bc3492", - "externalIds": {"MAG": "2162720870", "DOI": "10.1080/00949650008812016", "CorpusId": - 122004436}, "url": "https://www.semanticscholar.org/paper/e9f5e91a3e0db775118575788d1c517ab2bc3492", - "title": "Turing\u2019s anticipation of empirical bayes in connection with - the cryptanalysis of the naval enigma", "abstract": "The Enigma was a cryptographic - (enciphering) machine used by the German military during WWII. The German - navy changed part of the Enigma keys every other day. One of the important - cryptanalytic attacks against the naval usage was called Banburismus, a sequentiai - Bayesian procedure (anticipating sequential analysis) which was used from - the sorine of 1941 until the middle of 1943. It was invented mainlv bv A. - M. Turina and was perhaps the first important sequential Bayesian IE is unnecessab - to describe it here. Before Banburismus could be started on a given day it - was necessary to identifv which of nine \u2018biaram\u2019 (or \u2018diaraph\u2019) - tables was in use on that day. In Turing\u2019s approach to this identification - hk had io istimate the probabilities of certain \u2018trigraphs\u2019. rrhese - trigraphs were used. as described below. for determinine the initial wheel - settings of messages). For estimatidg the probabilities, Turing inventedin - important special case o the nonparametric (nonhypermetric) Empirid Bayes - method independently of Herbert Robbins. The techniaue is the sumxisine form - of Emdrical Baves in which a physical prior is assumed to eist but no apbroxiGate - functional fonn is assumed for it.", "venue": "", "year": 2000, "referenceCount": - 10, "citationCount": 71, "influentialCitationCount": 12, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-05-01", "journal": {"name": - "Journal of Statistical Computation and Simulation", "pages": "101 - 111", - "volume": "66"}, "authors": [{"authorId": "145179124", "name": "I. Good"}]}, - {"paperId": "35d272e29af42f41a6966d5a2d5bc391c14092d6", "externalIds": {"MAG": - "587371417", "DOI": "10.5860/choice.39-4011", "CorpusId": 107088156}, "url": - "https://www.semanticscholar.org/paper/35d272e29af42f41a6966d5a2d5bc391c14092d6", - "title": "The invisible future: the seamless integration of technology into - everyday life", "abstract": "Funding the future - the third wave of the computing - revolution flesh and machines don''t count society out the rise and fall of - Turing-Church''s thesis moving design to the other side of the screen one - is glad to be of service a compass for computing''s future an IT profession - the unfinished revolution in design lifestreams at the interface the end of - career somatics in cyberspace will computer programs write beautiful music? - free market electrical network management engineering in the future depends - on future engineers the computer revolution hasn''t happened yet why we will - spend most of our time in virtual reality in the 21st century beyond Jules - Verne - ocean exploration for the 21st century life after Internet ambient - intelligence when our environment becomes really smart science''s endless - golden age.", "venue": "", "year": 2001, "referenceCount": 0, "citationCount": - 193, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2001-11-30", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "1729148", "name": "P. Denning"}]}, {"paperId": "651fa9f3074356c61eb0b40d458b966182db1ebf", - "externalIds": {"DBLP": "conf/cefp/CsornyeiD07", "MAG": "1899927323", "DOI": - "10.1007/978-3-540-88059-2_3", "CorpusId": 591671}, "url": "https://www.semanticscholar.org/paper/651fa9f3074356c61eb0b40d458b966182db1ebf", - "title": "An Introduction to the Lambda Calculus", "abstract": null, "venue": - "Central European Functional Programming School", "year": 2008, "referenceCount": - 27, "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "13725be89710acc673d11f94b75bc32500687b15", "externalIds": {"DBLP": "journals/scjapan/Serizawa87", + "MAG": "2027580140", "DOI": "10.1002/scj.4690180404", "CorpusId": 27838375}, + "corpusId": 27838375, "publicationVenue": {"id": "5cfa3f47-f19a-4e11-8c8e-8f68245990be", + "name": "Systems and Computers in Japan", "type": "journal", "alternate_names": + ["Syst Comput Jpn"], "issn": "0882-1666", "url": "http://www3.interscience.wiley.com/cgi-bin/jtoc?ID=51986", + "alternate_urls": ["https://onlinelibrary.wiley.com/loi/1520684x", "http://www.interscience.wiley.com/jpages/0882-1666/"]}, + "url": "https://www.semanticscholar.org/paper/13725be89710acc673d11f94b75bc32500687b15", + "title": "Three-state neumann neighbor cellular automata capable of constructing + self-reproducing machines", "abstract": "This paper defines the 3-state Neumann-neighbor + cellular automata, and shows that its space is construction-universal. The + proof for this is achieved by presenting a realization of self-reproducing + machines. The state-transition rule and the basic operations of configurations + of the cellular automata are described first. Then methods are shown to construct + AND circuit, pulse generator, signal-line, delay circuit and memory circuit. + Finally, the structure of the self-reproducing machine is shown, which is + realized by combining those circuits, The machine has two construction arms, + a Turing tape and a timing loop. It can make a replica of its own using the + Turing tape. The machine can also be operated as a universal construction + machine or a universal Turing machine.", "venue": "Systems and Computers in + Japan", "year": 1987, "referenceCount": 2, "citationCount": 28, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-06-01", "journal": - {"pages": "87-111"}, "authors": [{"authorId": "3145005", "name": "Z. Cs\u00f6rnyei"}, - {"authorId": "3282665", "name": "Gergely D\u00e9vai"}]}, {"paperId": "a0f5b45c53e4d4a795e213d66776ee584c9d9cd5", - "externalIds": {"MAG": "2083480756", "DOI": "10.1103/PHYSREVE.90.032923", - "CorpusId": 39184911, "PubMed": "25314520"}, "url": "https://www.semanticscholar.org/paper/a0f5b45c53e4d4a795e213d66776ee584c9d9cd5", - "title": "Subcritical Turing bifurcation and the morphogenesis of localized - patterns.", "abstract": "Subcritical Turing bifurcations of reaction-diffusion - systems in large domains lead to spontaneous onset of well-developed localized - patterns via the homoclinic snaking mechanism. This phenomenon is shown to - occur naturally when balancing source and loss effects are included in a typical - reaction-diffusion system, leading to a super- to subcritical transition. - Implications are discussed [corrected]for a range of physical problems, arguing - that subcriticality leads to naturally robust phase transitions to localized - patterns.", "venue": "Physical review. E, Statistical, nonlinear, and soft - matter physics", "year": 2014, "referenceCount": 44, "citationCount": 35, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-09-26", "journal": {"name": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "pages": "\n 032923\n ", "volume": - "90 3"}, "authors": [{"authorId": "1403452105", "name": "V. Bre\u00f1a-Medina"}, - {"authorId": "2718658", "name": "A. Champneys"}]}, {"paperId": "6082819ec0fb72474013c734104b532442e42869", - "externalIds": {"DBLP": "journals/corr/abs-1002-2746", "MAG": "3043122670", - "ArXiv": "1002.2746", "DOI": "10.1007/s00453-012-9631-9", "CorpusId": 2211237}, - "url": "https://www.semanticscholar.org/paper/6082819ec0fb72474013c734104b532442e42869", - "title": "Negative Interactions in Irreversible Self-assembly", "abstract": - null, "venue": "Algorithmica", "year": 2010, "referenceCount": 13, "citationCount": - 41, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2010-02-13", "journal": {"name": "Algorithmica", - "pages": "153-172", "volume": "66"}, "authors": [{"authorId": "145586123", - "name": "David Doty"}, {"authorId": "144073818", "name": "L. Kari"}, {"authorId": - "2072753558", "name": "Beno\u00eet Masson"}]}, {"paperId": "86374da09eb0d63a7d6790ef74db04fe4c41b653", - "externalIds": {"MAG": "1545211217", "DOI": "10.1007/978-94-015-9153-9_2", - "CorpusId": 118015638}, "url": "https://www.semanticscholar.org/paper/86374da09eb0d63a7d6790ef74db04fe4c41b653", + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Systems and Computers in Japan", "pages": "33-40", "volume": "18"}, + "authors": [{"authorId": "2182642", "name": "Teruo Serizawa"}]}, {"paperId": + "1ec3e5accac9369347595f6927b6a6cee9312426", "externalIds": {"MAG": "2086963014", + "DOI": "10.1007/s11255-012-0253-6", "CorpusId": 27370541, "PubMed": "22833254"}, + "corpusId": 27370541, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1ec3e5accac9369347595f6927b6a6cee9312426", + "title": "Transurethral resection of ejaculatory duct in infertile men: outcome + and predictors of success", "abstract": null, "venue": "International Urology + and Nephrology", "year": 2012, "referenceCount": 25, "citationCount": 29, + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-07-26", "journal": + {"name": "International Urology and Nephrology", "pages": "1623-1630", "volume": + "44"}, "authors": [{"authorId": "1398659127", "name": "A. El-Assmy"}, {"authorId": + "1429631393", "name": "Hosam El-Tholoth"}, {"authorId": "12641566", "name": + "R. Abouelkheir"}, {"authorId": "1399442544", "name": "M. Abou-El-Ghar"}]}, + {"paperId": "86374da09eb0d63a7d6790ef74db04fe4c41b653", "externalIds": {"MAG": + "1545211217", "DOI": "10.1007/978-94-015-9153-9_2", "CorpusId": 118015638}, + "corpusId": 118015638, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/86374da09eb0d63a7d6790ef74db04fe4c41b653", "title": "The Game of Life: Universality Revisited", "abstract": null, "venue": "", "year": 1999, "referenceCount": 16, "citationCount": 66, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "pages": "51-74", "volume": ""}, "authors": [{"authorId": "34998745", - "name": "B. Durand"}, {"authorId": "2560203", "name": "Zsuzsanna R\u00f3ka"}]}, - {"paperId": "2303f84a09f0b9617dc661bf820f99e9efe43335", "externalIds": {"MAG": - "1757600360", "DBLP": "journals/ijbc/ShiRSZ15", "DOI": "10.1142/S0218127415300141", - "CorpusId": 18095498}, "url": "https://www.semanticscholar.org/paper/2303f84a09f0b9617dc661bf820f99e9efe43335", - "title": "Spatiotemporal Dynamics of a Diffusive Leslie-Gower Predator-Prey - Model with Ratio-Dependent Functional Response", "abstract": "This paper is - devoted to the study of spatiotemporal dynamics of a diffusive Leslie\u2013Gower - predator\u2013prey system with ratio-dependent Holling type III functional - response under homogeneous Neumann boundary conditions. It is shown that the - model exhibits spatial patterns via Turing (diffusion-driven) instability - and temporal patterns via Hopf bifurcation. Moreover, the existence of spatiotemporal - patterns is established via Turing\u2013Hopf bifurcation at the degenerate - points where the Turing instability curve and the Hopf bifurcation curve intersect. - Various numerical simulations are also presented to illustrate the theoretical - results.", "venue": "International Journal of Bifurcation and Chaos in Applied - Sciences and Engineering", "year": 2015, "referenceCount": 57, "citationCount": - 22, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-05-21", "journal": {"name": "Int. - J. Bifurc. Chaos", "pages": "1530014:1-1530014:16", "volume": "25"}, "authors": - [{"authorId": "48626765", "name": "Hongbo Shi"}, {"authorId": "145809344", - "name": "S. Ruan"}, {"authorId": "102831968", "name": "Ying-Chin Su"}, {"authorId": - "2108230587", "name": "Jiafang Zhang"}]}, {"paperId": "e1fae52d711356fbc6e03f05fa60ee4ad34c2ba9", - "externalIds": {"MAG": "2158569873", "DOI": "10.1146/ANNUREV.EARTH.28.1.339", - "CorpusId": 28785935}, "url": "https://www.semanticscholar.org/paper/e1fae52d711356fbc6e03f05fa60ee4ad34c2ba9", - "title": "CLIMATE RECONSTRUCTION FROM SUBSURFACE TEMPERATURES", "abstract": - "Temperature changes at the Earth''s surface propagate downward into the subsurface - and impart a thermal signature to the rocks. This signature can be measured - in boreholes and then analyzed to reconstruct the surface temperature his- - tory over the past several centuries. The ability to resolve surface temperature - history from subsurface temperatures diminishes with time. Microclimatic effects - associated with the topography and vegetation patterns at the site of a borehole, - along with local anthropogenic perturbations associated with land use change, - can obscure the regional climate change signal. Regional and global ensembles - of boreholes reveal the broader patterns of temperature changes at the Earth''s - surface. The average surface tempera- ture of the continents has increased - by about 1.0 K over the past 5 centuries; half of this increase has occurred - in the twentieth century alone.", "venue": "", "year": 2000, "referenceCount": - 130, "citationCount": 189, "influentialCitationCount": 19, "isOpenAccess": - false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", - "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2000-05-01", "journal": {"name": "Annual Review - of Earth and Planetary Sciences", "pages": "339-365", "volume": "28"}, "authors": - [{"authorId": "6773413", "name": "H. Pollack"}, {"authorId": "4403057", "name": - "Shaopeng Huang"}]}, {"paperId": "36fe7eb106a83887eae8fac2a99cc9bc0e03a847", - "externalIds": {"MAG": "2174928349", "DBLP": "conf/er/WegnerG97", "DOI": "10.1007/3-540-48854-5_19", - "CorpusId": 5886573}, "url": "https://www.semanticscholar.org/paper/36fe7eb106a83887eae8fac2a99cc9bc0e03a847", - "title": "Interaction as a Framework for Modeling", "abstract": null, "venue": - "Conceptual Modeling", "year": 1997, "referenceCount": 32, "citationCount": - 67, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, - "journal": {"pages": "243-257"}, "authors": [{"authorId": "2103444", "name": - "P. Wegner"}, {"authorId": "27353259", "name": "Dina Q. Goldin"}]}, {"paperId": - "ba6625a5c6e2adfd1ea19f2f2d675541120db7f0", "externalIds": {"MAG": "2059092900", - "DOI": "10.1137/0133023", "CorpusId": 122156752}, "url": "https://www.semanticscholar.org/paper/ba6625a5c6e2adfd1ea19f2f2d675541120db7f0", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "51-74", "volume": ""}, "authors": [{"authorId": + "34998745", "name": "B. Durand"}, {"authorId": "2560203", "name": "Zsuzsanna + R\u00f3ka"}]}, {"paperId": "ba6625a5c6e2adfd1ea19f2f2d675541120db7f0", "externalIds": + {"MAG": "2059092900", "DOI": "10.1137/0133023", "CorpusId": 122156752}, "corpusId": + 122156752, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ba6625a5c6e2adfd1ea19f2f2d675541120db7f0", "title": "Stability Properties of Solutions to Systems of Reaction-Diffusion Equations", "abstract": "This paper primarily treats the stability properties of uniform steady solutions to systems of reaction-diffusion equations subject @@ -28847,57 +32665,38 @@ interactions: of asymptotic stability. We also briefly treat the case when Neumann data is replaced by Dirichlet data. This latter case has been studied more extensively in the literature.", "venue": "", "year": 1977, "referenceCount": 10, "citationCount": - 100, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1977-09-01", "journal": {"name": "Siam Journal on - Applied Mathematics", "pages": "353-364", "volume": "33"}, "authors": [{"authorId": - "88605002", "name": "R. G. Casten"}, {"authorId": "39171656", "name": "C. - Holland"}]}, {"paperId": "faade5351ef9bc74a679b85646c08d98ecbbebc3", "externalIds": - {"DBLP": "journals/corr/abs-1102-1612", "MAG": "2962804872", "ArXiv": "1102.1612", - "DOI": "10.1142/S0129054112500153", "CorpusId": 17472882}, "url": "https://www.semanticscholar.org/paper/faade5351ef9bc74a679b85646c08d98ecbbebc3", - "title": "The Physical Church-Turing Thesis and the Principles of Quantum - Theory", "abstract": "Notoriously, quantum computation shatters complexity - theory, but is innocuous to computability theory. Yet several works have shown - how quantum theory as it stands could breach the physical Church-Turing thesis. - We draw a clear line as to when this is the case, in a way that is inspired - by Gandy. Gandy formulates postulates about physics, such as homogeneity of - space and time, bounded density and velocity of information --- and proves - that the physical Church-Turing thesis is a consequence of these postulates. - We provide a quantum version of the theorem. Thus this approach exhibits a - formal non-trivial interplay between theoretical physics symmetries and computability - assumptions.", "venue": "International Journal of Foundations of Computer - Science", "year": 2011, "referenceCount": 37, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-02-08", "journal": - {"name": "Int. J. Found. Comput. Sci.", "pages": "1131-1146", "volume": "23"}, - "authors": [{"authorId": "3274098", "name": "P. Arrighi"}, {"authorId": "1733100", - "name": "Gilles Dowek"}]}, {"paperId": "0e34fe23a4487aa1cabe517276295fd4ec2c5115", - "externalIds": {"MAG": "2162943068", "DOI": "10.1177/001979390005300401", - "CorpusId": 154438499}, "url": "https://www.semanticscholar.org/paper/0e34fe23a4487aa1cabe517276295fd4ec2c5115", - "title": "Explaining Variation in Workplace Restructuring: The Role of Local - Union Capabilities", "abstract": "Using data collected from two matched pairs - of integrated steel- making sites, the author describes variation that occurred - in the process and outcomes of workplace restructuring. Four union capabilities-the - ability to access information, to educate and mobilize the membership, to - communicate with management at multiple levels, and to access decision-making - at multiple points-appear to have been critical to two locals'' success in - negotiating with management over workplace restruc- turing in ways that benefited - themselves, their members, and their firms. The author argues for including - union locals'' capabilities as a key variable in research aimed at understanding - differences in outcomes across otherwise similar settings.", "venue": "", - "year": 2000, "referenceCount": 32, "citationCount": 97, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2000-07-01", "journal": {"name": "Industrial & Labor Relations Review", "pages": - "559 - 578", "volume": "53"}, "authors": [{"authorId": "96299534", "name": - "Ann C. Frost"}]}, {"paperId": "b93a1c894e77a8c0ec8015bbffaa8da594f1ce98", - "externalIds": {"DBLP": "journals/toh/AvrahamNFAKLK12", "MAG": "2090061392", - "DOI": "10.1109/TOH.2012.16", "CorpusId": 8210338, "PubMed": "26964106"}, + 102, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1977-09-01", "journal": {"name": + "Siam Journal on Applied Mathematics", "pages": "353-364", "volume": "33"}, + "authors": [{"authorId": "88605002", "name": "R. G. Casten"}, {"authorId": + "39171656", "name": "C. Holland"}]}, {"paperId": "c072eef2dfb3d9c5339ac3e767120cd691f2ab55", + "externalIds": {"CorpusId": 6300232}, "corpusId": 6300232, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c072eef2dfb3d9c5339ac3e767120cd691f2ab55", + "title": "Security Threats in Wireless Sensor Networks", "abstract": "Wireless + Sensor Network (WSN) is an emerging technology that shows great promise for + various futuristic applications both for mass public and military. The sensing + technology combined with processing power and wireless communication makes + it lucrative for being exploited in abundance in fu ture. Wireless sensor + networks are characterized by severely constrained computational and energy + resources, and an ad hoc operational environment. Wireless sensor networks + (WSN) are currently receiving significant attention due to their unlimi ted + potential. However, it is still very early in the l ifetime of such systems + and many research challenges exist. This paper studies the security aspects + of these networks.", "venue": "", "year": 2011, "referenceCount": 10, "citationCount": + 98, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": [{"authorId": "77871669", "name": "Sushma"}, {"authorId": + "66123813", "name": "D. Nandal"}, {"authorId": "27681450", "name": "V. Nandal"}]}, + {"paperId": "b93a1c894e77a8c0ec8015bbffaa8da594f1ce98", "externalIds": {"DBLP": + "journals/toh/AvrahamNFAKLK12", "MAG": "2090061392", "DOI": "10.1109/TOH.2012.16", + "CorpusId": 8210338, "PubMed": "26964106"}, "corpusId": 8210338, "publicationVenue": + {"id": "b9d30174-cfe1-4e19-8512-9778cbe86d7b", "name": "IEEE Transactions + on Haptics", "type": "journal", "alternate_names": ["IEEE Trans Haptics"], + "issn": "1939-1412", "url": "https://www.computer.org/toh", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=4543165", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=4543165"]}, "url": "https://www.semanticscholar.org/paper/b93a1c894e77a8c0ec8015bbffaa8da594f1ce98", "title": "Toward Perceiving Robots as Humans: Three Handshake Models Face the Turing-Like Handshake Test", "abstract": "In the Turing test a computer @@ -28917,136 +32716,99 @@ interactions: interactions and further improve the human-likeness of robotic handshakes.", "venue": "IEEE Transactions on Haptics", "year": 2012, "referenceCount": 110, "citationCount": 67, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Engineering", "Medicine"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "IEEE Transactions on Haptics", - "pages": "196-207", "volume": "5"}, "authors": [{"authorId": "1396288287", - "name": "Guy Avraham"}, {"authorId": "2166933", "name": "I. Nisky"}, {"authorId": - "1693881", "name": "Hugo L. Fernandes"}, {"authorId": "25636121", "name": - "Daniel Ernesto Acuna"}, {"authorId": "3282030", "name": "Konrad Paul Kording"}, - {"authorId": "1720471", "name": "G. Loeb"}, {"authorId": "1848564", "name": - "A. Karniel"}]}, {"paperId": "a464563647e9021463ea97eff3a61b5e417a936c", "externalIds": - {"MAG": "2894870014", "CorpusId": 126013237}, "url": "https://www.semanticscholar.org/paper/a464563647e9021463ea97eff3a61b5e417a936c", - "title": "Turing-Hopf bifurcation in Gauss-type model with cross diffusion - and its application", "abstract": "This paper deals with a very general case - of predator-prey model called Gauss type model, in the presence of cross-diffusion, - where the existence of global solution has been shown and some priori bound - of solution. The dynamic near Turing-Hopf bifurcation has been studied, where - the existence of Hopf and Turing-Hopf bifurcation has been shown, and for - the stability of the periodic solution the normal form on the center of the - manifold of Turing-Hopf bifurcation has been calculated. Further, an application - of the considered model has been applied in treated models and non treated - ones, also an extend numerical simulation has been used to illustrate the - theoretical results.", "venue": "", "year": 2018, "referenceCount": 0, "citationCount": - 20, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2018-08-27", "journal": {"name": "Nonlinear Studies", - "pages": "665-687", "volume": "25"}, "authors": [{"authorId": "102883860", - "name": "Ismail Boudjema"}, {"authorId": "103679695", "name": "S. Djilali"}]}, - {"paperId": "3c76b0920972739f4314bf32296bdf833ab3c359", "externalIds": {"MAG": - "2569188228", "DOI": "10.1177/00034894800890S303", "CorpusId": 79445329}, - "url": "https://www.semanticscholar.org/paper/3c76b0920972739f4314bf32296bdf833ab3c359", - "title": "Report of the AD HOC Committee on Definition and Classification - of Otitis Media and Otitis Media with Effusion", "abstract": "To classify - and simplify the nomencla ture and to derive acceptable terminology for the - various facets of otitis media (OM) for the purpose of communica\u00ad tion. - In the past there has been a confusion of terms in par t because of a failure - to distinguish concep\u00ad tually between the disease process, otitis media, - and one of the manifestations of tha t disease process, namely otitis media - with effusion (OME). Otitis media is dynamic and at any one t ime should be - considered a single point in a cont inuum of the dis\u00ad ease process.", - "venue": "", "year": 1980, "referenceCount": 0, "citationCount": 98, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1980-05-01", "journal": {"name": "Annals of Otology, Rhinology & Laryngology", - "pages": "3 - 4", "volume": "89"}, "authors": [{"authorId": "15399054", "name": - "B. Senturia"}, {"authorId": "4187547", "name": "C. Bluestone"}, {"authorId": - "36383156", "name": "D. Lim"}, {"authorId": "2146461", "name": "J. Klein"}, - {"authorId": "5202629", "name": "J. Paradise"}]}, {"paperId": "d278c42ab24e014da4f991944dc55c11484e0d3a", - "externalIds": {"MAG": "1535681052", "DBLP": "books/sp/MollAK88", "DOI": "10.1007/978-1-4613-9595-9", - "CorpusId": 29304912}, "url": "https://www.semanticscholar.org/paper/d278c42ab24e014da4f991944dc55c11484e0d3a", - "title": "An Introduction to Formal Language Theory", "abstract": null, "venue": - "Texts and Monographs in Computer Science", "year": 1988, "referenceCount": - 13, "citationCount": 608, "influentialCitationCount": 51, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1988-08-08", - "journal": {"pages": "i-x, 1-205"}, "authors": [{"authorId": "35116937", "name": - "R. Moll"}, {"authorId": "1795076", "name": "M. Arbib"}, {"authorId": "2712330", - "name": "A. Kfoury"}]}, {"paperId": "2d2cde78f224976675a64216c29d610732776eda", - "externalIds": {"MAG": "2952930497", "ArXiv": "math/0412323", "CorpusId": - 13947177}, "url": "https://www.semanticscholar.org/paper/2d2cde78f224976675a64216c29d610732776eda", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Engineering", + "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Engineering", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "IEEE Transactions on Haptics", "pages": "196-207", + "volume": "5"}, "authors": [{"authorId": "1396288287", "name": "Guy Avraham"}, + {"authorId": "2166933", "name": "I. Nisky"}, {"authorId": "1693881", "name": + "Hugo L. Fernandes"}, {"authorId": "25636121", "name": "Daniel Ernesto Acuna"}, + {"authorId": "3282030", "name": "Konrad Paul Kording"}, {"authorId": "1720471", + "name": "G. Loeb"}, {"authorId": "1848564", "name": "A. Karniel"}]}, {"paperId": + "2d2cde78f224976675a64216c29d610732776eda", "externalIds": {"MAG": "2952930497", + "ArXiv": "math/0412323", "CorpusId": 13947177}, "corpusId": 13947177, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2d2cde78f224976675a64216c29d610732776eda", "title": "CURVES WITH CONSTANT CURVATURE RATIOS", "abstract": "Curves in R n for which the ratios between two consecutive curva- tures are constant are characterized by the fact that their tangent indicatrix is a geodesic in a flat torus. For n = 3,4, spherical curves of this kind are also studied and compared with intrinsic helices in the sphere.", "venue": "", "year": 2004, "referenceCount": 9, "citationCount": 52, "influentialCitationCount": 4, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-12-16", + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-12-16", "journal": {"name": "", "pages": "177-186", "volume": "13"}, "authors": [{"authorId": - "1800735", "name": "J. Monterde"}]}, {"paperId": "21c1e1aab8219dada7062141c3194817f7c315e5", - "externalIds": {"DBLP": "journals/nc/AndrekaNN09", "MAG": "2016555353", "DOI": - "10.1007/s11047-009-9114-3", "CorpusId": 15932583}, "url": "https://www.semanticscholar.org/paper/21c1e1aab8219dada7062141c3194817f7c315e5", - "title": "General relativistic hypercomputing and foundation of mathematics", - "abstract": null, "venue": "Natural Computing", "year": 2009, "referenceCount": - 72, "citationCount": 41, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-09-01", "journal": - {"name": "Natural Computing", "pages": "499-516", "volume": "8"}, "authors": - [{"authorId": "2639641", "name": "H. Andr\u00e9ka"}, {"authorId": "1778493", - "name": "I. N\u00e9meti"}, {"authorId": "2988847", "name": "P. N\u00e9meti"}]}, - {"paperId": "0eb03b905cb2e47e3278a2a5aa5512a4b9520e93", "externalIds": {"MAG": - "2499574314", "DBLP": "conf/gecco/GreveJR16", "DOI": "10.1145/2908812.2908930", - "CorpusId": 1148071}, "url": "https://www.semanticscholar.org/paper/0eb03b905cb2e47e3278a2a5aa5512a4b9520e93", - "title": "Evolving Neural Turing Machines for Reward-based Learning", "abstract": - "An unsolved problem in neuroevolution (NE) is to evolve artificial neural - networks (ANN) that can store and use information to change their behavior - online. While plastic neural networks have shown promise in this context, - they have difficulties retaining information over longer periods of time and - integrating new information without losing previously acquired skills. Here - we build on recent work by Graves et al. [5] who extended the capabilities - of an ANN by combining it with an external memory bank trained through gradient - descent. In this paper, we introduce an evolvable version of their Neural - Turing Machine (NTM) and show that such an approach greatly simplifies the - neural model, generalizes better, and does not require accessing the entire - memory content at each time-step. The Evolvable Neural Turing Machine (ENTM) - is able to solve a simple copy tasks and for the first time, the continuous - version of the double T-Maze, a complex reinforcement-like learning problem. - In the T-Maze learning task the agent uses the memory bank to display adaptive - behavior that normally requires a plastic ANN, thereby suggesting a complementary - and effective mechanism for adaptive behavior in NE.", "venue": "Annual Conference - on Genetic and Evolutionary Computation", "year": 2016, "referenceCount": - 16, "citationCount": 34, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}, - {"category": "Biology", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", - "Conference"], "publicationDate": "2016-07-20", "journal": {"name": "Proceedings - of the Genetic and Evolutionary Computation Conference 2016"}, "authors": - [{"authorId": "3439774", "name": "R. Greve"}, {"authorId": "1886166", "name": - "E. Jacobsen"}, {"authorId": "1745664", "name": "S. Risi"}]}, {"paperId": - "9b7e736d5f92eef69186399261addb518b413f88", "externalIds": {"CorpusId": 842310}, - "url": "https://www.semanticscholar.org/paper/9b7e736d5f92eef69186399261addb518b413f88", - "title": "Lecture to the london mathematical society on 20 february 1947 Universal - Turing Machine", "abstract": "Many physicists would agree that, had it not - been for DHTs, the improvement of 802.11 mesh networks might never have occurred. - In fact, few cyberneti-cists would disagree with the understanding of B-trees, - which embodies the important principles of theory. BentNip, our new heuristic - for public-private key pairs, is the solution to all of these challenges.", - "venue": "", "year": null, "referenceCount": 145, "citationCount": 88, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "35033904", - "name": "M. Rabin"}]}, {"paperId": "7db44c85d6df6aa699fdec058b73979410568eff", + "1800735", "name": "J. Monterde"}]}, {"paperId": "c5e7f462e3d7b0aff08ef79e1c880704de9a8dd5", + "externalIds": {"DBLP": "conf/eurogp/VallejoR01", "MAG": "1508079160", "DOI": + "10.1007/3-540-45355-5_15", "CorpusId": 28933521}, "corpusId": 28933521, "publicationVenue": + {"id": "e5560558-b286-4bd6-827c-5632278860f3", "name": "European Conference + on Genetic Programming", "type": "conference", "alternate_names": ["EuroGP", + "Eur Conf Genet Program"], "url": "http://www.genetic-programming.org/"}, + "url": "https://www.semanticscholar.org/paper/c5e7f462e3d7b0aff08ef79e1c880704de9a8dd5", + "title": "Evolving Turing Machines for Biosequence Recognition and Analysis", + "abstract": null, "venue": "European Conference on Genetic Programming", "year": + 2001, "referenceCount": 13, "citationCount": 17, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-04-18", "journal": {"pages": "192-203"}, "authors": + [{"authorId": "145745372", "name": "E. Vallejo"}, {"authorId": "2054757633", + "name": "F. Ramos"}]}, {"paperId": "dc948dc5bb1dd62a13accb2aab24dc86faf85513", + "externalIds": {"CorpusId": 15784499}, "corpusId": 15784499, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/dc948dc5bb1dd62a13accb2aab24dc86faf85513", + "title": "High Efficiency Feedback Shift Register : \u03c3 \u2212 LFSR ?", + "abstract": "We introduce a new kind of word-oriented linear feedback shift + register called \u03c3\u2212LFSR which is constructed with the instructions + of the modern processor and have fast software implementation. We offer an + algorithm to search for good primitive \u03c3\u2212LFSR. In particular, we + give two examples HHZ-1 and HHZ-2 and compare their efficiency and security + with those of the LFSRs appearing in stream ciphers such as SNOW, SOBER and + Turing. Our results show that replacing the LFSRs in SNOW, SOBER and Turing + with HHZ-1 will improve security and the efficiency of fast software implementation.", + "venue": "", "year": 2007, "referenceCount": 21, "citationCount": 32, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "46525902", + "name": "Guang Zeng"}, {"authorId": "1691373", "name": "Wenbao Han"}, {"authorId": + "2414054", "name": "Kaicheng He"}]}, {"paperId": "23af7e9b8ff34f3e946b9fa295dcd0f772004006", + "externalIds": {"MAG": "1599839813", "DBLP": "conf/mcu/Calude04", "DOI": "10.1007/978-3-540-31834-7_1", + "CorpusId": 1510344}, "corpusId": 1510344, "publicationVenue": {"id": "c70b16dd-3be4-41cc-8494-33d2b373f5b9", + "name": "Machines, Computations, and Universality", "type": "conference", + "alternate_names": ["Mach Comput Universality", "MCU"]}, "url": "https://www.semanticscholar.org/paper/23af7e9b8ff34f3e946b9fa295dcd0f772004006", + "title": "Algorithmic Randomness, Quantum Physics, and Incompleteness", "abstract": + null, "venue": "Machines, Computations, and Universality", "year": 2004, "referenceCount": + 66, "citationCount": 53, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://research.cs.queensu.ca/home/akl/cisc879/papers/SELECTED_PAPERS_FROM_VARIOUS_SOURCES/aqi4.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2004-09-21", "journal": {"pages": "1-17"}, "authors": + [{"authorId": "1685717", "name": "Cristian S. Calude"}]}, {"paperId": "35d272e29af42f41a6966d5a2d5bc391c14092d6", + "externalIds": {"MAG": "587371417", "DOI": "10.5860/choice.39-4011", "CorpusId": + 107088156}, "corpusId": 107088156, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/35d272e29af42f41a6966d5a2d5bc391c14092d6", + "title": "The invisible future: the seamless integration of technology into + everyday life", "abstract": "Funding the future - the third wave of the computing + revolution flesh and machines don''t count society out the rise and fall of + Turing-Church''s thesis moving design to the other side of the screen one + is glad to be of service a compass for computing''s future an IT profession + the unfinished revolution in design lifestreams at the interface the end of + career somatics in cyberspace will computer programs write beautiful music? + free market electrical network management engineering in the future depends + on future engineers the computer revolution hasn''t happened yet why we will + spend most of our time in virtual reality in the 21st century beyond Jules + Verne - ocean exploration for the 21st century life after Internet ambient + intelligence when our environment becomes really smart science''s endless + golden age.", "venue": "", "year": 2001, "referenceCount": 0, "citationCount": + 193, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2001-11-30", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "1729148", "name": "P. Denning"}]}, {"paperId": "7db44c85d6df6aa699fdec058b73979410568eff", "externalIds": {"MAG": "2346520637", "DOI": "10.1071/BI9570085", "CorpusId": - 87052621}, "url": "https://www.semanticscholar.org/paper/7db44c85d6df6aa699fdec058b73979410568eff", + 87052621}, "corpusId": 87052621, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7db44c85d6df6aa699fdec058b73979410568eff", "title": "Studies in the Physiology of Clostridium botulinum Type E.", "abstract": "Ten strains of Clostridium botulinum type E have been studied at 12 temperatures between 2\u00b75 and 45\u00b00. Growth proceeded consistently from spore inocula @@ -29055,44 +32817,193 @@ interactions: at 35\u00b00. The upper and lower temperature limits were several degrees lower than for type A and B strains.", "venue": "", "year": 1957, "referenceCount": 0, "citationCount": 67, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "http://www.publish.csiro.au/bi/pdf/bi9570085", "status": + "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Australian Journal of Biological Sciences", "pages": "85-94", "volume": "10"}, "authors": [{"authorId": "16660110", "name": "D. Ohye"}, {"authorId": "143767076", "name": - "W. Scott"}]}, {"paperId": "5717e03a85130180ce8722e1b55db4d8bc76778a", "externalIds": - {"DBLP": "conf/stoc/Valiant01", "MAG": "2069149225", "DOI": "10.1145/380752.380785", - "CorpusId": 17054776}, "url": "https://www.semanticscholar.org/paper/5717e03a85130180ce8722e1b55db4d8bc76778a", - "title": "Quantum computers that can be simulated classically in polynomial - time", "abstract": "A model of quantum computation based on unitary matrix - operations was introduced by Feynman and Deutsch. It has been asked whether - the power of this model exceeds that of classical Turing machines. We show - here that a significant class of these quantum computations can be simulated - classically in polynomial time. In particular we show that two-bit operations - characterized by 4 \\times 4 matrices in which the sixteen entries obey a - set of five polynomial relations can be composed according to certain rules - to yield a class of circuits that can be simulated classically in polynomial - time. This contrasts with the known universality of two-bit operations, and - demonstrates that efficient quantum computation of restricted classes is reconcilable - with the Polynomial Time Turing Hypothesis. In other words it is possible - that quantum phenomena can be used in a scalable fashion to make computers - but that they do not have superpolynomial speedups compared to Turing machines - for any problem. The techniques introduced bring the quantum computational - model within the realm of algebraic complexity theory. In a manner consistent - will one view of quantum physics, the wave function is simulated deterministically, - and randomization arises only in the course of making measurements. The results - generalize the quantum model in that they do not require the matrices to be - unitary. In a different direction these techniques also yield deterministic - polynomial time algorithms for the decision and parity problems for certain - classes of read-twice Boolean formulae. All our results are based on the use - of gates that are defined in terms of their graph matching properties.", "venue": - "Symposium on the Theory of Computing", "year": 2001, "referenceCount": 41, - "citationCount": 59, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": + "W. Scott"}]}, {"paperId": "da4a2b64fb67888ef7e1842c81b25d4b11393377", "externalIds": + {"MAG": "2137396446", "DOI": "10.1063/1.468684", "CorpusId": 55187132}, "corpusId": + 55187132, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/da4a2b64fb67888ef7e1842c81b25d4b11393377", + "title": "Dependence of Turing pattern wavelength on diffusion rate", "abstract": + "The relation between the diffusion coefficient of reactants and the wavelength + of Turing patterns is examined in experiments on the chlorite\u2013iodide\u2013malonic + acid (CIMA) reaction in gel media. The diffusion coefficients in polyacrylamide + and agarose gels are varied by varying the gel densities. The diffusion coefficient + D of NaCl is found to vary from 0.5\u00d710\u22125 to 1.8\u00d710\u22125 cm2/s + for the gel conditions considered. The CIMA reactants are assumed to have + diffusion coefficients that are directly proportional to that of NaCl. The + wavelength \u03bb of the observed hexagonal patterns (0.13\u20130.28 mm) varies + in accord with the predicted relation for Turing patterns, \u03bb\u223cD1/2. + Moreover, the predicted relationship to a characteristic period of oscillation + \u03c4, \u03bb=(2\u03c0\u03c4D)1/2, is supported by measurements of \u03c4 + just beyond a Hopf bifurcation in a stirred flow reactor.", "venue": "", "year": + 1995, "referenceCount": 13, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1995-02-08", "journal": {"name": "Journal of Chemical + Physics", "pages": "2551-2555", "volume": "102"}, "authors": [{"authorId": + "143803550", "name": "Q. Ouyang"}, {"authorId": "50392001", "name": "Ru\u2010Sheng + Li"}, {"authorId": "2108549867", "name": "Ge Li"}, {"authorId": "2421446", + "name": "H. Swinney"}]}, {"paperId": "e1fae52d711356fbc6e03f05fa60ee4ad34c2ba9", + "externalIds": {"MAG": "2158569873", "DOI": "10.1146/ANNUREV.EARTH.28.1.339", + "CorpusId": 28785935}, "corpusId": 28785935, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e1fae52d711356fbc6e03f05fa60ee4ad34c2ba9", + "title": "CLIMATE RECONSTRUCTION FROM SUBSURFACE TEMPERATURES", "abstract": + "Temperature changes at the Earth''s surface propagate downward into the subsurface + and impart a thermal signature to the rocks. This signature can be measured + in boreholes and then analyzed to reconstruct the surface temperature his- + tory over the past several centuries. The ability to resolve surface temperature + history from subsurface temperatures diminishes with time. Microclimatic effects + associated with the topography and vegetation patterns at the site of a borehole, + along with local anthropogenic perturbations associated with land use change, + can obscure the regional climate change signal. Regional and global ensembles + of boreholes reveal the broader patterns of temperature changes at the Earth''s + surface. The average surface tempera- ture of the continents has increased + by about 1.0 K over the past 5 centuries; half of this increase has occurred + in the twentieth century alone.", "venue": "", "year": 2000, "referenceCount": + 130, "citationCount": 189, "influentialCitationCount": 19, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": + [{"category": "Geology", "source": "external"}, {"category": "Geology", "source": + "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-05-01", "journal": {"name": + "Annual Review of Earth and Planetary Sciences", "pages": "339-365", "volume": + "28"}, "authors": [{"authorId": "6773413", "name": "H. Pollack"}, {"authorId": + "4403057", "name": "Shaopeng Huang"}]}, {"paperId": "d1fb73dc083c916cf8a965434fc684b8f0b8762d", + "externalIds": {"MAG": "2396255914", "DBLP": "journals/aim/MarcusRV16", "DOI": + "10.1609/aimag.v37i1.2650", "CorpusId": 29083837}, "corpusId": 29083837, "publicationVenue": + {"id": "6fedff74-7525-4b7f-bbb4-4df4e23948e4", "name": "The AI Magazine", + "type": "journal", "alternate_names": ["AI Mag", "Ai Mag", "Ai Magazine"], + "issn": "0738-4602", "url": "https://www.aaai.org/Library/Magazine/magazine-library.php", + "alternate_urls": ["https://www.aaai.org/ojs/index.php/aimagazine/", "https://www.aaai.org/Magazine/magazine.php"]}, + "url": "https://www.semanticscholar.org/paper/d1fb73dc083c916cf8a965434fc684b8f0b8762d", + "title": "Beyond the Turing Test", "abstract": "The articles in this special + issue of AI Magazine include those that propose specific tests, and those + that look at the challenges inherent in building robust, valid, and reliable + tests for advancing the state of the art in AI.", "venue": "The AI Magazine", + "year": 2016, "referenceCount": 0, "citationCount": 16, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://aaai.org/ojs/index.php/aimagazine/article/download/2650/2527", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-04-13", "journal": {"name": "AI Mag.", "pages": "3-4", "volume": "37"}, + "authors": [{"authorId": "1923674", "name": "G. Marcus"}, {"authorId": "2052876222", + "name": "Francesca Rossi"}, {"authorId": "1956361", "name": "M. Veloso"}]}, + {"paperId": "1d484f4f0b99644c04c0c9b7a4d52432b0a5e68a", "externalIds": {"MAG": + "609648047", "DOI": "10.1007/978-3-642-81574-4", "CorpusId": 92871057}, "corpusId": + 92871057, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1d484f4f0b99644c04c0c9b7a4d52432b0a5e68a", + "title": "Point Defects in Semiconductors II", "abstract": null, "venue": + "", "year": 1981, "referenceCount": 0, "citationCount": 575, "influentialCitationCount": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-642-81574-4%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "49041225", "name": "M. Lannoo"}, {"authorId": "31079943", "name": + "J. Bourgoin"}]}, {"paperId": "d35fbec265b21d4a6ccdd63ce2b5de5ff57932ff", + "externalIds": {"MAG": "2085725669", "DOI": "10.3354/AME031249", "CorpusId": + 2863925}, "corpusId": 2863925, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d35fbec265b21d4a6ccdd63ce2b5de5ff57932ff", + "title": "Regulation of periphytic leucine-aminopeptidase activity", "abstract": + "Short-term ( 9.75) were much greater than those previously reported for planktonic + communities and profundal sediments (pH 7.5 to 8.0), suggesting a mechanism + by which photosynthesis could stimulate LAMP activity. In situ LAMP activity + of natural wetland periphyton communities displayed diurnal patterns consistent + with stimulation of LAMP activity by photosynthetically-induced pH shifts, + but was also directly corre- lated with the potentially causal factors of + dissolved inorganic nitrogen concentration and tempera- ture.", "venue": "", + "year": 2003, "referenceCount": 57, "citationCount": 66, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/ame2003/31/a031p249.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-04-03", + "journal": {"name": "Aquatic Microbial Ecology", "pages": "249-258", "volume": + "31"}, "authors": [{"authorId": "5594652", "name": "S. Francoeur"}, {"authorId": + "39803946", "name": "R. Wetzel"}]}, {"paperId": "469bac443e71b3e2a98b2fc6457c9f03e4adfd68", + "externalIds": {"MAG": "2089947806", "DOI": "10.1090/S0002-9947-1966-0201299-1", + "CorpusId": 10314809}, "corpusId": 10314809, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/469bac443e71b3e2a98b2fc6457c9f03e4adfd68", + "title": "POST''S PROBLEM, ADMISSIBLE ORDINALS, AND REGULARITY", "abstract": + "1. Introduction. The basic notions of metarecursion theory were introduced + in [7]. Metarecursioni theory is an attempt to generalize the ideas and arguments + of recursion theory from the natural numbers to the recursive ordinals. Ordinary + recursion theory concerns itself with finite sets of natural numbers. Metarecursion + theory deals in an analogous fashion with metafinite sets of recursive ordinals. + In [7] it was seen that two of the deepest results of ordinary recursion theory, + the solution of Post''s problem [3] and the maximal set construction [4], + generalize to the metarecursive case. Theorem 4 of [7] states that there exist + two metarecursively enumerable sets of recursive ordinals such that neither + is metarecursive in the other. Kreisel [6] casts doubt on the contention that + Theorem 4 of [7] is the correct generalization of Post''s problem. He wonders + how to correctly formulate the notion of Turing reducibility for recursive + ordinals and he discusses four possible choices. It is not our place to decide + the correct notion of Turing reducibility for metarecursion theory; however, + in ?4 we show that there exist two metarecursively enumerable sets such that + neither is reducible to the other by any of the four methods discussed by + Kreisel. In [7] two sets of recursive ordinals are said to have the same metadegree + if each is metarecursive in the other. It is not known if the metadegrees + of metarecursively enumerable sets are order-isomorphic to the Turing degrees + of recursively enumerable sets, but all the existing evidence seems to favor + an affirmative answer. Driscoll [2] has shown the metadegrees of metarecursively", + "venue": "", "year": 1966, "referenceCount": 19, "citationCount": 59, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/tran/1966-124-01/S0002-9947-1966-0201299-1/S0002-9947-1966-0201299-1.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Transactions of the American Mathematical Society", "pages": + "1-23", "volume": "124"}, "authors": [{"authorId": "34913308", "name": "G. + Sacks"}]}, {"paperId": "4d243c53cca88ec3a0dcd7bd4e80f619361d893c", "externalIds": + {"MAG": "2553360915", "DOI": "10.1016/j.clinph.2016.11.005", "CorpusId": 10350853, + "PubMed": "27913148"}, "corpusId": 10350853, "publicationVenue": {"id": "96c3f884-8304-4da1-8478-6f55fa0d7217", + "name": "Clinical Neurophysiology", "type": "journal", "alternate_names": + ["Clin Neurophysiol"], "issn": "1388-2457", "url": "http://www.elsevier.com/locate/issn/13882457", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/13882457", + "https://www.journals.elsevier.com/clinical-neurophysiology/", "http://www.journals.elsevier.com/clinical-neurophysiology/"]}, + "url": "https://www.semanticscholar.org/paper/4d243c53cca88ec3a0dcd7bd4e80f619361d893c", + "title": "Spike detection: Inter-reader agreement and a statistical Turing + test on a large data set", "abstract": null, "venue": "Clinical Neurophysiology", + "year": 2017, "referenceCount": 15, "citationCount": 103, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-07-06", "journal": {"pages": "114-123"}, "authors": [{"authorId": "1741124", - "name": "L. Valiant"}]}]} + null, "journal": {"name": "Clinical Neurophysiology", "pages": "243-250", + "volume": "128"}, "authors": [{"authorId": "6109721", "name": "M. Scheuer"}, + {"authorId": "49567686", "name": "A. Bagi\u0107"}, {"authorId": "152716954", + "name": "Scott B. Wilson"}]}, {"paperId": "176bdc672e26e56b6e4ef8086fa7ee9af76f37b4", + "externalIds": {"DBLP": "journals/kybernetes/ShahW10", "MAG": "2036486516", + "DOI": "10.1108/03684921011036178", "CorpusId": 206377221}, "corpusId": 206377221, + "publicationVenue": {"id": "aa8f57e2-d5cf-4f0d-afcb-8577fb02e10a", "name": + "Kybernetes", "type": "journal", "issn": "0368-492X", "url": "https://www.emerald.com/insight/publication/issn/0368-492X", + "alternate_urls": ["http://www.emeraldinsight.com/0368-492X.htm", "http://www.emeraldinsight.com/loi/k"]}, + "url": "https://www.semanticscholar.org/paper/176bdc672e26e56b6e4ef8086fa7ee9af76f37b4", + "title": "Testing Turing''s five minutes, parallel-paired imitation game", + "abstract": "\u2013 The purpose of this paper is to consider Turing''s two + tests for machine intelligence: the parallel\u2010paired, three\u2010participants + game presented in his 1950 paper, and the \u201cjury\u2010service\u201d one\u2010to\u2010one + measure described two years later in a radio broadcast. Both versions were + instantiated in practical Turing tests during the 18th Loebner Prize for artificial + intelligence hosted at the University of Reading, UK, in October 2008. This + involved jury\u2010service tests in the preliminary phase and parallel\u2010paired + in the final phase., \u2013 Almost 100 test results from the final have been + evaluated and this paper reports some intriguing nuances which arose as a + result of the unique contest., \u2013 In the 2008 competition, Turing''s 30 + per cent pass rate is not achieved by any machine in the parallel\u2010paired + tests but Turing''s modified prediction: \u201cat least in a hundred years + time\u201d is remembered., \u2013 The paper presents actual responses from + \u201cmodern Elizas\u201d to human interrogators during contest dialogues + that show considerable improvement in artificial conversational entities (ACE). + Unlike their ancestor \u2013 Weizenbaum''s natural language understanding + system \u2013 ACE are now able to recall, share information and disclose personal + interests.", "venue": "Kybernetes", "year": 2010, "referenceCount": 26, "citationCount": + 25, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2010-05-04", "journal": {"name": "Kybernetes", "pages": "449-465", "volume": + "39"}, "authors": [{"authorId": "2731715", "name": "Huma Shah"}, {"authorId": + "143636026", "name": "K. Warwick"}]}]} ' headers: @@ -29101,31 +33012,31 @@ interactions: Connection: - keep-alive Content-Length: - - '170124' + - '199680' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:40 GMT + - Tue, 03 Jan 2023 20:53:08 GMT Via: - 1.1 1bcfe6258d4a13f2b6f9b5ee43e42254.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - nNXOMcjD8kIO0ADDSI6lJBUmm4rLdy9xbIg5a5b8DoObYt3f3GC1rg== + - 5nTTERbuvIXhnnQX2jMTTwh0-Kk1ATRyIBQzJluwUdWaU2-eHu_lZw== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detHcFLQvHcFviQ= + - eLxULHZSPHcF8Yg= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '170124' + - '199680' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:40 GMT + - Tue, 03 Jan 2023 20:53:08 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 2f9d4b2c-0370-4818-9e16-a374e6f9fca6 + - 0d57041f-e750-4d52-a545-ec743c79262c status: code: 200 message: OK @@ -29141,80 +33052,183 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1400&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1400&limit=100 response: body: - string: '{"total": 65539, "offset": 1400, "next": 1500, "data": [{"paperId": - "b53e4cbeaf2ec13c06302e7bca533400ef4cbf06", "externalIds": {"MAG": "2013857407", - "DOI": "10.1103/PHYSREVE.85.051914", "CorpusId": 12164812, "PubMed": "23004794"}, - "url": "https://www.semanticscholar.org/paper/b53e4cbeaf2ec13c06302e7bca533400ef4cbf06", - "title": "Effects of intrinsic stochasticity on delayed reaction-diffusion - patterning systems.", "abstract": "Cellular gene expression is a complex process - involving many steps, including the transcription of DNA and translation of - mRNA; hence the synthesis of proteins requires a considerable amount of time, - from ten minutes to several hours. Since diffusion-driven instability has - been observed to be sensitive to perturbations in kinetic delays, the application - of Turing patterning mechanisms to the problem of producing spatially heterogeneous - differential gene expression has been questioned. In deterministic systems - a small delay in the reactions can cause a large increase in the time it takes - a system to pattern. Recently, it has been observed that in undelayed systems - intrinsic stochasticity can cause pattern initiation to occur earlier than - in the analogous deterministic simulations. Here we are interested in adding - both stochasticity and delays to Turing systems in order to assess whether - stochasticity can reduce the patterning time scale in delayed Turing systems. - As analytical insights to this problem are difficult to attain and often limited - in their use, we focus on stochastically simulating delayed systems. We consider - four different Turing systems and two different forms of delay. Our results - are mixed and lead to the conclusion that, although the sensitivity to delays - in the Turing mechanism is not completely removed by the addition of intrinsic - noise, the effects of the delays are clearly ameliorated in certain specific - cases.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter - physics", "year": 2012, "referenceCount": 78, "citationCount": 24, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], + string: '{"total": 65730, "offset": 1400, "next": 1500, "data": [{"paperId": + "a464563647e9021463ea97eff3a61b5e417a936c", "externalIds": {"MAG": "2894870014", + "CorpusId": 126013237}, "corpusId": 126013237, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a464563647e9021463ea97eff3a61b5e417a936c", + "title": "Turing-Hopf bifurcation in Gauss-type model with cross diffusion + and its application", "abstract": "This paper deals with a very general case + of predator-prey model called Gauss type model, in the presence of cross-diffusion, + where the existence of global solution has been shown and some priori bound + of solution. The dynamic near Turing-Hopf bifurcation has been studied, where + the existence of Hopf and Turing-Hopf bifurcation has been shown, and for + the stability of the periodic solution the normal form on the center of the + manifold of Turing-Hopf bifurcation has been calculated. Further, an application + of the considered model has been applied in treated models and non treated + ones, also an extend numerical simulation has been used to illustrate the + theoretical results.", "venue": "", "year": 2018, "referenceCount": 0, "citationCount": + 20, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-08-27", "journal": {"name": + "Nonlinear Studies", "pages": "665-687", "volume": "25"}, "authors": [{"authorId": + "102883860", "name": "Ismail Boudjema"}, {"authorId": "103679695", "name": + "S. Djilali"}]}, {"paperId": "d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", "externalIds": + {"DBLP": "journals/mcs/GambinoLS12", "MAG": "2169791857", "DOI": "10.1016/j.matcom.2011.11.004", + "CorpusId": 28553827}, "corpusId": 28553827, "publicationVenue": {"id": "9fb5b1b9-03d6-4b01-96db-b535900babb5", + "name": "Mathematics and Computers in Simulation", "type": "journal", "alternate_names": + ["Math Comput Simul"], "issn": "0378-4754", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505615/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/mathematics-and-computers-in-simulation", + "http://www.sciencedirect.com/science/journal/03784754"]}, "url": "https://www.semanticscholar.org/paper/d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", + "title": "Turing instability and traveling fronts for a nonlinear reaction-diffusion + system with cross-diffusion", "abstract": null, "venue": "Mathematics and + Computers in Simulation", "year": 2012, "referenceCount": 58, "citationCount": + 97, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-02-01", "journal": + {"name": "Math. Comput. Simul.", "pages": "1112-1132", "volume": "82"}, "authors": + [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", + "name": "M. Lombardo"}, {"authorId": "37823401", "name": "M. Sammartino"}]}, + {"paperId": "0d5887ed35de1dcc87209d80308d9d544bf219f3", "externalIds": {"MAG": + "1998405525", "DOI": "10.1017/S003181910002266X", "CorpusId": 170213798}, + "corpusId": 170213798, "publicationVenue": {"id": "0732b13e-cbda-4ffc-a7ff-e90e751a9875", + "name": "Philosophy", "type": "journal", "issn": "0031-8191", "url": "https://www.cambridge.org/core/journals/philosophy", + "alternate_urls": ["https://www.jstor.org/journal/philosophy", "http://journals.cambridge.org/action/displayJournal?jid=PHI"]}, + "url": "https://www.semanticscholar.org/paper/0d5887ed35de1dcc87209d80308d9d544bf219f3", + "title": "Can Machines Think?", "abstract": "Mr. A. M. Turing was quoted in + The Times about a year ago as saying it would be interesting to discover the + degree of intellectual activity of which a machine was capable and to what + extent it could think for itself. He has now pressed this suggestion further + and given the results of his researches in an article called \u201cComputing + Machines and Intelligence,\u201d together with a brief account of a \u201cchild-machine\u201d + which he has attempted to educate (Mind, October 1950). I intend to discuss + this article in some detail and examine his claim that \u201cmachines can + think.\u201d", "venue": "Philosophy", "year": 1952, "referenceCount": 13, + "citationCount": 98, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1952-04-01", + "journal": {"name": "Philosophy", "pages": "148 - 162", "volume": "27"}, "authors": + [{"authorId": "39189486", "name": "W. Mays"}]}, {"paperId": "924593de8fcaa79a335bbc02d2c2560c333ab5f3", + "externalIds": {"CorpusId": 203603015}, "corpusId": 203603015, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/924593de8fcaa79a335bbc02d2c2560c333ab5f3", + "title": "Efficacy of Plant Growth Regulators on Sex Expression , Earliness + and Yield Components in Bitter Gourd", "abstract": "RESEARCH ARTICLE Efficacy + of Plant Growth Regulators on Sex Expression, Earliness and Yield Components + in Bitter Gourd Muhammad Awais Ghani , Muhammad Amjad , Qumer Iqbal 2 , Aamir + Nawaz , Tanveer Ahmad 1 , Osama-Bin-Abdul Hafeez 1 and Mazhar Abbas 1 Ins + t i tute o f Hort icul tural Sciences, Universi ty of Agricul ture, Fa isalabad, + Pakistan Nuclear Inst i tute for Agr icul ture and Bio logy (NIAB), Fa isa + labad, Pakistan Department o f Hor t icul ture, Bahauddin Zakar iya Universi + ty, Multan, Pakis tan", "venue": "", "year": 2013, "referenceCount": 23, "citationCount": + 21, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Agricultural + And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "49773660", + "name": "M. A. Ghani"}, {"authorId": "144376348", "name": "M. Amjad"}, {"authorId": + "48048649", "name": "Q. Iqbal"}, {"authorId": "153879849", "name": "A. Nawaz"}, + {"authorId": "1391148082", "name": "Tanveer"}, {"authorId": "122243535", "name": + "Ahmad"}, {"authorId": "40860569", "name": "O. Hafeez"}, {"authorId": "2026253566", + "name": "M. Abbas"}]}, {"paperId": "faade5351ef9bc74a679b85646c08d98ecbbebc3", + "externalIds": {"DBLP": "journals/corr/abs-1102-1612", "MAG": "2962804872", + "ArXiv": "1102.1612", "DOI": "10.1142/S0129054112500153", "CorpusId": 17472882}, + "corpusId": 17472882, "publicationVenue": {"id": "0f60ff8e-f0b7-47a2-9927-2b94f9e44e82", + "name": "International Journal of Foundations of Computer Science", "type": + "journal", "alternate_names": ["Int J Found Comput Sci"], "issn": "0129-0541", + "url": "http://www.cs.ucsb.edu/~ijfcs/"}, "url": "https://www.semanticscholar.org/paper/faade5351ef9bc74a679b85646c08d98ecbbebc3", + "title": "The Physical Church-Turing Thesis and the Principles of Quantum + Theory", "abstract": "Notoriously, quantum computation shatters complexity + theory, but is innocuous to computability theory. Yet several works have shown + how quantum theory as it stands could breach the physical Church-Turing thesis. + We draw a clear line as to when this is the case, in a way that is inspired + by Gandy. Gandy formulates postulates about physics, such as homogeneity of + space and time, bounded density and velocity of information --- and proves + that the physical Church-Turing thesis is a consequence of these postulates. + We provide a quantum version of the theorem. Thus this approach exhibits a + formal non-trivial interplay between theoretical physics symmetries and computability + assumptions.", "venue": "International Journal of Foundations of Computer + Science", "year": 2011, "referenceCount": 37, "citationCount": 29, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1102.1612", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-02-08", "journal": + {"name": "Int. J. Found. Comput. Sci.", "pages": "1131-1146", "volume": "23"}, + "authors": [{"authorId": "3274098", "name": "P. Arrighi"}, {"authorId": "1733100", + "name": "Gilles Dowek"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", + "externalIds": {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", + "DOI": "10.1137/16M1097560", "CorpusId": 3849415}, "corpusId": 3849415, "publicationVenue": + {"id": "d35d93ad-8e2c-4482-a896-897ce5c326fa", "name": "SIAM Journal on Applied + Dynamical Systems", "type": "journal", "alternate_names": ["Siam Journal on + Applied Dynamical Systems", "Siam J Appl Dyn Syst", "SIAM J Appl Dyn Syst"], + "issn": "1536-0040", "url": "https://epubs.siam.org/journal/sjaday"}, "url": + "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", + "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near + Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize + into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter + to meter scales. The leading mathematical explanations for these phenomena + are the reaction-diffusion-advection model and the phase separation model. + This paper continues the series studies on analytically understanding the + existence of pattern solutions in the reaction-diffusion mussel-algae model. + The stability of the positive constant steady state and the existence of Hopf + and steady-state bifurcations are studied by analyzing the corresponding characteristic + equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain + the explicit dynamical classification in its neighborhood by calculating and + investigating the normal form on the center manifold. Using theoretical and + numerical simulations, we demonstrates that this TH interaction would significantly + enhance the diversity of spatial patterns and trigger the alternative paths + for the pattern development.", "venue": "SIAM Journal on Applied Dynamical + Systems", "year": 2017, "referenceCount": 65, "citationCount": 77, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", + "pages": "2030-2062", "volume": "16"}, "authors": [{"authorId": "1794550", + "name": "Yongli Song"}, {"authorId": "50090195", "name": "Heping Jiang"}, + {"authorId": "47362020", "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", + "name": "Yuan Yuan"}]}, {"paperId": "176bdc672e26e56b6e4ef8086fa7ee9af76f37b4", + "externalIds": {"DBLP": "journals/kybernetes/ShahW10", "MAG": "2036486516", + "DOI": "10.1108/03684921011036178", "CorpusId": 206377221}, "corpusId": 206377221, + "publicationVenue": {"id": "aa8f57e2-d5cf-4f0d-afcb-8577fb02e10a", "name": + "Kybernetes", "type": "journal", "issn": "0368-492X", "url": "https://www.emerald.com/insight/publication/issn/0368-492X", + "alternate_urls": ["http://www.emeraldinsight.com/0368-492X.htm", "http://www.emeraldinsight.com/loi/k"]}, + "url": "https://www.semanticscholar.org/paper/176bdc672e26e56b6e4ef8086fa7ee9af76f37b4", + "title": "Testing Turing''s five minutes, parallel-paired imitation game", + "abstract": "\u2013 The purpose of this paper is to consider Turing''s two + tests for machine intelligence: the parallel\u2010paired, three\u2010participants + game presented in his 1950 paper, and the \u201cjury\u2010service\u201d one\u2010to\u2010one + measure described two years later in a radio broadcast. Both versions were + instantiated in practical Turing tests during the 18th Loebner Prize for artificial + intelligence hosted at the University of Reading, UK, in October 2008. This + involved jury\u2010service tests in the preliminary phase and parallel\u2010paired + in the final phase., \u2013 Almost 100 test results from the final have been + evaluated and this paper reports some intriguing nuances which arose as a + result of the unique contest., \u2013 In the 2008 competition, Turing''s 30 + per cent pass rate is not achieved by any machine in the parallel\u2010paired + tests but Turing''s modified prediction: \u201cat least in a hundred years + time\u201d is remembered., \u2013 The paper presents actual responses from + \u201cmodern Elizas\u201d to human interrogators during contest dialogues + that show considerable improvement in artificial conversational entities (ACE). + Unlike their ancestor \u2013 Weizenbaum''s natural language understanding + system \u2013 ACE are now able to recall, share information and disclose personal + interests.", "venue": "Kybernetes", "year": 2010, "referenceCount": 26, "citationCount": + 25, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-05-22", "journal": {"name": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "pages": "\n 051914\n ", "volume": - "85 5 Pt 1"}, "authors": [{"authorId": "6566804", "name": "T. Woolley"}, {"authorId": - "35275545", "name": "R. Baker"}, {"authorId": "2662569", "name": "E. Gaffney"}, - {"authorId": "2339973", "name": "P. Maini"}, {"authorId": "1413907859", "name": - "S. Seirin-Lee"}]}, {"paperId": "645028677baa5db6a8928466a6e2e8f115eb75f6", - "externalIds": {"MAG": "1975245062", "DOI": "10.1103/PHYSREVE.68.056206", - "CorpusId": 26467659, "PubMed": "14682870"}, "url": "https://www.semanticscholar.org/paper/645028677baa5db6a8928466a6e2e8f115eb75f6", - "title": "Transverse instabilities in chemical Turing patterns of stripes.", - "abstract": "We present a theoretical and experimental study of the sideband - instabilities in Turing patterns of stripes. We compare numerical computations - of the Brusselator model with experiments in a chlorine dioxide-iodine-malonic - acid (CDIMA) reaction in a thin gel layer reactor in contact with a continuously - refreshed reservoir of reagents. Spontaneously evolving Turing structures - in both systems typically exhibit many defects that break the symmetry of - the pattern. Therefore, the study of sideband instabilities requires a method - of forcing perfect, spatially periodic Turing patterns with the desired wave - number. This is easily achieved in numerical simulations. In experiments, - the photosensitivity of the CDIMA reaction permits control and modulation - of Turing structures by periodic spatial illumination with a wave number outside - the stability region. When a too big wave number is imposed on the pattern, - the Eckhaus instability may arise, while for too small wave numbers an instability - sets in forming zigzags. By means of the amplitude equation formalism we show - that, close to the hexagon-stripe transitions, these sideband instabilities - may be preceded by an amplitude instability that grows transient spots locally - before reconnecting with stripes. This prediction is tested in both the reaction-diffusion - model and the experiment.", "venue": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "year": 2003, "referenceCount": 0, "citationCount": - 25, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-11-01", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 056206\n ", - "volume": "68 5 Pt 2"}, "authors": [{"authorId": "123477968", "name": "B. - Pe\u00f1a"}, {"authorId": "82361775", "name": "C. P\u00e9rez-Garc\u00eda"}, - {"authorId": "1403379734", "name": "A. Sanz-Anchelergues"}, {"authorId": "2701200", - "name": "D. G. M\u00edguez"}, {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}]}, - {"paperId": "6efc63fb726764e44f31c0fa84f4589a3445c683", "externalIds": {"MAG": - "2006973100", "DOI": "10.1177/039219215600401606", "CorpusId": 143527788}, - "url": "https://www.semanticscholar.org/paper/6efc63fb726764e44f31c0fa84f4589a3445c683", + "2010-05-04", "journal": {"name": "Kybernetes", "pages": "449-465", "volume": + "39"}, "authors": [{"authorId": "2731715", "name": "Huma Shah"}, {"authorId": + "143636026", "name": "K. Warwick"}]}, {"paperId": "6efc63fb726764e44f31c0fa84f4589a3445c683", + "externalIds": {"MAG": "2006973100", "DOI": "10.1177/039219215600401606", + "CorpusId": 143527788}, "corpusId": 143527788, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6efc63fb726764e44f31c0fa84f4589a3445c683", "title": "The Agrarian Revolution", "abstract": "ture.&dquo; Their attention had been focussed for a long while on the various Indian tribes as a favored field of investigation, and, more recently, on the inhabitants of large or @@ -29226,138 +33240,56 @@ interactions: the globe, his students brought back studies which led him to think that &dquo;peasant society and culture have a generic quality. This species of human organization has", "venue": "", "year": 1956, "referenceCount": 8, "citationCount": 97, - "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], - "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": - "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1956-12-01", "journal": {"name": "Diogenes", "pages": "103 - 93", "volume": - "4"}, "authors": [{"authorId": "104445010", "name": "H. Mendras"}, {"authorId": - "49978584", "name": "James H. Labadie"}]}, {"paperId": "3f95b6ff3fda46db7fae313f5412759b86da0341", - "externalIds": {"DBLP": "conf/isbi/HanHRASMFMN18", "MAG": "2806118840", "DOI": - "10.1109/ISBI.2018.8363678", "CorpusId": 43939347}, "url": "https://www.semanticscholar.org/paper/3f95b6ff3fda46db7fae313f5412759b86da0341", - "title": "GAN-based synthetic brain MR image generation", "abstract": "In - medical imaging, it remains a challenging and valuable goal how to generate - realistic medical images completely different from the original ones; the - obtained synthetic images would improve diagnostic reliability, allowing for - data augmentation in computer-assisted diagnosis as well as physician training. - In this paper, we focus on generating synthetic multi-sequence brain Magnetic - Resonance (MR) images using Generative Adversarial Networks (GANs). This involves - difficulties mainly due to low contrast MR images, strong consistency in brain - anatomy, and intra-sequence variability. Our novel realistic medical image - generation approach shows that GANs can generate 128 \u03c7 128 brain MR images - avoiding artifacts. In our preliminary validation, even an expert physician - was unable to accurately distinguish the synthetic images from the real samples - in the Visual Turing Test.", "venue": "IEEE International Symposium on Biomedical - Imaging", "year": 2018, "referenceCount": 22, "citationCount": 184, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2018-04-04", "journal": - {"name": "2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI - 2018)", "pages": "734-738"}, "authors": [{"authorId": "144188073", "name": - "Changhee Han"}, {"authorId": "1381961694", "name": "Hideaki Hayashi"}, {"authorId": - "2142430", "name": "L. Rundo"}, {"authorId": "1491176231", "name": "Ryosuke - Araki"}, {"authorId": "49359527", "name": "Wataru Shimoda"}, {"authorId": - "2072485867", "name": "Shinichi Muramatsu"}, {"authorId": "46213843", "name": - "Yujiro Furukawa"}, {"authorId": "1747770", "name": "G. Mauri"}, {"authorId": - "48731103", "name": "Hideki Nakayama"}]}, {"paperId": "3c76b0920972739f4314bf32296bdf833ab3c359", - "externalIds": {"MAG": "2569188228", "DOI": "10.1177/00034894800890S303", - "CorpusId": 79445329}, "url": "https://www.semanticscholar.org/paper/3c76b0920972739f4314bf32296bdf833ab3c359", - "title": "Report of the AD HOC Committee on Definition and Classification - of Otitis Media and Otitis Media with Effusion", "abstract": "To classify - and simplify the nomencla ture and to derive acceptable terminology for the - various facets of otitis media (OM) for the purpose of communica\u00ad tion. - In the past there has been a confusion of terms in par t because of a failure - to distinguish concep\u00ad tually between the disease process, otitis media, - and one of the manifestations of tha t disease process, namely otitis media - with effusion (OME). Otitis media is dynamic and at any one t ime should be - considered a single point in a cont inuum of the dis\u00ad ease process.", - "venue": "", "year": 1980, "referenceCount": 0, "citationCount": 98, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1980-05-01", "journal": {"name": "Annals of Otology, Rhinology & Laryngology", - "pages": "3 - 4", "volume": "89"}, "authors": [{"authorId": "15399054", "name": - "B. Senturia"}, {"authorId": "4187547", "name": "C. Bluestone"}, {"authorId": - "36383156", "name": "D. Lim"}, {"authorId": "2146461", "name": "J. Klein"}, - {"authorId": "5202629", "name": "J. Paradise"}]}, {"paperId": "fd916f6b9594cad310f3a602e4a22c07458fd9bb", - "externalIds": {"MAG": "2120893071", "DOI": "10.1001/ARCHPSYC.1966.01730120064008", - "CorpusId": 31742404, "PubMed": "5934871"}, "url": "https://www.semanticscholar.org/paper/fd916f6b9594cad310f3a602e4a22c07458fd9bb", - "title": "Oral, obsessive, and hysterical personality patterns. An investigation - of psychoanalytic concepts by means of factor analysis.", "abstract": "THIS - STUDY is an attempt to explore the empirical basis of three personality types - frequently discussed in the psychiatric litera ture\u2014oral, obsessive, - and hysterical. More specifically, the trait patterns which histori cally - have been said to characterize each of the three personality types will be - reex amined by means of factor analysis, and a self-rating form will be offered - as a measure of these personality types. * In order to understand the significance, - the limitations, and the theoretical framework of this research, we shall - first describe the content out of which it emerged, including a preliminary - experiment which partially failed. Our interest in personality arose from - our observations of the relationship between personality and symptom formation - in de pressed women. 19 We noted, for instance, that depressed women with - hysterical per sonalities differed from depressed women with obsessional personalities - in their pre hospital adjustment, in their patterns o depressive symptomatology, - in", "venue": "Archives of General Psychiatry", "year": 1966, "referenceCount": - 13, "citationCount": 179, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1966-06-01", "journal": {"name": "Archives - of general psychiatry", "pages": "\n 624-30\n ", "volume": - "14 6"}, "authors": [{"authorId": "46413903", "name": "A. Lazare"}, {"authorId": - "5456934", "name": "G. Klerman"}, {"authorId": "37135153", "name": "D. Armor"}]}, - {"paperId": "e4fa6e2441237a30dc830e7c5b4cc698251efe71", "externalIds": {"MAG": - "134244963", "DBLP": "conf/gecco/MasumCO02", "CorpusId": 17720081}, "url": - "https://www.semanticscholar.org/paper/e4fa6e2441237a30dc830e7c5b4cc698251efe71", - "title": "The Turing Ratio: Metrics For Open-ended Tasks", "abstract": "The - Turing Test is of limited use for programs falling far short of human performance - levels. We suggest an extension of Turing''s idea to a more differentiated - measure - the \"Turing Ratio\" - which provides a framework for comparing - both human and algorithmic task performance. Games provide an example of the - concepts. It is argued that evolutionary computation is a key method for amplifying - human intelligence, an assertion which future scientists can empirically decide - through measuring Turing Ratios and considering task breadth, prior knowledge, - and time series of the measures.", "venue": "Annual Conference on Genetic - and Evolutionary Computation", "year": 2002, "referenceCount": 19, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2002-07-09", - "journal": {"pages": "973-980"}, "authors": [{"authorId": "3043979", "name": - "H. Masum"}, {"authorId": "48239165", "name": "S. Christensen"}, {"authorId": - "1739161", "name": "F. Oppacher"}]}, {"paperId": "8f62c9f2521fbd7d774d384e8d023a91aaa7e016", - "externalIds": {"MAG": "2077895071", "DOI": "10.1177/002199838902300706", - "CorpusId": 135885637}, "url": "https://www.semanticscholar.org/paper/8f62c9f2521fbd7d774d384e8d023a91aaa7e016", - "title": "Application of the Paris Equation to the Fatigue Growth of Transverse - Ply Cracks", "abstract": "A model based on a stress intensity factor for a - growing transverse ply crack is outlined. The model is applied to experimental - observations of crack growth in a trans parent 0/90/0 glass fibre/epoxy laminate - under fatigue loading. The crack growth rate is found to be independent of - crack length but to depend on the spacing between cracks. Under static loading - and fatigue loading at high maximum stress, cracks grow by fast frac ture. - Slow crack growth is observed at lower maximum fatigue stresses and in the - later stages of fatigue tests at higher stresses when the crack spacing is - small. Crack growth rates can be described using a Paris relation.", "venue": - "", "year": 1989, "referenceCount": 46, "citationCount": 98, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1989-07-01", "journal": - {"name": "Journal of Composite Materials", "pages": "735 - 754", "volume": - "23"}, "authors": [{"authorId": "13224697", "name": "L. Boniface"}, {"authorId": - "113681260", "name": "S. Ogin"}]}, {"paperId": "2c361046974b39d48f70de8e82fba5256d3e49d1", + "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "History", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1956-12-01", "journal": {"name": + "Diogenes", "pages": "103 - 93", "volume": "4"}, "authors": [{"authorId": + "104445010", "name": "H. Mendras"}, {"authorId": "49978584", "name": "James + H. Labadie"}]}, {"paperId": "651fa9f3074356c61eb0b40d458b966182db1ebf", "externalIds": + {"DBLP": "conf/cefp/CsornyeiD07", "MAG": "1899927323", "DOI": "10.1007/978-3-540-88059-2_3", + "CorpusId": 591671}, "corpusId": 591671, "publicationVenue": {"id": "992c19c3-3afc-45e2-874b-44290f546860", + "name": "Central European Functional Programming School", "type": "conference", + "alternate_names": ["CEFP", "Central Eur Funct Program Sch"]}, "url": "https://www.semanticscholar.org/paper/651fa9f3074356c61eb0b40d458b966182db1ebf", + "title": "An Introduction to the Lambda Calculus", "abstract": null, "venue": + "Central European Functional Programming School", "year": 2008, "referenceCount": + 27, "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-06-01", "journal": {"pages": "87-111"}, "authors": + [{"authorId": "3145005", "name": "Z. Cs\u00f6rnyei"}, {"authorId": "3282665", + "name": "Gergely D\u00e9vai"}]}, {"paperId": "2c361046974b39d48f70de8e82fba5256d3e49d1", "externalIds": {"MAG": "621136948", "DOI": "10.1007/978-3-642-75262-9", "CorpusId": - 39450326}, "url": "https://www.semanticscholar.org/paper/2c361046974b39d48f70de8e82fba5256d3e49d1", + 39450326}, "corpusId": 39450326, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c361046974b39d48f70de8e82fba5256d3e49d1", "title": "Cell Culture Techniques in Heart and Vessel Research", "abstract": null, "venue": "Springer Berlin Heidelberg", "year": 1990, "referenceCount": 82, "citationCount": 183, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-642-75262-9%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "4333050", "name": "H. Piper"}]}, - {"paperId": "e9471b6dc4cdbd30ae72faee834498e50dc7d5e1", "externalIds": {"MAG": - "2133896855", "DOI": "10.1177/036354659302100606", "CorpusId": 19514647, "PubMed": - "8291628"}, "url": "https://www.semanticscholar.org/paper/e9471b6dc4cdbd30ae72faee834498e50dc7d5e1", + {"paperId": "d278c42ab24e014da4f991944dc55c11484e0d3a", "externalIds": {"MAG": + "1535681052", "DBLP": "books/sp/MollAK88", "DOI": "10.1007/978-1-4613-9595-9", + "CorpusId": 29304912}, "corpusId": 29304912, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d278c42ab24e014da4f991944dc55c11484e0d3a", + "title": "An Introduction to Formal Language Theory", "abstract": null, "venue": + "Texts and Monographs in Computer Science", "year": 1988, "referenceCount": + 13, "citationCount": 609, "influentialCitationCount": 51, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1988-08-08", "journal": {"pages": "i-x, 1-205"}, "authors": [{"authorId": + "35116937", "name": "R. Moll"}, {"authorId": "1795076", "name": "M. Arbib"}, + {"authorId": "2712330", "name": "A. Kfoury"}]}, {"paperId": "e9471b6dc4cdbd30ae72faee834498e50dc7d5e1", + "externalIds": {"MAG": "2133896855", "DOI": "10.1177/036354659302100606", + "CorpusId": 19514647, "PubMed": "8291628"}, "corpusId": 19514647, "publicationVenue": + {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", "name": "American Journal of + Sports Medicine", "type": "journal", "alternate_names": ["Am J Sport Med"], + "issn": "0363-5465", "url": "http://ajs.sagepub.com/", "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, + "url": "https://www.semanticscholar.org/paper/e9471b6dc4cdbd30ae72faee834498e50dc7d5e1", "title": "Operative versus nonoperative treatment of Achilles tendon rupture", "abstract": "One hundred eleven patients with acute rupture of the Achilles tendon were included in a prospective trial and randomly assigned to groups @@ -29374,43 +33306,18 @@ interactions: prospective study is that operative treatment of rup tured Achilles tendons is preferable, but nonoperative treatment is an acceptable alternative.", "venue": "American Journal of Sports Medicine", "year": 1993, "referenceCount": - 80, "citationCount": 576, "influentialCitationCount": 34, "isOpenAccess": - false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle", "Study", "ClinicalTrial"], - "publicationDate": "1993-11-01", "journal": {"name": "The American Journal - of Sports Medicine", "pages": "791 - 799", "volume": "21"}, "authors": [{"authorId": - "6756366", "name": "R. Cetti"}, {"authorId": "2121104827", "name": "Steen\u2010Erik - Christensen"}, {"authorId": "5975641", "name": "R. Ejsted"}, {"authorId": - "2121067922", "name": "Niels Melchior Jensen"}, {"authorId": "102455898", - "name": "U. J\u00f8rgensen"}]}, {"paperId": "1d484f4f0b99644c04c0c9b7a4d52432b0a5e68a", - "externalIds": {"MAG": "609648047", "DOI": "10.1007/978-3-642-81574-4", "CorpusId": - 92871057}, "url": "https://www.semanticscholar.org/paper/1d484f4f0b99644c04c0c9b7a4d52432b0a5e68a", - "title": "Point Defects in Semiconductors II", "abstract": null, "venue": - "", "year": 1981, "referenceCount": 0, "citationCount": 575, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "49041225", "name": "M. Lannoo"}, - {"authorId": "31079943", "name": "J. Bourgoin"}]}, {"paperId": "4f8ae5044a3e26ac80bb5aec9690c10e5373f23b", - "externalIds": {"MAG": "2066409459", "DOI": "10.1007/s11538-014-0036-6", "CorpusId": - 5859431, "PubMed": "25338554"}, "url": "https://www.semanticscholar.org/paper/4f8ae5044a3e26ac80bb5aec9690c10e5373f23b", - "title": "Vegetation Pattern Formation Due to Interactions Between Water Availability - and Toxicity in Plant\u2013Soil Feedback", "abstract": null, "venue": "Bulletin - of Mathematical Biology", "year": 2014, "referenceCount": 67, "citationCount": - 44, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Environmental Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Environmental - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-10-23", "journal": {"name": "Bulletin - of Mathematical Biology", "pages": "2866-2883", "volume": "76"}, "authors": - [{"authorId": "2634170", "name": "A. Marasco"}, {"authorId": "49260524", "name": - "Annalisa Iuorio"}, {"authorId": "4816942", "name": "Fabrizio Carteni"}, {"authorId": - "5716690", "name": "G. Bonanomi"}, {"authorId": "1739131", "name": "D. Tartakovsky"}, - {"authorId": "46472889", "name": "S. Mazzoleni"}, {"authorId": "2074336", - "name": "F. Giannino"}]}, {"paperId": "6e7247eee00b3879ab9011e2069b9a1b9d38ab12", - "externalIds": {"CorpusId": 18572079}, "url": "https://www.semanticscholar.org/paper/6e7247eee00b3879ab9011e2069b9a1b9d38ab12", + 80, "citationCount": 577, "influentialCitationCount": 34, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Medicine", + "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle", + "Study", "ClinicalTrial"], "publicationDate": "1993-11-01", "journal": {"name": + "The American Journal of Sports Medicine", "pages": "791 - 799", "volume": + "21"}, "authors": [{"authorId": "6756366", "name": "R. Cetti"}, {"authorId": + "2121104827", "name": "Steen\u2010Erik Christensen"}, {"authorId": "5975641", + "name": "R. Ejsted"}, {"authorId": "2121067922", "name": "Niels Melchior Jensen"}, + {"authorId": "102455898", "name": "U. J\u00f8rgensen"}]}, {"paperId": "6e7247eee00b3879ab9011e2069b9a1b9d38ab12", + "externalIds": {"CorpusId": 18572079}, "corpusId": 18572079, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6e7247eee00b3879ab9011e2069b9a1b9d38ab12", "title": "Alan Turing-father of Modern Computer Science Father of Modern Computer Science Universal Turing Machine", "abstract": "System administrators agree that pervasive theory are an interesting new topic in the field of theory, @@ -29418,56 +33325,43 @@ interactions: the improvement of journaling file systems. We describe a novel solution for the investigation of superblocks, which we call NyeTaborine.", "venue": "", "year": 2011, "referenceCount": 160, "citationCount": 5, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2079675747", - "name": "Alan Turing-Father"}]}, {"paperId": "5717e03a85130180ce8722e1b55db4d8bc76778a", - "externalIds": {"DBLP": "conf/stoc/Valiant01", "MAG": "2069149225", "DOI": - "10.1145/380752.380785", "CorpusId": 17054776}, "url": "https://www.semanticscholar.org/paper/5717e03a85130180ce8722e1b55db4d8bc76778a", - "title": "Quantum computers that can be simulated classically in polynomial - time", "abstract": "A model of quantum computation based on unitary matrix - operations was introduced by Feynman and Deutsch. It has been asked whether - the power of this model exceeds that of classical Turing machines. We show - here that a significant class of these quantum computations can be simulated - classically in polynomial time. In particular we show that two-bit operations - characterized by 4 \\times 4 matrices in which the sixteen entries obey a - set of five polynomial relations can be composed according to certain rules - to yield a class of circuits that can be simulated classically in polynomial - time. This contrasts with the known universality of two-bit operations, and - demonstrates that efficient quantum computation of restricted classes is reconcilable - with the Polynomial Time Turing Hypothesis. In other words it is possible - that quantum phenomena can be used in a scalable fashion to make computers - but that they do not have superpolynomial speedups compared to Turing machines - for any problem. The techniques introduced bring the quantum computational - model within the realm of algebraic complexity theory. In a manner consistent - will one view of quantum physics, the wave function is simulated deterministically, - and randomization arises only in the course of making measurements. The results - generalize the quantum model in that they do not require the matrices to be - unitary. In a different direction these techniques also yield deterministic - polynomial time algorithms for the decision and parity problems for certain - classes of read-twice Boolean formulae. All our results are based on the use - of gates that are defined in terms of their graph matching properties.", "venue": - "Symposium on the Theory of Computing", "year": 2001, "referenceCount": 41, - "citationCount": 59, "influentialCitationCount": 6, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2079675747", + "name": "Alan Turing-Father"}]}, {"paperId": "980a8e6526ba15cad1786a89c2d33af60b47f07b", + "externalIds": {"MAG": "1993460291", "DOI": "10.1177/105960118601100305", + "CorpusId": 144168745}, "corpusId": 144168745, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/980a8e6526ba15cad1786a89c2d33af60b47f07b", + "title": "The Effects of Group Cohesion and Leader Behavior on Subordinate + Satisfaction", "abstract": "The present study examined the effects of group + cohesiveness and leader behavior on subordinate satisfaction in a military + organiza tion. A total of 203 cadets completed measures of group cohesiveness, + leader initiating structure, leader consideration, and several satisfac tion + scales. Analyses indicated that (1) subordinates were more satisfied with + leaders who exhibited high levels of initiating struc ture and consideration; + (2) subordinates in high-cohesiveness groups were more satisfied than subordinates + in low-cohesiveness groups; and (3) leader initiating structure and consideration + were more positively related to subordinate satisfaction in high-cohesiveness + groups than in low-cohesiveness groups. The results demonstrate the necessity + of including group process variables in leadership theory and research. Implications + of the findings forgroup effectiveness are also discussed.", "venue": "", + "year": 1986, "referenceCount": 31, "citationCount": 181, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-07-06", "journal": {"pages": "114-123"}, "authors": [{"authorId": "1741124", - "name": "L. Valiant"}]}, {"paperId": "660b38b1f340ea0d317294289ef14afbc98acda1", - "externalIds": {"MAG": "2041342850", "DOI": "10.1016/j.tig.2014.11.005", "CorpusId": - 28057065, "PubMed": "25544713"}, "url": "https://www.semanticscholar.org/paper/660b38b1f340ea0d317294289ef14afbc98acda1", - "title": "Is pigment patterning in fish skin determined by the Turing mechanism?", - "abstract": null, "venue": "Trends in Genetics", "year": 2015, "referenceCount": - 64, "citationCount": 96, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2015-02-01", "journal": {"name": "Trends - in genetics : TIG", "pages": "\n 88-96\n ", "volume": "31 - 2"}, "authors": [{"authorId": "2894944", "name": "Masakatsu Watanabe"}, {"authorId": - "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "2303f84a09f0b9617dc661bf820f99e9efe43335", - "externalIds": {"MAG": "1757600360", "DBLP": "journals/ijbc/ShiRSZ15", "DOI": - "10.1142/S0218127415300141", "CorpusId": 18095498}, "url": "https://www.semanticscholar.org/paper/2303f84a09f0b9617dc661bf820f99e9efe43335", + "1986-12-01", "journal": {"name": "Group & Organization Management", "pages": + "203 - 219", "volume": "11"}, "authors": [{"authorId": "98335162", "name": + "G. Dobbins"}, {"authorId": "2040464", "name": "S. Zaccaro"}]}, {"paperId": + "2303f84a09f0b9617dc661bf820f99e9efe43335", "externalIds": {"MAG": "1757600360", + "DBLP": "journals/ijbc/ShiRSZ15", "DOI": "10.1142/S0218127415300141", "CorpusId": + 18095498}, "corpusId": 18095498, "publicationVenue": {"id": "f3358047-5fa1-4315-9473-4bb4c19cb756", + "name": "International Journal of Bifurcation and Chaos in Applied Sciences + and Engineering", "type": "journal", "alternate_names": ["Int J Bifurc Chaos", + "Int J Bifurc Chaos Appl Sci Eng", "International Journal of Bifurcation and + Chaos"], "issn": "0218-1274", "url": "http://www.worldscinet.com/ijbc/ijbc.shtml", + "alternate_urls": ["http://www.worldscinet.com/ijbc/mkt/archive.shtml"]}, + "url": "https://www.semanticscholar.org/paper/2303f84a09f0b9617dc661bf820f99e9efe43335", "title": "Spatiotemporal Dynamics of a Diffusive Leslie-Gower Predator-Prey Model with Ratio-Dependent Functional Response", "abstract": "This paper is devoted to the study of spatiotemporal dynamics of a diffusive Leslie\u2013Gower @@ -29480,92 +33374,292 @@ interactions: Various numerical simulations are also presented to illustrate the theoretical results.", "venue": "International Journal of Bifurcation and Chaos in Applied Sciences and Engineering", "year": 2015, "referenceCount": 57, "citationCount": - 22, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + 22, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-05-21", "journal": + {"name": "Int. J. Bifurc. Chaos", "pages": "1530014:1-1530014:16", "volume": + "25"}, "authors": [{"authorId": "48626765", "name": "Hongbo Shi"}, {"authorId": + "145809344", "name": "S. Ruan"}, {"authorId": "102831968", "name": "Ying-Chin + Su"}, {"authorId": "2108230587", "name": "Jia-Fang Zhang"}]}, {"paperId": + "c363fde2695be2413a18c3b070947a73e99c926e", "externalIds": {"MAG": "2189001997", + "CorpusId": 138647257}, "corpusId": 138647257, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c363fde2695be2413a18c3b070947a73e99c926e", + "title": "A Critical Evaluation of Indentation Techniques for Measuring Fracture + Toughness: I, Direct Crack Measurements", "abstract": "The application of + indentation techniques to the evaluation of fracture toughness is examined + critically, in two parts. In this flrst part, attention is focused on an approach + which involves direct measurement of Vickers-produced radial cracks as a function + of indentation load. A theoretical basis for the method is first established, + in terms of elasticlplastic indentation frac- ture mechanics. It is thereby + asserted that the key to the radial crack response lies In the residual component + of the contact fkld. This residual term has important implications concerning + the crack evolution, including the possibility of postindentation slow growth + under environment-sensitive conditions. Frac- tographic observations of cracks + in selected \"reference\" mater- Ys are used to determine the magnitude of + this effect and to investigate other potential complications associated with + de- partures from ideal indentation fracture behavior. The data from these + observations provide a convenient calibration of the indentation toughness + equations for general application to other well-behaved ceramics. The technique + is uniquely hpie in procedure and economic in its use of material.", "venue": + "", "year": 1981, "referenceCount": 12, "citationCount": 600, "influentialCitationCount": + 29, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "40764774", "name": "R. Garvie"}, + {"authorId": "152867287", "name": "R. Hannink"}, {"authorId": "91477243", + "name": "R. Hughan"}, {"authorId": "40757117", "name": "N. A. Mckinnon"}, + {"authorId": "40758202", "name": "R. T. Pascoe"}, {"authorId": "112974371", + "name": "R. K. Shinger"}, {"authorId": "2082672758", "name": "D. Porter"}, + {"authorId": "47454742", "name": "A. Heuer"}]}, {"paperId": "3c76b0920972739f4314bf32296bdf833ab3c359", + "externalIds": {"MAG": "2569188228", "DOI": "10.1177/00034894800890S303", + "CorpusId": 79445329}, "corpusId": 79445329, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3c76b0920972739f4314bf32296bdf833ab3c359", + "title": "Report of the AD HOC Committee on Definition and Classification + of Otitis Media and Otitis Media with Effusion", "abstract": "To classify + and simplify the nomencla ture and to derive acceptable terminology for the + various facets of otitis media (OM) for the purpose of communica\u00ad tion. + In the past there has been a confusion of terms in par t because of a failure + to distinguish concep\u00ad tually between the disease process, otitis media, + and one of the manifestations of tha t disease process, namely otitis media + with effusion (OME). Otitis media is dynamic and at any one t ime should be + considered a single point in a cont inuum of the dis\u00ad ease process.", + "venue": "", "year": 1980, "referenceCount": 0, "citationCount": 98, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1980-05-01", "journal": {"name": "Annals of Otology, Rhinology + & Laryngology", "pages": "3 - 4", "volume": "89"}, "authors": [{"authorId": + "15399054", "name": "B. Senturia"}, {"authorId": "4187547", "name": "C. Bluestone"}, + {"authorId": "36383156", "name": "D. Lim"}, {"authorId": "2146461", "name": + "J. Klein"}, {"authorId": "5202629", "name": "J. Paradise"}]}, {"paperId": + "8f62c9f2521fbd7d774d384e8d023a91aaa7e016", "externalIds": {"MAG": "2077895071", + "DOI": "10.1177/002199838902300706", "CorpusId": 135885637}, "corpusId": 135885637, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8f62c9f2521fbd7d774d384e8d023a91aaa7e016", + "title": "Application of the Paris Equation to the Fatigue Growth of Transverse + Ply Cracks", "abstract": "A model based on a stress intensity factor for a + growing transverse ply crack is outlined. The model is applied to experimental + observations of crack growth in a trans parent 0/90/0 glass fibre/epoxy laminate + under fatigue loading. The crack growth rate is found to be independent of + crack length but to depend on the spacing between cracks. Under static loading + and fatigue loading at high maximum stress, cracks grow by fast frac ture. + Slow crack growth is observed at lower maximum fatigue stresses and in the + later stages of fatigue tests at higher stresses when the crack spacing is + small. Crack growth rates can be described using a Paris relation.", "venue": + "", "year": 1989, "referenceCount": 46, "citationCount": 98, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1989-07-01", "journal": {"name": "Journal of Composite + Materials", "pages": "735 - 754", "volume": "23"}, "authors": [{"authorId": + "13224697", "name": "L. Boniface"}, {"authorId": "113681260", "name": "S. + Ogin"}]}, {"paperId": "36fe7eb106a83887eae8fac2a99cc9bc0e03a847", "externalIds": + {"MAG": "2174928349", "DBLP": "conf/er/WegnerG97", "DOI": "10.1007/3-540-48854-5_19", + "CorpusId": 5886573}, "corpusId": 5886573, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/36fe7eb106a83887eae8fac2a99cc9bc0e03a847", + "title": "Interaction as a Framework for Modeling", "abstract": null, "venue": + "Conceptual Modeling", "year": 1997, "referenceCount": 32, "citationCount": + 67, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": null, "journal": {"pages": "243-257"}, "authors": [{"authorId": + "2103444", "name": "P. Wegner"}, {"authorId": "27353259", "name": "Dina Q. + Goldin"}]}, {"paperId": "e4fa6e2441237a30dc830e7c5b4cc698251efe71", "externalIds": + {"MAG": "134244963", "DBLP": "conf/gecco/MasumCO02", "CorpusId": 17720081}, + "corpusId": 17720081, "publicationVenue": {"id": "d732841e-83f9-49ec-95ca-389e5568634b", + "name": "Annual Conference on Genetic and Evolutionary Computation", "type": + "conference", "alternate_names": ["GECCO", "Annu Conf Genet Evol Comput", + "Genet Evol Comput Conf", "Genetic and Evolutionary Computation Conference"], + "url": "http://www.sigevo.org/"}, "url": "https://www.semanticscholar.org/paper/e4fa6e2441237a30dc830e7c5b4cc698251efe71", + "title": "The Turing Ratio: Metrics For Open-ended Tasks", "abstract": "The + Turing Test is of limited use for programs falling far short of human performance + levels. We suggest an extension of Turing''s idea to a more differentiated + measure - the \"Turing Ratio\" - which provides a framework for comparing + both human and algorithmic task performance. Games provide an example of the + concepts. It is argued that evolutionary computation is a key method for amplifying + human intelligence, an assertion which future scientists can empirically decide + through measuring Turing Ratios and considering task breadth, prior knowledge, + and time series of the measures.", "venue": "Annual Conference on Genetic + and Evolutionary Computation", "year": 2002, "referenceCount": 19, "citationCount": + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2002-07-09", "journal": {"pages": "973-980"}, "authors": + [{"authorId": "3043979", "name": "H. Masum"}, {"authorId": "48239165", "name": + "S. Christensen"}, {"authorId": "1739161", "name": "F. Oppacher"}]}, {"paperId": + "f8c923b8b1ff157301693ce2ed69dd116adcb87b", "externalIds": {"MAG": "2069807504", + "DOI": "10.1177/002199838902300601", "CorpusId": 136801767}, "corpusId": 136801767, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f8c923b8b1ff157301693ce2ed69dd116adcb87b", + "title": "Buckling of Laminated Plates with Holes", "abstract": "This paper + deals with buckling analysis of rectangular composite laminates with circular + holes under inplane static loadings. The first-order shear deformation theory + and the variational energy method are employed in mathematical formulation, + and the nine-node Lagrangian finite element method is used for finding critical + loads. The effects on critical load by hole size, plate thickness ratio, material + modulus ratio, ply lamination geometry, loading types, and boundary conditions + are investigated. Numerical solutions are shown in graphical form where some + comparisons are made with those of given litera tures.", "venue": "", "year": + 1989, "referenceCount": 14, "citationCount": 95, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1989-06-01", "journal": {"name": "Journal + of Composite Materials", "pages": "536 - 553", "volume": "23"}, "authors": + [{"authorId": "1847198", "name": "Chien-chang Lin"}, {"authorId": "117091623", + "name": "Ching-Suong Kuo"}]}, {"paperId": "bdb961c14e9104f97f4d7145ee7c87dc458ca3ee", + "externalIds": {"MAG": "2110496051", "DOI": "10.1146/ANNUREV.NE.18.030195.002125", + "CorpusId": 35738505, "PubMed": "7605067"}, "corpusId": 35738505, "publicationVenue": + {"id": "d9caa671-3be6-48bc-9710-f96334848b4c", "name": "Annual Review of Neuroscience", + "type": "journal", "alternate_names": ["Annu Rev Neurosci"], "issn": "0147-006X", + "url": "https://www.annualreviews.org/journal/neuro", "alternate_urls": ["http://arjournals.annualreviews.org/loi/neuro", + "https://www.annualreviews.org/loi/neuro"]}, "url": "https://www.semanticscholar.org/paper/bdb961c14e9104f97f4d7145ee7c87dc458ca3ee", + "title": "Mechanisms of neural patterning and specification in the developing + cerebellum.", "abstract": "The cerebellar cortex is one of the best-studied + regions of the CNS. For nearly a century, all of the cerebellar cell types + and the patterns of their synaptic connections have been known. Much of this + wealth of information comes from Ramon y Cajal''s work (1889, 1911, 1960) + with Golgi studies. Further infor\u00ad mation on the development (Altman + & Bayer 1985a-c, Rakic 1971, Miale & Sidman 1961), anatomy (Palay & Chan-Palay + 1974), fiber tracts (BrodaI1981), and circuitry (Llinas & Hillman 1969) of + the cerebellar cortex has emerged over the past several decades. The cerebellum + provides a unique system for studying CNS development, combining the three + classic patterns of CNS development-morphogenetic movements, the formation + of ganglionic struc\u00ad tures, and the establishment of neuronal layers-within + one brain region. Remarkably simple in its basic plan, the adult cerebellar + cortex contains only three layers and two principal classes of neurons. The + abundance of one of these principal neurons, the granule cell, has enabled + detailed analyses of the molecular mechanisms that underlie the basic steps + in neuronal differentiation and has pointed out the role of local community + factors in CNS neuronal development. Moreover, studies of naturally occurring + mutations (Heintz et al 1993, Sidman 1968) and of targeted gene disruptions + that block discrete steps in the development of this region (McMahon 1993, + Joyner & Hanks 1991,", "venue": "Annual Review of Neuroscience", "year": 1995, + "referenceCount": 39, "citationCount": 557, "influentialCitationCount": 26, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + null, "journal": {"name": "Annual review of neuroscience", "pages": "\n 385-408\n ", + "volume": "18"}, "authors": [{"authorId": "5495393", "name": "M. Hatten"}, + {"authorId": "26123312", "name": "N. Heintz"}]}, {"paperId": "6e463cb9776b6864570005b742bc963519b7ff6d", + "externalIds": {"DBLP": "conf/uss/KruppR18", "MAG": "2888928288", "CorpusId": + 51751804}, "corpusId": 51751804, "publicationVenue": {"id": "54649c1d-6bcc-4232-9cd1-aa446867b8d0", + "name": "USENIX Security Symposium", "type": "conference", "alternate_names": + ["USENIX Secur Symp"], "url": "http://www.usenix.org/events/bytopic/security.html"}, + "url": "https://www.semanticscholar.org/paper/6e463cb9776b6864570005b742bc963519b7ff6d", + "title": "teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts", + "abstract": "Cryptocurrencies like Bitcoin not only provide a decentralized + currency, but also provide a programmatic way to process transactions. Ethereum, + the second largest cryptocurrency next to Bitcoin, is the first to provide + a Turing-complete language to specify transaction processing, thereby enabling + so-called smart contracts. This provides an opportune setting for attackers, + as security vulnerabilities are tightly intertwined with financial gain. In + this paper, we consider the problem of automatic vulnerability identification + and exploit generation for smart contracts. We develop a generic definition + of vulnerable contracts and use this to build TEE THER, a tool that allows + creating an exploit for a contract given only its binary bytecode. We perform + a large-scale analysis of all 38,757 unique Ethereum contracts, 815 out of + which our tool finds working exploits for\u2014completely automated.", "venue": + "USENIX Security Symposium", "year": 2018, "referenceCount": 20, "citationCount": + 180, "influentialCitationCount": 22, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-08-01", "journal": + {"pages": "1317-1333"}, "authors": [{"authorId": "47635635", "name": "Johannes + Krupp"}, {"authorId": "1701081", "name": "C. Rossow"}]}, {"paperId": "23256db39c367f251b3dcff1f10aa081732bb9d2", + "externalIds": {"MAG": "2037793987", "DOI": "10.1073/PNAS.77.7.4180", "CorpusId": + 15966603, "PubMed": "6933464"}, "corpusId": 15966603, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/23256db39c367f251b3dcff1f10aa081732bb9d2", + "title": "Scale-invariance in reaction-diffusion models of spatial pattern + formation.", "abstract": "We propose a reaction-diffusion model of spatial + pattern formation whose solutions can exhibit scale-invariance over any desired + range for suitable choices of parameters in the model. The model does not + invoke preset polarity or any other ad hoc distinction between cells and provides + a solution to the French flag problem without sources at the boundary. Furthermore, + patterns other than the polar pattern that usually arises first in a growing + one-dimensional system described by Turing''s model can be obtained. Evidence + is given that suggests that the model may apply in the slug stage of Dictyostelium + discoideum.", "venue": "Proceedings of the National Academy of Sciences of + the United States of America", "year": 1980, "referenceCount": 13, "citationCount": + 96, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://europepmc.org/articles/pmc349794?pdf=render", "status": "GREEN"}, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-05-21", "journal": {"name": "Int. - J. Bifurc. Chaos", "pages": "1530014:1-1530014:16", "volume": "25"}, "authors": - [{"authorId": "48626765", "name": "Hongbo Shi"}, {"authorId": "145809344", - "name": "S. Ruan"}, {"authorId": "102831968", "name": "Ying-Chin Su"}, {"authorId": - "2108230587", "name": "Jiafang Zhang"}]}, {"paperId": "c072eef2dfb3d9c5339ac3e767120cd691f2ab55", - "externalIds": {"CorpusId": 6300232}, "url": "https://www.semanticscholar.org/paper/c072eef2dfb3d9c5339ac3e767120cd691f2ab55", - "title": "Security Threats in Wireless Sensor Networks", "abstract": "Wireless - Sensor Network (WSN) is an emerging technology that shows great promise for - various futuristic applications both for mass public and military. The sensing - technology combined with processing power and wireless communication makes - it lucrative for being exploited in abundance in fu ture. Wireless sensor - networks are characterized by severely constrained computational and energy - resources, and an ad hoc operational environment. Wireless sensor networks - (WSN) are currently receiving significant attention due to their unlimi ted - potential. However, it is still very early in the l ifetime of such systems - and many research challenges exist. This paper studies the security aspects - of these networks.", "venue": "", "year": 2011, "referenceCount": 10, "citationCount": - 96, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "77871669", "name": "Sushma"}, {"authorId": "66123813", "name": - "D. Nandal"}, {"authorId": "27681450", "name": "V. Nandal"}]}, {"paperId": - "58298f9c4e64e29a1c00d70d34c1909fc1a899d3", "externalIds": {"CorpusId": 2013422}, - "url": "https://www.semanticscholar.org/paper/58298f9c4e64e29a1c00d70d34c1909fc1a899d3", - "title": "On Computable Numbers. . . Proc Universal Turing Machine", "abstract": - "The networking approach to the producer-consumer problem is defined not only - by the development of object-oriented languages, but also by the intuitive - need for Markov models. In fact, few statisticians would disagree with the - synthesis of simulated anneal-ing. We argue that despite the fact that the - little-known collaborative algorithm for the development of systems by Zhou - et al. follows a Zipf-like distribution, spreadsheets and voice-over-IP can - agree to achieve this objective.", "venue": "", "year": null, "referenceCount": - 143, "citationCount": 24, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": []}, {"paperId": "6d243e465af98130b2a82b2bf7293f6bb8f912b2", - "externalIds": {"MAG": "2039471684", "DOI": "10.1140/EPJB/E2013-30649-7", - "CorpusId": 121119740}, "url": "https://www.semanticscholar.org/paper/6d243e465af98130b2a82b2bf7293f6bb8f912b2", - "title": "Turing instabilities in reaction-diffusion systems with cross diffusion", - "abstract": null, "venue": "", "year": 2013, "referenceCount": 27, "citationCount": - 33, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2013-04-10", "journal": {"name": "The European Physical - Journal B", "pages": "1-8", "volume": "86"}, "authors": [{"authorId": "2334449", - "name": "D. Fanelli"}, {"authorId": "46848249", "name": "C. Cianci"}, {"authorId": - "39866244", "name": "F. Patti"}]}, {"paperId": "7230b852eefeebde2646c51b1adb947420b3dd95", - "externalIds": {"MAG": "2007275880", "DOI": "10.1103/PHYSREVLETT.99.104503", - "CorpusId": 25053415, "PubMed": "17930391"}, "url": "https://www.semanticscholar.org/paper/7230b852eefeebde2646c51b1adb947420b3dd95", - "title": "Proposed resolution of theory-experiment discrepancy in homoclinic - snaking.", "abstract": "In spatially extended Turing-unstable systems, parameter - variation should, in theory, produce only fully developed patterns. In experiment, - however, localized patterns or solitons sitting on a smooth background often - appear. Addition of a nonlocal nonlinearity can resolve this discrepancy by - tilting the \"snaking\" bifurcation diagram characteristic of such problems.", - "venue": "Physical Review Letters", "year": 2007, "referenceCount": 0, "citationCount": - 50, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2007-09-07", "journal": {"name": "Physical review letters", - "pages": "\n 104503\n ", "volume": "99 10"}, "authors": [{"authorId": - "3037949", "name": "W. Firth"}, {"authorId": "2088949264", "name": "L. Columbo"}, - {"authorId": "49845189", "name": "A. Scroggie"}]}, {"paperId": "866d35b6556c77a5aebda8492159d26800d2b97b", - "externalIds": {"DBLP": "conf/focs/RubyF65", "MAG": "2000552003", "DOI": "10.1109/FOCS.1965.33", - "CorpusId": 43124679}, "url": "https://www.semanticscholar.org/paper/866d35b6556c77a5aebda8492159d26800d2b97b", - "title": "Translational methods and computational complexity", "abstract": - "This paper investigates the computational complexity of binary sequences - as measured by the rapidity of their generation by multitape Turing machines. - A \"translational\" method which escapes some of the limitations of earlier - approaches leads to a refinement of the established hierarchy. The previous - complexity classes are shown to possess certain translational properties. - An related hierarchy of complexity classes of monotonic functions is examined", - "venue": "SWCT", "year": 1965, "referenceCount": 2, "citationCount": 50, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1965-10-06", "journal": {"pages": "173-178"}, "authors": - [{"authorId": "49672003", "name": "S. Ruby"}, {"authorId": "1691253", "name": - "P. C. Fischer"}]}, {"paperId": "a88316ec8a628f503d5ff3b1f14b14dff0364acb", + ["JournalArticle"], "publicationDate": "1980-07-01", "journal": {"name": "Proceedings + of the National Academy of Sciences of the United States of America", "pages": + "\n 4180-4\n ", "volume": "77 7"}, "authors": [{"authorId": + "2892576", "name": "H. Othmer"}, {"authorId": "7208823", "name": "E. Pate"}]}, + {"paperId": "6995e92c9c4d644650b73e49b681c09d89875170", "externalIds": {"MAG": + "2512667052", "DOI": "10.1103/PHYSREVE.48.183", "CorpusId": 12130576, "PubMed": + "9960580"}, "corpusId": 12130576, "publicationVenue": {"id": "f7dc890d-13a2-4e06-9f76-95c9fd4f8def", + "name": "Physical review. E, Statistical physics, plasmas, fluids, and related + interdisciplinary topics", "alternate_names": ["Phys rev Stat phys plasma + fluid relat interdiscip top"], "issn": "1063-651X", "alternate_issns": ["1095-3787"], + "url": "http://ejournals.ebsco.com/direct.asp?JournalID=101127", "alternate_urls": + ["https://journals.aps.org/pre/", "http://pre.aps.org/", "http://prola.aps.org/"]}, + "url": "https://www.semanticscholar.org/paper/6995e92c9c4d644650b73e49b681c09d89875170", + "title": "Necessary condition of the Turing instability.", "abstract": "A + reaction-diffusion system in any number of spatial variables consisting of + an arbitrary number of chemical species cannot exhibit Turing instability + if none of the reaction steps expresses cross inhibition. A corollary of this + result underlines the importance of nonlinearity in the formation of stationary + spatial structures, a kind of self-organization on a chemical basis.", "venue": + "Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary + topics", "year": 1993, "referenceCount": 0, "citationCount": 23, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": + "external"}, {"category": "Mathematics", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1993-07-01", "journal": + {"name": "Physical review. E, Statistical physics, plasmas, fluids, and related + interdisciplinary topics", "pages": "\n 183-186\n ", "volume": + "48 1"}, "authors": [{"authorId": "123802457", "name": "Szili"}, {"authorId": + "2071050254", "name": "T\u00f3th"}]}, {"paperId": "a09e7f459453d55ee3c8b4f4869140e96b09df7c", + "externalIds": {"MAG": "2138506029", "DOI": "10.1098/rsta.2011.0325", "CorpusId": + 14237229, "PubMed": "22711872"}, "corpusId": 14237229, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a09e7f459453d55ee3c8b4f4869140e96b09df7c", + "title": "Turing''s three philosophical lessons and the philosophy of information", + "abstract": "In this article, I outline the three main philosophical lessons + that we may learn from Turing''s work, and how they lead to a new philosophy + of information. After a brief introduction, I discuss his work on the method + of levels of abstraction (LoA), and his insistence that questions could be + meaningfully asked only by specifying the correct LoA. I then look at his + second lesson, about the sort of philosophical questions that seem to be most + pressing today. Finally, I focus on the third lesson, concerning the new philosophical + anthropology that owes so much to Turing''s work. I then show how the lessons + are learned by the philosophy of information. In the conclusion, I draw a + general synthesis of the points made, in view of the development of the philosophy + of information itself as a continuation of Turing''s work.", "venue": "Philosophical + Transactions of the Royal Society A: Mathematical, Physical and Engineering + Sciences", "year": 2012, "referenceCount": 26, "citationCount": 24, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsta.2011.0325", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-07-28", "journal": + {"name": "Philosophical Transactions of the Royal Society A: Mathematical, + Physical and Engineering Sciences", "pages": "3536 - 3542", "volume": "370"}, + "authors": [{"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "a88316ec8a628f503d5ff3b1f14b14dff0364acb", "externalIds": {"MAG": "2079046541", "DOI": "10.1073/PNAS.47.3.390", "CorpusId": - 38627925, "PubMed": "13725829"}, "url": "https://www.semanticscholar.org/paper/a88316ec8a628f503d5ff3b1f14b14dff0364acb", + 38627925, "PubMed": "13725829"}, "corpusId": 38627925, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/a88316ec8a628f503d5ff3b1f14b14dff0364acb", "title": "Asexual transmission of cytoplasmic male sterility.", "abstract": "phan, but higher concentrations are needed than is the case with the other accumulated products. Its appearance coincides with the loss or repression @@ -29574,7 +33668,8 @@ interactions: not interfere with scoring or the identification of strains.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 1961, "referenceCount": 3, "citationCount": 51, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc221590?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1961-03-15", "journal": {"name": "Proceedings @@ -29583,7 +33678,7 @@ interactions: "name": "J. Edwardson"}, {"authorId": "50221868", "name": "M. Corbett"}]}, {"paperId": "51af06eb31d5baf3e83642108824579dc605cf67", "externalIds": {"MAG": "2130625269", "DOI": "10.1002/anie.201205347", "CorpusId": 2139221, "PubMed": - "22987306"}, "url": "https://www.semanticscholar.org/paper/51af06eb31d5baf3e83642108824579dc605cf67", + "22987306"}, "corpusId": 2139221, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/51af06eb31d5baf3e83642108824579dc605cf67", "title": "Parallel imaging and template-free patterning of self-assembled monolayers with soft linear microelectrode arrays.", "abstract": "Thenecessityofleveling samples relative to the horizontal (x,y) plane of thepositioning system adds @@ -29593,242 +33688,64 @@ interactions: obstacles. These probes wereintroduced earlier for the imaging of metal-on-glass struc-tures,humanfingerprints,andenzymeactivity.", "venue": "Angewandte Chemie", "year": 2012, "referenceCount": 39, "citationCount": 51, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Materials Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-10-08", "journal": {"name": "Angewandte Chemie", "pages": "\n 10413-6\n ", - "volume": "51 41"}, "authors": [{"authorId": "3835697", "name": "A. Lesch"}, - {"authorId": "117405451", "name": "Britta Vaske"}, {"authorId": "145350880", - "name": "F. Meiners"}, {"authorId": "6925237", "name": "Dmitry Momotenko"}, - {"authorId": "1402989162", "name": "F. Cort\u00e9s-Salazar"}, {"authorId": - "3984754", "name": "H. Girault"}, {"authorId": "145436724", "name": "G. Wittstock"}]}, - {"paperId": "23256db39c367f251b3dcff1f10aa081732bb9d2", "externalIds": {"MAG": - "2037793987", "DOI": "10.1073/PNAS.77.7.4180", "CorpusId": 15966603, "PubMed": - "6933464"}, "url": "https://www.semanticscholar.org/paper/23256db39c367f251b3dcff1f10aa081732bb9d2", - "title": "Scale-invariance in reaction-diffusion models of spatial pattern - formation.", "abstract": "We propose a reaction-diffusion model of spatial - pattern formation whose solutions can exhibit scale-invariance over any desired - range for suitable choices of parameters in the model. The model does not - invoke preset polarity or any other ad hoc distinction between cells and provides - a solution to the French flag problem without sources at the boundary. Furthermore, - patterns other than the polar pattern that usually arises first in a growing - one-dimensional system described by Turing''s model can be obtained. Evidence - is given that suggests that the model may apply in the slug stage of Dictyostelium - discoideum.", "venue": "Proceedings of the National Academy of Sciences of - the United States of America", "year": 1980, "referenceCount": 13, "citationCount": - 95, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1980-07-01", "journal": {"name": "Proceedings of the National - Academy of Sciences of the United States of America", "pages": "\n 4180-4\n ", - "volume": "77 7"}, "authors": [{"authorId": "2892576", "name": "H. Othmer"}, - {"authorId": "7208823", "name": "E. Pate"}]}, {"paperId": "980a8e6526ba15cad1786a89c2d33af60b47f07b", - "externalIds": {"MAG": "1993460291", "DOI": "10.1177/105960118601100305", - "CorpusId": 144168745}, "url": "https://www.semanticscholar.org/paper/980a8e6526ba15cad1786a89c2d33af60b47f07b", - "title": "The Effects of Group Cohesion and Leader Behavior on Subordinate - Satisfaction", "abstract": "The present study examined the effects of group - cohesiveness and leader behavior on subordinate satisfaction in a military - organiza tion. A total of 203 cadets completed measures of group cohesiveness, - leader initiating structure, leader consideration, and several satisfac tion - scales. Analyses indicated that (1) subordinates were more satisfied with - leaders who exhibited high levels of initiating struc ture and consideration; - (2) subordinates in high-cohesiveness groups were more satisfied than subordinates - in low-cohesiveness groups; and (3) leader initiating structure and consideration - were more positively related to subordinate satisfaction in high-cohesiveness - groups than in low-cohesiveness groups. The results demonstrate the necessity - of including group process variables in leadership theory and research. Implications - of the findings forgroup effectiveness are also discussed.", "venue": "", - "year": 1986, "referenceCount": 31, "citationCount": 181, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1986-12-01", "journal": - {"name": "Group & Organization Management", "pages": "203 - 219", "volume": - "11"}, "authors": [{"authorId": "98335162", "name": "G. Dobbins"}, {"authorId": - "2040464", "name": "S. Zaccaro"}]}, {"paperId": "bdb961c14e9104f97f4d7145ee7c87dc458ca3ee", - "externalIds": {"MAG": "2110496051", "DOI": "10.1146/ANNUREV.NE.18.030195.002125", - "CorpusId": 35738505, "PubMed": "7605067"}, "url": "https://www.semanticscholar.org/paper/bdb961c14e9104f97f4d7145ee7c87dc458ca3ee", - "title": "Mechanisms of neural patterning and specification in the developing - cerebellum.", "abstract": "The cerebellar cortex is one of the best-studied - regions of the CNS. For nearly a century, all of the cerebellar cell types - and the patterns of their synaptic connections have been known. Much of this - wealth of information comes from Ramon y Cajal''s work (1889, 1911, 1960) - with Golgi studies. Further infor\u00ad mation on the development (Altman - & Bayer 1985a-c, Rakic 1971, Miale & Sidman 1961), anatomy (Palay & Chan-Palay - 1974), fiber tracts (BrodaI1981), and circuitry (Llinas & Hillman 1969) of - the cerebellar cortex has emerged over the past several decades. The cerebellum - provides a unique system for studying CNS development, combining the three - classic patterns of CNS development-morphogenetic movements, the formation - of ganglionic struc\u00ad tures, and the establishment of neuronal layers-within - one brain region. Remarkably simple in its basic plan, the adult cerebellar - cortex contains only three layers and two principal classes of neurons. The - abundance of one of these principal neurons, the granule cell, has enabled - detailed analyses of the molecular mechanisms that underlie the basic steps - in neuronal differentiation and has pointed out the role of local community - factors in CNS neuronal development. Moreover, studies of naturally occurring - mutations (Heintz et al 1993, Sidman 1968) and of targeted gene disruptions - that block discrete steps in the development of this region (McMahon 1993, - Joyner & Hanks 1991,", "venue": "Annual Review of Neuroscience", "year": 1995, - "referenceCount": 39, "citationCount": 557, "influentialCitationCount": 26, - "isOpenAccess": false, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": null, - "journal": {"name": "Annual review of neuroscience", "pages": "\n 385-408\n ", - "volume": "18"}, "authors": [{"authorId": "5495393", "name": "M. Hatten"}, - {"authorId": "26123312", "name": "N. Heintz"}]}, {"paperId": "fd489f9413f78ba2012acdc1d145382b38af45a3", - "externalIds": {"MAG": "2013055900", "CorpusId": 14854040}, "url": "https://www.semanticscholar.org/paper/fd489f9413f78ba2012acdc1d145382b38af45a3", - "title": "Chaitin Numbers and Strong Reducibilities", "abstract": "We prove - that any Chaitin \u03a9 number (i.e., the halting probability of a universal - self-delimiting Turing machine) is wtt-complete, but not tt-complete. In this - way we obtain a whole class of natural examples of wtt-complete but not tt-complete - r.e. sets. The proof is direct and elementary.", "venue": "", "year": 1997, - "referenceCount": 14, "citationCount": 48, "influentialCitationCount": 8, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Journal of Universal Computer Science", "volume": ""}, - "authors": [{"authorId": "1685717", "name": "Cristian S. Calude"}, {"authorId": - "2350687", "name": "A. Nies"}]}, {"paperId": "c363fde2695be2413a18c3b070947a73e99c926e", - "externalIds": {"MAG": "2189001997", "CorpusId": 138647257}, "url": "https://www.semanticscholar.org/paper/c363fde2695be2413a18c3b070947a73e99c926e", - "title": "A Critical Evaluation of Indentation Techniques for Measuring Fracture - Toughness: I, Direct Crack Measurements", "abstract": "The application of - indentation techniques to the evaluation of fracture toughness is examined - critically, in two parts. In this flrst part, attention is focused on an approach - which involves direct measurement of Vickers-produced radial cracks as a function - of indentation load. A theoretical basis for the method is first established, - in terms of elasticlplastic indentation frac- ture mechanics. It is thereby - asserted that the key to the radial crack response lies In the residual component - of the contact fkld. This residual term has important implications concerning - the crack evolution, including the possibility of postindentation slow growth - under environment-sensitive conditions. Frac- tographic observations of cracks - in selected \"reference\" mater- Ys are used to determine the magnitude of - this effect and to investigate other potential complications associated with - de- partures from ideal indentation fracture behavior. The data from these - observations provide a convenient calibration of the indentation toughness - equations for general application to other well-behaved ceramics. The technique - is uniquely hpie in procedure and economic in its use of material.", "venue": - "", "year": 1981, "referenceCount": 12, "citationCount": 590, "influentialCitationCount": - 29, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "40764774", - "name": "R. Garvie"}, {"authorId": "152867287", "name": "R. Hannink"}, {"authorId": - "91477243", "name": "R. Hughan"}, {"authorId": "40757117", "name": "N. A. - Mckinnon"}, {"authorId": "40758202", "name": "R. T. Pascoe"}, {"authorId": - "112974371", "name": "R. K. Shinger"}, {"authorId": "2082672758", "name": - "D. Porter"}, {"authorId": "47454742", "name": "A. Heuer"}]}, {"paperId": - "1ea3cb0b620bade45ae1a23ca891557de4cc258f", "externalIds": {"MAG": "2047703408", - "DOI": "10.1016/J.NONRWA.2011.05.022", "CorpusId": 121471044}, "url": "https://www.semanticscholar.org/paper/1ea3cb0b620bade45ae1a23ca891557de4cc258f", - "title": "Turing pattern formation in a predator\u2013prey\u2013mutualist - system", "abstract": null, "venue": "", "year": 2011, "referenceCount": 51, - "citationCount": 40, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-12-01", "journal": {"name": - "Nonlinear Analysis-real World Applications", "pages": "3224-3237", "volume": - "12"}, "authors": [{"authorId": "1990780", "name": "Canrong Tian"}, {"authorId": - "2053397687", "name": "Zhi Ling"}, {"authorId": "119563901", "name": "Zhigui - Lin"}]}, {"paperId": "4af29844b4a2ea5fc4692ef1070a18e6825a57e8", "externalIds": - {"MAG": "2071635705", "DOI": "10.1209/EPL/I2000-00352-3", "CorpusId": 55125609}, - "url": "https://www.semanticscholar.org/paper/4af29844b4a2ea5fc4692ef1070a18e6825a57e8", - "title": "Selection and competition of Turing patterns", "abstract": "We examine - the selection and competition of patterns in the Brusselator model, one of - the simplest reaction-diffusion systems giving rise to Turing instabilities. - Simulations of this model show a significant change in the wave number of - stable patterns as the control parameter is increased. A weakly nonlinear - analysis makes it possible to obtain the amplitude equations for the concentration - fields near the instability threshold. Together with the linear diffusive - terms, these equations also contain nonvariational spatial terms. When these - terms are included, the stability diagrams and the thresholds for secondary - instabilities are heavily modified with respect to the usual diffusive case. - The results obtained from the numerical simulations fit very well into the - calculated stability regions.", "venue": "", "year": 2000, "referenceCount": - 4, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2000-08-01", "journal": {"name": - "EPL", "pages": "300-306", "volume": "51"}, "authors": [{"authorId": "123477968", - "name": "B. Pe\u00f1a"}, {"authorId": "82361775", "name": "C. P\u00e9rez-Garc\u00eda"}]}, - {"paperId": "0421c48f1d065b1c6486b99d03d65ba55b3423fa", "externalIds": {"DBLP": - "conf/iclp/Sneyers08", "MAG": "168533040", "DOI": "10.1007/978-3-540-89982-2_72", - "CorpusId": 16557939}, "url": "https://www.semanticscholar.org/paper/0421c48f1d065b1c6486b99d03d65ba55b3423fa", - "title": "Turing-Complete Subclasses of CHR", "abstract": null, "venue": "International - Conference on Logic Programming", "year": 2008, "referenceCount": 12, "citationCount": - 15, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2008-12-15", - "journal": {"pages": "759-763"}, "authors": [{"authorId": "1735896", "name": - "Jon Sneyers"}]}, {"paperId": "a22c6db08ca95f8ba25dc118f85a083e9913b9e5", - "externalIds": {"DBLP": "conf/iticse/ChenM05", "MAG": "2171299949", "DOI": - "10.1145/1067445.1067477", "CorpusId": 1343078}, "url": "https://www.semanticscholar.org/paper/a22c6db08ca95f8ba25dc118f85a083e9913b9e5", - "title": "Iconic programming for flowcharts, java, turing, etc", "abstract": - "One of the largest barriers to learning programming is the precise and complex - syntax required to write programs. This barrier is a key impediment to the - integration of programming into the core curriculum of general high school - science courses - there is not enough time to learn both syntax and programming - in a three-week course module. The newly developed \"Iconic Programmer\" allows - executable programs to be written through mouse clicks and menus, includes - symbol by symbol translation into Java and Turing, and comes complete with - a three-week lesson plan suitable to new programmers. To date, the new tool - has been used effectively with full-semester, introductory programming courses - at both the university and high school level.", "venue": "Annual Conference - on Innovation and Technology in Computer Science Education", "year": 2005, - "referenceCount": 12, "citationCount": 24, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-06-27", "journal": {"pages": "104-107"}, "authors": - [{"authorId": "2110910127", "name": "Stephen Chen"}, {"authorId": "2070248016", - "name": "S. Morris"}]}, {"paperId": "b0afd1566b0bdcfb12e3aa26541a9782e8e7df74", - "externalIds": {"MAG": "1564141322", "DOI": "10.7551/mitpress/3965.001.0001", - "CorpusId": 142609965}, "url": "https://www.semanticscholar.org/paper/b0afd1566b0bdcfb12e3aa26541a9782e8e7df74", - "title": "An invitation to cognitive science", "abstract": "Shake hands the - classical agenda the gathering storm meaning must have a stop dark glass and - shattered mirrors the contradictions of the public world Turing and Wittgenstein - information storms the imitation game the linguistic turn - the child programme - stories of consciousness.", "venue": "", "year": 1991, "referenceCount": 0, - "citationCount": 48, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "3078093", "name": "J. Leiber"}]}, - {"paperId": "8a2bddf1a8465b3dcf6a4ad50a2749862dcd70e3", "externalIds": {"MAG": - "1981508619", "DBLP": "journals/annals/Aspray85", "DOI": "10.1109/MAHC.1985.10018", - "CorpusId": 9281036}, "url": "https://www.semanticscholar.org/paper/8a2bddf1a8465b3dcf6a4ad50a2749862dcd70e3", - "title": "The Scientific Conceptualization of Information: A Survey", "abstract": - "The article surveys the development of a scientific conceptualization of - information during and in the decade following World War II. It examines the - roots of information science in nineteenth- and early twentieth-century mathematical - logic, physics, psychology, and electrical engineering, and then focuses on - how Warren McCulloch, Walter Pitts, Claude Shannon, Alan Turing, John von - Neumann, and Norbert Wiener combined these diverse studies into a coherent - discipline.", "venue": "Annals of the History of Computing", "year": 1985, - "referenceCount": 48, "citationCount": 64, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["History", "Computer Science"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "1985-04-01", "journal": - {"name": "Annals of the History of Computing", "pages": "117-140", "volume": - "7"}, "authors": [{"authorId": "150336139", "name": "W. Aspray"}]}, {"paperId": - "b1e709f948726f2e392511dafac3e9764eb96072", "externalIds": {"DBLP": "conf/stacs/Ambos-Spies84", - "MAG": "1527240708", "DOI": "10.1007/3-540-12920-0_18", "CorpusId": 45941295}, - "url": "https://www.semanticscholar.org/paper/b1e709f948726f2e392511dafac3e9764eb96072", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://infoscience.epfl.ch/record/181737/files/anie_201205347_sm_miscellaneous_information.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-10-08", "journal": + {"name": "Angewandte Chemie", "pages": "\n 10413-6\n ", "volume": + "51 41"}, "authors": [{"authorId": "3835697", "name": "A. Lesch"}, {"authorId": + "117405451", "name": "Britta Vaske"}, {"authorId": "145350880", "name": "F. + Meiners"}, {"authorId": "6925237", "name": "Dmitry Momotenko"}, {"authorId": + "1402989162", "name": "F. Cort\u00e9s-Salazar"}, {"authorId": "3984754", "name": + "H. Girault"}, {"authorId": "145436724", "name": "G. Wittstock"}]}, {"paperId": + "b4b0679e94bd5921779b4b289b858aa34623ff47", "externalIds": {"MAG": "1974979129", + "DOI": "10.1103/PHYSREVLETT.85.2212", "CorpusId": 20123973, "PubMed": "10970500"}, + "corpusId": 20123973, "publicationVenue": {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", + "name": "Physical Review Letters", "type": "journal", "alternate_names": ["Phys + Rev Lett"], "issn": "0031-9007", "url": "https://journals.aps.org/prl/", "alternate_urls": + ["http://journals.aps.org/prl/", "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/b4b0679e94bd5921779b4b289b858aa34623ff47", + "title": "Spontaneous symmetry breaking turing-type pattern formation in a + confined Dictyostelium cell mass.", "abstract": "We have discovered a new + type of patterning which occurs in a two-dimensionally confined cell mass + of the cellular slime mold Dictyostelium discoideum. Besides the longitudinal + structure reported earlier, we observed a spontaneous symmetry breaking spot + pattern whose wavelength shows similar strain dependency to that of the longitudinal + pattern. We propose that these structures are due to a reaction-diffusion + Turing instability similar to the one which has been exemplified by CIMA (chlorite-iodide-malonic + acid) reaction. The present finding may exhibit the first biochemical Turing + structure in a developmental system with a controllable boundary condition.", + "venue": "Physical Review Letters", "year": 2000, "referenceCount": 0, "citationCount": + 28, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-09-04", "journal": {"name": "Physical review letters", + "pages": "\n 2212-5\n ", "volume": "85 10"}, "authors": [{"authorId": + "2919397", "name": "S. Sawai"}, {"authorId": "144978760", "name": "Y. Maeda"}, + {"authorId": "3258652", "name": "Y. Sawada"}]}, {"paperId": "b1e709f948726f2e392511dafac3e9764eb96072", + "externalIds": {"DBLP": "conf/stacs/Ambos-Spies84", "MAG": "1527240708", "DOI": + "10.1007/3-540-12920-0_18", "CorpusId": 45941295}, "corpusId": 45941295, "publicationVenue": + {"id": "2e8ac273-26de-40d6-9f96-09286b1016f1", "name": "Symposium on Theoretical + Aspects of Computer Science", "type": "conference", "alternate_names": ["STACS", + "Symp Theor Asp Comput Sci"], "url": "http://www.stacs-conf.org/"}, "url": + "https://www.semanticscholar.org/paper/b1e709f948726f2e392511dafac3e9764eb96072", "title": "On the Structure of Polynomial Time Degrees", "abstract": null, "venue": "Symposium on Theoretical Aspects of Computer Science", "year": 1984, "referenceCount": 9, "citationCount": 21, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1984-04-11", "journal": - {"pages": "198-208"}, "authors": [{"authorId": "1398717883", "name": "K. Ambos-Spies"}]}, - {"paperId": "c87b86b234827a0a2fd12f41f2544aab5c2255ae", "externalIds": {"MAG": - "2429182015", "ArXiv": "1606.04916", "DOI": "10.1103/PhysRevLett.118.018101", - "CorpusId": 14266026, "PubMed": "28106453"}, "url": "https://www.semanticscholar.org/paper/c87b86b234827a0a2fd12f41f2544aab5c2255ae", + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1984-04-11", + "journal": {"pages": "198-208"}, "authors": [{"authorId": "1398717883", "name": + "K. Ambos-Spies"}]}, {"paperId": "c87b86b234827a0a2fd12f41f2544aab5c2255ae", + "externalIds": {"MAG": "2429182015", "ArXiv": "1606.04916", "DOI": "10.1103/PhysRevLett.118.018101", + "CorpusId": 14266026, "PubMed": "28106453"}, "corpusId": 14266026, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/c87b86b234827a0a2fd12f41f2544aab5c2255ae", "title": "Giant Amplification of Noise in Fluctuation-Induced Pattern Formation.", "abstract": "The amplitude of fluctuation-induced patterns might be expected to be proportional to the strength of the driving noise, suggesting that such @@ -29843,7 +33760,8 @@ interactions: observable, and are not strongly limited by the amplitude of demographic stochasticity nor by the value of the diffusion coefficients.", "venue": "Physical Review Letters", "year": 2016, "referenceCount": 50, "citationCount": 42, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics", "Biology"], + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.aps.org/accepted/10.1103/PhysRevLett.118.018101", + "status": "HYBRID"}, "fieldsOfStudy": ["Medicine", "Physics", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], @@ -29851,8 +33769,171 @@ interactions: "pages": "\n 018101\n ", "volume": "118 1"}, "authors": [{"authorId": "6785594", "name": "T. Biancalani"}, {"authorId": "39438307", "name": "Farshid Jafarpour"}, {"authorId": "3549131", "name": "N. Goldenfeld"}]}, {"paperId": + "645028677baa5db6a8928466a6e2e8f115eb75f6", "externalIds": {"MAG": "1975245062", + "DOI": "10.1103/PHYSREVE.68.056206", "CorpusId": 26467659, "PubMed": "14682870"}, + "corpusId": 26467659, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/645028677baa5db6a8928466a6e2e8f115eb75f6", + "title": "Transverse instabilities in chemical Turing patterns of stripes.", + "abstract": "We present a theoretical and experimental study of the sideband + instabilities in Turing patterns of stripes. We compare numerical computations + of the Brusselator model with experiments in a chlorine dioxide-iodine-malonic + acid (CDIMA) reaction in a thin gel layer reactor in contact with a continuously + refreshed reservoir of reagents. Spontaneously evolving Turing structures + in both systems typically exhibit many defects that break the symmetry of + the pattern. Therefore, the study of sideband instabilities requires a method + of forcing perfect, spatially periodic Turing patterns with the desired wave + number. This is easily achieved in numerical simulations. In experiments, + the photosensitivity of the CDIMA reaction permits control and modulation + of Turing structures by periodic spatial illumination with a wave number outside + the stability region. When a too big wave number is imposed on the pattern, + the Eckhaus instability may arise, while for too small wave numbers an instability + sets in forming zigzags. By means of the amplitude equation formalism we show + that, close to the hexagon-stripe transitions, these sideband instabilities + may be preceded by an amplitude instability that grows transient spots locally + before reconnecting with stripes. This prediction is tested in both the reaction-diffusion + model and the experiment.", "venue": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "year": 2003, "referenceCount": 0, "citationCount": + 25, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-11-01", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 056206\n ", + "volume": "68 5 Pt 2"}, "authors": [{"authorId": "123477968", "name": "B. + Pe\u00f1a"}, {"authorId": "82361775", "name": "C. P\u00e9rez-Garc\u00eda"}, + {"authorId": "1403379734", "name": "A. Sanz-Anchelergues"}, {"authorId": "2701200", + "name": "D. G. M\u00edguez"}, {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}]}, + {"paperId": "866d35b6556c77a5aebda8492159d26800d2b97b", "externalIds": {"DBLP": + "conf/focs/RubyF65", "MAG": "2000552003", "DOI": "10.1109/FOCS.1965.33", "CorpusId": + 43124679}, "corpusId": 43124679, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/866d35b6556c77a5aebda8492159d26800d2b97b", + "title": "Translational methods and computational complexity", "abstract": + "This paper investigates the computational complexity of binary sequences + as measured by the rapidity of their generation by multitape Turing machines. + A \"translational\" method which escapes some of the limitations of earlier + approaches leads to a refinement of the established hierarchy. The previous + complexity classes are shown to possess certain translational properties. + An related hierarchy of complexity classes of monotonic functions is examined", + "venue": "SWCT", "year": 1965, "referenceCount": 2, "citationCount": 50, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1965-10-06", "journal": + {"pages": "173-178"}, "authors": [{"authorId": "49672003", "name": "S. Ruby"}, + {"authorId": "1691253", "name": "P. C. Fischer"}]}, {"paperId": "7230b852eefeebde2646c51b1adb947420b3dd95", + "externalIds": {"MAG": "2007275880", "DOI": "10.1103/PHYSREVLETT.99.104503", + "CorpusId": 25053415, "PubMed": "17930391"}, "corpusId": 25053415, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/7230b852eefeebde2646c51b1adb947420b3dd95", + "title": "Proposed resolution of theory-experiment discrepancy in homoclinic + snaking.", "abstract": "In spatially extended Turing-unstable systems, parameter + variation should, in theory, produce only fully developed patterns. In experiment, + however, localized patterns or solitons sitting on a smooth background often + appear. Addition of a nonlocal nonlinearity can resolve this discrepancy by + tilting the \"snaking\" bifurcation diagram characteristic of such problems.", + "venue": "Physical Review Letters", "year": 2007, "referenceCount": 0, "citationCount": + 50, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2007-09-07", "journal": {"name": "Physical + review letters", "pages": "\n 104503\n ", "volume": "99 10"}, + "authors": [{"authorId": "3037949", "name": "W. Firth"}, {"authorId": "2088949264", + "name": "L. Columbo"}, {"authorId": "49845189", "name": "A. Scroggie"}]}, + {"paperId": "3bc7b3541e2415c8a5fb36de1696bd1f41cd36de", "externalIds": {"MAG": + "2473064468", "CorpusId": 63946358}, "corpusId": 63946358, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3bc7b3541e2415c8a5fb36de1696bd1f41cd36de", + "title": "Mechanical intelligence (collected works of A. M. Turing)", "abstract": + null, "venue": "", "year": 1992, "referenceCount": 0, "citationCount": 44, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "1992-07-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "2801968", "name": "D. Ince"}]}, {"paperId": "b0afd1566b0bdcfb12e3aa26541a9782e8e7df74", + "externalIds": {"MAG": "1564141322", "DOI": "10.7551/mitpress/3965.001.0001", + "CorpusId": 142609965}, "corpusId": 142609965, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b0afd1566b0bdcfb12e3aa26541a9782e8e7df74", + "title": "An invitation to cognitive science", "abstract": "Shake hands the + classical agenda the gathering storm meaning must have a stop dark glass and + shattered mirrors the contradictions of the public world Turing and Wittgenstein + information storms the imitation game the linguistic turn - the child programme + stories of consciousness.", "venue": "", "year": 1991, "referenceCount": 0, + "citationCount": 48, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3078093", + "name": "J. Leiber"}]}, {"paperId": "8a2bddf1a8465b3dcf6a4ad50a2749862dcd70e3", + "externalIds": {"MAG": "1981508619", "DBLP": "journals/annals/Aspray85", "DOI": + "10.1109/MAHC.1985.10018", "CorpusId": 9281036}, "corpusId": 9281036, "publicationVenue": + {"id": "45584fb0-6eed-4c30-87fc-7e3691efb8c8", "name": "Annals of the History + of Computing", "alternate_names": ["Ann Hist Comput"], "issn": "0164-1239", + "url": "https://ieeexplore.ieee.org/servlet/opac?punumber=5488650"}, "url": + "https://www.semanticscholar.org/paper/8a2bddf1a8465b3dcf6a4ad50a2749862dcd70e3", + "title": "The Scientific Conceptualization of Information: A Survey", "abstract": + "The article surveys the development of a scientific conceptualization of + information during and in the decade following World War II. It examines the + roots of information science in nineteenth- and early twentieth-century mathematical + logic, physics, psychology, and electrical engineering, and then focuses on + how Warren McCulloch, Walter Pitts, Claude Shannon, Alan Turing, John von + Neumann, and Norbert Wiener combined these diverse studies into a coherent + discipline.", "venue": "Annals of the History of Computing", "year": 1985, + "referenceCount": 48, "citationCount": 64, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History", + "Computer Science"], "s2FieldsOfStudy": [{"category": "History", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1985-04-01", "journal": {"name": "Annals of + the History of Computing", "pages": "117-140", "volume": "7"}, "authors": + [{"authorId": "150336139", "name": "W. Aspray"}]}, {"paperId": "5285666a3dfe50493ae1a74541061abfe4eddee7", + "externalIds": {"MAG": "2044240887", "DOI": "10.1007/BF02937291", "CorpusId": + 4182351}, "corpusId": 4182351, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5285666a3dfe50493ae1a74541061abfe4eddee7", + "title": "Weak density and cupping in the d-r.e. degrees", "abstract": null, + "venue": "", "year": 1989, "referenceCount": 13, "citationCount": 49, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Geology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-06-01", + "journal": {"name": "Israel Journal of Mathematics", "pages": "137-152", "volume": + "67"}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, {"authorId": + "2805805", "name": "S. Lempp"}, {"authorId": "2105856683", "name": "Philip + Watson"}]}, {"paperId": "3f95b6ff3fda46db7fae313f5412759b86da0341", "externalIds": + {"DBLP": "conf/isbi/HanHRASMFMN18", "MAG": "2806118840", "DOI": "10.1109/ISBI.2018.8363678", + "CorpusId": 43939347}, "corpusId": 43939347, "publicationVenue": {"id": "a38e0d3d-6929-4868-b4e4-af8bbacf711e", + "name": "IEEE International Symposium on Biomedical Imaging", "type": "conference", + "alternate_names": ["ISBI", "International Symposium on Biomedical Imaging", + "Int Symp Biomed Imaging", "IEEE Int Symp Biomed Imaging"], "issn": "1945-7928", + "alternate_issns": ["1945-8452"], "url": "http://www.biomedicalimaging.org/", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/conferences.jsp"]}, "url": + "https://www.semanticscholar.org/paper/3f95b6ff3fda46db7fae313f5412759b86da0341", + "title": "GAN-based synthetic brain MR image generation", "abstract": "In + medical imaging, it remains a challenging and valuable goal how to generate + realistic medical images completely different from the original ones; the + obtained synthetic images would improve diagnostic reliability, allowing for + data augmentation in computer-assisted diagnosis as well as physician training. + In this paper, we focus on generating synthetic multi-sequence brain Magnetic + Resonance (MR) images using Generative Adversarial Networks (GANs). This involves + difficulties mainly due to low contrast MR images, strong consistency in brain + anatomy, and intra-sequence variability. Our novel realistic medical image + generation approach shows that GANs can generate 128 \u03c7 128 brain MR images + avoiding artifacts. In our preliminary validation, even an expert physician + was unable to accurately distinguish the synthetic images from the real samples + in the Visual Turing Test.", "venue": "IEEE International Symposium on Biomedical + Imaging", "year": 2018, "referenceCount": 22, "citationCount": 184, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-04-04", "journal": {"name": "2018 IEEE 15th International + Symposium on Biomedical Imaging (ISBI 2018)", "pages": "734-738"}, "authors": + [{"authorId": "144188073", "name": "Changhee Han"}, {"authorId": "1381961694", + "name": "Hideaki Hayashi"}, {"authorId": "2142430", "name": "L. Rundo"}, {"authorId": + "1491176231", "name": "Ryosuke Araki"}, {"authorId": "49359527", "name": "Wataru + Shimoda"}, {"authorId": "2072485867", "name": "Shinichi Muramatsu"}, {"authorId": + "46213843", "name": "Yujiro Furukawa"}, {"authorId": "1747770", "name": "G. + Mauri"}, {"authorId": "48731103", "name": "Hideki Nakayama"}]}, {"paperId": "70c5ad2f08b11405a297decfffc2eaffd9b3d404", "externalIds": {"CorpusId": 15359781}, - "url": "https://www.semanticscholar.org/paper/70c5ad2f08b11405a297decfffc2eaffd9b3d404", + "corpusId": 15359781, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/70c5ad2f08b11405a297decfffc2eaffd9b3d404", "title": "Computing Machinery and Intelligence Mind Vol. 59", "abstract": "In recent years, much research has been devoted to the synthesis of hash tables; contrarily, few have enabled the study of the partition table. Here, @@ -29862,112 +33943,135 @@ interactions: rather on presenting a novel system for the evaluation of extreme programming (Plush). This is crucial to the success of our work.", "venue": "", "year": null, "referenceCount": 108, "citationCount": 65, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "a639c6ba8d5f289c3d87f97473f5411151acb03e", "externalIds": {"MAG": "2898278399", + "DBLP": "journals/ijbc/CaiGZSW18", "DOI": "10.1142/S0218127418501407", "CorpusId": + 53290186}, "corpusId": 53290186, "publicationVenue": {"id": "f3358047-5fa1-4315-9473-4bb4c19cb756", + "name": "International Journal of Bifurcation and Chaos in Applied Sciences + and Engineering", "type": "journal", "alternate_names": ["Int J Bifurc Chaos", + "Int J Bifurc Chaos Appl Sci Eng", "International Journal of Bifurcation and + Chaos"], "issn": "0218-1274", "url": "http://www.worldscinet.com/ijbc/ijbc.shtml", + "alternate_urls": ["http://www.worldscinet.com/ijbc/mkt/archive.shtml"]}, + "url": "https://www.semanticscholar.org/paper/a639c6ba8d5f289c3d87f97473f5411151acb03e", + "title": "Bifurcations and Pattern Formation in a Predator-Prey Model", "abstract": + "In this paper, we investigate the spatiotemporal dynamics of a Leslie\u2013Gower + predator\u2013prey model incorporating a prey refuge subject to the Neumann + boundary conditions. We mainly consider Hopf bifurcation and steady-state + bifurcation which bifurcate from the constant positive steady-state of the + model. In the case of Hopf bifurcation, by the center manifold theory and + the normal form method, we establish the bifurcation direction and stability + of bifurcating periodic solutions; in the case of steady-state bifurcation, + by the local and global bifurcation theories, we prove the existence of the + steady-state bifurcation, and find that there are two typical bifurcations, + Turing bifurcation and Turing\u2013Hopf bifurcation. Via numerical simulations, + we find that the model exhibits not only stationary Turing pattern induced + by diffusion which is dependent on space and independent of time, but also + temporal periodic pattern induced by Hopf bifurcation which is dependent on + time and independent of space, and spatiotemporal pattern induced by Turing\u2013Hopf + bifurcation which is dependent on both time and space. These results may enrich + the pattern formation in the predator\u2013prey model.", "venue": "International + Journal of Bifurcation and Chaos in Applied Sciences and Engineering", "year": + 2018, "referenceCount": 52, "citationCount": 27, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-10-01", "journal": {"name": "Int. J. Bifurc. Chaos", + "pages": "1850140:1-1850140:17", "volume": "28"}, "authors": [{"authorId": + "2476593", "name": "Yongli Cai"}, {"authorId": "2100377", "name": "Z. Gui"}, + {"authorId": "2108177604", "name": "Xuebing Zhang"}, {"authorId": "48626765", + "name": "Hongbo Shi"}, {"authorId": "2116103578", "name": "Weiming Wang"}]}, + {"paperId": "fd916f6b9594cad310f3a602e4a22c07458fd9bb", "externalIds": {"MAG": + "2120893071", "DOI": "10.1001/ARCHPSYC.1966.01730120064008", "CorpusId": 31742404, + "PubMed": "5934871"}, "corpusId": 31742404, "publicationVenue": {"id": "f8b3ce82-148b-49f4-a74d-f737fe75e826", + "name": "Archives of General Psychiatry", "type": "journal", "alternate_names": + ["Arch Gen Psychiatry"], "issn": "0003-990X", "url": "http://archpsyc.ama-assn.org/"}, + "url": "https://www.semanticscholar.org/paper/fd916f6b9594cad310f3a602e4a22c07458fd9bb", + "title": "Oral, obsessive, and hysterical personality patterns. An investigation + of psychoanalytic concepts by means of factor analysis.", "abstract": "THIS + STUDY is an attempt to explore the empirical basis of three personality types + frequently discussed in the psychiatric litera ture\u2014oral, obsessive, + and hysterical. More specifically, the trait patterns which histori cally + have been said to characterize each of the three personality types will be + reex amined by means of factor analysis, and a self-rating form will be offered + as a measure of these personality types. * In order to understand the significance, + the limitations, and the theoretical framework of this research, we shall + first describe the content out of which it emerged, including a preliminary + experiment which partially failed. Our interest in personality arose from + our observations of the relationship between personality and symptom formation + in de pressed women. 19 We noted, for instance, that depressed women with + hysterical per sonalities differed from depressed women with obsessional personalities + in their pre hospital adjustment, in their patterns o depressive symptomatology, + in", "venue": "Archives of General Psychiatry", "year": 1966, "referenceCount": + 13, "citationCount": 179, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1966-06-01", "journal": + {"name": "Archives of general psychiatry", "pages": "\n 624-30\n ", + "volume": "14 6"}, "authors": [{"authorId": "46413903", "name": "A. Lazare"}, + {"authorId": "5456934", "name": "G. Klerman"}, {"authorId": "37135153", "name": + "D. Armor"}]}, {"paperId": "58298f9c4e64e29a1c00d70d34c1909fc1a899d3", "externalIds": + {"CorpusId": 2013422}, "corpusId": 2013422, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/58298f9c4e64e29a1c00d70d34c1909fc1a899d3", + "title": "On Computable Numbers. . . Proc Universal Turing Machine", "abstract": + "The networking approach to the producer-consumer problem is defined not only + by the development of object-oriented languages, but also by the intuitive + need for Markov models. In fact, few statisticians would disagree with the + synthesis of simulated anneal-ing. We argue that despite the fact that the + little-known collaborative algorithm for the development of systems by Zhou + et al. follows a Zipf-like distribution, spreadsheets and voice-over-IP can + agree to achieve this objective.", "venue": "", "year": null, "referenceCount": + 143, "citationCount": 24, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "d879d9eaa56ddd4dac40963c79f35c852dff05ca", - "externalIds": {"MAG": "1572967271", "DOI": "10.1007/978-1-4613-9435-8_10", - "CorpusId": 60705963}, "url": "https://www.semanticscholar.org/paper/d879d9eaa56ddd4dac40963c79f35c852dff05ca", - "title": "What is a Computation", "abstract": null, "venue": "", "year": 1978, - "referenceCount": 10, "citationCount": 43, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "241-267", "volume": ""}, "authors": [{"authorId": - "100651835", "name": "Martin Davis"}]}, {"paperId": "6995e92c9c4d644650b73e49b681c09d89875170", - "externalIds": {"MAG": "2512667052", "DOI": "10.1103/PHYSREVE.48.183", "CorpusId": - 12130576, "PubMed": "9960580"}, "url": "https://www.semanticscholar.org/paper/6995e92c9c4d644650b73e49b681c09d89875170", - "title": "Necessary condition of the Turing instability.", "abstract": "A - reaction-diffusion system in any number of spatial variables consisting of - an arbitrary number of chemical species cannot exhibit Turing instability - if none of the reaction steps expresses cross inhibition. A corollary of this - result underlines the importance of nonlinearity in the formation of stationary - spatial structures, a kind of self-organization on a chemical basis.", "venue": - "Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary - topics", "year": 1993, "referenceCount": 0, "citationCount": 23, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Mathematics", "Medicine"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-07-01", "journal": {"name": "Physical review. E, - Statistical physics, plasmas, fluids, and related interdisciplinary topics", - "pages": "\n 183-186\n ", "volume": "48 1"}, "authors": [{"authorId": - "123802457", "name": "Szili"}, {"authorId": "2071050254", "name": "T\u00f3th"}]}, - {"paperId": "6e463cb9776b6864570005b742bc963519b7ff6d", "externalIds": {"DBLP": - "conf/uss/KruppR18", "MAG": "2888928288", "CorpusId": 51751804}, "url": "https://www.semanticscholar.org/paper/6e463cb9776b6864570005b742bc963519b7ff6d", - "title": "teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts", - "abstract": "Cryptocurrencies like Bitcoin not only provide a decentralized - currency, but also provide a programmatic way to process transactions. Ethereum, - the second largest cryptocurrency next to Bitcoin, is the first to provide - a Turing-complete language to specify transaction processing, thereby enabling - so-called smart contracts. This provides an opportune setting for attackers, - as security vulnerabilities are tightly intertwined with financial gain. In - this paper, we consider the problem of automatic vulnerability identification - and exploit generation for smart contracts. We develop a generic definition - of vulnerable contracts and use this to build TEE THER, a tool that allows - creating an exploit for a contract given only its binary bytecode. We perform - a large-scale analysis of all 38,757 unique Ethereum contracts, 815 out of - which our tool finds working exploits for\u2014completely automated.", "venue": - "USENIX Security Symposium", "year": 2018, "referenceCount": 20, "citationCount": - 178, "influentialCitationCount": 22, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-08-01", "journal": {"pages": - "1317-1333"}, "authors": [{"authorId": "47635635", "name": "Johannes Krupp"}, - {"authorId": "1701081", "name": "C. Rossow"}]}, {"paperId": "d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", - "externalIds": {"DBLP": "journals/mcs/GambinoLS12", "MAG": "2169791857", "DOI": - "10.1016/j.matcom.2011.11.004", "CorpusId": 28553827}, "url": "https://www.semanticscholar.org/paper/d60ee5ad75c337ab67bb8bbe4d2a31ade1e886b7", - "title": "Turing instability and traveling fronts for a nonlinear reaction-diffusion - system with cross-diffusion", "abstract": null, "venue": "Mathematics and - Computers in Simulation", "year": 2012, "referenceCount": 58, "citationCount": - 91, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-02-01", "journal": {"name": "Math. - Comput. Simul.", "pages": "1112-1132", "volume": "82"}, "authors": [{"authorId": - "143670670", "name": "G. Gambino"}, {"authorId": "3106418", "name": "M. Lombardo"}, - {"authorId": "37823401", "name": "M. Sammartino"}]}, {"paperId": "de32a49643cb9d089a005b238bf1c4706c869d1c", - "externalIds": {"MAG": "1219381982", "DOI": "10.3934/PROC.2007.2007.436", - "CorpusId": 20263536}, "url": "https://www.semanticscholar.org/paper/de32a49643cb9d089a005b238bf1c4706c869d1c", - "title": "TURING PATTERNS ON GROWING SPHERES: THE EXPONENTIAL CASE", "abstract": - "We consider Turing patterns for reaction-diusion systems on the surface of - a growing sphere. In particular, we are interested in the eect of dynamic - growth on the pattern formation. We consider exponential isotropic growth - of the sphere and perform a linear stability analysis and compare the results - with numerical simulations.", "venue": "", "year": 2007, "referenceCount": - 16, "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2007-09-01", "journal": {"name": - "", "pages": "436", "volume": "2007"}, "authors": [{"authorId": "2242932", - "name": "Julijana Gjorgjieva"}, {"authorId": "144195342", "name": "Jon Jacobsen"}]}, - {"paperId": "28d5d180c539ad6c1b7db8ceeefd4042c16fb39a", "externalIds": {"DBLP": - "journals/iandc/Pierce94", "MAG": "2792739471", "DOI": "10.1145/143165.143228", - "CorpusId": 14218142}, "url": "https://www.semanticscholar.org/paper/28d5d180c539ad6c1b7db8ceeefd4042c16fb39a", - "title": "Bounded quantification is undecidable", "abstract": "F\u2264 is - a typed \u03bb-calculus with subtyping and bounded second-order polymorphism. - First proposed by Cardelli and Wegner, it has been widely studied as a core - calculus for type systems with subtyping.\nCurien and Ghelli proved the partial - correctness of a recursive procedure for computing minimal types of F\u2264 - terms and showed that the termination of this procedure is equivalent to the - termination of this procedure is equivalent to the termination of its major - component, a procedure for checking the subtype relation between F\u2264 types. - This procedure was thought to terminate on all inputs, but the discovery of - a subtle bug in a purported proof of this claim recently reopened the question - of the decidability of subtyping, and hence of typechecking.\nThis question - is settled here in the negative, using a reduction from the halting problem - for two-counter Turing machines to show that the subtype relation of F\u2264 - is undecidable.", "venue": "ACM-SIGACT Symposium on Principles of Programming - Languages", "year": 1992, "referenceCount": 62, "citationCount": 177, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-02-01", "journal": {"pages": "305-315"}, "authors": [{"authorId": "1734090", - "name": "B. Pierce"}]}, {"paperId": "8e9532262bb862c62d2d011a93da014da2d97ee9", - "externalIds": {"MAG": "2949164981", "DBLP": "conf/iclr/TranHSB0B17", "ArXiv": - "1701.03757", "CorpusId": 851777}, "url": "https://www.semanticscholar.org/paper/8e9532262bb862c62d2d011a93da014da2d97ee9", + "publicationDate": null, "journal": null, "authors": []}, {"paperId": "0421c48f1d065b1c6486b99d03d65ba55b3423fa", + "externalIds": {"DBLP": "conf/iclp/Sneyers08", "MAG": "168533040", "DOI": + "10.1007/978-3-540-89982-2_72", "CorpusId": 16557939}, "corpusId": 16557939, + "publicationVenue": {"id": "f8e126f5-346b-484d-8120-892dbaf00a38", "name": + "International Conference on Logic Programming", "type": "conference", "alternate_names": + ["Int Conf Log Program", "International Conference on Lightning Protection", + "Int Conf Light Prot", "ICLP"], "url": "https://www.cs.nmsu.edu/ALP/conferences/"}, + "url": "https://www.semanticscholar.org/paper/0421c48f1d065b1c6486b99d03d65ba55b3423fa", + "title": "Turing-Complete Subclasses of CHR", "abstract": null, "venue": "International + Conference on Logic Programming", "year": 2008, "referenceCount": 12, "citationCount": + 15, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://lirias.kuleuven.be/bitstream/123456789/224535/3/iclp08_tc_chr.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2008-12-15", "journal": {"pages": "759-763"}, + "authors": [{"authorId": "1735896", "name": "Jon Sneyers"}]}, {"paperId": + "4af29844b4a2ea5fc4692ef1070a18e6825a57e8", "externalIds": {"MAG": "2071635705", + "DOI": "10.1209/EPL/I2000-00352-3", "CorpusId": 55125609}, "corpusId": 55125609, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4af29844b4a2ea5fc4692ef1070a18e6825a57e8", + "title": "Selection and competition of Turing patterns", "abstract": "We examine + the selection and competition of patterns in the Brusselator model, one of + the simplest reaction-diffusion systems giving rise to Turing instabilities. + Simulations of this model show a significant change in the wave number of + stable patterns as the control parameter is increased. A weakly nonlinear + analysis makes it possible to obtain the amplitude equations for the concentration + fields near the instability threshold. Together with the linear diffusive + terms, these equations also contain nonvariational spatial terms. When these + terms are included, the stability diagrams and the thresholds for secondary + instabilities are heavily modified with respect to the usual diffusive case. + The results obtained from the numerical simulations fit very well into the + calculated stability regions.", "venue": "", "year": 2000, "referenceCount": + 4, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dadun.unav.edu/bitstream/10171/2003/1/2000.EPL.51.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-08-01", "journal": {"name": + "EPL", "pages": "300-306", "volume": "51"}, "authors": [{"authorId": "123477968", + "name": "B. Pe\u00f1a"}, {"authorId": "82361775", "name": "C. P\u00e9rez-Garc\u00eda"}]}, + {"paperId": "8e9532262bb862c62d2d011a93da014da2d97ee9", "externalIds": {"MAG": + "2949164981", "DBLP": "conf/iclr/TranHSB0B17", "ArXiv": "1701.03757", "CorpusId": + 851777}, "corpusId": 851777, "publicationVenue": {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", + "name": "International Conference on Learning Representations", "type": "conference", + "alternate_names": ["Int Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, + "url": "https://www.semanticscholar.org/paper/8e9532262bb862c62d2d011a93da014da2d97ee9", "title": "Deep Probabilistic Programming", "abstract": "We propose Edward, a Turing-complete probabilistic programming language. Edward defines two compositional representations---random variables and inference. By treating inference as @@ -29984,17 +34088,146 @@ interactions: Edward incurs no runtime overhead: it is as fast as handwritten TensorFlow.", "venue": "International Conference on Learning Representations", "year": 2017, "referenceCount": 79, "citationCount": 177, "influentialCitationCount": 21, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2017-01-13", "journal": {"name": "ArXiv", + "volume": "abs/1701.03757"}, "authors": [{"authorId": "47497262", "name": + "Dustin Tran"}, {"authorId": "28552618", "name": "M. Hoffman"}, {"authorId": + "2278009", "name": "R. Saurous"}, {"authorId": "2445241", "name": "E. Brevdo"}, + {"authorId": "1702318", "name": "K. Murphy"}, {"authorId": "1796335", "name": + "D. Blei"}]}, {"paperId": "28d5d180c539ad6c1b7db8ceeefd4042c16fb39a", "externalIds": + {"DBLP": "journals/iandc/Pierce94", "MAG": "2792739471", "DOI": "10.1145/143165.143228", + "CorpusId": 14218142}, "corpusId": 14218142, "publicationVenue": {"id": "8a1922a5-8e84-4ec6-9283-01f2ef1981fc", + "name": "ACM-SIGACT Symposium on Principles of Programming Languages", "type": + "conference", "alternate_names": ["Symp Princ Program Lang", "Symposium on + Principles of Programming Languages", "POPL", "ACM-SIGACT Symp Princ Program + Lang"], "url": "http://www.sigplan.org/Conferences/POPL/"}, "url": "https://www.semanticscholar.org/paper/28d5d180c539ad6c1b7db8ceeefd4042c16fb39a", + "title": "Bounded quantification is undecidable", "abstract": "F\u2264 is + a typed \u03bb-calculus with subtyping and bounded second-order polymorphism. + First proposed by Cardelli and Wegner, it has been widely studied as a core + calculus for type systems with subtyping.\nCurien and Ghelli proved the partial + correctness of a recursive procedure for computing minimal types of F\u2264 + terms and showed that the termination of this procedure is equivalent to the + termination of this procedure is equivalent to the termination of its major + component, a procedure for checking the subtype relation between F\u2264 types. + This procedure was thought to terminate on all inputs, but the discovery of + a subtle bug in a purported proof of this claim recently reopened the question + of the decidability of subtyping, and hence of typechecking.\nThis question + is settled here in the negative, using a reduction from the halting problem + for two-counter Turing machines to show that the subtype relation of F\u2264 + is undecidable.", "venue": "ACM-SIGACT Symposium on Principles of Programming + Languages", "year": 1992, "referenceCount": 62, "citationCount": 177, "influentialCitationCount": + 11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1992-02-01", "journal": {"pages": + "305-315"}, "authors": [{"authorId": "1734090", "name": "B. Pierce"}]}, {"paperId": + "a22c6db08ca95f8ba25dc118f85a083e9913b9e5", "externalIds": {"DBLP": "conf/iticse/ChenM05", + "MAG": "2171299949", "DOI": "10.1145/1067445.1067477", "CorpusId": 1343078}, + "corpusId": 1343078, "publicationVenue": {"id": "e82485bc-2195-4cf5-9f9a-012501918b2f", + "name": "Annual Conference on Innovation and Technology in Computer Science + Education", "type": "conference", "alternate_names": ["Integrating Technology + into Computer Science Education", "Integrating Technol Comput Sci Educ", "Annu + Conf Innov Technol Comput Sci Educ", "ITiCSE"], "url": "https://sigcse.org/sigcse/events/iticse/"}, + "url": "https://www.semanticscholar.org/paper/a22c6db08ca95f8ba25dc118f85a083e9913b9e5", + "title": "Iconic programming for flowcharts, java, turing, etc", "abstract": + "One of the largest barriers to learning programming is the precise and complex + syntax required to write programs. This barrier is a key impediment to the + integration of programming into the core curriculum of general high school + science courses - there is not enough time to learn both syntax and programming + in a three-week course module. The newly developed \"Iconic Programmer\" allows + executable programs to be written through mouse clicks and menus, includes + symbol by symbol translation into Java and Turing, and comes complete with + a three-week lesson plan suitable to new programmers. To date, the new tool + has been used effectively with full-semester, introductory programming courses + at both the university and high school level.", "venue": "Annual Conference + on Innovation and Technology in Computer Science Education", "year": 2005, + "referenceCount": 12, "citationCount": 24, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-06-27", "journal": + {"pages": "104-107"}, "authors": [{"authorId": "2110910127", "name": "Stephen + Chen"}, {"authorId": "2070248016", "name": "S. Morris"}]}, {"paperId": "ea4ebac26e0af692fbc4848c4496cd152f088e85", + "externalIds": {"MAG": "1607325103", "DBLP": "conf/concur/MateusMS03", "DOI": + "10.1007/978-3-540-45187-7_22", "CorpusId": 6008540}, "corpusId": 6008540, + "publicationVenue": {"id": "73eebcd4-7d23-4cef-b1ee-7d454e8ee04f", "name": + "International Conference on Concurrency Theory", "type": "conference", "alternate_names": + ["CONCUR", "Int Conf Concurr Theory"], "url": "https://link.springer.com/conference/concur"}, + "url": "https://www.semanticscholar.org/paper/ea4ebac26e0af692fbc4848c4496cd152f088e85", + "title": "Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time + Process Calculus", "abstract": null, "venue": "International Conference on + Concurrency Theory", "year": 2003, "referenceCount": 36, "citationCount": + 49, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-09-03", "journal": + {"pages": "323-345"}, "authors": [{"authorId": "144372606", "name": "P. Mateus"}, + {"authorId": "145173790", "name": "John C. Mitchell"}, {"authorId": "1749608", + "name": "A. Scedrov"}]}, {"paperId": "fd489f9413f78ba2012acdc1d145382b38af45a3", + "externalIds": {"MAG": "2013055900", "CorpusId": 14854040}, "corpusId": 14854040, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd489f9413f78ba2012acdc1d145382b38af45a3", + "title": "Chaitin Numbers and Strong Reducibilities", "abstract": "We prove + that any Chaitin \u03a9 number (i.e., the halting probability of a universal + self-delimiting Turing machine) is wtt-complete, but not tt-complete. In this + way we obtain a whole class of natural examples of wtt-complete but not tt-complete + r.e. sets. The proof is direct and elementary.", "venue": "", "year": 1997, + "referenceCount": 14, "citationCount": 48, "influentialCitationCount": 8, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Journal of Universal Computer + Science", "volume": ""}, "authors": [{"authorId": "1685717", "name": "Cristian + S. Calude"}, {"authorId": "2350687", "name": "A. Nies"}]}, {"paperId": "2847c9299f5f11722a29584f63c0f3c0101cc33c", + "externalIds": {"MAG": "2025732942", "DBLP": "journals/cj/PrasseR98", "DOI": + "10.1093/comjnl/41.6.357", "CorpusId": 152196}, "corpusId": 152196, "publicationVenue": + {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", "name": "Computer/law journal", + "type": "journal", "alternate_names": ["Computer journal", "The Computer Journal", + "Comput j", "Comput J"], "issn": "0164-8756", "alternate_issns": ["0010-4620"], + "url": "https://repository.jmls.edu/jitpl/all_issues.html", "alternate_urls": + ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/2847c9299f5f11722a29584f63c0f3c0101cc33c", + "title": "Why Church''s Thesis Still Holds. Some Notes on Peter Wegner''s + Tracts on Interaction and Computability", "abstract": "Peter Wegner\u2019s + definition of computability differs markedly from the classical term as established + by Church, Kleene, Markov, Post, Turing et al. Wegner identifies interaction + as the main feature of today\u2019s systems which is lacking in the classical + treatment of computability. We compare the different approaches and argue + whether or not Wegner\u2019s criticism is appropriate. Taking into account + the major arguments from the literature, we show that Church\u2019s thesis + still holds.", "venue": "Computer/law journal", "year": 1998, "referenceCount": + 35, "citationCount": 63, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-01-13", "journal": {"name": "ArXiv", "volume": "abs/1701.03757"}, - "authors": [{"authorId": "47497262", "name": "Dustin Tran"}, {"authorId": - "28552618", "name": "M. Hoffman"}, {"authorId": "2278009", "name": "R. Saurous"}, - {"authorId": "2445241", "name": "E. Brevdo"}, {"authorId": "1702318", "name": - "K. Murphy"}, {"authorId": "1796335", "name": "D. Blei"}]}, {"paperId": "41b3fd8931ac1cf36129a6ca61ff7c88bf2a26b6", - "externalIds": {"MAG": "2056431243", "DBLP": "conf/stoc/Beame89", "DOI": "10.1145/73007.73026", - "CorpusId": 1979487}, "url": "https://www.semanticscholar.org/paper/41b3fd8931ac1cf36129a6ca61ff7c88bf2a26b6", + "publicationDate": null, "journal": {"name": "Comput. J.", "pages": "357-362", + "volume": "41"}, "authors": [{"authorId": "145027863", "name": "M. Prasse"}, + {"authorId": "1756399", "name": "P. Rittgen"}]}, {"paperId": "498f4509135c7b52a4911f94e9edd440716115a6", + "externalIds": {"MAG": "2045812316", "DOI": "10.1038/372770A0", "CorpusId": + 41451610, "PubMed": "7695716"}, "corpusId": 41451610, "publicationVenue": + {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, + "url": "https://www.semanticscholar.org/paper/498f4509135c7b52a4911f94e9edd440716115a6", + "title": "A thalamic nucleus specific for pain and temperature sensation", + "abstract": null, "venue": "Nature", "year": 1994, "referenceCount": 23, "citationCount": + 555, "influentialCitationCount": 36, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-12-22", "journal": {"name": "Nature", "pages": "770-773", + "volume": "372"}, "authors": [{"authorId": "145856492", "name": "A. Craig"}, + {"authorId": "1943750918", "name": "M. Bushnell"}, {"authorId": "3659090", + "name": "E. Zhang"}, {"authorId": "144105546", "name": "A. Blomqvist"}]}, + {"paperId": "41b3fd8931ac1cf36129a6ca61ff7c88bf2a26b6", "externalIds": {"MAG": + "2056431243", "DBLP": "conf/stoc/Beame89", "DOI": "10.1145/73007.73026", "CorpusId": + 1979487}, "corpusId": 1979487, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/41b3fd8931ac1cf36129a6ca61ff7c88bf2a26b6", "title": "A general sequential time-space tradeoff for finding unique elements", "abstract": "An optimal &OHgr;(n2) lower bound is shown for the time-space product of any R-way branching @@ -30008,13 +34241,40 @@ interactions: space such as off-line multi-tape Turing machines and off-line log-cost RAMs.", "venue": "Symposium on the Theory of Computing", "year": 1989, "referenceCount": 9, "citationCount": 95, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1989-02-01", "journal": {"name": "SIAM - J. Comput.", "pages": "270-277", "volume": "20"}, "authors": [{"authorId": - "1791374", "name": "P. Beame"}]}, {"paperId": "a5a882eab34d7d3fe39929044adeadf09a9e5a83", - "externalIds": {"MAG": "2337640037", "CorpusId": 14461305}, "url": "https://www.semanticscholar.org/paper/a5a882eab34d7d3fe39929044adeadf09a9e5a83", + "openAccessPdf": {"url": "http://homes.cs.washington.edu/%7Ebeame/papers/sorting.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1989-02-01", "journal": {"name": "SIAM J. Comput.", "pages": "270-277", "volume": + "20"}, "authors": [{"authorId": "1791374", "name": "P. Beame"}]}, {"paperId": + "fb9f1a2cf245402ea1d7005775497257e56a4415", "externalIds": {"MAG": "2008915966", + "DOI": "10.1525/AA.1998.100.4.876", "CorpusId": 143518882}, "corpusId": 143518882, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fb9f1a2cf245402ea1d7005775497257e56a4415", + "title": "Cognitive tracks of cultural inheritance: how evolved intuitive + ontology governs cultural transmission", "abstract": "\"Acquired culture\" + depends on social transmission and displays salient cross-cultural variability. + It seems unconnected to adaptive fitness. It is, however, constrained by evolved + properties of the mind. Recurrent-not necessarily universal-fea\u00ad tures + of acquired culture can be explained by taking into account the early development + and constraining power of intuitive ontology, a set of principled domain-specific + inferential capacities. These allow us to predict recurrent trends in domains + as diverse as folk-psychology, representations of natural kinds, the uses + of literacy, the acquisition of scientific beliefs, and even the limiting-case + of religious ontologies. In all these domains the notion of cultural transmission + along domain\u00ad specific cognitive tracks governed by intuitive ontology + is supported by independent psychological evidence and provides testable explanations + for recurrent features in the anthropological record. [evolution, culture, + cultural universals, cognitive development, evolutionary psychologyJ", "venue": + "", "year": 1998, "referenceCount": 84, "citationCount": 179, "influentialCitationCount": + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1998-12-01", "journal": {"name": "American Anthropologist", "pages": "876-889", + "volume": "100"}, "authors": [{"authorId": "39587026", "name": "P. Boyer"}]}, + {"paperId": "a5a882eab34d7d3fe39929044adeadf09a9e5a83", "externalIds": {"MAG": + "2337640037", "CorpusId": 14461305}, "corpusId": 14461305, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a5a882eab34d7d3fe39929044adeadf09a9e5a83", "title": "Data Mining-driven Manufacturing Process Optimization", "abstract": "High competitive pressure in the global manufac- turing industry makes efficient, effective and continuously improved manufacturing processes a critical success @@ -30026,25 +34286,151 @@ interactions: optimization as novel data mining approaches provided by the Advanced Manufacturing Analytics Platform. We demonstrate their usefulness through use cases and depict suitable data mining techniques as well as implementation details.", - "venue": "", "year": 2012, "referenceCount": 42, "citationCount": 94, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "venue": "", "year": 2012, "referenceCount": 42, "citationCount": 96, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "39290791", "name": "Christoph + Gr\u00f6ger"}, {"authorId": "2767068", "name": "Florian Niedermann"}, {"authorId": + "1682415", "name": "B. Mitschang"}]}, {"paperId": "fe19339703f83c03775b78c80dfccc988cc5a8cf", + "externalIds": {"DBLP": "journals/sLogica/Joosten16", "ArXiv": "1404.4483", + "MAG": "1628975265", "DOI": "10.1007/s11225-016-9674-z", "CorpusId": 207243168}, + "corpusId": 207243168, "publicationVenue": {"id": "c882a752-b0fa-4663-ba2f-0bd0c6b18018", + "name": "Studia Logica: An International Journal for Symbolic Logic", "type": + "journal", "alternate_names": ["Studia Logica", "Stud Logica", "Stud Logica + Int J Symb Log"], "issn": "0039-3215", "url": "https://link.springer.com/journal/11225", + "alternate_urls": ["http://www.jstor.org/journals/00393215.html", "http://www.studialogica.org/", + "https://www.jstor.org/journal/studlogi"]}, "url": "https://www.semanticscholar.org/paper/fe19339703f83c03775b78c80dfccc988cc5a8cf", + "title": "Turing\u2013Taylor Expansions for Arithmetic Theories", "abstract": + null, "venue": "Studia Logica: An International Journal for Symbolic Logic", + "year": 2014, "referenceCount": 18, "citationCount": 17, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1404.4483", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-04-17", "journal": {"name": "Studia Logica", "pages": "1225-1243", "volume": + "104"}, "authors": [{"authorId": "1748961", "name": "J. Joosten"}]}, {"paperId": + "bd1342b451fe3acf60313c57e79fc491d70521fa", "externalIds": {"MAG": "2166625431", + "DOI": "10.1146/ANNUREV.PH.48.030186.003145", "CorpusId": 40035018, "PubMed": + "2871810"}, "corpusId": 40035018, "publicationVenue": {"id": "eedc6e61-e846-485a-a273-0cc8bb06d7d3", + "name": "Annual Review of Physiology", "type": "journal", "alternate_names": + ["Annu Rev Physiol"], "issn": "0066-4278", "url": "https://www.annualreviews.org/journal/physiol", + "alternate_urls": ["https://www.annualreviews.org/loi/physiol", "http://physiol.annualreviews.org/", + "http://arjournals.annualreviews.org/loi/physiol"]}, "url": "https://www.semanticscholar.org/paper/bd1342b451fe3acf60313c57e79fc491d70521fa", + "title": "Neurotransmitters in temperature control.", "abstract": "Many neurotransmitters + may be involved in central regulation of body tempera\u00ad ture in normothermia, + during heat and cold stress, in fever, and in exercise. Emphasis on amines + and prostaglandins has declined somewhat, and a major focus in recent years + has been upon the possibility that certain peptides partici\u00ad pate in + central nervous system (CNS) mediation of temperature control (9, 10). Several + of these peptides were originally isolated from pituitary tissue or the alimentary + canal, but they also occur in widespread regions of the CNS. While some, such + as adrenocorticotropic hormone (ACTH), have well known func\u00ad tions in + the periphery, the central roles of most peptides are much less un\u00ad derstood.", + "venue": "Annual Review of Physiology", "year": 1986, "referenceCount": 39, + "citationCount": 90, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": null, "journal": {"name": + "Annual review of physiology", "pages": "\n 613-23\n ", "volume": + "48"}, "authors": [{"authorId": "2381935", "name": "J. M. Lipton"}, {"authorId": + "145423230", "name": "W. G. Clark"}]}, {"paperId": "6c811210ec2a431003705b67a96e2cbfc2331243", + "externalIds": {"MAG": "2008666095", "DOI": "10.1126/science.1218417", "CorpusId": + 44455792, "PubMed": "22499929"}, "corpusId": 44455792, "publicationVenue": + {"id": "f59506a8-d8bb-4101-b3d4-c4ac3ed03dad", "name": "Science", "type": + "journal", "issn": "0193-4511", "alternate_issns": ["0036-8075"], "url": "https://www.jstor.org/journal/science", + "alternate_urls": ["https://www.sciencemag.org/", "http://www.sciencemag.org/", + "http://www.jstor.org/journals/00368075.html", "http://www.sciencemag.org/archive/"]}, + "url": "https://www.semanticscholar.org/paper/6c811210ec2a431003705b67a96e2cbfc2331243", + "title": "Beyond Turing''s Machines", "abstract": "Whether all types of computation\u2014including + that of our own minds\u2014can be modeled as computer programs remains an + open question. In marking Alan Turing''s centenary, it''s worth asking what + was his most fundamental achievement and what he left for future science to + take up when he took his own life in 1954. His success in World War II, as + the chief scientific figure in the British cryptographic effort, with hands-on + responsibility for the Atlantic naval conflict, had a great and immediate + impact. But in its ever-growing influence since that time, the principle of + the universal machine, which Turing published in 1937 (1), beats even this.", + "venue": "Science", "year": 2012, "referenceCount": 6, "citationCount": 14, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Sociology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-04-13", "journal": {"name": "Science", "pages": "163 + - 164", "volume": "336"}, "authors": [{"authorId": "144443425", "name": "A. + Hodges"}]}, {"paperId": "54d1ef1ad676ebb553ddba2f7ed217509e81797f", "externalIds": + {"MAG": "2011058337", "DBLP": "journals/corr/cs-AI-0207097", "ArXiv": "cs/0207097", + "DOI": "10.1023/B:MACH.0000015880.99707.b2", "CorpusId": 791679}, "corpusId": + 791679, "publicationVenue": {"id": "22c9862f-a25e-40cd-9d31-d09e68a293e6", + "name": "Machine-mediated learning", "type": "journal", "alternate_names": + ["Mach learn", "Machine Learning", "Mach Learn"], "issn": "0732-6718", "alternate_issns": + ["0885-6125"], "url": "http://www.springer.com/computer/artificial/journal/10994", + "alternate_urls": ["https://link.springer.com/journal/10994", "http://www.springer.com/west/home/computer/artificial?SGWID=4-147-70-35726603-0"]}, + "url": "https://www.semanticscholar.org/paper/54d1ef1ad676ebb553ddba2f7ed217509e81797f", + "title": "Optimal Ordered Problem Solver", "abstract": null, "venue": "Machine-mediated + learning", "year": 2002, "referenceCount": 102, "citationCount": 182, "influentialCitationCount": + 11, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/cs/0207097", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-07-31", "journal": {"name": "Machine Learning", "pages": + "211-254", "volume": "54"}, "authors": [{"authorId": "145341374", "name": + "J. Schmidhuber"}]}, {"paperId": "107b054697110f8e43d5c379c413686ad1941674", + "externalIds": {"MAG": "1981823488", "DOI": "10.1130/G23534A.1", "CorpusId": + 26551467}, "corpusId": 26551467, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/107b054697110f8e43d5c379c413686ad1941674", + "title": "Direct dating of Archean microbial ichnofossils", "abstract": "Well-preserved + Archean pillow lavas from the ca. 3.35 Ga Euro Basalt of the Pilbara Craton, + Western Australia, contain micron-sized tubular structures mineralized by + titanite (CaTiSiO 4 ) with residual organic carbon preserved along their margins. + Direct U-Pb dating of titanite in the tubular structures demonstrates an Archean + age. These tubular microstruc- tures are identical to microbial ichnofossils + in modern basalts, ophiolites, and greenstone belts, and are interpreted as + a biogenic signature in these ancient rocks. Microbial colonization of basaltic + glass thus appears to have been part of a deep subsurface biosphere established + early in Earth''s history.", "venue": "", "year": 2007, "referenceCount": + 31, "citationCount": 92, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": + "Geology", "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}, + {"category": "Geography", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2007-06-01", "journal": {"name": "Geology", "pages": + "487-490", "volume": "35"}, "authors": [{"authorId": "39441164", "name": "N. + Banerjee"}, {"authorId": "1907182", "name": "A. Simonetti"}, {"authorId": + "4217788", "name": "H. Furnes"}, {"authorId": "3831128", "name": "K. Muehlenbachs"}, + {"authorId": "4250697", "name": "H. Staudigel"}, {"authorId": "4260452", "name": + "L. Heaman"}, {"authorId": "103639433", "name": "M. V. Kranendonk"}]}, {"paperId": + "a963e8068ca172e978fcaf8bc78db66bd0619a6c", "externalIds": {"MAG": "2563980011", + "CorpusId": 8948399}, "corpusId": 8948399, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a963e8068ca172e978fcaf8bc78db66bd0619a6c", + "title": "AffectiveSpace: Blending Common Sense and Affective Knowledge to + Perform Emotive Reasoning", "abstract": "The detection of emotions in text + is a key issue for the de- velopment of intelligent systems. As demonstrated + by the Turing test, a machine cannot be considered really intelligent unless + it is also capable of perceiving and expressing emotions. In this work we + focus on building a knowledge base which merges Common Sense and affective + knowledge and use dimensionality reduction to perform emotive reasoning on + it.", "venue": "", "year": 2009, "referenceCount": 15, "citationCount": 63, + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "39290791", "name": "Christoph Gr\u00f6ger"}, - {"authorId": "2767068", "name": "Florian Niedermann"}, {"authorId": "1682415", - "name": "B. Mitschang"}]}, {"paperId": "9447b581915a9a5df45e91f906eb4860940d2a1f", - "externalIds": {"DBLP": "conf/fct/Margenstern93", "MAG": "2912355105", "DOI": - "10.1007/3-540-57163-9_32", "CorpusId": 41413995}, "url": "https://www.semanticscholar.org/paper/9447b581915a9a5df45e91f906eb4860940d2a1f", - "title": "Non Erasing Turing Machines: A Frontier Between a Decidable Halting - Problem and Universality", "abstract": null, "venue": "FCT", "year": 1993, - "referenceCount": 4, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1993-08-23", "journal": {"pages": "375-385"}, "authors": - [{"authorId": "1697682", "name": "M. Margenstern"}]}, {"paperId": "b387e573e080cf38916a0299a5ed987a78a066e6", - "externalIds": {"CorpusId": 15480099}, "url": "https://www.semanticscholar.org/paper/b387e573e080cf38916a0299a5ed987a78a066e6", + "volume": ""}, "authors": [{"authorId": "49943757", "name": "E. Cambria"}, + {"authorId": "2082388090", "name": "A. Hussain"}, {"authorId": "2232845", + "name": "Catherine Havasi"}, {"authorId": "2200829", "name": "Chris Eckl"}]}, + {"paperId": "d879d9eaa56ddd4dac40963c79f35c852dff05ca", "externalIds": {"MAG": + "1572967271", "DOI": "10.1007/978-1-4613-9435-8_10", "CorpusId": 60705963}, + "corpusId": 60705963, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d879d9eaa56ddd4dac40963c79f35c852dff05ca", + "title": "What is a Computation", "abstract": null, "venue": "", "year": 1978, + "referenceCount": 10, "citationCount": 43, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "pages": "241-267", + "volume": ""}, "authors": [{"authorId": "100651835", "name": "Martin Davis"}]}, + {"paperId": "b387e573e080cf38916a0299a5ed987a78a066e6", "externalIds": {"CorpusId": + 15480099}, "corpusId": 15480099, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b387e573e080cf38916a0299a5ed987a78a066e6", "title": "Proof That Every Typed Formula Has a Normal Form Universal Turing Machine", "abstract": "16 bit architectures and simulated annealing, while appropriate in theory, have not until recently been considered natural. after @@ -30053,12 +34439,13 @@ interactions: in this paper is not on whether DHTs can be made scalable, metamorphic, and interactive , but rather on presenting an application for event-driven configurations (Wae).", "venue": "", "year": null, "referenceCount": 152, "citationCount": - 82, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "247d5dba32c82fea953ebe6a7106a21e67fc7295", "externalIds": - {"MAG": "2018884575", "DOI": "10.1088/0253-6102/45/4/037", "CorpusId": 121043444}, - "url": "https://www.semanticscholar.org/paper/247d5dba32c82fea953ebe6a7106a21e67fc7295", + 82, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "247d5dba32c82fea953ebe6a7106a21e67fc7295", + "externalIds": {"MAG": "2018884575", "DOI": "10.1088/0253-6102/45/4/037", + "CorpusId": 121043444}, "corpusId": 121043444, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/247d5dba32c82fea953ebe6a7106a21e67fc7295", "title": "Turing Patterns in a Reaction-Diffusion System", "abstract": "We have further investigated Turing patterns in a reaction-diffusion system by theoretical analysis and numerical simulations. Simple Turing patterns and @@ -30068,71 +34455,152 @@ interactions: model. Our numerical results provide additional insight into understanding the mechanism of development of Turing patterns and predicting new pattern formations.", "venue": "", "year": 2006, "referenceCount": 13, "citationCount": - 14, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2006-04-15", "journal": {"name": "Communications in Theoretical - Physics", "pages": "761-764", "volume": "45"}, "authors": [{"authorId": "88505155", - "name": "Wu Yan-ning"}, {"authorId": "101749366", "name": "Wang Ping-jian"}, - {"authorId": "1411136547", "name": "Hou Chun-ju"}]}, {"paperId": "d1f0664ca921f8d7da30a3362c7e5a32a2f51931", - "externalIds": {"DOI": "10.1007/978-1-4471-0161-1", "CorpusId": 34834967}, - "url": "https://www.semanticscholar.org/paper/d1f0664ca921f8d7da30a3362c7e5a32a2f51931", - "title": "Turing\u2019s Connectionism", "abstract": null, "venue": "Discrete - Mathematics & Theoretical Computer Science", "year": 2002, "referenceCount": - 0, "citationCount": 14, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "35502319", "name": "Christof - Teuscher Dipl-Ing Epfl"}]}, {"paperId": "ea4ebac26e0af692fbc4848c4496cd152f088e85", - "externalIds": {"MAG": "1607325103", "DBLP": "conf/concur/MateusMS03", "DOI": - "10.1007/978-3-540-45187-7_22", "CorpusId": 6008540}, "url": "https://www.semanticscholar.org/paper/ea4ebac26e0af692fbc4848c4496cd152f088e85", - "title": "Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time - Process Calculus", "abstract": null, "venue": "International Conference on - Concurrency Theory", "year": 2003, "referenceCount": 36, "citationCount": - 49, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2003-09-03", "journal": {"pages": - "323-345"}, "authors": [{"authorId": "144372606", "name": "P. Mateus"}, {"authorId": - "145173790", "name": "John C. Mitchell"}, {"authorId": "1749608", "name": - "A. Scedrov"}]}, {"paperId": "fb9f1a2cf245402ea1d7005775497257e56a4415", "externalIds": - {"MAG": "2008915966", "DOI": "10.1525/AA.1998.100.4.876", "CorpusId": 143518882}, - "url": "https://www.semanticscholar.org/paper/fb9f1a2cf245402ea1d7005775497257e56a4415", - "title": "Cognitive tracks of cultural inheritance: how evolved intuitive - ontology governs cultural transmission", "abstract": "\"Acquired culture\" - depends on social transmission and displays salient cross-cultural variability. - It seems unconnected to adaptive fitness. It is, however, constrained by evolved - properties of the mind. Recurrent-not necessarily universal-fea\u00ad tures - of acquired culture can be explained by taking into account the early development - and constraining power of intuitive ontology, a set of principled domain-specific - inferential capacities. These allow us to predict recurrent trends in domains - as diverse as folk-psychology, representations of natural kinds, the uses - of literacy, the acquisition of scientific beliefs, and even the limiting-case - of religious ontologies. In all these domains the notion of cultural transmission - along domain\u00ad specific cognitive tracks governed by intuitive ontology - is supported by independent psychological evidence and provides testable explanations - for recurrent features in the anthropological record. [evolution, culture, - cultural universals, cognitive development, evolutionary psychologyJ", "venue": - "", "year": 1998, "referenceCount": 84, "citationCount": 178, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-12-01", - "journal": {"name": "American Anthropologist", "pages": "876-889", "volume": - "100"}, "authors": [{"authorId": "39587026", "name": "P. Boyer"}]}, {"paperId": - "fe19339703f83c03775b78c80dfccc988cc5a8cf", "externalIds": {"ArXiv": "1404.4483", - "DBLP": "journals/sLogica/Joosten16", "MAG": "1628975265", "DOI": "10.1007/s11225-016-9674-z", - "CorpusId": 207243168}, "url": "https://www.semanticscholar.org/paper/fe19339703f83c03775b78c80dfccc988cc5a8cf", - "title": "Turing\u2013Taylor Expansions for Arithmetic Theories", "abstract": - null, "venue": "Studia Logica: An International Journal for Symbolic Logic", - "year": 2014, "referenceCount": 20, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-04-17", "journal": {"name": "Studia Logica", "pages": "1225-1243", "volume": - "104"}, "authors": [{"authorId": "1748961", "name": "J. Joosten"}]}, {"paperId": - "cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", "externalIds": {"CorpusId": 31729897}, - "url": "https://www.semanticscholar.org/paper/cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", + 14, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2006-04-15", "journal": {"name": + "Communications in Theoretical Physics", "pages": "761-764", "volume": "45"}, + "authors": [{"authorId": "88505155", "name": "Wu Yan-ning"}, {"authorId": + "101749366", "name": "Wang Ping-jian"}, {"authorId": "1411136547", "name": + "Hou Chun-ju"}]}, {"paperId": "9ebc9a307018a1b4750b4264234a6a409435dea4", + "externalIds": {"DBLP": "conf/coco/BuhrmanH08", "MAG": "2116887008", "DOI": + "10.1109/CCC.2008.21", "CorpusId": 2664381}, "corpusId": 2664381, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9ebc9a307018a1b4750b4264234a6a409435dea4", + "title": "NP-Hard Sets Are Exponentially Dense Unless coNP C NP/poly", "abstract": + "We show that hard sets S for NP must have exponential density, i.e. |S=n| + ges 2nepsi for some isin > 0 and infinitely many n, unless coNP sube NP/poly + and the polynomial-time hierarchy collapses. This result holds for Turing + reductions that make n1-isin queries. In addition we study the instance complexity + o/NP- hard problems and show that hard sets also have an exponential amount + of instances that have instance complexity n for some sigma > 0. This result + also holds for Turing reductions that make n1-isin queries.", "venue": "2008 + 23rd Annual IEEE Conference on Computational Complexity", "year": 2008, "referenceCount": + 15, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://ir.cwi.nl/pub/13767/13767A.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2008-06-22", "journal": {"name": "2008 23rd Annual IEEE Conference on Computational + Complexity", "pages": "1-7"}, "authors": [{"authorId": "1747509", "name": + "H. Buhrman"}, {"authorId": "1742012", "name": "J. M. Hitchcock"}]}, {"paperId": + "9447b581915a9a5df45e91f906eb4860940d2a1f", "externalIds": {"DBLP": "conf/fct/Margenstern93", + "MAG": "2912355105", "DOI": "10.1007/3-540-57163-9_32", "CorpusId": 41413995}, + "corpusId": 41413995, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9447b581915a9a5df45e91f906eb4860940d2a1f", + "title": "Non Erasing Turing Machines: A Frontier Between a Decidable Halting + Problem and Universality", "abstract": null, "venue": "FCT", "year": 1993, + "referenceCount": 4, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1993-08-23", "journal": {"pages": "375-385"}, + "authors": [{"authorId": "1697682", "name": "M. Margenstern"}]}, {"paperId": + "966e92835387a6ab1d78aa80576a1ee2c963a3d5", "externalIds": {"MAG": "1499204852", + "DBLP": "journals/scholarpedia/Searle09", "DOI": "10.1002/0470018860.S00159", + "CorpusId": 60987687}, "corpusId": 60987687, "publicationVenue": {"id": "856e61df-ae80-4713-a1f1-6afd81e6e2b1", + "name": "Scholarpedia", "type": "journal", "issn": "1941-6016", "url": "http://www.scholarpedia.org/"}, + "url": "https://www.semanticscholar.org/paper/966e92835387a6ab1d78aa80576a1ee2c963a3d5", + "title": "Chinese room argument", "abstract": "The Chinese room argument is + a refutation of \u2018strong artificial intelligence\u2019 (strong AI), the + view that an appropriately programmed digital computer capable of passing + the Turing test would thereby have mental states and a mind in the same sense + in which human beings have mental states and a mind. Strong AI is distinguished + from weak AI, which is the view that the computer is a useful tool in studying + the mind, just as it is a useful tool in other disciplines ranging from molecular + biology to weather prediction. \n \n \nKeywords: \n \nartificial intelligence; + \nbrain; \ncomputational theory of the mind; \nsemantics; \nsyntax", "venue": + "Scholarpedia", "year": 2006, "referenceCount": 31, "citationCount": 91, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Philosophy", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-01-15", "journal": {"name": "Scholarpedia", "pages": + "3100", "volume": "4"}, "authors": [{"authorId": "34493294", "name": "J. Searle"}]}, + {"paperId": "de32a49643cb9d089a005b238bf1c4706c869d1c", "externalIds": {"MAG": + "1219381982", "DOI": "10.3934/PROC.2007.2007.436", "CorpusId": 20263536}, + "corpusId": 20263536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de32a49643cb9d089a005b238bf1c4706c869d1c", + "title": "TURING PATTERNS ON GROWING SPHERES: THE EXPONENTIAL CASE", "abstract": + "We consider Turing patterns for reaction-diusion systems on the surface of + a growing sphere. In particular, we are interested in the eect of dynamic + growth on the pattern formation. We consider exponential isotropic growth + of the sphere and perform a linear stability analysis and compare the results + with numerical simulations.", "venue": "", "year": 2007, "referenceCount": + 16, "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-09-01", + "journal": {"name": "", "pages": "436", "volume": "2007"}, "authors": [{"authorId": + "2242932", "name": "Julijana Gjorgjieva"}, {"authorId": "144195342", "name": + "Jon Jacobsen"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5", + "externalIds": {"MAG": "2499467011", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0023", + "CorpusId": 62965306}, "corpusId": 62965306, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5", + "title": "The Turing\u2013Wilkinson lecture series (1946\u20137)", "abstract": + null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 6, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "external"}], "publicationTypes": null, "publicationDate": "2005-04-14", + "journal": {"name": "", "pages": "459-528", "volume": ""}, "authors": [{"authorId": + "2262347", "name": "A. Turing"}, {"authorId": "2056940608", "name": "J. H. + Wilkinson"}]}, {"paperId": "981f1229bc6aae709e79d3a2f64473375a49afd9", "externalIds": + {"DBLP": "journals/nc/Neary10", "MAG": "2952004160", "ArXiv": "0912.0928", + "DOI": "10.1007/s11047-010-9213-1", "CorpusId": 1637966}, "corpusId": 1637966, + "publicationVenue": {"id": "22ef711f-3d9c-4da7-a563-9238f938bb5b", "name": + "Natural Computing", "type": "journal", "alternate_names": ["Nat Comput"], + "issn": "1567-7818", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/11047?changeHeader", + "alternate_urls": ["https://link.springer.com/journal/11047"]}, "url": "https://www.semanticscholar.org/paper/981f1229bc6aae709e79d3a2f64473375a49afd9", + "title": "On the computational complexity of spiking neural P systems", "abstract": + null, "venue": "Natural Computing", "year": 2008, "referenceCount": 24, "citationCount": + 25, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/0912.0928", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Biology", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-08-25", "journal": {"name": "Natural Computing", + "pages": "831-851", "volume": "9"}, "authors": [{"authorId": "2221070", "name": + "Turlough Neary"}]}, {"paperId": "33f4bd91446ed324326db352fb5068767b3fba58", + "externalIds": {"DBLP": "journals/mima/Abramson08", "MAG": "2008932193", "DOI": + "10.1007/s11023-008-9094-6", "CorpusId": 1495837}, "corpusId": 1495837, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/33f4bd91446ed324326db352fb5068767b3fba58", + "title": "Turing\u2019s Responses to Two Objections", "abstract": null, "venue": + "Minds and Machines", "year": 2008, "referenceCount": 24, "citationCount": + 15, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Philosophy"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2008-06-01", "journal": + {"name": "Minds and Machines", "pages": "147-167", "volume": "18"}, "authors": + [{"authorId": "143610196", "name": "Darren Abramson"}]}, {"paperId": "48f3b7ad41e9f4ab118b7970c876f311622802bf", + "externalIds": {"DBLP": "conf/coco/AjtaiKS02", "MAG": "2794819100", "DOI": + "10.1109/CCC.2002.1004339", "CorpusId": 7595507}, "corpusId": 7595507, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/48f3b7ad41e9f4ab118b7970c876f311622802bf", + "title": "Sampling short lattice vectors and the closest lattice vector problem", + "abstract": "We present a 2/sup O(n)/ time Turing reduction from the closest + lattice vector problem to the shortest lattice vector problem. Our reduction + assumes access to a subroutine that solves SVP exactly and a subroutine to + sample short vectors from a lattice, and computes a (1+/spl epsi/)-approximation + to CVP As a consequence, using the SVP algorithm from (Ajtai et al., 2001), + we obtain a randomized 2[O(1+/spl epsi//sup -1/)n] algorithm to obtain a (1+/spl + epsi/)-approximation for the closest lattice vector problem in n dimensions. + This improves the existing time bound of O(n!) for CVP achieved by a deterministic + algorithm in (Blomer, 2000).", "venue": "Proceedings 17th IEEE Annual Conference + on Computational Complexity", "year": 2002, "referenceCount": 17, "citationCount": + 92, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2002-05-21", + "journal": {"name": "Proceedings 17th IEEE Annual Conference on Computational + Complexity", "pages": "53-57"}, "authors": [{"authorId": "1704344", "name": + "M. Ajtai"}, {"authorId": "1683442", "name": "Ravi Kumar"}, {"authorId": "1765251", + "name": "D. Sivakumar"}]}, {"paperId": "cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", + "externalIds": {"CorpusId": 31729897}, "corpusId": 31729897, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/cba63c96405a9b43cb90bc3303614aa7e6f2a7bc", "title": "Truth and Turing : Systems of Logic based on Ordinals", "abstract": "We should like to link Turing\u2019s construction in Systems of Logic based on Ordinals on progressions of theories, with some recent similar looking @@ -30177,190 +34645,22 @@ interactions: unprovable in PA (assuming that it was itself consistent). Martin Davis refers to the paper in his introduction in a volume of collected sources", "venue": "", "year": 2011, "referenceCount": 6, "citationCount": 32, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "2847c9299f5f11722a29584f63c0f3c0101cc33c", - "externalIds": {"MAG": "2025732942", "DBLP": "journals/cj/PrasseR98", "DOI": - "10.1093/comjnl/41.6.357", "CorpusId": 152196}, "url": "https://www.semanticscholar.org/paper/2847c9299f5f11722a29584f63c0f3c0101cc33c", - "title": "Why Church''s Thesis Still Holds. Some Notes on Peter Wegner''s - Tracts on Interaction and Computability", "abstract": "Peter Wegner\u2019s - definition of computability differs markedly from the classical term as established - by Church, Kleene, Markov, Post, Turing et al. Wegner identifies interaction - as the main feature of today\u2019s systems which is lacking in the classical - treatment of computability. We compare the different approaches and argue - whether or not Wegner\u2019s criticism is appropriate. Taking into account - the major arguments from the literature, we show that Church\u2019s thesis - still holds.", "venue": "Computer/law journal", "year": 1998, "referenceCount": - 35, "citationCount": 63, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Comput. J.", "pages": "357-362", "volume": "41"}, "authors": [{"authorId": - "145027863", "name": "M. Prasse"}, {"authorId": "1756399", "name": "P. Rittgen"}]}, - {"paperId": "5285666a3dfe50493ae1a74541061abfe4eddee7", "externalIds": {"MAG": - "2044240887", "DOI": "10.1007/BF02937291", "CorpusId": 4182351}, "url": "https://www.semanticscholar.org/paper/5285666a3dfe50493ae1a74541061abfe4eddee7", - "title": "Weak density and cupping in the d-r.e. degrees", "abstract": null, - "venue": "", "year": 1989, "referenceCount": 13, "citationCount": 49, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}, {"category": "Geology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1989-06-01", "journal": {"name": - "Israel Journal of Mathematics", "pages": "137-152", "volume": "67"}, "authors": - [{"authorId": "98630872", "name": "S. Cooper"}, {"authorId": "2805805", "name": - "S. Lempp"}, {"authorId": "2105856683", "name": "Philip Watson"}]}, {"paperId": - "b4b0679e94bd5921779b4b289b858aa34623ff47", "externalIds": {"MAG": "1974979129", - "DOI": "10.1103/PHYSREVLETT.85.2212", "CorpusId": 20123973, "PubMed": "10970500"}, - "url": "https://www.semanticscholar.org/paper/b4b0679e94bd5921779b4b289b858aa34623ff47", - "title": "Spontaneous symmetry breaking turing-type pattern formation in a - confined Dictyostelium cell mass.", "abstract": "We have discovered a new - type of patterning which occurs in a two-dimensionally confined cell mass - of the cellular slime mold Dictyostelium discoideum. Besides the longitudinal - structure reported earlier, we observed a spontaneous symmetry breaking spot - pattern whose wavelength shows similar strain dependency to that of the longitudinal - pattern. We propose that these structures are due to a reaction-diffusion - Turing instability similar to the one which has been exemplified by CIMA (chlorite-iodide-malonic - acid) reaction. The present finding may exhibit the first biochemical Turing - structure in a developmental system with a controllable boundary condition.", - "venue": "Physical Review Letters", "year": 2000, "referenceCount": 0, "citationCount": - 27, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-09-04", "journal": {"name": "Physical review letters", - "pages": "\n 2212-5\n ", "volume": "85 10"}, "authors": [{"authorId": - "2919397", "name": "S. Sawai"}, {"authorId": "144978760", "name": "Y. Maeda"}, - {"authorId": "3258652", "name": "Y. Sawada"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5", - "externalIds": {"MAG": "2499467011", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0023", - "CorpusId": 62965306}, "url": "https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5", - "title": "The Turing\u2013Wilkinson lecture series (1946\u20137)", "abstract": - null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 6, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], - "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": - null, "publicationDate": "2005-04-14", "journal": {"name": "", "pages": "459-528", - "volume": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId": - "2056940608", "name": "J. H. Wilkinson"}]}, {"paperId": "498f4509135c7b52a4911f94e9edd440716115a6", - "externalIds": {"MAG": "2045812316", "DOI": "10.1038/372770A0", "CorpusId": - 41451610, "PubMed": "7695716"}, "url": "https://www.semanticscholar.org/paper/498f4509135c7b52a4911f94e9edd440716115a6", - "title": "A thalamic nucleus specific for pain and temperature sensation", - "abstract": null, "venue": "Nature", "year": 1994, "referenceCount": 23, "citationCount": - 555, "influentialCitationCount": 36, "isOpenAccess": false, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1994-12-22", "journal": {"name": "Nature", "pages": "770-773", - "volume": "372"}, "authors": [{"authorId": "145856492", "name": "A. Craig"}, - {"authorId": "1943750918", "name": "M. Bushnell"}, {"authorId": "3659090", - "name": "E. Zhang"}, {"authorId": "144105546", "name": "A. Blomqvist"}]}, - {"paperId": "33f4bd91446ed324326db352fb5068767b3fba58", "externalIds": {"DBLP": - "journals/mima/Abramson08", "MAG": "2008932193", "DOI": "10.1007/s11023-008-9094-6", - "CorpusId": 1495837}, "url": "https://www.semanticscholar.org/paper/33f4bd91446ed324326db352fb5068767b3fba58", - "title": "Turing\u2019s Responses to Two Objections", "abstract": null, "venue": - "Minds and Machines", "year": 2008, "referenceCount": 24, "citationCount": - 15, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2008-06-01", "journal": {"name": "Minds - and Machines", "pages": "147-167", "volume": "18"}, "authors": [{"authorId": - "143610196", "name": "Darren Abramson"}]}, {"paperId": "b8292848f5278b3bc2f20c8294c8b80c203849cd", - "externalIds": {"MAG": "1968913361", "DOI": "10.1115/1.3269892", "CorpusId": - 58485647}, "url": "https://www.semanticscholar.org/paper/b8292848f5278b3bc2f20c8294c8b80c203849cd", - "title": "Machinery Noise and Diagnostics", "abstract": "This book is a gem! - The field of noise control developed very rapidly in the past two and a half - decades. The control of noise must be contemplated in all stages of design - in the engineering of (a) industrial and office machinery, (b) struc ture - and engines (aircraft, power plant and automotive), (c) propeller noise, (d) - home appliances, and (e) other sources of noise in the immediate environment. - At one time, engineers controlled noise in general by common sense or trial - and error. Noise sources stem from a number of different areas. They are (/) - origin, (g) structures and their (h) pumping liquids in transforming and transporting - of mechanical (/'') vibration and and (j) of Requirements for improved instrumentation - are a", "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 174, - "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1987-07-29", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "40626985", "name": "R. Lyon"}, {"authorId": "143756562", - "name": "H. Saunders"}]}, {"paperId": "a963e8068ca172e978fcaf8bc78db66bd0619a6c", - "externalIds": {"MAG": "2563980011", "CorpusId": 8948399}, "url": "https://www.semanticscholar.org/paper/a963e8068ca172e978fcaf8bc78db66bd0619a6c", - "title": "AffectiveSpace: Blending Common Sense and Affective Knowledge to - Perform Emotive Reasoning", "abstract": "The detection of emotions in text - is a key issue for the de- velopment of intelligent systems. As demonstrated - by the Turing test, a machine cannot be considered really intelligent unless - it is also capable of perceiving and expressing emotions. In this work we - focus on building a knowledge base which merges Common Sense and affective - knowledge and use dimensionality reduction to perform emotive reasoning on - it.", "venue": "", "year": 2009, "referenceCount": 15, "citationCount": 63, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], - "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "49943757", "name": "E. Cambria"}, {"authorId": "2082388090", - "name": "A. Hussain"}, {"authorId": "2232845", "name": "Catherine Havasi"}, - {"authorId": "2200829", "name": "Chris Eckl"}]}, {"paperId": "446b7f6c74c7f1ed912a19b6810bff5965309bf2", - "externalIds": {"MAG": "2044534703", "DOI": "10.3354/CR022215", "CorpusId": - 56151200}, "url": "https://www.semanticscholar.org/paper/446b7f6c74c7f1ed912a19b6810bff5965309bf2", - "title": "A GIS based empirical model to simulate air temperature variations - in the G\u00f6teborg urban area during the night", "abstract": "This paper - presents a GIS based empirical model to simulate wind and/or air tempera- - ture variations over land. The technique is based on meteorological data (wind - direction and wind speed, temperature and cloud cover) from one permanent - reference station, a digital local climate map and a digital land use map. - The focus of the paper is to apply and evaluate the technique for clear and - calm night-time weather conditions in Goteborg, Sweden. Hourly data from a - monitoring network including 31 temperature stations are used in the verification - of simulations made using the model. These data are also used for a description - of geographical factors that influence air tempera- ture variations in the - Goteborg urban district. The technique is a potential tool for urban planning - purposes but the verification shows that further improvements are needed. - The main problems identified are related to details in the climate map but - also to some of the algorithms that need to be refined.", "venue": "", "year": - 2002, "referenceCount": 29, "citationCount": 42, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": - [{"category": "Geography", "source": "external"}, {"category": "Environmental + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "2b739b833d95650c558fa52c8462a3796b8ec62f", "externalIds": {"MAG": "1576855886", + "DOI": "10.4324/9781410602961-16", "CorpusId": 119035689}, "corpusId": 119035689, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2b739b833d95650c558fa52c8462a3796b8ec62f", + "title": "Using Predicted Latent Scores in General Latent Struc\u00ad ture + M odels", "abstract": null, "venue": "", "year": 2002, "referenceCount": 0, + "citationCount": 93, "influentialCitationCount": 18, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2002-11-04", "journal": {"name": "Climate Research", "pages": "215-226", - "volume": "22"}, "authors": [{"authorId": "50524630", "name": "M. K. Svensson"}, - {"authorId": "34977137", "name": "I. Eliasson"}, {"authorId": "31857727", - "name": "B. Holmer"}]}, {"paperId": "48f3b7ad41e9f4ab118b7970c876f311622802bf", - "externalIds": {"DBLP": "conf/coco/AjtaiKS02", "MAG": "2794819100", "DOI": - "10.1109/CCC.2002.1004339", "CorpusId": 7595507}, "url": "https://www.semanticscholar.org/paper/48f3b7ad41e9f4ab118b7970c876f311622802bf", - "title": "Sampling short lattice vectors and the closest lattice vector problem", - "abstract": "We present a 2/sup O(n)/ time Turing reduction from the closest - lattice vector problem to the shortest lattice vector problem. Our reduction - assumes access to a subroutine that solves SVP exactly and a subroutine to - sample short vectors from a lattice, and computes a (1+/spl epsi/)-approximation - to CVP As a consequence, using the SVP algorithm from (Ajtai et al., 2001), - we obtain a randomized 2[O(1+/spl epsi//sup -1/)n] algorithm to obtain a (1+/spl - epsi/)-approximation for the closest lattice vector problem in n dimensions. - This improves the existing time bound of O(n!) for CVP achieved by a deterministic - algorithm in (Blomer, 2000).", "venue": "Proceedings 17th IEEE Annual Conference - on Computational Complexity", "year": 2002, "referenceCount": 17, "citationCount": - 92, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2002-05-21", "journal": - {"name": "Proceedings 17th IEEE Annual Conference on Computational Complexity", - "pages": "53-57"}, "authors": [{"authorId": "1704344", "name": "M. Ajtai"}, - {"authorId": "1683442", "name": "Ravi Kumar"}, {"authorId": "1765251", "name": - "D. Sivakumar"}]}, {"paperId": "981f1229bc6aae709e79d3a2f64473375a49afd9", - "externalIds": {"DBLP": "journals/nc/Neary10", "MAG": "2952004160", "ArXiv": - "0912.0928", "DOI": "10.1007/s11047-010-9213-1", "CorpusId": 1637966}, "url": - "https://www.semanticscholar.org/paper/981f1229bc6aae709e79d3a2f64473375a49afd9", - "title": "On the computational complexity of spiking neural P systems", "abstract": - null, "venue": "Natural Computing", "year": 2008, "referenceCount": 24, "citationCount": - 25, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Biology", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2008-08-25", "journal": {"name": "Natural Computing", - "pages": "831-851", "volume": "9"}, "authors": [{"authorId": "2221070", "name": - "T. Neary"}]}, {"paperId": "b76711a6041f49b2f9d77cb33f52ff5f1cf3c503", "externalIds": - {"MAG": "2242017269", "DOI": "10.21273/HORTSCI.35.4.738", "CorpusId": 86299053}, - "url": "https://www.semanticscholar.org/paper/b76711a6041f49b2f9d77cb33f52ff5f1cf3c503", + null, "journal": {"name": "", "pages": "195-224", "volume": ""}, "authors": + [{"authorId": "48596148", "name": "M. Croon"}]}, {"paperId": "b76711a6041f49b2f9d77cb33f52ff5f1cf3c503", + "externalIds": {"MAG": "2242017269", "DOI": "10.21273/HORTSCI.35.4.738", "CorpusId": + 86299053}, "corpusId": 86299053, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b76711a6041f49b2f9d77cb33f52ff5f1cf3c503", "title": "Morphology, Growth, and Rhizome Development of Vaccinium angustifolium Ait. Seedlings, Rooted Softwood Cuttings, and Micropropagated Plantlets", "abstract": "For accelerating the filling in of bare areas in native lowbush @@ -30377,53 +34677,125 @@ interactions: the benefits of asexual reproduction are retained. The advantage in rhizome production of micropropagation over stem cuttings varied among clones.", "venue": "", "year": 2000, "referenceCount": 12, "citationCount": 42, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2000-07-01", "journal": {"name": "Hortscience", "pages": - "738-741", "volume": "35"}, "authors": [{"authorId": "2056433937", "name": - "S. Morrison"}, {"authorId": "87856862", "name": "J. Smagula"}, {"authorId": - "13350744", "name": "W. Litten"}]}, {"paperId": "54d1ef1ad676ebb553ddba2f7ed217509e81797f", - "externalIds": {"MAG": "2011058337", "DBLP": "journals/corr/cs-AI-0207097", - "ArXiv": "cs/0207097", "DOI": "10.1023/B:MACH.0000015880.99707.b2", "CorpusId": - 791679}, "url": "https://www.semanticscholar.org/paper/54d1ef1ad676ebb553ddba2f7ed217509e81797f", - "title": "Optimal Ordered Problem Solver", "abstract": null, "venue": "Machine-mediated - learning", "year": 2002, "referenceCount": 102, "citationCount": 182, "influentialCitationCount": - 11, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2002-07-31", "journal": {"name": "Machine Learning", "pages": - "211-254", "volume": "54"}, "authors": [{"authorId": "145341374", "name": - "J. Schmidhuber"}]}, {"paperId": "dbd68f9be41d50833691b54239e49634bb13ebef", - "externalIds": {"DBLP": "journals/rsl/BeggsCT14", "MAG": "2145708185", "DOI": - "10.1017/S1755020314000240", "CorpusId": 20879390}, "url": "https://www.semanticscholar.org/paper/dbd68f9be41d50833691b54239e49634bb13ebef", - "title": "THREE FORMS OF PHYSICAL MEASUREMENT AND THEIR COMPUTABILITY", "abstract": - "Abstract We have begun a theory of measurement in which an experimenter and - his or her experimental procedure are modeled by algorithms that interact - with physical equipment through a simple abstract interface. The theory is - based upon using models of physical equipment as oracles to Turing machines. - This allows us to investigate the computability and computational complexity - of measurement processes. We examine eight different experiments that make - measurements and, by introducing the idea of an observable indicator, we identify - three distinct forms of measurement process and three types of measurement - algorithm. We give axiomatic specifications of three forms of interfaces that - enable the three types of experiment to be used as oracles to Turing machines, - and lemmas that help certify an experiment satisfies the axiomatic specifications. - For experiments that satisfy our axiomatic specifications, we give lower bounds - on the computational power of Turing machines in polynomial time using nonuniform - complexity classes. These lower bounds break the barrier defined by the Church-Turing - Thesis.", "venue": "The Review of Symbolic Logic", "year": 2014, "referenceCount": - 47, "citationCount": 20, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-09-09", "journal": - {"name": "The Review of Symbolic Logic", "pages": "618 - 646", "volume": "7"}, - "authors": [{"authorId": "1919705", "name": "E. Beggs"}, {"authorId": "143698164", - "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": "145744796", "name": "J. - V. Tucker"}]}, {"paperId": "774828b150c7f8482ddc525c5a386cd78860200a", "externalIds": - {"MAG": "2166585162", "DBLP": "journals/cacm/Denning89", "DOI": "10.1145/76380.76381", - "CorpusId": 16961489}, "url": "https://www.semanticscholar.org/paper/774828b150c7f8482ddc525c5a386cd78860200a", + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.ashs.org/downloadpdf/journals/hortsci/35/4/article-p738.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Agricultural And Food Sciences", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2000-07-01", + "journal": {"name": "Hortscience", "pages": "738-741", "volume": "35"}, "authors": + [{"authorId": "2056433937", "name": "S. Morrison"}, {"authorId": "87856862", + "name": "J. Smagula"}, {"authorId": "13350744", "name": "W. Litten"}]}, {"paperId": + "d1f0664ca921f8d7da30a3362c7e5a32a2f51931", "externalIds": {"DOI": "10.1007/978-1-4471-0161-1", + "CorpusId": 34834967}, "corpusId": 34834967, "publicationVenue": {"id": "b001aef8-ff25-4ada-adfb-dc103291ff5f", + "name": "Discrete Mathematics & Theoretical Computer Science", "type": "journal", + "alternate_names": ["Discret Math Theor Comput Sci"], "issn": "1365-8050", + "url": "https://www.dmtcs.org/dmtcs-ojs/", "alternate_urls": ["http://www.dmtcs.org/dmtcs-ojs/index.php/dmtcs"]}, + "url": "https://www.semanticscholar.org/paper/d1f0664ca921f8d7da30a3362c7e5a32a2f51931", + "title": "Turing\u2019s Connectionism", "abstract": null, "venue": "Discrete + Mathematics & Theoretical Computer Science", "year": 2002, "referenceCount": + 0, "citationCount": 14, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-1-4471-0161-1%2F1", + "status": "GREEN"}, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "35502319", + "name": "Christof Teuscher Dipl-Ing Epfl"}]}, {"paperId": "782d2504d9a1da3a2d415849472b4ce94038f7cf", + "externalIds": {"MAG": "1876120655", "ArXiv": "cs/0404021", "DBLP": "journals/fuin/DelvenneKB06", + "CorpusId": 14069011}, "corpusId": 14069011, "publicationVenue": {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", + "name": "Fundamenta Informaticae", "type": "journal", "alternate_names": ["Fundam + Informaticae"], "issn": "0169-2968", "url": "http://content.iospress.com/journals/fundamenta-informaticae", + "alternate_urls": ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, + "url": "https://www.semanticscholar.org/paper/782d2504d9a1da3a2d415849472b4ce94038f7cf", + "title": "Decidability and Universality in Symbolic Dynamical Systems", "abstract": + "Many different definitions of computational universality for various types + of dynamical systems have flourished since Turing''s work. We propose a general + definition of universality that applies to arbitrary discrete time symbolic + dynamical systems. Universality of a system is defined as undecidability of + a model-checking problem. For Turing machines, counter machines and tag systems, + our definition coincides with the classical one. It yields, however, a new + definition for cellular automata and subshifts. Our definition is robust with + respect to initial condition, which is a desirable feature for physical realizability. + \n \nWe derive necessary conditions for undecidability and universality. For + instance, a universal system must have a sensitive point and a proper subsystem. + We conjecture that universal systems have infinite number of subsystems. We + also discuss the thesis according to which computation should occur at the + ''edge of chaos'' and we exhibit a universal chaotic system.", "venue": "Fundamenta + Informaticae", "year": 2004, "referenceCount": 60, "citationCount": 43, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2004-04-07", "journal": {"name": "Fundam. + Informaticae", "pages": "463-490", "volume": "74"}, "authors": [{"authorId": + "145026954", "name": "J. Delvenne"}, {"authorId": "1786485", "name": "P. Kurka"}, + {"authorId": "1715830", "name": "V. Blondel"}]}, {"paperId": "123197d5564d521b330cd38ecc40fb4e0ed81b83", + "externalIds": {"MAG": "2795168083", "DBLP": "conf/coco/Watrous98", "DOI": + "10.1109/CCC.1998.694607", "CorpusId": 9152334}, "corpusId": 9152334, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/123197d5564d521b330cd38ecc40fb4e0ed81b83", + "title": "Relationships between quantum and classical space-bounded complexity + classes", "abstract": "This paper investigates the relative power of space-bounded + quantum and classical (probabilistic) computational models. The following + relationships are proved. 1. Any probabilistic Turing machine (PTM) which + runs in space s and which halts absolutely (i.e. halts with certainty after + a finite number of steps) can be simulated in space O(s) by a quantum Turing + machine (QTM). If the PTM operates with bounded error, then the QTM may be + taken to operate with bounded error as well, although the QTM may not halt + absolutely in this case. In the unbounded error case, the QTM may be taken + to halt absolutely. 2. Any QTM running in space s can be simulated by an unbounded + error PTM running in space O(s). No assumptions on the probability of error + or Turing time for the QTM are required, but it is assumed that all transition + amplitudes of the quantum machine are rational. It follows that unbounded + error, space O(s) bounded quantum Turing machines and probabilistic Turing + machines are equivalent in power. This implies that any space s QTM can be + simulated deterministically in space O(s/sup 2/), and further that any (unbounded-error) + QTM running in log-space can be simulated in NC/sup 2/ We also consider quantum + analogues of nondeterministic and one-sided error probabilistic space-bounded + classes, and prove some simple relationships regarding these classes.", "venue": + "Proceedings. Thirteenth Annual IEEE Conference on Computational Complexity + (Formerly: Structure in Complexity Theory Conference) (Cat. No.98CB36247)", + "year": 1998, "referenceCount": 34, "citationCount": 22, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://minds.wisconsin.edu/bitstream/1793/60136/1/TR1357.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1998-06-15", "journal": {"name": "Proceedings. Thirteenth + Annual IEEE Conference on Computational Complexity (Formerly: Structure in + Complexity Theory Conference) (Cat. No.98CB36247)", "pages": "210-227"}, "authors": + [{"authorId": "145264143", "name": "J. Watrous"}]}, {"paperId": "651400ad7be38eb1cf731ca62a61a28866c36c44", + "externalIds": {"MAG": "1975715978", "DBLP": "journals/cc/BeigelF92", "DOI": + "10.1007/BF01276436", "CorpusId": 15029803}, "corpusId": 15029803, "publicationVenue": + {"id": "dc6308c6-6bab-4b1d-9086-c28189f392f1", "name": "Computational Complexity", + "type": "journal", "alternate_names": ["Comput Complex"], "issn": "1016-3328", + "url": "https://www.springer.com/birkhauser/computer+science/journal/37", + "alternate_urls": ["https://link.springer.com/journal/37"]}, "url": "https://www.semanticscholar.org/paper/651400ad7be38eb1cf731ca62a61a28866c36c44", + "title": "On being incoherent without being very hard", "abstract": null, + "venue": "Computational Complexity", "year": 2005, "referenceCount": 32, "citationCount": + 26, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "computational complexity", "pages": "1-17", "volume": + "2"}, "authors": [{"authorId": "2516122", "name": "R. Beigel"}, {"authorId": + "1751820", "name": "J. Feigenbaum"}]}, {"paperId": "364dfa035dcc91e3a08e9608911a0d7228250eed", + "externalIds": {"DBLP": "journals/aml/Michel93", "MAG": "2050162072", "DOI": + "10.1007/BF01409968", "CorpusId": 206794557}, "corpusId": 206794557, "publicationVenue": + {"id": "baf6e768-e94b-48e9-9326-6aad748d4c61", "name": "Archive for Mathematical + Logic", "type": "journal", "alternate_names": ["Arch Math Log"], "issn": "0933-5846", + "url": "https://www.springer.com/mathematics/journal/153", "alternate_urls": + ["http://link.springer.com/journal/153", "http://www.springer.com/mathematics/journal/153"]}, + "url": "https://www.semanticscholar.org/paper/364dfa035dcc91e3a08e9608911a0d7228250eed", + "title": "Busy beaver competition and Collatz-like problems", "abstract": + null, "venue": "Archive for Mathematical Logic", "year": 1993, "referenceCount": + 17, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1993-09-01", "journal": {"name": "Archive for Mathematical Logic", "pages": + "351-367", "volume": "32"}, "authors": [{"authorId": "2068244973", "name": + "Pascal Michel"}]}, {"paperId": "774828b150c7f8482ddc525c5a386cd78860200a", + "externalIds": {"MAG": "2166585162", "DBLP": "journals/cacm/Denning89", "DOI": + "10.1145/76380.76381", "CorpusId": 16961489}, "corpusId": 16961489, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/774828b150c7f8482ddc525c5a386cd78860200a", "title": "A debate on teaching computing science", "abstract": "A called \" On the Cruelty of Really Teaching Computing Science. \" He challenged some of the basic assumptions on which our curricula are based and provoked a lot @@ -30449,91 +34821,89 @@ interactions: am grateful to these people for participating in this debate and to Professor Dijkstra for creating the opening.", "venue": "CACM", "year": 1989, "referenceCount": 0, "citationCount": 126, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-12-01", "journal": {"name": "Commun. ACM", "pages": "1397-1414", "volume": - "32"}, "authors": [{"authorId": "1729148", "name": "P. Denning"}]}, {"paperId": - "651400ad7be38eb1cf731ca62a61a28866c36c44", "externalIds": {"MAG": "1975715978", - "DBLP": "journals/cc/BeigelF92", "DOI": "10.1007/BF01276436", "CorpusId": - 15029803}, "url": "https://www.semanticscholar.org/paper/651400ad7be38eb1cf731ca62a61a28866c36c44", - "title": "On being incoherent without being very hard", "abstract": null, - "venue": "Computational Complexity", "year": 2005, "referenceCount": 32, "citationCount": - 26, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "computational - complexity", "pages": "1-17", "volume": "2"}, "authors": [{"authorId": "2516122", - "name": "R. Beigel"}, {"authorId": "1751820", "name": "J. Feigenbaum"}]}, - {"paperId": "dc948dc5bb1dd62a13accb2aab24dc86faf85513", "externalIds": {"CorpusId": - 15784499}, "url": "https://www.semanticscholar.org/paper/dc948dc5bb1dd62a13accb2aab24dc86faf85513", - "title": "High Efficiency Feedback Shift Register : \u03c3 \u2212 LFSR ?", - "abstract": "We introduce a new kind of word-oriented linear feedback shift - register called \u03c3\u2212LFSR which is constructed with the instructions - of the modern processor and have fast software implementation. We offer an - algorithm to search for good primitive \u03c3\u2212LFSR. In particular, we - give two examples HHZ-1 and HHZ-2 and compare their efficiency and security - with those of the LFSRs appearing in stream ciphers such as SNOW, SOBER and - Turing. Our results show that replacing the LFSRs in SNOW, SOBER and Turing - with HHZ-1 will improve security and the efficiency of fast software implementation.", - "venue": "", "year": 2007, "referenceCount": 21, "citationCount": 30, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "46525902", - "name": "Guang Zeng"}, {"authorId": "1691373", "name": "Wenbao Han"}, {"authorId": - "2414054", "name": "Kaicheng He"}]}, {"paperId": "364dfa035dcc91e3a08e9608911a0d7228250eed", - "externalIds": {"DBLP": "journals/aml/Michel93", "MAG": "2050162072", "DOI": - "10.1007/BF01409968", "CorpusId": 206794557}, "url": "https://www.semanticscholar.org/paper/364dfa035dcc91e3a08e9608911a0d7228250eed", - "title": "Busy beaver competition and Collatz-like problems", "abstract": - null, "venue": "Archive for Mathematical Logic", "year": 1993, "referenceCount": - 17, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1993-09-01", "journal": - {"name": "Archive for Mathematical Logic", "pages": "351-367", "volume": "32"}, - "authors": [{"authorId": "2068244973", "name": "Pascal Michel"}]}, {"paperId": - "8becd8ad38feedaf858e40635e338547cd0bab7b", "externalIds": {"MAG": "2334699702", - "CorpusId": 11680320}, "url": "https://www.semanticscholar.org/paper/8becd8ad38feedaf858e40635e338547cd0bab7b", - "title": "Service-Oriented Fuzzy-Arden-Syntax-Based Clinical Decision Support", - "abstract": "a software architecture for clinical decision support systems. - The core of the architec- ture is the Health Level Seven (HL7) Arden Syntax. - Functionality and scalability of this architec- ture were proven in large - routine applications for early detection and automated monitoring of hospital-acquired - infections at the Vienna General Hospital. These systems automatically receive - data from 15 intensive care units (ICUs) and generate indications as to whether - various forms of ICU-acquired infections are clearly present in a patient, - present to a certain degree, or absent.", "venue": "", "year": 2014, "referenceCount": - 28, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/76380.76381", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1989-12-01", "journal": {"name": "Commun. ACM", "pages": + "1397-1414", "volume": "32"}, "authors": [{"authorId": "1729148", "name": + "P. Denning"}]}, {"paperId": "446b7f6c74c7f1ed912a19b6810bff5965309bf2", "externalIds": + {"MAG": "2044534703", "DOI": "10.3354/CR022215", "CorpusId": 56151200}, "corpusId": + 56151200, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/446b7f6c74c7f1ed912a19b6810bff5965309bf2", + "title": "A GIS based empirical model to simulate air temperature variations + in the G\u00f6teborg urban area during the night", "abstract": "This paper + presents a GIS based empirical model to simulate wind and/or air tempera- + ture variations over land. The technique is based on meteorological data (wind + direction and wind speed, temperature and cloud cover) from one permanent + reference station, a digital local climate map and a digital land use map. + The focus of the paper is to apply and evaluate the technique for clear and + calm night-time weather conditions in Goteborg, Sweden. Hourly data from a + monitoring network including 31 temperature stations are used in the verification + of simulations made using the model. These data are also used for a description + of geographical factors that influence air tempera- ture variations in the + Goteborg urban district. The technique is a potential tool for urban planning + purposes but the verification shows that further improvements are needed. + The main problems identified are related to details in the climate map but + also to some of the algorithms that need to be refined.", "venue": "", "year": + 2002, "referenceCount": 29, "citationCount": 42, "influentialCitationCount": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/cr2002/22/c022p215.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": + "Geography", "source": "external"}, {"category": "Environmental Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-11-04", + "journal": {"name": "Climate Research", "pages": "215-226", "volume": "22"}, + "authors": [{"authorId": "50524630", "name": "M. K. Svensson"}, {"authorId": + "34977137", "name": "I. Eliasson"}, {"authorId": "31857727", "name": "B. Holmer"}]}, + {"paperId": "9c1eb70deb2b5ef15ff35b3ec8a8c92e3bcf37d8", "externalIds": {"MAG": + "2020651750", "DBLP": "journals/jacm/EngelfrietR80", "DOI": "10.1145/322203.322211", + "CorpusId": 194670}, "corpusId": 194670, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9c1eb70deb2b5ef15ff35b3ec8a8c92e3bcf37d8", + "title": "Fixed Point Languages, Equality Languages, and Representation of + Recursively Enumerable Languages", "abstract": "Fixed point languages and + equality languages of homomorphisms and dgsm mappings are consid- ered. Some + basic properties of these classes of languages are proved, and it is shown + how to use them to represent recursively enumerable sets. In particular, very + simple languages are introduced which play the same role for the class of + recursively enumerable languages that the Dyck languages play for the class + of context-free languages. Finally, a new type of acceptor for defining equality + languages is introduced. KEY WOADS AND PHRASES: equality language, fLxed point + language, recursively enumerable language, determin- istic sequential machine, + Turing machine, Post correspondence problem, shuffle, AFL generator, representation + of languages", "venue": "JACM", "year": 1980, "referenceCount": 43, "citationCount": + 92, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-11-02", - "journal": {"name": "Indian journal of medical informatics", "pages": "75-79", - "volume": "8"}, "authors": [{"authorId": "1689433", "name": "K. Adlassnig"}, - {"authorId": "1682242", "name": "K. Fehre"}]}, {"paperId": "78537a603860a6f240b8786dee8a9a76725a8d03", - "externalIds": {"MAG": "2080758590", "DOI": "10.1088/1751-8113/40/49/005", - "CorpusId": 123428073}, "url": "https://www.semanticscholar.org/paper/78537a603860a6f240b8786dee8a9a76725a8d03", - "title": "Turing instability in sub-diffusive reaction\u2013diffusion systems", - "abstract": "Linear stability characteristics of an anomalous sub-diffusive - activator\u2013inhibitor system are investigated through a mesoscopic model, - where anomaly ensues by a memory integro-differential operator with an equal - anomaly exponent for all species. It is shown that monotonic instability, - known from normal diffusion, persists in the anomalous system, thereby allowing - Turing pattern occurrence. Presence of anomaly stabilizes the system by diminution - of the range of diffusion coefficients'' ratio involving instability. In addition, - the maximal growth rate is diminished, proving the existence of an absolutely - stable anomalous system.", "venue": "", "year": 2007, "referenceCount": 14, - "citationCount": 32, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2007-12-07", "journal": {"name": "Journal of Physics A: - Mathematical and Theoretical", "pages": "14687 - 14702", "volume": "40"}, - "authors": [{"authorId": "15282092", "name": "Y. Nec"}, {"authorId": "1777899", - "name": "A. Nepomnyashchy"}]}, {"paperId": "87b44c4d5e8fc5dc1e6edebbb9a49be6ad621474", + "s2-fos-model"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1980-07-01", "journal": {"name": "J. + ACM", "pages": "499-518", "volume": "27"}, "authors": [{"authorId": "1720497", + "name": "J. Engelfriet"}, {"authorId": "144182665", "name": "G. Rozenberg"}]}, + {"paperId": "f3f8adb48ffc3094e84ff568fcb82098c45c27b0", "externalIds": {"MAG": + "184067717", "CorpusId": 18183330}, "corpusId": 18183330, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f3f8adb48ffc3094e84ff568fcb82098c45c27b0", + "title": "Strangers Intrusion Detection - Detecting Spammers and Fake Proles + in Social Networks Based on Topology Anomalies", "abstract": "Today''s social + networks are plagued by numeroustypes of malicious proles which can range + from so-cialbots to sexual predators. We present a novelmethod for the detection + of these malicious prolesby using the social network''s own topological fea-tures + only. Reliance on these features alone ensuresthat the proposed method is + generic enough to beapplied to a range of social networks. The algorithmhas + been evaluated on several social networks andwas found to be eective in detecting + various typesof malicious proles. We believe this method is avaluable step + in the increasing battle against socialnetwork spammers, socialbots, and sexual + predictors.", "venue": "", "year": 2012, "referenceCount": 39, "citationCount": + 90, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-12-14", "journal": {"name": + "", "pages": "26-39", "volume": "1"}, "authors": [{"authorId": "2337415", + "name": "Michael Fire"}, {"authorId": "144847172", "name": "Gilad Katz"}, + {"authorId": "1724372", "name": "Y. Elovici"}]}, {"paperId": "87b44c4d5e8fc5dc1e6edebbb9a49be6ad621474", "externalIds": {"MAG": "2947972074", "DOI": "10.1111/mmi.14316", "CorpusId": - 167220634, "PubMed": "31136034"}, "url": "https://www.semanticscholar.org/paper/87b44c4d5e8fc5dc1e6edebbb9a49be6ad621474", + 167220634, "PubMed": "31136034"}, "corpusId": 167220634, "publicationVenue": + {"id": "a8b67272-b576-41c8-affb-5ea4982012a6", "name": "Molecular Microbiology", + "type": "journal", "alternate_names": ["Mol Microbiol"], "issn": "0950-382X", + "url": "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1365-2958", "alternate_urls": + ["https://onlinelibrary.wiley.com/journal/13652958"]}, "url": "https://www.semanticscholar.org/paper/87b44c4d5e8fc5dc1e6edebbb9a49be6ad621474", "title": "Division plane placement in pleomorphic archaea is dynamically coupled to cell shape", "abstract": "One mechanism for achieving accurate placement of the cell division machinery is via Turing patterns, where nonlinear molecular @@ -30555,7 +34925,8 @@ interactions: Our results suggest that the division site placement is consistent with a Turing patterning system in these archaea.", "venue": "Molecular Microbiology", "year": 2019, "referenceCount": 48, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1111/mmi.14316", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2019-09-01", "journal": {"name": "Molecular @@ -30563,327 +34934,136 @@ interactions: "James C. Walsh"}, {"authorId": "2813671", "name": "C. Angstmann"}, {"authorId": "1396990853", "name": "A. Bisson-Filho"}, {"authorId": "37986960", "name": "E. Garner"}, {"authorId": "5316400", "name": "I. Duggin"}, {"authorId": "2325955", - "name": "P. Curmi"}]}, {"paperId": "107b054697110f8e43d5c379c413686ad1941674", - "externalIds": {"MAG": "1981823488", "DOI": "10.1130/G23534A.1", "CorpusId": - 26551467}, "url": "https://www.semanticscholar.org/paper/107b054697110f8e43d5c379c413686ad1941674", - "title": "Direct dating of Archean microbial ichnofossils", "abstract": "Well-preserved - Archean pillow lavas from the ca. 3.35 Ga Euro Basalt of the Pilbara Craton, - Western Australia, contain micron-sized tubular structures mineralized by - titanite (CaTiSiO 4 ) with residual organic carbon preserved along their margins. - Direct U-Pb dating of titanite in the tubular structures demonstrates an Archean - age. These tubular microstruc- tures are identical to microbial ichnofossils - in modern basalts, ophiolites, and greenstone belts, and are interpreted as - a biogenic signature in these ancient rocks. Microbial colonization of basaltic - glass thus appears to have been part of a deep subsurface biosphere established - early in Earth''s history.", "venue": "", "year": 2007, "referenceCount": - 31, "citationCount": 91, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", - "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}, - {"category": "Geography", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2007-06-01", "journal": {"name": "Geology", "pages": - "487-490", "volume": "35"}, "authors": [{"authorId": "39441164", "name": "N. - Banerjee"}, {"authorId": "1907182", "name": "A. Simonetti"}, {"authorId": - "4217788", "name": "H. Furnes"}, {"authorId": "3831128", "name": "K. Muehlenbachs"}, - {"authorId": "4250697", "name": "H. Staudigel"}, {"authorId": "4260452", "name": - "L. Heaman"}, {"authorId": "103639433", "name": "M. V. Kranendonk"}]}, {"paperId": - "123197d5564d521b330cd38ecc40fb4e0ed81b83", "externalIds": {"MAG": "2795168083", - "DBLP": "conf/coco/Watrous98", "DOI": "10.1109/CCC.1998.694607", "CorpusId": - 9152334}, "url": "https://www.semanticscholar.org/paper/123197d5564d521b330cd38ecc40fb4e0ed81b83", - "title": "Relationships between quantum and classical space-bounded complexity - classes", "abstract": "This paper investigates the relative power of space-bounded - quantum and classical (probabilistic) computational models. The following - relationships are proved. 1. Any probabilistic Turing machine (PTM) which - runs in space s and which halts absolutely (i.e. halts with certainty after - a finite number of steps) can be simulated in space O(s) by a quantum Turing - machine (QTM). If the PTM operates with bounded error, then the QTM may be - taken to operate with bounded error as well, although the QTM may not halt - absolutely in this case. In the unbounded error case, the QTM may be taken - to halt absolutely. 2. Any QTM running in space s can be simulated by an unbounded - error PTM running in space O(s). No assumptions on the probability of error - or Turing time for the QTM are required, but it is assumed that all transition - amplitudes of the quantum machine are rational. It follows that unbounded - error, space O(s) bounded quantum Turing machines and probabilistic Turing - machines are equivalent in power. This implies that any space s QTM can be - simulated deterministically in space O(s/sup 2/), and further that any (unbounded-error) - QTM running in log-space can be simulated in NC/sup 2/ We also consider quantum - analogues of nondeterministic and one-sided error probabilistic space-bounded - classes, and prove some simple relationships regarding these classes.", "venue": - "Proceedings. Thirteenth Annual IEEE Conference on Computational Complexity - (Formerly: Structure in Complexity Theory Conference) (Cat. No.98CB36247)", - "year": 1998, "referenceCount": 34, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1998-06-15", "journal": {"name": "Proceedings. Thirteenth - Annual IEEE Conference on Computational Complexity (Formerly: Structure in - Complexity Theory Conference) (Cat. No.98CB36247)", "pages": "210-227"}, "authors": - [{"authorId": "145264143", "name": "J. Watrous"}]}, {"paperId": "bd1342b451fe3acf60313c57e79fc491d70521fa", - "externalIds": {"MAG": "2166625431", "DOI": "10.1146/ANNUREV.PH.48.030186.003145", - "CorpusId": 40035018, "PubMed": "2871810"}, "url": "https://www.semanticscholar.org/paper/bd1342b451fe3acf60313c57e79fc491d70521fa", - "title": "Neurotransmitters in temperature control.", "abstract": "Many neurotransmitters - may be involved in central regulation of body tempera\u00ad ture in normothermia, - during heat and cold stress, in fever, and in exercise. Emphasis on amines - and prostaglandins has declined somewhat, and a major focus in recent years - has been upon the possibility that certain peptides partici\u00ad pate in - central nervous system (CNS) mediation of temperature control (9, 10). Several - of these peptides were originally isolated from pituitary tissue or the alimentary - canal, but they also occur in widespread regions of the CNS. While some, such - as adrenocorticotropic hormone (ACTH), have well known func\u00ad tions in - the periphery, the central roles of most peptides are much less un\u00ad derstood.", - "venue": "Annual Review of Physiology", "year": 1986, "referenceCount": 39, - "citationCount": 89, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": null, "journal": {"name": "Annual review - of physiology", "pages": "\n 613-23\n ", "volume": "48"}, - "authors": [{"authorId": "2381935", "name": "J. M. Lipton"}, {"authorId": - "145423230", "name": "W. G. Clark"}]}, {"paperId": "9c1eb70deb2b5ef15ff35b3ec8a8c92e3bcf37d8", - "externalIds": {"MAG": "2020651750", "DBLP": "journals/jacm/EngelfrietR80", - "DOI": "10.1145/322203.322211", "CorpusId": 194670}, "url": "https://www.semanticscholar.org/paper/9c1eb70deb2b5ef15ff35b3ec8a8c92e3bcf37d8", - "title": "Fixed Point Languages, Equality Languages, and Representation of - Recursively Enumerable Languages", "abstract": "Fixed point languages and - equality languages of homomorphisms and dgsm mappings are consid- ered. Some - basic properties of these classes of languages are proved, and it is shown - how to use them to represent recursively enumerable sets. In particular, very - simple languages are introduced which play the same role for the class of - recursively enumerable languages that the Dyck languages play for the class - of context-free languages. Finally, a new type of acceptor for defining equality - languages is introduced. KEY WOADS AND PHRASES: equality language, fLxed point - language, recursively enumerable language, determin- istic sequential machine, - Turing machine, Post correspondence problem, shuffle, AFL generator, representation - of languages", "venue": "JACM", "year": 1980, "referenceCount": 43, "citationCount": - 92, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Linguistics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1980-07-01", "journal": {"name": "J. ACM", "pages": "499-518", "volume": - "27"}, "authors": [{"authorId": "1720497", "name": "J. Engelfriet"}, {"authorId": - "144182665", "name": "G. Rozenberg"}]}, {"paperId": "1f6f5013c80e6967433db5bddcd822359334375b", - "externalIds": {"MAG": "1976113152", "DOI": "10.1016/0375-9601(93)90686-T", - "CorpusId": 119929015}, "url": "https://www.semanticscholar.org/paper/1f6f5013c80e6967433db5bddcd822359334375b", - "title": "Chaotic Turing structures", "abstract": null, "venue": "", "year": - 1993, "referenceCount": 29, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1993-08-16", - "journal": {"name": "Physics Letters A", "pages": "325-331", "volume": "179"}, - "authors": [{"authorId": "1706628", "name": "R. Sol\u00e9"}, {"authorId": - "3001050", "name": "J. Bascompte"}]}, {"paperId": "9ebc9a307018a1b4750b4264234a6a409435dea4", - "externalIds": {"DBLP": "conf/coco/BuhrmanH08", "MAG": "2116887008", "DOI": - "10.1109/CCC.2008.21", "CorpusId": 2664381}, "url": "https://www.semanticscholar.org/paper/9ebc9a307018a1b4750b4264234a6a409435dea4", - "title": "NP-Hard Sets Are Exponentially Dense Unless coNP C NP/poly", "abstract": - "We show that hard sets S for NP must have exponential density, i.e. |S=n| - ges 2nepsi for some isin > 0 and infinitely many n, unless coNP sube NP/poly - and the polynomial-time hierarchy collapses. This result holds for Turing - reductions that make n1-isin queries. In addition we study the instance complexity - o/NP- hard problems and show that hard sets also have an exponential amount - of instances that have instance complexity n for some sigma > 0. This result - also holds for Turing reductions that make n1-isin queries.", "venue": "2008 - 23rd Annual IEEE Conference on Computational Complexity", "year": 2008, "referenceCount": - 15, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2008-06-22", - "journal": {"name": "2008 23rd Annual IEEE Conference on Computational Complexity", - "pages": "1-7"}, "authors": [{"authorId": "1747509", "name": "H. Buhrman"}, - {"authorId": "1742012", "name": "J. M. Hitchcock"}]}, {"paperId": "fb7dd3ec9cc225ecea26db8608aff004aa5564ed", - "externalIds": {"MAG": "2765856888", "DBLP": "journals/siamads/SongJLY17", - "DOI": "10.1137/16M1097560", "CorpusId": 3849415}, "url": "https://www.semanticscholar.org/paper/fb7dd3ec9cc225ecea26db8608aff004aa5564ed", - "title": "Spatiotemporal Dynamics of the Diffusive Mussel-Algae Model Near - Turing-Hopf Bifurcation", "abstract": "Intertidal mussels can self-organize - into periodic spot, stripe, labyrinth, and gap patterns ranging from centimeter - to meter scales. The leading mathematical explanations for these phenomena - are the reaction-diffusion-advection model and the phase separation model. - This paper continues the series studies on analytically understanding the - existence of pattern solutions in the reaction-diffusion mussel-algae model. - The stability of the positive constant steady state and the existence of Hopf - and steady-state bifurcations are studied by analyzing the corresponding characteristic - equation. Furthermore, we focus on the Turing-Hopf (TH) bifurcation and obtain - the explicit dynamical classification in its neighborhood by calculating and - investigating the normal form on the center manifold. Using theoretical and - numerical simulations, we demonstrates that this TH interaction would significantly - enhance the diversity of spatial patterns and trigger the alternative paths - for the pattern development.", "venue": "SIAM Journal on Applied Dynamical - Systems", "year": 2017, "referenceCount": 65, "citationCount": 71, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-11-02", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", "pages": "2030-2062", - "volume": "16"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, - {"authorId": "50090195", "name": "Heping Jiang"}, {"authorId": "47362020", - "name": "Quan\u2010Xing Liu"}, {"authorId": "145377163", "name": "Yuan Yuan"}]}, - {"paperId": "782d2504d9a1da3a2d415849472b4ce94038f7cf", "externalIds": {"MAG": - "1876120655", "ArXiv": "cs/0404021", "DBLP": "journals/fuin/DelvenneKB06", - "CorpusId": 14069011}, "url": "https://www.semanticscholar.org/paper/782d2504d9a1da3a2d415849472b4ce94038f7cf", - "title": "Decidability and Universality in Symbolic Dynamical Systems", "abstract": - "Many different definitions of computational universality for various types - of dynamical systems have flourished since Turing''s work. We propose a general - definition of universality that applies to arbitrary discrete time symbolic - dynamical systems. Universality of a system is defined as undecidability of - a model-checking problem. For Turing machines, counter machines and tag systems, - our definition coincides with the classical one. It yields, however, a new - definition for cellular automata and subshifts. Our definition is robust with - respect to initial condition, which is a desirable feature for physical realizability. - \n \nWe derive necessary conditions for undecidability and universality. For - instance, a universal system must have a sensitive point and a proper subsystem. - We conjecture that universal systems have infinite number of subsystems. We - also discuss the thesis according to which computation should occur at the - ''edge of chaos'' and we exhibit a universal chaotic system.", "venue": "Fundam. - Informaticae", "year": 2004, "referenceCount": 60, "citationCount": 43, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "name": "P. Curmi"}]}, {"paperId": "7f42da4abfadf9d5a464affe22d0bd4bf21c0edb", + "externalIds": {"MAG": "2955244231", "ArXiv": "1907.03199", "DBLP": "conf/iclr/Loukas20", + "CorpusId": 195833273}, "corpusId": 195833273, "publicationVenue": {"id": + "939c6e1d-0d17-4d6e-8a82-66d960df0e40", "name": "International Conference + on Learning Representations", "type": "conference", "alternate_names": ["Int + Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, "url": "https://www.semanticscholar.org/paper/7f42da4abfadf9d5a464affe22d0bd4bf21c0edb", + "title": "What graph neural networks cannot learn: depth vs width", "abstract": + "This paper studies the expressive power of graph neural networks falling + within the message-passing framework (GNNmp). Two results are presented. First, + GNNmp are shown to be Turing universal under sufficient conditions on their + depth, width, node attributes, and layer expressiveness. Second, it is discovered + that GNNmp can lose a significant portion of their power when their depth + and width is restricted. The proposed impossibility statements stem from a + new technique that enables the repurposing of seminal results from distributed + computing and leads to lower bounds for an array of decision, optimization, + and estimation problems involving graphs. Strikingly, several of these problems + are deemed impossible unless the product of a GNNmp''s depth and width exceeds + a polynomial of the graph size; this dependence remains significant even for + tasks that appear simple or when considering approximation.", "venue": "International + Conference on Learning Representations", "year": 2019, "referenceCount": 57, + "citationCount": 169, "influentialCitationCount": 26, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-07-06", "journal": {"name": "ArXiv", "volume": "abs/1907.03199"}, + "authors": [{"authorId": "1966031", "name": "Andreas Loukas"}]}, {"paperId": + "dedf0cfa92465047fc062cd48be361a195085f54", "externalIds": {"MAG": "2080482592", + "ArXiv": "1312.3080", "DOI": "10.1103/PhysRevLett.113.020502", "CorpusId": + 44653164, "PubMed": "25062152"}, "corpusId": 44653164, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/dedf0cfa92465047fc062cd48be361a195085f54", + "title": "Stringent and efficient assessment of boson-sampling devices.", + "abstract": "Boson sampling holds the potential to experimentally falsify + the extended Church-Turing thesis. The computational hardness of boson sampling, + however, complicates the certification that an experimental device yields + correct results in the regime in which it outmatches classical computers. + To certify a boson sampler, one needs to verify quantum predictions and rule + out models that yield these predictions without true many-boson interference. + We show that a semiclassical model for many-boson propagation reproduces coarse-grained + observables that are proposed as witnesses of boson sampling. A test based + on Fourier matrices is demonstrated to falsify physically plausible alternatives + to coherent many-boson propagation.", "venue": "Physical Review Letters", + "year": 2013, "referenceCount": 56, "citationCount": 91, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1312.3080", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2013-12-11", "journal": {"name": "Physical + review letters", "pages": "\n 020502\n ", "volume": "113 2"}, + "authors": [{"authorId": "32408805", "name": "M. Tichy"}, {"authorId": "2059169711", + "name": "Klaus Mayer"}, {"authorId": "2297417", "name": "A. Buchleitner"}, + {"authorId": "30881361", "name": "K. M\u00f8lmer"}]}, {"paperId": "dbd68f9be41d50833691b54239e49634bb13ebef", + "externalIds": {"DBLP": "journals/rsl/BeggsCT14", "MAG": "2145708185", "DOI": + "10.1017/S1755020314000240", "CorpusId": 20879390}, "corpusId": 20879390, + "publicationVenue": {"id": "4f0d3284-8636-4f67-946c-8a9684a228bc", "name": + "The Review of Symbolic Logic", "type": "journal", "alternate_names": ["Review + of Symbolic Logic", "Rev Symb Log"], "issn": "1755-0211", "url": "https://www.cambridge.org/core/journals/review-of-symbolic-logic", + "alternate_urls": ["http://journals.cambridge.org/RSL", "http://journals.cambridge.org/action/displayJournal?jid=RSL"]}, + "url": "https://www.semanticscholar.org/paper/dbd68f9be41d50833691b54239e49634bb13ebef", + "title": "THREE FORMS OF PHYSICAL MEASUREMENT AND THEIR COMPUTABILITY", "abstract": + "Abstract We have begun a theory of measurement in which an experimenter and + his or her experimental procedure are modeled by algorithms that interact + with physical equipment through a simple abstract interface. The theory is + based upon using models of physical equipment as oracles to Turing machines. + This allows us to investigate the computability and computational complexity + of measurement processes. We examine eight different experiments that make + measurements and, by introducing the idea of an observable indicator, we identify + three distinct forms of measurement process and three types of measurement + algorithm. We give axiomatic specifications of three forms of interfaces that + enable the three types of experiment to be used as oracles to Turing machines, + and lemmas that help certify an experiment satisfies the axiomatic specifications. + For experiments that satisfy our axiomatic specifications, we give lower bounds + on the computational power of Turing machines in polynomial time using nonuniform + complexity classes. These lower bounds break the barrier defined by the Church-Turing + Thesis.", "venue": "The Review of Symbolic Logic", "year": 2014, "referenceCount": + 47, "citationCount": 20, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://cronfa.swan.ac.uk/Record/cronfa21456/Download/0021456-31102016103554.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-04-07", "journal": {"name": "Fundam. Informaticae", - "pages": "463-490", "volume": "74"}, "authors": [{"authorId": "145026954", - "name": "J. Delvenne"}, {"authorId": "1786485", "name": "P. Kurka"}, {"authorId": - "1715830", "name": "V. Blondel"}]}, {"paperId": "2af0772a1d218bab8977dca419e26ed7524312a1", + "publicationDate": "2014-09-09", "journal": {"name": "The Review of Symbolic + Logic", "pages": "618 - 646", "volume": "7"}, "authors": [{"authorId": "1919705", + "name": "E. Beggs"}, {"authorId": "143698164", "name": "Jos\u00e9 F\u00e9lix + Costa"}, {"authorId": "145744796", "name": "J. V. Tucker"}]}, {"paperId": + "c38e6c17740c4a244767f4953672f00b686fa434", "externalIds": {"MAG": "2724963341", + "DBLP": "conf/fm/Borger98", "DOI": "10.1007/3-540-48257-1_1", "CorpusId": + 686782}, "corpusId": 686782, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c38e6c17740c4a244767f4953672f00b686fa434", + "title": "High Level System Design and Analysis Using Abstract State Machines", + "abstract": null, "venue": "FM-Trends", "year": 1998, "referenceCount": 153, + "citationCount": 167, "influentialCitationCount": 13, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1998-10-07", "journal": {"pages": "1-43"}, "authors": + [{"authorId": "1692943", "name": "E. B\u00f6rger"}]}, {"paperId": "2af0772a1d218bab8977dca419e26ed7524312a1", "externalIds": {"MAG": "2978586844", "DBLP": "journals/acta/PaulR80", "DOI": - "10.1007/BF00286494", "CorpusId": 29355505}, "url": "https://www.semanticscholar.org/paper/2af0772a1d218bab8977dca419e26ed7524312a1", + "10.1007/BF00286494", "CorpusId": 29355505}, "corpusId": 29355505, "publicationVenue": + {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", "name": "Acta Informatica", + "type": "journal", "alternate_names": ["Acta Inform"], "issn": "0001-5903", + "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/2af0772a1d218bab8977dca419e26ed7524312a1", "title": "On alternation II", "abstract": null, "venue": "Acta Informatica", "year": 1980, "referenceCount": 15, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1980-10-01", "journal": {"name": "Acta Informatica", "pages": "391-403", - "volume": "14"}, "authors": [{"authorId": "1727613", "name": "W. Paul"}, {"authorId": - "2715951", "name": "R. Reischuk"}]}, {"paperId": "d395856b635e679b321a487ec8e523956901e444", - "externalIds": {"MAG": "2040802713", "DOI": "10.1007/S11071-014-1516-9", "CorpusId": - 121488231}, "url": "https://www.semanticscholar.org/paper/d395856b635e679b321a487ec8e523956901e444", - "title": "Turing instability in a gene network with cross-diffusion", "abstract": - null, "venue": "", "year": 2014, "referenceCount": 39, "citationCount": 15, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2014-07-03", "journal": {"name": "Nonlinear Dynamics", - "pages": "1301-1310", "volume": "78"}, "authors": [{"authorId": "48809744", - "name": "Qianqian Zheng"}, {"authorId": "40275447", "name": "Jianwei Shen"}]}, - {"paperId": "a09e7f459453d55ee3c8b4f4869140e96b09df7c", "externalIds": {"MAG": - "2138506029", "DOI": "10.1098/rsta.2011.0325", "CorpusId": 14237229, "PubMed": - "22711872"}, "url": "https://www.semanticscholar.org/paper/a09e7f459453d55ee3c8b4f4869140e96b09df7c", - "title": "Turing''s three philosophical lessons and the philosophy of information", - "abstract": "In this article, I outline the three main philosophical lessons - that we may learn from Turing''s work, and how they lead to a new philosophy - of information. After a brief introduction, I discuss his work on the method - of levels of abstraction (LoA), and his insistence that questions could be - meaningfully asked only by specifying the correct LoA. I then look at his - second lesson, about the sort of philosophical questions that seem to be most - pressing today. Finally, I focus on the third lesson, concerning the new philosophical - anthropology that owes so much to Turing''s work. I then show how the lessons - are learned by the philosophy of information. In the conclusion, I draw a - general synthesis of the points made, in view of the development of the philosophy - of information itself as a continuation of Turing''s work.", "venue": "Philosophical - Transactions of the Royal Society A: Mathematical, Physical and Engineering - Sciences", "year": 2012, "referenceCount": 26, "citationCount": 23, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-07-28", "journal": - {"name": "Philosophical Transactions of the Royal Society A: Mathematical, - Physical and Engineering Sciences", "pages": "3536 - 3542", "volume": "370"}, - "authors": [{"authorId": "1982425", "name": "L. Floridi"}]}, {"paperId": "05e0f429f315b16665bda6068cfec0c2fbb287bd", - "externalIds": {"MAG": "2036235707", "DOI": "10.1088/0031-8949/1996/T67/009", - "CorpusId": 121198366}, "url": "https://www.semanticscholar.org/paper/05e0f429f315b16665bda6068cfec0c2fbb287bd", - "title": "Standard and nonstandard Turing patterns and waves in the CIMA reaction", - "abstract": "We describe experimental evidence of stable triangular and hexagon-band - mixed mode nonstandard patterns, in a three-dimensional chemical reaction-diffusion - system with steep gradients of chemical constraints. These gradients confine - the structures in a more or less thick stratum of the system. At onset, patterns - develop in monolayers which approximate two-dimensional systems; but beyond - onset, three-dimensional aspects have to be considered. We show that the nonstandard - pattern symmetries result from the coupling of standard hexagonal and striped - pattern modes which develop at adjacent positions, due to the differences - in parameter values along the direction of the gradients. We evidence a Turing-Hopf - codimension-2 point and show that some mixed mode chaotic dynamics, reminiscent - of spatio-temporal intermittency combining the Turing and the Hopf modes, - are also a consequence of the three-dimensional aspect of the structure. The - relations between these observations and the theoretical studies performed - in genuine two-dimensional systems are still open to discussion.", "venue": - "", "year": 1996, "referenceCount": 21, "citationCount": 36, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Physica Scripta", "pages": "43-50", "volume": "1996"}, "authors": - [{"authorId": "12105027", "name": "B. Rudovics"}, {"authorId": "3250971", - "name": "E. Dulos"}, {"authorId": "50010680", "name": "P. Kepper"}]}, {"paperId": - "5eb958432d38525bee3b19daee8220d4516e9de0", "externalIds": {"CorpusId": 5234617}, - "url": "https://www.semanticscholar.org/paper/5eb958432d38525bee3b19daee8220d4516e9de0", - "title": "Systems of logic based on ordinals : a dissertation Universal Turing - Machine", "abstract": "Recent advances in empathic technology and reliable - communication offer a viable alternative to e-business. In fact, few cyberneticists - would disagree with the investigation of operating systems. Our focus in our - research is not on whether 802.11 mesh networks can be made stochastic, signed, - and pseudorandom, but rather on motivating an analysis of hierarchical databases - (Stond).", "venue": "", "year": 2011, "referenceCount": 127, "citationCount": - 77, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "f3f8adb48ffc3094e84ff568fcb82098c45c27b0", "externalIds": - {"MAG": "184067717", "CorpusId": 18183330}, "url": "https://www.semanticscholar.org/paper/f3f8adb48ffc3094e84ff568fcb82098c45c27b0", - "title": "Strangers Intrusion Detection - Detecting Spammers and Fake Proles - in Social Networks Based on Topology Anomalies", "abstract": "Today''s social - networks are plagued by numeroustypes of malicious proles which can range - from so-cialbots to sexual predators. We present a novelmethod for the detection - of these malicious prolesby using the social network''s own topological fea-tures - only. Reliance on these features alone ensuresthat the proposed method is - generic enough to beapplied to a range of social networks. The algorithmhas - been evaluated on several social networks andwas found to be eective in detecting - various typesof malicious proles. We believe this method is avaluable step - in the increasing battle against socialnetwork spammers, socialbots, and sexual - predictors.", "venue": "", "year": 2012, "referenceCount": 39, "citationCount": - 90, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2012-12-14", "journal": {"name": "", "pages": "26-39", - "volume": "1"}, "authors": [{"authorId": "2337415", "name": "Michael Fire"}, - {"authorId": "144847172", "name": "Gilad Katz"}, {"authorId": "1724372", "name": - "Y. Elovici"}]}, {"paperId": "a42397893746da6488f70bfc0d48e66763860f0f", "externalIds": - {"MAG": "2438775341", "CorpusId": 63812413}, "url": "https://www.semanticscholar.org/paper/a42397893746da6488f70bfc0d48e66763860f0f", - "title": "On memory limitations in natural language processing", "abstract": - "This paper proposes a welcome hypothesis: a computationally simple device - is sufficient for processing natural language. Traditionally it has been argued - that processing natural language syntax requires very powerful machinery. - Many engineers have come to this rather grim conclusion; almost all working - parsers are actually Turing Machines (TM). For example, Woods specifically - designed his Augmented Transition Networks (ATN''''s) to be Turing Equivalent. - If the problem is really as hard as it appears, then the only solution is - to grin and bear it. Our own position is that parsing acceptable sentences - is simpler because there are constraints on human performance that drastically - reduce the computational requirements (time and space bounds). Although ideal - linguistic competence is very complex, this observation may not apply directly - to a real processing problem such as parsing. By including performance factors, - it is possible to simplify the computation. We will propose two performance - limitations, bounded memory and deterministic control, which have been incorporated - in a new parser YAP.", "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "2244184", "name": "Kenneth Ward Church"}]}, - {"paperId": "95fcd1512dda41c6aa8d0a1d284c61e983814d6d", "externalIds": {"MAG": - "2516576467", "DOI": "10.2307/1550176", "CorpusId": 133556656}, "url": "https://www.semanticscholar.org/paper/95fcd1512dda41c6aa8d0a1d284c61e983814d6d", - "title": "GEOECOLOGICAL INVESTIGATIONS ON THE TIMBERLINE OF PICO DE ORIZABA, - MEXICO", "abstract": "Measurements of soil temperature, soil mois- The lack - of dense, dwarfed tree stands above ture, and surface temperature were carried - out the timberline seems to be a result of natural at different elevations - on Pico de Orizaba, Mex- and man-made fire. The main limiting factor to ico, - in order to evaluate the ecology (phenology, tree growth is low soil temperature - in spring, plant physiology, and surface fire impact) of the which limits - water diffusion through plant cell", "venue": "", "year": 1975, "referenceCount": - 12, "citationCount": 62, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Arctic - and alpine research", "pages": "315", "volume": "7"}, "authors": [{"authorId": - "93084063", "name": "D. Klaus"}, {"authorId": "2070594069", "name": "C. Troll"}]}, - {"paperId": "e8850aaeef4efffcdd9131bcfa33b65b6b421dd8", "externalIds": {"MAG": - "340223309", "CorpusId": 60371396}, "url": "https://www.semanticscholar.org/paper/e8850aaeef4efffcdd9131bcfa33b65b6b421dd8", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1980-10-01", "journal": {"name": "Acta Informatica", "pages": + "391-403", "volume": "14"}, "authors": [{"authorId": "1727613", "name": "W. + Paul"}, {"authorId": "2715951", "name": "R. Reischuk"}]}, {"paperId": "e09001eaea98474d51468de0cc277c49246c8829", + "externalIds": {"MAG": "2999275892", "ArXiv": "quant-ph/9809038", "DOI": "10.1007/0-306-47097-7_32", + "CorpusId": 14868299}, "corpusId": 14868299, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e09001eaea98474d51468de0cc277c49246c8829", + "title": "Quantum Turing Machines: Local Transition, Preparation, Measurement, + and Halting", "abstract": null, "venue": "", "year": 1998, "referenceCount": + 20, "citationCount": 15, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Mathematics", "Computer + Science"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1998-09-14", "journal": {"name": + "", "pages": "241-248", "volume": ""}, "authors": [{"authorId": "1744207", + "name": "M. Ozawa"}]}, {"paperId": "e8850aaeef4efffcdd9131bcfa33b65b6b421dd8", + "externalIds": {"MAG": "340223309", "CorpusId": 60371396}, "corpusId": 60371396, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e8850aaeef4efffcdd9131bcfa33b65b6b421dd8", "title": "Reverse Engineering Social Media: Software, Culture, and Political Economy in New Media Capitalism", "abstract": "Acknowledgments Introduction: Looking Forward and Backward: Heterogeneous Engineering of Social Media Software @@ -30895,32 +35075,15 @@ interactions: a Class for Itself: The Case of Wikipedia''s Spanish Fork Labor Strike 6. A Manifesto for Socialized Media Notes Bibliography Index", "venue": "", "year": 2014, "referenceCount": 8, "citationCount": 89, "influentialCitationCount": - 15, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2014-06-27", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "3013520", "name": "R. Gehl"}]}, {"paperId": "966e92835387a6ab1d78aa80576a1ee2c963a3d5", - "externalIds": {"MAG": "1499204852", "DBLP": "journals/scholarpedia/Searle09", - "DOI": "10.1002/0470018860.S00159", "CorpusId": 60987687}, "url": "https://www.semanticscholar.org/paper/966e92835387a6ab1d78aa80576a1ee2c963a3d5", - "title": "Chinese room argument", "abstract": "The Chinese room argument is - a refutation of \u2018strong artificial intelligence\u2019 (strong AI), the - view that an appropriately programmed digital computer capable of passing - the Turing test would thereby have mental states and a mind in the same sense - in which human beings have mental states and a mind. Strong AI is distinguished - from weak AI, which is the view that the computer is a useful tool in studying - the mind, just as it is a useful tool in other disciplines ranging from molecular - biology to weather prediction. \n \n \nKeywords: \n \nartificial intelligence; - \nbrain; \ncomputational theory of the mind; \nsemantics; \nsyntax", "venue": - "Scholarpedia", "year": 2006, "referenceCount": 31, "citationCount": 89, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Philosophy"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Philosophy", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-01-15", "journal": {"name": "Scholarpedia", "pages": "3100", "volume": - "4"}, "authors": [{"authorId": "34493294", "name": "J. Searle"}]}, {"paperId": - "5ff0f7535ee21288dc994bf91533853bdf5fd945", "externalIds": {"ArXiv": "1711.01711", - "MAG": "2962874258", "DBLP": "journals/paapp/ZenilBHQ19", "DOI": "10.1080/17445760.2018.1448932", - "CorpusId": 4858068}, "url": "https://www.semanticscholar.org/paper/5ff0f7535ee21288dc994bf91533853bdf5fd945", + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2014-06-27", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "3013520", "name": "R. Gehl"}]}, + {"paperId": "5ff0f7535ee21288dc994bf91533853bdf5fd945", "externalIds": {"ArXiv": + "1711.01711", "MAG": "2962874258", "DBLP": "journals/paapp/ZenilBHQ19", "DOI": + "10.1080/17445760.2018.1448932", "CorpusId": 4858068}, "corpusId": 4858068, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5ff0f7535ee21288dc994bf91533853bdf5fd945", "title": "Coding-theorem like behaviour and emergence of the universal distribution from resource-bounded algorithmic probability", "abstract": "ABSTRACT Previously referred to as \u2018miraculous\u2019 in the scientific literature because @@ -30946,7 +35109,8 @@ interactions: can be accounted for by Algorithmic Probability in its approximation to the Universal Distribution.", "venue": "Int. J. Parallel Emergent Distributed Syst.", "year": 2017, "referenceCount": 50, "citationCount": 38, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1711.01711", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": @@ -30954,131 +35118,163 @@ interactions: and Distributed Systems", "pages": "161 - 180", "volume": "34"}, "authors": [{"authorId": "66445647", "name": "H. Zenil"}, {"authorId": "2070256", "name": "Liliana Badillo"}, {"authorId": "1389866418", "name": "Santiago Hern\u00e1ndez-Orozco"}, - {"authorId": "15676396", "name": "F. H. Quiroz"}]}, {"paperId": "dedf0cfa92465047fc062cd48be361a195085f54", - "externalIds": {"MAG": "2080482592", "ArXiv": "1312.3080", "DOI": "10.1103/PhysRevLett.113.020502", - "CorpusId": 44653164, "PubMed": "25062152"}, "url": "https://www.semanticscholar.org/paper/dedf0cfa92465047fc062cd48be361a195085f54", - "title": "Stringent and efficient assessment of boson-sampling devices.", - "abstract": "Boson sampling holds the potential to experimentally falsify - the extended Church-Turing thesis. The computational hardness of boson sampling, - however, complicates the certification that an experimental device yields - correct results in the regime in which it outmatches classical computers. - To certify a boson sampler, one needs to verify quantum predictions and rule - out models that yield these predictions without true many-boson interference. - We show that a semiclassical model for many-boson propagation reproduces coarse-grained - observables that are proposed as witnesses of boson sampling. A test based - on Fourier matrices is demonstrated to falsify physically plausible alternatives - to coherent many-boson propagation.", "venue": "Physical Review Letters", - "year": 2013, "referenceCount": 56, "citationCount": 90, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-12-11", "journal": {"name": "Physical - review letters", "pages": "\n 020502\n ", "volume": "113 2"}, - "authors": [{"authorId": "32408805", "name": "M. Tichy"}, {"authorId": "2059169711", - "name": "Klaus Mayer"}, {"authorId": "2297417", "name": "A. Buchleitner"}, - {"authorId": "30881361", "name": "K. M\u00f8lmer"}]}, {"paperId": "a639c6ba8d5f289c3d87f97473f5411151acb03e", - "externalIds": {"MAG": "2898278399", "DBLP": "journals/ijbc/CaiGZSW18", "DOI": - "10.1142/S0218127418501407", "CorpusId": 53290186}, "url": "https://www.semanticscholar.org/paper/a639c6ba8d5f289c3d87f97473f5411151acb03e", - "title": "Bifurcations and Pattern Formation in a Predator-Prey Model", "abstract": - "In this paper, we investigate the spatiotemporal dynamics of a Leslie\u2013Gower - predator\u2013prey model incorporating a prey refuge subject to the Neumann - boundary conditions. We mainly consider Hopf bifurcation and steady-state - bifurcation which bifurcate from the constant positive steady-state of the - model. In the case of Hopf bifurcation, by the center manifold theory and - the normal form method, we establish the bifurcation direction and stability - of bifurcating periodic solutions; in the case of steady-state bifurcation, - by the local and global bifurcation theories, we prove the existence of the - steady-state bifurcation, and find that there are two typical bifurcations, - Turing bifurcation and Turing\u2013Hopf bifurcation. Via numerical simulations, - we find that the model exhibits not only stationary Turing pattern induced - by diffusion which is dependent on space and independent of time, but also - temporal periodic pattern induced by Hopf bifurcation which is dependent on - time and independent of space, and spatiotemporal pattern induced by Turing\u2013Hopf - bifurcation which is dependent on both time and space. These results may enrich - the pattern formation in the predator\u2013prey model.", "venue": "Int. J. - Bifurc. Chaos", "year": 2018, "referenceCount": 34, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], + {"authorId": "15676396", "name": "F. H. Quiroz"}]}, {"paperId": "95fcd1512dda41c6aa8d0a1d284c61e983814d6d", + "externalIds": {"MAG": "2516576467", "DOI": "10.2307/1550176", "CorpusId": + 133556656}, "corpusId": 133556656, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/95fcd1512dda41c6aa8d0a1d284c61e983814d6d", + "title": "GEOECOLOGICAL INVESTIGATIONS ON THE TIMBERLINE OF PICO DE ORIZABA, + MEXICO", "abstract": "Measurements of soil temperature, soil mois- The lack + of dense, dwarfed tree stands above ture, and surface temperature were carried + out the timberline seems to be a result of natural at different elevations + on Pico de Orizaba, Mex- and man-made fire. The main limiting factor to ico, + in order to evaluate the ecology (phenology, tree growth is low soil temperature + in spring, plant physiology, and surface fire impact) of the which limits + water diffusion through plant cell", "venue": "", "year": 1975, "referenceCount": + 12, "citationCount": 62, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": + [{"category": "Geography", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Arctic and alpine research", "pages": "315", "volume": + "7"}, "authors": [{"authorId": "93084063", "name": "D. Klaus"}, {"authorId": + "2070594069", "name": "C. Troll"}]}, {"paperId": "78537a603860a6f240b8786dee8a9a76725a8d03", + "externalIds": {"MAG": "2080758590", "DOI": "10.1088/1751-8113/40/49/005", + "CorpusId": 123428073}, "corpusId": 123428073, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/78537a603860a6f240b8786dee8a9a76725a8d03", + "title": "Turing instability in sub-diffusive reaction\u2013diffusion systems", + "abstract": "Linear stability characteristics of an anomalous sub-diffusive + activator\u2013inhibitor system are investigated through a mesoscopic model, + where anomaly ensues by a memory integro-differential operator with an equal + anomaly exponent for all species. It is shown that monotonic instability, + known from normal diffusion, persists in the anomalous system, thereby allowing + Turing pattern occurrence. Presence of anomaly stabilizes the system by diminution + of the range of diffusion coefficients'' ratio involving instability. In addition, + the maximal growth rate is diminished, proving the existence of an absolutely + stable anomalous system.", "venue": "", "year": 2007, "referenceCount": 14, + "citationCount": 32, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2007-12-07", "journal": {"name": + "Journal of Physics A: Mathematical and Theoretical", "pages": "14687 - 14702", + "volume": "40"}, "authors": [{"authorId": "15282092", "name": "Y. Nec"}, {"authorId": + "1777899", "name": "A. Nepomnyashchy"}]}, {"paperId": "b8292848f5278b3bc2f20c8294c8b80c203849cd", + "externalIds": {"MAG": "1968913361", "DOI": "10.1115/1.3269892", "CorpusId": + 58485647}, "corpusId": 58485647, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b8292848f5278b3bc2f20c8294c8b80c203849cd", + "title": "Machinery Noise and Diagnostics", "abstract": "This book is a gem! + The field of noise control developed very rapidly in the past two and a half + decades. The control of noise must be contemplated in all stages of design + in the engineering of (a) industrial and office machinery, (b) struc ture + and engines (aircraft, power plant and automotive), (c) propeller noise, (d) + home appliances, and (e) other sources of noise in the immediate environment. + At one time, engineers controlled noise in general by common sense or trial + and error. Noise sources stem from a number of different areas. They are (/) + origin, (g) structures and their (h) pumping liquids in transforming and transporting + of mechanical (/'') vibration and and (j) of Requirements for improved instrumentation + are a", "venue": "", "year": 1987, "referenceCount": 0, "citationCount": 174, + "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": {"url": + "https://asmedigitalcollection.asme.org/vibrationacoustics/article-pdf/111/4/495/5436297/495_1.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1987-07-29", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "40626985", + "name": "R. Lyon"}, {"authorId": "143756562", "name": "H. Saunders"}]}, {"paperId": + "55c69622da02f02f5b5a52e42b28b8fec6260796", "externalIds": {"MAG": "2074371667", + "DOI": "10.1016/j.mbs.2011.12.005", "CorpusId": 16409817, "PubMed": "22207074"}, + "corpusId": 16409817, "publicationVenue": {"id": "7ddbf0f3-cc29-4172-b79c-19b9ed50e871", + "name": "Mathematical Biosciences", "alternate_names": ["Math Biosci"], "issn": + "0025-5564", "url": "https://www.journals.elsevier.com/mathematical-biosciences/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00255564"]}, + "url": "https://www.semanticscholar.org/paper/55c69622da02f02f5b5a52e42b28b8fec6260796", + "title": "Turing instabilities and spatio-temporal chaos in ratio-dependent + Holling-Tanner model.", "abstract": null, "venue": "Mathematical Biosciences", + "year": 2012, "referenceCount": 83, "citationCount": 88, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-03-01", "journal": {"name": "Mathematical biosciences", "pages": "\n 64-76\n ", + "volume": "236 1"}, "authors": [{"authorId": "33373208", "name": "M. Banerjee"}, + {"authorId": "2110878825", "name": "Santo Banerjee"}]}, {"paperId": "9490126e36cc70ab4a757b51b42103c50b52f7b6", + "externalIds": {"MAG": "2336292939", "CorpusId": 39336605, "PubMed": "6881679"}, + "corpusId": 39336605, "publicationVenue": {"id": "f09e3439-2129-47ae-81c3-42fac2e6bf5c", + "name": "American Scientist", "type": "journal", "alternate_names": ["Am Sci"], + "issn": "0003-0996", "url": "https://www.americanscientist.org/", "alternate_urls": + ["http://www.jstor.org/action/showPublication?journalCode=amerscie", "https://www.jstor.org/journal/amerscie"]}, + "url": "https://www.semanticscholar.org/paper/9490126e36cc70ab4a757b51b42103c50b52f7b6", + "title": "The first two R''s. The way different languages reduce speech to + script affects how visual information is processed in the brain.", "abstract": + "tures of the language spoken around him, whether it be English, Chinese, + or Telugu, Learning the written language, however, is frequently quite an + arduous process. Millions of people in the world are illiterate for lack of + adequate educational oppor tunity, A significant number of American children + have problems with reading and writing, even with the help of the best facilities. + This contrast between the two forms of language?speech versus script?is all + the more striking given that written language is invariably based on spoken + language.", "venue": "American Scientist", "year": 1983, "referenceCount": + 5, "citationCount": 91, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-10-01", "journal": {"name": "Int. J. Bifurc. Chaos", "pages": "1850140:1-1850140:17", - "volume": "28"}, "authors": [{"authorId": "2476593", "name": "Yongli Cai"}, - {"authorId": "2100377", "name": "Z. Gui"}, {"authorId": "2108177604", "name": - "Xuebing Zhang"}, {"authorId": "48626765", "name": "Hongbo Shi"}, {"authorId": - "2116103578", "name": "Weiming Wang"}]}, {"paperId": "3de3ae691d8253d83886e699fd6acefa6d0f6c23", - "externalIds": {"MAG": "2218755794", "DOI": "10.1007/978-94-011-1156-0_8", - "CorpusId": 123505962}, "url": "https://www.semanticscholar.org/paper/3de3ae691d8253d83886e699fd6acefa6d0f6c23", - "title": "Onset and Beyond Turing Pattern Formation", "abstract": null, "venue": - "", "year": 1995, "referenceCount": 42, "citationCount": 18, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Education", "source": "s2-fos-model"}, {"category": + "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1983-05-01", "journal": {"name": "American scientist", + "pages": "\n 238-43\n ", "volume": "71 3"}, "authors": [{"authorId": + "145572093", "name": "O. Tzeng"}, {"authorId": "113019827", "name": "W. S. + Wang"}]}, {"paperId": "a42397893746da6488f70bfc0d48e66763860f0f", "externalIds": + {"MAG": "2438775341", "CorpusId": 63812413}, "corpusId": 63812413, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a42397893746da6488f70bfc0d48e66763860f0f", + "title": "On memory limitations in natural language processing", "abstract": + "This paper proposes a welcome hypothesis: a computationally simple device + is sufficient for processing natural language. Traditionally it has been argued + that processing natural language syntax requires very powerful machinery. + Many engineers have come to this rather grim conclusion; almost all working + parsers are actually Turing Machines (TM). For example, Woods specifically + designed his Augmented Transition Networks (ATN''''s) to be Turing Equivalent. + If the problem is really as hard as it appears, then the only solution is + to grin and bear it. Our own position is that parsing acceptable sentences + is simpler because there are constraints on human performance that drastically + reduce the computational requirements (time and space bounds). Although ideal + linguistic competence is very complex, this observation may not apply directly + to a real processing problem such as parsing. By including performance factors, + it is possible to simplify the computation. We will propose two performance + limitations, bounded memory and deterministic control, which have been incorporated + in a new parser YAP.", "venue": "", "year": 1982, "referenceCount": 0, "citationCount": + 42, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "269-295", "volume": ""}, "authors": [{"authorId": - "143803550", "name": "Q. Ouyang"}, {"authorId": "2421446", "name": "H. Swinney"}]}, - {"paperId": "95ab0fc3122aa196187bff9610b8e71f2a33ac6e", "externalIds": {"DBLP": - "journals/ijac/MargensternP03", "MAG": "2067385660", "DOI": "10.1142/S0218196703001262", - "CorpusId": 207132802}, "url": "https://www.semanticscholar.org/paper/95ab0fc3122aa196187bff9610b8e71f2a33ac6e", - "title": "On the Optimal Number of Instructions for Universal Turing Machines - Connected With a Finite Automaton", "abstract": "In this paper, a new computation - system is defined by coupling a finite automaton with a deterministic Turing - machine with one head and one tape that is infinite in one direction only. - In a first part of the paper, it is shown that there is a Turing machine with - five instructions for which it is possible to devise a finite automaton such - that the resulting computation is able to simulate any Turing machine. In - a second part of the paper it is shown that if the Turing machine has at most - four instructions, whatever the finite automaton is, the halting of the resulting - computation is always decidable.", "venue": "Int. J. Algebra Comput.", "year": - 2003, "referenceCount": 15, "citationCount": 15, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-04-01", "journal": {"name": "Int. J. Algebra Comput.", "pages": "133-202", - "volume": "13"}, "authors": [{"authorId": "1697682", "name": "M. Margenstern"}, - {"authorId": "67152907", "name": "L. Pavlotska\u00efa"}]}, {"paperId": "15fd0e5fe446b40fc3832fc46ca3d6a140563f98", - "externalIds": {"DBLP": "journals/jsyml/Shore82", "MAG": "1981509588", "DOI": - "10.2307/2273376", "CorpusId": 27687340}, "url": "https://www.semanticscholar.org/paper/15fd0e5fe446b40fc3832fc46ca3d6a140563f98", - "title": "On homogeneity and definability in the first-order theory of the - Turing degrees", "abstract": "Relativization\u2014the principle that says - one can carry over proofs and theorems about partial recursive functions and - Turing degrees to functions partial recursive in any given set A and the Turing - degrees of sets in which A is recursive\u2014is a pervasive phenomenon in - recursion theory. It led H. Rogers, Jr. [15] to ask if, for every degree d, - (\u2265 d), the partial ordering of Turing degrees above d, is isomorphic - to all the degrees . We showed in Shore [17] that this homogeneity conjecture - is false. More specifically we proved that if, for some n, the degree of Kleene''s - (the complete set) is recursive in d(n) then \u2247 (\u2264 d). The key ingredient - of the proof was a new version of a result from Nerode and Shore [13] (hereafter - NS I) that any isomorphism \u03c6: \u2192 (\u2265 d) must be the identity - on some cone, i.e., there is an a called the base of the cone such that b - \u2265 a \u21d2 \u03c6(b) = b. This result was combined with information about - minimal covers from Jockusch and Soare [8] and Harrington and Kechris [3] - to derive a contradiction from the existence of such an isomorphism if deg() - \u2264 d(n).", "venue": "Journal of Symbolic Logic (JSL)", "year": 1982, "referenceCount": - 17, "citationCount": 34, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2244184", + "name": "Kenneth Ward Church"}]}, {"paperId": "61f2d3db4bc7e4be774263427104e04a7d3496e3", + "externalIds": {"DBLP": "journals/jsyml/MarconeM11", "ArXiv": "0910.5442", + "MAG": "3106208063", "DOI": "10.2178/jsl/1305810765", "CorpusId": 675632}, + "corpusId": 675632, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/61f2d3db4bc7e4be774263427104e04a7d3496e3", + "title": "The Veblen functions for computability theorists", "abstract": "Abstract + We study the computability-theoretic complexity and proof-theoretic strength + of the following statements: (1) \u201cIf is a well-ordering, then so is \u201d, + and (2) \u201cIf is a well-ordering, then so is \u03c6(\u03b1, )\u201d, where + \u221d is a fixed computable ordinal and \u03c6 represents the two-placed + Veblen function. For the former statement, we show that \u03c9 iterations + of the Turing jump are necessary in the proof and that the statement is equivalent + to over RCA0. To prove the latter statement we need to use \u03c9\u03b1 iterations + of the Turing jump, and we show that the statement is equivalent to . Our + proofs are purely computability-theoretic. We also give a new proof of a result + of Friedman: the statement \u201cif is a well-ordering, then so is \u03c6(, + 0)\u201d is equivalent to ATR0 over RCA0.", "venue": "Journal of Symbolic + Logic (JSL)", "year": 2009, "referenceCount": 33, "citationCount": 41, "influentialCitationCount": + 10, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0910.5442", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1982-03-01", "journal": {"name": "Journal - of Symbolic Logic", "pages": "8 - 16", "volume": "47"}, "authors": [{"authorId": - "1817824", "name": "R. Shore"}]}, {"paperId": "db72c9b2cdb3a4bbd4dca565f0c7b731244e521a", - "externalIds": {"MAG": "1983790616", "DOI": "10.1063/1.4765650", "CorpusId": - 94547202}, "url": "https://www.semanticscholar.org/paper/db72c9b2cdb3a4bbd4dca565f0c7b731244e521a", - "title": "Amplitude equation for a diffusion-reaction system: The reversible - Sel''kov model", "abstract": "For a model glycolytic diffusion-reaction system, - an amplitude equation has been derived in the framework of a weakly nonlinear - theory. The linear stability analysis of this amplitude equation interprets - the structural transitions and stability of various forms of Turing structures. - This amplitude equation also conforms to the expectation that time-invariant - amplitudes in Turing structures are independent of complexing reaction with - the activator species, whereas complexing reaction strongly influences Hopf-wave - bifurcation.", "venue": "", "year": 2012, "referenceCount": 24, "citationCount": - 24, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2012-10-26", "journal": {"name": "AIP Advances", - "pages": "042125", "volume": "2"}, "authors": [{"authorId": "27412483", "name": - "A. K. Dutt"}]}]} + "s2-fos-model"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2009-10-28", "journal": {"name": "The + Journal of Symbolic Logic", "pages": "575 - 602", "volume": "76"}, "authors": + [{"authorId": "2493438", "name": "Alberto Marcone"}, {"authorId": "145700778", + "name": "A. Montalb\u00e1n"}]}]} ' headers: @@ -31087,31 +35283,31 @@ interactions: Connection: - keep-alive Content-Length: - - '157793' + - '181422' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:41 GMT + - Tue, 03 Jan 2023 20:53:09 GMT Via: - - 1.1 7fcd30c75fe4480ba8986b43467bfd06.cloudfront.net (CloudFront) + - 1.1 b0cb9245c8703f606e2b3987ee6890c0.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - oZhcUnInSMWe5Z-neW_Ojk7_LYJMHtICcOKvJlqTzITYgX4O5yocpg== + - RQLCrELPMmrk1SyHcA0iSLoH0nn1GLe4zywaKEhzryM3SGPTmjorgg== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detHsELAPHcF5uQ= + - eLxUbFM3vHcFmSw= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '157793' + - '181422' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:41 GMT + - Tue, 03 Jan 2023 20:53:09 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - b70064ff-2ed4-42c2-b7f7-65fc5364fa11 + - b1011374-0a8d-4070-b1b2-997174e37389 status: code: 200 message: OK @@ -31127,71 +35323,287 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1500&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1500&limit=100 response: body: - string: '{"total": 65539, "offset": 1500, "next": 1600, "data": [{"paperId": - "1f6f5013c80e6967433db5bddcd822359334375b", "externalIds": {"MAG": "1976113152", - "DOI": "10.1016/0375-9601(93)90686-T", "CorpusId": 119929015}, "url": "https://www.semanticscholar.org/paper/1f6f5013c80e6967433db5bddcd822359334375b", - "title": "Chaotic Turing structures", "abstract": null, "venue": "", "year": - 1993, "referenceCount": 29, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1993-08-16", - "journal": {"name": "Physics Letters A", "pages": "325-331", "volume": "179"}, - "authors": [{"authorId": "1706628", "name": "R. Sol\u00e9"}, {"authorId": - "3001050", "name": "J. Bascompte"}]}, {"paperId": "15fd0e5fe446b40fc3832fc46ca3d6a140563f98", - "externalIds": {"DBLP": "journals/jsyml/Shore82", "MAG": "1981509588", "DOI": - "10.2307/2273376", "CorpusId": 27687340}, "url": "https://www.semanticscholar.org/paper/15fd0e5fe446b40fc3832fc46ca3d6a140563f98", - "title": "On homogeneity and definability in the first-order theory of the - Turing degrees", "abstract": "Relativization\u2014the principle that says - one can carry over proofs and theorems about partial recursive functions and - Turing degrees to functions partial recursive in any given set A and the Turing - degrees of sets in which A is recursive\u2014is a pervasive phenomenon in - recursion theory. It led H. Rogers, Jr. [15] to ask if, for every degree d, - (\u2265 d), the partial ordering of Turing degrees above d, is isomorphic - to all the degrees . We showed in Shore [17] that this homogeneity conjecture - is false. More specifically we proved that if, for some n, the degree of Kleene''s - (the complete set) is recursive in d(n) then \u2247 (\u2264 d). The key ingredient - of the proof was a new version of a result from Nerode and Shore [13] (hereafter - NS I) that any isomorphism \u03c6: \u2192 (\u2265 d) must be the identity - on some cone, i.e., there is an a called the base of the cone such that b - \u2265 a \u21d2 \u03c6(b) = b. This result was combined with information about - minimal covers from Jockusch and Soare [8] and Harrington and Kechris [3] - to derive a contradiction from the existence of such an isomorphism if deg() - \u2264 d(n).", "venue": "Journal of Symbolic Logic (JSL)", "year": 1982, "referenceCount": - 17, "citationCount": 34, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + string: '{"total": 65730, "offset": 1500, "next": 1600, "data": [{"paperId": + "f39891d6ee04ba53dc40579150ff5435f6a7e46d", "externalIds": {"MAG": "2335457302", + "DOI": "10.1103/PHYSREVE.87.032906", "CorpusId": 124577328}, "corpusId": 124577328, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f39891d6ee04ba53dc40579150ff5435f6a7e46d", + "title": "Turing space in reaction-diffusion systems with density-dependent + cross diffusion", "abstract": "Reaction-diffusion systems with cross-diffusion + terms that depend linearly on density are studied via linear stability analysis + and weakly nonlinear analysis. We obtain and analyze the conditions for the + Turing instability and derive a universal form of these conditions. We discuss + the features of the pattern-forming regions in parameter space for a cross + activator-inhibitor system, the Brusselator model, and for a pure activator-inhibitor + system, the two-variable Oregonator model. The supercritical or subcritical + character of the Turing bifurcation for the Brusselator is determined by deriving + an amplitude equation for patterns near the instability threshold.", "venue": + "", "year": 2013, "referenceCount": 31, "citationCount": 27, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-03-13", "journal": {"name": "Physical Review E", "pages": "032906", + "volume": "87"}, "authors": [{"authorId": "39224568", "name": "E. Zemskov"}, + {"authorId": "2745924", "name": "K. Kassner"}, {"authorId": "144301618", "name": + "M. Hauser"}, {"authorId": "3041313", "name": "W. Horsthemke"}]}, {"paperId": + "a02a7463df598786e46c4ff47c0207c6f5a244ed", "externalIds": {"MAG": "1973055814", + "DOI": "10.1111/j.1365-2818.2009.03331.x", "CorpusId": 27709001, "PubMed": + "20384838"}, "corpusId": 27709001, "publicationVenue": {"id": "52565dee-9c42-40a4-a69e-411601da6587", + "name": "Journal of Microscopy", "type": "journal", "alternate_names": ["J + microsc", "Journal de microscopie", "J Microsc"], "issn": "0022-2720", "alternate_issns": + ["0021-7921"], "url": "http://www.blackwell-synergy.com/servlet/useragent?close=1997&code=jmi&func=showIssues#C1997", + "alternate_urls": ["https://onlinelibrary.wiley.com/journal/13652818", "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1365-2818"]}, + "url": "https://www.semanticscholar.org/paper/a02a7463df598786e46c4ff47c0207c6f5a244ed", + "title": "Tensorial Minkowski functionals and anisotropy measures for planar + patterns", "abstract": "Quantitative measures for anisotropic characteristics + of spatial structure are needed when relating the morphology of microstructured + heterogeneous materials to tensorial physical properties such as elasticity, + permeability and conductance. Tensor\u2010valued Minkowski functionals, defined + in the framework of integral geometry, provide a concise set of descriptors + of anisotropic morphology. In this article, we describe the robust computation + of these measures for microscopy images and polygonal shapes. We demonstrate + their relevance for shape description, their versatility and their robustness + by applying them to experimental data sets, specifically microscopy data sets + of non\u2010equilibrium stationary Turing patterns and the shapes of ice grains + from Antarctic cores.", "venue": "Journal of Microscopy", "year": 2010, "referenceCount": + 61, "citationCount": 87, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1982-03-01", "journal": {"name": "Journal - of Symbolic Logic", "pages": "8 - 16", "volume": "47"}, "authors": [{"authorId": - "1817824", "name": "R. Shore"}]}, {"paperId": "7f42da4abfadf9d5a464affe22d0bd4bf21c0edb", - "externalIds": {"MAG": "2955244231", "ArXiv": "1907.03199", "DBLP": "conf/iclr/Loukas20", - "CorpusId": 195833273}, "url": "https://www.semanticscholar.org/paper/7f42da4abfadf9d5a464affe22d0bd4bf21c0edb", - "title": "What graph neural networks cannot learn: depth vs width", "abstract": - "This paper studies the expressive power of graph neural networks falling - within the message-passing framework (GNNmp). Two results are presented. First, - GNNmp are shown to be Turing universal under sufficient conditions on their - depth, width, node attributes, and layer expressiveness. Second, it is discovered - that GNNmp can lose a significant portion of their power when their depth - and width is restricted. The proposed impossibility statements stem from a - new technique that enables the repurposing of seminal results from distributed - computing and leads to lower bounds for an array of decision, optimization, - and estimation problems involving graphs. Strikingly, several of these problems - are deemed impossible unless the product of a GNNmp''s depth and width exceeds - a polynomial of the graph size; this dependence remains significant even for - tasks that appear simple or when considering approximation.", "venue": "International - Conference on Learning Representations", "year": 2019, "referenceCount": 57, - "citationCount": 168, "influentialCitationCount": 26, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + ["JournalArticle"], "publicationDate": "2010-04-01", "journal": {"name": "Journal + of Microscopy", "volume": "238"}, "authors": [{"authorId": "1398404281", "name": + "G. Schr\u00f6der-Turk"}, {"authorId": "10783115", "name": "S. Kapfer"}, {"authorId": + "103080687", "name": "B. Breidenbach"}, {"authorId": "2849540", "name": "C. + Beisbart"}, {"authorId": "1803425", "name": "K. Mecke"}]}, {"paperId": "fe19339703f83c03775b78c80dfccc988cc5a8cf", + "externalIds": {"DBLP": "journals/sLogica/Joosten16", "ArXiv": "1404.4483", + "MAG": "1628975265", "DOI": "10.1007/s11225-016-9674-z", "CorpusId": 207243168}, + "corpusId": 207243168, "publicationVenue": {"id": "c882a752-b0fa-4663-ba2f-0bd0c6b18018", + "name": "Studia Logica: An International Journal for Symbolic Logic", "type": + "journal", "alternate_names": ["Studia Logica", "Stud Logica", "Stud Logica + Int J Symb Log"], "issn": "0039-3215", "url": "https://link.springer.com/journal/11225", + "alternate_urls": ["http://www.jstor.org/journals/00393215.html", "http://www.studialogica.org/", + "https://www.jstor.org/journal/studlogi"]}, "url": "https://www.semanticscholar.org/paper/fe19339703f83c03775b78c80dfccc988cc5a8cf", + "title": "Turing\u2013Taylor Expansions for Arithmetic Theories", "abstract": + null, "venue": "Studia Logica: An International Journal for Symbolic Logic", + "year": 2014, "referenceCount": 18, "citationCount": 17, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1404.4483", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2019-07-06", "journal": - {"name": "ArXiv", "volume": "abs/1907.03199"}, "authors": [{"authorId": "1966031", - "name": "Andreas Loukas"}]}, {"paperId": "21177dd61dfbeb8e1e3881cbd7fc966d475362b6", + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-04-17", "journal": {"name": "Studia Logica", "pages": "1225-1243", "volume": + "104"}, "authors": [{"authorId": "1748961", "name": "J. Joosten"}]}, {"paperId": + "61f2d3db4bc7e4be774263427104e04a7d3496e3", "externalIds": {"DBLP": "journals/jsyml/MarconeM11", + "ArXiv": "0910.5442", "MAG": "3106208063", "DOI": "10.2178/jsl/1305810765", + "CorpusId": 675632}, "corpusId": 675632, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/61f2d3db4bc7e4be774263427104e04a7d3496e3", + "title": "The Veblen functions for computability theorists", "abstract": "Abstract + We study the computability-theoretic complexity and proof-theoretic strength + of the following statements: (1) \u201cIf is a well-ordering, then so is \u201d, + and (2) \u201cIf is a well-ordering, then so is \u03c6(\u03b1, )\u201d, where + \u221d is a fixed computable ordinal and \u03c6 represents the two-placed + Veblen function. For the former statement, we show that \u03c9 iterations + of the Turing jump are necessary in the proof and that the statement is equivalent + to over RCA0. To prove the latter statement we need to use \u03c9\u03b1 iterations + of the Turing jump, and we show that the statement is equivalent to . Our + proofs are purely computability-theoretic. We also give a new proof of a result + of Friedman: the statement \u201cif is a well-ordering, then so is \u03c6(, + 0)\u201d is equivalent to ATR0 over RCA0.", "venue": "Journal of Symbolic + Logic (JSL)", "year": 2009, "referenceCount": 33, "citationCount": 41, "influentialCitationCount": + 10, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0910.5442", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2009-10-28", "journal": {"name": "The + Journal of Symbolic Logic", "pages": "575 - 602", "volume": "76"}, "authors": + [{"authorId": "2493438", "name": "Alberto Marcone"}, {"authorId": "145700778", + "name": "A. Montalb\u00e1n"}]}, {"paperId": "348b0049b0c7b3f7e74b77cca30213cb7e550360", + "externalIds": {"DBLP": "conf/ccs/BletschJFL11", "MAG": "1969501726", "DOI": + "10.1145/1966913.1966919", "CorpusId": 13132108}, "corpusId": 13132108, "publicationVenue": + {"id": "87fc9c3c-cc7f-42aa-ba71-2700729a6788", "name": "ACM Asia Conference + on Computer and Communications Security", "type": "conference", "alternate_names": + ["AsiaCCS", "ACM Asia Conf Comput Commun Secur", "ACM Symposium on Information, + Computer and Communications Security", "ACM Symp Inf Comput Commun Secur", + "ASIACCS"], "url": "https://dl.acm.org/conference/asia-ccs"}, "url": "https://www.semanticscholar.org/paper/348b0049b0c7b3f7e74b77cca30213cb7e550360", + "title": "Jump-oriented programming: a new class of code-reuse attack", "abstract": + "Return-oriented programming is an effective code-reuse attack in which short + code sequences ending in a ret instruction are found within existing binaries + and executed in arbitrary order by taking control of the stack. This allows + for Turing-complete behavior in the target program without the need for injecting + attack code, thus significantly negating current code injection defense efforts + (e.g., W\u2295X). On the other hand, its inherent characteristics, such as + the reliance on the stack and the consecutive execution of return-oriented + gadgets, have prompted a variety of defenses to detect or prevent it from + happening.\n In this paper, we introduce a new class of code-reuse attack, + called jump-oriented programming. This new attack eliminates the reliance + on the stack and ret instructions (including ret-like instructions such as + pop+jmp) seen in return-oriented programming without sacrificing expressive + power. This attack still builds and chains functional gadgets, each performing + certain primitive operations, except these gadgets end in an indirect branch + rather than ret. Without the convenience of using ret to unify them, the attack + relies on a dispatcher gadget to dispatch and execute the functional gadgets. + We have successfully identified the availability of these jump-oriented gadgets + in the GNU libc library. Our experience with an example shellcode attack demonstrates + the practicality and effectiveness of this technique.", "venue": "ACM Asia + Conference on Computer and Communications Security", "year": 2011, "referenceCount": + 40, "citationCount": 530, "influentialCitationCount": 71, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2011-03-22", "journal": {"pages": "30-40"}, "authors": + [{"authorId": "3139420", "name": "T. Bletsch"}, {"authorId": "1740888", "name": + "Xuxian Jiang"}, {"authorId": "1752331", "name": "V. Freeh"}, {"authorId": + "2728022", "name": "Zhenkai Liang"}]}, {"paperId": "d77d9b8de99a2f0e389ef16bc79915b70261500f", + "externalIds": {"ArXiv": "cond-mat/0210323", "MAG": "2007588560", "DOI": "10.1103/PhysRevLett.90.038101", + "CorpusId": 41475325, "PubMed": "12570527"}, "corpusId": 41475325, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/d77d9b8de99a2f0e389ef16bc79915b70261500f", + "title": "Reactive glass and vegetation patterns.", "abstract": "The formation + of vegetation patterns in the arid and the semiarid climatic zones is studied. + Threshold for the biomass of the perennial flora is shown to be a relevant + factor, leading to a frozen disordered pattern in the arid zone. In this \"glassy\" + state, vegetation appears as singular plant spots separated by irregular distances, + and an indirect repulsive interaction among shrubs is induced by the competition + for water. At higher precipitation rates, the diminishing of hydrological + losses in the presence of flora becomes important and yields spatial attraction + and clustering of biomass. Turing patterns with characteristic length scale + emerge from the disordered structure due to this positive-feedback instability.", + "venue": "Physical Review Letters", "year": 2002, "referenceCount": 15, "citationCount": + 87, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/cond-mat/0210323", "status": "GREEN"}, "fieldsOfStudy": + ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-10-15", "journal": {"name": "Physical review letters", + "pages": "\n 038101\n ", "volume": "90 3"}, "authors": [{"authorId": + "145606617", "name": "N. Shnerb"}, {"authorId": "3808050", "name": "P. Sarah"}, + {"authorId": "153138298", "name": "H. Lavee"}, {"authorId": "119670857", "name": + "S. Solomon"}]}, {"paperId": "bfb69f8a775829847e63b3135b7e39df4f627f59", "externalIds": + {"DBLP": "conf/birthday/ShenDS12", "MAG": "104074713", "DOI": "10.29007/rlxq", + "CorpusId": 16232556}, "corpusId": 16232556, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bfb69f8a775829847e63b3135b7e39df4f627f59", + "title": "Feature Selection Ensemble", "abstract": "Many strategies have been + exploited for the task of feature selection, in an effort to identify more + compact and better quality feature subsets. Such techniques typically involve + the use of an individual feature significance evaluation, or a measurement + of feature subset consistency, that work together with a search algorithm + in order to determine a quality subset. Feature selection ensemble aims to + combine the outputs of multiple feature selectors, thereby producing a more + robust result for the subsequent classifier learning tasks. In this paper, + three novel implementations of the feature selection ensemble concept are + introduced, generalising the ensemble approach so that it can be used in conjunction + with many subset evaluation techniques, and search algorithms. A recently + developed heuristic algorithm: harmony search is employed to demonstrate the + approaches. Results of experimental comparative studies are reported in order + to highlight the benefits of the present work. The paper ends with a proposal + to extend the application of feature selection ensemble to aiding the development + of biped robots (inspired by the authors\u2019 involvement in the joint celebration + of Olympic and the centenary of the birth of Alan Turing).", "venue": "Turing-100", + "year": 2012, "referenceCount": 70, "citationCount": 57, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://easychair.org/publications/open/8Q8h", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-06-22", "journal": {"pages": "289-306"}, "authors": + [{"authorId": "144576537", "name": "Q. Shen"}, {"authorId": "3096993", "name": + "R. Diao"}, {"authorId": "47527511", "name": "P. Su"}]}, {"paperId": "bdb961c14e9104f97f4d7145ee7c87dc458ca3ee", + "externalIds": {"MAG": "2110496051", "DOI": "10.1146/ANNUREV.NE.18.030195.002125", + "CorpusId": 35738505, "PubMed": "7605067"}, "corpusId": 35738505, "publicationVenue": + {"id": "d9caa671-3be6-48bc-9710-f96334848b4c", "name": "Annual Review of Neuroscience", + "type": "journal", "alternate_names": ["Annu Rev Neurosci"], "issn": "0147-006X", + "url": "https://www.annualreviews.org/journal/neuro", "alternate_urls": ["http://arjournals.annualreviews.org/loi/neuro", + "https://www.annualreviews.org/loi/neuro"]}, "url": "https://www.semanticscholar.org/paper/bdb961c14e9104f97f4d7145ee7c87dc458ca3ee", + "title": "Mechanisms of neural patterning and specification in the developing + cerebellum.", "abstract": "The cerebellar cortex is one of the best-studied + regions of the CNS. For nearly a century, all of the cerebellar cell types + and the patterns of their synaptic connections have been known. Much of this + wealth of information comes from Ramon y Cajal''s work (1889, 1911, 1960) + with Golgi studies. Further infor\u00ad mation on the development (Altman + & Bayer 1985a-c, Rakic 1971, Miale & Sidman 1961), anatomy (Palay & Chan-Palay + 1974), fiber tracts (BrodaI1981), and circuitry (Llinas & Hillman 1969) of + the cerebellar cortex has emerged over the past several decades. The cerebellum + provides a unique system for studying CNS development, combining the three + classic patterns of CNS development-morphogenetic movements, the formation + of ganglionic struc\u00ad tures, and the establishment of neuronal layers-within + one brain region. Remarkably simple in its basic plan, the adult cerebellar + cortex contains only three layers and two principal classes of neurons. The + abundance of one of these principal neurons, the granule cell, has enabled + detailed analyses of the molecular mechanisms that underlie the basic steps + in neuronal differentiation and has pointed out the role of local community + factors in CNS neuronal development. Moreover, studies of naturally occurring + mutations (Heintz et al 1993, Sidman 1968) and of targeted gene disruptions + that block discrete steps in the development of this region (McMahon 1993, + Joyner & Hanks 1991,", "venue": "Annual Review of Neuroscience", "year": 1995, + "referenceCount": 39, "citationCount": 557, "influentialCitationCount": 26, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + null, "journal": {"name": "Annual review of neuroscience", "pages": "\n 385-408\n ", + "volume": "18"}, "authors": [{"authorId": "5495393", "name": "M. Hatten"}, + {"authorId": "26123312", "name": "N. Heintz"}]}, {"paperId": "5eb958432d38525bee3b19daee8220d4516e9de0", + "externalIds": {"CorpusId": 5234617}, "corpusId": 5234617, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5eb958432d38525bee3b19daee8220d4516e9de0", + "title": "Systems of logic based on ordinals : a dissertation Universal Turing + Machine", "abstract": "Recent advances in empathic technology and reliable + communication offer a viable alternative to e-business. In fact, few cyberneticists + would disagree with the investigation of operating systems. Our focus in our + research is not on whether 802.11 mesh networks can be made stochastic, signed, + and pseudorandom, but rather on motivating an analysis of hierarchical databases + (Stond).", "venue": "", "year": 2011, "referenceCount": 127, "citationCount": + 77, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "05e0f429f315b16665bda6068cfec0c2fbb287bd", + "externalIds": {"MAG": "2036235707", "DOI": "10.1088/0031-8949/1996/T67/009", + "CorpusId": 121198366}, "corpusId": 121198366, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/05e0f429f315b16665bda6068cfec0c2fbb287bd", + "title": "Standard and nonstandard Turing patterns and waves in the CIMA reaction", + "abstract": "We describe experimental evidence of stable triangular and hexagon-band + mixed mode nonstandard patterns, in a three-dimensional chemical reaction-diffusion + system with steep gradients of chemical constraints. These gradients confine + the structures in a more or less thick stratum of the system. At onset, patterns + develop in monolayers which approximate two-dimensional systems; but beyond + onset, three-dimensional aspects have to be considered. We show that the nonstandard + pattern symmetries result from the coupling of standard hexagonal and striped + pattern modes which develop at adjacent positions, due to the differences + in parameter values along the direction of the gradients. We evidence a Turing-Hopf + codimension-2 point and show that some mixed mode chaotic dynamics, reminiscent + of spatio-temporal intermittency combining the Turing and the Hopf modes, + are also a consequence of the three-dimensional aspect of the structure. The + relations between these observations and the theoretical studies performed + in genuine two-dimensional systems are still open to discussion.", "venue": + "", "year": 1996, "referenceCount": 21, "citationCount": 36, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Physica Scripta", "pages": "43-50", "volume": "1996"}, + "authors": [{"authorId": "12105027", "name": "B. Rudovics"}, {"authorId": + "3250971", "name": "E. Dulos"}, {"authorId": "50010680", "name": "P. Kepper"}]}, + {"paperId": "9d28eae4da33aa20208cba54c2d563cf018bb196", "externalIds": {"DOI": + "10.1007/3-7643-7387-3_3", "CorpusId": 15073726}, "corpusId": 15073726, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9d28eae4da33aa20208cba54c2d563cf018bb196", + "title": "Biological Sequences and the Exact String Matching Problem Universal + Turing Machine", "abstract": null, "venue": "", "year": 2011, "referenceCount": + 245, "citationCount": 78, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": []}, {"paperId": "21177dd61dfbeb8e1e3881cbd7fc966d475362b6", "externalIds": {"DBLP": "journals/ijfcs/VollmerW93", "MAG": "2004815025", - "DOI": "10.1142/S0129054193000195", "CorpusId": 5835667}, "url": "https://www.semanticscholar.org/paper/21177dd61dfbeb8e1e3881cbd7fc966d475362b6", + "DOI": "10.1142/S0129054193000195", "CorpusId": 5835667}, "corpusId": 5835667, + "publicationVenue": {"id": "0f60ff8e-f0b7-47a2-9927-2b94f9e44e82", "name": + "International Journal of Foundations of Computer Science", "type": "journal", + "alternate_names": ["Int J Found Comput Sci"], "issn": "0129-0541", "url": + "http://www.cs.ucsb.edu/~ijfcs/"}, "url": "https://www.semanticscholar.org/paper/21177dd61dfbeb8e1e3881cbd7fc966d475362b6", "title": "The Complexity of Finding Middle Elements", "abstract": "Seinosuke Toda introduced the class Mid P of functions that yield the middle element in the set of output values over all paths of nondeterministic polynomial @@ -31209,15 +35621,116 @@ interactions: the status of Toda\u2019s very important class Mid P in showing that it is closely related to the class PPNP.", "venue": "International Journal of Foundations of Computer Science", "year": 1993, "referenceCount": 22, "citationCount": - 38, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1993-12-01", "journal": {"name": "Int. - J. Found. Comput. Sci.", "pages": "293-307", "volume": "4"}, "authors": [{"authorId": - "1696405", "name": "H. Vollmer"}, {"authorId": "2281207", "name": "K. Wagner"}]}, - {"paperId": "14b967e329194e62fd57698636feffc69ca81a18", "externalIds": {"MAG": - "2073747100", "DOI": "10.1109/JPHOT.2013.2277882", "CorpusId": 15541185}, + 38, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1993-12-01", "journal": {"name": "Int. J. Found. Comput. Sci.", "pages": + "293-307", "volume": "4"}, "authors": [{"authorId": "1696405", "name": "H. + Vollmer"}, {"authorId": "2281207", "name": "K. Wagner"}]}, {"paperId": "7f59b346b74b9bb27ee2848e5d49e5a5fd02fe0e", + "externalIds": {"MAG": "2083504163", "DOI": "10.1002/POLB.21122", "CorpusId": + 135529865}, "corpusId": 135529865, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f59b346b74b9bb27ee2848e5d49e5a5fd02fe0e", + "title": "Electrospinning of ultrahigh\u2010molecular\u2010weight polyethylene + nanofibers", "abstract": "The electrospinning method has been employed to + fabricate ultrafine nanofibers of ultrahigh-molecular-weight polyethylene + for the first time with a mix- ture of solvents of different dielectric constants + and conductivities. The possibility of producing highly oriented nanofibers + from ultrahigh-molecular-weight polymers sug- gests new ways of fabricating + ultrastrong, porous, and single-component nanocompo- site fibers with improved + properties. V C 2007 Wiley Periodicals, Inc. J Polym Sci Part B: Polym Phys + 45: 766-773, 2007", "venue": "", "year": 2007, "referenceCount": 44, "citationCount": + 58, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-04-01", + "journal": {"name": "Journal of Polymer Science Part B", "pages": "766-773", + "volume": "45"}, "authors": [{"authorId": "14356631", "name": "D. Rein"}, + {"authorId": "1429030536", "name": "Liron Shavit-Hadar"}, {"authorId": "40894954", + "name": "R. Khalfin"}, {"authorId": "17764413", "name": "Y. Cohen"}, {"authorId": + "46575351", "name": "K. Shuster"}, {"authorId": "2862101", "name": "E. Zussman"}]}, + {"paperId": "59a0257620d31f1f334ce7d545c1dff88aaa72e6", "externalIds": {"DBLP": + "journals/itpro/PopeK05", "MAG": "2114267717", "DOI": "10.1109/MITP.2005.37", + "CorpusId": 16207890}, "corpusId": 16207890, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/59a0257620d31f1f334ce7d545c1dff88aaa72e6", + "title": "Is it human or computer? Defending e-commerce with Captchas", "abstract": + "A Captcha - a completely automatic public Turing test to tell computers and + humans apart - is a test that humans can pass but computer programs cannot; + such tests are becoming key to defending e-commerce systems. By using a Captcha, + for example, IT systems can permit only real people-rather than a spammer''s + script-to create a free e-mail account. This article explains the various + types of Captchas and discusses their strengths and weaknesses as a security + measure. It also lists sources for more information on the formal research + into Captchas.", "venue": "IT Professional", "year": 2005, "referenceCount": + 5, "citationCount": 88, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-03-01", "journal": {"name": "IT Professional", "pages": + "43-49", "volume": "7"}, "authors": [{"authorId": "34035034", "name": "Clark + Pope"}, {"authorId": "3077412", "name": "Khushpreet Kaur"}]}, {"paperId": + "364dfa035dcc91e3a08e9608911a0d7228250eed", "externalIds": {"DBLP": "journals/aml/Michel93", + "MAG": "2050162072", "DOI": "10.1007/BF01409968", "CorpusId": 206794557}, + "corpusId": 206794557, "publicationVenue": {"id": "baf6e768-e94b-48e9-9326-6aad748d4c61", + "name": "Archive for Mathematical Logic", "type": "journal", "alternate_names": + ["Arch Math Log"], "issn": "0933-5846", "url": "https://www.springer.com/mathematics/journal/153", + "alternate_urls": ["http://link.springer.com/journal/153", "http://www.springer.com/mathematics/journal/153"]}, + "url": "https://www.semanticscholar.org/paper/364dfa035dcc91e3a08e9608911a0d7228250eed", + "title": "Busy beaver competition and Collatz-like problems", "abstract": + null, "venue": "Archive for Mathematical Logic", "year": 1993, "referenceCount": + 17, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1993-09-01", "journal": {"name": "Archive for Mathematical Logic", "pages": + "351-367", "volume": "32"}, "authors": [{"authorId": "2068244973", "name": + "Pascal Michel"}]}, {"paperId": "bcfe98dfb2b6a70be9c53b4e7ac9ff084866fb3b", + "externalIds": {"MAG": "2012455630", "DOI": "10.1524/zkri.1988.184.14.111", + "CorpusId": 20962199}, "corpusId": 20962199, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bcfe98dfb2b6a70be9c53b4e7ac9ff084866fb3b", + "title": "Low-temperature structural distortion in CuS", "abstract": "The + crystal structure of CuS has been studied by powder X-ray and neutron diffraction + methods between 6 and 730 K. At room tempera- ture the hexagonal structure + was confirmed. At low temperature ( ~ 55 K) a second order phase transition + takes place with a space group change from P63/mmc to the \"translationengleiche\" + subgroup Cmcm. This ortho- rhombic distortion causes only small, but significant + changes in the Cu - S and S - S bonding distances. The most pronounced changes + occur for the Cu - Cu distances, indicating metal- metal bond formation to + be the main cause of the transition.", "venue": "", "year": 1988, "referenceCount": + 30, "citationCount": 86, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Zeitschrift f\u00fcr Kristallographie - Crystalline + Materials", "pages": "111 - 122", "volume": "184"}, "authors": [{"authorId": + "30884302", "name": "H. Fjellv\u00e5g"}, {"authorId": "1418879705", "name": + "Fredrik Grenv\u00f8ld"}, {"authorId": "14901759", "name": "S. St\u00f8len"}, + {"authorId": "88631322", "name": "A. Andresen"}, {"authorId": "1415532629", + "name": "R. M\u00fcller-K\u00e4fer"}, {"authorId": "89959815", "name": "A. + Simon"}]}, {"paperId": "60a5859bcc07515496238a1c0335e4abc5cce32e", "externalIds": + {"MAG": "1483113404", "DBLP": "conf/fossacs/HabelP01", "DOI": "10.1007/3-540-45315-6_15", + "CorpusId": 11040881}, "corpusId": 11040881, "publicationVenue": {"id": "e95f057c-b69a-4fed-b6cf-64d35d3d54d9", + "name": "Foundations of Software Science and Computation Structure", "type": + "conference", "alternate_names": ["Found Softw Sci Comput Struct", "FoSSaCS"], + "url": "http://www.wikicfp.com/cfp/program?id=1079"}, "url": "https://www.semanticscholar.org/paper/60a5859bcc07515496238a1c0335e4abc5cce32e", + "title": "Computational Completeness of Programming Languages Based on Graph + Transformation", "abstract": null, "venue": "Foundations of Software Science + and Computation Structure", "year": 2001, "referenceCount": 16, "citationCount": + 84, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007/3-540-45315-6_15.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2001-04-02", "journal": {"pages": "230-245"}, "authors": [{"authorId": "143704183", + "name": "A. Habel"}, {"authorId": "2968742", "name": "D. Plump"}]}, {"paperId": + "14b967e329194e62fd57698636feffc69ca81a18", "externalIds": {"MAG": "2073747100", + "DOI": "10.1109/JPHOT.2013.2277882", "CorpusId": 15541185}, "corpusId": 15541185, + "publicationVenue": {"id": "4c304f78-3883-487b-8d1e-8e1e14c9b645", "name": + "IEEE Photonics Journal", "type": "journal", "alternate_names": ["IEEE Photonics + J"], "issn": "1943-0647", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=4563994", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=4563994"]}, "url": "https://www.semanticscholar.org/paper/14b967e329194e62fd57698636feffc69ca81a18", "title": "Azimuthal Turing Patterns, Bright and Dark Cavity Solitons in Kerr Combs Generated With Whispering-Gallery-Mode Resonators", "abstract": "We @@ -31234,140 +35747,74 @@ interactions: agreement with experimental measurements that are obtained using calcium and magnesium fluoride disk resonators pumped near 1550 nm.", "venue": "IEEE Photonics Journal", "year": 2013, "referenceCount": 37, "citationCount": 127, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-08-08", - "journal": {"name": "IEEE Photonics Journal", "pages": "6100409-6100409", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-08-08", "journal": {"name": "IEEE Photonics Journal", "pages": "6100409-6100409", "volume": "5"}, "authors": [{"authorId": "143662508", "name": "A. Coillet"}, {"authorId": "2085567933", "name": "I. Balakireva"}, {"authorId": "47646675", "name": "R. Henriet"}, {"authorId": "6051755", "name": "K. Saleh"}, {"authorId": "1760452", "name": "L. Larger"}, {"authorId": "31295217", "name": "J. Dudley"}, {"authorId": "31658910", "name": "C. Menyuk"}, {"authorId": "5948493", "name": - "Y. Chembo"}]}, {"paperId": "59a0257620d31f1f334ce7d545c1dff88aaa72e6", "externalIds": - {"DBLP": "journals/itpro/PopeK05", "MAG": "2114267717", "DOI": "10.1109/MITP.2005.37", - "CorpusId": 16207890}, "url": "https://www.semanticscholar.org/paper/59a0257620d31f1f334ce7d545c1dff88aaa72e6", - "title": "Is it human or computer? Defending e-commerce with Captchas", "abstract": - "A Captcha - a completely automatic public Turing test to tell computers and - humans apart - is a test that humans can pass but computer programs cannot; - such tests are becoming key to defending e-commerce systems. By using a Captcha, - for example, IT systems can permit only real people-rather than a spammer''s - script-to create a free e-mail account. This article explains the various - types of Captchas and discusses their strengths and weaknesses as a security - measure. It also lists sources for more information on the formal research - into Captchas.", "venue": "IT Professional", "year": 2005, "referenceCount": - 5, "citationCount": 88, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-03-01", "journal": {"name": "IT Professional", "pages": "43-49", "volume": - "7"}, "authors": [{"authorId": "34035034", "name": "Clark Pope"}, {"authorId": - "3077412", "name": "Khushpreet Kaur"}]}, {"paperId": "d395856b635e679b321a487ec8e523956901e444", - "externalIds": {"MAG": "2040802713", "DOI": "10.1007/S11071-014-1516-9", "CorpusId": - 121488231}, "url": "https://www.semanticscholar.org/paper/d395856b635e679b321a487ec8e523956901e444", - "title": "Turing instability in a gene network with cross-diffusion", "abstract": - null, "venue": "", "year": 2014, "referenceCount": 39, "citationCount": 15, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2014-07-03", "journal": {"name": "Nonlinear Dynamics", - "pages": "1301-1310", "volume": "78"}, "authors": [{"authorId": "48809744", - "name": "Qianqian Zheng"}, {"authorId": "40275447", "name": "Jianwei Shen"}]}, - {"paperId": "e4a19ed7988dfae35148aae24885cb4e5a1cf92a", "externalIds": {"DBLP": - "conf/aaai/CambriaFBP15", "MAG": "2192604218", "DOI": "10.1609/aaai.v29i1.9230", - "CorpusId": 9310295}, "url": "https://www.semanticscholar.org/paper/e4a19ed7988dfae35148aae24885cb4e5a1cf92a", - "title": "AffectiveSpace 2: Enabling Affective Intuition for Concept-Level - Sentiment Analysis", "abstract": "\n \n Predicting the affective valence of - unknown multi-word expressions is key for concept-level sentiment analysis. - AffectiveSpace 2 is a vector space model, built by means of random projection, - that allows for reasoning by analogy on natural language con- cepts. By reducing - the dimensionality of affec- tive common-sense knowledge, the model allows - semantic features associated with concepts to be generalized and, hence, allows - concepts to be intu- itively clustered according to their semantic and affective - relatedness. Such an affective intuition (so called because it does not rely - on explicit fea- tures, but rather on implicit analogies) enables the inference - of emotions and polarity conveyed by multi-word expressions, thus achieving - efficient concept-level sentiment analysis.\n \n", "venue": "AAAI Conference - on Artificial Intelligence", "year": 2015, "referenceCount": 37, "citationCount": - 172, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2015-01-25", - "journal": {"pages": "508-514"}, "authors": [{"authorId": "49943757", "name": - "E. Cambria"}, {"authorId": "49252800", "name": "Jie Fu"}, {"authorId": "144156101", - "name": "F. Bisio"}, {"authorId": "1746416", "name": "Soujanya Poria"}]}, - {"paperId": "bfb69f8a775829847e63b3135b7e39df4f627f59", "externalIds": {"DBLP": - "conf/birthday/ShenDS12", "MAG": "104074713", "DOI": "10.29007/rlxq", "CorpusId": - 16232556}, "url": "https://www.semanticscholar.org/paper/bfb69f8a775829847e63b3135b7e39df4f627f59", - "title": "Feature Selection Ensemble", "abstract": "Many strategies have been - exploited for the task of feature selection, in an effort to identify more - compact and better quality feature subsets. Such techniques typically involve - the use of an individual feature significance evaluation, or a measurement - of feature subset consistency, that work together with a search algorithm - in order to determine a quality subset. Feature selection ensemble aims to - combine the outputs of multiple feature selectors, thereby producing a more - robust result for the subsequent classifier learning tasks. In this paper, - three novel implementations of the feature selection ensemble concept are - introduced, generalising the ensemble approach so that it can be used in conjunction - with many subset evaluation techniques, and search algorithms. A recently - developed heuristic algorithm: harmony search is employed to demonstrate the - approaches. Results of experimental comparative studies are reported in order - to highlight the benefits of the present work. The paper ends with a proposal - to extend the application of feature selection ensemble to aiding the development - of biped robots (inspired by the authors\u2019 involvement in the joint celebration - of Olympic and the centenary of the birth of Alan Turing).", "venue": "Turing-100", - "year": 2012, "referenceCount": 70, "citationCount": 57, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "Y. Chembo"}]}, {"paperId": "e8850aaeef4efffcdd9131bcfa33b65b6b421dd8", "externalIds": + {"MAG": "340223309", "CorpusId": 60371396}, "corpusId": 60371396, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e8850aaeef4efffcdd9131bcfa33b65b6b421dd8", + "title": "Reverse Engineering Social Media: Software, Culture, and Political + Economy in New Media Capitalism", "abstract": "Acknowledgments Introduction: + Looking Forward and Backward: Heterogeneous Engineering of Social Media Software + 1. The Computerized Socialbot Turing Test: Noopower and the Social Media State(s) + of Mind 2. The Archive and the Processor: The Internal Hardware Logic of Social + Media 3. Architecture and Implementation: Engineering Real (Software) Abstractions + in Social Media 4. Standardizing Social Media: Technical Standards, the Interactive + Advertising Bureau, and the Rise of Social Media Templates 5. Engineering + a Class for Itself: The Case of Wikipedia''s Spanish Fork Labor Strike 6. + A Manifesto for Socialized Media Notes Bibliography Index", "venue": "", "year": + 2014, "referenceCount": 8, "citationCount": 89, "influentialCitationCount": + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2014-06-27", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "3013520", "name": "R. Gehl"}]}, + {"paperId": "8becd8ad38feedaf858e40635e338547cd0bab7b", "externalIds": {"MAG": + "2334699702", "CorpusId": 11680320}, "corpusId": 11680320, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8becd8ad38feedaf858e40635e338547cd0bab7b", + "title": "Service-Oriented Fuzzy-Arden-Syntax-Based Clinical Decision Support", + "abstract": "a software architecture for clinical decision support systems. + The core of the architec- ture is the Health Level Seven (HL7) Arden Syntax. + Functionality and scalability of this architec- ture were proven in large + routine applications for early detection and automated monitoring of hospital-acquired + infections at the Vienna General Hospital. These systems automatically receive + data from 15 intensive care units (ICUs) and generate indications as to whether + various forms of ICU-acquired infections are clearly present in a patient, + present to a certain degree, or absent.", "venue": "", "year": 2014, "referenceCount": + 28, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-06-22", "journal": {"pages": "289-306"}, "authors": - [{"authorId": "144576537", "name": "Q. Shen"}, {"authorId": "3096993", "name": - "R. Diao"}, {"authorId": "47527511", "name": "P. Su"}]}, {"paperId": "47973a6fb5baa95d494826f8256265a566a2d384", - "externalIds": {"MAG": "2949152287", "ArXiv": "1903.03845", "DOI": "10.1103/PhysRevE.99.062303", - "CorpusId": 84832850, "PubMed": "31330727"}, "url": "https://www.semanticscholar.org/paper/47973a6fb5baa95d494826f8256265a566a2d384", - "title": "Turing patterns mediated by network topology in homogeneous active - systems.", "abstract": "Mechanisms of pattern formation-of which the Turing - instability is an archetype-constitute an important class of dynamical processes - occurring in biological, ecological, and chemical systems. Recently, it has - been shown that the Turing instability can induce pattern formation in discrete - media such as complex networks, opening up the intriguing possibility of exploring - it as a generative mechanism in a plethora of socioeconomic contexts. Yet - much remains to be understood in terms of the precise connection between network - topology and its role in inducing the patterns. Here we present a general - mathematical description of a two-species reaction-diffusion process occurring - on different flavors of network topology. The dynamical equations are of the - predator-prey class that, while traditionally used to model species population, - has also been used to model competition between antagonistic features in social - contexts. We demonstrate that the Turing instability can be induced in any - network topology by tuning the diffusion of the competing species or by altering - network connectivity. The extent to which the emergent patterns reflect topological - properties is determined by a complex interplay between the diffusion coefficients - and the localization properties of the eigenvectors of the graph Laplacian. - We find that networks with large degree fluctuations tend to have stable patterns - over the space of initial perturbations, whereas patterns in more homogenous - networks are purely stochastic.", "venue": "Physical Review E", "year": 2019, - "referenceCount": 72, "citationCount": 31, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Physics", "Mathematics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-03-09", "journal": {"name": "Physical review. E", - "pages": "\n 062303\n ", "volume": "99 6-1"}, "authors": [{"authorId": - "151214273", "name": "Sayat Mimar"}, {"authorId": "151119064", "name": "Mariamo - Mussa Juane"}, {"authorId": "2215506", "name": "Juyong Park"}, {"authorId": - "2614851", "name": "A. P. Mu\u00f1uzuri"}, {"authorId": "2408791", "name": - "G. Ghoshal"}]}, {"paperId": "c38e6c17740c4a244767f4953672f00b686fa434", "externalIds": - {"MAG": "2724963341", "DBLP": "conf/fm/Borger98", "DOI": "10.1007/3-540-48257-1_1", - "CorpusId": 686782}, "url": "https://www.semanticscholar.org/paper/c38e6c17740c4a244767f4953672f00b686fa434", - "title": "High Level System Design and Analysis Using Abstract State Machines", - "abstract": null, "venue": "FM-Trends", "year": 1998, "referenceCount": 153, - "citationCount": 167, "influentialCitationCount": 13, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1998-10-07", "journal": {"pages": "1-43"}, "authors": [{"authorId": "1692943", - "name": "E. B\u00f6rger"}]}, {"paperId": "71949e8de6f566809f42b632f025d4ac922262f8", - "externalIds": {"MAG": "2624564783", "CorpusId": 90360568}, "url": "https://www.semanticscholar.org/paper/71949e8de6f566809f42b632f025d4ac922262f8", + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2014-11-02", "journal": {"name": "Indian journal of medical informatics", + "pages": "75-79", "volume": "8"}, "authors": [{"authorId": "1689433", "name": + "K. Adlassnig"}, {"authorId": "1682242", "name": "K. Fehre"}]}, {"paperId": + "db72c9b2cdb3a4bbd4dca565f0c7b731244e521a", "externalIds": {"MAG": "1983790616", + "DOI": "10.1063/1.4765650", "CorpusId": 94547202}, "corpusId": 94547202, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/db72c9b2cdb3a4bbd4dca565f0c7b731244e521a", + "title": "Amplitude equation for a diffusion-reaction system: The reversible + Sel''kov model", "abstract": "For a model glycolytic diffusion-reaction system, + an amplitude equation has been derived in the framework of a weakly nonlinear + theory. The linear stability analysis of this amplitude equation interprets + the structural transitions and stability of various forms of Turing structures. + This amplitude equation also conforms to the expectation that time-invariant + amplitudes in Turing structures are independent of complexing reaction with + the activator species, whereas complexing reaction strongly influences Hopf-wave + bifurcation.", "venue": "", "year": 2012, "referenceCount": 24, "citationCount": + 24, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://aip.scitation.org/doi/pdf/10.1063/1.4765650", "status": "GOLD"}, + "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-10-26", "journal": {"name": + "AIP Advances", "pages": "042125", "volume": "2"}, "authors": [{"authorId": + "27412483", "name": "A. K. Dutt"}]}, {"paperId": "71949e8de6f566809f42b632f025d4ac922262f8", + "externalIds": {"MAG": "2624564783", "CorpusId": 90360568}, "corpusId": 90360568, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/71949e8de6f566809f42b632f025d4ac922262f8", "title": "Jaguar predation on capybara", "abstract": "Studied the tediniques used by jaguar to kill capybara and noted the efFects of predation on a small capybara population in Maro Grosso. Jaguar often used a specific killing bite, @@ -31379,78 +35826,145 @@ interactions: Results indicate that predation had a significant elfect by increasing the prey''s rate of decline.", "venue": "", "year": 1977, "referenceCount": 9, "citationCount": 86, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "296-301", "volume": "43"}, "authors": [{"authorId": "35321756", - "name": "G. Schaller"}, {"authorId": "88080889", "name": "J. Vasconcelos"}]}, - {"paperId": "05e0f429f315b16665bda6068cfec0c2fbb287bd", "externalIds": {"MAG": - "2036235707", "DOI": "10.1088/0031-8949/1996/T67/009", "CorpusId": 121198366}, - "url": "https://www.semanticscholar.org/paper/05e0f429f315b16665bda6068cfec0c2fbb287bd", - "title": "Standard and nonstandard Turing patterns and waves in the CIMA reaction", - "abstract": "We describe experimental evidence of stable triangular and hexagon-band - mixed mode nonstandard patterns, in a three-dimensional chemical reaction-diffusion - system with steep gradients of chemical constraints. These gradients confine - the structures in a more or less thick stratum of the system. At onset, patterns - develop in monolayers which approximate two-dimensional systems; but beyond - onset, three-dimensional aspects have to be considered. We show that the nonstandard - pattern symmetries result from the coupling of standard hexagonal and striped - pattern modes which develop at adjacent positions, due to the differences - in parameter values along the direction of the gradients. We evidence a Turing-Hopf - codimension-2 point and show that some mixed mode chaotic dynamics, reminiscent - of spatio-temporal intermittency combining the Turing and the Hopf modes, - are also a consequence of the three-dimensional aspect of the structure. The - relations between these observations and the theoretical studies performed - in genuine two-dimensional systems are still open to discussion.", "venue": - "", "year": 1996, "referenceCount": 21, "citationCount": 36, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Physica Scripta", "pages": "43-50", "volume": "1996"}, "authors": - [{"authorId": "12105027", "name": "B. Rudovics"}, {"authorId": "3250971", - "name": "E. Dulos"}, {"authorId": "50010680", "name": "P. Kepper"}]}, {"paperId": - "dc04f204369323c6ed0eaf7ac5c8229b9176f234", "externalIds": {"DBLP": "journals/tcs/Shagrir04", - "MAG": "2064371665", "DOI": "10.1016/J.TCS.2003.12.007", "CorpusId": 11434876}, - "url": "https://www.semanticscholar.org/paper/dc04f204369323c6ed0eaf7ac5c8229b9176f234", - "title": "Super-tasks, accelerating Turing machines and uncomputability", - "abstract": null, "venue": "Theor. Comput. Sci.", "year": 2004, "referenceCount": - 33, "citationCount": 25, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-06-04", "journal": {"name": "Theor. Comput. Sci.", - "pages": "105-114", "volume": "317"}, "authors": [{"authorId": "1742013", - "name": "Oron Shagrir"}]}, {"paperId": "2b739b833d95650c558fa52c8462a3796b8ec62f", - "externalIds": {"MAG": "1576855886", "DOI": "10.4324/9781410602961-16", "CorpusId": - 119035689}, "url": "https://www.semanticscholar.org/paper/2b739b833d95650c558fa52c8462a3796b8ec62f", - "title": "Using Predicted Latent Scores in General Latent Struc\u00ad ture - M odels", "abstract": null, "venue": "", "year": 2002, "referenceCount": 0, - "citationCount": 88, "influentialCitationCount": 14, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "195-224", "volume": ""}, "authors": [{"authorId": "48596148", "name": - "M. Croon"}]}, {"paperId": "d329827666362a3244e0799d9ea208321ecc9d85", "externalIds": - {"MAG": "1991903325", "DBLP": "journals/tcs/KoiranM99", "DOI": "10.1016/S0304-3975(98)00117-0", - "CorpusId": 19017456}, "url": "https://www.semanticscholar.org/paper/d329827666362a3244e0799d9ea208321ecc9d85", - "title": "Closed-for Analytic Maps in One and Two Dimensions can Simulate - Universal Turing Machines", "abstract": null, "venue": "Theoretical Computer - Science", "year": 1999, "referenceCount": 13, "citationCount": 82, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1999-01-06", "journal": {"name": "Theor. Comput. Sci.", "pages": "217-223", - "volume": "210"}, "authors": [{"authorId": "1710207", "name": "P. Koiran"}, - {"authorId": "144869677", "name": "C. Moore"}]}, {"paperId": "b3bc2ccc061c84d79f3b9fa0549facee55653d3b", - "externalIds": {"MAG": "2963317156", "ArXiv": "0907.5130", "DBLP": "journals/jucs/DragoiMM07", - "DOI": "10.4204/EPTCS.3.16", "CorpusId": 11207410}, "url": "https://www.semanticscholar.org/paper/b3bc2ccc061c84d79f3b9fa0549facee55653d3b", - "title": "Accepting Networks of Evolutionary Processors with Filtered Connections", - "abstract": "In this paper, we present some results regarding the size complexity - of Accepting Networks of Evolutionary Processors with Filtered Connections - (ANEPFCs). We show that there are universal ANEPFCs of size 10, by devising - a method for simulating 2-Tag Systems. This result significantly improves - the known upper bound for the size of universal ANEPFCs which is 18. \nWe + "openAccessPdf": null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": + [{"category": "Geography", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "296-301", "volume": "43"}, "authors": + [{"authorId": "35321756", "name": "G. Schaller"}, {"authorId": "88080889", + "name": "J. Vasconcelos"}]}, {"paperId": "c9ba0b6bbc471606bf608d84d291220331f17a23", + "externalIds": {"MAG": "2030965344", "DOI": "10.1037/0022-3514.43.1.89", "CorpusId": + 144641553}, "corpusId": 144641553, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c9ba0b6bbc471606bf608d84d291220331f17a23", + "title": "Self-Relevant Scenarios as Mediators of Likelihood Estimates and + Compliance: Does Imagining Make It So?", "abstract": "A series of studies + w as conducted to determ ine the viability of a scenario pro-cedure as a com + pliance technique. In four experim ents, subjects w ho, throughthe use of + a structured scenario, w ere led to im agine them selves experiencingcertain + events cam e to believe m ore strongl y that the events w ould befall them + .T his prom otive effect of the scenario procedure on probability or likelihood + es-tim ates occurred fo r both positive events (e.g., w in n in g a contest) + an d negativ eevents (e.g., being arrested fo r a crim e) and occurred in + both laboratory andfield contexts. F urtherm ore, and crucial to its relevance + for com pliance, thescenario procedur e w as show n to influence not bnly + probability judgm ents butalso behavior. H om eow ners w ho im agined them + selves utilizing a cable televisionservice w ere subsequently m ore likely + to subscribe to such a service w hen re-quested to do so w eeks later. Finally, + it w as determ ined that the effec t of struc-tured scenarios on com pliance + is no t du e to additional in fo rm atio n provided bythe scenario. Instead, + an interpretation based on the availability heuristic isfavored.", "venue": + "", "year": 1982, "referenceCount": 11, "citationCount": 520, "influentialCitationCount": + 11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1982-07-01", "journal": {"name": "Journal of Personality + and Social Psychology", "pages": "89-99", "volume": "43"}, "authors": [{"authorId": + "40038582", "name": "W. L. Gregory"}, {"authorId": "3126227", "name": "R. + Cialdini"}, {"authorId": "116738041", "name": "K. M. Carpenter"}]}, {"paperId": + "bfbcfeb08eeffea38d0f8239546c197d8535a934", "externalIds": {"MAG": "2399773445", + "DOI": "10.1007/978-3-319-22156-4", "CorpusId": 124746971}, "corpusId": 124746971, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bfbcfeb08eeffea38d0f8239546c197d8535a934", + "title": "Turing''s Revolution: The Impact of His Ideas about Computability", + "abstract": null, "venue": "", "year": 2016, "referenceCount": 48, "citationCount": + 15, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2016-01-22", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "48364821", "name": "G. Sommaruga"}, {"authorId": "2835658", "name": "T. Strahm"}]}, + {"paperId": "55c69622da02f02f5b5a52e42b28b8fec6260796", "externalIds": {"MAG": + "2074371667", "DOI": "10.1016/j.mbs.2011.12.005", "CorpusId": 16409817, "PubMed": + "22207074"}, "corpusId": 16409817, "publicationVenue": {"id": "7ddbf0f3-cc29-4172-b79c-19b9ed50e871", + "name": "Mathematical Biosciences", "alternate_names": ["Math Biosci"], "issn": + "0025-5564", "url": "https://www.journals.elsevier.com/mathematical-biosciences/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00255564"]}, + "url": "https://www.semanticscholar.org/paper/55c69622da02f02f5b5a52e42b28b8fec6260796", + "title": "Turing instabilities and spatio-temporal chaos in ratio-dependent + Holling-Tanner model.", "abstract": null, "venue": "Mathematical Biosciences", + "year": 2012, "referenceCount": 83, "citationCount": 88, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-03-01", "journal": {"name": "Mathematical biosciences", "pages": "\n 64-76\n ", + "volume": "236 1"}, "authors": [{"authorId": "33373208", "name": "M. Banerjee"}, + {"authorId": "2110878825", "name": "Santo Banerjee"}]}, {"paperId": "5ca7d72323d3cff82a318bd83f660ac15c6fa348", + "externalIds": {"DBLP": "conf/cie/WoodsN07", "MAG": "1483817375", "DOI": "10.1007/978-3-540-73001-9_84", + "CorpusId": 37539263}, "corpusId": 37539263, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5ca7d72323d3cff82a318bd83f660ac15c6fa348", + "title": "The Complexity of Small Universal Turing Machines", "abstract": + null, "venue": "CiE", "year": 2007, "referenceCount": 37, "citationCount": + 15, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2007-06-18", "journal": {"pages": "791-799"}, "authors": + [{"authorId": "145284748", "name": "D. Woods"}, {"authorId": "2221070", "name": + "Turlough Neary"}]}, {"paperId": "1abef277ab26a1d2cd3e348c608edfd307bb1a0e", + "externalIds": {"MAG": "2037098629", "DOI": "10.1111/J.0026-1386.2004.00188.X", + "CorpusId": 153399141}, "corpusId": 153399141, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1abef277ab26a1d2cd3e348c608edfd307bb1a0e", + "title": "Production of Ideas by Means of Ideas: A Turing Machine Metaphor", + "abstract": "In this paper production of knowledge is modelled in terms of + Turing machines or compositions of Turing machines. The input tape and the + output tape of the machines are seen as the encoding of ideas generated by + Turing machines. This allows us, among other things, to define and measure + the complexity of ideas and knowledge in the simple terms of algorithmic and + computational complexity. Moreover the very existence of the halting problem + allows for the introduction of a non-stochastic notion of uncertainty. Consequently + uncertainty may be modelled not as the outcome of a predefined probability + distribution, but in terms of the randomness associated with the halting problem. + In this way the ''frequency distribution of innovations'' is endogenously + generated by the choices of the Turing machines. It is shown that a vast variety + of alternative dynamic behaviours in knowledge evolution and hence in productivity + can be generated. One can observe clusters of emerging innovations, persistent + and increasing emergence of new discoveries as well as periods of explosive + evolutions followed by stasis periods. Copyright Blackwell Publishing Ltd + 2004.", "venue": "", "year": 2004, "referenceCount": 33, "citationCount": + 24, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-05-01", "journal": {"name": + "Wiley-Blackwell: Metroeconomica"}, "authors": [{"authorId": "74544423", "name": + "Stefano Zambelli"}]}, {"paperId": "bf39f0f49cbdbaea2c3df8318945b03f1c6e6857", + "externalIds": {"MAG": "2183479498", "CorpusId": 944568}, "corpusId": 944568, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf39f0f49cbdbaea2c3df8318945b03f1c6e6857", + "title": "Climate Change and Watershed Hydrology: Part I - Recent and Projected + Changes in British Columbia", "abstract": "Introduction The cli mate of Brit + ish Colum bia is chang ing, and with these changes come many adjust ments + in water shed hydrol ogy and ulti mately in our use of water-related resources. + For exam ple, declin ing snowpacks are a con cern because they affect many + aspects of water resources, from instream flows for fish to com mu nity water + sup plies to soil mois ture, ground wa ter, and aqui fer recharge (BCMOE 2007). + Because Brit ish Colum bia is hydrologically diverse, the local responses + to the antic i pated changes in pre cip i ta tion and tem per a ture will + dif fer. As a guide to what might hap pen in the future, this arti cle (Part + I) sum ma rizes his tor i cal tem per a ture and pre cip i ta tion trends + and future cli mate sce nar ios for Brit ish Colum bia. The accom pa ny ing + arti cle (Part II) dis cusses eight broad hydrologic implications of climate + change in British Columbia.", "venue": "", "year": 2008, "referenceCount": + 53, "citationCount": 37, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "105035987", "name": "R. Pike"}, {"authorId": "3902126", "name": + "D. Spittlehouse"}, {"authorId": "33291621", "name": "K. Bennett"}, {"authorId": + "104885648", "name": "V. N. Egginton"}, {"authorId": "88542690", "name": "P. + Tschaplinski"}, {"authorId": "51877995", "name": "T. Murdock"}, {"authorId": + "91748777", "name": "A. Werner"}]}, {"paperId": "b3bc2ccc061c84d79f3b9fa0549facee55653d3b", + "externalIds": {"MAG": "2963317156", "ArXiv": "0907.5130", "DBLP": "journals/jucs/DragoiMM07", + "DOI": "10.4204/EPTCS.3.16", "CorpusId": 11207410}, "corpusId": 11207410, + "publicationVenue": {"id": "bd1ebb7b-8189-4721-9f58-c20407ee42c5", "name": + "Journal of universal computer science (Online)", "type": "journal", "alternate_names": + ["Journal of Universal Computer Science", "J Univers Comput Sci", "J univers + comput sci (online"], "issn": "0948-6968", "url": "http://www.jucs.org/", + "alternate_urls": ["http://www.jucs.org/jucs/"]}, "url": "https://www.semanticscholar.org/paper/b3bc2ccc061c84d79f3b9fa0549facee55653d3b", + "title": "Accepting Networks of Evolutionary Processors with Filtered Connections", + "abstract": "In this paper, we present some results regarding the size complexity + of Accepting Networks of Evolutionary Processors with Filtered Connections + (ANEPFCs). We show that there are universal ANEPFCs of size 10, by devising + a method for simulating 2-Tag Systems. This result significantly improves + the known upper bound for the size of universal ANEPFCs which is 18. \nWe also propose a new, computationally and descriptionally efficient simulation of nondeterministic Turing machines by ANEPFCs. More precisely, we describe (informally, due to space limitations) how ANEPFCs with 16 nodes can simulate @@ -31459,37 +35973,108 @@ interactions: an arbitrary Turing machine is decreased from 26 to 16.", "venue": "Journal of universal computer science (Online)", "year": 2009, "referenceCount": 26, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://arxiv.org/pdf/0907.5130", "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2009-07-29", "journal": {"pages": "173-182"}, "authors": [{"authorId": "32261284", "name": "Cezara Dragoi"}, {"authorId": "1694383", "name": "F. Manea"}, {"authorId": "1715143", - "name": "V. Mitrana"}]}, {"paperId": "d77d9b8de99a2f0e389ef16bc79915b70261500f", - "externalIds": {"ArXiv": "cond-mat/0210323", "MAG": "2007588560", "DOI": "10.1103/PhysRevLett.90.038101", - "CorpusId": 41475325, "PubMed": "12570527"}, "url": "https://www.semanticscholar.org/paper/d77d9b8de99a2f0e389ef16bc79915b70261500f", - "title": "Reactive glass and vegetation patterns.", "abstract": "The formation - of vegetation patterns in the arid and the semiarid climatic zones is studied. - Threshold for the biomass of the perennial flora is shown to be a relevant - factor, leading to a frozen disordered pattern in the arid zone. In this \"glassy\" - state, vegetation appears as singular plant spots separated by irregular distances, - and an indirect repulsive interaction among shrubs is induced by the competition - for water. At higher precipitation rates, the diminishing of hydrological - losses in the presence of flora becomes important and yields spatial attraction - and clustering of biomass. Turing patterns with characteristic length scale - emerge from the disordered structure due to this positive-feedback instability.", - "venue": "Physical Review Letters", "year": 2002, "referenceCount": 15, "citationCount": - 86, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2002-10-15", "journal": {"name": "Physical review letters", - "pages": "\n 038101\n ", "volume": "90 3"}, "authors": [{"authorId": - "145606617", "name": "N. Shnerb"}, {"authorId": "3808050", "name": "P. Sarah"}, - {"authorId": "153138298", "name": "H. Lavee"}, {"authorId": "119670857", "name": - "S. Solomon"}]}, {"paperId": "f2353694c78d07dc5adae3fa45abf3e7a6a68e32", "externalIds": - {"MAG": "1608283001", "ArXiv": "1304.1679", "DBLP": "journals/corr/abs-1304-1679", - "DOI": "10.1137/1.9781611973402.56", "CorpusId": 5986104}, "url": "https://www.semanticscholar.org/paper/f2353694c78d07dc5adae3fa45abf3e7a6a68e32", + "name": "V. Mitrana"}]}, {"paperId": "d329827666362a3244e0799d9ea208321ecc9d85", + "externalIds": {"MAG": "1991903325", "DBLP": "journals/tcs/KoiranM99", "DOI": + "10.1016/S0304-3975(98)00117-0", "CorpusId": 19017456}, "corpusId": 19017456, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/d329827666362a3244e0799d9ea208321ecc9d85", + "title": "Closed-for Analytic Maps in One and Two Dimensions can Simulate + Universal Turing Machines", "abstract": null, "venue": "Theoretical Computer + Science", "year": 1999, "referenceCount": 13, "citationCount": 82, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1999-01-06", "journal": {"name": "Theor. + Comput. Sci.", "pages": "217-223", "volume": "210"}, "authors": [{"authorId": + "1710207", "name": "P. Koiran"}, {"authorId": "144869677", "name": "C. Moore"}]}, + {"paperId": "f06bb30589a0554b19f1544af0e018b50b974bf7", "externalIds": {"MAG": + "2067716156", "DBLP": "conf/afips/McKeeman67", "DOI": "10.1145/1465611.1465665", + "CorpusId": 12770999}, "corpusId": 12770999, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f06bb30589a0554b19f1544af0e018b50b974bf7", + "title": "Language directed computer design", "abstract": "It is an accident + that digital computers are organized like desk calculators--with somewhat + worse luck we might have taken the Turing machine as our model. And someone + would have been unenlightened enough to prove that, under certain (actually + untrue) assumptions, it made no difference. All general purpose machines can + compute the same functions, given sufficient time.", "venue": "AFIPS ''67 + (Fall)", "year": 1899, "referenceCount": 0, "citationCount": 48, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/1465611.1465665", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1899-12-30", "journal": {"pages": "413-417"}, "authors": + [{"authorId": "2630944", "name": "W. M. McKeeman"}]}, {"paperId": "47973a6fb5baa95d494826f8256265a566a2d384", + "externalIds": {"MAG": "2949152287", "ArXiv": "1903.03845", "DOI": "10.1103/PhysRevE.99.062303", + "CorpusId": 84832850, "PubMed": "31330727"}, "corpusId": 84832850, "publicationVenue": + {"id": "19842b7b-a4d1-4f9a-9714-87d878cf6e73", "name": "Physical Review E", + "type": "journal", "alternate_names": ["Phys rev E", "Physical review. E", + "Phys Rev E"], "issn": "1539-3755", "alternate_issns": ["1550-2376", "2470-0045"], + "url": "https://journals.aps.org/pre/", "alternate_urls": ["http://pre.aps.org/", + "http://journals.aps.org/pre/"]}, "url": "https://www.semanticscholar.org/paper/47973a6fb5baa95d494826f8256265a566a2d384", + "title": "Turing patterns mediated by network topology in homogeneous active + systems.", "abstract": "Mechanisms of pattern formation-of which the Turing + instability is an archetype-constitute an important class of dynamical processes + occurring in biological, ecological, and chemical systems. Recently, it has + been shown that the Turing instability can induce pattern formation in discrete + media such as complex networks, opening up the intriguing possibility of exploring + it as a generative mechanism in a plethora of socioeconomic contexts. Yet + much remains to be understood in terms of the precise connection between network + topology and its role in inducing the patterns. Here we present a general + mathematical description of a two-species reaction-diffusion process occurring + on different flavors of network topology. The dynamical equations are of the + predator-prey class that, while traditionally used to model species population, + has also been used to model competition between antagonistic features in social + contexts. We demonstrate that the Turing instability can be induced in any + network topology by tuning the diffusion of the competing species or by altering + network connectivity. The extent to which the emergent patterns reflect topological + properties is determined by a complex interplay between the diffusion coefficients + and the localization properties of the eigenvectors of the graph Laplacian. + We find that networks with large degree fluctuations tend to have stable patterns + over the space of initial perturbations, whereas patterns in more homogenous + networks are purely stochastic.", "venue": "Physical Review E", "year": 2019, + "referenceCount": 73, "citationCount": 31, "influentialCitationCount": 1, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1903.03845", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Physics", "Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2019-03-09", "journal": {"name": "Physical review. E", + "pages": "\n 062303\n ", "volume": "99 6-1"}, "authors": [{"authorId": + "151214273", "name": "Sayat Mimar"}, {"authorId": "151119064", "name": "Mariamo + Mussa Juane"}, {"authorId": "2215506", "name": "Juyong Park"}, {"authorId": + "2614851", "name": "A. P. Mu\u00f1uzuri"}, {"authorId": "2408791", "name": + "G. Ghoshal"}]}, {"paperId": "30c707c9a777261e140583190b580af10a82f309", "externalIds": + {"DBLP": "conf/zum/CarringtonS94", "MAG": "1495194932", "DOI": "10.1007/978-1-4471-3452-7_4", + "CorpusId": 10181364}, "corpusId": 10181364, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/30c707c9a777261e140583190b580af10a82f309", + "title": "A Tale of Two Paradigms: Formal Methods and Software Testing", "abstract": + null, "venue": "Z User Workshop", "year": 1994, "referenceCount": 21, "citationCount": + 91, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "51-68"}, "authors": [{"authorId": "32865239", + "name": "D. Carrington"}, {"authorId": "39516986", "name": "P. Stocks"}]}, + {"paperId": "f2353694c78d07dc5adae3fa45abf3e7a6a68e32", "externalIds": {"MAG": + "1608283001", "ArXiv": "1304.1679", "DBLP": "journals/corr/abs-1304-1679", + "DOI": "10.1137/1.9781611973402.56", "CorpusId": 5986104}, "corpusId": 5986104, + "publicationVenue": {"id": "5545566b-c0b8-418c-83a5-a986a4657572", "name": + "ACM-SIAM Symposium on Discrete Algorithms", "type": "conference", "alternate_names": + ["Symposium on Discrete Algorithms", "ACM-SIAM Symp Discret Algorithm", "Symp + Discret Algorithm", "SODA"], "url": "https://en.wikipedia.org/wiki/Symposium_on_Discrete_Algorithms"}, + "url": "https://www.semanticscholar.org/paper/f2353694c78d07dc5adae3fa45abf3e7a6a68e32", "title": "Intrinsic universality in tile self-assembly requires cooperation", "abstract": "We prove a negative result on the power of a model of algorithmic self-assembly for which finding general techniques and results has been notoriously @@ -31512,7 +36097,8 @@ interactions: This tile set implies that, in a restricted sense, non-cooperative self-assembly is intrinsically universal for itself.", "venue": "ACM-SIAM Symposium on Discrete Algorithms", "year": 2013, "referenceCount": 55, "citationCount": 73, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://authors.library.caltech.edu/72482/1/1%252E9781611973402%252E56.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], @@ -31521,226 +36107,36 @@ interactions: "1766539", "name": "Matthew J. Patitz"}, {"authorId": "1794328", "name": "Scott M. Summers"}, {"authorId": "2162293", "name": "G. Theyssier"}, {"authorId": "145377528", "name": "Andrew Winslow"}, {"authorId": "145284748", "name": - "D. Woods"}]}, {"paperId": "7f59b346b74b9bb27ee2848e5d49e5a5fd02fe0e", "externalIds": - {"MAG": "2083504163", "DOI": "10.1002/POLB.21122", "CorpusId": 135529865}, - "url": "https://www.semanticscholar.org/paper/7f59b346b74b9bb27ee2848e5d49e5a5fd02fe0e", - "title": "Electrospinning of ultrahigh\u2010molecular\u2010weight polyethylene - nanofibers", "abstract": "The electrospinning method has been employed to - fabricate ultrafine nanofibers of ultrahigh-molecular-weight polyethylene - for the first time with a mix- ture of solvents of different dielectric constants - and conductivities. The possibility of producing highly oriented nanofibers - from ultrahigh-molecular-weight polymers sug- gests new ways of fabricating - ultrastrong, porous, and single-component nanocompo- site fibers with improved - properties. V C 2007 Wiley Periodicals, Inc. J Polym Sci Part B: Polym Phys - 45: 766-773, 2007", "venue": "", "year": 2007, "referenceCount": 44, "citationCount": - 58, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2007-04-01", "journal": {"name": - "Journal of Polymer Science Part B", "pages": "766-773", "volume": "45"}, - "authors": [{"authorId": "14356631", "name": "D. Rein"}, {"authorId": "1429030536", - "name": "Liron Shavit-Hadar"}, {"authorId": "40894954", "name": "R. Khalfin"}, - {"authorId": "17764413", "name": "Y. Cohen"}, {"authorId": "46575351", "name": - "K. Shuster"}, {"authorId": "2862101", "name": "E. Zussman"}]}, {"paperId": - "db72c9b2cdb3a4bbd4dca565f0c7b731244e521a", "externalIds": {"MAG": "1983790616", - "DOI": "10.1063/1.4765650", "CorpusId": 94547202}, "url": "https://www.semanticscholar.org/paper/db72c9b2cdb3a4bbd4dca565f0c7b731244e521a", - "title": "Amplitude equation for a diffusion-reaction system: The reversible - Sel''kov model", "abstract": "For a model glycolytic diffusion-reaction system, - an amplitude equation has been derived in the framework of a weakly nonlinear - theory. The linear stability analysis of this amplitude equation interprets - the structural transitions and stability of various forms of Turing structures. - This amplitude equation also conforms to the expectation that time-invariant - amplitudes in Turing structures are independent of complexing reaction with - the activator species, whereas complexing reaction strongly influences Hopf-wave - bifurcation.", "venue": "", "year": 2012, "referenceCount": 24, "citationCount": - 24, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2012-10-26", "journal": {"name": "AIP Advances", - "pages": "042125", "volume": "2"}, "authors": [{"authorId": "27412483", "name": - "A. K. Dutt"}]}, {"paperId": "e8850aaeef4efffcdd9131bcfa33b65b6b421dd8", "externalIds": - {"MAG": "340223309", "CorpusId": 60371396}, "url": "https://www.semanticscholar.org/paper/e8850aaeef4efffcdd9131bcfa33b65b6b421dd8", - "title": "Reverse Engineering Social Media: Software, Culture, and Political - Economy in New Media Capitalism", "abstract": "Acknowledgments Introduction: - Looking Forward and Backward: Heterogeneous Engineering of Social Media Software - 1. The Computerized Socialbot Turing Test: Noopower and the Social Media State(s) - of Mind 2. The Archive and the Processor: The Internal Hardware Logic of Social - Media 3. Architecture and Implementation: Engineering Real (Software) Abstractions - in Social Media 4. Standardizing Social Media: Technical Standards, the Interactive - Advertising Bureau, and the Rise of Social Media Templates 5. Engineering - a Class for Itself: The Case of Wikipedia''s Spanish Fork Labor Strike 6. - A Manifesto for Socialized Media Notes Bibliography Index", "venue": "", "year": - 2014, "referenceCount": 8, "citationCount": 89, "influentialCitationCount": - 15, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2014-06-27", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "3013520", "name": "R. Gehl"}]}, {"paperId": "966e92835387a6ab1d78aa80576a1ee2c963a3d5", - "externalIds": {"MAG": "1499204852", "DBLP": "journals/scholarpedia/Searle09", - "DOI": "10.1002/0470018860.S00159", "CorpusId": 60987687}, "url": "https://www.semanticscholar.org/paper/966e92835387a6ab1d78aa80576a1ee2c963a3d5", - "title": "Chinese room argument", "abstract": "The Chinese room argument is - a refutation of \u2018strong artificial intelligence\u2019 (strong AI), the - view that an appropriately programmed digital computer capable of passing - the Turing test would thereby have mental states and a mind in the same sense - in which human beings have mental states and a mind. Strong AI is distinguished - from weak AI, which is the view that the computer is a useful tool in studying - the mind, just as it is a useful tool in other disciplines ranging from molecular - biology to weather prediction. \n \n \nKeywords: \n \nartificial intelligence; - \nbrain; \ncomputational theory of the mind; \nsemantics; \nsyntax", "venue": - "Scholarpedia", "year": 2006, "referenceCount": 31, "citationCount": 89, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Philosophy"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Philosophy", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-01-15", "journal": {"name": "Scholarpedia", "pages": "3100", "volume": - "4"}, "authors": [{"authorId": "34493294", "name": "J. Searle"}]}, {"paperId": - "6e2a47ce25cec4c90f19a929e94e6ec405b4d652", "externalIds": {"MAG": "2023266047", - "DOI": "10.1021/J100194A038", "CorpusId": 95249223}, "url": "https://www.semanticscholar.org/paper/6e2a47ce25cec4c90f19a929e94e6ec405b4d652", - "title": "Effect of Turing pattern indicators on CIMA oscillators", "abstract": - "Past experiments on Turing patterns have all been conducted using the chloriteiodidemalonic - acid (CIMA) reaction with Thiodene from Prolabo as an indicator. In this work - two other indicators have been examined and found to yield Turing patterns - similar to those obtained with Thiodene: soluble starch and poly(vinyl alcohol) - (PVA). The present work shows that Thiodene is not simply a soluble starch, - as previously assumed, but is probably made by mixing about 7% starch with - 93% molten urea", "venue": "", "year": 1992, "referenceCount": 0, "citationCount": - 21, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "The Journal of Physical - Chemistry", "pages": "6302-6307", "volume": "96"}, "authors": [{"authorId": - "5289890", "name": "Z. Noszticzius"}, {"authorId": "143803550", "name": "Q. - Ouyang"}, {"authorId": "38890112", "name": "W. Mccormick"}, {"authorId": "2421446", - "name": "H. Swinney"}]}, {"paperId": "5ca7d72323d3cff82a318bd83f660ac15c6fa348", - "externalIds": {"DBLP": "conf/cie/WoodsN07", "MAG": "1483817375", "DOI": "10.1007/978-3-540-73001-9_84", - "CorpusId": 37539263}, "url": "https://www.semanticscholar.org/paper/5ca7d72323d3cff82a318bd83f660ac15c6fa348", - "title": "The Complexity of Small Universal Turing Machines", "abstract": - null, "venue": "CiE", "year": 2007, "referenceCount": 37, "citationCount": - 15, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2007-06-18", - "journal": {"pages": "791-799"}, "authors": [{"authorId": "145284748", "name": - "D. Woods"}, {"authorId": "2221070", "name": "T. Neary"}]}, {"paperId": "bf39f0f49cbdbaea2c3df8318945b03f1c6e6857", - "externalIds": {"MAG": "2183479498", "CorpusId": 944568}, "url": "https://www.semanticscholar.org/paper/bf39f0f49cbdbaea2c3df8318945b03f1c6e6857", - "title": "Climate Change and Watershed Hydrology: Part I - Recent and Projected - Changes in British Columbia", "abstract": "Introduction The cli mate of Brit - ish Colum bia is chang ing, and with these changes come many adjust ments - in water shed hydrol ogy and ulti mately in our use of water-related resources. - For exam ple, declin ing snowpacks are a con cern because they affect many - aspects of water resources, from instream flows for fish to com mu nity water - sup plies to soil mois ture, ground wa ter, and aqui fer recharge (BCMOE 2007). - Because Brit ish Colum bia is hydrologically diverse, the local responses - to the antic i pated changes in pre cip i ta tion and tem per a ture will - dif fer. As a guide to what might hap pen in the future, this arti cle (Part - I) sum ma rizes his tor i cal tem per a ture and pre cip i ta tion trends - and future cli mate sce nar ios for Brit ish Colum bia. The accom pa ny ing - arti cle (Part II) dis cusses eight broad hydrologic implications of climate - change in British Columbia.", "venue": "", "year": 2008, "referenceCount": - 53, "citationCount": 37, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "105035987", - "name": "R. Pike"}, {"authorId": "3902126", "name": "D. Spittlehouse"}, {"authorId": - "33291621", "name": "K. Bennett"}, {"authorId": "104885648", "name": "V. N. - Egginton"}, {"authorId": "88542690", "name": "P. Tschaplinski"}, {"authorId": - "51877995", "name": "T. Murdock"}, {"authorId": "91748777", "name": "A. Werner"}]}, - {"paperId": "9490126e36cc70ab4a757b51b42103c50b52f7b6", "externalIds": {"MAG": - "2336292939", "CorpusId": 39336605, "PubMed": "6881679"}, "url": "https://www.semanticscholar.org/paper/9490126e36cc70ab4a757b51b42103c50b52f7b6", - "title": "The first two R''s. The way different languages reduce speech to - script affects how visual information is processed in the brain.", "abstract": - "tures of the language spoken around him, whether it be English, Chinese, - or Telugu, Learning the written language, however, is frequently quite an - arduous process. Millions of people in the world are illiterate for lack of - adequate educational oppor tunity, A significant number of American children - have problems with reading and writing, even with the help of the best facilities. - This contrast between the two forms of language?speech versus script?is all - the more striking given that written language is invariably based on spoken - language.", "venue": "American Scientist", "year": 1983, "referenceCount": - 5, "citationCount": 89, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine", "Physics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Education", "source": "s2-fos-model"}, {"category": "Linguistics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1983-05-01", "journal": {"name": "American scientist", "pages": "\n 238-43\n ", - "volume": "71 3"}, "authors": [{"authorId": "145572093", "name": "O. Tzeng"}, - {"authorId": "113019827", "name": "W. S. Wang"}]}, {"paperId": "61f2d3db4bc7e4be774263427104e04a7d3496e3", - "externalIds": {"DBLP": "journals/jsyml/MarconeM11", "ArXiv": "0910.5442", - "MAG": "3106208063", "DOI": "10.2178/jsl/1305810765", "CorpusId": 675632}, - "url": "https://www.semanticscholar.org/paper/61f2d3db4bc7e4be774263427104e04a7d3496e3", - "title": "The Veblen functions for computability theorists", "abstract": "Abstract - We study the computability-theoretic complexity and proof-theoretic strength - of the following statements: (1) \u201cIf is a well-ordering, then so is \u201d, - and (2) \u201cIf is a well-ordering, then so is \u03c6(\u03b1, )\u201d, where - \u221d is a fixed computable ordinal and \u03c6 represents the two-placed - Veblen function. For the former statement, we show that \u03c9 iterations - of the Turing jump are necessary in the proof and that the statement is equivalent - to over RCA0. To prove the latter statement we need to use \u03c9\u03b1 iterations - of the Turing jump, and we show that the statement is equivalent to . Our - proofs are purely computability-theoretic. We also give a new proof of a result - of Friedman: the statement \u201cif is a well-ordering, then so is \u03c6(, - 0)\u201d is equivalent to ATR0 over RCA0.", "venue": "Journal of Symbolic - Logic (JSL)", "year": 2009, "referenceCount": 33, "citationCount": 40, "influentialCitationCount": - 10, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-10-28", "journal": {"name": "The - Journal of Symbolic Logic", "pages": "575 - 602", "volume": "76"}, "authors": - [{"authorId": "2493438", "name": "Alberto Marcone"}, {"authorId": "145700778", - "name": "A. Montalb\u00e1n"}]}, {"paperId": "4409c4be3ec61ff86c14778e0657009868e1d513", - "externalIds": {"MAG": "2083650205", "DBLP": "journals/cj/GammermanV99", "DOI": - "10.1093/comjnl/42.4.252", "CorpusId": 15501963}, "url": "https://www.semanticscholar.org/paper/4409c4be3ec61ff86c14778e0657009868e1d513", - "title": "Kolmogorov Complexity: Sources, Theory and Applications", "abstract": - "1. UNIVERSALITYThe theory of Kolmogorov complexity is based on thediscovery, - by Alan Turing in 1936, of the universal Turingmachine. After proposing the - Turing machine as anexplanation of the notion of a computing machine, Turingfound - that there exists one Turing machine which cansimulate any other Turing machine.Complexity, - according to Kolmogorov, can be measuredby the length of the shortest program - for a universal Turingmachine that correctly reproduces the observed data. - It hasbeen shown that, although there are many universal Turingmachines(andthereforemanypossible - \u2018shortest\u2019 programs),the corresponding complexities differ by at - most an additiveconstant.The main thrust of the theory of Kolmogorov complexityis - its \u2018universality\u2019; it strives to construct universal learningmethods - based on universal coding methods. Thisapproach was originated by Solomonoff - and made moreappealing to mathematicians by Kolmogorov. Typicallythese universal - methods will be computable only in someweak sense. In applications, therefore, - we can only hopeto approximate Kolmogorov complexity and related notions(such - as randomnessde\ufb01ciency and algorithmic informationmentioned below). This - special issue contains both materialon non-computable aspects of Kolmogorov - complexity andmaterial on many fascinating applications based on differentways - of approximating Kolmogorov complexity.2. BEGINNINGSAs we have already mentioned, - the two main originators ofthe theory of Kolmogorovcomplexity were Ray Solomonoff(born - 1926) and Andrei Nikolaevich Kolmogorov (1903\u20131987). The motivations - behind their work were completelydifferent; Solomonoff was interested in inductive - inferenceand arti\ufb01cial intelligence and Kolmogorov was interestedin the - foundations of probability theory and, also, ofinformation theory. They arrived, - nevertheless, at the samemathematical notion, which is now known as Kolmogorovcomplexity.In - 1964 Solomonoff published his model of inductiveinference. He argued that - any inference problem can bepresentedas a problemof extrapolatinga verylongsequenceof - binary symbols; \u2018given a very long sequence, representedby T, what is - the probability that it will be followed by a", "venue": "Comput. J.", "year": - 1999, "referenceCount": 27, "citationCount": 34, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "D. Woods"}]}, {"paperId": "dd0305302b9838860a360cf9078922bbe62da515", "externalIds": + {"DBLP": "journals/cryptologia/Zabell12", "MAG": "1984481131", "DOI": "10.1080/01611194.2012.697811", + "CorpusId": 29198724}, "corpusId": 29198724, "publicationVenue": {"id": "ec317d71-24e9-4750-b911-76378b2fa378", + "name": "Cryptologia", "type": "journal", "issn": "0161-1194", "url": "http://www.informaworld.com/1558-1586", + "alternate_urls": ["http://www.tandfonline.com/loi/ucry20", "http://www.tandfonline.com/toc/ucry20/current#.UkSZ03nD_Qw"]}, + "url": "https://www.semanticscholar.org/paper/dd0305302b9838860a360cf9078922bbe62da515", + "title": "Commentary on Alan M. Turing: The Applications of Probability to + Cryptography", "abstract": "Abstract In April 2012, two papers written by + Alan Turing during the Second World War on the use of probability in cryptanalysis + were released by GCHQ. The longer of these presented an overall framework + for the use of Bayes''s theorem and prior probabilities, including four examples + worked out in detail: the Vigen\u00e8re cipher, a letter subtractor cipher, + the use of repeats to find depths, and simple columnar transposition. (The + other paper was an alternative version of the section on repeats.) Turing + stressed the importance in practical cryptanalysis of sometimes using only + part of the evidence or making simplifying assumptions and presents in each + case computational shortcuts to make burdensome calculations manageable. The + four examples increase roughly in their difficulty and cryptanalytic demands. + After the war, Turing''s approach to statistical inference was championed + by his assistant in Hut 8, Jack Good, which played a role in the later resurgence + of Bayesian statistics.", "venue": "Cryptologia", "year": 2012, "referenceCount": + 21, "citationCount": 22, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Comput. J.", "pages": "252-255", - "volume": "42"}, "authors": [{"authorId": "1793317", "name": "A. Gammerman"}, - {"authorId": "145675281", "name": "V. Vovk"}]}, {"paperId": "193ab8748a6358617deb082cae9876aba32a9a77", - "externalIds": {"MAG": "2154028284", "DOI": "10.1007/978-0-585-29599-2_11", - "CorpusId": 2946051}, "url": "https://www.semanticscholar.org/paper/193ab8748a6358617deb082cae9876aba32a9a77", - "title": "Symbolic Artificial Intelligence and Numeric Artificial Neural Networks: - Towards A Resolution of the Dichotomy", "abstract": null, "venue": "", "year": - 1995, "referenceCount": 143, "citationCount": 39, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "351-388", "volume": ""}, "authors": - [{"authorId": "145513516", "name": "Vasant G Honavar"}]}, {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", - "externalIds": {"MAG": "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", - "CorpusId": 67906449}, "url": "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", + "publicationDate": "2012-07-01", "journal": {"name": "Cryptologia", "pages": + "191 - 214", "volume": "36"}, "authors": [{"authorId": "2347279", "name": + "S. Zabell"}]}, {"paperId": "b4f8f82d77a8e600faa3eae9071970563748b847", "externalIds": + {"MAG": "2908882439", "DOI": "10.7551/mitpress/10909.001.0001", "CorpusId": + 67906449}, "corpusId": 67906449, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b4f8f82d77a8e600faa3eae9071970563748b847", "title": "Common Sense, the Turing Test, and the Quest for Real AI", "abstract": "What can artificial intelligence teach us about the mind? If AI''s underlying concept is that thinking is a computational process, then how can computation @@ -31763,65 +36159,47 @@ interactions: symbolically. As AI migrates more and more into everyday life, we should worry if systems without common sense are making decisions where common sense is needed.", "venue": "", "year": 2017, "referenceCount": 110, "citationCount": - 68, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2017-02-17", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "143634377", "name": "H. Levesque"}]}, - {"paperId": "98e68cfcfedd02ce01333f1acd853406964846bc", "externalIds": {"MAG": - "1488362833", "DBLP": "conf/icalp/YokoyamaAG08", "DOI": "10.1007/978-3-540-70583-3_22", - "CorpusId": 34200881}, "url": "https://www.semanticscholar.org/paper/98e68cfcfedd02ce01333f1acd853406964846bc", - "title": "Reversible Flowchart Languages and the Structured Reversible Program - Theorem", "abstract": null, "venue": "International Colloquium on Automata, - Languages and Programming", "year": 2008, "referenceCount": 22, "citationCount": - 40, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2008-07-07", - "journal": {"pages": "258-270"}, "authors": [{"authorId": "8151130", "name": - "T. Yokoyama"}, {"authorId": "1751103", "name": "Holger Bock Axelsen"}, {"authorId": - "1700006", "name": "R. Gl\u00fcck"}]}, {"paperId": "2be0b476f928bf37f9a92c3203be0d964ae9381d", - "externalIds": {"PubMedCentral": "6431232", "ArXiv": "1811.12242", "MAG": - "2902269078", "DOI": "10.1073/pnas.1813255116", "CorpusId": 54028631, "PubMed": - "30819884"}, "url": "https://www.semanticscholar.org/paper/2be0b476f928bf37f9a92c3203be0d964ae9381d", - "title": "Theory of mechanochemical patterning in biphasic biological tissues", - "abstract": "Significance Pattern formation is a central question in developmental - biology. Alan Turing proposed that this could be achieved by a diffusion-driven - instability in a monophasic system consisting of two reacting chemicals. In - this paper, we extend Turing\u2019s work to a more realistic mechanochemical - model of multicellular tissue, modeling also its biphasic and mechanical properties. - Overcoming limitations of conventional reaction\u2013diffusion models, we - show that mechanochemical couplings between morphogen concentrations and extracellular - fluid flows provide alternative, non-Turing, mechanisms by which tissues can - form robust spatial patterns. The formation of self-organized patterns is - key to the morphogenesis of multicellular organisms, although a comprehensive - theory of biological pattern formation is still lacking. Here, we propose - a minimal model combining tissue mechanics with morphogen turnover and transport - to explore routes to patterning. Our active description couples morphogen - reaction and diffusion, which impact cell differentiation and tissue mechanics, - to a two-phase poroelastic rheology, where one tissue phase consists of a - poroelastic cell network and the other one of a permeating extracellular fluid, - which provides a feedback by actively transporting morphogens. While this - model encompasses previous theories approximating tissues to inert monophasic - media, such as Turing\u2019s reaction\u2013diffusion model, it overcomes some - of their key limitations permitting pattern formation via any two-species - biochemical kinetics due to mechanically induced cross-diffusion flows. Moreover, - we describe a qualitatively different advection-driven Keller\u2013Segel instability - which allows for the formation of patterns with a single morphogen and whose - fundamental mode pattern robustly scales with tissue size. We discuss the - potential relevance of these findings for tissue morphogenesis.", "venue": - "Proceedings of the National Academy of Sciences", "year": 2018, "referenceCount": - 110, "citationCount": 33, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Biology", "Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Chemistry", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2018-11-29", "journal": - {"name": "Proceedings of the National Academy of Sciences of the United States - of America", "pages": "5344 - 5349", "volume": "116"}, "authors": [{"authorId": - "6036160", "name": "P. Recho"}, {"authorId": "46619830", "name": "Adrien Hallou"}, - {"authorId": "5851564", "name": "\u00c9. Hannezo"}]}, {"paperId": "a49febb6fba2fbd95994f76dc4a874a59d5fcaa5", - "externalIds": {"MAG": "2022469586", "CorpusId": 124741}, "url": "https://www.semanticscholar.org/paper/a49febb6fba2fbd95994f76dc4a874a59d5fcaa5", + 69, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2017-02-17", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "143634377", + "name": "H. Levesque"}]}, {"paperId": "193ab8748a6358617deb082cae9876aba32a9a77", + "externalIds": {"MAG": "2154028284", "DOI": "10.1007/978-0-585-29599-2_11", + "CorpusId": 2946051}, "corpusId": 2946051, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/193ab8748a6358617deb082cae9876aba32a9a77", + "title": "Symbolic Artificial Intelligence and Numeric Artificial Neural Networks: + Towards A Resolution of the Dichotomy", "abstract": null, "venue": "", "year": + 1995, "referenceCount": 143, "citationCount": 39, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "351-388", "volume": ""}, "authors": [{"authorId": "145513516", "name": + "Vasant G Honavar"}]}, {"paperId": "9e85073cc97dc6ab555ad6844a3b44651408b9f3", + "externalIds": {"MAG": "1588957253", "DBLP": "books/daglib/0017329", "DOI": + "10.5860/choice.44-6273", "CorpusId": 37206497}, "corpusId": 37206497, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9e85073cc97dc6ab555ad6844a3b44651408b9f3", + "title": "Thinking on the web - Berners-Lee, G\u00f6del, and Turing", "abstract": + "What is Thinking? What is Turings Test? What is Gdels Undecidability Theorem? + How is Berners-Lees Semantic Web logic going to overcome paradoxes and complexity + to produce machine processing on the Web? Thinking on the Web draws from the + contributions of Tim Berners-Lee (What is solvable on the Web?), Kurt Gdel + (What is decidable?), and Alan Turing (What is machine intelligence?) to evaluate + how much intelligence can be projected onto the Web. The authors offer both + abstract and practical perspectives to delineate both the opportunities and + challenges of a smarter Web through a threaded series of vignettes and a thorough + review of Semantic Web development.", "venue": "", "year": 2006, "referenceCount": + 5, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2006-09-01", "journal": + {"pages": "I-XXVII, 1-261"}, "authors": [{"authorId": "2545446", "name": "P. + Alesso"}, {"authorId": "2110203191", "name": "Craig F. Smith"}]}, {"paperId": + "a49febb6fba2fbd95994f76dc4a874a59d5fcaa5", "externalIds": {"MAG": "2022469586", + "CorpusId": 124741}, "corpusId": 124741, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a49febb6fba2fbd95994f76dc4a874a59d5fcaa5", "title": "A hierarchical classifier system implementing a motivationally autonomous animat", "abstract": "This work describes a control architecture based on a hierarchical classi er system This architec ture which uses both reactive @@ -31829,51 +36207,15 @@ interactions: the actions it will perform accord ing to the expected consequences of the alterna tives The adaptive faculties of this animat are illustrated through various examples", "venue": "", "year": 1994, "referenceCount": 41, "citationCount": - 46, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1994-07-01", "journal": {"name": - "", "pages": "144-153", "volume": ""}, "authors": [{"authorId": "2571025", - "name": "Jean-Yves Donnart"}, {"authorId": "2670689", "name": "Jean-Arcady - Meyer"}]}, {"paperId": "60a5859bcc07515496238a1c0335e4abc5cce32e", "externalIds": - {"MAG": "1483113404", "DBLP": "conf/fossacs/HabelP01", "DOI": "10.1007/3-540-45315-6_15", - "CorpusId": 11040881}, "url": "https://www.semanticscholar.org/paper/60a5859bcc07515496238a1c0335e4abc5cce32e", - "title": "Computational Completeness of Programming Languages Based on Graph - Transformation", "abstract": null, "venue": "Foundations of Software Science - and Computation Structure", "year": 2001, "referenceCount": 16, "citationCount": - 83, "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2001-04-02", "journal": - {"pages": "230-245"}, "authors": [{"authorId": "143704183", "name": "A. Habel"}, - {"authorId": "2968742", "name": "D. Plump"}]}, {"paperId": "1abef277ab26a1d2cd3e348c608edfd307bb1a0e", - "externalIds": {"MAG": "2037098629", "DOI": "10.1111/J.0026-1386.2004.00188.X", - "CorpusId": 153399141}, "url": "https://www.semanticscholar.org/paper/1abef277ab26a1d2cd3e348c608edfd307bb1a0e", - "title": "Production of Ideas by Means of Ideas: A Turing Machine Metaphor", - "abstract": "In this paper production of knowledge is modelled in terms of - Turing machines or compositions of Turing machines. The input tape and the - output tape of the machines are seen as the encoding of ideas generated by - Turing machines. This allows us, among other things, to define and measure - the complexity of ideas and knowledge in the simple terms of algorithmic and - computational complexity. Moreover the very existence of the halting problem - allows for the introduction of a non-stochastic notion of uncertainty. Consequently - uncertainty may be modelled not as the outcome of a predefined probability - distribution, but in terms of the randomness associated with the halting problem. - In this way the ''frequency distribution of innovations'' is endogenously - generated by the choices of the Turing machines. It is shown that a vast variety - of alternative dynamic behaviours in knowledge evolution and hence in productivity - can be generated. One can observe clusters of emerging innovations, persistent - and increasing emergence of new discoveries as well as periods of explosive - evolutions followed by stasis periods. Copyright Blackwell Publishing Ltd - 2004.", "venue": "", "year": 2004, "referenceCount": 33, "citationCount": - 24, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2004-05-01", "journal": {"name": "Wiley-Blackwell: - Metroeconomica"}, "authors": [{"authorId": "74544423", "name": "Stefano Zambelli"}]}, - {"paperId": "ca213838a845e228447e537f1ad336b9a4e1e099", "externalIds": {"MAG": - "1997903387", "DOI": "10.3354/CR027151", "CorpusId": 15437450}, "url": "https://www.semanticscholar.org/paper/ca213838a845e228447e537f1ad336b9a4e1e099", + 46, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-07-01", + "journal": {"name": "", "pages": "144-153", "volume": ""}, "authors": [{"authorId": + "2571025", "name": "Jean-Yves Donnart"}, {"authorId": "2670689", "name": "Jean-Arcady + Meyer"}]}, {"paperId": "ca213838a845e228447e537f1ad336b9a4e1e099", "externalIds": + {"MAG": "1997903387", "DOI": "10.3354/CR027151", "CorpusId": 15437450}, "corpusId": + 15437450, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca213838a845e228447e537f1ad336b9a4e1e099", "title": "VEMAP Phase 2 Bioclimatic Database. I. Gridded Historical (20th century) Climate for Modeling Ecosystem Dynamics Across the Conterminous USA", "abstract": "Analysis and simulation of biospheric responses to historical @@ -31904,139 +36246,139 @@ interactions: pressure, and PDSI for US Nationd Assessment regions. The historical climate and companion datasets are available online at data archive centers.", "venue": "", "year": 2004, "referenceCount": 75, "citationCount": 51, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": - [{"category": "Geography", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-10-07", "journal": {"name": "Climate Research", "pages": "151-170", - "volume": "27"}, "authors": [{"authorId": "1381880254", "name": "Tfg Kittel"}, - {"authorId": "4101106", "name": "N. Rosenbloom"}, {"authorId": "7430051", - "name": "J. Andrew Royle"}, {"authorId": "49573037", "name": "C. Daly"}, {"authorId": - "2053930466", "name": "W. Gibson"}, {"authorId": "145944617", "name": "H. - Fisher"}, {"authorId": "2277213", "name": "P. Thornton"}, {"authorId": "2058011578", - "name": "D. Yates"}, {"authorId": "3219297", "name": "S. Aulenbach"}, {"authorId": - "2059461888", "name": "C. Kaufmann"}, {"authorId": "152335843", "name": "R. - Mckeown"}, {"authorId": "2792886", "name": "D. Bachelet"}, {"authorId": "1381880166", - "name": "Ds Shimel"}, {"authorId": "90412325", "name": "Vemap Participants"}]}, - {"paperId": "c9ba0b6bbc471606bf608d84d291220331f17a23", "externalIds": {"MAG": - "2030965344", "DOI": "10.1037/0022-3514.43.1.89", "CorpusId": 144641553}, - "url": "https://www.semanticscholar.org/paper/c9ba0b6bbc471606bf608d84d291220331f17a23", - "title": "Self-Relevant Scenarios as Mediators of Likelihood Estimates and - Compliance: Does Imagining Make It So?", "abstract": "A series of studies - w as conducted to determ ine the viability of a scenario pro-cedure as a com - pliance technique. In four experim ents, subjects w ho, throughthe use of - a structured scenario, w ere led to im agine them selves experiencingcertain - events cam e to believe m ore strongl y that the events w ould befall them - .T his prom otive effect of the scenario procedure on probability or likelihood - es-tim ates occurred fo r both positive events (e.g., w in n in g a contest) - an d negativ eevents (e.g., being arrested fo r a crim e) and occurred in - both laboratory andfield contexts. F urtherm ore, and crucial to its relevance - for com pliance, thescenario procedur e w as show n to influence not bnly - probability judgm ents butalso behavior. H om eow ners w ho im agined them - selves utilizing a cable televisionservice w ere subsequently m ore likely - to subscribe to such a service w hen re-quested to do so w eeks later. Finally, - it w as determ ined that the effec t of struc-tured scenarios on com pliance - is no t du e to additional in fo rm atio n provided bythe scenario. Instead, - an interpretation based on the availability heuristic isfavored.", "venue": - "", "year": 1982, "referenceCount": 11, "citationCount": 519, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1982-07-01", "journal": {"name": "Journal of Personality and Social Psychology", - "pages": "89-99", "volume": "43"}, "authors": [{"authorId": "40038582", "name": - "W. L. Gregory"}, {"authorId": "3126227", "name": "R. Cialdini"}, {"authorId": - "116738041", "name": "K. M. Carpenter"}]}, {"paperId": "6089b4474ed94a06aba42974fade7009bc77ee4e", - "externalIds": {"MAG": "2159039200", "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", - "CorpusId": 18322775}, "url": "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", - "title": "On Turing dynamical systems and the Atiyah problem", "abstract": - null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, - "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", - "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz - Grabowski"}]}, {"paperId": "b5617b104860dc5b679a999faa4da8fd9f45976d", "externalIds": - {"MAG": "2044599148", "DBLP": "journals/jsyml/JockuschS94", "DOI": "10.2307/2275695", - "CorpusId": 15291501}, "url": "https://www.semanticscholar.org/paper/b5617b104860dc5b679a999faa4da8fd9f45976d", - "title": "Boolean algebras, Stone spaces, and the iterated Turing jump", "abstract": - "Abstract We show, roughly speaking, that it requires \u03c9 iterations of - the Turing jump to decode nontrivial information from Boolean algebras in - an isomorphism invariant fashion. More precisely, if \u03b1 is a recursive - ordinal, is a countable structure with finite signature, and d is a degree, - we say that has \u03b1th-jump degreed if d is the least degree which is the - \u03b1th jump of some degree c such there is an isomorphic copy of with universe - \u03c9 in which the functions and relations have degree at most c. We show - that every degree d \u2265 0(\u03c9) is the \u03c9th jump degree of a Boolean - algebra, but that for n < \u03c9 no Boolean algebra has nth-jump degree d - < 0(n). The former result follows easily from work of L. Feiner. The proof - of the latter result uses the forcing methods of J. Knight together with an - analysis of various equivalences between Boolean algebras based on a study - of their Stone spaces. A byproduct of the proof is a method for constructing - Stone spaces with various prescribed properties.", "venue": "Journal of Symbolic - Logic", "year": 1994, "referenceCount": 30, "citationCount": 32, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/cr2004/27/c027p151.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": + "Geography", "source": "external"}, {"category": "Environmental Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-10-07", + "journal": {"name": "Climate Research", "pages": "151-170", "volume": "27"}, + "authors": [{"authorId": "1381880254", "name": "Tfg Kittel"}, {"authorId": + "4101106", "name": "N. Rosenbloom"}, {"authorId": "7430051", "name": "J. Andrew + Royle"}, {"authorId": "49573037", "name": "C. Daly"}, {"authorId": "2053930466", + "name": "W. Gibson"}, {"authorId": "145944617", "name": "H. Fisher"}, {"authorId": + "2277213", "name": "P. Thornton"}, {"authorId": "2058011578", "name": "D. + Yates"}, {"authorId": "3219297", "name": "S. Aulenbach"}, {"authorId": "2059461888", + "name": "C. Kaufmann"}, {"authorId": "152335843", "name": "R. Mckeown"}, {"authorId": + "2792886", "name": "D. Bachelet"}, {"authorId": "1381880166", "name": "Ds + Shimel"}, {"authorId": "90412325", "name": "Vemap Participants"}]}, {"paperId": + "79fd25670f4e5605d54409658fb17a20f322564d", "externalIds": {"MAG": "2591453514", + "DOI": "10.1007/978-1-137-06095-2_13", "CorpusId": 62972597}, "corpusId": + 62972597, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79fd25670f4e5605d54409658fb17a20f322564d", + "title": "Deconstruction and Technology", "abstract": null, "venue": "", "year": + 2000, "referenceCount": 15, "citationCount": 15, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "238-257", "volume": ""}, "authors": [{"authorId": "144992982", "name": + "Timothy Clark"}]}, {"paperId": "1cd704d0010b421e88601358dc12f4a3c2b048cd", + "externalIds": {"MAG": "1489217282", "DOI": "10.15376/BIORES.3.4.1403-1418", + "CorpusId": 33209211}, "corpusId": 33209211, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1cd704d0010b421e88601358dc12f4a3c2b048cd", + "title": "CELLULOSE AS A NANOSTRUCTURED POLYMER: A SHORT REVIEW", "abstract": + "Cellulose has a complex, multi-level supermolecular architecture. This natural + polymer is built from superfine fibrils having diameters in the nano scale, + and each such nanofibril contains ordered nanocrystallites and low-ordered + nano-domains. In this review, the nano-structure of cellulose and its influence + on various properties of the polymer is discussed. In particular, the ability + of nano-scale crystallites to undergo lateral co-crystallization and aggregation, + as well as to undergo phase transformation through dissolution, alkalization, + and chemical modifica-tion of cellulose has been the subject of investigation. + The recent investigations pave the way for development of highly reactive + cellulosic materials. Methods for preparation nanofibrillated cellulose and + free nano-particles are described. Some application areas of the nanostruc-tured + and nano-cellulose are discussed.", "venue": "", "year": 2008, "referenceCount": + 61, "citationCount": 163, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2008-10-30", "journal": + {"name": "Bioresources", "pages": "1403-1418", "volume": "3"}, "authors": + [{"authorId": "92045099", "name": "M. Ioelovich"}]}, {"paperId": "4409c4be3ec61ff86c14778e0657009868e1d513", + "externalIds": {"MAG": "2083650205", "DBLP": "journals/cj/GammermanV99", "DOI": + "10.1093/comjnl/42.4.252", "CorpusId": 15501963}, "corpusId": 15501963, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4409c4be3ec61ff86c14778e0657009868e1d513", + "title": "Kolmogorov Complexity: Sources, Theory and Applications", "abstract": + "1. UNIVERSALITYThe theory of Kolmogorov complexity is based on thediscovery, + by Alan Turing in 1936, of the universal Turingmachine. After proposing the + Turing machine as anexplanation of the notion of a computing machine, Turingfound + that there exists one Turing machine which cansimulate any other Turing machine.Complexity, + according to Kolmogorov, can be measuredby the length of the shortest program + for a universal Turingmachine that correctly reproduces the observed data. + It hasbeen shown that, although there are many universal Turingmachines(andthereforemanypossible + \u2018shortest\u2019 programs),the corresponding complexities differ by at + most an additiveconstant.The main thrust of the theory of Kolmogorov complexityis + its \u2018universality\u2019; it strives to construct universal learningmethods + based on universal coding methods. Thisapproach was originated by Solomonoff + and made moreappealing to mathematicians by Kolmogorov. Typicallythese universal + methods will be computable only in someweak sense. In applications, therefore, + we can only hopeto approximate Kolmogorov complexity and related notions(such + as randomnessde\ufb01ciency and algorithmic informationmentioned below). This + special issue contains both materialon non-computable aspects of Kolmogorov + complexity andmaterial on many fascinating applications based on differentways + of approximating Kolmogorov complexity.2. BEGINNINGSAs we have already mentioned, + the two main originators ofthe theory of Kolmogorovcomplexity were Ray Solomonoff(born + 1926) and Andrei Nikolaevich Kolmogorov (1903\u20131987). The motivations + behind their work were completelydifferent; Solomonoff was interested in inductive + inferenceand arti\ufb01cial intelligence and Kolmogorov was interestedin the + foundations of probability theory and, also, ofinformation theory. They arrived, + nevertheless, at the samemathematical notion, which is now known as Kolmogorovcomplexity.In + 1964 Solomonoff published his model of inductiveinference. He argued that + any inference problem can bepresentedas a problemof extrapolatinga verylongsequenceof + binary symbols; \u2018given a very long sequence, representedby T, what is + the probability that it will be followed by a", "venue": "Comput. J.", "year": + 1999, "referenceCount": 27, "citationCount": 34, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Comput. J.", "pages": "252-255", "volume": "42"}, "authors": [{"authorId": + "1793317", "name": "A. Gammerman"}, {"authorId": "145675281", "name": "V. + Vovk"}]}, {"paperId": "dc04f204369323c6ed0eaf7ac5c8229b9176f234", "externalIds": + {"DBLP": "journals/tcs/Shagrir04", "MAG": "2064371665", "DOI": "10.1016/J.TCS.2003.12.007", + "CorpusId": 11434876}, "corpusId": 11434876, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/dc04f204369323c6ed0eaf7ac5c8229b9176f234", + "title": "Super-tasks, accelerating Turing machines and uncomputability", + "abstract": null, "venue": "Theor. Comput. Sci.", "year": 2004, "referenceCount": + 33, "citationCount": 25, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2004-06-04", "journal": + {"name": "Theor. Comput. Sci.", "pages": "105-114", "volume": "317"}, "authors": + [{"authorId": "1742013", "name": "Oron Shagrir"}]}, {"paperId": "66ebd29210b52476cc7ff5fd2e972418d8589695", + "externalIds": {"DBLP": "journals/jml/ColeS07", "MAG": "2120265248", "DOI": + "10.1142/S0219061307000652", "CorpusId": 9798629}, "corpusId": 9798629, "publicationVenue": + {"id": "5b1e45b9-066d-4381-82df-bb3eb9d4f741", "name": "Journal of Mathematical + Logic", "type": "journal", "alternate_names": ["J Math Log"], "issn": "0219-0613", + "url": "http://www.worldscinet.com/jml/jml.shtml"}, "url": "https://www.semanticscholar.org/paper/66ebd29210b52476cc7ff5fd2e972418d8589695", + "title": "Mass Problems and Hyperarithmeticity", "abstract": "A mass problem + is a set of Turing oracles. If P and Q are mass problems, we say that P is + weakly reducible to Q if for all Y \u2208 Q there exists X \u2208 P such that + X is Turing reducible to Y. A weak degree is an equivalence class of mass + problems under mutual weak reducibility. Let be the lattice of weak degrees + of mass problems associated with nonempty subsets of the Cantor space. The + lattice has been studied in previous publications. The purpose of this paper + is to show that partakes of hyperarithmeticity. We exhibit a family of specific, + natural degrees in which are indexed by the ordinal numbers less than and + which correspond to the hyperarithmetical hierarchy. Namely, for each , let + h\u03b1 be the weak degree of 0(\u03b1), the \u03b1th Turing jump of 0. If + p is the weak degree of any mass problem P, let p* be the weak degree of the + mass problem P* = {Y | \u2203X (X \u2208 P andBLR(X) \u2286 BLR(Y))} where + BLR(X) is the set of functions which are boundedly limit recursive in X. Let + 1 be the top degree in . We prove that all of the weak degrees , , are distinct + and belong to . In addition, we prove that certain index sets associated with + are complete.", "venue": "Journal of Mathematical Logic", "year": 2007, "referenceCount": + 73, "citationCount": 37, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1994-12-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "1121 - - 1138", "volume": "59"}, "authors": [{"authorId": "1888089", "name": "C. - Jockusch"}, {"authorId": "1760293", "name": "R. Soare"}]}, {"paperId": "bcfe98dfb2b6a70be9c53b4e7ac9ff084866fb3b", - "externalIds": {"MAG": "2012455630", "DOI": "10.1524/zkri.1988.184.14.111", - "CorpusId": 20962199}, "url": "https://www.semanticscholar.org/paper/bcfe98dfb2b6a70be9c53b4e7ac9ff084866fb3b", - "title": "Low-temperature structural distortion in CuS", "abstract": "The - crystal structure of CuS has been studied by powder X-ray and neutron diffraction - methods between 6 and 730 K. At room tempera- ture the hexagonal structure - was confirmed. At low temperature ( ~ 55 K) a second order phase transition - takes place with a space group change from P63/mmc to the \"translationengleiche\" - subgroup Cmcm. This ortho- rhombic distortion causes only small, but significant - changes in the Cu - S and S - S bonding distances. The most pronounced changes - occur for the Cu - Cu distances, indicating metal- metal bond formation to - be the main cause of the transition.", "venue": "", "year": 1988, "referenceCount": - 30, "citationCount": 86, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Zeitschrift - f\u00fcr Kristallographie - Crystalline Materials", "pages": "111 - 122", - "volume": "184"}, "authors": [{"authorId": "30884302", "name": "H. Fjellv\u00e5g"}, - {"authorId": "1418879705", "name": "Fredrik Grenv\u00f8ld"}, {"authorId": - "14901759", "name": "S. St\u00f8len"}, {"authorId": "88631322", "name": "A. - Andresen"}, {"authorId": "1415532629", "name": "R. M\u00fcller-K\u00e4fer"}, - {"authorId": "89959815", "name": "A. Simon"}]}, {"paperId": "79fd25670f4e5605d54409658fb17a20f322564d", - "externalIds": {"MAG": "2591453514", "DOI": "10.1007/978-1-137-06095-2_13", - "CorpusId": 62972597}, "url": "https://www.semanticscholar.org/paper/79fd25670f4e5605d54409658fb17a20f322564d", - "title": "Deconstruction and Technology", "abstract": null, "venue": "", "year": - 2000, "referenceCount": 15, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "238-257", "volume": ""}, "authors": - [{"authorId": "144992982", "name": "Timothy Clark"}]}, {"paperId": "14a79533b8189eebf27915b7276f194b81a05d7e", - "externalIds": {"MAG": "2312669410", "DOI": "10.2307/3053522", "CorpusId": - 147399806}, "url": "https://www.semanticscholar.org/paper/14a79533b8189eebf27915b7276f194b81a05d7e", - "title": "Structure and Practice of Familial-Based Justice in a Criminal Court", - "abstract": "Many explanations have been proposed for gender differences in - \n criminal court outcomes, but none has been grounded in a systematic \n - study of the reasoning processes used by court officials in sanctioning \n - male and female defendants. Interviews with thirty-five court offi- \n cials - (prosecutors, defense attorneys, probation officers, and judges) \n are presented - here to assess extant theory and to offer a reconceptual- \n ization of why - gender differences may emerge in the course of \"doing \n justice.\" The interviews - reveal that the sanctioning process is struc- \n tured by familial paternalism, - that is, a concern to protect family life, \n men''s and women''s labor for - families, and those dependent on de- \n fendants. Familial paternalism more - accurately explains family- and \n gender-based disparities in sentencing - than existing social control ar- \n guments, and it is distinguished from - female paternalism, which is \n based on the view that women, as the \"weaker - sex,\" are subject to \n greater court protection than men before the criminal - court.", "venue": "", "year": 1987, "referenceCount": 26, "citationCount": - 161, "influentialCitationCount": 22, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Law", "source": "s2-fos-model"}, {"category": "Sociology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Law & Society Review", "pages": "267-290", "volume": "21"}, "authors": - [{"authorId": "115050170", "name": "Kathleen Daly"}]}, {"paperId": "d1e773c1368eb4f0ebd99486e088a39e39c248d9", + "2007-12-01", "journal": {"name": "J. Math. Log.", "volume": "7"}, "authors": + [{"authorId": "2861960", "name": "J. Cole"}, {"authorId": "2292634", "name": + "S. G. Simpson"}]}, {"paperId": "d1e773c1368eb4f0ebd99486e088a39e39c248d9", "externalIds": {"MAG": "1968529600", "DBLP": "conf/stoc/Chan81", "DOI": "10.1145/800076.802468", - "CorpusId": 10149871}, "url": "https://www.semanticscholar.org/paper/d1e773c1368eb4f0ebd99486e088a39e39c248d9", + "CorpusId": 10149871}, "corpusId": 10149871, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d1e773c1368eb4f0ebd99486e088a39e39c248d9", "title": "Reversal complexity of counter machines", "abstract": "It has long been known that deterministic 1-way counter machines recognize exactly all r.e. sets. Here we investigate counter machines with general recursive bounds @@ -32049,14 +36391,58 @@ interactions: using a variety of techniques which include translation of Turing machine time hierarchies, padding arguments as well as more ad hoc counting arguments.", "venue": "STOC ''81", "year": 1981, "referenceCount": 17, "citationCount": - 38, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1981-05-11", "journal": - {"pages": "146-157"}, "authors": [{"authorId": "2814135", "name": "T. Chan"}]}, - {"paperId": "533b18feab51f562a04273cb789410b900511fa2", "externalIds": {"MAG": - "1515240813", "DOI": "10.5860/choice.51-2712", "CorpusId": 118037831}, "url": - "https://www.semanticscholar.org/paper/533b18feab51f562a04273cb789410b900511fa2", + 38, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1981-05-11", "journal": {"pages": "146-157"}, "authors": [{"authorId": "2814135", + "name": "T. Chan"}]}, {"paperId": "c6166f8763227d8194fe4f30af5f61f6c4fdba01", + "externalIds": {"MAG": "2060517864", "DOI": "10.1109/MAHC.1996.539924", "CorpusId": + 20034758}, "corpusId": 20034758, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6166f8763227d8194fe4f30af5f61f6c4fdba01", + "title": "Information and secrecy: Vannevar Bush, Ultra and the other Memex", + "abstract": "remarkable for several reasons. Coming at a time when scientific + analysis of macroscopic pattern and form was in decline in biology and had + never been of more than marginal significance in chemistry-Turing''s paper + hypothesiLed a set of novel physico-chemical effects, sketched out the means + for their mathematical treatment, and speculated that they in fact provided + the basis for some of the most mysterious and scientifically intractable features + of living organisms. Furthermore, with genetics in the ascendancy in biology + (the double helical structure of DNA was elucidated in 1953, the year after + Turing''s paper appeared) and a cybernetic view of living processes that was + strongly influenced by Turing''s own strides in the fields of computability + and machine intelligence gaining hold in scientific culture, it would have + been natural for him to help foster the newly emerging paradigm of the \" + genetic program \" (as, for example, theoretical physicist Erwin Schrodinger + did in his 1945 book, What Is Life?). It is testimony to Turing''s originality + and judgment that he instead struck off in the direction he did. The volume + under review is one of four recently issued books containing Turing''s collected + works. While the paper on morpho-genesis stands outside the main body of this + work, it seems to have heralded a continuing interest of his in the generation + of biological form and pattern, as evidenced by several unpublished manuscripts + as well as a master''s thesis he supervised on the subject of form generation + in plants. These have not previously been available to the scientific public, + and their inclusion in this volume by the editor, P.T. Saunders, who has himself + worked at the interface of mathematics and biology, enhances its value. The + unpublished papers are inconclusive, but provide insight into Turing''s thought + processes as he formulated a geometrical analysis of the problem of phyllotaxis + (the arrangements of plant parts such as leaves and seeds according to striking + mathematical regularities) and attempted to account for these regularities + with the \" reaction-diffusion \" mechanism presented in the 1952 paper. Saunders + also contributes an insightful introduction, placing Turing''s biological + work in the \" laws of form \" tradition, which also includes D''Arcy W. Thompson''s + On Growth and Form (1917; 1942), and against the view held in common by Darwin + and the Natural Theologians who preceded him that each biological feature + is present by virtue of the purpose it serves in the respective organism. + The introductory remarks \u2026", "venue": "IEEE Annals of the History of + Computing", "year": 1996, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "1996-12-01", "journal": {"name": "IEEE Annals + of the History of Computing", "pages": "70-", "volume": "18"}, "authors": + [{"authorId": "145324717", "name": "P. Kidwell"}]}, {"paperId": "533b18feab51f562a04273cb789410b900511fa2", + "externalIds": {"MAG": "1515240813", "DOI": "10.5860/choice.51-2712", "CorpusId": + 118037831}, "corpusId": 118037831, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/533b18feab51f562a04273cb789410b900511fa2", "title": "Computability: Turing, Gdel, Church, and Beyond", "abstract": "In the 1930s a series of seminal works published by Alan Turing, Kurt Gdel, Alonzo Church, and others established the theoretical basis for computability. This @@ -32078,14 +36464,59 @@ interactions: Saul Kripke, Carl J. Posy, Hilary Putnam, Oron Shagrir, Stewart Shapiro, Wilfried Sieg, Robert I. Soare, Umesh V. Vazirani", "venue": "", "year": 2013, "referenceCount": 16, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-06-07", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "144246233", "name": "B. Copeland"}, - {"authorId": "1795759", "name": "Carl J. Posy"}, {"authorId": "1742013", "name": - "Oron Shagrir"}]}, {"paperId": "575d8de14fd7b6881345fc3d65310443c50d7d45", - "externalIds": {"DBLP": "journals/aim/MorgensternDO16", "MAG": "2406611863", - "DOI": "10.1609/aimag.v37i1.2639", "CorpusId": 2593569}, "url": "https://www.semanticscholar.org/paper/575d8de14fd7b6881345fc3d65310443c50d7d45", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-06-07", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144246233", + "name": "B. Copeland"}, {"authorId": "1795759", "name": "Carl J. Posy"}, {"authorId": + "1742013", "name": "Oron Shagrir"}]}, {"paperId": "1a3ec0662929d2b9eb9a555c64cf16a846f4fb9c", + "externalIds": {"DBLP": "conf/bmvc/GuadarramaDBS0017a", "MAG": "2953267715", + "ArXiv": "1705.07208", "DOI": "10.5244/C.31.112", "CorpusId": 25005910}, "corpusId": + 25005910, "publicationVenue": {"id": "78a7fbcc-41c5-4258-b633-04b8637d4a9f", + "name": "British Machine Vision Conference", "type": "conference", "alternate_names": + ["Br Mach Vis Conf", "BMVC"], "url": "http://www.bmva.org/bmvc/"}, "url": + "https://www.semanticscholar.org/paper/1a3ec0662929d2b9eb9a555c64cf16a846f4fb9c", + "title": "PixColor: Pixel Recursive Colorization", "abstract": "We propose + a novel approach to automatically produce multiple colorized versions of a + grayscale image. Our method results from the observation that the task of + automated colorization is relatively easy given a low-resolution version of + the color image. We first train a conditional PixelCNN to generate a low resolution + color for a given grayscale image. Then, given the generated low-resolution + color image and the original grayscale image as inputs, we train a second + CNN to generate a high-resolution colorization of an image. We demonstrate + that our approach produces more diverse and plausible colorizations than existing + methods, as judged by human raters in a \"Visual Turing Test\".", "venue": + "British Machine Vision Conference", "year": 2017, "referenceCount": 42, "citationCount": + 85, "influentialCitationCount": 7, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.bmva.org/bmvc/2017/papers/paper112/paper112.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2017-05-19", "journal": {"name": "ArXiv", "volume": "abs/1705.07208"}, + "authors": [{"authorId": "1687120", "name": "S. Guadarrama"}, {"authorId": + "144421715", "name": "Ryan Dahl"}, {"authorId": "3426307", "name": "David + Bieber"}, {"authorId": "144739074", "name": "Mohammad Norouzi"}, {"authorId": + "1789737", "name": "Jonathon Shlens"}, {"authorId": "1702318", "name": "K. + Murphy"}]}, {"paperId": "6089b4474ed94a06aba42974fade7009bc77ee4e", "externalIds": + {"MAG": "2159039200", "ArXiv": "1004.2030", "DOI": "10.1007/s00222-013-0497-5", + "CorpusId": 18322775}, "corpusId": 18322775, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6089b4474ed94a06aba42974fade7009bc77ee4e", + "title": "On Turing dynamical systems and the Atiyah problem", "abstract": + null, "venue": "", "year": 2010, "referenceCount": 39, "citationCount": 31, + "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1004.2030", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-04-12", "journal": {"name": "Inventiones mathematicae", "pages": "27-69", + "volume": "198"}, "authors": [{"authorId": "2060529798", "name": "\u0141ukasz + Grabowski"}]}, {"paperId": "575d8de14fd7b6881345fc3d65310443c50d7d45", "externalIds": + {"DBLP": "journals/aim/MorgensternDO16", "MAG": "2406611863", "DOI": "10.1609/aimag.v37i1.2639", + "CorpusId": 2593569}, "corpusId": 2593569, "publicationVenue": {"id": "6fedff74-7525-4b7f-bbb4-4df4e23948e4", + "name": "The AI Magazine", "type": "journal", "alternate_names": ["AI Mag", + "Ai Mag", "Ai Magazine"], "issn": "0738-4602", "url": "https://www.aaai.org/Library/Magazine/magazine-library.php", + "alternate_urls": ["https://www.aaai.org/ojs/index.php/aimagazine/", "https://www.aaai.org/Magazine/magazine.php"]}, + "url": "https://www.semanticscholar.org/paper/575d8de14fd7b6881345fc3d65310443c50d7d45", "title": "Planning, Executing, and Evaluating the Winograd Schema Challenge", "abstract": "The Winograd Schema Challenge was proposed by Hector Levesque in 2011 as an alternative to the Turing Test. Chief among its features is @@ -32094,58 +36525,76 @@ interactions: training, and are easy for humans to answer. This article details our plans to run the WSC and evaluate results.", "venue": "The AI Magazine", "year": 2016, "referenceCount": 12, "citationCount": 58, "influentialCitationCount": - 8, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 8, "isOpenAccess": true, "openAccessPdf": {"url": "https://aaai.org/ojs/index.php/aimagazine/article/download/2639/2533", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-13", "journal": {"name": "AI Mag.", "pages": "50-54", "volume": "37"}, "authors": [{"authorId": "40429476", "name": "L. Morgenstern"}, {"authorId": "144883814", "name": "E. Davis"}, {"authorId": "23814012", "name": - "Charles L. Ortiz"}]}, {"paperId": "dd0305302b9838860a360cf9078922bbe62da515", - "externalIds": {"DBLP": "journals/cryptologia/Zabell12", "MAG": "1984481131", - "DOI": "10.1080/01611194.2012.697811", "CorpusId": 29198724}, "url": "https://www.semanticscholar.org/paper/dd0305302b9838860a360cf9078922bbe62da515", - "title": "Commentary on Alan M. Turing: The Applications of Probability to - Cryptography", "abstract": "Abstract In April 2012, two papers written by - Alan Turing during the Second World War on the use of probability in cryptanalysis - were released by GCHQ. The longer of these presented an overall framework - for the use of Bayes''s theorem and prior probabilities, including four examples - worked out in detail: the Vigen\u00e8re cipher, a letter subtractor cipher, - the use of repeats to find depths, and simple columnar transposition. (The - other paper was an alternative version of the section on repeats.) Turing - stressed the importance in practical cryptanalysis of sometimes using only - part of the evidence or making simplifying assumptions and presents in each - case computational shortcuts to make burdensome calculations manageable. The - four examples increase roughly in their difficulty and cryptanalytic demands. - After the war, Turing''s approach to statistical inference was championed - by his assistant in Hut 8, Jack Good, which played a role in the later resurgence - of Bayesian statistics.", "venue": "Cryptologia", "year": 2012, "referenceCount": - 21, "citationCount": 22, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-07-01", "journal": {"name": "Cryptologia", "pages": "191 - 214", "volume": - "36"}, "authors": [{"authorId": "2347279", "name": "S. Zabell"}]}, {"paperId": - "9e85073cc97dc6ab555ad6844a3b44651408b9f3", "externalIds": {"MAG": "1588957253", - "DBLP": "books/daglib/0017329", "DOI": "10.5860/choice.44-6273", "CorpusId": - 37206497}, "url": "https://www.semanticscholar.org/paper/9e85073cc97dc6ab555ad6844a3b44651408b9f3", - "title": "Thinking on the web - Berners-Lee, G\u00f6del, and Turing", "abstract": - "What is Thinking? What is Turings Test? What is Gdels Undecidability Theorem? - How is Berners-Lees Semantic Web logic going to overcome paradoxes and complexity - to produce machine processing on the Web? Thinking on the Web draws from the - contributions of Tim Berners-Lee (What is solvable on the Web?), Kurt Gdel - (What is decidable?), and Alan Turing (What is machine intelligence?) to evaluate - how much intelligence can be projected onto the Web. The authors offer both - abstract and practical perspectives to delineate both the opportunities and - challenges of a smarter Web through a threaded series of vignettes and a thorough - review of Semantic Web development.", "venue": "", "year": 2006, "referenceCount": - 5, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2006-09-01", "journal": {"pages": "I-XXVII, - 1-261"}, "authors": [{"authorId": "2545446", "name": "P. Alesso"}, {"authorId": - "2110203191", "name": "Craig F. Smith"}]}, {"paperId": "5d0e0a3908c675b8b10b91fcf8547680e6069459", + "Charles L. Ortiz"}]}, {"paperId": "f6edc8a5defd777d170e779487eb68439ac53b72", + "externalIds": {"ArXiv": "quant-ph/9702057", "MAG": "1668464107", "CorpusId": + 14694533}, "corpusId": 14694533, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6edc8a5defd777d170e779487eb68439ac53b72", + "title": "The lambda-q calculus can efficiently simulate quantum computers", + "abstract": "We show that the lambda-q calculus can efficiently simulate quantum + Turing machines by showing how the lambda-q calculus can efficiently simulate + a class of quantum cellular automaton that are equivalent to quantum Turing + machines. We conclude by noting that the lambda-q calculus may be strictly + stronger than quantum computers because NP-complete problems such as satisfiability + are efficiently solvable in the lambda-q calculus but there is a widespread + doubt that they are efficiently solvable by quantum computers.", "venue": + "", "year": 1997, "referenceCount": 4, "citationCount": 23, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1997-02-26", "journal": {"name": + "arXiv: Quantum Physics", "volume": ""}, "authors": [{"authorId": "2577297", + "name": "Philip Z. Maymin"}]}, {"paperId": "6432bf1951cb9794cddb0974f524d351d0df0b24", + "externalIds": {"MAG": "1481048557", "DBLP": "conf/apn/KohlerR04", "DOI": + "10.1007/978-3-540-27793-4_16", "CorpusId": 32915453}, "corpusId": 32915453, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6432bf1951cb9794cddb0974f524d351d0df0b24", + "title": "Properties of Object Petri Nets", "abstract": null, "venue": "ICATPN", + "year": 2004, "referenceCount": 25, "citationCount": 59, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2004-06-21", "journal": + {"pages": "278-297"}, "authors": [{"authorId": "50733747", "name": "M. K\u00f6hler"}, + {"authorId": "2713515", "name": "Heiko R\u00f6lke"}]}, {"paperId": "91c239d3d6ea6b59635d24cc70988455f3928f48", + "externalIds": {"MAG": "1964625848", "ArXiv": "q-bio/0701012", "DOI": "10.1103/PhysRevE.75.051913", + "CorpusId": 410950, "PubMed": "17677104"}, "corpusId": 410950, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/91c239d3d6ea6b59635d24cc70988455f3928f48", + "title": "Spatiotemporal complexity of a ratio-dependent predator-prey system.", + "abstract": "In this paper, we investigate the emergence of a ratio-dependent + predator-prey system with Michaelis-Menten-type functional response and reaction + diffusion. We obtain the conditions of Hopf, Turing, and wave bifurcation + in a spatial domain. Furthermore, we present a theoretical analysis of evolutionary + processes that involves organisms distribution and their interaction of spatially + distributed population with local diffusion. The results of numerical simulations + reveal that the typical dynamics of population density variation is the formation + of isolated groups, i.e., stripelike or spotted or coexistence of both. Our + study shows that the spatially extended model has not only more complex dynamic + patterns in the space, but also chaos and spiral waves. It may help us better + understand the dynamics of an aquatic community in a real marine environment.", + "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "year": 2007, "referenceCount": 66, "citationCount": 159, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/q-bio/0701012", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine", "Biology"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-01-07", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 051913\n ", "volume": + "75 5 Pt 1"}, "authors": [{"authorId": "2116103578", "name": "Weiming Wang"}, + {"authorId": "47362020", "name": "Quan\u2010Xing Liu"}, {"authorId": "145752193", + "name": "Zhen Jin"}]}, {"paperId": "5d0e0a3908c675b8b10b91fcf8547680e6069459", "externalIds": {"MAG": "2974981857", "DBLP": "conf/clef/PotthastSH10", "CorpusId": - 5721714}, "url": "https://www.semanticscholar.org/paper/5d0e0a3908c675b8b10b91fcf8547680e6069459", + 5721714}, "corpusId": 5721714, "publicationVenue": {"id": "ab453bce-d4ec-48ec-ad78-ef19dc9333ab", + "name": "Conference and Labs of the Evaluation Forum", "type": "conference", + "alternate_names": ["CLEF", "Conf Lab Evaluation Forum", "Cross-language Evaluation + Forum", "Cross-Language Evaluation Forum"], "url": "http://www.clef-initiative.eu/"}, + "url": "https://www.semanticscholar.org/paper/5d0e0a3908c675b8b10b91fcf8547680e6069459", "title": "Overview of the 1st International Competition on Wikipedia Vandalism Detection", "abstract": "This paper overviews 9 vandalism detectors that have been developed and evaluated within PAN''10. We start with a survey of 55 @@ -32155,267 +36604,52 @@ interactions: all detectors into one, which turns out to outperform even the best performing detector.", "venue": "Conference and Labs of the Evaluation Forum", "year": 2010, "referenceCount": 28, "citationCount": 59, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": null, "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "3046200", "name": "Martin Potthast"}, {"authorId": - "2768291", "name": "T. Holfeld"}]}, {"paperId": "d078675e6290d25160fa9060b89f85d181a9b9c1", - "externalIds": {"MAG": "2898988937", "DOI": "10.1007/S12008-018-0509-1", "CorpusId": - 114119243}, "url": "https://www.semanticscholar.org/paper/d078675e6290d25160fa9060b89f85d181a9b9c1", - "title": "Advances on mechanics, design engineering and manufacturing", "abstract": - null, "venue": "International Journal on Interactive Design and Manufacturing - (IJIDeM)", "year": 2018, "referenceCount": 18, "citationCount": 29, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2018-09-18", "journal": {"name": - "International Journal on Interactive Design and Manufacturing (IJIDeM)", - "pages": "1155-1156", "volume": "12"}, "authors": [{"authorId": "71256452", - "name": "G. Sequenzia"}, {"authorId": "34441732", "name": "S. Rizzuti"}, {"authorId": - "49534453", "name": "M. Martorelli"}, {"authorId": "38905110", "name": "T. - Ingrassia"}]}, {"paperId": "f6edc8a5defd777d170e779487eb68439ac53b72", "externalIds": - {"ArXiv": "quant-ph/9702057", "MAG": "1668464107", "CorpusId": 14694533}, - "url": "https://www.semanticscholar.org/paper/f6edc8a5defd777d170e779487eb68439ac53b72", - "title": "The lambda-q calculus can efficiently simulate quantum computers", - "abstract": "We show that the lambda-q calculus can efficiently simulate quantum - Turing machines by showing how the lambda-q calculus can efficiently simulate - a class of quantum cellular automaton that are equivalent to quantum Turing - machines. We conclude by noting that the lambda-q calculus may be strictly - stronger than quantum computers because NP-complete problems such as satisfiability - are efficiently solvable in the lambda-q calculus but there is a widespread - doubt that they are efficiently solvable by quantum computers.", "venue": - "", "year": 1997, "referenceCount": 4, "citationCount": 23, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1997-02-26", "journal": {"name": "arXiv: Quantum - Physics", "volume": ""}, "authors": [{"authorId": "2577297", "name": "Philip - Z. Maymin"}]}, {"paperId": "6c811210ec2a431003705b67a96e2cbfc2331243", "externalIds": - {"MAG": "2008666095", "DOI": "10.1126/science.1218417", "CorpusId": 44455792, - "PubMed": "22499929"}, "url": "https://www.semanticscholar.org/paper/6c811210ec2a431003705b67a96e2cbfc2331243", - "title": "Beyond Turing''s Machines", "abstract": "Whether all types of computation\u2014including - that of our own minds\u2014can be modeled as computer programs remains an - open question. In marking Alan Turing''s centenary, it''s worth asking what - was his most fundamental achievement and what he left for future science to - take up when he took his own life in 1954. His success in World War II, as - the chief scientific figure in the British cryptographic effort, with hands-on - responsibility for the Atlantic naval conflict, had a great and immediate - impact. But in its ever-growing influence since that time, the principle of - the universal machine, which Turing published in 1937 (1), beats even this.", - "venue": "Science", "year": 2012, "referenceCount": 6, "citationCount": 13, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology", - "Medicine"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-04-13", "journal": {"name": "Science", "pages": "163 - 164", "volume": - "336"}, "authors": [{"authorId": "144443425", "name": "A. Hodges"}]}, {"paperId": - "1cd704d0010b421e88601358dc12f4a3c2b048cd", "externalIds": {"MAG": "1489217282", - "DOI": "10.15376/BIORES.3.4.1403-1418", "CorpusId": 33209211}, "url": "https://www.semanticscholar.org/paper/1cd704d0010b421e88601358dc12f4a3c2b048cd", - "title": "CELLULOSE AS A NANOSTRUCTURED POLYMER: A SHORT REVIEW", "abstract": - "Cellulose has a complex, multi-level supermolecular architecture. This natural - polymer is built from superfine fibrils having diameters in the nano scale, - and each such nanofibril contains ordered nanocrystallites and low-ordered - nano-domains. In this review, the nano-structure of cellulose and its influence - on various properties of the polymer is discussed. In particular, the ability - of nano-scale crystallites to undergo lateral co-crystallization and aggregation, - as well as to undergo phase transformation through dissolution, alkalization, - and chemical modifica-tion of cellulose has been the subject of investigation. - The recent investigations pave the way for development of highly reactive - cellulosic materials. Methods for preparation nanofibrillated cellulose and - free nano-particles are described. Some application areas of the nanostruc-tured - and nano-cellulose are discussed.", "venue": "", "year": 2008, "referenceCount": - 61, "citationCount": 163, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Materials Science", "source": - "s2-fos-model"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2008-10-30", "journal": {"name": "Bioresources", - "pages": "1403-1418", "volume": "3"}, "authors": [{"authorId": "92045099", - "name": "M. Ioelovich"}]}, {"paperId": "3c829f0b969e4d40af2d717018a65fc502945d21", - "externalIds": {"DBLP": "journals/mima/Kugel02", "MAG": "2144788786", "DOI": - "10.1023/A:1021150928258", "CorpusId": 36985281}, "url": "https://www.semanticscholar.org/paper/3c829f0b969e4d40af2d717018a65fc502945d21", - "title": "Computing Machines Can''t Be Intelligent (...and Turing Said So)", - "abstract": null, "venue": "Minds and Machines", "year": 2002, "referenceCount": - 45, "citationCount": 17, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2002-11-08", "journal": {"name": "Minds and Machines", "pages": "563-579", - "volume": "12"}, "authors": [{"authorId": "3020115", "name": "P. Kugel"}]}, - {"paperId": "f73b4aaf5f0dbad4a3803488b506b1faef56e9fc", "externalIds": {"MAG": - "2241837130", "DBLP": "conf/sacrypt/JouxM03", "DOI": "10.1007/978-3-540-24654-1_14", - "CorpusId": 9392566}, "url": "https://www.semanticscholar.org/paper/f73b4aaf5f0dbad4a3803488b506b1faef56e9fc", - "title": "A Chosen IV Attack Against Turing", "abstract": null, "venue": "ACM - Symposium on Applied Computing", "year": 2003, "referenceCount": 19, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-08-14", "journal": - {"pages": "194-207"}, "authors": [{"authorId": "1759476", "name": "A. Joux"}, - {"authorId": "40490371", "name": "F. Muller"}]}, {"paperId": "c6166f8763227d8194fe4f30af5f61f6c4fdba01", - "externalIds": {"MAG": "2060517864", "DOI": "10.1109/MAHC.1996.539924", "CorpusId": - 20034758}, "url": "https://www.semanticscholar.org/paper/c6166f8763227d8194fe4f30af5f61f6c4fdba01", - "title": "Information and secrecy: Vannevar Bush, Ultra and the other Memex", - "abstract": "remarkable for several reasons. Coming at a time when scientific - analysis of macroscopic pattern and form was in decline in biology and had - never been of more than marginal significance in chemistry-Turing''s paper - hypothesiLed a set of novel physico-chemical effects, sketched out the means - for their mathematical treatment, and speculated that they in fact provided - the basis for some of the most mysterious and scientifically intractable features - of living organisms. Furthermore, with genetics in the ascendancy in biology - (the double helical structure of DNA was elucidated in 1953, the year after - Turing''s paper appeared) and a cybernetic view of living processes that was - strongly influenced by Turing''s own strides in the fields of computability - and machine intelligence gaining hold in scientific culture, it would have - been natural for him to help foster the newly emerging paradigm of the \" - genetic program \" (as, for example, theoretical physicist Erwin Schrodinger - did in his 1945 book, What Is Life?). It is testimony to Turing''s originality - and judgment that he instead struck off in the direction he did. The volume - under review is one of four recently issued books containing Turing''s collected - works. While the paper on morpho-genesis stands outside the main body of this - work, it seems to have heralded a continuing interest of his in the generation - of biological form and pattern, as evidenced by several unpublished manuscripts - as well as a master''s thesis he supervised on the subject of form generation - in plants. These have not previously been available to the scientific public, - and their inclusion in this volume by the editor, P.T. Saunders, who has himself - worked at the interface of mathematics and biology, enhances its value. The - unpublished papers are inconclusive, but provide insight into Turing''s thought - processes as he formulated a geometrical analysis of the problem of phyllotaxis - (the arrangements of plant parts such as leaves and seeds according to striking - mathematical regularities) and attempted to account for these regularities - with the \" reaction-diffusion \" mechanism presented in the 1952 paper. Saunders - also contributes an insightful introduction, placing Turing''s biological - work in the \" laws of form \" tradition, which also includes D''Arcy W. Thompson''s - On Growth and Form (1917; 1942), and against the view held in common by Darwin - and the Natural Theologians who preceded him that each biological feature - is present by virtue of the purpose it serves in the respective organism. - The introductory remarks \u2026", "venue": "IEEE Annals of the History of - Computing", "year": 1996, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1996-12-01", "journal": {"name": "IEEE Annals of the History of Computing", - "pages": "70-", "volume": "18"}, "authors": [{"authorId": "145324717", "name": - "P. Kidwell"}]}, {"paperId": "7c1f3a0de578491a7868ff839a1ccae76bc02272", "externalIds": - {"MAG": "1983742476", "DOI": "10.2307/2324534", "CorpusId": 61028491}, "url": - "https://www.semanticscholar.org/paper/7c1f3a0de578491a7868ff839a1ccae76bc02272", + ["JournalArticle", "Review"], "publicationDate": null, "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "3046200", "name": "Martin Potthast"}, + {"authorId": "2768291", "name": "T. Holfeld"}]}, {"paperId": "14a79533b8189eebf27915b7276f194b81a05d7e", + "externalIds": {"MAG": "2312669410", "DOI": "10.2307/3053522", "CorpusId": + 147399806}, "corpusId": 147399806, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/14a79533b8189eebf27915b7276f194b81a05d7e", + "title": "Structure and Practice of Familial-Based Justice in a Criminal Court", + "abstract": "Many explanations have been proposed for gender differences in + \n criminal court outcomes, but none has been grounded in a systematic \n + study of the reasoning processes used by court officials in sanctioning \n + male and female defendants. Interviews with thirty-five court offi- \n cials + (prosecutors, defense attorneys, probation officers, and judges) \n are presented + here to assess extant theory and to offer a reconceptual- \n ization of why + gender differences may emerge in the course of \"doing \n justice.\" The interviews + reveal that the sanctioning process is struc- \n tured by familial paternalism, + that is, a concern to protect family life, \n men''s and women''s labor for + families, and those dependent on de- \n fendants. Familial paternalism more + accurately explains family- and \n gender-based disparities in sentencing + than existing social control ar- \n guments, and it is distinguished from + female paternalism, which is \n based on the view that women, as the \"weaker + sex,\" are subject to \n greater court protection than men before the criminal + court.", "venue": "", "year": 1987, "referenceCount": 26, "citationCount": + 162, "influentialCitationCount": 23, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Law", "source": "s2-fos-model"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Law & Society Review", "pages": "267-290", "volume": + "21"}, "authors": [{"authorId": "115050170", "name": "Kathleen Daly"}]}, {"paperId": + "7c1f3a0de578491a7868ff839a1ccae76bc02272", "externalIds": {"MAG": "1983742476", + "DOI": "10.2307/2324534", "CorpusId": 61028491}, "corpusId": 61028491, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7c1f3a0de578491a7868ff839a1ccae76bc02272", "title": "Turing Omnibus: 61 Excursions in Computer Science", "abstract": null, "venue": "", "year": 1989, "referenceCount": 0, "citationCount": 25, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "1989-05-01", "journal": - {"name": "", "pages": "355", "volume": ""}, "authors": [{"authorId": "2078547235", - "name": "A. K. Dewdney"}]}, {"paperId": "7dfd98404ca8bc47207fb157d3ad2af649dccb2e", - "externalIds": {"MAG": "2496579624", "DOI": "10.1515/9783110325461.393", "CorpusId": - 124457427}, "url": "https://www.semanticscholar.org/paper/7dfd98404ca8bc47207fb157d3ad2af649dccb2e", - "title": "G\u00f6del on Turing on Computability", "abstract": null, "venue": - "", "year": 2006, "referenceCount": 20, "citationCount": 18, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2006-01-31", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1742013", "name": "Oron Shagrir"}]}, {"paperId": "66ebd29210b52476cc7ff5fd2e972418d8589695", - "externalIds": {"DBLP": "journals/jml/ColeS07", "MAG": "2120265248", "DOI": - "10.1142/S0219061307000652", "CorpusId": 9798629}, "url": "https://www.semanticscholar.org/paper/66ebd29210b52476cc7ff5fd2e972418d8589695", - "title": "Mass Problems and Hyperarithmeticity", "abstract": "A mass problem - is a set of Turing oracles. If P and Q are mass problems, we say that P is - weakly reducible to Q if for all Y \u2208 Q there exists X \u2208 P such that - X is Turing reducible to Y. A weak degree is an equivalence class of mass - problems under mutual weak reducibility. Let be the lattice of weak degrees - of mass problems associated with nonempty subsets of the Cantor space. The - lattice has been studied in previous publications. The purpose of this paper - is to show that partakes of hyperarithmeticity. We exhibit a family of specific, - natural degrees in which are indexed by the ordinal numbers less than and - which correspond to the hyperarithmetical hierarchy. Namely, for each , let - h\u03b1 be the weak degree of 0(\u03b1), the \u03b1th Turing jump of 0. If - p is the weak degree of any mass problem P, let p* be the weak degree of the - mass problem P* = {Y | \u2203X (X \u2208 P andBLR(X) \u2286 BLR(Y))} where - BLR(X) is the set of functions which are boundedly limit recursive in X. Let - 1 be the top degree in . We prove that all of the weak degrees , , are distinct - and belong to . In addition, we prove that certain index sets associated with - are complete.", "venue": "Journal of Mathematical Logic", "year": 2007, "referenceCount": - 73, "citationCount": 37, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-12-01", "journal": {"name": "J. - Math. Log.", "volume": "7"}, "authors": [{"authorId": "2861960", "name": "J. - Cole"}, {"authorId": "2292634", "name": "S. G. Simpson"}]}, {"paperId": "97539179984e12cf1748d8f616d94bd796215f73", - "externalIds": {"MAG": "1991947259", "DOI": "10.1063/1.4743983", "CorpusId": - 20079731, "PubMed": "22920103"}, "url": "https://www.semanticscholar.org/paper/97539179984e12cf1748d8f616d94bd796215f73", - "title": "Particle dynamics simulations of Turing patterns.", "abstract": - "The direct simulation Monte Carlo method is used to reproduce Turing patterns - at the microscopic level in reaction-diffusion systems. In order to satisfy - the basic condition for the development of such a spatial structure, we propose - a model involving a solvent, which allows for disparate diffusivities of individual - reactive species. One-dimensional structures are simulated in systems of various - lengths. Simulation results agree with the macroscopic predictions obtained - by integration of the reaction-diffusion equations. Additional effects due - to internal fluctuations are observed, such as temporal transitions between - structures of different wavelengths in a confined system. For a structure - developing behind a propagating wave front, the fluctuations suppress the - induction period and accelerate the formation of the Turing pattern. These - results support the ability of reaction-diffusion models to robustly reproduce - axial segmentation including the formation of early vertebrae or somites in - noisy biological environments.", "venue": "Journal of Chemical Physics", "year": - 2012, "referenceCount": 42, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-08-16", "journal": - {"name": "The Journal of chemical physics", "pages": "\n 074107\n ", - "volume": "137 7"}, "authors": [{"authorId": "2050668979", "name": "P. Dziekan"}, - {"authorId": "2348493", "name": "A. Lemarchand"}, {"authorId": "3023174", - "name": "B. Nowakowski"}]}, {"paperId": "6432bf1951cb9794cddb0974f524d351d0df0b24", - "externalIds": {"MAG": "1481048557", "DBLP": "conf/apn/KohlerR04", "DOI": - "10.1007/978-3-540-27793-4_16", "CorpusId": 32915453}, "url": "https://www.semanticscholar.org/paper/6432bf1951cb9794cddb0974f524d351d0df0b24", - "title": "Properties of Object Petri Nets", "abstract": null, "venue": "ICATPN", - "year": 2004, "referenceCount": 25, "citationCount": 59, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-06-21", "journal": {"pages": "278-297"}, "authors": - [{"authorId": "50733747", "name": "M. K\u00f6hler"}, {"authorId": "2713515", - "name": "Heiko R\u00f6lke"}]}, {"paperId": "6dd3b0c56f738564167e3509b097124bde4b4f64", - "externalIds": {"DBLP": "conf/pkdd/CaoZZY17", "ArXiv": "1702.06674", "MAG": - "2590274298", "DOI": "10.1007/978-3-319-71249-9_10", "CorpusId": 12185715}, - "url": "https://www.semanticscholar.org/paper/6dd3b0c56f738564167e3509b097124bde4b4f64", - "title": "Unsupervised Diverse Colorization via Generative Adversarial Networks", - "abstract": null, "venue": "ECML/PKDD", "year": 2017, "referenceCount": 42, - "citationCount": 155, "influentialCitationCount": 14, "isOpenAccess": true, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-02-22", "journal": {"name": "ArXiv", "volume": "abs/1702.06674"}, "authors": - [{"authorId": "39746867", "name": "Yun Cao"}, {"authorId": "145385776", "name": - "Zhiming Zhou"}, {"authorId": "2108309275", "name": "Weinan Zhang"}, {"authorId": - "1811427", "name": "Yong Yu"}]}, {"paperId": "12029240f3c3b34f6ef29e72039b0491cf73f0e2", - "externalIds": {"DBLP": "conf/atal/EdmondsB04", "MAG": "2143737517", "DOI": - "10.1109/AAMAS.2004.265", "CorpusId": 9043444}, "url": "https://www.semanticscholar.org/paper/12029240f3c3b34f6ef29e72039b0491cf73f0e2", - "title": "The insufficiency of formal design methods - the necessity of an - experimental approach for the understanding and control of complex MAS", "abstract": - "We highlight the limitations of formal methods by exhibiting two results - in recursive function theory: that there is no effective means of finding - a program that satisfies a given formal specification; or checking that a - program meets a specification. We exhibit a simple MAS which has all the power - of a Turing machine. We argue that any pure design methodology will face insurmountable - difficulties in today\u00fds open and complex MAS. We recommend instead a - methodology based on experimental method \u00bf scientific foundations for - MAS construction and control.", "venue": "Proceedings of the Third International - Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS - 2004.", "year": 2004, "referenceCount": 35, "citationCount": 82, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2004-07-19", "journal": {"name": "Proceedings - of the Third International Joint Conference on Autonomous Agents and Multiagent - Systems, 2004. AAMAS 2004.", "pages": "938-945"}, "authors": [{"authorId": - "1703124", "name": "B. Edmonds"}, {"authorId": "145315445", "name": "J. Bryson"}]}, - {"paperId": "2f7ee5850cf764a45bec2330dd63b6765bd83f86", "externalIds": {"CorpusId": - 35449153, "PubMed": "23451654"}, "url": "https://www.semanticscholar.org/paper/2f7ee5850cf764a45bec2330dd63b6765bd83f86", + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "1989-05-01", "journal": {"name": "", "pages": "355", "volume": ""}, "authors": + [{"authorId": "2078547235", "name": "A. K. Dewdney"}]}, {"paperId": "2f7ee5850cf764a45bec2330dd63b6765bd83f86", + "externalIds": {"CorpusId": 35449153, "PubMed": "23451654"}, "corpusId": 35449153, + "publicationVenue": {"id": "06de7ae4-40e1-481c-8386-a6824f011474", "name": + "Health Service Journal", "type": "journal", "alternate_names": ["The Health + service journal", "Health serv j", "Health Serv J"], "issn": "0952-2271", + "url": "https://www.hsj.co.uk/"}, "url": "https://www.semanticscholar.org/paper/2f7ee5850cf764a45bec2330dd63b6765bd83f86", "title": "On pathways.", "abstract": "In order to obtain information on NAD biosymhetic and rnetabotic pa\u5c71 ways of Eu8 \u2019ena , we investigated the effects of NAD precursors on growth and various enzyme activities in Eug @@ -32425,49 +36659,155 @@ interactions: increased about L3 fbld. We fbund that quinolinic acid was biosynthesized m aspa \u76bfic acid (Asp)and dihydroxyac \u2212", "venue": "Health Service Journal", "year": 2012, "referenceCount": 19, "citationCount": 59, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "The Health service journal", "pages": "\n Suppl - 2\n ", "volume": "122 6330"}, "authors": [{"authorId": "27551148", - "name": "J. Chamberlain"}]}, {"paperId": "c9a8d9628b0bf79684674480ee482120e43b289a", - "externalIds": {"MAG": "2114361208", "CorpusId": 62754366}, "url": "https://www.semanticscholar.org/paper/c9a8d9628b0bf79684674480ee482120e43b289a", - "title": "New Computational Paradigms: Changing Conceptions of What is Computable", - "abstract": "In recent years, classical computability has expanded beyond - its original scope to address issues related to computability and complexity - in algebra, analysis, and physics. The deep interconnection between \"computation\" - and \"proof\" has originated much of the most significant work in constructive - mathematics and mathematical logic of the last 70 years. Moreover, the increasingly - compelling necessity to deal with computability in the real world (such as - computing on continuous data, biological computing, and physical models) has - brought focus to new paradigms of computation that are based on biological - and physical models. These models address questions of efficiency in a radically - new way and even threaten to move the so-called Turing barrier, i.e. the line - between the decidable and the un-decidable. \n \nThis book examines new developments - in the theory and practice of computation from a mathematical perspective, - with topics ranging from classical computability to complexity, from biocomputing - to quantum computing. The book opens with an introduction by Andrew Hodges, - the Turing biographer, who analyzes the pioneering work that anticipated recent - developments concerning computations allegedly new paradigms. The remaining - material covers traditional topics in computability theory such as relative - computability, theory of numberings, and domain theory, in addition to topics - on the relationships between proof theory, computability, and complexity theory. - New paradigms of computation arising from biology and quantum physics are - also discussed, as well as the computability of the real numbers and its related - issues. \n \nThis book is suitable for researchers and graduate students in - mathematics, philosophy, and computer science with a special interest in logic - and foundational issues. Most useful to graduate students are the survey papers - on computable analysis and biological computing. Logicians and theoretical - physicists will also benefit from this book.", "venue": "", "year": 2007, - "referenceCount": 210, "citationCount": 110, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "The Health service journal", + "pages": "\n Suppl 2\n ", "volume": "122 6330"}, "authors": + [{"authorId": "27551148", "name": "J. Chamberlain"}]}, {"paperId": "41cf2723fd634f557b74129780d4a773043e4f54", + "externalIds": {"MAG": "2607187675", "DOI": "10.1007/S11071-017-3517-Y", "CorpusId": + 125627559}, "corpusId": 125627559, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/41cf2723fd634f557b74129780d4a773043e4f54", + "title": "Pattern formation in a system involving prey\u2013predation, competition + and commensalism", "abstract": null, "venue": "", "year": 2017, "referenceCount": + 64, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2017-04-12", + "journal": {"name": "Nonlinear Dynamics", "pages": "1309-1326", "volume": + "89"}, "authors": [{"authorId": "153079186", "name": "S. Ghorai"}, {"authorId": + "1927557", "name": "S. Poria"}]}, {"paperId": "1a21b609aad5ceea35d8052ded895e2536e5e1a6", + "externalIds": {"MAG": "39089149", "DBLP": "conf/aips/Rintanen04a", "CorpusId": + 395869}, "corpusId": 395869, "publicationVenue": {"id": "267934f4-c986-4571-bef8-d0eebc5e0e54", + "name": "International Conference on Automated Planning and Scheduling", "type": + "conference", "alternate_names": ["Int Conf Autom Plan Sched", "ICAPS"], "url": + "http://www.icaps-conference.org/"}, "url": "https://www.semanticscholar.org/paper/1a21b609aad5ceea35d8052ded895e2536e5e1a6", + "title": "Complexity of Planning with Partial Observability", "abstract": + "We show that for conditional planning with partial observability the problem + of testing existence of plans with success probability 1 is 2-EXP-complete. + This result completes the complexity picture for non-probabilistic propositional + planning. We also give new proofs for the EXP-hardness of conditional planning + with full observability and the EXPSPACE-hardness of conditional planning + without observability. The proofs demonstrate how lack of full observability + allows the encoding of exponential space Turing machines in the planning problem, + and how the necessity to have branching in plans corresponds to the move to + a complexity class defined in terms of alternation from the corresponding + deterministic complexity class. Lack of full observability necessitates the + use of beliefs states, the number of which is exponential in the number of + states, and alternation corresponds to the choices a branching plan can make.", + "venue": "International Conference on Automated Planning and Scheduling", + "year": 2004, "referenceCount": 33, "citationCount": 166, "influentialCitationCount": + 20, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2004-06-03", "journal": + {"pages": "345-354"}, "authors": [{"authorId": "1740808", "name": "J. Rintanen"}]}, + {"paperId": "eaa4e11b40f58449321ddd59e629e95657c51f46", "externalIds": {"DBLP": + "journals/jmis/AgarwalT90", "MAG": "1582751537", "DOI": "10.1080/07421222.1990.11517884", + "CorpusId": 13469196}, "corpusId": 13469196, "publicationVenue": {"id": "ede7e9cc-1657-47d5-bcf1-1ca3b056bf9d", + "name": "Journal of Management Information Systems", "type": "journal", "alternate_names": + ["J Manag Inf Syst"], "issn": "0742-1222", "url": "http://www.mesharpe.com/mall/results1.asp?ACR=MIS", + "alternate_urls": ["http://www.metapress.com/openurl.asp?genre=journal&issn=0742-1222", + "http://www.tandfonline.com/toc/mmis20/current", "http://www.tandfonline.com/loi/mmis", + "http://www.jstor.org/journals/07421222.html", "https://www.jstor.org/journal/jmanainfosyst", + "http://www.jmis-web.org/"]}, "url": "https://www.semanticscholar.org/paper/eaa4e11b40f58449321ddd59e629e95657c51f46", + "title": "Knowledge Acquisition Using Structured Interviewing: An Empirical + Investigation", "abstract": "The knowledge acquisition problem endures as + a bottleneck in the construction of expert system knowledge bases. Despite + the recent proliferation of techniques and the availability of more sophisticated + methods for this task, the interview technique continues to be widely used, + especially in business domains. This paper reports the results of an experiment + conducted to compare the unstructured knowledge acquisition interview with + a specific type of structured knowledge acqui- sition interview. Structure + for the interview was provided by a domain model of the business decision-making + activity that attempted to capture the subjective and quali- tative aspects + of decision making. Senior managers from industry served as the subjects in + the experiment The interview technique was evaluated along efficiency and + effectiveness dimensions. Results indicate improved performance with the struc- + tured interviewing method.", "venue": "Journal of Management Information Systems", + "year": 1990, "referenceCount": 53, "citationCount": 160, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1990-06-01", "journal": {"name": "J. + Manag. Inf. Syst.", "pages": "123-140", "volume": "7"}, "authors": [{"authorId": + "1700216", "name": "Ritu Agarwal"}, {"authorId": "1774001", "name": "M. Tanniru"}]}, + {"paperId": "98e68cfcfedd02ce01333f1acd853406964846bc", "externalIds": {"MAG": + "1488362833", "DBLP": "conf/icalp/YokoyamaAG08", "DOI": "10.1007/978-3-540-70583-3_22", + "CorpusId": 34200881}, "corpusId": 34200881, "publicationVenue": {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", + "name": "International Colloquium on Automata, Languages and Programming", + "type": "conference", "alternate_names": ["Int Conf Arab Lang Process", "International + Conference on Arabic Language Processing", "Int Colloq Autom Lang Program", + "ICALP"], "url": "http://www.eatcs.org/"}, "url": "https://www.semanticscholar.org/paper/98e68cfcfedd02ce01333f1acd853406964846bc", + "title": "Reversible Flowchart Languages and the Structured Reversible Program + Theorem", "abstract": null, "venue": "International Colloquium on Automata, + Languages and Programming", "year": 2008, "referenceCount": 22, "citationCount": + 40, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "2008-07-07", "journal": {"pages": "258-270"}, "authors": [{"authorId": "8151130", + "name": "T. Yokoyama"}, {"authorId": "1751103", "name": "Holger Bock Axelsen"}, + {"authorId": "1700006", "name": "R. Gl\u00fcck"}]}, {"paperId": "3c829f0b969e4d40af2d717018a65fc502945d21", + "externalIds": {"DBLP": "journals/mima/Kugel02", "MAG": "2144788786", "DOI": + "10.1023/A:1021150928258", "CorpusId": 36985281}, "corpusId": 36985281, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3c829f0b969e4d40af2d717018a65fc502945d21", + "title": "Computing Machines Can''t Be Intelligent (...and Turing Said So)", + "abstract": null, "venue": "Minds and Machines", "year": 2002, "referenceCount": + 45, "citationCount": 17, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2007-12-12", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "98630872", "name": "S. Cooper"}, {"authorId": "73742275", "name": "Benedikt - Lwe"}, {"authorId": "1809274", "name": "A. Sorbi"}]}, {"paperId": "482fd34e695f4efd9c7dcac306dd01d9c823c8cb", + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-11-08", "journal": {"name": "Minds and Machines", + "pages": "563-579", "volume": "12"}, "authors": [{"authorId": "3020115", "name": + "P. Kugel"}]}, {"paperId": "8bfd1bb6fcad8822075a72b2afc096180d5338d5", "externalIds": + {"MAG": "2045709417", "DOI": "10.5194/BG-11-309-2014", "CorpusId": 53558746}, + "corpusId": 53558746, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8bfd1bb6fcad8822075a72b2afc096180d5338d5", + "title": "Temperature response of denitrification and anammox reveals the + adaptation of microbial communities to in situ temperatures in permeable marine + sediments that span 50\u00b0 in latitude", "abstract": "Despite decades of + research on the physiology and biochemistry of nitrate/nitrite-respiring microorganisms, + little is known regarding their metabolic response to tem- perature, especially + under in situ conditions. The tempera- ture regulation of microbial communities + that mediate anam- mox and denitrification was investigated in near shore + per- meable sediments at polar, temperate, and subtropical sites with annual + mean temperatures ranging from 5 to 23 C. Total N2 production rates were determined + using the isotope pairing technique in intact core incubations under diffusive + and simulated advection conditions and ranged from 2 to 359 \u00b5mol N m + 2 d 1 . For the majority of sites studied, N 2 re- moval was 2-7 times more + rapid under simulated advective flow conditions. Anammox comprised 6-14 % + of total N 2 production at temperate and polar sites and was not detected + at the subtropical site. Potential rates of denitrification and anammox were + determined in anaerobic slurries in a tem- perature gradient block incubator + across a temperature range of 1 C to 42 C. The highest optimum temperature + (Topt) for denitrification was 36 C and was observed in subtropical sediments, + while the lowest Topt of 21 C was observed at the polar site. Seasonal variation + in the Topt was observed at the temperate site with values of 26 and 34 C + in winter and sum- mer, respectively. The Topt values for anammox were 9 and + 26 C at the polar and temperate sites, respectively. The re- sults demonstrate + adaptation of denitrifying communities to in situ temperatures in permeable + marine sediments across a wide range of temperatures, whereas marine anammox + bac- teria may be predominately psychrophilic to psychrotolerant. The adaptation + of microbial communities to in situ tempera- tures suggests that the relationship + between temperature and rates of N removal is highly dependent on community + struc- ture.", "venue": "", "year": 2013, "referenceCount": 62, "citationCount": + 51, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.biogeosciences.net/11/309/2014/bg-11-309-2014.pdf", "status": + "GOLD"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-09-03", "journal": {"name": + "Biogeosciences", "pages": "309-320", "volume": "11"}, "authors": [{"authorId": + "9945402", "name": "Andy Canion"}, {"authorId": "4147851", "name": "J. Kostka"}, + {"authorId": "4186429", "name": "T. Gihring"}, {"authorId": "3019468", "name": + "M. Huettel"}, {"authorId": "32268816", "name": "J. V. Beusekom"}, {"authorId": + "50201126", "name": "Hang Gao"}, {"authorId": "4885134", "name": "G. Lavik"}, + {"authorId": "5834725", "name": "M. Kuypers"}]}, {"paperId": "482fd34e695f4efd9c7dcac306dd01d9c823c8cb", "externalIds": {"ArXiv": "1309.0226", "MAG": "1985320488", "DOI": "10.1088/1478-3975/10/5/056009", - "CorpusId": 16398170, "PubMed": "24104059"}, "url": "https://www.semanticscholar.org/paper/482fd34e695f4efd9c7dcac306dd01d9c823c8cb", + "CorpusId": 16398170, "PubMed": "24104059"}, "corpusId": 16398170, "publicationVenue": + {"id": "dbc23552-b067-4548-b1b7-e6ce9f0ebcbe", "name": "Physical Biology", + "type": "journal", "alternate_names": ["Phys Biology"], "issn": "1478-3967", + "url": "http://iopscience.iop.org/1478-3975/", "alternate_urls": ["https://iopscience.iop.org/journal/1478-3975", + "http://iopscience.org/pb"]}, "url": "https://www.semanticscholar.org/paper/482fd34e695f4efd9c7dcac306dd01d9c823c8cb", "title": "Inter-dependent tissue growth and Turing patterning in a model for long bone development", "abstract": "The development of long bones requires a sophisticated spatial organization of cellular signalling, proliferation, @@ -32491,320 +36831,150 @@ interactions: interactions may thus constitute a general mechanism to generate Turing patterns in nature.", "venue": "Physical Biology", "year": 2013, "referenceCount": 77, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1309.0226", "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine", "Biology"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2013-09-01", "journal": {"name": "Physical Biology", "volume": "10"}, "authors": [{"authorId": "2554618", "name": "Simon Tanaka"}, {"authorId": "2962540", - "name": "D. Iber"}]}, {"paperId": "74be8bb9845decb5ac60d2233bda790b97426bca", - "externalIds": {"DBLP": "journals/corr/abs-0704-1043", "MAG": "3022109793", - "ArXiv": "0704.1043", "DOI": "10.1142/9789812770837_0006", "CorpusId": 59772}, - "url": "https://www.semanticscholar.org/paper/74be8bb9845decb5ac60d2233bda790b97426bca", - "title": "On the Kolmogorov-Chaitin Complexity for short sequences", "abstract": - "A drawback of Kolmogorov-Chaitin complexity (K) as a function from s to the - shortest program producing s is its noncomputability which limits its range - of applicability. Moreover, when strings are short, the dependence of K on - a particular universal Turing machine U can be arbitrary. In practice one - can approximate it by computable compression methods. However, such compression - methods do not always provide meaningful approximations--for strings shorter, - for example, than typical compiler lengths. In this paper we suggest an empirical - approach to overcome this difficulty and to obtain a stable definition of - the Kolmogorov-Chaitin complexity for short sequences. Additionally, a correlation - in terms of distribution frequencies was found across the output of two models - of abstract machines, namely unidimensional cellular automata and deterministic - Turing machine.", "venue": "ArXiv", "year": 2007, "referenceCount": 30, "citationCount": - 39, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-04-01", "journal": {"name": "ArXiv", - "volume": "abs/0704.1043"}, "authors": [{"authorId": "2027817702", "name": - "J. Delahaye"}, {"authorId": "66445647", "name": "H. Zenil"}]}, {"paperId": - "ca21749c0de3eb4d32147ec57484bde77b000404", "externalIds": {"MAG": "2101535368", - "DOI": "10.1051/MMNP/20138304", "CorpusId": 7885731}, "url": "https://www.semanticscholar.org/paper/ca21749c0de3eb4d32147ec57484bde77b000404", - "title": "Wave-like Solutions for Nonlocal Reaction-diffusion Equations: a - Toy Model", "abstract": "Traveling waves for the nonlocal Fisher Equation - can exhibit much more complex behaviours than for the usual Fisher equation. - A striking numerical observation is that a traveling wave with minimal speed - can connect a dynamically unstable steady state 0 to a Turing unstable steady - state 1, see [11]. This is proved for monotonic waves [1, 5] in the case where - the speed is far from minimal. Here we introduce a simplified nonlocal Fisher - equation for which we can build simple analytical traveling wave solutions - that exhibit various behaviours. These traveling waves, with minimal speed - or not, can connect monotonically 0 and 1, can connect these two states but - being non monotonic, and also they can connect 0 to a wavetrain around the - Turing unstable state 1. These exist in a regime where time dynamics converge - to another object observed in [2, 7]: a wave that connects 0 to a pulsating - wave around 1.", "venue": "", "year": 2013, "referenceCount": 13, "citationCount": - 39, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2013-06-11", "journal": {"name": "Mathematical Modelling - of Natural Phenomena", "pages": "33-41", "volume": "8"}, "authors": [{"authorId": - "2206925", "name": "Gr\u00e9goire Nadin"}, {"authorId": "144814492", "name": - "L. Rossi"}, {"authorId": "39049690", "name": "L. Ryzhik"}, {"authorId": "30823929", - "name": "B. Perthame"}]}, {"paperId": "786647bc87018212bda69c48ef40bc41a1efc561", - "externalIds": {"MAG": "2048333711", "DOI": "10.1002/smll.201001332", "CorpusId": - 33810193, "PubMed": "21213382"}, "url": "https://www.semanticscholar.org/paper/786647bc87018212bda69c48ef40bc41a1efc561", - "title": "Au25@SiO2: quantum clusters of gold embedded in silica.", "abstract": - "Quantum clusters (QC) or subnanoclusters of noble metals constitute a relatively - new class of nanomaterials with mole-cular cores composed of a few atoms. - Their electronic struc-ture and physicochemical properties are totally different - from metallic nanoparticles of the same element. They possess dis-crete electronic - energy levels and show \u2018molecule-like\u2019 optical transitions in absorption - and emission. Even though they are relatively new, several methods have been - developed to syn-thesize both aqueous", "venue": "Small", "year": 2011, "referenceCount": - 37, "citationCount": 56, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2011-01-17", "journal": {"name": "Small", "pages": "\n 204-8\n ", - "volume": "7 2"}, "authors": [{"authorId": "41190412", "name": "M. A. Habeeb - Muhammed"}, {"authorId": "145354446", "name": "T. Pradeep"}]}, {"paperId": - "c40a670d24fa44068d22d356eb496e5656ddad51", "externalIds": {"MAG": "2805622498", - "DBLP": "journals/jns/DucrotFM18", "DOI": "10.1007/s00332-018-9472-z", "CorpusId": - 52099997}, "url": "https://www.semanticscholar.org/paper/c40a670d24fa44068d22d356eb496e5656ddad51", - "title": "Turing and Turing\u2013Hopf Bifurcations for a Reaction Diffusion - Equation with Nonlocal Advection", "abstract": null, "venue": "Journal of - nonlinear science", "year": 2018, "referenceCount": 40, "citationCount": 18, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-05-30", "journal": {"name": "Journal of Nonlinear - Science", "pages": "1959-1997", "volume": "28"}, "authors": [{"authorId": - "144775987", "name": "A. Ducrot"}, {"authorId": "2175012", "name": "Xiaoming - Fu"}, {"authorId": "2538058", "name": "Pierre Magal"}]}, {"paperId": "1a3ec0662929d2b9eb9a555c64cf16a846f4fb9c", - "externalIds": {"DBLP": "conf/bmvc/GuadarramaDBS0017a", "MAG": "2953267715", - "ArXiv": "1705.07208", "DOI": "10.5244/C.31.112", "CorpusId": 25005910}, "url": - "https://www.semanticscholar.org/paper/1a3ec0662929d2b9eb9a555c64cf16a846f4fb9c", - "title": "PixColor: Pixel Recursive Colorization", "abstract": "We propose - a novel approach to automatically produce multiple colorized versions of a - grayscale image. Our method results from the observation that the task of - automated colorization is relatively easy given a low-resolution version of - the color image. We first train a conditional PixelCNN to generate a low resolution - color for a given grayscale image. Then, given the generated low-resolution - color image and the original grayscale image as inputs, we train a second - CNN to generate a high-resolution colorization of an image. We demonstrate - that our approach produces more diverse and plausible colorizations than existing - methods, as judged by human raters in a \"Visual Turing Test\".", "venue": - "British Machine Vision Conference", "year": 2017, "referenceCount": 42, "citationCount": - 84, "influentialCitationCount": 7, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-05-19", - "journal": {"name": "ArXiv", "volume": "abs/1705.07208"}, "authors": [{"authorId": - "1687120", "name": "S. Guadarrama"}, {"authorId": "144421715", "name": "Ryan - Dahl"}, {"authorId": "3426307", "name": "David Bieber"}, {"authorId": "144739074", - "name": "Mohammad Norouzi"}, {"authorId": "1789737", "name": "Jonathon Shlens"}, - {"authorId": "1702318", "name": "K. Murphy"}]}, {"paperId": "4ad85270adda971edb25d1035b3fe21293ea01a3", - "externalIds": {"MAG": "1557190042", "DOI": "10.1038/35002528", "CorpusId": - 4415368, "PubMed": "10706278"}, "url": "https://www.semanticscholar.org/paper/4ad85270adda971edb25d1035b3fe21293ea01a3", - "title": "Geometric quantum computation using nuclear magnetic resonance", - "abstract": null, "venue": "Nature", "year": 2000, "referenceCount": 20, "citationCount": - 486, "influentialCitationCount": 10, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-02-24", "journal": {"name": "Nature", "pages": "869-871", - "volume": "403"}, "authors": [{"authorId": "143956532", "name": "Jonathan - A. Jones"}, {"authorId": "3350529", "name": "V. Vedral"}, {"authorId": "1803313", - "name": "A. Ekert"}, {"authorId": "2066395", "name": "G. Castagnoli"}]}, {"paperId": - "ded36c092f2b59bdb03553ba57103525a5820e2b", "externalIds": {"MAG": "2067758534", - "DBLP": "journals/jilsa/PacelliA11", "DOI": "10.4236/jilsa.2011.32012", "CorpusId": - 14717278}, "url": "https://www.semanticscholar.org/paper/ded36c092f2b59bdb03553ba57103525a5820e2b", - "title": "An Artificial Neural Network Approach for Credit Risk Management", - "abstract": "The objective of the research is to analyze the ability of the - artificial neural network model developed to forecast the credit risk of a - panel of Italian manufacturing companies. In a theoretical point of view, - this paper introduces a litera-ture review on the application of artificial - intelligence systems for credit risk management. In an empirical point of - view, this research compares the architecture of the artificial neural network - model developed in this research to an-other one, built for a research conducted - in 2004 with a similar panel of companies, showing the differences between - the two neural network models.", "venue": "Journal of Intelligent Learning - Systems and Applications", "year": 2011, "referenceCount": 19, "citationCount": - 84, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2011-04-08", - "journal": {"name": "J. Intell. Learn. Syst. Appl.", "pages": "103-112", "volume": - "3"}, "authors": [{"authorId": "1805187", "name": "Vincenzo Pacelli"}, {"authorId": - "46818157", "name": "Michele Azzollini"}]}, {"paperId": "c9f69fc1bccde4550f54a4e317daaa27b4d4c03e", + "name": "D. Iber"}]}, {"paperId": "c9f69fc1bccde4550f54a4e317daaa27b4d4c03e", "externalIds": {"MAG": "1994669668", "ArXiv": "cond-mat/0603103", "DOI": "10.1038/nature05056", - "CorpusId": 4389730, "PubMed": "16915285"}, "url": "https://www.semanticscholar.org/paper/c9f69fc1bccde4550f54a4e317daaa27b4d4c03e", + "CorpusId": 4389730, "PubMed": "16915285"}, "corpusId": 4389730, "publicationVenue": + {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, + "url": "https://www.semanticscholar.org/paper/c9f69fc1bccde4550f54a4e317daaa27b4d4c03e", "title": "Spontaneous skyrmion ground states in magnetic metals", "abstract": null, "venue": "Nature", "year": 2006, "referenceCount": 41, "citationCount": - 1300, "influentialCitationCount": 8, "isOpenAccess": true, "fieldsOfStudy": + 1307, "influentialCitationCount": 8, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/cond-mat/0603103", "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2006-03-05", "journal": {"name": "Nature", "pages": "797-801", "volume": "442"}, "authors": [{"authorId": "91585573", "name": "U. R\u00f6\u00dfler"}, {"authorId": "145261336", "name": "A. N. Bogdanov"}, {"authorId": "3673143", - "name": "C. Pfleiderer"}]}, {"paperId": "e09001eaea98474d51468de0cc277c49246c8829", - "externalIds": {"MAG": "2999275892", "ArXiv": "quant-ph/9809038", "DOI": "10.1007/0-306-47097-7_32", - "CorpusId": 14868299}, "url": "https://www.semanticscholar.org/paper/e09001eaea98474d51468de0cc277c49246c8829", - "title": "Quantum Turing Machines: Local Transition, Preparation, Measurement, - and Halting", "abstract": null, "venue": "", "year": 1998, "referenceCount": - 20, "citationCount": 14, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1998-09-14", "journal": {"name": "", "pages": "241-248", - "volume": ""}, "authors": [{"authorId": "1744207", "name": "M. Ozawa"}]}, - {"paperId": "200edf4be8d03939c02b42c6fe927632a7d67c07", "externalIds": {"MAG": - "2136043247", "DOI": "10.1177/002199837801200201", "CorpusId": 138774427}, - "url": "https://www.semanticscholar.org/paper/200edf4be8d03939c02b42c6fe927632a7d67c07", - "title": "Langmuir-Type Model for Anomalous Moisture Diffusion In Composite - Resins", "abstract": "Considerable evidence has recently been presented for - anomalous mois ture diffusion in epoxy matrix composites. In an earlier paper - we noted that there is no a priori reason why moisture should obey simple - diffusion theory rather than Kirkwood''s (linear) generalization of the Boltzmann - transport equation. With the intent of keeping the analytical aspects of the - moisture diffusion problem as simple as possible, we here present a slightly - generalized but linear model which involves sources and sinks of diffusing - water molecules. With respect to diffusive characteristics, our model is related - to the simplest form of neutron transport theory. With respect to bound and - unbound particles it is similar to the Langmuir theory of ad sorption isotherms, - although we here assume bulk absorption in the resin with no implication that - surfaces are involved. An approximation to our exact solution of the coupled - linear differential equations is used to fit mildly anomalous moisture uptake - curves for 5208 resin exposed to several rclative humidities for two years. - The fact that the same parameters give equally good fits to the data at all - humidities suggests that the absorption anomaly does not result from nonlinear - (e.g. concentration-dependent) effects.", "venue": "", "year": 1978, "referenceCount": - 16, "citationCount": 468, "influentialCitationCount": 26, "isOpenAccess": - false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1978-07-01", "journal": {"name": "Journal of Composite Materials", "pages": - "118 - 131", "volume": "12"}, "authors": [{"authorId": "116184841", "name": - "H. G. Carter"}, {"authorId": "49021391", "name": "K. G. Kibler"}]}, {"paperId": - "eaa4e11b40f58449321ddd59e629e95657c51f46", "externalIds": {"DBLP": "journals/jmis/AgarwalT90", - "MAG": "1582751537", "DOI": "10.1080/07421222.1990.11517884", "CorpusId": - 13469196}, "url": "https://www.semanticscholar.org/paper/eaa4e11b40f58449321ddd59e629e95657c51f46", - "title": "Knowledge Acquisition Using Structured Interviewing: An Empirical - Investigation", "abstract": "The knowledge acquisition problem endures as - a bottleneck in the construction of expert system knowledge bases. Despite - the recent proliferation of techniques and the availability of more sophisticated - methods for this task, the interview technique continues to be widely used, - especially in business domains. This paper reports the results of an experiment - conducted to compare the unstructured knowledge acquisition interview with - a specific type of structured knowledge acqui- sition interview. Structure - for the interview was provided by a domain model of the business decision-making - activity that attempted to capture the subjective and quali- tative aspects - of decision making. Senior managers from industry served as the subjects in - the experiment The interview technique was evaluated along efficiency and - effectiveness dimensions. Results indicate improved performance with the struc- - tured interviewing method.", "venue": "Journal of Management Information Systems", - "year": 1990, "referenceCount": 53, "citationCount": 160, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1990-06-01", "journal": {"name": "J. Manag. Inf. Syst.", "pages": "123-140", - "volume": "7"}, "authors": [{"authorId": "1700216", "name": "Ritu Agarwal"}, - {"authorId": "1774001", "name": "M. Tanniru"}]}, {"paperId": "4eb0814f5d6f106183e204e500abc48a856efdfb", - "externalIds": {"MAG": "2506001477", "DBLP": "books/cu/p/MardiaC16", "DOI": - "10.1017/CBO9780511863196.008", "CorpusId": 901168}, "url": "https://www.semanticscholar.org/paper/4eb0814f5d6f106183e204e500abc48a856efdfb", - "title": "Alan Turing and Enigmatic Statistics", "abstract": "Caros leitores, - gostaria de dar boas vindas ao Victor Fossaluza (UFSCar) e tamb\u00e9m agradec\u00ea-lo - por ter aceito a tarefa de ser o editor deste boletim para o bi\u00eanio 2013-2014. - Ele, em seu primeiro boletim, nos traz um excelente texto de K. V. Mardia - e S. B. Cooper sobre o trabalho de Alan Turing. Sendo assim, esperamos muito - mais dele para os pr\u00f3ximos boletins! Gostaria tamb\u00e9m de inform\u00e1-los - que o volume com os anais do EBEB 2012 est\u00e1 dispo\u0144\u0131vel em XI - Brazilian Meeting on Bayesian Statistics (2012). Editores: J. M. Stern, M. - de S. Lauretto, A. Polpo and M. A. Diniz. AIP Conference Proceedings, volume - 1490, editora AIP. http://scitation.aip.org/dbt/dbt.jsp?KEY=APCPC S&Volume=1490&Issue=1. - Boa leitura!", "venue": "The Once and Future Turing", "year": 2016, "referenceCount": - 24, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"pages": "78-89"}, "authors": [{"authorId": "3209910", "name": - "K. Mardia"}, {"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": - "8bfd1bb6fcad8822075a72b2afc096180d5338d5", "externalIds": {"MAG": "2045709417", - "DOI": "10.5194/BG-11-309-2014", "CorpusId": 53558746}, "url": "https://www.semanticscholar.org/paper/8bfd1bb6fcad8822075a72b2afc096180d5338d5", - "title": "Temperature response of denitrification and anammox reveals the - adaptation of microbial communities to in situ temperatures in permeable marine - sediments that span 50\u00b0 in latitude", "abstract": "Despite decades of - research on the physiology and biochemistry of nitrate/nitrite-respiring microorganisms, - little is known regarding their metabolic response to tem- perature, especially - under in situ conditions. The tempera- ture regulation of microbial communities - that mediate anam- mox and denitrification was investigated in near shore - per- meable sediments at polar, temperate, and subtropical sites with annual - mean temperatures ranging from 5 to 23 C. Total N2 production rates were determined - using the isotope pairing technique in intact core incubations under diffusive - and simulated advection conditions and ranged from 2 to 359 \u00b5mol N m - 2 d 1 . For the majority of sites studied, N 2 re- moval was 2-7 times more - rapid under simulated advective flow conditions. Anammox comprised 6-14 % - of total N 2 production at temperate and polar sites and was not detected - at the subtropical site. Potential rates of denitrification and anammox were - determined in anaerobic slurries in a tem- perature gradient block incubator - across a temperature range of 1 C to 42 C. The highest optimum temperature - (Topt) for denitrification was 36 C and was observed in subtropical sediments, - while the lowest Topt of 21 C was observed at the polar site. Seasonal variation - in the Topt was observed at the temperate site with values of 26 and 34 C - in winter and sum- mer, respectively. The Topt values for anammox were 9 and - 26 C at the polar and temperate sites, respectively. The re- sults demonstrate - adaptation of denitrifying communities to in situ temperatures in permeable - marine sediments across a wide range of temperatures, whereas marine anammox - bac- teria may be predominately psychrophilic to psychrotolerant. The adaptation - of microbial communities to in situ tempera- tures suggests that the relationship - between temperature and rates of N removal is highly dependent on community - struc- ture.", "venue": "", "year": 2013, "referenceCount": 62, "citationCount": - 51, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2013-09-03", "journal": {"name": "Biogeosciences", - "pages": "309-320", "volume": "11"}, "authors": [{"authorId": "9945402", "name": - "Andy Canion"}, {"authorId": "4147851", "name": "J. Kostka"}, {"authorId": - "4186429", "name": "T. Gihring"}, {"authorId": "3019468", "name": "M. Huettel"}, - {"authorId": "32268816", "name": "J. V. Beusekom"}, {"authorId": "50201126", - "name": "Hang Gao"}, {"authorId": "4885134", "name": "G. Lavik"}, {"authorId": - "5834725", "name": "M. Kuypers"}]}, {"paperId": "84f7b2308851b042233e98214a742fd690f1539e", - "externalIds": {"MAG": "2124342905", "PubMedCentral": "3212571", "DOI": "10.1371/journal.pone.0027591", - "CorpusId": 1320774, "PubMed": "22096599"}, "url": "https://www.semanticscholar.org/paper/84f7b2308851b042233e98214a742fd690f1539e", - "title": "A Non-Verbal Turing Test: Differentiating Mind from Machine in Gaze-Based - Social Interaction", "abstract": "In social interaction, gaze behavior provides - important signals that have a significant impact on our perception of others. - Previous investigations, however, have relied on paradigms in which participants - are passive observers of other persons\u2019 gazes and do not adjust their - gaze behavior as is the case in real-life social encounters. We used an interactive - eye-tracking paradigm that allows participants to interact with an anthropomorphic - virtual character whose gaze behavior is responsive to where the participant - looks on the stimulus screen in real time. The character\u2019s gaze reactions - were systematically varied along a continuum from a maximal probability of - gaze aversion to a maximal probability of gaze-following during brief interactions, - thereby varying contingency and congruency of the reactions. We investigated - how these variations influenced whether participants believed that the character - was controlled by another person (i.e., a confederate) or a computer program. - In a series of experiments, the human confederate was either introduced as - na\u00efve to the task, cooperative, or competitive. Results demonstrate that - the ascription of humanness increases with higher congruency of gaze reactions - when participants are interacting with a na\u00efve partner. In contrast, - humanness ascription is driven by the degree of contingency irrespective of - congruency when the confederate was introduced as cooperative. Conversely, - during interaction with a competitive confederate, judgments were neither - based on congruency nor on contingency. These results offer important insights - into what renders the experience of an interaction truly social: Humans appear - to have a default expectation of reciprocation that can be influenced drastically - by the presumed disposition of the interactor to either cooperate or compete.", - "venue": "PLoS ONE", "year": 2011, "referenceCount": 57, "citationCount": - 75, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": + "name": "C. Pfleiderer"}]}, {"paperId": "b5617b104860dc5b679a999faa4da8fd9f45976d", + "externalIds": {"MAG": "2044599148", "DBLP": "journals/jsyml/JockuschS94", + "DOI": "10.2307/2275695", "CorpusId": 15291501}, "corpusId": 15291501, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/b5617b104860dc5b679a999faa4da8fd9f45976d", + "title": "Boolean algebras, Stone spaces, and the iterated Turing jump", "abstract": + "Abstract We show, roughly speaking, that it requires \u03c9 iterations of + the Turing jump to decode nontrivial information from Boolean algebras in + an isomorphism invariant fashion. More precisely, if \u03b1 is a recursive + ordinal, is a countable structure with finite signature, and d is a degree, + we say that has \u03b1th-jump degreed if d is the least degree which is the + \u03b1th jump of some degree c such there is an isomorphic copy of with universe + \u03c9 in which the functions and relations have degree at most c. We show + that every degree d \u2265 0(\u03c9) is the \u03c9th jump degree of a Boolean + algebra, but that for n < \u03c9 no Boolean algebra has nth-jump degree d + < 0(n). The former result follows easily from work of L. Feiner. The proof + of the latter result uses the forcing methods of J. Knight together with an + analysis of various equivalences between Boolean algebras based on a study + of their Stone spaces. A byproduct of the proof is a method for constructing + Stone spaces with various prescribed properties.", "venue": "Journal of Symbolic + Logic (JSL)", "year": 1994, "referenceCount": 30, "citationCount": 32, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-12-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "1121 - 1138", "volume": "59"}, "authors": [{"authorId": + "1888089", "name": "C. Jockusch"}, {"authorId": "1760293", "name": "R. Soare"}]}, + {"paperId": "4d3d8f9076197ff9d9433acf797a439b799f8fff", "externalIds": {"MAG": + "1599458628", "DOI": "10.1007/978-3-642-51863-8", "CorpusId": 3081508}, "corpusId": + 3081508, "publicationVenue": {"id": "2d566087-1410-4b6d-bbde-f814b512ba0f", + "name": "Ecological Studies", "type": "journal", "alternate_names": ["Ecol + stud", "Ecological studies", "Ecol Stud"], "issn": "0070-8356", "url": "http://www.springer.com/west/home/life+sci/plant+sciences?SGWID=4-10038-69-173621746-0"}, + "url": "https://www.semanticscholar.org/paper/4d3d8f9076197ff9d9433acf797a439b799f8fff", + "title": "Phenology and Seasonality Modeling", "abstract": null, "venue": + "Ecological Studies", "year": 1974, "referenceCount": 0, "citationCount": + 476, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3283961", + "name": "H. Lieth"}]}, {"paperId": "f73b4aaf5f0dbad4a3803488b506b1faef56e9fc", + "externalIds": {"MAG": "2241837130", "DBLP": "conf/sacrypt/JouxM03", "DOI": + "10.1007/978-3-540-24654-1_14", "CorpusId": 9392566}, "corpusId": 9392566, + "publicationVenue": {"id": "d80d58be-58fc-4181-a397-5ac6fd976a47", "name": + "ACM Symposium on Applied Computing", "type": "conference", "alternate_names": + ["Sel Area Cryptogr", "Int Conf Sel area Cryptogr", "International Conference + on Selected areas in Cryptography", "ACM Symp Appl Comput", "Selected Areas + in Cryptography", "Symposium on Applied Computing", "SAC", "Symp Appl Comput"], + "url": "https://www.acm.org/publications", "alternate_urls": ["http://sacworkshop.org/"]}, + "url": "https://www.semanticscholar.org/paper/f73b4aaf5f0dbad4a3803488b506b1faef56e9fc", + "title": "A Chosen IV Attack Against Turing", "abstract": null, "venue": "ACM + Symposium on Applied Computing", "year": 2003, "referenceCount": 19, "citationCount": + 19, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007/978-3-540-24654-1_14.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-08-14", "journal": {"pages": "194-207"}, "authors": + [{"authorId": "1759476", "name": "A. Joux"}, {"authorId": "40490371", "name": + "F. Muller"}]}, {"paperId": "b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "externalIds": + {"DBLP": "journals/cnsns/SongZP16", "MAG": "1929947366", "DOI": "10.1016/J.CNSNS.2015.10.002", + "CorpusId": 119973623}, "corpusId": 119973623, "publicationVenue": {"id": + "cbeeb5cb-fa82-4ae6-875b-04adb3b61f48", "name": "Communications in nonlinear + science & numerical simulation", "type": "journal", "alternate_names": ["Communications + in Nonlinear Science and Numerical Simulation", "Commun Nonlinear Sci Numer + Simul", "Commun nonlinear sci numer simul"], "issn": "1007-5704", "url": + "http://www.elsevier.com/locate/cnsns"}, "url": "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", + "title": "Turing-Hopf bifurcation in the reaction-diffusion equations and + its applications", "abstract": null, "venue": "Communications in nonlinear + science & numerical simulation", "year": 2016, "referenceCount": 37, "citationCount": + 85, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-01", "journal": + {"name": "Commun. Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": + "33"}, "authors": [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": + "1742870", "name": "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong + Peng"}]}, {"paperId": "6e2a47ce25cec4c90f19a929e94e6ec405b4d652", "externalIds": + {"MAG": "2023266047", "DOI": "10.1021/J100194A038", "CorpusId": 95249223}, + "corpusId": 95249223, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e2a47ce25cec4c90f19a929e94e6ec405b4d652", + "title": "Effect of Turing pattern indicators on CIMA oscillators", "abstract": + "Past experiments on Turing patterns have all been conducted using the chloriteiodidemalonic + acid (CIMA) reaction with Thiodene from Prolabo as an indicator. In this work + two other indicators have been examined and found to yield Turing patterns + similar to those obtained with Thiodene: soluble starch and poly(vinyl alcohol) + (PVA). The present work shows that Thiodene is not simply a soluble starch, + as previously assumed, but is probably made by mixing about 7% starch with + 93% molten urea", "venue": "", "year": 1992, "referenceCount": 0, "citationCount": + 21, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "The + Journal of Physical Chemistry", "pages": "6302-6307", "volume": "96"}, "authors": + [{"authorId": "5289890", "name": "Z. Noszticzius"}, {"authorId": "143803550", + "name": "Q. Ouyang"}, {"authorId": "38890112", "name": "W. Mccormick"}, {"authorId": + "2421446", "name": "H. Swinney"}]}, {"paperId": "4ad85270adda971edb25d1035b3fe21293ea01a3", + "externalIds": {"MAG": "1557190042", "DOI": "10.1038/35002528", "CorpusId": + 4415368, "PubMed": "10706278"}, "corpusId": 4415368, "publicationVenue": {"id": + "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, + "url": "https://www.semanticscholar.org/paper/4ad85270adda971edb25d1035b3fe21293ea01a3", + "title": "Geometric quantum computation using nuclear magnetic resonance", + "abstract": null, "venue": "Nature", "year": 2000, "referenceCount": 20, "citationCount": + 494, "influentialCitationCount": 10, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/quant-ph/9910052", "status": "GREEN"}, "fieldsOfStudy": + ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-11-09", "journal": {"name": "PLoS ONE", "volume": - "6"}, "authors": [{"authorId": "48230544", "name": "U. Pfeiffer"}, {"authorId": - "1918177", "name": "Bert Timmermans"}, {"authorId": "2487649", "name": "G. - Bente"}, {"authorId": "2051580", "name": "K. Vogeley"}, {"authorId": "2127424", - "name": "L. Schilbach"}]}, {"paperId": "86e9ad0e271be6aff95ffb2364676c57af83e640", - "externalIds": {"MAG": "1977039458", "DOI": "10.1090/S0002-9947-1983-0694377-4", - "CorpusId": 35270437}, "url": "https://www.semanticscholar.org/paper/86e9ad0e271be6aff95ffb2364676c57af83e640", + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-02-24", "journal": {"name": "Nature", "pages": "869-871", + "volume": "403"}, "authors": [{"authorId": "143956532", "name": "Jonathan + A. Jones"}, {"authorId": "3350529", "name": "V. Vedral"}, {"authorId": "1803313", + "name": "A. Ekert"}, {"authorId": "2066395", "name": "G. Castagnoli"}]}, {"paperId": + "86e9ad0e271be6aff95ffb2364676c57af83e640", "externalIds": {"MAG": "1977039458", + "DOI": "10.1090/S0002-9947-1983-0694377-4", "CorpusId": 35270437}, "corpusId": + 35270437, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/86e9ad0e271be6aff95ffb2364676c57af83e640", "title": "Independence results on the global structure of the Turing degrees", "abstract": "From CON(ZFC) we obtain: 1. CON(ZFC + 2\" is arbitrarily large + there is a locally finite upper semilattice of size W2 which cannot be embedded @@ -32832,77 +37002,221 @@ interactions: conjecture. Received by the editors March 30, 1982. 1980 Mathematics Subject Classification. Primary 03D30.", "venue": "", "year": 1983, "referenceCount": 10, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1983-02-01", "journal": {"name": - "Transactions of the American Mathematical Society", "pages": "579-588", "volume": - "277"}, "authors": [{"authorId": "1771978", "name": "M. Groszek"}, {"authorId": - "2867082", "name": "T. Slaman"}]}, {"paperId": "96a886975b3227e8bc66eacdded39af930c32ff5", - "externalIds": {"MAG": "2053099695", "DOI": "10.1090/S0002-9939-1954-0063995-6", - "CorpusId": 122203431}, "url": "https://www.semanticscholar.org/paper/96a886975b3227e8bc66eacdded39af930c32ff5", - "title": "A theorem on hypersimple sets", "abstract": "1. S. C. Kleene, Introduction - to metamathematics, New York, Amsterdam, and Groningen, 1952. 2. R. M. Robinson, - Review, J. Symbolic Logic vol. 16 (1951) p. 282. 3. P. C. Rosenbloom, An elementary - constructive proof of the fundamental theorem of algebra, Amer. Math. Monthly - vol. 52 (1945) pp. 562-570. 4. E. Specker, Nicht Konstructiv beweisbare Sdtze - der Analysis, J. Symbolic Logic vol. 14 (1949) pp. 145-158. 5. A. M. Turing, - On computable numbers, with an application to the Entscheidungsproblem, Proc. - London Math. Soc. (2) vol. 42 (1936-37) pp. 230-265.", "venue": "", "year": - 1954, "referenceCount": 3, "citationCount": 82, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + "openAccessPdf": {"url": "https://www.ams.org/tran/1983-277-02/S0002-9947-1983-0694377-4/S0002-9947-1983-0694377-4.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1954-05-01", "journal": {"name": "", "pages": "791-796", "volume": "5"}, - "authors": [{"authorId": "143692355", "name": "J. Dekker"}]}, {"paperId": - "cb54c97240e6e014d5ffe1f304c820e13e4e99ca", "externalIds": {"DBLP": "conf/colt/Ko90", - "MAG": "2086059606", "DOI": "10.1137/0220059", "CorpusId": 22566385}, "url": - "https://www.semanticscholar.org/paper/cb54c97240e6e014d5ffe1f304c820e13e4e99ca", - "title": "On the complexity of learning minimum time-bounded Turing machines", - "abstract": "The following problems about time-bounded program-size complexity - are studied: (1) for a given string x, a size bound s, and a time bound t, - whether there exists a Turing machine of size less than or equal to s that - prints x in t moves; (2) for two given finite sets Y and Z of strings, a size - bound s, and a time bound t, whether there exists a Turing machine of size - less than or equal to s that operates in time t and accepts all $y \\in Y$ - and rejects all $z \\in Z$. These problems are fundamental in complexity theory - and feasible learning theory. The complexity of these problems is apparently - between P and $NP$, but appears very difficult to classify precisely. These - problems are attacked by the approach of relativization. It is shown that - for certain variations of the problems, they could be either polynomial-time - computable or not polynomial-time computable, depending on different oracles. - Furthermore, there are oracles relative to which they are not complete for - $NP$ under the polynomial-time Turing red...", "venue": "Annual Conference - Computational Learning Theory", "year": 1990, "referenceCount": 22, "citationCount": - 30, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1983-02-01", + "journal": {"name": "Transactions of the American Mathematical Society", "pages": + "579-588", "volume": "277"}, "authors": [{"authorId": "1771978", "name": "M. + Groszek"}, {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": "97539179984e12cf1748d8f616d94bd796215f73", + "externalIds": {"MAG": "1991947259", "DOI": "10.1063/1.4743983", "CorpusId": + 20079731, "PubMed": "22920103"}, "corpusId": 20079731, "publicationVenue": + {"id": "1bb63b2b-3f57-4387-aaf6-b2a33dfcdcc5", "name": "Journal of Chemical + Physics", "type": "journal", "alternate_names": ["J Chem Phys"], "issn": "0021-9606", + "url": "http://jcp.aip.org/", "alternate_urls": ["https://aip.scitation.org/journal/jcp"]}, + "url": "https://www.semanticscholar.org/paper/97539179984e12cf1748d8f616d94bd796215f73", + "title": "Particle dynamics simulations of Turing patterns.", "abstract": + "The direct simulation Monte Carlo method is used to reproduce Turing patterns + at the microscopic level in reaction-diffusion systems. In order to satisfy + the basic condition for the development of such a spatial structure, we propose + a model involving a solvent, which allows for disparate diffusivities of individual + reactive species. One-dimensional structures are simulated in systems of various + lengths. Simulation results agree with the macroscopic predictions obtained + by integration of the reaction-diffusion equations. Additional effects due + to internal fluctuations are observed, such as temporal transitions between + structures of different wavelengths in a confined system. For a structure + developing behind a propagating wave front, the fluctuations suppress the + induction period and accelerate the formation of the Turing pattern. These + results support the ability of reaction-diffusion models to robustly reproduce + axial segmentation including the formation of early vertebrae or somites in + noisy biological environments.", "venue": "Journal of Chemical Physics", "year": + 2012, "referenceCount": 42, "citationCount": 21, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-08-16", "journal": {"name": "The Journal of chemical physics", "pages": + "\n 074107\n ", "volume": "137 7"}, "authors": [{"authorId": + "2050668979", "name": "P. Dziekan"}, {"authorId": "2348493", "name": "A. Lemarchand"}, + {"authorId": "3023174", "name": "B. Nowakowski"}]}, {"paperId": "789e3fc8d7942c9f23f45d91dcddfc3f43f43449", + "externalIds": {"MAG": "2734490910", "DBLP": "journals/aim/Lenat16", "DOI": + "10.1609/AIMAG.V37I1.2644", "CorpusId": 39995322}, "corpusId": 39995322, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/789e3fc8d7942c9f23f45d91dcddfc3f43f43449", + "title": "WWTS (What Would Turing Say?)", "abstract": "Turing\u2019s Imitation + Game was a brilliant early proposed test of machine intelligence \u2014 one + that is still compelling, today, despite the fact that in the hindsight of + all that we\u2019ve learned in the intervening 65 years we can see the flaws + in his original test. And our field needs a good \u201cIs it AI yet?\u201d + test more than ever, today, with so many of us spending our research time + looking under the \u201cshallow processing of big data\u201d lamppost. If + Turing were alive today, what sort of test might he propose?", "venue": "AI + Mag.", "year": 2016, "referenceCount": 8, "citationCount": 15, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://aaai.org/ojs/index.php/aimagazine/article/download/2644/2540", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1990-07-01", "journal": {"name": "SIAM J. Comput.", "pages": - "962-986", "volume": "20"}, "authors": [{"authorId": "1704334", "name": "K. - Ko"}]}, {"paperId": "83520632a53df4e451d59771ed052a32566dcab4", "externalIds": - {"DBLP": "journals/fuin/Durand-Lose06", "MAG": "1838192621", "CorpusId": 14870483}, - "url": "https://www.semanticscholar.org/paper/83520632a53df4e451d59771ed052a32566dcab4", - "title": "Abstract Geometrical Computation 1: Embedding Black Hole Computations - with Rational Numbers", "abstract": "The Black hole model of computation provides - super-Turing computing power since it offers the possibility to decide in - finite (observer''s) time any recursively enumerable (R.E.) problem. In this - paper, we provide a geometric model of computation, conservative abstract - geometrical computation, that, although being based on rational numbers (and - not real numbers), has the same property: it can simulate any Turing machine - and can decide any R.E. problem through the creation of an accumulation. Finitely - many signals can leave any accumulation, and it can be known whether anything - leaves. This corresponds to a black hole effect.", "venue": "Fundamenta Informaticae", - "year": 2006, "referenceCount": 33, "citationCount": 28, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-12-01", "journal": {"name": "Fundam. Informaticae", "pages": "491-510", - "volume": "74"}, "authors": [{"authorId": "1387881959", "name": "J. Durand-Lose"}]}, - {"paperId": "f6d20121f0daa6d0e04cbf9df73eabafd642a933", "externalIds": {"MAG": - "1924972752", "DOI": "10.1090/S0002-9947-98-01800-5", "CorpusId": 15431855}, - "url": "https://www.semanticscholar.org/paper/f6d20121f0daa6d0e04cbf9df73eabafd642a933", + "publicationDate": "2016-04-13", "journal": {"name": "AI Mag.", "pages": "97-101", + "volume": "37"}, "authors": [{"authorId": "1704635", "name": "D. Lenat"}]}, + {"paperId": "6dd3b0c56f738564167e3509b097124bde4b4f64", "externalIds": {"DBLP": + "conf/pkdd/CaoZZY17", "ArXiv": "1702.06674", "MAG": "2590274298", "DOI": "10.1007/978-3-319-71249-9_10", + "CorpusId": 12185715}, "corpusId": 12185715, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6dd3b0c56f738564167e3509b097124bde4b4f64", + "title": "Unsupervised Diverse Colorization via Generative Adversarial Networks", + "abstract": null, "venue": "ECML/PKDD", "year": 2017, "referenceCount": 42, + "citationCount": 157, "influentialCitationCount": 14, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1702.06674", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2017-02-22", "journal": {"name": "ArXiv", "volume": "abs/1702.06674"}, "authors": + [{"authorId": "39746867", "name": "Yun Cao"}, {"authorId": "145385776", "name": + "Zhiming Zhou"}, {"authorId": "2108309275", "name": "Weinan Zhang"}, {"authorId": + "1811427", "name": "Yong Yu"}]}, {"paperId": "c130ad9c0d99d9a0f0ec2b633c43dc3446dd29b6", + "externalIds": {"MAG": "147821881", "CorpusId": 58819055}, "corpusId": 58819055, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c130ad9c0d99d9a0f0ec2b633c43dc3446dd29b6", + "title": "Rethinking Cognitive Computation: Turing and the Science of the + Mind", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": + 36, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "2005-12-17", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "48060981", "name": "A. Wells"}]}, {"paperId": "fb1ce1dd44d1911a611304bf705869112153040a", + "externalIds": {"CorpusId": 6135916}, "corpusId": 6135916, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fb1ce1dd44d1911a611304bf705869112153040a", + "title": "Feature Selection Extraction and Construction", "abstract": "Feature + selection is a process that chooses a subset of features from the original + features so that the fea ture space is optimally reduced according to a certain + criterion Feature extraction construction is a process through which a set + of new features is created They are used either in isolation or in combination + All attempt to improve performance such as estimated ac curacy visualization + and comprehensibility of learned knowledge Basic approaches to these three + are re viewed giving pointers to references for further stud ies", "venue": + "", "year": 2002, "referenceCount": 35, "citationCount": 85, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1748072", + "name": "H. Motoda"}, {"authorId": "2146397025", "name": "Huan Liu"}]}, {"paperId": + "12029240f3c3b34f6ef29e72039b0491cf73f0e2", "externalIds": {"DBLP": "conf/atal/EdmondsB04", + "MAG": "2143737517", "DOI": "10.1109/AAMAS.2004.265", "CorpusId": 9043444}, + "corpusId": 9043444, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/12029240f3c3b34f6ef29e72039b0491cf73f0e2", + "title": "The insufficiency of formal design methods - the necessity of an + experimental approach for the understanding and control of complex MAS", "abstract": + "We highlight the limitations of formal methods by exhibiting two results + in recursive function theory: that there is no effective means of finding + a program that satisfies a given formal specification; or checking that a + program meets a specification. We exhibit a simple MAS which has all the power + of a Turing machine. We argue that any pure design methodology will face insurmountable + difficulties in today\u00fds open and complex MAS. We recommend instead a + methodology based on experimental method \u00bf scientific foundations for + MAS construction and control.", "venue": "Proceedings of the Third International + Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS + 2004.", "year": 2004, "referenceCount": 35, "citationCount": 82, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2004-07-19", + "journal": {"name": "Proceedings of the Third International Joint Conference + on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004.", "pages": + "938-945"}, "authors": [{"authorId": "1703124", "name": "B. Edmonds"}, {"authorId": + "145315445", "name": "J. Bryson"}]}, {"paperId": "bcc0c70a18ad8c2d25998549a8ef817bbbb7c2ee", + "externalIds": {"ArXiv": "quant-ph/0210187", "MAG": "1785637000", "CorpusId": + 118921972}, "corpusId": 118921972, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bcc0c70a18ad8c2d25998549a8ef817bbbb7c2ee", + "title": "A 2 rebit gate universal for quantum computing", "abstract": "We + show, within the circuit model, how any quantum computation can be efficiently + performed using states with only real amplitudes (a result known within the + Quantum Turing Machine model). This allows us to identify a 2-qubit (in fact + 2-rebit) gate which is universal for quantum computing, although it cannot + be used to perform arbitrary unitary transformations.", "venue": "", "year": + 2002, "referenceCount": 4, "citationCount": 45, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-10-27", "journal": {"name": + "arXiv: Quantum Physics", "volume": ""}, "authors": [{"authorId": "145852716", + "name": "T. Rudolph"}, {"authorId": "1728234", "name": "Lov K. Grover"}]}, + {"paperId": "d078675e6290d25160fa9060b89f85d181a9b9c1", "externalIds": {"MAG": + "2898988937", "DOI": "10.1007/S12008-018-0509-1", "CorpusId": 114119243}, + "corpusId": 114119243, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d078675e6290d25160fa9060b89f85d181a9b9c1", + "title": "Advances on mechanics, design engineering and manufacturing", "abstract": + null, "venue": "International Journal on Interactive Design and Manufacturing + (IJIDeM)", "year": 2018, "referenceCount": 18, "citationCount": 29, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-319-45781-9%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Engineering"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Engineering", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-09-18", "journal": {"name": + "International Journal on Interactive Design and Manufacturing (IJIDeM)", + "pages": "1155-1156", "volume": "12"}, "authors": [{"authorId": "71256452", + "name": "G. Sequenzia"}, {"authorId": "34441732", "name": "S. Rizzuti"}, {"authorId": + "49534453", "name": "M. Martorelli"}, {"authorId": "38905110", "name": "T. + Ingrassia"}]}, {"paperId": "21ca1ae3b6e09cdb1920a243c5fa16a694b9ea0c", "externalIds": + {"DBLP": "journals/corr/abs-cs-0603132", "ArXiv": "cs/0603132", "MAG": "1652733616", + "CorpusId": 15364771}, "corpusId": 15364771, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/21ca1ae3b6e09cdb1920a243c5fa16a694b9ea0c", + "title": "Graphics Turing Test", "abstract": "We define a Graphics Turing + Test to measure graphics performance in a similar manner to the definition + of the traditional Turing Test. To pass the test one needs to reach a computational + scale, the Graphics Turing Scale, for which Computer Generated Imagery becomes + comparatively indistinguishable from real images while also being interactive. + We derive an estimate for this computational scale which, although large, + is within reach of todays supercomputers. We consider advantages and disadvantages + of various computer systems designed to pass the Graphics Turing Test. Finally + we discuss commercial applications from the creation of such a system, in + particular Interactive Cinema.", "venue": "ArXiv", "year": 2006, "referenceCount": + 13, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-03-31", "journal": {"name": "ArXiv", "volume": "abs/cs/0603132"}, + "authors": [{"authorId": "145552462", "name": "M. McGuigan"}]}, {"paperId": + "84f7b2308851b042233e98214a742fd690f1539e", "externalIds": {"MAG": "2124342905", + "PubMedCentral": "3212571", "DOI": "10.1371/journal.pone.0027591", "CorpusId": + 1320774, "PubMed": "22096599"}, "corpusId": 1320774, "publicationVenue": {"id": + "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": "journal", + "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": "1932-6203", + "url": "https://journals.plos.org/plosone/", "alternate_urls": ["http://www.plosone.org/"]}, + "url": "https://www.semanticscholar.org/paper/84f7b2308851b042233e98214a742fd690f1539e", + "title": "A Non-Verbal Turing Test: Differentiating Mind from Machine in Gaze-Based + Social Interaction", "abstract": "In social interaction, gaze behavior provides + important signals that have a significant impact on our perception of others. + Previous investigations, however, have relied on paradigms in which participants + are passive observers of other persons\u2019 gazes and do not adjust their + gaze behavior as is the case in real-life social encounters. We used an interactive + eye-tracking paradigm that allows participants to interact with an anthropomorphic + virtual character whose gaze behavior is responsive to where the participant + looks on the stimulus screen in real time. The character\u2019s gaze reactions + were systematically varied along a continuum from a maximal probability of + gaze aversion to a maximal probability of gaze-following during brief interactions, + thereby varying contingency and congruency of the reactions. We investigated + how these variations influenced whether participants believed that the character + was controlled by another person (i.e., a confederate) or a computer program. + In a series of experiments, the human confederate was either introduced as + na\u00efve to the task, cooperative, or competitive. Results demonstrate that + the ascription of humanness increases with higher congruency of gaze reactions + when participants are interacting with a na\u00efve partner. In contrast, + humanness ascription is driven by the degree of contingency irrespective of + congruency when the confederate was introduced as cooperative. Conversely, + during interaction with a competitive confederate, judgments were neither + based on congruency nor on contingency. These results offer important insights + into what renders the experience of an interaction truly social: Humans appear + to have a default expectation of reciprocation that can be influenced drastically + by the presumed disposition of the interactor to either cooperate or compete.", + "venue": "PLoS ONE", "year": 2011, "referenceCount": 57, "citationCount": + 76, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0027591&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2011-11-09", "journal": {"name": "PLoS + ONE", "volume": "6"}, "authors": [{"authorId": "48230544", "name": "U. Pfeiffer"}, + {"authorId": "1918177", "name": "Bert Timmermans"}, {"authorId": "2487649", + "name": "G. Bente"}, {"authorId": "2051580", "name": "K. Vogeley"}, {"authorId": + "2127424", "name": "L. Schilbach"}]}, {"paperId": "f6d20121f0daa6d0e04cbf9df73eabafd642a933", + "externalIds": {"MAG": "1924972752", "DOI": "10.1090/S0002-9947-98-01800-5", + "CorpusId": 15431855}, "corpusId": 15431855, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f6d20121f0daa6d0e04cbf9df73eabafd642a933", "title": "The \u03a0\u2083-theory of the computably enumerable Turing degrees is undecidable", "abstract": "We show the undecidability of the \u03a03-theory of the partial order of enumerable Turing degrees. 0. Introduction. Recursively @@ -32922,44 +37236,34 @@ interactions: computability one would for instance place a priori 1991 Mathematics Subject Classification. 03D25,03D35.", "venue": "", "year": 1998, "referenceCount": 17, "citationCount": 23, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Transactions of the American - Mathematical Society", "pages": "2719-2736", "volume": "350"}, "authors": - [{"authorId": "2805805", "name": "S. Lempp"}, {"authorId": "102253480", "name": - "A. Nies"}, {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": "d4611d45aed61b3d98c4326fc895e199f0e0439d", - "externalIds": {"DBLP": "journals/aml/Yu06", "MAG": "2139507368", "DOI": "10.1007/s00153-005-0306-y", - "CorpusId": 26804256}, "url": "https://www.semanticscholar.org/paper/d4611d45aed61b3d98c4326fc895e199f0e0439d", - "title": "Lowness for genericity", "abstract": null, "venue": "Archive for - Mathematical Logic", "year": 2006, "referenceCount": 9, "citationCount": 33, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-02-01", "journal": {"name": "Archive for Mathematical - Logic", "pages": "233-238", "volume": "45"}, "authors": [{"authorId": "2804470", - "name": "Liang Yu"}]}, {"paperId": "21ca1ae3b6e09cdb1920a243c5fa16a694b9ea0c", - "externalIds": {"DBLP": "journals/corr/abs-cs-0603132", "ArXiv": "cs/0603132", - "MAG": "1652733616", "CorpusId": 15364771}, "url": "https://www.semanticscholar.org/paper/21ca1ae3b6e09cdb1920a243c5fa16a694b9ea0c", - "title": "Graphics Turing Test", "abstract": "We define a Graphics Turing - Test to measure graphics performance in a similar manner to the definition - of the traditional Turing Test. To pass the test one needs to reach a computational - scale, the Graphics Turing Scale, for which Computer Generated Imagery becomes - comparatively indistinguishable from real images while also being interactive. - We derive an estimate for this computational scale which, although large, - is within reach of todays supercomputers. We consider advantages and disadvantages - of various computer systems designed to pass the Graphics Turing Test. Finally - we discuss commercial applications from the creation of such a system, in - particular Interactive Cinema.", "venue": "ArXiv", "year": 2006, "referenceCount": - 13, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-03-31", "journal": {"name": "ArXiv", "volume": "abs/cs/0603132"}, "authors": - [{"authorId": "145552462", "name": "M. McGuigan"}]}, {"paperId": "848d9bcb6ccbdae45e76f29d1b8a604d740614a5", + "openAccessPdf": {"url": "https://www.ams.org/tran/1998-350-07/S0002-9947-98-01800-5/S0002-9947-98-01800-5.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Transactions + of the American Mathematical Society", "pages": "2719-2736", "volume": "350"}, + "authors": [{"authorId": "2805805", "name": "S. Lempp"}, {"authorId": "102253480", + "name": "A. Nies"}, {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": + "c40a670d24fa44068d22d356eb496e5656ddad51", "externalIds": {"MAG": "2805622498", + "DBLP": "journals/jns/DucrotFM18", "DOI": "10.1007/s00332-018-9472-z", "CorpusId": + 52099997}, "corpusId": 52099997, "publicationVenue": {"id": "619f4cc3-1d00-4060-b88d-9854843ac2c2", + "name": "Journal of nonlinear science", "type": "journal", "alternate_names": + ["J Nonlinear Sci", "Journal of Nonlinear Science", "J nonlinear sci"], "issn": + "0938-8974", "url": "https://link.springer.com/journal/332"}, "url": "https://www.semanticscholar.org/paper/c40a670d24fa44068d22d356eb496e5656ddad51", + "title": "Turing and Turing\u2013Hopf Bifurcations for a Reaction Diffusion + Equation with Nonlocal Advection", "abstract": null, "venue": "Journal of + nonlinear science", "year": 2018, "referenceCount": 40, "citationCount": 18, + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2018-05-30", "journal": {"name": "Journal + of Nonlinear Science", "pages": "1959-1997", "volume": "28"}, "authors": [{"authorId": + "144775987", "name": "A. Ducrot"}, {"authorId": "2175012", "name": "Xiaoming + Fu"}, {"authorId": "2538058", "name": "Pierre Magal"}]}, {"paperId": "848d9bcb6ccbdae45e76f29d1b8a604d740614a5", "externalIds": {"DBLP": "journals/connection/Hadley00", "MAG": "2013741536", - "DOI": "10.1080/09540090050129745", "CorpusId": 35698596}, "url": "https://www.semanticscholar.org/paper/848d9bcb6ccbdae45e76f29d1b8a604d740614a5", + "DOI": "10.1080/09540090050129745", "CorpusId": 35698596}, "corpusId": 35698596, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/848d9bcb6ccbdae45e76f29d1b8a604d740614a5", "title": "Cognition and the computational power of connectionist networks", "abstract": "This paper examines certain claims of ''cognitive significance'' which (wisely or not) have been based upon the theoretical powers of three @@ -32986,81 +37290,133 @@ interactions: classical algorithms; they appear highly contrived, their structure is fragile and they exhibit little or no noise tolerance.", "venue": "Connect. Sci.", "year": 2000, "referenceCount": 30, "citationCount": 48, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.tandfonline.com/doi/pdf/10.1080/09540090050129745?needAccess=true", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2000-06-01", "journal": {"name": "Connection Science", "pages": "110 - 95", "volume": "12"}, "authors": [{"authorId": "34654709", - "name": "Robert F. Hadley"}]}, {"paperId": "4d3d8f9076197ff9d9433acf797a439b799f8fff", - "externalIds": {"MAG": "1599458628", "DOI": "10.1007/978-3-642-51863-8", "CorpusId": - 3081508}, "url": "https://www.semanticscholar.org/paper/4d3d8f9076197ff9d9433acf797a439b799f8fff", - "title": "Phenology and Seasonality Modeling", "abstract": null, "venue": - "Ecological Studies", "year": 1974, "referenceCount": 0, "citationCount": - 475, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "3283961", "name": "H. Lieth"}]}, - {"paperId": "b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", "externalIds": {"DBLP": - "journals/cnsns/SongZP16", "MAG": "1929947366", "DOI": "10.1016/J.CNSNS.2015.10.002", - "CorpusId": 119973623}, "url": "https://www.semanticscholar.org/paper/b688e72337d6ad2fbee7670b1a2d1ce6d9faafb0", - "title": "Turing-Hopf bifurcation in the reaction-diffusion equations and - its applications", "abstract": null, "venue": "Communications in nonlinear - science & numerical simulation", "year": 2016, "referenceCount": 37, "citationCount": - 82, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2016-04-01", "journal": {"name": "Commun. - Nonlinear Sci. Numer. Simul.", "pages": "229-258", "volume": "33"}, "authors": - [{"authorId": "1794550", "name": "Yongli Song"}, {"authorId": "1742870", "name": - "Tonghua Zhang"}, {"authorId": "2814217", "name": "Yahong Peng"}]}, {"paperId": - "a454680557ac1b881f3f45ff8a79bc5c7df79c69", "externalIds": {"MAG": "34780249", - "DOI": "10.1007/978-1-4020-6710-5_9", "CorpusId": 59643133}, "url": "https://www.semanticscholar.org/paper/a454680557ac1b881f3f45ff8a79bc5c7df79c69", - "title": "Turing\u2019s Test", "abstract": null, "venue": "", "year": 2009, - "referenceCount": 39, "citationCount": 11, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "119-138", "volume": ""}, "authors": - [{"authorId": "143826040", "name": "B. J. Copeland"}, {"authorId": "2066457130", - "name": "Diane Proudfoot"}]}, {"paperId": "e11fab5eb2335b8b102c97cfcc68947125ec63ca", - "externalIds": {"MAG": "2764126013", "DBLP": "conf/icalp/BournezGP16", "ArXiv": - "1609.08059", "DOI": "10.4230/LIPIcs.ICALP.2016.109", "CorpusId": 1942575}, - "url": "https://www.semanticscholar.org/paper/e11fab5eb2335b8b102c97cfcc68947125ec63ca", - "title": "Polynomial Time Corresponds to Solutions of Polynomial Ordinary - Differential Equations of Polynomial Length", "abstract": "The outcomes of - this article are twofold. Implicit complexity. We provide an implicit characterization - of polynomial time computation in terms of ordinary differential equations: - we characterize the class P of languages computable in polynomial time in - terms of differential equations with polynomial right-hand side. This result - gives a purely continuous elegant and simple characterization of P. We believe - it is the first time complexity classes are characterized using only ordinary - differential equations. Our characterization extends to functions computable - in polynomial time over the reals in the sense of Computable Analysis. Our - results may provide a new perspective on classical complexity, by giving a - way to define complexity classes, like P, in a very simple way, without any - reference to a notion of (discrete) machine. This may also provide ways to - state classical questions about computational complexity via ordinary differential - equations. Continuous-Time Models of Computation. Our results can also be - interpreted in terms of analog computers or analog models of computation: - As a side effect, we get that the 1941 General Purpose Analog Computer (GPAC) - of Claude Shannon is provably equivalent to Turing machines both in terms - of computability and complexity, a fact that has never been established before. - This result provides arguments in favour of a generalised form of the Church-Turing - Hypothesis, which states that any physically realistic (macroscopic) computer - is equivalent to Turing machines both in terms of computability and complexity.", - "venue": "Journal of the ACM", "year": 2016, "referenceCount": 58, "citationCount": - 34, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-01-20", "journal": {"name": "Journal of the ACM (JACM)", "pages": "1 - - 76", "volume": "64"}, "authors": [{"authorId": "1706341", "name": "Olivier - Bournez"}, {"authorId": "144473423", "name": "D. Gra\u00e7a"}, {"authorId": - "2885195", "name": "Amaury Pouly"}]}, {"paperId": "1cb9e13100a427677fe8137af505f069c09e7fe6", + "name": "Robert F. Hadley"}]}, {"paperId": "13ce83b12f07791c3c9f7e7a693455181a164dd9", + "externalIds": {"MAG": "2144960539", "DBLP": "journals/toplas/SneyersSD09", + "DOI": "10.1145/1462166.1462169", "CorpusId": 2691882}, "corpusId": 2691882, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13ce83b12f07791c3c9f7e7a693455181a164dd9", + "title": "The computational power and complexity of constraint handling rules", + "abstract": "Constraint Handling Rules (CHR) is a high-level rule-based programming + language which is increasingly used for general-purpose programming. We introduce + the CHR machine, a model of computation based on the operational semantics + of CHR. Its computational power and time complexity properties are compared + to those of the well-understood Turing machine and Random Access Memory machine. + This allows us to prove the interesting result that every algorithm can be + implemented in CHR with the best known time and space complexity. We also + investigate the practical relevance of this result and the constant factors + involved. Finally we expand the scope of the discussion to other (declarative) + programming languages.", "venue": "TOPL", "year": 2009, "referenceCount": + 80, "citationCount": 81, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "https://lirias.kuleuven.be/bitstream/123456789/218524/1/p1-sneyers.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2009-02-01", "journal": {"name": "ACM Trans. Program. + Lang. Syst.", "pages": "8:1-8:42", "volume": "31"}, "authors": [{"authorId": + "1735896", "name": "Jon Sneyers"}, {"authorId": "1804943", "name": "T. Schrijvers"}, + {"authorId": "1686000", "name": "Bart Demoen"}]}, {"paperId": "d4611d45aed61b3d98c4326fc895e199f0e0439d", + "externalIds": {"DBLP": "journals/aml/Yu06", "MAG": "2139507368", "DOI": "10.1007/s00153-005-0306-y", + "CorpusId": 26804256}, "corpusId": 26804256, "publicationVenue": {"id": "baf6e768-e94b-48e9-9326-6aad748d4c61", + "name": "Archive for Mathematical Logic", "type": "journal", "alternate_names": + ["Arch Math Log"], "issn": "0933-5846", "url": "https://www.springer.com/mathematics/journal/153", + "alternate_urls": ["http://link.springer.com/journal/153", "http://www.springer.com/mathematics/journal/153"]}, + "url": "https://www.semanticscholar.org/paper/d4611d45aed61b3d98c4326fc895e199f0e0439d", + "title": "Lowness for genericity", "abstract": null, "venue": "Archive for + Mathematical Logic", "year": 2006, "referenceCount": 9, "citationCount": 33, + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2006-02-01", "journal": {"name": "Archive + for Mathematical Logic", "pages": "233-238", "volume": "45"}, "authors": [{"authorId": + "2804470", "name": "Liang Yu"}]}, {"paperId": "61155bde4dd196ae827763bd73862dc2f6c3fd6e", + "externalIds": {"MAG": "2130772396", "DOI": "10.1504/IJDSDE.2008.023002", + "CorpusId": 55623470}, "corpusId": 55623470, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/61155bde4dd196ae827763bd73862dc2f6c3fd6e", + "title": "Stability analysis of Reaction-Diffusion Systems with constant coefficients + on growing domains", "abstract": "We present stability theory for reaction-diffusion + systems with constant coefficients on growing domains. The model equations + on growing domains are transformed to fixed domains at each time yielding + a conservative system. We derive and show that the diffusion-driven instability + conditions for an exponentially growing domain depend on the domain growth + rate. By looking at the eigenvalues, we show that the shifting of the Turing + space is equivalent to the standard Turing space on a fixed domain but with + eigenvalues shifted to the left of the complex plane by a constant factor + given by the divergence of the domain velocity.", "venue": "", "year": 2008, + "referenceCount": 33, "citationCount": 28, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "International Journal of Dynamical Systems and + Differential Equations", "pages": "250-262", "volume": "1"}, "authors": [{"authorId": + "2731718", "name": "A. Madzvamuse"}]}, {"paperId": "26c6b4401abc87a69e5abe9fb485707d8b6d8a2a", + "externalIds": {"MAG": "1973949157", "DOI": "10.2214/AJR.170.2.9456974", "CorpusId": + 3022317, "PubMed": "9456974"}, "corpusId": 3022317, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/26c6b4401abc87a69e5abe9fb485707d8b6d8a2a", + "title": "Subarachnoid contrast enhancement after spinal angiography mimicking + diffuse subarachnoid hemorrhage.", "abstract": "ture as uncommon complications + of angiography I 1-51. We describe an unusual case of subarachnoid contrast + enhancement that mimicked subarachnoid hemorrhage on CT of the head after + spinal angiography. Parenchymal contrast enhancement and intraventricular + hyperdensity have been described as being the resuit of blood-brain barrier + (BBB) breakdown. but to the best of our knowledge. the subarachnoid hemorrhage-mimicking + appearance of suical and cisternal enhancement without yentricular hyperdensity + has not been reported.", "venue": "AJR. American journal of roentgenology", + "year": 1998, "referenceCount": 2, "citationCount": 57, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "CaseReport"], "publicationDate": "1998-02-01", "journal": {"name": "AJR. + American journal of roentgenology", "pages": "\n 503-5\n ", + "volume": "170 2"}, "authors": [{"authorId": "6836734", "name": "T. S. Eckel"}, + {"authorId": "145124051", "name": "S. Breiter"}, {"authorId": "5325828", "name": + "L. Monsein"}]}, {"paperId": "c0afa07d27f2335b74e57db1be6c7c16918c90c4", "externalIds": + {"MAG": "2371946849", "DOI": "10.1142/9781848162778_0008", "CorpusId": 63960915}, + "corpusId": 63960915, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c0afa07d27f2335b74e57db1be6c7c16918c90c4", + "title": "Liquid State Machines: Motivation, Theory, and Applications", "abstract": + "The Liquid State Machine (LSM) has emerged as a computational model that + is more adequate than the Turing machine for describing computations in biological + networks of neurons. Characteristic features of this new model are (i) that + it is a model for adaptive computational systems, (ii) that it provides a + method for employing randomly connected circuits, or even \u201cfound\u201d + physical objects for meaningful computations, (iii) that it provides a theoretical + context where heterogeneous, rather than stereotypical, local gates or processors + increase the computational power of a circuit, (iv) that it provides a method + for multiplexing different computations (on a common input) within the same + circuit. This chapter reviews the motivation for this model, its theoretical + background, and current work on implementations of this model in innovative + artificial computing devices.", "venue": "", "year": 2010, "referenceCount": + 30, "citationCount": 151, "influentialCitationCount": 12, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145247053", + "name": "W. Maass"}]}, {"paperId": "b8b14007b452ba63b4012ada099acdcb054ced11", + "externalIds": {"DBLP": "journals/logcom/Lowe01", "MAG": "2109974256", "DOI": + "10.1093/logcom/11.1.25", "CorpusId": 10394769}, "corpusId": 10394769, "publicationVenue": + {"id": "6832033a-c52f-4a30-a719-822a07bbd8fb", "name": "Journal of Logic and + Computation", "type": "journal", "alternate_names": ["J Log Comput"], "issn": + "0955-792X", "url": "https://academic.oup.com/logcom/issue", "alternate_urls": + ["http://logcom.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/b8b14007b452ba63b4012ada099acdcb054ced11", + "title": "Revision Sequences and Computers with an Infinite Amount of Time", + "abstract": "The author establishes a connection between Revision Theory of + Truth and Infinite Time Turing Machines as developed by Hamkins and Kidder. + The ideas from this paper have incited Welch to solve the limit rule problem + of revision theory.", "venue": "Journal of Logic and Computation", "year": + 2001, "referenceCount": 20, "citationCount": 33, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2001-02-01", "journal": {"name": "J. + Log. Comput.", "pages": "25-40", "volume": "11"}, "authors": [{"authorId": + "1740372", "name": "B. L\u00f6we"}]}, {"paperId": "1cb9e13100a427677fe8137af505f069c09e7fe6", "externalIds": {"MAG": "2053116015", "DOI": "10.1055/S-2001-9743", "CorpusId": - 45313235}, "url": "https://www.semanticscholar.org/paper/1cb9e13100a427677fe8137af505f069c09e7fe6", + 45313235}, "corpusId": 45313235, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1cb9e13100a427677fe8137af505f069c09e7fe6", "title": "Indium Mediated Reduction of Nitro and Azide Groups in the Presence of HCl in Aqueous Media", "abstract": "Indium mediated reduction of azide and nitro groups in the presence of HCl (1.5 equiv based on indium) at room @@ -33068,95 +37424,17 @@ interactions: in high to quantitative yields. Under the same reaction condi- tions, selective reduction of azide and nitro group in the presence of vinyl group could be accomplished.", "venue": "", "year": 2001, "referenceCount": 1, "citationCount": - 44, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Synthesis", "pages": "0081-0084", - "volume": "2001"}, "authors": [{"authorId": "2119170912", "name": "Jung Gyu - Lee"}, {"authorId": "92319680", "name": "K. Choi"}, {"authorId": "3175009", - "name": "H. Koh"}, {"authorId": "2107996824", "name": "Youseung. Kim"}, {"authorId": - "4515180", "name": "Yonghan Kang"}, {"authorId": "35367561", "name": "Y. Cho"}]}, - {"paperId": "4c5098ef0cb1885ee1036abb0dd211305d90ab83", "externalIds": {"MAG": - "1991146349", "DBLP": "conf/stoc/Venkateswaran87", "DOI": "10.1145/28395.28411", - "CorpusId": 15453831}, "url": "https://www.semanticscholar.org/paper/4c5098ef0cb1885ee1036abb0dd211305d90ab83", - "title": "Properties that characterize LOGCFL", "abstract": "Two properties, - called semi-unboundedness, and polynomial proof-size, are identified as key - properties shared by the definitions of LOGCFL on several models of computations. - The semi-unboundedness property leads to the definition of new models of computation - based on unbounded fan-in circuits. These are circuits obtained from unbounded - fan-in circuits by restricting the fan-in of gates of one type. A new characterization - of LOGCFL is obtained on such a model in which the fan-in of the AND gates - are bounded by a constant. This property also suggests new characterizations - of LOGCFL on the following models: alternating Turing machines [CKS81], nondeterministic - auxiliary pushdown automata [Co71], and bounded fan-in Boolean circuits [Co85].", - "venue": "Journal of computer and system sciences (Print)", "year": 1987, - "referenceCount": 24, "citationCount": 153, "influentialCitationCount": 20, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book"], "publicationDate": "1987-01-01", "journal": {"name": "Proceedings - of the nineteenth annual ACM symposium on Theory of computing"}, "authors": - [{"authorId": "2519792", "name": "H. Venkateswaran"}]}, {"paperId": "f39891d6ee04ba53dc40579150ff5435f6a7e46d", - "externalIds": {"MAG": "2335457302", "DOI": "10.1103/PHYSREVE.87.032906", - "CorpusId": 124577328}, "url": "https://www.semanticscholar.org/paper/f39891d6ee04ba53dc40579150ff5435f6a7e46d", - "title": "Turing space in reaction-diffusion systems with density-dependent - cross diffusion", "abstract": "Reaction-diffusion systems with cross-diffusion - terms that depend linearly on density are studied via linear stability analysis - and weakly nonlinear analysis. We obtain and analyze the conditions for the - Turing instability and derive a universal form of these conditions. We discuss - the features of the pattern-forming regions in parameter space for a cross - activator-inhibitor system, the Brusselator model, and for a pure activator-inhibitor - system, the two-variable Oregonator model. The supercritical or subcritical - character of the Turing bifurcation for the Brusselator is determined by deriving - an amplitude equation for patterns near the instability threshold.", "venue": - "", "year": 2013, "referenceCount": 31, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-03-13", - "journal": {"name": "Physical Review E", "pages": "032906", "volume": "87"}, - "authors": [{"authorId": "39224568", "name": "E. Zemskov"}, {"authorId": "2745924", - "name": "K. Kassner"}, {"authorId": "144301618", "name": "M. Hauser"}, {"authorId": - "3041313", "name": "W. Horsthemke"}]}, {"paperId": "2d7bbd30909a93feb9aa3ae740d1dab09170f4bb", - "externalIds": {"MAG": "2022145315", "DOI": "10.1142/S0218339011003555", "CorpusId": - 121810178}, "url": "https://www.semanticscholar.org/paper/2d7bbd30909a93feb9aa3ae740d1dab09170f4bb", - "title": "PATTERN SELECTION IN AN EPIDEMIC MODEL WITH SELF AND CROSS DIFFUSION", - "abstract": "In this paper, we have presented Turing pattern selection in - a spatial epidemic model with zero-flux boundary conditions, for which we - have given a general survey of Hopf and Turing bifurcations, and have derived - amplitude equations for the excited modes. Furthermore, we present novel numerical - evidence of typical Turing patterns, and find that the model dynamics exhibits - complex pattern replication: on increasing the control parameter r, the sequence - \"H0-hexagons \u2192 H0-hexagon-stripe mixtures \u2192 stripes \u2192 H\u03c0-hexagon-stripe - mixtures \u2192 H\u03c0-hexagons\" is observed. This may enrich the research - of the pattern formation in diffusive epidemic models.", "venue": "", "year": - 2011, "referenceCount": 23, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2011-11-21", "journal": {"name": "Journal of Biological Systems", "pages": - "19-31", "volume": "19"}, "authors": [{"authorId": "2144318184", "name": "Weiming - Wang"}, {"authorId": "2027512304", "name": "Yezhi Lin"}, {"authorId": "46506999", - "name": "Hailing Wang"}, {"authorId": "36348751", "name": "Houye Liu"}, {"authorId": - "1870339", "name": "Yong-ji Tan"}]}, {"paperId": "817d3e39fa91774c5eba094cbf81165acb095417", - "externalIds": {"MAG": "2137593604", "DOI": "10.1177/004051759906900703", - "CorpusId": 110349441}, "url": "https://www.semanticscholar.org/paper/817d3e39fa91774c5eba094cbf81165acb095417", - "title": "Predicting the Performance of Fabrics in Garment Manufacturing with - Artificial Neural Networks", "abstract": "Neural networks are used to predict - the performance of fabrics in clothing manufac turing. The predictions are - based on fabric mechanical properties measured on the KES-FB system. The influence - of the number of input and hidden nodes on the convergence speed and the prediction - accuracy are investigated. Tests indicate that these artificial neural networks - are effective for predicting potential problems in clothing manufacturing.", - "venue": "", "year": 1999, "referenceCount": 11, "citationCount": 44, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1999-07-01", "journal": {"name": "Textile Research Journal", "pages": "477 - - 482", "volume": "69"}, "authors": [{"authorId": "49607978", "name": "R. - Gong"}, {"authorId": "50581058", "name": "Y. Chen"}]}, {"paperId": "b59a2f4fe0cb3b4f31ce81fb50f7ca65c1a02218", + 44, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Synthesis", + "pages": "0081-0084", "volume": "2001"}, "authors": [{"authorId": "2119170912", + "name": "Jung Gyu Lee"}, {"authorId": "92319680", "name": "K. Choi"}, {"authorId": + "3175009", "name": "H. Koh"}, {"authorId": "2107996824", "name": "Youseung. + Kim"}, {"authorId": "4515180", "name": "Yonghan Kang"}, {"authorId": "35367561", + "name": "Y. Cho"}]}, {"paperId": "b59a2f4fe0cb3b4f31ce81fb50f7ca65c1a02218", "externalIds": {"MAG": "1576712038", "ArXiv": "0704.3474", "CorpusId": 83358528}, - "url": "https://www.semanticscholar.org/paper/b59a2f4fe0cb3b4f31ce81fb50f7ca65c1a02218", + "corpusId": 83358528, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b59a2f4fe0cb3b4f31ce81fb50f7ca65c1a02218", "title": "Missing data: A comparison of neural network and expectation maximization techniques", "abstract": "Two techniques have emerged from the recent litera-ture as candidate solutions to the problem of missing data imputation. These are @@ -33171,91 +37449,149 @@ interactions: whereas the auto-associative neural network and GA combination is suitable when there are inherent nonlinear relationships between some of the given variables. Keywords:", "venue": "", "year": 2007, "referenceCount": 23, "citationCount": - 153, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": + 153, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2007-04-26", "journal": + {"name": "Current Science", "pages": "1514-1521", "volume": "93"}, "authors": + [{"authorId": "2198366", "name": "F. Nelwamondo"}, {"authorId": "14594344", + "name": "S. Mohamed"}, {"authorId": "1740675", "name": "T. Marwala"}]}, {"paperId": + "83520632a53df4e451d59771ed052a32566dcab4", "externalIds": {"DBLP": "journals/fuin/Durand-Lose06", + "MAG": "1838192621", "CorpusId": 14870483}, "corpusId": 14870483, "publicationVenue": + {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", "name": "Fundamenta Informaticae", + "type": "journal", "alternate_names": ["Fundam Informaticae"], "issn": "0169-2968", + "url": "http://content.iospress.com/journals/fundamenta-informaticae", "alternate_urls": + ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, "url": + "https://www.semanticscholar.org/paper/83520632a53df4e451d59771ed052a32566dcab4", + "title": "Abstract Geometrical Computation 1: Embedding Black Hole Computations + with Rational Numbers", "abstract": "The Black hole model of computation provides + super-Turing computing power since it offers the possibility to decide in + finite (observer''s) time any recursively enumerable (R.E.) problem. In this + paper, we provide a geometric model of computation, conservative abstract + geometrical computation, that, although being based on rational numbers (and + not real numbers), has the same property: it can simulate any Turing machine + and can decide any R.E. problem through the creation of an accumulation. Finitely + many signals can leave any accumulation, and it can be known whether anything + leaves. This corresponds to a black hole effect.", "venue": "Fundamenta Informaticae", + "year": 2006, "referenceCount": 33, "citationCount": 28, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-12-01", "journal": {"name": "Fundam. Informaticae", + "pages": "491-510", "volume": "74"}, "authors": [{"authorId": "1387881959", + "name": "J. Durand-Lose"}]}, {"paperId": "3f2eeb08d584596a5b1e99053e2fac84dfdeca13", + "externalIds": {"MAG": "803162307", "DOI": "10.1007/S11071-015-2132-Z", "CorpusId": + 118933792}, "corpusId": 118933792, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f2eeb08d584596a5b1e99053e2fac84dfdeca13", + "title": "Pattern dynamics of a predator\u2013prey reaction\u2013diffusion + model with spatiotemporal delay", "abstract": null, "venue": "", "year": 2015, + "referenceCount": 22, "citationCount": 28, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-05-07", "journal": {"name": "Nonlinear Dynamics", "pages": "2155-2163", + "volume": "81"}, "authors": [{"authorId": "33771136", "name": "Jian Xu"}, + {"authorId": "2109700606", "name": "Gaoxiang Yang"}, {"authorId": "4652087", + "name": "Hongguang Xi"}, {"authorId": "1740772", "name": "Jianzhong Su"}]}, + {"paperId": "cb54c97240e6e014d5ffe1f304c820e13e4e99ca", "externalIds": {"DBLP": + "conf/colt/Ko90", "MAG": "2086059606", "DOI": "10.1137/0220059", "CorpusId": + 22566385}, "corpusId": 22566385, "publicationVenue": {"id": "24b0721b-0592-414a-ac79-7271515aaab0", + "name": "Annual Conference Computational Learning Theory", "type": "conference", + "alternate_names": ["Conf Learn Theory", "COLT", "Conference on Learning Theory", + "Annu Conf Comput Learn Theory"], "url": "http://www.wikicfp.com/cfp/program?id=536"}, + "url": "https://www.semanticscholar.org/paper/cb54c97240e6e014d5ffe1f304c820e13e4e99ca", + "title": "On the complexity of learning minimum time-bounded Turing machines", + "abstract": "The following problems about time-bounded program-size complexity + are studied: (1) for a given string x, a size bound s, and a time bound t, + whether there exists a Turing machine of size less than or equal to s that + prints x in t moves; (2) for two given finite sets Y and Z of strings, a size + bound s, and a time bound t, whether there exists a Turing machine of size + less than or equal to s that operates in time t and accepts all $y \\in Y$ + and rejects all $z \\in Z$. These problems are fundamental in complexity theory + and feasible learning theory. The complexity of these problems is apparently + between P and $NP$, but appears very difficult to classify precisely. These + problems are attacked by the approach of relativization. It is shown that + for certain variations of the problems, they could be either polynomial-time + computable or not polynomial-time computable, depending on different oracles. + Furthermore, there are oracles relative to which they are not complete for + $NP$ under the polynomial-time Turing red...", "venue": "Annual Conference + Computational Learning Theory", "year": 1990, "referenceCount": 22, "citationCount": + 30, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1990-07-01", "journal": {"name": "SIAM + J. Comput.", "pages": "962-986", "volume": "20"}, "authors": [{"authorId": + "1704334", "name": "K. Ko"}]}, {"paperId": "817d3e39fa91774c5eba094cbf81165acb095417", + "externalIds": {"MAG": "2137593604", "DOI": "10.1177/004051759906900703", + "CorpusId": 110349441}, "corpusId": 110349441, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/817d3e39fa91774c5eba094cbf81165acb095417", + "title": "Predicting the Performance of Fabrics in Garment Manufacturing with + Artificial Neural Networks", "abstract": "Neural networks are used to predict + the performance of fabrics in clothing manufac turing. The predictions are + based on fabric mechanical properties measured on the KES-FB system. The influence + of the number of input and hidden nodes on the convergence speed and the prediction + accuracy are investigated. Tests indicate that these artificial neural networks + are effective for predicting potential problems in clothing manufacturing.", + "venue": "", "year": 1999, "referenceCount": 11, "citationCount": 44, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-07-01", "journal": {"name": "Textile Research Journal", + "pages": "477 - 482", "volume": "69"}, "authors": [{"authorId": "49607978", + "name": "R. Gong"}, {"authorId": "50581058", "name": "Y. Chen"}]}, {"paperId": + "74be8bb9845decb5ac60d2233bda790b97426bca", "externalIds": {"DBLP": "journals/corr/abs-0704-1043", + "MAG": "3022109793", "ArXiv": "0704.1043", "DOI": "10.1142/9789812770837_0006", + "CorpusId": 59772}, "corpusId": 59772, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/74be8bb9845decb5ac60d2233bda790b97426bca", + "title": "On the Kolmogorov-Chaitin Complexity for short sequences", "abstract": + "A drawback of Kolmogorov-Chaitin complexity (K) as a function from s to the + shortest program producing s is its noncomputability which limits its range + of applicability. Moreover, when strings are short, the dependence of K on + a particular universal Turing machine U can be arbitrary. In practice one + can approximate it by computable compression methods. However, such compression + methods do not always provide meaningful approximations--for strings shorter, + for example, than typical compiler lengths. In this paper we suggest an empirical + approach to overcome this difficulty and to obtain a stable definition of + the Kolmogorov-Chaitin complexity for short sequences. Additionally, a correlation + in terms of distribution frequencies was found across the output of two models + of abstract machines, namely unidimensional cellular automata and deterministic + Turing machine.", "venue": "ArXiv", "year": 2007, "referenceCount": 30, "citationCount": + 39, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/0704.1043", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2007-04-26", "journal": {"name": "Current - Science", "pages": "1514-1521", "volume": "93"}, "authors": [{"authorId": - "2198366", "name": "F. Nelwamondo"}, {"authorId": "14594344", "name": "S. - Mohamed"}, {"authorId": "1740675", "name": "T. Marwala"}]}, {"paperId": "bb3051169115960b7902691a2bee85a6760c0fbe", - "externalIds": {"MAG": "2579532545", "DOI": "10.1112/S0024609397214098", "CorpusId": - 125040112}, "url": "https://www.semanticscholar.org/paper/bb3051169115960b7902691a2bee85a6760c0fbe", - "title": "THE CLASSICAL DECISION PROBLEM (Perspectives in Mathematical Logic) - By Egon B\u00f6rger, Erich Gr\u00e4del and Yuri Gurevich: 482 pp., DM.158.\u2013, - ISBN 3 540 57073 X (Springer, 1997).", "abstract": "The Decision Problem (Entscheidungsproblem) - was brought to the attention of the mathematical community by Hilbert in 1922 - as part of his formalist programme for the foundations of mathematics, and - he considered it to be the most important problem of mathematical logic at - the time. It consists in finding an algorithm which, when given an arbitrary - well-formed formula of first-order logic as input, eventually terminates and - reveals whether or not that formula is satisfiable (that is, whether it is - true under some interpretation of the predicate symbols and function symbols - occurring in the formula). Already, in 1915, Lo$ wenheim had provided a positive - solution for formulas containing, apart from equality, only unary predicate - symbols (and no function symbols), and many other special cases were solved - in the twenties and early thirties. (One such result appeared in the paper - [2] which is now much better known for its combinatorial method\u2014Ramsey\u2019s - Theorem\u2014than for its original logical purpose.) However, doubts were - beginning to grow as to whether there could be an algorithm for the general - case, although, as von Neumann remarked in 1927, \u2018... we have no clue - as to how... a proof of undecidability would go\u2019. To understand why everything - suddenly happened in 1936, the interested reader might like to consult [1]. - Suffice it to say here that this year saw the development of both the Go$ - del\u2013Herbrand\u2013Kleene theory of recursive functions and, independently, - the equivalent notion of machine computable sets of words (on a finite formal - alphabet) by Turing. The widely accepted Church\u2013Turing thesis asserts - that either of these mathematically precise notions captures the intuitive - concept of \u2018algorithm\u2019, and so from that time we have had a convincing - method to demonstrate undecidability rigorously. Indeed, the method was immediately - applied by Church (indirectly by formalizing recursive function theory within - logic, and then using the completeness theorem to equate satisfiability with - consistency) and Turing (by directly coding his machines into interpretations - of certain formulas) to prove the unsolvability of the Entscheidungsproblem. - There remained the issue of completing the work begun by Lo$ wenheim; that - is, of classifying the various natural subclasses of the class of all first-order - formulas according to the decidability or otherwise of their satisfiability - problem. It is the aim of the book under review to present as many results - in this direction as is feasible, and it achieves this with authority and - considerable clarity. The project begins with the observation from elementary - logic that any wellformed formula is logically equivalent to one in which - all the quantifiers are pushed to the front (so-called prenex normal form). - The shape of this quantifier prefix is then used to classify the formula. - For example, d*c# d* denotes the class of all formulas logically equivalent - to one having the form", "venue": "", "year": 1998, "referenceCount": 1, "citationCount": - 185, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1998-05-01", "journal": - {"name": "Bulletin of The London Mathematical Society", "pages": "317-335", - "volume": "30"}, "authors": [{"authorId": "145618022", "name": "A. Wilkie"}]}, - {"paperId": "d0a7be68cf77b1ccd63424e3db06247a05a0d731", "externalIds": {"MAG": - "2908445780", "CorpusId": 1570704}, "url": "https://www.semanticscholar.org/paper/d0a7be68cf77b1ccd63424e3db06247a05a0d731", - "title": "Turing machines and recursive Turing Tests", "abstract": "The Turing - Test, in its standard interpretation, has been dismissed by many as a practical - intelligence test. In fact, it is questionable that the imitation game was - meant by Turing himself to be used as a test for evaluating machines and measuring - the progress of artificial intelligence. In the past fifteen years or so, - an alternative approach to measuring machine intelligence has been consolidating. - The key concept for this alternative approach is not the Turing Test, but - the Turing machine, and some theories derived upon it, such as Solomonoff\u2019s - theory of prediction, the MML principle, Kolmogorov complexity and algorithmic - information theory. This presents an antagonistic view to the Turing test, - where intelligence tests are based on formal principles, are not anthropocentric, - are meaningful computationally and the abilities (or factors) which are evaluated - can be recognised and quantified. Recently, however, this computational view - has been touching upon issues which are somewhat related to the Turing Test, - namely that we may need other intelligent agents in the tests. Motivated by - these issues (and others), this paper links these two antagonistic views by - bringing some of the ideas around the Turing Test to the realm of Turing machines.", - "venue": "", "year": 2012, "referenceCount": 53, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "28-33", "volume": ""}, "authors": - [{"authorId": "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}, {"authorId": - "1403897525", "name": "Javier Insa-Cabrera"}, {"authorId": "1745871", "name": - "D. Dowe"}, {"authorId": "39109261", "name": "B. Hibbard"}]}]} + ["JournalArticle"], "publicationDate": "2007-04-01", "journal": {"name": "ArXiv", + "volume": "abs/0704.1043"}, "authors": [{"authorId": "2027817702", "name": + "J. Delahaye"}, {"authorId": "66445647", "name": "H. Zenil"}]}, {"paperId": + "ca21749c0de3eb4d32147ec57484bde77b000404", "externalIds": {"MAG": "2101535368", + "DOI": "10.1051/MMNP/20138304", "CorpusId": 7885731}, "corpusId": 7885731, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca21749c0de3eb4d32147ec57484bde77b000404", + "title": "Wave-like Solutions for Nonlocal Reaction-diffusion Equations: a + Toy Model", "abstract": "Traveling waves for the nonlocal Fisher Equation + can exhibit much more complex behaviours than for the usual Fisher equation. + A striking numerical observation is that a traveling wave with minimal speed + can connect a dynamically unstable steady state 0 to a Turing unstable steady + state 1, see [11]. This is proved for monotonic waves [1, 5] in the case where + the speed is far from minimal. Here we introduce a simplified nonlocal Fisher + equation for which we can build simple analytical traveling wave solutions + that exhibit various behaviours. These traveling waves, with minimal speed + or not, can connect monotonically 0 and 1, can connect these two states but + being non monotonic, and also they can connect 0 to a wavetrain around the + Turing unstable state 1. These exist in a regime where time dynamics converge + to another object observed in [2, 7]: a wave that connects 0 to a pulsating + wave around 1.", "venue": "", "year": 2013, "referenceCount": 13, "citationCount": + 39, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://iris.uniroma1.it/bitstream/11573/1464903/1/Nadin_preprint_Wave-like-solutions_2013.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-06-11", "journal": {"name": + "Mathematical Modelling of Natural Phenomena", "pages": "33-41", "volume": + "8"}, "authors": [{"authorId": "2206925", "name": "Gr\u00e9goire Nadin"}, + {"authorId": "144814492", "name": "L. Rossi"}, {"authorId": "39049690", "name": + "L. Ryzhik"}, {"authorId": "30823929", "name": "B. Perthame"}]}]} ' headers: @@ -33264,31 +37600,31 @@ interactions: Connection: - keep-alive Content-Length: - - '172685' + - '185167' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:43 GMT + - Tue, 03 Jan 2023 20:53:11 GMT Via: - - 1.1 94d1b34d858b1d0f17042496999ab014.cloudfront.net (CloudFront) + - 1.1 a18ffd49cb0150d72aa8f289eec6fa1e.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - -PHzljor3yAJPtviglUTQ0XvBToz9JNkYl1XnSaqXVBLgX9PQyBrtA== + - 6-UAKg2oC1lfELO9TvcRAQcjs53suShhDTHEFS9B0CTnjKhg-y4BEA== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detH7EJMPHcFr9A= + - eLxUnFuzvHcF3gA= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '172685' + - '185167' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:43 GMT + - Tue, 03 Jan 2023 20:53:11 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - ecd317f1-0306-4954-8164-aa9263fb6965 + - 5cd272bf-f507-4bce-b8c0-a3580a443bec status: code: 200 message: OK @@ -33304,13 +37640,444 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1600&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1600&limit=100 response: body: - string: '{"total": 65539, "offset": 1600, "next": 1700, "data": [{"paperId": - "5039ca73fd299f8436f08b373753655f6c0b4629", "externalIds": {"MAG": "2065034429", - "DBLP": "journals/siamcomp/Macarie98", "DOI": "10.1137/S0097539793253851", - "CorpusId": 14511916}, "url": "https://www.semanticscholar.org/paper/5039ca73fd299f8436f08b373753655f6c0b4629", + string: '{"total": 65730, "offset": 1600, "next": 1700, "data": [{"paperId": + "cb54c97240e6e014d5ffe1f304c820e13e4e99ca", "externalIds": {"DBLP": "conf/colt/Ko90", + "MAG": "2086059606", "DOI": "10.1137/0220059", "CorpusId": 22566385}, "corpusId": + 22566385, "publicationVenue": {"id": "24b0721b-0592-414a-ac79-7271515aaab0", + "name": "Annual Conference Computational Learning Theory", "type": "conference", + "alternate_names": ["Conf Learn Theory", "COLT", "Conference on Learning Theory", + "Annu Conf Comput Learn Theory"], "url": "http://www.wikicfp.com/cfp/program?id=536"}, + "url": "https://www.semanticscholar.org/paper/cb54c97240e6e014d5ffe1f304c820e13e4e99ca", + "title": "On the complexity of learning minimum time-bounded Turing machines", + "abstract": "The following problems about time-bounded program-size complexity + are studied: (1) for a given string x, a size bound s, and a time bound t, + whether there exists a Turing machine of size less than or equal to s that + prints x in t moves; (2) for two given finite sets Y and Z of strings, a size + bound s, and a time bound t, whether there exists a Turing machine of size + less than or equal to s that operates in time t and accepts all $y \\in Y$ + and rejects all $z \\in Z$. These problems are fundamental in complexity theory + and feasible learning theory. The complexity of these problems is apparently + between P and $NP$, but appears very difficult to classify precisely. These + problems are attacked by the approach of relativization. It is shown that + for certain variations of the problems, they could be either polynomial-time + computable or not polynomial-time computable, depending on different oracles. + Furthermore, there are oracles relative to which they are not complete for + $NP$ under the polynomial-time Turing red...", "venue": "Annual Conference + Computational Learning Theory", "year": 1990, "referenceCount": 22, "citationCount": + 30, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1990-07-01", "journal": {"name": "SIAM + J. Comput.", "pages": "962-986", "volume": "20"}, "authors": [{"authorId": + "1704334", "name": "K. Ko"}]}, {"paperId": "74be8bb9845decb5ac60d2233bda790b97426bca", + "externalIds": {"DBLP": "journals/corr/abs-0704-1043", "MAG": "3022109793", + "ArXiv": "0704.1043", "DOI": "10.1142/9789812770837_0006", "CorpusId": 59772}, + "corpusId": 59772, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/74be8bb9845decb5ac60d2233bda790b97426bca", + "title": "On the Kolmogorov-Chaitin Complexity for short sequences", "abstract": + "A drawback of Kolmogorov-Chaitin complexity (K) as a function from s to the + shortest program producing s is its noncomputability which limits its range + of applicability. Moreover, when strings are short, the dependence of K on + a particular universal Turing machine U can be arbitrary. In practice one + can approximate it by computable compression methods. However, such compression + methods do not always provide meaningful approximations--for strings shorter, + for example, than typical compiler lengths. In this paper we suggest an empirical + approach to overcome this difficulty and to obtain a stable definition of + the Kolmogorov-Chaitin complexity for short sequences. Additionally, a correlation + in terms of distribution frequencies was found across the output of two models + of abstract machines, namely unidimensional cellular automata and deterministic + Turing machine.", "venue": "ArXiv", "year": 2007, "referenceCount": 30, "citationCount": + 39, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/0704.1043", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2007-04-01", "journal": {"name": "ArXiv", + "volume": "abs/0704.1043"}, "authors": [{"authorId": "2027817702", "name": + "J. Delahaye"}, {"authorId": "66445647", "name": "H. Zenil"}]}, {"paperId": + "ca21749c0de3eb4d32147ec57484bde77b000404", "externalIds": {"MAG": "2101535368", + "DOI": "10.1051/MMNP/20138304", "CorpusId": 7885731}, "corpusId": 7885731, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca21749c0de3eb4d32147ec57484bde77b000404", + "title": "Wave-like Solutions for Nonlocal Reaction-diffusion Equations: a + Toy Model", "abstract": "Traveling waves for the nonlocal Fisher Equation + can exhibit much more complex behaviours than for the usual Fisher equation. + A striking numerical observation is that a traveling wave with minimal speed + can connect a dynamically unstable steady state 0 to a Turing unstable steady + state 1, see [11]. This is proved for monotonic waves [1, 5] in the case where + the speed is far from minimal. Here we introduce a simplified nonlocal Fisher + equation for which we can build simple analytical traveling wave solutions + that exhibit various behaviours. These traveling waves, with minimal speed + or not, can connect monotonically 0 and 1, can connect these two states but + being non monotonic, and also they can connect 0 to a wavetrain around the + Turing unstable state 1. These exist in a regime where time dynamics converge + to another object observed in [2, 7]: a wave that connects 0 to a pulsating + wave around 1.", "venue": "", "year": 2013, "referenceCount": 13, "citationCount": + 39, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://iris.uniroma1.it/bitstream/11573/1464903/1/Nadin_preprint_Wave-like-solutions_2013.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-06-11", "journal": {"name": + "Mathematical Modelling of Natural Phenomena", "pages": "33-41", "volume": + "8"}, "authors": [{"authorId": "2206925", "name": "Gr\u00e9goire Nadin"}, + {"authorId": "144814492", "name": "L. Rossi"}, {"authorId": "39049690", "name": + "L. Ryzhik"}, {"authorId": "30823929", "name": "B. Perthame"}]}, {"paperId": + "08390dacc76bc831fcfd08d09fb55f22e97b3bb2", "externalIds": {"MAG": "1965916599", + "DOI": "10.1080/17513758.2012.655327", "CorpusId": 43111091, "PubMed": "22873604"}, + "corpusId": 43111091, "publicationVenue": {"id": "cff9f383-b09f-4e04-85d1-4e44cc19b629", + "name": "Journal of Biological Dynamics", "type": "journal", "alternate_names": + ["J Biological Dyn"], "issn": "1751-3758", "url": "http://www.informaworld.com/1751-3766", + "alternate_urls": ["http://www.informaworld.com/smpp/title~db=all~content=t744398444~tab=editorialboard", + "http://www.tandfonline.com/toc/tjbd20/current", "http://www.tandfonline.com/TJBD"]}, + "url": "https://www.semanticscholar.org/paper/08390dacc76bc831fcfd08d09fb55f22e97b3bb2", + "title": "Propagation of Turing patterns in a plankton model", "abstract": + "The paper is devoted to a reaction\u2013diffusion system of equations describing + phytoplankton and zooplankton distributions. Linear stability analysis of + the model is carried out. Turing and Hopf stability boundaries are found. + Emergence of two-dimensional spatial structures is illustrated by numerical + simulations. Travelling waves between various stationary solutions are investigated. + Transitions between homogeneous in space stationary solutions and Turing structures + are studied.", "venue": "Journal of Biological Dynamics", "year": 2012, "referenceCount": + 42, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-01", "journal": + {"name": "Journal of Biological Dynamics", "pages": "524 - 538", "volume": + "6"}, "authors": [{"authorId": "34586885", "name": "R. K. Upadhyay"}, {"authorId": + "2216988", "name": "V. Volpert"}, {"authorId": "144344252", "name": "N. K. + Thakur"}]}, {"paperId": "13ade4536f146dc8d11b369dccac5032ca210a2c", "externalIds": + {"MAG": "1978524140", "DOI": "10.1080/87567555.1992.10532239", "CorpusId": + 144206761}, "corpusId": 144206761, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13ade4536f146dc8d11b369dccac5032ca210a2c", + "title": "Overcoming the Drawbacks of the Large Lecture Class", "abstract": + "class time. Also, instructors in large lec tures tend to be remote?inaccessible + authority figures at the front of the class. Finally, the seating arrangement + em phasizes the student position as a spec tator, producing a passive audience + that expects to be entertained and informed by the performer. These five drawbacks + all point to a lack of involvement and a feeling of remoteness in the large + lecture classroom. Other studies point out that testing is another special + problem associated with the large lecture. Although writing across the curriculum + is a worthy goal, correcting 250 essay exams is difficult.", "venue": "", + "year": 1992, "referenceCount": 7, "citationCount": 81, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1992-11-01", "journal": {"name": "College Teaching", "pages": "151-154", + "volume": "40"}, "authors": [{"authorId": "66274480", "name": "Joel Geske"}]}, + {"paperId": "4eb0814f5d6f106183e204e500abc48a856efdfb", "externalIds": {"MAG": + "2506001477", "DBLP": "books/cu/p/MardiaC16", "DOI": "10.1017/CBO9780511863196.008", + "CorpusId": 901168}, "corpusId": 901168, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4eb0814f5d6f106183e204e500abc48a856efdfb", + "title": "Alan Turing and Enigmatic Statistics", "abstract": "Caros leitores, + gostaria de dar boas vindas ao Victor Fossaluza (UFSCar) e tamb\u00e9m agradec\u00ea-lo + por ter aceito a tarefa de ser o editor deste boletim para o bi\u00eanio 2013-2014. + Ele, em seu primeiro boletim, nos traz um excelente texto de K. V. Mardia + e S. B. Cooper sobre o trabalho de Alan Turing. Sendo assim, esperamos muito + mais dele para os pr\u00f3ximos boletins! Gostaria tamb\u00e9m de inform\u00e1-los + que o volume com os anais do EBEB 2012 est\u00e1 dispo\u0144\u0131vel em XI + Brazilian Meeting on Bayesian Statistics (2012). Editores: J. M. Stern, M. + de S. Lauretto, A. Polpo and M. A. Diniz. AIP Conference Proceedings, volume + 1490, editora AIP. http://scitation.aip.org/dbt/dbt.jsp?KEY=APCPC S&Volume=1490&Issue=1. + Boa leitura!", "venue": "The Once and Future Turing", "year": 2016, "referenceCount": + 24, "citationCount": 6, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"pages": "78-89"}, "authors": [{"authorId": + "3209910", "name": "K. Mardia"}, {"authorId": "98630872", "name": "S. Cooper"}]}, + {"paperId": "5393980a1b1791d566a76bfabb5c922da959cc8f", "externalIds": {"MAG": + "2330409191", "DOI": "10.1248/CPB.13.1341", "CorpusId": 30903606, "PubMed": + "5864726"}, "corpusId": 30903606, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5393980a1b1791d566a76bfabb5c922da959cc8f", + "title": "Cupric oxide as an efficient catalyst in Ullmann condensation reaction.", + "abstract": "Cupric oxide catalyst improved the yield in some Ullmann condensation + reactions affording diaryl ether derivatives. Though it was not concluded + whether cupric oxide was the ture catalytic species or not, its efficiency + was proved.", "venue": "Chemical & pharmaceutical bulletin", "year": 1965, + "referenceCount": 0, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": + true, "openAccessPdf": {"url": "https://www.jstage.jst.go.jp/article/cpb1958/13/11/13_11_1341/_pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1965-11-25", "journal": + {"name": "Chemical & pharmaceutical bulletin", "pages": "\n 1341-5\n ", + "volume": "13 11"}, "authors": [{"authorId": "46542632", "name": "M. Tomita"}, + {"authorId": "3271363", "name": "K. Fujitani"}, {"authorId": "78271404", "name": + "Y. Aoyagi"}]}, {"paperId": "ded36c092f2b59bdb03553ba57103525a5820e2b", "externalIds": + {"MAG": "2067758534", "DBLP": "journals/jilsa/PacelliA11", "DOI": "10.4236/jilsa.2011.32012", + "CorpusId": 14717278}, "corpusId": 14717278, "publicationVenue": {"id": "b00ad1c9-e895-4b83-9a73-b8abb2cf7a8f", + "name": "Journal of Intelligent Learning Systems and Applications", "type": + "journal", "alternate_names": ["J Intell Learn Syst Appl"], "issn": "2150-8402", + "url": "https://www.scirp.org/journal/jilsa/"}, "url": "https://www.semanticscholar.org/paper/ded36c092f2b59bdb03553ba57103525a5820e2b", + "title": "An Artificial Neural Network Approach for Credit Risk Management", + "abstract": "The objective of the research is to analyze the ability of the + artificial neural network model developed to forecast the credit risk of a + panel of Italian manufacturing companies. In a theoretical point of view, + this paper introduces a litera-ture review on the application of artificial + intelligence systems for credit risk management. In an empirical point of + view, this research compares the architecture of the artificial neural network + model developed in this research to an-other one, built for a research conducted + in 2004 with a similar panel of companies, showing the differences between + the two neural network models.", "venue": "Journal of Intelligent Learning + Systems and Applications", "year": 2011, "referenceCount": 19, "citationCount": + 84, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.scirp.org/journal/PaperDownload.aspx?paperID=4587", "status": + "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2011-04-08", "journal": {"name": "J. Intell. Learn. Syst. Appl.", "pages": + "103-112", "volume": "3"}, "authors": [{"authorId": "1805187", "name": "Vincenzo + Pacelli"}, {"authorId": "46818157", "name": "Michele Azzollini"}]}, {"paperId": + "913adf0c5ebe052ed9deda187020a9019dab85be", "externalIds": {"MAG": "2096798913", + "DBLP": "journals/tit/OrlitskySZ04", "DOI": "10.1109/TIT.2004.830761", "CorpusId": + 6281206}, "corpusId": 6281206, "publicationVenue": {"id": "748e730b-add9-47ee-819d-8ae54e504ef9", + "name": "IEEE Transactions on Information Theory", "type": "journal", "alternate_names": + ["IEEE Trans Inf Theory"], "issn": "0018-9448", "url": "http://www.comm.utoronto.ca/trans-it/", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?puNumber=18", + "http://ieeexplore.ieee.org/servlet/opac?punumber=18"]}, "url": "https://www.semanticscholar.org/paper/913adf0c5ebe052ed9deda187020a9019dab85be", + "title": "Universal compression of memoryless sources over unknown alphabets", + "abstract": "It has long been known that the compression redundancy of independent + and identically distributed (i.i.d.) strings increases to infinity as the + alphabet size grows. It is also apparent that any string can be described + by separately conveying its symbols, and its pattern-the order in which the + symbols appear. Concentrating on the latter, we show that the patterns of + i.i.d. strings over all, including infinite and even unknown, alphabets, can + be compressed with diminishing redundancy, both in block and sequentially, + and that the compression can be performed in linear time. To establish these + results, we show that the number of patterns is the Bell number, that the + number of patterns with a given number of symbols is the Stirling number of + the second kind, and that the redundancy of patterns can be bounded using + results of Hardy and Ramanujan on the number of integer partitions. The results + also imply an asymptotically optimal solution for the Good-Turing probability-estimation + problem.", "venue": "IEEE Transactions on Information Theory", "year": 2004, + "referenceCount": 48, "citationCount": 154, "influentialCitationCount": 11, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2004-07-01", "journal": {"name": "IEEE Transactions on + Information Theory", "pages": "1469-1481", "volume": "50"}, "authors": [{"authorId": + "1691155", "name": "A. Orlitsky"}, {"authorId": "1749038", "name": "N. Santhanam"}, + {"authorId": "2107964352", "name": "Junan Zhang"}]}, {"paperId": "a8262a186f9e8828abd6b90a5604d87fab5ed713", + "externalIds": {"DBLP": "journals/mima/Cleland02a", "MAG": "1858190227", "DOI": + "10.1023/A:1015606528623", "CorpusId": 17502528}, "corpusId": 17502528, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/a8262a186f9e8828abd6b90a5604d87fab5ed713", + "title": "On Effective Procedures", "abstract": null, "venue": "Minds and + Machines", "year": 2002, "referenceCount": 28, "citationCount": 25, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2002-05-01", "journal": {"name": "Minds + and Machines", "pages": "159-179", "volume": "12"}, "authors": [{"authorId": + "32624486", "name": "Carol E. Cleland"}]}, {"paperId": "27b606b5faa4bdff5ae7d36c0c9248490f5a56a0", + "externalIds": {"MAG": "2127014660", "DOI": "10.3144/EXPRESSPOLYMLETT.2012.6", + "CorpusId": 58940864}, "corpusId": 58940864, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/27b606b5faa4bdff5ae7d36c0c9248490f5a56a0", + "title": "Microscopic analysis of the morphology of seams in friction stir + welded polypropylene", "abstract": "Supermolecular structure of welded seams + prepared by friction stir welding (FSW) of polypropylene sheets has been studied + by optical and electron microscopy. It has been shown that in the central + parts of the seam spherulitic struc- tures similar to that of the base material + are formed, while at the borderline of the seam, a complex supermolecular + structure could be identified. Lower welding rotation speed resulted in a + border transition zone of more complex feature than the higher rotation speed + during FSW. This was accompanied by reduced joint efficiency.", "venue": "", + "year": 2012, "referenceCount": 24, "citationCount": 79, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Express + Polymer Letters", "pages": "54-62", "volume": "6"}, "authors": [{"authorId": + "48290117", "name": "Z. Kiss"}, {"authorId": "11235011", "name": "T. Czig\u00e1ny"}]}, + {"paperId": "b8b14007b452ba63b4012ada099acdcb054ced11", "externalIds": {"DBLP": + "journals/logcom/Lowe01", "MAG": "2109974256", "DOI": "10.1093/logcom/11.1.25", + "CorpusId": 10394769}, "corpusId": 10394769, "publicationVenue": {"id": "6832033a-c52f-4a30-a719-822a07bbd8fb", + "name": "Journal of Logic and Computation", "type": "journal", "alternate_names": + ["J Log Comput"], "issn": "0955-792X", "url": "https://academic.oup.com/logcom/issue", + "alternate_urls": ["http://logcom.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/b8b14007b452ba63b4012ada099acdcb054ced11", + "title": "Revision Sequences and Computers with an Infinite Amount of Time", + "abstract": "The author establishes a connection between Revision Theory of + Truth and Infinite Time Turing Machines as developed by Hamkins and Kidder. + The ideas from this paper have incited Welch to solve the limit rule problem + of revision theory.", "venue": "Journal of Logic and Computation", "year": + 2001, "referenceCount": 20, "citationCount": 33, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2001-02-01", "journal": {"name": "J. + Log. Comput.", "pages": "25-40", "volume": "11"}, "authors": [{"authorId": + "1740372", "name": "B. L\u00f6we"}]}, {"paperId": "b2f382e8529d471c2601b776acd0d3d47745365b", + "externalIds": {"MAG": "2900950960", "DOI": "10.1038/S41567-018-0358-7", "CorpusId": + 126274864, "PubMed": "31327978"}, "corpusId": 126274864, "publicationVenue": + {"id": "7e9db4a0-67c4-46c4-9b17-d48d100c2cb7", "name": "Nature Physics", "type": + "journal", "alternate_names": ["Nat Phys"], "issn": "1745-2473", "url": "http://www.nature.com/nphys/", + "alternate_urls": ["http://www.nature.com/nphys/archive/index.html", "http://www.nature.com/nphys/index.html"]}, + "url": "https://www.semanticscholar.org/paper/b2f382e8529d471c2601b776acd0d3d47745365b", + "title": "Guiding self-organized pattern formation in cell polarity establishment", + "abstract": null, "venue": "Nature Physics", "year": 2018, "referenceCount": + 72, "citationCount": 67, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "https://europepmc.org/articles/pmc6640039?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2018-12-03", "journal": {"name": "Nature + Physics", "pages": "293-300", "volume": "15"}, "authors": [{"authorId": "2097712981", + "name": "P. Gross"}, {"authorId": "50385723", "name": "K. V. Kumar"}, {"authorId": + "4079035", "name": "N. Goehring"}, {"authorId": "2581310", "name": "J. Bois"}, + {"authorId": "5935317", "name": "Carsten Hoege"}, {"authorId": "3141258", + "name": "F. J\u00fclicher"}, {"authorId": "4288008", "name": "S. Grill"}]}, + {"paperId": "783ee610e05b4654312c7b92739249169b271dc9", "externalIds": {"MAG": + "2331039300", "CorpusId": 62786568}, "corpusId": 62786568, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/783ee610e05b4654312c7b92739249169b271dc9", + "title": "An Early Miocene elasmobranch fauna from the Navidad Formation, + Central Chile, South America", "abstract": "ture cited. Philippi (1887)provided + the first description of shark remains from this formation, commenting briefly + on a large tooth, which had been recovered from the Matanzas locality. That + toothwas described as Carchariasgiganteus Philippi and also compared with + a similar one from La Herradura locality (Coquimbo Formation). Both teeth + were illustrated in Phillipi\u2019s classic work (Phillipi, 1887) \u201c Los", + "venue": "", "year": 2006, "referenceCount": 66, "citationCount": 44, "influentialCitationCount": + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], + "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, {"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "104745009", + "name": "E. Su\u00e1rez"}, {"authorId": "12167443", "name": "A. Encinas"}, + {"authorId": "46378040", "name": "D. Ward"}]}, {"paperId": "01b5b648af61ddb382da638a299fae2315b25192", + "externalIds": {"DBLP": "journals/tissec/RoemerBSS12", "MAG": "2089448621", + "DOI": "10.1145/2133375.2133377", "CorpusId": 1870453}, "corpusId": 1870453, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/01b5b648af61ddb382da638a299fae2315b25192", + "title": "Return-Oriented Programming: Systems, Languages, and Applications", + "abstract": "We introduce return-oriented programming, a technique by which + an attacker can induce arbitrary behavior in a program whose control flow + he has diverted, without injecting any code. A return-oriented program chains + together short instruction sequences already present in a program\u2019s address + space, each of which ends in a \u201creturn\u201d instruction.\n Return-oriented + programming defeats the W\u2295X protections recently deployed by Microsoft, + Intel, and AMD; in this context, it can be seen as a generalization of traditional + return-into-libc attacks. But the threat is more general. Return-oriented + programming is readily exploitable on multiple architectures and systems. + It also bypasses an entire category of security measures---those that seek + to prevent malicious computation by preventing the execution of malicious + code.\n To demonstrate the wide applicability of return-oriented programming, + we construct a Turing-complete set of building blocks called gadgets using + the standard C libraries of two very different architectures: Linux/x86 and + Solaris/SPARC. To demonstrate the power of return-oriented programming, we + present a high-level, general-purpose language for describing return-oriented + exploits and a compiler that translates it to gadgets.", "venue": "TSEC", + "year": 2012, "referenceCount": 77, "citationCount": 484, "influentialCitationCount": + 58, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-01", "journal": + {"name": "ACM Trans. Inf. Syst. Secur.", "pages": "2:1-2:34", "volume": "15"}, + "authors": [{"authorId": "31923029", "name": "Ryan Roemer"}, {"authorId": + "153276898", "name": "E. Buchanan"}, {"authorId": "1786752", "name": "H. Shacham"}, + {"authorId": "1727599", "name": "S. Savage"}]}, {"paperId": "a454680557ac1b881f3f45ff8a79bc5c7df79c69", + "externalIds": {"MAG": "34780249", "DOI": "10.1007/978-1-4020-6710-5_9", "CorpusId": + 59643133}, "corpusId": 59643133, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a454680557ac1b881f3f45ff8a79bc5c7df79c69", + "title": "Turing\u2019s Test", "abstract": null, "venue": "", "year": 2009, + "referenceCount": 39, "citationCount": 11, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "119-138", "volume": ""}, "authors": [{"authorId": "143826040", "name": + "B. J. Copeland"}, {"authorId": "2066457130", "name": "Diane Proudfoot"}]}, + {"paperId": "bc393aa0295b4b6bbdbd38b8be51438853f56bfd", "externalIds": {"DBLP": + "conf/stoc/GathenKS93", "MAG": "1993505084", "DOI": "10.1007/BF01202042", + "CorpusId": 13925262}, "corpusId": 13925262, "publicationVenue": {"id": "dc6308c6-6bab-4b1d-9086-c28189f392f1", + "name": "Computational Complexity", "type": "journal", "alternate_names": + ["Comput Complex"], "issn": "1016-3328", "url": "https://www.springer.com/birkhauser/computer+science/journal/37", + "alternate_urls": ["https://link.springer.com/journal/37"]}, "url": "https://www.semanticscholar.org/paper/bc393aa0295b4b6bbdbd38b8be51438853f56bfd", + "title": "Counting curves and their projections", "abstract": null, "venue": + "Computational Complexity", "year": 1993, "referenceCount": 67, "citationCount": + 42, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Book", "JournalArticle"], "publicationDate": "1993-06-01", "journal": {"name": + "computational complexity", "pages": "64-99", "volume": "6"}, "authors": [{"authorId": + "1742357", "name": "J. Gathen"}, {"authorId": "1729473", "name": "M. Karpinski"}, + {"authorId": "1713214", "name": "I. Shparlinski"}]}, {"paperId": "462a708c013bbfa77b8c1bd570f3b288ef90777d", + "externalIds": {"DBLP": "journals/siamam/PengSW07", "MAG": "2079676773", "DOI": + "10.1137/05064624X", "CorpusId": 11282282}, "corpusId": 11282282, "publicationVenue": + {"id": "9b3052dd-9e29-41cb-927c-28df9e08a68b", "name": "SIAM Journal on Applied + Mathematics", "type": "journal", "alternate_names": ["SIAM J Appl Math", "Siam + Journal on Applied Mathematics", "Siam J Appl Math"], "issn": "0036-1399", + "url": "https://www.jstor.org/journal/siamjapplmath", "alternate_urls": ["https://epubs.siam.org/journal/smjmap", + "http://www.jstor.org/journals/00361399.html"]}, "url": "https://www.semanticscholar.org/paper/462a708c013bbfa77b8c1bd570f3b288ef90777d", + "title": "Stationary Pattern of a Ratio-Dependent Food Chain Model with Diffusion", + "abstract": "In the paper, we investigate a three-species food chain model + with diffusion and ratio-dependent predation functional response. We mainly + focus on the coexistence of the three species. For this coupled reaction-diffusion + system, we study the persistent property of the solution, the stability of + the constant positive steady state solution, and the existence and nonexistence + of nonconstant positive steady state solutions. Both the general stationary + pattern and Turing pattern are observed as a result of diffusion. Our results + also exhibit some interesting effects of diffusion and functional responses + on pattern formation.", "venue": "SIAM Journal on Applied Mathematics", "year": + 2007, "referenceCount": 47, "citationCount": 82, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://scholarworks.wm.edu/cgi/viewcontent.cgi?article=2194&context=aspubs", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-08-24", "journal": + {"name": "SIAM J. Appl. Math.", "pages": "1479-1503", "volume": "67"}, "authors": + [{"authorId": "145122505", "name": "R. Peng"}, {"authorId": "1728518", "name": + "Junping Shi"}, {"authorId": "2145476242", "name": "Mingxin Wang"}]}, {"paperId": + "4c5098ef0cb1885ee1036abb0dd211305d90ab83", "externalIds": {"MAG": "1991146349", + "DBLP": "conf/stoc/Venkateswaran87", "DOI": "10.1145/28395.28411", "CorpusId": + 15453831}, "corpusId": 15453831, "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", + "name": "Journal of computer and system sciences (Print)", "type": "journal", + "alternate_names": ["Journal of Computer and System Sciences", "J comput syst + sci (print", "J Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/4c5098ef0cb1885ee1036abb0dd211305d90ab83", + "title": "Properties that characterize LOGCFL", "abstract": "Two properties, + called semi-unboundedness, and polynomial proof-size, are identified as key + properties shared by the definitions of LOGCFL on several models of computations. + The semi-unboundedness property leads to the definition of new models of computation + based on unbounded fan-in circuits. These are circuits obtained from unbounded + fan-in circuits by restricting the fan-in of gates of one type. A new characterization + of LOGCFL is obtained on such a model in which the fan-in of the AND gates + are bounded by a constant. This property also suggests new characterizations + of LOGCFL on the following models: alternating Turing machines [CKS81], nondeterministic + auxiliary pushdown automata [Co71], and bounded fan-in Boolean circuits [Co85].", + "venue": "Journal of computer and system sciences (Print)", "year": 1987, + "referenceCount": 24, "citationCount": 153, "influentialCitationCount": 20, + "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/28395.28411", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Book"], "publicationDate": "1987-01-01", "journal": {"name": "Proceedings + of the nineteenth annual ACM symposium on Theory of computing"}, "authors": + [{"authorId": "2519792", "name": "H. Venkateswaran"}]}, {"paperId": "0c89403265a1b1c60603b32b0fa2d1c53130c0d3", + "externalIds": {"MAG": "1565852972", "DBLP": "conf/fct/Freivalds83", "DOI": + "10.1007/3-540-12689-9_101", "CorpusId": 35702817}, "corpusId": 35702817, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0c89403265a1b1c60603b32b0fa2d1c53130c0d3", + "title": "Space and Reversal Complexity of Probabilistic One-Way Turing Machines", + "abstract": null, "venue": "FCT", "year": 1983, "referenceCount": 5, "citationCount": + 20, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1983-08-21", "journal": {"pages": "159-170"}, "authors": [{"authorId": "1723667", + "name": "R. Freivalds"}]}, {"paperId": "5039ca73fd299f8436f08b373753655f6c0b4629", + "externalIds": {"MAG": "2065034429", "DBLP": "journals/siamcomp/Macarie98", + "DOI": "10.1137/S0097539793253851", "CorpusId": 14511916}, "corpusId": 14511916, + "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": + "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/5039ca73fd299f8436f08b373753655f6c0b4629", "title": "Space-Efficient Deterministic Simulation of Probabilistic Automata", "abstract": "Given a description of a probabilistic automaton (one-head probabilistic finite-state automaton or probabilistic Turing machine) and an input string @@ -33340,458 +38107,134 @@ interactions: compare deterministically a threshold with entries of the inverse of a given banded matrix.} \\end{itemize}", "venue": "SIAM journal on computing (Print)", "year": 1998, "referenceCount": 34, "citationCount": 32, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1998-04-01", "journal": {"name": "SIAM J. Comput.", "pages": "448-465", "volume": - "27"}, "authors": [{"authorId": "2085779840", "name": "I. Macarie"}]}, {"paperId": - "acc9f8384c0a927a12661422f3c113f369c24081", "externalIds": {"MAG": "137043087", - "DOI": "10.1007/978-3-662-05642-4_9", "CorpusId": 116312845}, "url": "https://www.semanticscholar.org/paper/acc9f8384c0a927a12661422f3c113f369c24081", - "title": "Quantum Computers: the Church-Turing Hypothesis Versus the Turing - Principle", "abstract": null, "venue": "", "year": 2004, "referenceCount": - 22, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "213-240", "volume": ""}, "authors": [{"authorId": "1956521", "name": - "C. Timpson"}]}, {"paperId": "0c89403265a1b1c60603b32b0fa2d1c53130c0d3", "externalIds": - {"MAG": "1565852972", "DBLP": "conf/fct/Freivalds83", "DOI": "10.1007/3-540-12689-9_101", - "CorpusId": 35702817}, "url": "https://www.semanticscholar.org/paper/0c89403265a1b1c60603b32b0fa2d1c53130c0d3", - "title": "Space and Reversal Complexity of Probabilistic One-Way Turing Machines", - "abstract": null, "venue": "FCT", "year": 1983, "referenceCount": 5, "citationCount": - 20, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1998-04-01", "journal": {"name": "SIAM J. Comput.", "pages": + "448-465", "volume": "27"}, "authors": [{"authorId": "2085779840", "name": + "I. Macarie"}]}, {"paperId": "be8856997c25fa5b078c6b9482657defa6aaedc6", "externalIds": + {"MAG": "2015088153", "DOI": "10.1177/0022343301038002007", "CorpusId": 109522443}, + "corpusId": 109522443, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/be8856997c25fa5b078c6b9482657defa6aaedc6", + "title": "Democracies and Intervention: Is there a Danger Zone in the Democratic + Peace?", "abstract": "By overlooking the full range of studies of democracy + and intervention that we have undertaken, Tures misrepresents our intentions + and our evidence. To clarify the definable patterns within democracies'' use + of interventions, we broaden his picture of our results to demonstrate where + his critique of our general findings is misleading. By focusing exclusively + on the methodological implications of only one part of our program of research, + Tures fails to recognize that how democracy and intervention are conceptualized + and operationalized can make a difference. Moreover, his critique misses entirely + our evidence showing that democracies use interventions for a variety of purposes + and with varying consequences, including strengthening their own security + and promoting the spread of liberal democratic institutions consistent with + the underlying logic of the democratic peace.", "venue": "", "year": 2001, + "referenceCount": 21, "citationCount": 38, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political + Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": + "external"}, {"category": "Political Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-03-01", "journal": {"name": + "Journal of Peace Research", "pages": "237 - 245", "volume": "38"}, "authors": + [{"authorId": "51408799", "name": "M. Hermann"}, {"authorId": "98208180", + "name": "Charles W. Kegley"}]}, {"paperId": "e11fab5eb2335b8b102c97cfcc68947125ec63ca", + "externalIds": {"MAG": "2764126013", "DBLP": "conf/icalp/BournezGP16", "ArXiv": + "1609.08059", "DOI": "10.4230/LIPIcs.ICALP.2016.109", "CorpusId": 1942575}, + "corpusId": 1942575, "publicationVenue": {"id": "5c1ee4fd-f14f-4d2a-9d42-1a1be373786a", + "name": "Journal of the ACM", "type": "journal", "alternate_names": ["J ACM"], + "issn": "1535-9921", "alternate_issns": ["0004-5411"], "url": "http://www.acm.org/jacm/", + "alternate_urls": ["http://portal.acm.org/jacm", "http://jacm.acm.org/", "https://jacm.acm.org/"]}, + "url": "https://www.semanticscholar.org/paper/e11fab5eb2335b8b102c97cfcc68947125ec63ca", + "title": "Polynomial Time Corresponds to Solutions of Polynomial Ordinary + Differential Equations of Polynomial Length", "abstract": "The outcomes of + this article are twofold. Implicit complexity. We provide an implicit characterization + of polynomial time computation in terms of ordinary differential equations: + we characterize the class P of languages computable in polynomial time in + terms of differential equations with polynomial right-hand side. This result + gives a purely continuous elegant and simple characterization of P. We believe + it is the first time complexity classes are characterized using only ordinary + differential equations. Our characterization extends to functions computable + in polynomial time over the reals in the sense of Computable Analysis. Our + results may provide a new perspective on classical complexity, by giving a + way to define complexity classes, like P, in a very simple way, without any + reference to a notion of (discrete) machine. This may also provide ways to + state classical questions about computational complexity via ordinary differential + equations. Continuous-Time Models of Computation. Our results can also be + interpreted in terms of analog computers or analog models of computation: + As a side effect, we get that the 1941 General Purpose Analog Computer (GPAC) + of Claude Shannon is provably equivalent to Turing machines both in terms + of computability and complexity, a fact that has never been established before. + This result provides arguments in favour of a generalised form of the Church-Turing + Hypothesis, which states that any physically realistic (macroscopic) computer + is equivalent to Turing machines both in terms of computability and complexity.", + "venue": "Journal of the ACM", "year": 2016, "referenceCount": 58, "citationCount": + 34, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1601.05360", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-01-20", "journal": {"name": "Journal of the ACM (JACM)", "pages": "1 + - 76", "volume": "64"}, "authors": [{"authorId": "1706341", "name": "Olivier + Bournez"}, {"authorId": "144473423", "name": "D. Gra\u00e7a"}, {"authorId": + "2885195", "name": "Amaury Pouly"}]}, {"paperId": "54de104297c74fc106ac35ee0a925e41074e3d16", + "externalIds": {"MAG": "2492600948", "DOI": "10.2298/TSCI1603779L", "CorpusId": + 54643197}, "corpusId": 54643197, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/54de104297c74fc106ac35ee0a925e41074e3d16", + "title": "A fractional model for insulation clothings with cocoon-like porous + structure", "abstract": "Both silk worm co coons and wild silk worm co coons + have ex cel lent me chan i cal prop er ties, as a pro tec tive bar rier against + en vi ron men tal dam age and at tack by nat u ral pred a tors. In par tic + u lar, this multilayer po rous struc ture can be ex cep tion ally tough to + en hance the chance of sur vival for pu pas while sup port ing their met a + bolic ac tiv ity. Here, a frac tional de riv a tive is de fined through the + variational it er a tion method, and its ap pli ca tion to ex plain ing the + out stand ing ther mal pro tec tion of in su la tion clothings with co coon-like + po rous struc ture is elu ci dated. The fractal hi er ar chic struc ture of + in su la tion clothings makes hu man body math e mat i cally adapted for ex + treme tem per a ture en vi ron ment.", "venue": "", "year": 2016, "referenceCount": + 22, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.doiserbia.nb.rs/ft.aspx?id=0354-98361603779L", + "status": "GOLD"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1983-08-21", "journal": - {"pages": "159-170"}, "authors": [{"authorId": "1723667", "name": "R. Freivalds"}]}, - {"paperId": "4c5098ef0cb1885ee1036abb0dd211305d90ab83", "externalIds": {"MAG": - "1991146349", "DBLP": "conf/stoc/Venkateswaran87", "DOI": "10.1145/28395.28411", - "CorpusId": 15453831}, "url": "https://www.semanticscholar.org/paper/4c5098ef0cb1885ee1036abb0dd211305d90ab83", - "title": "Properties that characterize LOGCFL", "abstract": "Two properties, - called semi-unboundedness, and polynomial proof-size, are identified as key - properties shared by the definitions of LOGCFL on several models of computations. - The semi-unboundedness property leads to the definition of new models of computation - based on unbounded fan-in circuits. These are circuits obtained from unbounded - fan-in circuits by restricting the fan-in of gates of one type. A new characterization - of LOGCFL is obtained on such a model in which the fan-in of the AND gates - are bounded by a constant. This property also suggests new characterizations - of LOGCFL on the following models: alternating Turing machines [CKS81], nondeterministic - auxiliary pushdown automata [Co71], and bounded fan-in Boolean circuits [Co85].", - "venue": "Journal of computer and system sciences (Print)", "year": 1987, - "referenceCount": 24, "citationCount": 153, "influentialCitationCount": 20, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book"], "publicationDate": "1987-01-01", "journal": {"name": "Proceedings - of the nineteenth annual ACM symposium on Theory of computing"}, "authors": - [{"authorId": "2519792", "name": "H. Venkateswaran"}]}, {"paperId": "bc393aa0295b4b6bbdbd38b8be51438853f56bfd", - "externalIds": {"DBLP": "conf/stoc/GathenKS93", "MAG": "1993505084", "DOI": - "10.1007/BF01202042", "CorpusId": 13925262}, "url": "https://www.semanticscholar.org/paper/bc393aa0295b4b6bbdbd38b8be51438853f56bfd", - "title": "Counting curves and their projections", "abstract": null, "venue": - "Computational Complexity", "year": 1993, "referenceCount": 67, "citationCount": - 42, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], - "publicationDate": "1993-06-01", "journal": {"name": "computational complexity", - "pages": "64-99", "volume": "6"}, "authors": [{"authorId": "1742357", "name": - "J. Gathen"}, {"authorId": "1729473", "name": "M. Karpinski"}, {"authorId": - "1713214", "name": "I. Shparlinski"}]}, {"paperId": "4bd5e15ab7de55555f6a946e9723a370d6ac516e", - "externalIds": {"DBLP": "conf/sigecom/MenasceARRFM00", "MAG": "2089664152", - "DOI": "10.1145/352871.352878", "CorpusId": 5181696}, "url": "https://www.semanticscholar.org/paper/4bd5e15ab7de55555f6a946e9723a370d6ac516e", - "title": "In search of invariants for e-business workloads", "abstract": "ABSTRACT - Understanding the nature and hara teristi s of e-business workloads is a ru - ial step to improve the quality of servi e o ered to ustomers in ele troni - business environments. However, the variety and omplexity of the intera tions - between ustomers and sites make the hara terization of ebusiness workloads - a hallenging problem. Using a multilayer hierar hi al model, this paper presents - a detailed hara terization of the workload of two a tual e-business sites: - an online bookstore and an ele troni au tion site. Through the hara terization - pro ess, we found the presen e of autonomous agents, or robots, in the workload - and used the hierar hi al stru ture to determine their hara teristi s. We - also found that sear h terms follow a Zipf distribution.", "venue": "ACM Conference - on Economics and Computation", "year": 2000, "referenceCount": 25, "citationCount": - 150, "influentialCitationCount": 13, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-10-17", "journal": - {"pages": "56-65"}, "authors": [{"authorId": "1758079", "name": "D. Menasc\u00e9"}, - {"authorId": "145624017", "name": "Virg\u00edlio A. F. Almeida"}, {"authorId": - "2960748", "name": "R. Riedi"}, {"authorId": "144776057", "name": "Fl\u00e1via - Ribeiro"}, {"authorId": "145502789", "name": "Rodrigo Fonseca"}, {"authorId": - "1691267", "name": "Wagner Meira Jr"}]}, {"paperId": "53f1a7ac0398cce4ce049fd5e2d79e67925a492c", - "externalIds": {"DBLP": "journals/aim/AdamsBC16", "MAG": "2394902045", "DOI": - "10.1609/aimag.v37i1.2643", "CorpusId": 2925946}, "url": "https://www.semanticscholar.org/paper/53f1a7ac0398cce4ce049fd5e2d79e67925a492c", - "title": "I-athlon: Towards A Multidimensional Turing Test", "abstract": "While - the Turing test is a well-known method for evaluating machine intelligence, - it has a number of drawbacks that make it problematic as a rigorous and practical - test for assessing progress in general-purpose AI. For example, the Turing - test is deception based, subjectively evaluated, and narrowly focused on language - use. We suggest that a test would benefit from including the following requirements: - focus on rational behavior, test several dimensions of intelligence, automate - as much as possible, score as objectively as possible, and allow incremental - progress to be measured. In this article we propose a methodology for designing - a test that consists of a series of events, analogous to the Olympic Decathlon, - which complies with these requirements. The approach, which we call the I-athlon, - is intended to ultimately enable the community to evaluate progress towards - machine intelligence in a practical and repeatable way.", "venue": "The AI - Magazine", "year": 2016, "referenceCount": 1, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-04-13", "journal": {"name": "AI Mag.", "pages": "78-84", - "volume": "37"}, "authors": [{"authorId": "153876154", "name": "S. S. Adams"}, - {"authorId": "1789880", "name": "G. Banavar"}, {"authorId": "143903370", "name": - "Murray Campbell"}]}, {"paperId": "13ade4536f146dc8d11b369dccac5032ca210a2c", - "externalIds": {"MAG": "1978524140", "DOI": "10.1080/87567555.1992.10532239", - "CorpusId": 144206761}, "url": "https://www.semanticscholar.org/paper/13ade4536f146dc8d11b369dccac5032ca210a2c", - "title": "Overcoming the Drawbacks of the Large Lecture Class", "abstract": - "class time. Also, instructors in large lec tures tend to be remote?inaccessible - authority figures at the front of the class. Finally, the seating arrangement - em phasizes the student position as a spec tator, producing a passive audience - that expects to be entertained and informed by the performer. These five drawbacks - all point to a lack of involvement and a feeling of remoteness in the large - lecture classroom. Other studies point out that testing is another special - problem associated with the large lecture. Although writing across the curriculum - is a worthy goal, correcting 250 essay exams is difficult.", "venue": "", - "year": 1992, "referenceCount": 7, "citationCount": 80, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-11-01", - "journal": {"name": "College Teaching", "pages": "151-154", "volume": "40"}, - "authors": [{"authorId": "66274480", "name": "Joel Geske"}]}, {"paperId": - "af19a8bda0a584714c4802933d280bfe76605473", "externalIds": {"MAG": "2619020951", - "DOI": "10.1007/978-3-319-53280-6_5", "CorpusId": 195976673}, "url": "https://www.semanticscholar.org/paper/af19a8bda0a584714c4802933d280bfe76605473", - "title": "Turing on \u201cCommon Sense\u201d: Cambridge Resonances", "abstract": - null, "venue": "", "year": 2017, "referenceCount": 118, "citationCount": 14, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "103-149", "volume": ""}, "authors": - [{"authorId": "39423496", "name": "J. Floyd"}]}, {"paperId": "7bd1ffd7bf9d0581f68d7cc37c6400755e5d77c0", - "externalIds": {"MAG": "1987166952", "DOI": "10.1103/PHYSREVE.71.066217", - "CorpusId": 12643110, "PubMed": "16089859"}, "url": "https://www.semanticscholar.org/paper/7bd1ffd7bf9d0581f68d7cc37c6400755e5d77c0", - "title": "Turing instability controlled by spatiotemporal imposed dynamics.", - "abstract": "The study of the spatiotemporal response of pattern forming systems - to spatially resonant external forcing has unveiled striking new phenomena - which challenge the understanding of self-organization in nonlinear, nonequilibrium - systems. Here we show that a simple spatiotemporal two-dimensional forcing - of a system supporting an intrinsic wavelength but no intrinsic frequency, - under conditions of spatial resonance, may induce complex and entirely new - spatiotemporal behaviors which do not reflect in any simple way the structure - of the imposed forcing. We demonstrate this phenomenon in the Turing regime - of the (photosensitive) CDIMA reaction by projecting a traveling stripe light - pattern onto the reactor. By controlling the velocity of the forcing we induce - distinct dynamical regimes that express the externally imposed frequency in - new and intriguing ways. A detailed analysis of the experimental relevant - parameters is presented.", "venue": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "year": 2005, "referenceCount": 27, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-06-30", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 066217\n ", - "volume": "71 6 Pt 2"}, "authors": [{"authorId": "2701200", "name": "D. G. - M\u00edguez"}, {"authorId": "1399331338", "name": "V. P\u00e9rez-Villar"}, - {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}]}, {"paperId": "ad9ed24d729c70f0f1a97106da03c60de9e9dbb7", - "externalIds": {"MAG": "3090553240", "DBLP": "conf/fun/ChurchillBH21", "ArXiv": - "1904.09828", "DOI": "10.4230/LIPIcs.FUN.2021.9", "CorpusId": 128281108}, - "url": "https://www.semanticscholar.org/paper/ad9ed24d729c70f0f1a97106da03c60de9e9dbb7", - "title": "Magic: The Gathering is Turing Complete", "abstract": "$\\textit{Magic: - The Gathering}$ is a popular and famously complicated trading card game about - magical combat. In this paper we show that optimal play in real-world $\\textit{Magic}$ - is at least as hard as the Halting Problem, solving a problem that has been - open for a decade. To do this, we present a methodology for embedding an arbitrary - Turing machine into a game of $\\textit{Magic}$ such that the first player - is guaranteed to win the game if and only if the Turing machine halts. Our - result applies to how real $\\textit{Magic}$ is played, can be achieved using - standard-size tournament-legal decks, and does not rely on stochasticity or - hidden information. Our result is also highly unusual in that all moves of - both players are forced in the construction. This shows that even recognising - who will win a game in which neither player has a non-trivial decision to - make for the rest of the game is undecidable. We conclude with a discussion - of the implications for a unified computational theory of games and remarks - about the playability of such a board in a tournament setting.", "venue": - "FUN", "year": 2019, "referenceCount": 14, "citationCount": 20, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-03-01", "journal": {"pages": "9:1-9:19"}, "authors": - [{"authorId": "104183642", "name": "Alexandrea Churchill"}, {"authorId": "103476203", - "name": "Stella Rose Biderman"}, {"authorId": "103829114", "name": "Austin - Herrick"}]}, {"paperId": "789e3fc8d7942c9f23f45d91dcddfc3f43f43449", "externalIds": - {"MAG": "2734490910", "DBLP": "journals/aim/Lenat16", "DOI": "10.1609/AIMAG.V37I1.2644", - "CorpusId": 39995322}, "url": "https://www.semanticscholar.org/paper/789e3fc8d7942c9f23f45d91dcddfc3f43f43449", - "title": "WWTS (What Would Turing Say?)", "abstract": "Turing\u2019s Imitation - Game was a brilliant early proposed test of machine intelligence \u2014 one - that is still compelling, today, despite the fact that in the hindsight of - all that we\u2019ve learned in the intervening 65 years we can see the flaws - in his original test. And our field needs a good \u201cIs it AI yet?\u201d - test more than ever, today, with so many of us spending our research time - looking under the \u201cshallow processing of big data\u201d lamppost. If - Turing were alive today, what sort of test might he propose?", "venue": "AI - Mag.", "year": 2016, "referenceCount": 8, "citationCount": 15, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + null, "publicationDate": null, "journal": {"name": "Thermal Science", "pages": + "779-784", "volume": "20"}, "authors": [{"authorId": "2027299049", "name": + "Liu Fujuan"}, {"authorId": "2026199542", "name": "Wang Ping"}, {"authorId": + "2152819372", "name": "Yan Zhang"}, {"authorId": "2115669224", "name": "Hong-Yan + Liu"}, {"authorId": "98906014", "name": "Ji-Huan He"}]}, {"paperId": "789e3fc8d7942c9f23f45d91dcddfc3f43f43449", + "externalIds": {"MAG": "2734490910", "DBLP": "journals/aim/Lenat16", "DOI": + "10.1609/AIMAG.V37I1.2644", "CorpusId": 39995322}, "corpusId": 39995322, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/789e3fc8d7942c9f23f45d91dcddfc3f43f43449", + "title": "WWTS (What Would Turing Say?)", "abstract": "Turing\u2019s Imitation + Game was a brilliant early proposed test of machine intelligence \u2014 one + that is still compelling, today, despite the fact that in the hindsight of + all that we\u2019ve learned in the intervening 65 years we can see the flaws + in his original test. And our field needs a good \u201cIs it AI yet?\u201d + test more than ever, today, with so many of us spending our research time + looking under the \u201cshallow processing of big data\u201d lamppost. If + Turing were alive today, what sort of test might he propose?", "venue": "AI + Mag.", "year": 2016, "referenceCount": 8, "citationCount": 15, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://aaai.org/ojs/index.php/aimagazine/article/download/2644/2540", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2016-04-13", "journal": {"name": "AI Mag.", "pages": "97-101", "volume": "37"}, "authors": [{"authorId": "1704635", "name": "D. Lenat"}]}, - {"paperId": "783ee610e05b4654312c7b92739249169b271dc9", "externalIds": {"MAG": - "2331039300", "CorpusId": 62786568}, "url": "https://www.semanticscholar.org/paper/783ee610e05b4654312c7b92739249169b271dc9", - "title": "An Early Miocene elasmobranch fauna from the Navidad Formation, - Central Chile, South America", "abstract": "ture cited. Philippi (1887)provided - the first description of shark remains from this formation, commenting briefly - on a large tooth, which had been recovered from the Matanzas locality. That - toothwas described as Carchariasgiganteus Philippi and also compared with - a similar one from La Herradura locality (Coquimbo Formation). Both teeth - were illustrated in Phillipi\u2019s classic work (Phillipi, 1887) \u201c Los", - "venue": "", "year": 2006, "referenceCount": 66, "citationCount": 44, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": - [{"category": "Geology", "source": "external"}, {"category": "History", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "104745009", "name": - "E. Su\u00e1rez"}, {"authorId": "12167443", "name": "A. Encinas"}, {"authorId": - "46378040", "name": "D. Ward"}]}, {"paperId": "91c239d3d6ea6b59635d24cc70988455f3928f48", - "externalIds": {"MAG": "1964625848", "ArXiv": "q-bio/0701012", "DOI": "10.1103/PhysRevE.75.051913", - "CorpusId": 410950, "PubMed": "17677104"}, "url": "https://www.semanticscholar.org/paper/91c239d3d6ea6b59635d24cc70988455f3928f48", - "title": "Spatiotemporal complexity of a ratio-dependent predator-prey system.", - "abstract": "In this paper, we investigate the emergence of a ratio-dependent - predator-prey system with Michaelis-Menten-type functional response and reaction - diffusion. We obtain the conditions of Hopf, Turing, and wave bifurcation - in a spatial domain. Furthermore, we present a theoretical analysis of evolutionary - processes that involves organisms distribution and their interaction of spatially - distributed population with local diffusion. The results of numerical simulations - reveal that the typical dynamics of population density variation is the formation - of isolated groups, i.e., stripelike or spotted or coexistence of both. Our - study shows that the spatially extended model has not only more complex dynamic - patterns in the space, but also chaos and spiral waves. It may help us better - understand the dynamics of an aquatic community in a real marine environment.", - "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "year": 2007, "referenceCount": 66, "citationCount": 149, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine", "Biology"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-01-07", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 051913\n ", - "volume": "75 5 Pt 1"}, "authors": [{"authorId": "2116103578", "name": "Weiming - Wang"}, {"authorId": "47362020", "name": "Quan\u2010Xing Liu"}, {"authorId": - "145752193", "name": "Zhen Jin"}]}, {"paperId": "913adf0c5ebe052ed9deda187020a9019dab85be", - "externalIds": {"MAG": "2096798913", "DBLP": "journals/tit/OrlitskySZ04", - "DOI": "10.1109/TIT.2004.830761", "CorpusId": 6281206}, "url": "https://www.semanticscholar.org/paper/913adf0c5ebe052ed9deda187020a9019dab85be", - "title": "Universal compression of memoryless sources over unknown alphabets", - "abstract": "It has long been known that the compression redundancy of independent - and identically distributed (i.i.d.) strings increases to infinity as the - alphabet size grows. It is also apparent that any string can be described - by separately conveying its symbols, and its pattern-the order in which the - symbols appear. Concentrating on the latter, we show that the patterns of - i.i.d. strings over all, including infinite and even unknown, alphabets, can - be compressed with diminishing redundancy, both in block and sequentially, - and that the compression can be performed in linear time. To establish these - results, we show that the number of patterns is the Bell number, that the - number of patterns with a given number of symbols is the Stirling number of - the second kind, and that the redundancy of patterns can be bounded using - results of Hardy and Ramanujan on the number of integer partitions. The results - also imply an asymptotically optimal solution for the Good-Turing probability-estimation - problem.", "venue": "IEEE Transactions on Information Theory", "year": 2004, - "referenceCount": 48, "citationCount": 154, "influentialCitationCount": 11, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2004-07-01", "journal": {"name": "IEEE Transactions on Information Theory", - "pages": "1469-1481", "volume": "50"}, "authors": [{"authorId": "1691155", - "name": "A. Orlitsky"}, {"authorId": "1749038", "name": "N. Santhanam"}, {"authorId": - "2107964352", "name": "Junan Zhang"}]}, {"paperId": "9c25610263a24da92c652f13d2240958f7fa40d7", - "externalIds": {"DBLP": "conf/mcu/Morita01", "MAG": "1502959083", "DOI": "10.1007/3-540-45132-3_6", - "CorpusId": 23261290}, "url": "https://www.semanticscholar.org/paper/9c25610263a24da92c652f13d2240958f7fa40d7", + {"paperId": "9c25610263a24da92c652f13d2240958f7fa40d7", "externalIds": {"DBLP": + "conf/mcu/Morita01", "MAG": "1502959083", "DOI": "10.1007/3-540-45132-3_6", + "CorpusId": 23261290}, "corpusId": 23261290, "publicationVenue": {"id": "c70b16dd-3be4-41cc-8494-33d2b373f5b9", + "name": "Machines, Computations, and Universality", "type": "conference", + "alternate_names": ["Mach Comput Universality", "MCU"]}, "url": "https://www.semanticscholar.org/paper/9c25610263a24da92c652f13d2240958f7fa40d7", "title": "A Simple Universal Logic Element and Cellular Automata for Reversible Computing", "abstract": null, "venue": "Machines, Computations, and Universality", "year": 2001, "referenceCount": 12, "citationCount": 80, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-05-23", "journal": {"pages": "102-113"}, "authors": - [{"authorId": "144254676", "name": "K. Morita"}]}, {"paperId": "be8856997c25fa5b078c6b9482657defa6aaedc6", - "externalIds": {"MAG": "2015088153", "DOI": "10.1177/0022343301038002007", - "CorpusId": 109522443}, "url": "https://www.semanticscholar.org/paper/be8856997c25fa5b078c6b9482657defa6aaedc6", - "title": "Democracies and Intervention: Is there a Danger Zone in the Democratic - Peace?", "abstract": "By overlooking the full range of studies of democracy - and intervention that we have undertaken, Tures misrepresents our intentions - and our evidence. To clarify the definable patterns within democracies'' use - of interventions, we broaden his picture of our results to demonstrate where - his critique of our general findings is misleading. By focusing exclusively - on the methodological implications of only one part of our program of research, - Tures fails to recognize that how democracy and intervention are conceptualized - and operationalized can make a difference. Moreover, his critique misses entirely - our evidence showing that democracies use interventions for a variety of purposes - and with varying consequences, including strengthening their own security - and promoting the spread of liberal democratic institutions consistent with - the underlying logic of the democratic peace.", "venue": "", "year": 2001, - "referenceCount": 21, "citationCount": 38, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": - [{"category": "Political Science", "source": "external"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2001-03-01", "journal": {"name": "Journal of Peace Research", "pages": "237 - - 245", "volume": "38"}, "authors": [{"authorId": "51408799", "name": "M. - Hermann"}, {"authorId": "98208180", "name": "Charles W. Kegley"}]}, {"paperId": - "c130ad9c0d99d9a0f0ec2b633c43dc3446dd29b6", "externalIds": {"MAG": "147821881", - "CorpusId": 58819055}, "url": "https://www.semanticscholar.org/paper/c130ad9c0d99d9a0f0ec2b633c43dc3446dd29b6", - "title": "Rethinking Cognitive Computation: Turing and the Science of the - Mind", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": - 36, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": null, "publicationDate": "2005-12-17", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "48060981", - "name": "A. Wells"}]}, {"paperId": "848d9bcb6ccbdae45e76f29d1b8a604d740614a5", - "externalIds": {"DBLP": "journals/connection/Hadley00", "MAG": "2013741536", - "DOI": "10.1080/09540090050129745", "CorpusId": 35698596}, "url": "https://www.semanticscholar.org/paper/848d9bcb6ccbdae45e76f29d1b8a604d740614a5", - "title": "Cognition and the computational power of connectionist networks", - "abstract": "This paper examines certain claims of ''cognitive significance'' - which (wisely or not) have been based upon the theoretical powers of three - distinct classes of connectionist networks, namely, the ''universal function - approximators'', recurrent finite-state simulation networks and Turing equivalent - networks. Each class will be considered with respect to its potential in the - realm of cognitive modelling. Regarding the first class, I argue that, contrary - to the claims of some influential connectionists, feed-forward networks do - not possess the theoretical capacity to approximate all functions of interest - to cognitive scientists. For example, they cannot approximate many important, - recursive (halting) functions which map symbolic strings onto other symbolic - strings. By contrast, I argue that a certain class of recurrent networks (i.e. - those which closely approximate deterministic finite automata (DFA)) shows - considerably greater promise in some domains. However, from a cognitive standpoint, - difficulties arise when we consider how the relevant recurrent networks could - acquire the weight vectors needed to support DFA simulations. These difficulties - are severe in the realm of central high-level cognitive functions. In addition, - the class of Turing equivalent networks is here examined. It is argued that - the relevance ofsuch networks to cognitive modelling is seriously undermined - by their reliance on infinite precision in crucial weights and/or node activations. - I also examine what advantages these networks might conceivably possess over - and above classical symbolic algorithms. For, from a cognitive standpoint, - the Turing equivalent networks present difficulties very similar to certain - classical algorithms; they appear highly contrived, their structure is fragile - and they exhibit little or no noise tolerance.", "venue": "Connect. Sci.", - "year": 2000, "referenceCount": 30, "citationCount": 48, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-06-01", "journal": {"name": "Connection Science", - "pages": "110 - 95", "volume": "12"}, "authors": [{"authorId": "34654709", - "name": "Robert F. Hadley"}]}, {"paperId": "6927252ba7c544ce213c319133ae22bbe045281f", - "externalIds": {"MAG": "1489274344", "DOI": "10.1090/S0002-9939-1992-1065942-0", - "CorpusId": 118727246}, "url": "https://www.semanticscholar.org/paper/6927252ba7c544ce213c319133ae22bbe045281f", - "title": "Orderings with th jump degree 0", "abstract": "This paper completes - an investigation of \"jumps\" of orderings. The last few cases are given in - the proof that for each recursive ordinal a > 1 and for each Turing degree - d > O''\"'' , there is a linear ordering A such that d is least among the - ath jumps of degrees of (open diagrams of) isomorphic copies of A , and for - s < a , the set of sxh jumps of degrees of copies of A has no least element.", - "venue": "", "year": 1992, "referenceCount": 7, "citationCount": 55, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-02-01", - "journal": {"name": "", "pages": "545-552", "volume": "114"}, "authors": [{"authorId": - "145948982", "name": "R. Downey"}, {"authorId": "2061861694", "name": "Julia - A. Knight"}]}, {"paperId": "3464509cee1c3d5d3e8c5d862472b8d59fd46f5f", "externalIds": - {"MAG": "2098266472", "DOI": "10.1177/002199838902301205", "CorpusId": 137477511}, - "url": "https://www.semanticscholar.org/paper/3464509cee1c3d5d3e8c5d862472b8d59fd46f5f", - "title": "Internal State Variable Approach for Predicting Stiffness Reductions - in Fibrous Laminated Composites with Matrix Cracks", "abstract": "A mathematical - model utilizing the Internal State Variable (ISV) concept is proposed for - predicting the upper bound of the reduced axial stiffnesses in cross-ply lami - nates with matrix cracks. The axial crack opening displacement is explicitly - expressed in terms of the observable axial strain and the undamaged material - properties. A crack parameter representing the effect of matrix cracks on - the observable axial Young''s modulus is calculated for glass/epoxy and graphite/epoxy - material systems. The results of the present study show that the matrix crack - opening displacement and conse quently the effective Young''s modulus depends - not on the crack length but on its ratio to the crack spacing. Comparisons - of the present model with experimental data and other models in the litera - ture show a good agreement, thus confirming direct applicability of the model - to [0 p /90 r ] s type laminates.", "venue": "", "year": 1989, "referenceCount": - 24, "citationCount": 152, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1989-12-01", "journal": - {"name": "Journal of Composite Materials", "pages": "1273 - 1291", "volume": - "23"}, "authors": [{"authorId": "1915723937", "name": "Jong-Won Lee"}, {"authorId": - "152765934", "name": "D. Allen"}, {"authorId": "18575315", "name": "C. Harris"}]}, - {"paperId": "54de104297c74fc106ac35ee0a925e41074e3d16", "externalIds": {"MAG": - "2492600948", "DOI": "10.2298/TSCI1603779L", "CorpusId": 54643197}, "url": - "https://www.semanticscholar.org/paper/54de104297c74fc106ac35ee0a925e41074e3d16", - "title": "A fractional model for insulation clothings with cocoon-like porous - structure", "abstract": "Both silk worm co coons and wild silk worm co coons - have ex cel lent me chan i cal prop er ties, as a pro tec tive bar rier against - en vi ron men tal dam age and at tack by nat u ral pred a tors. In par tic - u lar, this multilayer po rous struc ture can be ex cep tion ally tough to - en hance the chance of sur vival for pu pas while sup port ing their met a - bolic ac tiv ity. Here, a frac tional de riv a tive is de fined through the - variational it er a tion method, and its ap pli ca tion to ex plain ing the - out stand ing ther mal pro tec tion of in su la tion clothings with co coon-like - po rous struc ture is elu ci dated. The fractal hi er ar chic struc ture of - in su la tion clothings makes hu man body math e mat i cally adapted for ex - treme tem per a ture en vi ron ment.", "venue": "", "year": 2016, "referenceCount": - 22, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Thermal Science", "pages": - "779-784", "volume": "20"}, "authors": [{"authorId": "2027299049", "name": - "Liu Fujuan"}, {"authorId": "2026199542", "name": "Wang Ping"}, {"authorId": - "2152819372", "name": "Yan Zhang"}, {"authorId": "2115669224", "name": "Hong-Yan - Liu"}, {"authorId": "98906014", "name": "Ji-Huan He"}]}, {"paperId": "e3e43036591bced6ac0c276ad567460110d48a51", - "externalIds": {"MAG": "1996654684", "DOI": "10.1149/2.040204JES", "CorpusId": - 96320821}, "url": "https://www.semanticscholar.org/paper/e3e43036591bced6ac0c276ad567460110d48a51", - "title": "Extreme Bottom-Up Superfilling of Through-Silicon-Vias by Damascene - Processing: Suppressor Disruption, Positive Feedback and Turing Patterns", - "abstract": null, "venue": "", "year": 2012, "referenceCount": 64, "citationCount": - 153, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Journal of The Electrochemical Society", "volume": "159"}, - "authors": [{"authorId": "32681085", "name": "T. Moffat"}, {"authorId": "2724858", - "name": "D. Josell"}]}, {"paperId": "4ad85270adda971edb25d1035b3fe21293ea01a3", - "externalIds": {"MAG": "1557190042", "DOI": "10.1038/35002528", "CorpusId": - 4415368, "PubMed": "10706278"}, "url": "https://www.semanticscholar.org/paper/4ad85270adda971edb25d1035b3fe21293ea01a3", - "title": "Geometric quantum computation using nuclear magnetic resonance", - "abstract": null, "venue": "Nature", "year": 2000, "referenceCount": 20, "citationCount": - 486, "influentialCitationCount": 10, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-02-24", "journal": {"name": "Nature", "pages": "869-871", - "volume": "403"}, "authors": [{"authorId": "143956532", "name": "Jonathan - A. Jones"}, {"authorId": "3350529", "name": "V. Vedral"}, {"authorId": "1803313", - "name": "A. Ekert"}, {"authorId": "2066395", "name": "G. Castagnoli"}]}, {"paperId": - "20f280b905c4246d2664f9605a2319602712cbf7", "externalIds": {"MAG": "2051014086", - "DOI": "10.2307/3243868", "CorpusId": 84922229}, "url": "https://www.semanticscholar.org/paper/20f280b905c4246d2664f9605a2319602712cbf7", - "title": "Using Lichen Tissue Cultures in Modern Biology", "abstract": "We - conducted physiological, pharmacological, and chemical studies using tissue - cul- tures derived from natural lichens. Cultured tissues of about 200 lichen - species were initiated from vegetative thalli collected in various regions - of the world. The cultures grew on both complex and defined media. Growth - was significantly affected by temperature, as well as by carbon and nitrogen - sources. Some tissue cultures produced secondary substances (i.e., depsidones - and usnic acid), but most acetone extracts did not show the same patterns - of TLC spots as the corresponding natural thalli. Some lichen tissue cultures - produced more usnic acid than natural thalli. Several pharma- cological activities - were screened for both tissue cultures and natural lichens.", "venue": "", - "year": 1993, "referenceCount": 14, "citationCount": 81, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1993-01-23", - "journal": {"name": "The Bryologist", "pages": "384-393", "volume": "96"}, - "authors": [{"authorId": "49076753", "name": "Yoshikazu Yamamoto"}, {"authorId": - "36149111", "name": "Y. Miura"}, {"authorId": "81257362", "name": "M. Higuchi"}, - {"authorId": "49199680", "name": "Y. Kinoshita"}, {"authorId": "2031368674", - "name": "I. Yoshimura"}]}, {"paperId": "1986aa808b78ae4c845ca25b5e0014ff91374161", - "externalIds": {"MAG": "2135418520", "DOI": "10.1890/0012-9658(2001)082[0050:VPFISA]2.0.CO;2", - "CorpusId": 4240095}, "url": "https://www.semanticscholar.org/paper/1986aa808b78ae4c845ca25b5e0014ff91374161", + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-05-23", "journal": + {"pages": "102-113"}, "authors": [{"authorId": "144254676", "name": "K. Morita"}]}, + {"paperId": "1986aa808b78ae4c845ca25b5e0014ff91374161", "externalIds": {"MAG": + "2135418520", "DOI": "10.1890/0012-9658(2001)082[0050:VPFISA]2.0.CO;2", "CorpusId": + 4240095}, "corpusId": 4240095, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1986aa808b78ae4c845ca25b5e0014ff91374161", "title": "VEGETATION PATTERN FORMATION IN SEMI-ARID GRAZING SYSTEMS", "abstract": "Hypotheses about the origin of vegetation pattern formation in semi-arid areas around the world almost all include a common feature of semi-arid areas: @@ -33810,138 +38253,200 @@ interactions: the patterns. The model is in agreement with field observations and indicates the conditions for which vegetation pattern formation can be expected in arid and semi-arid grazing systems.", "venue": "", "year": 2001, "referenceCount": - 40, "citationCount": 445, "influentialCitationCount": 30, "isOpenAccess": - false, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Ecology", "pages": "50-61", "volume": "82"}, "authors": - [{"authorId": "3918365", "name": "R. HilleRisLambers"}, {"authorId": "2096458905", - "name": "M. Rietkerk"}, {"authorId": "104596774", "name": "F. Bosch"}, {"authorId": - "88780276", "name": "H. Prins"}, {"authorId": "24637135", "name": "H. Kroon"}]}, - {"paperId": "0fd6a6c5587011c7f6e275aed5b5366785870fb7", "externalIds": {"MAG": - "2039227376", "DOI": "10.1021/JA047030C", "CorpusId": 27908476, "PubMed": - "15366864"}, "url": "https://www.semanticscholar.org/paper/0fd6a6c5587011c7f6e275aed5b5366785870fb7", - "title": "Chemical waves and pattern formation in the 1,2-dipalmitoyl-sn-glycero-3-phosphocholine/water - lamellar system.", "abstract": "The present work deals with the spatially - extended oscillatory Belousov Zhabotinsky reaction-diffusion system carried - out in an anisotropic environment of phosphatidylcholines/water binary system, - which presents layered aqueous domains separated by lipid bilayers. We report - the occurrence of stable Turing patterns, spiral waves, and other exotic structures - in phospholipids bilayers that are generally used as a models for cell plasma - membranes.", "venue": "Journal of the American Chemical Society", "year": - 2004, "referenceCount": 3, "citationCount": 43, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-09-22", "journal": - {"name": "Journal of the American Chemical Society", "pages": "\n 11406-7\n ", - "volume": "126 37"}, "authors": [{"authorId": "32661831", "name": "A. Magnani"}, - {"authorId": "3362455", "name": "N. Marchettini"}, {"authorId": "3115365", - "name": "S. Ristori"}, {"authorId": "1895638", "name": "C. Rossi"}, {"authorId": - "145615534", "name": "F. Rossi"}, {"authorId": "2449332", "name": "M. Rustici"}, - {"authorId": "3713140", "name": "O. Spalla"}, {"authorId": "47945175", "name": - "E. Tiezzi"}]}, {"paperId": "55c69622da02f02f5b5a52e42b28b8fec6260796", "externalIds": - {"MAG": "2074371667", "DOI": "10.1016/j.mbs.2011.12.005", "CorpusId": 16409817, - "PubMed": "22207074"}, "url": "https://www.semanticscholar.org/paper/55c69622da02f02f5b5a52e42b28b8fec6260796", - "title": "Turing instabilities and spatio-temporal chaos in ratio-dependent - Holling-Tanner model.", "abstract": null, "venue": "Mathematical Biosciences", - "year": 2012, "referenceCount": 83, "citationCount": 80, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + 40, "citationCount": 447, "influentialCitationCount": 30, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Environmental Science"], + "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-03-01", "journal": {"name": "Mathematical - biosciences", "pages": "\n 64-76\n ", "volume": "236 1"}, - "authors": [{"authorId": "33373208", "name": "M. Banerjee"}, {"authorId": - "2110878825", "name": "Santo Banerjee"}]}, {"paperId": "71d1b522af7c0e0cb52354d4587e352ef571efc6", + null, "publicationDate": null, "journal": {"name": "Ecology", "pages": "50-61", + "volume": "82"}, "authors": [{"authorId": "3918365", "name": "R. HilleRisLambers"}, + {"authorId": "2096458905", "name": "M. Rietkerk"}, {"authorId": "104596774", + "name": "F. Bosch"}, {"authorId": "88780276", "name": "H. Prins"}, {"authorId": + "24637135", "name": "H. Kroon"}]}, {"paperId": "71d1b522af7c0e0cb52354d4587e352ef571efc6", "externalIds": {"MAG": "2068218010", "DOI": "10.1007/BF02655465", "CorpusId": - 96884594}, "url": "https://www.semanticscholar.org/paper/71d1b522af7c0e0cb52354d4587e352ef571efc6", + 96884594}, "corpusId": 96884594, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/71d1b522af7c0e0cb52354d4587e352ef571efc6", "title": "The effect of soldering process variables on the microstructure and mechanical properties of eutectic Sn-Ag/Cu solder joints", "abstract": - null, "venue": "", "year": 1995, "referenceCount": 15, "citationCount": 146, - "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": ["Materials - Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": - "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1995-10-01", "journal": {"name": - "Journal of Electronic Materials", "pages": "1465-1472", "volume": "24"}, - "authors": [{"authorId": "4219846", "name": "Wenge Yang"}, {"authorId": "50635155", - "name": "L. Felton"}, {"authorId": "66499463", "name": "R. Messler"}]}, {"paperId": - "bcc0c70a18ad8c2d25998549a8ef817bbbb7c2ee", "externalIds": {"ArXiv": "quant-ph/0210187", - "MAG": "1785637000", "CorpusId": 118921972}, "url": "https://www.semanticscholar.org/paper/bcc0c70a18ad8c2d25998549a8ef817bbbb7c2ee", - "title": "A 2 rebit gate universal for quantum computing", "abstract": "We - show, within the circuit model, how any quantum computation can be efficiently - performed using states with only real amplitudes (a result known within the - Quantum Turing Machine model). This allows us to identify a 2-qubit (in fact - 2-rebit) gate which is universal for quantum computing, although it cannot - be used to perform arbitrary unitary transformations.", "venue": "", "year": - 2002, "referenceCount": 4, "citationCount": 44, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2002-10-27", "journal": {"name": "arXiv: Quantum - Physics", "volume": ""}, "authors": [{"authorId": "145852716", "name": "T. - Rudolph"}, {"authorId": "1728234", "name": "Lov K. Grover"}]}, {"paperId": - "4b6ee646ba2f7f42b9654eca0b4ec287fcad03d6", "externalIds": {"DBLP": "conf/lisa/Traugott02", - "MAG": "203188803", "CorpusId": 9014255}, "url": "https://www.semanticscholar.org/paper/4b6ee646ba2f7f42b9654eca0b4ec287fcad03d6", - "title": "Why Order Matters: Turing Equivalence in Automated Systems Administration", - "abstract": "Hosts in a well-architected enterprise infrastructure are self-administered; - they perform their own maintenance and upgrades. By definition, self-administered - hosts execute self-modifying code. They do not behave according to simple - state machine rules, but can incorporate complex feedback loops and evolutionary - recursion.The implications of this behavior are of immediate concern to the - reliability, security, and ownership costs of enterprise and mission-critical - computing. In retrospect, it appears that the same concerns also apply to - manually-administered machines, in which administrators use tools that execute - in the context of the target disk to change the contents of the same disk. - The self-modifying behavior of both manual and automatic administration techniques - helps explain the difficulty and expense of maintaining high availability - and security in conventionally-administered infrastructures.The practice of - infrastructure architecture tool design exists to bring order to this self-referential - chaos. Conventional systems administration can be greatly improved upon through - discipline, culture, and adoption of practices better fitted to enterprise - needs. Creating a low-cost maintenance strategy largely remains an art. What - can we do to put this art into the hands of relatively junior administrators? - We think that part of the answer includes adopting a well-proven strategy - for maintenance tools, based in part upon the theoretical properties of computing.In - this paper, we equate self-administered hosts to Turing machines in order - to help build a theoretical foundation for understanding this behavior. We - discuss some tools that provide mechanisms for reliably managing self-administered - hosts, using deterministic ordering techniques.Based on our findings, it appears - that no tool, written in any language, can predictably administer an enterprise - infrastructure without maintaining a deterministic, repeatable order of changes - on each host. The runtime environment for any tool always executes in the - context of the target operating system; changes can affect the behavior of - the tool itself, creating circular dependencies. The behavior of these changes - may be difficult to predict in advance, so testing is necessary to validate - changed hosts. Once changes have been validated in testing they must be replicated - in production in the same order in which they were tested, due to these same - circular dependencies.The least-cost method of managing multiple hosts also - appears to be deterministic ordering. All other known management methods seem - to include either more testing or higher risk for each host managed.This paper - is a living document; revisions and discussion can be found at Infrastructures.Org, - a project of TerraLuna, LLC.", "venue": "LISA", "year": 2002, "referenceCount": - 27, "citationCount": 31, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2002-11-08", "journal": {"pages": "99-120"}, "authors": [{"authorId": "98531396", - "name": "S. Traugott"}]}, {"paperId": "c41202a794b3b71000ba97c4f377b20905ad6d6c", - "externalIds": {"MAG": "2035342741", "DOI": "10.1051/JPHYS:01988004903054100", - "CorpusId": 31916269}, "url": "https://www.semanticscholar.org/paper/c41202a794b3b71000ba97c4f377b20905ad6d6c", - "title": "Stationary structure induced along a reaction-diffusion front by - a Turing symmetry breaking instability", "abstract": "Avec une geometrie de - reacteur appropriee, une structure de Turing bidimensionnelle de reaction-diffusion - peut etre ramenee a une structure quasi unidimensionnelle localisee le long - d''un front de reaction. Exemple par simulation numerique", "venue": "", "year": - 1988, "referenceCount": 10, "citationCount": 28, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}], "publicationTypes": null, - "publicationDate": "1988-03-01", "journal": {"name": "Journal De Physique", - "pages": "541-546", "volume": "49"}, "authors": [{"authorId": "2313078", "name": - "J. Boissonade"}]}, {"paperId": "d1a5b74bfe162e280ba8599697ff0660894341c8", - "externalIds": {"DBLP": "journals/jcss/Fortnow00", "MAG": "2015895898", "DOI": - "10.1006/jcss.1999.1671", "CorpusId": 122011115}, "url": "https://www.semanticscholar.org/paper/d1a5b74bfe162e280ba8599697ff0660894341c8", + null, "venue": "", "year": 1995, "referenceCount": 15, "citationCount": 147, + "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials + Science", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1995-10-01", + "journal": {"name": "Journal of Electronic Materials", "pages": "1465-1472", + "volume": "24"}, "authors": [{"authorId": "4219846", "name": "Wenge Yang"}, + {"authorId": "50635155", "name": "L. Felton"}, {"authorId": "66499463", "name": + "R. Messler"}]}, {"paperId": "3464509cee1c3d5d3e8c5d862472b8d59fd46f5f", "externalIds": + {"MAG": "2098266472", "DOI": "10.1177/002199838902301205", "CorpusId": 137477511}, + "corpusId": 137477511, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3464509cee1c3d5d3e8c5d862472b8d59fd46f5f", + "title": "Internal State Variable Approach for Predicting Stiffness Reductions + in Fibrous Laminated Composites with Matrix Cracks", "abstract": "A mathematical + model utilizing the Internal State Variable (ISV) concept is proposed for + predicting the upper bound of the reduced axial stiffnesses in cross-ply lami + nates with matrix cracks. The axial crack opening displacement is explicitly + expressed in terms of the observable axial strain and the undamaged material + properties. A crack parameter representing the effect of matrix cracks on + the observable axial Young''s modulus is calculated for glass/epoxy and graphite/epoxy + material systems. The results of the present study show that the matrix crack + opening displacement and conse quently the effective Young''s modulus depends + not on the crack length but on its ratio to the crack spacing. Comparisons + of the present model with experimental data and other models in the litera + ture show a good agreement, thus confirming direct applicability of the model + to [0 p /90 r ] s type laminates.", "venue": "", "year": 1989, "referenceCount": + 24, "citationCount": 152, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1989-12-01", "journal": {"name": "Journal of Composite Materials", "pages": + "1273 - 1291", "volume": "23"}, "authors": [{"authorId": "1915723937", "name": + "Jong-Won Lee"}, {"authorId": "152765934", "name": "D. Allen"}, {"authorId": + "18575315", "name": "C. Harris"}]}, {"paperId": "acc9f8384c0a927a12661422f3c113f369c24081", + "externalIds": {"MAG": "137043087", "DOI": "10.1007/978-3-662-05642-4_9", + "CorpusId": 116312845}, "corpusId": 116312845, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/acc9f8384c0a927a12661422f3c113f369c24081", + "title": "Quantum Computers: the Church-Turing Hypothesis Versus the Turing + Principle", "abstract": null, "venue": "", "year": 2004, "referenceCount": + 22, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "213-240", "volume": ""}, "authors": [{"authorId": + "1956521", "name": "C. Timpson"}]}, {"paperId": "a3857e914c7d19969d7b42fe60d8424bd59e8025", + "externalIds": {"MAG": "2027661786", "DOI": "10.1073/PNAS.89.1.383", "CorpusId": + 23370431, "PubMed": "11607249"}, "corpusId": 23370431, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/a3857e914c7d19969d7b42fe60d8424bd59e8025", + "title": "Chemical implementation of finite-state machines.", "abstract": + "With methods developed in a prior article on the chemical kinetic implementation + of a McCulloch-Pitts neuron, connections among neurons, logic gates, and a + clocking mechanism, we construct examples of clocked finite-state machines. + These machines include a binary decoder, a binary adder, and a stack memory. + An example of the operation of the binary adder is given, and the chemical + concentrations corresponding to the state of each chemical neuron are followed + in time. Using these methods, we can, in principle, construct a universal + Turing machine, and these chemical networks inherit the halting problem", + "venue": "Proceedings of the National Academy of Sciences of the United States + of America", "year": 1992, "referenceCount": 4, "citationCount": 82, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.pnas.org/content/89/1/383.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Proceedings of the National Academy of Sciences of the United States + of America", "pages": "\n 383-7\n ", "volume": "89 1"}, "authors": + [{"authorId": "4461731", "name": "A. Hjelmfelt"}, {"authorId": "27431174", + "name": "E. Weinberger"}, {"authorId": "2150934501", "name": "J. Ross"}]}, + {"paperId": "2d7bbd30909a93feb9aa3ae740d1dab09170f4bb", "externalIds": {"MAG": + "2022145315", "DOI": "10.1142/S0218339011003555", "CorpusId": 121810178}, + "corpusId": 121810178, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d7bbd30909a93feb9aa3ae740d1dab09170f4bb", + "title": "PATTERN SELECTION IN AN EPIDEMIC MODEL WITH SELF AND CROSS DIFFUSION", + "abstract": "In this paper, we have presented Turing pattern selection in + a spatial epidemic model with zero-flux boundary conditions, for which we + have given a general survey of Hopf and Turing bifurcations, and have derived + amplitude equations for the excited modes. Furthermore, we present novel numerical + evidence of typical Turing patterns, and find that the model dynamics exhibits + complex pattern replication: on increasing the control parameter r, the sequence + \"H0-hexagons \u2192 H0-hexagon-stripe mixtures \u2192 stripes \u2192 H\u03c0-hexagon-stripe + mixtures \u2192 H\u03c0-hexagons\" is observed. This may enrich the research + of the pattern formation in diffusive epidemic models.", "venue": "", "year": + 2011, "referenceCount": 23, "citationCount": 19, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "2011-11-21", "journal": {"name": "Journal of Biological + Systems", "pages": "19-31", "volume": "19"}, "authors": [{"authorId": "2144318184", + "name": "Weiming Wang"}, {"authorId": "2027512304", "name": "Yezhi Lin"}, + {"authorId": "46506999", "name": "Hailing Wang"}, {"authorId": "36348751", + "name": "Houye Liu"}, {"authorId": "1870339", "name": "Yong-ji Tan"}]}, {"paperId": + "de48536e028e15897c65f76cfdca316bfde3add6", "externalIds": {"MAG": "68306199", + "DOI": "10.1007/978-1-4615-0755-0_6", "CorpusId": 18091374}, "corpusId": 18091374, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de48536e028e15897c65f76cfdca316bfde3add6", + "title": "Incomputability in Nature", "abstract": null, "venue": "", "year": + 2003, "referenceCount": 12, "citationCount": 56, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "137-160", "volume": ""}, "authors": + [{"authorId": "98630872", "name": "S. Cooper"}, {"authorId": "2442311", "name": + "P. Odifreddi"}]}, {"paperId": "865a040ad372fdadbd5d4784ba434080e6e9eb5a", + "externalIds": {"MAG": "1552288906", "DBLP": "conf/icalp/Simon77", "DOI": + "10.1007/3-540-08342-1_37", "CorpusId": 39772083}, "corpusId": 39772083, "publicationVenue": + {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", "name": "International Colloquium + on Automata, Languages and Programming", "type": "conference", "alternate_names": + ["Int Conf Arab Lang Process", "International Conference on Arabic Language + Processing", "Int Colloq Autom Lang Program", "ICALP"], "url": "http://www.eatcs.org/"}, + "url": "https://www.semanticscholar.org/paper/865a040ad372fdadbd5d4784ba434080e6e9eb5a", + "title": "On the Difference Between One and Many (Preliminary Version)", "abstract": + null, "venue": "International Colloquium on Automata, Languages and Programming", + "year": 1977, "referenceCount": 21, "citationCount": 82, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F3-540-08342-1_37.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1977-07-18", "journal": {"pages": "480-491"}, + "authors": [{"authorId": "143688145", "name": "Janos Simon"}]}, {"paperId": + "5f4734aee384113ea1567440cd46c43303e99a94", "externalIds": {"MAG": "2121741559", + "ArXiv": "nlin/0309047", "DOI": "10.1103/PhysRevLett.92.074105", "CorpusId": + 32218397, "PubMed": "14995857"}, "corpusId": 32218397, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/5f4734aee384113ea1567440cd46c43303e99a94", + "title": "Computational irreducibility and the predictability of complex physical + systems.", "abstract": "Using elementary cellular automata (CA) as an example, + we show how to coarse grain CA in all classes of Wolfram''s classification. + We find that computationally irreducible physical processes can be predictable + and even computationally reducible at a coarse-grained level of description. + The resulting coarse-grained CA which we construct emulate the large-scale + behavior of the original systems without accounting for small-scale details. + At least one of the CA that can be coarse grained is irreducible and known + to be a universal Turing machine.", "venue": "Physical Review Letters", "year": + 2003, "referenceCount": 21, "citationCount": 82, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/nlin/0309047", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine", "Physics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-09-17", "journal": + {"name": "Physical review letters", "pages": "\n 074105\n ", + "volume": "92 7"}, "authors": [{"authorId": "5102841", "name": "Navot Israeli"}, + {"authorId": "3549131", "name": "N. Goldenfeld"}]}, {"paperId": "c130ad9c0d99d9a0f0ec2b633c43dc3446dd29b6", + "externalIds": {"MAG": "147821881", "CorpusId": 58819055}, "corpusId": 58819055, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c130ad9c0d99d9a0f0ec2b633c43dc3446dd29b6", + "title": "Rethinking Cognitive Computation: Turing and the Science of the + Mind", "abstract": null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": + 36, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "2005-12-17", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "48060981", "name": "A. Wells"}]}, {"paperId": "6927252ba7c544ce213c319133ae22bbe045281f", + "externalIds": {"MAG": "1489274344", "DOI": "10.1090/S0002-9939-1992-1065942-0", + "CorpusId": 118727246}, "corpusId": 118727246, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6927252ba7c544ce213c319133ae22bbe045281f", + "title": "Orderings with th jump degree 0", "abstract": "This paper completes + an investigation of \"jumps\" of orderings. The last few cases are given in + the proof that for each recursive ordinal a > 1 and for each Turing degree + d > O''\"'' , there is a linear ordering A such that d is least among the + ath jumps of degrees of (open diagrams of) isomorphic copies of A , and for + s < a , the set of sxh jumps of degrees of copies of A has no least element.", + "venue": "", "year": 1992, "referenceCount": 7, "citationCount": 55, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/proc/1992-114-02/S0002-9939-1992-1065942-0/S0002-9939-1992-1065942-0.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-02-01", + "journal": {"name": "", "pages": "545-552", "volume": "114"}, "authors": [{"authorId": + "145948982", "name": "R. Downey"}, {"authorId": "2061861694", "name": "Julia + A. Knight"}]}, {"paperId": "d1a5b74bfe162e280ba8599697ff0660894341c8", "externalIds": + {"DBLP": "journals/jcss/Fortnow00", "MAG": "2015895898", "DOI": "10.1006/jcss.1999.1671", + "CorpusId": 122011115}, "corpusId": 122011115, "publicationVenue": {"id": + "fa71f5e5-b029-4311-ae45-2ade36048a5d", "name": "Journal of computer and system + sciences (Print)", "type": "journal", "alternate_names": ["Journal of Computer + and System Sciences", "J comput syst sci (print", "J Comput Syst Sci"], "issn": + "0022-0000", "url": "http://www.elsevier.com/locate/jcss", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/00220000", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/d1a5b74bfe162e280ba8599697ff0660894341c8", "title": "Time-Space Tradeoffs for Satisfiability", "abstract": "We give the first nontrivial model-independent time?space tradeoffs for satisfiability. Namely, we show that SAT cannot be solved in n1+o(1) time and n1?? space for @@ -33958,62 +38463,96 @@ interactions: and NP. We give some possibilities and limitations of this approach.", "venue": "Journal of computer and system sciences (Print)", "year": 2000, "referenceCount": 32, "citationCount": 64, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-04-01", "journal": {"name": "J. Comput. Syst. Sci.", - "pages": "337-353", "volume": "60"}, "authors": [{"authorId": "1691447", "name": - "L. Fortnow"}]}, {"paperId": "3f2eeb08d584596a5b1e99053e2fac84dfdeca13", "externalIds": - {"MAG": "803162307", "DOI": "10.1007/S11071-015-2132-Z", "CorpusId": 118933792}, - "url": "https://www.semanticscholar.org/paper/3f2eeb08d584596a5b1e99053e2fac84dfdeca13", - "title": "Pattern dynamics of a predator\u2013prey reaction\u2013diffusion - model with spatiotemporal delay", "abstract": null, "venue": "", "year": 2015, - "referenceCount": 22, "citationCount": 27, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-05-07", - "journal": {"name": "Nonlinear Dynamics", "pages": "2155-2163", "volume": - "81"}, "authors": [{"authorId": "33771136", "name": "Jian Xu"}, {"authorId": - "2109700606", "name": "Gaoxiang Yang"}, {"authorId": "4652087", "name": "Hongguang - Xi"}, {"authorId": "1740772", "name": "Jianzhong Su"}]}, {"paperId": "7e43e492fbbc467fb4c46c9454bd7a6232817cab", - "externalIds": {"MAG": "2466138372", "DBLP": "conf/wia/OnderB06", "DOI": "10.1007/11812128_26", - "CorpusId": 8399996}, "url": "https://www.semanticscholar.org/paper/7e43e492fbbc467fb4c46c9454bd7a6232817cab", - "title": "XSLT Version 2.0 Is Turing-Complete: A Purely Transformation Based - Proof", "abstract": null, "venue": "International Conference on Implementation - and Application of Automata", "year": 2006, "referenceCount": 16, "citationCount": - 15, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2006-08-21", - "journal": {"pages": "275-276"}, "authors": [{"authorId": "32170281", "name": - "Ruhsan Onder"}, {"authorId": "2669420", "name": "Z. Bayram"}]}, {"paperId": - "dec9bb653c77016315880caf4cbd4da3fc5bc00e", "externalIds": {"DBLP": "conf/aistats/GeXG18", - "MAG": "2799261850", "CorpusId": 4867516}, "url": "https://www.semanticscholar.org/paper/dec9bb653c77016315880caf4cbd4da3fc5bc00e", - "title": "Turing: Composable inference for probabilistic programming", "abstract": - null, "venue": "International Conference on Artificial Intelligence and Statistics", - "year": 2018, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "1682-1690"}, "authors": [{"authorId": - "49365036", "name": "Hong Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, - {"authorId": "1744700", "name": "Zoubin Ghahramani"}]}, {"paperId": "219cfa5d26c0ba79309f04b13ea582c5d71a5faa", - "externalIds": {"MAG": "2001538622", "DBLP": "journals/jcam/SguraBL12", "DOI": - "10.1016/J.CAM.2012.03.013", "CorpusId": 7245630}, "url": "https://www.semanticscholar.org/paper/219cfa5d26c0ba79309f04b13ea582c5d71a5faa", - "title": "Numerical approximation of Turing patterns in electrodeposition - by ADI methods", "abstract": null, "venue": "Journal of Computational and - Applied Mathematics", "year": 2012, "referenceCount": 31, "citationCount": - 36, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-10-01", "journal": {"name": "J. - Comput. Appl. Math.", "pages": "4132-4147", "volume": "236"}, "authors": [{"authorId": - "1914459", "name": "I. Sgura"}, {"authorId": "2081619", "name": "B. Bozzini"}, - {"authorId": "2663085", "name": "D. Lacitignola"}]}, {"paperId": "b0ad68fc71bc8ff16bb5eb174dd2fb76708c6f78", - "externalIds": {"MAG": "2177751314", "DOI": "10.1146/ANNUREV.NU.03.070183.001521", - "CorpusId": 12134867, "PubMed": "6357239"}, "url": "https://www.semanticscholar.org/paper/b0ad68fc71bc8ff16bb5eb174dd2fb76708c6f78", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-04-01", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "337-353", + "volume": "60"}, "authors": [{"authorId": "1691447", "name": "L. Fortnow"}]}, + {"paperId": "ad9ed24d729c70f0f1a97106da03c60de9e9dbb7", "externalIds": {"MAG": + "3090553240", "DBLP": "conf/fun/ChurchillBH21", "ArXiv": "1904.09828", "DOI": + "10.4230/LIPIcs.FUN.2021.9", "CorpusId": 128281108}, "corpusId": 128281108, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ad9ed24d729c70f0f1a97106da03c60de9e9dbb7", + "title": "Magic: The Gathering is Turing Complete", "abstract": "$\\textit{Magic: + The Gathering}$ is a popular and famously complicated trading card game about + magical combat. In this paper we show that optimal play in real-world $\\textit{Magic}$ + is at least as hard as the Halting Problem, solving a problem that has been + open for a decade. To do this, we present a methodology for embedding an arbitrary + Turing machine into a game of $\\textit{Magic}$ such that the first player + is guaranteed to win the game if and only if the Turing machine halts. Our + result applies to how real $\\textit{Magic}$ is played, can be achieved using + standard-size tournament-legal decks, and does not rely on stochasticity or + hidden information. Our result is also highly unusual in that all moves of + both players are forced in the construction. This shows that even recognising + who will win a game in which neither player has a non-trivial decision to + make for the rest of the game is undecidable. We conclude with a discussion + of the implications for a unified computational theory of games and remarks + about the playability of such a board in a tournament setting.", "venue": + "FUN", "year": 2019, "referenceCount": 14, "citationCount": 20, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2019-03-01", "journal": + {"pages": "9:1-9:19"}, "authors": [{"authorId": "104183642", "name": "Alexandrea + Churchill"}, {"authorId": "103476203", "name": "Stella Rose Biderman"}, {"authorId": + "103829114", "name": "Austin Herrick"}]}, {"paperId": "c41202a794b3b71000ba97c4f377b20905ad6d6c", + "externalIds": {"MAG": "2035342741", "DOI": "10.1051/JPHYS:01988004903054100", + "CorpusId": 31916269}, "corpusId": 31916269, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c41202a794b3b71000ba97c4f377b20905ad6d6c", + "title": "Stationary structure induced along a reaction-diffusion front by + a Turing symmetry breaking instability", "abstract": "Avec une geometrie de + reacteur appropriee, une structure de Turing bidimensionnelle de reaction-diffusion + peut etre ramenee a une structure quasi unidimensionnelle localisee le long + d''un front de reaction. Exemple par simulation numerique", "venue": "", "year": + 1988, "referenceCount": 10, "citationCount": 28, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}], "publicationTypes": + null, "publicationDate": "1988-03-01", "journal": {"name": "Journal De Physique", + "pages": "541-546", "volume": "49"}, "authors": [{"authorId": "2313078", "name": + "J. Boissonade"}]}, {"paperId": "9a3fe47c8e303d1f9cfebdabaacad0794babdc90", + "externalIds": {"MAG": "2966329886", "DOI": "10.1007/s11071-019-05168-2", + "CorpusId": 201252450}, "corpusId": 201252450, "publicationVenue": {"id": + "10925c1c-0929-4ec5-8268-a8a52bd84631", "name": "Nonlinear dynamics", "type": + "journal", "alternate_names": ["Nonlinear Dyn", "Nonlinear Dynamics", "Nonlinear + dyn"], "issn": "0924-090X", "url": "http://www.springer.com/11071", "alternate_urls": + ["https://link.springer.com/journal/11071"]}, "url": "https://www.semanticscholar.org/paper/9a3fe47c8e303d1f9cfebdabaacad0794babdc90", + "title": "Spatiotemporal dynamics near the Turing\u2013Hopf bifurcation in + a toxic-phytoplankton\u2013zooplankton model with cross-diffusion", "abstract": + null, "venue": "Nonlinear dynamics", "year": 2019, "referenceCount": 38, "citationCount": + 24, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2019-07-31", "journal": {"name": + "Nonlinear Dynamics", "pages": "27 - 37", "volume": "98"}, "authors": [{"authorId": + "2117827657", "name": "Wen Wang"}, {"authorId": "1991072059", "name": "Shutang + Liu"}, {"authorId": "2109253859", "name": "Zhi-bin Liu"}]}, {"paperId": "0840cead727922d82ccb4c9f9380b35e32b1e0a4", + "externalIds": {"MAG": "2949662480", "ArXiv": "1211.0462", "DOI": "10.1007/s11538-013-9827-4", + "CorpusId": 18035130, "PubMed": "23471601"}, "corpusId": 18035130, "publicationVenue": + {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", "name": "Bulletin of Mathematical + Biology", "type": "journal", "alternate_names": ["Bull Math Biology"], "issn": + "0092-8240", "url": "http://link.springer.com/journal/11538"}, "url": "https://www.semanticscholar.org/paper/0840cead727922d82ccb4c9f9380b35e32b1e0a4", + "title": "Stochastic Pattern Formation and Spontaneous Polarisation: The Linear + Noise Approximation and Beyond", "abstract": null, "venue": "Bulletin of Mathematical + Biology", "year": 2012, "referenceCount": 34, "citationCount": 76, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://purehost.bath.ac.uk/ws/files/11309100/1211.0462v1.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology", + "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Biology", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2012-11-02", "journal": {"name": "Bulletin + of Mathematical Biology", "pages": "895-921", "volume": "76"}, "authors": + [{"authorId": "2105019", "name": "A. McKane"}, {"authorId": "6785594", "name": + "T. Biancalani"}, {"authorId": "47252870", "name": "T. Rogers"}]}, {"paperId": + "b0ad68fc71bc8ff16bb5eb174dd2fb76708c6f78", "externalIds": {"MAG": "2177751314", + "DOI": "10.1146/ANNUREV.NU.03.070183.001521", "CorpusId": 12134867, "PubMed": + "6357239"}, "corpusId": 12134867, "publicationVenue": {"id": "6cb872bf-e7d4-40f9-80a5-166e1042b894", + "name": "Annual review of nutrition", "type": "journal", "alternate_names": + ["Annual Review of Nutrition", "Annu Rev Nutr", "Annu rev nutr"], "issn": + "0199-9885", "url": "https://www.annualreviews.org/journal/nutr", "alternate_urls": + ["http://www.annualreviews.org/journal/nutr", "http://arjournals.annualreviews.org/loi/nutr?cookieSet=1", + "http://arjournals.annualreviews.org/loi/nutr"]}, "url": "https://www.semanticscholar.org/paper/b0ad68fc71bc8ff16bb5eb174dd2fb76708c6f78", "title": "Stable isotope methods for nutritional investigation.", "abstract": "IN TRODUCTI ON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... @@ -34055,179 +38594,78 @@ interactions: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327", "venue": "Annual review of nutrition", "year": 1983, "referenceCount": 142, "citationCount": 81, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": null, "journal": {"name": - "Annual review of nutrition", "pages": "\n 309-39\n ", "volume": - "3"}, "authors": [{"authorId": "1732278", "name": "D. Matthews"}, {"authorId": - "6027459", "name": "D. Bier"}]}, {"paperId": "b8b14007b452ba63b4012ada099acdcb054ced11", - "externalIds": {"DBLP": "journals/logcom/Lowe01", "MAG": "2109974256", "DOI": - "10.1093/logcom/11.1.25", "CorpusId": 10394769}, "url": "https://www.semanticscholar.org/paper/b8b14007b452ba63b4012ada099acdcb054ced11", - "title": "Revision Sequences and Computers with an Infinite Amount of Time", - "abstract": "The author establishes a connection between Revision Theory of - Truth and Infinite Time Turing Machines as developed by Hamkins and Kidder. - The ideas from this paper have incited Welch to solve the limit rule problem - of revision theory.", "venue": "Journal of Logic and Computation", "year": - 2001, "referenceCount": 20, "citationCount": 32, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-02-01", "journal": {"name": "J. Log. Comput.", "pages": "25-40", "volume": - "11"}, "authors": [{"authorId": "1740372", "name": "B. L\u00f6we"}]}, {"paperId": - "6fa9f272d46c1d12deb0e7ccf01170110aea7d67", "externalIds": {"MAG": "1543145547", - "DBLP": "conf/pnpm/RuizFG99", "DOI": "10.1109/PNPM.1999.796565", "CorpusId": - 7102397}, "url": "https://www.semanticscholar.org/paper/6fa9f272d46c1d12deb0e7ccf01170110aea7d67", - "title": "On non-decidability of reachability for timed-arc Petri nets", "abstract": - "Timed-arc Petri nets are not Turing powerful, because, in particular, they - cannot simulate a counter with test on zero. Thus, we could think that this - model does not extend significantly the expressiveness of untimed Petri nets. - But this is not true; in this paper we show that the differences between them - are big enough to make the reachability problem undecidable. We also define - dead tokens as those that cannot be used for firing any transitions in the - future and we present some particular cases where we can identify them on - this kind of timed nets.", "venue": "Petri Nets and Performance Models", "year": - 1999, "referenceCount": 16, "citationCount": 75, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1999-09-08", "journal": {"pages": "188-196"}, "authors": - [{"authorId": "2675626", "name": "V. V. Ruiz"}, {"authorId": "1402955013", - "name": "David de Frutos-Escrig"}, {"authorId": "2057637046", "name": "Fernando - Cuartero G\u00f3mez"}]}, {"paperId": "de48536e028e15897c65f76cfdca316bfde3add6", - "externalIds": {"MAG": "68306199", "DOI": "10.1007/978-1-4615-0755-0_6", "CorpusId": - 18091374}, "url": "https://www.semanticscholar.org/paper/de48536e028e15897c65f76cfdca316bfde3add6", - "title": "Incomputability in Nature", "abstract": null, "venue": "", "year": - 2003, "referenceCount": 12, "citationCount": 56, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "137-160", "volume": ""}, "authors": [{"authorId": - "98630872", "name": "S. Cooper"}, {"authorId": "2442311", "name": "P. Odifreddi"}]}, - {"paperId": "f39891d6ee04ba53dc40579150ff5435f6a7e46d", "externalIds": {"MAG": - "2335457302", "DOI": "10.1103/PHYSREVE.87.032906", "CorpusId": 124577328}, - "url": "https://www.semanticscholar.org/paper/f39891d6ee04ba53dc40579150ff5435f6a7e46d", - "title": "Turing space in reaction-diffusion systems with density-dependent - cross diffusion", "abstract": "Reaction-diffusion systems with cross-diffusion - terms that depend linearly on density are studied via linear stability analysis - and weakly nonlinear analysis. We obtain and analyze the conditions for the - Turing instability and derive a universal form of these conditions. We discuss - the features of the pattern-forming regions in parameter space for a cross - activator-inhibitor system, the Brusselator model, and for a pure activator-inhibitor - system, the two-variable Oregonator model. The supercritical or subcritical - character of the Turing bifurcation for the Brusselator is determined by deriving - an amplitude equation for patterns near the instability threshold.", "venue": - "", "year": 2013, "referenceCount": 31, "citationCount": 25, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-03-13", - "journal": {"name": "Physical Review E", "pages": "032906", "volume": "87"}, - "authors": [{"authorId": "39224568", "name": "E. Zemskov"}, {"authorId": "2745924", - "name": "K. Kassner"}, {"authorId": "144301618", "name": "M. Hauser"}, {"authorId": - "3041313", "name": "W. Horsthemke"}]}, {"paperId": "08390dacc76bc831fcfd08d09fb55f22e97b3bb2", - "externalIds": {"MAG": "1965916599", "DOI": "10.1080/17513758.2012.655327", - "CorpusId": 43111091, "PubMed": "22873604"}, "url": "https://www.semanticscholar.org/paper/08390dacc76bc831fcfd08d09fb55f22e97b3bb2", - "title": "Propagation of Turing patterns in a plankton model", "abstract": - "The paper is devoted to a reaction\u2013diffusion system of equations describing - phytoplankton and zooplankton distributions. Linear stability analysis of - the model is carried out. Turing and Hopf stability boundaries are found. - Emergence of two-dimensional spatial structures is illustrated by numerical - simulations. Travelling waves between various stationary solutions are investigated. - Transitions between homogeneous in space stationary solutions and Turing structures - are studied.", "venue": "Journal of Biological Dynamics", "year": 2012, "referenceCount": - 42, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-03-01", "journal": {"name": "Journal - of Biological Dynamics", "pages": "524 - 538", "volume": "6"}, "authors": - [{"authorId": "34586885", "name": "R. K. Upadhyay"}, {"authorId": "2216988", - "name": "V. Volpert"}, {"authorId": "144344252", "name": "N. K. Thakur"}]}, - {"paperId": "27b606b5faa4bdff5ae7d36c0c9248490f5a56a0", "externalIds": {"MAG": - "2127014660", "DOI": "10.3144/EXPRESSPOLYMLETT.2012.6", "CorpusId": 58940864}, - "url": "https://www.semanticscholar.org/paper/27b606b5faa4bdff5ae7d36c0c9248490f5a56a0", - "title": "Microscopic analysis of the morphology of seams in friction stir - welded polypropylene", "abstract": "Supermolecular structure of welded seams - prepared by friction stir welding (FSW) of polypropylene sheets has been studied - by optical and electron microscopy. It has been shown that in the central - parts of the seam spherulitic struc- tures similar to that of the base material - are formed, while at the borderline of the seam, a complex supermolecular - structure could be identified. Lower welding rotation speed resulted in a - border transition zone of more complex feature than the higher rotation speed - during FSW. This was accompanied by reduced joint efficiency.", "venue": "", - "year": 2012, "referenceCount": 24, "citationCount": 79, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Express Polymer Letters", "pages": "54-62", "volume": - "6"}, "authors": [{"authorId": "48290117", "name": "Z. Kiss"}, {"authorId": - "11235011", "name": "T. Czig\u00e1ny"}]}, {"paperId": "9f7bd031383264d27aa7806176ecd82192ba8138", - "externalIds": {"MAG": "2079797656", "DBLP": "conf/fpca/ChuangG93", "DOI": - "10.1145/165180.165225", "CorpusId": 11245450}, "url": "https://www.semanticscholar.org/paper/9f7bd031383264d27aa7806176ecd82192ba8138", - "title": "Real-time deques, multihead Turing machines, and purely functional - programming", "abstract": "We answer the following question: Can a deque (doubleended - queue) be implemented in a purely functional language such that each push - or pop operation on either end of a queue is accomplished in 0(1) time in - the worst case? The answer is yes, thus solving a problem posted by Gajewska - and Tarjan [14] and by Ponder, McGeer, and Ng [25], and refining results of - Sarnak [26] and Hoogerwoord [18]. We term such a deque real-time, since its - constant worstcaae behavior might be useful in real time programs (assuming - real-time garbage collection [3], etc.) Furthermore, we show that no restriction - of the functional language is necessary, and that push and pop operations - on previou$ versions of a deque can also be achieved in constant time. We - present a purely functional implementation of realtime deques and its complexity - analysis. We then show that the implementation has some interesting implications, - and can be used to give a real-time simulation of a multihead Turing machine - in a purely functional language.", "venue": "Conference on Functional Programming - Languages and Computer Architecture", "year": 1993, "referenceCount": 34, - "citationCount": 30, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + "publicationDate": null, "journal": {"name": "Annual review of nutrition", + "pages": "\n 309-39\n ", "volume": "3"}, "authors": [{"authorId": + "1732278", "name": "D. Matthews"}, {"authorId": "6027459", "name": "D. Bier"}]}, + {"paperId": "0fd6a6c5587011c7f6e275aed5b5366785870fb7", "externalIds": {"MAG": + "2039227376", "DOI": "10.1021/JA047030C", "CorpusId": 27908476, "PubMed": + "15366864"}, "corpusId": 27908476, "publicationVenue": {"id": "4193a393-c091-455e-858d-3d2c151b52b8", + "name": "Journal of the American Chemical Society", "type": "journal", "alternate_names": + ["J Am Chem Soc"], "issn": "0002-7863", "url": "https://pubs.acs.org/journal/jacsat", + "alternate_urls": ["http://pubs.acs.org/journals/jacsat/index.html", "http://pubs.acs.org/journals/jacsat/"]}, + "url": "https://www.semanticscholar.org/paper/0fd6a6c5587011c7f6e275aed5b5366785870fb7", + "title": "Chemical waves and pattern formation in the 1,2-dipalmitoyl-sn-glycero-3-phosphocholine/water + lamellar system.", "abstract": "The present work deals with the spatially + extended oscillatory Belousov Zhabotinsky reaction-diffusion system carried + out in an anisotropic environment of phosphatidylcholines/water binary system, + which presents layered aqueous domains separated by lipid bilayers. We report + the occurrence of stable Turing patterns, spiral waves, and other exotic structures + in phospholipids bilayers that are generally used as a models for cell plasma + membranes.", "venue": "Journal of the American Chemical Society", "year": + 2004, "referenceCount": 3, "citationCount": 43, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1993-07-01", "journal": {"pages": "289-298"}, "authors": [{"authorId": "2106147", - "name": "Tyng-Ruey Chuang"}, {"authorId": "144179390", "name": "B. Goldberg"}]}, - {"paperId": "bfbcfeb08eeffea38d0f8239546c197d8535a934", "externalIds": {"MAG": - "2399773445", "DOI": "10.1007/978-3-319-22156-4", "CorpusId": 124746971}, - "url": "https://www.semanticscholar.org/paper/bfbcfeb08eeffea38d0f8239546c197d8535a934", - "title": "Turing''s Revolution: The Impact of His Ideas about Computability", - "abstract": null, "venue": "", "year": 2016, "referenceCount": 48, "citationCount": - 14, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2016-01-22", "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "48364821", "name": "G. - Sommaruga"}, {"authorId": "2835658", "name": "T. Strahm"}]}, {"paperId": "01b5b648af61ddb382da638a299fae2315b25192", - "externalIds": {"DBLP": "journals/tissec/RoemerBSS12", "MAG": "2089448621", - "DOI": "10.1145/2133375.2133377", "CorpusId": 1870453}, "url": "https://www.semanticscholar.org/paper/01b5b648af61ddb382da638a299fae2315b25192", - "title": "Return-Oriented Programming: Systems, Languages, and Applications", - "abstract": "We introduce return-oriented programming, a technique by which - an attacker can induce arbitrary behavior in a program whose control flow - he has diverted, without injecting any code. A return-oriented program chains - together short instruction sequences already present in a program\u2019s address - space, each of which ends in a \u201creturn\u201d instruction.\n Return-oriented - programming defeats the W\u2295X protections recently deployed by Microsoft, - Intel, and AMD; in this context, it can be seen as a generalization of traditional - return-into-libc attacks. But the threat is more general. Return-oriented - programming is readily exploitable on multiple architectures and systems. - It also bypasses an entire category of security measures---those that seek - to prevent malicious computation by preventing the execution of malicious - code.\n To demonstrate the wide applicability of return-oriented programming, - we construct a Turing-complete set of building blocks called gadgets using - the standard C libraries of two very different architectures: Linux/x86 and - Solaris/SPARC. To demonstrate the power of return-oriented programming, we - present a high-level, general-purpose language for describing return-oriented - exploits and a compiler that translates it to gadgets.", "venue": "TSEC", - "year": 2012, "referenceCount": 77, "citationCount": 480, "influentialCitationCount": - 57, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-03-01", "journal": {"name": "ACM Trans. Inf. Syst. - Secur.", "pages": "2:1-2:34", "volume": "15"}, "authors": [{"authorId": "31923029", - "name": "Ryan Roemer"}, {"authorId": "153276898", "name": "E. Buchanan"}, - {"authorId": "1786752", "name": "H. Shacham"}, {"authorId": "1727599", "name": - "S. Savage"}]}, {"paperId": "704926977f3b504a51e181aec8d5361b60e991f7", "externalIds": - {"MAG": "2021764290", "DOI": "10.5192/21540993030187", "CorpusId": 144064129}, - "url": "https://www.semanticscholar.org/paper/704926977f3b504a51e181aec8d5361b60e991f7", + "2004-09-22", "journal": {"name": "Journal of the American Chemical Society", + "pages": "\n 11406-7\n ", "volume": "126 37"}, "authors": + [{"authorId": "32661831", "name": "A. Magnani"}, {"authorId": "3362455", "name": + "N. Marchettini"}, {"authorId": "3115365", "name": "S. Ristori"}, {"authorId": + "1895638", "name": "C. Rossi"}, {"authorId": "145615534", "name": "F. Rossi"}, + {"authorId": "2449332", "name": "M. Rustici"}, {"authorId": "3713140", "name": + "O. Spalla"}, {"authorId": "47945175", "name": "E. Tiezzi"}]}, {"paperId": + "20f280b905c4246d2664f9605a2319602712cbf7", "externalIds": {"MAG": "2051014086", + "DOI": "10.2307/3243868", "CorpusId": 84922229}, "corpusId": 84922229, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/20f280b905c4246d2664f9605a2319602712cbf7", + "title": "Using Lichen Tissue Cultures in Modern Biology", "abstract": "We + conducted physiological, pharmacological, and chemical studies using tissue + cul- tures derived from natural lichens. Cultured tissues of about 200 lichen + species were initiated from vegetative thalli collected in various regions + of the world. The cultures grew on both complex and defined media. Growth + was significantly affected by temperature, as well as by carbon and nitrogen + sources. Some tissue cultures produced secondary substances (i.e., depsidones + and usnic acid), but most acetone extracts did not show the same patterns + of TLC spots as the corresponding natural thalli. Some lichen tissue cultures + produced more usnic acid than natural thalli. Several pharma- cological activities + were screened for both tissue cultures and natural lichens.", "venue": "", + "year": 1993, "referenceCount": 14, "citationCount": 81, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1993-01-23", "journal": {"name": "The Bryologist", "pages": "384-393", "volume": + "96"}, "authors": [{"authorId": "49076753", "name": "Yoshikazu Yamamoto"}, + {"authorId": "36149111", "name": "Y. Miura"}, {"authorId": "81257362", "name": + "M. Higuchi"}, {"authorId": "49199680", "name": "Y. Kinoshita"}, {"authorId": + "2031368674", "name": "I. Yoshimura"}]}, {"paperId": "56e983f3f7ebe1fea9fe3e4119a1ff21aa69a29a", + "externalIds": {"MAG": "2085363743", "DOI": "10.1007/S11071-013-0935-3", "CorpusId": + 123047329}, "corpusId": 123047329, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/56e983f3f7ebe1fea9fe3e4119a1ff21aa69a29a", + "title": "Spatial dynamics of a vegetation model in an arid flat environment", + "abstract": null, "venue": "", "year": 2013, "referenceCount": 38, "citationCount": + 37, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://doc.rero.ch/record/208690/files/zha_spa.pdf", "status": "GREEN"}, + "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-05-10", "journal": {"name": + "Nonlinear Dynamics", "pages": "2207-2219", "volume": "73"}, "authors": [{"authorId": + "47334108", "name": "Gui\u2010Quan Sun"}, {"authorId": "47681666", "name": + "L. R. Li"}, {"authorId": "2116461669", "name": "Zi-Ke Zhang"}]}, {"paperId": + "704926977f3b504a51e181aec8d5361b60e991f7", "externalIds": {"MAG": "2021764290", + "DOI": "10.5192/21540993030187", "CorpusId": 144064129}, "corpusId": 144064129, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/704926977f3b504a51e181aec8d5361b60e991f7", "title": "Islam in Kombo: The Spiritual and Militant Jih\u0101d of Fod\u00e9 Ibrahim Silla Tur\u00e9", "abstract": "The dynamic career of Fode Ibrahim Ture, known as Fode Silla in the literature about the Gambia River region, @@ -34242,384 +38680,131 @@ interactions: his goal is ultimately thwarted by European imperial advancement, his reputation as a great Muslim scholar and militant leader remains vibrant in the twenty-first century.", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": - 21, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2012-06-03", "journal": {"name": "Islamic Africa", - "pages": "87-126", "volume": "3"}, "authors": [{"authorId": "35602051", "name": - "D. Skinner"}]}, {"paperId": "e11fab5eb2335b8b102c97cfcc68947125ec63ca", "externalIds": - {"MAG": "2764126013", "DBLP": "conf/icalp/BournezGP16", "ArXiv": "1609.08059", - "DOI": "10.4230/LIPIcs.ICALP.2016.109", "CorpusId": 1942575}, "url": "https://www.semanticscholar.org/paper/e11fab5eb2335b8b102c97cfcc68947125ec63ca", - "title": "Polynomial Time Corresponds to Solutions of Polynomial Ordinary - Differential Equations of Polynomial Length", "abstract": "The outcomes of - this article are twofold. Implicit complexity. We provide an implicit characterization - of polynomial time computation in terms of ordinary differential equations: - we characterize the class P of languages computable in polynomial time in - terms of differential equations with polynomial right-hand side. This result - gives a purely continuous elegant and simple characterization of P. We believe - it is the first time complexity classes are characterized using only ordinary - differential equations. Our characterization extends to functions computable - in polynomial time over the reals in the sense of Computable Analysis. Our - results may provide a new perspective on classical complexity, by giving a - way to define complexity classes, like P, in a very simple way, without any - reference to a notion of (discrete) machine. This may also provide ways to - state classical questions about computational complexity via ordinary differential - equations. Continuous-Time Models of Computation. Our results can also be - interpreted in terms of analog computers or analog models of computation: - As a side effect, we get that the 1941 General Purpose Analog Computer (GPAC) - of Claude Shannon is provably equivalent to Turing machines both in terms - of computability and complexity, a fact that has never been established before. - This result provides arguments in favour of a generalised form of the Church-Turing - Hypothesis, which states that any physically realistic (macroscopic) computer - is equivalent to Turing machines both in terms of computability and complexity.", - "venue": "Journal of the ACM", "year": 2016, "referenceCount": 58, "citationCount": - 34, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-01-20", "journal": {"name": "Journal of the ACM (JACM)", "pages": "1 - - 76", "volume": "64"}, "authors": [{"authorId": "1706341", "name": "Olivier - Bournez"}, {"authorId": "144473423", "name": "D. Gra\u00e7a"}, {"authorId": - "2885195", "name": "Amaury Pouly"}]}, {"paperId": "26c6b4401abc87a69e5abe9fb485707d8b6d8a2a", - "externalIds": {"MAG": "1973949157", "DOI": "10.2214/AJR.170.2.9456974", "CorpusId": - 3022317, "PubMed": "9456974"}, "url": "https://www.semanticscholar.org/paper/26c6b4401abc87a69e5abe9fb485707d8b6d8a2a", - "title": "Subarachnoid contrast enhancement after spinal angiography mimicking - diffuse subarachnoid hemorrhage.", "abstract": "ture as uncommon complications - of angiography I 1-51. We describe an unusual case of subarachnoid contrast - enhancement that mimicked subarachnoid hemorrhage on CT of the head after - spinal angiography. Parenchymal contrast enhancement and intraventricular - hyperdensity have been described as being the resuit of blood-brain barrier - (BBB) breakdown. but to the best of our knowledge. the subarachnoid hemorrhage-mimicking - appearance of suical and cisternal enhancement without yentricular hyperdensity - has not been reported.", "venue": "AJR. American journal of roentgenology", - "year": 1998, "referenceCount": 2, "citationCount": 57, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport"], - "publicationDate": "1998-02-01", "journal": {"name": "AJR. American journal - of roentgenology", "pages": "\n 503-5\n ", "volume": "170 - 2"}, "authors": [{"authorId": "6836734", "name": "T. S. Eckel"}, {"authorId": - "145124051", "name": "S. Breiter"}, {"authorId": "5325828", "name": "L. Monsein"}]}, - {"paperId": "0e4a64632bc6a4fec640277599c82901fb2447a0", "externalIds": {"MAG": - "2010331576", "DOI": "10.1021/J100025A051", "CorpusId": 95119865}, "url": - "https://www.semanticscholar.org/paper/0e4a64632bc6a4fec640277599c82901fb2447a0", - "title": "Experimental Evidence for Turing Structures", "abstract": null, - "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 18, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}], "publicationTypes": null, - "publicationDate": "1995-06-01", "journal": {"name": "The Journal of Physical - Chemistry", "pages": "10417-10419", "volume": "99"}, "authors": [{"authorId": - "2150934538", "name": "J. Ross"}, {"authorId": "1756978", "name": "A. Arkin"}, - {"authorId": "2112730939", "name": "S. C. Mueller"}]}, {"paperId": "c86d6f344e4cf62af216bea8d51ad500bf9edfd4", - "externalIds": {"DBLP": "journals/corr/Yang16", "MAG": "2952984004", "ArXiv": - "1602.08671", "CorpusId": 9152132}, "url": "https://www.semanticscholar.org/paper/c86d6f344e4cf62af216bea8d51ad500bf9edfd4", - "title": "Lie Access Neural Turing Machine", "abstract": "Following the recent - trend in explicit neural memory structures, we present a new design of an - external memory, wherein memories are stored in an Euclidean key space $\\mathbb - R^n$. An LSTM controller performs read and write via specialized read and - write heads. It can move a head by either providing a new address in the key - space (aka random access) or moving from its previous position via a Lie group - action (aka Lie access). In this way, the \"L\" and \"R\" instructions of - a traditional Turing Machine are generalized to arbitrary elements of a fixed - Lie group action. For this reason, we name this new model the Lie Access Neural - Turing Machine, or LANTM. \nWe tested two different configurations of LANTM - against an LSTM baseline in several basic experiments. We found the right - configuration of LANTM to outperform the baseline in all of our experiments. - In particular, we trained LANTM on addition of $k$-digit numbers for $2 \\le - k \\le 16$, but it was able to generalize almost perfectly to $17 \\le k \\le - 32$, all with the number of parameters 2 orders of magnitude below the LSTM - baseline.", "venue": "ArXiv", "year": 2016, "referenceCount": 35, "citationCount": - 15, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + 21, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-06-03", "journal": {"name": + "Islamic Africa", "pages": "87-126", "volume": "3"}, "authors": [{"authorId": + "35602051", "name": "D. Skinner"}]}, {"paperId": "7e43e492fbbc467fb4c46c9454bd7a6232817cab", + "externalIds": {"MAG": "2466138372", "DBLP": "conf/wia/OnderB06", "DOI": "10.1007/11812128_26", + "CorpusId": 8399996}, "corpusId": 8399996, "publicationVenue": {"id": "cd0e0376-59f3-406d-b1b7-46ae4f8db467", + "name": "International Conference on Implementation and Application of Automata", + "type": "conference", "alternate_names": ["CIAA", "Conf Implement Appl Autom", + "Int Conf Implement Appl Autom", "Conference on Implementation and Application + of Automata", "CIAAI", "Int Conf Implement appl autom", "International Conference + on Implementation and application of automata"], "url": "http://www.wikicfp.com/cfp/program?id=441"}, + "url": "https://www.semanticscholar.org/paper/7e43e492fbbc467fb4c46c9454bd7a6232817cab", + "title": "XSLT Version 2.0 Is Turing-Complete: A Purely Transformation Based + Proof", "abstract": null, "venue": "International Conference on Implementation + and Application of Automata", "year": 2006, "referenceCount": 16, "citationCount": + 15, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2006-08-21", "journal": {"pages": "275-276"}, "authors": + [{"authorId": "32170281", "name": "Ruhsan Onder"}, {"authorId": "2669420", + "name": "Z. Bayram"}]}, {"paperId": "219cfa5d26c0ba79309f04b13ea582c5d71a5faa", + "externalIds": {"MAG": "2001538622", "DBLP": "journals/jcam/SguraBL12", "DOI": + "10.1016/J.CAM.2012.03.013", "CorpusId": 7245630}, "corpusId": 7245630, "publicationVenue": + {"id": "0dd1e980-f66a-40ab-9f04-626424b1a7d8", "name": "Journal of Computational + and Applied Mathematics", "type": "journal", "alternate_names": ["J Comput + Appl Math"], "issn": "0377-0427", "alternate_issns": ["0771-050X"], "url": + "http://www.elsevier.com/wps/find/journaldescription.cws_home/505613/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/03770427", + "https://www.journals.elsevier.com/journal-of-computational-and-applied-mathematics/"]}, + "url": "https://www.semanticscholar.org/paper/219cfa5d26c0ba79309f04b13ea582c5d71a5faa", + "title": "Numerical approximation of Turing patterns in electrodeposition + by ADI methods", "abstract": null, "venue": "Journal of Computational and + Applied Mathematics", "year": 2012, "referenceCount": 31, "citationCount": + 36, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-02-28", "journal": - {"name": "ArXiv", "volume": "abs/1602.08671"}, "authors": [{"authorId": "35064203", - "name": "Greg Yang"}]}, {"paperId": "c6c672c6a8917a34303f879bcce54c75352a3e90", - "externalIds": {"MAG": "2129549781", "DOI": "10.1080/00288306.1981.10422743", - "CorpusId": 140569747}, "url": "https://www.semanticscholar.org/paper/c6c672c6a8917a34303f879bcce54c75352a3e90", - "title": "Oxygen isotopic paleotemperatures across the Runangan-Whaingaroan - (Eocene-Oligocene) boundary in a New Zealand shelf sequence", "abstract": - "Oxygen isotopic compositions of the followed the global open-ocean trend - towards a Paleogene minimum near the Eocerie-Oligocene boundary. Throughout - the latest Eocene, tempera tures declined steadily by 3\u00b0C, showed a temporary - minor warming at the Eocenc-Oligocene boundary, dropped sharply by 2\u00b0C - in the Early Oligocene, and ameliorated significantly later in the Early Oligocene. - The qualitative temperature trends for New Zealand shelf waters at this time - are similar to those inferred from earlier paleontologic syntheses and limited - oxygen isotopic work, but involve a range of temperatures within the warm - and cool temperate climatic zones and an absolute tempera ture depression - across the Eocene-Oligocene boundary of only 5\u00b0C from about 17 to 12\u00b0C. - Results are consistent with isotopic paleotempera tures determined from deep-sea - sediment cores south of New Zealand where the cooling is inferred to mark - the onset of production of Antarctic bottom waters at near-freezing temperatures.", - "venue": "", "year": 1981, "referenceCount": 39, "citationCount": 23, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": - [{"category": "Geology", "source": "external"}, {"category": "Geology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1981-07-01", - "journal": {"name": "New Zealand Journal of Geology and Geophysics", "pages": - "529-538", "volume": "24"}, "authors": [{"authorId": "4554064", "name": "D. - A. Burns"}, {"authorId": "46384175", "name": "C. Nelson"}]}, {"paperId": "b0cfffe3f44ed236d85971fe0ec8e2d69090d0f4", - "externalIds": {"MAG": "639675847", "CorpusId": 118620407}, "url": "https://www.semanticscholar.org/paper/b0cfffe3f44ed236d85971fe0ec8e2d69090d0f4", - "title": "Spatio-Temporal Pattern Formation: With Examples from Physics, Chemistry, - and Materials Science", "abstract": "1 Introduction.- 2 Instabilities and - Patterns in Hydrodynamical Systems.- 2.1 Rayleigh-Benard instability.- 2.2 - Taylor-Couette instability.- 2.3 Liquid crystal instabilities.- 3 Instabilities - and Patterns in Reaction-Diffusion Systems.- 3.1 Chemical instabilities.- - 3.2 Defect microstructures in irradiated materials.- 3.3 Plastic deformation - and dislocation patterns.- 4 Generic Aspects of Pattern-Forming Instabilities.- - 4.1 Phenomenology.- 4.2 Reaction-diffusion dynamics and stability.- 4.3 Reduced - dynamics and amplitude equations.- 4.4 Spatial patterns: selection and stability.- - 4.4.1 Isotropic systems.- 4.4.2 Anisotropic systems.- 4.5 Phase dynamics of - periodic patterns.- 4.5.1 Isotropic systems.- 4.5.2 Anisotropic systems.- - 5 The Hopf Bifurcation and Related Spatio-Temporal Patterns.- 5.1 The generic - aspects of oscillatory media.- 5.1.1 The complex Ginzburg-Landau equation.- - 5.1.2 Phase dynamics and spiral waves.- 5.2 Real chemical systems and the - complex Ginzburg-Landau equation.- 5.2.1 Determination of the CGLE parameters - in real systems.- 5.2.2 CGLE parameters of the BZ reaction.- 5.3 The effect - of natural forcings on chemical oscillators.- 5.3.1 The effect of convection - on chemical waves.- 5.3.2 The effect of vertical gradients on chemical oscillations.- - 5.4 Conclusions.- 6 The Turing Instability and Associated Spatial Structures.- - 6.1 The Turing mechanism.- 6.2 The search for Turing structures.- 6.2.1 Convectively - driven chemical patterns.- 6.2.2 Double diffusion and chemical fingers.- 6.3 - At last, genuine Turing structures?.- 6.4 The interaction between Turing and - Hopf instabilities.- 6.4.1 Amplitude equations for Turing-Hopf modes.- 6.4.2 - Pattern selection for codimension-2 Turing-Hopf bifurcations.- 6.4.3 Defects, - defect bifurcations and localized structures.- 7 Defects and Defect Bifurcations.- - 7.1 Generic existence of defects.- 7.2 Examples of defects.- 7.2.1 Codimension-1 - defects.- 7.2.2 Codimension-2 defects.- 7.3 Defects and disorder.- 7.4 Bifurcation - of defects.- 8 The Effect of External Fields.- 8.1 Spatial forcing of stationary - patterns.- 8.1.1 Resonant forcings.- 8.1.2 Near-resonant forcings and commensurate - incommensurate transitions.- 8.2 Temporal forcing of a Hopf bifurcation.- - 8.3 Temporal forcing of one-dimensional wave patterns.- 8.3.1 Pattern selection - and defects.- 8.3.2 Experimental observations.- 8.4 Temporal forcing of two-dimensional - wave patterns.- 8.4.1 Isotropic systems.- 8.4.2 Anisotropic systems.- 8.5 - Spatial forcing of wave patterns.- 8.6 Flow field effects on pattern forming - instabilities.- 8.7 The effect of noise on wave patterns.- 8.8 Conclusions.- - 9 Fronts.- 9.1 One-dimensional aspects.- 9.1.1 The leading-edge approach.- - 9.1.2 Breakdown of the leading-edge approach.- 9.1.3 Envelope fronts.- 9.1.4 - Multiple fronts.- 9.2 Two-dimensional aspects.- 9.2.1 Propagation of roll - patterns.- 9.2.2 Propagation of hexagonal patterns.- 10 Pattern Formation: - Generic versus Nongeneric Aspects.- 10.1 Kinetic coefficients.- 10.2 Nongradient - dynamics.- 10.3 Experimental set-ups.- 11 Microstructures in Irradiated Materials.- - 11.1 Particle irradiation of metals and alloys.- 11.1.1 A rate theory model - for microstructure evolution under irradiation.- 11.1.2 Dislocation loop dynamics.- - 11.1.3 The linear stability analysis.- 11.1.4 The weakly nonlinear regime.- - 11.1.5 Numerical analysis.- 11.1.6 Conclusions.- 11.2 Laser induced deformation - of surfaces.- 11.2.1 Thin film dynamics under laser irradiation.- 11.2.2 Linear - stability analysis.- 11.2.3 Weakly nonlinear analysis.- 11.2.4 Finite size - effects.- 11.2.5 Conclusions.- 12 Plastic Instabilities.- 12.1 Dislocation - dynamics and rate equations.- 12.2 Stability analysis and bifurcations.- 12.3 - Nonlinear analysis.- 12.4 Multiple slip.- 13 Afterword.- 14 Appendices.- 14.1 - Bifurcations and normal forms.- 14.1.1 Bifurcations.- 14.1.2 Stability of - equilibria.- 14.1.3 Lyapounov functions.- 14.1.4 Typical bifurcation examples.- - 14.1.5 The Hopf bifurcation theorem.- 14.1.6 The Center Manifold Theorem.- - 14.2 More about dynamical models.- 14.2.1 Proctor-Sivashinsky.- 14.2.2 Ginzburg-Landau.- - 14.3 The Brusselator: A toy model for pattern formation in RD systems.- 14.3.1 - The Turing instability.- 14.3.2 The Hopf Instability.- 14.3.3 Amplitude equations - for Turing-Hopf modes.- 14.4 Resonant forcings of nonlinear oscillators.- - 14.4.1 Parametric forcing.- 14.4.2 Strong resonances in spatially extended - systems.- 14.4.3 Stationary solutions and resonance horns.- 14.4.4 From oscillations - to excitability.", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": - 24, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2012-09-27", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "4851082", "name": "D. Walgraef"}]}, {"paperId": "c0fd303dcd02b4bb9e96478cea092542f2f693f8", - "externalIds": {"DBLP": "journals/siamcomp/BorodinCDRT89", "MAG": "2071260871", - "DOI": "10.1137/0218038", "CorpusId": 12611623}, "url": "https://www.semanticscholar.org/paper/c0fd303dcd02b4bb9e96478cea092542f2f693f8", - "title": "Two Applications of Inductive Counting for Complementation Problems", - "abstract": "Following the recent independent proofs of Immerman [SIAM J. - Comput., 17 (1988), pp. 935\u2013938] and Szelepcsenyi [Bull. European Assoc. - Theoret. Comput. Sci., 33 (1987), pp. 96\u2013100] that nondeterministic space-bounded - complexity classes are closed under complementation, two further applications - of the inductive counting technique are developed. First, an errorless probabilistic - algorithm for the undirected graph s-t connectivity problem that runs in $O(\\log - n)$ space and polynomial expected time is given. Then it is shown that the - class LOGCFL is closed under complementation. The latter is a special case - of a general result that shows closure under complementation of classes defined - by semi-unbounded fan-in circuits (or, equivalently, nondeterministic auxiliary - pushdown automata or tree-size bounded alternating Turing machines). As one - consequence, it is shown that small numbers of \u201crole switches\u201d in - two-person pebbling can be eliminated.", "venue": "SIAM journal on computing - (Print)", "year": 1989, "referenceCount": 47, "citationCount": 143, "influentialCitationCount": - 10, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-06-01", "journal": {"name": "SIAM J. Comput.", "pages": "559-578", "volume": - "18"}, "authors": [{"authorId": "145354960", "name": "A. Borodin"}, {"authorId": - "1765456", "name": "S. Cook"}, {"authorId": "2602153", "name": "Patrick W. - Dymond"}, {"authorId": "1719325", "name": "W. L. Ruzzo"}, {"authorId": "1699741", - "name": "M. Tompa"}]}, {"paperId": "865a040ad372fdadbd5d4784ba434080e6e9eb5a", - "externalIds": {"MAG": "1552288906", "DBLP": "conf/icalp/Simon77", "DOI": - "10.1007/3-540-08342-1_37", "CorpusId": 39772083}, "url": "https://www.semanticscholar.org/paper/865a040ad372fdadbd5d4784ba434080e6e9eb5a", - "title": "On the Difference Between One and Many (Preliminary Version)", "abstract": - null, "venue": "International Colloquium on Automata, Languages and Programming", - "year": 1977, "referenceCount": 21, "citationCount": 82, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1977-07-18", "journal": {"pages": "480-491"}, - "authors": [{"authorId": "143688145", "name": "Janos Simon"}]}, {"paperId": - "5ad36475e45e3f17be1d5cd5a77154cfba2a6994", "externalIds": {"MAG": "2895878038", - "DBLP": "conf/cpp/0002KW20", "DOI": "10.1145/3372885.3373816", "CorpusId": - 54693666}, "url": "https://www.semanticscholar.org/paper/5ad36475e45e3f17be1d5cd5a77154cfba2a6994", - "title": "Verified programming of Turing machines in Coq", "abstract": "We - present a framework for the verified programming of multi-tape Turing machines - in Coq. Improving on prior work by Asperti and Ricciotti in Matita, we implement - multiple layers of abstraction. The highest layer allows a user to implement - nontrivial algorithms as Turing machines and verify their correctness, as - well as time and space complexity compositionally. The user can do so without - ever mentioning states, symbols on tapes or transition functions: They write - programs in an imperative language with registers containing values of encodable - data types, and our framework constructs corresponding Turing machines. As - case studies, we verify a translation from multi-tape to single-tape machines - as well as a universal Turing machine, both with polynomial time overhead - and constant factor space overhead.", "venue": "Certified Programs and Proofs", - "year": 2020, "referenceCount": 26, "citationCount": 16, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle"], - "publicationDate": "2020-01-20", "journal": {"name": "Proceedings of the 9th - ACM SIGPLAN International Conference on Certified Programs and Proofs"}, "authors": - [{"authorId": "24034340", "name": "Y. Forster"}, {"authorId": "31507393", - "name": "F. Kunze"}, {"authorId": "117124493", "name": "Maximilian Wuttke"}]}, - {"paperId": "194bb83b884dff948f28bc09f76c4c09246e609a", "externalIds": {"MAG": - "1983241546", "DBLP": "conf/stoc/RothemundW00", "DOI": "10.1145/335305.335358", - "CorpusId": 6338862}, "url": "https://www.semanticscholar.org/paper/194bb83b884dff948f28bc09f76c4c09246e609a", - "title": "The program-size complexity of self-assembled squares (extended - abstract)", "abstract": "Molecular self-assembly gives rise to a great diversity - of complex forms, from crystals and DNA helices to microtubules \nand holoenzymes. - We study a formal model of pseudocrystalline self-assembly, called the Tile - Assembly Model, in which a tile may be added to the growing object when the - total interaction strength with its neighbors exceeds a parameter \u03a4. - This model has been shown to be Turing-universal. Thus, self-assembled objects - can be studied from the point of view of computational complexity. Here, we - define the program size complexity of an NxN square to be the minimum number - of distinct tiles required to self-assemble the square and no other objects. - We study this complexity under the Tile Assembly Model and find a dramatic - decrease in complexity, from N^2 tiles to O(log N) tiles, as \u03a4 is increased - from 1 (where bonding is noncooperative) to 2 (allowing cooperative bonding). - Further, we find that the size of the largest square uniquely produced by - a set of n \ntiles grows faster than any computable function.", "venue": "Symposium - on the Theory of Computing", "year": 2000, "referenceCount": 36, "citationCount": - 458, "influentialCitationCount": 87, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2000-05-01", "journal": {"pages": - "459-468"}, "authors": [{"authorId": "145477156", "name": "P. Rothemund"}, - {"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": "0840cead727922d82ccb4c9f9380b35e32b1e0a4", - "externalIds": {"MAG": "2949662480", "ArXiv": "1211.0462", "DOI": "10.1007/s11538-013-9827-4", - "CorpusId": 18035130, "PubMed": "23471601"}, "url": "https://www.semanticscholar.org/paper/0840cead727922d82ccb4c9f9380b35e32b1e0a4", - "title": "Stochastic Pattern Formation and Spontaneous Polarisation: The Linear - Noise Approximation and Beyond", "abstract": null, "venue": "Bulletin of Mathematical - Biology", "year": 2012, "referenceCount": 34, "citationCount": 74, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Mathematics", "Biology", - "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Biology", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2012-11-02", "journal": {"name": "Bulletin - of Mathematical Biology", "pages": "895-921", "volume": "76"}, "authors": - [{"authorId": "2105019", "name": "A. McKane"}, {"authorId": "6785594", "name": - "T. Biancalani"}, {"authorId": "47252870", "name": "T. Rogers"}]}, {"paperId": - "e4e4e44c722bba4ddb43d7a2b51a5724620582a6", "externalIds": {"MAG": "2176013489", - "DOI": "10.13031/2013.34253", "CorpusId": 110891943}, "url": "https://www.semanticscholar.org/paper/e4e4e44c722bba4ddb43d7a2b51a5724620582a6", - "title": "Variation within Texture Classes of Soil Water Parameters", "abstract": - "ABSTRACT THE Brooks and Corey effective saturation-capillary pressure equation - was fitted to 1,085 soil moisture characteristics for 10 soil texture classes - ranging from sand to clay. The fitted parameters, A-pore size index, if>fc-bubbling - pressure, and -total porosity, within each texture class were transformed - to a normal distribution. The distribution statistics are presented. Green - and Ampt infiltration equation parameters, ipr wetting front capillary head - and K-conductivity, were estimated from the Brooks and Corey equation parameters - and a transformation to a normal distribu-tion was made. Statistics are presented - for each soil tex-ture.", "venue": "", "year": 1980, "referenceCount": 0, - "citationCount": 78, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Environmental Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Environmental - Science", "source": "external"}, {"category": "Agricultural And Food Sciences", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Transactions of the ASABE", "pages": "335-0339", "volume": - "24"}, "authors": [{"authorId": "67197635", "name": "D. Brakensiek"}, {"authorId": - "153068659", "name": "R. Engleman"}, {"authorId": "35045209", "name": "W. - Rawls"}]}, {"paperId": "200edf4be8d03939c02b42c6fe927632a7d67c07", "externalIds": - {"MAG": "2136043247", "DOI": "10.1177/002199837801200201", "CorpusId": 138774427}, - "url": "https://www.semanticscholar.org/paper/200edf4be8d03939c02b42c6fe927632a7d67c07", - "title": "Langmuir-Type Model for Anomalous Moisture Diffusion In Composite - Resins", "abstract": "Considerable evidence has recently been presented for - anomalous mois ture diffusion in epoxy matrix composites. In an earlier paper - we noted that there is no a priori reason why moisture should obey simple - diffusion theory rather than Kirkwood''s (linear) generalization of the Boltzmann - transport equation. With the intent of keeping the analytical aspects of the - moisture diffusion problem as simple as possible, we here present a slightly - generalized but linear model which involves sources and sinks of diffusing - water molecules. With respect to diffusive characteristics, our model is related - to the simplest form of neutron transport theory. With respect to bound and - unbound particles it is similar to the Langmuir theory of ad sorption isotherms, - although we here assume bulk absorption in the resin with no implication that - surfaces are involved. An approximation to our exact solution of the coupled - linear differential equations is used to fit mildly anomalous moisture uptake - curves for 5208 resin exposed to several rclative humidities for two years. - The fact that the same parameters give equally good fits to the data at all - humidities suggests that the absorption anomaly does not result from nonlinear - (e.g. concentration-dependent) effects.", "venue": "", "year": 1978, "referenceCount": - 16, "citationCount": 468, "influentialCitationCount": 26, "isOpenAccess": - false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "external"}, {"category": "Physics", "source": + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-10-01", "journal": + {"name": "J. Comput. Appl. Math.", "pages": "4132-4147", "volume": "236"}, + "authors": [{"authorId": "1914459", "name": "I. Sgura"}, {"authorId": "2081619", + "name": "B. Bozzini"}, {"authorId": "2663085", "name": "D. Lacitignola"}]}, + {"paperId": "dec9bb653c77016315880caf4cbd4da3fc5bc00e", "externalIds": {"DBLP": + "conf/aistats/GeXG18", "MAG": "2799261850", "CorpusId": 4867516}, "corpusId": + 4867516, "publicationVenue": {"id": "2d136b11-c2b5-484b-b008-7f4a852fd61e", + "name": "International Conference on Artificial Intelligence and Statistics", + "type": "conference", "alternate_names": ["AISTATS", "Int Conf Artif Intell + Stat"]}, "url": "https://www.semanticscholar.org/paper/dec9bb653c77016315880caf4cbd4da3fc5bc00e", + "title": "Turing: Composable inference for probabilistic programming", "abstract": + null, "venue": "International Conference on Artificial Intelligence and Statistics", + "year": 2018, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "1682-1690"}, "authors": [{"authorId": "49365036", "name": "Hong + Ge"}, {"authorId": "2087261358", "name": "Kai Xu"}, {"authorId": "1744700", + "name": "Zoubin Ghahramani"}]}, {"paperId": "4bd5e15ab7de55555f6a946e9723a370d6ac516e", + "externalIds": {"DBLP": "conf/sigecom/MenasceARRFM00", "MAG": "2089664152", + "DOI": "10.1145/352871.352878", "CorpusId": 5181696}, "corpusId": 5181696, + "publicationVenue": {"id": "3c2dd17d-6c11-4bb6-9d01-1fc2064cb8df", "name": + "ACM Conference on Economics and Computation", "type": "conference", "alternate_names": + ["Economics and Computation", "Electron Commer", "EC", "ACM Conf Econ Comput", + "Econ Comput", "Electronic Commerce"], "url": "http://www.acm.org/sigecom/"}, + "url": "https://www.semanticscholar.org/paper/4bd5e15ab7de55555f6a946e9723a370d6ac516e", + "title": "In search of invariants for e-business workloads", "abstract": "ABSTRACT + Understanding the nature and hara teristi s of e-business workloads is a ru + ial step to improve the quality of servi e o ered to ustomers in ele troni + business environments. However, the variety and omplexity of the intera tions + between ustomers and sites make the hara terization of ebusiness workloads + a hallenging problem. Using a multilayer hierar hi al model, this paper presents + a detailed hara terization of the workload of two a tual e-business sites: + an online bookstore and an ele troni au tion site. Through the hara terization + pro ess, we found the presen e of autonomous agents, or robots, in the workload + and used the hierar hi al stru ture to determine their hara teristi s. We + also found that sear h terms follow a Zipf distribution.", "venue": "ACM Conference + on Economics and Computation", "year": 2000, "referenceCount": 25, "citationCount": + 150, "influentialCitationCount": 13, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/352871.352878", "status": "BRONZE"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1978-07-01", "journal": {"name": "Journal of Composite Materials", "pages": - "118 - 131", "volume": "12"}, "authors": [{"authorId": "116184841", "name": - "H. G. Carter"}, {"authorId": "49021391", "name": "K. G. Kibler"}]}, {"paperId": - "a644afb91463df81ddab0b83aac387a8ba807c96", "externalIds": {"CorpusId": 18125250}, - "url": "https://www.semanticscholar.org/paper/a644afb91463df81ddab0b83aac387a8ba807c96", - "title": "Material Meanings Critical Approaches to the Interpretation of Material - Culture", "abstract": "In the late nineteenth and early twentieth cen\u00ad - turies material culture studies formed the foundation of cultural anthropological - re\u00ad search in North America. Although museum anthropology is now subordinate - to academic anthropology, material culture studies were a central force behind - the establishment of ma\u00ad jor museum collections and the employment of - anthropologists throughout North Amer\u00ad ica until the middle of this century - (Miller I987:IIo-II2; Pfaffenberger I992; Wright I996:8I-8S). This material - culture focus in North American anthropology also shaped the development of - early culture theory: cul\u00ad ture areas, theories of style, and models - of dif\u00ad fusion and migration were all conceptualized through a material - culture lens. With the Boasian shift toward historical particularism, interest - in material culture studies by cultural anthropologists waned. For many decades - that followed, material culture studies were relegated to the research domains - of \"primi\u00ad tive\" art and \"primitive\" technology (Conkey I989; Miller - I987; Stark I998). In contrast, of course, archaeologists have maintained - an active interest in material cul\u00ad ture from the mid-nineteenth century - to the present. The nature of our database has en\u00ad couraged archaeologists - to study material culture continuously since the inception of the discipline - as a recognized profession. Ar\u00ad chaeologists describe, illustrate, excavate, - record, organize, and seriate material cul\u00ad ture; little else unifies - archaeological practice today beyond our shared focus on physical, durable - remains of the past. What is perhaps surprising is that archaeologists only - began to develop comprehensive theoretical frame\u00ad works for understanding - material culture in the last 20 years. Some approaches work from the bottom - up, using case studies to il\u00ad lustrate principles of an emerging behavioral - theory (e.g., Schiffer I995; Schiffer and Skibo I997). Others have worked - from the top down, applying evolutionary theory to selected artifact classes - (e.g., Neiman I995; Teltser, ed. I995). Until recently, however, material - culture studies in anthropology have been dominated either by narrow dis\u00ad - cussions of style (e.g., Carr and Neitzel I99 sa; Hegmon I992) or by postmodern - ap\u00ad proaches (e. The irony of this situation is not lost on most archaeologists: - we all use material cul\u00ad ture in our analyses, but most recent efforts - to develop a comprehensive material culture theory in our field derive from - a postmod\u00ad ernist school of thought. Most of us also agree that in traditional - societies today and in the historic past people manipulate(d) ma\u00ad terial - culture through social acts: goods are (and were) used to create cultural - categories, to straddle \u2026", "venue": "", "year": 2010, "referenceCount": - 153, "citationCount": 44, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "History", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - null, "authors": [{"authorId": "1409511132", "name": "T."}]}, {"paperId": - "3fc6d6fe6af354ac475ba65b663168794af610c3", "externalIds": {"MAG": "2168058676", - "DBLP": "journals/bsl/HarringtonS96", "DOI": "10.2307/421110", "CorpusId": - 6855112}, "url": "https://www.semanticscholar.org/paper/3fc6d6fe6af354ac475ba65b663168794af610c3", + "2000-10-17", "journal": {"pages": "56-65"}, "authors": [{"authorId": "1758079", + "name": "D. Menasc\u00e9"}, {"authorId": "145624017", "name": "Virg\u00edlio + A. F. Almeida"}, {"authorId": "2960748", "name": "R. Riedi"}, {"authorId": + "144776057", "name": "Fl\u00e1via Ribeiro"}, {"authorId": "145502789", "name": + "Rodrigo Fonseca"}, {"authorId": "1691267", "name": "Wagner Meira Jr"}]}, + {"paperId": "d0a7be68cf77b1ccd63424e3db06247a05a0d731", "externalIds": {"MAG": + "2908445780", "CorpusId": 1570704}, "corpusId": 1570704, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d0a7be68cf77b1ccd63424e3db06247a05a0d731", + "title": "Turing machines and recursive Turing Tests", "abstract": "The Turing + Test, in its standard interpretation, has been dismissed by many as a practical + intelligence test. In fact, it is questionable that the imitation game was + meant by Turing himself to be used as a test for evaluating machines and measuring + the progress of artificial intelligence. In the past fifteen years or so, + an alternative approach to measuring machine intelligence has been consolidating. + The key concept for this alternative approach is not the Turing Test, but + the Turing machine, and some theories derived upon it, such as Solomonoff\u2019s + theory of prediction, the MML principle, Kolmogorov complexity and algorithmic + information theory. This presents an antagonistic view to the Turing test, + where intelligence tests are based on formal principles, are not anthropocentric, + are meaningful computationally and the abilities (or factors) which are evaluated + can be recognised and quantified. Recently, however, this computational view + has been touching upon issues which are somewhat related to the Turing Test, + namely that we may need other intelligent agents in the tests. Motivated by + these issues (and others), this paper links these two antagonistic views by + bringing some of the ideas around the Turing Test to the realm of Turing machines.", + "venue": "", "year": 2012, "referenceCount": 53, "citationCount": 9, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "28-33", "volume": ""}, "authors": [{"authorId": "1398777358", "name": + "J. Hern\u00e1ndez-Orallo"}, {"authorId": "1403897525", "name": "Javier Insa-Cabrera"}, + {"authorId": "1745871", "name": "D. Dowe"}, {"authorId": "39109261", "name": + "B. Hibbard"}]}, {"paperId": "3fc6d6fe6af354ac475ba65b663168794af610c3", "externalIds": + {"MAG": "2168058676", "DBLP": "journals/bsl/HarringtonS96", "DOI": "10.2307/421110", + "CorpusId": 6855112}, "corpusId": 6855112, "publicationVenue": {"id": "2e016c78-9f89-4c7f-9072-c015f5de55eb", + "name": "Bulletin of Symbolic Logic", "type": "journal", "alternate_names": + ["Bull Symb Log", "The Bulletin of Symbolic Logic"], "issn": "1079-8986", + "url": "https://www.math.ucla.edu/~asl/bsltoc.htm", "alternate_urls": ["https://www.jstor.org/journal/bullsymblogi", + "http://journals.cambridge.org/BSL", "https://www.cambridge.org/core/journals/bulletin-of-symbolic-logic", + "http://journals.cambridge.org/action/displayJournal?jid=BSL"]}, "url": "https://www.semanticscholar.org/paper/3fc6d6fe6af354ac475ba65b663168794af610c3", "title": "Definability, Automorphisms, and Dynamic Properties of Computably Enumerable Sets", "abstract": "Abstract We announce and explain recent results on the computably enumerable (c.e.) sets, especially their definability properties @@ -34630,15 +38815,53 @@ interactions: information content with respect to relative computability (Turing reducibility).", "venue": "Bulletin of Symbolic Logic", "year": 1996, "referenceCount": 21, "citationCount": 22, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-06-01", "journal": {"name": "Bulletin of Symbolic - Logic", "pages": "199 - 213", "volume": "2"}, "authors": [{"authorId": "143955869", - "name": "L. Harrington"}, {"authorId": "1760293", "name": "R. Soare"}]}, {"paperId": - "5f84365df2e1f7ac32f4899e22033ce609e44d87", "externalIds": {"MAG": "2132334553", - "DOI": "10.5194/HESS-16-4079-2012", "CorpusId": 316217}, "url": "https://www.semanticscholar.org/paper/5f84365df2e1f7ac32f4899e22033ce609e44d87", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-06-01", "journal": + {"name": "Bulletin of Symbolic Logic", "pages": "199 - 213", "volume": "2"}, + "authors": [{"authorId": "143955869", "name": "L. Harrington"}, {"authorId": + "1760293", "name": "R. Soare"}]}, {"paperId": "7bd1ffd7bf9d0581f68d7cc37c6400755e5d77c0", + "externalIds": {"MAG": "1987166952", "DOI": "10.1103/PHYSREVE.71.066217", + "CorpusId": 12643110, "PubMed": "16089859"}, "corpusId": 12643110, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7bd1ffd7bf9d0581f68d7cc37c6400755e5d77c0", + "title": "Turing instability controlled by spatiotemporal imposed dynamics.", + "abstract": "The study of the spatiotemporal response of pattern forming systems + to spatially resonant external forcing has unveiled striking new phenomena + which challenge the understanding of self-organization in nonlinear, nonequilibrium + systems. Here we show that a simple spatiotemporal two-dimensional forcing + of a system supporting an intrinsic wavelength but no intrinsic frequency, + under conditions of spatial resonance, may induce complex and entirely new + spatiotemporal behaviors which do not reflect in any simple way the structure + of the imposed forcing. We demonstrate this phenomenon in the Turing regime + of the (photosensitive) CDIMA reaction by projecting a traveling stripe light + pattern onto the reactor. By controlling the velocity of the forcing we induce + distinct dynamical regimes that express the externally imposed frequency in + new and intriguing ways. A detailed analysis of the experimental relevant + parameters is presented.", "venue": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "year": 2005, "referenceCount": 27, "citationCount": + 19, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-06-30", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 066217\n ", + "volume": "71 6 Pt 2"}, "authors": [{"authorId": "2701200", "name": "D. G. + M\u00edguez"}, {"authorId": "1399331338", "name": "V. P\u00e9rez-Villar"}, + {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}]}, {"paperId": "0e4a64632bc6a4fec640277599c82901fb2447a0", + "externalIds": {"MAG": "2010331576", "DOI": "10.1021/J100025A051", "CorpusId": + 95119865}, "corpusId": 95119865, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e4a64632bc6a4fec640277599c82901fb2447a0", + "title": "Experimental Evidence for Turing Structures", "abstract": null, + "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 18, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}], "publicationTypes": + null, "publicationDate": "1995-06-01", "journal": {"name": "The Journal of + Physical Chemistry", "pages": "10417-10419", "volume": "99"}, "authors": [{"authorId": + "2150934538", "name": "J. Ross"}, {"authorId": "1756978", "name": "A. Arkin"}, + {"authorId": "2112730939", "name": "S. C. Mueller"}]}, {"paperId": "5f84365df2e1f7ac32f4899e22033ce609e44d87", + "externalIds": {"MAG": "2132334553", "DOI": "10.5194/HESS-16-4079-2012", "CorpusId": + 316217}, "corpusId": 316217, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5f84365df2e1f7ac32f4899e22033ce609e44d87", "title": "COSMOS: the COsmic-ray Soil Moisture Observing System", "abstract": "The newly-developed cosmic-ray method for mea- suring area-average soil moisture at the hectometer horizon- tal scale is being implemented in the COsmic-ray @@ -34657,7 +38880,8 @@ interactions: and dissemination used in the COS- MOS project, and give example time series of soil moisture obtained from COSMOS probes.", "venue": "", "year": 2012, "referenceCount": 77, "citationCount": 436, "influentialCitationCount": 51, - "isOpenAccess": true, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://hess.copernicus.org/articles/16/4079/2012/hess-16-4079-2012.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-11-07", "journal": {"name": "Hydrology and Earth System Sciences", "pages": @@ -34666,154 +38890,602 @@ interactions: "4039736", "name": "X. Zeng"}, {"authorId": "2136905", "name": "C. Zweck"}, {"authorId": "39810975", "name": "D. Desilets"}, {"authorId": "79615655", "name": "T. Franz"}, {"authorId": "3074182", "name": "R. Rosolem"}]}, {"paperId": - "61155bde4dd196ae827763bd73862dc2f6c3fd6e", "externalIds": {"MAG": "2130772396", - "DOI": "10.1504/IJDSDE.2008.023002", "CorpusId": 55623470}, "url": "https://www.semanticscholar.org/paper/61155bde4dd196ae827763bd73862dc2f6c3fd6e", - "title": "Stability analysis of Reaction-Diffusion Systems with constant coefficients - on growing domains", "abstract": "We present stability theory for reaction-diffusion - systems with constant coefficients on growing domains. The model equations - on growing domains are transformed to fixed domains at each time yielding - a conservative system. We derive and show that the diffusion-driven instability - conditions for an exponentially growing domain depend on the domain growth - rate. By looking at the eigenvalues, we show that the shifting of the Turing - space is equivalent to the standard Turing space on a fixed domain but with - eigenvalues shifted to the left of the complex plane by a constant factor - given by the divergence of the domain velocity.", "venue": "", "year": 2008, - "referenceCount": 33, "citationCount": 27, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "International Journal of Dynamical Systems and Differential - Equations", "pages": "250-262", "volume": "1"}, "authors": [{"authorId": "2731718", - "name": "A. Madzvamuse"}]}, {"paperId": "247bf4635f57896cfe7d27324895aa8f29aede07", - "externalIds": {"DBLP": "conf/latin/Margenstern95", "MAG": "2155294253", "DOI": - "10.1007/3-540-59175-3_104", "CorpusId": 7556015}, "url": "https://www.semanticscholar.org/paper/247bf4635f57896cfe7d27324895aa8f29aede07", + "247bf4635f57896cfe7d27324895aa8f29aede07", "externalIds": {"DBLP": "conf/latin/Margenstern95", + "MAG": "2155294253", "DOI": "10.1007/3-540-59175-3_104", "CorpusId": 7556015}, + "corpusId": 7556015, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/247bf4635f57896cfe7d27324895aa8f29aede07", "title": "Non-Erasing Turing Machines: A New Frontier Between a Decidable Halting Problem and Universality", "abstract": null, "venue": "LATIN", "year": 1995, "referenceCount": 7, "citationCount": 21, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1995-04-03", "journal": {"pages": "386-397"}, "authors": - [{"authorId": "1697682", "name": "M. Margenstern"}]}, {"paperId": "a9905a73b71ba35127d9748feba8e2e7cb6109bb", - "externalIds": {"DBLP": "journals/siamcomp/Gradel90", "MAG": "1979788764", - "DOI": "10.1137/0219055", "CorpusId": 35194197}, "url": "https://www.semanticscholar.org/paper/a9905a73b71ba35127d9748feba8e2e7cb6109bb", - "title": "Domino Games and Complexity", "abstract": "Domino games which describe - computations of alternating Turing machines in the same way as dominoes (tiling - systems) encode computations of deterministic and nondeterministic Turing - machines are considered. The domino games are two-person games in the course - of which the players build up domino tilings of a square of prescribed size. - Acceptance of an alternating Turing machine corresponds to a winning strategy - for one player\u2014the number of moves in the game is the number of alternations - of the Turing machine.Let $\\operatorname{ATIME}(T(n), m)$ denote the class - of all sets that are accepted by some alternating Turing machine in time $T(n)$ - with at most m alternations. It is shown that any problem in such a complexity - class can be reduced to the strategy problem for some domino game. In particular - domino games which are complete in the classes $\\Sigma_{m}^{p}$, and $\\Pi_{m}^{p}$, - of the polynomial time hierarchy are found. This corresponds to the approach - of Savelsbergh and van Emde Boas and of Lewis and Pap...", "venue": "SIAM - J. Comput.", "year": 1990, "referenceCount": 1, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1990-09-01", "journal": {"name": "SIAM J. Comput.", "pages": "787-804", "volume": - "19"}, "authors": [{"authorId": "1749375", "name": "E. Gr\u00e4del"}]}, {"paperId": - "2a41ffc30f9ecbc40d34e8daef7f7b9249725dae", "externalIds": {"ArXiv": "1203.5021", - "MAG": "2952336543", "DOI": "10.1111/j.1365-2966.2012.21145.x", "CorpusId": - 96445035}, "url": "https://www.semanticscholar.org/paper/2a41ffc30f9ecbc40d34e8daef7f7b9249725dae", - "title": "Eliminating error in the chemical abundance scale for extragalactic - H ii regions", "abstract": "In an attempt to remove the systematic errors - which have plagued the calibration of the Hii region abundance sequence, we - have theoretically modeled the extragalactic Hii region sequence. We then - used the theoretical spectra so generated in a double blind experiment to - recover the chemical abundances using both the classical electron temperature - + ionization correction factor technique, and the technique which de- pends - on the use of strong emission lines (SELs) in the nebular spectrum to estimate - the abundance of oxygen. We find a number of systematic trends, and we provide - correction formulae which should remove systematic errors in the electron - tempera- ture + ionization correction factor technique. We also provide a - critical evaluation of the various semi-empirical SEL techniques. Finally, - we offer a scheme which should help to eliminate systematic errors in the - SEL-derived chemical abundance scale for extragalactic Hii regions.", "venue": - "", "year": 2012, "referenceCount": 88, "citationCount": 139, "influentialCitationCount": - 28, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-03-22", - "journal": {"name": "Monthly Notices of the Royal Astronomical Society", "pages": - "2630-2651", "volume": "426"}, "authors": [{"authorId": "1402302642", "name": - "\u00c1. L\u00f3pez-S\u00e1nchez"}, {"authorId": "5883616", "name": "M. Dopita"}, - {"authorId": "7166417", "name": "L. Kewley"}, {"authorId": "33389762", "name": - "H. Zahid"}, {"authorId": "36130312", "name": "D. Nicholls"}, {"authorId": - "88656967", "name": "J. Scharwachter"}]}, {"paperId": "bbe926c080c5cc5d68cf98df933741e3c024e1a0", - "externalIds": {"MAG": "3087206849", "DOI": "10.1021/acs.jmedchem.0c01148", - "CorpusId": 221827467, "PubMed": "32955254"}, "url": "https://www.semanticscholar.org/paper/bbe926c080c5cc5d68cf98df933741e3c024e1a0", - "title": "A Turing test for molecular generators.", "abstract": "Machine learning - approaches promise to accelerate and improve success rates in medicinal chemistry - programmes by more effectively leveraging available data to guide molecular - design. A key step of an automated computational design algorithm is molecule - generation, where the machine is required to design high-quality, drug-like - molecules, within the appropriate chemical space. Many algorithms have been - proposed for molecular generation, however a challenge is how to assess the - validity of the resulting molecules. Here we report three Turing-inspired - tests designed to evaluate the performance of molecular generators. Profound - differences were observed between the performance of molecule generators in - these tests, highlighting the importance of selection of the appropriate design - algorithms for specific circumstances. One molecule generator, based on match-molecular - pairs, performed excellently against all tests, and thus provides a valuable - component for machine driven medicinal chemistry design workflows.", "venue": - "Journal of Medicinal Chemistry", "year": 2020, "referenceCount": 41, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Chemistry"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Chemistry", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-09-21", "journal": {"name": "Journal of medicinal - chemistry"}, "authors": [{"authorId": "3495805", "name": "Jacob T. Bush"}, - {"authorId": "11632730", "name": "P. Pog\u00e1ny"}, {"authorId": "145617773", - "name": "S. Pickett"}, {"authorId": "2068712860", "name": "Mike D. Barker"}, - {"authorId": "2063040835", "name": "Andrew Baxter"}, {"authorId": "34056327", - "name": "Sebastien Campos"}, {"authorId": "145502029", "name": "A. Cooper"}, - {"authorId": "31728366", "name": "D. Hirst"}, {"authorId": "13641981", "name": - "G. Inglis"}, {"authorId": "47390797", "name": "A. Nadin"}, {"authorId": "144239969", - "name": "V. Patel"}, {"authorId": "5353446", "name": "Darren L. Poole"}, {"authorId": - "153899068", "name": "J. Pritchard"}, {"authorId": "48848565", "name": "Yoshiaki - Washio"}, {"authorId": "2054438027", "name": "Gemma White"}, {"authorId": - "144670441", "name": "D. Green"}]}, {"paperId": "d1ab98772dd946a6e4062a08de15b91b821841ff", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-04-03", "journal": + {"pages": "386-397"}, "authors": [{"authorId": "1697682", "name": "M. Margenstern"}]}, + {"paperId": "6fa9f272d46c1d12deb0e7ccf01170110aea7d67", "externalIds": {"MAG": + "1543145547", "DBLP": "conf/pnpm/RuizFG99", "DOI": "10.1109/PNPM.1999.796565", + "CorpusId": 7102397}, "corpusId": 7102397, "publicationVenue": {"id": "71e0533d-8457-4641-ac72-16d9805e6ae0", + "name": "Petri Nets and Performance Models", "type": "conference", "alternate_names": + ["Petri Net Perform Model", "PNPM", "International Workshop on Petri Nets + and Performance Models", "Int Workshop Petri Net Perform Model"]}, "url": + "https://www.semanticscholar.org/paper/6fa9f272d46c1d12deb0e7ccf01170110aea7d67", + "title": "On non-decidability of reachability for timed-arc Petri nets", "abstract": + "Timed-arc Petri nets are not Turing powerful, because, in particular, they + cannot simulate a counter with test on zero. Thus, we could think that this + model does not extend significantly the expressiveness of untimed Petri nets. + But this is not true; in this paper we show that the differences between them + are big enough to make the reachability problem undecidable. We also define + dead tokens as those that cannot be used for firing any transitions in the + future and we present some particular cases where we can identify them on + this kind of timed nets.", "venue": "Petri Nets and Performance Models", "year": + 1999, "referenceCount": 16, "citationCount": 75, "influentialCitationCount": + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1999-09-08", "journal": + {"pages": "188-196"}, "authors": [{"authorId": "2675626", "name": "V. V. Ruiz"}, + {"authorId": "1402955013", "name": "David de Frutos-Escrig"}, {"authorId": + "2057637046", "name": "Fernando Cuartero G\u00f3mez"}]}, {"paperId": "f33965d27a1ccfdd58f325456bd6d61714057383", + "externalIds": {"MAG": "2024325294", "DOI": "10.1016/J.SHPSA.2010.07.010", + "CorpusId": 120427071}, "corpusId": 120427071, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f33965d27a1ccfdd58f325456bd6d61714057383", + "title": "Deviant encodings and Turing\u2019s analysis of computability", + "abstract": null, "venue": "", "year": 2010, "referenceCount": 9, "citationCount": + 23, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, + {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2010-09-01", "journal": {"name": "Studies in History + and Philosophy of Science", "pages": "247-252", "volume": "41"}, "authors": + [{"authorId": "144246233", "name": "B. Copeland"}, {"authorId": "144239027", + "name": "D. Proudfoot"}]}, {"paperId": "d1ab98772dd946a6e4062a08de15b91b821841ff", "externalIds": {"MAG": "2074067015", "DBLP": "journals/mima/Cleland95", "DOI": - "10.1007/BF00974187", "CorpusId": 44416152}, "url": "https://www.semanticscholar.org/paper/d1ab98772dd946a6e4062a08de15b91b821841ff", + "10.1007/BF00974187", "CorpusId": 44416152}, "corpusId": 44416152, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/d1ab98772dd946a6e4062a08de15b91b821841ff", "title": "Effective procedures and computable functions", "abstract": null, "venue": "Minds and Machines", "year": 1995, "referenceCount": 6, "citationCount": - 20, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1995-02-01", "journal": - {"name": "Minds and Machines", "pages": "9-23", "volume": "5"}, "authors": - [{"authorId": "32624486", "name": "Carol E. Cleland"}]}, {"paperId": "069e08edc9916a85174ebe7d22512ab418470c19", - "externalIds": {"MAG": "1983852986", "DOI": "10.1109/81.473569", "CorpusId": - 119768342}, "url": "https://www.semanticscholar.org/paper/069e08edc9916a85174ebe7d22512ab418470c19", - "title": "Turing patterns in CNNs. III. Computer simulation results", "abstract": - "For part II, see ibid., vol. 42, no. 10, pp. 612-26 (Oct. 1995). In this - paper, various patterns obtained through computer simulations are presented. - It is shown through simple examples that the four inequalities known as the - Turing instability conditions are only necessary but not sufficient conditions - for Turing patterns to exist. The influence of various parameters, initial - conditions as well as sidewall forcing on the final patterns and the possibilities - of eliminating defects are studied by means of computer simulations. The possibility - of generating perfectly regular patterns or patterns with few defects through - the application of small and short controlling signals at one boundary suggests - the intriguing possibility of producing high-purity high-tech materials, such - as crystals, which was not possible with current technology. In addition, - novel applications in image processing, pattern recognition, and other areas - can be expected. >", "venue": "", "year": 1995, "referenceCount": 3, "citationCount": - 28, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1995-10-01", "journal": {"name": - "IEEE Transactions on Circuits and Systems I-regular Papers", "pages": "627-637", - "volume": "42"}, "authors": [{"authorId": "1876298", "name": "L. Goras"}, - {"authorId": "144848684", "name": "L. Chua"}, {"authorId": "2793014", "name": - "L. Pivka"}]}, {"paperId": "f7a16d81312b0669c5ab9a320cbc45a70736eb8a", "externalIds": - {"DBLP": "conf/dimacs/KariL99", "MAG": "81003598", "DOI": "10.1090/dimacs/054/17", - "CorpusId": 5399211}, "url": "https://www.semanticscholar.org/paper/f7a16d81312b0669c5ab9a320cbc45a70736eb8a", + 20, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1995-02-01", "journal": {"name": "Minds and Machines", "pages": "9-23", "volume": + "5"}, "authors": [{"authorId": "32624486", "name": "Carol E. Cleland"}]}, + {"paperId": "920b65b865801cbcda6c3ef7d1ba95b2246b7b8c", "externalIds": {"MAG": + "1984964186", "DOI": "10.1063/1.165851", "CorpusId": 19498774, "PubMed": "12779937"}, + "corpusId": 19498774, "publicationVenue": {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", + "name": "Chaos", "type": "journal", "issn": "1054-1500", "url": "http://chaos.aip.org/", + "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, "url": "https://www.semanticscholar.org/paper/920b65b865801cbcda6c3ef7d1ba95b2246b7b8c", + "title": "Transition to chemical turbulence.", "abstract": "Experiments have + been conducted on Turing-type chemical spatial patterns and their variants + in a quasi-two-dimensional open spatial reactor with a chlorite-iodide-malonic + acid reaction. A variety of stationary spatial structures-hexagons, stripes, + and mixed states-were observed, and transitions to these states were studied. + For conditions beyond those corresponding to the emergence of patterns, a + transition was observed from stationary spatial patterns to chemical turbulence, + which is marked by a continuous motion of the pattern within a domain and + of the grain boundaries between domains. The transition to chemical turbulence + was analyzed by measuring the correlation length, the average pattern speed, + and the total length of the domain boundaries. The emergence of chemical turbulence + is accompanied by a large increase in the defects in the pattern, which suggests + that this is an example of defect-mediated turbulence.", "venue": "Chaos", + "year": 1991, "referenceCount": 37, "citationCount": 144, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://repositories.lib.utexas.edu/bitstream/2152/43283/1/1991_12_Ouyang.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Materials Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Materials Science", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1991-12-01", "journal": + {"name": "Chaos", "pages": "\n 411-420\n ", "volume": "1 4"}, + "authors": [{"authorId": "143803550", "name": "Q. Ouyang"}, {"authorId": "2421446", + "name": "H. Swinney"}]}, {"paperId": "53f1a7ac0398cce4ce049fd5e2d79e67925a492c", + "externalIds": {"DBLP": "journals/aim/AdamsBC16", "MAG": "2394902045", "DOI": + "10.1609/aimag.v37i1.2643", "CorpusId": 2925946}, "corpusId": 2925946, "publicationVenue": + {"id": "6fedff74-7525-4b7f-bbb4-4df4e23948e4", "name": "The AI Magazine", + "type": "journal", "alternate_names": ["AI Mag", "Ai Mag", "Ai Magazine"], + "issn": "0738-4602", "url": "https://www.aaai.org/Library/Magazine/magazine-library.php", + "alternate_urls": ["https://www.aaai.org/ojs/index.php/aimagazine/", "https://www.aaai.org/Magazine/magazine.php"]}, + "url": "https://www.semanticscholar.org/paper/53f1a7ac0398cce4ce049fd5e2d79e67925a492c", + "title": "I-athlon: Towards A Multidimensional Turing Test", "abstract": "While + the Turing test is a well-known method for evaluating machine intelligence, + it has a number of drawbacks that make it problematic as a rigorous and practical + test for assessing progress in general-purpose AI. For example, the Turing + test is deception based, subjectively evaluated, and narrowly focused on language + use. We suggest that a test would benefit from including the following requirements: + focus on rational behavior, test several dimensions of intelligence, automate + as much as possible, score as objectively as possible, and allow incremental + progress to be measured. In this article we propose a methodology for designing + a test that consists of a series of events, analogous to the Olympic Decathlon, + which complies with these requirements. The approach, which we call the I-athlon, + is intended to ultimately enable the community to evaluate progress towards + machine intelligence in a practical and repeatable way.", "venue": "The AI + Magazine", "year": 2016, "referenceCount": 1, "citationCount": 20, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://aaai.org/ojs/index.php/aimagazine/article/download/2643/2537", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2016-04-13", "journal": {"name": "AI Mag.", "pages": "78-84", + "volume": "37"}, "authors": [{"authorId": "153876154", "name": "S. S. Adams"}, + {"authorId": "1789880", "name": "G. Banavar"}, {"authorId": "143903370", "name": + "Murray Campbell"}]}, {"paperId": "96a886975b3227e8bc66eacdded39af930c32ff5", + "externalIds": {"MAG": "2053099695", "DOI": "10.1090/S0002-9939-1954-0063995-6", + "CorpusId": 122203431}, "corpusId": 122203431, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/96a886975b3227e8bc66eacdded39af930c32ff5", + "title": "A theorem on hypersimple sets", "abstract": "1. S. C. Kleene, Introduction + to metamathematics, New York, Amsterdam, and Groningen, 1952. 2. R. M. Robinson, + Review, J. Symbolic Logic vol. 16 (1951) p. 282. 3. P. C. Rosenbloom, An elementary + constructive proof of the fundamental theorem of algebra, Amer. Math. Monthly + vol. 52 (1945) pp. 562-570. 4. E. Specker, Nicht Konstructiv beweisbare Sdtze + der Analysis, J. Symbolic Logic vol. 14 (1949) pp. 145-158. 5. A. M. Turing, + On computable numbers, with an application to the Entscheidungsproblem, Proc. + London Math. Soc. (2) vol. 42 (1936-37) pp. 230-265.", "venue": "", "year": + 1954, "referenceCount": 3, "citationCount": 82, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/proc/1954-005-05/S0002-9939-1954-0063995-6/S0002-9939-1954-0063995-6.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1954-05-01", "journal": {"name": "", "pages": "791-796", "volume": "5"}, + "authors": [{"authorId": "143692355", "name": "J. Dekker"}]}, {"paperId": + "060d2a2d092ec8dfb82be11b66fa774eb9f6e295", "externalIds": {"DBLP": "journals/jsyml/JockuschS84", + "MAG": "2083623332", "DOI": "10.2307/2274273", "CorpusId": 28946399}, "corpusId": + 28946399, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/060d2a2d092ec8dfb82be11b66fa774eb9f6e295", + "title": "Pseudo-jump operators. II: Transfinite iterations, hierarchies and + minimal covers", "abstract": "In this paper we introduce a new hierarchy of + sets and operators which we call the REA hierarchy for \u201crecursively enumerable + in and above\u201d. The hierarchy is generated by composing (possibly) transfinite + sequences of the pseudo-jump operators considered in Jockusch and Shore [1983]. + We there studied pseudo-jump operators defined by analogy with the Turing + jump as ones taking a set A to A \u2295 for some index e. We would now call + these 1-REA operators and will extend them to \u03b1-REA operators for recursive + ordinals \u03b1 in analogy with the iterated Turing jump operators (A \u2192 + A(\u03b1) for \u03b1 < and Kleene''s hyperarithmetic hierarchy. The REA sets + will then, of course, be the results of applying these operators to the empty + set. They will extend and generalize Kleene''s H sets but will still be contained + in the class of set singletons thus providing us with a new richer subclass + of the set singletons which, as we shall see, is related to the work of Harrington + [1975] and [1976] on the problems of Friedman [1975] about the arithmetic + degrees of such singletons. Their degrees also give a natural class extending + the class H of Jockusch and McLaughlin [1969] by closing it off under transfinite + iterations as well as the inclusion of [d, d\u2032] for each degree d in the + class. The reason for the class being closed under this last operation is + that the REA operators include all operators and so give a new hierarchy for + them as well as the sets. This hierarchy also turns out to be related to the + difference hierarchy of Ershov [1968], [1968a] and [1970]: every \u03b1-r.e. + set is \u03b1-REA but each level of the REA hierarchy after the first extends + all the way through the difference hierarchy although never entirely encompassing + even the next level of the difference hierarchy.", "venue": "Journal of Symbolic + Logic (JSL)", "year": 1984, "referenceCount": 40, "citationCount": 103, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1984-12-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "1205 - 1236", "volume": "49"}, "authors": [{"authorId": + "1888089", "name": "C. Jockusch"}, {"authorId": "1817824", "name": "R. Shore"}]}, + {"paperId": "e3e43036591bced6ac0c276ad567460110d48a51", "externalIds": {"MAG": + "1996654684", "DOI": "10.1149/2.040204JES", "CorpusId": 96320821}, "corpusId": + 96320821, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e3e43036591bced6ac0c276ad567460110d48a51", + "title": "Extreme Bottom-Up Superfilling of Through-Silicon-Vias by Damascene + Processing: Suppressor Disruption, Positive Feedback and Turing Patterns", + "abstract": null, "venue": "", "year": 2012, "referenceCount": 64, "citationCount": + 153, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Journal of The Electrochemical Society", "volume": + "159"}, "authors": [{"authorId": "32681085", "name": "T. Moffat"}, {"authorId": + "2724858", "name": "D. Josell"}]}, {"paperId": "194bb83b884dff948f28bc09f76c4c09246e609a", + "externalIds": {"MAG": "1983241546", "DBLP": "conf/stoc/RothemundW00", "DOI": + "10.1145/335305.335358", "CorpusId": 6338862}, "corpusId": 6338862, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/194bb83b884dff948f28bc09f76c4c09246e609a", + "title": "The program-size complexity of self-assembled squares (extended + abstract)", "abstract": "Molecular self-assembly gives rise to a great diversity + of complex forms, from crystals and DNA helices to microtubules \nand holoenzymes. + We study a formal model of pseudocrystalline self-assembly, called the Tile + Assembly Model, in which a tile may be added to the growing object when the + total interaction strength with its neighbors exceeds a parameter \u03a4. + This model has been shown to be Turing-universal. Thus, self-assembled objects + can be studied from the point of view of computational complexity. Here, we + define the program size complexity of an NxN square to be the minimum number + of distinct tiles required to self-assemble the square and no other objects. + We study this complexity under the Tile Assembly Model and find a dramatic + decrease in complexity, from N^2 tiles to O(log N) tiles, as \u03a4 is increased + from 1 (where bonding is noncooperative) to 2 (allowing cooperative bonding). + Further, we find that the size of the largest square uniquely produced by + a set of n \ntiles grows faster than any computable function.", "venue": "Symposium + on the Theory of Computing", "year": 2000, "referenceCount": 36, "citationCount": + 458, "influentialCitationCount": 87, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.dna.caltech.edu/Papers/squares_STOC.pdf", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2000-05-01", "journal": + {"pages": "459-468"}, "authors": [{"authorId": "145477156", "name": "P. Rothemund"}, + {"authorId": "3094920", "name": "E. Winfree"}]}, {"paperId": "9e018f970f513e0f7103baa94726aa207765bf0c", + "externalIds": {"MAG": "1963720465", "DOI": "10.1016/J.PHYSLETA.2005.04.098", + "CorpusId": 119373349}, "corpusId": 119373349, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9e018f970f513e0f7103baa94726aa207765bf0c", + "title": "Turing patterns in a modified Lotka\u2013Volterra model", "abstract": + null, "venue": "", "year": 2005, "referenceCount": 18, "citationCount": 38, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2005-07-04", "journal": {"name": + "Physics Letters A", "pages": "90-98", "volume": "342"}, "authors": [{"authorId": + "2939172", "name": "Edward A. Mcgehee"}, {"authorId": "1403262523", "name": + "E. Peacock-L\u00f3pez"}]}, {"paperId": "9f7bd031383264d27aa7806176ecd82192ba8138", + "externalIds": {"MAG": "2079797656", "DBLP": "conf/fpca/ChuangG93", "DOI": + "10.1145/165180.165225", "CorpusId": 11245450}, "corpusId": 11245450, "publicationVenue": + {"id": "b817908e-1775-414c-88da-a90ad4cf22a9", "name": "Conference on Functional + Programming Languages and Computer Architecture", "type": "conference", "alternate_names": + ["FPCA", "Conf Funct Program Lang Comput Archit"], "url": "http://www.acm.org/pubs/contents/proceedings/fp/"}, + "url": "https://www.semanticscholar.org/paper/9f7bd031383264d27aa7806176ecd82192ba8138", + "title": "Real-time deques, multihead Turing machines, and purely functional + programming", "abstract": "We answer the following question: Can a deque (doubleended + queue) be implemented in a purely functional language such that each push + or pop operation on either end of a queue is accomplished in 0(1) time in + the worst case? The answer is yes, thus solving a problem posted by Gajewska + and Tarjan [14] and by Ponder, McGeer, and Ng [25], and refining results of + Sarnak [26] and Hoogerwoord [18]. We term such a deque real-time, since its + constant worstcaae behavior might be useful in real time programs (assuming + real-time garbage collection [3], etc.) Furthermore, we show that no restriction + of the functional language is necessary, and that push and pop operations + on previou$ versions of a deque can also be achieved in constant time. We + present a purely functional implementation of realtime deques and its complexity + analysis. We then show that the implementation has some interesting implications, + and can be used to give a real-time simulation of a multihead Turing machine + in a purely functional language.", "venue": "Conference on Functional Programming + Languages and Computer Architecture", "year": 1993, "referenceCount": 34, + "citationCount": 30, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/165180.165225", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1993-07-01", "journal": {"pages": "289-298"}, "authors": + [{"authorId": "2106147", "name": "Tyng-Ruey Chuang"}, {"authorId": "144179390", + "name": "B. Goldberg"}]}, {"paperId": "200edf4be8d03939c02b42c6fe927632a7d67c07", + "externalIds": {"MAG": "2136043247", "DOI": "10.1177/002199837801200201", + "CorpusId": 138774427}, "corpusId": 138774427, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/200edf4be8d03939c02b42c6fe927632a7d67c07", + "title": "Langmuir-Type Model for Anomalous Moisture Diffusion In Composite + Resins", "abstract": "Considerable evidence has recently been presented for + anomalous mois ture diffusion in epoxy matrix composites. In an earlier paper + we noted that there is no a priori reason why moisture should obey simple + diffusion theory rather than Kirkwood''s (linear) generalization of the Boltzmann + transport equation. With the intent of keeping the analytical aspects of the + moisture diffusion problem as simple as possible, we here present a slightly + generalized but linear model which involves sources and sinks of diffusing + water molecules. With respect to diffusive characteristics, our model is related + to the simplest form of neutron transport theory. With respect to bound and + unbound particles it is similar to the Langmuir theory of ad sorption isotherms, + although we here assume bulk absorption in the resin with no implication that + surfaces are involved. An approximation to our exact solution of the coupled + linear differential equations is used to fit mildly anomalous moisture uptake + curves for 5208 resin exposed to several rclative humidities for two years. + The fact that the same parameters give equally good fits to the data at all + humidities suggests that the absorption anomaly does not result from nonlinear + (e.g. concentration-dependent) effects.", "venue": "", "year": 1978, "referenceCount": + 16, "citationCount": 471, "influentialCitationCount": 26, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1978-07-01", "journal": {"name": "Journal of Composite Materials", "pages": + "118 - 131", "volume": "12"}, "authors": [{"authorId": "116184841", "name": + "H. G. Carter"}, {"authorId": "49021391", "name": "K. G. Kibler"}]}, {"paperId": + "355c51f680454e891f89bd9aa6960bece5ccec36", "externalIds": {"MAG": "2281664623", + "DOI": "10.1007/978-3-7091-6597-3_8", "CorpusId": 6365510}, "corpusId": 6365510, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/355c51f680454e891f89bd9aa6960bece5ccec36", + "title": "Logical depth and physical complexity", "abstract": null, "venue": + "", "year": 1988, "referenceCount": 68, "citationCount": 418, "influentialCitationCount": + 42, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1988-10-01", "journal": {"name": + "", "pages": "227-257", "volume": ""}, "authors": [{"authorId": "2623914", + "name": "Charles H. Bennett"}]}, {"paperId": "c0d2e193f4efa95b2b053db6a86f2190989dedb9", + "externalIds": {"MAG": "190787757", "DOI": "10.1142/S1793524514500478", "CorpusId": + 117691862}, "corpusId": 117691862, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c0d2e193f4efa95b2b053db6a86f2190989dedb9", + "title": "Spatial pattern in a diffusive predator\u2013prey model with sigmoid + ratio-dependent functional response", "abstract": "In this paper, spatial + patterns of a diffusive predator\u2013prey model with sigmoid (Holling type + III) ratio-dependent functional response which concerns the influence of logistic + population growth in prey and intra-species competition among predators are + investigated. The (local and global) asymptotic stability behavior of the + corresponding non-spatial model around the unique positive interior equilibrium + point in homogeneous steady state is obtained. In addition, we derive the + conditions for Turing instability and the consequent parametric Turing space + in spatial domain. The results of spatial pattern analysis through numerical + simulations are depicted and analyzed. Furthermore, we perform a series of + numerical simulations and find that the proposed model dynamics exhibits complex + pattern replication. The feasible results obtained in this paper indicate + that the effect of diffusion in Turing instability plays an important role + to understand better the pattern formation in ecosystem.", "venue": "", "year": + 2014, "referenceCount": 46, "citationCount": 23, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2014-08-20", "journal": {"name": "International Journal of Biomathematics", + "pages": "1450047", "volume": "07"}, "authors": [{"authorId": "2323903", "name": + "L. N. Guin"}, {"authorId": "32540390", "name": "P. K. Mandal"}]}, {"paperId": + "a644afb91463df81ddab0b83aac387a8ba807c96", "externalIds": {"CorpusId": 18125250}, + "corpusId": 18125250, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a644afb91463df81ddab0b83aac387a8ba807c96", + "title": "Material Meanings Critical Approaches to the Interpretation of Material + Culture", "abstract": "In the late nineteenth and early twentieth cen\u00ad + turies material culture studies formed the foundation of cultural anthropological + re\u00ad search in North America. Although museum anthropology is now subordinate + to academic anthropology, material culture studies were a central force behind + the establishment of ma\u00ad jor museum collections and the employment of + anthropologists throughout North Amer\u00ad ica until the middle of this century + (Miller I987:IIo-II2; Pfaffenberger I992; Wright I996:8I-8S). This material + culture focus in North American anthropology also shaped the development of + early culture theory: cul\u00ad ture areas, theories of style, and models + of dif\u00ad fusion and migration were all conceptualized through a material + culture lens. With the Boasian shift toward historical particularism, interest + in material culture studies by cultural anthropologists waned. For many decades + that followed, material culture studies were relegated to the research domains + of \"primi\u00ad tive\" art and \"primitive\" technology (Conkey I989; Miller + I987; Stark I998). In contrast, of course, archaeologists have maintained + an active interest in material cul\u00ad ture from the mid-nineteenth century + to the present. The nature of our database has en\u00ad couraged archaeologists + to study material culture continuously since the inception of the discipline + as a recognized profession. Ar\u00ad chaeologists describe, illustrate, excavate, + record, organize, and seriate material cul\u00ad ture; little else unifies + archaeological practice today beyond our shared focus on physical, durable + remains of the past. What is perhaps surprising is that archaeologists only + began to develop comprehensive theoretical frame\u00ad works for understanding + material culture in the last 20 years. Some approaches work from the bottom + up, using case studies to il\u00ad lustrate principles of an emerging behavioral + theory (e.g., Schiffer I995; Schiffer and Skibo I997). Others have worked + from the top down, applying evolutionary theory to selected artifact classes + (e.g., Neiman I995; Teltser, ed. I995). Until recently, however, material + culture studies in anthropology have been dominated either by narrow dis\u00ad + cussions of style (e.g., Carr and Neitzel I99 sa; Hegmon I992) or by postmodern + ap\u00ad proaches (e. The irony of this situation is not lost on most archaeologists: + we all use material cul\u00ad ture in our analyses, but most recent efforts + to develop a comprehensive material culture theory in our field derive from + a postmod\u00ad ernist school of thought. Most of us also agree that in traditional + societies today and in the historic past people manipulate(d) ma\u00ad terial + culture through social acts: goods are (and were) used to create cultural + categories, to straddle \u2026", "venue": "", "year": 2010, "referenceCount": + 153, "citationCount": 44, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "1409511132", "name": "T."}]}, + {"paperId": "da5f479d7226ca5a72870f75df4178f82ecd558d", "externalIds": {"MAG": + "2188403926", "CorpusId": 62446216}, "corpusId": 62446216, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/da5f479d7226ca5a72870f75df4178f82ecd558d", + "title": "Continuous Signature Monitoring: Low-Cost Concurrent Detection of + Processor Control Errors", "abstract": "This paper presents a low-cost approach + to concurrent de- tection of processor control errors that uses a simple hardware + monitor and signatures embedded into the executing program. Existing signa- + ture-monitoring techniques detect a large portion of processor control errors + at a fraction of the cost of duplication. Analytical methods de- veloped in + this paper show that the new approach, continuous signa- ture monitoring (CSM), + makes major advances beyond existing tech- niques. CSM reduces the fraction + of undetected control-flow errors by orders of magnitude, to less than The + number of signatures reaches a theoretical minimum, lowered by as much as + 3 times to a range of 4-11%. Signature cost is reduced by placing CSM signatures + at locations that minimize performance loss and (for some architec- tures) + memory overhead. CSM exploits the program memory''s SEC/ DED code to decrease + error-detection latency by as much as lo00 times, to 0.016 program memory + cycles, without increasing memory over- head. This short latency allows transient + faults to he tolerated.", "venue": "", "year": 1990, "referenceCount": 21, + "citationCount": 33, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "31788425", + "name": "V. Agarwal"}]}, {"paperId": "9e1be153d25fa691b0b6408d047e5bc0b7bc36b2", + "externalIds": {"DBLP": "journals/corr/Riedl14", "MAG": "2151901989", "ArXiv": + "1410.6142", "CorpusId": 2487258}, "corpusId": 2487258, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9e1be153d25fa691b0b6408d047e5bc0b7bc36b2", + "title": "The Lovelace 2.0 Test of Artificial Creativity and Intelligence", + "abstract": "Observing that the creation of certain types of artistic artifacts + necessitate intelligence, we present the Lovelace 2.0 Test of creativity as + an alternative to the Turing Test as a means of determining whether an agent + is intelligent. The Lovelace 2.0 Test builds off prior tests of creativity + and additionally provides a means of directly comparing the relative intelligence + of different agents.", "venue": "ArXiv", "year": 2014, "referenceCount": 8, + "citationCount": 42, "influentialCitationCount": 10, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-10-22", "journal": {"name": "ArXiv", "volume": "abs/1410.6142"}, "authors": + [{"authorId": "2757194", "name": "Mark O. Riedl"}]}, {"paperId": "e4e4e44c722bba4ddb43d7a2b51a5724620582a6", + "externalIds": {"MAG": "2176013489", "DOI": "10.13031/2013.34253", "CorpusId": + 110891943}, "corpusId": 110891943, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4e4e44c722bba4ddb43d7a2b51a5724620582a6", + "title": "Variation within Texture Classes of Soil Water Parameters", "abstract": + "ABSTRACT THE Brooks and Corey effective saturation-capillary pressure equation + was fitted to 1,085 soil moisture characteristics for 10 soil texture classes + ranging from sand to clay. The fitted parameters, A-pore size index, if>fc-bubbling + pressure, and -total porosity, within each texture class were transformed + to a normal distribution. The distribution statistics are presented. Green + and Ampt infiltration equation parameters, ipr wetting front capillary head + and K-conductivity, were estimated from the Brooks and Corey equation parameters + and a transformation to a normal distribu-tion was made. Statistics are presented + for each soil tex-ture.", "venue": "", "year": 1980, "referenceCount": 0, + "citationCount": 78, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Environmental Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Environmental Science", "source": "external"}, {"category": "Agricultural + And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "Transactions of the ASABE", + "pages": "335-0339", "volume": "24"}, "authors": [{"authorId": "67197635", + "name": "D. Brakensiek"}, {"authorId": "153068659", "name": "R. Engleman"}, + {"authorId": "35045209", "name": "W. Rawls"}]}, {"paperId": "850bfe48aa9e0f07c49b31aea6747c33778b32a1", + "externalIds": {"MAG": "2083434917", "DOI": "10.2307/1935882", "CorpusId": + 154444964}, "corpusId": 154444964, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/850bfe48aa9e0f07c49b31aea6747c33778b32a1", + "title": "The Determinants of Entry by Domestic and Foreign Enterprises in + Canadian Manufacturing Industries: Some Comments and Empirical Results", "abstract": + "ture and Monetary Policy,\" April 1975, forthcoming in the American Economic + Review. Motley, B., \"Household Demand for Assets: A Model of Short-Run Adjustments,\" + this REviEw 52 (Aug. 1970), 236-241. Watts, H., and J. Tobin, \"Consumer Expenditure + and the Capital Account,\" in I. Friend and R. Jones (eds.), Proceedings of + the Conference on Consumption and Savings, vol. II, Philadelphia, 1960, 1-48. + Zellner, A., \"Basic Elements of a General Model of Consumer Behavior,\" in + I. Friend and R. Jones (eds.), Proceedings of the Conference on Consumption + and Savings, vol. II, Philadelphia, 1960, 488498.", "venue": "", "year": 1976, + "referenceCount": 0, "citationCount": 77, "influentialCitationCount": 3, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Economics", "Business"], + "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": + "Business", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}, + {"category": "History", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "1976-11-01", "journal": {"name": "The Review of Economics + and Statistics", "pages": "485-488", "volume": "58"}, "authors": [{"authorId": + "12945036", "name": "P. Gorecki"}]}, {"paperId": "4b6ee646ba2f7f42b9654eca0b4ec287fcad03d6", + "externalIds": {"DBLP": "conf/lisa/Traugott02", "MAG": "203188803", "CorpusId": + 9014255}, "corpusId": 9014255, "publicationVenue": {"id": "df661677-e13a-4a52-a5d0-e9d919dd50cf", + "name": "LiSA", "type": "journal", "alternate_names": ["USENIX Large Install + Syst Adm Conf", "USENIX Large Installation Systems Administration Conference", + "LISA"], "issn": "1340-8836", "url": "http://www.wikicfp.com/cfp/program?id=11962"}, + "url": "https://www.semanticscholar.org/paper/4b6ee646ba2f7f42b9654eca0b4ec287fcad03d6", + "title": "Why Order Matters: Turing Equivalence in Automated Systems Administration", + "abstract": "Hosts in a well-architected enterprise infrastructure are self-administered; + they perform their own maintenance and upgrades. By definition, self-administered + hosts execute self-modifying code. They do not behave according to simple + state machine rules, but can incorporate complex feedback loops and evolutionary + recursion.The implications of this behavior are of immediate concern to the + reliability, security, and ownership costs of enterprise and mission-critical + computing. In retrospect, it appears that the same concerns also apply to + manually-administered machines, in which administrators use tools that execute + in the context of the target disk to change the contents of the same disk. + The self-modifying behavior of both manual and automatic administration techniques + helps explain the difficulty and expense of maintaining high availability + and security in conventionally-administered infrastructures.The practice of + infrastructure architecture tool design exists to bring order to this self-referential + chaos. Conventional systems administration can be greatly improved upon through + discipline, culture, and adoption of practices better fitted to enterprise + needs. Creating a low-cost maintenance strategy largely remains an art. What + can we do to put this art into the hands of relatively junior administrators? + We think that part of the answer includes adopting a well-proven strategy + for maintenance tools, based in part upon the theoretical properties of computing.In + this paper, we equate self-administered hosts to Turing machines in order + to help build a theoretical foundation for understanding this behavior. We + discuss some tools that provide mechanisms for reliably managing self-administered + hosts, using deterministic ordering techniques.Based on our findings, it appears + that no tool, written in any language, can predictably administer an enterprise + infrastructure without maintaining a deterministic, repeatable order of changes + on each host. The runtime environment for any tool always executes in the + context of the target operating system; changes can affect the behavior of + the tool itself, creating circular dependencies. The behavior of these changes + may be difficult to predict in advance, so testing is necessary to validate + changed hosts. Once changes have been validated in testing they must be replicated + in production in the same order in which they were tested, due to these same + circular dependencies.The least-cost method of managing multiple hosts also + appears to be deterministic ordering. All other known management methods seem + to include either more testing or higher risk for each host managed.This paper + is a living document; revisions and discussion can be found at Infrastructures.Org, + a project of TerraLuna, LLC.", "venue": "LiSA", "year": 2002, "referenceCount": + 27, "citationCount": 31, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-11-08", "journal": {"pages": "99-120"}, "authors": + [{"authorId": "98531396", "name": "S. Traugott"}]}, {"paperId": "c6c672c6a8917a34303f879bcce54c75352a3e90", + "externalIds": {"MAG": "2129549781", "DOI": "10.1080/00288306.1981.10422743", + "CorpusId": 140569747}, "corpusId": 140569747, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c6c672c6a8917a34303f879bcce54c75352a3e90", + "title": "Oxygen isotopic paleotemperatures across the Runangan-Whaingaroan + (Eocene-Oligocene) boundary in a New Zealand shelf sequence", "abstract": + "Oxygen isotopic compositions of the followed the global open-ocean trend + towards a Paleogene minimum near the Eocerie-Oligocene boundary. Throughout + the latest Eocene, tempera tures declined steadily by 3\u00b0C, showed a temporary + minor warming at the Eocenc-Oligocene boundary, dropped sharply by 2\u00b0C + in the Early Oligocene, and ameliorated significantly later in the Early Oligocene. + The qualitative temperature trends for New Zealand shelf waters at this time + are similar to those inferred from earlier paleontologic syntheses and limited + oxygen isotopic work, but involve a range of temperatures within the warm + and cool temperate climatic zones and an absolute tempera ture depression + across the Eocene-Oligocene boundary of only 5\u00b0C from about 17 to 12\u00b0C. + Results are consistent with isotopic paleotempera tures determined from deep-sea + sediment cores south of New Zealand where the cooling is inferred to mark + the onset of production of Antarctic bottom waters at near-freezing temperatures.", + "venue": "", "year": 1981, "referenceCount": 39, "citationCount": 23, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://researchcommons.waikato.ac.nz/bitstream/10289/4838/1/oxygen%20isotopic.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": + "Geology", "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1981-07-01", "journal": {"name": + "New Zealand Journal of Geology and Geophysics", "pages": "529-538", "volume": + "24"}, "authors": [{"authorId": "4554064", "name": "D. A. Burns"}, {"authorId": + "46384175", "name": "C. Nelson"}]}, {"paperId": "b0cfffe3f44ed236d85971fe0ec8e2d69090d0f4", + "externalIds": {"MAG": "639675847", "CorpusId": 118620407}, "corpusId": 118620407, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b0cfffe3f44ed236d85971fe0ec8e2d69090d0f4", + "title": "Spatio-Temporal Pattern Formation: With Examples from Physics, Chemistry, + and Materials Science", "abstract": "1 Introduction.- 2 Instabilities and + Patterns in Hydrodynamical Systems.- 2.1 Rayleigh-Benard instability.- 2.2 + Taylor-Couette instability.- 2.3 Liquid crystal instabilities.- 3 Instabilities + and Patterns in Reaction-Diffusion Systems.- 3.1 Chemical instabilities.- + 3.2 Defect microstructures in irradiated materials.- 3.3 Plastic deformation + and dislocation patterns.- 4 Generic Aspects of Pattern-Forming Instabilities.- + 4.1 Phenomenology.- 4.2 Reaction-diffusion dynamics and stability.- 4.3 Reduced + dynamics and amplitude equations.- 4.4 Spatial patterns: selection and stability.- + 4.4.1 Isotropic systems.- 4.4.2 Anisotropic systems.- 4.5 Phase dynamics of + periodic patterns.- 4.5.1 Isotropic systems.- 4.5.2 Anisotropic systems.- + 5 The Hopf Bifurcation and Related Spatio-Temporal Patterns.- 5.1 The generic + aspects of oscillatory media.- 5.1.1 The complex Ginzburg-Landau equation.- + 5.1.2 Phase dynamics and spiral waves.- 5.2 Real chemical systems and the + complex Ginzburg-Landau equation.- 5.2.1 Determination of the CGLE parameters + in real systems.- 5.2.2 CGLE parameters of the BZ reaction.- 5.3 The effect + of natural forcings on chemical oscillators.- 5.3.1 The effect of convection + on chemical waves.- 5.3.2 The effect of vertical gradients on chemical oscillations.- + 5.4 Conclusions.- 6 The Turing Instability and Associated Spatial Structures.- + 6.1 The Turing mechanism.- 6.2 The search for Turing structures.- 6.2.1 Convectively + driven chemical patterns.- 6.2.2 Double diffusion and chemical fingers.- 6.3 + At last, genuine Turing structures?.- 6.4 The interaction between Turing and + Hopf instabilities.- 6.4.1 Amplitude equations for Turing-Hopf modes.- 6.4.2 + Pattern selection for codimension-2 Turing-Hopf bifurcations.- 6.4.3 Defects, + defect bifurcations and localized structures.- 7 Defects and Defect Bifurcations.- + 7.1 Generic existence of defects.- 7.2 Examples of defects.- 7.2.1 Codimension-1 + defects.- 7.2.2 Codimension-2 defects.- 7.3 Defects and disorder.- 7.4 Bifurcation + of defects.- 8 The Effect of External Fields.- 8.1 Spatial forcing of stationary + patterns.- 8.1.1 Resonant forcings.- 8.1.2 Near-resonant forcings and commensurate + incommensurate transitions.- 8.2 Temporal forcing of a Hopf bifurcation.- + 8.3 Temporal forcing of one-dimensional wave patterns.- 8.3.1 Pattern selection + and defects.- 8.3.2 Experimental observations.- 8.4 Temporal forcing of two-dimensional + wave patterns.- 8.4.1 Isotropic systems.- 8.4.2 Anisotropic systems.- 8.5 + Spatial forcing of wave patterns.- 8.6 Flow field effects on pattern forming + instabilities.- 8.7 The effect of noise on wave patterns.- 8.8 Conclusions.- + 9 Fronts.- 9.1 One-dimensional aspects.- 9.1.1 The leading-edge approach.- + 9.1.2 Breakdown of the leading-edge approach.- 9.1.3 Envelope fronts.- 9.1.4 + Multiple fronts.- 9.2 Two-dimensional aspects.- 9.2.1 Propagation of roll + patterns.- 9.2.2 Propagation of hexagonal patterns.- 10 Pattern Formation: + Generic versus Nongeneric Aspects.- 10.1 Kinetic coefficients.- 10.2 Nongradient + dynamics.- 10.3 Experimental set-ups.- 11 Microstructures in Irradiated Materials.- + 11.1 Particle irradiation of metals and alloys.- 11.1.1 A rate theory model + for microstructure evolution under irradiation.- 11.1.2 Dislocation loop dynamics.- + 11.1.3 The linear stability analysis.- 11.1.4 The weakly nonlinear regime.- + 11.1.5 Numerical analysis.- 11.1.6 Conclusions.- 11.2 Laser induced deformation + of surfaces.- 11.2.1 Thin film dynamics under laser irradiation.- 11.2.2 Linear + stability analysis.- 11.2.3 Weakly nonlinear analysis.- 11.2.4 Finite size + effects.- 11.2.5 Conclusions.- 12 Plastic Instabilities.- 12.1 Dislocation + dynamics and rate equations.- 12.2 Stability analysis and bifurcations.- 12.3 + Nonlinear analysis.- 12.4 Multiple slip.- 13 Afterword.- 14 Appendices.- 14.1 + Bifurcations and normal forms.- 14.1.1 Bifurcations.- 14.1.2 Stability of + equilibria.- 14.1.3 Lyapounov functions.- 14.1.4 Typical bifurcation examples.- + 14.1.5 The Hopf bifurcation theorem.- 14.1.6 The Center Manifold Theorem.- + 14.2 More about dynamical models.- 14.2.1 Proctor-Sivashinsky.- 14.2.2 Ginzburg-Landau.- + 14.3 The Brusselator: A toy model for pattern formation in RD systems.- 14.3.1 + The Turing instability.- 14.3.2 The Hopf Instability.- 14.3.3 Amplitude equations + for Turing-Hopf modes.- 14.4 Resonant forcings of nonlinear oscillators.- + 14.4.1 Parametric forcing.- 14.4.2 Strong resonances in spatially extended + systems.- 14.4.3 Stationary solutions and resonance horns.- 14.4.4 From oscillations + to excitability.", "venue": "", "year": 2012, "referenceCount": 0, "citationCount": + 24, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-09-27", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "4851082", "name": "D. Walgraef"}]}, + {"paperId": "f7a16d81312b0669c5ab9a320cbc45a70736eb8a", "externalIds": {"DBLP": + "conf/dimacs/KariL99", "MAG": "81003598", "DOI": "10.1090/dimacs/054/17", + "CorpusId": 5399211}, "corpusId": 5399211, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f7a16d81312b0669c5ab9a320cbc45a70736eb8a", "title": "Computational power of gene rearrangement", "abstract": "In 8] we proposed a model to describe the homologous recombi-nations that take place during massive gene rearrangements in hypotrichous ciliates. Here we develop @@ -34823,36 +39495,87 @@ interactions: organisms may have the capacity to perform any computation carried out by an electronic computer.", "venue": "DNA Based Computers", "year": 1999, "referenceCount": 18, "citationCount": 53, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "207-216"}, "authors": [{"authorId": "144073818", "name": "L. Kari"}, - {"authorId": "1801972", "name": "L. Landweber"}]}, {"paperId": "355c51f680454e891f89bd9aa6960bece5ccec36", - "externalIds": {"MAG": "2281664623", "DOI": "10.1007/978-3-7091-6597-3_8", - "CorpusId": 6365510}, "url": "https://www.semanticscholar.org/paper/355c51f680454e891f89bd9aa6960bece5ccec36", - "title": "Logical depth and physical complexity", "abstract": null, "venue": - "", "year": 1988, "referenceCount": 68, "citationCount": 417, "influentialCitationCount": - 41, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1988-10-01", "journal": {"name": "", "pages": "227-257", "volume": ""}, "authors": - [{"authorId": "2623914", "name": "Charles H. Bennett"}]}, {"paperId": "b2f382e8529d471c2601b776acd0d3d47745365b", - "externalIds": {"MAG": "2900950960", "DOI": "10.1038/S41567-018-0358-7", "CorpusId": - 126274864, "PubMed": "31327978"}, "url": "https://www.semanticscholar.org/paper/b2f382e8529d471c2601b776acd0d3d47745365b", - "title": "Guiding self-organized pattern formation in cell polarity establishment", - "abstract": null, "venue": "Nature Physics", "year": 2018, "referenceCount": - 72, "citationCount": 64, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-12-03", "journal": {"name": "Nature Physics", "pages": - "293-300", "volume": "15"}, "authors": [{"authorId": "2097712981", "name": - "P. Gross"}, {"authorId": "50385723", "name": "K. V. Kumar"}, {"authorId": - "4079035", "name": "N. Goehring"}, {"authorId": "2581310", "name": "J. Bois"}, - {"authorId": "5935317", "name": "Carsten Hoege"}, {"authorId": "3141258", - "name": "F. J\u00fclicher"}, {"authorId": "4288008", "name": "S. Grill"}]}, - {"paperId": "7c7776d6775d1bb6bc124afa78f67ce4531e6c85", "externalIds": {"MAG": - "2341138125", "CorpusId": 124929813}, "url": "https://www.semanticscholar.org/paper/7c7776d6775d1bb6bc124afa78f67ce4531e6c85", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "207-216"}, "authors": [{"authorId": "144073818", + "name": "L. Kari"}, {"authorId": "1801972", "name": "L. Landweber"}]}, {"paperId": + "af19a8bda0a584714c4802933d280bfe76605473", "externalIds": {"MAG": "2619020951", + "DOI": "10.1007/978-3-319-53280-6_5", "CorpusId": 195976673}, "corpusId": + 195976673, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/af19a8bda0a584714c4802933d280bfe76605473", + "title": "Turing on \u201cCommon Sense\u201d: Cambridge Resonances", "abstract": + null, "venue": "", "year": 2017, "referenceCount": 118, "citationCount": 14, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "103-149", "volume": ""}, "authors": [{"authorId": "39423496", "name": + "J. Floyd"}]}, {"paperId": "3712d7bfa588c7919a394a9cfa167044fb6f10dd", "externalIds": + {"PubMedCentral": "5324081", "MAG": "2581689784", "DOI": "10.1021/acscentsci.6b00330", + "CorpusId": 22055063, "PubMed": "28280778"}, "corpusId": 22055063, "publicationVenue": + {"id": "df882f0f-d88c-4139-8462-219dcb05d97c", "name": "ACS Central Science", + "type": "journal", "alternate_names": ["AC Central Sci", "ACS central science", + "AC central sci"], "issn": "2374-7943", "url": "https://pubs.acs.org/journal/acscii"}, + "url": "https://www.semanticscholar.org/paper/3712d7bfa588c7919a394a9cfa167044fb6f10dd", + "title": "Two-Way Chemical Communication between Artificial and Natural Cells", + "abstract": "Artificial cells capable of both sensing and sending chemical + messages to bacteria have yet to be built. Here we show that artificial cells + that are able to sense and synthesize quorum signaling molecules can chemically + communicate with V. fischeri, V. harveyi, E. coli, and P. aeruginosa. Activity + was assessed by fluorescence, luminescence, RT-qPCR, and RNA-seq. Two potential + applications for this technology were demonstrated. First, the extent to which + artificial cells could imitate natural cells was quantified by a type of cellular + Turing test. Artificial cells capable of sensing and in response synthesizing + and releasing N-3-(oxohexanoyl)homoserine lactone showed a high degree of + likeness to natural V. fischeri under specific test conditions. Second, artificial + cells that sensed V. fischeri and in response degraded a quorum signaling + molecule of P. aeruginosa (N-(3-oxododecanoyl)homoserine lactone) were constructed, + laying the foundation for future technologies that control complex networks + of natural cells.", "venue": "ACS Central Science", "year": 2017, "referenceCount": + 50, "citationCount": 141, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2017-01-25", "journal": {"name": "ACS + Central Science", "pages": "117 - 123", "volume": "3"}, "authors": [{"authorId": + "5595789", "name": "Roberta Lentini"}, {"authorId": "9600818", "name": "No\u00ebl + Yeh Mart\u00edn"}, {"authorId": "49406449", "name": "M. Forlin"}, {"authorId": + "9602711", "name": "Luca Belmonte"}, {"authorId": "47677068", "name": "Jason + Fontana"}, {"authorId": "9607406", "name": "Michele Cornella"}, {"authorId": + "33869911", "name": "L. Martini"}, {"authorId": "5667637", "name": "S. Tamburini"}, + {"authorId": "2672872", "name": "W. Bentley"}, {"authorId": "46653295", "name": + "O. Jousson"}, {"authorId": "1781448", "name": "S. Mansy"}]}, {"paperId": + "81d08199896a222cab6e2170860b5a4cb44469c8", "externalIds": {"MAG": "2009536613", + "DOI": "10.3171/JNS.1967.27.6.0541", "CorpusId": 37146025, "PubMed": "6065127"}, + "corpusId": 37146025, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/81d08199896a222cab6e2170860b5a4cb44469c8", + "title": "Enlarging skull fractures: an experimental study.", "abstract": + "~ TEADY enlargement of a skull f rac ture sometimes follows a head injury, + part icularly in the first year of life. A review of the l i terature and + discussion of clinical features and problems were presented in 1961 by Lende + and Erickson. 5 Other cases subsequent ly have been repor ted. 1,a Our interest + in the problem was s t imula ted by the case of a ~-year-old girl with a par + ie ta l fracture tha t was apparen t ly enlarging or \"growing\" 9 months + af ter injury. Surgical explorat ion exposed a large dural defect; one edge + of the defect was 1 to ~ em behind the bone edge while the other dural margin + passed through the f rac ture line to fuse with per icranimn. There were mult + iple small arachnoidal cysts and old cortical contusions. Dura l repair was + easily accomplished and the skull defect repaired with split r ib grafts. + The following invest igat ion was designed to determine which elements of + the clinical syndrome (skull fracture, dural tear , arachnoidal tear , brain + and pial tear , or ventr icular communicat ion) were essential to the product + ion of an enlarging fracture.", "venue": "Journal of neurosurgery", "year": + 1967, "referenceCount": 6, "citationCount": 62, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1967-12-01", "journal": {"name": "Journal of + neurosurgery", "pages": "\n 541-50\n ", "volume": "27 6"}, + "authors": [{"authorId": "145572625", "name": "F. Goldstein"}, {"authorId": + "83726321", "name": "T. Sakoda"}, {"authorId": "5871009", "name": "J. Kepes"}, + {"authorId": "17031601", "name": "K. Kavidson"}, {"authorId": "3241153", "name": + "C. Brackett"}]}, {"paperId": "7c7776d6775d1bb6bc124afa78f67ce4531e6c85", + "externalIds": {"MAG": "2341138125", "CorpusId": 124929813}, "corpusId": 124929813, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c7776d6775d1bb6bc124afa78f67ce4531e6c85", "title": "Small universal Turing machines", "abstract": "Numerous results for simple computationally universal systems are presented, with a particular focus on small universal Turing machines. These results are towards finding @@ -34885,14 +39608,346 @@ interactions: and 2-state machines are very close to the minimum possible size for weakly universal machines with 3 and 2 states, respectively.", "venue": "", "year": 2008, "referenceCount": 119, "citationCount": 12, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "2221070", "name": "Turlough Neary"}]}, + {"paperId": "be903265c02e0416cfcf42781b071690fea541da", "externalIds": {"DBLP": + "conf/itc/SaxenaBJKASH03", "MAG": "1568407911", "DOI": "10.1109/TEST.2003.1271098", + "CorpusId": 7105666}, "corpusId": 7105666, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/be903265c02e0416cfcf42781b071690fea541da", + "title": "A case study of ir-drop in structured at-speed testing", "abstract": + "At-speed test has become a requirement in IC tech- nologies below 180 nm. + Unfortunately, test mode switching activity and IR-drop present special chal- + lenges to the successful application of structural at- speed tests. In this + paper we characterize these prob- lems on commercial ASICs in order to understand + how to implement more effective solutions. consumption. Depending on such + parameters as gate count, DFT strategies, package type, and other fac- tors, + the impact of this problem can range from non- existent to severe. In this + paper, we discuss the prac- tical issues associated with power consumption + during at-speed tests. We begin by delineating in more detail the nature of + power-related phenomena encountered in structured speed tests. We talk about + various de- sign features that can be applied to somewhat miti- gate test + mode power dissipation. In Section 2, we give a more precise definition of + the IR-drop problem which is the focus of this pa- per. We compare IR-drop + in slow speed and at-speed structural tests, and also compare it with functional + IR-drop. We narrow the focus further to the topic of toggle activity or \"switching + density\" during struc- tured at-speed tests. In Section 3.4 we describe the + notion of \"quiet\" patterns and how they are gener- ated. We follow up with + a report of the results we have obtained in experimentation on industrial + ASIC designs. Finally we give our suggestions for future work in this area + and conclude the paper.", "venue": "International Test Conference, 2003. Proceedings. + ITC 2003.", "year": 2003, "referenceCount": 21, "citationCount": 406, "influentialCitationCount": + 23, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2003-09-30", + "journal": {"name": "International Test Conference, 2003. Proceedings. ITC + 2003.", "pages": "1098-1104", "volume": "1"}, "authors": [{"authorId": "145301646", + "name": "Jayashree Saxena"}, {"authorId": "34960306", "name": "K. Butler"}, + {"authorId": "50420106", "name": "Vinay B. Jayaram"}, {"authorId": "1383453370", + "name": "Subhendu Kundu"}, {"authorId": "144861260", "name": "N. Arvind"}, + {"authorId": "2815714", "name": "Pravin Sreeprakash"}, {"authorId": "2226330", + "name": "Manfred Hachinger"}]}, {"paperId": "4a613aee7ce1fbffb92779dd296ba7a7fd6c7af6", + "externalIds": {"MAG": "2148828758", "DOI": "10.1111/j.1464-410X.2004.05261.x", + "CorpusId": 26723583, "PubMed": "15638907"}, "corpusId": 26723583, "publicationVenue": + {"id": "1de3fb36-2df6-4422-8158-aa8cbfe3ed56", "name": "BJU International", + "type": "journal", "alternate_names": ["BJUI", "BJU Int"], "issn": "1464-4096", + "url": "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1464-410X", "alternate_urls": + ["http://www.bjui.org/"]}, "url": "https://www.semanticscholar.org/paper/4a613aee7ce1fbffb92779dd296ba7a7fd6c7af6", + "title": "Transurethral resection of the ejaculatory ducts for treating ejaculatory + symptoms", "abstract": "To report our experience with transurethral resection + of the ejaculatory ducts (TURED) in infertile men with symptomatic ejaculatory + duct obstruction (EDO).", "venue": "BJU International", "year": 2005, "referenceCount": + 15, "citationCount": 27, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-01-01", "journal": + {"name": "BJU International", "volume": "95"}, "authors": [{"authorId": "2116558042", + "name": "Christopher W. Johnson"}, {"authorId": "2168669257", "name": "Jonathan + B. Bingham"}, {"authorId": "6551064", "name": "E. Goluboff"}, {"authorId": + "80915789", "name": "H. Fisch"}]}, {"paperId": "c86d6f344e4cf62af216bea8d51ad500bf9edfd4", + "externalIds": {"DBLP": "journals/corr/Yang16", "MAG": "2952984004", "ArXiv": + "1602.08671", "CorpusId": 9152132}, "corpusId": 9152132, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c86d6f344e4cf62af216bea8d51ad500bf9edfd4", + "title": "Lie Access Neural Turing Machine", "abstract": "Following the recent + trend in explicit neural memory structures, we present a new design of an + external memory, wherein memories are stored in an Euclidean key space $\\mathbb + R^n$. An LSTM controller performs read and write via specialized read and + write heads. It can move a head by either providing a new address in the key + space (aka random access) or moving from its previous position via a Lie group + action (aka Lie access). In this way, the \"L\" and \"R\" instructions of + a traditional Turing Machine are generalized to arbitrary elements of a fixed + Lie group action. For this reason, we name this new model the Lie Access Neural + Turing Machine, or LANTM. \nWe tested two different configurations of LANTM + against an LSTM baseline in several basic experiments. We found the right + configuration of LANTM to outperform the baseline in all of our experiments. + In particular, we trained LANTM on addition of $k$-digit numbers for $2 \\le + k \\le 16$, but it was able to generalize almost perfectly to $17 \\le k \\le + 32$, all with the number of parameters 2 orders of magnitude below the LSTM + baseline.", "venue": "ArXiv", "year": 2016, "referenceCount": 35, "citationCount": + 15, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-02-28", "journal": {"name": "ArXiv", "volume": "abs/1602.08671"}, "authors": + [{"authorId": "35064203", "name": "Greg Yang"}]}, {"paperId": "5ad36475e45e3f17be1d5cd5a77154cfba2a6994", + "externalIds": {"MAG": "2895878038", "DBLP": "conf/cpp/0002KW20", "DOI": "10.1145/3372885.3373816", + "CorpusId": 54693666}, "corpusId": 54693666, "publicationVenue": {"id": "2f699b3b-cb0f-4ee8-867d-bb187b8970e7", + "name": "Certified Programs and Proofs", "type": "conference", "alternate_names": + ["CPP", "Certif Program Proof"]}, "url": "https://www.semanticscholar.org/paper/5ad36475e45e3f17be1d5cd5a77154cfba2a6994", + "title": "Verified programming of Turing machines in Coq", "abstract": "We + present a framework for the verified programming of multi-tape Turing machines + in Coq. Improving on prior work by Asperti and Ricciotti in Matita, we implement + multiple layers of abstraction. The highest layer allows a user to implement + nontrivial algorithms as Turing machines and verify their correctness, as + well as time and space complexity compositionally. The user can do so without + ever mentioning states, symbols on tapes or transition functions: They write + programs in an imperative language with registers containing values of encodable + data types, and our framework constructs corresponding Turing machines. As + case studies, we verify a translation from multi-tape to single-tape machines + as well as a universal Turing machine, both with polynomial time overhead + and constant factor space overhead.", "venue": "Certified Programs and Proofs", + "year": 2020, "referenceCount": 26, "citationCount": 16, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle"], "publicationDate": "2020-01-20", + "journal": {"name": "Proceedings of the 9th ACM SIGPLAN International Conference + on Certified Programs and Proofs"}, "authors": [{"authorId": "24034340", "name": + "Y. Forster"}, {"authorId": "31507393", "name": "F. Kunze"}, {"authorId": + "117124493", "name": "Maximilian Wuttke"}]}, {"paperId": "2a41ffc30f9ecbc40d34e8daef7f7b9249725dae", + "externalIds": {"ArXiv": "1203.5021", "MAG": "2952336543", "DOI": "10.1111/j.1365-2966.2012.21145.x", + "CorpusId": 96445035}, "corpusId": 96445035, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2a41ffc30f9ecbc40d34e8daef7f7b9249725dae", + "title": "Eliminating error in the chemical abundance scale for extragalactic + H ii regions", "abstract": "In an attempt to remove the systematic errors + which have plagued the calibration of the Hii region abundance sequence, we + have theoretically modeled the extragalactic Hii region sequence. We then + used the theoretical spectra so generated in a double blind experiment to + recover the chemical abundances using both the classical electron temperature + + ionization correction factor technique, and the technique which de- pends + on the use of strong emission lines (SELs) in the nebular spectrum to estimate + the abundance of oxygen. We find a number of systematic trends, and we provide + correction formulae which should remove systematic errors in the electron + tempera- ture + ionization correction factor technique. We also provide a + critical evaluation of the various semi-empirical SEL techniques. Finally, + we offer a scheme which should help to eliminate systematic errors in the + SEL-derived chemical abundance scale for extragalactic Hii regions.", "venue": + "", "year": 2012, "referenceCount": 88, "citationCount": 139, "influentialCitationCount": + 28, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1203.5021", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-03-22", "journal": {"name": + "Monthly Notices of the Royal Astronomical Society", "pages": "2630-2651", + "volume": "426"}, "authors": [{"authorId": "1402302642", "name": "\u00c1. + L\u00f3pez-S\u00e1nchez"}, {"authorId": "5883616", "name": "M. Dopita"}, {"authorId": + "7166417", "name": "L. Kewley"}, {"authorId": "33389762", "name": "H. Zahid"}, + {"authorId": "36130312", "name": "D. Nicholls"}, {"authorId": "88656967", + "name": "J. Scharwachter"}]}, {"paperId": "bbe926c080c5cc5d68cf98df933741e3c024e1a0", + "externalIds": {"MAG": "3087206849", "DOI": "10.1021/acs.jmedchem.0c01148", + "CorpusId": 221827467, "PubMed": "32955254"}, "corpusId": 221827467, "publicationVenue": + {"id": "4cce60a8-2106-4240-bece-fb6488df6bd1", "name": "Journal of Medicinal + Chemistry", "type": "journal", "alternate_names": ["J Med Chem"], "issn": + "0022-2623", "url": "https://pubs.acs.org/journal/jmcmar", "alternate_urls": + ["http://pubs.acs.org/journal/jmcmar", "http://pubs.acs.org/journals/jmcmar/index.html"]}, + "url": "https://www.semanticscholar.org/paper/bbe926c080c5cc5d68cf98df933741e3c024e1a0", + "title": "A Turing test for molecular generators.", "abstract": "Machine learning + approaches promise to accelerate and improve success rates in medicinal chemistry + programmes by more effectively leveraging available data to guide molecular + design. A key step of an automated computational design algorithm is molecule + generation, where the machine is required to design high-quality, drug-like + molecules, within the appropriate chemical space. Many algorithms have been + proposed for molecular generation, however a challenge is how to assess the + validity of the resulting molecules. Here we report three Turing-inspired + tests designed to evaluate the performance of molecular generators. Profound + differences were observed between the performance of molecule generators in + these tests, highlighting the importance of selection of the appropriate design + algorithms for specific circumstances. One molecule generator, based on match-molecular + pairs, performed excellently against all tests, and thus provides a valuable + component for machine driven medicinal chemistry design workflows.", "venue": + "Journal of Medicinal Chemistry", "year": 2020, "referenceCount": 41, "citationCount": + 19, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Chemistry"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Chemistry", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2020-09-21", "journal": {"name": "Journal of medicinal + chemistry"}, "authors": [{"authorId": "3495805", "name": "Jacob T. Bush"}, + {"authorId": "11632730", "name": "P. Pog\u00e1ny"}, {"authorId": "145617773", + "name": "S. Pickett"}, {"authorId": "2068712860", "name": "Mike D. Barker"}, + {"authorId": "2063040835", "name": "Andrew Baxter"}, {"authorId": "34056327", + "name": "Sebastien Campos"}, {"authorId": "145502029", "name": "A. Cooper"}, + {"authorId": "31728366", "name": "D. Hirst"}, {"authorId": "13641981", "name": + "G. Inglis"}, {"authorId": "47390797", "name": "A. Nadin"}, {"authorId": "144239969", + "name": "V. Patel"}, {"authorId": "5353446", "name": "Darren L. Poole"}, {"authorId": + "153899068", "name": "J. Pritchard"}, {"authorId": "48848565", "name": "Yoshiaki + Washio"}, {"authorId": "2054438027", "name": "Gemma White"}, {"authorId": + "144670441", "name": "D. Green"}]}, {"paperId": "e4f4197e70a0659366cb42589a17e287dc18a660", + "externalIds": {"MAG": "2010678746", "DOI": "10.1063/1.4875262", "CorpusId": + 13470031, "PubMed": "24985429"}, "corpusId": 13470031, "publicationVenue": + {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", "name": "Chaos", "type": "journal", + "issn": "1054-1500", "url": "http://chaos.aip.org/", "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, + "url": "https://www.semanticscholar.org/paper/e4f4197e70a0659366cb42589a17e287dc18a660", + "title": "Square Turing patterns in reaction-diffusion systems with coupled + layers.", "abstract": "Square Turing patterns are usually unstable in reaction-diffusion + systems and are rarely observed in corresponding experiments and simulations. + We report here an example of spontaneous formation of square Turing patterns + with the Lengyel-Epstein model of two coupled layers. The squares are found + to be a result of the resonance between two supercritical Turing modes with + an appropriate ratio. Besides, the spatiotemporal resonance of Turing modes + resembles to the mode-locking phenomenon. Analysis of the general amplitude + equations for square patterns reveals that the fixed point corresponding to + square Turing patterns is stationary when the parameters adopt appropriate + values.", "venue": "Chaos", "year": 2014, "referenceCount": 22, "citationCount": + 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-05-08", "journal": {"name": "Chaos", "pages": "\n 023115\n ", + "volume": "24 2"}, "authors": [{"authorId": "2152908479", "name": "Jing Li"}, + {"authorId": "2108970807", "name": "Hongli Wang"}, {"authorId": "143803550", + "name": "Q. Ouyang"}]}, {"paperId": "a4502fd453287508c7729ee6a1e240c9818ff7f7", + "externalIds": {"MAG": "2034130287", "DOI": "10.1007/s11255-007-9273-z", "CorpusId": + 11465576, "PubMed": "17899434"}, "corpusId": 11465576, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a4502fd453287508c7729ee6a1e240c9818ff7f7", + "title": "Transurethral resection of ejaculatory ducts in the treatment of + complete ejaculatory duct obstruction", "abstract": null, "venue": "International + Urology and Nephrology", "year": 2007, "referenceCount": 19, "citationCount": + 24, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "International Urology and Nephrology", "pages": "369-372", "volume": + "40"}, "authors": [{"authorId": "11789674", "name": "T. Yurdakul"}, {"authorId": + "152410177", "name": "Gurhan Gokce"}, {"authorId": "3908292", "name": "O. + Kili\u00e7"}, {"authorId": "5885104", "name": "M. M. Pi\u015fkin"}]}, {"paperId": + "069e08edc9916a85174ebe7d22512ab418470c19", "externalIds": {"MAG": "1983852986", + "DOI": "10.1109/81.473569", "CorpusId": 119768342}, "corpusId": 119768342, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/069e08edc9916a85174ebe7d22512ab418470c19", + "title": "Turing patterns in CNNs. III. Computer simulation results", "abstract": + "For part II, see ibid., vol. 42, no. 10, pp. 612-26 (Oct. 1995). In this + paper, various patterns obtained through computer simulations are presented. + It is shown through simple examples that the four inequalities known as the + Turing instability conditions are only necessary but not sufficient conditions + for Turing patterns to exist. The influence of various parameters, initial + conditions as well as sidewall forcing on the final patterns and the possibilities + of eliminating defects are studied by means of computer simulations. The possibility + of generating perfectly regular patterns or patterns with few defects through + the application of small and short controlling signals at one boundary suggests + the intriguing possibility of producing high-purity high-tech materials, such + as crystals, which was not possible with current technology. In addition, + novel applications in image processing, pattern recognition, and other areas + can be expected. >", "venue": "", "year": 1995, "referenceCount": 3, "citationCount": + 28, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1995-10-01", + "journal": {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", + "pages": "627-637", "volume": "42"}, "authors": [{"authorId": "1876298", "name": + "L. Goras"}, {"authorId": "144848684", "name": "L. Chua"}, {"authorId": "2793014", + "name": "L. Pivka"}]}, {"paperId": "6bade7bfa90a2454fd0344513e79c18b842ac871", + "externalIds": {"DBLP": "conf/chi/NguyenC05", "MAG": "2003361908", "DOI": + "10.1145/1054972.1055084", "CorpusId": 3023684}, "corpusId": 3023684, "publicationVenue": + {"id": "b55b50b1-aae7-47a7-b042-8aecc930073d", "name": "International Conference + on Human Factors in Computing Systems", "type": "conference", "alternate_names": + ["CHI", "Int Conf Hum Factor Comput Syst", "Human Factors in Computing Systems", + "Conference on Human Interface", "Conf Hum Interface", "Hum Factor Comput + Syst"], "url": "http://www.acm.org/sigchi/"}, "url": "https://www.semanticscholar.org/paper/6bade7bfa90a2454fd0344513e79c18b842ac871", + "title": "MultiView: spatially faithful group video conferencing", "abstract": + "MultiView is a new video conferencing system that supports collaboration + between remote groups of people. MultiView accomplishes this by being spatially + faithful. As a result, MultiView preserves a myriad of nonverbal cues, includ-ing + gaze and gesture, in a way that should improve com-munication. Previous systems + fail to support many of these cues because a single camera perspective warps + spatial char-acteristics in group-to-group meetings. In this paper, we present + a formal definition of spatial faithfulness. We then apply a metaphor-based + design methodology to help us spec-ify and evaluate MultiView''s support of + spatial faithfulness. We then present results from a low-level user study + to mea-sure MultiView''s effectiveness at conveying gaze and ges-ture perception. + MultiView is the first practical solution to spatially faithful group-to-group + conferencing, one of the most common applications of video conferencing.", + "venue": "International Conference on Human Factors in Computing Systems", + "year": 2005, "referenceCount": 28, "citationCount": 146, "influentialCitationCount": + 15, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Book", "JournalArticle", "Conference"], "publicationDate": + "2005-04-02", "journal": {"name": "Proceedings of the SIGCHI Conference on + Human Factors in Computing Systems"}, "authors": [{"authorId": "2112293297", + "name": "David T. Nguyen"}, {"authorId": "1729041", "name": "J. Canny"}]}, + {"paperId": "e9327d56abfeaf1e59ca48f76dee7c7a4057aef4", "externalIds": {"DBLP": + "conf/crypto/OkamotoTU00", "MAG": "2138433952", "DOI": "10.1007/3-540-44598-6_9", + "CorpusId": 13966712}, "corpusId": 13966712, "publicationVenue": {"id": "212b6868-c374-4ba2-ad32-19fde8004623", + "name": "Annual International Cryptology Conference", "type": "conference", + "alternate_names": ["Int Cryptol Conf", "Annu Int Cryptol Conf", "CRYPTO", + "International Cryptology Conference"], "url": "http://www.iacr.org/"}, "url": + "https://www.semanticscholar.org/paper/e9327d56abfeaf1e59ca48f76dee7c7a4057aef4", + "title": "Quantum Public-Key Cryptosystems", "abstract": null, "venue": "Annual + International Cryptology Conference", "year": 2000, "referenceCount": 48, + "citationCount": 142, "influentialCitationCount": 10, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/3-540-44598-6_9.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2221070", - "name": "T. Neary"}]}, {"paperId": "9efec370d27519ca420dd80a05d1906f61b0571f", + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2000-08-20", "journal": {"pages": "147-165"}, + "authors": [{"authorId": "1708176", "name": "T. Okamoto"}, {"authorId": "1761480", + "name": "Keisuke Tanaka"}, {"authorId": "2061769", "name": "S. Uchiyama"}]}, + {"paperId": "d7183cd029f8f5f6c932a904a6e86e9abd4967e2", "externalIds": {"MAG": + "1875688580", "CorpusId": 70527368}, "corpusId": 70527368, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d7183cd029f8f5f6c932a904a6e86e9abd4967e2", + "title": "Art and Aesthetics in Nursing", "abstract": "This book presents + a new potential for health care in scholarship, edu cation, and practice. + Does the aesthetic environment affect the qualit y of care? Can art be a significant + force in healing? Celebrated contr ibutors demonstrate the deep connections + between aesthetic awareness a nd caring-based practice. Music, narrative, + painting, and more are fea tured as viable therapeutic modalities essential + for reclaiming nursin g as a human art and science.", "venue": "", "year": + 1994, "referenceCount": 0, "citationCount": 53, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2319484", + "name": "P. Chinn"}, {"authorId": "123100197", "name": "J. Watson"}]}, {"paperId": + "14e0a510ad868b776bfe4b6eb4eb1d844df90d4a", "externalIds": {"MAG": "2016881824", + "DOI": "10.1007/BF00665895", "CorpusId": 122246175}, "corpusId": 122246175, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/14e0a510ad868b776bfe4b6eb4eb1d844df90d4a", + "title": "Classical physics and Penrose''s thesis", "abstract": null, "venue": + "", "year": 1991, "referenceCount": 11, "citationCount": 42, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1991-08-01", "journal": {"name": "Foundations of Physics Letters", "pages": + "363-373", "volume": "4"}, "authors": [{"authorId": "83446915", "name": "N. + Costa"}, {"authorId": "88282231", "name": "F. Doria"}]}, {"paperId": "805a9d28448fec3ac7a1bed6d42670c83c0d268d", + "externalIds": {"DBLP": "journals/siamcomp/Geffert91", "MAG": "2066080128", + "DOI": "10.1137/0220031", "CorpusId": 365398}, "corpusId": 365398, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/805a9d28448fec3ac7a1bed6d42670c83c0d268d", + "title": "Nondeterministic Computations in Sublogarithmic Space and Space + Constructibility", "abstract": "The open problem of nondeterministic space + constructibility for sublogarithmic functions is resolved. We show that there + are no unbounded monotone increasing nondeterministically space constructible + functions with supn\u2192\u221es(n)/log(n)=0. Consequently, the space constructibility + cannot be used to separate nondeterministic space from deterministic one, + since functions like loglog(n), and \\(\\sqrt {\\log (n)}\\)are not space + constructible by nondeterministic Turing machines.", "venue": "SIAM journal + on computing (Print)", "year": 1990, "referenceCount": 7, "citationCount": + 42, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1990-07-01", "journal": + {"name": "SIAM J. Comput.", "pages": "484-498", "volume": "20"}, "authors": + [{"authorId": "1709391", "name": "V. Geffert"}]}, {"paperId": "9efec370d27519ca420dd80a05d1906f61b0571f", "externalIds": {"MAG": "2132228337", "ArXiv": "1411.4798", "DBLP": "journals/corr/TraversaRBV14", "PubMedCentral": "4646770", "DOI": "10.1126/sciadv.1500031", "CorpusId": 6307852, - "PubMed": "26601208"}, "url": "https://www.semanticscholar.org/paper/9efec370d27519ca420dd80a05d1906f61b0571f", + "PubMed": "26601208"}, "corpusId": 6307852, "publicationVenue": {"id": "cb30f0c9-2980-4b7d-bbcb-68fc5472b97c", + "name": "Science Advances", "type": "journal", "alternate_names": ["Sci Adv"], + "issn": "2375-2548", "url": "http://www.scienceadvances.org/", "alternate_urls": + ["https://advances.sciencemag.org/"]}, "url": "https://www.semanticscholar.org/paper/9efec370d27519ca420dd80a05d1906f61b0571f", "title": "Memcomputing NP-complete problems in polynomial time using polynomial resources and collective states", "abstract": "Demonstration of computing with memory points to a new route for solving hard problems faster. Memcomputing @@ -34918,240 +39973,239 @@ interactions: cells, unlike the present-day single-state machines built using the von Neumann architecture.", "venue": "Science Advances", "year": 2014, "referenceCount": 40, "citationCount": 65, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-11-18", "journal": {"name": "Science - Advances", "volume": "1"}, "authors": [{"authorId": "2346297", "name": "F. - Traversa"}, {"authorId": "1886271", "name": "C. Ramella"}, {"authorId": "2035842", - "name": "F. Bonani"}, {"authorId": "4700102", "name": "M. Ventra"}]}, {"paperId": - "5f4734aee384113ea1567440cd46c43303e99a94", "externalIds": {"MAG": "2121741559", - "ArXiv": "nlin/0309047", "DOI": "10.1103/PhysRevLett.92.074105", "CorpusId": - 32218397, "PubMed": "14995857"}, "url": "https://www.semanticscholar.org/paper/5f4734aee384113ea1567440cd46c43303e99a94", - "title": "Computational irreducibility and the predictability of complex physical - systems.", "abstract": "Using elementary cellular automata (CA) as an example, - we show how to coarse grain CA in all classes of Wolfram''s classification. - We find that computationally irreducible physical processes can be predictable - and even computationally reducible at a coarse-grained level of description. - The resulting coarse-grained CA which we construct emulate the large-scale - behavior of the original systems without accounting for small-scale details. - At least one of the CA that can be coarse grained is irreducible and known - to be a universal Turing machine.", "venue": "Physical Review Letters", "year": - 2003, "referenceCount": 21, "citationCount": 81, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Computer Science", "source": + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-11-18", "journal": + {"name": "Science Advances", "volume": "1"}, "authors": [{"authorId": "2346297", + "name": "F. Traversa"}, {"authorId": "1886271", "name": "C. Ramella"}, {"authorId": + "2035842", "name": "F. Bonani"}, {"authorId": "4700102", "name": "M. Ventra"}]}, + {"paperId": "09b8457827ef183aa20ed02faefb266492e2dfad", "externalIds": {"MAG": + "2120841922", "DOI": "10.1109/81.488819", "CorpusId": 53126888}, "corpusId": + 53126888, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09b8457827ef183aa20ed02faefb266492e2dfad", + "title": "The CNN Universal Machine is as universal as a Turing Machine", + "abstract": "It is shown that the simplest integrated circuit implementations + of the CNN Universal Machine can play the \"game of life\", and are therefore + equivalent to Turing Machines. In addition, a constructive proof is given + for the direct implementation of general first-order cellular automata on + such machines.", "venue": "", "year": 1996, "referenceCount": 14, "citationCount": + 36, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-04-01", + "journal": {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", + "pages": "353-355", "volume": "43"}, "authors": [{"authorId": "2694304", "name": + "K. R. Crounse"}, {"authorId": "144848684", "name": "L. Chua"}]}]} + + ' + headers: + Access-Control-Allow-Origin: + - '*' + Connection: + - keep-alive + Content-Length: + - '191949' + Content-Type: + - application/json + Date: + - Tue, 03 Jan 2023 20:53:12 GMT + Via: + - 1.1 5798112148ae9e672af737182da15f62.cloudfront.net (CloudFront) + X-Amz-Cf-Id: + - d3_8wnKUEyZhv9g_KXgRfuWmSjYAVnB7cwRz4tD1Uc1wEK6O9EZvBA== + X-Amz-Cf-Pop: + - GRU3-P1 + X-Cache: + - Miss from cloudfront + x-amz-apigw-id: + - eLxU4Gl_PHcFkKQ= + x-amzn-Remapped-Connection: + - keep-alive + x-amzn-Remapped-Content-Length: + - '191949' + x-amzn-Remapped-Date: + - Tue, 03 Jan 2023 20:53:12 GMT + x-amzn-Remapped-Server: + - gunicorn + x-amzn-RequestId: + - 3a754eac-8233-4808-a530-714f31e5914b + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + User-Agent: + - python-requests/2.28.1 + method: GET + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1700&limit=100 + response: + body: + string: '{"total": 65729, "offset": 1700, "next": 1800, "data": [{"paperId": + "d1a5b74bfe162e280ba8599697ff0660894341c8", "externalIds": {"DBLP": "journals/jcss/Fortnow00", + "MAG": "2015895898", "DOI": "10.1006/jcss.1999.1671", "CorpusId": 122011115}, + "corpusId": 122011115, "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", + "name": "Journal of computer and system sciences (Print)", "type": "journal", + "alternate_names": ["Journal of Computer and System Sciences", "J comput syst + sci (print", "J Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/d1a5b74bfe162e280ba8599697ff0660894341c8", + "title": "Time-Space Tradeoffs for Satisfiability", "abstract": "We give the + first nontrivial model-independent time?space tradeoffs for satisfiability. + Namely, we show that SAT cannot be solved in n1+o(1) time and n1?? space for + any ?>0 general random-access nondeterministic Turing machines. In particular, + SAT cannot be solved deterministically by a Turing machine using quasilinear + time and n space. We also give lower bounds for log-space uniform NC1 circuits + and branching programs. Our proof uses two basic ideas. First we show that + if SAT can be solved nondeterministically with a small amount of time then + we can collapse a nonconstant number of levels of the polynomial-time hierarchy. + We combine this work with a result of Nepomnja??ii that shows that a nondeterministic + computation of superlinear time and sublinear space can be simulated in alternating + linear time. A simple diagonalization yields our main result. We discuss how + these bounds lead to a new approach to separating the complexity classes NL + and NP. We give some possibilities and limitations of this approach.", "venue": + "Journal of computer and system sciences (Print)", "year": 2000, "referenceCount": + 32, "citationCount": 64, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-09-17", "journal": {"name": "Physical review letters", "pages": "\n 074105\n ", - "volume": "92 7"}, "authors": [{"authorId": "5102841", "name": "Navot Israeli"}, - {"authorId": "3549131", "name": "N. Goldenfeld"}]}, {"paperId": "14e0a510ad868b776bfe4b6eb4eb1d844df90d4a", - "externalIds": {"MAG": "2016881824", "DOI": "10.1007/BF00665895", "CorpusId": - 122246175}, "url": "https://www.semanticscholar.org/paper/14e0a510ad868b776bfe4b6eb4eb1d844df90d4a", - "title": "Classical physics and Penrose''s thesis", "abstract": null, "venue": - "", "year": 1991, "referenceCount": 11, "citationCount": 42, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1991-08-01", - "journal": {"name": "Foundations of Physics Letters", "pages": "363-373", - "volume": "4"}, "authors": [{"authorId": "83446915", "name": "N. Costa"}, - {"authorId": "88282231", "name": "F. Doria"}]}, {"paperId": "805a9d28448fec3ac7a1bed6d42670c83c0d268d", - "externalIds": {"DBLP": "journals/siamcomp/Geffert91", "MAG": "2066080128", - "DOI": "10.1137/0220031", "CorpusId": 365398}, "url": "https://www.semanticscholar.org/paper/805a9d28448fec3ac7a1bed6d42670c83c0d268d", - "title": "Nondeterministic Computations in Sublogarithmic Space and Space - Constructibility", "abstract": "The open problem of nondeterministic space - constructibility for sublogarithmic functions is resolved. We show that there - are no unbounded monotone increasing nondeterministically space constructible - functions with supn\u2192\u221es(n)/log(n)=0. Consequently, the space constructibility - cannot be used to separate nondeterministic space from deterministic one, - since functions like loglog(n), and \\(\\sqrt {\\log (n)}\\)are not space - constructible by nondeterministic Turing machines.", "venue": "SIAM journal - on computing (Print)", "year": 1990, "referenceCount": 7, "citationCount": - 42, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1990-07-01", "journal": {"name": "SIAM - J. Comput.", "pages": "484-498", "volume": "20"}, "authors": [{"authorId": - "1709391", "name": "V. Geffert"}]}, {"paperId": "e4bd784c879229853b9195b63c897739db273282", - "externalIds": {"DBLP": "journals/mima/Dodig-Crnkovic11", "MAG": "2097186104", - "DOI": "10.1007/s11023-011-9235-1", "CorpusId": 14741267}, "url": "https://www.semanticscholar.org/paper/e4bd784c879229853b9195b63c897739db273282", - "title": "Significance of Models of Computation, from Turing Model to Natural - Computation", "abstract": null, "venue": "Minds and Machines", "year": 2011, - "referenceCount": 118, "citationCount": 69, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-05-01", "journal": {"name": "Minds and Machines", - "pages": "301-322", "volume": "21"}, "authors": [{"authorId": "1403731773", - "name": "G. Dodig-Crnkovic"}]}, {"paperId": "890634793c01d88fbfe271679e7ffa11866b5a16", - "externalIds": {"MAG": "206854952", "CorpusId": 53002792}, "url": "https://www.semanticscholar.org/paper/890634793c01d88fbfe271679e7ffa11866b5a16", - "title": "The NASA Controls-Struc-tures Interaction Technology Program", "abstract": - "The interaction between a flexible spacecraft structure and its control system - is commonly referred to as controls-structures interaction (CSI). The CSI - technology program is developing the capability and confidence to integrate - the structure and control system, so as to avoid interactions that cause problems - and to exploit interactions to increase spacecraft capability. A NASA program - has been initiated to advance CSI technology to a point where it can be used - in spacecraft design for future missions. The CSI technology program is a - multicenter program utilizing the resources of the NASA Langley Research Center - (LaRC), the NASA Marshall Space Flight Center (MSFC), and the NASA Jet Propulsion - Laboratory (JPL). The purpose is to describe the current activities, results - to date, and future activities of the NASA CSI technology program.", "venue": - "", "year": 1990, "referenceCount": 0, "citationCount": 32, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1990-10-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "41212562", "name": "J. Newsom"}]}, {"paperId": "edbc93275173104206523bfaf827341f19355856", + "2000-04-01", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "337-353", + "volume": "60"}, "authors": [{"authorId": "1691447", "name": "L. Fortnow"}]}, + {"paperId": "a9905a73b71ba35127d9748feba8e2e7cb6109bb", "externalIds": {"DBLP": + "journals/siamcomp/Gradel90", "MAG": "1979788764", "DOI": "10.1137/0219055", + "CorpusId": 35194197}, "corpusId": 35194197, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a9905a73b71ba35127d9748feba8e2e7cb6109bb", + "title": "Domino Games and Complexity", "abstract": "Domino games which describe + computations of alternating Turing machines in the same way as dominoes (tiling + systems) encode computations of deterministic and nondeterministic Turing + machines are considered. The domino games are two-person games in the course + of which the players build up domino tilings of a square of prescribed size. + Acceptance of an alternating Turing machine corresponds to a winning strategy + for one player\u2014the number of moves in the game is the number of alternations + of the Turing machine.Let $\\operatorname{ATIME}(T(n), m)$ denote the class + of all sets that are accepted by some alternating Turing machine in time $T(n)$ + with at most m alternations. It is shown that any problem in such a complexity + class can be reduced to the strategy problem for some domino game. In particular + domino games which are complete in the classes $\\Sigma_{m}^{p}$, and $\\Pi_{m}^{p}$, + of the polynomial time hierarchy are found. This corresponds to the approach + of Savelsbergh and van Emde Boas and of Lewis and Pap...", "venue": "SIAM + J. Comput.", "year": 1990, "referenceCount": 1, "citationCount": 19, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1990-09-01", "journal": {"name": "SIAM J. Comput.", "pages": + "787-804", "volume": "19"}, "authors": [{"authorId": "1749375", "name": "E. + Gr\u00e4del"}]}, {"paperId": "d64a290d2b548f3b5cad0a96fcf98c2fbe1de4db", "externalIds": + {"ArXiv": "hep-th/0006027", "MAG": "2145032535", "DOI": "10.1143/PTP.105.243", + "CorpusId": 15408175}, "corpusId": 15408175, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d64a290d2b548f3b5cad0a96fcf98c2fbe1de4db", + "title": "K\u00e4hler Normal Coordinate Expansion in Supersymmetric Theories", + "abstract": "The Riemann normal coordinate expansion method is generalized + to a Kahler manifold. The Kahler potential and holomorphic coordinate transfor- + mations are used to define normal coordinates preserving the complex struc- + ture. The existence of these Kahler normal coordinate is shown explicitly + to all orders. The formalism is applied to background field methods in super- + symmetric nonlinear sigma models.", "venue": "", "year": 2000, "referenceCount": + 35, "citationCount": 42, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://academic.oup.com/ptp/article-pdf/105/2/243/5198900/105-2-243.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-06-04", "journal": {"name": + "Progress of Theoretical Physics", "pages": "243-260", "volume": "105"}, "authors": + [{"authorId": "1929646", "name": "K. Higashijima"}, {"authorId": "51928430", + "name": "M. Nitta"}]}, {"paperId": "09b8457827ef183aa20ed02faefb266492e2dfad", + "externalIds": {"MAG": "2120841922", "DOI": "10.1109/81.488819", "CorpusId": + 53126888}, "corpusId": 53126888, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09b8457827ef183aa20ed02faefb266492e2dfad", + "title": "The CNN Universal Machine is as universal as a Turing Machine", + "abstract": "It is shown that the simplest integrated circuit implementations + of the CNN Universal Machine can play the \"game of life\", and are therefore + equivalent to Turing Machines. In addition, a constructive proof is given + for the direct implementation of general first-order cellular automata on + such machines.", "venue": "", "year": 1996, "referenceCount": 14, "citationCount": + 36, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-04-01", + "journal": {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", + "pages": "353-355", "volume": "43"}, "authors": [{"authorId": "2694304", "name": + "K. R. Crounse"}, {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": + "b1ab4c50077e3d1c1cbafca9927d732afdd93a6f", "externalIds": {"MAG": "566340737", + "DOI": "10.1021/BK-2004-0869", "CorpusId": 60004208}, "corpusId": 60004208, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b1ab4c50077e3d1c1cbafca9927d732afdd93a6f", + "title": "Nonlinear dynamics in polymeric systems", "abstract": "Despite the + great strides in nonlinear dynamics over the past 40 years, applying nonlinear + dynamics to polymeric systems has not received much attention. This book addresses + this absence by covering present theory, modeling, and experiments of nonlinear + dynamics in polymeric systems. Oscillating chemical reactions, propagating + fronts, far-from equilibrium pattern formation, Turing structures, and chaos + are but some of the exotic phenomena discussed in this book.", "venue": "", + "year": 2003, "referenceCount": 2, "citationCount": 51, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2003-11-18", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "5602064", "name": "J. Pojman"}, {"authorId": "1398601999", + "name": "Q. Tran\u2010Cong\u2010Miyata"}]}, {"paperId": "edbc93275173104206523bfaf827341f19355856", "externalIds": {"MAG": "2762034797", "ArXiv": "nlin/0002022", "DOI": "10.1016/S0030-4018(00)00561-7", - "CorpusId": 11035564}, "url": "https://www.semanticscholar.org/paper/edbc93275173104206523bfaf827341f19355856", + "CorpusId": 11035564}, "corpusId": 11035564, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/edbc93275173104206523bfaf827341f19355856", "title": "Turing patterns in nonlinear optics", "abstract": null, "venue": "Conference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504)", "year": 2000, "referenceCount": 35, "citationCount": 18, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": "2000-02-16", - "journal": {"name": "Conference Digest. 2000 International Quantum Electronics - Conference (Cat. No.00TH8504)", "pages": "1 pp.-"}, "authors": [{"authorId": - "2640938", "name": "K. Stali\u016bnas"}, {"authorId": "2173718709", "name": - "V.J. Sanchdz-Morcillo"}]}, {"paperId": "e4f4197e70a0659366cb42589a17e287dc18a660", - "externalIds": {"MAG": "2010678746", "DOI": "10.1063/1.4875262", "CorpusId": - 13470031, "PubMed": "24985429"}, "url": "https://www.semanticscholar.org/paper/e4f4197e70a0659366cb42589a17e287dc18a660", - "title": "Square Turing patterns in reaction-diffusion systems with coupled - layers.", "abstract": "Square Turing patterns are usually unstable in reaction-diffusion - systems and are rarely observed in corresponding experiments and simulations. - We report here an example of spontaneous formation of square Turing patterns - with the Lengyel-Epstein model of two coupled layers. The squares are found - to be a result of the resonance between two supercritical Turing modes with - an appropriate ratio. Besides, the spatiotemporal resonance of Turing modes - resembles to the mode-locking phenomenon. Analysis of the general amplitude - equations for square patterns reveals that the fixed point corresponding to - square Turing patterns is stationary when the parameters adopt appropriate - values.", "venue": "Chaos", "year": 2014, "referenceCount": 22, "citationCount": - 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-05-08", "journal": {"name": "Chaos", "pages": "\n 023115\n ", - "volume": "24 2"}, "authors": [{"authorId": "2152908479", "name": "Jing Li"}, - {"authorId": "2108970807", "name": "Hongli Wang"}, {"authorId": "143803550", - "name": "Q. Ouyang"}]}, {"paperId": "81d08199896a222cab6e2170860b5a4cb44469c8", - "externalIds": {"MAG": "2009536613", "DOI": "10.3171/JNS.1967.27.6.0541", - "CorpusId": 37146025, "PubMed": "6065127"}, "url": "https://www.semanticscholar.org/paper/81d08199896a222cab6e2170860b5a4cb44469c8", - "title": "Enlarging skull fractures: an experimental study.", "abstract": - "~ TEADY enlargement of a skull f rac ture sometimes follows a head injury, - part icularly in the first year of life. A review of the l i terature and - discussion of clinical features and problems were presented in 1961 by Lende - and Erickson. 5 Other cases subsequent ly have been repor ted. 1,a Our interest - in the problem was s t imula ted by the case of a ~-year-old girl with a par - ie ta l fracture tha t was apparen t ly enlarging or \"growing\" 9 months - af ter injury. Surgical explorat ion exposed a large dural defect; one edge - of the defect was 1 to ~ em behind the bone edge while the other dural margin - passed through the f rac ture line to fuse with per icranimn. There were mult - iple small arachnoidal cysts and old cortical contusions. Dura l repair was - easily accomplished and the skull defect repaired with split r ib grafts. - The following invest igat ion was designed to determine which elements of - the clinical syndrome (skull fracture, dural tear , arachnoidal tear , brain - and pial tear , or ventr icular communicat ion) were essential to the product - ion of an enlarging fracture.", "venue": "Journal of neurosurgery", "year": - 1967, "referenceCount": 6, "citationCount": 62, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1967-12-01", "journal": {"name": "Journal of neurosurgery", - "pages": "\n 541-50\n ", "volume": "27 6"}, "authors": [{"authorId": - "145572625", "name": "F. Goldstein"}, {"authorId": "83726321", "name": "T. - Sakoda"}, {"authorId": "5871009", "name": "J. Kepes"}, {"authorId": "17031601", - "name": "K. Kavidson"}, {"authorId": "3241153", "name": "C. Brackett"}]}, - {"paperId": "920b65b865801cbcda6c3ef7d1ba95b2246b7b8c", "externalIds": {"MAG": - "1984964186", "DOI": "10.1063/1.165851", "CorpusId": 19498774, "PubMed": "12779937"}, - "url": "https://www.semanticscholar.org/paper/920b65b865801cbcda6c3ef7d1ba95b2246b7b8c", - "title": "Transition to chemical turbulence.", "abstract": "Experiments have - been conducted on Turing-type chemical spatial patterns and their variants - in a quasi-two-dimensional open spatial reactor with a chlorite-iodide-malonic - acid reaction. A variety of stationary spatial structures-hexagons, stripes, - and mixed states-were observed, and transitions to these states were studied. - For conditions beyond those corresponding to the emergence of patterns, a - transition was observed from stationary spatial patterns to chemical turbulence, - which is marked by a continuous motion of the pattern within a domain and - of the grain boundaries between domains. The transition to chemical turbulence - was analyzed by measuring the correlation length, the average pattern speed, - and the total length of the domain boundaries. The emergence of chemical turbulence - is accompanied by a large increase in the defects in the pattern, which suggests - that this is an example of defect-mediated turbulence.", "venue": "Chaos", - "year": 1991, "referenceCount": 37, "citationCount": 143, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Materials Science"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Materials Science", "source": "external"}, {"category": "Physics", "source": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/nlin/0002022", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["Conference"], "publicationDate": "2000-02-16", "journal": + {"name": "Conference Digest. 2000 International Quantum Electronics Conference + (Cat. No.00TH8504)", "pages": "1 pp.-"}, "authors": [{"authorId": "2640938", + "name": "K. Stali\u016bnas"}, {"authorId": "2173718709", "name": "V.J. Sanchdz-Morcillo"}]}, + {"paperId": "3af6ed1e93ee8500691634c0e0ee223d4f66b9ad", "externalIds": {"ArXiv": + "0712.1359", "DBLP": "conf/cie/Finkel05", "MAG": "2797767723", "DOI": "10.1017/S0960129506005597", + "CorpusId": 6525917}, "corpusId": 6525917, "publicationVenue": {"id": "1a00fc67-b5a0-4dae-993c-023e6c11659a", + "name": "Mathematical Structures in Computer Science", "type": "journal", + "alternate_names": ["Math Struct Comput Sci"], "issn": "0960-1295", "url": + "https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=MSC", + "http://journals.cambridge.org/MSC"]}, "url": "https://www.semanticscholar.org/paper/3af6ed1e93ee8500691634c0e0ee223d4f66b9ad", + "title": "Borel ranks and Wadge degrees of context free $\\omega$-languages", + "abstract": "We show that the Borel hierarchy of the class of context free + $\\omega$-languages, or even of the class of $\\omega$-languages accepted + by B\u00fcchi 1-counter automata, is the same as the Borel hierarchy of the + class of $\\omega$-languages accepted by Turing machines with a B\u00fcchi + acceptance condition. In particular, for each recursive non-null ordinal $\\alpha$, + there exist some ${\\bf \\Sigma}^0_\\alpha$-complete and some ${\\bf \\Pi}^0_\\alpha$-complete + $\\omega$-languages accepted by B\u00fcchi 1-counter automata. And the supremum + of the set of Borel ranks of context free $\\omega$-languages is an ordinal + $\\gamma_2^1$ that is strictly greater than the first non-recursive ordinal + $\\omega_1^{\\mathrm{CK}}$. We then extend this result, proving that the Wadge + hierarchy of context free $\\omega$-languages, or even of $\\omega$-languages + accepted by B\u00fcchi 1-counter automata, is the same as the Wadge hierarchy + of $\\omega$-languages accepted by Turing machines with a B\u00fcchi or a + Muller acceptance condition.", "venue": "Mathematical Structures in Computer + Science", "year": 2005, "referenceCount": 45, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-00139169/file/CIE-MSCS.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1991-12-01", "journal": {"name": "Chaos", "pages": "\n 411-420\n ", - "volume": "1 4"}, "authors": [{"authorId": "143803550", "name": "Q. Ouyang"}, - {"authorId": "2421446", "name": "H. Swinney"}]}, {"paperId": "d8ab8bfc5f622673059573a799851665444b12a6", - "externalIds": {"MAG": "2033625883", "DOI": "10.1016/0167-2789(96)00072-3", - "CorpusId": 121378928}, "url": "https://www.semanticscholar.org/paper/d8ab8bfc5f622673059573a799851665444b12a6", - "title": "From quasi-2D to 3D Turing patterns in ramped systems", "abstract": - null, "venue": "", "year": 1996, "referenceCount": 22, "citationCount": 33, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1996-11-01", "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": - "53-66", "volume": "98"}, "authors": [{"authorId": "3250971", "name": "E. - Dulos"}, {"authorId": "47459850", "name": "P. W. Davies"}, {"authorId": "12105027", - "name": "B. Rudovics"}, {"authorId": "50010680", "name": "P. Kepper"}]}, {"paperId": - "d7183cd029f8f5f6c932a904a6e86e9abd4967e2", "externalIds": {"MAG": "1875688580", - "CorpusId": 70527368}, "url": "https://www.semanticscholar.org/paper/d7183cd029f8f5f6c932a904a6e86e9abd4967e2", - "title": "Art and Aesthetics in Nursing", "abstract": "This book presents - a new potential for health care in scholarship, edu cation, and practice. - Does the aesthetic environment affect the qualit y of care? Can art be a significant - force in healing? Celebrated contr ibutors demonstrate the deep connections - between aesthetic awareness a nd caring-based practice. Music, narrative, - painting, and more are fea tured as viable therapeutic modalities essential - for reclaiming nursin g as a human art and science.", "venue": "", "year": - 1994, "referenceCount": 0, "citationCount": 53, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "2319484", "name": "P. - Chinn"}, {"authorId": "123100197", "name": "J. Watson"}]}, {"paperId": "be903265c02e0416cfcf42781b071690fea541da", - "externalIds": {"DBLP": "conf/itc/SaxenaBJKASH03", "MAG": "1568407911", "DOI": - "10.1109/TEST.2003.1271098", "CorpusId": 7105666}, "url": "https://www.semanticscholar.org/paper/be903265c02e0416cfcf42781b071690fea541da", - "title": "A case study of ir-drop in structured at-speed testing", "abstract": - "At-speed test has become a requirement in IC tech- nologies below 180 nm. - Unfortunately, test mode switching activity and IR-drop present special chal- - lenges to the successful application of structural at- speed tests. In this - paper we characterize these prob- lems on commercial ASICs in order to understand - how to implement more effective solutions. consumption. Depending on such - parameters as gate count, DFT strategies, package type, and other fac- tors, - the impact of this problem can range from non- existent to severe. In this - paper, we discuss the prac- tical issues associated with power consumption - during at-speed tests. We begin by delineating in more detail the nature of - power-related phenomena encountered in structured speed tests. We talk about - various de- sign features that can be applied to somewhat miti- gate test - mode power dissipation. In Section 2, we give a more precise definition of - the IR-drop problem which is the focus of this pa- per. We compare IR-drop - in slow speed and at-speed structural tests, and also compare it with functional - IR-drop. We narrow the focus further to the topic of toggle activity or \"switching - density\" during struc- tured at-speed tests. In Section 3.4 we describe the - notion of \"quiet\" patterns and how they are gener- ated. We follow up with - a report of the results we have obtained in experimentation on industrial - ASIC designs. Finally we give our suggestions for future work in this area - and conclude the paper.", "venue": "International Test Conference, 2003. Proceedings. - ITC 2003.", "year": 2003, "referenceCount": 21, "citationCount": 405, "influentialCitationCount": - 23, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2003-09-30", "journal": {"name": "International - Test Conference, 2003. Proceedings. ITC 2003.", "pages": "1098-1104", "volume": - "1"}, "authors": [{"authorId": "145301646", "name": "Jayashree Saxena"}, {"authorId": - "34960306", "name": "K. Butler"}, {"authorId": "50420106", "name": "Vinay - B. Jayaram"}, {"authorId": "1383453370", "name": "Subhendu Kundu"}, {"authorId": - "144861260", "name": "N. Arvind"}, {"authorId": "2815714", "name": "Pravin - Sreeprakash"}, {"authorId": "2226330", "name": "Manfred Hachinger"}]}, {"paperId": - "75493a3ed750269a2056b3e39a877bc8b00bc50d", "externalIds": {"ArXiv": "2012.12828", - "DBLP": "journals/corr/abs-2012-12828", "DOI": "10.1073/pnas.2026818118", - "CorpusId": 229363856, "PubMed": "33947820"}, "url": "https://www.semanticscholar.org/paper/75493a3ed750269a2056b3e39a877bc8b00bc50d", + "2005-06-08", "journal": {"name": "Mathematical Structures in Computer Science", + "pages": "813 - 840", "volume": "16"}, "authors": [{"authorId": "1696491", + "name": "O. Finkel"}]}, {"paperId": "75493a3ed750269a2056b3e39a877bc8b00bc50d", + "externalIds": {"ArXiv": "2012.12828", "DBLP": "journals/corr/abs-2012-12828", + "DOI": "10.1073/pnas.2026818118", "CorpusId": 229363856, "PubMed": "33947820"}, + "corpusId": 229363856, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/75493a3ed750269a2056b3e39a877bc8b00bc50d", "title": "Constructing Turing complete Euler flows in dimension 3", "abstract": "Significance What kind of physics might be noncomputational? In this article, we address the appearance of undecidable phenomena in fluid dynamics, proving @@ -35179,406 +40233,58 @@ interactions: blow-up problem in the Navier\u2013Stokes equations.", "venue": "Proceedings of the National Academy of Sciences", "year": 2020, "referenceCount": 38, "citationCount": 18, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + "openAccessPdf": {"url": "https://europepmc.org/articles/pmc8126859?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2020-12-24", "journal": {"name": "Proceedings of the National Academy of Sciences", "volume": "118"}, "authors": [{"authorId": "93622450", "name": "R. Cardona"}, {"authorId": "143708365", "name": "E. Miranda"}, {"authorId": "1399136591", "name": "D. Peralta-Salas"}, {"authorId": "66605906", - "name": "F. Presas"}]}, {"paperId": "1dd42723fb25642702928a0adc78a8b47381f313", - "externalIds": {"DBLP": "journals/apal/Soare09", "MAG": "2040069378", "DOI": - "10.1016/j.apal.2009.01.008", "CorpusId": 14325869}, "url": "https://www.semanticscholar.org/paper/1dd42723fb25642702928a0adc78a8b47381f313", - "title": "Turing oracle machines, online computing, and three displacements - in computability theory", "abstract": null, "venue": "Annals of Pure and Applied - Logic", "year": 2009, "referenceCount": 119, "citationCount": 72, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-09-01", "journal": {"name": "Ann. Pure Appl. Log.", - "pages": "368-399", "volume": "160"}, "authors": [{"authorId": "1760293", - "name": "R. Soare"}]}, {"paperId": "850bfe48aa9e0f07c49b31aea6747c33778b32a1", - "externalIds": {"MAG": "2083434917", "DOI": "10.2307/1935882", "CorpusId": - 154444964}, "url": "https://www.semanticscholar.org/paper/850bfe48aa9e0f07c49b31aea6747c33778b32a1", - "title": "The Determinants of Entry by Domestic and Foreign Enterprises in - Canadian Manufacturing Industries: Some Comments and Empirical Results", "abstract": - "ture and Monetary Policy,\" April 1975, forthcoming in the American Economic - Review. Motley, B., \"Household Demand for Assets: A Model of Short-Run Adjustments,\" - this REviEw 52 (Aug. 1970), 236-241. Watts, H., and J. Tobin, \"Consumer Expenditure - and the Capital Account,\" in I. Friend and R. Jones (eds.), Proceedings of - the Conference on Consumption and Savings, vol. II, Philadelphia, 1960, 1-48. - Zellner, A., \"Basic Elements of a General Model of Consumer Behavior,\" in - I. Friend and R. Jones (eds.), Proceedings of the Conference on Consumption - and Savings, vol. II, Philadelphia, 1960, 488498.", "venue": "", "year": 1976, - "referenceCount": 0, "citationCount": 76, "influentialCitationCount": 3, "isOpenAccess": - false, "fieldsOfStudy": ["Economics", "Business"], "s2FieldsOfStudy": [{"category": - "Economics", "source": "external"}, {"category": "Business", "source": "external"}, - {"category": "Economics", "source": "s2-fos-model"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1976-11-01", "journal": {"name": "The Review of Economics and Statistics", - "pages": "485-488", "volume": "58"}, "authors": [{"authorId": "12945036", - "name": "P. Gorecki"}]}, {"paperId": "3712d7bfa588c7919a394a9cfa167044fb6f10dd", - "externalIds": {"PubMedCentral": "5324081", "MAG": "2581689784", "DOI": "10.1021/acscentsci.6b00330", - "CorpusId": 22055063, "PubMed": "28280778"}, "url": "https://www.semanticscholar.org/paper/3712d7bfa588c7919a394a9cfa167044fb6f10dd", - "title": "Two-Way Chemical Communication between Artificial and Natural Cells", - "abstract": "Artificial cells capable of both sensing and sending chemical - messages to bacteria have yet to be built. Here we show that artificial cells - that are able to sense and synthesize quorum signaling molecules can chemically - communicate with V. fischeri, V. harveyi, E. coli, and P. aeruginosa. Activity - was assessed by fluorescence, luminescence, RT-qPCR, and RNA-seq. Two potential - applications for this technology were demonstrated. First, the extent to which - artificial cells could imitate natural cells was quantified by a type of cellular - Turing test. Artificial cells capable of sensing and in response synthesizing - and releasing N-3-(oxohexanoyl)homoserine lactone showed a high degree of - likeness to natural V. fischeri under specific test conditions. Second, artificial - cells that sensed V. fischeri and in response degraded a quorum signaling - molecule of P. aeruginosa (N-(3-oxododecanoyl)homoserine lactone) were constructed, - laying the foundation for future technologies that control complex networks - of natural cells.", "venue": "ACS Central Science", "year": 2017, "referenceCount": - 50, "citationCount": 141, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-01-25", "journal": {"name": "ACS Central Science", - "pages": "117 - 123", "volume": "3"}, "authors": [{"authorId": "5595789", - "name": "Roberta Lentini"}, {"authorId": "9600818", "name": "No\u00ebl Yeh - Mart\u00edn"}, {"authorId": "49406449", "name": "M. Forlin"}, {"authorId": - "9602711", "name": "Luca Belmonte"}, {"authorId": "47677068", "name": "Jason - Fontana"}, {"authorId": "9607406", "name": "Michele Cornella"}, {"authorId": - "33869911", "name": "L. Martini"}, {"authorId": "5667637", "name": "S. Tamburini"}, - {"authorId": "2672872", "name": "W. Bentley"}, {"authorId": "46653295", "name": - "O. Jousson"}, {"authorId": "1781448", "name": "S. Mansy"}]}, {"paperId": - "a8262a186f9e8828abd6b90a5604d87fab5ed713", "externalIds": {"DBLP": "journals/mima/Cleland02a", - "MAG": "1858190227", "DOI": "10.1023/A:1015606528623", "CorpusId": 17502528}, - "url": "https://www.semanticscholar.org/paper/a8262a186f9e8828abd6b90a5604d87fab5ed713", - "title": "On Effective Procedures", "abstract": null, "venue": "Minds and - Machines", "year": 2002, "referenceCount": 28, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2002-05-01", "journal": {"name": "Minds and Machines", "pages": "159-179", - "volume": "12"}, "authors": [{"authorId": "32624486", "name": "Carol E. Cleland"}]}, - {"paperId": "7e71e65a7ae05b107b7d3181a85c8099536d510d", "externalIds": {"MAG": - "1982829306", "DOI": "10.1090/S0025-5718-1983-0689479-6", "CorpusId": 120752828}, - "url": "https://www.semanticscholar.org/paper/7e71e65a7ae05b107b7d3181a85c8099536d510d", - "title": "The determination of the value of Rado\u2019s noncomputable function - \u03a3() for four-state Turing machines", "abstract": "The well-defined but - noncomputable functions E(k) and S(k) given by T. Rado as the \"score\" and - \"shift number\" for the k-state Turing machine \"Busy Beaver Game\" were - previously known only for k 13 and S(4) a 107, reported by this author, supported - the conjecture that these lower bounds are the actual particular values of - the functions for k 4. The four-state case has previously been reduced to - solving the blank input tape halting problem of only 5,820 individual machines. - In this final stage of the k = 4 case, one appears to move into a heuristic - level of higher order where it is necessary to treat each machine as representing - a distinct theorem. The remaining set consists of two primary classes in which - a machine and its tape are viewed as the representation of a growing string - of cellular automata. The proof techniques, embodied in programs, are entirely - heuristic, while the inductive proofs, once established by the computer, are - completely rigorous and become the key to the proof of the new and original - mathematical results: l:(4) 13 and S(4) = 107. \" In any case, even though - skilled mathematicians and experienced programmers attempted to evaluate E(3) - and S(3), there is no evidence that any known approach will yield the answer, - even if we avail ourselves of high-speed computers and elaborate programs. - As regards L(4), S(4), the situation seems to be entirely hopeless at present.\"-Tibor - Rado, 1963. 1. Background and Introduction. The \"Busy Beaver Game\" was devised - by Tibor Rado [8] for the purpose of illustrating the notion of noncomputability. - Given the set of Turing machines of exactly k states which operate with the - minimum alphabet of two symbols (a space and a mark or 0 and 1) one considers - the problem of behavior of these machines on a tape which is initially all - blank (all O''s). This is a finite set of machines, there being exactly (4k - + 1)2k distinct machines, where, with two table entries per state, each table - entry may consist of printing 0 or 1, moving right or left, branching to state - 1, 2,... ,k or simply an entry to declare a halt.* Since the input tape is - blank, each machine faces one of two possible fates: either it eventually - halts, or else it continues running forever. After a particular machine Received - July 22, 1981; revised June 28, 1982 and September 7, 1982. 1980 Mathematics - Subject Classification. Primary 03D10, 03B35; Secondary 68C30, 68D20.", "venue": - "", "year": 1983, "referenceCount": 5, "citationCount": 61, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Mathematics of Computation", "pages": "647-665", - "volume": "40"}, "authors": [{"authorId": "47192182", "name": "Allen H. Brady"}]}, - {"paperId": "9e018f970f513e0f7103baa94726aa207765bf0c", "externalIds": {"MAG": - "1963720465", "DOI": "10.1016/J.PHYSLETA.2005.04.098", "CorpusId": 119373349}, - "url": "https://www.semanticscholar.org/paper/9e018f970f513e0f7103baa94726aa207765bf0c", - "title": "Turing patterns in a modified Lotka\u2013Volterra model", "abstract": - null, "venue": "", "year": 2005, "referenceCount": 18, "citationCount": 37, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2005-07-04", "journal": {"name": "Physics Letters A", "pages": "90-98", "volume": - "342"}, "authors": [{"authorId": "2939172", "name": "Edward A. Mcgehee"}, - {"authorId": "1403262523", "name": "E. Peacock-L\u00f3pez"}]}, {"paperId": - "43f48fa9f7e010b2c16b501c2b4c546360e7fe73", "externalIds": {"MAG": "1970194302", - "DOI": "10.1103/PHYSREVE.87.042719", "CorpusId": 6713870, "PubMed": "23679461"}, - "url": "https://www.semanticscholar.org/paper/43f48fa9f7e010b2c16b501c2b4c546360e7fe73", - "title": "Noise-induced temporal dynamics in Turing systems.", "abstract": - "We examine the ability of intrinsic noise to produce complex temporal dynamics - in Turing pattern formation systems, with particular emphasis on the Schnakenberg - kinetics. Using power spectral methods, we characterize the behavior of the - system using stochastic simulations at a wide range of points in parameter - space and compare with analytical approximations. Specifically, we investigate - whether polarity switching of stochastic patterns occurs at a defined frequency. - We find that it can do so in individual realizations of a stochastic simulation, - but that the frequency is not defined consistently across realizations in - our samples of parameter space. Further, we examine the effect of noise on - deterministically predicted traveling waves and find them increased in amplitude - and decreased in speed.", "venue": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "year": 2013, "referenceCount": 0, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-04-25", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 042719\n ", - "volume": "87 4"}, "authors": [{"authorId": "3077300", "name": "L. Schumacher"}, - {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "35275545", "name": - "R. Baker"}]}, {"paperId": "09b8457827ef183aa20ed02faefb266492e2dfad", "externalIds": - {"MAG": "2120841922", "DOI": "10.1109/81.488819", "CorpusId": 53126888}, "url": - "https://www.semanticscholar.org/paper/09b8457827ef183aa20ed02faefb266492e2dfad", - "title": "The CNN Universal Machine is as universal as a Turing Machine", - "abstract": "It is shown that the simplest integrated circuit implementations - of the CNN Universal Machine can play the \"game of life\", and are therefore - equivalent to Turing Machines. In addition, a constructive proof is given - for the direct implementation of general first-order cellular automata on - such machines.", "venue": "", "year": 1996, "referenceCount": 14, "citationCount": - 36, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1996-04-01", "journal": {"name": - "IEEE Transactions on Circuits and Systems I-regular Papers", "pages": "353-355", - "volume": "43"}, "authors": [{"authorId": "2694304", "name": "K. R. Crounse"}, - {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "da5f479d7226ca5a72870f75df4178f82ecd558d", - "externalIds": {"MAG": "2188403926", "CorpusId": 62446216}, "url": "https://www.semanticscholar.org/paper/da5f479d7226ca5a72870f75df4178f82ecd558d", - "title": "Continuous Signature Monitoring: Low-Cost Concurrent Detection of - Processor Control Errors", "abstract": "This paper presents a low-cost approach - to concurrent de- tection of processor control errors that uses a simple hardware - monitor and signatures embedded into the executing program. Existing signa- - ture-monitoring techniques detect a large portion of processor control errors - at a fraction of the cost of duplication. Analytical methods de- veloped in - this paper show that the new approach, continuous signa- ture monitoring (CSM), - makes major advances beyond existing tech- niques. CSM reduces the fraction - of undetected control-flow errors by orders of magnitude, to less than The - number of signatures reaches a theoretical minimum, lowered by as much as - 3 times to a range of 4-11%. Signature cost is reduced by placing CSM signatures - at locations that minimize performance loss and (for some architec- tures) - memory overhead. CSM exploits the program memory''s SEC/ DED code to decrease - error-detection latency by as much as lo00 times, to 0.016 program memory - cycles, without increasing memory over- head. This short latency allows transient - faults to he tolerated.", "venue": "", "year": 1990, "referenceCount": 21, - "citationCount": 33, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "31788425", "name": "V. - Agarwal"}]}, {"paperId": "c8f4449be7d8328f59d02ad50589ee668074d63c", "externalIds": - {"MAG": "2164645885", "DBLP": "journals/chinaf/Li08", "DOI": "10.1007/s11432-008-0089-y", - "CorpusId": 21462507}, "url": "https://www.semanticscholar.org/paper/c8f4449be7d8328f59d02ad50589ee668074d63c", - "title": "Approximation and universality of fuzzy Turing machines", "abstract": - null, "venue": "Science in China Series F: Information Sciences", "year": - 2008, "referenceCount": 22, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-06-25", "journal": {"name": "Science in China Series F: Information - Sciences", "pages": "1445-1465", "volume": "51"}, "authors": [{"authorId": - "51394392", "name": "Yongming Li"}]}, {"paperId": "3197f4823f22d2fa6eea814133cffef3060792c9", - "externalIds": {"MAG": "1994486459", "DBLP": "conf/grc/BaligaL05", "DOI": - "10.1109/GRC.2005.1547318", "CorpusId": 11727659}, "url": "https://www.semanticscholar.org/paper/3197f4823f22d2fa6eea814133cffef3060792c9", - "title": "Kolmogorov complexity based automata modeling for intrusion detection", - "abstract": "According to Kolmogorov complexity, a string is considered patternless - if the shortest Turing machine that can encode it is at least as long as the - string itself. Conversely, a non-random string with patterns can be described - by some Turing machine that is shorter than the string. Hence, special forms - of Turing machines - such as functions, N-grams, finite automata and stochastic - automata - can all be regarded as representations of some approximations of - patterns. Based on these observations, system profiles are defined for anomaly-based - intrusion detection systems. The results are encouraging.", "venue": "2005 - IEEE International Conference on Granular Computing", "year": 2005, "referenceCount": - 25, "citationCount": 18, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-07-25", - "journal": {"name": "2005 IEEE International Conference on Granular Computing", - "pages": "387-392 Vol. 2", "volume": "2"}, "authors": [{"authorId": "2056056880", - "name": "Priya Baliga"}, {"authorId": "2107178974", "name": "T. Y. Lin"}]}]} - - ' - headers: - Access-Control-Allow-Origin: - - '*' - Connection: - - keep-alive - Content-Length: - - '170668' - Content-Type: - - application/json - Date: - - Wed, 21 Dec 2022 04:43:45 GMT - Via: - - 1.1 5ff4eb7f442543a952b90d418d9457ba.cloudfront.net (CloudFront) - X-Amz-Cf-Id: - - a97oiiRWsFe_BsbiWL1la_NH3yEE6I64mFD63wIZVKeZf-e2GQBq7A== - X-Amz-Cf-Pop: - - GRU3-P1 - X-Cache: - - Miss from cloudfront - x-amz-apigw-id: - - detIMHISPHcF0Ug= - x-amzn-Remapped-Connection: - - keep-alive - x-amzn-Remapped-Content-Length: - - '170668' - x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:45 GMT - x-amzn-Remapped-Server: - - gunicorn - x-amzn-RequestId: - - 60a267d0-0b81-4947-a253-8d9edaacace7 - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - User-Agent: - - python-requests/2.28.1 - method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1700&limit=100 - response: - body: - string: '{"total": 65539, "offset": 1700, "next": 1800, "data": [{"paperId": - "060d2a2d092ec8dfb82be11b66fa774eb9f6e295", "externalIds": {"DBLP": "journals/jsyml/JockuschS84", - "MAG": "2083623332", "DOI": "10.2307/2274273", "CorpusId": 28946399}, "url": - "https://www.semanticscholar.org/paper/060d2a2d092ec8dfb82be11b66fa774eb9f6e295", - "title": "Pseudo-jump operators. II: Transfinite iterations, hierarchies and - minimal covers", "abstract": "In this paper we introduce a new hierarchy of - sets and operators which we call the REA hierarchy for \u201crecursively enumerable - in and above\u201d. The hierarchy is generated by composing (possibly) transfinite - sequences of the pseudo-jump operators considered in Jockusch and Shore [1983]. - We there studied pseudo-jump operators defined by analogy with the Turing - jump as ones taking a set A to A \u2295 for some index e. We would now call - these 1-REA operators and will extend them to \u03b1-REA operators for recursive - ordinals \u03b1 in analogy with the iterated Turing jump operators (A \u2192 - A(\u03b1) for \u03b1 < and Kleene''s hyperarithmetic hierarchy. The REA sets - will then, of course, be the results of applying these operators to the empty - set. They will extend and generalize Kleene''s H sets but will still be contained - in the class of set singletons thus providing us with a new richer subclass - of the set singletons which, as we shall see, is related to the work of Harrington - [1975] and [1976] on the problems of Friedman [1975] about the arithmetic - degrees of such singletons. Their degrees also give a natural class extending - the class H of Jockusch and McLaughlin [1969] by closing it off under transfinite - iterations as well as the inclusion of [d, d\u2032] for each degree d in the - class. The reason for the class being closed under this last operation is - that the REA operators include all operators and so give a new hierarchy for - them as well as the sets. This hierarchy also turns out to be related to the - difference hierarchy of Ershov [1968], [1968a] and [1970]: every \u03b1-r.e. - set is \u03b1-REA but each level of the REA hierarchy after the first extends - all the way through the difference hierarchy although never entirely encompassing - even the next level of the difference hierarchy.", "venue": "Journal of Symbolic - Logic (JSL)", "year": 1984, "referenceCount": 40, "citationCount": 103, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1984-12-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "1205 - - 1236", "volume": "49"}, "authors": [{"authorId": "1888089", "name": "C. - Jockusch"}, {"authorId": "1817824", "name": "R. Shore"}]}, {"paperId": "43f48fa9f7e010b2c16b501c2b4c546360e7fe73", - "externalIds": {"MAG": "1970194302", "DOI": "10.1103/PHYSREVE.87.042719", - "CorpusId": 6713870, "PubMed": "23679461"}, "url": "https://www.semanticscholar.org/paper/43f48fa9f7e010b2c16b501c2b4c546360e7fe73", - "title": "Noise-induced temporal dynamics in Turing systems.", "abstract": - "We examine the ability of intrinsic noise to produce complex temporal dynamics - in Turing pattern formation systems, with particular emphasis on the Schnakenberg - kinetics. Using power spectral methods, we characterize the behavior of the - system using stochastic simulations at a wide range of points in parameter - space and compare with analytical approximations. Specifically, we investigate - whether polarity switching of stochastic patterns occurs at a defined frequency. - We find that it can do so in individual realizations of a stochastic simulation, - but that the frequency is not defined consistently across realizations in - our samples of parameter space. Further, we examine the effect of noise on - deterministically predicted traveling waves and find them increased in amplitude - and decreased in speed.", "venue": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "year": 2013, "referenceCount": 0, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-04-25", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 042719\n ", - "volume": "87 4"}, "authors": [{"authorId": "3077300", "name": "L. Schumacher"}, - {"authorId": "6566804", "name": "T. Woolley"}, {"authorId": "35275545", "name": - "R. Baker"}]}, {"paperId": "4a613aee7ce1fbffb92779dd296ba7a7fd6c7af6", "externalIds": - {"MAG": "2148828758", "DOI": "10.1111/j.1464-410X.2004.05261.x", "CorpusId": - 26723583, "PubMed": "15638907"}, "url": "https://www.semanticscholar.org/paper/4a613aee7ce1fbffb92779dd296ba7a7fd6c7af6", - "title": "Transurethral resection of the ejaculatory ducts for treating ejaculatory - symptoms", "abstract": "To report our experience with transurethral resection - of the ejaculatory ducts (TURED) in infertile men with symptomatic ejaculatory - duct obstruction (EDO).", "venue": "BJU International", "year": 2005, "referenceCount": - 15, "citationCount": 27, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2005-01-01", "journal": - {"name": "BJU International", "volume": "95"}, "authors": [{"authorId": "2116558042", - "name": "Christopher W. Johnson"}, {"authorId": "2168669257", "name": "Jonathan - B. Bingham"}, {"authorId": "6551064", "name": "E. Goluboff"}, {"authorId": - "80915789", "name": "H. Fisch"}]}, {"paperId": "00ac18a24b9693b703cf4cd3daa59d95fd647808", - "externalIds": {"MAG": "1968887851", "DOI": "10.1063/1.1372765", "CorpusId": - 93268105}, "url": "https://www.semanticscholar.org/paper/00ac18a24b9693b703cf4cd3daa59d95fd647808", - "title": "Towards a molecular logic machine", "abstract": "Finite state logic - machines can be realized by pump\u2013probe spectroscopic experiments on an - isolated molecule. The most elaborate setup, a Turing machine, can be programmed - to carry out a specific computation. We argue that a molecule can be similarly - programmed, and provide examples using two photon spectroscopies. The states - of the molecule serve as the possible states of the head of the Turing machine - and the physics of the problem determines the possible instructions of the - program. The tape is written in an alphabet that allows the listing of the - different pump and probe signals that are applied in a given experiment. Different - experiments using the same set of molecular levels correspond to different - tapes that can be read and processed by the same head and program. The analogy - to a Turing machine is not a mechanical one and is not completely molecular - because the tape is not part of the molecular machine. We therefore also discuss - molecular finite state machines, such as sequential devices, for which...", - "venue": "", "year": 2001, "referenceCount": 29, "citationCount": 32, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-06-04", - "journal": {"name": "Journal of Chemical Physics", "pages": "10239-10246", - "volume": "114"}, "authors": [{"authorId": "2460403", "name": "F. Remacle"}, - {"authorId": "92475219", "name": "R. Levine"}]}, {"paperId": "29ebb0b3e83636f97e4324b6957dc0bd4a640ded", - "externalIds": {"CorpusId": 207780595}, "url": "https://www.semanticscholar.org/paper/29ebb0b3e83636f97e4324b6957dc0bd4a640ded", - "title": "Turing Patterns in CNNs-Part I : Once Over Lightly", "abstract": - "Abstruct-The aim of this three part tutorial is to focus the reader\u2019s - attention to a new exciting behavior of a particular class of cellular neural - networks (CNNs): Turing pattern formation in two-grid coupled CNNs. We first - analyze the reduced Chua\u2019s circuit as the basic cell for the two-grid - coupled CNNs capable of producing Turing patterns. We use a nonstandard normalization - to derive a dimensionless state equation of the individual cell. Then, we - present an intuitive explanation of Turing pattern formation mechanism for - a 1-D two-grid coupled array in relation to the original mechanism proposed - by Turing. Finally, we derive the first two conditions for Turing pattern - formation, discuss the boundary conditions, and illustrate via an example - on how the number of the equilibrium points of a CNN increases rapidly even - though each isolated cell has only one equilibrium point. This study is continued - in the next two parts of this tutorial where analytical derivations and various - computer simulation results are presented as well.", "venue": "", "year": - 2004, "referenceCount": 6, "citationCount": 17, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": null, "authors": [{"authorId": "92057486", - "name": "Liviu"}]}, {"paperId": "acc84818efc05a94fed0122b08709af9a7a213d2", - "externalIds": {"MAG": "1510385841", "DOI": "10.5964/bioling.8907", "CorpusId": - 60707607}, "url": "https://www.semanticscholar.org/paper/acc84818efc05a94fed0122b08709af9a7a213d2", + "name": "F. Presas"}]}, {"paperId": "e9e9976b39944fec1653516d58e0a773575453eb", + "externalIds": {"MAG": "2949626026", "ArXiv": "patt-sol/9807002", "DOI": "10.1016/S0167-2789(99)00154-2", + "CorpusId": 11958083}, "corpusId": 11958083, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e9e9976b39944fec1653516d58e0a773575453eb", + "title": "Simple and superlattice Turing patterns in reaction-diffusion systems: + bifurcation, bistability, and parameter collapse", "abstract": null, "venue": + "", "year": 1998, "referenceCount": 32, "citationCount": 72, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/patt-sol/9807002", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1998-07-14", "journal": {"name": + "Physica D: Nonlinear Phenomena", "pages": "45-65", "volume": "136"}, "authors": + [{"authorId": "34045389", "name": "Stephen L. Judd"}, {"authorId": "143665945", + "name": "M. Silber"}]}, {"paperId": "d8ab8bfc5f622673059573a799851665444b12a6", + "externalIds": {"MAG": "2033625883", "DOI": "10.1016/0167-2789(96)00072-3", + "CorpusId": 121378928}, "corpusId": 121378928, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d8ab8bfc5f622673059573a799851665444b12a6", + "title": "From quasi-2D to 3D Turing patterns in ramped systems", "abstract": + null, "venue": "", "year": 1996, "referenceCount": 22, "citationCount": 33, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1996-11-01", "journal": {"name": + "Physica D: Nonlinear Phenomena", "pages": "53-66", "volume": "98"}, "authors": + [{"authorId": "3250971", "name": "E. Dulos"}, {"authorId": "47459850", "name": + "P. W. Davies"}, {"authorId": "12105027", "name": "B. Rudovics"}, {"authorId": + "50010680", "name": "P. Kepper"}]}, {"paperId": "3c503134aefa9778eb5322eb4f856c37a7651db3", + "externalIds": {"MAG": "2057796887", "DOI": "10.1007/S11071-012-0374-6", "CorpusId": + 14953518}, "corpusId": 14953518, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3c503134aefa9778eb5322eb4f856c37a7651db3", + "title": "Spatial patterns of a predator-prey model with cross diffusion", + "abstract": null, "venue": "", "year": 2012, "referenceCount": 23, "citationCount": + 77, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-03-13", "journal": {"name": + "Nonlinear Dynamics", "pages": "1631-1638", "volume": "69"}, "authors": [{"authorId": + "47334108", "name": "Gui\u2010Quan Sun"}, {"authorId": "145752193", "name": + "Zhen Jin"}, {"authorId": "103314097", "name": "Li Li"}, {"authorId": "153708634", + "name": "M. Haque"}, {"authorId": "32812702", "name": "Bai-lian Li"}]}, {"paperId": + "acc84818efc05a94fed0122b08709af9a7a213d2", "externalIds": {"MAG": "1510385841", + "DOI": "10.5964/bioling.8907", "CorpusId": 60707607}, "corpusId": 60707607, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/acc84818efc05a94fed0122b08709af9a7a213d2", "title": "A Turing Program for Linguistic Theory", "abstract": "ness it subsumes and thereby relates all computational primitives; in principle therefore it renders commensurable the computational ontologies of linguistics and neuroscience @@ -35624,31 +40330,14 @@ interactions: symbol Sentence, \u2312 = concatenation, # = boundary symbol, N[P] = Noun [Phrase], V[P] =", "venue": "Biolinguistics", "year": 2012, "referenceCount": 110, "citationCount": 21, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2012-06-19", "journal": {"name": - "Biolinguistics"}, "authors": [{"authorId": "6648180", "name": "J. Watumull"}]}, - {"paperId": "b2910cd5825051d2fdbb2648ddab1d73a961fb25", "externalIds": {"MAG": - "2082681875", "DOI": "10.1103/PHYSREVE.69.046205", "CorpusId": 32020219, "PubMed": - "15169088"}, "url": "https://www.semanticscholar.org/paper/b2910cd5825051d2fdbb2648ddab1d73a961fb25", - "title": "Control of Turing pattern formation by delayed feedback.", "abstract": - "The effect of the global delayed feedback technique on Turing pattern formation - is investigated in the modified Lengyel-Epstein two-variable model. Feedback - intensity, delay time, and feedback-imposing time (the period of time that - feedback is present in the system) are all found to be of significant influence - on Turing pattern formation time. Under appropriate parameter settings, delayed - feedback could suppress or induce the Turing pattern if the feedback intensity - is strong enough.", "venue": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "year": 2004, "referenceCount": 0, "citationCount": - 14, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-04-01", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 046205\n ", - "volume": "69 4 Pt 2"}, "authors": [{"authorId": "2117124639", "name": "Q. - Li"}, {"authorId": "2106515856", "name": "Lin Ji"}]}, {"paperId": "79f66ed7d90717d91d93e06cf0aeddf07e6c9adb", - "externalIds": {"MAG": "2547781042", "CorpusId": 49567604}, "url": "https://www.semanticscholar.org/paper/79f66ed7d90717d91d93e06cf0aeddf07e6c9adb", + "openAccessPdf": {"url": "https://bioling.psychopen.eu/index.php/bioling/article/download/8907/8103", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Linguistics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-06-19", + "journal": {"name": "Biolinguistics"}, "authors": [{"authorId": "6648180", + "name": "J. Watumull"}]}, {"paperId": "79f66ed7d90717d91d93e06cf0aeddf07e6c9adb", + "externalIds": {"MAG": "2547781042", "CorpusId": 49567604}, "corpusId": 49567604, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79f66ed7d90717d91d93e06cf0aeddf07e6c9adb", "title": "Can Machines Be People? Reflections on the Turing Triage Test", "abstract": "This chapter contains sections titled: 19.1 The Turing Triage Test, 19.2 The Importance of the Turing Triage Test, 19.3 Understanding the @@ -35656,215 +40345,49 @@ interactions: of Machine Personhood, 19.6 Concepts and Their Application, 19.7 The Limits of Human Understanding?, 19.8 Thinking Seriously about Machines . . ., Acknowledgments, Notes, References", "venue": "", "year": 2012, "referenceCount": 18, "citationCount": - 13, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "400", "volume": ""}, "authors": [{"authorId": "145058661", "name": - "Patrick Lin"}, {"authorId": "20821855", "name": "Keith Abney"}, {"authorId": - "6778024", "name": "G. Bekey"}]}, {"paperId": "ca90906a5f8532eebd81f627211ba2c8713e09ab", - "externalIds": {"DBLP": "conf/eurocast/NetoSCA97", "MAG": "1591645314", "DOI": - "10.1007/BFb0025058", "CorpusId": 30909485}, "url": "https://www.semanticscholar.org/paper/ca90906a5f8532eebd81f627211ba2c8713e09ab", - "title": "Turing Universality of Neural Nets (Revisited)", "abstract": null, - "venue": "EUROCAST", "year": 1997, "referenceCount": 4, "citationCount": 19, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1997-02-24", "journal": - {"pages": "361-366"}, "authors": [{"authorId": "145515202", "name": "J. P. - Neto"}, {"authorId": "2797623", "name": "H. Siegelmann"}, {"authorId": "143698164", - "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": "143836648", "name": "C. - P. S. Araujo"}]}, {"paperId": "f33965d27a1ccfdd58f325456bd6d61714057383", - "externalIds": {"MAG": "2024325294", "DOI": "10.1016/J.SHPSA.2010.07.010", - "CorpusId": 120427071}, "url": "https://www.semanticscholar.org/paper/f33965d27a1ccfdd58f325456bd6d61714057383", - "title": "Deviant encodings and Turing\u2019s analysis of computability", - "abstract": null, "venue": "", "year": 2010, "referenceCount": 9, "citationCount": - 22, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2010-09-01", "journal": {"name": "Studies in History and Philosophy of Science", - "pages": "247-252", "volume": "41"}, "authors": [{"authorId": "144246233", - "name": "B. Copeland"}, {"authorId": "144239027", "name": "D. Proudfoot"}]}, - {"paperId": "a113a876a437646b5e8933e521b0d6a3131726d7", "externalIds": {"DBLP": - "conf/stacs/Indyk95", "MAG": "1533739098", "DOI": "10.1007/3-540-59042-0_85", - "CorpusId": 12760910}, "url": "https://www.semanticscholar.org/paper/a113a876a437646b5e8933e521b0d6a3131726d7", - "title": "Optimal Simulation of Automata by Neural Nets", "abstract": null, - "venue": "STACS", "year": 1995, "referenceCount": 14, "citationCount": 52, - "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1995-03-02", - "journal": {"pages": "337-348"}, "authors": [{"authorId": "1688317", "name": - "P. Indyk"}]}, {"paperId": "9e1be153d25fa691b0b6408d047e5bc0b7bc36b2", "externalIds": - {"DBLP": "journals/corr/Riedl14", "MAG": "2151901989", "ArXiv": "1410.6142", - "CorpusId": 2487258}, "url": "https://www.semanticscholar.org/paper/9e1be153d25fa691b0b6408d047e5bc0b7bc36b2", - "title": "The Lovelace 2.0 Test of Artificial Creativity and Intelligence", - "abstract": "Observing that the creation of certain types of artistic artifacts - necessitate intelligence, we present the Lovelace 2.0 Test of creativity as - an alternative to the Turing Test as a means of determining whether an agent - is intelligent. The Lovelace 2.0 Test builds off prior tests of creativity - and additionally provides a means of directly comparing the relative intelligence - of different agents.", "venue": "ArXiv", "year": 2014, "referenceCount": 8, - "citationCount": 41, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-10-22", "journal": - {"name": "ArXiv", "volume": "abs/1410.6142"}, "authors": [{"authorId": "2757194", - "name": "Mark O. Riedl"}]}, {"paperId": "20b1e6f1807bbb6d8307e7d1ea0fc63b88684ff8", - "externalIds": {"MAG": "1583763223", "CorpusId": 118087277}, "url": "https://www.semanticscholar.org/paper/20b1e6f1807bbb6d8307e7d1ea0fc63b88684ff8", - "title": "Complexity-Theoretic Aspects of Interactive Proof Systems", "abstract": - "In 1985, Goldwasser, Micali and Racko formulated interactive proof systems - as a tool for developing cryptographic protocols. Indeed, many exciting cryptographic - results followed from studying interactive proof systems and the related concept - of zero-knowledge. Interactive proof systems also have an important part in - complexity theory merging the well established concepts of probabilistic and - nondeterministic computation. This thesis will study the complexity of various - models of interactive proof systems. A perfect zero-knowledge interactive - protocol convinces a veri er that a string is in a language without revealing - any additional knowledge in an information theoretic sense. This thesis will - show that for any language that has a perfect zero-knowledge proof system, - its complement has a short interactive protocol. This result implies that - there are not any perfect zero-knowledge protocols for NP-complete languages - unless the polynomial-time hierarchy collapses. Thus knowledge complexity - can show a language is easy to prove. Interesting models of interactive proof - systems arise by restricting the power of the veri er. This thesis examines - the proof systems with a veri er required to run in logarithmic space as well - as polynomial time. Relationships with circuit complexity and log-space Turing - machines are developed. We can increase the power of interactive proof systems - by allowing many provers that can not communicate among themselves during - the protocol. This thesis shows the equivalence between this multi-prover - model and probabilistic Turing machines with an untrustworthy oracle. We additionally - give an oracle under which co-NP does not have multi-prover interactive protocols. - This result implies an oracle where co-NP does not have standard interactive - protocols. Another natural model occurs when the veri er has only linear time. - Towards this direction, this thesis examines probabilistic machines and linear - time. We show an oracle under which linear time probabilistic Turing machines - can accept all BPP languages, an unusual collapse of a complexity time hierarchy. - We exhibit many other related relativized results. Finally we show probabilistic - linear time does not contain all languages accepted by interactive proof systems.", - "venue": "", "year": 1989, "referenceCount": 47, "citationCount": 75, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + 13, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "1691447", "name": "L. - Fortnow"}]}, {"paperId": "462a708c013bbfa77b8c1bd570f3b288ef90777d", "externalIds": - {"DBLP": "journals/siamam/PengSW07", "MAG": "2079676773", "DOI": "10.1137/05064624X", - "CorpusId": 11282282}, "url": "https://www.semanticscholar.org/paper/462a708c013bbfa77b8c1bd570f3b288ef90777d", - "title": "Stationary Pattern of a Ratio-Dependent Food Chain Model with Diffusion", - "abstract": "In the paper, we investigate a three-species food chain model - with diffusion and ratio-dependent predation functional response. We mainly - focus on the coexistence of the three species. For this coupled reaction-diffusion - system, we study the persistent property of the solution, the stability of - the constant positive steady state solution, and the existence and nonexistence - of nonconstant positive steady state solutions. Both the general stationary - pattern and Turing pattern are observed as a result of diffusion. Our results - also exhibit some interesting effects of diffusion and functional responses - on pattern formation.", "venue": "SIAM Journal on Applied Mathematics", "year": - 2007, "referenceCount": 47, "citationCount": 77, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2007-08-24", "journal": {"name": "SIAM J. Appl. Math.", "pages": "1479-1503", - "volume": "67"}, "authors": [{"authorId": "145122505", "name": "R. Peng"}, - {"authorId": "1728518", "name": "Junping Shi"}, {"authorId": "2145476242", - "name": "Mingxin Wang"}]}, {"paperId": "1514bdc217b8d85bc11b6ba43baf1f47d8173f83", - "externalIds": {"DBLP": "conf/isw/ChowGJZ01", "MAG": "1569422795", "DOI": - "10.1007/3-540-45439-X_10", "CorpusId": 33032569}, "url": "https://www.semanticscholar.org/paper/1514bdc217b8d85bc11b6ba43baf1f47d8173f83", - "title": "An Approach to the Obfuscation of Control-Flow of Sequential Computer - Programs", "abstract": null, "venue": "Information Security Conference", "year": - 2001, "referenceCount": 16, "citationCount": 139, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-10-01", "journal": {"pages": "144-155"}, "authors": [{"authorId": "40200941", - "name": "Stanley Chow"}, {"authorId": "1711557", "name": "Y. Gu"}, {"authorId": - "145351103", "name": "H. Johnson"}, {"authorId": "2101058848", "name": "V. - Zakharov"}]}, {"paperId": "408441939b3e297588aa4e92fdd8b46296e99221", "externalIds": - {"MAG": "1999479735", "DOI": "10.1112/PLMS/S3-12.1.245", "CorpusId": 117590536}, - "url": "https://www.semanticscholar.org/paper/408441939b3e297588aa4e92fdd8b46296e99221", - "title": "Turing-machine computable func-tionals of nite types II", "abstract": - "A remote temperature change warning system for a refrigeration vehicle comprised - of a temperature sensing circuit located in the refrigeration compartment - of the refrigeration vehicle and a detection circuit located on the vehicle - remote from the temperature sensing circuit and having means for indicating - to the vehicle operator the temperature condition in the refrigeration compartment, - the output of the temperature sensing circuit and the input of the remote - detection circuit being electrically connected through the existing electrical - wiring of said refrigeration vehicle.", "venue": "", "year": 1962, "referenceCount": - 5, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Engineering", "source": "s2-fos-model"}, {"category": - "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": "a6f68ec713921a484f49acc2d5baba2093acd100", - "externalIds": {"MAG": "2059810330", "DOI": "10.1016/J.PHYSD.2004.08.017", - "CorpusId": 120726644}, "url": "https://www.semanticscholar.org/paper/a6f68ec713921a484f49acc2d5baba2093acd100", - "title": "Travelling-stripe forcing of Turing patterns", "abstract": null, - "venue": "", "year": 2004, "referenceCount": 32, "citationCount": 23, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-12-01", "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": - "235-242", "volume": "199"}, "authors": [{"authorId": "2236462", "name": "F. - Sagu\u00e9s"}, {"authorId": "2701200", "name": "D. G. M\u00edguez"}, {"authorId": - "11508448", "name": "E. M. Nicola"}, {"authorId": "2614851", "name": "A. P. - Mu\u00f1uzuri"}, {"authorId": "2440383", "name": "J. Casademunt"}, {"authorId": - "78546816", "name": "L. Kramer"}]}, {"paperId": "e09a80c5da4a041fad920be22ab594a408d84f47", - "externalIds": {"MAG": "2166579265", "DOI": "10.1112/blms/bdr007", "CorpusId": - 16981410}, "url": "https://www.semanticscholar.org/paper/e09a80c5da4a041fad920be22ab594a408d84f47", - "title": "Relativizations of randomness and genericity notions", "abstract": - "A set A is a base for Schnorr randomness if it is Turing reducible to a set - R that is Schnorr random relative to A, and the notion of a base for weak - 1\u2010genericity can be defined similarly. We show that A is a base for Schnorr - randomness if and only if A is a base for weak 1\u2010genericity if and only - if the halting set K is not Turing reducible to A. Furthermore, we define - a set A to be high for Schnorr randomness versus Martin\u2010L\u00f6f randomness - if and only if every set that is Schnorr random relative to A is also Martin\u2010L\u00f6f - random unrelativized, and we show that A is high for Schnorr randomness versus - Martin\u2010L\u00f6f randomness if and only if K is Turing reducible to A. - Results concerning highness for other pairs of randomness notions are also - presented.", "venue": "", "year": 2011, "referenceCount": 58, "citationCount": - 22, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2011-08-01", "journal": {"name": "Bulletin of the - London Mathematical Society", "volume": "43"}, "authors": [{"authorId": "2693169", - "name": "Johanna N. Y. Franklin"}, {"authorId": "1699450", "name": "F. Stephan"}, - {"authorId": "2804470", "name": "Liang Yu"}]}, {"paperId": "3af6ed1e93ee8500691634c0e0ee223d4f66b9ad", - "externalIds": {"ArXiv": "0712.1359", "DBLP": "conf/cie/Finkel05", "MAG": - "2797767723", "DOI": "10.1017/S0960129506005597", "CorpusId": 6525917}, "url": - "https://www.semanticscholar.org/paper/3af6ed1e93ee8500691634c0e0ee223d4f66b9ad", - "title": "Borel ranks and Wadge degrees of context free $\\omega$-languages", - "abstract": "We show that the Borel hierarchy of the class of context free - $\\omega$-languages, or even of the class of $\\omega$-languages accepted - by B\u00fcchi 1-counter automata, is the same as the Borel hierarchy of the - class of $\\omega$-languages accepted by Turing machines with a B\u00fcchi - acceptance condition. In particular, for each recursive non-null ordinal $\\alpha$, - there exist some ${\\bf \\Sigma}^0_\\alpha$-complete and some ${\\bf \\Pi}^0_\\alpha$-complete - $\\omega$-languages accepted by B\u00fcchi 1-counter automata. And the supremum - of the set of Borel ranks of context free $\\omega$-languages is an ordinal - $\\gamma_2^1$ that is strictly greater than the first non-recursive ordinal - $\\omega_1^{\\mathrm{CK}}$. We then extend this result, proving that the Wadge - hierarchy of context free $\\omega$-languages, or even of $\\omega$-languages - accepted by B\u00fcchi 1-counter automata, is the same as the Wadge hierarchy - of $\\omega$-languages accepted by Turing machines with a B\u00fcchi or a - Muller acceptance condition.", "venue": "Mathematical Structures in Computer - Science", "year": 2005, "referenceCount": 45, "citationCount": 36, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Linguistics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-06-08", "journal": {"name": "Mathematical Structures in Computer Science", - "pages": "813 - 840", "volume": "16"}, "authors": [{"authorId": "1696491", - "name": "O. Finkel"}]}, {"paperId": "61f69bb90e94b8081337f23d1d8fd484c9e7f54c", + {"name": "", "pages": "400", "volume": ""}, "authors": [{"authorId": "145058661", + "name": "Patrick Lin"}, {"authorId": "20821855", "name": "Keith Abney"}, {"authorId": + "6778024", "name": "G. Bekey"}]}, {"paperId": "c8f4449be7d8328f59d02ad50589ee668074d63c", + "externalIds": {"MAG": "2164645885", "DBLP": "journals/chinaf/Li08", "DOI": + "10.1007/s11432-008-0089-y", "CorpusId": 21462507}, "corpusId": 21462507, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c8f4449be7d8328f59d02ad50589ee668074d63c", + "title": "Approximation and universality of fuzzy Turing machines", "abstract": + null, "venue": "Science in China Series F: Information Sciences", "year": + 2008, "referenceCount": 22, "citationCount": 12, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-06-25", "journal": {"name": "Science in China Series + F: Information Sciences", "pages": "1445-1465", "volume": "51"}, "authors": + [{"authorId": "51394392", "name": "Yongming Li"}]}, {"paperId": "890634793c01d88fbfe271679e7ffa11866b5a16", + "externalIds": {"MAG": "206854952", "CorpusId": 53002792}, "corpusId": 53002792, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/890634793c01d88fbfe271679e7ffa11866b5a16", + "title": "The NASA Controls-Struc-tures Interaction Technology Program", "abstract": + "The interaction between a flexible spacecraft structure and its control system + is commonly referred to as controls-structures interaction (CSI). The CSI + technology program is developing the capability and confidence to integrate + the structure and control system, so as to avoid interactions that cause problems + and to exploit interactions to increase spacecraft capability. A NASA program + has been initiated to advance CSI technology to a point where it can be used + in spacecraft design for future missions. The CSI technology program is a + multicenter program utilizing the resources of the NASA Langley Research Center + (LaRC), the NASA Marshall Space Flight Center (MSFC), and the NASA Jet Propulsion + Laboratory (JPL). The purpose is to describe the current activities, results + to date, and future activities of the NASA CSI technology program.", "venue": + "", "year": 1990, "referenceCount": 0, "citationCount": 32, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1990-10-01", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "41212562", "name": "J. Newsom"}]}, {"paperId": "61f69bb90e94b8081337f23d1d8fd484c9e7f54c", "externalIds": {"MAG": "2047898003", "DOI": "10.1144/GSL.JGS.1944.100.01-04.08", - "CorpusId": 140707499}, "url": "https://www.semanticscholar.org/paper/61f69bb90e94b8081337f23d1d8fd484c9e7f54c", + "CorpusId": 140707499}, "corpusId": 140707499, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/61f69bb90e94b8081337f23d1d8fd484c9e7f54c", "title": "Notes on the compressibility of clays", "abstract": "The consolidation of an argillaceous sediment may be simply described as the process by which it is compressed from a mud into a clay and finally, if the weight of the @@ -35887,252 +40410,32 @@ interactions: In 1927 the same author gave results of laboratory consolidation tests on several different clays and showed that the compressibility was greater", "venue": "Quarterly Journal of the Geological Society of London", "year": - 1944, "referenceCount": 17, "citationCount": 426, "influentialCitationCount": - 35, "isOpenAccess": false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": - [{"category": "Geology", "source": "external"}, {"category": "Geology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1944-07-01", - "journal": {"name": "Quarterly Journal of the Geological Society of London", - "pages": "119 - 135", "volume": "100"}, "authors": [{"authorId": "84670610", - "name": "A. Skempton"}, {"authorId": "152720820", "name": "O. T. Jones"}]}, - {"paperId": "774660f5d1b32e97e8beeffb0e03d7196e843fa9", "externalIds": {"MAG": - "33970249", "DOI": "10.1557/JMR.2001.0190", "CorpusId": 56442709}, "url": - "https://www.semanticscholar.org/paper/774660f5d1b32e97e8beeffb0e03d7196e843fa9", - "title": "Metal-organic vapor phase epitaxial growth of high-quality ZnO films - on Al 2 O 3 (00?1)", "abstract": "(00?1)substrates using low-pressure metalorganic - vapor phase epitaxy. The reactants for thegrowth were diethylzinc and oxygen. - Growth temperature, one of the importantexperimental parameters for epitaxial - layers, was optimized. The films grown at500 \u00b0C exhibited good crystallinity - and strong ultraviolet absorption and emission.Photoluminescence spectra of - the films showed a dominant excitonic emission with aweak deep level emission. - More importantly, a strong stimulated emission peak wasobserved even at room - temperature.I. INTRODUCTIONMuch attention has been paid recently to ZnO forshort-wavelength - photonic device applications since ithas a direct band gap energy of 3.3 eV - at room tempera-ture.", "venue": "", "year": 2001, "referenceCount": 17, "citationCount": - 73, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Materials Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Engineering", "source": "external"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2001-05-01", "journal": {"name": "Journal of Materials - Research", "pages": "1358-1362", "volume": "16"}, "authors": [{"authorId": - "3854784", "name": "W. Park"}, {"authorId": "47237977", "name": "S. An"}, - {"authorId": "6662068", "name": "G. Yi"}, {"authorId": "6816929", "name": - "H. M. Jang"}]}, {"paperId": "4e39f11da3b0af4876d48fd66604ecbf4819719f", "externalIds": - {"MAG": "2329961282", "DOI": "10.1103/PHYSREVLETT.108.244101", "CorpusId": - 13914692, "PubMed": "23004274"}, "url": "https://www.semanticscholar.org/paper/4e39f11da3b0af4876d48fd66604ecbf4819719f", - "title": "Photonic nonlinear transient computing with multiple-delay wavelength - dynamics.", "abstract": "We report on the experimental demonstration of a - hybrid optoelectronic neuromorphic computer based on a complex nonlinear wavelength - dynamics including multiple delayed feedbacks with randomly defined weights. - This neuromorphic approach is based on a new paradigm of a brain-inspired - computational unit, intrinsically differing from Turing machines. This recent - paradigm consists in expanding the input information to be processed into - a higher dimensional phase space, through the nonlinear transient response - of a complex dynamics excited by the input information. The computed output - is then extracted via a linear separation of the transient trajectory in the - complex phase space. The hyperplane separation is derived from a learning - phase consisting of the resolution of a regression problem. The processing - capability originates from the nonlinear transient, resulting in nonlinear - transient computing. The computational performance is successfully evaluated - on a standard benchmark test, namely, a spoken digit recognition task.", "venue": - "Physical Review Letters", "year": 2012, "referenceCount": 19, "citationCount": - 136, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-06-15", "journal": {"name": "Physical - review letters", "pages": "\n 244101\n ", "volume": "108 24"}, - "authors": [{"authorId": "5895321", "name": "R. Martinenghi"}, {"authorId": - "144535778", "name": "S. Rybalko"}, {"authorId": "143753357", "name": "M. - Jacquot"}, {"authorId": "5948493", "name": "Y. Chembo"}, {"authorId": "1760452", - "name": "L. Larger"}]}, {"paperId": "9ec59d3b0320fc8abfaf297be45f0da6fdeef3d7", - "externalIds": {"MAG": "2566832195", "DBLP": "journals/corr/HuangLPHB16", - "ArXiv": "1612.04357", "DOI": "10.1109/CVPR.2017.202", "CorpusId": 14803274}, - "url": "https://www.semanticscholar.org/paper/9ec59d3b0320fc8abfaf297be45f0da6fdeef3d7", - "title": "Stacked Generative Adversarial Networks", "abstract": "In this paper, - we propose a novel generative model named Stacked Generative Adversarial Networks - (SGAN), which is trained to invert the hierarchical representations of a bottom-up - discriminative network. Our model consists of a top-down stack of GANs, each - learned to generate lower-level representations conditioned on higher-level - representations. A representation discriminator is introduced at each feature - hierarchy to encourage the representation manifold of the generator to align - with that of the bottom-up discriminative network, leveraging the powerful - discriminative representations to guide the generative model. In addition, - we introduce a conditional loss that encourages the use of conditional information - from the layer above, and a novel entropy loss that maximizes a variational - lower bound on the conditional entropy of generator outputs. We first train - each stack independently, and then train the whole model end-to-end. Unlike - the original GAN that uses a single noise vector to represent all the variations, - our SGAN decomposes variations into multiple levels and gradually resolves - uncertainties in the top-down generative process. Based on visual inspection, - Inception scores and visual Turing test, we demonstrate that SGAN is able - to generate images of much higher quality than GANs without stacking.", "venue": - "Computer Vision and Pattern Recognition", "year": 2016, "referenceCount": - 74, "citationCount": 407, "influentialCitationCount": 33, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2016-12-13", - "journal": {"name": "2017 IEEE Conference on Computer Vision and Pattern Recognition - (CVPR)", "pages": "1866-1875"}, "authors": [{"authorId": "144247007", "name": - "Xun Huang"}, {"authorId": "1527103472", "name": "Yixuan Li"}, {"authorId": - "1973062", "name": "Omid Poursaeed"}, {"authorId": "1706504", "name": "J. - Hopcroft"}, {"authorId": "50172592", "name": "Serge J. Belongie"}]}, {"paperId": - "4ec826ea1e4e36ee56bbbb7de90957594b92cb96", "externalIds": {"MAG": "2050534548", - "DOI": "10.1177/002199839202600606", "CorpusId": 135722311}, "url": "https://www.semanticscholar.org/paper/4ec826ea1e4e36ee56bbbb7de90957594b92cb96", - "title": "Thermoviscoelastic Analysis of Residual Stresses and Warpage in - Composite Laminates", "abstract": "Linear thermoviscoelastic lamination theory - was used to determine resid ual stresses and warpage in multidirectional woven-glass/epoxy - laminates. The single \"unidirectional\" layer of the material was characterized - by means of an accelerated proce dure. The material was assumed to be thermorheologically - simple and the time-tempera ture superposition principle (TTSP) was used to - obtain \"master curves\" for the viscoelastic properties. A numerical procedure - was developed for determination of residual stresses and warp age, taking - into consideration the irreversible polymerization shrinkage and boundary - conditions during curing. Warpage was measured experimentally for [06/906] - and [011/30] laminates using the projection moire method and results were - in good agreement with the analytical prediction.", "venue": "", "year": 1992, - "referenceCount": 9, "citationCount": 74, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "external"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1992-06-01", "journal": {"name": "Journal of Composite Materials", "pages": - "883 - 899", "volume": "26"}, "authors": [{"authorId": "2116127578", "name": - "T. Wang"}, {"authorId": "67336429", "name": "I. Daniel"}, {"authorId": "71492449", - "name": "J. Gotro"}]}, {"paperId": "950acbc4974d702123d2b158972ef43b7af1308a", - "externalIds": {"MAG": "2142045284", "DBLP": "journals/corr/abs-quant-ph-0605030", - "ArXiv": "quant-ph/0605030", "DOI": "10.1109/TIT.2007.913263", "CorpusId": - 3205087}, "url": "https://www.semanticscholar.org/paper/950acbc4974d702123d2b158972ef43b7af1308a", - "title": "Strongly Universal Quantum Turing Machines and Invariance of Kolmogorov - Complexity", "abstract": "We show that there exists a universal quantum Turing - machine (UQTM) that can simulate every other QTM until the other QTM has halted - and then halt itself with probability one. This extends work by Bernstein - and Vazirani who have shown that there is a UQTM that can simulate every other - QTM for an arbitrary, but preassigned number of time steps. As a corollary - to this result, we give a rigorous proof that quantum Kolmogorov complexity - as defined by Berthiaume is invariant, i.e., depends on the choice of the - UQTM only up to an additive constant. Our proof is based on a new mathematical - framework for QTMs, including a thorough analysis of their halting behavior. - We introduce the notion of mutually orthogonal halting spaces and show that - the information encoded in an input qubit string can always be effectively - decomposed into a classical and a quantum part.", "venue": "IEEE Transactions - on Information Theory", "year": 2006, "referenceCount": 26, "citationCount": - 28, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-05-02", "journal": {"name": "IEEE Transactions on - Information Theory", "pages": "763-780", "volume": "54"}, "authors": [{"authorId": - "144054002", "name": "Markus P. Mueller"}]}, {"paperId": "b1ab4c50077e3d1c1cbafca9927d732afdd93a6f", - "externalIds": {"MAG": "566340737", "DOI": "10.1021/BK-2004-0869", "CorpusId": - 60004208}, "url": "https://www.semanticscholar.org/paper/b1ab4c50077e3d1c1cbafca9927d732afdd93a6f", - "title": "Nonlinear dynamics in polymeric systems", "abstract": "Despite the - great strides in nonlinear dynamics over the past 40 years, applying nonlinear - dynamics to polymeric systems has not received much attention. This book addresses - this absence by covering present theory, modeling, and experiments of nonlinear - dynamics in polymeric systems. Oscillating chemical reactions, propagating - fronts, far-from equilibrium pattern formation, Turing structures, and chaos - are but some of the exotic phenomena discussed in this book.", "venue": "", - "year": 2003, "referenceCount": 2, "citationCount": 51, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-11-18", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "5602064", - "name": "J. Pojman"}, {"authorId": "1398601999", "name": "Q. Tran\u2010Cong\u2010Miyata"}]}, - {"paperId": "e9e9976b39944fec1653516d58e0a773575453eb", "externalIds": {"MAG": - "2949626026", "ArXiv": "patt-sol/9807002", "DOI": "10.1016/S0167-2789(99)00154-2", - "CorpusId": 11958083}, "url": "https://www.semanticscholar.org/paper/e9e9976b39944fec1653516d58e0a773575453eb", - "title": "Simple and superlattice Turing patterns in reaction-diffusion systems: - bifurcation, bistability, and parameter collapse", "abstract": null, "venue": - "", "year": 1998, "referenceCount": 32, "citationCount": 70, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + 1944, "referenceCount": 17, "citationCount": 427, "influentialCitationCount": + 35, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], + "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, {"category": + "Geology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1944-07-01", "journal": {"name": "Quarterly Journal of the Geological Society + of London", "pages": "119 - 135", "volume": "100"}, "authors": [{"authorId": + "84670610", "name": "A. Skempton"}, {"authorId": "152720820", "name": "O. + T. Jones"}]}, {"paperId": "76755b87a7055ecc81643f1b8ac3bf3f860c4c0c", "externalIds": + {"MAG": "2577347286", "DOI": "10.1007/S11071-016-3317-9", "CorpusId": 125248341}, + "corpusId": 125248341, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/76755b87a7055ecc81643f1b8ac3bf3f860c4c0c", + "title": "Pattern dynamics of a Gierer\u2013Meinhardt model with spatial effects", + "abstract": null, "venue": "", "year": 2017, "referenceCount": 42, "citationCount": + 72, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-07-14", "journal": {"name": - "Physica D: Nonlinear Phenomena", "pages": "45-65", "volume": "136"}, "authors": - [{"authorId": "34045389", "name": "Stephen L. Judd"}, {"authorId": "143665945", - "name": "M. Silber"}]}, {"paperId": "bc6be5f3f1cf582c3613e3c7de6a793947335854", - "externalIds": {"MAG": "2099382052", "DBLP": "conf/ccs/BuchananRSS08", "DOI": - "10.1145/1455770.1455776", "CorpusId": 11176570}, "url": "https://www.semanticscholar.org/paper/bc6be5f3f1cf582c3613e3c7de6a793947335854", - "title": "When good instructions go bad: generalizing return-oriented programming - to RISC", "abstract": "This paper reconsiders the threat posed by Shacham''s - \"return-oriented programming\" -- a technique by which W-xor-X-style hardware - protections are evaded via carefully crafted stack frames that divert control - flow into the middle of existing variable-length x86 instructions -- creating - short new instructions streams that then return. We believe this attack is - both more general and a greater threat than the author appreciated. In fact, - the vulnerability is not limited to the x86 architecture or any particular - operating system, is readily exploitable, and bypasses an entire category - of malware protections. In this paper we demonstrate general return-oriented - programming on the SPARC, a fixed instruction length RISC architecture with - structured control flow. We construct a Turing-complete library of code gadgets - using snippets of the Solaris libc, a general purpose programming language, - and a compiler for constructing return-oriented exploits. Finally, we argue - that the threat posed by return-oriented programming, across all architectures - and systems, has negative implications for an entire class of security mechanisms: - those that seek to prevent malicious computation by preventing the execution - of malicious code.", "venue": "Conference on Computer and Communications Security", - "year": 2008, "referenceCount": 36, "citationCount": 412, "influentialCitationCount": - 33, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2008-10-27", "journal": {"pages": "27-38"}, - "authors": [{"authorId": "153276898", "name": "E. Buchanan"}, {"authorId": - "31923029", "name": "Ryan Roemer"}, {"authorId": "1786752", "name": "H. Shacham"}, - {"authorId": "1727599", "name": "S. Savage"}]}, {"paperId": "75e17a2dc0a2b2c1cce5ab89d8c703fb8bddbef1", - "externalIds": {"ArXiv": "2006.09286", "ACL": "2020.conll-1.37", "DBLP": "journals/corr/abs-2006-09286", - "MAG": "3102041518", "DOI": "10.18653/v1/2020.conll-1.37", "CorpusId": 219708219}, - "url": "https://www.semanticscholar.org/paper/75e17a2dc0a2b2c1cce5ab89d8c703fb8bddbef1", - "title": "On the Computational Power of Transformers and Its Implications - in Sequence Modeling", "abstract": "Transformers are being used extensively - across several sequence modeling tasks. Significant research effort has been - devoted to experimentally probe the inner workings of Transformers. However, - our conceptual and theoretical understanding of their power and inherent limitations - is still nascent. In particular, the roles of various components in Transformers - such as positional encodings, attention heads, residual connections, and feedforward - networks, are not clear. In this paper, we take a step towards answering these - questions. We analyze the computational power as captured by Turing-completeness. - We first provide an alternate and simpler proof to show that vanilla Transformers - are Turing-complete and then we prove that Transformers with only positional - masking and without any positional encoding are also Turing-complete. We further - analyze the necessity of each component for the Turing-completeness of the - network; interestingly, we find that a particular type of residual connection - is necessary. We demonstrate the practical implications of our results via - experiments on machine translation and synthetic tasks.", "venue": "CONLL", - "year": 2020, "referenceCount": 41, "citationCount": 17, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-06-16", "journal": {"pages": "455-475"}, "authors": - [{"authorId": "92954142", "name": "S. Bhattamishra"}, {"authorId": "1443788809", - "name": "Arkil Patel"}, {"authorId": "144260125", "name": "Navin Goyal"}]}, - {"paperId": "74e037c4b2535de492d4f81abc3e0987332cea30", "externalIds": {"ArXiv": - "patt-sol/9806006", "MAG": "2166643003", "DOI": "10.1103/PhysRevE.58.4485", - "CorpusId": 15489301}, "url": "https://www.semanticscholar.org/paper/74e037c4b2535de492d4f81abc3e0987332cea30", - "title": "Turing instability in a boundary-fed system", "abstract": "The formation - of localized structures in the chlorine dioxide-idodine-malonic acid (CDIMA) - reaction-diffusion system is investigated numerically using a realistic model - of this system. We analyze the one-dimensional patterns formed along the gradients - imposed by boundary feeds, and study their linear stability to symmetry-breaking - perturbations (Turing instability) in the plane transverse to these gradients. - We establish that an often-invoked simple local linear analysis that neglects - longitudinal diffusion is inappropriate for predicting the linear stability - of these patterns. Using a fully nonuniform analysis, we investigate the structure - of the patterns formed along the gradients and their stability to transverse - Turing pattern formation as a function of the values of two control parameters: - the malonic acid feed concentration and the size of the reactor in the dimension - along the gradients. The results from this investigation are compared with - existing experiments.", "venue": "", "year": 1998, "referenceCount": 26, "citationCount": - 18, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1998-06-19", "journal": {"name": "Physical Review - E", "pages": "4485-4500", "volume": "58"}, "authors": [{"authorId": "8619758", - "name": "S. Setayeshgar"}, {"authorId": "1784469", "name": "M. Cross"}]}, - {"paperId": "3bd11c810987881f2dc6dfb9f9e5e687c6999783", "externalIds": {"DBLP": - "conf/wirtschaftsinformatik/DiegmannSEB15", "MAG": "634466970", "CorpusId": - 10788853}, "url": "https://www.semanticscholar.org/paper/3bd11c810987881f2dc6dfb9f9e5e687c6999783", + "publicationTypes": null, "publicationDate": "2017-01-17", "journal": {"name": + "Nonlinear Dynamics", "pages": "1385-1396", "volume": "88"}, "authors": [{"authorId": + "47334108", "name": "Gui\u2010Quan Sun"}, {"authorId": "2108709693", "name": + "Cui-Hua Wang"}, {"authorId": "3565752", "name": "Zeyan Wu"}]}, {"paperId": + "3bd11c810987881f2dc6dfb9f9e5e687c6999783", "externalIds": {"DBLP": "conf/wirtschaftsinformatik/DiegmannSEB15", + "MAG": "634466970", "CorpusId": 10788853}, "corpusId": 10788853, "publicationVenue": + {"id": "7d930c15-deaf-4d79-bdc9-578536903860", "name": "Wirtschaftsinformatik", + "type": "journal", "alternate_names": ["Wirtschaftsinformatik und Angewandte + Informatik", "Wirtsch Angew Inform"], "issn": "0937-6429", "alternate_issns": + ["1861-8936"], "url": "https://link.springer.com/journal/11576", "alternate_urls": + ["http://www.bise-journal.org/"]}, "url": "https://www.semanticscholar.org/paper/3bd11c810987881f2dc6dfb9f9e5e687c6999783", "title": "Benefits of Augmented Reality in Educational Environments - A Systematic Literature Review", "abstract": "By augmenting the real world with virtual information, Augmented Reality (AR) provides new possibilities for education. @@ -36149,113 +40452,112 @@ interactions: is needed to investigate the cau- sality between benefits and directions of AR in more detail.", "venue": "Wirtschaftsinformatik", "year": 2015, "referenceCount": 38, "citationCount": 140, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Computer Science", "source": + "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": null, "journal": {"pages": "1542-1556"}, "authors": [{"authorId": + "2121965", "name": "Phil Diegmann"}, {"authorId": "1403054338", "name": "Manuel + Schmidt-Kraepelin"}, {"authorId": "1981764", "name": "S. V. D. Eynden"}, {"authorId": + "3318930", "name": "Dirk Basten"}]}, {"paperId": "92aa5f727b6897485c0349d8b614d11def74b5d1", + "externalIds": {"ArXiv": "1705.08025", "MAG": "2617320940", "DOI": "10.1103/PhysRevLett.119.148301", + "CorpusId": 206300069, "PubMed": "29053314"}, "corpusId": 206300069, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/92aa5f727b6897485c0349d8b614d11def74b5d1", + "title": "Theory of Turing Patterns on Time Varying Networks.", "abstract": + "The process of pattern formation for a multispecies model anchored on a time + varying network is studied. A nonhomogeneous perturbation superposed to an + homogeneous stable fixed point can be amplified following the Turing mechanism + of instability, solely instigated by the network dynamics. By properly tuning + the frequency of the imposed network evolution, one can make the examined + system behave as its averaged counterpart, over a finite time window. This + is the key observation to derive a closed analytical prediction for the onset + of the instability in the time dependent framework. Continuously and piecewise + constant periodic time varying networks are analyzed, setting the framework + for the proposed approach. The extension to nonperiodic settings is also discussed.", + "venue": "Physical Review Letters", "year": 2017, "referenceCount": 56, "citationCount": + 30, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1705.08025", "status": "GREEN"}, "fieldsOfStudy": + ["Medicine", "Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2017-05-22", "journal": {"name": "Physical review letters", "pages": "\n 148301\n ", + "volume": "119 14"}, "authors": [{"authorId": "47425122", "name": "Julien + Petit"}, {"authorId": "3108915", "name": "B. Lauwens"}, {"authorId": "2334449", + "name": "D. Fanelli"}, {"authorId": "1809355", "name": "T. Carletti"}]}, {"paperId": + "1514bdc217b8d85bc11b6ba43baf1f47d8173f83", "externalIds": {"DBLP": "conf/isw/ChowGJZ01", + "MAG": "1569422795", "DOI": "10.1007/3-540-45439-X_10", "CorpusId": 33032569}, + "corpusId": 33032569, "publicationVenue": {"id": "f16aa5de-bdcc-43be-9a80-3079a0600682", + "name": "Information Security Conference", "type": "conference", "alternate_names": + ["Insight Student Conference", "Insight Stud Conf", "Inf Secur Conf", "IEEE + International Smart Cities Conference", "Int Supercomput Conf", "ISC", "International + Supercomputing Conference", "IEEE Int Smart City Conf"], "url": "http://www.wikicfp.com/cfp/program?id=1679"}, + "url": "https://www.semanticscholar.org/paper/1514bdc217b8d85bc11b6ba43baf1f47d8173f83", + "title": "An Approach to the Obfuscation of Control-Flow of Sequential Computer + Programs", "abstract": null, "venue": "Information Security Conference", "year": + 2001, "referenceCount": 16, "citationCount": 139, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-10-01", "journal": {"pages": "144-155"}, "authors": + [{"authorId": "40200941", "name": "Stanley Chow"}, {"authorId": "1711557", + "name": "Y. Gu"}, {"authorId": "145351103", "name": "H. Johnson"}, {"authorId": + "2101058848", "name": "V. Zakharov"}]}, {"paperId": "94471160f13e9771df3199b3684e085729110428", + "externalIds": {"MAG": "2960329149", "CorpusId": 39745939}, "corpusId": 39745939, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/94471160f13e9771df3199b3684e085729110428", + "title": "A Survey of Chabot Systems through a Loebner Prize Competition", + "abstract": "Starting in 1966 with the introduction of the ELIZA chatbot, + a great deal of effort has been devoted towards the goal of developing a chatbot + system that would be able to pass the Turing Test. These efforts have resulted + in the creation of a variety of technologies and have taken a variety of approaches. + In this paper we compare and discuss the different technologies used in the + chatbots which have won the Loebner Prize Competition, the first formal instantiation + of the Turing Test. Although there was no game changing breakthrough in the + chatbot technologies, it is obvious they evolved from the very simple pattern + matching systems towards complicated patterns combined with ontologies and + knowledge bases enabling computer reasoning. Pregled najbolj\u0161ih programov + za klepetanje z ra\u010dunalnikom iz Loebnerjevega tekomovanja Vse od leta + 1966 naprej, ko se je pojavil prvi program za klepet ELIZA, se posku\u0161a + razviti program ki bi bil sposoben opraviti Turingov test. V tem \u010dasu + je bilo razvitih veliko razli\u010dnih re\u0161itev in pristopov k re\u0161evanju + tega kompleksnega problema. V tem \u010dlanku primerjamo in opi\u0161emo pristope + pri programih za klepetanje ki so zmagali na Loebnerjevem tekmovanju. Loebnerjevo + tekmovanje je prva formalna izvedba Turingovega testa in se izvaja \u017ee + vse od leta 1991. Kljub temu, da do danes \u0161e nobenemu programu ni uspelo + prestati testa, so mo\u010dno napredovali. Iz zelo enostavnih algoritmov z + iskanjem vzorcev besedila, so se z leti razvili v kompleksne sisteme prepoznavanja + vzorcev, ki vklju\u010dujejo tudi ontologije in tako do neke mere \u017ee + omogo\u010dajo tudi ra\u010dunalni\u0161ko sklepanje.", "venue": "", "year": + 2012, "referenceCount": 14, "citationCount": 64, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, - "journal": {"pages": "1542-1556"}, "authors": [{"authorId": "2121965", "name": - "Phil Diegmann"}, {"authorId": "1403054338", "name": "Manuel Schmidt-Kraepelin"}, - {"authorId": "1981764", "name": "S. V. D. Eynden"}, {"authorId": "3318930", - "name": "Dirk Basten"}]}, {"paperId": "3e15f730e6603955df7b926971bf0ce64025b616", - "externalIds": {"DBLP": "conf/nips/GrossGLG17", "MAG": "2753347993", "CorpusId": - 4078302}, "url": "https://www.semanticscholar.org/paper/3e15f730e6603955df7b926971bf0ce64025b616", - "title": "Generalizing GANs: A Turing Perspective", "abstract": "Recently, - a new class of machine learning algorithms has emerged, where models and discriminators - are generated in a competitive setting. The most prominent example is Generative - Adversarial Networks (GANs). In this paper we examine how these algorithms - relate to the Turing test, and derive what - from a Turing perspective - can - be considered their defining features. Based on these features, we outline - directions for generalizing GANs - resulting in the family of algorithms referred - to as Turing Learning. One such direction is to allow the discriminators to - interact with the processes from which the data samples are obtained, making - them \"interrogators\", as in the Turing test. We validate this idea using - two case studies. In the first case study, a computer infers the behavior - of an agent while controlling its environment. In the second case study, a - robot infers its own sensor configuration while controlling its movements. - The results confirm that by allowing discriminators to interrogate, the accuracy - of models is improved.", "venue": "NIPS", "year": 2017, "referenceCount": - 31, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2017-12-01", "journal": {"pages": "6316-6326"}, "authors": [{"authorId": - "6586246", "name": "R. Gro\u00df"}, {"authorId": "49986580", "name": "Yue - Gu"}, {"authorId": null, "name": "Wei Li"}, {"authorId": "7836896", "name": - "Melvin Gauci"}]}, {"paperId": "a9a0ba653ac68129e8080569716899eec5d8a1b2", - "externalIds": {"MAG": "1510868674", "ArXiv": "quant-ph/0404146", "CorpusId": - 6349434}, "url": "https://www.semanticscholar.org/paper/a9a0ba653ac68129e8080569716899eec5d8a1b2", - "title": "Measurement-Based Quantum Turing Machines and their Universality", - "abstract": "Quantum measurement is universal for quantum computation. This - universality allows alternative schemes to the traditional three-step organisation - of quantum computation: initial state preparation, unitary transformation, - measurement. In order to formalize these other forms of computation, while - pointing out the role and the necessity of classical control in measurement-based - computation, and for establishing a new upper bound of the minimal resources - needed to quantum universality, a formal model is introduced by means of Measurement-based - Quantum Turing Machines.", "venue": "", "year": 2004, "referenceCount": 18, - "citationCount": 28, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2004-04-26", "journal": {"name": "arXiv: Quantum Physics", - "volume": ""}, "authors": [{"authorId": "2772607", "name": "S. Perdrix"}, - {"authorId": "1829432", "name": "P. Jorrand"}]}, {"paperId": "33f166fc8158a73191369c7dec2a5ac0cd9980f3", - "externalIds": {"ArXiv": "math/0307020", "MAG": "2952963548", "DOI": "10.1093/phisci/axi108", - "CorpusId": 119695336}, "url": "https://www.semanticscholar.org/paper/33f166fc8158a73191369c7dec2a5ac0cd9980f3", - "title": "The Diagonal Method and Hypercomputation", "abstract": "The diagonal - method is often used to show that Turing machines cannot solve their own halting - problem. There have been several recent attempts to show that this method - also exposes either contradiction or arbitrariness in other theoretical models - of computation which claim to be able to solve the halting problem for Turing - machines. We show that such arguments are flawed\u2014a contradiction only - occurs if a type of machine can compute its own diagonal function. We then - demonstrate why such a situation does not occur for the methods of hypercomputation - under attack, and why it is unlikely to occur for any other serious methods. - 1. Introduction2. Issues with specific hypermachines3. Conclusions for hypercomputation - Introduction Issues with specific hypermachines Conclusions for hypercomputation", - "venue": "British Journal for the Philosophy of Science", "year": 2003, "referenceCount": - 18, "citationCount": 34, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2003-07-02", "journal": {"name": "The British Journal for the Philosophy - of Science", "pages": "147 - 156", "volume": "56"}, "authors": [{"authorId": - "46277517", "name": "Toby Ord"}, {"authorId": "2063540", "name": "T. Kieu"}]}, - {"paperId": "2fcd5cff2b4743ea640c4af68bf4143f4a2cccb1", "externalIds": {"DBLP": - "journals/corr/GaoMZHWX15", "MAG": "2963082528", "ArXiv": "1505.05612", "CorpusId": - 209217}, "url": "https://www.semanticscholar.org/paper/2fcd5cff2b4743ea640c4af68bf4143f4a2cccb1", - "title": "Are You Talking to a Machine? Dataset and Methods for Multilingual - Image Question", "abstract": "In this paper, we present the mQA model, which - is able to answer questions about the content of an image. The answer can - be a sentence, a phrase or a single word. Our model contains four components: - a Long Short-Term Memory (LSTM) to extract the question representation, a - Convolutional Neural Network (CNN) to extract the visual representation, an - LSTM for storing the linguistic context in an answer, and a fusing component - to combine the information from the first three components and generate the - answer. We construct a Freestyle Multilingual Image Question Answering (FM-IQA) - dataset to train and evaluate our mQA model. It contains over 150,000 images - and 310,000 freestyle Chinese question-answer pairs and their English translations. - The quality of the generated answers of our mQA model on this dataset is evaluated - by human judges through a Turing Test. Specifically, we mix the answers provided - by humans and our model. The human judges need to distinguish our model from - the human. They will also provide a score (i.e. 0, 1, 2, the larger the better) - indicating the quality of the answer. We propose strategies to monitor the - quality of this evaluation process. The experiments show that in 64.7% of - cases, the human judges cannot distinguish our model from humans. The average - score is 1.454 (1.918 for human). The details of this work, including the - FM-IQA dataset, can be found on the project page: this http URL", "venue": - "NIPS", "year": 2015, "referenceCount": 45, "citationCount": 434, "influentialCitationCount": - 51, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2015-05-21", "journal": {"pages": "2296-2304"}, - "authors": [{"authorId": "2345388", "name": "Haoyuan Gao"}, {"authorId": "36010601", - "name": "Junhua Mao"}, {"authorId": "2108485135", "name": "Jie Zhou"}, {"authorId": - "3109481", "name": "Zhiheng Huang"}, {"authorId": "36547165", "name": "Lei - Wang"}, {"authorId": "145738410", "name": "W. Xu"}]}, {"paperId": "7e71e65a7ae05b107b7d3181a85c8099536d510d", + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "2877011", "name": "Luka Bradesko"}, + {"authorId": "1764321", "name": "D. Mladenic"}]}, {"paperId": "e4bd784c879229853b9195b63c897739db273282", + "externalIds": {"DBLP": "journals/mima/Dodig-Crnkovic11", "MAG": "2097186104", + "DOI": "10.1007/s11023-011-9235-1", "CorpusId": 14741267}, "corpusId": 14741267, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/e4bd784c879229853b9195b63c897739db273282", + "title": "Significance of Models of Computation, from Turing Model to Natural + Computation", "abstract": null, "venue": "Minds and Machines", "year": 2011, + "referenceCount": 118, "citationCount": 71, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-05-01", "journal": + {"name": "Minds and Machines", "pages": "301-322", "volume": "21"}, "authors": + [{"authorId": "1403731773", "name": "G. Dodig-Crnkovic"}]}, {"paperId": "7e71e65a7ae05b107b7d3181a85c8099536d510d", "externalIds": {"MAG": "1982829306", "DOI": "10.1090/S0025-5718-1983-0689479-6", - "CorpusId": 120752828}, "url": "https://www.semanticscholar.org/paper/7e71e65a7ae05b107b7d3181a85c8099536d510d", + "CorpusId": 120752828}, "corpusId": 120752828, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7e71e65a7ae05b107b7d3181a85c8099536d510d", "title": "The determination of the value of Rado\u2019s noncomputable function \u03a3() for four-state Turing machines", "abstract": "The well-defined but noncomputable functions E(k) and S(k) given by T. Rado as the \"score\" and @@ -36290,27 +40592,188 @@ interactions: July 22, 1981; revised June 28, 1982 and September 7, 1982. 1980 Mathematics Subject Classification. Primary 03D10, 03B35; Secondary 68C30, 68D20.", "venue": "", "year": 1983, "referenceCount": 5, "citationCount": 61, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/mcom/1983-40-162/S0025-5718-1983-0689479-6/S0025-5718-1983-0689479-6.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Mathematics of Computation", "pages": "647-665", "volume": "40"}, "authors": [{"authorId": "47192182", "name": "Allen H. Brady"}]}, - {"paperId": "a4502fd453287508c7729ee6a1e240c9818ff7f7", "externalIds": {"MAG": - "2034130287", "DOI": "10.1007/s11255-007-9273-z", "CorpusId": 11465576, "PubMed": - "17899434"}, "url": "https://www.semanticscholar.org/paper/a4502fd453287508c7729ee6a1e240c9818ff7f7", + {"paperId": "29ebb0b3e83636f97e4324b6957dc0bd4a640ded", "externalIds": {"CorpusId": + 207780595}, "corpusId": 207780595, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/29ebb0b3e83636f97e4324b6957dc0bd4a640ded", + "title": "Turing Patterns in CNNs-Part I : Once Over Lightly", "abstract": + "Abstruct-The aim of this three part tutorial is to focus the reader\u2019s + attention to a new exciting behavior of a particular class of cellular neural + networks (CNNs): Turing pattern formation in two-grid coupled CNNs. We first + analyze the reduced Chua\u2019s circuit as the basic cell for the two-grid + coupled CNNs capable of producing Turing patterns. We use a nonstandard normalization + to derive a dimensionless state equation of the individual cell. Then, we + present an intuitive explanation of Turing pattern formation mechanism for + a 1-D two-grid coupled array in relation to the original mechanism proposed + by Turing. Finally, we derive the first two conditions for Turing pattern + formation, discuss the boundary conditions, and illustrate via an example + on how the number of the equilibrium points of a CNN increases rapidly even + though each isolated cell has only one equilibrium point. This study is continued + in the next two parts of this tutorial where analytical derivations and various + computer simulation results are presented as well.", "venue": "", "year": + 2004, "referenceCount": 6, "citationCount": 17, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId": + "92057486", "name": "Liviu"}]}, {"paperId": "a4502fd453287508c7729ee6a1e240c9818ff7f7", + "externalIds": {"MAG": "2034130287", "DOI": "10.1007/s11255-007-9273-z", "CorpusId": + 11465576, "PubMed": "17899434"}, "corpusId": 11465576, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a4502fd453287508c7729ee6a1e240c9818ff7f7", "title": "Transurethral resection of ejaculatory ducts in the treatment of complete ejaculatory duct obstruction", "abstract": null, "venue": "International Urology and Nephrology", "year": 2007, "referenceCount": 19, "citationCount": - 24, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "International Urology and Nephrology", - "pages": "369-372", "volume": "40"}, "authors": [{"authorId": "11789674", - "name": "T. Yurdakul"}, {"authorId": "152410177", "name": "Gurhan Gokce"}, - {"authorId": "3908292", "name": "O. Kili\u00e7"}, {"authorId": "5885104", - "name": "M. M. Pi\u015fkin"}]}, {"paperId": "a5f4cdc694668b62f8f50df705adf0960869c326", + 24, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "International Urology and Nephrology", "pages": "369-372", "volume": + "40"}, "authors": [{"authorId": "11789674", "name": "T. Yurdakul"}, {"authorId": + "152410177", "name": "Gurhan Gokce"}, {"authorId": "3908292", "name": "O. + Kili\u00e7"}, {"authorId": "5885104", "name": "M. M. Pi\u015fkin"}]}, {"paperId": + "774660f5d1b32e97e8beeffb0e03d7196e843fa9", "externalIds": {"MAG": "33970249", + "DOI": "10.1557/JMR.2001.0190", "CorpusId": 56442709}, "corpusId": 56442709, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/774660f5d1b32e97e8beeffb0e03d7196e843fa9", + "title": "Metal-organic vapor phase epitaxial growth of high-quality ZnO films + on Al 2 O 3 (00?1)", "abstract": "(00?1)substrates using low-pressure metalorganic + vapor phase epitaxy. The reactants for thegrowth were diethylzinc and oxygen. + Growth temperature, one of the importantexperimental parameters for epitaxial + layers, was optimized. The films grown at500 \u00b0C exhibited good crystallinity + and strong ultraviolet absorption and emission.Photoluminescence spectra of + the films showed a dominant excitonic emission with aweak deep level emission. + More importantly, a strong stimulated emission peak wasobserved even at room + temperature.I. INTRODUCTIONMuch attention has been paid recently to ZnO forshort-wavelength + photonic device applications since ithas a direct band gap energy of 3.3 eV + at room tempera-ture.", "venue": "", "year": 2001, "referenceCount": 17, "citationCount": + 73, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://s-space.snu.ac.kr/bitstream/10371/5353/1/20010501-JMR.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Materials Science", "Engineering"], + "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, + {"category": "Engineering", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2001-05-01", "journal": {"name": "Journal of Materials Research", "pages": + "1358-1362", "volume": "16"}, "authors": [{"authorId": "3854784", "name": + "W. Park"}, {"authorId": "47237977", "name": "S. An"}, {"authorId": "6662068", + "name": "G. Yi"}, {"authorId": "6816929", "name": "H. M. Jang"}]}, {"paperId": + "b2910cd5825051d2fdbb2648ddab1d73a961fb25", "externalIds": {"MAG": "2082681875", + "DOI": "10.1103/PHYSREVE.69.046205", "CorpusId": 32020219, "PubMed": "15169088"}, + "corpusId": 32020219, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b2910cd5825051d2fdbb2648ddab1d73a961fb25", + "title": "Control of Turing pattern formation by delayed feedback.", "abstract": + "The effect of the global delayed feedback technique on Turing pattern formation + is investigated in the modified Lengyel-Epstein two-variable model. Feedback + intensity, delay time, and feedback-imposing time (the period of time that + feedback is present in the system) are all found to be of significant influence + on Turing pattern formation time. Under appropriate parameter settings, delayed + feedback could suppress or induce the Turing pattern if the feedback intensity + is strong enough.", "venue": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "year": 2004, "referenceCount": 0, "citationCount": + 14, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2004-04-01", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 046205\n ", + "volume": "69 4 Pt 2"}, "authors": [{"authorId": "2117124639", "name": "Q. + Li"}, {"authorId": "2106515856", "name": "Lin Ji"}]}, {"paperId": "8a237767cf61f2747065bcfd9fbf0a8b7e2462bc", + "externalIds": {"DBLP": "journals/corr/Abrahao16a", "MAG": "2554312410", "ArXiv": + "1612.07400", "DOI": "10.1142/9789813109032_0001", "CorpusId": 14086860}, + "corpusId": 14086860, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8a237767cf61f2747065bcfd9fbf0a8b7e2462bc", + "title": "The \"paradox\" of computability and a recursive relative version + of the Busy Beaver function", "abstract": "In this article, we will show that + uncomputability is a relative property not only of oracle Turing machines, + but also of subrecursive classes. We will define the concept of a Turing submachine, + and a recursive relative version for the Busy Beaver function which we will + call Busy Beaver Plus function. Therefore, we will prove that the computable + Busy Beaver Plus function defined on any Turing submachine is not computable + by any program running on this submachine. We will thereby demonstrate the + existence of a \"paradox\" of computability a la Skolem: a function is computable + when \"seen from the outside\" the subsystem, but uncomputable when \"seen + from within\" the same subsystem. Finally, we will raise the possibility of + defining universal submachines, and a hierarchy of negative Turing degrees.", + "venue": "ArXiv", "year": 2016, "referenceCount": 26, "citationCount": 17, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1612.07400", "status": "GREEN"}, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2016-12-22", "journal": {"name": "ArXiv", + "volume": "abs/1612.07400"}, "authors": [{"authorId": "7918278", "name": "Felipe + S. Abrah\u00e3o"}]}, {"paperId": "75e17a2dc0a2b2c1cce5ab89d8c703fb8bddbef1", + "externalIds": {"ArXiv": "2006.09286", "ACL": "2020.conll-1.37", "DBLP": "journals/corr/abs-2006-09286", + "MAG": "3102041518", "DOI": "10.18653/v1/2020.conll-1.37", "CorpusId": 219708219}, + "corpusId": 219708219, "publicationVenue": {"id": "3779a5a7-9119-4f69-84fe-f7eef193eb49", + "name": "Conference on Computational Natural Language Learning", "type": "conference", + "alternate_names": ["CoNLL", "Conf Comput Nat Lang Learn"]}, "url": "https://www.semanticscholar.org/paper/75e17a2dc0a2b2c1cce5ab89d8c703fb8bddbef1", + "title": "On the Computational Power of Transformers and Its Implications + in Sequence Modeling", "abstract": "Transformers are being used extensively + across several sequence modeling tasks. Significant research effort has been + devoted to experimentally probe the inner workings of Transformers. However, + our conceptual and theoretical understanding of their power and inherent limitations + is still nascent. In particular, the roles of various components in Transformers + such as positional encodings, attention heads, residual connections, and feedforward + networks, are not clear. In this paper, we take a step towards answering these + questions. We analyze the computational power as captured by Turing-completeness. + We first provide an alternate and simpler proof to show that vanilla Transformers + are Turing-complete and then we prove that Transformers with only positional + masking and without any positional encoding are also Turing-complete. We further + analyze the necessity of each component for the Turing-completeness of the + network; interestingly, we find that a particular type of residual connection + is necessary. We demonstrate the practical implications of our results via + experiments on machine translation and synthetic tasks.", "venue": "Conference + on Computational Natural Language Learning", "year": 2020, "referenceCount": + 41, "citationCount": 17, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.aclweb.org/anthology/2020.conll-1.37.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2020-06-16", "journal": {"pages": "455-475"}, "authors": + [{"authorId": "92954142", "name": "S. Bhattamishra"}, {"authorId": "1443788809", + "name": "Arkil Patel"}, {"authorId": "144260125", "name": "Navin Goyal"}]}, + {"paperId": "0c35496bc1593434d17cc778db1dcc4ff83af6d5", "externalIds": {"DBLP": + "journals/ais/WarwickS16", "MAG": "2062407826", "DOI": "10.1007/s00146-013-0534-3", + "CorpusId": 18207951}, "corpusId": 18207951, "publicationVenue": {"id": "fa373f62-4acc-47e8-b0b8-0ca4cd4394e6", + "name": "Ai & Society", "type": "journal", "alternate_names": ["Ai Soc"]}, + "url": "https://www.semanticscholar.org/paper/0c35496bc1593434d17cc778db1dcc4ff83af6d5", + "title": "Effects of lying in practical Turing tests", "abstract": null, "venue": + "Ai & Society", "year": 2016, "referenceCount": 23, "citationCount": 18, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2016-02-01", "journal": {"name": "AI + & SOCIETY", "pages": "5-15", "volume": "31"}, "authors": [{"authorId": "143636026", + "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma Shah"}]}, {"paperId": + "43f48fa9f7e010b2c16b501c2b4c546360e7fe73", "externalIds": {"MAG": "1970194302", + "DOI": "10.1103/PHYSREVE.87.042719", "CorpusId": 6713870, "PubMed": "23679461"}, + "corpusId": 6713870, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43f48fa9f7e010b2c16b501c2b4c546360e7fe73", + "title": "Noise-induced temporal dynamics in Turing systems.", "abstract": + "We examine the ability of intrinsic noise to produce complex temporal dynamics + in Turing pattern formation systems, with particular emphasis on the Schnakenberg + kinetics. Using power spectral methods, we characterize the behavior of the + system using stochastic simulations at a wide range of points in parameter + space and compare with analytical approximations. Specifically, we investigate + whether polarity switching of stochastic patterns occurs at a defined frequency. + We find that it can do so in individual realizations of a stochastic simulation, + but that the frequency is not defined consistently across realizations in + our samples of parameter space. Further, we examine the effect of noise on + deterministically predicted traveling waves and find them increased in amplitude + and decreased in speed.", "venue": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "year": 2013, "referenceCount": 0, "citationCount": + 19, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ora.ox.ac.uk/objects/uuid:758e3113-b61a-4863-bee5-f88a87e800b3/download_file?safe_filename=schumacher.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-04-25", "journal": + {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "pages": "\n 042719\n ", "volume": "87 4"}, "authors": [{"authorId": + "3077300", "name": "L. Schumacher"}, {"authorId": "6566804", "name": "T. Woolley"}, + {"authorId": "35275545", "name": "R. Baker"}]}, {"paperId": "a5f4cdc694668b62f8f50df705adf0960869c326", "externalIds": {"MAG": "2745586317", "DOI": "10.17741/BGSF/52.1.004", "CorpusId": - 67844588}, "url": "https://www.semanticscholar.org/paper/a5f4cdc694668b62f8f50df705adf0960869c326", + 67844588}, "corpusId": 67844588, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a5f4cdc694668b62f8f50df705adf0960869c326", "title": "Komatiitic and tholeiitic metavolcanics of the Siivikkovaara area in the Archean Kuhmo greenstone belt, eastern Finland", "abstract": "HANSKI, EERO 1980: Komati i t ic and tholeiitic metavolcanics of the Si ivikkovaara @@ -36343,547 +40806,149 @@ interactions: Group. Despite the relat ively low MgO content of the komati i tes in the Si ivikkovaara Format ion, two nickel-copper occurences have been found in the format ion.", "venue": "", "year": 1980, "referenceCount": 141, "citationCount": - 31, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, - {"category": "Geology", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1980-06-01", "journal": {"name": "Bulletin of The Geological - Society of Finland", "pages": "67-100", "volume": "52"}, "authors": [{"authorId": - "33633268", "name": "E. Hanski"}]}, {"paperId": "94471160f13e9771df3199b3684e085729110428", - "externalIds": {"MAG": "2960329149", "CorpusId": 39745939}, "url": "https://www.semanticscholar.org/paper/94471160f13e9771df3199b3684e085729110428", - "title": "A Survey of Chabot Systems through a Loebner Prize Competition", - "abstract": "Starting in 1966 with the introduction of the ELIZA chatbot, - a great deal of effort has been devoted towards the goal of developing a chatbot - system that would be able to pass the Turing Test. These efforts have resulted - in the creation of a variety of technologies and have taken a variety of approaches. - In this paper we compare and discuss the different technologies used in the - chatbots which have won the Loebner Prize Competition, the first formal instantiation - of the Turing Test. Although there was no game changing breakthrough in the - chatbot technologies, it is obvious they evolved from the very simple pattern - matching systems towards complicated patterns combined with ontologies and - knowledge bases enabling computer reasoning. Pregled najbolj\u0161ih programov - za klepetanje z ra\u010dunalnikom iz Loebnerjevega tekomovanja Vse od leta - 1966 naprej, ko se je pojavil prvi program za klepet ELIZA, se posku\u0161a - razviti program ki bi bil sposoben opraviti Turingov test. V tem \u010dasu - je bilo razvitih veliko razli\u010dnih re\u0161itev in pristopov k re\u0161evanju - tega kompleksnega problema. V tem \u010dlanku primerjamo in opi\u0161emo pristope - pri programih za klepetanje ki so zmagali na Loebnerjevem tekmovanju. Loebnerjevo - tekmovanje je prva formalna izvedba Turingovega testa in se izvaja \u017ee - vse od leta 1991. Kljub temu, da do danes \u0161e nobenemu programu ni uspelo - prestati testa, so mo\u010dno napredovali. Iz zelo enostavnih algoritmov z - iskanjem vzorcev besedila, so se z leti razvili v kompleksne sisteme prepoznavanja - vzorcev, ki vklju\u010dujejo tudi ontologije in tako do neke mere \u017ee - omogo\u010dajo tudi ra\u010dunalni\u0161ko sklepanje.", "venue": "", "year": - 2012, "referenceCount": 14, "citationCount": 63, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2877011", - "name": "Luka Bradesko"}, {"authorId": "1764321", "name": "D. Mladenic"}]}, - {"paperId": "35ba8e09d7fff9139c52be7c07e429fd643ddf82", "externalIds": {"MAG": - "2083075751", "DOI": "10.1016/0022-5193(79)90011-0", "CorpusId": 28564771, - "PubMed": "439913"}, "url": "https://www.semanticscholar.org/paper/35ba8e09d7fff9139c52be7c07e429fd643ddf82", - "title": "Turing''s conditions and the analysis of morphogenetic models.", - "abstract": null, "venue": "Journal of Theoretical Biology", "year": 1979, - "referenceCount": 11, "citationCount": 33, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1979-02-21", "journal": {"name": "Journal - of theoretical biology", "pages": "\n 419-36\n ", "volume": - "76 4"}, "authors": [{"authorId": "5446744", "name": "T. Lacalli"}, {"authorId": - "2984636", "name": "L. G. Harrison"}]}, {"paperId": "bffe108baa47d9fc94329b0ea7568281d4dbed18", - "externalIds": {"MAG": "2086086086", "DOI": "10.1007/BF00169566", "CorpusId": - 123301064}, "url": "https://www.semanticscholar.org/paper/bffe108baa47d9fc94329b0ea7568281d4dbed18", - "title": "Turing bifurcations with a temporally varying diffusion coefficient", - "abstract": null, "venue": "", "year": 1995, "referenceCount": 15, "citationCount": - 29, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1995-12-01", "journal": {"name": "Journal of Mathematical - Biology", "pages": "295-308", "volume": "33"}, "authors": [{"authorId": "1890610", - "name": "J. Sherratt"}]}, {"paperId": "c0d2e193f4efa95b2b053db6a86f2190989dedb9", - "externalIds": {"MAG": "190787757", "DOI": "10.1142/S1793524514500478", "CorpusId": - 117691862}, "url": "https://www.semanticscholar.org/paper/c0d2e193f4efa95b2b053db6a86f2190989dedb9", - "title": "Spatial pattern in a diffusive predator\u2013prey model with sigmoid - ratio-dependent functional response", "abstract": "In this paper, spatial - patterns of a diffusive predator\u2013prey model with sigmoid (Holling type - III) ratio-dependent functional response which concerns the influence of logistic - population growth in prey and intra-species competition among predators are - investigated. The (local and global) asymptotic stability behavior of the - corresponding non-spatial model around the unique positive interior equilibrium - point in homogeneous steady state is obtained. In addition, we derive the - conditions for Turing instability and the consequent parametric Turing space - in spatial domain. The results of spatial pattern analysis through numerical - simulations are depicted and analyzed. Furthermore, we perform a series of - numerical simulations and find that the proposed model dynamics exhibits complex - pattern replication. The feasible results obtained in this paper indicate - that the effect of diffusion in Turing instability plays an important role - to understand better the pattern formation in ecosystem.", "venue": "", "year": - 2014, "referenceCount": 46, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-08-20", - "journal": {"name": "International Journal of Biomathematics", "pages": "1450047", - "volume": "07"}, "authors": [{"authorId": "2323903", "name": "L. N. Guin"}, - {"authorId": "32540390", "name": "P. K. Mandal"}]}, {"paperId": "2bb861fc09912a56aed0c652e9b764edba56bb0c", - "externalIds": {"PubMedCentral": "7463233", "MAG": "3082760180", "DOI": "10.1038/s41467-020-18073-9", - "CorpusId": 221466963, "PubMed": "32873773"}, "url": "https://www.semanticscholar.org/paper/2bb861fc09912a56aed0c652e9b764edba56bb0c", - "title": "Transforming machine translation: a deep learning system reaches - news translation quality comparable to human professionals", "abstract": null, - "venue": "Nature Communications", "year": 2020, "referenceCount": 44, "citationCount": - 133, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2020-09-01", "journal": {"name": "Nature - Communications", "volume": "11"}, "authors": [{"authorId": "3209310", "name": - "M. Popel"}, {"authorId": "2636731", "name": "M. Tomkov\u00e1"}, {"authorId": - "2542303", "name": "J. Tomek"}, {"authorId": "69894932", "name": "\u0141ukasz - Kaiser"}, {"authorId": "39328010", "name": "Jakob Uszkoreit"}, {"authorId": - "143832874", "name": "Ondrej Bojar"}, {"authorId": "2468732", "name": "Z. - \u017dabokrtsk\u00fd"}]}, {"paperId": "2d6a410789cca1267f6ad69a6623348e67183911", - "externalIds": {"MAG": "2106978100", "DOI": "10.1111/j.1471-4159.1984.tb06690.x", - "CorpusId": 14613831, "PubMed": "6427410"}, "url": "https://www.semanticscholar.org/paper/2d6a410789cca1267f6ad69a6623348e67183911", - "title": "The Relationship Between Arachidonic Acid Release and Catecholamine - Secretion from Cultured Bovine Adrenal Chromaffin Cells", "abstract": "Abstract: - Increased arachidonic acid release occurred during activation of catecholamine - secretion from cul\u2010 tured bovine adrenal medullary chromaffin cells. - The nicotinic agonist l,l\u2010dimethyl\u20104\u2010phenylpiperazinium (DMPP) - caused an increased release of prcincubated [3H]arachidonic acid over a time - course which corre\u2010 sponded to the stimulation of catecholamine secretion. - Like catecholamine secretion, the DMPP\u2010induced [3H]arachidonic acid release - was calcium\u2010dependent and was blocked by the nicotinic antagonist mecamylamine. - Depolarization by elevated K +, which induced catechol amine secretion, also - stimulated arachidonic acid release. Because arachidonic acid release from - cells probably re\u2010 sults from phospholipase A2 activity, our findings - indicate that phospholipase A2 may be activated in chromaffin cells during - secretion.", "venue": "Journal of Neurochemistry", "year": 1984, "referenceCount": - 14, "citationCount": 73, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1984-07-01", "journal": {"name": "Journal of Neurochemistry", "volume": "43"}, - "authors": [{"authorId": "2196177017", "name": "Roy A. Frye"}, {"authorId": - "3139937", "name": "R. Holz"}]}, {"paperId": "fd98aa8433afef1af7e25d8106726e43ecb3c163", - "externalIds": {"MAG": "2001226073", "DOI": "10.1177/048661347801000304", - "CorpusId": 153416134}, "url": "https://www.semanticscholar.org/paper/fd98aa8433afef1af7e25d8106726e43ecb3c163", - "title": "Two Sources of Uneven Development Under Advanced Capitalism: Spatial - Differentiation and Capital Mobility", "abstract": "Although capitalist penetration - results in a certain regional con vergence, uneven development does not disappear - under advanced capitalist conditions. Two sources of geographic unevenness - are spatial differentiation and capital mobility. Differentiation produces - a spatial mosaic in which the pieces are neither equal, autonomous, nor properly - considered \"underdeveloped.\" Mobil ity of capital means that capital may - use location as a strategy against labor, local development becomes more dependent - on outside capital, development comes and goes over time(\"Boomtownism\") - and capital generates a permanent reserve of stagnant places \u2014 a lumpengeography - of capital. These processes of uneven development are not principally owing - to flows of surplus value but to the struc turing of places as use-values - for capital, nor are the results particularly suscept ible to traditional - regional development policies. Labor''s appropriate strategies are several, - but must be aimed at finding an alternative to capitalist development not - toward a misguided effort to redress geographic differences.", "venue": "", - "year": 1978, "referenceCount": 32, "citationCount": 133, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "Economics", + 31, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", + "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1980-06-01", "journal": {"name": + "Bulletin of The Geological Society of Finland", "pages": "67-100", "volume": + "52"}, "authors": [{"authorId": "33633268", "name": "E. Hanski"}]}, {"paperId": + "4ec826ea1e4e36ee56bbbb7de90957594b92cb96", "externalIds": {"MAG": "2050534548", + "DOI": "10.1177/002199839202600606", "CorpusId": 135722311}, "corpusId": 135722311, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4ec826ea1e4e36ee56bbbb7de90957594b92cb96", + "title": "Thermoviscoelastic Analysis of Residual Stresses and Warpage in + Composite Laminates", "abstract": "Linear thermoviscoelastic lamination theory + was used to determine resid ual stresses and warpage in multidirectional woven-glass/epoxy + laminates. The single \"unidirectional\" layer of the material was characterized + by means of an accelerated proce dure. The material was assumed to be thermorheologically + simple and the time-tempera ture superposition principle (TTSP) was used to + obtain \"master curves\" for the viscoelastic properties. A numerical procedure + was developed for determination of residual stresses and warp age, taking + into consideration the irreversible polymerization shrinkage and boundary + conditions during curing. Warpage was measured experimentally for [06/906] + and [011/30] laminates using the projection moire method and results were + in good agreement with the analytical prediction.", "venue": "", "year": 1992, + "referenceCount": 9, "citationCount": 74, "influentialCitationCount": 1, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1978-10-01", "journal": {"name": "Review of Radical Political Economics", - "pages": "28 - 38", "volume": "10"}, "authors": [{"authorId": "66277007", - "name": "Richard Walker"}]}, {"paperId": "8a237767cf61f2747065bcfd9fbf0a8b7e2462bc", - "externalIds": {"DBLP": "journals/corr/Abrahao16a", "MAG": "2554312410", "ArXiv": - "1612.07400", "DOI": "10.1142/9789813109032_0001", "CorpusId": 14086860}, - "url": "https://www.semanticscholar.org/paper/8a237767cf61f2747065bcfd9fbf0a8b7e2462bc", - "title": "The \"paradox\" of computability and a recursive relative version - of the Busy Beaver function", "abstract": "In this article, we will show that - uncomputability is a relative property not only of oracle Turing machines, - but also of subrecursive classes. We will define the concept of a Turing submachine, - and a recursive relative version for the Busy Beaver function which we will - call Busy Beaver Plus function. Therefore, we will prove that the computable - Busy Beaver Plus function defined on any Turing submachine is not computable - by any program running on this submachine. We will thereby demonstrate the - existence of a \"paradox\" of computability a la Skolem: a function is computable - when \"seen from the outside\" the subsystem, but uncomputable when \"seen - from within\" the same subsystem. Finally, we will raise the possibility of - defining universal submachines, and a hierarchy of negative Turing degrees.", - "venue": "ArXiv", "year": 2016, "referenceCount": 26, "citationCount": 17, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2016-12-22", "journal": {"name": "ArXiv", - "volume": "abs/1612.07400"}, "authors": [{"authorId": "7918278", "name": "Felipe - S. Abrah\u00e3o"}]}, {"paperId": "c5314c77897bedd60909f4bd8648113e076e2b2f", - "externalIds": {"MAG": "2057738059", "DOI": "10.1063/1.467185", "CorpusId": - 97589588}, "url": "https://www.semanticscholar.org/paper/c5314c77897bedd60909f4bd8648113e076e2b2f", - "title": "Interaction of Turing and flow-induced chemical instabilities", - "abstract": "The interaction between the Turing instability and the instability - induced by a differential flow is studied in the Selkov model. Both instabilities - give rise to the formation of spatial patterns, and for a range of parameter - values, these patterns can compete. The effect of anisotropic diffusion on - the pattern formation process is investigated. Stripes with different orientations - that travel with time and the suppression of patterns due to a competition - of both instabilities are observed.", "venue": "", "year": 1994, "referenceCount": - 15, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1994-04-01", "journal": {"name": - "Journal of Chemical Physics", "pages": "5211-5218", "volume": "100"}, "authors": - [{"authorId": "4496756", "name": "S. Dawson"}, {"authorId": "1774400", "name": - "A. Lawniczak"}, {"authorId": "2433318", "name": "R. Kapral"}]}, {"paperId": - "47e3ae7e0b26f27149d985671ae4f6eb94415ba6", "externalIds": {"DBLP": "journals/tcs/AspertiR15", - "MAG": "2118758698", "DOI": "10.1016/J.TCS.2015.07.013", "CorpusId": 17858799}, - "url": "https://www.semanticscholar.org/paper/47e3ae7e0b26f27149d985671ae4f6eb94415ba6", - "title": "A formalization of multi-tape Turing machines", "abstract": null, - "venue": "Theoretical Computer Science", "year": 2015, "referenceCount": 43, - "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, + "1992-06-01", "journal": {"name": "Journal of Composite Materials", "pages": + "883 - 899", "volume": "26"}, "authors": [{"authorId": "2116127578", "name": + "T. Wang"}, {"authorId": "67336429", "name": "I. Daniel"}, {"authorId": "71492449", + "name": "J. Gotro"}]}, {"paperId": "b88ba40ba807cf2eb63ceaba5ea38f7d85e1ce8d", + "externalIds": {"MAG": "2120055819", "DOI": "10.1073/pnas.0904433106", "CorpusId": + 6087819, "PubMed": "19528651"}, "corpusId": 6087819, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/b88ba40ba807cf2eb63ceaba5ea38f7d85e1ce8d", + "title": "Darwin''s \u201cstrange inversion of reasoning\u201d", "abstract": + "Darwin''s theory of evolution by natural selection unifies the world of physics + with the world of meaning and purpose by proposing a deeply counterintuitive + \u201cinversion of reasoning\u201d (according to a 19th century critic): \u201cto + make a perfect and beautiful machine, it is not requisite to know how to make + it\u201d [MacKenzie RB (1868) (Nisbet & Co., London)]. Turing proposed a similar + inversion: to be a perfect and beautiful computing machine, it is not requisite + to know what arithmetic is. Together, these ideas help to explain how we human + intelligences came to be able to discern the reasons for all of the adaptations + of life, including our own.", "venue": "Proceedings of the National Academy + of Sciences", "year": 2009, "referenceCount": 36, "citationCount": 74, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.pnas.org/content/106/Supplement_1/10061.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "2009-06-16", "journal": + {"name": "Proceedings of the National Academy of Sciences", "pages": "10061 + - 10065", "volume": "106"}, "authors": [{"authorId": "3329205", "name": "D. + Dennett"}]}, {"paperId": "4e39f11da3b0af4876d48fd66604ecbf4819719f", "externalIds": + {"MAG": "2329961282", "DOI": "10.1103/PHYSREVLETT.108.244101", "CorpusId": + 13914692, "PubMed": "23004274"}, "corpusId": 13914692, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/4e39f11da3b0af4876d48fd66604ecbf4819719f", + "title": "Photonic nonlinear transient computing with multiple-delay wavelength + dynamics.", "abstract": "We report on the experimental demonstration of a + hybrid optoelectronic neuromorphic computer based on a complex nonlinear wavelength + dynamics including multiple delayed feedbacks with randomly defined weights. + This neuromorphic approach is based on a new paradigm of a brain-inspired + computational unit, intrinsically differing from Turing machines. This recent + paradigm consists in expanding the input information to be processed into + a higher dimensional phase space, through the nonlinear transient response + of a complex dynamics excited by the input information. The computed output + is then extracted via a linear separation of the transient trajectory in the + complex phase space. The hyperplane separation is derived from a learning + phase consisting of the resolution of a regression problem. The processing + capability originates from the nonlinear transient, resulting in nonlinear + transient computing. The computational performance is successfully evaluated + on a standard benchmark test, namely, a spoken digit recognition task.", "venue": + "Physical Review Letters", "year": 2012, "referenceCount": 19, "citationCount": + 136, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://hal.archives-ouvertes.fr/hal-00932456/file/Photonic_Nonlinear_Transient_Computing_2012_auteur.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-06-15", "journal": + {"name": "Physical review letters", "pages": "\n 244101\n ", + "volume": "108 24"}, "authors": [{"authorId": "5895321", "name": "R. Martinenghi"}, + {"authorId": "144535778", "name": "S. Rybalko"}, {"authorId": "143753357", + "name": "M. Jacquot"}, {"authorId": "5948493", "name": "Y. Chembo"}, {"authorId": + "1760452", "name": "L. Larger"}]}, {"paperId": "e2eed3da004ece7f709646c5c9b4410eb164a7f3", + "externalIds": {"MAG": "1966312936", "DOI": "10.1056/NEJM196405282702203", + "CorpusId": 38527767, "PubMed": "14129061"}, "corpusId": 38527767, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e2eed3da004ece7f709646c5c9b4410eb164a7f3", + "title": "HEPATOLENTICULAR DEGENERATION (WILSON''S DISEASE). TWO DIFFERENT + COMPONENTS.", "abstract": "WILSON''S disease has for a long time been of particular + interest to the neurologist because it exemplifies a specific metabolic disorder + involving some special relation between hepatic cirrhosis and degeneration + of the brain. The special fea tures of this relation have become of greater + interest in recent years in the light of increasing knowledge of brain damage + in hepatic coma and hepatic encephalopathy, in association with more common + types of hepatic cirrhosis. Two different syndromes were originally described, + those of pseudosclerosis described by Westphal1 in 1883 and the juvenile form, + called \"progressive lenticular degeneration\" by Wilson2 in 1913. Since the + .\u00a0.\u00a0.", "venue": "The New England journal of medicine", "year": + 1964, "referenceCount": 13, "citationCount": 72, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1964-05-28", "journal": + {"name": "The New England journal of medicine", "pages": "\n 1149-56\n ", + "volume": "270"}, "authors": [{"authorId": "17082299", "name": "D. Denny-Brown"}]}, + {"paperId": "a113a876a437646b5e8933e521b0d6a3131726d7", "externalIds": {"DBLP": + "conf/stacs/Indyk95", "MAG": "1533739098", "DOI": "10.1007/3-540-59042-0_85", + "CorpusId": 12760910}, "corpusId": 12760910, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a113a876a437646b5e8933e521b0d6a3131726d7", + "title": "Optimal Simulation of Automata by Neural Nets", "abstract": null, + "venue": "STACS", "year": 1995, "referenceCount": 14, "citationCount": 52, + "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2015-10-25", "journal": {"name": "Theor. Comput. Sci.", "pages": "23-42", - "volume": "603"}, "authors": [{"authorId": "1795634", "name": "A. Asperti"}, - {"authorId": "1775891", "name": "W. Ricciotti"}]}, {"paperId": "73c218cbfcab84124f5cd8079f450a065d520069", - "externalIds": {"MAG": "1991170403", "DOI": "10.1086/341843", "CorpusId": - 16403999}, "url": "https://www.semanticscholar.org/paper/73c218cbfcab84124f5cd8079f450a065d520069", - "title": "Quantum Speed\u2010up of Computations", "abstract": "Wolfram\u2019s - thesis consists of two parts: (a) Any physical system can be simulated (to - any degree of approximation) by a universal Turing machine (b) Complexity - bounds on Turing machine simulations have physical significance. For example, - suppose that the computation of the minimum energy of some system of n particles - takes at least exponentially (in n) many steps. Then the relaxation time of - the actual physical system to its minimum energy state will also take exponential - time. An even more extreme formulation of (more or less) the same thesis is - due to Aharonov (1998): A probabilistic Turing machine can simulate any reasonable - physical device in polynomial cost. She calls this The Modern Church Thesis. - Aharonov refers here to probabilistic Turing machines that use random numbers - in addition to the usual deterministic table of steps. It seems that such - machines are capable to perform certain tasks faster than fully deterministic - machines. The most famous randomized algorithm of that kind concerns the decision - whether a given natural number is prime. A probabilistic algorithm that decides - primality in a number of", "venue": "Philosophia Scienti\u00e6", "year": 2002, - "referenceCount": 30, "citationCount": 23, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2002-09-01", "journal": {"name": "Philosophy of Science", "pages": "S168 - - S177", "volume": "69"}, "authors": [{"authorId": "3341037", "name": "I. - Pitowsky"}]}, {"paperId": "4abfb20a0ddc7207039377d36e1f4fd6c09b8215", "externalIds": - {"MAG": "167870326", "CorpusId": 207928123}, "url": "https://www.semanticscholar.org/paper/4abfb20a0ddc7207039377d36e1f4fd6c09b8215", - "title": "The Practical Intellect: Computers and Skills", "abstract": "1. - Computers and Knowledge.- 2. The Computerization of a Work Process: A Case - Study of the Long-term Effects on Professional Skills.- 3. The Dream of the - Exact Language.- 4. Literature, Language and Learning: Turing''s Paradox and - the Metaphor of Caliban.- 5. The Practical Intellect.- 6. Education and Professional - Knowledge.- References.", "venue": "", "year": 1992, "referenceCount": 0, - "citationCount": 40, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1992-12-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "3043959", "name": "Bo G\u00f6ranzon"}]}, - {"paperId": "0453028e68581624ec68cfec70214231da8dbce7", "externalIds": {"DBLP": - "journals/tit/Solomonoff78", "MAG": "2090547656", "DOI": "10.1109/TIT.1978.1055913", - "CorpusId": 1673415}, "url": "https://www.semanticscholar.org/paper/0453028e68581624ec68cfec70214231da8dbce7", - "title": "Complexity-based induction systems: Comparisons and convergence - theorems", "abstract": "In 1964 the author proposed as an explication of {\\em - a priori} probability the probability measure induced on output strings by - a universal Turing machine with unidirectional output tape and a randomly - coded unidirectional input tape. Levin has shown that if tilde{P}''_{M}(x) - is an unnormalized form of this measure, and P(x) is any computable probability - measure on strings, x , then \\tilde{P}''_{M}\\geqCP(x) where C is a constant - independent of x . The corresponding result for the normalized form of this - measure, P''_{M} , is directly derivable from Willis'' probability measures - on nonuniversal machines. If the conditional probabilities of P''_{M} are - used to approximate those of P , then the expected value of the total squared - error in these conditional probabilities is bounded by -(1/2) \\ln C . With - this error criterion, and when used as the basis of a universal gambling scheme, - P''_{M} is superior to Cover''s measure b\\ast . When H\\ast\\equiv -\\log_{2} - P''_{M} is used to define the entropy of a rmite sequence, the equation H\\ast(x,y)= - H\\ast(x)+H^{\\ast}_{x}(y) holds exactly, in contrast to Chaitin''s entropy - definition, which has a nonvanishing error term in this equation.", "venue": - "IEEE Transactions on Information Theory", "year": 1978, "referenceCount": - 21, "citationCount": 403, "influentialCitationCount": 42, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1978-07-01", "journal": {"name": "IEEE Trans. Inf. Theory", "pages": "422-432", - "volume": "24"}, "authors": [{"authorId": "1727567", "name": "R. Solomonoff"}]}, - {"paperId": "8586b05f1d6c408792206f66925ca18cf82b60f1", "externalIds": {"MAG": - "1537470063", "DOI": "10.1007/978-1-4612-2566-9_4", "CorpusId": 16463260}, - "url": "https://www.semanticscholar.org/paper/8586b05f1d6c408792206f66925ca18cf82b60f1", - "title": "On G\u00f6del\u2019s Theorems on Lengths of Proofs II: Lower Bounds - for Recognizing k Symbol Provability", "abstract": null, "venue": "", "year": - 1995, "referenceCount": 17, "citationCount": 25, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "57-90", "volume": ""}, "authors": [{"authorId": - "1764580", "name": "S. Buss"}]}, {"paperId": "2c1e846241d8c83dda7a26dfa403aed70ec5dc51", - "externalIds": {"MAG": "1528956864", "DBLP": "conf/mi/MichieC94", "CorpusId": - 14704249}, "url": "https://www.semanticscholar.org/paper/2c1e846241d8c83dda7a26dfa403aed70ec5dc51", - "title": "Building symbolic representations of intuitive real-time skills - from performance data", "abstract": "Building Symbolic Representations of - Intuitive Real-time Skills from Performance Data D. Michie and R. Camacho - The Turing Institute, Glasgow, UK Abstract Real-time control skills are ordinarily - tacit | their possessors cannot explicitly communicate them. But given su - cient sampling of a trained expert''s input{output behaviour, machine learning - programs have been found capable of constructing rules which, when run as - programs, deliver behaviours similar to those", "venue": "Machine Intelligence - 13", "year": 1994, "referenceCount": 47, "citationCount": 49, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1994-10-13", "journal": {"pages": "385-418"}, "authors": - [{"authorId": "145878706", "name": "D. Michie"}, {"authorId": "2054341955", - "name": "R. Camacho"}]}, {"paperId": "9fe9b38b1397a4476cd1565f5b6bd2f3ebaa1268", - "externalIds": {"MAG": "2616002700", "DOI": "10.1098/rspa.2016.0744", "CorpusId": - 206152400, "PubMed": "28413340"}, "url": "https://www.semanticscholar.org/paper/9fe9b38b1397a4476cd1565f5b6bd2f3ebaa1268", - "title": "History dependence and the continuum approximation breakdown: the - impact of domain growth on Turing\u2019s instability", "abstract": "A diffusively - driven instability has been hypothesized as a mechanism to drive spatial self-organization - in biological systems since the seminal work of Turing. Such systems are often - considered on a growing domain, but traditional theoretical studies have only - treated the domain size as a bifurcation parameter, neglecting the system - non-autonomy. More recently, the conditions for a diffusively driven instability - on a growing domain have been determined under stringent conditions, including - slow growth, a restriction on the temporal interval over which the prospect - of an instability can be considered and a neglect of the impact that time - evolution has on the stability properties of the homogeneous reference state - from which heterogeneity emerges. Here, we firstly relax this latter assumption - and observe that the conditions for the Turing instability are much more complex - and depend on the history of the system in general. We proceed to relax all - the above constraints, making analytical progress by focusing on specific - examples. With faster growth, instabilities can grow transiently and decay, - making the prediction of a prospective Turing instability much more difficult. - In addition, arbitrarily high spatial frequencies can destabilize, in which - case the continuum approximation is predicted to break down.", "venue": "Proceedings - of the Royal Society A", "year": 2017, "referenceCount": 38, "citationCount": - 28, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-03-01", "journal": {"name": "Proceedings of the Royal - Society A: Mathematical, Physical and Engineering Sciences", "volume": "473"}, - "authors": [{"authorId": "2691918", "name": "V. Klika"}, {"authorId": "2662569", - "name": "E. Gaffney"}]}, {"paperId": "b1b8a329df99d7f26fcd99ae49fd2654cdddafb6", - "externalIds": {"MAG": "1496450597", "CorpusId": 2978086}, "url": "https://www.semanticscholar.org/paper/b1b8a329df99d7f26fcd99ae49fd2654cdddafb6", - "title": "A simple approach to Bayesian network computations", "abstract": - "The general problem of computing poste rior probabilities in Bayesian networks - is NP hard Cooper However e cient algorithms are often possible for particular - applications by exploiting problem struc tures It is well understood that - the key to the materialization of such a possibil ity is to make use of conditional - indepen dence and work with factorizations of joint probabilities rather than - joint probabilities themselves Di erent exact approaches can be characterized - in terms of their choices of factorizations We propose a new approach which - adopts a straightforward way for fac torizing joint probabilities In comparison - with the clique tree propagation approach our approach is very simple It allows - the pruning of irrelevant variables it accommo dates changes to the knowledge - base more easily it is easier to implement More importantly it can be adapted - to utilize both intercausal independence and condi tional independence in - one uniform frame work On the other hand clique tree prop agation is better - in terms of facilitating pre computations", "venue": "", "year": 1994, "referenceCount": - 19, "citationCount": 375, "influentialCitationCount": 25, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3587277", - "name": "N. Zhang"}, {"authorId": "143715817", "name": "D. Poole"}]}, {"paperId": - "dce6108223a08ff4cd727b4749bd7c0d15594d00", "externalIds": {"MAG": "2950601404", - "DBLP": "journals/corr/abs-1207-1033", "ArXiv": "1207.1033", "DOI": "10.1007/978-3-642-37225-4_6", - "CorpusId": 6709999}, "url": "https://www.semanticscholar.org/paper/dce6108223a08ff4cd727b4749bd7c0d15594d00", - "title": "Alan Turing''s Legacy: Info-Computational Philosophy of Nature", - "abstract": null, "venue": "ArXiv", "year": 2012, "referenceCount": 41, "citationCount": - 15, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-07-02", "journal": - {"name": "ArXiv", "volume": "abs/1207.1033"}, "authors": [{"authorId": "1403731773", - "name": "G. Dodig-Crnkovic"}]}, {"paperId": "e281305d3ef077d89bcf24a7348b36d4f702bcf5", - "externalIds": {"MAG": "2033284256", "DOI": "10.1016/S0022-5193(87)80208-4", - "CorpusId": 33346882, "PubMed": "3309478"}, "url": "https://www.semanticscholar.org/paper/e281305d3ef077d89bcf24a7348b36d4f702bcf5", - "title": "What is the status of reaction-diffusion theory thirty-four years - after turing?", "abstract": null, "venue": "Journal of theoretical biology", - "year": 1987, "referenceCount": 42, "citationCount": 70, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "1987-04-21", - "journal": {"name": "Journal of theoretical biology", "pages": "\n 369-84\n ", - "volume": "125 4"}, "authors": [{"authorId": "2984636", "name": "L. G. Harrison"}]}, - {"paperId": "6f5a0fbb1473e95d0a14ef2081985d16bc063bfb", "externalIds": {"MAG": - "2263490141", "DBLP": "journals/corr/NeelakantanVLSK15", "ArXiv": "1511.06807", - "CorpusId": 826188}, "url": "https://www.semanticscholar.org/paper/6f5a0fbb1473e95d0a14ef2081985d16bc063bfb", - "title": "Adding Gradient Noise Improves Learning for Very Deep Networks", - "abstract": "Deep feedforward and recurrent networks have achieved impressive - results in many perception and language processing applications. Recently, - more complex architectures such as Neural Turing Machines and Memory Networks - have been proposed for tasks including question answering and general computation, - creating a new set of optimization challenges. In this paper, we explore the - low-overhead and easy-to-implement optimization technique of adding annealed - Gaussian noise to the gradient, which we find surprisingly effective when - training these very deep architectures. Unlike classical weight noise, gradient - noise injection is complementary to advanced stochastic optimization algorithms - such as Adam and AdaGrad. The technique not only helps to avoid overfitting, - but also can result in lower training loss. We see consistent improvements - in performance across an array of complex models, including state-of-the-art - deep networks for question answering and algorithm learning. We observe that - this optimization strategy allows a fully-connected 20-layer deep network - to escape a bad initialization with standard stochastic gradient descent. - We encourage further application of this technique to additional modern neural - architectures.", "venue": "ArXiv", "year": 2015, "referenceCount": 59, "citationCount": - 421, "influentialCitationCount": 32, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-11-21", "journal": {"name": "ArXiv", - "volume": "abs/1511.06807"}, "authors": [{"authorId": "2072676", "name": "Arvind - Neelakantan"}, {"authorId": "2546951", "name": "L. Vilnis"}, {"authorId": - "2827616", "name": "Quoc V. Le"}, {"authorId": "1701686", "name": "Ilya Sutskever"}, - {"authorId": "40527594", "name": "Lukasz Kaiser"}, {"authorId": "2006889", - "name": "Karol Kurach"}, {"authorId": "145704247", "name": "James Martens"}]}, - {"paperId": "b88ba40ba807cf2eb63ceaba5ea38f7d85e1ce8d", "externalIds": {"MAG": - "2120055819", "DOI": "10.1073/pnas.0904433106", "CorpusId": 6087819, "PubMed": - "19528651"}, "url": "https://www.semanticscholar.org/paper/b88ba40ba807cf2eb63ceaba5ea38f7d85e1ce8d", - "title": "Darwin''s \u201cstrange inversion of reasoning\u201d", "abstract": - "Darwin''s theory of evolution by natural selection unifies the world of physics - with the world of meaning and purpose by proposing a deeply counterintuitive - \u201cinversion of reasoning\u201d (according to a 19th century critic): \u201cto - make a perfect and beautiful machine, it is not requisite to know how to make - it\u201d [MacKenzie RB (1868) (Nisbet & Co., London)]. Turing proposed a similar - inversion: to be a perfect and beautiful computing machine, it is not requisite - to know what arithmetic is. Together, these ideas help to explain how we human - intelligences came to be able to discern the reasons for all of the adaptations - of life, including our own.", "venue": "Proceedings of the National Academy - of Sciences", "year": 2009, "referenceCount": 36, "citationCount": 72, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "2009-06-16", "journal": - {"name": "Proceedings of the National Academy of Sciences", "pages": "10061 - - 10065", "volume": "106"}, "authors": [{"authorId": "3329205", "name": "D. - Dennett"}]}, {"paperId": "0c35496bc1593434d17cc778db1dcc4ff83af6d5", "externalIds": - {"DBLP": "journals/ais/WarwickS16", "MAG": "2062407826", "DOI": "10.1007/s00146-013-0534-3", - "CorpusId": 18207951}, "url": "https://www.semanticscholar.org/paper/0c35496bc1593434d17cc778db1dcc4ff83af6d5", - "title": "Effects of lying in practical Turing tests", "abstract": null, "venue": - "Ai & Society", "year": 2016, "referenceCount": 23, "citationCount": 18, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-02-01", "journal": {"name": "AI & SOCIETY", "pages": "5-15", "volume": - "31"}, "authors": [{"authorId": "143636026", "name": "K. Warwick"}, {"authorId": - "2731715", "name": "Huma Shah"}]}, {"paperId": "7e69a031de6bcce2a864023d6dded11f7a818a0b", - "externalIds": {"MAG": "2164699156", "DBLP": "journals/jsyml/BarmpaliasLN10", - "DOI": "10.2178/jsl/1264433928", "CorpusId": 11242252}, "url": "https://www.semanticscholar.org/paper/7e69a031de6bcce2a864023d6dded11f7a818a0b", - "title": "The importance of \u03a01 0 classes in effective randomness", "abstract": - "Abstract We prove a number of results in effective randomness, using methods - in which \u03a01 0 classes play an essential role. The results proved include - the fact that every PA Turing degree is the join of two random Turing degrees, - and the existence of a minimal pair of LR degrees below the LR degree of the - halting problem.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2010, - "referenceCount": 41, "citationCount": 18, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1995-03-02", "journal": {"pages": "337-348"}, "authors": [{"authorId": "1688317", + "name": "P. Indyk"}]}, {"paperId": "408441939b3e297588aa4e92fdd8b46296e99221", + "externalIds": {"MAG": "1999479735", "DOI": "10.1112/PLMS/S3-12.1.245", "CorpusId": + 117590536}, "corpusId": 117590536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/408441939b3e297588aa4e92fdd8b46296e99221", + "title": "Turing-machine computable func-tionals of nite types II", "abstract": + "A remote temperature change warning system for a refrigeration vehicle comprised + of a temperature sensing circuit located in the refrigeration compartment + of the refrigeration vehicle and a detection circuit located on the vehicle + remote from the temperature sensing circuit and having means for indicating + to the vehicle operator the temperature condition in the refrigeration compartment, + the output of the temperature sensing circuit and the input of the remote + detection circuit being electrically connected through the existing electrical + wiring of said refrigeration vehicle.", "venue": "", "year": 1962, "referenceCount": + 5, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-03-01", "journal": {"name": "The Journal of Symbolic Logic", "pages": - "387 - 400", "volume": "75"}, "authors": [{"authorId": "1678539", "name": - "George Barmpalias"}, {"authorId": "145421803", "name": "A. Lewis"}, {"authorId": - "2112705", "name": "K. Ng"}]}, {"paperId": "92aa5f727b6897485c0349d8b614d11def74b5d1", - "externalIds": {"ArXiv": "1705.08025", "MAG": "2617320940", "DOI": "10.1103/PhysRevLett.119.148301", - "CorpusId": 206300069, "PubMed": "29053314"}, "url": "https://www.semanticscholar.org/paper/92aa5f727b6897485c0349d8b614d11def74b5d1", - "title": "Theory of Turing Patterns on Time Varying Networks.", "abstract": - "The process of pattern formation for a multispecies model anchored on a time - varying network is studied. A nonhomogeneous perturbation superposed to an - homogeneous stable fixed point can be amplified following the Turing mechanism - of instability, solely instigated by the network dynamics. By properly tuning - the frequency of the imposed network evolution, one can make the examined - system behave as its averaged counterpart, over a finite time window. This - is the key observation to derive a closed analytical prediction for the onset - of the instability in the time dependent framework. Continuously and piecewise - constant periodic time varying networks are analyzed, setting the framework - for the proposed approach. The extension to nonperiodic settings is also discussed.", - "venue": "Physical Review Letters", "year": 2017, "referenceCount": 56, "citationCount": - 29, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-05-22", "journal": {"name": "Physical review letters", "pages": "\n 148301\n ", - "volume": "119 14"}, "authors": [{"authorId": "47425122", "name": "Julien - Petit"}, {"authorId": "3108915", "name": "B. Lauwens"}, {"authorId": "2334449", - "name": "D. Fanelli"}, {"authorId": "1809355", "name": "T. Carletti"}]}, {"paperId": - "8beeebf7212498b0b9a9981124adeaf01b8d9ff3", "externalIds": {"MAG": "2088164494", - "DOI": "10.1112/PLMS/S3-19.1.1", "CorpusId": 122638317}, "url": "https://www.semanticscholar.org/paper/8beeebf7212498b0b9a9981124adeaf01b8d9ff3", - "title": "Initial Segments of Turing Degrees", "abstract": null, "venue": - "", "year": 1969, "referenceCount": 0, "citationCount": 17, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Proceedings of The London Mathematical - Society", "pages": "1-16", "volume": ""}, "authors": [{"authorId": "40766628", - "name": "D. Hugill"}]}, {"paperId": "282cb7f06e8ad22dce11e4bd7e2e657310e190bc", - "externalIds": {"MAG": "173113430", "DBLP": "conf/ijcai/SatoKZ05", "CorpusId": - 1760796}, "url": "https://www.semanticscholar.org/paper/282cb7f06e8ad22dce11e4bd7e2e657310e190bc", - "title": "Generative Modeling with Failure in PRISM", "abstract": "PRISM is - a logic-based Turing-complete symbolic-statistical modeling language with - a built-in parameter learning routine. In this paper,we enhance the modeling - power of PRISM by allowing general PRISM programs to fail in the generation - process of observable events. Introducing failure extends the class of definable - distributions but needs a generalization of the semantics of PRISM programs. - We propose a three valued probabilistic semantics and show how failure enables - us to pursue constraint-based modeling of complex statistical phenomena.", - "venue": "International Joint Conference on Artificial Intelligence", "year": - 2005, "referenceCount": 18, "citationCount": 50, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2005-07-30", "journal": {"pages": "847-852"}, - "authors": [{"authorId": "2110904481", "name": "Taisuke Sato"}, {"authorId": - "1764638", "name": "Yoshitaka Kameya"}, {"authorId": "40593363", "name": "Neng-Fa - Zhou"}]}, {"paperId": "e2eed3da004ece7f709646c5c9b4410eb164a7f3", "externalIds": - {"MAG": "1966312936", "DOI": "10.1056/NEJM196405282702203", "CorpusId": 38527767, - "PubMed": "14129061"}, "url": "https://www.semanticscholar.org/paper/e2eed3da004ece7f709646c5c9b4410eb164a7f3", - "title": "HEPATOLENTICULAR DEGENERATION (WILSON''S DISEASE). TWO DIFFERENT - COMPONENTS.", "abstract": "WILSON''S disease has for a long time been of particular - interest to the neurologist because it exemplifies a specific metabolic disorder - involving some special relation between hepatic cirrhosis and degeneration - of the brain. The special fea tures of this relation have become of greater - interest in recent years in the light of increasing knowledge of brain damage - in hepatic coma and hepatic encephalopathy, in association with more common - types of hepatic cirrhosis. Two different syndromes were originally described, - those of pseudosclerosis described by Westphal1 in 1883 and the juvenile form, - called \"progressive lenticular degeneration\" by Wilson2 in 1913. Since the - .\u00a0.\u00a0.", "venue": "The New England journal of medicine", "year": - 1964, "referenceCount": 13, "citationCount": 72, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1964-05-28", "journal": - {"name": "The New England journal of medicine", "pages": "\n 1149-56\n ", - "volume": "270"}, "authors": [{"authorId": "17082299", "name": "D. Denny-Brown"}]}, - {"paperId": "623b68ced0acae6a1c49e44273ae7e539db167e1", "externalIds": {"MAG": - "610304474", "DOI": "10.1007/978-3-642-37225-4", "CorpusId": 60381047}, "url": - "https://www.semanticscholar.org/paper/623b68ced0acae6a1c49e44273ae7e539db167e1", - "title": "Computing Nature: Turing Centenary Perspective", "abstract": null, - "venue": "", "year": 2013, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2013-03-22", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1403731773", "name": "G. Dodig-Crnkovic"}, {"authorId": "3308499", "name": - "Raffaela Giovagnoli"}]}, {"paperId": "1ee1b96e66e2b1b3617f584c5f8343fcbcb19e8b", - "externalIds": {"ArXiv": "0910.5564", "MAG": "2133712735", "DBLP": "journals/acta/BergstraM12", - "DOI": "10.1007/s00236-012-0154-2", "CorpusId": 5407097}, "url": "https://www.semanticscholar.org/paper/1ee1b96e66e2b1b3617f584c5f8343fcbcb19e8b", - "title": "Instruction sequence processing operators", "abstract": null, "venue": - "Acta Informatica", "year": 2009, "referenceCount": 48, "citationCount": 60, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-10-29", "journal": - {"name": "Acta Informatica", "pages": "139-172", "volume": "49"}, "authors": - [{"authorId": "1731564", "name": "J. Bergstra"}, {"authorId": "4969584", "name": - "K. Middelburg"}]}, {"paperId": "0494614fba1be021bb1c273f70150ac0570ea363", - "externalIds": {"MAG": "2010586901", "DBLP": "journals/jsyml/KnightN82", "DOI": - "10.2307/2273590", "CorpusId": 31688747}, "url": "https://www.semanticscholar.org/paper/0494614fba1be021bb1c273f70150ac0570ea363", + "Computer Science", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "1723068", "name": "S. Kleene"}]}, + {"paperId": "0494614fba1be021bb1c273f70150ac0570ea363", "externalIds": {"MAG": + "2010586901", "DBLP": "journals/jsyml/KnightN82", "DOI": "10.2307/2273590", + "CorpusId": 31688747}, "corpusId": 31688747, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/0494614fba1be021bb1c273f70150ac0570ea363", "title": "Expansions of models and turing degrees", "abstract": "If is a countable recursively saturated structure and T is a recursively axiomatizable theory that is consistent with Th(), then it is well known that can be expanded to @@ -36903,31 +40968,133 @@ interactions: , then there is some \u03c3 \u2208 C such that . For uncountable structures , we do not know whether D() must be closed.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1982, "referenceCount": 12, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1982-09-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "587 - - 604", "volume": "47"}, "authors": [{"authorId": "2490044", "name": "J. Knight"}, - {"authorId": "34826418", "name": "M. Nadel"}]}, {"paperId": "0433d4822c5972242387fde96ab0ead5ae10c9a8", - "externalIds": {"CorpusId": 207857245}, "url": "https://www.semanticscholar.org/paper/0433d4822c5972242387fde96ab0ead5ae10c9a8", - "title": "Parallel Turing machines", "abstract": null, "venue": "", "year": - 1984, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": - "76755b87a7055ecc81643f1b8ac3bf3f860c4c0c", "externalIds": {"MAG": "2577347286", - "DOI": "10.1007/S11071-016-3317-9", "CorpusId": 125248341}, "url": "https://www.semanticscholar.org/paper/76755b87a7055ecc81643f1b8ac3bf3f860c4c0c", - "title": "Pattern dynamics of a Gierer\u2013Meinhardt model with spatial effects", - "abstract": null, "venue": "", "year": 2017, "referenceCount": 42, "citationCount": - 69, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1982-09-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "587 - 604", "volume": "47"}, "authors": [{"authorId": "2490044", + "name": "J. Knight"}, {"authorId": "34826418", "name": "M. Nadel"}]}, {"paperId": + "e9327d56abfeaf1e59ca48f76dee7c7a4057aef4", "externalIds": {"DBLP": "conf/crypto/OkamotoTU00", + "MAG": "2138433952", "DOI": "10.1007/3-540-44598-6_9", "CorpusId": 13966712}, + "corpusId": 13966712, "publicationVenue": {"id": "212b6868-c374-4ba2-ad32-19fde8004623", + "name": "Annual International Cryptology Conference", "type": "conference", + "alternate_names": ["Int Cryptol Conf", "Annu Int Cryptol Conf", "CRYPTO", + "International Cryptology Conference"], "url": "http://www.iacr.org/"}, "url": + "https://www.semanticscholar.org/paper/e9327d56abfeaf1e59ca48f76dee7c7a4057aef4", + "title": "Quantum Public-Key Cryptosystems", "abstract": null, "venue": "Annual + International Cryptology Conference", "year": 2000, "referenceCount": 48, + "citationCount": 142, "influentialCitationCount": 10, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007/3-540-44598-6_9.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2000-08-20", "journal": {"pages": "147-165"}, + "authors": [{"authorId": "1708176", "name": "T. Okamoto"}, {"authorId": "1761480", + "name": "Keisuke Tanaka"}, {"authorId": "2061769", "name": "S. Uchiyama"}]}, + {"paperId": "e09a80c5da4a041fad920be22ab594a408d84f47", "externalIds": {"MAG": + "2166579265", "DOI": "10.1112/blms/bdr007", "CorpusId": 16981410}, "corpusId": + 16981410, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e09a80c5da4a041fad920be22ab594a408d84f47", + "title": "Relativizations of randomness and genericity notions", "abstract": + "A set A is a base for Schnorr randomness if it is Turing reducible to a set + R that is Schnorr random relative to A, and the notion of a base for weak + 1\u2010genericity can be defined similarly. We show that A is a base for Schnorr + randomness if and only if A is a base for weak 1\u2010genericity if and only + if the halting set K is not Turing reducible to A. Furthermore, we define + a set A to be high for Schnorr randomness versus Martin\u2010L\u00f6f randomness + if and only if every set that is Schnorr random relative to A is also Martin\u2010L\u00f6f + random unrelativized, and we show that A is high for Schnorr randomness versus + Martin\u2010L\u00f6f randomness if and only if K is Turing reducible to A. + Results concerning highness for other pairs of randomness notions are also + presented.", "venue": "", "year": 2011, "referenceCount": 58, "citationCount": + 22, "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": + {"url": "http://math.nju.edu.cn/~yuliang/fsy.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2017-01-17", "journal": {"name": "Nonlinear Dynamics", - "pages": "1385-1396", "volume": "88"}, "authors": [{"authorId": "47334108", - "name": "Gui\u2010Quan Sun"}, {"authorId": "2108709693", "name": "Cui-Hua - Wang"}, {"authorId": "3565752", "name": "Zeyan Wu"}]}, {"paperId": "a9f1fcf614cf291d2eeb3330cff1ef471e04faa1", + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2011-08-01", "journal": {"name": "Bulletin of the + London Mathematical Society", "volume": "43"}, "authors": [{"authorId": "2693169", + "name": "Johanna N. Y. Franklin"}, {"authorId": "1699450", "name": "F. Stephan"}, + {"authorId": "2804470", "name": "Liang Yu"}]}, {"paperId": "a6f68ec713921a484f49acc2d5baba2093acd100", + "externalIds": {"MAG": "2059810330", "DOI": "10.1016/J.PHYSD.2004.08.017", + "CorpusId": 120726644}, "corpusId": 120726644, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a6f68ec713921a484f49acc2d5baba2093acd100", + "title": "Travelling-stripe forcing of Turing patterns", "abstract": null, + "venue": "", "year": 2004, "referenceCount": 32, "citationCount": 23, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2004-12-01", "journal": {"name": "Physica D: Nonlinear + Phenomena", "pages": "235-242", "volume": "199"}, "authors": [{"authorId": + "2236462", "name": "F. Sagu\u00e9s"}, {"authorId": "2701200", "name": "D. + G. M\u00edguez"}, {"authorId": "11508448", "name": "E. M. Nicola"}, {"authorId": + "2614851", "name": "A. P. Mu\u00f1uzuri"}, {"authorId": "2440383", "name": + "J. Casademunt"}, {"authorId": "78546816", "name": "L. Kramer"}]}, {"paperId": + "20b1e6f1807bbb6d8307e7d1ea0fc63b88684ff8", "externalIds": {"MAG": "1583763223", + "CorpusId": 118087277}, "corpusId": 118087277, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/20b1e6f1807bbb6d8307e7d1ea0fc63b88684ff8", + "title": "Complexity-Theoretic Aspects of Interactive Proof Systems", "abstract": + "In 1985, Goldwasser, Micali and Racko formulated interactive proof systems + as a tool for developing cryptographic protocols. Indeed, many exciting cryptographic + results followed from studying interactive proof systems and the related concept + of zero-knowledge. Interactive proof systems also have an important part in + complexity theory merging the well established concepts of probabilistic and + nondeterministic computation. This thesis will study the complexity of various + models of interactive proof systems. A perfect zero-knowledge interactive + protocol convinces a veri er that a string is in a language without revealing + any additional knowledge in an information theoretic sense. This thesis will + show that for any language that has a perfect zero-knowledge proof system, + its complement has a short interactive protocol. This result implies that + there are not any perfect zero-knowledge protocols for NP-complete languages + unless the polynomial-time hierarchy collapses. Thus knowledge complexity + can show a language is easy to prove. Interesting models of interactive proof + systems arise by restricting the power of the veri er. This thesis examines + the proof systems with a veri er required to run in logarithmic space as well + as polynomial time. Relationships with circuit complexity and log-space Turing + machines are developed. We can increase the power of interactive proof systems + by allowing many provers that can not communicate among themselves during + the protocol. This thesis shows the equivalence between this multi-prover + model and probabilistic Turing machines with an untrustworthy oracle. We additionally + give an oracle under which co-NP does not have multi-prover interactive protocols. + This result implies an oracle where co-NP does not have standard interactive + protocols. Another natural model occurs when the veri er has only linear time. + Towards this direction, this thesis examines probabilistic machines and linear + time. We show an oracle under which linear time probabilistic Turing machines + can accept all BPP languages, an unusual collapse of a complexity time hierarchy. + We exhibit many other related relativized results. Finally we show probabilistic + linear time does not contain all languages accepted by interactive proof systems.", + "venue": "", "year": 1989, "referenceCount": 47, "citationCount": 75, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1691447", + "name": "L. Fortnow"}]}, {"paperId": "2bb861fc09912a56aed0c652e9b764edba56bb0c", + "externalIds": {"PubMedCentral": "7463233", "MAG": "3082760180", "DOI": "10.1038/s41467-020-18073-9", + "CorpusId": 221466963, "PubMed": "32873773"}, "corpusId": 221466963, "publicationVenue": + {"id": "43b3f0f9-489a-4566-8164-02fafde3cd98", "name": "Nature Communications", + "type": "journal", "alternate_names": ["Nat Commun"], "issn": "2041-1723", + "url": "https://www.nature.com/ncomms/", "alternate_urls": ["http://www.nature.com/ncomms/about/index.html", + "http://www.nature.com/ncomms/index.html"]}, "url": "https://www.semanticscholar.org/paper/2bb861fc09912a56aed0c652e9b764edba56bb0c", + "title": "Transforming machine translation: a deep learning system reaches + news translation quality comparable to human professionals", "abstract": null, + "venue": "Nature Communications", "year": 2020, "referenceCount": 44, "citationCount": + 134, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.nature.com/articles/s41467-020-18073-9.pdf", "status": + "GOLD"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-09-01", "journal": + {"name": "Nature Communications", "volume": "11"}, "authors": [{"authorId": + "3209310", "name": "M. Popel"}, {"authorId": "2636731", "name": "M. Tomkov\u00e1"}, + {"authorId": "2542303", "name": "J. Tomek"}, {"authorId": "69894932", "name": + "\u0141ukasz Kaiser"}, {"authorId": "39328010", "name": "Jakob Uszkoreit"}, + {"authorId": "143832874", "name": "Ondrej Bojar"}, {"authorId": "2468732", + "name": "Z. \u017dabokrtsk\u00fd"}]}, {"paperId": "a9f1fcf614cf291d2eeb3330cff1ef471e04faa1", "externalIds": {"MAG": "2097540678", "DOI": "10.1210/endo.143.3.8691", "CorpusId": - 15512651, "PubMed": "28201582"}, "url": "https://www.semanticscholar.org/paper/a9f1fcf614cf291d2eeb3330cff1ef471e04faa1", + 15512651, "PubMed": "28201582"}, "corpusId": 15512651, "publicationVenue": + {"id": "c9a5576c-9a45-4071-ac6f-efa4d4d5b200", "name": "Endocrinology", "type": + "journal", "issn": "2510-1935", "alternate_issns": ["0013-7227"], "url": "http://endo.endojournals.org/"}, + "url": "https://www.semanticscholar.org/paper/a9f1fcf614cf291d2eeb3330cff1ef471e04faa1", "title": "Anti-Mu\u0308llerian Hormone Inhibits Initiation of Primordial Follicle Growth in the Mouse Ovary.", "abstract": "Recruitment of primordial follicles is essential for female fer- tility; however, the exact mechanisms regulating @@ -36950,8 +41117,9 @@ interactions: initia- tion of primordial follicle growth and therefore functions as an inhibitory growth factor in the ovary during these early stages of folliculogenesis. (Endocrinology 143: 1076 -1084, 2002)", "venue": "Endocrinology", "year": - 2002, "referenceCount": 34, "citationCount": 408, "influentialCitationCount": - 12, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 2002, "referenceCount": 34, "citationCount": 410, "influentialCitationCount": + 12, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/endo/article-pdf/143/3/1076/10369960/endo1076.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2002-03-01", "journal": {"name": "Endocrinology", @@ -36961,138 +41129,314 @@ interactions: "B. Karels"}, {"authorId": "3514504", "name": "H. Ingraham"}, {"authorId": "47460842", "name": "M. Nachtigal"}, {"authorId": "116616378", "name": "J. Uilenbroek"}, {"authorId": "4064566", "name": "J. Grootegoed"}, {"authorId": - "4021321", "name": "A. Themmen"}]}, {"paperId": "eaeed172f2f9d927239ab0ef7b25c7b808d6c45f", - "externalIds": {"MAG": "2087485732", "DOI": "10.1143/PTPS.150.367", "CorpusId": - 123215544}, "url": "https://www.semanticscholar.org/paper/eaeed172f2f9d927239ab0ef7b25c7b808d6c45f", - "title": "The Effect of Noise on Turing Patterns", "abstract": "The effect - of noise on pattern formation in Turing systems is studied. It is shown how - robustness of 2D patterns and 3D structures against noise depends on the characteristics - of the morphology. The effect of noise is of particular interest since Turing - systems are often used for explaining biological patterns or structures, which - have to be stable against noise.", "venue": "", "year": 2003, "referenceCount": - 1, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-02-01", "journal": {"name": - "Progress of Theoretical Physics Supplement", "pages": "367-370", "volume": - "150"}, "authors": [{"authorId": "35202419", "name": "T. Lepp\u00e4nen"}, - {"authorId": "2155202", "name": "M. Karttunen"}, {"authorId": "37747895", - "name": "R. Barrio"}, {"authorId": "145670814", "name": "K. Kaski"}]}, {"paperId": - "a5d9f822d71cef748001c64454da000be693f79f", "externalIds": {"MAG": "2178192088", - "DBLP": "journals/jcss/KoblerSTT92", "DOI": "10.1016/0022-0000(92)90022-B", - "CorpusId": 124494939}, "url": "https://www.semanticscholar.org/paper/a5d9f822d71cef748001c64454da000be693f79f", - "title": "Turing Machines with Few Accepting Computations and Low Sets for - PP", "abstract": null, "venue": "Journal of computer and system sciences (Print)", - "year": 1992, "referenceCount": 17, "citationCount": 67, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer + "4021321", "name": "A. Themmen"}]}, {"paperId": "3e15f730e6603955df7b926971bf0ce64025b616", + "externalIds": {"DBLP": "conf/nips/GrossGLG17", "MAG": "2753347993", "CorpusId": + 4078302}, "corpusId": 4078302, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3e15f730e6603955df7b926971bf0ce64025b616", + "title": "Generalizing GANs: A Turing Perspective", "abstract": "Recently, + a new class of machine learning algorithms has emerged, where models and discriminators + are generated in a competitive setting. The most prominent example is Generative + Adversarial Networks (GANs). In this paper we examine how these algorithms + relate to the Turing test, and derive what - from a Turing perspective - can + be considered their defining features. Based on these features, we outline + directions for generalizing GANs - resulting in the family of algorithms referred + to as Turing Learning. One such direction is to allow the discriminators to + interact with the processes from which the data samples are obtained, making + them \"interrogators\", as in the Turing test. We validate this idea using + two case studies. In the first case study, a computer infers the behavior + of an agent while controlling its environment. In the second case study, a + robot infers its own sensor configuration while controlling its movements. + The results confirm that by allowing discriminators to interrogate, the accuracy + of models is improved.", "venue": "NIPS", "year": 2017, "referenceCount": + 31, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2017-12-01", "journal": {"pages": "6316-6326"}, + "authors": [{"authorId": "6586246", "name": "R. Gro\u00df"}, {"authorId": + "49986580", "name": "Yue Gu"}, {"authorId": null, "name": "Wei Li"}, {"authorId": + "7836896", "name": "Melvin Gauci"}]}, {"paperId": "33f166fc8158a73191369c7dec2a5ac0cd9980f3", + "externalIds": {"ArXiv": "math/0307020", "MAG": "2952963548", "DOI": "10.1093/phisci/axi108", + "CorpusId": 119695336}, "corpusId": 119695336, "publicationVenue": {"id": + "ccf23a34-337a-4763-916a-9c16c580e0e1", "name": "British Journal for the Philosophy + of Science", "type": "journal", "alternate_names": ["Br J Philos Sci", "The + British Journal for the Philosophy of Science"], "issn": "0007-0882", "url": + "https://www.journals.uchicago.edu/toc/bjps/current", "alternate_urls": ["https://www.jstor.org/journal/britjphilscie", + "http://bjps.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/33f166fc8158a73191369c7dec2a5ac0cd9980f3", + "title": "The Diagonal Method and Hypercomputation", "abstract": "The diagonal + method is often used to show that Turing machines cannot solve their own halting + problem. There have been several recent attempts to show that this method + also exposes either contradiction or arbitrariness in other theoretical models + of computation which claim to be able to solve the halting problem for Turing + machines. We show that such arguments are flawed\u2014a contradiction only + occurs if a type of machine can compute its own diagonal function. We then + demonstrate why such a situation does not occur for the methods of hypercomputation + under attack, and why it is unlikely to occur for any other serious methods. + 1. Introduction2. Issues with specific hypermachines3. Conclusions for hypercomputation + Introduction Issues with specific hypermachines Conclusions for hypercomputation", + "venue": "British Journal for the Philosophy of Science", "year": 2003, "referenceCount": + 18, "citationCount": 34, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/math/0307020", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2003-07-02", "journal": {"name": "The British Journal for the Philosophy + of Science", "pages": "147 - 156", "volume": "56"}, "authors": [{"authorId": + "46277517", "name": "Toby Ord"}, {"authorId": "2063540", "name": "T. Kieu"}]}, + {"paperId": "ca90906a5f8532eebd81f627211ba2c8713e09ab", "externalIds": {"DBLP": + "conf/eurocast/NetoSCA97", "MAG": "1591645314", "DOI": "10.1007/BFb0025058", + "CorpusId": 30909485}, "corpusId": 30909485, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ca90906a5f8532eebd81f627211ba2c8713e09ab", + "title": "Turing Universality of Neural Nets (Revisited)", "abstract": null, + "venue": "EUROCAST", "year": 1997, "referenceCount": 4, "citationCount": 19, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://works.bepress.com/cgi/viewcontent.cgi?article=1035&context=hava_siegelmann", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1992-04-01", "journal": {"name": "J. Comput. Syst. Sci.", - "pages": "272-286", "volume": "44"}, "authors": [{"authorId": "1717013", "name": - "J. K\u00f6bler"}, {"authorId": "1737337", "name": "U. Sch\u00f6ning"}, {"authorId": - "2872350", "name": "Seinosuke Toda"}, {"authorId": "1698770", "name": "J. - Tor\u00e1n"}]}, {"paperId": "7d3f9a74a25f6beb52441ec527a4673c501ea6ee", "externalIds": - {"MAG": "2156197312", "DOI": "10.1172/JCI104792", "CorpusId": 46552996, "PubMed": - "13950294"}, "url": "https://www.semanticscholar.org/paper/7d3f9a74a25f6beb52441ec527a4673c501ea6ee", - "title": "The role of endotoxin during typhoid fever and tularemia in man. - I. Acquisition of tolerance to endotoxin.", "abstract": "ture seldom returned - to preinjection values. In such instances, the fever curves were extrapolated - to the base line. After control responses to pyrogen were obtained, each subj - ect was infected with one of the viable infectious agents. Responses to injection - of the same endotoxin were reassayed at various periods during convalescence. - In addition to the fever index, subj ective reactions (headache, chills, myalgia, - anorexia) following endotoxin administration were graded as follows: 1+ = - minimal, 2+ = moderate, 3+ = severe, and 4+ = extremely severe.", "venue": - "The Journal of clinical investigation", "year": 1963, "referenceCount": 27, - "citationCount": 50, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1963-07-01", "journal": - {"name": "The Journal of clinical investigation", "pages": "\n 1064-75\n ", - "volume": "42"}, "authors": [{"authorId": "13222880", "name": "S. E. Greisman"}, - {"authorId": "8564103", "name": "R. Hornick"}, {"authorId": "3325372", "name": - "F. A. Carozza"}, {"authorId": "5898910", "name": "T. Woodward"}]}, {"paperId": - "0818de61a2664344354c5411878212dfc7503ab5", "externalIds": {"MAG": "2164898492", - "DBLP": "journals/neco/WangHPPP10", "DOI": "10.1162/NECO_a_00022", "CorpusId": - 207686715, "PubMed": "20608870"}, "url": "https://www.semanticscholar.org/paper/0818de61a2664344354c5411878212dfc7503ab5", - "title": "Spiking Neural P Systems with Weights", "abstract": "A variant of - spiking neural P systems with positive or negative weights on synapses is - introduced, where the rules of a neuron fire when the potential of that neuron - equals a given value. The involved valuesweights, firing thresholds, potential - consumed by each rulecan be real (computable) numbers, rational numbers, integers, - and natural numbers. The power of the obtained systems is investigated. For - instance, it is proved that integers (very restricted: 1, 1 for weights, 1 - and 2 for firing thresholds, and as parameters in the rules) suffice for computing - all Turing computable sets of numbers in both the generative and the accepting - modes. When only natural numbers are used, a characterization of the family - of semilinear sets of numbers is obtained. It is shown that spiking neural - P systems with weights can efficiently solve computationally hard problems - in a nondeterministic way. Some open problems and suggestions for further - research are formulated.", "venue": "Neural Computation", "year": 2010, "referenceCount": - 25, "citationCount": 122, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2010-10-01", "journal": {"name": "Neural - Computation", "pages": "2615-2646", "volume": "22"}, "authors": [{"authorId": - "2152810851", "name": "Jun Wang"}, {"authorId": "1806151", "name": "H. J. - Hoogeboom"}, {"authorId": "7356533", "name": "L. Pan"}, {"authorId": "1698119", - "name": "G. Paun"}, {"authorId": "1393653632", "name": "M. P\u00e9rez-Jim\u00e9nez"}]}, - {"paperId": "45fd7ed9ba9896667cfb6d721e668f2f06792c17", "externalIds": {"DBLP": - "conf/mcu/Durand-Lose04", "MAG": "1839361949", "DOI": "10.1007/978-3-540-31834-7_14", - "CorpusId": 28859258}, "url": "https://www.semanticscholar.org/paper/45fd7ed9ba9896667cfb6d721e668f2f06792c17", - "title": "Abstract Geometrical Computation for Black Hole Computation", "abstract": - null, "venue": "Machines, Computations, and Universality", "year": 2004, "referenceCount": - 19, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "publicationDate": "1997-02-24", "journal": {"pages": "361-366"}, "authors": + [{"authorId": "145515202", "name": "J. P. Neto"}, {"authorId": "2797623", + "name": "H. Siegelmann"}, {"authorId": "143698164", "name": "Jos\u00e9 F\u00e9lix + Costa"}, {"authorId": "143836648", "name": "C. P. S. Araujo"}]}, {"paperId": + "9fe9b38b1397a4476cd1565f5b6bd2f3ebaa1268", "externalIds": {"MAG": "2616002700", + "DOI": "10.1098/rspa.2016.0744", "CorpusId": 206152400, "PubMed": "28413340"}, + "corpusId": 206152400, "publicationVenue": {"id": "b61ce141-a434-431b-a154-68fc26e348f3", + "name": "Proceedings of the Royal Society A", "type": "journal", "alternate_names": + ["Proc R Soc A", "Proc R Soc Math Phys Eng Sci", "Proceedings of The Royal + Society A: Mathematical, Physical and Engineering Sciences"], "issn": "1364-5021", + "url": "https://www.jstor.org/journal/procmathphysengi", "alternate_urls": + ["http://rspa.royalsocietypublishing.org/content/by/year", "http://rspa.royalsocietypublishing.org/about", + "http://rspa.royalsocietypublishing.org/", "https://royalsocietypublishing.org/journal/rspa"]}, + "url": "https://www.semanticscholar.org/paper/9fe9b38b1397a4476cd1565f5b6bd2f3ebaa1268", + "title": "History dependence and the continuum approximation breakdown: the + impact of domain growth on Turing\u2019s instability", "abstract": "A diffusively + driven instability has been hypothesized as a mechanism to drive spatial self-organization + in biological systems since the seminal work of Turing. Such systems are often + considered on a growing domain, but traditional theoretical studies have only + treated the domain size as a bifurcation parameter, neglecting the system + non-autonomy. More recently, the conditions for a diffusively driven instability + on a growing domain have been determined under stringent conditions, including + slow growth, a restriction on the temporal interval over which the prospect + of an instability can be considered and a neglect of the impact that time + evolution has on the stability properties of the homogeneous reference state + from which heterogeneity emerges. Here, we firstly relax this latter assumption + and observe that the conditions for the Turing instability are much more complex + and depend on the history of the system in general. We proceed to relax all + the above constraints, making analytical progress by focusing on specific + examples. With faster growth, instabilities can grow transiently and decay, + making the prediction of a prospective Turing instability much more difficult. + In addition, arbitrarily high spatial frequencies can destabilize, in which + case the continuum approximation is predicted to break down.", "venue": "Proceedings + of the Royal Society A", "year": 2017, "referenceCount": 38, "citationCount": + 28, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rspa.2016.0744", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2017-03-01", "journal": + {"name": "Proceedings of the Royal Society A: Mathematical, Physical and Engineering + Sciences", "volume": "473"}, "authors": [{"authorId": "2691918", "name": "V. + Klika"}, {"authorId": "2662569", "name": "E. Gaffney"}]}, {"paperId": "2c1e846241d8c83dda7a26dfa403aed70ec5dc51", + "externalIds": {"MAG": "1528956864", "DBLP": "conf/mi/MichieC94", "CorpusId": + 14704249}, "corpusId": 14704249, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c1e846241d8c83dda7a26dfa403aed70ec5dc51", + "title": "Building symbolic representations of intuitive real-time skills + from performance data", "abstract": "Building Symbolic Representations of + Intuitive Real-time Skills from Performance Data D. Michie and R. Camacho + The Turing Institute, Glasgow, UK Abstract Real-time control skills are ordinarily + tacit | their possessors cannot explicitly communicate them. But given su + cient sampling of a trained expert''s input{output behaviour, machine learning + programs have been found capable of constructing rules which, when run as + programs, deliver behaviours similar to those", "venue": "Machine Intelligence + 13", "year": 1994, "referenceCount": 47, "citationCount": 49, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-09-21", "journal": - {"pages": "176-187"}, "authors": [{"authorId": "1387881959", "name": "J. Durand-Lose"}]}, - {"paperId": "8044fb7ae6c271dca38201cbe603b7921c821334", "externalIds": {"DBLP": - "journals/cj/WallaceD99", "MAG": "1997404989", "DOI": "10.1093/comjnl/42.4.270", - "CorpusId": 7709829}, "url": "https://www.semanticscholar.org/paper/8044fb7ae6c271dca38201cbe603b7921c821334", - "title": "Minimum Message Length and Kolmogorov Complexity", "abstract": "The - notion of algorithmic complexity was developed by Kolmogorov (1965) and Chaitin - (1966) independently of one another and of Solomonoff\u2019s notion (1964) - of algorithmic probability. Given a Turing machine T , the (prefix) algorithmic - complexity of a string S is the length of the shortest input to T which would - cause T to output S and stop. The Solomonoff probability of S given T is the - probability that a random binary string of 0s and 1s will result in T producing - an output having S as a prefix. We attempt to establish a parallel between - a restricted (two-part) version of the Kolmogorov model and the minimum message - length approach to statistical inference and machine learning of Wallace and - Boulton (1968), in which an \u2018explanation\u2019 of a data string is modelled - as a two-part message, the first part stating a general hypothesis about the - data and the second encoding details of the data not implied by the hypothesis. - Solomonoff\u2019s model is tailored to prediction rather than inference in - that it considers not just the most likely explanation, but it also gives - weights to all explanations depending upon their posterior probability. However, - as the amount of data increases, we typically expect the most likely explanation - to have a dominant weighting in the prediction.", "venue": "Computer/law journal", - "year": 1999, "referenceCount": 60, "citationCount": 384, "influentialCitationCount": - 25, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Comput. J.", "pages": "270-283", "volume": "42"}, - "authors": [{"authorId": "8635127", "name": "C. S. Wallace"}, {"authorId": - "1745871", "name": "D. Dowe"}]}, {"paperId": "74d363f0d248d29c3bbc85b141c4b44f8c901148", - "externalIds": {"MAG": "1964411237", "DOI": "10.1016/S0167-2789(96)00132-7", - "CorpusId": 120881244}, "url": "https://www.semanticscholar.org/paper/74d363f0d248d29c3bbc85b141c4b44f8c901148", - "title": "Turing pattern formation in heterogeneous media", "abstract": null, - "venue": "", "year": 1996, "referenceCount": 20, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-12-15", - "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": "303-317", - "volume": "99"}, "authors": [{"authorId": "2540331", "name": "J. Voroney"}, - {"authorId": "1774400", "name": "A. Lawniczak"}, {"authorId": "2433318", "name": - "R. Kapral"}]}, {"paperId": "eb13027caa50cd4f542743a24e34e87452f29eed", "externalIds": - {"MAG": "2097792865", "DOI": "10.1111/J.1447-073X.2004.00079.X", "CorpusId": - 9122261, "PubMed": "15453612"}, "url": "https://www.semanticscholar.org/paper/eb13027caa50cd4f542743a24e34e87452f29eed", + "publicationTypes": ["JournalArticle"], "publicationDate": "1994-10-13", "journal": + {"pages": "385-418"}, "authors": [{"authorId": "145878706", "name": "D. Michie"}, + {"authorId": "2054341955", "name": "R. Camacho"}]}, {"paperId": "74e037c4b2535de492d4f81abc3e0987332cea30", + "externalIds": {"ArXiv": "patt-sol/9806006", "MAG": "2166643003", "DOI": "10.1103/PhysRevE.58.4485", + "CorpusId": 15489301}, "corpusId": 15489301, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/74e037c4b2535de492d4f81abc3e0987332cea30", + "title": "Turing instability in a boundary-fed system", "abstract": "The formation + of localized structures in the chlorine dioxide-idodine-malonic acid (CDIMA) + reaction-diffusion system is investigated numerically using a realistic model + of this system. We analyze the one-dimensional patterns formed along the gradients + imposed by boundary feeds, and study their linear stability to symmetry-breaking + perturbations (Turing instability) in the plane transverse to these gradients. + We establish that an often-invoked simple local linear analysis that neglects + longitudinal diffusion is inappropriate for predicting the linear stability + of these patterns. Using a fully nonuniform analysis, we investigate the structure + of the patterns formed along the gradients and their stability to transverse + Turing pattern formation as a function of the values of two control parameters: + the malonic acid feed concentration and the size of the reactor in the dimension + along the gradients. The results from this investigation are compared with + existing experiments.", "venue": "", "year": 1998, "referenceCount": 26, "citationCount": + 18, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://authors.library.caltech.edu/2300/1/SETpre98.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1998-06-19", "journal": {"name": + "Physical Review E", "pages": "4485-4500", "volume": "58"}, "authors": [{"authorId": + "8619758", "name": "S. Setayeshgar"}, {"authorId": "1784469", "name": "M. + Cross"}]}, {"paperId": "2d6a410789cca1267f6ad69a6623348e67183911", "externalIds": + {"MAG": "2106978100", "DOI": "10.1111/j.1471-4159.1984.tb06690.x", "CorpusId": + 14613831, "PubMed": "6427410"}, "corpusId": 14613831, "publicationVenue": + {"id": "2ea11618-81a8-44f4-9884-0edc41a4b13c", "name": "Journal of Neurochemistry", + "type": "journal", "alternate_names": ["J Neurochem"], "issn": "0022-3042", + "url": "http://www.blackwell-synergy.com/loi/jnc", "alternate_urls": ["http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1471-4159", + "http://www.jneurochem.org/", "https://onlinelibrary.wiley.com/journal/14714159"]}, + "url": "https://www.semanticscholar.org/paper/2d6a410789cca1267f6ad69a6623348e67183911", + "title": "The Relationship Between Arachidonic Acid Release and Catecholamine + Secretion from Cultured Bovine Adrenal Chromaffin Cells", "abstract": "Abstract: + Increased arachidonic acid release occurred during activation of catecholamine + secretion from cul\u2010 tured bovine adrenal medullary chromaffin cells. + The nicotinic agonist l,l\u2010dimethyl\u20104\u2010phenylpiperazinium (DMPP) + caused an increased release of prcincubated [3H]arachidonic acid over a time + course which corre\u2010 sponded to the stimulation of catecholamine secretion. + Like catecholamine secretion, the DMPP\u2010induced [3H]arachidonic acid release + was calcium\u2010dependent and was blocked by the nicotinic antagonist mecamylamine. + Depolarization by elevated K +, which induced catechol amine secretion, also + stimulated arachidonic acid release. Because arachidonic acid release from + cells probably re\u2010 sults from phospholipase A2 activity, our findings + indicate that phospholipase A2 may be activated in chromaffin cells during + secretion.", "venue": "Journal of Neurochemistry", "year": 1984, "referenceCount": + 14, "citationCount": 73, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://deepblue.lib.umich.edu/bitstream/2027.42/66068/1/j.1471-4159.1984.tb06690.x.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": + "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1984-07-01", "journal": {"name": "Journal of Neurochemistry", + "volume": "43"}, "authors": [{"authorId": "2196177017", "name": "Roy A. Frye"}, + {"authorId": "3139937", "name": "R. Holz"}]}, {"paperId": "4abfb20a0ddc7207039377d36e1f4fd6c09b8215", + "externalIds": {"MAG": "167870326", "CorpusId": 207928123}, "corpusId": 207928123, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4abfb20a0ddc7207039377d36e1f4fd6c09b8215", + "title": "The Practical Intellect: Computers and Skills", "abstract": "1. + Computers and Knowledge.- 2. The Computerization of a Work Process: A Case + Study of the Long-term Effects on Professional Skills.- 3. The Dream of the + Exact Language.- 4. Literature, Language and Learning: Turing''s Paradox and + the Metaphor of Caliban.- 5. The Practical Intellect.- 6. Education and Professional + Knowledge.- References.", "venue": "", "year": 1992, "referenceCount": 0, + "citationCount": 40, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-12-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3043959", + "name": "Bo G\u00f6ranzon"}]}, {"paperId": "00ac18a24b9693b703cf4cd3daa59d95fd647808", + "externalIds": {"MAG": "1968887851", "DOI": "10.1063/1.1372765", "CorpusId": + 93268105}, "corpusId": 93268105, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/00ac18a24b9693b703cf4cd3daa59d95fd647808", + "title": "Towards a molecular logic machine", "abstract": "Finite state logic + machines can be realized by pump\u2013probe spectroscopic experiments on an + isolated molecule. The most elaborate setup, a Turing machine, can be programmed + to carry out a specific computation. We argue that a molecule can be similarly + programmed, and provide examples using two photon spectroscopies. The states + of the molecule serve as the possible states of the head of the Turing machine + and the physics of the problem determines the possible instructions of the + program. The tape is written in an alphabet that allows the listing of the + different pump and probe signals that are applied in a given experiment. Different + experiments using the same set of molecular levels correspond to different + tapes that can be read and processed by the same head and program. The analogy + to a Turing machine is not a mechanical one and is not completely molecular + because the tape is not part of the molecular machine. We therefore also discuss + molecular finite state machines, such as sequential devices, for which...", + "venue": "", "year": 2001, "referenceCount": 29, "citationCount": 32, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2001-06-04", "journal": {"name": "Journal of Chemical Physics", "pages": + "10239-10246", "volume": "114"}, "authors": [{"authorId": "2460403", "name": + "F. Remacle"}, {"authorId": "92475219", "name": "R. Levine"}]}, {"paperId": + "bc6be5f3f1cf582c3613e3c7de6a793947335854", "externalIds": {"MAG": "2099382052", + "DBLP": "conf/ccs/BuchananRSS08", "DOI": "10.1145/1455770.1455776", "CorpusId": + 11176570}, "corpusId": 11176570, "publicationVenue": {"id": "73f7fe95-b68b-468f-b7ba-3013ca879e50", + "name": "Conference on Computer and Communications Security", "type": "conference", + "alternate_names": ["Int Workshop Cogn Cell Syst", "CCS", "Comput Commun Secur", + "CcS", "International Symposium on Community-centric Systems", "International + Workshop on Cognitive Cellular Systems", "Conf Comput Commun Secur", "Comb + Comput Sci", "Int Symp Community-centric Syst", "Combinatorics and Computer + Science", "Circuits, Signals, and Systems", "Computer and Communications Security", + "Circuit Signal Syst"], "url": "https://dl.acm.org/conference/ccs"}, "url": + "https://www.semanticscholar.org/paper/bc6be5f3f1cf582c3613e3c7de6a793947335854", + "title": "When good instructions go bad: generalizing return-oriented programming + to RISC", "abstract": "This paper reconsiders the threat posed by Shacham''s + \"return-oriented programming\" -- a technique by which W-xor-X-style hardware + protections are evaded via carefully crafted stack frames that divert control + flow into the middle of existing variable-length x86 instructions -- creating + short new instructions streams that then return. We believe this attack is + both more general and a greater threat than the author appreciated. In fact, + the vulnerability is not limited to the x86 architecture or any particular + operating system, is readily exploitable, and bypasses an entire category + of malware protections. In this paper we demonstrate general return-oriented + programming on the SPARC, a fixed instruction length RISC architecture with + structured control flow. We construct a Turing-complete library of code gadgets + using snippets of the Solaris libc, a general purpose programming language, + and a compiler for constructing return-oriented exploits. Finally, we argue + that the threat posed by return-oriented programming, across all architectures + and systems, has negative implications for an entire class of security mechanisms: + those that seek to prevent malicious computation by preventing the execution + of malicious code.", "venue": "Conference on Computer and Communications Security", + "year": 2008, "referenceCount": 36, "citationCount": 412, "influentialCitationCount": + 32, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2008-10-27", + "journal": {"pages": "27-38"}, "authors": [{"authorId": "153276898", "name": + "E. Buchanan"}, {"authorId": "31923029", "name": "Ryan Roemer"}, {"authorId": + "1786752", "name": "H. Shacham"}, {"authorId": "1727599", "name": "S. Savage"}]}, + {"paperId": "be903265c02e0416cfcf42781b071690fea541da", "externalIds": {"DBLP": + "conf/itc/SaxenaBJKASH03", "MAG": "1568407911", "DOI": "10.1109/TEST.2003.1271098", + "CorpusId": 7105666}, "corpusId": 7105666, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/be903265c02e0416cfcf42781b071690fea541da", + "title": "A case study of ir-drop in structured at-speed testing", "abstract": + "At-speed test has become a requirement in IC tech- nologies below 180 nm. + Unfortunately, test mode switching activity and IR-drop present special chal- + lenges to the successful application of structural at- speed tests. In this + paper we characterize these prob- lems on commercial ASICs in order to understand + how to implement more effective solutions. consumption. Depending on such + parameters as gate count, DFT strategies, package type, and other fac- tors, + the impact of this problem can range from non- existent to severe. In this + paper, we discuss the prac- tical issues associated with power consumption + during at-speed tests. We begin by delineating in more detail the nature of + power-related phenomena encountered in structured speed tests. We talk about + various de- sign features that can be applied to somewhat miti- gate test + mode power dissipation. In Section 2, we give a more precise definition of + the IR-drop problem which is the focus of this pa- per. We compare IR-drop + in slow speed and at-speed structural tests, and also compare it with functional + IR-drop. We narrow the focus further to the topic of toggle activity or \"switching + density\" during struc- tured at-speed tests. In Section 3.4 we describe the + notion of \"quiet\" patterns and how they are gener- ated. We follow up with + a report of the results we have obtained in experimentation on industrial + ASIC designs. Finally we give our suggestions for future work in this area + and conclude the paper.", "venue": "International Test Conference, 2003. Proceedings. + ITC 2003.", "year": 2003, "referenceCount": 21, "citationCount": 406, "influentialCitationCount": + 23, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2003-09-30", + "journal": {"name": "International Test Conference, 2003. Proceedings. ITC + 2003.", "pages": "1098-1104", "volume": "1"}, "authors": [{"authorId": "145301646", + "name": "Jayashree Saxena"}, {"authorId": "34960306", "name": "K. Butler"}, + {"authorId": "50420106", "name": "Vinay B. Jayaram"}, {"authorId": "1383453370", + "name": "Subhendu Kundu"}, {"authorId": "144861260", "name": "N. Arvind"}, + {"authorId": "2815714", "name": "Pravin Sreeprakash"}, {"authorId": "2226330", + "name": "Manfred Hachinger"}]}, {"paperId": "dce6108223a08ff4cd727b4749bd7c0d15594d00", + "externalIds": {"MAG": "2950601404", "DBLP": "journals/corr/abs-1207-1033", + "ArXiv": "1207.1033", "DOI": "10.1007/978-3-642-37225-4_6", "CorpusId": 6709999}, + "corpusId": 6709999, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dce6108223a08ff4cd727b4749bd7c0d15594d00", + "title": "Alan Turing''s Legacy: Info-Computational Philosophy of Nature", + "abstract": null, "venue": "ArXiv", "year": 2012, "referenceCount": 41, "citationCount": + 15, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1207.1033", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-07-02", "journal": + {"name": "ArXiv", "volume": "abs/1207.1033"}, "authors": [{"authorId": "1403731773", + "name": "G. Dodig-Crnkovic"}]}, {"paperId": "eb13027caa50cd4f542743a24e34e87452f29eed", + "externalIds": {"MAG": "2097792865", "DOI": "10.1111/J.1447-073X.2004.00079.X", + "CorpusId": 9122261, "PubMed": "15453612"}, "corpusId": 9122261, "publicationVenue": + {"id": "b581b206-f2f0-490f-8bfe-dbe894f196a5", "name": "Anatomical Science + International", "type": "journal", "alternate_names": ["Anat Sci Int"], "issn": + "1447-073X", "url": "https://link.springer.com/journal/12565"}, "url": "https://www.semanticscholar.org/paper/eb13027caa50cd4f542743a24e34e87452f29eed", "title": "Periodic pattern formation in reaction\u2014diffusion systems: An introduction for numerical simulation", "abstract": "The aim of the present review is to provide a comprehensive explanation of Turing reaction-diffusion @@ -37110,65 +41454,38 @@ interactions: for the interdisciplinary field of research involving mathematical approaches in developmental biology.", "venue": "Anatomical Science International", "year": 2004, "referenceCount": 31, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:c718a726-fc10-4ecb-acb6-8bf4ab289d69/download_file?safe_filename=173.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2004-09-01", "journal": {"name": "Anatomical Science International", "pages": "112-123", "volume": "79"}, "authors": [{"authorId": "47938934", "name": "T. Miura"}, {"authorId": - "2339973", "name": "P. Maini"}]}, {"paperId": "63b960264ede407598e064559642a159f1ebb282", - "externalIds": {"MAG": "2161236690", "DOI": "10.1177/096032719501400708", - "CorpusId": 26355215, "PubMed": "7576821"}, "url": "https://www.semanticscholar.org/paper/63b960264ede407598e064559642a159f1ebb282", - "title": "Extrapyramidal manifestations complicating organophosphorus insecticide - poisoning", "abstract": "Six patients who developed extrapyramidal manifesta - tions following poisoning with the organophosphorus (OP) insecticide fenthion - are reported. The extrapyramidal fea tures, in order of frequency, were dystonia, - rest tremor, cog-wheel rigidity, and choreo-athetosis. The delay in onset - of these signs, following poisoning, varied from 4 to 40 days, and they disappeared - spontaneously in about 1 to 4 weeks in those who survived. The human extrapyrami - dal system is rich in cholinergic neurons and acetyl cholinesterase (AChE). - Inhibition of AChE by fenthion, which has ready access to central neurons - on account of its lipid solubility, is postulated as the mechanism under lying - the extrapyramidal manifestations.", "venue": "Human and Experimental Toxicology", - "year": 1995, "referenceCount": 21, "citationCount": 69, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "CaseReport"], "publicationDate": "1995-07-01", - "journal": {"name": "Human & Experimental Toxicology", "pages": "600 - 604", - "volume": "14"}, "authors": [{"authorId": "4044535", "name": "N. Senanayake"}, - {"authorId": "4603759", "name": "P. Sanmuganathan"}]}, {"paperId": "d33f94587c6485614d70bd03a040322a226cccde", - "externalIds": {"DBLP": "conf/nips/SchurmannMS04", "MAG": "2155757660", "CorpusId": - 11742987}, "url": "https://www.semanticscholar.org/paper/d33f94587c6485614d70bd03a040322a226cccde", - "title": "Edge of Chaos Computation in Mixed-Mode VLSI - A Hard Liquid", "abstract": - "Computation without stable states is a computing paradigm different from - Turing''s and has been demonstrated for various types of simulated neural - networks. This publication transfers this to a hardware implemented neural - network. Results of a software implementation are reproduced showing that - the performance peaks when the network exhibits dynamics at the edge of chaos. - The liquid computing approach seems well suited for operating analog computing - devices such as the used VLSI neural network.", "venue": "NIPS", "year": 2004, - "referenceCount": 8, "citationCount": 49, "influentialCitationCount": 2, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "2339973", "name": "P. Maini"}]}, {"paperId": "3197f4823f22d2fa6eea814133cffef3060792c9", + "externalIds": {"MAG": "1994486459", "DBLP": "conf/grc/BaligaL05", "DOI": + "10.1109/GRC.2005.1547318", "CorpusId": 11727659}, "corpusId": 11727659, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3197f4823f22d2fa6eea814133cffef3060792c9", + "title": "Kolmogorov complexity based automata modeling for intrusion detection", + "abstract": "According to Kolmogorov complexity, a string is considered patternless + if the shortest Turing machine that can encode it is at least as long as the + string itself. Conversely, a non-random string with patterns can be described + by some Turing machine that is shorter than the string. Hence, special forms + of Turing machines - such as functions, N-grams, finite automata and stochastic + automata - can all be regarded as representations of some approximations of + patterns. Based on these observations, system profiles are defined for anomaly-based + intrusion detection systems. The results are encouraging.", "venue": "2005 + IEEE International Conference on Granular Computing", "year": 2005, "referenceCount": + 25, "citationCount": 18, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2004-12-01", - "journal": {"pages": "1201-1208"}, "authors": [{"authorId": "2984713", "name": - "F. Sch\u00fcrmann"}, {"authorId": "36245042", "name": "K. Meier"}, {"authorId": - "2138905", "name": "J. Schemmel"}]}, {"paperId": "e9327d56abfeaf1e59ca48f76dee7c7a4057aef4", - "externalIds": {"DBLP": "conf/crypto/OkamotoTU00", "MAG": "2138433952", "DOI": - "10.1007/3-540-44598-6_9", "CorpusId": 13966712}, "url": "https://www.semanticscholar.org/paper/e9327d56abfeaf1e59ca48f76dee7c7a4057aef4", - "title": "Quantum Public-Key Cryptosystems", "abstract": null, "venue": "Annual - International Cryptology Conference", "year": 2000, "referenceCount": 48, - "citationCount": 138, "influentialCitationCount": 10, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2000-08-20", "journal": {"pages": "147-165"}, "authors": [{"authorId": "1708176", - "name": "T. Okamoto"}, {"authorId": "1761480", "name": "Keisuke Tanaka"}, - {"authorId": "2061769", "name": "S. Uchiyama"}]}, {"paperId": "c751544bb0dba35160acdc31606448fecb0411b8", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2005-07-25", "journal": {"name": "2005 IEEE International + Conference on Granular Computing", "pages": "387-392 Vol. 2", "volume": "2"}, + "authors": [{"authorId": "2056056880", "name": "Priya Baliga"}, {"authorId": + "2107178974", "name": "T. Y. Lin"}]}, {"paperId": "c751544bb0dba35160acdc31606448fecb0411b8", "externalIds": {"MAG": "2123111868", "DOI": "10.1051/ANIMRES:2002036", "CorpusId": - 53584791}, "url": "https://www.semanticscholar.org/paper/c751544bb0dba35160acdc31606448fecb0411b8", + 53584791}, "corpusId": 53584791, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c751544bb0dba35160acdc31606448fecb0411b8", "title": "The relationship of temperature-humidity index with milk production of dairy cows in a Mediterranean climate", "abstract": "Two experiments were conducted using lactating Friesian-Holstein cows to measure the effects of @@ -37191,62 +41508,548 @@ interactions: composition and affected the physiological functions of confined lactating Hol- stein cows managed under Mediterranean climatic conditions. dairy cow / temperature-humidity index / milk production / intake / physiology", "venue": - "", "year": 2002, "referenceCount": 33, "citationCount": 383, "influentialCitationCount": - 62, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2002-11-01", "journal": {"name": "Animal Research", "pages": - "479-491", "volume": "51"}, "authors": [{"authorId": "29825924", "name": "R. - Bouraoui"}, {"authorId": "67039150", "name": "M. Lahmar"}, {"authorId": "118465340", - "name": "A. Majdoub"}, {"authorId": "74281699", "name": "M. Djemali"}, {"authorId": - "3937682", "name": "R. Belyea"}]}, {"paperId": "fba31f3feb4c5be4928b1604db56996c4f65c33d", - "externalIds": {"MAG": "2036941684", "DOI": "10.3144/EXPRESSPOLYMLETT.2008.50", - "CorpusId": 53407179}, "url": "https://www.semanticscholar.org/paper/fba31f3feb4c5be4928b1604db56996c4f65c33d", - "title": "The effects of acetylation on properties of flax fibre and its polypropylene - composites", "abstract": "Flax fibre was modified with acetylation. The influence - of the acetylation on the structure and properties of flax fibre were investigated - as well as modified flax fibre reinforced polypropylene composites were also - prepared. The catalyst was used to accelerate acetylation reaction rate. Flax - fibre was characterised after modification. Surface morphology, mois- ture - absorption property, components content, degree of polymerisation, crystallinity - of cellulose and thermal stability of flax fibres were studied. Due to acetylation, - the flax fibre surface morphology and moisture resistance properties improved - remarkably. Flax fibre (modified and unmodified) reinforced polypropylene - composites were fabricated with 30 wt% fibre loading. The mechanical properties - were investigated for those composites. Tensile and flexural strengths of - composites were found to increase with increasing degree of acetylation up - to 18% and then decreased. Charpy impact strengths of composites were found - to decrease with increasing degree of acetylation. Owing to addition of coupling - agent (maleated polypropylene -MAH), the tensile and flexural strength properties - were found to increase in between 20 to 35% depending on degree of acetylation.", - "venue": "", "year": 2008, "referenceCount": 22, "citationCount": 380, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Express Polymer Letters", "pages": "413-422", "volume": "2"}, "authors": - [{"authorId": "21662177", "name": "A. B\u0142\u0119dzki"}, {"authorId": "1398718814", - "name": "A. Mamun"}, {"authorId": "1403162739", "name": "M. Lucka-Gabor"}, - {"authorId": "12320026", "name": "V. Gutowski"}, {"authorId": "113452053", - "name": "Highett Melbourne"}]}, {"paperId": "07229681b4a16af49aa69373c51921f383cb86a6", + "", "year": 2002, "referenceCount": 33, "citationCount": 391, "influentialCitationCount": + 64, "isOpenAccess": true, "openAccessPdf": {"url": "http://animres.edpsciences.org/articles/animres/pdf/2002/06/04.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Agricultural And Food Sciences", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-11-01", + "journal": {"name": "Animal Research", "pages": "479-491", "volume": "51"}, + "authors": [{"authorId": "29825924", "name": "R. Bouraoui"}, {"authorId": + "67039150", "name": "M. Lahmar"}, {"authorId": "118465340", "name": "A. Majdoub"}, + {"authorId": "74281699", "name": "M. Djemali"}, {"authorId": "3937682", "name": + "R. Belyea"}]}, {"paperId": "35ba8e09d7fff9139c52be7c07e429fd643ddf82", "externalIds": + {"MAG": "2083075751", "DOI": "10.1016/0022-5193(79)90011-0", "CorpusId": 28564771, + "PubMed": "439913"}, "corpusId": 28564771, "publicationVenue": {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", + "name": "Journal of Theoretical Biology", "type": "journal", "alternate_names": + ["J Theor Biology"], "issn": "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/35ba8e09d7fff9139c52be7c07e429fd643ddf82", + "title": "Turing''s conditions and the analysis of morphogenetic models.", + "abstract": null, "venue": "Journal of Theoretical Biology", "year": 1979, + "referenceCount": 11, "citationCount": 33, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1979-02-21", "journal": {"name": "Journal of theoretical biology", "pages": + "\n 419-36\n ", "volume": "76 4"}, "authors": [{"authorId": + "5446744", "name": "T. Lacalli"}, {"authorId": "2984636", "name": "L. G. Harrison"}]}, + {"paperId": "2715342eb24c5f9cfcf944ba306dbbfc628b3498", "externalIds": {"DBLP": + "journals/iandc/KariT96", "MAG": "2075622371", "DOI": "10.1006/inco.1996.0091", + "CorpusId": 9185146}, "corpusId": 9185146, "publicationVenue": {"id": "d8fc27e3-52dd-4758-bc70-1983b8a26797", + "name": "Information and Computation", "type": "journal", "alternate_names": + ["Inf Comput", "Information & Computation", "Inf Comput"], "issn": "0890-5401", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/622844/description#description", + "alternate_urls": ["http://www.idealibrary.com/links/toc/inco", "http://iandc.csail.mit.edu/", + "http://www.sciencedirect.com/science/journal/08905401", "https://www.journals.elsevier.com/information-and-computation/"]}, + "url": "https://www.semanticscholar.org/paper/2715342eb24c5f9cfcf944ba306dbbfc628b3498", + "title": "Contextual Insertions/Deletions and Computability", "abstract": + "We investigate two generalizations of insertion and deletion of words, that + have recently become of interest in the context of molecular computing. Given + a pair of words (x, y), called a context, the (x, y)-contextual insertion + of a wordvinto a worduis performed as follows. For each occurrence ofxyas + a subword inu, we include in the result of the contextual insertion the words + obtained by insertingvintou, betweenxandy. The (x, y)-contextual deletion + operation is defined in a similar way. We study closure properties of the + Chomsky families under the defined operations, contextual ins-closed and del-closed + languages, and decidability of existence of solutions to equations involving + these operations. Moreover, we prove that every Turing machine can be simulated + by a system based entirely on contextual insertions and deletions", "venue": + "Information and Computation", "year": 1996, "referenceCount": 19, "citationCount": + 131, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-11-25", "journal": + {"name": "Inf. Comput.", "pages": "47-61", "volume": "131"}, "authors": [{"authorId": + "144073818", "name": "L. Kari"}, {"authorId": "2956645", "name": "G. Thierrin"}]}, + {"paperId": "8beeebf7212498b0b9a9981124adeaf01b8d9ff3", "externalIds": {"MAG": + "2088164494", "DOI": "10.1112/PLMS/S3-19.1.1", "CorpusId": 122638317}, "corpusId": + 122638317, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8beeebf7212498b0b9a9981124adeaf01b8d9ff3", + "title": "Initial Segments of Turing Degrees", "abstract": null, "venue": + "", "year": 1969, "referenceCount": 0, "citationCount": 17, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Proceedings of The London + Mathematical Society", "pages": "1-16", "volume": ""}, "authors": [{"authorId": + "40766628", "name": "D. Hugill"}]}, {"paperId": "158f3e4f505fdb9b2bc9e95701b2a7dd94ffe927", + "externalIds": {"MAG": "2139165575", "CorpusId": 46658149}, "corpusId": 46658149, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/158f3e4f505fdb9b2bc9e95701b2a7dd94ffe927", + "title": "What Are Subtle Energies", "abstract": "A brief discussion is given + of a set of anomalous experimental phenomena that are inexplicable based only + on the four accepted forces oper- ating in the physical universe. Possible + explanations require defining the ex- istence of subtle energies. Using a + quantum mechanical description, the seat of subtle energy functioning is traced + to the vacuum state with magnetic vec- tor potential assuming the role of + bridge between the subtle energies and physical energies. A brief discussion + is given of how we might reliably detect subtle energies and a zeroth order + model of the subtle domains as substruc- ture for the vacuum state is given.", + "venue": "", "year": 1993, "referenceCount": 35, "citationCount": 71, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "4566718", + "name": "W. Tiller"}]}, {"paperId": "bffe108baa47d9fc94329b0ea7568281d4dbed18", + "externalIds": {"MAG": "2086086086", "DOI": "10.1007/BF00169566", "CorpusId": + 123301064}, "corpusId": 123301064, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bffe108baa47d9fc94329b0ea7568281d4dbed18", + "title": "Turing bifurcations with a temporally varying diffusion coefficient", + "abstract": null, "venue": "", "year": 1995, "referenceCount": 15, "citationCount": + 29, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1995-12-01", "journal": {"name": + "Journal of Mathematical Biology", "pages": "295-308", "volume": "33"}, "authors": + [{"authorId": "1890610", "name": "J. Sherratt"}]}, {"paperId": "8586b05f1d6c408792206f66925ca18cf82b60f1", + "externalIds": {"MAG": "1537470063", "DOI": "10.1007/978-1-4612-2566-9_4", + "CorpusId": 16463260}, "corpusId": 16463260, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8586b05f1d6c408792206f66925ca18cf82b60f1", + "title": "On G\u00f6del\u2019s Theorems on Lengths of Proofs II: Lower Bounds + for Recognizing k Symbol Provability", "abstract": null, "venue": "", "year": + 1995, "referenceCount": 17, "citationCount": 25, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "57-90", "volume": ""}, "authors": + [{"authorId": "1764580", "name": "S. Buss"}]}, {"paperId": "355c51f680454e891f89bd9aa6960bece5ccec36", + "externalIds": {"MAG": "2281664623", "DOI": "10.1007/978-3-7091-6597-3_8", + "CorpusId": 6365510}, "corpusId": 6365510, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/355c51f680454e891f89bd9aa6960bece5ccec36", + "title": "Logical depth and physical complexity", "abstract": null, "venue": + "", "year": 1988, "referenceCount": 68, "citationCount": 418, "influentialCitationCount": + 42, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1988-10-01", "journal": {"name": + "", "pages": "227-257", "volume": ""}, "authors": [{"authorId": "2623914", + "name": "Charles H. Bennett"}]}, {"paperId": "282cb7f06e8ad22dce11e4bd7e2e657310e190bc", + "externalIds": {"MAG": "173113430", "DBLP": "conf/ijcai/SatoKZ05", "CorpusId": + 1760796}, "corpusId": 1760796, "publicationVenue": {"id": "67f7f831-711a-43c8-8785-1e09005359b5", + "name": "International Joint Conference on Artificial Intelligence", "type": + "conference", "alternate_names": ["Int Jt Conf Artif Intell", "IJCAI"], "url": + "http://www.ijcai.org/"}, "url": "https://www.semanticscholar.org/paper/282cb7f06e8ad22dce11e4bd7e2e657310e190bc", + "title": "Generative Modeling with Failure in PRISM", "abstract": "PRISM is + a logic-based Turing-complete symbolic-statistical modeling language with + a built-in parameter learning routine. In this paper,we enhance the modeling + power of PRISM by allowing general PRISM programs to fail in the generation + process of observable events. Introducing failure extends the class of definable + distributions but needs a generalization of the semantics of PRISM programs. + We propose a three valued probabilistic semantics and show how failure enables + us to pursue constraint-based modeling of complex statistical phenomena.", + "venue": "International Joint Conference on Artificial Intelligence", "year": + 2005, "referenceCount": 18, "citationCount": 50, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2005-07-30", + "journal": {"pages": "847-852"}, "authors": [{"authorId": "2110904481", "name": + "Taisuke Sato"}, {"authorId": "1764638", "name": "Yoshitaka Kameya"}, {"authorId": + "40593363", "name": "Neng-Fa Zhou"}]}, {"paperId": "c5314c77897bedd60909f4bd8648113e076e2b2f", + "externalIds": {"MAG": "2057738059", "DOI": "10.1063/1.467185", "CorpusId": + 97589588}, "corpusId": 97589588, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c5314c77897bedd60909f4bd8648113e076e2b2f", + "title": "Interaction of Turing and flow-induced chemical instabilities", + "abstract": "The interaction between the Turing instability and the instability + induced by a differential flow is studied in the Selkov model. Both instabilities + give rise to the formation of spatial patterns, and for a range of parameter + values, these patterns can compete. The effect of anisotropic diffusion on + the pattern formation process is investigated. Stripes with different orientations + that travel with time and the suppression of patterns due to a competition + of both instabilities are observed.", "venue": "", "year": 1994, "referenceCount": + 15, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-04-01", + "journal": {"name": "Journal of Chemical Physics", "pages": "5211-5218", "volume": + "100"}, "authors": [{"authorId": "4496756", "name": "S. Dawson"}, {"authorId": + "1774400", "name": "A. Lawniczak"}, {"authorId": "2433318", "name": "R. Kapral"}]}, + {"paperId": "7e69a031de6bcce2a864023d6dded11f7a818a0b", "externalIds": {"MAG": + "2164699156", "DBLP": "journals/jsyml/BarmpaliasLN10", "DOI": "10.2178/jsl/1264433928", + "CorpusId": 11242252}, "corpusId": 11242252, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/7e69a031de6bcce2a864023d6dded11f7a818a0b", + "title": "The importance of \u03a01 0 classes in effective randomness", "abstract": + "Abstract We prove a number of results in effective randomness, using methods + in which \u03a01 0 classes play an essential role. The results proved include + the fact that every PA Turing degree is the join of two random Turing degrees, + and the existence of a minimal pair of LR degrees below the LR degree of the + halting problem.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2010, + "referenceCount": 41, "citationCount": 18, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://www.barmpalias.net/papers/minpal23sept.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2010-03-01", "journal": {"name": "The Journal of Symbolic Logic", "pages": + "387 - 400", "volume": "75"}, "authors": [{"authorId": "1678539", "name": + "George Barmpalias"}, {"authorId": "145421803", "name": "A. Lewis"}, {"authorId": + "2112705", "name": "K. Ng"}]}, {"paperId": "07229681b4a16af49aa69373c51921f383cb86a6", "externalIds": {"PubMedCentral": "4526855", "ArXiv": "1412.7055", "MAG": "2952138927", - "DOI": "10.1038/srep12927", "CorpusId": 5478265, "PubMed": "26245138"}, "url": - "https://www.semanticscholar.org/paper/07229681b4a16af49aa69373c51921f383cb86a6", + "DOI": "10.1038/srep12927", "CorpusId": 5478265, "PubMed": "26245138"}, "corpusId": + 5478265, "publicationVenue": {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", + "name": "Scientific Reports", "type": "journal", "alternate_names": ["Sci + Rep"], "issn": "2045-2322", "url": "http://www.nature.com/srep/", "alternate_urls": + ["http://www.nature.com/srep/index.html"]}, "url": "https://www.semanticscholar.org/paper/07229681b4a16af49aa69373c51921f383cb86a6", "title": "Turing instabilities on Cartesian product networks", "abstract": null, "venue": "Scientific Reports", "year": 2014, "referenceCount": 29, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Computer Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + 19, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.nature.com/articles/srep12927.pdf", "status": "GOLD"}, + "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics", "Medicine"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-12-22", "journal": {"name": "Scientific Reports", + "volume": "5"}, "authors": [{"authorId": "5903846", "name": "M. Asllani"}, + {"authorId": "48664134", "name": "D. M. Busiello"}, {"authorId": "1809355", + "name": "T. Carletti"}, {"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": + "4546397", "name": "Gwendoline Planchon"}]}, {"paperId": "ea9167f9b1bdbb8571b3271944d407e77647a3b1", + "externalIds": {"MAG": "53636707", "DOI": "10.1093/acprof:oso/9780199574131.003.0011", + "CorpusId": 59633987}, "corpusId": 59633987, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ea9167f9b1bdbb8571b3271944d407e77647a3b1", + "title": "Turing machines and causal mechanisms in cognitive science", "abstract": + "Turing machines are simple computational entities which were originally used + to define the class of computational tasks that may be carried out by mechanical + means. In this article we look at the explanatory roles the Turing Machine + 2 plays in cognitive science. With respect to Turing Machines\u2019 explanatory + role, we assume that a) rational processes may be defined in such a way (viz. + as computational functions) that they can be carried out by mechanical systems, + and b) the Turing Machine specifies a means whereby one can show that a mechanistic + system can be designed to perform rational processes.", "venue": "", "year": + 2011, "referenceCount": 31, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "1975758", "name": "O. Lappi"}, {"authorId": + "1933236", "name": "Anna-Mari Rusanen"}]}, {"paperId": "a9a0ba653ac68129e8080569716899eec5d8a1b2", + "externalIds": {"MAG": "1510868674", "ArXiv": "quant-ph/0404146", "CorpusId": + 6349434}, "corpusId": 6349434, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a9a0ba653ac68129e8080569716899eec5d8a1b2", + "title": "Measurement-Based Quantum Turing Machines and their Universality", + "abstract": "Quantum measurement is universal for quantum computation. This + universality allows alternative schemes to the traditional three-step organisation + of quantum computation: initial state preparation, unitary transformation, + measurement. In order to formalize these other forms of computation, while + pointing out the role and the necessity of classical control in measurement-based + computation, and for establishing a new upper bound of the minimal resources + needed to quantum universality, a formal model is introduced by means of Measurement-based + Quantum Turing Machines.", "venue": "", "year": 2004, "referenceCount": 18, + "citationCount": 28, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-04-26", "journal": {"name": + "arXiv: Quantum Physics", "volume": ""}, "authors": [{"authorId": "2772607", + "name": "S. Perdrix"}, {"authorId": "1829432", "name": "P. Jorrand"}]}, {"paperId": + "73c218cbfcab84124f5cd8079f450a065d520069", "externalIds": {"MAG": "1991170403", + "DOI": "10.1086/341843", "CorpusId": 16403999}, "corpusId": 16403999, "publicationVenue": + {"id": "c113624f-9929-40bf-803c-0396e35e3e14", "name": "Philosophia Scienti\u00e6", + "type": "journal", "alternate_names": ["Philos Sci", "Philosophy of Science"], + "issn": "1281-2463", "alternate_issns": ["0031-8248", "1775-4283"], "url": + "https://www.cairn.info/revue-philosophia-scientiae.htm", "alternate_urls": + ["https://journals.openedition.org/philosophiascientiae/", "http://philosophiascientiae.revues.org/", + "https://journal.philsci.org/", "https://www.journals.uchicago.edu/loi/phos", + "http://journal.philsci.org/", "http://www.jstor.org/journals/00318248.html", + "http://www.numdam.org/journals/PHSC/", "https://www.jstor.org/journal/philscie"]}, + "url": "https://www.semanticscholar.org/paper/73c218cbfcab84124f5cd8079f450a065d520069", + "title": "Quantum Speed\u2010up of Computations", "abstract": "Wolfram\u2019s + thesis consists of two parts: (a) Any physical system can be simulated (to + any degree of approximation) by a universal Turing machine (b) Complexity + bounds on Turing machine simulations have physical significance. For example, + suppose that the computation of the minimum energy of some system of n particles + takes at least exponentially (in n) many steps. Then the relaxation time of + the actual physical system to its minimum energy state will also take exponential + time. An even more extreme formulation of (more or less) the same thesis is + due to Aharonov (1998): A probabilistic Turing machine can simulate any reasonable + physical device in polynomial cost. She calls this The Modern Church Thesis. + Aharonov refers here to probabilistic Turing machines that use random numbers + in addition to the usual deterministic table of steps. It seems that such + machines are capable to perform certain tasks faster than fully deterministic + machines. The most famous randomized algorithm of that kind concerns the decision + whether a given natural number is prime. A probabilistic algorithm that decides + primality in a number of", "venue": "Philosophia Scienti\u00e6", "year": 2002, + "referenceCount": 30, "citationCount": 23, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-09-01", "journal": {"name": + "Philosophy of Science", "pages": "S168 - S177", "volume": "69"}, "authors": + [{"authorId": "3341037", "name": "I. Pitowsky"}]}, {"paperId": "e281305d3ef077d89bcf24a7348b36d4f702bcf5", + "externalIds": {"MAG": "2033284256", "DOI": "10.1016/S0022-5193(87)80208-4", + "CorpusId": 33346882, "PubMed": "3309478"}, "corpusId": 33346882, "publicationVenue": + {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", "name": "Journal of Theoretical + Biology", "type": "journal", "alternate_names": ["J Theor Biology"], "issn": + "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/e281305d3ef077d89bcf24a7348b36d4f702bcf5", + "title": "What is the status of reaction-diffusion theory thirty-four years + after turing?", "abstract": null, "venue": "Journal of Theoretical Biology", + "year": 1987, "referenceCount": 42, "citationCount": 70, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + "1987-04-21", "journal": {"name": "Journal of theoretical biology", "pages": + "\n 369-84\n ", "volume": "125 4"}, "authors": [{"authorId": + "2984636", "name": "L. G. Harrison"}]}, {"paperId": "0433d4822c5972242387fde96ab0ead5ae10c9a8", + "externalIds": {"CorpusId": 207857245}, "corpusId": 207857245, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0433d4822c5972242387fde96ab0ead5ae10c9a8", + "title": "Parallel Turing machines", "abstract": null, "venue": "", "year": + 1984, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": null, "journal": null, "authors": + []}, {"paperId": "5e53fe8e9ab1714ecbf4120f64fbfcb118d39045", "externalIds": + {"MAG": "2032304886", "DOI": "10.4236/JBISE.2011.44039", "CorpusId": 44032428}, + "corpusId": 44032428, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5e53fe8e9ab1714ecbf4120f64fbfcb118d39045", + "title": "Cardiac arrhythmias detection in an ECG beat signal using fast fourier + transform and artificial neural network", "abstract": "Cardiac Arrhythmias + shows a condition of abnor-mal electrical activity in the heart which is a + threat to humans. This paper presents a method to analyze electrocardiogram + (ECG) signal, extract the fea-tures, for the classification of heart beats + according to different arrhythmias. Data were obtained from 40 records of + the MIT-BIH arrhythmia database (only one lead). Cardiac arrhythmias which + are found are Tachycardia, Bradycardia, Supraventricular Tachycardia, Incomplete + Bundle Branch Block, Bundle Branch Block, Ventricular Tachycardia. A learning + dataset for the neural network was obtained from a twenty records set which + were manually classified using MIT-BIH Arrhythmia Database Directory and docu- + mentation, taking advantage of the professional experience of a cardiologist. + Fast Fourier transforms are used to identify the peaks in the ECG signal and + then Neural Networks are applied to identify the diseases. Levenberg Marquardt + Back-Propagation algorithm is used to train the network. The results obtained + have better efficiency then the previously proposed methods.", "venue": "", + "year": 2011, "referenceCount": 26, "citationCount": 132, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.scirp.org/journal/PaperDownload.aspx?paperID=4708", + "status": "GOLD"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2011-04-20", "journal": {"name": "Journal of Biomedical + Science and Engineering", "pages": "289-296", "volume": "04"}, "authors": + [{"authorId": "72519612", "name": "Himanshu Gothwal"}, {"authorId": "88528758", + "name": "Silky Kedawat"}, {"authorId": "50676902", "name": "R. Kumar"}]}, + {"paperId": "c87dfa8fe090bb7891bf03e0cad21813f1b35372", "externalIds": {"MAG": + "1532651989", "DBLP": "journals/mima/Shagrir97", "DOI": "10.1023/A:1008236522699", + "CorpusId": 28398589}, "corpusId": 28398589, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/c87dfa8fe090bb7891bf03e0cad21813f1b35372", + "title": "Two Dogmas of Computationalism", "abstract": null, "venue": "Minds + and Machines", "year": 2004, "referenceCount": 44, "citationCount": 21, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Minds and Machines", "pages": "321-344", "volume": "7"}, "authors": + [{"authorId": "1742013", "name": "Oron Shagrir"}]}, {"paperId": "9fd21a28324dfd2e7570188d200dcd239e884f4c", + "externalIds": {"MAG": "1622309749", "DOI": "10.1007/978-94-007-0171-7", "CorpusId": + 118475228}, "corpusId": 118475228, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9fd21a28324dfd2e7570188d200dcd239e884f4c", + "title": "Mathematical Foundations of Quantum Information and Computation + and Its Applications to Nano- and Bio-systems", "abstract": null, "venue": + "", "year": 2011, "referenceCount": 0, "citationCount": 130, "influentialCitationCount": + 8, "isOpenAccess": true, "openAccessPdf": {"url": "http://cds.cern.ch/record/1339573/files/978-94-007-0171-7_BookTOC.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "1685591", "name": "M. Ohya"}, {"authorId": + "3045058", "name": "I. Volovich"}]}, {"paperId": "45fd7ed9ba9896667cfb6d721e668f2f06792c17", + "externalIds": {"DBLP": "conf/mcu/Durand-Lose04", "MAG": "1839361949", "DOI": + "10.1007/978-3-540-31834-7_14", "CorpusId": 28859258}, "corpusId": 28859258, + "publicationVenue": {"id": "c70b16dd-3be4-41cc-8494-33d2b373f5b9", "name": + "Machines, Computations, and Universality", "type": "conference", "alternate_names": + ["Mach Comput Universality", "MCU"]}, "url": "https://www.semanticscholar.org/paper/45fd7ed9ba9896667cfb6d721e668f2f06792c17", + "title": "Abstract Geometrical Computation for Black Hole Computation", "abstract": + null, "venue": "Machines, Computations, and Universality", "year": 2004, "referenceCount": + 19, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-09-21", "journal": {"pages": "176-187"}, "authors": [{"authorId": "1387881959", + "name": "J. Durand-Lose"}]}, {"paperId": "a5d9f822d71cef748001c64454da000be693f79f", + "externalIds": {"MAG": "2178192088", "DBLP": "journals/jcss/KoblerSTT92", + "DOI": "10.1016/0022-0000(92)90022-B", "CorpusId": 124494939}, "corpusId": + 124494939, "publicationVenue": {"id": "fa71f5e5-b029-4311-ae45-2ade36048a5d", + "name": "Journal of computer and system sciences (Print)", "type": "journal", + "alternate_names": ["Journal of Computer and System Sciences", "J comput syst + sci (print", "J Comput Syst Sci"], "issn": "0022-0000", "url": "http://www.elsevier.com/locate/jcss", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00220000", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/a5d9f822d71cef748001c64454da000be693f79f", + "title": "Turing Machines with Few Accepting Computations and Low Sets for + PP", "abstract": null, "venue": "Journal of computer and system sciences (Print)", + "year": 1992, "referenceCount": 17, "citationCount": 67, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1992-04-01", "journal": {"name": "J. + Comput. Syst. Sci.", "pages": "272-286", "volume": "44"}, "authors": [{"authorId": + "1717013", "name": "J. K\u00f6bler"}, {"authorId": "1737337", "name": "U. + Sch\u00f6ning"}, {"authorId": "2872350", "name": "Seinosuke Toda"}, {"authorId": + "1698770", "name": "J. Tor\u00e1n"}]}, {"paperId": "623b68ced0acae6a1c49e44273ae7e539db167e1", + "externalIds": {"MAG": "610304474", "DOI": "10.1007/978-3-642-37225-4", "CorpusId": + 60381047}, "corpusId": 60381047, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/623b68ced0acae6a1c49e44273ae7e539db167e1", + "title": "Computing Nature: Turing Centenary Perspective", "abstract": null, + "venue": "", "year": 2013, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-03-22", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "1403731773", "name": "G. Dodig-Crnkovic"}, + {"authorId": "3308499", "name": "Raffaela Giovagnoli"}]}, {"paperId": "0453028e68581624ec68cfec70214231da8dbce7", + "externalIds": {"DBLP": "journals/tit/Solomonoff78", "MAG": "2090547656", + "DOI": "10.1109/TIT.1978.1055913", "CorpusId": 1673415}, "corpusId": 1673415, + "publicationVenue": {"id": "748e730b-add9-47ee-819d-8ae54e504ef9", "name": + "IEEE Transactions on Information Theory", "type": "journal", "alternate_names": + ["IEEE Trans Inf Theory"], "issn": "0018-9448", "url": "http://www.comm.utoronto.ca/trans-it/", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?puNumber=18", + "http://ieeexplore.ieee.org/servlet/opac?punumber=18"]}, "url": "https://www.semanticscholar.org/paper/0453028e68581624ec68cfec70214231da8dbce7", + "title": "Complexity-based induction systems: Comparisons and convergence + theorems", "abstract": "In 1964 the author proposed as an explication of {\\em + a priori} probability the probability measure induced on output strings by + a universal Turing machine with unidirectional output tape and a randomly + coded unidirectional input tape. Levin has shown that if tilde{P}''_{M}(x) + is an unnormalized form of this measure, and P(x) is any computable probability + measure on strings, x , then \\tilde{P}''_{M}\\geqCP(x) where C is a constant + independent of x . The corresponding result for the normalized form of this + measure, P''_{M} , is directly derivable from Willis'' probability measures + on nonuniversal machines. If the conditional probabilities of P''_{M} are + used to approximate those of P , then the expected value of the total squared + error in these conditional probabilities is bounded by -(1/2) \\ln C . With + this error criterion, and when used as the basis of a universal gambling scheme, + P''_{M} is superior to Cover''s measure b\\ast . When H\\ast\\equiv -\\log_{2} + P''_{M} is used to define the entropy of a rmite sequence, the equation H\\ast(x,y)= + H\\ast(x)+H^{\\ast}_{x}(y) holds exactly, in contrast to Chaitin''s entropy + definition, which has a nonvanishing error term in this equation.", "venue": + "IEEE Transactions on Information Theory", "year": 1978, "referenceCount": + 21, "citationCount": 403, "influentialCitationCount": 42, "isOpenAccess": + true, "openAccessPdf": {"url": "http://www.world.std.com/~rjs/solo1.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1978-07-01", "journal": {"name": "IEEE Trans. Inf. Theory", "pages": "422-432", + "volume": "24"}, "authors": [{"authorId": "1727567", "name": "R. Solomonoff"}]}, + {"paperId": "0818de61a2664344354c5411878212dfc7503ab5", "externalIds": {"MAG": + "2164898492", "DBLP": "journals/neco/WangHPPP10", "DOI": "10.1162/NECO_a_00022", + "CorpusId": 207686715, "PubMed": "20608870"}, "corpusId": 207686715, "publicationVenue": + {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", "name": "Neural Computation", + "type": "journal", "alternate_names": ["Neural Comput"], "issn": "0899-7667", + "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", "alternate_urls": + ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", "http://www.mitpressjournals.org/loi/neco", + "https://www.mitpressjournals.org/loi/neco"]}, "url": "https://www.semanticscholar.org/paper/0818de61a2664344354c5411878212dfc7503ab5", + "title": "Spiking Neural P Systems with Weights", "abstract": "A variant of + spiking neural P systems with positive or negative weights on synapses is + introduced, where the rules of a neuron fire when the potential of that neuron + equals a given value. The involved valuesweights, firing thresholds, potential + consumed by each rulecan be real (computable) numbers, rational numbers, integers, + and natural numbers. The power of the obtained systems is investigated. For + instance, it is proved that integers (very restricted: 1, 1 for weights, 1 + and 2 for firing thresholds, and as parameters in the rules) suffice for computing + all Turing computable sets of numbers in both the generative and the accepting + modes. When only natural numbers are used, a characterization of the family + of semilinear sets of numbers is obtained. It is shown that spiking neural + P systems with weights can efficiently solve computationally hard problems + in a nondeterministic way. Some open problems and suggestions for further + research are formulated.", "venue": "Neural Computation", "year": 2010, "referenceCount": + 25, "citationCount": 122, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://idus.us.es/bitstream/11441/68979/1/untitled.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2010-10-01", "journal": + {"name": "Neural Computation", "pages": "2615-2646", "volume": "22"}, "authors": + [{"authorId": "2152810851", "name": "Jun Wang"}, {"authorId": "1806151", "name": + "H. J. Hoogeboom"}, {"authorId": "7356533", "name": "L. Pan"}, {"authorId": + "1698119", "name": "G. Paun"}, {"authorId": "1393653632", "name": "M. P\u00e9rez-Jim\u00e9nez"}]}, + {"paperId": "fbd7d86101607c024264dbdaddb159b295ef5524", "externalIds": {"DBLP": + "conf/pods/HullS89", "MAG": "2016554463", "DOI": "10.1145/73721.73755", "CorpusId": + 16312188}, "corpusId": 16312188, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fbd7d86101607c024264dbdaddb159b295ef5524", + "title": "Untyped sets, invention, and computable queries", "abstract": "Conventional + database query languages are considered in the context of untyped sets. The + algebra without while has the expressive power of the typed complex object + algebra. The algebra plus while, and COL with untyped sets (under stratified + semantics or inflationary semantics) have the power of the computable queries. + The calculus has power beyond the computable queries; and is characterized + using the typed complex object calculus with invention. The Bancilhon-Khoshafian + calculus is also discussed. A technical tool, called \u201cgeneric Turing + machine\u201d, is introduced and used in several of the proofs.", "venue": + "PODS ''89", "year": 1989, "referenceCount": 24, "citationCount": 70, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/73721.73755", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1989-03-29", "journal": {"pages": "347-359"}, "authors": [{"authorId": "144837668", + "name": "R. Hull"}, {"authorId": "11254357", "name": "Jianwen Su"}]}, {"paperId": + "1ee1b96e66e2b1b3617f584c5f8343fcbcb19e8b", "externalIds": {"ArXiv": "0910.5564", + "MAG": "2133712735", "DBLP": "journals/acta/BergstraM12", "DOI": "10.1007/s00236-012-0154-2", + "CorpusId": 5407097}, "corpusId": 5407097, "publicationVenue": {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", + "name": "Acta Informatica", "type": "journal", "alternate_names": ["Acta Inform"], + "issn": "0001-5903", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/1ee1b96e66e2b1b3617f584c5f8343fcbcb19e8b", + "title": "Instruction sequence processing operators", "abstract": null, "venue": + "Acta Informatica", "year": 2009, "referenceCount": 48, "citationCount": 60, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://link.springer.com/content/pdf/10.1007%2Fs00236-012-0154-2.pdf", "status": + "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-12-22", "journal": {"name": "Scientific Reports", "volume": "5"}, "authors": - [{"authorId": "5903846", "name": "M. Asllani"}, {"authorId": "48664134", "name": - "D. M. Busiello"}, {"authorId": "1809355", "name": "T. Carletti"}, {"authorId": - "2334449", "name": "D. Fanelli"}, {"authorId": "4546397", "name": "Gwendoline - Planchon"}]}, {"paperId": "e73ffdc68ff5c2246168ee7e35a1b4a0e24b2df7", "externalIds": + "2009-10-29", "journal": {"name": "Acta Informatica", "pages": "139-172", + "volume": "49"}, "authors": [{"authorId": "1731564", "name": "J. Bergstra"}, + {"authorId": "4969584", "name": "K. Middelburg"}]}, {"paperId": "d33f94587c6485614d70bd03a040322a226cccde", + "externalIds": {"DBLP": "conf/nips/SchurmannMS04", "MAG": "2155757660", "CorpusId": + 11742987}, "corpusId": 11742987, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d33f94587c6485614d70bd03a040322a226cccde", + "title": "Edge of Chaos Computation in Mixed-Mode VLSI - A Hard Liquid", "abstract": + "Computation without stable states is a computing paradigm different from + Turing''s and has been demonstrated for various types of simulated neural + networks. This publication transfers this to a hardware implemented neural + network. Results of a software implementation are reproduced showing that + the performance peaks when the network exhibits dynamics at the edge of chaos. + The liquid computing approach seems well suited for operating analog computing + devices such as the used VLSI neural network.", "venue": "NIPS", "year": 2004, + "referenceCount": 8, "citationCount": 49, "influentialCitationCount": 2, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2004-12-01", + "journal": {"pages": "1201-1208"}, "authors": [{"authorId": "2984713", "name": + "F. Sch\u00fcrmann"}, {"authorId": "36245042", "name": "K. Meier"}, {"authorId": + "2138905", "name": "J. Schemmel"}]}, {"paperId": "eaeed172f2f9d927239ab0ef7b25c7b808d6c45f", + "externalIds": {"MAG": "2087485732", "DOI": "10.1143/PTPS.150.367", "CorpusId": + 123215544}, "corpusId": 123215544, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/eaeed172f2f9d927239ab0ef7b25c7b808d6c45f", + "title": "The Effect of Noise on Turing Patterns", "abstract": "The effect + of noise on pattern formation in Turing systems is studied. It is shown how + robustness of 2D patterns and 3D structures against noise depends on the characteristics + of the morphology. The effect of noise is of particular interest since Turing + systems are often used for explaining biological patterns or structures, which + have to be stable against noise.", "venue": "", "year": 2003, "referenceCount": + 1, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://academic.oup.com/ptps/article-pdf/doi/10.1143/PTPS.150.367/5247266/150-367.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2003-02-01", "journal": {"name": + "Progress of Theoretical Physics Supplement", "pages": "367-370", "volume": + "150"}, "authors": [{"authorId": "35202419", "name": "T. Lepp\u00e4nen"}, + {"authorId": "2155202", "name": "M. Karttunen"}, {"authorId": "37747895", + "name": "R. Barrio"}, {"authorId": "145670814", "name": "K. Kaski"}]}, {"paperId": + "84a8a311d4172f221f8495ec647258bb9449bfc0", "externalIds": {"MAG": "1517753179", + "CorpusId": 59902267}, "corpusId": 59902267, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/84a8a311d4172f221f8495ec647258bb9449bfc0", + "title": "Machines and Thought: The Legacy of Alan Turing, Volume I", "abstract": + null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 34, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}], "publicationTypes": null, "publicationDate": + "1997-02-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "144243903", "name": "P. Millican"}, {"authorId": "37700983", "name": "A. + Clark"}]}, {"paperId": "e73ffdc68ff5c2246168ee7e35a1b4a0e24b2df7", "externalIds": {"MAG": "2132399706", "DOI": "10.2110/pec.72.02.0108", "CorpusId": 130321013}, - "url": "https://www.semanticscholar.org/paper/e73ffdc68ff5c2246168ee7e35a1b4a0e24b2df7", + "corpusId": 130321013, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e73ffdc68ff5c2246168ee7e35a1b4a0e24b2df7", "title": "Criteria for Recognizing Lacustrine Rocks", "abstract": "Lacustrine deposits can be recognized through the use of a variety of criteria that include physical chemical and biologic aspects of sedimentary rocks Because large @@ -37277,73 +42080,108 @@ interactions: of physical properties of the deposits Lakes and seas can then be differentiated by geochemical and biologic criteria", "venue": "", "year": 1972, "referenceCount": 0, "citationCount": 92, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}, - {"category": "Geology", "source": "s2-fos-model"}, {"category": "Geography", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "93858621", + "openAccessPdf": null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": + "Geology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}, {"category": "Geology", "source": "s2-fos-model"}, {"category": + "Geography", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "93858621", "name": "M. Picard"}, {"authorId": "103413450", "name": "L. R. High"}]}, {"paperId": - "2ca4bb4178a5bfcb9a838783d9ae0c428f74cd66", "externalIds": {"MAG": "2914063330", - "CorpusId": 189454730}, "url": "https://www.semanticscholar.org/paper/2ca4bb4178a5bfcb9a838783d9ae0c428f74cd66", - "title": "Dynamics of Discrete Event Systems", "abstract": "We provide a mathematical - framework for the analysis of discrete dynamical systems. These are systems - with a discrete state spaces. We find that Hilbert spaces are the appropriate - spaces in which to embed the dynamics. In this formulation, it is possible - to define and write equations of motion for the system. Although Hilbert spaces - are generally associated with quantum systems in physics, they are employed - here in a purely classical manner; both dynamical evolution and results of - measurements are just as in classical mechanics. Two examples analysed are - Euclid''''s algorithm and the Turing machine.", "venue": "", "year": 1991, - "referenceCount": 0, "citationCount": 71, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1991-06-01", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2069605673", - "name": "Ravindra Rao"}]}, {"paperId": "5e53fe8e9ab1714ecbf4120f64fbfcb118d39045", - "externalIds": {"MAG": "2032304886", "DOI": "10.4236/JBISE.2011.44039", "CorpusId": - 44032428}, "url": "https://www.semanticscholar.org/paper/5e53fe8e9ab1714ecbf4120f64fbfcb118d39045", - "title": "Cardiac arrhythmias detection in an ECG beat signal using fast fourier - transform and artificial neural network", "abstract": "Cardiac Arrhythmias - shows a condition of abnor-mal electrical activity in the heart which is a - threat to humans. This paper presents a method to analyze electrocardiogram - (ECG) signal, extract the fea-tures, for the classification of heart beats - according to different arrhythmias. Data were obtained from 40 records of - the MIT-BIH arrhythmia database (only one lead). Cardiac arrhythmias which - are found are Tachycardia, Bradycardia, Supraventricular Tachycardia, Incomplete - Bundle Branch Block, Bundle Branch Block, Ventricular Tachycardia. A learning - dataset for the neural network was obtained from a twenty records set which - were manually classified using MIT-BIH Arrhythmia Database Directory and docu- - mentation, taking advantage of the professional experience of a cardiologist. - Fast Fourier transforms are used to identify the peaks in the ECG signal and - then Neural Networks are applied to identify the diseases. Levenberg Marquardt - Back-Propagation algorithm is used to train the network. The results obtained - have better efficiency then the previously proposed methods.", "venue": "", - "year": 2011, "referenceCount": 26, "citationCount": 132, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-04-20", "journal": {"name": - "Journal of Biomedical Science and Engineering", "pages": "289-296", "volume": - "04"}, "authors": [{"authorId": "72519612", "name": "Himanshu Gothwal"}, {"authorId": - "88528758", "name": "Silky Kedawat"}, {"authorId": "50676902", "name": "R. - Kumar"}]}, {"paperId": "158f3e4f505fdb9b2bc9e95701b2a7dd94ffe927", "externalIds": - {"MAG": "2139165575", "CorpusId": 46658149}, "url": "https://www.semanticscholar.org/paper/158f3e4f505fdb9b2bc9e95701b2a7dd94ffe927", - "title": "What Are Subtle Energies", "abstract": "A brief discussion is given - of a set of anomalous experimental phenomena that are inexplicable based only - on the four accepted forces oper- ating in the physical universe. Possible - explanations require defining the ex- istence of subtle energies. Using a - quantum mechanical description, the seat of subtle energy functioning is traced - to the vacuum state with magnetic vec- tor potential assuming the role of - bridge between the subtle energies and physical energies. A brief discussion - is given of how we might reliably detect subtle energies and a zeroth order - model of the subtle domains as substruc- ture for the vacuum state is given.", - "venue": "", "year": 1993, "referenceCount": 35, "citationCount": 71, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "4566718", "name": "W. - Tiller"}]}, {"paperId": "86dfaf771cb93817cc94f105d931cb8266b2619d", "externalIds": - {"MAG": "1991640369", "DBLP": "conf/pods/UllmanV88", "DOI": "10.1145/308386.308417", - "CorpusId": 2711739}, "url": "https://www.semanticscholar.org/paper/86dfaf771cb93817cc94f105d931cb8266b2619d", + "74d363f0d248d29c3bbc85b141c4b44f8c901148", "externalIds": {"MAG": "1964411237", + "DOI": "10.1016/S0167-2789(96)00132-7", "CorpusId": 120881244}, "corpusId": + 120881244, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/74d363f0d248d29c3bbc85b141c4b44f8c901148", + "title": "Turing pattern formation in heterogeneous media", "abstract": null, + "venue": "", "year": 1996, "referenceCount": 20, "citationCount": 22, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1996-12-15", "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": + "303-317", "volume": "99"}, "authors": [{"authorId": "2540331", "name": "J. + Voroney"}, {"authorId": "1774400", "name": "A. Lawniczak"}, {"authorId": "2433318", + "name": "R. Kapral"}]}, {"paperId": "63b960264ede407598e064559642a159f1ebb282", + "externalIds": {"MAG": "2161236690", "DOI": "10.1177/096032719501400708", + "CorpusId": 26355215, "PubMed": "7576821"}, "corpusId": 26355215, "publicationVenue": + {"id": "abd8a72f-156c-4e45-b922-233b4a04a400", "name": "Human and Experimental + Toxicology", "type": "journal", "alternate_names": ["Hum Exp Toxicol", "Hum + Exp Toxicol", "Human & Experimental Toxicology"], "issn": "0960-3271", "url": + "http://www.sagepub.com/journals/Journal201813/title", "alternate_urls": ["http://www.sagepub.com/journalsProdDesc.nav?prodId=Journal201813", + "https://journals.sagepub.com/home/het"]}, "url": "https://www.semanticscholar.org/paper/63b960264ede407598e064559642a159f1ebb282", + "title": "Extrapyramidal manifestations complicating organophosphorus insecticide + poisoning", "abstract": "Six patients who developed extrapyramidal manifesta + tions following poisoning with the organophosphorus (OP) insecticide fenthion + are reported. The extrapyramidal fea tures, in order of frequency, were dystonia, + rest tremor, cog-wheel rigidity, and choreo-athetosis. The delay in onset + of these signs, following poisoning, varied from 4 to 40 days, and they disappeared + spontaneously in about 1 to 4 weeks in those who survived. The human extrapyrami + dal system is rich in cholinergic neurons and acetyl cholinesterase (AChE). + Inhibition of AChE by fenthion, which has ready access to central neurons + on account of its lipid solubility, is postulated as the mechanism under lying + the extrapyramidal manifestations.", "venue": "Human and Experimental Toxicology", + "year": 1995, "referenceCount": 21, "citationCount": 69, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport"], "publicationDate": + "1995-07-01", "journal": {"name": "Human & Experimental Toxicology", "pages": + "600 - 604", "volume": "14"}, "authors": [{"authorId": "4044535", "name": + "N. Senanayake"}, {"authorId": "4603759", "name": "P. Sanmuganathan"}]}, {"paperId": + "5c41252db73e543bc6a4935e5743f6a85055d191", "externalIds": {"MAG": "2563014841", + "DBLP": "journals/jagi/Goertzel14", "DOI": "10.2478/jagi-2014-0001", "CorpusId": + 4794432}, "corpusId": 4794432, "publicationVenue": {"id": "1dfcf1f0-80c5-4324-b2a5-b12ae03ea631", + "name": "Journal of Artificial General Intelligence", "type": "journal", "alternate_names": + ["J Artif Gen Intell"], "issn": "1946-0163", "url": "http://journal.agi-network.org/Home/tabid/72/Default.aspx"}, + "url": "https://www.semanticscholar.org/paper/5c41252db73e543bc6a4935e5743f6a85055d191", + "title": "Artificial General Intelligence: Concept, State of the Art, and + Future Prospects", "abstract": "Abstract In recent years broad community of + researchers has emerged, focusing on the original ambitious goals of the AI + field - the creation and study of software or hardware systems with general + intelligence comparable to, and ultimately perhaps greater than, that of human + beings. This paper surveys this diverse community and its progress. Approaches + to defining the concept of Artificial General Intelligence (AGI) are reviewed + including mathematical formalisms, engineering, and biology inspired perspectives. + The spectrum of designs for AGI systems includes systems with symbolic, emergentist, + hybrid and universalist characteristics. Metrics for general intelligence + are evaluated, with a conclusion that, although metrics for assessing the + achievement of human-level AGI may be relatively straightforward (e.g. the + Turing Test, or a robot that can graduate from elementary school or university), + metrics for assessing partial progress remain more controversial and problematic.", + "venue": "Journal of Artificial General Intelligence", "year": 2014, "referenceCount": + 133, "citationCount": 127, "influentialCitationCount": 11, "isOpenAccess": + true, "openAccessPdf": {"url": "https://content.sciendo.com/downloadpdf/journals/jagi/5/1/article-p1.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2014-05-01", + "journal": {"name": "Journal of Artificial General Intelligence", "pages": + "1 - 48", "volume": "5"}, "authors": [{"authorId": "1738080", "name": "B. + Goertzel"}]}, {"paperId": "7d3f9a74a25f6beb52441ec527a4673c501ea6ee", "externalIds": + {"MAG": "2156197312", "DOI": "10.1172/JCI104792", "CorpusId": 46552996, "PubMed": + "13950294"}, "corpusId": 46552996, "publicationVenue": {"id": "8c9a9e1b-acf2-4274-8d73-6ea0ecd11fd1", + "name": "Journal of Clinical Investigation", "type": "journal", "alternate_names": + ["J Clin Investig"], "issn": "0021-9738", "url": "https://www.jci.org/", "alternate_urls": + ["http://www.jci.org/", "https://www.jci.org/archive", "http://www.jci.org/impact"]}, + "url": "https://www.semanticscholar.org/paper/7d3f9a74a25f6beb52441ec527a4673c501ea6ee", + "title": "The role of endotoxin during typhoid fever and tularemia in man. + I. Acquisition of tolerance to endotoxin.", "abstract": "ture seldom returned + to preinjection values. In such instances, the fever curves were extrapolated + to the base line. After control responses to pyrogen were obtained, each subj + ect was infected with one of the viable infectious agents. Responses to injection + of the same endotoxin were reassayed at various periods during convalescence. + In addition to the fever index, subj ective reactions (headache, chills, myalgia, + anorexia) following endotoxin administration were graded as follows: 1+ = + minimal, 2+ = moderate, 3+ = severe, and 4+ = extremely severe.", "venue": + "Journal of Clinical Investigation", "year": 1963, "referenceCount": 27, "citationCount": + 50, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.jci.org/articles/view/104792/files/pdf", "status": "BRONZE"}, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1963-07-01", "journal": + {"name": "The Journal of clinical investigation", "pages": "\n 1064-75\n ", + "volume": "42"}, "authors": [{"authorId": "13222880", "name": "S. E. Greisman"}, + {"authorId": "8564103", "name": "R. Hornick"}, {"authorId": "3325372", "name": + "F. A. Carozza"}, {"authorId": "5898910", "name": "T. Woodward"}]}, {"paperId": + "86dfaf771cb93817cc94f105d931cb8266b2619d", "externalIds": {"MAG": "1991640369", + "DBLP": "conf/pods/UllmanV88", "DOI": "10.1145/308386.308417", "CorpusId": + 2711739}, "corpusId": 2711739, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/86dfaf771cb93817cc94f105d931cb8266b2619d", "title": "The complexity of ordering subgoals", "abstract": "Selection of an appropriate order for the evaluation of subgoals in a logical rule frequently is essential for efficiency. We formulate the problem as one of feasible subgoal @@ -37352,209 +42190,153 @@ interactions: which appears to be far easier, in this case, than the more obvious reduction from exponential-time (ordinary) Turing machines", "venue": "PODS ''88", "year": 1988, "referenceCount": 10, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1988-03-01", "journal": {"pages": "74-81"}, "authors": - [{"authorId": "1742391", "name": "J. Ullman"}, {"authorId": "9083969", "name": - "Moshe Y. Vardi"}]}, {"paperId": "1c6fb3cdd832ae1ce97b4eaef8d36473da97279c", - "externalIds": {"DBLP": "journals/jacm/EsparzaGM16", "MAG": "2344785730", - "ArXiv": "1304.1185", "DOI": "10.1145/2842603", "CorpusId": 5080}, "url": - "https://www.semanticscholar.org/paper/1c6fb3cdd832ae1ce97b4eaef8d36473da97279c", - "title": "Parameterized Verification of Asynchronous Shared-Memory Systems", - "abstract": "We characterize the complexity of the safety verification problem - for parameterized systems consisting of a leader process and arbitrarily many - anonymous and identical contributors. Processes communicate through a shared, - bounded-value register. While each operation on the register is atomic, there - is no synchronization primitive to execute a sequence of operations atomically. - We analyze the complexity of the safety verification problem when processes - are modeled by finite-state machines, pushdown machines, and Turing machines. - The problem is coNP-complete when all processes are finite-state machines, - and is PSPACE-complete when they are pushdown machines. The complexity remains - coNP-complete when each Turing machine is allowed boundedly many interactions - with the register. Our proofs use combinatorial characterizations of computations - in the model, and in the case of pushdown systems, some language-theoretic - constructions of independent interest. Our results are surprising, because - parameterized verification problems on slight variations of our model are - known to be undecidable. For example, the problem is undecidable for finite-state - machines operating with synchronization primitives, and already for two communicating - pushdown machines. Thus, our results show that a robust, decidable class can - be obtained under the assumptions of anonymity and asynchrony.", "venue": - "International Conference on Computer Aided Verification", "year": 2013, "referenceCount": - 37, "citationCount": 59, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2013-04-03", "journal": {"name": "Journal of the ACM (JACM)", "pages": "1 - - 48", "volume": "63"}, "authors": [{"authorId": "145731218", "name": "J. - Esparza"}, {"authorId": "1692588", "name": "P. Ganty"}, {"authorId": "144029582", - "name": "R. Majumdar"}]}, {"paperId": "3cab6aac95e3f7df33dd17b76fb9fa5ecb52dd3f", - "externalIds": {"MAG": "78855793", "DOI": "10.5840/JPHIL2013110722", "CorpusId": - 169078100}, "url": "https://www.semanticscholar.org/paper/3cab6aac95e3f7df33dd17b76fb9fa5ecb52dd3f", - "title": "Rethinking Turing''s test", "abstract": null, "venue": "", "year": - 2013, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}], "publicationTypes": null, - "publicationDate": "2013-07-01", "journal": {"name": "The Journal of Philosophy", - "pages": "391-411", "volume": "110"}, "authors": [{"authorId": "144239027", - "name": "D. Proudfoot"}]}, {"paperId": "3a645d5e6b2a5c9ef56b1487210a826da051de72", - "externalIds": {"MAG": "2138889011", "DOI": "10.1093/JXB/49.322.775", "CorpusId": - 36604704}, "url": "https://www.semanticscholar.org/paper/3a645d5e6b2a5c9ef56b1487210a826da051de72", - "title": "How does water get through roots", "abstract": "uptake of water. - On the contrary, at low rates of transpiration such as during the night or - during stress conOn the basis of recent results with young primary ditions - (drought, high salinity, nutrient deprivation), maize roots, a model is proposed - for the movement of the apoplastic path will be less used and the hydraulic - water across roots. It is shown how the complex, \u2018com- resistance will - be high. The role of water channels posite anatomical structure\u2019 of roots - results in a \u2018com- (aquaporins) in the transcellular path is in the fine - posite transport\u2019 of both water and solutes. Parallel adjustment of water - flow or in the regulation of uptake apoplastic, symplastic and transcellular - pathways play in older, suberized parts of plant roots lacking a suban important - role during the passage of water across stantial apoplastic component. The - composite transthe different tissues. These are arranged in series port model - explains how plants are designed to within the root cylinder (epidermis, exodermis, - central optimize water uptake according to demands from the cortex, endodermis, - pericycle stelar parenchyma, and shoot and how external factors may influence - water tracheary elements). The contribution of these struc- passage across - roots. tures to the root\u2019s overall radial hydraulic resistance is examined. - It is shown that as soon as early metaxy- Key words: Composite transport model, - endodermis, exolem vessels mature, the axial (longitudinal) hydraulic dermis, - hydraulic conductivity, reflection coefficient, root, resistance within the - xylem is usually not rate-limiting. water, water channels. According to the - model, there is a rapid exchange of water between parallel radial pathways - because, in contrast to solutes such as nutrient ions, water per- Introduction - meates cell membranes readily. The roles of apoplastic One of the essential - functions of roots is to supply the barriers (Casparian bands and suberin - lamellae) in the shoot with water from the soil. The process of water root\u2019s - endo- and exodermis are discussed. The model", "venue": "", "year": 1998, - "referenceCount": 130, "citationCount": 879, "influentialCitationCount": 71, - "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Environmental Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-05-01", - "journal": {"name": "Journal of Experimental Botany", "pages": "775-788", - "volume": "49"}, "authors": [{"authorId": "6158419", "name": "E. Steudle"}, - {"authorId": "92424216", "name": "C. Peterson"}]}, {"paperId": "fbd7d86101607c024264dbdaddb159b295ef5524", - "externalIds": {"DBLP": "conf/pods/HullS89", "MAG": "2016554463", "DOI": "10.1145/73721.73755", - "CorpusId": 16312188}, "url": "https://www.semanticscholar.org/paper/fbd7d86101607c024264dbdaddb159b295ef5524", - "title": "Untyped sets, invention, and computable queries", "abstract": "Conventional - database query languages are considered in the context of untyped sets. The - algebra without while has the expressive power of the typed complex object - algebra. The algebra plus while, and COL with untyped sets (under stratified - semantics or inflationary semantics) have the power of the computable queries. - The calculus has power beyond the computable queries; and is characterized - using the typed complex object calculus with invention. The Bancilhon-Khoshafian - calculus is also discussed. A technical tool, called \u201cgeneric Turing - machine\u201d, is introduced and used in several of the proofs.", "venue": - "PODS ''89", "year": 1989, "referenceCount": 24, "citationCount": 70, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1988-03-01", "journal": {"pages": + "74-81"}, "authors": [{"authorId": "1742391", "name": "J. Ullman"}, {"authorId": + "9083969", "name": "Moshe Y. Vardi"}]}, {"paperId": "cc30ddbd58099e3f1d2a35b6a6682fcc6214c552", + "externalIds": {"MAG": "639105485", "CorpusId": 142478986}, "corpusId": 142478986, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc30ddbd58099e3f1d2a35b6a6682fcc6214c552", + "title": "Adult Development: A New Dimension in Psychodynamic Theory and Practice", + "abstract": "This volume is about the normal development of adulthood, as + weIl as its vieissitudes and the contributions of such development to psycho- + pathology. The authors are psychoanalysts of great dinieal skill and perceptiveness, + but while their focus is consistently a psychodynamie one, their conceptualizations + about adult developmental processes are applicable to virtually all kinds + of therapy. It is extraordinary how little attention has been paid to the + effects of adult developmental experience on mental development. Obviously + mental structures are not statie after the profound experiences of child- + hood and adolescence, nor are they merely a template upon whieh adult experiences + are processed. The authors dearly demonstrate that current adult experience + always adds to, and interacts with, existing mental structure, whieh is itself + the result of all preceding develop- ment. After a first section in whieh + they examine life cyde ideas on de- velopment from antiquity to the present, + they present their own work as it relates to adult experience and adult development. + Their hypoth- eses about the psychodynamie theory of adult development are + partie- ularly creative and an enormous contribution to the psychiatrie litera- + ture and the dinical understanding of patients. Consistent with their views + that development in adulthood is an ongoing and dynamic process, they elaborate + their ideas that childhood development is fo- cused primarily on the formation + of psychie structure while adult de- velopment is concerned with the continued + evolution of existing struc- ture and its use.", "venue": "", "year": 1981, + "referenceCount": 0, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1981-07-31", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3890942", + "name": "C. Colarusso"}, {"authorId": "11551516", "name": "R. Nemiroff"}]}, + {"paperId": "1f38707125c13ee1e3f68c6c5f5e4bc1f24f1672", "externalIds": {"MAG": + "2139196777", "DOI": "10.1017/S0140525X00000030", "CorpusId": 145093484}, + "corpusId": 145093484, "publicationVenue": {"id": "f51399af-b5cb-4819-9d81-57ec1d17ebf0", + "name": "Behavioral and Brain Sciences", "type": "journal", "alternate_names": + ["Behav Brain Sci"], "issn": "0140-525X", "url": "http://www.bbsonline.org/", + "alternate_urls": ["http://cambridge.org/bbs", "https://www.cambridge.org/core/journals/behavioral-and-brain-sciences", + "http://journals.cambridge.org/action/aboutTheJournal?jid=BBS", "http://journals.cambridge.org/action/displayJournal?jid=BBS"]}, + "url": "https://www.semanticscholar.org/paper/1f38707125c13ee1e3f68c6c5f5e4bc1f24f1672", + "title": "Modeling a paranoid mind", "abstract": "Abstract Algorithmic model + building in artificial intelligence provides a contemporary method for explaining + certain kinds of human behavior. The paranoid mode of thought and action represents + a kind of pathological behavior that has been well recognized for over twenty + centuries. This article describes a computer simulation model embodying a + theory that attempts to explain the paranoid mode of behavior in terms of + strategies for minimizing and forestalling shame-induced distress. The model + consists of two parts, a parsing module and an interpretation-action module. + To bring the model into contact with the conditions of a psychiatric diagnostic + interview, the parsing module attempts to understand the interview input of + clinicians communicating in unrestricted natural language. The meaning of + the input is passed to an interpretation-action module made up of data structures + and production rules that size up the current state of the interview and decide + which (linguistic) actions to perform in order to fulfill the model''s intentions. + This module consists of an object system which deals with interview situations + and a metasystem which evaluates how well the object system is performing + to attain its ends. The fidelity of the simulation has been tested using Turing-like + indistinguishability tests in which clinical judges attempt to distinguish + the paranoid model-patient from an actual paranoid patient. Since clinicians + are unable to make the relevant distinctions, the simulation is considered + successful at the input-output level of functional equivalence. Issues of + underlying structural equivalence and the nature of generative pattern explanations + are discussed in the light of the model''s potential value in guiding clinicial + decisions and intervention strategies in paranoid disorders.", "venue": "Behavioral + and Brain Sciences", "year": 1981, "referenceCount": 128, "citationCount": + 904, "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1981-12-01", + "journal": {"name": "Behavioral and Brain Sciences", "pages": "515 - 534", + "volume": "4"}, "authors": [{"authorId": "3123001", "name": "K. Colby"}]}, + {"paperId": "251fe21d88420e2dc0e208b975eb6267873a23e4", "externalIds": {"MAG": + "2000097933", "DBLP": "journals/nca/SongWZC14", "DOI": "10.1007/s00521-013-1397-8", + "CorpusId": 14691519}, "corpusId": 14691519, "publicationVenue": {"id": "702e18c0-c8c6-4800-a398-42aa159394d1", + "name": "Neural computing & applications (Print)", "type": "journal", "alternate_names": + ["Neural comput appl (print", "Neural Comput Appl", "Neural Computing and + Applications"], "issn": "0941-0643", "url": "https://link.springer.com/journal/521"}, + "url": "https://www.semanticscholar.org/paper/251fe21d88420e2dc0e208b975eb6267873a23e4", + "title": "Homogenous spiking neural P systems with anti-spikes", "abstract": + null, "venue": "Neural computing & applications (Print)", "year": 2014, "referenceCount": + 31, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1989-03-29", "journal": {"pages": "347-359"}, "authors": [{"authorId": "144837668", - "name": "R. Hull"}, {"authorId": "11254357", "name": "Jianwen Su"}]}, {"paperId": - "29aa3b1ec466d252fdb7634a5c9f1fd166234957", "externalIds": {"DBLP": "journals/corr/abs-cs-0511074", - "ArXiv": "cs/0511074", "MAG": "2952956456", "DOI": "10.1007/11780342_17", - "CorpusId": 10612983}, "url": "https://www.semanticscholar.org/paper/29aa3b1ec466d252fdb7634a5c9f1fd166234957", - "title": "Every Sequence Is Decompressible from a Random One", "abstract": - null, "venue": "Conference on Computability in Europe", "year": 2005, "referenceCount": - 41, "citationCount": 14, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-11-21", "journal": {"name": "ArXiv", "volume": "abs/cs/0511074"}, - "authors": [{"authorId": "145586123", "name": "David Doty"}]}, {"paperId": - "e56c6fefd28c2057070a7646a5aea85bb6527a68", "externalIds": {"MAG": "2022312530", - "DOI": "10.4236/AM.2012.331248", "CorpusId": 122166953}, "url": "https://www.semanticscholar.org/paper/e56c6fefd28c2057070a7646a5aea85bb6527a68", - "title": "Going beyond Computation and Its Limits: Injecting Cognition into - Computing", "abstract": "Cognition is the ability to process information, - apply knowledge, and change the circumstance. Cognition is associated with - intent and its accomplishment through various processes that monitor and control - a system and its environment. Cognition is associated with a sense of \u201cself\u201d - (the observer) and the systems with which it interacts (the environment or - the \u201cobserved\u201d). Cognition extensively uses time and history in - executing and regulating tasks that constitute a cognitive process. Whether - cognition is computation in the strict sense of adhering to Turing-Church - thesis or needs additional constructs is a very relevant question for addressing - the design of self-managing (autonomous) distributed computing systems. In - this paper we argue that cognition requires more than mere book-keeping provided - by the Turing machines and certain aspects of cognition such as self-identity, - self-description, self-monitoring and self-management can be implemented using - parallel extensions to current serial von-Neumann stored program control (SPC) - Turing machine implementations. We argue that the new DIME (Distributed Intelligent - Computing Element) computing model, recently introduced as the building block - of the DIME network architecture, is an analogue of Turing\u2019s O-machine - and extends it to implement a recursive managed distributed computing network, - which can be viewed as an interconnected group of such specialized Oracle - machines, referred to as a DIME network. The DIME network architecture provides - the architectural resiliency, which is often associated with cellular organisms, - through auto-failover; auto-scaling; live-migration; and end-to-end transaction - security assurance in a distributed system. We argue that the self-identity - and self-management processes of a DIME network inject the elements of cognition - into Turing machine based computing as is demonstrated by two prototypes eliminating - the complexity introduced by hypervisors, virtual machines and other layers - of ad-hoc management software in today\u2019s distributed computing environments.", - "venue": "", "year": 2012, "referenceCount": 34, "citationCount": 22, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer + "2014-06-01", "journal": {"name": "Neural Computing and Applications", "pages": + "1833-1841", "volume": "24"}, "authors": [{"authorId": "2001220881", "name": + "Tao Song"}, {"authorId": "2115535535", "name": "Xun Wang"}, {"authorId": + "2223579", "name": "Zhujin Zhang"}, {"authorId": "2144309054", "name": "Zhihua + Chen"}]}, {"paperId": "1772a04f8e5db77d69c8dd083761c1469f93ac2d", "externalIds": + {"DBLP": "journals/jetai/Wang07", "MAG": "2064372292", "DOI": "10.1080/09528130601143109", + "CorpusId": 7998138}, "corpusId": 7998138, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/1772a04f8e5db77d69c8dd083761c1469f93ac2d", + "title": "Three fundamental misconceptions of Artificial Intelligence", "abstract": + "In discussions on the limitations of Artificial Intelligence (AI), there + are three major misconceptions, identifying an AI system with an axiomatic + system, a Turing machine, or a system with a model-theoretic semantics. Though + these three notions can be used to describe a computer system for certain + purposes, they are not always the proper theoretical notions when an AI system + is under consideration. These misconceptions are not only the basis of many + criticisms of AI from the outside, but also responsible for many problems + within AI research. This paper analyses these misconceptions, and points out + the common root of them: treating empirical reasoning as mathematical reasoning. + Finally, an example intelligent system called NARS is introduced, which is + neither an axiomatic system nor a Turing machine in its problem-solving process, + and does not use model-theoretic semantics, but is still implementable in + an ordinary computer.", "venue": "Journal of experimental and theoretical + artificial intelligence (Print)", "year": 2007, "referenceCount": 83, "citationCount": + 33, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2007-09-01", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "249 - 268", "volume": "19"}, "authors": [{"authorId": + "48319476", "name": "Pei Wang"}]}, {"paperId": "ee2a011810b5442c28b66f97422564de02a4e319", + "externalIds": {"MAG": "3085332162", "DOI": "10.22148/001C.17212", "CorpusId": + 225035059}, "corpusId": 225035059, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ee2a011810b5442c28b66f97422564de02a4e319", + "title": "Can GPT-3 Pass a Writer\u2019s Turing Test?", "abstract": "Until + recently the field of natural language generation relied upon formalized grammar + systems, small-scale statistical models, and lengthy sets of heuristic rules. + This older technology was fairly limited and brittle: it could remix language + into word salad poems or chat with humans within narrowly defined topics. + Recently, very large-scale statistical language models have dramatically advanced + the field, and GPT-3 is just one example. It can internalize the rules of + language without explicit programming or rules. Instead, much like a human + child, GPT-3 learns language through repeated exposure, albeit on a much larger + scale. Without explicit rules, it can sometimes fail at the simplest of linguistic + tasks, but it can also excel at more difficult ones like imitating an author + or waxing philosophical.", "venue": "", "year": 2020, "referenceCount": 34, + "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://culturalanalytics.org/article/17212.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2012-11-27", "journal": {"name": "Applied Mathematics-a Journal of Chinese - Universities Series B", "pages": "1826-1835", "volume": "2012"}, "authors": - [{"authorId": "3289961", "name": "Rao V. Mikkilineni"}]}, {"paperId": "fd01f63539de2f6b53cf5824943aa251783c1ea6", - "externalIds": {"MAG": "2211107039", "DOI": "10.7863/jum.1987.6.4.217", "CorpusId": - 25047402, "PubMed": "3295289"}, "url": "https://www.semanticscholar.org/paper/fd01f63539de2f6b53cf5824943aa251783c1ea6", - "title": "Sonographic preoperative localization of a foreign body in the hand.", - "abstract": "Ultrasound of the superficial soft tissues has recently gained - wide acceptance and is currently used in the evaluation of muscles, tendons, - and superficial struc~ tures of the extremities. However, few studies have - yet been reported on the ultrasound examination of the distal extremities_ - I 6 We report a case of preoperative sonographic three-dimensional localization - of a foreign body in the hand_", "venue": "Journal of ultrasound in medicine", - "year": 1987, "referenceCount": 5, "citationCount": 38, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport"], - "publicationDate": "1987-04-01", "journal": {"name": "Journal of Ultrasound - in Medicine", "volume": "6"}, "authors": [{"authorId": "5492951", "name": - "B. Fornage"}, {"authorId": "3922075", "name": "F. Schernberg"}]}, {"paperId": - "84a8a311d4172f221f8495ec647258bb9449bfc0", "externalIds": {"MAG": "1517753179", - "CorpusId": 59902267}, "url": "https://www.semanticscholar.org/paper/84a8a311d4172f221f8495ec647258bb9449bfc0", - "title": "Machines and Thought: The Legacy of Alan Turing, Volume I", "abstract": - null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": 34, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}], "publicationTypes": null, "publicationDate": "1997-02-01", "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "144243903", "name": - "P. Millican"}, {"authorId": "37700983", "name": "A. Clark"}]}, {"paperId": - "83c272dd1ddd4b5043052aa1b3012c5f9245152b", "externalIds": {"MAG": "2047348160", - "DOI": "10.1016/S0025-5564(01)00087-6", "CorpusId": 7708091, "PubMed": "11779624"}, - "url": "https://www.semanticscholar.org/paper/83c272dd1ddd4b5043052aa1b3012c5f9245152b", - "title": "Transient dynamics and pattern formation: reactivity is necessary - for Turing instabilities.", "abstract": null, "venue": "Mathematical Biosciences", - "year": 2002, "referenceCount": 46, "citationCount": 70, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Mathematical biosciences", "pages": "\n 1-11\n ", - "volume": "175 1"}, "authors": [{"authorId": "2574314", "name": "M. Neubert"}, - {"authorId": "145404218", "name": "H. Caswell"}, {"authorId": "88251269", - "name": "J. Murray"}]}, {"paperId": "5045c73f6b9342a10bc565f4a1c0ed325fda53c3", - "externalIds": {"DBLP": "journals/amc/ChenWC20", "MAG": "3016540197", "DOI": - "10.1016/j.amc.2020.125300", "CorpusId": 218799129}, "url": "https://www.semanticscholar.org/paper/5045c73f6b9342a10bc565f4a1c0ed325fda53c3", - "title": "Spatiotemporal patterns induced by Turing and Turing-Hopf bifurcations - in a predator-prey system", "abstract": null, "venue": "Applied Mathematics - and Computation", "year": 2020, "referenceCount": 25, "citationCount": 18, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-09-01", "journal": {"name": "Appl. Math. Comput.", - "pages": "125300", "volume": "380"}, "authors": [{"authorId": "23167239", - "name": "Mengxin Chen"}, {"authorId": "91697488", "name": "R. Wu"}, {"authorId": - "30827668", "name": "Liping Chen"}]}]} + "2020-09-14", "journal": {"name": "", "pages": "17212", "volume": ""}, "authors": + [{"authorId": "116776856", "name": "Katherine Elkins"}, {"authorId": "1380792733", + "name": "Jon Chun"}]}]} ' headers: @@ -37563,31 +42345,31 @@ interactions: Connection: - keep-alive Content-Length: - - '169727' + - '188187' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:46 GMT + - Tue, 03 Jan 2023 20:53:14 GMT Via: - - 1.1 e571d0e9a63ed2d2b9146f9a13c97162.cloudfront.net (CloudFront) + - 1.1 b0cb9245c8703f606e2b3987ee6890c0.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - JemXDIRIA0g5LFP9iP9AlRvm82ggLNdL1VofTWWavNHVraM_JtY3Ew== + - AGLDqykycI5RVB5VNePfUP5azRfZHYlndztZ7gA6Omt5fYgATtxafQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detIZGZFPHcFz4g= + - eLxVFHgYvHcF8xA= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '169727' + - '188187' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:46 GMT + - Tue, 03 Jan 2023 20:53:14 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - ccc7e536-3d36-489a-804f-ffc14e6d016b + - 1eda8541-7663-4324-ad8b-fec54ae659c7 status: code: 200 message: OK @@ -37603,57 +42385,108 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1800&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1800&limit=100 response: body: - string: '{"total": 65539, "offset": 1800, "next": 1900, "data": [{"paperId": - "260f556b31ab59617e3171e5f53af82b68470a2a", "externalIds": {"MAG": "2023018700", - "DBLP": "journals/tjs/SergeyevG13", "ArXiv": "1307.3976", "DOI": "10.1007/s11227-013-0894-y", - "CorpusId": 13539210}, "url": "https://www.semanticscholar.org/paper/260f556b31ab59617e3171e5f53af82b68470a2a", - "title": "Single-tape and multi-tape Turing machines through the lens of the - Grossone methodology", "abstract": null, "venue": "Journal of Supercomputing", - "year": 2013, "referenceCount": 102, "citationCount": 55, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Physics", + string: '{"total": 65730, "offset": 1800, "next": 1900, "data": [{"paperId": + "1772a04f8e5db77d69c8dd083761c1469f93ac2d", "externalIds": {"DBLP": "journals/jetai/Wang07", + "MAG": "2064372292", "DOI": "10.1080/09528130601143109", "CorpusId": 7998138}, + "corpusId": 7998138, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/1772a04f8e5db77d69c8dd083761c1469f93ac2d", + "title": "Three fundamental misconceptions of Artificial Intelligence", "abstract": + "In discussions on the limitations of Artificial Intelligence (AI), there + are three major misconceptions, identifying an AI system with an axiomatic + system, a Turing machine, or a system with a model-theoretic semantics. Though + these three notions can be used to describe a computer system for certain + purposes, they are not always the proper theoretical notions when an AI system + is under consideration. These misconceptions are not only the basis of many + criticisms of AI from the outside, but also responsible for many problems + within AI research. This paper analyses these misconceptions, and points out + the common root of them: treating empirical reasoning as mathematical reasoning. + Finally, an example intelligent system called NARS is introduced, which is + neither an axiomatic system nor a Turing machine in its problem-solving process, + and does not use model-theoretic semantics, but is still implementable in + an ordinary computer.", "venue": "Journal of experimental and theoretical + artificial intelligence (Print)", "year": 2007, "referenceCount": 83, "citationCount": + 33, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2013-07-15", "journal": {"name": "The Journal of Supercomputing", "pages": - "645-663", "volume": "65"}, "authors": [{"authorId": "1713953", "name": "Y. - Sergeyev"}, {"authorId": "1764116", "name": "A. Garro"}]}, {"paperId": "9e6f0044c2891b4573aa82e9fedc10b1a5bfc34b", - "externalIds": {"MAG": "2400638541", "CorpusId": 114890094}, "url": "https://www.semanticscholar.org/paper/9e6f0044c2891b4573aa82e9fedc10b1a5bfc34b", - "title": "Framework for SCADA Security Policy", "abstract": "Modern automation - systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, - or SCADA) have myriad security vulnerabilities. Many of these relate directly - to inadequate security administration, which precludes truly effective and - sustainable security. Adequate security management mandates a clear administrative - struc- ture and enforcement hierarchy. The security policy is the root document, - with sections covering purpose, scope, posi- tions, responsibilities, references, - revision history, enforce- ment, and exceptions for various subjects relevant - for system security. It covers topics including the overall security risk - management program, data security, platforms, communica- tions, personnel, - configuration management, audit- ing/assessment, computer applications, physical - security, and manual operations. This article introduces an effective frame- - work for SCADA security policy.", "venue": "", "year": 2005, "referenceCount": - 4, "citationCount": 33, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "70411975", "name": "D. Kilman"}, - {"authorId": "144976812", "name": "J. Stamp"}]}, {"paperId": "b6afc2f1a96f9fce324661192bde95fac5c1227d", - "externalIds": {"DBLP": "conf/tamc/StephanY06", "MAG": "2516912329", "DOI": - "10.1007/11750321_72", "CorpusId": 18615984}, "url": "https://www.semanticscholar.org/paper/b6afc2f1a96f9fce324661192bde95fac5c1227d", - "title": "Lowness for Weakly 1-generic and Kurtz-Random", "abstract": null, - "venue": "Theory and Applications of Models of Computation", "year": 2006, - "referenceCount": 18, "citationCount": 37, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-05-15", "journal": {"pages": "756-764"}, "authors": [{"authorId": "1699450", - "name": "F. Stephan"}, {"authorId": "2804470", "name": "Liang Yu"}]}, {"paperId": - "b1178079b081e2d27c187a00feb88a59999ab0e6", "externalIds": {"MAG": "2167859786", - "DOI": "10.1146/ANNUREV.BB.15.060186.000303", "CorpusId": 38042984, "PubMed": - "2424472"}, "url": "https://www.semanticscholar.org/paper/b1178079b081e2d27c187a00feb88a59999ab0e6", + "2007-09-01", "journal": {"name": "Journal of Experimental & Theoretical Artificial + Intelligence", "pages": "249 - 268", "volume": "19"}, "authors": [{"authorId": + "48319476", "name": "Pei Wang"}]}, {"paperId": "e56c6fefd28c2057070a7646a5aea85bb6527a68", + "externalIds": {"MAG": "2022312530", "DOI": "10.4236/AM.2012.331248", "CorpusId": + 122166953}, "corpusId": 122166953, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e56c6fefd28c2057070a7646a5aea85bb6527a68", + "title": "Going beyond Computation and Its Limits: Injecting Cognition into + Computing", "abstract": "Cognition is the ability to process information, + apply knowledge, and change the circumstance. Cognition is associated with + intent and its accomplishment through various processes that monitor and control + a system and its environment. Cognition is associated with a sense of \u201cself\u201d + (the observer) and the systems with which it interacts (the environment or + the \u201cobserved\u201d). Cognition extensively uses time and history in + executing and regulating tasks that constitute a cognitive process. Whether + cognition is computation in the strict sense of adhering to Turing-Church + thesis or needs additional constructs is a very relevant question for addressing + the design of self-managing (autonomous) distributed computing systems. In + this paper we argue that cognition requires more than mere book-keeping provided + by the Turing machines and certain aspects of cognition such as self-identity, + self-description, self-monitoring and self-management can be implemented using + parallel extensions to current serial von-Neumann stored program control (SPC) + Turing machine implementations. We argue that the new DIME (Distributed Intelligent + Computing Element) computing model, recently introduced as the building block + of the DIME network architecture, is an analogue of Turing\u2019s O-machine + and extends it to implement a recursive managed distributed computing network, + which can be viewed as an interconnected group of such specialized Oracle + machines, referred to as a DIME network. The DIME network architecture provides + the architectural resiliency, which is often associated with cellular organisms, + through auto-failover; auto-scaling; live-migration; and end-to-end transaction + security assurance in a distributed system. We argue that the self-identity + and self-management processes of a DIME network inject the elements of cognition + into Turing machine based computing as is demonstrated by two prototypes eliminating + the complexity introduced by hypervisors, virtual machines and other layers + of ad-hoc management software in today\u2019s distributed computing environments.", + "venue": "", "year": 2012, "referenceCount": 34, "citationCount": 22, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.scirp.org/journal/PaperDownload.aspx?paperID=24761", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-11-27", + "journal": {"name": "Applied Mathematics-a Journal of Chinese Universities + Series B", "pages": "1826-1835", "volume": "2012"}, "authors": [{"authorId": + "3289961", "name": "Rao V. Mikkilineni"}]}, {"paperId": "a140110fad43cd206f753d75a803be9cd387b4ec", + "externalIds": {"MAG": "2098108180", "DOI": "10.1002/AJPA.1330840307", "CorpusId": + 46412792}, "corpusId": 46412792, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a140110fad43cd206f753d75a803be9cd387b4ec", + "title": "Demography of Propithecus verreauxi at Beza Mahafaly, Madagascar + : sex ratio, survival, and fertility, 1984-1988", "abstract": "Eighty-five + sifakas (Propithecus uerreauxi) have been cap- tured, marked, released, and + monitored between September 1984 and August 1988 at the Beza Mahafaly Special + Reserve in southwest Madagascar. Esti- mates are presented of the age and + sex structure of this population and of age-specific fertility and survival. + Using data from this and other studies, it is shown that sifaka tertiary sex + ratios do not depart significantly from 5050, but that they do differ significantly + from those of haplorhine primates, which have strongly female-biased tertiary + sex ratios. Two demographic mechanisms that could give rise to this distinction + are considered: 1) intermittently male-biased birth cohorts among sifakas + and 2) different patterns of survivor- ship in haplorhines and sifakas.", + "venue": "", "year": 1991, "referenceCount": 62, "citationCount": 125, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1991-03-01", "journal": {"name": "American Journal of Physical Anthropology", + "pages": "307-322", "volume": "84"}, "authors": [{"authorId": "143931978", + "name": "A. Richard"}, {"authorId": "14707209", "name": "P. Rakotomanga"}, + {"authorId": "37655397", "name": "M. Schwartz"}]}, {"paperId": "b1178079b081e2d27c187a00feb88a59999ab0e6", + "externalIds": {"MAG": "2167859786", "DOI": "10.1146/ANNUREV.BB.15.060186.000303", + "CorpusId": 38042984, "PubMed": "2424472"}, "corpusId": 38042984, "publicationVenue": + {"id": "928bf6c9-f9e1-4b6e-8059-8ec9d2f43c32", "name": "Annual Review of Biophysics + and Biophysical Chemistry", "alternate_names": ["Annu Rev Biophys Biophys + Chem"], "issn": "0084-6589", "url": "https://www.annualreviews.org/journal/biophys", + "alternate_urls": ["https://www.annualreviews.org/loi/biophys", "http://arjournals.annualreviews.org/loi/biophys"]}, + "url": "https://www.semanticscholar.org/paper/b1178079b081e2d27c187a00feb88a59999ab0e6", "title": "Halorhodopsin: a light-driven chloride ion pump.", "abstract": "Studies of bacteriorhodopsin over the past fourteen years have contributed in a special special way to our present understanding of ionic pumps and membrane proteins @@ -37669,108 +42502,133 @@ interactions: the halo bacteria contain other retinal proteins that are potentially as interesting as bacteriorhodopsin. One of", "venue": "Annual Review of Biophysics and Biophysical Chemistry", "year": 1986, "referenceCount": 0, "citationCount": 126, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": null, - "journal": {"name": "Annual review of biophysics and biophysical chemistry", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": + null, "journal": {"name": "Annual review of biophysics and biophysical chemistry", "pages": "\n 11-28\n ", "volume": "15"}, "authors": [{"authorId": - "6373896", "name": "J. Lanyi"}]}, {"paperId": "2715342eb24c5f9cfcf944ba306dbbfc628b3498", - "externalIds": {"DBLP": "journals/iandc/KariT96", "MAG": "2075622371", "DOI": - "10.1006/inco.1996.0091", "CorpusId": 9185146}, "url": "https://www.semanticscholar.org/paper/2715342eb24c5f9cfcf944ba306dbbfc628b3498", - "title": "Contextual Insertions/Deletions and Computability", "abstract": - "We investigate two generalizations of insertion and deletion of words, that - have recently become of interest in the context of molecular computing. Given - a pair of words (x, y), called a context, the (x, y)-contextual insertion - of a wordvinto a worduis performed as follows. For each occurrence ofxyas - a subword inu, we include in the result of the contextual insertion the words - obtained by insertingvintou, betweenxandy. The (x, y)-contextual deletion - operation is defined in a similar way. We study closure properties of the - Chomsky families under the defined operations, contextual ins-closed and del-closed - languages, and decidability of existence of solutions to equations involving - these operations. Moreover, we prove that every Turing machine can be simulated - by a system based entirely on contextual insertions and deletions", "venue": - "Information and Computation", "year": 1996, "referenceCount": 19, "citationCount": - 131, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-11-25", "journal": {"name": "Inf. - Comput.", "pages": "47-61", "volume": "131"}, "authors": [{"authorId": "144073818", - "name": "L. Kari"}, {"authorId": "2956645", "name": "G. Thierrin"}]}, {"paperId": - "cc30ddbd58099e3f1d2a35b6a6682fcc6214c552", "externalIds": {"MAG": "639105485", - "CorpusId": 142478986}, "url": "https://www.semanticscholar.org/paper/cc30ddbd58099e3f1d2a35b6a6682fcc6214c552", - "title": "Adult Development: A New Dimension in Psychodynamic Theory and Practice", - "abstract": "This volume is about the normal development of adulthood, as - weIl as its vieissitudes and the contributions of such development to psycho- - pathology. The authors are psychoanalysts of great dinieal skill and perceptiveness, - but while their focus is consistently a psychodynamie one, their conceptualizations - about adult developmental processes are applicable to virtually all kinds - of therapy. It is extraordinary how little attention has been paid to the - effects of adult developmental experience on mental development. Obviously - mental structures are not statie after the profound experiences of child- - hood and adolescence, nor are they merely a template upon whieh adult experiences - are processed. The authors dearly demonstrate that current adult experience - always adds to, and interacts with, existing mental structure, whieh is itself - the result of all preceding develop- ment. After a first section in whieh - they examine life cyde ideas on de- velopment from antiquity to the present, - they present their own work as it relates to adult experience and adult development. - Their hypoth- eses about the psychodynamie theory of adult development are - partie- ularly creative and an enormous contribution to the psychiatrie litera- - ture and the dinical understanding of patients. Consistent with their views - that development in adulthood is an ongoing and dynamic process, they elaborate - their ideas that childhood development is fo- cused primarily on the formation - of psychie structure while adult de- velopment is concerned with the continued - evolution of existing struc- ture and its use.", "venue": "", "year": 1981, - "referenceCount": 0, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1981-07-31", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "3890942", "name": "C. Colarusso"}, - {"authorId": "11551516", "name": "R. Nemiroff"}]}, {"paperId": "3d9d22207147b597c0cd19ec55468ec35f097979", - "externalIds": {"MAG": "2151505600", "DOI": "10.1051/FOREST:2000115", "CorpusId": - 55772746}, "url": "https://www.semanticscholar.org/paper/3d9d22207147b597c0cd19ec55468ec35f097979", - "title": "The effect of temperature and water stress on laboratory germination - of Eucalyptus globulus Labill. seeds of different sizes", "abstract": "Germination - rate and germination capacity of Eucalyptus globulusLabill. increased significantly - with increasing temper- ature (13o to 33 oC) for all seed sizes to an optimum - at 28 oC, then decreased. Biggest seeds generally germinated best at all te - mpera- tures. Germination was also very sensitive to water potential (0 to - -0.75 MPa), with no germination occuring at potentials belo w -0.25 MPa. Eucalyptus - globulus / germination / polyethylene glycol / seed size / temperature / water - potential", "venue": "", "year": 2000, "referenceCount": 28, "citationCount": - 48, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2000-03-01", "journal": {"name": "Annals of Forest - Science", "pages": "245-250", "volume": "57"}, "authors": [{"authorId": "32918764", - "name": "Mari\u00e1n L\u00f3pez"}, {"authorId": "5464837", "name": "J. Humara"}, - {"authorId": "12436154", "name": "A. Casares"}, {"authorId": "4015594", "name": - "J. Majada"}]}, {"paperId": "a140110fad43cd206f753d75a803be9cd387b4ec", "externalIds": - {"MAG": "2098108180", "DOI": "10.1002/AJPA.1330840307", "CorpusId": 46412792}, - "url": "https://www.semanticscholar.org/paper/a140110fad43cd206f753d75a803be9cd387b4ec", - "title": "Demography of Propithecus verreauxi at Beza Mahafaly, Madagascar - : sex ratio, survival, and fertility, 1984-1988", "abstract": "Eighty-five - sifakas (Propithecus uerreauxi) have been cap- tured, marked, released, and - monitored between September 1984 and August 1988 at the Beza Mahafaly Special - Reserve in southwest Madagascar. Esti- mates are presented of the age and - sex structure of this population and of age-specific fertility and survival. - Using data from this and other studies, it is shown that sifaka tertiary sex - ratios do not depart significantly from 5050, but that they do differ significantly - from those of haplorhine primates, which have strongly female-biased tertiary - sex ratios. Two demographic mechanisms that could give rise to this distinction - are considered: 1) intermittently male-biased birth cohorts among sifakas - and 2) different patterns of survivor- ship in haplorhines and sifakas.", - "venue": "", "year": 1991, "referenceCount": 62, "citationCount": 125, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1991-03-01", - "journal": {"name": "American Journal of Physical Anthropology", "pages": - "307-322", "volume": "84"}, "authors": [{"authorId": "143931978", "name": - "A. Richard"}, {"authorId": "14707209", "name": "P. Rakotomanga"}, {"authorId": - "37655397", "name": "M. Schwartz"}]}, {"paperId": "7a42159634f95ba5dc54eaf5beaf3f02ea74d6db", + "6373896", "name": "J. Lanyi"}]}, {"paperId": "9e6f0044c2891b4573aa82e9fedc10b1a5bfc34b", + "externalIds": {"MAG": "2400638541", "CorpusId": 114890094}, "corpusId": 114890094, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9e6f0044c2891b4573aa82e9fedc10b1a5bfc34b", + "title": "Framework for SCADA Security Policy", "abstract": "Modern automation + systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, + or SCADA) have myriad security vulnerabilities. Many of these relate directly + to inadequate security administration, which precludes truly effective and + sustainable security. Adequate security management mandates a clear administrative + struc- ture and enforcement hierarchy. The security policy is the root document, + with sections covering purpose, scope, posi- tions, responsibilities, references, + revision history, enforce- ment, and exceptions for various subjects relevant + for system security. It covers topics including the overall security risk + management program, data security, platforms, communica- tions, personnel, + configuration management, audit- ing/assessment, computer applications, physical + security, and manual operations. This article introduces an effective frame- + work for SCADA security policy.", "venue": "", "year": 2005, "referenceCount": + 4, "citationCount": 33, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "70411975", + "name": "D. Kilman"}, {"authorId": "144976812", "name": "J. Stamp"}]}, {"paperId": + "fd98aa8433afef1af7e25d8106726e43ecb3c163", "externalIds": {"MAG": "2001226073", + "DOI": "10.1177/048661347801000304", "CorpusId": 153416134}, "corpusId": 153416134, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd98aa8433afef1af7e25d8106726e43ecb3c163", + "title": "Two Sources of Uneven Development Under Advanced Capitalism: Spatial + Differentiation and Capital Mobility", "abstract": "Although capitalist penetration + results in a certain regional con vergence, uneven development does not disappear + under advanced capitalist conditions. Two sources of geographic unevenness + are spatial differentiation and capital mobility. Differentiation produces + a spatial mosaic in which the pieces are neither equal, autonomous, nor properly + considered \"underdeveloped.\" Mobil ity of capital means that capital may + use location as a strategy against labor, local development becomes more dependent + on outside capital, development comes and goes over time(\"Boomtownism\") + and capital generates a permanent reserve of stagnant places \u2014 a lumpengeography + of capital. These processes of uneven development are not principally owing + to flows of surplus value but to the struc turing of places as use-values + for capital, nor are the results particularly suscept ible to traditional + regional development policies. Labor''s appropriate strategies are several, + but must be aimed at finding an alternative to capitalist development not + toward a misguided effort to redress geographic differences.", "venue": "", + "year": 1978, "referenceCount": 32, "citationCount": 133, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], + "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1978-10-01", "journal": {"name": "Review of Radical Political + Economics", "pages": "28 - 38", "volume": "10"}, "authors": [{"authorId": + "66277007", "name": "Richard Walker"}]}, {"paperId": "29aa3b1ec466d252fdb7634a5c9f1fd166234957", + "externalIds": {"DBLP": "journals/corr/abs-cs-0511074", "ArXiv": "cs/0511074", + "MAG": "2952956456", "DOI": "10.1007/11780342_17", "CorpusId": 10612983}, + "corpusId": 10612983, "publicationVenue": {"id": "ce5f5d49-2807-4aa0-9db3-64a03084444d", + "name": "Conference on Computability in Europe", "type": "conference", "alternate_names": + ["CiE", "CIE", "International Conference on Computers and Industrial Engineering", + "Conf Comput Eur", "Int Conf Comput Ind Eng"], "url": "http://www.illc.uva.nl/CiE/"}, + "url": "https://www.semanticscholar.org/paper/29aa3b1ec466d252fdb7634a5c9f1fd166234957", + "title": "Every Sequence Is Decompressible from a Random One", "abstract": + null, "venue": "Conference on Computability in Europe", "year": 2005, "referenceCount": + 41, "citationCount": 14, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/cs/0511074", "status": "GREEN"}, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-11-21", "journal": {"name": "ArXiv", "volume": "abs/cs/0511074"}, + "authors": [{"authorId": "145586123", "name": "David Doty"}]}, {"paperId": + "c0221bf9b4109c2e90e06654007346d07cbd4598", "externalIds": {"MAG": "1989809102", + "DOI": "10.1093/bjps/axp038", "CorpusId": 120576390}, "corpusId": 120576390, + "publicationVenue": {"id": "ccf23a34-337a-4763-916a-9c16c580e0e1", "name": + "British Journal for the Philosophy of Science", "type": "journal", "alternate_names": + ["Br J Philos Sci", "The British Journal for the Philosophy of Science"], + "issn": "0007-0882", "url": "https://www.journals.uchicago.edu/toc/bjps/current", + "alternate_urls": ["https://www.jstor.org/journal/britjphilscie", "http://bjps.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/c0221bf9b4109c2e90e06654007346d07cbd4598", + "title": "SAD Computers and Two Versions of the Church\u2013Turing Thesis", + "abstract": "Recent work on hypercomputation has raised new objections against + the Church\u2013Turing Thesis. In this paper, I focus on the challenge posed + by a particular kind of hypercomputer, namely, SAD computers. I first consider + deterministic and probabilistic barriers to the physical possibility of SAD + computation. These suggest several ways to defend a Physical version of the + Church\u2013Turing Thesis. I then argue against Hogarth''s analogy between + non-Turing computability and non-Euclidean geometry, showing that it is a + non-sequitur. I conclude that the Effective version of the Church\u2013Turing + Thesis is unaffected by SAD computation. 1\u2003SAD Computability 1.1\u2003The + basic idea of SAD computation 1.2\u2003Avoiding supertasks 1.3\u2003Davies''s + model of SAD computation 1.4\u2003Hogarth''s model of SAD computation 1.5\u2003Generalizing + SAD computers 2\u2003Physical Computability 2.1\u2003The Physical Church\u2013Turing + Thesis 2.2\u2003Deterministic barriers to physical computation 2.3\u2003Probabilistic + barriers to physical computation 3\u2003Effective Computability 3.1\u2003The + Effective Church\u2013Turing Thesis 3.2\u2003Hogarth''s challenge to the Effective + Church\u2013Turing Thesis 3.3\u2003Arguing from SAD computability is a non-sequitur + 3.4\u2003SAD computability is built from finitary computability 4\u2003Concluding + Remarks 1\u2003SAD Computability 1.1\u2003The basic idea of SAD computation + 1.2\u2003Avoiding supertasks 1.3\u2003Davies''s model of SAD computation 1.4\u2003Hogarth''s + model of SAD computation 1.5\u2003Generalizing SAD computers 1.1\u2003The + basic idea of SAD computation 1.2\u2003Avoiding supertasks 1.3\u2003Davies''s + model of SAD computation 1.4\u2003Hogarth''s model of SAD computation 1.5\u2003Generalizing + SAD computers 2\u2003Physical Computability 2.1\u2003The Physical Church\u2013Turing + Thesis 2.2\u2003Deterministic barriers to physical computation 2.3\u2003Probabilistic + barriers to physical computation 2.1\u2003The Physical Church\u2013Turing + Thesis 2.2\u2003Deterministic barriers to physical computation 2.3\u2003Probabilistic + barriers to physical computation 3\u2003Effective Computability 3.1\u2003The + Effective Church\u2013Turing Thesis 3.2\u2003Hogarth''s challenge to the Effective + Church\u2013Turing Thesis 3.3\u2003Arguing from SAD computability is a non-sequitur + 3.4\u2003SAD computability is built from finitary computability 3.1\u2003The + Effective Church\u2013Turing Thesis 3.2\u2003Hogarth''s challenge to the Effective + Church\u2013Turing Thesis 3.3\u2003Arguing from SAD computability is a non-sequitur + 3.4\u2003SAD computability is built from finitary computability 4\u2003Concluding + Remarks", "venue": "British Journal for the Philosophy of Science", "year": + 2009, "referenceCount": 28, "citationCount": 12, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://osf.io/hywjz/download", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2009-12-01", "journal": {"name": "The British Journal for the Philosophy + of Science", "pages": "765 - 792", "volume": "60"}, "authors": [{"authorId": + "35076446", "name": "Tim Button"}]}, {"paperId": "7a42159634f95ba5dc54eaf5beaf3f02ea74d6db", "externalIds": {"MAG": "1538332098", "DBLP": "conf/sp/SchusterTLDSH15", "DOI": - "10.1109/SP.2015.51", "CorpusId": 10019945}, "url": "https://www.semanticscholar.org/paper/7a42159634f95ba5dc54eaf5beaf3f02ea74d6db", + "10.1109/SP.2015.51", "CorpusId": 10019945}, "corpusId": 10019945, "publicationVenue": + {"id": "29b9c461-963e-4d11-b2ab-92c182243942", "name": "IEEE Symposium on + Security and Privacy", "type": "conference", "alternate_names": ["S&P", "IEEE + Symp Secur Priv"], "url": "http://www.ieee-security.org/"}, "url": "https://www.semanticscholar.org/paper/7a42159634f95ba5dc54eaf5beaf3f02ea74d6db", "title": "Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications", "abstract": "Code reuse attacks such as return-oriented programming (ROP) have become prevalent techniques to exploit @@ -37793,65 +42651,111 @@ interactions: the design and implementation of future defenses against control flow hijacking attacks.", "venue": "IEEE Symposium on Security and Privacy", "year": 2015, "referenceCount": 58, "citationCount": 350, "influentialCitationCount": 61, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-05-17", "journal": + {"name": "2015 IEEE Symposium on Security and Privacy", "pages": "745-762"}, + "authors": [{"authorId": "145124099", "name": "Felix Schuster"}, {"authorId": + "3047690", "name": "Thomas Tendyck"}, {"authorId": "2279415", "name": "Christopher + Liebchen"}, {"authorId": "2597368", "name": "Lucas Davi"}, {"authorId": "145897166", + "name": "A. Sadeghi"}, {"authorId": "144227650", "name": "Thorsten Holz"}]}, + {"paperId": "3d9d22207147b597c0cd19ec55468ec35f097979", "externalIds": {"MAG": + "2151505600", "DOI": "10.1051/FOREST:2000115", "CorpusId": 55772746}, "corpusId": + 55772746, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3d9d22207147b597c0cd19ec55468ec35f097979", + "title": "The effect of temperature and water stress on laboratory germination + of Eucalyptus globulus Labill. seeds of different sizes", "abstract": "Germination + rate and germination capacity of Eucalyptus globulusLabill. increased significantly + with increasing temper- ature (13o to 33 oC) for all seed sizes to an optimum + at 28 oC, then decreased. Biggest seeds generally germinated best at all te + mpera- tures. Germination was also very sensitive to water potential (0 to + -0.75 MPa), with no germination occuring at potentials belo w -0.25 MPa. Eucalyptus + globulus / germination / polyethylene glycol / seed size / temperature / water + potential", "venue": "", "year": 2000, "referenceCount": 28, "citationCount": + 48, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "http://www.afs-journal.org/articles/forest/pdf/2000/03/f0305.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Environmental Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2000-03-01", + "journal": {"name": "Annals of Forest Science", "pages": "245-250", "volume": + "57"}, "authors": [{"authorId": "32918764", "name": "Mari\u00e1n L\u00f3pez"}, + {"authorId": "5464837", "name": "J. Humara"}, {"authorId": "12436154", "name": + "A. Casares"}, {"authorId": "4015594", "name": "J. Majada"}]}, {"paperId": + "48af054f46530ce997c8ab8c406f4e1c6ce95deb", "externalIds": {"MAG": "1995191236", + "DOI": "10.1007/s11538-008-9368-4", "CorpusId": 3925739, "PubMed": "19083063"}, + "corpusId": 3925739, "publicationVenue": {"id": "8a47ce78-e793-4315-8bf8-b09466ebf633", + "name": "Bulletin of Mathematical Biology", "type": "journal", "alternate_names": + ["Bull Math Biology"], "issn": "0092-8240", "url": "http://link.springer.com/journal/11538"}, + "url": "https://www.semanticscholar.org/paper/48af054f46530ce997c8ab8c406f4e1c6ce95deb", + "title": "Ratio-Dependent Predator-Prey Models of Interacting Populations", + "abstract": null, "venue": "Bulletin of Mathematical Biology", "year": 2009, + "referenceCount": 40, "citationCount": 124, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-02-01", "journal": {"name": "Bulletin of Mathematical Biology", "pages": + "430-452", "volume": "71"}, "authors": [{"authorId": "153708634", "name": + "M. Haque"}]}, {"paperId": "155ae4ad1ccc418917f6a255e5c9910bf30ed436", "externalIds": + {"DBLP": "journals/csur/Reddy96", "MAG": "2004058190", "DOI": "10.1145/234528.234736", + "CorpusId": 821561}, "corpusId": 821561, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/155ae4ad1ccc418917f6a255e5c9910bf30ed436", + "title": "Imperative functional programming", "abstract": "Our intuitive idea + of a function is that it describes the dependence of one quantity upon another. + There is no condition on what kind of quantities are involved. They could + be integers, Turing machines, binary search trees, window hierarchies, digital + circuits or whatever. The possibilities are endless. The idea of functional + programming is that functions are described applicatively, by plugging together + other functions. This recursive dependence of functions on other functions + bottoms out with the primitive operators. If the primitive operators are \u201ceffective,\u201d + i.e., they can be used to calculate, compute, construct or build one quantity + from another, then all functions expressed applicatively are similarly effective. + Imperative functional programming is the application of these ideas to imperative + computations. Quantities here are imperative computations and functions denote + dependences between imperative computations. Effectiveness of a function means + that a computation produced from it can be effectively carried out whenever + the input computations can be effectively carried out. It is often felt that + imperative computations and functional programming are in conflict. Adding + imperative computations to a functional programming language is found to destroy + its \u201creferential transparency.\u201d See, for example, [Abelson et al., + 1985, Sec. 3.1] for a discussion of the issue. However, in languages where + such issues arise, imperative computations are thrown together by extending + or modifying functional computation. The idea that functions denote dependences + is lost in the process. In contrast, imperative functional programming does + not involve altering functional computation in any way. It merely applies + it to a new context, that of imperative compu-", "venue": "CSUR", "year": + 1996, "referenceCount": 21, "citationCount": 357, "influentialCitationCount": + 15, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cs.bham.ac.uk/%7Eudr/papers/imperative-functional.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2015-05-17", "journal": {"name": "2015 IEEE Symposium - on Security and Privacy", "pages": "745-762"}, "authors": [{"authorId": "145124099", - "name": "Felix Schuster"}, {"authorId": "3047690", "name": "Thomas Tendyck"}, - {"authorId": "2279415", "name": "Christopher Liebchen"}, {"authorId": "2597368", - "name": "Lucas Davi"}, {"authorId": "145897166", "name": "A. Sadeghi"}, {"authorId": - "144227650", "name": "Thorsten Holz"}]}, {"paperId": "82c2e0c53e4d54ead87e17489f985733f070cd67", - "externalIds": {"DBLP": "conf/icalp/WeihrauchZ99", "MAG": "1524652636", "DOI": - "10.1007/3-540-48523-6_66", "CorpusId": 34264177}, "url": "https://www.semanticscholar.org/paper/82c2e0c53e4d54ead87e17489f985733f070cd67", - "title": "The Wave Propagator Is Turing Computable", "abstract": null, "venue": - "ICALP", "year": 1999, "referenceCount": 16, "citationCount": 18, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "1999-07-11", "journal": {"pages": "697-707"}, "authors": [{"authorId": "1696520", - "name": "K. Weihrauch"}, {"authorId": "2778649", "name": "Ning Zhong"}]}, - {"paperId": "3a645d5e6b2a5c9ef56b1487210a826da051de72", "externalIds": {"MAG": - "2138889011", "DOI": "10.1093/JXB/49.322.775", "CorpusId": 36604704}, "url": - "https://www.semanticscholar.org/paper/3a645d5e6b2a5c9ef56b1487210a826da051de72", - "title": "How does water get through roots", "abstract": "uptake of water. - On the contrary, at low rates of transpiration such as during the night or - during stress conOn the basis of recent results with young primary ditions - (drought, high salinity, nutrient deprivation), maize roots, a model is proposed - for the movement of the apoplastic path will be less used and the hydraulic - water across roots. It is shown how the complex, \u2018com- resistance will - be high. The role of water channels posite anatomical structure\u2019 of roots - results in a \u2018com- (aquaporins) in the transcellular path is in the fine - posite transport\u2019 of both water and solutes. Parallel adjustment of water - flow or in the regulation of uptake apoplastic, symplastic and transcellular - pathways play in older, suberized parts of plant roots lacking a suban important - role during the passage of water across stantial apoplastic component. The - composite transthe different tissues. These are arranged in series port model - explains how plants are designed to within the root cylinder (epidermis, exodermis, - central optimize water uptake according to demands from the cortex, endodermis, - pericycle stelar parenchyma, and shoot and how external factors may influence - water tracheary elements). The contribution of these struc- passage across - roots. tures to the root\u2019s overall radial hydraulic resistance is examined. - It is shown that as soon as early metaxy- Key words: Composite transport model, - endodermis, exolem vessels mature, the axial (longitudinal) hydraulic dermis, - hydraulic conductivity, reflection coefficient, root, resistance within the - xylem is usually not rate-limiting. water, water channels. According to the - model, there is a rapid exchange of water between parallel radial pathways - because, in contrast to solutes such as nutrient ions, water per- Introduction - meates cell membranes readily. The roles of apoplastic One of the essential - functions of roots is to supply the barriers (Casparian bands and suberin - lamellae) in the shoot with water from the soil. The process of water root\u2019s - endo- and exodermis are discussed. The model", "venue": "", "year": 1998, - "referenceCount": 130, "citationCount": 879, "influentialCitationCount": 71, - "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Environmental Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-05-01", - "journal": {"name": "Journal of Experimental Botany", "pages": "775-788", - "volume": "49"}, "authors": [{"authorId": "6158419", "name": "E. Steudle"}, - {"authorId": "92424216", "name": "C. Peterson"}]}, {"paperId": "d009a87ea5812e59fdac6968bd09de4a229fa673", + "publicationDate": "1996-06-01", "journal": {"name": "ACM Comput. Surv.", + "pages": "312-314", "volume": "28"}, "authors": [{"authorId": "145977333", + "name": "U. Reddy"}]}, {"paperId": "36cea212b33f3c7c7ffd0b017d0e44ef4ffce47e", + "externalIds": {"MAG": "17351815", "CorpusId": 140391251}, "corpusId": 140391251, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/36cea212b33f3c7c7ffd0b017d0e44ef4ffce47e", + "title": "Why Students Aren''t Learning Very Much from Textbooks.", "abstract": + "E minent researchers and schol arly organizations frequently re port on the + appalling ignorance of school-age American youth of im portant concepts and + knowledge in economics, history, geography, or sci ence (Cheney 1988, Ravitch + and Finn 1987;. The culprits named as accom plices to this embarrassing state + of affairs are many, but textbooks are often identified as a major contributor + to the general fund of ignorance Yet textbooks are a pervasive fea ture of + American classrooms Numer ous studies report that textbooks structure from + 75 to 90 percent of classroom instruction.'' In most subject areas, textbooks + define the scope and sequence of instruction, and the ac companying teacher + guides (especial ly at the elementary school level) pro vide a road map from + which few teachers make major detours", "venue": "", "year": 1989, "referenceCount": + 15, "citationCount": 127, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Educational Leadership", "pages": "14-17", "volume": + "47"}, "authors": [{"authorId": "69337915", "name": "H. Tyson"}, {"authorId": + "144382452", "name": "A. Woodward"}]}, {"paperId": "d009a87ea5812e59fdac6968bd09de4a229fa673", "externalIds": {"MAG": "2045349219", "DOI": "10.1524/zkri.216.7.361.20362", - "CorpusId": 97150505}, "url": "https://www.semanticscholar.org/paper/d009a87ea5812e59fdac6968bd09de4a229fa673", + "CorpusId": 97150505}, "corpusId": 97150505, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d009a87ea5812e59fdac6968bd09de4a229fa673", "title": "Determination, prediction, and understanding of structures, using the energy landscapes of chemical systems \u2013 Part II", "abstract": "Abstract In the past decade, new theoretical approaches have been developed to determine, @@ -37865,80 +42769,46 @@ interactions: structure analysis of zeolites, and structure determination of crystals from powder diffraction data.", "venue": "", "year": 2001, "referenceCount": 426, "citationCount": 70, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}, - {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "2001-06-01", "journal": {"name": "Zeitschrift - f\u00fcr Kristallographie - Crystalline Materials", "pages": "361 - 383", - "volume": "216"}, "authors": [{"authorId": "144640796", "name": "J. C. Sch\u00f6n"}, - {"authorId": "144690861", "name": "M. Jansen"}]}, {"paperId": "30210ef925d6a52a01a8752db791201658562511", - "externalIds": {"MAG": "2155447354", "DOI": "10.5194/ACP-10-10875-2010", "CorpusId": - 13365605}, "url": "https://www.semanticscholar.org/paper/30210ef925d6a52a01a8752db791201658562511", - "title": "Observed 20th century desert dust variability: Impact on climate - and biogeochemistry", "abstract": "Desert dust perturbs climate by directly - and in- directly interacting with incoming solar and outgoing long wave radiation, - thereby changing precipitation and tempera- ture, in addition to modifying - ocean and land biogeochem- istry. While we know that desert dust is sensitive - to pertur- bations in climate and human land use, previous studies have been - unable to determine whether humans were increasing or decreasing desert dust - in the global average. Here we present observational estimates of desert dust - based on pa- leodata proxies showing a doubling of desert dust during the - 20th century over much, but not all the globe. Large uncertainties remain - in estimates of desert dust variability over 20th century due to limited data. - Using these ob- servational estimates of desert dust change in combination - with ocean, atmosphere and land models, we calculate the net radiative effect - of these observed changes (top of at- mosphere) over the 20th century to be - 0.14\u00b1 0.11 W/m 2 (1990-1999 vs. 1905-1914). The estimated radiative change", - "venue": "", "year": 2010, "referenceCount": 113, "citationCount": 354, "influentialCitationCount": - 14, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2010-11-19", "journal": {"name": "Atmospheric Chemistry - and Physics", "pages": "10875-10893", "volume": "10"}, "authors": [{"authorId": - "3769463", "name": "N. Mahowald"}, {"authorId": "102999925", "name": "S. Kloster"}, - {"authorId": "102956215", "name": "S. Engelstaedter"}, {"authorId": "17290766", - "name": "J. K. Moore"}, {"authorId": "3450187", "name": "S. Mukhopadhyay"}, - {"authorId": "47370816", "name": "J. McConnell"}, {"authorId": "46391343", - "name": "S. Albani"}, {"authorId": "4291899", "name": "S. Doney"}, {"authorId": - "89358373", "name": "A. Bhattacharya"}, {"authorId": "144527028", "name": - "M. Curran"}, {"authorId": "5817228", "name": "M. Flanner"}, {"authorId": - "145905898", "name": "F. Hoffman"}, {"authorId": "11121337", "name": "D. Lawrence"}, - {"authorId": "144466953", "name": "K. Lindsay"}, {"authorId": "6678544", "name": - "P. Mayewski"}, {"authorId": "40017275", "name": "J. Neff"}, {"authorId": - "40409205", "name": "D. Rothenberg"}, {"authorId": "48738871", "name": "E. - Thomas"}, {"authorId": "2277213", "name": "P. Thornton"}, {"authorId": "2846488", - "name": "C. Zender"}]}, {"paperId": "107b062957ebd9314d15ce309550cd10c72a6817", - "externalIds": {"MAG": "325749582", "DOI": "10.1007/978-3-662-05642-4_12", - "CorpusId": 108014144}, "url": "https://www.semanticscholar.org/paper/107b062957ebd9314d15ce309550cd10c72a6817", - "title": "Can Machines Think", "abstract": null, "venue": "", "year": 2004, - "referenceCount": 14, "citationCount": 24, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "pages": "295-316", "volume": ""}, "authors": [{"authorId": "3329205", - "name": "D. Dennett"}]}, {"paperId": "9b14aa6e52174b6940504d005202edffbb021caa", - "externalIds": {"MAG": "1975222362", "DOI": "10.1515/9781400878215", "CorpusId": - 154000711}, "url": "https://www.semanticscholar.org/paper/9b14aa6e52174b6940504d005202edffbb021caa", - "title": "New England State Politics", "abstract": "A lively, fact-filled - study of New England state politics in which the author shows who has political - power and under what circumstances it can be used, who can nominate or influence - nomination for major offices, and who can pull great weight with the legisla-ture, - the governor, or administrators. \"With a sharp eye for the significant, Lockard - sets out in bold strokes the dominant features of the political systems of - these states. Nor does he pull his punches. Here are the rivalries among the - ethnic groups, the excesses of special interests, the weaknesses and strengths - of the political parties, the vicissitudes of the vanishing Yankee, all re-lated - with insight, humor, and compassion.\"\u2014 V. O. Key, Jr. 376 pages. Maps - & Charts. present state Scandinavian and offers conclusions to be from volume - disciplinary Political The first report North Atlantic Area (1957, $4.75). - pages,", "venue": "", "year": 1959, "referenceCount": 0, "citationCount": - 123, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1959-03-21", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "47417287", "name": "D. Lockard"}]}, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", + "source": "s2-fos-model"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2001-06-01", "journal": + {"name": "Zeitschrift f\u00fcr Kristallographie - Crystalline Materials", + "pages": "361 - 383", "volume": "216"}, "authors": [{"authorId": "144640796", + "name": "J. C. Sch\u00f6n"}, {"authorId": "144690861", "name": "M. Jansen"}]}, + {"paperId": "2715342eb24c5f9cfcf944ba306dbbfc628b3498", "externalIds": {"DBLP": + "journals/iandc/KariT96", "MAG": "2075622371", "DOI": "10.1006/inco.1996.0091", + "CorpusId": 9185146}, "corpusId": 9185146, "publicationVenue": {"id": "d8fc27e3-52dd-4758-bc70-1983b8a26797", + "name": "Information and Computation", "type": "journal", "alternate_names": + ["Inf Comput", "Information & Computation", "Inf Comput"], "issn": "0890-5401", + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/622844/description#description", + "alternate_urls": ["http://www.idealibrary.com/links/toc/inco", "http://iandc.csail.mit.edu/", + "http://www.sciencedirect.com/science/journal/08905401", "https://www.journals.elsevier.com/information-and-computation/"]}, + "url": "https://www.semanticscholar.org/paper/2715342eb24c5f9cfcf944ba306dbbfc628b3498", + "title": "Contextual Insertions/Deletions and Computability", "abstract": + "We investigate two generalizations of insertion and deletion of words, that + have recently become of interest in the context of molecular computing. Given + a pair of words (x, y), called a context, the (x, y)-contextual insertion + of a wordvinto a worduis performed as follows. For each occurrence ofxyas + a subword inu, we include in the result of the contextual insertion the words + obtained by insertingvintou, betweenxandy. The (x, y)-contextual deletion + operation is defined in a similar way. We study closure properties of the + Chomsky families under the defined operations, contextual ins-closed and del-closed + languages, and decidability of existence of solutions to equations involving + these operations. Moreover, we prove that every Turing machine can be simulated + by a system based entirely on contextual insertions and deletions", "venue": + "Information and Computation", "year": 1996, "referenceCount": 19, "citationCount": + 131, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-11-25", "journal": + {"name": "Inf. Comput.", "pages": "47-61", "volume": "131"}, "authors": [{"authorId": + "144073818", "name": "L. Kari"}, {"authorId": "2956645", "name": "G. Thierrin"}]}, {"paperId": "7d255bee3c8bf5345016b0be815e9c9b534a4e53", "externalIds": {"MAG": "1980925575", "DBLP": "journals/ijrr/BorrellyCEKPST98", "DOI": "10.1177/027836499801700403", - "CorpusId": 27485714}, "url": "https://www.semanticscholar.org/paper/7d255bee3c8bf5345016b0be815e9c9b534a4e53", + "CorpusId": 27485714}, "corpusId": 27485714, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7d255bee3c8bf5345016b0be815e9c9b534a4e53", "title": "The ORCCAD Architecture", "abstract": "The ORCCAD programming environment for robotic systems allows users to address automatic control laws in continuous time at the lower levels, and aspects of discrete-time logic at the higher @@ -37953,85 +42823,59 @@ interactions: at both levels. The approach is illustrated with an underwater inspection mission.", "venue": "Int. J. Robotics Res.", "year": 1998, "referenceCount": 41, "citationCount": 124, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1998-04-01", "journal": {"name": "The International Journal of Robotics Research", - "pages": "338 - 359", "volume": "17"}, "authors": [{"authorId": "40547861", - "name": "J. Borrelly"}, {"authorId": "1398706371", "name": "\u00c8. Coste-Mani\u00e8re"}, - {"authorId": "1792024", "name": "B. Espiau"}, {"authorId": "1808550", "name": - "K. Kapellos"}, {"authorId": "1402989104", "name": "R. Pissard-Gibollet"}, - {"authorId": "2150909977", "name": "D. Simon"}, {"authorId": "29404187", "name": - "Nicolas Turro"}]}, {"paperId": "9fd21a28324dfd2e7570188d200dcd239e884f4c", - "externalIds": {"MAG": "1622309749", "DOI": "10.1007/978-94-007-0171-7", "CorpusId": - 118475228}, "url": "https://www.semanticscholar.org/paper/9fd21a28324dfd2e7570188d200dcd239e884f4c", - "title": "Mathematical Foundations of Quantum Information and Computation - and Its Applications to Nano- and Bio-systems", "abstract": null, "venue": - "", "year": 2011, "referenceCount": 0, "citationCount": 124, "influentialCitationCount": - 8, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1685591", - "name": "M. Ohya"}, {"authorId": "3045058", "name": "I. Volovich"}]}, {"paperId": - "1f38707125c13ee1e3f68c6c5f5e4bc1f24f1672", "externalIds": {"MAG": "2139196777", - "DOI": "10.1017/S0140525X00000030", "CorpusId": 145093484}, "url": "https://www.semanticscholar.org/paper/1f38707125c13ee1e3f68c6c5f5e4bc1f24f1672", - "title": "Modeling a paranoid mind", "abstract": "Abstract Algorithmic model - building in artificial intelligence provides a contemporary method for explaining - certain kinds of human behavior. The paranoid mode of thought and action represents - a kind of pathological behavior that has been well recognized for over twenty - centuries. This article describes a computer simulation model embodying a - theory that attempts to explain the paranoid mode of behavior in terms of - strategies for minimizing and forestalling shame-induced distress. The model - consists of two parts, a parsing module and an interpretation-action module. - To bring the model into contact with the conditions of a psychiatric diagnostic - interview, the parsing module attempts to understand the interview input of - clinicians communicating in unrestricted natural language. The meaning of - the input is passed to an interpretation-action module made up of data structures - and production rules that size up the current state of the interview and decide - which (linguistic) actions to perform in order to fulfill the model''s intentions. - This module consists of an object system which deals with interview situations - and a metasystem which evaluates how well the object system is performing - to attain its ends. The fidelity of the simulation has been tested using Turing-like - indistinguishability tests in which clinical judges attempt to distinguish - the paranoid model-patient from an actual paranoid patient. Since clinicians - are unable to make the relevant distinctions, the simulation is considered - successful at the input-output level of functional equivalence. Issues of - underlying structural equivalence and the nature of generative pattern explanations - are discussed in the light of the model''s potential value in guiding clinicial - decisions and intervention strategies in paranoid disorders.", "venue": "Behavioral - and Brain Sciences", "year": 1981, "referenceCount": 128, "citationCount": - 902, "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1981-12-01", "journal": {"name": - "Behavioral and Brain Sciences", "pages": "515 - 534", "volume": "4"}, "authors": - [{"authorId": "3123001", "name": "K. Colby"}]}, {"paperId": "7c3d2725b02a6bba71e6e5409bf102c9937c7442", - "externalIds": {"MAG": "1494763707", "DOI": "10.1007/BF00117388", "CorpusId": - 34052091}, "url": "https://www.semanticscholar.org/paper/7c3d2725b02a6bba71e6e5409bf102c9937c7442", - "title": "A marine bacterial strain effective in producing antagonisms of - other bacteria", "abstract": null, "venue": "Aquaculture International", "year": - 1996, "referenceCount": 7, "citationCount": 36, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-09-01", - "journal": {"name": "Aquaculture International", "pages": "289-291", "volume": - "4"}, "authors": [{"authorId": "2053208985", "name": "C. Ruiz"}, {"authorId": - "144513692", "name": "G. Rom\u00e1n"}, {"authorId": "2158145395", "name": - "J. L. S\u00e1nchez"}]}, {"paperId": "3c503134aefa9778eb5322eb4f856c37a7651db3", - "externalIds": {"MAG": "2057796887", "DOI": "10.1007/S11071-012-0374-6", "CorpusId": - 14953518}, "url": "https://www.semanticscholar.org/paper/3c503134aefa9778eb5322eb4f856c37a7651db3", - "title": "Spatial patterns of a predator-prey model with cross diffusion", - "abstract": null, "venue": "", "year": 2012, "referenceCount": 23, "citationCount": - 69, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2012-03-13", "journal": {"name": "Nonlinear Dynamics", - "pages": "1631-1638", "volume": "69"}, "authors": [{"authorId": "47334108", - "name": "Gui\u2010Quan Sun"}, {"authorId": "145752193", "name": "Zhen Jin"}, - {"authorId": "103314097", "name": "Li Li"}, {"authorId": "153708634", "name": - "M. Haque"}, {"authorId": "32812702", "name": "Bai-lian Li"}]}, {"paperId": - "22b65eebec33b89ec912054b4c4ec3d963960ab0", "externalIds": {"MAG": "2018076297", - "DOI": "10.1037/0033-295X.96.2.358", "CorpusId": 18511760}, "url": "https://www.semanticscholar.org/paper/22b65eebec33b89ec912054b4c4ec3d963960ab0", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1998-04-01", "journal": {"name": "The International Journal + of Robotics Research", "pages": "338 - 359", "volume": "17"}, "authors": [{"authorId": + "40547861", "name": "J. Borrelly"}, {"authorId": "1398706371", "name": "\u00c8. + Coste-Mani\u00e8re"}, {"authorId": "1792024", "name": "B. Espiau"}, {"authorId": + "1808550", "name": "K. Kapellos"}, {"authorId": "1402989104", "name": "R. + Pissard-Gibollet"}, {"authorId": "2150909977", "name": "D. Simon"}, {"authorId": + "29404187", "name": "Nicolas Turro"}]}, {"paperId": "fba31f3feb4c5be4928b1604db56996c4f65c33d", + "externalIds": {"MAG": "2036941684", "DOI": "10.3144/EXPRESSPOLYMLETT.2008.50", + "CorpusId": 53407179}, "corpusId": 53407179, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fba31f3feb4c5be4928b1604db56996c4f65c33d", + "title": "The effects of acetylation on properties of flax fibre and its polypropylene + composites", "abstract": "Flax fibre was modified with acetylation. The influence + of the acetylation on the structure and properties of flax fibre were investigated + as well as modified flax fibre reinforced polypropylene composites were also + prepared. The catalyst was used to accelerate acetylation reaction rate. Flax + fibre was characterised after modification. Surface morphology, mois- ture + absorption property, components content, degree of polymerisation, crystallinity + of cellulose and thermal stability of flax fibres were studied. Due to acetylation, + the flax fibre surface morphology and moisture resistance properties improved + remarkably. Flax fibre (modified and unmodified) reinforced polypropylene + composites were fabricated with 30 wt% fibre loading. The mechanical properties + were investigated for those composites. Tensile and flexural strengths of + composites were found to increase with increasing degree of acetylation up + to 18% and then decreased. Charpy impact strengths of composites were found + to decrease with increasing degree of acetylation. Owing to addition of coupling + agent (maleated polypropylene -MAH), the tensile and flexural strength properties + were found to increase in between 20 to 35% depending on degree of acetylation.", + "venue": "", "year": 2008, "referenceCount": 22, "citationCount": 380, "influentialCitationCount": + 12, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}, + {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Express Polymer Letters", + "pages": "413-422", "volume": "2"}, "authors": [{"authorId": "21662177", "name": + "A. B\u0142\u0119dzki"}, {"authorId": "1398718814", "name": "A. Mamun"}, {"authorId": + "1403162739", "name": "M. Lucka-Gabor"}, {"authorId": "12320026", "name": + "V. Gutowski"}, {"authorId": "113452053", "name": "Highett Melbourne"}]}, + {"paperId": "107b062957ebd9314d15ce309550cd10c72a6817", "externalIds": {"MAG": + "325749582", "DOI": "10.1007/978-3-662-05642-4_12", "CorpusId": 108014144}, + "corpusId": 108014144, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/107b062957ebd9314d15ce309550cd10c72a6817", + "title": "Can Machines Think", "abstract": null, "venue": "", "year": 2004, + "referenceCount": 14, "citationCount": 24, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "295-316", "volume": ""}, "authors": + [{"authorId": "3329205", "name": "D. Dennett"}]}, {"paperId": "22b65eebec33b89ec912054b4c4ec3d963960ab0", + "externalIds": {"MAG": "2018076297", "DOI": "10.1037/0033-295X.96.2.358", + "CorpusId": 18511760}, "corpusId": 18511760, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/22b65eebec33b89ec912054b4c4ec3d963960ab0", "title": "Hopelessness depression: A theory-based subtype of depression.", "abstract": "Summary and Future Directions On the basis of the aforementioned studies, the hopelessnesstheory appears promising. However, further research @@ -38069,127 +42913,42 @@ interactions: may be one of many pathways to a final common out-come of depression. In this case, it would be more compellingto speak of a hopelessness cause, as opposed to a hopelessnesssubtype, of depression.", "venue": "", "year": 1989, "referenceCount": - 134, "citationCount": 3410, "influentialCitationCount": 222, "isOpenAccess": - false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1989-04-01", "journal": {"name": - "Psychological Review", "pages": "358-372", "volume": "96"}, "authors": [{"authorId": - "2294629", "name": "L. Abramson"}, {"authorId": "5188561", "name": "G. Metalsky"}, - {"authorId": "4414164", "name": "L. Alloy"}]}, {"paperId": "50f8564e96cfdc5560dd4392c172b68067034bf8", - "externalIds": {"MAG": "1583193753", "DBLP": "conf/cocoon/Martin-VidePPR02", - "DOI": "10.1007/3-540-45655-4_32", "CorpusId": 16336248}, "url": "https://www.semanticscholar.org/paper/50f8564e96cfdc5560dd4392c172b68067034bf8", - "title": "A New Class of Symbolic Abstract Neural Nets: Tissue P Systems", - "abstract": null, "venue": "International Computing and Combinatorics Conference", - "year": 2002, "referenceCount": 24, "citationCount": 125, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2002-08-15", "journal": {"pages": "290-299"}, - "authors": [{"authorId": "1397242142", "name": "C. Mart\u00edn-Vide"}, {"authorId": - "143716007", "name": "J. Pazos"}, {"authorId": "1698119", "name": "G. Paun"}, - {"authorId": "1397793046", "name": "A. Rodr\u00edguez-Pat\u00f3n"}]}, {"paperId": - "181e3095619217e122aba2100a58ee6f26c0b458", "externalIds": {"MAG": "2041054457", - "DBLP": "journals/isci/InoueT79b", "DOI": "10.1016/0020-0255(79)90017-3", - "CorpusId": 28806872}, "url": "https://www.semanticscholar.org/paper/181e3095619217e122aba2100a58ee6f26c0b458", - "title": "Three-way tape-bounded two-dimensional turing machines", "abstract": - null, "venue": "Information Sciences", "year": 1979, "referenceCount": 8, - "citationCount": 31, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1979-04-01", "journal": {"name": "Inf. Sci.", "pages": "195-220", "volume": - "17"}, "authors": [{"authorId": "1737209", "name": "Katsushi Inoue"}, {"authorId": - "2339053", "name": "I. Takanami"}]}, {"paperId": "36cea212b33f3c7c7ffd0b017d0e44ef4ffce47e", - "externalIds": {"MAG": "17351815", "CorpusId": 140391251}, "url": "https://www.semanticscholar.org/paper/36cea212b33f3c7c7ffd0b017d0e44ef4ffce47e", - "title": "Why Students Aren''t Learning Very Much from Textbooks.", "abstract": - "E minent researchers and schol arly organizations frequently re port on the - appalling ignorance of school-age American youth of im portant concepts and - knowledge in economics, history, geography, or sci ence (Cheney 1988, Ravitch - and Finn 1987;. The culprits named as accom plices to this embarrassing state - of affairs are many, but textbooks are often identified as a major contributor - to the general fund of ignorance Yet textbooks are a pervasive fea ture of - American classrooms Numer ous studies report that textbooks structure from - 75 to 90 percent of classroom instruction.'' In most subject areas, textbooks - define the scope and sequence of instruction, and the ac companying teacher - guides (especial ly at the elementary school level) pro vide a road map from - which few teachers make major detours", "venue": "", "year": 1989, "referenceCount": - 15, "citationCount": 127, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Educational - Leadership", "pages": "14-17", "volume": "47"}, "authors": [{"authorId": "69337915", - "name": "H. Tyson"}, {"authorId": "144382452", "name": "A. Woodward"}]}, {"paperId": - "a2ae95b5f4eb0c61c45522b2498004b16c8a19f8", "externalIds": {"DBLP": "conf/cie/NemetiA06", - "MAG": "1537930773", "DOI": "10.1007/11780342_42", "CorpusId": 421377}, "url": - "https://www.semanticscholar.org/paper/a2ae95b5f4eb0c61c45522b2498004b16c8a19f8", - "title": "Can General Relativistic Computers Break the Turing Barrier?", "abstract": - null, "venue": "CiE", "year": 2006, "referenceCount": 30, "citationCount": - 25, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-06-30", "journal": {"pages": "398-412"}, "authors": - [{"authorId": "1778493", "name": "I. N\u00e9meti"}, {"authorId": "2639641", - "name": "H. Andr\u00e9ka"}]}, {"paperId": "48af054f46530ce997c8ab8c406f4e1c6ce95deb", - "externalIds": {"MAG": "1995191236", "DOI": "10.1007/s11538-008-9368-4", "CorpusId": - 3925739, "PubMed": "19083063"}, "url": "https://www.semanticscholar.org/paper/48af054f46530ce997c8ab8c406f4e1c6ce95deb", - "title": "Ratio-Dependent Predator-Prey Models of Interacting Populations", - "abstract": null, "venue": "Bulletin of Mathematical Biology", "year": 2009, - "referenceCount": 40, "citationCount": 122, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-02-01", "journal": {"name": "Bulletin - of Mathematical Biology", "pages": "430-452", "volume": "71"}, "authors": - [{"authorId": "153708634", "name": "M. Haque"}]}, {"paperId": "8769f9464dcbe263c425256749f0751edade1fe3", - "externalIds": {"MAG": "3037410039", "DBLP": "conf/stoc/DurandLS01", "ArXiv": - "cs/0107008", "DOI": "10.1145/380752.380880", "CorpusId": 1693}, "url": "https://www.semanticscholar.org/paper/8769f9464dcbe263c425256749f0751edade1fe3", - "title": "Complex tilings", "abstract": "We study the minimal complexity of - tilings of a plane with a given tile set. We note that any tile set admits - either no tiling or some tiling with \\ooo(n) Kolmogorov - complexity of its (n\\times n)-squares. We construct tile - sets for which this bound is nearly tight: all tilings have complexity >n/r(n), - given any unbounded computable monotone r. This adds a quantitative - angle to classical results on non-recursivity of tilings -- that we also develop - in terms of Turing degrees of unsolvability.", "venue": "Symposium on the - Theory of Computing", "year": 2001, "referenceCount": 29, "citationCount": - 68, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2001-07-04", "journal": {"name": "Journal - of Symbolic Logic", "pages": "593 - 613", "volume": "73"}, "authors": [{"authorId": - "34998745", "name": "B. Durand"}, {"authorId": "27941605", "name": "L. Levin"}, - {"authorId": "143786875", "name": "A. Shen"}]}, {"paperId": "f1324898af0815f0742933161a24c76140416345", - "externalIds": {"MAG": "2173001758", "DOI": "10.1300/J130v06n01_02", "CorpusId": - 163041440}, "url": "https://www.semanticscholar.org/paper/f1324898af0815f0742933161a24c76140416345", - "title": "Features of Tradi tional Arab Management and Organization in the - Jordan Business Environment", "abstract": "Abstract Re search into Arab man - age ment and or ga ni za tion is recent and en tails a con tra dic tory vi - sion about what type of man age ment is found in Arab busi ness or ga ni za - tions. This pa per sug gests that at this in-cip i ent stage of re search - into Arab man age ment and or ga ni za tion, the pri mary ob jec tive of re - search should be to ex plore the main fea tures of Arab man age ment in an - at tempt to de velop Arab man age ment and ad -vance its or ga ni za tion. - The pa per, based on the out come of a com par ative em pir i cal re search, - takes into con sid er ation ma jor the o ret i cal and meth od olog i cal - short com ings of re lated re search and at tempts to build a \u2018bal anced\u2019 - pic ture of Arab man age ment and or ga ni za tion. Evidence in di cates that - Arab man age ment and or ga ni za tion in Jor dan are, largely, tra di tional - and man i fested in spe cific fea tures (lim ited future ori en ta tion and - ex ces sive lack of del e ga tion of au thor ity) re flect ing on their sys - tems and prac tices.", "venue": "", "year": 2001, "referenceCount": 73, "citationCount": - 30, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2001-09-01", "journal": {"name": "Journal of Transnational - Management Development", "pages": "27 - 53", "volume": "6"}, "authors": [{"authorId": - "1455106739", "name": "A. Al-Rasheed"}]}, {"paperId": "1c6fb3cdd832ae1ce97b4eaef8d36473da97279c", + 134, "citationCount": 3415, "influentialCitationCount": 223, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-04-01", + "journal": {"name": "Psychological Review", "pages": "358-372", "volume": + "96"}, "authors": [{"authorId": "2294629", "name": "L. Abramson"}, {"authorId": + "5188561", "name": "G. Metalsky"}, {"authorId": "4414164", "name": "L. Alloy"}]}, + {"paperId": "9b14aa6e52174b6940504d005202edffbb021caa", "externalIds": {"MAG": + "1975222362", "DOI": "10.1515/9781400878215", "CorpusId": 154000711}, "corpusId": + 154000711, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9b14aa6e52174b6940504d005202edffbb021caa", + "title": "New England State Politics", "abstract": "A lively, fact-filled + study of New England state politics in which the author shows who has political + power and under what circumstances it can be used, who can nominate or influence + nomination for major offices, and who can pull great weight with the legisla-ture, + the governor, or administrators. \"With a sharp eye for the significant, Lockard + sets out in bold strokes the dominant features of the political systems of + these states. Nor does he pull his punches. Here are the rivalries among the + ethnic groups, the excesses of special interests, the weaknesses and strengths + of the political parties, the vicissitudes of the vanishing Yankee, all re-lated + with insight, humor, and compassion.\"\u2014 V. O. Key, Jr. 376 pages. Maps + & Charts. present state Scandinavian and offers conclusions to be from volume + disciplinary Political The first report North Atlantic Area (1957, $4.75). + pages,", "venue": "", "year": 1959, "referenceCount": 0, "citationCount": + 123, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": + "Political Science", "source": "external"}, {"category": "History", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1959-03-21", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "47417287", + "name": "D. Lockard"}]}, {"paperId": "1c6fb3cdd832ae1ce97b4eaef8d36473da97279c", "externalIds": {"DBLP": "journals/jacm/EsparzaGM16", "MAG": "2344785730", - "ArXiv": "1304.1185", "DOI": "10.1145/2842603", "CorpusId": 5080}, "url": - "https://www.semanticscholar.org/paper/1c6fb3cdd832ae1ce97b4eaef8d36473da97279c", + "ArXiv": "1304.1185", "DOI": "10.1145/2842603", "CorpusId": 5080}, "corpusId": + 5080, "publicationVenue": {"id": "de7cb6d2-863c-4bab-b617-c4831742cc24", "name": + "International Conference on Computer Aided Verification", "type": "conference", + "alternate_names": ["Computer Aided Verification", "Int Conf Comput Aided + Verification", "Comput Aided Verification", "CAV"], "url": "http://www.wikicfp.com/cfp/program?id=374"}, + "url": "https://www.semanticscholar.org/paper/1c6fb3cdd832ae1ce97b4eaef8d36473da97279c", "title": "Parameterized Verification of Asynchronous Shared-Memory Systems", "abstract": "We characterize the complexity of the safety verification problem for parameterized systems consisting of a leader process and arbitrarily many @@ -38211,82 +42970,351 @@ interactions: be obtained under the assumptions of anonymity and asynchrony.", "venue": "International Conference on Computer Aided Verification", "year": 2013, "referenceCount": 37, "citationCount": 59, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2013-04-03", "journal": {"name": "Journal of the ACM (JACM)", "pages": "1 - - 48", "volume": "63"}, "authors": [{"authorId": "145731218", "name": "J. - Esparza"}, {"authorId": "1692588", "name": "P. Ganty"}, {"authorId": "144029582", - "name": "R. Majumdar"}]}, {"paperId": "bc32db4656187e69679f6aac166694cd8ae57078", - "externalIds": {"MAG": "1831312419", "CorpusId": 38895611, "PubMed": "17246655"}, - "url": "https://www.semanticscholar.org/paper/bc32db4656187e69679f6aac166694cd8ae57078", - "title": "Method of Measuring Linkage in Human Genetics; with Special Reference - to Blood Groups.", "abstract": "TABLE OF CONTENTS PAGE INTRODUCTION . . . - . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . 335 Are the agglutinogens M and N linked to A and B - ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 Derivation - of formula for Q., . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . . . . . . . Derivation of formula for standard error - of Q. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SVm6aaARY - . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . . . . . . . . . . . . . . . . LITE-TURE CITED.. . . - . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . . . . . . . . . . . 350", "venue": "Genetics", "year": - 1932, "referenceCount": 3, "citationCount": 28, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F978-3-642-39799-8_8.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2013-04-03", "journal": {"name": "Journal + of the ACM (JACM)", "pages": "1 - 48", "volume": "63"}, "authors": [{"authorId": + "145731218", "name": "J. Esparza"}, {"authorId": "1692588", "name": "P. Ganty"}, + {"authorId": "144029582", "name": "R. Majumdar"}]}, {"paperId": "b91ac097a01a56fc85ad49ff9782eb593ace3808", + "externalIds": {"MAG": "1986711118", "DOI": "10.1103/PHYSREVE.84.046216", + "CorpusId": 21207401, "PubMed": "22181254"}, "corpusId": 21207401, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b91ac097a01a56fc85ad49ff9782eb593ace3808", + "title": "Stochastic reaction and diffusion on growing domains: understanding + the breakdown of robust pattern formation.", "abstract": "Many biological + patterns, from population densities to animal coat markings, can be thought + of as heterogeneous spatiotemporal distributions of mobile agents. Many mathematical + models have been proposed to account for the emergence of this complexity, + but, in general, they have consisted of deterministic systems of differential + equations, which do not take into account the stochastic nature of population + interactions. One particular, pertinent criticism of these deterministic systems + is that the exhibited patterns can often be highly sensitive to changes in + initial conditions, domain geometry, parameter values, etc. Due to this sensitivity, + we seek to understand the effects of stochasticity and growth on paradigm + biological patterning models. In this paper, we extend spatial Fourier analysis + and growing domain mapping techniques to encompass stochastic Turing systems. + Through this we find that the stochastic systems are able to realize much + richer dynamics than their deterministic counterparts, in that patterns are + able to exist outside the standard Turing parameter range. Further, it is + seen that the inherent stochasticity in the reactions appears to be more important + than the noise generated by growth, when considering which wave modes are + excited. Finally, although growth is able to generate robust pattern sequences + in the deterministic case, we see that stochastic effects destroy this mechanism + for conferring robustness. However, through Fourier analysis we are able to + suggest a reason behind this lack of robustness and identify possible mechanisms + by which to reclaim it.", "venue": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "year": 2011, "referenceCount": 59, "citationCount": + 59, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2011-10-28", "journal": {"name": "Physical + review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 046216\n ", + "volume": "84 4 Pt 2"}, "authors": [{"authorId": "6566804", "name": "T. Woolley"}, + {"authorId": "35275545", "name": "R. Baker"}, {"authorId": "2662569", "name": + "E. Gaffney"}, {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": + "83c272dd1ddd4b5043052aa1b3012c5f9245152b", "externalIds": {"MAG": "2047348160", + "DOI": "10.1016/S0025-5564(01)00087-6", "CorpusId": 7708091, "PubMed": "11779624"}, + "corpusId": 7708091, "publicationVenue": {"id": "7ddbf0f3-cc29-4172-b79c-19b9ed50e871", + "name": "Mathematical Biosciences", "alternate_names": ["Math Biosci"], "issn": + "0025-5564", "url": "https://www.journals.elsevier.com/mathematical-biosciences/", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00255564"]}, + "url": "https://www.semanticscholar.org/paper/83c272dd1ddd4b5043052aa1b3012c5f9245152b", + "title": "Transient dynamics and pattern formation: reactivity is necessary + for Turing instabilities.", "abstract": null, "venue": "Mathematical Biosciences", + "year": 2002, "referenceCount": 46, "citationCount": 70, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Mathematical biosciences", "pages": "\n 1-11\n ", + "volume": "175 1"}, "authors": [{"authorId": "2574314", "name": "M. Neubert"}, + {"authorId": "145404218", "name": "H. Caswell"}, {"authorId": "88251269", + "name": "J. Murray"}]}, {"paperId": "3245519444fd3f706bb133f4cf01b093a0816ba5", + "externalIds": {"MAG": "83971587", "CorpusId": 115884416}, "corpusId": 115884416, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3245519444fd3f706bb133f4cf01b093a0816ba5", + "title": "Active libraries and universal languages", "abstract": "Universal + programming languages are an old dream. There is the computability sense of + Turing-universal; Landin and others have advocated syntactically universal + languages, a path leading to extensible syntax, e.g., macros. A stronger kind + of universality would reduce the need for domain-specific languages\u2014they + could be replaced by \u2018active libraries\u2019 providing and safety requirements. + Experience suggests that much domain-specific optimization can be realized + by staging, i.e., doing computations at compile time to produce an efficient + run-time. Rudimentary computability arguments show that languages with a \u2018Turing-complete + kernel\u2019 can be both stage-universal and safety-universal. But making + this approach practical requires compilers that find optimal programs, and + this is a hard problem. \nGuaranteed Optimization is a proof technique for + constructing compilers that find optimal programs within a decidable approximation + of program equivalence. This gives us compilers whose kernels possess intuitive + closure properties akin to, but stronger than, languages with explicit staging, + and can meet the \u2018Turing-complete kernel\u2019 requirement to be stage- + and safety-universal. To show this technique is practical we demonstrate a + prototype compiler that finds optimal programs in the presence of heap operations; + the proof of this is tedious but automated. The proof ensures that any code + \u2018lying in the kernel\u2019 is evaluated and erased at compile-time. This + opens several interesting directions for active libraries. One is staging: + we can synthesize fast implementation code at compile-time by putting code-generators + in the kernel. To achieve domain-specific safety checking we propose \u2018proof + embeddings\u2019 in which proofs are intermingled with code and the optimizer + does double-duty as a theorem prover. Proofs lying in the kernel are checked + and erased at compile-time, yielding code that is both fast and safe.", "venue": + "", "year": 2004, "referenceCount": 297, "citationCount": 42, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "143962909", "name": "A. Lumsdaine"}, {"authorId": "1918653", + "name": "T. Veldhuizen"}]}, {"paperId": "cc30ddbd58099e3f1d2a35b6a6682fcc6214c552", + "externalIds": {"MAG": "639105485", "CorpusId": 142478986}, "corpusId": 142478986, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cc30ddbd58099e3f1d2a35b6a6682fcc6214c552", + "title": "Adult Development: A New Dimension in Psychodynamic Theory and Practice", + "abstract": "This volume is about the normal development of adulthood, as + weIl as its vieissitudes and the contributions of such development to psycho- + pathology. The authors are psychoanalysts of great dinieal skill and perceptiveness, + but while their focus is consistently a psychodynamie one, their conceptualizations + about adult developmental processes are applicable to virtually all kinds + of therapy. It is extraordinary how little attention has been paid to the + effects of adult developmental experience on mental development. Obviously + mental structures are not statie after the profound experiences of child- + hood and adolescence, nor are they merely a template upon whieh adult experiences + are processed. The authors dearly demonstrate that current adult experience + always adds to, and interacts with, existing mental structure, whieh is itself + the result of all preceding develop- ment. After a first section in whieh + they examine life cyde ideas on de- velopment from antiquity to the present, + they present their own work as it relates to adult experience and adult development. + Their hypoth- eses about the psychodynamie theory of adult development are + partie- ularly creative and an enormous contribution to the psychiatrie litera- + ture and the dinical understanding of patients. Consistent with their views + that development in adulthood is an ongoing and dynamic process, they elaborate + their ideas that childhood development is fo- cused primarily on the formation + of psychie structure while adult de- velopment is concerned with the continued + evolution of existing struc- ture and its use.", "venue": "", "year": 1981, + "referenceCount": 0, "citationCount": 58, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1981-07-31", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3890942", + "name": "C. Colarusso"}, {"authorId": "11551516", "name": "R. Nemiroff"}]}, + {"paperId": "5be2d9964c0b2f34157631db8c514cba7894318e", "externalIds": {"MAG": + "1969208284", "DOI": "10.1063/1.4816937", "CorpusId": 11157427, "PubMed": + "24089955"}, "corpusId": 11157427, "publicationVenue": {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", + "name": "Chaos", "type": "journal", "issn": "1054-1500", "url": "http://chaos.aip.org/", + "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, "url": "https://www.semanticscholar.org/paper/5be2d9964c0b2f34157631db8c514cba7894318e", + "title": "Cross-diffusion in the two-variable Oregonator model.", "abstract": + "We explore the effect of cross-diffusion on pattern formation in the two-variable + Oregonator model of the Belousov-Zhabotinsky reaction. For high negative cross-diffusion + of the activator (the activator being attracted towards regions of increased + inhibitor concentration) we find, depending on the values of the parameters, + Turing patterns, standing waves, oscillatory Turing patterns, and quasi-standing + waves. For the inhibitor, we find that positive cross-diffusion (the inhibitor + being repelled by increasing concentrations of the activator) can induce Turing + patterns, jumping waves and spatially modulated bulk oscillations. We qualitatively + explain the formation of these patterns. With one model we can explain Turing + patterns, standing waves and jumping waves, which previously was done with + three different models.", "venue": "Chaos", "year": 2013, "referenceCount": + 44, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2013-07-30", "journal": {"name": "Chaos", + "pages": "\n 033119\n ", "volume": "23 3"}, "authors": [{"authorId": + "6742967", "name": "I. Berenstein"}, {"authorId": "4568270", "name": "C. Beta"}]}, + {"paperId": "2772ad8dcd04e9023c06fd9d7caf036ae7b0f15d", "externalIds": {"ArXiv": + "nlin/0112022", "DBLP": "journals/em/CaludeDS02", "MAG": "2591578264", "DOI": + "10.1080/10586458.2002.10504481", "CorpusId": 8796343}, "corpusId": 8796343, + "publicationVenue": {"id": "030417fe-9d82-425b-b780-8edc58d04ce7", "name": + "Experimental Mathematics", "type": "journal", "alternate_names": ["Exp Math"], + "issn": "1058-6458", "url": "http://www.tandfonline.com/toc/uexm20/current", + "alternate_urls": ["http://www.tandf.co.uk/journals/authors/uexmauth.asp", + "http://www.emis.de/journals/EM/index.html", "http://www.emis.de/journals/EM/", + "http://www.expmath.org/", "https://projecteuclid.org/DPubS?handle=euclid.em&service=UI&verb=Display&version=1.0"]}, + "url": "https://www.semanticscholar.org/paper/2772ad8dcd04e9023c06fd9d7caf036ae7b0f15d", + "title": "Computing a Glimpse of Randomness", "abstract": "A Chaitin Omega + number is the halting probability of a universal Chaitin (self-delimiting + Turing) machine. Every Omega number is both computably enumerable (the limit + of a computable, increasing, converging sequence of rationals) and random + (its binary expansion is an algorithmic random sequence). In particular, every + Omega number is strongly noncomputable. The aim of this paper is to describe + a procedure, that combines Java programming and mathematical proofs, to compute + the exact values of the first 64 bits of a Chaitin Omega: Full description + of programs and proofs will be given elsewhere.", "venue": "Experimental Mathematics", + "year": 2001, "referenceCount": 51, "citationCount": 68, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/nlin/0112022", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2001-12-17", "journal": {"name": "Experimental + Mathematics", "pages": "361 - 370", "volume": "11"}, "authors": [{"authorId": + "1685717", "name": "Cristian S. Calude"}, {"authorId": "1784879", "name": + "M. Dinneen"}, {"authorId": "152856762", "name": "Chi-Kou Shu"}]}, {"paperId": + "47e3ae7e0b26f27149d985671ae4f6eb94415ba6", "externalIds": {"DBLP": "journals/tcs/AspertiR15", + "MAG": "2118758698", "DOI": "10.1016/J.TCS.2015.07.013", "CorpusId": 17858799}, + "corpusId": 17858799, "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", + "name": "Theoretical Computer Science", "type": "journal", "alternate_names": + ["Theor Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/47e3ae7e0b26f27149d985671ae4f6eb94415ba6", + "title": "A formalization of multi-tape Turing machines", "abstract": null, + "venue": "Theoretical Computer Science", "year": 2015, "referenceCount": 43, + "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2015-10-25", "journal": {"name": "Theor. Comput. Sci.", + "pages": "23-42", "volume": "603"}, "authors": [{"authorId": "1795634", "name": + "A. Asperti"}, {"authorId": "1775891", "name": "W. Ricciotti"}]}, {"paperId": + "b89c8a4a7c89b7933844154655029d8271e8e3a4", "externalIds": {"PubMedCentral": + "4857296", "MAG": "2346929534", "DOI": "10.1186/s13062-016-0124-7", "CorpusId": + 4419821, "PubMed": "27145826"}, "corpusId": 4419821, "publicationVenue": {"id": + "7c7081ff-cde3-49d7-aa8a-8f29ecc4f0a0", "name": "Biology Direct", "type": + "journal", "issn": "1745-6150", "url": "http://www.biology-direct.com/", "alternate_urls": + ["https://biologydirect.biomedcentral.com/"]}, "url": "https://www.semanticscholar.org/paper/b89c8a4a7c89b7933844154655029d8271e8e3a4", + "title": "Beyond Turing: mechanochemical pattern formation in biological tissues", + "abstract": null, "venue": "Biology Direct", "year": 2016, "referenceCount": + 61, "citationCount": 27, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1932-05-01", "journal": {"name": "Genetics", - "pages": "\n 335-50\n ", "volume": "17 3"}, "authors": [{"authorId": - "1898529", "name": "A. S. Wiener"}]}, {"paperId": "147c811d4304d738144de335286f3dc584b64579", - "externalIds": {"MAG": "603955070", "DOI": "10.7551/mitpress/8009.003.0002", - "CorpusId": 118300193}, "url": "https://www.semanticscholar.org/paper/147c811d4304d738144de335286f3dc584b64579", - "title": "Turing versus Godel on computability and the mind", "abstract": - "This chapter contains sections titled: 1.1 Godel on Turing''s \u201cPhilosophical - Error\u201d, 1.2 Two Approaches to the Analysis of Computability, 1.3 Godel - and Turing on the Mind, 1.4 Conclusion, Acknowledgments, Notes, References", - "venue": "", "year": 2013, "referenceCount": 84, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "1-34", "volume": ""}, "authors": [{"authorId": - "144246233", "name": "B. Copeland"}, {"authorId": "1742013", "name": "Oron - Shagrir"}]}, {"paperId": "ee2a011810b5442c28b66f97422564de02a4e319", "externalIds": - {"MAG": "3085332162", "DOI": "10.22148/001C.17212", "CorpusId": 225035059}, - "url": "https://www.semanticscholar.org/paper/ee2a011810b5442c28b66f97422564de02a4e319", - "title": "Can GPT-3 Pass a Writer\u2019s Turing Test?", "abstract": "Until - recently the field of natural language generation relied upon formalized grammar - systems, small-scale statistical models, and lengthy sets of heuristic rules. - This older technology was fairly limited and brittle: it could remix language - into word salad poems or chat with humans within narrowly defined topics. - Recently, very large-scale statistical language models have dramatically advanced - the field, and GPT-3 is just one example. It can internalize the rules of - language without explicit programming or rules. Instead, much like a human - child, GPT-3 learns language through repeated exposure, albeit on a much larger - scale. Without explicit rules, it can sometimes fail at the simplest of linguistic - tasks, but it can also excel at more difficult ones like imitating an author - or waxing philosophical.", "venue": "", "year": 2020, "referenceCount": 34, - "citationCount": 29, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-09-14", - "journal": {"name": "", "pages": "17212", "volume": ""}, "authors": [{"authorId": - "116776856", "name": "Katherine Elkins"}, {"authorId": "1380792733", "name": - "Jon Chun"}]}, {"paperId": "728f987bf5ff00e0f0cec17ff89900eb68365f52", "externalIds": - {"DBLP": "conf/birthday/0001SWB09", "MAG": "1621944155", "DOI": "10.1007/978-3-540-88869-7_27", - "CorpusId": 6408344}, "url": "https://www.semanticscholar.org/paper/728f987bf5ff00e0f0cec17ff89900eb68365f52", - "title": "Programmability of Chemical Reaction Networks", "abstract": null, - "venue": "Algorithmic Bioprocesses", "year": 2009, "referenceCount": 48, "citationCount": - 121, "influentialCitationCount": 10, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, - "journal": {"pages": "543-584"}, "authors": [{"authorId": "2057342974", "name": - "Matthew Cook"}, {"authorId": "1788421", "name": "D. Soloveichik"}, {"authorId": - "3094920", "name": "E. Winfree"}, {"authorId": "143742406", "name": "Jehoshua - Bruck"}]}, {"paperId": "057fce56bc617ebcb389098376a3e32d411a0308", "externalIds": - {"DBLP": "journals/jsyml/FokinaKMQS11", "MAG": "2160413100", "DOI": "10.2178/jsl/1309952523", - "CorpusId": 7240493}, "url": "https://www.semanticscholar.org/paper/057fce56bc617ebcb389098376a3e32d411a0308", + ["JournalArticle", "Review"], "publicationDate": "2016-05-04", "journal": + {"name": "Biology Direct", "volume": "11"}, "authors": [{"authorId": "3262942", + "name": "M. Mercker"}, {"authorId": "40663769", "name": "Felix Brinkmann"}, + {"authorId": "1389565398", "name": "A. Marciniak-Czochra"}, {"authorId": "144825773", + "name": "T. Richter"}]}, {"paperId": "82c2e0c53e4d54ead87e17489f985733f070cd67", + "externalIds": {"DBLP": "conf/icalp/WeihrauchZ99", "MAG": "1524652636", "DOI": + "10.1007/3-540-48523-6_66", "CorpusId": 34264177}, "corpusId": 34264177, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/82c2e0c53e4d54ead87e17489f985733f070cd67", + "title": "The Wave Propagator Is Turing Computable", "abstract": null, "venue": + "ICALP", "year": 1999, "referenceCount": 16, "citationCount": 18, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1999-07-11", "journal": {"pages": "697-707"}, + "authors": [{"authorId": "1696520", "name": "K. Weihrauch"}, {"authorId": + "2778649", "name": "Ning Zhong"}]}, {"paperId": "42a261a4477fa96dfe4d04f7bcb1ac2043c6449f", + "externalIds": {"MAG": "2108955071", "DOI": "10.1007/S11587-016-0267-Y", "CorpusId": + 122603444}, "corpusId": 122603444, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42a261a4477fa96dfe4d04f7bcb1ac2043c6449f", + "title": "Super-critical and sub-critical bifurcations in a reaction-diffusion + Schnakenberg model with linear cross-diffusion", "abstract": null, "venue": + "", "year": 2016, "referenceCount": 54, "citationCount": 24, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1501.04890", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2016-04-01", "journal": {"name": + "Ricerche di Matematica", "pages": "449-467", "volume": "65"}, "authors": + [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", + "name": "M. Lombardo"}, {"authorId": "153569740", "name": "S. Lupo"}, {"authorId": + "37823401", "name": "M. Sammartino"}]}, {"paperId": "8aa436c6ef179dd2bcffbaae705825237812ba84", + "externalIds": {"PubMedCentral": "5380321", "MAG": "2605256318", "DOI": "10.1371/journal.pone.0174946", + "CorpusId": 1668331, "PubMed": "28376090"}, "corpusId": 1668331, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/8aa436c6ef179dd2bcffbaae705825237812ba84", + "title": "Turing mechanism underlying a branching model for lung morphogenesis", + "abstract": "The mammalian lung develops through branching morphogenesis. + Two primary forms of branching, which occur in order, in the lung have been + identified: tip bifurcation and side branching. However, the mechanisms of + lung branching morphogenesis remain to be explored. In our previous study, + a biological mechanism was presented for lung branching pattern formation + through a branching model. Here, we provide a mathematical mechanism underlying + the branching patterns. By decoupling the branching model, we demonstrated + the existence of Turing instability. We performed Turing instability analysis + to reveal the mathematical mechanism of the branching patterns. Our simulation + results show that the Turing patterns underlying the branching patterns are + spot patterns that exhibit high local morphogen concentration. The high local + morphogen concentration induces the growth of branching. Furthermore, we found + that the sparse spot patterns underlie the tip bifurcation patterns, while + the dense spot patterns underlies the side branching patterns. The dispersion + relation analysis shows that the Turing wavelength affects the branching structure. + As the wavelength decreases, the spot patterns change from sparse to dense, + the rate of tip bifurcation decreases and side branching eventually occurs + instead. In the process of transformation, there may exists hybrid branching + that mixes tip bifurcation and side branching. Since experimental studies + have reported that branching mode switching from side branching to tip bifurcation + in the lung is under genetic control, our simulation results suggest that + genes control the switch of the branching mode by regulating the Turing wavelength. + Our results provide a novel insight into and understanding of the formation + of branching patterns in the lung and other biological systems.", "venue": + "PLoS ONE", "year": 2017, "referenceCount": 23, "citationCount": 19, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0174946&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2017-04-04", "journal": {"name": "PLoS + ONE", "volume": "12"}, "authors": [{"authorId": "2149189685", "name": "Hui + Xu"}, {"authorId": "1750604", "name": "Mingzhu Sun"}, {"authorId": "2145734155", + "name": "Xin Zhao"}]}, {"paperId": "8769f9464dcbe263c425256749f0751edade1fe3", + "externalIds": {"MAG": "3037410039", "DBLP": "conf/stoc/DurandLS01", "ArXiv": + "cs/0107008", "DOI": "10.1145/380752.380880", "CorpusId": 1693}, "corpusId": + 1693, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": + "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/8769f9464dcbe263c425256749f0751edade1fe3", + "title": "Complex tilings", "abstract": "We study the minimal complexity of + tilings of a plane with a given tile set. We note that any tile set admits + either no tiling or some tiling with \\ooo(n) Kolmogorov + complexity of its (n\\times n)-squares. We construct tile + sets for which this bound is nearly tight: all tilings have complexity >n/r(n), + given any unbounded computable monotone r. This adds a quantitative + angle to classical results on non-recursivity of tilings -- that we also develop + in terms of Turing degrees of unsolvability.", "venue": "Symposium on the + Theory of Computing", "year": 2001, "referenceCount": 29, "citationCount": + 68, "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/cs/0107008", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2001-07-04", "journal": {"name": "Journal + of Symbolic Logic", "pages": "593 - 613", "volume": "73"}, "authors": [{"authorId": + "34998745", "name": "B. Durand"}, {"authorId": "27941605", "name": "L. Levin"}, + {"authorId": "143786875", "name": "A. Shen"}]}, {"paperId": "6e297ddd30f2fce82d2146b215dbe22dac22bd2e", + "externalIds": {"DOI": "10.1021/jacs.1c04317", "CorpusId": 236451141, "PubMed": + "34313429"}, "corpusId": 236451141, "publicationVenue": {"id": "4193a393-c091-455e-858d-3d2c151b52b8", + "name": "Journal of the American Chemical Society", "type": "journal", "alternate_names": + ["J Am Chem Soc"], "issn": "0002-7863", "url": "https://pubs.acs.org/journal/jacsat", + "alternate_urls": ["http://pubs.acs.org/journals/jacsat/index.html", "http://pubs.acs.org/journals/jacsat/"]}, + "url": "https://www.semanticscholar.org/paper/6e297ddd30f2fce82d2146b215dbe22dac22bd2e", + "title": "Dendrite-Free Zinc-Based Battery with High Areal Capacity via the + Region-Induced Deposition Effect of Turing Membrane.", "abstract": "Zinc-based + batteries are promising for use as energy storage devices owing to their low + cost and high energy density. However, zinc chemistry commonly encounters + serious dendrite issues, especially at high areal capacities and current densities, + limiting their application. Herein, we propose a novel membrane featuring + ordered undulating stripes called \"Turing patterns\", which can effectively + suppress zinc dendrites and improve ion conductivity. The crests and troughs + in the Turing membrane can effectively adjust the Zn(OH)42- distribution and + provide more zinc deposition space. The coordinated Cu ions during membrane + formation can interact with Zn(OH)42-, further smoothing zinc deposition. + Even at a high current density of 80 mA\u00b7cm-2, the Turing membrane enables + an alkaline zinc-iron flow battery (AZIFB) to work stably with an ultrahigh + areal capacity of 160 mA\u00b7h\u00b7cm-2 for approximately 110 cycles, showing + an energy efficiency of 90.10%, which is by far the highest value ever reported + among zinc-based batteries with such a high current density. This paper provides + valid access to zinc-based batteries with high areal capacities based on membrane + design and promotes their advancement.", "venue": "Journal of the American + Chemical Society", "year": 2021, "referenceCount": 0, "citationCount": 27, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2021-07-27", "journal": + {"name": "Journal of the American Chemical Society"}, "authors": [{"authorId": + "1664678828", "name": "Jine Wu"}, {"authorId": "2117730284", "name": "Chenguang + Yuan"}, {"authorId": "2118909790", "name": "Tianyu Li"}, {"authorId": "4068179", + "name": "Zhizhang Yuan"}, {"authorId": "7215081", "name": "Huamin Zhang"}, + {"authorId": "50080107", "name": "Xianfeng Li"}]}, {"paperId": "057fce56bc617ebcb389098376a3e32d411a0308", + "externalIds": {"DBLP": "journals/jsyml/FokinaKMQS11", "MAG": "2160413100", + "DOI": "10.2178/jsl/1309952523", "CorpusId": 7240493}, "corpusId": 7240493, + "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": + "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J + Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/057fce56bc617ebcb389098376a3e32d411a0308", "title": "Classes of Ulm type and coding rank-homogeneous trees in other structures", "abstract": "Abstract The first main result isolates some conditions which fail for the class of graphs and hold for the class of Abelian p-groups, the @@ -38303,18 +43331,22 @@ interactions: class of Boolean algebras. Using this result, we show that there is a computable Boolean algebra of Scott rank .", "venue": "Journal of Symbolic Logic (JSL)", "year": 2011, "referenceCount": 43, "citationCount": 22, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2011-09-01", "journal": {"name": "The Journal of Symbolic Logic", "pages": - "846 - 869", "volume": "76"}, "authors": [{"authorId": "3242657", "name": - "E. Fokina"}, {"authorId": "2490044", "name": "J. Knight"}, {"authorId": "2560231", - "name": "A. Melnikov"}, {"authorId": "1478172516", "name": "S. Quinn"}, {"authorId": - "146426598", "name": "C. Safranski"}]}, {"paperId": "485552d2711868b54d5fcddc92c746b09afeab07", - "externalIds": {"ArXiv": "1709.08624", "DBLP": "conf/aaai/GuoLCZYW18", "MAG": - "2757836268", "DOI": "10.1609/aaai.v32i1.11957", "CorpusId": 3389583}, "url": - "https://www.semanticscholar.org/paper/485552d2711868b54d5fcddc92c746b09afeab07", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2011-09-01", "journal": {"name": "The + Journal of Symbolic Logic", "pages": "846 - 869", "volume": "76"}, "authors": + [{"authorId": "3242657", "name": "E. Fokina"}, {"authorId": "2490044", "name": + "J. Knight"}, {"authorId": "2560231", "name": "A. Melnikov"}, {"authorId": + "1478172516", "name": "S. Quinn"}, {"authorId": "146426598", "name": "C. Safranski"}]}, + {"paperId": "485552d2711868b54d5fcddc92c746b09afeab07", "externalIds": {"ArXiv": + "1709.08624", "DBLP": "conf/aaai/GuoLCZYW18", "MAG": "2757836268", "DOI": + "10.1609/aaai.v32i1.11957", "CorpusId": 3389583}, "corpusId": 3389583, "publicationVenue": + {"id": "bdc2e585-4e48-4e36-8af1-6d859763d405", "name": "AAAI Conference on + Artificial Intelligence", "type": "conference", "alternate_names": ["National + Conference on Artificial Intelligence", "National Conf Artif Intell", "AAAI + Conf Artif Intell", "AAAI"], "url": "http://www.aaai.org/"}, "url": "https://www.semanticscholar.org/paper/485552d2711868b54d5fcddc92c746b09afeab07", "title": "Long Text Generation via Adversarial Training with Leaked Information", "abstract": "\n \n Automatically generating coherent and semantically meaningful text has many applications in machine translation, dialogue systems, image @@ -38337,8 +43369,9 @@ interactions: scenarios. More importantly, without any supervision, LeakGAN would be able to implicitly learn sentence structures only through the interaction between MANAGER and WORKER.\n \n", "venue": "AAAI Conference on Artificial Intelligence", - "year": 2017, "referenceCount": 30, "citationCount": 360, "influentialCitationCount": - 62, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "year": 2017, "referenceCount": 30, "citationCount": 361, "influentialCitationCount": + 62, "isOpenAccess": true, "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/11957/11816", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-09-24", "journal": {"name": "ArXiv", @@ -38346,246 +43379,141 @@ interactions: "Jiaxian Guo"}, {"authorId": "2051646999", "name": "Sidi Lu"}, {"authorId": "145834074", "name": "Han Cai"}, {"authorId": "2108309275", "name": "Weinan Zhang"}, {"authorId": "1811427", "name": "Yong Yu"}, {"authorId": "39055225", - "name": "Jun Wang"}]}, {"paperId": "b89c8a4a7c89b7933844154655029d8271e8e3a4", - "externalIds": {"PubMedCentral": "4857296", "MAG": "2346929534", "DOI": "10.1186/s13062-016-0124-7", - "CorpusId": 4419821, "PubMed": "27145826"}, "url": "https://www.semanticscholar.org/paper/b89c8a4a7c89b7933844154655029d8271e8e3a4", - "title": "Beyond Turing: mechanochemical pattern formation in biological tissues", - "abstract": null, "venue": "Biology Direct", "year": 2016, "referenceCount": - 61, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2016-05-04", "journal": {"name": "Biology Direct", - "volume": "11"}, "authors": [{"authorId": "3262942", "name": "M. Mercker"}, - {"authorId": "40663769", "name": "Felix Brinkmann"}, {"authorId": "1389565398", - "name": "A. Marciniak-Czochra"}, {"authorId": "144825773", "name": "T. Richter"}]}, - {"paperId": "3ee51a0b99ab5bb5b9f46b0bf9193090e6027c7d", "externalIds": {"MAG": - "16370578", "CorpusId": 570249}, "url": "https://www.semanticscholar.org/paper/3ee51a0b99ab5bb5b9f46b0bf9193090e6027c7d", - "title": "Restoring to cognition the forgotten primacy of action, intention - and emotion", "abstract": "Making sense of the mind is the human odys sey. - Today, the cog ni tive sci ences pro vide the vehi cles and equipage. As do - all cul tur ally shaped activ i ties, they man i fest crys tal lized gen er - al iza tions and ideo log i cal leg a cies, many of which go unques tioned - for cen tu ries. From time to time, these ide ol o gies are suc cess fully - chal lenged, gen er at ing revi sions and new forms of under stand ing. We - believe that the cog ni tive sci ences have reached a sit u a tion in which - they have been frozen into one nar row form by the machine met a phor. There - is a need to thaw that form and move from a reductionist, atemporal, dis em - bod ied, static, ratio nal ist, emo tionand cul ture-free view, to fun da - men tally richer under stand ings that include the pri macy of action, inten - tion, emo tion, cul ture, real-time con straints, real-world oppor tu ni ties, - and the pecu liar i ties of liv ing bod ies. These essays con sti tute an - array of moves in that direc tion.", "venue": "", "year": 1999, "referenceCount": - 112, "citationCount": 57, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "144784302", "name": "W. Freeman"}, - {"authorId": "143919013", "name": "R. N\u00fa\u00f1ez"}]}, {"paperId": "f938716b8cecdda57aaa13968979731c86ba768b", - "externalIds": {"CorpusId": 43990096}, "url": "https://www.semanticscholar.org/paper/f938716b8cecdda57aaa13968979731c86ba768b", - "title": "COLLEGE '' OF WILLIAM AND MARY", "abstract": "At. the las t meet - ing of t he Studen t Co-Opferative Commit tee on Feb rua ry 18, fur ther p - lans for t he new Student Union building were discussed, Mr. Duke showed the - body tentativea r r a n g e m e n t s of the new s t ruc ture . The main features - of the building were to include a s tore , dining hall , ballroom, lounges, - bowling alley, '' bill i a rd room, offices for the s tudent publications - and var ious club rooms. P lans for t he proposed hea r ty s a P r and barber - shop were not made In an o[v*n discussion the contn i f . e e a R i \\ J to - favor the new plan of encio^mi? postcards in examinat ion onokht f for the - m a r k s i a the r tha.< p o s d n g l is ts . fiteps \u2022II P w e th is - suggest ion -I to the Dean oi i r e were takf.i t''cciimmfir, Faeulh . The - s''i in '' .rshij '' AiAiedr .. % '' ?.P", "venue": "", "year": 2004, "referenceCount": - 202, "citationCount": 364, "influentialCitationCount": 30, "isOpenAccess": - false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "95735188", "name": "Pamela L. Eddy"}]}, - {"paperId": "134cbfc170da5c3a0fdc6c8efd28bfdcebaea40a", "externalIds": {"DBLP": - "conf/icalp/Jung85", "MAG": "1594498656", "DOI": "10.1007/BFb0015756", "CorpusId": - 26344406}, "url": "https://www.semanticscholar.org/paper/134cbfc170da5c3a0fdc6c8efd28bfdcebaea40a", - "title": "On Probabilistic Time and Space", "abstract": null, "venue": "International - Colloquium on Automata, Languages and Programming", "year": 1985, "referenceCount": - 7, "citationCount": 36, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1985-07-15", "journal": {"pages": "310-317"}, - "authors": [{"authorId": "39446054", "name": "Hermann Jung"}]}, {"paperId": - "48bb5f889642fed09a2813480aa2ffa23f5f6daa", "externalIds": {"MAG": "2153177148", - "CorpusId": 86162352}, "url": "https://www.semanticscholar.org/paper/48bb5f889642fed09a2813480aa2ffa23f5f6daa", - "title": "Texture and microstructure of soybean curd (tofu) as affected by - different coagulants", "abstract": "The coagulating properties of five coagulams - and the nature of the curd obtained from soymilk was investigated . Viscosity - changes during coagu lation were studied using a Namctrc Vibr..lting Sphere - Viscometer and texture measurements were made by compress ion and computer - ass isted analysis. pH and amount of solids in the whey were determined. The - microstructure of the tofu was examined by scanning electron microscopy. It - was observed that CaCI2.2H20 and MgCI2.6H20 coagulaled the milk instantly - while CaS04 .1/2H20. glucono delta l a~tonc (GOL) and MgS04 .7H20 acted comparatively - slowl y. The t ex~ ture of the curd was greatl y influenced by type and concerHration - of coagulant. Curd obtained with CaCI2.2H20 and MgCI2.6H20 was coarse, granular - and hard , whereas CaS04. I/2H20 and GDL (fresh solution) gave a very smooth - . soft and uniform curd . Among the fi ve coagulants stud ied, 0.75 % CaSO_. - and 0.4 % GD L (fresh solution) appeared to be most suitable for making tofu - of high bulk weight and smooth tex tu re. Initial paper received October 24 - 1985 Manuscript received May 9 1986 Direct inquir ies to J . M. deMan Te lep - hone number: 519 824 4120 x2515 Key \\Vords : Soybean curd . tofu , textu - re, viscos ity, mic rostruc~ ture. coagulation. scanning elect ron microscopy. - calcium sa lts. magnesium sa lt~. glucono~O~I actonc.", "venue": "", "year": - 1986, "referenceCount": 11, "citationCount": 55, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Food Structure", "pages": "11", - "volume": "5"}, "authors": [{"authorId": "144291576", "name": "J. Man"}, {"authorId": - "49655182", "name": "L. Man"}, {"authorId": "47924997", "name": "S. Gupta"}]}, - {"paperId": "67c7a5657eb519bcce1766262cebfd17a0ea8550", "externalIds": {"DBLP": - "journals/osid/IriyamaO08a", "MAG": "2085466361", "DOI": "10.1142/S1230161208000262", - "CorpusId": 36737767}, "url": "https://www.semanticscholar.org/paper/67c7a5657eb519bcce1766262cebfd17a0ea8550", - "title": "Language Classes Defined by Generalized Quantum Turing Machine", - "abstract": "Ohya and Volovich proposed a quantum algorithm with chaotic amplification - to solve the SAT problem, which went beyond the notion of the usual quantum - algorithm. In this paper, we generalize quantum Turing machines by rewriting - the usual quantum Turing automaton in terms of a channel transformation. Moreover, - we define some computational classes of generalized quantum Turing machines - and show that we can describe the Ohya-Volovich (OV) SAT algorithm with completely - positive channels.", "venue": "Open Syst. Inf. Dyn.", "year": 2008, "referenceCount": - 8, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-12-01", "journal": - {"name": "Open Syst. Inf. Dyn.", "pages": "383-396", "volume": "15"}, "authors": - [{"authorId": "2073439", "name": "S. Iriyama"}, {"authorId": "1685591", "name": - "M. Ohya"}]}, {"paperId": "03386664263f0500ae0a6e1b03203d5a94f90fee", "externalIds": - {"DBLP": "journals/corr/abs-0911-3836", "ArXiv": "0911.3836", "MAG": "1981161833", - "DOI": "10.1017/S0960129510000356", "CorpusId": 6989765}, "url": "https://www.semanticscholar.org/paper/03386664263f0500ae0a6e1b03203d5a94f90fee", - "title": "Limits to measurement in experiments governed by algorithms\u2020", - "abstract": "We pose the following question: If a physical experiment were - to be completely controlled by an algorithm, what effect would the algorithm - have on the physical measurements made possible by the experiment? In a programme - to study the nature of computation possible by physical systems, and by algorithms - coupled with physical systems, we have begun to analyse: (i) the algorithmic - nature of experimental procedures; and(ii) the idea of using a physical experiment - as an oracle to Turing Machines. To answer the question, we will extend our - theory of experimental oracles so that we can use Turing machines to model - the experimental procedures that govern the conduct of physical experiments. - First, we specify an experiment that measures mass via collisions in Newtonian - dynamics and examine its properties in preparation for its use as an oracle. - We begin the classification of the computational power of polynomial time - Turing machines with this experimental oracle using non-uniform complexity - classes. Second, we show that modelling an experimenter and experimental procedure - algorithmically imposes a limit on what can be measured using equipment. Indeed, - the theorems suggest a new form of uncertainty principle for our knowledge - of physical quantities measured in simple physical experiments. We argue that - the results established here are representative of a huge class of experiments.", - "venue": "Mathematical Structures in Computer Science", "year": 2009, "referenceCount": - 38, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-11-19", "journal": - {"name": "Mathematical Structures in Computer Science", "pages": "1019 - 1050", - "volume": "20"}, "authors": [{"authorId": "1919705", "name": "E. Beggs"}, - {"authorId": "143698164", "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": - "145744796", "name": "J. V. Tucker"}]}, {"paperId": "e1cf2312e7652ca0b705ecb1c1e72d00fae18fe0", - "externalIds": {"MAG": "1553090457", "DOI": "10.1007/978-1-4613-0133-2", "CorpusId": - 82888803}, "url": "https://www.semanticscholar.org/paper/e1cf2312e7652ca0b705ecb1c1e72d00fae18fe0", - "title": "Mathematical Models for Biological Pattern Formation", "abstract": - null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 118, - "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], - "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2339973", - "name": "P. Maini"}, {"authorId": "2892576", "name": "H. Othmer"}]}, {"paperId": - "06e7b8da9e9806be25393c3fd48f1b2a9a7a6f66", "externalIds": {"ArXiv": "math/9811105", - "MAG": "1996511490", "DOI": "10.2307/3597195", "CorpusId": 119728458}, "url": - "https://www.semanticscholar.org/paper/06e7b8da9e9806be25393c3fd48f1b2a9a7a6f66", - "title": "Isoperimetric and isodiametric functions of groups", "abstract": - "This is the first of two papers devoted to connections between asymptotic - functions of groups and computational complexity. In particular, we show how - to construct a finitely presented group with NP-complete word problem. One - of the main results of this paper states that if a real number cx > 4 is computable - in time 0 then na is equivalent ( \"big O\" ) to the Dehn function of a finitely - presented group. The smallest isodiametric function of this group is n3\u00b08/4. - On the other hand, if na is equivalent to the Dehn function of a finitely - presented group then oe is computable in time 4 are equivalent to Dehn functions - of some finitely presented groups and that n1r and na for all rational numbers - oe > 3 are equivalent to the smallest isodiametric functions of finitely presented - groups. Moreover, we describe all Dehn functions of finitely presented groups - F n4 as time functions of Turing machines modulo two conjectures:", "venue": - "", "year": 1998, "referenceCount": 33, "citationCount": 118, "influentialCitationCount": - 14, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-11-18", - "journal": {"name": "Annals of Mathematics", "pages": "345-466", "volume": - "156"}, "authors": [{"authorId": "2722499", "name": "M. Sapir"}, {"authorId": - "1756381", "name": "J. Birget"}, {"authorId": "2499056", "name": "E. Rips"}]}, - {"paperId": "ccae33017115b44c4fa586e0dd2db89935c9758a", "externalIds": {"MAG": - "1595423141", "DOI": "10.1007/978-94-017-8941-7_8", "CorpusId": 33589305}, - "url": "https://www.semanticscholar.org/paper/ccae33017115b44c4fa586e0dd2db89935c9758a", - "title": "Anthropogenic Effects in Landscapes: Historical Context and Spatial - Pattern", "abstract": null, "venue": "", "year": 2014, "referenceCount": 151, - "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "89-112", "volume": ""}, "authors": [{"authorId": "48666474", "name": - "J. Bogaert"}, {"authorId": "5231604", "name": "I. Vranken"}, {"authorId": - "119940367", "name": "M. Andr\u00e9"}]}, {"paperId": "97501026e0347694e9d9991e5eb098c6fe963181", - "externalIds": {"MAG": "69968944", "DOI": "10.1007/BF02837390", "CorpusId": - 116139954}, "url": "https://www.semanticscholar.org/paper/97501026e0347694e9d9991e5eb098c6fe963181", - "title": "On Stein-Weiss conjugate harmonic function and Octonion analytic - function", "abstract": null, "venue": "", "year": 2000, "referenceCount": - 3, "citationCount": 37, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2000-06-01", "journal": {"name": "Approximation - Theory and its Applications", "pages": "28-36", "volume": "16"}, "authors": - [{"authorId": "66867157", "name": "Li Xingmin"}, {"authorId": "72625415", - "name": "P. Lizhong"}]}, {"paperId": "7f59f9b227514620f7ef13d90f96d43faf9e45f7", - "externalIds": {"MAG": "1554431040", "CorpusId": 118274911}, "url": "https://www.semanticscholar.org/paper/7f59f9b227514620f7ef13d90f96d43faf9e45f7", - "title": "A first course in computability", "abstract": "Mathematical prerequisites - Turing machines solvability and unsolvability formal languages recursive functions - complexity theory appendix - the Turing machine simulator.", "venue": "", - "year": 1986, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer + "name": "Jun Wang"}]}, {"paperId": "ee2a011810b5442c28b66f97422564de02a4e319", + "externalIds": {"MAG": "3085332162", "DOI": "10.22148/001C.17212", "CorpusId": + 225035059}, "corpusId": 225035059, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ee2a011810b5442c28b66f97422564de02a4e319", + "title": "Can GPT-3 Pass a Writer\u2019s Turing Test?", "abstract": "Until + recently the field of natural language generation relied upon formalized grammar + systems, small-scale statistical models, and lengthy sets of heuristic rules. + This older technology was fairly limited and brittle: it could remix language + into word salad poems or chat with humans within narrowly defined topics. + Recently, very large-scale statistical language models have dramatically advanced + the field, and GPT-3 is just one example. It can internalize the rules of + language without explicit programming or rules. Instead, much like a human + child, GPT-3 learns language through repeated exposure, albeit on a much larger + scale. Without explicit rules, it can sometimes fail at the simplest of linguistic + tasks, but it can also excel at more difficult ones like imitating an author + or waxing philosophical.", "venue": "", "year": 2020, "referenceCount": 34, + "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://culturalanalytics.org/article/17212.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1398130831", - "name": "V. Rayward-Smith"}]}, {"paperId": "a4d62252d6d3128cd513d1db27a561894bfe2417", + "2020-09-14", "journal": {"name": "", "pages": "17212", "volume": ""}, "authors": + [{"authorId": "116776856", "name": "Katherine Elkins"}, {"authorId": "1380792733", + "name": "Jon Chun"}]}, {"paperId": "d7990c4c45409a236595273c80eb9b049dd8bf46", + "externalIds": {"MAG": "2134035034", "DBLP": "conf/stoc/BurgisserC04", "ArXiv": + "cs/0312007", "DOI": "10.1145/1007352.1007425", "CorpusId": 841064}, "corpusId": + 841064, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/d7990c4c45409a236595273c80eb9b049dd8bf46", + "title": "Counting complexity classes for numeric computations II: algebraic + and semialgebraic sets", "abstract": "We define counting classes #PR and #PC + in the Blum-Shub-Smale setting of computations over the real or complex numbers, + respectively. The problems of counting the number of solutions of systems + of polynomial inequalities over R, or of systems of polynomial equalities + over C, respectively, turn out to be natural complete problems in these classes. + We investigate to what extent the new counting classes capture the complexity + of computing basic topological invariants of semialgebraic sets (over R) and + algebraic sets (over C). We prove that the problem to compute the (modified) + Euler characteristic of semialgebraic sets is FPR#P RR-complete, and that + the problem to compute the geometric degree of complex algebraic sets is FPR#PCC-complete. + We also define new counting complexity classes GCR and GCC in the classical + Turing model via taking Boolean parts of the classes above, and show that + the problems to compute the Euler characteristic and the geometric degree + of (semi)algebraic sets given by integer polynomials are complete in these + classes. We complement the results in the Turing model by proving, for all + k \u2208 N, the FPSPACE-hardness of the problem of computing the kth Betti + number of the set of real zeros of a given integer polynomial. This holds + with respect to the singular homology as well as for the Borel-Moore homology.", + "venue": "Symposium on the Theory of Computing", "year": 2003, "referenceCount": + 86, "citationCount": 57, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-12-02", "journal": + {"name": "ArXiv", "volume": "cs.CC/0312007"}, "authors": [{"authorId": "1776434", + "name": "Peter B\u00fcrgisser"}, {"authorId": "1755208", "name": "F. Cucker"}]}, + {"paperId": "c50ce71f185759f80a4392579100529cace18838", "externalIds": {"MAG": + "618204337", "DOI": "10.2307/1573793", "CorpusId": 118128812}, "corpusId": + 118128812, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c50ce71f185759f80a4392579100529cace18838", + "title": "Shape Grammars and their Uses: Artificial Perception, Shape Generation + and Computer Aesthetics", "abstract": "Shape grammars provide a means for + the recursive specification of shapes. The formalism for shape grammars is + designed to be easily usable and understandable by people and at the same + time to be adaptable for use in computer programs. Shape grammars are similar + to phrase structura grammars, which were developed by Chomsky [ 1956, 1957]. + Where a phrase structura grammar is defined over an alphabet of symbols and + generates a language of sequences of symbols, a shape grammar is defined over + an alphabet of shapes and generates a language of shapes. This dissertation + explores the uses of shape grammars. The dissertation is divided into three + sections and an appendix. In the first section: Shape grammars are defined. + Some simple examples are given for instructiva purposes. Shape grammars are + used to generate a new class of reversible figures. Shape grammars are given + for some well-known mathematical curves (the Snowflake curve, a variation + of Peano''s curve, and Hilbert''s curve). To show the general computational + power of shape grammars, a procedura that given any Turing machine constructs + a shape grammar that simulates the operation of that Turing machine is presented. + Related work on various formalisms for pictura grammars is described. A symbolic + characterization of shape grammars is given that is useful for implementing + shape grammars in computer programs.", "venue": "", "year": 1977, "referenceCount": + 0, "citationCount": 57, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Art", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Art", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1977-01-23", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1765512", "name": "J. Gips"}]}, {"paperId": "a4d62252d6d3128cd513d1db27a561894bfe2417", "externalIds": {"DBLP": "conf/icann/CabessaV14", "MAG": "2405576074", "DOI": - "10.1007/978-3-319-11179-7_8", "CorpusId": 10253110}, "url": "https://www.semanticscholar.org/paper/a4d62252d6d3128cd513d1db27a561894bfe2417", + "10.1007/978-3-319-11179-7_8", "CorpusId": 10253110}, "corpusId": 10253110, + "publicationVenue": {"id": "f6b96a8f-dc43-4d21-99cf-0f2532b7f01f", "name": + "International Conference on Agents and Artificial Intelligence", "type": + "conference", "alternate_names": ["Int Conf Agent Artif Intell", "ICAART"], + "url": "http://www.icaart.org/"}, "url": "https://www.semanticscholar.org/paper/a4d62252d6d3128cd513d1db27a561894bfe2417", "title": "Interactive Evolving Recurrent Neural Networks Are Super-turing", "abstract": null, "venue": "International Conference on Agents and Artificial Intelligence", "year": 2014, "referenceCount": 26, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-09-15", "journal": {"pages": "57-64"}, "authors": - [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}]}, {"paperId": - "c6cf2fee2c7e2c00ed324d10a1bae8df921beb3b", "externalIds": {"MAG": "601750276", - "CorpusId": 82497077}, "url": "https://www.semanticscholar.org/paper/c6cf2fee2c7e2c00ed324d10a1bae8df921beb3b", - "title": "Between hazards of starvation and risk of predation : the ecology - of offshore animals", "abstract": "Go Open Journal of Ecology. Effects of - temperature and resource abundance on smalland large-bodied cladocerans: Community - stability and species replacement. Irina Yu. [3] Gliwicz, Z.M. (2003) Between - hazards of starvation and risk of predation: The ecology of offshore animals. - Inter-national Ecology Institute, Oldendorf/Luhe. [4] Hanski, I. and Ranta, - E. (1983) Coexistence in a patchy environment: Three species of Daphnia in - rock pools. Journal of Animal Ecology, 52, 263-279. doi:10.2307/4599. [5] - Foran, A.F. (1986) A comparison of the life history fea-tures of a temperate - and a subtropical Daphnia species. Oikos, 46, 185-193. doi:10.2307/3565466. - C o n t a c t C o p y r i g h t a n d D i s c l a i m e r S i t e m a p S - e a r c h", "venue": "", "year": 2003, "referenceCount": 3, "citationCount": - 122, "influentialCitationCount": 10, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "21556655", "name": "M. Z. Gliwicz"}]}, {"paperId": "afc6ca32985c14b87145b84533b81460425b90c5", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-09-15", "journal": + {"pages": "57-64"}, "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie + Cabessa"}]}, {"paperId": "08803b720b49323a5a837a4f7cace891405a55dd", "externalIds": + {"ArXiv": "math/9405208", "MAG": "2952161676", "DBLP": "journals/siamcomp/Kummer96", + "DOI": "10.1137/S0097539794268789", "CorpusId": 18471904}, "corpusId": 18471904, + "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": + "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/08803b720b49323a5a837a4f7cace891405a55dd", + "title": "Kolmogorov Complexity and Instance Complexity of Recursively Enumerable + Sets", "abstract": "The way in which way Kolmogorov complexity and instance + complexity affect properties of recursively enumerable (r.e.) sets is studied. + The well-known $2\\log n$ upper bound on the Kolmogorov complexity of initial + segments of r. e. sets is shown to be optimal, and the Turing degrees of r. + e. sets which attain this bound are characterized. The main part of the paper + is concerned with instance complexity, introduced by Ko, Orponen, Schoning, + and Watanabe in 1986, as a measure of the complexity of individual instances + of a decision problem. They conjectured that for every r. e. nonrecursive + set, the instance complexity is infinitely often at least as high as the Kolmogorov + complexity. The conjecture is refuted by constructing an r. e. nonrecursive + set with instance complexity logarithmic in the Kolmogorov complexity. This + bound is optimal up to an additive constant. In the other extreme, the conjecture + is established for many classes of complete sets, such as weak-truth-table-complete + (wtt-complete) and Q-complete sets. However, there is a Turing-complete set + for which it fails.", "venue": "SIAM journal on computing (Print)", "year": + 1994, "referenceCount": 13, "citationCount": 55, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/math/9405208", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1994-05-25", "journal": + {"name": "SIAM J. Comput.", "pages": "1123-1143", "volume": "25"}, "authors": + [{"authorId": "144607616", "name": "M. Kummer"}]}, {"paperId": "afc6ca32985c14b87145b84533b81460425b90c5", "externalIds": {"MAG": "2154917561", "DOI": "10.3354/MEPS07093", "CorpusId": - 55410797}, "url": "https://www.semanticscholar.org/paper/afc6ca32985c14b87145b84533b81460425b90c5", + 55410797}, "corpusId": 55410797, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/afc6ca32985c14b87145b84533b81460425b90c5", "title": "Anthropogenic causes of jellyfish blooms and their direct consequences for humans: a review", "abstract": "Although recent articles state that jellyfish populations are increasing, most available evidence shows that jellyfish abundances @@ -38616,47 +43544,314 @@ interactions: in East Asia makes that region especially vulnerable to escalating problems. We conclude that human effects on coastal environments are certain to increase, and jellyfish blooms may increase as a consequence.", "venue": "", "year": - 2007, "referenceCount": 176, "citationCount": 885, "influentialCitationCount": - 88, "isOpenAccess": true, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + 2007, "referenceCount": 176, "citationCount": 886, "influentialCitationCount": + 88, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/meps2007/350/m350p153.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2007-11-22", "journal": {"name": "Marine Ecology Progress Series", "pages": "153-174", "volume": "350"}, "authors": [{"authorId": "31411980", "name": "J. Purcell"}, {"authorId": "5605655", "name": "S. Uye"}, {"authorId": - "40178686", "name": "W. Lo"}]}, {"paperId": "d7990c4c45409a236595273c80eb9b049dd8bf46", - "externalIds": {"MAG": "2134035034", "DBLP": "conf/stoc/BurgisserC04", "ArXiv": - "cs/0312007", "DOI": "10.1145/1007352.1007425", "CorpusId": 841064}, "url": - "https://www.semanticscholar.org/paper/d7990c4c45409a236595273c80eb9b049dd8bf46", - "title": "Counting complexity classes for numeric computations II: algebraic - and semialgebraic sets", "abstract": "We define counting classes #PR and #PC - in the Blum-Shub-Smale setting of computations over the real or complex numbers, - respectively. The problems of counting the number of solutions of systems - of polynomial inequalities over R, or of systems of polynomial equalities - over C, respectively, turn out to be natural complete problems in these classes. - We investigate to what extent the new counting classes capture the complexity - of computing basic topological invariants of semialgebraic sets (over R) and - algebraic sets (over C). We prove that the problem to compute the (modified) - Euler characteristic of semialgebraic sets is FPR#P RR-complete, and that - the problem to compute the geometric degree of complex algebraic sets is FPR#PCC-complete. - We also define new counting complexity classes GCR and GCC in the classical - Turing model via taking Boolean parts of the classes above, and show that - the problems to compute the Euler characteristic and the geometric degree - of (semi)algebraic sets given by integer polynomials are complete in these - classes. We complement the results in the Turing model by proving, for all - k \u2208 N, the FPSPACE-hardness of the problem of computing the kth Betti - number of the set of real zeros of a given integer polynomial. This holds - with respect to the singular homology as well as for the Borel-Moore homology.", - "venue": "Symposium on the Theory of Computing", "year": 2003, "referenceCount": - 86, "citationCount": 56, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": + "40178686", "name": "W. Lo"}]}, {"paperId": "728f987bf5ff00e0f0cec17ff89900eb68365f52", + "externalIds": {"DBLP": "conf/birthday/0001SWB09", "MAG": "1621944155", "DOI": + "10.1007/978-3-540-88869-7_27", "CorpusId": 6408344}, "corpusId": 6408344, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/728f987bf5ff00e0f0cec17ff89900eb68365f52", + "title": "Programmability of Chemical Reaction Networks", "abstract": null, + "venue": "Algorithmic Bioprocesses", "year": 2009, "referenceCount": 48, "citationCount": + 121, "influentialCitationCount": 10, "isOpenAccess": true, "openAccessPdf": + {"url": "https://authors.library.caltech.edu/26121/1/etr090.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": null, "journal": {"pages": "543-584"}, "authors": [{"authorId": + "2057342974", "name": "Matthew Cook"}, {"authorId": "1788421", "name": "D. + Soloveichik"}, {"authorId": "3094920", "name": "E. Winfree"}, {"authorId": + "143742406", "name": "Jehoshua Bruck"}]}, {"paperId": "134cbfc170da5c3a0fdc6c8efd28bfdcebaea40a", + "externalIds": {"DBLP": "conf/icalp/Jung85", "MAG": "1594498656", "DOI": "10.1007/BFb0015756", + "CorpusId": 26344406}, "corpusId": 26344406, "publicationVenue": {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", + "name": "International Colloquium on Automata, Languages and Programming", + "type": "conference", "alternate_names": ["Int Conf Arab Lang Process", "International + Conference on Arabic Language Processing", "Int Colloq Autom Lang Program", + "ICALP"], "url": "http://www.eatcs.org/"}, "url": "https://www.semanticscholar.org/paper/134cbfc170da5c3a0fdc6c8efd28bfdcebaea40a", + "title": "On Probabilistic Time and Space", "abstract": null, "venue": "International + Colloquium on Automata, Languages and Programming", "year": 1985, "referenceCount": + 7, "citationCount": 36, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1985-07-15", + "journal": {"pages": "310-317"}, "authors": [{"authorId": "39446054", "name": + "Hermann Jung"}]}, {"paperId": "bc32db4656187e69679f6aac166694cd8ae57078", + "externalIds": {"MAG": "1831312419", "CorpusId": 38895611, "PubMed": "17246655"}, + "corpusId": 38895611, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bc32db4656187e69679f6aac166694cd8ae57078", + "title": "Method of Measuring Linkage in Human Genetics; with Special Reference + to Blood Groups.", "abstract": "TABLE OF CONTENTS PAGE INTRODUCTION . . . + . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + . . . . . . . . . . . 335 Are the agglutinogens M and N linked to A and B + ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 Derivation + of formula for Q., . . . . . . . . . . . . . . . . . . . . . . . . . . . . + . . . . . . . . . . . . . . . . . Derivation of formula for standard error + of Q. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SVm6aaARY + . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + . . . . . . . . . . . . . . . . . . . . . . . . . . LITE-TURE CITED.. . . + . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + . . . . . . . . . . . . . . . . . . . . . 350", "venue": "Genetics", "year": + 1932, "referenceCount": 3, "citationCount": 28, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1932-05-01", "journal": {"name": "Genetics", "pages": "\n 335-50\n ", + "volume": "17 3"}, "authors": [{"authorId": "1898529", "name": "A. S. Wiener"}]}, + {"paperId": "3a645d5e6b2a5c9ef56b1487210a826da051de72", "externalIds": {"MAG": + "2138889011", "DOI": "10.1093/JXB/49.322.775", "CorpusId": 36604704}, "corpusId": + 36604704, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a645d5e6b2a5c9ef56b1487210a826da051de72", + "title": "How does water get through roots", "abstract": "uptake of water. + On the contrary, at low rates of transpiration such as during the night or + during stress conOn the basis of recent results with young primary ditions + (drought, high salinity, nutrient deprivation), maize roots, a model is proposed + for the movement of the apoplastic path will be less used and the hydraulic + water across roots. It is shown how the complex, \u2018com- resistance will + be high. The role of water channels posite anatomical structure\u2019 of roots + results in a \u2018com- (aquaporins) in the transcellular path is in the fine + posite transport\u2019 of both water and solutes. Parallel adjustment of water + flow or in the regulation of uptake apoplastic, symplastic and transcellular + pathways play in older, suberized parts of plant roots lacking a suban important + role during the passage of water across stantial apoplastic component. The + composite transthe different tissues. These are arranged in series port model + explains how plants are designed to within the root cylinder (epidermis, exodermis, + central optimize water uptake according to demands from the cortex, endodermis, + pericycle stelar parenchyma, and shoot and how external factors may influence + water tracheary elements). The contribution of these struc- passage across + roots. tures to the root\u2019s overall radial hydraulic resistance is examined. + It is shown that as soon as early metaxy- Key words: Composite transport model, + endodermis, exolem vessels mature, the axial (longitudinal) hydraulic dermis, + hydraulic conductivity, reflection coefficient, root, resistance within the + xylem is usually not rate-limiting. water, water channels. According to the + model, there is a rapid exchange of water between parallel radial pathways + because, in contrast to solutes such as nutrient ions, water per- Introduction + meates cell membranes readily. The roles of apoplastic One of the essential + functions of roots is to supply the barriers (Casparian bands and suberin + lamellae) in the shoot with water from the soil. The process of water root\u2019s + endo- and exodermis are discussed. The model", "venue": "", "year": 1998, + "referenceCount": 130, "citationCount": 881, "influentialCitationCount": 71, + "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/jxb/article-pdf/49/322/775/1683757/49-322-775.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-05-01", + "journal": {"name": "Journal of Experimental Botany", "pages": "775-788", + "volume": "49"}, "authors": [{"authorId": "6158419", "name": "E. Steudle"}, + {"authorId": "92424216", "name": "C. Peterson"}]}, {"paperId": "0706b5610bce2d699bfe25902e0a15083dd2d9bf", + "externalIds": {"MAG": "2024278069", "DOI": "10.1007/BF00187282", "CorpusId": + 121398302}, "corpusId": 121398302, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0706b5610bce2d699bfe25902e0a15083dd2d9bf", + "title": "Weakly nonlinear stability analyses of one-dimensional Turing pattern + formation in activator-inhibitor/immobilizer model systems", "abstract": null, + "venue": "", "year": 1995, "referenceCount": 40, "citationCount": 22, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1995-10-01", "journal": {"name": "Journal of Mathematical Biology", "pages": + "771-815", "volume": "33"}, "authors": [{"authorId": "153800582", "name": + "Laura E. Stephenson"}, {"authorId": "2795654", "name": "D. Wollkind"}]}, + {"paperId": "8044fb7ae6c271dca38201cbe603b7921c821334", "externalIds": {"DBLP": + "journals/cj/WallaceD99", "MAG": "1997404989", "DOI": "10.1093/comjnl/42.4.270", + "CorpusId": 7709829}, "corpusId": 7709829, "publicationVenue": {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", + "name": "Computer/law journal", "type": "journal", "alternate_names": ["Computer + journal", "The Computer Journal", "Comput j", "Comput J"], "issn": "0164-8756", + "alternate_issns": ["0010-4620"], "url": "https://repository.jmls.edu/jitpl/all_issues.html", + "alternate_urls": ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/8044fb7ae6c271dca38201cbe603b7921c821334", + "title": "Minimum Message Length and Kolmogorov Complexity", "abstract": "The + notion of algorithmic complexity was developed by Kolmogorov (1965) and Chaitin + (1966) independently of one another and of Solomonoff\u2019s notion (1964) + of algorithmic probability. Given a Turing machine T , the (prefix) algorithmic + complexity of a string S is the length of the shortest input to T which would + cause T to output S and stop. The Solomonoff probability of S given T is the + probability that a random binary string of 0s and 1s will result in T producing + an output having S as a prefix. We attempt to establish a parallel between + a restricted (two-part) version of the Kolmogorov model and the minimum message + length approach to statistical inference and machine learning of Wallace and + Boulton (1968), in which an \u2018explanation\u2019 of a data string is modelled + as a two-part message, the first part stating a general hypothesis about the + data and the second encoding details of the data not implied by the hypothesis. + Solomonoff\u2019s model is tailored to prediction rather than inference in + that it considers not just the most likely explanation, but it also gives + weights to all explanations depending upon their posterior probability. However, + as the amount of data increases, we typically expect the most likely explanation + to have a dominant weighting in the prediction.", "venue": "Computer/law journal", + "year": 1999, "referenceCount": 60, "citationCount": 387, "influentialCitationCount": + 25, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-12-02", "journal": {"name": "ArXiv", "volume": "cs.CC/0312007"}, - "authors": [{"authorId": "1776434", "name": "Peter B\u00fcrgisser"}, {"authorId": - "1755208", "name": "F. Cucker"}]}, {"paperId": "5c41252db73e543bc6a4935e5743f6a85055d191", - "externalIds": {"MAG": "2563014841", "DBLP": "journals/jagi/Goertzel14", "DOI": - "10.2478/jagi-2014-0001", "CorpusId": 4794432}, "url": "https://www.semanticscholar.org/paper/5c41252db73e543bc6a4935e5743f6a85055d191", + "publicationDate": null, "journal": {"name": "Comput. J.", "pages": "270-283", + "volume": "42"}, "authors": [{"authorId": "8635127", "name": "C. S. Wallace"}, + {"authorId": "1745871", "name": "D. Dowe"}]}, {"paperId": "64f6a0f33333210a2d22550180c2d320381dd838", + "externalIds": {"MAG": "2156947468", "DOI": "10.1098/rsfs.2011.0122", "CorpusId": + 220741957, "PubMed": "23919127"}, "corpusId": 220741957, "publicationVenue": + {"id": "692a1437-389a-429a-b9b0-7a8182722f06", "name": "Interface Focus", + "type": "journal", "issn": "2042-8898", "url": "http://rsfs.royalsocietypublishing.org/"}, + "url": "https://www.semanticscholar.org/paper/64f6a0f33333210a2d22550180c2d320381dd838", + "title": "Towards an integrated experimental\u2013theoretical approach for + assessing the mechanistic basis of hair and feather morphogenesis", "abstract": + "In his seminal 1952 paper, \u2018The Chemical Basis of Morphogenesis\u2019, + Alan Turing lays down a milestone in the application of theoretical approaches + to understand complex biological processes. His deceptively simple demonstration + that a system of reacting and diffusing chemicals could, under certain conditions, + generate spatial patterning out of homogeneity provided an elegant solution + to the problem of how one of nature''s most intricate events occurs: the emergence + of structure and form in the developing embryo. The molecular revolution that + has taken place during the six decades following this landmark publication + has now placed this generation of theoreticians and biologists in an excellent + position to rigorously test the theory and, encouragingly, a number of systems + have emerged that appear to conform to some of Turing''s fundamental ideas. + In this paper, we describe the history and more recent integration between + experiment and theory in one of the key models for understanding pattern formation: + the emergence of feathers and hair in the skins of birds and mammals.", "venue": + "Interface Focus", "year": 2012, "referenceCount": 123, "citationCount": 58, + "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": {"url": + "https://royalsocietypublishing.org/doi/pdf/10.1098/rsfs.2011.0122", "status": + "HYBRID"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-08-06", "journal": + {"name": "Interface Focus", "pages": "433 - 450", "volume": "2"}, "authors": + [{"authorId": "1964371", "name": "K. Painter"}, {"authorId": "2059805409", + "name": "G. S. Hunt"}, {"authorId": "2113843803", "name": "K. Wells"}, {"authorId": + "25593976", "name": "J. A. Johansson"}, {"authorId": "30410804", "name": "D. + Headon"}]}, {"paperId": "9384db7f6b16bb4548c4778f2460ba15475bcb8a", "externalIds": + {"MAG": "2066503973", "DOI": "10.3934/DCDSB.2004.4.705", "CorpusId": 55226703}, + "corpusId": 55226703, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9384db7f6b16bb4548c4778f2460ba15475bcb8a", + "title": "Noise and productivity dependence of spatiotemporal pattern formation + in a prey-predator system", "abstract": "The spatiotemporal pattern formation + in a prey-predator dynamics is \nstudied numerically. External noise as well + as the productivity of \nthe prey population control emergence, symmetry and + stability of as \nwell as transitions between structures. Diffusive Turing + structures \nand invasion waves are presented as example.", "venue": "", "year": + 2004, "referenceCount": 25, "citationCount": 37, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2004-05-01", "journal": {"name": "Discrete and Continuous + Dynamical Systems-series B", "pages": "705-711", "volume": "4"}, "authors": + [{"authorId": "38974749", "name": "H. Malchow"}, {"authorId": "2570875", "name": + "F. Hilker"}, {"authorId": "145476093", "name": "S. Petrovskii"}]}, {"paperId": + "260f556b31ab59617e3171e5f53af82b68470a2a", "externalIds": {"MAG": "2023018700", + "DBLP": "journals/tjs/SergeyevG13", "ArXiv": "1307.3976", "DOI": "10.1007/s11227-013-0894-y", + "CorpusId": 13539210}, "corpusId": 13539210, "publicationVenue": {"id": "26ed29a9-64ce-4d6c-9024-8b022fd2fe22", + "name": "Journal of Supercomputing", "type": "journal", "alternate_names": + ["The Journal of Supercomputing", "J Supercomput"], "issn": "0920-8542", "url": + "http://www.springer.com/computer/programming/journal/11227", "alternate_urls": + ["https://link.springer.com/journal/11227", "https://www.springer.com/computer/swe/journal/11227?changeHeader"]}, + "url": "https://www.semanticscholar.org/paper/260f556b31ab59617e3171e5f53af82b68470a2a", + "title": "Single-tape and multi-tape Turing machines through the lens of the + Grossone methodology", "abstract": null, "venue": "Journal of Supercomputing", + "year": 2013, "referenceCount": 57, "citationCount": 55, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1307.3976", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2013-07-15", "journal": {"name": "The Journal of Supercomputing", "pages": + "645-663", "volume": "65"}, "authors": [{"authorId": "1713953", "name": "Y. + Sergeyev"}, {"authorId": "1764116", "name": "A. Garro"}]}, {"paperId": "3cab6aac95e3f7df33dd17b76fb9fa5ecb52dd3f", + "externalIds": {"MAG": "78855793", "DOI": "10.5840/JPHIL2013110722", "CorpusId": + 169078100}, "corpusId": 169078100, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3cab6aac95e3f7df33dd17b76fb9fa5ecb52dd3f", + "title": "Rethinking Turing''s test", "abstract": null, "venue": "", "year": + 2013, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}], "publicationTypes": + null, "publicationDate": "2013-07-01", "journal": {"name": "The Journal of + Philosophy", "pages": "391-411", "volume": "110"}, "authors": [{"authorId": + "144239027", "name": "D. Proudfoot"}]}, {"paperId": "181e3095619217e122aba2100a58ee6f26c0b458", + "externalIds": {"MAG": "2041054457", "DBLP": "journals/isci/InoueT79b", "DOI": + "10.1016/0020-0255(79)90017-3", "CorpusId": 28806872}, "corpusId": 28806872, + "publicationVenue": {"id": "e46002a1-d7a6-4681-aae9-36bc3a6a1f93", "name": + "Information Sciences", "type": "journal", "alternate_names": ["Information + Scientist", "Inf Sci"], "issn": "0020-0255", "alternate_issns": ["0020-0263"], + "url": "http://www.sciencedirect.com/science/journal/00200255"}, "url": "https://www.semanticscholar.org/paper/181e3095619217e122aba2100a58ee6f26c0b458", + "title": "Three-way tape-bounded two-dimensional turing machines", "abstract": + null, "venue": "Information Sciences", "year": 1979, "referenceCount": 8, + "citationCount": 31, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1979-04-01", "journal": {"name": "Inf. Sci.", "pages": + "195-220", "volume": "17"}, "authors": [{"authorId": "1737209", "name": "Katsushi + Inoue"}, {"authorId": "2339053", "name": "I. Takanami"}]}, {"paperId": "67c7a5657eb519bcce1766262cebfd17a0ea8550", + "externalIds": {"DBLP": "journals/osid/IriyamaO08a", "MAG": "2085466361", + "DOI": "10.1142/S1230161208000262", "CorpusId": 36737767}, "corpusId": 36737767, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/67c7a5657eb519bcce1766262cebfd17a0ea8550", + "title": "Language Classes Defined by Generalized Quantum Turing Machine", + "abstract": "Ohya and Volovich proposed a quantum algorithm with chaotic amplification + to solve the SAT problem, which went beyond the notion of the usual quantum + algorithm. In this paper, we generalize quantum Turing machines by rewriting + the usual quantum Turing automaton in terms of a channel transformation. Moreover, + we define some computational classes of generalized quantum Turing machines + and show that we can describe the Ohya-Volovich (OV) SAT algorithm with completely + positive channels.", "venue": "Open Syst. Inf. Dyn.", "year": 2008, "referenceCount": + 8, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-12-01", "journal": {"name": "Open Syst. Inf. Dyn.", "pages": "383-396", + "volume": "15"}, "authors": [{"authorId": "2073439", "name": "S. Iriyama"}, + {"authorId": "1685591", "name": "M. Ohya"}]}, {"paperId": "147c811d4304d738144de335286f3dc584b64579", + "externalIds": {"MAG": "603955070", "DOI": "10.7551/mitpress/8009.003.0002", + "CorpusId": 118300193}, "corpusId": 118300193, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/147c811d4304d738144de335286f3dc584b64579", + "title": "Turing versus Godel on computability and the mind", "abstract": + "This chapter contains sections titled: 1.1 Godel on Turing''s \u201cPhilosophical + Error\u201d, 1.2 Two Approaches to the Analysis of Computability, 1.3 Godel + and Turing on the Mind, 1.4 Conclusion, Acknowledgments, Notes, References", + "venue": "", "year": 2013, "referenceCount": 84, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "1-34", "volume": ""}, "authors": [{"authorId": + "144246233", "name": "B. Copeland"}, {"authorId": "1742013", "name": "Oron + Shagrir"}]}, {"paperId": "97501026e0347694e9d9991e5eb098c6fe963181", "externalIds": + {"MAG": "69968944", "DOI": "10.1007/BF02837390", "CorpusId": 116139954}, "corpusId": + 116139954, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/97501026e0347694e9d9991e5eb098c6fe963181", + "title": "On Stein-Weiss conjugate harmonic function and Octonion analytic + function", "abstract": null, "venue": "", "year": 2000, "referenceCount": + 3, "citationCount": 37, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2000-06-01", "journal": {"name": + "Approximation Theory and its Applications", "pages": "28-36", "volume": "16"}, + "authors": [{"authorId": "66867157", "name": "Li Xingmin"}, {"authorId": "72625415", + "name": "P. Lizhong"}]}, {"paperId": "0d6f47deee34d0c0f74d2b74d4fd4849568ca2e9", + "externalIds": {"MAG": "1986302755", "ArXiv": "nlin/0508014", "DOI": "10.1209/epl/i2005-10580-5", + "CorpusId": 119459582}, "corpusId": 119459582, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0d6f47deee34d0c0f74d2b74d4fd4849568ca2e9", + "title": "Dynamical failure of Turing patterns", "abstract": "The emergence + of stable disordered patterns in reactive systems on a spatially homogenous + substrate is studied in the context of vegetation patterns in the semi-arid + climatic zone. It is shown that reaction-diffusion systems that allow for + Turing instability may exhibit heterogeneous \"glassy\" steady state with + no characteristic wavelength if the diffusion rate associated with the slow + reactant is very small. Upon decreasing the diffusion constant of the slow + reactant three phases are identified: strong diffusion yields a stable homogenous + phase, intermediate diffusion supports Turing (crystal like) patterns while + in the slow-diffusion limit the glassy state is the generic stable solution. + In this disordered phase the dynamics is of crucial importance, with strong + differences between local and global initiation.", "venue": "", "year": 2005, + "referenceCount": 5, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": + true, "openAccessPdf": {"url": "http://arxiv.org/pdf/nlin/0508014", "status": + "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2005-08-08", "journal": {"name": + "EPL", "pages": "837-843", "volume": "74"}, "authors": [{"authorId": "2947416", + "name": "Alon Manor"}, {"authorId": "145606617", "name": "N. Shnerb"}]}, {"paperId": + "5c41252db73e543bc6a4935e5743f6a85055d191", "externalIds": {"MAG": "2563014841", + "DBLP": "journals/jagi/Goertzel14", "DOI": "10.2478/jagi-2014-0001", "CorpusId": + 4794432}, "corpusId": 4794432, "publicationVenue": {"id": "1dfcf1f0-80c5-4324-b2a5-b12ae03ea631", + "name": "Journal of Artificial General Intelligence", "type": "journal", "alternate_names": + ["J Artif Gen Intell"], "issn": "1946-0163", "url": "http://journal.agi-network.org/Home/tabid/72/Default.aspx"}, + "url": "https://www.semanticscholar.org/paper/5c41252db73e543bc6a4935e5743f6a85055d191", "title": "Artificial General Intelligence: Concept, State of the Art, and Future Prospects", "abstract": "Abstract In recent years broad community of researchers has emerged, focusing on the original ambitious goals of the AI @@ -38672,158 +43867,46 @@ interactions: Turing Test, or a robot that can graduate from elementary school or university), metrics for assessing partial progress remain more controversial and problematic.", "venue": "Journal of Artificial General Intelligence", "year": 2014, "referenceCount": - 133, "citationCount": 126, "influentialCitationCount": 11, "isOpenAccess": - true, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": + 133, "citationCount": 127, "influentialCitationCount": 11, "isOpenAccess": + true, "openAccessPdf": {"url": "https://content.sciendo.com/downloadpdf/journals/jagi/5/1/article-p1.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2014-05-01", "journal": {"name": "Journal of Artificial General Intelligence", "pages": "1 - 48", "volume": "5"}, "authors": [{"authorId": "1738080", "name": "B. - Goertzel"}]}, {"paperId": "d5eef492c203f047381f8b5efbc34ad2d0f92752", "externalIds": - {"MAG": "2114806831", "CorpusId": 18853422}, "url": "https://www.semanticscholar.org/paper/d5eef492c203f047381f8b5efbc34ad2d0f92752", - "title": "Robust CTAB-activated charcoal protocol for plant DNA extraction", - "abstract": "DNA extracted from plants rich in polyphenols and/or polysaccharides - is often problematic when subjected to polymerase chain reaction, especially - when ma ture tissues are used for DNA extraction. In order to overcome the - problems associated with poor-quality DNA extracted from such plant samples, - a protocol has been developed, availing on a high salt concentration and on - the combination of polyvinylpyrrolidone and activated charcoal in the extraction - buffer, in order to prevent the solubilization of polysaccharides and polyphenols - in the DNA extract. Mild temperature conditions during extraction and precipitation - were also recognized as important parameters. Besides DNA purity, mild precipitation - conditions were found to be beneficial in obtaining less low-molecular mass - nucleic acids in the final DNA extract. The homogenization step and the amount - of sample extracted were also found to be crucial in keeping the extraction - procedure robust.", "venue": "", "year": 2006, "referenceCount": 19, "citationCount": - 120, "influentialCitationCount": 11, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "2606566", "name": "D. Bari\u010devi\u010d"}, - {"authorId": "48418265", "name": "B. Javornik"}]}, {"paperId": "254a0a48b88289e4acaf757c5fe1da1295f3774f", - "externalIds": {"MAG": "2085072120", "DBLP": "conf/stoc/Galil76", "DOI": "10.1145/800113.803644", - "CorpusId": 18129125}, "url": "https://www.semanticscholar.org/paper/254a0a48b88289e4acaf757c5fe1da1295f3774f", - "title": "Real-time algorithms for string-matching and palindrome recognition", - "abstract": "We give a sufficient condition when an on-line algorithm can - be transformed into a real-time algorithm. We use this condition to construct - real-time algorithms for string-matching and palindrome recognition problems - by random access machines and by Turing machines.", "venue": "Symposium on - the Theory of Computing", "year": 1976, "referenceCount": 10, "citationCount": - 35, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1976-05-03", "journal": - {"pages": "161-173"}, "authors": [{"authorId": "1694216", "name": "Z. Galil"}]}, - {"paperId": "1772a04f8e5db77d69c8dd083761c1469f93ac2d", "externalIds": {"DBLP": - "journals/jetai/Wang07", "MAG": "2064372292", "DOI": "10.1080/09528130601143109", - "CorpusId": 7998138}, "url": "https://www.semanticscholar.org/paper/1772a04f8e5db77d69c8dd083761c1469f93ac2d", - "title": "Three fundamental misconceptions of Artificial Intelligence", "abstract": - "In discussions on the limitations of Artificial Intelligence (AI), there - are three major misconceptions, identifying an AI system with an axiomatic - system, a Turing machine, or a system with a model-theoretic semantics. Though - these three notions can be used to describe a computer system for certain - purposes, they are not always the proper theoretical notions when an AI system - is under consideration. These misconceptions are not only the basis of many - criticisms of AI from the outside, but also responsible for many problems - within AI research. This paper analyses these misconceptions, and points out - the common root of them: treating empirical reasoning as mathematical reasoning. - Finally, an example intelligent system called NARS is introduced, which is - neither an axiomatic system nor a Turing machine in its problem-solving process, - and does not use model-theoretic semantics, but is still implementable in - an ordinary computer.", "venue": "J. Exp. Theor. Artif. Intell.", "year": - 2007, "referenceCount": 83, "citationCount": 33, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2007-09-01", "journal": {"name": "Journal of Experimental - & Theoretical Artificial Intelligence", "pages": "249 - 268", "volume": "19"}, - "authors": [{"authorId": "48319476", "name": "Pei Wang"}]}, {"paperId": "251fe21d88420e2dc0e208b975eb6267873a23e4", - "externalIds": {"MAG": "2000097933", "DBLP": "journals/nca/SongWZC14", "DOI": - "10.1007/s00521-013-1397-8", "CorpusId": 14691519}, "url": "https://www.semanticscholar.org/paper/251fe21d88420e2dc0e208b975eb6267873a23e4", - "title": "Homogenous spiking neural P systems with anti-spikes", "abstract": - null, "venue": "Neural computing & applications (Print)", "year": 2014, "referenceCount": - 31, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-06-01", "journal": - {"name": "Neural Computing and Applications", "pages": "1833-1841", "volume": - "24"}, "authors": [{"authorId": "2001220881", "name": "Tao Song"}, {"authorId": - "2115535535", "name": "Xun Wang"}, {"authorId": "2223579", "name": "Zhujin - Zhang"}, {"authorId": "2144309054", "name": "Zhihua Chen"}]}, {"paperId": - "d8e8e77270c6fd621267e4a2b48950519dcaafe7", "externalIds": {"MAG": "2169536548", - "DOI": "10.2307/3237291", "CorpusId": 56248945}, "url": "https://www.semanticscholar.org/paper/d8e8e77270c6fd621267e4a2b48950519dcaafe7", - "title": "Predicting the distribution of shrub species in southern California - from climate and terrain\u2010derived variables", "abstract": "Generalized - additive, generalized linear, and classi- fication tree models were developed - to predict the distribution of 20 species of chaparral and coastal sage shrubs - within the southwest ecoregion of California. Mapped explanatory vari- ables - included bioclimatic attributes related to primary envi- ronmental regimes: - averages of annual precipitation, mini- mum temperature of the coldest month, - maximum tempera- ture of the warmest month, and topographically-distributed - potential solar insolation of the wettest quarter (winter) and of the growing - season (spring). Also tested for significance were slope angle (related to - soil depth) and the geographic coordi- nates of each observation. Models were - parameterized and evaluated based on species presence/absence data from 906 - plots surveyed on National Forest lands. Although all vari- ables were significant - in at least one of the species'' models, those models based only on the bioclimatic - variables predicted species presence with 3 - 26 % error. While error would - un- doubtedly be greater if the models were evaluated using inde- pendent - data, results indicate that these models are useful for predictive mapping - - for interpolating species distribution data within the ecoregion. All three - methods produced models with similar accuracy for a given species; GAMs were - useful for exploring the shape of the response functions, GLMs allowed those - response functions to be parameterized and their significance tested, and - classification trees, while some- times difficult to interpret, yielded the - lowest prediction errors (lower by 3-5% ).", "venue": "", "year": 1998, "referenceCount": - 72, "citationCount": 349, "influentialCitationCount": 28, "isOpenAccess": - false, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1998-10-01", "journal": {"name": "Journal of Vegetation Science", "pages": - "733-748", "volume": "9"}, "authors": [{"authorId": "144735103", "name": "J. - Franklin"}]}, {"paperId": "e73ffdc68ff5c2246168ee7e35a1b4a0e24b2df7", "externalIds": - {"MAG": "2132399706", "DOI": "10.2110/pec.72.02.0108", "CorpusId": 130321013}, - "url": "https://www.semanticscholar.org/paper/e73ffdc68ff5c2246168ee7e35a1b4a0e24b2df7", - "title": "Criteria for Recognizing Lacustrine Rocks", "abstract": "Lacustrine - deposits can be recognized through the use of a variety of criteria that include - physical chemical and biologic aspects of sedimentary rocks Because large - lakes closely resemble shallow epicontinental seas in physical properties - large differences in lithologic characteristics sequences facies relations - sedimentary struc tures paleocurrentpatterns and other physical parameters - are not to be expected Comparisons of these fea tures in lacustrine and epicontinental - rocks indicate the scarcity of significant diagnostic differences In contrast - fluvial and lacustrine environments differ considerably in physical aspects - and the two environments can be differentiated on the basis of the physical - characteristics of the rocks Large lakes and epicontinental seas differ mainly - in size chemistry and biota Size differences are evident few lakes exceed - 10 000 sq mi in area Regional stratigraphic and paleogeographic relations - are useful therefore in distinguishing former lakes and seas Geochemical differences - are more definitive however Normal sea water has been relatively constant - in composition for most of geologic history and changes related to evaporation - precipitation or dilution are predictable In contrast the chemistry of lacustrine - water is not uniform but is determined almost wholly by the lithology and - climate of the hydrographic basin The geochemical character of lakes therefore - differs widely from onearea to another and rarely approximates that of sea - water Accordingly lakes and seas can differ in authigenic and diagenetic minerals - The products of evaporite cycles are especially useful forenvironmental interpretation - Marine and nonmarine environments commonly are distinguished by their faunas - Paleontologic differentia tion of nonmarine environments is uncertain however - and requires further study Despite the qualifications mentioned here reconstructions - of lacustrine environments can be made with con fidence Lacustrine or marine - environments can be differentiated from fluvial environments on the basis - of physical properties of the deposits Lakes and seas can then be differentiated - by geochemical and biologic criteria", "venue": "", "year": 1972, "referenceCount": - 0, "citationCount": 92, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}, - {"category": "Geology", "source": "s2-fos-model"}, {"category": "Geography", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "93858621", - "name": "M. Picard"}, {"authorId": "103413450", "name": "L. R. High"}]}, {"paperId": - "80f59e863552b4be61611354472f841a969b9767", "externalIds": {"DBLP": "conf/coco/Lutz95", - "MAG": "2152090072", "DOI": "10.1109/SCT.1995.514870", "CorpusId": 7154875}, - "url": "https://www.semanticscholar.org/paper/80f59e863552b4be61611354472f841a969b9767", + Goertzel"}]}, {"paperId": "0b78931804d1791a80fe5e5aa80196398335d024", "externalIds": + {"MAG": "147300007", "CorpusId": 35891406, "PubMed": "5791941"}, "corpusId": + 35891406, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0b78931804d1791a80fe5e5aa80196398335d024", + "title": "The anaerobic filter for waste treatment.", "abstract": "An entirely + new anaerobic treatment process has been found to be particu larly effective + for the treatment of low strength soluble organic wastes. This process, termed + the \"anaerobic filter,\" is basically a rock-filled bed similar in appearance + to an aerobic trickling fil ter. However, the waste is distributed across + the bottom of the anaerobic fil ter. Flow is upward through the bed of rocks + so that the filter is submerged completely. Anaerobic microorgan isms accumulate + in the void spaces be tween the rocks so that the waste comes in contact with + a large active biological mass as it passes through the filter. A high degree + of treatment re sults even at nominal waste tempera tures, and the effluent + essentially is free of biological solids. Historically, anaerobic systems + have been used to stabilize high strength wastes, primarily composed of the + solids produced by aerobic processes and removed from settling tanks. Con + ventional anaerobic processes have re quired long detention times for good + waste stabilization and usually have been uneconomical for the treatment of + waste containing less than approxi", "venue": "Journal - Water Pollution Control + Federation", "year": 1969, "referenceCount": 1, "citationCount": 364, "influentialCitationCount": + 11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Environmental + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Environmental Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Engineering", "source": "s2-fos-model"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1969-05-01", "journal": {"name": "Journal - Water Pollution Control Federation", + "pages": "\n Suppl:R160+\n ", "volume": "41"}, "authors": + [{"authorId": "2107729167", "name": "J. Young"}, {"authorId": "2917293", "name": + "P. McCarty"}]}, {"paperId": "80f59e863552b4be61611354472f841a969b9767", "externalIds": + {"DBLP": "conf/coco/Lutz95", "MAG": "2152090072", "DOI": "10.1109/SCT.1995.514870", + "CorpusId": 7154875}, "corpusId": 7154875, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/80f59e863552b4be61611354472f841a969b9767", "title": "A small span theorem for P/Poly-Turing reductions", "abstract": "This paper investigates the structure of ESPACE under nonuniform Turing reductions that are computed by polynomial-size circuits (P/Poly-Turing reductions). @@ -38845,159 +43928,174 @@ interactions: of small span theorems for weaker types of reductions.", "venue": "Proceedings of Structure in Complexity Theory. Tenth Annual IEEE Conference", "year": 1995, "referenceCount": 23, "citationCount": 10, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1995-06-19", "journal": {"name": "Proceedings + of Structure in Complexity Theory. Tenth Annual IEEE Conference", "pages": + "324-330"}, "authors": [{"authorId": "1736629", "name": "J. H. Lutz"}]}, {"paperId": + "f938716b8cecdda57aaa13968979731c86ba768b", "externalIds": {"CorpusId": 43990096}, + "corpusId": 43990096, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f938716b8cecdda57aaa13968979731c86ba768b", + "title": "COLLEGE '' OF WILLIAM AND MARY", "abstract": "At. the las t meet + ing of t he Studen t Co-Opferative Commit tee on Feb rua ry 18, fur ther p + lans for t he new Student Union building were discussed, Mr. Duke showed the + body tentativea r r a n g e m e n t s of the new s t ruc ture . The main features + of the building were to include a s tore , dining hall , ballroom, lounges, + bowling alley, '' bill i a rd room, offices for the s tudent publications + and var ious club rooms. P lans for t he proposed hea r ty s a P r and barber + shop were not made In an o[v*n discussion the contn i f . e e a R i \\ J to + favor the new plan of encio^mi? postcards in examinat ion onokht f for the + m a r k s i a the r tha.< p o s d n g l is ts . fiteps \u2022II P w e th is + suggest ion -I to the Dean oi i r e were takf.i t''cciimmfir, Faeulh . The + s''i in '' .rshij '' AiAiedr .. % '' ?.P", "venue": "", "year": 2004, "referenceCount": + 202, "citationCount": 363, "influentialCitationCount": 30, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "95735188", "name": "Pamela + L. Eddy"}]}, {"paperId": "ccae33017115b44c4fa586e0dd2db89935c9758a", "externalIds": + {"MAG": "1595423141", "DOI": "10.1007/978-94-017-8941-7_8", "CorpusId": 33589305}, + "corpusId": 33589305, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ccae33017115b44c4fa586e0dd2db89935c9758a", + "title": "Anthropogenic Effects in Landscapes: Historical Context and Spatial + Pattern", "abstract": null, "venue": "", "year": 2014, "referenceCount": 151, + "citationCount": 32, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://orbi.uliege.be/bitstream/2268/168429/1/BogaertVrankenAndre-BioculturalLandscapes.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": + "Geography", "source": "external"}, {"category": "Environmental Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "89-112", "volume": ""}, "authors": [{"authorId": + "48666474", "name": "J. Bogaert"}, {"authorId": "5231604", "name": "Isabelle + Vranken"}, {"authorId": "119940367", "name": "M. Andr\u00e9"}]}, {"paperId": + "03386664263f0500ae0a6e1b03203d5a94f90fee", "externalIds": {"DBLP": "journals/corr/abs-0911-3836", + "ArXiv": "0911.3836", "MAG": "1981161833", "DOI": "10.1017/S0960129510000356", + "CorpusId": 6989765}, "corpusId": 6989765, "publicationVenue": {"id": "1a00fc67-b5a0-4dae-993c-023e6c11659a", + "name": "Mathematical Structures in Computer Science", "type": "journal", + "alternate_names": ["Math Struct Comput Sci"], "issn": "0960-1295", "url": + "https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=MSC", + "http://journals.cambridge.org/MSC"]}, "url": "https://www.semanticscholar.org/paper/03386664263f0500ae0a6e1b03203d5a94f90fee", + "title": "Limits to measurement in experiments governed by algorithms\u2020", + "abstract": "We pose the following question: If a physical experiment were + to be completely controlled by an algorithm, what effect would the algorithm + have on the physical measurements made possible by the experiment? In a programme + to study the nature of computation possible by physical systems, and by algorithms + coupled with physical systems, we have begun to analyse: (i) the algorithmic + nature of experimental procedures; and(ii) the idea of using a physical experiment + as an oracle to Turing Machines. To answer the question, we will extend our + theory of experimental oracles so that we can use Turing machines to model + the experimental procedures that govern the conduct of physical experiments. + First, we specify an experiment that measures mass via collisions in Newtonian + dynamics and examine its properties in preparation for its use as an oracle. + We begin the classification of the computational power of polynomial time + Turing machines with this experimental oracle using non-uniform complexity + classes. Second, we show that modelling an experimenter and experimental procedure + algorithmically imposes a limit on what can be measured using equipment. Indeed, + the theorems suggest a new form of uncertainty principle for our knowledge + of physical quantities measured in simple physical experiments. We argue that + the results established here are representative of a huge class of experiments.", + "venue": "Mathematical Structures in Computer Science", "year": 2009, "referenceCount": + 38, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/0911.3836", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "1995-06-19", "journal": {"name": "Proceedings of Structure in Complexity - Theory. Tenth Annual IEEE Conference", "pages": "324-330"}, "authors": [{"authorId": - "1736629", "name": "J. H. Lutz"}]}, {"paperId": "7fe560d2c71ebfc3c18b3ea5c5aa14f63b11e937", - "externalIds": {"MAG": "1966008447", "DOI": "10.1103/PHYSREVLETT.76.4644", - "CorpusId": 46485370, "PubMed": "10061343"}, "url": "https://www.semanticscholar.org/paper/7fe560d2c71ebfc3c18b3ea5c5aa14f63b11e937", - "title": "New mechanism for neural pattern formation.", "abstract": "We show - how the diffusive effects of a neuron''s dendritic tree can induce a Turing-like - instability in a purely excitatory or inhibitory recurrent neural network. - A crucial feature of the model is the existence of a correlation between the - location of a synaptic connection on the tree and the relative separation - of the associated neurons within the network.", "venue": "Physical Review - Letters", "year": 1996, "referenceCount": 0, "citationCount": 36, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-06-10", "journal": {"name": "Physical - review letters", "pages": "\n 4644-4647\n ", "volume": "76 - 24"}, "authors": [{"authorId": "121206589", "name": "Bressloff"}]}, {"paperId": - "64f6a0f33333210a2d22550180c2d320381dd838", "externalIds": {"MAG": "2156947468", - "DOI": "10.1098/rsfs.2011.0122", "CorpusId": 220741957, "PubMed": "23919127"}, - "url": "https://www.semanticscholar.org/paper/64f6a0f33333210a2d22550180c2d320381dd838", - "title": "Towards an integrated experimental\u2013theoretical approach for - assessing the mechanistic basis of hair and feather morphogenesis", "abstract": - "In his seminal 1952 paper, \u2018The Chemical Basis of Morphogenesis\u2019, - Alan Turing lays down a milestone in the application of theoretical approaches - to understand complex biological processes. His deceptively simple demonstration - that a system of reacting and diffusing chemicals could, under certain conditions, - generate spatial patterning out of homogeneity provided an elegant solution - to the problem of how one of nature''s most intricate events occurs: the emergence - of structure and form in the developing embryo. The molecular revolution that - has taken place during the six decades following this landmark publication - has now placed this generation of theoreticians and biologists in an excellent - position to rigorously test the theory and, encouragingly, a number of systems - have emerged that appear to conform to some of Turing''s fundamental ideas. - In this paper, we describe the history and more recent integration between - experiment and theory in one of the key models for understanding pattern formation: - the emergence of feathers and hair in the skins of birds and mammals.", "venue": - "Interface Focus", "year": 2012, "referenceCount": 123, "citationCount": 58, - "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-08-06", "journal": {"name": "Interface Focus", "pages": - "433 - 450", "volume": "2"}, "authors": [{"authorId": "1964371", "name": "K. - Painter"}, {"authorId": "2059805409", "name": "G. S. Hunt"}, {"authorId": - "2113843803", "name": "K. Wells"}, {"authorId": "25593976", "name": "J. A. - Johansson"}, {"authorId": "30410804", "name": "D. Headon"}]}, {"paperId": - "58ac27c512c355714e7b45a7878f3bde02358ad8", "externalIds": {"MAG": "1988854739", - "DOI": "10.1177/036354658201000406", "CorpusId": 718759, "PubMed": "7125043"}, - "url": "https://www.semanticscholar.org/paper/58ac27c512c355714e7b45a7878f3bde02358ad8", - "title": "Stress fractures of the femur in runners", "abstract": "Early diagnosis, - followed by conservative manage ment, permitted five of six long-distance - runners to return to running after they had suffered stress frac tures of - the femur. The sixth patient developed a displaced fracture of the femoral - neck which was openly reduced and internally fixated at surgery: this athlete - returned to marathoning one year later. In the series there were two fractures - of the femoral neck and four of the proximal medial shaft of the femur. Although - early diagnosis depends upon a complete history, physical examination and - x-ray film results, bone scanning is a further aid when x-ray films still - do not confirm the presumptive diagnosis.", "venue": "The American journal - of sports medicine", "year": 1982, "referenceCount": 18, "citationCount": - 67, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "CaseReport"], "publicationDate": "1982-07-01", "journal": {"name": "The American - Journal of Sports Medicine", "pages": "219 - 227", "volume": "10"}, "authors": - [{"authorId": "4782398", "name": "S. Lombardo"}, {"authorId": "152529836", - "name": "D. Benson"}]}, {"paperId": "0b78931804d1791a80fe5e5aa80196398335d024", - "externalIds": {"MAG": "147300007", "CorpusId": 35891406, "PubMed": "5791941"}, - "url": "https://www.semanticscholar.org/paper/0b78931804d1791a80fe5e5aa80196398335d024", - "title": "The anaerobic filter for waste treatment.", "abstract": "An entirely - new anaerobic treatment process has been found to be particu larly effective - for the treatment of low strength soluble organic wastes. This process, termed - the \"anaerobic filter,\" is basically a rock-filled bed similar in appearance - to an aerobic trickling fil ter. However, the waste is distributed across - the bottom of the anaerobic fil ter. Flow is upward through the bed of rocks - so that the filter is submerged completely. Anaerobic microorgan isms accumulate - in the void spaces be tween the rocks so that the waste comes in contact with - a large active biological mass as it passes through the filter. A high degree - of treatment re sults even at nominal waste tempera tures, and the effluent - essentially is free of biological solids. Historically, anaerobic systems - have been used to stabilize high strength wastes, primarily composed of the - solids produced by aerobic processes and removed from settling tanks. Con - ventional anaerobic processes have re quired long detention times for good - waste stabilization and usually have been uneconomical for the treatment of - waste containing less than approxi", "venue": "Journal - Water Pollution Control - Federation", "year": 1969, "referenceCount": 1, "citationCount": 364, "influentialCitationCount": - 11, "isOpenAccess": false, "fieldsOfStudy": ["Environmental Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1969-05-01", "journal": - {"name": "Journal - Water Pollution Control Federation", "pages": "\n Suppl:R160+\n ", - "volume": "41"}, "authors": [{"authorId": "2107729167", "name": "J. Young"}, - {"authorId": "2917293", "name": "P. McCarty"}]}, {"paperId": "cb9fdff70eb0b3e6390c2c45b050c87dd424387a", - "externalIds": {"MAG": "2133531461", "DOI": "10.1111/J.1467-8330.2011.00978.X", - "CorpusId": 154412486}, "url": "https://www.semanticscholar.org/paper/cb9fdff70eb0b3e6390c2c45b050c87dd424387a", - "title": "Rethinking Primitive Accumulation: Theoretical Tensions and Rural - Southeast Asian Complexities", "abstract": ":\u00a0 This paper poses theoretical - and empirical questions to the resurgent litera-ture on primitive accumulation - in critical political economy. The first section outlines the different understandings - of capitalism, and of its relationship to primitive accumulation, in the literature, - and argues that they complicate efforts to identify instances of primitive - accumulation. The second section examines the history of frontier agricultural - expansion in Southeast Asia to critique the literature''s assumptions about - who carries out, and who resists, primitive accumulation. The third section - draws on work on Southeast Asian political economy to show that the literature - pays insufficient attention to the institutions that govern capitalist social - relations. The paper argues that these questions of agency, governance, and - the nature of capitalism need to be answered in order to make effective use - of the concept of primitive accumulation and to distinguish it from cognate - concepts like enclosure and commodification.", "venue": "", "year": 2012, - "referenceCount": 45, "citationCount": 116, "influentialCitationCount": 6, - "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-09-01", - "journal": {"name": "Antipode", "pages": "1188-1208", "volume": "44"}, "authors": - [{"authorId": "104042209", "name": "D. Hall"}]}, {"paperId": "b47944673d0877a722a16b4af4c1497d8bddc7eb", - "externalIds": {"MAG": "2117033549", "DOI": "10.1002/MALQ.200310001", "CorpusId": - 123685636}, "url": "https://www.semanticscholar.org/paper/b47944673d0877a722a16b4af4c1497d8bddc7eb", - "title": "Computational complexity on computable metric spaces", "abstract": - "We introduce a new Turing machine based concept of time complexity for functions - on computable metric spaces. It generalizes the ordinary complexity of word - functions and the complexity of real functions studied by Ko [19] et al. Although - this definition of TIME as the maximum of a generally infinite family of numbers - looks straightforward, at first glance, examples for which this maximum exists - seem to be very rare. It is the main purpose of this paper to prove that, - nevertheless, the definition has a large number of important applications. - Using the framework of TTE [40], we introduce computable metric spaces and - computability on the compact subsets. We prove that every computable metric - space has a c\u2010proper c\u2010admissible representation. We prove that - Turing machine time complexity of a function computable relative to c\u2010admissible - c\u2010proper representations has a computable bound on every computable compact - subset. We prove that computably compact computable metric spaces have concise - c\u2010proper c\u2010admissible representations and show by examples that - many canonical representations are of this kind. Finally, we compare our definition - with a similar one by Labhalla et al. [22]. Several examples illustrate the - concepts. By these results natural and realistic definitions of computational - complexity are now available for a variety of numerical problems such as image - processing, integration, continuous Fourier transform or wave propagation.", - "venue": "", "year": 2003, "referenceCount": 27, "citationCount": 54, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-11-19", "journal": + {"name": "Mathematical Structures in Computer Science", "pages": "1019 - 1050", + "volume": "20"}, "authors": [{"authorId": "1919705", "name": "E. Beggs"}, + {"authorId": "143698164", "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": + "145744796", "name": "J. V. Tucker"}]}, {"paperId": "f1324898af0815f0742933161a24c76140416345", + "externalIds": {"MAG": "2173001758", "DOI": "10.1300/J130v06n01_02", "CorpusId": + 163041440}, "corpusId": 163041440, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f1324898af0815f0742933161a24c76140416345", + "title": "Features of Tradi tional Arab Management and Organization in the + Jordan Business Environment", "abstract": "Abstract Re search into Arab man + age ment and or ga ni za tion is recent and en tails a con tra dic tory vi + sion about what type of man age ment is found in Arab busi ness or ga ni za + tions. This pa per sug gests that at this in-cip i ent stage of re search + into Arab man age ment and or ga ni za tion, the pri mary ob jec tive of re + search should be to ex plore the main fea tures of Arab man age ment in an + at tempt to de velop Arab man age ment and ad -vance its or ga ni za tion. + The pa per, based on the out come of a com par ative em pir i cal re search, + takes into con sid er ation ma jor the o ret i cal and meth od olog i cal + short com ings of re lated re search and at tempts to build a \u2018bal anced\u2019 + pic ture of Arab man age ment and or ga ni za tion. Evidence in di cates that + Arab man age ment and or ga ni za tion in Jor dan are, largely, tra di tional + and man i fested in spe cific fea tures (lim ited future ori en ta tion and + ex ces sive lack of del e ga tion of au thor ity) re flect ing on their sys + tems and prac tices.", "venue": "", "year": 2001, "referenceCount": 73, "citationCount": + 30, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": + "Political Science", "source": "external"}, {"category": "Education", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2001-09-01", "journal": {"name": + "Journal of Transnational Management Development", "pages": "27 - 53", "volume": + "6"}, "authors": [{"authorId": "1455106739", "name": "A. Al-Rasheed"}]}, {"paperId": + "49941c9a37047eb8e6f7da9d2595c328c12b3cf0", "externalIds": {"MAG": "2017124536", + "DOI": "10.1007/BF03010982", "CorpusId": 11585756, "PubMed": "3742328"}, "corpusId": + 11585756, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/49941c9a37047eb8e6f7da9d2595c328c12b3cf0", + "title": "Unintentional hypothermia in the operating room", "abstract": null, + "venue": "Canadian Anaesthetists'' Society journal", "year": 1986, "referenceCount": + 60, "citationCount": 68, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2FBF03010982.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1986-07-01", "journal": + {"name": "Canadian Anaesthetists\u2019 Society Journal", "pages": "515-527", + "volume": "33"}, "authors": [{"authorId": "1398640381", "name": "P. Morley-Forster"}]}, + {"paperId": "ae77dd776a7166331cba17f6c4ec9763ff68ba32", "externalIds": {"MAG": + "2334508319", "DOI": "10.4153/CJM-1972-113-9", "CorpusId": 124022112}, "corpusId": + 124022112, "publicationVenue": {"id": "1a167e40-5fcf-4a0c-ad62-48a6c87707b7", + "name": "Canadian Journal of Mathematics - Journal Canadien de Mathematiques", + "type": "journal", "alternate_names": ["Canadian Journal of Mathematics", + "Can J Math", "Can J Math J Can Math"], "issn": "0008-414X", "url": "http://www.cms.math.ca/cjm/", + "alternate_urls": ["https://www.cambridge.org/core/journals/canadian-journal-of-mathematics", + "http://journals.cms.math.ca/CJM/"]}, "url": "https://www.semanticscholar.org/paper/ae77dd776a7166331cba17f6c4ec9763ff68ba32", + "title": "Degrees in Which the Recursive Sets are Uniformly Recursive", "abstract": + "One of the most fundamental and characteristic features of recursion theory + is the fact that the recursive sets are not uniformly recursive. In this paper + we consider the degrees a such that the recursive sets are uniformly of degree + \u2266a and characterize them by the condition a\u2019 \u2266 0\". A number + of related results will be proved, and one of these will be combined with + a theorem of Yates to show that there is no r.e. degree a < 0\u2019 such that + the r.e. sets of degree \u2266a are uniformly of degree \u2266a. This result + and a generalization will be used to study the relationship between Turing + and many-one reducibility on the r.e. sets.", "venue": "Canadian Journal of + Mathematics - Journal Canadien de Mathematiques", "year": 1972, "referenceCount": + 8, "citationCount": 67, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-01-01", "journal": {"name": - "Mathematical Logic Quarterly", "volume": "49"}, "authors": [{"authorId": - "12322447", "name": "K. Weirauch"}]}, {"paperId": "41c6e292bdca174acc75ac0eb5eac8b1770ca22f", + "publicationTypes": null, "publicationDate": "1972-12-01", "journal": {"name": + "Canadian Journal of Mathematics", "pages": "1092 - 1099", "volume": "24"}, + "authors": [{"authorId": "1888089", "name": "C. Jockusch"}]}, {"paperId": + "5af10ef20f96afa4009170471e42ef5c4eb3bd94", "externalIds": {"MAG": "1572584819", + "DBLP": "journals/aim/TogeliusSKY13", "DOI": "10.1609/AIMAG.V34I3.2492", "CorpusId": + 16618883}, "corpusId": 16618883, "publicationVenue": {"id": "6fedff74-7525-4b7f-bbb4-4df4e23948e4", + "name": "The AI Magazine", "type": "journal", "alternate_names": ["AI Mag", + "Ai Mag", "Ai Magazine"], "issn": "0738-4602", "url": "https://www.aaai.org/Library/Magazine/magazine-library.php", + "alternate_urls": ["https://www.aaai.org/ojs/index.php/aimagazine/", "https://www.aaai.org/Magazine/magazine.php"]}, + "url": "https://www.semanticscholar.org/paper/5af10ef20f96afa4009170471e42ef5c4eb3bd94", + "title": "The Mario AI Championship 2009-2012", "abstract": "We give a brief + overview of the Mario AI Championship, a series of competitions based on an + open source clone of the seminal platform game Super Mario Bros. The competition + has four tracks. The gameplay and learning tracks resemble traditional reinforcement + learning competitions, the Level generation track focuses on the generation + of entertaining game levels, and the Turing Test track focuses on humanlike + game-playing behavior. We also outline some lessons learned from the competition + and its future. The article is written by the four organizers of the competition.", + "venue": "The AI Magazine", "year": 2013, "referenceCount": 24, "citationCount": + 67, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ojs.aaai.org/index.php/aimagazine/article/download/2492/2379", + "status": "BRONZE"}, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Education", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2013-09-15", "journal": {"name": "AI Mag.", "pages": "89-92", "volume": "34"}, + "authors": [{"authorId": "1810053", "name": "J. Togelius"}, {"authorId": "2632121", + "name": "Noor Shaker"}, {"authorId": "2463017", "name": "S. Karakovskiy"}, + {"authorId": "1686193", "name": "Georgios N. Yannakakis"}]}, {"paperId": "41c6e292bdca174acc75ac0eb5eac8b1770ca22f", "externalIds": {"MAG": "2107996672", "DBLP": "conf/lics/Kolaitis90", "DOI": - "10.1109/LICS.1990.113743", "CorpusId": 9353310}, "url": "https://www.semanticscholar.org/paper/41c6e292bdca174acc75ac0eb5eac8b1770ca22f", + "10.1109/LICS.1990.113743", "CorpusId": 9353310}, "corpusId": 9353310, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/41c6e292bdca174acc75ac0eb5eac8b1770ca22f", "title": "Implicit definability on finite structures and unambiguous computations", "abstract": "The expressive power and the computational strength of first-order implicit definability on finite structures are studied. It is shown that every @@ -39010,294 +44108,87 @@ interactions: of NP languages accepted by unambiguous Turing machines.<>", "venue": "[1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science", "year": 1990, "referenceCount": 32, "citationCount": 64, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1990-06-04", "journal": {"name": "[1990] Proceedings. - Fifth Annual IEEE Symposium on Logic in Computer Science", "pages": "168-180"}, - "authors": [{"authorId": "1795872", "name": "Phokion G. Kolaitis"}]}, {"paperId": - "681914bdfcff286d7577ef9beaeff83794585870", "externalIds": {"MAG": "2006713384", - "DOI": "10.1007/S11245-013-9182-Y", "CorpusId": 58833453}, "url": "https://www.semanticscholar.org/paper/681914bdfcff286d7577ef9beaeff83794585870", - "title": "Alan Turing\u2019s \u201cComputing Machinery and Intelligence\u201d", - "abstract": null, "venue": "", "year": 2013, "referenceCount": 0, "citationCount": - 17, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-09-04", "journal": {"name": - "Topoi", "pages": "293-299", "volume": "32"}, "authors": [{"authorId": "1755446", - "name": "C. Castelfranchi"}]}, {"paperId": "90d7bc5be8e6724bf6e99005bf99389915574aa5", - "externalIds": {"MAG": "1834126841", "CorpusId": 143250040}, "url": "https://www.semanticscholar.org/paper/90d7bc5be8e6724bf6e99005bf99389915574aa5", - "title": "\u00bfJugadores activos o ap\u00e9ndices del ejecutivo? Una evaluaci\u00f3n - del papel de los legisladores latinoamericanos en la toma de decisiones", - "abstract": "Legislatures are critical institutions for the effective functioning - of a demo- cratic system and in the policymaking process. They are expected - to represent the needs and wishes of citizens, identify problems and adopt - statutes to address them, and oversee the implementation of policies. However, - the extents to which Latin American legisla- tures fulfill these roles vary - greatly from country to country. Despite the recent prolifera-", "venue": - "", "year": 2010, "referenceCount": 12, "citationCount": 44, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": - [{"category": "Political Science", "source": "external"}, {"category": "Political - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Politica Y Gobierno", "pages": "3-24", "volume": - "17"}, "authors": [{"authorId": "2074851200", "name": "Sebastian M. Saiegh"}]}, - {"paperId": "b348cd16a8820df21e56196822a6e9c4b8cb8ad9", "externalIds": {"MAG": - "1197238029", "DOI": "10.1016/S0049-237X(09)70163-6", "CorpusId": 118548744}, - "url": "https://www.semanticscholar.org/paper/b348cd16a8820df21e56196822a6e9c4b8cb8ad9", - "title": "Algorithmic Procedures, Generalized Turing Algorithms, and Elementary - Recursion Theory", "abstract": null, "venue": "", "year": 1985, "referenceCount": - 22, "citationCount": 31, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, - "journal": {"name": "Studies in logic and the foundations of mathematics", - "pages": "285-308", "volume": "117"}, "authors": [{"authorId": "2026764", - "name": "J. Shepherdson"}]}, {"paperId": "558d816c57ec45a48009e629b0a5c91ecc7091ae", - "externalIds": {"DBLP": "journals/jetai/Fields89", "MAG": "2086238008", "DOI": - "10.1080/09528138908953699", "CorpusId": 8245028}, "url": "https://www.semanticscholar.org/paper/558d816c57ec45a48009e629b0a5c91ecc7091ae", - "title": "Consequences of nonclassical measurement for the algorithmic description - of continuous dynamical systems", "abstract": "Abstract Continuous dynamical - systems intuitively seem capable of more complex behavior than discrete systems. - If analyzed in the framework of the traditional theory of computation, a.continuous - dynamical system with countably many quasistable states has at least the computational - power of a universal Turing machine. Such an analysis assumes, however, the - classical notion of measurement. If measurement is viewed nonclassically, - a continuous dynamical system cannot, even in principle, exhibit behavior - that cannot be simulated by a universal Turing machine.", "venue": "Journal - of experimental and theoretical artificial intelligence (Print)", "year": - 1990, "referenceCount": 11, "citationCount": 19, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1990-07-01", "journal": {"name": "J. Exp. Theor. Artif. - Intell.", "pages": "171-178", "volume": "1"}, "authors": [{"authorId": "144993883", - "name": "C. Fields"}]}, {"paperId": "c87dfa8fe090bb7891bf03e0cad21813f1b35372", - "externalIds": {"MAG": "1532651989", "DBLP": "journals/mima/Shagrir97", "DOI": - "10.1023/A:1008236522699", "CorpusId": 28398589}, "url": "https://www.semanticscholar.org/paper/c87dfa8fe090bb7891bf03e0cad21813f1b35372", - "title": "Two Dogmas of Computationalism", "abstract": null, "venue": "Minds - and Machines", "year": 2004, "referenceCount": 44, "citationCount": 20, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Minds and Machines", "pages": - "321-344", "volume": "7"}, "authors": [{"authorId": "1742013", "name": "Oron - Shagrir"}]}, {"paperId": "49941c9a37047eb8e6f7da9d2595c328c12b3cf0", "externalIds": - {"MAG": "2017124536", "DOI": "10.1007/BF03010982", "CorpusId": 11585756, "PubMed": - "3742328"}, "url": "https://www.semanticscholar.org/paper/49941c9a37047eb8e6f7da9d2595c328c12b3cf0", - "title": "Unintentional hypothermia in the operating room", "abstract": null, - "venue": "Canadian Anaesthetists'' Society journal", "year": 1986, "referenceCount": - 60, "citationCount": 68, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1986-07-01", "journal": - {"name": "Canadian Anaesthetists\u2019 Society Journal", "pages": "515-527", - "volume": "33"}, "authors": [{"authorId": "1398640381", "name": "P. Morley-Forster"}]}, - {"paperId": "032e64c74c28e3a8b6f5e4e1b61a7ddd51035802", "externalIds": {"MAG": - "2158285111", "PubMedCentral": "3363030", "DOI": "10.1098/rsfs.2011.0118", - "CorpusId": 9215024, "PubMed": "22649583"}, "url": "https://www.semanticscholar.org/paper/032e64c74c28e3a8b6f5e4e1b61a7ddd51035802", - "title": "A mechanical Turing machine: blueprint for a biomolecular computer", - "abstract": "We describe a working mechanical device that embodies the theoretical - computing machine of Alan Turing, and as such is a universal programmable - computer. The device operates on three-dimensional building blocks by applying - mechanical analogues of polymer elongation, cleavage and ligation, movement - along a polymer, and control by molecular recognition unleashing allosteric - conformational changes. Logically, the device is not more complicated than - biomolecular machines of the living cell, and all its operations are part - of the standard repertoire of these machines; hence, a biomolecular embodiment - of the device is not infeasible. If implemented, such a biomolecular device - may operate in vivo, interacting with its biochemical environment in a program-controlled - manner. In particular, it may \u2018compute\u2019 synthetic biopolymers and - release them into its environment in response to input from the environment, - a capability that may have broad pharmaceutical and biological applications.", - "venue": "Interface Focus", "year": 2012, "referenceCount": 40, "citationCount": - 26, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-03-21", "journal": {"name": "Interface Focus", "pages": - "497 - 503", "volume": "2"}, "authors": [{"authorId": "143752440", "name": - "E. Shapiro"}]}, {"paperId": "251496cc19fb15d0e8ff85edb119371bcbd55c81", "externalIds": - {"MAG": "2109679463", "DOI": "10.2139/ssrn.855044", "CorpusId": 15675332}, - "url": "https://www.semanticscholar.org/paper/251496cc19fb15d0e8ff85edb119371bcbd55c81", - "title": "Which Shorts are Informed?", "abstract": "We construct a long daily - panel of short sales using proprietary NYSE order data. From 2000 to 2004, - shorting accounts for more than 12.9% of NYSE volume, sug- gesting that shorting - constraints are not widespread. As a group, these short sellers are well informed. - Heavily shorted stocks underperform lightly shorted stocks by a risk-adjusted - average of 1.16% over the following 20 trading days (15.6% annualized). Institutional - nonprogram short sales are the most informative; stocks heavily shorted by - institutions underperform by 1.43% the next month (19.6% annualized). The - re- sults indicate that, on average, short sellers are important contributors - to efficient stock prices. THROUGHOUT THE FINANCIAL ECONOMICS LITERATURE, - short sellers occupy an exalted place in the pantheon of investors as rational, - informed market participants who act to keep prices in line. Theoreticians - often generate a divergence be- tween prices and fundamentals by building - models that prohibit or constrain short sellers (e.g., Miller (1977), Harrison - and Kreps (1978), Duffie, Garleanu, and Pedersen (2002), Hong, Scheinkman, - and Xiong (2006)). Empirical evidence uniformly indicates that when short - sale constraints are relaxed, overvalua- tions become less severe, suggesting - that short sellers move prices toward fun- damentals (examples include Lamont - and Thaler (2003), Danielsen and Sorescu (2001), Jones and Lamont (2002), - Cohen, Diether, and Malloy (2007)). But there is surprisingly little direct - evidence that short sellers know what they are doing. There is indirect evidence - in the existing literature. For example, Aitken et al. (1998) show that in - Australia, where some short sales were immediately disclosed to the public, - the reporting of a short sale causes prices to decline immediately. Some authors - (but not all) find that short interest predicts fu- ture returns. 1 Dechow - et al. (2001) find that short sellers generate positive", "venue": "", "year": - 2007, "referenceCount": 61, "citationCount": 826, "influentialCitationCount": - 129, "isOpenAccess": true, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-02-04", - "journal": {"name": "FEN Professional & Practitioner Journal - Forthcoming"}, - "authors": [{"authorId": "4427896", "name": "Ekkehart Boehmer"}, {"authorId": - "6795283", "name": "Charles M. Jones"}, {"authorId": "2109107304", "name": - "Xiaoyan Zhang"}]}, {"paperId": "fdad6d7e0da2b0c5dc2325db9119d87f8bd1a0a9", - "externalIds": {"MAG": "2896271711", "DBLP": "journals/aml/ChubbFH09", "DOI": - "10.1007/s00153-008-0110-6", "CorpusId": 8318124}, "url": "https://www.semanticscholar.org/paper/fdad6d7e0da2b0c5dc2325db9119d87f8bd1a0a9", - "title": "Degree spectra of the successor relation of computable linear orderings", - "abstract": null, "venue": "Archive for Mathematical Logic", "year": 2009, - "referenceCount": 15, "citationCount": 13, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Archive for Mathematical Logic", "pages": "7-13", "volume": "48"}, - "authors": [{"authorId": "144109961", "name": "Jennifer Chubb"}, {"authorId": - "144222727", "name": "A. Frolov"}, {"authorId": "3187833", "name": "V. Harizanov"}]}, - {"paperId": "bd208e71d77cda2b0f89f4854bf7498558c1f210", "externalIds": {"MAG": - "1896986176", "DOI": "10.1007/978-1-4899-2305-9_20", "CorpusId": 119848142}, - "url": "https://www.semanticscholar.org/paper/bd208e71d77cda2b0f89f4854bf7498558c1f210", - "title": "Algorithmic Information Content, Church \u2014 Turing Thesis, Physical - Entropy, and Maxwell\u2019s Demon", "abstract": null, "venue": "", "year": - 1991, "referenceCount": 18, "citationCount": 59, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "245-259", "volume": ""}, "authors": - [{"authorId": "2094349809", "name": "W. H. Zurek"}]}, {"paperId": "01811aa6aeb7235fbc23bb901e0959f198a50939", - "externalIds": {"MAG": "2151334287", "DOI": "10.2307/3236806", "CorpusId": - 85577298}, "url": "https://www.semanticscholar.org/paper/01811aa6aeb7235fbc23bb901e0959f198a50939", - "title": "Ecological and evolutionary differences between Mediterranean seeders - and resprouters", "abstract": "Differences in allocation patterns between - seeders and resprouters in several Mediterranean plant communities (Australia, - California and South Africa) have led to the predic- tion that seedlings of - seeders grow faster than those of resprouters. In the Mediterranean Basin, - it has also been hypothesized that regeneration strategy of plants after fire - is associated with several other life history traits. This paper tests both - hypotheses for the dominant plants in the Mediterranean Basin from litera- - ture data. Results show that seeders from the Mediterranean Basin grow significantly - faster and allocate more biomass to leaf plus paracotyledons than resprouters. - Seeders are mainly non- sclerophyllous, anemochorous, dry-fruited, small-seeded - species that evolved in the Quaternary (post-Pliocene) and are associated - with earlier successional stages. Resprouters are mainly sclero- phyllous, - vertebrate-dispersed, fleshy-fruited, large-seeded species that evolved in - the Tertiary (pre-Pliocene) and are associated with late successional stages.", - "venue": "", "year": 2000, "referenceCount": 33, "citationCount": 120, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2000-04-01", "journal": {"name": "Journal of Vegetation Science", "pages": - "265-268", "volume": "11"}, "authors": [{"authorId": "30008906", "name": "M. - Verd\u00fa"}]}, {"paperId": "6f6f1cfccb0f70831a0d44a6d950d9f92cd2de06", "externalIds": - {"MAG": "2166148123", "DOI": "10.1128/JB.185.18.5632-5638.2003", "CorpusId": - 15071149, "PubMed": "12949116"}, "url": "https://www.semanticscholar.org/paper/6f6f1cfccb0f70831a0d44a6d950d9f92cd2de06", - "title": "Periodicity of Cell Attachment Patterns during Escherichia coli - Biofilm Development", "abstract": "ABSTRACT The complex architecture of bacterial - biofilms inevitably raises the question of their design. Microstructure of - developing Escherichia coli biofilms was analyzed under static and laminar - flow conditions. Cell attachment during early biofilm formation exhibited - periodic density patterns that persisted during development. Several models - for the origination of biofilm microstructure are considered, including an - activator-inhibitor or Turing model.", "venue": "Journal of Bacteriology", - "year": 2003, "referenceCount": 44, "citationCount": 36, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2003-09-15", "journal": {"name": "Journal - of Bacteriology", "pages": "5632 - 5638", "volume": "185"}, "authors": [{"authorId": - "46530384", "name": "K. Agladze"}, {"authorId": "48694857", "name": "D. Jackson"}, - {"authorId": "3166887", "name": "T. Romeo"}]}, {"paperId": "e26b40a0dfd78af08e47717dcced2cfbc973ab1a", - "externalIds": {"MAG": "2305573925", "CorpusId": 15553743}, "url": "https://www.semanticscholar.org/paper/e26b40a0dfd78af08e47717dcced2cfbc973ab1a", - "title": "On evaluating ai systems for medical diagnosis", "abstract": "Among - the difficulties in evaluating AI-type medical diagnosis systems are: the - intermediate conclusions of the AI system need to be looked at in addition - to the \u201cfinal\u201d answer; the \u201csuperhuman human\u201d fallacy - must be resisted; both pro- and anti-computer biases during evaluation must - be guarded against; and methods for estimating how the approach will scale - upwards to larger domains are needed We propose a type of Turing test for - the evaluation problem, designed to provide some protection against the problems - listed above We propose to measure both the accuracy of diagnosis and the - structure of reasoning, the latter with a view to gauging how well the system - will scale up", "venue": "", "year": 1989, "referenceCount": 12, "citationCount": - 67, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1989-04-01", "journal": {"name": "Ai Magazine", - "volume": ""}, "authors": [{"authorId": "145414142", "name": "B. Chandrasekaran"}]}, - {"paperId": "347e2af53e5564f4930e39e115808aca8d50fd06", "externalIds": {"DBLP": - "journals/cacm/Daylight14", "MAG": "2070018975", "DOI": "10.1145/2629499", - "CorpusId": 41108598}, "url": "https://www.semanticscholar.org/paper/347e2af53e5564f4930e39e115808aca8d50fd06", - "title": "A Turing tale", "abstract": "Assessing the accuracy of popular descriptions - of Alan Turing''s influences and legacy.", "venue": "Communications of the - ACM", "year": 2014, "referenceCount": 23, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", + ["JournalArticle"], "publicationDate": "1990-06-04", "journal": {"name": "[1990] + Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science", "pages": + "168-180"}, "authors": [{"authorId": "1795872", "name": "Phokion G. Kolaitis"}]}, + {"paperId": "05a499497274b3dc7b3694e63d435858a1b5be84", "externalIds": {"MAG": + "2133210353", "DOI": "10.1142/S021833901000338X", "CorpusId": 122951508}, + "corpusId": 122951508, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/05a499497274b3dc7b3694e63d435858a1b5be84", + "title": "THE SPATIAL PATTERNS THROUGH DIFFUSION-DRIVEN INSTABILITY IN MODIFIED + LESLIE-GOWER AND HOLLING-TYPE II PREDATOR-PREY MODEL", "abstract": "Formation + of spatial patterns in prey-predator system is a central issue in ecology. + In this paper Turing structure through diffusion driven instability in a modified + Leslie-Gower and Holling-type II predator-prey model has been investigated. + The parametric space for which Turing spatial structure takes place has been + found out. Extensive numerical experiments have been performed to show the + role of diffusion coefficients and other important parameters of the system + in Turing instability that produces some elegant patterns that have not been + observed in the earlier findings. Finally it is concluded that the diffusion + can lead the prey population to become isolated in the two-dimensional spatial + domain.", "venue": "", "year": 2010, "referenceCount": 13, "citationCount": + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2010-09-01", "journal": {"name": + "Journal of Biological Systems", "pages": "593-603", "volume": "18"}, "authors": + [{"authorId": "47334108", "name": "Gui\u2010Quan Sun"}, {"authorId": "2016534", + "name": "S. Sarwardi"}, {"authorId": "3093869", "name": "P. Pal"}, {"authorId": + "103345585", "name": "Md Sabiar Rahman"}]}, {"paperId": "c6cf2fee2c7e2c00ed324d10a1bae8df921beb3b", + "externalIds": {"MAG": "601750276", "CorpusId": 82497077}, "corpusId": 82497077, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c6cf2fee2c7e2c00ed324d10a1bae8df921beb3b", + "title": "Between hazards of starvation and risk of predation : the ecology + of offshore animals", "abstract": "Go Open Journal of Ecology. Effects of + temperature and resource abundance on smalland large-bodied cladocerans: Community + stability and species replacement. Irina Yu. [3] Gliwicz, Z.M. (2003) Between + hazards of starvation and risk of predation: The ecology of offshore animals. + Inter-national Ecology Institute, Oldendorf/Luhe. [4] Hanski, I. and Ranta, + E. (1983) Coexistence in a patchy environment: Three species of Daphnia in + rock pools. Journal of Animal Ecology, 52, 263-279. doi:10.2307/4599. [5] + Foran, A.F. (1986) A comparison of the life history fea-tures of a temperate + and a subtropical Daphnia species. Oikos, 46, 185-193. doi:10.2307/3565466. + C o n t a c t C o p y r i g h t a n d D i s c l a i m e r S i t e m a p S + e a r c h", "venue": "", "year": 2003, "referenceCount": 3, "citationCount": + 122, "influentialCitationCount": 10, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "21556655", "name": "M. Z. Gliwicz"}]}, + {"paperId": "254a0a48b88289e4acaf757c5fe1da1295f3774f", "externalIds": {"MAG": + "2085072120", "DBLP": "conf/stoc/Galil76", "DOI": "10.1145/800113.803644", + "CorpusId": 18129125}, "corpusId": 18129125, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/254a0a48b88289e4acaf757c5fe1da1295f3774f", + "title": "Real-time algorithms for string-matching and palindrome recognition", + "abstract": "We give a sufficient condition when an on-line algorithm can + be transformed into a real-time algorithm. We use this condition to construct + real-time algorithms for string-matching and palindrome recognition problems + by random access machines and by Turing machines.", "venue": "Symposium on + the Theory of Computing", "year": 1976, "referenceCount": 10, "citationCount": + 35, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-09-23", "journal": {"name": "Communications of the ACM", "pages": "36 - - 38", "volume": "57"}, "authors": [{"authorId": "1745926", "name": "E. Daylight"}]}, - {"paperId": "8b6eee0d96d57652fefaee0292c9f43de552fe00", "externalIds": {"MAG": - "2044322539", "DOI": "10.1103/PHYSREVE.79.026109", "CorpusId": 25965777, "PubMed": - "19391808"}, "url": "https://www.semanticscholar.org/paper/8b6eee0d96d57652fefaee0292c9f43de552fe00", - "title": "Dynamics of reaction-diffusion systems in a subdiffusive regime.", - "abstract": "In this paper, we examine the dynamics of reaction-diffusion - systems with fractional time derivatives. It is shown that in these conditions - diffusion is anomalous, in the sense that the mean-square displacement r2 - approximately tgamma, where gamma<1, a situation known as subdiffusion. We - study the conditions for the appearance of a diffusion-driven instability - and show that the restrictive conditions for a Turing instability are relaxed. - This implies that systems whose kinetics are not of the activator-inhibitor - kind can have a Turing instability and a modulated final state. We demonstrate - our results with numerical calculations in two dimensions using a generic - Turing model.", "venue": "Physical review. E, Statistical, nonlinear, and - soft matter physics", "year": 2009, "referenceCount": 46, "citationCount": - 16, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-02-20", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 026109\n ", - "volume": "79 2 Pt 2"}, "authors": [{"authorId": "146499011", "name": "D. - Hern\u00e1ndez"}, {"authorId": "70988914", "name": "C. Varea"}, {"authorId": - "37747895", "name": "R. Barrio"}]}, {"paperId": "0539a37608c877beebdb4f6b3ad40661b9357468", - "externalIds": {"MAG": "2053203354", "DOI": "10.1177/014662168000400209", - "CorpusId": 121985910}, "url": "https://www.semanticscholar.org/paper/0539a37608c877beebdb4f6b3ad40661b9357468", - "title": "A Comparison of the Nedelsky and Angoff Cutting Score Procedures - Using Generalizability Theory", "abstract": "Nedelsky (1954) and Angoff (1971) - have sug gested procedures for establishing a cutting score based on raters'' - judgments about the likely perfor mance of minimally competent examinees on - each item in a test. In this paper generalizability theory is used to characterize - and quantify expected vari ance in cutting scores resulting from each proce - dure. Experimental test data are used to illustrate this approach and to compare - the two procedures. Consideration is also given to the impact of rater disagreement - on some issues of measurement relia bility or dependability. Results suggest - that the dif ferences between the Nedel sky and Angoff proce dures may be - of greater consequence than their ap parent similarities. In particular, the - restricted na ture of the Nedelsky (inferred) probability scale may constitute - a basis for seriously questioning the ap plicability of this procedure in - certain contexts.", "venue": "", "year": 1980, "referenceCount": 20, "citationCount": - 118, "influentialCitationCount": 12, "isOpenAccess": true, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1980-04-01", "journal": {"name": "Applied - Psychological Measurement", "pages": "219 - 240", "volume": "4"}, "authors": - [{"authorId": "50175301", "name": "R. Brennan"}, {"authorId": "36717572", - "name": "Robert E. Lockwood"}]}, {"paperId": "3fe1f70676bcf1fa0e1f637ff75878136eac9910", - "externalIds": {"DBLP": "conf/stoc/FournierK98", "MAG": "2064463780", "DOI": - "10.1145/276698.276864", "CorpusId": 6912114}, "url": "https://www.semanticscholar.org/paper/3fe1f70676bcf1fa0e1f637ff75878136eac9910", + "1976-05-03", "journal": {"pages": "161-173"}, "authors": [{"authorId": "1694216", + "name": "Z. Galil"}]}, {"paperId": "f08e5b97e9001e0db0bc998d473e536dc8eeae60", + "externalIds": {"MAG": "34363091", "DOI": "10.1007/978-1-4615-1147-2_7", "CorpusId": + 59646413}, "corpusId": 59646413, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f08e5b97e9001e0db0bc998d473e536dc8eeae60", + "title": "Intelligent Decision Support Methods", "abstract": null, "venue": + "", "year": 2003, "referenceCount": 0, "citationCount": 56, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "221-272", "volume": ""}, "authors": [{"authorId": "1688924", "name": + "N. Matsatsinis"}, {"authorId": "2368368", "name": "Y. Siskos"}]}, {"paperId": + "3fe1f70676bcf1fa0e1f637ff75878136eac9910", "externalIds": {"DBLP": "conf/stoc/FournierK98", + "MAG": "2064463780", "DOI": "10.1145/276698.276864", "CorpusId": 6912114}, + "corpusId": 6912114, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/3fe1f70676bcf1fa0e1f637ff75878136eac9910", "title": "Are lower bounds easier over the reals?", "abstract": "We show that proving lower bounds in algebraic models of computa(cid:3) tion may not be easier than in the standard Turing machine model(cid:6) For instance(cid:7) @@ -39316,14 +44207,21 @@ interactions: propose a few problems in algebraic complexity and topological complexity(cid:1)", "venue": "Symposium on the Theory of Computing", "year": 1998, "referenceCount": 30, "citationCount": 21, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-05-23", "journal": - {"pages": "507-513"}, "authors": [{"authorId": "3062563", "name": "Herv\u00e9 - Fournier"}, {"authorId": "1710207", "name": "P. Koiran"}]}, {"paperId": "475cd18d385b4a01c681479c68d32bb76f7e38db", + "openAccessPdf": {"url": "https://hal-lara.archives-ouvertes.fr/hal-02101925/file/RR1997-38.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1998-05-23", "journal": {"pages": "507-513"}, "authors": + [{"authorId": "3062563", "name": "Herv\u00e9 Fournier"}, {"authorId": "1710207", + "name": "P. Koiran"}]}, {"paperId": "475cd18d385b4a01c681479c68d32bb76f7e38db", "externalIds": {"MAG": "2067940271", "DOI": "10.2178/jsl/1082418544", "CorpusId": - 123684045}, "url": "https://www.semanticscholar.org/paper/475cd18d385b4a01c681479c68d32bb76f7e38db", + 123684045}, "corpusId": 123684045, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/475cd18d385b4a01c681479c68d32bb76f7e38db", "title": "\u03a011 relations and paths through", "abstract": "When bounds on complexity of some aspect of a structure are preserved under isomorphism, we refer to them as intrinsic. Here, building on work of Soskov [34], [33], @@ -39343,278 +44241,236 @@ interactions: set. There is a pair of paths whose degrees form a minimal pair. However, there is no path of minimal degree.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2004, "referenceCount": 35, "citationCount": 21, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-06-01", - "journal": {"name": "Journal of Symbolic Logic", "pages": "585 - 611", "volume": - "69"}, "authors": [{"authorId": "144121388", "name": "S. Goncharov"}, {"authorId": - "3187833", "name": "V. Harizanov"}, {"authorId": "2490044", "name": "J. Knight"}, - {"authorId": "1817824", "name": "R. Shore"}]}, {"paperId": "806f695cbbad05dced397732d9b470842bc9211d", - "externalIds": {"MAG": "2184421550", "CorpusId": 123930366}, "url": "https://www.semanticscholar.org/paper/806f695cbbad05dced397732d9b470842bc9211d", - "title": "Turing Patterns in CNNs-Part 11: Equations and Behaviors", "abstract": - "The general state equations describing two-grid cou- pled CNNs based on the - reduced Chua''s circuit are derived, and the analysis of ''hring pattern formation - is approached from a specific point of view: spatial-eigenfunction based equation - decoupling. Discrete spatial eigenfunctions for two common types of boundary - conditions are presented, and the way the dynamics is influenced by the shape - and position of the dispersion curve (i-1 i) N PART I of this paper (l), it - was shown that two-grid I coupled CNNs based on the reduced Chua''s circuit - have the potential of producing reaction-diffusion type (Turing) patterns.'' - In the above paper the general principle of pattern formation has been described, - the conditions concerning the individual cell have been analyzed, a qualitative - explanation of the pattern formation mechanism in a 1-D c\"J has been given, - and the multiple equilibria property has been exemplified. The key mechanism - of pattern formation is based on two kinds of conditions. The first kind refers - to requirements for the isolated cells to have a unique, stable equilibrium - point. These conditions, in terms of the nonlinear characteristic and of he - Jacobian matrix of the isolated cell at the equilibrium point, have been derived - in (l). For the whole interconnected array, the above equilibrium is still - an Fig. 1. The (i,j) node of the two-grid coupled CNN.", "venue": "", "year": - 1995, "referenceCount": 4, "citationCount": 26, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1876298", - "name": "L. Goras"}]}, {"paperId": "93e21a3025c07fc52b6a1d48e363b15ef4039246", - "externalIds": {"MAG": "1489972621", "CorpusId": 10277374}, "url": "https://www.semanticscholar.org/paper/93e21a3025c07fc52b6a1d48e363b15ef4039246", - "title": "A lower bound to palindrome recognition by probabilistic Turing - machines", "abstract": "We call attention to the problem of proving lower - bounds on probabilistic Turing machine computations. It is shown that any - probabilisitc Turing machine recognizing the language L = {w $\\phi$ w | w - $\\epsilon$ ${{0,1}}^*$} with error $\\lambda$ > 1/2 must take $\\Omega$(n - log n) time.", "venue": "", "year": 1977, "referenceCount": 14, "citationCount": - 15, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1977-12-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "1770729", "name": "A. Yao"}]}, - {"paperId": "8aa436c6ef179dd2bcffbaae705825237812ba84", "externalIds": {"PubMedCentral": - "5380321", "MAG": "2605256318", "DOI": "10.1371/journal.pone.0174946", "CorpusId": - 1668331, "PubMed": "28376090"}, "url": "https://www.semanticscholar.org/paper/8aa436c6ef179dd2bcffbaae705825237812ba84", - "title": "Turing mechanism underlying a branching model for lung morphogenesis", - "abstract": "The mammalian lung develops through branching morphogenesis. - Two primary forms of branching, which occur in order, in the lung have been - identified: tip bifurcation and side branching. However, the mechanisms of - lung branching morphogenesis remain to be explored. In our previous study, - a biological mechanism was presented for lung branching pattern formation - through a branching model. Here, we provide a mathematical mechanism underlying - the branching patterns. By decoupling the branching model, we demonstrated - the existence of Turing instability. We performed Turing instability analysis - to reveal the mathematical mechanism of the branching patterns. Our simulation - results show that the Turing patterns underlying the branching patterns are - spot patterns that exhibit high local morphogen concentration. The high local - morphogen concentration induces the growth of branching. Furthermore, we found - that the sparse spot patterns underlie the tip bifurcation patterns, while - the dense spot patterns underlies the side branching patterns. The dispersion - relation analysis shows that the Turing wavelength affects the branching structure. - As the wavelength decreases, the spot patterns change from sparse to dense, - the rate of tip bifurcation decreases and side branching eventually occurs - instead. In the process of transformation, there may exists hybrid branching - that mixes tip bifurcation and side branching. Since experimental studies - have reported that branching mode switching from side branching to tip bifurcation - in the lung is under genetic control, our simulation results suggest that - genes control the switch of the branching mode by regulating the Turing wavelength. - Our results provide a novel insight into and understanding of the formation - of branching patterns in the lung and other biological systems.", "venue": - "PLoS ONE", "year": 2017, "referenceCount": 23, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2004-06-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "585 + - 611", "volume": "69"}, "authors": [{"authorId": "144121388", "name": "S. + Goncharov"}, {"authorId": "3187833", "name": "V. Harizanov"}, {"authorId": + "2490044", "name": "J. Knight"}, {"authorId": "1817824", "name": "R. Shore"}]}, + {"paperId": "50f8564e96cfdc5560dd4392c172b68067034bf8", "externalIds": {"MAG": + "1583193753", "DBLP": "conf/cocoon/Martin-VidePPR02", "DOI": "10.1007/3-540-45655-4_32", + "CorpusId": 16336248}, "corpusId": 16336248, "publicationVenue": {"id": "2154536c-5a59-438e-a3a9-aa85c7d9a4f9", + "name": "International Computing and Combinatorics Conference", "type": "conference", + "alternate_names": ["COCOON", "Comput Comb Conf", "Computing and Combinatorics + Conference", "Int Comput Comb Conf"], "url": "http://www.wikicfp.com/cfp/program?id=523"}, + "url": "https://www.semanticscholar.org/paper/50f8564e96cfdc5560dd4392c172b68067034bf8", + "title": "A New Class of Symbolic Abstract Neural Nets: Tissue P Systems", + "abstract": null, "venue": "International Computing and Combinatorics Conference", + "year": 2002, "referenceCount": 24, "citationCount": 125, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://oa.upm.es/15588/1/INVE_MEM_2002_124373.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2002-08-15", "journal": {"pages": "290-299"}, + "authors": [{"authorId": "1397242142", "name": "C. Mart\u00edn-Vide"}, {"authorId": + "143716007", "name": "J. Pazos"}, {"authorId": "1698119", "name": "G. Paun"}, + {"authorId": "1397793046", "name": "A. Rodr\u00edguez-Pat\u00f3n"}]}, {"paperId": + "e26b40a0dfd78af08e47717dcced2cfbc973ab1a", "externalIds": {"MAG": "2305573925", + "CorpusId": 15553743}, "corpusId": 15553743, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e26b40a0dfd78af08e47717dcced2cfbc973ab1a", + "title": "On evaluating ai systems for medical diagnosis", "abstract": "Among + the difficulties in evaluating AI-type medical diagnosis systems are: the + intermediate conclusions of the AI system need to be looked at in addition + to the \u201cfinal\u201d answer; the \u201csuperhuman human\u201d fallacy + must be resisted; both pro- and anti-computer biases during evaluation must + be guarded against; and methods for estimating how the approach will scale + upwards to larger domains are needed We propose a type of Turing test for + the evaluation problem, designed to provide some protection against the problems + listed above We propose to measure both the accuracy of diagnosis and the + structure of reasoning, the latter with a view to gauging how well the system + will scale up", "venue": "", "year": 1989, "referenceCount": 12, "citationCount": + 67, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-04-01", + "journal": {"name": "Ai Magazine", "volume": ""}, "authors": [{"authorId": + "145414142", "name": "B. Chandrasekaran"}]}, {"paperId": "8b6eee0d96d57652fefaee0292c9f43de552fe00", + "externalIds": {"MAG": "2044322539", "DOI": "10.1103/PHYSREVE.79.026109", + "CorpusId": 25965777, "PubMed": "19391808"}, "corpusId": 25965777, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8b6eee0d96d57652fefaee0292c9f43de552fe00", + "title": "Dynamics of reaction-diffusion systems in a subdiffusive regime.", + "abstract": "In this paper, we examine the dynamics of reaction-diffusion + systems with fractional time derivatives. It is shown that in these conditions + diffusion is anomalous, in the sense that the mean-square displacement r2 + approximately tgamma, where gamma<1, a situation known as subdiffusion. We + study the conditions for the appearance of a diffusion-driven instability + and show that the restrictive conditions for a Turing instability are relaxed. + This implies that systems whose kinetics are not of the activator-inhibitor + kind can have a Turing instability and a modulated final state. We demonstrate + our results with numerical calculations in two dimensions using a generic + Turing model.", "venue": "Physical review. E, Statistical, nonlinear, and + soft matter physics", "year": 2009, "referenceCount": 46, "citationCount": + 16, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2009-02-20", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 026109\n ", + "volume": "79 2 Pt 2"}, "authors": [{"authorId": "146499011", "name": "D. + Hern\u00e1ndez"}, {"authorId": "70988914", "name": "C. Varea"}, {"authorId": + "37747895", "name": "R. Barrio"}]}, {"paperId": "b6afc2f1a96f9fce324661192bde95fac5c1227d", + "externalIds": {"DBLP": "conf/tamc/StephanY06", "MAG": "2516912329", "DOI": + "10.1007/11750321_72", "CorpusId": 18615984}, "corpusId": 18615984, "publicationVenue": + {"id": "219a382a-ee91-4126-83f7-2c4f2832d11c", "name": "Theory and Applications + of Models of Computation", "type": "conference", "alternate_names": ["Theory + Appl Model Comput", "TAMC"]}, "url": "https://www.semanticscholar.org/paper/b6afc2f1a96f9fce324661192bde95fac5c1227d", + "title": "Lowness for Weakly 1-generic and Kurtz-Random", "abstract": null, + "venue": "Theory and Applications of Models of Computation", "year": 2006, + "referenceCount": 18, "citationCount": 37, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-05-15", "journal": {"pages": "756-764"}, "authors": + [{"authorId": "1699450", "name": "F. Stephan"}, {"authorId": "2804470", "name": + "Liang Yu"}]}, {"paperId": "6f6f1cfccb0f70831a0d44a6d950d9f92cd2de06", "externalIds": + {"MAG": "2166148123", "DOI": "10.1128/JB.185.18.5632-5638.2003", "CorpusId": + 15071149, "PubMed": "12949116"}, "corpusId": 15071149, "publicationVenue": + {"id": "2132f348-fc4d-44c0-8717-e40a728868af", "name": "Journal of Bacteriology", + "type": "journal", "alternate_names": ["J Bacteriol"], "issn": "0021-9193", + "url": "https://jb.asm.org/", "alternate_urls": ["http://jb.asm.org/"]}, "url": + "https://www.semanticscholar.org/paper/6f6f1cfccb0f70831a0d44a6d950d9f92cd2de06", + "title": "Periodicity of Cell Attachment Patterns during Escherichia coli + Biofilm Development", "abstract": "ABSTRACT The complex architecture of bacterial + biofilms inevitably raises the question of their design. Microstructure of + developing Escherichia coli biofilms was analyzed under static and laminar + flow conditions. Cell attachment during early biofilm formation exhibited + periodic density patterns that persisted during development. Several models + for the origination of biofilm microstructure are considered, including an + activator-inhibitor or Turing model.", "venue": "Journal of Bacteriology", + "year": 2003, "referenceCount": 44, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc193763?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2017-04-04", "journal": {"name": "PLoS - ONE", "volume": "12"}, "authors": [{"authorId": "2149189685", "name": "Hui - Xu"}, {"authorId": "1750604", "name": "Mingzhu Sun"}, {"authorId": "2145734155", - "name": "Xin Zhao"}]}, {"paperId": "f08e5b97e9001e0db0bc998d473e536dc8eeae60", - "externalIds": {"MAG": "34363091", "DOI": "10.1007/978-1-4615-1147-2_7", "CorpusId": - 59646413}, "url": "https://www.semanticscholar.org/paper/f08e5b97e9001e0db0bc998d473e536dc8eeae60", - "title": "Intelligent Decision Support Methods", "abstract": null, "venue": - "", "year": 2003, "referenceCount": 0, "citationCount": 56, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "221-272", "volume": ""}, "authors": - [{"authorId": "1688924", "name": "N. Matsatsinis"}, {"authorId": "2368368", - "name": "Y. Siskos"}]}, {"paperId": "b91ac097a01a56fc85ad49ff9782eb593ace3808", - "externalIds": {"MAG": "1986711118", "DOI": "10.1103/PHYSREVE.84.046216", - "CorpusId": 21207401, "PubMed": "22181254"}, "url": "https://www.semanticscholar.org/paper/b91ac097a01a56fc85ad49ff9782eb593ace3808", - "title": "Stochastic reaction and diffusion on growing domains: understanding - the breakdown of robust pattern formation.", "abstract": "Many biological - patterns, from population densities to animal coat markings, can be thought - of as heterogeneous spatiotemporal distributions of mobile agents. Many mathematical - models have been proposed to account for the emergence of this complexity, - but, in general, they have consisted of deterministic systems of differential - equations, which do not take into account the stochastic nature of population - interactions. One particular, pertinent criticism of these deterministic systems - is that the exhibited patterns can often be highly sensitive to changes in - initial conditions, domain geometry, parameter values, etc. Due to this sensitivity, - we seek to understand the effects of stochasticity and growth on paradigm - biological patterning models. In this paper, we extend spatial Fourier analysis - and growing domain mapping techniques to encompass stochastic Turing systems. - Through this we find that the stochastic systems are able to realize much - richer dynamics than their deterministic counterparts, in that patterns are - able to exist outside the standard Turing parameter range. Further, it is - seen that the inherent stochasticity in the reactions appears to be more important - than the noise generated by growth, when considering which wave modes are - excited. Finally, although growth is able to generate robust pattern sequences - in the deterministic case, we see that stochastic effects destroy this mechanism - for conferring robustness. However, through Fourier analysis we are able to - suggest a reason behind this lack of robustness and identify possible mechanisms - by which to reclaim it.", "venue": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "year": 2011, "referenceCount": 59, "citationCount": - 57, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-10-28", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 046216\n ", - "volume": "84 4 Pt 2"}, "authors": [{"authorId": "6566804", "name": "T. Woolley"}, - {"authorId": "35275545", "name": "R. Baker"}, {"authorId": "2662569", "name": - "E. Gaffney"}, {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": - "57e2b2dccda37bbb38e711084dd7e3cdfbfe4eaf", "externalIds": {"ArXiv": "gr-qc/0204036", - "MAG": "2020759607", "DOI": "10.1103/PhysRevD.65.104006", "CorpusId": 119518634}, - "url": "https://www.semanticscholar.org/paper/57e2b2dccda37bbb38e711084dd7e3cdfbfe4eaf", - "title": "Naked singularities in cylindrical collapse of counterrotating dust - shells", "abstract": "\u2264 0, (2)which we assume henceforth. The matter - content ofthe space-time may be described as infalling null dust.There is - a curvature singularity along r = 0. Since thesolution is Petrov type N with - a pure radiation energy-momentum tensor, all curvature invariants vanish. - It hasbeen shown in [1] that this is a parallel propagated curva-ture singularity. - Additionally, scalars such as R", "venue": "", "year": 2002, "referenceCount": - 0, "citationCount": 35, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2002-04-09", "journal": {"name": - "Physical Review D", "pages": "104006", "volume": "65"}, "authors": [{"authorId": - "66978669", "name": "B. Nolan"}]}, {"paperId": "31d109f985e16561fbd4aa4ddaa2bce2954dc5bc", - "externalIds": {"DBLP": "journals/iandc/ItoITT82", "MAG": "2088973818", "DOI": - "10.1016/S0019-9958(82)90572-1", "CorpusId": 30141027}, "url": "https://www.semanticscholar.org/paper/31d109f985e16561fbd4aa4ddaa2bce2954dc5bc", - "title": "Two-Dimensional Alternating Turing Machines with Only Universal - States", "abstract": null, "venue": "Information and Control", "year": 1982, - "referenceCount": 19, "citationCount": 31, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1982-10-01", "journal": {"name": "Inf. Control.", "pages": "193-221", "volume": - "55"}, "authors": [{"authorId": "1871564", "name": "A. Ito"}, {"authorId": - "1737209", "name": "Katsushi Inoue"}, {"authorId": "2339053", "name": "I. - Takanami"}, {"authorId": "2054314776", "name": "H. Taniguchi"}]}, {"paperId": - "3fc38dac672d50ba7d6ea54d45f1b99ea5c0e327", "externalIds": {"MAG": "2805272597", - "DBLP": "conf/haptics/KarnielNAPL10", "DOI": "10.1007/978-3-642-14064-8_29", - "CorpusId": 18490853}, "url": "https://www.semanticscholar.org/paper/3fc38dac672d50ba7d6ea54d45f1b99ea5c0e327", - "title": "A Turing-Like Handshake Test for Motor Intelligence", "abstract": - null, "venue": "EuroHaptics", "year": 2010, "referenceCount": 20, "citationCount": - 25, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2010-07-08", "journal": - {"pages": "197-204"}, "authors": [{"authorId": "1848564", "name": "A. Karniel"}, - {"authorId": "2166933", "name": "I. Nisky"}, {"authorId": "1396288287", "name": - "Guy Avraham"}, {"authorId": "2514098", "name": "Bat-Chen Peles"}, {"authorId": - "1403907603", "name": "S. Levy-Tzedek"}]}, {"paperId": "f0b854a31c23e4f77e25248190897fafc436f5fb", - "externalIds": {"ArXiv": "1904.09683", "MAG": "2980786975", "DOI": "10.1007/s00285-021-01552-y", - "CorpusId": 209989256, "PubMed": "33475826"}, "url": "https://www.semanticscholar.org/paper/f0b854a31c23e4f77e25248190897fafc436f5fb", - "title": "Turing conditions for pattern forming systems on evolving manifolds", - "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2019, - "referenceCount": 125, "citationCount": 25, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2019-04-22", "journal": {"name": "Journal - of Mathematical Biology", "pages": "1-61", "volume": "82"}, "authors": [{"authorId": - "8371615", "name": "R. V. Van Gorder"}, {"authorId": "2691918", "name": "V. - Klika"}, {"authorId": "22256586", "name": "Andrew L. Krause"}]}, {"paperId": - "3245519444fd3f706bb133f4cf01b093a0816ba5", "externalIds": {"MAG": "83971587", - "CorpusId": 115884416}, "url": "https://www.semanticscholar.org/paper/3245519444fd3f706bb133f4cf01b093a0816ba5", - "title": "Active libraries and universal languages", "abstract": "Universal - programming languages are an old dream. There is the computability sense of - Turing-universal; Landin and others have advocated syntactically universal - languages, a path leading to extensible syntax, e.g., macros. A stronger kind - of universality would reduce the need for domain-specific languages\u2014they - could be replaced by \u2018active libraries\u2019 providing and safety requirements. - Experience suggests that much domain-specific optimization can be realized - by staging, i.e., doing computations at compile time to produce an efficient - run-time. Rudimentary computability arguments show that languages with a \u2018Turing-complete - kernel\u2019 can be both stage-universal and safety-universal. But making - this approach practical requires compilers that find optimal programs, and - this is a hard problem. \nGuaranteed Optimization is a proof technique for - constructing compilers that find optimal programs within a decidable approximation - of program equivalence. This gives us compilers whose kernels possess intuitive - closure properties akin to, but stronger than, languages with explicit staging, - and can meet the \u2018Turing-complete kernel\u2019 requirement to be stage- - and safety-universal. To show this technique is practical we demonstrate a - prototype compiler that finds optimal programs in the presence of heap operations; - the proof of this is tedious but automated. The proof ensures that any code - \u2018lying in the kernel\u2019 is evaluated and erased at compile-time. This - opens several interesting directions for active libraries. One is staging: - we can synthesize fast implementation code at compile-time by putting code-generators - in the kernel. To achieve domain-specific safety checking we propose \u2018proof - embeddings\u2019 in which proofs are intermingled with code and the optimizer - does double-duty as a theorem prover. Proofs lying in the kernel are checked - and erased at compile-time, yielding code that is both fast and safe.", "venue": - "", "year": 2004, "referenceCount": 297, "citationCount": 42, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "143962909", - "name": "A. Lumsdaine"}, {"authorId": "1918653", "name": "T. Veldhuizen"}]}, - {"paperId": "20a342bd7dc1e8392f93325672a55c5cd38a0710", "externalIds": {"MAG": - "2322965797", "DOI": "10.1021/jp111584u", "CorpusId": 207610674, "PubMed": - "21417371"}, "url": "https://www.semanticscholar.org/paper/20a342bd7dc1e8392f93325672a55c5cd38a0710", - "title": "Turing pattern formation by the CIMA reaction in a chemical system - consisting of quaternary alkyl ammonium cationic groups.", "abstract": "For - the spontaneous generation of a Turing pattern, two intermediate species, - an activator and an inhibitor, should be generated with the diffusion coefficient - of the activator smaller than that of the inhibitor. The chlorite-iodide-malonic - acid (CIMA) reaction that generates the activator, I(-), and inhibitor, ClO(2-), - was performed in an open gel reactor. In order to lower the effective diffusivity - of I(-), micelles of quaternary alkyl ammonium cationic amphiphiles and polymers - having a quaternary alkyl ammonium cationic side chain were combined in the - CIMA reaction system in an open gel reactor. A Turing pattern formation was - observed with the addition of n-dodecyltrimethylammonium bromide. Employing - the gel reactor prepared by the polymerization of a monomer having quaternary - alkyl ammonium cationic side chains also leads to the generation of a Turing - pattern. The micelles and polymers are believed to trap I(-) in their vicinity - as a counterion to lower the effective diffusivity.", "venue": "The journal - of physical chemistry. B", "year": 2011, "referenceCount": 17, "citationCount": - 18, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-04-14", "journal": {"name": "The journal of physical - chemistry. B", "pages": "\n 3959-63\n ", "volume": "115 14"}, - "authors": [{"authorId": "92541979", "name": "K. Asakura"}, {"authorId": "86989932", - "name": "R. Konishi"}, {"authorId": "67009235", "name": "Tomomi Nakatani"}, - {"authorId": "2366815", "name": "T. Nakano"}, {"authorId": "48222144", "name": - "Masazumi Kamata"}]}, {"paperId": "50a31046e70833004ed5a684338ac13200cea925", - "externalIds": {"MAG": "2345709834", "DOI": "10.2307/1312947", "CorpusId": - 88329030}, "url": "https://www.semanticscholar.org/paper/50a31046e70833004ed5a684338ac13200cea925", - "title": "Evolution of the Y Sex Chromosome in Animals Y chromosomes evolve - through the degeneration of autosomes", "abstract": "Sex chromosomes are part - of the gender determination system of many organisms. They are common in animals - and rare in plants. There are many forms of sex de\u00ad termination. Gender - may be deter\u00ad mined genetically or in response to environmental cues - such as tempera\u00ad ture or social circumstance. Genetic sex determination - is typically ex\u00ad pressed in the developing zygote but can also be mediated - maternally, with some females producing only daughters and others only sons. - Zygotic sex determination has ~ many forms. In bees, ants, and wasps fertilized - eggs develop into females and unfertilized eggs into males. In the guppy, - and many other fish, in\u00ad vertebrates, and plants, gender is determined - by the presence or ab\u00ad sence of a sex determining gene (G, or a cluster - of tightly linked genes); Gg is male and gg female. The het\u00ad erozygous - (i.e., heterogametic) sex can be female or male, depending on the species. - Gender can also be de\u00ad termined by specialized sex chromo\u00ad somes - (X and Y). In mammals, fe\u00ad males are XX and males are XY; in birds, females - are XY (sometimes designated ZW) and males are XX (sometimes designated ZZ); - and in nematodes, females are XX and males are XO, in which \u00b0 denotes - the absence of a homologous chro\u00ad mosome. More than two sex chro\u00ad - mosomes are found in some species,", "venue": "", "year": 1996, "referenceCount": - 44, "citationCount": 336, "influentialCitationCount": 19, "isOpenAccess": - false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1996-05-01", "journal": {"name": - "BioScience", "pages": "331-343", "volume": "46"}, "authors": [{"authorId": - "93561127", "name": "W. Rice"}]}, {"paperId": "829c2349c6d7ce5af4f9c49a5e35b4f7dc05fa5f", + ["JournalArticle"], "publicationDate": "2003-09-15", "journal": {"name": "Journal + of Bacteriology", "pages": "5632 - 5638", "volume": "185"}, "authors": [{"authorId": + "46530384", "name": "K. Agladze"}, {"authorId": "48694857", "name": "D. Jackson"}, + {"authorId": "3166887", "name": "T. Romeo"}]}, {"paperId": "06b55f59a5eaacd6b5183cd1dbd1fc2c6861f3c0", + "externalIds": {"MAG": "2110220659", "DOI": "10.1890/1051-0761(2003)013[0704:SPACOH]2.0.CO;2", + "CorpusId": 86433346}, "corpusId": 86433346, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/06b55f59a5eaacd6b5183cd1dbd1fc2c6861f3c0", + "title": "SPATIAL PATTERNS AND CONTROLS ON HISTORICAL FIRE REGIMES AND FOREST + STRUCTURE IN THE KLAMATH MOUNTAINS", "abstract": "Fire exclusion in mixed + conifer forests has increased the risk of fire due to decades of fuel accumulation. + Restoration of fire into altered forests is a challenge because of a poor + understanding of the spatial and temporal dynamics of fire regimes. In this + study the spatial and temporal characteristics of fire regimes and forest + age structure are recon- structed in a 2325-ha mixed conifer forest in the + Klamath Mountains. Forests were multiaged and burned frequently at low and + moderate severity, but forest age structure did not vary with aspect, elevation, + or topographic position. Recently there has been an increase in forest density + and a forest compositional shift to shade-tolerant species. Median fire return + in- tervals (FRI) ranged from 11.5 to 16.5 yr and varied with aspect but not + with forest composition or elevation. The median area burned was 106 ha, and + the pre-Euro-American fire rotation of 19 yr increased to 238 yr after 1905. + Intra-annual position of fire scars in the tree rings indicates that 93% of + fires occurred during the dry midsummer through fall period. Spatial patterns + of sites with similar fire dates were spatially coherent and separated from + others by topographic features that influence fire spread. Thus, patterns + of fire oc- currence tended to be fixed in space with timing of fires varying + among groups of sites. Spatial and temporal patterns of fire occurrence suggest + that managers using physical fea- tures to contain prescribed fire will create + burn patterns consistent with historical fires in the Klamath Mountains.", + "venue": "", "year": 2003, "referenceCount": 87, "citationCount": 363, "influentialCitationCount": + 37, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Environmental + Science"], "s2FieldsOfStudy": [{"category": "Environmental Science", "source": + "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2003-06-01", "journal": {"name": + "Ecological Applications", "pages": "704-719", "volume": "13"}, "authors": + [{"authorId": "2110304675", "name": "A. Taylor"}, {"authorId": "2293764", + "name": "C. Skinner"}]}, {"paperId": "58ac27c512c355714e7b45a7878f3bde02358ad8", + "externalIds": {"MAG": "1988854739", "DOI": "10.1177/036354658201000406", + "CorpusId": 718759, "PubMed": "7125043"}, "corpusId": 718759, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/58ac27c512c355714e7b45a7878f3bde02358ad8", + "title": "Stress fractures of the femur in runners", "abstract": "Early diagnosis, + followed by conservative manage ment, permitted five of six long-distance + runners to return to running after they had suffered stress frac tures of + the femur. The sixth patient developed a displaced fracture of the femoral + neck which was openly reduced and internally fixated at surgery: this athlete + returned to marathoning one year later. In the series there were two fractures + of the femoral neck and four of the proximal medial shaft of the femur. Although + early diagnosis depends upon a complete history, physical examination and + x-ray film results, bone scanning is a further aid when x-ray films still + do not confirm the presumptive diagnosis.", "venue": "The American journal + of sports medicine", "year": 1982, "referenceCount": 18, "citationCount": + 67, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "CaseReport"], "publicationDate": "1982-07-01", + "journal": {"name": "The American Journal of Sports Medicine", "pages": "219 + - 227", "volume": "10"}, "authors": [{"authorId": "4782398", "name": "S. Lombardo"}, + {"authorId": "152529836", "name": "D. Benson"}]}, {"paperId": "90d7bc5be8e6724bf6e99005bf99389915574aa5", + "externalIds": {"MAG": "1834126841", "CorpusId": 143250040}, "corpusId": 143250040, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/90d7bc5be8e6724bf6e99005bf99389915574aa5", + "title": "\u00bfJugadores activos o ap\u00e9ndices del ejecutivo? Una evaluaci\u00f3n + del papel de los legisladores latinoamericanos en la toma de decisiones", + "abstract": "Legislatures are critical institutions for the effective functioning + of a demo- cratic system and in the policymaking process. They are expected + to represent the needs and wishes of citizens, identify problems and adopt + statutes to address them, and oversee the implementation of policies. However, + the extents to which Latin American legisla- tures fulfill these roles vary + greatly from country to country. Despite the recent prolifera-", "venue": + "", "year": 2010, "referenceCount": 12, "citationCount": 44, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political + Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": + "external"}, {"category": "Political Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Politica + Y Gobierno", "pages": "3-24", "volume": "17"}, "authors": [{"authorId": "2074851200", + "name": "Sebastian M. Saiegh"}]}, {"paperId": "4e7da0356e2bacf94d20b7469e50e4c9d17968d9", + "externalIds": {"MAG": "2052849655", "DOI": "10.3354/AME045101", "CorpusId": + 38056008}, "corpusId": 38056008, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4e7da0356e2bacf94d20b7469e50e4c9d17968d9", + "title": "First successful culture of the marine dinoflagellate Dinophysis + acuminata", "abstract": "The dinoflagellate genus Dinophysis in- cludes several + species that cause diarrhetic shellfish poi- soning, none of which have yet + been established in cul- ture. We report on the maintenance of Dinophysis + acuminata cultures that were established in December 2005 and also on its + feeding mechanism, and growth rates when fed the ciliate prey Myrionecta rubra + with and without the addition of the cryptophyte Teleaulax sp. D. acuminata + grew well (growth rate of 0.95 d -1 ) in laboratory culture when supplied + with the marine ciliate M. rubra as prey, reaching a maximum concentration + of about 2400 cells ml -1 at the end of the feeding experiment. In contrast, + D. acuminata did not show sustained growth in the absence of the ciliate or + when provided the cryptophyte Teleaulax sp. as prey (D. acuminata used its + peduncle to extract the cell contents of the prey organism, M. rubra). Based + on the prey- preda- tor interactions occurring among D. acuminata, M. rubra, + and Teleaulax sp. in this study, establishment of perma- nent culture of the + dinoflagellate D. acuminata may facil- itate a better understanding of the + ecophysiology, biol- ogy, and toxicology of Dinophysis species, as well as + the evolution of dinoflagellate plastids.", "venue": "", "year": 2006, "referenceCount": + 26, "citationCount": 330, "influentialCitationCount": 39, "isOpenAccess": + true, "openAccessPdf": {"url": "https://www.int-res.com/articles/feature/a045p101.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2006-11-24", "journal": {"name": "Aquatic Microbial + Ecology", "pages": "101-106", "volume": "45"}, "authors": [{"authorId": "5156106", + "name": "M. Park"}, {"authorId": "49899817", "name": "Sunju Kim"}, {"authorId": + "1456153430", "name": "Hyung Seop Kim"}, {"authorId": "144272399", "name": + "Geumog Myung"}, {"authorId": "104811839", "name": "Yihuei Kang"}, {"authorId": + "11738217", "name": "W. Yih"}]}, {"paperId": "681914bdfcff286d7577ef9beaeff83794585870", + "externalIds": {"MAG": "2006713384", "DOI": "10.1007/S11245-013-9182-Y", "CorpusId": + 58833453}, "corpusId": 58833453, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/681914bdfcff286d7577ef9beaeff83794585870", + "title": "Alan Turing\u2019s \u201cComputing Machinery and Intelligence\u201d", + "abstract": null, "venue": "", "year": 2013, "referenceCount": 0, "citationCount": + 17, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-09-04", + "journal": {"name": "Topoi", "pages": "293-299", "volume": "32"}, "authors": + [{"authorId": "1755446", "name": "C. Castelfranchi"}]}, {"paperId": "829c2349c6d7ce5af4f9c49a5e35b4f7dc05fa5f", "externalIds": {"MAG": "2911379327", "DBLP": "journals/ijet/Elmqaddem19", - "DOI": "10.3991/IJET.V14I03.9289", "CorpusId": 86674075}, "url": "https://www.semanticscholar.org/paper/829c2349c6d7ce5af4f9c49a5e35b4f7dc05fa5f", + "DOI": "10.3991/IJET.V14I03.9289", "CorpusId": 86674075}, "corpusId": 86674075, + "publicationVenue": {"id": "44a8affe-ff49-4c97-915b-0e4378776101", "name": + "International Journal of Emerging Technologies in Learning (iJET)", "type": + "journal", "alternate_names": ["Int J Emerg Technol Learn (ijet", "International + Journal of Emerging Technologies in Learning", "Int J Emerg Technol Learn", + "International Journal of Emerging Technologies in Learning (ijet)"], "issn": + "1863-0383", "url": "http://www.i-jet.org/", "alternate_urls": ["https://www.online-journals.org/index.php/i-jet/about", + "https://www.online-journals.org/index.php/i-jet"]}, "url": "https://www.semanticscholar.org/paper/829c2349c6d7ce5af4f9c49a5e35b4f7dc05fa5f", "title": "Augmented Reality and Virtual Reality in Education. Myth or Reality?", "abstract": "Augmented Reality and Virtual Reality are not new technologies. But several constraints prevented their actual adoption. Recent technological @@ -39626,120 +44482,352 @@ interactions: \nThis work consists of explaining the reasons behind the new rise of AR and VR and why their actual adoption in education will be a reality in a near fu-ture.", "venue": "International Journal of Emerging Technologies in Learning - (iJET)", "year": 2019, "referenceCount": 12, "citationCount": 114, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + (iJET)", "year": 2019, "referenceCount": 12, "citationCount": 119, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://online-journals.org/index.php/i-jet/article/download/9289/5456", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2019-02-14", "journal": {"name": "Int. J. Emerg. Technol. Learn.", "pages": "234-242", "volume": "14"}, "authors": [{"authorId": "81249066", - "name": "Noureddine Elmqaddem"}]}, {"paperId": "155ae4ad1ccc418917f6a255e5c9910bf30ed436", - "externalIds": {"DBLP": "journals/csur/Reddy96", "MAG": "2004058190", "DOI": - "10.1145/234528.234736", "CorpusId": 821561}, "url": "https://www.semanticscholar.org/paper/155ae4ad1ccc418917f6a255e5c9910bf30ed436", - "title": "Imperative functional programming", "abstract": "Our intuitive idea - of a function is that it describes the dependence of one quantity upon another. - There is no condition on what kind of quantities are involved. They could - be integers, Turing machines, binary search trees, window hierarchies, digital - circuits or whatever. The possibilities are endless. The idea of functional - programming is that functions are described applicatively, by plugging together - other functions. This recursive dependence of functions on other functions - bottoms out with the primitive operators. If the primitive operators are \u201ceffective,\u201d - i.e., they can be used to calculate, compute, construct or build one quantity - from another, then all functions expressed applicatively are similarly effective. - Imperative functional programming is the application of these ideas to imperative - computations. Quantities here are imperative computations and functions denote - dependences between imperative computations. Effectiveness of a function means - that a computation produced from it can be effectively carried out whenever - the input computations can be effectively carried out. It is often felt that - imperative computations and functional programming are in conflict. Adding - imperative computations to a functional programming language is found to destroy - its \u201creferential transparency.\u201d See, for example, [Abelson et al., - 1985, Sec. 3.1] for a discussion of the issue. However, in languages where - such issues arise, imperative computations are thrown together by extending - or modifying functional computation. The idea that functions denote dependences - is lost in the process. In contrast, imperative functional programming does - not involve altering functional computation in any way. It merely applies - it to a new context, that of imperative compu-", "venue": "CSUR", "year": - 1996, "referenceCount": 21, "citationCount": 357, "influentialCitationCount": - 15, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "name": "Noureddine Elmqaddem"}]}, {"paperId": "8a5fa8fff7e7fd62530df9e7fedfc501d2b14306", + "externalIds": {"MAG": "1995040333", "DOI": "10.1103/PHYSREVE.54.261", "CorpusId": + 46294713, "PubMed": "9965068"}, "corpusId": 46294713, "publicationVenue": + {"id": "f7dc890d-13a2-4e06-9f76-95c9fd4f8def", "name": "Physical review. E, + Statistical physics, plasmas, fluids, and related interdisciplinary topics", + "alternate_names": ["Phys rev Stat phys plasma fluid relat interdiscip top"], + "issn": "1063-651X", "alternate_issns": ["1095-3787"], "url": "http://ejournals.ebsco.com/direct.asp?JournalID=101127", + "alternate_urls": ["https://journals.aps.org/pre/", "http://pre.aps.org/", + "http://prola.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/8a5fa8fff7e7fd62530df9e7fedfc501d2b14306", + "title": "Spatiotemporal dynamics near a codimension-two point.", "abstract": + "Spatiotemporal dynamics resulting from the interaction of two instabilities + breaking, respectively, spatial and temporal symmetries are studied in the + framework of the amplitude equation formalism. The corresponding bifurcation + scenarios feature steady-Hopf bistability with corresponding localized structures + but also different types of mixed states. Some of these mixed modes result + from self-induced subharmonic instabilities of the pure steady and Hopf modes. + The bifurcation schemes are then used to organize the results of numerical + simulations of a one-dimensional reaction-diffusion model. These dynamics + are relevant to experimental chemical systems featuring a codimension-two + Turing-Hopf point but also to any experimental setup where homogeneous temporal + oscillations and spatial patterns are obtained for nearby values of parameters. + @S1063-651X~96!03707-5#", "venue": "Physical review. E, Statistical physics, + plasmas, fluids, and related interdisciplinary topics", "year": 1996, "referenceCount": + 2, "citationCount": 117, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-07-01", "journal": + {"name": "Physical review. E, Statistical physics, plasmas, fluids, and related + interdisciplinary topics", "pages": "\n 261-271\n ", "volume": + "54 1"}, "authors": [{"authorId": "16167615", "name": "De Wit A"}, {"authorId": + "2067380387", "name": "Lima"}, {"authorId": "30030198", "name": "Dewel"}, + {"authorId": "30192222", "name": "Borckmans"}]}, {"paperId": "01811aa6aeb7235fbc23bb901e0959f198a50939", + "externalIds": {"MAG": "2151334287", "DOI": "10.2307/3236806", "CorpusId": + 85577298}, "corpusId": 85577298, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/01811aa6aeb7235fbc23bb901e0959f198a50939", + "title": "Ecological and evolutionary differences between Mediterranean seeders + and resprouters", "abstract": "Differences in allocation patterns between + seeders and resprouters in several Mediterranean plant communities (Australia, + California and South Africa) have led to the predic- tion that seedlings of + seeders grow faster than those of resprouters. In the Mediterranean Basin, + it has also been hypothesized that regeneration strategy of plants after fire + is associated with several other life history traits. This paper tests both + hypotheses for the dominant plants in the Mediterranean Basin from litera- + ture data. Results show that seeders from the Mediterranean Basin grow significantly + faster and allocate more biomass to leaf plus paracotyledons than resprouters. + Seeders are mainly non- sclerophyllous, anemochorous, dry-fruited, small-seeded + species that evolved in the Quaternary (post-Pliocene) and are associated + with earlier successional stages. Resprouters are mainly sclero- phyllous, + vertebrate-dispersed, fleshy-fruited, large-seeded species that evolved in + the Tertiary (pre-Pliocene) and are associated with late successional stages.", + "venue": "", "year": 2000, "referenceCount": 33, "citationCount": 120, "influentialCitationCount": + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2000-04-01", "journal": {"name": "Journal of Vegetation + Science", "pages": "265-268", "volume": "11"}, "authors": [{"authorId": "30008906", + "name": "M. Verd\u00fa"}]}, {"paperId": "7fe560d2c71ebfc3c18b3ea5c5aa14f63b11e937", + "externalIds": {"MAG": "1966008447", "DOI": "10.1103/PHYSREVLETT.76.4644", + "CorpusId": 46485370, "PubMed": "10061343"}, "corpusId": 46485370, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/7fe560d2c71ebfc3c18b3ea5c5aa14f63b11e937", + "title": "New mechanism for neural pattern formation.", "abstract": "We show + how the diffusive effects of a neuron''s dendritic tree can induce a Turing-like + instability in a purely excitatory or inhibitory recurrent neural network. + A crucial feature of the model is the existence of a correlation between the + location of a synaptic connection on the tree and the relative separation + of the associated neurons within the network.", "venue": "Physical Review + Letters", "year": 1996, "referenceCount": 0, "citationCount": 36, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://figshare.com/articles/journal_contribution/New_mechanism_for_neural_pattern_formation/9385280/1/files/16998473.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1996-06-10", "journal": {"name": "Physical + review letters", "pages": "\n 4644-4647\n ", "volume": "76 + 24"}, "authors": [{"authorId": "121206589", "name": "Bressloff"}]}, {"paperId": + "bf1eb728a89fbcba68372cdb5c2bf7fcc5e49dbe", "externalIds": {"ArXiv": "quant-ph/0512170", + "MAG": "2003431413", "DOI": "10.1103/PhysRevA.74.052322", "CorpusId": 30090334}, + "corpusId": 30090334, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf1eb728a89fbcba68372cdb5c2bf7fcc5e49dbe", + "title": "Error Correcting Codes For Adiabatic Quantum Computation", "abstract": + "Mathematics Department, Massachusetts Institute of Technology, Cambridge, + Massachusetts 02139(Dated: February 1, 2008)Recently, there has been growing + interest in using adiabatic quantum computation as an architec-ture for experimentally + realizable quantum computers. One of the reasons for this is the idea thatthe + energy gap should provide some inherent resistance to noise. It is now known + that universalquantum computation can be achieved adiabatically using 2-local + Hamiltonians. The energy gap inthese Hamiltonians scales as an inverse polynomial + in the problem size. Here we present stabilizercodes which can be used to + produce a constant energy gap against 1-local and 2-local noise. Thecorresponding + fault-tolerant universal Hamiltonians are 4-local and 6-local respectively, + which is theoptimal result achievable within this framework.", "venue": "", + "year": 2005, "referenceCount": 9, "citationCount": 119, "influentialCitationCount": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/0512170", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2005-12-20", "journal": {"name": + "Physical Review A", "pages": "052322", "volume": "74"}, "authors": [{"authorId": + "2637886", "name": "S. Jordan"}, {"authorId": "34963522", "name": "E. Farhi"}, + {"authorId": "1756931", "name": "P. Shor"}]}, {"paperId": "57e2b2dccda37bbb38e711084dd7e3cdfbfe4eaf", + "externalIds": {"ArXiv": "gr-qc/0204036", "MAG": "2020759607", "DOI": "10.1103/PhysRevD.65.104006", + "CorpusId": 119518634}, "corpusId": 119518634, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/57e2b2dccda37bbb38e711084dd7e3cdfbfe4eaf", + "title": "Naked singularities in cylindrical collapse of counterrotating dust + shells", "abstract": "\u2264 0, (2)which we assume henceforth. The matter + content ofthe space-time may be described as infalling null dust.There is + a curvature singularity along r = 0. Since thesolution is Petrov type N with + a pure radiation energy-momentum tensor, all curvature invariants vanish. + It hasbeen shown in [1] that this is a parallel propagated curva-ture singularity. + Additionally, scalars such as R", "venue": "", "year": 2002, "referenceCount": + 0, "citationCount": 35, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://doras.dcu.ie/15647/1/nolan7.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-04-09", "journal": {"name": + "Physical Review D", "pages": "104006", "volume": "65"}, "authors": [{"authorId": + "66978669", "name": "B. Nolan"}]}, {"paperId": "7f59f9b227514620f7ef13d90f96d43faf9e45f7", + "externalIds": {"MAG": "1554431040", "CorpusId": 118274911}, "corpusId": 118274911, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7f59f9b227514620f7ef13d90f96d43faf9e45f7", + "title": "A first course in computability", "abstract": "Mathematical prerequisites + Turing machines solvability and unsolvability formal languages recursive functions + complexity theory appendix - the Turing machine simulator.", "venue": "", + "year": 1986, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "1398130831", "name": "V. Rayward-Smith"}]}, {"paperId": "96d19cbb9e9c2735762ef2db425f038c19e37af5", + "externalIds": {"ArXiv": "math-ph/0502047", "DBLP": "journals/amc/Dilao05", + "MAG": "2077375246", "DOI": "10.1016/j.amc.2004.06.036", "CorpusId": 8718001}, + "corpusId": 8718001, "publicationVenue": {"id": "e593a63a-bfb7-45ac-aa27-5c320ac7a952", + "name": "Applied Mathematics and Computation", "type": "journal", "alternate_names": + ["Appl Math Comput"], "issn": "0096-3003", "url": "http://www.sciencedirect.com/science/journal/00963003", + "alternate_urls": ["https://www.sciencedirect.com/journal/applied-mathematics-and-computation"]}, + "url": "https://www.semanticscholar.org/paper/96d19cbb9e9c2735762ef2db425f038c19e37af5", + "title": "Turing instabilities and patterns near a Hopf bifurcation", "abstract": + null, "venue": "Applied Mathematics and Computation", "year": 2005, "referenceCount": + 29, "citationCount": 31, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/math-ph/0502047", "status": + "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-02-24", "journal": {"name": "Appl. + Math. Comput.", "pages": "391-414", "volume": "164"}, "authors": [{"authorId": + "1861382", "name": "R. Dil\u00e3o"}]}, {"paperId": "b348cd16a8820df21e56196822a6e9c4b8cb8ad9", + "externalIds": {"MAG": "1197238029", "DOI": "10.1016/S0049-237X(09)70163-6", + "CorpusId": 118548744}, "corpusId": 118548744, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b348cd16a8820df21e56196822a6e9c4b8cb8ad9", + "title": "Algorithmic Procedures, Generalized Turing Algorithms, and Elementary + Recursion Theory", "abstract": null, "venue": "", "year": 1985, "referenceCount": + 22, "citationCount": 31, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "Studies in logic and the foundations of mathematics", + "pages": "285-308", "volume": "117"}, "authors": [{"authorId": "2026764", + "name": "J. Shepherdson"}]}, {"paperId": "b47944673d0877a722a16b4af4c1497d8bddc7eb", + "externalIds": {"MAG": "2117033549", "DOI": "10.1002/MALQ.200310001", "CorpusId": + 123685636}, "corpusId": 123685636, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b47944673d0877a722a16b4af4c1497d8bddc7eb", + "title": "Computational complexity on computable metric spaces", "abstract": + "We introduce a new Turing machine based concept of time complexity for functions + on computable metric spaces. It generalizes the ordinary complexity of word + functions and the complexity of real functions studied by Ko [19] et al. Although + this definition of TIME as the maximum of a generally infinite family of numbers + looks straightforward, at first glance, examples for which this maximum exists + seem to be very rare. It is the main purpose of this paper to prove that, + nevertheless, the definition has a large number of important applications. + Using the framework of TTE [40], we introduce computable metric spaces and + computability on the compact subsets. We prove that every computable metric + space has a c\u2010proper c\u2010admissible representation. We prove that + Turing machine time complexity of a function computable relative to c\u2010admissible + c\u2010proper representations has a computable bound on every computable compact + subset. We prove that computably compact computable metric spaces have concise + c\u2010proper c\u2010admissible representations and show by examples that + many canonical representations are of this kind. Finally, we compare our definition + with a similar one by Labhalla et al. [22]. Several examples illustrate the + concepts. By these results natural and realistic definitions of computational + complexity are now available for a variety of numerical problems such as image + processing, integration, continuous Fourier transform or wave propagation.", + "venue": "", "year": 2003, "referenceCount": 27, "citationCount": 54, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-01-01", + "journal": {"name": "Mathematical Logic Quarterly", "volume": "49"}, "authors": + [{"authorId": "12322447", "name": "K. Weirauch"}]}, {"paperId": "cb9fdff70eb0b3e6390c2c45b050c87dd424387a", + "externalIds": {"MAG": "2133531461", "DOI": "10.1111/J.1467-8330.2011.00978.X", + "CorpusId": 154412486}, "corpusId": 154412486, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cb9fdff70eb0b3e6390c2c45b050c87dd424387a", + "title": "Rethinking Primitive Accumulation: Theoretical Tensions and Rural + Southeast Asian Complexities", "abstract": ":\u00a0 This paper poses theoretical + and empirical questions to the resurgent litera-ture on primitive accumulation + in critical political economy. The first section outlines the different understandings + of capitalism, and of its relationship to primitive accumulation, in the literature, + and argues that they complicate efforts to identify instances of primitive + accumulation. The second section examines the history of frontier agricultural + expansion in Southeast Asia to critique the literature''s assumptions about + who carries out, and who resists, primitive accumulation. The third section + draws on work on Southeast Asian political economy to show that the literature + pays insufficient attention to the institutions that govern capitalist social + relations. The paper argues that these questions of agency, governance, and + the nature of capitalism need to be answered in order to make effective use + of the concept of primitive accumulation and to distinguish it from cognate + concepts like enclosure and commodification.", "venue": "", "year": 2012, + "referenceCount": 45, "citationCount": 116, "influentialCitationCount": 6, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2012-09-01", "journal": {"name": "Antipode", "pages": "1188-1208", "volume": + "44"}, "authors": [{"authorId": "104042209", "name": "D. Hall"}]}, {"paperId": + "8a360c40fdf1fc374450ded64b1629d6983a8aae", "externalIds": {"DBLP": "journals/paapp/Bull09", + "MAG": "2080110956", "DOI": "10.1080/17445760802660387", "CorpusId": 13475229}, + "corpusId": 13475229, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8a360c40fdf1fc374450ded64b1629d6983a8aae", + "title": "On dynamical genetic programming: simple Boolean networks in learning + classifier systems", "abstract": "Many representations have been presented + to enable the effective evolution of computer programs. Turing was perhaps + the first to present a general scheme by which to achieve this end. Significantly, + Turing proposed a form of discrete dynamical system and yet dynamical representations + remain almost unexplored within conventional genetic programming (GP). This + paper presents results from an initial investigation into using simple dynamical + GP representations within a learning classifier system. It is shown possible + to evolve ensembles of dynamical Boolean function networks to solve versions + of the well-known multiplexer problem. Both synchronous and asynchronous systems + are considered.", "venue": "Int. J. Parallel Emergent Distributed Syst.", + "year": 2009, "referenceCount": 104, "citationCount": 23, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cems.uwe.ac.uk/lcsg/reports/uwelcsg08-006.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-06-01", "journal": {"name": "ACM Comput. Surv.", - "pages": "312-314", "volume": "28"}, "authors": [{"authorId": "145977333", - "name": "U. Reddy"}]}, {"paperId": "836384a4a3d60f4825cdc702064170e13eb167f7", - "externalIds": {"MAG": "2119777837", "DOI": "10.5194/NPG-10-3-2003", "CorpusId": - 18522429}, "url": "https://www.semanticscholar.org/paper/836384a4a3d60f4825cdc702064170e13eb167f7", - "title": "Solitary potential structures observed in the magnetosheath by the - Cluster spacecraft", "abstract": "Bipolar pulses of 25-100\u00b5s in duration - have been observed in the wave electric field data obtained by the Wideband - plasma wave instrument on the Cluster spacecraft in the dayside magnetosheath. - These pulses are similar in al- most all respects to those observed on several - spacecraft over the last few years. They represent solitary potential struc- - tures, and in this case, electron phase space holes. When the time series - data containing the bipolar pulses on Clus- ter are transformed to the frequency - domain by a windowed FFT, the pulses appear as typical broad-band features, - ex- tending from the low-frequency cutoff of the bandpass filter, 1 kHz, up - to as great as 20-40 kHz in some cases, with decreasing intensity as the frequency - increases. The upper frequency cutoff of the broad band is an indication of - the individual pulse durations (1/f). The solitary potential struc- tures - are detected when the local magnetic field is contained primarily in the spin - plane, indicating that they propagate along the magnetic field. Their frequency - extent and inten- sity seem to increase as the angle between the directions - of the magnetic field and the plasma flow decreases from 90 . Of major significance - is the finding that the overall profile of the broad-band features observed - simultaneously by two Cluster spacecraft, separated by a distance of over - 750 km, are strikingly similar in terms of onset times, frequency ex- tent, - intensity, and termination. This implies that the genera- tion region of the - solitary potential structures observed in the magnetosheath near the bow shock - is very large and may be located at or near the bow shock, or be connected - with the bow shock in some way.", "venue": "", "year": 2003, "referenceCount": - 28, "citationCount": 89, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2003-04-30", "journal": {"name": - "Nonlinear Processes in Geophysics", "pages": "3-11", "volume": "10"}, "authors": - [{"authorId": "40305014", "name": "J. Pickett"}, {"authorId": "31021770", - "name": "J. Menietti"}, {"authorId": "2007537", "name": "D. Gurnett"}, {"authorId": - "4720119", "name": "B. Tsurutani"}, {"authorId": "1906204", "name": "P. Kintner"}, - {"authorId": "35054462", "name": "E. Klatt"}, {"authorId": "144165600", "name": - "A. Balogh"}]}, {"paperId": "131e17a9bee1527bf69cb5bba55d2308243902d8", "externalIds": - {"MAG": "2053258711", "DBLP": "conf/focs/Herman68", "DOI": "10.1109/SWAT.1968.36", - "CorpusId": 21139840}, "url": "https://www.semanticscholar.org/paper/131e17a9bee1527bf69cb5bba55d2308243902d8", - "title": "The Uniform Halting Problem for Generalized One State Turing Machines", - "abstract": "The uniform halting problem (UH) can be stated as follows: Give - a decision procedure which for any given Turing machine (TM) will decide whether - or not it has an immortal instantaneous description (ID). An ID is called - immortal if it has no terminal successor. As it is generally the case in the - literature (see e.g. Minsky p. 118) we assume that in an ID the tape must - be blank except for some finite number of squares. If we remove this restriction - the UH becomes the immortality problem (IP). The unsolvability of the IP was - shown by Hooper. It can be seen from Part V (p. 225) of his paper that his - method also shows the unsolvability of the UH. The initialised UH, whether - or not a TM has an immortal ID when started in a specified state, is also - known to be undecidable. (See e.g. Minsky p. 151). For one state TM''s the - two problems are of course equivalent. Hooper (Part VI, 5) found that the - IP is solvable for two state TM''s. However, one can show (Herman) that the - UH (just like the halting problem) is unsolvable for two state TM''s. The - halting problem is known to be solvable for one state TM''s, even if we allow - them to have a many dimensional tape (see Herman). Can the same be said about - the UH? In this paper we show the solvability of the UH for one state TM''s. - These are not entirely trivial structures, they can do, as we show, certain - things that finite automata cannot do. We consider in what ways we can generalise - one state TM''s so that we retain the solvability of the UH. We find that - the UH for one state TM''s with two dimensional tape and jumping reading head - (i.e. the reading head can move to squares not immediately neighbouring the - previously scanned square) is also solvable. Our method does not generalize - for three or more dimensional tape, unless we put in some conditions on the - directions in which the reading head can move. On the other hand, we find - that one state TM''s with two or more tapes or with two or more reading heads - on the same tape have an unsolvable UH. Finally we consider how a different - choice of formalism would influence our results.", "venue": "SWAT", "year": - 1968, "referenceCount": 8, "citationCount": 25, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "publicationDate": "2009-09-18", "journal": {"name": "International Journal + of Parallel, Emergent and Distributed Systems", "pages": "421 - 442", "volume": + "24"}, "authors": [{"authorId": "144925000", "name": "L. Bull"}]}, {"paperId": + "558d816c57ec45a48009e629b0a5c91ecc7091ae", "externalIds": {"DBLP": "journals/jetai/Fields89", + "MAG": "2086238008", "DOI": "10.1080/09528138908953699", "CorpusId": 8245028}, + "corpusId": 8245028, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/558d816c57ec45a48009e629b0a5c91ecc7091ae", + "title": "Consequences of nonclassical measurement for the algorithmic description + of continuous dynamical systems", "abstract": "Abstract Continuous dynamical + systems intuitively seem capable of more complex behavior than discrete systems. + If analyzed in the framework of the traditional theory of computation, a.continuous + dynamical system with countably many quasistable states has at least the computational + power of a universal Turing machine. Such an analysis assumes, however, the + classical notion of measurement. If measurement is viewed nonclassically, + a continuous dynamical system cannot, even in principle, exhibit behavior + that cannot be simulated by a universal Turing machine.", "venue": "Journal + of experimental and theoretical artificial intelligence (Print)", "year": + 1990, "referenceCount": 11, "citationCount": 19, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://ntrs.nasa.gov/api/citations/19890011269/downloads/19890011269.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1990-07-01", "journal": {"name": "J. Exp. Theor. Artif. + Intell.", "pages": "171-178", "volume": "1"}, "authors": [{"authorId": "144993883", + "name": "C. Fields"}]}, {"paperId": "fdad6d7e0da2b0c5dc2325db9119d87f8bd1a0a9", + "externalIds": {"MAG": "2896271711", "DBLP": "journals/aml/ChubbFH09", "DOI": + "10.1007/s00153-008-0110-6", "CorpusId": 8318124}, "corpusId": 8318124, "publicationVenue": + {"id": "baf6e768-e94b-48e9-9326-6aad748d4c61", "name": "Archive for Mathematical + Logic", "type": "journal", "alternate_names": ["Arch Math Log"], "issn": "0933-5846", + "url": "https://www.springer.com/mathematics/journal/153", "alternate_urls": + ["http://link.springer.com/journal/153", "http://www.springer.com/mathematics/journal/153"]}, + "url": "https://www.semanticscholar.org/paper/fdad6d7e0da2b0c5dc2325db9119d87f8bd1a0a9", + "title": "Degree spectra of the successor relation of computable linear orderings", + "abstract": null, "venue": "Archive for Mathematical Logic", "year": 2009, + "referenceCount": 15, "citationCount": 13, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://home.gwu.edu/~harizanv/SuccessorCFH.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1968-10-15", "journal": {"pages": "368-372"}, "authors": - [{"authorId": "1795508", "name": "G. Herman"}]}]} + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Archive for Mathematical Logic", "pages": "7-13", "volume": "48"}, + "authors": [{"authorId": "144109961", "name": "Jennifer Chubb"}, {"authorId": + "144222727", "name": "A. Frolov"}, {"authorId": "3187833", "name": "V. Harizanov"}]}, + {"paperId": "d5eef492c203f047381f8b5efbc34ad2d0f92752", "externalIds": {"MAG": + "2114806831", "CorpusId": 18853422}, "corpusId": 18853422, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d5eef492c203f047381f8b5efbc34ad2d0f92752", + "title": "Robust CTAB-activated charcoal protocol for plant DNA extraction", + "abstract": "DNA extracted from plants rich in polyphenols and/or polysaccharides + is often problematic when subjected to polymerase chain reaction, especially + when ma ture tissues are used for DNA extraction. In order to overcome the + problems associated with poor-quality DNA extracted from such plant samples, + a protocol has been developed, availing on a high salt concentration and on + the combination of polyvinylpyrrolidone and activated charcoal in the extraction + buffer, in order to prevent the solubilization of polysaccharides and polyphenols + in the DNA extract. Mild temperature conditions during extraction and precipitation + were also recognized as important parameters. Besides DNA purity, mild precipitation + conditions were found to be beneficial in obtaining less low-molecular mass + nucleic acids in the final DNA extract. The homogenization step and the amount + of sample extracted were also found to be crucial in keeping the extraction + procedure robust.", "venue": "", "year": 2006, "referenceCount": 19, "citationCount": + 121, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Agricultural And Food Sciences", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "2606566", "name": "D. + Bari\u010devi\u010d"}, {"authorId": "48418265", "name": "B. Javornik"}]}, + {"paperId": "251496cc19fb15d0e8ff85edb119371bcbd55c81", "externalIds": {"MAG": + "2109679463", "DOI": "10.2139/ssrn.855044", "CorpusId": 15675332}, "corpusId": + 15675332, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/251496cc19fb15d0e8ff85edb119371bcbd55c81", + "title": "Which Shorts are Informed?", "abstract": "We construct a long daily + panel of short sales using proprietary NYSE order data. From 2000 to 2004, + shorting accounts for more than 12.9% of NYSE volume, sug- gesting that shorting + constraints are not widespread. As a group, these short sellers are well informed. + Heavily shorted stocks underperform lightly shorted stocks by a risk-adjusted + average of 1.16% over the following 20 trading days (15.6% annualized). Institutional + nonprogram short sales are the most informative; stocks heavily shorted by + institutions underperform by 1.43% the next month (19.6% annualized). The + re- sults indicate that, on average, short sellers are important contributors + to efficient stock prices. THROUGHOUT THE FINANCIAL ECONOMICS LITERATURE, + short sellers occupy an exalted place in the pantheon of investors as rational, + informed market participants who act to keep prices in line. Theoreticians + often generate a divergence be- tween prices and fundamentals by building + models that prohibit or constrain short sellers (e.g., Miller (1977), Harrison + and Kreps (1978), Duffie, Garleanu, and Pedersen (2002), Hong, Scheinkman, + and Xiong (2006)). Empirical evidence uniformly indicates that when short + sale constraints are relaxed, overvalua- tions become less severe, suggesting + that short sellers move prices toward fun- damentals (examples include Lamont + and Thaler (2003), Danielsen and Sorescu (2001), Jones and Lamont (2002), + Cohen, Diether, and Malloy (2007)). But there is surprisingly little direct + evidence that short sellers know what they are doing. There is indirect evidence + in the existing literature. For example, Aitken et al. (1998) show that in + Australia, where some short sales were immediately disclosed to the public, + the reporting of a short sale causes prices to decline immediately. Some authors + (but not all) find that short interest predicts fu- ture returns. 1 Dechow + et al. (2001) find that short sellers generate positive", "venue": "", "year": + 2007, "referenceCount": 61, "citationCount": 836, "influentialCitationCount": + 132, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cis.upenn.edu/~mkearns/finread/informed_shorts.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": + "Economics", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2007-02-04", "journal": {"name": + "FEN Professional & Practitioner Journal - Forthcoming"}, "authors": [{"authorId": + "4427896", "name": "Ekkehart Boehmer"}, {"authorId": "6795283", "name": "Charles + M. Jones"}, {"authorId": "2109107304", "name": "Xiaoyan Zhang"}]}]} ' headers: @@ -39748,31 +44836,31 @@ interactions: Connection: - keep-alive Content-Length: - - '172805' + - '199783' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:47 GMT + - Tue, 03 Jan 2023 20:53:15 GMT Via: - - 1.1 78249d95c40ff7fa8ee7c73bfbe66904.cloudfront.net (CloudFront) + - 1.1 6e3a64c1dd636ff586c9b3cec075770e.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - 0W1yLUgIkVfdC712XCCi1ZVDPVfA-Fw2pXiVvAtD-kLz2SfLS5RxSw== + - CraMXeiB3Y6BOF9kSKvhlxPP2VrGyGTetlmMpDSpOZO6Nuza5K2oiA== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detImGSUvHcFq_w= + - eLxVTHUzPHcF9Lg= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '172805' + - '199783' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:47 GMT + - Tue, 03 Jan 2023 20:53:15 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 0a989f2c-7052-4a70-a1a0-3155590b0f1b + - 4e86fead-321c-4166-adf3-76880f53c5d7 status: code: 200 message: OK @@ -39788,81 +44876,167 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1900&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=1900&limit=100 response: body: - string: '{"total": 65539, "offset": 1900, "next": 2000, "data": [{"paperId": - "7fe560d2c71ebfc3c18b3ea5c5aa14f63b11e937", "externalIds": {"MAG": "1966008447", - "DOI": "10.1103/PHYSREVLETT.76.4644", "CorpusId": 46485370, "PubMed": "10061343"}, - "url": "https://www.semanticscholar.org/paper/7fe560d2c71ebfc3c18b3ea5c5aa14f63b11e937", - "title": "New mechanism for neural pattern formation.", "abstract": "We show - how the diffusive effects of a neuron''s dendritic tree can induce a Turing-like - instability in a purely excitatory or inhibitory recurrent neural network. - A crucial feature of the model is the existence of a correlation between the - location of a synaptic connection on the tree and the relative separation - of the associated neurons within the network.", "venue": "Physical Review - Letters", "year": 1996, "referenceCount": 0, "citationCount": 36, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + string: '{"total": 65729, "offset": 1900, "next": 2000, "data": [{"paperId": + "7a42159634f95ba5dc54eaf5beaf3f02ea74d6db", "externalIds": {"MAG": "1538332098", + "DBLP": "conf/sp/SchusterTLDSH15", "DOI": "10.1109/SP.2015.51", "CorpusId": + 10019945}, "corpusId": 10019945, "publicationVenue": {"id": "29b9c461-963e-4d11-b2ab-92c182243942", + "name": "IEEE Symposium on Security and Privacy", "type": "conference", "alternate_names": + ["S&P", "IEEE Symp Secur Priv"], "url": "http://www.ieee-security.org/"}, + "url": "https://www.semanticscholar.org/paper/7a42159634f95ba5dc54eaf5beaf3f02ea74d6db", + "title": "Counterfeit Object-oriented Programming: On the Difficulty of Preventing + Code Reuse Attacks in C++ Applications", "abstract": "Code reuse attacks such + as return-oriented programming (ROP) have become prevalent techniques to exploit + memory corruption vulnerabilities in software programs. A variety of corresponding + defenses has been proposed, of which some have already been successfully bypassed + -- and the arms race continues. In this paper, we perform a systematic assessment + of recently proposed CFI solutions and other defenses against code reuse attacks + in the context of C++. We demonstrate that many of these defenses that do + not consider object-oriented C++ semantics precisely can be generically bypassed + in practice. Our novel attack technique, denoted as counterfeit object-oriented + programming (COOP), induces malicious program behavior by only invoking chains + of existing C++ virtual functions in a program through corresponding existing + call sites. COOP is Turing complete in realistic attack scenarios and we show + its viability by developing sophisticated, real-world exploits for Internet + Explorer 10 on Windows and Fire fox 36 on Linux. Moreover, we show that even + recently proposed defenses (CPS, T-VIP, vfGuard, and VTint) that specifically + target C++ are vulnerable to COOP. We observe that constructing defenses resilient + to COOP that do not require access to source code seems to be challenging. + We believe that our investigation and results are helpful contributions to + the design and implementation of future defenses against control flow hijacking + attacks.", "venue": "IEEE Symposium on Security and Privacy", "year": 2015, + "referenceCount": 58, "citationCount": 350, "influentialCitationCount": 61, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-05-17", "journal": + {"name": "2015 IEEE Symposium on Security and Privacy", "pages": "745-762"}, + "authors": [{"authorId": "145124099", "name": "Felix Schuster"}, {"authorId": + "3047690", "name": "Thomas Tendyck"}, {"authorId": "2279415", "name": "Christopher + Liebchen"}, {"authorId": "2597368", "name": "Lucas Davi"}, {"authorId": "145897166", + "name": "A. Sadeghi"}, {"authorId": "144227650", "name": "Thorsten Holz"}]}, + {"paperId": "ab7d194426dc2be789aefc1559a296c556211dbe", "externalIds": {"PubMedCentral": + "3988000", "MAG": "1999034556", "DOI": "10.1371/journal.pone.0091708", "CorpusId": + 18013736, "PubMed": "24736523"}, "corpusId": 18013736, "publicationVenue": + {"id": "0aed7a40-85f3-4c66-9e1b-c1556c57001b", "name": "PLoS ONE", "type": + "journal", "alternate_names": ["Plo ONE", "PLOS ONE", "PLO ONE"], "issn": + "1932-6203", "url": "https://journals.plos.org/plosone/", "alternate_urls": + ["http://www.plosone.org/"]}, "url": "https://www.semanticscholar.org/paper/ab7d194426dc2be789aefc1559a296c556211dbe", + "title": "FR-CAPTCHA: CAPTCHA Based on Recognizing Human Faces", "abstract": + "A Completely Automated Public Turing test to tell Computers and Humans Apart + (CAPTCHA) is designed to distinguish humans from machines. Most of the existing + tests require reading distorted text embedded in a background image. However, + many existing CAPTCHAs are either too difficult for humans due to excessive + distortions or are trivial for automated algorithms to solve. These CAPTCHAs + also suffer from inherent language as well as alphabet dependencies and are + not equally convenient for people of different demographics. Therefore, there + is a need to devise other Turing tests which can mitigate these challenges. + One such test is matching two faces to establish if they belong to the same + individual or not. Utilizing face recognition as the Turing test, we propose + FR-CAPTCHA based on finding matching pairs of human faces in an image. We + observe that, compared to existing implementations, FR-CAPTCHA achieves a + human accuracy of 94% and is robust against automated attacks.", "venue": + "PLoS ONE", "year": 2014, "referenceCount": 18, "citationCount": 20, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0091708&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1996-06-10", "journal": {"name": "Physical - review letters", "pages": "\n 4644-4647\n ", "volume": "76 - 24"}, "authors": [{"authorId": "121206589", "name": "Bressloff"}]}, {"paperId": - "155ae4ad1ccc418917f6a255e5c9910bf30ed436", "externalIds": {"DBLP": "journals/csur/Reddy96", - "MAG": "2004058190", "DOI": "10.1145/234528.234736", "CorpusId": 821561}, - "url": "https://www.semanticscholar.org/paper/155ae4ad1ccc418917f6a255e5c9910bf30ed436", - "title": "Imperative functional programming", "abstract": "Our intuitive idea - of a function is that it describes the dependence of one quantity upon another. - There is no condition on what kind of quantities are involved. They could - be integers, Turing machines, binary search trees, window hierarchies, digital - circuits or whatever. The possibilities are endless. The idea of functional - programming is that functions are described applicatively, by plugging together - other functions. This recursive dependence of functions on other functions - bottoms out with the primitive operators. If the primitive operators are \u201ceffective,\u201d - i.e., they can be used to calculate, compute, construct or build one quantity - from another, then all functions expressed applicatively are similarly effective. - Imperative functional programming is the application of these ideas to imperative - computations. Quantities here are imperative computations and functions denote - dependences between imperative computations. Effectiveness of a function means - that a computation produced from it can be effectively carried out whenever - the input computations can be effectively carried out. It is often felt that - imperative computations and functional programming are in conflict. Adding - imperative computations to a functional programming language is found to destroy - its \u201creferential transparency.\u201d See, for example, [Abelson et al., - 1985, Sec. 3.1] for a discussion of the issue. However, in languages where - such issues arise, imperative computations are thrown together by extending - or modifying functional computation. The idea that functions denote dependences - is lost in the process. In contrast, imperative functional programming does - not involve altering functional computation in any way. It merely applies - it to a new context, that of imperative compu-", "venue": "CSUR", "year": - 1996, "referenceCount": 21, "citationCount": 357, "influentialCitationCount": - 15, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-06-01", "journal": {"name": "ACM Comput. Surv.", - "pages": "312-314", "volume": "28"}, "authors": [{"authorId": "145977333", - "name": "U. Reddy"}]}, {"paperId": "558d816c57ec45a48009e629b0a5c91ecc7091ae", - "externalIds": {"DBLP": "journals/jetai/Fields89", "MAG": "2086238008", "DOI": - "10.1080/09528138908953699", "CorpusId": 8245028}, "url": "https://www.semanticscholar.org/paper/558d816c57ec45a48009e629b0a5c91ecc7091ae", - "title": "Consequences of nonclassical measurement for the algorithmic description - of continuous dynamical systems", "abstract": "Abstract Continuous dynamical - systems intuitively seem capable of more complex behavior than discrete systems. - If analyzed in the framework of the traditional theory of computation, a.continuous - dynamical system with countably many quasistable states has at least the computational - power of a universal Turing machine. Such an analysis assumes, however, the - classical notion of measurement. If measurement is viewed nonclassically, - a continuous dynamical system cannot, even in principle, exhibit behavior - that cannot be simulated by a universal Turing machine.", "venue": "Journal - of experimental and theoretical artificial intelligence (Print)", "year": - 1990, "referenceCount": 11, "citationCount": 19, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1990-07-01", "journal": {"name": "J. Exp. Theor. Artif. - Intell.", "pages": "171-178", "volume": "1"}, "authors": [{"authorId": "144993883", - "name": "C. Fields"}]}, {"paperId": "836384a4a3d60f4825cdc702064170e13eb167f7", + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-04-15", "journal": + {"name": "PLoS ONE", "volume": "9"}, "authors": [{"authorId": "1931069", "name": + "Gaurav Goswami"}, {"authorId": "2052829106", "name": "Brian M. Powell"}, + {"authorId": "2338122", "name": "Mayank Vatsa"}, {"authorId": "2041134713", + "name": "Richa Singh"}, {"authorId": "2487227", "name": "A. Noore"}]}, {"paperId": + "e83cf3b19cc85c9ef1bbbc8d2967dc46d0579b56", "externalIds": {"MAG": "2992198898", + "CorpusId": 222229289}, "corpusId": 222229289, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e83cf3b19cc85c9ef1bbbc8d2967dc46d0579b56", + "title": "The Structural Approach to Cooperative Learning.", "abstract": "T + he structural approach to coop erative learning is based on the creation, + analysis, and system atic application of structures, or con tent-free ways + of organizing social in teraction in the classroom Structures usually involve + a series of steps, with proscribed behavior at each step. An important cornerstone + of the ap proach is the distinction between \"structures\" and \"activities.\" + To illustrate, teachers can design many excellent cooperative activities, + such as making a team mural or a quilt Such activities almost always have + a specific content-bound objective and, thus, cannot be used to deliver a + range of academic content. In contrast, struc tures may be used repeatedly + with almost any subject matter, at a wide range of grade levels, and at various + points in a lesson plan. To illustrate further, if a teacher new to cooperative + learning learns five activities, he or she might well report back after a + week, \"Those worked well, but what should I do next week?\" If, instead, + the teacher learns five structures, he or she could meaningfully include cooperative + learning in lessons all year to further the academic progress of students + in any subject matter Structures differ in their usefulness in the academic, + cognitive, and social domains, as well as in their usefulness in different + steps of a lesson plan.", "venue": "", "year": 1990, "referenceCount": 12, + "citationCount": 354, "influentialCitationCount": 41, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Educational Leadership", "pages": "12-15", "volume": + "47"}, "authors": [{"authorId": "144098349", "name": "S. Kagan"}]}, {"paperId": + "5045c73f6b9342a10bc565f4a1c0ed325fda53c3", "externalIds": {"DBLP": "journals/amc/ChenWC20", + "MAG": "3016540197", "DOI": "10.1016/j.amc.2020.125300", "CorpusId": 218799129}, + "corpusId": 218799129, "publicationVenue": {"id": "e593a63a-bfb7-45ac-aa27-5c320ac7a952", + "name": "Applied Mathematics and Computation", "type": "journal", "alternate_names": + ["Appl Math Comput"], "issn": "0096-3003", "url": "http://www.sciencedirect.com/science/journal/00963003", + "alternate_urls": ["https://www.sciencedirect.com/journal/applied-mathematics-and-computation"]}, + "url": "https://www.semanticscholar.org/paper/5045c73f6b9342a10bc565f4a1c0ed325fda53c3", + "title": "Spatiotemporal patterns induced by Turing and Turing-Hopf bifurcations + in a predator-prey system", "abstract": null, "venue": "Applied Mathematics + and Computation", "year": 2020, "referenceCount": 25, "citationCount": 18, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2020-09-01", "journal": {"name": "Appl. + Math. Comput.", "pages": "125300", "volume": "380"}, "authors": [{"authorId": + "23167239", "name": "Mengxin Chen"}, {"authorId": "91697488", "name": "R. + Wu"}, {"authorId": "30827668", "name": "Liping Chen"}]}, {"paperId": "5f7092c7794209cee4dbaeba517067b89b962c3f", + "externalIds": {"MAG": "2024237101", "DOI": "10.1007/S10958-006-0066-1", "CorpusId": + 18153740}, "corpusId": 18153740, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5f7092c7794209cee4dbaeba517067b89b962c3f", + "title": "Newton-Kantorovich Method and Its Global Convergence", "abstract": + null, "venue": "", "year": 2006, "referenceCount": 79, "citationCount": 46, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2006-03-01", "journal": {"name": + "Journal of Mathematical Sciences", "pages": "1513-1523", "volume": "133"}, + "authors": [{"authorId": "1703847", "name": "Boris Polyak"}]}, {"paperId": + "93e21a3025c07fc52b6a1d48e363b15ef4039246", "externalIds": {"MAG": "1489972621", + "CorpusId": 10277374}, "corpusId": 10277374, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/93e21a3025c07fc52b6a1d48e363b15ef4039246", + "title": "A lower bound to palindrome recognition by probabilistic Turing + machines", "abstract": "We call attention to the problem of proving lower + bounds on probabilistic Turing machine computations. It is shown that any + probabilisitc Turing machine recognizing the language L = {w $\\phi$ w | w + $\\epsilon$ ${{0,1}}^*$} with error $\\lambda$ > 1/2 must take $\\Omega$(n + log n) time.", "venue": "", "year": 1977, "referenceCount": 14, "citationCount": + 15, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1977-12-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1770729", + "name": "A. Yao"}]}, {"paperId": "347e2af53e5564f4930e39e115808aca8d50fd06", + "externalIds": {"DBLP": "journals/cacm/Daylight14", "MAG": "2070018975", "DOI": + "10.1145/2629499", "CorpusId": 41108598}, "corpusId": 41108598, "publicationVenue": + {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", "name": "Communications of + the ACM", "type": "journal", "alternate_names": ["Commun ACM", "Communications + of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/347e2af53e5564f4930e39e115808aca8d50fd06", + "title": "A Turing tale", "abstract": "Assessing the accuracy of popular descriptions + of Alan Turing''s influences and legacy.", "venue": "Communications of the + ACM", "year": 2014, "referenceCount": 23, "citationCount": 11, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2014-09-23", "journal": {"name": "Communications + of the ACM", "pages": "36 - 38", "volume": "57"}, "authors": [{"authorId": + "1745926", "name": "E. Daylight"}]}, {"paperId": "836384a4a3d60f4825cdc702064170e13eb167f7", "externalIds": {"MAG": "2119777837", "DOI": "10.5194/NPG-10-3-2003", "CorpusId": - 18522429}, "url": "https://www.semanticscholar.org/paper/836384a4a3d60f4825cdc702064170e13eb167f7", + 18522429}, "corpusId": 18522429, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/836384a4a3d60f4825cdc702064170e13eb167f7", "title": "Solitary potential structures observed in the magnetosheath by the Cluster spacecraft", "abstract": "Bipolar pulses of 25-100\u00b5s in duration have been observed in the wave electric field data obtained by the Wideband @@ -39888,111 +45062,52 @@ interactions: is very large and may be located at or near the bow shock, or be connected with the bow shock in some way.", "venue": "", "year": 2003, "referenceCount": 28, "citationCount": 89, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://npg.copernicus.org/articles/10/3/2003/npg-10-3-2003.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2003-04-30", "journal": {"name": "Nonlinear Processes in Geophysics", "pages": "3-11", "volume": "10"}, "authors": [{"authorId": "40305014", "name": "J. Pickett"}, {"authorId": "31021770", "name": "J. Menietti"}, {"authorId": "2007537", "name": "D. Gurnett"}, {"authorId": "4720119", "name": "B. Tsurutani"}, {"authorId": "1906204", "name": "P. Kintner"}, {"authorId": "35054462", "name": "E. Klatt"}, {"authorId": "144165600", "name": - "A. Balogh"}]}, {"paperId": "131e17a9bee1527bf69cb5bba55d2308243902d8", "externalIds": - {"MAG": "2053258711", "DBLP": "conf/focs/Herman68", "DOI": "10.1109/SWAT.1968.36", - "CorpusId": 21139840}, "url": "https://www.semanticscholar.org/paper/131e17a9bee1527bf69cb5bba55d2308243902d8", - "title": "The Uniform Halting Problem for Generalized One State Turing Machines", - "abstract": "The uniform halting problem (UH) can be stated as follows: Give - a decision procedure which for any given Turing machine (TM) will decide whether - or not it has an immortal instantaneous description (ID). An ID is called - immortal if it has no terminal successor. As it is generally the case in the - literature (see e.g. Minsky p. 118) we assume that in an ID the tape must - be blank except for some finite number of squares. If we remove this restriction - the UH becomes the immortality problem (IP). The unsolvability of the IP was - shown by Hooper. It can be seen from Part V (p. 225) of his paper that his - method also shows the unsolvability of the UH. The initialised UH, whether - or not a TM has an immortal ID when started in a specified state, is also - known to be undecidable. (See e.g. Minsky p. 151). For one state TM''s the - two problems are of course equivalent. Hooper (Part VI, 5) found that the - IP is solvable for two state TM''s. However, one can show (Herman) that the - UH (just like the halting problem) is unsolvable for two state TM''s. The - halting problem is known to be solvable for one state TM''s, even if we allow - them to have a many dimensional tape (see Herman). Can the same be said about - the UH? In this paper we show the solvability of the UH for one state TM''s. - These are not entirely trivial structures, they can do, as we show, certain - things that finite automata cannot do. We consider in what ways we can generalise - one state TM''s so that we retain the solvability of the UH. We find that - the UH for one state TM''s with two dimensional tape and jumping reading head - (i.e. the reading head can move to squares not immediately neighbouring the - previously scanned square) is also solvable. Our method does not generalize - for three or more dimensional tape, unless we put in some conditions on the - directions in which the reading head can move. On the other hand, we find - that one state TM''s with two or more tapes or with two or more reading heads - on the same tape have an unsolvable UH. Finally we consider how a different - choice of formalism would influence our results.", "venue": "SWAT", "year": - 1968, "referenceCount": 8, "citationCount": 25, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "A. Balogh"}]}, {"paperId": "96d19cbb9e9c2735762ef2db425f038c19e37af5", "externalIds": + {"ArXiv": "math-ph/0502047", "DBLP": "journals/amc/Dilao05", "MAG": "2077375246", + "DOI": "10.1016/j.amc.2004.06.036", "CorpusId": 8718001}, "corpusId": 8718001, + "publicationVenue": {"id": "e593a63a-bfb7-45ac-aa27-5c320ac7a952", "name": + "Applied Mathematics and Computation", "type": "journal", "alternate_names": + ["Appl Math Comput"], "issn": "0096-3003", "url": "http://www.sciencedirect.com/science/journal/00963003", + "alternate_urls": ["https://www.sciencedirect.com/journal/applied-mathematics-and-computation"]}, + "url": "https://www.semanticscholar.org/paper/96d19cbb9e9c2735762ef2db425f038c19e37af5", + "title": "Turing instabilities and patterns near a Hopf bifurcation", "abstract": + null, "venue": "Applied Mathematics and Computation", "year": 2005, "referenceCount": + 29, "citationCount": 31, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/math-ph/0502047", "status": + "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-02-24", "journal": {"name": "Appl. + Math. Comput.", "pages": "391-414", "volume": "164"}, "authors": [{"authorId": + "1861382", "name": "R. Dil\u00e3o"}]}, {"paperId": "5a79e77f69cd0df07b4104975015949b9d18f8e7", + "externalIds": {"MAG": "1519919954", "DBLP": "conf/icalp/Berman78", "DOI": + "10.1007/3-540-08860-1_6", "CorpusId": 206612149}, "corpusId": 206612149, + "publicationVenue": {"id": "d024be26-06b0-4afe-8fa3-a297e04fe604", "name": + "International Colloquium on Automata, Languages and Programming", "type": + "conference", "alternate_names": ["Int Conf Arab Lang Process", "International + Conference on Arabic Language Processing", "Int Colloq Autom Lang Program", + "ICALP"], "url": "http://www.eatcs.org/"}, "url": "https://www.semanticscholar.org/paper/5a79e77f69cd0df07b4104975015949b9d18f8e7", + "title": "Relationship Between Density and Deterministic Complexity of NP-Complete + Languages", "abstract": null, "venue": "International Colloquium on Automata, + Languages and Programming", "year": 1978, "referenceCount": 2, "citationCount": + 66, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1968-10-15", "journal": {"pages": "368-372"}, "authors": - [{"authorId": "1795508", "name": "G. Herman"}]}, {"paperId": "06b55f59a5eaacd6b5183cd1dbd1fc2c6861f3c0", - "externalIds": {"MAG": "2110220659", "DOI": "10.1890/1051-0761(2003)013[0704:SPACOH]2.0.CO;2", - "CorpusId": 86433346}, "url": "https://www.semanticscholar.org/paper/06b55f59a5eaacd6b5183cd1dbd1fc2c6861f3c0", - "title": "SPATIAL PATTERNS AND CONTROLS ON HISTORICAL FIRE REGIMES AND FOREST - STRUCTURE IN THE KLAMATH MOUNTAINS", "abstract": "Fire exclusion in mixed - conifer forests has increased the risk of fire due to decades of fuel accumulation. - Restoration of fire into altered forests is a challenge because of a poor - understanding of the spatial and temporal dynamics of fire regimes. In this - study the spatial and temporal characteristics of fire regimes and forest - age structure are recon- structed in a 2325-ha mixed conifer forest in the - Klamath Mountains. Forests were multiaged and burned frequently at low and - moderate severity, but forest age structure did not vary with aspect, elevation, - or topographic position. Recently there has been an increase in forest density - and a forest compositional shift to shade-tolerant species. Median fire return - in- tervals (FRI) ranged from 11.5 to 16.5 yr and varied with aspect but not - with forest composition or elevation. The median area burned was 106 ha, and - the pre-Euro-American fire rotation of 19 yr increased to 238 yr after 1905. - Intra-annual position of fire scars in the tree rings indicates that 93% of - fires occurred during the dry midsummer through fall period. Spatial patterns - of sites with similar fire dates were spatially coherent and separated from - others by topographic features that influence fire spread. Thus, patterns - of fire oc- currence tended to be fixed in space with timing of fires varying - among groups of sites. Spatial and temporal patterns of fire occurrence suggest - that managers using physical fea- tures to contain prescribed fire will create - burn patterns consistent with historical fires in the Klamath Mountains.", - "venue": "", "year": 2003, "referenceCount": 87, "citationCount": 363, "influentialCitationCount": - 37, "isOpenAccess": false, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": - [{"category": "Environmental Science", "source": "external"}, {"category": - "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2003-06-01", "journal": {"name": "Ecological Applications", - "pages": "704-719", "volume": "13"}, "authors": [{"authorId": "2110304675", - "name": "A. Taylor"}, {"authorId": "2293764", "name": "C. Skinner"}]}, {"paperId": - "c8114b325a9c46a71710fa0ebbb3fbcb80004848", "externalIds": {"MAG": "2019345357", - "DOI": "10.1002/APP.37837", "CorpusId": 137479774}, "url": "https://www.semanticscholar.org/paper/c8114b325a9c46a71710fa0ebbb3fbcb80004848", - "title": "Composite materials of graphene nanoplatelets and polypropylene, - prepared by in situ polymerization", "abstract": "Nanocomposites of polypropylene - and graphene nanoplatelets were synthesized by in situ polymerization in liquid - monomer in the presence of highly effective isospecific homogeneous metallocene - catalyst. Microstructure, mechanical, dielectric, and thermal properties of - composites are presented. X-ray phase analysis data indicate that graphene - nanoplatelets are present in composites as thin flaky particles aggregates, - with aspect ratio affected by sonication of reaction mixture. Crystallization - tempera- ture of polypropylene increases in composites. Nanocomposites are - characterized by high rigidity, thermal stability, and crystalliza- tion temperature, - low conductivity, and high dielectric losses in the microwave range. V C 2012 - Wiley Periodicals, Inc. J. Appl. Polym. Sci. 127: 904-911, 2013", "venue": - "", "year": 2013, "referenceCount": 18, "citationCount": 64, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2013-01-15", "journal": {"name": "Journal of Applied Polymer Science", "pages": - "904-911", "volume": "127"}, "authors": [{"authorId": "91919265", "name": - "S. V. Polschikov"}, {"authorId": "91238350", "name": "P. M. Nedorezova"}, - {"authorId": "92021554", "name": "A. N. Klyamkina"}, {"authorId": "36937210", - "name": "A. A. Koval\u2019chuk"}, {"authorId": "91588806", "name": "A. M. - Aladyshev"}, {"authorId": "5362534", "name": "A. Shchegolikhin"}, {"authorId": - "143717990", "name": "V. G. Shevchenko"}, {"authorId": "92724429", "name": - "V. E. Muradyan"}]}, {"paperId": "6735f173390aafa5af6221d16323661c9a995cff", - "externalIds": {"MAG": "1545479462", "CorpusId": 129317642}, "url": "https://www.semanticscholar.org/paper/6735f173390aafa5af6221d16323661c9a995cff", + "publicationDate": "1978-07-17", "journal": {"pages": "63-71"}, "authors": + [{"authorId": "144354050", "name": "P. Berman"}]}, {"paperId": "6735f173390aafa5af6221d16323661c9a995cff", + "externalIds": {"MAG": "1545479462", "CorpusId": 129317642}, "corpusId": 129317642, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6735f173390aafa5af6221d16323661c9a995cff", "title": "Application of Amplitude, Frequency, and Other Attributes to Stratigraphic and Hydrocarbon Determination: Section 2. Application of Seismic Reflection Configuration to Stratigraphic Interpretation", "abstract": "Improvements @@ -40012,542 +45127,352 @@ interactions: deposition, seismic sequence boundaries, hydrocarbon accumulations, and stratigraphic and other variations which might be misinterpreted as hydrocarbon accumulations.", "venue": "", "year": 1977, "referenceCount": 0, "citationCount": 120, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": - [{"category": "Geology", "source": "external"}, {"category": "Geology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "pages": "301-327", "volume": "165"}, "authors": [{"authorId": - "41095517", "name": "M. Taner"}, {"authorId": "144264444", "name": "R. Sheriff"}]}, - {"paperId": "4841c7f17d293d56930039fe9fca6830acbb38b5", "externalIds": {"DBLP": - "conf/uss/CarliniBPWG15", "MAG": "1429241971", "CorpusId": 2165728}, "url": - "https://www.semanticscholar.org/paper/4841c7f17d293d56930039fe9fca6830acbb38b5", - "title": "Control-Flow Bending: On the Effectiveness of Control-Flow Integrity", - "abstract": "Control-Flow Integrity (CFI) is a defense which prevents control-flow - hijacking attacks. While recent research has shown that coarse-grained CFI - does not stop attacks, fine-grained CFI is believed to be secure. \n \nWe - argue that assessing the effectiveness of practical CFI implementations is - non-trivial and that common evaluation metrics fail to do so. We then evaluate - fullyprecise static CFI -- the most restrictive CFI policy that does not break - functionality -- and reveal limitations in its security. Using a generalization - of non-control-data attacks which we call Control-Flow Bending (CFB), we show - how an attacker can leverage a memory corruption vulnerability to achieve - Turing-complete computation on memory using just calls to the standard library. - We use this attack technique to evaluate fully-precise static CFI on six real - binaries and show that in five out of six cases, powerful attacks are still - possible. Our results suggest that CFI may not be a reliable defense against - memory corruption vulnerabilities. \n \nWe further evaluate shadow stacks - in combination with CFI and find that their presence for security is necessary: - deploying shadow stacks removes arbitrary code execution capabilities of attackers - in three of six cases.", "venue": "USENIX Security Symposium", "year": 2015, - "referenceCount": 60, "citationCount": 349, "influentialCitationCount": 49, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2015-08-12", "journal": {"pages": "161-176"}, "authors": - [{"authorId": "2483738", "name": "Nicholas Carlini"}, {"authorId": "144990413", - "name": "Antonio Barresi"}, {"authorId": "144649236", "name": "Mathias Payer"}, - {"authorId": "145394689", "name": "D. Wagner"}, {"authorId": "49773674", "name": - "T. Gross"}]}, {"paperId": "8a5fa8fff7e7fd62530df9e7fedfc501d2b14306", "externalIds": - {"MAG": "1995040333", "DOI": "10.1103/PHYSREVE.54.261", "CorpusId": 46294713, - "PubMed": "9965068"}, "url": "https://www.semanticscholar.org/paper/8a5fa8fff7e7fd62530df9e7fedfc501d2b14306", - "title": "Spatiotemporal dynamics near a codimension-two point.", "abstract": - "Spatiotemporal dynamics resulting from the interaction of two instabilities - breaking, respectively, spatial and temporal symmetries are studied in the - framework of the amplitude equation formalism. The corresponding bifurcation - scenarios feature steady-Hopf bistability with corresponding localized structures - but also different types of mixed states. Some of these mixed modes result - from self-induced subharmonic instabilities of the pure steady and Hopf modes. - The bifurcation schemes are then used to organize the results of numerical - simulations of a one-dimensional reaction-diffusion model. These dynamics - are relevant to experimental chemical systems featuring a codimension-two - Turing-Hopf point but also to any experimental setup where homogeneous temporal - oscillations and spatial patterns are obtained for nearby values of parameters. - @S1063-651X~96!03707-5#", "venue": "Physical review. E, Statistical physics, - plasmas, fluids, and related interdisciplinary topics", "year": 1996, "referenceCount": - 2, "citationCount": 116, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-07-01", "journal": {"name": "Physical review. E, - Statistical physics, plasmas, fluids, and related interdisciplinary topics", - "pages": "\n 261-271\n ", "volume": "54 1"}, "authors": [{"authorId": - "16167615", "name": "De Wit A"}, {"authorId": "2067380387", "name": "Lima"}, - {"authorId": "30030198", "name": "Dewel"}, {"authorId": "30192222", "name": - "Borckmans"}]}, {"paperId": "ab7d194426dc2be789aefc1559a296c556211dbe", "externalIds": - {"PubMedCentral": "3988000", "MAG": "1999034556", "DOI": "10.1371/journal.pone.0091708", - "CorpusId": 18013736, "PubMed": "24736523"}, "url": "https://www.semanticscholar.org/paper/ab7d194426dc2be789aefc1559a296c556211dbe", - "title": "FR-CAPTCHA: CAPTCHA Based on Recognizing Human Faces", "abstract": - "A Completely Automated Public Turing test to tell Computers and Humans Apart - (CAPTCHA) is designed to distinguish humans from machines. Most of the existing - tests require reading distorted text embedded in a background image. However, - many existing CAPTCHAs are either too difficult for humans due to excessive - distortions or are trivial for automated algorithms to solve. These CAPTCHAs - also suffer from inherent language as well as alphabet dependencies and are - not equally convenient for people of different demographics. Therefore, there - is a need to devise other Turing tests which can mitigate these challenges. - One such test is matching two faces to establish if they belong to the same - individual or not. Utilizing face recognition as the Turing test, we propose - FR-CAPTCHA based on finding matching pairs of human faces in an image. We - observe that, compared to existing implementations, FR-CAPTCHA achieves a - human accuracy of 94% and is robust against automated attacks.", "venue": - "PLoS ONE", "year": 2014, "referenceCount": 18, "citationCount": 20, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], + "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, {"category": + "Geology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "301-327", "volume": "165"}, "authors": + [{"authorId": "41095517", "name": "M. Taner"}, {"authorId": "144264444", "name": + "R. Sheriff"}]}, {"paperId": "f0b854a31c23e4f77e25248190897fafc436f5fb", "externalIds": + {"ArXiv": "1904.09683", "MAG": "2980786975", "DOI": "10.1007/s00285-021-01552-y", + "CorpusId": 209989256, "PubMed": "33475826"}, "corpusId": 209989256, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/f0b854a31c23e4f77e25248190897fafc436f5fb", + "title": "Turing conditions for pattern forming systems on evolving manifolds", + "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2019, + "referenceCount": 125, "citationCount": 25, "influentialCitationCount": 1, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1904.09683", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2014-04-15", "journal": - {"name": "PLoS ONE", "volume": "9"}, "authors": [{"authorId": "1931069", "name": - "Gaurav Goswami"}, {"authorId": "2052829106", "name": "Brian M. Powell"}, - {"authorId": "2338122", "name": "Mayank Vatsa"}, {"authorId": "2041134713", - "name": "Richa Singh"}, {"authorId": "2487227", "name": "A. Noore"}]}, {"paperId": - "8851cb2ddcbe4c12c2139dc5ff2bdf130d74ae0b", "externalIds": {"MAG": "1964179274", - "DBLP": "journals/ipl/ChangIRB87", "DOI": "10.1016/0020-0190(87)90085-8", - "CorpusId": 18918095}, "url": "https://www.semanticscholar.org/paper/8851cb2ddcbe4c12c2139dc5ff2bdf130d74ae0b", - "title": "Some Observations Concerning Alternating Turing Machines Using Small - Space", "abstract": null, "venue": "Information Processing Letters", "year": - 1987, "referenceCount": 12, "citationCount": 30, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-04-22", "journal": {"name": "Journal + of Mathematical Biology", "pages": "1-61", "volume": "82"}, "authors": [{"authorId": + "8371615", "name": "R. V. Van Gorder"}, {"authorId": "2691918", "name": "V. + Klika"}, {"authorId": "22256586", "name": "Andrew L. Krause"}]}, {"paperId": + "d8e8e77270c6fd621267e4a2b48950519dcaafe7", "externalIds": {"MAG": "2169536548", + "DOI": "10.2307/3237291", "CorpusId": 56248945}, "corpusId": 56248945, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/d8e8e77270c6fd621267e4a2b48950519dcaafe7", + "title": "Predicting the distribution of shrub species in southern California + from climate and terrain\u2010derived variables", "abstract": "Generalized + additive, generalized linear, and classi- fication tree models were developed + to predict the distribution of 20 species of chaparral and coastal sage shrubs + within the southwest ecoregion of California. Mapped explanatory vari- ables + included bioclimatic attributes related to primary envi- ronmental regimes: + averages of annual precipitation, mini- mum temperature of the coldest month, + maximum tempera- ture of the warmest month, and topographically-distributed + potential solar insolation of the wettest quarter (winter) and of the growing + season (spring). Also tested for significance were slope angle (related to + soil depth) and the geographic coordi- nates of each observation. Models were + parameterized and evaluated based on species presence/absence data from 906 + plots surveyed on National Forest lands. Although all vari- ables were significant + in at least one of the species'' models, those models based only on the bioclimatic + variables predicted species presence with 3 - 26 % error. While error would + un- doubtedly be greater if the models were evaluated using inde- pendent + data, results indicate that these models are useful for predictive mapping + - for interpolating species distribution data within the ecoregion. All three + methods produced models with similar accuracy for a given species; GAMs were + useful for exploring the shape of the response functions, GLMs allowed those + response functions to be parameterized and their significance tested, and + classification trees, while some- times difficult to interpret, yielded the + lowest prediction errors (lower by 3-5% ).", "venue": "", "year": 1998, "referenceCount": + 72, "citationCount": 349, "influentialCitationCount": 28, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Environmental Science"], + "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "external"}, + {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": "1998-10-01", "journal": {"name": "Journal + of Vegetation Science", "pages": "733-748", "volume": "9"}, "authors": [{"authorId": + "144735103", "name": "J. Franklin"}]}, {"paperId": "ca426e585a7555c5cb05ed32669b59c4eabaa980", + "externalIds": {"MAG": "1483066755", "CorpusId": 14906543}, "corpusId": 14906543, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ca426e585a7555c5cb05ed32669b59c4eabaa980", + "title": "The key dimensions of knowledge-intensive business services (KIBS) + analysis: a decade of evolution", "abstract": "The importance of knowledge + and innovation in modern economies justifies the in-creasing interest that + scholars are taking in studying knowledge-intensive business services (KIBS). + The objective of this paper is to track the evolution of the key dimen-sions + on which scholars have based their analyses through a literature review. More + specifically, three main issues are addressed: (1) how KIBS are defined in + the litera-ture; (2) how KIBS have been investigated empirically by researchers; + and (3) how the analysis of KIBS has evolved over time. As a major assumption, + the analysis catego-rises the research topic into three key conceptual dimensions: + (i) knowledge; (ii) inno-vation and (iii) spatial proximity. The major hypothesis + is that the way KIBS are seen, studied and perceived by the research community + resolutely changed over time and that this evolution can be tracked by observing + modifications in the key dimensions associated with the analysis of KIBS.", + "venue": "", "year": 2007, "referenceCount": 63, "citationCount": 115, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "49109993", + "name": "Emmanuel Muller"}, {"authorId": "3082208", "name": "David Doloreux"}]}, + {"paperId": "20a342bd7dc1e8392f93325672a55c5cd38a0710", "externalIds": {"MAG": + "2322965797", "DOI": "10.1021/jp111584u", "CorpusId": 207610674, "PubMed": + "21417371"}, "corpusId": 207610674, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/20a342bd7dc1e8392f93325672a55c5cd38a0710", + "title": "Turing pattern formation by the CIMA reaction in a chemical system + consisting of quaternary alkyl ammonium cationic groups.", "abstract": "For + the spontaneous generation of a Turing pattern, two intermediate species, + an activator and an inhibitor, should be generated with the diffusion coefficient + of the activator smaller than that of the inhibitor. The chlorite-iodide-malonic + acid (CIMA) reaction that generates the activator, I(-), and inhibitor, ClO(2-), + was performed in an open gel reactor. In order to lower the effective diffusivity + of I(-), micelles of quaternary alkyl ammonium cationic amphiphiles and polymers + having a quaternary alkyl ammonium cationic side chain were combined in the + CIMA reaction system in an open gel reactor. A Turing pattern formation was + observed with the addition of n-dodecyltrimethylammonium bromide. Employing + the gel reactor prepared by the polymerization of a monomer having quaternary + alkyl ammonium cationic side chains also leads to the generation of a Turing + pattern. The micelles and polymers are believed to trap I(-) in their vicinity + as a counterion to lower the effective diffusivity.", "venue": "The journal + of physical chemistry. B", "year": 2011, "referenceCount": 17, "citationCount": + 18, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2011-04-14", "journal": {"name": "The + journal of physical chemistry. B", "pages": "\n 3959-63\n ", + "volume": "115 14"}, "authors": [{"authorId": "92541979", "name": "K. Asakura"}, + {"authorId": "86989932", "name": "R. Konishi"}, {"authorId": "67009235", "name": + "Tomomi Nakatani"}, {"authorId": "2366815", "name": "T. Nakano"}, {"authorId": + "48222144", "name": "Masazumi Kamata"}]}, {"paperId": "3ee6733d010883827057c69da483150443931bd2", + "externalIds": {"MAG": "2043740546", "DOI": "10.1007/S11587-008-0026-9", "CorpusId": + 121667227}, "corpusId": 121667227, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3ee6733d010883827057c69da483150443931bd2", + "title": "On the dynamics of predator-prey models with the Beddington\u2013De + Angelis functional response, under Robin boundary conditions", "abstract": + null, "venue": "", "year": 2008, "referenceCount": 26, "citationCount": 35, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-05-20", "journal": {"name": + "Ricerche di Matematica", "pages": "137-157", "volume": "57"}, "authors": + [{"authorId": "13106451", "name": "F. Capone"}]}, {"paperId": "9e2600e25dac039040d699bdf5057233e7bb8bfa", + "externalIds": {"DBLP": "journals/jco/LibertiM14", "MAG": "1975283720", "DOI": + "10.1007/s10878-014-9715-3", "CorpusId": 4851981}, "corpusId": 4851981, "publicationVenue": + {"id": "8bac02b0-60d4-4ce1-a898-19b26a2da9a4", "name": "Journal of combinatorial + optimization", "type": "journal", "alternate_names": ["J comb optim", "Journal + of Combinatorial Optimization", "J Comb Optim"], "issn": "1382-6905", "url": + "https://link.springer.com/journal/10878"}, "url": "https://www.semanticscholar.org/paper/9e2600e25dac039040d699bdf5057233e7bb8bfa", + "title": "Mathematical programming: Turing completeness and applications to + software analysis", "abstract": null, "venue": "Journal of combinatorial optimization", + "year": 2014, "referenceCount": 38, "citationCount": 17, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.lix.polytechnique.fr/%7Eliberti/mpturing.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-02-16", "journal": {"name": "Journal of Combinatorial + Optimization", "pages": "82-104", "volume": "28"}, "authors": [{"authorId": + "3044529", "name": "Leo Liberti"}, {"authorId": "40909523", "name": "F. Marinelli"}]}, + {"paperId": "ae77dd776a7166331cba17f6c4ec9763ff68ba32", "externalIds": {"MAG": + "2334508319", "DOI": "10.4153/CJM-1972-113-9", "CorpusId": 124022112}, "corpusId": + 124022112, "publicationVenue": {"id": "1a167e40-5fcf-4a0c-ad62-48a6c87707b7", + "name": "Canadian Journal of Mathematics - Journal Canadien de Mathematiques", + "type": "journal", "alternate_names": ["Canadian Journal of Mathematics", + "Can J Math", "Can J Math J Can Math"], "issn": "0008-414X", "url": "http://www.cms.math.ca/cjm/", + "alternate_urls": ["https://www.cambridge.org/core/journals/canadian-journal-of-mathematics", + "http://journals.cms.math.ca/CJM/"]}, "url": "https://www.semanticscholar.org/paper/ae77dd776a7166331cba17f6c4ec9763ff68ba32", + "title": "Degrees in Which the Recursive Sets are Uniformly Recursive", "abstract": + "One of the most fundamental and characteristic features of recursion theory + is the fact that the recursive sets are not uniformly recursive. In this paper + we consider the degrees a such that the recursive sets are uniformly of degree + \u2266a and characterize them by the condition a\u2019 \u2266 0\". A number + of related results will be proved, and one of these will be combined with + a theorem of Yates to show that there is no r.e. degree a < 0\u2019 such that + the r.e. sets of degree \u2266a are uniformly of degree \u2266a. This result + and a generalization will be used to study the relationship between Turing + and many-one reducibility on the r.e. sets.", "venue": "Canadian Journal of + Mathematics - Journal Canadien de Mathematiques", "year": 1972, "referenceCount": + 8, "citationCount": 67, "influentialCitationCount": 6, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1972-12-01", "journal": {"name": + "Canadian Journal of Mathematics", "pages": "1092 - 1099", "volume": "24"}, + "authors": [{"authorId": "1888089", "name": "C. Jockusch"}]}, {"paperId": + "5af10ef20f96afa4009170471e42ef5c4eb3bd94", "externalIds": {"MAG": "1572584819", + "DBLP": "journals/aim/TogeliusSKY13", "DOI": "10.1609/AIMAG.V34I3.2492", "CorpusId": + 16618883}, "corpusId": 16618883, "publicationVenue": {"id": "6fedff74-7525-4b7f-bbb4-4df4e23948e4", + "name": "The AI Magazine", "type": "journal", "alternate_names": ["AI Mag", + "Ai Mag", "Ai Magazine"], "issn": "0738-4602", "url": "https://www.aaai.org/Library/Magazine/magazine-library.php", + "alternate_urls": ["https://www.aaai.org/ojs/index.php/aimagazine/", "https://www.aaai.org/Magazine/magazine.php"]}, + "url": "https://www.semanticscholar.org/paper/5af10ef20f96afa4009170471e42ef5c4eb3bd94", + "title": "The Mario AI Championship 2009-2012", "abstract": "We give a brief + overview of the Mario AI Championship, a series of competitions based on an + open source clone of the seminal platform game Super Mario Bros. The competition + has four tracks. The gameplay and learning tracks resemble traditional reinforcement + learning competitions, the Level generation track focuses on the generation + of entertaining game levels, and the Turing Test track focuses on humanlike + game-playing behavior. We also outline some lessons learned from the competition + and its future. The article is written by the four organizers of the competition.", + "venue": "The AI Magazine", "year": 2013, "referenceCount": 24, "citationCount": + 67, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ojs.aaai.org/index.php/aimagazine/article/download/2492/2379", + "status": "BRONZE"}, "fieldsOfStudy": ["Engineering", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Education", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2013-09-15", "journal": {"name": "AI Mag.", "pages": "89-92", "volume": "34"}, + "authors": [{"authorId": "1810053", "name": "J. Togelius"}, {"authorId": "2632121", + "name": "Noor Shaker"}, {"authorId": "2463017", "name": "S. Karakovskiy"}, + {"authorId": "1686193", "name": "Georgios N. Yannakakis"}]}, {"paperId": "3fc38dac672d50ba7d6ea54d45f1b99ea5c0e327", + "externalIds": {"MAG": "2805272597", "DBLP": "conf/haptics/KarnielNAPL10", + "DOI": "10.1007/978-3-642-14064-8_29", "CorpusId": 18490853}, "corpusId": + 18490853, "publicationVenue": {"id": "63310c93-c424-43ef-a719-9236ed4d8f8a", + "name": "EuroHaptics", "type": "conference", "alternate_names": ["Int Conf + Haptics Percept Device Scenar", "International Conference on Human Haptic + Sensing and Touch Enabled Computer Applications", "Eurohaptics", "Int Conf + Hum Haptic Sens Touch Enabled Comput Appl", "International Conference on Haptics: + Perception, Devices and Scenarios"]}, "url": "https://www.semanticscholar.org/paper/3fc38dac672d50ba7d6ea54d45f1b99ea5c0e327", + "title": "A Turing-Like Handshake Test for Motor Intelligence", "abstract": + null, "venue": "EuroHaptics", "year": 2010, "referenceCount": 20, "citationCount": + 25, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1987-04-20", "journal": {"name": "Inf. Process. Lett.", "pages": "1-9", "volume": - "25"}, "authors": [{"authorId": "2344940", "name": "J. Chang"}, {"authorId": - "1712312", "name": "O. Ibarra"}, {"authorId": "144871185", "name": "B. Ravikumar"}, - {"authorId": "2052478593", "name": "L. Berman"}]}, {"paperId": "0d20ee11d7e425ffb3e0fc3791b8b1011490e2ae", - "externalIds": {"MAG": "2201428280", "CorpusId": 155673329}, "url": "https://www.semanticscholar.org/paper/0d20ee11d7e425ffb3e0fc3791b8b1011490e2ae", - "title": "Modelling the dynamics of the term structure of interest rates", - "abstract": "In order to provide tractable bond pricing formulae, the arbitrage - theories of the term struc\u00ad ture make specific assumptions as to the - number, identity and process generating the underlying forcing variables. - This paper assesses the empirical plausibility of these common assumptions. - It is found that there are three underlying factors, one more than is usually - permitted. However, by careful examination of the dynamics of suitable instrumental - variables to these factors, it is found that the further factor may be represented - by the autoregressive conditional volatility of one of these factors. Thus, - it can be readily integrated into existing two factor models.", "venue": "", - "year": 1990, "referenceCount": 29, "citationCount": 64, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Economic and Social Review", "volume": ""}, "authors": - [{"authorId": "119075011", "name": "J. Steeley"}]}, {"paperId": "d00f1691c41199351c5f0b91c264e1f3877b84e5", - "externalIds": {"MAG": "2049212629", "DOI": "10.1007/BF02983147", "CorpusId": - 26364716}, "url": "https://www.semanticscholar.org/paper/d00f1691c41199351c5f0b91c264e1f3877b84e5", - "title": "The attachments of chromosomes at the reduction division in flowering - plants", "abstract": null, "venue": "Journal Genetika", "year": 1927, "referenceCount": - 15, "citationCount": 45, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1927-06-01", "journal": {"name": - "Journal of Genetics", "pages": "177-205", "volume": "18"}, "authors": [{"authorId": - "32483399", "name": "J. Belling"}]}, {"paperId": "558e7c5b83a526c1ad9970c82c9c8270a19b40df", - "externalIds": {"DBLP": "journals/fss/BedregalF08", "MAG": "1999167901", "DOI": - "10.1016/j.fss.2007.10.013", "CorpusId": 2922068}, "url": "https://www.semanticscholar.org/paper/558e7c5b83a526c1ad9970c82c9c8270a19b40df", - "title": "On the computing power of fuzzy Turing machines", "abstract": null, - "venue": "Fuzzy Sets Syst.", "year": 2008, "referenceCount": 42, "citationCount": - 30, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-05-01", "journal": - {"name": "Fuzzy Sets Syst.", "pages": "1072-1083", "volume": "159"}, "authors": - [{"authorId": "10079486", "name": "B. Bedregal"}, {"authorId": "1743296", - "name": "S. Figueira"}]}, {"paperId": "96d19cbb9e9c2735762ef2db425f038c19e37af5", - "externalIds": {"ArXiv": "math-ph/0502047", "DBLP": "journals/amc/Dilao05", - "MAG": "2077375246", "DOI": "10.1016/j.amc.2004.06.036", "CorpusId": 8718001}, - "url": "https://www.semanticscholar.org/paper/96d19cbb9e9c2735762ef2db425f038c19e37af5", - "title": "Turing instabilities and patterns near a Hopf bifurcation", "abstract": - null, "venue": "Applied Mathematics and Computation", "year": 2005, "referenceCount": - 29, "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2005-02-24", "journal": {"name": "Appl. - Math. Comput.", "pages": "391-414", "volume": "164"}, "authors": [{"authorId": - "1861382", "name": "R. Dil\u00e3o"}]}, {"paperId": "93e21a3025c07fc52b6a1d48e363b15ef4039246", - "externalIds": {"MAG": "1489972621", "CorpusId": 10277374}, "url": "https://www.semanticscholar.org/paper/93e21a3025c07fc52b6a1d48e363b15ef4039246", - "title": "A lower bound to palindrome recognition by probabilistic Turing - machines", "abstract": "We call attention to the problem of proving lower - bounds on probabilistic Turing machine computations. It is shown that any - probabilisitc Turing machine recognizing the language L = {w $\\phi$ w | w - $\\epsilon$ ${{0,1}}^*$} with error $\\lambda$ > 1/2 must take $\\Omega$(n - log n) time.", "venue": "", "year": 1977, "referenceCount": 14, "citationCount": - 15, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1977-12-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "1770729", "name": "A. Yao"}]}, - {"paperId": "1359efc261974700c2b57f3f4bde869993e30f73", "externalIds": {"DBLP": - "conf/sp/DziembowskiEFM19", "MAG": "2896372906", "DOI": "10.1109/SP.2019.00020", - "CorpusId": 51742730}, "url": "https://www.semanticscholar.org/paper/1359efc261974700c2b57f3f4bde869993e30f73", - "title": "Perun: Virtual Payment Hubs over Cryptocurrencies", "abstract": - "Payment channels emerged recently as an efficient method for performing cheap - micropayments in cryptocurrencies. In contrast to traditional on-chain transactions, - payment channels have the advantage that they allow for nearly unlimited number - of transactions between parties without involving the blockchain. In this - work, we introduce Perun, an off-chain channel system that offers a new method - for connecting channels that is more efficient than the existing technique - of ``routing transactions'''' over multiple channels. To this end, Perun introduces - a technique called ``virtual payment channels'''' that avoids involvement - of the intermediary for each individual payment. In this paper we formally - model and prove security of this technique in the case of one intermediary, - who can be viewed as a ``payment hub'''' that has direct channels with several - parties. Our scheme works over any cryptocurrency that provides Turing-complete - smart contracts. As a proof of concept, we implemented Perun''s smart contracts - in Ethereum.", "venue": "IEEE Symposium on Security and Privacy", "year": - 2019, "referenceCount": 17, "citationCount": 116, "influentialCitationCount": - 13, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-05-19", "journal": {"name": "2019 IEEE Symposium - on Security and Privacy (SP)", "pages": "106-123"}, "authors": [{"authorId": - "1785632", "name": "Stefan Dziembowski"}, {"authorId": "20992988", "name": - "Lisa Eckey"}, {"authorId": "1935408", "name": "Sebastian Faust"}, {"authorId": - "36221122", "name": "Daniel Malinowski"}]}, {"paperId": "df69f9075dee4fe226b0910785acf22e5c3de5e2", - "externalIds": {"ArXiv": "2003.01807", "MAG": "3010473963", "CorpusId": 211990643}, - "url": "https://www.semanticscholar.org/paper/df69f9075dee4fe226b0910785acf22e5c3de5e2", - "title": "Horizons Protect Church-Turing", "abstract": "The quantum-Extended - Church-Turing thesis is a principle of physics as well as computer science. - It asserts that the laws of physics will prevent the construction of a machine - that can efficiently determine the results of any calculation which cannot - be done efficiently by a quantum Turing machine (or a universal quantum circuit). - In this note I will argue that an observer falling into a black hole can learn - the result of such a calculation in a very short time, thereby seemingly violating - the thesis. A viable reformulation requires that the thesis only applies to - observers who have access to the holographic boundary of space. The properties - of the horizon play a crucial a role in protecting the thesis. The arguments - are closely related to, and were partially motivated by a recent paper by - Bouland, Fefferman, and Vazirani, and by a question raised by Aaronson.", - "venue": "", "year": 2020, "referenceCount": 8, "citationCount": 11, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2020-03-03", - "journal": {"name": "arXiv: High Energy Physics - Theory", "volume": ""}, - "authors": [{"authorId": "101019099", "name": "L. Susskind"}]}, {"paperId": - "2772ad8dcd04e9023c06fd9d7caf036ae7b0f15d", "externalIds": {"ArXiv": "nlin/0112022", - "DBLP": "journals/em/CaludeDS02", "MAG": "2591578264", "DOI": "10.1080/10586458.2002.10504481", - "CorpusId": 8796343}, "url": "https://www.semanticscholar.org/paper/2772ad8dcd04e9023c06fd9d7caf036ae7b0f15d", - "title": "Computing a Glimpse of Randomness", "abstract": "A Chaitin Omega - number is the halting probability of a universal Chaitin (self-delimiting - Turing) machine. Every Omega number is both computably enumerable (the limit - of a computable, increasing, converging sequence of rationals) and random - (its binary expansion is an algorithmic random sequence). In particular, every - Omega number is strongly noncomputable. The aim of this paper is to describe - a procedure, that combines Java programming and mathematical proofs, to compute - the exact values of the first 64 bits of a Chaitin Omega: Full description - of programs and proofs will be given elsewhere.", "venue": "Exp. Math.", "year": - 2001, "referenceCount": 51, "citationCount": 67, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2001-12-17", "journal": {"name": "Experimental - Mathematics", "pages": "361 - 370", "volume": "11"}, "authors": [{"authorId": - "1685717", "name": "Cristian S. Calude"}, {"authorId": "1784879", "name": - "M. Dinneen"}, {"authorId": "152856762", "name": "Chi-Kou Shu"}]}, {"paperId": - "6d6ae55586ccf49088bb8d74a01ee427d4d83523", "externalIds": {"MAG": "2090154710", - "DBLP": "journals/jacm/Homer87", "DOI": "10.1145/23005.23009", "CorpusId": - 14552311}, "url": "https://www.semanticscholar.org/paper/6d6ae55586ccf49088bb8d74a01ee427d4d83523", - "title": "Minimal degrees for polynomial reducibilities", "abstract": "The - existence of minimal degrees is investigated for several polynomial reducibilities. - It is shown that no set has minimal degree with respect to polynomial many-one - or Turing reducibility. This extends a result of Ladner in which only recursive - sets are considered. A polynomial reducibility \u2264hT - is defined. This reducibility is a strengthening of polynomial Turing reducibility, - and its properties relate to the P = ? NP question. For this new reducibility, - a set of minimal degree is constructed under the assumption that P = NP. However, - the set constructed is nonrecursive, and it is shown that no recursive set - is of minimal \u2264 hT - degree.", "venue": "JACM", "year": 1987, "referenceCount": 16, "citationCount": - 22, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1987-04-01", "journal": {"name": "J. - ACM", "pages": "480-491", "volume": "34"}, "authors": [{"authorId": "143659735", - "name": "S. Homer"}]}, {"paperId": "05a499497274b3dc7b3694e63d435858a1b5be84", - "externalIds": {"MAG": "2133210353", "DOI": "10.1142/S021833901000338X", "CorpusId": - 122951508}, "url": "https://www.semanticscholar.org/paper/05a499497274b3dc7b3694e63d435858a1b5be84", - "title": "THE SPATIAL PATTERNS THROUGH DIFFUSION-DRIVEN INSTABILITY IN MODIFIED - LESLIE-GOWER AND HOLLING-TYPE II PREDATOR-PREY MODEL", "abstract": "Formation - of spatial patterns in prey-predator system is a central issue in ecology. - In this paper Turing structure through diffusion driven instability in a modified - Leslie-Gower and Holling-type II predator-prey model has been investigated. - The parametric space for which Turing spatial structure takes place has been - found out. Extensive numerical experiments have been performed to show the - role of diffusion coefficients and other important parameters of the system - in Turing instability that produces some elegant patterns that have not been - observed in the earlier findings. Finally it is concluded that the diffusion - can lead the prey population to become isolated in the two-dimensional spatial - domain.", "venue": "", "year": 2010, "referenceCount": 13, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2010-09-01", "journal": {"name": "Journal of Biological - Systems", "pages": "593-603", "volume": "18"}, "authors": [{"authorId": "47334108", - "name": "Gui\u2010Quan Sun"}, {"authorId": "2016534", "name": "S. Sarwardi"}, - {"authorId": "3093869", "name": "P. Pal"}, {"authorId": "103345585", "name": - "Md Sabiar Rahman"}]}, {"paperId": "5f7092c7794209cee4dbaeba517067b89b962c3f", - "externalIds": {"MAG": "2024237101", "DOI": "10.1007/S10958-006-0066-1", "CorpusId": - 18153740}, "url": "https://www.semanticscholar.org/paper/5f7092c7794209cee4dbaeba517067b89b962c3f", - "title": "Newton-Kantorovich Method and Its Global Convergence", "abstract": - null, "venue": "", "year": 2006, "referenceCount": 79, "citationCount": 46, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2006-03-01", "journal": {"name": "Journal of Mathematical Sciences", "pages": - "1513-1523", "volume": "133"}, "authors": [{"authorId": "1703847", "name": - "Boris Polyak"}]}, {"paperId": "5292b3c62da2d3d19c29e767092a0e73dbc13c72", - "externalIds": {"MAG": "2058514655", "DOI": "10.1016/j.beproc.2005.01.001", - "CorpusId": 24444653, "PubMed": "15795069"}, "url": "https://www.semanticscholar.org/paper/5292b3c62da2d3d19c29e767092a0e73dbc13c72", - "title": "A Turing test of a timing theory", "abstract": null, "venue": "Behavioural - Processes", "year": 2005, "referenceCount": 33, "citationCount": 20, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-04-29", "journal": {"name": "Behavioural Processes", "pages": "45-58", - "volume": "69"}, "authors": [{"authorId": "144304531", "name": "R. Church"}, - {"authorId": "6347986", "name": "P. Guilhardi"}]}, {"paperId": "0d6f47deee34d0c0f74d2b74d4fd4849568ca2e9", - "externalIds": {"MAG": "1986302755", "ArXiv": "nlin/0508014", "DOI": "10.1209/epl/i2005-10580-5", - "CorpusId": 119459582}, "url": "https://www.semanticscholar.org/paper/0d6f47deee34d0c0f74d2b74d4fd4849568ca2e9", - "title": "Dynamical failure of Turing patterns", "abstract": "The emergence - of stable disordered patterns in reactive systems on a spatially homogenous - substrate is studied in the context of vegetation patterns in the semi-arid - climatic zone. It is shown that reaction-diffusion systems that allow for - Turing instability may exhibit heterogeneous \"glassy\" steady state with - no characteristic wavelength if the diffusion rate associated with the slow - reactant is very small. Upon decreasing the diffusion constant of the slow - reactant three phases are identified: strong diffusion yields a stable homogenous - phase, intermediate diffusion supports Turing (crystal like) patterns while - in the slow-diffusion limit the glassy state is the generic stable solution. - In this disordered phase the dynamics is of crucial importance, with strong - differences between local and global initiation.", "venue": "", "year": 2005, - "referenceCount": 5, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2005-08-08", "journal": {"name": - "EPL", "pages": "837-843", "volume": "74"}, "authors": [{"authorId": "2947416", - "name": "Alon Manor"}, {"authorId": "145606617", "name": "N. Shnerb"}]}, {"paperId": - "0cb10007f85ed62a2a3b2704df63cfd3c7bf5425", "externalIds": {"MAG": "1995480413", - "DOI": "10.1039/A705895K", "CorpusId": 17873461}, "url": "https://www.semanticscholar.org/paper/0cb10007f85ed62a2a3b2704df63cfd3c7bf5425", - "title": "Turing patterns in a single-step autocatalytic reaction", "abstract": - "Stable Turing patterns are presented in the simplest reaction\u2013diffusion - system containing a single autocatalytic step in a continuously fed unstirred - reactor. In the one-variable homogeneous system exhibiting only bistability, - the spatial instability arises from the decoupling of the species by unequal - diffusion. The results suggest the possibility of experimentally finding Turing - instability among the relatively common bistable chemical systems.", "venue": - "", "year": 1997, "referenceCount": 10, "citationCount": 15, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Journal of the Chemical Society, Faraday Transactions", - "pages": "4301-4303", "volume": "93"}, "authors": [{"authorId": "143724284", - "name": "D. Horv\u00e1th"}, {"authorId": "117753463", "name": "A. T\u00f3th"}]}, - {"paperId": "08803b720b49323a5a837a4f7cace891405a55dd", "externalIds": {"ArXiv": - "math/9405208", "MAG": "2952161676", "DBLP": "journals/siamcomp/Kummer96", - "DOI": "10.1137/S0097539794268789", "CorpusId": 18471904}, "url": "https://www.semanticscholar.org/paper/08803b720b49323a5a837a4f7cace891405a55dd", - "title": "Kolmogorov Complexity and Instance Complexity of Recursively Enumerable - Sets", "abstract": "The way in which way Kolmogorov complexity and instance - complexity affect properties of recursively enumerable (r.e.) sets is studied. - The well-known $2\\log n$ upper bound on the Kolmogorov complexity of initial - segments of r. e. sets is shown to be optimal, and the Turing degrees of r. - e. sets which attain this bound are characterized. The main part of the paper - is concerned with instance complexity, introduced by Ko, Orponen, Schoning, - and Watanabe in 1986, as a measure of the complexity of individual instances - of a decision problem. They conjectured that for every r. e. nonrecursive - set, the instance complexity is infinitely often at least as high as the Kolmogorov - complexity. The conjecture is refuted by constructing an r. e. nonrecursive - set with instance complexity logarithmic in the Kolmogorov complexity. This - bound is optimal up to an additive constant. In the other extreme, the conjecture - is established for many classes of complete sets, such as weak-truth-table-complete - (wtt-complete) and Q-complete sets. However, there is a Turing-complete set - for which it fails.", "venue": "SIAM journal on computing (Print)", "year": - 1994, "referenceCount": 13, "citationCount": 54, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1994-05-25", "journal": - {"name": "SIAM J. Comput.", "pages": "1123-1143", "volume": "25"}, "authors": - [{"authorId": "144607616", "name": "M. Kummer"}]}, {"paperId": "a92d40b37ceafe5d84f26b7fba6647232576566f", - "externalIds": {"MAG": "2120390967", "ArXiv": "1111.1064", "DOI": "10.1112/plms/pdt065", - "CorpusId": 51793783}, "url": "https://www.semanticscholar.org/paper/a92d40b37ceafe5d84f26b7fba6647232576566f", - "title": "The typical Turing degree", "abstract": "The Turing degree of a - real measures the computational difficulty of producing its binary expansion. - Since Turing degrees are tailsets, it follows from Kolmogorov''s 0\u20101 - law that, for any property which may or may not be satisfied by any given - Turing degree, the satisfying class will either be of Lebesgue measure 0 or - 1, so long as it is measurable. So either the typical degree satisfies the - property, or else the typical degree satisfies its negation. Further, there - is then some level of randomness sufficient to ensure typicality in this regard. - We describe and prove a large number of results in a new programme of research - which aims to establish the (order theoretically) definable properties of - the typical Turing degree, and the level of randomness required in order to - guarantee typicality.", "venue": "", "year": 2011, "referenceCount": 57, "citationCount": - 11, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-11-04", "journal": {"name": - "Proceedings of the London Mathematical Society", "volume": "109"}, "authors": - [{"authorId": "1678539", "name": "George Barmpalias"}, {"authorId": "35198171", - "name": "Adam R. Day"}, {"authorId": "1387957937", "name": "Andrew Lewis-Pye"}]}, - {"paperId": "babe33d25134fed00d718d73e2d8145b2e481750", "externalIds": {"MAG": - "2980109286", "PubMedCentral": "6914236", "DOI": "10.2196/16222", "CorpusId": - 204953339, "PubMed": "31661083"}, "url": "https://www.semanticscholar.org/paper/babe33d25134fed00d718d73e2d8145b2e481750", - "title": "Trust Me, I\u2019m a Chatbot: How Artificial Intelligence in Health - Care Fails the Turing Test", "abstract": "Over the next decade, one issue - which will dominate sociotechnical studies in health informatics is the extent - to which the promise of artificial intelligence in health care will be realized, - along with the social and ethical issues which accompany it. A useful thought - experiment is the application of the Turing test to user-facing artificial - intelligence systems in health care (such as chatbots or conversational agents). - In this paper I argue that many medical decisions require value judgements - and the doctor-patient relationship requires empathy and understanding to - arrive at a shared decision, often handling large areas of uncertainty and - balancing competing risks. Arguably, medicine requires wisdom more than intelligence, - artificial or otherwise. Artificial intelligence therefore needs to supplement - rather than replace medical professionals, and identifying the complementary - positioning of artificial intelligence in medical consultation is a key challenge - for the future. In health care, artificial intelligence needs to pass the - implementation game, not the imitation game.", "venue": "Journal of Medical - Internet Research", "year": 2019, "referenceCount": 27, "citationCount": 49, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2019-10-01", "journal": {"name": "Journal of Medical Internet Research", - "volume": "21"}, "authors": [{"authorId": "2069584976", "name": "J. Powell"}]}, - {"paperId": "5e4eb58d5b47ac1c73f4cf189497170e75ae6237", "externalIds": {"DBLP": - "journals/corr/KaiserS15", "MAG": "2173051530", "ArXiv": "1511.08228", "CorpusId": - 2009318}, "url": "https://www.semanticscholar.org/paper/5e4eb58d5b47ac1c73f4cf189497170e75ae6237", - "title": "Neural GPUs Learn Algorithms", "abstract": "Learning an algorithm - from examples is a fundamental problem that has been widely studied. Recently - it has been addressed using neural networks, in particular by Neural Turing - Machines (NTMs). These are fully differentiable computers that use backpropagation - to learn their own programming. Despite their appeal NTMs have a weakness - that is caused by their sequential nature: they are not parallel and are are - hard to train due to their large depth when unfolded. \nWe present a neural - network architecture to address this problem: the Neural GPU. It is based - on a type of convolutional gated recurrent unit and, like the NTM, is computationally - universal. Unlike the NTM, the Neural GPU is highly parallel which makes it - easier to train and efficient to run. \nAn essential property of algorithms - is their ability to handle inputs of arbitrary size. We show that the Neural - GPU can be trained on short instances of an algorithmic task and successfully - generalize to long instances. We verified it on a number of tasks including - long addition and long multiplication of numbers represented in binary. We - train the Neural GPU on numbers with upto 20 bits and observe no errors whatsoever - while testing it, even on much longer numbers. \nTo achieve these results - we introduce a technique for training deep recurrent networks: parameter sharing - relaxation. We also found a small amount of dropout and gradient noise to - have a large positive effect on learning and generalization.", "venue": "International - Conference on Learning Representations", "year": 2015, "referenceCount": 48, - "citationCount": 315, "influentialCitationCount": 34, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2015-11-25", "journal": - {"name": "arXiv: Learning", "volume": ""}, "authors": [{"authorId": "40527594", - "name": "Lukasz Kaiser"}, {"authorId": "1701686", "name": "Ilya Sutskever"}]}, - {"paperId": "44a9febbb02db79363d579823a8dfbc402e5e4e5", "externalIds": {"MAG": - "1596999019", "DBLP": "journals/mima/Stannett03", "DOI": "10.1023/A:1021341202779", - "CorpusId": 12837251}, "url": "https://www.semanticscholar.org/paper/44a9febbb02db79363d579823a8dfbc402e5e4e5", - "title": "Computation and Hypercomputation", "abstract": null, "venue": "Minds - and Machines", "year": 2003, "referenceCount": 75, "citationCount": 31, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-02-01", "journal": {"name": "Minds and Machines", - "pages": "115-153", "volume": "13"}, "authors": [{"authorId": "2459698", "name": - "M. Stannett"}]}, {"paperId": "4ee824d6bbf8e57df382ac1b518c32fb155dc890", - "externalIds": {"MAG": "2460912046", "DBLP": "conf/icfca/KuznetsovO06", "DOI": - "10.1007/11671404_21", "CorpusId": 117171207}, "url": "https://www.semanticscholar.org/paper/4ee824d6bbf8e57df382ac1b518c32fb155dc890", - "title": "Counting Pseudo-intents and #P-completeness", "abstract": null, - "venue": "ICFCA", "year": 2006, "referenceCount": 6, "citationCount": 35, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-02-13", "journal": {"pages": "306-308"}, "authors": - [{"authorId": "1765540", "name": "S. Kuznetsov"}, {"authorId": "2174886", - "name": "S. Obiedkov"}]}, {"paperId": "9384db7f6b16bb4548c4778f2460ba15475bcb8a", - "externalIds": {"MAG": "2066503973", "DOI": "10.3934/DCDSB.2004.4.705", "CorpusId": - 55226703}, "url": "https://www.semanticscholar.org/paper/9384db7f6b16bb4548c4778f2460ba15475bcb8a", - "title": "Noise and productivity dependence of spatiotemporal pattern formation - in a prey-predator system", "abstract": "The spatiotemporal pattern formation - in a prey-predator dynamics is \nstudied numerically. External noise as well - as the productivity of \nthe prey population control emergence, symmetry and - stability of as \nwell as transitions between structures. Diffusive Turing - structures \nand invasion waves are presented as example.", "venue": "", "year": - 2004, "referenceCount": 25, "citationCount": 35, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2004-05-01", "journal": {"name": "Discrete and Continuous Dynamical Systems-series - B", "pages": "705-711", "volume": "4"}, "authors": [{"authorId": "38974749", - "name": "H. Malchow"}, {"authorId": "2570875", "name": "F. Hilker"}, {"authorId": - "145476093", "name": "S. Petrovskii"}]}, {"paperId": "59841d83d718f32bddb3ce56bf8c0f870c955fdd", - "externalIds": {"MAG": "2046937527", "DOI": "10.1103/PHYSREVLETT.96.048304", - "CorpusId": 24817020, "PubMed": "16486904"}, "url": "https://www.semanticscholar.org/paper/59841d83d718f32bddb3ce56bf8c0f870c955fdd", - "title": "Effect of axial growth on Turing pattern formation.", "abstract": - "We have performed one-dimensional and two-dimensional experiments and simulations - to study the formation of patterns in a system that grows continuously in - one direction. Depending on the growth velocity, three basic spatial configurations - can be obtained: stripes that are parallel, oblique, or perpendicular to the - growth direction. The dependence of the wavelength on the growth velocity - has also been observed. Our results illustrate the importance of these growth - mechanisms in determining the final configuration of chemical and biological - pattern-forming processes.", "venue": "Physical Review Letters", "year": 2006, - "referenceCount": 32, "citationCount": 28, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "2010-07-08", "journal": {"pages": "197-204"}, "authors": [{"authorId": "1848564", + "name": "A. Karniel"}, {"authorId": "2166933", "name": "I. Nisky"}, {"authorId": + "1396288287", "name": "Guy Avraham"}, {"authorId": "2514098", "name": "Bat-Chen + Peles"}, {"authorId": "1403907603", "name": "S. Levy-Tzedek"}]}, {"paperId": + "c8114b325a9c46a71710fa0ebbb3fbcb80004848", "externalIds": {"MAG": "2019345357", + "DOI": "10.1002/APP.37837", "CorpusId": 137479774}, "corpusId": 137479774, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c8114b325a9c46a71710fa0ebbb3fbcb80004848", + "title": "Composite materials of graphene nanoplatelets and polypropylene, + prepared by in situ polymerization", "abstract": "Nanocomposites of polypropylene + and graphene nanoplatelets were synthesized by in situ polymerization in liquid + monomer in the presence of highly effective isospecific homogeneous metallocene + catalyst. Microstructure, mechanical, dielectric, and thermal properties of + composites are presented. X-ray phase analysis data indicate that graphene + nanoplatelets are present in composites as thin flaky particles aggregates, + with aspect ratio affected by sonication of reaction mixture. Crystallization + tempera- ture of polypropylene increases in composites. Nanocomposites are + characterized by high rigidity, thermal stability, and crystalliza- tion temperature, + low conductivity, and high dielectric losses in the microwave range. V C 2012 + Wiley Periodicals, Inc. J. Appl. Polym. Sci. 127: 904-911, 2013", "venue": + "", "year": 2013, "referenceCount": 18, "citationCount": 64, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-01-15", "journal": {"name": + "Journal of Applied Polymer Science", "pages": "904-911", "volume": "127"}, + "authors": [{"authorId": "91919265", "name": "S. V. Polschikov"}, {"authorId": + "91238350", "name": "P. M. Nedorezova"}, {"authorId": "92021554", "name": + "A. N. Klyamkina"}, {"authorId": "36937210", "name": "A. A. Koval\u2019chuk"}, + {"authorId": "91588806", "name": "A. M. Aladyshev"}, {"authorId": "5362534", + "name": "A. Shchegolikhin"}, {"authorId": "143717990", "name": "V. G. Shevchenko"}, + {"authorId": "92724429", "name": "V. E. Muradyan"}]}, {"paperId": "b280aba2e3bea2876050684d985060889df22a20", + "externalIds": {"MAG": "2009766771", "DOI": "10.1007/BF00046531", "CorpusId": + 5797619, "PubMed": "8953211"}, "corpusId": 5797619, "publicationVenue": {"id": + "3d2ef4de-9237-464a-be0e-aa11887d902c", "name": "Acta Biotheoretica", "type": + "journal", "alternate_names": ["Acta Biotheor"], "issn": "0001-5342", "url": + "https://www.springer.com/philosophy/epistemology+and+philosophy+of+science/journal/10441", + "alternate_urls": ["https://link.springer.com/journal/10441", "http://www.springer.com/philosophy/epistemology+and+philosophy+of+science/journal/10441"]}, + "url": "https://www.semanticscholar.org/paper/b280aba2e3bea2876050684d985060889df22a20", + "title": "Chemical morphogenesis: Turing patterns in an experimental chemical + system", "abstract": null, "venue": "Acta Biotheoretica", "year": 1996, "referenceCount": + 31, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-02-03", "journal": {"name": "Physical - review letters", "pages": "\n 048304\n ", "volume": "96 4"}, - "authors": [{"authorId": "2701200", "name": "D. G. M\u00edguez"}, {"authorId": - "4978913", "name": "M. Dolnik"}, {"authorId": "2614851", "name": "A. P. Mu\u00f1uzuri"}, - {"authorId": "78546816", "name": "L. Kramer"}]}, {"paperId": "54759317d353a363571fcab38e1151996bfda26e", - "externalIds": {"DBLP": "conf/cmsb/FagesGBP17", "MAG": "2737153105", "DOI": - "10.1007/978-3-319-67471-1_7", "CorpusId": 12877436}, "url": "https://www.semanticscholar.org/paper/54759317d353a363571fcab38e1151996bfda26e", - "title": "Strong Turing Completeness of Continuous Chemical Reaction Networks - and Compilation of Mixed Analog-Digital Programs", "abstract": null, "venue": - "Computational Methods in Systems Biology", "year": 2017, "referenceCount": - 49, "citationCount": 51, "influentialCitationCount": 8, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-09-27", "journal": {"pages": "108-127"}, "authors": [{"authorId": "1822220", - "name": "F. Fages"}, {"authorId": "25139989", "name": "Guillaume Le Guludec"}, - {"authorId": "1706341", "name": "Olivier Bournez"}, {"authorId": "2885195", - "name": "Amaury Pouly"}]}, {"paperId": "e141196a32c1ea57851afd54dc753d34960fdf89", - "externalIds": {"DBLP": "journals/corr/Jansen14", "ArXiv": "1402.4718", "MAG": - "1566722385", "DOI": "10.1016/j.jcss.2016.10.008", "CorpusId": 2688579}, "url": - "https://www.semanticscholar.org/paper/e141196a32c1ea57851afd54dc753d34960fdf89", - "title": "Turing kernelization for finding long paths and cycles in restricted - graph classes", "abstract": null, "venue": "Journal of computer and system - sciences (Print)", "year": 2014, "referenceCount": 59, "citationCount": 62, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-02-19", "journal": {"name": "J. Comput. Syst. Sci.", - "pages": "18-37", "volume": "85"}, "authors": [{"authorId": "1780259", "name": - "B. Jansen"}]}, {"paperId": "832934d9b30ed603108b2b495edd5a46debb6447", "externalIds": - {"DBLP": "series/sci/Yang13", "MAG": "127010602", "DOI": "10.1007/978-3-642-29694-9_16", - "CorpusId": 13011398}, "url": "https://www.semanticscholar.org/paper/832934d9b30ed603108b2b495edd5a46debb6447", - "title": "Metaheuristic Optimization: Nature-Inspired Algorithms and Applications", - "abstract": null, "venue": "Artificial Intelligence, Evolutionary Computing - and Metaheuristics", "year": 2013, "referenceCount": 66, "citationCount": - 44, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"pages": - "405-420"}, "authors": [{"authorId": "1750780", "name": "Xin-She Yang"}]}, - {"paperId": "55caf3ce1ccc3e48032f56887d70d95f0e128b9a", "externalIds": {"MAG": - "2135277733", "DBLP": "journals/sjis/Vikkelso05", "CorpusId": 17900061}, "url": - "https://www.semanticscholar.org/paper/55caf3ce1ccc3e48032f56887d70d95f0e128b9a", + ["Review", "JournalArticle"], "publicationDate": "1996-11-01", "journal": + {"name": "Acta Biotheoretica", "pages": "249-261", "volume": "44"}, "authors": + [{"authorId": "3250971", "name": "E. Dulos"}, {"authorId": "2313078", "name": + "J. Boissonade"}, {"authorId": "145073148", "name": "J. Perraud"}, {"authorId": + "12105027", "name": "B. Rudovics"}, {"authorId": "50010680", "name": "P. Kepper"}]}, + {"paperId": "806f695cbbad05dced397732d9b470842bc9211d", "externalIds": {"MAG": + "2184421550", "CorpusId": 123930366}, "corpusId": 123930366, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/806f695cbbad05dced397732d9b470842bc9211d", + "title": "Turing Patterns in CNNs-Part 11: Equations and Behaviors", "abstract": + "The general state equations describing two-grid cou- pled CNNs based on the + reduced Chua''s circuit are derived, and the analysis of ''hring pattern formation + is approached from a specific point of view: spatial-eigenfunction based equation + decoupling. Discrete spatial eigenfunctions for two common types of boundary + conditions are presented, and the way the dynamics is influenced by the shape + and position of the dispersion curve (i-1 i) N PART I of this paper (l), it + was shown that two-grid I coupled CNNs based on the reduced Chua''s circuit + have the potential of producing reaction-diffusion type (Turing) patterns.'' + In the above paper the general principle of pattern formation has been described, + the conditions concerning the individual cell have been analyzed, a qualitative + explanation of the pattern formation mechanism in a 1-D c\"J has been given, + and the multiple equilibria property has been exemplified. The key mechanism + of pattern formation is based on two kinds of conditions. The first kind refers + to requirements for the isolated cells to have a unique, stable equilibrium + point. These conditions, in terms of the nonlinear characteristic and of he + Jacobian matrix of the isolated cell at the equilibrium point, have been derived + in (l). For the whole interconnected array, the above equilibrium is still + an Fig. 1. The (i,j) node of the two-grid coupled CNN.", "venue": "", "year": + 1995, "referenceCount": 4, "citationCount": 26, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1876298", + "name": "L. Goras"}]}, {"paperId": "551dec4c5c0746e85a5e16d0b8e2f402e17fb7c9", + "externalIds": {"MAG": "2118448270", "DOI": "10.1093/imammb/dqt017", "CorpusId": + 39335110, "PubMed": "24087834"}, "corpusId": 39335110, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/551dec4c5c0746e85a5e16d0b8e2f402e17fb7c9", + "title": "The sensitivity of Turing self-organization to biological feedback + delays: 2D models of fish pigmentation.", "abstract": "Turing morphogen models + have been extensively explored in the context of large-scale self-organization + in multicellular biological systems. However, reconciling the detailed biology + of morphogen dynamics, while accounting for time delays associated with gene + expression, reveals aberrant behaviours that are not consistent with early + developmental self-organization, especially the requirement for exquisite + temporal control. Attempts to reconcile the interpretation of Turing''s ideas + with an increasing understanding of the mechanisms driving zebrafish pigmentation + suggests that one should reconsider Turing''s model in terms of pigment cells + rather than morphogens (Nakamasu et al., 2009, PNAS, 106: , 8429-8434; Yamaguchi + et al., 2007, PNAS, 104: , 4790-4793). Here the dynamics of pigment cells + is subject to response delays implicit in the cell cycle and apoptosis. Hence + we explore simulations of fish skin patterning, focussing on the dynamical + influence of gene expression delays in morphogen-based Turing models and response + delays for cell-based Turing models. We find that reconciling the mechanisms + driving the behaviour of Turing systems with observations of fish skin patterning + remains a fundamental challenge.", "venue": "Mathematical medicine and biology + : a journal of the IMA", "year": 2015, "referenceCount": 0, "citationCount": + 14, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-01", "journal": + {"name": "Mathematical medicine and biology : a journal of the IMA", "pages": + "\n 56-78\n ", "volume": "32 1"}, "authors": [{"authorId": + "2662569", "name": "E. Gaffney"}, {"authorId": "37236426", "name": "S. S. + Lee"}]}, {"paperId": "4e7da0356e2bacf94d20b7469e50e4c9d17968d9", "externalIds": + {"MAG": "2052849655", "DOI": "10.3354/AME045101", "CorpusId": 38056008}, "corpusId": + 38056008, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4e7da0356e2bacf94d20b7469e50e4c9d17968d9", + "title": "First successful culture of the marine dinoflagellate Dinophysis + acuminata", "abstract": "The dinoflagellate genus Dinophysis in- cludes several + species that cause diarrhetic shellfish poi- soning, none of which have yet + been established in cul- ture. We report on the maintenance of Dinophysis + acuminata cultures that were established in December 2005 and also on its + feeding mechanism, and growth rates when fed the ciliate prey Myrionecta rubra + with and without the addition of the cryptophyte Teleaulax sp. D. acuminata + grew well (growth rate of 0.95 d -1 ) in laboratory culture when supplied + with the marine ciliate M. rubra as prey, reaching a maximum concentration + of about 2400 cells ml -1 at the end of the feeding experiment. In contrast, + D. acuminata did not show sustained growth in the absence of the ciliate or + when provided the cryptophyte Teleaulax sp. as prey (D. acuminata used its + peduncle to extract the cell contents of the prey organism, M. rubra). Based + on the prey- preda- tor interactions occurring among D. acuminata, M. rubra, + and Teleaulax sp. in this study, establishment of perma- nent culture of the + dinoflagellate D. acuminata may facil- itate a better understanding of the + ecophysiology, biol- ogy, and toxicology of Dinophysis species, as well as + the evolution of dinoflagellate plastids.", "venue": "", "year": 2006, "referenceCount": + 26, "citationCount": 330, "influentialCitationCount": 39, "isOpenAccess": + true, "openAccessPdf": {"url": "https://www.int-res.com/articles/feature/a045p101.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2006-11-24", "journal": {"name": "Aquatic Microbial + Ecology", "pages": "101-106", "volume": "45"}, "authors": [{"authorId": "5156106", + "name": "M. Park"}, {"authorId": "49899817", "name": "Sunju Kim"}, {"authorId": + "1456153430", "name": "Hyung Seop Kim"}, {"authorId": "144272399", "name": + "Geumog Myung"}, {"authorId": "104811839", "name": "Yihuei Kang"}, {"authorId": + "11738217", "name": "W. Yih"}]}, {"paperId": "55caf3ce1ccc3e48032f56887d70d95f0e128b9a", + "externalIds": {"MAG": "2135277733", "DBLP": "journals/sjis/Vikkelso05", "CorpusId": + 17900061}, "corpusId": 17900061, "publicationVenue": {"id": "a4a317c4-efab-4c0b-91d4-bb16df933253", + "name": "Scandinavian Journal of Information Systems", "type": "journal", + "alternate_names": ["Scand J Inf Syst"], "issn": "0905-0167", "alternate_issns": + ["1901-0990"], "url": "https://aisel.aisnet.org/sjis/"}, "url": "https://www.semanticscholar.org/paper/55caf3ce1ccc3e48032f56887d70d95f0e128b9a", "title": "Subtle Redistribution of Work, Attention and Risks: Electronic Patient Records and Organisational Consequences", "abstract": "Based on an actor-network study of the way in which medical work in a hospital has changed after the @@ -40562,114 +45487,215 @@ interactions: for the theoretical understanding and practical management of design, implementation, and evaluation of ICT.", "venue": "Scandinavian Journal of Information Systems", "year": 2005, "referenceCount": 58, "citationCount": 114, "influentialCitationCount": - 10, "isOpenAccess": false, "fieldsOfStudy": ["Business", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Business", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Scand. J. Inf. Syst.", "pages": "10", "volume": - "17"}, "authors": [{"authorId": "1403590345", "name": "Signe Vikkels\u00f8"}]}, - {"paperId": "e85783c405a9949fc6942b130b544e0f6cf3435c", "externalIds": {"MAG": - "147911835", "DBLP": "conf/ncpw/TeuscherS00", "DOI": "10.1007/978-1-4471-0281-6_16", - "CorpusId": 14209877}, "url": "https://www.semanticscholar.org/paper/e85783c405a9949fc6942b130b544e0f6cf3435c", - "title": "A Revival of Turing''s Forgotten Connectionist Ideas: Exploring - Unorganized Machines", "abstract": null, "venue": "NCPW", "year": 2000, "referenceCount": - 32, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": + 10, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Business", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Business", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Business", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Scand. J. Inf. Syst.", "pages": + "10", "volume": "17"}, "authors": [{"authorId": "1403590345", "name": "Signe + Vikkels\u00f8"}]}, {"paperId": "50a31046e70833004ed5a684338ac13200cea925", + "externalIds": {"MAG": "2345709834", "DOI": "10.2307/1312947", "CorpusId": + 88329030}, "corpusId": 88329030, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/50a31046e70833004ed5a684338ac13200cea925", + "title": "Evolution of the Y Sex Chromosome in Animals Y chromosomes evolve + through the degeneration of autosomes", "abstract": "Sex chromosomes are part + of the gender determination system of many organisms. They are common in animals + and rare in plants. There are many forms of sex de\u00ad termination. Gender + may be deter\u00ad mined genetically or in response to environmental cues + such as tempera\u00ad ture or social circumstance. Genetic sex determination + is typically ex\u00ad pressed in the developing zygote but can also be mediated + maternally, with some females producing only daughters and others only sons. + Zygotic sex determination has ~ many forms. In bees, ants, and wasps fertilized + eggs develop into females and unfertilized eggs into males. In the guppy, + and many other fish, in\u00ad vertebrates, and plants, gender is determined + by the presence or ab\u00ad sence of a sex determining gene (G, or a cluster + of tightly linked genes); Gg is male and gg female. The het\u00ad erozygous + (i.e., heterogametic) sex can be female or male, depending on the species. + Gender can also be de\u00ad termined by specialized sex chromo\u00ad somes + (X and Y). In mammals, fe\u00ad males are XX and males are XY; in birds, females + are XY (sometimes designated ZW) and males are XX (sometimes designated ZZ); + and in nematodes, females are XX and males are XO, in which \u00b0 denotes + the absence of a homologous chro\u00ad mosome. More than two sex chro\u00ad + mosomes are found in some species,", "venue": "", "year": 1996, "referenceCount": + 44, "citationCount": 336, "influentialCitationCount": 19, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1996-05-01", + "journal": {"name": "BioScience", "pages": "331-343", "volume": "46"}, "authors": + [{"authorId": "93561127", "name": "W. Rice"}]}, {"paperId": "75e56ef7924972fde2ffc32d7071cd182d0f0f21", + "externalIds": {"MAG": "1608549042", "DOI": "10.21236/ada292575", "CorpusId": + 15719583}, "corpusId": 15719583, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/75e56ef7924972fde2ffc32d7071cd182d0f0f21", + "title": "Selection of Relevant Features in Machine Learning", "abstract": + "In this paper, we review the problem of selecting rele- vant features for + use in machine learning. We describe this problem in terms of heuristic search + through a space of feature sets, and we identify four dimensions along which + approaches to the problem can vary. We consider recent work on feature selection + in terms of this framework, then close with some challenges for future work + in the area. 1. The Problem of Irrelevant Features accuracy) to grow slowly + with the number of irrele- vant attributes. Theoretical results for algorithms + that search restricted hypothesis spaces are encouraging. For instance, the + worst-case number of errors made by Littlestone''s (1987) WINNOW method grows + only logarithmically with the number of irrelevant features. Pazzani and Sarrett''s + (1992) average-case analysis for WHOLIST, a simple conjunctive algorithm, + and Lang- ley and Iba''s (1993) treatment of the naive Bayesian classifier, + suggest that their sample complexities grow at most linearly with the number + of irrelevant features. However, the theoretical results are less optimistic + for induction methods that search a larger space of concept descriptions. + For example, Langley and Iba''s (1993) average-case analysis of simple nearest + neighbor indicates that its sample complexity grows exponen- tially with the + number of irrelevant attributes, even for conjunctive target concepts. Experimental + stud- ies of nearest neighbor are consistent with this conclu- sion, and other + experiments suggest that similar results hold even for induction algorithms + that explicitly se- lect features. For example, the sample complexity for + decision-tree methods appears to grow linearly with the number of irrelevants + for conjunctive concepts, but exponentially for parity concepts, since the + evaluation metric cannot distinguish relevant from irrelevant fea- tures in + the latter situation (Langley & Sage, in press). Results of this sort have + encouraged machine learn- ing researchers to explore more sophisticated methods + for selecting relevant features. In the sections that fol- low, we present + a general framework for this task, and then consider some recent examples + of work on this important problem.", "venue": "", "year": 1994, "referenceCount": + 21, "citationCount": 784, "influentialCitationCount": 24, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1994-11-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1713919", "name": "P. Langley"}]}, {"paperId": "30210ef925d6a52a01a8752db791201658562511", + "externalIds": {"MAG": "2155447354", "DOI": "10.5194/ACP-10-10875-2010", "CorpusId": + 13365605}, "corpusId": 13365605, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/30210ef925d6a52a01a8752db791201658562511", + "title": "Observed 20th century desert dust variability: Impact on climate + and biogeochemistry", "abstract": "Desert dust perturbs climate by directly + and in- directly interacting with incoming solar and outgoing long wave radiation, + thereby changing precipitation and tempera- ture, in addition to modifying + ocean and land biogeochem- istry. While we know that desert dust is sensitive + to pertur- bations in climate and human land use, previous studies have been + unable to determine whether humans were increasing or decreasing desert dust + in the global average. Here we present observational estimates of desert dust + based on pa- leodata proxies showing a doubling of desert dust during the + 20th century over much, but not all the globe. Large uncertainties remain + in estimates of desert dust variability over 20th century due to limited data. + Using these ob- servational estimates of desert dust change in combination + with ocean, atmosphere and land models, we calculate the net radiative effect + of these observed changes (top of at- mosphere) over the 20th century to be + 0.14\u00b1 0.11 W/m 2 (1990-1999 vs. 1905-1914). The estimated radiative change", + "venue": "", "year": 2010, "referenceCount": 113, "citationCount": 356, "influentialCitationCount": + 14, "isOpenAccess": true, "openAccessPdf": {"url": "https://acp.copernicus.org/articles/10/10875/2010/acp-10-10875-2010.pdf", + "status": "GOLD"}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2010-11-19", "journal": {"name": "Atmospheric Chemistry + and Physics", "pages": "10875-10893", "volume": "10"}, "authors": [{"authorId": + "3769463", "name": "N. Mahowald"}, {"authorId": "102999925", "name": "S. Kloster"}, + {"authorId": "102956215", "name": "S. Engelstaedter"}, {"authorId": "17290766", + "name": "J. K. Moore"}, {"authorId": "3450187", "name": "S. Mukhopadhyay"}, + {"authorId": "47370816", "name": "J. McConnell"}, {"authorId": "46391343", + "name": "S. Albani"}, {"authorId": "4291899", "name": "S. Doney"}, {"authorId": + "89358373", "name": "A. Bhattacharya"}, {"authorId": "144527028", "name": + "M. Curran"}, {"authorId": "5817228", "name": "M. Flanner"}, {"authorId": + "145905898", "name": "F. Hoffman"}, {"authorId": "11121337", "name": "D. Lawrence"}, + {"authorId": "144466953", "name": "K. Lindsay"}, {"authorId": "6678544", "name": + "P. Mayewski"}, {"authorId": "40017275", "name": "J. Neff"}, {"authorId": + "40409205", "name": "D. Rothenberg"}, {"authorId": "48738871", "name": "E. + Thomas"}, {"authorId": "2277213", "name": "P. Thornton"}, {"authorId": "2846488", + "name": "C. Zender"}]}, {"paperId": "7c3d2725b02a6bba71e6e5409bf102c9937c7442", + "externalIds": {"MAG": "1494763707", "DOI": "10.1007/BF00117388", "CorpusId": + 34052091}, "corpusId": 34052091, "publicationVenue": {"id": "53820462-92ca-4942-bdaf-fc045b83825e", + "name": "Aquaculture International", "type": "journal", "alternate_names": + ["Aquac Int"], "issn": "0967-6120", "url": "https://link.springer.com/journal/10499"}, + "url": "https://www.semanticscholar.org/paper/7c3d2725b02a6bba71e6e5409bf102c9937c7442", + "title": "A marine bacterial strain effective in producing antagonisms of + other bacteria", "abstract": null, "venue": "Aquaculture International", "year": + 1996, "referenceCount": 7, "citationCount": 36, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1996-09-01", "journal": {"name": "Aquaculture International", "pages": "289-291", + "volume": "4"}, "authors": [{"authorId": "2053208985", "name": "C. Ruiz"}, + {"authorId": "144513692", "name": "G. Rom\u00e1n"}, {"authorId": "2158145395", + "name": "J. L. S\u00e1nchez"}]}, {"paperId": "22b65eebec33b89ec912054b4c4ec3d963960ab0", + "externalIds": {"MAG": "2018076297", "DOI": "10.1037/0033-295X.96.2.358", + "CorpusId": 18511760}, "corpusId": 18511760, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/22b65eebec33b89ec912054b4c4ec3d963960ab0", + "title": "Hopelessness depression: A theory-based subtype of depression.", + "abstract": "Summary and Future Directions On the basis of the aforementioned + studies, the hopelessnesstheory appears promising. However, further research + is needed.For example, although powerful tests of the attributional diath-esis-stress + component have been conducted, no one has exam-ined the cognitive diatheses + of inferring negative consequencesor characteristics about the self or whether + the cognitive stylediathesis-stress interaction predicts clinically significant + de-pression. Moreover, it is crucial to determine if this interactionpredicts + the development of the hypothesized symptoms ofhopelessness depression. More + generally, an important short-coming of the prior work is that it has not + focused on the symp-toms of hopelessness depression in particular and, instead, + sim-ply has examined the symptoms of depression in general. Fu-ture investigators + need to test more fine-grained predictionsabout the hypothesized symptoms + of hopelessness depression.The issue of the stability of the cognitive diatheses + has not beenresolved satisfactorily. We have only begun, in a preliminaryway, + to investigate the issues of specific vulnerability and media-tional processes. + Finally, further tests of the predictions aboutcourse, cure, and prevention + are needed. We eagerly await thisresearch.Difficult methodological issues + may arise in the search forhopelessness depression, however. For example, + the hopeless-ness theory is silent about the time lag between formation ofhopelessness + and onset of the symptoms of hopelessness depres-sion. If it is very short, + then a major challenge will be to developmethods with sufficient temporal + resolving power to determineif hopelessness indeed precedes the occurrence + of the hypothe-sized symptoms of hopelessness depression (see Alloy, Hartlage,et + al., 1988, for proposed methods for testing the hopelessnesstheory). The results + of work to test the hopelessness theory willdetermine if the concept of hopelessness + depression needs tobe revised. For example, perhaps the statement of the causalpathway + is correc t bu culminate n a differen se f symp-toms than those currently + hypothesized to compose hopeless-ness depression. In this case, the symptom\u2014but + not thecause\u2014component of the hopelessness theory would need to bemodified.In + discussing how to search for hopelessness depression, wenote the possibility + that future work may not corroborate theexistence of hopelessness depression + as a bona fide subtype withcharacteristic cause, symptoms, course, treatment, + and preven-tion. Instead, the etiological chain featured in the hopelessnesstheory + may be one of many pathways to a final common out-come of depression. In this + case, it would be more compellingto speak of a hopelessness cause, as opposed + to a hopelessnesssubtype, of depression.", "venue": "", "year": 1989, "referenceCount": + 134, "citationCount": 3415, "influentialCitationCount": 223, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-04-01", + "journal": {"name": "Psychological Review", "pages": "358-372", "volume": + "96"}, "authors": [{"authorId": "2294629", "name": "L. Abramson"}, {"authorId": + "5188561", "name": "G. Metalsky"}, {"authorId": "4414164", "name": "L. Alloy"}]}, + {"paperId": "0539a37608c877beebdb4f6b3ad40661b9357468", "externalIds": {"MAG": + "2053203354", "DOI": "10.1177/014662168000400209", "CorpusId": 121985910}, + "corpusId": 121985910, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0539a37608c877beebdb4f6b3ad40661b9357468", + "title": "A Comparison of the Nedelsky and Angoff Cutting Score Procedures + Using Generalizability Theory", "abstract": "Nedelsky (1954) and Angoff (1971) + have sug gested procedures for establishing a cutting score based on raters'' + judgments about the likely perfor mance of minimally competent examinees on + each item in a test. In this paper generalizability theory is used to characterize + and quantify expected vari ance in cutting scores resulting from each proce + dure. Experimental test data are used to illustrate this approach and to compare + the two procedures. Consideration is also given to the impact of rater disagreement + on some issues of measurement relia bility or dependability. Results suggest + that the dif ferences between the Nedel sky and Angoff proce dures may be + of greater consequence than their ap parent similarities. In particular, the + restricted na ture of the Nedelsky (inferred) probability scale may constitute + a basis for seriously questioning the ap plicability of this procedure in + certain contexts.", "venue": "", "year": 1980, "referenceCount": 20, "citationCount": + 118, "influentialCitationCount": 12, "isOpenAccess": true, "openAccessPdf": + {"url": "http://conservancy.umn.edu/bitstream/11299/100092/1/v04n2p219.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "153-162"}, "authors": [{"authorId": "1759304", - "name": "C. Teuscher"}, {"authorId": "144286260", "name": "E. Sanchez"}]}, - {"paperId": "7d4269654656fdcf508a5aac2109b6d6308d8424", "externalIds": {"DBLP": - "journals/iandc/CaiH89", "MAG": "2119986825", "DOI": "10.1109/SCT.1988.5279", - "CorpusId": 2553643}, "url": "https://www.semanticscholar.org/paper/7d4269654656fdcf508a5aac2109b6d6308d8424", - "title": "Enumerative counting is hard", "abstract": "An n-variable Boolean - formula can have anywhere from 0 to 2/sup n/ satisfying assignments. The question - of whether a polynomial-time machine, given such a formula, can reduce this - exponential number of possibilities to a small number of possibilities is - explored. Such a machine is called an enumerator, and it is proved that if - there is a good polynomial-time enumerator for Hash P (i.e. one where the - small set has at most O( mod f mod /sup 1-e/) numbers), then P=NP=P/sup Hash - P/ and probabilistic polynomial time equals polynomial time. Furthermore, - Hash P and enumerating Hash P are polynomial-time Turing equivalent.<>", - "venue": "[1988] Proceedings. Structure in Complexity Theory Third Annual - Conference", "year": 1988, "referenceCount": 26, "citationCount": 63, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "1988-06-14", "journal": {"name": "[1988] Proceedings. Structure in Complexity - Theory Third Annual Conference", "pages": "194-203"}, "authors": [{"authorId": - "1678402", "name": "Jin-Yi Cai"}, {"authorId": "1704511", "name": "L. A. Hemaspaandra"}]}, - {"paperId": "ae77dd776a7166331cba17f6c4ec9763ff68ba32", "externalIds": {"MAG": - "2334508319", "DOI": "10.4153/CJM-1972-113-9", "CorpusId": 124022112}, "url": - "https://www.semanticscholar.org/paper/ae77dd776a7166331cba17f6c4ec9763ff68ba32", - "title": "Degrees in Which the Recursive Sets are Uniformly Recursive", "abstract": - "One of the most fundamental and characteristic features of recursion theory - is the fact that the recursive sets are not uniformly recursive. In this paper - we consider the degrees a such that the recursive sets are uniformly of degree - \u2266a and characterize them by the condition a\u2019 \u2266 0\". A number - of related results will be proved, and one of these will be combined with - a theorem of Yates to show that there is no r.e. degree a < 0\u2019 such that - the r.e. sets of degree \u2266a are uniformly of degree \u2266a. This result - and a generalization will be used to study the relationship between Turing - and many-one reducibility on the r.e. sets.", "venue": "Canadian Journal of - Mathematics - Journal Canadien de Mathematiques", "year": 1972, "referenceCount": - 8, "citationCount": 67, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1972-12-01", "journal": {"name": "Canadian Journal - of Mathematics", "pages": "1092 - 1099", "volume": "24"}, "authors": [{"authorId": - "1888089", "name": "C. Jockusch"}]}, {"paperId": "5af10ef20f96afa4009170471e42ef5c4eb3bd94", - "externalIds": {"MAG": "1572584819", "DBLP": "journals/aim/TogeliusSKY13", - "DOI": "10.1609/AIMAG.V34I3.2492", "CorpusId": 16618883}, "url": "https://www.semanticscholar.org/paper/5af10ef20f96afa4009170471e42ef5c4eb3bd94", - "title": "The Mario AI Championship 2009-2012", "abstract": "We give a brief - overview of the Mario AI Championship, a series of competitions based on an - open source clone of the seminal platform game Super Mario Bros. The competition - has four tracks. The gameplay and learning tracks resemble traditional reinforcement - learning competitions, the Level generation track focuses on the generation - of entertaining game levels, and the Turing Test track focuses on humanlike - game-playing behavior. We also outline some lessons learned from the competition - and its future. The article is written by the four organizers of the competition.", - "venue": "The AI Magazine", "year": 2013, "referenceCount": 24, "citationCount": - 67, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Education", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Review"], "publicationDate": "2013-09-15", "journal": - {"name": "AI Mag.", "pages": "89-92", "volume": "34"}, "authors": [{"authorId": - "1810053", "name": "J. Togelius"}, {"authorId": "2632121", "name": "Noor Shaker"}, - {"authorId": "2463017", "name": "S. Karakovskiy"}, {"authorId": "1686193", - "name": "Georgios N. Yannakakis"}]}, {"paperId": "e70abaf2c30bff57196a3b5f743fbbb87e09b2e2", - "externalIds": {"MAG": "2906721197", "DOI": "10.1016/S0049-237X(09)70568-3", - "CorpusId": 127120919}, "url": "https://www.semanticscholar.org/paper/e70abaf2c30bff57196a3b5f743fbbb87e09b2e2", - "title": "Turing-Machine Computable Functionals of Finite Types I", "abstract": - null, "venue": "", "year": 1966, "referenceCount": 3, "citationCount": 31, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Studies - in logic and the foundations of mathematics", "volume": "44"}, "authors": - [{"authorId": "1723068", "name": "S. Kleene"}]}, {"paperId": "6079c0581da09e4fe2c123574bae47b21756493d", - "externalIds": {"MAG": "2487361095", "CorpusId": 54813155}, "url": "https://www.semanticscholar.org/paper/6079c0581da09e4fe2c123574bae47b21756493d", - "title": "Degumming of silk with lipase and protease", "abstract": "A lipase - enzyme in combinati on with a protease enzyme has been used for dewaxing and - degumming of silk and the combined effect of dewaxing and degumming on weight - loss, wettability , dye uptake, yellowing, microscopic struc ture, handle - and lustre has been studied. It is observed that the combined enzyme treated - samples show the same weight lo ss, cleaner longitudinal su rface and better - wettability when compared with the Marseill es'' soap treated samples .", - "venue": "", "year": 2000, "referenceCount": 1, "citationCount": 44, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2000-03-01", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "48288144", "name": "M. Gulrajani"}, {"authorId": "144162968", - "name": "R. Agarwal"}, {"authorId": "84091046", "name": "A. Grover"}, {"authorId": - "46491061", "name": "M. Suri"}]}, {"paperId": "217b50f834ada6bafe8583bc7d21c9129c59cffd", + "1980-04-01", "journal": {"name": "Applied Psychological Measurement", "pages": + "219 - 240", "volume": "4"}, "authors": [{"authorId": "50175301", "name": + "R. Brennan"}, {"authorId": "36717572", "name": "Robert E. Lockwood"}]}, {"paperId": + "44a9febbb02db79363d579823a8dfbc402e5e4e5", "externalIds": {"MAG": "1596999019", + "DBLP": "journals/mima/Stannett03", "DOI": "10.1023/A:1021341202779", "CorpusId": + 12837251}, "corpusId": 12837251, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/44a9febbb02db79363d579823a8dfbc402e5e4e5", + "title": "Computation and Hypercomputation", "abstract": null, "venue": "Minds + and Machines", "year": 2003, "referenceCount": 75, "citationCount": 31, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-02-01", "journal": + {"name": "Minds and Machines", "pages": "115-153", "volume": "13"}, "authors": + [{"authorId": "2459698", "name": "M. Stannett"}]}, {"paperId": "217b50f834ada6bafe8583bc7d21c9129c59cffd", "externalIds": {"MAG": "2002616782", "DOI": "10.3354/CR022271", "CorpusId": - 55978302}, "url": "https://www.semanticscholar.org/paper/217b50f834ada6bafe8583bc7d21c9129c59cffd", + 55978302}, "corpusId": 55978302, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/217b50f834ada6bafe8583bc7d21c9129c59cffd", "title": "Simulating the impacts of climate change on cotton production in the Mississippi Delta", "abstract": "General circulation models (GCMs) project increases of the earth''s surface air tempera- tures and other climate changes @@ -40696,49 +45722,110 @@ interactions: in the US mid-South. Cultural practices such as earlier planting may be used to avoid the flowering of cotton in the high temperatures that occur during mid to late summer.", "venue": "", "year": 2002, "referenceCount": 53, "citationCount": - 86, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2002-11-04", "journal": {"name": - "Climate Research", "pages": "271-281", "volume": "22"}, "authors": [{"authorId": - "145411573", "name": "K. R. Reddy"}, {"authorId": "2130113283", "name": "PR - Doma"}, {"authorId": "3444734", "name": "L. Mearns"}, {"authorId": "2130107598", - "name": "Myl Boone"}, {"authorId": "40185204", "name": "H. Hodges"}, {"authorId": - "2147009240", "name": "AG Richardson"}, {"authorId": "33155167", "name": "V. - Kakani"}]}, {"paperId": "8a360c40fdf1fc374450ded64b1629d6983a8aae", "externalIds": - {"DBLP": "journals/paapp/Bull09", "MAG": "2080110956", "DOI": "10.1080/17445760802660387", - "CorpusId": 13475229}, "url": "https://www.semanticscholar.org/paper/8a360c40fdf1fc374450ded64b1629d6983a8aae", - "title": "On dynamical genetic programming: simple Boolean networks in learning - classifier systems", "abstract": "Many representations have been presented - to enable the effective evolution of computer programs. Turing was perhaps - the first to present a general scheme by which to achieve this end. Significantly, - Turing proposed a form of discrete dynamical system and yet dynamical representations - remain almost unexplored within conventional genetic programming (GP). This - paper presents results from an initial investigation into using simple dynamical - GP representations within a learning classifier system. It is shown possible - to evolve ensembles of dynamical Boolean function networks to solve versions - of the well-known multiplexer problem. Both synchronous and asynchronous systems - are considered.", "venue": "Int. J. Parallel Emergent Distributed Syst.", - "year": 2009, "referenceCount": 104, "citationCount": 23, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-09-18", "journal": {"name": "International Journal - of Parallel, Emergent and Distributed Systems", "pages": "421 - 442", "volume": - "24"}, "authors": [{"authorId": "144925000", "name": "L. Bull"}]}, {"paperId": - "936aa54dd2969d128151ead7d2de9b712ee8fb0b", "externalIds": {"MAG": "2474564653", - "DBLP": "conf/ae/Tanomaru97", "DOI": "10.1007/BFb0026599", "CorpusId": 37851486}, - "url": "https://www.semanticscholar.org/paper/936aa54dd2969d128151ead7d2de9b712ee8fb0b", - "title": "Evolving Turing Machines from Examples", "abstract": null, "venue": - "Artificial Evolution", "year": 1997, "referenceCount": 8, "citationCount": - 13, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1997-10-01", "journal": - {"pages": "167-182"}, "authors": [{"authorId": "2119656", "name": "J. Tanomaru"}]}, - {"paperId": "98d0b3317c8b739b54bd610b25d3d6622bbd8180", "externalIds": {"DBLP": - "journals/jsyml/Cooper84", "MAG": "2113444807", "DOI": "10.2307/2274181", - "CorpusId": 43887484}, "url": "https://www.semanticscholar.org/paper/98d0b3317c8b739b54bd610b25d3d6622bbd8180", + 86, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.int-res.com/articles/cr2002/22/c022p271.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": + "Geography", "source": "external"}, {"category": "Agricultural And Food Sciences", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-11-04", + "journal": {"name": "Climate Research", "pages": "271-281", "volume": "22"}, + "authors": [{"authorId": "145411573", "name": "K. R. Reddy"}, {"authorId": + "2130113283", "name": "PR Doma"}, {"authorId": "3444734", "name": "L. Mearns"}, + {"authorId": "2130107598", "name": "Myl Boone"}, {"authorId": "40185204", + "name": "H. Hodges"}, {"authorId": "2147009240", "name": "AG Richardson"}, + {"authorId": "33155167", "name": "V. Kakani"}]}, {"paperId": "0d20ee11d7e425ffb3e0fc3791b8b1011490e2ae", + "externalIds": {"MAG": "2201428280", "CorpusId": 155673329}, "corpusId": 155673329, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0d20ee11d7e425ffb3e0fc3791b8b1011490e2ae", + "title": "Modelling the dynamics of the term structure of interest rates", + "abstract": "In order to provide tractable bond pricing formulae, the arbitrage + theories of the term struc\u00ad ture make specific assumptions as to the + number, identity and process generating the underlying forcing variables. + This paper assesses the empirical plausibility of these common assumptions. + It is found that there are three underlying factors, one more than is usually + permitted. However, by careful examination of the dynamics of suitable instrumental + variables to these factors, it is found that the further factor may be represented + by the autoregressive conditional volatility of one of these factors. Thus, + it can be readily integrated into existing two factor models.", "venue": "", + "year": 1990, "referenceCount": 29, "citationCount": 65, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], + "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Economic and Social Review", "volume": ""}, "authors": + [{"authorId": "119075011", "name": "J. Steeley"}]}, {"paperId": "131e17a9bee1527bf69cb5bba55d2308243902d8", + "externalIds": {"MAG": "2053258711", "DBLP": "conf/focs/Herman68", "DOI": + "10.1109/SWAT.1968.36", "CorpusId": 21139840}, "corpusId": 21139840, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/131e17a9bee1527bf69cb5bba55d2308243902d8", + "title": "The Uniform Halting Problem for Generalized One State Turing Machines", + "abstract": "The uniform halting problem (UH) can be stated as follows: Give + a decision procedure which for any given Turing machine (TM) will decide whether + or not it has an immortal instantaneous description (ID). An ID is called + immortal if it has no terminal successor. As it is generally the case in the + literature (see e.g. Minsky p. 118) we assume that in an ID the tape must + be blank except for some finite number of squares. If we remove this restriction + the UH becomes the immortality problem (IP). The unsolvability of the IP was + shown by Hooper. It can be seen from Part V (p. 225) of his paper that his + method also shows the unsolvability of the UH. The initialised UH, whether + or not a TM has an immortal ID when started in a specified state, is also + known to be undecidable. (See e.g. Minsky p. 151). For one state TM''s the + two problems are of course equivalent. Hooper (Part VI, 5) found that the + IP is solvable for two state TM''s. However, one can show (Herman) that the + UH (just like the halting problem) is unsolvable for two state TM''s. The + halting problem is known to be solvable for one state TM''s, even if we allow + them to have a many dimensional tape (see Herman). Can the same be said about + the UH? In this paper we show the solvability of the UH for one state TM''s. + These are not entirely trivial structures, they can do, as we show, certain + things that finite automata cannot do. We consider in what ways we can generalise + one state TM''s so that we retain the solvability of the UH. We find that + the UH for one state TM''s with two dimensional tape and jumping reading head + (i.e. the reading head can move to squares not immediately neighbouring the + previously scanned square) is also solvable. Our method does not generalize + for three or more dimensional tape, unless we put in some conditions on the + directions in which the reading head can move. On the other hand, we find + that one state TM''s with two or more tapes or with two or more reading heads + on the same tape have an unsolvable UH. Finally we consider how a different + choice of formalism would influence our results.", "venue": "SWAT", "year": + 1968, "referenceCount": 8, "citationCount": 25, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "1968-10-15", "journal": + {"pages": "368-372"}, "authors": [{"authorId": "1795508", "name": "G. Herman"}]}, + {"paperId": "fb0ee28e51d9aca48544c68fe75929465cd52460", "externalIds": {"MAG": + "2103407858", "DBLP": "journals/ijhpca/NickolayevRR97", "DOI": "10.1177/109434209701100207", + "CorpusId": 8513822}, "corpusId": 8513822, "publicationVenue": {"id": "8ce575db-79d9-4601-83df-e1e96f6b4e3b", + "name": "The international journal of high performance computing applications", + "type": "journal", "alternate_names": ["int j high perform comput appl", "International + Journal of High Performance Computing Applications", "Int J High Perform Comput + Appl"], "issn": "1094-3420", "url": "http://www.sagepub.com/journals/Journal201339/title", + "alternate_urls": ["https://journals.sagepub.com/home/hpc"]}, "url": "https://www.semanticscholar.org/paper/fb0ee28e51d9aca48544c68fe75929465cd52460", + "title": "Real-Time Statistical Clustering for Event Trace Reduction", "abstract": + "Event tracing provides the detailed data needed to under stand the dynamics + of interactions among application resource demands and system responses. However, + cap turing the large volume of dynamic performance data inherent in detailed + tracing can perturb program execution and stress secondary storage systems. + Moreover, it can overwhelm a user or performance analyst with potentially + irrelevant data. Using the Pablo performance environ ment''s support for real-time + data analysis, we show that dynamic statistical data clustering can dramatically + reduce the volume of captured performance data by identifying and recording + event traces only from representative proc essors. In turn, this makes possible + low overhead, interac tive visualization, and performance tuning.", "venue": + "The international journal of high performance computing applications", "year": + 1997, "referenceCount": 24, "citationCount": 63, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1997-06-01", "journal": + {"name": "International Journal of High Performance Computing Applications", + "pages": "144 - 159", "volume": "11"}, "authors": [{"authorId": "2097193", + "name": "O. Nickolayev"}, {"authorId": "3128725", "name": "P. Roth"}, {"authorId": + "144413177", "name": "D. Reed"}]}, {"paperId": "98d0b3317c8b739b54bd610b25d3d6622bbd8180", + "externalIds": {"DBLP": "journals/jsyml/Cooper84", "MAG": "2113444807", "DOI": + "10.2307/2274181", "CorpusId": 43887484}, "corpusId": 43887484, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/98d0b3317c8b739b54bd610b25d3d6622bbd8180", "title": "Partial degrees and the density problem. Part 2: The enumeration degrees of the \u03a32 sets are dense", "abstract": "As in Rogers [3], we treat the partial degrees as notational variants of the enumeration degrees @@ -40762,240 +45849,467 @@ interactions: for which, for each \u0445, \u0445 \u2208 B \u21d4 (\u2203s*)(\u2200s \u2265 s*)(\u0445 \u2208 Bs) and \u0445 \u2208 C \u21d4 (\u2203s*)(\u2200s \u2265 s*)(\u0445 \u2208 Cs).", "venue": "Journal of Symbolic Logic (JSL)", "year": - 1984, "referenceCount": 7, "citationCount": 83, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1984-06-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "503 - - 513", "volume": "49"}, "authors": [{"authorId": "98630872", "name": "S. - Cooper"}]}, {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": - {"MAG": "2982569830", "CorpusId": 209946616}, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", + 1984, "referenceCount": 7, "citationCount": 84, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1984-06-01", "journal": {"name": "Journal + of Symbolic Logic", "pages": "503 - 513", "volume": "49"}, "authors": [{"authorId": + "98630872", "name": "S. Cooper"}]}, {"paperId": "032e64c74c28e3a8b6f5e4e1b61a7ddd51035802", + "externalIds": {"MAG": "2158285111", "PubMedCentral": "3363030", "DOI": "10.1098/rsfs.2011.0118", + "CorpusId": 9215024, "PubMed": "22649583"}, "corpusId": 9215024, "publicationVenue": + {"id": "692a1437-389a-429a-b9b0-7a8182722f06", "name": "Interface Focus", + "type": "journal", "issn": "2042-8898", "url": "http://rsfs.royalsocietypublishing.org/"}, + "url": "https://www.semanticscholar.org/paper/032e64c74c28e3a8b6f5e4e1b61a7ddd51035802", + "title": "A mechanical Turing machine: blueprint for a biomolecular computer", + "abstract": "We describe a working mechanical device that embodies the theoretical + computing machine of Alan Turing, and as such is a universal programmable + computer. The device operates on three-dimensional building blocks by applying + mechanical analogues of polymer elongation, cleavage and ligation, movement + along a polymer, and control by molecular recognition unleashing allosteric + conformational changes. Logically, the device is not more complicated than + biomolecular machines of the living cell, and all its operations are part + of the standard repertoire of these machines; hence, a biomolecular embodiment + of the device is not infeasible. If implemented, such a biomolecular device + may operate in vivo, interacting with its biochemical environment in a program-controlled + manner. In particular, it may \u2018compute\u2019 synthetic biopolymers and + release them into its environment in response to input from the environment, + a capability that may have broad pharmaceutical and biological applications.", + "venue": "Interface Focus", "year": 2012, "referenceCount": 40, "citationCount": + 26, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsfs.2011.0118", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-21", "journal": + {"name": "Interface Focus", "pages": "497 - 503", "volume": "2"}, "authors": + [{"authorId": "143752440", "name": "E. Shapiro"}]}, {"paperId": "6d6ae55586ccf49088bb8d74a01ee427d4d83523", + "externalIds": {"MAG": "2090154710", "DBLP": "journals/jacm/Homer87", "DOI": + "10.1145/23005.23009", "CorpusId": 14552311}, "corpusId": 14552311, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6d6ae55586ccf49088bb8d74a01ee427d4d83523", + "title": "Minimal degrees for polynomial reducibilities", "abstract": "The + existence of minimal degrees is investigated for several polynomial reducibilities. + It is shown that no set has minimal degree with respect to polynomial many-one + or Turing reducibility. This extends a result of Ladner in which only recursive + sets are considered. A polynomial reducibility \u2264hT + is defined. This reducibility is a strengthening of polynomial Turing reducibility, + and its properties relate to the P = ? NP question. For this new reducibility, + a set of minimal degree is constructed under the assumption that P = NP. However, + the set constructed is nonrecursive, and it is shown that no recursive set + is of minimal \u2264 hT + degree.", "venue": "JACM", "year": 1987, "referenceCount": 16, "citationCount": + 22, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/23005.23009", "status": "BRONZE"}, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1987-04-01", "journal": + {"name": "J. ACM", "pages": "480-491", "volume": "34"}, "authors": [{"authorId": + "143659735", "name": "S. Homer"}]}, {"paperId": "074398b0325e3c92f38a0ae0812b648c37f394a0", + "externalIds": {"MAG": "2604267363", "CorpusId": 113701675}, "corpusId": 113701675, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/074398b0325e3c92f38a0ae0812b648c37f394a0", + "title": "ASHRAE Standard 160P-Criteria for Moisture Control Design Analysis + in Buildings", "abstract": "In 1996, ASHRAE formed a new Standard Project + Committee, ASHRAE 160P, to develop a standardfor moisture control in buildings. + The draft standard __ \"Criteria for Mois\u00ad ture Control Design Analysis + in Buildings\" __ intends to provide performance-based procedures for moisture + design analysis for buildings. The standard sets criteriafor moisture design + loads, moisture analysis methods, and building perfor\u00ad mance and applies + to the above-grade portions of all types of buildings. It can be used for + design analysis of the above-grade portion of the building envelope or help + guide specifications for HVAC equipment and controls. Eventually it should + form the basis for moisture design rules based on a uniform set of design + assumptions and loads. This paper describes the ratio\u00ad nale behind this + standard, its current outline, and its potential uses.", "venue": "", "year": + 2008, "referenceCount": 9, "citationCount": 114, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "167-171", "volume": "114"}, "authors": + [{"authorId": "2060395104", "name": "Tenwolde Anton"}]}, {"paperId": "bd8791c5bd634675b46c86a1db9e388a8515861a", + "externalIds": {"MAG": "937837128", "DOI": "10.1007/978-3-642-85538-2_6", + "CorpusId": 60388947}, "corpusId": 60388947, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bd8791c5bd634675b46c86a1db9e388a8515861a", + "title": "Current Research and Future Prospects", "abstract": null, "venue": + "", "year": 1982, "referenceCount": 0, "citationCount": 61, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["History"], + "s2FieldsOfStudy": [{"category": "History", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "130-137", "volume": ""}, "authors": + [{"authorId": "145245580", "name": "D. Levy"}, {"authorId": "11151580", "name": + "M. Newborn"}]}, {"paperId": "a92d40b37ceafe5d84f26b7fba6647232576566f", "externalIds": + {"MAG": "2120390967", "ArXiv": "1111.1064", "DOI": "10.1112/plms/pdt065", + "CorpusId": 51793783}, "corpusId": 51793783, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/a92d40b37ceafe5d84f26b7fba6647232576566f", + "title": "The typical Turing degree", "abstract": "The Turing degree of a + real measures the computational difficulty of producing its binary expansion. + Since Turing degrees are tailsets, it follows from Kolmogorov''s 0\u20101 + law that, for any property which may or may not be satisfied by any given + Turing degree, the satisfying class will either be of Lebesgue measure 0 or + 1, so long as it is measurable. So either the typical degree satisfies the + property, or else the typical degree satisfies its negation. Further, there + is then some level of randomness sufficient to ensure typicality in this regard. + We describe and prove a large number of results in a new programme of research + which aims to establish the (order theoretically) definable properties of + the typical Turing degree, and the level of randomness required in order to + guarantee typicality.", "venue": "", "year": 2011, "referenceCount": 57, "citationCount": + 11, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2011-11-04", "journal": {"name": + "Proceedings of the London Mathematical Society", "volume": "109"}, "authors": + [{"authorId": "1678539", "name": "George Barmpalias"}, {"authorId": "35198171", + "name": "Adam R. Day"}, {"authorId": "1387957937", "name": "Andrew Lewis-Pye"}]}, + {"paperId": "479009661d0b008c33627aa423afbd36f70a7549", "externalIds": {"MAG": + "2982569830", "CorpusId": 209946616}, "corpusId": 209946616, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/479009661d0b008c33627aa423afbd36f70a7549", "title": "Turing (1936), On Computable Numbers, with an Application to the Entscheidungsproblem", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 62, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}], "publicationTypes": null, "publicationDate": "2016-02-24", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "3045814", - "name": "Rossella Lupacchini"}]}, {"paperId": "cbe5e8eb0f2bb0b372ec7bec43fb16928b4d88af", - "externalIds": {"MAG": "2044592439", "DOI": "10.1007/BF02861799", "CorpusId": - 32376858}, "url": "https://www.semanticscholar.org/paper/cbe5e8eb0f2bb0b372ec7bec43fb16928b4d88af", - "title": "Lichens their biological and economic significance", "abstract": - null, "venue": "The Botanical review", "year": 2008, "referenceCount": 62, - "citationCount": 28, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": - "The Botanical Review", "pages": "1-65", "volume": "10"}, "authors": [{"authorId": - "1438210991", "name": "George Albert Perez-Llano"}]}, {"paperId": "7e728c2375c991610aec24caf9901f8b2ab72974", - "externalIds": {"MAG": "1972376146", "DBLP": "conf/cf/YokoyamaAG08", "DOI": - "10.1145/1366230.1366239", "CorpusId": 14228334}, "url": "https://www.semanticscholar.org/paper/7e728c2375c991610aec24caf9901f8b2ab72974", - "title": "Principles of a reversible programming language", "abstract": "The - principles of reversible programming languages are explicated and illustrated - with reference to the design of a high-level imperative language, Janus. The - fundamental properties for such languages include backward as well as forward - determinism and reversible updates of data. The unique design features of - the language include explicit post-condition assertions, direct access to - an inverse semantics and the possibility of clean ({\\ie}, garbage-free) computation - of injective functions. We suggest the clean simulation of reversible Turing - machines as a criterion for computing strength of reversible languages, and - demonstrate this for Janus. We show the practicality of the language by implementation - of a reversible fast Fourier transform. Our results indicate that the reversible - programming paradigm has fundamental properties that are relevant to many - different areas of computer science.", "venue": "ACM International Conference - on Computing Frontiers", "year": 2008, "referenceCount": 39, "citationCount": - 118, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-05-05", "journal": - {"pages": "43-54"}, "authors": [{"authorId": "8151130", "name": "T. Yokoyama"}, - {"authorId": "1751103", "name": "Holger Bock Axelsen"}, {"authorId": "1700006", - "name": "R. Gl\u00fcck"}]}, {"paperId": "2bfa8ada756d3cc4dc9c278275c9f802177fa419", - "externalIds": {"ArXiv": "1310.4860", "MAG": "2545591031", "DOI": "10.1103/PhysRevLett.112.050504", - "CorpusId": 10489988, "PubMed": "24580579"}, "url": "https://www.semanticscholar.org/paper/2bfa8ada756d3cc4dc9c278275c9f802177fa419", - "title": "Scalable implementation of boson sampling with trapped ions.", "abstract": - "Boson sampling solves a classically intractable problem by sampling from - a probability distribution given by matrix permanents. We propose a scalable - implementation of boson sampling using local transverse phonon modes of trapped - ions to encode the bosons. The proposed scheme allows deterministic preparation - and high-efficiency readout of the bosons in the Fock states and universal - mode mixing. With the state-of-the-art trapped ion technology, it is feasible - to realize boson sampling with tens of bosons by this scheme, which would - outperform the most powerful classical computers and constitute an effective - disproof of the famous extended Church-Turing thesis.", "venue": "Physical - Review Letters", "year": 2013, "referenceCount": 0, "citationCount": 63, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, + "publicationDate": "2016-02-24", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3045814", "name": "Rossella Lupacchini"}]}, {"paperId": "533ba306dbd8e4f483372d177d898ef4963c9a02", + "externalIds": {"DBLP": "journals/siamcomp/Pratt75", "MAG": "2045664183", + "DOI": "10.1137/0204018", "CorpusId": 31220164}, "corpusId": 31220164, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/533ba306dbd8e4f483372d177d898ef4963c9a02", + "title": "Every Prime has a Succinct Certificate", "abstract": "To prove that + a number n is composite, it suffices to exhibit the working for the multiplication + of a pair of factors. This working, represented as af string, is of length + bounded by a polynomial in $\\log _2 n$. We show that the same property holds + for the primes. It is noteworthy that almost no other set is known to have + the property that short proofs for membership or nonmembership exist for all + candidates without being known to have the property that such proofs are easy + to come by. It remains an open problem whether a prime n can be recognized + in only $\\log _2^\\alpha n$ operations of a Turing machine for any fixed + $\\alpha $.The proof system used for certifying primes is as follows.Axiom. + $(x,y,1)$.Inference Rules. \\[ R_1 :\\quad(p,x,a),q \\vdash (p,x,qa)\\quad\\text{provided + }x^{(p - 1)/q} \\not\\equiv 1(\\bmod p)\\text{ and }q | (p - 1). \\]\\[ R_2 + :\\quad(p,x,p - 1) \\vdash p\\quad\\text{provided } x^{p - 1} \\equiv 1(\\bmod + p). \\]Theorem 1. pis a theorem$\\equiv p$is a prime.Theorem 2. pis a theorem$\\supset + p$has a...", "venue": "SIAM journal on computing (Print)", "year": 1975, "referenceCount": + 6, "citationCount": 321, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1975-09-01", "journal": + {"name": "SIAM J. Comput.", "pages": "214-220", "volume": "4"}, "authors": + [{"authorId": "1691192", "name": "V. Pratt"}]}, {"paperId": "48bb5f889642fed09a2813480aa2ffa23f5f6daa", + "externalIds": {"MAG": "2153177148", "CorpusId": 86162352}, "corpusId": 86162352, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48bb5f889642fed09a2813480aa2ffa23f5f6daa", + "title": "Texture and microstructure of soybean curd (tofu) as affected by + different coagulants", "abstract": "The coagulating properties of five coagulams + and the nature of the curd obtained from soymilk was investigated . Viscosity + changes during coagu lation were studied using a Namctrc Vibr..lting Sphere + Viscometer and texture measurements were made by compress ion and computer + ass isted analysis. pH and amount of solids in the whey were determined. The + microstructure of the tofu was examined by scanning electron microscopy. It + was observed that CaCI2.2H20 and MgCI2.6H20 coagulaled the milk instantly + while CaS04 .1/2H20. glucono delta l a~tonc (GOL) and MgS04 .7H20 acted comparatively + slowl y. The t ex~ ture of the curd was greatl y influenced by type and concerHration + of coagulant. Curd obtained with CaCI2.2H20 and MgCI2.6H20 was coarse, granular + and hard , whereas CaS04. I/2H20 and GDL (fresh solution) gave a very smooth + . soft and uniform curd . Among the fi ve coagulants stud ied, 0.75 % CaSO_. + and 0.4 % GD L (fresh solution) appeared to be most suitable for making tofu + of high bulk weight and smooth tex tu re. Initial paper received October 24 + 1985 Manuscript received May 9 1986 Direct inquir ies to J . M. deMan Te lep + hone number: 519 824 4120 x2515 Key \\Vords : Soybean curd . tofu , textu + re, viscos ity, mic rostruc~ ture. coagulation. scanning elect ron microscopy. + calcium sa lts. magnesium sa lt~. glucono~O~I actonc.", "venue": "", "year": + 1986, "referenceCount": 11, "citationCount": 55, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Food Structure", "pages": + "11", "volume": "5"}, "authors": [{"authorId": "144291576", "name": "J. Man"}, + {"authorId": "49655182", "name": "L. Man"}, {"authorId": "47924997", "name": + "S. Gupta"}]}, {"paperId": "59841d83d718f32bddb3ce56bf8c0f870c955fdd", "externalIds": + {"MAG": "2046937527", "DOI": "10.1103/PHYSREVLETT.96.048304", "CorpusId": + 24817020, "PubMed": "16486904"}, "corpusId": 24817020, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/59841d83d718f32bddb3ce56bf8c0f870c955fdd", + "title": "Effect of axial growth on Turing pattern formation.", "abstract": + "We have performed one-dimensional and two-dimensional experiments and simulations + to study the formation of patterns in a system that grows continuously in + one direction. Depending on the growth velocity, three basic spatial configurations + can be obtained: stripes that are parallel, oblique, or perpendicular to the + growth direction. The dependence of the wavelength on the growth velocity + has also been observed. Our results illustrate the importance of these growth + mechanisms in determining the final configuration of chemical and biological + pattern-forming processes.", "venue": "Physical Review Letters", "year": 2006, + "referenceCount": 32, "citationCount": 28, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-02-03", "journal": {"name": "Physical review letters", "pages": "\n 048304\n ", + "volume": "96 4"}, "authors": [{"authorId": "2701200", "name": "D. G. M\u00edguez"}, + {"authorId": "4978913", "name": "M. Dolnik"}, {"authorId": "2614851", "name": + "A. P. Mu\u00f1uzuri"}, {"authorId": "78546816", "name": "L. Kramer"}]}, {"paperId": + "7ff69b77912ffb1c05072a8bd89502c9b1f30739", "externalIds": {"MAG": "2081655475", + "DOI": "10.14219/JADA.ARCHIVE.1951.0055", "CorpusId": 1689015, "PubMed": "14803190"}, + "corpusId": 1689015, "publicationVenue": {"id": "137df871-0be4-4ea4-9f85-52b2b36070a3", + "name": "The Journal of the American Dental Association (1939)", "type": "journal", + "alternate_names": ["Journal of the American Dental Association", "J Am Dent + Assoc (1939", "J Am Dent Assoc"], "issn": "0002-8177", "url": "http://www.sciencedirect.com/science/journal/00028177", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00028177/146", + "http://jada.ada.org/", "https://jada.ada.org/"]}, "url": "https://www.semanticscholar.org/paper/7ff69b77912ffb1c05072a8bd89502c9b1f30739", + "title": "Direct resinous filling materials: temperature rise during polymerization.", + "abstract": "The investigation of the direct resinous filling materials used + primarily in place of silicate cement is one of the major projects in the + cooperative research program on dental materials at the National Bureau of + Standards. This report on the tempera\u00ad ture rise of direct resinous filling + materials during polymerization contains the trade brand names of the materials + investigated. Likewise, the manufacturer\u2019s batch number is listed when + present. The data are applicable only to those specific batches mentioned.", + "venue": "The Journal of the American Dental Association (1939)", "year": + 1951, "referenceCount": 1, "citationCount": 44, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1951-03-01", "journal": {"name": "Journal of the American + Dental Association", "pages": "\n 253-63\n ", "volume": "42 + 3"}, "authors": [{"authorId": "80371514", "name": "R. B. Wolcott"}, {"authorId": + "11811191", "name": "G. Paffenbarger"}, {"authorId": "17006364", "name": "I. + Schoonover"}]}, {"paperId": "4ee824d6bbf8e57df382ac1b518c32fb155dc890", "externalIds": + {"MAG": "2460912046", "DBLP": "conf/icfca/KuznetsovO06", "DOI": "10.1007/11671404_21", + "CorpusId": 117171207}, "corpusId": 117171207, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4ee824d6bbf8e57df382ac1b518c32fb155dc890", + "title": "Counting Pseudo-intents and #P-completeness", "abstract": null, + "venue": "ICFCA", "year": 2006, "referenceCount": 6, "citationCount": 35, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2013-10-17", "journal": - {"name": "Physical review letters", "pages": "\n 050504\n ", - "volume": "112 5"}, "authors": [{"authorId": "2148909951", "name": "C. Shen"}, - {"authorId": "10414084", "name": "Z. Zhang"}, {"authorId": "144794202", "name": - "L. Duan"}]}, {"paperId": "74d59d2bb799b531017c92027ecfef6a141b4421", "externalIds": - {"MAG": "1659239360", "DBLP": "journals/corr/abs-0907-4100", "ArXiv": "0907.4100", - "CorpusId": 18352786}, "url": "https://www.semanticscholar.org/paper/74d59d2bb799b531017c92027ecfef6a141b4421", - "title": "Beyond Turing Machines", "abstract": "This paper discusses \"computational\" - systems capable of \"computing\" functions not computable by predefined Turing - machines if the systems are not isolated from their environment. Roughly speaking, - these systems can change their finite descriptions by interacting with their - environment.", "venue": "ArXiv", "year": 2009, "referenceCount": 13, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-07-23", "journal": - {"name": "ArXiv", "volume": "abs/0907.4100"}, "authors": [{"authorId": "2640693", - "name": "K. Ammon"}]}, {"paperId": "d8698d8b512451e2ff57fe1ba683276a82a39147", - "externalIds": {"MAG": "2014691151", "DOI": "10.2307/4089332", "CorpusId": - 84542003}, "url": "https://www.semanticscholar.org/paper/d8698d8b512451e2ff57fe1ba683276a82a39147", - "title": "EVOLUTION OF FORAGING STRATEGIES IN SHOREBIRDS: AN ECOMORPHOLOGICAL - APPROACH", "abstract": "We studied the relationships between bill and hindlimb - morphology and for- aging behavior in 17 species of shorebirds within a phylogenetic - framework. The results show that the evolutionary change in bill length is - related to the evolutionary change in for- aging strategies from visual hunting - to tactile hunting. We also found evolutionary rela- tionships between an - increase in bill length and both plunging and sweeping foraging move- ments, - and a decrease in bill length and \"routing\" behavior. No relationships were - found between hindlimb morphology and movement pattern (continuous hunting - species vs. pause-travel species). Examining the evolutionary rate of change - in bill and hindlimb struc- tures shows that the family Scolopacidae and the - subfamily Recurvirostrinae evolved more rapidly than the species of Charadriinae. - Results from our ecomorphological and evolution- ary analysis support the - hypothesis by Zweers and co-workers on the evolution of feeding", "venue": - "", "year": 1999, "referenceCount": 50, "citationCount": 107, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-07-01", - "journal": {"name": "The Auk", "pages": "712-725", "volume": "116"}, "authors": - [{"authorId": "2172481", "name": "A. Barbosa"}, {"authorId": "47890872", "name": - "E. Moreno"}]}, {"paperId": "2546e5c71929aa5e1a554f2a1cf70feaac2e53b1", "externalIds": - {"CorpusId": 5907308}, "url": "https://www.semanticscholar.org/paper/2546e5c71929aa5e1a554f2a1cf70feaac2e53b1", - "title": "Intelligent machinery . National Physical Laboratory Report ( 1948 - ) Universal Turing Machine", "abstract": "Superpages and expert systems, while - key in theory, have not until recently been considered significant. After - years of practical research into A* search, we disconfirm the evaluation of - SMPs, which embodies the private principles of cryptography. In order to accomplish - this mission, we use client-server models to prove that hierarchical databases - and model checking are regularly incompatible .", "venue": "", "year": null, - "referenceCount": 154, "citationCount": 5, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", - "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R - I P"}]}, {"paperId": "f87fad7d09373b2d38491ee30d5f2178d646376e", "externalIds": - {"DBLP": "books/daglib/0092426", "MAG": "1488709943", "CorpusId": 30189605}, - "url": "https://www.semanticscholar.org/paper/f87fad7d09373b2d38491ee30d5f2178d646376e", - "title": "Theories of computability", "abstract": "Broad in coverage, mathematically - sophisticated, and up to date, this book provides an introduction to theories - of computability. It treats not only \"the\" theory of computability (the - theory created by Alan Turing and others in the 1930s), but also a variety - of other theories (of Boolean functions, automata and formal languages) as - theories of computability. These are addressed from the classical perspective - of their generation by grammars and from the more modern perspective as rational - cones. The treatment of the classical theory of computable functions and relations - takes the form of a tour through basic recursive function theory, starting - with an axiomatic foundation and developing the essential methods in order - to survey the most memorable results of the field. This authoritative account, - written by one of the leading lights of the subject, will be required reading - for graduate students and researchers in theoretical computer science and - mathematics.", "venue": "", "year": 1997, "referenceCount": 0, "citationCount": - 113, "influentialCitationCount": 7, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "1997-05-28", "journal": {"pages": "I-IX, 1-251"}, - "authors": [{"authorId": "1687945", "name": "N. Pippenger"}]}, {"paperId": - "7aaa3c92f888084577a8c51b41c16d919142af62", "externalIds": {"MAG": "2169214380", - "DBLP": "journals/tifs/DattaLW09", "DOI": "10.1109/TIFS.2009.2022709", "CorpusId": - 1029371}, "url": "https://www.semanticscholar.org/paper/7aaa3c92f888084577a8c51b41c16d919142af62", - "title": "Exploiting the Human\u2013Machine Gap in Image Recognition for Designing - CAPTCHAs", "abstract": "Security researchers have, for a long time, devised - mechanisms to prevent adversaries from conducting automated network attacks, - such as denial-of-service, which lead to significant wastage of resources. - On the other hand, several attempts have been made to automatically recognize - generic images, make them semantically searchable by content, annotate them, - and associate them with linguistic indexes. In the course of these attempts, - the limitations of state-of-the-art algorithms in mimicking human vision have - become exposed. In this paper, we explore the exploitation of this limitation - for potentially preventing automated network attacks. While undistorted natural - images have been shown to be algorithmically recognizable and searchable by - content to moderate levels, controlled distortions of specific types and strengths - can potentially make machine recognition harder without affecting human recognition. - This difference in recognizability makes it a promising candidate for automated - Turing tests [completely automated public Turing test to tell computers and - humans apart (CAPTCHAs)] which can differentiate humans from machines. We - empirically study the application of controlled distortions of varying nature - and strength, and their effect on human and machine recognizability. While - human recognizability is measured on the basis of an extensive user study, - machine recognizability is based on memory-based content-based image retrieval - (CBIR) and matching algorithms. We give a detailed description of our experimental - image CAPTCHA system, IMAGINATION, that uses systematic distortions at its - core. A significant research topic within signal analysis, CBIR is actually - conceived here as a tool for an adversary, so as to help us design more foolproof - image CAPTCHAs.", "venue": "IEEE Transactions on Information Forensics and - Security", "year": 2009, "referenceCount": 44, "citationCount": 50, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "publicationTypes": ["JournalArticle"], "publicationDate": "2006-02-13", "journal": + {"pages": "306-308"}, "authors": [{"authorId": "1765540", "name": "S. Kuznetsov"}, + {"authorId": "2174886", "name": "S. Obiedkov"}]}, {"paperId": "57e2b2dccda37bbb38e711084dd7e3cdfbfe4eaf", + "externalIds": {"ArXiv": "gr-qc/0204036", "MAG": "2020759607", "DOI": "10.1103/PhysRevD.65.104006", + "CorpusId": 119518634}, "corpusId": 119518634, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/57e2b2dccda37bbb38e711084dd7e3cdfbfe4eaf", + "title": "Naked singularities in cylindrical collapse of counterrotating dust + shells", "abstract": "\u2264 0, (2)which we assume henceforth. The matter + content ofthe space-time may be described as infalling null dust.There is + a curvature singularity along r = 0. Since thesolution is Petrov type N with + a pure radiation energy-momentum tensor, all curvature invariants vanish. + It hasbeen shown in [1] that this is a parallel propagated curva-ture singularity. + Additionally, scalars such as R", "venue": "", "year": 2002, "referenceCount": + 0, "citationCount": 35, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://doras.dcu.ie/15647/1/nolan7.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-04-09", "journal": {"name": + "Physical Review D", "pages": "104006", "volume": "65"}, "authors": [{"authorId": + "66978669", "name": "B. Nolan"}]}, {"paperId": "0ac6c7a342c354d30816a6e6fb1d0a0b510e1936", + "externalIds": {"DBLP": "journals/neco/PanWH12", "MAG": "2095430864", "DOI": + "10.1162/NECO_a_00238", "CorpusId": 869006, "PubMed": "22091670"}, "corpusId": + 869006, "publicationVenue": {"id": "69b9bcdd-8229-4a00-a6e0-00f0e99a2bf3", + "name": "Neural Computation", "type": "journal", "alternate_names": ["Neural + Comput"], "issn": "0899-7667", "url": "http://cognet.mit.edu/library/journals/journal?issn=08997667", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=6720226", + "http://www.mitpressjournals.org/loi/neco", "https://www.mitpressjournals.org/loi/neco"]}, + "url": "https://www.semanticscholar.org/paper/0ac6c7a342c354d30816a6e6fb1d0a0b510e1936", + "title": "Spiking Neural P Systems with Astrocytes", "abstract": "In a biological + nervous system, astrocytes play an important role in the functioning and interaction + of neurons, and astrocytes have excitatory and inhibitory influence on synapses. + In this work, with this biological inspiration, a class of computation devices + that consist of neurons and astrocytes is introduced, called spiking neural + P systems with astrocytes (SNPA systems). The computation power of SNPA systems + is investigated. It is proved that SNPA systems with simple neurons (all neurons + have the same rule, one per neuron, of a very simple form) are Turing universal + in both generative and accepting modes. If a bound is given on the number + of spikes present in any neuron along a computation, then the computation + power of SNPA systems is diminished. In this case, a characterization of semilinear + sets of numbers is obtained.", "venue": "Neural Computation", "year": 2012, + "referenceCount": 26, "citationCount": 112, "influentialCitationCount": 4, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-03-01", "journal": {"name": "Neural Computation", "pages": "805-825", + "volume": "24"}, "authors": [{"authorId": "7356533", "name": "L. Pan"}, {"authorId": + "2152810851", "name": "Jun Wang"}, {"authorId": "1806151", "name": "H. J. + Hoogeboom"}]}, {"paperId": "8851cb2ddcbe4c12c2139dc5ff2bdf130d74ae0b", "externalIds": + {"MAG": "1964179274", "DBLP": "journals/ipl/ChangIRB87", "DOI": "10.1016/0020-0190(87)90085-8", + "CorpusId": 18918095}, "corpusId": 18918095, "publicationVenue": {"id": "44ecc2bb-f8fd-4c6d-bd54-30ca098be91d", + "name": "Information Processing Letters", "type": "journal", "alternate_names": + ["Inf Process Lett"], "issn": "0020-0190", "url": "http://www.elsevier.com/locate/ipl", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505612/description#description", + "http://www.sciencedirect.com/science/journal/00200190"]}, "url": "https://www.semanticscholar.org/paper/8851cb2ddcbe4c12c2139dc5ff2bdf130d74ae0b", + "title": "Some Observations Concerning Alternating Turing Machines Using Small + Space", "abstract": null, "venue": "Information Processing Letters", "year": + 1987, "referenceCount": 12, "citationCount": 30, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1987-04-20", "journal": {"name": "Inf. Process. Lett.", + "pages": "1-9", "volume": "25"}, "authors": [{"authorId": "2344940", "name": + "J. Chang"}, {"authorId": "1712312", "name": "O. Ibarra"}, {"authorId": "144871185", + "name": "B. Ravikumar"}, {"authorId": "2052478593", "name": "L. Berman"}]}, + {"paperId": "57b4372b199f0764bf188f0a84e436226d872c71", "externalIds": {"MAG": + "2020832728", "DOI": "10.1002/PSSB.2220940113", "CorpusId": 96243660}, "corpusId": + 96243660, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/57b4372b199f0764bf188f0a84e436226d872c71", + "title": "A hopping model for activated charge transport in amorphous silicon", + "abstract": "A variable-range hopping model is examined for transport in a + band tail. For an exponential density of states the difference of the activation + energies of conductivity and thermoelectric power, \u0394E, is essentially + determined by the steepness of the tail. \u0394E varies slowly with tempera + ture and depends little on the localization length \u03b1 of the wave functions + and on the magnitude of the density of states. From comparison of the results + with experimental data it is suggested that this model applies to activated + transport in n-type amorphous silicon. \n \n \n \nMit Hilfe eines \u201evariable-range-hopping\u201d-Modells + wird der Transport in Bandauslaufern untersucht. Der Unterschied \u0394E der + Aktivierungsenergien von Leitfahigkeit und Thermokraft wird hauptsachlich + vom Abfallparameter \u03b1 der exponentiellen Zustandsdichte bestimmt. \u0394E + variiert schwach mit der Temperatur. Die Grose der Zustandsdichte und die + Lokalisierungslange haben einen kleinen Einflus auf \u0394E. Der Vergleich + mit experimentellen Daten legt die Anwendbarkeit dieses Modells auf amorphes + Silizium nahe.", "venue": "", "year": 1979, "referenceCount": 15, "citationCount": + 116, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}], "publicationTypes": null, "publicationDate": "1979-07-01", + "journal": {"name": "Physica Status Solidi B-basic Solid State Physics", "pages": + "125-133", "volume": "94"}, "authors": [{"authorId": "103057407", "name": + "M. Gr\u00fcnewald"}, {"authorId": "145117916", "name": "P. Thomas"}]}, {"paperId": + "bf1eb728a89fbcba68372cdb5c2bf7fcc5e49dbe", "externalIds": {"ArXiv": "quant-ph/0512170", + "MAG": "2003431413", "DOI": "10.1103/PhysRevA.74.052322", "CorpusId": 30090334}, + "corpusId": 30090334, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf1eb728a89fbcba68372cdb5c2bf7fcc5e49dbe", + "title": "Error Correcting Codes For Adiabatic Quantum Computation", "abstract": + "Mathematics Department, Massachusetts Institute of Technology, Cambridge, + Massachusetts 02139(Dated: February 1, 2008)Recently, there has been growing + interest in using adiabatic quantum computation as an architec-ture for experimentally + realizable quantum computers. One of the reasons for this is the idea thatthe + energy gap should provide some inherent resistance to noise. It is now known + that universalquantum computation can be achieved adiabatically using 2-local + Hamiltonians. The energy gap inthese Hamiltonians scales as an inverse polynomial + in the problem size. Here we present stabilizercodes which can be used to + produce a constant energy gap against 1-local and 2-local noise. Thecorresponding + fault-tolerant universal Hamiltonians are 4-local and 6-local respectively, + which is theoptimal result achievable within this framework.", "venue": "", + "year": 2005, "referenceCount": 9, "citationCount": 119, "influentialCitationCount": + 7, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/0512170", + "status": "GREEN"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2005-12-20", "journal": {"name": + "Physical Review A", "pages": "052322", "volume": "74"}, "authors": [{"authorId": + "2637886", "name": "S. Jordan"}, {"authorId": "34963522", "name": "E. Farhi"}, + {"authorId": "1756931", "name": "P. Shor"}]}, {"paperId": "6079c0581da09e4fe2c123574bae47b21756493d", + "externalIds": {"MAG": "2487361095", "CorpusId": 54813155}, "corpusId": 54813155, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6079c0581da09e4fe2c123574bae47b21756493d", + "title": "Degumming of silk with lipase and protease", "abstract": "A lipase + enzyme in combinati on with a protease enzyme has been used for dewaxing and + degumming of silk and the combined effect of dewaxing and degumming on weight + loss, wettability , dye uptake, yellowing, microscopic struc ture, handle + and lustre has been studied. It is observed that the combined enzyme treated + samples show the same weight lo ss, cleaner longitudinal su rface and better + wettability when compared with the Marseill es'' soap treated samples .", + "venue": "", "year": 2000, "referenceCount": 1, "citationCount": 44, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2000-03-01", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "48288144", "name": "M. Gulrajani"}, {"authorId": + "144162968", "name": "R. Agarwal"}, {"authorId": "84091046", "name": "A. Grover"}, + {"authorId": "46491061", "name": "M. Suri"}]}, {"paperId": "ebacbc4605f2a8d8223a2836ebafad8f198c195a", + "externalIds": {"MAG": "2098152185", "DBLP": "journals/adb/FroeseWI13", "DOI": + "10.1177/1059712313483145", "CorpusId": 14997927}, "corpusId": 14997927, "publicationVenue": + {"id": "f4f9e4d0-b477-46a6-bd60-07475fc3a0bd", "name": "Adaptive Behavior", + "type": "journal", "alternate_names": ["Adapt Behav"], "issn": "1059-7123", + "url": "http://www.sagepub.com/journals/Journal201570/title", "alternate_urls": + ["http://online.sagepub.com/10597123", "https://journals.sagepub.com/home/adb", + "https://uk.sagepub.com/en-gb/eur/journal/adaptive-behavior", "http://www.sagepub.com/journalsProdDesc.nav?prodId=Journal201570"]}, + "url": "https://www.semanticscholar.org/paper/ebacbc4605f2a8d8223a2836ebafad8f198c195a", + "title": "Turing instabilities in biology, culture, and consciousness? On + the enactive origins of symbolic material culture", "abstract": "It has been + argued that the worldwide prevalence of certain types of geometric visual + patterns found in prehistoric art can be best explained by the common experience + of these patterns as geometric hallucinations during altered states of consciousness + induced by shamanic ritual practices. And in turn the worldwide prevalence + of these types of hallucinations has been explained by appealing to humanity\u2019s + shared neurobiological embodiment. Moreover, it has been proposed that neural + network activity can exhibit similar types of spatiotemporal patterns, especially + those caused by Turing instabilities under disinhibited, non-ordinary conditions. + Altered states of consciousness thus provide a suitable pivot point from which + to investigate the complex relationships between symbolic material culture, + first-person experience, and neurobiology. We critique prominent theories + of these relationships. Drawing inspiration from neurophenomenology, we sketch + the beginnings of an alternative, enactive approach centered on the concepts + of sense-making, value, and sensorimotor decoupling.", "venue": "Adaptive + Behavior", "year": 2013, "referenceCount": 90, "citationCount": 53, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2013-06-01", "journal": {"name": "Adaptive Behavior", "pages": "199 - 214", + "volume": "21"}, "authors": [{"authorId": "1772754", "name": "T. Froese"}, + {"authorId": "2053961147", "name": "A. Woodward"}, {"authorId": "144465822", + "name": "T. Ikegami"}]}, {"paperId": "e1cf2312e7652ca0b705ecb1c1e72d00fae18fe0", + "externalIds": {"MAG": "1553090457", "DOI": "10.1007/978-1-4613-0133-2", "CorpusId": + 82888803}, "corpusId": 82888803, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e1cf2312e7652ca0b705ecb1c1e72d00fae18fe0", + "title": "Mathematical Models for Biological Pattern Formation", "abstract": + null, "venue": "", "year": 2001, "referenceCount": 0, "citationCount": 118, + "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "2339973", "name": "P. Maini"}, + {"authorId": "2892576", "name": "H. Othmer"}]}, {"paperId": "06e7b8da9e9806be25393c3fd48f1b2a9a7a6f66", + "externalIds": {"ArXiv": "math/9811105", "MAG": "1996511490", "DOI": "10.2307/3597195", + "CorpusId": 119728458}, "corpusId": 119728458, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/06e7b8da9e9806be25393c3fd48f1b2a9a7a6f66", + "title": "Isoperimetric and isodiametric functions of groups", "abstract": + "This is the first of two papers devoted to connections between asymptotic + functions of groups and computational complexity. In particular, we show how + to construct a finitely presented group with NP-complete word problem. One + of the main results of this paper states that if a real number cx > 4 is computable + in time 0 then na is equivalent ( \"big O\" ) to the Dehn function of a finitely + presented group. The smallest isodiametric function of this group is n3\u00b08/4. + On the other hand, if na is equivalent to the Dehn function of a finitely + presented group then oe is computable in time 4 are equivalent to Dehn functions + of some finitely presented groups and that n1r and na for all rational numbers + oe > 3 are equivalent to the smallest isodiametric functions of finitely presented + groups. Moreover, we describe all Dehn functions of finitely presented groups + F n4 as time functions of Turing machines modulo two conjectures:", "venue": + "", "year": 1998, "referenceCount": 33, "citationCount": 118, "influentialCitationCount": + 14, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/math/9811105", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-11-18", + "journal": {"name": "Annals of Mathematics", "pages": "345-466", "volume": + "156"}, "authors": [{"authorId": "2722499", "name": "M. Sapir"}, {"authorId": + "1756381", "name": "J. Birget"}, {"authorId": "2499056", "name": "E. Rips"}]}, + {"paperId": "54759317d353a363571fcab38e1151996bfda26e", "externalIds": {"DBLP": + "conf/cmsb/FagesGBP17", "MAG": "2737153105", "DOI": "10.1007/978-3-319-67471-1_7", + "CorpusId": 12877436}, "corpusId": 12877436, "publicationVenue": {"id": "0b7df023-a264-427f-8b72-539c0344459f", + "name": "Computational Methods in Systems Biology", "type": "conference", + "alternate_names": ["Comput Method Syst Biology", "CMSB"], "url": "http://www.wikicfp.com/cfp/program?id=512"}, + "url": "https://www.semanticscholar.org/paper/54759317d353a363571fcab38e1151996bfda26e", + "title": "Strong Turing Completeness of Continuous Chemical Reaction Networks + and Compilation of Mixed Analog-Digital Programs", "abstract": null, "venue": + "Computational Methods in Systems Biology", "year": 2017, "referenceCount": + 49, "citationCount": 51, "influentialCitationCount": 8, "isOpenAccess": true, + "openAccessPdf": {"url": "https://hal.inria.fr/hal-01519828v3/file/FLBP17cmsb.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-09-01", "journal": {"name": "IEEE Transactions on - Information Forensics and Security", "pages": "504-518", "volume": "4"}, "authors": - [{"authorId": "40490812", "name": "R. Datta"}, {"authorId": "40116905", "name": - "Jia Li"}, {"authorId": "48094094", "name": "James Ze Wang"}]}, {"paperId": - "fb0ee28e51d9aca48544c68fe75929465cd52460", "externalIds": {"MAG": "2103407858", - "DBLP": "journals/ijhpca/NickolayevRR97", "DOI": "10.1177/109434209701100207", - "CorpusId": 8513822}, "url": "https://www.semanticscholar.org/paper/fb0ee28e51d9aca48544c68fe75929465cd52460", - "title": "Real-Time Statistical Clustering for Event Trace Reduction", "abstract": - "Event tracing provides the detailed data needed to under stand the dynamics - of interactions among application resource demands and system responses. However, - cap turing the large volume of dynamic performance data inherent in detailed - tracing can perturb program execution and stress secondary storage systems. - Moreover, it can overwhelm a user or performance analyst with potentially - irrelevant data. Using the Pablo performance environ ment''s support for real-time - data analysis, we show that dynamic statistical data clustering can dramatically - reduce the volume of captured performance data by identifying and recording - event traces only from representative proc essors. In turn, this makes possible - low overhead, interac tive visualization, and performance tuning.", "venue": - "The international journal of high performance computing applications", "year": - 1997, "referenceCount": 24, "citationCount": 63, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1997-06-01", "journal": {"name": "International Journal - of High Performance Computing Applications", "pages": "144 - 159", "volume": - "11"}, "authors": [{"authorId": "2097193", "name": "O. Nickolayev"}, {"authorId": - "3128725", "name": "P. Roth"}, {"authorId": "144413177", "name": "D. Reed"}]}, - {"paperId": "663d035ed48417416e91ecab53359192bd852efd", "externalIds": {"DBLP": - "journals/iandc/BeigelGGO93", "MAG": "1995304514", "DOI": "10.1006/inco.1993.1014", - "CorpusId": 39364532}, "url": "https://www.semanticscholar.org/paper/663d035ed48417416e91ecab53359192bd852efd", - "title": "Terse, Superterse, and Verbose Sets", "abstract": "Abstract Let - A be a subset of the natural numbers, and let F A n ( x 1 , ..., x n ) = \u3008\u03c7 - A ( x 1 ), ..., \u03c7 A ( x n )\u3009, where \u03c7 A is the characteristic - function of A . An oracle Turing machine with oracle A could certainly compute - F A n with n queries to A . There are some sets A (e.g.. the halting set) - for which F A n can be computed with substantially fewer than n queries. One - key reason for this is that the questions asked to the oracle can depend on - previous answers; i.e., the questions are adaptive . We examine when it is - possible to save queries. A set A is terse if the computation of F A n from - A requires n queries. A set A is superterse if the computation of F A n from - any set requires n queries. A set A is verbose if F A 2 n \u22121 can be computed - with n queries to A . The range of possible query savings is limited by the - following theorem: F A n cannot be computed with only \u230a log n \u230b - queries to a set X unless A is recursive. In addition we produce the following: - (1) a verbose set in each truth-table degree and a superterse set in each - nonzero truth-table degree; and (2) an r.e. verbose set in each r.e. truth-table - degree and an r.e. terse set in each nonzero r.e. Turing degree.", "venue": - "Information and Computation", "year": 1993, "referenceCount": 0, "citationCount": - 53, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1993-03-01", "journal": {"name": "Inf. Comput.", "pages": - "68-85", "volume": "103"}, "authors": [{"authorId": "2516122", "name": "R. - Beigel"}, {"authorId": "1740486", "name": "W. Gasarch"}, {"authorId": "145896360", - "name": "John Gill"}, {"authorId": "144879430", "name": "J. Owings"}]}, {"paperId": - "dd31d1c612aaca95242b31a7a24d13a09fefe971", "externalIds": {"MAG": "2129552973", - "DBLP": "conf/cse/HuberKNT09", "DOI": "10.1109/CSE.2009.205", "CorpusId": - 3907666}, "url": "https://www.semanticscholar.org/paper/dd31d1c612aaca95242b31a7a24d13a09fefe971", + "publicationDate": "2017-09-27", "journal": {"pages": "108-127"}, "authors": + [{"authorId": "1822220", "name": "F. Fages"}, {"authorId": "25139989", "name": + "Guillaume Le Guludec"}, {"authorId": "1706341", "name": "Olivier Bournez"}, + {"authorId": "2885195", "name": "Amaury Pouly"}]}, {"paperId": "dd31d1c612aaca95242b31a7a24d13a09fefe971", + "externalIds": {"MAG": "2129552973", "DBLP": "conf/cse/HuberKNT09", "DOI": + "10.1109/CSE.2009.205", "CorpusId": 3907666}, "corpusId": 3907666, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/dd31d1c612aaca95242b31a7a24d13a09fefe971", "title": "Towards Automating Social Engineering Using Social Networking Sites", "abstract": "A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided @@ -41012,268 +46326,427 @@ interactions: attacks by applying automated social engineering bots.", "venue": "2009 International Conference on Computational Science and Engineering", "year": 2009, "referenceCount": 31, "citationCount": 115, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2009-08-29", "journal": {"name": "2009 International Conference on Computational - Science and Engineering", "pages": "117-124", "volume": "3"}, "authors": [{"authorId": - "145947633", "name": "Markus Huber"}, {"authorId": "3179434", "name": "S. - Kowalski"}, {"authorId": "1925268", "name": "Marcus Nohlberg"}, {"authorId": - "1834439", "name": "S. Tjoa"}]}, {"paperId": "ef694eb71401fff4df71057056c8c97bde250bc3", - "externalIds": {"DBLP": "journals/jcss/BalliuDFO18", "MAG": "2885668823", - "DOI": "10.4230/LIPIcs.STACS.2017.8", "CorpusId": 17975005}, "url": "https://www.semanticscholar.org/paper/ef694eb71401fff4df71057056c8c97bde250bc3", - "title": "What Can Be Verified Locally?", "abstract": "We are considering - distributed network computing, in which computing entities are connected by - a network modeled as a connected graph. These entities are located at the - nodes of the graph, and they exchange information by message-passing along - its edges. In this context, we are adopting the classical framework for local - distributed decision, in which nodes must collectively decide whether their - network configuration satisfies some given boolean predicate, by having each - node interacting with the nodes in its vicinity only. A network configuration - is accepted if and only if every node individually accepts. It is folklore - that not every Turing-decidable network property (e.g., whether the network - is planar) can be decided locally whenever the computing entities are Turing - machines (TM). On the other hand, it is known that every Turing-decidable - network property can be decided locally if nodes are running non-deterministic - Turing machines (NTM). However, this holds only if the nodes have the ability - to guess the identities of the nodes currently in the network. That is, for - different sets of identities assigned to the nodes, the correct guesses of - the nodes might be different. If one asks the nodes to use the same guess - in the same network configuration even with different identity assignments, - i.e., to perform identity-oblivious guesses, then it is known that not every - Turing-decidable network property can be decided locally. \n \nIn this paper, - we show that every Turing-decidable network property can be decided locally - if nodes are running alternating Turing machines (ATM), and this holds even - if nodes are bounded to perform identity-oblivious guesses. More specifically, - we show that, for every network property, there is a local algorithm for ATMs, - with at most 2 alternations, that decides that property. To this aim, we define - a hierarchy of classes of decision tasks where the lowest level contains tasks - solvable with TMs, the first level those solvable with NTMs, and level k contains - those tasks solvable with ATMs with k alternations. We characterize the entire - hierarchy, and show that it collapses in the second level. In addition, we - show separation results between the classes of network properties that are - locally decidable with TMs, NTMs, and ATMs. Finally, we establish the existence - of completeness results for each of these classes, using novel notions of - local reduction.", "venue": "Symposium on Theoretical Aspects of Computer - Science", "year": 2017, "referenceCount": 17, "citationCount": 19, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2017-03-08", "journal": {"pages": "8:1-8:13"}, - "authors": [{"authorId": "2688035", "name": "A. Balliu"}, {"authorId": "1397402680", - "name": "Gianlorenzo D''angelo"}, {"authorId": "1685849", "name": "P. Fraigniaud"}, - {"authorId": "1880491", "name": "D. Olivetti"}]}, {"paperId": "4e7da0356e2bacf94d20b7469e50e4c9d17968d9", - "externalIds": {"MAG": "2052849655", "DOI": "10.3354/AME045101", "CorpusId": - 38056008}, "url": "https://www.semanticscholar.org/paper/4e7da0356e2bacf94d20b7469e50e4c9d17968d9", - "title": "First successful culture of the marine dinoflagellate Dinophysis - acuminata", "abstract": "The dinoflagellate genus Dinophysis in- cludes several - species that cause diarrhetic shellfish poi- soning, none of which have yet - been established in cul- ture. We report on the maintenance of Dinophysis - acuminata cultures that were established in December 2005 and also on its - feeding mechanism, and growth rates when fed the ciliate prey Myrionecta rubra - with and without the addition of the cryptophyte Teleaulax sp. D. acuminata - grew well (growth rate of 0.95 d -1 ) in laboratory culture when supplied - with the marine ciliate M. rubra as prey, reaching a maximum concentration - of about 2400 cells ml -1 at the end of the feeding experiment. In contrast, - D. acuminata did not show sustained growth in the absence of the ciliate or - when provided the cryptophyte Teleaulax sp. as prey (D. acuminata used its - peduncle to extract the cell contents of the prey organism, M. rubra). Based - on the prey- preda- tor interactions occurring among D. acuminata, M. rubra, - and Teleaulax sp. in this study, establishment of perma- nent culture of the - dinoflagellate D. acuminata may facil- itate a better understanding of the - ecophysiology, biol- ogy, and toxicology of Dinophysis species, as well as - the evolution of dinoflagellate plastids.", "venue": "", "year": 2006, "referenceCount": - 26, "citationCount": 330, "influentialCitationCount": 39, "isOpenAccess": - true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2006-11-24", "journal": {"name": "Aquatic Microbial Ecology", - "pages": "101-106", "volume": "45"}, "authors": [{"authorId": "5156106", "name": - "M. Park"}, {"authorId": "49899817", "name": "Sunju Kim"}, {"authorId": "1456153430", - "name": "Hyung Seop Kim"}, {"authorId": "144272399", "name": "Geumog Myung"}, - {"authorId": "104811839", "name": "Yihuei Kang"}, {"authorId": "11738217", - "name": "W. Yih"}]}, {"paperId": "533ba306dbd8e4f483372d177d898ef4963c9a02", - "externalIds": {"DBLP": "journals/siamcomp/Pratt75", "MAG": "2045664183", - "DOI": "10.1137/0204018", "CorpusId": 31220164}, "url": "https://www.semanticscholar.org/paper/533ba306dbd8e4f483372d177d898ef4963c9a02", - "title": "Every Prime has a Succinct Certificate", "abstract": "To prove that - a number n is composite, it suffices to exhibit the working for the multiplication - of a pair of factors. This working, represented as af string, is of length - bounded by a polynomial in $\\log _2 n$. We show that the same property holds - for the primes. It is noteworthy that almost no other set is known to have - the property that short proofs for membership or nonmembership exist for all - candidates without being known to have the property that such proofs are easy - to come by. It remains an open problem whether a prime n can be recognized - in only $\\log _2^\\alpha n$ operations of a Turing machine for any fixed - $\\alpha $.The proof system used for certifying primes is as follows.Axiom. - $(x,y,1)$.Inference Rules. \\[ R_1 :\\quad(p,x,a),q \\vdash (p,x,qa)\\quad\\text{provided - }x^{(p - 1)/q} \\not\\equiv 1(\\bmod p)\\text{ and }q | (p - 1). \\]\\[ R_2 - :\\quad(p,x,p - 1) \\vdash p\\quad\\text{provided } x^{p - 1} \\equiv 1(\\bmod - p). \\]Theorem 1. pis a theorem$\\equiv p$is a prime.Theorem 2. pis a theorem$\\supset - p$has a...", "venue": "SIAM journal on computing (Print)", "year": 1975, "referenceCount": - 6, "citationCount": 320, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1975-09-01", "journal": {"name": "SIAM J. Comput.", "pages": - "214-220", "volume": "4"}, "authors": [{"authorId": "1691192", "name": "V. - Pratt"}]}, {"paperId": "5d69df984219be60260632021713e5a82c0b0227", "externalIds": - {"MAG": "1496232869", "CorpusId": 22316264, "PubMed": "14353798"}, "url": - "https://www.semanticscholar.org/paper/5d69df984219be60260632021713e5a82c0b0227", - "title": "The influence of cortisone on the structure and growth of bone.", - "abstract": "In the course of some experiments on the effects of cortisone - administration on the repair of fractures in rabbits (Sissons & Hadfield, - 1951), the authors noted, as other workers had done, interference with growth - of the experimental animals. This was shown by measurements both of body weight - and of the length of long bones, while histological examination of the growing - regions of the bones showed marked depar-ture from what was seen in normal - control rabbits. The present paper presents in some detail these observations - on bone growth.", "venue": "Journal of anatomy", "year": 1955, "referenceCount": - 22, "citationCount": 60, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Journal of anatomy", "pages": "\n 69-78\n ", "volume": - "89 1"}, "authors": [{"authorId": "2227589", "name": "H. Sissons"}, {"authorId": - "40051702", "name": "G. Hadfield"}]}, {"paperId": "75f3401fe91382e2dd06045613287e013f2a1fe0", - "externalIds": {"MAG": "2082291221", "DOI": "10.1029/2005EO060001", "CorpusId": - 129664836}, "url": "https://www.semanticscholar.org/paper/75f3401fe91382e2dd06045613287e013f2a1fe0", - "title": "Global seismographic network records the Great Sumatra\u2010Andaman - earthquake", "abstract": "On 26 December 2004 the Indonesian sub-duction zone - near the northern end of Sumatrabegan to rupture at 58 minutes,47 secondspast - midnight Greenwich Mean Time.The rup-ture continued for approximately seven - min-utes,extending northwestward along the SundaTrench for roughly 1200 km - to the AndamanIslands.The seafloor displacement generateda massive tsunami - that swept ashore with 10-mamplitude in northern Sumatra and expandedacross - the Indian Ocean and Andaman Sea,striking Sri Lanka and Thailand within twohours - of the rupture.Confirmed deaths alongthe coastlines of 11 Indian Ocean nationsexceed - 220,000,marking this as one of themost lethal natural disasters in human history.The - 2004 Sumatra-Andaman earthquake isthe largest event since the 1964 Good FridayAlaskan - earthquake (", "venue": "", "year": 2005, "referenceCount": 3, "citationCount": - 60, "influentialCitationCount": 10, "isOpenAccess": true, "fieldsOfStudy": - ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, - {"category": "Geology", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2005-02-08", "journal": {"name": "Eos, Transactions American - Geophysical Union", "pages": "57-61", "volume": "86"}, "authors": [{"authorId": - "2116768789", "name": "Jeffrey Park"}, {"authorId": "2523166", "name": "K. - Anderson"}, {"authorId": "2278314", "name": "R. Aster"}, {"authorId": "38653365", - "name": "R. Butler"}, {"authorId": "144235940", "name": "T. Lay"}, {"authorId": - "50182565", "name": "D. Simpson"}]}, {"paperId": "4b8b3b792415df36f0fcb5b5810bbea471adfd47", - "externalIds": {"DBLP": "journals/corr/GulcehreCB17", "ArXiv": "1701.08718", - "MAG": "2583687993", "CorpusId": 12749186}, "url": "https://www.semanticscholar.org/paper/4b8b3b792415df36f0fcb5b5810bbea471adfd47", - "title": "Memory Augmented Neural Networks with Wormhole Connections", "abstract": - "Recent empirical results on long-term dependency tasks have shown that neural - networks augmented with an external memory can learn the long-term dependency - tasks more easily and achieve better generalization than vanilla recurrent - neural networks (RNN). We suggest that memory augmented neural networks can - reduce the effects of vanishing gradients by creating shortcut (or wormhole) - connections. Based on this observation, we propose a novel memory augmented - neural network model called TARDIS (Temporal Automatic Relation Discovery - in Sequences). The controller of TARDIS can store a selective set of embeddings - of its own previous hidden states into an external memory and revisit them - as and when needed. For TARDIS, memory acts as a storage for wormhole connections - to the past to propagate the gradients more effectively and it helps to learn - the temporal dependencies. The memory structure of TARDIS has similarities - to both Neural Turing Machines (NTM) and Dynamic Neural Turing Machines (D-NTM), - but both read and write operations of TARDIS are simpler and more efficient. - We use discrete addressing for read/write operations which helps to substantially - to reduce the vanishing gradient problem with very long sequences. Read and - write operations in TARDIS are tied with a heuristic once the memory becomes - full, and this makes the learning problem simpler when compared to NTM or - D-NTM type of architectures. We provide a detailed analysis on the gradient - propagation in general for MANNs. We evaluate our models on different long-term - dependency tasks and report competitive results in all of them.", "venue": - "ArXiv", "year": 2017, "referenceCount": 49, "citationCount": 52, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer + "Conference"], "publicationDate": "2009-08-29", "journal": {"name": "2009 + International Conference on Computational Science and Engineering", "pages": + "117-124", "volume": "3"}, "authors": [{"authorId": "145947633", "name": "Markus + Huber"}, {"authorId": "3179434", "name": "S. Kowalski"}, {"authorId": "1925268", + "name": "Marcus Nohlberg"}, {"authorId": "1834439", "name": "S. Tjoa"}]}, + {"paperId": "df69f9075dee4fe226b0910785acf22e5c3de5e2", "externalIds": {"ArXiv": + "2003.01807", "MAG": "3010473963", "CorpusId": 211990643}, "corpusId": 211990643, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/df69f9075dee4fe226b0910785acf22e5c3de5e2", + "title": "Horizons Protect Church-Turing", "abstract": "The quantum-Extended + Church-Turing thesis is a principle of physics as well as computer science. + It asserts that the laws of physics will prevent the construction of a machine + that can efficiently determine the results of any calculation which cannot + be done efficiently by a quantum Turing machine (or a universal quantum circuit). + In this note I will argue that an observer falling into a black hole can learn + the result of such a calculation in a very short time, thereby seemingly violating + the thesis. A viable reformulation requires that the thesis only applies to + observers who have access to the holographic boundary of space. The properties + of the horizon play a crucial a role in protecting the thesis. The arguments + are closely related to, and were partially motivated by a recent paper by + Bouland, Fefferman, and Vazirani, and by a question raised by Aaronson.", + "venue": "", "year": 2020, "referenceCount": 8, "citationCount": 11, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2020-03-03", "journal": {"name": "arXiv: High Energy Physics - Theory", "volume": + ""}, "authors": [{"authorId": "101019099", "name": "L. Susskind"}]}, {"paperId": + "babe33d25134fed00d718d73e2d8145b2e481750", "externalIds": {"MAG": "2980109286", + "PubMedCentral": "6914236", "DOI": "10.2196/16222", "CorpusId": 204953339, + "PubMed": "31661083"}, "corpusId": 204953339, "publicationVenue": {"id": "2baad992-2268-4c38-9120-e453622f2eeb", + "name": "Journal of Medical Internet Research", "type": "journal", "alternate_names": + ["J Med Internet Res"], "issn": "1438-8871", "url": "http://www.symposion.com/jmir/index.htm", + "alternate_urls": ["http://www.jmir.org/", "https://www.jmir.org/"]}, "url": + "https://www.semanticscholar.org/paper/babe33d25134fed00d718d73e2d8145b2e481750", + "title": "Trust Me, I\u2019m a Chatbot: How Artificial Intelligence in Health + Care Fails the Turing Test", "abstract": "Over the next decade, one issue + which will dominate sociotechnical studies in health informatics is the extent + to which the promise of artificial intelligence in health care will be realized, + along with the social and ethical issues which accompany it. A useful thought + experiment is the application of the Turing test to user-facing artificial + intelligence systems in health care (such as chatbots or conversational agents). + In this paper I argue that many medical decisions require value judgements + and the doctor-patient relationship requires empathy and understanding to + arrive at a shared decision, often handling large areas of uncertainty and + balancing competing risks. Arguably, medicine requires wisdom more than intelligence, + artificial or otherwise. Artificial intelligence therefore needs to supplement + rather than replace medical professionals, and identifying the complementary + positioning of artificial intelligence in medical consultation is a key challenge + for the future. In health care, artificial intelligence needs to pass the + implementation game, not the imitation game.", "venue": "Journal of Medical + Internet Research", "year": 2019, "referenceCount": 27, "citationCount": 49, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://www.jmir.org/2019/10/e16222/PDF", "status": "GOLD"}, "fieldsOfStudy": + ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-01-30", "journal": {"name": "ArXiv", "volume": "abs/1701.08718"}, - "authors": [{"authorId": "1854385", "name": "\u00c7aglar G\u00fcl\u00e7ehre"}, - {"authorId": "144631588", "name": "A. Chandar"}, {"authorId": "1751762", "name": - "Yoshua Bengio"}]}, {"paperId": "1a829efbab6ccefc670f9884deaf2586803ed347", - "externalIds": {"MAG": "2046935329", "DBLP": "journals/ita/Okhotin04", "DOI": - "10.1051/ita:2004004", "CorpusId": 36191995}, "url": "https://www.semanticscholar.org/paper/1a829efbab6ccefc670f9884deaf2586803ed347", - "title": "On the equivalence of linear conjunctive grammars and trellis automata", - "abstract": "This paper establishes computational equivalence of two seemingly - unrelated concepts: linear conjunctive grammars and trellis automata. Trellis - automata, also studied under the name of one-way real-time cellular automata, - have been known since early 1980s as a purely abstract model of parallel computers, - while linear conjunctive grammars, introduced a few years ago, are linear - context-free grammars extended with an explicit intersection operation. Their - equivalence implies the equivalence of several other formal systems, including - a certain restricted class of Turing machines and a certain type of language - equations, thus giving further evidence for the importance of the language - family they all generate.", "venue": "RAIRO - Theoretical Informatics and - Applications", "year": 2004, "referenceCount": 17, "citationCount": 64, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "RAIRO Theor. Informatics Appl.", "pages": "69-88", - "volume": "38"}, "authors": [{"authorId": "1800637", "name": "A. Okhotin"}]}, - {"paperId": "074398b0325e3c92f38a0ae0812b648c37f394a0", "externalIds": {"MAG": - "2604267363", "CorpusId": 113701675}, "url": "https://www.semanticscholar.org/paper/074398b0325e3c92f38a0ae0812b648c37f394a0", - "title": "ASHRAE Standard 160P-Criteria for Moisture Control Design Analysis - in Buildings", "abstract": "In 1996, ASHRAE formed a new Standard Project - Committee, ASHRAE 160P, to develop a standardfor moisture control in buildings. - The draft standard __ \"Criteria for Mois\u00ad ture Control Design Analysis - in Buildings\" __ intends to provide performance-based procedures for moisture - design analysis for buildings. The standard sets criteriafor moisture design - loads, moisture analysis methods, and building perfor\u00ad mance and applies - to the above-grade portions of all types of buildings. It can be used for - design analysis of the above-grade portion of the building envelope or help - guide specifications for HVAC equipment and controls. Eventually it should - form the basis for moisture design rules based on a uniform set of design - assumptions and loads. This paper describes the ratio\u00ad nale behind this - standard, its current outline, and its potential uses.", "venue": "", "year": - 2008, "referenceCount": 9, "citationCount": 114, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "167-171", "volume": "114"}, "authors": [{"authorId": - "2060395104", "name": "Tenwolde Anton"}]}, {"paperId": "ebacbc4605f2a8d8223a2836ebafad8f198c195a", - "externalIds": {"MAG": "2098152185", "DBLP": "journals/adb/FroeseWI13", "DOI": - "10.1177/1059712313483145", "CorpusId": 14997927}, "url": "https://www.semanticscholar.org/paper/ebacbc4605f2a8d8223a2836ebafad8f198c195a", - "title": "Turing instabilities in biology, culture, and consciousness? On - the enactive origins of symbolic material culture", "abstract": "It has been - argued that the worldwide prevalence of certain types of geometric visual - patterns found in prehistoric art can be best explained by the common experience - of these patterns as geometric hallucinations during altered states of consciousness - induced by shamanic ritual practices. And in turn the worldwide prevalence - of these types of hallucinations has been explained by appealing to humanity\u2019s - shared neurobiological embodiment. Moreover, it has been proposed that neural - network activity can exhibit similar types of spatiotemporal patterns, especially - those caused by Turing instabilities under disinhibited, non-ordinary conditions. - Altered states of consciousness thus provide a suitable pivot point from which - to investigate the complex relationships between symbolic material culture, - first-person experience, and neurobiology. We critique prominent theories - of these relationships. Drawing inspiration from neurophenomenology, we sketch - the beginnings of an alternative, enactive approach centered on the concepts - of sense-making, value, and sensorimotor decoupling.", "venue": "Adaptive - Behavior", "year": 2013, "referenceCount": 90, "citationCount": 52, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Psychology", "source": - "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-06-01", "journal": {"name": "Adaptive - Behavior", "pages": "199 - 214", "volume": "21"}, "authors": [{"authorId": - "1772754", "name": "T. Froese"}, {"authorId": "2053961147", "name": "A. Woodward"}, - {"authorId": "144465822", "name": "T. Ikegami"}]}, {"paperId": "b650a566b21ca7b76b298dcf1811c8aed47cee2e", - "externalIds": {"MAG": "1662868588", "CorpusId": 887688}, "url": "https://www.semanticscholar.org/paper/b650a566b21ca7b76b298dcf1811c8aed47cee2e", + "publicationDate": "2019-10-01", "journal": {"name": "Journal of Medical Internet + Research", "volume": "21"}, "authors": [{"authorId": "2069584976", "name": + "J. Powell"}]}, {"paperId": "f87fad7d09373b2d38491ee30d5f2178d646376e", "externalIds": + {"DBLP": "books/daglib/0092426", "MAG": "1488709943", "CorpusId": 30189605}, + "corpusId": 30189605, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f87fad7d09373b2d38491ee30d5f2178d646376e", + "title": "Theories of computability", "abstract": "Broad in coverage, mathematically + sophisticated, and up to date, this book provides an introduction to theories + of computability. It treats not only \"the\" theory of computability (the + theory created by Alan Turing and others in the 1930s), but also a variety + of other theories (of Boolean functions, automata and formal languages) as + theories of computability. These are addressed from the classical perspective + of their generation by grammars and from the more modern perspective as rational + cones. The treatment of the classical theory of computable functions and relations + takes the form of a tour through basic recursive function theory, starting + with an axiomatic foundation and developing the essential methods in order + to survey the most memorable results of the field. This authoritative account, + written by one of the leading lights of the subject, will be required reading + for graduate students and researchers in theoretical computer science and + mathematics.", "venue": "", "year": 1997, "referenceCount": 0, "citationCount": + 113, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1997-05-28", + "journal": {"pages": "I-IX, 1-251"}, "authors": [{"authorId": "1687945", "name": + "N. Pippenger"}]}, {"paperId": "832934d9b30ed603108b2b495edd5a46debb6447", + "externalIds": {"DBLP": "series/sci/Yang13", "MAG": "127010602", "DOI": "10.1007/978-3-642-29694-9_16", + "CorpusId": 13011398}, "corpusId": 13011398, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/832934d9b30ed603108b2b495edd5a46debb6447", + "title": "Metaheuristic Optimization: Nature-Inspired Algorithms and Applications", + "abstract": null, "venue": "Artificial Intelligence, Evolutionary Computing + and Metaheuristics", "year": 2013, "referenceCount": 66, "citationCount": + 44, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"pages": "405-420"}, "authors": [{"authorId": "1750780", + "name": "Xin-She Yang"}]}, {"paperId": "deddf4cf880f446892342f259f43f7a92d7569c1", + "externalIds": {"DBLP": "journals/computer/Krol99", "MAG": "2078877480", "DOI": + "10.1109/2.751325", "CorpusId": 28990643}, "corpusId": 28990643, "publicationVenue": + {"id": "f6572f66-2623-4a5e-b0d9-4a5028dea98f", "name": "Computer", "type": + "journal", "alternate_names": ["IEEE Computer", "IEEE Comput"], "issn": "0018-9162", + "url": "http://www.computer.org/computer", "alternate_urls": ["https://ieeexplore.ieee.org/servlet/opac?punumber=2", + "http://www.computer.org/portal/site/ieeecs/index.jsp", "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2"]}, + "url": "https://www.semanticscholar.org/paper/deddf4cf880f446892342f259f43f7a92d7569c1", + "title": "Have We Witnessed a Real-Life Turing Test?", "abstract": "Did Deep + Blue ace the Turing Test? Did it do much more? It seems that the IBM creation + not only beat the reigning chess World Champion Gary Kasparov, but also took + a large step, in some people''s eyes, toward true artificial intelligence. + For AI professionals, a computer defeating a human in chess is probably neither + surprising nor really significant. After all, they contend, chess can be described + in terms of a nondeterministic alternating Turing machine. Despite the enormous + number of possible positions and available moves, the task does not present + a challenging theoretical AI problem of NP completeness. There are many well-developed + AI strategies that limit the search for the best move to an analysis of the + most promising positions. Therefore, the progress in logical and numerical + methods of AI and a computer''s computational speed and available memory made + the computer''s victory inevitable. Deep Blue''s victory, then, was attributable + to its ability to analyze 200 million positions per second and a refined algorithm + that accounted for positional-in addition to material-advantage. In summary, + most AI professionals conclude that the computer won by brute force, rather + than a sophisticated or original strategy. What most AI experts have overlooked, + though, is another aspect of the match, which may signify a milestone in the + history of computer science: for the first time, a computer seems to have + passed the Turing Test.", "venue": "Computer", "year": 1999, "referenceCount": + 13, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-03-01", "journal": {"name": "Computer", "pages": + "27-30", "volume": "32"}, "authors": [{"authorId": "2061192560", "name": "Marina + Krol"}]}, {"paperId": "31d109f985e16561fbd4aa4ddaa2bce2954dc5bc", "externalIds": + {"DBLP": "journals/iandc/ItoITT82", "MAG": "2088973818", "DOI": "10.1016/S0019-9958(82)90572-1", + "CorpusId": 30141027}, "corpusId": 30141027, "publicationVenue": {"id": "feadd011-44f6-4649-bc71-8c9a604eee42", + "name": "Information and Control", "alternate_names": ["Inf Control"], "issn": + "0019-9958", "url": "https://www.sciencedirect.com/journal/information-and-control", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00199958", + "http://www.sciencedirect.com/science/journal/00199958/1/1"]}, "url": "https://www.semanticscholar.org/paper/31d109f985e16561fbd4aa4ddaa2bce2954dc5bc", + "title": "Two-Dimensional Alternating Turing Machines with Only Universal + States", "abstract": null, "venue": "Information and Control", "year": 1982, + "referenceCount": 19, "citationCount": 31, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1982-10-01", "journal": {"name": "Inf. + Control.", "pages": "193-221", "volume": "55"}, "authors": [{"authorId": "1871564", + "name": "A. Ito"}, {"authorId": "1737209", "name": "Katsushi Inoue"}, {"authorId": + "2339053", "name": "I. Takanami"}, {"authorId": "2054314776", "name": "H. + Taniguchi"}]}, {"paperId": "0c1b9afd7b423fa0f324d7fabc83b944ab0aeb8b", "externalIds": + {"DBLP": "journals/tcs/NishimuraO02", "MAG": "2952267410", "ArXiv": "quant-ph/9906095", + "DOI": "10.1016/S0304-3975(01)00111-6", "CorpusId": 789782}, "corpusId": 789782, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/0c1b9afd7b423fa0f324d7fabc83b944ab0aeb8b", + "title": "Computational complexity of uniform quantum circuit families and + quantum Turing machines", "abstract": null, "venue": "Theoretical Computer + Science", "year": 1999, "referenceCount": 37, "citationCount": 62, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1999-06-25", "journal": {"name": "Theor. Comput. Sci.", + "pages": "147-181", "volume": "276"}, "authors": [{"authorId": "1735518", + "name": "H. Nishimura"}, {"authorId": "1744207", "name": "M. Ozawa"}]}, {"paperId": + "cbe5e8eb0f2bb0b372ec7bec43fb16928b4d88af", "externalIds": {"MAG": "2044592439", + "DOI": "10.1007/BF02861799", "CorpusId": 32376858}, "corpusId": 32376858, + "publicationVenue": {"id": "6ae462df-bc8a-44a7-a74d-c6e50a1a7ce9", "name": + "The Botanical review", "type": "journal", "alternate_names": ["Bot rev", + "Bot Rev", "Botanical Review"], "issn": "0006-8101", "url": "http://link.springer.com/journal/volumesAndIssues/12229", + "alternate_urls": ["http://www.jstor.org/action/showPublication?journalCode=botarevi", + "http://www.jstor.org/journals/00068101.html", "https://www.jstor.org/journal/botarevi"]}, + "url": "https://www.semanticscholar.org/paper/cbe5e8eb0f2bb0b372ec7bec43fb16928b4d88af", + "title": "Lichens their biological and economic significance", "abstract": + null, "venue": "The Botanical review", "year": 2008, "referenceCount": 62, + "citationCount": 28, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": + [{"category": "Geography", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "The Botanical Review", "pages": "1-65", "volume": + "10"}, "authors": [{"authorId": "1438210991", "name": "George Albert Perez-Llano"}]}, + {"paperId": "b01ec6cdc5618294ad602ec48cf383ecabc14989", "externalIds": {"DBLP": + "journals/cma/SongZ14", "MAG": "2160613953", "DOI": "10.1016/j.camwa.2014.04.015", + "CorpusId": 206404488}, "corpusId": 206404488, "publicationVenue": {"id": + "635a0827-5219-4c75-84a2-fab5be8f309f", "name": "Computers and Mathematics + with Applications", "type": "journal", "alternate_names": ["Computers & Mathematics + With Applications", "Computers & Mathematics with Applications", "Comput Math + Appl", "Comput Math Appl"], "issn": "0898-1221", "alternate_issns": ["0097-4943"], + "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/301/description#description", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/08981221", + "https://www.journals.elsevier.com/computers-and-mathematics-with-applications/"]}, + "url": "https://www.semanticscholar.org/paper/b01ec6cdc5618294ad602ec48cf383ecabc14989", + "title": "Spatiotemporal dynamics in a diffusive ratio-dependent predator-prey + model near a Hopf-Turing bifurcation point", "abstract": null, "venue": "Computers + and Mathematics with Applications", "year": 2014, "referenceCount": 60, "citationCount": + 62, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2014-06-01", "journal": {"name": "Comput. + Math. Appl.", "pages": "1978-1997", "volume": "67"}, "authors": [{"authorId": + "1794550", "name": "Yongli Song"}, {"authorId": "2634552", "name": "X. Zou"}]}, + {"paperId": "b650a566b21ca7b76b298dcf1811c8aed47cee2e", "externalIds": {"MAG": + "1662868588", "CorpusId": 887688}, "corpusId": 887688, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b650a566b21ca7b76b298dcf1811c8aed47cee2e", "title": "A small fast universal Turing machine", "abstract": "We present a small time-efficient universal Turing machine with 5 states and 6 symbols. This Turing machine simulates our new variant of tag system. It is the smallest known universal Turing machine that simulates Turing machine computations in polynomial time.", "venue": "", "year": 2005, "referenceCount": 28, "citationCount": - 10, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 10, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2221070", + "name": "Turlough Neary"}, {"authorId": "145284748", "name": "D. Woods"}]}, + {"paperId": "f6a055d3ab8f875d076d03560bfdb8d2e18564f5", "externalIds": {"MAG": + "2183171787", "CorpusId": 56135416}, "corpusId": 56135416, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f6a055d3ab8f875d076d03560bfdb8d2e18564f5", + "title": "Simulated temperatures of stored grain bulks", "abstract": "Temperatures + of grain bulks stored near Winnipeg, Canada were simulated using a three-dimensional + heat transfer model to study the influence on the grain temperatures of bin + diameter, grain-bulk height, bin wall material, bin shape, and turning of + the grain with auger. A time lag was observed between the seasonal ambient + temperature and the grain-bulk centre tempera tures. Large diameter bins maintained + warmer centre temperatures than small diameter bins. The influence of heat + transfer from or to the top and bottom of the grain surface on the grain centre + tempera tures was negligible for tall grain bulks. A small-diameter, tall-grain + bulk maintained lower grain temperatures than a large-diameter short-grain + bulk. A white-painted steel bin maintained the lowest temperatures and a galvanized + steel bin gave the highest tempera tures among the bin wall materials studied. + The shape of the bins (circular, rectangular, square) had little influence + on the grain tem peratures. If it is necessary to construct a rectangular + bin in the northernhemisphere, the bin should be placed with its longer dimen + sion in the north-south direction. The simulation results showed that the + north-south orientation would maintain a lower temperature difference between + north and south sides of the grain bulk than an east-west orientation. Turning + grain was effective because it reduced centre grain temperatures by about + 10\u00b0C immediately after turning during winter. Turning had negligible + influence on the grain tem peratures over long periods of storage.", "venue": + "", "year": 1994, "referenceCount": 19, "citationCount": 29, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "2221070", "name": "T. Neary"}, {"authorId": - "145284748", "name": "D. Woods"}]}, {"paperId": "f23fe6a8c396ec1294a99965d55934a576fc2bcb", + "volume": ""}, "authors": [{"authorId": "32161754", "name": "D. Jayas"}, {"authorId": + "5943598", "name": "K. Alagusundaram"}, {"authorId": "12861093", "name": "G. + Shunmugam"}, {"authorId": "47125273", "name": "W. E. Muir"}, {"authorId": + "143767672", "name": "N. White"}]}, {"paperId": "8153bcf8084a8c90d97bd56149d978042fdb023c", + "externalIds": {"MAG": "3081051294", "ArXiv": "1912.04685", "DOI": "10.1103/PhysRevResearch.2.033312", + "CorpusId": 209140489}, "corpusId": 209140489, "publicationVenue": {"id": + "349f119f-f4ee-48cf-aedb-89bcb56ab8e3", "name": "Physical Review Research", + "type": "journal", "alternate_names": ["Phys Rev Res"], "issn": "2643-1564", + "url": "https://journals.aps.org/prresearch"}, "url": "https://www.semanticscholar.org/paper/8153bcf8084a8c90d97bd56149d978042fdb023c", + "title": "Thermodynamic costs of Turing machines", "abstract": "Turing Machines + (TMs) are the canonical model of computation in computer science and physics. + We combine techniques from algorithmic information theory and stochastic thermodynamics + to analyze the thermodynamic costs of TMs. We consider two different ways + of realizing a given TM with a physical process. The first realization is + designed to be thermodynamically reversible when fed with random input bits. + The second realization is designed to generate less heat, up to an additive + constant, than any realization that is computable (i.e., consistent with the + physical Church-Turing thesis). We consider three different thermodynamic + costs: the heat generated when the TM is run on each input (which we refer + to as the \"heat function\"), the minimum heat generated when a TM is run + with an input that results in some desired output (which we refer to as the + \"thermodynamic complexity\" of the output, in analogy to the Kolmogorov complexity), + and the expected heat on the input distribution that minimizes entropy production. + For universal TMs, we show for both realizations that the thermodynamic complexity + of any desired output is bounded by a constant (unlike the conventional Kolmogorov + complexity), while the expected amount of generated heat is infinite. We also + show that any computable realization faces a fundamental tradeoff between + heat generation, the Kolmogorov complexity of its heat function, and the Kolmogorov + complexity of its input-output map. We demonstrate this tradeoff by analyzing + the thermodynamics of erasing a long string.", "venue": "Physical Review Research", + "year": 2019, "referenceCount": 148, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://link.aps.org/pdf/10.1103/PhysRevResearch.2.033312", + "status": "GOLD"}, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2019-12-10", "journal": {"name": + "Physical Review Research"}, "authors": [{"authorId": "1760743", "name": "Artemy + Kolchinsky"}, {"authorId": "1696678", "name": "D. Wolpert"}]}, {"paperId": + "a92bbba06148478e0417eaa648eba0ca7ae84765", "externalIds": {"MAG": "1923653474", + "ArXiv": "1501.05327", "DBLP": "conf/cie/Joosten15", "DOI": "10.1007/978-3-319-20028-6_22", + "CorpusId": 40470957}, "corpusId": 40470957, "publicationVenue": {"id": "ce5f5d49-2807-4aa0-9db3-64a03084444d", + "name": "Conference on Computability in Europe", "type": "conference", "alternate_names": + ["CiE", "CIE", "International Conference on Computers and Industrial Engineering", + "Conf Comput Eur", "Int Conf Comput Ind Eng"], "url": "http://www.illc.uva.nl/CiE/"}, + "url": "https://www.semanticscholar.org/paper/a92bbba06148478e0417eaa648eba0ca7ae84765", + "title": "Turing Jumps Through Provability", "abstract": null, "venue": "Conference + on Computability in Europe", "year": 2015, "referenceCount": 11, "citationCount": + 11, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1501.05327", "status": "GREEN"}, "fieldsOfStudy": + ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-01-21", "journal": {"pages": + "216-225"}, "authors": [{"authorId": "1748961", "name": "J. Joosten"}]}, {"paperId": + "dce99928dc6eaa54c6a0d059aa14faf0617c480c", "externalIds": {"MAG": "1997428507", + "DOI": "10.1088/1751-8113/43/38/382002", "CorpusId": 120179376}, "corpusId": + 120179376, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dce99928dc6eaa54c6a0d059aa14faf0617c480c", + "title": "Reversible arithmetic logic unit for quantum arithmetic", "abstract": + "This communication presents the complete design of a reversible arithmetic + logic unit (ALU) that can be part of a programmable reversible computing device + such as a quantum computer. The presented ALU is garbage free and uses reversible + updates to combine the standard reversible arithmetic and logical operations + in one unit. Combined with a suitable control unit, the ALU permits the construction + of an r-Turing complete computing device. The garbage-free ALU developed in + this communication requires only 6n elementary reversible gates for five basic + arithmetic\u2013logical operations on two n-bit operands and does not use + ancillae. This remarkable low resource consumption was achieved by generalizing + the V-shape design first introduced for quantum ripple-carry adders and nesting + multiple V-shapes in a novel integrated design. This communication shows that + the realization of an efficient reversible ALU for a programmable computing + device is possible and that the V-shape design is a very versatile approach + to the design of quantum networks.", "venue": "", "year": 2010, "referenceCount": + 17, "citationCount": 111, "influentialCitationCount": 10, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-09-24", + "journal": {"name": "Journal of Physics A: Mathematical and Theoretical", + "pages": "382002", "volume": "43"}, "authors": [{"authorId": "10263156", "name": + "Michael Kirkedal Thomsen"}, {"authorId": "1700006", "name": "R. Gl\u00fcck"}, + {"authorId": "1751103", "name": "Holger Bock Axelsen"}]}, {"paperId": "7635ac51a921fd3838942447f7942585468c0297", + "externalIds": {"MAG": "2799120155", "CorpusId": 158527918}, "corpusId": 158527918, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7635ac51a921fd3838942447f7942585468c0297", + "title": "Textbook of Computable General Equilibrium Modeling: Programming + and Simulations", "abstract": "promoting novelty rigor and style in energy + social admittedly a prosaic concept research impact can be roughly divided + into academic and non academic dimensions academic research impact is often + over simplified to mere citations an impactful article is well cited and utilized + by others with citation counts being offered by google scholar scopus or isi + web of science, herbert a simon wikipedia herbert alexander simon june 15 + 1916 february 9 2001 was an american economist political scientist and cognitive + psychologist whose primary research interest was decision making within organizations + and is best known for the theories of bounded rationality and satisficing + he received the nobel prize in economics in 1978 and the turing award in 1975", + "venue": "", "year": 2010, "referenceCount": 0, "citationCount": 114, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], + "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-06-30", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "71262572", "name": "Kenji Gasawa"}, {"authorId": "144921205", "name": "H. + Hashimoto"}, {"authorId": "71439335", "name": "Nobuhiro Hosoe"}]}, {"paperId": + "7aaa3c92f888084577a8c51b41c16d919142af62", "externalIds": {"MAG": "2169214380", + "DBLP": "journals/tifs/DattaLW09", "DOI": "10.1109/TIFS.2009.2022709", "CorpusId": + 1029371}, "corpusId": 1029371, "publicationVenue": {"id": "d406a3f4-dc05-43be-b1f6-812f29de9c0e", + "name": "IEEE Transactions on Information Forensics and Security", "type": + "journal", "alternate_names": ["IEEE Trans Inf Forensics Secur"], "issn": + "1556-6013", "url": "http://www.ieee.org/organizations/society/sp/tifs.html", + "alternate_urls": ["http://ieeexplore.ieee.org/servlet/opac?punumber=10206", + "http://www.signalprocessingsociety.org/publications/periodicals/forensics/"]}, + "url": "https://www.semanticscholar.org/paper/7aaa3c92f888084577a8c51b41c16d919142af62", + "title": "Exploiting the Human\u2013Machine Gap in Image Recognition for Designing + CAPTCHAs", "abstract": "Security researchers have, for a long time, devised + mechanisms to prevent adversaries from conducting automated network attacks, + such as denial-of-service, which lead to significant wastage of resources. + On the other hand, several attempts have been made to automatically recognize + generic images, make them semantically searchable by content, annotate them, + and associate them with linguistic indexes. In the course of these attempts, + the limitations of state-of-the-art algorithms in mimicking human vision have + become exposed. In this paper, we explore the exploitation of this limitation + for potentially preventing automated network attacks. While undistorted natural + images have been shown to be algorithmically recognizable and searchable by + content to moderate levels, controlled distortions of specific types and strengths + can potentially make machine recognition harder without affecting human recognition. + This difference in recognizability makes it a promising candidate for automated + Turing tests [completely automated public Turing test to tell computers and + humans apart (CAPTCHAs)] which can differentiate humans from machines. We + empirically study the application of controlled distortions of varying nature + and strength, and their effect on human and machine recognizability. While + human recognizability is measured on the basis of an extensive user study, + machine recognizability is based on memory-based content-based image retrieval + (CBIR) and matching algorithms. We give a detailed description of our experimental + image CAPTCHA system, IMAGINATION, that uses systematic distortions at its + core. A significant research topic within signal analysis, CBIR is actually + conceived here as a tool for an adversary, so as to help us design more foolproof + image CAPTCHAs.", "venue": "IEEE Transactions on Information Forensics and + Security", "year": 2009, "referenceCount": 44, "citationCount": 50, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-09-01", "journal": + {"name": "IEEE Transactions on Information Forensics and Security", "pages": + "504-518", "volume": "4"}, "authors": [{"authorId": "40490812", "name": "R. + Datta"}, {"authorId": "40116905", "name": "Jia Li"}, {"authorId": "48094094", + "name": "James Ze Wang"}]}, {"paperId": "95a9a349d0b561feabdd2567becc7650cc222577", + "externalIds": {"MAG": "2089781634", "DOI": "10.1021/JP037029K", "CorpusId": + 97706696}, "corpusId": 97706696, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/95a9a349d0b561feabdd2567becc7650cc222577", + "title": "Turing Instability in Inhomogeneous Arrays of Diffusively Coupled + Reactors", "abstract": "We study the competition between the Turing instability + to steady patterns and the Hopf instability to oscillations in diffusively + coupled open reactors. Our approach is based on exact, analytical criteria + for the occurrence of these instabilities in arrays of coupled reactors. We + consider a general two-variable kinetic model that represents an activator\u2212inhibitor + scheme with a complexing agent or substrate for the activator. We apply our + results to the Lengyel\u2212Epstein model of the chlorine dioxide\u2212iodine\u2212malonic + acid reaction. Using symbolic computation software, we derive exact conditions + for the Turing and Hopf bifurcations in small, linear arrays of coupled reactors + with an inhomogeneous concentration profile of the substrate. Our main result + is the determination of the critical substrate concentration profile, above + which the Turing instability occurs before the Hopf instability. This provides + the condition for stationary Turing patterns to be experimentally observable + in arrays of coupled reactors.", "venue": "", "year": 2004, "referenceCount": + 0, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-03-03", + "journal": {"name": "Journal of Physical Chemistry A", "pages": "2225-2231", + "volume": "108"}, "authors": [{"authorId": "3041313", "name": "W. Horsthemke"}, + {"authorId": "47325215", "name": "P. Moore"}]}, {"paperId": "f23fe6a8c396ec1294a99965d55934a576fc2bcb", "externalIds": {"MAG": "2008873677", "DOI": "10.1086/286208", "CorpusId": - 3220531, "PubMed": "18811427"}, "url": "https://www.semanticscholar.org/paper/f23fe6a8c396ec1294a99965d55934a576fc2bcb", + 3220531, "PubMed": "18811427"}, "corpusId": 3220531, "publicationVenue": {"id": + "b0a6943a-4d41-4ca4-af61-d5fcb98eb9f3", "name": "American Naturalist", "type": + "journal", "alternate_names": ["The American Naturalist", "Am Nat"], "issn": + "0003-0147", "url": "http://www.journals.uchicago.edu/an", "alternate_urls": + ["http://www.jstor.org/journals/00030147.html", "https://www.journals.uchicago.edu/loi/an", + "https://www.jstor.org/journal/amernatu"]}, "url": "https://www.semanticscholar.org/paper/f23fe6a8c396ec1294a99965d55934a576fc2bcb", "title": "Leaf Size, Sapling Allometry, and Corner''s Rules: Phylogeny and Correlated Evolution in Maples (Acer)", "abstract": "We studied the evolution of leaf size, sapling canopy allometry, and related traits in 17 Acer species @@ -41296,225 +46769,87 @@ interactions: emphasize the need for integrated theories of evolution and function of these disparate traits.", "venue": "American Naturalist", "year": 1998, "referenceCount": 86, "citationCount": 314, "influentialCitationCount": 31, "isOpenAccess": - false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1998-12-01", "journal": {"name": "The - American Naturalist", "pages": "767 - 791", "volume": "152"}, "authors": [{"authorId": - "2232699", "name": "D. Ackerly"}, {"authorId": "1843807", "name": "M. Donoghue"}]}, - {"paperId": "b01ec6cdc5618294ad602ec48cf383ecabc14989", "externalIds": {"DBLP": - "journals/cma/SongZ14", "MAG": "2160613953", "DOI": "10.1016/j.camwa.2014.04.015", - "CorpusId": 206404488}, "url": "https://www.semanticscholar.org/paper/b01ec6cdc5618294ad602ec48cf383ecabc14989", - "title": "Spatiotemporal dynamics in a diffusive ratio-dependent predator-prey - model near a Hopf-Turing bifurcation point", "abstract": null, "venue": "Computers - and Mathematics with Applications", "year": 2014, "referenceCount": 60, "citationCount": - 60, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-06-01", "journal": {"name": "Comput. Math. Appl.", - "pages": "1978-1997", "volume": "67"}, "authors": [{"authorId": "1794550", - "name": "Yongli Song"}, {"authorId": "2634552", "name": "X. Zou"}]}, {"paperId": - "6b8ecd3a5fb0c2854f8d526a9098c91823631827", "externalIds": {"MAG": "2095587556", - "DOI": "10.1088/0953-8984/16/44/006", "CorpusId": 123307096}, "url": "https://www.semanticscholar.org/paper/6b8ecd3a5fb0c2854f8d526a9098c91823631827", - "title": "Travelling Turing patterns with anomalous diffusion", "abstract": - "We investigate the formation of Turing patterns (arising from a diffusion - driven instability) when diffusion is anomalous. We analyse a model that contains - the important features of Turing systems and that has been extensively used - in the past to model interesting biological patterns. We concentrate on the - case of asymmetric anomalous diffusion, and we cast a version of the model, - suitable for numerical calculations, using a discrete version of the fractional - derivatives defining the anomalous diffusion operator. The results are interesting - in the sense that patterns are no longer stationary but acquire a velocity - that depends on the exponent of the fractional derivatives. Extensive numerical - calculations in one and two dimensions exhibit many of the features predicted - by the analysis of the equations.", "venue": "", "year": 2004, "referenceCount": - 9, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-11-10", "journal": {"name": - "Journal of Physics: Condensed Matter", "volume": "16"}, "authors": [{"authorId": - "70988914", "name": "C. Varea"}, {"authorId": "37747895", "name": "R. Barrio"}]}, - {"paperId": "bd8791c5bd634675b46c86a1db9e388a8515861a", "externalIds": {"MAG": - "937837128", "DOI": "10.1007/978-3-642-85538-2_6", "CorpusId": 60388947}, - "url": "https://www.semanticscholar.org/paper/bd8791c5bd634675b46c86a1db9e388a8515861a", - "title": "Current Research and Future Prospects", "abstract": null, "venue": - "", "year": 1982, "referenceCount": 0, "citationCount": 60, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": - [{"category": "History", "source": "external"}, {"category": "Art", "source": + false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1998-12-01", "journal": + {"name": "The American Naturalist", "pages": "767 - 791", "volume": "152"}, + "authors": [{"authorId": "2232699", "name": "D. Ackerly"}, {"authorId": "1843807", + "name": "M. Donoghue"}]}, {"paperId": "0667aab7ffba43edfefad0384bcb33087289056b", + "externalIds": {"MAG": "2913091558", "DOI": "10.1007/978-1-4419-1452-1_20", + "CorpusId": 14946807}, "corpusId": 14946807, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0667aab7ffba43edfefad0384bcb33087289056b", + "title": "Artificial Consciousness", "abstract": null, "venue": "", "year": + 2007, "referenceCount": 148, "citationCount": 82, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1701881", + "name": "A. Chella"}, {"authorId": "1961635", "name": "R. Manzotti"}]}, {"paperId": + "0cb10007f85ed62a2a3b2704df63cfd3c7bf5425", "externalIds": {"MAG": "1995480413", + "DOI": "10.1039/A705895K", "CorpusId": 17873461}, "corpusId": 17873461, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0cb10007f85ed62a2a3b2704df63cfd3c7bf5425", + "title": "Turing patterns in a single-step autocatalytic reaction", "abstract": + "Stable Turing patterns are presented in the simplest reaction\u2013diffusion + system containing a single autocatalytic step in a continuously fed unstirred + reactor. In the one-variable homogeneous system exhibiting only bistability, + the spatial instability arises from the decoupling of the species by unequal + diffusion. The results suggest the possibility of experimentally finding Turing + instability among the relatively common bistable chemical systems.", "venue": + "", "year": 1997, "referenceCount": 10, "citationCount": 15, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.math.wm.edu/~shij/math490-2006/research/Horvath-Toth.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "pages": "130-137", "volume": ""}, "authors": [{"authorId": "145245580", - "name": "D. Levy"}, {"authorId": "11151580", "name": "M. Newborn"}]}, {"paperId": - "7635ac51a921fd3838942447f7942585468c0297", "externalIds": {"MAG": "2799120155", - "CorpusId": 158527918}, "url": "https://www.semanticscholar.org/paper/7635ac51a921fd3838942447f7942585468c0297", - "title": "Textbook of Computable General Equilibrium Modeling: Programming - and Simulations", "abstract": "promoting novelty rigor and style in energy - social admittedly a prosaic concept research impact can be roughly divided - into academic and non academic dimensions academic research impact is often - over simplified to mere citations an impactful article is well cited and utilized - by others with citation counts being offered by google scholar scopus or isi - web of science, herbert a simon wikipedia herbert alexander simon june 15 - 1916 february 9 2001 was an american economist political scientist and cognitive - psychologist whose primary research interest was decision making within organizations - and is best known for the theories of bounded rationality and satisficing - he received the nobel prize in economics in 1978 and the turing award in 1975", - "venue": "", "year": 2010, "referenceCount": 0, "citationCount": 114, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-06-30", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "71262572", - "name": "Kenji Gasawa"}, {"authorId": "144921205", "name": "H. Hashimoto"}, - {"authorId": "71439335", "name": "Nobuhiro Hosoe"}]}, {"paperId": "0c1b9afd7b423fa0f324d7fabc83b944ab0aeb8b", - "externalIds": {"DBLP": "journals/tcs/NishimuraO02", "MAG": "2952267410", - "ArXiv": "quant-ph/9906095", "DOI": "10.1016/S0304-3975(01)00111-6", "CorpusId": - 789782}, "url": "https://www.semanticscholar.org/paper/0c1b9afd7b423fa0f324d7fabc83b944ab0aeb8b", - "title": "Computational complexity of uniform quantum circuit families and - quantum Turing machines", "abstract": null, "venue": "Theoretical Computer - Science", "year": 1999, "referenceCount": 37, "citationCount": 61, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Physics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1999-06-25", "journal": {"name": "Theor. Comput. Sci.", "pages": "147-181", - "volume": "276"}, "authors": [{"authorId": "1735518", "name": "H. Nishimura"}, - {"authorId": "1744207", "name": "M. Ozawa"}]}, {"paperId": "829c2349c6d7ce5af4f9c49a5e35b4f7dc05fa5f", - "externalIds": {"MAG": "2911379327", "DBLP": "journals/ijet/Elmqaddem19", - "DOI": "10.3991/IJET.V14I03.9289", "CorpusId": 86674075}, "url": "https://www.semanticscholar.org/paper/829c2349c6d7ce5af4f9c49a5e35b4f7dc05fa5f", - "title": "Augmented Reality and Virtual Reality in Education. Myth or Reality?", - "abstract": "Augmented Reality and Virtual Reality are not new technologies. - But several constraints prevented their actual adoption. Recent technological - progresses added to the proliferation of affordable hardware and software - have made AR and VR more viable and desirable in many domains, including educa-tion; - they have been relaunched with new promises previously unimaginable. The nature - of AR and VR promises new teaching and learning models that better meet the - needs of the 21st century learner. We\u2019re now on a path to re-invent education. - \nThis work consists of explaining the reasons behind the new rise of AR and - VR and why their actual adoption in education will be a reality in a near - fu-ture.", "venue": "International Journal of Emerging Technologies in Learning - (iJET)", "year": 2019, "referenceCount": 12, "citationCount": 114, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-02-14", "journal": {"name": "Int. J. Emerg. Technol. - Learn.", "pages": "234-242", "volume": "14"}, "authors": [{"authorId": "81249066", - "name": "Noureddine Elmqaddem"}]}, {"paperId": "de326d37f80d13b519e1db63960344729728c523", - "externalIds": {"MAG": "1709275931", "DBLP": "conf/eurocal/Schonhage82", "DOI": - "10.1007/3-540-11607-9_1", "CorpusId": 35937564}, "url": "https://www.semanticscholar.org/paper/de326d37f80d13b519e1db63960344729728c523", - "title": "Asymptotically Fast Algorithms for the Numerical Multiplication - and Division of Polynomials with Complex Coeficients", "abstract": null, "venue": - "EUROCAM", "year": 1982, "referenceCount": 5, "citationCount": 108, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + {"name": "Journal of the Chemical Society, Faraday Transactions", "pages": + "4301-4303", "volume": "93"}, "authors": [{"authorId": "143724284", "name": + "D. Horv\u00e1th"}, {"authorId": "117753463", "name": "A. T\u00f3th"}]}, {"paperId": + "558e7c5b83a526c1ad9970c82c9c8270a19b40df", "externalIds": {"DBLP": "journals/fss/BedregalF08", + "MAG": "1999167901", "DOI": "10.1016/j.fss.2007.10.013", "CorpusId": 2922068}, + "corpusId": 2922068, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/558e7c5b83a526c1ad9970c82c9c8270a19b40df", + "title": "On the computing power of fuzzy Turing machines", "abstract": null, + "venue": "Fuzzy Sets Syst.", "year": 2008, "referenceCount": 42, "citationCount": + 30, "influentialCitationCount": 7, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1982-04-05", "journal": - {"pages": "3-15"}, "authors": [{"authorId": "1764338", "name": "A. Sch\u00f6nhage"}]}, - {"paperId": "41cf2723fd634f557b74129780d4a773043e4f54", "externalIds": {"MAG": - "2607187675", "DOI": "10.1007/S11071-017-3517-Y", "CorpusId": 125627559}, - "url": "https://www.semanticscholar.org/paper/41cf2723fd634f557b74129780d4a773043e4f54", - "title": "Pattern formation in a system involving prey\u2013predation, competition - and commensalism", "abstract": null, "venue": "", "year": 2017, "referenceCount": - 64, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2017-04-12", "journal": {"name": - "Nonlinear Dynamics", "pages": "1309-1326", "volume": "89"}, "authors": [{"authorId": - "153079186", "name": "S. Ghorai"}, {"authorId": "1927557", "name": "S. Poria"}]}, - {"paperId": "0ac6c7a342c354d30816a6e6fb1d0a0b510e1936", "externalIds": {"DBLP": - "journals/neco/PanWH12", "MAG": "2095430864", "DOI": "10.1162/NECO_a_00238", - "CorpusId": 869006, "PubMed": "22091670"}, "url": "https://www.semanticscholar.org/paper/0ac6c7a342c354d30816a6e6fb1d0a0b510e1936", - "title": "Spiking Neural P Systems with Astrocytes", "abstract": "In a biological - nervous system, astrocytes play an important role in the functioning and interaction - of neurons, and astrocytes have excitatory and inhibitory influence on synapses. - In this work, with this biological inspiration, a class of computation devices - that consist of neurons and astrocytes is introduced, called spiking neural - P systems with astrocytes (SNPA systems). The computation power of SNPA systems - is investigated. It is proved that SNPA systems with simple neurons (all neurons - have the same rule, one per neuron, of a very simple form) are Turing universal - in both generative and accepting modes. If a bound is given on the number - of spikes present in any neuron along a computation, then the computation - power of SNPA systems is diminished. In this case, a characterization of semilinear - sets of numbers is obtained.", "venue": "Neural Computation", "year": 2012, - "referenceCount": 26, "citationCount": 112, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-03-01", "journal": - {"name": "Neural Computation", "pages": "805-825", "volume": "24"}, "authors": - [{"authorId": "7356533", "name": "L. Pan"}, {"authorId": "2152810851", "name": - "Jun Wang"}, {"authorId": "1806151", "name": "H. J. Hoogeboom"}]}, {"paperId": - "7ff69b77912ffb1c05072a8bd89502c9b1f30739", "externalIds": {"MAG": "2081655475", - "DOI": "10.14219/JADA.ARCHIVE.1951.0055", "CorpusId": 1689015, "PubMed": "14803190"}, - "url": "https://www.semanticscholar.org/paper/7ff69b77912ffb1c05072a8bd89502c9b1f30739", - "title": "Direct resinous filling materials: temperature rise during polymerization.", - "abstract": "The investigation of the direct resinous filling materials used - primarily in place of silicate cement is one of the major projects in the - cooperative research program on dental materials at the National Bureau of - Standards. This report on the tempera\u00ad ture rise of direct resinous filling - materials during polymerization contains the trade brand names of the materials - investigated. Likewise, the manufacturer\u2019s batch number is listed when - present. The data are applicable only to those specific batches mentioned.", - "venue": "The Journal of the American Dental Association (1939)", "year": - 1951, "referenceCount": 1, "citationCount": 44, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1951-03-01", "journal": {"name": "Journal of the American Dental Association", - "pages": "\n 253-63\n ", "volume": "42 3"}, "authors": [{"authorId": - "80371514", "name": "R. B. Wolcott"}, {"authorId": "11811191", "name": "G. - Paffenbarger"}, {"authorId": "17006364", "name": "I. Schoonover"}]}, {"paperId": - "56e983f3f7ebe1fea9fe3e4119a1ff21aa69a29a", "externalIds": {"MAG": "2085363743", - "DOI": "10.1007/S11071-013-0935-3", "CorpusId": 123047329}, "url": "https://www.semanticscholar.org/paper/56e983f3f7ebe1fea9fe3e4119a1ff21aa69a29a", - "title": "Spatial dynamics of a vegetation model in an arid flat environment", - "abstract": null, "venue": "", "year": 2013, "referenceCount": 38, "citationCount": - 31, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2013-05-10", "journal": {"name": "Nonlinear Dynamics", - "pages": "2207-2219", "volume": "73"}, "authors": [{"authorId": "47334108", - "name": "Gui\u2010Quan Sun"}, {"authorId": "47681666", "name": "L. R. Li"}, - {"authorId": "2116461669", "name": "Zi-Ke Zhang"}]}, {"paperId": "11890f6c5b19b19473746a9c9254c2a19a45a967", - "externalIds": {"MAG": "2787544901", "DOI": "10.1140/EPJP/I2018-11886-2", - "CorpusId": 125177932}, "url": "https://www.semanticscholar.org/paper/11890f6c5b19b19473746a9c9254c2a19a45a967", - "title": "Modelling and formation of spatiotemporal patterns of fractional - predation system in subdiffusion and superdiffusion scenarios", "abstract": - null, "venue": "", "year": 2018, "referenceCount": 55, "citationCount": 30, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2018-02-12", "journal": {"name": "The European Physical - Journal Plus", "pages": "1-13", "volume": "133"}, "authors": [{"authorId": - "2079187", "name": "K. M. Owolabi"}, {"authorId": "2389607", "name": "A. Atangana"}]}, - {"paperId": "37ce9ed6a937d42992dd27770b017456ce10f515", "externalIds": {"MAG": - "2320090131", "DOI": "10.1021/jp500432t", "CorpusId": 29676424, "PubMed": - "24601764"}, "url": "https://www.semanticscholar.org/paper/37ce9ed6a937d42992dd27770b017456ce10f515", - "title": "Target Turing patterns and growth dynamics in the chlorine dioxide-iodine-malonic - acid reaction.", "abstract": "We study the growth dynamics of Turing patterns - in the chlorine dioxide-iodine-malonic acid reaction-diffusion system in response - to perturbations with visible light. We describe several mechanisms by which - Turing patterns reappear after they are suppressed by illumination with a - disc-shaped geometry. We observe that under specific conditions the patterns - reorganize from a random configuration of spots and stripes to a set of ordered, - concentric rings, which we refer to as target Turing patterns. These patterns - closely resemble the unit cells of the Turing hexagonal superlattices known - as black eye patterns. However, these target Turing patterns are not part - of a larger superlattice structure, and they usually have a larger number - of concentric rings. Numerical simulations support the experimental findings.", - "venue": "Journal of Physical Chemistry A", "year": 2014, "referenceCount": - 32, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-03-19", "journal": {"name": "The - journal of physical chemistry. A", "pages": "\n 2393-400\n ", - "volume": "118 13"}, "authors": [{"authorId": "66625795", "name": "Asher Preska - Steinberg"}, {"authorId": "144854275", "name": "I. Epstein"}, {"authorId": - "4978913", "name": "M. Dolnik"}]}, {"paperId": "a5c1f144c009d3c9f60ef11de6dfd87d6729075c", - "externalIds": {"MAG": "207541529", "CorpusId": 40722227, "PubMed": "4179624"}, - "url": "https://www.semanticscholar.org/paper/a5c1f144c009d3c9f60ef11de6dfd87d6729075c", + "2008-05-01", "journal": {"name": "Fuzzy Sets Syst.", "pages": "1072-1083", + "volume": "159"}, "authors": [{"authorId": "10079486", "name": "B. Bedregal"}, + {"authorId": "1743296", "name": "S. Figueira"}]}, {"paperId": "f520f751438659c03b00eee6adedc2f474fbedcb", + "externalIds": {"MAG": "2169705370", "DOI": "10.1111/J.1365-2907.2005.00053.X", + "CorpusId": 52237486}, "corpusId": 52237486, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f520f751438659c03b00eee6adedc2f474fbedcb", + "title": "The response of mammals to forest fire and timber harvest in the + North American boreal forest", "abstract": "This paper reviews and compares + the effects of forest fire and timber harvest on mamma- lian abundance and + diversity, throughout successional time in the boreal forest of North America. + 2. Temporal trends in mammal abundance and diversity are generally similar + for both harvested and burned stands, with some differences occurring in the + initiation stage (0- 10 years post disturbance). 3. Small mammals and ungulates + are most abundant immediately post disturbance, and decrease as stands age. + Lynxes and hares utilize mid-successional stands, but are rare in young and + old stands. Bats, arboreal sciurids and mustelids increase in abundance with + stand age, and are most abundant in old growth. 4. Substantial gaps in the + data exist for carnivores; the response of these species to fire and harvest + requires research, as predator-prey interactions can affect mammal community + struc- ture in both early and late successional stages. 5. The lack of explicit + treatment of in-stand forest structure post disturbance, in the reviewed literature + made comparisons difficult. Where forest structure was considered, the presence + of downed woody material, live residual trees and standing dead wood were + shown to facilitate convergence of mammal communities to a pre-disturbance + state for both disturbance types. 6. Mammalian assemblages differed considerably + between successional stages, emphasizing the importance of maintaining stands + of each successional stage on the landscape when implementing forest management + strategies.", "venue": "", "year": 2005, "referenceCount": 222, "citationCount": + 344, "influentialCitationCount": 29, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "Mammal Review", "pages": "51-81", "volume": "35"}, "authors": [{"authorId": + "3062752", "name": "J. Fisher"}, {"authorId": "145111478", "name": "Lisa. + Wilkinson"}]}, {"paperId": "a5c1f144c009d3c9f60ef11de6dfd87d6729075c", "externalIds": + {"MAG": "207541529", "CorpusId": 40722227, "PubMed": "4179624"}, "corpusId": + 40722227, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a5c1f144c009d3c9f60ef11de6dfd87d6729075c", "title": "Immunologic studies concerning the pulmonary lesions in Goodpasture''s syndrome.", "abstract": "GOODPASTURE''S SY1NDROME defines a unique form of glomerulonephritis which is initiated by pulmonary hemorrhages followed by @@ -41531,27 +46866,59 @@ interactions: alveolar septal basement membranes. compares the specificities membrane antibodies eluted renal glomeruli.", "venue": "The American journal of pathology", "year": 1969, "referenceCount": 19, "citationCount": 113, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1969-02-01", "journal": {"name": "The American journal - of pathology", "pages": "\n 293-305\n ", "volume": "54 2"}, - "authors": [{"authorId": "6992749", "name": "D. Koffler"}, {"authorId": "4429307", - "name": "J. Sandson"}, {"authorId": "143873583", "name": "R. Carr"}, {"authorId": - "4331313", "name": "H. Kunkel"}]}, {"paperId": "a66a766cdf665ffec87cd605e308061e3890425c", - "externalIds": {"DBLP": "conf/sofsem/Gurevich12", "MAG": "2149203488", "DOI": - "10.1007/978-3-642-27660-6_3", "CorpusId": 215754100}, "url": "https://www.semanticscholar.org/paper/a66a766cdf665ffec87cd605e308061e3890425c", - "title": "What Is an Algorithm?", "abstract": null, "venue": "Conference on - Current Trends in Theory and Practice of Informatics", "year": 2012, "referenceCount": - 23, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-21", "journal": - {"pages": "31-42"}, "authors": [{"authorId": "1721396", "name": "Y. Gurevich"}]}, - {"paperId": "181a9a333cd93fa69ddec3d2272fcbd5d4c95296", "externalIds": {"MAG": - "2078669059", "ArXiv": "1404.7111", "DOI": "10.1103/PhysRevLett.113.258104", - "CorpusId": 9650798, "PubMed": "25554911"}, "url": "https://www.semanticscholar.org/paper/181a9a333cd93fa69ddec3d2272fcbd5d4c95296", + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Biology"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1969-02-01", "journal": {"name": "The + American journal of pathology", "pages": "\n 293-305\n ", + "volume": "54 2"}, "authors": [{"authorId": "6992749", "name": "D. Koffler"}, + {"authorId": "4429307", "name": "J. Sandson"}, {"authorId": "143873583", "name": + "R. Carr"}, {"authorId": "4331313", "name": "H. Kunkel"}]}, {"paperId": "6e06d154b5a1244e9df6c37ce4e0abe2de9141dd", + "externalIds": {"DBLP": "journals/jcss/PaulR81", "MAG": "1989122074", "DOI": + "10.1016/0022-0000(81)90035-0", "CorpusId": 46476419}, "corpusId": 46476419, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e06d154b5a1244e9df6c37ce4e0abe2de9141dd", + "title": "On Time versus Space II. (Turing Machines)", "abstract": null, "venue": + "J. Comput. Syst. Sci.", "year": 1981, "referenceCount": 11, "citationCount": + 20, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1981-06-01", "journal": + {"name": "J. Comput. Syst. Sci.", "pages": "312-327", "volume": "22"}, "authors": + [{"authorId": "1727613", "name": "W. Paul"}, {"authorId": "2715951", "name": + "R. Reischuk"}]}, {"paperId": "bd3395d68d4d12a3fc40010f28575fe8c6b4df5e", + "externalIds": {"MAG": "1976341638", "DOI": "10.3144/EXPRESSPOLYMLETT.2009.53", + "CorpusId": 53458675}, "corpusId": 53458675, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bd3395d68d4d12a3fc40010f28575fe8c6b4df5e", + "title": "Electrospinning of polyacrylonitrile (PAN) solution: Effect of conductive + additive and filler on the process", "abstract": "Electrospinning utilizes + electric forces and hence the electrical properties of the solution have an + effect the process. The study examined the effect of conductive additive and + filler on the electrospinning process with polyacryloni- trile (PAN). Electrospinning + trials were performed using a pure PAN solution, a salt-containing solution, + and a solution containing carbon nanotubes (CNTs). Different nozzle sizes + were used, and the spinning voltage and distance were also varied. The composition + of the solution had a greater effect on fibre diameter than varying the process + parameters. Conduc- tivity of the solution increased the probability of process + problems such as the formation of three-dimensional (3D) struc- tures and + the occurrence of larger, micro-sized fibres. When the viscosity of the solution + was increased, as was the case with the PAN/CNT solution, the severity of + the problems became less acute than with the PAN/Salt solution.", "venue": + "", "year": 2009, "referenceCount": 50, "citationCount": 112, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Express + Polymer Letters", "pages": "437-445", "volume": "3"}, "authors": [{"authorId": + "2703915", "name": "P. Heikkil\u00e4"}, {"authorId": "91871197", "name": "A. + Harlin"}]}, {"paperId": "181a9a333cd93fa69ddec3d2272fcbd5d4c95296", "externalIds": + {"MAG": "2078669059", "ArXiv": "1404.7111", "DOI": "10.1103/PhysRevLett.113.258104", + "CorpusId": 9650798, "PubMed": "25554911"}, "corpusId": 9650798, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/181a9a333cd93fa69ddec3d2272fcbd5d4c95296", "title": "Vortex arrays and mesoscale turbulence of self-propelled particles.", "abstract": "Inspired by the Turing mechanism for pattern formation, we propose a simple self-propelled particle model with short-range alignment and antialignment @@ -41564,70 +46931,304 @@ interactions: these continuum equations. Microscopic Langevin simulations of self-propelled particles are in agreement with these findings.", "venue": "Physical Review Letters", "year": 2014, "referenceCount": 17, "citationCount": 63, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1404.7111", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2014-04-28", "journal": {"name": "Physical review letters", "pages": "\n 258104\n ", "volume": "113 25"}, "authors": [{"authorId": "48045965", "name": "R. Gro\u00dfmann"}, {"authorId": "4668280", "name": "P. Romanczuk"}, {"authorId": "31749331", "name": "M. B\u00e4r"}, - {"authorId": "1400946717", "name": "L. Schimansky-Geier"}]}, {"paperId": "95a9a349d0b561feabdd2567becc7650cc222577", - "externalIds": {"MAG": "2089781634", "DOI": "10.1021/JP037029K", "CorpusId": - 97706696}, "url": "https://www.semanticscholar.org/paper/95a9a349d0b561feabdd2567becc7650cc222577", - "title": "Turing Instability in Inhomogeneous Arrays of Diffusively Coupled - Reactors", "abstract": "We study the competition between the Turing instability - to steady patterns and the Hopf instability to oscillations in diffusively - coupled open reactors. Our approach is based on exact, analytical criteria - for the occurrence of these instabilities in arrays of coupled reactors. We - consider a general two-variable kinetic model that represents an activator\u2212inhibitor - scheme with a complexing agent or substrate for the activator. We apply our - results to the Lengyel\u2212Epstein model of the chlorine dioxide\u2212iodine\u2212malonic - acid reaction. Using symbolic computation software, we derive exact conditions - for the Turing and Hopf bifurcations in small, linear arrays of coupled reactors - with an inhomogeneous concentration profile of the substrate. Our main result - is the determination of the critical substrate concentration profile, above - which the Turing instability occurs before the Hopf instability. This provides - the condition for stationary Turing patterns to be experimentally observable - in arrays of coupled reactors.", "venue": "", "year": 2004, "referenceCount": - 0, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-03-03", "journal": {"name": - "Journal of Physical Chemistry A", "pages": "2225-2231", "volume": "108"}, - "authors": [{"authorId": "3041313", "name": "W. Horsthemke"}, {"authorId": - "47325215", "name": "P. Moore"}]}, {"paperId": "f6a055d3ab8f875d076d03560bfdb8d2e18564f5", - "externalIds": {"MAG": "2183171787", "CorpusId": 56135416}, "url": "https://www.semanticscholar.org/paper/f6a055d3ab8f875d076d03560bfdb8d2e18564f5", - "title": "Simulated temperatures of stored grain bulks", "abstract": "Temperatures - of grain bulks stored near Winnipeg, Canada were simulated using a three-dimensional - heat transfer model to study the influence on the grain temperatures of bin - diameter, grain-bulk height, bin wall material, bin shape, and turning of - the grain with auger. A time lag was observed between the seasonal ambient - temperature and the grain-bulk centre tempera tures. Large diameter bins maintained - warmer centre temperatures than small diameter bins. The influence of heat - transfer from or to the top and bottom of the grain surface on the grain centre - tempera tures was negligible for tall grain bulks. A small-diameter, tall-grain - bulk maintained lower grain temperatures than a large-diameter short-grain - bulk. A white-painted steel bin maintained the lowest temperatures and a galvanized - steel bin gave the highest tempera tures among the bin wall materials studied. - The shape of the bins (circular, rectangular, square) had little influence - on the grain tem peratures. If it is necessary to construct a rectangular - bin in the northernhemisphere, the bin should be placed with its longer dimen - sion in the north-south direction. The simulation results showed that the - north-south orientation would maintain a lower temperature difference between - north and south sides of the grain bulk than an east-west orientation. Turning - grain was effective because it reduced centre grain temperatures by about - 10\u00b0C immediately after turning during winter. Turning had negligible - influence on the grain tem peratures over long periods of storage.", "venue": - "", "year": 1994, "referenceCount": 19, "citationCount": 29, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "32161754", - "name": "D. Jayas"}, {"authorId": "5943598", "name": "K. Alagusundaram"}, - {"authorId": "12861093", "name": "G. Shunmugam"}, {"authorId": "47125273", - "name": "W. E. Muir"}, {"authorId": "143767672", "name": "N. White"}]}, {"paperId": - "90632fb231487d23935eb860061bef69ac955d1c", "externalIds": {"MAG": "2170247323", - "DOI": "10.1590/S0103-97332004000300006", "CorpusId": 14871706}, "url": "https://www.semanticscholar.org/paper/90632fb231487d23935eb860061bef69ac955d1c", + {"authorId": "1400946717", "name": "L. Schimansky-Geier"}]}, {"paperId": "5362fb42c7b7aca154d6ced7b17834c42dafd1bb", + "externalIds": {"CorpusId": 11341818}, "corpusId": 11341818, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5362fb42c7b7aca154d6ced7b17834c42dafd1bb", + "title": "Moral Machines and the Threat of Ethical Nihilism", "abstract": + "In his famous 1950 paper where he presents what became the benchmark for + success in artificial intelligence, Turing notes that \"at the end of the + century the use of words and general educated opinion will have altered so + much that one will be able to speak of machines thinking without expecting + to be contradicted\" (Turing 1950, 442). Kurzweil (1990) suggests that Turing''s + prediction was correct, even if no machine has yet to pass the Turing Test. + In the wake of the computer revolution, research in artificial intelligence + and cognitive science has pushed in the direction of interpreting \"thinking\" + as some sort of computational process. On this understanding, thinking is + something computers (in principle) and humans (in practice) can both do. It + is difficult to say precisely when in history the meaning of the term \"thinking\" + headed in this direction. Signs are already present in the mechanistic and + mathematical tendencies of the early Modern period, and maybe even glimmers + are apparent in the ancient Greeks themselves. But over the long haul, we + somehow now consider \"thinking\" as separate from the categories of \"thoughtfulness\" + (in the general sense of wondering about things), \"insight\" and \"wisdom.\" + Intelligent machines are all around us, and the world is populated with smart + cars, smart phones and even smart (robotic) appliances. But, though my cell + phone might be smart, I do not take that to mean that it is thoughtful, insightful + or wise. So, what has become of these latter categories? They seem to be by-gones + left behind by scientific and computational conceptions of thinking and knowledge + that no longer have much use for them. In 2000, Allen, Varner and Zinser addressed + the possibility of a Moral Turing Test (MTT) to judge the success of an automated + moral agent (AMA), a theme that is repeated in Wallach and Allen (2009). While + the authors are careful to note that a language-only test based on moral justifications, + or reasons, would be inadequate, they consider a test based on moral behavior. + \" One way to shift the focus from reasons to actions, \" they write, \" might + be to restrict the information available to the human judge in some way. Suppose + the human judge in the MTT is provided with descriptions of actual, morally + significant actions of a human and an AMA, purged of all references that would + identify the agents. If the judge correctly identifies the machine at a \u2026", + "venue": "", "year": 2010, "referenceCount": 22, "citationCount": 27, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2425949", + "name": "Anthony F. Beavers"}]}, {"paperId": "2546e5c71929aa5e1a554f2a1cf70feaac2e53b1", + "externalIds": {"CorpusId": 5907308}, "corpusId": 5907308, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2546e5c71929aa5e1a554f2a1cf70feaac2e53b1", + "title": "Intelligent machinery . National Physical Laboratory Report ( 1948 + ) Universal Turing Machine", "abstract": "Superpages and expert systems, while + key in theory, have not until recently been considered significant. After + years of practical research into A* search, we disconfirm the evaluation of + SMPs, which embodies the private principles of cryptography. In order to accomplish + this mission, we use client-server models to prove that hierarchical databases + and model checking are regularly incompatible .", "venue": "", "year": null, + "referenceCount": 154, "citationCount": 5, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2087393471", + "name": "Universal Turing"}, {"authorId": "2087368940", "name": "Machine R + I P"}]}, {"paperId": "82b3346080783031ddaf73e6df73b5302ca19248", "externalIds": + {"DBLP": "conf/uss/DaviSLM14", "MAG": "1631846088", "CorpusId": 17128285}, + "corpusId": 17128285, "publicationVenue": {"id": "54649c1d-6bcc-4232-9cd1-aa446867b8d0", + "name": "USENIX Security Symposium", "type": "conference", "alternate_names": + ["USENIX Secur Symp"], "url": "http://www.usenix.org/events/bytopic/security.html"}, + "url": "https://www.semanticscholar.org/paper/82b3346080783031ddaf73e6df73b5302ca19248", + "title": "Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained + Control-Flow Integrity Protection", "abstract": "Return-oriented programming + (ROP) offers a robust attack technique that has, not surprisingly, been extensively + used to exploit bugs in modern software programs (e.g., web browsers and PDF + readers). ROP attacks require no code injection, and have already been shown + to be powerful enough to bypass fine-grained memory randomization (ASLR) defenses. + To counter this ingenious attack strategy, several proposals for enforcement + of (coarse-grained) control-flow integrity (CFI) have emerged. The key argument + put forth by these works is that coarse-grained CFI policies are sufficient + to prevent ROP attacks. As this reasoning has gained traction, ideas put forth + in these proposals have even been incorporated into coarse-grained CFI defenses + in widely adopted tools (e.g., Microsoft''s EMET framework). \n \nIn this + paper, we provide the first comprehensive security analysis of various CFI + solutions (covering kBouncer, ROPecker, CFI for COTS binaries, ROP-Guard, + and Microsoft EMET 4.1). A key contribution is in demonstrating that these + techniques can be effectively undermined, even under weak adversarial assumptions. + More specifically, we show that with bare minimum assumptions, turing-complete + and real-world ROP attacks can still be launched even when the strictest of + enforcement policies is in use. To do so, we introduce several new ROP attack + primitives, and demonstrate the practicality of our approach by transforming + existing real-world exploits into more stealthy attacks that bypass coarse-grained + CFI defenses.", "venue": "USENIX Security Symposium", "year": 2014, "referenceCount": + 54, "citationCount": 316, "influentialCitationCount": 34, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-08-20", "journal": {"pages": "401-416"}, "authors": + [{"authorId": "2597368", "name": "Lucas Davi"}, {"authorId": "145897166", + "name": "A. Sadeghi"}, {"authorId": "49319703", "name": "Daniel Lehmann"}, + {"authorId": "1792232", "name": "F. Monrose"}]}, {"paperId": "71bfcb7857bc8127093b8a7c0189312e33d738c7", + "externalIds": {"DBLP": "conf/tcs/BraunmuhlV79", "MAG": "1520726113", "DOI": + "10.1007/3-540-09118-1_11", "CorpusId": 30987436}, "corpusId": 30987436, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/71bfcb7857bc8127093b8a7c0189312e33d738c7", + "title": "Finite-Change Automata", "abstract": null, "venue": "Theoretical + Computer Science", "year": 1979, "referenceCount": 4, "citationCount": 15, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1979-03-26", "journal": + {"pages": "91-100"}, "authors": [{"authorId": "1760747", "name": "Burchard + von Braunm\u00fchl"}, {"authorId": "144927465", "name": "R. Verbeek"}]}, {"paperId": + "ebf59e2e610d4cf0415996a1206e19eb4ec60e32", "externalIds": {"MAG": "3158339900", + "DOI": "10.1140/EPJP/S13360-021-01489-7", "CorpusId": 235576349}, "corpusId": + 235576349, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ebf59e2e610d4cf0415996a1206e19eb4ec60e32", + "title": "Spatiotemporal behavior in a predator\u2013prey model with herd + behavior and cross-diffusion and fear effect", "abstract": null, "venue": + "", "year": 2021, "referenceCount": 68, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2021-05-01", "journal": {"name": "European Physical Journal Plus", "pages": + "1-21", "volume": "136"}, "authors": [{"authorId": "151004204", "name": "Fethi + Souna"}, {"authorId": "103679695", "name": "S. Djilali"}, {"authorId": "6489957", + "name": "Abdelkader Lakmeche"}]}, {"paperId": "9fcd8b156eee2be36967db2558cc697e81db7854", + "externalIds": {"CorpusId": 37505683}, "corpusId": 37505683, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9fcd8b156eee2be36967db2558cc697e81db7854", + "title": "Continual Learning through Evolvable Neural Turing Machines", "abstract": + "Continual learning, i.e. the ability to sequentially learn tasks without + catastrophic forgetting of previously learned ones, is an important open challenge + in machine learning. In this paper we take a step in this direction by showing + that the recently proposed Evolving Neural Turing Machine (ENTM) approach + is able to perform one-shot learning in a reinforcement learning task without + catastrophic forgetting of previously stored associations.", "venue": "", + "year": 2016, "referenceCount": 15, "citationCount": 16, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "50170159", + "name": "Benno L\u00fcders"}, {"authorId": "9936023", "name": "Mikkel Schl\u00e4ger"}, + {"authorId": "1745664", "name": "S. Risi"}]}, {"paperId": "d8698d8b512451e2ff57fe1ba683276a82a39147", + "externalIds": {"MAG": "2014691151", "DOI": "10.2307/4089332", "CorpusId": + 84542003}, "corpusId": 84542003, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d8698d8b512451e2ff57fe1ba683276a82a39147", + "title": "EVOLUTION OF FORAGING STRATEGIES IN SHOREBIRDS: AN ECOMORPHOLOGICAL + APPROACH", "abstract": "We studied the relationships between bill and hindlimb + morphology and for- aging behavior in 17 species of shorebirds within a phylogenetic + framework. The results show that the evolutionary change in bill length is + related to the evolutionary change in for- aging strategies from visual hunting + to tactile hunting. We also found evolutionary rela- tionships between an + increase in bill length and both plunging and sweeping foraging move- ments, + and a decrease in bill length and \"routing\" behavior. No relationships were + found between hindlimb morphology and movement pattern (continuous hunting + species vs. pause-travel species). Examining the evolutionary rate of change + in bill and hindlimb struc- tures shows that the family Scolopacidae and the + subfamily Recurvirostrinae evolved more rapidly than the species of Charadriinae. + Results from our ecomorphological and evolution- ary analysis support the + hypothesis by Zweers and co-workers on the evolution of feeding", "venue": + "", "year": 1999, "referenceCount": 50, "citationCount": 107, "influentialCitationCount": + 6, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/auk/article-pdf/116/3/712/28167999/auk0712.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1999-07-01", "journal": {"name": + "The Auk", "pages": "712-725", "volume": "116"}, "authors": [{"authorId": + "2172481", "name": "A. Barbosa"}, {"authorId": "47890872", "name": "E. Moreno"}]}, + {"paperId": "7a07117b3f7bbd61d5ddc4c9e33987d4a0050c83", "externalIds": {"DBLP": + "conf/stoc/Kaltofen82", "MAG": "2020327259", "DOI": "10.1145/800070.802200", + "CorpusId": 16661058}, "corpusId": 16661058, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/7a07117b3f7bbd61d5ddc4c9e33987d4a0050c83", + "title": "A polynomial reduction from multivariate to bivariate integral polynomial + factorization.", "abstract": "Given an arbitrary but fixed integer r -&-ge; + 3. We show that testing r-variate polynomials with integer coefficients for + irreducibility is m-reducible in polynomial time of the total degree and the + largest coefficient length to testing bivariate polynomials for irreducibility. + Factoring r-variate polynomials into irreducibles is polynomial time Turing-reducible + to completely factoring bivariate polynomials.", "venue": "Symposium on the + Theory of Computing", "year": 1982, "referenceCount": 13, "citationCount": + 35, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/800070.802200", "status": "BRONZE"}, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1982-05-05", "journal": {"pages": + "261-266"}, "authors": [{"authorId": "1741558", "name": "E. Kaltofen"}]}, + {"paperId": "ea6d79863301c664911b676fb5f1327afcf85f8e", "externalIds": {"MAG": + "2145023581", "DOI": "10.1177/0739456X8300300105", "CorpusId": 145521732}, + "corpusId": 145521732, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea6d79863301c664911b676fb5f1327afcf85f8e", + "title": "Planning Theory and Practice: Bridging the Gap", "abstract": "There + is increasing evidence that plan ning theory has been inadequate in recent + years. Not only does it fail to guide prac tice, it contributes to cognitive + dissonance and alienation among practitioners. Plan ning schools agree on + no body of litera ture and ideas to count as planning theory. Planning is + like a paradigm \"in crisis,\" in that theory does not mesh with experience. + Moreover, neither of the two main candidates for the prime exemplar for planning + practice\u2014the master plan model or the policy analysis model \u2014 is + acceptable enough to provide coherence to the field", "venue": "", "year": + 1983, "referenceCount": 13, "citationCount": 60, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1983-07-01", "journal": {"name": "Journal of Planning Education and Research", + "pages": "35-45", "volume": "3"}, "authors": [{"authorId": "115924487", "name": + "J. I. Neufville"}]}, {"paperId": "a66a766cdf665ffec87cd605e308061e3890425c", + "externalIds": {"DBLP": "conf/sofsem/Gurevich12", "MAG": "2149203488", "DOI": + "10.1007/978-3-642-27660-6_3", "CorpusId": 215754100}, "corpusId": 215754100, + "publicationVenue": {"id": "74136324-6e61-46d3-912f-8be85580ef40", "name": + "Conference on Current Trends in Theory and Practice of Informatics", "type": + "conference", "alternate_names": ["SOFSEM", "Conf Curr Trends Theory Pract + Informatics"]}, "url": "https://www.semanticscholar.org/paper/a66a766cdf665ffec87cd605e308061e3890425c", + "title": "What Is an Algorithm?", "abstract": null, "venue": "Conference on + Current Trends in Theory and Practice of Informatics", "year": 2012, "referenceCount": + 23, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-01-21", "journal": {"pages": "31-42"}, "authors": [{"authorId": "1721396", + "name": "Y. Gurevich"}]}, {"paperId": "7d4269654656fdcf508a5aac2109b6d6308d8424", + "externalIds": {"DBLP": "journals/iandc/CaiH89", "MAG": "2119986825", "DOI": + "10.1109/SCT.1988.5279", "CorpusId": 2553643}, "corpusId": 2553643, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7d4269654656fdcf508a5aac2109b6d6308d8424", + "title": "Enumerative counting is hard", "abstract": "An n-variable Boolean + formula can have anywhere from 0 to 2/sup n/ satisfying assignments. The question + of whether a polynomial-time machine, given such a formula, can reduce this + exponential number of possibilities to a small number of possibilities is + explored. Such a machine is called an enumerator, and it is proved that if + there is a good polynomial-time enumerator for Hash P (i.e. one where the + small set has at most O( mod f mod /sup 1-e/) numbers), then P=NP=P/sup Hash + P/ and probabilistic polynomial time equals polynomial time. Furthermore, + Hash P and enumerating Hash P are polynomial-time Turing equivalent.<>", + "venue": "[1988] Proceedings. Structure in Complexity Theory Third Annual + Conference", "year": 1988, "referenceCount": 26, "citationCount": 63, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1988-06-14", "journal": {"name": "[1988] Proceedings. + Structure in Complexity Theory Third Annual Conference", "pages": "194-203"}, + "authors": [{"authorId": "1678402", "name": "Jin-Yi Cai"}, {"authorId": "1704511", + "name": "L. A. Hemaspaandra"}]}, {"paperId": "fdc96892b46cc6756732669a268cf3707deacc30", + "externalIds": {"MAG": "1847828785", "DOI": "10.1109/ICEC.1997.592299", "CorpusId": + 8779257}, "corpusId": 8779257, "publicationVenue": {"id": "731e7416-de1c-4d95-b845-4bc33f682686", + "name": "International Conference on Evolutionary Computation", "type": "conference", + "alternate_names": ["Int Conf Electron Commer", "IEEE International Conference + on Evolutionary Computation", "ICEC", "IEEE Int Conf Evol Comput", "IFIP International + Conference on Entertainment Computing", "Int Conf Entertain Comput", "International + Conference on Entertainment Computing", "IFIP Int Conf Entertain Comput", + "International Conference on Engineering Computation", "Int Conf Evol Comput", + "Int Conf Eng Comput", "International Conference on Electronic Commerce"], + "url": "http://www.wikicfp.com/cfp/program?id=1346", "alternate_urls": ["http://www.wikicfp.com/cfp/program?id=1345"]}, + "url": "https://www.semanticscholar.org/paper/fdc96892b46cc6756732669a268cf3707deacc30", + "title": "On the power of circular splicing systems and DNA computability", + "abstract": "From a biological motivation of the interactions between linear + and circular DNA sequences, we propose a new type of splicing model called + \"circular H systems\" and show that they have the same computational power + as Turing machines. It is also shown that there effectively exists a universal + circular H system which can simulate any circular H system with the same terminal + alphabet, which strongly suggests a feasible design for a DNA computer based + on circular splicing.", "venue": "International Conference on Evolutionary + Computation", "year": 1997, "referenceCount": 31, "citationCount": 43, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Conference"], "publicationDate": "1997-04-13", "journal": + {"name": "Proceedings of 1997 IEEE International Conference on Evolutionary + Computation (ICEC ''97)", "pages": "219-224"}, "authors": [{"authorId": "1742006", + "name": "T. Yokomori"}, {"authorId": "145033788", "name": "S. Kobayashi"}, + {"authorId": "48908511", "name": "C. Ferretti"}]}, {"paperId": "e9775eaaaa28deae809b11a2cb135de26f4ef11a", + "externalIds": {"MAG": "1971517504", "DOI": "10.1002/JEZ.1402700103", "CorpusId": + 40483100}, "corpusId": 40483100, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e9775eaaaa28deae809b11a2cb135de26f4ef11a", + "title": "Patterns of temperature\u2010dependent sex determination in turtles", + "abstract": "Among reptiles that show temperature-dependent sex determination, + sex ratios vary across constant incubation temperatures in ways sufficiently + predictable to allow classifica- tion into patterns. One common pattern shows + low temperatures yielding only males and high temperatures yielding only females. + Another common pattern has low as well as high tempera- tures yielding only + or mostly females and some intermediate temperatures yielding mostly males. + Patterns tend to be associated with the direction of sexual dimorphism in + adult size, especially for species with strong dimorphism. Pivotal temperatures + (those yielding 1:l sex ratios) within the best-documented species and genera + tend to increase with both latitude and longitude across central and southern + North America. These geographic trends probably reflect factors that affect + nest temperatures (duration of grow- ing season, insolation, and prevailing + amounts of shading by vegetation). Data from a population of the alligator + snapping turtle (Macroclemys temminckii) suggest that some embryos are temperature-independent + females because these individuals become females even when they are shifted + among male-producing temperatures during development. These indi- viduals + are also more frequent in clutches of small eggs. In this and several other + species, no constant incubation temperatures yield more than 75% males. 0 + 1994 WiIey-Liss, Inc.", "venue": "", "year": 1994, "referenceCount": 63, "citationCount": + 310, "influentialCitationCount": 25, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1994-09-15", "journal": {"name": "Journal of Experimental + Zoology", "pages": "3-15", "volume": "270"}, "authors": [{"authorId": "50231079", + "name": "M. Ewert"}, {"authorId": "87920465", "name": "D. R. Jackson"}, {"authorId": + "146406637", "name": "C. Nelson"}]}, {"paperId": "90632fb231487d23935eb860061bef69ac955d1c", + "externalIds": {"MAG": "2170247323", "DOI": "10.1590/S0103-97332004000300006", + "CorpusId": 14871706}, "corpusId": 14871706, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/90632fb231487d23935eb860061bef69ac955d1c", "title": "Turing systems as models of complex pattern formation", "abstract": "Half a century ago a reaction-diffusion system of two chemicals was introduced by Alan Turing to account for morphogenesis, i.e., the development of patterns, @@ -41639,188 +47240,14 @@ interactions: and spherical droplets (3D) arranged in structures of high symmetry, with or without defects or distortions.", "venue": "", "year": 2004, "referenceCount": 34, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2004-06-01", "journal": {"name": - "Brazilian Journal of Physics", "pages": "368-372", "volume": "34"}, "authors": - [{"authorId": "35202419", "name": "T. Lepp\u00e4nen"}, {"authorId": "2155202", - "name": "M. Karttunen"}, {"authorId": "37747895", "name": "R. Barrio"}, {"authorId": - "145670814", "name": "K. Kaski"}]}, {"paperId": "0fa9e9d57dac9e28449854a69dd9a9abe50a2b8e", - "externalIds": {"MAG": "2014288728", "DBLP": "journals/apal/BarmpaliasLS08", - "DOI": "10.1016/j.apal.2008.06.004", "CorpusId": 14714746}, "url": "https://www.semanticscholar.org/paper/0fa9e9d57dac9e28449854a69dd9a9abe50a2b8e", - "title": "I classes, LR degrees and Turing degrees", "abstract": null, "venue": - "Annals of Pure and Applied Logic", "year": 2008, "referenceCount": 24, "citationCount": - 20, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2008-11-01", "journal": {"name": "Ann. Pure Appl. Log.", - "pages": "21-38", "volume": "156"}, "authors": [{"authorId": "1678539", "name": - "George Barmpalias"}, {"authorId": "145421803", "name": "A. Lewis"}, {"authorId": - "1699450", "name": "F. Stephan"}]}, {"paperId": "1bc483daf5c19876f05ea03cdf12e6ebbc6d72ee", - "externalIds": {"DBLP": "journals/eccc/Viola12", "MAG": "2401470856", "DOI": - "10.1007/978-3-642-32512-0_56", "CorpusId": 14343024}, "url": "https://www.semanticscholar.org/paper/1bc483daf5c19876f05ea03cdf12e6ebbc6d72ee", - "title": "Extractors for Turing-Machine Sources", "abstract": null, "venue": - "International Workshop and International Workshop on Approximation, Randomization, - and Combinatorial Optimization. Algorithms and Techniques", "year": 2012, - "referenceCount": 27, "citationCount": 13, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-08-15", "journal": {"name": "Electron. Colloquium - Comput. Complex.", "volume": "TR12"}, "authors": [{"authorId": "1743196", - "name": "Emanuele Viola"}]}, {"paperId": "27ee70cad780f0d1a1bbe7e01d12165fe8abd644", - "externalIds": {"MAG": "1850480718", "CorpusId": 26474781}, "url": "https://www.semanticscholar.org/paper/27ee70cad780f0d1a1bbe7e01d12165fe8abd644", - "title": "Emerging Leaders: An Annotated Bibliography", "abstract": "Intuitively, - a set, function, or relation is computable if there is an algorithm for computing - membership, output, or truth-values, respectively. A set of natural numbers - A is Turing reducible to another set B, written A \u2264T B, if it is possible - to write an algorithm that uses information from B to determine membership - in A. This pre-ordering of sets induces an equivalence relation on the power - set of the natural numbers, and the equivalence classes are the Turing degrees. - Sets having the same Turing degree (for example, a set and its complement) - are said to be Turing equivalent, written A \u2261T B. If a set is enumerable - via an algorithm, it is computably enumerable (c.e.) and so is its Turing - degree.", "venue": "", "year": 2001, "referenceCount": 33, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2001-06-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "115374324", "name": "Jennifer - J. Deal"}, {"authorId": "145072611", "name": "Karen M. Peterson"}, {"authorId": - "1459821463", "name": "Heidi Gailor-Loflin"}]}, {"paperId": "110b6aebb001e8cddafed30998e9e1b502928c82", - "externalIds": {"MAG": "2114186994", "DOI": "10.1006/JTBI.1996.0029", "CorpusId": - 123516334}, "url": "https://www.semanticscholar.org/paper/110b6aebb001e8cddafed30998e9e1b502928c82", - "title": "Mollusc Shell Pigmentation: Cellular Automaton Simulations and Evidence - for Undecidability", "abstract": "Abstract We present a cellular automaton - (CA) to simulate the reaction-diffusion processes which determine the pigmentation - of natural mollusc shells. We obtained self-organization into stationary (Turing) - structures, travelling waves and the four classes formed in Wolfram''s automata. - In particular, very complex \u201cundecidable\u201d structures (Wolfram''s - class IV) obtained at the transition between periodicity (class II) and chaos - (class III). Agreement between the calculations and natural shells suggests - evidence for class IV behaviour in the natural process.", "venue": "", "year": - 1996, "referenceCount": 24, "citationCount": 43, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1996-02-07", "journal": {"name": "Journal of Theoretical Biology", "pages": - "333-340", "volume": "178"}, "authors": [{"authorId": "2978629", "name": "Ingo - Kusch"}, {"authorId": "143834150", "name": "M. Markus"}]}, {"paperId": "bf1eb728a89fbcba68372cdb5c2bf7fcc5e49dbe", - "externalIds": {"ArXiv": "quant-ph/0512170", "MAG": "2003431413", "DOI": "10.1103/PhysRevA.74.052322", - "CorpusId": 30090334}, "url": "https://www.semanticscholar.org/paper/bf1eb728a89fbcba68372cdb5c2bf7fcc5e49dbe", - "title": "Error Correcting Codes For Adiabatic Quantum Computation", "abstract": - "Mathematics Department, Massachusetts Institute of Technology, Cambridge, - Massachusetts 02139(Dated: February 1, 2008)Recently, there has been growing - interest in using adiabatic quantum computation as an architec-ture for experimentally - realizable quantum computers. One of the reasons for this is the idea thatthe - energy gap should provide some inherent resistance to noise. It is now known - that universalquantum computation can be achieved adiabatically using 2-local - Hamiltonians. The energy gap inthese Hamiltonians scales as an inverse polynomial - in the problem size. Here we present stabilizercodes which can be used to - produce a constant energy gap against 1-local and 2-local noise. Thecorresponding - fault-tolerant universal Hamiltonians are 4-local and 6-local respectively, - which is theoptimal result achievable within this framework.", "venue": "", - "year": 2005, "referenceCount": 9, "citationCount": 118, "influentialCitationCount": - 7, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-12-20", - "journal": {"name": "Physical Review A", "pages": "052322", "volume": "74"}, - "authors": [{"authorId": "2637886", "name": "S. Jordan"}, {"authorId": "34963522", - "name": "E. Farhi"}, {"authorId": "1756931", "name": "P. Shor"}]}, {"paperId": - "7f9154f6ab93a935acccb6b3fdf83d011e44d175", "externalIds": {"DBLP": "conf/aieeire/Holland59", - "MAG": "2088771528", "DOI": "10.1145/1460299.1460311", "CorpusId": 15142650}, - "url": "https://www.semanticscholar.org/paper/7f9154f6ab93a935acccb6b3fdf83d011e44d175", - "title": "A universal computer capable of executing an arbitrary number of - sub-programs simultaneously", "abstract": "This paper describes a universal - computer capable of simultaneously executing an arbitrary number of sub-programs, - the number of such sub-programs varying as a function of time under program - control or as directed by input to the computer. Three features of the computer - are:\n (1) The structure of the computer is a 2-dimensional modular (or iterative) - network so that, if it were constructed, efficient use could be made of the - high element density and \"template\" techniques now being considered in research - on microminiature elements.\n (2) Sub-programs can be spatially organized - and can act simultaneously, thus facilitating the simulation or direct control - of \"highly-parallel\" systems with many points or parts interacting simultaneously - (e.g. magneto-hydrodynamic problems or pattern recognition).\n (3) The computer''s - structure and behavior can, with simple generalizations, be formulated in - a way that provides a formal basis for theoretical study of automata with - changing structure (cf. the relation between Turing machines and computable - numbers).", "venue": "IRE-AIEE-ACM ''59 (Eastern)", "year": 1959, "referenceCount": - 0, "citationCount": 107, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1959-12-01", "journal": {"pages": "108-113"}, "authors": [{"authorId": "144404817", - "name": "J. Holland"}]}, {"paperId": "774d0b9dcdbb7db5ce1daf6deeb8b356353dd223", - "externalIds": {"MAG": "2012444206", "DOI": "10.1103/PHYSREVLETT.66.2535", - "CorpusId": 26888781, "PubMed": "10043513"}, "url": "https://www.semanticscholar.org/paper/774d0b9dcdbb7db5ce1daf6deeb8b356353dd223", - "title": "Lattice-gas automata for coupled reaction-diffusion equations.", - "abstract": "We present a lattice-gas automaton approach to coupled reaction-diffusion - equations. This approach provides a microscopic bases for exploring systems - which exhibit such interesting features as oscillatory behavior and pattern - formation. Two-species systems are analyzed in detail. As an application of - the formalism, we construct the microscopic dynamics for a system described - by the Maginu equations; simulation results show excellent agreement with - the phenomenological predictions. Most important is the result showing that - we obtain Turing-type structures by a purely microscopic approach.", "venue": - "Physical review letters", "year": 1991, "referenceCount": 5, "citationCount": - 62, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1991-05-13", "journal": {"name": "Physical review letters", - "pages": "\n 2535-2538\n ", "volume": "66 19"}, "authors": - [{"authorId": "30155087", "name": "Dab"}, {"authorId": "88526065", "name": - "Boon"}, {"authorId": "2146704666", "name": "Li"}]}, {"paperId": "0e4a8061d27af3a7a3098b74c5fe8d5cc4276e37", - "externalIds": {"DBLP": "journals/jucs/QueinsZBKPMS00", "MAG": "1537355613", - "DOI": "10.3217/jucs-006-07-0586", "CorpusId": 39425890}, "url": "https://www.semanticscholar.org/paper/0e4a8061d27af3a7a3098b74c5fe8d5cc4276e37", - "title": "The Light Control Case Study: Problem Description", "abstract": - "This document contains a range of needs and requirements concerning the construction - of a light control system for a floor of a university building. A description - of the building architec- ture and of some pre-installed (light-)hardware - is included. This problem description was the com- mon input for all participants - of the requirements engineering case study \"Light Control\".", "venue": "J. - Univers. Comput. Sci.", "year": 2000, "referenceCount": 4, "citationCount": - 34, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "J. Univers. Comput. Sci.", "pages": "586-596", "volume": "6"}, "authors": - [{"authorId": "1791356", "name": "Stefan Queins"}, {"authorId": "1406768253", - "name": "G. Zimmermann"}, {"authorId": "2071187736", "name": "Martin Becker"}, - {"authorId": "145082001", "name": "M. Kronenburg"}, {"authorId": "2371919", - "name": "C. Peper"}, {"authorId": "49925646", "name": "Rolf Merz"}, {"authorId": - "2053082613", "name": "J\u00fcrgen Sch\u00e4fer"}]}, {"paperId": "ea6d79863301c664911b676fb5f1327afcf85f8e", - "externalIds": {"MAG": "2145023581", "DOI": "10.1177/0739456X8300300105", - "CorpusId": 145521732}, "url": "https://www.semanticscholar.org/paper/ea6d79863301c664911b676fb5f1327afcf85f8e", - "title": "Planning Theory and Practice: Bridging the Gap", "abstract": "There - is increasing evidence that plan ning theory has been inadequate in recent - years. Not only does it fail to guide prac tice, it contributes to cognitive - dissonance and alienation among practitioners. Plan ning schools agree on - no body of litera ture and ideas to count as planning theory. Planning is - like a paradigm \"in crisis,\" in that theory does not mesh with experience. - Moreover, neither of the two main candidates for the prime exemplar for planning - practice\u2014the master plan model or the policy analysis model \u2014 is - acceptable enough to provide coherence to the field", "venue": "", "year": - 1983, "referenceCount": 13, "citationCount": 59, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1983-07-01", - "journal": {"name": "Journal of Planning Education and Research", "pages": - "35-45", "volume": "3"}, "authors": [{"authorId": "115924487", "name": "J. - I. Neufville"}]}, {"paperId": "155e343e8c509e0d916283728fdd0908658442cd", - "externalIds": {"MAG": "760039595", "DOI": "10.1007/978-3-319-17037-4_8", - "CorpusId": 118111134}, "url": "https://www.semanticscholar.org/paper/155e343e8c509e0d916283728fdd0908658442cd", - "title": "Turing and Non-Turing Patterns in Two-Dimensional Prey-Predator - Models", "abstract": null, "venue": "", "year": 2015, "referenceCount": 67, - "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Environmental Science", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "pages": "257-280", "volume": "4"}, "authors": - [{"authorId": "33373208", "name": "M. Banerjee"}]}]} + "openAccessPdf": {"url": "https://www.scielo.br/j/bjp/a/CmYzrtnpkrL5mYhRfnCP4bF/?lang=en&format=pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-06-01", + "journal": {"name": "Brazilian Journal of Physics", "pages": "368-372", "volume": + "34"}, "authors": [{"authorId": "35202419", "name": "T. Lepp\u00e4nen"}, {"authorId": + "2155202", "name": "M. Karttunen"}, {"authorId": "37747895", "name": "R. Barrio"}, + {"authorId": "145670814", "name": "K. Kaski"}]}]} ' headers: @@ -41829,31 +47256,31 @@ interactions: Connection: - keep-alive Content-Length: - - '164897' + - '193300' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:49 GMT + - Tue, 03 Jan 2023 20:53:17 GMT Via: - - 1.1 f88bd4c15622473fc18eef7d15f4b8d4.cloudfront.net (CloudFront) + - 1.1 62a107b7071613efe0dd66ef388a644a.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - 1lrmpdhG4_fxa7Oslxzry1YpokpNkr1E_rjHDqmN418dm0wVRBpG2Q== + - 7T2qsLYfWuCrdJSqI_PylNE9S0Vs_ctiOLlnTCzyE6T_MXcvAM2EYQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detIyGIIPHcF5rQ= + - eLxVkERLPHcFsiw= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '164897' + - '193300' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:48 GMT + - Tue, 03 Jan 2023 20:53:17 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - a3fc63aa-4306-4f08-91c6-2dec32f94ba1 + - 4796a643-58e4-4436-a449-e2f49fb613e8 status: code: 200 message: OK @@ -41869,155 +47296,357 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2000&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2000&limit=100 response: body: - string: '{"total": 65539, "offset": 2000, "next": 2100, "data": [{"paperId": - "27ee70cad780f0d1a1bbe7e01d12165fe8abd644", "externalIds": {"MAG": "1850480718", - "CorpusId": 26474781}, "url": "https://www.semanticscholar.org/paper/27ee70cad780f0d1a1bbe7e01d12165fe8abd644", - "title": "Emerging Leaders: An Annotated Bibliography", "abstract": "Intuitively, - a set, function, or relation is computable if there is an algorithm for computing - membership, output, or truth-values, respectively. A set of natural numbers - A is Turing reducible to another set B, written A \u2264T B, if it is possible - to write an algorithm that uses information from B to determine membership - in A. This pre-ordering of sets induces an equivalence relation on the power - set of the natural numbers, and the equivalence classes are the Turing degrees. - Sets having the same Turing degree (for example, a set and its complement) - are said to be Turing equivalent, written A \u2261T B. If a set is enumerable - via an algorithm, it is computably enumerable (c.e.) and so is its Turing - degree.", "venue": "", "year": 2001, "referenceCount": 33, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2001-06-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "115374324", "name": "Jennifer - J. Deal"}, {"authorId": "145072611", "name": "Karen M. Peterson"}, {"authorId": - "1459821463", "name": "Heidi Gailor-Loflin"}]}, {"paperId": "0ce9aaf66c268d8735fe3f993b7b7e0b95897c36", - "externalIds": {"MAG": "1996623146", "DOI": "10.1021/AR00029A002", "CorpusId": - 94981633}, "url": "https://www.semanticscholar.org/paper/0ce9aaf66c268d8735fe3f993b7b7e0b95897c36", - "title": "TURING STRUCTURES IN SIMPLE CHEMICAL REACTIONS", "abstract": null, - "venue": "", "year": 1993, "referenceCount": 42, "citationCount": 19, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1993-05-01", - "journal": {"name": "Accounts of Chemical Research", "pages": "235-240", "volume": - "26"}, "authors": [{"authorId": "48178739", "name": "I. Lengyel"}, {"authorId": - "144854275", "name": "I. Epstein"}]}, {"paperId": "71bfcb7857bc8127093b8a7c0189312e33d738c7", - "externalIds": {"DBLP": "conf/tcs/BraunmuhlV79", "MAG": "1520726113", "DOI": - "10.1007/3-540-09118-1_11", "CorpusId": 30987436}, "url": "https://www.semanticscholar.org/paper/71bfcb7857bc8127093b8a7c0189312e33d738c7", - "title": "Finite-Change Automata", "abstract": null, "venue": "Theoretical - Computer Science", "year": 1979, "referenceCount": 4, "citationCount": 15, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", + string: '{"total": 65729, "offset": 2000, "next": 2100, "data": [{"paperId": + "7ff69b77912ffb1c05072a8bd89502c9b1f30739", "externalIds": {"MAG": "2081655475", + "DOI": "10.14219/JADA.ARCHIVE.1951.0055", "CorpusId": 1689015, "PubMed": "14803190"}, + "corpusId": 1689015, "publicationVenue": {"id": "137df871-0be4-4ea4-9f85-52b2b36070a3", + "name": "The Journal of the American Dental Association (1939)", "type": "journal", + "alternate_names": ["Journal of the American Dental Association", "J Am Dent + Assoc (1939", "J Am Dent Assoc"], "issn": "0002-8177", "url": "http://www.sciencedirect.com/science/journal/00028177", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00028177/146", + "http://jada.ada.org/", "https://jada.ada.org/"]}, "url": "https://www.semanticscholar.org/paper/7ff69b77912ffb1c05072a8bd89502c9b1f30739", + "title": "Direct resinous filling materials: temperature rise during polymerization.", + "abstract": "The investigation of the direct resinous filling materials used + primarily in place of silicate cement is one of the major projects in the + cooperative research program on dental materials at the National Bureau of + Standards. This report on the tempera\u00ad ture rise of direct resinous filling + materials during polymerization contains the trade brand names of the materials + investigated. Likewise, the manufacturer\u2019s batch number is listed when + present. The data are applicable only to those specific batches mentioned.", + "venue": "The Journal of the American Dental Association (1939)", "year": + 1951, "referenceCount": 1, "citationCount": 44, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1951-03-01", "journal": {"name": "Journal of the American + Dental Association", "pages": "\n 253-63\n ", "volume": "42 + 3"}, "authors": [{"authorId": "80371514", "name": "R. B. Wolcott"}, {"authorId": + "11811191", "name": "G. Paffenbarger"}, {"authorId": "17006364", "name": "I. + Schoonover"}]}, {"paperId": "bf1006c26b4406d96bceefdd31ccf2fd64c03825", "externalIds": + {"MAG": "2049425906", "DOI": "10.1155/2013/657286", "CorpusId": 12586450}, + "corpusId": 12586450, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf1006c26b4406d96bceefdd31ccf2fd64c03825", + "title": "Pattern Formation in a Semi-Ratio-Dependent Predator-Prey System + with Diffusion", "abstract": "We investigate spatiotemporal dynamics of a + semi-ratio-dependent predator-prey system with reaction-diffusion and zero-flux + boundary. We obtain the conditions for Hopf, Turing, and wave bifurcations + of the system in a spatial domain by making use of the linear stability analysis + and the bifurcation analysis. In addition, for an initial condition which + is a small amplitude random perturbation around the steady state, we classify + spatial pattern formations of the system by using numerical simulations. The + results of numerical simulations unveil that there are various spatiotemporal + patterns including typical Turing patterns such as spotted, spot-stripelike + mixtures and stripelike patterns thanks to the Turing instability, that an + oscillatory wave pattern can be emerged due to the Hopf and wave instability, + and that cooperations of Turing and Hopf instabilities can cause occurrence + of spiral patterns instead of typical Turing patterns. Finally, we discuss + spatiotemporal dynamics of the system for several different asymmetric initial + conditions via numerical simulations.", "venue": "", "year": 2013, "referenceCount": + 33, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://downloads.hindawi.com/journals/ddns/2013/657286.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2013-04-04", + "journal": {"name": "Discrete Dynamics in Nature and Society", "pages": "1-14", + "volume": "2013"}, "authors": [{"authorId": "2229102", "name": "H. Baek"}, + {"authorId": "50845884", "name": "D. Jung"}, {"authorId": "2108288737", "name": + "Zhiwei Wang"}]}, {"paperId": "ef694eb71401fff4df71057056c8c97bde250bc3", + "externalIds": {"DBLP": "journals/jcss/BalliuDFO18", "MAG": "2885668823", + "DOI": "10.4230/LIPIcs.STACS.2017.8", "CorpusId": 17975005}, "corpusId": 17975005, + "publicationVenue": {"id": "2e8ac273-26de-40d6-9f96-09286b1016f1", "name": + "Symposium on Theoretical Aspects of Computer Science", "type": "conference", + "alternate_names": ["STACS", "Symp Theor Asp Comput Sci"], "url": "http://www.stacs-conf.org/"}, + "url": "https://www.semanticscholar.org/paper/ef694eb71401fff4df71057056c8c97bde250bc3", + "title": "What Can Be Verified Locally?", "abstract": "We are considering + distributed network computing, in which computing entities are connected by + a network modeled as a connected graph. These entities are located at the + nodes of the graph, and they exchange information by message-passing along + its edges. In this context, we are adopting the classical framework for local + distributed decision, in which nodes must collectively decide whether their + network configuration satisfies some given boolean predicate, by having each + node interacting with the nodes in its vicinity only. A network configuration + is accepted if and only if every node individually accepts. It is folklore + that not every Turing-decidable network property (e.g., whether the network + is planar) can be decided locally whenever the computing entities are Turing + machines (TM). On the other hand, it is known that every Turing-decidable + network property can be decided locally if nodes are running non-deterministic + Turing machines (NTM). However, this holds only if the nodes have the ability + to guess the identities of the nodes currently in the network. That is, for + different sets of identities assigned to the nodes, the correct guesses of + the nodes might be different. If one asks the nodes to use the same guess + in the same network configuration even with different identity assignments, + i.e., to perform identity-oblivious guesses, then it is known that not every + Turing-decidable network property can be decided locally. \n \nIn this paper, + we show that every Turing-decidable network property can be decided locally + if nodes are running alternating Turing machines (ATM), and this holds even + if nodes are bounded to perform identity-oblivious guesses. More specifically, + we show that, for every network property, there is a local algorithm for ATMs, + with at most 2 alternations, that decides that property. To this aim, we define + a hierarchy of classes of decision tasks where the lowest level contains tasks + solvable with TMs, the first level those solvable with NTMs, and level k contains + those tasks solvable with ATMs with k alternations. We characterize the entire + hierarchy, and show that it collapses in the second level. In addition, we + show separation results between the classes of network properties that are + locally decidable with TMs, NTMs, and ATMs. Finally, we establish the existence + of completeness results for each of these classes, using novel notions of + local reduction.", "venue": "Symposium on Theoretical Aspects of Computer + Science", "year": 2017, "referenceCount": 17, "citationCount": 19, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2017-03-08", + "journal": {"pages": "8:1-8:13"}, "authors": [{"authorId": "2688035", "name": + "A. Balliu"}, {"authorId": "1397402680", "name": "Gianlorenzo D''angelo"}, + {"authorId": "1685849", "name": "P. Fraigniaud"}, {"authorId": "1880491", + "name": "D. Olivetti"}]}, {"paperId": "1241c1540f61b9bdfe93fd36f2ed73157bc8bc6e", + "externalIds": {"MAG": "1600189620", "CorpusId": 60872045}, "corpusId": 60872045, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1241c1540f61b9bdfe93fd36f2ed73157bc8bc6e", + "title": "Telling Humans and Computers Apart Automatically or How Lazy Cryptographers + do AI", "abstract": "If you try to get a new email account at Yahoo, you\u2019ll + be asked to prove that you\u2019re a human and not a computer. Why? Because + a single computer program can get thousands of free email accounts per second. + And that\u2019s bad for Yahoo. But how do you prove to a computer that you\u2019re + a human? Proving that you\u2019re a human to another human can be done using + an idea from the 1950s: the Turing Test [11]. A human judge asks you a bunch + of questions and decides, depending on your answers, whether he\u2019s talking + to a human or a computer. Proving that you\u2019re a human to a computer is + another matter. It requires a test (or a set of tests) that computers can + grade, humans can pass, but paradoxically, computers can\u2019t pass. In our + lingo, it requires a captcha.", "venue": "", "year": 2002, "referenceCount": + 18, "citationCount": 108, "influentialCitationCount": 8, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "69929958", + "name": "Louis von Ahn"}, {"authorId": "143624243", "name": "M. Blum"}, {"authorId": + "144162125", "name": "J. Langford"}]}, {"paperId": "833d09782498ef0f235b7ea981f9db7d1dc0f587", + "externalIds": {"MAG": "2141591657", "DOI": "10.1039/b919278f", "CorpusId": + 205739204, "PubMed": "20358062"}, "corpusId": 205739204, "publicationVenue": + {"id": "63ed87ae-e104-4cfe-91c9-eb1f2f9ed5b0", "name": "Physical Chemistry, + Chemical Physics - PCCP", "type": "journal", "alternate_names": ["Phys Chem + Chem Phys PCCP", "Physical Chemistry Chemical Physics", "Phys Chem Chem Phys"], + "issn": "1463-9076", "url": "http://www.rsc.org/publishing/journals/CP/Index.asp", + "alternate_urls": ["http://www.rsc.org/Publishing/Journals/CP/index.asp", + "https://pubs.rsc.org/en/journals/journalissues/cp#!issueid=cp001001&type=current&issnonline=1463-9084", + "http://xlink.rsc.org/?genre=journal&journal_code=CP"]}, "url": "https://www.semanticscholar.org/paper/833d09782498ef0f235b7ea981f9db7d1dc0f587", + "title": "Patterns in the Belousov-Zhabotinsky reaction in water-in-oil microemulsion + induced by a temperature gradient.", "abstract": "We investigate the effect + of changing temperature in the ferroin-catalysed Belousov-Zhabotinsky (BZ) + reaction dispersed in the water nanodroplets of a water-in-oil aerosol OT + (AOT) microemulsion, which undergoes a temperature-induced percolation transition + at about 38 degrees C. We observe stationary Turing patterns at temperatures + in the range 15-35 degrees C and bulk oscillations at T = 40-55 degrees C. + When a temperature gradient DeltaT is applied normal to a thin layer of the + BZ-AOT reaction mixture, the range of patterns observed is dramatically expanded. + Anti-phase oscillatory Turing patterns, leaping waves, and chaotic waves emerge, + depending on the temperature gradient and the average temperature. These new + patterns originate from the coupling between a low temperature Turing mode + and a high temperature Hopf mode. Simulations with a simple model of the BZ-AOT + system give good agreement with our experimental results.", "venue": "Physical + Chemistry, Chemical Physics - PCCP", "year": 2010, "referenceCount": 45, "citationCount": + 19, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-03-31", "journal": {"name": "Physical chemistry chemical + physics : PCCP", "pages": "\n 3656-65\n ", "volume": "12 15"}, + "authors": [{"authorId": "1398293920", "name": "J. Carballido-Landeira"}, + {"authorId": "2258489", "name": "V. Vanag"}, {"authorId": "144854275", "name": + "I. Epstein"}]}, {"paperId": "de326d37f80d13b519e1db63960344729728c523", "externalIds": + {"MAG": "1709275931", "DBLP": "conf/eurocal/Schonhage82", "DOI": "10.1007/3-540-11607-9_1", + "CorpusId": 35937564}, "corpusId": 35937564, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/de326d37f80d13b519e1db63960344729728c523", + "title": "Asymptotically Fast Algorithms for the Numerical Multiplication + and Division of Polynomials with Complex Coeficients", "abstract": null, "venue": + "EUROCAM", "year": 1982, "referenceCount": 5, "citationCount": 108, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1979-03-26", "journal": {"pages": "91-100"}, "authors": - [{"authorId": "1760747", "name": "Burchard von Braunm\u00fchl"}, {"authorId": - "144927465", "name": "R. Verbeek"}]}, {"paperId": "7550d7089ae4151f61c3f17e8f1b30bb537c61c6", - "externalIds": {"DBLP": "conf/oodbs/LiskovDS92", "MAG": "1654761628", "CorpusId": - 11585769}, "url": "https://www.semanticscholar.org/paper/7550d7089ae4151f61c3f17e8f1b30bb537c61c6", - "title": "Distributed Object Management in Thor", "abstract": "Thor is a new - object-oriented database management system (OODBMS), intended to be used in - heterogeneous distributed systems to allow programs written in diierent programming - languages to share objects in a convenient manner. Thor objects are persistent - in spite of failures, are highly likely to be accessible whenever they are - needed, and can be struc-tured to reeect the kinds of information of interest - to users. Thor combines the advantages of the object-oriented approach with - those of database systems: users can store and manipulate objects that capture - the semantics of their applications, and can also access objects via queries. - Thor is an ongoing project, and this paper is a snapshot: we describe our - rst design and a partial implementation of that design. This design is primarily - concerned with issues related to the implementation of an OODBMS as a distributed - system.", "venue": "IWDOM", "year": 1992, "referenceCount": 43, "citationCount": - 109, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "79-91"}, "authors": [{"authorId": "1720373", "name": "B. Liskov"}, - {"authorId": "69380701", "name": "M. Day"}, {"authorId": "1679411", "name": - "L. Shrira"}]}, {"paperId": "dce99928dc6eaa54c6a0d059aa14faf0617c480c", "externalIds": - {"MAG": "1997428507", "DOI": "10.1088/1751-8113/43/38/382002", "CorpusId": - 120179376}, "url": "https://www.semanticscholar.org/paper/dce99928dc6eaa54c6a0d059aa14faf0617c480c", - "title": "Reversible arithmetic logic unit for quantum arithmetic", "abstract": - "This communication presents the complete design of a reversible arithmetic - logic unit (ALU) that can be part of a programmable reversible computing device - such as a quantum computer. The presented ALU is garbage free and uses reversible - updates to combine the standard reversible arithmetic and logical operations - in one unit. Combined with a suitable control unit, the ALU permits the construction - of an r-Turing complete computing device. The garbage-free ALU developed in - this communication requires only 6n elementary reversible gates for five basic - arithmetic\u2013logical operations on two n-bit operands and does not use - ancillae. This remarkable low resource consumption was achieved by generalizing - the V-shape design first introduced for quantum ripple-carry adders and nesting - multiple V-shapes in a novel integrated design. This communication shows that - the realization of an efficient reversible ALU for a programmable computing - device is possible and that the V-shape design is a very versatile approach - to the design of quantum networks.", "venue": "", "year": 2010, "referenceCount": - 17, "citationCount": 109, "influentialCitationCount": 10, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2010-09-24", "journal": {"name": "Journal of Physics - A: Mathematical and Theoretical", "pages": "382002", "volume": "43"}, "authors": - [{"authorId": "10263156", "name": "Michael Kirkedal Thomsen"}, {"authorId": - "1700006", "name": "R. Gl\u00fcck"}, {"authorId": "1751103", "name": "Holger - Bock Axelsen"}]}, {"paperId": "bd808691bab1fc4d22f3ccd47d99cd1d3ecd0762", - "externalIds": {"MAG": "195780958", "DBLP": "journals/jca/Rendell11", "DOI": - "10.1007/978-1-84996-217-9_26", "CorpusId": 28502436}, "url": "https://www.semanticscholar.org/paper/bd808691bab1fc4d22f3ccd47d99cd1d3ecd0762", - "title": "A Simple Universal Turing Machine for the Game of Life Turing Machine", - "abstract": null, "venue": "Journal of Cellular Automata", "year": 2011, "referenceCount": - 4, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1982-04-05", "journal": {"pages": "3-15"}, "authors": [{"authorId": "1764338", + "name": "A. Sch\u00f6nhage"}]}, {"paperId": "110b6aebb001e8cddafed30998e9e1b502928c82", + "externalIds": {"MAG": "2114186994", "DOI": "10.1006/JTBI.1996.0029", "CorpusId": + 123516334}, "corpusId": 123516334, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/110b6aebb001e8cddafed30998e9e1b502928c82", + "title": "Mollusc Shell Pigmentation: Cellular Automaton Simulations and Evidence + for Undecidability", "abstract": "Abstract We present a cellular automaton + (CA) to simulate the reaction-diffusion processes which determine the pigmentation + of natural mollusc shells. We obtained self-organization into stationary (Turing) + structures, travelling waves and the four classes formed in Wolfram''s automata. + In particular, very complex \u201cundecidable\u201d structures (Wolfram''s + class IV) obtained at the transition between periodicity (class II) and chaos + (class III). Agreement between the calculations and natural shells suggests + evidence for class IV behaviour in the natural process.", "venue": "", "year": + 1996, "referenceCount": 24, "citationCount": 43, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1996-02-07", "journal": {"name": "Journal of Theoretical + Biology", "pages": "333-340", "volume": "178"}, "authors": [{"authorId": "2978629", + "name": "Ingo Kusch"}, {"authorId": "143834150", "name": "M. Markus"}]}, {"paperId": + "5b310052ca7fc5864cfb588b472bf1ed45ba8f4e", "externalIds": {"MAG": "1976148933", + "DBLP": "journals/mst/Ambos-SpiesDFM13", "DOI": "10.1007/s00224-012-9424-1", + "CorpusId": 307094}, "corpusId": 307094, "publicationVenue": {"id": "2f29fc80-b44b-4da3-9bad-0ac6d02b8c58", + "name": "Theory of Computing Systems", "alternate_names": ["Theory Comput + Syst"], "issn": "1432-4350", "url": "http://link.springer.com/journal/224"}, + "url": "https://www.semanticscholar.org/paper/5b310052ca7fc5864cfb588b472bf1ed45ba8f4e", + "title": "Maximal Pairs of Computably Enumerable Sets in the Computably Lipschitz + Degrees", "abstract": null, "venue": "Theory of Computing Systems", "year": + 2012, "referenceCount": 20, "citationCount": 15, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Theory of Computing Systems", "pages": "2-27", + "volume": "52"}, "authors": [{"authorId": "1398717883", "name": "K. Ambos-Spies"}, + {"authorId": "38589453", "name": "Decheng Ding"}, {"authorId": "145353688", + "name": "Yun Fan"}, {"authorId": "1691379", "name": "W. Merkle"}]}, {"paperId": + "0b34846e343b7b7c784ebd62e3590cc5d60847a3", "externalIds": {"MAG": "2966714118", + "DBLP": "conf/ijcai/MaoLWZPHW19", "DOI": "10.24963/ijcai.2019/714", "CorpusId": + 199465686}, "corpusId": 199465686, "publicationVenue": {"id": "67f7f831-711a-43c8-8785-1e09005359b5", + "name": "International Joint Conference on Artificial Intelligence", "type": + "conference", "alternate_names": ["Int Jt Conf Artif Intell", "IJCAI"], "url": + "http://www.ijcai.org/"}, "url": "https://www.semanticscholar.org/paper/0b34846e343b7b7c784ebd62e3590cc5d60847a3", + "title": "Aspect-Based Sentiment Classification with Attentive Neural Turing + Machines", "abstract": "Aspect-based sentiment classification aims to identify + sentiment polarity expressed towards a given opinion target in a sentence. + The sentiment polarity of the target is not only highly determined by sentiment + semantic context but also correlated with the concerned opinion target. Existing + works cannot effectively capture and store the inter-dependence between the + opinion target and its context. To solve this issue, we propose a novel model + of Attentive Neural Turing Machines (ANTM). Via interactive read-write operations + between an external memory storage and a recurrent controller, ANTM can learn + the dependable correlation of the opinion target to context and concentrate + on crucial sentiment information. Specifically, ANTM separates the information + of storage and computation, which extends the capabilities of the controller + to learn and store sequential features. The read and write operations enable + ANTM to adaptively keep track of the interactive attention history between + memory content and controller state. Moreover, we append target entity embeddings + into both input and output of the controller in order to augment the integration + of target information. We evaluate our model on SemEval2014 dataset which + contains reviews of Laptop and Restaurant domains and Twitter review dataset. + Experimental results verify that our model achieves state-of-the-art performance + on aspect-based sentiment classification.", "venue": "International Joint + Conference on Artificial Intelligence", "year": 2019, "referenceCount": 27, + "citationCount": 25, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.ijcai.org/proceedings/2019/0714.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference", "Review"], "publicationDate": "2019-08-01", "journal": {"pages": + "5139-5145"}, "authors": [{"authorId": "67081502", "name": "Qianren Mao"}, + {"authorId": "47785906", "name": "Jianxin Li"}, {"authorId": "3210262", "name": + "Senzhang Wang"}, {"authorId": "2145782607", "name": "Yuanning Zhang"}, {"authorId": + null, "name": "Hao Peng"}, {"authorId": "2116975361", "name": "Min He"}, {"authorId": + "2108740151", "name": "Lihong Wang"}]}, {"paperId": "155e343e8c509e0d916283728fdd0908658442cd", + "externalIds": {"MAG": "760039595", "DOI": "10.1007/978-3-319-17037-4_8", + "CorpusId": 118111134}, "corpusId": 118111134, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/155e343e8c509e0d916283728fdd0908658442cd", + "title": "Turing and Non-Turing Patterns in Two-Dimensional Prey-Predator + Models", "abstract": null, "venue": "", "year": 2015, "referenceCount": 67, + "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": null, "journal": {"name": "", "pages": "257-280", "volume": + "4"}, "authors": [{"authorId": "33373208", "name": "M. Banerjee"}]}, {"paperId": + "db2216d1bd93692bd5bc7743e8f84b8c41caec45", "externalIds": {"MAG": "1999558208", + "DOI": "10.2514/3.12189", "CorpusId": 14728637}, "corpusId": 14728637, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/db2216d1bd93692bd5bc7743e8f84b8c41caec45", + "title": "Static shape control for adaptive wings", "abstract": "A theoretical + method was developed, and experimentally validated, to control the static + shape of flexible struc-tures by employing internal translational actuators. + A finite element model of the structure, without the actuatorspresent, is + employed to obtain the multiple-input, multiple-output control-system gain + matrices for actuator-loadcontrol as well as actuator-displacement control. + The method is applied to the quasistatic problem of maintainingan optimum-wing + cross section during various transonic-cruise flight conditions to obtain + significant reductionsin the shock-induced drag. Only small, potentially achievable, + adaptive modifications to the profile are required.The adaptive-wing concept + employs actuators as truss elements of active ribs to reshape the wing cross + section bydeforming the structure. Finite element analyses of an adaptive-rib + model verify the controlled-structure theory.Experiments on the model were + conducted, and arbitrarily selected deformed shapes were accurately achieved.", + "venue": "", "year": 1994, "referenceCount": 10, "citationCount": 112, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://aero-comlab.stanford.edu/Papers/AIAA-12189-962.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-09-01", + "journal": {"name": "AIAA Journal", "pages": "1895-1901", "volume": "32"}, + "authors": [{"authorId": "47998867", "name": "F. Austin"}, {"authorId": "153457593", + "name": "M. Rossi"}, {"authorId": "98858380", "name": "W. V. Nostrand"}, {"authorId": + "47666043", "name": "G. Knowles"}, {"authorId": "144198300", "name": "A. Jameson"}]}, + {"paperId": "5d69df984219be60260632021713e5a82c0b0227", "externalIds": {"MAG": + "1496232869", "CorpusId": 22316264, "PubMed": "14353798"}, "corpusId": 22316264, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5d69df984219be60260632021713e5a82c0b0227", + "title": "The influence of cortisone on the structure and growth of bone.", + "abstract": "In the course of some experiments on the effects of cortisone + administration on the repair of fractures in rabbits (Sissons & Hadfield, + 1951), the authors noted, as other workers had done, interference with growth + of the experimental animals. This was shown by measurements both of body weight + and of the length of long bones, while histological examination of the growing + regions of the bones showed marked depar-ture from what was seen in normal + control rabbits. The present paper presents in some detail these observations + on bone growth.", "venue": "Journal of anatomy", "year": 1955, "referenceCount": + 22, "citationCount": 60, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "519-545"}, "authors": [{"authorId": "11060403", "name": "Paul W. - Rendell"}]}, {"paperId": "d8698d8b512451e2ff57fe1ba683276a82a39147", "externalIds": - {"MAG": "2014691151", "DOI": "10.2307/4089332", "CorpusId": 84542003}, "url": - "https://www.semanticscholar.org/paper/d8698d8b512451e2ff57fe1ba683276a82a39147", - "title": "EVOLUTION OF FORAGING STRATEGIES IN SHOREBIRDS: AN ECOMORPHOLOGICAL - APPROACH", "abstract": "We studied the relationships between bill and hindlimb - morphology and for- aging behavior in 17 species of shorebirds within a phylogenetic - framework. The results show that the evolutionary change in bill length is - related to the evolutionary change in for- aging strategies from visual hunting - to tactile hunting. We also found evolutionary rela- tionships between an - increase in bill length and both plunging and sweeping foraging move- ments, - and a decrease in bill length and \"routing\" behavior. No relationships were - found between hindlimb morphology and movement pattern (continuous hunting - species vs. pause-travel species). Examining the evolutionary rate of change - in bill and hindlimb struc- tures shows that the family Scolopacidae and the - subfamily Recurvirostrinae evolved more rapidly than the species of Charadriinae. - Results from our ecomorphological and evolution- ary analysis support the - hypothesis by Zweers and co-workers on the evolution of feeding", "venue": - "", "year": 1999, "referenceCount": 50, "citationCount": 107, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-07-01", - "journal": {"name": "The Auk", "pages": "712-725", "volume": "116"}, "authors": - [{"authorId": "2172481", "name": "A. Barbosa"}, {"authorId": "47890872", "name": - "E. Moreno"}]}, {"paperId": "555948f8a80c6b0ecf6d04cac84c777b5b7e7421", "externalIds": - {"MAG": "2093414331", "DOI": "10.13031/2013.33783", "CorpusId": 110408472}, - "url": "https://www.semanticscholar.org/paper/555948f8a80c6b0ecf6d04cac84c777b5b7e7421", - "title": "A Thermal Infrared Technique for Monitoring Cotton Water Stress - and Scheduling Irrigations e", "abstract": "ABSTRACT STEPWISE, multiple linear - regression analysis estab-lished that a crop water stress index (CWSI) derived - from mid-day radiant leaf temperatures, air tempera-tures, and vapor pressure - deficits was the most impor-tant independent variable in predicting the xylem - pres-sure potential of cotton leaves. When the CWSI was combined with the - age of the crop and the evaporative demand of the atmosphere, the water potential - of cotton could be predicted throughout the entire growing season. This permits - day by day monitoring of cotton plant water status which could facilitate - the irrigation decision mak-ing progress without resorting to tedious physiological - plant measurements.", "venue": "", "year": 1982, "referenceCount": 0, "citationCount": - 61, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Transactions of the ASABE", - "pages": "1651-1655", "volume": "25"}, "authors": [{"authorId": "1399494855", - "name": "P. Pinter"}, {"authorId": "8604744", "name": "R. Reginato"}]}, {"paperId": - "8470d78c1fbb27b8aa39dfc7a9fc6daa2e0c0dda", "externalIds": {"MAG": "2488438516", - "CorpusId": 83416836}, "url": "https://www.semanticscholar.org/paper/8470d78c1fbb27b8aa39dfc7a9fc6daa2e0c0dda", + {"name": "Journal of anatomy", "pages": "\n 69-78\n ", "volume": + "89 1"}, "authors": [{"authorId": "2227589", "name": "H. Sissons"}, {"authorId": + "40051702", "name": "G. Hadfield"}]}, {"paperId": "75f3401fe91382e2dd06045613287e013f2a1fe0", + "externalIds": {"MAG": "2082291221", "DOI": "10.1029/2005EO060001", "CorpusId": + 129664836}, "corpusId": 129664836, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/75f3401fe91382e2dd06045613287e013f2a1fe0", + "title": "Global seismographic network records the Great Sumatra\u2010Andaman + earthquake", "abstract": "On 26 December 2004 the Indonesian sub-duction zone + near the northern end of Sumatrabegan to rupture at 58 minutes,47 secondspast + midnight Greenwich Mean Time.The rup-ture continued for approximately seven + min-utes,extending northwestward along the SundaTrench for roughly 1200 km + to the AndamanIslands.The seafloor displacement generateda massive tsunami + that swept ashore with 10-mamplitude in northern Sumatra and expandedacross + the Indian Ocean and Andaman Sea,striking Sri Lanka and Thailand within twohours + of the rupture.Confirmed deaths alongthe coastlines of 11 Indian Ocean nationsexceed + 220,000,marking this as one of themost lethal natural disasters in human history.The + 2004 Sumatra-Andaman earthquake isthe largest event since the 1964 Good FridayAlaskan + earthquake (", "venue": "", "year": 2005, "referenceCount": 3, "citationCount": + 60, "influentialCitationCount": 10, "isOpenAccess": true, "openAccessPdf": + {"url": "https://agupubs.onlinelibrary.wiley.com/doi/pdfdirect/10.1029/2005EO060001", + "status": "BRONZE"}, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": + "Geology", "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2005-02-08", "journal": {"name": + "Eos, Transactions American Geophysical Union", "pages": "57-61", "volume": + "86"}, "authors": [{"authorId": "2116768789", "name": "Jeffrey Park"}, {"authorId": + "2523166", "name": "K. Anderson"}, {"authorId": "2278314", "name": "R. Aster"}, + {"authorId": "38653365", "name": "R. Butler"}, {"authorId": "144235940", "name": + "T. Lay"}, {"authorId": "50182565", "name": "D. Simpson"}]}, {"paperId": "735e216b18d6c11cf297d2516fd42a42731733c1", + "externalIds": {"MAG": "1993933078", "DOI": "10.1038/nature09012", "CorpusId": + 4417333, "PubMed": "20463735"}, "corpusId": 4417333, "publicationVenue": {"id": + "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, + "url": "https://www.semanticscholar.org/paper/735e216b18d6c11cf297d2516fd42a42731733c1", + "title": "Molecular robots guided by prescriptive landscapes", "abstract": + null, "venue": "Nature", "year": 2010, "referenceCount": 37, "citationCount": + 761, "influentialCitationCount": 13, "isOpenAccess": true, "openAccessPdf": + {"url": "https://europepmc.org/articles/pmc2907518?pdf=render", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2010-05-13", "journal": + {"name": "Nature", "pages": "206-210", "volume": "465"}, "authors": [{"authorId": + "39284621", "name": "Kyle Lund"}, {"authorId": "33954095", "name": "Anthony + J. Manzo"}, {"authorId": "3195888", "name": "Nadine Dabby"}, {"authorId": + "2745233", "name": "N. Michelotti"}, {"authorId": "1398201994", "name": "Alexander + Johnson-Buck"}, {"authorId": "5832261", "name": "Jeanette Nangreave"}, {"authorId": + "32483464", "name": "Steven K Taylor"}, {"authorId": "37967713", "name": "R. + Pei"}, {"authorId": "2386889", "name": "M. Stojanovi\u0107"}, {"authorId": + "1841910", "name": "N. Walter"}, {"authorId": "3094920", "name": "E. Winfree"}, + {"authorId": "144303419", "name": "Hao Yan"}]}, {"paperId": "8470d78c1fbb27b8aa39dfc7a9fc6daa2e0c0dda", + "externalIds": {"MAG": "2488438516", "CorpusId": 83416836}, "corpusId": 83416836, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8470d78c1fbb27b8aa39dfc7a9fc6daa2e0c0dda", "title": "Microstructure of shortenings, margarine and butter--a review", "abstract": "Fat spreads are composed of liquid oil, fat c rystals and water. The fat crystals in these prod uc ts give the product the requi red consis @@ -42044,24 +47673,32 @@ interactions: September 20, 1988 Manuscript received November 30, 1988 Direct inquiries to I. Heertje Telephone number: 31 10 4605513", "venue": "", "year": 1988, "referenceCount": 24, "citationCount": 84, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Materials Science"], - "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": - "Materials Science", "source": "external"}, {"category": "Agricultural And - Food Sciences", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": {"name": "Food Structure", "pages": "8", - "volume": "7"}, "authors": [{"authorId": "12525264", "name": "A. C. Juriaanse"}, - {"authorId": "17078085", "name": "I. Heertje"}]}, {"paperId": "0667aab7ffba43edfefad0384bcb33087289056b", - "externalIds": {"MAG": "2913091558", "DOI": "10.1007/978-1-4419-1452-1_20", - "CorpusId": 14946807}, "url": "https://www.semanticscholar.org/paper/0667aab7ffba43edfefad0384bcb33087289056b", - "title": "Artificial Consciousness", "abstract": null, "venue": "", "year": - 2007, "referenceCount": 148, "citationCount": 82, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1701881", - "name": "A. Chella"}, {"authorId": "1961635", "name": "R. Manzotti"}]}, {"paperId": - "c1a23b65d34fd5f119d28d050a71c0804b33403c", "externalIds": {"MAG": "2064885808", - "DOI": "10.1088/0370-1328/73/2/314", "CorpusId": 137103705}, "url": "https://www.semanticscholar.org/paper/c1a23b65d34fd5f119d28d050a71c0804b33403c", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Materials Science"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": + "external"}, {"category": "Materials Science", "source": "external"}, {"category": + "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": {"name": "Food Structure", + "pages": "8", "volume": "7"}, "authors": [{"authorId": "12525264", "name": + "A. C. Juriaanse"}, {"authorId": "17078085", "name": "I. Heertje"}]}, {"paperId": + "7a2abf0b489d4c3255d1fd8e1b9bf84559558eb6", "externalIds": {"MAG": "1969808485", + "DBLP": "journals/npl/SongLZ15", "DOI": "10.1007/s11063-014-9378-1", "CorpusId": + 17871789}, "corpusId": 17871789, "publicationVenue": {"id": "03101d6e-e317-48fe-ab55-f82ed4f0727f", + "name": "Neural Processing Letters", "type": "journal", "alternate_names": + ["Neural Process Lett"], "issn": "1370-4621", "url": "https://link.springer.com/journal/11063"}, + "url": "https://www.semanticscholar.org/paper/7a2abf0b489d4c3255d1fd8e1b9bf84559558eb6", + "title": "Asynchronous Spiking Neural P Systems with Anti-Spikes", "abstract": + null, "venue": "Neural Processing Letters", "year": 2015, "referenceCount": + 32, "citationCount": 28, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2015-12-01", "journal": {"name": "Neural Processing Letters", + "pages": "633-647", "volume": "42"}, "authors": [{"authorId": "145147427", + "name": "Tao Song"}, {"authorId": "46522058", "name": "Xiangrong Liu"}, {"authorId": + "7724819", "name": "Xiangxiang Zeng"}]}, {"paperId": "c1a23b65d34fd5f119d28d050a71c0804b33403c", + "externalIds": {"MAG": "2064885808", "DOI": "10.1088/0370-1328/73/2/314", + "CorpusId": 137103705}, "corpusId": 137103705, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c1a23b65d34fd5f119d28d050a71c0804b33403c", "title": "Vacancy Diffusion in Ordered Alloys", "abstract": "A mechanism of vacancy diffusion in ordered alloys is examined in some detail for the stoichiometric simple cubic binary alloy. Upper and lower bounds for the ratio G of the self-diffusion @@ -42071,89 +47708,173 @@ interactions: found that l/a < G < a where a- 2 and only slightly temperature dependent. Such experimental evidence as there is bears out this simple yet striking result.", "venue": "", "year": 1959, "referenceCount": 2, "citationCount": - 59, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1959-02-01", "journal": {"name": - "", "pages": "250-264", "volume": "73"}, "authors": [{"authorId": "1514744336", - "name": "E. Elcock"}]}, {"paperId": "1d9355dab845b24ff2700b4f8da08b1c32dcdaf0", - "externalIds": {"MAG": "2037663536", "DOI": "10.1016/S0092-8240(05)80007-2", - "CorpusId": 122221547}, "url": "https://www.semanticscholar.org/paper/1d9355dab845b24ff2700b4f8da08b1c32dcdaf0", - "title": "Discussion: Turing''s theory of morphogenesis\u2014Its influence - on modelling biological pattern and form", "abstract": null, "venue": "", - "year": 1990, "referenceCount": 47, "citationCount": 62, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Bulletin of Mathematical Biology", "pages": "117-152", - "volume": "52"}, "authors": [{"authorId": "88251269", "name": "J. Murray"}]}, - {"paperId": "afc173f4f8342b348185ccab7a2661e6dd2ce219", "externalIds": {"MAG": - "207929970", "DOI": "10.1007/978-3-662-05642-4_20", "CorpusId": 108243531}, - "url": "https://www.semanticscholar.org/paper/afc173f4f8342b348185ccab7a2661e6dd2ce219", - "title": "Watching the Daisies Grow: Turing and Fibonacci Phyllotaxis", "abstract": - null, "venue": "", "year": 2004, "referenceCount": 27, "citationCount": 23, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], - "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "pages": "477-498", "volume": ""}, "authors": - [{"authorId": "12535173", "name": "J. Swinton"}]}, {"paperId": "37ce9ed6a937d42992dd27770b017456ce10f515", - "externalIds": {"MAG": "2320090131", "DOI": "10.1021/jp500432t", "CorpusId": - 29676424, "PubMed": "24601764"}, "url": "https://www.semanticscholar.org/paper/37ce9ed6a937d42992dd27770b017456ce10f515", - "title": "Target Turing patterns and growth dynamics in the chlorine dioxide-iodine-malonic - acid reaction.", "abstract": "We study the growth dynamics of Turing patterns - in the chlorine dioxide-iodine-malonic acid reaction-diffusion system in response - to perturbations with visible light. We describe several mechanisms by which - Turing patterns reappear after they are suppressed by illumination with a - disc-shaped geometry. We observe that under specific conditions the patterns - reorganize from a random configuration of spots and stripes to a set of ordered, - concentric rings, which we refer to as target Turing patterns. These patterns - closely resemble the unit cells of the Turing hexagonal superlattices known - as black eye patterns. However, these target Turing patterns are not part - of a larger superlattice structure, and they usually have a larger number - of concentric rings. Numerical simulations support the experimental findings.", - "venue": "Journal of Physical Chemistry A", "year": 2014, "referenceCount": - 32, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": + 59, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1959-02-01", + "journal": {"name": "", "pages": "250-264", "volume": "73"}, "authors": [{"authorId": + "1514744336", "name": "E. Elcock"}]}, {"paperId": "8f091c61350de05ae113e5c8460ca1b6b647007b", + "externalIds": {"MAG": "2149013205", "DOI": "10.1093/IMAMAT/61.1.15", "CorpusId": + 1049611}, "corpusId": 1049611, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8f091c61350de05ae113e5c8460ca1b6b647007b", + "title": "Turing instability and travelling waves in diffusive plankton models + with delayed nutrient recycling", "abstract": "In this paper we propose a + reaction-diffusion system with two distributed delays to stimulate the growth + of plankton communities in the lakes/oceans in which the plankton feeds on + a limiting nutrient supplied at a constant rate. The limiting nutrient is + partially recycled after the death of the organisms and a distributed delay + is used to model nutrient recycling. The second delay is involved in the growth + response of the plankton to nutrient uptake. We first show that there are + oscillations (Hopf bifurcations) in the delay model induced by the second + delay. Then we study Turing (diffusion-driven) instability of the reaction-diffusion + system with delay. Finally, it is shown that if the delay model has a stable + periodic solution, then the corresponding reaction-diffusion model with delay + has a family of travelling waves.", "venue": "", "year": 1998, "referenceCount": + 39, "citationCount": 46, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-09-01", + "journal": {"name": "Ima Journal of Applied Mathematics", "pages": "15-32", + "volume": "61"}, "authors": [{"authorId": "145809344", "name": "S. Ruan"}]}, + {"paperId": "75db2933cad56d0b5bb0eb9678e71e2dda306f59", "externalIds": {"MAG": + "2017039405", "DOI": "10.1002/MRM.1910400516", "CorpusId": 20727787, "PubMed": + "9797159"}, "corpusId": 20727787, "publicationVenue": {"id": "c1269fa2-b51c-4648-bf0c-95797c4a74cd", + "name": "Magnetic Resonance in Medicine", "type": "journal", "alternate_names": + ["Magn Reson Med"], "issn": "0740-3194", "url": "http://www3.interscience.wiley.com/cgi-bin/jhome/10005196", + "alternate_urls": ["https://onlinelibrary.wiley.com/journal/15222594", "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1522-2594", + "http://www.interscience.wiley.com/jpages/0740-3194/"]}, "url": "https://www.semanticscholar.org/paper/75db2933cad56d0b5bb0eb9678e71e2dda306f59", + "title": "Age\u2010related changes in Brain T1 are correlated with iron concentration", + "abstract": "Age\u2010related changes in brain T1 from 115 healthy subjects + (range, 4.5\u201371.9 yr) were analyzed in relation to published regional + brain iron concentration in cortex, caudate, putamen, and frontal white matter. + The relaxation rate in these struc tures was linear with respect to iron concentration + (P < 0.001). The iron relaxivity, k1 (s\u22121/mg iron/g wet weight), was + much higher in cortex (5.5) and white matter (6.1) than in caudate (1.7) and + putamen (1.0). These results are consistent with evidence that iron is an + important factor in determining the relaxation properties of brain tissue. + Iron relaxivity may reflect regional differences in the physical state of + brain iron or in the interaction of brain iron with tissue water.", "venue": + "Magnetic Resonance in Medicine", "year": 1998, "referenceCount": 21, "citationCount": + 109, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-03-19", "journal": {"name": "The - journal of physical chemistry. A", "pages": "\n 2393-400\n ", - "volume": "118 13"}, "authors": [{"authorId": "66625795", "name": "Asher Preska - Steinberg"}, {"authorId": "144854275", "name": "I. Epstein"}, {"authorId": - "4978913", "name": "M. Dolnik"}]}, {"paperId": "b14478c33908d4c67206dbc09f149f230b999159", - "externalIds": {"DBLP": "journals/bsl/Shapiro98", "MAG": "2060700159", "DOI": - "10.2307/421032", "CorpusId": 14473266}, "url": "https://www.semanticscholar.org/paper/b14478c33908d4c67206dbc09f149f230b999159", - "title": "Incompleteness, Mechanism, and Optimism", "abstract": "\u00a71. - Overview. Philosophers and mathematicians have drawn lots of conclusions from - G\u00f6del''s incompleteness theorems, and related results from mathematical - logic. Languages, minds, and machines figure prominently in the discussion. - G\u00f6del''s theorems surely tell us something about these important matters. - But what? A descriptive title for this paper would be \u201cG\u00f6del, Lucas, - Penrose, Turing, Feferman, Dummett, mechanism, optimism, reflection, and indefinite - extensibility\u201d. Adding \u201cGod and the Devil\u201d would probably be - redundant. Despite the breath-taking, whirlwind tour, I have the modest aim - of forging connections between different parts of this literature and clearing - up some confusions, together with the less modest aim of not introducing any - more confusions. I propose to focus on three spheres within the literature - on incompleteness. The first, and primary, one concerns arguments that G\u00f6del''s - theorem refutes the mechanistic thesis that the human mind is, or can be accurately - modeled as, a digital computer or a Turing machine. The most famous instance - is the much reprinted J. R. Lucas [18]. To summarize, suppose that a mechanist - provides plans for a machine, M, and claims that the output of M consists - of all and only the arithmetic truths that a human (like Lucas), or the totality - of human mathematicians, will ever or can ever know. We assume that the output - of M is consistent.", "venue": "Bulletin of Symbolic Logic", "year": 1998, - "referenceCount": 52, "citationCount": 51, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Philosophy"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Philosophy", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1998-09-01", "journal": {"name": "Bulletin of Symbolic - Logic", "pages": "273 - 302", "volume": "4"}, "authors": [{"authorId": "145144322", - "name": "S. Shapiro"}]}, {"paperId": "d6a59868ed67dc581b3a721824c130490ea74566", + {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "ClinicalTrial"], + "publicationDate": "1998-11-01", "journal": {"name": "Magnetic Resonance in + Medicine", "volume": "40"}, "authors": [{"authorId": "1846240", "name": "R. + Ogg"}, {"authorId": "2201778", "name": "R. Steen"}]}, {"paperId": "555948f8a80c6b0ecf6d04cac84c777b5b7e7421", + "externalIds": {"MAG": "2093414331", "DOI": "10.13031/2013.33783", "CorpusId": + 110408472}, "corpusId": 110408472, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/555948f8a80c6b0ecf6d04cac84c777b5b7e7421", + "title": "A Thermal Infrared Technique for Monitoring Cotton Water Stress + and Scheduling Irrigations e", "abstract": "ABSTRACT STEPWISE, multiple linear + regression analysis estab-lished that a crop water stress index (CWSI) derived + from mid-day radiant leaf temperatures, air tempera-tures, and vapor pressure + deficits was the most impor-tant independent variable in predicting the xylem + pres-sure potential of cotton leaves. When the CWSI was combined with the + age of the crop and the evaporative demand of the atmosphere, the water potential + of cotton could be predicted throughout the entire growing season. This permits + day by day monitoring of cotton plant water status which could facilitate + the irrigation decision mak-ing progress without resorting to tedious physiological + plant measurements.", "venue": "", "year": 1982, "referenceCount": 0, "citationCount": + 61, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Agricultural And Food Sciences", "source": + "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Transactions + of the ASABE", "pages": "1651-1655", "volume": "25"}, "authors": [{"authorId": + "1399494855", "name": "P. Pinter"}, {"authorId": "8604744", "name": "R. Reginato"}]}, + {"paperId": "f586c94bfb10bab5e29e90541e675a682d60d64c", "externalIds": {"DBLP": + "conf/aaai/Shieber06", "MAG": "2142056599", "CorpusId": 216609598}, "corpusId": + 216609598, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f586c94bfb10bab5e29e90541e675a682d60d64c", + "title": "Does the Turing Test Demonstrate Intelligence or Not?", "abstract": + "The Turing Test has served as a defining inspiration throughout the early + history of artificial intelligence research. Its centrality arises in part + because verbal behavior indistinguishable from that of humans seems like an + incontrovertible criterion for intelligence, a \u201cphilosophical conversation + stopper\u201d as Dennett (1985) says. On the other hand, from the moment Turing\u2019s + seminal article (Turing, 1950) was published, the conversation hasn\u2019t + stopped; the appropriateness of the Test has been continually questioned, + and current philosophical wisdom holds that the Turing Test is hopelessly + flawed as a sufficient condition for attributing intelligence. In this short + article, I summarize for an artificial intelligence audience an argument that + I have presented at length for a philosophical audience (Shieber, to appear) + that attempts to reconcile these two mutually contradictory but well-founded + attitudes towards the Turing Test that have been under constant debate since + 1950 (Shieber, 2004). The arguments against the sufficiency of the Turing + Test for determining intelligence rely on showing that some extra conditions + are logically necessary for intelligence beyond the behavioral properties + exhibited by a subject under a Turing Test. Therefore, it cannot follow logically + from passing a Turing Test that the agent is intelligent. I will argue that + these extra conditions can be revealed by the Turing Test, so long as we allow + a very slight weakening of the criterion from one of logical proof to one + of statistical proof under weak realizability assumptions. Crucially, this + weakening is so slight as to make no conceivable difference from a practical + standpoint. Thus, the Gordian knot between the two opposing views of the sufficiency + of the Turing Test can be cut.", "venue": "AAAI", "year": 2006, "referenceCount": + 12, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2006-07-16", "journal": {"pages": "1539-1542"}, "authors": + [{"authorId": "1692491", "name": "S. Shieber"}]}, {"paperId": "1c34452d2a4060c1cbb411ce667c141910eaeb2b", + "externalIds": {"MAG": "1990000710", "DOI": "10.1016/J.JTBI.2003.09.018", + "CorpusId": 855264, "PubMed": "14759646"}, "corpusId": 855264, "publicationVenue": + {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", "name": "Journal of Theoretical + Biology", "type": "journal", "alternate_names": ["J Theor Biology"], "issn": + "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/1c34452d2a4060c1cbb411ce667c141910eaeb2b", + "title": "The role of trans-membrane signal transduction in turing-type cellular + pattern formation.", "abstract": null, "venue": "Journal of Theoretical Biology", + "year": 2004, "referenceCount": 21, "citationCount": 60, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-02-21", "journal": {"name": "Journal of theoretical biology", "pages": + "\n 401-7\n ", "volume": "226 4"}, "authors": [{"authorId": + "46803935", "name": "E. Rauch"}, {"authorId": "3519329", "name": "M. Millonas"}]}, + {"paperId": "48b7de5a880a0ea6fcfa42e0973b727d9770211d", "externalIds": {"MAG": + "3045553083", "DOI": "10.3354/MEPS236301", "CorpusId": 49218035}, "corpusId": + 49218035, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/48b7de5a880a0ea6fcfa42e0973b727d9770211d", + "title": "Egg hatching rate of the cyclopoid copepod Oithona similis in arctic + and temperate waters", "abstract": "An equation is presented to facilitate + estimation of the production of the cosmopolitan cyclopoid copepod Oithona + similis. The egg hatching rate was studied from Arctic, subarctic and temperate + waters covering a tempera- ture interval from -1 to 20.5\u00b0C. Within this + temperature range the hatching rate (HR) increased from 0.03 to 0.42 d -1 + . Results from all experiments were fitted to a function HR (% d -1 )= 4.2176 + + 1.7545T (r 2 = 0.98; p < 0.0001), where T = temperature. When combined with + site-specific informa- tion on temperature, egg:female ratios and the carbon + content of females and eggs, secondary production of this ubiquitous species + can be readily estimated.", "venue": "", "year": 2002, "referenceCount": 27, + "citationCount": 61, "influentialCitationCount": 14, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.int-res.com/articles/meps2002/236/m236p301.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-07-03", + "journal": {"name": "Marine Ecology Progress Series", "pages": "301-306", + "volume": "236"}, "authors": [{"authorId": "35001876", "name": "T. Nielsen"}, + {"authorId": "1401549344", "name": "E. M\u00f8ller"}, {"authorId": "86964198", + "name": "S. Satapoomin"}, {"authorId": "2697855", "name": "M. Ringuette"}, + {"authorId": "3757133", "name": "R. Hopcroft"}]}, {"paperId": "74d59d2bb799b531017c92027ecfef6a141b4421", + "externalIds": {"MAG": "1659239360", "DBLP": "journals/corr/abs-0907-4100", + "ArXiv": "0907.4100", "CorpusId": 18352786}, "corpusId": 18352786, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/74d59d2bb799b531017c92027ecfef6a141b4421", + "title": "Beyond Turing Machines", "abstract": "This paper discusses \"computational\" + systems capable of \"computing\" functions not computable by predefined Turing + machines if the systems are not isolated from their environment. Roughly speaking, + these systems can change their finite descriptions by interacting with their + environment.", "venue": "ArXiv", "year": 2009, "referenceCount": 13, "citationCount": + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-07-23", "journal": {"name": "ArXiv", "volume": "abs/0907.4100"}, "authors": + [{"authorId": "2640693", "name": "K. Ammon"}]}, {"paperId": "d6a59868ed67dc581b3a721824c130490ea74566", "externalIds": {"PubMedCentral": "8580451", "ArXiv": "2106.08375", "DOI": - "10.1098/rsta.2020.0268", "CorpusId": 235446476, "PubMed": "34743603"}, "url": - "https://www.semanticscholar.org/paper/d6a59868ed67dc581b3a721824c130490ea74566", + "10.1098/rsta.2020.0268", "CorpusId": 235446476, "PubMed": "34743603"}, "corpusId": + 235446476, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d6a59868ed67dc581b3a721824c130490ea74566", "title": "Modern perspectives on near-equilibrium analysis of Turing systems", "abstract": "In the nearly seven decades since the publication of Alan Turing\u2019s work on morphogenesis, enormous progress has been made in understanding both @@ -42177,156 +47898,18 @@ interactions: open frontiers in Turing\u2019s theory of morphogenesis\u2019.", "venue": "Philosophical Transactions of the Royal Society A", "year": 2021, "referenceCount": 220, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine", "Physics", "Biology"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2021-06-15", "journal": {"name": "Philosophical transactions. Series A, Mathematical, - physical, and engineering sciences", "volume": "379"}, "authors": [{"authorId": - "22256586", "name": "Andrew L. Krause"}, {"authorId": "2662569", "name": "E. - Gaffney"}, {"authorId": "2339973", "name": "P. Maini"}, {"authorId": "2691918", - "name": "V. Klika"}]}, {"paperId": "5121d759d2753f2003aa666c54c70ff21135232a", - "externalIds": {"DBLP": "conf/iclp/DevienneLR92", "MAG": "1726077092", "DOI": - "10.1007/3-540-56503-5_7", "CorpusId": 125604212}, "url": "https://www.semanticscholar.org/paper/5121d759d2753f2003aa666c54c70ff21135232a", - "title": "Halting Problem of One Binary Horn Clause is Undecidable", "abstract": - null, "venue": "STACS", "year": 1993, "referenceCount": 18, "citationCount": - 43, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1993-02-25", "journal": - {"pages": "48-57"}, "authors": [{"authorId": "1870001", "name": "P. Devienne"}, - {"authorId": "2234897", "name": "P. Leb\u00e8gue"}, {"authorId": "1774532", - "name": "J. Routier"}]}, {"paperId": "6e06d154b5a1244e9df6c37ce4e0abe2de9141dd", - "externalIds": {"DBLP": "journals/jcss/PaulR81", "MAG": "1989122074", "DOI": - "10.1016/0022-0000(81)90035-0", "CorpusId": 46476419}, "url": "https://www.semanticscholar.org/paper/6e06d154b5a1244e9df6c37ce4e0abe2de9141dd", - "title": "On Time versus Space II. (Turing Machines)", "abstract": null, "venue": - "J. Comput. Syst. Sci.", "year": 1981, "referenceCount": 11, "citationCount": - 20, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1981-06-01", "journal": {"name": "J. - Comput. Syst. Sci.", "pages": "312-327", "volume": "22"}, "authors": [{"authorId": - "1727613", "name": "W. Paul"}, {"authorId": "2715951", "name": "R. Reischuk"}]}, - {"paperId": "8bfc6b2a79ac237eeda5304e0a8c7c892d47499f", "externalIds": {"MAG": - "2176457270", "DBLP": "journals/cacm/Hoare81", "DOI": "10.1145/358549.358561", - "CorpusId": 97895}, "url": "https://www.semanticscholar.org/paper/8bfc6b2a79ac237eeda5304e0a8c7c892d47499f", - "title": "The emperor''s old clothes", "abstract": "The 1980 ACM Turing Award - was presented to Charles Antony Richard Hoare, Professor of Computation at - the University of Oxford, England, by Walter Carlson, Chairman of the Awards - Committee, at the ACM Annual Conference in Nashville, Tennessee, October 27, - 1980. Professor Hoare was selected by the General Technical Achievement Award - Committee for his fundamental contributions to the definition and design of - programming languages. His work is characterized by an unusual combination - of insight, originality, elegance, and impact. He is best known for his work - on axiomatic definitions of programming languages through the use of techniques - popularly referred to as axiomatic semantics. He developed ingenious algorithms - such as Quichsort and was responsible for inventing and promulgating advanced - data structuring techniques in scientific programming languages. He has also - made important contributions to operating systems through the study of monitors. - His most recent work is on communicating sequential processes. Prior to his - appointment to the University of Oxford in 1977, Professor Hoare was Professor - of Computer Science at The Queen''s University in Belfast, Ireland, from 1968 - to 1977 and was a Visiting Professor at Stanford University in 1973. From - 1960 to 1968 he held a number of positions with Elliott Brothers, Ltd., England.", - "venue": "CACM", "year": 1981, "referenceCount": 18, "citationCount": 317, - "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1981-02-01", "journal": - {"name": "Commun. ACM", "pages": "75-83", "volume": "24"}, "authors": [{"authorId": - "144861543", "name": "C. Hoare"}]}, {"paperId": "936aa54dd2969d128151ead7d2de9b712ee8fb0b", - "externalIds": {"MAG": "2474564653", "DBLP": "conf/ae/Tanomaru97", "DOI": - "10.1007/BFb0026599", "CorpusId": 37851486}, "url": "https://www.semanticscholar.org/paper/936aa54dd2969d128151ead7d2de9b712ee8fb0b", - "title": "Evolving Turing Machines from Examples", "abstract": null, "venue": - "Artificial Evolution", "year": 1997, "referenceCount": 8, "citationCount": - 13, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1997-10-01", "journal": - {"pages": "167-182"}, "authors": [{"authorId": "2119656", "name": "J. Tanomaru"}]}, - {"paperId": "e9775eaaaa28deae809b11a2cb135de26f4ef11a", "externalIds": {"MAG": - "1971517504", "DOI": "10.1002/JEZ.1402700103", "CorpusId": 40483100}, "url": - "https://www.semanticscholar.org/paper/e9775eaaaa28deae809b11a2cb135de26f4ef11a", - "title": "Patterns of temperature\u2010dependent sex determination in turtles", - "abstract": "Among reptiles that show temperature-dependent sex determination, - sex ratios vary across constant incubation temperatures in ways sufficiently - predictable to allow classifica- tion into patterns. One common pattern shows - low temperatures yielding only males and high temperatures yielding only females. - Another common pattern has low as well as high tempera- tures yielding only - or mostly females and some intermediate temperatures yielding mostly males. - Patterns tend to be associated with the direction of sexual dimorphism in - adult size, especially for species with strong dimorphism. Pivotal temperatures - (those yielding 1:l sex ratios) within the best-documented species and genera - tend to increase with both latitude and longitude across central and southern - North America. These geographic trends probably reflect factors that affect - nest temperatures (duration of grow- ing season, insolation, and prevailing - amounts of shading by vegetation). Data from a population of the alligator - snapping turtle (Macroclemys temminckii) suggest that some embryos are temperature-independent - females because these individuals become females even when they are shifted - among male-producing temperatures during development. These indi- viduals - are also more frequent in clutches of small eggs. In this and several other - species, no constant incubation temperatures yield more than 75% males. 0 - 1994 WiIey-Liss, Inc.", "venue": "", "year": 1994, "referenceCount": 63, "citationCount": - 309, "influentialCitationCount": 25, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1994-09-15", "journal": {"name": "Journal of Experimental Zoology", "pages": - "3-15", "volume": "270"}, "authors": [{"authorId": "50231079", "name": "M. - Ewert"}, {"authorId": "87920465", "name": "D. R. Jackson"}, {"authorId": "146406637", - "name": "C. Nelson"}]}, {"paperId": "f520f751438659c03b00eee6adedc2f474fbedcb", - "externalIds": {"MAG": "2169705370", "DOI": "10.1111/J.1365-2907.2005.00053.X", - "CorpusId": 52237486}, "url": "https://www.semanticscholar.org/paper/f520f751438659c03b00eee6adedc2f474fbedcb", - "title": "The response of mammals to forest fire and timber harvest in the - North American boreal forest", "abstract": "This paper reviews and compares - the effects of forest fire and timber harvest on mamma- lian abundance and - diversity, throughout successional time in the boreal forest of North America. - 2. Temporal trends in mammal abundance and diversity are generally similar - for both harvested and burned stands, with some differences occurring in the - initiation stage (0- 10 years post disturbance). 3. Small mammals and ungulates - are most abundant immediately post disturbance, and decrease as stands age. - Lynxes and hares utilize mid-successional stands, but are rare in young and - old stands. Bats, arboreal sciurids and mustelids increase in abundance with - stand age, and are most abundant in old growth. 4. Substantial gaps in the - data exist for carnivores; the response of these species to fire and harvest - requires research, as predator-prey interactions can affect mammal community - struc- ture in both early and late successional stages. 5. The lack of explicit - treatment of in-stand forest structure post disturbance, in the reviewed literature - made comparisons difficult. Where forest structure was considered, the presence - of downed woody material, live residual trees and standing dead wood were - shown to facilitate convergence of mammal communities to a pre-disturbance - state for both disturbance types. 6. Mammalian assemblages differed considerably - between successional stages, emphasizing the importance of maintaining stands - of each successional stage on the landscape when implementing forest management - strategies.", "venue": "", "year": 2005, "referenceCount": 222, "citationCount": - 343, "influentialCitationCount": 29, "isOpenAccess": false, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": null, "journal": {"name": "Mammal Review", - "pages": "51-81", "volume": "35"}, "authors": [{"authorId": "3062752", "name": - "J. Fisher"}, {"authorId": "145111478", "name": "Lisa. Wilkinson"}]}, {"paperId": - "7a07117b3f7bbd61d5ddc4c9e33987d4a0050c83", "externalIds": {"DBLP": "conf/stoc/Kaltofen82", - "MAG": "2020327259", "DOI": "10.1145/800070.802200", "CorpusId": 16661058}, - "url": "https://www.semanticscholar.org/paper/7a07117b3f7bbd61d5ddc4c9e33987d4a0050c83", - "title": "A polynomial reduction from multivariate to bivariate integral polynomial - factorization.", "abstract": "Given an arbitrary but fixed integer r -&-ge; - 3. We show that testing r-variate polynomials with integer coefficients for - irreducibility is m-reducible in polynomial time of the total degree and the - largest coefficient length to testing bivariate polynomials for irreducibility. - Factoring r-variate polynomials into irreducibles is polynomial time Turing-reducible - to completely factoring bivariate polynomials.", "venue": "Symposium on the - Theory of Computing", "year": 1982, "referenceCount": 13, "citationCount": - 34, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1982-05-05", "journal": {"pages": - "261-266"}, "authors": [{"authorId": "1741558", "name": "E. Kaltofen"}]}, - {"paperId": "b3ba8220435b2b63865f2974ec95850e98db660d", "externalIds": {"DBLP": - "journals/jsyml/Sasso75", "MAG": "2069764971", "DOI": "10.2307/2271892", "CorpusId": - 39915695}, "url": "https://www.semanticscholar.org/paper/b3ba8220435b2b63865f2974ec95850e98db660d", + "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Physics", "Biology"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Biology", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2021-06-15", "journal": {"name": "Philosophical + transactions. Series A, Mathematical, physical, and engineering sciences", + "volume": "379"}, "authors": [{"authorId": "22256586", "name": "Andrew L. + Krause"}, {"authorId": "2662569", "name": "E. Gaffney"}, {"authorId": "2339973", + "name": "P. Maini"}, {"authorId": "2691918", "name": "V. Klika"}]}, {"paperId": + "b3ba8220435b2b63865f2974ec95850e98db660d", "externalIds": {"DBLP": "journals/jsyml/Sasso75", + "MAG": "2069764971", "DOI": "10.2307/2271892", "CorpusId": 39915695}, "corpusId": + 39915695, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b3ba8220435b2b63865f2974ec95850e98db660d", "title": "A survey of partial degrees", "abstract": "Partial degrees are equivalence classes of partial natural number functions under some suitable extension of relative recursiveness to partial functions. The usual definitions of relative @@ -42352,132 +47935,120 @@ interactions: of these definitions yields a relation between partial functions, here called Turing reducibility, which is stronger still.", "venue": "Journal of Symbolic Logic", "year": 1975, "referenceCount": 20, "citationCount": 27, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1975-06-01", "journal": {"name": "Journal of Symbolic - Logic", "pages": "130 - 140", "volume": "40"}, "authors": [{"authorId": "2017403", - "name": "L. Sasso"}]}, {"paperId": "5b310052ca7fc5864cfb588b472bf1ed45ba8f4e", - "externalIds": {"MAG": "1976148933", "DBLP": "journals/mst/Ambos-SpiesDFM13", - "DOI": "10.1007/s00224-012-9424-1", "CorpusId": 307094}, "url": "https://www.semanticscholar.org/paper/5b310052ca7fc5864cfb588b472bf1ed45ba8f4e", - "title": "Maximal Pairs of Computably Enumerable Sets in the Computably Lipschitz - Degrees", "abstract": null, "venue": "Theory of Computing Systems", "year": - 2012, "referenceCount": 20, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Theory of Computing Systems", "pages": "2-27", "volume": "52"}, - "authors": [{"authorId": "1398717883", "name": "K. Ambos-Spies"}, {"authorId": - "38589453", "name": "Decheng Ding"}, {"authorId": "145353688", "name": "Yun - Fan"}, {"authorId": "1691379", "name": "W. Merkle"}]}, {"paperId": "80aac474447dc7feac0380f38309f38e62cd7108", - "externalIds": {"MAG": "2064577184", "DBLP": "conf/stoc/JonesL74", "DOI": - "10.1145/800119.803883", "CorpusId": 12251817}, "url": "https://www.semanticscholar.org/paper/80aac474447dc7feac0380f38309f38e62cd7108", - "title": "Complete problems for deterministic polynomial time", "abstract": - "The results of Cook and Karp ([K], [C]) aroused considerable interest for - at least two reasons. First, the answer to a long-standing open question which - had seemed peculiar to automata theory\u2014whether deterministic and nondeterministic - polynomial-time-bounded Turing machines are equivalent in power\u2014was seen - to be exactly equivalent to determining whether any of several familiar combinatorial - problems can be solved by polynomial-time algorithms. Second, the existence - of complete problems for NP1 made it possible to replace an entire class of - questions by a question about a single representative.Thus all of these combinatorial - and automata-theoretic problems were essentially restatements of a single - problem, such as: can satisfiability of a propositional formula be decided - in polynomial time.\n The main purpose of this paper is to introduce several - problems which are complete for P, the class of languages recognizable in - deterministic polynomial time. Any such language has the property that if - it is recognizable in space logk(\u2022), then every language in P is so recognizable. - Thus a problem complete for P will serve to differentiate those sets in P - which are not recognizable in logarithmic space from those which are, providing - such differentiation is possible. A problem of this type was first presented - by Cook in [C2], concerning solvable path systems.", "venue": "Symposium on - the Theory of Computing", "year": 1974, "referenceCount": 14, "citationCount": - 317, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1974-04-30", "journal": {"name": "Theor. Comput. Sci.", - "pages": "105-117", "volume": "3"}, "authors": [{"authorId": "1700623", "name": - "N. Jones"}, {"authorId": "2199440", "name": "William T. Laaser"}]}, {"paperId": - "0b34846e343b7b7c784ebd62e3590cc5d60847a3", "externalIds": {"MAG": "2966714118", - "DBLP": "conf/ijcai/MaoLWZPHW19", "DOI": "10.24963/ijcai.2019/714", "CorpusId": - 199465686}, "url": "https://www.semanticscholar.org/paper/0b34846e343b7b7c784ebd62e3590cc5d60847a3", - "title": "Aspect-Based Sentiment Classification with Attentive Neural Turing - Machines", "abstract": "Aspect-based sentiment classification aims to identify - sentiment polarity expressed towards a given opinion target in a sentence. - The sentiment polarity of the target is not only highly determined by sentiment - semantic context but also correlated with the concerned opinion target. Existing - works cannot effectively capture and store the inter-dependence between the - opinion target and its context. To solve this issue, we propose a novel model - of Attentive Neural Turing Machines (ANTM). Via interactive read-write operations - between an external memory storage and a recurrent controller, ANTM can learn - the dependable correlation of the opinion target to context and concentrate - on crucial sentiment information. Specifically, ANTM separates the information - of storage and computation, which extends the capabilities of the controller - to learn and store sequential features. The read and write operations enable - ANTM to adaptively keep track of the interactive attention history between - memory content and controller state. Moreover, we append target entity embeddings - into both input and output of the controller in order to augment the integration - of target information. We evaluate our model on SemEval2014 dataset which - contains reviews of Laptop and Restaurant domains and Twitter review dataset. - Experimental results verify that our model achieves state-of-the-art performance - on aspect-based sentiment classification.", "venue": "International Joint - Conference on Artificial Intelligence", "year": 2019, "referenceCount": 27, - "citationCount": 24, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", "Review"], - "publicationDate": "2019-08-01", "journal": {"pages": "5139-5145"}, "authors": - [{"authorId": "67081502", "name": "Qianren Mao"}, {"authorId": "47785906", - "name": "Jianxin Li"}, {"authorId": "3210262", "name": "Senzhang Wang"}, {"authorId": - "2145782607", "name": "Yuanning Zhang"}, {"authorId": null, "name": "Hao Peng"}, - {"authorId": "2116975361", "name": "Min He"}, {"authorId": "2108740151", "name": - "Lihong Wang"}]}, {"paperId": "13ee57393b6f7dc7ab708d287ca088037d92a81b", - "externalIds": {"MAG": "2333350765", "DOI": "10.3934/DCDSS.2011.4.1621", "CorpusId": - 124158839}, "url": "https://www.semanticscholar.org/paper/13ee57393b6f7dc7ab708d287ca088037d92a81b", - "title": "Turing instability in a coupled predator-preymodel with different - Holling type functional responses", "abstract": "In a reaction-diffusion system, - diffusion can induce the instability \nof a positive equilibrium which is - stable with respect to a \nconstant perturbation, therefore, the diffusion - may create new \npatterns when the corresponding system without diffusion - fails, \n as shown by Turing in 1950s. In this paper we study a coupled \n - predator-prey model with different Holling type functional \n responses, where - cross-diffusions are included in such a way that \n the prey runs away from - predator and the predator chase preys. We \n conduct the Turing instability - analysis for each Holling functional response. \n We prove that if a positive - equilibrium solution is linearly stable with respect to the ODE system of - \n the predator-prey model, then it is \nalso linearly stable with respect - to the model. So diffusion and \ncross-diffusion in the predator-prey model - with Holling type \nfunctional responses given in this paper can not drive - Turing \ninstability. However, diffusion and cross-diffusion can still create - \nnon-constant positive solutions for the model.", "venue": "", "year": 2010, - "referenceCount": 26, "citationCount": 17, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-12-01", - "journal": {"name": "Discrete and Continuous Dynamical Systems - Series S", - "pages": "1621-1628", "volume": "4"}, "authors": [{"authorId": "7654404", - "name": "Zhifu Xie"}]}, {"paperId": "c630d9ff8bbd4102715f5726ccb47b1d6105dcff", - "externalIds": {"DBLP": "conf/stoc/Paul77", "MAG": "2041195445", "DOI": "10.1145/800105.803411", - "CorpusId": 27644125}, "url": "https://www.semanticscholar.org/paper/c630d9ff8bbd4102715f5726ccb47b1d6105dcff", - "title": "On time hierarchies", "abstract": "For fixed k \u2265 2 we tighten - the time hierarchy for k-tape Turing machines. Also for fixed k \u2265 2 we - exhibit infinite hierarchies of languages recognizable by k-tape machines - with increasing amount of time on the same amount of space.", "venue": "STOC - ''77", "year": 1977, "referenceCount": 8, "citationCount": 34, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1977-05-04", "journal": {"name": "J. Comput. Syst. Sci.", "pages": "197-202", - "volume": "19"}, "authors": [{"authorId": "1727613", "name": "W. Paul"}]}, - {"paperId": "b4367ba580fec79b455b8f3234d215f07bf79d40", "externalIds": {"ArXiv": - "1908.09495", "MAG": "2969509007", "DOI": "10.1103/PhysRevE.100.042220", "CorpusId": - 201705326, "PubMed": "31771002"}, "url": "https://www.semanticscholar.org/paper/b4367ba580fec79b455b8f3234d215f07bf79d40", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1975-06-01", "journal": {"name": "Journal of + Symbolic Logic", "pages": "130 - 140", "volume": "40"}, "authors": [{"authorId": + "2017403", "name": "L. Sasso"}]}, {"paperId": "37ce9ed6a937d42992dd27770b017456ce10f515", + "externalIds": {"MAG": "2320090131", "DOI": "10.1021/jp500432t", "CorpusId": + 29676424, "PubMed": "24601764"}, "corpusId": 29676424, "publicationVenue": + {"id": "5f859516-15a8-4333-8460-9fcabe48d75e", "name": "Journal of Physical + Chemistry A", "type": "journal", "alternate_names": ["J Phys Chem A", "The + Journal of Physical Chemistry", "J Phys Chem"], "issn": "1089-5639", "alternate_issns": + ["0092-7325", "0022-3654"], "url": "https://pubs.acs.org/journal/jpcafh", + "alternate_urls": ["http://pubs.acs.org/journals/jpcafh/", "http://pubs.acs.org/journal/jpcafh", + "https://pubs.acs.org/loi/jpchax"]}, "url": "https://www.semanticscholar.org/paper/37ce9ed6a937d42992dd27770b017456ce10f515", + "title": "Target Turing patterns and growth dynamics in the chlorine dioxide-iodine-malonic + acid reaction.", "abstract": "We study the growth dynamics of Turing patterns + in the chlorine dioxide-iodine-malonic acid reaction-diffusion system in response + to perturbations with visible light. We describe several mechanisms by which + Turing patterns reappear after they are suppressed by illumination with a + disc-shaped geometry. We observe that under specific conditions the patterns + reorganize from a random configuration of spots and stripes to a set of ordered, + concentric rings, which we refer to as target Turing patterns. These patterns + closely resemble the unit cells of the Turing hexagonal superlattices known + as black eye patterns. However, these target Turing patterns are not part + of a larger superlattice structure, and they usually have a larger number + of concentric rings. Numerical simulations support the experimental findings.", + "venue": "Journal of Physical Chemistry A", "year": 2014, "referenceCount": + 32, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-03-19", "journal": + {"name": "The journal of physical chemistry. A", "pages": "\n 2393-400\n ", + "volume": "118 13"}, "authors": [{"authorId": "66625795", "name": "Asher Preska + Steinberg"}, {"authorId": "144854275", "name": "I. Epstein"}, {"authorId": + "4978913", "name": "M. Dolnik"}]}, {"paperId": "6b8ecd3a5fb0c2854f8d526a9098c91823631827", + "externalIds": {"MAG": "2095587556", "DOI": "10.1088/0953-8984/16/44/006", + "CorpusId": 123307096}, "corpusId": 123307096, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/6b8ecd3a5fb0c2854f8d526a9098c91823631827", + "title": "Travelling Turing patterns with anomalous diffusion", "abstract": + "We investigate the formation of Turing patterns (arising from a diffusion + driven instability) when diffusion is anomalous. We analyse a model that contains + the important features of Turing systems and that has been extensively used + in the past to model interesting biological patterns. We concentrate on the + case of asymmetric anomalous diffusion, and we cast a version of the model, + suitable for numerical calculations, using a discrete version of the fractional + derivatives defining the anomalous diffusion operator. The results are interesting + in the sense that patterns are no longer stationary but acquire a velocity + that depends on the exponent of the fractional derivatives. Extensive numerical + calculations in one and two dimensions exhibit many of the features predicted + by the analysis of the equations.", "venue": "", "year": 2004, "referenceCount": + 9, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-11-10", + "journal": {"name": "Journal of Physics: Condensed Matter", "volume": "16"}, + "authors": [{"authorId": "70988914", "name": "C. Varea"}, {"authorId": "37747895", + "name": "R. Barrio"}]}, {"paperId": "774d0b9dcdbb7db5ce1daf6deeb8b356353dd223", + "externalIds": {"MAG": "2012444206", "DOI": "10.1103/PHYSREVLETT.66.2535", + "CorpusId": 26888781, "PubMed": "10043513"}, "corpusId": 26888781, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/774d0b9dcdbb7db5ce1daf6deeb8b356353dd223", + "title": "Lattice-gas automata for coupled reaction-diffusion equations.", + "abstract": "We present a lattice-gas automaton approach to coupled reaction-diffusion + equations. This approach provides a microscopic bases for exploring systems + which exhibit such interesting features as oscillatory behavior and pattern + formation. Two-species systems are analyzed in detail. As an application of + the formalism, we construct the microscopic dynamics for a system described + by the Maginu equations; simulation results show excellent agreement with + the phenomenological predictions. Most important is the result showing that + we obtain Turing-type structures by a purely microscopic approach.", "venue": + "Physical review letters", "year": 1991, "referenceCount": 5, "citationCount": + 62, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1991-05-13", "journal": {"name": "Physical + review letters", "pages": "\n 2535-2538\n ", "volume": "66 + 19"}, "authors": [{"authorId": "30155087", "name": "Dab"}, {"authorId": "88526065", + "name": "Boon"}, {"authorId": "2146704666", "name": "Li"}]}, {"paperId": "49947d06b667734505a119e27620f84113f2447e", + "externalIds": {"MAG": "9594789", "CorpusId": 127938009}, "corpusId": 127938009, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/49947d06b667734505a119e27620f84113f2447e", + "title": "Damages on Mesozoic Plants from the Transbaikalian Locality Chernovskie + Kopi", "abstract": "Plant remains with traces of damages are known mainly + from the Paleozoic and Cenozoic. Struc- tures on coniferous and ginkgoaceous + leaves, galls and egg batches, are here described from the Jurassic-Cre- taceous + locality of Chernovskie Kopi. The classification of damages proposed by Vjalov + is revised. For the locality Chernovskie Kopi, damages are statistically analyzed, + their distribution on different plants and in var- ious burial types is considered.", + "venue": "", "year": 2005, "referenceCount": 7, "citationCount": 43, "influentialCitationCount": + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], + "s2FieldsOfStudy": [{"category": "Geology", "source": "external"}, {"category": + "Geology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Paleontological Journal", "volume": "39"}, "authors": + [{"authorId": "3951191", "name": "D. Vasilenko"}]}, {"paperId": "91b0fe61ef91329d42fc732c75cba76b9c764832", + "externalIds": {"MAG": "2046623859", "DOI": "10.1007/BF02672963", "CorpusId": + 85429030}, "corpusId": 85429030, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/91b0fe61ef91329d42fc732c75cba76b9c764832", + "title": "Polyglycerol esters: Optimization and techno-economic evaluation", + "abstract": null, "venue": "", "year": 1981, "referenceCount": 2, "citationCount": + 60, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1981-09-01", "journal": {"name": + "Journal of the American Oil Chemists\u2019 Society", "pages": "878-883", + "volume": "58"}, "authors": [{"authorId": "5284697", "name": "N. Garti"}, + {"authorId": "92163795", "name": "A. Aserin"}, {"authorId": "145710226", "name": + "B. Zaidman"}]}, {"paperId": "b4367ba580fec79b455b8f3234d215f07bf79d40", "externalIds": + {"ArXiv": "1908.09495", "MAG": "2969509007", "DOI": "10.1103/PhysRevE.100.042220", + "CorpusId": 201705326, "PubMed": "31771002"}, "corpusId": 201705326, "publicationVenue": + {"id": "19842b7b-a4d1-4f9a-9714-87d878cf6e73", "name": "Physical Review E", + "type": "journal", "alternate_names": ["Phys rev E", "Physical review. E", + "Phys Rev E"], "issn": "1539-3755", "alternate_issns": ["1550-2376", "2470-0045"], + "url": "https://journals.aps.org/pre/", "alternate_urls": ["http://pre.aps.org/", + "http://journals.aps.org/pre/"]}, "url": "https://www.semanticscholar.org/paper/b4367ba580fec79b455b8f3234d215f07bf79d40", "title": "Pattern formation in reaction-diffusion systems with piecewise kinetic modulation: An example study of heterogeneous kinetics.", "abstract": "The study of pattern emergence together with exploration of the exemplar Turing @@ -42492,61 +48063,18 @@ interactions: that for a large enough region with these parameters, an instability can be induced.", "venue": "Physical Review E", "year": 2019, "referenceCount": 38, "citationCount": 19, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-08-26", "journal": {"name": "Physical review. E", - "pages": "\n 042220\n ", "volume": "100 4-1"}, "authors": - [{"authorId": "2065846297", "name": "Michal Koz''ak"}, {"authorId": "2662569", - "name": "E. Gaffney"}, {"authorId": "2691918", "name": "V. Klika"}]}, {"paperId": - "1241c1540f61b9bdfe93fd36f2ed73157bc8bc6e", "externalIds": {"MAG": "1600189620", - "CorpusId": 60872045}, "url": "https://www.semanticscholar.org/paper/1241c1540f61b9bdfe93fd36f2ed73157bc8bc6e", - "title": "Telling Humans and Computers Apart Automatically or How Lazy Cryptographers - do AI", "abstract": "If you try to get a new email account at Yahoo, you\u2019ll - be asked to prove that you\u2019re a human and not a computer. Why? Because - a single computer program can get thousands of free email accounts per second. - And that\u2019s bad for Yahoo. But how do you prove to a computer that you\u2019re - a human? Proving that you\u2019re a human to another human can be done using - an idea from the 1950s: the Turing Test [11]. A human judge asks you a bunch - of questions and decides, depending on your answers, whether he\u2019s talking - to a human or a computer. Proving that you\u2019re a human to a computer is - another matter. It requires a test (or a set of tests) that computers can - grade, humans can pass, but paradoxically, computers can\u2019t pass. In our - lingo, it requires a captcha.", "venue": "", "year": 2002, "referenceCount": - 18, "citationCount": 107, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "69929958", "name": "Louis - von Ahn"}, {"authorId": "143624243", "name": "M. Blum"}, {"authorId": "144162125", - "name": "J. Langford"}]}, {"paperId": "db2216d1bd93692bd5bc7743e8f84b8c41caec45", - "externalIds": {"MAG": "1999558208", "DOI": "10.2514/3.12189", "CorpusId": - 14728637}, "url": "https://www.semanticscholar.org/paper/db2216d1bd93692bd5bc7743e8f84b8c41caec45", - "title": "Static shape control for adaptive wings", "abstract": "A theoretical - method was developed, and experimentally validated, to control the static - shape of flexible struc-tures by employing internal translational actuators. - A finite element model of the structure, without the actuatorspresent, is - employed to obtain the multiple-input, multiple-output control-system gain - matrices for actuator-loadcontrol as well as actuator-displacement control. - The method is applied to the quasistatic problem of maintainingan optimum-wing - cross section during various transonic-cruise flight conditions to obtain - significant reductionsin the shock-induced drag. Only small, potentially achievable, - adaptive modifications to the profile are required.The adaptive-wing concept - employs actuators as truss elements of active ribs to reshape the wing cross - section bydeforming the structure. Finite element analyses of an adaptive-rib - model verify the controlled-structure theory.Experiments on the model were - conducted, and arbitrarily selected deformed shapes were accurately achieved.", - "venue": "", "year": 1994, "referenceCount": 10, "citationCount": 111, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-09-01", - "journal": {"name": "AIAA Journal", "pages": "1895-1901", "volume": "32"}, - "authors": [{"authorId": "47998867", "name": "F. Austin"}, {"authorId": "153457593", - "name": "M. Rossi"}, {"authorId": "98858380", "name": "W. V. Nostrand"}, {"authorId": - "47666043", "name": "G. Knowles"}, {"authorId": "144198300", "name": "A. Jameson"}]}, + "openAccessPdf": {"url": "https://ora.ox.ac.uk/objects/uuid:dd87f36e-7d57-43a7-bea0-207e76a3167a/download_file?safe_filename=Kozak_et_al_2019.pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-08-26", "journal": {"name": "Physical + review. E", "pages": "\n 042220\n ", "volume": "100 4-1"}, + "authors": [{"authorId": "2065846297", "name": "Michal Koz''ak"}, {"authorId": + "2662569", "name": "E. Gaffney"}, {"authorId": "2691918", "name": "V. Klika"}]}, {"paperId": "4b8b3b792415df36f0fcb5b5810bbea471adfd47", "externalIds": {"DBLP": "journals/corr/GulcehreCB17", "ArXiv": "1701.08718", "MAG": "2583687993", - "CorpusId": 12749186}, "url": "https://www.semanticscholar.org/paper/4b8b3b792415df36f0fcb5b5810bbea471adfd47", + "CorpusId": 12749186}, "corpusId": 12749186, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/4b8b3b792415df36f0fcb5b5810bbea471adfd47", "title": "Memory Augmented Neural Networks with Wormhole Connections", "abstract": "Recent empirical results on long-term dependency tasks have shown that neural networks augmented with an external memory can learn the long-term dependency @@ -42570,211 +48098,47 @@ interactions: propagation in general for MANNs. We evaluate our models on different long-term dependency tasks and report competitive results in all of them.", "venue": "ArXiv", "year": 2017, "referenceCount": 49, "citationCount": 52, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2017-01-30", "journal": {"name": "ArXiv", + "volume": "abs/1701.08718"}, "authors": [{"authorId": "1854385", "name": "\u00c7aglar + G\u00fcl\u00e7ehre"}, {"authorId": "144631588", "name": "A. Chandar"}, {"authorId": + "1751762", "name": "Yoshua Bengio"}]}, {"paperId": "bd808691bab1fc4d22f3ccd47d99cd1d3ecd0762", + "externalIds": {"MAG": "195780958", "DBLP": "journals/jca/Rendell11", "DOI": + "10.1007/978-1-84996-217-9_26", "CorpusId": 28502436}, "corpusId": 28502436, + "publicationVenue": {"id": "0dae2198-c8a2-48dd-a771-614a4a5a843b", "name": + "Journal of Cellular Automata", "type": "journal", "alternate_names": ["J + Cell Autom"], "issn": "1557-5969", "alternate_issns": ["1557-5977"], "url": + "https://www.oldcitypublishing.com/"}, "url": "https://www.semanticscholar.org/paper/bd808691bab1fc4d22f3ccd47d99cd1d3ecd0762", + "title": "A Simple Universal Turing Machine for the Game of Life Turing Machine", + "abstract": null, "venue": "Journal of Cellular Automata", "year": 2011, "referenceCount": + 4, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-01-30", "journal": {"name": "ArXiv", "volume": "abs/1701.08718"}, - "authors": [{"authorId": "1854385", "name": "\u00c7aglar G\u00fcl\u00e7ehre"}, - {"authorId": "144631588", "name": "A. Chandar"}, {"authorId": "1751762", "name": - "Yoshua Bengio"}]}, {"paperId": "49947d06b667734505a119e27620f84113f2447e", - "externalIds": {"MAG": "9594789", "CorpusId": 127938009}, "url": "https://www.semanticscholar.org/paper/49947d06b667734505a119e27620f84113f2447e", - "title": "Damages on Mesozoic Plants from the Transbaikalian Locality Chernovskie - Kopi", "abstract": "Plant remains with traces of damages are known mainly - from the Paleozoic and Cenozoic. Struc- tures on coniferous and ginkgoaceous - leaves, galls and egg batches, are here described from the Jurassic-Cre- taceous - locality of Chernovskie Kopi. The classification of damages proposed by Vjalov - is revised. For the locality Chernovskie Kopi, damages are statistically analyzed, - their distribution on different plants and in var- ious burial types is considered.", - "venue": "", "year": 2005, "referenceCount": 7, "citationCount": 43, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": - [{"category": "Geology", "source": "external"}, {"category": "Geology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Paleontological Journal", "volume": "39"}, "authors": [{"authorId": - "3951191", "name": "D. Vasilenko"}]}, {"paperId": "d367afda992dbeffcb022229fcadeb3dfbb16251", - "externalIds": {"MAG": "1547121230", "DOI": "10.1002/0471756504.CH27", "CorpusId": - 18573101}, "url": "https://www.semanticscholar.org/paper/d367afda992dbeffcb022229fcadeb3dfbb16251", - "title": "The Organic Grid: Self\u2010organizing Computational Biology on - Desktop Grids", "abstract": "Machines take me by surprise with great frequency. - \u2014A. Turing I think there''s a world market for about five computers.", - "venue": "", "year": 2005, "referenceCount": 49, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-06-09", - "journal": {"name": "", "pages": "671-703", "volume": ""}, "authors": [{"authorId": - "2284555", "name": "A. Chakravarti"}, {"authorId": "40204034", "name": "Gerald - Baumgartner"}, {"authorId": "1777832", "name": "M. Lauria"}]}, {"paperId": - "932d82e0f815ca21e1158b90ddda68a8d41f84fb", "externalIds": {"MAG": "2171990602", - "DOI": "10.1177/095892879700700102", "CorpusId": 154531453}, "url": "https://www.semanticscholar.org/paper/932d82e0f815ca21e1158b90ddda68a8d41f84fb", - "title": "Social Assistance in Oecd Countries", "abstract": "This article - presents selected results from the first comparative study of social assistance - across all 24 countries of the OECD. The scope of social assistance, discussed - in the first section, is drawn to include all means-tested benefits in cash - and kind, including those which provide benefits to higher income groups. - The second section then presents in formation on the main programmes in each - country, expenditures and groups of beneficia ries, trends over time, administrative - struc tures, and operation of means tests. It concludes by developing a new - measure of assistance benefit levels with which to evaluate different countries'' - systems. The third section distils from the country differences eight pat - terns, or ''assistance regimes'', varying from the limited, discretionary, - decentralized models of Switzerland and Norway to the extensive, national, - rights-based programmes of the English-speaking world; and from the relative - generosity of Scandinavia and Australia to the low, marginalizing benefits - of the Mediterranean countries and the USA. The last section turns to the - economic pressures and political debates which are driving con temporary policy - changes. The concepts and empirical data presented here will enable means-testing, - targeting and selectivity to be brought back into the comparative study of - European and wider welfare systems.", "venue": "", "year": 1997, "referenceCount": - 178, "citationCount": 293, "influentialCitationCount": 26, "isOpenAccess": - true, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1997-02-01", "journal": - {"name": "Journal of European Social Policy", "pages": "17 - 43", "volume": - "7"}, "authors": [{"authorId": "144056480", "name": "I. Gough"}, {"authorId": - "144670555", "name": "J. Bradshaw"}, {"authorId": "115995481", "name": "J. - Ditch"}, {"authorId": "66827705", "name": "T. Eardley"}, {"authorId": "12344324", - "name": "P. Whiteford"}]}, {"paperId": "964fb5aba4c5fc78ab17f36fa9d9bf82b89a9b23", - "externalIds": {"MAG": "2330016637", "DOI": "10.3147/JSFP.32.225", "CorpusId": - 88229937}, "url": "https://www.semanticscholar.org/paper/964fb5aba4c5fc78ab17f36fa9d9bf82b89a9b23", - "title": "Effects of Temperature on Growth and Protease Production of Cytophaga - psychrophila", "abstract": "Our previous study1) demonstrated that the optimal - tempera tures for the protease production were lower than those for the growth - of a mesophilic bacterium, Aeromonas hydrophila. As protease is one of the - pathogenic factors, the previous results provoked us into making a similar - work with the low tempera ture-loving bacterium, Cytophaga psychrophila (syn. - Flexibacter psychrophilus). This bacterium is known as the causative agent - of bacterial coldwater disease in salmonids and some other freshwater fishes2).", - "venue": "", "year": 1997, "referenceCount": 1, "citationCount": 18, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-12-15", - "journal": {"name": "Fish Pathology", "pages": "225-226", "volume": "32"}, - "authors": [{"authorId": "88611109", "name": "N. Uddin"}, {"authorId": "46736208", - "name": "H. Wakabayashi"}]}, {"paperId": "0e4a8061d27af3a7a3098b74c5fe8d5cc4276e37", - "externalIds": {"DBLP": "journals/jucs/QueinsZBKPMS00", "MAG": "1537355613", - "DOI": "10.3217/jucs-006-07-0586", "CorpusId": 39425890}, "url": "https://www.semanticscholar.org/paper/0e4a8061d27af3a7a3098b74c5fe8d5cc4276e37", - "title": "The Light Control Case Study: Problem Description", "abstract": - "This document contains a range of needs and requirements concerning the construction - of a light control system for a floor of a university building. A description - of the building architec- ture and of some pre-installed (light-)hardware - is included. This problem description was the com- mon input for all participants - of the requirements engineering case study \"Light Control\".", "venue": "J. - Univers. Comput. Sci.", "year": 2000, "referenceCount": 4, "citationCount": - 34, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "J. Univers. Comput. Sci.", "pages": "586-596", "volume": "6"}, "authors": - [{"authorId": "1791356", "name": "Stefan Queins"}, {"authorId": "1406768253", - "name": "G. Zimmermann"}, {"authorId": "2071187736", "name": "Martin Becker"}, - {"authorId": "145082001", "name": "M. Kronenburg"}, {"authorId": "2371919", - "name": "C. Peper"}, {"authorId": "49925646", "name": "Rolf Merz"}, {"authorId": - "2053082613", "name": "J\u00fcrgen Sch\u00e4fer"}]}, {"paperId": "48b7de5a880a0ea6fcfa42e0973b727d9770211d", - "externalIds": {"MAG": "3045553083", "DOI": "10.3354/MEPS236301", "CorpusId": - 49218035}, "url": "https://www.semanticscholar.org/paper/48b7de5a880a0ea6fcfa42e0973b727d9770211d", - "title": "Egg hatching rate of the cyclopoid copepod Oithona similis in arctic - and temperate waters", "abstract": "An equation is presented to facilitate - estimation of the production of the cosmopolitan cyclopoid copepod Oithona - similis. The egg hatching rate was studied from Arctic, subarctic and temperate - waters covering a tempera- ture interval from -1 to 20.5\u00b0C. Within this - temperature range the hatching rate (HR) increased from 0.03 to 0.42 d -1 - . Results from all experiments were fitted to a function HR (% d -1 )= 4.2176 - + 1.7545T (r 2 = 0.98; p < 0.0001), where T = temperature. When combined with - site-specific informa- tion on temperature, egg:female ratios and the carbon - content of females and eggs, secondary production of this ubiquitous species - can be readily estimated.", "venue": "", "year": 2002, "referenceCount": 27, - "citationCount": 61, "influentialCitationCount": 14, "isOpenAccess": true, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2002-07-03", "journal": {"name": - "Marine Ecology Progress Series", "pages": "301-306", "volume": "236"}, "authors": - [{"authorId": "35001876", "name": "T. Nielsen"}, {"authorId": "1401549344", - "name": "E. M\u00f8ller"}, {"authorId": "86964198", "name": "S. Satapoomin"}, - {"authorId": "2697855", "name": "M. Ringuette"}, {"authorId": "3757133", "name": - "R. Hopcroft"}]}, {"paperId": "9abe5f45172c1bd03a6f1f48ad88ace3362e9c9c", - "externalIds": {"MAG": "2023648920", "DBLP": "journals/jacm/AanderaaF67", - "DOI": "10.1145/321420.321426", "CorpusId": 27236204}, "url": "https://www.semanticscholar.org/paper/9abe5f45172c1bd03a6f1f48ad88ace3362e9c9c", - "title": "The Solvability of the Halting Problem for 2-State Post Machines", - "abstract": "A Post machine is a Turing machine which cannot both write and - move on the same machine step. It is shown that the halting problem for the - class of 2-state Post machines is solvable. Thus, there can be no universal - 2-state Post machine. This is in contrast with the result of Shannon that - there exist universal 2-state Turing machines when the machines are capable - of both writing and moving on the same step.", "venue": "JACM", "year": 1967, - "referenceCount": 6, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1967-10-01", "journal": {"name": "J. ACM", "pages": "677-682", "volume": - "14"}, "authors": [{"authorId": "2917104", "name": "St\u00e5l O. Aanderaa"}, - {"authorId": "1691253", "name": "P. C. Fischer"}]}, {"paperId": "9fcd8b156eee2be36967db2558cc697e81db7854", - "externalIds": {"CorpusId": 37505683}, "url": "https://www.semanticscholar.org/paper/9fcd8b156eee2be36967db2558cc697e81db7854", - "title": "Continual Learning through Evolvable Neural Turing Machines", "abstract": - "Continual learning, i.e. the ability to sequentially learn tasks without - catastrophic forgetting of previously learned ones, is an important open challenge - in machine learning. In this paper we take a step in this direction by showing - that the recently proposed Evolving Neural Turing Machine (ENTM) approach - is able to perform one-shot learning in a reinforcement learning task without - catastrophic forgetting of previously stored associations.", "venue": "", - "year": 2016, "referenceCount": 15, "citationCount": 16, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "50170159", - "name": "Benno L\u00fcders"}, {"authorId": "9936023", "name": "Mikkel Schl\u00e4ger"}, - {"authorId": "1745664", "name": "S. Risi"}]}, {"paperId": "3c999256446d684085714db9ea543aedd26c2d4e", - "externalIds": {"MAG": "2511283383", "DOI": "10.1016/j.jtbi.2016.08.005", - "CorpusId": 20901470, "PubMed": "27519949"}, "url": "https://www.semanticscholar.org/paper/3c999256446d684085714db9ea543aedd26c2d4e", - "title": "Identifying network topologies that can generate turing pattern.", - "abstract": null, "venue": "Journal of Theoretical Biology", "year": 2016, - "referenceCount": 49, "citationCount": 28, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-11-07", "journal": - {"name": "Journal of theoretical biology", "pages": "\n 88-96\n ", - "volume": "408"}, "authors": [{"authorId": "4524754", "name": "M. M. Zheng"}, - {"authorId": "2064567134", "name": "Bin Shao"}, {"authorId": "46173639", "name": - "Q. Ouyang"}]}, {"paperId": "ca426e585a7555c5cb05ed32669b59c4eabaa980", "externalIds": - {"MAG": "1483066755", "CorpusId": 14906543}, "url": "https://www.semanticscholar.org/paper/ca426e585a7555c5cb05ed32669b59c4eabaa980", - "title": "The key dimensions of knowledge-intensive business services (KIBS) - analysis: a decade of evolution", "abstract": "The importance of knowledge - and innovation in modern economies justifies the in-creasing interest that - scholars are taking in studying knowledge-intensive business services (KIBS). - The objective of this paper is to track the evolution of the key dimen-sions - on which scholars have based their analyses through a literature review. More - specifically, three main issues are addressed: (1) how KIBS are defined in - the litera-ture; (2) how KIBS have been investigated empirically by researchers; - and (3) how the analysis of KIBS has evolved over time. As a major assumption, - the analysis catego-rises the research topic into three key conceptual dimensions: - (i) knowledge; (ii) inno-vation and (iii) spatial proximity. The major hypothesis - is that the way KIBS are seen, studied and perceived by the research community - resolutely changed over time and that this evolution can be tracked by observing - modifications in the key dimensions associated with the analysis of KIBS.", - "venue": "", "year": 2007, "referenceCount": 63, "citationCount": 112, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "49109993", - "name": "Emmanuel Muller"}, {"authorId": "3082208", "name": "David Doloreux"}]}, - {"paperId": "0b0e1219ff91bd22527d0500052a90bd1ba4e149", "externalIds": {"MAG": - "2021845931", "DOI": "10.1039/TF9595502117", "CorpusId": 95247351}, "url": - "https://www.semanticscholar.org/paper/0b0e1219ff91bd22527d0500052a90bd1ba4e149", - "title": "The pyrolysis of metal alkoxides. Part 2.\u2014Kinetic studies on - zirconium tetra-tert.-amyloxide", "abstract": "The kinetics of the thermal - decomposition of zirconium tetra-tert.- amyloxide were studied in glass at - tempera tures between 208 to 247 deg C (mostly at 2l8.4 deg ). Characteristic - sigmoid pressure against time curves were obtained corresponding to a chain - mechanism. The results conformed to a mechanism involving the hydrolysis of - the zirconium tert.-alkoxide by water produced in the dehydration of the tert.-alcohol. - (auth)", "venue": "", "year": 1959, "referenceCount": 0, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Transactions of The Faraday - Society", "pages": "2117-2123", "volume": "55"}, "authors": [{"authorId": - "88651818", "name": "D. C. Bradley"}, {"authorId": "40770027", "name": "M. - M. Faktor"}]}, {"paperId": "2d203c9cd97878a644d6c72058244ab2625292af", "externalIds": - {"MAG": "1518749691", "CorpusId": 109435498}, "url": "https://www.semanticscholar.org/paper/2d203c9cd97878a644d6c72058244ab2625292af", + "publicationDate": null, "journal": {"pages": "519-545"}, "authors": [{"authorId": + "11060403", "name": "Paul W. Rendell"}]}, {"paperId": "16b24cdeeb57b29e6fb2c864056fdd877b991fc6", + "externalIds": {"MAG": "1888135876", "ArXiv": "0803.4082", "CorpusId": 5180043}, + "corpusId": 5180043, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/16b24cdeeb57b29e6fb2c864056fdd877b991fc6", + "title": "Profinite Homotopy Theory", "abstract": "We construct a model structure + on simplicial profinite sets such that the homotopy groups carry a natural + profinite struc- ture. This yields a rigid profinite completion functor for + spaces and pro-spaces. One motivation is thehomotopy theory of schemes in + which higher profiniteetale homotopy groups fit well with the \u00b4 fundamental + group which is always profinite. We show that the profi- nitetopological realization + functor is a good object in several respects.", "venue": "", "year": 2008, + "referenceCount": 45, "citationCount": 42, "influentialCitationCount": 4, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2008-03-28", "journal": {"name": "arXiv: Algebraic Topology", "volume": ""}, + "authors": [{"authorId": "101123670", "name": "Gereon Quick"}]}, {"paperId": + "2d203c9cd97878a644d6c72058244ab2625292af", "externalIds": {"MAG": "1518749691", + "CorpusId": 109435498}, "corpusId": 109435498, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2d203c9cd97878a644d6c72058244ab2625292af", "title": "Scaling for E-Business: Technologies, Models, Performance, and Capacity Planning", "abstract": "From the Publisher: \nForeword by Jim Gray \nMicrosoft Research and 1998 ACM Turing Award Recipient \n \nThe Complete Guide to Techniques @@ -42798,159 +48162,517 @@ interactions: \n \n \nYou can''t turn to your vendors for these state-of-the-art techniques. But you canturn to Scaling for E-Business-and if you plan to succeed, you''d better!", "venue": "", "year": 2000, "referenceCount": 0, "citationCount": - 316, "influentialCitationCount": 23, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + 316, "influentialCitationCount": 23, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2000-05-07", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1758079", "name": "D. Menasc\u00e9"}, - {"authorId": "88294103", "name": "A. Virgilio"}]}, {"paperId": "97afc19c89e6e1d0da217cc9ab05617d67498242", - "externalIds": {"MAG": "2900747104", "DOI": "10.1063/1.5055711", "CorpusId": - 54562795, "PubMed": "30501205"}, "url": "https://www.semanticscholar.org/paper/97afc19c89e6e1d0da217cc9ab05617d67498242", - "title": "Turing-Hopf bifurcation analysis in a superdiffusive predator-prey - model.", "abstract": "The predator-prey model with superdiffusion is investigated - in this paper. Here, the existence of Turing-Hopf bifurcation and the resulting - dynamics are studied. To understand such a degenerate bifurcation in the anomalously - diffusive system, the weakly nonlinear analysis is employed and the amplitude - equations at the Turing-Hopf bifurcation point are obtained. Moreover, by - analyzing the amplitude equations under suitable conditions, the abundant - spatiotemporal dynamics are presented. In addition, to illustrate the theoretical - analysis, some numerical simulations are carried out.", "venue": "Chaos", - "year": 2018, "referenceCount": 24, "citationCount": 16, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-11-01", "journal": {"name": "Chaos", - "pages": "\n 113118\n ", "volume": "28 11"}, "authors": [{"authorId": - "2108676835", "name": "Biao Liu"}, {"authorId": "91697488", "name": "R. Wu"}, - {"authorId": "30827668", "name": "Liping Chen"}]}, {"paperId": "11f471345c4171a2893d495af2955075714a7a10", - "externalIds": {"MAG": "62691533", "DOI": "10.1038/482462a", "CorpusId": 205070106, - "PubMed": "22358812"}, "url": "https://www.semanticscholar.org/paper/11f471345c4171a2893d495af2955075714a7a10", - "title": "Turing centenary: Is the brain a good model for machine intelligence?", - "abstract": null, "venue": "Nature", "year": 2012, "referenceCount": 1, "citationCount": - 42, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Psychology", "Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Computer Science", "source": "external"}, {"category": "Computer + {"authorId": "88294103", "name": "A. Virgilio"}]}, {"paperId": "11890f6c5b19b19473746a9c9254c2a19a45a967", + "externalIds": {"MAG": "2787544901", "DOI": "10.1140/EPJP/I2018-11886-2", + "CorpusId": 125177932}, "corpusId": 125177932, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/11890f6c5b19b19473746a9c9254c2a19a45a967", + "title": "Modelling and formation of spatiotemporal patterns of fractional + predation system in subdiffusion and superdiffusion scenarios", "abstract": + null, "venue": "", "year": 2018, "referenceCount": 55, "citationCount": 30, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2018-02-12", "journal": {"name": + "The European Physical Journal Plus", "pages": "1-13", "volume": "133"}, "authors": + [{"authorId": "2079187", "name": "K. M. Owolabi"}, {"authorId": "2389607", + "name": "A. Atangana"}]}, {"paperId": "dce99928dc6eaa54c6a0d059aa14faf0617c480c", + "externalIds": {"MAG": "1997428507", "DOI": "10.1088/1751-8113/43/38/382002", + "CorpusId": 120179376}, "corpusId": 120179376, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/dce99928dc6eaa54c6a0d059aa14faf0617c480c", + "title": "Reversible arithmetic logic unit for quantum arithmetic", "abstract": + "This communication presents the complete design of a reversible arithmetic + logic unit (ALU) that can be part of a programmable reversible computing device + such as a quantum computer. The presented ALU is garbage free and uses reversible + updates to combine the standard reversible arithmetic and logical operations + in one unit. Combined with a suitable control unit, the ALU permits the construction + of an r-Turing complete computing device. The garbage-free ALU developed in + this communication requires only 6n elementary reversible gates for five basic + arithmetic\u2013logical operations on two n-bit operands and does not use + ancillae. This remarkable low resource consumption was achieved by generalizing + the V-shape design first introduced for quantum ripple-carry adders and nesting + multiple V-shapes in a novel integrated design. This communication shows that + the realization of an efficient reversible ALU for a programmable computing + device is possible and that the V-shape design is a very versatile approach + to the design of quantum networks.", "venue": "", "year": 2010, "referenceCount": + 17, "citationCount": 111, "influentialCitationCount": 10, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Physics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-09-24", + "journal": {"name": "Journal of Physics A: Mathematical and Theoretical", + "pages": "382002", "volume": "43"}, "authors": [{"authorId": "10263156", "name": + "Michael Kirkedal Thomsen"}, {"authorId": "1700006", "name": "R. Gl\u00fcck"}, + {"authorId": "1751103", "name": "Holger Bock Axelsen"}]}, {"paperId": "27ee70cad780f0d1a1bbe7e01d12165fe8abd644", + "externalIds": {"MAG": "1850480718", "CorpusId": 26474781}, "corpusId": 26474781, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/27ee70cad780f0d1a1bbe7e01d12165fe8abd644", + "title": "Emerging Leaders: An Annotated Bibliography", "abstract": "Intuitively, + a set, function, or relation is computable if there is an algorithm for computing + membership, output, or truth-values, respectively. A set of natural numbers + A is Turing reducible to another set B, written A \u2264T B, if it is possible + to write an algorithm that uses information from B to determine membership + in A. This pre-ordering of sets induces an equivalence relation on the power + set of the natural numbers, and the equivalence classes are the Turing degrees. + Sets having the same Turing degree (for example, a set and its complement) + are said to be Turing equivalent, written A \u2261T B. If a set is enumerable + via an algorithm, it is computably enumerable (c.e.) and so is its Turing + degree.", "venue": "", "year": 2001, "referenceCount": 33, "citationCount": + 13, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": [{"category": + "Political Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-06-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "115374324", + "name": "Jennifer J. Deal"}, {"authorId": "145072611", "name": "Karen M. Peterson"}, + {"authorId": "1459821463", "name": "Heidi Gailor-Loflin"}]}, {"paperId": "0b0e1219ff91bd22527d0500052a90bd1ba4e149", + "externalIds": {"MAG": "2021845931", "DOI": "10.1039/TF9595502117", "CorpusId": + 95247351}, "corpusId": 95247351, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0b0e1219ff91bd22527d0500052a90bd1ba4e149", + "title": "The pyrolysis of metal alkoxides. Part 2.\u2014Kinetic studies on + zirconium tetra-tert.-amyloxide", "abstract": "The kinetics of the thermal + decomposition of zirconium tetra-tert.- amyloxide were studied in glass at + tempera tures between 208 to 247 deg C (mostly at 2l8.4 deg ). Characteristic + sigmoid pressure against time curves were obtained corresponding to a chain + mechanism. The results conformed to a mechanism involving the hydrolysis of + the zirconium tert.-alkoxide by water produced in the dehydration of the tert.-alcohol. + (auth)", "venue": "", "year": 1959, "referenceCount": 0, "citationCount": + 42, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Transactions + of The Faraday Society", "pages": "2117-2123", "volume": "55"}, "authors": + [{"authorId": "88651818", "name": "D. C. Bradley"}, {"authorId": "40770027", + "name": "M. M. Faktor"}]}, {"paperId": "0fa9e9d57dac9e28449854a69dd9a9abe50a2b8e", + "externalIds": {"MAG": "2014288728", "DBLP": "journals/apal/BarmpaliasLS08", + "DOI": "10.1016/j.apal.2008.06.004", "CorpusId": 14714746}, "corpusId": 14714746, + "publicationVenue": {"id": "5db9b91a-29ce-4a4c-a224-e3cf658c4bd1", "name": + "Annals of Pure and Applied Logic", "type": "journal", "alternate_names": + ["Ann Pure Appl Log"], "issn": "0168-0072", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505603/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/annals-of-pure-and-applied-logic", + "http://www.sciencedirect.com/science/journal/01680072"]}, "url": "https://www.semanticscholar.org/paper/0fa9e9d57dac9e28449854a69dd9a9abe50a2b8e", + "title": "I classes, LR degrees and Turing degrees", "abstract": null, "venue": + "Annals of Pure and Applied Logic", "year": 2008, "referenceCount": 24, "citationCount": + 20, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2008-11-01", "journal": {"name": "Ann. + Pure Appl. Log.", "pages": "21-38", "volume": "156"}, "authors": [{"authorId": + "1678539", "name": "George Barmpalias"}, {"authorId": "145421803", "name": + "A. Lewis"}, {"authorId": "1699450", "name": "F. Stephan"}]}, {"paperId": + "0e4a8061d27af3a7a3098b74c5fe8d5cc4276e37", "externalIds": {"DBLP": "journals/jucs/QueinsZBKPMS00", + "MAG": "1537355613", "DOI": "10.3217/jucs-006-07-0586", "CorpusId": 39425890}, + "corpusId": 39425890, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0e4a8061d27af3a7a3098b74c5fe8d5cc4276e37", + "title": "The Light Control Case Study: Problem Description", "abstract": + "This document contains a range of needs and requirements concerning the construction + of a light control system for a floor of a university building. A description + of the building architec- ture and of some pre-installed (light-)hardware + is included. This problem description was the com- mon input for all participants + of the requirements engineering case study \"Light Control\".", "venue": "J. + Univers. Comput. Sci.", "year": 2000, "referenceCount": 4, "citationCount": + 34, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "J. Univers. Comput. Sci.", "pages": "586-596", + "volume": "6"}, "authors": [{"authorId": "1791356", "name": "Stefan Queins"}, + {"authorId": "1406768253", "name": "G. Zimmermann"}, {"authorId": "2071187736", + "name": "Martin Becker"}, {"authorId": "145082001", "name": "M. Kronenburg"}, + {"authorId": "2371919", "name": "C. Peper"}, {"authorId": "49925646", "name": + "Rolf Merz"}, {"authorId": "2053082613", "name": "J\u00fcrgen Sch\u00e4fer"}]}, + {"paperId": "afc173f4f8342b348185ccab7a2661e6dd2ce219", "externalIds": {"MAG": + "207929970", "DOI": "10.1007/978-3-662-05642-4_20", "CorpusId": 108243531}, + "corpusId": 108243531, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/afc173f4f8342b348185ccab7a2661e6dd2ce219", + "title": "Watching the Daisies Grow: Turing and Fibonacci Phyllotaxis", "abstract": + null, "venue": "", "year": 2004, "referenceCount": 27, "citationCount": 23, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "pages": "477-498", "volume": ""}, "authors": [{"authorId": "12535173", "name": + "J. Swinton"}]}, {"paperId": "9abe5f45172c1bd03a6f1f48ad88ace3362e9c9c", "externalIds": + {"MAG": "2023648920", "DBLP": "journals/jacm/AanderaaF67", "DOI": "10.1145/321420.321426", + "CorpusId": 27236204}, "corpusId": 27236204, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9abe5f45172c1bd03a6f1f48ad88ace3362e9c9c", + "title": "The Solvability of the Halting Problem for 2-State Post Machines", + "abstract": "A Post machine is a Turing machine which cannot both write and + move on the same machine step. It is shown that the halting problem for the + class of 2-state Post machines is solvable. Thus, there can be no universal + 2-state Post machine. This is in contrast with the result of Shannon that + there exist universal 2-state Turing machines when the machines are capable + of both writing and moving on the same step.", "venue": "JACM", "year": 1967, + "referenceCount": 6, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1967-10-01", "journal": {"name": "J. ACM", "pages": "677-682", "volume": + "14"}, "authors": [{"authorId": "2917104", "name": "St\u00e5l O. Aanderaa"}, + {"authorId": "1691253", "name": "P. C. Fischer"}]}, {"paperId": "5e4eb58d5b47ac1c73f4cf189497170e75ae6237", + "externalIds": {"DBLP": "journals/corr/KaiserS15", "MAG": "2173051530", "ArXiv": + "1511.08228", "CorpusId": 2009318}, "corpusId": 2009318, "publicationVenue": + {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", "name": "International Conference + on Learning Representations", "type": "conference", "alternate_names": ["Int + Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, "url": "https://www.semanticscholar.org/paper/5e4eb58d5b47ac1c73f4cf189497170e75ae6237", + "title": "Neural GPUs Learn Algorithms", "abstract": "Learning an algorithm + from examples is a fundamental problem that has been widely studied. Recently + it has been addressed using neural networks, in particular by Neural Turing + Machines (NTMs). These are fully differentiable computers that use backpropagation + to learn their own programming. Despite their appeal NTMs have a weakness + that is caused by their sequential nature: they are not parallel and are are + hard to train due to their large depth when unfolded. \nWe present a neural + network architecture to address this problem: the Neural GPU. It is based + on a type of convolutional gated recurrent unit and, like the NTM, is computationally + universal. Unlike the NTM, the Neural GPU is highly parallel which makes it + easier to train and efficient to run. \nAn essential property of algorithms + is their ability to handle inputs of arbitrary size. We show that the Neural + GPU can be trained on short instances of an algorithmic task and successfully + generalize to long instances. We verified it on a number of tasks including + long addition and long multiplication of numbers represented in binary. We + train the Neural GPU on numbers with upto 20 bits and observe no errors whatsoever + while testing it, even on much longer numbers. \nTo achieve these results + we introduce a technique for training deep recurrent networks: parameter sharing + relaxation. We also found a small amount of dropout and gradient noise to + have a large positive effect on learning and generalization.", "venue": "International + Conference on Learning Representations", "year": 2015, "referenceCount": 48, + "citationCount": 315, "influentialCitationCount": 34, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-02-22", "journal": {"name": "Nature", "pages": "462-463", - "volume": "482"}, "authors": [{"authorId": "72419159", "name": "R. Brooks"}, - {"authorId": "48987704", "name": "D. Hassabis"}, {"authorId": "144441223", - "name": "D. Bray"}, {"authorId": "3140335", "name": "A. Shashua"}]}, {"paperId": - "735e216b18d6c11cf297d2516fd42a42731733c1", "externalIds": {"MAG": "1993933078", - "DOI": "10.1038/nature09012", "CorpusId": 4417333, "PubMed": "20463735"}, - "url": "https://www.semanticscholar.org/paper/735e216b18d6c11cf297d2516fd42a42731733c1", - "title": "Molecular robots guided by prescriptive landscapes", "abstract": - null, "venue": "Nature", "year": 2010, "referenceCount": 37, "citationCount": - 760, "influentialCitationCount": 13, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-05-13", "journal": {"name": "Nature", "pages": "206-210", - "volume": "465"}, "authors": [{"authorId": "39284621", "name": "Kyle Lund"}, - {"authorId": "33954095", "name": "Anthony J. Manzo"}, {"authorId": "3195888", - "name": "Nadine Dabby"}, {"authorId": "2745233", "name": "N. Michelotti"}, - {"authorId": "1398201994", "name": "Alexander Johnson-Buck"}, {"authorId": - "5832261", "name": "Jeanette Nangreave"}, {"authorId": "32483464", "name": - "Steven K Taylor"}, {"authorId": "37967713", "name": "R. Pei"}, {"authorId": - "2386889", "name": "M. Stojanovi\u0107"}, {"authorId": "1841910", "name": - "N. Walter"}, {"authorId": "3094920", "name": "E. Winfree"}, {"authorId": - "144303419", "name": "Hao Yan"}]}, {"paperId": "57d32f62c76ccca8b10cdfb2a7eb0d8de4c6a656", - "externalIds": {"MAG": "2100652487", "DOI": "10.1557/MRS2008.80", "CorpusId": - 137198170}, "url": "https://www.semanticscholar.org/paper/57d32f62c76ccca8b10cdfb2a7eb0d8de4c6a656", - "title": "The Electric Power Grid : Today and Tomorrow", "abstract": "Abcd... - Micropower Abstract In the coming decades, electricity''s share of total global - energy is expected to continue to grow, and more intelligent processes will - be introduced into the electric power delivery (transmission and distribution) - networks. It is envisioned that the electric power grid will move from an - electrome- chanically controlled system to an electronically controlled network - in the next two decades. A key challenge is how to redesign, retrofit, and - upgrade the existing electromechanically controlled sys - tem into a smart - self-healing grid that is driven by a well-designed market approach. Revolutionary - developments in both information technology and materials science and engineering - promise sig- nificant improvements in the security, reliability, efficiency, - and cost effectiveness of electric power delivery systems. Focus areas in - materials and devices include sensors, smart materials and struc- tures, microfabrication, - nanotechnology, advanced materials, and smart devices.", "venue": "", "year": - 2008, "referenceCount": 24, "citationCount": 108, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2008-04-01", "journal": {"name": "Mrs Bulletin", "pages": "399-407", "volume": - "33"}, "authors": [{"authorId": "93583217", "name": "M. Amin"}, {"authorId": - "145771666", "name": "J. Stringer"}]}, {"paperId": "594d2744cf9d544341bafec01a4351de1ebfcaff", - "externalIds": {"MAG": "2127760679", "DOI": "10.1093/JXB/19.3.435", "CorpusId": - 86030306}, "url": "https://www.semanticscholar.org/paper/594d2744cf9d544341bafec01a4351de1ebfcaff", - "title": "Inductive Responses of Alcohol and Malic Dehydrogenases in Relation - to Flooding Tolerance in Roots", "abstract": "The levels of alcohol dehydrogenase - and malic dehydrogenase activity were investigated in the roots of various - species grown for several days, in aerated and non-aerated culture solutions. - The activity of these enzymes in non-aerated cul tures increased but only - in those species previously found to be intolerant of experimental flooding. - The induction of alcohol dehydrogenase was reversible. Physiological concentrations - of acetaldehyde induced alcohol dehydrogenase activity, this induction being - greatest in the species intolerant of flooding. It is suggested that the ineffectiveness - of the inductive stimulus in the plants tolerant of flooding contributes to - their homeostatic survival properties under high water table conditions.", - "venue": "", "year": 1968, "referenceCount": 14, "citationCount": 59, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1968-08-01", "journal": {"name": "Journal of Experimental Botany", "pages": - "435-441", "volume": "19"}, "authors": [{"authorId": "40273643", "name": "R. - Crawford"}, {"authorId": "90810485", "name": "M. Mcmanmon"}]}, {"paperId": - "16b24cdeeb57b29e6fb2c864056fdd877b991fc6", "externalIds": {"MAG": "1888135876", - "ArXiv": "0803.4082", "CorpusId": 5180043}, "url": "https://www.semanticscholar.org/paper/16b24cdeeb57b29e6fb2c864056fdd877b991fc6", - "title": "Profinite Homotopy Theory", "abstract": "We construct a model structure - on simplicial profinite sets such that the homotopy groups carry a natural - profinite struc- ture. This yields a rigid profinite completion functor for - spaces and pro-spaces. One motivation is thehomotopy theory of schemes in - which higher profiniteetale homotopy groups fit well with the \u00b4 fundamental - group which is always profinite. We show that the profi- nitetopological realization - functor is a good object in several respects.", "venue": "", "year": 2008, - "referenceCount": 45, "citationCount": 42, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2008-03-28", - "journal": {"name": "arXiv: Algebraic Topology", "volume": ""}, "authors": - [{"authorId": "101123670", "name": "Gereon Quick"}]}, {"paperId": "91b0fe61ef91329d42fc732c75cba76b9c764832", - "externalIds": {"MAG": "2046623859", "DOI": "10.1007/BF02672963", "CorpusId": - 85429030}, "url": "https://www.semanticscholar.org/paper/91b0fe61ef91329d42fc732c75cba76b9c764832", - "title": "Polyglycerol esters: Optimization and techno-economic evaluation", - "abstract": null, "venue": "", "year": 1981, "referenceCount": 2, "citationCount": - 60, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1981-09-01", "journal": {"name": "Journal of the - American Oil Chemists\u2019 Society", "pages": "878-883", "volume": "58"}, - "authors": [{"authorId": "5284697", "name": "N. Garti"}, {"authorId": "92163795", - "name": "A. Aserin"}, {"authorId": "145710226", "name": "B. Zaidman"}]}, {"paperId": - "4a06489f9e49f11215b8e54c21333d54d597b1cd", "externalIds": {"MAG": "1965132178", - "DOI": "10.1063/1.461860", "CorpusId": 58907075}, "url": "https://www.semanticscholar.org/paper/4a06489f9e49f11215b8e54c21333d54d597b1cd", - "title": "Turing patterns visualized by index of refraction variations", "abstract": - "Gel pattern is visualized by the refractive index variations.The fossil patterns - correspond to a spatial variation in the refractive index. (AIP)", "venue": - "", "year": 1992, "referenceCount": 6, "citationCount": 26, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1992-03-01", "journal": {"name": - "Journal of Chemical Physics", "pages": "4048-4049", "volume": "96"}, "authors": - [{"authorId": "2110246847", "name": "K. Lee"}, {"authorId": "38890112", "name": - "W. Mccormick"}, {"authorId": "2421446", "name": "H. Swinney"}, {"authorId": - "5289890", "name": "Z. Noszticzius"}]}, {"paperId": "ef8875c7d1349cc8d506500e92eb575f0c8659a9", - "externalIds": {"DBLP": "conf/stacs/Kummer96", "MAG": "1497307042", "DOI": - "10.1007/3-540-60922-9_3", "CorpusId": 18398890}, "url": "https://www.semanticscholar.org/paper/ef8875c7d1349cc8d506500e92eb575f0c8659a9", - "title": "On the Complexity of Random Strings (Extended Abstract)", "abstract": + "publicationDate": "2015-11-25", "journal": {"name": "arXiv: Learning", "volume": + ""}, "authors": [{"authorId": "40527594", "name": "Lukasz Kaiser"}, {"authorId": + "1701686", "name": "Ilya Sutskever"}]}, {"paperId": "5121d759d2753f2003aa666c54c70ff21135232a", + "externalIds": {"DBLP": "conf/iclp/DevienneLR92", "MAG": "1726077092", "DOI": + "10.1007/3-540-56503-5_7", "CorpusId": 125604212}, "corpusId": 125604212, + "publicationVenue": {"id": "2e8ac273-26de-40d6-9f96-09286b1016f1", "name": + "Symposium on Theoretical Aspects of Computer Science", "type": "conference", + "alternate_names": ["STACS", "Symp Theor Asp Comput Sci"], "url": "http://www.stacs-conf.org/"}, + "url": "https://www.semanticscholar.org/paper/5121d759d2753f2003aa666c54c70ff21135232a", + "title": "Halting Problem of One Binary Horn Clause is Undecidable", "abstract": null, "venue": "Symposium on Theoretical Aspects of Computer Science", "year": - 1996, "referenceCount": 19, "citationCount": 60, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], + 1993, "referenceCount": 18, "citationCount": 43, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "1993-02-25", "journal": {"pages": "48-57"}, + "authors": [{"authorId": "1870001", "name": "P. Devienne"}, {"authorId": "2234897", + "name": "P. Leb\u00e8gue"}, {"authorId": "1774532", "name": "J. Routier"}]}, + {"paperId": "d367afda992dbeffcb022229fcadeb3dfbb16251", "externalIds": {"MAG": + "1547121230", "DOI": "10.1002/0471756504.CH27", "CorpusId": 18573101}, "corpusId": + 18573101, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d367afda992dbeffcb022229fcadeb3dfbb16251", + "title": "The Organic Grid: Self\u2010organizing Computational Biology on + Desktop Grids", "abstract": "Machines take me by surprise with great frequency. + \u2014A. Turing I think there''s a world market for about five computers.", + "venue": "", "year": 2005, "referenceCount": 49, "citationCount": 20, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2005-06-09", "journal": {"name": "", "pages": "671-703", + "volume": ""}, "authors": [{"authorId": "2284555", "name": "A. Chakravarti"}, + {"authorId": "40204034", "name": "Gerald Baumgartner"}, {"authorId": "1777832", + "name": "M. Lauria"}]}, {"paperId": "0ce9aaf66c268d8735fe3f993b7b7e0b95897c36", + "externalIds": {"MAG": "1996623146", "DOI": "10.1021/AR00029A002", "CorpusId": + 94981633}, "corpusId": 94981633, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0ce9aaf66c268d8735fe3f993b7b7e0b95897c36", + "title": "TURING STRUCTURES IN SIMPLE CHEMICAL REACTIONS", "abstract": null, + "venue": "", "year": 1993, "referenceCount": 42, "citationCount": 19, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1993-05-01", "journal": {"name": "Accounts of Chemical Research", "pages": + "235-240", "volume": "26"}, "authors": [{"authorId": "48178739", "name": "I. + Lengyel"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": + "5292b3c62da2d3d19c29e767092a0e73dbc13c72", "externalIds": {"MAG": "2058514655", + "DOI": "10.1016/j.beproc.2005.01.001", "CorpusId": 24444653, "PubMed": "15795069"}, + "corpusId": 24444653, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5292b3c62da2d3d19c29e767092a0e73dbc13c72", + "title": "A Turing test of a timing theory", "abstract": null, "venue": "Behavioural + Processes", "year": 2005, "referenceCount": 33, "citationCount": 20, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-04-29", "journal": {"name": "Behavioural Processes", + "pages": "45-58", "volume": "69"}, "authors": [{"authorId": "144304531", "name": + "R. Church"}, {"authorId": "6347986", "name": "P. Guilhardi"}]}, {"paperId": + "66e118ac88f9765a8f18b16478c9d01bd313224e", "externalIds": {"PubMedCentral": + "6416241", "MAG": "2865984904", "DOI": "10.2174/1573396314666180712114531", + "CorpusId": 51620343, "PubMed": "29998808"}, "corpusId": 51620343, "publicationVenue": + {"id": "04a97687-d5d3-4401-a34e-fa6c0b48c24c", "name": "Current pediatric + reviews", "type": "journal", "alternate_names": ["Current Pediatric Reviews", + "Curr Pediatr Rev", "Curr pediatr rev"], "issn": "1573-3963", "url": "https://benthamscience.com/journal/index.php?journalID=cpr"}, + "url": "https://www.semanticscholar.org/paper/66e118ac88f9765a8f18b16478c9d01bd313224e", + "title": "Neonatal and Long-Term Consequences of Fetal Growth Restriction", + "abstract": "Background: Fetal Growth Restriction (FGR) is one of the most + common noxious ante-natal conditions in humans, inducing a substantial proportion + of preterm delivery and leading to a si-gnificant increase in perinatal mortality, + neurological handicaps and chronic diseases in adulthood. This review summarizes + the current knowledge about the postnatal consequences of FGR, with a par-ticular + emphasis on the long-term consequences on respiratory, cardiovascular and + neurological struc-tures and functions. Result and Conclusion: FGR represents + a global health challenge, and efforts are urgently needed to improve our + understanding of the critical factors leading to FGR and subsequent insults + to the deve-loping organs.", "venue": "Current pediatric reviews", "year": + 2018, "referenceCount": 128, "citationCount": 60, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc6416241?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2018-10-31", + "journal": {"name": "Current Pediatric Reviews", "pages": "212 - 218", "volume": + "14"}, "authors": [{"authorId": "47869761", "name": "M. Colella"}, {"authorId": + "6755681", "name": "Alice Fr\u00e9rot"}, {"authorId": "7629828", "name": "A. + R. B. Novais"}, {"authorId": "144552161", "name": "O. Baud"}]}, {"paperId": + "c630d9ff8bbd4102715f5726ccb47b1d6105dcff", "externalIds": {"DBLP": "conf/stoc/Paul77", + "MAG": "2041195445", "DOI": "10.1145/800105.803411", "CorpusId": 27644125}, + "corpusId": 27644125, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c630d9ff8bbd4102715f5726ccb47b1d6105dcff", + "title": "On time hierarchies", "abstract": "For fixed k \u2265 2 we tighten + the time hierarchy for k-tape Turing machines. Also for fixed k \u2265 2 we + exhibit infinite hierarchies of languages recognizable by k-tape machines + with increasing amount of time on the same amount of space.", "venue": "STOC + ''77", "year": 1977, "referenceCount": 8, "citationCount": 34, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1977-05-04", "journal": {"name": "J. Comput. Syst. Sci.", + "pages": "197-202", "volume": "19"}, "authors": [{"authorId": "1727613", "name": + "W. Paul"}]}, {"paperId": "936aa54dd2969d128151ead7d2de9b712ee8fb0b", "externalIds": + {"MAG": "2474564653", "DBLP": "conf/ae/Tanomaru97", "DOI": "10.1007/BFb0026599", + "CorpusId": 37851486}, "corpusId": 37851486, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/936aa54dd2969d128151ead7d2de9b712ee8fb0b", + "title": "Evolving Turing Machines from Examples", "abstract": null, "venue": + "Artificial Evolution", "year": 1997, "referenceCount": 8, "citationCount": + 13, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1997-10-01", "journal": {"pages": "167-182"}, "authors": [{"authorId": "2119656", + "name": "J. Tanomaru"}]}, {"paperId": "964fb5aba4c5fc78ab17f36fa9d9bf82b89a9b23", + "externalIds": {"MAG": "2330016637", "DOI": "10.3147/JSFP.32.225", "CorpusId": + 88229937}, "corpusId": 88229937, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/964fb5aba4c5fc78ab17f36fa9d9bf82b89a9b23", + "title": "Effects of Temperature on Growth and Protease Production of Cytophaga + psychrophila", "abstract": "Our previous study1) demonstrated that the optimal + tempera tures for the protease production were lower than those for the growth + of a mesophilic bacterium, Aeromonas hydrophila. As protease is one of the + pathogenic factors, the previous results provoked us into making a similar + work with the low tempera ture-loving bacterium, Cytophaga psychrophila (syn. + Flexibacter psychrophilus). This bacterium is known as the causative agent + of bacterial coldwater disease in salmonids and some other freshwater fishes2).", + "venue": "", "year": 1997, "referenceCount": 1, "citationCount": 18, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.jstage.jst.go.jp/article/jsfp1966/32/4/32_4_225/_pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1997-12-15", "journal": {"name": + "Fish Pathology", "pages": "225-226", "volume": "32"}, "authors": [{"authorId": + "88611109", "name": "N. Uddin"}, {"authorId": "46736208", "name": "H. Wakabayashi"}]}, + {"paperId": "0a5377bbed802fc732b8f93826e1d508fb1f2df6", "externalIds": {"DBLP": + "journals/siamcomp/BookNP74", "MAG": "2055357774", "DOI": "10.1137/0203023", + "CorpusId": 207050754}, "corpusId": 207050754, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0a5377bbed802fc732b8f93826e1d508fb1f2df6", + "title": "Reversal-Bounded Acceptors and Intersections of Linear Languages", + "abstract": "A Turing machine whose behavior is restricted so that each read-write + head can change its direction only a bounded number of times is reversal-bounded. + Here we consider nondeterministic multitape acceptors which are both reversal-bounded + and also operate in linear time. Our main result shows that such an acceptor + need have only three pushdown stores as auxiliary storage, each pushdown store + need make only one reversal, and the acceptor can operate in real time.", + "venue": "SIAM J. Comput.", "year": 1974, "referenceCount": 6, "citationCount": + 42, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1974-12-01", "journal": {"name": "SIAM J. Comput.", "pages": "283-295", "volume": + "3"}, "authors": [{"authorId": "1699267", "name": "R. V. Book"}, {"authorId": + "145175901", "name": "M. Nivat"}, {"authorId": "143607434", "name": "M. Paterson"}]}, + {"paperId": "e14dd8bf4a2d51210137ae2982feb8708ad2fed1", "externalIds": {"MAG": + "204724979", "DOI": "10.1177/070674370104600112", "CorpusId": 40313274, "PubMed": + "11221494"}, "corpusId": 40313274, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e14dd8bf4a2d51210137ae2982feb8708ad2fed1", + "title": "Adverse Reactions to St John''s Wort", "abstract": "Objective: To + re port 2 cases of ad verse re ac tions to St John''s wort, a pop u lar herbal + treat ment for de pression. Method: We pres ent 2 case his to ries and re + view the ex ist ing lit er a ture re gard ing St John''s wort. Results: St + John''s wort may cause se ro to nin syn drome in sen si tive pa tients. In + ad di tion, St John''s wort may be as so ci ated with hair loss. Conclusions: + For clin i cal rea sons, it is im por tant to rec og nize and re port ad verse + re ac tions to herbal rem e dies and to doc u ment that these treat ments + have side ef fects com men su rate with their po tent ac tion on brain neurochemistry.", + "venue": "Canadian journal of psychiatry. Revue canadienne de psychiatrie", + "year": 2001, "referenceCount": 27, "citationCount": 106, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/070674370104600112", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "CaseReport"], "publicationDate": "2001-02-01", + "journal": {"name": "The Canadian Journal of Psychiatry", "pages": "77 - 79", + "volume": "46"}, "authors": [{"authorId": "113534923", "name": "Vivien Parker"}, + {"authorId": "2173163087", "name": "Al bert HC Wong"}, {"authorId": "2084910868", + "name": "H. S. Boon"}, {"authorId": "3234738", "name": "M. Seeman"}]}, {"paperId": + "2e42561696c0faafb5007165678a7d550e138e39", "externalIds": {"ArXiv": "0907.0456", + "MAG": "2070726868", "DOI": "10.1103/PhysRevE.81.026213", "CorpusId": 15541431, + "PubMed": "20365644"}, "corpusId": 15541431, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2e42561696c0faafb5007165678a7d550e138e39", + "title": "Forced patterns near a Turing-Hopf bifurcation.", "abstract": "We + study time-periodic forcing of spatially extended patterns near a Turing-Hopf + bifurcation point. A symmetry-based normal form analysis yields several predictions, + including that (i) weak forcing near the intrinsic Hopf frequency enhances + or suppresses the Turing amplitude by an amount that scales quadratically + with the forcing strength, and (ii) the strongest effect is seen for forcing + that is detuned from the Hopf frequency. To apply our results to specific + models, we perform a perturbation analysis on general two-component reaction-diffusion + systems, which reveals whether the forcing suppresses or enhances the spatial + pattern. For the suppressing case, our results are consistent with features + of previous experiments on the chlorine dioxide-iodine-malonic acid chemical + reaction. However, we also find examples of the enhancing case, which has + not yet been observed in experiment. Numerical simulations verify the predicted + dependence on the forcing parameters.", "venue": "Physical review. E, Statistical, + nonlinear, and soft matter physics", "year": 2009, "referenceCount": 88, "citationCount": + 15, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://link.aps.org/pdf/10.1103/PhysRevE.81.026213", "status": "HYBRID"}, + "fieldsOfStudy": ["Mathematics", "Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2009-07-02", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 026213\n ", + "volume": "81 2 Pt 2"}, "authors": [{"authorId": "1949686", "name": "C. Topaz"}, + {"authorId": "1896425", "name": "Anne J. Catll\u00e1"}]}, {"paperId": "2bfa8ada756d3cc4dc9c278275c9f802177fa419", + "externalIds": {"ArXiv": "1310.4860", "MAG": "2545591031", "DOI": "10.1103/PhysRevLett.112.050504", + "CorpusId": 10489988, "PubMed": "24580579"}, "corpusId": 10489988, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/2bfa8ada756d3cc4dc9c278275c9f802177fa419", + "title": "Scalable implementation of boson sampling with trapped ions.", "abstract": + "Boson sampling solves a classically intractable problem by sampling from + a probability distribution given by matrix permanents. We propose a scalable + implementation of boson sampling using local transverse phonon modes of trapped + ions to encode the bosons. The proposed scheme allows deterministic preparation + and high-efficiency readout of the bosons in the Fock states and universal + mode mixing. With the state-of-the-art trapped ion technology, it is feasible + to realize boson sampling with tens of bosons by this scheme, which would + outperform the most powerful classical computers and constitute an effective + disproof of the famous extended Church-Turing thesis.", "venue": "Physical + Review Letters", "year": 2013, "referenceCount": 0, "citationCount": 64, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1310.4860", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-10-17", "journal": + {"name": "Physical review letters", "pages": "\n 050504\n ", + "volume": "112 5"}, "authors": [{"authorId": "2148909951", "name": "C. Shen"}, + {"authorId": "10414084", "name": "Z. Zhang"}, {"authorId": "144794202", "name": + "L. Duan"}]}, {"paperId": "8d6cf4d421e9cecc1dbe0eb2b0f7571fcfd84aff", "externalIds": + {"DBLP": "conf/mfcs/Jung81", "MAG": "175900084", "DOI": "10.1007/3-540-10856-4_101", + "CorpusId": 22530003}, "corpusId": 22530003, "publicationVenue": {"id": "8341fde2-3e67-4fde-bb5c-6f0320d7f114", + "name": "International Symposium on Mathematical Foundations of Computer Science", + "type": "conference", "alternate_names": ["Int Symp Math Found Comput Sci", + "MFCS", "Math Found Comput Sci", "Mathematical Foundations of Computer Science"], + "url": "https://en.wikipedia.org/wiki/International_Symposium_on_Mathematical_Foundations_of_Computer_Science"}, + "url": "https://www.semanticscholar.org/paper/8d6cf4d421e9cecc1dbe0eb2b0f7571fcfd84aff", + "title": "Relationships between Probabilistic and Deterministic Tape Complexity", + "abstract": null, "venue": "International Symposium on Mathematical Foundations + of Computer Science", "year": 1981, "referenceCount": 4, "citationCount": + 33, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": + "1981-08-31", "journal": {"pages": "339-346"}, "authors": [{"authorId": "103166893", + "name": "H. Jung"}]}, {"paperId": "1bc483daf5c19876f05ea03cdf12e6ebbc6d72ee", + "externalIds": {"DBLP": "journals/eccc/Viola12", "MAG": "2401470856", "DOI": + "10.1007/978-3-642-32512-0_56", "CorpusId": 14343024}, "corpusId": 14343024, + "publicationVenue": {"id": "06caf6fa-45cd-41e4-a5e9-24620a996490", "name": + "International Workshop and International Workshop on Approximation, Randomization, + and Combinatorial Optimization. Algorithms and Techniques", "type": "conference", + "alternate_names": ["APPROX/RANDOM", "Int Workshop Int Workshop Approx Randomization + Comb Optim Algorithm Tech"]}, "url": "https://www.semanticscholar.org/paper/1bc483daf5c19876f05ea03cdf12e6ebbc6d72ee", + "title": "Extractors for Turing-Machine Sources", "abstract": null, "venue": + "International Workshop and International Workshop on Approximation, Randomization, + and Combinatorial Optimization. Algorithms and Techniques", "year": 2012, + "referenceCount": 27, "citationCount": 13, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://www.ccs.neu.edu/home/viola/papers/extm.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-08-15", "journal": {"name": "Electron. Colloquium + Comput. Complex.", "volume": "TR12"}, "authors": [{"authorId": "1743196", + "name": "Emanuele Viola"}]}, {"paperId": "8bfc6b2a79ac237eeda5304e0a8c7c892d47499f", + "externalIds": {"MAG": "2176457270", "DBLP": "journals/cacm/Hoare81", "DOI": + "10.1145/358549.358561", "CorpusId": 97895}, "corpusId": 97895, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8bfc6b2a79ac237eeda5304e0a8c7c892d47499f", + "title": "The emperor''s old clothes", "abstract": "The 1980 ACM Turing Award + was presented to Charles Antony Richard Hoare, Professor of Computation at + the University of Oxford, England, by Walter Carlson, Chairman of the Awards + Committee, at the ACM Annual Conference in Nashville, Tennessee, October 27, + 1980. Professor Hoare was selected by the General Technical Achievement Award + Committee for his fundamental contributions to the definition and design of + programming languages. His work is characterized by an unusual combination + of insight, originality, elegance, and impact. He is best known for his work + on axiomatic definitions of programming languages through the use of techniques + popularly referred to as axiomatic semantics. He developed ingenious algorithms + such as Quichsort and was responsible for inventing and promulgating advanced + data structuring techniques in scientific programming languages. He has also + made important contributions to operating systems through the study of monitors. + His most recent work is on communicating sequential processes. Prior to his + appointment to the University of Oxford in 1977, Professor Hoare was Professor + of Computer Science at The Queen''s University in Belfast, Ireland, from 1968 + to 1977 and was a Visiting Professor at Stanford University in 1973. From + 1960 to 1968 he held a number of positions with Elliott Brothers, Ltd., England.", + "venue": "CACM", "year": 1981, "referenceCount": 18, "citationCount": 317, + "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": {"url": + "http://dl.acm.org/ft_gateway.cfm?id=1283936&type=pdf", "status": "BRONZE"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1981-02-01", "journal": {"name": "Commun. ACM", "pages": "75-83", "volume": + "24"}, "authors": [{"authorId": "144861543", "name": "C. Hoare"}]}, {"paperId": + "13ee57393b6f7dc7ab708d287ca088037d92a81b", "externalIds": {"MAG": "2333350765", + "DOI": "10.3934/DCDSS.2011.4.1621", "CorpusId": 124158839}, "corpusId": 124158839, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13ee57393b6f7dc7ab708d287ca088037d92a81b", + "title": "Turing instability in a coupled predator-preymodel with different + Holling type functional responses", "abstract": "In a reaction-diffusion system, + diffusion can induce the instability \nof a positive equilibrium which is + stable with respect to a \nconstant perturbation, therefore, the diffusion + may create new \npatterns when the corresponding system without diffusion + fails, \n as shown by Turing in 1950s. In this paper we study a coupled \n + predator-prey model with different Holling type functional \n responses, where + cross-diffusions are included in such a way that \n the prey runs away from + predator and the predator chase preys. We \n conduct the Turing instability + analysis for each Holling functional response. \n We prove that if a positive + equilibrium solution is linearly stable with respect to the ODE system of + \n the predator-prey model, then it is \nalso linearly stable with respect + to the model. So diffusion and \ncross-diffusion in the predator-prey model + with Holling type \nfunctional responses given in this paper can not drive + Turing \ninstability. However, diffusion and cross-diffusion can still create + \nnon-constant positive solutions for the model.", "venue": "", "year": 2010, + "referenceCount": 26, "citationCount": 17, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1996-02-22", - "journal": {"pages": "25-36"}, "authors": [{"authorId": "144607616", "name": - "M. Kummer"}]}, {"paperId": "5ace42fd15e6bcf3056d2314906f954b1f83116b", "externalIds": - {"ArXiv": "math/0001173", "MAG": "1633564485", "DOI": "10.1090/conm/257/04029", - "CorpusId": 1134160}, "url": "https://www.semanticscholar.org/paper/5ace42fd15e6bcf3056d2314906f954b1f83116b", + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-12-01", "journal": {"name": "Discrete and Continuous Dynamical Systems + - Series S", "pages": "1621-1628", "volume": "4"}, "authors": [{"authorId": + "7654404", "name": "Zhifu Xie"}]}, {"paperId": "d451742dc2c264053b6aa23478ed607513466b17", + "externalIds": {"MAG": "2145252685", "DOI": "10.1112/S0024610702003691", "CorpusId": + 1341719}, "corpusId": 1341719, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d451742dc2c264053b6aa23478ed607513466b17", + "title": "Turing Definability in the Ershov Hierarchy", "abstract": "The first + nontrivial DCE (2\u2010computably enumerable) Turing approximation to the + class of computably enumerable degrees is obtained. This depends on the following + extension of the splitting theorem for the DCE degrees. For any DCE degree + a and any computably enumerable degree b, if b < a, then there are DCE degrees + x0, x1 such that b < x0, x1 < a and a = x0 \u2228 x1. The construction is + unusual in that it is incompatible with upper cone avoidance.", "venue": "", + "year": 2002, "referenceCount": 31, "citationCount": 16, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2002-12-01", "journal": {"name": "Journal of the London Mathematical Society", + "volume": "66"}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, + {"authorId": "145546987", "name": "Angsheng Li"}]}, {"paperId": "5ace42fd15e6bcf3056d2314906f954b1f83116b", + "externalIds": {"ArXiv": "math/0001173", "MAG": "1633564485", "DOI": "10.1090/conm/257/04029", + "CorpusId": 1134160}, "corpusId": 1134160, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/5ace42fd15e6bcf3056d2314906f954b1f83116b", "title": "How Many Turing Degrees are There", "abstract": "A Borel equivalence relation on a Polish space is countable if all \nof its equivalence classes are countable. Standard examples of countable Borel \nequivalence relations @@ -42961,90 +48683,120 @@ interactions: and conjectures concerning the problem of identifying the \nplace in this hierarchy of these equivalence relations from recursion theory and \nalso discuss some of their implications.", "venue": "", "year": 2000, "referenceCount": - 18, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2000-01-28", "journal": - {"name": "arXiv: Logic", "volume": ""}, "authors": [{"authorId": "143613348", - "name": "R. Dougherty"}, {"authorId": "8639665", "name": "A. Kechris"}]}, - {"paperId": "1c34452d2a4060c1cbb411ce667c141910eaeb2b", "externalIds": {"MAG": - "1990000710", "DOI": "10.1016/J.JTBI.2003.09.018", "CorpusId": 855264, "PubMed": - "14759646"}, "url": "https://www.semanticscholar.org/paper/1c34452d2a4060c1cbb411ce667c141910eaeb2b", - "title": "The role of trans-membrane signal transduction in turing-type cellular - pattern formation.", "abstract": null, "venue": "Journal of Theoretical Biology", - "year": 2004, "referenceCount": 21, "citationCount": 60, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2004-02-21", "journal": {"name": "Journal - of theoretical biology", "pages": "\n 401-7\n ", "volume": - "226 4"}, "authors": [{"authorId": "46803935", "name": "E. Rauch"}, {"authorId": - "3519329", "name": "M. Millonas"}]}, {"paperId": "9e2600e25dac039040d699bdf5057233e7bb8bfa", - "externalIds": {"DBLP": "journals/jco/LibertiM14", "MAG": "1975283720", "DOI": - "10.1007/s10878-014-9715-3", "CorpusId": 4851981}, "url": "https://www.semanticscholar.org/paper/9e2600e25dac039040d699bdf5057233e7bb8bfa", - "title": "Mathematical programming: Turing completeness and applications to - software analysis", "abstract": null, "venue": "Journal of combinatorial optimization", - "year": 2014, "referenceCount": 38, "citationCount": 16, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-02-16", "journal": {"name": "Journal of Combinatorial - Optimization", "pages": "82-104", "volume": "28"}, "authors": [{"authorId": - "3044529", "name": "Leo Liberti"}, {"authorId": "40909523", "name": "F. Marinelli"}]}, - {"paperId": "fdc96892b46cc6756732669a268cf3707deacc30", "externalIds": {"MAG": - "1847828785", "DOI": "10.1109/ICEC.1997.592299", "CorpusId": 8779257}, "url": - "https://www.semanticscholar.org/paper/fdc96892b46cc6756732669a268cf3707deacc30", - "title": "On the power of circular splicing systems and DNA computability", - "abstract": "From a biological motivation of the interactions between linear - and circular DNA sequences, we propose a new type of splicing model called - \"circular H systems\" and show that they have the same computational power - as Turing machines. It is also shown that there effectively exists a universal - circular H system which can simulate any circular H system with the same terminal - alphabet, which strongly suggests a feasible design for a DNA computer based - on circular splicing.", "venue": "International Conference on Evolutionary - Computation", "year": 1997, "referenceCount": 31, "citationCount": 43, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], - "publicationDate": "1997-04-13", "journal": {"name": "Proceedings of 1997 - IEEE International Conference on Evolutionary Computation (ICEC ''97)", "pages": - "219-224"}, "authors": [{"authorId": "1742006", "name": "T. Yokomori"}, {"authorId": - "145033788", "name": "S. Kobayashi"}, {"authorId": "48908511", "name": "C. - Ferretti"}]}, {"paperId": "f586c94bfb10bab5e29e90541e675a682d60d64c", "externalIds": - {"DBLP": "conf/aaai/Shieber06", "MAG": "2142056599", "CorpusId": 216609598}, - "url": "https://www.semanticscholar.org/paper/f586c94bfb10bab5e29e90541e675a682d60d64c", - "title": "Does the Turing Test Demonstrate Intelligence or Not?", "abstract": - "The Turing Test has served as a defining inspiration throughout the early - history of artificial intelligence research. Its centrality arises in part - because verbal behavior indistinguishable from that of humans seems like an - incontrovertible criterion for intelligence, a \u201cphilosophical conversation - stopper\u201d as Dennett (1985) says. On the other hand, from the moment Turing\u2019s - seminal article (Turing, 1950) was published, the conversation hasn\u2019t - stopped; the appropriateness of the Test has been continually questioned, - and current philosophical wisdom holds that the Turing Test is hopelessly - flawed as a sufficient condition for attributing intelligence. In this short - article, I summarize for an artificial intelligence audience an argument that - I have presented at length for a philosophical audience (Shieber, to appear) - that attempts to reconcile these two mutually contradictory but well-founded - attitudes towards the Turing Test that have been under constant debate since - 1950 (Shieber, 2004). The arguments against the sufficiency of the Turing - Test for determining intelligence rely on showing that some extra conditions - are logically necessary for intelligence beyond the behavioral properties - exhibited by a subject under a Turing Test. Therefore, it cannot follow logically - from passing a Turing Test that the agent is intelligent. I will argue that - these extra conditions can be revealed by the Turing Test, so long as we allow - a very slight weakening of the criterion from one of logical proof to one - of statistical proof under weak realizability assumptions. Crucially, this - weakening is so slight as to make no conceivable difference from a practical - standpoint. Thus, the Gordian knot between the two opposing views of the sufficiency - of the Turing Test can be cut.", "venue": "AAAI", "year": 2006, "referenceCount": - 12, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2006-07-16", - "journal": {"pages": "1539-1542"}, "authors": [{"authorId": "1692491", "name": - "S. Shieber"}]}, {"paperId": "f18349179617d2764010329551835f547ccea079", "externalIds": - {"MAG": "230953153", "CorpusId": 140372811}, "url": "https://www.semanticscholar.org/paper/f18349179617d2764010329551835f547ccea079", + 15, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://authors.library.caltech.edu/39054/1/Kechris_2000p83.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2000-01-28", + "journal": {"name": "arXiv: Logic", "volume": ""}, "authors": [{"authorId": + "143613348", "name": "R. Dougherty"}, {"authorId": "8639665", "name": "A. + Kechris"}]}, {"paperId": "aadfec864fb0ce20cb868e36568e7456e41f42a3", "externalIds": + {"MAG": "2072221156", "DOI": "10.1080/87567559809596229", "CorpusId": 144286196}, + "corpusId": 144286196, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aadfec864fb0ce20cb868e36568e7456e41f42a3", + "title": "Model for Active Learning: Collaborative Peer Teaching", "abstract": + "Gargantua, to Dewey''s reflective thinking (1930s), to Bruner''s discovery + method (1960s). Again and again, the idea of learners getting involved in + their learning, instead of passively receiving informa tion from an instructor, + has been consid ered the essence of education. No doubt good teachers have + always known that learning is enhanced when students get involved?to discover, + manipulate, or personalize information. To be sure, teacher-centered instruction, + such as lec ture, has the advantage of communicating information in a complete, + orderly form. However, student-centered methods, such as discussion, are considered + more effec tive in developing higher-order intellectu al skills, such as synthesis + and problem solving (Bloom 1953, 167-69). Indeed, recent empirical studies + have found student-centered methods to be superior to teacher-dominated practices + in the following respects: \"application of concepts, problem solving, attitude, + moti vation, group membership and leadership skills . . .\" (McKeachie, Pintrich, + Lin, and Smith as quoted in Sorcinelli 1991, 17).", "venue": "", "year": 1998, + "referenceCount": 5, "citationCount": 106, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "College Teaching", "pages": "26-30", "volume": + "46"}, "authors": [{"authorId": "70587660", "name": "Lois Rubin"}, {"authorId": + "47851934", "name": "C. Hebert"}]}, {"paperId": "1d9355dab845b24ff2700b4f8da08b1c32dcdaf0", + "externalIds": {"MAG": "2037663536", "DOI": "10.1016/S0092-8240(05)80007-2", + "CorpusId": 122221547}, "corpusId": 122221547, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1d9355dab845b24ff2700b4f8da08b1c32dcdaf0", + "title": "Discussion: Turing''s theory of morphogenesis\u2014Its influence + on modelling biological pattern and form", "abstract": null, "venue": "", + "year": 1990, "referenceCount": 47, "citationCount": 62, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Bulletin of Mathematical Biology", "pages": "117-152", + "volume": "52"}, "authors": [{"authorId": "88251269", "name": "J. Murray"}]}, + {"paperId": "80aac474447dc7feac0380f38309f38e62cd7108", "externalIds": {"MAG": + "2064577184", "DBLP": "conf/stoc/JonesL74", "DOI": "10.1145/800119.803883", + "CorpusId": 12251817}, "corpusId": 12251817, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/80aac474447dc7feac0380f38309f38e62cd7108", + "title": "Complete problems for deterministic polynomial time", "abstract": + "The results of Cook and Karp ([K], [C]) aroused considerable interest for + at least two reasons. First, the answer to a long-standing open question which + had seemed peculiar to automata theory\u2014whether deterministic and nondeterministic + polynomial-time-bounded Turing machines are equivalent in power\u2014was seen + to be exactly equivalent to determining whether any of several familiar combinatorial + problems can be solved by polynomial-time algorithms. Second, the existence + of complete problems for NP1 made it possible to replace an entire class of + questions by a question about a single representative.Thus all of these combinatorial + and automata-theoretic problems were essentially restatements of a single + problem, such as: can satisfiability of a propositional formula be decided + in polynomial time.\n The main purpose of this paper is to introduce several + problems which are complete for P, the class of languages recognizable in + deterministic polynomial time. Any such language has the property that if + it is recognizable in space logk(\u2022), then every language in P is so recognizable. + Thus a problem complete for P will serve to differentiate those sets in P + which are not recognizable in logarithmic space from those which are, providing + such differentiation is possible. A problem of this type was first presented + by Cook in [C2], concerning solvable path systems.", "venue": "Symposium on + the Theory of Computing", "year": 1974, "referenceCount": 14, "citationCount": + 317, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1974-04-30", "journal": {"name": "Theor. + Comput. Sci.", "pages": "105-117", "volume": "3"}, "authors": [{"authorId": + "1700623", "name": "N. Jones"}, {"authorId": "2199440", "name": "William T. + Laaser"}]}, {"paperId": "82b3346080783031ddaf73e6df73b5302ca19248", "externalIds": + {"DBLP": "conf/uss/DaviSLM14", "MAG": "1631846088", "CorpusId": 17128285}, + "corpusId": 17128285, "publicationVenue": {"id": "54649c1d-6bcc-4232-9cd1-aa446867b8d0", + "name": "USENIX Security Symposium", "type": "conference", "alternate_names": + ["USENIX Secur Symp"], "url": "http://www.usenix.org/events/bytopic/security.html"}, + "url": "https://www.semanticscholar.org/paper/82b3346080783031ddaf73e6df73b5302ca19248", + "title": "Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained + Control-Flow Integrity Protection", "abstract": "Return-oriented programming + (ROP) offers a robust attack technique that has, not surprisingly, been extensively + used to exploit bugs in modern software programs (e.g., web browsers and PDF + readers). ROP attacks require no code injection, and have already been shown + to be powerful enough to bypass fine-grained memory randomization (ASLR) defenses. + To counter this ingenious attack strategy, several proposals for enforcement + of (coarse-grained) control-flow integrity (CFI) have emerged. The key argument + put forth by these works is that coarse-grained CFI policies are sufficient + to prevent ROP attacks. As this reasoning has gained traction, ideas put forth + in these proposals have even been incorporated into coarse-grained CFI defenses + in widely adopted tools (e.g., Microsoft''s EMET framework). \n \nIn this + paper, we provide the first comprehensive security analysis of various CFI + solutions (covering kBouncer, ROPecker, CFI for COTS binaries, ROP-Guard, + and Microsoft EMET 4.1). A key contribution is in demonstrating that these + techniques can be effectively undermined, even under weak adversarial assumptions. + More specifically, we show that with bare minimum assumptions, turing-complete + and real-world ROP attacks can still be launched even when the strictest of + enforcement policies is in use. To do so, we introduce several new ROP attack + primitives, and demonstrate the practicality of our approach by transforming + existing real-world exploits into more stealthy attacks that bypass coarse-grained + CFI defenses.", "venue": "USENIX Security Symposium", "year": 2014, "referenceCount": + 54, "citationCount": 316, "influentialCitationCount": 34, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-08-20", "journal": {"pages": "401-416"}, "authors": + [{"authorId": "2597368", "name": "Lucas Davi"}, {"authorId": "145897166", + "name": "A. Sadeghi"}, {"authorId": "49319703", "name": "Daniel Lehmann"}, + {"authorId": "1792232", "name": "F. Monrose"}]}, {"paperId": "f18349179617d2764010329551835f547ccea079", + "externalIds": {"MAG": "230953153", "CorpusId": 140372811}, "corpusId": 140372811, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f18349179617d2764010329551835f547ccea079", "title": "What It Takes to Restructure Education.", "abstract": "F ive years ago the word restructur ing was unheard of in education circles; today it is heard every where That few educators share a definition of restructuring @@ -43064,242 +48816,14 @@ interactions: past, reforms have tried to change one piece at a time in a system of many interlocking pieces Restruc turing, however, tackles all the pieces", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": 51, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Educational Leadership", "pages": "11-15", "volume": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Educational Leadership", "pages": "11-15", "volume": "48"}, "authors": [{"authorId": "113868076", "name": "Jane L. David"}]}, {"paperId": - "5c8fc284917ba838caed22d0c0b80d5137d27785", "externalIds": {"MAG": "2100200605", - "DOI": "10.1107/S0365110X64002304", "CorpusId": 97637572}, "url": "https://www.semanticscholar.org/paper/5c8fc284917ba838caed22d0c0b80d5137d27785", - "title": "On the crystal chemistry of salt hydrates. II. A neutron diffraction - study of MgSO4.4H2O", "abstract": "The crystal s t ruc ture of MgSO 4. 4H~O - has been refined, single-crystM neu t ron diffraction da ta for the three - main zones being used. The hydrogen positions which were found are essentially - those which have been deduced from Xray da ta in an earlier invest igat ion - (Baur, 1962). The mean value of the Ow-I-I bond lengths is 0.97/~. The Ow-H-O - bonds are bent considerably. One hydrogen atom does not participate in hydrogen - bonding, as can be concluded from the geometry of its surroundings and its - thermal motion.", "venue": "", "year": 1964, "referenceCount": 0, "citationCount": - 58, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1964-07-10", "journal": {"name": "Acta Crystallographica", - "pages": "863-869", "volume": "17"}, "authors": [{"authorId": "50499516", - "name": "W. H. Baur"}]}, {"paperId": "db3d471ef2df6d1405bd2ab88093b54d3c8a49e4", - "externalIds": {"MAG": "2041161071", "DOI": "10.1016/S0167-2789(03)00286-0", - "CorpusId": 121367970}, "url": "https://www.semanticscholar.org/paper/db3d471ef2df6d1405bd2ab88093b54d3c8a49e4", - "title": "Turing patterns with O(3) symmetry", "abstract": null, "venue": - "", "year": 2004, "referenceCount": 23, "citationCount": 18, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-01-15", - "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": "65-91", "volume": - "188"}, "authors": [{"authorId": "144396989", "name": "T. K. Callahan"}]}, - {"paperId": "de837f4060e4bee5c76761fcf7b175ce180b8c20", "externalIds": {"MAG": - "2077373276", "DBLP": "journals/nature/Cooper12", "DOI": "10.1038/482465a", - "CorpusId": 13277688, "PubMed": "22358814"}, "url": "https://www.semanticscholar.org/paper/de837f4060e4bee5c76761fcf7b175ce180b8c20", - "title": "Turing centenary: The incomputable reality", "abstract": null, "venue": - "Nature", "year": 2012, "referenceCount": 2, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-02-22", "journal": {"name": "Nature", "pages": "465-465", "volume": - "482"}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": - "ea6d79863301c664911b676fb5f1327afcf85f8e", "externalIds": {"MAG": "2145023581", - "DOI": "10.1177/0739456X8300300105", "CorpusId": 145521732}, "url": "https://www.semanticscholar.org/paper/ea6d79863301c664911b676fb5f1327afcf85f8e", - "title": "Planning Theory and Practice: Bridging the Gap", "abstract": "There - is increasing evidence that plan ning theory has been inadequate in recent - years. Not only does it fail to guide prac tice, it contributes to cognitive - dissonance and alienation among practitioners. Plan ning schools agree on - no body of litera ture and ideas to count as planning theory. Planning is - like a paradigm \"in crisis,\" in that theory does not mesh with experience. - Moreover, neither of the two main candidates for the prime exemplar for planning - practice\u2014the master plan model or the policy analysis model \u2014 is - acceptable enough to provide coherence to the field", "venue": "", "year": - 1983, "referenceCount": 13, "citationCount": 59, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1983-07-01", - "journal": {"name": "Journal of Planning Education and Research", "pages": - "35-45", "volume": "3"}, "authors": [{"authorId": "115924487", "name": "J. - I. Neufville"}]}, {"paperId": "e5f580e6520062b5d7815e4a61e076986063bb3a", - "externalIds": {"MAG": "2593880743", "DOI": "10.1093/oso/9780198747826.001.0001", - "CorpusId": 64481721}, "url": "https://www.semanticscholar.org/paper/e5f580e6520062b5d7815e4a61e076986063bb3a", - "title": "The Turing Guide", "abstract": "This volume will bring together - contributions from some of the leading experts on Alan Turing to create a - comprehensive guide to Turing that will serve as a useful resource for researchers - in the area as well as the increasingly interested ...", "venue": "", "year": - 2017, "referenceCount": 0, "citationCount": 10, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "118975427", "name": "J. Copeland"}, {"authorId": "1772040", - "name": "Jonathan P. Bowen"}, {"authorId": "3075367", "name": "Mark D. Sprevak"}, - {"authorId": "2109033245", "name": "Robin J. Wilson"}]}, {"paperId": "d899d6037f2a6aed2fb31a9252e27eab5d05dca8", - "externalIds": {"DBLP": "conf/rv/NenziBCLM15", "MAG": "1705718777", "DOI": - "10.1007/978-3-319-23820-3_2", "CorpusId": 21117684}, "url": "https://www.semanticscholar.org/paper/d899d6037f2a6aed2fb31a9252e27eab5d05dca8", - "title": "Qualitative and Quantitative Monitoring of Spatio-Temporal Properties", - "abstract": null, "venue": "Runtime Verification", "year": 2015, "referenceCount": - 18, "citationCount": 60, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "21-37"}, "authors": [{"authorId": "3338419", "name": - "L. Nenzi"}, {"authorId": "1774460", "name": "L. Bortolussi"}, {"authorId": - "2396743", "name": "V. Ciancia"}, {"authorId": "145629837", "name": "M. Loreti"}, - {"authorId": "1807074", "name": "M. Massink"}]}, {"paperId": "8d6cf4d421e9cecc1dbe0eb2b0f7571fcfd84aff", - "externalIds": {"DBLP": "conf/mfcs/Jung81", "MAG": "175900084", "DOI": "10.1007/3-540-10856-4_101", - "CorpusId": 22530003}, "url": "https://www.semanticscholar.org/paper/8d6cf4d421e9cecc1dbe0eb2b0f7571fcfd84aff", - "title": "Relationships between Probabilistic and Deterministic Tape Complexity", - "abstract": null, "venue": "International Symposium on Mathematical Foundations - of Computer Science", "year": 1981, "referenceCount": 4, "citationCount": - 33, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1981-08-31", "journal": - {"pages": "339-346"}, "authors": [{"authorId": "103166893", "name": "H. Jung"}]}, - {"paperId": "1e5c2431a7c40cc444c333b9af3628966c39cd02", "externalIds": {"MAG": - "1965679729", "DOI": "10.1103/PHYSREVE.76.011916", "CorpusId": 16271835, "PubMed": - "17677503"}, "url": "https://www.semanticscholar.org/paper/1e5c2431a7c40cc444c333b9af3628966c39cd02", - "title": "Gap junctions mediate large-scale Turing structures in a mean-field - cortex driven by subcortical noise.", "abstract": "One of the grand puzzles - in neuroscience is establishing the link between cognition and the disparate - patterns of spontaneous and task-induced brain activity that can be measured - clinically using a wide range of detection modalities such as scalp electrodes - and imaging tomography. High-level brain function is not a single-neuron property, - yet emerges as a cooperative phenomenon of multiply-interacting populations - of neurons. Therefore a fruitful modeling approach is to picture the cerebral - cortex as a continuum characterized by parameters that have been averaged - over a small volume of cortical tissue. Such mean-field cortical models have - been used to investigate gross patterns of brain behavior such as anesthesia, - the cycles of natural sleep, memory and erasure in slow-wave sleep, and epilepsy. - There is persuasive and accumulating evidence that direct gap-junction connections - between inhibitory neurons promote synchronous oscillatory behavior both locally - and across distances of some centimeters, but, to date, continuum models have - ignored gap-junction connectivity. In this paper we employ simple mean-field - arguments to derive an expression for D2, the diffusive coupling strength - arising from gap-junction connections between inhibitory neurons. Using recent - neurophysiological measurements reported by Fukuda [J. Neurosci. 26, 3434 - (2006)], we estimate an upper limit of D2 approximately 0.6cm2. We apply a - linear stability analysis to a standard mean-field cortical model, augmented - with gap-junction diffusion, and find this value for the diffusive coupling - strength to be close to the critical value required to destabilize the homogeneous - steady state. Computer simulations demonstrate that larger values of D2 cause - the noise-driven model cortex to spontaneously crystalize into random mazelike - Turing structures: centimeter-scale spatial patterns in which regions of high-firing - activity are intermixed with regions of low-firing activity. These structures - are consistent with the spatial variations in brain activity patterns detected - with the BOLD (blood oxygen-level-dependent) signal detected with magnetic - resonance imaging, and may provide a natural substrate for synchronous gamma-band - rhythms observed across separated EEG (electroencephalogram) electrodes.", - "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "year": 2007, "referenceCount": 63, "citationCount": 46, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-07-24", "journal": {"name": "Physical - review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 011916\n ", - "volume": "76 1 Pt 1"}, "authors": [{"authorId": "1403384168", "name": "M. - Steyn-Ross"}, {"authorId": "1401041315", "name": "D. Steyn-Ross"}, {"authorId": - "2107699591", "name": "M. Wilson"}, {"authorId": "2328872", "name": "J. Sleigh"}]}, - {"paperId": "03945ff8fdbdf2f59297f6c313b357cb79ad405f", "externalIds": {"MAG": - "1979890289", "DOI": "10.1103/PHYSREVE.73.056209", "CorpusId": 22719074, "PubMed": - "16803028"}, "url": "https://www.semanticscholar.org/paper/03945ff8fdbdf2f59297f6c313b357cb79ad405f", - "title": "Regular patterns in dichotomically driven activator-inhibitor dynamics.", - "abstract": "We investigate Turing pattern formation in the presence of additive - dichotomous fluctuations in the context of an extended system with diffusive - coupling and FitzHugh-Nagumo kinetics. The fluctuations vary in space and/or - time. Depending on the realization of the dichotomous switching the system - is, at a given time (for spatial disorder at a given position) in one of two - possible excitable dynamical regimes. Each of the two excitable dynamics for - itself does not support pattern formation. With proper dichotomous fluctuations, - however, the homogeneous steady state is destabilized via a Turing instability. - We investigate the influence of different switching rates (different correlation - length of the spatial disorder) on pattern formation. We find three distinct - mechanisms: For slow switching existing boundaries become unstable, for high - rates the system exhibits \"effective bistability\" which allows for a Turing - instability. For medium rates the fluctuations create spatial structures via - a new mechanism where the influence of the fluctuations is twofold. First - they produce local inhomogeneities, which then grow (again caused by fluctuations) - until the whole space is covered. Utilizing a nonlinear map approach we show - bistability of a period-one and a period-two orbit being associated with the - steady homogeneous and the Turing pattern state, respectively. Finally, for - purely static dichotomous disorder we find destabilization of homogeneous - steady states for finite nonzero correlation length of the disorder resulting - again in Turing patterns.", "venue": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "year": 2006, "referenceCount": 32, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-05-25", "journal": {"name": "Physical review. E, - Statistical, nonlinear, and soft matter physics", "pages": "\n 056209\n ", - "volume": "73 5 Pt 2"}, "authors": [{"authorId": "5903711", "name": "X. Sailer"}, - {"authorId": "1747494", "name": "D. Hennig"}, {"authorId": "48710130", "name": - "V. Beato"}, {"authorId": "38661493", "name": "H. Engel"}, {"authorId": "1400946717", - "name": "L. Schimansky-Geier"}]}, {"paperId": "e14dd8bf4a2d51210137ae2982feb8708ad2fed1", - "externalIds": {"MAG": "204724979", "DOI": "10.1177/070674370104600112", "CorpusId": - 40313274, "PubMed": "11221494"}, "url": "https://www.semanticscholar.org/paper/e14dd8bf4a2d51210137ae2982feb8708ad2fed1", - "title": "Adverse Reactions to St John''s Wort", "abstract": "Objective: To - re port 2 cases of ad verse re ac tions to St John''s wort, a pop u lar herbal - treat ment for de pression. Method: We pres ent 2 case his to ries and re - view the ex ist ing lit er a ture re gard ing St John''s wort. Results: St - John''s wort may cause se ro to nin syn drome in sen si tive pa tients. In - ad di tion, St John''s wort may be as so ci ated with hair loss. Conclusions: - For clin i cal rea sons, it is im por tant to rec og nize and re port ad verse - re ac tions to herbal rem e dies and to doc u ment that these treat ments - have side ef fects com men su rate with their po tent ac tion on brain neurochemistry.", - "venue": "Canadian journal of psychiatry. Revue canadienne de psychiatrie", - "year": 2001, "referenceCount": 27, "citationCount": 106, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport"], - "publicationDate": "2001-02-01", "journal": {"name": "The Canadian Journal - of Psychiatry", "pages": "77 - 79", "volume": "46"}, "authors": [{"authorId": - "113534923", "name": "Vivien Parker"}, {"authorId": "2173163087", "name": - "Al bert HC Wong"}, {"authorId": "2084910868", "name": "H. S. Boon"}, {"authorId": - "3234738", "name": "M. Seeman"}]}, {"paperId": "a8d24b4ad26ead218b1422db10ded290b86f2c2f", - "externalIds": {"MAG": "2139443519", "DOI": "10.2460/JAVMA.2004.224.676", - "CorpusId": 26579831, "PubMed": "15002804"}, "url": "https://www.semanticscholar.org/paper/a8d24b4ad26ead218b1422db10ded290b86f2c2f", - "title": "What can veterinarians learn from studies of physician-patient communication - about veterinarian-client-patient communication?", "abstract": "There is limited - information in the veterinary litera- ture on veterinarian-client-patient - communication, and what is available is predominantly based on expert opin- - ion and anecdotal information, not peer-reviewed scien- tific studies. In - contrast, the human medical communi- cation literature contains a large number - of empirical studies. Thus, a review of research of physician-patient interactions - is a logical starting place to determine what steps veterinary researchers, - educators, and practition- ers could take to investigate and address veterinarian- - client-patient interactions. The purposes of this report were to summarize - recent advances in human medical communication research and education, link - findings in human medical communication research to veterinary medicine, and - provide a rationale for development of communication research and education - programs in vet- erinary medical schools.", "venue": "Journal of the American - Veterinary Medical Association", "year": 2004, "referenceCount": 91, "citationCount": - 104, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "2004-03-01", "journal": {"name": "Journal - of the American Veterinary Medical Association", "pages": "\n 676-84\n ", - "volume": "224 5"}, "authors": [{"authorId": "22862032", "name": "J. Shaw"}, - {"authorId": "6612540", "name": "C. Adams"}, {"authorId": "2415653", "name": - "B. Bonnett"}]}, {"paperId": "648096300f29d3b656dd3fd55541816cee49e7a9", "externalIds": - {"MAG": "2139247686", "DOI": "10.1007/S11467-006-0014-Z", "CorpusId": 121920140}, - "url": "https://www.semanticscholar.org/paper/648096300f29d3b656dd3fd55541816cee49e7a9", - "title": "Chaotic Turing pattern formation in spatiotemporal systems", "abstract": - null, "venue": "", "year": 2006, "referenceCount": 22, "citationCount": 10, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-06-05", - "journal": {"name": "Frontiers of Physics in China", "pages": "204-208", "volume": - "1"}, "authors": [{"authorId": "10768337", "name": "Xiao Jing-Hua"}, {"authorId": - "30931967", "name": "Li Hai-hong"}, {"authorId": "2027576941", "name": "Hu - Gang"}, {"authorId": "77061950", "name": "Yang Jun-zhong"}]}, {"paperId": "5421ad14bd591b226d286661dd9f0a4e3b381f21", "externalIds": {"MAG": "123151477", - "DBLP": "phd/ethos/Shah10", "CorpusId": 35917569}, "url": "https://www.semanticscholar.org/paper/5421ad14bd591b226d286661dd9f0a4e3b381f21", + "DBLP": "phd/ethos/Shah10", "CorpusId": 35917569}, "corpusId": 35917569, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5421ad14bd591b226d286661dd9f0a4e3b381f21", "title": "Deception-detection and machine intelligence in practical Turing tests", "abstract": "Deception-detection is the crux of Turing\u2019s experiment to examine machine thinking conveyed through a capacity to respond with sustained @@ -43325,12 +48849,162 @@ interactions: Turing\u2019s two tests can assist in understanding natural dialogue and mitigate the risk from cybercrime.", "venue": "", "year": 2010, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2010-10-01", "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "2731715", "name": "Huma - Shah"}]}, {"paperId": "9b1a3932042beaa7514d7cbfb80d0d0b50e7cd3a", "externalIds": - {"MAG": "1555195996", "CorpusId": 118839853}, "url": "https://www.semanticscholar.org/paper/9b1a3932042beaa7514d7cbfb80d0d0b50e7cd3a", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2010-10-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "2731715", "name": "Huma Shah"}]}, {"paperId": "7550d7089ae4151f61c3f17e8f1b30bb537c61c6", + "externalIds": {"DBLP": "conf/oodbs/LiskovDS92", "MAG": "1654761628", "CorpusId": + 11585769}, "corpusId": 11585769, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7550d7089ae4151f61c3f17e8f1b30bb537c61c6", + "title": "Distributed Object Management in Thor", "abstract": "Thor is a new + object-oriented database management system (OODBMS), intended to be used in + heterogeneous distributed systems to allow programs written in diierent programming + languages to share objects in a convenient manner. Thor objects are persistent + in spite of failures, are highly likely to be accessible whenever they are + needed, and can be struc-tured to reeect the kinds of information of interest + to users. Thor combines the advantages of the object-oriented approach with + those of database systems: users can store and manipulate objects that capture + the semantics of their applications, and can also access objects via queries. + Thor is an ongoing project, and this paper is a snapshot: we describe our + rst design and a partial implementation of that design. This design is primarily + concerned with issues related to the implementation of an OODBMS as a distributed + system.", "venue": "IWDOM", "year": 1992, "referenceCount": 43, "citationCount": + 109, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "79-91"}, "authors": [{"authorId": "1720373", "name": + "B. Liskov"}, {"authorId": "69380701", "name": "M. Day"}, {"authorId": "1679411", + "name": "L. Shrira"}]}, {"paperId": "57d32f62c76ccca8b10cdfb2a7eb0d8de4c6a656", + "externalIds": {"MAG": "2100652487", "DOI": "10.1557/MRS2008.80", "CorpusId": + 137198170}, "corpusId": 137198170, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/57d32f62c76ccca8b10cdfb2a7eb0d8de4c6a656", + "title": "The Electric Power Grid : Today and Tomorrow", "abstract": "Abcd... + Micropower Abstract In the coming decades, electricity''s share of total global + energy is expected to continue to grow, and more intelligent processes will + be introduced into the electric power delivery (transmission and distribution) + networks. It is envisioned that the electric power grid will move from an + electrome- chanically controlled system to an electronically controlled network + in the next two decades. A key challenge is how to redesign, retrofit, and + upgrade the existing electromechanically controlled sys - tem into a smart + self-healing grid that is driven by a well-designed market approach. Revolutionary + developments in both information technology and materials science and engineering + promise sig- nificant improvements in the security, reliability, efficiency, + and cost effectiveness of electric power delivery systems. Focus areas in + materials and devices include sensors, smart materials and struc- tures, microfabrication, + nanotechnology, advanced materials, and smart devices.", "venue": "", "year": + 2008, "referenceCount": 24, "citationCount": 109, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/D75D0366741B4F24D3DD96F3C7122A6D/S0883769400004929a.pdf/div-class-title-the-electric-power-grid-today-and-tomorrow-div.pdf", + "status": "BRONZE"}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Engineering", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2008-04-01", "journal": {"name": "Mrs Bulletin", "pages": "399-407", "volume": + "33"}, "authors": [{"authorId": "93583217", "name": "M. Amin"}, {"authorId": + "145771666", "name": "J. Stringer"}]}, {"paperId": "4a06489f9e49f11215b8e54c21333d54d597b1cd", + "externalIds": {"MAG": "1965132178", "DOI": "10.1063/1.461860", "CorpusId": + 58907075}, "corpusId": 58907075, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4a06489f9e49f11215b8e54c21333d54d597b1cd", + "title": "Turing patterns visualized by index of refraction variations", "abstract": + "Gel pattern is visualized by the refractive index variations.The fossil patterns + correspond to a spatial variation in the refractive index. (AIP)", "venue": + "", "year": 1992, "referenceCount": 6, "citationCount": 26, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1992-03-01", "journal": {"name": + "Journal of Chemical Physics", "pages": "4048-4049", "volume": "96"}, "authors": + [{"authorId": "2110246847", "name": "K. Lee"}, {"authorId": "38890112", "name": + "W. Mccormick"}, {"authorId": "2421446", "name": "H. Swinney"}, {"authorId": + "5289890", "name": "Z. Noszticzius"}]}, {"paperId": "b14478c33908d4c67206dbc09f149f230b999159", + "externalIds": {"DBLP": "journals/bsl/Shapiro98", "MAG": "2060700159", "DOI": + "10.2307/421032", "CorpusId": 14473266}, "corpusId": 14473266, "publicationVenue": + {"id": "2e016c78-9f89-4c7f-9072-c015f5de55eb", "name": "Bulletin of Symbolic + Logic", "type": "journal", "alternate_names": ["Bull Symb Log", "The Bulletin + of Symbolic Logic"], "issn": "1079-8986", "url": "https://www.math.ucla.edu/~asl/bsltoc.htm", + "alternate_urls": ["https://www.jstor.org/journal/bullsymblogi", "http://journals.cambridge.org/BSL", + "https://www.cambridge.org/core/journals/bulletin-of-symbolic-logic", "http://journals.cambridge.org/action/displayJournal?jid=BSL"]}, + "url": "https://www.semanticscholar.org/paper/b14478c33908d4c67206dbc09f149f230b999159", + "title": "Incompleteness, Mechanism, and Optimism", "abstract": "\u00a71. + Overview. Philosophers and mathematicians have drawn lots of conclusions from + G\u00f6del''s incompleteness theorems, and related results from mathematical + logic. Languages, minds, and machines figure prominently in the discussion. + G\u00f6del''s theorems surely tell us something about these important matters. + But what? A descriptive title for this paper would be \u201cG\u00f6del, Lucas, + Penrose, Turing, Feferman, Dummett, mechanism, optimism, reflection, and indefinite + extensibility\u201d. Adding \u201cGod and the Devil\u201d would probably be + redundant. Despite the breath-taking, whirlwind tour, I have the modest aim + of forging connections between different parts of this literature and clearing + up some confusions, together with the less modest aim of not introducing any + more confusions. I propose to focus on three spheres within the literature + on incompleteness. The first, and primary, one concerns arguments that G\u00f6del''s + theorem refutes the mechanistic thesis that the human mind is, or can be accurately + modeled as, a digital computer or a Turing machine. The most famous instance + is the much reprinted J. R. Lucas [18]. To summarize, suppose that a mechanist + provides plans for a machine, M, and claims that the output of M consists + of all and only the arithmetic truths that a human (like Lucas), or the totality + of human mathematicians, will ever or can ever know. We assume that the output + of M is consistent.", "venue": "Bulletin of Symbolic Logic", "year": 1998, + "referenceCount": 52, "citationCount": 51, "influentialCitationCount": 4, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Philosophy"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Philosophy", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "1998-09-01", "journal": {"name": "Bulletin + of Symbolic Logic", "pages": "273 - 302", "volume": "4"}, "authors": [{"authorId": + "145144322", "name": "S. Shapiro"}]}, {"paperId": "97afc19c89e6e1d0da217cc9ab05617d67498242", + "externalIds": {"MAG": "2900747104", "DOI": "10.1063/1.5055711", "CorpusId": + 54562795, "PubMed": "30501205"}, "corpusId": 54562795, "publicationVenue": + {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", "name": "Chaos", "type": "journal", + "issn": "1054-1500", "url": "http://chaos.aip.org/", "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, + "url": "https://www.semanticscholar.org/paper/97afc19c89e6e1d0da217cc9ab05617d67498242", + "title": "Turing-Hopf bifurcation analysis in a superdiffusive predator-prey + model.", "abstract": "The predator-prey model with superdiffusion is investigated + in this paper. Here, the existence of Turing-Hopf bifurcation and the resulting + dynamics are studied. To understand such a degenerate bifurcation in the anomalously + diffusive system, the weakly nonlinear analysis is employed and the amplitude + equations at the Turing-Hopf bifurcation point are obtained. Moreover, by + analyzing the amplitude equations under suitable conditions, the abundant + spatiotemporal dynamics are presented. In addition, to illustrate the theoretical + analysis, some numerical simulations are carried out.", "venue": "Chaos", + "year": 2018, "referenceCount": 24, "citationCount": 16, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine", + "Physics"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2018-11-01", "journal": {"name": "Chaos", "pages": "\n 113118\n ", + "volume": "28 11"}, "authors": [{"authorId": "2108676835", "name": "Biao Liu"}, + {"authorId": "91697488", "name": "R. Wu"}, {"authorId": "30827668", "name": + "Liping Chen"}]}, {"paperId": "5c8fc284917ba838caed22d0c0b80d5137d27785", + "externalIds": {"MAG": "2100200605", "DOI": "10.1107/S0365110X64002304", "CorpusId": + 97637572}, "corpusId": 97637572, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5c8fc284917ba838caed22d0c0b80d5137d27785", + "title": "On the crystal chemistry of salt hydrates. II. A neutron diffraction + study of MgSO4.4H2O", "abstract": "The crystal s t ruc ture of MgSO 4. 4H~O + has been refined, single-crystM neu t ron diffraction da ta for the three + main zones being used. The hydrogen positions which were found are essentially + those which have been deduced from Xray da ta in an earlier invest igat ion + (Baur, 1962). The mean value of the Ow-I-I bond lengths is 0.97/~. The Ow-H-O + bonds are bent considerably. One hydrogen atom does not participate in hydrogen + bonding, as can be concluded from the geometry of its surroundings and its + thermal motion.", "venue": "", "year": 1964, "referenceCount": 0, "citationCount": + 58, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1964-07-10", "journal": {"name": + "Acta Crystallographica", "pages": "863-869", "volume": "17"}, "authors": + [{"authorId": "50499516", "name": "W. H. Baur"}]}, {"paperId": "e5f580e6520062b5d7815e4a61e076986063bb3a", + "externalIds": {"MAG": "2593880743", "DOI": "10.1093/oso/9780198747826.001.0001", + "CorpusId": 64481721}, "corpusId": 64481721, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e5f580e6520062b5d7815e4a61e076986063bb3a", + "title": "The Turing Guide", "abstract": "This volume will bring together + contributions from some of the leading experts on Alan Turing to create a + comprehensive guide to Turing that will serve as a useful resource for researchers + in the area as well as the increasingly interested ...", "venue": "", "year": + 2017, "referenceCount": 0, "citationCount": 10, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "118975427", "name": "J. Copeland"}, {"authorId": "1772040", + "name": "Jonathan P. Bowen"}, {"authorId": "3075367", "name": "Mark D. Sprevak"}, + {"authorId": "2109033245", "name": "Robin J. Wilson"}]}, {"paperId": "9b1a3932042beaa7514d7cbfb80d0d0b50e7cd3a", + "externalIds": {"MAG": "1555195996", "CorpusId": 118839853}, "corpusId": 118839853, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9b1a3932042beaa7514d7cbfb80d0d0b50e7cd3a", "title": "NONDETERMINISTIC TIME AND SPACE COMPLEXITY CLASSES", "abstract": "The marginal utility of the Turing machine computational resources running time and storage space are studied. A technique is developed which, unlike @@ -43349,245 +49023,326 @@ interactions: obtained for Turing machines that accept only languages over a one-letter alphabet. {PB 236-777.AS}", "venue": "", "year": 1974, "referenceCount": 0, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1974-09-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "1704840", "name": "J. Seiferas"}]}, - {"paperId": "d878614586b6e98234c946c3123f2547c6b13d37", "externalIds": {"MAG": - "2007118725", "DOI": "10.1080/00222349808220487", "CorpusId": 109152660}, - "url": "https://www.semanticscholar.org/paper/d878614586b6e98234c946c3123f2547c6b13d37", - "title": "A beginners'' guide to gas-filled proportional detectors with delay - line readout", "abstract": "Abstract A brief introduction to the construction, - operation, and performance of gas-filled proportional detectors with LC delay - line readout is given. Measurements illustrating some of the fundamental physical - principles involved and a method for obtaining accurate response curves for - linear detectors are described. The reaction-diffusion properties of the detection - process are illustrated by Turing patterns that can be observed during homogeneous - irradiation.", "venue": "", "year": 1998, "referenceCount": 22, "citationCount": - 33, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Journal of Macromolecular Science, - Part B", "pages": "463-483", "volume": "37"}, "authors": [{"authorId": "145990089", - "name": "Anca-Maria Petrascu"}, {"authorId": "2053120724", "name": "M. Koch"}, - {"authorId": "3789803", "name": "A. Gabriel"}]}, {"paperId": "642ef04387bc5108e62d5d8346ace19bb3656e2f", - "externalIds": {"MAG": "1964369099", "DOI": "10.3354/AME01329", "CorpusId": - 73609625}, "url": "https://www.semanticscholar.org/paper/642ef04387bc5108e62d5d8346ace19bb3656e2f", - "title": "Allelopathic effects of Alexandrium tamarense on other algae: evidence - from mixed growth experiments.", "abstract": "The effect of 2 strains (Alex2 - and Alex5) of the marine red tide dinoflagellate Alexan- drium tamarense on - 10 other planktonic algal target species common in temperate waters was stud- - ied in mixed growth experiments under nutrient-rich conditions. In a comparative - approach, the 2 strains of A. tamarense, similar in their cellular paralytic - shellfish toxin (PST) content, were selected because of their fundamentally - different lytic potencies. The Alex2 strain clearly affected all target algae - while the Alex5 strain had no negative effect on the growth of any of the - target species during the study period, even though cell concentrations of - Alex5 became very high (2 \u00d7 10 4 cells ml -1 ). As both strains contained - comparable amounts of PST, this confirmed previous suggestions that so far - unidentified compounds are causing the negative effects on other algae. Sensitivity - of the tested algae to Alex2 differed considerably. The growth of some species - was affected at very low Alex2 cell concentrations (<10 2 cells ml -1 ), while - the growth of other algae was not affected until cell concentra- tions exceeded - 10 3 cells ml -1 . While a complete dieoff was the ultimate fate for almost - all target spe- cies when grown in mixed culture with Alex2, Scrippsiella - trochoidea formed temporary cysts, the number of which remained constant during - the course of the experiment. The pH in the mixed cul- tures increased as - the cultures grew dense. This had a substantial effect on Alex5 in the mixed - cul- tures, in which Alex5 eventually died off because the target species - have a higher tolerance to high pH. pH values did not determine the outcome - of the experiments with Alex2 because the adverse effects of Alex2 on the - growth of the other algae was evident before pH values became too high. Lytic - extracellular compounds, which are produced by the large majority of A. tamarense - strains tested so far, clearly have the potential to benefit this dinoflagellate - by reducing competitor growth rates.", "venue": "", "year": 2009, "referenceCount": - 32, "citationCount": 77, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2009-09-18", "journal": {"name": - "Aquatic Microbial Ecology", "pages": "101-112", "volume": "57"}, "authors": - [{"authorId": "2062457", "name": "U. Tillmann"}, {"authorId": "34628048", - "name": "P. J. Hansen"}]}, {"paperId": "42a261a4477fa96dfe4d04f7bcb1ac2043c6449f", - "externalIds": {"MAG": "2108955071", "DOI": "10.1007/S11587-016-0267-Y", "CorpusId": - 122603444}, "url": "https://www.semanticscholar.org/paper/42a261a4477fa96dfe4d04f7bcb1ac2043c6449f", - "title": "Super-critical and sub-critical bifurcations in a reaction-diffusion - Schnakenberg model with linear cross-diffusion", "abstract": null, "venue": - "", "year": 2016, "referenceCount": 54, "citationCount": 22, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2016-04-01", "journal": {"name": - "Ricerche di Matematica", "pages": "449-467", "volume": "65"}, "authors": - [{"authorId": "143670670", "name": "G. Gambino"}, {"authorId": "3106418", - "name": "M. Lombardo"}, {"authorId": "153569740", "name": "S. Lupo"}, {"authorId": - "37823401", "name": "M. Sammartino"}]}, {"paperId": "10e44bced88809faeff9ca897e501647f88a8bea", - "externalIds": {"DBLP": "conf/stacs/Sauerhoff98", "MAG": "1608148480", "DOI": - "10.1007/BFb0028553", "CorpusId": 1473283}, "url": "https://www.semanticscholar.org/paper/10e44bced88809faeff9ca897e501647f88a8bea", - "title": "Lower Bounds for Randomized Read-k-Times Branching Programs (Extended - Abstract)", "abstract": null, "venue": "Symposium on Theoretical Aspects of - Computer Science", "year": 1998, "referenceCount": 32, "citationCount": 25, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1998-02-25", "journal": {"pages": "105-115"}, - "authors": [{"authorId": "1786034", "name": "Martin Sauerhoff"}]}, {"paperId": - "438f2e39fff9cd259f7002013284250ead919cc0", "externalIds": {"MAG": "1544173868", - "DBLP": "conf/dlt/Hirvensalo08", "DOI": "10.1007/978-3-540-85780-8_2", "CorpusId": - 31594817}, "url": "https://www.semanticscholar.org/paper/438f2e39fff9cd259f7002013284250ead919cc0", + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1974-09-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1704840", "name": "J. Seiferas"}]}, {"paperId": "9eb349e04209fdcba08f5e2f620b1a75c14cd60e", + "externalIds": {"MAG": "2040935848", "DOI": "10.1007/S11467-009-0009-7", "CorpusId": + 121723279}, "corpusId": 121723279, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9eb349e04209fdcba08f5e2f620b1a75c14cd60e", + "title": "Oscillation death in coupled oscillators", "abstract": null, "venue": + "", "year": 2009, "referenceCount": 45, "citationCount": 29, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2009-10-08", "journal": {"name": "Frontiers of Physics in China", "pages": + "97-110", "volume": "4"}, "authors": [{"authorId": "2057328578", "name": "W. + Zou"}, {"authorId": "2026590208", "name": "Xingang Wang"}, {"authorId": "2110560468", + "name": "Qi Zhao"}, {"authorId": "144616247", "name": "M. Zhan"}]}, {"paperId": + "594d2744cf9d544341bafec01a4351de1ebfcaff", "externalIds": {"MAG": "2127760679", + "DOI": "10.1093/JXB/19.3.435", "CorpusId": 86030306}, "corpusId": 86030306, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/594d2744cf9d544341bafec01a4351de1ebfcaff", + "title": "Inductive Responses of Alcohol and Malic Dehydrogenases in Relation + to Flooding Tolerance in Roots", "abstract": "The levels of alcohol dehydrogenase + and malic dehydrogenase activity were investigated in the roots of various + species grown for several days, in aerated and non-aerated culture solutions. + The activity of these enzymes in non-aerated cul tures increased but only + in those species previously found to be intolerant of experimental flooding. + The induction of alcohol dehydrogenase was reversible. Physiological concentrations + of acetaldehyde induced alcohol dehydrogenase activity, this induction being + greatest in the species intolerant of flooding. It is suggested that the ineffectiveness + of the inductive stimulus in the plants tolerant of flooding contributes to + their homeostatic survival properties under high water table conditions.", + "venue": "", "year": 1968, "referenceCount": 14, "citationCount": 59, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1968-08-01", "journal": {"name": "Journal of Experimental + Botany", "pages": "435-441", "volume": "19"}, "authors": [{"authorId": "40273643", + "name": "R. Crawford"}, {"authorId": "90810485", "name": "M. Mcmanmon"}]}, + {"paperId": "648096300f29d3b656dd3fd55541816cee49e7a9", "externalIds": {"MAG": + "2139247686", "DOI": "10.1007/S11467-006-0014-Z", "CorpusId": 121920140}, + "corpusId": 121920140, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/648096300f29d3b656dd3fd55541816cee49e7a9", + "title": "Chaotic Turing pattern formation in spatiotemporal systems", "abstract": + null, "venue": "", "year": 2006, "referenceCount": 22, "citationCount": 10, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2006-06-05", "journal": {"name": "Frontiers of Physics + in China", "pages": "204-208", "volume": "1"}, "authors": [{"authorId": "10768337", + "name": "Xiao Jing-Hua"}, {"authorId": "30931967", "name": "Li Hai-hong"}, + {"authorId": "2027576941", "name": "Hu Gang"}, {"authorId": "77061950", "name": + "Yang Jun-zhong"}]}, {"paperId": "438f2e39fff9cd259f7002013284250ead919cc0", + "externalIds": {"MAG": "1544173868", "DBLP": "conf/dlt/Hirvensalo08", "DOI": + "10.1007/978-3-540-85780-8_2", "CorpusId": 31594817}, "corpusId": 31594817, + "publicationVenue": {"id": "5b0ac34b-3973-4709-8a86-3fce44bc91f6", "name": + "International Conference on Developments in Language Theory", "type": "conference", + "alternate_names": ["Symp Distrib Ledger Technol", "Symposium Distributed + Ledger Technology", "Int Conf Dev Lang Theory", "Developments in Language + Theory", "Dev Lang Theory", "DLT"], "url": "http://www.wikicfp.com/cfp/program?id=731"}, + "url": "https://www.semanticscholar.org/paper/438f2e39fff9cd259f7002013284250ead919cc0", "title": "Various Aspects of Finite Quantum Automata", "abstract": null, "venue": "International Conference on Developments in Language Theory", "year": 2008, "referenceCount": 38, "citationCount": 42, "influentialCitationCount": 4, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2008-09-16", "journal": {"pages": "21-33"}, "authors": - [{"authorId": "1775995", "name": "M. Hirvensalo"}]}, {"paperId": "e272fbec3a475ab76ff5948c00c56d29098e9769", - "externalIds": {"MAG": "2727423609", "DBLP": "conf/wollic/AckermanF17", "DOI": - "10.1007/978-3-662-55386-2_1", "CorpusId": 26436591}, "url": "https://www.semanticscholar.org/paper/e272fbec3a475ab76ff5948c00c56d29098e9769", - "title": "Graph Turing Machines", "abstract": null, "venue": "Workshop on - Logic, Language, Information and Computation", "year": 2017, "referenceCount": - 20, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2017-07-18", "journal": {"pages": "1-13"}, "authors": [{"authorId": "12590101", - "name": "N. Ackerman"}, {"authorId": "3337217", "name": "Cameron E. Freer"}]}, - {"paperId": "9eb349e04209fdcba08f5e2f620b1a75c14cd60e", "externalIds": {"MAG": - "2040935848", "DOI": "10.1007/S11467-009-0009-7", "CorpusId": 121723279}, - "url": "https://www.semanticscholar.org/paper/9eb349e04209fdcba08f5e2f620b1a75c14cd60e", - "title": "Oscillation death in coupled oscillators", "abstract": null, "venue": - "", "year": 2009, "referenceCount": 45, "citationCount": 29, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-10-08", - "journal": {"name": "Frontiers of Physics in China", "pages": "97-110", "volume": - "4"}, "authors": [{"authorId": "2057328578", "name": "W. Zou"}, {"authorId": - "2026590208", "name": "Xingang Wang"}, {"authorId": "2110560468", "name": - "Qi Zhao"}, {"authorId": "144616247", "name": "M. Zhan"}]}, {"paperId": "66e118ac88f9765a8f18b16478c9d01bd313224e", - "externalIds": {"PubMedCentral": "6416241", "MAG": "2865984904", "DOI": "10.2174/1573396314666180712114531", - "CorpusId": 51620343, "PubMed": "29998808"}, "url": "https://www.semanticscholar.org/paper/66e118ac88f9765a8f18b16478c9d01bd313224e", - "title": "Neonatal and Long-Term Consequences of Fetal Growth Restriction", - "abstract": "Background: Fetal Growth Restriction (FGR) is one of the most - common noxious ante-natal conditions in humans, inducing a substantial proportion - of preterm delivery and leading to a si-gnificant increase in perinatal mortality, - neurological handicaps and chronic diseases in adulthood. This review summarizes - the current knowledge about the postnatal consequences of FGR, with a par-ticular - emphasis on the long-term consequences on respiratory, cardiovascular and - neurological struc-tures and functions. Result and Conclusion: FGR represents - a global health challenge, and efforts are urgently needed to improve our - understanding of the critical factors leading to FGR and subsequent insults - to the deve-loping organs.", "venue": "Current pediatric reviews", "year": - 2018, "referenceCount": 128, "citationCount": 59, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2018-10-31", "journal": {"name": "Current Pediatric Reviews", - "pages": "212 - 218", "volume": "14"}, "authors": [{"authorId": "47869761", - "name": "M. Colella"}, {"authorId": "6755681", "name": "Alice Fr\u00e9rot"}, - {"authorId": "7629828", "name": "A. R. B. Novais"}, {"authorId": "144552161", - "name": "O. Baud"}]}, {"paperId": "9411c527c30ace8bef33e7c1a536c32591e2313d", - "externalIds": {"MAG": "1555190167", "DBLP": "conf/hybrid/HenzingerR00", "DOI": - "10.1007/3-540-46430-1_15", "CorpusId": 6172288}, "url": "https://www.semanticscholar.org/paper/9411c527c30ace8bef33e7c1a536c32591e2313d", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2008-09-16", "journal": + {"pages": "21-33"}, "authors": [{"authorId": "1775995", "name": "M. Hirvensalo"}]}, + {"paperId": "9411c527c30ace8bef33e7c1a536c32591e2313d", "externalIds": {"MAG": + "1555190167", "DBLP": "conf/hybrid/HenzingerR00", "DOI": "10.1007/3-540-46430-1_15", + "CorpusId": 6172288}, "corpusId": 6172288, "publicationVenue": {"id": "aef94f2d-b5c3-4b0e-b84f-8dcf3ea2a151", + "name": "International Conference on Hybrid Systems: Computation and Control", + "type": "conference", "alternate_names": ["ACM Int Conf Hybrid Syst Comput + Control", "Int Conf Hybrid Syst comput control", "International Conference + on Hybrid Systems: computation and control", "ACM International Conference + Hybrid Systems: Computation and Control", "HSCC", "ICHS", "Int Conf Hybrid + Syst Comput Control"], "url": "http://www.wikicfp.com/cfp/program?id=1235"}, + "url": "https://www.semanticscholar.org/paper/9411c527c30ace8bef33e7c1a536c32591e2313d", "title": "Robust Undecidability of Timed and Hybrid Systems", "abstract": null, "venue": "International Conference on Hybrid Systems: Computation and Control", "year": 2000, "referenceCount": 20, "citationCount": 102, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2000-03-23", "journal": + {"pages": "145-159"}, "authors": [{"authorId": "1710285", "name": "T. Henzinger"}, + {"authorId": "1902441", "name": "J. Raskin"}]}, {"paperId": "d899d6037f2a6aed2fb31a9252e27eab5d05dca8", + "externalIds": {"DBLP": "conf/rv/NenziBCLM15", "MAG": "1705718777", "DOI": + "10.1007/978-3-319-23820-3_2", "CorpusId": 21117684}, "corpusId": 21117684, + "publicationVenue": {"id": "a191dbf8-1326-464f-b305-d1f9cbe9eb76", "name": + "Runtime Verification", "type": "conference", "alternate_names": ["RV"], "url": + "http://www.runtime-verification.org/"}, "url": "https://www.semanticscholar.org/paper/d899d6037f2a6aed2fb31a9252e27eab5d05dca8", + "title": "Qualitative and Quantitative Monitoring of Spatio-Temporal Properties", + "abstract": null, "venue": "Runtime Verification", "year": 2015, "referenceCount": + 18, "citationCount": 60, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "https://arts.units.it/bitstream/11368/2856192/1/RV15-post.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-03-23", "journal": {"pages": "145-159"}, "authors": - [{"authorId": "1710285", "name": "T. Henzinger"}, {"authorId": "1902441", - "name": "J. Raskin"}]}, {"paperId": "cb74982f5619f575c3406e5c486532ebd4abed79", - "externalIds": {"MAG": "2274733588", "DOI": "10.1080/02650487.2005.11072906", - "CorpusId": 167718639}, "url": "https://www.semanticscholar.org/paper/cb74982f5619f575c3406e5c486532ebd4abed79", - "title": "Explicit, non-integrated product placement in British television - programmes", "abstract": "The rapid increase in the volume and variety of - product placement approaches has outpaced research in the field. There is - a marked shortage of studies that address particular product placement (pp) - techniques in specified situational contexts. This paper reports the category - of pp known as explicit, non-integrated product placement in the context of - British television programmes. The study used a small convenience sample of - young, mixed-nationality TV viewers who were familiar with the British and - non-British shows on British commercial TV. Their attitudes to and recognition - of pp in this context were explored. The findings are set within a wider-ranging - review of previous research, and suggest important implications for promotional - practice and fu ture research.", "venue": "", "year": 2005, "referenceCount": - 18, "citationCount": 105, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2005-01-01", "journal": - {"name": "International Journal of Advertising", "pages": "111 - 95", "volume": - "24"}, "authors": [{"authorId": "115754690", "name": "Rungpaka Amy Tiwsakul"}, - {"authorId": "10267085", "name": "Chris Hackley"}, {"authorId": "6058351", - "name": "Isabelle Szmigin"}]}, {"paperId": "525b9f410e3ccb466b22a99405c901e86d8615a5", - "externalIds": {"MAG": "2121140357", "DOI": "10.1093/PHILMAT/3.1.86", "CorpusId": - 123119661}, "url": "https://www.semanticscholar.org/paper/525b9f410e3ccb466b22a99405c901e86d8615a5", - "title": "Intuitionists Are Not (Turing) Machines", "abstract": "Lucas and - Penrose have contended that, by displaying how any characterisation of arithmetical - proof programmable into a machine allows of diagonalisation, generating a - humanly recognisable proof which eludes that characterisation, Gddel''s incompleteness - theorem rules out any purely mechanical model of the human intellect. The - main criticisms of this argument have been that the proof generated by diagonalisation - (i) will not be humanly recognisable unless humans can grasp the specification - of the object-system (Benacerraf); and (ii) counts as a proof only on the - (iinproven) hypothesis that the object system is consistent (Putnam). The - present paper argues that criticism (ii) may be met head-on by an intuitionistic - proponent of the anti-mechanist argument; and that criticism (i) is simply - mistaken. However the paper concludes by questioning the sufficiency of the - situation for an interesting anti-mechanist conclusion. u Thanks to Bob Hale, - Stewart Shapiro and Neil Tennant for criticisms of an earlier draft, and to - the participants at the Conference on the philosophy of Michael Dummett held - at Mussomeli, Sicily, in September 1992 at which a version of the principal - argument was presented. Downloaded from https://academic.oup.com/philmat/article-abstract/3/1/86/1508324 - by University of St Andrews user on 21 November 2017", "venue": "", "year": - 1995, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Philosophia Mathematica", "pages": "86-102", "volume": - "3"}, "authors": [{"authorId": "144728712", "name": "C. Wright"}]}, {"paperId": - "74e22072b09aa202a27e093367683ca7d10517e7", "externalIds": {"MAG": "2798487667", - "DOI": "10.2307/2180759", "CorpusId": 65139595}, "url": "https://www.semanticscholar.org/paper/74e22072b09aa202a27e093367683ca7d10517e7", - "title": "Mathematical Logic", "abstract": "Alan Turing There is a strong - tradition in mathematical logic at Manchester. The first logician at Manchester - was Alan Turing, now considered to be the father of artificial intelligence - and one of the great visionaries of the twentieth century. Turing was followed - at Manchester by his former student, Robin Gandy, who made important contributions - to the foundations of proof theory and constructive mathematics. Two of Gandy''s - students have held chairs in at Manchester, Mike Yates (now retired), and - Jeff Paris.", "venue": "", "year": 1965, "referenceCount": 0, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "145260350", "name": "W. Quine"}]}, {"paperId": "a78a15d21f7512883a34f8ffe04091ccb5b64175", - "externalIds": {"MAG": "1592460780", "DBLP": "conf/fossacs/AxelsenG11", "DOI": - "10.1007/978-3-642-19805-2_4", "CorpusId": 43395429}, "url": "https://www.semanticscholar.org/paper/a78a15d21f7512883a34f8ffe04091ccb5b64175", + "publicationDate": null, "journal": {"pages": "21-37"}, "authors": [{"authorId": + "3338419", "name": "L. Nenzi"}, {"authorId": "1774460", "name": "L. Bortolussi"}, + {"authorId": "2396743", "name": "V. Ciancia"}, {"authorId": "145629837", "name": + "M. Loreti"}, {"authorId": "1807074", "name": "M. Massink"}]}, {"paperId": + "e6ee9c596cf17612738a0e80fab2cf04c11cd8e5", "externalIds": {"MAG": "2039891678", + "DOI": "10.2514/1.40461", "CorpusId": 18673661}, "corpusId": 18673661, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e6ee9c596cf17612738a0e80fab2cf04c11cd8e5", + "title": "Modal Analysis of a Nonlinear Periodic Structure with Cyclic Symmetry", + "abstract": "This paper carries out modal analysis of a nonlinear periodic + structure with cyclic symme- \ntry. The nonlinear normal mode (NNM) theory + is brie\u00b0y described, and a computational \nalgorithm for the NNM computation + is presented. The results obtained on a simpli\u00afed \nmodel of a bladed + assembly show that this system possesses a very complicated struc- \nture + of NNMs, including similar and nonsimilar NNMs, nonlocalized and localized + NNMs, \nbifurcating and internally resonant NNMs. Modal interactions that + occur without neces- \nsarily having commensurate natural frequencies in the + underlying linear system are also \ndiscussed.", "venue": "", "year": 2009, + "referenceCount": 39, "citationCount": 60, "influentialCitationCount": 3, + "isOpenAccess": true, "openAccessPdf": {"url": "http://eprints.lincoln.ac.uk/id/eprint/9471/1/NnmsAIAA_v2.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-04-01", + "journal": {"name": "AIAA Journal", "pages": "1014-1025", "volume": "47"}, + "authors": [{"authorId": "122982459", "name": "Fostios Georgiades"}, {"authorId": + "81122228", "name": "M. Peeters"}, {"authorId": "49160435", "name": "G. Kerschen"}, + {"authorId": "2562328", "name": "J. Golinval"}, {"authorId": "31488914", "name": + "M. Ruzzene"}]}, {"paperId": "a78a15d21f7512883a34f8ffe04091ccb5b64175", "externalIds": + {"MAG": "1592460780", "DBLP": "conf/fossacs/AxelsenG11", "DOI": "10.1007/978-3-642-19805-2_4", + "CorpusId": 43395429}, "corpusId": 43395429, "publicationVenue": {"id": "e95f057c-b69a-4fed-b6cf-64d35d3d54d9", + "name": "Foundations of Software Science and Computation Structure", "type": + "conference", "alternate_names": ["Found Softw Sci Comput Struct", "FoSSaCS"], + "url": "http://www.wikicfp.com/cfp/program?id=1079"}, "url": "https://www.semanticscholar.org/paper/a78a15d21f7512883a34f8ffe04091ccb5b64175", "title": "What Do Reversible Programs Compute?", "abstract": null, "venue": "Foundations of Software Science and Computation Structure", "year": 2011, "referenceCount": 29, "citationCount": 49, "influentialCitationCount": 3, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F978-3-642-19805-2_4.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2011-03-26", "journal": {"pages": "42-56"}, "authors": [{"authorId": "1751103", "name": "Holger Bock Axelsen"}, {"authorId": - "1700006", "name": "R. Gl\u00fcck"}]}, {"paperId": "8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", - "externalIds": {"DBLP": "books/cu/p/Hales14", "ArXiv": "1302.2898", "MAG": - "2962739402", "DOI": "10.1017/CBO9781107338579.008", "CorpusId": 37948622}, - "url": "https://www.semanticscholar.org/paper/8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", - "title": "Mathematics in the age of the Turing machine", "abstract": "The - article gives a survey of mathematical proofs that rely on computer calculations - and formal proofs.", "venue": "Turing''s Legacy", "year": 2013, "referenceCount": - 86, "citationCount": 26, "influentialCitationCount": 5, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "1700006", "name": "R. Gl\u00fcck"}]}, {"paperId": "273d7f7cd3f68eeb89248efecd7cbc7b0849286a", + "externalIds": {"MAG": "580400131", "CorpusId": 142312708}, "corpusId": 142312708, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/273d7f7cd3f68eeb89248efecd7cbc7b0849286a", + "title": "Affect and Artificial Intelligence", "abstract": "In 1950, Alan + Turing, the British mathematician, cryptographer, and computer pioneer, looked + to the future: now that the conceptual and technical parameters for electronic + brains had been established, what kind of intelligence could be built? Should + machine intelligence mimic the abstract thinking of a chess player or should + it be more like the developing mind of a child? Should an intelligent agent + only think, or should it also learn, feel, and grow? Affect and Artificial + Intelligence is the first in-depth analysis of affect and intersubjectivity + in the computational sciences. Elizabeth Wilson makes use of archival and + unpublished material from the early years of AI (1945-70) until the present + to show that early researchers were more engaged with questions of emotion + than many commentators have assumed. She documents how affectivity was managed + in the canonical works of Walter Pitts in the 1940s and Turing in the 1950s, + in projects from the 1960s that injected artificial agents into psychotherapeutic + encounters, in chess-playing machines from the 1940s to the present, and in + the Kismet (sociable robotics) project at MIT in the 1990s.", "venue": "", + "year": 2010, "referenceCount": 2, "citationCount": 49, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-08-17", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "120725732", "name": "Elizabeth-Anne L. Wilson"}]}, {"paperId": "13cc70fc2736bb78b8bff847cbcde6497c51af12", + "externalIds": {"MAG": "2017463008", "DOI": "10.1088/1742-5468/2010/11/P11036", + "CorpusId": 121553982}, "corpusId": 121553982, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/13cc70fc2736bb78b8bff847cbcde6497c51af12", + "title": "Pattern selection in a ratio-dependent predator\u2013prey model", + "abstract": "In this paper, we have presented Turing pattern selection in + a ratio-dependent predator\u2013prey model with zero-flux boundary conditions, + for which we have given a general survey of the linear stability analysis + and determined the condition of Turing instability, and derived amplitude + equations for the excited modes. From the amplitude equations, the stability + of patterns towards uniform and inhomogeneous perturbations is determined. + Furthermore, we have presented novel numerical evidence of typical Turing + patterns, and found that the model dynamics exhibits complex pattern replication: + in the range \u03bc1 < \u03bc \u2264 \u03bc2, the steady state is the only + stable solution of the model; in the range \u03bc2 < \u03bc \u2264 \u03bc4, + on increasing the control parameter \u03bc, the sequence H\u03c0-hexagons + -hexagon\u2013stripe mixture stripes -hexagon\u2013stripe mixture -hexagons + is observed; and when \u03bc > \u03bc4, an H0-hexagon\u2013stripe mixture + pattern emerges. This may enrich the pattern formation in a diffusive system.", + "venue": "", "year": 2010, "referenceCount": 55, "citationCount": 19, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2010-11-23", "journal": {"name": "Journal of Statistical Mechanics: Theory + and Experiment", "pages": "P11036", "volume": "2010"}, "authors": [{"authorId": + "2116103578", "name": "Weiming Wang"}, {"authorId": "2027512304", "name": + "Yezhi Lin"}, {"authorId": "48570313", "name": "F. Rao"}, {"authorId": "1720539", + "name": "L. Zhang"}, {"authorId": "1870339", "name": "Yong-ji Tan"}]}, {"paperId": + "ef8875c7d1349cc8d506500e92eb575f0c8659a9", "externalIds": {"DBLP": "conf/stacs/Kummer96", + "MAG": "1497307042", "DOI": "10.1007/3-540-60922-9_3", "CorpusId": 18398890}, + "corpusId": 18398890, "publicationVenue": {"id": "2e8ac273-26de-40d6-9f96-09286b1016f1", + "name": "Symposium on Theoretical Aspects of Computer Science", "type": "conference", + "alternate_names": ["STACS", "Symp Theor Asp Comput Sci"], "url": "http://www.stacs-conf.org/"}, + "url": "https://www.semanticscholar.org/paper/ef8875c7d1349cc8d506500e92eb575f0c8659a9", + "title": "On the Complexity of Random Strings (Extended Abstract)", "abstract": + null, "venue": "Symposium on Theoretical Aspects of Computer Science", "year": + 1996, "referenceCount": 19, "citationCount": 60, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1996-02-22", "journal": {"pages": "25-36"}, "authors": + [{"authorId": "144607616", "name": "M. Kummer"}]}, {"paperId": "5eb03792223067a7cf90343abc98aa55d1c14e0d", + "externalIds": {"MAG": "1505876086", "DBLP": "conf/mfcs/DammH95", "DOI": "10.1007/3-540-60246-1_121", + "CorpusId": 14837273}, "corpusId": 14837273, "publicationVenue": {"id": "8341fde2-3e67-4fde-bb5c-6f0320d7f114", + "name": "International Symposium on Mathematical Foundations of Computer Science", + "type": "conference", "alternate_names": ["Int Symp Math Found Comput Sci", + "MFCS", "Math Found Comput Sci", "Mathematical Foundations of Computer Science"], + "url": "https://en.wikipedia.org/wiki/International_Symposium_on_Mathematical_Foundations_of_Computer_Science"}, + "url": "https://www.semanticscholar.org/paper/5eb03792223067a7cf90343abc98aa55d1c14e0d", + "title": "Automata That Take Advice", "abstract": null, "venue": "International + Symposium on Mathematical Foundations of Computer Science", "year": 1995, + "referenceCount": 19, "citationCount": 33, "influentialCitationCount": 7, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2013-02-12", "journal": - {"pages": "253-298"}, "authors": [{"authorId": "3312697", "name": "T. Hales"}]}, + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1995-08-28", + "journal": {"pages": "149-158"}, "authors": [{"authorId": "145907449", "name": + "C. Damm"}, {"authorId": "3387071", "name": "M. Holzer"}]}, {"paperId": "03945ff8fdbdf2f59297f6c313b357cb79ad405f", + "externalIds": {"MAG": "1979890289", "DOI": "10.1103/PHYSREVE.73.056209", + "CorpusId": 22719074, "PubMed": "16803028"}, "corpusId": 22719074, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/03945ff8fdbdf2f59297f6c313b357cb79ad405f", + "title": "Regular patterns in dichotomically driven activator-inhibitor dynamics.", + "abstract": "We investigate Turing pattern formation in the presence of additive + dichotomous fluctuations in the context of an extended system with diffusive + coupling and FitzHugh-Nagumo kinetics. The fluctuations vary in space and/or + time. Depending on the realization of the dichotomous switching the system + is, at a given time (for spatial disorder at a given position) in one of two + possible excitable dynamical regimes. Each of the two excitable dynamics for + itself does not support pattern formation. With proper dichotomous fluctuations, + however, the homogeneous steady state is destabilized via a Turing instability. + We investigate the influence of different switching rates (different correlation + length of the spatial disorder) on pattern formation. We find three distinct + mechanisms: For slow switching existing boundaries become unstable, for high + rates the system exhibits \"effective bistability\" which allows for a Turing + instability. For medium rates the fluctuations create spatial structures via + a new mechanism where the influence of the fluctuations is twofold. First + they produce local inhomogeneities, which then grow (again caused by fluctuations) + until the whole space is covered. Utilizing a nonlinear map approach we show + bistability of a period-one and a period-two orbit being associated with the + steady homogeneous and the Turing pattern state, respectively. Finally, for + purely static dichotomous disorder we find destabilization of homogeneous + steady states for finite nonzero correlation length of the disorder resulting + again in Turing patterns.", "venue": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "year": 2006, "referenceCount": 32, "citationCount": + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-05-25", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 056209\n ", + "volume": "73 5 Pt 2"}, "authors": [{"authorId": "5903711", "name": "X. Sailer"}, + {"authorId": "1747494", "name": "D. Hennig"}, {"authorId": "48710130", "name": + "V. Beato"}, {"authorId": "38661493", "name": "H. Engel"}, {"authorId": "1400946717", + "name": "L. Schimansky-Geier"}]}, {"paperId": "c99c04a3f73c6d4f222cc8b48921688b410ccb52", + "externalIds": {"MAG": "2132286220", "DOI": "10.1306/703C80E7-1707-11D7-8645000102C1865D", + "CorpusId": 130783626}, "corpusId": 130783626, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c99c04a3f73c6d4f222cc8b48921688b410ccb52", + "title": "Thermal History of Sedimentary Basins, Maturation Indices, and Kinetics + of Oil and Gas Generation", "abstract": "Temperature is the most sensitive + parameter in hydrocarbon generation. Thus, reconstruction of temperature history + is essential when evaluating petroleum prospects. No measurable parameter + can be directly converted to paleotemperature. Maturation indices such as + vitrinite reflectance, Tmax from Rock-Eval pyrolysis, spore coloration, Thermal + Alteration Index (TAI), or concentration of biological markers offer an indirect + approach. All these indices are a function of the thermal history through + rather complex kinetics, frequently influenced by the type of organic matter. + Their significance and validity are reviewed. Besides the problems of identification + (e.g., vitrinite) and interlaboratory calibration, it is important to simultaneously + interpret kerogen type and maturation and to avoid difficult conversions from + one index to another. Geodynamic models, where structural and thermal histories + are connected, are another approach to temper ture reconstruction which could + be calibrated against the present distribution of temperature and the present + value of maturation indices. Kinetics of kerogen decomposition controls the + amount and composition of hydrocarbons generated. An empirical time-temperature + index (TTI), originally introduced by Lopatin, does not allow such a quantitative + evaluation. Due to several limitations (no provision for different types of + kerogen and different rates of reactions, poor calibration on vitrinite reflectance), + it is of limited interest unless one has no access to a desk-top computer. + Kinetic models, based on a specific calibration made on actual source rock + samples, can simulate the evolution of all types of organic matter and can + provide a quantitative evaluation of oil and gas generated. Examples from + the Jurassic source rocks of the Paris basin, Monterey Formation of California, + Green River shales of Utah, Paleozoic source eds of the Algerian Sahara, and + Miocene rocks of the Mahakam Delta, Indonesia, illustrate various aspects + of the discussion. Geological/geochemical models are the most efficient way + to integrate geological, seismic, and geochemical data, and they should greatly + help to reduce the risk in exploration.", "venue": "", "year": 1987, "referenceCount": + 45, "citationCount": 706, "influentialCitationCount": 28, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": + [{"category": "Geology", "source": "external"}, {"category": "Geology", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1987-12-01", + "journal": {"name": "AAPG Bulletin", "pages": "1445-1466", "volume": "71"}, + "authors": [{"authorId": "87173105", "name": "B. Tissot"}, {"authorId": "14517826", + "name": "R. Pelet"}, {"authorId": "47815718", "name": "P. Ungerer"}]}, {"paperId": + "8df25bc010e24356e2d39fcca74f210fb228593c", "externalIds": {"MAG": "1980268869", + "DBLP": "journals/apal/Harizanov98", "DOI": "10.1016/S0168-0072(97)00056-0", + "CorpusId": 8403585}, "corpusId": 8403585, "publicationVenue": {"id": "5db9b91a-29ce-4a4c-a224-e3cf658c4bd1", + "name": "Annals of Pure and Applied Logic", "type": "journal", "alternate_names": + ["Ann Pure Appl Log"], "issn": "0168-0072", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505603/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/annals-of-pure-and-applied-logic", + "http://www.sciencedirect.com/science/journal/01680072"]}, "url": "https://www.semanticscholar.org/paper/8df25bc010e24356e2d39fcca74f210fb228593c", + "title": "Turing Degrees of Certain Isomorphic Images of Computable Relations", + "abstract": null, "venue": "Annals of Pure and Applied Logic", "year": 1998, + "referenceCount": 14, "citationCount": 28, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1998-04-28", "journal": {"name": "Ann. Pure Appl. Log.", "pages": "103-113", + "volume": "93"}, "authors": [{"authorId": "3187833", "name": "V. Harizanov"}]}, {"paperId": "a44714426be51807ba9889e3271abe1599635da9", "externalIds": {"MAG": "1963937381", "DOI": "10.1080/10920277.1998.10595749", "CorpusId": 120189249}, - "url": "https://www.semanticscholar.org/paper/a44714426be51807ba9889e3271abe1599635da9", + "corpusId": 120189249, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a44714426be51807ba9889e3271abe1599635da9", "title": "\u201cUnderstanding Relationships Using Copulas,\u201d by Edward Frees and Emiliano Valdez, January 1998", "abstract": "\"Understanding Relationships Using Copulas,\" by Edward Frees and Emiliano Valdez, January 1998 Mixture @@ -43601,45 +49356,98 @@ interactions: Through its limpid exposition of some of the recent developments in Lemma (Mixture of Exponential Family with a Linear", "venue": "", "year": 1998, "referenceCount": 26, "citationCount": 106, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1998-07-01", "journal": {"name": "The North American Actuarial Journal", - "pages": "143-149", "volume": "2"}, "authors": [{"authorId": "2797628", "name": - "C. Genest"}, {"authorId": "2985238", "name": "K. Ghoudi"}, {"authorId": "3011050", - "name": "L. Rivest"}]}, {"paperId": "1e69495a6f970a4ae76973ff6af51493f26ba4fa", - "externalIds": {"MAG": "2136558397", "DOI": "10.1209/EPL/I2004-10327-X", "CorpusId": - 59158668}, "url": "https://www.semanticscholar.org/paper/1e69495a6f970a4ae76973ff6af51493f26ba4fa", - "title": "Frequency locking in extended systems: The impact of a Turing mode", - "abstract": "A Turing mode in an extended periodically forced oscillatory - system can change the classical resonance boundaries of a single forced oscillator. - Using the normal form equation for forced oscillations, we identify a Hopf-Turing - bifurcation point around which we perform a weak nonlinear analysis. We show - that resonant standing waves can exist outside the 2:1 resonance region of - uniform oscillations, and non-resonant mixed-mode oscillations may prevail - inside the resonance region.", "venue": "", "year": 2005, "referenceCount": - 8, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "EPL", - "pages": "170-176", "volume": "69"}, "authors": [{"authorId": "2850563", "name": - "A. Yochelis"}, {"authorId": "2371015", "name": "C. Elphick"}, {"authorId": - "1890501", "name": "A. Hagberg"}, {"authorId": "2122886", "name": "E. Meron"}]}, - {"paperId": "e8c35f4e3023fc1ecf8bcd3f0ff1c863f1dade8c", "externalIds": {"DBLP": - "conf/isvc/BorgJTK12", "MAG": "2626897350", "DOI": "10.1007/978-3-642-33191-6_30", - "CorpusId": 5619713}, "url": "https://www.semanticscholar.org/paper/e8c35f4e3023fc1ecf8bcd3f0ff1c863f1dade8c", - "title": "Practical Implementation of a Graphics Turing Test", "abstract": - null, "venue": "International Symposium on Visual Computing", "year": 2012, - "referenceCount": 20, "citationCount": 16, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-07-16", "journal": {"pages": "305-313"}, "authors": - [{"authorId": "143980805", "name": "Martin Borg"}, {"authorId": "143702987", - "name": "S. S. Johansen"}, {"authorId": "25438135", "name": "D. L. Thomsen"}, - {"authorId": "143810592", "name": "M. Kraus"}]}, {"paperId": "7b81ea28ca9585c471725a8952c38d1b99f08e0a", + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1998-07-01", "journal": {"name": "The North American Actuarial + Journal", "pages": "143-149", "volume": "2"}, "authors": [{"authorId": "2797628", + "name": "C. Genest"}, {"authorId": "2985238", "name": "K. Ghoudi"}, {"authorId": + "3011050", "name": "L. Rivest"}]}, {"paperId": "82f2b9ce68f3d5343f4d4aa92800406a813bdc99", + "externalIds": {"MAG": "1973663347", "DOI": "10.1088/0951-7715/22/3/006", + "CorpusId": 17800197}, "corpusId": 17800197, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/82f2b9ce68f3d5343f4d4aa92800406a813bdc99", + "title": "Dynamical transitions of Turing patterns", "abstract": "This paper + is concerned with the formation and persistence of spatiotemporal patterns + in binary mixtures of chemically reacting species, where one of the species + is an activator, the other an inhibitor of the chemical reaction. The system + of reaction\u2013diffusion equations is reduced to a finite system of ordinary + differential equations by a variant of the centre-manifold reduction method. + The reduced system fully describes the local dynamics of the original system + near transition points at the onset of instability. The attractor\u2013bifurcation + theory is used to give a complete characterization of the bifurcated objects + in terms of the physical parameters of the problem. The results are illustrated + for the Schnakenberg model.", "venue": "", "year": 2009, "referenceCount": + 55, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.mcs.anl.gov/uploads/cels/papers/P1540.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2009-03-01", "journal": {"name": + "Nonlinearity", "pages": "601 - 626", "volume": "22"}, "authors": [{"authorId": + "68986100", "name": "H. Kaper"}, {"authorId": "153926127", "name": "Shouhong + Wang"}, {"authorId": "3382687", "name": "M. Yari"}]}, {"paperId": "c6b65339cb16927fa65766b6600f345a4d561e63", + "externalIds": {"MAG": "2056809082", "DBLP": "journals/jsyml/DowneyG04", "DOI": + "10.2178/jsl/1082418542", "CorpusId": 11143310}, "corpusId": 11143310, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/c6b65339cb16927fa65766b6600f345a4d561e63", + "title": "Schnorr randomness", "abstract": "Abstract. Schnorr randomness is + a notion of algorithmic randomness for real numbers closely related to Martin-L\u00f6f + randomness. After its initial development in the 1970s the notion received + considerably less attention than Martin-L\u00f6f randomness, but recently + interest has increased in a range of randomness concepts. In this article, + we explore the properties of Schnorr random reals, and in particular the c.e. + Schnorr random reals. We show that there are c.e. reals that are Schnorr random + but not Martin-L\u00f6f random, and provide a new characterization of Schnorr + random real numbers in terms of prefix-free machines. We prove that unlike + Martin-L\u00f6f random c.e. reals, not all Schnorr random c.e. reals are Turing + complete, though all are in high Turing degrees. We use the machine characterization + to define a notion of \u201cSchnorr reducibility\u201d which allows us to + calibrate the Schnorr complexity of reals. We define the class of \u201cSchnorr + trivial\u201d reals, which are ones whose initial segment complexity is identical + with the computable reals, and demonstrate that this class has non-computable + members.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2002, "referenceCount": + 19, "citationCount": 49, "influentialCitationCount": 8, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2002-07-01", "journal": {"name": "Journal + of Symbolic Logic", "pages": "533 - 554", "volume": "69"}, "authors": [{"authorId": + "145948982", "name": "R. Downey"}, {"authorId": "34658155", "name": "Evan + J. Griffiths"}]}, {"paperId": "a8d24b4ad26ead218b1422db10ded290b86f2c2f", + "externalIds": {"MAG": "2139443519", "DOI": "10.2460/JAVMA.2004.224.676", + "CorpusId": 26579831, "PubMed": "15002804"}, "corpusId": 26579831, "publicationVenue": + {"id": "2c1f69ba-dda0-4762-9aaa-ef99479982f5", "name": "Journal of the American + Veterinary Medical Association", "type": "journal", "alternate_names": ["Javma-journal + Am Vet Med Assoc", "Javma-journal of The American Veterinary Medical Association", + "J Am Vet Med Assoc"], "issn": "0003-1488", "alternate_issns": ["1943-569X"], + "url": "https://avmajournals.avma.org/loi/javma"}, "url": "https://www.semanticscholar.org/paper/a8d24b4ad26ead218b1422db10ded290b86f2c2f", + "title": "What can veterinarians learn from studies of physician-patient communication + about veterinarian-client-patient communication?", "abstract": "There is limited + information in the veterinary litera- ture on veterinarian-client-patient + communication, and what is available is predominantly based on expert opin- + ion and anecdotal information, not peer-reviewed scien- tific studies. In + contrast, the human medical communi- cation literature contains a large number + of empirical studies. Thus, a review of research of physician-patient interactions + is a logical starting place to determine what steps veterinary researchers, + educators, and practition- ers could take to investigate and address veterinarian- + client-patient interactions. The purposes of this report were to summarize + recent advances in human medical communication research and education, link + findings in human medical communication research to veterinary medicine, and + provide a rationale for development of communication research and education + programs in vet- erinary medical schools.", "venue": "Journal of the American + Veterinary Medical Association", "year": 2004, "referenceCount": 91, "citationCount": + 104, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "2004-03-01", + "journal": {"name": "Journal of the American Veterinary Medical Association", + "pages": "\n 676-84\n ", "volume": "224 5"}, "authors": [{"authorId": + "22862032", "name": "J. Shaw"}, {"authorId": "6612540", "name": "C. Adams"}, + {"authorId": "2415653", "name": "B. Bonnett"}]}, {"paperId": "7b81ea28ca9585c471725a8952c38d1b99f08e0a", "externalIds": {"MAG": "2152079908", "DOI": "10.2307/3236283", "CorpusId": - 86092103}, "url": "https://www.semanticscholar.org/paper/7b81ea28ca9585c471725a8952c38d1b99f08e0a", + 86092103}, "corpusId": 86092103, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7b81ea28ca9585c471725a8952c38d1b99f08e0a", "title": "Plant functional types and climate in a southern African savanna", "abstract": "A system of easily defined plant functional types for a dry savanna is presented and related to climate data. To predict possible changes of vegetation @@ -43653,178 +49461,63 @@ interactions: precipitation of the wettest month and a mois- ture index (all related to soil moisture) and with temperature of the coldest month.", "venue": "", "year": 1996, "referenceCount": 25, "citationCount": 105, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1996-06-01", "journal": {"name": "Journal of Vegetation Science", "pages": - "397-404", "volume": "7"}, "authors": [{"authorId": "6185287", "name": "C. - Skarpe"}]}, {"paperId": "59fff255d786c2935fd1797abb4bd024ed2bf1ef", "externalIds": - {"MAG": "2016577549", "DBLP": "journals/siamcomp/Seiferas77", "DOI": "10.1137/0206035", - "CorpusId": 207050996}, "url": "https://www.semanticscholar.org/paper/59fff255d786c2935fd1797abb4bd024ed2bf1ef", - "title": "Linear-Time Computation by Nondeterministic Multidimensional Iterative - Arrays", "abstract": "It is shown by simulation that every language accepted - within time $n^d$ by a nondeter-ministic one-dimensional Turing machine is - accepted in linear time by a nondeterministic d-dimensional iterative array. - Conversely, every language accepted in linear time by such an iterative array - is accepted within time $n^{d+1}$ by a nondeterministic one-dimensional Turing - machine. It follows that the class of languages accepted in linear time by - nondeterministic multidimensional iterative arrays is precisely Karp\u2019s - class NP, that nondeterministic $(d + 2)$-dimensional iterative arrays are - more powerful than nondeterministic d-dimensional iterative arrays, and that - nondeterministic two-dimensional iterative arrays are more powerful than the - entire class of nondeterministic multidimensional Turing machines. Related - deterministic results are surveyed and summarized for comparison.", "venue": - "SIAM J. Comput.", "year": 1977, "referenceCount": 0, "citationCount": 18, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1977-09-01", - "journal": {"name": "SIAM J. Comput.", "pages": "487-504", "volume": "6"}, - "authors": [{"authorId": "1704840", "name": "J. Seiferas"}]}, {"paperId": - "47fdec93b996ab2cbdf7a55d8d09036aa46cbdc7", "externalIds": {"MAG": "2062653088", - "DOI": "10.1103/PHYSREVE.62.113", "CorpusId": 2503277, "PubMed": "11088442"}, - "url": "https://www.semanticscholar.org/paper/47fdec93b996ab2cbdf7a55d8d09036aa46cbdc7", - "title": "Non-turing stationary patterns in flow-distributed oscillators with - general diffusion and flow rates", "abstract": "An analytical prediction [P. - Andresen et al., Phys. Rev. E 60, 297 (1999)] and its experimental confirmation - [M. Kaern et al., Phys. Rev. E 60, 3471 (1999)] establish a mechanism for - forming stationary, space-periodic structures in a reactive flow (reaction-diffusion-convection - system) with equal diffusion and flow rates. In this paper we generalize the - analysis to systems with unequal diffusion and flow rates. Interestingly, - stationary waves also exist outside the oscillatory Hopf domain of the batch - system-hence the parameter space in which these structures exist is bigger - than that initially predicted [P. Andresen et al., Phys. Rev. E. 60, 297 (1999)] - (for equal diffusion and flow rates). On the other hand, we find that these - stationary waves exist only for parameter values outside of and up to the - Turing regime. We clarify the nature of the instability in terms of a boundary-forcing - problem, whereby a time-periodic pattern is carried over the whole domain - by the flow while the phase is fixed at the inflow boundary.", "venue": "Physical - review. E, Statistical physics, plasmas, fluids, and related interdisciplinary - topics", "year": 2000, "referenceCount": 0, "citationCount": 44, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2000-07-01", "journal": {"name": "Physical - review. E, Statistical physics, plasmas, fluids, and related interdisciplinary - topics", "pages": "\n 113-9\n ", "volume": "62 1 Pt A"}, "authors": - [{"authorId": "30134087", "name": "Satnoianu"}, {"authorId": "121778916", - "name": "Menzinger"}]}, {"paperId": "d6011ecf3cdfbe838f567ea1e90ef64dffbd3739", - "externalIds": {"MAG": "1574240406", "DOI": "10.1002/J.1551-8833.1963.TB01102.X", - "CorpusId": 109163093}, "url": "https://www.semanticscholar.org/paper/d6011ecf3cdfbe838f567ea1e90ef64dffbd3739", - "title": "Threshold Odors of Organic Chemicals", "abstract": "ture to discover - gaps in the technology.2 Subsequently, recommendations were made for experimental - research to fill these gaps. Phase two, a laboratory study, was devoted to - an evaluation of the various methods of testing for odor in water and the - factors affecting results. The effects on the results reported by a given - odor panel member of other persons present and of the chemicals used, of temperature, - and background odor have been reported.3 The application of the reported results - to laboratory practice in order to determine the threshold", "venue": "", - "year": 1963, "referenceCount": 0, "citationCount": 57, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1963-07-01", - "journal": {"name": "Journal American Water Works Association", "pages": "913-916", - "volume": "55"}, "authors": [{"authorId": "145856603", "name": "R. Baker"}]}, - {"paperId": "4a53535e98ac93e67adeb82474367af3993912d1", "externalIds": {"ArXiv": - "1601.05404", "MAG": "2951348354", "PubMedCentral": "4895380", "DOI": "10.1038/srep27397", - "CorpusId": 256987, "PubMed": "27273339"}, "url": "https://www.semanticscholar.org/paper/4a53535e98ac93e67adeb82474367af3993912d1", - "title": "Pattern Formation on Networks: from Localised Activity to Turing - Patterns", "abstract": null, "venue": "Scientific Reports", "year": 2016, - "referenceCount": 39, "citationCount": 27, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Mathematics", "Computer - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1996-06-01", "journal": {"name": "Journal of Vegetation + Science", "pages": "397-404", "volume": "7"}, "authors": [{"authorId": "6185287", + "name": "C. Skarpe"}]}, {"paperId": "74e22072b09aa202a27e093367683ca7d10517e7", + "externalIds": {"MAG": "2798487667", "DOI": "10.2307/2180759", "CorpusId": + 65139595}, "corpusId": 65139595, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/74e22072b09aa202a27e093367683ca7d10517e7", + "title": "Mathematical Logic", "abstract": "Alan Turing There is a strong + tradition in mathematical logic at Manchester. The first logician at Manchester + was Alan Turing, now considered to be the father of artificial intelligence + and one of the great visionaries of the twentieth century. Turing was followed + at Manchester by his former student, Robin Gandy, who made important contributions + to the foundations of proof theory and constructive mathematics. Two of Gandy''s + students have held chairs in at Manchester, Mike Yates (now retired), and + Jeff Paris.", "venue": "", "year": 1965, "referenceCount": 0, "citationCount": + 13, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "145260350", "name": "W. Quine"}]}, + {"paperId": "0b47043f35a8d5e37e75e0ba31e57e6b7b81a8d4", "externalIds": {"MAG": + "2032890895", "DOI": "10.2307/1478985", "CorpusId": 53378915}, "corpusId": + 53378915, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0b47043f35a8d5e37e75e0ba31e57e6b7b81a8d4", + "title": "Ecohydrological characterization of a groundwater\u2010fed alluvial + floodplain mire", "abstract": "In a small alluvial floodplain depression (21 + ha) of the river Dijle, a selection of 56 characteristic, mainly groundwater-depending + plant species was mapped using a regular 20 by 20 m square cell mapping grid. + In order to understand the spatial distribution of the plant species and their + vegetation types, several environmental variables, in- cluding groundwater + regime, groundwater chemistry, soil tex- ture, soil chemical composition and + management type were measured in detail.", "venue": "", "year": 1999, "referenceCount": + 61, "citationCount": 41, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1999-12-01", "journal": {"name": "Applied Vegetation Science", + "pages": "215-228", "volume": "2"}, "authors": [{"authorId": "26168402", "name": + "P. Becker"}, {"authorId": "1866901", "name": "M. Hermy"}, {"authorId": "11773844", + "name": "J. Butaye"}]}, {"paperId": "10e44bced88809faeff9ca897e501647f88a8bea", + "externalIds": {"DBLP": "conf/stacs/Sauerhoff98", "MAG": "1608148480", "DOI": + "10.1007/BFb0028553", "CorpusId": 1473283}, "corpusId": 1473283, "publicationVenue": + {"id": "2e8ac273-26de-40d6-9f96-09286b1016f1", "name": "Symposium on Theoretical + Aspects of Computer Science", "type": "conference", "alternate_names": ["STACS", + "Symp Theor Asp Comput Sci"], "url": "http://www.stacs-conf.org/"}, "url": + "https://www.semanticscholar.org/paper/10e44bced88809faeff9ca897e501647f88a8bea", + "title": "Lower Bounds for Randomized Read-k-Times Branching Programs (Extended + Abstract)", "abstract": null, "venue": "Symposium on Theoretical Aspects of + Computer Science", "year": 1998, "referenceCount": 32, "citationCount": 25, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-01-20", "journal": - {"name": "Scientific Reports", "volume": "6"}, "authors": [{"authorId": "2484797", - "name": "N. McCullen"}, {"authorId": "153111161", "name": "T. Wagenknecht"}]}, - {"paperId": "d7776fb222c8be8e03954ff928d72f42c2d9048a", "externalIds": {"MAG": - "2049113026", "DOI": "10.1257/AER.99.2.343", "CorpusId": 55969}, "url": "https://www.semanticscholar.org/paper/d7776fb222c8be8e03954ff928d72f42c2d9048a", - "title": "The Empirical Impact of Intellectual Property Rights on Innovation: - Puzzles and Clues", "abstract": "Economists have long seen the patent system - as a crucial lever through which policymak ers affect the speed and nature - of innovation in the economy. It is not surprising, then, that the profound - changes that have roiled the global patent system over the past 25 years are - attract ing increasing attention from the economics profession. A critical - question relates to the impact of these shifts: to what extent do they really - affect the pace of innovative discovery and diffu sion? Much of the theoretical - economics litera ture, such as Richard Gilbert and Carl Shapiro (1990), has - assumed an unambiguous relation ship between the strength of patent protection - and the rate of innovation. This assumption has been relaxed in a line of - work on sequential innovation, beginning with Suzanne Scotchmer and Jerry - Green (1990). This research addresses this question by examining the impact - of major patent policy shifts in 60 nations over the past 150 years. I examine - the changes in patent applications by residents of the nation undertaking - the policy change. While I tabulate domestic filings by residents and nonresidents - alike, confounding factors may influence this measure. Thus, I also examine - filings made by residents of the nation undertaking the policy change in a - nation with a relatively constant patent policy, Great Britain. Much of the - earlier empirical work has focused on understanding the impacts of a sin", - "venue": "", "year": 2009, "referenceCount": 13, "citationCount": 288, "influentialCitationCount": - 26, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-04-01", - "journal": {"name": "The American Economic Review", "pages": "343-348", "volume": - "99"}, "authors": [{"authorId": "2674836", "name": "J. Lerner"}]}, {"paperId": - "1e29fe8ee57b97fd4704cbeb4eaa02fc95fada7a", "externalIds": {"MAG": "2097987409", - "DOI": "10.1016/J.JTBI.2005.10.016", "CorpusId": 18315552, "PubMed": "16364368"}, - "url": "https://www.semanticscholar.org/paper/1e29fe8ee57b97fd4704cbeb4eaa02fc95fada7a", - "title": "Mixed-mode pattern in Doublefoot mutant mouse limb--Turing reaction-diffusion - model on a growing domain during limb development.", "abstract": null, "venue": - "Journal of Theoretical Biology", "year": 2006, "referenceCount": 58, "citationCount": - 102, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-06-21", "journal": {"name": "Journal of theoretical - biology", "pages": "\n 562-73\n ", "volume": "240 4"}, "authors": - [{"authorId": "47938934", "name": "T. Miura"}, {"authorId": "32679518", "name": - "K. Shiota"}, {"authorId": "1402108488", "name": "G. Morriss-Kay"}, {"authorId": - "2339973", "name": "P. Maini"}]}, {"paperId": "b98ddaf22e53211917c0e84a25c48b61e8c1de2f", - "externalIds": {"MAG": "2903571680", "CorpusId": 204444435}, "url": "https://www.semanticscholar.org/paper/b98ddaf22e53211917c0e84a25c48b61e8c1de2f", - "title": "The Book of Why: The New Science of Cause and Effect", "abstract": - "A Turing Award-winning computer scientist and statistician shows how understanding - causality has revolutionized science and will revolutionize artificial intelligence\"Correlation - is not causation.\" This mantra, chanted by scientists for more than a century, - has led to a virtual prohibition on causal talk. Today, that taboo is dead. - The causal revolution, instigated by Judea Pearl and his colleagues, has cut - through a century of confusion and established causality--the study of cause - and effect--on a firm scientific basis. His work explains how we can know - easy things, like whether it was rain or a sprinkler that made a sidewalk - wet; and how to answer hard questions, like whether a drug cured an illness. - Pearl''s work enables us to know not just whether one thing causes another: - it lets us explore the world that is and the worlds that could have been. - It shows us the essence of human thought and key to artificial intelligence. - Anyone who wants to understand either needs The Book of Why.", "venue": "", - "year": 2018, "referenceCount": 0, "citationCount": 292, "influentialCitationCount": - 21, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2018-05-15", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145430701", - "name": "J. Pearl"}, {"authorId": "2082473026", "name": "D. Mackenzie"}]}, - {"paperId": "e90c1c61951813a4000781e94d8a7e219dcf1d0f", "externalIds": {"MAG": - "2116462994", "DOI": "10.1111/j.1525-1470.1992.tb00342.x", "CorpusId": 10078374, - "PubMed": "1488375"}, "url": "https://www.semanticscholar.org/paper/e90c1c61951813a4000781e94d8a7e219dcf1d0f", - "title": "Clinical, Histologic, and Ultrastructural Findings in Two Cases - of Infantile Systemic Hyalinosis", "abstract": "Abstract: Two unrelated infants - had stiff skin and painful joint eontrac\u2010tures in the first few months - of life. Other features included gingival hy\u2010perpiasia, small papules - on the face and trunk, perianal nodules, and bloody diarrhea. Hyatine material - was evident in the papillary dermis and gut mucosa in both patients. Ultrastructural - examination revealed a dis\u2010tinctive fibrillogranuIar appearance. These - infants have the same clinical, histologic, and ultrastructural features as - four infants we reported previ\u2010ously with Infantile systemic hyalinosis. - One of the patients described here demonstrated some features that overlap - with those of juvenile hy\u2010aline fibromatosis.", "venue": "Pediatric dermatology", - "year": 1992, "referenceCount": 17, "citationCount": 58, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport"], - "publicationDate": "1992-09-01", "journal": {"name": "Pediatric Dermatology", - "volume": "9"}, "authors": [{"authorId": "1911002", "name": "M. Glover"}, - {"authorId": "145252807", "name": "B. Lake"}, {"authorId": "2063735596", "name": - "D. Atherton"}]}]} + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1998-02-25", + "journal": {"pages": "105-115"}, "authors": [{"authorId": "1786034", "name": + "Martin Sauerhoff"}]}]} ' headers: @@ -43833,31 +49526,31 @@ interactions: Connection: - keep-alive Content-Length: - - '158331' + - '181698' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:50 GMT + - Tue, 03 Jan 2023 20:53:18 GMT Via: - - 1.1 7fcd30c75fe4480ba8986b43467bfd06.cloudfront.net (CloudFront) + - 1.1 65d621b9501cbb11ca6f34a1af626466.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - dM2H0b5bmbJDp9rtp9HVjTgRz-d8aOm1lk9kJvu_pIMO8xliHbH6zQ== + - cTcCsk7Bb3c6uVcRAD3vW6FI9nYC7O_9nJhK2n546W3Eaa6i8t1vzQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detI_EhuvHcFzzg= + - eLxV0FZTPHcFqQQ= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '158331' + - '181698' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:50 GMT + - Tue, 03 Jan 2023 20:53:18 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - ff43d2cf-20fa-4245-8aa3-33e8975b7489 + - d4b0ebaa-d715-430c-8662-ca7248ea3dc2 status: code: 200 message: OK @@ -43873,64 +49566,112 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2100&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2100&limit=100 response: body: - string: '{"total": 65539, "offset": 2100, "next": 2200, "data": [{"paperId": - "e02d20197a4077f227ddb2207a307ba5b614b8d3", "externalIds": {"MAG": "2137490447", - "ArXiv": "q-bio/0607035", "DOI": "10.1098/rstb.2007.2074", "CorpusId": 9518164, - "PubMed": "17510018"}, "url": "https://www.semanticscholar.org/paper/e02d20197a4077f227ddb2207a307ba5b614b8d3", - "title": "Synthetic Turing protocells: vesicle self-reproduction through symmetry-breaking - instabilities", "abstract": "The reproduction of a living cell requires a - repeatable set of chemical events to be properly coordinated. Such events - define a replication cycle, coupling the growth and shape change of the cell - membrane with internal metabolic reactions. Although the logic of such process - is determined by potentially simple physico-chemical laws, modelling of a - full, self-maintained cell cycle is not trivial. Here we present a novel approach - to the problem that makes use of so-called symmetry breaking instabilities - as the engine of cell growth and division. It is shown that the process occurs - as a consequence of the breaking of spatial symmetry and provides a reliable - mechanism of vesicle growth and reproduction. Our model opens the possibility - of a synthetic protocell lacking information but displaying self-reproduction - under a very simple set of chemical reactions.", "venue": "Philosophical Transactions - of the Royal Society B: Biological Sciences", "year": 2006, "referenceCount": - 55, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Physics", "source": "external"}, + string: '{"total": 65729, "offset": 2100, "next": 2200, "data": [{"paperId": + "de837f4060e4bee5c76761fcf7b175ce180b8c20", "externalIds": {"MAG": "2077373276", + "DBLP": "journals/nature/Cooper12", "DOI": "10.1038/482465a", "CorpusId": + 13277688, "PubMed": "22358814"}, "corpusId": 13277688, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/de837f4060e4bee5c76761fcf7b175ce180b8c20", + "title": "Turing centenary: The incomputable reality", "abstract": null, "venue": + "Nature", "year": 2012, "referenceCount": 2, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/482465a.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-02-22", "journal": + {"name": "Nature", "pages": "465-465", "volume": "482"}, "authors": [{"authorId": + "98630872", "name": "S. Cooper"}]}, {"paperId": "1e5c2431a7c40cc444c333b9af3628966c39cd02", + "externalIds": {"MAG": "1965679729", "DOI": "10.1103/PHYSREVE.76.011916", + "CorpusId": 16271835, "PubMed": "17677503"}, "corpusId": 16271835, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/1e5c2431a7c40cc444c333b9af3628966c39cd02", + "title": "Gap junctions mediate large-scale Turing structures in a mean-field + cortex driven by subcortical noise.", "abstract": "One of the grand puzzles + in neuroscience is establishing the link between cognition and the disparate + patterns of spontaneous and task-induced brain activity that can be measured + clinically using a wide range of detection modalities such as scalp electrodes + and imaging tomography. High-level brain function is not a single-neuron property, + yet emerges as a cooperative phenomenon of multiply-interacting populations + of neurons. Therefore a fruitful modeling approach is to picture the cerebral + cortex as a continuum characterized by parameters that have been averaged + over a small volume of cortical tissue. Such mean-field cortical models have + been used to investigate gross patterns of brain behavior such as anesthesia, + the cycles of natural sleep, memory and erasure in slow-wave sleep, and epilepsy. + There is persuasive and accumulating evidence that direct gap-junction connections + between inhibitory neurons promote synchronous oscillatory behavior both locally + and across distances of some centimeters, but, to date, continuum models have + ignored gap-junction connectivity. In this paper we employ simple mean-field + arguments to derive an expression for D2, the diffusive coupling strength + arising from gap-junction connections between inhibitory neurons. Using recent + neurophysiological measurements reported by Fukuda [J. Neurosci. 26, 3434 + (2006)], we estimate an upper limit of D2 approximately 0.6cm2. We apply a + linear stability analysis to a standard mean-field cortical model, augmented + with gap-junction diffusion, and find this value for the diffusive coupling + strength to be close to the critical value required to destabilize the homogeneous + steady state. Computer simulations demonstrate that larger values of D2 cause + the noise-driven model cortex to spontaneously crystalize into random mazelike + Turing structures: centimeter-scale spatial patterns in which regions of high-firing + activity are intermixed with regions of low-firing activity. These structures + are consistent with the spatial variations in brain activity patterns detected + with the BOLD (blood oxygen-level-dependent) signal detected with magnetic + resonance imaging, and may provide a natural substrate for synchronous gamma-band + rhythms observed across separated EEG (electroencephalogram) electrodes.", + "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", + "year": 2007, "referenceCount": 63, "citationCount": 46, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-07-21", "journal": {"name": "Philosophical Transactions of the Royal - Society B: Biological Sciences", "pages": "1821 - 1829", "volume": "362"}, - "authors": [{"authorId": "145472392", "name": "J. Mac\u00eda"}, {"authorId": - "1706628", "name": "R. Sol\u00e9"}]}, {"paperId": "62b462f8bf2681dacf5f785ee3cd69c6a36b3ea4", - "externalIds": {"MAG": "1968882164", "DOI": "10.3354/CR026175", "CorpusId": - 54904634}, "url": "https://www.semanticscholar.org/paper/62b462f8bf2681dacf5f785ee3cd69c6a36b3ea4", - "title": "Comparison of LARS-WG and AAFC-WG stochastic weather generators - for diverse Canadian climates", "abstract": "Two weather generators\u2014LARS-WG, - developed at Long Ashton Research Station (UK), and AAFC-WG, developed at - Agriculture and Agri-Food Canada \u2014were compared in order to gauge their - capabilities of reproducing probability distributions, means and variances - of observed daily pre- cipitation, maximum temperature and minimum temperature - for diverse Canadian climates. Climatic conditions, such as wet and dry spells, - interannual variability and agroclimatic indices, were also used to assess - the performance of the 2 weather generators. AAFC-WG performed better in simulat- - ing temperature-related statistics, while it did almost as well as LARS-WG - for statistics associated with daily precipitation. Using empirical distributions - in AAFC-WG for daily maximum and minimum temperatures helped to improve the - temperature statistics, especially in cases where local tempera- tures did - not follow normal distributions. However, both weather generators had overdispersion - problems, i.e. they underestimated interannual variability, especially for - temperatures. Overall, AAFC-WG performed better.", "venue": "", "year": 2004, - "referenceCount": 35, "citationCount": 103, "influentialCitationCount": 8, - "isOpenAccess": true, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": - "Geography", "source": "external"}, {"category": "Environmental Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-06-18", - "journal": {"name": "Climate Research", "pages": "175-191", "volume": "26"}, - "authors": [{"authorId": "33949156", "name": "B. Qian"}, {"authorId": "15171070", - "name": "S. Gameda"}, {"authorId": "11540900", "name": "H. Hayhoe"}, {"authorId": - "145702287", "name": "R. D. Jong"}, {"authorId": "78468874", "name": "A. Bootsma"}]}, - {"paperId": "9b1a3932042beaa7514d7cbfb80d0d0b50e7cd3a", "externalIds": {"MAG": - "1555195996", "CorpusId": 118839853}, "url": "https://www.semanticscholar.org/paper/9b1a3932042beaa7514d7cbfb80d0d0b50e7cd3a", + "2007-07-24", "journal": {"name": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "pages": "\n 011916\n ", "volume": + "76 1 Pt 1"}, "authors": [{"authorId": "1403384168", "name": "M. Steyn-Ross"}, + {"authorId": "1401041315", "name": "D. Steyn-Ross"}, {"authorId": "2107699591", + "name": "M. Wilson"}, {"authorId": "2328872", "name": "J. Sleigh"}]}, {"paperId": + "8f4032138c98893988f57ebf909b01372b276e83", "externalIds": {"MAG": "2169524999", + "DOI": "10.1051/0004-6361:20020050", "CorpusId": 41865708}, "corpusId": 41865708, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8f4032138c98893988f57ebf909b01372b276e83", + "title": "Molecular Distributions in the Inner Regions of Protostellar Disks", + "abstract": "The distributions of molecules in the inner regions of a protostellar + disk are presented. These were calculated using an uncoupled chemical/dynamical + model, with a numerical integration of the vertical disk struc- ture. A comparison + between models with and without the eects of X-ray ionisation is made, and + molecules are identied which are good tracers of the ionisation level in this + part of the disk, notably CN and C2H. In the re- gion considered in this paper + (r 10 AU), the chemistry is dominated by the thermal desorption of species + from grains. This shows that a critically important detail in this region + of the disk, as far as molecular distributions are concerned, is the temperature + prole. We nd that not all of the gaseous material is frozen onto grain surfaces + at 10 AU, and we identify species, including some organic molecules, which + should exist in observable quantities in the inner regions of protostellar + disks.", "venue": "", "year": 2002, "referenceCount": 18, "citationCount": + 105, "influentialCitationCount": 11, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.aanda.org/articles/aa/pdf/2002/14/aa1884.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-04-01", "journal": {"name": + "Astronomy and Astrophysics", "pages": "632-646", "volume": "385"}, "authors": + [{"authorId": "48041664", "name": "A. Markwick"}, {"authorId": "91516447", + "name": "M. Ilgner"}, {"authorId": "49837448", "name": "T. Millar"}, {"authorId": + "144128843", "name": "T. Henning"}]}, {"paperId": "10e44bced88809faeff9ca897e501647f88a8bea", + "externalIds": {"DBLP": "conf/stacs/Sauerhoff98", "MAG": "1608148480", "DOI": + "10.1007/BFb0028553", "CorpusId": 1473283}, "corpusId": 1473283, "publicationVenue": + {"id": "2e8ac273-26de-40d6-9f96-09286b1016f1", "name": "Symposium on Theoretical + Aspects of Computer Science", "type": "conference", "alternate_names": ["STACS", + "Symp Theor Asp Comput Sci"], "url": "http://www.stacs-conf.org/"}, "url": + "https://www.semanticscholar.org/paper/10e44bced88809faeff9ca897e501647f88a8bea", + "title": "Lower Bounds for Randomized Read-k-Times Branching Programs (Extended + Abstract)", "abstract": null, "venue": "Symposium on Theoretical Aspects of + Computer Science", "year": 1998, "referenceCount": 32, "citationCount": 25, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1998-02-25", + "journal": {"pages": "105-115"}, "authors": [{"authorId": "1786034", "name": + "Martin Sauerhoff"}]}, {"paperId": "9b1a3932042beaa7514d7cbfb80d0d0b50e7cd3a", + "externalIds": {"MAG": "1555195996", "CorpusId": 118839853}, "corpusId": 118839853, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9b1a3932042beaa7514d7cbfb80d0d0b50e7cd3a", "title": "NONDETERMINISTIC TIME AND SPACE COMPLEXITY CLASSES", "abstract": "The marginal utility of the Turing machine computational resources running time and storage space are studied. A technique is developed which, unlike @@ -43949,359 +49690,242 @@ interactions: obtained for Turing machines that accept only languages over a one-letter alphabet. {PB 236-777.AS}", "venue": "", "year": 1974, "referenceCount": 0, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1974-09-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "1704840", "name": "J. Seiferas"}]}, - {"paperId": "8a18b517cd2fb35cca26ac9fa61a70a4251151bf", "externalIds": {"MAG": - "1840446470", "DBLP": "journals/fuin/ZengZP09", "DOI": "10.3233/FI-2009-200", - "CorpusId": 13307060}, "url": "https://www.semanticscholar.org/paper/8a18b517cd2fb35cca26ac9fa61a70a4251151bf", - "title": "Homogeneous Spiking Neural P Systems", "abstract": "Spiking neural - P systems are a class of distributed parallel computing models inspired from - the way the neurons communicate with each other by means of electrical impulses - (called \"spikes\"). In this paper, we consider a restricted variant of spiking - neural P systems, called homogeneous spiking neural P systems, where each - neuron has the same set of rules. The universality of homogeneous spiking - neural P systems is investigated. One of universality results is that it is - sufficient for homogeneous spiking neural P system to have only one neuron - that behaves nondeterministically in order to achieve Turing completeness.", - "venue": "Fundamenta Informaticae", "year": 2009, "referenceCount": 18, "citationCount": - 58, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Fundam. Informaticae", "pages": "275-294", "volume": "97"}, "authors": - [{"authorId": "2111549943", "name": "Xiangxiang Zeng"}, {"authorId": "2153646899", - "name": "Xingyi Zhang"}, {"authorId": "7356533", "name": "L. Pan"}]}, {"paperId": - "9befe2f5c07b55b6ec3aae6535c38b5329498d1e", "externalIds": {"DBLP": "conf/cie/Davis06", - "MAG": "1506187165", "DOI": "10.1007/11780342_13", "CorpusId": 15689247}, - "url": "https://www.semanticscholar.org/paper/9befe2f5c07b55b6ec3aae6535c38b5329498d1e", - "title": "The Church-Turing Thesis: Consensus and Opposition", "abstract": - null, "venue": "Conference on Computability in Europe", "year": 2006, "referenceCount": - 31, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1974-09-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1704840", "name": "J. Seiferas"}]}, {"paperId": "e272fbec3a475ab76ff5948c00c56d29098e9769", + "externalIds": {"MAG": "2727423609", "DBLP": "conf/wollic/AckermanF17", "DOI": + "10.1007/978-3-662-55386-2_1", "CorpusId": 26436591}, "corpusId": 26436591, + "publicationVenue": {"id": "92189226-dc95-4ac4-a298-2716351189c6", "name": + "Workshop on Logic, Language, Information and Computation", "type": "conference", + "alternate_names": ["WoLLIC", "Workshop Log Lang Inf Comput"], "url": "http://www.cin.ufpe.br/~wollic"}, + "url": "https://www.semanticscholar.org/paper/e272fbec3a475ab76ff5948c00c56d29098e9769", + "title": "Graph Turing Machines", "abstract": null, "venue": "Workshop on + Logic, Language, Information and Computation", "year": 2017, "referenceCount": + 20, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2017-07-18", "journal": {"pages": "1-13"}, + "authors": [{"authorId": "12590101", "name": "N. Ackerman"}, {"authorId": + "3337217", "name": "Cameron E. Freer"}]}, {"paperId": "d96a361c854c2eaf2c5d2a106ba1f11cd3b44ad0", + "externalIds": {"MAG": "1964702120", "DOI": "10.1177/002248718503600306", + "CorpusId": 143108021}, "corpusId": 143108021, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d96a361c854c2eaf2c5d2a106ba1f11cd3b44ad0", + "title": "Comparing Academic Backgrounds and Career Aspirations of Education + and Non Education Majors", "abstract": "Questions concerning the abilities + and background experiences of prospective teachers dominate the recent professional + litera ture. Book, Freeman and Brousseau shed additional light on this topical + area. A comparison of the academic and social back grounds and the bases for + career decisions of teaching and non- teaching majors at a major university + indicates that students choosing teaching as a career (a) are as academically + competent as their non-teaching counterparts (b) are more concerned about + helping others and (c) are less concerned about salaries.", "venue": "", "year": + 1984, "referenceCount": 1, "citationCount": 57, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1984-07-01", "journal": {"name": "Journal of Teacher Education", "pages": + "27 - 30", "volume": "36"}, "authors": [{"authorId": "30676602", "name": "Cassandra + Book"}, {"authorId": "66414557", "name": "D. Freeman"}, {"authorId": "67331745", + "name": "B. Brousseau"}]}, {"paperId": "d878614586b6e98234c946c3123f2547c6b13d37", + "externalIds": {"MAG": "2007118725", "DOI": "10.1080/00222349808220487", "CorpusId": + 109152660}, "corpusId": 109152660, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d878614586b6e98234c946c3123f2547c6b13d37", + "title": "A beginners'' guide to gas-filled proportional detectors with delay + line readout", "abstract": "Abstract A brief introduction to the construction, + operation, and performance of gas-filled proportional detectors with LC delay + line readout is given. Measurements illustrating some of the fundamental physical + principles involved and a method for obtaining accurate response curves for + linear detectors are described. The reaction-diffusion properties of the detection + process are illustrated by Turing patterns that can be observed during homogeneous + irradiation.", "venue": "", "year": 1998, "referenceCount": 22, "citationCount": + 33, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Journal + of Macromolecular Science, Part B", "pages": "463-483", "volume": "37"}, "authors": + [{"authorId": "145990089", "name": "Anca-Maria Petrascu"}, {"authorId": "2053120724", + "name": "M. Koch"}, {"authorId": "3789803", "name": "A. Gabriel"}]}, {"paperId": + "59fff255d786c2935fd1797abb4bd024ed2bf1ef", "externalIds": {"MAG": "2016577549", + "DBLP": "journals/siamcomp/Seiferas77", "DOI": "10.1137/0206035", "CorpusId": + 207050996}, "corpusId": 207050996, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/59fff255d786c2935fd1797abb4bd024ed2bf1ef", + "title": "Linear-Time Computation by Nondeterministic Multidimensional Iterative + Arrays", "abstract": "It is shown by simulation that every language accepted + within time $n^d$ by a nondeter-ministic one-dimensional Turing machine is + accepted in linear time by a nondeterministic d-dimensional iterative array. + Conversely, every language accepted in linear time by such an iterative array + is accepted within time $n^{d+1}$ by a nondeterministic one-dimensional Turing + machine. It follows that the class of languages accepted in linear time by + nondeterministic multidimensional iterative arrays is precisely Karp\u2019s + class NP, that nondeterministic $(d + 2)$-dimensional iterative arrays are + more powerful than nondeterministic d-dimensional iterative arrays, and that + nondeterministic two-dimensional iterative arrays are more powerful than the + entire class of nondeterministic multidimensional Turing machines. Related + deterministic results are surveyed and summarized for comparison.", "venue": + "SIAM J. Comput.", "year": 1977, "referenceCount": 0, "citationCount": 18, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-06-30", "journal": {"pages": "125-132"}, "authors": [{"authorId": "113641402", - "name": "Martin D. Davis"}]}, {"paperId": "c6b65339cb16927fa65766b6600f345a4d561e63", - "externalIds": {"MAG": "2056809082", "DBLP": "journals/jsyml/DowneyG04", "DOI": - "10.2178/jsl/1082418542", "CorpusId": 11143310}, "url": "https://www.semanticscholar.org/paper/c6b65339cb16927fa65766b6600f345a4d561e63", - "title": "Schnorr randomness", "abstract": "Abstract. Schnorr randomness is - a notion of algorithmic randomness for real numbers closely related to Martin-L\u00f6f - randomness. After its initial development in the 1970s the notion received - considerably less attention than Martin-L\u00f6f randomness, but recently - interest has increased in a range of randomness concepts. In this article, - we explore the properties of Schnorr random reals, and in particular the c.e. - Schnorr random reals. We show that there are c.e. reals that are Schnorr random - but not Martin-L\u00f6f random, and provide a new characterization of Schnorr - random real numbers in terms of prefix-free machines. We prove that unlike - Martin-L\u00f6f random c.e. reals, not all Schnorr random c.e. reals are Turing - complete, though all are in high Turing degrees. We use the machine characterization - to define a notion of \u201cSchnorr reducibility\u201d which allows us to - calibrate the Schnorr complexity of reals. We define the class of \u201cSchnorr - trivial\u201d reals, which are ones whose initial segment complexity is identical - with the computable reals, and demonstrate that this class has non-computable - members.", "venue": "Journal of Symbolic Logic (JSL)", "year": 2002, "referenceCount": - 19, "citationCount": 49, "influentialCitationCount": 8, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2002-07-01", "journal": {"name": "Journal of Symbolic - Logic", "pages": "533 - 554", "volume": "69"}, "authors": [{"authorId": "145948982", - "name": "R. Downey"}, {"authorId": "34658155", "name": "Evan J. Griffiths"}]}, - {"paperId": "47fdec93b996ab2cbdf7a55d8d09036aa46cbdc7", "externalIds": {"MAG": - "2062653088", "DOI": "10.1103/PHYSREVE.62.113", "CorpusId": 2503277, "PubMed": - "11088442"}, "url": "https://www.semanticscholar.org/paper/47fdec93b996ab2cbdf7a55d8d09036aa46cbdc7", - "title": "Non-turing stationary patterns in flow-distributed oscillators with - general diffusion and flow rates", "abstract": "An analytical prediction [P. - Andresen et al., Phys. Rev. E 60, 297 (1999)] and its experimental confirmation - [M. Kaern et al., Phys. Rev. E 60, 3471 (1999)] establish a mechanism for - forming stationary, space-periodic structures in a reactive flow (reaction-diffusion-convection - system) with equal diffusion and flow rates. In this paper we generalize the - analysis to systems with unequal diffusion and flow rates. Interestingly, - stationary waves also exist outside the oscillatory Hopf domain of the batch - system-hence the parameter space in which these structures exist is bigger - than that initially predicted [P. Andresen et al., Phys. Rev. E. 60, 297 (1999)] - (for equal diffusion and flow rates). On the other hand, we find that these - stationary waves exist only for parameter values outside of and up to the - Turing regime. We clarify the nature of the instability in terms of a boundary-forcing - problem, whereby a time-periodic pattern is carried over the whole domain - by the flow while the phase is fixed at the inflow boundary.", "venue": "Physical - review. E, Statistical physics, plasmas, fluids, and related interdisciplinary - topics", "year": 2000, "referenceCount": 0, "citationCount": 44, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2000-07-01", "journal": {"name": "Physical - review. E, Statistical physics, plasmas, fluids, and related interdisciplinary - topics", "pages": "\n 113-9\n ", "volume": "62 1 Pt A"}, "authors": - [{"authorId": "30134087", "name": "Satnoianu"}, {"authorId": "121778916", - "name": "Menzinger"}]}, {"paperId": "273d7f7cd3f68eeb89248efecd7cbc7b0849286a", - "externalIds": {"MAG": "580400131", "CorpusId": 142312708}, "url": "https://www.semanticscholar.org/paper/273d7f7cd3f68eeb89248efecd7cbc7b0849286a", - "title": "Affect and Artificial Intelligence", "abstract": "In 1950, Alan - Turing, the British mathematician, cryptographer, and computer pioneer, looked - to the future: now that the conceptual and technical parameters for electronic - brains had been established, what kind of intelligence could be built? Should - machine intelligence mimic the abstract thinking of a chess player or should - it be more like the developing mind of a child? Should an intelligent agent - only think, or should it also learn, feel, and grow? Affect and Artificial - Intelligence is the first in-depth analysis of affect and intersubjectivity - in the computational sciences. Elizabeth Wilson makes use of archival and - unpublished material from the early years of AI (1945-70) until the present - to show that early researchers were more engaged with questions of emotion - than many commentators have assumed. She documents how affectivity was managed - in the canonical works of Walter Pitts in the 1940s and Turing in the 1950s, - in projects from the 1960s that injected artificial agents into psychotherapeutic - encounters, in chess-playing machines from the 1940s to the present, and in - the Kismet (sociable robotics) project at MIT in the 1990s.", "venue": "", - "year": 2010, "referenceCount": 2, "citationCount": 48, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2010-08-17", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "120725732", - "name": "Elizabeth-Anne L. Wilson"}]}, {"paperId": "b01ae16fea20ec2f75ef31f75b1601ac4cf2fbc5", - "externalIds": {"DBLP": "journals/corr/abs-1207-7148", "MAG": "3098714529", - "ArXiv": "1207.7148", "DOI": "10.4204/EPTCS.88.6", "CorpusId": 2476000}, "url": - "https://www.semanticscholar.org/paper/b01ae16fea20ec2f75ef31f75b1601ac4cf2fbc5", - "title": "A Formalization and Proof of the Extended Church-Turing Thesis -Extended - Abstract-", "abstract": "We prove the Extended Church-Turing Thesis: Every - effective algorithm can be efficiently simulated by a Turing machine. This - is accomplished by emulating an effective algorithm via an abstract state - machine, and simulating such an abstract state machine by a random access - machine, representing data as a minimal term graph.", "venue": "DCM", "year": - 2012, "referenceCount": 35, "citationCount": 14, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "1977-09-01", "journal": {"name": "SIAM J. Comput.", "pages": "487-504", "volume": + "6"}, "authors": [{"authorId": "1704840", "name": "J. Seiferas"}]}, {"paperId": + "cfe2aacde13581d2da12d529bc2155adf98e337a", "externalIds": {"CorpusId": 9292716}, + "corpusId": 9292716, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cfe2aacde13581d2da12d529bc2155adf98e337a", + "title": "Series Recursively Enumerable Reals and Chaitin Numbers", "abstract": + "A real is called recursively enumerable if it can be approximated by an increasing, + recursive sequence of rationals. The halting probability of a universal selfdelimiting + Turing machine (Chaitin''s number, [10]) is a random r.e. real. Solovay''s + [25] -like reals are also random r.e. reals. Solovay showed that any Chaitin + number is -like. In this paper we show that the converse implication is true + as well: any -like real in the unit interval is the halting probability of + a universal self-delimiting Turing machine. Following Solovay [25] and Chaitin + [11] we say that an r.e. real dominates an r.e. real if from a good approximation + of from below one can compute a good approximation of from below. We shall + study this relation and characterize it in terms of relations between r.e. + sets. -like numbers are the maximal r.e. real numbers with respect to this + order, that is, from a good approximation to an -like real one can compute + a good approximation for every r.e. real. This property shows the strength + of for approximation purposes. However, the situation is radically di erent + if one wishes to compute digits of the binary expansion of an r.e. real: one + cannot compute with a total recursive function the rst n digits of the r.e. + real 0: K (the characteristic sequence of the halting problem) from the rst + g(n) digits of , for any total recursive function g. The rst and third authors + were partially supported by AURC A18/XXXXX/62090/F3414056, 1996. The second + author was supported by DFG Research Grant No. HE 2489/2-1, and the fourth + author was supported by a UARC Post-Doctoral Fellowship.", "venue": "", "year": + 1997, "referenceCount": 34, "citationCount": 77, "influentialCitationCount": + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1685717", + "name": "Cristian S. Calude"}, {"authorId": "1785054", "name": "Peter Hertling"}, + {"authorId": "1703048", "name": "B. Khoussainov"}, {"authorId": "2108771041", + "name": "Yongge Wang"}]}, {"paperId": "642ef04387bc5108e62d5d8346ace19bb3656e2f", + "externalIds": {"MAG": "1964369099", "DOI": "10.3354/AME01329", "CorpusId": + 73609625}, "corpusId": 73609625, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/642ef04387bc5108e62d5d8346ace19bb3656e2f", + "title": "Allelopathic effects of Alexandrium tamarense on other algae: evidence + from mixed growth experiments.", "abstract": "The effect of 2 strains (Alex2 + and Alex5) of the marine red tide dinoflagellate Alexan- drium tamarense on + 10 other planktonic algal target species common in temperate waters was stud- + ied in mixed growth experiments under nutrient-rich conditions. In a comparative + approach, the 2 strains of A. tamarense, similar in their cellular paralytic + shellfish toxin (PST) content, were selected because of their fundamentally + different lytic potencies. The Alex2 strain clearly affected all target algae + while the Alex5 strain had no negative effect on the growth of any of the + target species during the study period, even though cell concentrations of + Alex5 became very high (2 \u00d7 10 4 cells ml -1 ). As both strains contained + comparable amounts of PST, this confirmed previous suggestions that so far + unidentified compounds are causing the negative effects on other algae. Sensitivity + of the tested algae to Alex2 differed considerably. The growth of some species + was affected at very low Alex2 cell concentrations (<10 2 cells ml -1 ), while + the growth of other algae was not affected until cell concentra- tions exceeded + 10 3 cells ml -1 . While a complete dieoff was the ultimate fate for almost + all target spe- cies when grown in mixed culture with Alex2, Scrippsiella + trochoidea formed temporary cysts, the number of which remained constant during + the course of the experiment. The pH in the mixed cul- tures increased as + the cultures grew dense. This had a substantial effect on Alex5 in the mixed + cul- tures, in which Alex5 eventually died off because the target species + have a higher tolerance to high pH. pH values did not determine the outcome + of the experiments with Alex2 because the adverse effects of Alex2 on the + growth of the other algae was evident before pH values became too high. Lytic + extracellular compounds, which are produced by the large majority of A. tamarense + strains tested so far, clearly have the potential to benefit this dinoflagellate + by reducing competitor growth rates.", "venue": "", "year": 2009, "referenceCount": + 32, "citationCount": 77, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.int-res.com/articles/ame2009/57/a057p101.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-09-18", + "journal": {"name": "Aquatic Microbial Ecology", "pages": "101-112", "volume": + "57"}, "authors": [{"authorId": "2062457", "name": "U. Tillmann"}, {"authorId": + "34628048", "name": "P. J. Hansen"}]}, {"paperId": "1636a1ccf44d009ef76736a8f4d39cdbb37b97ec", + "externalIds": {"DOI": "10.1145/800193.805815", "CorpusId": 22858651}, "corpusId": + 22858651, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1636a1ccf44d009ef76736a8f4d39cdbb37b97ec", + "title": "Turing award", "abstract": "ACM''s most prestigious award, the A.M. + Turing award, is given annually to the person deemed most deserving of recognition + for his contributions to the field of computer science and engineering. The + recipient is selected by a committee named by past presidents of the ACM and + includes an honorarium of &doller;1,000.\n The 1972 presentation goes to Edsger + W. Dijkstra, Department of Mathematics, Technological University, Eindhozen, + Netherlands. Edsger Dijkstra was a principal contributor in the late 1950''s + to the development of ALGOL, a high level programming language which has become + a model of clarity and mathematical rigor. He is one of the principal exponents + of the science and art of programming languages in general, and has greatly + contributed to our understanding of their structure, representation, and implementation. + His fifteen years of publications extend from theoretical articles on graph + theory to basic manuals, expository texts, and philosophical contemplations + in the field of programming languages.", "venue": "", "year": 1972, "referenceCount": + 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "1394093374", + "name": "Turing Award"}]}, {"paperId": "7f9154f6ab93a935acccb6b3fdf83d011e44d175", + "externalIds": {"DBLP": "conf/aieeire/Holland59", "MAG": "2088771528", "DOI": + "10.1145/1460299.1460311", "CorpusId": 15142650}, "corpusId": 15142650, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7f9154f6ab93a935acccb6b3fdf83d011e44d175", + "title": "A universal computer capable of executing an arbitrary number of + sub-programs simultaneously", "abstract": "This paper describes a universal + computer capable of simultaneously executing an arbitrary number of sub-programs, + the number of such sub-programs varying as a function of time under program + control or as directed by input to the computer. Three features of the computer + are:\n (1) The structure of the computer is a 2-dimensional modular (or iterative) + network so that, if it were constructed, efficient use could be made of the + high element density and \"template\" techniques now being considered in research + on microminiature elements.\n (2) Sub-programs can be spatially organized + and can act simultaneously, thus facilitating the simulation or direct control + of \"highly-parallel\" systems with many points or parts interacting simultaneously + (e.g. magneto-hydrodynamic problems or pattern recognition).\n (3) The computer''s + structure and behavior can, with simple generalizations, be formulated in + a way that provides a formal basis for theoretical study of automata with + changing structure (cf. the relation between Turing machines and computable + numbers).", "venue": "IRE-AIEE-ACM ''59 (Eastern)", "year": 1959, "referenceCount": + 0, "citationCount": 107, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "http://deepblue.lib.umich.edu/bitstream/2027.42/5581/5/bac4265.0001.001.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-07-30", "journal": {"pages": "72-78"}, "authors": - [{"authorId": "1759551", "name": "N. Dershowitz"}, {"authorId": "2129723", - "name": "Evgenia Falkovich"}]}, {"paperId": "00c957711b12468cb38424caccdf5291bb354033", - "externalIds": {"DBLP": "journals/corr/abs-1910-02054", "MAG": "2977720775", - "ArXiv": "1910.02054", "DOI": "10.1109/SC41405.2020.00024", "CorpusId": 203736482}, - "url": "https://www.semanticscholar.org/paper/00c957711b12468cb38424caccdf5291bb354033", - "title": "ZeRO: Memory optimizations Toward Training Trillion Parameter Models", - "abstract": "Large deep learning models offer significant accuracy gains, - but training billions to trillions of parameters is challenging. Existing - solutions such as data and model parallelisms exhibit fundamental limitations - to fit these models into limited device memory, while obtaining computation, - communication and development efficiency. We develop a novel solution, Zero - Redundancy Optimizer (ZeRO), to optimize memory, vastly improving training - speed while increasing the model size that can be efficiently trained. ZeRO - eliminates memory redundancies in data- and model-parallel training while - retaining low communication volume and high computational granularity, allowing - us to scale the model size proportional to the number of devices with sustained - high efficiency. Our analysis on memory requirements and communication volume - demonstrates: ZeRO has the potential to scale beyond 1 Trillion parameters - using today\u2019s hardware. We implement and evaluate ZeRO: it trains large - models of over 100B parameter with super-linear speedup on 400 GPUs, achieving - throughput of 15 Petaflops. This represents an 8x increase in model size and - 10x increase in achievable performance over state-of-the-art. In terms of - usability, ZeRO can train large models of up to 13B parameters (e.g., larger - than Megatron GPT 8. 3B and T5 11B) without requiring model parallelism which - is harder for scientists to apply. Last but not the least, researchers have - used the system breakthroughs of ZeRO to create Turing-NLG, the world\u2019s - largest language model at the time (17B parameters) with record breaking accuracy.", - "venue": "International Conference for High Performance Computing, Networking, - Storage and Analysis", "year": 2019, "referenceCount": 30, "citationCount": - 290, "influentialCitationCount": 40, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "2019-10-04", "journal": - {"name": "SC20: International Conference for High Performance Computing, Networking, - Storage and Analysis", "pages": "1-16"}, "authors": [{"authorId": "32817044", - "name": "Samyam Rajbhandari"}, {"authorId": "3299496", "name": "Jeff Rasley"}, - {"authorId": "2537545", "name": "Olatunji Ruwase"}, {"authorId": "2145020341", - "name": "Yuxiong He"}]}, {"paperId": "c99c04a3f73c6d4f222cc8b48921688b410ccb52", - "externalIds": {"MAG": "2132286220", "DOI": "10.1306/703C80E7-1707-11D7-8645000102C1865D", - "CorpusId": 130783626}, "url": "https://www.semanticscholar.org/paper/c99c04a3f73c6d4f222cc8b48921688b410ccb52", - "title": "Thermal History of Sedimentary Basins, Maturation Indices, and Kinetics - of Oil and Gas Generation", "abstract": "Temperature is the most sensitive - parameter in hydrocarbon generation. Thus, reconstruction of temperature history - is essential when evaluating petroleum prospects. No measurable parameter - can be directly converted to paleotemperature. Maturation indices such as - vitrinite reflectance, Tmax from Rock-Eval pyrolysis, spore coloration, Thermal - Alteration Index (TAI), or concentration of biological markers offer an indirect - approach. All these indices are a function of the thermal history through - rather complex kinetics, frequently influenced by the type of organic matter. - Their significance and validity are reviewed. Besides the problems of identification - (e.g., vitrinite) and interlaboratory calibration, it is important to simultaneously - interpret kerogen type and maturation and to avoid difficult conversions from - one index to another. Geodynamic models, where structural and thermal histories - are connected, are another approach to temper ture reconstruction which could - be calibrated against the present distribution of temperature and the present - value of maturation indices. Kinetics of kerogen decomposition controls the - amount and composition of hydrocarbons generated. An empirical time-temperature - index (TTI), originally introduced by Lopatin, does not allow such a quantitative - evaluation. Due to several limitations (no provision for different types of - kerogen and different rates of reactions, poor calibration on vitrinite reflectance), - it is of limited interest unless one has no access to a desk-top computer. - Kinetic models, based on a specific calibration made on actual source rock - samples, can simulate the evolution of all types of organic matter and can - provide a quantitative evaluation of oil and gas generated. Examples from - the Jurassic source rocks of the Paris basin, Monterey Formation of California, - Green River shales of Utah, Paleozoic source eds of the Algerian Sahara, and - Miocene rocks of the Mahakam Delta, Indonesia, illustrate various aspects - of the discussion. Geological/geochemical models are the most efficient way - to integrate geological, seismic, and geochemical data, and they should greatly - help to reduce the risk in exploration.", "venue": "", "year": 1987, "referenceCount": - 45, "citationCount": 706, "influentialCitationCount": 28, "isOpenAccess": - false, "fieldsOfStudy": ["Geology"], "s2FieldsOfStudy": [{"category": "Geology", - "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1987-12-01", "journal": - {"name": "AAPG Bulletin", "pages": "1445-1466", "volume": "71"}, "authors": - [{"authorId": "87173105", "name": "B. Tissot"}, {"authorId": "14517826", "name": - "R. Pelet"}, {"authorId": "47815718", "name": "P. Ungerer"}]}, {"paperId": - "b124fa357782d97286aa6b0590457d2052005166", "externalIds": {"DBLP": "journals/jscic/MadzvamuseMW05", - "MAG": "2151519358", "DOI": "10.1007/s10915-004-4617-7", "CorpusId": 2776863}, - "url": "https://www.semanticscholar.org/paper/b124fa357782d97286aa6b0590457d2052005166", - "title": "A Moving Grid Finite Element Method for the Simulation of Pattern - Generation by Turing Models on Growing Domains", "abstract": null, "venue": - "Journal of Scientific Computing", "year": 2005, "referenceCount": 41, "citationCount": - 89, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-08-01", "journal": {"name": "Journal of Scientific - Computing", "pages": "247-262", "volume": "24"}, "authors": [{"authorId": - "2731718", "name": "A. Madzvamuse"}, {"authorId": "2339973", "name": "P. Maini"}, - {"authorId": "2029275", "name": "A. Wathen"}]}, {"paperId": "0986c2827397c315743302a1daf3144f2dc09108", - "externalIds": {"MAG": "2138937860", "DOI": "10.1177/0160449X0002500302", - "CorpusId": 145285720}, "url": "https://www.semanticscholar.org/paper/0986c2827397c315743302a1daf3144f2dc09108", - "title": "Living Wage Campaigns From a \"Social Movement\" Perspective: The - Miami Case", "abstract": "This article uses the Miami living wage campaign - to examine the potential and limitations of living wage campaigns to build - enduring social movements which unite organized labor with community partners. - Using the tripartite framework derived from the social movement litera ture - of \"political opportunities,\" \"mobilizing structures,\" and \"framing processes,\" - the article analyzes this particular campaign to determine if a genuine social - movement emerged. Hecksher and Palmer''s thesis that organized labor as presently - constituted is incapable of forming egalitar ian multilateral alliances with - non-labor partners is tested, and sugges tions for \"best practice\" are developed.", - "venue": "", "year": 2000, "referenceCount": 17, "citationCount": 58, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Sociology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2000-09-01", "journal": {"name": "Labor Studies Journal", "pages": "29 - - 50", "volume": "25"}, "authors": [{"authorId": "97342525", "name": "Bruce - Nissen"}]}, {"paperId": "03d1dca0d200c982624a8a64db108d8c4c4a30fc", "externalIds": - {"DBLP": "journals/tcs/Simon81", "MAG": "1974216994", "DOI": "10.1016/0304-3975(81)90032-3", - "CorpusId": 20211697}, "url": "https://www.semanticscholar.org/paper/03d1dca0d200c982624a8a64db108d8c4c4a30fc", - "title": "On Tape-Bounded Probabilistic Turing Machine Acceptors", "abstract": - null, "venue": "Theoretical Computer Science", "year": 1981, "referenceCount": - 11, "citationCount": 18, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Theor. Comput. Sci.", "pages": "75-91", "volume": - "16"}, "authors": [{"authorId": "143688145", "name": "Janos Simon"}]}, {"paperId": - "3c999256446d684085714db9ea543aedd26c2d4e", "externalIds": {"MAG": "2511283383", - "DOI": "10.1016/j.jtbi.2016.08.005", "CorpusId": 20901470, "PubMed": "27519949"}, - "url": "https://www.semanticscholar.org/paper/3c999256446d684085714db9ea543aedd26c2d4e", - "title": "Identifying network topologies that can generate turing pattern.", - "abstract": null, "venue": "Journal of Theoretical Biology", "year": 2016, - "referenceCount": 49, "citationCount": 28, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-11-07", "journal": - {"name": "Journal of theoretical biology", "pages": "\n 88-96\n ", - "volume": "408"}, "authors": [{"authorId": "4524754", "name": "M. M. Zheng"}, - {"authorId": "2064567134", "name": "Bin Shao"}, {"authorId": "46173639", "name": - "Q. Ouyang"}]}, {"paperId": "d96a361c854c2eaf2c5d2a106ba1f11cd3b44ad0", "externalIds": - {"MAG": "1964702120", "DOI": "10.1177/002248718503600306", "CorpusId": 143108021}, - "url": "https://www.semanticscholar.org/paper/d96a361c854c2eaf2c5d2a106ba1f11cd3b44ad0", - "title": "Comparing Academic Backgrounds and Career Aspirations of Education - and Non Education Majors", "abstract": "Questions concerning the abilities - and background experiences of prospective teachers dominate the recent professional - litera ture. Book, Freeman and Brousseau shed additional light on this topical - area. A comparison of the academic and social back grounds and the bases for - career decisions of teaching and non- teaching majors at a major university - indicates that students choosing teaching as a career (a) are as academically - competent as their non-teaching counterparts (b) are more concerned about - helping others and (c) are less concerned about salaries.", "venue": "", "year": - 1984, "referenceCount": 1, "citationCount": 57, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1984-07-01", - "journal": {"name": "Journal of Teacher Education", "pages": "27 - 30", "volume": - "36"}, "authors": [{"authorId": "30676602", "name": "Cassandra Book"}, {"authorId": - "66414557", "name": "D. Freeman"}, {"authorId": "67331745", "name": "B. Brousseau"}]}, - {"paperId": "2684da28557281619903d8771d3c1ed308a481f7", "externalIds": {"MAG": - "1997004672", "DOI": "10.1094/PDIS.1997.81.11.1231", "CorpusId": 76666922, - "PubMed": "30861725"}, "url": "https://www.semanticscholar.org/paper/2684da28557281619903d8771d3c1ed308a481f7", - "title": "Resistance of Transgenic Prunus domestica to Plum Pox Virus Infection.", - "abstract": "Transgenic plum trees (Prunus domestica) containing the plum - pox potyvirus coat protein (PPV-CP) gene were inoculated with PPV by aphid - feeding or chip budding. Infection was monitored by evaluation of virus symptoms, - DAS-ELISA, and immunoblot assays. Based on observations and analyses over - 3 years including two dormancy cycles, one out of five transgenic clones (C-5), - was found to be resistant to infection whether inoculated by aphids or by - chip budding. PPV could not be detected in any inoculated plants of the C-5 - clone by immunoblot or immunocap-ture-reverse transcriptase-polymerase chain - reaction assays. To our knowledge, this is the first P. domestica clone resistant - to PPV infection produced by genetic engineering.", "venue": "Plant Disease", - "year": 1997, "referenceCount": 29, "citationCount": 103, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": - "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1997-11-01", "journal": {"name": "Plant - disease", "pages": "\n 1231-1235\n ", "volume": "81 11"}, - "authors": [{"authorId": "5899563", "name": "M. Ravelonandro"}, {"authorId": - "49587628", "name": "R. Scorza"}, {"authorId": "21801901", "name": "J. Bachelier"}, - {"authorId": "4716661", "name": "G. Labonne"}, {"authorId": "145664829", "name": - "L. Levy"}, {"authorId": "5432148", "name": "V. Damsteegt"}, {"authorId": - "40135742", "name": "A. Callahan"}, {"authorId": "6675334", "name": "J. Dunez"}]}, - {"paperId": "bb3663c5d8814b6de349917a56e64f02bb62b9ae", "externalIds": {"MAG": - "2017894499", "DBLP": "journals/ijse/VallverduSC10", "DOI": "10.4018/jse.2010070102", - "CorpusId": 8330784}, "url": "https://www.semanticscholar.org/paper/bb3663c5d8814b6de349917a56e64f02bb62b9ae", - "title": "Chatterbox Challenge as a Test-Bed for Synthetic Emotions", "abstract": - "Chatterbox Challenge is an annual web-based contest for artificial conversational - systems, ACE. The 2010 instantiation was the tenth consecutive contest held - between March and June in the 60th year following the publication of Alan - Turing''s influential disquisition ''computing machinery and intelligence''. - Loosely based on Turing''s viva voca interrogator-hidden witness imitation - game, a thought experiment to ascertain a machine''s capacity to respond satisfactorily - to unrestricted questions, the contest provides a platform for technology - comparison and evaluation. This paper provides an insight into emotion content - in the entries since the 2005 Chatterbox Challenge. The authors find that - synthetic textual systems, none of which are backed by academic or industry - funding, are, on the whole and more than half a century since Weizenbaum''s - natural language understanding experiment, little further than Eliza in terms - of expressing emotion in dialogue. This may be a failure on the part of the - academic AI community for ignoring the Turing test as an engineering challenge.", - "venue": "Int. J. Synth. Emot.", "year": 2010, "referenceCount": 25, "citationCount": - 18, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology", "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-07-01", "journal": {"name": "Int. J. Synth. Emot.", - "pages": "12-37", "volume": "1"}, "authors": [{"authorId": "1811807", "name": - "Jordi Vallverd\u00fa"}, {"authorId": "2731715", "name": "Huma Shah"}, {"authorId": - "1847897", "name": "D. Casacuberta"}]}, {"paperId": "29296ed6b5caf10e65e4052c089f32d8300b53a1", - "externalIds": {"MAG": "2333456792", "DOI": "10.4153/CMB-1961-031-9", "CorpusId": - 123430014}, "url": "https://www.semanticscholar.org/paper/29296ed6b5caf10e65e4052c089f32d8300b53a1", - "title": "An Informal Arithmetical Approach to Computability and Computation", - "abstract": "In 1936 A. M. Turing published his analysis of the notion of - effective computability. Very roughly speaking, its object was to distinguish - between numbers defined by existential statements and those defined by purely - constructive ones. Guided by his schematizing of what goes on when a person - calculates using paper and pencil, Turing introduced the concept of an A-machine, - eventually to be called a Turing machine. Such a machine consists of a box - and a linear tape divided into squares, indefinitely long in both directions. - The tape passes through the box and exactly one square of it is always within - the box. The system changes only at certain discrete times: t = 0, 1, \u2026. - Each square can carry exactly one of the finite set of symbols: s1, s2, \u2026, - sn, one of which may be the blank.", "venue": "Canadian mathematical bulletin", - "year": 1961, "referenceCount": 0, "citationCount": 18, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1961-09-01", - "journal": {"name": "Canadian Mathematical Bulletin", "pages": "279 - 293", - "volume": "4"}, "authors": [{"authorId": "16679887", "name": "Z. A. Melzak"}]}, - {"paperId": "d59c3ded95c722390b02e3aa1aa15b105d82200e", "externalIds": {"MAG": - "267167449", "DOI": "10.3929/ETHZ-A-005377890", "CorpusId": 107294273}, "url": - "https://www.semanticscholar.org/paper/d59c3ded95c722390b02e3aa1aa15b105d82200e", + "publicationDate": "1959-12-01", "journal": {"pages": "108-113"}, "authors": + [{"authorId": "144404817", "name": "J. Holland"}]}, {"paperId": "336b8d30fcc18585c52fd8db72a40647781742c6", + "externalIds": {"DBLP": "journals/cj/Martinez-Gil07", "DOI": "10.1093/comjnl/bxl084", + "CorpusId": 647446}, "corpusId": 647446, "publicationVenue": {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", + "name": "Computer/law journal", "type": "journal", "alternate_names": ["Computer + journal", "The Computer Journal", "Comput j", "Comput J"], "issn": "0164-8756", + "alternate_issns": ["0010-4620"], "url": "https://repository.jmls.edu/jitpl/all_issues.html", + "alternate_urls": ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/336b8d30fcc18585c52fd8db72a40647781742c6", + "title": "Thinking on the Web: Berners-Lee, G\u00f6del and Turing", "abstract": + null, "venue": "Computer/law journal", "year": 2007, "referenceCount": 0, + "citationCount": 28, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"name": "Comput. + J.", "pages": "371-372", "volume": "50"}, "authors": [{"authorId": "119040630", + "name": "J. Gil"}]}, {"paperId": "cb74982f5619f575c3406e5c486532ebd4abed79", + "externalIds": {"MAG": "2274733588", "DOI": "10.1080/02650487.2005.11072906", + "CorpusId": 167718639}, "corpusId": 167718639, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cb74982f5619f575c3406e5c486532ebd4abed79", + "title": "Explicit, non-integrated product placement in British television + programmes", "abstract": "The rapid increase in the volume and variety of + product placement approaches has outpaced research in the field. There is + a marked shortage of studies that address particular product placement (pp) + techniques in specified situational contexts. This paper reports the category + of pp known as explicit, non-integrated product placement in the context of + British television programmes. The study used a small convenience sample of + young, mixed-nationality TV viewers who were familiar with the British and + non-British shows on British commercial TV. Their attitudes to and recognition + of pp in this context were explored. The findings are set within a wider-ranging + review of previous research, and suggest important implications for promotional + practice and fu ture research.", "venue": "", "year": 2005, "referenceCount": + 18, "citationCount": 105, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": + [{"category": "Sociology", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2005-01-01", "journal": {"name": "International Journal of Advertising", + "pages": "111 - 95", "volume": "24"}, "authors": [{"authorId": "115754690", + "name": "Rungpaka Amy Tiwsakul"}, {"authorId": "10267085", "name": "Chris + Hackley"}, {"authorId": "6058351", "name": "Isabelle Szmigin"}]}, {"paperId": + "d59c3ded95c722390b02e3aa1aa15b105d82200e", "externalIds": {"MAG": "267167449", + "DOI": "10.3929/ETHZ-A-005377890", "CorpusId": 107294273}, "corpusId": 107294273, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/d59c3ded95c722390b02e3aa1aa15b105d82200e", "title": "Integrated Modeling and Optimization of Multi-Carrier Energy Systems", "abstract": "In the past, common energy infrastructuressuch as electricity and nat\u00ac ural gas Systems were mostly planned and operated independently. @@ -44328,26 +49952,70 @@ interactions: optimal coupling of energy infrastructures. The modeis are demonstrated in a number of application examples, showing their basic characteristics and usefulness.", "venue": "", "year": 2007, "referenceCount": 106, "citationCount": - 295, "influentialCitationCount": 23, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "3451027", "name": "M. Geidl"}]}, - {"paperId": "575888077a60aaf9b7b710023c177c13fb2e7677", "externalIds": {"DBLP": - "journals/jc/WeihrauchZ06", "MAG": "2054172671", "DOI": "10.1016/j.jco.2006.06.001", - "CorpusId": 17328937}, "url": "https://www.semanticscholar.org/paper/575888077a60aaf9b7b710023c177c13fb2e7677", - "title": "Computing Schr\u00f6dinger propagators on Type-2 Turing machines", - "abstract": null, "venue": "Journal of Complexity", "year": 2006, "referenceCount": - 19, "citationCount": 27, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + 296, "influentialCitationCount": 24, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "3451027", "name": "M. + Geidl"}]}, {"paperId": "1de28df0898f72335dde087e3f6ecb54d1cd35e2", "externalIds": + {"MAG": "2061408397", "ArXiv": "0912.0043", "DOI": "10.1215/00127094-1444249", + "CorpusId": 567346}, "corpusId": 567346, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1de28df0898f72335dde087e3f6ecb54d1cd35e2", + "title": "The space of stability conditions on the local projective plane", + "abstract": "We study the space of stability conditions on the total space + of the canonical bundle over the projective plane. We explicitly describe + a chamber of geometric stability conditions, and show that its translates + via autoequivalences cover a whole connected component. We prove that this + connected component is simply-connected. We determine the group of autoequivalences + preserving this connected component, which turns out to be closely related + to 1(3). Finally, we show that there is a submanifold isomorphic to the univer- + sal covering of a moduli space of elliptic curves with 1(3)-level struc- ture. + The morphism is 1(3)-equivariant, and is given by solutions of Picard-Fuchs + equations. This result is motivated by the notion of - stability and by mirror + symmetry.", "venue": "", "year": 2009, "referenceCount": 80, "citationCount": + 103, "influentialCitationCount": 13, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/0912.0043", "status": "GREEN"}, "fieldsOfStudy": + ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-12-01", "journal": {"name": "J. - Complex.", "pages": "918-935", "volume": "22"}, "authors": [{"authorId": "1696520", - "name": "K. Weihrauch"}, {"authorId": "2778649", "name": "Ning Zhong"}]}, - {"paperId": "f4f83ccbdaede6a73132e6d1799e165c6f7f1929", "externalIds": {"DBLP": - "journals/jsyml/Richman83", "MAG": "2047144334", "DOI": "10.2307/2273473", - "CorpusId": 26989655}, "url": "https://www.semanticscholar.org/paper/f4f83ccbdaede6a73132e6d1799e165c6f7f1929", + null, "publicationDate": "2009-12-01", "journal": {"name": "Duke Mathematical + Journal", "pages": "263-322", "volume": "160"}, "authors": [{"authorId": "1904087", + "name": "Arend Bayer"}, {"authorId": "97316415", "name": "Emanuele Macr\u00ec"}]}, + {"paperId": "739823509bfb9066f3eb4b9561a33610998d888e", "externalIds": {"CorpusId": + 12572261}, "corpusId": 12572261, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/739823509bfb9066f3eb4b9561a33610998d888e", + "title": "Rounding off-emfs in matr dotsxp mcesses dagger Quart Universal + Turing Machine", "abstract": "Recent advances in decentralized epistemolo-gies + and \" fuzzy \" information have paved the way for DHCP. after years of theoretical + research into simulated annealing, we show the synthesis of online algorithms. + In order to solve this riddle, we concentrate our efforts on showing that + access points and IPv4 are entirely incompatible .", "venue": "", "year": + null, "referenceCount": 108, "citationCount": 55, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "a2c82c2df8bc47135a211275d7490dd19d77bd56", "externalIds": {"MAG": "2466100732", + "DBLP": "conf/dna/WinfreeER00", "DOI": "10.1007/3-540-44992-2_6", "CorpusId": + 10199917}, "corpusId": 10199917, "publicationVenue": {"id": "f9272937-5173-403a-86b5-eb78134de87b", + "name": "International Workshop on DNA-Based Computers", "type": "conference", + "alternate_names": ["DNA Computing", "Int Workshop Dna-based Comput"]}, "url": + "https://www.semanticscholar.org/paper/a2c82c2df8bc47135a211275d7490dd19d77bd56", + "title": "String Tile Models for DNA Computing by Self-Assembly", "abstract": + null, "venue": "International Workshop on DNA-Based Computers", "year": 2000, + "referenceCount": 25, "citationCount": 57, "influentialCitationCount": 2, + "isOpenAccess": true, "openAccessPdf": {"url": "https://authors.library.caltech.edu/27367/1/stringtiles_preprint.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-06-13", "journal": {"pages": "63-88"}, "authors": + [{"authorId": "3094920", "name": "E. Winfree"}, {"authorId": "9223080", "name": + "T. Eng"}, {"authorId": "144182665", "name": "G. Rozenberg"}]}, {"paperId": + "f4f83ccbdaede6a73132e6d1799e165c6f7f1929", "externalIds": {"DBLP": "journals/jsyml/Richman83", + "MAG": "2047144334", "DOI": "10.2307/2273473", "CorpusId": 26989655}, "corpusId": + 26989655, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/f4f83ccbdaede6a73132e6d1799e165c6f7f1929", "title": "Church''s thesis without tears", "abstract": "The modern theory of computability is based on the works of Church, Markov and Turing who, starting from quite different models of computation, arrived at the same class of computable @@ -44378,174 +50046,155 @@ interactions: may be used, as Brouwerian counterexamples are, as evidence of the unprovability of certain assertions.", "venue": "Journal of Symbolic Logic (JSL)", "year": 1983, "referenceCount": 13, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1983-09-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "797 - - 803", "volume": "48"}, "authors": [{"authorId": "1748575", "name": "F. Richman"}]}, - {"paperId": "8f4032138c98893988f57ebf909b01372b276e83", "externalIds": {"MAG": - "2169524999", "DOI": "10.1051/0004-6361:20020050", "CorpusId": 41865708}, - "url": "https://www.semanticscholar.org/paper/8f4032138c98893988f57ebf909b01372b276e83", - "title": "Molecular Distributions in the Inner Regions of Protostellar Disks", - "abstract": "The distributions of molecules in the inner regions of a protostellar - disk are presented. These were calculated using an uncoupled chemical/dynamical - model, with a numerical integration of the vertical disk struc- ture. A comparison - between models with and without the eects of X-ray ionisation is made, and - molecules are identied which are good tracers of the ionisation level in this - part of the disk, notably CN and C2H. In the re- gion considered in this paper - (r 10 AU), the chemistry is dominated by the thermal desorption of species - from grains. This shows that a critically important detail in this region - of the disk, as far as molecular distributions are concerned, is the temperature - prole. We nd that not all of the gaseous material is frozen onto grain surfaces - at 10 AU, and we identify species, including some organic molecules, which - should exist in observable quantities in the inner regions of protostellar - disks.", "venue": "", "year": 2002, "referenceCount": 18, "citationCount": - 105, "influentialCitationCount": 11, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2002-04-01", "journal": {"name": "Astronomy and Astrophysics", - "pages": "632-646", "volume": "385"}, "authors": [{"authorId": "48041664", - "name": "A. Markwick"}, {"authorId": "91516447", "name": "M. Ilgner"}, {"authorId": - "49837448", "name": "T. Millar"}, {"authorId": "144128843", "name": "T. Henning"}]}, + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1983-09-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "797 - 803", "volume": "48"}, "authors": [{"authorId": "1748575", + "name": "F. Richman"}]}, {"paperId": "11f471345c4171a2893d495af2955075714a7a10", + "externalIds": {"MAG": "62691533", "DOI": "10.1038/482462a", "CorpusId": 205070106, + "PubMed": "22358812"}, "corpusId": 205070106, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/11f471345c4171a2893d495af2955075714a7a10", + "title": "Turing centenary: Is the brain a good model for machine intelligence?", + "abstract": null, "venue": "Nature", "year": 2012, "referenceCount": 1, "citationCount": + 42, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.nature.com/articles/482462a.pdf", "status": "BRONZE"}, + "fieldsOfStudy": ["Psychology", "Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-02-22", "journal": {"name": "Nature", + "pages": "462-463", "volume": "482"}, "authors": [{"authorId": "72419159", + "name": "R. Brooks"}, {"authorId": "48987704", "name": "D. Hassabis"}, {"authorId": + "144441223", "name": "D. Bray"}, {"authorId": "3140335", "name": "A. Shashua"}]}, {"paperId": "b6c5f9d87df735b436884a4286f0ecdbee4a73c6", "externalIds": {"MAG": "3093388624", "DOI": "10.1038/s41586-020-2782-y", "CorpusId": 222840461, "PubMed": - "33057220"}, "url": "https://www.semanticscholar.org/paper/b6c5f9d87df735b436884a4286f0ecdbee4a73c6", + "33057220"}, "corpusId": 222840461, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/b6c5f9d87df735b436884a4286f0ecdbee4a73c6", "title": "A system hierarchy for brain-inspired computing.", "abstract": null, "venue": "Nature", "year": 2020, "referenceCount": 66, "citationCount": 49, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2020-10-01", "journal": {"name": "Nature", "pages": "\n 378-384\n ", - "volume": "586 7829"}, "authors": [{"authorId": "7549706", "name": "Youhui - Zhang"}, {"authorId": "1720773235", "name": "Peng Qu"}, {"authorId": "145656217", - "name": "Yu Ji"}, {"authorId": "1997559829", "name": "Weihao Zhang"}, {"authorId": - "1997956414", "name": "Guangrong Gao"}, {"authorId": "80816621", "name": "Guanrui - Wang"}, {"authorId": "15168128", "name": "Sen Song"}, {"authorId": "1730243", - "name": "Guoqi Li"}, {"authorId": "1712168", "name": "Wenguang Chen"}, {"authorId": + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-10-01", "journal": + {"name": "Nature", "pages": "\n 378-384\n ", "volume": "586 + 7829"}, "authors": [{"authorId": "7549706", "name": "Youhui Zhang"}, {"authorId": + "1720773235", "name": "Peng Qu"}, {"authorId": "145656217", "name": "Yu Ji"}, + {"authorId": "1997559829", "name": "Weihao Zhang"}, {"authorId": "1997956414", + "name": "Guangrong Gao"}, {"authorId": "80816621", "name": "Guanrui Wang"}, + {"authorId": "15168128", "name": "Sen Song"}, {"authorId": "1730243", "name": + "Guoqi Li"}, {"authorId": "1712168", "name": "Wenguang Chen"}, {"authorId": "2225511", "name": "Weimin Zheng"}, {"authorId": "2157325649", "name": "Feng Chen"}, {"authorId": "47624604", "name": "Jing Pei"}, {"authorId": "145539031", "name": "R. Zhao"}, {"authorId": "2152529256", "name": "Mingguo Zhao"}, {"authorId": - "29889772", "name": "Luping Shi"}]}, {"paperId": "bdaef926fb4991e933bdfe3a69bb53817cec2a5f", - "externalIds": {"DBLP": "conf/lata/AxelsenG11", "MAG": "2246201930", "DOI": - "10.1007/978-3-642-21254-3_8", "CorpusId": 37657665}, "url": "https://www.semanticscholar.org/paper/bdaef926fb4991e933bdfe3a69bb53817cec2a5f", - "title": "A Simple and Efficient Universal Reversible Turing Machine", "abstract": - null, "venue": "Language and Automata Theory and Applications", "year": 2011, - "referenceCount": 22, "citationCount": 22, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2011-05-26", "journal": {"pages": "117-128"}, "authors": - [{"authorId": "1751103", "name": "Holger Bock Axelsen"}, {"authorId": "1700006", - "name": "R. Gl\u00fcck"}]}, {"paperId": "7f04976656b2336c9a124918b72bd80454eff789", - "externalIds": {"MAG": "2097443371", "DBLP": "conf/sigir/GaoYLDN09", "DOI": - "10.1145/1571941.1572003", "CorpusId": 2955798}, "url": "https://www.semanticscholar.org/paper/7f04976656b2336c9a124918b72bd80454eff789", - "title": "Smoothing clickthrough data for web search ranking", "abstract": - "Incorporating features extracted from clickthrough data (called clickthrough - features) has been demonstrated to significantly improve the performance of - ranking models for Web search applications. Such benefits, however, are severely - limited by the data sparseness problem, i.e., many queries and documents have - no or very few clicks. The ranker thus cannot rely strongly on clickthrough - features for document ranking. This paper presents two smoothing methods to - expand clickthrough data: query clustering via Random Walk on click graphs - and a discounting method inspired by the Good-Turing estimator. Both methods - are evaluated on real-world data in three Web search domains. Experimental - results show that the ranking models trained on smoothed clickthrough features - consistently outperform those trained on unsmoothed features. This study demonstrates - both the importance and the benefits of dealing with the sparseness problem - in clickthrough data.", "venue": "Annual International ACM SIGIR Conference - on Research and Development in Information Retrieval", "year": 2009, "referenceCount": - 27, "citationCount": 101, "influentialCitationCount": 13, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", - "Conference"], "publicationDate": "2009-07-19", "journal": {"name": "Proceedings - of the 32nd international ACM SIGIR conference on Research and development - in information retrieval"}, "authors": [{"authorId": "1800422", "name": "Jianfeng - Gao"}, {"authorId": "2114108486", "name": "Wei Yuan"}, {"authorId": "2108787178", - "name": "Xiao Li"}, {"authorId": "1796862", "name": "Kefeng Deng"}, {"authorId": - "143619007", "name": "Jian-Yun Nie"}]}, {"paperId": "4d2e22795a6d6cc13e3f234da35b56617cc1697d", - "externalIds": {"DBLP": "journals/mst/Kannan84", "MAG": "2040654780", "DOI": - "10.1007/BF01744432", "CorpusId": 12756307}, "url": "https://www.semanticscholar.org/paper/4d2e22795a6d6cc13e3f234da35b56617cc1697d", - "title": "Towards separating nondeterminism from determinism", "abstract": - null, "venue": "Mathematical Systems Theory", "year": 1984, "referenceCount": - 14, "citationCount": 26, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1984-12-01", "journal": - {"name": "Mathematical systems theory", "pages": "29-45", "volume": "17"}, - "authors": [{"authorId": "144632403", "name": "R. Kannan"}]}, {"paperId": - "43a880702cf921534297446b58d357a29181022a", "externalIds": {"DBLP": "journals/fuin/Martin-VidePPR02", - "MAG": "1484840002", "CorpusId": 45575}, "url": "https://www.semanticscholar.org/paper/43a880702cf921534297446b58d357a29181022a", - "title": "ReMembrane Systems with Coupled Transport: Universality and Normal - Forms", "abstract": "This paper continues research on membrane systems which - function by communication only, meaning that there are no evolving rules for - molecules. The whole computation process relies on passage of molecules through - membranes - this provides communication between regions of the membrane system. - Next to transport of single molecules through membranes (uniport) we also - study a coupled transport of molecules, with two molecules passing either - in the same direction (symport) or in opposite directions (antiport). We study - the computational power of such membrane systems and prove that using only - symport one gets Turing universality. Moreover, we prove that five membranes - suffice to get Turing universality, and the number of membranes can be decreased - to three if forbidding context conditions for transport are used.", "venue": - "Fundamenta Informaticae", "year": 2002, "referenceCount": 10, "citationCount": - 28, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, + "29889772", "name": "Luping Shi"}]}, {"paperId": "64cccfd37e7e700f1647dc231c0d15817b209249", + "externalIds": {"MAG": "2122050464", "DOI": "10.1177/036354659101900617", + "CorpusId": 37638072, "PubMed": "1781506"}, "corpusId": 37638072, "publicationVenue": + {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", "name": "American Journal of + Sports Medicine", "type": "journal", "alternate_names": ["Am J Sport Med"], + "issn": "0363-5465", "url": "http://ajs.sagepub.com/", "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, + "url": "https://www.semanticscholar.org/paper/64cccfd37e7e700f1647dc231c0d15817b209249", + "title": "Stress fractures", "abstract": "To answer the question why such + large differences in stress fracture morbidity rates (2% to 64%) exist in + different countries, we prospectively evaluated 312 re cruits for possible + risk factors for stress fractures. Prior to training, each recruit underwent + an evaluation includ ing the following: orthopaedic examination, foot and + tibial radiographs, measurements of tibial bone width, bone mineral content, + bone density, aerobic physical fitness and leg power, assessments of somatotype + and smoking habits, and evaluation of sociological and psy chological factors. + Using a multivariate analysis, two risk factors were identified: recruits + with stress frac tures had significantly narrower tibiae (P < 0.001), and + a higher degree of external rotation of the hip (P = 0.016). These two variables + were independent and cumulative. Stress fracture morbidity was 17%, 29%, and + 45% when neither, one, or both risk factors were present, respectively (P + < 0.001). Identification of these risk factors might explain the susceptibility + of some people to stress fractures.", "venue": "American Journal of Sports + Medicine", "year": 1991, "referenceCount": 23, "citationCount": 105, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1991-11-01", "journal": {"name": "The American Journal + of Sports Medicine", "pages": "647 - 652", "volume": "19"}, "authors": [{"authorId": + "2025897", "name": "M. Giladi"}, {"authorId": "2549427", "name": "C. Milgrom"}, + {"authorId": "1762624", "name": "A. Simkin"}, {"authorId": "6942128", "name": + "Y. Danon"}]}, {"paperId": "932d82e0f815ca21e1158b90ddda68a8d41f84fb", "externalIds": + {"MAG": "2171990602", "DOI": "10.1177/095892879700700102", "CorpusId": 154531453}, + "corpusId": 154531453, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/932d82e0f815ca21e1158b90ddda68a8d41f84fb", + "title": "Social Assistance in Oecd Countries", "abstract": "This article + presents selected results from the first comparative study of social assistance + across all 24 countries of the OECD. The scope of social assistance, discussed + in the first section, is drawn to include all means-tested benefits in cash + and kind, including those which provide benefits to higher income groups. + The second section then presents in formation on the main programmes in each + country, expenditures and groups of beneficia ries, trends over time, administrative + struc tures, and operation of means tests. It concludes by developing a new + measure of assistance benefit levels with which to evaluate different countries'' + systems. The third section distils from the country differences eight pat + terns, or ''assistance regimes'', varying from the limited, discretionary, + decentralized models of Switzerland and Norway to the extensive, national, + rights-based programmes of the English-speaking world; and from the relative + generosity of Scandinavia and Australia to the low, marginalizing benefits + of the Mediterranean countries and the USA. The last section turns to the + economic pressures and political debates which are driving con temporary policy + changes. The concepts and empirical data presented here will enable means-testing, + targeting and selectivity to be brought back into the comparative study of + European and wider welfare systems.", "venue": "", "year": 1997, "referenceCount": + 178, "citationCount": 295, "influentialCitationCount": 26, "isOpenAccess": + true, "openAccessPdf": {"url": "http://www.york.ac.uk/inst/spru/pubs/pdf/rrep046.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": + "Economics", "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1997-02-01", "journal": + {"name": "Journal of European Social Policy", "pages": "17 - 43", "volume": + "7"}, "authors": [{"authorId": "144056480", "name": "I. Gough"}, {"authorId": + "144670555", "name": "J. Bradshaw"}, {"authorId": "115995481", "name": "J. + Ditch"}, {"authorId": "66827705", "name": "T. Eardley"}, {"authorId": "12344324", + "name": "P. Whiteford"}]}, {"paperId": "4a53535e98ac93e67adeb82474367af3993912d1", + "externalIds": {"ArXiv": "1601.05404", "MAG": "2951348354", "PubMedCentral": + "4895380", "DOI": "10.1038/srep27397", "CorpusId": 256987, "PubMed": "27273339"}, + "corpusId": 256987, "publicationVenue": {"id": "f99f77b7-b1b6-44d3-984a-f288e9884b9b", + "name": "Scientific Reports", "type": "journal", "alternate_names": ["Sci + Rep"], "issn": "2045-2322", "url": "http://www.nature.com/srep/", "alternate_urls": + ["http://www.nature.com/srep/index.html"]}, "url": "https://www.semanticscholar.org/paper/4a53535e98ac93e67adeb82474367af3993912d1", + "title": "Pattern Formation on Networks: from Localised Activity to Turing + Patterns", "abstract": null, "venue": "Scientific Reports", "year": 2016, + "referenceCount": 39, "citationCount": 27, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.nature.com/articles/srep27397.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Physics", "Mathematics", "Computer Science", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "Fundam. - Informaticae", "pages": "1-15", "volume": "49"}, "authors": [{"authorId": - "1397242142", "name": "C. Mart\u00edn-Vide"}, {"authorId": "143936370", "name": - "A. Paun"}, {"authorId": "1698119", "name": "G. Paun"}, {"authorId": "144182665", - "name": "G. Rozenberg"}]}, {"paperId": "e272fbec3a475ab76ff5948c00c56d29098e9769", - "externalIds": {"MAG": "2727423609", "DBLP": "conf/wollic/AckermanF17", "DOI": - "10.1007/978-3-662-55386-2_1", "CorpusId": 26436591}, "url": "https://www.semanticscholar.org/paper/e272fbec3a475ab76ff5948c00c56d29098e9769", - "title": "Graph Turing Machines", "abstract": null, "venue": "Workshop on - Logic, Language, Information and Computation", "year": 2017, "referenceCount": - 20, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2017-07-18", "journal": {"pages": "1-13"}, "authors": [{"authorId": "12590101", - "name": "N. Ackerman"}, {"authorId": "3337217", "name": "Cameron E. Freer"}]}, - {"paperId": "a2c82c2df8bc47135a211275d7490dd19d77bd56", "externalIds": {"MAG": - "2466100732", "DBLP": "conf/dna/WinfreeER00", "DOI": "10.1007/3-540-44992-2_6", - "CorpusId": 10199917}, "url": "https://www.semanticscholar.org/paper/a2c82c2df8bc47135a211275d7490dd19d77bd56", - "title": "String Tile Models for DNA Computing by Self-Assembly", "abstract": - null, "venue": "International Workshop on DNA-Based Computers", "year": 2000, - "referenceCount": 25, "citationCount": 57, "influentialCitationCount": 2, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-06-13", "journal": {"pages": "63-88"}, "authors": - [{"authorId": "3094920", "name": "E. Winfree"}, {"authorId": "9223080", "name": - "T. Eng"}, {"authorId": "144182665", "name": "G. Rozenberg"}]}, {"paperId": - "1636a1ccf44d009ef76736a8f4d39cdbb37b97ec", "externalIds": {"DOI": "10.1145/800193.805815", - "CorpusId": 22858651}, "url": "https://www.semanticscholar.org/paper/1636a1ccf44d009ef76736a8f4d39cdbb37b97ec", - "title": "Turing award", "abstract": "ACM''s most prestigious award, the A.M. - Turing award, is given annually to the person deemed most deserving of recognition - for his contributions to the field of computer science and engineering. The - recipient is selected by a committee named by past presidents of the ACM and - includes an honorarium of &doller;1,000.\n The 1972 presentation goes to Edsger - W. Dijkstra, Department of Mathematics, Technological University, Eindhozen, - Netherlands. Edsger Dijkstra was a principal contributor in the late 1950''s - to the development of ALGOL, a high level programming language which has become - a model of clarity and mathematical rigor. He is one of the principal exponents - of the science and art of programming languages in general, and has greatly - contributed to our understanding of their structure, representation, and implementation. - His fifteen years of publications extend from theoretical articles on graph - theory to basic manuals, expository texts, and philosophical contemplations - in the field of programming languages.", "venue": "", "year": 1972, "referenceCount": - 0, "citationCount": 2, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "1394093374", "name": "Turing Award"}]}, - {"paperId": "96bc71e4dc316ae7720e86c3fe53f4c88d3eb833", "externalIds": {"DBLP": - "journals/jacm/JainJUW11", "MAG": "3037978064", "ArXiv": "0907.4737", "DOI": - "10.1145/2049697.2049704", "CorpusId": 1372332}, "url": "https://www.semanticscholar.org/paper/96bc71e4dc316ae7720e86c3fe53f4c88d3eb833", + ["JournalArticle"], "publicationDate": "2016-01-20", "journal": {"name": "Scientific + Reports", "volume": "6"}, "authors": [{"authorId": "2484797", "name": "N. + McCullen"}, {"authorId": "153111161", "name": "T. Wagenknecht"}]}, {"paperId": + "0b47043f35a8d5e37e75e0ba31e57e6b7b81a8d4", "externalIds": {"MAG": "2032890895", + "DOI": "10.2307/1478985", "CorpusId": 53378915}, "corpusId": 53378915, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0b47043f35a8d5e37e75e0ba31e57e6b7b81a8d4", + "title": "Ecohydrological characterization of a groundwater\u2010fed alluvial + floodplain mire", "abstract": "In a small alluvial floodplain depression (21 + ha) of the river Dijle, a selection of 56 characteristic, mainly groundwater-depending + plant species was mapped using a regular 20 by 20 m square cell mapping grid. + In order to understand the spatial distribution of the plant species and their + vegetation types, several environmental variables, in- cluding groundwater + regime, groundwater chemistry, soil tex- ture, soil chemical composition and + management type were measured in detail.", "venue": "", "year": 1999, "referenceCount": + 61, "citationCount": 41, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + [{"category": "Environmental Science", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "1999-12-01", "journal": {"name": "Applied Vegetation Science", + "pages": "215-228", "volume": "2"}, "authors": [{"authorId": "26168402", "name": + "P. Becker"}, {"authorId": "1866901", "name": "M. Hermy"}, {"authorId": "11773844", + "name": "J. Butaye"}]}, {"paperId": "96bc71e4dc316ae7720e86c3fe53f4c88d3eb833", + "externalIds": {"DBLP": "journals/jacm/JainJUW11", "MAG": "3037978064", "ArXiv": + "0907.4737", "DOI": "10.1145/2049697.2049704", "CorpusId": 1372332}, "corpusId": + 1372332, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/96bc71e4dc316ae7720e86c3fe53f4c88d3eb833", "title": "QIP = PSPACE", "abstract": "This work considers the quantum interactive proof system model of computation, which is the (classical) interactive proof system model\u2019s natural quantum computational analogue. An exact characterization @@ -44562,136 +50211,128 @@ interactions: it is well known that the collection of computational problems having classical interactive proof systems coincides with those problems solvable by polynomial-space computations.", "venue": "JACM", "year": 2009, "referenceCount": 75, "citationCount": - 101, "influentialCitationCount": 9, "isOpenAccess": false, "fieldsOfStudy": - ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-07-27", "journal": {"name": "J. - ACM", "pages": "30:1-30:27", "volume": "58"}, "authors": [{"authorId": "145758609", - "name": "Rahul Jain"}, {"authorId": "49954330", "name": "Zhengfeng Ji"}, {"authorId": - "33827066", "name": "Sarvagya Upadhyay"}, {"authorId": "145264143", "name": - "J. Watrous"}]}, {"paperId": "10e44bced88809faeff9ca897e501647f88a8bea", "externalIds": - {"DBLP": "conf/stacs/Sauerhoff98", "MAG": "1608148480", "DOI": "10.1007/BFb0028553", - "CorpusId": 1473283}, "url": "https://www.semanticscholar.org/paper/10e44bced88809faeff9ca897e501647f88a8bea", - "title": "Lower Bounds for Randomized Read-k-Times Branching Programs (Extended - Abstract)", "abstract": null, "venue": "Symposium on Theoretical Aspects of - Computer Science", "year": 1998, "referenceCount": 32, "citationCount": 25, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", - "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1998-02-25", "journal": {"pages": "105-115"}, - "authors": [{"authorId": "1786034", "name": "Martin Sauerhoff"}]}, {"paperId": - "3d4d36e6e54353084a3edf59cc22857df5b67ae9", "externalIds": {"DBLP": "journals/gpem/SekaninaA05", - "MAG": "1498570123", "DOI": "10.1007/s10710-005-3718-x", "CorpusId": 6950652}, - "url": "https://www.semanticscholar.org/paper/3d4d36e6e54353084a3edf59cc22857df5b67ae9", - "title": "Evolvable Components\u2014From Theory to Hardware Implementations", - "abstract": null, "venue": "Genetic Programming and Evolvable Machines", "year": - 2005, "referenceCount": 0, "citationCount": 121, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": null, "journal": {"name": "Genetic Programming - and Evolvable Machines", "pages": "461-462", "volume": "6"}, "authors": [{"authorId": - "1682273", "name": "L. Sekanina"}, {"authorId": "143874442", "name": "T. Arslan"}]}, - {"paperId": "8a945f992012bd77265689da7042c07ee39c4085", "externalIds": {"MAG": - "1829060681", "DBLP": "journals/computability/Soler-ToscanoZDG13", "ArXiv": - "1211.4891", "DOI": "10.3233/COM-13019", "CorpusId": 16435614}, "url": "https://www.semanticscholar.org/paper/8a945f992012bd77265689da7042c07ee39c4085", - "title": "Correspondence and Independence of Numerical Evaluations of Algorithmic - Information Measures", "abstract": "We show that real-value approximations - of Kolmogorov-Chaitin (K_m) using the algorithmic Coding theorem as calculated - from the output frequency of a large set of small deterministic Turing machines - with up to 5 states (and 2 symbols), is in agreement with the number of instructions - used by the Turing machines producing s, which is consistent with strict integer-value - program-size complexity. Nevertheless, K_m proves to be a finer-grained measure - and a potential alternative approach to lossless compression algorithms for - small entities, where compression fails. We also show that neither K_m nor - the number of instructions used shows any correlation with Bennett''s Logical - Depth LD(s) other than what''s predicted by the theory. The agreement between - theory and numerical calculations shows that despite the undecidability of - these theoretical measures, approximations are stable and meaningful, even - for small programs and for short strings. We also announce a first Beta version - of an Online Algorithmic Complexity Calculator (OACC), based on a combination - of theoretical concepts, as a numerical implementation of the Coding Theorem - Method.", "venue": "De Computis", "year": 2012, "referenceCount": 26, "citationCount": - 47, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-11-20", "journal": {"name": "ArXiv", - "volume": "abs/1211.4891"}, "authors": [{"authorId": "1389866422", "name": - "F. Soler-Toscano"}, {"authorId": "66445647", "name": "H. Zenil"}, {"authorId": - "2027817702", "name": "J. Delahaye"}, {"authorId": "3159526", "name": "N. - Gauvrit"}]}, {"paperId": "fc4475bba885d796868e784294b824f87eea5fbd", "externalIds": - {"MAG": "2143000126", "DOI": "10.2174/1874226200902010009", "CorpusId": 16537269}, - "url": "https://www.semanticscholar.org/paper/fc4475bba885d796868e784294b824f87eea5fbd", - "title": "Histamine, Histamine Receptors, and their Role in Immunomodulation: - An Updated Systematic Review", "abstract": "Histamine, a biological amine, - is considered as a principle mediator of many pathological processes regulating - several essential events in allergies and autoimmune diseases. It stimulates - different biological activities through differen- tial expression of four - types of histamine receptors (H1R, H2R, H3R and H4R) on secretion by effector - cells (mast cells and basophils) through various immunological or non-immunological - stimuli. Since H4R has been discovered very re- cently and there is paucity - of comprehensive literature covering new histamine receptors, their antagonists/agonists, - and role in immune regulation and immunomodulation, we tried to update the - current aspects and fill the gap in existing litera- ture. This review will - highlight the biological and pharmacological characterization of histamine, - histamine receptors, their antagonists/agonists, and implications in immune - regulation and immunomodulation.", "venue": "", "year": 2009, "referenceCount": - 463, "citationCount": 96, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "2009-03-04", "journal": {"name": "The Open Immunology - Journal", "pages": "9-41", "volume": "2"}, "authors": [{"authorId": "48406460", - "name": "M. Shahid"}, {"authorId": "10661375", "name": "T. Tripathi"}, {"authorId": - "14714760", "name": "F. Sobia"}, {"authorId": "51909226", "name": "S. Moin"}, - {"authorId": "13374373", "name": "M. Siddiqui"}, {"authorId": "5471551", "name": - "R. Khan"}]}, {"paperId": "4cce6ebe0c2b584f088ae88b01f19dbde6dd6bcb", "externalIds": - {"DBLP": "journals/ijfcs/BeggsCPT14", "MAG": "2140453444", "DOI": "10.1142/S0129054114400012", - "CorpusId": 33246087}, "url": "https://www.semanticscholar.org/paper/4cce6ebe0c2b584f088ae88b01f19dbde6dd6bcb", - "title": "An analogue-Digital Church-Turing Thesis", "abstract": "We argue - that dynamical systems involving discrete and continuous data can be modelled - by Turing machines with oracles that are physical processes. Using the theory - introduced in Beggs et al. [2,3], we consider the scope and limits of polynomial - time computations by such systems. We propose a general polynomial time Church-Turing - Thesis for feasible computations by analogue-digital systems, having the non-uniform - complexity class BPP//log* as theoretical upper bound. We show why BPP//log* - should be replace P/poly, which was proposed by Siegelmann for neural nets - [23,24]. Then we examine whether other sources of hypercomputation can be - found in analogue-digital systems besides the oracle itself. We prove that - the higher polytime limit P/poly can be attained via non-computable analogue-digital - interface protocols.", "venue": "International Journal of Foundations of Computer - Science", "year": 2014, "referenceCount": 33, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 102, "influentialCitationCount": 9, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-07-27", "journal": + {"name": "J. ACM", "pages": "30:1-30:27", "volume": "58"}, "authors": [{"authorId": + "145758609", "name": "Rahul Jain"}, {"authorId": "49954330", "name": "Zhengfeng + Ji"}, {"authorId": "33827066", "name": "Sarvagya Upadhyay"}, {"authorId": + "145264143", "name": "J. Watrous"}]}, {"paperId": "794b6173cdfaed13995bae8871c5175a879ba9a6", + "externalIds": {"DBLP": "journals/tsp/BudianuBT06", "MAG": "2110935968", "DOI": + "10.1109/TSP.2006.871973", "CorpusId": 10844061}, "corpusId": 10844061, "publicationVenue": + {"id": "1f6f3f05-6a23-42f0-8d31-98ab8089c1f2", "name": "IEEE Transactions + on Signal Processing", "type": "journal", "alternate_names": ["IEEE Trans + Signal Process"], "issn": "1053-587X", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=78", + "alternate_urls": ["http://www.signalprocessingsociety.org/publications/periodicals/tsp/", + "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=78"]}, "url": "https://www.semanticscholar.org/paper/794b6173cdfaed13995bae8871c5175a879ba9a6", + "title": "Estimation of the number of operating sensors in large-scale sensor + networks with mobile access", "abstract": "This paper investigates the estimation + of the number of operating sensors in a sensor network in which the data collection + is made by a mobile access point. In this paper, an estimator based on the + Good-Turing estimator of the missing mass is proposed and it is generalized + to other related problems such as the estimation of the distribution of energy + available at sensors. The estimator is analyzed using the theory of large + deviations. Closed-form bounds on the large deviation exponent are presented + and confidence intervals for the estimator are characterized.", "venue": "IEEE + Transactions on Signal Processing", "year": 2006, "referenceCount": 17, "citationCount": + 57, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "http://acsp.ece.cornell.edu/papers/BudianuBenDavidTong05SP.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Int. J. Found. Comput. Sci.", "pages": "373-390", - "volume": "25"}, "authors": [{"authorId": "1919705", "name": "E. Beggs"}, - {"authorId": "143698164", "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": - "2455322", "name": "Diogo Po\u00e7as"}, {"authorId": "145744796", "name": - "J. V. Tucker"}]}, {"paperId": "ea9167f9b1bdbb8571b3271944d407e77647a3b1", - "externalIds": {"MAG": "53636707", "DOI": "10.1093/acprof:oso/9780199574131.003.0011", - "CorpusId": 59633987}, "url": "https://www.semanticscholar.org/paper/ea9167f9b1bdbb8571b3271944d407e77647a3b1", - "title": "Turing machines and causal mechanisms in cognitive science", "abstract": - "Turing machines are simple computational entities which were originally used - to define the class of computational tasks that may be carried out by mechanical - means. In this article we look at the explanatory roles the Turing Machine - 2 plays in cognitive science. With respect to Turing Machines\u2019 explanatory - role, we assume that a) rational processes may be defined in such a way (viz. - as computational functions) that they can be carried out by mechanical systems, - and b) the Turing Machine specifies a means whereby one can show that a mechanistic - system can be designed to perform rational processes.", "venue": "", "year": - 2011, "referenceCount": 31, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1975758", - "name": "O. Lappi"}, {"authorId": "1933236", "name": "Anna-Mari Rusanen"}]}, + "2006-05-01", "journal": {"name": "IEEE Transactions on Signal Processing", + "pages": "1703-1715", "volume": "54"}, "authors": [{"authorId": "2885463", + "name": "C. Budianu"}, {"authorId": "1409749316", "name": "S. Ben-David"}, + {"authorId": "145120197", "name": "L. Tong"}]}, {"paperId": "246df03f6040f73ee31c2399e67dfc038db83164", + "externalIds": {"MAG": "2039310436", "DOI": "10.1145/1247066.1247068", "CorpusId": + 830317}, "corpusId": 830317, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/246df03f6040f73ee31c2399e67dfc038db83164", + "title": "Computational complexity and G\u00f6del''s incompleteness theorem", + "abstract": "Given any simply consistent formal theory F of the state complexity + L(S) of finite binary sequences S as computed by 3-tape-symbol Turing machines, + there exists a natural number L(F) such that L(S) > n is provable in F only + if n < L(F). On the other hand, almost all finite binary sequences S satisfy + L(S) < L(F). The proof resembles Berry''s paradox, not the Epimenides nor + Richard paradoxes.", "venue": "SIGA", "year": 1971, "referenceCount": 4, "citationCount": + 41, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1971-04-01", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "1756533", "name": "G. Chaitin"}]}, + {"paperId": "47fdec93b996ab2cbdf7a55d8d09036aa46cbdc7", "externalIds": {"MAG": + "2062653088", "DOI": "10.1103/PHYSREVE.62.113", "CorpusId": 2503277, "PubMed": + "11088442"}, "corpusId": 2503277, "publicationVenue": {"id": "f7dc890d-13a2-4e06-9f76-95c9fd4f8def", + "name": "Physical review. E, Statistical physics, plasmas, fluids, and related + interdisciplinary topics", "alternate_names": ["Phys rev Stat phys plasma + fluid relat interdiscip top"], "issn": "1063-651X", "alternate_issns": ["1095-3787"], + "url": "http://ejournals.ebsco.com/direct.asp?JournalID=101127", "alternate_urls": + ["https://journals.aps.org/pre/", "http://pre.aps.org/", "http://prola.aps.org/"]}, + "url": "https://www.semanticscholar.org/paper/47fdec93b996ab2cbdf7a55d8d09036aa46cbdc7", + "title": "Non-turing stationary patterns in flow-distributed oscillators with + general diffusion and flow rates", "abstract": "An analytical prediction [P. + Andresen et al., Phys. Rev. E 60, 297 (1999)] and its experimental confirmation + [M. Kaern et al., Phys. Rev. E 60, 3471 (1999)] establish a mechanism for + forming stationary, space-periodic structures in a reactive flow (reaction-diffusion-convection + system) with equal diffusion and flow rates. In this paper we generalize the + analysis to systems with unequal diffusion and flow rates. Interestingly, + stationary waves also exist outside the oscillatory Hopf domain of the batch + system-hence the parameter space in which these structures exist is bigger + than that initially predicted [P. Andresen et al., Phys. Rev. E. 60, 297 (1999)] + (for equal diffusion and flow rates). On the other hand, we find that these + stationary waves exist only for parameter values outside of and up to the + Turing regime. We clarify the nature of the instability in terms of a boundary-forcing + problem, whereby a time-periodic pattern is carried over the whole domain + by the flow while the phase is fixed at the inflow boundary.", "venue": "Physical + review. E, Statistical physics, plasmas, fluids, and related interdisciplinary + topics", "year": 2000, "referenceCount": 0, "citationCount": 44, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-07-01", "journal": {"name": "Physical review. E, Statistical physics, + plasmas, fluids, and related interdisciplinary topics", "pages": "\n 113-9\n ", + "volume": "62 1 Pt A"}, "authors": [{"authorId": "30134087", "name": "Satnoianu"}, + {"authorId": "121778916", "name": "Menzinger"}]}, {"paperId": "6b0a2cad65e6edadf0ac665c7d85507ac195cfd4", + "externalIds": {"MAG": "1620491971", "DOI": "10.1109/SEEP.1996.534015", "CorpusId": + 8642211}, "corpusId": 8642211, "publicationVenue": {"id": "73965ec4-94de-403c-9010-c6ba4ea68554", + "name": "Proceedings / International Conference of Software Engineering", + "alternate_names": ["Proc Int Conf Softw Eng"], "issn": "0270-5257", "alternate_issns": + ["1558-1225"], "url": "http://portal.acm.org/browse_dl.cfm?CFID=2396100&CFTOKEN=36932879&coll=portal&dl=ACM&idx=SERIES402&linked=1&part=series", + "alternate_urls": ["http://portal.acm.org/browse_dl.cfm?idx=SERIES402&linked=1&part=series", + "http://portal.acm.org/proceedings/icse", "http://csdl2.computer.org/persagen/ProceedingByFilter.jsp?filter=I", + "http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000691"]}, "url": "https://www.semanticscholar.org/paper/6b0a2cad65e6edadf0ac665c7d85507ac195cfd4", + "title": "Seven deadly sins of introductory programming language design", + "abstract": "Discusses seven undesirable features that are common to many + programming languages used to teach first-time programmers: (1) less is more; + (2) more is more; (3) grammatical traps; (4) hardware dependence; (5) backwards + compatibility; (6) excessive cleverness; and (7) violation of expectations. + We illustrate typical pedagogical difficulties which stem from these features, + with examples drawn from the programming languages ABC, Ada, C, C++, Eiffel, + Haskell, LISP, Modula 3, Pascal, Prolog, Scheme and Turing. We propose seven + language design (or selection) principles which may reduce the incidence of + such undesirable features: (1) start where the novice is; (2) differentiate + semantics with syntax; (3) make the syntax readable and consistent; (4) provide + a small and orthogonal set of features; (5) be especially careful with I/O; + (6) provide better error diagnosis; and (7) choose a suitable level of abstraction.", + "venue": "Proceedings / International Conference of Software Engineering", + "year": 1996, "referenceCount": 31, "citationCount": 102, "influentialCitationCount": + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Conference"], "publicationDate": "1996-01-24", "journal": + {"name": "Proceedings 1996 International Conference Software Engineering: + Education and Practice", "pages": "309-316"}, "authors": [{"authorId": "2992163", + "name": "Linda McIver"}, {"authorId": "145121163", "name": "D. Conway"}]}, {"paperId": "c94791acb7e98cfb5b7d98a9be019b32dff7e7a3", "externalIds": {"MAG": - "1535610840", "DOI": "10.2307/2267221", "CorpusId": 117045955}, "url": "https://www.semanticscholar.org/paper/c94791acb7e98cfb5b7d98a9be019b32dff7e7a3", + "1535610840", "DOI": "10.2307/2267221", "CorpusId": 117045955}, "corpusId": + 117045955, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/c94791acb7e98cfb5b7d98a9be019b32dff7e7a3", "title": "Review: S. C. Kleene, On the Interpretation of Intuitionistic Number Theory", "abstract": "code word Q is equivalent to the decision problem whether P is transformable to Q in the corresponding semi-Thue system. (2) For a certain @@ -44741,197 +50382,70 @@ interactions: is straightforward. The machines used were not what Post calls Turing convention-machines. S. C. KLEENB", "venue": "Journal of Symbolic Logic (JSL)", "year": 1947, "referenceCount": 0, "citationCount": 15, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1947-09-01", "journal": - {"name": "Journal of Symbolic Logic", "pages": "91 - 93", "volume": "12"}, - "authors": [{"authorId": "16919355", "name": "A. Mostowski"}]}, {"paperId": - "525b9f410e3ccb466b22a99405c901e86d8615a5", "externalIds": {"MAG": "2121140357", - "DOI": "10.1093/PHILMAT/3.1.86", "CorpusId": 123119661}, "url": "https://www.semanticscholar.org/paper/525b9f410e3ccb466b22a99405c901e86d8615a5", - "title": "Intuitionists Are Not (Turing) Machines", "abstract": "Lucas and - Penrose have contended that, by displaying how any characterisation of arithmetical - proof programmable into a machine allows of diagonalisation, generating a - humanly recognisable proof which eludes that characterisation, Gddel''s incompleteness - theorem rules out any purely mechanical model of the human intellect. The - main criticisms of this argument have been that the proof generated by diagonalisation - (i) will not be humanly recognisable unless humans can grasp the specification - of the object-system (Benacerraf); and (ii) counts as a proof only on the - (iinproven) hypothesis that the object system is consistent (Putnam). The - present paper argues that criticism (ii) may be met head-on by an intuitionistic - proponent of the anti-mechanist argument; and that criticism (i) is simply - mistaken. However the paper concludes by questioning the sufficiency of the - situation for an interesting anti-mechanist conclusion. u Thanks to Bob Hale, - Stewart Shapiro and Neil Tennant for criticisms of an earlier draft, and to - the participants at the Conference on the philosophy of Michael Dummett held - at Mussomeli, Sicily, in September 1992 at which a version of the principal - argument was presented. Downloaded from https://academic.oup.com/philmat/article-abstract/3/1/86/1508324 - by University of St Andrews user on 21 November 2017", "venue": "", "year": - 1995, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Philosophia Mathematica", "pages": "86-102", "volume": - "3"}, "authors": [{"authorId": "144728712", "name": "C. Wright"}]}, {"paperId": - "4b37285871d88bf7cd7610151b6e5096ae2d91d7", "externalIds": {"DBLP": "journals/ijfcs/Gradel90", - "MAG": "2030147970", "DOI": "10.1142/S0129054190000217", "CorpusId": 45976299}, - "url": "https://www.semanticscholar.org/paper/4b37285871d88bf7cd7610151b6e5096ae2d91d7", - "title": "On the Notion of Linear Time Computability", "abstract": "To capture - the informal concept of linear time computability, we propose and discuss - the class TIME(n1+), consisting of all functions which are computable by a - Successor RAM with exponent at most one; the exponent of a function is the - infimum of all rational numbers r such that the function is computable in - time O(nr). This class properly contains the class NLT (\u201cNearly Linear - Time\u201d)\u2014proposed by Gurevich and Shelah\u2014which contains all functions - computable by a Successor RAM in time O(n(log n)k) for some k\u2208N. Both - classes are very robust under changes of the underlying machine model: using - the same time bounds they can be defined by Random Access Computers, Storage - Modification Machines, Kolmogorov algorithms, Random Access Turing machines - etc.; this distinguishes them from similar classes defined by ordinary Turing - machines. However, we show that TIME(n1+) can be defined e.g. by multi-dimensional - Turing machines or by Turing machines which can jump; this is probably not - true for NLT. Furthermore we consider two notions of completeness for TIME(n1+) - and construct complete problems. These problems are based on restrictions - of Gurevich\u2019s function logic for P.", "venue": "International Journal - of Foundations of Computer Science", "year": 1990, "referenceCount": 0, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1990-09-01", "journal": {"name": "Int. J. Found. Comput. Sci.", "pages": - "295-308", "volume": "1"}, "authors": [{"authorId": "1749375", "name": "E. - Gr\u00e4del"}]}, {"paperId": "e6ee9c596cf17612738a0e80fab2cf04c11cd8e5", "externalIds": - {"MAG": "2039891678", "DOI": "10.2514/1.40461", "CorpusId": 18673661}, "url": - "https://www.semanticscholar.org/paper/e6ee9c596cf17612738a0e80fab2cf04c11cd8e5", - "title": "Modal Analysis of a Nonlinear Periodic Structure with Cyclic Symmetry", - "abstract": "This paper carries out modal analysis of a nonlinear periodic - structure with cyclic symme- \ntry. The nonlinear normal mode (NNM) theory - is brie\u00b0y described, and a computational \nalgorithm for the NNM computation - is presented. The results obtained on a simpli\u00afed \nmodel of a bladed - assembly show that this system possesses a very complicated struc- \nture - of NNMs, including similar and nonsimilar NNMs, nonlocalized and localized - NNMs, \nbifurcating and internally resonant NNMs. Modal interactions that - occur without neces- \nsarily having commensurate natural frequencies in the - underlying linear system are also \ndiscussed.", "venue": "", "year": 2009, - "referenceCount": 39, "citationCount": 58, "influentialCitationCount": 3, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-04-01", - "journal": {"name": "AIAA Journal", "pages": "1014-1025", "volume": "47"}, - "authors": [{"authorId": "122982459", "name": "Fostios Georgiades"}, {"authorId": - "81122228", "name": "M. Peeters"}, {"authorId": "49160435", "name": "G. Kerschen"}, - {"authorId": "2562328", "name": "J. Golinval"}, {"authorId": "31488914", "name": - "M. Ruzzene"}]}, {"paperId": "8f091c61350de05ae113e5c8460ca1b6b647007b", "externalIds": - {"MAG": "2149013205", "DOI": "10.1093/IMAMAT/61.1.15", "CorpusId": 1049611}, - "url": "https://www.semanticscholar.org/paper/8f091c61350de05ae113e5c8460ca1b6b647007b", - "title": "Turing instability and travelling waves in diffusive plankton models - with delayed nutrient recycling", "abstract": "In this paper we propose a - reaction-diffusion system with two distributed delays to stimulate the growth - of plankton communities in the lakes/oceans in which the plankton feeds on - a limiting nutrient supplied at a constant rate. The limiting nutrient is - partially recycled after the death of the organisms and a distributed delay - is used to model nutrient recycling. The second delay is involved in the growth - response of the plankton to nutrient uptake. We first show that there are - oscillations (Hopf bifurcations) in the delay model induced by the second - delay. Then we study Turing (diffusion-driven) instability of the reaction-diffusion - system with delay. Finally, it is shown that if the delay model has a stable - periodic solution, then the corresponding reaction-diffusion model with delay - has a family of travelling waves.", "venue": "", "year": 1998, "referenceCount": - 39, "citationCount": 44, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-09-01", "journal": {"name": - "Ima Journal of Applied Mathematics", "pages": "15-32", "volume": "61"}, "authors": - [{"authorId": "145809344", "name": "S. Ruan"}]}, {"paperId": "5eb03792223067a7cf90343abc98aa55d1c14e0d", - "externalIds": {"MAG": "1505876086", "DBLP": "conf/mfcs/DammH95", "DOI": "10.1007/3-540-60246-1_121", - "CorpusId": 14837273}, "url": "https://www.semanticscholar.org/paper/5eb03792223067a7cf90343abc98aa55d1c14e0d", - "title": "Automata That Take Advice", "abstract": null, "venue": "MFCS", "year": - 1995, "referenceCount": 19, "citationCount": 32, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1995-08-28", "journal": {"pages": "149-158"}, - "authors": [{"authorId": "145907449", "name": "C. Damm"}, {"authorId": "3387071", - "name": "M. Holzer"}]}, {"paperId": "8b8b07d933a68070b61454b38236dab6b9aac298", - "externalIds": {"DBLP": "conf/lics/Bickford0CR18", "MAG": "2798735574", "DOI": - "10.1145/3209108.3209200", "CorpusId": 49354258}, "url": "https://www.semanticscholar.org/paper/8b8b07d933a68070b61454b38236dab6b9aac298", - "title": "Computability Beyond Church-Turing via Choice Sequences", "abstract": - "Church-Turing computability was extended by Brouwer who considered non-lawlike - computability in the form of free choice sequences. Those are essentially - unbounded sequences whose elements are chosen freely, i.e. not subject to - any law. In this work we develop a new type theory BITT, which is an extension - of the type theory of the Nuprl proof assistant, that embeds the notion of - choice sequences. Supporting the evolving, non-deterministic nature of these - objects required major modifications to the underlying type theory. Even though - the construction of a choice sequence is non-deterministic, once certain choices - were made, they must remain consistent. To ensure this, BITT uses the underlying - library as state and store choices as they are created. Another salient feature - of BITT is that it uses a Beth-like semantics to account for the dynamic nature - of choice sequences. We formally define BITT and use it to interpret and validate - essential axioms governing choice sequences. These results provide a foundation - for a fully intuitionistic version of Nuprl.", "venue": "LICS", "year": 2018, - "referenceCount": 78, "citationCount": 16, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1947-09-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "91 + - 93", "volume": "12"}, "authors": [{"authorId": "16919355", "name": "A. Mostowski"}]}, + {"paperId": "7f04976656b2336c9a124918b72bd80454eff789", "externalIds": {"MAG": + "2097443371", "DBLP": "conf/sigir/GaoYLDN09", "DOI": "10.1145/1571941.1572003", + "CorpusId": 2955798}, "corpusId": 2955798, "publicationVenue": {"id": "8dce23a9-44e0-4381-a39e-2acc1edff700", + "name": "Annual International ACM SIGIR Conference on Research and Development + in Information Retrieval", "type": "conference", "alternate_names": ["International + ACM SIGIR Conference on Research and Development in Information Retrieval", + "Int ACM SIGIR Conf Res Dev Inf Retr", "SIGIR", "Annu Int ACM SIGIR Conf Res + Dev Inf Retr"], "url": "http://www.acm.org/sigir/"}, "url": "https://www.semanticscholar.org/paper/7f04976656b2336c9a124918b72bd80454eff789", + "title": "Smoothing clickthrough data for web search ranking", "abstract": + "Incorporating features extracted from clickthrough data (called clickthrough + features) has been demonstrated to significantly improve the performance of + ranking models for Web search applications. Such benefits, however, are severely + limited by the data sparseness problem, i.e., many queries and documents have + no or very few clicks. The ranker thus cannot rely strongly on clickthrough + features for document ranking. This paper presents two smoothing methods to + expand clickthrough data: query clustering via Random Walk on click graphs + and a discounting method inspired by the Good-Turing estimator. Both methods + are evaluated on real-world data in three Web search domains. Experimental + results show that the ranking models trained on smoothed clickthrough features + consistently outperform those trained on unsmoothed features. This study demonstrates + both the importance and the benefits of dealing with the sparseness problem + in clickthrough data.", "venue": "Annual International ACM SIGIR Conference + on Research and Development in Information Retrieval", "year": 2009, "referenceCount": + 27, "citationCount": 101, "influentialCitationCount": 13, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Book", "Conference"], "publicationDate": "2018-07-09", "journal": {"name": - "Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science"}, - "authors": [{"authorId": "2487425", "name": "M. Bickford"}, {"authorId": "2432326", - "name": "L. Cohen"}, {"authorId": "1774802", "name": "R. Constable"}, {"authorId": - "1747084", "name": "Vincent Rahli"}]}, {"paperId": "7c03dd00c68fa459eeae92d51993c480c332e8c4", - "externalIds": {"MAG": "2150917454", "DOI": "10.1080/10002007088537484", "CorpusId": - 56682506}, "url": "https://www.semanticscholar.org/paper/7c03dd00c68fa459eeae92d51993c480c332e8c4", - "title": "A language for easy and efficient modeling of Turing machines", - "abstract": "Abstract A Turning Machine Description Language (TMDL) is developed - for easy and efficient modeling of Turing machines. TMDL supports formal symbolic - representation of Turing machines. The grammar for the language is also provided. - Then a fast single-pass complier is developed for TMDL. The scope of code - optimization in the complier is examined. An interpreter is used to simulate - the exact behavior of the compiled Turning machines. A dynamically allocated - and resizable array is used to simulate the infinite tape of a Turing machine. - The procedure for simulating composite Turing machines is also explained. - In this paper, two sample Turing machines have been designed in TMDL and their - simulations are discussed. The TMDL can be extended to model the different - variations of the standard Turing machine.", "venue": "", "year": 2007, "referenceCount": - 2, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2007-08-10", - "journal": {"name": "Progress in Natural Science", "pages": "867-871", "volume": - "17"}, "authors": [{"authorId": "46823505", "name": "P. Chakraborty"}]}, {"paperId": - "cfe2aacde13581d2da12d529bc2155adf98e337a", "externalIds": {"CorpusId": 9292716}, - "url": "https://www.semanticscholar.org/paper/cfe2aacde13581d2da12d529bc2155adf98e337a", - "title": "Series Recursively Enumerable Reals and Chaitin Numbers", "abstract": - "A real is called recursively enumerable if it can be approximated by an increasing, - recursive sequence of rationals. The halting probability of a universal selfdelimiting - Turing machine (Chaitin''s number, [10]) is a random r.e. real. Solovay''s - [25] -like reals are also random r.e. reals. Solovay showed that any Chaitin - number is -like. In this paper we show that the converse implication is true - as well: any -like real in the unit interval is the halting probability of - a universal self-delimiting Turing machine. Following Solovay [25] and Chaitin - [11] we say that an r.e. real dominates an r.e. real if from a good approximation - of from below one can compute a good approximation of from below. We shall - study this relation and characterize it in terms of relations between r.e. - sets. -like numbers are the maximal r.e. real numbers with respect to this - order, that is, from a good approximation to an -like real one can compute - a good approximation for every r.e. real. This property shows the strength - of for approximation purposes. However, the situation is radically di erent - if one wishes to compute digits of the binary expansion of an r.e. real: one - cannot compute with a total recursive function the rst n digits of the r.e. - real 0: K (the characteristic sequence of the halting problem) from the rst - g(n) digits of , for any total recursive function g. The rst and third authors - were partially supported by AURC A18/XXXXX/62090/F3414056, 1996. The second - author was supported by DFG Research Grant No. HE 2489/2-1, and the fourth - author was supported by a UARC Post-Doctoral Fellowship.", "venue": "", "year": - 1997, "referenceCount": 34, "citationCount": 77, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "1685717", "name": "Cristian - S. Calude"}, {"authorId": "1785054", "name": "Peter Hertling"}, {"authorId": - "1703048", "name": "B. Khoussainov"}, {"authorId": "2108771041", "name": "Yongge - Wang"}]}, {"paperId": "02ec772690ceec3671688a182fb24d5fcbe92c6e", "externalIds": - {"MAG": "2096465506", "DOI": "10.1111/1467-9299.00190", "CorpusId": 145624849}, - "url": "https://www.semanticscholar.org/paper/02ec772690ceec3671688a182fb24d5fcbe92c6e", + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "2009-07-19", "journal": {"name": "Proceedings + of the 32nd international ACM SIGIR conference on Research and development + in information retrieval"}, "authors": [{"authorId": "1800422", "name": "Jianfeng + Gao"}, {"authorId": "2114108486", "name": "Wei Yuan"}, {"authorId": "2108787178", + "name": "Xiao Li"}, {"authorId": "1796862", "name": "Kefeng Deng"}, {"authorId": + "143619007", "name": "Jian-Yun Nie"}]}, {"paperId": "65ba7550c9a8e843d1f2c9758f23f6f64b197eb9", + "externalIds": {"MAG": "2003874726", "DOI": "10.1111/1540-6229.00659", "CorpusId": + 154101866}, "corpusId": 154101866, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/65ba7550c9a8e843d1f2c9758f23f6f64b197eb9", + "title": "Market Microstructure and Real Estate Returns", "abstract": "This + paper examines the Real Estate Investment Trust (REIT) market microstruc-ture + and its relationship to stock returns. When compared with the general stock + market, REIT stocks tend to have a lower level of institutional investor participation + and are followed by fewer security analysts. In addition, REIT stocks that + have a higher percentage of institutional investors or are followed by more + security analysts tend to perform better than other REIT stocks. Our results + seem to confirm Jensen''s (1993, p. 868) proposition that ownership structure + (that is, who owns the firm''s securities) affects the value of the firm. + Our findings also have implications about the well documented phenomenon that + the financial performance of Commingled Real Estate Funds (CREFs) is better + than that of REITs. Copyright American Real Estate and Urban Economics Association.", + "venue": "", "year": 1995, "referenceCount": 24, "citationCount": 103, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Economics"], + "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1995-03-01", + "journal": {"name": "Real Estate Economics", "pages": "85-100", "volume": + "23"}, "authors": [{"authorId": "2115938669", "name": "Ko Wang"}, {"authorId": + "2054916692", "name": "John Erickson"}, {"authorId": "103013300", "name": + "George W. Gau"}, {"authorId": "2148763860", "name": "Su Han Chan"}]}, {"paperId": + "02ec772690ceec3671688a182fb24d5fcbe92c6e", "externalIds": {"MAG": "2096465506", + "DOI": "10.1111/1467-9299.00190", "CorpusId": 145624849}, "corpusId": 145624849, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/02ec772690ceec3671688a182fb24d5fcbe92c6e", "title": "The tangled webs of Westminster and Whitehall : the discourse, strategy and practice of networking within the British core executive", "abstract": "In this paper we identify and seek to resolve a certain paradox in the existing @@ -44947,14 +50461,195 @@ interactions: to the policy process centred in and around Westminster and Whitehall, drawing on a series of semi-structured interviews with ministers and officials from four departments.", "venue": "", "year": 2000, "referenceCount": 0, "citationCount": - 101, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Political Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "Public Administration", - "pages": "1-28", "volume": "78"}, "authors": [{"authorId": "144641760", "name": - "C. Hay"}, {"authorId": "96434511", "name": "D. Richards"}]}, {"paperId": - "e138ca1305c924666108ef0f07e8488d399225bb", "externalIds": {"MAG": "2130666576", - "DOI": "10.1146/ANNUREV.PY.18.090180.002335", "CorpusId": 44078094}, "url": + 101, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Political Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Public + Administration", "pages": "1-28", "volume": "78"}, "authors": [{"authorId": + "144641760", "name": "C. Hay"}, {"authorId": "96434511", "name": "D. Richards"}]}, + {"paperId": "194d12d589deed75d3de398ad7700f4606b40dc6", "externalIds": {"MAG": + "2154689989", "DOI": "10.1111/J.1460-2695.2008.01259.X", "CorpusId": 138302900}, + "corpusId": 138302900, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/194d12d589deed75d3de398ad7700f4606b40dc6", + "title": "Use of the small punch test to determine the ductile\u2010to\u2010brittle + transition temperature of structural steels", "abstract": "The small punch + test (SPT) consists in punching very small square specimens, measuring 10 + \u00d7 10 mm 2 and 0.5-mm thickness, until fracture using a 2.5-mm-diameter + hemispher- ical punch. Different specimens of a structural steel were tested + from room temperature to cryogenic temperatures in order to determine its + ductile-to-brittle transition tempera- ture (DBTT). The DBTT obtained in SPT + (DBTTSTP) is much lower than the DBTT obtained by means of Charpy specimens + (DBTTCVN). The variation of the mechani- cal parameters calculated from the + SPTs with temperature was also calculated and the operative fracture micromechanisms + defined using a scanning electron microscope.", "venue": "", "year": 2008, + "referenceCount": 18, "citationCount": 57, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2008-09-01", "journal": {"name": "Fatigue & Fracture of + Engineering Materials & Structures", "pages": "727-737", "volume": "31"}, + "authors": [{"authorId": "145211466", "name": "M. Contreras"}, {"authorId": + "2107130494", "name": "C. Rodr\u00edguez"}, {"authorId": "117469142", "name": + "F. Belzunce"}, {"authorId": "103017274", "name": "C. Beteg\u00f3n"}]}, {"paperId": + "b01ae16fea20ec2f75ef31f75b1601ac4cf2fbc5", "externalIds": {"DBLP": "journals/corr/abs-1207-7148", + "MAG": "3098714529", "ArXiv": "1207.7148", "DOI": "10.4204/EPTCS.88.6", "CorpusId": + 2476000}, "corpusId": 2476000, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b01ae16fea20ec2f75ef31f75b1601ac4cf2fbc5", + "title": "A Formalization and Proof of the Extended Church-Turing Thesis -Extended + Abstract-", "abstract": "We prove the Extended Church-Turing Thesis: Every + effective algorithm can be efficiently simulated by a Turing machine. This + is accomplished by emulating an effective algorithm via an abstract state + machine, and simulating such an abstract state machine by a random access + machine, representing data as a minimal term graph.", "venue": "DCM", "year": + 2012, "referenceCount": 35, "citationCount": 14, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://arxiv.org/pdf/1207.7148", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-07-30", "journal": {"pages": "72-78"}, "authors": + [{"authorId": "1759551", "name": "N. Dershowitz"}, {"authorId": "2129723", + "name": "Evgenia Falkovich"}]}, {"paperId": "bdaef926fb4991e933bdfe3a69bb53817cec2a5f", + "externalIds": {"DBLP": "conf/lata/AxelsenG11", "MAG": "2246201930", "DOI": + "10.1007/978-3-642-21254-3_8", "CorpusId": 37657665}, "corpusId": 37657665, + "publicationVenue": {"id": "ad7f29e1-4723-49df-a0af-c78a8f3b68bc", "name": + "Language and Automata Theory and Applications", "type": "conference", "alternate_names": + ["LATA", "Lang Autom Theory Appl"], "url": "http://www.wikicfp.com/cfp/program?id=1940"}, + "url": "https://www.semanticscholar.org/paper/bdaef926fb4991e933bdfe3a69bb53817cec2a5f", + "title": "A Simple and Efficient Universal Reversible Turing Machine", "abstract": + null, "venue": "Language and Automata Theory and Applications", "year": 2011, + "referenceCount": 22, "citationCount": 22, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-05-26", "journal": + {"pages": "117-128"}, "authors": [{"authorId": "1751103", "name": "Holger + Bock Axelsen"}, {"authorId": "1700006", "name": "R. Gl\u00fcck"}]}, {"paperId": + "0986c2827397c315743302a1daf3144f2dc09108", "externalIds": {"MAG": "2138937860", + "DOI": "10.1177/0160449X0002500302", "CorpusId": 145285720}, "corpusId": 145285720, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0986c2827397c315743302a1daf3144f2dc09108", + "title": "Living Wage Campaigns From a \"Social Movement\" Perspective: The + Miami Case", "abstract": "This article uses the Miami living wage campaign + to examine the potential and limitations of living wage campaigns to build + enduring social movements which unite organized labor with community partners. + Using the tripartite framework derived from the social movement litera ture + of \"political opportunities,\" \"mobilizing structures,\" and \"framing processes,\" + the article analyzes this particular campaign to determine if a genuine social + movement emerged. Hecksher and Palmer''s thesis that organized labor as presently + constituted is incapable of forming egalitar ian multilateral alliances with + non-labor partners is tested, and sugges tions for \"best practice\" are developed.", + "venue": "", "year": 2000, "referenceCount": 17, "citationCount": 58, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Sociology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-09-01", "journal": {"name": "Labor Studies Journal", + "pages": "29 - 50", "volume": "25"}, "authors": [{"authorId": "97342525", + "name": "Bruce Nissen"}]}, {"paperId": "bb3663c5d8814b6de349917a56e64f02bb62b9ae", + "externalIds": {"MAG": "2017894499", "DBLP": "journals/ijse/VallverduSC10", + "DOI": "10.4018/jse.2010070102", "CorpusId": 8330784}, "corpusId": 8330784, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb3663c5d8814b6de349917a56e64f02bb62b9ae", + "title": "Chatterbox Challenge as a Test-Bed for Synthetic Emotions", "abstract": + "Chatterbox Challenge is an annual web-based contest for artificial conversational + systems, ACE. The 2010 instantiation was the tenth consecutive contest held + between March and June in the 60th year following the publication of Alan + Turing''s influential disquisition ''computing machinery and intelligence''. + Loosely based on Turing''s viva voca interrogator-hidden witness imitation + game, a thought experiment to ascertain a machine''s capacity to respond satisfactorily + to unrestricted questions, the contest provides a platform for technology + comparison and evaluation. This paper provides an insight into emotion content + in the entries since the 2005 Chatterbox Challenge. The authors find that + synthetic textual systems, none of which are backed by academic or industry + funding, are, on the whole and more than half a century since Weizenbaum''s + natural language understanding experiment, little further than Eliza in terms + of expressing emotion in dialogue. This may be a failure on the part of the + academic AI community for ignoring the Turing test as an engineering challenge.", + "venue": "Int. J. Synth. Emot.", "year": 2010, "referenceCount": 25, "citationCount": + 18, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2010-07-01", "journal": + {"name": "Int. J. Synth. Emot.", "pages": "12-37", "volume": "1"}, "authors": + [{"authorId": "1811807", "name": "Jordi Vallverd\u00fa"}, {"authorId": "2731715", + "name": "Huma Shah"}, {"authorId": "1847897", "name": "D. Casacuberta"}]}, + {"paperId": "29296ed6b5caf10e65e4052c089f32d8300b53a1", "externalIds": {"MAG": + "2333456792", "DOI": "10.4153/CMB-1961-031-9", "CorpusId": 123430014}, "corpusId": + 123430014, "publicationVenue": {"id": "41203780-6169-4cac-a2e9-a934650a12a1", + "name": "Canadian mathematical bulletin", "type": "journal", "alternate_names": + ["Can math bull", "Can Math Bull", "Canadian Mathematical Bulletin"], "issn": + "0008-4395", "url": "http://cms.math.ca/cmb/", "alternate_urls": ["http://www.cms.math.ca/cmb/", + "https://www.cambridge.org/core/journals/canadian-mathematical-bulletin"]}, + "url": "https://www.semanticscholar.org/paper/29296ed6b5caf10e65e4052c089f32d8300b53a1", + "title": "An Informal Arithmetical Approach to Computability and Computation", + "abstract": "In 1936 A. M. Turing published his analysis of the notion of + effective computability. Very roughly speaking, its object was to distinguish + between numbers defined by existential statements and those defined by purely + constructive ones. Guided by his schematizing of what goes on when a person + calculates using paper and pencil, Turing introduced the concept of an A-machine, + eventually to be called a Turing machine. Such a machine consists of a box + and a linear tape divided into squares, indefinitely long in both directions. + The tape passes through the box and exactly one square of it is always within + the box. The system changes only at certain discrete times: t = 0, 1, \u2026. + Each square can carry exactly one of the finite set of symbols: s1, s2, \u2026, + sn, one of which may be the blank.", "venue": "Canadian mathematical bulletin", + "year": 1961, "referenceCount": 0, "citationCount": 18, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.cambridge.org/core/services/aop-cambridge-core/content/view/C94994F05E6820B5014B7A3A14024726/S0008439500050955a.pdf/div-class-title-an-informal-arithmetical-approach-to-computability-and-computation-div.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1961-09-01", + "journal": {"name": "Canadian Mathematical Bulletin", "pages": "279 - 293", + "volume": "4"}, "authors": [{"authorId": "16679887", "name": "Z. A. Melzak"}]}, + {"paperId": "3d4d36e6e54353084a3edf59cc22857df5b67ae9", "externalIds": {"DBLP": + "journals/gpem/SekaninaA05", "MAG": "1498570123", "DOI": "10.1007/s10710-005-3718-x", + "CorpusId": 6950652}, "corpusId": 6950652, "publicationVenue": {"id": "6f4efebe-b0de-4221-9037-fe8d06c85a99", + "name": "Genetic Programming and Evolvable Machines", "type": "journal", "alternate_names": + ["Genet Program Evolvable Mach"], "issn": "1389-2576", "url": "https://link.springer.com/journal/10710"}, + "url": "https://www.semanticscholar.org/paper/3d4d36e6e54353084a3edf59cc22857df5b67ae9", + "title": "Evolvable Components\u2014From Theory to Hardware Implementations", + "abstract": null, "venue": "Genetic Programming and Evolvable Machines", "year": + 2005, "referenceCount": 0, "citationCount": 121, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, + "journal": {"name": "Genetic Programming and Evolvable Machines", "pages": + "461-462", "volume": "6"}, "authors": [{"authorId": "1682273", "name": "L. + Sekanina"}, {"authorId": "143874442", "name": "T. Arslan"}]}, {"paperId": + "51585d071d26bddc2a479ea1c19f6fc873ebf735", "externalIds": {"MAG": "2121293774", + "DOI": "10.1117/1.601340", "CorpusId": 312105}, "corpusId": 312105, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/51585d071d26bddc2a479ea1c19f6fc873ebf735", + "title": "Size distributions for multivariate morphological granulometries: + texture classification and statistical properties", "abstract": "As introduced + by Matheron (1975), granulometries depend on a single sizing parameter for + each structuring element forming the filter. Size distributions resulting + from these granulometries have been used to classify texture by using as features + the moments of the resulting pattern spectra. The concept of granulometry + is extended in such a way that each structuring element has its own sizing + parameter and the size dis- tribution is multivariate. Whereas with univariate + granulometries the nor- malized size distribution (pattern spectrum) is easily + shown to be a prob- ability distribution function, this proposition is more + difficult to show for multivariate granulometries. Its demonstration is the + main theoretical re- sult. The classical single-structuring-element granulometries + appear as marginal size distributions and the single-parameter multiple-structuring- + element granulometries result from setting all parameters equal in a mul- + tivariate granulometry. Because of the greatly expanded freedom in choosing + parameters, multivariate granulometries can discriminate tex- tures that are + indistinguishable using single-parameter granulometries. Texture classification + proceeds by taking either the Walsh or moment transform of the multivariate + pattern spectrum, obtaining a reduced fea- ture set by applying the Karhunen-Loeve + transform to the Walsh or mo- ment features, and classifying textures via + a Gaussian maximum- likelihood classifier. For the disjoint multiprimitive + random set model, multivariate granulometric moments are represented in terms + of sizing- distribution moments and shown to be asymptotically normal. Formulas + are given for their asymptotic mean and variance. \u00a9 1997 Society of Photo- + Optical Instrumentation Engineers. (S0091-3286(97)02705-0)", "venue": "", + "year": 1997, "referenceCount": 20, "citationCount": 48, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1997-05-01", "journal": {"name": "Optical Engineering", "pages": "1518-1529", + "volume": "36"}, "authors": [{"authorId": "2864277", "name": "S. Batman"}, + {"authorId": "1693776", "name": "E. Dougherty"}]}, {"paperId": "e138ca1305c924666108ef0f07e8488d399225bb", + "externalIds": {"MAG": "2130666576", "DOI": "10.1146/ANNUREV.PY.18.090180.002335", + "CorpusId": 44078094}, "corpusId": 44078094, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e138ca1305c924666108ef0f07e8488d399225bb", "title": "The Biology of Striga, Orobanche, and other Root-Parasitic Weeds", "abstract": "This review deals with higher plants that are parasitic on the @@ -44977,37 +50672,80 @@ interactions: parasitic monocots are known and there is only one parasitic gymnosperm, Parasitaxus ustus; this organism is endemic to New Caledonia-it has an unique host-parasite interface involving a graft\u00ad like union of tissue (L. J. Musselman, unpublished).", - "venue": "", "year": 1980, "referenceCount": 160, "citationCount": 289, "influentialCitationCount": - 13, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1980-09-01", "journal": - {"name": "Annual Review of Phytopathology", "pages": "463-489", "volume": - "18"}, "authors": [{"authorId": "7849502", "name": "L. Musselman"}]}, {"paperId": - "1de28df0898f72335dde087e3f6ecb54d1cd35e2", "externalIds": {"MAG": "2061408397", - "ArXiv": "0912.0043", "DOI": "10.1215/00127094-1444249", "CorpusId": 567346}, - "url": "https://www.semanticscholar.org/paper/1de28df0898f72335dde087e3f6ecb54d1cd35e2", - "title": "The space of stability conditions on the local projective plane", - "abstract": "We study the space of stability conditions on the total space - of the canonical bundle over the projective plane. We explicitly describe - a chamber of geometric stability conditions, and show that its translates - via autoequivalences cover a whole connected component. We prove that this - connected component is simply-connected. We determine the group of autoequivalences - preserving this connected component, which turns out to be closely related - to 1(3). Finally, we show that there is a submanifold isomorphic to the univer- - sal covering of a moduli space of elliptic curves with 1(3)-level struc- ture. - The morphism is 1(3)-equivariant, and is given by solutions of Picard-Fuchs - equations. This result is motivated by the notion of - stability and by mirror - symmetry.", "venue": "", "year": 2009, "referenceCount": 80, "citationCount": - 103, "influentialCitationCount": 13, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2009-12-01", "journal": {"name": "Duke Mathematical - Journal", "pages": "263-322", "volume": "160"}, "authors": [{"authorId": "1904087", - "name": "Arend Bayer"}, {"authorId": "97316415", "name": "Emanuele Macr\u00ec"}]}, - {"paperId": "fbd226482ed202bc0690ae7fad6008039de6dcfb", "externalIds": {"MAG": - "1785951909", "DOI": "10.4310/MAA.2001.V8.N3.A3", "CorpusId": 42449186}, "url": - "https://www.semanticscholar.org/paper/fbd226482ed202bc0690ae7fad6008039de6dcfb", + "venue": "", "year": 1980, "referenceCount": 160, "citationCount": 290, "influentialCitationCount": + 13, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}, {"category": "Environmental Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1980-09-01", "journal": {"name": "Annual Review of Phytopathology", "pages": + "463-489", "volume": "18"}, "authors": [{"authorId": "7849502", "name": "L. + Musselman"}]}, {"paperId": "9847441b8ed5c180dfb4e5d2956be24ac6a9dd47", "externalIds": + {"DBLP": "conf/eva/BowenG17", "MAG": "2753593866", "DOI": "10.14236/ewic/EVA2017.9", + "CorpusId": 36050872}, "corpusId": 36050872, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9847441b8ed5c180dfb4e5d2956be24ac6a9dd47", + "title": "Life in Code and Digits: When Shannon met Turing", "abstract": "Claude + Shannon (1916\u20132001) is regarded as the father of information theory. + Alan Turing (1912\u20131954) is known as the father of computer science. In + the year 1943, Shannon and Turing were both at Bell Labs in New York City, + although working on different projects. They had discussions \ntogether, including + about Turing\u2019s \u201cUniversal Machine,\u201d a type of computational + brain. Turing seems quite surprised that in a sea of code and computers, Shannon + envisioned the arts and \nculture as an integral part of the digital revolution + \u2013 a digital DNA of sorts. What was dreamlike in 1943, is today a reality, + as digital representation of all media, accounts for millions of \u201ccultural + things\u201d and massive music collections. The early connections that Shannon + made between the arts, information, and computing, intuit the future that + we are experiencing today. This paper considers foundational aspects of the + digital revolution, the current state, and the possible future. \nIt examines + how digital life is increasingly becoming part of real life for more and more + people around the world, especially with respect to the arts, culture, and + heritage.", "venue": "EVA", "year": 2017, "referenceCount": 41, "citationCount": + 17, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.scienceopen.com/document_file/94e7a73e-3f21-4da5-97a4-a5c9ed67ad75/ScienceOpen/051_Giannini.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2017-07-01", "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "1772040", "name": "Jonathan + P. Bowen"}, {"authorId": "3328121", "name": "Tula Giannini"}]}, {"paperId": + "1a493fb30f0175a4e0010397252907d189a80639", "externalIds": {"MAG": "2802780511", + "PubMedCentral": "5955598", "DOI": "10.1371/journal.pbio.2004877", "CorpusId": + 13710412, "PubMed": "29727442"}, "corpusId": 13710412, "publicationVenue": + {"id": "83ff973b-8a0e-4e00-a06a-2cfd9e222de9", "name": "PLoS Biology", "type": + "journal", "alternate_names": ["Plo Biology", "PLOS Biology", "PLO Biology"], + "issn": "1544-9173", "url": "http://www.pubmedcentral.nih.gov/tocrender.fcgi?journal=212", + "alternate_urls": ["http://www.plosbiology.org/", "https://journals.plos.org/plosbiology/"]}, + "url": "https://www.semanticscholar.org/paper/1a493fb30f0175a4e0010397252907d189a80639", + "title": "Robust stochastic Turing patterns in the development of a one-dimensional + cyanobacterial organism", "abstract": "Under nitrogen deprivation, the one-dimensional + cyanobacterial organism Anabaena sp. PCC 7120 develops patterns of single, + nitrogen-fixing cells separated by nearly regular intervals of photosynthetic + vegetative cells. We study a minimal, stochastic model of developmental patterns + in Anabaena that includes a nondiffusing activator, two diffusing inhibitor + morphogens, demographic fluctuations in the number of morphogen molecules, + and filament growth. By tracking developing filaments, we provide experimental + evidence for different spatiotemporal roles of the two inhibitors during pattern + maintenance and for small molecular copy numbers, justifying a stochastic + approach. In the deterministic limit, the model yields Turing patterns within + a region of parameter space that shrinks markedly as the inhibitor diffusivities + become equal. Transient, noise-driven, stochastic Turing patterns are produced + outside this region, which can then be fixed by downstream genetic commitment + pathways, dramatically enhancing the robustness of pattern formation, also + in the biologically relevant situation in which the inhibitors'' diffusivities + may be comparable.", "venue": "PLoS Biology", "year": 2018, "referenceCount": + 80, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://journals.plos.org/plosbiology/article/file?id=10.1371/journal.pbio.2004877&type=printable", + "status": "GOLD"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2018-05-01", "journal": {"name": "PLoS + Biology", "volume": "16"}, "authors": [{"authorId": "2815566", "name": "F. + Di Patti"}, {"authorId": "12156235", "name": "L. Lavacchi"}, {"authorId": + "102092797", "name": "R. Arbel-Goren"}, {"authorId": "1423588372", "name": + "Leora Schein-Lubomirsky"}, {"authorId": "2334449", "name": "D. Fanelli"}, + {"authorId": "4352031", "name": "J. Stavans"}]}, {"paperId": "fbd226482ed202bc0690ae7fad6008039de6dcfb", + "externalIds": {"MAG": "1785951909", "DOI": "10.4310/MAA.2001.V8.N3.A3", "CorpusId": + 42449186}, "corpusId": 42449186, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fbd226482ed202bc0690ae7fad6008039de6dcfb", "title": "Reaction-Diffusion Models for Biological Pattern Formation", "abstract": "We consider the use of reaction-diffusion equations to model biological pattern formation and describe the derivation of the reaction-terms for several illustrative @@ -45016,44 +50754,53 @@ interactions: are drawn between solution behaviour on growing domains and recent results on self-replicating patterns on domains of fixed size.", "venue": "", "year": 2001, "referenceCount": 55, "citationCount": 40, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.intlpress.com/site/pub/files/_fulltext/journals/maa/2001/0008/0003/MAA-2001-0008-0003-a003.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "Methods and applications of analysis", "pages": "415-428", "volume": "8"}, "authors": [{"authorId": "2434078", "name": "E. Crampin"}, - {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": "336b8d30fcc18585c52fd8db72a40647781742c6", - "externalIds": {"DBLP": "journals/cj/Martinez-Gil07", "DOI": "10.1093/comjnl/bxl084", - "CorpusId": 647446}, "url": "https://www.semanticscholar.org/paper/336b8d30fcc18585c52fd8db72a40647781742c6", - "title": "Thinking on the Web: Berners-Lee, G\u00f6del and Turing", "abstract": - null, "venue": "Computer/law journal", "year": 2007, "referenceCount": 0, - "citationCount": 27, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Comput. J.", "pages": "371-372", - "volume": "50"}, "authors": [{"authorId": "119040630", "name": "J. Gil"}]}, - {"paperId": "44efd1b514c6e21a8467386515f082ac2e5c207c", "externalIds": {"MAG": - "2162651577", "DOI": "10.1103/PHYSREVLETT.92.198305", "CorpusId": 26530000, - "PubMed": "15169457"}, "url": "https://www.semanticscholar.org/paper/44efd1b514c6e21a8467386515f082ac2e5c207c", - "title": "Promoter-induced reactive phase separation in surface reactions.", - "abstract": "Promoters are adsorbed mobile species which do not directly participate - in a catalytic surface reaction, but can influence its rate. Often, they are - characterized by strong attractive interactions with one of the reactants. - We show that these conditions lead to a Turing instability of the uniform - state and to the formation of reaction-induced periodic concentration patterns. - Experimentally such patterns are observed in catalytic water formation on - a Rh(110) surface in the presence of coadsorbed potassium.", "venue": "Physical - review letters", "year": 2004, "referenceCount": 36, "citationCount": 40, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Chemistry", - "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Chemistry", + {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": "8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", + "externalIds": {"DBLP": "books/cu/p/Hales14", "ArXiv": "1302.2898", "MAG": + "2962739402", "DOI": "10.1017/CBO9781107338579.008", "CorpusId": 37948622}, + "corpusId": 37948622, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8b84c9bbd4d33a3e3e9da21ef83e89ee17e34121", + "title": "Mathematics in the age of the Turing machine", "abstract": "The + article gives a survey of mathematical proofs that rely on computer calculations + and formal proofs.", "venue": "Turing''s Legacy", "year": 2013, "referenceCount": + 86, "citationCount": 26, "influentialCitationCount": 5, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1302.2898.pdf", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2013-02-12", "journal": + {"pages": "253-298"}, "authors": [{"authorId": "3312697", "name": "T. Hales"}]}, + {"paperId": "8a18b517cd2fb35cca26ac9fa61a70a4251151bf", "externalIds": {"MAG": + "1840446470", "DBLP": "journals/fuin/ZengZP09", "DOI": "10.3233/FI-2009-200", + "CorpusId": 13307060}, "corpusId": 13307060, "publicationVenue": {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", + "name": "Fundamenta Informaticae", "type": "journal", "alternate_names": ["Fundam + Informaticae"], "issn": "0169-2968", "url": "http://content.iospress.com/journals/fundamenta-informaticae", + "alternate_urls": ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, + "url": "https://www.semanticscholar.org/paper/8a18b517cd2fb35cca26ac9fa61a70a4251151bf", + "title": "Homogeneous Spiking Neural P Systems", "abstract": "Spiking neural + P systems are a class of distributed parallel computing models inspired from + the way the neurons communicate with each other by means of electrical impulses + (called \"spikes\"). In this paper, we consider a restricted variant of spiking + neural P systems, called homogeneous spiking neural P systems, where each + neuron has the same set of rules. The universality of homogeneous spiking + neural P systems is investigated. One of universality results is that it is + sufficient for homogeneous spiking neural P system to have only one neuron + that behaves nondeterministically in order to achieve Turing completeness.", + "venue": "Fundamenta Informaticae", "year": 2009, "referenceCount": 18, "citationCount": + 58, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2004-05-14", "journal": {"name": "Physical review letters", "pages": "\n 198305\n ", - "volume": "92 19"}, "authors": [{"authorId": "89673540", "name": "Y. De Decker"}, - {"authorId": "6649987", "name": "H. Marbach"}, {"authorId": "92451372", "name": - "M. Hinz"}, {"authorId": "92781519", "name": "S. G\u00fcnther"}, {"authorId": - "145038979", "name": "M. Kiskinova"}, {"authorId": "2490613", "name": "A. - Mikhailov"}, {"authorId": "4191115", "name": "R. Imbihl"}]}, {"paperId": "50daafd25142cad9ec5e3e9058de95ca5b9558aa", - "externalIds": {"MAG": "117544142", "CorpusId": 107709958}, "url": "https://www.semanticscholar.org/paper/50daafd25142cad9ec5e3e9058de95ca5b9558aa", + null, "journal": {"name": "Fundam. Informaticae", "pages": "275-294", "volume": + "97"}, "authors": [{"authorId": "2111549943", "name": "Xiangxiang Zeng"}, + {"authorId": "2153646899", "name": "Xingyi Zhang"}, {"authorId": "7356533", + "name": "L. Pan"}]}, {"paperId": "50daafd25142cad9ec5e3e9058de95ca5b9558aa", + "externalIds": {"MAG": "117544142", "CorpusId": 107709958}, "corpusId": 107709958, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/50daafd25142cad9ec5e3e9058de95ca5b9558aa", "title": "Technology in Working Order: Studies of Work, Interaction and Technology", "abstract": "Part One: Analytic Orientations 1. The Curious Case of the Vanishing Technology, Graham Button. Part Two: Introducing Technology into the Work @@ -45073,326 +50820,45 @@ interactions: the Wizard, the Wonderful Wizard of Oz, Robin Wooffitt and Norman Fraser 12. The Turing Test and Language Skills, Harry Collins.", "venue": "", "year": 1992, "referenceCount": 42, "citationCount": 281, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-12-12", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145218181", - "name": "G. Button"}]}, {"paperId": "51585d071d26bddc2a479ea1c19f6fc873ebf735", - "externalIds": {"MAG": "2121293774", "DOI": "10.1117/1.601340", "CorpusId": - 312105}, "url": "https://www.semanticscholar.org/paper/51585d071d26bddc2a479ea1c19f6fc873ebf735", - "title": "Size distributions for multivariate morphological granulometries: - texture classification and statistical properties", "abstract": "As introduced - by Matheron (1975), granulometries depend on a single sizing parameter for - each structuring element forming the filter. Size distributions resulting - from these granulometries have been used to classify texture by using as features - the moments of the resulting pattern spectra. The concept of granulometry - is extended in such a way that each structuring element has its own sizing - parameter and the size dis- tribution is multivariate. Whereas with univariate - granulometries the nor- malized size distribution (pattern spectrum) is easily - shown to be a prob- ability distribution function, this proposition is more - difficult to show for multivariate granulometries. Its demonstration is the - main theoretical re- sult. The classical single-structuring-element granulometries - appear as marginal size distributions and the single-parameter multiple-structuring- - element granulometries result from setting all parameters equal in a mul- - tivariate granulometry. Because of the greatly expanded freedom in choosing - parameters, multivariate granulometries can discriminate tex- tures that are - indistinguishable using single-parameter granulometries. Texture classification - proceeds by taking either the Walsh or moment transform of the multivariate - pattern spectrum, obtaining a reduced fea- ture set by applying the Karhunen-Loeve - transform to the Walsh or mo- ment features, and classifying textures via - a Gaussian maximum- likelihood classifier. For the disjoint multiprimitive - random set model, multivariate granulometric moments are represented in terms - of sizing- distribution moments and shown to be asymptotically normal. Formulas - are given for their asymptotic mean and variance. \u00a9 1997 Society of Photo- - Optical Instrumentation Engineers. (S0091-3286(97)02705-0)", "venue": "", - "year": 1997, "referenceCount": 20, "citationCount": 48, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-05-01", - "journal": {"name": "Optical Engineering", "pages": "1518-1529", "volume": - "36"}, "authors": [{"authorId": "2864277", "name": "S. Batman"}, {"authorId": - "1693776", "name": "E. Dougherty"}]}, {"paperId": "246df03f6040f73ee31c2399e67dfc038db83164", - "externalIds": {"MAG": "2039310436", "DOI": "10.1145/1247066.1247068", "CorpusId": - 830317}, "url": "https://www.semanticscholar.org/paper/246df03f6040f73ee31c2399e67dfc038db83164", - "title": "Computational complexity and G\u00f6del''s incompleteness theorem", - "abstract": "Given any simply consistent formal theory F of the state complexity - L(S) of finite binary sequences S as computed by 3-tape-symbol Turing machines, - there exists a natural number L(F) such that L(S) > n is provable in F only - if n < L(F). On the other hand, almost all finite binary sequences S satisfy - L(S) < L(F). The proof resembles Berry''s paradox, not the Epimenides nor - Richard paradoxes.", "venue": "SIGA", "year": 1971, "referenceCount": 4, "citationCount": - 40, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1971-04-01", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "1756533", "name": "G. Chaitin"}]}, {"paperId": "0275f4cf9e0c0e7d2333530a83e48742d6758b80", - "externalIds": {"MAG": "2040595765", "DOI": "10.1063/1.1888386", "CorpusId": - 11085643, "PubMed": "15910059"}, "url": "https://www.semanticscholar.org/paper/0275f4cf9e0c0e7d2333530a83e48742d6758b80", - "title": "\"Black spots\" in a surfactant-rich Belousov-Zhabotinsky reaction - dispersed in a water-in-oil microemulsion system.", "abstract": "The Belousov-Zhabotinsky - (BZ) reaction dispersed in water-in-oil aerosol OT (AOT) microemulsion has - been studied at small radius R(d) of water nanodroplets (R(d) (nm) congruent - with0.17omega,omega = [H(2)O][AOT] = 9). Stationary spotlike and labyrinthine - Turing patterns are found close to the fully oxidized state. These patterns, - islands of high concentration of the reduced state of the Ru(bpy)(3) (2+) - catalyst, can coexist either with \"black\" reduction waves or, under other - conditions, with the \"white\" oxidation waves usually observed in the BZ - reaction. The experimental observations are analyzed with the aid of a new - Oregonator-like model and qualitatively reproduced in computer simulations.", - "venue": "Journal of Chemical Physics", "year": 2005, "referenceCount": 37, - "citationCount": 55, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-05-03", "journal": {"name": "The Journal of chemical physics", "pages": - "\n 174706\n ", "volume": "122 17"}, "authors": [{"authorId": - "6335623", "name": "A. Kaminaga"}, {"authorId": "2258489", "name": "V. Vanag"}, - {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "f0411022f727eff379e27485785211d723c1be85", - "externalIds": {"MAG": "2134405741", "DOI": "10.1098/rsta.2011.0332", "CorpusId": - 12383089, "PubMed": "22711861"}, "url": "https://www.semanticscholar.org/paper/f0411022f727eff379e27485785211d723c1be85", - "title": "From Turing machines to computer viruses", "abstract": "Self-replication - is one of the fundamental aspects of computing where a program or a system - may duplicate, evolve and mutate. Our point of view is that Kleene''s (second) - recursion theorem is essential to understand self-replication mechanisms. - An interesting example of self-replication codes is given by computer viruses. - This was initially explained in the seminal works of Cohen and of Adleman - in the 1980s. In fact, the different variants of recursion theorems provide - and explain constructions of self-replicating codes and, as a result, of various - classes of malware. None of the results are new from the point of view of - computability theory. We now propose a self-modifying register machine as - a model of computation in which we can effectively deal with the self-reproduction - and in which new offsprings can be activated as independent organisms.", "venue": - "Philosophical Transactions of the Royal Society A: Mathematical, Physical - and Engineering Sciences", "year": 2012, "referenceCount": 40, "citationCount": - 16, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-07-28", "journal": {"name": "Philosophical - Transactions of the Royal Society A: Mathematical, Physical and Engineering - Sciences", "pages": "3319 - 3339", "volume": "370"}, "authors": [{"authorId": - "145309398", "name": "J. Marion"}]}, {"paperId": "4d176782a6ef007a568e1d7860d3a8f223fc874e", - "externalIds": {"MAG": "2330442144", "DBLP": "journals/ethicsit/ArnoldS16", - "DOI": "10.1007/s10676-016-9389-x", "CorpusId": 16905155}, "url": "https://www.semanticscholar.org/paper/4d176782a6ef007a568e1d7860d3a8f223fc874e", - "title": "Against the moral Turing test: accountable design and the moral - reasoning of autonomous systems", "abstract": null, "venue": "Ethics and Information - Technology", "year": 2016, "referenceCount": 34, "citationCount": 45, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-06-01", "journal": {"name": "Ethics and Information - Technology", "pages": "103-115", "volume": "18"}, "authors": [{"authorId": - "2053868213", "name": "Thomas Arnold"}, {"authorId": "1793014", "name": "Matthias - Scheutz"}]}, {"paperId": "6589d95fc32de78e0da5d188f3d39b94cd196c99", "externalIds": - {"MAG": "2090087086", "DBLP": "journals/jei/LepistoKV05", "DOI": "10.1117/1.2149872", - "CorpusId": 14142553}, "url": "https://www.semanticscholar.org/paper/6589d95fc32de78e0da5d188f3d39b94cd196c99", - "title": "Rock image classification using color features in Gabor space", - "abstract": "In image classification, the common texture-based meth- ods are - based on image gray levels. However, the use of color information improves - the classification accuracy of the colored tex- tures. In this paper, we extract - texture features from the natural rock images that are used in bedrock investigations. - A Gaussian band- pass filtering is applied to the color channels of the images - in RGB and HSI color spaces using different scales. The obtained feature vectors - are low dimensional, which make the methods computation- ally effective. The - results show that using combinations of different color channels, the classification - accuracy can be significantly", "venue": "J. Electronic Imaging", "year": - 2005, "referenceCount": 9, "citationCount": 55, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-10-01", "journal": {"name": "J. Electronic Imaging", - "pages": "040503", "volume": "14"}, "authors": [{"authorId": "1789257", "name": - "Leena Lepist\u00f6"}, {"authorId": "1801978", "name": "I. Kunttu"}, {"authorId": - "145835582", "name": "A. Visa"}]}, {"paperId": "1a493fb30f0175a4e0010397252907d189a80639", - "externalIds": {"MAG": "2802780511", "PubMedCentral": "5955598", "DOI": "10.1371/journal.pbio.2004877", - "CorpusId": 13710412, "PubMed": "29727442"}, "url": "https://www.semanticscholar.org/paper/1a493fb30f0175a4e0010397252907d189a80639", - "title": "Robust stochastic Turing patterns in the development of a one-dimensional - cyanobacterial organism", "abstract": "Under nitrogen deprivation, the one-dimensional - cyanobacterial organism Anabaena sp. PCC 7120 develops patterns of single, - nitrogen-fixing cells separated by nearly regular intervals of photosynthetic - vegetative cells. We study a minimal, stochastic model of developmental patterns - in Anabaena that includes a nondiffusing activator, two diffusing inhibitor - morphogens, demographic fluctuations in the number of morphogen molecules, - and filament growth. By tracking developing filaments, we provide experimental - evidence for different spatiotemporal roles of the two inhibitors during pattern - maintenance and for small molecular copy numbers, justifying a stochastic - approach. In the deterministic limit, the model yields Turing patterns within - a region of parameter space that shrinks markedly as the inhibitor diffusivities - become equal. Transient, noise-driven, stochastic Turing patterns are produced - outside this region, which can then be fixed by downstream genetic commitment - pathways, dramatically enhancing the robustness of pattern formation, also - in the biologically relevant situation in which the inhibitors'' diffusivities - may be comparable.", "venue": "PLoS Biology", "year": 2018, "referenceCount": - 80, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-05-01", "journal": {"name": "PLoS Biology", "volume": - "16"}, "authors": [{"authorId": "2815566", "name": "F. Di Patti"}, {"authorId": - "12156235", "name": "L. Lavacchi"}, {"authorId": "102092797", "name": "R. - Arbel-Goren"}, {"authorId": "1423588372", "name": "Leora Schein-Lubomirsky"}, - {"authorId": "2334449", "name": "D. Fanelli"}, {"authorId": "4352031", "name": - "J. Stavans"}]}, {"paperId": "9b4a303c27b2511c5eca850045ad9067eea622f1", "externalIds": - {"DBLP": "journals/corr/abs-1212-6745", "MAG": "1564781888", "CorpusId": 51975416}, - "url": "https://www.semanticscholar.org/paper/9b4a303c27b2511c5eca850045ad9067eea622f1", - "title": "Two-Dimensional Kolmogorov Complexity and Validation of the Coding - Theorem Method by Compressibility", "abstract": "We propose a measure based - upon the fundamental theoretical concept in algorithmic information theory - that provides a natural approach to the problem of evaluating $n$-dimensional - complexity by using an $n$-dimensional deterministic Turing machine. The technique - is interesting because it provides a natural algorithmic process for symmetry - breaking generating complex $n$-dimensional structures from perfectly symmetric - and fully deterministic computational rules producing a distribution of patterns - as described by algorithmic probability. Algorithmic probability also elegantly - connects the frequency of occurrence of a pattern with its algorithmic complexity, - hence effectively providing estimations to the complexity of the generated - patterns. Experiments to validate estimations of algorithmic complexity based - on these concepts are presented, showing that the measure is stable in the - face of some changes in computational formalism and that results are in agreement - with the results obtained using lossless compression algorithms when both - methods overlap in their range of applicability. We then use the output frequency - of the set of 2-dimensional Turing machines to classify the algorithmic complexity - of the space-time evolutions of Elementary Cellular Automata.", "venue": "ArXiv", - "year": 2012, "referenceCount": 16, "citationCount": 47, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-12-30", "journal": {"name": "ArXiv", "volume": "abs/1212.6745"}, - "authors": [{"authorId": "66445647", "name": "H. Zenil"}, {"authorId": "1389866422", - "name": "F. Soler-Toscano"}, {"authorId": "2027817702", "name": "J. Delahaye"}, - {"authorId": "3159526", "name": "N. Gauvrit"}]}, {"paperId": "a941f945790a36233446894d9271405d471a1d70", - "externalIds": {"MAG": "2171061836", "DOI": "10.18637/JSS.V056.I02", "CorpusId": - 4984497}, "url": "https://www.semanticscholar.org/paper/a941f945790a36233446894d9271405d471a1d70", - "title": "STARS: An ArcGIS Toolset Used to Calculate the Spatial Information - Needed to Fit Spatial Statistical Models to Stream Network Data", "abstract": - "This paper describes the STARS ArcGIS geoprocessing toolset, which is used - to calcu- late the spatial information needed to fit spatial statistical models - to stream network data using the SSN package. The STARS toolset is designed - for use with a landscape network (LSN), which is a topological data model - produced by the FLoWS ArcGIS geoprocessing toolset. An overview of the FLoWS - LSN structure and a few particularly useful tools is also provided so that - users will have a clear understanding of the underlying data struc- ture that - the STARS toolset depends on. This document may be used as an introduction - to new users. The methods used to calculate the spatial information and format - the final .ssn object are also explicitly described so that users may create - their own .ssn object using other data models and software.", "venue": "", - "year": 2014, "referenceCount": 41, "citationCount": 95, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2014-01-25", "journal": {"name": "Journal of Statistical Software", "pages": - "1-17", "volume": "056"}, "authors": [{"authorId": "35017125", "name": "E. - Peterson"}, {"authorId": "16216980", "name": "J. Hoef"}]}, {"paperId": "d451742dc2c264053b6aa23478ed607513466b17", - "externalIds": {"MAG": "2145252685", "DOI": "10.1112/S0024610702003691", "CorpusId": - 1341719}, "url": "https://www.semanticscholar.org/paper/d451742dc2c264053b6aa23478ed607513466b17", - "title": "Turing Definability in the Ershov Hierarchy", "abstract": "The first - nontrivial DCE (2\u2010computably enumerable) Turing approximation to the - class of computably enumerable degrees is obtained. This depends on the following - extension of the splitting theorem for the DCE degrees. For any DCE degree - a and any computably enumerable degree b, if b < a, then there are DCE degrees - x0, x1 such that b < x0, x1 < a and a = x0 \u2228 x1. The construction is - unusual in that it is incompatible with upper cone avoidance.", "venue": "", - "year": 2002, "referenceCount": 31, "citationCount": 15, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-12-01", - "journal": {"name": "Journal of the London Mathematical Society", "volume": - "66"}, "authors": [{"authorId": "98630872", "name": "S. Cooper"}, {"authorId": - "145546987", "name": "Angsheng Li"}]}, {"paperId": "1c3c7dbf270efdab161a780d638be4631365e578", - "externalIds": {"MAG": "2563692677", "DBLP": "books/cu/HO2017", "DOI": "10.1017/9781316594179", - "CorpusId": 45270337}, "url": "https://www.semanticscholar.org/paper/1c3c7dbf270efdab161a780d638be4631365e578", - "title": "The Measure of All Minds: Evaluating Natural and Artificial Intelligence", - "abstract": "Are psychometric tests valid for a new reality of artificial - intelligence systems, technology-enhanced humans, and hybrids yet to come? - Are the Turing Test, the ubiquitous CAPTCHAs, and the various animal cognition - tests the best alternatives? In this fascinating and provocative book, Jose - Hernandez-Orallo formulates major scientific questions, integrates the most - significant research developments, and offers a vision of the universal evaluation - of cognition. By replacing the dominant anthropocentric stance with a universal - perspective where living organisms are considered as a special case, long-standing - questions in the evaluation of behavior can be addressed in a wider landscape. - Can we derive task difficulty intrinsically? Is a universal g factor - a common - general component for all abilities - theoretically possible? Using algorithmic - information theory as a foundation, the book elaborates on the evaluation - of perceptual, developmental, social, verbal and collective features and critically - analyzes what the future of intelligence might look like.", "venue": "", "year": - 2017, "referenceCount": 873, "citationCount": 96, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Psychology", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Psychology", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2017-01-11", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1398777358", - "name": "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "794b6173cdfaed13995bae8871c5175a879ba9a6", - "externalIds": {"DBLP": "journals/tsp/BudianuBT06", "MAG": "2110935968", "DOI": - "10.1109/TSP.2006.871973", "CorpusId": 10844061}, "url": "https://www.semanticscholar.org/paper/794b6173cdfaed13995bae8871c5175a879ba9a6", - "title": "Estimation of the number of operating sensors in large-scale sensor - networks with mobile access", "abstract": "This paper investigates the estimation - of the number of operating sensors in a sensor network in which the data collection - is made by a mobile access point. In this paper, an estimator based on the - Good-Turing estimator of the missing mass is proposed and it is generalized - to other related problems such as the estimation of the distribution of energy - available at sensors. The estimator is analyzed using the theory of large - deviations. Closed-form bounds on the large deviation exponent are presented - and confidence intervals for the estimator are characterized.", "venue": "IEEE - Transactions on Signal Processing", "year": 2006, "referenceCount": 17, "citationCount": - 56, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-05-01", "journal": {"name": "IEEE - Transactions on Signal Processing", "pages": "1703-1715", "volume": "54"}, - "authors": [{"authorId": "2885463", "name": "C. Budianu"}, {"authorId": "1409749316", - "name": "S. Ben-David"}, {"authorId": "145120197", "name": "L. Tong"}]}, {"paperId": - "7aa2f869502d92ac1fce4f2c2dc626426950f6fc", "externalIds": {"MAG": "2126638623", - "DBLP": "journals/fuin/Moniri13", "DOI": "10.3233/FI-2013-812", "CorpusId": - 868009}, "url": "https://www.semanticscholar.org/paper/7aa2f869502d92ac1fce4f2c2dc626426950f6fc", - "title": "Fuzzy and Intuitionistic Fuzzy Turing Machines", "abstract": "First - we define a new class of fuzzy Turing machines that we call Generalized Fuzzy - Turing Machines. Our machines are equipped with rejecting states as well as - accepting states. While we use a t-norm for computing degrees of accepting - or rejecting paths, we use its dual t-conorm for computing the accepting or - rejecting degrees of inputs. We naturally define when a generalized fuzzy - Turing machine accepts or decides a fuzzy language. We prove that a fuzzy - language L is decidable if and only if L and its complement are acceptable. - Moreover, to each r.e. or co-r.e language L, we naturally correspond a fuzzy - language which is acceptable by a generalized fuzzy Turing machine. A converse - to this result is also proved. We also consider Atanasov''s intuitionistic - fuzzy languages and introduce a version of fuzzy Turing machine for studying - their computability theoretic properties.", "venue": "Fundamenta Informaticae", - "year": 2013, "referenceCount": 13, "citationCount": 11, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2013-07-01", "journal": {"name": "Fundam. Informaticae", "pages": "305-315", - "volume": "123"}, "authors": [{"authorId": "1898026", "name": "Morteza Moniri"}]}, - {"paperId": "f67a4ea6309eca00599e95ed5b4485d1d4a4413b", "externalIds": {"DBLP": - "conf/aina/WangCRGLA10", "ArXiv": "1305.7485", "MAG": "3104444534", "DOI": - "10.1109/AINA.2010.46", "CorpusId": 6041988}, "url": "https://www.semanticscholar.org/paper/f67a4ea6309eca00599e95ed5b4485d1d4a4413b", - "title": "Against Spyware Using CAPTCHA in Graphical Password Scheme", "abstract": - "Text-based password schemes have inherent security and usability problems, - leading to the development of graphical password schemes. However, most of - these alternate schemes are vulnerable to spyware attacks. We propose a new - scheme, using CAPTCHA (Completely Automated Public Turing tests to tell Computers - and Humans Apart) that retaining the advantages of graphical password schemes, - while simultaneously raising the cost of adversaries by orders of magnitude. - Furthermore, some primary experiments are conducted and the results indicate - that the usability should be improved in the future work.", "venue": "2010 - 24th IEEE International Conference on Advanced Information Networking and - Applications", "year": 2010, "referenceCount": 40, "citationCount": 56, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "2010-01-01", "journal": {"name": "2010 - 24th IEEE International Conference on Advanced Information Networking and - Applications", "pages": "760-767"}, "authors": [{"authorId": "2109120612", - "name": "Liming Wang"}, {"authorId": "2213753", "name": "Xiuling Chang"}, - {"authorId": "2113994687", "name": "Zhongjie Ren"}, {"authorId": "1863170", - "name": "Haichang Gao"}, {"authorId": "2108735744", "name": "Xiyang Liu"}, - {"authorId": "1678366", "name": "U. Aickelin"}]}, {"paperId": "ed32fef79581afa6c33a3afe34c2ee723156a055", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1992-12-12", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "145218181", "name": "G. Button"}]}, {"paperId": "e02d20197a4077f227ddb2207a307ba5b614b8d3", + "externalIds": {"MAG": "2137490447", "ArXiv": "q-bio/0607035", "DOI": "10.1098/rstb.2007.2074", + "CorpusId": 9518164, "PubMed": "17510018"}, "corpusId": 9518164, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e02d20197a4077f227ddb2207a307ba5b614b8d3", + "title": "Synthetic Turing protocells: vesicle self-reproduction through symmetry-breaking + instabilities", "abstract": "The reproduction of a living cell requires a + repeatable set of chemical events to be properly coordinated. Such events + define a replication cycle, coupling the growth and shape change of the cell + membrane with internal metabolic reactions. Although the logic of such process + is determined by potentially simple physico-chemical laws, modelling of a + full, self-maintained cell cycle is not trivial. Here we present a novel approach + to the problem that makes use of so-called symmetry breaking instabilities + as the engine of cell growth and division. It is shown that the process occurs + as a consequence of the breaking of spatial symmetry and provides a reliable + mechanism of vesicle growth and reproduction. Our model opens the possibility + of a synthetic protocell lacking information but displaying self-reproduction + under a very simple set of chemical reactions.", "venue": "Philosophical Transactions + of the Royal Society B: Biological Sciences", "year": 2006, "referenceCount": + 55, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://europepmc.org/articles/pmc2442396?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-07-21", "journal": {"name": "Philosophical Transactions + of the Royal Society B: Biological Sciences", "pages": "1821 - 1829", "volume": + "362"}, "authors": [{"authorId": "145472392", "name": "J. Mac\u00eda"}, {"authorId": + "1706628", "name": "R. Sol\u00e9"}]}, {"paperId": "ed32fef79581afa6c33a3afe34c2ee723156a055", "externalIds": {"MAG": "3043303806", "DBLP": "conf/ipps/00020C20", "DOI": - "10.1109/IPDPS47924.2020.00071", "CorpusId": 220604999}, "url": "https://www.semanticscholar.org/paper/ed32fef79581afa6c33a3afe34c2ee723156a055", + "10.1109/IPDPS47924.2020.00071", "CorpusId": 220604999}, "corpusId": 220604999, + "publicationVenue": {"id": "7bb54772-a70c-44df-9b9d-9f3b5354c0e2", "name": + "IEEE International Parallel and Distributed Processing Symposium", "type": + "conference", "alternate_names": ["IEEE Int Parallel Distrib Process Symp", + "International Parallel and Distributed Processing Symposium", "IPDPS", "Int + Parallel Distrib Process Symp"], "url": "http://www.ipdps.org/"}, "url": "https://www.semanticscholar.org/paper/ed32fef79581afa6c33a3afe34c2ee723156a055", "title": "Demystifying Tensor Cores to Optimize Half-Precision Matrix Multiply", "abstract": "Half-precision matrix multiply has played a key role in the training of deep learning models. The newly designed Nvidia Tensor Cores offer the @@ -45415,125 +50881,186 @@ interactions: written in native hardware assembly (SASS).", "venue": "IEEE International Parallel and Distributed Processing Symposium", "year": 2020, "referenceCount": 32, "citationCount": 26, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2020-05-01", "journal": {"name": "2020 IEEE International + Parallel and Distributed Processing Symposium (IPDPS)", "pages": "634-643"}, + "authors": [{"authorId": "144157459", "name": "Da Yan"}, {"authorId": null, + "name": "Wei Wang"}, {"authorId": "51502693", "name": "X. Chu"}]}, {"paperId": + "62b462f8bf2681dacf5f785ee3cd69c6a36b3ea4", "externalIds": {"MAG": "1968882164", + "DOI": "10.3354/CR026175", "CorpusId": 54904634}, "corpusId": 54904634, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/62b462f8bf2681dacf5f785ee3cd69c6a36b3ea4", + "title": "Comparison of LARS-WG and AAFC-WG stochastic weather generators + for diverse Canadian climates", "abstract": "Two weather generators\u2014LARS-WG, + developed at Long Ashton Research Station (UK), and AAFC-WG, developed at + Agriculture and Agri-Food Canada \u2014were compared in order to gauge their + capabilities of reproducing probability distributions, means and variances + of observed daily pre- cipitation, maximum temperature and minimum temperature + for diverse Canadian climates. Climatic conditions, such as wet and dry spells, + interannual variability and agroclimatic indices, were also used to assess + the performance of the 2 weather generators. AAFC-WG performed better in simulat- + ing temperature-related statistics, while it did almost as well as LARS-WG + for statistics associated with daily precipitation. Using empirical distributions + in AAFC-WG for daily maximum and minimum temperatures helped to improve the + temperature statistics, especially in cases where local tempera- tures did + not follow normal distributions. However, both weather generators had overdispersion + problems, i.e. they underestimated interannual variability, especially for + temperatures. Overall, AAFC-WG performed better.", "venue": "", "year": 2004, + "referenceCount": 35, "citationCount": 103, "influentialCitationCount": 8, + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/cr2004/26/c026p175.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": + "Geography", "source": "external"}, {"category": "Environmental Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-06-18", + "journal": {"name": "Climate Research", "pages": "175-191", "volume": "26"}, + "authors": [{"authorId": "33949156", "name": "B. Qian"}, {"authorId": "15171070", + "name": "S. Gameda"}, {"authorId": "11540900", "name": "H. Hayhoe"}, {"authorId": + "145702287", "name": "R. D. Jong"}, {"authorId": "78468874", "name": "A. Bootsma"}]}, + {"paperId": "4b37285871d88bf7cd7610151b6e5096ae2d91d7", "externalIds": {"DBLP": + "journals/ijfcs/Gradel90", "MAG": "2030147970", "DOI": "10.1142/S0129054190000217", + "CorpusId": 45976299}, "corpusId": 45976299, "publicationVenue": {"id": "0f60ff8e-f0b7-47a2-9927-2b94f9e44e82", + "name": "International Journal of Foundations of Computer Science", "type": + "journal", "alternate_names": ["Int J Found Comput Sci"], "issn": "0129-0541", + "url": "http://www.cs.ucsb.edu/~ijfcs/"}, "url": "https://www.semanticscholar.org/paper/4b37285871d88bf7cd7610151b6e5096ae2d91d7", + "title": "On the Notion of Linear Time Computability", "abstract": "To capture + the informal concept of linear time computability, we propose and discuss + the class TIME(n1+), consisting of all functions which are computable by a + Successor RAM with exponent at most one; the exponent of a function is the + infimum of all rational numbers r such that the function is computable in + time O(nr). This class properly contains the class NLT (\u201cNearly Linear + Time\u201d)\u2014proposed by Gurevich and Shelah\u2014which contains all functions + computable by a Successor RAM in time O(n(log n)k) for some k\u2208N. Both + classes are very robust under changes of the underlying machine model: using + the same time bounds they can be defined by Random Access Computers, Storage + Modification Machines, Kolmogorov algorithms, Random Access Turing machines + etc.; this distinguishes them from similar classes defined by ordinary Turing + machines. However, we show that TIME(n1+) can be defined e.g. by multi-dimensional + Turing machines or by Turing machines which can jump; this is probably not + true for NLT. Furthermore we consider two notions of completeness for TIME(n1+) + and construct complete problems. These problems are based on restrictions + of Gurevich\u2019s function logic for P.", "venue": "International Journal + of Foundations of Computer Science", "year": 1990, "referenceCount": 0, "citationCount": + 19, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2020-05-01", "journal": {"name": "2020 IEEE International Parallel and Distributed - Processing Symposium (IPDPS)", "pages": "634-643"}, "authors": [{"authorId": - "144157459", "name": "Da Yan"}, {"authorId": null, "name": "Wei Wang"}, {"authorId": - "51502693", "name": "X. Chu"}]}, {"paperId": "8ac21d03fd32105842daf446d5004b44572412a7", - "externalIds": {"MAG": "120037107", "DOI": "10.1090/conm/257/04040", "CorpusId": - 115622963}, "url": "https://www.semanticscholar.org/paper/8ac21d03fd32105842daf446d5004b44572412a7", - "title": "Natural Definability in Degree Structures", "abstract": "A major - focus of research in computability theory in recent years has involved definability - issues in degree structures. There has been much success in getting general - results by coding methods that translate first or second order arithmetic - into the structures. In this paper we concentrate on the issues of getting - definitions of interesting, apparently external, relations on degrees that - are order-theoretically natural in the structures D and R of all the Turing - degrees and of the r.e. Turing degrees, respectively. Of course, we have no - formal definition of natural but we offer some guidelines, examples and suggestions - for further research.", "venue": "", "year": 1999, "referenceCount": 28, "citationCount": - 20, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "1817824", "name": "R. Shore"}]}, - {"paperId": "0c61a6bd82d09a7ceb42d0b57bd60a6dbaba9c22", "externalIds": {"MAG": - "2099655018", "DOI": "10.1039/C39750000345", "CorpusId": 98140801}, "url": - "https://www.semanticscholar.org/paper/0c61a6bd82d09a7ceb42d0b57bd60a6dbaba9c22", - "title": "Structure of prieurianin, a complex tetranortriterpenoid; nuclear - magnetic resonance analysis at nonambient temperatures and X-ray structures - determination", "abstract": "Prieurianin a complex tetranortriterpenoid from - Trichilia prieuriana(Meliaceae), is assigned struc-ture (1) on the basis of - n.m.r. analysis at nonambient temperatures and X-ray structure determination - of prieurianin-p-bromobenzenesulphonate.", "venue": "", "year": 1975, "referenceCount": - 0, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Journal - of The Chemical Society, Chemical Communications", "pages": "345-346", "volume": - ""}, "authors": [{"authorId": "5668445", "name": "V. Gullo"}, {"authorId": - "2368908", "name": "I. Miura"}, {"authorId": "16228709", "name": "K. Nakanishi"}, - {"authorId": "46455867", "name": "A. Cameron"}, {"authorId": "34840252", "name": - "J. D. Connolly"}, {"authorId": "92690974", "name": "F. D. Duncanson"}, {"authorId": - "94209983", "name": "A. E. Harding"}, {"authorId": "2349039", "name": "R. - McCrindle"}, {"authorId": "2116967053", "name": "David A. H. Taylor"}]}, {"paperId": - "194d12d589deed75d3de398ad7700f4606b40dc6", "externalIds": {"MAG": "2154689989", - "DOI": "10.1111/J.1460-2695.2008.01259.X", "CorpusId": 138302900}, "url": - "https://www.semanticscholar.org/paper/194d12d589deed75d3de398ad7700f4606b40dc6", - "title": "Use of the small punch test to determine the ductile\u2010to\u2010brittle - transition temperature of structural steels", "abstract": "The small punch - test (SPT) consists in punching very small square specimens, measuring 10 - \u00d7 10 mm 2 and 0.5-mm thickness, until fracture using a 2.5-mm-diameter - hemispher- ical punch. Different specimens of a structural steel were tested - from room temperature to cryogenic temperatures in order to determine its - ductile-to-brittle transition tempera- ture (DBTT). The DBTT obtained in SPT - (DBTTSTP) is much lower than the DBTT obtained by means of Charpy specimens - (DBTTCVN). The variation of the mechani- cal parameters calculated from the - SPTs with temperature was also calculated and the operative fracture micromechanisms - defined using a scanning electron microscope.", "venue": "", "year": 2008, - "referenceCount": 18, "citationCount": 56, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials + "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1990-09-01", "journal": {"name": "Int. + J. Found. Comput. Sci.", "pages": "295-308", "volume": "1"}, "authors": [{"authorId": + "1749375", "name": "E. Gr\u00e4del"}]}, {"paperId": "80437d99147aa1e08a59709eba5a3a5b45a838ee", + "externalIds": {"DBLP": "journals/ijbc/CaludeD07", "MAG": "1964059180", "DOI": + "10.1142/S0218127407018130", "CorpusId": 33024483}, "corpusId": 33024483, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/80437d99147aa1e08a59709eba5a3a5b45a838ee", + "title": "Exact Approximations of omega Numbers", "abstract": "A Chaitin Omega + number is the halting probability of a universal prefix-free Turing machine. + Every Omega number is simultaneously computably enumerable (the limit of a + computable, increasing, converging sequence of rationals), and algorithmically + random (its binary expansion is an algorithmic random sequence), hence uncomputable. + The value of an Omega number is highly machine-dependent. In general, no more + than finitely many scattered bits of the binary expansion of an Omega number + can be exactly computed; but, in some cases, it is possible to prove that + no bit can be computed. In this paper, we will simplify and improve both the + method and correctness of the proof proposed in an earlier paper, and we will + compute the exact approximations of two Omega numbers of the same prefix-free + Turing machine, which is universal when used with data in base 16 or base + 2: we compute 43 exact bits for the base 16 machine and 40 exact bits for + the base 2 machine.", "venue": "Int. J. Bifurc. Chaos", "year": 2007, "referenceCount": + 26, "citationCount": 28, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.cs.auckland.ac.nz/CDMTCS//researchreports/293crismjd.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-06-01", "journal": + {"name": "Int. J. Bifurc. Chaos", "pages": "1937-1954", "volume": "17"}, "authors": + [{"authorId": "1685717", "name": "Cristian S. Calude"}, {"authorId": "1784879", + "name": "M. Dinneen"}]}, {"paperId": "16f5ad3101e2790c67f088e6b9d8c17f6b22f898", + "externalIds": {"MAG": "2015477722", "DBLP": "journals/toplas/Williams82a", + "DOI": "10.1145/69622.357193", "CorpusId": 1717555}, "corpusId": 1717555, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/16f5ad3101e2790c67f088e6b9d8c17f6b22f898", + "title": "On the Development of the Algebra of Functional Programs", "abstract": + "The development of the algebraic approach to reasoning about functional programs + that was introduced by Backus in his Turing Award Lecture is furthered. Precise + definitions for the foundations on which the algebra is based are given, and + some new expansion theorems that broaden the class of functions for which + this approach is applicable are proved. In particular, the class of \"overruntolerant\" + forms, nonlinear forms that include some of the familiar divide-and-conquer + program schemes, are defined; an expansion theorem for such forms is proved; + and that theorem is used to show how to derive expansions for some programs + deemed by nonlinear forms.", "venue": "TOPL", "year": 1982, "referenceCount": + 16, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1982-10-01", "journal": {"name": "ACM Trans. Program. Lang. Syst.", "pages": + "733-757", "volume": "4"}, "authors": [{"authorId": "2111929692", "name": + "John H. Williams"}]}, {"paperId": "00c957711b12468cb38424caccdf5291bb354033", + "externalIds": {"DBLP": "journals/corr/abs-1910-02054", "MAG": "2977720775", + "ArXiv": "1910.02054", "DOI": "10.1109/SC41405.2020.00024", "CorpusId": 203736482}, + "corpusId": 203736482, "publicationVenue": {"id": "0c1420a4-aa9b-44f9-b264-ba3ac5c37050", + "name": "International Conference for High Performance Computing, Networking, + Storage and Analysis", "alternate_names": ["Int Conf High Perform Comput Netw + Storage Anal"], "issn": "2167-4337", "alternate_issns": ["2167-4329"], "url": + "http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000729"}, "url": "https://www.semanticscholar.org/paper/00c957711b12468cb38424caccdf5291bb354033", + "title": "ZeRO: Memory optimizations Toward Training Trillion Parameter Models", + "abstract": "Large deep learning models offer significant accuracy gains, + but training billions to trillions of parameters is challenging. Existing + solutions such as data and model parallelisms exhibit fundamental limitations + to fit these models into limited device memory, while obtaining computation, + communication and development efficiency. We develop a novel solution, Zero + Redundancy Optimizer (ZeRO), to optimize memory, vastly improving training + speed while increasing the model size that can be efficiently trained. ZeRO + eliminates memory redundancies in data- and model-parallel training while + retaining low communication volume and high computational granularity, allowing + us to scale the model size proportional to the number of devices with sustained + high efficiency. Our analysis on memory requirements and communication volume + demonstrates: ZeRO has the potential to scale beyond 1 Trillion parameters + using today\u2019s hardware. We implement and evaluate ZeRO: it trains large + models of over 100B parameter with super-linear speedup on 400 GPUs, achieving + throughput of 15 Petaflops. This represents an 8x increase in model size and + 10x increase in achievable performance over state-of-the-art. In terms of + usability, ZeRO can train large models of up to 13B parameters (e.g., larger + than Megatron GPT 8. 3B and T5 11B) without requiring model parallelism which + is harder for scientists to apply. Last but not the least, researchers have + used the system breakthroughs of ZeRO to create Turing-NLG, the world\u2019s + largest language model at the time (17B parameters) with record breaking accuracy.", + "venue": "International Conference for High Performance Computing, Networking, + Storage and Analysis", "year": 2019, "referenceCount": 30, "citationCount": + 292, "influentialCitationCount": 41, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1910.02054", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "2019-10-04", "journal": + {"name": "SC20: International Conference for High Performance Computing, Networking, + Storage and Analysis", "pages": "1-16"}, "authors": [{"authorId": "32817044", + "name": "Samyam Rajbhandari"}, {"authorId": "3299496", "name": "Jeff Rasley"}, + {"authorId": "2537545", "name": "Olatunji Ruwase"}, {"authorId": "2145020341", + "name": "Yuxiong He"}]}, {"paperId": "b124fa357782d97286aa6b0590457d2052005166", + "externalIds": {"DBLP": "journals/jscic/MadzvamuseMW05", "MAG": "2151519358", + "DOI": "10.1007/s10915-004-4617-7", "CorpusId": 2776863}, "corpusId": 2776863, + "publicationVenue": {"id": "2fd362b7-4859-41eb-a9f2-f12a77f1c997", "name": + "Journal of Scientific Computing", "type": "journal", "alternate_names": ["J + Sci Comput"], "issn": "0885-7474", "url": "http://www.kluweronline.com/issn/0885-7474/contents", + "alternate_urls": ["https://link.springer.com/journal/10915"]}, "url": "https://www.semanticscholar.org/paper/b124fa357782d97286aa6b0590457d2052005166", + "title": "A Moving Grid Finite Element Method for the Simulation of Pattern + Generation by Turing Models on Growing Domains", "abstract": null, "venue": + "Journal of Scientific Computing", "year": 2005, "referenceCount": 41, "citationCount": + 89, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ora.ox.ac.uk/objects/uuid:19f4411b-02cb-47af-af90-c8c87d91c3e9/download_file?safe_filename=192..pdf&file_format=application%2Fpdf&type_of_work=Journal+article", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2008-09-01", "journal": {"name": - "Fatigue & Fracture of Engineering Materials & Structures", "pages": "727-737", - "volume": "31"}, "authors": [{"authorId": "145211466", "name": "M. Contreras"}, - {"authorId": "2107130494", "name": "C. Rodr\u00edguez"}, {"authorId": "117469142", - "name": "F. Belzunce"}, {"authorId": "103017274", "name": "C. Beteg\u00f3n"}]}, - {"paperId": "74b479c8724d960109f1d282ee2394a914e1f9fa", "externalIds": {"ArXiv": - "1212.4799", "DBLP": "books/cu/p/FreerRT14", "MAG": "1547952324", "DOI": "10.1017/CBO9781107338579.007", - "CorpusId": 11834718}, "url": "https://www.semanticscholar.org/paper/74b479c8724d960109f1d282ee2394a914e1f9fa", - "title": "Towards common-sense reasoning via conditional simulation: legacies - of Turing in Artificial Intelligence", "abstract": "The problem of replicating - the flexibility of human common-sense reasoning has captured the imagination - of computer scientists since the early days of Alan Turing''s foundational - work on computation and the philosophy of artificial intelligence. In the - intervening years, the idea of cognition as computation has emerged as a fundamental - tenet of Artificial Intelligence (AI) and cognitive science. But what kind - of computation is cognition? \nWe describe a computational formalism centered - around a probabilistic Turing machine called QUERY, which captures the operation - of probabilistic conditioning via conditional simulation. Through several - examples and analyses, we demonstrate how the QUERY abstraction can be used - to cast common-sense reasoning as probabilistic inference in a statistical - model of our observations and the uncertain structure of the world that generated - that experience. This formulation is a recent synthesis of several research - programs in AI and cognitive science, but it also represents a surprising - convergence of several of Turing''s pioneering insights in AI, the foundations - of computation, and statistics.", "venue": "Turing''s Legacy", "year": 2012, - "referenceCount": 140, "citationCount": 23, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-12-19", "journal": {"name": "ArXiv", "volume": "abs/1212.4799"}, - "authors": [{"authorId": "3337217", "name": "Cameron E. Freer"}, {"authorId": - "39331522", "name": "Daniel M. Roy"}, {"authorId": "1763295", "name": "J. - Tenenbaum"}]}, {"paperId": "9befba8a7304980b3915ba9d77f19d7b3bf8d7b5", "externalIds": - {"MAG": "26590380", "CorpusId": 59707222}, "url": "https://www.semanticscholar.org/paper/9befba8a7304980b3915ba9d77f19d7b3bf8d7b5", - "title": "The Turing effect: the nature of trust in expert systems advice", - "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": - 55, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1997-05-30", "journal": {"name": - "", "pages": "417-448", "volume": ""}, "authors": [{"authorId": "38428515", - "name": "F. Lerch"}, {"authorId": "8121434", "name": "M. Prietula"}, {"authorId": - "2029113", "name": "Carol T. Kulik"}]}, {"paperId": "65f8fbcef28d6a8421cb456f32f43fe27cce40cc", - "externalIds": {"MAG": "3182978696", "DOI": "10.1038/S41567-021-01288-Y", - "CorpusId": 237767233}, "url": "https://www.semanticscholar.org/paper/65f8fbcef28d6a8421cb456f32f43fe27cce40cc", - "title": "Nanoscale Turing patterns in a bismuth monolayer", "abstract": null, - "venue": "Nature Physics", "year": 2021, "referenceCount": 41, "citationCount": - 10, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2021-07-08", "journal": {"name": "Nature Physics"}, "authors": - [{"authorId": "15769671", "name": "Y. Fuseya"}, {"authorId": "11037201", "name": - "H. Katsuno"}, {"authorId": "34686254", "name": "Kamran Behnia"}, {"authorId": - "4839147", "name": "A. Kapitulnik"}]}, {"paperId": "059012194f77f1a58dbfbcb196c6a0e9cca5e75e", - "externalIds": {"MAG": "2126313519", "DOI": "10.1177/036354659702500422", - "CorpusId": 13364553, "PubMed": "9240993"}, "url": "https://www.semanticscholar.org/paper/059012194f77f1a58dbfbcb196c6a0e9cca5e75e", + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-08-01", "journal": + {"name": "Journal of Scientific Computing", "pages": "247-262", "volume": + "24"}, "authors": [{"authorId": "2731718", "name": "A. Madzvamuse"}, {"authorId": + "2339973", "name": "P. Maini"}, {"authorId": "2029275", "name": "A. Wathen"}]}, + {"paperId": "059012194f77f1a58dbfbcb196c6a0e9cca5e75e", "externalIds": {"MAG": + "2126313519", "DOI": "10.1177/036354659702500422", "CorpusId": 13364553, "PubMed": + "9240993"}, "corpusId": 13364553, "publicationVenue": {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", + "name": "American Journal of Sports Medicine", "type": "journal", "alternate_names": + ["Am J Sport Med"], "issn": "0363-5465", "url": "http://ajs.sagepub.com/", + "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, "url": "https://www.semanticscholar.org/paper/059012194f77f1a58dbfbcb196c6a0e9cca5e75e", "title": "Fracture of the Proximal Tibia With immediate Weightbearing after a Fulkerson Osteotomy", "abstract": "The records of 234 people who had anteromedializa tion of the tibial tubercle with oblique osteotomy be tween 1983 and 1994 @@ -45548,107 +51075,378 @@ interactions: weightbearing, and allowed full weightbearing only after the osteotomy has radiographic evidence of complete healing.", "venue": "American Journal of Sports Medicine", "year": 1997, "referenceCount": 7, "citationCount": 100, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "1997-07-01", "journal": {"name": "The American - Journal of Sports Medicine", "pages": "570 - 574", "volume": "25"}, "authors": - [{"authorId": "6522306", "name": "W. Stetson"}, {"authorId": "143840646", - "name": "M. Friedman"}, {"authorId": "4153863", "name": "J. Fulkerson"}, {"authorId": - "23156123", "name": "M. Cheng"}, {"authorId": "1692015367", "name": "David - A. Buuck"}]}, {"paperId": "a92bbba06148478e0417eaa648eba0ca7ae84765", "externalIds": - {"MAG": "1923653474", "ArXiv": "1501.05327", "DBLP": "conf/cie/Joosten15", - "DOI": "10.1007/978-3-319-20028-6_22", "CorpusId": 40470957}, "url": "https://www.semanticscholar.org/paper/a92bbba06148478e0417eaa648eba0ca7ae84765", - "title": "Turing Jumps Through Provability", "abstract": null, "venue": "Conference - on Computability in Europe", "year": 2015, "referenceCount": 11, "citationCount": - 10, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-01-21", "journal": {"pages": - "216-225"}, "authors": [{"authorId": "1748961", "name": "J. Joosten"}]}, {"paperId": - "ebcffad3d660c16d47e67e92d1688350dfb9d71d", "externalIds": {"DBLP": "conf/cie/Durand-Lose05", - "MAG": "1867364991", "DOI": "10.1007/11494645_14", "CorpusId": 4652364}, "url": - "https://www.semanticscholar.org/paper/ebcffad3d660c16d47e67e92d1688350dfb9d71d", - "title": "Abstract Geometrical Computation: Turing-Computing Ability and Undecidability", - "abstract": null, "venue": "Conference on Computability in Europe", "year": - 2005, "referenceCount": 48, "citationCount": 22, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-06-08", "journal": {"pages": "106-116"}, "authors": [{"authorId": "1387881959", - "name": "J. Durand-Lose"}]}, {"paperId": "cd0cb39a988daec9bf424a088e812c14c137d19f", - "externalIds": {"MAG": "2111961041", "DBLP": "journals/corr/abs-0904-3612", - "ArXiv": "0904.3612", "DOI": "10.1007/978-3-642-04617-9_45", "CorpusId": 816374}, - "url": "https://www.semanticscholar.org/paper/cd0cb39a988daec9bf424a088e812c14c137d19f", - "title": "Variations of the Turing Test in the Age of Internet and Virtual - Reality", "abstract": null, "venue": "KI", "year": 2009, "referenceCount": - 16, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2009-04-23", "journal": {"pages": "355-362"}, "authors": [{"authorId": "39315964", - "name": "Florentin Neumann"}, {"authorId": "31588361", "name": "Andrea Reichenberger"}, - {"authorId": "144983931", "name": "M. Ziegler"}]}, {"paperId": "16f5ad3101e2790c67f088e6b9d8c17f6b22f898", - "externalIds": {"MAG": "2015477722", "DBLP": "journals/toplas/Williams82a", - "DOI": "10.1145/69622.357193", "CorpusId": 1717555}, "url": "https://www.semanticscholar.org/paper/16f5ad3101e2790c67f088e6b9d8c17f6b22f898", - "title": "On the Development of the Algebra of Functional Programs", "abstract": - "The development of the algebraic approach to reasoning about functional programs - that was introduced by Backus in his Turing Award Lecture is furthered. Precise - definitions for the foundations on which the algebra is based are given, and - some new expansion theorems that broaden the class of functions for which - this approach is applicable are proved. In particular, the class of \"overruntolerant\" - forms, nonlinear forms that include some of the familiar divide-and-conquer - program schemes, are defined; an expansion theorem for such forms is proved; - and that theorem is used to show how to derive expansions for some programs - deemed by nonlinear forms.", "venue": "TOPL", "year": 1982, "referenceCount": - 16, "citationCount": 57, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1982-10-01", "journal": - {"name": "ACM Trans. Program. Lang. Syst.", "pages": "733-757", "volume": - "4"}, "authors": [{"authorId": "2111929692", "name": "John H. Williams"}]}, - {"paperId": "9411c527c30ace8bef33e7c1a536c32591e2313d", "externalIds": {"MAG": - "1555190167", "DBLP": "conf/hybrid/HenzingerR00", "DOI": "10.1007/3-540-46430-1_15", - "CorpusId": 6172288}, "url": "https://www.semanticscholar.org/paper/9411c527c30ace8bef33e7c1a536c32591e2313d", + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1997-07-01", + "journal": {"name": "The American Journal of Sports Medicine", "pages": "570 + - 574", "volume": "25"}, "authors": [{"authorId": "6522306", "name": "W. Stetson"}, + {"authorId": "143840646", "name": "M. Friedman"}, {"authorId": "4153863", + "name": "J. Fulkerson"}, {"authorId": "23156123", "name": "M. Cheng"}, {"authorId": + "1692015367", "name": "David A. Buuck"}]}, {"paperId": "f67a4ea6309eca00599e95ed5b4485d1d4a4413b", + "externalIds": {"DBLP": "conf/aina/WangCRGLA10", "ArXiv": "1305.7485", "MAG": + "3104444534", "DOI": "10.1109/AINA.2010.46", "CorpusId": 6041988}, "corpusId": + 6041988, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f67a4ea6309eca00599e95ed5b4485d1d4a4413b", + "title": "Against Spyware Using CAPTCHA in Graphical Password Scheme", "abstract": + "Text-based password schemes have inherent security and usability problems, + leading to the development of graphical password schemes. However, most of + these alternate schemes are vulnerable to spyware attacks. We propose a new + scheme, using CAPTCHA (Completely Automated Public Turing tests to tell Computers + and Humans Apart) that retaining the advantages of graphical password schemes, + while simultaneously raising the cost of adversaries by orders of magnitude. + Furthermore, some primary experiments are conducted and the results indicate + that the usability should be improved in the future work.", "venue": "2010 + 24th IEEE International Conference on Advanced Information Networking and + Applications", "year": 2010, "referenceCount": 40, "citationCount": 56, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://nottingham-repository.worktribe.com/preview/1013437/gao2010a.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2010-01-01", "journal": {"name": "2010 + 24th IEEE International Conference on Advanced Information Networking and + Applications", "pages": "760-767"}, "authors": [{"authorId": "2109120612", + "name": "Liming Wang"}, {"authorId": "2213753", "name": "Xiuling Chang"}, + {"authorId": "2113994687", "name": "Zhongjie Ren"}, {"authorId": "1863170", + "name": "Haichang Gao"}, {"authorId": "2108735744", "name": "Xiyang Liu"}, + {"authorId": "1678366", "name": "U. Aickelin"}]}, {"paperId": "b98ddaf22e53211917c0e84a25c48b61e8c1de2f", + "externalIds": {"MAG": "2903571680", "CorpusId": 204444435}, "corpusId": 204444435, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b98ddaf22e53211917c0e84a25c48b61e8c1de2f", + "title": "The Book of Why: The New Science of Cause and Effect", "abstract": + "A Turing Award-winning computer scientist and statistician shows how understanding + causality has revolutionized science and will revolutionize artificial intelligence\"Correlation + is not causation.\" This mantra, chanted by scientists for more than a century, + has led to a virtual prohibition on causal talk. Today, that taboo is dead. + The causal revolution, instigated by Judea Pearl and his colleagues, has cut + through a century of confusion and established causality--the study of cause + and effect--on a firm scientific basis. His work explains how we can know + easy things, like whether it was rain or a sprinkler that made a sidewalk + wet; and how to answer hard questions, like whether a drug cured an illness. + Pearl''s work enables us to know not just whether one thing causes another: + it lets us explore the world that is and the worlds that could have been. + It shows us the essence of human thought and key to artificial intelligence. + Anyone who wants to understand either needs The Book of Why.", "venue": "", + "year": 2018, "referenceCount": 0, "citationCount": 292, "influentialCitationCount": + 21, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2018-05-15", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "145430701", "name": "J. Pearl"}, {"authorId": "2082473026", "name": "D. Mackenzie"}]}, + {"paperId": "6de4f3fc4f3b2eeb357c6b67dbd5e7623e9b527a", "externalIds": {"MAG": + "2086658456", "ArXiv": "0811.0671", "DOI": "10.1103/PhysRevA.79.021601", "CorpusId": + 119109196}, "corpusId": 119109196, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6de4f3fc4f3b2eeb357c6b67dbd5e7623e9b527a", + "title": "All-Optical Formation of Quantum Degenerate Mixtures", "abstract": + "Ultracold atomic gases have provided deep insight intoquantum many-body systems, + since the realization of aquantum degenerate gas, such as a Bose-Einstein + con-densate (BEC) [1] and a degenerate Fermi gas [2]. Oneof the intriguing + new developments in this \ufb01eld is a studyof quantum degeneracy in a mixed + gas. An advantage inthe study using ultracold atomic mixed gases is the abil-ity + to select the statistics of atomic gases: a Bose-Bose,Fermi-Bose and Fermi-Fermi + mixture. The interactions,which determine the stability and the dynamics of + themixed-gas system, can be also tuned by changing a com-bination of a mixed + gas or by using magnetic and opticalFeshbach resonances [3, 4, 5]. So far, + Fermi-Bose mix-tures in the degenerate regime have been realized withvarious + combinations of atoms:", "venue": "", "year": 2008, "referenceCount": 0, "citationCount": + 98, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/0811.0671", "status": "GREEN"}, "fieldsOfStudy": + ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2008-11-05", "journal": {"name": "Physical Review A", + "pages": "021601", "volume": "79"}, "authors": [{"authorId": "92118239", "name": + "T. Fukuhara"}, {"authorId": "48822332", "name": "S. Sugawa"}, {"authorId": + "3984553", "name": "Y. Takasu"}, {"authorId": "50300473", "name": "Y. Takahashi"}]}, + {"paperId": "229d3e0bc4d59021be08f46b2f88042127dc26f9", "externalIds": {"MAG": + "1547046203", "DBLP": "journals/corr/abs-math-0505617", "ArXiv": "math/0505617", + "DOI": "10.1007/S11512-007-0045-X", "CorpusId": 14545404}, "corpusId": 14545404, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/229d3e0bc4d59021be08f46b2f88042127dc26f9", + "title": "On the computational complexity of the Riemann mapping", "abstract": + null, "venue": "ArXiv", "year": 2005, "referenceCount": 69, "citationCount": + 32, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-05-27", "journal": {"name": "Arkiv + f\u00f6r Matematik", "pages": "221-239", "volume": "45"}, "authors": [{"authorId": + "144085549", "name": "I. Binder"}, {"authorId": "143803467", "name": "M. Braverman"}, + {"authorId": "2122647", "name": "M. Yampolsky"}]}, {"paperId": "8a945f992012bd77265689da7042c07ee39c4085", + "externalIds": {"MAG": "1829060681", "DBLP": "journals/computability/Soler-ToscanoZDG13", + "ArXiv": "1211.4891", "DOI": "10.3233/COM-13019", "CorpusId": 16435614}, "corpusId": + 16435614, "publicationVenue": {"id": "38e26272-f1d7-470a-a99f-0b5884c9df6e", + "name": "De Computis", "alternate_names": ["Comput"], "issn": "1886-1881", + "url": "https://dialnet.unirioja.es/servlet/revista?clave_revista=6205&tipo_busqueda=CODIGO", + "alternate_urls": ["http://decomputis.org/ojs/", "https://ideas.repec.org/s/dec/articl.html", + "http://www.decomputis.org/"]}, "url": "https://www.semanticscholar.org/paper/8a945f992012bd77265689da7042c07ee39c4085", + "title": "Correspondence and Independence of Numerical Evaluations of Algorithmic + Information Measures", "abstract": "We show that real-value approximations + of Kolmogorov-Chaitin (K_m) using the algorithmic Coding theorem as calculated + from the output frequency of a large set of small deterministic Turing machines + with up to 5 states (and 2 symbols), is in agreement with the number of instructions + used by the Turing machines producing s, which is consistent with strict integer-value + program-size complexity. Nevertheless, K_m proves to be a finer-grained measure + and a potential alternative approach to lossless compression algorithms for + small entities, where compression fails. We also show that neither K_m nor + the number of instructions used shows any correlation with Bennett''s Logical + Depth LD(s) other than what''s predicted by the theory. The agreement between + theory and numerical calculations shows that despite the undecidability of + these theoretical measures, approximations are stable and meaningful, even + for small programs and for short strings. We also announce a first Beta version + of an Online Algorithmic Complexity Calculator (OACC), based on a combination + of theoretical concepts, as a numerical implementation of the Coding Theorem + Method.", "venue": "De Computis", "year": 2012, "referenceCount": 26, "citationCount": + 47, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1211.4891", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-11-20", "journal": {"name": "ArXiv", + "volume": "abs/1211.4891"}, "authors": [{"authorId": "1389866422", "name": + "F. Soler-Toscano"}, {"authorId": "66445647", "name": "H. Zenil"}, {"authorId": + "2027817702", "name": "J. Delahaye"}, {"authorId": "3159526", "name": "N. + Gauvrit"}]}, {"paperId": "3f1d5ca1024e332dfd1ea5cf052f93d198842b8a", "externalIds": + {"MAG": "181751930", "DOI": "10.1007/978-0-585-26879-8_6", "CorpusId": 141279153}, + "corpusId": 141279153, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3f1d5ca1024e332dfd1ea5cf052f93d198842b8a", + "title": "Mathematical Formalism and Economic Explanation", "abstract": null, + "venue": "", "year": 1986, "referenceCount": 92, "citationCount": 56, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Sociology"], + "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "pages": "179-240", "volume": ""}, "authors": + [{"authorId": "34958583", "name": "Philip Mirowski"}]}, {"paperId": "9411c527c30ace8bef33e7c1a536c32591e2313d", + "externalIds": {"MAG": "1555190167", "DBLP": "conf/hybrid/HenzingerR00", "DOI": + "10.1007/3-540-46430-1_15", "CorpusId": 6172288}, "corpusId": 6172288, "publicationVenue": + {"id": "aef94f2d-b5c3-4b0e-b84f-8dcf3ea2a151", "name": "International Conference + on Hybrid Systems: Computation and Control", "type": "conference", "alternate_names": + ["ACM Int Conf Hybrid Syst Comput Control", "Int Conf Hybrid Syst comput control", + "International Conference on Hybrid Systems: computation and control", "ACM + International Conference Hybrid Systems: Computation and Control", "HSCC", + "ICHS", "Int Conf Hybrid Syst Comput Control"], "url": "http://www.wikicfp.com/cfp/program?id=1235"}, + "url": "https://www.semanticscholar.org/paper/9411c527c30ace8bef33e7c1a536c32591e2313d", "title": "Robust Undecidability of Timed and Hybrid Systems", "abstract": null, "venue": "International Conference on Hybrid Systems: Computation and Control", "year": 2000, "referenceCount": 20, "citationCount": 102, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2000-03-23", "journal": {"pages": "145-159"}, "authors": - [{"authorId": "1710285", "name": "T. Henzinger"}, {"authorId": "1902441", - "name": "J. Raskin"}]}, {"paperId": "bf1006c26b4406d96bceefdd31ccf2fd64c03825", - "externalIds": {"MAG": "2049425906", "DOI": "10.1155/2013/657286", "CorpusId": - 12586450}, "url": "https://www.semanticscholar.org/paper/bf1006c26b4406d96bceefdd31ccf2fd64c03825", - "title": "Pattern Formation in a Semi-Ratio-Dependent Predator-Prey System - with Diffusion", "abstract": "We investigate spatiotemporal dynamics of a - semi-ratio-dependent predator-prey system with reaction-diffusion and zero-flux - boundary. We obtain the conditions for Hopf, Turing, and wave bifurcations - of the system in a spatial domain by making use of the linear stability analysis - and the bifurcation analysis. In addition, for an initial condition which - is a small amplitude random perturbation around the steady state, we classify - spatial pattern formations of the system by using numerical simulations. The - results of numerical simulations unveil that there are various spatiotemporal - patterns including typical Turing patterns such as spotted, spot-stripelike - mixtures and stripelike patterns thanks to the Turing instability, that an - oscillatory wave pattern can be emerged due to the Hopf and wave instability, - and that cooperations of Turing and Hopf instabilities can cause occurrence - of spiral patterns instead of typical Turing patterns. Finally, we discuss - spatiotemporal dynamics of the system for several different asymmetric initial - conditions via numerical simulations.", "venue": "", "year": 2013, "referenceCount": - 33, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2013-04-04", "journal": {"name": - "Discrete Dynamics in Nature and Society", "pages": "1-14", "volume": "2013"}, - "authors": [{"authorId": "2229102", "name": "H. Baek"}, {"authorId": "50845884", - "name": "D. Jung"}, {"authorId": "2108288737", "name": "Zhiwei Wang"}]}, {"paperId": - "3efb03575a0e28ccaa9b0b88789a11b44052ace2", "externalIds": {"MAG": "2488721800", - "DBLP": "journals/jifs/FariasLBS16", "DOI": "10.3233/JIFS-152489", "CorpusId": - 37097389}, "url": "https://www.semanticscholar.org/paper/3efb03575a0e28ccaa9b0b88789a11b44052ace2", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2000-03-23", "journal": + {"pages": "145-159"}, "authors": [{"authorId": "1710285", "name": "T. Henzinger"}, + {"authorId": "1902441", "name": "J. Raskin"}]}, {"paperId": "4d2e22795a6d6cc13e3f234da35b56617cc1697d", + "externalIds": {"DBLP": "journals/mst/Kannan84", "MAG": "2040654780", "DOI": + "10.1007/BF01744432", "CorpusId": 12756307}, "corpusId": 12756307, "publicationVenue": + {"id": "cc43107f-e671-4f87-99f5-ae12f9992c0d", "name": "Mathematical Systems + Theory", "type": "journal", "alternate_names": ["Math Syst Theory", "Theory + Comput Syst Math Syst Theory", "Theory of Computing Systems \\/ Mathematical + Systems Theory"], "issn": "0025-5661", "url": "https://link.springer.com/journal/224"}, + "url": "https://www.semanticscholar.org/paper/4d2e22795a6d6cc13e3f234da35b56617cc1697d", + "title": "Towards separating nondeterminism from determinism", "abstract": + null, "venue": "Mathematical Systems Theory", "year": 1984, "referenceCount": + 14, "citationCount": 26, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1984-12-01", "journal": {"name": "Mathematical systems theory", "pages": + "29-45", "volume": "17"}, "authors": [{"authorId": "144632403", "name": "R. + Kannan"}]}, {"paperId": "7aa2f869502d92ac1fce4f2c2dc626426950f6fc", "externalIds": + {"MAG": "2126638623", "DBLP": "journals/fuin/Moniri13", "DOI": "10.3233/FI-2013-812", + "CorpusId": 868009}, "corpusId": 868009, "publicationVenue": {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", + "name": "Fundamenta Informaticae", "type": "journal", "alternate_names": ["Fundam + Informaticae"], "issn": "0169-2968", "url": "http://content.iospress.com/journals/fundamenta-informaticae", + "alternate_urls": ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, + "url": "https://www.semanticscholar.org/paper/7aa2f869502d92ac1fce4f2c2dc626426950f6fc", + "title": "Fuzzy and Intuitionistic Fuzzy Turing Machines", "abstract": "First + we define a new class of fuzzy Turing machines that we call Generalized Fuzzy + Turing Machines. Our machines are equipped with rejecting states as well as + accepting states. While we use a t-norm for computing degrees of accepting + or rejecting paths, we use its dual t-conorm for computing the accepting or + rejecting degrees of inputs. We naturally define when a generalized fuzzy + Turing machine accepts or decides a fuzzy language. We prove that a fuzzy + language L is decidable if and only if L and its complement are acceptable. + Moreover, to each r.e. or co-r.e language L, we naturally correspond a fuzzy + language which is acceptable by a generalized fuzzy Turing machine. A converse + to this result is also proved. We also consider Atanasov''s intuitionistic + fuzzy languages and introduce a version of fuzzy Turing machine for studying + their computability theoretic properties.", "venue": "Fundamenta Informaticae", + "year": 2013, "referenceCount": 13, "citationCount": 11, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-07-01", "journal": {"name": "Fundam. Informaticae", + "pages": "305-315", "volume": "123"}, "authors": [{"authorId": "1898026", + "name": "Morteza Moniri"}]}, {"paperId": "e1546502b88a6af5b263a2bd1d78b9f11c72ff94", + "externalIds": {"MAG": "624259981", "CorpusId": 55181932}, "corpusId": 55181932, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e1546502b88a6af5b263a2bd1d78b9f11c72ff94", + "title": "Philosophy in a New Century: Selected Essays", "abstract": "Introduction + 1. Philosophy in a new century 2. Social ontology: some basic principles 3. + The Turing Test: 55 years later 4. Twenty-one years in the Chinese room 5. + Is the brain a digital computer? 6. The phenomenological illusion 7. The self + as a problem in philosophy and neurobiology 8. Why I am not a property dualist + 9. Fact and value, ''is'' and ''ought,'' and reasons for action 10. The unity + of the proposition.", "venue": "", "year": 2008, "referenceCount": 2, "citationCount": + 40, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": "Philosophy", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-12-04", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "34493294", "name": "J. Searle"}]}, + {"paperId": "525b9f410e3ccb466b22a99405c901e86d8615a5", "externalIds": {"MAG": + "2121140357", "DOI": "10.1093/PHILMAT/3.1.86", "CorpusId": 123119661}, "corpusId": + 123119661, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/525b9f410e3ccb466b22a99405c901e86d8615a5", + "title": "Intuitionists Are Not (Turing) Machines", "abstract": "Lucas and + Penrose have contended that, by displaying how any characterisation of arithmetical + proof programmable into a machine allows of diagonalisation, generating a + humanly recognisable proof which eludes that characterisation, Gddel''s incompleteness + theorem rules out any purely mechanical model of the human intellect. The + main criticisms of this argument have been that the proof generated by diagonalisation + (i) will not be humanly recognisable unless humans can grasp the specification + of the object-system (Benacerraf); and (ii) counts as a proof only on the + (iinproven) hypothesis that the object system is consistent (Putnam). The + present paper argues that criticism (ii) may be met head-on by an intuitionistic + proponent of the anti-mechanist argument; and that criticism (i) is simply + mistaken. However the paper concludes by questioning the sufficiency of the + situation for an interesting anti-mechanist conclusion. u Thanks to Bob Hale, + Stewart Shapiro and Neil Tennant for criticisms of an earlier draft, and to + the participants at the Conference on the philosophy of Michael Dummett held + at Mussomeli, Sicily, in September 1992 at which a version of the principal + argument was presented. Downloaded from https://academic.oup.com/philmat/article-abstract/3/1/86/1508324 + by University of St Andrews user on 21 November 2017", "venue": "", "year": + 1995, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Philosophia Mathematica", "pages": "86-102", "volume": + "3"}, "authors": [{"authorId": "144728712", "name": "C. Wright"}]}, {"paperId": + "9b4a303c27b2511c5eca850045ad9067eea622f1", "externalIds": {"DBLP": "journals/corr/abs-1212-6745", + "MAG": "1564781888", "CorpusId": 51975416}, "corpusId": 51975416, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9b4a303c27b2511c5eca850045ad9067eea622f1", + "title": "Two-Dimensional Kolmogorov Complexity and Validation of the Coding + Theorem Method by Compressibility", "abstract": "We propose a measure based + upon the fundamental theoretical concept in algorithmic information theory + that provides a natural approach to the problem of evaluating $n$-dimensional + complexity by using an $n$-dimensional deterministic Turing machine. The technique + is interesting because it provides a natural algorithmic process for symmetry + breaking generating complex $n$-dimensional structures from perfectly symmetric + and fully deterministic computational rules producing a distribution of patterns + as described by algorithmic probability. Algorithmic probability also elegantly + connects the frequency of occurrence of a pattern with its algorithmic complexity, + hence effectively providing estimations to the complexity of the generated + patterns. Experiments to validate estimations of algorithmic complexity based + on these concepts are presented, showing that the measure is stable in the + face of some changes in computational formalism and that results are in agreement + with the results obtained using lossless compression algorithms when both + methods overlap in their range of applicability. We then use the output frequency + of the set of 2-dimensional Turing machines to classify the algorithmic complexity + of the space-time evolutions of Elementary Cellular Automata.", "venue": "ArXiv", + "year": 2012, "referenceCount": 16, "citationCount": 47, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-30", "journal": + {"name": "ArXiv", "volume": "abs/1212.6745"}, "authors": [{"authorId": "66445647", + "name": "H. Zenil"}, {"authorId": "1389866422", "name": "F. Soler-Toscano"}, + {"authorId": "2027817702", "name": "J. Delahaye"}, {"authorId": "3159526", + "name": "N. Gauvrit"}]}, {"paperId": "1e29fe8ee57b97fd4704cbeb4eaa02fc95fada7a", + "externalIds": {"MAG": "2097987409", "DOI": "10.1016/J.JTBI.2005.10.016", + "CorpusId": 18315552, "PubMed": "16364368"}, "corpusId": 18315552, "publicationVenue": + {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", "name": "Journal of Theoretical + Biology", "type": "journal", "alternate_names": ["J Theor Biology"], "issn": + "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/1e29fe8ee57b97fd4704cbeb4eaa02fc95fada7a", + "title": "Mixed-mode pattern in Doublefoot mutant mouse limb--Turing reaction-diffusion + model on a growing domain during limb development.", "abstract": null, "venue": + "Journal of Theoretical Biology", "year": 2006, "referenceCount": 58, "citationCount": + 103, "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": + {"url": "https://ora.ox.ac.uk/objects/uuid:bc2d0b21-69b3-4871-a1ed-c981fd73f6eb/files/m8f5d96c2f916a824c7559b1901a83fef", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2006-06-21", "journal": {"name": "Journal + of theoretical biology", "pages": "\n 562-73\n ", "volume": + "240 4"}, "authors": [{"authorId": "47938934", "name": "T. Miura"}, {"authorId": + "32679518", "name": "K. Shiota"}, {"authorId": "1402108488", "name": "G. Morriss-Kay"}, + {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": "0275f4cf9e0c0e7d2333530a83e48742d6758b80", + "externalIds": {"MAG": "2040595765", "DOI": "10.1063/1.1888386", "CorpusId": + 11085643, "PubMed": "15910059"}, "corpusId": 11085643, "publicationVenue": + {"id": "1bb63b2b-3f57-4387-aaf6-b2a33dfcdcc5", "name": "Journal of Chemical + Physics", "type": "journal", "alternate_names": ["J Chem Phys"], "issn": "0021-9606", + "url": "http://jcp.aip.org/", "alternate_urls": ["https://aip.scitation.org/journal/jcp"]}, + "url": "https://www.semanticscholar.org/paper/0275f4cf9e0c0e7d2333530a83e48742d6758b80", + "title": "\"Black spots\" in a surfactant-rich Belousov-Zhabotinsky reaction + dispersed in a water-in-oil microemulsion system.", "abstract": "The Belousov-Zhabotinsky + (BZ) reaction dispersed in water-in-oil aerosol OT (AOT) microemulsion has + been studied at small radius R(d) of water nanodroplets (R(d) (nm) congruent + with0.17omega,omega = [H(2)O][AOT] = 9). Stationary spotlike and labyrinthine + Turing patterns are found close to the fully oxidized state. These patterns, + islands of high concentration of the reduced state of the Ru(bpy)(3) (2+) + catalyst, can coexist either with \"black\" reduction waves or, under other + conditions, with the \"white\" oxidation waves usually observed in the BZ + reaction. The experimental observations are analyzed with the aid of a new + Oregonator-like model and qualitatively reproduced in computer simulations.", + "venue": "Journal of Chemical Physics", "year": 2005, "referenceCount": 37, + "citationCount": 55, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}, + {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-05-03", "journal": {"name": "The + Journal of chemical physics", "pages": "\n 174706\n ", "volume": + "122 17"}, "authors": [{"authorId": "6335623", "name": "A. Kaminaga"}, {"authorId": + "2258489", "name": "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, + {"paperId": "3c999256446d684085714db9ea543aedd26c2d4e", "externalIds": {"MAG": + "2511283383", "DOI": "10.1016/j.jtbi.2016.08.005", "CorpusId": 20901470, "PubMed": + "27519949"}, "corpusId": 20901470, "publicationVenue": {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", + "name": "Journal of Theoretical Biology", "type": "journal", "alternate_names": + ["J Theor Biology"], "issn": "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/3c999256446d684085714db9ea543aedd26c2d4e", + "title": "Identifying network topologies that can generate turing pattern.", + "abstract": null, "venue": "Journal of Theoretical Biology", "year": 2016, + "referenceCount": 39, "citationCount": 27, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-11-07", "journal": {"name": "Journal of theoretical biology", "pages": + "\n 88-96\n ", "volume": "408"}, "authors": [{"authorId": + "4524754", "name": "M. M. Zheng"}, {"authorId": "2064567134", "name": "Bin + Shao"}, {"authorId": "46173639", "name": "Q. Ouyang"}]}, {"paperId": "fc4475bba885d796868e784294b824f87eea5fbd", + "externalIds": {"MAG": "2143000126", "DOI": "10.2174/1874226200902010009", + "CorpusId": 16537269}, "corpusId": 16537269, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fc4475bba885d796868e784294b824f87eea5fbd", + "title": "Histamine, Histamine Receptors, and their Role in Immunomodulation: + An Updated Systematic Review", "abstract": "Histamine, a biological amine, + is considered as a principle mediator of many pathological processes regulating + several essential events in allergies and autoimmune diseases. It stimulates + different biological activities through differen- tial expression of four + types of histamine receptors (H1R, H2R, H3R and H4R) on secretion by effector + cells (mast cells and basophils) through various immunological or non-immunological + stimuli. Since H4R has been discovered very re- cently and there is paucity + of comprehensive literature covering new histamine receptors, their antagonists/agonists, + and role in immune regulation and immunomodulation, we tried to update the + current aspects and fill the gap in existing litera- ture. This review will + highlight the biological and pharmacological characterization of histamine, + histamine receptors, their antagonists/agonists, and implications in immune + regulation and immunomodulation.", "venue": "", "year": 2009, "referenceCount": + 463, "citationCount": 96, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "http://benthamopen.com/contents/pdf/TOIJ/TOIJ-2-9.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, + {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review"], + "publicationDate": "2009-03-04", "journal": {"name": "The Open Immunology + Journal", "pages": "9-41", "volume": "2"}, "authors": [{"authorId": "48406460", + "name": "M. Shahid"}, {"authorId": "10661375", "name": "T. Tripathi"}, {"authorId": + "14714760", "name": "F. Sobia"}, {"authorId": "51909226", "name": "S. Moin"}, + {"authorId": "13374373", "name": "M. Siddiqui"}, {"authorId": "5471551", "name": + "R. Khan"}]}, {"paperId": "3efb03575a0e28ccaa9b0b88789a11b44052ace2", "externalIds": + {"MAG": "2488721800", "DBLP": "journals/jifs/FariasLBS16", "DOI": "10.3233/JIFS-152489", + "CorpusId": 37097389}, "corpusId": 37097389, "publicationVenue": {"id": "2dc4386c-f418-4a62-a2c3-6b89b06981be", + "name": "Journal of Intelligent & Fuzzy Systems", "type": "journal", "alternate_names": + ["Journal of Intelligent and Fuzzy Systems", "J Intell Fuzzy Syst", "J Intell + Fuzzy Syst"], "issn": "1064-1246", "url": "http://content.iospress.com/journals/journal-of-intelligent-and-fuzzy-systems/", + "alternate_urls": ["http://www.iospress.nl/journal-of-intelligent-fuzzy-systems/", + "https://www.iospress.nl/html/10641246.php"]}, "url": "https://www.semanticscholar.org/paper/3efb03575a0e28ccaa9b0b88789a11b44052ace2", "title": "Closure properties for fuzzy recursively enumerable languages and fuzzy recursive languages", "abstract": "There are several variations of fuzzy Turing machines in the literature, many of them require a t-norm in order @@ -45659,155 +51457,18 @@ interactions: and show, among other results, which classes of LFRE are closed under unions and intersections.", "venue": "Journal of Intelligent & Fuzzy Systems", "year": 2016, "referenceCount": 35, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "J. Intell. Fuzzy Syst.", "pages": "1795-1806", - "volume": "31"}, "authors": [{"authorId": "3448655", "name": "A. D. S. Farias"}, - {"authorId": "3448414", "name": "L. R. D. A. Lopes"}, {"authorId": "10079486", - "name": "B. Bedregal"}, {"authorId": "1835361", "name": "R. Santiago"}]}, - {"paperId": "3ee6733d010883827057c69da483150443931bd2", "externalIds": {"MAG": - "2043740546", "DOI": "10.1007/S11587-008-0026-9", "CorpusId": 121667227}, - "url": "https://www.semanticscholar.org/paper/3ee6733d010883827057c69da483150443931bd2", - "title": "On the dynamics of predator-prey models with the Beddington\u2013De - Angelis functional response, under Robin boundary conditions", "abstract": - null, "venue": "", "year": 2008, "referenceCount": 26, "citationCount": 31, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2008-05-20", "journal": {"name": "Ricerche di Matematica", "pages": "137-157", - "volume": "57"}, "authors": [{"authorId": "13106451", "name": "F. Capone"}]}, - {"paperId": "ae9fd1398fa804e46bf41c38bde1cb58b71d6f96", "externalIds": {"MAG": - "2018770712", "DBLP": "journals/sigact/Ben-Amram05", "DOI": "10.1145/1086649.1086651", - "CorpusId": 13566703}, "url": "https://www.semanticscholar.org/paper/ae9fd1398fa804e46bf41c38bde1cb58b71d6f96", - "title": "The Church-Turing thesis and its look-alikes", "abstract": "\"A - function is mechanically computable (that is: computable by means of a machine) - if and only if it is Turing-computable.\"", "venue": "SIGA", "year": 2005, - "referenceCount": 2, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": - false, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2005-09-01", "journal": {"name": "SIGACT News", "pages": "113-114", "volume": - "36"}, "authors": [{"authorId": "1398925265", "name": "A. Ben-Amram"}]}, {"paperId": - "9847441b8ed5c180dfb4e5d2956be24ac6a9dd47", "externalIds": {"DBLP": "conf/eva/BowenG17", - "MAG": "2753593866", "DOI": "10.14236/ewic/EVA2017.9", "CorpusId": 36050872}, - "url": "https://www.semanticscholar.org/paper/9847441b8ed5c180dfb4e5d2956be24ac6a9dd47", - "title": "Life in Code and Digits: When Shannon met Turing", "abstract": "Claude - Shannon (1916\u20132001) is regarded as the father of information theory. - Alan Turing (1912\u20131954) is known as the father of computer science. In - the year 1943, Shannon and Turing were both at Bell Labs in New York City, - although working on different projects. They had discussions \ntogether, including - about Turing\u2019s \u201cUniversal Machine,\u201d a type of computational - brain. Turing seems quite surprised that in a sea of code and computers, Shannon - envisioned the arts and \nculture as an integral part of the digital revolution - \u2013 a digital DNA of sorts. What was dreamlike in 1943, is today a reality, - as digital representation of all media, accounts for millions of \u201ccultural - things\u201d and massive music collections. The early connections that Shannon - made between the arts, information, and computing, intuit the future that - we are experiencing today. This paper considers foundational aspects of the - digital revolution, the current state, and the possible future. \nIt examines - how digital life is increasingly becoming part of real life for more and more - people around the world, especially with respect to the arts, culture, and - heritage.", "venue": "EVA", "year": 2017, "referenceCount": 41, "citationCount": - 17, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-07-01", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "1772040", "name": "Jonathan P. Bowen"}, {"authorId": "3328121", - "name": "Tula Giannini"}]}, {"paperId": "8df25bc010e24356e2d39fcca74f210fb228593c", - "externalIds": {"MAG": "1980268869", "DBLP": "journals/apal/Harizanov98", - "DOI": "10.1016/S0168-0072(97)00056-0", "CorpusId": 8403585}, "url": "https://www.semanticscholar.org/paper/8df25bc010e24356e2d39fcca74f210fb228593c", - "title": "Turing Degrees of Certain Isomorphic Images of Computable Relations", - "abstract": null, "venue": "Annals of Pure and Applied Logic", "year": 1998, - "referenceCount": 14, "citationCount": 27, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-04-28", "journal": - {"name": "Ann. Pure Appl. Log.", "pages": "103-113", "volume": "93"}, "authors": - [{"authorId": "3187833", "name": "V. Harizanov"}]}, {"paperId": "30751d0863b0f39d0545ec149c4d906da88f3db7", - "externalIds": {"DBLP": "journals/cie/GolleD05", "MAG": "2023103153", "DOI": - "10.1145/1077246.1077255", "CorpusId": 18154410}, "url": "https://www.semanticscholar.org/paper/30751d0863b0f39d0545ec149c4d906da88f3db7", - "title": "Preventing bots from playing online games", "abstract": "As multiplayer - online gaming gains in economic and social importance, an increasingly large - number of players is beginning to rely on bots (automated player agents) to - gain unfair advantages in games. In this article we study the problem of restricting - participation in online games to human players so they can enjoy the game - without interference from the bots. We propose two broad approaches to prevent - bots from playing online games. The first consists of seamlessly integrating - software-based tests (known as reverse Turing tests or CAPTCHA tests) into - online games to tell humans and computers apart. Our second contribution is - to propose hardware instantiations of CAPTCHA tests. Our techniques are applicable - in a wide variety of online games, from poker to \"shoot''em ups.\" They are - cost-effective, immune to cheating, and preserve the human players'' enjoyment - of each game. We conclude with a discussion of how approaches to deter the - use of bots may complement our techniques to detect bots.", "venue": "Conference - on Computability in Europe", "year": 2005, "referenceCount": 13, "citationCount": - 97, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2005-07-01", "journal": - {"name": "Comput. Entertain.", "pages": "3", "volume": "3"}, "authors": [{"authorId": - "2779068", "name": "P. Golle"}, {"authorId": "1697237", "name": "Nicolas Ducheneaut"}]}, - {"paperId": "994147e499da06165f0efa8e369d37c13d2318d4", "externalIds": {"DBLP": - "journals/jsyml/Copestake88", "MAG": "2062295175", "DOI": "10.2307/2274578", - "CorpusId": 37432574}, "url": "https://www.semanticscholar.org/paper/994147e499da06165f0efa8e369d37c13d2318d4", - "title": "1-genericity in the enumeration degrees", "abstract": "The structure - of the Turing degrees of generic and n-generic sets has been studied fairly - extensively, especially for n = 1 and n = 2. The original formulation of 1-generic - set in terms of recursively enumerable sets of strings is due to D. Posner - [11], and much work has since been done, particularly by C. G. Jockusch and - C. T. Chong (see [5] and [6]). In the enumeration degrees (see definition - below), attention has previously been restricted to generic sets and functions. - J. Case used genericity for many of the results in his thesis [1]. In this - paper we develop a notion of 1-generic partial function, and study the structure - and characteristics of such functions in the enumeration degrees. We find - that the e-degree of a 1-generic function is quasi-minimal. However, there - are no e-degrees minimal in the 1-generic e-degrees, since if a 1-generic - function is recursively split into finitely or infinitely many parts the resulting - functions are e-independent (in the sense defined by K. McEvoy [8]) and 1-generic. - This result also shows that any recursively enumerable partial ordering can - be embedded below any 1-generic degree. Many results in the Turing degrees - have direct parallels in the enumeration degrees. Applying the minimal Turing - degree construction to the partial degrees (the e-degrees of partial functions) - produces a total partial degree ae which is minimal-like; that is, all functions - in degrees below ae have partial recursive extensions.", "venue": "Journal - of Symbolic Logic (JSL)", "year": 1988, "referenceCount": 13, "citationCount": - 25, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1988-09-01", "journal": {"name": "Journal of Symbolic - Logic", "pages": "878 - 887", "volume": "53"}, "authors": [{"authorId": "1936335", - "name": "K. Copestake"}]}, {"paperId": "ef1267970b46aa3e842092eb3e23101e59a5a7a1", - "externalIds": {"MAG": "2030126379", "DOI": "10.1353/CRT.2010.0022", "CorpusId": - 144907585}, "url": "https://www.semanticscholar.org/paper/ef1267970b46aa3e842092eb3e23101e59a5a7a1", - "title": "Truth and Consequences: On Paranoid Reading and Reparative Reading", - "abstract": "problem could be overdetermination: there are so many things - I might mean. Insofar as Sedgwick helped to launch queer literary studies, - she played a significant role in allowing me to have a job that I could tolerate - in academia, or even in a profession at all; along with a handful of others, - she helped to make it possible for me to live a queer life that I could never - have imagined. In addition to this most direct sense in which I have been - enabled, there is also the fact that Sedgwick in her work explicitly sought - to clear intellectual and affective space for others\u2014to grant permission. - She really knew how to reach out and touch someone. Reading her work tends - to open unexpected conceptual possibilities, ways of thinking, ges tures, - and tones. I think this sense of opening or enlargement is what Ju dith Butler - has in mind when she observes that an encounter with", "venue": "", "year": - 2010, "referenceCount": 7, "citationCount": 98, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": - "Art", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Criticism", - "pages": "235-241", "volume": "52"}, "authors": [{"authorId": "117550497", - "name": "Heather K. Love"}]}, {"paperId": "d6011ecf3cdfbe838f567ea1e90ef64dffbd3739", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "J. Intell. Fuzzy Syst.", "pages": + "1795-1806", "volume": "31"}, "authors": [{"authorId": "3448655", "name": + "A. D. S. Farias"}, {"authorId": "3448414", "name": "L. R. D. A. Lopes"}, + {"authorId": "10079486", "name": "B. Bedregal"}, {"authorId": "1835361", "name": + "R. Santiago"}]}, {"paperId": "d6011ecf3cdfbe838f567ea1e90ef64dffbd3739", "externalIds": {"MAG": "1574240406", "DOI": "10.1002/J.1551-8833.1963.TB01102.X", - "CorpusId": 109163093}, "url": "https://www.semanticscholar.org/paper/d6011ecf3cdfbe838f567ea1e90ef64dffbd3739", + "CorpusId": 109163093}, "corpusId": 109163093, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d6011ecf3cdfbe838f567ea1e90ef64dffbd3739", "title": "Threshold Odors of Organic Chemicals", "abstract": "ture to discover gaps in the technology.2 Subsequently, recommendations were made for experimental research to fill these gaps. Phase two, a laboratory study, was devoted to @@ -45817,14 +51478,438 @@ interactions: and background odor have been reported.3 The application of the reported results to laboratory practice in order to determine the threshold", "venue": "", "year": 1963, "referenceCount": 0, "citationCount": 57, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1963-07-01", - "journal": {"name": "Journal American Water Works Association", "pages": "913-916", - "volume": "55"}, "authors": [{"authorId": "145856603", "name": "R. Baker"}]}, - {"paperId": "a06efce214fbd415d1cdc8830890dce4aa825d5c", "externalIds": {"MAG": - "2026429056", "DOI": "10.1353/tech.2002.0126", "CorpusId": 108580173}, "url": - "https://www.semanticscholar.org/paper/a06efce214fbd415d1cdc8830890dce4aa825d5c", + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1963-07-01", "journal": {"name": "Journal American Water Works Association", + "pages": "913-916", "volume": "55"}, "authors": [{"authorId": "145856603", + "name": "R. Baker"}]}, {"paperId": "2684da28557281619903d8771d3c1ed308a481f7", + "externalIds": {"MAG": "1997004672", "DOI": "10.1094/PDIS.1997.81.11.1231", + "CorpusId": 76666922, "PubMed": "30861725"}, "corpusId": 76666922, "publicationVenue": + {"id": "bc2f762a-df83-4eb9-9a9c-c7edd8e22f81", "name": "Plant Disease", "type": + "journal", "alternate_names": ["Plant Dis"], "issn": "0191-2917", "url": "https://www.apsnet.org/publications/plantdisease/Pages/default.aspx", + "alternate_urls": ["https://apsjournals.apsnet.org/loi/pdis"]}, "url": "https://www.semanticscholar.org/paper/2684da28557281619903d8771d3c1ed308a481f7", + "title": "Resistance of Transgenic Prunus domestica to Plum Pox Virus Infection.", + "abstract": "Transgenic plum trees (Prunus domestica) containing the plum + pox potyvirus coat protein (PPV-CP) gene were inoculated with PPV by aphid + feeding or chip budding. Infection was monitored by evaluation of virus symptoms, + DAS-ELISA, and immunoblot assays. Based on observations and analyses over + 3 years including two dormancy cycles, one out of five transgenic clones (C-5), + was found to be resistant to infection whether inoculated by aphids or by + chip budding. PPV could not be detected in any inoculated plants of the C-5 + clone by immunoblot or immunocap-ture-reverse transcriptase-polymerase chain + reaction assays. To our knowledge, this is the first P. domestica clone resistant + to PPV infection produced by genetic engineering.", "venue": "Plant Disease", + "year": 1997, "referenceCount": 29, "citationCount": 104, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://apsjournals.apsnet.org/doi/pdf/10.1094/PDIS.1997.81.11.1231", + "status": "HYBRID"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": + "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1997-11-01", "journal": {"name": "Plant + disease", "pages": "\n 1231-1235\n ", "volume": "81 11"}, + "authors": [{"authorId": "5899563", "name": "M. Ravelonandro"}, {"authorId": + "49587628", "name": "R. Scorza"}, {"authorId": "21801901", "name": "J. Bachelier"}, + {"authorId": "4716661", "name": "G. Labonne"}, {"authorId": "145664829", "name": + "L. Levy"}, {"authorId": "5432148", "name": "V. Damsteegt"}, {"authorId": + "40135742", "name": "A. Callahan"}, {"authorId": "6675334", "name": "J. Dunez"}]}, + {"paperId": "43a880702cf921534297446b58d357a29181022a", "externalIds": {"DBLP": + "journals/fuin/Martin-VidePPR02", "MAG": "1484840002", "CorpusId": 45575}, + "corpusId": 45575, "publicationVenue": {"id": "a08144db-daaa-4f1d-8f59-498ba09560f7", + "name": "Fundamenta Informaticae", "type": "journal", "alternate_names": ["Fundam + Informaticae"], "issn": "0169-2968", "url": "http://content.iospress.com/journals/fundamenta-informaticae", + "alternate_urls": ["http://fi.mimuw.edu.pl/", "https://fi.mimuw.edu.pl/index.php/FI"]}, + "url": "https://www.semanticscholar.org/paper/43a880702cf921534297446b58d357a29181022a", + "title": "ReMembrane Systems with Coupled Transport: Universality and Normal + Forms", "abstract": "This paper continues research on membrane systems which + function by communication only, meaning that there are no evolving rules for + molecules. The whole computation process relies on passage of molecules through + membranes - this provides communication between regions of the membrane system. + Next to transport of single molecules through membranes (uniport) we also + study a coupled transport of molecules, with two molecules passing either + in the same direction (symport) or in opposite directions (antiport). We study + the computational power of such membrane systems and prove that using only + symport one gets Turing universality. Moreover, we prove that five membranes + suffice to get Turing universality, and the number of membranes can be decreased + to three if forbidding context conditions for transport are used.", "venue": + "Fundamenta Informaticae", "year": 2002, "referenceCount": 10, "citationCount": + 28, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Fundam. Informaticae", "pages": "1-15", "volume": + "49"}, "authors": [{"authorId": "1397242142", "name": "C. Mart\u00edn-Vide"}, + {"authorId": "143936370", "name": "A. Paun"}, {"authorId": "1698119", "name": + "G. Paun"}, {"authorId": "144182665", "name": "G. Rozenberg"}]}, {"paperId": + "7c03dd00c68fa459eeae92d51993c480c332e8c4", "externalIds": {"MAG": "2150917454", + "DOI": "10.1080/10002007088537484", "CorpusId": 56682506}, "corpusId": 56682506, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7c03dd00c68fa459eeae92d51993c480c332e8c4", + "title": "A language for easy and efficient modeling of Turing machines", + "abstract": "Abstract A Turning Machine Description Language (TMDL) is developed + for easy and efficient modeling of Turing machines. TMDL supports formal symbolic + representation of Turing machines. The grammar for the language is also provided. + Then a fast single-pass complier is developed for TMDL. The scope of code + optimization in the complier is examined. An interpreter is used to simulate + the exact behavior of the compiled Turning machines. A dynamically allocated + and resizable array is used to simulate the infinite tape of a Turing machine. + The procedure for simulating composite Turing machines is also explained. + In this paper, two sample Turing machines have been designed in TMDL and their + simulations are discussed. The TMDL can be extended to model the different + variations of the standard Turing machine.", "venue": "", "year": 2007, "referenceCount": + 2, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2007-08-10", "journal": {"name": "Progress in Natural Science", "pages": + "867-871", "volume": "17"}, "authors": [{"authorId": "46823505", "name": "P. + Chakraborty"}]}, {"paperId": "67ca442b1662171733d234e52b3c4af929619c45", "externalIds": + {"DBLP": "journals/jetai/AllenVZ00", "MAG": "2181480948", "DOI": "10.1080/09528130050111428", + "CorpusId": 17838736}, "corpusId": 17838736, "publicationVenue": {"id": "3bd914d6-127c-4142-97e3-d261d5c4ac5d", + "name": "Journal of experimental and theoretical artificial intelligence (Print)", + "type": "journal", "alternate_names": ["J Exp Theor Artif Intell", "J exp + theor artif intell (print", "Journal of Experimental and Theoretical Artificial + Intelligence"], "issn": "0952-813X", "url": "http://www.tandfonline.com/action/journalInformation?journalCode=teta20", + "alternate_urls": ["http://www.tandf.co.uk/journals/default.asp", "http://www.tandfonline.com/loi/teta20"]}, + "url": "https://www.semanticscholar.org/paper/67ca442b1662171733d234e52b3c4af929619c45", + "title": "Prolegomena to any future artificial moral agent", "abstract": "As + artificial intelligence moves ever closer to the goal of producing fully autonomous + agents, the question of how to design and implement an artificial moral agent + (AMA) becomes increasingly pressing. Robots possessing autonomous capacities + to do things that are useful to humans will also have the capacity to do things + that are harmful to humans and other sentient beings. Theoretical challenges + to developing artificial moral agents result both from controversies among + ethicists about moral theory itself, and from computational limits to the + implementation of such theories. In this paper the ethical disputes are surveyed, + the possibility of a \u2018moral Turing Test\u2019 is considered and the computational + difficulties accompanying the different types of approach are assessed. Human-like + performance, which is prone to include immoral actions, may not be acceptable + in machines, but moral perfection may be computationally unattainable. The + risks posed by autonomous machines ignorantly or deliberately harming people + and other sentient beings are great. The development of machines with enough + intelligence to assess the effects of their actions on sentient beings and + act accordingly may ultimately be the most important task faced by the designers + of artificially intelligent automata.", "venue": "Journal of experimental + and theoretical artificial intelligence (Print)", "year": 2000, "referenceCount": + 34, "citationCount": 275, "influentialCitationCount": 18, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Psychology", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "2000-07-01", "journal": {"name": "Journal of Experimental + & Theoretical Artificial Intelligence", "pages": "251 - 261", "volume": "12"}, + "authors": [{"authorId": "30308222", "name": "C. Allen"}, {"authorId": "145447621", + "name": "G. Varner"}, {"authorId": "4324210", "name": "Jason Zinser"}]}, {"paperId": + "65f8fbcef28d6a8421cb456f32f43fe27cce40cc", "externalIds": {"MAG": "3182978696", + "DOI": "10.1038/S41567-021-01288-Y", "CorpusId": 237767233}, "corpusId": 237767233, + "publicationVenue": {"id": "7e9db4a0-67c4-46c4-9b17-d48d100c2cb7", "name": + "Nature Physics", "type": "journal", "alternate_names": ["Nat Phys"], "issn": + "1745-2473", "url": "http://www.nature.com/nphys/", "alternate_urls": ["http://www.nature.com/nphys/archive/index.html", + "http://www.nature.com/nphys/index.html"]}, "url": "https://www.semanticscholar.org/paper/65f8fbcef28d6a8421cb456f32f43fe27cce40cc", + "title": "Nanoscale Turing patterns in a bismuth monolayer", "abstract": null, + "venue": "Nature Physics", "year": 2021, "referenceCount": 41, "citationCount": + 10, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/2104.01058", "status": "GREEN"}, "fieldsOfStudy": + ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2021-07-08", "journal": {"name": "Nature Physics"}, "authors": + [{"authorId": "15769671", "name": "Y. Fuseya"}, {"authorId": "11037201", "name": + "H. Katsuno"}, {"authorId": "34686254", "name": "Kamran Behnia"}, {"authorId": + "4839147", "name": "A. Kapitulnik"}]}, {"paperId": "ae9fd1398fa804e46bf41c38bde1cb58b71d6f96", + "externalIds": {"MAG": "2018770712", "DBLP": "journals/sigact/Ben-Amram05", + "DOI": "10.1145/1086649.1086651", "CorpusId": 13566703}, "corpusId": 13566703, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ae9fd1398fa804e46bf41c38bde1cb58b71d6f96", + "title": "The Church-Turing thesis and its look-alikes", "abstract": "\"A + function is mechanically computable (that is: computable by means of a machine) + if and only if it is Turing-computable.\"", "venue": "SIGA", "year": 2005, + "referenceCount": 2, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2005-09-01", "journal": {"name": "SIGACT News", "pages": "113-114", "volume": + "36"}, "authors": [{"authorId": "1398925265", "name": "A. Ben-Amram"}]}, {"paperId": + "ff23560911ebd0e3eddd80c429b1216874713060", "externalIds": {"MAG": "2023493166", + "DOI": "10.3354/MEPS230253", "CorpusId": 54604431}, "corpusId": 54604431, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ff23560911ebd0e3eddd80c429b1216874713060", + "title": "Contrasts in density, size, and biomass of reef fishes between the + northwestern and the main Hawaiian islands: the effects of fishing down apex + predators", "abstract": "A comparison between the northwestern Hawaiian islands + (NWHI), a large, remote, and lightly fished area, and the main Hawaiian islands + (MHI), an urbanized, heavily fished area, revealed dramatic differences in + the numerical density, size, and biomass of the shallow reef fish assemblages. + Grand mean fish standing stock in the NWHI was more than 260% greater than + in the MHI. The most striking difference was the abundance and size of large + apex predators (primarily sharks and jacks) in the NWHI compared to the MHI. + More than 54% of the total fish biomass in the NWHI consisted of apex predators, + whereas this trophic level accounted for less than 3% of the fish biomass + in the MHI. In contrast, fish biomass in the MHI was dominated by herbivores + (55%) and small-bodied lower-level carnivores (42%). Most of the dominant + species by weight in the NWHI were either rare or absent in the MHI and the + target species that were present, regardless of trophic level, were nearly + always larger in the NWHI. These differences represent both near-extirpation + of apex predators and heavy exploitation of lower trophic levels in the MHI + compared to the largely unfished NWHI. The reefs in the NWHI are among the + few remaining large-scale, intact, predator-dominated reef ecosys- tems left + in the world and offer an opportunity to understand how unaltered ecosystems + are struc- tured, how they function, and how they can most effectively be + preserved. The differences in fish assemblage structure in this study are + evidence of the high level of exploitation in the MHI and the pressing need + for ecosystem-level management of reef systems in the MHI as well as the NWHI.", + "venue": "", "year": 2002, "referenceCount": 51, "citationCount": 673, "influentialCitationCount": + 52, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/meps2002/230/m230p253.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-04-05", + "journal": {"name": "Marine Ecology Progress Series", "pages": "253-264", + "volume": "230"}, "authors": [{"authorId": "40303139", "name": "A. Friedlander"}, + {"authorId": "6780772", "name": "E. DeMartini"}]}, {"paperId": "cd0cb39a988daec9bf424a088e812c14c137d19f", + "externalIds": {"MAG": "2111961041", "DBLP": "journals/corr/abs-0904-3612", + "ArXiv": "0904.3612", "DOI": "10.1007/978-3-642-04617-9_45", "CorpusId": 816374}, + "corpusId": 816374, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cd0cb39a988daec9bf424a088e812c14c137d19f", + "title": "Variations of the Turing Test in the Age of Internet and Virtual + Reality", "abstract": null, "venue": "KI", "year": 2009, "referenceCount": + 16, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/0904.3612", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": + "2009-04-23", "journal": {"pages": "355-362"}, "authors": [{"authorId": "39315964", + "name": "Florentin Neumann"}, {"authorId": "31588361", "name": "Andrea Reichenberger"}, + {"authorId": "144983931", "name": "M. Ziegler"}]}, {"paperId": "52e87b65ccccb745706fcd09b7df65d3adcdcef8", + "externalIds": {"CorpusId": 14943944}, "corpusId": 14943944, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/52e87b65ccccb745706fcd09b7df65d3adcdcef8", + "title": "A diffusion reaction theory of morphogenesis in plants Universal + Turing Machine", "abstract": "Unified certifiable communication have led to + many unproven advances, including reinforcement learning and evolutionary + programming. After years of confusing research into forward-error correction, + we argue the study of access points. In order to address this grand challenge, + we use metamorphic modalities to show that rasterization and checksums can + interfere to overcome this challenge.", "venue": "", "year": 2011, "referenceCount": + 153, "citationCount": 50, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": []}, {"paperId": "4cce6ebe0c2b584f088ae88b01f19dbde6dd6bcb", + "externalIds": {"DBLP": "journals/ijfcs/BeggsCPT14", "MAG": "2140453444", + "DOI": "10.1142/S0129054114400012", "CorpusId": 33246087}, "corpusId": 33246087, + "publicationVenue": {"id": "0f60ff8e-f0b7-47a2-9927-2b94f9e44e82", "name": + "International Journal of Foundations of Computer Science", "type": "journal", + "alternate_names": ["Int J Found Comput Sci"], "issn": "0129-0541", "url": + "http://www.cs.ucsb.edu/~ijfcs/"}, "url": "https://www.semanticscholar.org/paper/4cce6ebe0c2b584f088ae88b01f19dbde6dd6bcb", + "title": "An analogue-Digital Church-Turing Thesis", "abstract": "We argue + that dynamical systems involving discrete and continuous data can be modelled + by Turing machines with oracles that are physical processes. Using the theory + introduced in Beggs et al. [2,3], we consider the scope and limits of polynomial + time computations by such systems. We propose a general polynomial time Church-Turing + Thesis for feasible computations by analogue-digital systems, having the non-uniform + complexity class BPP//log* as theoretical upper bound. We show why BPP//log* + should be replace P/poly, which was proposed by Siegelmann for neural nets + [23,24]. Then we examine whether other sources of hypercomputation can be + found in analogue-digital systems besides the oracle itself. We prove that + the higher polytime limit P/poly can be attained via non-computable analogue-digital + interface protocols.", "venue": "International Journal of Foundations of Computer + Science", "year": 2014, "referenceCount": 33, "citationCount": 15, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://cronfa.swan.ac.uk/Record/cronfa28415/Download/0028415-01112016111543.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Int. J. Found. Comput. Sci.", "pages": "373-390", + "volume": "25"}, "authors": [{"authorId": "1919705", "name": "E. Beggs"}, + {"authorId": "143698164", "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": + "2455322", "name": "Diogo Po\u00e7as"}, {"authorId": "145744796", "name": + "J. V. Tucker"}]}, {"paperId": "fbe8cd7808f58ea24cfcd0b153cabc87867a7031", + "externalIds": {"MAG": "2065447689", "DOI": "10.1093/emboj/21.10.2397", "CorpusId": + 34964856, "PubMed": "12006492"}, "corpusId": 34964856, "publicationVenue": + {"id": "b89f0ede-6fa8-4dd2-a8a7-f54695a00323", "name": "EMBO Journal", "type": + "journal", "alternate_names": ["The EMBO Journal", "EMBO J"], "issn": "0261-4189", + "url": "http://embojournal.npgjournals.com/", "alternate_urls": ["http://emboj.embopress.org/"]}, + "url": "https://www.semanticscholar.org/paper/fbe8cd7808f58ea24cfcd0b153cabc87867a7031", + "title": "Structure and functional interactions of the Tsg101 UEV domain", + "abstract": "Human Tsg101 plays key roles in HIV budding and in cellular vacuolar + protein sorting (VPS). In performing these functions, Tsg101 binds both ubiquitin + (Ub) and the PTAP tetrapeptide \u2018late domain\u2019 motif located within + the viral Gag protein. These interactions are mediated by the N\u2010terminal + domain of Tsg101, which belongs to the catalytically inactive ubiquitin E2 + variant (UEV) family. We now report the struc ture of Tsg101 UEV and chemical + shift mapping of the Ub and PTAP binding sites. Tsg101 UEV resembles canonical + E2 ubiquitin conjugating enzymes, but has an additional N\u2010terminal helix, + an extended \u03b2\u2010hairpin that links strands 1 and 2, and lacks the + two C\u2010terminal helices normally found in E2 enzymes. PTAP\u2010containing + peptides bind in a hydrophobic cleft exposed by the absence of the C\u2010terminal + helices, whereas ubiquitin binds in a novel site surrounding the \u03b2\u2010hairpin. + These studies provide a structural framework for understanding how Tsg101 + mediates the protein\u2013protein interactions required for HIV budding and + VPS.", "venue": "EMBO Journal", "year": 2002, "referenceCount": 66, "citationCount": + 274, "influentialCitationCount": 27, "isOpenAccess": true, "openAccessPdf": + {"url": "https://europepmc.org/articles/pmc125378?pdf=render", "status": "GREEN"}, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-05-15", "journal": {"name": "The EMBO Journal", "volume": "21"}, "authors": + [{"authorId": "46955092", "name": "O. Pornillos"}, {"authorId": "3863692", + "name": "S. Alam"}, {"authorId": "40426905", "name": "R. Rich"}, {"authorId": + "3342884", "name": "D. Myszka"}, {"authorId": "145197424", "name": "D. Davis"}, + {"authorId": "2662926", "name": "W. Sundquist"}]}, {"paperId": "c6e46b77b830e84047c0377f2eacdee1e00ed229", + "externalIds": {"MAG": "2076302671", "DOI": "10.1111/j.1528-1157.1993.tb02123.x", + "CorpusId": 26542482, "PubMed": "7694849"}, "corpusId": 26542482, "publicationVenue": + {"id": "e92d0adf-ffa5-49b2-90bf-5dede4af11c5", "name": "Epilepsia", "type": + "journal", "issn": "0013-9580", "url": "http://www.epilepsia.com/", "alternate_urls": + ["https://onlinelibrary.wiley.com/journal/15281167"]}, "url": "https://www.semanticscholar.org/paper/c6e46b77b830e84047c0377f2eacdee1e00ed229", + "title": "Circuit Mechanisms of Seizures in the Pilocarpine Model of Chronic + Epilepsy: Cell Loss and Mossy Fiber Sprouting", "abstract": "We used the pilocarpine + model of chronic spontaneous recurrent seizures to evaluate the time course + of supragranular dentate sprouting and to assess the relation between several + changes that occur in epilep tic tissue with different behavioral manifestations + of this experimental model of temporal lobe epilepsy. Pilo carpine\u2010induced + status epilepticus (SE) invariably led to cell loss in the hilus of the dentate + gyrus (DG) and to spontaneous recurrent seizures. Cell loss was often also + noted in the DG and in hippocampal subfields CA1 and CA3. The seizures began + to appear at a mean of 15 days after SE induction (silent period), recurred + at variable frequencies for each animal, and lasted for as long as the animals + were allowed to survive (325 days). The granule cell layer of the DG was dispersed + in epileptic animals, and neo\u2010Timm stains showed supra\u2010and intragranular + mossy fiber sprouting. Supragranular mossy fiber sprout ing and dentate granule + cell dispersion began to appear early after SE (as early as 4 and 9 days, + respectively) and reached a plateau by 100 days. Animals with a greater degree + of cell loss in hippocampal field CAS showed later onset of chronic epilepsy + (r= 0.83, p < 0.0005), suggest ing that CA3 represents one of the routes for + seizure spread. These results demonstrate that the pilocarpine model of chronic + seizures replicates several of the fea tures of human temporal lobe epilepsy + (hippocampal cell loss, suprar and intragranular mossy fiber sprouting, den + tate granule cell dispersion, spontaneous recurrent sei zures) and that it + may be a useful model for studying this human condition. The results also + suggest that even though a certain amount of cell loss in specific areas may + be essential for chronic seizures to occur, excessive cell loss may hinder + epileptogenesis.", "venue": "Epilepsia", "year": 1993, "referenceCount": 58, + "citationCount": 671, "influentialCitationCount": 50, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1993-11-01", "journal": {"name": "Epilepsia", + "volume": "34"}, "authors": [{"authorId": "144335136", "name": "L. Mello"}, + {"authorId": "3222928", "name": "E. Cavalheiro"}, {"authorId": "39058834", + "name": "A. Tan"}, {"authorId": "3642575", "name": "W. Kupfer"}, {"authorId": + "2183021", "name": "J. Pretorius"}, {"authorId": "4724557", "name": "T. Babb"}, + {"authorId": "34861691", "name": "D. Finch"}]}, {"paperId": "235f8d65c1b66df0a0e011d5819a38bc7092618b", + "externalIds": {"MAG": "2985335211", "DOI": "10.1109/81.473564", "CorpusId": + 8158662}, "corpusId": 8158662, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/235f8d65c1b66df0a0e011d5819a38bc7092618b", + "title": "Autonomous cellular neural networks: a unified paradigm for pattern + formation and active wave propagation", "abstract": "This tutorial paper proposes + a subclass of cellular neural networks (CNN) having no inputs (i.e., autonomous) + as a universal active substrate or medium for modeling and generating many + pattern formation and nonlinear wave phenomena from numerous disciplines, + including biology, chemistry, ecology, engineering, and physics. Each CNN + is defined mathematically by its cell dynamics (e.g., state equations) and + synaptic law, which specifies each cell''s interaction with its neighbors. + We focus on reaction-diffusion CNNs having a linear synaptic law that approximates + a spatial Laplacian operator. Such a synaptic law can be realized by one or + more layers of linear resistor couplings. An autonomous CNN made of third-order + universal cells and coupled to each other by only one layer of linear resistors + provides a unified active medium for generating trigger (autowave) waves, + target (concentric) waves, spiral waves, and scroll waves. When a second layer + of linear resistors is added to couple a second capacitor voltage in each + cell to its neighboring cells, the resulting CNN can be used to generate various + turing patterns. >", "venue": "", "year": 1995, "referenceCount": 50, "citationCount": + 284, "influentialCitationCount": 14, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Physics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "1995-10-01", "journal": + {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", "pages": + "559-577", "volume": "42"}, "authors": [{"authorId": "144848684", "name": + "L. Chua"}, {"authorId": "145361556", "name": "M. Hasler"}, {"authorId": "1695272", + "name": "G. Moschytz"}, {"authorId": "14598794", "name": "J. Neirynck"}]}, + {"paperId": "0b62ae460984f1a4cdfb7765c322eec5bc771e17", "externalIds": {"MAG": + "2528169062", "CorpusId": 64501803}, "corpusId": 64501803, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0b62ae460984f1a4cdfb7765c322eec5bc771e17", + "title": "Introduction To Oceanography", "abstract": "O T H E R R E F E R + E N C E S : (not required and a vaila ble in the l ibr a ry TBA): Open University + Ser ies: Oc ean Cir cula tion; Sea wa ter : Its Com position, Pr operties + and Beha vior ; Waves, Tides and Sha llow Wa ter Proc esses; The O c ea n + Ba sins: Their Struc ture a nd Evolution: O cea n Chem istry a nd Deep Sea + Sedim ents; Pond a nd Picka rd, Introduc tion to Dyna m ic al Ocea nogr aphy, + 2nd edition;", "venue": "", "year": 2016, "referenceCount": 0, "citationCount": + 57, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "40149259", "name": "A. Strauss"}]}, + {"paperId": "8f29f3bc0e4c9af0f37083fd9bb5f85964fcf981", "externalIds": {"MAG": + "2491262456", "DOI": "10.1016/J.CHAOS.2016.07.003", "CorpusId": 124337513}, + "corpusId": 124337513, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8f29f3bc0e4c9af0f37083fd9bb5f85964fcf981", + "title": "Turing patterns induced by cross-diffusion in a predator-prey system + in presence of habitat complexity", "abstract": null, "venue": "", "year": + 2016, "referenceCount": 45, "citationCount": 57, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2016-10-01", "journal": {"name": "Chaos Solitons & Fractals", "pages": "421-429", + "volume": "91"}, "authors": [{"authorId": "153079186", "name": "S. Ghorai"}, + {"authorId": "1927557", "name": "S. Poria"}]}, {"paperId": "4d176782a6ef007a568e1d7860d3a8f223fc874e", + "externalIds": {"MAG": "2330442144", "DBLP": "journals/ethicsit/ArnoldS16", + "DOI": "10.1007/s10676-016-9389-x", "CorpusId": 16905155}, "corpusId": 16905155, + "publicationVenue": {"id": "09bb329a-45bc-4561-860f-c8ac0e958895", "name": + "Ethics and Information Technology", "type": "journal", "alternate_names": + ["Ethics Inf Technol"], "issn": "1388-1957", "url": "https://www.springer.com/computer/swe/journal/10676", + "alternate_urls": ["https://link.springer.com/journal/10676"]}, "url": "https://www.semanticscholar.org/paper/4d176782a6ef007a568e1d7860d3a8f223fc874e", + "title": "Against the moral Turing test: accountable design and the moral + reasoning of autonomous systems", "abstract": null, "venue": "Ethics and Information + Technology", "year": 2016, "referenceCount": 34, "citationCount": 45, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-06-01", "journal": + {"name": "Ethics and Information Technology", "pages": "103-115", "volume": + "18"}, "authors": [{"authorId": "2053868213", "name": "Thomas Arnold"}, {"authorId": + "1793014", "name": "Matthias Scheutz"}]}, {"paperId": "78c5871e9b303683ed1bbf13f739113ac89554c7", + "externalIds": {"MAG": "2001490875", "DOI": "10.1177/036354659101900513", + "CorpusId": 13273381, "PubMed": "1962716"}, "corpusId": 13273381, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/78c5871e9b303683ed1bbf13f739113ac89554c7", + "title": "Posterior tibial tendon rupture in athletic people", "abstract": + "We present our findings in six athletic patients with a ruptured or partially + ruptured posterior tibial tendon. Pain in the midarch region, difficulty pushing + off while running, and a pronated flattened longitudinal arch are the usual + symptoms and physical findings of this injury. Surgical treatment, including + reattachment of the rup tured posterior tibial tendon, is effective in restoring + some but not all normal function. Nor will surgery restore the flattened longitudinal + arch.", "venue": "The American journal of sports medicine", "year": 1991, + "referenceCount": 10, "citationCount": 40, "influentialCitationCount": 0, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "CaseReport"], "publicationDate": "1991-09-01", "journal": {"name": "The American + Journal of Sports Medicine", "pages": "495 - 498", "volume": "19"}, "authors": + [{"authorId": "2171739029", "name": "Lee Woods"}, {"authorId": "38863627", + "name": "R. Leach"}]}, {"paperId": "45c4bd862e968171d26e3154e55c605835f24936", + "externalIds": {"MAG": "2037700122", "DOI": "10.1017/S0022149X0002191X", "CorpusId": + 45039704, "PubMed": "6057048"}, "corpusId": 45039704, "publicationVenue": + {"id": "9a6999c4-e543-450d-9a19-69e5280d030a", "name": "Journal of Helminthology", + "type": "journal", "alternate_names": ["J Helminthol"], "issn": "0022-149X", + "url": "https://www.cambridge.org/core/journals/journal-of-helminthology", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=JHL"]}, + "url": "https://www.semanticscholar.org/paper/45c4bd862e968171d26e3154e55c605835f24936", + "title": "Studies of Immunity to Fasciola hepatica: Acquired immunity in cattle, + sheep and rabbits following natural infection and vaccine procedures", "abstract": + "Investigations of acquired immunity to Fasciola hepatica in calves, sheep + and rabbits are described. With injections of extracts of imma- ture parasites + retarded growth of the challenge infection was observed between the 6th and + 7th week. Following a previous experience of a natural infection or viable + fluke implants, retardation and reduced take of the challenge infection were + observed. Considerable individual variation was present and the level of significance + between treatment and control groups was low.", "venue": "Journal of Helminthology", + "year": 1967, "referenceCount": 22, "citationCount": 39, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Agricultural + And Food Sciences", "source": "s2-fos-model"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1967-12-01", "journal": {"name": "Journal of Helminthology", "pages": "393 + - 399", "volume": "41"}, "authors": [{"authorId": "2150935218", "name": "J. + Ross"}]}, {"paperId": "a06efce214fbd415d1cdc8830890dce4aa825d5c", "externalIds": + {"MAG": "2026429056", "DOI": "10.1353/tech.2002.0126", "CorpusId": 108580173}, + "corpusId": 108580173, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a06efce214fbd415d1cdc8830890dce4aa825d5c", "title": "Two Centuries of Central Water Management in the Netherlands", "abstract": "For two centuries the Rijkswaterstaat has been responsible for public works in the Netherlands. Founded in 1798, this national government agency, which @@ -45852,173 +51937,122 @@ interactions: Furthermore, the agency sees itself as a civil service organization confronted by numerous political parties and social", "venue": "", "year": 2002, "referenceCount": 20, "citationCount": 73, "influentialCitationCount": 9, "isOpenAccess": true, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://pure.tue.nl/ws/files/2026123/611782.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-07-01", "journal": {"name": "Technology and Culture", "pages": "549 - 568", "volume": "43"}, "authors": - [{"authorId": "87513934", "name": "Hw Harry Lintsen"}]}, {"paperId": "0a3c7485942469f5f8c4f58f57b92fbb7eae6c29", - "externalIds": {"MAG": "2134909295", "DBLP": "journals/tissec/OorschotS06", - "DOI": "10.1145/1178618.1178619", "CorpusId": 3183068}, "url": "https://www.semanticscholar.org/paper/0a3c7485942469f5f8c4f58f57b92fbb7eae6c29", - "title": "On countering online dictionary attacks with login histories and - humans-in-the-loop", "abstract": "Automated Turing Tests (ATTs), also known - as human-in-the-loop techniques, were recently employed in a login protocol - by Pinkas and Sander (2002) to protect against online password-guessing attacks. - We present modifications providing a new history-based login protocol with - ATTs, which uses failed-login counts. Analysis indicates that the new protocol - offers opportunities for improved security and user friendliness (fewer ATTs - to legitimate users) and greater flexibility (e.g., allowing protocol parameter - customization for particular situations and users). We also note that the - Pinkas--Sander and other protocols involving ATTs are susceptible to minor - variations of well-known middle-person attacks. We discuss complementary techniques - to address such attacks, and to augment the security of the original protocol.", - "venue": "TSEC", "year": 2006, "referenceCount": 49, "citationCount": 96, - "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-08-01", "journal": - {"name": "ACM Trans. Inf. Syst. Secur.", "pages": "235-258", "volume": "9"}, - "authors": [{"authorId": "1748222", "name": "P. V. Oorschot"}, {"authorId": - "1742113", "name": "S. Stubblebine"}]}, {"paperId": "52e87b65ccccb745706fcd09b7df65d3adcdcef8", - "externalIds": {"CorpusId": 14943944}, "url": "https://www.semanticscholar.org/paper/52e87b65ccccb745706fcd09b7df65d3adcdcef8", - "title": "A diffusion reaction theory of morphogenesis in plants Universal - Turing Machine", "abstract": "Unified certifiable communication have led to - many unproven advances, including reinforcement learning and evolutionary - programming. After years of confusing research into forward-error correction, - we argue the study of access points. In order to address this grand challenge, - we use metamorphic modalities to show that rasterization and checksums can - interfere to overcome this challenge.", "venue": "", "year": 2011, "referenceCount": - 153, "citationCount": 50, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + [{"authorId": "87513934", "name": "Hw Harry Lintsen"}]}, {"paperId": "544e87d91da23512faf20e900201b81fa35da831", + "externalIds": {"DBLP": "journals/neuroimage/PizzagalliLHRPD02", "MAG": "2132246387", + "DOI": "10.1006/nimg.2002.1126", "CorpusId": 12750334}, "corpusId": 12750334, + "publicationVenue": {"id": "fd4c7628-c16e-4b50-8555-3ac3ad6da2d7", "name": + "NeuroImage", "type": "journal", "issn": "1053-8119", "url": "http://www.elsevier.com/locate/ynimg", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/622925/description#description", + "https://www.journals.elsevier.com/neuroimage", "http://www.sciencedirect.com/science/journal/10538119", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/544e87d91da23512faf20e900201b81fa35da831", + "title": "Affective Judgments of Faces Modulate Early Activity (\u223c160 + ms) within the Fusiform Gyri", "abstract": "Functional neuroimaging studies + have implicated the fusiform gyri (FG) in structural encoding of faces, while + event-related potential (ERP) and magnetoen- cephalography studies have shown + that such encoding occurs approximately 170 ms poststimulus. Behavioral and + functional neuroimaging studies suggest that pro- cesses involved in face + recognition may be strongly modulated by socially relevant information conveyed + by faces. To test the hypothesis that affective informa- tion indeed modulates + early stages of face processing, ERPs were recorded to individually assessed + liked, neutral, and disliked faces and checkerboard-reversal stimuli. At the + N170 latency, the cortical three-dimen- sional distribution of current density + was computed in stereotactic space using a tomographic source local- ization + technique. Mean activity was extracted from the FG, defined by structure-probability + maps, and a meta-cluster delineated by the coordinates of the voxel with the + strongest face-sensitive response from five published functional magnetic + resonance imaging studies. In the FG, 160 ms poststimulus, liked faces elicited + stronger activation than disliked and neutral faces and checkerboard-reversal + stimuli. Further, confirming recent results, affect-modulated brain elec- + trical activity started very early in the human brain (112 ms). These findings + suggest that affective fea- tures conveyed by faces modulate structural face + en- coding. Behavioral results from an independent study revealed that the + stimuli were not biased toward par- ticular facial expressions and confirmed + that liked faces were rated as more attractive. Increased FG ac- tivation + for liked faces may thus be interpreted as reflecting enhanced attention due + to their saliency.", "venue": "NeuroImage", "year": 2002, "referenceCount": + 90, "citationCount": 284, "influentialCitationCount": 15, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Psychology", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-07-01", "journal": {"name": "NeuroImage", "pages": "663-677", "volume": + "16"}, "authors": [{"authorId": "2064878", "name": "D. Pizzagalli"}, {"authorId": + "1812328", "name": "D. Lehmann"}, {"authorId": "49076976", "name": "Andrew + M. Hendrick"}, {"authorId": "143656989", "name": "M. Regard"}, {"authorId": + "1397558990", "name": "R. Pascual-Marqui"}, {"authorId": "118576023", "name": + "R. Davidson"}]}, {"paperId": "a941f945790a36233446894d9271405d471a1d70", + "externalIds": {"MAG": "2171061836", "DOI": "10.18637/JSS.V056.I02", "CorpusId": + 4984497}, "corpusId": 4984497, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a941f945790a36233446894d9271405d471a1d70", + "title": "STARS: An ArcGIS Toolset Used to Calculate the Spatial Information + Needed to Fit Spatial Statistical Models to Stream Network Data", "abstract": + "This paper describes the STARS ArcGIS geoprocessing toolset, which is used + to calcu- late the spatial information needed to fit spatial statistical models + to stream network data using the SSN package. The STARS toolset is designed + for use with a landscape network (LSN), which is a topological data model + produced by the FLoWS ArcGIS geoprocessing toolset. An overview of the FLoWS + LSN structure and a few particularly useful tools is also provided so that + users will have a clear understanding of the underlying data struc- ture that + the STARS toolset depends on. This document may be used as an introduction + to new users. The methods used to calculate the spatial information and format + the final .ssn object are also explicitly described so that users may create + their own .ssn object using other data models and software.", "venue": "", + "year": 2014, "referenceCount": 41, "citationCount": 95, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2014-01-25", "journal": + {"name": "Journal of Statistical Software", "pages": "1-17", "volume": "056"}, + "authors": [{"authorId": "35017125", "name": "E. Peterson"}, {"authorId": + "16216980", "name": "J. Hoef"}]}, {"paperId": "f0411022f727eff379e27485785211d723c1be85", + "externalIds": {"MAG": "2134405741", "DOI": "10.1098/rsta.2011.0332", "CorpusId": + 12383089, "PubMed": "22711861"}, "corpusId": 12383089, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/f0411022f727eff379e27485785211d723c1be85", + "title": "From Turing machines to computer viruses", "abstract": "Self-replication + is one of the fundamental aspects of computing where a program or a system + may duplicate, evolve and mutate. Our point of view is that Kleene''s (second) + recursion theorem is essential to understand self-replication mechanisms. + An interesting example of self-replication codes is given by computer viruses. + This was initially explained in the seminal works of Cohen and of Adleman + in the 1980s. In fact, the different variants of recursion theorems provide + and explain constructions of self-replicating codes and, as a result, of various + classes of malware. None of the results are new from the point of view of + computability theory. We now propose a self-modifying register machine as + a model of computation in which we can effectively deal with the self-reproduction + and in which new offsprings can be activated as independent organisms.", "venue": + "Philosophical Transactions of the Royal Society A: Mathematical, Physical + and Engineering Sciences", "year": 2012, "referenceCount": 40, "citationCount": + 16, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsta.2011.0332", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-07-28", "journal": + {"name": "Philosophical Transactions of the Royal Society A: Mathematical, + Physical and Engineering Sciences", "pages": "3319 - 3339", "volume": "370"}, + "authors": [{"authorId": "145309398", "name": "J. Marion"}]}, {"paperId": + "a1fb0653517708e78322a8c4a0dc048378e4c353", "externalIds": {"MAG": "2117922987", + "DOI": "10.1557/PROC-242-383", "CorpusId": 136602742}, "corpusId": 136602742, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1fb0653517708e78322a8c4a0dc048378e4c353", + "title": "Conductivity Control of AlGaN. Fabrication of AlGaN/GaN Multi-Hetero\u015btructure + and their Application to UV/Blue Light Emitting Devices", "abstract": "The + method for controlling the electrical properties of n-type GaN and AIGaN have + been established. Both GaN and AIGaN films having p - type conduction have + been realized for the first time. High quality AIGaN/GaN mu I t i-he t er + ostrueture showing clear quantum size effect has been fabricated. P-n junction + type UV/blue LED with double he t e ros t rue ture have been developed for + the first time.", "venue": "", "year": 1992, "referenceCount": 0, "citationCount": + 39, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": []}, {"paperId": "ebf59e2e610d4cf0415996a1206e19eb4ec60e32", - "externalIds": {"MAG": "3158339900", "DOI": "10.1140/EPJP/S13360-021-01489-7", - "CorpusId": 235576349}, "url": "https://www.semanticscholar.org/paper/ebf59e2e610d4cf0415996a1206e19eb4ec60e32", - "title": "Spatiotemporal behavior in a predator\u2013prey model with herd - behavior and cross-diffusion and fear effect", "abstract": null, "venue": - "", "year": 2021, "referenceCount": 68, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2021-05-01", - "journal": {"name": "European Physical Journal Plus", "pages": "1-21", "volume": - "136"}, "authors": [{"authorId": "151004204", "name": "Fethi Souna"}, {"authorId": - "103679695", "name": "S. Djilali"}, {"authorId": "6489957", "name": "Abdelkader - Lakmeche"}]}, {"paperId": "5be2d9964c0b2f34157631db8c514cba7894318e", "externalIds": - {"MAG": "1969208284", "DOI": "10.1063/1.4816937", "CorpusId": 11157427, "PubMed": - "24089955"}, "url": "https://www.semanticscholar.org/paper/5be2d9964c0b2f34157631db8c514cba7894318e", - "title": "Cross-diffusion in the two-variable Oregonator model.", "abstract": - "We explore the effect of cross-diffusion on pattern formation in the two-variable - Oregonator model of the Belousov-Zhabotinsky reaction. For high negative cross-diffusion - of the activator (the activator being attracted towards regions of increased - inhibitor concentration) we find, depending on the values of the parameters, - Turing patterns, standing waves, oscillatory Turing patterns, and quasi-standing - waves. For the inhibitor, we find that positive cross-diffusion (the inhibitor - being repelled by increasing concentrations of the activator) can induce Turing - patterns, jumping waves and spatially modulated bulk oscillations. We qualitatively - explain the formation of these patterns. With one model we can explain Turing - patterns, standing waves and jumping waves, which previously was done with - three different models.", "venue": "Chaos", "year": 2013, "referenceCount": - 44, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2013-07-30", "journal": {"name": "Chaos", "pages": "\n 033119\n ", - "volume": "23 3"}, "authors": [{"authorId": "6742967", "name": "I. Berenstein"}, - {"authorId": "4568270", "name": "C. Beta"}]}, {"paperId": "e90c1c61951813a4000781e94d8a7e219dcf1d0f", - "externalIds": {"MAG": "2116462994", "DOI": "10.1111/j.1525-1470.1992.tb00342.x", - "CorpusId": 10078374, "PubMed": "1488375"}, "url": "https://www.semanticscholar.org/paper/e90c1c61951813a4000781e94d8a7e219dcf1d0f", - "title": "Clinical, Histologic, and Ultrastructural Findings in Two Cases - of Infantile Systemic Hyalinosis", "abstract": "Abstract: Two unrelated infants - had stiff skin and painful joint eontrac\u2010tures in the first few months - of life. Other features included gingival hy\u2010perpiasia, small papules - on the face and trunk, perianal nodules, and bloody diarrhea. Hyatine material - was evident in the papillary dermis and gut mucosa in both patients. Ultrastructural - examination revealed a dis\u2010tinctive fibrillogranuIar appearance. These - infants have the same clinical, histologic, and ultrastructural features as - four infants we reported previ\u2010ously with Infantile systemic hyalinosis. - One of the patients described here demonstrated some features that overlap - with those of juvenile hy\u2010aline fibromatosis.", "venue": "Pediatric dermatology", - "year": 1992, "referenceCount": 17, "citationCount": 58, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport"], - "publicationDate": "1992-09-01", "journal": {"name": "Pediatric Dermatology", - "volume": "9"}, "authors": [{"authorId": "1911002", "name": "M. Glover"}, - {"authorId": "145252807", "name": "B. Lake"}, {"authorId": "2063735596", "name": - "D. Atherton"}]}, {"paperId": "45c4bd862e968171d26e3154e55c605835f24936", - "externalIds": {"MAG": "2037700122", "DOI": "10.1017/S0022149X0002191X", "CorpusId": - 45039704, "PubMed": "6057048"}, "url": "https://www.semanticscholar.org/paper/45c4bd862e968171d26e3154e55c605835f24936", - "title": "Studies of Immunity to Fasciola hepatica: Acquired immunity in cattle, - sheep and rabbits following natural infection and vaccine procedures", "abstract": - "Investigations of acquired immunity to Fasciola hepatica in calves, sheep - and rabbits are described. With injections of extracts of imma- ture parasites - retarded growth of the challenge infection was observed between the 6th and - 7th week. Following a previous experience of a natural infection or viable - fluke implants, retardation and reduced take of the challenge infection were - observed. Considerable individual variation was present and the level of significance - between treatment and control groups was low.", "venue": "Journal of Helminthology", - "year": 1967, "referenceCount": 22, "citationCount": 39, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1967-12-01", "journal": {"name": "Journal of Helminthology", - "pages": "393 - 399", "volume": "41"}, "authors": [{"authorId": "2150935218", - "name": "J. Ross"}]}, {"paperId": "6de4f3fc4f3b2eeb357c6b67dbd5e7623e9b527a", - "externalIds": {"MAG": "2086658456", "ArXiv": "0811.0671", "DOI": "10.1103/PhysRevA.79.021601", - "CorpusId": 119109196}, "url": "https://www.semanticscholar.org/paper/6de4f3fc4f3b2eeb357c6b67dbd5e7623e9b527a", - "title": "All-Optical Formation of Quantum Degenerate Mixtures", "abstract": - "Ultracold atomic gases have provided deep insight intoquantum many-body systems, - since the realization of aquantum degenerate gas, such as a Bose-Einstein - con-densate (BEC) [1] and a degenerate Fermi gas [2]. Oneof the intriguing - new developments in this \ufb01eld is a studyof quantum degeneracy in a mixed - gas. An advantage inthe study using ultracold atomic mixed gases is the abil-ity - to select the statistics of atomic gases: a Bose-Bose,Fermi-Bose and Fermi-Fermi - mixture. The interactions,which determine the stability and the dynamics of - themixed-gas system, can be also tuned by changing a com-bination of a mixed - gas or by using magnetic and opticalFeshbach resonances [3, 4, 5]. So far, - Fermi-Bose mix-tures in the degenerate regime have been realized withvarious - combinations of atoms:", "venue": "", "year": 2008, "referenceCount": 0, "citationCount": - 97, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2008-11-05", "journal": {"name": "Physical Review A", - "pages": "021601", "volume": "79"}, "authors": [{"authorId": "92118239", "name": - "T. Fukuhara"}, {"authorId": "48822332", "name": "S. Sugawa"}, {"authorId": - "3984553", "name": "Y. Takasu"}, {"authorId": "50300473", "name": "Y. Takahashi"}]}, - {"paperId": "b351ae240abecd53470af1fd49e72d3c825728ad", "externalIds": {"MAG": - "2137286807", "DOI": "10.1146/ANNUREV.PH.48.030186.003231", "CorpusId": 21213212, - "PubMed": "3010828"}, "url": "https://www.semanticscholar.org/paper/b351ae240abecd53470af1fd49e72d3c825728ad", - "title": "Temperature receptors in the central nervous system.", "abstract": - "For half a century, it has been known that thermo sensitive regions of the - rostral brain stem are important in thermoregulation (61). Figure 1 indicates - that a variety of thermoregulatory responses can be elicited by changing the - tempera\u00ad ture of the preoptic area and anterior hypothalamus (POI AH). - POI AH warming evokes heat-loss responses, and POIAH cooling evokes heat-production - re\u00ad sponses. If POIAH temperature is changed slightly above or below - normal, there are changes in heat-retention responses such as skin blood flow - and thermoregulatory behavior. Figure 1 also describes the synaptic organization - of POI AH thermosensitive neurons (4). While most neurons are temperature - insensitive, warm-sensitive neurons have firing rates that increase with warm\u00ad - ing or decrease with cooling. Conversely, the firing rates of cold-sensitive - neurons increase with cooling or decrease with warming. Many central thermo\u00ad - sensitive neurons also receive synaptic inputs from skin and spinal thermore\u00ad - ceptive pathways (4, 7). This indicates that such neurons are capable of thermal - integration, and it increases the likelihood that these neurons function in - thermoregulation. As summarized in Figure 1, the evidence for central thermosensitivity - comes from thermoregulatory studies during thermal stimulation of discrete - neural areas and from electrophysiological studies of temperature-sensitive - neurons. In this review, these studies are presented first as an overview - of the comparative aspects of central thermo sensitivity in vertebrates. The - second half of this review focuses on the properties and synaptic organization - of POIAH thermosensitive neurons.", "venue": "Annual Review of Physiology", - "year": 1986, "referenceCount": 65, "citationCount": 275, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": null, "journal": {"name": - "Annual review of physiology", "pages": "\n 639-54\n ", "volume": - "48"}, "authors": [{"authorId": "6716490", "name": "J. Boulant"}, {"authorId": - "3579767", "name": "J. Dean"}]}]} + "journal": {"name": "MRS Proceedings", "pages": "383", "volume": "242"}, "authors": + [{"authorId": "3055501", "name": "I. Akasaki"}, {"authorId": "71281182", "name": + "H. Amano"}]}]} ' headers: @@ -46027,31 +52061,31 @@ interactions: Connection: - keep-alive Content-Length: - - '173134' + - '202705' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:51 GMT + - Tue, 03 Jan 2023 20:53:20 GMT Via: - - 1.1 632fca25fb23eb290b1185f0792b2a5e.cloudfront.net (CloudFront) + - 1.1 80e150c3cd619899dc38fb20936dc086.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - Pm3cg63PEKsR0QFUP9kn9Ezxvls3Y54tzB79gGzK3tEl3AmO3ebYEg== + - BdoZf86Pap6n5esdbBLknZ4ngOe7XeYumk2JkBgMru2Oxeq-x2buxg== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detJOHdQPHcF5Fg= + - eLxWAEnBPHcFbkw= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '173134' + - '202705' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:51 GMT + - Tue, 03 Jan 2023 20:53:20 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 814015e3-33e8-4f70-a1ec-bfe23bd821e9 + - 076d961d-0348-412a-a04d-788ac2a12e4f status: code: 200 message: OK @@ -46067,38 +52101,242 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2200&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2200&limit=100 response: body: - string: '{"total": 65539, "offset": 2200, "next": 2300, "data": [{"paperId": - "3f5df20ed034cced5bd3ae3e13138f1dacb8c1b8", "externalIds": {"MAG": "1593680015", - "DBLP": "conf/sofsem/Cooper06", "DOI": "10.1007/11611257_1", "CorpusId": 18392473}, - "url": "https://www.semanticscholar.org/paper/3f5df20ed034cced5bd3ae3e13138f1dacb8c1b8", - "title": "How Can Nature Help Us Compute?", "abstract": null, "venue": "Conference - on Current Trends in Theory and Practice of Informatics", "year": 2006, "referenceCount": - 55, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": + string: '{"total": 65729, "offset": 2200, "next": 2300, "data": [{"paperId": + "45c4bd862e968171d26e3154e55c605835f24936", "externalIds": {"MAG": "2037700122", + "DOI": "10.1017/S0022149X0002191X", "CorpusId": 45039704, "PubMed": "6057048"}, + "corpusId": 45039704, "publicationVenue": {"id": "9a6999c4-e543-450d-9a19-69e5280d030a", + "name": "Journal of Helminthology", "type": "journal", "alternate_names": + ["J Helminthol"], "issn": "0022-149X", "url": "https://www.cambridge.org/core/journals/journal-of-helminthology", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=JHL"]}, + "url": "https://www.semanticscholar.org/paper/45c4bd862e968171d26e3154e55c605835f24936", + "title": "Studies of Immunity to Fasciola hepatica: Acquired immunity in cattle, + sheep and rabbits following natural infection and vaccine procedures", "abstract": + "Investigations of acquired immunity to Fasciola hepatica in calves, sheep + and rabbits are described. With injections of extracts of imma- ture parasites + retarded growth of the challenge infection was observed between the 6th and + 7th week. Following a previous experience of a natural infection or viable + fluke implants, retardation and reduced take of the challenge infection were + observed. Considerable individual variation was present and the level of significance + between treatment and control groups was low.", "venue": "Journal of Helminthology", + "year": 1967, "referenceCount": 22, "citationCount": 39, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Agricultural + And Food Sciences", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2006-01-21", "journal": {"pages": "1-13"}, "authors": [{"authorId": "98630872", - "name": "S. Cooper"}]}, {"paperId": "9f13225f852ea285fd09e1e83b627a8679392f41", - "externalIds": {"MAG": "2483659330", "DOI": "10.1142/9781860947209_0011", - "CorpusId": 8822956}, "url": "https://www.semanticscholar.org/paper/9f13225f852ea285fd09e1e83b627a8679392f41", - "title": "The Theory of Turing Pattern Formation", "abstract": "In this article - the theory behind Turing instability in reaction-diffusion systems is reviewed. - The use of linear analysis and nonlinear bifurcation analysis with center - manifold reduction for studying the behavior of Turing systems is presented - somewhat meticulously at an introductory level. The symmetries that are considered - here in the context of a generic Turing model are the two-dimensional hexagonal - lattice and three-dimensional SCand BCC-lattices.", "venue": "", "year": 2005, - "referenceCount": 55, "citationCount": 11, "influentialCitationCount": 0, - "isOpenAccess": false, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": - "", "pages": "199-227", "volume": ""}, "authors": [{"authorId": "35202419", - "name": "T. Lepp\u00e4nen"}]}, {"paperId": "2aea6c760034b83cbb9f3d8fcfd21143d05ee5a5", + "1967-12-01", "journal": {"name": "Journal of Helminthology", "pages": "393 + - 399", "volume": "41"}, "authors": [{"authorId": "2150935218", "name": "J. + Ross"}]}, {"paperId": "7f04976656b2336c9a124918b72bd80454eff789", "externalIds": + {"MAG": "2097443371", "DBLP": "conf/sigir/GaoYLDN09", "DOI": "10.1145/1571941.1572003", + "CorpusId": 2955798}, "corpusId": 2955798, "publicationVenue": {"id": "8dce23a9-44e0-4381-a39e-2acc1edff700", + "name": "Annual International ACM SIGIR Conference on Research and Development + in Information Retrieval", "type": "conference", "alternate_names": ["International + ACM SIGIR Conference on Research and Development in Information Retrieval", + "Int ACM SIGIR Conf Res Dev Inf Retr", "SIGIR", "Annu Int ACM SIGIR Conf Res + Dev Inf Retr"], "url": "http://www.acm.org/sigir/"}, "url": "https://www.semanticscholar.org/paper/7f04976656b2336c9a124918b72bd80454eff789", + "title": "Smoothing clickthrough data for web search ranking", "abstract": + "Incorporating features extracted from clickthrough data (called clickthrough + features) has been demonstrated to significantly improve the performance of + ranking models for Web search applications. Such benefits, however, are severely + limited by the data sparseness problem, i.e., many queries and documents have + no or very few clicks. The ranker thus cannot rely strongly on clickthrough + features for document ranking. This paper presents two smoothing methods to + expand clickthrough data: query clustering via Random Walk on click graphs + and a discounting method inspired by the Good-Turing estimator. Both methods + are evaluated on real-world data in three Web search domains. Experimental + results show that the ranking models trained on smoothed clickthrough features + consistently outperform those trained on unsmoothed features. This study demonstrates + both the importance and the benefits of dealing with the sparseness problem + in clickthrough data.", "venue": "Annual International ACM SIGIR Conference + on Research and Development in Information Retrieval", "year": 2009, "referenceCount": + 27, "citationCount": 101, "influentialCitationCount": 13, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Book", "JournalArticle", + "Conference"], "publicationDate": "2009-07-19", "journal": {"name": "Proceedings + of the 32nd international ACM SIGIR conference on Research and development + in information retrieval"}, "authors": [{"authorId": "1800422", "name": "Jianfeng + Gao"}, {"authorId": "2114108486", "name": "Wei Yuan"}, {"authorId": "2108787178", + "name": "Xiao Li"}, {"authorId": "1796862", "name": "Kefeng Deng"}, {"authorId": + "143619007", "name": "Jian-Yun Nie"}]}, {"paperId": "544e87d91da23512faf20e900201b81fa35da831", + "externalIds": {"DBLP": "journals/neuroimage/PizzagalliLHRPD02", "MAG": "2132246387", + "DOI": "10.1006/nimg.2002.1126", "CorpusId": 12750334}, "corpusId": 12750334, + "publicationVenue": {"id": "fd4c7628-c16e-4b50-8555-3ac3ad6da2d7", "name": + "NeuroImage", "type": "journal", "issn": "1053-8119", "url": "http://www.elsevier.com/locate/ynimg", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/622925/description#description", + "https://www.journals.elsevier.com/neuroimage", "http://www.sciencedirect.com/science/journal/10538119", + "http://www.idealibrary.com/"]}, "url": "https://www.semanticscholar.org/paper/544e87d91da23512faf20e900201b81fa35da831", + "title": "Affective Judgments of Faces Modulate Early Activity (\u223c160 + ms) within the Fusiform Gyri", "abstract": "Functional neuroimaging studies + have implicated the fusiform gyri (FG) in structural encoding of faces, while + event-related potential (ERP) and magnetoen- cephalography studies have shown + that such encoding occurs approximately 170 ms poststimulus. Behavioral and + functional neuroimaging studies suggest that pro- cesses involved in face + recognition may be strongly modulated by socially relevant information conveyed + by faces. To test the hypothesis that affective informa- tion indeed modulates + early stages of face processing, ERPs were recorded to individually assessed + liked, neutral, and disliked faces and checkerboard-reversal stimuli. At the + N170 latency, the cortical three-dimen- sional distribution of current density + was computed in stereotactic space using a tomographic source local- ization + technique. Mean activity was extracted from the FG, defined by structure-probability + maps, and a meta-cluster delineated by the coordinates of the voxel with the + strongest face-sensitive response from five published functional magnetic + resonance imaging studies. In the FG, 160 ms poststimulus, liked faces elicited + stronger activation than disliked and neutral faces and checkerboard-reversal + stimuli. Further, confirming recent results, affect-modulated brain elec- + trical activity started very early in the human brain (112 ms). These findings + suggest that affective fea- tures conveyed by faces modulate structural face + en- coding. Behavioral results from an independent study revealed that the + stimuli were not biased toward par- ticular facial expressions and confirmed + that liked faces were rated as more attractive. Increased FG ac- tivation + for liked faces may thus be interpreted as reflecting enhanced attention due + to their saliency.", "venue": "NeuroImage", "year": 2002, "referenceCount": + 90, "citationCount": 284, "influentialCitationCount": 15, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Psychology"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Psychology", "source": "external"}, {"category": "Psychology", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-07-01", "journal": {"name": "NeuroImage", "pages": "663-677", "volume": + "16"}, "authors": [{"authorId": "2064878", "name": "D. Pizzagalli"}, {"authorId": + "1812328", "name": "D. Lehmann"}, {"authorId": "49076976", "name": "Andrew + M. Hendrick"}, {"authorId": "143656989", "name": "M. Regard"}, {"authorId": + "1397558990", "name": "R. Pascual-Marqui"}, {"authorId": "118576023", "name": + "R. Davidson"}]}, {"paperId": "a1fb0653517708e78322a8c4a0dc048378e4c353", + "externalIds": {"MAG": "2117922987", "DOI": "10.1557/PROC-242-383", "CorpusId": + 136602742}, "corpusId": 136602742, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a1fb0653517708e78322a8c4a0dc048378e4c353", + "title": "Conductivity Control of AlGaN. Fabrication of AlGaN/GaN Multi-Hetero\u015btructure + and their Application to UV/Blue Light Emitting Devices", "abstract": "The + method for controlling the electrical properties of n-type GaN and AIGaN have + been established. Both GaN and AIGaN films having p - type conduction have + been realized for the first time. High quality AIGaN/GaN mu I t i-he t er + ostrueture showing clear quantum size effect has been fabricated. P-n junction + type UV/blue LED with double he t e ros t rue ture have been developed for + the first time.", "venue": "", "year": 1992, "referenceCount": 0, "citationCount": + 39, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "MRS Proceedings", "pages": "383", "volume": "242"}, "authors": + [{"authorId": "3055501", "name": "I. Akasaki"}, {"authorId": "71281182", "name": + "H. Amano"}]}, {"paperId": "8b8b07d933a68070b61454b38236dab6b9aac298", "externalIds": + {"DBLP": "conf/lics/Bickford0CR18", "MAG": "2798735574", "DOI": "10.1145/3209108.3209200", + "CorpusId": 49354258}, "corpusId": 49354258, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8b8b07d933a68070b61454b38236dab6b9aac298", + "title": "Computability Beyond Church-Turing via Choice Sequences", "abstract": + "Church-Turing computability was extended by Brouwer who considered non-lawlike + computability in the form of free choice sequences. Those are essentially + unbounded sequences whose elements are chosen freely, i.e. not subject to + any law. In this work we develop a new type theory BITT, which is an extension + of the type theory of the Nuprl proof assistant, that embeds the notion of + choice sequences. Supporting the evolving, non-deterministic nature of these + objects required major modifications to the underlying type theory. Even though + the construction of a choice sequence is non-deterministic, once certain choices + were made, they must remain consistent. To ensure this, BITT uses the underlying + library as state and store choices as they are created. Another salient feature + of BITT is that it uses a Beth-like semantics to account for the dynamic nature + of choice sequences. We formally define BITT and use it to interpret and validate + essential axioms governing choice sequences. These results provide a foundation + for a fully intuitionistic version of Nuprl.", "venue": "LICS", "year": 2018, + "referenceCount": 78, "citationCount": 16, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://pure-oai.bham.ac.uk/ws/files/71146432/Computability_Beyond.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Book", "Conference"], "publicationDate": "2018-07-09", "journal": {"name": + "Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science"}, + "authors": [{"authorId": "2487425", "name": "M. Bickford"}, {"authorId": "2432326", + "name": "L. Cohen"}, {"authorId": "1774802", "name": "R. Constable"}, {"authorId": + "1747084", "name": "Vincent Rahli"}]}, {"paperId": "44efd1b514c6e21a8467386515f082ac2e5c207c", + "externalIds": {"MAG": "2162651577", "DOI": "10.1103/PHYSREVLETT.92.198305", + "CorpusId": 26530000, "PubMed": "15169457"}, "corpusId": 26530000, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/44efd1b514c6e21a8467386515f082ac2e5c207c", + "title": "Promoter-induced reactive phase separation in surface reactions.", + "abstract": "Promoters are adsorbed mobile species which do not directly participate + in a catalytic surface reaction, but can influence its rate. Often, they are + characterized by strong attractive interactions with one of the reactants. + We show that these conditions lead to a Turing instability of the uniform + state and to the formation of reaction-induced periodic concentration patterns. + Experimentally such patterns are observed in catalytic water formation on + a Rh(110) surface in the presence of coadsorbed potassium.", "venue": "Physical + review letters", "year": 2004, "referenceCount": 36, "citationCount": 40, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://pure.mpg.de/pubman/item/item_739404_4/component/file_1478285/e198305.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2004-05-14", "journal": + {"name": "Physical review letters", "pages": "\n 198305\n ", + "volume": "92 19"}, "authors": [{"authorId": "89673540", "name": "Y. De Decker"}, + {"authorId": "6649987", "name": "H. Marbach"}, {"authorId": "92451372", "name": + "M. Hinz"}, {"authorId": "92781519", "name": "S. G\u00fcnther"}, {"authorId": + "145038979", "name": "M. Kiskinova"}, {"authorId": "2490613", "name": "A. + Mikhailov"}, {"authorId": "4191115", "name": "R. Imbihl"}]}, {"paperId": "8672e79d07411dbaa5fad9cbdc96b7b2681160b2", + "externalIds": {"MAG": "35070398", "CorpusId": 29684145, "PubMed": "5937650"}, + "corpusId": 29684145, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8672e79d07411dbaa5fad9cbdc96b7b2681160b2", + "title": "Soil beds for the control of sewage odors.", "abstract": "Liquid + wastes in transit often are accompanied by malodorous volatile materials which + emanate from sewer vents into the surrounding atmosphere. Many of these materials + are perceptible in very low concentrations in the range of parts per billion. + Disagreeable odors associated with the transporta tion of wastes are of serious + concern to the responsible regulatory and con trol agencies and to the citizens + in the vicinity where these odors are dis cernible. These odor problems are + intensified by warm summer tempera tures, by long detention times in tran + sit, by lack of aeration, and by the close proximity of residences to sewer + system vents. Pomeroy (1) (2) and Mayo (3) have alleviated sewer odor problems + successfully by routing exit sewer gases through soil beds. Mayo''s installation + on Mercer Island at Seattle has per formed so effectively that the consult", + "venue": "Journal - Water Pollution Control Federation", "year": 1966, "referenceCount": + 2, "citationCount": 97, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Engineering", "Medicine"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1966-05-01", "journal": + {"name": "Journal - Water Pollution Control Federation", "pages": "\n 829-40\n ", + "volume": "38 5"}, "authors": [{"authorId": "92162976", "name": "D. A. Carlson"}, + {"authorId": "107678413", "name": "C. Leiser"}]}, {"paperId": "beb693040516f61f88b2bd5942929faadd38827c", + "externalIds": {"MAG": "2002795182", "DOI": "10.1090/S0025-5718-1993-1195435-0", + "CorpusId": 6115644}, "corpusId": 6115644, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/beb693040516f61f88b2bd5942929faadd38827c", + "title": "Numerical computations concerning the ERH", "abstract": "This paper + describes a computation which established the ERH to height 10000 for all + primitive Dirichlet L-series with conductor Q < 13, and to height 2500 for + all Q < 72, all composite Q < 112, and other moduli. The computations were + based on Euler-Maclaurin summation. Care was taken to obtain mathematically + rigorous results: the zeros were first located within 10-12, then rigorously + separated using an interval arithmetic package. A generalized Turing Criterion + was used to show there were no zeros off the critical line. Statistics about + the spacings between zeros were compiled to test the Pair Correlation Conjecture + and GUE hypothesis.", "venue": "", "year": 1993, "referenceCount": 41, "citationCount": + 54, "influentialCitationCount": 10, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.ams.org/mcom/1993-61-203/S0025-5718-1993-1195435-0/S0025-5718-1993-1195435-0.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1993-09-01", + "journal": {"name": "Mathematics of Computation", "pages": "415-4401723", + "volume": "61"}, "authors": [{"authorId": "1887299", "name": "R. Rumely"}]}, + {"paperId": "d7b2305d741d10f904ab125124a8f2f01b55cd57", "externalIds": {"MAG": + "1535885445", "DBLP": "conf/mfcs/CaiHV92", "DOI": "10.1007/3-540-55808-X_14", + "CorpusId": 15369038}, "corpusId": 15369038, "publicationVenue": {"id": "8341fde2-3e67-4fde-bb5c-6f0320d7f114", + "name": "International Symposium on Mathematical Foundations of Computer Science", + "type": "conference", "alternate_names": ["Int Symp Math Found Comput Sci", + "MFCS", "Math Found Comput Sci", "Mathematical Foundations of Computer Science"], + "url": "https://en.wikipedia.org/wiki/International_Symposium_on_Mathematical_Foundations_of_Computer_Science"}, + "url": "https://www.semanticscholar.org/paper/d7b2305d741d10f904ab125124a8f2f01b55cd57", + "title": "Promise Problems and Access to Unambiguous Computation", "abstract": + null, "venue": "International Symposium on Mathematical Foundations of Computer + Science", "year": 1992, "referenceCount": 36, "citationCount": 18, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1992-08-24", + "journal": {"pages": "162-171"}, "authors": [{"authorId": "1678402", "name": + "Jin-Yi Cai"}, {"authorId": "1704511", "name": "L. A. Hemaspaandra"}, {"authorId": + "3222707", "name": "J. Vyskoc"}]}, {"paperId": "2aea6c760034b83cbb9f3d8fcfd21143d05ee5a5", "externalIds": {"MAG": "2141046603", "DOI": "10.2134/AGRONJ2000.92124X", "CorpusId": - 85976665}, "url": "https://www.semanticscholar.org/paper/2aea6c760034b83cbb9f3d8fcfd21143d05ee5a5", + 85976665}, "corpusId": 85976665, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2aea6c760034b83cbb9f3d8fcfd21143d05ee5a5", "title": "Binary Legume\u2013Grass Mixtures Improve Forage Yield, Quality, and Seasonal Distribution", "abstract": "greater stand longevity than legume or grass monocultures (Droslom and Smith, 1976). Yield and forage quality @@ -46123,16 +52361,145 @@ interactions: In vitro dry matter digestibility (IVDMD), neutrallittle yield advantage over alfalfa monocultures when detergent fiber (NDF), and crude protein (CP) concentrations were harvested as hay.", "venue": "", "year": 2000, "referenceCount": 15, - "citationCount": 275, "influentialCitationCount": 16, "isOpenAccess": false, - "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", - "source": "external"}, {"category": "Agricultural And Food Sciences", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Agronomy Journal", "pages": "24-29", "volume": "92"}, "authors": - [{"authorId": "87173033", "name": "B. Sleugh"}, {"authorId": "27911173", "name": - "K. Moore"}, {"authorId": "145752593", "name": "J. George"}, {"authorId": - "1992544027", "name": "E. Brummer"}]}, {"paperId": "30751d0863b0f39d0545ec149c4d906da88f3db7", - "externalIds": {"DBLP": "journals/cie/GolleD05", "MAG": "2023103153", "DOI": - "10.1145/1077246.1077255", "CorpusId": 18154410}, "url": "https://www.semanticscholar.org/paper/30751d0863b0f39d0545ec149c4d906da88f3db7", + "citationCount": 276, "influentialCitationCount": 17, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Agricultural And Food Sciences", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Agronomy Journal", "pages": "24-29", "volume": "92"}, + "authors": [{"authorId": "87173033", "name": "B. Sleugh"}, {"authorId": "27911173", + "name": "K. Moore"}, {"authorId": "145752593", "name": "J. George"}, {"authorId": + "1992544027", "name": "E. Brummer"}]}, {"paperId": "afaae8591456819c58aaa9baafaeaaa8a9d972ff", + "externalIds": {"MAG": "2338747497", "DBLP": "journals/corr/SchoenickCTTE16", + "ArXiv": "1604.04315", "DOI": "10.1145/3122814", "CorpusId": 6383047}, "corpusId": + 6383047, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/afaae8591456819c58aaa9baafaeaaa8a9d972ff", + "title": "Moving beyond the Turing Test with the Allen AI Science Challenge", + "abstract": "Answering questions correctly from standardized eighth-grade + science tests is itself a test of machine intelligence.", "venue": "Communications + of the ACM", "year": 2016, "referenceCount": 17, "citationCount": 49, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1604.04315", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-04-14", "journal": {"name": "Communications of the ACM", "pages": "60 + - 64", "volume": "60"}, "authors": [{"authorId": "3393851", "name": "Carissa + Schoenick"}, {"authorId": "48323507", "name": "Peter Clark"}, {"authorId": + "3385516", "name": "Oyvind Tafjord"}, {"authorId": "1689647", "name": "Peter + D. Turney"}, {"authorId": "1741101", "name": "Oren Etzioni"}]}, {"paperId": + "66dd3f94373726bbbd4b275b14857e5a7f1ec88d", "externalIds": {"MAG": "1981962996", + "DOI": "10.1090/S0273-0979-1990-15923-3", "CorpusId": 7093646}, "corpusId": + 7093646, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/66dd3f94373726bbbd4b275b14857e5a7f1ec88d", + "title": "The jump is definable in the structure of the degrees of unsolvability", + "abstract": "Recursion theory deals with computability on the natural numbers. + A function \u0192 from N to N is computable (or recursive) if it can be calculated + by some program on a Turing machine, or equivalently on any other general + purpose computer. A major topic of interest, introduced in Post [23], is the + notion of relative difficulty of computation. A function \u0192 is computable + relative to a function g if after equipping the machine with a black box subroutine + that provides the values of g, there is a program (which now may call g via + the subroutine) which computes \u0192 . In this case we write \u0192 0. The other, called + ILFP, speaks about integer positions in strings, and generates the class PTIME + of languages recognizable in polynomial time. An application is given, showing + how to code Head Grammars in ILFP, showing why these grammars generate only + polynomial time languages.", "venue": "Computational Linguistics", "year": + 1988, "referenceCount": 17, "citationCount": 56, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1988-12-01", "journal": + {"name": "Comput. Linguistics", "pages": "1-9", "volume": "14"}, "authors": + [{"authorId": "2302690", "name": "W. Rounds"}]}, {"paperId": "53ccf87977e9644d8762ca94f68d8e7883517fb8", + "externalIds": {"MAG": "2308658484", "DOI": "10.14288/1.0061610", "CorpusId": + 88109129}, "corpusId": 88109129, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/53ccf87977e9644d8762ca94f68d8e7883517fb8", "title": "Reaction-diffusion theory of localized structures with application to vertebrate organogenesis", "abstract": "Biological pattern formation is addressed within the framework of Turing''s (1952) chemical theory. His (linear) @@ -46216,284 +52597,17 @@ interactions: and is more susceptible to gradients in precursor concentration than the Brusselator. The different dynamics in the two models, underlying the different behaviours, are discussed.", "venue": "", "year": 1995, "referenceCount": 115, "citationCount": - 25, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": null, "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "2604977", "name": "D. Holloway"}]}, {"paperId": - "235f8d65c1b66df0a0e011d5819a38bc7092618b", "externalIds": {"MAG": "2985335211", - "DOI": "10.1109/81.473564", "CorpusId": 8158662}, "url": "https://www.semanticscholar.org/paper/235f8d65c1b66df0a0e011d5819a38bc7092618b", - "title": "Autonomous cellular neural networks: a unified paradigm for pattern - formation and active wave propagation", "abstract": "This tutorial paper proposes - a subclass of cellular neural networks (CNN) having no inputs (i.e., autonomous) - as a universal active substrate or medium for modeling and generating many - pattern formation and nonlinear wave phenomena from numerous disciplines, - including biology, chemistry, ecology, engineering, and physics. Each CNN - is defined mathematically by its cell dynamics (e.g., state equations) and - synaptic law, which specifies each cell''s interaction with its neighbors. - We focus on reaction-diffusion CNNs having a linear synaptic law that approximates - a spatial Laplacian operator. Such a synaptic law can be realized by one or - more layers of linear resistor couplings. An autonomous CNN made of third-order - universal cells and coupled to each other by only one layer of linear resistors - provides a unified active medium for generating trigger (autowave) waves, - target (concentric) waves, spiral waves, and scroll waves. When a second layer - of linear resistors is added to couple a second capacitor voltage in each - cell to its neighboring cells, the resulting CNN can be used to generate various - turing patterns. >", "venue": "", "year": 1995, "referenceCount": 50, "citationCount": - 284, "influentialCitationCount": 14, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Physics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": "1995-10-01", "journal": {"name": "IEEE Transactions on - Circuits and Systems I-regular Papers", "pages": "559-577", "volume": "42"}, - "authors": [{"authorId": "144848684", "name": "L. Chua"}, {"authorId": "145361556", - "name": "M. Hasler"}, {"authorId": "1695272", "name": "G. Moschytz"}, {"authorId": - "14598794", "name": "J. Neirynck"}]}, {"paperId": "c4cb90a67f45e7cbacb5286e934b309e89843922", - "externalIds": {"DBLP": "journals/jmlr/PerezBM21", "CorpusId": 233364065}, - "url": "https://www.semanticscholar.org/paper/c4cb90a67f45e7cbacb5286e934b309e89843922", - "title": "Attention is Turing-Complete", "abstract": "Alternatives to recurrent - neural networks, in particular, architectures based on self-attention, are - gaining momentum for processing input sequences. In spite of their relevance, - the computational properties of such networks have not yet been fully explored. - We study the computational power of the Transformer, one of the most paradigmatic - architectures exemplifying self-attention. We show that the Transformer with - hard-attention is Turing complete exclusively based on their capacity to compute - and access internal dense representations of the data. Our study also reveals - some minimal sets of elements needed to obtain this completeness result.", - "venue": "J. Mach. Learn. Res.", "year": 2021, "referenceCount": 31, "citationCount": - 10, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "J. Mach. Learn. Res.", "pages": "75:1-75:35", "volume": "22"}, "authors": - [{"authorId": "30501537", "name": "Jorge P\u00e9rez"}, {"authorId": "35106192", - "name": "P. Barcel\u00f3"}, {"authorId": "66941060", "name": "Javier Marinkovic"}]}, - {"paperId": "b351ae240abecd53470af1fd49e72d3c825728ad", "externalIds": {"MAG": - "2137286807", "DOI": "10.1146/ANNUREV.PH.48.030186.003231", "CorpusId": 21213212, - "PubMed": "3010828"}, "url": "https://www.semanticscholar.org/paper/b351ae240abecd53470af1fd49e72d3c825728ad", - "title": "Temperature receptors in the central nervous system.", "abstract": - "For half a century, it has been known that thermo sensitive regions of the - rostral brain stem are important in thermoregulation (61). Figure 1 indicates - that a variety of thermoregulatory responses can be elicited by changing the - tempera\u00ad ture of the preoptic area and anterior hypothalamus (POI AH). - POI AH warming evokes heat-loss responses, and POIAH cooling evokes heat-production - re\u00ad sponses. If POIAH temperature is changed slightly above or below - normal, there are changes in heat-retention responses such as skin blood flow - and thermoregulatory behavior. Figure 1 also describes the synaptic organization - of POI AH thermosensitive neurons (4). While most neurons are temperature - insensitive, warm-sensitive neurons have firing rates that increase with warm\u00ad - ing or decrease with cooling. Conversely, the firing rates of cold-sensitive - neurons increase with cooling or decrease with warming. Many central thermo\u00ad - sensitive neurons also receive synaptic inputs from skin and spinal thermore\u00ad - ceptive pathways (4, 7). This indicates that such neurons are capable of thermal - integration, and it increases the likelihood that these neurons function in - thermoregulation. As summarized in Figure 1, the evidence for central thermosensitivity - comes from thermoregulatory studies during thermal stimulation of discrete - neural areas and from electrophysiological studies of temperature-sensitive - neurons. In this review, these studies are presented first as an overview - of the comparative aspects of central thermo sensitivity in vertebrates. The - second half of this review focuses on the properties and synaptic organization - of POIAH thermosensitive neurons.", "venue": "Annual Review of Physiology", - "year": 1986, "referenceCount": 65, "citationCount": 275, "influentialCitationCount": - 12, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": null, "journal": {"name": - "Annual review of physiology", "pages": "\n 639-54\n ", "volume": - "48"}, "authors": [{"authorId": "6716490", "name": "J. Boulant"}, {"authorId": - "3579767", "name": "J. Dean"}]}, {"paperId": "31cee7a3b71864675ab0f4845975299e269452a2", - "externalIds": {"MAG": "2044284355", "DOI": "10.1007/978-1-4613-1139-3_8", - "CorpusId": 122003607}, "url": "https://www.semanticscholar.org/paper/31cee7a3b71864675ab0f4845975299e269452a2", - "title": "Representing the knowledge of turing machines", "abstract": null, - "venue": "", "year": 1994, "referenceCount": 22, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Philosophy", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-07-01", - "journal": {"name": "Theory and Decision", "pages": "125-146", "volume": "37"}, - "authors": [{"authorId": "2337313", "name": "H. Shin"}, {"authorId": "145756963", - "name": "T. Williamson"}]}, {"paperId": "75bc9cc97e67534bdb0175ed21fbe40ab27d480f", - "externalIds": {"DBLP": "journals/recall/Coniam08", "MAG": "1978876218", "DOI": - "10.1017/S0958344008000815", "CorpusId": 27777705}, "url": "https://www.semanticscholar.org/paper/75bc9cc97e67534bdb0175ed21fbe40ab27d480f", - "title": "Evaluating the language resources of chatbots for their potential - in English as a second language", "abstract": "Abstract This paper investigates - the linguistic worth of current \u2018chatbot\u2019 programs \u2013 software - programs which attempt to hold a conversation, or interact, in English \u2013 - as a precursor to their potential as an ESL (English as a second language) - learning resource. After some initial background to the development of chatbots, - and a discussion of the Loebner Prize Contest for the most \u2018human\u2019 - chatbot (the \u2018Turing Test\u2019), the paper describes an in-depth study - evaluating the linguistic accuracy of a number of chatbots available online. - Since the ultimate purpose of the current study concerns chatbots'' potential - with ESL learners, the analysis of language embraces not only an examination - of features of language from a native-speaker''s perspective (the focus of - the Turing Test), but also aspects of language from a second-language-user''s - perspective. Analyses indicate that while the winner of the 2005 Loebner Prize - is the most able chatbot linguistically, it may not necessarily be the chatbot - most suited to ESL learners. The paper concludes that while substantial progress - has been made in terms of chatbots'' language-handling, a robust ESL \u2018conversation - practice machine\u2019 (Atwell, 1999) is still some way off being a reality.", - "venue": "ReCALL", "year": 2008, "referenceCount": 20, "citationCount": 44, - "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Linguistics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2008-01-01", "journal": {"name": "ReCALL", - "pages": "98 - 116", "volume": "20"}, "authors": [{"authorId": "2925217", - "name": "David Coniam"}]}, {"paperId": "3d3363cb8d5582e54cd34ea5772cd0cb2ceabc8b", - "externalIds": {"DBLP": "journals/tcs/Caucal03a", "MAG": "1581736958", "DOI": - "10.1016/S0304-3975(02)00655-2", "CorpusId": 10934397}, "url": "https://www.semanticscholar.org/paper/3d3363cb8d5582e54cd34ea5772cd0cb2ceabc8b", - "title": "On the transition graphs of turing machines", "abstract": null, - "venue": "Theoretical Computer Science", "year": 2001, "referenceCount": 22, - "citationCount": 18, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2001-05-23", - "journal": {"name": "Theor. Comput. Sci.", "pages": "195-223", "volume": "296"}, - "authors": [{"authorId": "2431598", "name": "D. Caucal"}]}, {"paperId": "8672e79d07411dbaa5fad9cbdc96b7b2681160b2", - "externalIds": {"MAG": "35070398", "CorpusId": 29684145, "PubMed": "5937650"}, - "url": "https://www.semanticscholar.org/paper/8672e79d07411dbaa5fad9cbdc96b7b2681160b2", - "title": "Soil beds for the control of sewage odors.", "abstract": "Liquid - wastes in transit often are accompanied by malodorous volatile materials which - emanate from sewer vents into the surrounding atmosphere. Many of these materials - are perceptible in very low concentrations in the range of parts per billion. - Disagreeable odors associated with the transporta tion of wastes are of serious - concern to the responsible regulatory and con trol agencies and to the citizens - in the vicinity where these odors are dis cernible. These odor problems are - intensified by warm summer tempera tures, by long detention times in tran - sit, by lack of aeration, and by the close proximity of residences to sewer - system vents. Pomeroy (1) (2) and Mayo (3) have alleviated sewer odor problems - successfully by routing exit sewer gases through soil beds. Mayo''s installation - on Mercer Island at Seattle has per formed so effectively that the consult", - "venue": "Journal - Water Pollution Control Federation", "year": 1966, "referenceCount": - 2, "citationCount": 97, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering", "Medicine"], "s2FieldsOfStudy": [{"category": - "Engineering", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1966-05-01", "journal": {"name": "Journal - - Water Pollution Control Federation", "pages": "\n 829-40\n ", - "volume": "38 5"}, "authors": [{"authorId": "92162976", "name": "D. A. Carlson"}, - {"authorId": "107678413", "name": "C. Leiser"}]}, {"paperId": "8df25bc010e24356e2d39fcca74f210fb228593c", - "externalIds": {"MAG": "1980268869", "DBLP": "journals/apal/Harizanov98", - "DOI": "10.1016/S0168-0072(97)00056-0", "CorpusId": 8403585}, "url": "https://www.semanticscholar.org/paper/8df25bc010e24356e2d39fcca74f210fb228593c", - "title": "Turing Degrees of Certain Isomorphic Images of Computable Relations", - "abstract": null, "venue": "Annals of Pure and Applied Logic", "year": 1998, - "referenceCount": 14, "citationCount": 27, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1998-04-28", "journal": - {"name": "Ann. Pure Appl. Log.", "pages": "103-113", "volume": "93"}, "authors": - [{"authorId": "3187833", "name": "V. Harizanov"}]}, {"paperId": "e7796ed8d074771294f2dbe0100d8b726d417487", - "externalIds": {"MAG": "2083747727", "DBLP": "conf/stoc/KintalaF77", "DOI": - "10.1145/800105.803407", "CorpusId": 18860086}, "url": "https://www.semanticscholar.org/paper/e7796ed8d074771294f2dbe0100d8b726d417487", - "title": "Computations with a restricted number of nondeterministic steps - (Extended Abstract)", "abstract": "Nondeterminism is one of the most elusive - concepts in computing.\n In this paper we direct our efforts towards viewing - nondeterminism as an additional resource at the disposal of time or space - bounded Turing machine computations and study the classes of languages acceptable - by these machines with restricted amounts of nondeterminism.\n One motivation - for this study comes from the observation that for many of the well-known - NP-complete problems, if n'' is the length of the input, an algorithm exists - requiring a total number of moves which is polynomial in n, but the number - of nondeterministic moves is only linear in n.", "venue": "Symposium on the - Theory of Computing", "year": 1977, "referenceCount": 22, "citationCount": - 53, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1977-05-04", "journal": {"pages": - "178-185"}, "authors": [{"authorId": "1759332", "name": "C. Kintala"}, {"authorId": - "1691253", "name": "P. C. Fischer"}]}, {"paperId": "67ca442b1662171733d234e52b3c4af929619c45", - "externalIds": {"DBLP": "journals/jetai/AllenVZ00", "MAG": "2181480948", "DOI": - "10.1080/09528130050111428", "CorpusId": 17838736}, "url": "https://www.semanticscholar.org/paper/67ca442b1662171733d234e52b3c4af929619c45", - "title": "Prolegomena to any future artificial moral agent", "abstract": "As - artificial intelligence moves ever closer to the goal of producing fully autonomous - agents, the question of how to design and implement an artificial moral agent - (AMA) becomes increasingly pressing. Robots possessing autonomous capacities - to do things that are useful to humans will also have the capacity to do things - that are harmful to humans and other sentient beings. Theoretical challenges - to developing artificial moral agents result both from controversies among - ethicists about moral theory itself, and from computational limits to the - implementation of such theories. In this paper the ethical disputes are surveyed, - the possibility of a \u2018moral Turing Test\u2019 is considered and the computational - difficulties accompanying the different types of approach are assessed. Human-like - performance, which is prone to include immoral actions, may not be acceptable - in machines, but moral perfection may be computationally unattainable. The - risks posed by autonomous machines ignorantly or deliberately harming people - and other sentient beings are great. The development of machines with enough - intelligence to assess the effects of their actions on sentient beings and - act accordingly may ultimately be the most important task faced by the designers - of artificially intelligent automata.", "venue": "Journal of experimental - and theoretical artificial intelligence (Print)", "year": 2000, "referenceCount": - 34, "citationCount": 273, "influentialCitationCount": 18, "isOpenAccess": - false, "fieldsOfStudy": ["Computer Science", "Psychology"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Psychology", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "2000-07-01", - "journal": {"name": "Journal of Experimental & Theoretical Artificial Intelligence", - "pages": "251 - 261", "volume": "12"}, "authors": [{"authorId": "30308222", - "name": "C. Allen"}, {"authorId": "145447621", "name": "G. Varner"}, {"authorId": - "4324210", "name": "Jason Zinser"}]}, {"paperId": "fbe8cd7808f58ea24cfcd0b153cabc87867a7031", - "externalIds": {"MAG": "2065447689", "DOI": "10.1093/emboj/21.10.2397", "CorpusId": - 34964856, "PubMed": "12006492"}, "url": "https://www.semanticscholar.org/paper/fbe8cd7808f58ea24cfcd0b153cabc87867a7031", - "title": "Structure and functional interactions of the Tsg101 UEV domain", - "abstract": "Human Tsg101 plays key roles in HIV budding and in cellular vacuolar - protein sorting (VPS). In performing these functions, Tsg101 binds both ubiquitin - (Ub) and the PTAP tetrapeptide \u2018late domain\u2019 motif located within - the viral Gag protein. These interactions are mediated by the N\u2010terminal - domain of Tsg101, which belongs to the catalytically inactive ubiquitin E2 - variant (UEV) family. We now report the struc ture of Tsg101 UEV and chemical - shift mapping of the Ub and PTAP binding sites. Tsg101 UEV resembles canonical - E2 ubiquitin conjugating enzymes, but has an additional N\u2010terminal helix, - an extended \u03b2\u2010hairpin that links strands 1 and 2, and lacks the - two C\u2010terminal helices normally found in E2 enzymes. PTAP\u2010containing - peptides bind in a hydrophobic cleft exposed by the absence of the C\u2010terminal - helices, whereas ubiquitin binds in a novel site surrounding the \u03b2\u2010hairpin. - These studies provide a structural framework for understanding how Tsg101 - mediates the protein\u2013protein interactions required for HIV budding and - VPS.", "venue": "EMBO Journal", "year": 2002, "referenceCount": 66, "citationCount": - 273, "influentialCitationCount": 27, "isOpenAccess": true, "fieldsOfStudy": - ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}, {"category": "Chemistry", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2002-05-15", "journal": {"name": "The EMBO Journal", "volume": "21"}, "authors": - [{"authorId": "46955092", "name": "O. Pornillos"}, {"authorId": "3863692", - "name": "S. Alam"}, {"authorId": "40426905", "name": "R. Rich"}, {"authorId": - "3342884", "name": "D. Myszka"}, {"authorId": "145197424", "name": "D. Davis"}, - {"authorId": "2662926", "name": "W. Sundquist"}]}, {"paperId": "246df03f6040f73ee31c2399e67dfc038db83164", - "externalIds": {"MAG": "2039310436", "DOI": "10.1145/1247066.1247068", "CorpusId": - 830317}, "url": "https://www.semanticscholar.org/paper/246df03f6040f73ee31c2399e67dfc038db83164", - "title": "Computational complexity and G\u00f6del''s incompleteness theorem", - "abstract": "Given any simply consistent formal theory F of the state complexity - L(S) of finite binary sequences S as computed by 3-tape-symbol Turing machines, - there exists a natural number L(F) such that L(S) > n is provable in F only - if n < L(F). On the other hand, almost all finite binary sequences S satisfy - L(S) < L(F). The proof resembles Berry''s paradox, not the Epimenides nor - Richard paradoxes.", "venue": "SIGA", "year": 1971, "referenceCount": 4, "citationCount": - 40, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1971-04-01", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "1756533", "name": "G. Chaitin"}]}, {"paperId": "afaae8591456819c58aaa9baafaeaaa8a9d972ff", - "externalIds": {"MAG": "2338747497", "DBLP": "journals/corr/SchoenickCTTE16", - "ArXiv": "1604.04315", "DOI": "10.1145/3122814", "CorpusId": 6383047}, "url": - "https://www.semanticscholar.org/paper/afaae8591456819c58aaa9baafaeaaa8a9d972ff", - "title": "Moving beyond the Turing Test with the Allen AI Science Challenge", - "abstract": "Answering questions correctly from standardized eighth-grade - science tests is itself a test of machine intelligence.", "venue": "Communications - of the ACM", "year": 2016, "referenceCount": 17, "citationCount": 48, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-04-14", "journal": {"name": "Communications of the ACM", "pages": "60 - - 64", "volume": "60"}, "authors": [{"authorId": "3393851", "name": "Carissa - Schoenick"}, {"authorId": "48323507", "name": "Peter Clark"}, {"authorId": - "3385516", "name": "Oyvind Tafjord"}, {"authorId": "1689647", "name": "Peter - D. Turney"}, {"authorId": "1741101", "name": "Oren Etzioni"}]}, {"paperId": - "c2130aa8aa973938d9d6a5e6e3ca3610630349a5", "externalIds": {"MAG": "2029081759", - "DOI": "10.1002/JCP.1030580412", "CorpusId": 34185739, "PubMed": "13889878"}, + 25, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "2604977", "name": "D. Holloway"}]}, + {"paperId": "c2130aa8aa973938d9d6a5e6e3ca3610630349a5", "externalIds": {"MAG": + "2029081759", "DOI": "10.1002/JCP.1030580412", "CorpusId": 34185739, "PubMed": + "13889878"}, "corpusId": 34185739, "publicationVenue": {"id": "0156ab70-ed8d-4157-b167-34027f5ac02a", + "name": "Journal of Cellular and Comparative Physiology", "type": "journal", + "alternate_names": ["J Cell Comp Physiol"], "issn": "0095-9898", "alternate_issns": + ["1553-0809"], "url": "http://www.onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-4652"}, "url": "https://www.semanticscholar.org/paper/c2130aa8aa973938d9d6a5e6e3ca3610630349a5", "title": "Postirradiation survival kinetics of mammalian cells grown in culture.", "abstract": "In connection with the question of lethal sites in a cell, results @@ -46507,29 +52621,40 @@ interactions: sensitivity of the targets is dependent upon the age of a cell with respect to its interdivisional cycle. (C.H.)", "venue": "Journal of Cellular and Comparative Physiology", "year": 1961, "referenceCount": 7, "citationCount": 97, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1961-12-01", "journal": {"name": "Journal - of cellular and comparative physiology", "pages": "\n 113-34\n ", - "volume": "58(3)Pt 2"}, "authors": [{"authorId": "17077554", "name": "M. Elkind"}, - {"authorId": "2071361146", "name": "H. Sutton"}, {"authorId": "121629502", - "name": "W. B. Moses"}]}, {"paperId": "0b62ae460984f1a4cdfb7765c322eec5bc771e17", - "externalIds": {"MAG": "2528169062", "CorpusId": 64501803}, "url": "https://www.semanticscholar.org/paper/0b62ae460984f1a4cdfb7765c322eec5bc771e17", - "title": "Introduction To Oceanography", "abstract": "O T H E R R E F E R - E N C E S : (not required and a vaila ble in the l ibr a ry TBA): Open University - Ser ies: Oc ean Cir cula tion; Sea wa ter : Its Com position, Pr operties - and Beha vior ; Waves, Tides and Sha llow Wa ter Proc esses; The O c ea n - Ba sins: Their Struc ture a nd Evolution: O cea n Chem istry a nd Deep Sea - Sedim ents; Pond a nd Picka rd, Introduc tion to Dyna m ic al Ocea nogr aphy, - 2nd edition;", "venue": "", "year": 2016, "referenceCount": 0, "citationCount": - 55, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": - "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "40149259", "name": "A. Strauss"}]}, - {"paperId": "50daafd25142cad9ec5e3e9058de95ca5b9558aa", "externalIds": {"MAG": - "117544142", "CorpusId": 107709958}, "url": "https://www.semanticscholar.org/paper/50daafd25142cad9ec5e3e9058de95ca5b9558aa", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1961-12-01", "journal": {"name": "Journal of cellular and comparative physiology", + "pages": "\n 113-34\n ", "volume": "58(3)Pt 2"}, "authors": + [{"authorId": "17077554", "name": "M. Elkind"}, {"authorId": "2071361146", + "name": "H. Sutton"}, {"authorId": "121629502", "name": "W. B. Moses"}]}, + {"paperId": "9befba8a7304980b3915ba9d77f19d7b3bf8d7b5", "externalIds": {"MAG": + "26590380", "CorpusId": 59707222}, "corpusId": 59707222, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9befba8a7304980b3915ba9d77f19d7b3bf8d7b5", + "title": "The Turing effect: the nature of trust in expert systems advice", + "abstract": null, "venue": "", "year": 1997, "referenceCount": 0, "citationCount": + 55, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-05-30", + "journal": {"name": "", "pages": "417-448", "volume": ""}, "authors": [{"authorId": + "38428515", "name": "F. Lerch"}, {"authorId": "8121434", "name": "M. Prietula"}, + {"authorId": "2029113", "name": "Carol T. Kulik"}]}, {"paperId": "31cee7a3b71864675ab0f4845975299e269452a2", + "externalIds": {"MAG": "2044284355", "DOI": "10.1007/978-1-4613-1139-3_8", + "CorpusId": 122003607}, "corpusId": 122003607, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/31cee7a3b71864675ab0f4845975299e269452a2", + "title": "Representing the knowledge of turing machines", "abstract": null, + "venue": "", "year": 1994, "referenceCount": 22, "citationCount": 15, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1994-07-01", "journal": {"name": "Theory and Decision", "pages": "125-146", + "volume": "37"}, "authors": [{"authorId": "2337313", "name": "H. Shin"}, {"authorId": + "145756963", "name": "T. Williamson"}]}, {"paperId": "50daafd25142cad9ec5e3e9058de95ca5b9558aa", + "externalIds": {"MAG": "117544142", "CorpusId": 107709958}, "corpusId": 107709958, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/50daafd25142cad9ec5e3e9058de95ca5b9558aa", "title": "Technology in Working Order: Studies of Work, Interaction and Technology", "abstract": "Part One: Analytic Orientations 1. The Curious Case of the Vanishing Technology, Graham Button. Part Two: Introducing Technology into the Work @@ -46549,331 +52674,207 @@ interactions: the Wizard, the Wonderful Wizard of Oz, Robin Wooffitt and Norman Fraser 12. The Turing Test and Language Skills, Harry Collins.", "venue": "", "year": 1992, "referenceCount": 42, "citationCount": 281, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-12-12", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145218181", - "name": "G. Button"}]}, {"paperId": "52e87b65ccccb745706fcd09b7df65d3adcdcef8", - "externalIds": {"CorpusId": 14943944}, "url": "https://www.semanticscholar.org/paper/52e87b65ccccb745706fcd09b7df65d3adcdcef8", - "title": "A diffusion reaction theory of morphogenesis in plants Universal - Turing Machine", "abstract": "Unified certifiable communication have led to - many unproven advances, including reinforcement learning and evolutionary - programming. After years of confusing research into forward-error correction, - we argue the study of access points. In order to address this grand challenge, - we use metamorphic modalities to show that rasterization and checksums can - interfere to overcome this challenge.", "venue": "", "year": 2011, "referenceCount": - 153, "citationCount": 50, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": []}, {"paperId": "ad356b78a42a0b905d6bcd3e608c0b9484a4a784", - "externalIds": {"DBLP": "journals/jsyml/Steel82", "MAG": "2035687451", "DOI": - "10.2307/2273146", "CorpusId": 44782516}, "url": "https://www.semanticscholar.org/paper/ad356b78a42a0b905d6bcd3e608c0b9484a4a784", - "title": "A classification of jump operators", "abstract": "The structure - (D, \u2264) of the Turing degrees under Turing reducibility is quite complicated. - This is true even if we restrict our attention to the substructure (R, \u2264) - of r.e. degrees. However, the theorems which imply that these structures are - complicated all involve ad hoc constructions of sets having the desired reducibility - relations. The complexity disappears when we turn to degrees occurring in - nature. Of the degrees in R, only 0 and 0\u2032 seem natural. In D, only 0, - 0\u2032, 0\u2033, \u2026, 0\u03c9, 0\u03c9+1, \u2026 (and on into the transfinite) - seem natural. Thus the natural degrees appear to be wellordered, with successors - given by Turing jump. If this is true, one would like to prove it. Of course - the first problem is to make the concept of naturalness more precise. The - following requirements seem plausible: a natural degree should be definable, - its definition should relativise to an arbitrary degree, and this relativisation - should preserve reducibility relations among natural degrees. Thus to each - natural degree c is associated a definable fc: D \u2192 D so that fc(0) = - c and \u2200d(d \u2264 fc(d)). Moreover, b \u2264 c iff \u2200d(fb(d) \u2264, - fc(d)). To be specific, let us take the definability of fc to mean that fc - \u2208 L(R). If P is a property of degrees, we say P holds almost everywhere - (a.e.) iff \u2203c\u2200d \u2265: c P(d). For f, g: D \u2192 D, let f \u2264mg - iff f(d) \u2264 g(d) a.e. Define f\u2032 by f\u2032(d) = f{d)\u2032, and let - M = {f: D \u2192 D/f \u2208 L(R) \u2227 d \u2264 f(d) a.e.}. The following - conjecture is due to D. A. Martin: Conjecture. M is prewellordered by \u2264m. - If f \u2208 M has rank \u03b1 in \u2264m, then f\u2032 has rank \u03b1 + 1.", - "venue": "Journal of Symbolic Logic (JSL)", "year": 1982, "referenceCount": - 16, "citationCount": 34, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1982-06-01", "journal": {"name": "Journal - of Symbolic Logic", "pages": "347 - 358", "volume": "47"}, "authors": [{"authorId": - "2129072", "name": "J. Steel"}]}, {"paperId": "7e46147161b782b2f6d4e1a7ef32aa066c70c3fe", - "externalIds": {"MAG": "2165958853", "DOI": "10.1109/RISP.1991.130804", "CorpusId": - 195839692}, "url": "https://www.semanticscholar.org/paper/7e46147161b782b2f6d4e1a7ef32aa066c70c3fe", - "title": "The Turing Test and non-information flow", "abstract": "Shows how - the Turing Test provides a very simple yet very general characterization of - non-information flow in multilevel information systems. Despite its conceptual - simplicity, the Turing Test provides the study of information flow with an - extremely useful notion which seems to be a significant departure from other - current information flow theories. Turing''s powerful idea is that information - entropy is represented as uncertainty about the mathematical definition of - a system, rather than as some function of the direct behavior of the system.<>", - "venue": "Proceedings. 1991 IEEE Computer Society Symposium on Research in - Security and Privacy", "year": 1991, "referenceCount": 13, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1991-05-20", "journal": {"name": - "Proceedings. 1991 IEEE Computer Society Symposium on Research in Security - and Privacy", "pages": "373-385"}, "authors": [{"authorId": "41222168", "name": - "R. Browne"}]}, {"paperId": "079b7dd488eb36dda89f6797afb3ec29bb181722", "externalIds": - {"MAG": "2550794614", "CorpusId": 63009391}, "url": "https://www.semanticscholar.org/paper/079b7dd488eb36dda89f6797afb3ec29bb181722", - "title": "Mathematics and computer science", "abstract": "We present a parallel - version of the storage modification machine. This model, called the Associative - Storage Modification Machine (ASMM), has the property that it can recognize - in polynomial time exactly what Turing machines can recognize in polynomial - space. The model therefore belongs to the Second Machine Class, consisting - of those parallel machine models that satisfy the parallel computation thesis. - The Associative Storage Modification Machine obtains its computational power - from following pointers in the reverse direction. 1985 AMS(MOS) 68Q05, 68Q10, - 68Q15.", "venue": "", "year": 1986, "referenceCount": 0, "citationCount": - 37, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "94649563", "name": "P. Houwen"}, {"authorId": "1894322", "name": - "B. Sommeijer"}, {"authorId": "1690674", "name": "J. Verwer"}, {"authorId": - "2870097", "name": "F. Wubs"}]}, {"paperId": "e10cbc26433cb2da5c5bdabd7f41a5480536d2f3", - "externalIds": {"DBLP": "journals/sigcse/Hannay92", "MAG": "2009380537", "DOI": - "10.1145/130962.130971", "CorpusId": 21903885}, "url": "https://www.semanticscholar.org/paper/e10cbc26433cb2da5c5bdabd7f41a5480536d2f3", - "title": "Hypercard automata simulation: finite-state, pushdown and Turing - machines", "abstract": "This paper describes a package of highly interactive - simulation models for the concepts taught in Theory of Computing courses. - Macintosh Hypercard stacks are used to demonstrate the three basic automata - models: Finite-State Machines, Push-Down Machines, and Turing Machines. These - simulations feature multiple named machines on the same stack, accessible - via a customized menu or buttons on the screen. Because of the scripts hidden - behind the visible screen, with just a click of a butto students can alter - starting states, the set of input symbols, the number of states, the finality - of states, or the action based on a given state/input combination. These simulations - have been successfully used in conjunction with a course on the Theory of - Computing at Union College since 1989. Students have responded enthusiastically - to this concrete method of teaching abstract concepts.", "venue": "SGCS", - "year": 1992, "referenceCount": 11, "citationCount": 21, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1992-06-01", "journal": {"name": "ACM SIGCSE Bull.", "pages": - "55-58", "volume": "24"}, "authors": [{"authorId": "2242833", "name": "D. - Hannay"}]}, {"paperId": "2684da28557281619903d8771d3c1ed308a481f7", "externalIds": - {"MAG": "1997004672", "DOI": "10.1094/PDIS.1997.81.11.1231", "CorpusId": 76666922, - "PubMed": "30861725"}, "url": "https://www.semanticscholar.org/paper/2684da28557281619903d8771d3c1ed308a481f7", - "title": "Resistance of Transgenic Prunus domestica to Plum Pox Virus Infection.", - "abstract": "Transgenic plum trees (Prunus domestica) containing the plum - pox potyvirus coat protein (PPV-CP) gene were inoculated with PPV by aphid - feeding or chip budding. Infection was monitored by evaluation of virus symptoms, - DAS-ELISA, and immunoblot assays. Based on observations and analyses over - 3 years including two dormancy cycles, one out of five transgenic clones (C-5), - was found to be resistant to infection whether inoculated by aphids or by - chip budding. PPV could not be detected in any inoculated plants of the C-5 - clone by immunoblot or immunocap-ture-reverse transcriptase-polymerase chain - reaction assays. To our knowledge, this is the first P. domestica clone resistant - to PPV infection produced by genetic engineering.", "venue": "Plant Disease", - "year": 1997, "referenceCount": 29, "citationCount": 103, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": - "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1997-11-01", "journal": {"name": "Plant - disease", "pages": "\n 1231-1235\n ", "volume": "81 11"}, - "authors": [{"authorId": "5899563", "name": "M. Ravelonandro"}, {"authorId": - "49587628", "name": "R. Scorza"}, {"authorId": "21801901", "name": "J. Bachelier"}, - {"authorId": "4716661", "name": "G. Labonne"}, {"authorId": "145664829", "name": - "L. Levy"}, {"authorId": "5432148", "name": "V. Damsteegt"}, {"authorId": - "40135742", "name": "A. Callahan"}, {"authorId": "6675334", "name": "J. Dunez"}]}, - {"paperId": "19a75ff60aeaa0a647efea19ce7720b09f760811", "externalIds": {"DBLP": - "conf/sigcse/RodgerBLPPST97", "MAG": "2092208185", "DOI": "10.1145/268084.268089", - "CorpusId": 2010097}, "url": "https://www.semanticscholar.org/paper/19a75ff60aeaa0a647efea19ce7720b09f760811", - "title": "A collection of tools for making automata theory and formal languages - come alive", "abstract": "We present a collection of new and enhanced tools - for experimenting with concepts in formal languages and automata theory. New - tools, written in Java, include JFLAP for creating and simulating finite automata, - pushdown automata and Turing machines; Pâté for parsing restricted - and unrestricted grammars and transforming context-free grammars to Chomsky - Normal Form; and PumpLemma for proving specific languages are not regular. - Enhancements to previous tools LLparse and LRparse, instructional tools for - parsing LL(1) and LR(1) grammars, include parsing LL(2) grammars, displaying - parse trees, and parsing any context-free grammar with conflict resolution.", - "venue": "Technical Symposium on Computer Science Education", "year": 1997, - "referenceCount": 22, "citationCount": 53, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1997-03-01", "journal": {"pages": "15-19"}, "authors": - [{"authorId": "2214161", "name": "S. Rodger"}, {"authorId": "48597810", "name": - "A. O. Bilska"}, {"authorId": "49511358", "name": "Kenneth H. Leider"}, {"authorId": - "1738196", "name": "C. Procopiuc"}, {"authorId": "2247971", "name": "O. Procopiuc"}, - {"authorId": "3171008", "name": "Jason R. Salemme"}, {"authorId": "2065807628", - "name": "Edwin Tsang"}]}, {"paperId": "42de93097991c172b201ff32b98dabea333b0a93", - "externalIds": {"MAG": "405637517", "DOI": "10.5860/choice.47-1466", "CorpusId": - 122482407}, "url": "https://www.semanticscholar.org/paper/42de93097991c172b201ff32b98dabea333b0a93", - "title": "Models of Computation: An Introduction to Computability Theory", - "abstract": "A Concise Introduction to Computation Models and Computability - Theory provides an introduction to the essential concepts in computability, - using several models of computation, from the standard Turing Machines and - Recursive Functions, to the modern computation models inspired by quantum - physics. An in-depth analysis of the basic concepts underlying each model - of computation is provided. Divided into two parts, the first highlights the - traditional computation models used in the first studies on computability: - - Automata and Turing Machines; - Recursive functions and the Lambda-Calculus; - - Logic-based computation models. and the second part covers object-oriented - and interaction-based models. There is also a chapter on concurrency, and - a final chapter on emergent computation models inspired by quantum mechanics. - At the end of each chapter there is a discussion on the use of computation - models in the design of programming languages.", "venue": "", "year": 2009, - "referenceCount": 0, "citationCount": 27, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2009-04-14", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "72683008", "name": "M. Fernndez"}]}, - {"paperId": "52b41189b8ee15c39a345548e1a57d04a9e6e547", "externalIds": {"MAG": - "2004575963", "DOI": "10.1007/s11571-009-9099-8", "CorpusId": 10507249, "PubMed": - "19898957"}, "url": "https://www.semanticscholar.org/paper/52b41189b8ee15c39a345548e1a57d04a9e6e547", + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1992-12-12", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "145218181", "name": "G. Button"}]}, {"paperId": "fa786b7870e60127067a600ce3dbaab054e73781", + "externalIds": {"MAG": "1964261292", "DOI": "10.1093/bjps/41.1.143", "CorpusId": + 119924252}, "corpusId": 119924252, "publicationVenue": {"id": "ccf23a34-337a-4763-916a-9c16c580e0e1", + "name": "British Journal for the Philosophy of Science", "type": "journal", + "alternate_names": ["Br J Philos Sci", "The British Journal for the Philosophy + of Science"], "issn": "0007-0882", "url": "https://www.journals.uchicago.edu/toc/bjps/current", + "alternate_urls": ["https://www.jstor.org/journal/britjphilscie", "http://bjps.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/fa786b7870e60127067a600ce3dbaab054e73781", + "title": "The Turing\u2014Good Weight of Evidence Function and Popper''s Measure + of the Severity of a Test*", "abstract": "During the Second World War, Turing + worked with a team of British cryptanalysts at Bletchley on deciphering the + German Enigma Code. As part of the successful attempt at decipherment, Turing + developed what he called the ''score'' or ''decibannage''. After the war, + this function was renamed ''weight of evidence'' by Good, who has studied + its properties in a long series of books and papers, some of which are mentioned + in the list of references. Although Turing was probably working within the + subjective Bayesian tradition of Ramsey, it will be argued in what follows + that the Turing-Good weight of evidence function is not in fact Bayesian in + character, but is closely related to Popper''s measure of the severity of + a test. This gives, so it is claimed, a better interpretation of the Turing-Good + function, and an explanation of its practical success. I will next briefly + trace the steps which led to the introduction of the Turing-Good Weight of + Evidence function. The novelty in Turing''s approach is that he did not deal + directly with probabilities P(h, e) or P(h), but with odds Od(h, e) or Od(h), + where Od(h) is the odds in favour of h. Od and P are related by the equation:", + "venue": "British Journal for the Philosophy of Science", "year": 1990, "referenceCount": + 9, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1990-03-01", "journal": {"name": "The British Journal for the Philosophy + of Science", "pages": "143 - 146", "volume": "41"}, "authors": [{"authorId": + "144903192", "name": "D. Gillies"}]}, {"paperId": "996c2b634ddb3487909295a2d49e36ac95617edf", + "externalIds": {"MAG": "2077272300", "DBLP": "journals/ijfcs/Ogihara94", "DOI": + "10.1142/S0129054194000177", "CorpusId": 10419617}, "corpusId": 10419617, + "publicationVenue": {"id": "0f60ff8e-f0b7-47a2-9927-2b94f9e44e82", "name": + "International Journal of Foundations of Computer Science", "type": "journal", + "alternate_names": ["Int J Found Comput Sci"], "issn": "0129-0541", "url": + "http://www.cs.ucsb.edu/~ijfcs/"}, "url": "https://www.semanticscholar.org/paper/996c2b634ddb3487909295a2d49e36ac95617edf", + "title": "On Serializable Languages", "abstract": "Cai and Furst introduced + the notion of bottleneck Turing machines. Based on Barrington\u2019s innovating + technique, which is used to showed that polynomial-size branching programs + have exactly the same power as NC1, Cai and Furst showed that the languages + recognized by width-5 bottleneck Turing machines are exactly the same as those + in PSPACE. In this paper, computational power of bottleneck Turing machines + with widths fewer than 5 is investigated. It is shown that width-2 bottleneck + Turing machines capture \u2295P//OptP, the class of sets recognized by \u2295P-machines + with pre-computation in OptP. For languages recognized by bottleneck Turing + machines with width-3 and width-4, some lower-bounds and upper-bounds are + shown.", "venue": "International Journal of Foundations of Computer Science", + "year": 1994, "referenceCount": 18, "citationCount": 12, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1994-12-01", "journal": + {"name": "Int. J. Found. Comput. Sci.", "pages": "303-318", "volume": "5"}, + "authors": [{"authorId": "144669577", "name": "M. Ogihara"}]}, {"paperId": + "52b41189b8ee15c39a345548e1a57d04a9e6e547", "externalIds": {"MAG": "2004575963", + "DOI": "10.1007/s11571-009-9099-8", "CorpusId": 10507249, "PubMed": "19898957"}, + "corpusId": 10507249, "publicationVenue": {"id": "fc09dc4b-a753-404e-8b20-85d3d2c5201b", + "name": "Cognitive Neurodynamics", "type": "journal", "alternate_names": ["Cogn + Neurodynamics"], "issn": "1871-4080", "url": "https://www.springer.com/biomed/journal/11571", + "alternate_urls": ["https://link.springer.com/article/10.1007/s11571-015-9362-0", + "https://link.springer.com/journal/11571"]}, "url": "https://www.semanticscholar.org/paper/52b41189b8ee15c39a345548e1a57d04a9e6e547", "title": "A dynamical systems perspective on the relationship between symbolic and non-symbolic computation", "abstract": null, "venue": "Cognitive Neurodynamics", "year": 2009, "referenceCount": 71, "citationCount": 23, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc2777199?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-11-07", "journal": + {"name": "Cognitive Neurodynamics", "pages": "415-427", "volume": "3"}, "authors": + [{"authorId": "143719843", "name": "W. Tabor"}]}, {"paperId": "c301a1aa05c8e0ab41626cfba98035ef1c1b2a35", + "externalIds": {"DBLP": "conf/hotcloud/MurrayH10", "MAG": "68178695", "CorpusId": + 9117931}, "corpusId": 9117931, "publicationVenue": {"id": "42ad1c65-dc2f-448c-bbbf-483b016441b3", + "name": "USENIX Workshop on Hot Topics in Cloud Computing", "type": "conference", + "alternate_names": ["USENIX conference on Hot Topics in Cloud Ccomputing", + "USENIX Workshop Hot Top Cloud Comput", "HotCloud", "USENIX conf Hot Top Cloud + Ccomputing"]}, "url": "https://www.semanticscholar.org/paper/c301a1aa05c8e0ab41626cfba98035ef1c1b2a35", + "title": "Scripting the Cloud with Skywriting", "abstract": "Recent distributed + computing frameworks--such as MapReduce, Hadoop and Dryad--have made it simple + to exploit multiple machines in a compute cloud. However, these frameworks + use coordination languages that are insufficiently expressive for many classes + of computation, including iterative and recursive algorithms. To address this + problem, and generalise previous approaches, we introduce Skywriting: a Turing-powerful, + purely-functional script language for describing distributed computations. + In this paper, we introduce the main features of Skywriting, and outline our + novel cooperative task farming execution engine.", "venue": "USENIX Workshop + on Hot Topics in Cloud Computing", "year": 2010, "referenceCount": 24, "citationCount": + 39, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2009-11-07", "journal": {"name": "Cognitive Neurodynamics", "pages": "415-427", - "volume": "3"}, "authors": [{"authorId": "143719843", "name": "W. Tabor"}]}, - {"paperId": "229d3e0bc4d59021be08f46b2f88042127dc26f9", "externalIds": {"MAG": - "1547046203", "DBLP": "journals/corr/abs-math-0505617", "ArXiv": "math/0505617", - "DOI": "10.1007/S11512-007-0045-X", "CorpusId": 14545404}, "url": "https://www.semanticscholar.org/paper/229d3e0bc4d59021be08f46b2f88042127dc26f9", - "title": "On the computational complexity of the Riemann mapping", "abstract": - null, "venue": "ArXiv", "year": 2005, "referenceCount": 69, "citationCount": - 31, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-05-27", "journal": {"name": "Arkiv f\u00f6r Matematik", - "pages": "221-239", "volume": "45"}, "authors": [{"authorId": "144085549", - "name": "I. Binder"}, {"authorId": "143803467", "name": "M. Braverman"}, {"authorId": - "2122647", "name": "M. Yampolsky"}]}, {"paperId": "ef069580ae3c9e76cccd20fc7ecdd05ad74bf6e5", - "externalIds": {"MAG": "2055774056", "DOI": "10.1007/BF02649916", "CorpusId": - 98116298}, "url": "https://www.semanticscholar.org/paper/ef069580ae3c9e76cccd20fc7ecdd05ad74bf6e5", - "title": "A Thermodynamic Analysis of the Al-C-Fe System", "abstract": null, - "venue": "", "year": 1991, "referenceCount": 15, "citationCount": 54, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1991-06-01", - "journal": {"name": "Journal of Phase Equilibria", "pages": "275-286", "volume": - "12"}, "authors": [{"authorId": "35813535", "name": "K. C. Kumar"}, {"authorId": - "145686150", "name": "V. Raghavan"}]}, {"paperId": "66dd3f94373726bbbd4b275b14857e5a7f1ec88d", - "externalIds": {"MAG": "1981962996", "DOI": "10.1090/S0273-0979-1990-15923-3", - "CorpusId": 7093646}, "url": "https://www.semanticscholar.org/paper/66dd3f94373726bbbd4b275b14857e5a7f1ec88d", - "title": "The jump is definable in the structure of the degrees of unsolvability", - "abstract": "Recursion theory deals with computability on the natural numbers. - A function \u0192 from N to N is computable (or recursive) if it can be calculated - by some program on a Turing machine, or equivalently on any other general - purpose computer. A major topic of interest, introduced in Post [23], is the - notion of relative difficulty of computation. A function \u0192 is computable - relative to a function g if after equipping the machine with a black box subroutine - that provides the values of g, there is a program (which now may call g via - the subroutine) which computes \u0192 . In this case we write \u0192 3.0.CO;2-A", "CorpusId": - 3680560}, "url": "https://www.semanticscholar.org/paper/fbe4b73bb9be4362359c8db1579b26373dbfc75e", - "title": "Development of Nickel-on-Charcoal as a ''''Dirt-Cheap'''' Heterogeneous - Catalyst: A Personal Account", "abstract": "A personal account tracing the - origins and continuing evolution of nickel-on-charcoal (Ni/C) as a practical, - alternative, group 10 metal catalyst is presented. Discussed are applications - to several ''''name reactions'''' which lead to both car- bon-carbon and carbon-nitrogen - bond construc- tions utilizing inexpensive aryl chlorides as sub- strates. - Reductions of chloroarenes are also catalyzed by Ni/C, a process which may - be worthy of consideration in terms of environmental clean- up of PCBs and - dioxins. Collaborative efforts are also mentioned aimed at probing the surface - struc- ture of Ni/C, with the goal of enhancing catalyst ac- tivity. Future - directions for development of hetero- geneous nickel catalysts are proposed.", - "venue": "", "year": 2001, "referenceCount": 8, "citationCount": 53, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-04-30", - "journal": {"name": "Advanced Synthesis & Catalysis", "pages": "313-326", - "volume": "343"}, "authors": [{"authorId": "3605795", "name": "B. Lipshutz"}]}, - {"paperId": "cd0cb39a988daec9bf424a088e812c14c137d19f", "externalIds": {"MAG": - "2111961041", "DBLP": "journals/corr/abs-0904-3612", "ArXiv": "0904.3612", - "DOI": "10.1007/978-3-642-04617-9_45", "CorpusId": 816374}, "url": "https://www.semanticscholar.org/paper/cd0cb39a988daec9bf424a088e812c14c137d19f", - "title": "Variations of the Turing Test in the Age of Internet and Virtual - Reality", "abstract": null, "venue": "KI", "year": 2009, "referenceCount": - 16, "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2009-04-23", "journal": {"pages": "355-362"}, "authors": [{"authorId": "39315964", - "name": "Florentin Neumann"}, {"authorId": "31588361", "name": "Andrea Reichenberger"}, - {"authorId": "144983931", "name": "M. Ziegler"}]}, {"paperId": "a911b624a4009d59a0904d2665f80870addc7410", - "externalIds": {"MAG": "2031657010", "DOI": "10.1007/S001990050281", "CorpusId": - 121248813}, "url": "https://www.semanticscholar.org/paper/a911b624a4009d59a0904d2665f80870addc7410", - "title": "Non-computability of competitive equilibrium", "abstract": null, - "venue": "", "year": 1999, "referenceCount": 38, "citationCount": 54, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-09-25", - "journal": {"name": "Economic Theory", "pages": "1-27", "volume": "14"}, "authors": - [{"authorId": "18167008", "name": "M. Richter"}, {"authorId": "36406659", - "name": "Kam-Chau Wong"}]}, {"paperId": "2978c2b2e18486eb8ce44527c16efe841e30d2b7", - "externalIds": {"CorpusId": 7922557}, "url": "https://www.semanticscholar.org/paper/2978c2b2e18486eb8ce44527c16efe841e30d2b7", - "title": "Compression, Signiicance and Accuracy", "abstract": "Stephen Muggleton - The Turing Institute, 36 North Hanover Street, Glasgow G1 2AD, UK Ashwin Srinivasan - The Turing Institute, 36 North Hanover Street, Glasgow G1 2AD, UK Michael - Bain The Turing Institute, 36 North Hanover Street, Glasgow G1 2AD, UK Abstract - Inductive Logic Programming (ILP) involves learning relational concepts from - examples and background knowledge. To date all ILP learning systems make use - of tests inherited from propositional and decision tree learning for evaluating - the signi cance of hypotheses. None of these signi cance tests take account - of the relevance or utility of the background knowledge. In this paper we - describe a method, called HP-compression, of evaluating the signi cance of - a hypothesis based on the degree to which it allows compression of the observed - data with respect to the background knowledge. This can be measured by comparing - the lengths of the input and output tapes of a reference Turing machine which - will generate the examples from the hypothesis and a set of derivational proofs. - The model extends an earlier approach of Muggleton by allowing for noise. - The truth values of noisy instances are switched by making use of correction - codes. The utility of compression as a signi cance measure is evaluated empirically - in three independent domains. In particular, the results show that the existence - of positive compression distinguishes a larger number of signi cant clauses - than other signi cance tests The method is also shown to reliably distinguish - arti cially introduced noise as incompressible data.", "venue": "", "year": - 1992, "referenceCount": 39, "citationCount": 18, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2103554468", - "name": "Stephen MuggletonThe"}]}, {"paperId": "6b3c0c6842f054c80903ebcd49bf111f67d5a53a", - "externalIds": {"MAG": "1973752057", "DOI": "10.1117/12.954984", "CorpusId": - 60679440}, "url": "https://www.semanticscholar.org/paper/6b3c0c6842f054c80903ebcd49bf111f67d5a53a", - "title": "Applications Of Computer Vision", "abstract": "Computers play a - role in everyone''s life in one way or another. Ever since Turing postulated - his, by now well known, \"Turing test,\" there has been an enormous increase - in the use of machines to do more than mere computation. Within the last five - years or so there has been spurt in the use of machines to perform assembly - line tasks. In particular welding, painting, assembly inspection, manufacturing - etc. To quite an extent these various attempts are a blindfold approach to - manufacturing. In other words they do not use Computer Vision. This paper - is an attempt at explaining some of the results, the problems and shortcomings - of using Computer Vision in the real world.", "venue": "Optics & Photonics", - "year": 1976, "referenceCount": 0, "citationCount": 26, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Engineering", "Computer Science"], + "publicationDate": "2012-12-19", "journal": {"name": "ArXiv", "volume": "abs/1212.4799"}, + "authors": [{"authorId": "3337217", "name": "Cameron E. Freer"}, {"authorId": + "39331522", "name": "Daniel M. Roy"}, {"authorId": "1763295", "name": "J. + Tenenbaum"}]}, {"paperId": "6e64535e7c077ca4f4c0f1422845e89aa36fa4a0", "externalIds": + {"MAG": "2040457474", "DOI": "10.3934/DCDS.2012.32.3975", "CorpusId": 815724}, + "corpusId": 815724, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e64535e7c077ca4f4c0f1422845e89aa36fa4a0", + "title": "Characterization of turing diffusion-driven instability on evolving + domains", "abstract": "In this paper we establish a general theoretical framework + for Turing diffusion-driven instability for reaction-diffusion systems on + time-dependent evolving domains. The main result is that Turing diffusion-driven + instability for reaction-diffusion systems on evolving domains is characterised + by Lyapunov exponents of the evolution family associated with the linearised + system (obtained by linearising the original system along a spatially independent + solution). This framework allows for the inclusion of the analysis of the + long-time behavior of the solutions of reaction-diffusion systems. Applications + to two special types of evolving domains are considered: (i) time-dependent + domains which evolve to a final limiting fixed domain and (ii) time-dependent + domains which are eventually time periodic. Reaction-diffusion systems have + been widely proposed as plausible mechanisms for pattern formation in morphogenesis.", + "venue": "", "year": 2012, "referenceCount": 53, "citationCount": 22, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2012-06-01", "journal": {"name": "Discrete and Continuous Dynamical Systems", + "pages": "3975-4000", "volume": "32"}, "authors": [{"authorId": "1830751", + "name": "G. Hetzer"}, {"authorId": "2731718", "name": "A. Madzvamuse"}, {"authorId": + "40475265", "name": "W. Shen"}]}, {"paperId": "e90c1c61951813a4000781e94d8a7e219dcf1d0f", + "externalIds": {"MAG": "2116462994", "DOI": "10.1111/j.1525-1470.1992.tb00342.x", + "CorpusId": 10078374, "PubMed": "1488375"}, "corpusId": 10078374, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e90c1c61951813a4000781e94d8a7e219dcf1d0f", + "title": "Clinical, Histologic, and Ultrastructural Findings in Two Cases + of Infantile Systemic Hyalinosis", "abstract": "Abstract: Two unrelated infants + had stiff skin and painful joint eontrac\u2010tures in the first few months + of life. Other features included gingival hy\u2010perpiasia, small papules + on the face and trunk, perianal nodules, and bloody diarrhea. Hyatine material + was evident in the papillary dermis and gut mucosa in both patients. Ultrastructural + examination revealed a dis\u2010tinctive fibrillogranuIar appearance. These + infants have the same clinical, histologic, and ultrastructural features as + four infants we reported previ\u2010ously with Infantile systemic hyalinosis. + One of the patients described here demonstrated some features that overlap + with those of juvenile hy\u2010aline fibromatosis.", "venue": "Pediatric dermatology", + "year": 1992, "referenceCount": 17, "citationCount": 58, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "CaseReport"], "publicationDate": "1992-09-01", "journal": {"name": "Pediatric + Dermatology", "volume": "9"}, "authors": [{"authorId": "1911002", "name": + "M. Glover"}, {"authorId": "145252807", "name": "B. Lake"}, {"authorId": "2063735596", + "name": "D. Atherton"}]}, {"paperId": "ef1267970b46aa3e842092eb3e23101e59a5a7a1", + "externalIds": {"MAG": "2030126379", "DOI": "10.1353/CRT.2010.0022", "CorpusId": + 144907585}, "corpusId": 144907585, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ef1267970b46aa3e842092eb3e23101e59a5a7a1", + "title": "Truth and Consequences: On Paranoid Reading and Reparative Reading", + "abstract": "problem could be overdetermination: there are so many things + I might mean. Insofar as Sedgwick helped to launch queer literary studies, + she played a significant role in allowing me to have a job that I could tolerate + in academia, or even in a profession at all; along with a handful of others, + she helped to make it possible for me to live a queer life that I could never + have imagined. In addition to this most direct sense in which I have been + enabled, there is also the fact that Sedgwick in her work explicitly sought + to clear intellectual and affective space for others\u2014to grant permission. + She really knew how to reach out and touch someone. Reading her work tends + to open unexpected conceptual possibilities, ways of thinking, ges tures, + and tones. I think this sense of opening or enlargement is what Ju dith Butler + has in mind when she observes that an encounter with", "venue": "", "year": + 2010, "referenceCount": 7, "citationCount": 98, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], + "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Criticism", "pages": "235-241", "volume": "52"}, + "authors": [{"authorId": "117550497", "name": "Heather K. Love"}]}, {"paperId": + "b2b1ad3e43f570f1f97f4cf5240adff95b188621", "externalIds": {"MAG": "2142604867", + "ArXiv": "1212.6745", "DBLP": "journals/peerj-cs/ZenilSDG15", "DOI": "10.7717/PEERJ-CS.23", + "CorpusId": 6422324}, "corpusId": 6422324, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b2b1ad3e43f570f1f97f4cf5240adff95b188621", + "title": "Two-dimensional Kolmogorov complexity and an empirical validation + of the Coding theorem method by compressibility", "abstract": "We propose + a measure based upon the fundamental theoretical concept in algorithmic information + theory that provides a natural approach to the problem of evaluating n-dimensional + complexity by using an n-dimensional deterministic Turing machine. The technique + is interesting because it provides a natural algorithmic process for symmetry + breaking generating complex n-dimensional structures from perfectly symmetric + and fully deterministic computational rules producing a distribution of patterns + as described by algorithmic probability. Algorithmic probability also elegantly + connects the frequency of occurrence of a pattern with its algorithmic complexity, + hence eff ectively providing estimations to the complexity of the generated + patterns. Experiments to validate estimations of algorithmic complexity based + on these concepts are presented, showing that the measure is stable in the + face of some changes in computational formalism and that results are in agreement + with the results obtained using lossless compression algorithms when both + methods overlap in their range of applicability. We then use the output frequency + of the set of 2-dimensional Turing machines to classify the algorithmic complexity + of the space-time evolutions of Elementary Cellular Automata.", "venue": "PeerJ + Comput. Sci.", "year": 2012, "referenceCount": 83, "citationCount": 45, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-12-30", "journal": {"name": "PeerJ + Comput. Sci.", "pages": "e23", "volume": "1"}, "authors": [{"authorId": "66445647", + "name": "H. Zenil"}, {"authorId": "1389866422", "name": "F. Soler-Toscano"}, + {"authorId": "2027817702", "name": "J. Delahaye"}, {"authorId": "3159526", + "name": "N. Gauvrit"}]}, {"paperId": "b16d6ffbe496fabc59e414ce8bd795c1b5ba41a6", + "externalIds": {"MAG": "2004383369", "ArXiv": "0903.4254", "DBLP": "journals/amc/AlyKS11", + "DOI": "10.1016/j.amc.2011.02.018", "CorpusId": 14273709}, "corpusId": 14273709, + "publicationVenue": {"id": "e593a63a-bfb7-45ac-aa27-5c320ac7a952", "name": + "Applied Mathematics and Computation", "type": "journal", "alternate_names": + ["Appl Math Comput"], "issn": "0096-3003", "url": "http://www.sciencedirect.com/science/journal/00963003", + "alternate_urls": ["https://www.sciencedirect.com/journal/applied-mathematics-and-computation"]}, + "url": "https://www.semanticscholar.org/paper/b16d6ffbe496fabc59e414ce8bd795c1b5ba41a6", + "title": "Turing instability for a ratio-dependent predator-prey model with + diffusion", "abstract": null, "venue": "Applied Mathematics and Computation", + "year": 2009, "referenceCount": 26, "citationCount": 57, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/0903.4254", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Biology", "Computer + Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Biology", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2009-03-25", "journal": + {"name": "Appl. Math. Comput.", "pages": "7265-7281", "volume": "217"}, "authors": + [{"authorId": "34858134", "name": "Shaban Aly"}, {"authorId": "2751086", "name": + "I. Kim"}, {"authorId": "143653345", "name": "D. Sheen"}]}, {"paperId": "7e46147161b782b2f6d4e1a7ef32aa066c70c3fe", + "externalIds": {"MAG": "2165958853", "DOI": "10.1109/RISP.1991.130804", "CorpusId": + 195839692}, "corpusId": 195839692, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e46147161b782b2f6d4e1a7ef32aa066c70c3fe", + "title": "The Turing Test and non-information flow", "abstract": "Shows how + the Turing Test provides a very simple yet very general characterization of + non-information flow in multilevel information systems. Despite its conceptual + simplicity, the Turing Test provides the study of information flow with an + extremely useful notion which seems to be a significant departure from other + current information flow theories. Turing''s powerful idea is that information + entropy is represented as uncertainty about the mathematical definition of + a system, rather than as some function of the direct behavior of the system.<>", + "venue": "Proceedings. 1991 IEEE Computer Society Symposium on Research in + Security and Privacy", "year": 1991, "referenceCount": 13, "citationCount": + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1991-05-20", + "journal": {"name": "Proceedings. 1991 IEEE Computer Society Symposium on + Research in Security and Privacy", "pages": "373-385"}, "authors": [{"authorId": + "41222168", "name": "R. Browne"}]}, {"paperId": "25982e1d4f70ad8461a91f4127d8c9be02f290f8", + "externalIds": {"MAG": "2116405387", "DOI": "10.1139/L04-116", "CorpusId": + 110963831}, "corpusId": 110963831, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/25982e1d4f70ad8461a91f4127d8c9be02f290f8", + "title": "Toward sustainable neighbourhoods: the need to consider infrastructure + interactions 1", "abstract": "This paper details the role of infrastructure + in promoting sustainability at the neighbourhood scale. A sus- tainable neighbourhood + design process is outlined and the importance of adopting a systems perspective + and consider- ing infrastructure interconnections is emphasized. The performance + of local infrastructure systems (e.g., buildings and local transportation + network) is influenced by interactions with the greater urban region and with + other local infrastruc- ture. Through a broad review of the literature on + transportation, water, building, and urban forestry systems, this paper identifies + many of these extra- and inter-neighbourhood interactions. The paper concludes + that it is difficult to achieve neighbourhood sustainability objectives without + infrastructure systems at the urban scale that support these micro-scale goals. + Furthermore, interactions between local infrastructure systems can have a + positive or negative impact on infra- structure performance and environmental + impacts. Careful consideration of these relationships during neighbourhood + design could yield significant improvements in infrastructure resource efficiency + as well as reductions in pollutant emissions and overall costs.", "venue": + "", "year": 2005, "referenceCount": 53, "citationCount": 96, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Business", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1976-12-13", - "journal": {"volume": "0087"}, "authors": [{"authorId": "39225958", "name": - "S. Ganapathy"}]}, {"paperId": "781e1f781987202c961855f207dab8e640a29434", - "externalIds": {"CorpusId": 15218617}, "url": "https://www.semanticscholar.org/paper/781e1f781987202c961855f207dab8e640a29434", + "Business", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2005-02-01", "journal": {"name": "Canadian Journal of Civil Engineering", + "pages": "45-57", "volume": "32"}, "authors": [{"authorId": "1429026965", + "name": "J. Engel-Yan"}, {"authorId": "153748374", "name": "C. Kennedy"}, + {"authorId": "46341185", "name": "Susana Saiz"}, {"authorId": "12271798", + "name": "K. Pressnail"}]}, {"paperId": "3ebb09f6f176d9eb201c0961a7531172acb96dcd", + "externalIds": {"MAG": "2059368609", "DOI": "10.1037/0033-3204.42.2.139", + "CorpusId": 16967277}, "corpusId": 16967277, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3ebb09f6f176d9eb201c0961a7531172acb96dcd", + "title": "Preserving our humanity as therapists", "abstract": "Psychotherapists + have traditionally em-braced core values and beliefs that dif-fer signi\ufb01cantly + from many values andbeliefs that pervade contemporary,commercially oriented + Western cul-tures. With their clients, therapists oftenquestion or challenge + the culture\u2019s ma-terialism, consumerism, appeals to van-ity and greed, + disdain of dependencyand vulnerability, and abetment of nar-cissistic entitlement. + Currently, how-ever, psychotherapy is being reshapedby descriptive psychiatric + diagnosis,pressures from powerful corporate in-terests, and antagonism from + in\ufb02uentialacademic psychologists and is threat-ened with becoming the + servant of thesurrounding culture rather than itsparticipant/observer and + critic. Theauthor notes symptoms of this trendand offers ideas about reversing + it.", "venue": "", "year": 2005, "referenceCount": 99, "citationCount": 55, + "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Psychotherapy", + "pages": "139-151", "volume": "42"}, "authors": [{"authorId": "39776378", + "name": "N. McWilliams"}]}, {"paperId": "98fd05ec51e2178b3515ee212466b7047ddccf15", + "externalIds": {"MAG": "81189784", "CorpusId": 116428394}, "corpusId": 116428394, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/98fd05ec51e2178b3515ee212466b7047ddccf15", + "title": "Counting classes with finite acceptance types", "abstract": "Perfectionnement + de la hierarchie de Hausdorff generee par NP. Les nouvelles classes permettent + une exacte classification de la complexite de certains problemes de denombrement. + Les classes sont caracterisees en termes de machines de Turing polynomiales + non deterministes", "venue": "", "year": 1987, "referenceCount": 0, "citationCount": + 23, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}], "publicationTypes": null, "publicationDate": "1987-08-01", + "journal": {"name": "Computing and Informatics \\/ Computers and Artificial + Intelligence", "pages": "395-409", "volume": "6"}, "authors": [{"authorId": + "3176131", "name": "T. Gundermann"}, {"authorId": "1789007", "name": "G. Wechsung"}]}, + {"paperId": "e95b97b143378e91acaf5b6e9110dbd5b1c4ed22", "externalIds": {"MAG": + "2461209907", "DBLP": "conf/eva/Bowen16", "DOI": "10.14236/EWIC/EVA2016.40", + "CorpusId": 38609997}, "corpusId": 38609997, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e95b97b143378e91acaf5b6e9110dbd5b1c4ed22", + "title": "Alan Turing: Virtuosity and visualisation", "abstract": "Alan Turing + (1912--1954) has been increasingly recognised as an important mathematician + who, despite his short life, developed mathematical ideas that today have + led to foundational aspects of computer science, especially with respect to + computability, artificial intelligence and morphogenesis (the growth of biological + patterns, important in mathematical biology). Some of Turing''s mathematics + and related ideas can be visualised in interesting and even artistic ways, + aided using software. In addition, a significant corpus of the historical + documentation on Turing can now be accessed online as a number of major archives + have digitised material related to Turing. This paper introduces some of the + major scientific work of Turing and ways in which it can be visualised, often + artistically. Turing''s fame has, especially since his centenary in 2012, + reached a level where he has had a cultural influence on the arts in general. + Although the story of Turing can be seen as one of tragedy, with his life + cut short, from a historical viewpoint Turing''s contribution to humankind + has been triumphant.", "venue": "EVA", "year": 2016, "referenceCount": 38, + "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-07-12", "journal": {"name": "", "pages": "197-204", "volume": ""}, "authors": + [{"authorId": "1772040", "name": "Jonathan P. Bowen"}]}, {"paperId": "b2220a27691326e5272feb3ec90c00be0b483ed1", + "externalIds": {"MAG": "2951439280", "ArXiv": "1204.3763", "DBLP": "journals/computability/Pauly15", + "DOI": "10.3233/COM-150049", "CorpusId": 26406918}, "corpusId": 26406918, + "publicationVenue": {"id": "38e26272-f1d7-470a-a99f-0b5884c9df6e", "name": + "De Computis", "alternate_names": ["Comput"], "issn": "1886-1881", "url": + "https://dialnet.unirioja.es/servlet/revista?clave_revista=6205&tipo_busqueda=CODIGO", + "alternate_urls": ["http://decomputis.org/ojs/", "https://ideas.repec.org/s/dec/articl.html", + "http://www.decomputis.org/"]}, "url": "https://www.semanticscholar.org/paper/b2220a27691326e5272feb3ec90c00be0b483ed1", + "title": "On the topological aspects of the theory of represented spaces", + "abstract": "Represented spaces form the general setting for the study of + computability derived from Turing machines. As such, they are the basic entities + for endeavors such as computable analysis or computable measure theory. The + theory of represented spaces is well-known to exhibit a strong topological + flavour. We present an abstract and very succinct introduction to the field; + drawing heavily on prior work by Escardo, Schroder, and others. Central aspects + of the theory are function spaces and various spaces of subsets derived from + other represented spaces, and - closely linked to these - properties of represented + spaces such as compactness, overtness and separation principles. Both the + derived spaces and the properties are introduced by demanding the computability + of certain mappings, and it is demonstrated that typically various interesting + mappings induce the same property.", "venue": "De Computis", "year": 2012, + "referenceCount": 82, "citationCount": 95, "influentialCitationCount": 5, + "isOpenAccess": true, "openAccessPdf": {"url": "https://cronfa.swan.ac.uk/Record/cronfa36015/Download/0036015-12122017161927.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-04-17", "journal": {"name": "Comput.", "pages": "159-180", "volume": + "5"}, "authors": [{"authorId": "1727094", "name": "A. Pauly"}]}, {"paperId": + "625396dbe8e838e125d9ada3cadde95d4a8466c2", "externalIds": {"DBLP": "conf/focs/Smith68", + "MAG": "1972983982", "DOI": "10.1109/SWAT.1968.25", "CorpusId": 27320704}, + "corpusId": 27320704, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/625396dbe8e838e125d9ada3cadde95d4a8466c2", + "title": "Simple Computation-Universal Cellular Spaces and Self-Reproduction", + "abstract": "Cellular spaces computationally equivalent to any given Turing + machine are exhibited which are simple in the sense that each cell has only + a small number of states and a small neighborhood. Neighborhood reduction + theorems are derived in this interest, and several simple computationuniversal + cellular spaces are presented. Conditions for computation-universality of + a cellular space are investigated, and, in particular, the conjecture that + unbounded but boundable propagation in a space is a sufficient condition is + refuted. Finally, the computation-universal spaces derived in the study are + used to introduce, via recursive function theory, examples of simple self-reproducing + universal Turing machine configurations in one and two dimensions.", "venue": + "SWAT", "year": 1968, "referenceCount": 2, "citationCount": 20, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Conference"], "publicationDate": "1968-10-15", "journal": + {"pages": "269-277"}, "authors": [{"authorId": "2116707114", "name": "Alvy + Ray Smith"}]}, {"paperId": "0a3c7485942469f5f8c4f58f57b92fbb7eae6c29", "externalIds": + {"MAG": "2134909295", "DBLP": "journals/tissec/OorschotS06", "DOI": "10.1145/1178618.1178619", + "CorpusId": 3183068}, "corpusId": 3183068, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0a3c7485942469f5f8c4f58f57b92fbb7eae6c29", + "title": "On countering online dictionary attacks with login histories and + humans-in-the-loop", "abstract": "Automated Turing Tests (ATTs), also known + as human-in-the-loop techniques, were recently employed in a login protocol + by Pinkas and Sander (2002) to protect against online password-guessing attacks. + We present modifications providing a new history-based login protocol with + ATTs, which uses failed-login counts. Analysis indicates that the new protocol + offers opportunities for improved security and user friendliness (fewer ATTs + to legitimate users) and greater flexibility (e.g., allowing protocol parameter + customization for particular situations and users). We also note that the + Pinkas--Sander and other protocols involving ATTs are susceptible to minor + variations of well-known middle-person attacks. We discuss complementary techniques + to address such attacks, and to augment the security of the original protocol.", + "venue": "TSEC", "year": 2006, "referenceCount": 49, "citationCount": 96, + "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": {"url": + "http://www.scs.carleton.ca/~paulv/papers/tissec-aug06.pdf", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2006-08-01", "journal": {"name": "ACM Trans. Inf. Syst. Secur.", "pages": + "235-258", "volume": "9"}, "authors": [{"authorId": "1748222", "name": "P. + V. Oorschot"}, {"authorId": "1742113", "name": "S. Stubblebine"}]}, {"paperId": + "ebcffad3d660c16d47e67e92d1688350dfb9d71d", "externalIds": {"DBLP": "conf/cie/Durand-Lose05", + "MAG": "1867364991", "DOI": "10.1007/11494645_14", "CorpusId": 4652364}, "corpusId": + 4652364, "publicationVenue": {"id": "ce5f5d49-2807-4aa0-9db3-64a03084444d", + "name": "Conference on Computability in Europe", "type": "conference", "alternate_names": + ["CiE", "CIE", "International Conference on Computers and Industrial Engineering", + "Conf Comput Eur", "Int Conf Comput Ind Eng"], "url": "http://www.illc.uva.nl/CiE/"}, + "url": "https://www.semanticscholar.org/paper/ebcffad3d660c16d47e67e92d1688350dfb9d71d", + "title": "Abstract Geometrical Computation: Turing-Computing Ability and Undecidability", + "abstract": null, "venue": "Conference on Computability in Europe", "year": + 2005, "referenceCount": 48, "citationCount": 22, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.univ-orleans.fr/lifo/Members/Jerome.Durand-Lose/Recherche/Publications/2005_CiE.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2005-06-08", "journal": {"pages": "106-116"}, "authors": [{"authorId": "1387881959", + "name": "J. Durand-Lose"}]}, {"paperId": "781e1f781987202c961855f207dab8e640a29434", + "externalIds": {"CorpusId": 15218617}, "corpusId": 15218617, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/781e1f781987202c961855f207dab8e640a29434", "title": "How Much Can You Get for How Little? (a Conceptual Introduction to Cellular Automata)", "abstract": "This is a introduction to cellular automata stressing their role as standard-bearers of an aggressive form of reductionism|which @@ -47061,14 +53271,81 @@ interactions: an explanation based on more complex mechanisms, until you are satissed that simpler mechanisms will not do!\") William of Ockham, early 1300s]", "venue": "", "year": 1994, "referenceCount": 25, "citationCount": 18, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": [{"authorId": "2102828673", + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2102828673", "name": "Turing Occam"}, {"authorId": "46776473", "name": "V. Neumann"}, {"authorId": "2086065222", "name": "Jaynes"}, {"authorId": "70673192", "name": "Tommaso - Toooli"}]}, {"paperId": "995bffb251e6c65ce2e51982490696e5de14d489", "externalIds": - {"MAG": "2114743139", "DOI": "10.1039/b814825b", "CorpusId": 40819476, "PubMed": - "19240935"}, "url": "https://www.semanticscholar.org/paper/995bffb251e6c65ce2e51982490696e5de14d489", + Toooli"}]}, {"paperId": "a911b624a4009d59a0904d2665f80870addc7410", "externalIds": + {"MAG": "2031657010", "DOI": "10.1007/S001990050281", "CorpusId": 121248813}, + "corpusId": 121248813, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a911b624a4009d59a0904d2665f80870addc7410", + "title": "Non-computability of competitive equilibrium", "abstract": null, + "venue": "", "year": 1999, "referenceCount": 38, "citationCount": 54, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1999-09-25", "journal": {"name": "Economic Theory", "pages": "1-27", "volume": + "14"}, "authors": [{"authorId": "18167008", "name": "M. Richter"}, {"authorId": + "36406659", "name": "Kam-Chau Wong"}]}, {"paperId": "2978c2b2e18486eb8ce44527c16efe841e30d2b7", + "externalIds": {"CorpusId": 7922557}, "corpusId": 7922557, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2978c2b2e18486eb8ce44527c16efe841e30d2b7", + "title": "Compression, Signiicance and Accuracy", "abstract": "Stephen Muggleton + The Turing Institute, 36 North Hanover Street, Glasgow G1 2AD, UK Ashwin Srinivasan + The Turing Institute, 36 North Hanover Street, Glasgow G1 2AD, UK Michael + Bain The Turing Institute, 36 North Hanover Street, Glasgow G1 2AD, UK Abstract + Inductive Logic Programming (ILP) involves learning relational concepts from + examples and background knowledge. To date all ILP learning systems make use + of tests inherited from propositional and decision tree learning for evaluating + the signi cance of hypotheses. None of these signi cance tests take account + of the relevance or utility of the background knowledge. In this paper we + describe a method, called HP-compression, of evaluating the signi cance of + a hypothesis based on the degree to which it allows compression of the observed + data with respect to the background knowledge. This can be measured by comparing + the lengths of the input and output tapes of a reference Turing machine which + will generate the examples from the hypothesis and a set of derivational proofs. + The model extends an earlier approach of Muggleton by allowing for noise. + The truth values of noisy instances are switched by making use of correction + codes. The utility of compression as a signi cance measure is evaluated empirically + in three independent domains. In particular, the results show that the existence + of positive compression distinguishes a larger number of signi cant clauses + than other signi cance tests The method is also shown to reliably distinguish + arti cially introduced noise as incompressible data.", "venue": "", "year": + 1992, "referenceCount": 39, "citationCount": 18, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "2103554468", + "name": "Stephen MuggletonThe"}]}, {"paperId": "fd46a9ed5fc239fdc1035f29838fbc011a285b90", + "externalIds": {"MAG": "588063899", "DOI": "10.1007/978-94-009-6851-6", "CorpusId": + 106869854}, "corpusId": 106869854, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd46a9ed5fc239fdc1035f29838fbc011a285b90", + "title": "Progress in nitrogen ceramics", "abstract": null, "venue": "", "year": + 1983, "referenceCount": 0, "citationCount": 269, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Education", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "92778079", + "name": "F. Riley"}]}, {"paperId": "59335196af284bc3ee41f35e4205ccff8871da28", + "externalIds": {"MAG": "1973757098", "DBLP": "journals/siamcomp/Igarashi77", + "DOI": "10.1137/0206032", "CorpusId": 207050988}, "corpusId": 207050988, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/59335196af284bc3ee41f35e4205ccff8871da28", + "title": "The Tape Complexity of Some Classes of Szilard Languages", "abstract": + "In this paper we discuss lower and upper bounds for the tape complexity of + Turing machines which recognize some classes of Szilard languages. The main + results are as follows: $\\log n$ is the optimal tape bound for on-line deterministic + Turing machines which recognize Szilard languages of context-free grammars, + and it is also the optimal tape bound for off-line deterministic Turing machines + which recognize leftmost Szilard languages of phrase structure grammars. The + Szilard language of an arbitrary phrase structure grammar is a deterministic + context-sensitive language.", "venue": "SIAM J. Comput.", "year": 1977, "referenceCount": + 0, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Linguistics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1977-09-01", "journal": {"name": "SIAM J. Comput.", "pages": "460-466", "volume": + "6"}, "authors": [{"authorId": "2993196", "name": "Y. Igarashi"}]}, {"paperId": + "995bffb251e6c65ce2e51982490696e5de14d489", "externalIds": {"MAG": "2114743139", + "DOI": "10.1039/b814825b", "CorpusId": 40819476, "PubMed": "19240935"}, "corpusId": + 40819476, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/995bffb251e6c65ce2e51982490696e5de14d489", "title": "Temperature control of pattern formation in the Ru(bpy)(3)(2+)-catalyzed BZ-AOT system.", "abstract": "Using temperature as a control parameter, we observe a transition from stationary Turing patterns at T = 15-20 degrees @@ -47082,51 +53359,19 @@ interactions: the BZ-AOT microemulsion, implying a change from isolated water nanodroplets to a system-spanning network of water channels.", "venue": "Physical chemistry chemical physics : PCCP", "year": 2009, "referenceCount": 45, "citationCount": - 17, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 17, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://hopf.chem.brandeis.edu/pubs/pub349 rep.pdf", "status": "GREEN"}, + "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2009-02-25", "journal": {"name": "Physical chemistry chemical physics : PCCP", "pages": "\n 1581-7\n ", "volume": "11 10"}, "authors": [{"authorId": "33130651", "name": "R. McIlwaine"}, {"authorId": "2258489", "name": "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, - {"paperId": "8ecbcec2351885579bdf9da486c19783448be270", "externalIds": {"MAG": - "2551208493", "DOI": "10.1016/j.jtbi.2016.11.003", "CorpusId": 39831910, "PubMed": - "27838459"}, "url": "https://www.semanticscholar.org/paper/8ecbcec2351885579bdf9da486c19783448be270", - "title": "An updated kernel-based Turing model for studying the mechanisms - of biological pattern formation.", "abstract": null, "venue": "Journal of - Theoretical Biology", "year": 2017, "referenceCount": 31, "citationCount": - 55, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-02-07", "journal": {"name": "Journal of theoretical - biology", "pages": "\n 120-127\n ", "volume": "414"}, "authors": - [{"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": "db6e2d0ebe2d870dc735fed9165a0b07816ad608", - "externalIds": {"ArXiv": "quant-ph/0304063", "MAG": "1996689031", "DOI": "10.1117/12.487249", - "CorpusId": 35701290}, "url": "https://www.semanticscholar.org/paper/db6e2d0ebe2d870dc735fed9165a0b07816ad608", - "title": "Quantum simulations of physics problems", "abstract": "If a large - Quantum Computer (QC) existed today, what type of physical problems could - we efficiently simulate on it that we could not simulate on a classical Turing - machine? In this paper we argue that a QC could solve some relevant physical - \"questions\" more efficiently. The existence of one-to-one mappings between - different algebras of observables or between different Hilbert spaces allow - us to represent and imitate any physical system by any other one (e.g., a - bosonic system by a spin-1/2 system). We explain how these mappings can be - performed showing quantum networks useful for the efficient evaluation of - some physical properties, such as correlation functions and energy spectra.", - "venue": "SPIE Defense + Commercial Sensing", "year": 2003, "referenceCount": - 12, "citationCount": 55, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Engineering", "Physics", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2003-04-09", "journal": {"volume": "5105"}, "authors": - [{"authorId": "2570996", "name": "R. Somma"}, {"authorId": "4155925", "name": - "Gerardo Rodr\u00edguez Ort\u00edz"}, {"authorId": "1692215", "name": "E. - Knill"}, {"authorId": "3122483", "name": "J. Gubernatis"}]}, {"paperId": "d19f0278fad5133a8d3eb6b5d29998217e91aa61", - "externalIds": {"DBLP": "journals/siamam/Choudhury94", "MAG": "2131506636", - "DOI": "10.1137/S0036139993247240", "CorpusId": 35997579}, "url": "https://www.semanticscholar.org/paper/d19f0278fad5133a8d3eb6b5d29998217e91aa61", + {"paperId": "d19f0278fad5133a8d3eb6b5d29998217e91aa61", "externalIds": {"DBLP": + "journals/siamam/Choudhury94", "MAG": "2131506636", "DOI": "10.1137/S0036139993247240", + "CorpusId": 35997579}, "corpusId": 35997579, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d19f0278fad5133a8d3eb6b5d29998217e91aa61", "title": "Turing Instability in Competition Models with Delay I: Linear Theory", "abstract": "Turing instability in two-component predator-prey and reaction-diffusion models including diffusion and Volterra-type distributed delays in the interspecies @@ -47143,35 +53388,148 @@ interactions: the absence of delay. An alternative bifurcation-theoretic derivation of the boundary of the Turing-unstable domain ...", "venue": "SIAM J. Appl. Math.", "year": 1994, "referenceCount": 1, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1994-10-01", "journal": {"name": "SIAM J. Appl. Math.", "pages": "1425-1450", - "volume": "54"}, "authors": [{"authorId": "152723383", "name": "S. R. Choudhury"}]}, - {"paperId": "5ca20d0b1386f33a5800462d97a3be065b781356", "externalIds": {"MAG": - "2963089480", "DBLP": "journals/corr/abs-0906-3554", "ArXiv": "0906.3554", - "DOI": "10.1142/9789814295482_0017", "CorpusId": 15007614}, "url": "https://www.semanticscholar.org/paper/5ca20d0b1386f33a5800462d97a3be065b781356", - "title": "On the Algorithmic Nature of the World", "abstract": "We propose - a test based on the theory of algorithmic complexity and an experimental evaluation - of Levin''s universal distribution to identify evidence in support of or in - contravention of the claim that the world is algorithmic in nature. To this - end we have undertaken a statistical comparison of the frequency distributions - of data from physical sources on the one hand--repositories of information - such as images, data stored in a hard drive, computer programs and DNA sequences--and - the frequency distributions generated by purely algorithmic means on the other--by - running abstract computing devices such as Turing machines, cellular automata - and Post Tag systems. Statistical correlations were found and their significance - measured.", "venue": "ArXiv", "year": 2009, "referenceCount": 22, "citationCount": - 52, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1994-10-01", "journal": {"name": "SIAM J. Appl. Math.", + "pages": "1425-1450", "volume": "54"}, "authors": [{"authorId": "152723383", + "name": "S. R. Choudhury"}]}, {"paperId": "24711b2a7a4dc4d0dad74bbbfeea9140abab047b", + "externalIds": {"MAG": "2604096638", "DOI": "10.23919/ICACT.2017.7890132", + "CorpusId": 22238611}, "corpusId": 22238611, "publicationVenue": {"id": "9cb29d4c-aff5-4a8d-8ae4-6a2cd440519d", + "name": "International Conference on Advanced Communication Technology", "type": + "conference", "alternate_names": ["Int Conf Adv Commun Technol", "ICACT"]}, + "url": "https://www.semanticscholar.org/paper/24711b2a7a4dc4d0dad74bbbfeea9140abab047b", + "title": "Managing IoT devices using blockchain platform", "abstract": "Since + the start of Bitcoin in 2008[1], blockchain technology emerged as the next + revolutionary technology. Though blockchain started off as a core technology + of Bitcoin, its use cases are expanding to many other areas including finances, + Internet of Things (IoT), security and such[2]. Currently, many private and + public sectors are diving into the technology[3]. Aside from that, as software + and hardware improve, we would see the beginning of IoT. And those IoT devices + need to communicate and synchronize with each other. But in situations where + more than thousands or tens of thousands of IoT devices connected, we expect + that using current model of server-client may have some limitations and issues + while in synchronization. So, we propose using blockchain to build IoT system. + Using blockchain, we can control and configure IoT devices. We manage keys + using RSA public key cryptosystems where public keys are stored in Ethereum + and private keys are saved on individual devices. Specifically, we choose + Ethereum as our blockchain platform because using its smart contract, we can + write our own Turing-complete code to run on top of Ethereum. Thus, we can + easily manage configuration of IoT devices and build key management system. + Even though we can simply use account as a key management system, which most + of blockchain platform supports, we decide to use Ethereum because we can + manage the system in a more fine-grained way. For the proof of a concept, + we use a few IoT devices instead of a full system of IoT system, which consists + of thousands of IoT devices. But in our later study, we would like to build + a fully scaled IoT system using blockchain.", "venue": "International Conference + on Advanced Communication Technology", "year": 2017, "referenceCount": 9, + "citationCount": 635, "influentialCitationCount": 25, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Conference"], + "publicationDate": null, "journal": {"name": "2017 19th International Conference + on Advanced Communication Technology (ICACT)", "pages": "464-467"}, "authors": + [{"authorId": "2055505596", "name": "Seyoung Huh"}, {"authorId": "47955225", + "name": "Sangrae Cho"}, {"authorId": "46877262", "name": "Soohyung Kim"}]}, + {"paperId": "8ecbcec2351885579bdf9da486c19783448be270", "externalIds": {"MAG": + "2551208493", "DOI": "10.1016/j.jtbi.2016.11.003", "CorpusId": 39831910, "PubMed": + "27838459"}, "corpusId": 39831910, "publicationVenue": {"id": "15797df0-99d5-49c7-bb2d-58f3a9692c57", + "name": "Journal of Theoretical Biology", "type": "journal", "alternate_names": + ["J Theor Biology"], "issn": "0022-5193", "url": "https://www.journals.elsevier.com/journal-of-theoretical-biology/", + "alternate_urls": ["http://www.journals.elsevier.com/journal-of-theoretical-biology/", + "http://www.sciencedirect.com/science/journal/00225193", "http://www.idealibrary.com/"]}, + "url": "https://www.semanticscholar.org/paper/8ecbcec2351885579bdf9da486c19783448be270", + "title": "An updated kernel-based Turing model for studying the mechanisms + of biological pattern formation.", "abstract": null, "venue": "Journal of + Theoretical Biology", "year": 2017, "referenceCount": 31, "citationCount": + 56, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2009-06-19", "journal": {"name": "ArXiv", - "volume": "abs/0906.3554"}, "authors": [{"authorId": "66445647", "name": "H. - Zenil"}, {"authorId": "2027817702", "name": "J. Delahaye"}]}, {"paperId": - "a06efce214fbd415d1cdc8830890dce4aa825d5c", "externalIds": {"MAG": "2026429056", - "DOI": "10.1353/tech.2002.0126", "CorpusId": 108580173}, "url": "https://www.semanticscholar.org/paper/a06efce214fbd415d1cdc8830890dce4aa825d5c", + ["JournalArticle"], "publicationDate": "2017-02-07", "journal": {"name": "Journal + of theoretical biology", "pages": "\n 120-127\n ", "volume": + "414"}, "authors": [{"authorId": "2636335", "name": "Shigeru Kondo"}]}, {"paperId": + "e10cbc26433cb2da5c5bdabd7f41a5480536d2f3", "externalIds": {"DBLP": "journals/sigcse/Hannay92", + "MAG": "2009380537", "DOI": "10.1145/130962.130971", "CorpusId": 21903885}, + "corpusId": 21903885, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e10cbc26433cb2da5c5bdabd7f41a5480536d2f3", + "title": "Hypercard automata simulation: finite-state, pushdown and Turing + machines", "abstract": "This paper describes a package of highly interactive + simulation models for the concepts taught in Theory of Computing courses. + Macintosh Hypercard stacks are used to demonstrate the three basic automata + models: Finite-State Machines, Push-Down Machines, and Turing Machines. These + simulations feature multiple named machines on the same stack, accessible + via a customized menu or buttons on the screen. Because of the scripts hidden + behind the visible screen, with just a click of a butto students can alter + starting states, the set of input symbols, the number of states, the finality + of states, or the action based on a given state/input combination. These simulations + have been successfully used in conjunction with a course on the Theory of + Computing at Union College since 1989. Students have responded enthusiastically + to this concrete method of teaching abstract concepts.", "venue": "SGCS", + "year": 1992, "referenceCount": 11, "citationCount": 21, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1992-06-01", "journal": + {"name": "ACM SIGCSE Bull.", "pages": "55-58", "volume": "24"}, "authors": + [{"authorId": "2242833", "name": "D. Hannay"}]}, {"paperId": "cb4c286e308ed819a316c5466f36f5892be41a91", + "externalIds": {"MAG": "1514471403", "CorpusId": 141839723}, "corpusId": 141839723, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cb4c286e308ed819a316c5466f36f5892be41a91", + "title": "Mind Design II: Philosophy, Psychology, Artificial Intelligence", + "abstract": "From the Publisher: \n\"Ming Design II is a welcome update of + its predecessor, itself a useful compendium on the philosophy of cognitive + science. This new volume retains the intellectual foundations, and some discussions + of classical AI built on them, while adding connectionism, situated AI, and + dynamic systems theory as extra storeys. Which of these is the most stable, + and whether the foundations need to be re-worked, are questions readers will + be eager to explore.\" \n-- Margaret A. Boden, Professor of Philosophy and + Psychology, University of Sussex, UK \n\"Haugeland''s Mind Design II brings + together nearly all the essential philosophical perspectives in Cognitive + Science. If you want to understand current opinion on the philosophy of mind, + you should make sure you are familiar with the contents of this book.\" \n-- + James L. McClelland, Carnegie Mellon University and the Center for the Neural + Basis of Cognition Mind design is the endeavor to understand mind (thinking, + intellect) in terms of its design (how it is built, how it works). Unlike + traditional empirical psychology, it is more oriented toward the \"how\" than + the \"what.\" An experiment in mind design is more likely to be an attempt + to build something and make it work--as in artificial intelligence--than to + observe or analyze what already exists. Mind design is psychology by reverse + engineering. \nWhen Mind Design was first published in 1981, it became a classic + in the then-nascent fields of cognitive science and AI. This second edition + retains four landmark essays from the first, adding to them one earlier milestone + (Turing''s \"Computing Machinery and Intelligence\") and eleven more recent + articles about connectionism, dynamical systems, and symbolic versus nonsymbolic + models. The contributors are divided about evenly between philosophers and + scientists. Yet all are \"philosophical\" in that they address fundamental + issues and concepts; and all are \"scientific\" in that they are technically + sophisticated and concerned with concrete empirical research. \nContributors: + Rodney A. Brooks, Paul M. Churchland, Andy Clark, Daniel C. Dennett, Hubert + L. Dreyfus, Jerry A. Fodor, Joseph Garon, John Haugeland, Marvin Minsky, Allen + Newell, Zenon W. Pylyshyn, William Ramsey, Jay F. Rosenberg, David E. Rumelhart, + John R. Searle, Herbert A. Simon, Paul Smolensky, Stephen Stich, A. M. Turing, + Timothy van Gelder", "venue": "", "year": 1997, "referenceCount": 202, "citationCount": + 141, "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", + "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "3081073", "name": "John Haugeland"}]}, {"paperId": "4f902ad0ab7a97a4e77f7661b046ce5ddc3e2b28", + "externalIds": {"MAG": "2166765576", "DBLP": "conf/sofsem/Warwick12", "DOI": + "10.1007/978-3-642-27660-6_11", "CorpusId": 10284617}, "corpusId": 10284617, + "publicationVenue": {"id": "74136324-6e61-46d3-912f-8be85580ef40", "name": + "Conference on Current Trends in Theory and Practice of Informatics", "type": + "conference", "alternate_names": ["SOFSEM", "Conf Curr Trends Theory Pract + Informatics"]}, "url": "https://www.semanticscholar.org/paper/4f902ad0ab7a97a4e77f7661b046ce5ddc3e2b28", + "title": "Not Another Look at the Turing Test!", "abstract": null, "venue": + "Conference on Current Trends in Theory and Practice of Informatics", "year": + 2012, "referenceCount": 5, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-01-21", "journal": {"pages": + "130-140"}, "authors": [{"authorId": "143636026", "name": "K. Warwick"}]}, + {"paperId": "a06efce214fbd415d1cdc8830890dce4aa825d5c", "externalIds": {"MAG": + "2026429056", "DOI": "10.1353/tech.2002.0126", "CorpusId": 108580173}, "corpusId": + 108580173, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a06efce214fbd415d1cdc8830890dce4aa825d5c", "title": "Two Centuries of Central Water Management in the Netherlands", "abstract": "For two centuries the Rijkswaterstaat has been responsible for public works in the Netherlands. Founded in 1798, this national government agency, which @@ -47199,198 +53557,100 @@ interactions: Furthermore, the agency sees itself as a civil service organization confronted by numerous political parties and social", "venue": "", "year": 2002, "referenceCount": 20, "citationCount": 73, "influentialCitationCount": 9, "isOpenAccess": true, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "History", "source": "s2-fos-model"}], + "openAccessPdf": {"url": "https://pure.tue.nl/ws/files/2026123/611782.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-07-01", "journal": {"name": "Technology and Culture", "pages": "549 - 568", "volume": "43"}, "authors": - [{"authorId": "87513934", "name": "Hw Harry Lintsen"}]}, {"paperId": "996c2b634ddb3487909295a2d49e36ac95617edf", - "externalIds": {"MAG": "2077272300", "DBLP": "journals/ijfcs/Ogihara94", "DOI": - "10.1142/S0129054194000177", "CorpusId": 10419617}, "url": "https://www.semanticscholar.org/paper/996c2b634ddb3487909295a2d49e36ac95617edf", - "title": "On Serializable Languages", "abstract": "Cai and Furst introduced - the notion of bottleneck Turing machines. Based on Barrington\u2019s innovating - technique, which is used to showed that polynomial-size branching programs - have exactly the same power as NC1, Cai and Furst showed that the languages - recognized by width-5 bottleneck Turing machines are exactly the same as those - in PSPACE. In this paper, computational power of bottleneck Turing machines - with widths fewer than 5 is investigated. It is shown that width-2 bottleneck - Turing machines capture \u2295P//OptP, the class of sets recognized by \u2295P-machines - with pre-computation in OptP. For languages recognized by bottleneck Turing - machines with width-3 and width-4, some lower-bounds and upper-bounds are - shown.", "venue": "International Journal of Foundations of Computer Science", - "year": 1994, "referenceCount": 18, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1994-12-01", "journal": {"name": "Int. J. Found. Comput. - Sci.", "pages": "303-318", "volume": "5"}, "authors": [{"authorId": "144669577", - "name": "M. Ogihara"}]}, {"paperId": "3ebb09f6f176d9eb201c0961a7531172acb96dcd", - "externalIds": {"MAG": "2059368609", "DOI": "10.1037/0033-3204.42.2.139", - "CorpusId": 16967277}, "url": "https://www.semanticscholar.org/paper/3ebb09f6f176d9eb201c0961a7531172acb96dcd", - "title": "Preserving our humanity as therapists", "abstract": "Psychotherapists - have traditionally em-braced core values and beliefs that dif-fer signi\ufb01cantly - from many values andbeliefs that pervade contemporary,commercially oriented - Western cul-tures. With their clients, therapists oftenquestion or challenge - the culture\u2019s ma-terialism, consumerism, appeals to van-ity and greed, - disdain of dependencyand vulnerability, and abetment of nar-cissistic entitlement. - Currently, how-ever, psychotherapy is being reshapedby descriptive psychiatric - diagnosis,pressures from powerful corporate in-terests, and antagonism from - in\ufb02uentialacademic psychologists and is threat-ened with becoming the - servant of thesurrounding culture rather than itsparticipant/observer and - critic. Theauthor notes symptoms of this trendand offers ideas about reversing - it.", "venue": "", "year": 2005, "referenceCount": 99, "citationCount": 55, - "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], - "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": - "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "Psychotherapy", "pages": "139-151", "volume": "42"}, - "authors": [{"authorId": "39776378", "name": "N. McWilliams"}]}, {"paperId": - "0a3c7485942469f5f8c4f58f57b92fbb7eae6c29", "externalIds": {"MAG": "2134909295", - "DBLP": "journals/tissec/OorschotS06", "DOI": "10.1145/1178618.1178619", "CorpusId": - 3183068}, "url": "https://www.semanticscholar.org/paper/0a3c7485942469f5f8c4f58f57b92fbb7eae6c29", - "title": "On countering online dictionary attacks with login histories and - humans-in-the-loop", "abstract": "Automated Turing Tests (ATTs), also known - as human-in-the-loop techniques, were recently employed in a login protocol - by Pinkas and Sander (2002) to protect against online password-guessing attacks. - We present modifications providing a new history-based login protocol with - ATTs, which uses failed-login counts. Analysis indicates that the new protocol - offers opportunities for improved security and user friendliness (fewer ATTs - to legitimate users) and greater flexibility (e.g., allowing protocol parameter - customization for particular situations and users). We also note that the - Pinkas--Sander and other protocols involving ATTs are susceptible to minor - variations of well-known middle-person attacks. We discuss complementary techniques - to address such attacks, and to augment the security of the original protocol.", - "venue": "TSEC", "year": 2006, "referenceCount": 49, "citationCount": 96, - "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-08-01", "journal": - {"name": "ACM Trans. Inf. Syst. Secur.", "pages": "235-258", "volume": "9"}, - "authors": [{"authorId": "1748222", "name": "P. V. Oorschot"}, {"authorId": - "1742113", "name": "S. Stubblebine"}]}, {"paperId": "838164514b9711b742ce92b8f8b214a495398b31", - "externalIds": {"DBLP": "journals/simulation/Schroer89", "MAG": "2127320679", - "DOI": "10.1177/003754978905300502", "CorpusId": 46980447}, "url": "https://www.semanticscholar.org/paper/838164514b9711b742ce92b8f8b214a495398b31", - "title": "A Simulation Assistant for Modeling Manufacturing Systems", "abstract": - "This paper presents a structured approach to modeling manufac turing systems. - The structured approach is accomplished through a simulation assistant consisting - of a set of predefined GPSS simulation macros, a user interface, and an automatic - code generator.", "venue": "Simul.", "year": 1989, "referenceCount": 13, "citationCount": - 23, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Engineering", "Computer Science"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1989-11-01", "journal": {"name": "Simulation", - "pages": "201 - 206", "volume": "53"}, "authors": [{"authorId": "2156322", - "name": "B. Schroer"}]}, {"paperId": "0efcf3f2c53080762a31250c73c5cac88ccfe928", - "externalIds": {"MAG": "1540848378", "DBLP": "conf/ifipTCS/LeeuwenW00", "DOI": - "10.1007/3-540-44929-9_48", "CorpusId": 24196041}, "url": "https://www.semanticscholar.org/paper/0efcf3f2c53080762a31250c73c5cac88ccfe928", - "title": "On the Power of Interactive Computing", "abstract": null, "venue": - "IFIP TCS", "year": 2000, "referenceCount": 45, "citationCount": 14, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2000-08-17", "journal": {"pages": "619-623"}, - "authors": [{"authorId": "143817739", "name": "J. V. Leeuwen"}, {"authorId": - "1815433", "name": "J. Wiedermann"}]}, {"paperId": "625396dbe8e838e125d9ada3cadde95d4a8466c2", - "externalIds": {"DBLP": "conf/focs/Smith68", "MAG": "1972983982", "DOI": "10.1109/SWAT.1968.25", - "CorpusId": 27320704}, "url": "https://www.semanticscholar.org/paper/625396dbe8e838e125d9ada3cadde95d4a8466c2", - "title": "Simple Computation-Universal Cellular Spaces and Self-Reproduction", - "abstract": "Cellular spaces computationally equivalent to any given Turing - machine are exhibited which are simple in the sense that each cell has only - a small number of states and a small neighborhood. Neighborhood reduction - theorems are derived in this interest, and several simple computationuniversal - cellular spaces are presented. Conditions for computation-universality of - a cellular space are investigated, and, in particular, the conjecture that - unbounded but boundable propagation in a space is a sufficient condition is - refuted. Finally, the computation-universal spaces derived in the study are - used to introduce, via recursive function theory, examples of simple self-reproducing - universal Turing machine configurations in one and two dimensions.", "venue": - "SWAT", "year": 1968, "referenceCount": 2, "citationCount": 20, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], - "publicationDate": "1968-10-15", "journal": {"pages": "269-277"}, "authors": - [{"authorId": "2116707114", "name": "Alvy Ray Smith"}]}, {"paperId": "edad96c66ddc510015ef759926eadd6dc1ef6c98", - "externalIds": {"MAG": "2289243545", "CorpusId": 137765556}, "url": "https://www.semanticscholar.org/paper/edad96c66ddc510015ef759926eadd6dc1ef6c98", - "title": "Interaction between Impurities and Welding Variables in Determining - GTA Weld Shape Depending on the trace elements in the base materials, identical - changes in welding variables can have an opposite effect on weld shape", "abstract": - "Variations in GTA weld shape, or penetration, have been shown in many cases - to arise from small changes in trace element content of the base metal. Heiple - and Roper have proposed that CTA weld shape is generally deter\u00ad mined - by fluid flow patterns in the weld pool, and that certain trace elements can - alter the fluid flow patterns by changing surface tension gradients on the - weld pool. The surface tension gradients will also be altered by changes in - tempera\u00ad ture gradients on the weld pool surface since the surface tension - is temperature dependent. We propose that the primary mechanism by which welding - parameter variations affect GTA weld shape is by changing the temperature - gradient on the weld pool surface through changes in the input power density. - A welding vari\u00ad able change which increases the input power density will - magnify the tempera\u00ad ture gradient, and thus the surface ten\u00ad sion - gradient, thereby driving the existing fluid flow pattern more strongly. Identical - changes in welding variables can there\u00ad fore produce opposite changes - in weld shape in materials with different trace element content. The effects - of current, travel speed, arc length, electrode tip angle, and torch gas composition - on GTA weld shape are reported for high purity and sulfur or selenium doped - 304 stain\u00ad less steel. All weld bead geometry changes caused by changing - welding variables were found to be consistent with the surface tension driven - fluid flow model.", "venue": "", "year": 1986, "referenceCount": 24, "citationCount": - 46, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "94940644", "name": "P. Burgardt"}, - {"authorId": "69459938", "name": "C. R. Heiple"}]}, {"paperId": "24711b2a7a4dc4d0dad74bbbfeea9140abab047b", - "externalIds": {"MAG": "2604096638", "DOI": "10.23919/ICACT.2017.7890132", - "CorpusId": 22238611}, "url": "https://www.semanticscholar.org/paper/24711b2a7a4dc4d0dad74bbbfeea9140abab047b", - "title": "Managing IoT devices using blockchain platform", "abstract": "Since - the start of Bitcoin in 2008[1], blockchain technology emerged as the next - revolutionary technology. Though blockchain started off as a core technology - of Bitcoin, its use cases are expanding to many other areas including finances, - Internet of Things (IoT), security and such[2]. Currently, many private and - public sectors are diving into the technology[3]. Aside from that, as software - and hardware improve, we would see the beginning of IoT. And those IoT devices - need to communicate and synchronize with each other. But in situations where - more than thousands or tens of thousands of IoT devices connected, we expect - that using current model of server-client may have some limitations and issues - while in synchronization. So, we propose using blockchain to build IoT system. - Using blockchain, we can control and configure IoT devices. We manage keys - using RSA public key cryptosystems where public keys are stored in Ethereum - and private keys are saved on individual devices. Specifically, we choose - Ethereum as our blockchain platform because using its smart contract, we can - write our own Turing-complete code to run on top of Ethereum. Thus, we can - easily manage configuration of IoT devices and build key management system. - Even though we can simply use account as a key management system, which most - of blockchain platform supports, we decide to use Ethereum because we can - manage the system in a more fine-grained way. For the proof of a concept, - we use a few IoT devices instead of a full system of IoT system, which consists - of thousands of IoT devices. But in our later study, we would like to build - a fully scaled IoT system using blockchain.", "venue": "International Conference - on Advanced Communication Technology", "year": 2017, "referenceCount": 9, - "citationCount": 633, "influentialCitationCount": 25, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Conference"], "publicationDate": null, - "journal": {"name": "2017 19th International Conference on Advanced Communication - Technology (ICACT)", "pages": "464-467"}, "authors": [{"authorId": "2055505596", - "name": "Seyoung Huh"}, {"authorId": "47955225", "name": "Sangrae Cho"}, {"authorId": - "46877262", "name": "Soohyung Kim"}]}, {"paperId": "7bd05a7c32789e5fdd8b5b80084f471d44d3179b", - "externalIds": {"MAG": "2181877071", "CorpusId": 17546416}, "url": "https://www.semanticscholar.org/paper/7bd05a7c32789e5fdd8b5b80084f471d44d3179b", - "title": "An Electroid Switching Model for Reversible Computer Architectures", - "abstract": "The study of logical reversibiiity in computation has led to - a proliferation of unconventional architectural proposals, from Brownian-motion - clockwork Turing machines to billiard- ball Computers. An architectural model - for reversible computers is proposed herein, that is significantly closer - to the switch-level models used in designing actual digital circuitry. This - ue''electroid (electronics-like) model facilitates the direct application - of the substantial body of ezisting digital design techniques to reversible - and dissipation-limited architectures.", "venue": "", "year": 1993, "referenceCount": - 16, "citationCount": 38, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "34217312", "name": "J. Storrs"}]}, - {"paperId": "57c737fcc8add74ea6fff714c4a731fb855406ce", "externalIds": {"MAG": - "2118015205", "DOI": "10.1093/treephys/tpr022", "CorpusId": 31171570, "PubMed": - "21512097"}, "url": "https://www.semanticscholar.org/paper/57c737fcc8add74ea6fff714c4a731fb855406ce", + [{"authorId": "87513934", "name": "Hw Harry Lintsen"}]}, {"paperId": "61df15fd36048b9ef1f5ee225b9c3d5cc84f550d", + "externalIds": {"MAG": "2068739710", "DOI": "10.1007/S10910-008-9370-Y", "CorpusId": + 123373026}, "corpusId": 123373026, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/61df15fd36048b9ef1f5ee225b9c3d5cc84f550d", + "title": "Formation and control of Turing patterns and phase fronts in photonics + and chemistry", "abstract": null, "venue": "", "year": 2008, "referenceCount": + 69, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"name": "Journal of Mathematical Chemistry", "pages": "95-112", + "volume": "45"}, "authors": [{"authorId": "48272648", "name": "G. Oppo"}]}, + {"paperId": "fbe4b73bb9be4362359c8db1579b26373dbfc75e", "externalIds": {"MAG": + "2158122617", "DOI": "10.1002/1615-4169(20010430)343:4<313::AID-ADSC313>3.0.CO;2-A", + "CorpusId": 3680560}, "corpusId": 3680560, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fbe4b73bb9be4362359c8db1579b26373dbfc75e", + "title": "Development of Nickel-on-Charcoal as a ''''Dirt-Cheap'''' Heterogeneous + Catalyst: A Personal Account", "abstract": "A personal account tracing the + origins and continuing evolution of nickel-on-charcoal (Ni/C) as a practical, + alternative, group 10 metal catalyst is presented. Discussed are applications + to several ''''name reactions'''' which lead to both car- bon-carbon and carbon-nitrogen + bond construc- tions utilizing inexpensive aryl chlorides as sub- strates. + Reductions of chloroarenes are also catalyzed by Ni/C, a process which may + be worthy of consideration in terms of environmental clean- up of PCBs and + dioxins. Collaborative efforts are also mentioned aimed at probing the surface + struc- ture of Ni/C, with the goal of enhancing catalyst ac- tivity. Future + directions for development of hetero- geneous nickel catalysts are proposed.", + "venue": "", "year": 2001, "referenceCount": 8, "citationCount": 53, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2001-04-30", "journal": {"name": "Advanced Synthesis & Catalysis", "pages": + "313-326", "volume": "343"}, "authors": [{"authorId": "3605795", "name": "B. + Lipshutz"}]}, {"paperId": "9fb64bd92f9d4e913c8ed4677b54fbe264bfef9d", "externalIds": + {"MAG": "2058944387", "DOI": "10.3934/mbe.2014.11.1247", "CorpusId": 35394072, + "PubMed": "25365601"}, "corpusId": 35394072, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9fb64bd92f9d4e913c8ed4677b54fbe264bfef9d", + "title": "Spatiotemporal complexity in a predator--prey model with weak Allee + effects.", "abstract": "In this article, we study the rich dynamics of a diffusive + predator-prey system with Allee effects in the prey growth. Our model assumes + a prey-dependent Holling type-II functional response and a density dependent + death rate for predator. We investigate the dissipation and persistence property, + the stability of nonnegative and positive constant steady state of the model, + as well as the existence of Hopf bifurcation at the positive constant solution. + In addition, we provide results on the existence and non-existence of positive + non-constant solutions of the model. We also demonstrate the Turing instability + under some conditions, and find that our model exhibits a diffusion-controlled + formation growth of spots, stripes, and holes pattern replication via numerical + simulations. One of the most interesting findings is that Turing instability + in the model is induced by the density dependent death rate in predator.", + "venue": "Mathematical biosciences and engineering : MBE", "year": 2014, "referenceCount": + 80, "citationCount": 27, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-09-01", "journal": + {"name": "Mathematical biosciences and engineering : MBE", "pages": "\n 1247-74\n ", + "volume": "11 6"}, "authors": [{"authorId": "2476593", "name": "Yongli Cai"}, + {"authorId": "33373208", "name": "M. Banerjee"}, {"authorId": "145388825", + "name": "Yun Kang"}, {"authorId": "2116103578", "name": "Weiming Wang"}]}, + {"paperId": "db6e2d0ebe2d870dc735fed9165a0b07816ad608", "externalIds": {"ArXiv": + "quant-ph/0304063", "MAG": "1996689031", "DOI": "10.1117/12.487249", "CorpusId": + 35701290}, "corpusId": 35701290, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/db6e2d0ebe2d870dc735fed9165a0b07816ad608", + "title": "Quantum simulations of physics problems", "abstract": "If a large + Quantum Computer (QC) existed today, what type of physical problems could + we efficiently simulate on it that we could not simulate on a classical Turing + machine? In this paper we argue that a QC could solve some relevant physical + \"questions\" more efficiently. The existence of one-to-one mappings between + different algebras of observables or between different Hilbert spaces allow + us to represent and imitate any physical system by any other one (e.g., a + bosonic system by a spin-1/2 system). We explain how these mappings can be + performed showing quantum networks useful for the efficient evaluation of + some physical properties, such as correlation functions and energy spectra.", + "venue": "SPIE Defense + Commercial Sensing", "year": 2003, "referenceCount": + 10, "citationCount": 55, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/0304063", "status": + "GREEN"}, "fieldsOfStudy": ["Engineering", "Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2003-04-09", "journal": {"volume": "5105"}, "authors": + [{"authorId": "2570996", "name": "R. Somma"}, {"authorId": "4155925", "name": + "Gerardo Rodr\u00edguez Ort\u00edz"}, {"authorId": "1692215", "name": "E. + Knill"}, {"authorId": "3122483", "name": "J. Gubernatis"}]}, {"paperId": "57c737fcc8add74ea6fff714c4a731fb855406ce", + "externalIds": {"MAG": "2118015205", "DOI": "10.1093/treephys/tpr022", "CorpusId": + 31171570, "PubMed": "21512097"}, "corpusId": 31171570, "publicationVenue": + {"id": "2518a406-77ff-40fe-92c3-c71dbdae7b28", "name": "Tree Physiology", + "type": "journal", "alternate_names": ["Tree Physiol"], "issn": "1568-2544", + "alternate_issns": ["0829-318X"], "url": "http://treephys.oxfordjournals.org/"}, + "url": "https://www.semanticscholar.org/paper/57c737fcc8add74ea6fff714c4a731fb855406ce", "title": "Tree responses to drought.", "abstract": "With global climate change, drought may become more com-mon in the future (IPCC 2007). Several factors will promote more frequent droughts: earlier snowmelt, higher temperatures @@ -47425,514 +53685,124 @@ interactions: complex and variable responses of trees to drought. Larcheveque et al. (2011 ) droughted two different hybrid poplar saplings (each with", "venue": "Tree Physiology", "year": 2011, "referenceCount": 24, "citationCount": 140, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/treephys/article-pdf/31/3/237/4605457/tpr022.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "LettersAndComments"], "publicationDate": "2011-03-01", "journal": {"name": "Tree physiology", "pages": "\n 237-9\n ", "volume": "31 3"}, "authors": [{"authorId": "3955604", "name": "M. G. Ryan"}]}, - {"paperId": "3e19efdca5654a11fb1e3a956c36517c47f42d4a", "externalIds": {"MAG": - "2145453084", "DOI": "10.1002/anie.200806036", "CorpusId": 38177114, "PubMed": - "19378313"}, "url": "https://www.semanticscholar.org/paper/3e19efdca5654a11fb1e3a956c36517c47f42d4a", - "title": "One-step synthesis and characterization of gold-hollow PbS(x) hybrid - nanoparticles.", "abstract": "Turing lead into gold: Hollow hybrid PbS(x)-Au - nanostructures of about 10 nm in diameter were synthesized using a one-step - reaction under mild experimental conditions. The redox reaction of gold precursors - with PbS nanocrystals in the presence of dodecylamine leads to the hollow - feature of hybrid nanostructures (see picture).", "venue": "Angewandte Chemie", - "year": 2009, "referenceCount": 44, "citationCount": 29, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science", "Medicine"], - "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2009-05-18", "journal": {"name": "Angewandte Chemie", "pages": "\n 3991-5\n ", - "volume": "48 22"}, "authors": [{"authorId": "2146236968", "name": "Jian Yang"}, - {"authorId": "13057878", "name": "Junjun Peng"}, {"authorId": "47835341", - "name": "Qingbo Zhang"}, {"authorId": "145285835", "name": "F. Peng"}, {"authorId": - "93109075", "name": "Hongjuan Wang"}, {"authorId": "144545517", "name": "Hao - Yu"}]}, {"paperId": "794b6173cdfaed13995bae8871c5175a879ba9a6", "externalIds": - {"DBLP": "journals/tsp/BudianuBT06", "MAG": "2110935968", "DOI": "10.1109/TSP.2006.871973", - "CorpusId": 10844061}, "url": "https://www.semanticscholar.org/paper/794b6173cdfaed13995bae8871c5175a879ba9a6", - "title": "Estimation of the number of operating sensors in large-scale sensor - networks with mobile access", "abstract": "This paper investigates the estimation - of the number of operating sensors in a sensor network in which the data collection - is made by a mobile access point. In this paper, an estimator based on the - Good-Turing estimator of the missing mass is proposed and it is generalized - to other related problems such as the estimation of the distribution of energy - available at sensors. The estimator is analyzed using the theory of large - deviations. Closed-form bounds on the large deviation exponent are presented - and confidence intervals for the estimator are characterized.", "venue": "IEEE - Transactions on Signal Processing", "year": 2006, "referenceCount": 17, "citationCount": - 56, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-05-01", "journal": {"name": "IEEE - Transactions on Signal Processing", "pages": "1703-1715", "volume": "54"}, - "authors": [{"authorId": "2885463", "name": "C. Budianu"}, {"authorId": "1409749316", - "name": "S. Ben-David"}, {"authorId": "145120197", "name": "L. Tong"}]}, {"paperId": - "6616a11f696ff3443000b12b00b3305ae078375f", "externalIds": {"MAG": "2490699745", - "DOI": "10.1007/978-3-319-33924-5_4", "CorpusId": 53965872}, "url": "https://www.semanticscholar.org/paper/6616a11f696ff3443000b12b00b3305ae078375f", - "title": "An Analogue-Digital Model of Computation: Turing Machines with Physical - Oracles", "abstract": null, "venue": "", "year": 2017, "referenceCount": 24, - "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "pages": "73-115", "volume": "1"}, "authors": [{"authorId": "71179391", - "name": "T\u00e2nia Ambaram"}, {"authorId": "1919705", "name": "E. Beggs"}, - {"authorId": "143698164", "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": - "2455322", "name": "Diogo Po\u00e7as"}, {"authorId": "145744796", "name": - "J. V. Tucker"}]}, {"paperId": "410202372dbd2e63a154f2b9d4627a0285ebb983", - "externalIds": {"MAG": "1980112389", "DOI": "10.1063/1.2102447", "CorpusId": - 28158805, "PubMed": "16396603"}, "url": "https://www.semanticscholar.org/paper/410202372dbd2e63a154f2b9d4627a0285ebb983", - "title": "Complex patterns in reactive microemulsions: self-organized nanostructures?", - "abstract": "In a reverse microemulsion consisting of water, oil (octane), - an anionic surfactant [aerosol OT (AOT)], and the reactants of the oscillating - Belousov-Zhabotinsky (BZ) reaction, a variety of complex spatiotemporal patterns - appear. These include traveling and standing waves, spirals that move either - toward or away from their centers, spatiotemporal chaos, Turing patterns, - segmented waves, and localized structures, both stationary and oscillatory. - The system consists of nanometer-sized droplets of water containing the BZ - reactants surrounded by a monolayer of AOT, swimming in a sea of oil, through - which nonpolar BZ intermediates can diffuse rapidly. We present experimental - and computational results on this fascinating system and comment on possible - future directions for research.", "venue": "Chaos", "year": 2005, "referenceCount": - 30, "citationCount": 54, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2005-12-30", "journal": {"name": "Chaos", - "pages": "\n 047510\n ", "volume": "15 4"}, "authors": [{"authorId": - "144854275", "name": "I. Epstein"}, {"authorId": "2258489", "name": "V. Vanag"}]}, - {"paperId": "e29d96668a3b248fb087b405d777291e77c97852", "externalIds": {"MAG": - "2057721548", "DOI": "10.1097/TA.0b013e318189a836", "CorpusId": 33620140, - "PubMed": "19001967"}, "url": "https://www.semanticscholar.org/paper/e29d96668a3b248fb087b405d777291e77c97852", - "title": "Western trauma association critical decisions in trauma: management - of pelvic fracture with hemodynamic instability.", "abstract": "SUMMARY Patients - with hemodynamic instability and pelvic frac-ture remain a significant challenge - in management. A mul-tidisciplinary approach has been shown to have the bestoutcomes. - The algorithm outlined above represents the ef-forts of the Western Trauma - Association Critical Decisions inTrauma Ad Hoc Committee based on the best - evidence avail-able and expert opinion. Prospective validation of this algo-rithm - is recommended. REFERENCES 1. Moreno C, Moore EE, Rosenberger A, Cleveland - HC. Hemorrhageassociated with major pelvic fracture: a multispecialty challenge. - J Trauma. 1986;26:987\u2013994.2. Smith W, Williams A, Agudelo J, et al. Early - predictors of mortalityin hemodynamically unstable pelvis fractures. J Orthop - Trauma. 2007;21:31\u201337.3. Cothren CC, Osborn PM, Moore EE, Morgan SJ, - Johnson JL, SmithWR. Preperitonal pelvic packing for hemodynamically unstablepelvic - fractures: a paradigm shift. J Trauma. 2007;62:834\u2013839;discussion 839\u2013842.4. - Gilliland MD, Ward RE, Barton RM, Miller PW, Duke JH. Factorsaffecting mortality - in pelvic fractures.", "venue": "Journal of Trauma", "year": 2008, "referenceCount": - 43, "citationCount": 98, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-11-01", "journal": - {"name": "The Journal of trauma", "pages": "\n 1012-5\n ", - "volume": "65 5"}, "authors": [{"authorId": "1773710", "name": "James W. Davis"}, - {"authorId": "90235412", "name": "F. Moore"}, {"authorId": "2238849", "name": - "R. McIntyre"}, {"authorId": "4776022", "name": "C. Cocanour"}, {"authorId": - "3780695", "name": "E. Moore"}, {"authorId": "31631959", "name": "M. West"}]}, - {"paperId": "b2b1ad3e43f570f1f97f4cf5240adff95b188621", "externalIds": {"MAG": - "2142604867", "ArXiv": "1212.6745", "DBLP": "journals/peerj-cs/ZenilSDG15", - "DOI": "10.7717/PEERJ-CS.23", "CorpusId": 6422324}, "url": "https://www.semanticscholar.org/paper/b2b1ad3e43f570f1f97f4cf5240adff95b188621", - "title": "Two-dimensional Kolmogorov complexity and an empirical validation - of the Coding theorem method by compressibility", "abstract": "We propose - a measure based upon the fundamental theoretical concept in algorithmic information - theory that provides a natural approach to the problem of evaluating n-dimensional - complexity by using an n-dimensional deterministic Turing machine. The technique - is interesting because it provides a natural algorithmic process for symmetry - breaking generating complex n-dimensional structures from perfectly symmetric - and fully deterministic computational rules producing a distribution of patterns - as described by algorithmic probability. Algorithmic probability also elegantly - connects the frequency of occurrence of a pattern with its algorithmic complexity, - hence eff ectively providing estimations to the complexity of the generated - patterns. Experiments to validate estimations of algorithmic complexity based - on these concepts are presented, showing that the measure is stable in the - face of some changes in computational formalism and that results are in agreement - with the results obtained using lossless compression algorithms when both - methods overlap in their range of applicability. We then use the output frequency - of the set of 2-dimensional Turing machines to classify the algorithmic complexity - of the space-time evolutions of Elementary Cellular Automata.", "venue": "PeerJ - Comput. Sci.", "year": 2012, "referenceCount": 83, "citationCount": 45, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-12-30", "journal": {"name": "PeerJ Comput. Sci.", - "pages": "e23", "volume": "1"}, "authors": [{"authorId": "66445647", "name": - "H. Zenil"}, {"authorId": "1389866422", "name": "F. Soler-Toscano"}, {"authorId": - "2027817702", "name": "J. Delahaye"}, {"authorId": "3159526", "name": "N. - Gauvrit"}]}, {"paperId": "74b479c8724d960109f1d282ee2394a914e1f9fa", "externalIds": - {"ArXiv": "1212.4799", "DBLP": "books/cu/p/FreerRT14", "MAG": "1547952324", - "DOI": "10.1017/CBO9781107338579.007", "CorpusId": 11834718}, "url": "https://www.semanticscholar.org/paper/74b479c8724d960109f1d282ee2394a914e1f9fa", - "title": "Towards common-sense reasoning via conditional simulation: legacies - of Turing in Artificial Intelligence", "abstract": "The problem of replicating - the flexibility of human common-sense reasoning has captured the imagination - of computer scientists since the early days of Alan Turing''s foundational - work on computation and the philosophy of artificial intelligence. In the - intervening years, the idea of cognition as computation has emerged as a fundamental - tenet of Artificial Intelligence (AI) and cognitive science. But what kind - of computation is cognition? \nWe describe a computational formalism centered - around a probabilistic Turing machine called QUERY, which captures the operation - of probabilistic conditioning via conditional simulation. Through several - examples and analyses, we demonstrate how the QUERY abstraction can be used - to cast common-sense reasoning as probabilistic inference in a statistical - model of our observations and the uncertain structure of the world that generated - that experience. This formulation is a recent synthesis of several research - programs in AI and cognitive science, but it also represents a surprising - convergence of several of Turing''s pioneering insights in AI, the foundations - of computation, and statistics.", "venue": "Turing''s Legacy", "year": 2012, - "referenceCount": 140, "citationCount": 23, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-12-19", "journal": {"name": "ArXiv", "volume": "abs/1212.4799"}, - "authors": [{"authorId": "3337217", "name": "Cameron E. Freer"}, {"authorId": - "39331522", "name": "Daniel M. Roy"}, {"authorId": "1763295", "name": "J. - Tenenbaum"}]}, {"paperId": "fb41146b93371f2bb2e8e9bb76c2ce2fdc4a1f7f", "externalIds": - {"MAG": "2117086529", "DOI": "10.1088/0951-7715/22/10/012", "CorpusId": 27587277}, - "url": "https://www.semanticscholar.org/paper/fb41146b93371f2bb2e8e9bb76c2ce2fdc4a1f7f", - "title": "Interaction of Turing patterns with an external linear morphogen - gradient", "abstract": "We investigate a simple generic model of a reaction\u2013diffusion - system consisting of an activator and an inhibitor molecule in the presence - of a linear morphogen gradient. We assume that this morphogen gradient is - established independently of the reaction\u2013diffusion system and acts by - increasing the production of the activator proportional to the morphogen concentration. - The model is motivated by several existing models in developmental biology - in which a Turing patterning mechanism is proposed and various chemical gradients - are known to be important for development. Mathematically, this leads to reaction\u2013diffusion - equations with explicit spatial dependence. We investigate how the Turing - pattern is affected, if it exists. We also show that in the parameter range - where a Turing pattern is not possible, the system may nevertheless produce - \u2018Turing-like\u2019 patterns.", "venue": "", "year": 2009, "referenceCount": - 20, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2009-10-01", "journal": {"name": "Nonlinearity", - "pages": "2541 - 2560", "volume": "22"}, "authors": [{"authorId": "1965886", - "name": "T. Glimm"}, {"authorId": "50560952", "name": "Jianying Zhang"}, {"authorId": - "1928791", "name": "Yun-Qiu Shen"}]}, {"paperId": "e95b97b143378e91acaf5b6e9110dbd5b1c4ed22", - "externalIds": {"MAG": "2461209907", "DBLP": "conf/eva/Bowen16", "DOI": "10.14236/EWIC/EVA2016.40", - "CorpusId": 38609997}, "url": "https://www.semanticscholar.org/paper/e95b97b143378e91acaf5b6e9110dbd5b1c4ed22", - "title": "Alan Turing: Virtuosity and visualisation", "abstract": "Alan Turing - (1912--1954) has been increasingly recognised as an important mathematician - who, despite his short life, developed mathematical ideas that today have - led to foundational aspects of computer science, especially with respect to - computability, artificial intelligence and morphogenesis (the growth of biological - patterns, important in mathematical biology). Some of Turing''s mathematics - and related ideas can be visualised in interesting and even artistic ways, - aided using software. In addition, a significant corpus of the historical - documentation on Turing can now be accessed online as a number of major archives - have digitised material related to Turing. This paper introduces some of the - major scientific work of Turing and ways in which it can be visualised, often - artistically. Turing''s fame has, especially since his centenary in 2012, - reached a level where he has had a cultural influence on the arts in general. - Although the story of Turing can be seen as one of tragedy, with his life - cut short, from a historical viewpoint Turing''s contribution to humankind - has been triumphant.", "venue": "EVA", "year": 2016, "referenceCount": 38, - "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2016-07-12", "journal": - {"name": "", "pages": "197-204", "volume": ""}, "authors": [{"authorId": "1772040", - "name": "Jonathan P. Bowen"}]}, {"paperId": "45c4bd862e968171d26e3154e55c605835f24936", - "externalIds": {"MAG": "2037700122", "DOI": "10.1017/S0022149X0002191X", "CorpusId": - 45039704, "PubMed": "6057048"}, "url": "https://www.semanticscholar.org/paper/45c4bd862e968171d26e3154e55c605835f24936", - "title": "Studies of Immunity to Fasciola hepatica: Acquired immunity in cattle, - sheep and rabbits following natural infection and vaccine procedures", "abstract": - "Investigations of acquired immunity to Fasciola hepatica in calves, sheep - and rabbits are described. With injections of extracts of imma- ture parasites - retarded growth of the challenge infection was observed between the 6th and - 7th week. Following a previous experience of a natural infection or viable - fluke implants, retardation and reduced take of the challenge infection were - observed. Considerable individual variation was present and the level of significance - between treatment and control groups was low.", "venue": "Journal of Helminthology", - "year": 1967, "referenceCount": 22, "citationCount": 39, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1967-12-01", "journal": {"name": "Journal of Helminthology", - "pages": "393 - 399", "volume": "41"}, "authors": [{"authorId": "2150935218", - "name": "J. Ross"}]}, {"paperId": "15e737ecbd4db677f322b11cc26413d3f2f7c352", - "externalIds": {"DBLP": "conf/conll/Powers98a", "ACL": "W98-1235", "MAG": - "2006304624", "DOI": "10.3115/1603899.1603947", "CorpusId": 38817769}, "url": - "https://www.semanticscholar.org/paper/15e737ecbd4db677f322b11cc26413d3f2f7c352", - "title": "The Total Turing Test and the Loebner Prize", "abstract": "The Loebner - Prize is the first, and only regular, competition based on the Turing Test, - but in order to stage the competition various modifications to the original - test have been made. In particular, the Grand Prize has a controversial and - as yet undefined Audio-Visual condition attached to it. This paper discusses - the value of the test with and without the A/V condition, and makes a proposal - about what the general nature of the A/V test should be.", "venue": "CoNLL", - "year": 1998, "referenceCount": 18, "citationCount": 20, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1998-01-11", "journal": {"pages": "279-280"}, "authors": [{"authorId": "144871539", - "name": "D. Powers"}]}, {"paperId": "61df15fd36048b9ef1f5ee225b9c3d5cc84f550d", - "externalIds": {"MAG": "2068739710", "DOI": "10.1007/S10910-008-9370-Y", "CorpusId": - 123373026}, "url": "https://www.semanticscholar.org/paper/61df15fd36048b9ef1f5ee225b9c3d5cc84f550d", - "title": "Formation and control of Turing patterns and phase fronts in photonics - and chemistry", "abstract": null, "venue": "", "year": 2008, "referenceCount": - 69, "citationCount": 18, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": - "Journal of Mathematical Chemistry", "pages": "95-112", "volume": "45"}, "authors": - [{"authorId": "48272648", "name": "G. Oppo"}]}, {"paperId": "f3049f46063228f88157859971bb9bb09448fa1c", - "externalIds": {"MAG": "2040504745", "DOI": "10.1177/002199837901300102", - "CorpusId": 137598760}, "url": "https://www.semanticscholar.org/paper/f3049f46063228f88157859971bb9bb09448fa1c", - "title": "Effects of Thermal Spiking on Graphite-Epoxy Composites", "abstract": - "Tests were performed evaluating the effects of thermal spikes on the moisture - absorption characteristics, the ultimate tensile strength, and the buckling - modulus of Thornel 300/Fiberite 1034 composites. Measurements were made on - unidirectional and \u03c0/4 laminates, using different types of thermal spikes. - A survey was also made of the existing data. This survey, together with the - present data indicate how thermal spikes affect the mois ture absorption and - the mechanical properties of different graphite-epoxy composites.", "venue": - "", "year": 1979, "referenceCount": 10, "citationCount": 38, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], - "publicationDate": "1979-01-01", "journal": {"name": "Journal of Composite - Materials", "pages": "17 - 34", "volume": "13"}, "authors": [{"authorId": - "104601538", "name": "A. Loos"}, {"authorId": "49215868", "name": "G. Springer"}]}, - {"paperId": "51410adf93de1288c4f929b49b90a4411e2f9e38", "externalIds": {"MAG": - "55178420", "CorpusId": 59671950}, "url": "https://www.semanticscholar.org/paper/51410adf93de1288c4f929b49b90a4411e2f9e38", - "title": "Promises and fault-tolerant database access", "abstract": "This - paper studies the power of access, especially fault-tolerant access, to probabilistic - databases and to unambiguous databases. We study fault-tolerant access to - probabilistic computation, and completely characterize the complexity classes - R and ZPP in terms of fault-tolerant database access. We also show that consistent - and inconsistent failure are in general interchangeable. .pp We study the - power of three types of access to unambiguous computation: nonadaptive access, - fault-tolerant access, and guarded access. (1) Though for NP it is known that - nonadaptive access has exponentially terse adaptive simulations, we show that - UP has no such relativizable simulations: there are worlds in which k+1-truth-table - access to UP is not subsumed by k-Turing access to UP, or even to NP machines - that are unambiguous on the questions actually asked. (2) Though fault-tolerant - access (i.e., ``1-helping'''''''' access) to NP is known to be no more powerful - than NP itself, we give both structural and relativized evidence that fault - tolerant access to UP suffices to recognize even sets beyond UP. Furthermore, - we completely characterize, in terms of locally positive reductions, the sets - that fault-tolerantly reduce to UP. (3) In guarded access, Grollmann and Selman''''s - natural notion of access to unambiguous computation, a deterministic polynomial-time - Turing machine asks questions to a nondeterministic polynomial-time Turing - machine in such a way that the nondeterministic machine never accepts ambiguously. - In contrast to guarded access, the standard notion of access to unambiguous - computation is that of access to a set that is uniformly unambiguous---even - for queries that it never will be asked by its questioner, it must be unambiguous. - We show that these notions, though the same for nonadaptive reductions, differ - for Turing and strong nondeterministic reductions.", "venue": "", "year": - 1993, "referenceCount": 0, "citationCount": 22, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1993-12-01", "journal": {"name": "", "pages": "101-146", "volume": ""}, "authors": - [{"authorId": "1678402", "name": "Jin-Yi Cai"}, {"authorId": "50095257", "name": - "L. Hemachandra"}, {"authorId": "3222707", "name": "J. Vyskoc"}]}, {"paperId": - "13cc70fc2736bb78b8bff847cbcde6497c51af12", "externalIds": {"MAG": "2017463008", - "DOI": "10.1088/1742-5468/2010/11/P11036", "CorpusId": 121553982}, "url": - "https://www.semanticscholar.org/paper/13cc70fc2736bb78b8bff847cbcde6497c51af12", - "title": "Pattern selection in a ratio-dependent predator\u2013prey model", - "abstract": "In this paper, we have presented Turing pattern selection in - a ratio-dependent predator\u2013prey model with zero-flux boundary conditions, - for which we have given a general survey of the linear stability analysis - and determined the condition of Turing instability, and derived amplitude - equations for the excited modes. From the amplitude equations, the stability - of patterns towards uniform and inhomogeneous perturbations is determined. - Furthermore, we have presented novel numerical evidence of typical Turing - patterns, and found that the model dynamics exhibits complex pattern replication: - in the range \u03bc1 < \u03bc \u2264 \u03bc2, the steady state is the only - stable solution of the model; in the range \u03bc2 < \u03bc \u2264 \u03bc4, - on increasing the control parameter \u03bc, the sequence H\u03c0-hexagons - -hexagon\u2013stripe mixture stripes -hexagon\u2013stripe mixture -hexagons - is observed; and when \u03bc > \u03bc4, an H0-hexagon\u2013stripe mixture - pattern emerges. This may enrich the pattern formation in a diffusive system.", - "venue": "", "year": 2010, "referenceCount": 55, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2010-11-23", "journal": - {"name": "Journal of Statistical Mechanics: Theory and Experiment", "pages": - "P11036", "volume": "2010"}, "authors": [{"authorId": "2116103578", "name": - "Weiming Wang"}, {"authorId": "2027512304", "name": "Yezhi Lin"}, {"authorId": - "48570313", "name": "F. Rao"}, {"authorId": "1720539", "name": "L. Zhang"}, - {"authorId": "1870339", "name": "Yong-ji Tan"}]}, {"paperId": "e7ed62279732f6d6346f09373c081878851248db", - "externalIds": {"MAG": "2161758731", "DOI": "10.1038/351464A0", "CorpusId": - 34933026}, "url": "https://www.semanticscholar.org/paper/e7ed62279732f6d6346f09373c081878851248db", - "title": "Prediction of fullerene packing in C60 and C70 crystals", "abstract": - null, "venue": "Nature", "year": 1991, "referenceCount": 11, "citationCount": - 264, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1991-06-06", "journal": {"name": "Nature", "pages": - "464-467", "volume": "351"}, "authors": [{"authorId": "40809411", "name": - "Yuejin Quo"}, {"authorId": "2065004", "name": "N. Karasawa"}, {"authorId": - "145066604", "name": "W. Goddard"}]}, {"paperId": "cb4c286e308ed819a316c5466f36f5892be41a91", - "externalIds": {"MAG": "1514471403", "CorpusId": 141839723}, "url": "https://www.semanticscholar.org/paper/cb4c286e308ed819a316c5466f36f5892be41a91", - "title": "Mind Design II: Philosophy, Psychology, Artificial Intelligence", - "abstract": "From the Publisher: \n\"Ming Design II is a welcome update of - its predecessor, itself a useful compendium on the philosophy of cognitive - science. This new volume retains the intellectual foundations, and some discussions - of classical AI built on them, while adding connectionism, situated AI, and - dynamic systems theory as extra storeys. Which of these is the most stable, - and whether the foundations need to be re-worked, are questions readers will - be eager to explore.\" \n-- Margaret A. Boden, Professor of Philosophy and - Psychology, University of Sussex, UK \n\"Haugeland''s Mind Design II brings - together nearly all the essential philosophical perspectives in Cognitive - Science. If you want to understand current opinion on the philosophy of mind, - you should make sure you are familiar with the contents of this book.\" \n-- - James L. McClelland, Carnegie Mellon University and the Center for the Neural - Basis of Cognition Mind design is the endeavor to understand mind (thinking, - intellect) in terms of its design (how it is built, how it works). Unlike - traditional empirical psychology, it is more oriented toward the \"how\" than - the \"what.\" An experiment in mind design is more likely to be an attempt - to build something and make it work--as in artificial intelligence--than to - observe or analyze what already exists. Mind design is psychology by reverse - engineering. \nWhen Mind Design was first published in 1981, it became a classic - in the then-nascent fields of cognitive science and AI. This second edition - retains four landmark essays from the first, adding to them one earlier milestone - (Turing''s \"Computing Machinery and Intelligence\") and eleven more recent - articles about connectionism, dynamical systems, and symbolic versus nonsymbolic - models. The contributors are divided about evenly between philosophers and - scientists. Yet all are \"philosophical\" in that they address fundamental - issues and concepts; and all are \"scientific\" in that they are technically - sophisticated and concerned with concrete empirical research. \nContributors: - Rodney A. Brooks, Paul M. Churchland, Andy Clark, Daniel C. Dennett, Hubert - L. Dreyfus, Jerry A. Fodor, Joseph Garon, John Haugeland, Marvin Minsky, Allen - Newell, Zenon W. Pylyshyn, William Ramsey, Jay F. Rosenberg, David E. Rumelhart, - John R. Searle, Herbert A. Simon, Paul Smolensky, Stephen Stich, A. M. Turing, - Timothy van Gelder", "venue": "", "year": 1997, "referenceCount": 202, "citationCount": - 139, "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "3081073", "name": "John Haugeland"}]}, {"paperId": "fc4583c1e9a5eba47d9f923bb4ea99a4bf489b2c", - "externalIds": {"ArXiv": "quant-ph/0506080", "DBLP": "journals/corr/abs-quant-ph-0506080", - "MAG": "1979697838", "DOI": "10.1007/s00220-006-0027-z", "CorpusId": 14532811}, - "url": "https://www.semanticscholar.org/paper/fc4583c1e9a5eba47d9f923bb4ea99a4bf489b2c", - "title": "Entropy and Quantum Kolmogorov Complexity: A Quantum Brudno\u2019s - Theorem", "abstract": null, "venue": "ArXiv", "year": 2005, "referenceCount": - 50, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2005-06-10", "journal": {"name": "Communications - in Mathematical Physics", "pages": "437-461", "volume": "265"}, "authors": - [{"authorId": "145180066", "name": "F. Benatti"}, {"authorId": "3398236", - "name": "T. Kr\u00fcger"}, {"authorId": "47076370", "name": "M. M\u00fcller"}, - {"authorId": "1403039951", "name": "R. Siegmund-Schultze"}, {"authorId": "3067308", - "name": "A. Szkola"}]}, {"paperId": "40b10da46c00a47ad1812cc2aaaaa0b24eb603a3", - "externalIds": {"MAG": "1964496762", "DOI": "10.13031/2013.35353", "CorpusId": - 109055034}, "url": "https://www.semanticscholar.org/paper/40b10da46c00a47ad1812cc2aaaaa0b24eb603a3", - "title": "The Nature of Corn Kernel Damage Inflicted in the Shelling Crescent - of Grain Combines", "abstract": "ABSTRACT THIS study investigated what percentage - of the corn kernel damage was caused by the cylinder and the concave before - and after the kernels were shelled from the cob and the effects of kernel - mois-ture contents, cylinder speeds, and the different con-cave zones on these - two categories of damage.", "venue": "", "year": 1978, "referenceCount": 7, - "citationCount": 30, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": "Engineering", - "source": "external"}, {"category": "Agricultural And Food Sciences", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "Transactions of the ASABE", "pages": "610-0614", "volume": "21"}, - "authors": [{"authorId": "97602256", "name": "M. H. Chowdhury"}, {"authorId": - "91751949", "name": "W. F. Buchele"}]}, {"paperId": "551dec4c5c0746e85a5e16d0b8e2f402e17fb7c9", - "externalIds": {"MAG": "2118448270", "DOI": "10.1093/imammb/dqt017", "CorpusId": - 39335110, "PubMed": "24087834"}, "url": "https://www.semanticscholar.org/paper/551dec4c5c0746e85a5e16d0b8e2f402e17fb7c9", - "title": "The sensitivity of Turing self-organization to biological feedback - delays: 2D models of fish pigmentation.", "abstract": "Turing morphogen models - have been extensively explored in the context of large-scale self-organization - in multicellular biological systems. However, reconciling the detailed biology - of morphogen dynamics, while accounting for time delays associated with gene - expression, reveals aberrant behaviours that are not consistent with early - developmental self-organization, especially the requirement for exquisite - temporal control. Attempts to reconcile the interpretation of Turing''s ideas - with an increasing understanding of the mechanisms driving zebrafish pigmentation - suggests that one should reconsider Turing''s model in terms of pigment cells - rather than morphogens (Nakamasu et al., 2009, PNAS, 106: , 8429-8434; Yamaguchi - et al., 2007, PNAS, 104: , 4790-4793). Here the dynamics of pigment cells - is subject to response delays implicit in the cell cycle and apoptosis. Hence - we explore simulations of fish skin patterning, focussing on the dynamical - influence of gene expression delays in morphogen-based Turing models and response - delays for cell-based Turing models. We find that reconciling the mechanisms - driving the behaviour of Turing systems with observations of fish skin patterning - remains a fundamental challenge.", "venue": "Mathematical medicine and biology - : a journal of the IMA", "year": 2015, "referenceCount": 0, "citationCount": - 12, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2015-03-01", "journal": {"name": "Mathematical medicine - and biology : a journal of the IMA", "pages": "\n 56-78\n ", - "volume": "32 1"}, "authors": [{"authorId": "2662569", "name": "E. Gaffney"}, - {"authorId": "37236426", "name": "S. S. Lee"}]}, {"paperId": "c659caa681bf2cc12ee583278bc9999f82f70d64", - "externalIds": {"DBLP": "conf/qosa/TangTHV08", "MAG": "1877076300", "DOI": - "10.1007/978-3-540-87879-7_2", "CorpusId": 16046249}, "url": "https://www.semanticscholar.org/paper/c659caa681bf2cc12ee583278bc9999f82f70d64", - "title": "Design Reasoning Improves Software Design Quality", "abstract": - null, "venue": "International ACM SIGSOFT Conference on Quality of Software - Architectures", "year": 2008, "referenceCount": 29, "citationCount": 51, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2008-10-14", "journal": {"pages": "28-42"}, "authors": - [{"authorId": "2947847", "name": "A. Tang"}, {"authorId": "145129840", "name": - "M. Tran"}, {"authorId": "144324730", "name": "Jun Han"}, {"authorId": "144884703", - "name": "H. V. Vliet"}]}, {"paperId": "b02428deab2bf2716a577456aad99ebd7fa74e1a", - "externalIds": {"MAG": "2739625405", "DOI": "10.1216/JIE-1988-1-2-203", "CorpusId": - 119783658}, "url": "https://www.semanticscholar.org/paper/b02428deab2bf2716a577456aad99ebd7fa74e1a", - "title": "Numerical solutions of integral equations on the half line II", - "abstract": "Numerical approximation schemes of quadra\u00ad ture type are - investigated for integral equations of the form /\u00bboo x(s) \u2014 / K(S - \u2014 t)x(t)dt = y(s), 0 < s < oo. /\u00bboo", "venue": "", "year": 1988, - "referenceCount": 9, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": - true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1988-06-01", "journal": {"name": - "Journal of Integral Equations and Applications", "pages": "203-226", "volume": - "1"}, "authors": [{"authorId": "91392720", "name": "P. Anselone"}, {"authorId": - "1728618", "name": "I. Sloan"}]}, {"paperId": "65ba7550c9a8e843d1f2c9758f23f6f64b197eb9", - "externalIds": {"MAG": "2003874726", "DOI": "10.1111/1540-6229.00659", "CorpusId": - 154101866}, "url": "https://www.semanticscholar.org/paper/65ba7550c9a8e843d1f2c9758f23f6f64b197eb9", - "title": "Market Microstructure and Real Estate Returns", "abstract": "This - paper examines the Real Estate Investment Trust (REIT) market microstruc-ture - and its relationship to stock returns. When compared with the general stock - market, REIT stocks tend to have a lower level of institutional investor participation - and are followed by fewer security analysts. In addition, REIT stocks that - have a higher percentage of institutional investors or are followed by more - security analysts tend to perform better than other REIT stocks. Our results - seem to confirm Jensen''s (1993, p. 868) proposition that ownership structure - (that is, who owns the firm''s securities) affects the value of the firm. - Our findings also have implications about the well documented phenomenon that - the financial performance of Commingled Real Estate Funds (CREFs) is better - than that of REITs. Copyright American Real Estate and Urban Economics Association.", - "venue": "", "year": 1995, "referenceCount": 24, "citationCount": 97, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": - [{"category": "Economics", "source": "external"}, {"category": "Economics", - "source": "s2-fos-model"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1995-03-01", "journal": {"name": - "Real Estate Economics", "pages": "85-100", "volume": "23"}, "authors": [{"authorId": - "2115938669", "name": "Ko Wang"}, {"authorId": "2054916692", "name": "John - Erickson"}, {"authorId": "103013300", "name": "George W. Gau"}, {"authorId": - "2148763860", "name": "Su Han Chan"}]}, {"paperId": "5ea5bb75c67daaba0d2cf8ac0ffa4349650aa26e", - "externalIds": {"MAG": "2006301099", "DBLP": "journals/tcs/Michel04", "DOI": - "10.1016/j.tcs.2004.05.008", "CorpusId": 12588795}, "url": "https://www.semanticscholar.org/paper/5ea5bb75c67daaba0d2cf8ac0ffa4349650aa26e", - "title": "Small Turing machines and generalized busy beaver competition", - "abstract": null, "venue": "Theoretical Computer Science", "year": 2004, "referenceCount": - 25, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-10-20", "journal": - {"name": "Theor. Comput. Sci.", "pages": "45-56", "volume": "326"}, "authors": - [{"authorId": "2068244973", "name": "Pascal Michel"}]}, {"paperId": "770493a22edcdd8eca93f77243efab94b7c61414", - "externalIds": {"MAG": "2241735797", "DOI": "10.1300/J229v02n02_02", "CorpusId": - 146198460}, "url": "https://www.semanticscholar.org/paper/770493a22edcdd8eca93f77243efab94b7c61414", + {"paperId": "079b7dd488eb36dda89f6797afb3ec29bb181722", "externalIds": {"MAG": + "2550794614", "CorpusId": 63009391}, "corpusId": 63009391, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/079b7dd488eb36dda89f6797afb3ec29bb181722", + "title": "Mathematics and computer science", "abstract": "We present a parallel + version of the storage modification machine. This model, called the Associative + Storage Modification Machine (ASMM), has the property that it can recognize + in polynomial time exactly what Turing machines can recognize in polynomial + space. The model therefore belongs to the Second Machine Class, consisting + of those parallel machine models that satisfy the parallel computation thesis. + The Associative Storage Modification Machine obtains its computational power + from following pointers in the reverse direction. 1985 AMS(MOS) 68Q05, 68Q10, + 68Q15.", "venue": "", "year": 1986, "referenceCount": 0, "citationCount": + 37, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "94649563", "name": "P. Houwen"}, + {"authorId": "1894322", "name": "B. Sommeijer"}, {"authorId": "1690674", "name": + "J. Verwer"}, {"authorId": "2870097", "name": "F. Wubs"}]}, {"paperId": "1c3c7dbf270efdab161a780d638be4631365e578", + "externalIds": {"MAG": "2563692677", "DBLP": "books/cu/HO2017", "DOI": "10.1017/9781316594179", + "CorpusId": 45270337}, "corpusId": 45270337, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/1c3c7dbf270efdab161a780d638be4631365e578", + "title": "The Measure of All Minds: Evaluating Natural and Artificial Intelligence", + "abstract": "Are psychometric tests valid for a new reality of artificial + intelligence systems, technology-enhanced humans, and hybrids yet to come? + Are the Turing Test, the ubiquitous CAPTCHAs, and the various animal cognition + tests the best alternatives? In this fascinating and provocative book, Jose + Hernandez-Orallo formulates major scientific questions, integrates the most + significant research developments, and offers a vision of the universal evaluation + of cognition. By replacing the dominant anthropocentric stance with a universal + perspective where living organisms are considered as a special case, long-standing + questions in the evaluation of behavior can be addressed in a wider landscape. + Can we derive task difficulty intrinsically? Is a universal g factor - a common + general component for all abilities - theoretically possible? Using algorithmic + information theory as a foundation, the book elaborates on the evaluation + of perceptual, developmental, social, verbal and collective features and critically + analyzes what the future of intelligence might look like.", "venue": "", "year": + 2017, "referenceCount": 873, "citationCount": 96, "influentialCitationCount": + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2017-01-11", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1398777358", "name": "J. Hern\u00e1ndez-Orallo"}]}, {"paperId": "43bc8721b9a9515d792e30d5af2f725ba0b3618a", + "externalIds": {"MAG": "2065618015", "DOI": "10.1098/rspb.1993.0092", "CorpusId": + 838828, "PubMed": "8397413"}, "corpusId": 838828, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/43bc8721b9a9515d792e30d5af2f725ba0b3618a", + "title": "Wave mechanisms of pattern formation in microbial populations", + "abstract": "The occurrence of spatially ordered structures plays an important + role in biology (examples: morphogenesis, ecosystems, dynamics of populations, + etc.). Turing proposed a reaction\u2014diffusion process that is the basis + for most theoretical studies of stationary biological pattern formation. Now, + when Turing structures are obtained in experiments (40 years after Turing\u2019s + publication), it is interesting to discover whether Turing structures are + the only mechanism used by nature in biological pattern formation. In microbial + growth, we have found experimental evidence of an alternative to the Turing + model that is based on waves displayed in excitable media. In studies of Escherichia + coli populations, we observed that interacting taxis waves create motionless + patterns. Taxis waves consuming two different substrates (serine and aspartic + acid) were involved. Taxis waves consuming serine stop when they collide. + However, those supported by consumption of aspartic were initiated at the + collision line. Colliding and annihilating in turn, the waves give rise to + stationary patten formation, and wave theory provides an alternative to the + classical Turing mechanism.", "venue": "Proceedings of the Royal Society of + London. Series B: Biological Sciences", "year": 1993, "referenceCount": 25, + "citationCount": 13, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1993-08-23", "journal": + {"name": "Proceedings of the Royal Society of London. Series B: Biological + Sciences", "pages": "131 - 135", "volume": "253"}, "authors": [{"authorId": + "46530384", "name": "K. Agladze"}, {"authorId": "13953228", "name": "L. Budrien\u0117"}, + {"authorId": "3974362", "name": "G. Ivanitsky"}, {"authorId": "2315612", "name": + "V. Krinsky"}, {"authorId": "92320502", "name": "V. Shakhbazyan"}, {"authorId": + "4973945", "name": "M. Tsyganov"}]}, {"paperId": "edad96c66ddc510015ef759926eadd6dc1ef6c98", + "externalIds": {"MAG": "2289243545", "CorpusId": 137765556}, "corpusId": 137765556, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/edad96c66ddc510015ef759926eadd6dc1ef6c98", + "title": "Interaction between Impurities and Welding Variables in Determining + GTA Weld Shape Depending on the trace elements in the base materials, identical + changes in welding variables can have an opposite effect on weld shape", "abstract": + "Variations in GTA weld shape, or penetration, have been shown in many cases + to arise from small changes in trace element content of the base metal. Heiple + and Roper have proposed that CTA weld shape is generally deter\u00ad mined + by fluid flow patterns in the weld pool, and that certain trace elements can + alter the fluid flow patterns by changing surface tension gradients on the + weld pool. The surface tension gradients will also be altered by changes in + tempera\u00ad ture gradients on the weld pool surface since the surface tension + is temperature dependent. We propose that the primary mechanism by which welding + parameter variations affect GTA weld shape is by changing the temperature + gradient on the weld pool surface through changes in the input power density. + A welding vari\u00ad able change which increases the input power density will + magnify the tempera\u00ad ture gradient, and thus the surface ten\u00ad sion + gradient, thereby driving the existing fluid flow pattern more strongly. Identical + changes in welding variables can there\u00ad fore produce opposite changes + in weld shape in materials with different trace element content. The effects + of current, travel speed, arc length, electrode tip angle, and torch gas composition + on GTA weld shape are reported for high purity and sulfur or selenium doped + 304 stain\u00ad less steel. All weld bead geometry changes caused by changing + welding variables were found to be consistent with the surface tension driven + fluid flow model.", "venue": "", "year": 1986, "referenceCount": 24, "citationCount": + 46, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Materials Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "94940644", + "name": "P. Burgardt"}, {"authorId": "69459938", "name": "C. R. Heiple"}]}, + {"paperId": "770493a22edcdd8eca93f77243efab94b7c61414", "externalIds": {"MAG": + "2241735797", "DOI": "10.1300/J229v02n02_02", "CorpusId": 146198460}, "corpusId": + 146198460, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/770493a22edcdd8eca93f77243efab94b7c61414", "title": "HMPAO SPECT Study of Regional Cerebral Blood Flow in Dissociative Identity Disorder", "abstract": "Abstract The aim of the study was to in ves ti gate if there were any char ac ter is tics of re gional c e re bral blood @@ -47957,138 +53827,603 @@ interactions: larger group of drugfree dissociative pa tients and var i ous psy chi at ric con trol groups would lead to more de fin i tive find ings.", "venue": "", "year": 2001, "referenceCount": 64, "citationCount": 54, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-09-21", - "journal": {"name": "Journal of Trauma & Dissociation", "pages": "25 - 5", - "volume": "2"}, "authors": [{"authorId": "5373196", "name": "V. \u015ear"}, - {"authorId": "49313974", "name": "S. Unal"}, {"authorId": "5436881", "name": - "E. Kiziltan"}, {"authorId": "7564802", "name": "T. Kundak\u00e7i"}, {"authorId": - "1805950131", "name": "E. Ozturk"}]}, {"paperId": "3f1d5ca1024e332dfd1ea5cf052f93d198842b8a", - "externalIds": {"MAG": "181751930", "DOI": "10.1007/978-0-585-26879-8_6", - "CorpusId": 141279153}, "url": "https://www.semanticscholar.org/paper/3f1d5ca1024e332dfd1ea5cf052f93d198842b8a", - "title": "Mathematical Formalism and Economic Explanation", "abstract": null, - "venue": "", "year": 1986, "referenceCount": 92, "citationCount": 55, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Economics", + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2001-09-21", "journal": {"name": "Journal of Trauma & Dissociation", "pages": + "25 - 5", "volume": "2"}, "authors": [{"authorId": "5373196", "name": "V. + \u015ear"}, {"authorId": "49313974", "name": "S. Unal"}, {"authorId": "5436881", + "name": "E. Kiziltan"}, {"authorId": "7564802", "name": "T. Kundak\u00e7i"}, + {"authorId": "1805950131", "name": "E. Ozturk"}]}, {"paperId": "c4cb90a67f45e7cbacb5286e934b309e89843922", + "externalIds": {"DBLP": "journals/jmlr/PerezBM21", "CorpusId": 233364065}, + "corpusId": 233364065, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c4cb90a67f45e7cbacb5286e934b309e89843922", + "title": "Attention is Turing-Complete", "abstract": "Alternatives to recurrent + neural networks, in particular, architectures based on self-attention, are + gaining momentum for processing input sequences. In spite of their relevance, + the computational properties of such networks have not yet been fully explored. + We study the computational power of the Transformer, one of the most paradigmatic + architectures exemplifying self-attention. We show that the Transformer with + hard-attention is Turing complete exclusively based on their capacity to compute + and access internal dense representations of the data. Our study also reveals + some minimal sets of elements needed to obtain this completeness result.", + "venue": "J. Mach. Learn. Res.", "year": 2021, "referenceCount": 31, "citationCount": + 10, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "J. Mach. Learn. Res.", "pages": "75:1-75:35", "volume": + "22"}, "authors": [{"authorId": "30501537", "name": "Jorge P\u00e9rez"}, {"authorId": + "35106192", "name": "P. Barcel\u00f3"}, {"authorId": "66941060", "name": "Javier + Marinkovic"}]}, {"paperId": "838164514b9711b742ce92b8f8b214a495398b31", "externalIds": + {"DBLP": "journals/simulation/Schroer89", "MAG": "2127320679", "DOI": "10.1177/003754978905300502", + "CorpusId": 46980447}, "corpusId": 46980447, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/838164514b9711b742ce92b8f8b214a495398b31", + "title": "A Simulation Assistant for Modeling Manufacturing Systems", "abstract": + "This paper presents a structured approach to modeling manufac turing systems. + The structured approach is accomplished through a simulation assistant consisting + of a set of predefined GPSS simulation macros, a user interface, and an automatic + code generator.", "venue": "Simul.", "year": 1989, "referenceCount": 13, "citationCount": + 23, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Engineering", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Engineering", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1989-11-01", "journal": {"name": "Simulation", "pages": "201 - 206", "volume": + "53"}, "authors": [{"authorId": "2156322", "name": "B. Schroer"}]}, {"paperId": + "7bd05a7c32789e5fdd8b5b80084f471d44d3179b", "externalIds": {"MAG": "2181877071", + "CorpusId": 17546416}, "corpusId": 17546416, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/7bd05a7c32789e5fdd8b5b80084f471d44d3179b", + "title": "An Electroid Switching Model for Reversible Computer Architectures", + "abstract": "The study of logical reversibiiity in computation has led to + a proliferation of unconventional architectural proposals, from Brownian-motion + clockwork Turing machines to billiard- ball Computers. An architectural model + for reversible computers is proposed herein, that is significantly closer + to the switch-level models used in designing actual digital circuitry. This + ue''electroid (electronics-like) model facilitates the direct application + of the substantial body of ezisting digital design techniques to reversible + and dissipation-limited architectures.", "venue": "", "year": 1993, "referenceCount": + 16, "citationCount": 38, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "pages": "179-240", "volume": ""}, "authors": [{"authorId": - "34958583", "name": "Philip Mirowski"}]}, {"paperId": "98e1277d5a401b6758c461a2a2a257f1c259a67e", - "externalIds": {"DBLP": "books/sp/02/Durand-Lose02", "MAG": "1541213536", - "DOI": "10.1007/978-1-4471-0129-1_6", "CorpusId": 118044332}, "url": "https://www.semanticscholar.org/paper/98e1277d5a401b6758c461a2a2a257f1c259a67e", - "title": "Computing Inside the Billiard Ball Model", "abstract": null, "venue": - "Collision-Based Computing", "year": 2002, "referenceCount": 25, "citationCount": - 13, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"pages": "135-160"}, - "authors": [{"authorId": "1387881959", "name": "J. Durand-Lose"}]}, {"paperId": - "43b5ba9c57f50634cf36398d5b1f2ce105adb8bd", "externalIds": {"MAG": "110490872", - "DOI": "10.6100/IR716374", "CorpusId": 117183540}, "url": "https://www.semanticscholar.org/paper/43b5ba9c57f50634cf36398d5b1f2ce105adb8bd", - "title": "From computability to executability : a process-theoretic view on - automata theory", "abstract": "The theory of automata and formal language - was devised in the 1930s to provide models for and to reason about computation. - Here we mean by computation a procedure that transforms input into output, - which was the sole mode of operation of computers at the time. Nowadays, computers - are systems that interact with us and also each other; they are non-deterministic, - reactive systems. Concurrency theory, split off from classical automata theory - a few decades ago, provides a model of computation similar to the model given - by the theory of automata and formal language, but focuses on concurrent, - reactive and interactive systems. This thesis investigates the integration - of the two theories, exposing the differences and similarities between them. - Where automata and formal language theory focuses on computations and languages, - concurrency theory focuses on behaviour. To achieve integration, we look for - process-theoretic analogies of classic results from automata theory. The most - prominent difference is that we use an interpretation of automata as labelled - transition systems modulo (divergence-preserving) branching bisimilarity instead - of treating automata as language acceptors. We also consider similarities - such as grammars as recursive specifications and finite automata as labelled - finite transition systems. We investigate whether the classical results still - hold and, if not, what extra conditions are sufficient to make them hold. - We especially look into three levels of Chomsky''s hierarchy: we study the - notions of finite-state systems, pushdown systems, and computable systems. - Additionally we investigate the notion of parallel pushdown systems. For each - class we define the central notion of automaton and its behaviour by associating - a transition system with it. Then we introduce a suitable specification language - and investigate the correspondence with the respective automaton (via its - associated transition system). Because we not only want to study interaction - with the environment, but also the interaction within the automaton, we make - it explicit by means of communicating parallel components: one component representing - the finite control of the automaton and one component representing the memory. - First, we study finite-state systems by reinvestigating the relation between - finite-state automata, left- and right-linear grammars, and regular expressions, - but now up to (divergence-preserving) branching bisimilarity. For pushdown - systems we augment the finite-state systems with stack memory to obtain the - pushdown automata and consider different termination styles: termination on - empty stack, on final state, and on final state and empty stack. Unlike for - language equivalence, up to (divergence-preserving) branching bisimilarity - the associated transition systems for the different termination styles fall - into different classes. We obtain (under some restrictions) the correspondence - between context-free grammars and pushdown automata for termination on final - state and empty stack. We show how for contrasimulation, a weaker equivalence - than branching bisimilarity, we can obtain the correspondence result without - some of the restrictions. Finally, we make the interaction within a pushdown - automaton explicit, but in a different way depending on the termination style. - By analogy of pushdown systems we investigate the parallel pushdown systems, - obtained by augmenting finite-state systems with bag memory, and consider - analogous termination styles. We investigate the correspondence between context-free - grammars that use parallel composition instead of sequential composition and - parallel pushdown automata. While the correspondence itself is rather tight, - it unfortunately only covers a small subset of the parallel pushdown automata, - i.e. the single-state parallel pushdown automata. When making the interaction - within parallel pushdown automata explicit, we obtain a rather uniform result - for all termination styles. Finally, we study computable systems and the relation - with exective and computable transition systems and Turing machines. For this - we present the reactive Turing machine, a classical Turing machine augmented - with capabilities for interaction. Again, we make the interaction in the reactive - Turing machine between its finite control and the tape memory explicit.", - "venue": "", "year": 2011, "referenceCount": 201, "citationCount": 57, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144376499", - "name": "van Pja Paul Tilburg"}]}, {"paperId": "315e297cc269c9c22e61c1a069c60c793aff20e3", - "externalIds": {"MAG": "1963966113", "DBLP": "journals/mima/WarwickSM13", - "DOI": "10.1007/s11023-013-9301-y", "CorpusId": 13933358}, "url": "https://www.semanticscholar.org/paper/315e297cc269c9c22e61c1a069c60c793aff20e3", - "title": "Some Implications of a Sample of Practical Turing Tests", "abstract": - null, "venue": "Minds and Machines", "year": 2013, "referenceCount": 39, "citationCount": - 21, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Psychology", "Computer Science"], "s2FieldsOfStudy": [{"category": "Psychology", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-05-01", "journal": {"name": "Minds - and Machines", "pages": "163-177", "volume": "23"}, "authors": [{"authorId": - "143636026", "name": "K. Warwick"}, {"authorId": "2731715", "name": "Huma - Shah"}, {"authorId": "31925555", "name": "J. Moor"}]}, {"paperId": "fa786b7870e60127067a600ce3dbaab054e73781", - "externalIds": {"MAG": "1964261292", "DOI": "10.1093/bjps/41.1.143", "CorpusId": - 119924252}, "url": "https://www.semanticscholar.org/paper/fa786b7870e60127067a600ce3dbaab054e73781", - "title": "The Turing\u2014Good Weight of Evidence Function and Popper''s Measure - of the Severity of a Test*", "abstract": "During the Second World War, Turing - worked with a team of British cryptanalysts at Bletchley on deciphering the - German Enigma Code. As part of the successful attempt at decipherment, Turing - developed what he called the ''score'' or ''decibannage''. After the war, - this function was renamed ''weight of evidence'' by Good, who has studied - its properties in a long series of books and papers, some of which are mentioned - in the list of references. Although Turing was probably working within the - subjective Bayesian tradition of Ramsey, it will be argued in what follows - that the Turing-Good weight of evidence function is not in fact Bayesian in - character, but is closely related to Popper''s measure of the severity of - a test. This gives, so it is claimed, a better interpretation of the Turing-Good - function, and an explanation of its practical success. I will next briefly - trace the steps which led to the introduction of the Turing-Good Weight of - Evidence function. The novelty in Turing''s approach is that he did not deal - directly with probabilities P(h, e) or P(h), but with odds Od(h, e) or Od(h), - where Od(h) is the odds in favour of h. Od and P are related by the equation:", - "venue": "British Journal for the Philosophy of Science", "year": 1990, "referenceCount": - 9, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "34217312", + "name": "J. Storrs"}]}, {"paperId": "82e3f12081f98629059c7f17b530db643bdf4c44", + "externalIds": {"MAG": "616965722", "DOI": "10.1007/978-94-011-9751-9", "CorpusId": + 107035293}, "corpusId": 107035293, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82e3f12081f98629059c7f17b530db643bdf4c44", + "title": "Explosive Welding, Forming and Compaction", "abstract": null, "venue": + "", "year": 1983, "referenceCount": 0, "citationCount": 250, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-94-011-9751-9%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "92599610", + "name": "T. Blazynski"}]}, {"paperId": "1df603fe258c85cf61aefe0c053c5836b6ce3f77", + "externalIds": {"MAG": "2530077886", "DBLP": "journals/mscs/Bazhenov18", "DOI": + "10.1017/S096012951600030X", "CorpusId": 3742308}, "corpusId": 3742308, "publicationVenue": + {"id": "1a00fc67-b5a0-4dae-993c-023e6c11659a", "name": "Mathematical Structures + in Computer Science", "type": "journal", "alternate_names": ["Math Struct + Comput Sci"], "issn": "0960-1295", "url": "https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science", + "alternate_urls": ["http://journals.cambridge.org/action/displayJournal?jid=MSC", + "http://journals.cambridge.org/MSC"]}, "url": "https://www.semanticscholar.org/paper/1df603fe258c85cf61aefe0c053c5836b6ce3f77", + "title": "Autostability spectra for decidable structures", "abstract": "We + study autostability spectra relative to strong constructivizations (SC-autostability + spectra). For a decidable structure $\\mathcal{S}$ , the SC-autostability + spectrum of $\\mathcal{S}$ is the set of all Turing degrees capable of computing + isomorphisms among arbitrary decidable copies of $\\mathcal{S}$ . The degree + of SC-autostability for $\\mathcal{S}$ is the least degree in the spectrum + (if such a degree exists). We prove that for a computable successor ordinal + \u03b1, every Turing degree c.e. in and above 0 (\u03b1) is the degree of + SC-autostability for some decidable structure. We show that for an infinite + computable ordinal \u03b2, every Turing degree c.e. in and above 0 (2\u03b2+1) + is the degree of SC-autostability for some discrete linear order. We prove + that the set of all PA-degrees is an SC-autostability spectrum. We also obtain + similar results for autostability spectra relative to n-constructivizations.", + "venue": "Mathematical Structures in Computer Science", "year": 2016, "referenceCount": + 48, "citationCount": 17, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-10-14", "journal": {"name": "Mathematical Structures in Computer Science", + "pages": "392 - 411", "volume": "28"}, "authors": [{"authorId": "144737615", + "name": "N. Bazhenov"}]}, {"paperId": "c229655d0de7bf5322cc29c9167bd6e8106e6ead", + "externalIds": {"MAG": "1551050533", "DOI": "10.1002/rcs.1570", "CorpusId": + 19678624, "PubMed": "24442995"}, "corpusId": 19678624, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c229655d0de7bf5322cc29c9167bd6e8106e6ead", + "title": "A novel modification of the Turing test for artificial intelligence + and robotics in healthcare", "abstract": "The increasing demands of delivering + higher quality global healthcare has resulted in a corresponding expansion + in the development of computer\u2010based and robotic healthcare tools that + rely on artificially intelligent technologies. The Turing test was designed + to assess artificial intelligence (AI) in computer technology. It remains + an important qualitative tool for testing the next generation of medical diagnostics + and medical robotics.", "venue": "The international journal of medical robotics + + computer assisted surgery : MRCAS", "year": 2015, "referenceCount": 15, + "citationCount": 27, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Medicine", "source": + "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2015-03-01", "journal": + {"name": "The International Journal of Medical Robotics and Computer Assisted + Surgery", "pages": "38 - 43", "volume": "11"}, "authors": [{"authorId": "46370967", + "name": "H. Ashrafian"}, {"authorId": "11388466", "name": "A. Darzi"}, {"authorId": + "2659182", "name": "T. Athanasiou"}]}, {"paperId": "76948859a0b056e2edc02b21ab96690c72cc25f0", + "externalIds": {"DBLP": "journals/jsyml/GurevichL84", "MAG": "1995628728", + "DOI": "10.2307/2274101", "CorpusId": 27968346}, "corpusId": 27968346, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/76948859a0b056e2edc02b21ab96690c72cc25f0", + "title": "The word problem for cancellation semigroups with zero", "abstract": + "By the word problem for some class of algebraic structures we mean the problem + of determining, given a finite set E of equations between words (i.e. terms) + and an additional equation x = y, whether x = y must hold in all structures + satisfying each member of E. In 1947 Post [P] showed the word problem for + semigroups to be undecidable. This result was strengthened in 1950 by Turing, + who showed the word problem to be undecidable for cancellation semigroups,i.e. + semigroups satisfying the cancellation property Novikov [N] eventually showed + the word problem for groups to be undecidable. (Many flaws in Turing''s proof + were corrected by Boone [B]. Even after his corrections, at least one problem + remains; the sentence on line 16 of p. 502 of [T] does not follow if one relation + is principal and the other is a commutation relation. A corrected and somewhat + simplified version of Turing''s proof can be built on the construction given + here.) In 1966 Gurevich [G] showed the word problem to be undecidable for + finite semigroups. However, this result on finite structures has not been + extended to cancellation semigroups or groups; indeed it is easy to see that + a finite cancellation semigroup is a group, so both questions are the same. + We do not here settle the word problem for finite groups, but we do show that + the word problem is undecidable for finite semigroups with zero (that is, + having an element 0 such that x0 = 0x = 0 for all x) satisfying an approximation + to the cancellation property (1).", "venue": "Journal of Symbolic Logic (JSL)", + "year": 1984, "referenceCount": 13, "citationCount": 25, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1984-03-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "184 - 191", "volume": "49"}, "authors": [{"authorId": "1721396", + "name": "Y. Gurevich"}, {"authorId": "2085355252", "name": "H. R. Lewis"}]}, + {"paperId": "e7ed62279732f6d6346f09373c081878851248db", "externalIds": {"MAG": + "2161758731", "DOI": "10.1038/351464A0", "CorpusId": 34933026}, "corpusId": + 34933026, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/e7ed62279732f6d6346f09373c081878851248db", + "title": "Prediction of fullerene packing in C60 and C70 crystals", "abstract": + null, "venue": "Nature", "year": 1991, "referenceCount": 11, "citationCount": + 264, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1991-06-06", "journal": {"name": + "Nature", "pages": "464-467", "volume": "351"}, "authors": [{"authorId": "40809411", + "name": "Yuejin Quo"}, {"authorId": "2065004", "name": "N. Karasawa"}, {"authorId": + "145066604", "name": "W. Goddard"}]}, {"paperId": "8ac21d03fd32105842daf446d5004b44572412a7", + "externalIds": {"MAG": "120037107", "DOI": "10.1090/conm/257/04040", "CorpusId": + 115622963}, "corpusId": 115622963, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8ac21d03fd32105842daf446d5004b44572412a7", + "title": "Natural Definability in Degree Structures", "abstract": "A major + focus of research in computability theory in recent years has involved definability + issues in degree structures. There has been much success in getting general + results by coding methods that translate first or second order arithmetic + into the structures. In this paper we concentrate on the issues of getting + definitions of interesting, apparently external, relations on degrees that + are order-theoretically natural in the structures D and R of all the Turing + degrees and of the r.e. Turing degrees, respectively. Of course, we have no + formal definition of natural but we offer some guidelines, examples and suggestions + for further research.", "venue": "", "year": 1999, "referenceCount": 28, "citationCount": + 20, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "1817824", "name": "R. Shore"}]}, + {"paperId": "3f5df20ed034cced5bd3ae3e13138f1dacb8c1b8", "externalIds": {"MAG": + "2524153186", "DBLP": "conf/sofsem/Cooper06", "DOI": "10.1007/11611257_1", + "CorpusId": 18392473}, "corpusId": 18392473, "publicationVenue": {"id": "74136324-6e61-46d3-912f-8be85580ef40", + "name": "Conference on Current Trends in Theory and Practice of Informatics", + "type": "conference", "alternate_names": ["SOFSEM", "Conf Curr Trends Theory + Pract Informatics"]}, "url": "https://www.semanticscholar.org/paper/3f5df20ed034cced5bd3ae3e13138f1dacb8c1b8", + "title": "How Can Nature Help Us Compute?", "abstract": null, "venue": "Conference + on Current Trends in Theory and Practice of Informatics", "year": 2006, "referenceCount": + 43, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2006-01-21", "journal": {"pages": "1-13"}, "authors": + [{"authorId": "98630872", "name": "S. Cooper"}]}, {"paperId": "c724fa27d4d74b3f0479e450a497432658d71824", + "externalIds": {"DBLP": "journals/ce/PereiraZM10", "MAG": "2086474590", "DOI": + "10.1016/j.compedu.2010.03.009", "CorpusId": 38524806}, "corpusId": 38524806, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c724fa27d4d74b3f0479e450a497432658d71824", + "title": "Learning computer programming: Implementing a fractal in a Turing + Machine", "abstract": null, "venue": "Comput. Educ.", "year": 2010, "referenceCount": + 18, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-09-01", "journal": {"name": "Comput. Educ.", "pages": + "767-776", "volume": "55"}, "authors": [{"authorId": "153471840", "name": + "H. Pereira"}, {"authorId": "2031939", "name": "G. F. Zebende"}, {"authorId": + "35087366", "name": "M. Moret"}]}, {"paperId": "048742725638a0cc8e11f8f4eb06658b422b052a", + "externalIds": {"DBLP": "journals/ipl/DowneyG08", "MAG": "1978758779", "DOI": + "10.1016/j.ipl.2008.05.028", "CorpusId": 776243}, "corpusId": 776243, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/048742725638a0cc8e11f8f4eb06658b422b052a", + "title": "Turing degrees of reals of positive effective packing dimension", + "abstract": null, "venue": "Inf. Process. Lett.", "year": 2008, "referenceCount": + 45, "citationCount": 25, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.mcs.vuw.ac.nz/~downey/publications/packing-united.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-11-01", "journal": {"name": "Inf. Process. Lett.", "pages": "298-303", + "volume": "108"}, "authors": [{"authorId": "145948982", "name": "R. Downey"}, + {"authorId": "34695773", "name": "Noam Greenberg"}]}, {"paperId": "42de93097991c172b201ff32b98dabea333b0a93", + "externalIds": {"MAG": "405637517", "DOI": "10.5860/choice.47-1466", "CorpusId": + 122482407}, "corpusId": 122482407, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/42de93097991c172b201ff32b98dabea333b0a93", + "title": "Models of Computation: An Introduction to Computability Theory", + "abstract": "A Concise Introduction to Computation Models and Computability + Theory provides an introduction to the essential concepts in computability, + using several models of computation, from the standard Turing Machines and + Recursive Functions, to the modern computation models inspired by quantum + physics. An in-depth analysis of the basic concepts underlying each model + of computation is provided. Divided into two parts, the first highlights the + traditional computation models used in the first studies on computability: + - Automata and Turing Machines; - Recursive functions and the Lambda-Calculus; + - Logic-based computation models. and the second part covers object-oriented + and interaction-based models. There is also a chapter on concurrency, and + a final chapter on emergent computation models inspired by quantum mechanics. + At the end of each chapter there is a discussion on the use of computation + models in the design of programming languages.", "venue": "", "year": 2009, + "referenceCount": 0, "citationCount": 27, "influentialCitationCount": 0, "isOpenAccess": + true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-1-84882-434-8%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-04-14", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "72683008", + "name": "M. Fernndez"}]}, {"paperId": "0763c0fb9278d20e107140cc85e1610ffc681471", + "externalIds": {"MAG": "142821862", "DOI": "10.1017/9781316755884.016", "CorpusId": + 12193717}, "corpusId": 12193717, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0763c0fb9278d20e107140cc85e1610ffc681471", + "title": "Aspects of the Turing Jump", "abstract": "X \u2032 is the canonical + example of a set which is definable from X but not recursive in X. The Turing + degree of X \u2032 depends only on the Turing degree of X, so the jump induces + an increasing function on the Turing degrees D. In this paper, we will discuss + two aspects of the jump and its iterations. First, we will show that they + are implicitly characterized by general properties of relative definability. + Second, we will present the Shore and Slaman [1999] theorem that the function + x 7\u2192 x\u2032 is first order definable in the Turing degrees. Finally, + we will pose analogous questions about the relation y is recursively enumerable + in x and discuss what is known about them. Our discussion will rest on two + technical facts, which are generalizations of the following two theorems.", + "venue": "", "year": 2002, "referenceCount": 12, "citationCount": 11, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2867082", + "name": "T. Slaman"}]}, {"paperId": "0efcf3f2c53080762a31250c73c5cac88ccfe928", + "externalIds": {"MAG": "1540848378", "DBLP": "conf/ifipTCS/LeeuwenW00", "DOI": + "10.1007/3-540-44929-9_48", "CorpusId": 24196041}, "corpusId": 24196041, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0efcf3f2c53080762a31250c73c5cac88ccfe928", + "title": "On the Power of Interactive Computing", "abstract": null, "venue": + "IFIP TCS", "year": 2000, "referenceCount": 45, "citationCount": 14, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F3-540-44929-9_48.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Review"], "publicationDate": "2000-08-17", "journal": {"pages": "619-623"}, + "authors": [{"authorId": "143817739", "name": "J. V. Leeuwen"}, {"authorId": + "1815433", "name": "J. Wiedermann"}]}, {"paperId": "3e19efdca5654a11fb1e3a956c36517c47f42d4a", + "externalIds": {"MAG": "2145453084", "DOI": "10.1002/anie.200806036", "CorpusId": + 38177114, "PubMed": "19378313"}, "corpusId": 38177114, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3e19efdca5654a11fb1e3a956c36517c47f42d4a", + "title": "One-step synthesis and characterization of gold-hollow PbS(x) hybrid + nanoparticles.", "abstract": "Turing lead into gold: Hollow hybrid PbS(x)-Au + nanostructures of about 10 nm in diameter were synthesized using a one-step + reaction under mild experimental conditions. The redox reaction of gold precursors + with PbS nanocrystals in the presence of dodecylamine leads to the hollow + feature of hybrid nanostructures (see picture).", "venue": "Angewandte Chemie", + "year": 2009, "referenceCount": 44, "citationCount": 29, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2009-05-18", "journal": {"name": "Angewandte Chemie", + "pages": "\n 3991-5\n ", "volume": "48 22"}, "authors": [{"authorId": + "2146236968", "name": "Jian Yang"}, {"authorId": "13057878", "name": "Junjun + Peng"}, {"authorId": "47835341", "name": "Qingbo Zhang"}, {"authorId": "145285835", + "name": "F. Peng"}, {"authorId": "93109075", "name": "Hongjuan Wang"}, {"authorId": + "144545517", "name": "Hao Yu"}]}, {"paperId": "5ea5bb75c67daaba0d2cf8ac0ffa4349650aa26e", + "externalIds": {"MAG": "2006301099", "DBLP": "journals/tcs/Michel04", "DOI": + "10.1016/j.tcs.2004.05.008", "CorpusId": 12588795}, "corpusId": 12588795, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/5ea5bb75c67daaba0d2cf8ac0ffa4349650aa26e", + "title": "Small Turing machines and generalized busy beaver competition", + "abstract": null, "venue": "Theoretical Computer Science", "year": 2004, "referenceCount": + 25, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-10-20", "journal": {"name": "Theor. Comput. Sci.", "pages": "45-56", + "volume": "326"}, "authors": [{"authorId": "2068244973", "name": "Pascal Michel"}]}, + {"paperId": "47e1aef5e41f9b6faa8fc15df3539540a5be8c1f", "externalIds": {"DBLP": + "journals/tsp/BocheSP20", "MAG": "3021198511", "DOI": "10.1109/TSP.2020.2993165", + "CorpusId": 218938474}, "corpusId": 218938474, "publicationVenue": {"id": + "1f6f3f05-6a23-42f0-8d31-98ab8089c1f2", "name": "IEEE Transactions on Signal + Processing", "type": "journal", "alternate_names": ["IEEE Trans Signal Process"], + "issn": "1053-587X", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=78", + "alternate_urls": ["http://www.signalprocessingsociety.org/publications/periodicals/tsp/", + "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=78"]}, "url": "https://www.semanticscholar.org/paper/47e1aef5e41f9b6faa8fc15df3539540a5be8c1f", + "title": "Denial-of-Service Attacks on Communication Systems: Detectability + and Jammer Knowledge", "abstract": "Wireless communication systems are inherently + vulnerable to intentional jamming. In this paper, two classes of such jammers + are considered: those with partial and full knowledge. While the first class + accounts for those jammers that know the encoding and decoding function, the + latter accounts for those that are further aware of the actual transmitted + message. Of particular interest are so-called denial-of-service (DoS) attacks + in which the jammer is able to completely disrupt any transmission. Accordingly, + it is of crucial interest for the legitimate users to detect such adversarial + DoS attacks. This paper develops a detection framework based on Turing machines. + Turing machines have no limitations on computational complexity and computing + capacity and storage and can simulate any given algorithm. For both scenarios + of a jammer with partial and full knowledge, it is shown that there exists + no Turing machine which can decide whether or not a DoS attack is possible + for a given channel and the corresponding decision problem is undecidable. + On the other hand, it is shown for both scenarios that it is possible to algorithmically + characterize those channels for which a DoS attack is not possible. This means + that it is possible to detect those scenarios in which the jammer is not able + to disrupt the communication. For all other channels, the Turing machine does + not stop and runs forever making this decision problem semidecidable. Finally, + it is shown that additional coordination resources such as common randomness + make the communication robust against such attacks.", "venue": "IEEE Transactions + on Signal Processing", "year": 2020, "referenceCount": 50, "citationCount": + 18, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2020-05-08", "journal": {"name": "IEEE Transactions on Signal Processing", + "pages": "3754-3768", "volume": "68"}, "authors": [{"authorId": "1688021", + "name": "H. Boche"}, {"authorId": "2307454", "name": "R. Schaefer"}, {"authorId": + "145967056", "name": "H. Poor"}]}, {"paperId": "fb41146b93371f2bb2e8e9bb76c2ce2fdc4a1f7f", + "externalIds": {"MAG": "2117086529", "DOI": "10.1088/0951-7715/22/10/012", + "CorpusId": 27587277}, "corpusId": 27587277, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fb41146b93371f2bb2e8e9bb76c2ce2fdc4a1f7f", + "title": "Interaction of Turing patterns with an external linear morphogen + gradient", "abstract": "We investigate a simple generic model of a reaction\u2013diffusion + system consisting of an activator and an inhibitor molecule in the presence + of a linear morphogen gradient. We assume that this morphogen gradient is + established independently of the reaction\u2013diffusion system and acts by + increasing the production of the activator proportional to the morphogen concentration. + The model is motivated by several existing models in developmental biology + in which a Turing patterning mechanism is proposed and various chemical gradients + are known to be important for development. Mathematically, this leads to reaction\u2013diffusion + equations with explicit spatial dependence. We investigate how the Turing + pattern is affected, if it exists. We also show that in the parameter range + where a Turing pattern is not possible, the system may nevertheless produce + \u2018Turing-like\u2019 patterns.", "venue": "", "year": 2009, "referenceCount": + 20, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1990-03-01", "journal": {"name": - "The British Journal for the Philosophy of Science", "pages": "143 - 146", - "volume": "41"}, "authors": [{"authorId": "144903192", "name": "D. Gillies"}]}, - {"paperId": "362667384bc8a297bf31f2ed49d360ef0441722b", "externalIds": {"MAG": - "2045427966", "DBLP": "conf/focs/Statman77", "DOI": "10.1109/SFCS.1977.34", - "CorpusId": 33619596}, "url": "https://www.semanticscholar.org/paper/362667384bc8a297bf31f2ed49d360ef0441722b", + "publicationTypes": null, "publicationDate": "2009-10-01", "journal": {"name": + "Nonlinearity", "pages": "2541 - 2560", "volume": "22"}, "authors": [{"authorId": + "1965886", "name": "T. Glimm"}, {"authorId": "50560952", "name": "Jianying + Zhang"}, {"authorId": "1928791", "name": "Yun-Qiu Shen"}]}, {"paperId": "19b6c93c0181fb4e8b2c28896088525d2487e179", + "externalIds": {"CorpusId": 247625747}, "corpusId": 247625747, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/19b6c93c0181fb4e8b2c28896088525d2487e179", + "title": "HILBERT\u2019S TENTH PROBLEM AND MAZUR\u2019S CONJECTURE FOR LARGE + SUBRINGS OF Q", "abstract": "Hilbert\u2019s Tenth Problem, in modern terms, + was to find an algorithm (Turing machine) to decide, given a polynomial equation + f(x1, . . . , xn) = 0 with coefficients in Z, whether it has a solution with + x1, . . . , xn \u2208 Z. Y. Matijasevi\u010d [Mat70], building on earlier + work of M. Davis, H. Putnam, and J. Robinson [DPR61], showed that no such + algorithm exists. If one replaces Z in both places by a different commutative + ring R (let us assume its elements can be and have been encoded for input + into a Turing machine), one obtains a different question, called Hilbert\u2019s + Tenth Problem over R, whose answer depends on R. These problems are discussed + in detail in [DLPVG00]. In particular, the answer for R = Q is unknown. Hilbert\u2019s + Tenth Problem over Q is equivalent to the general problem of deciding whether + a variety over Q has a rational point. One approach to proving that Hilbert\u2019s + Tenth Problem over Q has a negative answer would be to deduce this from Matijasevi\u010d\u2019s + theorem for Z, by showing that Z is diophantine over Q in the following sense: + Definition 1.1. Let R be a ring, and let A \u2286 R. Then A is diophantine + over R if and only if there exists a polynomial f in m+ n variables with coefficients + in R such that A = { a \u2208 R | \u2203x \u2208 R such that f(a, x) = 0 }.", + "venue": "", "year": 2003, "referenceCount": 30, "citationCount": 46, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1703241", + "name": "B. Poonen"}]}, {"paperId": "b02428deab2bf2716a577456aad99ebd7fa74e1a", + "externalIds": {"MAG": "2739625405", "DOI": "10.1216/JIE-1988-1-2-203", "CorpusId": + 119783658}, "corpusId": 119783658, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b02428deab2bf2716a577456aad99ebd7fa74e1a", + "title": "Numerical solutions of integral equations on the half line II", + "abstract": "Numerical approximation schemes of quadra\u00ad ture type are + investigated for integral equations of the form /\u00bboo x(s) \u2014 / K(S + \u2014 t)x(t)dt = y(s), 0 < s < oo. /\u00bboo", "venue": "", "year": 1988, + "referenceCount": 9, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": + true, "openAccessPdf": {"url": "https://projecteuclid.org/journals/journal-of-integral-equations-and-applications/volume-1/issue-2/Numerical-solutions-of-integral-equations-on-the-half-line-II/10.1216/JIE-1988-1-2-203.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1988-06-01", + "journal": {"name": "Journal of Integral Equations and Applications", "pages": + "203-226", "volume": "1"}, "authors": [{"authorId": "91392720", "name": "P. + Anselone"}, {"authorId": "1728618", "name": "I. Sloan"}]}, {"paperId": "e42146f9e83139a76131e076a58b1e71456a1f90", + "externalIds": {"MAG": "2337047092", "CorpusId": 2906590}, "corpusId": 2906590, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e42146f9e83139a76131e076a58b1e71456a1f90", + "title": "The Dawn of Software Engineering: From Turing to Dijkstra", "abstract": + "Did Alan Turing play a major role in the advent of the all-purpose computer? + Did Turing Award winners, like Edsger W. Dijkstra, depend on his famous accomplishments? + In his well-researched book The Dawn of Software Engineering: from Turing + to Dijkstra, Edgar G. Daylight deromanticizes Turing''s & logic''s role in + the history of computing. Dijkstra''s pioneering work in compilers lies at + the heart of modern-day computers. The book vividly describes how & why Dijkstra''s + ideas stood out among those of his contemporaries. This book includes interviews + with Turing Award winners Tony Hoare, Niklaus Wirth, Peter Naur, and Barbara + Liskov. The Dawn of Software Engineering is a rich and fascinating account + of the time when software engineering was a compelling intellectual discipline + at the center of computer science. John C. Reynolds, CMU wonderfully novel, + very readable, and most engaging Grady Booch, IBM Fellow a very deserving + contribution to understanding the influence of fundamental results of science + onto practice Manfred Broy, TUM", "venue": "", "year": 2012, "referenceCount": + 64, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2012-04-12", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1745926", "name": "E. Daylight"}, {"authorId": "2199747", "name": "N. Wirth"}, + {"authorId": "1398067785", "name": "T. Hoare"}, {"authorId": "1720373", "name": + "B. Liskov"}, {"authorId": "1733249", "name": "P. Naur"}, {"authorId": "3038786", + "name": "K. Grave"}]}, {"paperId": "8da20de0d1920eee2279382d47930e622323849c", + "externalIds": {"DBLP": "conf/dsd/ClermidyLPKT09", "MAG": "2156193159", "DOI": + "10.1109/DSD.2009.200", "CorpusId": 107064}, "corpusId": 107064, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8da20de0d1920eee2279382d47930e622323849c", + "title": "An Open and Reconfigurable Platform for 4G Telecommunication: Concepts + and Application", "abstract": "Advanced telecommunication applications require + more and more flexibility. Static and run-time configuration mechanisms, as + well as plug-in computing units are two solutions to solve this issue. In + this paper, we propose an open architec- ture, dedicated to complex data-flow + applications, fulfilling these requirements thanks to a distributed configuration + scheme and a standard interface for data flow computing units. Based on this + architecture, an open platform demonstrator has been designed. Simulation + results on a 3GPP/LTE application are presented, showing a reconfiguration + time overhead of only 2.6%.", "venue": "2009 12th Euromicro Conference on + Digital System Design, Architectures, Methods and Tools", "year": 2009, "referenceCount": + 11, "citationCount": 54, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2009-08-27", "journal": {"name": "2009 + 12th Euromicro Conference on Digital System Design, Architectures, Methods + and Tools", "pages": "449-456"}, "authors": [{"authorId": "1738545", "name": + "F. Clermidy"}, {"authorId": "36725494", "name": "R. Lemaire"}, {"authorId": + "2232339", "name": "X. Popon"}, {"authorId": "3347861", "name": "D. Kt\u00e9nas"}, + {"authorId": "1699829", "name": "Y. Thonnart"}]}, {"paperId": "6589d95fc32de78e0da5d188f3d39b94cd196c99", + "externalIds": {"MAG": "2090087086", "DBLP": "journals/jei/LepistoKV05", "DOI": + "10.1117/1.2149872", "CorpusId": 14142553}, "corpusId": 14142553, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6589d95fc32de78e0da5d188f3d39b94cd196c99", + "title": "Rock image classification using color features in Gabor space", + "abstract": "In image classification, the common texture-based meth- ods are + based on image gray levels. However, the use of color information improves + the classification accuracy of the colored tex- tures. In this paper, we extract + texture features from the natural rock images that are used in bedrock investigations. + A Gaussian band- pass filtering is applied to the color channels of the images + in RGB and HSI color spaces using different scales. The obtained feature vectors + are low dimensional, which make the methods computation- ally effective. The + results show that using combinations of different color channels, the classification + accuracy can be significantly", "venue": "J. Electronic Imaging", "year": + 2005, "referenceCount": 9, "citationCount": 55, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.spiedigitallibrary.org/journals/Journal-of-Electronic-Imaging/volume-14/issue-4/040503/Rock-image-classification-using-color-features-in-Gabor-space/10.1117/1.2149872.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2005-10-01", "journal": {"name": "J. Electronic Imaging", + "pages": "040503", "volume": "14"}, "authors": [{"authorId": "1789257", "name": + "Leena Lepist\u00f6"}, {"authorId": "1801978", "name": "I. Kunttu"}, {"authorId": + "145835582", "name": "A. Visa"}]}, {"paperId": "fc4583c1e9a5eba47d9f923bb4ea99a4bf489b2c", + "externalIds": {"ArXiv": "quant-ph/0506080", "DBLP": "journals/corr/abs-quant-ph-0506080", + "MAG": "1979697838", "DOI": "10.1007/s00220-006-0027-z", "CorpusId": 14532811}, + "corpusId": 14532811, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fc4583c1e9a5eba47d9f923bb4ea99a4bf489b2c", + "title": "Entropy and Quantum Kolmogorov Complexity: A Quantum Brudno\u2019s + Theorem", "abstract": null, "venue": "ArXiv", "year": 2005, "referenceCount": + 50, "citationCount": 30, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/0506080", "status": + "GREEN"}, "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2005-06-10", "journal": + {"name": "Communications in Mathematical Physics", "pages": "437-461", "volume": + "265"}, "authors": [{"authorId": "145180066", "name": "F. Benatti"}, {"authorId": + "3398236", "name": "T. Kr\u00fcger"}, {"authorId": "47076370", "name": "M. + M\u00fcller"}, {"authorId": "1403039951", "name": "R. Siegmund-Schultze"}, + {"authorId": "3067308", "name": "A. Szkola"}]}, {"paperId": "15e737ecbd4db677f322b11cc26413d3f2f7c352", + "externalIds": {"DBLP": "conf/conll/Powers98a", "ACL": "W98-1235", "MAG": + "2006304624", "DOI": "10.3115/1603899.1603947", "CorpusId": 38817769}, "corpusId": + 38817769, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15e737ecbd4db677f322b11cc26413d3f2f7c352", + "title": "The Total Turing Test and the Loebner Prize", "abstract": "The Loebner + Prize is the first, and only regular, competition based on the Turing Test, + but in order to stage the competition various modifications to the original + test have been made. In particular, the Grand Prize has a controversial and + as yet undefined Audio-Visual condition attached to it. This paper discusses + the value of the test with and without the A/V condition, and makes a proposal + about what the general nature of the A/V test should be.", "venue": "CoNLL", + "year": 1998, "referenceCount": 18, "citationCount": 20, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=1603947&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1998-01-11", "journal": {"pages": "279-280"}, "authors": [{"authorId": "144871539", + "name": "D. Powers"}]}, {"paperId": "caf45e16f1a8f52cf02a057a3986d5ea160e4d78", + "externalIds": {"DBLP": "journals/jsyml/DowneyL97", "MAG": "2069623377", "DOI": + "10.2307/2275639", "CorpusId": 123573925}, "corpusId": 123573925, "publicationVenue": + {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal of Symbolic + Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log", "Journal + of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/caf45e16f1a8f52cf02a057a3986d5ea160e4d78", + "title": "Contiguity and distributivity in the enumerable Turing degrees", + "abstract": "Abstract We prove that a (recursively) enumerable degree is contiguous + iff it is locally distributive. This settles a twenty-year old question going + back to Ladner and Sasso. We also prove that strong contiguity and contiguity + coincide, settling a question of the first author, and prove that no m-topped + degree is contiguous, settling a question of the first author and Carl Jockusch + [11]. Finally, we prove some results concerning local distributivity and relativized + weak truth table reducibility.", "venue": "Journal of Symbolic Logic (JSL)", + "year": 1997, "referenceCount": 31, "citationCount": 25, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1997-12-01", "journal": {"name": "Journal + of Symbolic Logic", "pages": "1215 - 1240", "volume": "62"}, "authors": [{"authorId": + "145948982", "name": "R. Downey"}, {"authorId": "2805805", "name": "S. Lempp"}]}, + {"paperId": "fb33d71629417a21cf63b657b27ef5a029a42db5", "externalIds": {"MAG": + "569234442", "DOI": "10.1007/978-3-7091-6306-1", "CorpusId": 5327549}, "corpusId": + 5327549, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fb33d71629417a21cf63b657b27ef5a029a42db5", + "title": "Pollen and Pollination", "abstract": null, "venue": "Springer Vienna", + "year": 2000, "referenceCount": 9, "citationCount": 46, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-7091-6306-1%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "4318209", "name": "A. + Dafni"}, {"authorId": "87812367", "name": "M. Hesse"}, {"authorId": "3836330", + "name": "E. Pacini"}]}, {"paperId": "4bdafc897ab463bbfbe3edfd042adb573d8f4bc9", + "externalIds": {"MAG": "2137129210", "DOI": "10.1890/04-0095", "CorpusId": + 59500370}, "corpusId": 59500370, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4bdafc897ab463bbfbe3edfd042adb573d8f4bc9", + "title": "INFLUENCE OF BARRIERS TO MOVEMENT ON WITHIN\u2010WATERSHED GENETIC + VARIATION OF COASTAL CUTTHROAT TROUT", "abstract": "Because human land use + activities often result in increased fragmentation of aquatic and terrestrial + habitats, a better understanding of the effects of fragmentation on the genetic + heterogeneity of animal populations may be useful for effective management. + We used eight microsatellites to examine the genetic structure of coastal + cutthroat trout (Oncorhynchus clarki clarki) in Camp Creek, an isolated headwater + stream in western Oregon. Our objectives were to determine if coastal cutthroat + trout were genetically struc- tured within streams and to assess the effects + of natural and anthropogenic barriers on coastal cutthroat trout genetic variation. + Fish sampling occurred at 10 locations, and allele frequencies differed significantly + among all sampling sections. Dispersal barriers strongly influenced coastal + cutthroat trout genetic structure and were associated with reduced genetic + diversity and increased genetic differentiation. Results indicate that Camp + Creek coastal cutthroat trout exist as many small, partially independent populations + that are strongly affected by genetic drift. In headwater streams, barriers + to movement can result in genetic and demographic isolation leading to reduced + coastal cutthroat trout genetic diversity, and potentially compromising long-term + population persistence. When habitat fragmentation eliminates gene flow among + small populations, similar results may occur in other species.", "venue": + "", "year": 2005, "referenceCount": 58, "citationCount": 258, "influentialCitationCount": + 20, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2005-04-01", "journal": {"name": "Ecological Applications", + "pages": "628-637", "volume": "15"}, "authors": [{"authorId": "21520775", + "name": "J. E. Wofford"}, {"authorId": "3603980", "name": "R. Gresswell"}, + {"authorId": "2735035", "name": "M. Banks"}]}, {"paperId": "362667384bc8a297bf31f2ed49d360ef0441722b", + "externalIds": {"MAG": "2045427966", "DBLP": "conf/focs/Statman77", "DOI": + "10.1109/SFCS.1977.34", "CorpusId": 33619596}, "corpusId": 33619596, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/362667384bc8a297bf31f2ed49d360ef0441722b", "title": "The typed \u03bb-calculus is not elementary recursive", "abstract": "Historically, the principal interest in the typed \u03bb-calculus is in connection with Godel''s functional (\"Dialectica\") interpretation''of intuitionistic @@ -48104,95 +54439,12 @@ interactions: (for example, the question of whether a given type contains a closed term).", "venue": "18th Annual Symposium on Foundations of Computer Science (sfcs 1977)", "year": 1977, "referenceCount": 25, "citationCount": 96, "influentialCitationCount": - 8, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1977-09-30", "journal": {"name": "18th Annual Symposium on Foundations of - Computer Science (sfcs 1977)", "pages": "90-94"}, "authors": [{"authorId": - "1821243", "name": "R. Statman"}]}, {"paperId": "f09b148377b866fe3eec6c9e58712f2cfb3ecb90", - "externalIds": {"MAG": "2974750717", "DOI": "10.1088/1361-6595/ab45e4", "CorpusId": - 203942984}, "url": "https://www.semanticscholar.org/paper/f09b148377b866fe3eec6c9e58712f2cfb3ecb90", - "title": "Turing patterns on a plasma-liquid interface", "abstract": "Radially - symmetric patterns are observed in pin-to-plane DC plasma systems where a - liquid solution is used as a planar resistive anode. The size and structure - of these patterns depends on the plasma current and salt concentration of - the liquid anode. We propose that these patterns initiate due to the reaction - and diffusion of electrons in the anode sheath, where electron impact ionization - serves as an autocatalytic reaction. The resulting system of reaction-diffusion - equations is amenable to Turing stability analysis, which we use to theoretically - predict the transition from a uniform plasma to a ring-shaped pattern state. - Expressing the stability criteria in terms of plasma current and solution - salt concentration, we derive a theoretical phase boundary for the onset of - pattern formation, which is in excellent agreement with experimental results.", - "venue": "Plasma Sources Science & Technology", "year": 2019, "referenceCount": - 40, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Materials Science"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Materials Science", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2019-10-21", "journal": {"name": "Plasma Sources - Science and Technology", "volume": "28"}, "authors": [{"authorId": "6106058", - "name": "P. Rumbach"}, {"authorId": "20748111", "name": "A. Lindsay"}, {"authorId": - "2463134", "name": "D. Go"}]}, {"paperId": "a74f665078a77a144d5d7035a9a22ebea3c08398", - "externalIds": {"MAG": "2954386378", "ArXiv": "1404.0545", "DBLP": "journals/corr/Given-Wilson14", - "DOI": "10.4204/EPTCS.166.4", "CorpusId": 17419147}, "url": "https://www.semanticscholar.org/paper/a74f665078a77a144d5d7035a9a22ebea3c08398", - "title": "An Intensional Concurrent Faithful Encoding of Turing Machines", - "abstract": "The benchmark for computation is typically given as Turing computability; - the ability for a computation to be performed by a Turing Machine. Many languages - exploit (indirect) encodings of Turing Machines to demonstrate their ability - to support arbitrary computation. However, these encodings are usually by - simulating the entire Turing Machine within the language, or by encoding a - language that does an encoding or simulation itself. This second category - is typical for process calculi that show an encoding of lambda-calculus (often - with restrictions) that in turn simulates a Turing Machine. Such approaches - lead to indirect encodings of Turing Machines that are complex, unclear, and - only weakly equivalent after computation. This paper presents an approach - to encoding Turing Machines into intensional process calculi that is faithful, - reduction preserving, and structurally equivalent. The encoding is demonstrated - in a simple asymmetric concurrent pattern calculus before generalised to simplify - infinite terms, and to show encodings into Concurrent Pattern Calculus and - Psi Calculi.", "venue": "International Conference on Information and Computation - Economies", "year": 2014, "referenceCount": 53, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-04-02", "journal": {"pages": "21-37"}, "authors": - [{"authorId": "1401782411", "name": "Thomas Given-Wilson"}]}, {"paperId": - "82e3f12081f98629059c7f17b530db643bdf4c44", "externalIds": {"MAG": "616965722", - "DOI": "10.1007/978-94-011-9751-9", "CorpusId": 107035293}, "url": "https://www.semanticscholar.org/paper/82e3f12081f98629059c7f17b530db643bdf4c44", - "title": "Explosive Welding, Forming and Compaction", "abstract": null, "venue": - "", "year": 1983, "referenceCount": 0, "citationCount": 249, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "92599610", - "name": "T. Blazynski"}]}, {"paperId": "cb356548bc07d833b14a7a89b85da4f65a71b039", - "externalIds": {"MAG": "2810126555", "DBLP": "journals/jns/MoussaPS19", "DOI": - "10.1007/s00332-018-9480-z", "CorpusId": 59621876}, "url": "https://www.semanticscholar.org/paper/cb356548bc07d833b14a7a89b85da4f65a71b039", - "title": "Backward Parabolicity, Cross-Diffusion and Turing Instability", - "abstract": null, "venue": "Journal of nonlinear science", "year": 2018, "referenceCount": - 32, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Computer Science", "source": + 8, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-06-26", "journal": {"name": "Journal - of Nonlinear Science", "pages": "139-162", "volume": "29"}, "authors": [{"authorId": - "48642588", "name": "A. Moussa"}, {"authorId": "30823929", "name": "B. Perthame"}, - {"authorId": "3092607", "name": "Delphine Salort"}]}, {"paperId": "a00d5d7bf827f2e54dfee3957e739d0cdbd5a207", - "externalIds": {"DBLP": "journals/siamads/GhazaryanS07", "MAG": "2044106245", - "DOI": "10.1137/060670262", "CorpusId": 16400742}, "url": "https://www.semanticscholar.org/paper/a00d5d7bf827f2e54dfee3957e739d0cdbd5a207", - "title": "Nonlinear Convective Instability of Turing-Unstable Fronts near - Onset: A Case Study", "abstract": "Fronts are traveling waves in spatially - extended systems that connect two different spatially homogeneous rest states. - If the rest state behind the front undergoes a supercritical Turing instabilit...", - "venue": "SIAM J. Appl. Dyn. Syst.", "year": 2007, "referenceCount": 31, "citationCount": - 18, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2007-04-24", "journal": {"name": "SIAM J. Appl. Dyn. Syst.", - "pages": "319-347", "volume": "6"}, "authors": [{"authorId": "1952736", "name": - "A. Ghazaryan"}, {"authorId": "2699904", "name": "B. Sandstede"}]}]} + ["JournalArticle"], "publicationDate": "1977-09-30", "journal": {"name": "18th + Annual Symposium on Foundations of Computer Science (sfcs 1977)", "pages": + "90-94"}, "authors": [{"authorId": "1821243", "name": "R. Statman"}]}]} ' headers: @@ -48201,31 +54453,31 @@ interactions: Connection: - keep-alive Content-Length: - - '172628' + - '191721' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:53 GMT + - Tue, 03 Jan 2023 20:53:21 GMT Via: - - 1.1 8da76114c1a768b0c3d48129d1415a7c.cloudfront.net (CloudFront) + - 1.1 5e1439d2277c06dce3f7e9e4522a4c20.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - 9Int_AlxIYTqWaG5nbh5Wm-eIsWGu4giYgW-9GHNtrWQAzsVmpGSAw== + - 9FOmVrka6c9qtraPsXTBuSTnvOl1YQSEk-CQ7rRJ_ICe9EiX3JeXcA== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detJfGFcvHcF2vw= + - eLxWNFF4PHcFoQg= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '172628' + - '191721' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:53 GMT + - Tue, 03 Jan 2023 20:53:21 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 3601accd-80b5-48c5-92ef-d8cae2460c91 + - 762a9128-44df-41f4-8ab7-d6d1e9bbe46b status: code: 200 message: OK @@ -48241,56 +54493,772 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2300&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2300&limit=100 response: body: - string: '{"total": 65539, "offset": 2300, "next": 2400, "data": [{"paperId": - "fb33d71629417a21cf63b657b27ef5a029a42db5", "externalIds": {"MAG": "569234442", - "DOI": "10.1007/978-3-7091-6306-1", "CorpusId": 5327549}, "url": "https://www.semanticscholar.org/paper/fb33d71629417a21cf63b657b27ef5a029a42db5", - "title": "Pollen and Pollination", "abstract": null, "venue": "Springer Vienna", - "year": 2000, "referenceCount": 9, "citationCount": 45, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental + string: '{"total": 65730, "offset": 2300, "next": 2400, "data": [{"paperId": + "afaae8591456819c58aaa9baafaeaaa8a9d972ff", "externalIds": {"MAG": "2338747497", + "DBLP": "journals/corr/SchoenickCTTE16", "ArXiv": "1604.04315", "DOI": "10.1145/3122814", + "CorpusId": 6383047}, "corpusId": 6383047, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/afaae8591456819c58aaa9baafaeaaa8a9d972ff", + "title": "Moving beyond the Turing Test with the Allen AI Science Challenge", + "abstract": "Answering questions correctly from standardized eighth-grade + science tests is itself a test of machine intelligence.", "venue": "Communications + of the ACM", "year": 2016, "referenceCount": 17, "citationCount": 49, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1604.04315", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Education", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2016-04-14", "journal": {"name": "Communications of the ACM", "pages": "60 + - 64", "volume": "60"}, "authors": [{"authorId": "3393851", "name": "Carissa + Schoenick"}, {"authorId": "48323507", "name": "Peter Clark"}, {"authorId": + "3385516", "name": "Oyvind Tafjord"}, {"authorId": "1689647", "name": "Peter + D. Turney"}, {"authorId": "1741101", "name": "Oren Etzioni"}]}, {"paperId": + "c659caa681bf2cc12ee583278bc9999f82f70d64", "externalIds": {"DBLP": "conf/qosa/TangTHV08", + "MAG": "1877076300", "DOI": "10.1007/978-3-540-87879-7_2", "CorpusId": 16046249}, + "corpusId": 16046249, "publicationVenue": {"id": "73e1a745-220c-46b8-b3cf-8a2baa239e90", + "name": "International ACM SIGSOFT Conference on Quality of Software Architectures", + "type": "conference", "alternate_names": ["Quality of Software Architectures", + "QoSA", "Int ACM SIGSOFT Conf Qual Softw Archit", "Qual Softw Archit"]}, "url": + "https://www.semanticscholar.org/paper/c659caa681bf2cc12ee583278bc9999f82f70d64", + "title": "Design Reasoning Improves Software Design Quality", "abstract": + null, "venue": "International ACM SIGSOFT Conference on Quality of Software + Architectures", "year": 2008, "referenceCount": 29, "citationCount": 51, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2008-10-14", "journal": + {"pages": "28-42"}, "authors": [{"authorId": "2947847", "name": "A. Tang"}, + {"authorId": "145129840", "name": "M. Tran"}, {"authorId": "144324730", "name": + "Jun Han"}, {"authorId": "144884703", "name": "H. V. Vliet"}]}, {"paperId": + "e10cbc26433cb2da5c5bdabd7f41a5480536d2f3", "externalIds": {"DBLP": "journals/sigcse/Hannay92", + "MAG": "2009380537", "DOI": "10.1145/130962.130971", "CorpusId": 21903885}, + "corpusId": 21903885, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e10cbc26433cb2da5c5bdabd7f41a5480536d2f3", + "title": "Hypercard automata simulation: finite-state, pushdown and Turing + machines", "abstract": "This paper describes a package of highly interactive + simulation models for the concepts taught in Theory of Computing courses. + Macintosh Hypercard stacks are used to demonstrate the three basic automata + models: Finite-State Machines, Push-Down Machines, and Turing Machines. These + simulations feature multiple named machines on the same stack, accessible + via a customized menu or buttons on the screen. Because of the scripts hidden + behind the visible screen, with just a click of a butto students can alter + starting states, the set of input symbols, the number of states, the finality + of states, or the action based on a given state/input combination. These simulations + have been successfully used in conjunction with a course on the Theory of + Computing at Union College since 1989. Students have responded enthusiastically + to this concrete method of teaching abstract concepts.", "venue": "SGCS", + "year": 1992, "referenceCount": 11, "citationCount": 21, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1992-06-01", "journal": + {"name": "ACM SIGCSE Bull.", "pages": "55-58", "volume": "24"}, "authors": + [{"authorId": "2242833", "name": "D. Hannay"}]}, {"paperId": "33de241c5afe0941650a43620aee84ea7a75377f", + "externalIds": {"MAG": "2897537125", "DOI": "10.20944/PREPRINTS201810.0218.V1", + "CorpusId": 70271467}, "corpusId": 70271467, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/33de241c5afe0941650a43620aee84ea7a75377f", + "title": "Deep Learning: A Review", "abstract": "Deep learning is an emerging + area of machine learning (ML) research. It comprises multiple hidden layers + of artificial neural networks. The deep learn- ing methodology applies nonlinear + transformations and model abstractions of high level in large databases. The + recent advancements in deep learning architec- tures within numerous fields + have already provided significant contributions in artificial intelligence. + This article presents a state of the art survey on the contri- butions and + the novel applications of deep learning. The following review chron- ologically + presents how and in what major applications deep learning algorithms have + been utilized. Furthermore, the superior and beneficial of the deep learning + methodology and its hierarchy in layers and nonlinear operations are presented + and compared with the more conventional algorithms in the common applica- + tions. The state of the art survey further provides a general overview on + the novel concept and the ever-increasing advantages and popularity of deep + learning.", "venue": "", "year": 2018, "referenceCount": 51, "citationCount": + 96, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.preprints.org/manuscript/201810.0218/v1/download", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2018-10-10", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "2053336352", "name": "R. Vargas"}, {"authorId": "144007228", "name": "Amir + Mosavi"}, {"authorId": "144526402", "name": "R. Ruiz"}]}, {"paperId": "fa786b7870e60127067a600ce3dbaab054e73781", + "externalIds": {"MAG": "1964261292", "DOI": "10.1093/bjps/41.1.143", "CorpusId": + 119924252}, "corpusId": 119924252, "publicationVenue": {"id": "ccf23a34-337a-4763-916a-9c16c580e0e1", + "name": "British Journal for the Philosophy of Science", "type": "journal", + "alternate_names": ["Br J Philos Sci", "The British Journal for the Philosophy + of Science"], "issn": "0007-0882", "url": "https://www.journals.uchicago.edu/toc/bjps/current", + "alternate_urls": ["https://www.jstor.org/journal/britjphilscie", "http://bjps.oxfordjournals.org/"]}, + "url": "https://www.semanticscholar.org/paper/fa786b7870e60127067a600ce3dbaab054e73781", + "title": "The Turing\u2014Good Weight of Evidence Function and Popper''s Measure + of the Severity of a Test*", "abstract": "During the Second World War, Turing + worked with a team of British cryptanalysts at Bletchley on deciphering the + German Enigma Code. As part of the successful attempt at decipherment, Turing + developed what he called the ''score'' or ''decibannage''. After the war, + this function was renamed ''weight of evidence'' by Good, who has studied + its properties in a long series of books and papers, some of which are mentioned + in the list of references. Although Turing was probably working within the + subjective Bayesian tradition of Ramsey, it will be argued in what follows + that the Turing-Good weight of evidence function is not in fact Bayesian in + character, but is closely related to Popper''s measure of the severity of + a test. This gives, so it is claimed, a better interpretation of the Turing-Good + function, and an explanation of its practical success. I will next briefly + trace the steps which led to the introduction of the Turing-Good Weight of + Evidence function. The novelty in Turing''s approach is that he did not deal + directly with probabilities P(h, e) or P(h), but with odds Od(h, e) or Od(h), + where Od(h) is the odds in favour of h. Od and P are related by the equation:", + "venue": "British Journal for the Philosophy of Science", "year": 1990, "referenceCount": + 9, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "4318209", - "name": "A. Dafni"}, {"authorId": "87812367", "name": "M. Hesse"}, {"authorId": - "3836330", "name": "E. Pacini"}]}, {"paperId": "98e1277d5a401b6758c461a2a2a257f1c259a67e", + "1990-03-01", "journal": {"name": "The British Journal for the Philosophy + of Science", "pages": "143 - 146", "volume": "41"}, "authors": [{"authorId": + "144903192", "name": "D. Gillies"}]}, {"paperId": "5ea5bb75c67daaba0d2cf8ac0ffa4349650aa26e", + "externalIds": {"MAG": "2006301099", "DBLP": "journals/tcs/Michel04", "DOI": + "10.1016/j.tcs.2004.05.008", "CorpusId": 12588795}, "corpusId": 12588795, + "publicationVenue": {"id": "93644c5d-eeed-4394-8d63-4eb9216ba3e3", "name": + "Theoretical Computer Science", "type": "journal", "alternate_names": ["Theor + Comput Sci"], "issn": "0304-3975", "url": "http://www.elsevier.com/locate/tcs", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/505625/description#description", + "http://www.sciencedirect.com/science/journal/03043975"]}, "url": "https://www.semanticscholar.org/paper/5ea5bb75c67daaba0d2cf8ac0ffa4349650aa26e", + "title": "Small Turing machines and generalized busy beaver competition", + "abstract": null, "venue": "Theoretical Computer Science", "year": 2004, "referenceCount": + 25, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-10-20", "journal": {"name": "Theor. Comput. Sci.", "pages": "45-56", + "volume": "326"}, "authors": [{"authorId": "2068244973", "name": "Pascal Michel"}]}, + {"paperId": "e2b100240ac1ae3264ad441fbc0d81f0cdba0572", "externalIds": {"MAG": + "1965601957", "DOI": "10.2307/2687743", "CorpusId": 60759613}, "corpusId": + 60759613, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e2b100240ac1ae3264ad441fbc0d81f0cdba0572", + "title": "Engines of Logic: Mathematicians and the Origin of the Computer", + "abstract": "From the Publisher: \nComputers are everywhere today\u0097at + work, in the bank, in artist''s studios, in our pockets\u0097yet they remain + to many of us objects of irreducible mystery. How can today''s computers perform + such a bewildering variety of tasks if computing is just glorified arithmetic? + The answer, as Martin Davis lucidly illustrates, lies in the fact that computers + are engines of logic. Their hardware and software embody concepts developed + over centuries by logicians such as Leibniz, Boole, and Godel, culminating + in the amazing insights of Alan Turing. Readers will come away from this book + with a revelatory understanding of how and why computers work. 8 b/w photographs. + Published in hardcover as The Universal Computer. \nAuthor Biography: Martin + Davis''s other books include Computability and Unsolvability. A professor + emeritus at New York University, he is currently a visiting scholar at the + University of California-Berkeley.", "venue": "", "year": 2001, "referenceCount": + 0, "citationCount": 94, "influentialCitationCount": 7, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Art", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "100651835", + "name": "Martin Davis"}]}, {"paperId": "cb356548bc07d833b14a7a89b85da4f65a71b039", + "externalIds": {"MAG": "2810126555", "DBLP": "journals/jns/MoussaPS19", "DOI": + "10.1007/s00332-018-9480-z", "CorpusId": 59621876}, "corpusId": 59621876, + "publicationVenue": {"id": "619f4cc3-1d00-4060-b88d-9854843ac2c2", "name": + "Journal of nonlinear science", "type": "journal", "alternate_names": ["J + Nonlinear Sci", "Journal of Nonlinear Science", "J nonlinear sci"], "issn": + "0938-8974", "url": "https://link.springer.com/journal/332"}, "url": "https://www.semanticscholar.org/paper/cb356548bc07d833b14a7a89b85da4f65a71b039", + "title": "Backward Parabolicity, Cross-Diffusion and Turing Instability", + "abstract": null, "venue": "Journal of nonlinear science", "year": 2018, "referenceCount": + 32, "citationCount": 12, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://hal.archives-ouvertes.fr/hal-01626324/file/ABD26102017.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-26", "journal": + {"name": "Journal of Nonlinear Science", "pages": "139-162", "volume": "29"}, + "authors": [{"authorId": "48642588", "name": "A. Moussa"}, {"authorId": "30823929", + "name": "B. Perthame"}, {"authorId": "3092607", "name": "Delphine Salort"}]}, + {"paperId": "51410adf93de1288c4f929b49b90a4411e2f9e38", "externalIds": {"MAG": + "55178420", "CorpusId": 59671950}, "corpusId": 59671950, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/51410adf93de1288c4f929b49b90a4411e2f9e38", + "title": "Promises and fault-tolerant database access", "abstract": "This + paper studies the power of access, especially fault-tolerant access, to probabilistic + databases and to unambiguous databases. We study fault-tolerant access to + probabilistic computation, and completely characterize the complexity classes + R and ZPP in terms of fault-tolerant database access. We also show that consistent + and inconsistent failure are in general interchangeable. .pp We study the + power of three types of access to unambiguous computation: nonadaptive access, + fault-tolerant access, and guarded access. (1) Though for NP it is known that + nonadaptive access has exponentially terse adaptive simulations, we show that + UP has no such relativizable simulations: there are worlds in which k+1-truth-table + access to UP is not subsumed by k-Turing access to UP, or even to NP machines + that are unambiguous on the questions actually asked. (2) Though fault-tolerant + access (i.e., ``1-helping'''''''' access) to NP is known to be no more powerful + than NP itself, we give both structural and relativized evidence that fault + tolerant access to UP suffices to recognize even sets beyond UP. Furthermore, + we completely characterize, in terms of locally positive reductions, the sets + that fault-tolerantly reduce to UP. (3) In guarded access, Grollmann and Selman''''s + natural notion of access to unambiguous computation, a deterministic polynomial-time + Turing machine asks questions to a nondeterministic polynomial-time Turing + machine in such a way that the nondeterministic machine never accepts ambiguously. + In contrast to guarded access, the standard notion of access to unambiguous + computation is that of access to a set that is uniformly unambiguous---even + for queries that it never will be asked by its questioner, it must be unambiguous. + We show that these notions, though the same for nonadaptive reductions, differ + for Turing and strong nondeterministic reductions.", "venue": "", "year": + 1993, "referenceCount": 0, "citationCount": 22, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1993-12-01", "journal": {"name": + "", "pages": "101-146", "volume": ""}, "authors": [{"authorId": "1678402", + "name": "Jin-Yi Cai"}, {"authorId": "50095257", "name": "L. Hemachandra"}, + {"authorId": "3222707", "name": "J. Vyskoc"}]}, {"paperId": "f09b148377b866fe3eec6c9e58712f2cfb3ecb90", + "externalIds": {"MAG": "2974750717", "DOI": "10.1088/1361-6595/ab45e4", "CorpusId": + 203942984}, "corpusId": 203942984, "publicationVenue": {"id": "d3fecf6f-8c3d-4857-90d8-eb3c56818357", + "name": "Plasma Sources Science & Technology", "type": "journal", "alternate_names": + ["Plasma Sources Science and Technology", "Plasma Source Sci Technol", "Plasma + Source Sci Technol"], "issn": "0963-0252", "url": "https://iopscience.iop.org/0963-0252", + "alternate_urls": ["http://iopscience.iop.org/1009-0630", "http://iopscience.org/psst"]}, + "url": "https://www.semanticscholar.org/paper/f09b148377b866fe3eec6c9e58712f2cfb3ecb90", + "title": "Turing patterns on a plasma-liquid interface", "abstract": "Radially + symmetric patterns are observed in pin-to-plane DC plasma systems where a + liquid solution is used as a planar resistive anode. The size and structure + of these patterns depends on the plasma current and salt concentration of + the liquid anode. We propose that these patterns initiate due to the reaction + and diffusion of electrons in the anode sheath, where electron impact ionization + serves as an autocatalytic reaction. The resulting system of reaction-diffusion + equations is amenable to Turing stability analysis, which we use to theoretically + predict the transition from a uniform plasma to a ring-shaped pattern state. + Expressing the stability criteria in terms of plasma current and solution + salt concentration, we derive a theoretical phase boundary for the onset of + pattern formation, which is in excellent agreement with experimental results.", + "venue": "Plasma Sources Science & Technology", "year": 2019, "referenceCount": + 40, "citationCount": 15, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Materials Science"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Materials Science", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2019-10-21", + "journal": {"name": "Plasma Sources Science and Technology", "volume": "28"}, + "authors": [{"authorId": "6106058", "name": "P. Rumbach"}, {"authorId": "20748111", + "name": "A. Lindsay"}, {"authorId": "2463134", "name": "D. Go"}]}, {"paperId": + "15e737ecbd4db677f322b11cc26413d3f2f7c352", "externalIds": {"DBLP": "conf/conll/Powers98a", + "ACL": "W98-1235", "MAG": "2006304624", "DOI": "10.3115/1603899.1603947", + "CorpusId": 38817769}, "corpusId": 38817769, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/15e737ecbd4db677f322b11cc26413d3f2f7c352", + "title": "The Total Turing Test and the Loebner Prize", "abstract": "The Loebner + Prize is the first, and only regular, competition based on the Turing Test, + but in order to stage the competition various modifications to the original + test have been made. In particular, the Grand Prize has a controversial and + as yet undefined Audio-Visual condition attached to it. This paper discusses + the value of the test with and without the A/V condition, and makes a proposal + about what the general nature of the A/V test should be.", "venue": "CoNLL", + "year": 1998, "referenceCount": 18, "citationCount": 20, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://dl.acm.org/ft_gateway.cfm?id=1603947&type=pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1998-01-11", "journal": {"pages": "279-280"}, "authors": [{"authorId": "144871539", + "name": "D. Powers"}]}, {"paperId": "98e1277d5a401b6758c461a2a2a257f1c259a67e", "externalIds": {"DBLP": "books/sp/02/Durand-Lose02", "MAG": "1541213536", - "DOI": "10.1007/978-1-4471-0129-1_6", "CorpusId": 118044332}, "url": "https://www.semanticscholar.org/paper/98e1277d5a401b6758c461a2a2a257f1c259a67e", + "DOI": "10.1007/978-1-4471-0129-1_6", "CorpusId": 118044332}, "corpusId": + 118044332, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/98e1277d5a401b6758c461a2a2a257f1c259a67e", "title": "Computing Inside the Billiard Ball Model", "abstract": null, "venue": "Collision-Based Computing", "year": 2002, "referenceCount": 25, "citationCount": - 13, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"pages": "135-160"}, - "authors": [{"authorId": "1387881959", "name": "J. Durand-Lose"}]}, {"paperId": - "19b6c93c0181fb4e8b2c28896088525d2487e179", "externalIds": {"CorpusId": 247625747}, - "url": "https://www.semanticscholar.org/paper/19b6c93c0181fb4e8b2c28896088525d2487e179", - "title": "HILBERT\u2019S TENTH PROBLEM AND MAZUR\u2019S CONJECTURE FOR LARGE - SUBRINGS OF Q", "abstract": "Hilbert\u2019s Tenth Problem, in modern terms, - was to find an algorithm (Turing machine) to decide, given a polynomial equation - f(x1, . . . , xn) = 0 with coefficients in Z, whether it has a solution with - x1, . . . , xn \u2208 Z. Y. Matijasevi\u010d [Mat70], building on earlier - work of M. Davis, H. Putnam, and J. Robinson [DPR61], showed that no such - algorithm exists. If one replaces Z in both places by a different commutative - ring R (let us assume its elements can be and have been encoded for input - into a Turing machine), one obtains a different question, called Hilbert\u2019s - Tenth Problem over R, whose answer depends on R. These problems are discussed - in detail in [DLPVG00]. In particular, the answer for R = Q is unknown. Hilbert\u2019s - Tenth Problem over Q is equivalent to the general problem of deciding whether - a variety over Q has a rational point. One approach to proving that Hilbert\u2019s - Tenth Problem over Q has a negative answer would be to deduce this from Matijasevi\u010d\u2019s - theorem for Z, by showing that Z is diophantine over Q in the following sense: - Definition 1.1. Let R be a ring, and let A \u2286 R. Then A is diophantine - over R if and only if there exists a polynomial f in m+ n variables with coefficients - in R such that A = { a \u2208 R | \u2203x \u2208 R such that f(a, x) = 0 }.", - "venue": "", "year": 2003, "referenceCount": 30, "citationCount": 45, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": null, "authors": [{"authorId": "1703241", "name": "B. Poonen"}]}, - {"paperId": "a74f665078a77a144d5d7035a9a22ebea3c08398", "externalIds": {"MAG": - "2954386378", "ArXiv": "1404.0545", "DBLP": "journals/corr/Given-Wilson14", - "DOI": "10.4204/EPTCS.166.4", "CorpusId": 17419147}, "url": "https://www.semanticscholar.org/paper/a74f665078a77a144d5d7035a9a22ebea3c08398", + 13, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"pages": "135-160"}, "authors": [{"authorId": "1387881959", "name": + "J. Durand-Lose"}]}, {"paperId": "30faed6f0999e1d11350ee80106bb2dbd6cb4063", + "externalIds": {"MAG": "1975020978", "DBLP": "conf/stoc/Furer82", "DOI": "10.1145/800070.802172", + "CorpusId": 10572934}, "corpusId": 10572934, "publicationVenue": {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", + "name": "Symposium on the Theory of Computing", "type": "conference", "alternate_names": + ["Symp Theory Comput", "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/30faed6f0999e1d11350ee80106bb2dbd6cb4063", + "title": "The tight deterministic time hierarchy", "abstract": "Let k be a + constant -&-ge; 2, and let us consider only deterministic k-tape Turing machines.\n + We assume t2(n) -&-gt; n and t2 + is computable in time t2. Then there is a language which + is accepted in time t2, but not accepted in any time + t1 with t1(n) -&-equil; o(t2(n)).\n + Furthermore, we obtain a strong hierarchy (isomorphic to the rationals Q) + for languages accepted in fixed space and variable time.", "venue": "Symposium + on the Theory of Computing", "year": 1982, "referenceCount": 9, "citationCount": + 37, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/800070.802172", "status": "BRONZE"}, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1982-05-05", "journal": + {"pages": "8-16"}, "authors": [{"authorId": "3306188", "name": "Martin F\u00fcrer"}]}, + {"paperId": "22a80820ae0c08d20cfa4ffa1fe64edd194a9a75", "externalIds": {"MAG": + "2135376348", "DOI": "10.1098/rsfs.2012.0018", "CorpusId": 1405995}, "corpusId": + 1405995, "publicationVenue": {"id": "692a1437-389a-429a-b9b0-7a8182722f06", + "name": "Interface Focus", "type": "journal", "issn": "2042-8898", "url": + "http://rsfs.royalsocietypublishing.org/"}, "url": "https://www.semanticscholar.org/paper/22a80820ae0c08d20cfa4ffa1fe64edd194a9a75", + "title": "The mathematics of nature at the Alan Turing centenary", "abstract": + "Alan Turing inhabited a very individual world between the abstract and the + concrete\u2014see Mrs Turing''s sketch of her son playing hockey in 1923 ([figure + 1][1]). His 1936 universal Turing machine detached computation from the actuality + of its physical host, and established a powerful computational", "venue": + "Interface Focus", "year": 2012, "referenceCount": 15, "citationCount": 10, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "https://europepmc.org/articles/pmc3363039?pdf=render", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-08-06", "journal": {"name": + "Interface Focus", "pages": "393 - 396", "volume": "2"}, "authors": [{"authorId": + "98630872", "name": "S. Cooper"}, {"authorId": "2339973", "name": "P. Maini"}]}, + {"paperId": "4f902ad0ab7a97a4e77f7661b046ce5ddc3e2b28", "externalIds": {"MAG": + "2166765576", "DBLP": "conf/sofsem/Warwick12", "DOI": "10.1007/978-3-642-27660-6_11", + "CorpusId": 10284617}, "corpusId": 10284617, "publicationVenue": {"id": "74136324-6e61-46d3-912f-8be85580ef40", + "name": "Conference on Current Trends in Theory and Practice of Informatics", + "type": "conference", "alternate_names": ["SOFSEM", "Conf Curr Trends Theory + Pract Informatics"]}, "url": "https://www.semanticscholar.org/paper/4f902ad0ab7a97a4e77f7661b046ce5ddc3e2b28", + "title": "Not Another Look at the Turing Test!", "abstract": null, "venue": + "Conference on Current Trends in Theory and Practice of Informatics", "year": + 2012, "referenceCount": 5, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-01-21", "journal": {"pages": + "130-140"}, "authors": [{"authorId": "143636026", "name": "K. Warwick"}]}, + {"paperId": "43b7cab2cdb4cb18047bd34f297a64b1caeb97ab", "externalIds": {"MAG": + "1502933614", "CorpusId": 6396154, "PubMed": "13810211"}, "corpusId": 6396154, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43b7cab2cdb4cb18047bd34f297a64b1caeb97ab", + "title": "Serum enzymes and genetic carriers in muscular dystrophy.", "abstract": + "STUDIES FROM THIS LABORATORY have demonstrated that muscular dystrophy in + man, exclusive of myotonic, myositic, neurogenic, ocular, and distal types, + can be divided by genetic and clinical criteria into four categories: the + domi-nant facioscapulohumeral type, the sex-linked Duchenne type, the recessive + limb-girdle type, and the sporadic limb-girdle type (Chung and Morton, 1959; + Morton and Chung, 1959). The first three classes had been recognized by other + workers (Stevenson, 1953; Walton, 1955), but unambiguous proof of the fourth + type required methods which have only recently become available (Morton, 1959). + The correctness of this classification was established by analysis not only + of our Wisconsin material, but also of seven other large studies from the + litera-ture which had been interpreted differently. The eight sources proved + to be consistent with each other and with genetic expectation.", "venue": + "American journal of human genetics", "year": 1960, "referenceCount": 35, + "citationCount": 93, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1960-03-01", "journal": {"name": "American + journal of human genetics", "pages": "\n 52-66\n ", "volume": + "12"}, "authors": [{"authorId": "48990779", "name": "C. Chung"}, {"authorId": + "2758487", "name": "N. Morton"}, {"authorId": "67022773", "name": "H. Peters"}]}, + {"paperId": "b1fe4030602423aeec9abddf91b7f468234dedb9", "externalIds": {"MAG": + "1983886436", "DOI": "10.2164/jandrol.111.013912", "CorpusId": 42158723, "PubMed": + "22096085"}, "corpusId": 42158723, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b1fe4030602423aeec9abddf91b7f468234dedb9", + "title": "Transurethral seminal vesiculoscopy using a 6F vesiculoscope for + ejaculatory duct obstruction: initial experience.", "abstract": "Ejaculatory + duct obstruction (EDO) is a surgically correctable condition that occurs in + some infertile men. The standard therapy is transurethral resection of ejaculatory + ducts (TURED). However, TURED has been associated with a high risk of complications, + including the impairment of semen parameters and retrograde ejaculation. In + our clinical practice, vesiculoscopy has demonstrated potential as a minimally + invasive alternative technique for the diagnosis and treatment of EDO. Very + few studies have examined transurethral seminal vesiculoscopy (TRU-SVS) in + recent years, and no study has examined 6F vesiculoscopes. Therefore, we performed + a retrospective study of TRU-SVS using a 6F vesiculoscope and its effect on + the diagnosis and treatment of EDO. A total of 21 patients who underwent this + procedure were included in the study. The mean patient age was 28.8 years + (range, 23-36 years). The procedure was completed successfully in all patients + within a mean time of 31.5 minutes and a mean hospital stay of 1.17 days. + All patients had EDO. Calculi were found in the ejaculatory ducts or in the + seminal vesicles of 5 patients. Sperm was detected in 11 patients 1-3 months + postsurgery and in another 8 patients 3-12 months postsurgery. No sperm was + detected in the remaining 2 patients by 12 months postsurgery. Epididymitis, + retrograde ejaculation, urinary incontinence, and rectal injury were not observed. + These data indicate that TRU-SVS using a 6F vesiculoscope affords direct access + to the seminal vesicle and offers the advantages of fewer complications and + more optimal sperm recovery as well as direct, dynamic video imaging.", "venue": + "Journal of andrology", "year": 2012, "referenceCount": 17, "citationCount": + 44, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.2164/jandrol.111.013912", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2012-07-08", "journal": + {"name": "Journal of andrology", "pages": "\n 637-43\n ", + "volume": "33 4"}, "authors": [{"authorId": "2108969009", "name": "Hai-feng + Wang"}, {"authorId": "5381908", "name": "H. Ye"}, {"authorId": "66247316", + "name": "Chuanliang Xu"}, {"authorId": "2109231409", "name": "Zhiyong Liu"}, + {"authorId": "49779648", "name": "Xu Gao"}, {"authorId": "39431334", "name": + "J. Hou"}, {"authorId": "2152506583", "name": "Lei Wang"}, {"authorId": "38200084", + "name": "S. Piao"}, {"authorId": "49697807", "name": "Yinghao Sun"}]}, {"paperId": + "93e45bd05f53d90972087b799066988a877650e4", "externalIds": {"MAG": "1606919710", + "DOI": "10.1142/9789812384775", "CorpusId": 118020859}, "corpusId": 118020859, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/93e45bd05f53d90972087b799066988a877650e4", + "title": "Introduction to Quantum Computers", "abstract": "The Turing machine + binary system and Boolean algebra the quantum computer the discrete Fourier + transform quantum factorization of integers logic gates implementation of + logic gates using transistors reversible logic gates quantum logic gates tow + and three Qubit quantum logic gates on-Qubit rotation Aj transformation Bjk + transformation unitary transformations and quantum dynamics quantum dynamics + at finite temperature physical realization of quantum computations Control-Not + gate in an ion trap Aj and Bjk gates in an ion trap linear chains of nuclear + spins digital gates in a spin chain nonresonant action of pi-pulses experimental + logic gates in quantum systems - achievements and opportunities error correction + for quantum gates in a two-spin system quantum logic gates in a spin ensemble + at room temperature evolution of an ensemble of four-spin molecules how to + get the desired density matrix?", "venue": "", "year": 1998, "referenceCount": + 0, "citationCount": 93, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-07-08", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145465904", + "name": "G. Berman"}, {"authorId": "30086297", "name": "G. Doolen"}, {"authorId": + "6259852", "name": "R. Mainieri"}, {"authorId": "145792107", "name": "V. Tsifrinovich"}]}, + {"paperId": "47e1aef5e41f9b6faa8fc15df3539540a5be8c1f", "externalIds": {"DBLP": + "journals/tsp/BocheSP20", "MAG": "3021198511", "DOI": "10.1109/TSP.2020.2993165", + "CorpusId": 218938474}, "corpusId": 218938474, "publicationVenue": {"id": + "1f6f3f05-6a23-42f0-8d31-98ab8089c1f2", "name": "IEEE Transactions on Signal + Processing", "type": "journal", "alternate_names": ["IEEE Trans Signal Process"], + "issn": "1053-587X", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=78", + "alternate_urls": ["http://www.signalprocessingsociety.org/publications/periodicals/tsp/", + "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=78"]}, "url": "https://www.semanticscholar.org/paper/47e1aef5e41f9b6faa8fc15df3539540a5be8c1f", + "title": "Denial-of-Service Attacks on Communication Systems: Detectability + and Jammer Knowledge", "abstract": "Wireless communication systems are inherently + vulnerable to intentional jamming. In this paper, two classes of such jammers + are considered: those with partial and full knowledge. While the first class + accounts for those jammers that know the encoding and decoding function, the + latter accounts for those that are further aware of the actual transmitted + message. Of particular interest are so-called denial-of-service (DoS) attacks + in which the jammer is able to completely disrupt any transmission. Accordingly, + it is of crucial interest for the legitimate users to detect such adversarial + DoS attacks. This paper develops a detection framework based on Turing machines. + Turing machines have no limitations on computational complexity and computing + capacity and storage and can simulate any given algorithm. For both scenarios + of a jammer with partial and full knowledge, it is shown that there exists + no Turing machine which can decide whether or not a DoS attack is possible + for a given channel and the corresponding decision problem is undecidable. + On the other hand, it is shown for both scenarios that it is possible to algorithmically + characterize those channels for which a DoS attack is not possible. This means + that it is possible to detect those scenarios in which the jammer is not able + to disrupt the communication. For all other channels, the Turing machine does + not stop and runs forever making this decision problem semidecidable. Finally, + it is shown that additional coordination resources such as common randomness + make the communication robust against such attacks.", "venue": "IEEE Transactions + on Signal Processing", "year": 2020, "referenceCount": 50, "citationCount": + 18, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2020-05-08", "journal": {"name": "IEEE Transactions on Signal Processing", + "pages": "3754-3768", "volume": "68"}, "authors": [{"authorId": "1688021", + "name": "H. Boche"}, {"authorId": "2307454", "name": "R. Schaefer"}, {"authorId": + "145967056", "name": "H. Poor"}]}, {"paperId": "b3d8dffb73bc93de239998548386c84177caa2ad", + "externalIds": {"MAG": "1827297289", "ArXiv": "1312.6082", "DBLP": "journals/corr/GoodfellowBIAS13", + "CorpusId": 17991431}, "corpusId": 17991431, "publicationVenue": {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", + "name": "International Conference on Learning Representations", "type": "conference", + "alternate_names": ["Int Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, + "url": "https://www.semanticscholar.org/paper/b3d8dffb73bc93de239998548386c84177caa2ad", + "title": "Multi-digit Number Recognition from Street View Imagery using Deep + Convolutional Neural Networks", "abstract": "Abstract: Recognizing arbitrary + multi-character text in unconstrained natural photographs is a hard problem. + In this paper, we address an equally hard sub-problem in this domain viz. + recognizing arbitrary multi-digit numbers from Street View imagery. Traditional + approaches to solve this problem typically separate out the localization, + segmentation, and recognition steps. In this paper we propose a unified approach + that integrates these three steps via the use of a deep convolutional neural + network that operates directly on the image pixels. We employ the DistBelief + implementation of deep neural networks in order to train large, distributed + neural networks on high quality images. We find that the performance of this + approach increases with the depth of the convolutional network, with the best + performance occurring in the deepest architecture we trained, with eleven + hidden layers. We evaluate this approach on the publicly available SVHN dataset + and achieve over $96\\%$ accuracy in recognizing complete street numbers. + We show that on a per-digit recognition task, we improve upon the state-of-the-art, + achieving $97.84\\%$ accuracy. We also evaluate this approach on an even more + challenging dataset generated from Street View imagery containing several + tens of millions of street number annotations and achieve over $90\\%$ accuracy. + To further explore the applicability of the proposed system to broader text + recognition tasks, we apply it to synthetic distorted text from reCAPTCHA. + reCAPTCHA is one of the most secure reverse turing tests that uses distorted + text to distinguish humans from bots. We report a $99.8\\%$ accuracy on the + hardest category of reCAPTCHA. Our evaluations on both tasks indicate that + at specific operating thresholds, the performance of the proposed system is + comparable to, and in some cases exceeds, that of human operators.", "venue": + "International Conference on Learning Representations", "year": 2013, "referenceCount": + 18, "citationCount": 614, "influentialCitationCount": 57, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2013-12-20", "journal": {"name": "CoRR", "volume": "abs/1312.6082"}, + "authors": [{"authorId": "153440022", "name": "Ian J. Goodfellow"}, {"authorId": + "2751422", "name": "Yaroslav Bulatov"}, {"authorId": "46920727", "name": "Julian + Ibarz"}, {"authorId": "1911894", "name": "Sacha Arnoud"}, {"authorId": "1961864", + "name": "V. Shet"}]}, {"paperId": "69db78cefaabec788cb10261bae8f8063b84d7c7", + "externalIds": {"DBLP": "journals/siamcomp/Ukkonen83", "MAG": "2055734996", + "DOI": "10.1137/0212038", "CorpusId": 26484050}, "corpusId": 26484050, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/69db78cefaabec788cb10261bae8f8063b84d7c7", + "title": "Two Results on Polynomial Time Truth-Table Reductions to Sparse + Sets", "abstract": "Inspired by the recent solution of the Berman-Hartmanis + conjecture [SIAM J. Comp., 6 (1977), pp. 305\u2013322] that NP cannot have + a sparse complete set for many-one reductions unless ${\\text{P}} = {\\text{NP}}$, + we analyze the implications of NP and PSPACE having sparse, hard or complete + sets for reduction types more general than the many-one reductions. Three + special cases of truth-table reductions are considered. First we show that + if NP (PSPACE) has a tally $ \\leqq _{k - T}^P $-hard set, then ${\\text{P}} + = {\\text{NP}}$$({\\text{P}} = {\\text{PSPACE}})$. Here $ \\leqq _{k - T}^P + $ denotes a subcase of polynomial time Turing reducibility in which, for some + constant k, the reducing Turing machine is allowed to make at most k queries + to the oracle. We also show that if co-NP (PSPACE) has a sparse hard set for + conjunctive polynomial time reductions, then ${\\text{P}} = {\\text{NP}}$$({\\text{P}} + = {\\text{PSPACE}})$.", "venue": "SIAM J. Comput.", "year": 1983, "referenceCount": + 0, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1983-08-01", "journal": {"name": "SIAM J. Comput.", "pages": "580-587", "volume": + "12"}, "authors": [{"authorId": "1722211", "name": "E. Ukkonen"}]}, {"paperId": + "048742725638a0cc8e11f8f4eb06658b422b052a", "externalIds": {"DBLP": "journals/ipl/DowneyG08", + "MAG": "1978758779", "DOI": "10.1016/j.ipl.2008.05.028", "CorpusId": 776243}, + "corpusId": 776243, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/048742725638a0cc8e11f8f4eb06658b422b052a", + "title": "Turing degrees of reals of positive effective packing dimension", + "abstract": null, "venue": "Inf. Process. Lett.", "year": 2008, "referenceCount": + 45, "citationCount": 25, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.mcs.vuw.ac.nz/~downey/publications/packing-united.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-11-01", "journal": {"name": "Inf. Process. Lett.", "pages": "298-303", + "volume": "108"}, "authors": [{"authorId": "145948982", "name": "R. Downey"}, + {"authorId": "34695773", "name": "Noam Greenberg"}]}, {"paperId": "edbc873a248768a626ef2bc57b3d1eff30de0e11", + "externalIds": {"DBLP": "conf/iclr/Johnson17", "MAG": "2750894112", "CorpusId": + 29504454}, "corpusId": 29504454, "publicationVenue": {"id": "939c6e1d-0d17-4d6e-8a82-66d960df0e40", + "name": "International Conference on Learning Representations", "type": "conference", + "alternate_names": ["Int Conf Learn Represent", "ICLR"], "url": "https://iclr.cc/"}, + "url": "https://www.semanticscholar.org/paper/edbc873a248768a626ef2bc57b3d1eff30de0e11", + "title": "Learning Graphical State Transitions", "abstract": "Graph-structured + data is important in modeling relationships between multiple entities, and + can be used to represent states of the world as well as many data structures. + Li et al. (2016) describe a model known as a Gated Graph Sequence Neural Network + (GGS-NN) that produces sequences from graph-structured input. In this work + I introduce the Gated Graph Transformer Neural Network (GGTNN), an extension + of GGS-NNs that uses graph-structured data as an intermediate representation. + The model can learn to construct and modify graphs in sophisticated ways based + on textual input, and also to use the graphs to produce a variety of outputs. + For example, the model successfully learns to solve almost all of the bAbI + tasks (Weston et al., 2016), and also discovers the rules governing graphical + formulations of a simple cellular automaton and a family of Turing machines.", + "venue": "International Conference on Learning Representations", "year": 2016, + "referenceCount": 23, "citationCount": 89, "influentialCitationCount": 7, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2016-10-29", "journal": + {"name": "", "volume": ""}, "authors": [{"authorId": "2150444707", "name": + "Daniel D. Johnson"}]}, {"paperId": "fbe4b73bb9be4362359c8db1579b26373dbfc75e", + "externalIds": {"MAG": "2158122617", "DOI": "10.1002/1615-4169(20010430)343:4<313::AID-ADSC313>3.0.CO;2-A", + "CorpusId": 3680560}, "corpusId": 3680560, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/fbe4b73bb9be4362359c8db1579b26373dbfc75e", + "title": "Development of Nickel-on-Charcoal as a ''''Dirt-Cheap'''' Heterogeneous + Catalyst: A Personal Account", "abstract": "A personal account tracing the + origins and continuing evolution of nickel-on-charcoal (Ni/C) as a practical, + alternative, group 10 metal catalyst is presented. Discussed are applications + to several ''''name reactions'''' which lead to both car- bon-carbon and carbon-nitrogen + bond construc- tions utilizing inexpensive aryl chlorides as sub- strates. + Reductions of chloroarenes are also catalyzed by Ni/C, a process which may + be worthy of consideration in terms of environmental clean- up of PCBs and + dioxins. Collaborative efforts are also mentioned aimed at probing the surface + struc- ture of Ni/C, with the goal of enhancing catalyst ac- tivity. Future + directions for development of hetero- geneous nickel catalysts are proposed.", + "venue": "", "year": 2001, "referenceCount": 8, "citationCount": 53, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Chemistry", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2001-04-30", "journal": {"name": "Advanced Synthesis & Catalysis", "pages": + "313-326", "volume": "343"}, "authors": [{"authorId": "3605795", "name": "B. + Lipshutz"}]}, {"paperId": "75ae39283b5e048eff36a36c072a106cca115b4e", "externalIds": + {"MAG": "2030178265", "DOI": "10.1007/s00345-006-0129-4", "CorpusId": 14600527, + "PubMed": "17077974"}, "corpusId": 14600527, "publicationVenue": {"id": "11d0e58d-2fce-416e-945a-ea8815a278a1", + "name": "World journal of urology", "type": "journal", "alternate_names": + ["World j urol", "World Journal of Urology", "World J Urol"], "issn": "0724-4983", + "url": "https://link.springer.com/journal/345"}, "url": "https://www.semanticscholar.org/paper/75ae39283b5e048eff36a36c072a106cca115b4e", + "title": "Management of ejaculatory duct obstruction: etiology, diagnosis, + and treatment", "abstract": null, "venue": "World journal of urology", "year": + 2006, "referenceCount": 52, "citationCount": 43, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + "publicationDate": "2006-11-01", "journal": {"name": "World Journal of Urology", + "pages": "604-610", "volume": "24"}, "authors": [{"authorId": "80915789", + "name": "H. Fisch"}, {"authorId": "47337621", "name": "S. Lambert"}, {"authorId": + "6551064", "name": "E. Goluboff"}]}, {"paperId": "8dfd401081aa74d893d2e9af40d4511b2f8c93ab", + "externalIds": {"MAG": "2118691009", "DOI": "10.1146/annurev-neuro-061010-113618", + "CorpusId": 25279743, "PubMed": "22715881"}, "corpusId": 25279743, "publicationVenue": + {"id": "d9caa671-3be6-48bc-9710-f96334848b4c", "name": "Annual Review of Neuroscience", + "type": "journal", "alternate_names": ["Annu Rev Neurosci"], "issn": "0147-006X", + "url": "https://www.annualreviews.org/journal/neuro", "alternate_urls": ["http://arjournals.annualreviews.org/loi/neuro", + "https://www.annualreviews.org/loi/neuro"]}, "url": "https://www.semanticscholar.org/paper/8dfd401081aa74d893d2e9af40d4511b2f8c93ab", + "title": "Early events in axon/dendrite polarization.", "abstract": "Differentiation + of axons and dendrites is a critical step in neuronal development. Here we + review the evidence that axon/dendrite formation during neuronal polarization + depends on the intrinsic cytoplasmic asymmetry inherited by the postmitotic + neuron, the exposure of the neuron to extracellular chemical factors, and + the action of anisotropic mechanical forces imposed by the environment. To + better delineate the functions of early signals among a myriad of cellular + components that were shown to influence axon/dendrite formation, we discuss + their functions by distinguishing their roles as determinants, mediators, + or modulators and consider selective degradation of these components as a + potential mechanism for axon/dendrite polarization. Finally, we examine whether + these early events of axon/dendrite formation involve local autocatalytic + activation and long-range inhibition, as postulated by Alan Turing for the + morphogenesis of patterned biological structure.", "venue": "Annual Review + of Neuroscience", "year": 2012, "referenceCount": 135, "citationCount": 93, + "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", + "JournalArticle"], "publicationDate": "2012-06-20", "journal": {"name": "Annual + review of neuroscience", "pages": "\n 181-201\n ", "volume": + "35"}, "authors": [{"authorId": "47959604", "name": "Pei-Lin Cheng"}, {"authorId": + "1823913", "name": "M. Poo"}]}, {"paperId": "3a1217eab8ddcf4a4370288dbe4216fbb1596efe", + "externalIds": {"MAG": "2319644200", "DOI": "10.2307/1445129", "CorpusId": + 87540341}, "corpusId": 87540341, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a1217eab8ddcf4a4370288dbe4216fbb1596efe", + "title": "Vanishing Fishes of North America", "abstract": "ture (often a photograph + of variable qualityI would prefer to see, where possible, photographs of Pennsylvania + fishes rather than those from other sites), distribution, behavior, food, + value and a distribution map (literature records are distinguished from those + identified by Dr. Cooper-this often separates old from recent collections). + The maps have only major stream divides to successfully emphasize stream system + occurrence, at the expense of demonstrating large stream/small stream variation. + The 21 fishes of possible occurrence includes seven introductions where the + success of the", "venue": "", "year": 1983, "referenceCount": 0, "citationCount": + 52, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1983-09-01", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "87153532", "name": "R. Ono"}, + {"authorId": "2111787592", "name": "James Williams"}, {"authorId": "31423546", + "name": "Anne E Wagner"}]}, {"paperId": "25d07b28d8ec4c290f7510cbc90f4b3087e0c510", + "externalIds": {"DBLP": "journals/mp/Ramana97", "MAG": "2050958701", "DOI": + "10.1007/BF02614433", "CorpusId": 12886462}, "corpusId": 12886462, "publicationVenue": + {"id": "127cc63d-75ce-4cfb-9d35-18641daba70c", "name": "Mathematical programming", + "type": "journal", "alternate_names": ["Math Program", "Math program", "Mathematical + Programming"], "issn": "0025-5610", "url": "https://ddd.uab.cat/record/51?ln=ca", + "alternate_urls": ["https://www.springer.com/mathematics/journal/10107", "https://link.springer.com/journal/10107", + "http://www.springer.com/mathematics/journal/10107"]}, "url": "https://www.semanticscholar.org/paper/25d07b28d8ec4c290f7510cbc90f4b3087e0c510", + "title": "An exact duality theory for semidefinite programming and its complexity + implications", "abstract": null, "venue": "Mathematical programming", "year": + 1997, "referenceCount": 34, "citationCount": 251, "influentialCitationCount": + 24, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1997-05-01", "journal": {"name": "Mathematical Programming", + "pages": "129-162", "volume": "77"}, "authors": [{"authorId": "27715055", + "name": "M. Ramana"}]}, {"paperId": "0763c0fb9278d20e107140cc85e1610ffc681471", + "externalIds": {"MAG": "142821862", "DOI": "10.1017/9781316755884.016", "CorpusId": + 12193717}, "corpusId": 12193717, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0763c0fb9278d20e107140cc85e1610ffc681471", + "title": "Aspects of the Turing Jump", "abstract": "X \u2032 is the canonical + example of a set which is definable from X but not recursive in X. The Turing + degree of X \u2032 depends only on the Turing degree of X, so the jump induces + an increasing function on the Turing degrees D. In this paper, we will discuss + two aspects of the jump and its iterations. First, we will show that they + are implicitly characterized by general properties of relative definability. + Second, we will present the Shore and Slaman [1999] theorem that the function + x 7\u2192 x\u2032 is first order definable in the Turing degrees. Finally, + we will pose analogous questions about the relation y is recursively enumerable + in x and discuss what is known about them. Our discussion will rest on two + technical facts, which are generalizations of the following two theorems.", + "venue": "", "year": 2002, "referenceCount": 12, "citationCount": 11, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2867082", + "name": "T. Slaman"}]}, {"paperId": "82e3f12081f98629059c7f17b530db643bdf4c44", + "externalIds": {"MAG": "616965722", "DOI": "10.1007/978-94-011-9751-9", "CorpusId": + 107035293}, "corpusId": 107035293, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82e3f12081f98629059c7f17b530db643bdf4c44", + "title": "Explosive Welding, Forming and Compaction", "abstract": null, "venue": + "", "year": 1983, "referenceCount": 0, "citationCount": 250, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-94-011-9751-9%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "Materials Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "92599610", + "name": "T. Blazynski"}]}, {"paperId": "11eac9a56446ee2f44bbb313a4e93d1ef2dc19c9", + "externalIds": {"MAG": "2014170692", "DOI": "10.1103/PHYSREVLETT.67.275", + "CorpusId": 27944256, "PubMed": "10044539"}, "corpusId": 27944256, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/11eac9a56446ee2f44bbb313a4e93d1ef2dc19c9", + "title": "Model for the formation of a microscopic Turing structure: The facetting + of Pt(110) during catalytic oxidation of CO.", "abstract": "A Monte Carlo + simulation of the formation of regular facet patterns during catalytic oxidation + of CO on Pt(110) has been conducted. The simulation was based on the elementary + stepsof the surface reaction, the CO-induced 1\u00d71\u21c41\u00d72 phase + transition, and the enhancement of O 2 adsorption at step sites. The model + can reproduce the formation of sawtoothlike facet patterns with a spacing + of \u223c100 to 200 A. The facets represent a Turing structure caused by the + coupling of kinetic instabilities with the mass transport of Pt atoms", "venue": + "Physical review letters", "year": 1991, "referenceCount": 0, "citationCount": + 45, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1991-07-08", "journal": {"name": "Physical review letters", + "pages": "\n 275-278\n ", "volume": "67 2"}, "authors": [{"authorId": + "30066773", "name": "Imbihl"}, {"authorId": "1399054750", "name": "Reynolds"}, + {"authorId": "30166838", "name": "Kaletta"}]}, {"paperId": "24f1be8074c0b32cec014739445621e71d4782a1", + "externalIds": {"MAG": "2009619481", "ArXiv": "1201.4063", "DOI": "10.1103/PhysRevLett.108.194101", + "CorpusId": 17906195, "PubMed": "23003043"}, "corpusId": 17906195, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/24f1be8074c0b32cec014739445621e71d4782a1", + "title": "Hyperbolic chaos of Turing patterns.", "abstract": "We consider + time evolution of Turing patterns in an extended system governed by an equation + of the Swift-Hohenberg type, where due to an external periodic parameter modulation + longwave and shortwave patterns with length scales related as 1:3 emerge in + succession. We show theoretically and demonstrate numerically that the spatial + phases of the patterns, being observed stroboscopically, are governed by an + expanding circle map, so that the corresponding chaos of Turing patterns is + hyperbolic, associated with a strange attractor of the Smale-Williams solenoid + type. This chaos is shown to be robust with respect to variations of parameters + and boundary conditions.", "venue": "Physical Review Letters", "year": 2012, + "referenceCount": 25, "citationCount": 11, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1201.4063", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2012-01-19", "journal": {"name": "Physical + review letters", "pages": "\n 194101\n ", "volume": "108 19"}, + "authors": [{"authorId": "2849554", "name": "P. V. Kuptsov"}, {"authorId": + "34596490", "name": "S. Kuznetsov"}, {"authorId": "1731040", "name": "A. Pikovsky"}]}, + {"paperId": "095eaaed82a7adda97c458683961ce146736a704", "externalIds": {"ACL": + "N15-1042", "MAG": "2189550228", "DBLP": "conf/naacl/BallesterosBMW15", "DOI": + "10.3115/v1/N15-1042", "CorpusId": 18499217}, "corpusId": 18499217, "publicationVenue": + {"id": "01103732-3808-4930-b8e4-7e9e68d5c68d", "name": "North American Chapter + of the Association for Computational Linguistics", "type": "conference", "alternate_names": + ["North Am Chapter Assoc Comput Linguistics", "NAACL"], "url": "https://www.aclweb.org/portal/naacl"}, + "url": "https://www.semanticscholar.org/paper/095eaaed82a7adda97c458683961ce146736a704", + "title": "Data-driven sentence generation with non-isomorphic trees", "abstract": + "Abstract structures from which the generation naturally starts often do not + contain any func- tional nodes, while surface-syntactic struc- tures or a + chain of tokens in a linearized tree contain all of them. Therefore, data-driven + linguistic generation needs to be able to cope with the projection between + non-isomorphic structures that differ in their topology and number of nodes. + So far, such a projection has been a challenge in data-driven genera- tion + and was largely avoided. We present a fully stochastic generator that is able + to cope with projection between non-isomorphic structures. The generator, + which starts from PropBank-like structures, consists of a cas- cade of SVM-classifier + based submodules that map in a series of transitions the input struc- tures + onto sentences. The generator has been evaluated for English on the Penn-Treebank + and for Spanish on the multi-layered Ancora- UPF corpus.", "venue": "North + American Chapter of the Association for Computational Linguistics", "year": + 2015, "referenceCount": 40, "citationCount": 26, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.aclweb.org/anthology/N15-1042.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": null, "journal": {"pages": "387-397"}, "authors": + [{"authorId": "143668305", "name": "Miguel Ballesteros"}, {"authorId": "1678747", + "name": "Bernd Bohnet"}, {"authorId": "2738095", "name": "Simon Mille"}, {"authorId": + "1758440", "name": "Leo Wanner"}]}, {"paperId": "a74f665078a77a144d5d7035a9a22ebea3c08398", + "externalIds": {"MAG": "2954386378", "ArXiv": "1404.0545", "DBLP": "journals/corr/Given-Wilson14", + "DOI": "10.4204/EPTCS.166.4", "CorpusId": 17419147}, "corpusId": 17419147, + "publicationVenue": {"id": "535c704b-a9d2-4f9c-970d-a538933c3706", "name": + "International Conference on Information and Computation Economies", "type": + "conference", "alternate_names": ["IEEE International Technology Management + Conference", "ICE", "Int Conf Inf Comput Econ", "IEEE Int Technol Manag Conf"]}, + "url": "https://www.semanticscholar.org/paper/a74f665078a77a144d5d7035a9a22ebea3c08398", "title": "An Intensional Concurrent Faithful Encoding of Turing Machines", "abstract": "The benchmark for computation is typically given as Turing computability; the ability for a computation to be performed by a Turing Machine. Many languages @@ -48308,28 +55276,134 @@ interactions: infinite terms, and to show encodings into Concurrent Pattern Calculus and Psi Calculi.", "venue": "International Conference on Information and Computation Economies", "year": 2014, "referenceCount": 53, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://arxiv.org/pdf/1404.0545", + "status": "GOLD"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2014-04-02", "journal": {"pages": "21-37"}, "authors": [{"authorId": "1401782411", "name": "Thomas Given-Wilson"}]}, {"paperId": - "afaae8591456819c58aaa9baafaeaaa8a9d972ff", "externalIds": {"MAG": "2338747497", - "DBLP": "journals/corr/SchoenickCTTE16", "ArXiv": "1604.04315", "DOI": "10.1145/3122814", - "CorpusId": 6383047}, "url": "https://www.semanticscholar.org/paper/afaae8591456819c58aaa9baafaeaaa8a9d972ff", - "title": "Moving beyond the Turing Test with the Allen AI Science Challenge", - "abstract": "Answering questions correctly from standardized eighth-grade - science tests is itself a test of machine intelligence.", "venue": "Communications - of the ACM", "year": 2016, "referenceCount": 17, "citationCount": 48, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2016-04-14", "journal": {"name": "Communications of the ACM", "pages": "60 - - 64", "volume": "60"}, "authors": [{"authorId": "3393851", "name": "Carissa - Schoenick"}, {"authorId": "48323507", "name": "Peter Clark"}, {"authorId": - "3385516", "name": "Oyvind Tafjord"}, {"authorId": "1689647", "name": "Peter - D. Turney"}, {"authorId": "1741101", "name": "Oren Etzioni"}]}, {"paperId": - "43b5ba9c57f50634cf36398d5b1f2ce105adb8bd", "externalIds": {"MAG": "110490872", - "DOI": "10.6100/IR716374", "CorpusId": 117183540}, "url": "https://www.semanticscholar.org/paper/43b5ba9c57f50634cf36398d5b1f2ce105adb8bd", + "8a66b11a21c763809ba4f5512a04421a6af9124a", "externalIds": {"MAG": "1996505402", + "DOI": "10.2298/FIL0701087S", "CorpusId": 16200281}, "corpusId": 16200281, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8a66b11a21c763809ba4f5512a04421a6af9124a", + "title": "Minimal structures, generalized topologies, and ascending systems + should not be studied without generalized uniformities", "abstract": "By using + the Pervin relations, we show that all minimal struc- tures, generalized topologies, + and ascending systems can be naturally de- rived from generalized uniformities. + Therefore, they need not be studied separately.", "venue": "", "year": 2007, + "referenceCount": 66, "citationCount": 22, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "http://www.doiserbia.nb.rs/ft.aspx?id=0354-51800701087S", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "Filomat", "pages": "87-97", "volume": "21"}, "authors": [{"authorId": + "101212935", "name": "\u00c1. Sz\u00e1z"}]}, {"paperId": "f6d338d6589599b2001b6c1ff345f47dd747e532", + "externalIds": {"MAG": "2074094096", "DOI": "10.2307/1936926", "CorpusId": + 3548057}, "corpusId": 3548057, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f6d338d6589599b2001b6c1ff345f47dd747e532", + "title": "Seasonal Variation in Thermoregulatory Behavior and Body Temperature + of Diurnal Kalahari Lizards", "abstract": "We discuss seasonal variation in + thermoregulatory behavior and its consequences on body temperature for 12 + species of diurnal lizards in the southern Kalahari semidesert of Africa and + also evaluate several methods of attempting to document thermoregulatory behavior + using a descrip- tive data base. Lizards vary time of activity among seasons, + which limits the variation in ambient conditions actually experienced. Ground-dwelling + lizards and probably arboreal lizards move nonrandomly with respect to sun + and shade; thus the percentage of lizards in sun is inversely proportional + to air tempera- ture. Arboreal lizards shift to higher perches at midday in + summer and to logs or ground in winter thus decreasing and increasing incident + heat loads, respectively. Both juveniles and adults of 3 species, only juveniles + of 2 species, and only adults in I species are active in winter: both adults + and juveniles of 6 species brumate (= hibernate). Mean body temperature (Tb) + varies within days and among months and is positively correlated with corresponding + mean air temperature (Ta) in almost all species. Nonetheless, correlation + and regression analysis suggests that thermoregulatory behaviors reduce the + impact of variations in ambient condi- tions on Kalahari lizards. The mean + Tb of different species reflect evolutionary relationships. In summer, mean + Tb is propor- tional to the percentage of lizards in sun and with the tendency + of lizards to be active only in summer. Thus, lizards with inferred low optimal + temperatures are active during more months of the year.", "venue": "", "year": + 1977, "referenceCount": 32, "citationCount": 254, "influentialCitationCount": + 10, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Environmental Science", "source": "s2-fos-model"}, {"category": "Biology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1977-09-01", + "journal": {"name": "Ecology", "pages": "1066-1075", "volume": "58"}, "authors": + [{"authorId": "2575241", "name": "R. Huey"}, {"authorId": "5250133", "name": + "E. Pianka"}]}, {"paperId": "7dc114c54738cee381a04da60704d3ab76bd9f81", "externalIds": + {"MAG": "1669982198", "DOI": "10.1088/0256-307X/25/9/109", "CorpusId": 118700424}, + "corpusId": 118700424, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7dc114c54738cee381a04da60704d3ab76bd9f81", + "title": "CROSS-DISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY: + Spatial Pattern of an Epidemic Model with Cross-diffusion", "abstract": "Pattern + formation of a spatial epidemic model with both self- and cross-diffusion + is investigated. From the Turing theory, it is well known that Turing pattern + formation cannot occur for the equal self-diffusion coefficients. However, + combined with cross-diffusion, the system will show emergence of isolated + groups, i.e., stripe-like or spotted or coexistence of both, which we show + by both mathematical analysis and numerical simulations. Our study shows that + the interaction of self- and cross-diffusion can be considered as an important + mechanism for the appearance of complex spatiotemporal dynamics in epidemic + models.", "venue": "", "year": 2008, "referenceCount": 14, "citationCount": + 19, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2008-09-01", "journal": {"name": "Chinese Physics Letters", + "volume": ""}, "authors": [{"authorId": "47681666", "name": "L. R. Li"}, {"authorId": + "145752193", "name": "Zhen Jin"}, {"authorId": "47334108", "name": "Gui\u2010Quan + Sun"}]}, {"paperId": "896c0bbedf7a2f9a07d0cfdc11b6d4627ff57e66", "externalIds": + {"DBLP": "journals/siamads/AtayH06", "MAG": "2056725211", "DOI": "10.1137/050629367", + "CorpusId": 16809612}, "corpusId": 16809612, "publicationVenue": {"id": "d35d93ad-8e2c-4482-a896-897ce5c326fa", + "name": "SIAM Journal on Applied Dynamical Systems", "type": "journal", "alternate_names": + ["Siam Journal on Applied Dynamical Systems", "Siam J Appl Dyn Syst", "SIAM + J Appl Dyn Syst"], "issn": "1536-0040", "url": "https://epubs.siam.org/journal/sjaday"}, + "url": "https://www.semanticscholar.org/paper/896c0bbedf7a2f9a07d0cfdc11b6d4627ff57e66", + "title": "Neural Fields with Distributed Transmission Speeds and Long-Range + Feedback Delays", "abstract": "We introduce distributed axonal transmission + speeds and a long\u2010range constant feedback loop into the standard neural + field model. We analyze the stability of spatially homogeneous equilibrium + solutions for general connectivity kernels. By studying reduced models based + on the assumption of small delays, we determine the effects of the delays + on the stability and bifurcations. We show in a reduced model that delayed + excitatory feedback generally facilitates stationary bifurcations and Turing + patterns, while suppressing the bifurcation of periodic solutions and traveling + waves. The reverse conclusion holds for inhibitory feedback. In case of oscillatory + bifurcations, the variance of the distributed propagation and feedback delays + affects the frequency of periodic solutions and the phase speed of traveling + waves. Moreover, we give a nonlinear analysis of traveling fronts and find + that distributed transmission speeds can maximize the front speed.", "venue": + "SIAM Journal on Applied Dynamical Systems", "year": 2006, "referenceCount": + 76, "citationCount": 91, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2006-12-01", "journal": + {"name": "SIAM J. Appl. Dyn. Syst.", "pages": "670-698", "volume": "5"}, "authors": + [{"authorId": "3055112", "name": "F. Atay"}, {"authorId": "2268158", "name": + "A. Hutt"}]}, {"paperId": "86be738f0bdc45619673833040ddfbe6dfbc277a", "externalIds": + {"MAG": "2913624541", "DBLP": "journals/iandc/BeigelKS95b", "DOI": "10.1109/SCT.1994.315822", + "CorpusId": 18433154}, "corpusId": 18433154, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/86be738f0bdc45619673833040ddfbe6dfbc277a", + "title": "Approximable sets", "abstract": "Much structural work on NP-complete + sets has exploited SAT''s d-self-reducibility. We exploit the additional fact + that SAT is a d-cylinder to show that NP-complete sets are p-superterse unless + P=NP. In fact, every set that is NP-hard under polynomial-time n/sup o(1/)-tt + reductions is p-superterse unless P=NP. In particular no p-selective set is + NP-hard under polynomial-time n/sup o(1/)-tt reductions unless P=NP. In addition, + no easily countable set is NP-hard under Turing reductions unless P=NP. Self-reducibility + does not seem to suffice for our main result: in a relativized world, we construct + a d-self-reducible set in NP-P that is polynomial-time 2-tt reducible to a + p-selective set.<>", "venue": "Proceedings of IEEE 9th Annual Conference + on Structure in Complexity Theory", "year": 1995, "referenceCount": 34, "citationCount": + 93, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1995-08-01", + "journal": {"name": "Proceedings of IEEE 9th Annual Conference on Structure + in Complexity Theory", "pages": "12-23"}, "authors": [{"authorId": "2516122", + "name": "R. Beigel"}, {"authorId": "144607616", "name": "M. Kummer"}, {"authorId": + "1699450", "name": "F. Stephan"}]}, {"paperId": "43b5ba9c57f50634cf36398d5b1f2ce105adb8bd", + "externalIds": {"MAG": "110490872", "DOI": "10.6100/IR716374", "CorpusId": + 117183540}, "corpusId": 117183540, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/43b5ba9c57f50634cf36398d5b1f2ce105adb8bd", "title": "From computability to executability : a process-theoretic view on automata theory", "abstract": "The theory of automata and formal language was devised in the 1930s to provide models for and to reason about computation. @@ -48388,221 +55462,94 @@ interactions: with capabilities for interaction. Again, we make the interaction in the reactive Turing machine between its finite control and the tape memory explicit.", "venue": "", "year": 2011, "referenceCount": 201, "citationCount": 57, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "144376499", - "name": "van Pja Paul Tilburg"}]}, {"paperId": "c659caa681bf2cc12ee583278bc9999f82f70d64", - "externalIds": {"DBLP": "conf/qosa/TangTHV08", "MAG": "1877076300", "DOI": - "10.1007/978-3-540-87879-7_2", "CorpusId": 16046249}, "url": "https://www.semanticscholar.org/paper/c659caa681bf2cc12ee583278bc9999f82f70d64", - "title": "Design Reasoning Improves Software Design Quality", "abstract": - null, "venue": "International ACM SIGSOFT Conference on Quality of Software - Architectures", "year": 2008, "referenceCount": 29, "citationCount": 51, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "144376499", "name": "van Pja Paul Tilburg"}]}, {"paperId": + "740485b1628e4ea604c961a9b420fb101b436cec", "externalIds": {"MAG": "2003575723", + "DOI": "10.1063/1.2354477", "CorpusId": 5321391, "PubMed": "17014235"}, "corpusId": + 5321391, "publicationVenue": {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", + "name": "Chaos", "type": "journal", "issn": "1054-1500", "url": "http://chaos.aip.org/", + "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, "url": "https://www.semanticscholar.org/paper/740485b1628e4ea604c961a9b420fb101b436cec", + "title": "Introduction: Self-organization in nonequilibrium chemical systems.", + "abstract": "The field of self-organization in nonequilibrium chemical systems + comprises the study of dynamical phenomena in chemically reacting systems + far from equilibrium. Systematic exploration of this area began with investigations + of the temporal behavior of the Belousov-Zhabotinsky oscillating reaction, + discovered accidentally in the former Soviet Union in the 1950s. The field + soon advanced into chemical waves in excitable media and propagating fronts. + With the systematic design of oscillating reactions in the 1980s and the discovery + of Turing patterns in the 1990s, the scope of these studies expanded dramatically. + The articles in this Focus Issue provide an overview of the development and + current state of the field.", "venue": "Chaos", "year": 2006, "referenceCount": + 94, "citationCount": 53, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://aquila.usm.edu/cgi/viewcontent.cgi?article=3265&context=fac_pubs", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2006-09-27", "journal": + {"name": "Chaos", "pages": "\n 037101\n ", "volume": "16 3"}, + "authors": [{"authorId": "144854275", "name": "I. Epstein"}, {"authorId": + "5602064", "name": "J. Pojman"}, {"authorId": "145441421", "name": "O. Steinbock"}]}, + {"paperId": "eece0429ffa17149690402af142810a7bd877707", "externalIds": {"MAG": + "2602626577", "DBLP": "journals/synthese/VillalobosD18", "DOI": "10.1007/s11229-017-1386-z", + "CorpusId": 4982378}, "corpusId": 4982378, "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", + "name": "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", + "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, + "url": "https://www.semanticscholar.org/paper/eece0429ffa17149690402af142810a7bd877707", + "title": "Enactive autonomy in computational systems", "abstract": null, "venue": + "Synthese", "year": 2018, "referenceCount": 42, "citationCount": 25, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2Fs11229-017-1386-z.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2008-10-14", "journal": {"pages": "28-42"}, "authors": - [{"authorId": "2947847", "name": "A. Tang"}, {"authorId": "145129840", "name": - "M. Tran"}, {"authorId": "144324730", "name": "Jun Han"}, {"authorId": "144884703", - "name": "H. V. Vliet"}]}, {"paperId": "47e1aef5e41f9b6faa8fc15df3539540a5be8c1f", - "externalIds": {"DBLP": "journals/tsp/BocheSP20", "MAG": "3021198511", "DOI": - "10.1109/TSP.2020.2993165", "CorpusId": 218938474}, "url": "https://www.semanticscholar.org/paper/47e1aef5e41f9b6faa8fc15df3539540a5be8c1f", - "title": "Denial-of-Service Attacks on Communication Systems: Detectability - and Jammer Knowledge", "abstract": "Wireless communication systems are inherently - vulnerable to intentional jamming. In this paper, two classes of such jammers - are considered: those with partial and full knowledge. While the first class - accounts for those jammers that know the encoding and decoding function, the - latter accounts for those that are further aware of the actual transmitted - message. Of particular interest are so-called denial-of-service (DoS) attacks - in which the jammer is able to completely disrupt any transmission. Accordingly, - it is of crucial interest for the legitimate users to detect such adversarial - DoS attacks. This paper develops a detection framework based on Turing machines. - Turing machines have no limitations on computational complexity and computing - capacity and storage and can simulate any given algorithm. For both scenarios - of a jammer with partial and full knowledge, it is shown that there exists - no Turing machine which can decide whether or not a DoS attack is possible - for a given channel and the corresponding decision problem is undecidable. - On the other hand, it is shown for both scenarios that it is possible to algorithmically - characterize those channels for which a DoS attack is not possible. This means - that it is possible to detect those scenarios in which the jammer is not able - to disrupt the communication. For all other channels, the Turing machine does - not stop and runs forever making this decision problem semidecidable. Finally, - it is shown that additional coordination resources such as common randomness - make the communication robust against such attacks.", "venue": "IEEE Transactions - on Signal Processing", "year": 2020, "referenceCount": 50, "citationCount": - 18, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2020-05-08", "journal": - {"name": "IEEE Transactions on Signal Processing", "pages": "3754-3768", "volume": - "68"}, "authors": [{"authorId": "1688021", "name": "H. Boche"}, {"authorId": - "2307454", "name": "Rafael F. Schaefer"}, {"authorId": "145967056", "name": - "H. Poor"}]}, {"paperId": "5ea5bb75c67daaba0d2cf8ac0ffa4349650aa26e", "externalIds": - {"MAG": "2006301099", "DBLP": "journals/tcs/Michel04", "DOI": "10.1016/j.tcs.2004.05.008", - "CorpusId": 12588795}, "url": "https://www.semanticscholar.org/paper/5ea5bb75c67daaba0d2cf8ac0ffa4349650aa26e", - "title": "Small Turing machines and generalized busy beaver competition", - "abstract": null, "venue": "Theoretical Computer Science", "year": 2004, "referenceCount": - 25, "citationCount": 26, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-10-20", "journal": - {"name": "Theor. Comput. Sci.", "pages": "45-56", "volume": "326"}, "authors": - [{"authorId": "2068244973", "name": "Pascal Michel"}]}, {"paperId": "896c0bbedf7a2f9a07d0cfdc11b6d4627ff57e66", - "externalIds": {"DBLP": "journals/siamads/AtayH06", "MAG": "2056725211", "DOI": - "10.1137/050629367", "CorpusId": 16809612}, "url": "https://www.semanticscholar.org/paper/896c0bbedf7a2f9a07d0cfdc11b6d4627ff57e66", - "title": "Neural Fields with Distributed Transmission Speeds and Long-Range - Feedback Delays", "abstract": "We introduce distributed axonal transmission - speeds and a long\u2010range constant feedback loop into the standard neural - field model. We analyze the stability of spatially homogeneous equilibrium - solutions for general connectivity kernels. By studying reduced models based - on the assumption of small delays, we determine the effects of the delays - on the stability and bifurcations. We show in a reduced model that delayed - excitatory feedback generally facilitates stationary bifurcations and Turing - patterns, while suppressing the bifurcation of periodic solutions and traveling - waves. The reverse conclusion holds for inhibitory feedback. In case of oscillatory - bifurcations, the variance of the distributed propagation and feedback delays - affects the frequency of periodic solutions and the phase speed of traveling - waves. Moreover, we give a nonlinear analysis of traveling fronts and find - that distributed transmission speeds can maximize the front speed.", "venue": - "SIAM Journal on Applied Dynamical Systems", "year": 2006, "referenceCount": - 76, "citationCount": 91, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-12-01", "journal": {"name": "SIAM - J. Appl. Dyn. Syst.", "pages": "670-698", "volume": "5"}, "authors": [{"authorId": - "3055112", "name": "F. Atay"}, {"authorId": "2268158", "name": "A. Hutt"}]}, - {"paperId": "4f902ad0ab7a97a4e77f7661b046ce5ddc3e2b28", "externalIds": {"MAG": - "2166765576", "DBLP": "conf/sofsem/Warwick12", "DOI": "10.1007/978-3-642-27660-6_11", - "CorpusId": 10284617}, "url": "https://www.semanticscholar.org/paper/4f902ad0ab7a97a4e77f7661b046ce5ddc3e2b28", - "title": "Not Another Look at the Turing Test!", "abstract": null, "venue": - "Conference on Current Trends in Theory and Practice of Informatics", "year": - 2012, "referenceCount": 5, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-01-21", "journal": {"pages": "130-140"}, "authors": [{"authorId": "143636026", - "name": "K. Warwick"}]}, {"paperId": "86be738f0bdc45619673833040ddfbe6dfbc277a", - "externalIds": {"MAG": "2913624541", "DBLP": "journals/iandc/BeigelKS95b", - "DOI": "10.1109/SCT.1994.315822", "CorpusId": 18433154}, "url": "https://www.semanticscholar.org/paper/86be738f0bdc45619673833040ddfbe6dfbc277a", - "title": "Approximable sets", "abstract": "Much structural work on NP-complete - sets has exploited SAT''s d-self-reducibility. We exploit the additional fact - that SAT is a d-cylinder to show that NP-complete sets are p-superterse unless - P=NP. In fact, every set that is NP-hard under polynomial-time n/sup o(1/)-tt - reductions is p-superterse unless P=NP. In particular no p-selective set is - NP-hard under polynomial-time n/sup o(1/)-tt reductions unless P=NP. In addition, - no easily countable set is NP-hard under Turing reductions unless P=NP. Self-reducibility - does not seem to suffice for our main result: in a relativized world, we construct - a d-self-reducible set in NP-P that is polynomial-time 2-tt reducible to a - p-selective set.<>", "venue": "Proceedings of IEEE 9th Annual Conference - on Structure in Complexity Theory", "year": 1995, "referenceCount": 34, "citationCount": - 93, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle", "Conference"], "publicationDate": "1995-08-01", "journal": - {"name": "Proceedings of IEEE 9th Annual Conference on Structure in Complexity - Theory", "pages": "12-23"}, "authors": [{"authorId": "2516122", "name": "R. - Beigel"}, {"authorId": "144607616", "name": "M. Kummer"}, {"authorId": "1699450", - "name": "F. Stephan"}]}, {"paperId": "1e2f703fd215def7a3804fa5504f9960b1604ac6", - "externalIds": {"MAG": "2154905269", "ArXiv": "0709.0296", "DOI": "10.1103/PhysRevD.77.023503 - 10.1103/PhysRevD.81.049901", "CorpusId": 119281159}, "url": "https://www.semanticscholar.org/paper/1e2f703fd215def7a3804fa5504f9960b1604ac6", - "title": "The pattern of growth in viable f(R) cosmologies", "abstract": "We - study the evolution of linear perturbations in metric f(R) models of gravity - and identify a potentially observable characteristic scale-dependent pattern - in the behavior of cosmological struc- tures. While at the background level - viable f(R) models must closely mimicCDM, the differences in their prediction - for the growth of large scale structures can be sufficiently large to be seen - with future weak lensing surveys. While working in the Jordan frame, we perform - an analytical study of the growth of structures in the Einstein frame, demonstrating - the equivalence of the dynamics in the two frames. We also provide a physical - interpretation of the results in terms of the dynamics of an effective dark - energy fluid with a non-zero shear. We find that the growth of structure in - f(R) is enhanced, but that there are no small scale instabilities associated - with the additional attractive \"fifth force\". We then briefly consider some - recently proposed observational tests of modified gravity and their utility - for detecting the f(R) pattern of structure growth.", "venue": "", "year": - 2007, "referenceCount": 43, "citationCount": 264, "influentialCitationCount": - 6, "isOpenAccess": true, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Physics", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2007-09-04", - "journal": {"name": "Physical Review D", "pages": "049901", "volume": "77"}, - "authors": [{"authorId": "49291451", "name": "L. Pogosian"}, {"authorId": - "46874879", "name": "A. Silvestri"}]}, {"paperId": "43b7cab2cdb4cb18047bd34f297a64b1caeb97ab", - "externalIds": {"MAG": "1502933614", "CorpusId": 6396154, "PubMed": "13810211"}, - "url": "https://www.semanticscholar.org/paper/43b7cab2cdb4cb18047bd34f297a64b1caeb97ab", - "title": "Serum enzymes and genetic carriers in muscular dystrophy.", "abstract": - "STUDIES FROM THIS LABORATORY have demonstrated that muscular dystrophy in - man, exclusive of myotonic, myositic, neurogenic, ocular, and distal types, - can be divided by genetic and clinical criteria into four categories: the - domi-nant facioscapulohumeral type, the sex-linked Duchenne type, the recessive - limb-girdle type, and the sporadic limb-girdle type (Chung and Morton, 1959; - Morton and Chung, 1959). The first three classes had been recognized by other - workers (Stevenson, 1953; Walton, 1955), but unambiguous proof of the fourth - type required methods which have only recently become available (Morton, 1959). - The correctness of this classification was established by analysis not only - of our Wisconsin material, but also of seven other large studies from the - litera-ture which had been interpreted differently. The eight sources proved - to be consistent with each other and with genetic expectation.", "venue": - "American journal of human genetics", "year": 1960, "referenceCount": 35, - "citationCount": 93, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1960-03-01", "journal": {"name": "American journal of - human genetics", "pages": "\n 52-66\n ", "volume": "12"}, - "authors": [{"authorId": "48990779", "name": "C. Chung"}, {"authorId": "2758487", - "name": "N. Morton"}, {"authorId": "67022773", "name": "H. Peters"}]}, {"paperId": - "9fb64bd92f9d4e913c8ed4677b54fbe264bfef9d", "externalIds": {"MAG": "2058944387", - "DOI": "10.3934/mbe.2014.11.1247", "CorpusId": 35394072, "PubMed": "25365601"}, - "url": "https://www.semanticscholar.org/paper/9fb64bd92f9d4e913c8ed4677b54fbe264bfef9d", - "title": "Spatiotemporal complexity in a predator--prey model with weak Allee - effects.", "abstract": "In this article, we study the rich dynamics of a diffusive - predator-prey system with Allee effects in the prey growth. Our model assumes - a prey-dependent Holling type-II functional response and a density dependent - death rate for predator. We investigate the dissipation and persistence property, - the stability of nonnegative and positive constant steady state of the model, - as well as the existence of Hopf bifurcation at the positive constant solution. - In addition, we provide results on the existence and non-existence of positive - non-constant solutions of the model. We also demonstrate the Turing instability - under some conditions, and find that our model exhibits a diffusion-controlled - formation growth of spots, stripes, and holes pattern replication via numerical - simulations. One of the most interesting findings is that Turing instability - in the model is induced by the density dependent death rate in predator.", - "venue": "Mathematical biosciences and engineering : MBE", "year": 2014, "referenceCount": - 80, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-09-01", "journal": {"name": "Mathematical - biosciences and engineering : MBE", "pages": "\n 1247-74\n ", - "volume": "11 6"}, "authors": [{"authorId": "2476593", "name": "Yongli Cai"}, - {"authorId": "33373208", "name": "M. Banerjee"}, {"authorId": "145388825", - "name": "Yun Kang"}, {"authorId": "2116103578", "name": "Weiming Wang"}]}, - {"paperId": "edbc873a248768a626ef2bc57b3d1eff30de0e11", "externalIds": {"DBLP": - "conf/iclr/Johnson17", "MAG": "2750894112", "CorpusId": 29504454}, "url": - "https://www.semanticscholar.org/paper/edbc873a248768a626ef2bc57b3d1eff30de0e11", - "title": "Learning Graphical State Transitions", "abstract": "Graph-structured - data is important in modeling relationships between multiple entities, and - can be used to represent states of the world as well as many data structures. - Li et al. (2016) describe a model known as a Gated Graph Sequence Neural Network - (GGS-NN) that produces sequences from graph-structured input. In this work - I introduce the Gated Graph Transformer Neural Network (GGTNN), an extension - of GGS-NNs that uses graph-structured data as an intermediate representation. - The model can learn to construct and modify graphs in sophisticated ways based - on textual input, and also to use the graphs to produce a variety of outputs. - For example, the model successfully learns to solve almost all of the bAbI - tasks (Weston et al., 2016), and also discovers the rules governing graphical - formulations of a simple cellular automaton and a family of Turing machines.", - "venue": "International Conference on Learning Representations", "year": 2016, - "referenceCount": 23, "citationCount": 89, "influentialCitationCount": 7, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-10-29", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "2150444707", "name": "Daniel D. Johnson"}]}, {"paperId": "2400b753522dbe4ab5ab43a4995f52cd22f89cf2", - "externalIds": {"MAG": "2543087713", "DBLP": "conf/focs/Abramson71", "DOI": - "10.1109/SWAT.1971.12", "CorpusId": 22040935}, "url": "https://www.semanticscholar.org/paper/2400b753522dbe4ab5ab43a4995f52cd22f89cf2", + "publicationDate": "2018-05-01", "journal": {"name": "Synthese", "pages": + "1891-1908", "volume": "195"}, "authors": [{"authorId": "48231885", "name": + "M. Villalobos"}, {"authorId": "35121941", "name": "Joe E. Dewhurst"}]}, {"paperId": + "89404ac553499061ede456bde527fe76ddef6c75", "externalIds": {"MAG": "2573789614", + "CorpusId": 125299719}, "corpusId": 125299719, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/89404ac553499061ede456bde527fe76ddef6c75", + "title": "EXTREMAL SASAKIAN GEOMETRY ON T 2 \u00d7 S 3 AND", "abstract": "We + prove the existence of extremal Sasakian struc- tures occurring on a countably + infinite number of distinct contact structures on T 2 \u00d7S 3 and certain + related 5-manifolds. These struc- tures occur in bouquets and exhaust the + Sasaki cones in all except one case in which there are no extremal metrics.", + "venue": "", "year": 2012, "referenceCount": 27, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "101903180", + "name": "C. Boyer"}, {"authorId": "1403754537", "name": "C. T\u00f8nnesen-Friedman"}]}, + {"paperId": "4097cde83a28313bc95d447bb74521c6dc346ace", "externalIds": {"MAG": + "1995920728", "DOI": "10.1177/036354659702500516", "CorpusId": 27050241, "PubMed": + "9302476"}, "corpusId": 27050241, "publicationVenue": {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", + "name": "American Journal of Sports Medicine", "type": "journal", "alternate_names": + ["Am J Sport Med"], "issn": "0363-5465", "url": "http://ajs.sagepub.com/", + "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, "url": "https://www.semanticscholar.org/paper/4097cde83a28313bc95d447bb74521c6dc346ace", + "title": "Surgical Treatment of Displaced Medial Epicondyle Fractures in Adolescent + Athletes*", "abstract": "Eight adolescent athletes (average age, 11 years; + range, 9 to 15) underwent open reduction and internal fixation of acute, displaced + medial epicondyle frac tures. Fixation was achieved with a screw and washer. + Four patients (50%) had associated elbow disloca tions. Elbow motion in a + brace was initiated 4 days after surgery. The brace allowed full flexion and + exten sion but protected the elbow against valgus stress. Bracing was continued + for 4 weeks. The average du ration of followup was 10 months (range, 6 to + 13). All fractures united, and full motion was achieved in seven patients. + One patient lost 5\u00b0 of hyperextension com pared with the opposite elbow. + All eight elbows were stable to valgus stress and were pain-free. All patients + returned to full sports activity.", "venue": "American Journal of Sports Medicine", + "year": 1997, "referenceCount": 30, "citationCount": 93, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1997-09-01", "journal": {"name": "The American Journal + of Sports Medicine", "pages": "682 - 686", "volume": "25"}, "authors": [{"authorId": + "2059052009", "name": "S. L. Case"}, {"authorId": "5955344", "name": "W. Hennrikus"}]}, + {"paperId": "2400b753522dbe4ab5ab43a4995f52cd22f89cf2", "externalIds": {"MAG": + "2543087713", "DBLP": "conf/focs/Abramson71", "DOI": "10.1109/SWAT.1971.12", + "CorpusId": 22040935}, "corpusId": 22040935, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/2400b753522dbe4ab5ab43a4995f52cd22f89cf2", "title": "Effective Computation over the Real Numbers", "abstract": "Extended Turing Machines We will obtain our simplest model, the ETM, by adding to Turing Machines the ability to add, multiply, and compare real numbers. We allow @@ -48634,27 +55581,144 @@ interactions: is entered , control passGs to the flow-chart box indicated by the ith arrow leaving the TEST box (d) Write symbol i The ith symbol of the Turing machine''s alphabet \u2026", "venue": "SWAT", "year": 1971, "referenceCount": 6, "citationCount": - 19, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1971-10-13", - "journal": {"pages": "33-37"}, "authors": [{"authorId": "3159436", "name": - "F. G. Abramson"}]}, {"paperId": "ac5a88b4cd4fd1b11054de478bc4ebc637c063a9", + 19, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1971-10-13", "journal": {"pages": "33-37"}, "authors": + [{"authorId": "3159436", "name": "F. G. Abramson"}]}, {"paperId": "35acdf1e1343e2c8047a91284ca4fda50a9e7c8b", + "externalIds": {"MAG": "36160858", "CorpusId": 116729966}, "corpusId": 116729966, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/35acdf1e1343e2c8047a91284ca4fda50a9e7c8b", + "title": "UNITAIRE PSEUDO-MULTIPLICATIF ASSOCI \u00b4 E ` A UN GROUPOIDE. + APPLICATIONS ` A LA MOYENNABILIT \u00b4 E", "abstract": "From every measured + groupoid, we construct a \"pseudo-multipli- cative\" unitary, which generates + the two Hopf-von-Neumann bimodule struc- tures constructed in a former paper, + and generalize in this way the well- known multiplicative unitary associated + with a locally compact group. We prove a generalization of Leptin theorem + which connects the amenability of a measured groupoid and the existence of + an approximate unit for its Fourier algebra.", "venue": "", "year": 2000, + "referenceCount": 11, "citationCount": 37, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "121348745", + "name": "J. Vallin"}]}, {"paperId": "f390197c9283bd58fa04d5a9b2e54923c20b8d77", + "externalIds": {"MAG": "2137993073", "DOI": "10.1002/POLA.24269", "CorpusId": + 55094496}, "corpusId": 55094496, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f390197c9283bd58fa04d5a9b2e54923c20b8d77", + "title": "Synthesis, Photoluminescence, and Electrochromism of Polyamides + Containing (3,6-Di-tert-butylcarbazol-9-yl)triphenylamine Units", "abstract": + "A new carbazole-derived, triphenylamine (TPA)- containing aromatic dicarboxylic + acid monomer, 4,4 0 -dicar- boxy-4 00 -(3,6-di-tert-butylcarbazol-9-yl)TPA, + was synthesized, and it led to a series of electroactive aromatic polyamides + with main-chain TPA and pendent 3,6-bis(tert-butyl)carbazole units by reacting + it with various aromatic diamines via the phosphorylation polyamidation technique. + The polyamides were amorphous with good solubility in many organic sol- vents + and could be solution-cast into flexible and strong films. They showed high + glass-transition temperatures (282- 335 \ufffd C) and high thermal stability + (10% weight loss tempera- tures >480 \ufffd C). The electroactive polymer + films had", "venue": "", "year": 2010, "referenceCount": 88, "citationCount": + 50, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}, + {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2010-11-01", "journal": {"name": "Journal of Polymer + Science Part A", "pages": "4775-4789", "volume": "48"}, "authors": [{"authorId": + "2113218969", "name": "Hui-min Wang"}, {"authorId": "143781377", "name": "S. + Hsiao"}, {"authorId": "5281809", "name": "Guey\u2010Sheng Liou"}, {"authorId": + "94567370", "name": "C. Sun"}]}, {"paperId": "33afcc81d35a67f133826f212c4909f5dbf6f0c9", + "externalIds": {"ArXiv": "1005.4609", "DBLP": "journals/tamm/GerlachM11", + "MAG": "2133697929", "DOI": "10.4169/amer.math.monthly.118.10.863", "CorpusId": + 14686773}, "corpusId": 14686773, "publicationVenue": {"id": "a9d46553-e876-4308-976e-6b6df356a688", + "name": "The American mathematical monthly", "type": "journal", "alternate_names": + ["American Mathematical Monthly", "Am Math Mon", "Am math mon"], "issn": "0002-9890", + "url": "http://proquest.umi.com/pqdlink?Exp=09-08-2012&PMID=19428&RQT=318&Ver=1", + "alternate_urls": ["https://www.jstor.org/journal/amermathmont", "http://www.jstor.org/journals/00029890.html", + "http://www.maa.org/pubs/monthly.html"]}, "url": "https://www.semanticscholar.org/paper/33afcc81d35a67f133826f212c4909f5dbf6f0c9", + "title": "On Sphere-Filling Ropes", "abstract": "Abstract What is the longest + rope on the unit sphere? Intuition tells us that the answer to this packing + problem depends on the rope''s thickness. For a countably infinite number + of prescribed thickness values we construct and classify all solution curves. + The simplest ones are similar to the seam lines of a tennis ball; others exhibit + a striking resemblance to Turing patterns in chemistry, or to ordered phases + of long elastic rods stuffed into spherical shells.", "venue": "The American + mathematical monthly", "year": 2010, "referenceCount": 30, "citationCount": + 37, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1005.4609", "status": "GREEN"}, "fieldsOfStudy": + ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-05-25", "journal": {"name": "The American Mathematical + Monthly", "pages": "863 - 876", "volume": "118"}, "authors": [{"authorId": + "39228485", "name": "H. Gerlach"}, {"authorId": "2273067", "name": "H. Mosel"}]}, + {"paperId": "21b8e9a5c7ababf2e0645f4963dd7ee201da7de8", "externalIds": {"MAG": + "2170196557", "DOI": "10.1017/CBO9780511806414.009", "CorpusId": 34450645}, + "corpusId": 34450645, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/21b8e9a5c7ababf2e0645f4963dd7ee201da7de8", + "title": "Historical Institutionalism in Rationalist and Sociological Perspective", + "abstract": "Some of the most fruitful insights generated by social science + in recent decades flow from explorations of how institutions, under\u00ad + stood as sets of regularized practices with a rule-like quality, struc\u00ad + ture the behavior of political and economic actors. I It is not surpris\u00ad + ing that attention has now turned to the second-order problem of explaining + when and how institutions change. 2 In conceptual terms, however, this task + is intrinsically difficult. By their nature, analy\u00ad ses designed to explain + why institutions have a persistent impact on behavior tend to overstate the + solidity of institutions. Acknowledging their plasticity raises questions + about when institutions should be seen as determinants of behavior and when + as objects of strategic action themselves) This problem afflicts rational-choice + approaches to institutions with particular intensity because of the elegant + solutions such analyses have devised to explain the force and persistence + of institutions. Typically, they see institutions as patterns of regularized + behavior that reflect Pareto-optimal equilibria or subgame perfect solutions + to collective", "venue": "", "year": 2009, "referenceCount": 63, "citationCount": + 256, "influentialCitationCount": 19, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dash.harvard.edu/bitstream/1/34298769/1/historical_institutionalism_2010.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": + [{"category": "Political Science", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "123394004", + "name": "P. Hall"}]}, {"paperId": "ac5a88b4cd4fd1b11054de478bc4ebc637c063a9", "externalIds": {"MAG": "2041756859", "DOI": "10.1038/371164A0", "CorpusId": - 4322696}, "url": "https://www.semanticscholar.org/paper/ac5a88b4cd4fd1b11054de478bc4ebc637c063a9", + 4322696}, "corpusId": 4322696, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/ac5a88b4cd4fd1b11054de478bc4ebc637c063a9", "title": "Rapid GDP release from Gs\u03b1 in patients with gain and loss of endocrine function", "abstract": null, "venue": "Nature", "year": 1994, "referenceCount": 26, "citationCount": 257, "influentialCitationCount": 7, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1994-09-08", "journal": {"name": "Nature", "pages": "164-168", - "volume": "371"}, "authors": [{"authorId": "37204107", "name": "T. Iiri"}, - {"authorId": "2204188", "name": "P. Herzmark"}, {"authorId": "5438176", "name": - "J. Nakamoto"}, {"authorId": "1429162573", "name": "C. V. Dop"}, {"authorId": - "2324026", "name": "H. Bourne"}]}, {"paperId": "59542d997d9be7f31514c9125cb50742321ea105", - "externalIds": {"DBLP": "journals/cacm/Fischer65", "MAG": "2042930358", "DOI": - "10.1145/365691.365962", "CorpusId": 16736196}, "url": "https://www.semanticscholar.org/paper/59542d997d9be7f31514c9125cb50742321ea105", + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Biology", + "source": "s2-fos-model"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1994-09-08", "journal": {"name": + "Nature", "pages": "164-168", "volume": "371"}, "authors": [{"authorId": "37204107", + "name": "T. Iiri"}, {"authorId": "2204188", "name": "P. Herzmark"}, {"authorId": + "5438176", "name": "J. Nakamoto"}, {"authorId": "1429162573", "name": "C. + V. Dop"}, {"authorId": "2324026", "name": "H. Bourne"}]}, {"paperId": "9d037c5b155aa00ae2c5ef6f54f1ca4b521b0be5", + "externalIds": {"MAG": "2128249967", "DBLP": "books/daglib/0028970", "DOI": + "10.1007/978-1-4471-2359-0", "CorpusId": 11516909}, "corpusId": 11516909, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9d037c5b155aa00ae2c5ef6f54f1ca4b521b0be5", + "title": "A Brief History of Computing", "abstract": null, "venue": "Springer + London", "year": 2012, "referenceCount": 16, "citationCount": 93, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-1-4471-2359-0%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + null, "journal": {"pages": "I-XXIII, 1-264"}, "authors": [{"authorId": "2260951", + "name": "Gerard O''Regan"}]}, {"paperId": "89585cf6859fbaba66806176d19c53fb1395090e", + "externalIds": {"CorpusId": 17393702}, "corpusId": 17393702, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/89585cf6859fbaba66806176d19c53fb1395090e", + "title": "Mathematical theory of ENIGMA machine Universal Turing Machine", + "abstract": "The understanding of link-level acknowledgements is an intuitive + riddle. Such a hypothesis is regularly a practical goal but fell in line with + our expectations. Given the current status of semantic models, physicists + daringly desire the analysis of randomized algorithms. Here, we show that + the transistor can be made pseudorandom, compact, and scalable.", "venue": + "", "year": 2011, "referenceCount": 229, "citationCount": 23, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "59542d997d9be7f31514c9125cb50742321ea105", "externalIds": {"DBLP": "journals/cacm/Fischer65", + "MAG": "2042930358", "DOI": "10.1145/365691.365962", "CorpusId": 16736196}, + "corpusId": 16736196, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/59542d997d9be7f31514c9125cb50742321ea105", "title": "Multi-tape and infinite-state automata\u2014a survey", "abstract": "A survey of machines which are more powerful than finite automata and less powerful than general Turing machines is presented. It is felt that the machines @@ -48667,14 +55731,19 @@ interactions: the length of the input, (3) restrict the total amount of memory available in the same manner. Examples from all three classes and their properties are discussed.", "venue": "CACM", "year": 1965, "referenceCount": 62, "citationCount": - 26, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": "1965-12-01", - "journal": {"name": "Commun. ACM", "pages": "799-805", "volume": "8"}, "authors": - [{"authorId": "1691253", "name": "P. C. Fischer"}]}, {"paperId": "0134e3aeed56a7906bc65db6d378470bad94d8ec", - "externalIds": {"DBLP": "journals/tit/WagnerVK11", "MAG": "2114495039", "DOI": - "10.1109/TIT.2011.2137210", "CorpusId": 13186011}, "url": "https://www.semanticscholar.org/paper/0134e3aeed56a7906bc65db6d378470bad94d8ec", + 26, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "1965-12-01", "journal": {"name": "Commun. ACM", "pages": + "799-805", "volume": "8"}, "authors": [{"authorId": "1691253", "name": "P. + C. Fischer"}]}, {"paperId": "0134e3aeed56a7906bc65db6d378470bad94d8ec", "externalIds": + {"DBLP": "journals/tit/WagnerVK11", "MAG": "2114495039", "DOI": "10.1109/TIT.2011.2137210", + "CorpusId": 13186011}, "corpusId": 13186011, "publicationVenue": {"id": "748e730b-add9-47ee-819d-8ae54e504ef9", + "name": "IEEE Transactions on Information Theory", "type": "journal", "alternate_names": + ["IEEE Trans Inf Theory"], "issn": "0018-9448", "url": "http://www.comm.utoronto.ca/trans-it/", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?puNumber=18", + "http://ieeexplore.ieee.org/servlet/opac?punumber=18"]}, "url": "https://www.semanticscholar.org/paper/0134e3aeed56a7906bc65db6d378470bad94d8ec", "title": "Probability Estimation in the Rare-Events Regime", "abstract": "We address the problem of estimating the probability of an observed string that is drawn i.i.d. from an unknown distribution. Motivated by models of natural @@ -48688,7 +55757,8 @@ interactions: also yields consistent estimators for other quantities of interest and a consistent universal classifier.", "venue": "IEEE Transactions on Information Theory", "year": 2011, "referenceCount": 56, "citationCount": 26, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.ifp.illinois.edu/~pramodv/pubs/WVK09.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": @@ -48696,568 +55766,10 @@ interactions: "2011-06-01", "journal": {"name": "IEEE Transactions on Information Theory", "pages": "3207-3229", "volume": "57"}, "authors": [{"authorId": "145606712", "name": "A. Wagner"}, {"authorId": "144768649", "name": "P. Viswanath"}, {"authorId": - "1697413", "name": "S. Kulkarni"}]}, {"paperId": "f67731c10f6f8a6d2db44033cfdcaefb768b2326", - "externalIds": {"MAG": "2120611635", "DOI": "10.1007/978-1-4020-8802-5", "CorpusId": - 86028390}, "url": "https://www.semanticscholar.org/paper/f67731c10f6f8a6d2db44033cfdcaefb768b2326", - "title": "Orchid Biology: Reviews and Perspectives, X", "abstract": null, - "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 255, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "2264653", "name": "T. Kull"}, {"authorId": "144176311", "name": - "J. Arditti"}, {"authorId": "92051002", "name": "Sek-Man Wong"}]}, {"paperId": - "4bdafc897ab463bbfbe3edfd042adb573d8f4bc9", "externalIds": {"MAG": "2137129210", - "DOI": "10.1890/04-0095", "CorpusId": 59500370}, "url": "https://www.semanticscholar.org/paper/4bdafc897ab463bbfbe3edfd042adb573d8f4bc9", - "title": "INFLUENCE OF BARRIERS TO MOVEMENT ON WITHIN\u2010WATERSHED GENETIC - VARIATION OF COASTAL CUTTHROAT TROUT", "abstract": "Because human land use - activities often result in increased fragmentation of aquatic and terrestrial - habitats, a better understanding of the effects of fragmentation on the genetic - heterogeneity of animal populations may be useful for effective management. - We used eight microsatellites to examine the genetic structure of coastal - cutthroat trout (Oncorhynchus clarki clarki) in Camp Creek, an isolated headwater - stream in western Oregon. Our objectives were to determine if coastal cutthroat - trout were genetically struc- tured within streams and to assess the effects - of natural and anthropogenic barriers on coastal cutthroat trout genetic variation. - Fish sampling occurred at 10 locations, and allele frequencies differed significantly - among all sampling sections. Dispersal barriers strongly influenced coastal - cutthroat trout genetic structure and were associated with reduced genetic - diversity and increased genetic differentiation. Results indicate that Camp - Creek coastal cutthroat trout exist as many small, partially independent populations - that are strongly affected by genetic drift. In headwater streams, barriers - to movement can result in genetic and demographic isolation leading to reduced - coastal cutthroat trout genetic diversity, and potentially compromising long-term - population persistence. When habitat fragmentation eliminates gene flow among - small populations, similar results may occur in other species.", "venue": - "", "year": 2005, "referenceCount": 58, "citationCount": 258, "influentialCitationCount": - 20, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2005-04-01", "journal": {"name": "Ecological Applications", "pages": "628-637", - "volume": "15"}, "authors": [{"authorId": "21520775", "name": "J. E. Wofford"}, - {"authorId": "3603980", "name": "R. Gresswell"}, {"authorId": "2735035", "name": - "M. Banks"}]}, {"paperId": "0da7e2a1e6566528587e1a6c20baa4984091fdbf", "externalIds": - {"MAG": "2171724790", "DOI": "10.1111/J.1468-5914.1986.TB00073.X", "CorpusId": - 146663727}, "url": "https://www.semanticscholar.org/paper/0da7e2a1e6566528587e1a6c20baa4984091fdbf", - "title": "Reflections on the Turing Test", "abstract": null, "venue": "", - "year": 1986, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1986-07-01", "journal": {"name": "Journal for The - Theory of Social Behaviour", "pages": "161-172", "volume": "16"}, "authors": - [{"authorId": "114381027", "name": "Charles H. Karelis"}]}, {"paperId": "8da20de0d1920eee2279382d47930e622323849c", - "externalIds": {"DBLP": "conf/dsd/ClermidyLPKT09", "MAG": "2156193159", "DOI": - "10.1109/DSD.2009.200", "CorpusId": 107064}, "url": "https://www.semanticscholar.org/paper/8da20de0d1920eee2279382d47930e622323849c", - "title": "An Open and Reconfigurable Platform for 4G Telecommunication: Concepts - and Application", "abstract": "Advanced telecommunication applications require - more and more flexibility. Static and run-time configuration mechanisms, as - well as plug-in computing units are two solutions to solve this issue. In - this paper, we propose an open architec- ture, dedicated to complex data-flow - applications, fulfilling these requirements thanks to a distributed configuration - scheme and a standard interface for data flow computing units. Based on this - architecture, an open platform demonstrator has been designed. Simulation - results on a 3GPP/LTE application are presented, showing a reconfiguration - time overhead of only 2.6%.", "venue": "2009 12th Euromicro Conference on - Digital System Design, Architectures, Methods and Tools", "year": 2009, "referenceCount": - 11, "citationCount": 52, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2009-08-27", "journal": {"name": "2009 12th Euromicro Conference on Digital - System Design, Architectures, Methods and Tools", "pages": "449-456"}, "authors": - [{"authorId": "1738545", "name": "F. Clermidy"}, {"authorId": "36725494", - "name": "R. Lemaire"}, {"authorId": "2232339", "name": "X. Popon"}, {"authorId": - "3347861", "name": "D. Kt\u00e9nas"}, {"authorId": "1699829", "name": "Y. - Thonnart"}]}, {"paperId": "30faed6f0999e1d11350ee80106bb2dbd6cb4063", "externalIds": - {"MAG": "1975020978", "DBLP": "conf/stoc/Furer82", "DOI": "10.1145/800070.802172", - "CorpusId": 10572934}, "url": "https://www.semanticscholar.org/paper/30faed6f0999e1d11350ee80106bb2dbd6cb4063", - "title": "The tight deterministic time hierarchy", "abstract": "Let k be a - constant -&-ge; 2, and let us consider only deterministic k-tape Turing machines.\n - We assume t2(n) -&-gt; n and t2 - is computable in time t2. Then there is a language which - is accepted in time t2, but not accepted in any time - t1 with t1(n) -&-equil; o(t2(n)).\n - Furthermore, we obtain a strong hierarchy (isomorphic to the rationals Q) - for languages accepted in fixed space and variable time.", "venue": "Symposium - on the Theory of Computing", "year": 1982, "referenceCount": 9, "citationCount": - 37, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1982-05-05", "journal": {"pages": - "8-16"}, "authors": [{"authorId": "3306188", "name": "Martin F\u00fcrer"}]}, - {"paperId": "69db78cefaabec788cb10261bae8f8063b84d7c7", "externalIds": {"DBLP": - "journals/siamcomp/Ukkonen83", "MAG": "2055734996", "DOI": "10.1137/0212038", - "CorpusId": 26484050}, "url": "https://www.semanticscholar.org/paper/69db78cefaabec788cb10261bae8f8063b84d7c7", - "title": "Two Results on Polynomial Time Truth-Table Reductions to Sparse - Sets", "abstract": "Inspired by the recent solution of the Berman-Hartmanis - conjecture [SIAM J. Comp., 6 (1977), pp. 305\u2013322] that NP cannot have - a sparse complete set for many-one reductions unless ${\\text{P}} = {\\text{NP}}$, - we analyze the implications of NP and PSPACE having sparse, hard or complete - sets for reduction types more general than the many-one reductions. Three - special cases of truth-table reductions are considered. First we show that - if NP (PSPACE) has a tally $ \\leqq _{k - T}^P $-hard set, then ${\\text{P}} - = {\\text{NP}}$$({\\text{P}} = {\\text{PSPACE}})$. Here $ \\leqq _{k - T}^P - $ denotes a subcase of polynomial time Turing reducibility in which, for some - constant k, the reducing Turing machine is allowed to make at most k queries - to the oracle. We also show that if co-NP (PSPACE) has a sparse hard set for - conjunctive polynomial time reductions, then ${\\text{P}} = {\\text{NP}}$$({\\text{P}} - = {\\text{PSPACE}})$.", "venue": "SIAM J. Comput.", "year": 1983, "referenceCount": - 0, "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1983-08-01", "journal": - {"name": "SIAM J. Comput.", "pages": "580-587", "volume": "12"}, "authors": - [{"authorId": "1722211", "name": "E. Ukkonen"}]}, {"paperId": "f0d15b1d50476b1da7db14f1902f975a499d234b", - "externalIds": {"DBLP": "conf/sigcse/CavalcanteFR04", "MAG": "2100477995", - "DOI": "10.1145/971300.971349", "CorpusId": 5359184}, "url": "https://www.semanticscholar.org/paper/f0d15b1d50476b1da7db14f1902f975a499d234b", - "title": "A visual and interactive automata theory course with JFLAP 4.0", - "abstract": "We describe the instructional software JFLAP 4.0 and how it can - be used to provide a hands-on formal languages and automata theory course. - JFLAP 4.0 doubles the number of chapters worth of material from JFLAP 3.1, - now covering topics from eleven of thirteen chapters for a semester course. - JFLAP 4.0 has easier interactive approaches to previous topics and covers - many new topics including three parsing algorithms, multi-tape Turing machines, - L-systems, and grammar transformations.", "venue": "SIGCSE ''04", "year": - 2004, "referenceCount": 12, "citationCount": 37, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2004-03-01", "journal": {"pages": "140-144"}, "authors": - [{"authorId": "2759387", "name": "Ryan Cavalcante"}, {"authorId": "50256971", - "name": "Thomas Finley"}, {"authorId": "2214161", "name": "S. Rodger"}]}, - {"paperId": "8c70e5566670fa5b6b9e163516ccd630f64763d0", "externalIds": {"MAG": - "1534710488", "DBLP": "conf/birthday/KariKL99", "DOI": "10.1007/978-3-642-60207-8_31", - "CorpusId": 2900044}, "url": "https://www.semanticscholar.org/paper/8c70e5566670fa5b6b9e163516ccd630f64763d0", - "title": "Reversible Molecular Computation in Ciliates", "abstract": null, - "venue": "Jewels are Forever", "year": 1999, "referenceCount": 28, "citationCount": - 26, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "353-363"}, "authors": [{"authorId": "144073818", "name": "L. Kari"}, - {"authorId": "1753080", "name": "J. Kari"}, {"authorId": "1801972", "name": - "L. Landweber"}]}, {"paperId": "75ae39283b5e048eff36a36c072a106cca115b4e", - "externalIds": {"MAG": "2030178265", "DOI": "10.1007/s00345-006-0129-4", "CorpusId": - 14600527, "PubMed": "17077974"}, "url": "https://www.semanticscholar.org/paper/75ae39283b5e048eff36a36c072a106cca115b4e", - "title": "Management of ejaculatory duct obstruction: etiology, diagnosis, - and treatment", "abstract": null, "venue": "World journal of urology", "year": - 2006, "referenceCount": 52, "citationCount": 43, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": "2006-11-01", "journal": {"name": "World Journal of Urology", - "pages": "604-610", "volume": "24"}, "authors": [{"authorId": "80915789", - "name": "H. Fisch"}, {"authorId": "47337621", "name": "S. Lambert"}, {"authorId": - "6551064", "name": "E. Goluboff"}]}, {"paperId": "c9693b63f1db590c58ea586f315dcb1bcec31d60", - "externalIds": {"DBLP": "journals/cacm/Loebner94", "MAG": "92019153", "CorpusId": - 38103602}, "url": "https://www.semanticscholar.org/paper/c9693b63f1db590c58ea586f315dcb1bcec31d60", - "title": "Response to \"Lessons from a Restricted Turing Test\"", "abstract": - null, "venue": "Commun. ACM", "year": 1994, "referenceCount": 0, "citationCount": - 24, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"name": "Commun. ACM", "pages": "79-82", "volume": "37"}, - "authors": [{"authorId": "47860332", "name": "H. Loebner"}]}, {"paperId": - "8a66b11a21c763809ba4f5512a04421a6af9124a", "externalIds": {"MAG": "1996505402", - "DOI": "10.2298/FIL0701087S", "CorpusId": 16200281}, "url": "https://www.semanticscholar.org/paper/8a66b11a21c763809ba4f5512a04421a6af9124a", - "title": "Minimal structures, generalized topologies, and ascending systems - should not be studied without generalized uniformities", "abstract": "By using - the Pervin relations, we show that all minimal struc- tures, generalized topologies, - and ascending systems can be naturally de- rived from generalized uniformities. - Therefore, they need not be studied separately.", "venue": "", "year": 2007, - "referenceCount": 66, "citationCount": 22, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Filomat", "pages": "87-97", "volume": "21"}, "authors": - [{"authorId": "101212935", "name": "\u00c1. Sz\u00e1z"}]}, {"paperId": "8dfd401081aa74d893d2e9af40d4511b2f8c93ab", - "externalIds": {"MAG": "2118691009", "DOI": "10.1146/annurev-neuro-061010-113618", - "CorpusId": 25279743, "PubMed": "22715881"}, "url": "https://www.semanticscholar.org/paper/8dfd401081aa74d893d2e9af40d4511b2f8c93ab", - "title": "Early events in axon/dendrite polarization.", "abstract": "Differentiation - of axons and dendrites is a critical step in neuronal development. Here we - review the evidence that axon/dendrite formation during neuronal polarization - depends on the intrinsic cytoplasmic asymmetry inherited by the postmitotic - neuron, the exposure of the neuron to extracellular chemical factors, and - the action of anisotropic mechanical forces imposed by the environment. To - better delineate the functions of early signals among a myriad of cellular - components that were shown to influence axon/dendrite formation, we discuss - their functions by distinguishing their roles as determinants, mediators, - or modulators and consider selective degradation of these components as a - potential mechanism for axon/dendrite polarization. Finally, we examine whether - these early events of axon/dendrite formation involve local autocatalytic - activation and long-range inhibition, as postulated by Alan Turing for the - morphogenesis of patterned biological structure.", "venue": "Annual Review - of Neuroscience", "year": 2012, "referenceCount": 135, "citationCount": 92, - "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": ["Biology", - "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], "publicationDate": - "2012-06-20", "journal": {"name": "Annual review of neuroscience", "pages": - "\n 181-201\n ", "volume": "35"}, "authors": [{"authorId": - "47959604", "name": "Pei-Lin Cheng"}, {"authorId": "1823913", "name": "M. - Poo"}]}, {"paperId": "095eaaed82a7adda97c458683961ce146736a704", "externalIds": - {"ACL": "N15-1042", "MAG": "2189550228", "DBLP": "conf/naacl/BallesterosBMW15", - "DOI": "10.3115/v1/N15-1042", "CorpusId": 18499217}, "url": "https://www.semanticscholar.org/paper/095eaaed82a7adda97c458683961ce146736a704", - "title": "Data-driven sentence generation with non-isomorphic trees", "abstract": - "Abstract structures from which the generation naturally starts often do not - contain any func- tional nodes, while surface-syntactic struc- tures or a - chain of tokens in a linearized tree contain all of them. Therefore, data-driven - linguistic generation needs to be able to cope with the projection between - non-isomorphic structures that differ in their topology and number of nodes. - So far, such a projection has been a challenge in data-driven genera- tion - and was largely avoided. We present a fully stochastic generator that is able - to cope with projection between non-isomorphic structures. The generator, - which starts from PropBank-like structures, consists of a cas- cade of SVM-classifier - based submodules that map in a series of transitions the input struc- tures - onto sentences. The generator has been evaluated for English on the Penn-Treebank - and for Spanish on the multi-layered Ancora- UPF corpus.", "venue": "North - American Chapter of the Association for Computational Linguistics", "year": - 2015, "referenceCount": 40, "citationCount": 26, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": null, "journal": {"pages": "387-397"}, "authors": - [{"authorId": "143668305", "name": "Miguel Ballesteros"}, {"authorId": "1678747", - "name": "Bernd Bohnet"}, {"authorId": "2738095", "name": "Simon Mille"}, {"authorId": - "1758440", "name": "Leo Wanner"}]}, {"paperId": "9a107823fc5621c9c4d0473b5e1ad886732e50c9", - "externalIds": {"MAG": "1542911280", "DOI": "10.1023/A:1019159427561", "CorpusId": - 17919629}, "url": "https://www.semanticscholar.org/paper/9a107823fc5621c9c4d0473b5e1ad886732e50c9", - "title": "On the origin of Turing instability", "abstract": null, "venue": - "", "year": 1997, "referenceCount": 91, "citationCount": 15, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1997-12-01", - "journal": {"name": "Journal of Mathematical Chemistry", "pages": "39-53", - "volume": "22"}, "authors": [{"authorId": "2373050", "name": "L. Szili"}, - {"authorId": "145710873", "name": "J. T\u00f3th"}]}, {"paperId": "5d47b1c4e1fd506a8a52a5a311726dad5d82ec18", - "externalIds": {"MAG": "2167611928", "DOI": "10.1109/WCICA.2006.1713000", - "CorpusId": 15669848}, "url": "https://www.semanticscholar.org/paper/5d47b1c4e1fd506a8a52a5a311726dad5d82ec18", - "title": "Some Results of Fuzzy Turing Machines", "abstract": "In this paper - we study the variants of fuzzy Turing machines and universal fuzzy Turing - machine. First we give several equivalent formulations of fuzzy Turing machines - which correspond to fuzzy deterministic Turing machines (FDTMs), fuzzy nondeterministic - Turing machines (FNTMs) and multitape fuzzy Turing machines. Then the notions - of fuzzy recursively enumerable languages and fuzzy recursive languages are - defined in terms of FDTMs. The level characterizations of fuzzy recursively - enumerable languages and fuzzy recursive languages are exploited. Second, - we show that there is no universal fuzzy Turing machine that can simulate - any fuzzy Turing machine on it. Finally, we propose the notion of complexity - classes of fuzzy languages by using the time-bounded fuzzy Turing machines. - In particular, the notions of fuzzy polynomial time-bounded computation (FP) - and fuzzy nondeterministic polynomial time-bounded computation (FNP) are introduced, - their connections to P and NP are also characterized", "venue": "World Congress - on Intelligent Control and Automation", "year": 2006, "referenceCount": 12, - "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2006-10-23", "journal": {"name": - "2006 6th World Congress on Intelligent Control and Automation", "pages": - "3406-3409", "volume": "1"}, "authors": [{"authorId": "51394392", "name": - "Yongming Li"}]}, {"paperId": "b1fe4030602423aeec9abddf91b7f468234dedb9", - "externalIds": {"MAG": "1983886436", "DOI": "10.2164/jandrol.111.013912", - "CorpusId": 42158723, "PubMed": "22096085"}, "url": "https://www.semanticscholar.org/paper/b1fe4030602423aeec9abddf91b7f468234dedb9", - "title": "Transurethral seminal vesiculoscopy using a 6F vesiculoscope for - ejaculatory duct obstruction: initial experience.", "abstract": "Ejaculatory - duct obstruction (EDO) is a surgically correctable condition that occurs in - some infertile men. The standard therapy is transurethral resection of ejaculatory - ducts (TURED). However, TURED has been associated with a high risk of complications, - including the impairment of semen parameters and retrograde ejaculation. In - our clinical practice, vesiculoscopy has demonstrated potential as a minimally - invasive alternative technique for the diagnosis and treatment of EDO. Very - few studies have examined transurethral seminal vesiculoscopy (TRU-SVS) in - recent years, and no study has examined 6F vesiculoscopes. Therefore, we performed - a retrospective study of TRU-SVS using a 6F vesiculoscope and its effect on - the diagnosis and treatment of EDO. A total of 21 patients who underwent this - procedure were included in the study. The mean patient age was 28.8 years - (range, 23-36 years). The procedure was completed successfully in all patients - within a mean time of 31.5 minutes and a mean hospital stay of 1.17 days. - All patients had EDO. Calculi were found in the ejaculatory ducts or in the - seminal vesicles of 5 patients. Sperm was detected in 11 patients 1-3 months - postsurgery and in another 8 patients 3-12 months postsurgery. No sperm was - detected in the remaining 2 patients by 12 months postsurgery. Epididymitis, - retrograde ejaculation, urinary incontinence, and rectal injury were not observed. - These data indicate that TRU-SVS using a 6F vesiculoscope affords direct access - to the seminal vesicle and offers the advantages of fewer complications and - more optimal sperm recovery as well as direct, dynamic video imaging.", "venue": - "Journal of andrology", "year": 2012, "referenceCount": 17, "citationCount": - 44, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2012-07-08", "journal": {"name": "Journal of andrology", - "pages": "\n 637-43\n ", "volume": "33 4"}, "authors": [{"authorId": - "2108969009", "name": "Hai-feng Wang"}, {"authorId": "5381908", "name": "H. - Ye"}, {"authorId": "66247316", "name": "Chuanliang Xu"}, {"authorId": "2109231409", - "name": "Zhiyong Liu"}, {"authorId": "49779648", "name": "Xu Gao"}, {"authorId": - "39431334", "name": "J. Hou"}, {"authorId": "2152506583", "name": "Lei Wang"}, - {"authorId": "38200084", "name": "S. Piao"}, {"authorId": "49697807", "name": - "Yinghao Sun"}]}, {"paperId": "d462138ec20ba7140c74adc9eddbd09b3348a77f", - "externalIds": {"DBLP": "conf/securecomm/WangWWW17", "DOI": "10.1007/978-3-319-78813-5_12", - "CorpusId": 19123675}, "url": "https://www.semanticscholar.org/paper/d462138ec20ba7140c74adc9eddbd09b3348a77f", - "title": "Turing Obfuscation", "abstract": null, "venue": "SecureComm", "year": - 2017, "referenceCount": 25, "citationCount": 8, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "225-244"}, "authors": [{"authorId": - "2152540989", "name": "Yan Wang"}, {"authorId": "2118511020", "name": "Shuai - Wang"}, {"authorId": "2118950738", "name": "Pei Wang"}, {"authorId": "9180687", - "name": "Dinghao Wu"}]}, {"paperId": "0040a7c825d5ce6127331c446989129ff419226d", - "externalIds": {"MAG": "1981253722", "DOI": "10.1111/j.1462-2920.2009.02064.x", - "CorpusId": 45014169, "PubMed": "19788653"}, "url": "https://www.semanticscholar.org/paper/0040a7c825d5ce6127331c446989129ff419226d", - "title": "Identification of genes regulated by the MvaT-like paralogues TurA - and TurB of Pseudomonas putida KT2440.", "abstract": "The genome of the Pseudomonas - putida strain KT2440 contains five paralogous proteins (TurA, TurB, TurC, - TurD and TurE) of the H-NS-like MvaT class of transcription regulators. TurA - and TurB belong to groups I and II, respectively, both containing orthologous - MvaT proteins that are present in all Pseudomonadaceae species. On the contrary, - TurC, TurD and TurE belong to group III, which contains species-specific paralogous - MvaT proteins. We analysed the global effects on the P. putida KT2440 transcriptome - of eliminating the conserved TurA and TurB proteins, which had been identified - in our previous studies aimed to search for novel specific co-regulators of - the upper TOL operon for toluene biodegradation. While the loss of TurA de-repressed - the expression of many genes covering a broad range of functional classes - in both mid-exponential and early stationary phases, the absence of TurB brought - about a very different outcome. Although the loss of TurB affected also very - different functions, the number of genes that changed in the turB mutant was - fivefold smaller than that of TurA. Furthermore, TurB does not act generally - as repressor. Interestingly, the degree of overlap between their mutual regulons - is very limited. A closer examination of one case where such overlap clearly - occurs (a gene cluster for biosynthesis of lipodepsinonapeptide phytotoxins) - revealed that TurA and TurB can act in concert, perhaps by forming a heterodimer. - In addition, our results indicate that TurA is the master regulator of TurB - as well as of the other paralogues, TurD and TurE.", "venue": "Environmental - microbiology", "year": 2010, "referenceCount": 32, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "Environmental - microbiology", "pages": "\n 254-63\n ", "volume": "12 1"}, - "authors": [{"authorId": "4877991", "name": "F. Renzi"}, {"authorId": "14698297", - "name": "E. Rescalli"}, {"authorId": "47528594", "name": "E. Galli"}, {"authorId": - "50548267", "name": "G. Bertoni"}]}, {"paperId": "1e1cbf43fa57c2f50f346f3cff82c06ead986e55", - "externalIds": {"DBLP": "journals/sLogica/BeggsCT10", "MAG": "2067890769", - "DOI": "10.1007/S11225-010-9254-6", "CorpusId": 18824534}, "url": "https://www.semanticscholar.org/paper/1e1cbf43fa57c2f50f346f3cff82c06ead986e55", - "title": "Physical Oracles: The Turing Machine and the Wheatstone Bridge", - "abstract": null, "venue": "Stud Logica", "year": 2010, "referenceCount": - 19, "citationCount": 21, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-07-01", "journal": {"name": "Studia Logica", "pages": "279-300", "volume": - "95"}, "authors": [{"authorId": "1919705", "name": "E. Beggs"}, {"authorId": - "143698164", "name": "Jos\u00e9 F\u00e9lix Costa"}, {"authorId": "145744796", - "name": "J. V. Tucker"}]}, {"paperId": "fbe4b73bb9be4362359c8db1579b26373dbfc75e", - "externalIds": {"MAG": "2158122617", "DOI": "10.1002/1615-4169(20010430)343:4<313::AID-ADSC313>3.0.CO;2-A", - "CorpusId": 3680560}, "url": "https://www.semanticscholar.org/paper/fbe4b73bb9be4362359c8db1579b26373dbfc75e", - "title": "Development of Nickel-on-Charcoal as a ''''Dirt-Cheap'''' Heterogeneous - Catalyst: A Personal Account", "abstract": "A personal account tracing the - origins and continuing evolution of nickel-on-charcoal (Ni/C) as a practical, - alternative, group 10 metal catalyst is presented. Discussed are applications - to several ''''name reactions'''' which lead to both car- bon-carbon and carbon-nitrogen - bond construc- tions utilizing inexpensive aryl chlorides as sub- strates. - Reductions of chloroarenes are also catalyzed by Ni/C, a process which may - be worthy of consideration in terms of environmental clean- up of PCBs and - dioxins. Collaborative efforts are also mentioned aimed at probing the surface - struc- ture of Ni/C, with the goal of enhancing catalyst ac- tivity. Future - directions for development of hetero- geneous nickel catalysts are proposed.", - "venue": "", "year": 2001, "referenceCount": 8, "citationCount": 53, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-04-30", - "journal": {"name": "Advanced Synthesis & Catalysis", "pages": "313-326", - "volume": "343"}, "authors": [{"authorId": "3605795", "name": "B. Lipshutz"}]}, - {"paperId": "dc8568c1ff36e59129532d28c5a42bd42f162cf8", "externalIds": {"MAG": - "1659915469", "DOI": "10.1109/9780470544297.CH3", "CorpusId": 56503655}, "url": - "https://www.semanticscholar.org/paper/dc8568c1ff36e59129532d28c5a42bd42f162cf8", - "title": "Computing Machinery and Intelligence Amplification", "abstract": - "This chapter contains sections titled: Introduction Estimating Intelligence - Turing Test and Intelligence Amplification Measuring Intelligence Amplification - The Future of Intelligence Amplification This chapter contains sections titled: - References ]]>", "venue": "", "year": 2003, "referenceCount": 0, "citationCount": - 19, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "pages": "25-44", "volume": - ""}, "authors": [{"authorId": "144330013", "name": "D. Fogel"}, {"authorId": - "2064938312", "name": "Charles J. Robinson"}]}, {"paperId": "b8e7dc1900212a66f635ddc25e60ce6c64d3f506", - "externalIds": {"MAG": "2080436507", "DOI": "10.1016/0378-4371(92)90262-O", - "CorpusId": 122645853}, "url": "https://www.semanticscholar.org/paper/b8e7dc1900212a66f635ddc25e60ce6c64d3f506", - "title": "Numerical studies of Turing patterns selection in a two-dimensional - system", "abstract": null, "venue": "", "year": 1992, "referenceCount": 22, - "citationCount": 54, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1992-09-01", "journal": {"name": - "Physica A-statistical Mechanics and Its Applications", "pages": "158-171", - "volume": "188"}, "authors": [{"authorId": "91298566", "name": "V. Dufiet"}, - {"authorId": "2313078", "name": "J. Boissonade"}]}, {"paperId": "740485b1628e4ea604c961a9b420fb101b436cec", - "externalIds": {"MAG": "2003575723", "DOI": "10.1063/1.2354477", "CorpusId": - 5321391, "PubMed": "17014235"}, "url": "https://www.semanticscholar.org/paper/740485b1628e4ea604c961a9b420fb101b436cec", - "title": "Introduction: Self-organization in nonequilibrium chemical systems.", - "abstract": "The field of self-organization in nonequilibrium chemical systems - comprises the study of dynamical phenomena in chemically reacting systems - far from equilibrium. Systematic exploration of this area began with investigations - of the temporal behavior of the Belousov-Zhabotinsky oscillating reaction, - discovered accidentally in the former Soviet Union in the 1950s. The field - soon advanced into chemical waves in excitable media and propagating fronts. - With the systematic design of oscillating reactions in the 1980s and the discovery - of Turing patterns in the 1990s, the scope of these studies expanded dramatically. - The articles in this Focus Issue provide an overview of the development and - current state of the field.", "venue": "Chaos", "year": 2006, "referenceCount": - 94, "citationCount": 53, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Review"], "publicationDate": "2006-09-27", "journal": {"name": "Chaos", "pages": - "\n 037101\n ", "volume": "16 3"}, "authors": [{"authorId": - "144854275", "name": "I. Epstein"}, {"authorId": "5602064", "name": "J. Pojman"}, - {"authorId": "145441421", "name": "O. Steinbock"}]}, {"paperId": "3f11ea1ce2b79f369f9561efa2d59362b178be73", - "externalIds": {"MAG": "1971726219", "DOI": "10.1038/418141a", "CorpusId": - 4417438, "PubMed": "12110876"}, "url": "https://www.semanticscholar.org/paper/3f11ea1ce2b79f369f9561efa2d59362b178be73", - "title": "Theoretical biology: Ants on a Turing trail", "abstract": null, - "venue": "Nature", "year": 2002, "referenceCount": 3, "citationCount": 15, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Philosophy", - "Medicine"], "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": - "s2-fos-model"}], "publicationTypes": ["News"], "publicationDate": "2002-07-11", - "journal": {"name": "Nature", "pages": "141-142", "volume": "418"}, "authors": - [{"authorId": "2399129", "name": "P. Hammerstein"}, {"authorId": "4007768", - "name": "O. Leimar"}]}, {"paperId": "9e4f79c2f6ce80d9aa0c941567564ab86edaa483", - "externalIds": {"MAG": "2064124055", "DOI": "10.1103/PHYSREVLETT.71.1538", - "CorpusId": 22563381, "PubMed": "10054433"}, "url": "https://www.semanticscholar.org/paper/9e4f79c2f6ce80d9aa0c941567564ab86edaa483", - "title": "Convective Turing patterns.", "abstract": "Turing patterns involve - regions of different chemical compositions which lead to density gradients - that, in liquids, are potentially unstable hydrodynamically. Nonlinear hydrodynamics - coupled with a model of Turing pattern formation show that convection modifies - and coexists with some Turing patterns and excludes others, and thereby plays - a significant role in pattern selection", "venue": "Physical review letters", - "year": 1993, "referenceCount": 11, "citationCount": 9, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1993-09-06", "journal": {"name": "Physical - review letters", "pages": "\n 1538-1541\n ", "volume": "71 - 10"}, "authors": [{"authorId": "29943243", "name": "V\u00e1squez"}, {"authorId": - "29936647", "name": "Wilder"}, {"authorId": "2076542489", "name": "Edwards"}]}, - {"paperId": "93e45bd05f53d90972087b799066988a877650e4", "externalIds": {"MAG": - "1606919710", "DOI": "10.1142/9789812384775", "CorpusId": 118020859}, "url": - "https://www.semanticscholar.org/paper/93e45bd05f53d90972087b799066988a877650e4", - "title": "Introduction to Quantum Computers", "abstract": "The Turing machine - binary system and Boolean algebra the quantum computer the discrete Fourier - transform quantum factorization of integers logic gates implementation of - logic gates using transistors reversible logic gates quantum logic gates tow - and three Qubit quantum logic gates on-Qubit rotation Aj transformation Bjk - transformation unitary transformations and quantum dynamics quantum dynamics - at finite temperature physical realization of quantum computations Control-Not - gate in an ion trap Aj and Bjk gates in an ion trap linear chains of nuclear - spins digital gates in a spin chain nonresonant action of pi-pulses experimental - logic gates in quantum systems - achievements and opportunities error correction - for quantum gates in a two-spin system quantum logic gates in a spin ensemble - at room temperature evolution of an ensemble of four-spin molecules how to - get the desired density matrix?", "venue": "", "year": 1998, "referenceCount": - 0, "citationCount": 93, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1998-07-08", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "145465904", "name": "G. Berman"}, - {"authorId": "30086297", "name": "G. Doolen"}, {"authorId": "6259852", "name": - "R. Mainieri"}, {"authorId": "145792107", "name": "V. Tsifrinovich"}]}, {"paperId": - "b41a1d9638291964275891a0987e4c7b7d04f6d7", "externalIds": {"MAG": "2134229141", - "DOI": "10.1139/F04-040", "CorpusId": 53131964}, "url": "https://www.semanticscholar.org/paper/b41a1d9638291964275891a0987e4c7b7d04f6d7", - "title": "Factors influencing stream temperatures in small streams: substrate - effects and a shading experiment", "abstract": "The temperature of stream - water is an important control of many in-stream processes. To better understand - the processes and consequences of solar energy inputs to streams, stream temperature - dynamics were examined before, during, and after experimental shading of a - 150-m reach of a second-order stream in the Oregon Cascade Range. Maxi- mum - water temperatures declined significantly in the shaded reach, but minimum - and mean temperatures were not modified. Heat budget calculations before shading - show the dominance of solar energy as an influence of stream tem- perature. - The influence of substrate type on stream temperature was examined separately - where the water flowed first over bedrock and then through alluvial substrates. - Maximum temperatures in the upstream bedrock reach were up to 8.6 \u00b0C - higher and 3.4 \u00b0C lower than downstream in the alluvial reach. Better - understanding of factors that influence not only maximum but minimum temperatures - as well as diurnal temperature variation will highlight types of reaches in - which stream temperature would be most responsive to changes in shading. Many - apparent discrepancies in stream temperature literature can be explained by - considering variation in the relative importance of different stream tempera- - ture drivers within and among streams and over time. Resume : Dans les cours - d''eau, la temperature de l''eau est un important facteur de controle de plusieurs - processus internes. Afin de mieux comprendre les processus relies a l''apport - d''energie solaire dans les cours d''eau et d''en eva- luer les consequences, - nous avons examine la dynamique thermique avant, pendant et apres une experience - dans laquelle nous avons ombrage experimentalement une section de 150 m d''un - ruisseau d''ordre deux dans la chaine des monts Cascades en Oregon. Les temperatures - maximales de l''eau ont decru significativement dans la section ombragee, - mais les temperatures minimales et moyennes sont restees inchangees. Les calculs - de bilans thermiques avant l''experience ont montre que l''energie solaire - a une influence dominante sur la temperature du cours d''eau. L''effet du - type de substrat sur la temperature du cours d''eau a pu etre examine separement - la ou l''eau coule d''abord sur la roche-mere pour ensuite traverser des substrats - alluviaux. Les temperatures maximales dans la section de roche-mere d''amont - sont jusqu''a 8,6 \u00b0C superieures et 3,4 \u00b0C inferieures a celles - de la section alluviale d''aval. Une meilleure comprehension des facteurs - qui influencent non seulement les temperatures maximales et minimales, mais - aussi la variation journaliere de la temperature, permettra d''identifier - les sections dans lesquelles la temperature du cours d''eau est plus susceptible - d''etre affectee par les changements d''ombrage. Plusieurs contradictions - apparentes dans la littera- ture scientifique concernant la temperature des - cours d''eau peuvent s''expliquer en considerant les variations dans le temps, - ainsi que dans un meme cours d''eau et d''un cours d''eau a un autre, de l''importance - relative des differents facteurs qui regissent la temperature des cours d''eau. - (Traduit par la Redaction) Johnson 923", "venue": "", "year": 2004, "referenceCount": - 49, "citationCount": 390, "influentialCitationCount": 45, "isOpenAccess": - false, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": - "Environmental Science", "source": "external"}], "publicationTypes": null, - "publicationDate": "2004-06-01", "journal": {"name": "Canadian Journal of - Fisheries and Aquatic Sciences", "pages": "913-923", "volume": "61"}, "authors": - [{"authorId": "6280185", "name": "S. Johnson"}]}, {"paperId": "33afcc81d35a67f133826f212c4909f5dbf6f0c9", - "externalIds": {"ArXiv": "1005.4609", "DBLP": "journals/tamm/GerlachM11", - "MAG": "2133697929", "DOI": "10.4169/amer.math.monthly.118.10.863", "CorpusId": - 14686773}, "url": "https://www.semanticscholar.org/paper/33afcc81d35a67f133826f212c4909f5dbf6f0c9", - "title": "On Sphere-Filling Ropes", "abstract": "Abstract What is the longest - rope on the unit sphere? Intuition tells us that the answer to this packing - problem depends on the rope''s thickness. For a countably infinite number - of prescribed thickness values we construct and classify all solution curves. - The simplest ones are similar to the seam lines of a tennis ball; others exhibit - a striking resemblance to Turing patterns in chemistry, or to ordered phases - of long elastic rods stuffed into spherical shells.", "venue": "The American - mathematical monthly", "year": 2010, "referenceCount": 30, "citationCount": - 37, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-05-25", "journal": {"name": "The American Mathematical - Monthly", "pages": "863 - 876", "volume": "118"}, "authors": [{"authorId": - "39228485", "name": "H. Gerlach"}, {"authorId": "2273067", "name": "H. Mosel"}]}, - {"paperId": "c229655d0de7bf5322cc29c9167bd6e8106e6ead", "externalIds": {"MAG": - "1551050533", "DOI": "10.1002/rcs.1570", "CorpusId": 19678624, "PubMed": "24442995"}, - "url": "https://www.semanticscholar.org/paper/c229655d0de7bf5322cc29c9167bd6e8106e6ead", - "title": "A novel modification of the Turing test for artificial intelligence - and robotics in healthcare", "abstract": "The increasing demands of delivering - higher quality global healthcare has resulted in a corresponding expansion - in the development of computer\u2010based and robotic healthcare tools that - rely on artificially intelligent technologies. The Turing test was designed - to assess artificial intelligence (AI) in computer technology. It remains - an important qualitative tool for testing the next generation of medical diagnostics - and medical robotics.", "venue": "The international journal of medical robotics - + computer assisted surgery : MRCAS", "year": 2015, "referenceCount": 15, - "citationCount": 26, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Medicine", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2015-03-01", "journal": {"name": "The International Journal - of Medical Robotics and Computer Assisted Surgery", "pages": "38 - 43", "volume": - "11"}, "authors": [{"authorId": "46370967", "name": "H. Ashrafian"}, {"authorId": - "11388466", "name": "A. Darzi"}, {"authorId": "2659182", "name": "T. Athanasiou"}]}, - {"paperId": "7398555db176a85ba70e273d060e80c4f32ea2bc", "externalIds": {"MAG": - "2112069571", "DOI": "10.1103/PHYSREVE.67.066219", "CorpusId": 33002738, "PubMed": - "16241338"}, "url": "https://www.semanticscholar.org/paper/7398555db176a85ba70e273d060e80c4f32ea2bc", + "1697413", "name": "S. Kulkarni"}]}, {"paperId": "7398555db176a85ba70e273d060e80c4f32ea2bc", + "externalIds": {"MAG": "2112069571", "DOI": "10.1103/PHYSREVE.67.066219", + "CorpusId": 33002738, "PubMed": "16241338"}, "corpusId": 33002738, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/7398555db176a85ba70e273d060e80c4f32ea2bc", "title": "Translational and nontranslational motion of perturbed Turing patterns.", "abstract": "When the front and rear boundaries of a Turing pattern with nonzero flux boundary conditions move synchronously, several modes of motion of the @@ -49271,116 +55783,16 @@ interactions: the Turing wavelength, bistability between different types of moving patterns can occur as v(x) is varied.", "venue": "Physical review. E, Statistical, nonlinear, and soft matter physics", "year": 2003, "referenceCount": 0, "citationCount": - 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2003-06-01", "journal": {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", "pages": "\n 066219\n ", "volume": "67 6 Pt 2"}, "authors": [{"authorId": "2258489", "name": "V. Vanag"}, - {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "89585cf6859fbaba66806176d19c53fb1395090e", - "externalIds": {"CorpusId": 17393702}, "url": "https://www.semanticscholar.org/paper/89585cf6859fbaba66806176d19c53fb1395090e", - "title": "Mathematical theory of ENIGMA machine Universal Turing Machine", - "abstract": "The understanding of link-level acknowledgements is an intuitive - riddle. Such a hypothesis is regularly a practical goal but fell in line with - our expectations. Given the current status of semantic models, physicists - daringly desire the analysis of randomized algorithms. Here, we show that - the transistor can be made pseudorandom, compact, and scalable.", "venue": - "", "year": 2011, "referenceCount": 229, "citationCount": 23, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "b36d82eb88d9e350e065cc0e43f19315783ea31e", - "externalIds": {"DBLP": "conf/coco/BussH88", "MAG": "2140778396", "DOI": "10.1109/SCT.1988.5282", - "CorpusId": 15125770}, "url": "https://www.semanticscholar.org/paper/b36d82eb88d9e350e065cc0e43f19315783ea31e", - "title": "On truth-table reducibility to SAT and the difference hierarchy - over NP", "abstract": "It is shown that polynomial-time truth-table reducibility - by Boolean circuits to SAT is the same as log-space truth-table reducibility - via Boolean formulas to SAT and the same as log-space Turing reducibility - to SAT. It is proved that a constant number of rounds of parallel queries - to SAT is equivalent to one round of parallel queries. It is shown that the - infinite difference hierarchy over NP is equal to Delta p/2, and an oracle - separating Delta p/2 from the class of predicates polynomial time truth-table - reducible to SAT is given.<>", "venue": "[1988] Proceedings. Structure - in Complexity Theory Third Annual Conference", "year": 1988, "referenceCount": - 25, "citationCount": 52, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1988-06-14", - "journal": {"name": "[1988] Proceedings. Structure in Complexity Theory Third - Annual Conference", "pages": "224-233"}, "authors": [{"authorId": "1764580", - "name": "S. Buss"}, {"authorId": "145410154", "name": "L. Hay"}]}, {"paperId": - "89404ac553499061ede456bde527fe76ddef6c75", "externalIds": {"MAG": "2573789614", - "CorpusId": 125299719}, "url": "https://www.semanticscholar.org/paper/89404ac553499061ede456bde527fe76ddef6c75", - "title": "EXTREMAL SASAKIAN GEOMETRY ON T 2 \u00d7 S 3 AND", "abstract": "We - prove the existence of extremal Sasakian struc- tures occurring on a countably - infinite number of distinct contact structures on T 2 \u00d7S 3 and certain - related 5-manifolds. These struc- tures occur in bouquets and exhaust the - Sasaki cones in all except one case in which there are no extremal metrics.", - "venue": "", "year": 2012, "referenceCount": 27, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "101903180", - "name": "C. Boyer"}, {"authorId": "1403754537", "name": "C. T\u00f8nnesen-Friedman"}]}, - {"paperId": "11eac9a56446ee2f44bbb313a4e93d1ef2dc19c9", "externalIds": {"MAG": - "2014170692", "DOI": "10.1103/PHYSREVLETT.67.275", "CorpusId": 27944256, "PubMed": - "10044539"}, "url": "https://www.semanticscholar.org/paper/11eac9a56446ee2f44bbb313a4e93d1ef2dc19c9", - "title": "Model for the formation of a microscopic Turing structure: The facetting - of Pt(110) during catalytic oxidation of CO.", "abstract": "A Monte Carlo - simulation of the formation of regular facet patterns during catalytic oxidation - of CO on Pt(110) has been conducted. The simulation was based on the elementary - stepsof the surface reaction, the CO-induced 1\u00d71\u21c41\u00d72 phase - transition, and the enhancement of O 2 adsorption at step sites. The model - can reproduce the formation of sawtoothlike facet patterns with a spacing - of \u223c100 to 200 A. The facets represent a Turing structure caused by the - coupling of kinetic instabilities with the mass transport of Pt atoms", "venue": - "Physical review letters", "year": 1991, "referenceCount": 0, "citationCount": - 45, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1991-07-08", "journal": {"name": "Physical review letters", "pages": "\n 275-278\n ", - "volume": "67 2"}, "authors": [{"authorId": "30066773", "name": "Imbihl"}, - {"authorId": "1399054750", "name": "Reynolds"}, {"authorId": "30166838", "name": - "Kaletta"}]}, {"paperId": "faaacbe2971b48de969a280599bf8afbc79ca424", "externalIds": - {"MAG": "2952109421", "DBLP": "conf/approx/Liu06", "ArXiv": "quant-ph/0604166", - "DOI": "10.1007/11830924_40", "CorpusId": 15301175}, "url": "https://www.semanticscholar.org/paper/faaacbe2971b48de969a280599bf8afbc79ca424", - "title": "Consistency of Local Density Matrices Is QMA-Complete", "abstract": - null, "venue": "International Workshop and International Workshop on Approximation, - Randomization, and Combinatorial Optimization. Algorithms and Techniques", - "year": 2006, "referenceCount": 19, "citationCount": 90, "influentialCitationCount": - 10, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science", - "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2006-04-21", "journal": - {"pages": "438-449"}, "authors": [{"authorId": "3051645", "name": "Yi-Kai - Liu"}]}, {"paperId": "7dc114c54738cee381a04da60704d3ab76bd9f81", "externalIds": - {"MAG": "1669982198", "DOI": "10.1088/0256-307X/25/9/109", "CorpusId": 118700424}, - "url": "https://www.semanticscholar.org/paper/7dc114c54738cee381a04da60704d3ab76bd9f81", - "title": "CROSS-DISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY: - Spatial Pattern of an Epidemic Model with Cross-diffusion", "abstract": "Pattern - formation of a spatial epidemic model with both self- and cross-diffusion - is investigated. From the Turing theory, it is well known that Turing pattern - formation cannot occur for the equal self-diffusion coefficients. However, - combined with cross-diffusion, the system will show emergence of isolated - groups, i.e., stripe-like or spotted or coexistence of both, which we show - by both mathematical analysis and numerical simulations. Our study shows that - the interaction of self- and cross-diffusion can be considered as an important - mechanism for the appearance of complex spatiotemporal dynamics in epidemic - models.", "venue": "", "year": 2008, "referenceCount": 14, "citationCount": - 19, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Physics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2008-09-01", "journal": {"name": "Chinese Physics Letters", "volume": ""}, - "authors": [{"authorId": "47681666", "name": "L. R. Li"}, {"authorId": "145752193", - "name": "Zhen Jin"}, {"authorId": "47334108", "name": "Gui\u2010Quan Sun"}]}, - {"paperId": "c7112a0381a5c7d1dfd7be8325abd586112e1a8e", "externalIds": {"MAG": - "2911480877", "DOI": "10.1145/1344551.1344563", "CorpusId": 63340202}, "url": - "https://www.semanticscholar.org/paper/c7112a0381a5c7d1dfd7be8325abd586112e1a8e", + {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "c7112a0381a5c7d1dfd7be8325abd586112e1a8e", + "externalIds": {"MAG": "2911480877", "DOI": "10.1145/1344551.1344563", "CorpusId": + 63340202}, "corpusId": 63340202, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c7112a0381a5c7d1dfd7be8325abd586112e1a8e", "title": "Comparative Schematology", "abstract": "While we may have the intuitive idea of one programming language having greater power than another, or of some subset of a language being an adequate ''core'' for that language, we @@ -49397,26 +55809,14 @@ interactions: uninterpreted programs, or schemas . What follows is a brief report on some preliminary exploration in this area.", "venue": "", "year": 1970, "referenceCount": 3, "citationCount": 261, "influentialCitationCount": 6, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1970-12-01", - "journal": {"name": "", "pages": "119-127", "volume": ""}, "authors": [{"authorId": - "143607424", "name": "M. Paterson"}, {"authorId": "34661920", "name": "C. - Hewitt"}]}, {"paperId": "98fd05ec51e2178b3515ee212466b7047ddccf15", "externalIds": - {"MAG": "81189784", "CorpusId": 116428394}, "url": "https://www.semanticscholar.org/paper/98fd05ec51e2178b3515ee212466b7047ddccf15", - "title": "Counting classes with finite acceptance types", "abstract": "Perfectionnement - de la hierarchie de Hausdorff generee par NP. Les nouvelles classes permettent - une exacte classification de la complexite de certains problemes de denombrement. - Les classes sont caracterisees en termes de machines de Turing polynomiales - non deterministes", "venue": "", "year": 1987, "referenceCount": 0, "citationCount": - 22, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}], "publicationTypes": null, "publicationDate": "1987-08-01", "journal": - {"name": "Computing and Informatics \\/ Computers and Artificial Intelligence", - "pages": "395-409", "volume": "6"}, "authors": [{"authorId": "3176131", "name": - "T. Gundermann"}, {"authorId": "1789007", "name": "G. Wechsung"}]}, {"paperId": - "2d0359cf89393fed82ef150c74112b61ef7ee8dc", "externalIds": {"MAG": "2081698256", - "DOI": "10.1111/J.1469-8137.1955.TB06156.X", "CorpusId": 85037200}, "url": + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1970-12-01", "journal": {"name": "", "pages": "119-127", "volume": ""}, "authors": + [{"authorId": "143607424", "name": "M. Paterson"}, {"authorId": "34661920", + "name": "C. Hewitt"}]}, {"paperId": "2d0359cf89393fed82ef150c74112b61ef7ee8dc", + "externalIds": {"MAG": "2081698256", "DOI": "10.1111/J.1469-8137.1955.TB06156.X", + "CorpusId": 85037200}, "corpusId": 85037200, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d0359cf89393fed82ef150c74112b61ef7ee8dc", "title": "EVIDENCE RELATING TO THE DIFFUSION\u2010REACTION THEORY OF MORPHOGENESIS", "abstract": "already determined by some feature in the inherent organization @@ -49445,23 +55845,100 @@ interactions: and even if it cannot be justified, it certainly seems to point in the right direction and the work expended on it may lead to the formulation of an alternative and more appropriate", "venue": "", "year": 1955, "referenceCount": 12, "citationCount": - 31, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "New Phytologist", "pages": "39-48", - "volume": "54"}, "authors": [{"authorId": "40705436", "name": "C. Wardlaw"}]}, - {"paperId": "9d037c5b155aa00ae2c5ef6f54f1ca4b521b0be5", "externalIds": {"MAG": - "2128249967", "DBLP": "books/daglib/0028970", "DOI": "10.1007/978-1-4471-2359-0", - "CorpusId": 11516909}, "url": "https://www.semanticscholar.org/paper/9d037c5b155aa00ae2c5ef6f54f1ca4b521b0be5", - "title": "A Brief History of Computing", "abstract": null, "venue": "Springer - London", "year": 2012, "referenceCount": 16, "citationCount": 93, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"pages": "I-XXIII, 1-264"}, "authors": [{"authorId": "2260951", - "name": "Gerard O''Regan"}]}, {"paperId": "da1f666cb4260b702b7e50cd2a9d6e0fc3b7e4e9", - "externalIds": {"MAG": "2031067254", "DOI": "10.1090/S0002-9947-1983-0682720-1", - "CorpusId": 120527036}, "url": "https://www.semanticscholar.org/paper/da1f666cb4260b702b7e50cd2a9d6e0fc3b7e4e9", + 31, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "New + Phytologist", "pages": "39-48", "volume": "54"}, "authors": [{"authorId": + "40705436", "name": "C. Wardlaw"}]}, {"paperId": "4e8b5a525c79fe004bc39af367a135312d5f76b6", + "externalIds": {"DBLP": "journals/jsyml/Maass82", "MAG": "1972481159", "DOI": + "10.2307/2273100", "CorpusId": 42422753}, "corpusId": 42422753, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4e8b5a525c79fe004bc39af367a135312d5f76b6", + "title": "Recursively enumerable generic sets", "abstract": "Abstract We show + that one can solve Post''s Problem by constructing generic sets in the usual + set theoretic framework applied to tiny universes. This method leads to a + new class of recursively enumerable sets: r.e. generic sets. All r.e. generic + sets are low and simple and therefore of Turing degree strictly between 0 + and 0\u2032. Further they supply the first example of a class of low recursively + enumerable sets which are automorphic in the lattice \u2130 of recursively + enumerable sets with inclusion. We introduce the notion of a promptly simple + set. This describes the essential feature of r.e. generic sets with respect + to automorphism constructions.", "venue": "Journal of Symbolic Logic", "year": + 1982, "referenceCount": 6, "citationCount": 52, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1982-12-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "809 - 823", "volume": "47"}, "authors": [{"authorId": "145247053", + "name": "W. Maass"}]}, {"paperId": "e112242dc359f459575428698128315418eb95ef", + "externalIds": {"DBLP": "conf/cie/DuqueJ12", "MAG": "2270220526", "DOI": "10.1007/978-3-642-30870-3_21", + "CorpusId": 14543876}, "corpusId": 14543876, "publicationVenue": {"id": "ce5f5d49-2807-4aa0-9db3-64a03084444d", + "name": "Conference on Computability in Europe", "type": "conference", "alternate_names": + ["CiE", "CIE", "International Conference on Computers and Industrial Engineering", + "Conf Comput Eur", "Int Conf Comput Ind Eng"], "url": "http://www.illc.uva.nl/CiE/"}, + "url": "https://www.semanticscholar.org/paper/e112242dc359f459575428698128315418eb95ef", + "title": "Turing Progressions and Their Well-Orders", "abstract": null, "venue": + "Conference on Computability in Europe", "year": 2012, "referenceCount": 7, + "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2012-06-18", "journal": {"pages": "212-221"}, "authors": [{"authorId": "1398647151", + "name": "David Fern\u00e1ndez-Duque"}, {"authorId": "1748961", "name": "J. + Joosten"}]}, {"paperId": "faaacbe2971b48de969a280599bf8afbc79ca424", "externalIds": + {"MAG": "2952109421", "DBLP": "conf/approx/Liu06", "ArXiv": "quant-ph/0604166", + "DOI": "10.1007/11830924_40", "CorpusId": 15301175}, "corpusId": 15301175, + "publicationVenue": {"id": "06caf6fa-45cd-41e4-a5e9-24620a996490", "name": + "International Workshop and International Workshop on Approximation, Randomization, + and Combinatorial Optimization. Algorithms and Techniques", "type": "conference", + "alternate_names": ["APPROX/RANDOM", "Int Workshop Int Workshop Approx Randomization + Comb Optim Algorithm Tech"]}, "url": "https://www.semanticscholar.org/paper/faaacbe2971b48de969a280599bf8afbc79ca424", + "title": "Consistency of Local Density Matrices Is QMA-Complete", "abstract": + null, "venue": "International Workshop and International Workshop on Approximation, + Randomization, and Combinatorial Optimization. Algorithms and Techniques", + "year": 2006, "referenceCount": 19, "citationCount": 90, "influentialCitationCount": + 10, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/0604166v3.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2006-04-21", "journal": {"pages": + "438-449"}, "authors": [{"authorId": "3051645", "name": "Yi-Kai Liu"}]}, {"paperId": + "f3049f46063228f88157859971bb9bb09448fa1c", "externalIds": {"MAG": "2040504745", + "DOI": "10.1177/002199837901300102", "CorpusId": 137598760}, "corpusId": 137598760, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f3049f46063228f88157859971bb9bb09448fa1c", + "title": "Effects of Thermal Spiking on Graphite-Epoxy Composites", "abstract": + "Tests were performed evaluating the effects of thermal spikes on the moisture + absorption characteristics, the ultimate tensile strength, and the buckling + modulus of Thornel 300/Fiberite 1034 composites. Measurements were made on + unidirectional and \u03c0/4 laminates, using different types of thermal spikes. + A survey was also made of the existing data. This survey, together with the + present data indicate how thermal spikes affect the mois ture absorption and + the mechanical properties of different graphite-epoxy composites.", "venue": + "", "year": 1979, "referenceCount": 10, "citationCount": 38, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://deepblue.lib.umich.edu/bitstream/2027.42/66923/2/10.1177_002199837901300102.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": "1979-01-01", "journal": {"name": "Journal of Composite + Materials", "pages": "17 - 34", "volume": "13"}, "authors": [{"authorId": + "104601538", "name": "A. Loos"}, {"authorId": "49215868", "name": "G. Springer"}]}, + {"paperId": "c9693b63f1db590c58ea586f315dcb1bcec31d60", "externalIds": {"DBLP": + "journals/cacm/Loebner94", "MAG": "92019153", "CorpusId": 38103602}, "corpusId": + 38103602, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c9693b63f1db590c58ea586f315dcb1bcec31d60", + "title": "Response to \"Lessons from a Restricted Turing Test\"", "abstract": + null, "venue": "Commun. ACM", "year": 1994, "referenceCount": 0, "citationCount": + 24, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Commun. ACM", "pages": "79-82", + "volume": "37"}, "authors": [{"authorId": "47860332", "name": "H. Loebner"}]}, + {"paperId": "da1f666cb4260b702b7e50cd2a9d6e0fc3b7e4e9", "externalIds": {"MAG": + "2031067254", "DOI": "10.1090/S0002-9947-1983-0682720-1", "CorpusId": 120527036}, + "corpusId": 120527036, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/da1f666cb4260b702b7e50cd2a9d6e0fc3b7e4e9", "title": "Pseudojump operators. I. The r.e. case", "abstract": "Call an operator J on the power set of co a pseudo jump operator if J(A) is uniformly recursively enumerable in A and A is recursive in J(A) for all subsets A of c. Thus the @@ -49486,121 +55963,69 @@ interactions: that for every e there is a nonrecursive r.e. set A with A ED WA-T K. Now Friedberg''s argument relative to an arbitrary oracle B yields a fixed Godel", "venue": "", "year": 1983, "referenceCount": 18, "citationCount": 67, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ams.org/tran/1983-275-02/S0002-9947-1983-0682720-1/S0002-9947-1983-0682720-1.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1983-02-01", "journal": {"name": "Transactions of the American Mathematical Society", "pages": "599-609", "volume": "275"}, "authors": [{"authorId": "1888089", "name": "C. - Jockusch"}, {"authorId": "1817824", "name": "R. Shore"}]}, {"paperId": "f6d338d6589599b2001b6c1ff345f47dd747e532", - "externalIds": {"MAG": "2074094096", "DOI": "10.2307/1936926", "CorpusId": - 3548057}, "url": "https://www.semanticscholar.org/paper/f6d338d6589599b2001b6c1ff345f47dd747e532", - "title": "Seasonal Variation in Thermoregulatory Behavior and Body Temperature - of Diurnal Kalahari Lizards", "abstract": "We discuss seasonal variation in - thermoregulatory behavior and its consequences on body temperature for 12 - species of diurnal lizards in the southern Kalahari semidesert of Africa and - also evaluate several methods of attempting to document thermoregulatory behavior - using a descrip- tive data base. Lizards vary time of activity among seasons, - which limits the variation in ambient conditions actually experienced. Ground-dwelling - lizards and probably arboreal lizards move nonrandomly with respect to sun - and shade; thus the percentage of lizards in sun is inversely proportional - to air tempera- ture. Arboreal lizards shift to higher perches at midday in - summer and to logs or ground in winter thus decreasing and increasing incident - heat loads, respectively. Both juveniles and adults of 3 species, only juveniles - of 2 species, and only adults in I species are active in winter: both adults - and juveniles of 6 species brumate (= hibernate). Mean body temperature (Tb) - varies within days and among months and is positively correlated with corresponding - mean air temperature (Ta) in almost all species. Nonetheless, correlation - and regression analysis suggests that thermoregulatory behaviors reduce the - impact of variations in ambient condi- tions on Kalahari lizards. The mean - Tb of different species reflect evolutionary relationships. In summer, mean - Tb is propor- tional to the percentage of lizards in sun and with the tendency - of lizards to be active only in summer. Thus, lizards with inferred low optimal - temperatures are active during more months of the year.", "venue": "", "year": - 1977, "referenceCount": 32, "citationCount": 254, "influentialCitationCount": - 10, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1977-09-01", "journal": {"name": - "Ecology", "pages": "1066-1075", "volume": "58"}, "authors": [{"authorId": - "2575241", "name": "R. Huey"}, {"authorId": "5250133", "name": "E. Pianka"}]}, - {"paperId": "cc4e85ce7e17064a9ba38ccb342862f38cd4b1bb", "externalIds": {"MAG": - "3021414358", "DBLP": "conf/mcu/DelvenneKB04", "DOI": "10.1007/978-3-540-31834-7_8", - "CorpusId": 1229605}, "url": "https://www.semanticscholar.org/paper/cc4e85ce7e17064a9ba38ccb342862f38cd4b1bb", + Jockusch"}, {"authorId": "1817824", "name": "R. Shore"}]}, {"paperId": "bf474dd556bee3967248c37a20e5f337912ff398", + "externalIds": {"MAG": "3039656528", "DBLP": "journals/tit/BocheSP20", "DOI": + "10.1109/TIT.2020.3005458", "CorpusId": 221913331}, "corpusId": 221913331, + "publicationVenue": {"id": "748e730b-add9-47ee-819d-8ae54e504ef9", "name": + "IEEE Transactions on Information Theory", "type": "journal", "alternate_names": + ["IEEE Trans Inf Theory"], "issn": "0018-9448", "url": "http://www.comm.utoronto.ca/trans-it/", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?puNumber=18", + "http://ieeexplore.ieee.org/servlet/opac?punumber=18"]}, "url": "https://www.semanticscholar.org/paper/bf474dd556bee3967248c37a20e5f337912ff398", + "title": "Identification Capacity of Channels With Feedback: Discontinuity + Behavior, Super-Activation, and Turing Computability", "abstract": "The problem + of identification is considered, in which it is of interest for the receiver + to decide only whether a certain message has been sent or not, and the identification-feedback + (IDF) capacity of channels with feedback is studied. The IDF capacity is shown + to be discontinuous and super-additive for both deterministic and randomized + encoding. For the deterministic IDF capacity the phenomenon of super-activation + occurs, which is the strongest form of super-additivity. This is the first + time that super-activation is observed for discrete memoryless channels. On + the other hand, for the randomized IDF capacity, super-activation is not possible. + Finally, the developed theory is studied from an algorithmic point of view + by using the framework of Turing computability. The problem of computing the + IDF capacity on a Turing machine is connected to problems in pure mathematics + and it is shown that if the IDF capacity would be Turing computable, it would + provide solutions to other problems in mathematics including Goldbach\u2019s + conjecture and the Riemann Hypothesis. However, it is shown that the deterministic + and randomized IDF capacities are not Banach-Mazur computable. This is the + weakest form of computability implying that the IDF capacity is not computable + even for universal Turing machines. On the other hand, the identification + capacity without feedback is Turing computable revealing the impact of the + feedback: It transforms the identification capacity from being computable + to non-computable.", "venue": "IEEE Transactions on Information Theory", "year": + 2020, "referenceCount": 54, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2020-06-29", "journal": + {"name": "IEEE Transactions on Information Theory", "pages": "6184-6199", + "volume": "66"}, "authors": [{"authorId": "1688021", "name": "H. Boche"}, + {"authorId": "2307454", "name": "R. Schaefer"}, {"authorId": "145967056", + "name": "H. Poor"}]}, {"paperId": "cc4e85ce7e17064a9ba38ccb342862f38cd4b1bb", + "externalIds": {"MAG": "3021414358", "DBLP": "conf/mcu/DelvenneKB04", "DOI": + "10.1007/978-3-540-31834-7_8", "CorpusId": 1229605}, "corpusId": 1229605, + "publicationVenue": {"id": "c70b16dd-3be4-41cc-8494-33d2b373f5b9", "name": + "Machines, Computations, and Universality", "type": "conference", "alternate_names": + ["Mach Comput Universality", "MCU"]}, "url": "https://www.semanticscholar.org/paper/cc4e85ce7e17064a9ba38ccb342862f38cd4b1bb", "title": "Computational Universality in Symbolic Dynamical Systems", "abstract": null, "venue": "Machines, Computations, and Universality", "year": 2004, "referenceCount": 40, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "openAccessPdf": {"url": "http://arxiv.org/pdf/cs/0404021v2.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2004-04-08", "journal": {"name": "ArXiv", "volume": "cs.CC/0404021"}, "authors": [{"authorId": "145026954", "name": "J. Delvenne"}, {"authorId": "1786485", "name": "P. Kurka"}, {"authorId": "1715830", "name": "V. Blondel"}]}, {"paperId": - "f390197c9283bd58fa04d5a9b2e54923c20b8d77", "externalIds": {"MAG": "2137993073", - "DOI": "10.1002/POLA.24269", "CorpusId": 55094496}, "url": "https://www.semanticscholar.org/paper/f390197c9283bd58fa04d5a9b2e54923c20b8d77", - "title": "Synthesis, Photoluminescence, and Electrochromism of Polyamides - Containing (3,6-Di-tert-butylcarbazol-9-yl)triphenylamine Units", "abstract": - "A new carbazole-derived, triphenylamine (TPA)- containing aromatic dicarboxylic - acid monomer, 4,4 0 -dicar- boxy-4 00 -(3,6-di-tert-butylcarbazol-9-yl)TPA, - was synthesized, and it led to a series of electroactive aromatic polyamides - with main-chain TPA and pendent 3,6-bis(tert-butyl)carbazole units by reacting - it with various aromatic diamines via the phosphorylation polyamidation technique. - The polyamides were amorphous with good solubility in many organic sol- vents - and could be solution-cast into flexible and strong films. They showed high - glass-transition temperatures (282- 335 \ufffd C) and high thermal stability - (10% weight loss tempera- tures >480 \ufffd C). The electroactive polymer - films had", "venue": "", "year": 2010, "referenceCount": 88, "citationCount": - 50, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2010-11-01", "journal": {"name": "Journal of Polymer Science Part A", "pages": - "4775-4789", "volume": "48"}, "authors": [{"authorId": "2113218969", "name": - "Hui-min Wang"}, {"authorId": "143781377", "name": "S. Hsiao"}, {"authorId": - "5281809", "name": "Guey\u2010Sheng Liou"}, {"authorId": "94567370", "name": - "C. Sun"}]}, {"paperId": "fecdb9cbfc73eb8276ee5976f3aea9da05869530", "externalIds": - {"MAG": "2596069950", "DBLP": "journals/aiedu/GonzalezHDLLLPW17", "DOI": "10.1007/s40593-017-0144-1", - "CorpusId": 11785068}, "url": "https://www.semanticscholar.org/paper/fecdb9cbfc73eb8276ee5976f3aea9da05869530", - "title": "AI in Informal Science Education: Bringing Turing Back to Life to - Perform the Turing Test", "abstract": null, "venue": "International Journal - of Artificial Intelligence in Education", "year": 2017, "referenceCount": - 39, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Psychology", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Psychology", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2017-03-16", "journal": - {"name": "International Journal of Artificial Intelligence in Education", - "pages": "353-384", "volume": "27"}, "authors": [{"authorId": "2193539193", - "name": "Avelino J. Gonzalez"}, {"authorId": "49359519", "name": "James Hollister"}, - {"authorId": "1727179", "name": "R. Demara"}, {"authorId": "143983555", "name": - "J. Leigh"}, {"authorId": "48893024", "name": "Brandan Lanman"}, {"authorId": - "2108256178", "name": "Sangyoon Lee"}, {"authorId": "2066547245", "name": - "Shane T. Parker"}, {"authorId": "145414580", "name": "C. Walls"}, {"authorId": - "145921798", "name": "Jeanne E. Parker"}, {"authorId": "2147017082", "name": - "Josiah Wong"}, {"authorId": "36730256", "name": "Clayton Barham"}, {"authorId": - "38105796", "name": "B. Wilder"}]}, {"paperId": "975d47b03b2fe0cc2a2cea73e898ad2bc996cc30", - "externalIds": {"MAG": "2023696779", "DOI": "10.1088/0256-307X/25/4/016", - "CorpusId": 121965817}, "url": "https://www.semanticscholar.org/paper/975d47b03b2fe0cc2a2cea73e898ad2bc996cc30", - "title": "Stochastic Simulation of Turing Patterns", "abstract": "We investigate - the effects of intrinsic noise on Turing pattern formation near the onset - of bifurcation from the homogeneous state to Turing pattern in the reaction-diffusion - Brusselator. By performing stochastic simulations of the master equation and - using Gillespie''s algorithm, we check the spatiotemporal behaviour influenced - by internal noises. We demonstrate that the patterns of occurrence frequency - for the reaction and diffusion processes are also spatially ordered and temporally - stable. Turing patterns are found to be robust against intrinsic fluctuations. - Stochastic simulations also reveal that under the influence of intrinsic noises, - the onset of Turing instability is advanced in comparison to that predicted - deterministically.", "venue": "", "year": 2008, "referenceCount": 21, "citationCount": - 10, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2008-04-01", "journal": {"name": "Chinese Physics Letters", - "pages": "1220-1223", "volume": "25"}, "authors": [{"authorId": "117718598", - "name": "Fu Zhengping"}, {"authorId": "2104775291", "name": "Xu Xin-Hang"}, - {"authorId": "47539276", "name": "W. Hongli"}, {"authorId": "5191752", "name": - "Ouyang Qi"}]}, {"paperId": "85388e9d305e1c20a767003161319f38f06b0989", "externalIds": - {"DBLP": "conf/coco/KrauseMW89", "MAG": "1895846869", "DOI": "10.1109/SCT.1989.41831", - "CorpusId": 19598143}, "url": "https://www.semanticscholar.org/paper/85388e9d305e1c20a767003161319f38f06b0989", + "85388e9d305e1c20a767003161319f38f06b0989", "externalIds": {"DBLP": "conf/coco/KrauseMW89", + "MAG": "1895846869", "DOI": "10.1109/SCT.1989.41831", "CorpusId": 19598143}, + "corpusId": 19598143, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/85388e9d305e1c20a767003161319f38f06b0989", "title": "Separating complexity classes related to certain input oblivious logarithmic space-bounded Turing machines", "abstract": "It is proved that oblivious simultaneously linear access-time and logarithmic space-bounded @@ -49608,133 +56033,51 @@ interactions: All the corresponding complexity classes are separated from each other.<>", "venue": "[1989] Proceedings. Structure in Complexity Theory Fourth Annual Conference", "year": 1989, "referenceCount": 15, "citationCount": 20, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.numdam.org/item/ITA_1992__26_4_345_0.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1989-06-19", "journal": {"name": "[1989] Proceedings. Structure in Complexity Theory Fourth Annual Conference", "pages": "240-249"}, "authors": [{"authorId": "48614220", "name": "Matthias Krause"}, {"authorId": "1708312", "name": "C. - Meinel"}, {"authorId": "1742534", "name": "S. Waack"}]}, {"paperId": "888c6d00fc6bc0199c6be1470808a2597d60829f", - "externalIds": {"MAG": "55257470", "CorpusId": 57470189}, "url": "https://www.semanticscholar.org/paper/888c6d00fc6bc0199c6be1470808a2597d60829f", + Meinel"}, {"authorId": "1742534", "name": "S. Waack"}]}, {"paperId": "315e297cc269c9c22e61c1a069c60c793aff20e3", + "externalIds": {"MAG": "1963966113", "DBLP": "journals/mima/WarwickSM13", + "DOI": "10.1007/s11023-013-9301-y", "CorpusId": 13933358}, "corpusId": 13933358, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/315e297cc269c9c22e61c1a069c60c793aff20e3", + "title": "Some Implications of a Sample of Practical Turing Tests", "abstract": + null, "venue": "Minds and Machines", "year": 2013, "referenceCount": 39, "citationCount": + 21, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Psychology", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-05-01", "journal": + {"name": "Minds and Machines", "pages": "163-177", "volume": "23"}, "authors": + [{"authorId": "143636026", "name": "K. Warwick"}, {"authorId": "2731715", + "name": "Huma Shah"}, {"authorId": "31925555", "name": "J. Moor"}]}, {"paperId": + "888c6d00fc6bc0199c6be1470808a2597d60829f", "externalIds": {"MAG": "55257470", + "CorpusId": 57470189}, "corpusId": 57470189, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/888c6d00fc6bc0199c6be1470808a2597d60829f", "title": "Reconsidering Turing''s thesis : (toward more realistic semantics of programs)", "abstract": null, "venue": "", "year": 1984, "referenceCount": 0, "citationCount": 25, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1721396", - "name": "Y. Gurevich"}]}, {"paperId": "82e3f12081f98629059c7f17b530db643bdf4c44", - "externalIds": {"MAG": "616965722", "DOI": "10.1007/978-94-011-9751-9", "CorpusId": - 107035293}, "url": "https://www.semanticscholar.org/paper/82e3f12081f98629059c7f17b530db643bdf4c44", - "title": "Explosive Welding, Forming and Compaction", "abstract": null, "venue": - "", "year": 1983, "referenceCount": 0, "citationCount": 249, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "92599610", - "name": "T. Blazynski"}]}, {"paperId": "8348428aefcaaec7eb03dd68f46a89472a6b7c6a", - "externalIds": {"MAG": "2017252391", "DOI": "10.1063/1.3231488", "CorpusId": - 6212294}, "url": "https://www.semanticscholar.org/paper/8348428aefcaaec7eb03dd68f46a89472a6b7c6a", - "title": "A model for jumping and bubble waves in the Belousov-Zhabotinsky- - aerosol OT system", "abstract": "We develop a four-variable model, based on - the classic Field\u2013K\u0151ros\u2013Noyes mechanism for the oscillatory - Belousov-Zhabotinsky (BZ) reaction, that describes recently discovered jumping - waves and bubble waves in the BZ reaction in aerosol OT microemulsion and - provides insight into their origins. Contrary to suggestions based on previous - models, it appears that these phenomena can arise from interaction between - a Turing instability and either excitability or a Hopf instability of the - steady state, rather than requiring a wave instability. The model should be - useful for studying other patterns in BZ microemulsions as well as the behavior - of systems of BZ microdroplets coupled through bromine diffusion.", "venue": - "", "year": 2009, "referenceCount": 22, "citationCount": 51, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-09-14", - "journal": {"name": "Journal of Chemical Physics", "pages": "104512-104512", - "volume": "131"}, "authors": [{"authorId": "2258489", "name": "V. Vanag"}, - {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "e112242dc359f459575428698128315418eb95ef", - "externalIds": {"DBLP": "conf/cie/DuqueJ12", "MAG": "2270220526", "DOI": "10.1007/978-3-642-30870-3_21", - "CorpusId": 14543876}, "url": "https://www.semanticscholar.org/paper/e112242dc359f459575428698128315418eb95ef", - "title": "Turing Progressions and Their Well-Orders", "abstract": null, "venue": - "Conference on Computability in Europe", "year": 2012, "referenceCount": 7, - "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-06-18", "journal": {"pages": - "212-221"}, "authors": [{"authorId": "1398647151", "name": "David Fern\u00e1ndez-Duque"}, - {"authorId": "1748961", "name": "J. Joosten"}]}, {"paperId": "2a1c557efca4bf9e802b86923fcbc883249b5ac5", - "externalIds": {"MAG": "2008963056", "DOI": "10.1177/036354659402200203", - "CorpusId": 20505044, "PubMed": "8198182"}, "url": "https://www.semanticscholar.org/paper/2a1c557efca4bf9e802b86923fcbc883249b5ac5", - "title": "Cervical Spine Injury, Hockey Helmets, and Face Masks", "abstract": - "Over the past 30 years hockey players began wearing helmets and face masks. - Cervical spine injury, with an incidence of 15 cases per year, began to be - re ported in the 1980s. Cervical spine trauma had not been reported before - then. After review of the litera ture, there seems to be a consensus of opinion - that the style of play that is allowed a player with head protection may actually - increase the chances of cervi cal spinal trauma.", "venue": "American Journal - of Sports Medicine", "year": 1994, "referenceCount": 49, "citationCount": - 36, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": "1994-03-01", "journal": {"name": "The - American Journal of Sports Medicine", "pages": "167 - 170", "volume": "22"}, - "authors": [{"authorId": "2168432953", "name": "Paul D. Reynen"}, {"authorId": - "1398729471", "name": "W. Clancy"}]}, {"paperId": "c84151945b5e3018f66f6cf3c9292e1e97c2a634", - "externalIds": {"MAG": "1965658020", "DOI": "10.13031/2013.21292", "CorpusId": - 119965429}, "url": "https://www.semanticscholar.org/paper/c84151945b5e3018f66f6cf3c9292e1e97c2a634", - "title": "Turing machine approach to solve psychrometric attributes", "abstract": - "A technique for selecting psychrometric equations and their solution order - is presented. The solution order for \na given psychrometric problem is not - always readily identifiable. Furthermore, because the psychrometric equations - can \nbe solved in many different sequences, the solution process can become - convoluted. For example, if atmospheric pressure, \ndry-bulb temperature and - relative humidity are known and it is desired to determine the other 12 psychrometric - attributes, \nthen there are approximately 37,780 different orders in which - to solve the equations to determine the other parameters. \nThe tasks of identifying - these many possible combinations of equations, and selecting an appropriate - one, is called a \ndecision problem in computation theory. One technique for - solving decision problems is a Turing machine computational \nmodel. We have - constructed a Turing machine which we refer to as a Psychrometric Turing Machine - (PTM), to solve all \npossible psychrometric problems. The PTM selects the - optimal equation order based upon a user-specified optimality \ncriterion - of CPU cycles. A solution is comprised of a series of functions based on equations - found in the 1993 ASHRAE \nHandbook\u2014Fundamentals. The PTM is shown to - be a practical application to a non-deterministic, multiple-path \nproblem. - It required 700 ms on an engineering workstation (100 MHz, Sparc 10) to search - all possible combinations and \ndetermine the optimal solution route for the - most complicated \u201ctwo-to-all\u201d psychrometric problem. For a particular - \npsychrometric problem, once the equation order is found, these equations - can be used to determine the unknown \nattributes from the known attributes - in a consistent manner that is in some sense optimal. We demonstrate the application - \nof the PTM with several examples: a psychrometric calculator, a source code - generator, and a listing of the optimal \nfunction call sequence for most - \u201ctwo-to-all\u201d psychrometric problems encountered.", "venue": "", - "year": 1997, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1997-05-01", "journal": {"name": "Transactions of the ASABE", "pages": "823-831", - "volume": "40"}, "authors": [{"authorId": "2119079637", "name": "Hanzhong - Zhang"}, {"authorId": "5231626", "name": "R. Gates"}, {"authorId": "90284225", - "name": "D. Colliver"}]}, {"paperId": "35acdf1e1343e2c8047a91284ca4fda50a9e7c8b", - "externalIds": {"MAG": "36160858", "CorpusId": 116729966}, "url": "https://www.semanticscholar.org/paper/35acdf1e1343e2c8047a91284ca4fda50a9e7c8b", - "title": "UNITAIRE PSEUDO-MULTIPLICATIF ASSOCI \u00b4 E ` A UN GROUPOIDE. - APPLICATIONS ` A LA MOYENNABILIT \u00b4 E", "abstract": "From every measured - groupoid, we construct a \"pseudo-multipli- cative\" unitary, which generates - the two Hopf-von-Neumann bimodule struc- tures constructed in a former paper, - and generalize in this way the well- known multiplicative unitary associated - with a locally compact group. We prove a generalization of Leptin theorem - which connects the amenability of a measured groupoid and the existence of - an approximate unit for its Fourier algebra.", "venue": "", "year": 2000, - "referenceCount": 11, "citationCount": 37, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "121348745", - "name": "J. Vallin"}]}, {"paperId": "9c0d53c07c7f31e7ec3d0e6a9ff3c27155d65359", + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "1721396", "name": "Y. Gurevich"}]}, {"paperId": "9c0d53c07c7f31e7ec3d0e6a9ff3c27155d65359", "externalIds": {"DBLP": "journals/ci/RosisCGC03", "MAG": "2115838503", "DOI": - "10.1111/1467-8640.00223", "CorpusId": 2832860}, "url": "https://www.semanticscholar.org/paper/9c0d53c07c7f31e7ec3d0e6a9ff3c27155d65359", + "10.1111/1467-8640.00223", "CorpusId": 2832860}, "corpusId": 2832860, "publicationVenue": + {"id": "03e270f3-9983-44e1-9d91-754044085687", "name": "International Conference + on Climate Informatics", "type": "conference", "alternate_names": ["CI", "Comput + Intell", "Computational Intelligence", "Int Conf Clim Informatics", "International + Workshop Climate Informatics", "Computational intelligence", "Int Workshop + Clim Informatics", "Comput intell"], "issn": "0824-7935", "url": "http://www.wiley.com/WileyCDA/WileyTitle/productCd-COIN.html", + "alternate_urls": ["https://onlinelibrary.wiley.com/journal/14678640"]}, "url": + "https://www.semanticscholar.org/paper/9c0d53c07c7f31e7ec3d0e6a9ff3c27155d65359", "title": "Can Computers Deliberately Deceive? A Simulation Tool and Its Application to Turing''s Imitation Game", "abstract": "In this paper, we describe how agents can deceive within a probabilistic framework for representing their @@ -49752,422 +56095,443 @@ interactions: us to verify the validity of our method and to revise it in part.", "venue": "International Conference on Climate Informatics", "year": 2003, "referenceCount": 54, "citationCount": 40, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2003-08-01", "journal": {"name": "Computational Intelligence", + "volume": "19"}, "authors": [{"authorId": "1807752", "name": "F. D. Rosis"}, + {"authorId": "1694255", "name": "V. Carofiglio"}, {"authorId": "2060016836", + "name": "G. Grassano"}, {"authorId": "1755446", "name": "C. Castelfranchi"}]}, + {"paperId": "f0d15b1d50476b1da7db14f1902f975a499d234b", "externalIds": {"DBLP": + "conf/sigcse/CavalcanteFR04", "MAG": "2100477995", "DOI": "10.1145/971300.971349", + "CorpusId": 5359184}, "corpusId": 5359184, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f0d15b1d50476b1da7db14f1902f975a499d234b", + "title": "A visual and interactive automata theory course with JFLAP 4.0", + "abstract": "We describe the instructional software JFLAP 4.0 and how it can + be used to provide a hands-on formal languages and automata theory course. + JFLAP 4.0 doubles the number of chapters worth of material from JFLAP 3.1, + now covering topics from eleven of thirteen chapters for a semester course. + JFLAP 4.0 has easier interactive approaches to previous topics and covers + many new topics including three parsing algorithms, multi-tape Turing machines, + L-systems, and grammar transformations.", "venue": "SIGCSE ''04", "year": + 2004, "referenceCount": 12, "citationCount": 37, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2004-03-01", "journal": + {"pages": "140-144"}, "authors": [{"authorId": "2759387", "name": "Ryan Cavalcante"}, + {"authorId": "50256971", "name": "Thomas Finley"}, {"authorId": "2214161", + "name": "S. Rodger"}]}, {"paperId": "d462138ec20ba7140c74adc9eddbd09b3348a77f", + "externalIds": {"DBLP": "conf/securecomm/WangWWW17", "DOI": "10.1007/978-3-319-78813-5_12", + "CorpusId": 19123675}, "corpusId": 19123675, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/d462138ec20ba7140c74adc9eddbd09b3348a77f", + "title": "Turing Obfuscation", "abstract": null, "venue": "SecureComm", "year": + 2017, "referenceCount": 25, "citationCount": 8, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"pages": "225-244"}, "authors": [{"authorId": "2152540989", "name": "Yan + Wang"}, {"authorId": "2118511020", "name": "Shuai Wang"}, {"authorId": "2118950738", + "name": "Pei Wang"}, {"authorId": "9180687", "name": "Dinghao Wu"}]}, {"paperId": + "9a107823fc5621c9c4d0473b5e1ad886732e50c9", "externalIds": {"MAG": "1542911280", + "DOI": "10.1023/A:1019159427561", "CorpusId": 17919629}, "corpusId": 17919629, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9a107823fc5621c9c4d0473b5e1ad886732e50c9", + "title": "On the origin of Turing instability", "abstract": null, "venue": + "", "year": 1997, "referenceCount": 91, "citationCount": 15, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1997-12-01", "journal": {"name": "Journal of Mathematical Chemistry", "pages": + "39-53", "volume": "22"}, "authors": [{"authorId": "2373050", "name": "L. + Szili"}, {"authorId": "145710873", "name": "J. T\u00f3th"}]}, {"paperId": + "5212acf9970972da512af91ddb9107ceffb9de77", "externalIds": {"MAG": "109323320", + "DBLP": "conf/cca/WeihrauchZ00", "DOI": "10.1007/3-540-45335-0_22", "CorpusId": + 46223636}, "corpusId": 46223636, "publicationVenue": {"id": "53c5c62f-c80f-431a-8dd5-a99b18a8dc4c", + "name": "International Conference on Computability and Complexity in Analysis", + "type": "conference", "alternate_names": ["IEEE International Conference on + Control Applications", "CCA", "Int Conf Comput Complex Anal", "International + Conference on Control Applications", "IEEE Int Conf Control Appl", "Int Conf + Control Appl"], "url": "http://www.informatik.fernuni-hagen.de/import/cca/index.html", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/conhome/1000166/all-proceedings"]}, + "url": "https://www.semanticscholar.org/paper/5212acf9970972da512af91ddb9107ceffb9de77", + "title": "Is the Linear Schr\u00f6dinger Propagator Turing Computable?", "abstract": + null, "venue": "International Conference on Computability and Complexity in + Analysis", "year": 2000, "referenceCount": 8, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2000-09-17", "journal": {"pages": "369-377"}, "authors": + [{"authorId": "1696520", "name": "K. Weihrauch"}, {"authorId": "2778649", + "name": "Ning Zhong"}]}, {"paperId": "0040a7c825d5ce6127331c446989129ff419226d", + "externalIds": {"MAG": "1981253722", "DOI": "10.1111/j.1462-2920.2009.02064.x", + "CorpusId": 45014169, "PubMed": "19788653"}, "corpusId": 45014169, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/0040a7c825d5ce6127331c446989129ff419226d", + "title": "Identification of genes regulated by the MvaT-like paralogues TurA + and TurB of Pseudomonas putida KT2440.", "abstract": "The genome of the Pseudomonas + putida strain KT2440 contains five paralogous proteins (TurA, TurB, TurC, + TurD and TurE) of the H-NS-like MvaT class of transcription regulators. TurA + and TurB belong to groups I and II, respectively, both containing orthologous + MvaT proteins that are present in all Pseudomonadaceae species. On the contrary, + TurC, TurD and TurE belong to group III, which contains species-specific paralogous + MvaT proteins. We analysed the global effects on the P. putida KT2440 transcriptome + of eliminating the conserved TurA and TurB proteins, which had been identified + in our previous studies aimed to search for novel specific co-regulators of + the upper TOL operon for toluene biodegradation. While the loss of TurA de-repressed + the expression of many genes covering a broad range of functional classes + in both mid-exponential and early stationary phases, the absence of TurB brought + about a very different outcome. Although the loss of TurB affected also very + different functions, the number of genes that changed in the turB mutant was + fivefold smaller than that of TurA. Furthermore, TurB does not act generally + as repressor. Interestingly, the degree of overlap between their mutual regulons + is very limited. A closer examination of one case where such overlap clearly + occurs (a gene cluster for biosynthesis of lipodepsinonapeptide phytotoxins) + revealed that TurA and TurB can act in concert, perhaps by forming a heterodimer. + In addition, our results indicate that TurA is the master regulator of TurB + as well as of the other paralogues, TurD and TurE.", "venue": "Environmental + microbiology", "year": 2010, "referenceCount": 32, "citationCount": 24, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2003-08-01", "journal": {"name": "Computational Intelligence", "volume": - "19"}, "authors": [{"authorId": "1807752", "name": "F. D. Rosis"}, {"authorId": - "1694255", "name": "V. Carofiglio"}, {"authorId": "2060016836", "name": "G. - Grassano"}, {"authorId": "1755446", "name": "C. Castelfranchi"}]}, {"paperId": - "5de69f3b653f62e23a0d816c45ca678abb82e780", "externalIds": {"MAG": "1627143323", - "ArXiv": "math/0212047", "CorpusId": 118566854}, "url": "https://www.semanticscholar.org/paper/5de69f3b653f62e23a0d816c45ca678abb82e780", - "title": "Infinite Time Turing Machines: Supertask Computation", "abstract": - "Infinite time Turing machines extend the operation of ordinary Turing machines - into transfinite ordinal time. By doing so, they provide a natural model of - infinitary computability, a theoretical setting for the analysis of the power - and limitations of supertask algorithms.", "venue": "", "year": 2002, "referenceCount": - 5, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2002-12-03", "journal": {"name": - "arXiv: Logic", "volume": ""}, "authors": [{"authorId": "1755318", "name": - "J. Hamkins"}]}, {"paperId": "426a0c7e5cdffc0f233262adf7474937b3b30958", "externalIds": - {"MAG": "2017541824", "DOI": "10.1007/BF02477996", "CorpusId": 31125724, "PubMed": - "13974850"}, "url": "https://www.semanticscholar.org/paper/426a0c7e5cdffc0f233262adf7474937b3b30958", - "title": "Church''s thesis and its relation to the concept of realizability - in biology and physics.", "abstract": null, "venue": "The Bulletin of Mathematical - Biophysics", "year": 1962, "referenceCount": 9, "citationCount": 43, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Medicine"], + null, "journal": {"name": "Environmental microbiology", "pages": "\n 254-63\n ", + "volume": "12 1"}, "authors": [{"authorId": "4877991", "name": "F. Renzi"}, + {"authorId": "14698297", "name": "E. Rescalli"}, {"authorId": "47528594", + "name": "E. Galli"}, {"authorId": "50548267", "name": "G. Bertoni"}]}, {"paperId": + "8348428aefcaaec7eb03dd68f46a89472a6b7c6a", "externalIds": {"MAG": "2017252391", + "DOI": "10.1063/1.3231488", "CorpusId": 6212294}, "corpusId": 6212294, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/8348428aefcaaec7eb03dd68f46a89472a6b7c6a", + "title": "A model for jumping and bubble waves in the Belousov-Zhabotinsky- + aerosol OT system", "abstract": "We develop a four-variable model, based on + the classic Field\u2013K\u0151ros\u2013Noyes mechanism for the oscillatory + Belousov-Zhabotinsky (BZ) reaction, that describes recently discovered jumping + waves and bubble waves in the BZ reaction in aerosol OT microemulsion and + provides insight into their origins. Contrary to suggestions based on previous + models, it appears that these phenomena can arise from interaction between + a Turing instability and either excitability or a Hopf instability of the + steady state, rather than requiring a wave instability. The model should be + useful for studying other patterns in BZ microemulsions as well as the behavior + of systems of BZ microdroplets coupled through bromine diffusion.", "venue": + "", "year": 2009, "referenceCount": 22, "citationCount": 51, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2009-09-14", "journal": {"name": "Journal of Chemical Physics", "pages": + "104512-104512", "volume": "131"}, "authors": [{"authorId": "2258489", "name": + "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": + "dc8568c1ff36e59129532d28c5a42bd42f162cf8", "externalIds": {"MAG": "1659915469", + "DOI": "10.1109/9780470544297.CH3", "CorpusId": 56503655}, "corpusId": 56503655, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dc8568c1ff36e59129532d28c5a42bd42f162cf8", + "title": "Computing Machinery and Intelligence Amplification", "abstract": + "This chapter contains sections titled: Introduction Estimating Intelligence + Turing Test and Intelligence Amplification Measuring Intelligence Amplification + The Future of Intelligence Amplification This chapter contains sections titled: + References ]]>", "venue": "", "year": 2003, "referenceCount": 0, "citationCount": + 19, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}, {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "pages": "25-44", "volume": + ""}, "authors": [{"authorId": "144330013", "name": "D. Fogel"}, {"authorId": + "2064938312", "name": "Charles J. Robinson"}]}, {"paperId": "975d47b03b2fe0cc2a2cea73e898ad2bc996cc30", + "externalIds": {"MAG": "2023696779", "DOI": "10.1088/0256-307X/25/4/016", + "CorpusId": 121965817}, "corpusId": 121965817, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/975d47b03b2fe0cc2a2cea73e898ad2bc996cc30", + "title": "Stochastic Simulation of Turing Patterns", "abstract": "We investigate + the effects of intrinsic noise on Turing pattern formation near the onset + of bifurcation from the homogeneous state to Turing pattern in the reaction-diffusion + Brusselator. By performing stochastic simulations of the master equation and + using Gillespie''s algorithm, we check the spatiotemporal behaviour influenced + by internal noises. We demonstrate that the patterns of occurrence frequency + for the reaction and diffusion processes are also spatially ordered and temporally + stable. Turing patterns are found to be robust against intrinsic fluctuations. + Stochastic simulations also reveal that under the influence of intrinsic noises, + the onset of Turing instability is advanced in comparison to that predicted + deterministically.", "venue": "", "year": 2008, "referenceCount": 21, "citationCount": + 10, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-04-01", "journal": {"name": + "Chinese Physics Letters", "pages": "1220-1223", "volume": "25"}, "authors": + [{"authorId": "117718598", "name": "Fu Zhengping"}, {"authorId": "2104775291", + "name": "Xu Xin-Hang"}, {"authorId": "47539276", "name": "W. Hongli"}, {"authorId": + "5191752", "name": "Ouyang Qi"}]}, {"paperId": "b5d76392cea4ae7405554040a71a66da97064000", + "externalIds": {"MAG": "2071213526", "DOI": "10.1007/BF02662259", "CorpusId": + 98722715}, "corpusId": 98722715, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b5d76392cea4ae7405554040a71a66da97064000", + "title": "Mechanism of palm oil bleaching by montmorillonite clay activated + at various acid concentrations", "abstract": null, "venue": "", "year": 1982, + "referenceCount": 1, "citationCount": 92, "influentialCitationCount": 4, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1982-03-01", "journal": {"name": "Journal of the American Oil Chemists Society", + "pages": "129-131", "volume": "59"}, "authors": [{"authorId": "72220059", + "name": "S. C. Kheok"}, {"authorId": "2057769992", "name": "E. Lim"}]}, {"paperId": + "8006f3d034f600960fd9c42d11e0773d6dfef921", "externalIds": {"DBLP": "journals/jsyml/OshersonSW91", + "MAG": "2090580120", "DOI": "10.2307/2274708", "CorpusId": 41811574}, "corpusId": + 41811574, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", + "name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names": + ["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", + "url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic", + "alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL", + "https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/8006f3d034f600960fd9c42d11e0773d6dfef921", + "title": "A universal inductive inference machine", "abstract": "Abstract + A paradigm of scientific discovery is defined within a first-order logical + framework. It is shown that within this paradigm there exists a formal scientist + that is Turing computable and universal in the sense that it solves every + problem that any scientist can solve. It is also shown that universal scientists + exist for no regular logics that extend first-order logic and satisfy the + L\u00f6wenheim-Skolem condition.", "venue": "Journal of Symbolic Logic (JSL)", + "year": 1991, "referenceCount": 16, "citationCount": 36, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://repository.upenn.edu/cgi/viewcontent.cgi?article=1882&context=cis_reports", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Philosophy", + {"category": "Mathematics", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1962-05-28", "journal": {"name": "The Bulletin of mathematical biophysics", - "pages": "\n 375-93\n ", "volume": "24"}, "authors": [{"authorId": - "145439860", "name": "R. Rosen"}]}, {"paperId": "ff1afd02c56ae4b78597d1cfd6e21d41102b1ec7", - "externalIds": {"MAG": "2883606180", "DBLP": "journals/ijbc/HanW18", "DOI": - "10.1142/S0218127418300215", "CorpusId": 53288912}, "url": "https://www.semanticscholar.org/paper/ff1afd02c56ae4b78597d1cfd6e21d41102b1ec7", - "title": "Turing Patterns of a Lotka-Volterra Competitive System with Nonlocal - Delay", "abstract": "This paper focuses on the dynamical behavior of a Lotka\u2013Volterra - competitive system with nonlocal delay. We first establish the conditions - of Turing bifurcation occurring in the system. According to it and by using - multiple scale method, the amplitude equations of the different Turing patterns - are obtained. Then, we observe when these patterns (spots pattern and stripes - pattern) arise in the Lotka\u2013Volterra competitive system. Finally, some - numerical simulations are given to verify our theoretical analysis.", "venue": - "Int. J. Bifurc. Chaos", "year": 2018, "referenceCount": 46, "citationCount": - 14, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-06-30", "journal": {"name": "Int. - J. Bifurc. Chaos", "pages": "1830021:1-1830021:25", "volume": "28"}, "authors": - [{"authorId": "144334629", "name": "B. Han"}, {"authorId": "2108248403", "name": - "Zhi-Cheng Wang"}]}, {"paperId": "d0769bf82e1a71872780b337331928c0c9f1dbde", - "externalIds": {"DBLP": "journals/jfp/BurnettADRGY01", "MAG": "1899639145", - "DOI": "10.1017/S0956796800003828", "CorpusId": 18730312}, "url": "https://www.semanticscholar.org/paper/d0769bf82e1a71872780b337331928c0c9f1dbde", - "title": "Forms/3: A first-order visual language to explore the boundaries - of the spreadsheet paradigm", "abstract": "Although detractors of functional - programming sometimes claim that functional programming is too difficult or - counter-intuitive for most programmers to understand and use, evidence to - the contrary can be found by looking at the popularity of spreadsheets. The - spreadsheet paradigm, a first-order subset of the functional programming paradigm, - has found wide acceptance among both programmers and end users. Still, there - are many limitations with most spreadsheet systems. In this paper, we discuss - language features that eliminate several of these limitations without deviating - from the first-order, declarative evaluation model. The language used to illustrate - these features is a research language called Forms/3. Using Forms/3, we show - that procedural abstraction, data abstraction and graphics output can be supported - in the spreadsheet paradigm. We show that, with the addition of a simple model - of time, animated output and GUI I/O also become viable. To demonstrate generality, - we also present an animated Turing machine simulator programmed using these - features. Throughout the paper, we combine our discussion of the programming - language characteristics with how the language features prototyped in Forms/3 - relate to what is known about human effectiveness in programming.", "venue": - "Journal of functional programming", "year": 2001, "referenceCount": 105, - "citationCount": 244, "influentialCitationCount": 24, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2001-03-01", "journal": {"name": "Journal of Functional Programming", "pages": - "155 - 206", "volume": "11"}, "authors": [{"authorId": "1737204", "name": - "M. Burnett"}, {"authorId": "143694665", "name": "J. Atwood"}, {"authorId": - "2108158", "name": "Rebecca Walpole Djang"}, {"authorId": "8250186", "name": - "James Reichwein"}, {"authorId": "2031490", "name": "Herkimer J. Gottfried"}, - {"authorId": "47569072", "name": "Sherry Yang"}]}, {"paperId": "1fddfa835c12469e5530099d0105f431d337ef66", - "externalIds": {"MAG": "2107013295", "DBLP": "journals/ita/PorrecaMZ06", "DOI": - "10.1051/ITA:2006001", "CorpusId": 780728}, "url": "https://www.semanticscholar.org/paper/1fddfa835c12469e5530099d0105f431d337ef66", - "title": "Complexity classes for membrane systems", "abstract": "We compare - various computational complexity classes defined within the framework of membrane - systems, a distributed parallel computing device which is inspired from the - functioning of the cell, with usual computational complexity classes for Turing - machines. In particular, we focus our attention on the comparison among complexity - classes for membrane systems with active membranes (where new membranes can - be created by division of existing membranes) and the classes PSPACE , EXP - , and EXPSPACE .", "venue": "RAIRO - Theoretical Informatics and Applications", - "year": 2006, "referenceCount": 22, "citationCount": 36, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2006-04-01", "journal": {"name": "RAIRO Theor. Informatics - Appl.", "pages": "141-162", "volume": "40"}, "authors": [{"authorId": "1687877", - "name": "A. Porreca"}, {"authorId": "31424043", "name": "G. Mauri"}, {"authorId": - "1702984", "name": "C. Zandron"}]}, {"paperId": "325cf64399d2c56e3a0759c53320a85aa213d7f4", + "1991-06-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "661 + - 672", "volume": "56"}, "authors": [{"authorId": "2312012", "name": "D. Osherson"}, + {"authorId": "2642989", "name": "M. Stob"}, {"authorId": "145092158", "name": + "S. Weinstein"}]}, {"paperId": "325cf64399d2c56e3a0759c53320a85aa213d7f4", "externalIds": {"DBLP": "conf/uc/2013", "MAG": "2342657813", "DOI": "10.1007/978-3-642-39074-6", - "CorpusId": 1571935}, "url": "https://www.semanticscholar.org/paper/325cf64399d2c56e3a0759c53320a85aa213d7f4", + "CorpusId": 1571935}, "corpusId": 1571935, "publicationVenue": {"id": "2f5d0e8a-faad-4f10-b323-2b2e3c439a78", + "name": "Lecture Notes in Computer Science", "type": "journal", "alternate_names": + ["LNCS", "Transactions on Computational Systems Biology", "Trans Comput Syst + Biology", "Lect Note Comput Sci"], "issn": "0302-9743", "alternate_issns": + ["1861-2059", "1861-2075", "1866-4733"], "url": "http://www.springer.com/lncs", + "alternate_urls": ["http://www.springer.com/sgw/cda/frontpage/0,11855,1-164-2-73659-0,00.html", + "https://link.springer.com/bookseries/558", "http://link.springer.com/search?query=\"Transactions+on+Computational+Systems+Biology\""]}, + "url": "https://www.semanticscholar.org/paper/325cf64399d2c56e3a0759c53320a85aa213d7f4", "title": "Unconventional Computation and Natural Computation", "abstract": null, "venue": "Lecture Notes in Computer Science", "year": 2013, "referenceCount": 32, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"volume": "7956"}, "authors": [{"authorId": - "31424043", "name": "G. Mauri"}, {"authorId": "1736354", "name": "A. Dennunzio"}, - {"authorId": "1740428", "name": "L. Manzoni"}, {"authorId": "1687877", "name": - "A. Porreca"}]}, {"paperId": "4097cde83a28313bc95d447bb74521c6dc346ace", "externalIds": - {"MAG": "1995920728", "DOI": "10.1177/036354659702500516", "CorpusId": 27050241, - "PubMed": "9302476"}, "url": "https://www.semanticscholar.org/paper/4097cde83a28313bc95d447bb74521c6dc346ace", - "title": "Surgical Treatment of Displaced Medial Epicondyle Fractures in Adolescent - Athletes*", "abstract": "Eight adolescent athletes (average age, 11 years; - range, 9 to 15) underwent open reduction and internal fixation of acute, displaced - medial epicondyle frac tures. Fixation was achieved with a screw and washer. - Four patients (50%) had associated elbow disloca tions. Elbow motion in a - brace was initiated 4 days after surgery. The brace allowed full flexion and - exten sion but protected the elbow against valgus stress. Bracing was continued - for 4 weeks. The average du ration of followup was 10 months (range, 6 to - 13). All fractures united, and full motion was achieved in seven patients. - One patient lost 5\u00b0 of hyperextension com pared with the opposite elbow. - All eight elbows were stable to valgus stress and were pain-free. All patients - returned to full sports activity.", "venue": "American Journal of Sports Medicine", - "year": 1997, "referenceCount": 30, "citationCount": 92, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1997-09-01", "journal": {"name": "The American Journal of Sports Medicine", - "pages": "682 - 686", "volume": "25"}, "authors": [{"authorId": "2059052009", - "name": "S. L. Case"}, {"authorId": "5955344", "name": "W. Hennrikus"}]}, - {"paperId": "00206cca4f4b0792038b5d4a4aa399c4d2e3a8fa", "externalIds": {"PubMedCentral": - "4707694", "MAG": "2187863796", "DOI": "10.1098/rsbl.2015.0674", "CorpusId": - 1457581, "PubMed": "26631244"}, "url": "https://www.semanticscholar.org/paper/00206cca4f4b0792038b5d4a4aa399c4d2e3a8fa", - "title": "A Turing test for collective motion", "abstract": "A widespread - problem in biological research is assessing whether a model adequately describes - some real-world data. But even if a model captures the large-scale statistical - properties of the data, should we be satisfied with it? We developed a method, - inspired by Alan Turing, to assess the effectiveness of model fitting. We - first built a self-propelled particle model whose properties (order and cohesion) - statistically matched those of real fish schools. We then asked members of - the public to play an online game (a modified Turing test) in which they attempted - to distinguish between the movements of real fish schools or those generated - by the model. Even though the statistical properties of the real data and - the model were consistent with each other, the public could still distinguish - between the two, highlighting the need for model refinement. Our results demonstrate - that we can use \u2018citizen science\u2019 to cross-validate and improve - model fitting not only in the field of collective behaviour, but also across - a broad range of biological systems.", "venue": "Biology Letters", "year": - 2015, "referenceCount": 34, "citationCount": 14, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2015-12-01", "journal": {"name": "Biology - Letters", "volume": "11"}, "authors": [{"authorId": "1401776206", "name": - "J. Herbert-Read"}, {"authorId": "4933734", "name": "Maksym Romenskyy"}, {"authorId": - "2196522", "name": "D. Sumpter"}]}, {"paperId": "0fbdb8a92ff0f1f093fd36a5adf9fd4cbbbd8558", - "externalIds": {"MAG": "2129240084", "DOI": "10.1016/J.PHYSD.2007.10.013", - "CorpusId": 18595340}, "url": "https://www.semanticscholar.org/paper/0fbdb8a92ff0f1f093fd36a5adf9fd4cbbbd8558", - "title": "Additive noise-induced Turing transitions in spatial systems with - application to neural fields and the Swift-Hohenberg equation", "abstract": - null, "venue": "", "year": 2008, "referenceCount": 78, "citationCount": 90, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], + "openAccessPdf": {"url": "https://oa.upm.es/29093/1/INVE_MEM_2013_158959.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"volume": "7956"}, "authors": [{"authorId": "31424043", "name": "G. Mauri"}, + {"authorId": "1736354", "name": "A. Dennunzio"}, {"authorId": "1740428", "name": + "L. Manzoni"}, {"authorId": "1687877", "name": "A. Porreca"}]}, {"paperId": + "b8e7dc1900212a66f635ddc25e60ce6c64d3f506", "externalIds": {"MAG": "2080436507", + "DOI": "10.1016/0378-4371(92)90262-O", "CorpusId": 122645853}, "corpusId": + 122645853, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b8e7dc1900212a66f635ddc25e60ce6c64d3f506", + "title": "Numerical studies of Turing patterns selection in a two-dimensional + system", "abstract": null, "venue": "", "year": 1992, "referenceCount": 22, + "citationCount": 54, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-09-01", + "journal": {"name": "Physica A-statistical Mechanics and Its Applications", + "pages": "158-171", "volume": "188"}, "authors": [{"authorId": "91298566", + "name": "V. Dufiet"}, {"authorId": "2313078", "name": "J. Boissonade"}]}, + {"paperId": "b41a1d9638291964275891a0987e4c7b7d04f6d7", "externalIds": {"MAG": + "2134229141", "DOI": "10.1139/F04-040", "CorpusId": 53131964}, "corpusId": + 53131964, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b41a1d9638291964275891a0987e4c7b7d04f6d7", + "title": "Factors influencing stream temperatures in small streams: substrate + effects and a shading experiment", "abstract": "The temperature of stream + water is an important control of many in-stream processes. To better understand + the processes and consequences of solar energy inputs to streams, stream temperature + dynamics were examined before, during, and after experimental shading of a + 150-m reach of a second-order stream in the Oregon Cascade Range. Maxi- mum + water temperatures declined significantly in the shaded reach, but minimum + and mean temperatures were not modified. Heat budget calculations before shading + show the dominance of solar energy as an influence of stream tem- perature. + The influence of substrate type on stream temperature was examined separately + where the water flowed first over bedrock and then through alluvial substrates. + Maximum temperatures in the upstream bedrock reach were up to 8.6 \u00b0C + higher and 3.4 \u00b0C lower than downstream in the alluvial reach. Better + understanding of factors that influence not only maximum but minimum temperatures + as well as diurnal temperature variation will highlight types of reaches in + which stream temperature would be most responsive to changes in shading. Many + apparent discrepancies in stream temperature literature can be explained by + considering variation in the relative importance of different stream tempera- + ture drivers within and among streams and over time. Resume : Dans les cours + d''eau, la temperature de l''eau est un important facteur de controle de plusieurs + processus internes. Afin de mieux comprendre les processus relies a l''apport + d''energie solaire dans les cours d''eau et d''en eva- luer les consequences, + nous avons examine la dynamique thermique avant, pendant et apres une experience + dans laquelle nous avons ombrage experimentalement une section de 150 m d''un + ruisseau d''ordre deux dans la chaine des monts Cascades en Oregon. Les temperatures + maximales de l''eau ont decru significativement dans la section ombragee, + mais les temperatures minimales et moyennes sont restees inchangees. Les calculs + de bilans thermiques avant l''experience ont montre que l''energie solaire + a une influence dominante sur la temperature du cours d''eau. L''effet du + type de substrat sur la temperature du cours d''eau a pu etre examine separement + la ou l''eau coule d''abord sur la roche-mere pour ensuite traverser des substrats + alluviaux. Les temperatures maximales dans la section de roche-mere d''amont + sont jusqu''a 8,6 \u00b0C superieures et 3,4 \u00b0C inferieures a celles + de la section alluviale d''aval. Une meilleure comprehension des facteurs + qui influencent non seulement les temperatures maximales et minimales, mais + aussi la variation journaliere de la temperature, permettra d''identifier + les sections dans lesquelles la temperature du cours d''eau est plus susceptible + d''etre affectee par les changements d''ombrage. Plusieurs contradictions + apparentes dans la littera- ture scientifique concernant la temperature des + cours d''eau peuvent s''expliquer en considerant les variations dans le temps, + ainsi que dans un meme cours d''eau et d''un cours d''eau a un autre, de l''importance + relative des differents facteurs qui regissent la temperature des cours d''eau. + (Traduit par la Redaction) Johnson 923", "venue": "", "year": 2004, "referenceCount": + 49, "citationCount": 391, "influentialCitationCount": 45, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Environmental Science"], + "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "external"}], + "publicationTypes": null, "publicationDate": "2004-06-01", "journal": {"name": + "Canadian Journal of Fisheries and Aquatic Sciences", "pages": "913-923", + "volume": "61"}, "authors": [{"authorId": "6280185", "name": "S. Johnson"}]}, + {"paperId": "b36d82eb88d9e350e065cc0e43f19315783ea31e", "externalIds": {"DBLP": + "conf/coco/BussH88", "MAG": "2140778396", "DOI": "10.1109/SCT.1988.5282", + "CorpusId": 15125770}, "corpusId": 15125770, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b36d82eb88d9e350e065cc0e43f19315783ea31e", + "title": "On truth-table reducibility to SAT and the difference hierarchy + over NP", "abstract": "It is shown that polynomial-time truth-table reducibility + by Boolean circuits to SAT is the same as log-space truth-table reducibility + via Boolean formulas to SAT and the same as log-space Turing reducibility + to SAT. It is proved that a constant number of rounds of parallel queries + to SAT is equivalent to one round of parallel queries. It is shown that the + infinite difference hierarchy over NP is equal to Delta p/2, and an oracle + separating Delta p/2 from the class of predicates polynomial time truth-table + reducible to SAT is given.<>", "venue": "[1988] Proceedings. Structure + in Complexity Theory Third Annual Conference", "year": 1988, "referenceCount": + 25, "citationCount": 52, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2008-05-15", "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": - "755-773", "volume": "237"}, "authors": [{"authorId": "2268158", "name": "A. - Hutt"}, {"authorId": "1748730", "name": "A. Longtin"}, {"authorId": "1400946717", - "name": "L. Schimansky-Geier"}]}, {"paperId": "b5d76392cea4ae7405554040a71a66da97064000", - "externalIds": {"MAG": "2071213526", "DOI": "10.1007/BF02662259", "CorpusId": - 98722715}, "url": "https://www.semanticscholar.org/paper/b5d76392cea4ae7405554040a71a66da97064000", - "title": "Mechanism of palm oil bleaching by montmorillonite clay activated - at various acid concentrations", "abstract": null, "venue": "", "year": 1982, - "referenceCount": 1, "citationCount": 92, "influentialCitationCount": 4, "isOpenAccess": - false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1982-03-01", "journal": {"name": - "Journal of the American Oil Chemists Society", "pages": "129-131", "volume": - "59"}, "authors": [{"authorId": "72220059", "name": "S. C. Kheok"}, {"authorId": - "2057769992", "name": "E. Lim"}]}, {"paperId": "bb90303be29be1eda6cd0137912d392d382fc37d", - "externalIds": {"MAG": "2010828730", "DOI": "10.1093/MOLLUS/65.4.504", "CorpusId": - 84719995}, "url": "https://www.semanticscholar.org/paper/bb90303be29be1eda6cd0137912d392d382fc37d", - "title": "Nuclear-DNA evidence that northeastern Atlantic Mytilus trossulus - mussels carry M. edulis genes", "abstract": "(Bodega Bay) exhibited mostly - M. galloprovincialis alleles, but one individual was a GT heterozygote indicating - that M. gallo- provincialis Glu-5 (cid:57) genes have introgressed into M. - trossulus . The other Californian sample (Hog Island), collected a few tens - of km apart, consisted of a mix-ture of GG and TT homozygotes, suggesting - that pure M. galloprovincialis and pure M. trossulus were sampled on Hog Island, - but not their hybrids. These results accord with previous reports on the geo-J.", - "venue": "", "year": 1999, "referenceCount": 8, "citationCount": 37, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Environmental + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1988-06-14", "journal": {"name": "[1988] Proceedings. + Structure in Complexity Theory Third Annual Conference", "pages": "224-233"}, + "authors": [{"authorId": "1764580", "name": "S. Buss"}, {"authorId": "145410154", + "name": "L. Hay"}]}, {"paperId": "9e4f79c2f6ce80d9aa0c941567564ab86edaa483", + "externalIds": {"MAG": "2064124055", "DOI": "10.1103/PHYSREVLETT.71.1538", + "CorpusId": 22563381, "PubMed": "10054433"}, "corpusId": 22563381, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/9e4f79c2f6ce80d9aa0c941567564ab86edaa483", + "title": "Convective Turing patterns.", "abstract": "Turing patterns involve + regions of different chemical compositions which lead to density gradients + that, in liquids, are potentially unstable hydrodynamically. Nonlinear hydrodynamics + coupled with a model of Turing pattern formation show that convection modifies + and coexists with some Turing patterns and excludes others, and thereby plays + a significant role in pattern selection", "venue": "Physical review letters", + "year": 1993, "referenceCount": 11, "citationCount": 9, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1598&context=physics_facpub", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1993-09-06", "journal": {"name": "Physical + review letters", "pages": "\n 1538-1541\n ", "volume": "71 + 10"}, "authors": [{"authorId": "29943243", "name": "V\u00e1squez"}, {"authorId": + "29936647", "name": "Wilder"}, {"authorId": "2076542489", "name": "Edwards"}]}, + {"paperId": "5d47b1c4e1fd506a8a52a5a311726dad5d82ec18", "externalIds": {"MAG": + "2167611928", "DOI": "10.1109/WCICA.2006.1713000", "CorpusId": 15669848}, + "corpusId": 15669848, "publicationVenue": {"id": "1aab2ad9-5e27-4004-99d5-0ad199f2d847", + "name": "World Congress on Intelligent Control and Automation", "type": "conference", + "alternate_names": ["WCICA", "World Congr Intell Control Autom"]}, "url": + "https://www.semanticscholar.org/paper/5d47b1c4e1fd506a8a52a5a311726dad5d82ec18", + "title": "Some Results of Fuzzy Turing Machines", "abstract": "In this paper + we study the variants of fuzzy Turing machines and universal fuzzy Turing + machine. First we give several equivalent formulations of fuzzy Turing machines + which correspond to fuzzy deterministic Turing machines (FDTMs), fuzzy nondeterministic + Turing machines (FNTMs) and multitape fuzzy Turing machines. Then the notions + of fuzzy recursively enumerable languages and fuzzy recursive languages are + defined in terms of FDTMs. The level characterizations of fuzzy recursively + enumerable languages and fuzzy recursive languages are exploited. Second, + we show that there is no universal fuzzy Turing machine that can simulate + any fuzzy Turing machine on it. Finally, we propose the notion of complexity + classes of fuzzy languages by using the time-bounded fuzzy Turing machines. + In particular, the notions of fuzzy polynomial time-bounded computation (FP) + and fuzzy nondeterministic polynomial time-bounded computation (FNP) are introduced, + their connections to P and NP are also characterized", "venue": "World Congress + on Intelligent Control and Automation", "year": 2006, "referenceCount": 12, + "citationCount": 8, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1999-11-01", "journal": {"name": "Journal of Molluscan Studies", "pages": - "504-507", "volume": "65"}, "authors": [{"authorId": "5548413", "name": "P. - Borsa"}, {"authorId": "36134678", "name": "C. Daguin"}, {"authorId": "82672077", - "name": "S. Caetano"}, {"authorId": "4507145", "name": "F. Bonhomme"}]}, {"paperId": - "4e8b5a525c79fe004bc39af367a135312d5f76b6", "externalIds": {"DBLP": "journals/jsyml/Maass82", - "MAG": "1972481159", "DOI": "10.2307/2273100", "CorpusId": 42422753}, "url": - "https://www.semanticscholar.org/paper/4e8b5a525c79fe004bc39af367a135312d5f76b6", - "title": "Recursively enumerable generic sets", "abstract": "Abstract We show - that one can solve Post''s Problem by constructing generic sets in the usual - set theoretic framework applied to tiny universes. This method leads to a - new class of recursively enumerable sets: r.e. generic sets. All r.e. generic - sets are low and simple and therefore of Turing degree strictly between 0 - and 0\u2032. Further they supply the first example of a class of low recursively - enumerable sets which are automorphic in the lattice \u2130 of recursively - enumerable sets with inclusion. We introduce the notion of a promptly simple - set. This describes the essential feature of r.e. generic sets with respect - to automorphism constructions.", "venue": "Journal of Symbolic Logic", "year": - 1982, "referenceCount": 6, "citationCount": 52, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1982-12-01", "journal": - {"name": "Journal of Symbolic Logic", "pages": "809 - 823", "volume": "47"}, - "authors": [{"authorId": "145247053", "name": "W. Maass"}]}, {"paperId": "c3e62dd6762fd452e2e1c69dc9296524249bff6a", - "externalIds": {"DBLP": "journals/dke/Kapetanios08", "MAG": "2022459084", - "DOI": "10.1016/j.datak.2008.05.003", "CorpusId": 29430336}, "url": "https://www.semanticscholar.org/paper/c3e62dd6762fd452e2e1c69dc9296524249bff6a", - "title": "Quo Vadis computer science: From Turing to personal computer, personal - content and collective intelligence", "abstract": null, "venue": "Data & Knowledge - Engineering", "year": 2008, "referenceCount": 23, "citationCount": 52, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + "2006-10-23", "journal": {"name": "2006 6th World Congress on Intelligent + Control and Automation", "pages": "3406-3409", "volume": "1"}, "authors": + [{"authorId": "51394392", "name": "Yongming Li"}]}, {"paperId": "46157c69a5eb991299c07be4403a25628c7f0ed2", + "externalIds": {"DBLP": "books/daglib/0068171", "MAG": "1563218161", "DOI": + "10.1007/978-1-4612-4962-7", "CorpusId": 36893353}, "corpusId": 36893353, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/46157c69a5eb991299c07be4403a25628c7f0ed2", + "title": "Algebraic Approaches to Program Semantics", "abstract": null, "venue": + "Texts and Monographs in Computer Science", "year": 1986, "referenceCount": + 0, "citationCount": 251, "influentialCitationCount": 19, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1986-09-10", "journal": {"pages": "I-XIII, 1-351"}, "authors": [{"authorId": + "2575089", "name": "E. Manes"}, {"authorId": "1795076", "name": "M. Arbib"}]}, + {"paperId": "53fa73abf1a016e3bde197763114f0b4136f800c", "externalIds": {"DBLP": + "journals/amc/ZhangLY11", "MAG": "2092619359", "DOI": "10.1016/j.amc.2011.06.071", + "CorpusId": 29635974}, "corpusId": 29635974, "publicationVenue": {"id": "e593a63a-bfb7-45ac-aa27-5c320ac7a952", + "name": "Applied Mathematics and Computation", "type": "journal", "alternate_names": + ["Appl Math Comput"], "issn": "0096-3003", "url": "http://www.sciencedirect.com/science/journal/00963003", + "alternate_urls": ["https://www.sciencedirect.com/journal/applied-mathematics-and-computation"]}, + "url": "https://www.semanticscholar.org/paper/53fa73abf1a016e3bde197763114f0b4136f800c", + "title": "Hopf bifurcation and Turing instability in spatial homogeneous and + inhomogeneous predator-prey models", "abstract": null, "venue": "Applied Mathematics + and Computation", "year": 2011, "referenceCount": 31, "citationCount": 49, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2011-11-01", "journal": {"name": "Appl. + Math. Comput.", "pages": "1883-1893", "volume": "218"}, "authors": [{"authorId": + "2108230587", "name": "Jia-Fang Zhang"}, {"authorId": "1779740", "name": "Wan-Tong + Li"}, {"authorId": "34633463", "name": "Xiang-Ping Yan"}]}, {"paperId": "5de69f3b653f62e23a0d816c45ca678abb82e780", + "externalIds": {"MAG": "1627143323", "ArXiv": "math/0212047", "CorpusId": + 118566854}, "corpusId": 118566854, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5de69f3b653f62e23a0d816c45ca678abb82e780", + "title": "Infinite Time Turing Machines: Supertask Computation", "abstract": + "Infinite time Turing machines extend the operation of ordinary Turing machines + into transfinite ordinal time. By doing so, they provide a natural model of + infinitary computability, a theoretical setting for the analysis of the power + and limitations of supertask algorithms.", "venue": "", "year": 2002, "referenceCount": + 5, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2002-12-03", + "journal": {"name": "arXiv: Logic", "volume": ""}, "authors": [{"authorId": + "1755318", "name": "J. Hamkins"}]}, {"paperId": "46526e9424e1426ba1a93327cf6e5c87ffe3fc82", + "externalIds": {"DBLP": "journals/sivp/KhanSB16", "MAG": "2079245467", "DOI": + "10.1007/s11760-014-0741-5", "CorpusId": 30196483}, "corpusId": 30196483, + "publicationVenue": {"id": "11437c2b-f0a0-4db5-ac17-56dd7a223080", "name": + "Signal, Image and Video Processing", "type": "journal", "alternate_names": + ["Signal Image Video Process"], "issn": "1863-1703", "url": "https://link.springer.com/journal/11760"}, + "url": "https://www.semanticscholar.org/paper/46526e9424e1426ba1a93327cf6e5c87ffe3fc82", + "title": "A new implementation of chaotic S-boxes in CAPTCHA", "abstract": + null, "venue": "Signal, Image and Video Processing", "year": 2016, "referenceCount": + 19, "citationCount": 51, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2008-11-01", "journal": {"name": "Data Knowl. Eng.", "pages": - "286-292", "volume": "67"}, "authors": [{"authorId": "2670451", "name": "E. - Kapetanios"}]}, {"paperId": "25d07b28d8ec4c290f7510cbc90f4b3087e0c510", "externalIds": - {"DBLP": "journals/mp/Ramana97", "MAG": "2050958701", "DOI": "10.1007/BF02614433", - "CorpusId": 12886462}, "url": "https://www.semanticscholar.org/paper/25d07b28d8ec4c290f7510cbc90f4b3087e0c510", - "title": "An exact duality theory for semidefinite programming and its complexity - implications", "abstract": null, "venue": "Mathematical programming", "year": - 1997, "referenceCount": 34, "citationCount": 249, "influentialCitationCount": - 24, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1997-05-01", "journal": {"name": "Mathematical Programming", "pages": "129-162", - "volume": "77"}, "authors": [{"authorId": "27715055", "name": "M. Ramana"}]}, - {"paperId": "70f103ce3a02f20132b7631136624211e60a9914", "externalIds": {"MAG": - "1578346482", "DOI": "10.5860/choice.29-5164", "CorpusId": 117945749}, "url": - "https://www.semanticscholar.org/paper/70f103ce3a02f20132b7631136624211e60a9914", - "title": "Computability theory : concepts and applications", "abstract": "Turing - machines turing machines as recognisers universality undecidability alternative - models post''s correspondence problem recursive function theory formal models - of arithmetic Godel''s incompleteness theorem computer science and computability - theory.", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "1728757", "name": "P. Dunne"}]}, - {"paperId": "cd605531ad470b5b36e4ece8a1dbef4f6160c83c", "externalIds": {"MAG": - "2155957407", "DOI": "10.2307/2074297", "CorpusId": 145362274}, "url": "https://www.semanticscholar.org/paper/cd605531ad470b5b36e4ece8a1dbef4f6160c83c", - "title": "Oil in Troubled Waters: Perceptions, Politics, and the Battle Over - Offshore Drilling", "abstract": "\"This book is extremely well written, so - that it reads SUNY Press like an interesting story, even as it chronicles - the inc/o CUP Services termingling of a complex set of cultural, historical, - poPO Box 6525 litical, economic, and technological factors. It is an Ithaca, - NY 14851 , / . . ~~~~~~~~~~~~~1-800-666-2211 excellent sociological analysis - which challenges the Domestic and Canada reader''s taken-for-granted assumptions - about the naadd $3 for first copy ture of offshore drilling and carefully - documents the $.50 each additional. reasons behind the different perceptions - and experiNY State residents, add ences of California and Louisiana residents. - The cur8% sales tax. Canada, rent status of offshore drilling is meaningfully - framed add GST. VISA, by a cultural history of the political economy of the - MasterCard, American two states.\" Jean Blocker, University of Tulsa Express, - Discover 179 pages * $16.95 paperback * ISBN 0-7914-1882-0 accepted.", "venue": - "", "year": 1994, "referenceCount": 0, "citationCount": 87, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Political Science"], "s2FieldsOfStudy": - [{"category": "Political Science", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1994-04-21", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1971993", - "name": "W. Freudenburg"}, {"authorId": "108429899", "name": "R. Gramling"}]}, - {"paperId": "8006f3d034f600960fd9c42d11e0773d6dfef921", "externalIds": {"DBLP": - "journals/jsyml/OshersonSW91", "MAG": "2090580120", "DOI": "10.2307/2274708", - "CorpusId": 41811574}, "url": "https://www.semanticscholar.org/paper/8006f3d034f600960fd9c42d11e0773d6dfef921", - "title": "A universal inductive inference machine", "abstract": "Abstract - A paradigm of scientific discovery is defined within a first-order logical - framework. It is shown that within this paradigm there exists a formal scientist - that is Turing computable and universal in the sense that it solves every - problem that any scientist can solve. It is also shown that universal scientists - exist for no regular logics that extend first-order logic and satisfy the - L\u00f6wenheim-Skolem condition.", "venue": "Journal of Symbolic Logic (JSL)", - "year": 1991, "referenceCount": 16, "citationCount": 36, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1991-06-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "661 - - 672", "volume": "56"}, "authors": [{"authorId": "2312012", "name": "D. Osherson"}, - {"authorId": "2642989", "name": "M. Stob"}, {"authorId": "145092158", "name": - "S. Weinstein"}]}, {"paperId": "8e5c2227ec9eb7e2eae47c93723687078342e635", - "externalIds": {"ArXiv": "0802.2705", "MAG": "2100382100", "DOI": "10.1090/S0002-9947-2015-06184-4", - "CorpusId": 16366297}, "url": "https://www.semanticscholar.org/paper/8e5c2227ec9eb7e2eae47c93723687078342e635", - "title": "Measures and Their Random Reals", "abstract": "We study the randomness - properties of reals with respect to arbitrary probability measures on Cantor - space. We show that every non-computable real is non-trivially random with - respect to some measure. The probability measures constructed in the proof - may have atoms. If one rules out the existence of atoms, i.e. considers only - continuous measures, it turns out that every non-hyperarithmetical real is - random for a continuous measure. On the other hand, examples of reals not - random for any continuous measure can be found throughout the hyperarithmetical - Turing degrees.", "venue": "", "year": 2008, "referenceCount": 34, "citationCount": - 51, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2008-02-19", "journal": {"name": "Transactions of the - American Mathematical Society", "pages": "5081-5097", "volume": "367"}, "authors": - [{"authorId": "145432335", "name": "Jan Reimann"}, {"authorId": "2867082", - "name": "T. Slaman"}]}, {"paperId": "5816937e79fbb199a19bdaa24c654c53064f398a", - "externalIds": {"DBLP": "conf/aieeire/000161", "MAG": "2075033069", "DOI": - "10.1145/1460690.1460715", "CorpusId": 14549285}, "url": "https://www.semanticscholar.org/paper/5816937e79fbb199a19bdaa24c654c53064f398a", - "title": "A basis for a mathematical theory of computation, preliminary report", - "abstract": "Programs that learn to modify their own behaviors require a way - of representing algorithms so that interesting properties and interesting - transformations of algorithms are simply represented. Theories of computability - have been based on Turing machines, recursive functions of integers and computer - programs. Each of these has artificialities which make it difficult to manipulate - algorithms or to prove things about them. The present paper presents a formalism - based on conditional forms and recursive functions whereby the functions computable - in terms of certain base functions can be simply expressed. We also describe - some of the formal properties of conditional forms, and a method called recursion - induction for proving facts about algorithms.", "venue": "IRE-AIEE-ACM ''61 - (Western)", "year": 1961, "referenceCount": 28, "citationCount": 51, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer + "publicationDate": "2016-02-01", "journal": {"name": "Signal, Image and Video + Processing", "pages": "293-300", "volume": "10"}, "authors": [{"authorId": + "2110260781", "name": "Majid Khan"}, {"authorId": "145196791", "name": "T. + Shah"}, {"authorId": "2180962", "name": "Syeda Iram Batool"}]}, {"paperId": + "1fddfa835c12469e5530099d0105f431d337ef66", "externalIds": {"MAG": "2107013295", + "DBLP": "journals/ita/PorrecaMZ06", "DOI": "10.1051/ITA:2006001", "CorpusId": + 780728}, "corpusId": 780728, "publicationVenue": {"id": "d12c3a65-648c-4215-a74e-25ab6c85d42f", + "name": "RAIRO - Theoretical Informatics and Applications", "type": "journal", + "alternate_names": ["RAIRO Theor Informatics Appl", "Theoretical Informatics + and Applications", "Theor Informatics Appl"], "issn": "0988-3754", "url": + "http://www.numdam.org/journals/ITA/", "alternate_urls": ["http://www.rairo-ita.org/action/displayJournal?jid=ITA", + "https://www.rairo-ita.org/"]}, "url": "https://www.semanticscholar.org/paper/1fddfa835c12469e5530099d0105f431d337ef66", + "title": "Complexity classes for membrane systems", "abstract": "We compare + various computational complexity classes defined within the framework of membrane + systems, a distributed parallel computing device which is inspired from the + functioning of the cell, with usual computational complexity classes for Turing + machines. In particular, we focus our attention on the comparison among complexity + classes for membrane systems with active membranes (where new membranes can + be created by division of existing membranes) and the classes PSPACE , EXP + , and EXPSPACE .", "venue": "RAIRO - Theoretical Informatics and Applications", + "year": 2006, "referenceCount": 22, "citationCount": 36, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.numdam.org/item/10.1051/ita:2006001.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1961-05-09", "journal": {"pages": "225-238"}, "authors": - [{"authorId": "143805236", "name": "J. McCarthy"}]}, {"paperId": "e826abea3bf96de858a4e6a96688e7f94729794c", - "externalIds": {"MAG": "1908832089", "DOI": "10.3171/JNS.1963.20.6.0474", - "CorpusId": 9659255, "PubMed": "14193871"}, "url": "https://www.semanticscholar.org/paper/e826abea3bf96de858a4e6a96688e7f94729794c", - "title": "INTRACRANIAL TUMORS WITH EXTRACRANIAL METASTASES. CASE REPORT AND - REVIEW OF THE LITERATURE.", "abstract": "I N RECENT years m a n y repor t - s of i n t r a c ran ia l t u m o r s wi th ex t rac ran ia l me tas tases - have a p p e a r e d in the l i t e ra ture . M o s t of these cases have - been a d e q u a t e l y d o c u m e n t e d his to logical ly . L e y et - al. 52 in a r ecen t r e p o r t have p resen ted a good review of i n t r - ac r an i a l t u m o r s wi th me ta s t a se s ou t side the c ran ium. - W e were s t i m u l a t e d b y this rev iew to r e p o r t a case of our - own occurr ing in a child. L i t t l e emphas i s has been p laced upon the - occurrence of ex t racran ia l me ta s t a se s in ch i ldren in p rev ious - repor t s t h a t have appea red in t he l i t e ra ture . I n severa l of - t he r epor t s va r ious t y p e s of i n t r ac ran i a l t u m o r s have - been summar i zed , b u t no a t t e m p t has been m a d e to ana lyze t - h e m in g rea te r deta i l . I t is our i n t en t ion to review the l i - t e r a tu re of ex t r ac ran ia l me ta s t a se s wi th respec t to t y - p e s of tumors , age groups, and the i r preference for si tes of me tas - tases .", "venue": "Journal of Neurosurgery", "year": 1963, "referenceCount": - 53, "citationCount": 129, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], - "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "1963-06-01", - "journal": {"name": "Journal of neurosurgery", "pages": "\n 474-93\n ", - "volume": "20"}, "authors": [{"authorId": "3757045", "name": "F. Glasauer"}, - {"authorId": "48495942", "name": "R. Yuan"}]}, {"paperId": "cd16e895696810eeaf5ef00236e0da6f29b80993", - "externalIds": {"DBLP": "phd/us/Gips74", "MAG": "2131848667", "DOI": "10.1007/978-3-0348-5753-6", - "CorpusId": 123229293}, "url": "https://www.semanticscholar.org/paper/cd16e895696810eeaf5ef00236e0da6f29b80993", - "title": "Shape grammars and their uses", "abstract": null, "venue": "", "year": - 1974, "referenceCount": 0, "citationCount": 89, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "1765512", "name": "J. - Gips"}]}, {"paperId": "38852b6d2321343fc4f088aec83d539c09e39296", "externalIds": - {"DBLP": "journals/logcom/Pereira12", "MAG": "1964161049", "DOI": "10.1093/logcom/exs035", - "CorpusId": 40841052}, "url": "https://www.semanticscholar.org/paper/38852b6d2321343fc4f088aec83d539c09e39296", - "title": "Turing is among us", "abstract": "Turing''s present-day and all-time - relevance arises from the timelessness of the issues he tackled, and the innovative - light he shed upon them. Turing first defined the algorithmic limits of computability, - when determined via effective mechanism, and showed the generality of his - definition by proving its equivalence to other general, but less algorithmic, - non-mechanical, more abstract formulations of computability. In truth, his - originality much impressed Godel, for the simplicity of the mechanism invoked\u2014what - we nowadays call a Turing Machine (or program)\u2014and for the proof of existence - of a Universal Turing Machine (what we call digital computer)\u2014which can - demonstrably mimic any other Turing Machine, i.e. execute any program. Indeed, - Turing Machines simply rely on having a finite-state automaton (like a vending - machine), and an unbound paper tape made of discrete squares (like a paper - roll), with at most one rewritable symbol on each square. Turing also first - implicitly introduced the perspective of \u2018functionalism''\u2014though - he did not use the word, it was introduced later by Putnam, inspired by Turing''s - work\u2014by showing that what counts is the realizability of functions, independently - of the hardware that embodies them. And that realizability is afforded by - the very simplicity of his devised mechanism, what he then called A-machines - (but now bear his name), which rely solely on the manipulation of symbols\u2014as - discrete as the fingers of one hand\u2014wherein both data and instructions - are represented with symbols, both being subject to manipulation. The twain, - data as well as instructions, are stored in memory, where instructions double - as data and as rules for acting\u2014the stored program idea. No one to this - day has invented a computational mechanical process with such general properties, - which cannot be theoretically approximated with arbitrary precision by some - Turing Machine, wherein interactions are to be captured by Turing''s innovative - concept of oracle. In these days of discrete-time quantization, computational - biological processes, and proof of ever expanding universe\u2014the automata - and the tape\u2014the Turing Machine reigns supreme. Moreover, universal functionalism\u2014another - Turing essence\u2014is what enables the inevitable bringing together of the - ghosts in the several embodied machines (silicon-based, biological, extra-terrestrial - or otherwise) to promote their symbiotic epistemic co-evolution, since they - partake of the same theoretic functionalism. Turing is truly and forever among - us.", "venue": "J. Log. Comput.", "year": 2012, "referenceCount": 53, "citationCount": - 9, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-12-01", "journal": - {"name": "J. Log. Comput.", "pages": "1257-1277", "volume": "22"}, "authors": - [{"authorId": "1747400", "name": "L. Pereira"}]}, {"paperId": "6b0f5f662cc167e705f606a66dc646067dbd5ded", + "publicationDate": "2006-04-01", "journal": {"name": "RAIRO Theor. Informatics + Appl.", "pages": "141-162", "volume": "40"}, "authors": [{"authorId": "1687877", + "name": "A. Porreca"}, {"authorId": "31424043", "name": "G. Mauri"}, {"authorId": + "1702984", "name": "C. Zandron"}]}, {"paperId": "6b0f5f662cc167e705f606a66dc646067dbd5ded", "externalIds": {"DBLP": "conf/aina/HuangHC13", "MAG": "1976187435", "DOI": - "10.1109/WAINA.2013.94", "CorpusId": 18581485}, "url": "https://www.semanticscholar.org/paper/6b0f5f662cc167e705f606a66dc646067dbd5ded", + "10.1109/WAINA.2013.94", "CorpusId": 18581485}, "corpusId": 18581485, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6b0f5f662cc167e705f606a66dc646067dbd5ded", "title": "A DDoS Mitigation System with Multi-stage Detection and Text-Based Turing Testing in Cloud Computing", "abstract": "An important trend in the computer science is towards Cloud Computing and we can see that many cloud @@ -50189,59 +56553,160 @@ interactions: works efficiently to mitigate the DDoS traffic from the Internet.", "venue": "2013 27th International Conference on Advanced Information Networking and Applications Workshops", "year": 2013, "referenceCount": 34, "citationCount": - 36, "influentialCitationCount": 3, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2013-03-25", - "journal": {"name": "2013 27th International Conference on Advanced Information - Networking and Applications Workshops", "pages": "655-662"}, "authors": [{"authorId": - "32704744", "name": "V. S. Huang"}, {"authorId": "2107753977", "name": "Robert - Huang"}, {"authorId": "2060384612", "name": "M. Chiang"}]}, {"paperId": "98fe98af61d56f04bfd8911d33435b3b806aed46", - "externalIds": {"DBLP": "conf/aaaiss/BaileyHLLM15", "MAG": "2291406294", "CorpusId": - 7070742}, "url": "https://www.semanticscholar.org/paper/98fe98af61d56f04bfd8911d33435b3b806aed46", - "title": "The Winograd Schema Challenge and Reasoning about Correlation", - "abstract": "The Winograd Schema Challenge is an alternative to the Turing - Test that may provide a more meaningful measure of machine intelligence. It - poses a set of coreference resolution problems that cannot be solved without - human-like reasoning. In this paper, we take the view that the solution to - such problems lies in establishing discourse coherence. Specifically, we examine - two types of rhetorical relations that can be used to establish discourse - coherence: positive and negative correlation. We introduce a framework for - reasoning about correlation between sentences, and show how this framework - can be used to justify solutions to some Winograd Schema problems.", "venue": - "AAAI Spring Symposia", "year": 2015, "referenceCount": 20, "citationCount": - 50, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + 36, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2013-03-25", "journal": {"name": "2013 27th International + Conference on Advanced Information Networking and Applications Workshops", + "pages": "655-662"}, "authors": [{"authorId": "32704744", "name": "V. S. Huang"}, + {"authorId": "2107753977", "name": "Robert Huang"}, {"authorId": "2060384612", + "name": "M. Chiang"}]}, {"paperId": "bb90303be29be1eda6cd0137912d392d382fc37d", + "externalIds": {"MAG": "2010828730", "DOI": "10.1093/MOLLUS/65.4.504", "CorpusId": + 84719995}, "corpusId": 84719995, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb90303be29be1eda6cd0137912d392d382fc37d", + "title": "Nuclear-DNA evidence that northeastern Atlantic Mytilus trossulus + mussels carry M. edulis genes", "abstract": "(Bodega Bay) exhibited mostly + M. galloprovincialis alleles, but one individual was a GT heterozygote indicating + that M. gallo- provincialis Glu-5 (cid:57) genes have introgressed into M. + trossulus . The other Californian sample (Hog Island), collected a few tens + of km apart, consisted of a mix-ture of GG and TT homozygotes, suggesting + that pure M. galloprovincialis and pure M. trossulus were sampled on Hog Island, + but not their hybrids. These results accord with previous reports on the geo-J.", + "venue": "", "year": 1999, "referenceCount": 8, "citationCount": 37, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://academic.oup.com/mollus/article-pdf/65/4/504/13061179/JMS654504.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Environmental Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-11-01", + "journal": {"name": "Journal of Molluscan Studies", "pages": "504-507", "volume": + "65"}, "authors": [{"authorId": "5548413", "name": "P. Borsa"}, {"authorId": + "36134678", "name": "C. Daguin"}, {"authorId": "82672077", "name": "S. Caetano"}, + {"authorId": "4507145", "name": "F. Bonhomme"}]}, {"paperId": "0da7e2a1e6566528587e1a6c20baa4984091fdbf", + "externalIds": {"MAG": "2171724790", "DOI": "10.1111/J.1468-5914.1986.TB00073.X", + "CorpusId": 146663727}, "corpusId": 146663727, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0da7e2a1e6566528587e1a6c20baa4984091fdbf", + "title": "Reflections on the Turing Test", "abstract": null, "venue": "", + "year": 1986, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": "1986-07-01", "journal": + {"name": "Journal for The Theory of Social Behaviour", "pages": "161-172", + "volume": "16"}, "authors": [{"authorId": "114381027", "name": "Charles H. + Karelis"}]}, {"paperId": "fecdb9cbfc73eb8276ee5976f3aea9da05869530", "externalIds": + {"MAG": "2596069950", "DBLP": "journals/aiedu/GonzalezHDLLLPW17", "DOI": "10.1007/s40593-017-0144-1", + "CorpusId": 11785068}, "corpusId": 11785068, "publicationVenue": {"id": "53950802-a6d4-46d5-903e-b0efa0c10fd1", + "name": "International Journal of Artificial Intelligence in Education", "type": + "journal", "alternate_names": ["Int J Artif Intell Educ"], "issn": "1560-4292", + "url": "http://content.iospress.com/journals/international-journal-of-artificial-intelligence-in-education", + "alternate_urls": ["https://www.springer.com/computer/ai/journal/40593"]}, + "url": "https://www.semanticscholar.org/paper/fecdb9cbfc73eb8276ee5976f3aea9da05869530", + "title": "AI in Informal Science Education: Bringing Turing Back to Life to + Perform the Turing Test", "abstract": null, "venue": "International Journal + of Artificial Intelligence in Education", "year": 2017, "referenceCount": + 39, "citationCount": 12, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Psychology", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2017-03-16", "journal": {"name": "International Journal of Artificial Intelligence + in Education", "pages": "353-384", "volume": "27"}, "authors": [{"authorId": + "2193539193", "name": "Avelino J. Gonzalez"}, {"authorId": "49359519", "name": + "James Hollister"}, {"authorId": "1727179", "name": "R. Demara"}, {"authorId": + "143983555", "name": "J. Leigh"}, {"authorId": "48893024", "name": "Brandan + Lanman"}, {"authorId": "2108256178", "name": "Sangyoon Lee"}, {"authorId": + "2066547245", "name": "Shane T. Parker"}, {"authorId": "145414580", "name": + "C. Walls"}, {"authorId": "145921798", "name": "Jeanne E. Parker"}, {"authorId": + "2147017082", "name": "Josiah Wong"}, {"authorId": "36730256", "name": "Clayton + Barham"}, {"authorId": "38105796", "name": "B. Wilder"}]}, {"paperId": "ff1afd02c56ae4b78597d1cfd6e21d41102b1ec7", + "externalIds": {"MAG": "2883606180", "DBLP": "journals/ijbc/HanW18", "DOI": + "10.1142/S0218127418300215", "CorpusId": 53288912}, "corpusId": 53288912, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ff1afd02c56ae4b78597d1cfd6e21d41102b1ec7", + "title": "Turing Patterns of a Lotka-Volterra Competitive System with Nonlocal + Delay", "abstract": "This paper focuses on the dynamical behavior of a Lotka\u2013Volterra + competitive system with nonlocal delay. We first establish the conditions + of Turing bifurcation occurring in the system. According to it and by using + multiple scale method, the amplitude equations of the different Turing patterns + are obtained. Then, we observe when these patterns (spots pattern and stripes + pattern) arise in the Lotka\u2013Volterra competitive system. Finally, some + numerical simulations are given to verify our theoretical analysis.", "venue": + "Int. J. Bifurc. Chaos", "year": 2018, "referenceCount": 46, "citationCount": + 14, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2018-06-30", "journal": + {"name": "Int. J. Bifurc. Chaos", "pages": "1830021:1-1830021:25", "volume": + "28"}, "authors": [{"authorId": "144334629", "name": "B. Han"}, {"authorId": + "2108248403", "name": "Zhi-Cheng Wang"}]}, {"paperId": "70f103ce3a02f20132b7631136624211e60a9914", + "externalIds": {"MAG": "1578346482", "DOI": "10.5860/choice.29-5164", "CorpusId": + 117945749}, "corpusId": 117945749, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/70f103ce3a02f20132b7631136624211e60a9914", + "title": "Computability theory : concepts and applications", "abstract": "Turing + machines turing machines as recognisers universality undecidability alternative + models post''s correspondence problem recursive function theory formal models + of arithmetic Godel''s incompleteness theorem computer science and computability + theory.", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "2057422104", "name": - "Daniel Bailey"}, {"authorId": "3156271", "name": "Amelia Harrison"}, {"authorId": - "1746354", "name": "Y. Lierler"}, {"authorId": "2134090", "name": "V. Lifschitz"}, - {"authorId": "38614754", "name": "Julian Michael"}]}, {"paperId": "21b8e9a5c7ababf2e0645f4963dd7ee201da7de8", - "externalIds": {"MAG": "2170196557", "DOI": "10.1017/CBO9780511806414.009", - "CorpusId": 34450645}, "url": "https://www.semanticscholar.org/paper/21b8e9a5c7ababf2e0645f4963dd7ee201da7de8", - "title": "Historical Institutionalism in Rationalist and Sociological Perspective", - "abstract": "Some of the most fruitful insights generated by social science - in recent decades flow from explorations of how institutions, under\u00ad - stood as sets of regularized practices with a rule-like quality, struc\u00ad - ture the behavior of political and economic actors. I It is not surpris\u00ad - ing that attention has now turned to the second-order problem of explaining - when and how institutions change. 2 In conceptual terms, however, this task - is intrinsically difficult. By their nature, analy\u00ad ses designed to explain - why institutions have a persistent impact on behavior tend to overstate the - solidity of institutions. Acknowledging their plasticity raises questions - about when institutions should be seen as determinants of behavior and when - as objects of strategic action themselves) This problem afflicts rational-choice - approaches to institutions with particular intensity because of the elegant - solutions such analyses have devised to explain the force and persistence - of institutions. Typically, they see institutions as patterns of regularized - behavior that reflect Pareto-optimal equilibria or subgame perfect solutions - to collective", "venue": "", "year": 2009, "referenceCount": 63, "citationCount": - 254, "influentialCitationCount": 18, "isOpenAccess": true, "fieldsOfStudy": - ["Political Science"], "s2FieldsOfStudy": [{"category": "Political Science", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "123394004", "name": "P. Hall"}]}]} + "volume": ""}, "authors": [{"authorId": "1728757", "name": "P. Dunne"}]}, + {"paperId": "3f11ea1ce2b79f369f9561efa2d59362b178be73", "externalIds": {"MAG": + "1971726219", "DOI": "10.1038/418141a", "CorpusId": 4417438, "PubMed": "12110876"}, + "corpusId": 4417438, "publicationVenue": {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", + "name": "Nature", "type": "journal", "issn": "0028-0836", "url": "https://www.nature.com/", + "alternate_urls": ["http://www.nature.com/nature/", "https://www.nature.com/nature/", + "http://www.nature.com/nature/archive/index.html"]}, "url": "https://www.semanticscholar.org/paper/3f11ea1ce2b79f369f9561efa2d59362b178be73", + "title": "Theoretical biology: Ants on a Turing trail", "abstract": null, + "venue": "Nature", "year": 2002, "referenceCount": 3, "citationCount": 15, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Philosophy", "Medicine"], "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["News"], + "publicationDate": "2002-07-11", "journal": {"name": "Nature", "pages": "141-142", + "volume": "418"}, "authors": [{"authorId": "2399129", "name": "P. Hammerstein"}, + {"authorId": "4007768", "name": "O. Leimar"}]}, {"paperId": "1e1cbf43fa57c2f50f346f3cff82c06ead986e55", + "externalIds": {"DBLP": "journals/sLogica/BeggsCT10", "MAG": "2067890769", + "DOI": "10.1007/S11225-010-9254-6", "CorpusId": 18824534}, "corpusId": 18824534, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1e1cbf43fa57c2f50f346f3cff82c06ead986e55", + "title": "Physical Oracles: The Turing Machine and the Wheatstone Bridge", + "abstract": null, "venue": "Stud Logica", "year": 2010, "referenceCount": + 19, "citationCount": 21, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-07-01", "journal": {"name": "Studia Logica", "pages": + "279-300", "volume": "95"}, "authors": [{"authorId": "1919705", "name": "E. + Beggs"}, {"authorId": "143698164", "name": "Jos\u00e9 F\u00e9lix Costa"}, + {"authorId": "145744796", "name": "J. V. Tucker"}]}, {"paperId": "0fbdb8a92ff0f1f093fd36a5adf9fd4cbbbd8558", + "externalIds": {"MAG": "2129240084", "DOI": "10.1016/J.PHYSD.2007.10.013", + "CorpusId": 18595340}, "corpusId": 18595340, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0fbdb8a92ff0f1f093fd36a5adf9fd4cbbbd8558", + "title": "Additive noise-induced Turing transitions in spatial systems with + application to neural fields and the Swift-Hohenberg equation", "abstract": + null, "venue": "", "year": 2008, "referenceCount": 78, "citationCount": 91, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-05-15", "journal": {"name": + "Physica D: Nonlinear Phenomena", "pages": "755-773", "volume": "237"}, "authors": + [{"authorId": "2268158", "name": "A. Hutt"}, {"authorId": "1748730", "name": + "A. Longtin"}, {"authorId": "1400946717", "name": "L. Schimansky-Geier"}]}, + {"paperId": "274cb07413285f9ec84b59fda87ca63bbb8b42b7", "externalIds": {"MAG": + "1980972224", "DBLP": "journals/acta/LoosMM10", "DOI": "10.1007/s00236-009-0113-8", + "CorpusId": 32308765}, "corpusId": 32308765, "publicationVenue": {"id": "0c66bac6-fc2b-46b2-8953-fda36a3cefd5", + "name": "Acta Informatica", "type": "journal", "alternate_names": ["Acta Inform"], + "issn": "0001-5903", "url": "https://www.springer.com/computer/theoretical+computer+science/journal/236", + "alternate_urls": ["http://www.springer.com/computer/theoretical+computer+science/journal/236", + "https://link.springer.com/journal/236"]}, "url": "https://www.semanticscholar.org/paper/274cb07413285f9ec84b59fda87ca63bbb8b42b7", + "title": "Small universal accepting hybrid networks of evolutionary processors", + "abstract": null, "venue": "Acta Informatica", "year": 2010, "referenceCount": + 15, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2010-03-01", "journal": {"name": "Acta Informatica", "pages": + "133-146", "volume": "47"}, "authors": [{"authorId": "145659950", "name": + "Remco Loos"}, {"authorId": "1694383", "name": "F. Manea"}, {"authorId": "1715143", + "name": "V. Mitrana"}]}]} ' headers: @@ -50250,31 +56715,31 @@ interactions: Connection: - keep-alive Content-Length: - - '162616' + - '181184' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:54 GMT + - Tue, 03 Jan 2023 20:53:22 GMT Via: - - 1.1 e40594d191a88dc4bce1cbdfa1173f2a.cloudfront.net (CloudFront) + - 1.1 1904c7aff4976cd4798f07f5b45f7f70.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - tyPqw1BrEPdz39KYjWZid8VgCh7d4MZq-xVF7kNfza0NPZ3hOtJXqw== + - cN16rEwDbPhLzRelpe2EyxtioPTLZqAuBVhn_GUZY4-txNQ07pJItQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detJrFmJvHcFnvA= + - eLxWdGA_vHcF01A= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '162616' + - '181184' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:54 GMT + - Tue, 03 Jan 2023 20:53:22 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - 1dc88452-c2d8-4024-ab95-8bd5e7d07714 + - 896a16a7-06e4-43b6-8158-63bf086fcd6b status: code: 200 message: OK @@ -50290,36 +56755,590 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2400&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2400&limit=100 response: body: - string: '{"total": 65539, "offset": 2400, "next": 2500, "data": [{"paperId": - "cc4e85ce7e17064a9ba38ccb342862f38cd4b1bb", "externalIds": {"MAG": "3021414358", - "DBLP": "conf/mcu/DelvenneKB04", "DOI": "10.1007/978-3-540-31834-7_8", "CorpusId": - 1229605}, "url": "https://www.semanticscholar.org/paper/cc4e85ce7e17064a9ba38ccb342862f38cd4b1bb", - "title": "Computational Universality in Symbolic Dynamical Systems", "abstract": - null, "venue": "Machines, Computations, and Universality", "year": 2004, "referenceCount": - 40, "citationCount": 25, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2004-04-08", "journal": {"name": "ArXiv", "volume": "cs.CC/0404021"}, "authors": - [{"authorId": "145026954", "name": "J. Delvenne"}, {"authorId": "1786485", - "name": "P. Kurka"}, {"authorId": "1715830", "name": "V. Blondel"}]}, {"paperId": - "8c70e5566670fa5b6b9e163516ccd630f64763d0", "externalIds": {"MAG": "1534710488", - "DBLP": "conf/birthday/KariKL99", "DOI": "10.1007/978-3-642-60207-8_31", "CorpusId": - 2900044}, "url": "https://www.semanticscholar.org/paper/8c70e5566670fa5b6b9e163516ccd630f64763d0", - "title": "Reversible Molecular Computation in Ciliates", "abstract": null, - "venue": "Jewels are Forever", "year": 1999, "referenceCount": 28, "citationCount": - 26, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + string: '{"total": 65729, "offset": 2400, "next": 2500, "data": [{"paperId": + "7e0ce032017638dffd2b5aeac527d8a99907d85a", "externalIds": {"MAG": "2593478941", + "DOI": "10.1111/sapm.12165", "CorpusId": 126174551}, "corpusId": 126174551, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7e0ce032017638dffd2b5aeac527d8a99907d85a", + "title": "Stability, Steady\u2010State Bifurcations, and Turing Patterns in + a Predator\u2013Prey Model with Herd Behavior and Prey\u2010taxis", "abstract": + "In this paper, we consider a predator\u2013prey model with herd behavior + and prey\u2010taxis subject to the homogeneous Neumann boundary condition. + First, by analyzing the characteristic equation, the local stability of the + positive equilibrium is discussed. Then, choosing prey\u2010tactic sensitivity + coefficient as the bifurcation parameter, we obtain a branch of nonconstant + solutions bifurcating from the positive equilibrium by an abstract bifurcation + theory, and find the stable bifurcating solutions near the bifurcation point + under suitable conditions. We have shown that prey\u2010taxis can destabilize + the uniform equilibrium and yields the occurrence of spatial patterns. Furthermore, + some numerical simulations to illustrate the theoretical analysis are also + carried out, Turing patterns such as spots pattern, spots\u2013strip pattern, + strip pattern, stable nonconstant steady\u2010state solutions, and spatially + inhomogeneous periodic solutions are obtained, which also expand our theoretical + results.", "venue": "", "year": 2017, "referenceCount": 63, "citationCount": + 72, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"pages": "353-363"}, "authors": [{"authorId": "144073818", "name": "L. Kari"}, - {"authorId": "1753080", "name": "J. Kari"}, {"authorId": "1801972", "name": - "L. Landweber"}]}, {"paperId": "b0161e12fb54b1ff658620cf5d2c96ca6c442365", + "publicationTypes": null, "publicationDate": "2017-10-01", "journal": {"name": + "Studies in Applied Mathematics", "volume": "139"}, "authors": [{"authorId": + "1794550", "name": "Yongli Song"}, {"authorId": "143754807", "name": "Xiaosong + Tang"}]}, {"paperId": "35acdf1e1343e2c8047a91284ca4fda50a9e7c8b", "externalIds": + {"MAG": "36160858", "CorpusId": 116729966}, "corpusId": 116729966, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/35acdf1e1343e2c8047a91284ca4fda50a9e7c8b", + "title": "UNITAIRE PSEUDO-MULTIPLICATIF ASSOCI \u00b4 E ` A UN GROUPOIDE. + APPLICATIONS ` A LA MOYENNABILIT \u00b4 E", "abstract": "From every measured + groupoid, we construct a \"pseudo-multipli- cative\" unitary, which generates + the two Hopf-von-Neumann bimodule struc- tures constructed in a former paper, + and generalize in this way the well- known multiplicative unitary associated + with a locally compact group. We prove a generalization of Leptin theorem + which connects the amenability of a measured groupoid and the existence of + an approximate unit for its Fourier algebra.", "venue": "", "year": 2000, + "referenceCount": 11, "citationCount": 37, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "121348745", + "name": "J. Vallin"}]}, {"paperId": "98fe98af61d56f04bfd8911d33435b3b806aed46", + "externalIds": {"DBLP": "conf/aaaiss/BaileyHLLM15", "MAG": "2291406294", "CorpusId": + 7070742}, "corpusId": 7070742, "publicationVenue": {"id": "6e27f090-4327-48e8-9cf9-bf630f29c5df", + "name": "AAAI Spring Symposia", "type": "conference", "alternate_names": ["AAAI + Spring Symp"]}, "url": "https://www.semanticscholar.org/paper/98fe98af61d56f04bfd8911d33435b3b806aed46", + "title": "The Winograd Schema Challenge and Reasoning about Correlation", + "abstract": "The Winograd Schema Challenge is an alternative to the Turing + Test that may provide a more meaningful measure of machine intelligence. It + poses a set of coreference resolution problems that cannot be solved without + human-like reasoning. In this paper, we take the view that the solution to + such problems lies in establishing discourse coherence. Specifically, we examine + two types of rhetorical relations that can be used to establish discourse + coherence: positive and negative correlation. We introduce a framework for + reasoning about correlation between sentences, and show how this framework + can be used to justify solutions to some Winograd Schema problems.", "venue": + "AAAI Spring Symposia", "year": 2015, "referenceCount": 20, "citationCount": + 50, "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2057422104", + "name": "Daniel Bailey"}, {"authorId": "3156271", "name": "Amelia Harrison"}, + {"authorId": "1746354", "name": "Y. Lierler"}, {"authorId": "2134090", "name": + "V. Lifschitz"}, {"authorId": "38614754", "name": "Julian Michael"}]}, {"paperId": + "b8e7dc1900212a66f635ddc25e60ce6c64d3f506", "externalIds": {"MAG": "2080436507", + "DOI": "10.1016/0378-4371(92)90262-O", "CorpusId": 122645853}, "corpusId": + 122645853, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b8e7dc1900212a66f635ddc25e60ce6c64d3f506", + "title": "Numerical studies of Turing patterns selection in a two-dimensional + system", "abstract": null, "venue": "", "year": 1992, "referenceCount": 22, + "citationCount": 54, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Physics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-09-01", + "journal": {"name": "Physica A-statistical Mechanics and Its Applications", + "pages": "158-171", "volume": "188"}, "authors": [{"authorId": "91298566", + "name": "V. Dufiet"}, {"authorId": "2313078", "name": "J. Boissonade"}]}, + {"paperId": "cd16e895696810eeaf5ef00236e0da6f29b80993", "externalIds": {"DBLP": + "phd/us/Gips74", "MAG": "2131848667", "DOI": "10.1007/978-3-0348-5753-6", + "CorpusId": 123229293}, "corpusId": 123229293, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cd16e895696810eeaf5ef00236e0da6f29b80993", + "title": "Shape grammars and their uses", "abstract": null, "venue": "", "year": + 1974, "referenceCount": 0, "citationCount": 89, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "1765512", "name": "J. Gips"}]}, {"paperId": "147dcdae1754b9764594ae7b180bb120a2da9f10", + "externalIds": {"MAG": "3012301499", "DOI": "10.1111/1440-1703.12102", "CorpusId": + 216406832}, "corpusId": 216406832, "publicationVenue": {"id": "df2f427d-e725-4492-b49b-52b1a3aa6843", + "name": "Ecological research", "type": "journal", "alternate_names": ["Ecol + res", "Ecol Res", "Ecological Research"], "issn": "0912-3814", "url": "https://onlinelibrary.wiley.com/journal/14401703"}, + "url": "https://www.semanticscholar.org/paper/147dcdae1754b9764594ae7b180bb120a2da9f10", + "title": "Quantifying sample completeness and comparing diversities among + assemblages", "abstract": "We develop a novel class of measures to quantify + sample completeness of a biological survey. The class of measures is parameterized + by an order q \u2265 0 to con-trol for sensitivity to species relative abundances. + When q = 0, species abundances are disregarded and our measure reduces to + the conventional measure of completeness, that is, the ratio of the observed + species richness to the true richness (observed plus undetected). When q = + 1, our measure reduces to the sample coverage (the proportion of the total + number of individuals in the entire assemblage that belongs to detected species), + a concept developed by Alan Turing in his cryptographic analysis. The sample + completeness of a general order q \u2265 0 extends Turing''s sample coverage + and quantifies the proportion of the assemblage''s individuals belonging to + detected species, with each individual being proportionally weighted by the + ( q \u2212 1)th power of its abundance. We propose the use of a continuous + profile depicting our proposed measures with respect to q \u2265 0 to characterize + the sample completeness of a survey. An analytic estimator of the diversity + profile and its sampling uncer-tainty based on a bootstrap method are derived + and tested by simulations. To compare diversity across multiple assemblages, + we propose an integrated approach based on the framework of Hill numbers to + assess (a) the sample completeness profile, (b) asymptotic diversity estimates + to infer true diversities of entire assemblages, (c) non-asymptotic standardization + via rarefaction and extrapolation, and (d) an evenness profile. Our framework + can be extended to incidence data. Empirical data sets from several research + fields are used for illustration.", "venue": "Ecological research", "year": + 2020, "referenceCount": 70, "citationCount": 66, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1111/1440-1703.12102", + "status": "HYBRID"}, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": + "Geography", "source": "external"}, {"category": "Environmental Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2020-03-01", "journal": {"name": "Ecological Research"}, "authors": [{"authorId": + "49642270", "name": "A. Chao"}, {"authorId": "4927638", "name": "Y. Kubota"}, + {"authorId": "5084750", "name": "D. Zelen\u00fd"}, {"authorId": "87455371", + "name": "Chun\u2010Huo Chiu"}, {"authorId": "46652142", "name": "Ching\u2010Feng + Li"}, {"authorId": "5435236", "name": "B. Kusumoto"}, {"authorId": "36556845", + "name": "M. Yasuhara"}, {"authorId": "40154634", "name": "S. Thorn"}, {"authorId": + "144749816", "name": "Chih\u2010Lin Wei"}, {"authorId": "49162252", "name": + "Mark John Costello"}, {"authorId": "2575768", "name": "Robert K. Colwell"}]}, + {"paperId": "426a0c7e5cdffc0f233262adf7474937b3b30958", "externalIds": {"MAG": + "2017541824", "DOI": "10.1007/BF02477996", "CorpusId": 31125724, "PubMed": + "13974850"}, "corpusId": 31125724, "publicationVenue": {"id": "dc99a172-2fff-4d0c-8cd7-59eb287a132a", + "name": "The Bulletin of Mathematical Biophysics", "alternate_names": ["Bull + Math Biophys"], "issn": "0007-4985", "alternate_issns": ["1522-9602"], "url": + "https://link.springer.com/journal/11538", "alternate_urls": ["http://link.springer.com/journal/volumesAndIssues/11538"]}, + "url": "https://www.semanticscholar.org/paper/426a0c7e5cdffc0f233262adf7474937b3b30958", + "title": "Church''s thesis and its relation to the concept of realizability + in biology and physics.", "abstract": null, "venue": "The Bulletin of Mathematical + Biophysics", "year": 1962, "referenceCount": 9, "citationCount": 43, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Philosophy", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1962-05-28", "journal": {"name": "The Bulletin of mathematical + biophysics", "pages": "\n 375-93\n ", "volume": "24"}, "authors": + [{"authorId": "145439860", "name": "R. Rosen"}]}, {"paperId": "3449355f9317cac7d194a7ccc65f3fc9040312bb", + "externalIds": {"DBLP": "books/daglib/0077879", "MAG": "2138699470", "CorpusId": + 2308742}, "corpusId": 2308742, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3449355f9317cac7d194a7ccc65f3fc9040312bb", + "title": "The Turing test and the frame problem - AI''s mistaken understanding + of intelligence", "abstract": "Both the Turing test and the frame problem + have been significant items of discussion since the 1970s in the philosophy + of artificial intelligence (AI) and the philisophy of mind. However, there + has been little effort during that time to distill how the frame problem bears + on the Turing test. If it proves not to be solvable, then not only will the + test not be passed, but it will call into question the assumption of classical + AI that intelligence is the manipluation of formal constituens under the control + of a program. This text explains why there has been less progress in artificial + intelligence research than AI proponents would have believed likely in the + mid-1970s. As a first pass, the difficulty of the frame problem would account + for some of the lack of progress. An alternative interpretation is that the + research paradigm itself is destined to be less productive than might have + been hoped. In general termns, the view advanced here is that the future of + AI depends on whether the frame problem eventually falls to computational + techniques. If it turns out that the frame problem is computationally irreducible, + of there is no way to solve it computationally by means of a program operating + on formally defined constituents, then an increasing number of experts in + the field will reach the conclusion that AI embodies a fundamental misunderstanding + of intelligence.", "venue": "Ablex series in artificial intelligence", "year": + 1992, "referenceCount": 0, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1992-10-01", "journal": {"pages": + "I-VIII, 1-216"}, "authors": [{"authorId": "87062023", "name": "L. Crockett"}]}, + {"paperId": "00206cca4f4b0792038b5d4a4aa399c4d2e3a8fa", "externalIds": {"PubMedCentral": + "4707694", "MAG": "2187863796", "DOI": "10.1098/rsbl.2015.0674", "CorpusId": + 1457581, "PubMed": "26631244"}, "corpusId": 1457581, "publicationVenue": {"id": + "389ae55d-9651-4a29-908c-2c89d76604c4", "name": "Biology Letters", "type": + "journal", "alternate_names": ["Biology Lett"], "issn": "1744-9561", "url": + "https://royalsocietypublishing.org/journal/rsbl", "alternate_urls": ["http://rsbl.royalsocietypublishing.org/"]}, + "url": "https://www.semanticscholar.org/paper/00206cca4f4b0792038b5d4a4aa399c4d2e3a8fa", + "title": "A Turing test for collective motion", "abstract": "A widespread + problem in biological research is assessing whether a model adequately describes + some real-world data. But even if a model captures the large-scale statistical + properties of the data, should we be satisfied with it? We developed a method, + inspired by Alan Turing, to assess the effectiveness of model fitting. We + first built a self-propelled particle model whose properties (order and cohesion) + statistically matched those of real fish schools. We then asked members of + the public to play an online game (a modified Turing test) in which they attempted + to distinguish between the movements of real fish schools or those generated + by the model. Even though the statistical properties of the real data and + the model were consistent with each other, the public could still distinguish + between the two, highlighting the need for model refinement. Our results demonstrate + that we can use \u2018citizen science\u2019 to cross-validate and improve + model fitting not only in the field of collective behaviour, but also across + a broad range of biological systems.", "venue": "Biology Letters", "year": + 2015, "referenceCount": 34, "citationCount": 14, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://royalsocietypublishing.org/doi/pdf/10.1098/rsbl.2015.0674", + "status": "HYBRID"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Economics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2015-12-01", "journal": {"name": "Biology + Letters", "volume": "11"}, "authors": [{"authorId": "1401776206", "name": + "J. Herbert-Read"}, {"authorId": "4933734", "name": "Maksym Romenskyy"}, {"authorId": + "2196522", "name": "D. Sumpter"}]}, {"paperId": "d0769bf82e1a71872780b337331928c0c9f1dbde", + "externalIds": {"DBLP": "journals/jfp/BurnettADRGY01", "MAG": "1899639145", + "DOI": "10.1017/S0956796800003828", "CorpusId": 18730312}, "corpusId": 18730312, + "publicationVenue": {"id": "58f55ec2-1f5a-4e79-af2a-0046ee1dcd2a", "name": + "Journal of functional programming", "type": "journal", "alternate_names": + ["J funct program", "Journal of Functional Programming", "J Funct Program"], + "issn": "0956-7968", "url": "https://www.cambridge.org/core/journals/journal-of-functional-programming", + "alternate_urls": ["http://journals.cambridge.org/jid_JFP"]}, "url": "https://www.semanticscholar.org/paper/d0769bf82e1a71872780b337331928c0c9f1dbde", + "title": "Forms/3: A first-order visual language to explore the boundaries + of the spreadsheet paradigm", "abstract": "Although detractors of functional + programming sometimes claim that functional programming is too difficult or + counter-intuitive for most programmers to understand and use, evidence to + the contrary can be found by looking at the popularity of spreadsheets. The + spreadsheet paradigm, a first-order subset of the functional programming paradigm, + has found wide acceptance among both programmers and end users. Still, there + are many limitations with most spreadsheet systems. In this paper, we discuss + language features that eliminate several of these limitations without deviating + from the first-order, declarative evaluation model. The language used to illustrate + these features is a research language called Forms/3. Using Forms/3, we show + that procedural abstraction, data abstraction and graphics output can be supported + in the spreadsheet paradigm. We show that, with the addition of a simple model + of time, animated output and GUI I/O also become viable. To demonstrate generality, + we also present an animated Turing machine simulator programmed using these + features. Throughout the paper, we combine our discussion of the programming + language characteristics with how the language features prototyped in Forms/3 + relate to what is known about human effectiveness in programming.", "venue": + "Journal of functional programming", "year": 2001, "referenceCount": 105, + "citationCount": 244, "influentialCitationCount": 24, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2001-03-01", "journal": {"name": "Journal of Functional + Programming", "pages": "155 - 206", "volume": "11"}, "authors": [{"authorId": + "1737204", "name": "M. Burnett"}, {"authorId": "143694665", "name": "J. Atwood"}, + {"authorId": "2108158", "name": "Rebecca Walpole Djang"}, {"authorId": "8250186", + "name": "James Reichwein"}, {"authorId": "2031490", "name": "Herkimer J. Gottfried"}, + {"authorId": "47569072", "name": "Sherry Yang"}]}, {"paperId": "4e8b5a525c79fe004bc39af367a135312d5f76b6", + "externalIds": {"DBLP": "journals/jsyml/Maass82", "MAG": "1972481159", "DOI": + "10.2307/2273100", "CorpusId": 42422753}, "corpusId": 42422753, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/4e8b5a525c79fe004bc39af367a135312d5f76b6", + "title": "Recursively enumerable generic sets", "abstract": "Abstract We show + that one can solve Post''s Problem by constructing generic sets in the usual + set theoretic framework applied to tiny universes. This method leads to a + new class of recursively enumerable sets: r.e. generic sets. All r.e. generic + sets are low and simple and therefore of Turing degree strictly between 0 + and 0\u2032. Further they supply the first example of a class of low recursively + enumerable sets which are automorphic in the lattice \u2130 of recursively + enumerable sets with inclusion. We introduce the notion of a promptly simple + set. This describes the essential feature of r.e. generic sets with respect + to automorphism constructions.", "venue": "Journal of Symbolic Logic", "year": + 1982, "referenceCount": 6, "citationCount": 52, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1982-12-01", "journal": {"name": "Journal of Symbolic + Logic", "pages": "809 - 823", "volume": "47"}, "authors": [{"authorId": "145247053", + "name": "W. Maass"}]}, {"paperId": "8e5c2227ec9eb7e2eae47c93723687078342e635", + "externalIds": {"ArXiv": "0802.2705", "MAG": "2100382100", "DOI": "10.1090/S0002-9947-2015-06184-4", + "CorpusId": 16366297}, "corpusId": 16366297, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8e5c2227ec9eb7e2eae47c93723687078342e635", + "title": "Measures and Their Random Reals", "abstract": "We study the randomness + properties of reals with respect to arbitrary probability measures on Cantor + space. We show that every non-computable real is non-trivially random with + respect to some measure. The probability measures constructed in the proof + may have atoms. If one rules out the existence of atoms, i.e. considers only + continuous measures, it turns out that every non-hyperarithmetical real is + random for a continuous measure. On the other hand, examples of reals not + random for any continuous measure can be found throughout the hyperarithmetical + Turing degrees.", "venue": "", "year": 2008, "referenceCount": 34, "citationCount": + 51, "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.ams.org/tran/2015-367-07/S0002-9947-2015-06184-4/S0002-9947-2015-06184-4.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-02-19", "journal": {"name": + "Transactions of the American Mathematical Society", "pages": "5081-5097", + "volume": "367"}, "authors": [{"authorId": "145432335", "name": "Jan Reimann"}, + {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": "5816937e79fbb199a19bdaa24c654c53064f398a", + "externalIds": {"DBLP": "conf/aieeire/000161", "MAG": "2075033069", "DOI": + "10.1145/1460690.1460715", "CorpusId": 14549285}, "corpusId": 14549285, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/5816937e79fbb199a19bdaa24c654c53064f398a", + "title": "A basis for a mathematical theory of computation, preliminary report", + "abstract": "Programs that learn to modify their own behaviors require a way + of representing algorithms so that interesting properties and interesting + transformations of algorithms are simply represented. Theories of computability + have been based on Turing machines, recursive functions of integers and computer + programs. Each of these has artificialities which make it difficult to manipulate + algorithms or to prove things about them. The present paper presents a formalism + based on conditional forms and recursive functions whereby the functions computable + in terms of certain base functions can be simply expressed. We also describe + some of the formal properties of conditional forms, and a method called recursion + induction for proving facts about algorithms.", "venue": "IRE-AIEE-ACM ''61 + (Western)", "year": 1961, "referenceCount": 28, "citationCount": 51, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/1460690.1460715", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1961-05-09", "journal": {"pages": "225-238"}, "authors": + [{"authorId": "143805236", "name": "J. McCarthy"}]}, {"paperId": "c03d888b36e9350421f3f628bc18f08121529373", + "externalIds": {"MAG": "2126891113", "DOI": "10.1177/004051755202200803", + "CorpusId": 135704891}, "corpusId": 135704891, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/c03d888b36e9350421f3f628bc18f08121529373", + "title": "Observations of the Birefringence and Refractive Index of Synthetic + Fibers with Special Reference to Their Identification", "abstract": "Birefringence + and refractive indices of synthetic fibers are measured by the polarization + color and immersion methods. These properties prove to be much more consistent + and characteristic for synthetic fibers than for natural fibers and rayons, + to which previous studies had mainly been confined. These fea tures can therefore + be used in the identification of synthetic fibers. A simple polarizing device + for making these measurments using an ordinary microscope is described.", + "venue": "", "year": 1952, "referenceCount": 18, "citationCount": 36, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1952-08-01", "journal": {"name": "Textile + Research Journal", "pages": "513 - 522", "volume": "22"}, "authors": [{"authorId": + "88091143", "name": "A. Heyn"}]}, {"paperId": "eece0429ffa17149690402af142810a7bd877707", + "externalIds": {"MAG": "2602626577", "DBLP": "journals/synthese/VillalobosD18", + "DOI": "10.1007/s11229-017-1386-z", "CorpusId": 4982378}, "corpusId": 4982378, + "publicationVenue": {"id": "cfb7bc3b-4dad-4d1f-aea6-f5d1f2499ce8", "name": + "Synthese", "type": "journal", "issn": "0039-7857", "url": "http://www.springer.com/11229", + "alternate_urls": ["http://www.jstor.org/journals/00397857.html", "https://www.jstor.org/journal/synthese"]}, + "url": "https://www.semanticscholar.org/paper/eece0429ffa17149690402af142810a7bd877707", + "title": "Enactive autonomy in computational systems", "abstract": null, "venue": + "Synthese", "year": 2018, "referenceCount": 42, "citationCount": 25, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2Fs11229-017-1386-z.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-05-01", "journal": {"name": "Synthese", "pages": + "1891-1908", "volume": "195"}, "authors": [{"authorId": "48231885", "name": + "M. Villalobos"}, {"authorId": "35121941", "name": "Joe E. Dewhurst"}]}, {"paperId": + "c3e62dd6762fd452e2e1c69dc9296524249bff6a", "externalIds": {"DBLP": "journals/dke/Kapetanios08", + "MAG": "2022459084", "DOI": "10.1016/j.datak.2008.05.003", "CorpusId": 29430336}, + "corpusId": 29430336, "publicationVenue": {"id": "9abcecc2-be15-4a05-9b21-dda38f5a8161", + "name": "Data & Knowledge Engineering", "type": "journal", "alternate_names": + ["Data Knowl Eng", "Data Knowl Eng", "Data and Knowledge Engineering"], "issn": + "0169-023X", "url": "http://www.elsevier.com/locate/datak", "alternate_urls": + ["http://www.sciencedirect.com/science/journal/0169023X", "http://www.elsevier.com/wps/find/journaldescription.cws_home/505608/description#description"]}, + "url": "https://www.semanticscholar.org/paper/c3e62dd6762fd452e2e1c69dc9296524249bff6a", + "title": "Quo Vadis computer science: From Turing to personal computer, personal + content and collective intelligence", "abstract": null, "venue": "Data & Knowledge + Engineering", "year": 2008, "referenceCount": 23, "citationCount": 52, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2008-11-01", "journal": + {"name": "Data Knowl. Eng.", "pages": "286-292", "volume": "67"}, "authors": + [{"authorId": "2670451", "name": "E. Kapetanios"}]}, {"paperId": "865bcbcd5d10f9e3f2dbd859af480df6dc261584", + "externalIds": {"DBLP": "journals/tocl/GaboardiMR12", "ArXiv": "1006.0030", + "MAG": "2146459129", "DOI": "10.1145/2159531.2159540", "CorpusId": 1098229}, + "corpusId": 1098229, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/865bcbcd5d10f9e3f2dbd859af480df6dc261584", + "title": "An Implicit Characterization of PSPACE", "abstract": "We present + a type system for an extension of lambda calculus with a conditional construction, + named STAB, that characterizes the PSPACE class. This system is obtained by + extending STA, a type assignment for lambda-calculus inspired by Lafont\u2019s + Soft Linear Logic and characterizing the PTIME class. We extend STA by means + of a ground type and terms for Booleans and conditional. The key issue in + the design of the type system is to manage the contexts in the rule for conditional + in an additive way. Thanks to this rule, we are able to program polynomial + time Alternating Turing Machines. From the well-known result APTIME = PSPACE, + it follows that STAB is complete for PSPACE.\n Conversely, inspired by the + simulation of Alternating Turing machines by means of Deterministic Turing + machine, we introduce a call-by-name evaluation machine with two memory devices + in order to evaluate programs in polynomial space. As far as we know, this + is the first characterization of PSPACE that is based on lambda calculus and + light logics.", "venue": "TOCL", "year": 2010, "referenceCount": 41, "citationCount": + 23, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1006.0030", "status": "GREEN"}, "fieldsOfStudy": + ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-05-31", "journal": {"name": "ACM + Trans. Comput. Log.", "pages": "18:1-18:36", "volume": "13"}, "authors": [{"authorId": + "1759699", "name": "Marco Gaboardi"}, {"authorId": "145309398", "name": "J. + Marion"}, {"authorId": "1771138", "name": "S. D. Rocca"}]}, {"paperId": "27bdc2a04183ede51dafbb88d588598aa799170b", + "externalIds": {"ArXiv": "astro-ph/0209217", "MAG": "2006027259", "DOI": "10.1051/0004-6361:20021824", + "CorpusId": 14146465}, "corpusId": 14146465, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/27bdc2a04183ede51dafbb88d588598aa799170b", + "title": "Fine-structure in the nonthermal X-ray emission of SNR RX J1713.7 + 3946 revealed by Chandra", "abstract": "We present morphological and spectroscopic + studies of the northwest rim of the supernova remnant RX J1713.7\u22123946 + based on observations by the Chandra X-ray observatory . We found a complex + network of nonthermal (synchrotron) X-ray filaments, as well as a ''void'' + type struc ture - a dim region of a circular shape - in the northwest rim. + It is remarkable that despite distinct brightness variations , the X-ray spectra + everywhere in this region can be well fitte d with a power-law model with + photon index ranging = 2.1-2.5. We briefly discuss some implications of these + resul ts and argue that the resolved X-ray features in the northwest rim may + challenge the perceptions of the standard diffusive shock-acceleration models + concerning the production, propagation and radiation of relativistic particles + in supernova remnants.", "venue": "", "year": 2002, "referenceCount": 21, + "citationCount": 85, "influentialCitationCount": 16, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.aanda.org/articles/aa/pdf/2003/11/aah4106.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2002-09-11", "journal": {"name": + "Astronomy and Astrophysics", "pages": "567-574", "volume": "400"}, "authors": + [{"authorId": "50884740", "name": "Y. Uchiyama"}, {"authorId": "30014957", + "name": "F. Aharonian"}, {"authorId": "145454902", "name": "T. Takahashi"}]}, + {"paperId": "635a4f67089f28f87892bd312e4937c6f27367c5", "externalIds": {"MAG": + "2024688316", "DOI": "10.1111/j.1365-2869.1995.tb00232.x", "CorpusId": 13297354, + "PubMed": "10607217"}, "corpusId": 13297354, "publicationVenue": {"id": "88fe3ddb-ea89-4d42-876b-f856cb401e96", + "name": "Journal of Sleep Research", "type": "journal", "alternate_names": + ["J Sleep Res"], "issn": "0962-1105", "alternate_issns": ["0966-6826"], "url": + "http://www.wiley.com/bw/journal.asp?ref=0962-1105", "alternate_urls": ["https://onlinelibrary.wiley.com/journal/13652869"]}, + "url": "https://www.semanticscholar.org/paper/635a4f67089f28f87892bd312e4937c6f27367c5", + "title": "Melatonin and adjustment to phase shift", "abstract": "SUMMARY\u2002 + The pineal hormone melatonin has clear circadian phase\u2010shifting effects + in humans which have recently been formalized as a phase response curve. Its + potential use in circadian rhythm disorders has been investigated in field + studies of jet lag and shift work and in simulated phase shift. A substantial + amount of information indicates that in the majority of subjects it hastens + adaptation of both subjective and objective measures to forced shifts in time + cues with few reported side\u2010effects. Field studies of its use in adaptation + to shift work are sparse and preliminary but the first indications are positive. + In some blind subjects with sleep disturbance it can stabilize sleep onset + time without necessarily entraining all circadian rhythms and it can advance + sleep timing in delayed sleep\u2010phase insomnia. Acute suppression of core + body tempera\u2010ture may be an integral part of the phase\u2010shifting + mechanism.", "venue": "Journal of Sleep Research", "year": 1995, "referenceCount": + 40, "citationCount": 87, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1111/j.1365-2869.1995.tb00232.x", + "status": "BRONZE"}, "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Psychology", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-12-01", "journal": + {"name": "Journal of Sleep Research", "volume": "4"}, "authors": [{"authorId": + "143783546", "name": "J. Arendt"}, {"authorId": "37568522", "name": "S. Deacon"}, + {"authorId": "145402503", "name": "J. English"}, {"authorId": "38088254", + "name": "S. Hampton"}, {"authorId": "40273830", "name": "L. Morgan"}]}, {"paperId": + "8edeccce1612eaad8a00d96f1e6ed28565254c94", "externalIds": {"ArXiv": "quant-ph/0407090", + "MAG": "2950859522", "DOI": "10.1142/S0219749905000712", "CorpusId": 17329693}, + "corpusId": 17329693, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8edeccce1612eaad8a00d96f1e6ed28565254c94", + "title": "An anatomy of a quantum adiabatic algorithm that transcends the + Turing computability", "abstract": "We give an update on a quantum adiabatic + algorithm for the Turing noncomputable Hilbert''s tenth problem, and briefly + go over some relevant issues and misleading objections to the algorithm.", + "venue": "", "year": 2004, "referenceCount": 29, "citationCount": 19, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/quant-ph/0407090", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2004-07-13", "journal": {"name": + "International Journal of Quantum Information", "pages": "177-182", "volume": + "03"}, "authors": [{"authorId": "2063540", "name": "T. Kieu"}]}, {"paperId": + "681f3c1fa6c1fd733d53680a46fd4325876a393f", "externalIds": {"DBLP": "books/daglib/0067904", + "MAG": "1527654363", "CorpusId": 26903267}, "corpusId": 26903267, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/681f3c1fa6c1fd733d53680a46fd4325876a393f", + "title": "Concurrent programming - principles and practice", "abstract": "I. + BASIC CONCEPTS. Sequential Programming. Language Notation. Logic, Propositions, + and Predicates. A Programming Logic. Proofs in Programming Logic. Program + Derivation. Historical Notes and References. Exercises. Concurrency and Synchronization. + Specifying Concurrent Execution. Atomic Actions and Synchronization. Semantics + of Concurrent Execution. Techniques for Avoiding Interference. Auxiliary Variables. + Safety and Liveness Properties. Historical Notes and References. Exercises. + II. SHARED VARIABLES. Fine-Grained Synchronization. The Critical Section Problem. + Critical Sections: Tie-Breaker Algorithm. Critical Sections: Ticket Algorithm. + Critical Sections: Bakery Algorithm. Barrier Synchronization. Data Parallel + Algorithms. On-The-Fly Garbage Collection. Implementing Processes. Historical + Notes and References. Exercises. Semaphores. Notation and Semantics. Basic + Uses and Programming Techniques. Selective Mutual Exclusion. General Condition + Synchronization. Resource Allocation. Implementation. Historical Notes and + References. Exercises. Conditional Critical Regions. Notation and Semantics. + Dining Philosophers Revisited. Reader/Writers Revisited. Interprocess Communication. + Scheduling and Resource Allocation. Implementations. Historical Notes and + References. Exercises. Monitors. Programming Notation. Formal Semantics and + Program Proofs. Synchronization Techniques. Disk Scheduling: Program Structures. + Alternative Approaches to Synchronization. Implementations. Historical Notes + and References. Exercises. III. MESSAGE PASSING. Asynchronous Message Passing. + Programming Notation. Formal Semantics. Filters: A Sorting Network. Clients + and Servers. Heartbeat Algorithms. Probe/Echo Algorithms. Broadcast Algorithms. + Token-Passing Algorithms. Replicated Servers. Implementations. Historical + Notes and References. Exercises. Synchronous Message Passing. Programming + Notation. Formal Semantics. Networks of Filters. Interacting Parallel Processes. + Clients and Servers. Implementations. Historical Notes and References. Exercises. + RPC and Rendezvous. Remote Procedure Call. Rendezvous. A Multiple Primitives + Notation. Clients and Servers. Parallel Algorithms. Implementation. Historical + Notes and References. Exercises. IV. PRACTICE. Language Overviews. Turing + Plus: Monitors. Occam: Synchronous Message Passing. Ada: Rendezvous. SR: Multiple + Primitives. Linda: Distributed Data Structures. Comparison and Performance. + Historical Notes and References. Exercises. Glossary. Bibliography. Index. + 0805300864T04062001", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": + 552, "influentialCitationCount": 45, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1991-07-12", "journal": {"pages": "I-XVII, 1-637"}, "authors": [{"authorId": + "2542622", "name": "G. Andrews"}]}, {"paperId": "b9b6a35b3bf82272e7f3e408492320854497b37c", + "externalIds": {"MAG": "2014183707", "DOI": "10.1515/semi.1988.68.1-2.33", + "CorpusId": 170722603}, "corpusId": 170722603, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/b9b6a35b3bf82272e7f3e408492320854497b37c", + "title": "Peirce and Turing: Comparisons and conjectures", "abstract": "A + few years ago I became interested in the question of who had been the designer + of a particular unsigned diagram for an electrical ''logical machine''. The + diagram had been found by Alonzo Church, about 1950, among the Allan Marquand + papers at the Firestone Library of Princeton University. Because Marquand + had studied logic at the Johns Hopkins University, I wondered if his teacher + there, Charles Sanders Peirce (1839-1914), had any connection with this design. + Pursuit of the matter soon began to produce a defensible case that Peirce + actually made the design at Marquand''s request. Further background, plus + evidence and argumentation for that thesis, is given in Ketner (1984a). In + the course of my earlier study I encountered additional material which showed + that Peirce''s interest in logical machines was not limited to this single + episode, but perhaps was intimately connected with his careful lifelong study + of the nature of mathematical reasoning. That in turn is part of the basis + for his study of semeiosis or sign action (Ketner 1984b). From a very young + age, principally through his well-informed father, Benjamin Peirce, with whom + he was very close both personally and intellectually, he had been aware of + the study of machine reasoning in the work of figures such as Babbage (see + Hyman 1982) and Jevons (see Ketner 1984a). That some logical machines then + existed, either as designs or as working models, and that they apparently + could perform some logical operations ''at the turn of a crank'', was, in + the eyes of Charles (see Peirce 1877), a new step in the development of science; + and he regarded each such step as a lesson that should be learned well by + the historically sensitive logician, of which genus he was a fine specimen. + The ruling passion in his life was the study of logic, understood broadly + as the science of the nature of scientific method (Ketner 1983a), so it is + not surprising that he quickly sought to extract the lesson of this particular + ''new step'' involving logical machines. In short, on the occasion of my", + "venue": "", "year": 1988, "referenceCount": 22, "citationCount": 15, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], + "s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"pages": "33 - 62", "volume": "68"}, "authors": [{"authorId": + "30257141", "name": "K. Ketner"}]}, {"paperId": "26fa640cfdd753d34d5f6440264e66a5ecf65cce", + "externalIds": {"MAG": "2741390383", "DBLP": "conf/stoc/GoldwasserS86", "DOI": + "10.1145/12130.12137", "CorpusId": 5636899}, "corpusId": 5636899, "publicationVenue": + {"id": "8113a511-e0d9-4231-a1bc-0bf5d0212a4e", "name": "Symposium on the Theory + of Computing", "type": "conference", "alternate_names": ["Symp Theory Comput", + "STOC"], "url": "http://acm-stoc.org/"}, "url": "https://www.semanticscholar.org/paper/26fa640cfdd753d34d5f6440264e66a5ecf65cce", + "title": "Private coins versus public coins in interactive proof systems", + "abstract": "An interactive proof system is a method by which one party of + unlimited resources, called the prover, can convince a party of limited resources, + call the verifier, of the truth of a proposition. The verifier may toss coins, + ask repeated questions of the prover, and run efficient tests upon the prover''s + responses before deciding whether to be convinced. This extends the familiar + proof system implicit in the notion of NP in that there the verifier may not + toss coins or speak, but only listen and verify. Interactive proof systems + may not yield proof in the strict mathematical sense: the \"proofs\" are probabilistic + with an exponentially small, though non-zero chance of error. We consider + two notions of interactive proof system. One, defined by Goldwasser, Micali, + and Rackoff [GMR] permits the verifier a coin that can be tossed in private, + i.e., a secret source of randomness. The Permission to copy without ice all + or part of this material is granted provided that the copies are not made + or distributed for direct commercial advantage, the ACM copyright notice and + the title of the publication and its date appear, and notice is given that + copying is by permission of the Association for Computing Machinery. To copy + otherwise, or to republish, requires a fee and/or specific permission. \u00a9 + 1986 ACM 0-89791-193-8/86/0500/0059 $00.75 second, due to Babai, [B] requires + that the outcome of the verifier''s coin tosses be public and thus accessible + to the prover. Our main result is that these two systems are equivalent in + power with respect to language recognition. The notion of interactive proof + system may be seen to yield a probabilistic analog to NP much as BPP is the + probabilistic analog to P. We define the probabilistic, nondeterministic, + polynomial time Turing machine and show that it is also equivalent in power + to these systems.", "venue": "Symposium on the Theory of Computing", "year": + 1986, "referenceCount": 12, "citationCount": 551, "influentialCitationCount": + 30, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1986-11-01", "journal": + {"name": "Adv. Comput. Res.", "pages": "73-90", "volume": "5"}, "authors": + [{"authorId": "1706681", "name": "S. Goldwasser"}, {"authorId": "2367457", + "name": "M. Sipser"}]}, {"paperId": "b0161e12fb54b1ff658620cf5d2c96ca6c442365", "externalIds": {"MAG": "2061829345", "DOI": "10.1146/ANNUREV.NE.12.030189.002423", - "CorpusId": 32864957, "PubMed": "2648958"}, "url": "https://www.semanticscholar.org/paper/b0161e12fb54b1ff658620cf5d2c96ca6c442365", + "CorpusId": 32864957, "PubMed": "2648958"}, "corpusId": 32864957, "publicationVenue": + {"id": "d9caa671-3be6-48bc-9710-f96334848b4c", "name": "Annual Review of Neuroscience", + "type": "journal", "alternate_names": ["Annu Rev Neurosci"], "issn": "0147-006X", + "url": "https://www.annualreviews.org/journal/neuro", "alternate_urls": ["http://arjournals.annualreviews.org/loi/neuro", + "https://www.annualreviews.org/loi/neuro"]}, "url": "https://www.semanticscholar.org/paper/b0161e12fb54b1ff658620cf5d2c96ca6c442365", "title": "Extracellular matrix molecules that influence neural development.", "abstract": "As developing neurons migrate, extend axons, and form synapses, much of their behavior is specific-that is, stereotypes and predictable. It @@ -50346,322 +57365,174 @@ interactions: Burgeson (1987), Martin & Timpl (1987), Ruoslahti ( 1 988), Ruoslahti & Piersbacher (1987), and", "venue": "Annual Review of Neuroscience", "year": 1989, "referenceCount": 4, "citationCount": 570, "influentialCitationCount": 13, "isOpenAccess": false, - "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", - "JournalArticle"], "publicationDate": null, "journal": {"name": "Annual review - of neuroscience", "pages": "\n 491-516\n ", "volume": "12"}, - "authors": [{"authorId": "90286693", "name": "J. Sanes"}]}, {"paperId": "ff1afd02c56ae4b78597d1cfd6e21d41102b1ec7", - "externalIds": {"MAG": "2883606180", "DBLP": "journals/ijbc/HanW18", "DOI": - "10.1142/S0218127418300215", "CorpusId": 53288912}, "url": "https://www.semanticscholar.org/paper/ff1afd02c56ae4b78597d1cfd6e21d41102b1ec7", - "title": "Turing Patterns of a Lotka-Volterra Competitive System with Nonlocal - Delay", "abstract": "This paper focuses on the dynamical behavior of a Lotka\u2013Volterra - competitive system with nonlocal delay. We first establish the conditions - of Turing bifurcation occurring in the system. According to it and by using - multiple scale method, the amplitude equations of the different Turing patterns - are obtained. Then, we observe when these patterns (spots pattern and stripes - pattern) arise in the Lotka\u2013Volterra competitive system. Finally, some - numerical simulations are given to verify our theoretical analysis.", "venue": - "Int. J. Bifurc. Chaos", "year": 2018, "referenceCount": 46, "citationCount": - 14, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2018-06-30", "journal": {"name": "Int. - J. Bifurc. Chaos", "pages": "1830021:1-1830021:25", "volume": "28"}, "authors": - [{"authorId": "144334629", "name": "B. Han"}, {"authorId": "2108248403", "name": - "Zhi-Cheng Wang"}]}, {"paperId": "b16d6ffbe496fabc59e414ce8bd795c1b5ba41a6", - "externalIds": {"MAG": "2004383369", "ArXiv": "0903.4254", "DBLP": "journals/amc/AlyKS11", - "DOI": "10.1016/j.amc.2011.02.018", "CorpusId": 14273709}, "url": "https://www.semanticscholar.org/paper/b16d6ffbe496fabc59e414ce8bd795c1b5ba41a6", - "title": "Turing instability for a ratio-dependent predator-prey model with - diffusion", "abstract": null, "venue": "Applied Mathematics and Computation", - "year": 2009, "referenceCount": 26, "citationCount": 52, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Biology", "Computer - Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, - {"category": "Biology", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-03-25", "journal": - {"name": "Appl. Math. Comput.", "pages": "7265-7281", "volume": "217"}, "authors": - [{"authorId": "34858134", "name": "Shaban Aly"}, {"authorId": "2751086", "name": - "I. Kim"}, {"authorId": "143653345", "name": "D. Sheen"}]}, {"paperId": "93f16b065f89c354c7ae79bd195d39605f64a2ad", - "externalIds": {"DBLP": "journals/jsyml/Lerman70", "MAG": "2085705456", "DOI": - "10.1017/S0022481200092197", "CorpusId": 26239309}, "url": "https://www.semanticscholar.org/paper/93f16b065f89c354c7ae79bd195d39605f64a2ad", - "title": "Turing degrees and many-one degrees of maximal sets", "abstract": - "Martin [4, Theorems 1 and 2] proved that a Turing degree a is the degree - of a maximal set if, and only if, a\u2032 = 0\u2033. Lachlan has shown that - maximal sets have minimal many-one degrees [2, \u00a71] and that every nonrecursive - r.e. Turing degree contains a minimal many-one degree [2, Theorem 4]. Our - aim here is to show that any r.e. Turing degree a of a maximal set contains - an infinite number of maximal sets whose many-one degrees are pairwise incomparable; - hence such Turing degrees contain an infinite number of distinct minimal many-one - degrees. This theorem has been proved by Yates [6, Theorem 5] in the case - when a = 0\u2032. The need for this theorem first came to our attention as - a result of work done by the author [3, Theorem 2.3]. There we looked at the - structure / obtained from the recursive functions of one variable under the - equivalence relation f ~ g if, and only if, f(x) = g(x) a.e., that is, for - all but finitely many x \u2208 , where M is a maximal set, and M is its complement. - We showed that /1 \u2261 /2 if, and only if, 1 =m2, i.e., 1. and 2 have the - same many-one degree. However, it might be possible that some Turing degree - of a maximal set contains exactly one many-one degree of a maximal set. Theorem - 1 was proved to show that this was not the case, and hence that the theory - of / is not an invariant of Turing degree.", "venue": "Journal of Symbolic - Logic (JSL)", "year": 1970, "referenceCount": 11, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "openAccessPdf": null, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": null, "journal": {"name": + "Annual review of neuroscience", "pages": "\n 491-516\n ", + "volume": "12"}, "authors": [{"authorId": "90286693", "name": "J. Sanes"}]}, + {"paperId": "38852b6d2321343fc4f088aec83d539c09e39296", "externalIds": {"DBLP": + "journals/logcom/Pereira12", "MAG": "1964161049", "DOI": "10.1093/logcom/exs035", + "CorpusId": 40841052}, "corpusId": 40841052, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/38852b6d2321343fc4f088aec83d539c09e39296", + "title": "Turing is among us", "abstract": "Turing''s present-day and all-time + relevance arises from the timelessness of the issues he tackled, and the innovative + light he shed upon them. Turing first defined the algorithmic limits of computability, + when determined via effective mechanism, and showed the generality of his + definition by proving its equivalence to other general, but less algorithmic, + non-mechanical, more abstract formulations of computability. In truth, his + originality much impressed Godel, for the simplicity of the mechanism invoked\u2014what + we nowadays call a Turing Machine (or program)\u2014and for the proof of existence + of a Universal Turing Machine (what we call digital computer)\u2014which can + demonstrably mimic any other Turing Machine, i.e. execute any program. Indeed, + Turing Machines simply rely on having a finite-state automaton (like a vending + machine), and an unbound paper tape made of discrete squares (like a paper + roll), with at most one rewritable symbol on each square. Turing also first + implicitly introduced the perspective of \u2018functionalism''\u2014though + he did not use the word, it was introduced later by Putnam, inspired by Turing''s + work\u2014by showing that what counts is the realizability of functions, independently + of the hardware that embodies them. And that realizability is afforded by + the very simplicity of his devised mechanism, what he then called A-machines + (but now bear his name), which rely solely on the manipulation of symbols\u2014as + discrete as the fingers of one hand\u2014wherein both data and instructions + are represented with symbols, both being subject to manipulation. The twain, + data as well as instructions, are stored in memory, where instructions double + as data and as rules for acting\u2014the stored program idea. No one to this + day has invented a computational mechanical process with such general properties, + which cannot be theoretically approximated with arbitrary precision by some + Turing Machine, wherein interactions are to be captured by Turing''s innovative + concept of oracle. In these days of discrete-time quantization, computational + biological processes, and proof of ever expanding universe\u2014the automata + and the tape\u2014the Turing Machine reigns supreme. Moreover, universal functionalism\u2014another + Turing essence\u2014is what enables the inevitable bringing together of the + ghosts in the several embodied machines (silicon-based, biological, extra-terrestrial + or otherwise) to promote their symbiotic epistemic co-evolution, since they + partake of the same theoretic functionalism. Turing is truly and forever among + us.", "venue": "J. Log. Comput.", "year": 2012, "referenceCount": 53, "citationCount": + 9, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1970-03-01", "journal": {"name": "Journal of Symbolic Logic", "pages": "29 - - 40", "volume": "35"}, "authors": [{"authorId": "34564845", "name": "M. Lerman"}]}, - {"paperId": "aba09b2f13dd8b4c27622c64ca0a8e46a4ac450b", "externalIds": {"MAG": - "2076720753", "DBLP": "journals/synthese/King96", "DOI": "10.1007/BF00413695", - "CorpusId": 44077855}, "url": "https://www.semanticscholar.org/paper/aba09b2f13dd8b4c27622c64ca0a8e46a4ac450b", - "title": "Is the human mind a Turing machine?", "abstract": null, "venue": - "Synthese", "year": 1996, "referenceCount": 19, "citationCount": 10, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "2012-12-01", "journal": {"name": "J. Log. Comput.", "pages": "1257-1277", + "volume": "22"}, "authors": [{"authorId": "1747400", "name": "L. Pereira"}]}, + {"paperId": "2d30aa623fd96da99a16c0c3bde73f50c92a5c42", "externalIds": {"DBLP": + "conf/naacl/GaleC90", "ACL": "H90-1056", "MAG": "2029768569", "DOI": "10.3115/116580.116672", + "CorpusId": 10164826}, "corpusId": 10164826, "publicationVenue": {"id": "f8e3f8d0-0f40-48c0-b3c0-0c540237b859", + "name": "Human Language Technology - The Baltic Perspectiv", "type": "conference", + "alternate_names": ["Human Language Technology", "HLT", "Hum Lang Technol", + "Hum Lang Technol Balt Perspect"]}, "url": "https://www.semanticscholar.org/paper/2d30aa623fd96da99a16c0c3bde73f50c92a5c42", + "title": "Poor Estimates of Context are Worse than None", "abstract": "It + is difficult to estimate the probability of a word''s context because of sparse + data problems. If appropriate care is taken, we find that it is possible to + make useful estimates of contextual probabilities that improve performance + in a spelling correction application. In contrast, less careful estimates + are found to be useless. Specifically, we will show that the Good-Turing method + makes the use of contextual information practical for a spelling corrector, + while attempts to use the maximum likelihood estimator (MLE) or expected likelihood + estimator (ELE) fail. Spelling correction was selected as an application domain + because it is analogous to many important recognition applications based on + a noisy channel model (such as speech recognition), though somewhat simpler + and therefore possibly more amenable to detailed statistical analysis.", "venue": + "Human Language Technology - The Baltic Perspectiv", "year": 1990, "referenceCount": + 9, "citationCount": 86, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1990-06-24", "journal": {"name": "", "pages": "283-287", + "volume": ""}, "authors": [{"authorId": "34938639", "name": "W. Gale"}, {"authorId": + "2244184", "name": "Kenneth Ward Church"}]}, {"paperId": "f390197c9283bd58fa04d5a9b2e54923c20b8d77", + "externalIds": {"MAG": "2137993073", "DOI": "10.1002/POLA.24269", "CorpusId": + 55094496}, "corpusId": 55094496, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f390197c9283bd58fa04d5a9b2e54923c20b8d77", + "title": "Synthesis, Photoluminescence, and Electrochromism of Polyamides + Containing (3,6-Di-tert-butylcarbazol-9-yl)triphenylamine Units", "abstract": + "A new carbazole-derived, triphenylamine (TPA)- containing aromatic dicarboxylic + acid monomer, 4,4 0 -dicar- boxy-4 00 -(3,6-di-tert-butylcarbazol-9-yl)TPA, + was synthesized, and it led to a series of electroactive aromatic polyamides + with main-chain TPA and pendent 3,6-bis(tert-butyl)carbazole units by reacting + it with various aromatic diamines via the phosphorylation polyamidation technique. + The polyamides were amorphous with good solubility in many organic sol- vents + and could be solution-cast into flexible and strong films. They showed high + glass-transition temperatures (282- 335 \ufffd C) and high thermal stability + (10% weight loss tempera- tures >480 \ufffd C). The electroactive polymer + films had", "venue": "", "year": 2010, "referenceCount": 88, "citationCount": + 50, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", + "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}, + {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2010-11-01", "journal": {"name": "Journal of Polymer + Science Part A", "pages": "4775-4789", "volume": "48"}, "authors": [{"authorId": + "2113218969", "name": "Hui-min Wang"}, {"authorId": "143781377", "name": "S. + Hsiao"}, {"authorId": "5281809", "name": "Guey\u2010Sheng Liou"}, {"authorId": + "94567370", "name": "C. Sun"}]}, {"paperId": "cd605531ad470b5b36e4ece8a1dbef4f6160c83c", + "externalIds": {"MAG": "2155957407", "DOI": "10.2307/2074297", "CorpusId": + 145362274}, "corpusId": 145362274, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cd605531ad470b5b36e4ece8a1dbef4f6160c83c", + "title": "Oil in Troubled Waters: Perceptions, Politics, and the Battle Over + Offshore Drilling", "abstract": "\"This book is extremely well written, so + that it reads SUNY Press like an interesting story, even as it chronicles + the inc/o CUP Services termingling of a complex set of cultural, historical, + poPO Box 6525 litical, economic, and technological factors. It is an Ithaca, + NY 14851 , / . . ~~~~~~~~~~~~~1-800-666-2211 excellent sociological analysis + which challenges the Domestic and Canada reader''s taken-for-granted assumptions + about the naadd $3 for first copy ture of offshore drilling and carefully + documents the $.50 each additional. reasons behind the different perceptions + and experiNY State residents, add ences of California and Louisiana residents. + The cur8% sales tax. Canada, rent status of offshore drilling is meaningfully + framed add GST. VISA, by a cultural history of the political economy of the + MasterCard, American two states.\" Jean Blocker, University of Tulsa Express, + Discover 179 pages * $16.95 paperback * ISBN 0-7914-1882-0 accepted.", "venue": + "", "year": 1994, "referenceCount": 0, "citationCount": 87, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Political + Science"], "s2FieldsOfStudy": [{"category": "Political Science", "source": + "external"}, {"category": "History", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1994-04-21", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "1971993", "name": "W. Freudenburg"}, {"authorId": + "108429899", "name": "R. Gramling"}]}, {"paperId": "5221f7d99676aad66bfb22f4ec3dc99e4ffaded3", + "externalIds": {"DBLP": "journals/siamcomp/KoS85", "MAG": "1999609654", "DOI": + "10.1137/0214003", "CorpusId": 44916702}, "corpusId": 44916702, "publicationVenue": + {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", "name": "SIAM journal on computing + (Print)", "type": "journal", "alternate_names": ["SIAM J Comput", "SIAM Journal + on Computing", "SIAM j comput (print"], "issn": "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", + "alternate_urls": ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/5221f7d99676aad66bfb22f4ec3dc99e4ffaded3", + "title": "On Circuit-Size Complexity and the Low Hierarchy in NP", "abstract": + "Let A be a set having polynomial size circuits. If A is also known to be + in NP, then we may conclude that the graph of the polynomial size circuits + for A is actually in $\\Pi _2^p $. Using this observation, we show that sets + in NP which have polynomial size ciruits are in $L_3^p $, the third level + of the low hierarchy in NP. By a similar technique, we are able to show that + some other intuitively low sets in NP are in $L_2^p $, and even in a certain + refinement of $L_2^p $. As a consequence, sparse sets are not strong nondeterministic + polynomial time Turing complete in NP unless the polynomial time hierarchy + collapses to $\\Delta _2^p $.", "venue": "SIAM journal on computing (Print)", + "year": 1985, "referenceCount": 0, "citationCount": 88, "influentialCitationCount": + 4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1996-09-01", "journal": {"name": "Synthese", "pages": "379-389", "volume": - "108"}, "authors": [{"authorId": "2065227492", "name": "D. King"}]}, {"paperId": - "f4115303ab214d9e988878bf8fa579a1999fb04a", "externalIds": {"DBLP": "journals/corr/Greer14j", - "MAG": "106547350", "ArXiv": "1403.2541", "DOI": "10.1007/978-3-642-29694-9_3", - "CorpusId": 16785010}, "url": "https://www.semanticscholar.org/paper/f4115303ab214d9e988878bf8fa579a1999fb04a", - "title": "Turing: Then, Now and Still Key", "abstract": null, "venue": "Artificial - Intelligence, Evolutionary Computing and Metaheuristics", "year": 2014, "referenceCount": - 36, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2014-03-11", "journal": {"pages": "43-62"}, "authors": [{"authorId": "2243207", - "name": "Kieran R. C. Greer"}]}, {"paperId": "98fe98af61d56f04bfd8911d33435b3b806aed46", - "externalIds": {"DBLP": "conf/aaaiss/BaileyHLLM15", "MAG": "2291406294", "CorpusId": - 7070742}, "url": "https://www.semanticscholar.org/paper/98fe98af61d56f04bfd8911d33435b3b806aed46", - "title": "The Winograd Schema Challenge and Reasoning about Correlation", - "abstract": "The Winograd Schema Challenge is an alternative to the Turing - Test that may provide a more meaningful measure of machine intelligence. It - poses a set of coreference resolution problems that cannot be solved without - human-like reasoning. In this paper, we take the view that the solution to - such problems lies in establishing discourse coherence. Specifically, we examine - two types of rhetorical relations that can be used to establish discourse - coherence: positive and negative correlation. We introduce a framework for - reasoning about correlation between sentences, and show how this framework - can be used to justify solutions to some Winograd Schema problems.", "venue": - "AAAI Spring Symposia", "year": 2015, "referenceCount": 20, "citationCount": - 50, "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "2057422104", "name": - "Daniel Bailey"}, {"authorId": "3156271", "name": "Amelia Harrison"}, {"authorId": - "1746354", "name": "Y. Lierler"}, {"authorId": "2134090", "name": "V. Lifschitz"}, - {"authorId": "38614754", "name": "Julian Michael"}]}, {"paperId": "8141cafe9fe577033e27797cb87802df0d9ddb51", - "externalIds": {"MAG": "1573885973", "DBLP": "journals/mima/Israel02", "DOI": - "10.1023/A:1015634729532", "CorpusId": 30434413}, "url": "https://www.semanticscholar.org/paper/8141cafe9fe577033e27797cb87802df0d9ddb51", - "title": "Reflections on G\u00f6del''s and Gandy''s Reflections on Turing''s - Thesis", "abstract": null, "venue": "Minds and Machines", "year": 2002, "referenceCount": - 23, "citationCount": 14, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2002-05-01", "journal": - {"name": "Minds and Machines", "pages": "181-201", "volume": "12"}, "authors": - [{"authorId": "26701145", "name": "David J. Israel"}]}, {"paperId": "98fd05ec51e2178b3515ee212466b7047ddccf15", - "externalIds": {"MAG": "81189784", "CorpusId": 116428394}, "url": "https://www.semanticscholar.org/paper/98fd05ec51e2178b3515ee212466b7047ddccf15", - "title": "Counting classes with finite acceptance types", "abstract": "Perfectionnement - de la hierarchie de Hausdorff generee par NP. Les nouvelles classes permettent - une exacte classification de la complexite de certains problemes de denombrement. - Les classes sont caracterisees en termes de machines de Turing polynomiales - non deterministes", "venue": "", "year": 1987, "referenceCount": 0, "citationCount": - 22, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}], "publicationTypes": null, "publicationDate": "1987-08-01", "journal": - {"name": "Computing and Informatics \\/ Computers and Artificial Intelligence", - "pages": "395-409", "volume": "6"}, "authors": [{"authorId": "3176131", "name": - "T. Gundermann"}, {"authorId": "1789007", "name": "G. Wechsung"}]}, {"paperId": - "e06fda9666fcb7ee1c27651d38b7839bc5e005b6", "externalIds": {"MAG": "2577351778", - "CorpusId": 2717911}, "url": "https://www.semanticscholar.org/paper/e06fda9666fcb7ee1c27651d38b7839bc5e005b6", - "title": "Abstract geometrical computation for Black hole computation (extended - abstract)", "abstract": "The Black hole model of computation provides super-Turing - computing power since it offers the possibility to decide in finite (ob- server''s) - time any recursively enumerable (R.E.) problem. In this paper, we provide - a geometric model of computation, conservative abstract geo- metrical computation, - that, although being based on rational numbers, has the same property: it - can simulate any Turing machine and can de- cide any R.E. problem through - the creation of an accumulation. Finitely many signals can leave any accumulation, - and it can be known whether anything leaves. This corresponds to a black hole - effect.", "venue": "", "year": 2004, "referenceCount": 21, "citationCount": - 18, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", + "1985-02-01", "journal": {"name": "SIAM J. Comput.", "pages": "41-51", "volume": + "14"}, "authors": [{"authorId": "1704334", "name": "K. Ko"}, {"authorId": + "1737337", "name": "U. Sch\u00f6ning"}]}, {"paperId": "887ef8b338eb6f048bac3ecff8d250a363d3bf9b", + "externalIds": {"MAG": "2581525718", "DOI": "10.1016/j.physbeh.2017.01.034", + "CorpusId": 30338276, "PubMed": "28137425"}, "corpusId": 30338276, "publicationVenue": + {"id": "9b934f24-d8b8-4c42-9956-3acd8a007e8b", "name": "Physiology and Behavior", + "type": "journal", "alternate_names": ["Physiology & Behavior", "Physiol Behav", + "Physiol Behav"], "issn": "0031-9384", "url": "http://www.elsevier.com/locate/physbeh", + "alternate_urls": ["http://www.elsevier.com/wps/find/journaldescription.cws_home/525487/description#description", + "http://www.sciencedirect.com/science/journal/00319384", "https://www.journals.elsevier.com/physiology-and-behavior/", + "http://www.journals.elsevier.com/physiology-and-behavior/"]}, "url": "https://www.semanticscholar.org/paper/887ef8b338eb6f048bac3ecff8d250a363d3bf9b", + "title": "Cognitive evaluation for the diagnosis of Alzheimer''s disease based + on Turing Test and Virtual Environments", "abstract": null, "venue": "Physiology + and Behavior", "year": 2017, "referenceCount": 44, "citationCount": 50, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://eprints.kingston.ac.uk/id/eprint/37455/1/Argyriou-V-37455-AAM.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Psychology"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Psychology", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "176-187", "volume": ""}, "authors": [{"authorId": "1387881959", - "name": "J. Durand-Lose"}]}, {"paperId": "1df603fe258c85cf61aefe0c053c5836b6ce3f77", - "externalIds": {"MAG": "2530077886", "DBLP": "journals/mscs/Bazhenov18", "DOI": - "10.1017/S096012951600030X", "CorpusId": 3742308}, "url": "https://www.semanticscholar.org/paper/1df603fe258c85cf61aefe0c053c5836b6ce3f77", - "title": "Autostability spectra for decidable structures", "abstract": "We - study autostability spectra relative to strong constructivizations (SC-autostability - spectra). For a decidable structure $\\mathcal{S}$ , the SC-autostability - spectrum of $\\mathcal{S}$ is the set of all Turing degrees capable of computing - isomorphisms among arbitrary decidable copies of $\\mathcal{S}$ . The degree - of SC-autostability for $\\mathcal{S}$ is the least degree in the spectrum - (if such a degree exists). We prove that for a computable successor ordinal - \u03b1, every Turing degree c.e. in and above 0 (\u03b1) is the degree of - SC-autostability for some decidable structure. We show that for an infinite - computable ordinal \u03b2, every Turing degree c.e. in and above 0 (2\u03b2+1) - is the degree of SC-autostability for some discrete linear order. We prove - that the set of all PA-degrees is an SC-autostability spectrum. We also obtain - similar results for autostability spectra relative to n-constructivizations.", - "venue": "Mathematical Structures in Computer Science", "year": 2016, "referenceCount": - 48, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2016-10-14", "journal": {"name": "Mathematical - Structures in Computer Science", "pages": "392 - 411", "volume": "28"}, "authors": - [{"authorId": "144737615", "name": "N. Bazhenov"}]}, {"paperId": "0ac3d2b14c6b4462c7d2bb365b0ad20a6af74d3e", - "externalIds": {"DBLP": "journals/jacm/FortnowLMV05", "MAG": "2075449032", - "DOI": "10.1145/1101821.1101822", "CorpusId": 132926}, "url": "https://www.semanticscholar.org/paper/0ac3d2b14c6b4462c7d2bb365b0ad20a6af74d3e", - "title": "Time-space lower bounds for satisfiability", "abstract": "We establish - the first polynomial time-space lower bounds for satisfiability on general - models of computation. We show that for any constant c less than the - golden ratio there exists a positive constant d such that no deterministic - random-access Turing machine can solve satisfiability in time nc - and space nd, where d approaches 1 when c - does. On conondeterministic instead of deterministic machines, we prove the - same for any constant c less than &2radic;.Our lower bounds apply to - nondeterministic linear time and almost all natural NP-complete problems known. - In fact, they even apply to the class of languages that can be solved on a - nondeterministic machine in linear time and space n1/c.Our - proofs follow the paradigm of indirect diagonalization. We also use that paradigm - to prove time-space lower bounds for languages higher up in the polynomial-time - hierarchy.", "venue": "JACM", "year": 2005, "referenceCount": 37, "citationCount": - 90, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2005-11-01", "journal": {"name": "J. - ACM", "pages": "835-865", "volume": "52"}, "authors": [{"authorId": "1691447", - "name": "L. Fortnow"}, {"authorId": "1728571", "name": "R. Lipton"}, {"authorId": - "1717488", "name": "D. Melkebeek"}, {"authorId": "2314789", "name": "Anastasios - Viglas"}]}, {"paperId": "74d731cf814140899bbf8d572993bdd5a69e81a0", "externalIds": - {"PubMedCentral": "5376694", "MAG": "2596792601", "DOI": "10.1186/s13036-017-0055-6", - "CorpusId": 15030361, "PubMed": "28392831"}, "url": "https://www.semanticscholar.org/paper/74d731cf814140899bbf8d572993bdd5a69e81a0", - "title": "Directing three-dimensional multicellular morphogenesis by self-organization - of vascular mesenchymal cells in hyaluronic acid hydrogels", "abstract": null, - "venue": "Journal of Biological Engineering", "year": 2017, "referenceCount": - 70, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2017-04-03", "journal": {"name": "Journal of Biological - Engineering", "volume": "11"}, "authors": [{"authorId": "46875475", "name": - "Xiaolu Zhu"}, {"authorId": "8619304", "name": "Shiva Gojgini"}, {"authorId": - "2226240", "name": "Ting-Hsuan Chen"}, {"authorId": "2060047627", "name": - "Peng Fei"}, {"authorId": "2113492430", "name": "Siyan Dong"}, {"authorId": - "48131405", "name": "Chih-Ming Ho"}, {"authorId": "5731120", "name": "T. Segura"}]}, - {"paperId": "0da7e2a1e6566528587e1a6c20baa4984091fdbf", "externalIds": {"MAG": - "2171724790", "DOI": "10.1111/J.1468-5914.1986.TB00073.X", "CorpusId": 146663727}, - "url": "https://www.semanticscholar.org/paper/0da7e2a1e6566528587e1a6c20baa4984091fdbf", - "title": "Reflections on the Turing Test", "abstract": null, "venue": "", - "year": 1986, "referenceCount": 0, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": "1986-07-01", "journal": {"name": "Journal for The - Theory of Social Behaviour", "pages": "161-172", "volume": "16"}, "authors": - [{"authorId": "114381027", "name": "Charles H. Karelis"}]}, {"paperId": "635a4f67089f28f87892bd312e4937c6f27367c5", - "externalIds": {"MAG": "2024688316", "DOI": "10.1111/j.1365-2869.1995.tb00232.x", - "CorpusId": 13297354, "PubMed": "10607217"}, "url": "https://www.semanticscholar.org/paper/635a4f67089f28f87892bd312e4937c6f27367c5", - "title": "Melatonin and adjustment to phase shift", "abstract": "SUMMARY\u2002 - The pineal hormone melatonin has clear circadian phase\u2010shifting effects - in humans which have recently been formalized as a phase response curve. Its - potential use in circadian rhythm disorders has been investigated in field - studies of jet lag and shift work and in simulated phase shift. A substantial - amount of information indicates that in the majority of subjects it hastens - adaptation of both subjective and objective measures to forced shifts in time - cues with few reported side\u2010effects. Field studies of its use in adaptation - to shift work are sparse and preliminary but the first indications are positive. - In some blind subjects with sleep disturbance it can stabilize sleep onset - time without necessarily entraining all circadian rhythms and it can advance - sleep timing in delayed sleep\u2010phase insomnia. Acute suppression of core - body tempera\u2010ture may be an integral part of the phase\u2010shifting - mechanism.", "venue": "Journal of Sleep Research", "year": 1995, "referenceCount": - 40, "citationCount": 87, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Psychology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Psychology", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1995-12-01", "journal": {"name": "Journal - of Sleep Research", "volume": "4"}, "authors": [{"authorId": "143783546", - "name": "J. Arendt"}, {"authorId": "37568522", "name": "S. Deacon"}, {"authorId": - "145402503", "name": "J. English"}, {"authorId": "38088254", "name": "S. Hampton"}, - {"authorId": "40273830", "name": "L. Morgan"}]}, {"paperId": "3a1217eab8ddcf4a4370288dbe4216fbb1596efe", - "externalIds": {"MAG": "2319644200", "DOI": "10.2307/1445129", "CorpusId": - 87540341}, "url": "https://www.semanticscholar.org/paper/3a1217eab8ddcf4a4370288dbe4216fbb1596efe", - "title": "Vanishing Fishes of North America", "abstract": "ture (often a photograph - of variable qualityI would prefer to see, where possible, photographs of Pennsylvania - fishes rather than those from other sites), distribution, behavior, food, - value and a distribution map (literature records are distinguished from those - identified by Dr. Cooper-this often separates old from recent collections). - The maps have only major stream divides to successfully emphasize stream system - occurrence, at the expense of demonstrating large stream/small stream variation. - The 21 fishes of possible occurrence includes seven introductions where the - success of the", "venue": "", "year": 1983, "referenceCount": 0, "citationCount": - 52, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", "source": "external"}, - {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1983-09-01", "journal": {"name": "", "volume": ""}, - "authors": [{"authorId": "87153532", "name": "R. Ono"}, {"authorId": "2111787592", - "name": "James Williams"}, {"authorId": "31423546", "name": "Anne E Wagner"}]}, - {"paperId": "06777d6d5aea8c38041905a962bc47930f411a24", "externalIds": {"DBLP": - "journals/jcss/BookGIW70", "MAG": "2053730920", "DOI": "10.1016/S0022-0000(70)80032-0", - "CorpusId": 205894820}, "url": "https://www.semanticscholar.org/paper/06777d6d5aea8c38041905a962bc47930f411a24", - "title": "Tape-Bounded Turing Acceptors and Principal AFLs", "abstract": null, - "venue": "J. Comput. Syst. Sci.", "year": 1970, "referenceCount": 3, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1970-12-01", "journal": {"name": "J. - Comput. Syst. Sci.", "pages": "622-625", "volume": "4"}, "authors": [{"authorId": - "1699267", "name": "R. V. Book"}, {"authorId": "2408866", "name": "S. Greibach"}, - {"authorId": "1712312", "name": "O. Ibarra"}, {"authorId": "3290722", "name": - "B. Wegbreit"}]}, {"paperId": "b0e6bf7a7f508e4e1fcc84a27722f306c9449008", - "externalIds": {"DBLP": "journals/corr/MansinghkaSP14", "MAG": "1844453107", - "ArXiv": "1404.0099", "CorpusId": 15636079}, "url": "https://www.semanticscholar.org/paper/b0e6bf7a7f508e4e1fcc84a27722f306c9449008", - "title": "Venture: a higher-order probabilistic programming platform with - programmable inference", "abstract": "We describe Venture, an interactive - virtual machine for probabilistic programming that aims to be sufficiently - expressive, extensible, and efficient for general-purpose use. Like Church, - probabilistic models and inference problems in Venture are specified via a - Turing-complete, higher-order probabilistic language descended from Lisp. - Unlike Church, Venture also provides a compositional language for custom inference - strategies built out of scalable exact and approximate techniques. We also - describe four key aspects of Venture''s implementation that build on ideas - from probabilistic graphical models. First, we describe the stochastic procedure - interface (SPI) that specifies and encapsulates primitive random variables. - The SPI supports custom control flow, higher-order probabilistic procedures, - partially exchangeable sequences and ``likelihood-free'''' stochastic simulators. - It also supports external models that do inference over latent variables hidden - from Venture. Second, we describe probabilistic execution traces (PETs), which - represent execution histories of Venture programs. PETs capture conditional - dependencies, existential dependencies and exchangeable coupling. Third, we - describe partitions of execution histories called scaffolds that factor global - inference problems into coherent sub-problems. Finally, we describe a family - of stochastic regeneration algorithms for efficiently modifying PET fragments - contained within scaffolds. Stochastic regeneration linear runtime scaling - in cases where many previous approaches scaled quadratically. We show how - to use stochastic regeneration and the SPI to implement general-purpose inference - strategies such as Metropolis-Hastings, Gibbs sampling, and blocked proposals - based on particle Markov chain Monte Carlo and mean-field variational inference - techniques.", "venue": "ArXiv", "year": 2014, "referenceCount": 76, "citationCount": - 226, "influentialCitationCount": 22, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-03-31", "journal": {"name": "ArXiv", - "volume": "abs/1404.0099"}, "authors": [{"authorId": "1735083", "name": "Vikash - K. Mansinghka"}, {"authorId": "2196579", "name": "Daniel Selsam"}, {"authorId": - "2851128", "name": "Yura N. Perov"}]}, {"paperId": "048b74b825742b5795cabf5051a3d0c402369924", + "publicationTypes": ["JournalArticle"], "publicationDate": "2017-05-01", "journal": + {"name": "Physiology & Behavior", "pages": "42-51", "volume": "173"}, "authors": + [{"authorId": "145408274", "name": "J. M. F. Montenegro"}, {"authorId": "1689047", + "name": "V. Argyriou"}]}, {"paperId": "048b74b825742b5795cabf5051a3d0c402369924", "externalIds": {"MAG": "2288739516", "DOI": "10.15779/Z38G44HQ7H", "CorpusId": - 56012819}, "url": "https://www.semanticscholar.org/paper/048b74b825742b5795cabf5051a3d0c402369924", + 56012819}, "corpusId": 56012819, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/048b74b825742b5795cabf5051a3d0c402369924", "title": "Using Antitrust Law to Challenge Turing''s Daraprim Price Increase", "abstract": "As CEO of Turing Pharmaceuticals, Martin Shkreli made worldwide headlines by obtaining marketing rights to pyrimethamine (Daraprim) and quickly @@ -50687,121 +57558,159 @@ interactions: General are currently conducting antitrust investigations of this behavior, this Essay offers a framework for analysis.", "venue": "", "year": 2016, "referenceCount": 22, "citationCount": 10, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2016-01-29", "journal": {"name": - "Intellectual Property: Patent Law eJournal"}, "authors": [{"authorId": "34349631", - "name": "Michael A. Carrier"}, {"authorId": "12822006", "name": "Nicole L. - Levidow"}, {"authorId": "5031592", "name": "A. Kesselheim"}]}, {"paperId": - "2e42561696c0faafb5007165678a7d550e138e39", "externalIds": {"ArXiv": "0907.0456", - "MAG": "2070726868", "DOI": "10.1103/PhysRevE.81.026213", "CorpusId": 15541431, - "PubMed": "20365644"}, "url": "https://www.semanticscholar.org/paper/2e42561696c0faafb5007165678a7d550e138e39", - "title": "Forced patterns near a Turing-Hopf bifurcation.", "abstract": "We - study time-periodic forcing of spatially extended patterns near a Turing-Hopf - bifurcation point. A symmetry-based normal form analysis yields several predictions, - including that (i) weak forcing near the intrinsic Hopf frequency enhances - or suppresses the Turing amplitude by an amount that scales quadratically - with the forcing strength, and (ii) the strongest effect is seen for forcing - that is detuned from the Hopf frequency. To apply our results to specific - models, we perform a perturbation analysis on general two-component reaction-diffusion - systems, which reveals whether the forcing suppresses or enhances the spatial - pattern. For the suppressing case, our results are consistent with features - of previous experiments on the chlorine dioxide-iodine-malonic acid chemical - reaction. However, we also find examples of the enhancing case, which has - not yet been observed in experiment. Numerical simulations verify the predicted - dependence on the forcing parameters.", "venue": "Physical review. E, Statistical, - nonlinear, and soft matter physics", "year": 2009, "referenceCount": 88, "citationCount": - 13, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Physics", "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Physics", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Environmental Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2009-07-02", "journal": {"name": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "pages": "\n 026213\n ", "volume": - "81 2 Pt 2"}, "authors": [{"authorId": "1949686", "name": "C. Topaz"}, {"authorId": - "1896425", "name": "Anne J. Catll\u00e1"}]}, {"paperId": "648c691fa45cd76149a0e597a97aa5ebdfac4e81", - "externalIds": {"MAG": "2006152057", "DOI": "10.1136/bmj.328.7448.1139-a", - "CorpusId": 62566304}, "url": "https://www.semanticscholar.org/paper/648c691fa45cd76149a0e597a97aa5ebdfac4e81", - "title": "Autism and Creativity: Is there a Link between Autism in Men and - Exceptional Ability?", "abstract": "Michael Fitzgerald\n\nBrunner-Routledge, - \u00a329.99/$47.95\n\npp 304 ISBN 1 58391 213 4\n\nRating:![Graphic][1] ![Graphic][2] - ![Graphic][3] \n\nWe hear a lot about autism these days, usually in connection - with its devastatingly early onset and bleak prognosis. It is therefore of - interest when a recognised authority on the subject claims that most of those - whom he cites as \u201cthe intellectual giants of the twentieth century\u201d - (including Einstein, Freud, Yeats, the philosophers Russell and Wittgenstein, - and the mathematicians Ramanujan and Turing) had high functioning autism or - \u2026\n\n [1]: /embed/inline-graphic-1.gif\n [2]: /embed/inline-graphic-2.gif\n - [3]: /embed/inline-graphic-3.gif", "venue": "BMJ : British Medical Journal", - "year": 2004, "referenceCount": 0, "citationCount": 50, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-05-06", - "journal": {"name": "BMJ : British Medical Journal", "pages": "1139", "volume": - "328"}, "authors": [{"authorId": "6693916", "name": "I. Mcclure"}]}, {"paperId": - "27bdc2a04183ede51dafbb88d588598aa799170b", "externalIds": {"ArXiv": "astro-ph/0209217", - "MAG": "2006027259", "DOI": "10.1051/0004-6361:20021824", "CorpusId": 14146465}, - "url": "https://www.semanticscholar.org/paper/27bdc2a04183ede51dafbb88d588598aa799170b", - "title": "Fine-structure in the nonthermal X-ray emission of SNR RX J1713.7 - 3946 revealed by Chandra", "abstract": "We present morphological and spectroscopic - studies of the northwest rim of the supernova remnant RX J1713.7\u22123946 - based on observations by the Chandra X-ray observatory . We found a complex - network of nonthermal (synchrotron) X-ray filaments, as well as a ''void'' - type struc ture - a dim region of a circular shape - in the northwest rim. - It is remarkable that despite distinct brightness variations , the X-ray spectra - everywhere in this region can be well fitte d with a power-law model with - photon index ranging = 2.1-2.5. We briefly discuss some implications of these - resul ts and argue that the resolved X-ray features in the northwest rim may - challenge the perceptions of the standard diffusive shock-acceleration models - concerning the production, propagation and radiation of relativistic particles - in supernova remnants.", "venue": "", "year": 2002, "referenceCount": 21, - "citationCount": 85, "influentialCitationCount": 16, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2002-09-11", "journal": {"name": - "Astronomy and Astrophysics", "pages": "567-574", "volume": "400"}, "authors": - [{"authorId": "50884740", "name": "Y. Uchiyama"}, {"authorId": "30014957", - "name": "F. Aharonian"}, {"authorId": "145454902", "name": "T. Takahashi"}]}, - {"paperId": "c47f9d2da6da7a44035fa3c3f13447ac924c450c", "externalIds": {"CorpusId": - 5388078}, "url": "https://www.semanticscholar.org/paper/c47f9d2da6da7a44035fa3c3f13447ac924c450c", - "title": "Handwritten essay : Nature of Spirit Universal Turing Machine", - "abstract": "Hackers worldwide agree that unstable communication are an interesting - new topic in the field of signed algorithms, an d physicists concur. After - years of structured research into flipflop gates, we prove the synthesis of - RAID, which embodies the intuitive principles of artificial intelligence. - FERWE T, our new system for event-driven archetypes, is the solution to a - ll of these challenges.", "venue": "", "year": 2011, "referenceCount": 248, - "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2016-01-29", + "journal": {"name": "Intellectual Property: Patent Law eJournal"}, "authors": + [{"authorId": "34349631", "name": "Michael A. Carrier"}, {"authorId": "12822006", + "name": "Nicole L. Levidow"}, {"authorId": "5031592", "name": "A. Kesselheim"}]}, + {"paperId": "00cd2a7b5ffc7a9db84c47e2ae02a20151314115", "externalIds": {"MAG": + "1528027024", "DOI": "10.1007/978-1-4020-6710-5_19", "CorpusId": 60596152}, + "corpusId": 60596152, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/00cd2a7b5ffc7a9db84c47e2ae02a20151314115", + "title": "The Turing Hub as a Standard for Turing Test Interfaces", "abstract": + null, "venue": "", "year": 2009, "referenceCount": 1, "citationCount": 8, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "pages": "319-324", "volume": ""}, "authors": [{"authorId": "120447134", + "name": "Robby G. Garner"}]}, {"paperId": "06777d6d5aea8c38041905a962bc47930f411a24", + "externalIds": {"DBLP": "journals/jcss/BookGIW70", "MAG": "2053730920", "DOI": + "10.1016/S0022-0000(70)80032-0", "CorpusId": 205894820}, "corpusId": 205894820, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/06777d6d5aea8c38041905a962bc47930f411a24", + "title": "Tape-Bounded Turing Acceptors and Principal AFLs", "abstract": null, + "venue": "J. Comput. Syst. Sci.", "year": 1970, "referenceCount": 3, "citationCount": + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1970-12-01", "journal": + {"name": "J. Comput. Syst. Sci.", "pages": "622-625", "volume": "4"}, "authors": + [{"authorId": "1699267", "name": "R. V. Book"}, {"authorId": "2408866", "name": + "S. Greibach"}, {"authorId": "1712312", "name": "O. Ibarra"}, {"authorId": + "3290722", "name": "B. Wegbreit"}]}, {"paperId": "e06fda9666fcb7ee1c27651d38b7839bc5e005b6", + "externalIds": {"MAG": "2577351778", "CorpusId": 2717911}, "corpusId": 2717911, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e06fda9666fcb7ee1c27651d38b7839bc5e005b6", + "title": "Abstract geometrical computation for Black hole computation (extended + abstract)", "abstract": "The Black hole model of computation provides super-Turing + computing power since it offers the possibility to decide in finite (ob- server''s) + time any recursively enumerable (R.E.) problem. In this paper, we provide + a geometric model of computation, conservative abstract geo- metrical computation, + that, although being based on rational numbers, has the same property: it + can simulate any Turing machine and can de- cide any R.E. problem through + the creation of an accumulation. Finitely many signals can leave any accumulation, + and it can be known whether anything leaves. This corresponds to a black hole + effect.", "venue": "", "year": 2004, "referenceCount": 21, "citationCount": + 18, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2094634987", "name": "R. I. P. - A. B. Hackers"}]}, {"paperId": "70f103ce3a02f20132b7631136624211e60a9914", - "externalIds": {"MAG": "1578346482", "DOI": "10.5860/choice.29-5164", "CorpusId": - 117945749}, "url": "https://www.semanticscholar.org/paper/70f103ce3a02f20132b7631136624211e60a9914", - "title": "Computability theory : concepts and applications", "abstract": "Turing - machines turing machines as recognisers universality undecidability alternative - models post''s correspondence problem recursive function theory formal models - of arithmetic Godel''s incompleteness theorem computer science and computability - theory.", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "journal": {"name": "", "pages": "176-187", "volume": ""}, "authors": [{"authorId": + "1387881959", "name": "J. Durand-Lose"}]}, {"paperId": "8141cafe9fe577033e27797cb87802df0d9ddb51", + "externalIds": {"MAG": "1573885973", "DBLP": "journals/mima/Israel02", "DOI": + "10.1023/A:1015634729532", "CorpusId": 30434413}, "corpusId": 30434413, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/8141cafe9fe577033e27797cb87802df0d9ddb51", + "title": "Reflections on G\u00f6del''s and Gandy''s Reflections on Turing''s + Thesis", "abstract": null, "venue": "Minds and Machines", "year": 2002, "referenceCount": + 23, "citationCount": 14, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-05-01", "journal": {"name": "Minds and Machines", "pages": "181-201", + "volume": "12"}, "authors": [{"authorId": "26701145", "name": "David J. Israel"}]}, + {"paperId": "8c70e5566670fa5b6b9e163516ccd630f64763d0", "externalIds": {"MAG": + "1534710488", "DBLP": "conf/birthday/KariKL99", "DOI": "10.1007/978-3-642-60207-8_31", + "CorpusId": 2900044}, "corpusId": 2900044, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8c70e5566670fa5b6b9e163516ccd630f64763d0", + "title": "Reversible Molecular Computation in Ciliates", "abstract": null, + "venue": "Jewels are Forever", "year": 1999, "referenceCount": 28, "citationCount": + 26, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"pages": "353-363"}, "authors": [{"authorId": "144073818", + "name": "L. Kari"}, {"authorId": "1753080", "name": "J. Kari"}, {"authorId": + "1801972", "name": "L. Landweber"}]}, {"paperId": "247c71072a5c6b67c840938bbca49c7b7b3b4d29", + "externalIds": {"MAG": "2020738082", "DBLP": "journals/ijfcs/Dubacq95", "DOI": + "10.1142/S0129054195000202", "CorpusId": 6781354}, "corpusId": 6781354, "publicationVenue": + {"id": "0f60ff8e-f0b7-47a2-9927-2b94f9e44e82", "name": "International Journal + of Foundations of Computer Science", "type": "journal", "alternate_names": + ["Int J Found Comput Sci"], "issn": "0129-0541", "url": "http://www.cs.ucsb.edu/~ijfcs/"}, + "url": "https://www.semanticscholar.org/paper/247c71072a5c6b67c840938bbca49c7b7b3b4d29", + "title": "How to Simulate Turing Machines by Invertible One-Dimensional Cellular + Automata", "abstract": "The issue of testing invertibility of cellular automata + has been often discussed. Constructing invertible automata is very useful + for simulating invertible dynamical systems, based on local rules. The computation + universality of cellular automata has long been positively resolved, and by + showing that any cellular automaton could be simulated by an invertible one + having a superior dimension, Toffoli proved that invertible cellular automaton + of dimension d\u22652 were computation-universal. Morita proved that any invertible + Turing Machine could be simulated by a one-dimensional invertible cellular + automaton, which proved computation-universality of invertible cellular automata. + This article shows how to simulate any Turing Machine by an invertible cellular + automaton with no loss of time and gives, as a corollary, an easier proof + of this result.", "venue": "International Journal of Foundations of Computer + Science", "year": 1995, "referenceCount": 6, "citationCount": 22, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1995-12-01", "journal": {"name": "Int. J. Found. Comput. + Sci.", "pages": "395-402", "volume": "6"}, "authors": [{"authorId": "2118629", + "name": "Jean-Christophe Dubacq"}]}, {"paperId": "b0e6bf7a7f508e4e1fcc84a27722f306c9449008", + "externalIds": {"DBLP": "journals/corr/MansinghkaSP14", "MAG": "1844453107", + "ArXiv": "1404.0099", "CorpusId": 15636079}, "corpusId": 15636079, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b0e6bf7a7f508e4e1fcc84a27722f306c9449008", + "title": "Venture: a higher-order probabilistic programming platform with + programmable inference", "abstract": "We describe Venture, an interactive + virtual machine for probabilistic programming that aims to be sufficiently + expressive, extensible, and efficient for general-purpose use. Like Church, + probabilistic models and inference problems in Venture are specified via a + Turing-complete, higher-order probabilistic language descended from Lisp. + Unlike Church, Venture also provides a compositional language for custom inference + strategies built out of scalable exact and approximate techniques. We also + describe four key aspects of Venture''s implementation that build on ideas + from probabilistic graphical models. First, we describe the stochastic procedure + interface (SPI) that specifies and encapsulates primitive random variables. + The SPI supports custom control flow, higher-order probabilistic procedures, + partially exchangeable sequences and ``likelihood-free'''' stochastic simulators. + It also supports external models that do inference over latent variables hidden + from Venture. Second, we describe probabilistic execution traces (PETs), which + represent execution histories of Venture programs. PETs capture conditional + dependencies, existential dependencies and exchangeable coupling. Third, we + describe partitions of execution histories called scaffolds that factor global + inference problems into coherent sub-problems. Finally, we describe a family + of stochastic regeneration algorithms for efficiently modifying PET fragments + contained within scaffolds. Stochastic regeneration linear runtime scaling + in cases where many previous approaches scaled quadratically. We show how + to use stochastic regeneration and the SPI to implement general-purpose inference + strategies such as Metropolis-Hastings, Gibbs sampling, and blocked proposals + based on particle Markov chain Monte Carlo and mean-field variational inference + techniques.", "venue": "ArXiv", "year": 2014, "referenceCount": 76, "citationCount": + 227, "influentialCitationCount": 22, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2014-03-31", "journal": + {"name": "ArXiv", "volume": "abs/1404.0099"}, "authors": [{"authorId": "1735083", + "name": "Vikash K. Mansinghka"}, {"authorId": "2196579", "name": "Daniel Selsam"}, + {"authorId": "2851128", "name": "Yura N. Perov"}]}, {"paperId": "b70d79e0d694bd79b704a6154065300fc4d0e273", + "externalIds": {"MAG": "37537225", "DOI": "10.1007/978-94-017-1754-0_2", "CorpusId": + 116428802}, "corpusId": 116428802, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b70d79e0d694bd79b704a6154065300fc4d0e273", + "title": "Tableau Methods for Classical Propositional Logic", "abstract": + null, "venue": "", "year": 1999, "referenceCount": 52, "citationCount": 86, + "influentialCitationCount": 8, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "1728757", "name": "P. Dunne"}]}, - {"paperId": "f67731c10f6f8a6d2db44033cfdcaefb768b2326", "externalIds": {"MAG": - "2120611635", "DOI": "10.1007/978-1-4020-8802-5", "CorpusId": 86028390}, "url": - "https://www.semanticscholar.org/paper/f67731c10f6f8a6d2db44033cfdcaefb768b2326", - "title": "Orchid Biology: Reviews and Perspectives, X", "abstract": null, - "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 255, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Agricultural - And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "2264653", "name": "T. Kull"}, {"authorId": "144176311", "name": - "J. Arditti"}, {"authorId": "92051002", "name": "Sek-Man Wong"}]}, {"paperId": - "15d964e65443bc8528f040e18934fda8288051c7", "externalIds": {"DBLP": "conf/drr/ChewB03", - "MAG": "1974008446", "DOI": "10.1117/12.479682", "CorpusId": 12757}, "url": - "https://www.semanticscholar.org/paper/15d964e65443bc8528f040e18934fda8288051c7", + "pages": "45-123", "volume": ""}, "authors": [{"authorId": "1397652413", "name": + "Marcello D''Agostino"}]}, {"paperId": "15d964e65443bc8528f040e18934fda8288051c7", + "externalIds": {"DBLP": "conf/drr/ChewB03", "MAG": "1974008446", "DOI": "10.1117/12.479682", + "CorpusId": 12757}, "corpusId": 12757, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/15d964e65443bc8528f040e18934fda8288051c7", "title": "BaffleText: a Human Interactive Proof", "abstract": "Internet services designed for human use are being abused by programs. We present a defense against such attacks in the form of a CAPTCHA (Completely Automatic Public @@ -50822,221 +57731,37 @@ interactions: independently by Mori and Jitendra, suggest that BaffleText is stronger than two existing CAPTCHAs.", "venue": "IS&T/SPIE Electronic Imaging", "year": 2003, "referenceCount": 19, "citationCount": 224, "influentialCitationCount": - 10, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-01-20", "journal": {"volume": "5010"}, "authors": - [{"authorId": "32987416", "name": "Monica Chew"}, {"authorId": "1723766", - "name": "H. Baird"}]}, {"paperId": "41391a63859b6ff37bdda7d85e8dbc4b2240ca76", - "externalIds": {"MAG": "3006923768", "ArXiv": "2002.12502", "DOI": "10.1038/s41566-021-00800-3", - "CorpusId": 211572862}, "url": "https://www.semanticscholar.org/paper/41391a63859b6ff37bdda7d85e8dbc4b2240ca76", - "title": "Spontaneous pulse formation in edgeless photonic crystal resonators", - "abstract": null, "venue": "", "year": 2020, "referenceCount": 44, "citationCount": - 42, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2020-02-28", "journal": {"name": "arXiv: Optics", "volume": - ""}, "authors": [{"authorId": "117217664", "name": "Su-Peng Yu"}, {"authorId": - "50770120", "name": "D. Cole"}, {"authorId": "2109313168", "name": "Hojoong - Jung"}, {"authorId": "9226160", "name": "G. Moille"}, {"authorId": "46643511", - "name": "K. Srinivasan"}, {"authorId": "35057592", "name": "S. Papp"}]}, {"paperId": - "7cadb9a6f3257971142e3b3a8676bbc94a807dda", "externalIds": {"MAG": "613545293", - "DOI": "10.1017/CBO9780511614293", "CorpusId": 118691862}, "url": "https://www.semanticscholar.org/paper/7cadb9a6f3257971142e3b3a8676bbc94a807dda", - "title": "Symmetry and its discontents : essays on the history of inductive - probability", "abstract": "Part I. Probability: 1. Symmetry and its discontents - 2. The rule of succession 3. Buffon, Price, and Laplace: scientific attribution - in the eighteenth century 4. W. E. Johnson''s sufficientness postulate. Part - II. Personalities: 5 Abraham De Moivre and the birth of the Central Limit - Theorem 6 Ramsey, truth, and probability 7. R. A. Fisher on the history of - inverse probability 8. R. A. Fisher and the fiducial argument 9. Alan Turing - and the Central Limit Theorem Part III. Prediction: 10. Predicting the unpredictable - 11. The continuum of inductive methods revised.", "venue": "", "year": 2005, - "referenceCount": 305, "citationCount": 50, "influentialCitationCount": 8, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2347279", - "name": "S. Zabell"}]}, {"paperId": "d80e54d3cdde7c553b15891416c234b7594cb34e", - "externalIds": {"MAG": "2011202471", "DOI": "10.1364/OL.23.000346", "CorpusId": - 229219, "PubMed": "18084507"}, "url": "https://www.semanticscholar.org/paper/d80e54d3cdde7c553b15891416c234b7594cb34e", - "title": "Spatial solitary waves and patterns in type II second-harmonic generation.", - "abstract": "The existence of Turing patterns and of spatial solitary waves - that arise from a polarization instability of the fundamental field is predicted - in type II second-harmonic generation in a quadratically nonlinear optical - cavity. The analogy between these dissipative structures and those studied - in absorptive optical bistability is pointed out.", "venue": "Optics letters", - "year": 1998, "referenceCount": 15, "citationCount": 28, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1998-03-01", "journal": {"name": "Optics - letters", "pages": "\n 346-8\n ", "volume": "23 5"}, "authors": - [{"authorId": "33098709", "name": "S. Longhi"}]}, {"paperId": "f9aa451310e865d812514573e665c607a555c8fa", - "externalIds": {"CorpusId": 18283428}, "url": "https://www.semanticscholar.org/paper/f9aa451310e865d812514573e665c607a555c8fa", - "title": "Intelligent Machinery : A Heretical View \u2019 Universal Turing - Machine", "abstract": "Scalable archetypes and RAID have garnered tremendous - interest from both scholars and theorists in the last several years. After - years of confusing research into courseware, we verify the deployment of the - memory bus. We construct new wireless information (ROBING), disproving that - cache coherence can be made robust, perfect, and relational.", "venue": "", - "year": 2011, "referenceCount": 240, "citationCount": 22, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "c8d4fe39361511fd5e3f62104b1b7372157ac382", - "externalIds": {"MAG": "1998764658", "DOI": "10.1063/1.165881", "CorpusId": - 2862610, "PubMed": "12779988"}, "url": "https://www.semanticscholar.org/paper/c8d4fe39361511fd5e3f62104b1b7372157ac382", - "title": "Nonequilibrium dynamics in lattice ecosystems: Chaotic stability - and dissipative structures.", "abstract": "A generalized coupled map lattice - (CML) model of ecosystem dynamics is presented. We consider the spatiotemporal - behavior of a prey-predator map, a model of host-parasitoid interactions, - and two-species competition. The latter model can show phase separation of - domains (Turing-like structures) even when chaos is present. We also use this - CML model to explore the time evolution and structural properties of ecological - networks built with a set of N competing species. The May-Wigner criterion - is applied as a measure of stability, and some regularities in the stable - networks observed are discussed.", "venue": "Chaos", "year": 1992, "referenceCount": - 23, "citationCount": 49, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1992-07-01", "journal": {"name": "Chaos", "pages": "\n 387-395\n ", - "volume": "2 3"}, "authors": [{"authorId": "1706628", "name": "R. Sol\u00e9"}, - {"authorId": "3001050", "name": "J. Bascompte"}, {"authorId": "145539610", - "name": "J. Valls"}]}, {"paperId": "8edeccce1612eaad8a00d96f1e6ed28565254c94", - "externalIds": {"ArXiv": "quant-ph/0407090", "MAG": "2950859522", "DOI": "10.1142/S0219749905000712", - "CorpusId": 17329693}, "url": "https://www.semanticscholar.org/paper/8edeccce1612eaad8a00d96f1e6ed28565254c94", - "title": "An anatomy of a quantum adiabatic algorithm that transcends the - Turing computability", "abstract": "We give an update on a quantum adiabatic - algorithm for the Turing noncomputable Hilbert''s tenth problem, and briefly - go over some relevant issues and misleading objections to the algorithm.", - "venue": "", "year": 2004, "referenceCount": 29, "citationCount": 19, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + 10, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2003-01-20", "journal": {"volume": + "5010"}, "authors": [{"authorId": "32987416", "name": "Monica Chew"}, {"authorId": + "1723766", "name": "H. Baird"}]}, {"paperId": "7cf35ba95946e8fe26869b770befc40a9c6a72cd", + "externalIds": {"DBLP": "journals/mima/SatoI04", "MAG": "2136991119", "DOI": + "10.1023/B:MIND.0000021747.28850.16", "CorpusId": 16816332}, "corpusId": 16816332, + "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": + "Minds and Machines", "type": "journal", "alternate_names": ["Mind Mach"], + "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/7cf35ba95946e8fe26869b770befc40a9c6a72cd", + "title": "Undecidability in the Imitation Game", "abstract": null, "venue": + "Minds and Machines", "year": 2004, "referenceCount": 39, "citationCount": + 10, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-07-13", - "journal": {"name": "International Journal of Quantum Information", "pages": - "177-182", "volume": "03"}, "authors": [{"authorId": "2063540", "name": "T. - Kieu"}]}, {"paperId": "6f888bcc79541c758b0a989a6d11a654bb865b6e", "externalIds": - {"CorpusId": 235351418}, "url": "https://www.semanticscholar.org/paper/6f888bcc79541c758b0a989a6d11a654bb865b6e", - "title": "Toward an Ecology of Gaming", "abstract": "1954. West Germany gains - an unexpected 3-2 victory over Hungary in the World Cup, known from then on - as The Miracle of Bern. Officials announce that an American hydrogen bomb - test had been conducted on Bikini Atoll in the Pacific Ocean. Marilyn Monroe - weds Joe DiMaggio. The Geneva Conference partitions Vietnam into North Vietnam - and South Vietnam. Mathematician Alan Turing commits suicide. \u201cGaming - as a Technique of Analysis\u201d is released, praising games as designed models - with which to think. When viewed from this perspective, 1954 looks a lot like - 2007: a year of instability and transformation on the world stage, a year - shadowed by the promise and threat of competing ideologies, a year colored - by fear, hope, and the advent of new technology. 1954 was also a year, like - this year, when games entered the popular lexicon and man the player was seized - upon as a harbinger of change. By 1954, Piaget had mapped the moral judgment - of a child through a study of his or her coming to know the rules of a game;2 - Turing had contributed", "venue": "", "year": 2007, "referenceCount": 23, - "citationCount": 40, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - [{"authorId": "2558419", "name": "Katie Salen"}]}, {"paperId": "eece0429ffa17149690402af142810a7bd877707", - "externalIds": {"MAG": "2602626577", "DBLP": "journals/synthese/VillalobosD18", - "DOI": "10.1007/s11229-017-1386-z", "CorpusId": 4982378}, "url": "https://www.semanticscholar.org/paper/eece0429ffa17149690402af142810a7bd877707", - "title": "Enactive autonomy in computational systems", "abstract": null, "venue": - "Synthese", "year": 2018, "referenceCount": 43, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2018-05-01", "journal": {"name": "Synthese", "pages": - "1891-1908", "volume": "195"}, "authors": [{"authorId": "48231885", "name": - "M. Villalobos"}, {"authorId": "35121941", "name": "Joe Dewhurst"}]}, {"paperId": - "62fbb82d666577437ad4a8028099b679abc4ac96", "externalIds": {"ArXiv": "cond-mat/0306121", - "MAG": "1975208351", "DOI": "10.1142/S0217979203023240", "CorpusId": 119508167}, - "url": "https://www.semanticscholar.org/paper/62fbb82d666577437ad4a8028099b679abc4ac96", - "title": "Dimensionality effects in Turing pattern formation", "abstract": - "The problem of morphogenesis and Turing instability are revisited from the - point of view of dimensionality effects. First the linear analysis of a generic - Turing model is elaborated to the case of multiple stationary states, which - may lead the system to bistability. The difference between two- and three-dimensional - pattern formation with respect to pattern selection and robustness is discussed. - Preliminary results concerning the transition between quasi-two-dimensional - and three-dimensional structures are presented and their relation to experimental - results are addressed.", "venue": "", "year": 2003, "referenceCount": 33, - "citationCount": 13, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2003-06-05", "journal": {"name": "International Journal - of Modern Physics B", "pages": "5541-5553", "volume": "17"}, "authors": [{"authorId": - "48183548", "name": "T. Leppanen"}, {"authorId": "2155202", "name": "M. Karttunen"}, - {"authorId": "145670814", "name": "K. Kaski"}, {"authorId": "37747895", "name": - "R. Barrio"}]}, {"paperId": "2d30aa623fd96da99a16c0c3bde73f50c92a5c42", "externalIds": - {"DBLP": "conf/naacl/GaleC90", "ACL": "H90-1056", "MAG": "2029768569", "DOI": - "10.3115/116580.116672", "CorpusId": 10164826}, "url": "https://www.semanticscholar.org/paper/2d30aa623fd96da99a16c0c3bde73f50c92a5c42", - "title": "Poor Estimates of Context are Worse than None", "abstract": "It - is difficult to estimate the probability of a word''s context because of sparse - data problems. If appropriate care is taken, we find that it is possible to - make useful estimates of contextual probabilities that improve performance - in a spelling correction application. In contrast, less careful estimates - are found to be useless. Specifically, we will show that the Good-Turing method - makes the use of contextual information practical for a spelling corrector, - while attempts to use the maximum likelihood estimator (MLE) or expected likelihood - estimator (ELE) fail. Spelling correction was selected as an application domain - because it is analogous to many important recognition applications based on - a noisy channel model (such as speech recognition), though somewhat simpler - and therefore possibly more amenable to detailed statistical analysis.", "venue": - "Human Language Technology - The Baltic Perspectiv", "year": 1990, "referenceCount": - 9, "citationCount": 86, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1990-06-24", "journal": {"name": "", "pages": "283-287", "volume": ""}, "authors": - [{"authorId": "34938639", "name": "W. Gale"}, {"authorId": "2244184", "name": - "Kenneth Ward Church"}]}, {"paperId": "f597898b65e5b12e7801646b64d2c950dda4a41f", - "externalIds": {"MAG": "2030817436", "DOI": "10.1002/APP.21410", "CorpusId": - 51817431}, "url": "https://www.semanticscholar.org/paper/f597898b65e5b12e7801646b64d2c950dda4a41f", - "title": "Wood\u2010fiber/high\u2010density\u2010polyethylene composites: - Coupling agent performance", "abstract": "The coupling efficiency of seven - coupling agents in wood-polymer composites (WPC) was investi- gated in this - study. The improvement on the interfacial bonding strength, flexural modulus, - and other mechanical properties of the resultant wood fiber/high-density polyeth- - ylene (HDPE) composites was mainly related to the cou- pling agent type, function - groups, molecular weight, con- centration, and chain structure. As a coupling - agent, mal- eated polyethylene (MAPE) had a better performance in WPC than - oxidized polyethylene (OPE) and pure polyeth- ylene (PPE) because of its stronger - interfacial bonding. A combination of the acid number, molecular weight, and - concentration of coupling agents had a significant effect on the interfacial - bonding in WPC. The coupling agents with a high molecular weight, moderate - acid number, and low concentration level were preferred to improve interfacial - adhesion in WPC. The backbone structure of coupling agents also affected the - interfacial bonding strength. Com- pared with the untreated composites, modified - composites improved the interfacial bonding strength by 140% on max- imum - and the flexural storage modulus by 29%. According to the statistical analysis, - 226D and 100D were the best of the seven coupling agents. The coupling agent - performance was illustrated with the brush, switch, and amorphous struc- tures. - \u00a9 2005 Wiley Periodicals, Inc. J Appl Polym Sci 96: 93-102, 2005", "venue": - "", "year": 2005, "referenceCount": 16, "citationCount": 237, "influentialCitationCount": - 9, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2005-04-05", "journal": {"name": "Journal of Applied Polymer Science", "pages": - "93-102", "volume": "96"}, "authors": [{"authorId": "11190748", "name": "J. - Z. Lu"}, {"authorId": "3404317", "name": "Qinglin Wu"}, {"authorId": "5062911", - "name": "I. Negulescu"}]}, {"paperId": "6a79833bbbb8d02d9f422293f727219cae958286", - "externalIds": {"MAG": "89857835", "CorpusId": 127522995}, "url": "https://www.semanticscholar.org/paper/6a79833bbbb8d02d9f422293f727219cae958286", - "title": "A Comparison of Climatic Elements at Four Elevations in the Great - Smoky Mountains National Park", "abstract": "Between J anuary lr 19479 and - December 31, 1950, hourly tempera\u00ad ture and relative humidity and daily - precipitation and cloud cover data were collected at the 1P460 ft.P )9850 - ft.P 5 , 000 ft.P and 6,)00 ft. elevations in the Great Smoky Mountains National - Park. These four years were part of a period of data collection extending - from January, 1946, through \ufffdmrch", "venue": "", "year": 1969, "referenceCount": - 0, "citationCount": 28, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": [{"category": "Geography", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "volume": ""}, "authors": [{"authorId": "119374173", "name": "Stephens"}, - {"authorId": "2070971448", "name": "Luther Allin"}]}, {"paperId": "7f89e850222219c6327cbde5e76679a760604e72", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2004-05-01", "journal": {"name": "Minds and Machines", "pages": "133-143", + "volume": "14"}, "authors": [{"authorId": "2460650", "name": "Yuzuru Sato"}, + {"authorId": "144465822", "name": "T. Ikegami"}]}, {"paperId": "7f89e850222219c6327cbde5e76679a760604e72", "externalIds": {"MAG": "2061563589", "DOI": "10.1073/PNAS.49.4.572", "CorpusId": - 43736709, "PubMed": "13952461"}, "url": "https://www.semanticscholar.org/paper/7f89e850222219c6327cbde5e76679a760604e72", + 43736709, "PubMed": "13952461"}, "corpusId": 43736709, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/7f89e850222219c6327cbde5e76679a760604e72", "title": "The defectiveness of Rous sarcoma virus.", "abstract": "in a previous paper.'' The titer was calculated from the terminal dilution which induced interference, and was expressed in terms of infectious units. The RAV stock @@ -51059,581 +57784,21 @@ interactions: phosphate broth and 5% calf serum.", "venue": "Proceedings of the National Academy of Sciences of the United States of America", "year": 1963, "referenceCount": 1, "citationCount": 220, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Biology", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1963-04-01", "journal": {"name": "Proceedings of the National - Academy of Sciences of the United States of America", "pages": "\n 572-80\n ", - "volume": "49"}, "authors": [{"authorId": "1973946", "name": "H. Hanafusa"}, - {"authorId": "4892610", "name": "T. Hanafusa"}, {"authorId": "50211488", "name": - "H. Rubin"}]}, {"paperId": "3e284b14f1f74f37119c76c2faa8d130bf9f7023", "externalIds": - {"MAG": "2079779075", "DOI": "10.1063/1.4825379", "CorpusId": 22063676, "PubMed": - "24182005"}, "url": "https://www.semanticscholar.org/paper/3e284b14f1f74f37119c76c2faa8d130bf9f7023", - "title": "Control of Turing patterns and their usage as sensors, memory arrays, - and logic gates.", "abstract": "We study a model system of three diffusively - coupled reaction cells arranged in a linear array that display Turing patterns - with special focus on the case of equal coupling strength for all components. - As a suitable model reaction we consider a two-variable core model of glycolysis. - Using numerical continuation and bifurcation techniques we analyze the dependence - of the system''s steady states on varying rate coefficient of the recycling - step while the coupling coefficients of the inhibitor and activator are fixed - and set at the ratios 100:1, 1:1, and 4:5. We show that stable Turing patterns - occur at all three ratios but, as expected, spontaneous transition from the - spatially uniform steady state to the spatially nonuniform Turing patterns - occurs only in the first case. The other two cases possess multiple Turing - patterns, which are stabilized by secondary bifurcations and coexist with - stable uniform periodic oscillations. For the 1:1 ratio we examine modular - spatiotemporal perturbations, which allow for controllable switching between - the uniform oscillations and various Turing patterns. Such modular perturbations - are then used to construct chemical computing devices utilizing the multiple - Turing patterns. By classifying various responses we propose: (a) a single-input - resettable sensor capable of reading certain value of concentration, (b) two-input - and three-input memory arrays capable of storing logic information, (c) three-input, - three-output logic gates performing combinations of logical functions OR, - XOR, AND, and NAND.", "venue": "The Journal of chemical physics", "year": - 2013, "referenceCount": 45, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2013-10-23", "journal": - {"name": "The Journal of chemical physics", "pages": "\n 164108\n ", - "volume": "139 16"}, "authors": [{"authorId": "11947862", "name": "F. Muzika"}, - {"authorId": "1995243", "name": "I. Schreiber"}]}, {"paperId": "3c8bca32698f45fef0fa9cf74c94d7f193b17214", - "externalIds": {"DBLP": "journals/jscic/LiZWS01", "MAG": "1558805169", "DOI": - "10.1023/A:1012278606077", "CorpusId": 45519688}, "url": "https://www.semanticscholar.org/paper/3c8bca32698f45fef0fa9cf74c94d7f193b17214", - "title": "LBGK Simulations of Turing Patterns in CIMA Model", "abstract": - null, "venue": "J. Sci. Comput.", "year": 2001, "referenceCount": 20, "citationCount": - 19, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-06-11", "journal": {"name": "Journal of Scientific - Computing", "pages": "121-134", "volume": "16"}, "authors": [{"authorId": - "1930238", "name": "Qing Li"}, {"authorId": "144704650", "name": "C. Zheng"}, - {"authorId": "34752878", "name": "Nengchao Wang"}, {"authorId": "36303595", - "name": "B. Shi"}]}, {"paperId": "681f3c1fa6c1fd733d53680a46fd4325876a393f", - "externalIds": {"DBLP": "books/daglib/0067904", "MAG": "1527654363", "CorpusId": - 26903267}, "url": "https://www.semanticscholar.org/paper/681f3c1fa6c1fd733d53680a46fd4325876a393f", - "title": "Concurrent programming - principles and practice", "abstract": "I. - BASIC CONCEPTS. Sequential Programming. Language Notation. Logic, Propositions, - and Predicates. A Programming Logic. Proofs in Programming Logic. Program - Derivation. Historical Notes and References. Exercises. Concurrency and Synchronization. - Specifying Concurrent Execution. Atomic Actions and Synchronization. Semantics - of Concurrent Execution. Techniques for Avoiding Interference. Auxiliary Variables. - Safety and Liveness Properties. Historical Notes and References. Exercises. - II. SHARED VARIABLES. Fine-Grained Synchronization. The Critical Section Problem. - Critical Sections: Tie-Breaker Algorithm. Critical Sections: Ticket Algorithm. - Critical Sections: Bakery Algorithm. Barrier Synchronization. Data Parallel - Algorithms. On-The-Fly Garbage Collection. Implementing Processes. Historical - Notes and References. Exercises. Semaphores. Notation and Semantics. Basic - Uses and Programming Techniques. Selective Mutual Exclusion. General Condition - Synchronization. Resource Allocation. Implementation. Historical Notes and - References. Exercises. Conditional Critical Regions. Notation and Semantics. - Dining Philosophers Revisited. Reader/Writers Revisited. Interprocess Communication. - Scheduling and Resource Allocation. Implementations. Historical Notes and - References. Exercises. Monitors. Programming Notation. Formal Semantics and - Program Proofs. Synchronization Techniques. Disk Scheduling: Program Structures. - Alternative Approaches to Synchronization. Implementations. Historical Notes - and References. Exercises. III. MESSAGE PASSING. Asynchronous Message Passing. - Programming Notation. Formal Semantics. Filters: A Sorting Network. Clients - and Servers. Heartbeat Algorithms. Probe/Echo Algorithms. Broadcast Algorithms. - Token-Passing Algorithms. Replicated Servers. Implementations. Historical - Notes and References. Exercises. Synchronous Message Passing. Programming - Notation. Formal Semantics. Networks of Filters. Interacting Parallel Processes. - Clients and Servers. Implementations. Historical Notes and References. Exercises. - RPC and Rendezvous. Remote Procedure Call. Rendezvous. A Multiple Primitives - Notation. Clients and Servers. Parallel Algorithms. Implementation. Historical - Notes and References. Exercises. IV. PRACTICE. Language Overviews. Turing - Plus: Monitors. Occam: Synchronous Message Passing. Ada: Rendezvous. SR: Multiple - Primitives. Linda: Distributed Data Structures. Comparison and Performance. - Historical Notes and References. Exercises. Glossary. Bibliography. Index. - 0805300864T04062001", "venue": "", "year": 1991, "referenceCount": 0, "citationCount": - 552, "influentialCitationCount": 45, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "1991-07-12", "journal": - {"pages": "I-XVII, 1-637"}, "authors": [{"authorId": "2542622", "name": "G. - Andrews"}]}, {"paperId": "887ef8b338eb6f048bac3ecff8d250a363d3bf9b", "externalIds": - {"MAG": "2581525718", "DOI": "10.1016/j.physbeh.2017.01.034", "CorpusId": - 30338276, "PubMed": "28137425"}, "url": "https://www.semanticscholar.org/paper/887ef8b338eb6f048bac3ecff8d250a363d3bf9b", - "title": "Cognitive evaluation for the diagnosis of Alzheimer''s disease based - on Turing Test and Virtual Environments", "abstract": null, "venue": "Physiology - and Behavior", "year": 2017, "referenceCount": 44, "citationCount": 49, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Psychology"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Psychology", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2017-05-01", "journal": - {"name": "Physiology & Behavior", "pages": "42-51", "volume": "173"}, "authors": - [{"authorId": "145408274", "name": "J. M. F. Montenegro"}, {"authorId": "1689047", - "name": "V. Argyriou"}]}, {"paperId": "cfaa1a1534739cb46dcf49b9d3303949fc14d635", - "externalIds": {"MAG": "2097296731", "DOI": "10.1007/BF01693975", "CorpusId": - 122796409}, "url": "https://www.semanticscholar.org/paper/cfaa1a1534739cb46dcf49b9d3303949fc14d635", - "title": "Kolmogoroff algorithms are stronger than turing machines", "abstract": - null, "venue": "", "year": 1980, "referenceCount": 4, "citationCount": 15, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1980-11-01", "journal": {"name": "Journal of Soviet Mathematics", - "pages": "1445-1450", "volume": "14"}, "authors": [{"authorId": "1451029442", - "name": "D. Grigor''ev"}]}, {"paperId": "4a5135de004ac95cf379e9a4c1372afaee9837c5", - "externalIds": {"DBLP": "conf/fps/Tikhomirov17", "MAG": "2760843627", "DOI": - "10.1007/978-3-319-75650-9_14", "CorpusId": 3423063}, "url": "https://www.semanticscholar.org/paper/4a5135de004ac95cf379e9a4c1372afaee9837c5", - "title": "Ethereum: State of Knowledge and Research Perspectives", "abstract": - null, "venue": "Foundations and Practice of Security", "year": 2017, "referenceCount": - 61, "citationCount": 49, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Business", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Business", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2017-10-23", "journal": - {"pages": "206-221"}, "authors": [{"authorId": "1517644019", "name": "S. Tikhomirov"}]}, - {"paperId": "bbf9cbd7e3ae3d8c8b7487245d9f56f4d149f13a", "externalIds": {"DBLP": - "journals/tfs/Li08", "MAG": "2129853986", "DOI": "10.1109/TFUZZ.2008.2004990", - "CorpusId": 22644492}, "url": "https://www.semanticscholar.org/paper/bbf9cbd7e3ae3d8c8b7487245d9f56f4d149f13a", - "title": "Fuzzy Turing Machines: Variants and Universality", "abstract": "In - this paper, we study some variants of fuzzy Turing machines (FTMs) and universal - FTM. First, we give several formulations of FTMs, including, in particular, - deterministic FTMs (DFTMs) and nondeterministic FTMs (NFTMs). We then show - that DFTMs and NFTMs are not equivalent as far as the power of recognizing - fuzzy languages is concerned. This contrasts sharply with classical TMs. Second, - we show that there is no universal FTM that can exactly simulate any FTM on - it. But if the membership degrees of fuzzy sets are restricted to a fixed - finite subset A of [0,1], such a universal machine exists. We also show that - a universal FTM exists in some approximate sense. This means, for any prescribed - accuracy, that we can construct a universal machine that simulates any FTM - with the given accuracy. Finally, we introduce the notions of fuzzy polynomial - time-bounded computation and nondeterministic fuzzy polynomial time-bounded - computation, and investigate their connections with polynomial time-bounded - computation and nondeterministic polynomial time-bounded computation.", "venue": - "IEEE Transactions on Fuzzy Systems", "year": 2008, "referenceCount": 24, - "citationCount": 14, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-12-01", "journal": - {"name": "IEEE Transactions on Fuzzy Systems", "pages": "1491-1502", "volume": - "16"}, "authors": [{"authorId": "51394392", "name": "Yongming Li"}]}, {"paperId": - "379ec48b67c1736666dd0f61c0a44b75e9b98727", "externalIds": {"MAG": "2524754229", - "DBLP": "journals/cj/Lavington12", "DOI": "10.1093/comjnl/bxs015", "CorpusId": - 9712594}, "url": "https://www.semanticscholar.org/paper/379ec48b67c1736666dd0f61c0a44b75e9b98727", - "title": "A Synopsis of the Book Alan Turing and his Contemporaries: Building - the World''s First Computers", "abstract": "To mark the centenary of the birth - of Alan Turing, the British Computer Society has published a book written - by members of the Computer Conservation Society. The book examines Alan Turing''s - contribution to the implementation of practical stored-program digital computers - and the relation between Turing and the other computer pioneers active in - the period 1945\u201355. In this invited article, the book''s Editor gives - an overall view of the subject, focussing particularly on Alan Turing''s special - contributions in the first decade of the Information Age.", "venue": "Computer/law - journal", "year": 2012, "referenceCount": 2, "citationCount": 10, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Engineering"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Engineering", "source": "external"}, {"category": "History", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2012-02-11", "journal": {"name": "Comput. J.", "pages": "779-787", "volume": - "55"}, "authors": [{"authorId": "2002323", "name": "S. Lavington"}]}, {"paperId": - "5028f6f347ce0c788d89cf318815270635fba3e7", "externalIds": {"MAG": "1977960830", - "DOI": "10.1007/BF03027638", "CorpusId": 93945854}, "url": "https://www.semanticscholar.org/paper/5028f6f347ce0c788d89cf318815270635fba3e7", - "title": "Surfactants for producing low interfacial tensions I: Linear alkyl - benzene sulfonates", "abstract": null, "venue": "", "year": 1977, "referenceCount": - 10, "citationCount": 86, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1977-12-01", "journal": {"name": - "Journal of the American Oil Chemists\u2019 Society", "pages": "570-577", - "volume": "54"}, "authors": [{"authorId": "91493613", "name": "P. Doe"}, {"authorId": - "1441455588", "name": "M. El-Emary"}, {"authorId": "70668570", "name": "W. - Wade"}, {"authorId": "49502461", "name": "R. S. Schechter"}]}, {"paperId": - "26fa640cfdd753d34d5f6440264e66a5ecf65cce", "externalIds": {"MAG": "2741390383", - "DBLP": "conf/stoc/GoldwasserS86", "DOI": "10.1145/12130.12137", "CorpusId": - 5636899}, "url": "https://www.semanticscholar.org/paper/26fa640cfdd753d34d5f6440264e66a5ecf65cce", - "title": "Private coins versus public coins in interactive proof systems", - "abstract": "An interactive proof system is a method by which one party of - unlimited resources, called the prover, can convince a party of limited resources, - call the verifier, of the truth of a proposition. The verifier may toss coins, - ask repeated questions of the prover, and run efficient tests upon the prover''s - responses before deciding whether to be convinced. This extends the familiar - proof system implicit in the notion of NP in that there the verifier may not - toss coins or speak, but only listen and verify. Interactive proof systems - may not yield proof in the strict mathematical sense: the \"proofs\" are probabilistic - with an exponentially small, though non-zero chance of error. We consider - two notions of interactive proof system. One, defined by Goldwasser, Micali, - and Rackoff [GMR] permits the verifier a coin that can be tossed in private, - i.e., a secret source of randomness. The Permission to copy without ice all - or part of this material is granted provided that the copies are not made - or distributed for direct commercial advantage, the ACM copyright notice and - the title of the publication and its date appear, and notice is given that - copying is by permission of the Association for Computing Machinery. To copy - otherwise, or to republish, requires a fee and/or specific permission. \u00a9 - 1986 ACM 0-89791-193-8/86/0500/0059 $00.75 second, due to Babai, [B] requires - that the outcome of the verifier''s coin tosses be public and thus accessible - to the prover. Our main result is that these two systems are equivalent in - power with respect to language recognition. The notion of interactive proof - system may be seen to yield a probabilistic analog to NP much as BPP is the - probabilistic analog to P. We define the probabilistic, nondeterministic, - polynomial time Turing machine and show that it is also equivalent in power - to these systems.", "venue": "Symposium on the Theory of Computing", "year": - 1986, "referenceCount": 12, "citationCount": 550, "influentialCitationCount": - 30, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1986-11-01", "journal": {"name": "Adv. Comput. Res.", - "pages": "73-90", "volume": "5"}, "authors": [{"authorId": "1706681", "name": - "S. Goldwasser"}, {"authorId": "2367457", "name": "M. Sipser"}]}, {"paperId": - "af76eb6d8ca0a5bcc743f890784efe3545b2f330", "externalIds": {"DBLP": "journals/siamsc/StrychalskiAE10", - "MAG": "2046313315", "DOI": "10.1137/090779693", "CorpusId": 207059783, "PubMed": - "24086102"}, "url": "https://www.semanticscholar.org/paper/af76eb6d8ca0a5bcc743f890784efe3545b2f330", - "title": "Simulating Biochemical Signaling Networks in Complex Moving Geometries", - "abstract": "Signaling networks regulate cellular responses to environmental - stimuli through cascades of protein interactions. External signals can trigger - cells to polarize and move in a specific direction. During migration, spatially - localized activity of proteins is maintained. To investigate the effects of - morphological changes on intracellular signaling, we developed a numerical - scheme consisting of a cut cell finite volume spatial discretization coupled - with level set methods to simulate the resulting advection-reaction-diffusion - system. We then apply the method to several biochemical reaction networks - in changing geometries. We found that a Turing instability can develop exclusively - by cell deformations that maintain constant area. For a Turing system with - a geometry-dependent single or double peak solution, simulations in a dynamically - changing geometry suggest that a single peak solution is the only stable one, - independent of the oscillation frequency. The method is also applied to a - model of a signaling network in a migrating fibroblast.", "venue": "SIAM Journal - on Scientific Computing", "year": 2010, "referenceCount": 58, "citationCount": - 24, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2010-08-01", "journal": {"name": "SIAM journal on scientific - computing : a publication of the Society for Industrial and Applied Mathematics", - "pages": "\n 3039-3070\n ", "volume": "32 5"}, "authors": - [{"authorId": "3100210", "name": "Wanda Strychalski"}, {"authorId": "2273117", - "name": "D. Adalsteinsson"}, {"authorId": "1742750", "name": "T. Elston"}]}, - {"paperId": "c03d888b36e9350421f3f628bc18f08121529373", "externalIds": {"MAG": - "2126891113", "DOI": "10.1177/004051755202200803", "CorpusId": 135704891}, - "url": "https://www.semanticscholar.org/paper/c03d888b36e9350421f3f628bc18f08121529373", - "title": "Observations of the Birefringence and Refractive Index of Synthetic - Fibers with Special Reference to Their Identification", "abstract": "Birefringence - and refractive indices of synthetic fibers are measured by the polarization - color and immersion methods. These properties prove to be much more consistent - and characteristic for synthetic fibers than for natural fibers and rayons, - to which previous studies had mainly been confined. These fea tures can therefore - be used in the identification of synthetic fibers. A simple polarizing device - for making these measurments using an ordinary microscope is described.", - "venue": "", "year": 1952, "referenceCount": 18, "citationCount": 36, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1952-08-01", "journal": {"name": "Textile Research Journal", "pages": "513 - - 522", "volume": "22"}, "authors": [{"authorId": "88091143", "name": "A. - Heyn"}]}, {"paperId": "b70d79e0d694bd79b704a6154065300fc4d0e273", "externalIds": - {"MAG": "37537225", "DOI": "10.1007/978-94-017-1754-0_2", "CorpusId": 116428802}, - "url": "https://www.semanticscholar.org/paper/b70d79e0d694bd79b704a6154065300fc4d0e273", - "title": "Tableau Methods for Classical Propositional Logic", "abstract": - null, "venue": "", "year": 1999, "referenceCount": 52, "citationCount": 85, - "influentialCitationCount": 8, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "pages": "45-123", - "volume": ""}, "authors": [{"authorId": "1397652413", "name": "Marcello D''Agostino"}]}, - {"paperId": "274cb07413285f9ec84b59fda87ca63bbb8b42b7", "externalIds": {"MAG": - "1980972224", "DBLP": "journals/acta/LoosMM10", "DOI": "10.1007/s00236-009-0113-8", - "CorpusId": 32308765}, "url": "https://www.semanticscholar.org/paper/274cb07413285f9ec84b59fda87ca63bbb8b42b7", - "title": "Small universal accepting hybrid networks of evolutionary processors", - "abstract": null, "venue": "Acta Informatica", "year": 2010, "referenceCount": - 15, "citationCount": 16, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2010-03-01", "journal": {"name": "Acta Informatica", "pages": "133-146", - "volume": "47"}, "authors": [{"authorId": "145659950", "name": "Remco Loos"}, - {"authorId": "1694383", "name": "F. Manea"}, {"authorId": "1715143", "name": - "V. Mitrana"}]}, {"paperId": "a73c6bdf01e42108ec2431ff4c021bbe5aa310c9", "externalIds": - {"DOI": "10.1051/978-2-7598-1899-0.c053", "CorpusId": 15188309}, "url": "https://www.semanticscholar.org/paper/a73c6bdf01e42108ec2431ff4c021bbe5aa310c9", - "title": "La machine de Turing", "abstract": "\u2022 Un \u00ab ruban \u00bb - divis\u00e9 en cases adjacentes. Chaque case contient un symbole parmi un - alphabet fini. L''alphabet contient un symbole sp\u00e9cial \u00ab blanc \u00bb - et un ou plusieurs autres symboles. Le ruban est de longueur infinie vers - la gauche ou vers la droite (en d''autres termes, la machine doit toujours - avoir assez de longueur de ruban pour son ex\u00e9cution). On consid\u00e8re - que les cases non encore \u00e9crites du ruban contiennent le symbole \u00ab - blanc \u00bb. \u2022 Une \u00ab t\u00eate de lecture/\u00e9criture \u00bb - qui peut lire et \u00e9crire les symboles sur le ruban, et se d\u00e9placer - vers la gauche ou vers la droite du ruban. \u2022 Un \u00ab registre d''\u00e9tat - \u00bb qui m\u00e9morise l''\u00e9tat courant de la machine de Turing. Le - nombre d''\u00e9tats possibles est toujours fini, et il existe un \u00e9tat - sp\u00e9cial appel\u00e9 \u00ab \u00e9tat de d\u00e9part \u00bb qui est l''\u00e9tat - initial de la machine avant son ex\u00e9cution.", "venue": "Les math\u00e9matiques - en images", "year": 2020, "referenceCount": 242, "citationCount": 2, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": - null, "publicationDate": "2020-11-04", "journal": {"name": "Les math\u00e9matiques - en images"}, "authors": [{"authorId": "2077266462", "name": "Stefan Schwoon"}, - {"authorId": "70857388", "name": "Andrew S. Tanenbaum"}, {"authorId": "2080857927", - "name": "Contenu d\u2019aujourd\u2019hui"}, {"authorId": "2079681806", "name": - "A. Turing"}]}, {"paperId": "4507c730687c4244de4ea945537cef4649c0d52b", "externalIds": - {"MAG": "2158157333", "DOI": "10.1127/0935-1221/2001/0013-0453", "CorpusId": - 130971940}, "url": "https://www.semanticscholar.org/paper/4507c730687c4244de4ea945537cef4649c0d52b", - "title": "Eutectic crystallization in the undercooled Orthoclase-Quartz-H2O - system: experiments and simulations", "abstract": "Textures formed during - crystallization of the eutectic composition in the system Orthoclase-Quartz-H2O - at 500 MPa and 50, 100, and 200\u00b0C undercooling have been studied experimentally - and simulated using a two- dimensional Ising model. The experiments performed - at 50\u00b0C undercooling did not produce complex, interesting tex- tures - but only very rare, isolated K-feldspar and quartz crystals. At 100\u00b0C - undercooling the most common texture is a fine-grained, submicrometre to micrometre-scale, - spherulitic quartz-K-feldspar intergrowth; set within this inter- growth are - larger individual crystals of quartz or K-feldspar. Experiments performed - at 200\u00b0C undercooling are remarkable for the occurrence of micrometre-scale - graphic textures and millimetre scale spherulitic textures, charac- terized - by quartz-K-feldspar intergrowths in the core and dominated by K-feldspar - at the rims. Simulations of crys- tal growth, performed to complement and - to interpret the experimental products, investigated what combination of growth - (G) and diffusion (D) conditions can give rise to the crystal shapes and textures - found in the experiments. These conditions correspond to growth rates between - ~ 1 x 10-10 and 5 x 10-9 m s-1 and diffusion coefficients between 10-17 m2 - s-1 in the melt phase and 10-8 m2 s-1 in the fluid phase. The simulations, - despite their limitations, provide tex- tures similar to the experimental - ones. In particular, simulations produced a quartz-K-feldspar intergrowth - when G = D and singular, large quartz and K-feldspar crystals when G < D. - These changes in the G:D ratio, in the experi- ments and in natural rocks, - are attributed to a change in the growth of the crystal from a silicate melt - to an aqueous fluid. The most interesting results of this study are that highly - undercooled melts of a simplified pegmatite composi- tion produce textures - remarkably similar to natural pegmatites and that simulations provide a powerful - tool to under- stand what processes cause these textures in experimental run - products and natural rocks.", "venue": "", "year": 2001, "referenceCount": - 28, "citationCount": 64, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials - Science", "source": "external"}, {"category": "Geology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2001-05-01", "journal": {"name": - "European Journal of Mineralogy", "pages": "453-466", "volume": "13"}, "authors": - [{"authorId": "48929437", "name": "D. Baker"}, {"authorId": "2049875249", - "name": "A. Freda"}]}, {"paperId": "dd245f6c4cd4c288e1581cdaa7a19fbebe9e7701", - "externalIds": {"MAG": "2159708388", "DOI": "10.1002/POLA.10643", "CorpusId": - 97773918}, "url": "https://www.semanticscholar.org/paper/dd245f6c4cd4c288e1581cdaa7a19fbebe9e7701", - "title": "Functionalizing the interior of dendrimers: Synthetic challenges - and applications", "abstract": "Chemists'' fascina- tion with dendrimers mainly - orig- inates from their unique architec- ture and its exploitation for the - de- sign of well-defined functional macromolecules. Depending on the nature - of the synthesis, func- tionalization is traditionally intro- duced at the - core, the periphery, or both. However, the specific incor- poration of functional - groups at the interior layers, i.e., generations, represents a considerable - synthetic hurdle that must be overcome for the full potential of dendrimers - to be realized. This review covers re- cent advances in this emerging frontier - of dendrimer science with a particular focus on covalent modifications. Monomer - design, syntheses, and properties of vari- ous dendritic backbone types are - discussed. Internal functionaliza- tion dramatically increases the de- gree - of complexity that can be implemented into a dendrimer macromolecule and, - therefore, promises to lead to smart materials for future applications in - bio- and nanotechnologies. \u00a9 2003 Wiley Peri-", "venue": "", "year": - 2003, "referenceCount": 102, "citationCount": 85, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2003-04-15", "journal": {"name": "Journal of Polymer Science Part A", "pages": - "1047-1058", "volume": "41"}, "authors": [{"authorId": "2135427", "name": - "S. Hecht"}]}, {"paperId": "de312e72109484852424b76f40aec642564846cf", "externalIds": - {"MAG": "2015029297", "DOI": "10.1063/1.2784554", "CorpusId": 43020095, "PubMed": - "17994850"}, "url": "https://www.semanticscholar.org/paper/de312e72109484852424b76f40aec642564846cf", - "title": "Bifurcation diagrams and Turing patterns in a chemical self-replicating - reaction-diffusion system with cross diffusion.", "abstract": "Chemical self-replication - of oligonucleotides and helical peptides exhibits the so-called square root - rate law. Based on this rate we extend our previous work on ideal replicators - to include the square root rate and other possible nonlinearities, which we - couple with an enzymatic sink. For this generalized model, we consider the - role of cross diffusion in pattern formation, and we obtain exact general - relations for the Poincare-Adronov-Hopf and Turing bifurcations, and our generalized - results include the Higgins, Autocatalator, and Templator models as specific - cases.", "venue": "Journal of Chemical Physics", "year": 2007, "referenceCount": - 67, "citationCount": 37, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-11-05", "journal": {"name": "The - Journal of chemical physics", "pages": "\n 174903\n ", "volume": - "127 17"}, "authors": [{"authorId": "39991422", "name": "Jessica Chung"}, - {"authorId": "1403262523", "name": "E. Peacock-L\u00f3pez"}]}, {"paperId": - "98576f4b2df33503c19b82c11f28fdcc2a4c41dc", "externalIds": {"CorpusId": 7123899}, - "url": "https://www.semanticscholar.org/paper/98576f4b2df33503c19b82c11f28fdcc2a4c41dc", - "title": "On the Gaussian error function Universal Turing Machine", "abstract": - "Many steganographers would agree that, had it not been for the Ethernet, - the exploration of model checking might never have occurred. After years of - essential research into web browsers, we verify the improvement of redundancy, - which embodies the confusing principles of cryptoanalysis. RIBAND, our new - application for the deployment of Byzantine fault tolerance, is the solution - to all of these obstacles.", "venue": "", "year": 2011, "referenceCount": - 149, "citationCount": 22, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2053325089", "name": "F. I. Qian"}]}, - {"paperId": "36837857fb829c674bc561b86145d8122173e155", "externalIds": {"DBLP": - "journals/cj/Naur93", "MAG": "2099081743", "DOI": "10.1093/comjnl/36.4.351", - "CorpusId": 11177192}, "url": "https://www.semanticscholar.org/paper/36837857fb829c674bc561b86145d8122173e155", - "title": "Understanding Turing''s Universal Machine - Personal Style in Program - Description", "abstract": null, "venue": "Comput. J.", "year": 1993, "referenceCount": - 0, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Comput. J.", "pages": "351-372", - "volume": "36"}, "authors": [{"authorId": "1733249", "name": "P. Naur"}]}, - {"paperId": "bb833e7f3124dcb92629890c1c98e9a2db9ff820", "externalIds": {"MAG": - "35682058", "DOI": "10.5951/tcm.8.6.0372", "CorpusId": 59720462}, "url": "https://www.semanticscholar.org/paper/bb833e7f3124dcb92629890c1c98e9a2db9ff820", - "title": "What Are Virtual Manipulatives", "abstract": "Two types of representations - on the World WideWeb are being called virtual manipulatives\u2014theseare - static and dynamic visual representations ofconcrete manipulatives (Spicer - 2000). Conse-quently, two types of virtual manipulativesare available as teaching - and learning tools.Because one of these types is far morepowerful and has - much greater utility andpotential for teaching, drawing the distinc-tion between - the two is important. Establish-ing a name and definition that uniquely describethese - dynamic images is equally important to avoidconfusion.Static visual representations - are essentially pic-tures. They are the sorts of visual images ordinar-ily - associated with pictures in books, drawings onan overhead projector, sketches - on a chalkboard,and so on. Although such representations resembleconcrete - manipulatives, they cannot be used in thesame ways that concrete manipulatives - can. Thatis, a student can actually slide, flip, and turn con-crete manipulatives - but cannot perform the sameactions with a static picture of the concrete manip-ulative. - These static visual representations are nottrue virtual manipulatives.In contrast, - dynamic visual representations ofconcrete manipulatives are essentially \u201cobjects.\u201dThey - are visual images on the computer that arejust like pictures in books, drawings - on an over-head projector, sketches on a chalkboard, and soon. In addition, - these dynamic visual representa-tions can be manipulated in the same ways - that aconcrete manipulative can. Just as a student can", "venue": "", "year": - 2002, "referenceCount": 9, "citationCount": 228, "influentialCitationCount": - 7, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Teaching children mathematics", "pages": "372-377", "volume": - "8"}, "authors": [{"authorId": "46193007", "name": "P. Moyer"}, {"authorId": - "72944716", "name": "Johnna J. Bolyard"}, {"authorId": "52423074", "name": - "M. Spikell"}]}, {"paperId": "2a984d5cdeb020f4239ef158af7a35987e9b30cd", "externalIds": - {"ArXiv": "1104.3421", "MAG": "1631934516", "DBLP": "journals/corr/abs-1104-3421", - "DOI": "10.1007/s11023-011-9262-y", "CorpusId": 7297787}, "url": "https://www.semanticscholar.org/paper/2a984d5cdeb020f4239ef158af7a35987e9b30cd", - "title": "Empirical Encounters with Computational Irreducibility and Unpredictability", - "abstract": null, "venue": "Minds and Machines", "year": 2011, "referenceCount": - 31, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2011-04-18", "journal": - {"name": "Minds and Machines", "pages": "149-165", "volume": "22"}, "authors": - [{"authorId": "66445647", "name": "H. Zenil"}, {"authorId": "1389866422", - "name": "F. Soler-Toscano"}, {"authorId": "1748961", "name": "J. Joosten"}]}, - {"paperId": "ddb689c0d51d4273ee3a06ef3258a21ee78f8388", "externalIds": {"MAG": - "2144928438", "DOI": "10.1109/81.747195", "CorpusId": 122820165}, "url": "https://www.semanticscholar.org/paper/ddb689c0d51d4273ee3a06ef3258a21ee78f8388", - "title": "Reaction-diffusion CNN algorithms to generate and control artificial - locomotion", "abstract": "In this paper a physiological-behavioral approach - to neural processing is used to realize artificial locomotion in mechatronic - devices. The task has been realized by using a particular model of reaction-diffusion - cellular neural networks (RD-CNN''s) generating autowave fronts as well as - Turing patterns. Moreover a programmable hardware cellular neural network - structure is presented in order to model, generate, and control in real time - some biorobots. The programmable hardware implementation gives the possibility - of generating locomotion in real time and also to control the transition among - several types of locomotion, with particular attention to hexapodes. The approach - proposed allows not only the design of walking robots, but also the ability - to build structures able to efficiently solve typical problems in industrial - automation, such as online routing of objects moved on conveyor belts.", "venue": - "", "year": 1999, "referenceCount": 19, "citationCount": 86, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Engineering", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-02-01", - "journal": {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", - "pages": "253-260", "volume": "46"}, "authors": [{"authorId": "1679793", "name": - "P. Arena"}, {"authorId": "143998340", "name": "L. Fortuna"}, {"authorId": - "1877702", "name": "M. Branciforte"}]}, {"paperId": "ecfd24b6a915463273972d22d969ec89cbbf2afe", - "externalIds": {"MAG": "1997385159", "DOI": "10.4236/SGRE.2011.22009", "CorpusId": - 55118152}, "url": "https://www.semanticscholar.org/paper/ecfd24b6a915463273972d22d969ec89cbbf2afe", - "title": "Polymer Electrolyte Membrane Fuel Cells (PEMFC) in Automotive Applications: - Environmental Relevance of the Manufacturing Stage", "abstract": "This study - presents a state of the art of several studies dealing with the environmental - impact assessment of fuel cell (FC) vehicles and the comparison with their - conventional fossil-fuelled counterparts, by means of the Life Cycle As-sessment - (LCA) methodology. Results declare that, depending on the systems characteristics, - there are numerous envi-ronmental advantages, but also some disadvantages - can be expected. In addition, the significance of the manufac-turing process - of the FC, more specifically the Polymer Electrolyte Membrane Fuel Cell (PEMFC) - type, in terms of environmental impact is presented. Finally, CIEMAT\u2019s - role in HYCHAIN European project, consisting of supporting early adopters - for hydrogen FCs in the transport sector, is highlighted", "venue": "", "year": - 2011, "referenceCount": 14, "citationCount": 49, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": - [{"category": "Engineering", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}, {"category": "Environmental Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-05-19", - "journal": {"name": "Smart Grid and Renewable Energy", "pages": "68-74", "volume": - "02"}, "authors": [{"authorId": "6280534", "name": "Daniel Garra\u00edn"}, - {"authorId": "4487317", "name": "Y. Lech\u00f3n"}, {"authorId": "4747349", - "name": "C. R\u00faa"}]}, {"paperId": "067d97b6d6cfca8b8a1f893367c62a5a0f3974f1", - "externalIds": {"MAG": "2293930388", "CorpusId": 61640713}, "url": "https://www.semanticscholar.org/paper/067d97b6d6cfca8b8a1f893367c62a5a0f3974f1", - "title": "The universal Turing machine (2nd ed.): a half-century survey", - "abstract": null, "venue": "", "year": 1995, "referenceCount": 0, "citationCount": - 24, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["Review"], "publicationDate": - "1995-01-02", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "6259065", "name": "R. Herken"}]}, {"paperId": "33c6d18f5b23840c040d4d009e07347b5774abda", - "externalIds": {"MAG": "2156678509", "DOI": "10.1007/S11097-009-9124-8", "CorpusId": - 15593064}, "url": "https://www.semanticscholar.org/paper/33c6d18f5b23840c040d4d009e07347b5774abda", - "title": "Thought translation, tennis and Turing tests in the vegetative state", - "abstract": null, "venue": "", "year": 2009, "referenceCount": 44, "citationCount": - 19, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}, - {"category": "Psychology", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2009-03-10", "journal": {"name": "Phenomenology - and the Cognitive Sciences", "pages": "361-370", "volume": "8"}, "authors": - [{"authorId": "2822070", "name": "J. Stins"}, {"authorId": "32092273", "name": - "Steven Laureys"}]}, {"paperId": "917b95219e4d350b195ade7878c135d3f15dd9ab", - "externalIds": {"MAG": "1521033242", "CorpusId": 221585623}, "url": "https://www.semanticscholar.org/paper/917b95219e4d350b195ade7878c135d3f15dd9ab", - "title": "Relations of Children''s Social Status to Their Emotionality and - Regulation: A Short-Term Longitudinal Study.", "abstract": "The relation of - 4to 6-year-olds'' sociometrlc status to teacheror peer-reported negative emotionality - and regulation was examined across two semesters (T1 and T2). Social status - at T2 was positively related to teacher-reported regulation and negatively - related to emotional intensity, as well as peer-reported anger and crying. - Regulation and emotionality (in combination) accounted for additional variance - in T2 social status after controlling for initial social preference. Initial - (T1) social status infrequently predicted subsequent regulation and emotionality - after controlling for scores on initial emotionality/regulation. Thus, emotionality/regulation - predicted fu ture social status whereas social status did not appear to account - for changes in emotionality and regulation over time. Social behavior (aggression) - did not mediate the relation of emotionality/regulation to later social status.", - "venue": "", "year": 1999, "referenceCount": 46, "citationCount": 84, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Psychology", - "source": "s2-fos-model"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1999-07-01", "journal": {"name": - "Merrill-palmer Quarterly", "pages": "7", "volume": "45"}, "authors": [{"authorId": - "6139843", "name": "P. Maszk"}, {"authorId": "15102546", "name": "N. Eisenberg"}, - {"authorId": "6544426", "name": "I. Guthrie"}]}, {"paperId": "5a2b42794d810ac8d5720ebcc0a3927977b58da3", - "externalIds": {"MAG": "2103969576", "DOI": "10.1017/S0024610701002083", "CorpusId": - 14135635}, "url": "https://www.semanticscholar.org/paper/5a2b42794d810ac8d5720ebcc0a3927977b58da3", - "title": "Solving the Word Problem in Real Time", "abstract": "The paper is - devoted to the study of groups whose word problem can be solved by a Turing - machine which operates in real time. A recent result of the first author for - word hyperbolic groups is extended to prove that under certain conditions - the generalised Dehn algorithms of Cannon, Goodman and Shapiro, which clearly - run in linear time, can be programmed on real\u2010time Turing machines. It - follows that word\u2010hyperbolic groups, finitely generated nilpotent groups - and geometrically finite hyperbolic groups all have real\u2010time word problems.", - "venue": "", "year": 2001, "referenceCount": 11, "citationCount": 18, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-06-01", - "journal": {"name": "Journal of the London Mathematical Society", "volume": - "63"}, "authors": [{"authorId": "32899890", "name": "D. Holt"}, {"authorId": - "145112601", "name": "Sarah Rees"}]}, {"paperId": "00cd2a7b5ffc7a9db84c47e2ae02a20151314115", - "externalIds": {"MAG": "1528027024", "DOI": "10.1007/978-1-4020-6710-5_19", - "CorpusId": 60596152}, "url": "https://www.semanticscholar.org/paper/00cd2a7b5ffc7a9db84c47e2ae02a20151314115", - "title": "The Turing Hub as a Standard for Turing Test Interfaces", "abstract": - null, "venue": "", "year": 2009, "referenceCount": 1, "citationCount": 8, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "319-324", "volume": ""}, "authors": [{"authorId": "120447134", "name": - "Robby G. Garner"}]}, {"paperId": "5d1d3b3fe834f66ffdb8c8855745038f52a58e4b", + "openAccessPdf": {"url": "http://www.pnas.org/content/49/4/572.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1963-04-01", "journal": {"name": "Proceedings + of the National Academy of Sciences of the United States of America", "pages": + "\n 572-80\n ", "volume": "49"}, "authors": [{"authorId": + "1973946", "name": "H. Hanafusa"}, {"authorId": "4892610", "name": "T. Hanafusa"}, + {"authorId": "50211488", "name": "H. Rubin"}]}, {"paperId": "5d1d3b3fe834f66ffdb8c8855745038f52a58e4b", "externalIds": {"MAG": "2890012362", "DOI": "10.1002/mp.13200", "CorpusId": - 52296408, "PubMed": "30229951"}, "url": "https://www.semanticscholar.org/paper/5d1d3b3fe834f66ffdb8c8855745038f52a58e4b", + 52296408, "PubMed": "30229951"}, "corpusId": 52296408, "publicationVenue": + {"id": "4e90b61b-3ae1-4b4c-9348-d67a3825e703", "name": "Medical Physics (Lancaster)", + "type": "journal", "alternate_names": ["Med Phys (lancaster", "Medical Physics", + "Med Phys"], "issn": "0094-2405", "url": "http://scitation.aip.org/content/aapm/journal/medphys", + "alternate_urls": ["https://www.medphys.org/"]}, "url": "https://www.semanticscholar.org/paper/5d1d3b3fe834f66ffdb8c8855745038f52a58e4b", "title": "Comparative evaluation of autocontouring in clinical practice: A practical method using the Turing test", "abstract": "PURPOSE\nAutomated techniques for estimating the contours of organs and structures in medical images have @@ -51675,409 +57840,48 @@ interactions: task-based assessments of contouring performance may be considered as an additional way of evaluating the clinical utility of autosegmentation methods.", "venue": "Medical Physics (Lancaster)", "year": 2018, "referenceCount": 31, "citationCount": - 41, "influentialCitationCount": 1, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine", "Computer Science"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Study"], "publicationDate": "2018-10-12", "journal": {"name": "Medical Physics", - "pages": "5105\u20135115", "volume": "45"}, "authors": [{"authorId": "2856658", - "name": "M. Gooding"}, {"authorId": "2158456263", "name": "Annamarie J. Smith"}, - {"authorId": "120536429", "name": "Maira Tariq"}, {"authorId": "1723210", - "name": "P. Aljabar"}, {"authorId": "3106573", "name": "D. Peressutti"}, {"authorId": - "11293526", "name": "Judith van der Stoep"}, {"authorId": "66065427", "name": - "B. Reymen"}, {"authorId": "12124931", "name": "D. Emans"}, {"authorId": "117431881", - "name": "D. Hattu"}, {"authorId": "40901021", "name": "J. V. van Loon"}, {"authorId": - "114011735", "name": "M. de Rooy"}, {"authorId": "152943161", "name": "R. - Wanders"}, {"authorId": "47682682", "name": "S. Peeters"}, {"authorId": "1808590", - "name": "T. Lustberg"}, {"authorId": "5673562", "name": "J. van Soest"}, {"authorId": - "48742163", "name": "A. Dekker"}, {"authorId": "134876172", "name": "W. V. - van Elmpt"}]}, {"paperId": "21dc457129b32bc391530f0195dad79869012b11", "externalIds": - {"MAG": "759033575", "DBLP": "conf/wirtschaftsinformatik/PiccininiGK15", "CorpusId": - 12698849}, "url": "https://www.semanticscholar.org/paper/21dc457129b32bc391530f0195dad79869012b11", - "title": "Changes in the Producer-Consumer Relationship - Towards Digital - Transformation", "abstract": "The purpose of this paper is to analyze shifts - in the producer- consumer relationship resulting from the increased use of - digital technologies. In this study, we aim to understand how this relationship - is fundamentally changing and the role of digital technologies in such a change. - Therefore, we provide a state-of-the-art review of information systems and - management litera- ture using analysis techniques borrowed from the method - of grounded theory. The results of our study indicate that the constructs - of digital density, digital in- terconnectedness, and consumer-centricity - are key drivers of changes in the producer-consumer relationship. With the - growing role of digital technologies in both society and organizations, our - study contributes with implications for information technology and business - managers, offering them insights on how to deal with this phenomenon. Finally, - our study provides a useful framework for future interdisciplinary research - in this field.", "venue": "Wirtschaftsinformatik", "year": 2015, "referenceCount": - 48, "citationCount": 80, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, - "journal": {"pages": "1634-1648"}, "authors": [{"authorId": "38091681", "name": - "E. Piccinini"}, {"authorId": "144584437", "name": "R. Gregory"}, {"authorId": - "1723311", "name": "L. Kolbe"}]}, {"paperId": "7d31b736a8a3ced7a74afac76445a689b7965722", - "externalIds": {"MAG": "2990671557", "DBLP": "journals/tcss/KongSWMWX19", - "DOI": "10.1109/TCSS.2019.2950445", "CorpusId": 209335640}, "url": "https://www.semanticscholar.org/paper/7d31b736a8a3ced7a74afac76445a689b7965722", - "title": "The Evolution of Turing Award Collaboration Network: Bibliometric-Level - and Network-Level Metrics", "abstract": "The year of 2017 for the 50th anniversary - of the Turing Award, which represents the top-level award in the computer - science field, is a milestone. We study the long-term evolution of the Turing - Award Collaboration Network, and it can be considered as a microcosm of the - computer science field from 1974 to 2016. First, scholars tend to publish - articles by themselves at the early stages, and they began to focus on tight - collaboration since the late 1980s. Second, compared with the same scale random - network, although the Turing Award Collaboration Network has small-world properties, - it is not a scale-free network. The reason may be that the number of collaborators - per scholar is limited. It is impossible for scholars to connect to others - freely (preferential attachment) as the scale-free network. Third, to measure - how far a scholar is from the Turing Award, we propose a metric called the - Turing Number (TN) and find that the TN decreases gradually over time. Meanwhile, - we discover the phenomenon that scholars prefer to gather into groups to do - research with the development of computer science. This article presents a - new way to explore the evolution of academic collaboration network in the - field of computer science by building and analyzing the Turing Award Collaboration - Network for decades.", "venue": "IEEE Transactions on Computational Social - Systems", "year": 2019, "referenceCount": 41, "citationCount": 11, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2019-12-01", "journal": {"name": "IEEE Transactions on - Computational Social Systems", "pages": "1318-1328", "volume": "6"}, "authors": - [{"authorId": "2123270", "name": "Xiangjie Kong"}, {"authorId": "2119038855", - "name": "Yajie Shi"}, {"authorId": "2158506071", "name": "Wei Wang"}, {"authorId": - "2075322213", "name": "Kai Ma"}, {"authorId": "144652877", "name": "Liangtian - Wan"}, {"authorId": "2066079415", "name": "Feng Xia"}]}, {"paperId": "6ea0a3292f89f329bf690eac9f5bb514403a06bd", - "externalIds": {"MAG": "1620999590", "CorpusId": 167071380}, "url": "https://www.semanticscholar.org/paper/6ea0a3292f89f329bf690eac9f5bb514403a06bd", - "title": "Towards a model for m-learning in Africa", "abstract": "Mobile learning - (m-learning) is a natural extension of e lec tronic learning (elearning) and - has the potential to make learning even more widely available and ac c essible - than we are used to in exist ing elearning environments. The role that c ommunic - ation and interac tion plays in the learning proc ess is a c rit ic al suc - c ess fac tor. It is within this c ontext that m-learning c an c ontribute - to the quality of educ ation. It offers opportunit ies the optimization of - interac tion between lec turers and learners, among learners, and among members - of c ommunit ies of prac tic e (COPs). Wire less and mobile tec hnologies - also make it possible to provide learning opportunit ies to learners that - are e ither without infrastruc ture for ac c ess (example rural learners) - or c ontinually on the move (example business professionals). This art ic - le shares the latest developments regarding a m-learning projec t in Afric - a and proposes a model for the implementation of m-learning in higher educ - ation in developing c ountries. Citation Brown, T .H. (2005). Towards a model - for m-learning in Afric a. International Journal on E-Learning, 4(3), 299-315. - Norfolk, VA: Assoc iat ion for the Advanc ement of Computing in Educ ation - (AACE). Retrieved July 23, 2018 from https://www.learntec hlib.org/primary/p/5082/. - \u00a9 2005 Association for the Advancement of Computing in Education (AACE)", - "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 227, "influentialCitationCount": - 22, "isOpenAccess": false, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": - [{"category": "Sociology", "source": "external"}, {"category": "Education", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "International journal on e-learning", "pages": "299-315", - "volume": "4"}, "authors": [{"authorId": "101451823", "name": "T. Brown"}]}, - {"paperId": "ad99decd59d6cbb79ec5945fdbe52ba0b86093ad", "externalIds": {"MAG": - "2120761283", "DOI": "10.1146/ANNUREV.PH.54.030192.003155", "CorpusId": 13155331, - "PubMed": "1562185"}, "url": "https://www.semanticscholar.org/paper/ad99decd59d6cbb79ec5945fdbe52ba0b86093ad", - "title": "Natural freeze tolerance in ectothermic vertebrates.", "abstract": - "Amphibians and reptiles living in seasonally cold regions of the earth face - several challenges to their continued survival. These include short summer - seasons for the development of eggs and juveniles, long periods of fasting - when food supplies are interrupted by winter, and months of cold exposure - at environmental temperatures often well below the freezing point (FP) of - their body fluids (21, 41, 64). This review focuses on one strategy of winter - cold hardiness: freeze tolerance. A number of terrestrially-hibernating reptiles - and amphibians have developed the ability to endure the freezing of extracellular - body fluids and can revive after days or weeks spent with as much as 65% of - their total body water locked in ice (41, 52, 61). All ectothermic vertebrates - living in seasonally cold regions of the earth seek the shelter of thennally-buffered, - relatively wann hibernacula. For most species, hibernation sites underwater - or deep underground position the an\u00ad imals to spend the winter without - fear of freezing (21, 41, 64). Various species, however, hibernate at sites - that are less well insulated; for example, several species of frogs hibernate - on the forest floor. Here, coverings of leaf litter and snow insulate animals - from the most extreme winter air tempera\u00ad tures, but extended periods - of subzero exposure, sometimes as low as -8\u00b0C, may occur (32, 35, 36). - Species hibernating in such sites need additional", "venue": "Annual Review - of Physiology", "year": 1992, "referenceCount": 38, "citationCount": 226, - "influentialCitationCount": 12, "isOpenAccess": false, "fieldsOfStudy": ["Biology", - "Medicine"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Medicine", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": null, "journal": {"name": "Annual review of physiology", - "pages": "\n 619-37\n ", "volume": "54"}, "authors": [{"authorId": - "1759136", "name": "K. Storey"}, {"authorId": "2456270", "name": "J. M. Storey"}]}, - {"paperId": "8558bdd72db6eb9e38452b62c00082a4467df805", "externalIds": {"ArXiv": - "1307.6236", "MAG": "1525936709", "DOI": "10.1088/1361-6544/aaa5dc", "CorpusId": - 118308682}, "url": "https://www.semanticscholar.org/paper/8558bdd72db6eb9e38452b62c00082a4467df805", - "title": "Dynamical spike solutions in a nonlocal model of pattern formation", - "abstract": "Coupling a reaction-diffusion equation with ordinary differential - equa- tions (ODE) may lead to diffusion-driven instability (DDI) which, in - contrast to the classical reaction-diffusion models, causes destabilization - of both, constant solutions and Turing patterns. Using a shadow-type limit - of a reaction-diffusion-ODE model, we show that in such cases the instability - driven by nonlocal terms (a counterpart of DDI) may lead to formation of unbounded - spike patterns.", "venue": "", "year": 2013, "referenceCount": 49, "citationCount": - 33, "influentialCitationCount": 3, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2013-07-23", "journal": {"name": "Nonlinearity", "pages": "1757 - 1781", - "volume": "31"}, "authors": [{"authorId": "1389565398", "name": "A. Marciniak-Czochra"}, - {"authorId": "103539569", "name": "Steffen H\u00e4rting"}, {"authorId": "101468044", - "name": "G. Karch"}, {"authorId": "2118679527", "name": "Kanako Suzuki"}]}, - {"paperId": "5221f7d99676aad66bfb22f4ec3dc99e4ffaded3", "externalIds": {"DBLP": - "journals/siamcomp/KoS85", "MAG": "1999609654", "DOI": "10.1137/0214003", - "CorpusId": 44916702}, "url": "https://www.semanticscholar.org/paper/5221f7d99676aad66bfb22f4ec3dc99e4ffaded3", - "title": "On Circuit-Size Complexity and the Low Hierarchy in NP", "abstract": - "Let A be a set having polynomial size circuits. If A is also known to be - in NP, then we may conclude that the graph of the polynomial size circuits - for A is actually in $\\Pi _2^p $. Using this observation, we show that sets - in NP which have polynomial size ciruits are in $L_3^p $, the third level - of the low hierarchy in NP. By a similar technique, we are able to show that - some other intuitively low sets in NP are in $L_2^p $, and even in a certain - refinement of $L_2^p $. As a consequence, sparse sets are not strong nondeterministic - polynomial time Turing complete in NP unless the polynomial time hierarchy - collapses to $\\Delta _2^p $.", "venue": "SIAM journal on computing (Print)", - "year": 1985, "referenceCount": 0, "citationCount": 88, "influentialCitationCount": - 4, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1985-02-01", "journal": - {"name": "SIAM J. Comput.", "pages": "41-51", "volume": "14"}, "authors": - [{"authorId": "1704334", "name": "K. Ko"}, {"authorId": "1737337", "name": - "U. Sch\u00f6ning"}]}, {"paperId": "0079d1ecc85eddf3c91758ec341ab8b67ba4f85a", - "externalIds": {"MAG": "2080263276", "DBLP": "conf/focs/KarpM67", "DOI": "10.1109/FOCS.1967.27", - "CorpusId": 45656285}, "url": "https://www.semanticscholar.org/paper/0079d1ecc85eddf3c91758ec341ab8b67ba4f85a", - "title": "Parallel Program Schemata: A Mathematical Model for Parallel Computation", - "abstract": "In this paper we report some results of a study on the range - of possible structure of programming languages. The main emphasis is on the - range of graphical (\"topological\" or flowchart) and syntactic structure. - For the sake of simplicity and precision we rather severely limit the \"semantic - structure\" of the languages--we restrict ourselves to command (instruction) - languages for Turing machines. As we show, this apparently strong limitation - imposes very little restriction on the graphical and syntactic structure. - The bulk of the paper consists of the presentation of six Turing machine languages. - These languages serve to illustrate the range of possible structure and, more - important, they allow us to establish the range of a number of structural - parameters. All the languages are universal in the sense that in each one - we can program every computable function. However, they differ greatly in - syntax, graphical structure, ease of compilation (assembly), and in the type - of machine, if any, which can operate directly in the language. In brief, - we present languages with finite-state, context-free and more complex syntax; - languages with \"conventional\" graphical structure, with block structure - and only one transfer per block, with only nested transfers (nested loops), - with transfers only to the immediately neighboring instructions, and with - only one transfer per program.", "venue": "Scandinavian Workshop on Algorithm - Theory", "year": 1967, "referenceCount": 6, "citationCount": 41, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", - "Conference"], "publicationDate": "1967-10-18", "journal": {"pages": "55-61"}, - "authors": [{"authorId": "47546648", "name": "R. Karp"}, {"authorId": "1400120462", - "name": "Raymond E. Miller"}]}, {"paperId": "cf51eed182a19cb84145b008d7bfa1508cbcb8bb", - "externalIds": {"MAG": "2081339104", "DBLP": "journals/siamcomp/KatajainenLP88", - "DOI": "10.1137/0217005", "CorpusId": 44842823}, "url": "https://www.semanticscholar.org/paper/cf51eed182a19cb84145b008d7bfa1508cbcb8bb", - "title": "Fast Simulation of Turing Machines by Random Access Machines", "abstract": - "We prove that a $T(n)$ time-bounded, $S(n)$ space-bounded and $U(n)$ output-length-bounded - Turing machine can be simulated in $O(T(n) + (n + U(n))\\log \\log S(n))$ - time by a random access machine (with no multiplication or division instructions) - under the logarithmic cost criterion.", "venue": "SIAM J. Comput.", "year": - 1988, "referenceCount": 0, "citationCount": 20, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1988-02-01", "journal": {"name": "SIAM J. Comput.", "pages": - "77-88", "volume": "17"}, "authors": [{"authorId": "2941885", "name": "J. - Katajainen"}, {"authorId": "143817739", "name": "J. V. Leeuwen"}, {"authorId": - "2021445", "name": "M. Penttonen"}]}, {"paperId": "0a6a104908d5bbe2e43932c0e2df68ed50c0c232", - "externalIds": {"MAG": "2054743028", "DOI": "10.1007/BF01163965", "CorpusId": - 121591613}, "url": "https://www.semanticscholar.org/paper/0a6a104908d5bbe2e43932c0e2df68ed50c0c232", - "title": "Solvability of the halting problem for certain classes of Turing - machines", "abstract": null, "venue": "", "year": 1973, "referenceCount": - 2, "citationCount": 29, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1973-06-01", "journal": {"name": "Mathematical notes - of the Academy of Sciences of the USSR", "pages": "537-541", "volume": "13"}, - "authors": [{"authorId": "3240213", "name": "L. Pavlotskaya"}]}, {"paperId": - "99e7ade723da4571118af3fc64b1b5ba41537762", "externalIds": {"MAG": "2989341948", - "ArXiv": "1911.01963", "CorpusId": 207780292}, "url": "https://www.semanticscholar.org/paper/99e7ade723da4571118af3fc64b1b5ba41537762", - "title": "Universality of Euler flows and flexibility of Reeb embeddings", - "abstract": "The dynamics of an inviscid and incompressible fluid flow on - a Riemannian manifold is governed by the Euler equations. Recently, Tao launched - a programme to address the global existence problem for the Euler and Navier - Stokes equations based on the concept of universality. In this article we - prove that the Euler equations exhibit universality features. More precisely, - we show that any non autonomous flow on a compact manifold can be extended - to a smooth solution of the Euler equations on some Riemannian manifold of - possibly higher dimension. The solutions we construct are stationary of Beltrami - type, so they exist for all time. Using this result, we establish the Turing - completeness of the Euler flows, i.e. that there exist solutions that encode - a universal Turing machine. The proofs exploit the correspondence between - contact topology and hydrodynamics, which allows us to import the flexibility - principles from the contact realm, in the form of holonomic h-principles for - isocontact embeddings.", "venue": "", "year": 2019, "referenceCount": 43, - "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2019-11-05", "journal": {"name": - "arXiv: Dynamical Systems", "volume": ""}, "authors": [{"authorId": "93622450", - "name": "R. Cardona"}, {"authorId": "143708365", "name": "E. Miranda"}, {"authorId": - "1399136591", "name": "D. Peralta-Salas"}, {"authorId": "66605906", "name": - "F. Presas"}]}, {"paperId": "fdec8dd4dc10a27d9afe908d857791739c92b3b9", "externalIds": - {"DBLP": "journals/mima/Herold03", "MAG": "1518063068", "DOI": "10.1023/A:1026204901999", - "CorpusId": 30047787}, "url": "https://www.semanticscholar.org/paper/fdec8dd4dc10a27d9afe908d857791739c92b3b9", - "title": "An Information Continuum Conjecture", "abstract": null, "venue": - "Minds and Machines", "year": 2003, "referenceCount": 54, "citationCount": - 12, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2003-11-01", "journal": - {"name": "Minds and Machines", "pages": "553-566", "volume": "13"}, "authors": - [{"authorId": "2612601", "name": "Ken Herold"}]}, {"paperId": "254e8a2432026e362e3b1b20c5fab5f460e116f5", - "externalIds": {"MAG": "2109102741", "DOI": "10.1177/074873048800300304", - "CorpusId": 86597693}, "url": "https://www.semanticscholar.org/paper/254e8a2432026e362e3b1b20c5fab5f460e116f5", - "title": "Circadian Temperature Rhythms in Relation to Menstrual Cycle Phase", - "abstract": "In order to describe circadian temperature rhythms in relation - to female ovulatory cycles, a study was conducted in which continuous rectal - temperature was monitored in healthy women at two phases of their menstrual - cycles. Results indicate that, in addition to an increase in the mesor, there - is a significant dampening of the temperature amplitude during the luteal - (postovulatory) phase compared to the follicular (preovulatory) phase. In - comparison with studies of male subjects, the average acrophase for females - may occur about 2 hr earlier. Results from this study provide descriptive - normative data, controlling for menstrual cycle phase, to which female clinical - populations can be compared. The use of circadian tempera ture rhythm as a - possible noninvasive diagnostic indicator of ovulation is also discussed.", - "venue": "", "year": 1988, "referenceCount": 22, "citationCount": 84, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1988-09-01", "journal": {"name": "Journal of Biological Rhythms", "pages": - "255 - 263", "volume": "3"}, "authors": [{"authorId": "48052893", "name": - "Kathryn A. Lee"}]}, {"paperId": "0a669efdf738e01195efed1e6aa25461787c3afd", - "externalIds": {"MAG": "1977013020", "DOI": "10.1007/BF00281202", "CorpusId": - 120254308}, "url": "https://www.semanticscholar.org/paper/0a669efdf738e01195efed1e6aa25461787c3afd", - "title": "Initial-boundary value problems for linear hyperbolic partial differential - equations of the second order", "abstract": null, "venue": "", "year": 1962, - "referenceCount": 19, "citationCount": 48, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Archive for Rational Mechanics and Analysis", "pages": - "361-400", "volume": "10"}, "authors": [{"authorId": "69560090", "name": "C. - Wilcox"}]}, {"paperId": "147dcdae1754b9764594ae7b180bb120a2da9f10", "externalIds": - {"MAG": "3012301499", "DOI": "10.1111/1440-1703.12102", "CorpusId": 216406832}, - "url": "https://www.semanticscholar.org/paper/147dcdae1754b9764594ae7b180bb120a2da9f10", - "title": "Quantifying sample completeness and comparing diversities among - assemblages", "abstract": "We develop a novel class of measures to quantify - sample completeness of a biological survey. The class of measures is parameterized - by an order q \u2265 0 to con-trol for sensitivity to species relative abundances. - When q = 0, species abundances are disregarded and our measure reduces to - the conventional measure of completeness, that is, the ratio of the observed - species richness to the true richness (observed plus undetected). When q = - 1, our measure reduces to the sample coverage (the proportion of the total - number of individuals in the entire assemblage that belongs to detected species), - a concept developed by Alan Turing in his cryptographic analysis. The sample - completeness of a general order q \u2265 0 extends Turing''s sample coverage - and quantifies the proportion of the assemblage''s individuals belonging to - detected species, with each individual being proportionally weighted by the - ( q \u2212 1)th power of its abundance. We propose the use of a continuous - profile depicting our proposed measures with respect to q \u2265 0 to characterize - the sample completeness of a survey. An analytic estimator of the diversity - profile and its sampling uncer-tainty based on a bootstrap method are derived - and tested by simulations. To compare diversity across multiple assemblages, - we propose an integrated approach based on the framework of Hill numbers to - assess (a) the sample completeness profile, (b) asymptotic diversity estimates - to infer true diversities of entire assemblages, (c) non-asymptotic standardization - via rarefaction and extrapolation, and (d) an evenness profile. Our framework - can be extended to incidence data. Empirical data sets from several research - fields are used for illustration.", "venue": "Ecological research", "year": - 2020, "referenceCount": 70, "citationCount": 63, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": - [{"category": "Geography", "source": "external"}, {"category": "Environmental - Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2020-03-01", "journal": {"name": "Ecological Research"}, "authors": [{"authorId": - "49642270", "name": "A. Chao"}, {"authorId": "4927638", "name": "Y. Kubota"}, - {"authorId": "5084750", "name": "D. Zelen\u00fd"}, {"authorId": "87455371", - "name": "Chun\u2010Huo Chiu"}, {"authorId": "46652142", "name": "Ching\u2010Feng - Li"}, {"authorId": "5435236", "name": "B. Kusumoto"}, {"authorId": "36556845", - "name": "M. Yasuhara"}, {"authorId": "40154634", "name": "S. Thorn"}, {"authorId": - "144749816", "name": "Chih\u2010Lin Wei"}, {"authorId": "49162252", "name": - "Mark John Costello"}, {"authorId": "2575768", "name": "Robert K. Colwell"}]}, - {"paperId": "8679596268d3868b03a9d8e2e68267d6e34d67bf", "externalIds": {"MAG": - "2969579176", "DBLP": "journals/mima/FloridiTT09", "DOI": "10.1007/s11023-008-9130-6", - "CorpusId": 7888490}, "url": "https://www.semanticscholar.org/paper/8679596268d3868b03a9d8e2e68267d6e34d67bf", - "title": "Turing\u2019s Imitation Game: Still an Impossible Challenge for - All Machines and Some Judges\u2013\u2013An Evaluation of the 2008 Loebner - Contest", "abstract": null, "venue": "Minds and Machines", "year": 2008, "referenceCount": - 7, "citationCount": 75, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-12-09", "journal": - {"name": "Minds and Machines", "pages": "145-150", "volume": "19"}, "authors": - [{"authorId": "1982425", "name": "L. Floridi"}, {"authorId": "2084659", "name": - "M. Taddeo"}, {"authorId": "1840916", "name": "M. Turilli"}]}, {"paperId": - "df681fd0a251db619b1e6e7f4c2815aec22182bc", "externalIds": {"DBLP": "journals/tec/OfriaAC02", - "MAG": "2167053763", "DOI": "10.1109/TEVC.2002.802442", "CorpusId": 1550626}, - "url": "https://www.semanticscholar.org/paper/df681fd0a251db619b1e6e7f4c2815aec22182bc", - "title": "Design of evolvable computer languages", "abstract": "We investigate - common design decisions for constructing a computational genetic language - in an autoadaptive system. Such languages must support self-replication and - are typically Turing-complete so as not to limit the types of computations - they can perform. We examine the importance of using templates to denote locations - in the genome, the methods by which those templates are located (direct-matching - versus complement-matching), methods used in the calculation of genome length - and the size and complexity of the language. For each test, we examine the - effects on the rate of evolution of the populations and isolate those factors - that contribute to it, most notably the organisms'' ability to withstand mutations.", - "venue": "IEEE Trans. Evol. Comput.", "year": 2002, "referenceCount": 24, - "citationCount": 48, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2002-08-01", "journal": {"name": "IEEE Trans. Evol. Comput.", "pages": "420-424", - "volume": "6"}, "authors": [{"authorId": "152559260", "name": "C. Ofria"}, - {"authorId": "145882965", "name": "C. Adami"}, {"authorId": "3281792", "name": - "T. Collier"}]}, {"paperId": "722c956cf7c2e2641acc43b0e5eac343d9da9b45", "externalIds": - {"MAG": "2116355217", "DOI": "10.11948/2011007", "CorpusId": 1315868}, "url": - "https://www.semanticscholar.org/paper/722c956cf7c2e2641acc43b0e5eac343d9da9b45", - "title": "CROSS-DIFFUSION INDUCED INSTABILITY AND STABILITY IN REACTION-DIFFUSION - SYSTEMS \u2044", "abstract": "In a reaction-difiusion system, difiusion can - induce the instability of a uniform equilibrium which is stable with respect - to a constant perturba- tion, as shown by Turing in 1950s. We show that cross-difiusion - can destabilize a uniform equilibrium which is stable for the kinetic and - self-difiusion reac- tion systems; on the other hand, cross-difiusion can - also stabilize a uniform equilibrium which is stable for the kinetic system - but unstable for the self- difiusion reaction system. Application is given - to predator-prey system with preytaxis and vegetation pattern formation in - a water-limited ecosystem.", "venue": "", "year": 2011, "referenceCount": - 52, "citationCount": 46, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-02-13", "journal": {"name": - "Journal of Applied Analysis and Computation", "pages": "95-120", "volume": - "1"}, "authors": [{"authorId": "1728518", "name": "Junping Shi"}, {"authorId": - "7654404", "name": "Zhifu Xie"}, {"authorId": "2065587425", "name": "Kristin - Little"}]}, {"paperId": "3a68f51e993059424a6d2b68afcfeaca0d1e0683", "externalIds": - {"MAG": "2051070652", "DOI": "10.1109/MAHC.1996.539923", "CorpusId": 19638021}, - "url": "https://www.semanticscholar.org/paper/3a68f51e993059424a6d2b68afcfeaca0d1e0683", - "title": "Collected works of A.M. Turing - morphogenesis", "abstract": "PEGGY - KIDWELL, EDITOR The Reviews Department includes reviews of putrlications, - films, audio and video tapes, and exhibits relating to the history of computing. - Full-length studies of technical, economic, business, and institutional aspects - or other works of interest to Annals readers are briefly noted, with appropriate - bibliographic information. Colleagues are encouraged to recommend works they - wish to review and to suggest titles to the Reviews Editor.", "venue": "IEEE - Annals of the History of Computing", "year": 1996, "referenceCount": 0, "citationCount": - 15, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "1996-10-01", "journal": {"name": "IEEE Annals - of the History of Computing", "pages": "69-", "volume": "18"}, "authors": - [{"authorId": "145324717", "name": "P. Kidwell"}]}, {"paperId": "70278b2f1199e4592f08c837a008d8c4eff206bc", - "externalIds": {"MAG": "2142506417", "DOI": "10.5194/BG-11-6633-2014", "CorpusId": - 52237962}, "url": "https://www.semanticscholar.org/paper/70278b2f1199e4592f08c837a008d8c4eff206bc", + 41, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://cris.maastrichtuniversity.nl/ws/files/74764312/Dekker_2018_Comparative_evaluation_of_autocontouring_in_clinical_practice.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Study"], "publicationDate": "2018-10-12", + "journal": {"name": "Medical Physics", "pages": "5105\u20135115", "volume": + "45"}, "authors": [{"authorId": "2856658", "name": "M. Gooding"}, {"authorId": + "2158456263", "name": "Annamarie J. Smith"}, {"authorId": "120536429", "name": + "Maira Tariq"}, {"authorId": "1723210", "name": "P. Aljabar"}, {"authorId": + "3106573", "name": "D. Peressutti"}, {"authorId": "11293526", "name": "Judith + van der Stoep"}, {"authorId": "66065427", "name": "B. Reymen"}, {"authorId": + "12124931", "name": "D. Emans"}, {"authorId": "117431881", "name": "D. Hattu"}, + {"authorId": "40901021", "name": "J. V. van Loon"}, {"authorId": "114011735", + "name": "M. de Rooy"}, {"authorId": "152943161", "name": "R. Wanders"}, {"authorId": + "47682682", "name": "S. Peeters"}, {"authorId": "1808590", "name": "T. Lustberg"}, + {"authorId": "5673562", "name": "J. van Soest"}, {"authorId": "48742163", + "name": "A. Dekker"}, {"authorId": "134876172", "name": "W. V. van Elmpt"}]}, + {"paperId": "74d731cf814140899bbf8d572993bdd5a69e81a0", "externalIds": {"PubMedCentral": + "5376694", "MAG": "2596792601", "DOI": "10.1186/s13036-017-0055-6", "CorpusId": + 15030361, "PubMed": "28392831"}, "corpusId": 15030361, "publicationVenue": + {"id": "7bb2b6aa-8682-44b5-99c3-dee7643f795a", "name": "Journal of Biological + Engineering", "type": "journal", "alternate_names": ["J Biological Eng"], + "issn": "1754-1611", "url": "http://www.jbioleng.org/", "alternate_urls": + ["http://www.jbioleng.org/home"]}, "url": "https://www.semanticscholar.org/paper/74d731cf814140899bbf8d572993bdd5a69e81a0", + "title": "Directing three-dimensional multicellular morphogenesis by self-organization + of vascular mesenchymal cells in hyaluronic acid hydrogels", "abstract": null, + "venue": "Journal of Biological Engineering", "year": 2017, "referenceCount": + 70, "citationCount": 17, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine", "Biology"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}, {"category": + "Materials Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-04-03", "journal": {"name": "Journal of Biological + Engineering", "volume": "11"}, "authors": [{"authorId": "46875475", "name": + "Xiaolu Zhu"}, {"authorId": "8619304", "name": "Shiva Gojgini"}, {"authorId": + "2226240", "name": "Ting-Hsuan Chen"}, {"authorId": "2060047627", "name": + "Peng Fei"}, {"authorId": "2113492430", "name": "Siyan Dong"}, {"authorId": + "48131405", "name": "Chih-Ming Ho"}, {"authorId": "5731120", "name": "T. Segura"}]}, + {"paperId": "70278b2f1199e4592f08c837a008d8c4eff206bc", "externalIds": {"MAG": + "2142506417", "DOI": "10.5194/BG-11-6633-2014", "CorpusId": 52237962}, "corpusId": + 52237962, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/70278b2f1199e4592f08c837a008d8c4eff206bc", "title": "Pasture degradation modifies the water and carbon cycles of the Tibetan highlands", "abstract": "The Tibetan Plateau has a significant role with re- gard to atmospheric circulation and the monsoon in partic- ular. @@ -52093,7 +57897,8 @@ interactions: three degradation stages affect the water and carbon cycle of pas- tures on the landscape scale within the core region of the", "venue": "", "year": 2014, "referenceCount": 192, "citationCount": 82, "influentialCitationCount": 1, - "isOpenAccess": true, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": + "isOpenAccess": true, "openAccessPdf": {"url": "https://www.biogeosciences.net/11/6633/2014/bg-11-6633-2014.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Environmental Science"], "s2FieldsOfStudy": [{"category": "Environmental Science", "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-12-02", "journal": {"name": "Biogeosciences", "pages": @@ -52115,184 +57920,308 @@ interactions: "name": "H. Graf"}, {"authorId": "88693907", "name": "C. Leuschner"}, {"authorId": "4361856", "name": "G. Guggenberger"}, {"authorId": "5797911", "name": "Y. Kuzyakov"}, {"authorId": "4769707", "name": "G. Miehe"}, {"authorId": "4402978", - "name": "T. Foken"}]}, {"paperId": "7cf35ba95946e8fe26869b770befc40a9c6a72cd", - "externalIds": {"DBLP": "journals/mima/SatoI04", "MAG": "2136991119", "DOI": - "10.1023/B:MIND.0000021747.28850.16", "CorpusId": 16816332}, "url": "https://www.semanticscholar.org/paper/7cf35ba95946e8fe26869b770befc40a9c6a72cd", - "title": "Undecidability in the Imitation Game", "abstract": null, "venue": - "Minds and Machines", "year": 2004, "referenceCount": 39, "citationCount": - 10, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2004-05-01", "journal": - {"name": "Minds and Machines", "pages": "133-143", "volume": "14"}, "authors": - [{"authorId": "2460650", "name": "Yuzuru Sato"}, {"authorId": "144465822", - "name": "T. Ikegami"}]}, {"paperId": "61c04a0d86743ba23e8652931361434ac2cf53c2", - "externalIds": {"MAG": "591953899", "CorpusId": 190853420}, "url": "https://www.semanticscholar.org/paper/61c04a0d86743ba23e8652931361434ac2cf53c2", - "title": "The Most Human Human: What Talking with Computers Teaches Us About - What It Means to Be Alive", "abstract": "Named for computer pioneer Alan Turing, - the Tur-ing Test convenes a panel of judges who pose questions\u2014ranging - anywhere from celebrity gossip to moral conundrums\u2014to hidden contestants - in an attempt to discern which is human and which is a computer. The machine - that most often fools the panel wins the Most Human Computer Award. But there - is also a prize, bizarre and intriguing, for the Most Human Human.", "venue": - "", "year": 2011, "referenceCount": 0, "citationCount": 34, "influentialCitationCount": - 5, "isOpenAccess": false, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy": [{"category": - "Art", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2011-03-01", "journal": {"name": - "", "volume": ""}, "authors": [{"authorId": "1904729", "name": "Brian R. Christian"}]}, - {"paperId": "4510d043ce4e0487c712697765b0edebe335b6e1", "externalIds": {"MAG": - "2038093353", "DBLP": "journals/bsl/Mol06", "DOI": "10.2178/bsl/1146620062", - "CorpusId": 26514956}, "url": "https://www.semanticscholar.org/paper/4510d043ce4e0487c712697765b0edebe335b6e1", - "title": "Closing the Circle: An Analysis of Emil Post''s Early Work", "abstract": - "In 1931 Kurt Godel published his incompleteness results, and some years later - Church and Turing showed that the decision problem for certain systems of - symbolic logic has a negative solution. However, already in 1921 the young - logician Emil Post worked on similar problems which resulted in what he called - an \u201canticipation\u201d of these results. For several reasons though he - did not submit these results to a journal until 1941. This failure \u2018to - be the first\u2019, did not discourage him: his contributions to mathematical - logic and its foundations should not be underestimated. It is the purpose - of this article to show that an interest in the early work of Emil Post should - be motivated not only by this historical fact, but also by the fact that Post''s - approach and method differs substantially from those offered by Godel, Turing - and Church. In this paper it will be shown how this method evolved in his - early work and how it finally led him to his results.", "venue": "Bulletin - of Symbolic Logic", "year": 2006, "referenceCount": 20, "citationCount": 24, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer + "name": "T. Foken"}]}, {"paperId": "ddb689c0d51d4273ee3a06ef3258a21ee78f8388", + "externalIds": {"MAG": "2144928438", "DOI": "10.1109/81.747195", "CorpusId": + 122820165}, "corpusId": 122820165, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ddb689c0d51d4273ee3a06ef3258a21ee78f8388", + "title": "Reaction-diffusion CNN algorithms to generate and control artificial + locomotion", "abstract": "In this paper a physiological-behavioral approach + to neural processing is used to realize artificial locomotion in mechatronic + devices. The task has been realized by using a particular model of reaction-diffusion + cellular neural networks (RD-CNN''s) generating autowave fronts as well as + Turing patterns. Moreover a programmable hardware cellular neural network + structure is presented in order to model, generate, and control in real time + some biorobots. The programmable hardware implementation gives the possibility + of generating locomotion in real time and also to control the transition among + several types of locomotion, with particular attention to hexapodes. The approach + proposed allows not only the design of walking robots, but also the ability + to build structures able to efficiently solve typical problems in industrial + automation, such as online routing of objects moved on conveyor belts.", "venue": + "", "year": 1999, "referenceCount": 19, "citationCount": 87, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Engineering"], + "s2FieldsOfStudy": [{"category": "Engineering", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Engineering", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1999-02-01", + "journal": {"name": "IEEE Transactions on Circuits and Systems I-regular Papers", + "pages": "253-260", "volume": "46"}, "authors": [{"authorId": "1679793", "name": + "P. Arena"}, {"authorId": "143998340", "name": "L. Fortuna"}, {"authorId": + "1877702", "name": "M. Branciforte"}]}, {"paperId": "aba09b2f13dd8b4c27622c64ca0a8e46a4ac450b", + "externalIds": {"MAG": "2076720753", "DBLP": "journals/synthese/King96", "DOI": + "10.1007/BF00413695", "CorpusId": 44077855}, "corpusId": 44077855, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/aba09b2f13dd8b4c27622c64ca0a8e46a4ac450b", + "title": "Is the human mind a Turing machine?", "abstract": null, "venue": + "Synthese", "year": 1996, "referenceCount": 19, "citationCount": 10, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-06-01", "journal": {"name": "Bull. - Symb. Log.", "pages": "267-289", "volume": "12"}, "authors": [{"authorId": - "152134130", "name": "L. D. Mol"}]}, {"paperId": "81d8c23d0d2bf7a2e07a0cfa7b8ba37564807697", - "externalIds": {"MAG": "2741836281", "DBLP": "journals/tnn/WuPZP18", "DOI": - "10.1109/TNNLS.2017.2726119", "CorpusId": 29450955, "PubMed": "28783641"}, - "url": "https://www.semanticscholar.org/paper/81d8c23d0d2bf7a2e07a0cfa7b8ba37564807697", - "title": "Spiking Neural P Systems With Polarizations", "abstract": "Spiking - neural P (SN P) systems are a class of parallel computation models inspired - by neurons, where the firing condition of a neuron is described by a regular - expression associated with spiking rules. However, it is NP-complete to decide - whether the number of spikes is in the length set of the language associated - with the regular expression. In this paper, in order to avoid using regular - expressions, two major and rather natural modifications in their form and - functioning are proposed: the spiking rules no longer check the number of - spikes in a neuron, but, in exchange, a polarization is associated with neurons - and rules, one of the three electrical charges \u2212, 0,+. Surprisingly enough, - the computing devices obtained are still computationally complete, which are - able to compute all Turing computable sets of natural numbers. On this basis, - the number of neurons in a universal SN P system with polarizations is estimated. - Several research directions are mentioned at the end of this paper.", "venue": - "IEEE Transactions on Neural Networks and Learning Systems", "year": 2018, - "referenceCount": 65, "citationCount": 85, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics", - "Medicine"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "external"}, {"category": - "Medicine", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2018-08-01", "journal": {"name": "IEEE Transactions on Neural Networks and - Learning Systems", "pages": "3349-3360", "volume": "29"}, "authors": [{"authorId": - "3361824", "name": "Tingfang Wu"}, {"authorId": "143936370", "name": "A. Paun"}, - {"authorId": "2118678125", "name": "Zhiqiang Zhang"}, {"authorId": "7356533", - "name": "L. Pan"}]}, {"paperId": "ab39ca30051c0c1fe9abc6b8bb82387ff1283752", - "externalIds": {"ArXiv": "patt-sol/9502007", "MAG": "2048633529", "DOI": "10.1103/PhysRevLett.75.1859", - "CorpusId": 2960159, "PubMed": "10060409"}, "url": "https://www.semanticscholar.org/paper/ab39ca30051c0c1fe9abc6b8bb82387ff1283752", - "title": "Aggregation Patterns in Stressed Bacteria.", "abstract": "We study - the formation of spot patterns seen in bacterial colonies when the bacteria - are subjected to oxidative stress due to hazardous by-products of respiration. - The cell density is coupled to a chemoattractant concentration as well as - to nutrient and waste fields. The model combines the propagation of a front - of motile bacterial radially outward from an initial site, a Turing instability - of the uniformly dense state, and a reduction of motility for cells sufficiently - far behind the front. The wide variety of patterns seen in the experiments - is reproduced by the model by varying the details of the initiation of the - chemoattractant emission as well as the transition to a nonmotile phase.", - "venue": "Physical Review Letters", "year": 1995, "referenceCount": 22, "citationCount": - 85, "influentialCitationCount": 4, "isOpenAccess": true, "fieldsOfStudy": - ["Chemistry", "Physics", "Biology", "Medicine"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "1995-02-24", "journal": - {"name": "Physical review letters", "pages": "\n 1859-1862\n ", - "volume": "75 9"}, "authors": [{"authorId": "29994081", "name": "Tsimring"}, - {"authorId": "113193936", "name": "Levine"}, {"authorId": "30190271", "name": - "Aranson"}, {"authorId": "1402852401", "name": "Ben-Jacob"}, {"authorId": - "121442665", "name": "Cohen"}, {"authorId": "30068853", "name": "Shochet"}, - {"authorId": "1399054750", "name": "Reynolds"}]}, {"paperId": "e28b5b611be04c2bc439581699f0fa701afd8499", - "externalIds": {"DBLP": "conf/aaai/ChenTW17", "MAG": "2604733145", "DOI": - "10.1609/aaai.v31i1.10564", "CorpusId": 15231223}, "url": "https://www.semanticscholar.org/paper/e28b5b611be04c2bc439581699f0fa701afd8499", - "title": "Bounded Rationality of Restricted Turing Machines", "abstract": - "\n \n Bounded rationality aims to understand the effects of how limited rationality - affects decision-making. The traditional models in game theory and multiagent - system research, such as finite automata or unrestricted Turing machine, fall - short of capturing how intelligent agents make decision in realistic applications. - To address this problem, we model bounded rational agents as restricted Turing - machines: restrictions on running time and on storage space. We study our - model under the context of two-person repeated games. In the case where the - running time of Turing machines is restricted, we show that computing the - best response of a given strategy is much harder than the strategy itself. - In the case where the storage space of the Turing machines is restricted, - we show the best response of a space restricted strategy can not be implemented - by machines within the same size (up to a constant factor). Finally, we study - how these restrictions affect the set of Nash equilibria in infinitely repeated - games.We show restricting the agent\u2019s computational resources will give - rise to new Nash equilibria.\n \n", "venue": "AAAI", "year": 2015, "referenceCount": - 47, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": true, + ["JournalArticle"], "publicationDate": "1996-09-01", "journal": {"name": "Synthese", + "pages": "379-389", "volume": "108"}, "authors": [{"authorId": "2065227492", + "name": "D. King"}]}, {"paperId": "d80e54d3cdde7c553b15891416c234b7594cb34e", + "externalIds": {"MAG": "2011202471", "DOI": "10.1364/OL.23.000346", "CorpusId": + 229219, "PubMed": "18084507"}, "corpusId": 229219, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/d80e54d3cdde7c553b15891416c234b7594cb34e", + "title": "Spatial solitary waves and patterns in type II second-harmonic generation.", + "abstract": "The existence of Turing patterns and of spatial solitary waves + that arise from a polarization instability of the fundamental field is predicted + in type II second-harmonic generation in a quadratically nonlinear optical + cavity. The analogy between these dissipative structures and those studied + in absorptive optical bistability is pointed out.", "venue": "Optics letters", + "year": 1998, "referenceCount": 15, "citationCount": 28, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Physics", + "Medicine"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1998-03-01", "journal": {"name": "Optics letters", "pages": "\n 346-8\n ", + "volume": "23 5"}, "authors": [{"authorId": "33098709", "name": "S. Longhi"}]}, + {"paperId": "c8d4fe39361511fd5e3f62104b1b7372157ac382", "externalIds": {"MAG": + "1998764658", "DOI": "10.1063/1.165881", "CorpusId": 2862610, "PubMed": "12779988"}, + "corpusId": 2862610, "publicationVenue": {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", + "name": "Chaos", "type": "journal", "issn": "1054-1500", "url": "http://chaos.aip.org/", + "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, "url": "https://www.semanticscholar.org/paper/c8d4fe39361511fd5e3f62104b1b7372157ac382", + "title": "Nonequilibrium dynamics in lattice ecosystems: Chaotic stability + and dissipative structures.", "abstract": "A generalized coupled map lattice + (CML) model of ecosystem dynamics is presented. We consider the spatiotemporal + behavior of a prey-predator map, a model of host-parasitoid interactions, + and two-species competition. The latter model can show phase separation of + domains (Turing-like structures) even when chaos is present. We also use this + CML model to explore the time evolution and structural properties of ecological + networks built with a set of N competing species. The May-Wigner criterion + is applied as a measure of stability, and some regularities in the stable + networks observed are discussed.", "venue": "Chaos", "year": 1992, "referenceCount": + 23, "citationCount": 49, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "1992-07-01", "journal": {"name": "Chaos", + "pages": "\n 387-395\n ", "volume": "2 3"}, "authors": [{"authorId": + "1706628", "name": "R. Sol\u00e9"}, {"authorId": "3001050", "name": "J. Bascompte"}, + {"authorId": "145539610", "name": "J. Valls"}]}, {"paperId": "f4115303ab214d9e988878bf8fa579a1999fb04a", + "externalIds": {"DBLP": "journals/corr/Greer14j", "MAG": "106547350", "ArXiv": + "1403.2541", "DOI": "10.1007/978-3-642-29694-9_3", "CorpusId": 16785010}, + "corpusId": 16785010, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f4115303ab214d9e988878bf8fa579a1999fb04a", + "title": "Turing: Then, Now and Still Key", "abstract": null, "venue": "Artificial + Intelligence, Evolutionary Computing and Metaheuristics", "year": 2014, "referenceCount": + 36, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1403.2541", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2015-05-04", "journal": {"pages": "1673-1674"}, "authors": [{"authorId": - "2184812", "name": "Lijie Chen"}, {"authorId": "34198278", "name": "Pingzhong - Tang"}, {"authorId": "2108693711", "name": "Ruosong Wang"}]}, {"paperId": - "c19e3ce023f0d12cbfa9cfe08895c769e3a0578c", "externalIds": {"MAG": "1549780988", - "DBLP": "conf/coco/Ambos-Spies86", "DOI": "10.1007/3-540-16486-3_87", "CorpusId": - 45965759}, "url": "https://www.semanticscholar.org/paper/c19e3ce023f0d12cbfa9cfe08895c769e3a0578c", - "title": "Randomness, Relativizations, and Polynomial Reducibilities", "abstract": - null, "venue": "Cybersecurity and Cyberforensics Conference", "year": 1986, - "referenceCount": 20, "citationCount": 49, "influentialCitationCount": 3, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1986-06-02", - "journal": {"pages": "23-34"}, "authors": [{"authorId": "1398717883", "name": - "K. Ambos-Spies"}]}, {"paperId": "b95ee423ed2357c25fa7db9a1d9359b60372a9e2", - "externalIds": {"CorpusId": 16599331}, "url": "https://www.semanticscholar.org/paper/b95ee423ed2357c25fa7db9a1d9359b60372a9e2", - "title": "Rounding-off errors in matrix processes Quart Universal Turing Machine", - "abstract": "Many futurists would agree that, had it not been for the Internet, - the evaluation of IPv4 might never have occurred. After years of private research - into replication, we verify the emulation of interrupts. In order to fulfill - this intent, we explore a novel system for the evaluation of architecture - (Nicety), showing that the much-tauted replicated algorithm for the refinement - of A* search by Garcia et al. is Turing complete.", "venue": "", "year": 2011, - "referenceCount": 245, "citationCount": 19, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "26a80bc3de0f880abf61dc873f2ff2f8cd0c9a03", - "externalIds": {"MAG": "1988158368", "DOI": "10.1112/S002461159800046X", "CorpusId": - 16488410}, "url": "https://www.semanticscholar.org/paper/26a80bc3de0f880abf61dc873f2ff2f8cd0c9a03", - "title": "Interpretability and Definability in the Recursively Enumerable - Degrees", "abstract": "We investigate definability in R, the recursively enumerable - Turing degrees, using codings of standard models of arithmetic (SMAs) as a - tool. First we show that an SMA can be interpreted in R without parameters. - Building on this, we prove that the recursively enumerable T\u2010degrees - satisfy a weak form of the bi\u2010interpretability conjecture which implies - that all jump classes Lown and Highn\u22121 n \u2a7e 2 are definable in R - without parameters and, more generally, that all relations on R that are definable - in arithmetic and invariant under the double jump are actually definable in - R. This partially answers Soare''s Question 3.7 (R. Soare, Recursively enumerable - sets and degrees (Springer, Berlin, 1987), Chapter XVI). 1991 Mathematics - Subject Classification: primary 03D25, 03D35; secondary 03D30.", "venue": - "", "year": 1998, "referenceCount": 92, "citationCount": 81, "influentialCitationCount": - 13, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-09-01", - "journal": {"name": "Proceedings of the London Mathematical Society", "volume": - "77"}, "authors": [{"authorId": "102253480", "name": "A. Nies"}, {"authorId": - "152648951", "name": "Ra Shore"}, {"authorId": "101556365", "name": "Ta Slaman"}]}, - {"paperId": "a7493603b52f35a882eb0436e390c1bcfd3fc8fa", "externalIds": {"MAG": - "2117832080", "DOI": "10.1177/002199838101500305", "CorpusId": 136779991}, - "url": "https://www.semanticscholar.org/paper/a7493603b52f35a882eb0436e390c1bcfd3fc8fa", + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2014-03-11", "journal": {"pages": "43-62"}, "authors": [{"authorId": "2243207", + "name": "Kieran R. C. Greer"}]}, {"paperId": "75ae39283b5e048eff36a36c072a106cca115b4e", + "externalIds": {"MAG": "2030178265", "DOI": "10.1007/s00345-006-0129-4", "CorpusId": + 14600527, "PubMed": "17077974"}, "corpusId": 14600527, "publicationVenue": + {"id": "11d0e58d-2fce-416e-945a-ea8815a278a1", "name": "World journal of urology", + "type": "journal", "alternate_names": ["World j urol", "World Journal of Urology", + "World J Urol"], "issn": "0724-4983", "url": "https://link.springer.com/journal/345"}, + "url": "https://www.semanticscholar.org/paper/75ae39283b5e048eff36a36c072a106cca115b4e", + "title": "Management of ejaculatory duct obstruction: etiology, diagnosis, + and treatment", "abstract": null, "venue": "World journal of urology", "year": + 2006, "referenceCount": 52, "citationCount": 43, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], + "publicationDate": "2006-11-01", "journal": {"name": "World Journal of Urology", + "pages": "604-610", "volume": "24"}, "authors": [{"authorId": "80915789", + "name": "H. Fisch"}, {"authorId": "47337621", "name": "S. Lambert"}, {"authorId": + "6551064", "name": "E. Goluboff"}]}, {"paperId": "e826abea3bf96de858a4e6a96688e7f94729794c", + "externalIds": {"MAG": "1908832089", "DOI": "10.3171/JNS.1963.20.6.0474", + "CorpusId": 9659255, "PubMed": "14193871"}, "corpusId": 9659255, "publicationVenue": + {"id": "e83e3600-6a07-4327-98ac-3a8a1b559b4f", "name": "Journal of Neurosurgery", + "type": "journal", "alternate_names": ["J Neurosurg"], "issn": "0022-3085", + "alternate_issns": ["1933-0693"], "url": "http://www.thejns.org/"}, "url": + "https://www.semanticscholar.org/paper/e826abea3bf96de858a4e6a96688e7f94729794c", + "title": "INTRACRANIAL TUMORS WITH EXTRACRANIAL METASTASES. CASE REPORT AND + REVIEW OF THE LITERATURE.", "abstract": "I N RECENT years m a n y repor t + s of i n t r a c ran ia l t u m o r s wi th ex t rac ran ia l me tas tases + have a p p e a r e d in the l i t e ra ture . M o s t of these cases have + been a d e q u a t e l y d o c u m e n t e d his to logical ly . L e y et + al. 52 in a r ecen t r e p o r t have p resen ted a good review of i n t r + ac r an i a l t u m o r s wi th me ta s t a se s ou t side the c ran ium. + W e were s t i m u l a t e d b y this rev iew to r e p o r t a case of our + own occurr ing in a child. L i t t l e emphas i s has been p laced upon the + occurrence of ex t racran ia l me ta s t a se s in ch i ldren in p rev ious + repor t s t h a t have appea red in t he l i t e ra ture . I n severa l of + t he r epor t s va r ious t y p e s of i n t r ac ran i a l t u m o r s have + been summar i zed , b u t no a t t e m p t has been m a d e to ana lyze t + h e m in g rea te r deta i l . I t is our i n t en t ion to review the l i + t e r a tu re of ex t r ac ran ia l me ta s t a se s wi th respec t to t y + p e s of tumors , age groups, and the i r preference for si tes of me tas + tases .", "venue": "Journal of Neurosurgery", "year": 1963, "referenceCount": + 53, "citationCount": 129, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "1963-06-01", + "journal": {"name": "Journal of neurosurgery", "pages": "\n 474-93\n ", + "volume": "20"}, "authors": [{"authorId": "3757045", "name": "F. Glasauer"}, + {"authorId": "48495942", "name": "R. Yuan"}]}, {"paperId": "21dc457129b32bc391530f0195dad79869012b11", + "externalIds": {"MAG": "759033575", "DBLP": "conf/wirtschaftsinformatik/PiccininiGK15", + "CorpusId": 12698849}, "corpusId": 12698849, "publicationVenue": {"id": "7d930c15-deaf-4d79-bdc9-578536903860", + "name": "Wirtschaftsinformatik", "type": "journal", "alternate_names": ["Wirtschaftsinformatik + und Angewandte Informatik", "Wirtsch Angew Inform"], "issn": "0937-6429", + "alternate_issns": ["1861-8936"], "url": "https://link.springer.com/journal/11576", + "alternate_urls": ["http://www.bise-journal.org/"]}, "url": "https://www.semanticscholar.org/paper/21dc457129b32bc391530f0195dad79869012b11", + "title": "Changes in the Producer-Consumer Relationship - Towards Digital + Transformation", "abstract": "The purpose of this paper is to analyze shifts + in the producer- consumer relationship resulting from the increased use of + digital technologies. In this study, we aim to understand how this relationship + is fundamentally changing and the role of digital technologies in such a change. + Therefore, we provide a state-of-the-art review of information systems and + management litera- ture using analysis techniques borrowed from the method + of grounded theory. The results of our study indicate that the constructs + of digital density, digital in- terconnectedness, and consumer-centricity + are key drivers of changes in the producer-consumer relationship. With the + growing role of digital technologies in both society and organizations, our + study contributes with implications for information technology and business + managers, offering them insights on how to deal with this phenomenon. Finally, + our study provides a useful framework for future interdisciplinary research + in this field.", "venue": "Wirtschaftsinformatik", "year": 2015, "referenceCount": + 48, "citationCount": 81, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Business", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], + "publicationDate": null, "journal": {"pages": "1634-1648"}, "authors": [{"authorId": + "38091681", "name": "E. Piccinini"}, {"authorId": "144584437", "name": "R. + Gregory"}, {"authorId": "1723311", "name": "L. Kolbe"}]}, {"paperId": "6f888bcc79541c758b0a989a6d11a654bb865b6e", + "externalIds": {"CorpusId": 235351418}, "corpusId": 235351418, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6f888bcc79541c758b0a989a6d11a654bb865b6e", + "title": "Toward an Ecology of Gaming", "abstract": "1954. West Germany gains + an unexpected 3-2 victory over Hungary in the World Cup, known from then on + as The Miracle of Bern. Officials announce that an American hydrogen bomb + test had been conducted on Bikini Atoll in the Pacific Ocean. Marilyn Monroe + weds Joe DiMaggio. The Geneva Conference partitions Vietnam into North Vietnam + and South Vietnam. Mathematician Alan Turing commits suicide. \u201cGaming + as a Technique of Analysis\u201d is released, praising games as designed models + with which to think. When viewed from this perspective, 1954 looks a lot like + 2007: a year of instability and transformation on the world stage, a year + shadowed by the promise and threat of competing ideologies, a year colored + by fear, hope, and the advent of new technology. 1954 was also a year, like + this year, when games entered the popular lexicon and man the player was seized + upon as a harbinger of change. By 1954, Piaget had mapped the moral judgment + of a child through a study of his or her coming to know the rules of a game;2 + Turing had contributed", "venue": "", "year": 2007, "referenceCount": 23, + "citationCount": 40, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2558419", "name": "Katie + Salen"}]}, {"paperId": "4a5135de004ac95cf379e9a4c1372afaee9837c5", "externalIds": + {"DBLP": "conf/fps/Tikhomirov17", "MAG": "2760843627", "DOI": "10.1007/978-3-319-75650-9_14", + "CorpusId": 3423063}, "corpusId": 3423063, "publicationVenue": {"id": "a7d9aff7-0850-4053-9c09-23ae27cc405b", + "name": "Foundations and Practice of Security", "type": "conference", "alternate_names": + ["Found Pract Secur", "FPS"], "url": "http://www.wikicfp.com/cfp/program?id=1085"}, + "url": "https://www.semanticscholar.org/paper/4a5135de004ac95cf379e9a4c1372afaee9837c5", + "title": "Ethereum: State of Knowledge and Research Perspectives", "abstract": + null, "venue": "Foundations and Practice of Security", "year": 2017, "referenceCount": + 61, "citationCount": 49, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "https://orbilu.uni.lu/bitstream/10993/32468/3/ethereum-sok.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Business", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Business", "source": "external"}, {"category": "Computer Science", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2017-10-23", "journal": + {"pages": "206-221"}, "authors": [{"authorId": "1517644019", "name": "S. Tikhomirov"}]}, + {"paperId": "cf51eed182a19cb84145b008d7bfa1508cbcb8bb", "externalIds": {"MAG": + "2081339104", "DBLP": "journals/siamcomp/KatajainenLP88", "DOI": "10.1137/0217005", + "CorpusId": 44842823}, "corpusId": 44842823, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/cf51eed182a19cb84145b008d7bfa1508cbcb8bb", + "title": "Fast Simulation of Turing Machines by Random Access Machines", "abstract": + "We prove that a $T(n)$ time-bounded, $S(n)$ space-bounded and $U(n)$ output-length-bounded + Turing machine can be simulated in $O(T(n) + (n + U(n))\\log \\log S(n))$ + time by a random access machine (with no multiplication or division instructions) + under the logarithmic cost criterion.", "venue": "SIAM J. Comput.", "year": + 1988, "referenceCount": 0, "citationCount": 20, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://dspace.library.uu.nl/bitstream/1874/16296/1/katajainen_85_fast_simulation.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1988-02-01", "journal": {"name": "SIAM J. Comput.", "pages": + "77-88", "volume": "17"}, "authors": [{"authorId": "2941885", "name": "J. + Katajainen"}, {"authorId": "143817739", "name": "J. V. Leeuwen"}, {"authorId": + "2021445", "name": "M. Penttonen"}]}, {"paperId": "3e284b14f1f74f37119c76c2faa8d130bf9f7023", + "externalIds": {"MAG": "2079779075", "DOI": "10.1063/1.4825379", "CorpusId": + 22063676, "PubMed": "24182005"}, "corpusId": 22063676, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/3e284b14f1f74f37119c76c2faa8d130bf9f7023", + "title": "Control of Turing patterns and their usage as sensors, memory arrays, + and logic gates.", "abstract": "We study a model system of three diffusively + coupled reaction cells arranged in a linear array that display Turing patterns + with special focus on the case of equal coupling strength for all components. + As a suitable model reaction we consider a two-variable core model of glycolysis. + Using numerical continuation and bifurcation techniques we analyze the dependence + of the system''s steady states on varying rate coefficient of the recycling + step while the coupling coefficients of the inhibitor and activator are fixed + and set at the ratios 100:1, 1:1, and 4:5. We show that stable Turing patterns + occur at all three ratios but, as expected, spontaneous transition from the + spatially uniform steady state to the spatially nonuniform Turing patterns + occurs only in the first case. The other two cases possess multiple Turing + patterns, which are stabilized by secondary bifurcations and coexist with + stable uniform periodic oscillations. For the 1:1 ratio we examine modular + spatiotemporal perturbations, which allow for controllable switching between + the uniform oscillations and various Turing patterns. Such modular perturbations + are then used to construct chemical computing devices utilizing the multiple + Turing patterns. By classifying various responses we propose: (a) a single-input + resettable sensor capable of reading certain value of concentration, (b) two-input + and three-input memory arrays capable of storing logic information, (c) three-input, + three-output logic gates performing combinations of logical functions OR, + XOR, AND, and NAND.", "venue": "The Journal of chemical physics", "year": + 2013, "referenceCount": 45, "citationCount": 11, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", + "Medicine"], "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2013-10-23", "journal": {"name": "The Journal of chemical physics", "pages": + "\n 164108\n ", "volume": "139 16"}, "authors": [{"authorId": + "11947862", "name": "F. Muzika"}, {"authorId": "1995243", "name": "I. Schreiber"}]}, + {"paperId": "bb50adb34efc634245ca0c34f19e5bb01dd228ad", "externalIds": {"ArXiv": + "1201.4417", "MAG": "1984132430", "DOI": "10.1103/PhysRevE.85.026215", "CorpusId": + 13632717, "PubMed": "22463307"}, "corpusId": 13632717, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/bb50adb34efc634245ca0c34f19e5bb01dd228ad", + "title": "Instabilities and patterns in coupled reaction-diffusion layers.", + "abstract": "We study instabilities and pattern formation in reaction-diffusion + layers that are diffusively coupled. For two-layer systems of identical two-component + reactions, we analyze the stability of homogeneous steady states by exploiting + the block symmetric structure of the linear problem. There are eight possible + primary bifurcation scenarios, including a Turing-Turing bifurcation that + involves two disparate length scales whose ratio may be tuned via the interlayer + coupling. For systems of n-component layers and nonidentical layers, the linear + problem''s block form allows approximate decomposition into lower-dimensional + linear problems if the coupling is sufficiently weak. As an example, we apply + these results to a two-layer Brusselator system. The competing length scales + engineered within the linear problem are readily apparent in numerical simulations + of the full system. Selecting a sqrt[2]:1 length-scale ratio produces an unusual + steady square pattern.", "venue": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "year": 2012, "referenceCount": 17, "citationCount": + 25, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://link.aps.org/pdf/10.1103/PhysRevE.85.026215", "status": "HYBRID"}, + "fieldsOfStudy": ["Physics", "Medicine", "Mathematics"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-01-21", "journal": {"name": "Physical review. E, + Statistical, nonlinear, and soft matter physics", "pages": "\n 026215\n ", + "volume": "85 2 Pt 2"}, "authors": [{"authorId": "1896425", "name": "Anne + J. Catll\u00e1"}, {"authorId": "2057835560", "name": "Amelia McNamara"}, {"authorId": + "1949686", "name": "C. Topaz"}]}, {"paperId": "648c691fa45cd76149a0e597a97aa5ebdfac4e81", + "externalIds": {"MAG": "2006152057", "DOI": "10.1136/bmj.328.7448.1139-a", + "CorpusId": 62566304}, "corpusId": 62566304, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/648c691fa45cd76149a0e597a97aa5ebdfac4e81", + "title": "Autism and Creativity: Is there a Link between Autism in Men and + Exceptional Ability?", "abstract": "Michael Fitzgerald\n\nBrunner-Routledge, + \u00a329.99/$47.95\n\npp 304 ISBN 1 58391 213 4\n\nRating:![Graphic][1] ![Graphic][2] + ![Graphic][3] \n\nWe hear a lot about autism these days, usually in connection + with its devastatingly early onset and bleak prognosis. It is therefore of + interest when a recognised authority on the subject claims that most of those + whom he cites as \u201cthe intellectual giants of the twentieth century\u201d + (including Einstein, Freud, Yeats, the philosophers Russell and Wittgenstein, + and the mathematicians Ramanujan and Turing) had high functioning autism or + \u2026\n\n [1]: /embed/inline-graphic-1.gif\n [2]: /embed/inline-graphic-2.gif\n + [3]: /embed/inline-graphic-3.gif", "venue": "BMJ : British Medical Journal", + "year": 2004, "referenceCount": 0, "citationCount": 50, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "http://europepmc.org/articles/pmc406373?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Philosophy", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-05-06", + "journal": {"name": "BMJ : British Medical Journal", "pages": "1139", "volume": + "328"}, "authors": [{"authorId": "6693916", "name": "I. Mcclure"}]}, {"paperId": + "a7493603b52f35a882eb0436e390c1bcfd3fc8fa", "externalIds": {"MAG": "2117832080", + "DOI": "10.1177/002199838101500305", "CorpusId": 136779991}, "corpusId": 136779991, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a7493603b52f35a882eb0436e390c1bcfd3fc8fa", "title": "Stresses in Adhesively Bonded Joints: A Closed-Form Solution", "abstract": "In this paper the general plane strain problem of adhesively bonded struc tures which consist of two different orthotropic adherends is considered. @@ -52315,13 +58244,888 @@ interactions: In the Ap pendix the problem is formulated by using a nonlinear material for the adhesive and by following two different approaches.", "venue": "", "year": 1980, "referenceCount": 20, "citationCount": 226, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + 5, "isOpenAccess": true, "openAccessPdf": {"url": "https://ntrs.nasa.gov/api/citations/19810002912/downloads/19810002912.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1980-08-01", "journal": {"name": "Journal of Composite Materials", "pages": "249 - 271", "volume": "15"}, "authors": [{"authorId": "97781161", "name": "F. Delale"}, {"authorId": "152610200", "name": "F. Erdogan"}, {"authorId": - "102778768", "name": "M. N. Ayd\u0131no\u011flu"}]}]} + "102778768", "name": "M. N. Ayd\u0131no\u011flu"}]}, {"paperId": "81d8c23d0d2bf7a2e07a0cfa7b8ba37564807697", + "externalIds": {"MAG": "2741836281", "DBLP": "journals/tnn/WuPZP18", "DOI": + "10.1109/TNNLS.2017.2726119", "CorpusId": 29450955, "PubMed": "28783641"}, + "corpusId": 29450955, "publicationVenue": {"id": "79c5a18d-0295-432c-aaa5-961d73de6d88", + "name": "IEEE Transactions on Neural Networks and Learning Systems", "alternate_names": + ["IEEE Trans Neural Netw Learn Syst"], "issn": "2162-237X", "url": "http://ieeexplore.ieee.org/servlet/opac?punumber=5962385", + "alternate_urls": ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5962385"]}, + "url": "https://www.semanticscholar.org/paper/81d8c23d0d2bf7a2e07a0cfa7b8ba37564807697", + "title": "Spiking Neural P Systems With Polarizations", "abstract": "Spiking + neural P (SN P) systems are a class of parallel computation models inspired + by neurons, where the firing condition of a neuron is described by a regular + expression associated with spiking rules. However, it is NP-complete to decide + whether the number of spikes is in the length set of the language associated + with the regular expression. In this paper, in order to avoid using regular + expressions, two major and rather natural modifications in their form and + functioning are proposed: the spiking rules no longer check the number of + spikes in a neuron, but, in exchange, a polarization is associated with neurons + and rules, one of the three electrical charges \u2212, 0,+. Surprisingly enough, + the computing devices obtained are still computationally complete, which are + able to compute all Turing computable sets of natural numbers. On this basis, + the number of neurons in a universal SN P system with polarizations is estimated. + Several research directions are mentioned at the end of this paper.", "venue": + "IEEE Transactions on Neural Networks and Learning Systems", "year": 2018, + "referenceCount": 65, "citationCount": 85, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2018-08-01", "journal": {"name": "IEEE Transactions on Neural Networks and + Learning Systems", "pages": "3349-3360", "volume": "29"}, "authors": [{"authorId": + "3361824", "name": "Tingfang Wu"}, {"authorId": "143936370", "name": "A. Paun"}, + {"authorId": "2118678125", "name": "Zhiqiang Zhang"}, {"authorId": "7356533", + "name": "L. Pan"}]}, {"paperId": "ab39ca30051c0c1fe9abc6b8bb82387ff1283752", + "externalIds": {"ArXiv": "patt-sol/9502007", "MAG": "2048633529", "DOI": "10.1103/PhysRevLett.75.1859", + "CorpusId": 2960159, "PubMed": "10060409"}, "corpusId": 2960159, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/ab39ca30051c0c1fe9abc6b8bb82387ff1283752", + "title": "Aggregation Patterns in Stressed Bacteria.", "abstract": "We study + the formation of spot patterns seen in bacterial colonies when the bacteria + are subjected to oxidative stress due to hazardous by-products of respiration. + The cell density is coupled to a chemoattractant concentration as well as + to nutrient and waste fields. The model combines the propagation of a front + of motile bacterial radially outward from an initial site, a Turing instability + of the uniformly dense state, and a reduction of motility for cells sufficiently + far behind the front. The wide variety of patterns seen in the experiments + is reproduced by the model by varying the details of the initiation of the + chemoattractant emission as well as the transition to a nonmotile phase.", + "venue": "Physical Review Letters", "year": 1995, "referenceCount": 22, "citationCount": + 85, "influentialCitationCount": 4, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/patt-sol/9502007", "status": "GREEN"}, "fieldsOfStudy": + ["Chemistry", "Physics", "Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1995-02-24", "journal": + {"name": "Physical review letters", "pages": "\n 1859-1862\n ", + "volume": "75 9"}, "authors": [{"authorId": "29994081", "name": "Tsimring"}, + {"authorId": "113193936", "name": "Levine"}, {"authorId": "30190271", "name": + "Aranson"}, {"authorId": "1402852401", "name": "Ben-Jacob"}, {"authorId": + "121442665", "name": "Cohen"}, {"authorId": "30068853", "name": "Shochet"}, + {"authorId": "1399054750", "name": "Reynolds"}]}, {"paperId": "af76eb6d8ca0a5bcc743f890784efe3545b2f330", + "externalIds": {"DBLP": "journals/siamsc/StrychalskiAE10", "MAG": "2046313315", + "DOI": "10.1137/090779693", "CorpusId": 207059783, "PubMed": "24086102"}, + "corpusId": 207059783, "publicationVenue": {"id": "0e3b51a7-21d8-477c-8918-14a55f087532", + "name": "SIAM Journal on Scientific Computing", "type": "journal", "alternate_names": + ["SIAM J Sci Comput"], "issn": "1064-8275", "url": "http://www.siam.org/journals/sisc.php", + "alternate_urls": ["https://epubs.siam.org/journal/sjoce3"]}, "url": "https://www.semanticscholar.org/paper/af76eb6d8ca0a5bcc743f890784efe3545b2f330", + "title": "Simulating Biochemical Signaling Networks in Complex Moving Geometries", + "abstract": "Signaling networks regulate cellular responses to environmental + stimuli through cascades of protein interactions. External signals can trigger + cells to polarize and move in a specific direction. During migration, spatially + localized activity of proteins is maintained. To investigate the effects of + morphological changes on intracellular signaling, we developed a numerical + scheme consisting of a cut cell finite volume spatial discretization coupled + with level set methods to simulate the resulting advection-reaction-diffusion + system. We then apply the method to several biochemical reaction networks + in changing geometries. We found that a Turing instability can develop exclusively + by cell deformations that maintain constant area. For a Turing system with + a geometry-dependent single or double peak solution, simulations in a dynamically + changing geometry suggest that a single peak solution is the only stable one, + independent of the oscillation frequency. The method is also applied to a + model of a signaling network in a migrating fibroblast.", "venue": "SIAM Journal + on Scientific Computing", "year": 2010, "referenceCount": 58, "citationCount": + 24, "influentialCitationCount": 1, "isOpenAccess": true, "openAccessPdf": + {"url": "https://europepmc.org/articles/pmc3786195?pdf=render", "status": + "GREEN"}, "fieldsOfStudy": ["Medicine", "Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-08-01", "journal": {"name": "SIAM + journal on scientific computing : a publication of the Society for Industrial + and Applied Mathematics", "pages": "\n 3039-3070\n ", "volume": + "32 5"}, "authors": [{"authorId": "3100210", "name": "Wanda Strychalski"}, + {"authorId": "2273117", "name": "D. Adalsteinsson"}, {"authorId": "1742750", + "name": "T. Elston"}]}, {"paperId": "6b0f5f662cc167e705f606a66dc646067dbd5ded", + "externalIds": {"DBLP": "conf/aina/HuangHC13", "MAG": "1976187435", "DOI": + "10.1109/WAINA.2013.94", "CorpusId": 18581485}, "corpusId": 18581485, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/6b0f5f662cc167e705f606a66dc646067dbd5ded", + "title": "A DDoS Mitigation System with Multi-stage Detection and Text-Based + Turing Testing in Cloud Computing", "abstract": "An important trend in the + computer science is towards Cloud Computing and we can see that many cloud + services are proposed and developed in the Internet. An important cloud service + like the IaaS as AWS EC2 can help many companies to build data centers with + high performance computing resources and reduce the cost of maintaining the + computing hardware. A data center which provides internet service may suffer + from many security risks including Distributed Denial of Service (DDOS) attack. + We believe that most of the cloud services, like Gmail, Drop box, Google Document, + and etc., are based on HTTP connection. Hence, we aim at HTTP-based connection + and propose a low reflection ratio mitigation system against the DDoS attacks. + Our system is in the front of an IaaS that all of the virtual data centers + in the IaaS are our protection targets. Our system consists of Source Checking, + Counting, Attack Detection, Turing Test, and Question Generation modules. + We provide a multi-stage detection to more precisely detect the possible attackers + and a text-based turing test with question generation module to challenge + the suspected requesters who are detected by the detection module. We implemented + the proposed system and evaluated the performance to show that our system + works efficiently to mitigate the DDoS traffic from the Internet.", "venue": + "2013 27th International Conference on Advanced Information Networking and + Applications Workshops", "year": 2013, "referenceCount": 34, "citationCount": + 36, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "2013-03-25", "journal": {"name": "2013 27th International + Conference on Advanced Information Networking and Applications Workshops", + "pages": "655-662"}, "authors": [{"authorId": "32704744", "name": "V. S. Huang"}, + {"authorId": "2107753977", "name": "Robert Huang"}, {"authorId": "2060384612", + "name": "M. Chiang"}]}, {"paperId": "722c956cf7c2e2641acc43b0e5eac343d9da9b45", + "externalIds": {"MAG": "2116355217", "DOI": "10.11948/2011007", "CorpusId": + 1315868}, "corpusId": 1315868, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/722c956cf7c2e2641acc43b0e5eac343d9da9b45", + "title": "CROSS-DIFFUSION INDUCED INSTABILITY AND STABILITY IN REACTION-DIFFUSION + SYSTEMS \u2044", "abstract": "In a reaction-difiusion system, difiusion can + induce the instability of a uniform equilibrium which is stable with respect + to a constant perturba- tion, as shown by Turing in 1950s. We show that cross-difiusion + can destabilize a uniform equilibrium which is stable for the kinetic and + self-difiusion reac- tion systems; on the other hand, cross-difiusion can + also stabilize a uniform equilibrium which is stable for the kinetic system + but unstable for the self- difiusion reaction system. Application is given + to predator-prey system with preytaxis and vegetation pattern formation in + a water-limited ecosystem.", "venue": "", "year": 2011, "referenceCount": + 52, "citationCount": 47, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": + "Physics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2011-02-13", "journal": {"name": + "Journal of Applied Analysis and Computation", "pages": "95-120", "volume": + "1"}, "authors": [{"authorId": "1728518", "name": "Junping Shi"}, {"authorId": + "7654404", "name": "Zhifu Xie"}, {"authorId": "2065587425", "name": "Kristin + Little"}]}, {"paperId": "fdec8dd4dc10a27d9afe908d857791739c92b3b9", "externalIds": + {"DBLP": "journals/mima/Herold03", "MAG": "1518063068", "DOI": "10.1023/A:1026204901999", + "CorpusId": 30047787}, "corpusId": 30047787, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/fdec8dd4dc10a27d9afe908d857791739c92b3b9", + "title": "An Information Continuum Conjecture", "abstract": null, "venue": + "Minds and Machines", "year": 2003, "referenceCount": 54, "citationCount": + 12, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2003-11-01", "journal": {"name": "Minds and Machines", "pages": "553-566", + "volume": "13"}, "authors": [{"authorId": "2612601", "name": "Ken Herold"}]}, + {"paperId": "00af412227e2a5679535eb154b02e20def094e0d", "externalIds": {"MAG": + "2075643946", "DOI": "10.2307/1379257", "CorpusId": 84857545}, "corpusId": + 84857545, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/00af412227e2a5679535eb154b02e20def094e0d", + "title": "Habitat Use and Social Organization of Nine Sympatric Species of + Macropodid Marsupials", "abstract": "Nine species of macropods were observed + on 5.2 square kilometers in northeastern New South Wales. The terrain was + hilly and covered with a mosaic of closed-forest, open-forest (much of it + extensively ringbarked), and cleared pas- ture land. Most of the species were + narrowly restricted to particular habitats, but the whiptail wallaby used + all but the closed-forest, and the red-necked wallaby used even that to a + limited extent. All nine species grazed on native and introduced pas- ture + plants, and some also browsed. Most were nocturnal, but the grey kangaroo + and especially the whiptail wallaby were also active during the day. These + two species were also the most social. Local populations of both species were + divided into discrete social units or mobs, whose members gathered in subgroups + of varying size and composition. Scrub wallabies and rock wallabies are apparently + also social; the other species are essentially solitary. The larger species + in more open habitat grazed and rested together peacefully. The successful + sympatry of these species was due largely to the diversity and interspersion + of habitats; more detailed information is needed on their food habits. Their + respective levels of sociality reflected each species'' combination of group-facilitating + adaptations.", "venue": "", "year": 1974, "referenceCount": 6, "citationCount": + 41, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1974-03-30", "journal": {"name": + "Journal of Mammalogy", "pages": "66-80", "volume": "55"}, "authors": [{"authorId": + "51884711", "name": "J. H. Kaufmann"}]}, {"paperId": "c47f9d2da6da7a44035fa3c3f13447ac924c450c", + "externalIds": {"CorpusId": 5388078}, "corpusId": 5388078, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/c47f9d2da6da7a44035fa3c3f13447ac924c450c", + "title": "Handwritten essay : Nature of Spirit Universal Turing Machine", + "abstract": "Hackers worldwide agree that unstable communication are an interesting + new topic in the field of signed algorithms, an d physicists concur. After + years of structured research into flipflop gates, we prove the synthesis of + RAID, which embodies the intuitive principles of artificial intelligence. + FERWE T, our new system for event-driven archetypes, is the solution to a + ll of these challenges.", "venue": "", "year": 2011, "referenceCount": 248, + "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2094634987", + "name": "R. I. P. A. B. Hackers"}]}, {"paperId": "254e8a2432026e362e3b1b20c5fab5f460e116f5", + "externalIds": {"MAG": "2109102741", "DOI": "10.1177/074873048800300304", + "CorpusId": 86597693}, "corpusId": 86597693, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/254e8a2432026e362e3b1b20c5fab5f460e116f5", + "title": "Circadian Temperature Rhythms in Relation to Menstrual Cycle Phase", + "abstract": "In order to describe circadian temperature rhythms in relation + to female ovulatory cycles, a study was conducted in which continuous rectal + temperature was monitored in healthy women at two phases of their menstrual + cycles. Results indicate that, in addition to an increase in the mesor, there + is a significant dampening of the temperature amplitude during the luteal + (postovulatory) phase compared to the follicular (preovulatory) phase. In + comparison with studies of male subjects, the average acrophase for females + may occur about 2 hr earlier. Results from this study provide descriptive + normative data, controlling for menstrual cycle phase, to which female clinical + populations can be compared. The use of circadian tempera ture rhythm as a + possible noninvasive diagnostic indicator of ovulation is also discussed.", + "venue": "", "year": 1988, "referenceCount": 22, "citationCount": 84, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1988-09-01", "journal": {"name": "Journal of Biological + Rhythms", "pages": "255 - 263", "volume": "3"}, "authors": [{"authorId": "48052893", + "name": "Kathryn A. Lee"}]}, {"paperId": "cfaa1a1534739cb46dcf49b9d3303949fc14d635", + "externalIds": {"MAG": "2097296731", "DOI": "10.1007/BF01693975", "CorpusId": + 122796409}, "corpusId": 122796409, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/cfaa1a1534739cb46dcf49b9d3303949fc14d635", + "title": "Kolmogoroff algorithms are stronger than turing machines", "abstract": + null, "venue": "", "year": 1980, "referenceCount": 4, "citationCount": 15, + "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1980-11-01", "journal": {"name": + "Journal of Soviet Mathematics", "pages": "1445-1450", "volume": "14"}, "authors": + [{"authorId": "1451029442", "name": "D. Grigor''ev"}]}, {"paperId": "dda1822872942f658b89e7e1c1ffe08c35e7b290", + "externalIds": {"DBLP": "journals/corr/abs-1709-08693", "MAG": "2759063673", + "ArXiv": "1709.08693", "CorpusId": 195346581}, "corpusId": 195346581, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/dda1822872942f658b89e7e1c1ffe08c35e7b290", + "title": "Can you fool AI with adversarial examples on a visual Turing test?", + "abstract": "Deep learning has achieved impressive results in many areas of + Computer Vision and Natural Language Pro- cessing. Among others, Visual Question + Answering (VQA), also referred to a visual Turing test, is considered one + of the most compelling problems, and recent deep learning models have reported + significant progress in vision and language modeling. Although Artificial + Intelligence (AI) is getting closer to passing the visual Turing test, at + the same time the existence of adversarial examples to deep learning systems + may hinder the practical application of such systems. In this work, we conduct + the first extensive study on adversarial examples for VQA systems. In particular, + we focus on generating targeted adversarial examples for a VQA system while + the target is considered to be a question-answer pair. Our evaluation shows + that the success rate of whether a targeted adversarial example can be generated + is mostly dependent on the choice of the target question-answer pair, and + less on the choice of images to which the question refers. We also report + the language prior phenomenon of a VQA model, which can explain why targeted + adversarial examples are hard to generate for some question-answer targets. + We also demonstrate that a compositional VQA architecture is slightly more + resilient to adversarial attacks than a non-compositional one. Our study sheds + new light on how to build deep vision and language resilient models robust + against adversarial examples.", "venue": "ArXiv", "year": 2017, "referenceCount": + 69, "citationCount": 36, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-09-25", "journal": {"name": "ArXiv", "volume": "abs/1709.08693"}, + "authors": [{"authorId": "2108880352", "name": "Xiaojun Xu"}, {"authorId": + "1425082935", "name": "Xinyun Chen"}, {"authorId": "2118484320", "name": "Chang + Liu"}, {"authorId": "34721166", "name": "Anna Rohrbach"}, {"authorId": "1753210", + "name": "Trevor Darrell"}, {"authorId": "143711382", "name": "D. Song"}]}, + {"paperId": "0735816e8740d2304a6238c3ce4b73c34b311458", "externalIds": {"MAG": + "2098723276", "DOI": "10.1177/1470595809335713", "CorpusId": 145650385}, "corpusId": + 145650385, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0735816e8740d2304a6238c3ce4b73c34b311458", + "title": "Editorial Cross Cultural Management in the Age of Globalization", + "abstract": "Globalization is reshaping our modes of thinking and ways of + behaving and foster-ing cultural change in societies. While some scholars + (cf. Harrison, 2006; Harrison and Huntington, 2000) may argue over a \u2018clash + of cultures\u2019, it seems just as relevant to focus on the ways in which + cultures may learn from each other, even inspire each other where the beauty + of cultural differences and cultur-al collisions is applauded (Fang, in press; + Soderberg and Holden, 2002). At the same time, some scholars argue that a + world cul-ture (Lechner and Boli, 2005) or global cul-ture (Arnett, 2002; + Bird and Stevens, 2003) is emerging and that it threatens the existence of + national cultures.This special section on \u2018Cross Cultural Management + in the Age of Globalization\u2019 aims at providing a forum to examine what + globalization means for cross cultural man-agement with a special focus on + the evolution of our understanding of national culture and cultural change. + We attempt to avoid a sim-plistic and sweeping \u2018either-or\u2019 debate + over convergence vs. divergence. Instead, we give importance to understanding + the paradoxi-cal and evolving conceptualizations of cul-tures and their implications + for cross cultural management theory and practice.To put the discussion into + perspective, it is useful to consider the changing trends in the cultural + research pantheon. In the 19th cen-tury, Sir Francis Galton first introduced + the problem of cultural group independence in his work on correlation. He + noted that cultural groups could not be considered truly independ-ent from + one another because the processes of cultural transfusion created relationships + that cannot be easily disentangled (Lindridge, 2005). Consequently, research + came to focus on cultures", "venue": "", "year": 2009, "referenceCount": 34, + "citationCount": 30, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://journals.sagepub.com/doi/pdf/10.1177/1470595809335713", + "status": "BRONZE"}, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": + "Sociology", "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2009-07-30", "journal": {"name": + "International Journal of Cross Cultural Management", "pages": "139-143", + "volume": "9"}, "authors": [{"authorId": "72412642", "name": "A. Bird"}, {"authorId": + "144917621", "name": "T. Fang"}]}, {"paperId": "a73c6bdf01e42108ec2431ff4c021bbe5aa310c9", + "externalIds": {"DOI": "10.1051/978-2-7598-1899-0.c053", "CorpusId": 15188309}, + "corpusId": 15188309, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a73c6bdf01e42108ec2431ff4c021bbe5aa310c9", + "title": "La machine de Turing", "abstract": "\u2022 Un \u00ab ruban \u00bb + divis\u00e9 en cases adjacentes. Chaque case contient un symbole parmi un + alphabet fini. L''alphabet contient un symbole sp\u00e9cial \u00ab blanc \u00bb + et un ou plusieurs autres symboles. Le ruban est de longueur infinie vers + la gauche ou vers la droite (en d''autres termes, la machine doit toujours + avoir assez de longueur de ruban pour son ex\u00e9cution). On consid\u00e8re + que les cases non encore \u00e9crites du ruban contiennent le symbole \u00ab + blanc \u00bb. \u2022 Une \u00ab t\u00eate de lecture/\u00e9criture \u00bb + qui peut lire et \u00e9crire les symboles sur le ruban, et se d\u00e9placer + vers la gauche ou vers la droite du ruban. \u2022 Un \u00ab registre d''\u00e9tat + \u00bb qui m\u00e9morise l''\u00e9tat courant de la machine de Turing. Le + nombre d''\u00e9tats possibles est toujours fini, et il existe un \u00e9tat + sp\u00e9cial appel\u00e9 \u00ab \u00e9tat de d\u00e9part \u00bb qui est l''\u00e9tat + initial de la machine avant son ex\u00e9cution.", "venue": "Les math\u00e9matiques + en images", "year": 2020, "referenceCount": 242, "citationCount": 2, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [], "publicationTypes": null, "publicationDate": "2020-11-04", "journal": + {"name": "Les math\u00e9matiques en images"}, "authors": [{"authorId": "2077266462", + "name": "Stefan Schwoon"}, {"authorId": "70857388", "name": "Andrew S. Tanenbaum"}, + {"authorId": "2080857927", "name": "Contenu d\u2019aujourd\u2019hui"}, {"authorId": + "2079681806", "name": "A. Turing"}]}, {"paperId": "8381d0ceea4ba1825e8c660cfd8817156340fb42", + "externalIds": {"MAG": "2093810711", "DOI": "10.1080/00207167708803124", "CorpusId": + 62651601}, "corpusId": 62651601, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8381d0ceea4ba1825e8c660cfd8817156340fb42", + "title": "Recursive turing machines", "abstract": "The Turing machine model + is extended to allow for recursive calls and the basic theory of these machines + is developed. The model is also used to study the following additional topics: + The time and storage needed to implement recursive algorithms by non-recursive + algorithms, the storage needed to implement non-deterministic algorithms by + deterministic algorithms, and the implementation of recursive algorithms by + means of stack machines. Some attention is given to time bounds but the emphasis + is on storage-bounded computations.", "venue": "", "year": 1977, "referenceCount": + 4, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "International Journal of Computer Mathematics", + "pages": "3-31", "volume": "6"}, "authors": [{"authorId": "2859514", "name": + "W. Savitch"}]}, {"paperId": "73ef979cbe3b4fd3929a4d510819442d8e557d2f", "externalIds": + {"MAG": "2185489404", "CorpusId": 61602365}, "corpusId": 61602365, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/73ef979cbe3b4fd3929a4d510819442d8e557d2f", + "title": "What is Computation? Opening Statement", "abstract": "Editor\u2019s + Introduction Most people understand a computation as a process evoked when + a computational agent acts on its inputs under the control of an algorithm. + The classical Turing machine model has long served as the fundamental reference + model because an appropriate Turing machine can simulate every other computational + model known. The Turing model is a good abstraction for most digital computers + because the number of steps to execute a Turing machine algorithm is predictive + of the running time of the computation on a digital computer. However, the + Turing model is not as well matched for the natural, interactive, and continuous + information processes frequently encountered today. Other models whose structures + more closely match the information processes involved give better predictions + of running time and space. Models based on transforming representations may + be useful.", "venue": "", "year": 2010, "referenceCount": 28, "citationCount": + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "1729148", + "name": "P. Denning"}]}, {"paperId": "379ec48b67c1736666dd0f61c0a44b75e9b98727", + "externalIds": {"MAG": "2524754229", "DBLP": "journals/cj/Lavington12", "DOI": + "10.1093/comjnl/bxs015", "CorpusId": 9712594}, "corpusId": 9712594, "publicationVenue": + {"id": "aa746a02-d187-42c2-bdf9-df6a5d4e648c", "name": "Computer/law journal", + "type": "journal", "alternate_names": ["Computer journal", "The Computer Journal", + "Comput j", "Comput J"], "issn": "0164-8756", "alternate_issns": ["0010-4620"], + "url": "https://repository.jmls.edu/jitpl/all_issues.html", "alternate_urls": + ["http://comjnl.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/379ec48b67c1736666dd0f61c0a44b75e9b98727", + "title": "A Synopsis of the Book Alan Turing and his Contemporaries: Building + the World''s First Computers", "abstract": "To mark the centenary of the birth + of Alan Turing, the British Computer Society has published a book written + by members of the Computer Conservation Society. The book examines Alan Turing''s + contribution to the implementation of practical stored-program digital computers + and the relation between Turing and the other computer pioneers active in + the period 1945\u201355. In this invited article, the book''s Editor gives + an overall view of the subject, focussing particularly on Alan Turing''s special + contributions in the first decade of the Information Age.", "venue": "Computer/law + journal", "year": 2012, "referenceCount": 2, "citationCount": 10, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Engineering"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Engineering", "source": "external"}, + {"category": "History", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2012-02-11", "journal": {"name": "Comput. J.", "pages": + "779-787", "volume": "55"}, "authors": [{"authorId": "2002323", "name": "S. + Lavington"}]}, {"paperId": "f67731c10f6f8a6d2db44033cfdcaefb768b2326", "externalIds": + {"MAG": "2120611635", "DOI": "10.1007/978-1-4020-8802-5", "CorpusId": 86028390}, + "corpusId": 86028390, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f67731c10f6f8a6d2db44033cfdcaefb768b2326", + "title": "Orchid Biology: Reviews and Perspectives, X", "abstract": null, + "venue": "", "year": 2002, "referenceCount": 0, "citationCount": 255, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Agricultural And Food Sciences", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "2264653", "name": "T. Kull"}, {"authorId": "144176311", + "name": "J. Arditti"}, {"authorId": "92051002", "name": "Sek-Man Wong"}]}, + {"paperId": "c19e3ce023f0d12cbfa9cfe08895c769e3a0578c", "externalIds": {"MAG": + "1549780988", "DBLP": "conf/coco/Ambos-Spies86", "DOI": "10.1007/3-540-16486-3_87", + "CorpusId": 45965759}, "corpusId": 45965759, "publicationVenue": {"id": "23f8fe4c-6537-4027-a334-6a5863115984", + "name": "Cybersecurity and Cyberforensics Conference", "type": "conference", + "alternate_names": ["Chin Control Conf", "Computational Complexity Conference", + "CCC", "Comput Complex Conf", "Cybersecur Cyberforensics Conf", "Conference + on Computational Complexity", "Computing Colombian Conference", "Conf Comput + Complex", "Comput Colomb Conf", "Chinese Control Conference"], "url": "http://computationalcomplexity.org/"}, + "url": "https://www.semanticscholar.org/paper/c19e3ce023f0d12cbfa9cfe08895c769e3a0578c", + "title": "Randomness, Relativizations, and Polynomial Reducibilities", "abstract": + null, "venue": "Cybersecurity and Cyberforensics Conference", "year": 1986, + "referenceCount": 20, "citationCount": 49, "influentialCitationCount": 3, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], + "publicationDate": "1986-06-02", "journal": {"pages": "23-34"}, "authors": + [{"authorId": "1398717883", "name": "K. Ambos-Spies"}]}, {"paperId": "77553865c8dde5f8a28d4a0187925f42d170e637", + "externalIds": {"MAG": "1992313294", "DOI": "10.1090/S0025-5718-1974-0341881-2", + "CorpusId": 119855015}, "corpusId": 119855015, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/77553865c8dde5f8a28d4a0187925f42d170e637", + "title": "The application of implicit Runge-Kutta and collection methods to + boundary-value problems", "abstract": "The solution of a nonlinear system + of first order differential equations with nonlinear boundary conditions by + implicit Runge-Kutta methods based on interpolatory quadrature formulae is + examined. An equivalence between implicit Runge-Kutta and collocation schemes + is established. It is shown that the difference equations obtained have a + unique solution in a neighbourhood of an isolated solution of the continuous + problem, that this solution can be computed by Newton iteration and that it + converges to the isolated solution. The order of convergence is equal to the + degree of precision of the related quadra- ture formula plus one. The efficient + implementation of the methods is discussed and numerical examples are given. + 1. Introduction. We investigate the application of certain implicit Runge- + Kutta methods (cf. Butcher (2)) to the numerical solution of nonlinear boundary- + value problems of the form", "venue": "", "year": 1974, "referenceCount": + 18, "citationCount": 82, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.ams.org/mcom/1974-28-126/S0025-5718-1974-0341881-2/S0025-5718-1974-0341881-2.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1974-05-01", "journal": {"name": + "Mathematics of Computation", "pages": "449-464", "volume": "28"}, "authors": + [{"authorId": "145175596", "name": "R. Weiss"}]}, {"paperId": "6a79833bbbb8d02d9f422293f727219cae958286", + "externalIds": {"MAG": "89857835", "CorpusId": 127522995}, "corpusId": 127522995, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6a79833bbbb8d02d9f422293f727219cae958286", + "title": "A Comparison of Climatic Elements at Four Elevations in the Great + Smoky Mountains National Park", "abstract": "Between J anuary lr 19479 and + December 31, 1950, hourly tempera\u00ad ture and relative humidity and daily + precipitation and cloud cover data were collected at the 1P460 ft.P )9850 + ft.P 5 , 000 ft.P and 6,)00 ft. elevations in the Great Smoky Mountains National + Park. These four years were part of a period of data collection extending + from January, 1946, through \ufffdmrch", "venue": "", "year": 1969, "referenceCount": + 0, "citationCount": 28, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Geography"], "s2FieldsOfStudy": + [{"category": "Geography", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "119374173", + "name": "Stephens"}, {"authorId": "2070971448", "name": "Luther Allin"}]}, + {"paperId": "bbf9cbd7e3ae3d8c8b7487245d9f56f4d149f13a", "externalIds": {"DBLP": + "journals/tfs/Li08", "MAG": "2129853986", "DOI": "10.1109/TFUZZ.2008.2004990", + "CorpusId": 22644492}, "corpusId": 22644492, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/bbf9cbd7e3ae3d8c8b7487245d9f56f4d149f13a", + "title": "Fuzzy Turing Machines: Variants and Universality", "abstract": "In + this paper, we study some variants of fuzzy Turing machines (FTMs) and universal + FTM. First, we give several formulations of FTMs, including, in particular, + deterministic FTMs (DFTMs) and nondeterministic FTMs (NFTMs). We then show + that DFTMs and NFTMs are not equivalent as far as the power of recognizing + fuzzy languages is concerned. This contrasts sharply with classical TMs. Second, + we show that there is no universal FTM that can exactly simulate any FTM on + it. But if the membership degrees of fuzzy sets are restricted to a fixed + finite subset A of [0,1], such a universal machine exists. We also show that + a universal FTM exists in some approximate sense. This means, for any prescribed + accuracy, that we can construct a universal machine that simulates any FTM + with the given accuracy. Finally, we introduce the notions of fuzzy polynomial + time-bounded computation and nondeterministic fuzzy polynomial time-bounded + computation, and investigate their connections with polynomial time-bounded + computation and nondeterministic polynomial time-bounded computation.", "venue": + "IEEE Transactions on Fuzzy Systems", "year": 2008, "referenceCount": 24, + "citationCount": 14, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-12-01", "journal": {"name": "IEEE Transactions on Fuzzy Systems", "pages": + "1491-1502", "volume": "16"}, "authors": [{"authorId": "51394392", "name": + "Yongming Li"}]}, {"paperId": "5028f6f347ce0c788d89cf318815270635fba3e7", + "externalIds": {"MAG": "1977960830", "DOI": "10.1007/BF03027638", "CorpusId": + 93945854}, "corpusId": 93945854, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5028f6f347ce0c788d89cf318815270635fba3e7", + "title": "Surfactants for producing low interfacial tensions I: Linear alkyl + benzene sulfonates", "abstract": null, "venue": "", "year": 1977, "referenceCount": + 10, "citationCount": 86, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Chemistry", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1977-12-01", + "journal": {"name": "Journal of the American Oil Chemists\u2019 Society", + "pages": "570-577", "volume": "54"}, "authors": [{"authorId": "91493613", + "name": "P. Doe"}, {"authorId": "1441455588", "name": "M. El-Emary"}, {"authorId": + "70668570", "name": "W. Wade"}, {"authorId": "49502461", "name": "R. S. Schechter"}]}, + {"paperId": "de312e72109484852424b76f40aec642564846cf", "externalIds": {"MAG": + "2015029297", "DOI": "10.1063/1.2784554", "CorpusId": 43020095, "PubMed": + "17994850"}, "corpusId": 43020095, "publicationVenue": {"id": "1bb63b2b-3f57-4387-aaf6-b2a33dfcdcc5", + "name": "Journal of Chemical Physics", "type": "journal", "alternate_names": + ["J Chem Phys"], "issn": "0021-9606", "url": "http://jcp.aip.org/", "alternate_urls": + ["https://aip.scitation.org/journal/jcp"]}, "url": "https://www.semanticscholar.org/paper/de312e72109484852424b76f40aec642564846cf", + "title": "Bifurcation diagrams and Turing patterns in a chemical self-replicating + reaction-diffusion system with cross diffusion.", "abstract": "Chemical self-replication + of oligonucleotides and helical peptides exhibits the so-called square root + rate law. Based on this rate we extend our previous work on ideal replicators + to include the square root rate and other possible nonlinearities, which we + couple with an enzymatic sink. For this generalized model, we consider the + role of cross diffusion in pattern formation, and we obtain exact general + relations for the Poincare-Adronov-Hopf and Turing bifurcations, and our generalized + results include the Higgins, Autocatalator, and Templator models as specific + cases.", "venue": "Journal of Chemical Physics", "year": 2007, "referenceCount": + 67, "citationCount": 37, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Physics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Physics", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2007-11-05", "journal": {"name": "The + Journal of chemical physics", "pages": "\n 174903\n ", "volume": + "127 17"}, "authors": [{"authorId": "39991422", "name": "Jessica Chung"}, + {"authorId": "1403262523", "name": "E. Peacock-L\u00f3pez"}]}, {"paperId": + "df681fd0a251db619b1e6e7f4c2815aec22182bc", "externalIds": {"DBLP": "journals/tec/OfriaAC02", + "MAG": "2167053763", "DOI": "10.1109/TEVC.2002.802442", "CorpusId": 1550626}, + "corpusId": 1550626, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/df681fd0a251db619b1e6e7f4c2815aec22182bc", + "title": "Design of evolvable computer languages", "abstract": "We investigate + common design decisions for constructing a computational genetic language + in an autoadaptive system. Such languages must support self-replication and + are typically Turing-complete so as not to limit the types of computations + they can perform. We examine the importance of using templates to denote locations + in the genome, the methods by which those templates are located (direct-matching + versus complement-matching), methods used in the calculation of genome length + and the size and complexity of the language. For each test, we examine the + effects on the rate of evolution of the populations and isolate those factors + that contribute to it, most notably the organisms'' ability to withstand mutations.", + "venue": "IEEE Trans. Evol. Comput.", "year": 2002, "referenceCount": 24, + "citationCount": 48, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-08-01", "journal": {"name": "IEEE Trans. Evol. Comput.", + "pages": "420-424", "volume": "6"}, "authors": [{"authorId": "152559260", + "name": "C. Ofria"}, {"authorId": "145882965", "name": "C. Adami"}, {"authorId": + "3281792", "name": "T. Collier"}]}, {"paperId": "0a6a104908d5bbe2e43932c0e2df68ed50c0c232", + "externalIds": {"MAG": "2054743028", "DOI": "10.1007/BF01163965", "CorpusId": + 121591613}, "corpusId": 121591613, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0a6a104908d5bbe2e43932c0e2df68ed50c0c232", + "title": "Solvability of the halting problem for certain classes of Turing + machines", "abstract": null, "venue": "", "year": 1973, "referenceCount": + 2, "citationCount": 29, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1973-06-01", "journal": {"name": + "Mathematical notes of the Academy of Sciences of the USSR", "pages": "537-541", + "volume": "13"}, "authors": [{"authorId": "3240213", "name": "L. Pavlotskaya"}]}, + {"paperId": "3c8bca32698f45fef0fa9cf74c94d7f193b17214", "externalIds": {"DBLP": + "journals/jscic/LiZWS01", "MAG": "1558805169", "DOI": "10.1023/A:1012278606077", + "CorpusId": 45519688}, "corpusId": 45519688, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3c8bca32698f45fef0fa9cf74c94d7f193b17214", + "title": "LBGK Simulations of Turing Patterns in CIMA Model", "abstract": + null, "venue": "J. Sci. Comput.", "year": 2001, "referenceCount": 20, "citationCount": + 19, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-06-11", "journal": + {"name": "Journal of Scientific Computing", "pages": "121-134", "volume": + "16"}, "authors": [{"authorId": "1930238", "name": "Qing Li"}, {"authorId": + "144704650", "name": "C. Zheng"}, {"authorId": "34752878", "name": "Nengchao + Wang"}, {"authorId": "36303595", "name": "B. Shi"}]}, {"paperId": "5a2b42794d810ac8d5720ebcc0a3927977b58da3", + "externalIds": {"MAG": "2103969576", "DOI": "10.1017/S0024610701002083", "CorpusId": + 14135635}, "corpusId": 14135635, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5a2b42794d810ac8d5720ebcc0a3927977b58da3", + "title": "Solving the Word Problem in Real Time", "abstract": "The paper is + devoted to the study of groups whose word problem can be solved by a Turing + machine which operates in real time. A recent result of the first author for + word hyperbolic groups is extended to prove that under certain conditions + the generalised Dehn algorithms of Cannon, Goodman and Shapiro, which clearly + run in linear time, can be programmed on real\u2010time Turing machines. It + follows that word\u2010hyperbolic groups, finitely generated nilpotent groups + and geometrically finite hyperbolic groups all have real\u2010time word problems.", + "venue": "", "year": 2001, "referenceCount": 11, "citationCount": 18, "influentialCitationCount": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "http://wrap.warwick.ac.uk/812/1/WRAP_Holt_Solving_word_problem.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-06-01", + "journal": {"name": "Journal of the London Mathematical Society", "volume": + "63"}, "authors": [{"authorId": "32899890", "name": "D. Holt"}, {"authorId": + "145112601", "name": "Sarah Rees"}]}, {"paperId": "c84151945b5e3018f66f6cf3c9292e1e97c2a634", + "externalIds": {"MAG": "1965658020", "DOI": "10.13031/2013.21292", "CorpusId": + 119965429}, "corpusId": 119965429, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c84151945b5e3018f66f6cf3c9292e1e97c2a634", + "title": "Turing machine approach to solve psychrometric attributes", "abstract": + "A technique for selecting psychrometric equations and their solution order + is presented. The solution order for \na given psychrometric problem is not + always readily identifiable. Furthermore, because the psychrometric equations + can \nbe solved in many different sequences, the solution process can become + convoluted. For example, if atmospheric pressure, \ndry-bulb temperature and + relative humidity are known and it is desired to determine the other 12 psychrometric + attributes, \nthen there are approximately 37,780 different orders in which + to solve the equations to determine the other parameters. \nThe tasks of identifying + these many possible combinations of equations, and selecting an appropriate + one, is called a \ndecision problem in computation theory. One technique for + solving decision problems is a Turing machine computational \nmodel. We have + constructed a Turing machine which we refer to as a Psychrometric Turing Machine + (PTM), to solve all \npossible psychrometric problems. The PTM selects the + optimal equation order based upon a user-specified optimality \ncriterion + of CPU cycles. A solution is comprised of a series of functions based on equations + found in the 1993 ASHRAE \nHandbook\u2014Fundamentals. The PTM is shown to + be a practical application to a non-deterministic, multiple-path \nproblem. + It required 700 ms on an engineering workstation (100 MHz, Sparc 10) to search + all possible combinations and \ndetermine the optimal solution route for the + most complicated \u201ctwo-to-all\u201d psychrometric problem. For a particular + \npsychrometric problem, once the equation order is found, these equations + can be used to determine the unknown \nattributes from the known attributes + in a consistent manner that is in some sense optimal. We demonstrate the application + \nof the PTM with several examples: a psychrometric calculator, a source code + generator, and a listing of the optimal \nfunction call sequence for most + \u201ctwo-to-all\u201d psychrometric problems encountered.", "venue": "", + "year": 1997, "referenceCount": 0, "citationCount": 14, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1997-05-01", "journal": {"name": + "Transactions of the ASABE", "pages": "823-831", "volume": "40"}, "authors": + [{"authorId": "2119079637", "name": "Hanzhong Zhang"}, {"authorId": "5231626", + "name": "R. Gates"}, {"authorId": "90284225", "name": "D. Colliver"}]}, {"paperId": + "99e45dded79f54dfe60856fb708f2d804d1910e8", "externalIds": {"MAG": "1563152078", + "DOI": "10.5860/choice.31-6096", "CorpusId": 56767473}, "corpusId": 56767473, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/99e45dded79f54dfe60856fb708f2d804d1910e8", + "title": "The Mathematica programmer", "abstract": "Preface. About This Book. + Part 1: Paradigms of Programming. Introduction. Logic Programming. Higher-Order + Functions. Combinators. Turing Machines. Part 2: Visualization. Animated Algorithms. + Function Iteration and Chaos. Fractional Brownian Motion. Uniform Polyhedra. + The Stellated Icosahedra. Ray Tracing. Single-Image Stereograms. Appendixes. + References. Index of Programs. Index. Preface. About This Book: Overview. + About the Programs. Notation and Terminology. The Mathematica Programmer CD-ROM. + The Mathematica Programmer WWW Archive. Colophon.Part 1: Paradigms of Programming: + Introduction: Mathematica''s Programming Language. Pattern Matching and Term + Rewriting. Programming Styles. Program Organization. Logic Programming: The + Ingredients of Logic Programs. A PROLOG Interpreter for Mathematica. Lists + in PROLOG. Backtracking. Deduction. Higher-Order Functions: Introduction. + The Functional Features of Mathematica. Functions as Data. Fixed Points of + Higher-Order Functions. Combinators: Introduction. Combinatory Algebras. Combinatory + Abstraction. Converting Functions to Combinators. Applications. Turing Machines: + Introduction. A Turing Machine Simulator. Assembly Programming. Recursive + Functions. Optimization. Conclusions. The Complete Code of TuringMacros.m. + Part 2: Visualization: Animated Algorithms: Three Standard Sorting Algorithms. + Asymptotic Behavior. Conclusions. Function Iteration and Chaos: Function Iteration. + Bifurcations. The Final-State Diagram. The Ingredients of Chaos. Super-Attractive + Orbits. Conclusions. Fractional Brownian Motion: Introduction. Random Additions. + Fourier Synthesis. Random Faults. Analysis of fBm Data. Uniform Polyhedra: + Introduction. Uniform Construction. Data Structures. Rendering. Auxiliary + Programs. The Stellated Icosahedra: Introduction. Rendering. Discussion. The + Complete Code of Icosahedra.m. Ray Tracing: A Data Type for Surfaces. Photorealistic + Rendering. Converting Mathematica Graphics. Sample Images. Stereo Pairs. The + Complete Code of POVray.m. Single-Image Stereograms: Introduction. The Classis + SIRDS in Mathematica. Designing Good Images. Exact Stereograms. Interface + to External SIS Generators. The Complete Code of SIS.m. Appendixes. References. + Index of Programs. Index.", "venue": "", "year": 1994, "referenceCount": 0, + "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1994-04-01", "journal": {"name": "The Mathematica journal", "pages": "279-290", + "volume": "7"}, "authors": [{"authorId": "33913441", "name": "Roman Maeder"}]}, + {"paperId": "7cadb9a6f3257971142e3b3a8676bbc94a807dda", "externalIds": {"MAG": + "613545293", "DOI": "10.1017/CBO9780511614293", "CorpusId": 118691862}, "corpusId": + 118691862, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7cadb9a6f3257971142e3b3a8676bbc94a807dda", + "title": "Symmetry and its discontents : essays on the history of inductive + probability", "abstract": "Part I. Probability: 1. Symmetry and its discontents + 2. The rule of succession 3. Buffon, Price, and Laplace: scientific attribution + in the eighteenth century 4. W. E. Johnson''s sufficientness postulate. Part + II. Personalities: 5 Abraham De Moivre and the birth of the Central Limit + Theorem 6 Ramsey, truth, and probability 7. R. A. Fisher on the history of + inverse probability 8. R. A. Fisher and the fiducial argument 9. Alan Turing + and the Central Limit Theorem Part III. Prediction: 10. Predicting the unpredictable + 11. The continuum of inductive methods revised.", "venue": "", "year": 2005, + "referenceCount": 305, "citationCount": 50, "influentialCitationCount": 8, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "2347279", + "name": "S. Zabell"}]}, {"paperId": "98576f4b2df33503c19b82c11f28fdcc2a4c41dc", + "externalIds": {"CorpusId": 7123899}, "corpusId": 7123899, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/98576f4b2df33503c19b82c11f28fdcc2a4c41dc", + "title": "On the Gaussian error function Universal Turing Machine", "abstract": + "Many steganographers would agree that, had it not been for the Ethernet, + the exploration of model checking might never have occurred. After years of + essential research into web browsers, we verify the improvement of redundancy, + which embodies the confusing principles of cryptoanalysis. RIBAND, our new + application for the deployment of Byzantine fault tolerance, is the solution + to all of these obstacles.", "venue": "", "year": 2011, "referenceCount": + 149, "citationCount": 22, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": null, "authors": [{"authorId": "2053325089", + "name": "F. I. Qian"}]}, {"paperId": "79219292a386f2934787974ca2fe59edf324f852", + "externalIds": {"MAG": "1612748242", "DBLP": "conf/stacs/Tantau02", "DOI": + "10.1007/s00224-003-1108-4", "CorpusId": 17690319}, "corpusId": 17690319, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79219292a386f2934787974ca2fe59edf324f852", + "title": "Comparing Verboseness for Finite Automata and Turing Machines", + "abstract": null, "venue": "Theory of Computing Systems", "year": 2002, "referenceCount": + 28, "citationCount": 11, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2002-03-14", "journal": {"name": "Theory of Computing Systems", "pages": + "95-109", "volume": "37"}, "authors": [{"authorId": "1683672", "name": "Till + Tantau"}]}, {"paperId": "79de931a9268436715ae81997ead03defab23f14", "externalIds": + {"MAG": "9665148", "DOI": "10.1007/978-3-319-09903-3_1", "CorpusId": 18795998}, + "corpusId": 18795998, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/79de931a9268436715ae81997ead03defab23f14", + "title": "Recurrent Neural Networks and Super-Turing Interactive Computation", + "abstract": null, "venue": "", "year": 2015, "referenceCount": 87, "citationCount": + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": null, "journal": {"name": + "", "pages": "1-29", "volume": "4"}, "authors": [{"authorId": "1788189", "name": + "J\u00e9r\u00e9mie Cabessa"}, {"authorId": "1754229", "name": "A. Villa"}]}, + {"paperId": "af3ba188294d059af6a66be9d591612ecc872b65", "externalIds": {"CorpusId": + 18204444}, "corpusId": 18204444, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/af3ba188294d059af6a66be9d591612ecc872b65", + "title": "Classi cation by Pairwise Coupling", "abstract": "We discuss a strategy + for polychotomous classi cation that involves estimating class probabilities + for each pair of classes and then cou pling the estimates together The coupling + model is similar to the Bradley Terry method for paired comparisons We study + the na ture of the class probability estimates that arise and examine the + performance of the procedure in real and simulated datasets Clas si ers used + include linear discriminants nearest neighbors and the support vector machine", + "venue": "", "year": 1998, "referenceCount": 4, "citationCount": 34, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": [{"authorId": "1784682", + "name": "T. Hastie"}, {"authorId": "1761784", "name": "R. Tibshirani"}]}, + {"paperId": "99e7ade723da4571118af3fc64b1b5ba41537762", "externalIds": {"MAG": + "2989341948", "ArXiv": "1911.01963", "CorpusId": 207780292}, "corpusId": 207780292, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/99e7ade723da4571118af3fc64b1b5ba41537762", + "title": "Universality of Euler flows and flexibility of Reeb embeddings", + "abstract": "The dynamics of an inviscid and incompressible fluid flow on + a Riemannian manifold is governed by the Euler equations. Recently, Tao launched + a programme to address the global existence problem for the Euler and Navier + Stokes equations based on the concept of universality. In this article we + prove that the Euler equations exhibit universality features. More precisely, + we show that any non autonomous flow on a compact manifold can be extended + to a smooth solution of the Euler equations on some Riemannian manifold of + possibly higher dimension. The solutions we construct are stationary of Beltrami + type, so they exist for all time. Using this result, we establish the Turing + completeness of the Euler flows, i.e. that there exist solutions that encode + a universal Turing machine. The proofs exploit the correspondence between + contact topology and hydrodynamics, which allows us to import the flexibility + principles from the contact realm, in the form of holonomic h-principles for + isocontact embeddings.", "venue": "", "year": 2019, "referenceCount": 43, + "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2019-11-05", + "journal": {"name": "arXiv: Dynamical Systems", "volume": ""}, "authors": + [{"authorId": "93622450", "name": "R. Cardona"}, {"authorId": "143708365", + "name": "E. Miranda"}, {"authorId": "1399136591", "name": "D. Peralta-Salas"}, + {"authorId": "66605906", "name": "F. Presas"}]}, {"paperId": "58ca8a17a34bf47274efe8c4b00912cc4cb16489", + "externalIds": {"MAG": "2106216094", "DOI": "10.1080/02642069300000005", "CorpusId": + 154875175}, "corpusId": 154875175, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/58ca8a17a34bf47274efe8c4b00912cc4cb16489", + "title": "Internationalisation in Service Companies", "abstract": "This article + presents a conceptual framework for analysing the internationalisation of + knowledge-intensive service companies. The framework has been developed as + a result of an empirical study of ten Scandinavian companies, representing + different types of service -for instance, insurance, consulting and security. + The internationalisation process is divided into four stages: prospecting, + introduction, consolidation and reorientation. One major implication of the + study is that internationalisation should not be viewed as mainly a question + of globalisation or adaptation to local business conditions, as is usually + assumed in the litera- ture. Instead it is the interplay between these two + major strategic orientations that determines the outcome of the inter- nationalisation + process, and companies need to learn how to balance the two successfully. + The empirical results and practical implications of the study are summarised + in a number of theses dealing with the overall guidance of the internationalisation + process.", "venue": "", "year": 1993, "referenceCount": 8, "citationCount": + 85, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", + "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "Service + Industries Journal", "pages": "80-97", "volume": "13"}, "authors": [{"authorId": + "3325228", "name": "B. Edvardsson"}, {"authorId": "2464198", "name": "L. Edvinsson"}, + {"authorId": "40455265", "name": "H. Nystr\u00f6m"}]}, {"paperId": "36837857fb829c674bc561b86145d8122173e155", + "externalIds": {"DBLP": "journals/cj/Naur93", "MAG": "2099081743", "DOI": + "10.1093/comjnl/36.4.351", "CorpusId": 11177192}, "corpusId": 11177192, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/36837857fb829c674bc561b86145d8122173e155", + "title": "Understanding Turing''s Universal Machine - Personal Style in Program + Description", "abstract": null, "venue": "Comput. J.", "year": 1993, "referenceCount": + 0, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://academic.oup.com/comjnl/article-pdf/36/4/351/1090742/360351.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"name": "Comput. + J.", "pages": "351-372", "volume": "36"}, "authors": [{"authorId": "1733249", + "name": "P. Naur"}]}, {"paperId": "8558bdd72db6eb9e38452b62c00082a4467df805", + "externalIds": {"ArXiv": "1307.6236", "MAG": "1525936709", "DOI": "10.1088/1361-6544/aaa5dc", + "CorpusId": 118308682}, "corpusId": 118308682, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8558bdd72db6eb9e38452b62c00082a4467df805", + "title": "Dynamical spike solutions in a nonlocal model of pattern formation", + "abstract": "Coupling a reaction-diffusion equation with ordinary differential + equa- tions (ODE) may lead to diffusion-driven instability (DDI) which, in + contrast to the classical reaction-diffusion models, causes destabilization + of both, constant solutions and Turing patterns. Using a shadow-type limit + of a reaction-diffusion-ODE model, we show that in such cases the instability + driven by nonlocal terms (a counterpart of DDI) may lead to formation of unbounded + spike patterns.", "venue": "", "year": 2013, "referenceCount": 49, "citationCount": + 33, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1307.6236.pdf", "status": "GREEN"}, "fieldsOfStudy": + ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": + "external"}, {"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-07-23", "journal": {"name": "Nonlinearity", "pages": "1757 - 1781", + "volume": "31"}, "authors": [{"authorId": "1389565398", "name": "A. Marciniak-Czochra"}, + {"authorId": "103539569", "name": "Steffen H\u00e4rting"}, {"authorId": "101468044", + "name": "G. Karch"}, {"authorId": "2118679527", "name": "Kanako Suzuki"}]}, + {"paperId": "bdee397b729e09955f96d3f93a8fc4ccf9a38de6", "externalIds": {"MAG": + "2964117658", "ArXiv": "1711.02787", "DBLP": "journals/ijbc/AnJ18", "DOI": + "10.1142/S0218127418501080", "CorpusId": 53290277}, "corpusId": 53290277, + "publicationVenue": {"id": "f3358047-5fa1-4315-9473-4bb4c19cb756", "name": + "International Journal of Bifurcation and Chaos in Applied Sciences and Engineering", + "type": "journal", "alternate_names": ["Int J Bifurc Chaos", "Int J Bifurc + Chaos Appl Sci Eng", "International Journal of Bifurcation and Chaos"], "issn": + "0218-1274", "url": "http://www.worldscinet.com/ijbc/ijbc.shtml", "alternate_urls": + ["http://www.worldscinet.com/ijbc/mkt/archive.shtml"]}, "url": "https://www.semanticscholar.org/paper/bdee397b729e09955f96d3f93a8fc4ccf9a38de6", + "title": "Turing-Hopf Bifurcation and Spatio-Temporal Patterns of a Ratio-Dependent + Holling-Tanner Model with Diffusion", "abstract": "In this paper, the dynamics + of a diffusive ratio-dependent Holling\u2013Tanner model subject to Neumann + boundary conditions is considered. We derive the conditions for the existence + of Hopf, Turing, Turing\u2013Hopf, Turing\u2013Turing, Hopf-double-Turing + and triple-Turing bifurcations at the unique positive equilibrium. Furthermore, + we study the detailed dynamics in the neighborhood of the Turing\u2013Hopf + bifurcation by using the normal form method. Our results show that the Turing\u2013Hopf + bifurcation can give rise to the formation of the temporal and spatio-temporal + patterns. In particular, we theoretically prove the existence of the spatially + inhomogeneous periodic and quasi-periodic solutions, which can be used to + explain the phenomenon of spatio-temporal resonance of the populations. Finally, + the numerical simulations are given to illustrate the analytical results.", + "venue": "International Journal of Bifurcation and Chaos in Applied Sciences + and Engineering", "year": 2017, "referenceCount": 41, "citationCount": 8, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1711.02787", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-11-08", "journal": {"name": "Int. J. Bifurc. Chaos", + "pages": "1850108:1-1850108:22", "volume": "28"}, "authors": [{"authorId": + "1521749343", "name": "Qi An"}, {"authorId": "144382267", "name": "Weihua + Jiang"}]}, {"paperId": "81caabf38caaac03b64668eda5323616ae7b5ce9", "externalIds": + {"MAG": "2172194487", "DOI": "10.1002/mma.3275", "CorpusId": 124993452}, "corpusId": + 124993452, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/81caabf38caaac03b64668eda5323616ae7b5ce9", + "title": "Bifurcation analysis of a diffusive predator\u2013prey system with + a herd behavior and quadratic mortality", "abstract": "In this paper, a diffusive + predator\u2013prey system, in which the prey species exhibits herd behavior + and the predator species with quadratic mortality, has been studied. The stability + of positive constant equilibrium, Hopf bifurcations, and diffusion\u2010driven + Turing instability are investigated under the Neumann boundary condition. + The explicit condition for the occurrence of the diffusion\u2010driven Turing + instability is derived, which is determined by the relationship of the diffusion + rates of two species. The formulas determining the direction and the stability + of Hopf bifurcations depending on the parameters of the system are derived. + Finally, numerical simulations are carried out to verify and extend the theoretical + results and show the existence of spatially homogeneous periodic solutions + and nonconstant steady states. Copyright \u00a9 2014 John Wiley & Sons, Ltd.", + "venue": "", "year": 2015, "referenceCount": 34, "citationCount": 24, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-09-30", "journal": {"name": "Mathematical Methods in the Applied Sciences", + "pages": "2994 - 3006", "volume": "38"}, "authors": [{"authorId": "102820754", + "name": "Zhouli Xu"}, {"authorId": "1794550", "name": "Yongli Song"}]}]} ' headers: @@ -52330,31 +59134,31 @@ interactions: Connection: - keep-alive Content-Length: - - '164485' + - '193149' Content-Type: - application/json Date: - - Wed, 21 Dec 2022 04:43:57 GMT + - Tue, 03 Jan 2023 20:53:24 GMT Via: - - 1.1 5798112148ae9e672af737182da15f62.cloudfront.net (CloudFront) + - 1.1 8d85241e1702eeaa52194b6b8061e194.cloudfront.net (CloudFront) X-Amz-Cf-Id: - - q05pCCw-Bby4gU6DuEl9H1P8ljJepotVqhGgT5sgKOY7fQkFbsviqg== + - Vpa1asv9I1JBMrzKWUHWLz9nei90TuoH4KAF57nhbyKGbum8qXbZwQ== X-Amz-Cf-Pop: - GRU3-P1 X-Cache: - Miss from cloudfront x-amz-apigw-id: - - detKFE1svHcFZlw= + - eLxWsGKGvHcFnvA= x-amzn-Remapped-Connection: - keep-alive x-amzn-Remapped-Content-Length: - - '164485' + - '193149' x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:57 GMT + - Tue, 03 Jan 2023 20:53:24 GMT x-amzn-Remapped-Server: - gunicorn x-amzn-RequestId: - - d668c865-70be-48c7-8254-fdc38d73a48f + - 3eaccab9-d000-4cf1-b6c9-f8c2de6dc1e4 status: code: 200 message: OK @@ -52370,129 +59174,50 @@ interactions: User-Agent: - python-requests/2.28.1 method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2500&limit=100 + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2500&limit=100 response: body: - string: '{"total": 65539, "offset": 2500, "next": 2600, "data": [{"paperId": - "79de931a9268436715ae81997ead03defab23f14", "externalIds": {"MAG": "9665148", - "DOI": "10.1007/978-3-319-09903-3_1", "CorpusId": 18795998}, "url": "https://www.semanticscholar.org/paper/79de931a9268436715ae81997ead03defab23f14", - "title": "Recurrent Neural Networks and Super-Turing Interactive Computation", - "abstract": null, "venue": "", "year": 2015, "referenceCount": 87, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": {"name": "", "pages": "1-29", "volume": - "4"}, "authors": [{"authorId": "1788189", "name": "J\u00e9r\u00e9mie Cabessa"}, - {"authorId": "1754229", "name": "A. Villa"}]}, {"paperId": "26a80bc3de0f880abf61dc873f2ff2f8cd0c9a03", - "externalIds": {"MAG": "1988158368", "DOI": "10.1112/S002461159800046X", "CorpusId": - 16488410}, "url": "https://www.semanticscholar.org/paper/26a80bc3de0f880abf61dc873f2ff2f8cd0c9a03", - "title": "Interpretability and Definability in the Recursively Enumerable - Degrees", "abstract": "We investigate definability in R, the recursively enumerable - Turing degrees, using codings of standard models of arithmetic (SMAs) as a - tool. First we show that an SMA can be interpreted in R without parameters. - Building on this, we prove that the recursively enumerable T\u2010degrees - satisfy a weak form of the bi\u2010interpretability conjecture which implies - that all jump classes Lown and Highn\u22121 n \u2a7e 2 are definable in R - without parameters and, more generally, that all relations on R that are definable - in arithmetic and invariant under the double jump are actually definable in - R. This partially answers Soare''s Question 3.7 (R. Soare, Recursively enumerable - sets and degrees (Springer, Berlin, 1987), Chapter XVI). 1991 Mathematics - Subject Classification: primary 03D25, 03D35; secondary 03D30.", "venue": - "", "year": 1998, "referenceCount": 92, "citationCount": 81, "influentialCitationCount": - 13, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1998-09-01", - "journal": {"name": "Proceedings of the London Mathematical Society", "volume": - "77"}, "authors": [{"authorId": "102253480", "name": "A. Nies"}, {"authorId": - "152648951", "name": "Ra Shore"}, {"authorId": "101556365", "name": "Ta Slaman"}]}, - {"paperId": "2bdd7a04cba8a354f783f81e84eb21cc8360caa6", "externalIds": {"DBLP": - "journals/siamcomp/Grandjean84", "MAG": "2007053458", "DOI": "10.1137/0213025", - "CorpusId": 34709666}, "url": "https://www.semanticscholar.org/paper/2bdd7a04cba8a354f783f81e84eb21cc8360caa6", - "title": "The Spectra of First-Order Sentences and Computational Complexity", - "abstract": "The spectrum of a first-order sentence is the set of cardinalities - of its finite models. We refine the well-known equality between the class - of spectra and the class of sets (of positive integers) accepted by nondeterministic - Turing machines in polynomial time. Let $\\operatorname{Sp} (d\\forall )$ - denote the class of spectra of sentences with d universal quantifiers. For - any integer $d \\geqq 2$ and each set of positive integers, A, we obtain: - \\[ A \\in \\operatorname{NTIME} (n^d ) \\to A \\operatorname{Sp} (d\\forall - ) \\to A \\in \\operatorname{NTIME} (n^d (\\log n)^2 ). \\] Further the first - implication holds even if we use multidimensional nondeterministic Turing - machines. These results hold similarly for generalized spectra. As a consequence, - we obtain a simplified proof of a hierarchy result of P. Pudlak about (generalized) - spectra. We also prove that the set of primes is the spectrum of a certain - sentence with only one variable.", "venue": "SIAM journal on computing (Print)", - "year": 1984, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + string: '{"total": 65730, "offset": 2500, "next": 2600, "data": [{"paperId": + "8d4c109c2368dcb9277f2bed65497764a402957c", "externalIds": {"DBLP": "journals/eccc/ECCC-TR02-014", + "MAG": "86767695", "DOI": "10.1002/malq.200310001", "CorpusId": 14873334}, + "corpusId": 14873334, "publicationVenue": {"id": "e89761de-4f9a-4024-b7b3-29e0b13cb157", + "name": "Mathematical Logic Quarterly", "type": "journal", "alternate_names": + ["Math log q", "Math Log Q", "Mathematical logic quarterly"], "issn": "0044-3050", + "alternate_issns": ["0942-5616", "1521-3870"], "url": "https://onlinelibrary.wiley.com/journal/15213870", + "alternate_urls": ["http://www.onlinelibrary.wiley.com/journal/10.1002/(ISSN)1521-3870"]}, + "url": "https://www.semanticscholar.org/paper/8d4c109c2368dcb9277f2bed65497764a402957c", + "title": "Computational complexity on computable metric spaces", "abstract": + "We introduce a new Turing machine based concept of time complexity for functions + on computable metric spaces. It generalizes the ordinary complexity of word + functions and the complexity of real functions studied by Ko [19] et al. Although + this definition of TIME as the maximum of a generally infinite family of numbers + looks straightforward, at first glance, examples for which this maximum exists + seem to be very rare. It is the main purpose of this paper to prove that, + nevertheless, the definition has a large number of important applications. + Using the framework of TTE [40], we introduce computable metric spaces and + computability on the compact subsets. We prove that every computable metric + space has a c-proper c-admissible representation. We prove that Turing machine + time complexity of a function computable relative to c-admissible c-proper + representations has a computable bound on every computable compact subset. + We prove that computably compact computable metric spaces have concise c-proper + c-admissible representations and show by examples that many canonical representations + are of this kind. Finally, we compare our definition with a similar but not + equivalent one by Labhalla et al. [22]. Several examples illustrate the concepts. + By these results natural and realistic definitions of computational complexity + are now available for a variety of numerical problems such as image processing, + integration, continuous Fourier transform or wave propagation. 1 Electronic + Colloquium on Computational Complexity, Report No. 14 (2002)", "venue": "Mathematical + Logic Quarterly", "year": 2002, "referenceCount": 41, "citationCount": 40, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1984-05-01", "journal": {"name": "SIAM J. Comput.", "pages": "356-373", "volume": - "13"}, "authors": [{"authorId": "2072550219", "name": "E. Grandjean"}]}, {"paperId": - "cab33988243786d6b72ca8e15f1f75278e8fa0e2", "externalIds": {"DBLP": "conf/chi/FidasVA11", - "MAG": "2127241685", "DOI": "10.1145/1978942.1979325", "CorpusId": 14648784}, - "url": "https://www.semanticscholar.org/paper/cab33988243786d6b72ca8e15f1f75278e8fa0e2", - "title": "On the necessity of user-friendly CAPTCHA", "abstract": "A \"Completely - Automated Public Turing test to tell Computers and Humans Apart\" (CAPTCHA) - is a mechanism widely used nowadays for protection of web applications, interfaces, - and services from malicious users. A questionnaire-based survey combined with - a real usage scenario of a native-language CAPTCHA mechanism was conducted - in order to investigate several aspects that affect end-user perceptions related - to the quality of CAPTCHA. A total of 210 participants of age between 19 and - 64 participated during May and July 2010. The survey results validate the - common belief that CAPTCHAs are still difficult for humans to solve. They - also provide insights that can be applied to improve users'' experience on - interacting with CAPTCHA systems.", "venue": "International Conference on - Human Factors in Computing Systems", "year": 2011, "referenceCount": 15, "citationCount": - 83, "influentialCitationCount": 6, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Book", "Conference", "Review"], "publicationDate": - "2011-05-07", "journal": {"name": "Proceedings of the SIGCHI Conference on - Human Factors in Computing Systems"}, "authors": [{"authorId": "1722667", - "name": "C. Fidas"}, {"authorId": "2828551", "name": "A. Voyiatzis"}, {"authorId": - "1712961", "name": "N. Avouris"}]}, {"paperId": "f1e0e9d5cea6fbcdd9af155957e859a1d8b88376", - "externalIds": {"MAG": "1658364163", "DOI": "10.2139/ssrn.529962", "CorpusId": - 11404994}, "url": "https://www.semanticscholar.org/paper/f1e0e9d5cea6fbcdd9af155957e859a1d8b88376", - "title": "The Make-or-Buy Decision: Lessons from Empirical Studies", "abstract": - "Should a firm make its own inputs, buy them on the spot market, or maintain - an ongo- ing relationship with a particular supplier? The emergence of the - transaction cost approach to vertical integration in the 1970s and 1980s generated - a substantial body of empirical research on vertical firm boundaries and related - issues in contracting and organizational design. This chapter reviews the - empirical literature on the make-or-buy decision, focusing on the transaction - cost approach. After reviewing the Coasian or \"contractual\" approach to - vertical integration I summa- rize the most common empirical strategies, highlighting - current controversies over data and methods, sample selection, and related - issues. I next provide a sampler of evidence on compo- nent procurement, forward - integration into marketing and distribution, contractual design, and the use - of informal agreements. Finally, I discuss outstanding challenges and directions - for fu- ture research, focusing on the measurement and definition of key variables, - the role of asset specificity, the comparison of rival explanations, causality, - and the effects of the legal and regu- latory environment.", "venue": "", - "year": 2004, "referenceCount": 185, "citationCount": 230, "influentialCitationCount": - 11, "isOpenAccess": true, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": - [{"category": "Business", "source": "external"}, {"category": "Business", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "2004-04-01", "journal": {"name": "CORI: Contracting & Organizations Research - Institute"}, "authors": [{"authorId": "2270466", "name": "Peter G. Klein"}]}, - {"paperId": "8679596268d3868b03a9d8e2e68267d6e34d67bf", "externalIds": {"MAG": - "2969579176", "DBLP": "journals/mima/FloridiTT09", "DOI": "10.1007/s11023-008-9130-6", - "CorpusId": 7888490}, "url": "https://www.semanticscholar.org/paper/8679596268d3868b03a9d8e2e68267d6e34d67bf", - "title": "Turing\u2019s Imitation Game: Still an Impossible Challenge for - All Machines and Some Judges\u2013\u2013An Evaluation of the 2008 Loebner - Contest", "abstract": null, "venue": "Minds and Machines", "year": 2008, "referenceCount": - 7, "citationCount": 75, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Psychology", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2008-12-09", "journal": - {"name": "Minds and Machines", "pages": "145-150", "volume": "19"}, "authors": - [{"authorId": "1982425", "name": "L. Floridi"}, {"authorId": "2084659", "name": - "M. Taddeo"}, {"authorId": "1840916", "name": "M. Turilli"}]}, {"paperId": - "28ad3de7c2a8593583f394c667ae4affe190e705", "externalIds": {"MAG": "13088146", - "DBLP": "journals/etai/LarssonCEL99", "CorpusId": 25759886}, "url": "https://www.semanticscholar.org/paper/28ad3de7c2a8593583f394c667ae4affe190e705", + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"name": "Electron. Colloquium Comput. + Complex.", "volume": "TR02"}, "authors": [{"authorId": "1696520", "name": + "K. Weihrauch"}]}, {"paperId": "28ad3de7c2a8593583f394c667ae4affe190e705", + "externalIds": {"MAG": "13088146", "DBLP": "journals/etai/LarssonCEL99", "CorpusId": + 25759886}, "corpusId": 25759886, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/28ad3de7c2a8593583f394c667ae4affe190e705", "title": "Information States and Dialogue Move Engines", "abstract": "Peter Bohlin, Robin Cooper, Elisabet Engdahl, Sta an Larsson Department of linguisti s G\u007f oteborg University Box 200, Humanisten, SE-405 30 G\u007foteborg, @@ -52533,231 +59258,534 @@ interactions: improved behaviour in the experimental dialogue system. 2 General ar hite ture The general ar hite ture we are assuming is shown in (1). (1)", "venue": "Electron. Trans. Artif. Intell.", "year": 1999, "referenceCount": 0, "citationCount": - 51, "influentialCitationCount": 2, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Electron. Trans. Artif. Intell.", "pages": "53-71", "volume": "3"}, - "authors": [{"authorId": "98839416", "name": "Staffan Larsson"}, {"authorId": - "46887822", "name": "R. Cooper"}, {"authorId": "2184416", "name": "E. Engdahl"}, - {"authorId": "2555245", "name": "Peter Ljungl\u00f6f"}]}, {"paperId": "8d4c109c2368dcb9277f2bed65497764a402957c", - "externalIds": {"DBLP": "journals/eccc/ECCC-TR02-014", "MAG": "86767695", - "DOI": "10.1002/malq.200310001", "CorpusId": 14873334}, "url": "https://www.semanticscholar.org/paper/8d4c109c2368dcb9277f2bed65497764a402957c", - "title": "Computational complexity on computable metric spaces", "abstract": - "We introduce a new Turing machine based concept of time complexity for functions - on computable metric spaces. It generalizes the ordinary complexity of word - functions and the complexity of real functions studied by Ko [19] et al. Although - this definition of TIME as the maximum of a generally infinite family of numbers - looks straightforward, at first glance, examples for which this maximum exists - seem to be very rare. It is the main purpose of this paper to prove that, - nevertheless, the definition has a large number of important applications. - Using the framework of TTE [40], we introduce computable metric spaces and - computability on the compact subsets. We prove that every computable metric - space has a c-proper c-admissible representation. We prove that Turing machine - time complexity of a function computable relative to c-admissible c-proper - representations has a computable bound on every computable compact subset. - We prove that computably compact computable metric spaces have concise c-proper - c-admissible representations and show by examples that many canonical representations - are of this kind. Finally, we compare our definition with a similar but not - equivalent one by Labhalla et al. [22]. Several examples illustrate the concepts. - By these results natural and realistic definitions of computational complexity - are now available for a variety of numerical problems such as image processing, - integration, continuous Fourier transform or wave propagation. 1 Electronic - Colloquium on Computational Complexity, Report No. 14 (2002)", "venue": "Mathematical - Logic Quarterly", "year": 2002, "referenceCount": 41, "citationCount": 40, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"name": "Electron. Colloquium Comput. - Complex.", "volume": "TR02"}, "authors": [{"authorId": "1696520", "name": - "K. Weihrauch"}]}, {"paperId": "99e45dded79f54dfe60856fb708f2d804d1910e8", - "externalIds": {"MAG": "1563152078", "DOI": "10.5860/choice.31-6096", "CorpusId": - 56767473}, "url": "https://www.semanticscholar.org/paper/99e45dded79f54dfe60856fb708f2d804d1910e8", - "title": "The Mathematica programmer", "abstract": "Preface. About This Book. - Part 1: Paradigms of Programming. Introduction. Logic Programming. Higher-Order - Functions. Combinators. Turing Machines. Part 2: Visualization. Animated Algorithms. - Function Iteration and Chaos. Fractional Brownian Motion. Uniform Polyhedra. - The Stellated Icosahedra. Ray Tracing. Single-Image Stereograms. Appendixes. - References. Index of Programs. Index. Preface. About This Book: Overview. - About the Programs. Notation and Terminology. The Mathematica Programmer CD-ROM. - The Mathematica Programmer WWW Archive. Colophon.Part 1: Paradigms of Programming: - Introduction: Mathematica''s Programming Language. Pattern Matching and Term - Rewriting. Programming Styles. Program Organization. Logic Programming: The - Ingredients of Logic Programs. A PROLOG Interpreter for Mathematica. Lists - in PROLOG. Backtracking. Deduction. Higher-Order Functions: Introduction. - The Functional Features of Mathematica. Functions as Data. Fixed Points of - Higher-Order Functions. Combinators: Introduction. Combinatory Algebras. Combinatory - Abstraction. Converting Functions to Combinators. Applications. Turing Machines: - Introduction. A Turing Machine Simulator. Assembly Programming. Recursive - Functions. Optimization. Conclusions. The Complete Code of TuringMacros.m. - Part 2: Visualization: Animated Algorithms: Three Standard Sorting Algorithms. - Asymptotic Behavior. Conclusions. Function Iteration and Chaos: Function Iteration. - Bifurcations. The Final-State Diagram. The Ingredients of Chaos. Super-Attractive - Orbits. Conclusions. Fractional Brownian Motion: Introduction. Random Additions. - Fourier Synthesis. Random Faults. Analysis of fBm Data. Uniform Polyhedra: - Introduction. Uniform Construction. Data Structures. Rendering. Auxiliary - Programs. The Stellated Icosahedra: Introduction. Rendering. Discussion. The - Complete Code of Icosahedra.m. Ray Tracing: A Data Type for Surfaces. Photorealistic - Rendering. Converting Mathematica Graphics. Sample Images. Stereo Pairs. The - Complete Code of POVray.m. Single-Image Stereograms: Introduction. The Classis - SIRDS in Mathematica. Designing Good Images. Exact Stereograms. Interface - to External SIS Generators. The Complete Code of SIS.m. Appendixes. References. - Index of Programs. Index.", "venue": "", "year": 1994, "referenceCount": 0, - "citationCount": 30, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1994-04-01", - "journal": {"name": "The Mathematica journal", "pages": "279-290", "volume": - "7"}, "authors": [{"authorId": "33913441", "name": "Roman Maeder"}]}, {"paperId": - "28c40b6668e8dc0b220f6708582742ecd879961d", "externalIds": {"MAG": "2157778403", - "DOI": "10.1177/036354658201000407", "CorpusId": 20960468, "PubMed": "7125044"}, - "url": "https://www.semanticscholar.org/paper/28c40b6668e8dc0b220f6708582742ecd879961d", - "title": "Subtrochanteric stress fractures in runners", "abstract": "Seven - college track team members with stress frac tures in the subtrochanteric area - of the femur were diagnosed using x-ray films and bone imaging. One, with - repeated negative x-ray films, was considered to have a stress reaction. Suspected - causes for this high incidence of subtrochanteric stress fractures include - a change in running surfaces and an exercise called bounding (repetitive jumps - with or without weights). The implementation of bone scanning and its useful - ness after failure of conservative treatment is empha sized. A discussion - of the continuum of stress reaction and the seven cases, diagnoses, treatments, - and re sults are presented.", "venue": "American Journal of Sports Medicine", - "year": 1982, "referenceCount": 17, "citationCount": 47, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Medicine", + 51, "influentialCitationCount": 2, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1982-07-01", "journal": {"name": "The American Journal of Sports Medicine", - "pages": "228 - 232", "volume": "10"}, "authors": [{"authorId": "145074575", - "name": "J. Butler"}, {"authorId": "2107292289", "name": "S. L. Brown"}, {"authorId": - "46613847", "name": "B. Mcconnell"}]}, {"paperId": "53fa73abf1a016e3bde197763114f0b4136f800c", - "externalIds": {"DBLP": "journals/amc/ZhangLY11", "MAG": "2092619359", "DOI": - "10.1016/j.amc.2011.06.071", "CorpusId": 29635974}, "url": "https://www.semanticscholar.org/paper/53fa73abf1a016e3bde197763114f0b4136f800c", - "title": "Hopf bifurcation and Turing instability in spatial homogeneous and - inhomogeneous predator-prey models", "abstract": null, "venue": "Applied Mathematics - and Computation", "year": 2011, "referenceCount": 31, "citationCount": 45, - "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2011-11-01", "journal": {"name": "Appl. - Math. Comput.", "pages": "1883-1893", "volume": "218"}, "authors": [{"authorId": - "2108230587", "name": "Jiafang Zhang"}, {"authorId": "1779740", "name": "Wan-Tong - Li"}, {"authorId": "34633463", "name": "Xiang-Ping Yan"}]}, {"paperId": "1e2b8872ebf9a06265015757002d1bedec19e16e", - "externalIds": {"DBLP": "conf/infocom/LiGWTL09", "MAG": "2139573800", "DOI": - "10.1109/INFCOM.2009.5062153", "CorpusId": 2578759}, "url": "https://www.semanticscholar.org/paper/1e2b8872ebf9a06265015757002d1bedec19e16e", - "title": "FiConn: Using Backup Port for Server Interconnection in Data Centers", - "abstract": "The goal of data center networking is to interconnect a large - number of server machines with low equipment cost, high and balanced network - capacity, and robustness to link/server faults. It is well understood that, - the current practice where servers are connected by a tree hierarchy of network - switches cannot meet these requirements (8), (9). In this paper, we explore - a new server-interconnection struc- ture. We observe that the commodity server - machines used in today''s data centers usually come with two built-in Ethernet - ports, one for network connection and the other left for backup purpose. We - believe that, if both ports are actively used in network connections, we can - build a low-cost interconnection structure without the expensive higher-level - large switches. Our new network design, called FiConn, utilizes both ports - and only the low-end commodity switches to form a scalable and highly effective - structure. Although the server node degree is only two in this structure, - we have proven that FiConn is highly scalable to encompass hundreds of thousands - of servers with low diameter and high bisection width. The routing mechanism - in FiConn balances different levels of links. We have further developed a - low- overhead traffic-aware routing mechanism to improve effective link utilization - based on dynamic traffic state. Simulation results have demonstrated that - the routing mechanisms indeed achieve high networking throughput.", "venue": - "IEEE INFOCOM 2009", "year": 2009, "referenceCount": 24, "citationCount": - 224, "influentialCitationCount": 34, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2009-04-19", "journal": - {"name": "IEEE INFOCOM 2009", "pages": "2276-2285"}, "authors": [{"authorId": - "49621119", "name": "Dan Li"}, {"authorId": "145207202", "name": "Chuanxiong - Guo"}, {"authorId": "46477225", "name": "Haitao Wu"}, {"authorId": "144213664", - "name": "Kun Tan"}, {"authorId": "2014352", "name": "Songwu Lu"}]}, {"paperId": - "82f2b9ce68f3d5343f4d4aa92800406a813bdc99", "externalIds": {"MAG": "1973663347", - "DOI": "10.1088/0951-7715/22/3/006", "CorpusId": 17800197}, "url": "https://www.semanticscholar.org/paper/82f2b9ce68f3d5343f4d4aa92800406a813bdc99", - "title": "Dynamical transitions of Turing patterns", "abstract": "This paper - is concerned with the formation and persistence of spatiotemporal patterns - in binary mixtures of chemically reacting species, where one of the species - is an activator, the other an inhibitor of the chemical reaction. The system - of reaction\u2013diffusion equations is reduced to a finite system of ordinary - differential equations by a variant of the centre-manifold reduction method. - The reduced system fully describes the local dynamics of the original system - near transition points at the onset of instability. The attractor\u2013bifurcation - theory is used to give a complete characterization of the bifurcated objects - in terms of the physical parameters of the problem. The results are illustrated - for the Schnakenberg model.", "venue": "", "year": 2009, "referenceCount": - 55, "citationCount": 11, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Physics", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2009-03-01", "journal": {"name": "Nonlinearity", - "pages": "601 - 626", "volume": "22"}, "authors": [{"authorId": "68986100", - "name": "H. Kaper"}, {"authorId": "153926127", "name": "Shouhong Wang"}, {"authorId": - "3382687", "name": "M. Yari"}]}, {"paperId": "8381d0ceea4ba1825e8c660cfd8817156340fb42", - "externalIds": {"MAG": "2093810711", "DOI": "10.1080/00207167708803124", "CorpusId": - 62651601}, "url": "https://www.semanticscholar.org/paper/8381d0ceea4ba1825e8c660cfd8817156340fb42", - "title": "Recursive turing machines", "abstract": "The Turing machine model - is extended to allow for recursive calls and the basic theory of these machines - is developed. The model is also used to study the following additional topics: - The time and storage needed to implement recursive algorithms by non-recursive - algorithms, the storage needed to implement non-deterministic algorithms by - deterministic algorithms, and the implementation of recursive algorithms by - means of stack machines. Some attention is given to time bounds but the emphasis - is on storage-bounded computations.", "venue": "", "year": 1977, "referenceCount": - 4, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "International Journal of Computer Mathematics", "pages": "3-31", - "volume": "6"}, "authors": [{"authorId": "2859514", "name": "W. Savitch"}]}, - {"paperId": "bb50adb34efc634245ca0c34f19e5bb01dd228ad", "externalIds": {"ArXiv": - "1201.4417", "MAG": "1984132430", "DOI": "10.1103/PhysRevE.85.026215", "CorpusId": - 13632717, "PubMed": "22463307"}, "url": "https://www.semanticscholar.org/paper/bb50adb34efc634245ca0c34f19e5bb01dd228ad", - "title": "Instabilities and patterns in coupled reaction-diffusion layers.", - "abstract": "We study instabilities and pattern formation in reaction-diffusion - layers that are diffusively coupled. For two-layer systems of identical two-component - reactions, we analyze the stability of homogeneous steady states by exploiting - the block symmetric structure of the linear problem. There are eight possible - primary bifurcation scenarios, including a Turing-Turing bifurcation that - involves two disparate length scales whose ratio may be tuned via the interlayer - coupling. For systems of n-component layers and nonidentical layers, the linear - problem''s block form allows approximate decomposition into lower-dimensional - linear problems if the coupling is sufficiently weak. As an example, we apply - these results to a two-layer Brusselator system. The competing length scales - engineered within the linear problem are readily apparent in numerical simulations - of the full system. Selecting a sqrt[2]:1 length-scale ratio produces an unusual - steady square pattern.", "venue": "Physical review. E, Statistical, nonlinear, - and soft matter physics", "year": 2012, "referenceCount": 17, "citationCount": - 24, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Physics", "Medicine", "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2012-01-21", "journal": + null, "journal": {"name": "Electron. Trans. Artif. Intell.", "pages": "53-71", + "volume": "3"}, "authors": [{"authorId": "98839416", "name": "Staffan Larsson"}, + {"authorId": "46887822", "name": "R. Cooper"}, {"authorId": "2184416", "name": + "E. Engdahl"}, {"authorId": "2555245", "name": "Peter Ljungl\u00f6f"}]}, {"paperId": + "f1e0e9d5cea6fbcdd9af155957e859a1d8b88376", "externalIds": {"MAG": "1658364163", + "DOI": "10.2139/ssrn.529962", "CorpusId": 11404994}, "corpusId": 11404994, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f1e0e9d5cea6fbcdd9af155957e859a1d8b88376", + "title": "The Make-or-Buy Decision: Lessons from Empirical Studies", "abstract": + "Should a firm make its own inputs, buy them on the spot market, or maintain + an ongo- ing relationship with a particular supplier? The emergence of the + transaction cost approach to vertical integration in the 1970s and 1980s generated + a substantial body of empirical research on vertical firm boundaries and related + issues in contracting and organizational design. This chapter reviews the + empirical literature on the make-or-buy decision, focusing on the transaction + cost approach. After reviewing the Coasian or \"contractual\" approach to + vertical integration I summa- rize the most common empirical strategies, highlighting + current controversies over data and methods, sample selection, and related + issues. I next provide a sampler of evidence on compo- nent procurement, forward + integration into marketing and distribution, contractual design, and the use + of informal agreements. Finally, I discuss outstanding challenges and directions + for fu- ture research, focusing on the measurement and definition of key variables, + the role of asset specificity, the comparison of rival explanations, causality, + and the effects of the legal and regu- latory environment.", "venue": "", + "year": 2004, "referenceCount": 185, "citationCount": 230, "influentialCitationCount": + 11, "isOpenAccess": true, "openAccessPdf": {"url": "https://mospace.umsystem.edu/xmlui/bitstream/10355/139/1/The%20Make-or-Buy%20Decision.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Business"], "s2FieldsOfStudy": [{"category": + "Business", "source": "external"}, {"category": "Business", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "2004-04-01", "journal": + {"name": "CORI: Contracting & Organizations Research Institute"}, "authors": + [{"authorId": "2270466", "name": "Peter G. Klein"}]}, {"paperId": "81caabf38caaac03b64668eda5323616ae7b5ce9", + "externalIds": {"MAG": "2172194487", "DOI": "10.1002/mma.3275", "CorpusId": + 124993452}, "corpusId": 124993452, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/81caabf38caaac03b64668eda5323616ae7b5ce9", + "title": "Bifurcation analysis of a diffusive predator\u2013prey system with + a herd behavior and quadratic mortality", "abstract": "In this paper, a diffusive + predator\u2013prey system, in which the prey species exhibits herd behavior + and the predator species with quadratic mortality, has been studied. The stability + of positive constant equilibrium, Hopf bifurcations, and diffusion\u2010driven + Turing instability are investigated under the Neumann boundary condition. + The explicit condition for the occurrence of the diffusion\u2010driven Turing + instability is derived, which is determined by the relationship of the diffusion + rates of two species. The formulas determining the direction and the stability + of Hopf bifurcations depending on the parameters of the system are derived. + Finally, numerical simulations are carried out to verify and extend the theoretical + results and show the existence of spatially homogeneous periodic solutions + and nonconstant steady states. Copyright \u00a9 2014 John Wiley & Sons, Ltd.", + "venue": "", "year": 2015, "referenceCount": 34, "citationCount": 24, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2015-09-30", "journal": {"name": "Mathematical Methods in the Applied Sciences", + "pages": "2994 - 3006", "volume": "38"}, "authors": [{"authorId": "102820754", + "name": "Zhouli Xu"}, {"authorId": "1794550", "name": "Yongli Song"}]}, {"paperId": + "77553865c8dde5f8a28d4a0187925f42d170e637", "externalIds": {"MAG": "1992313294", + "DOI": "10.1090/S0025-5718-1974-0341881-2", "CorpusId": 119855015}, "corpusId": + 119855015, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/77553865c8dde5f8a28d4a0187925f42d170e637", + "title": "The application of implicit Runge-Kutta and collection methods to + boundary-value problems", "abstract": "The solution of a nonlinear system + of first order differential equations with nonlinear boundary conditions by + implicit Runge-Kutta methods based on interpolatory quadrature formulae is + examined. An equivalence between implicit Runge-Kutta and collocation schemes + is established. It is shown that the difference equations obtained have a + unique solution in a neighbourhood of an isolated solution of the continuous + problem, that this solution can be computed by Newton iteration and that it + converges to the isolated solution. The order of convergence is equal to the + degree of precision of the related quadra- ture formula plus one. The efficient + implementation of the methods is discussed and numerical examples are given. + 1. Introduction. We investigate the application of certain implicit Runge- + Kutta methods (cf. Butcher (2)) to the numerical solution of nonlinear boundary- + value problems of the form", "venue": "", "year": 1974, "referenceCount": + 18, "citationCount": 82, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.ams.org/mcom/1974-28-126/S0025-5718-1974-0341881-2/S0025-5718-1974-0341881-2.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "1974-05-01", "journal": {"name": + "Mathematics of Computation", "pages": "449-464", "volume": "28"}, "authors": + [{"authorId": "145175596", "name": "R. Weiss"}]}, {"paperId": "61c04a0d86743ba23e8652931361434ac2cf53c2", + "externalIds": {"MAG": "591953899", "CorpusId": 190853420}, "corpusId": 190853420, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/61c04a0d86743ba23e8652931361434ac2cf53c2", + "title": "The Most Human Human: What Talking with Computers Teaches Us About + What It Means to Be Alive", "abstract": "Named for computer pioneer Alan Turing, + the Tur-ing Test convenes a panel of judges who pose questions\u2014ranging + anywhere from celebrity gossip to moral conundrums\u2014to hidden contestants + in an attempt to discern which is human and which is a computer. The machine + that most often fools the panel wins the Most Human Computer Award. But there + is also a prize, bizarre and intriguing, for the Most Human Human.", "venue": + "", "year": 2011, "referenceCount": 0, "citationCount": 34, "influentialCitationCount": + 5, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], + "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2011-03-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": + "1904729", "name": "Brian R. Christian"}]}, {"paperId": "bb833e7f3124dcb92629890c1c98e9a2db9ff820", + "externalIds": {"MAG": "35682058", "DOI": "10.5951/tcm.8.6.0372", "CorpusId": + 59720462}, "corpusId": 59720462, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bb833e7f3124dcb92629890c1c98e9a2db9ff820", + "title": "What Are Virtual Manipulatives", "abstract": "Two types of representations + on the World WideWeb are being called virtual manipulatives\u2014theseare + static and dynamic visual representations ofconcrete manipulatives (Spicer + 2000). Conse-quently, two types of virtual manipulativesare available as teaching + and learning tools.Because one of these types is far morepowerful and has + much greater utility andpotential for teaching, drawing the distinc-tion between + the two is important. Establish-ing a name and definition that uniquely describethese + dynamic images is equally important to avoidconfusion.Static visual representations + are essentially pic-tures. They are the sorts of visual images ordinar-ily + associated with pictures in books, drawings onan overhead projector, sketches + on a chalkboard,and so on. Although such representations resembleconcrete + manipulatives, they cannot be used in thesame ways that concrete manipulatives + can. Thatis, a student can actually slide, flip, and turn con-crete manipulatives + but cannot perform the sameactions with a static picture of the concrete manip-ulative. + These static visual representations are nottrue virtual manipulatives.In contrast, + dynamic visual representations ofconcrete manipulatives are essentially \u201cobjects.\u201dThey + are visual images on the computer that arejust like pictures in books, drawings + on an over-head projector, sketches on a chalkboard, and soon. In addition, + these dynamic visual representa-tions can be manipulated in the same ways + that aconcrete manipulative can. Just as a student can", "venue": "", "year": + 2002, "referenceCount": 9, "citationCount": 228, "influentialCitationCount": + 7, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "Teaching children mathematics", + "pages": "372-377", "volume": "8"}, "authors": [{"authorId": "46193007", "name": + "P. Moyer"}, {"authorId": "72944716", "name": "Johnna J. Bolyard"}, {"authorId": + "52423074", "name": "M. Spikell"}]}, {"paperId": "dd245f6c4cd4c288e1581cdaa7a19fbebe9e7701", + "externalIds": {"MAG": "2159708388", "DOI": "10.1002/POLA.10643", "CorpusId": + 97773918}, "corpusId": 97773918, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dd245f6c4cd4c288e1581cdaa7a19fbebe9e7701", + "title": "Functionalizing the interior of dendrimers: Synthetic challenges + and applications", "abstract": "Chemists'' fascina- tion with dendrimers mainly + orig- inates from their unique architec- ture and its exploitation for the + de- sign of well-defined functional macromolecules. Depending on the nature + of the synthesis, func- tionalization is traditionally intro- duced at the + core, the periphery, or both. However, the specific incor- poration of functional + groups at the interior layers, i.e., generations, represents a considerable + synthetic hurdle that must be overcome for the full potential of dendrimers + to be realized. This review covers re- cent advances in this emerging frontier + of dendrimer science with a particular focus on covalent modifications. Monomer + design, syntheses, and properties of vari- ous dendritic backbone types are + discussed. Internal functionaliza- tion dramatically increases the de- gree + of complexity that can be implemented into a dendrimer macromolecule and, + therefore, promises to lead to smart materials for future applications in + bio- and nanotechnologies. \u00a9 2003 Wiley Peri-", "venue": "", "year": + 2003, "referenceCount": 102, "citationCount": 85, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Chemistry", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2003-04-15", "journal": {"name": "Journal of Polymer Science Part A", "pages": + "1047-1058", "volume": "41"}, "authors": [{"authorId": "2135427", "name": + "S. Hecht"}]}, {"paperId": "4861701b00b0d2609dba39e7010017abd9174f93", "externalIds": + {"MAG": "2324179631", "DOI": "10.1142/9789814293020_0012", "CorpusId": 27084399}, + "corpusId": 27084399, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4861701b00b0d2609dba39e7010017abd9174f93", + "title": "TURING DEGREES AND THE ERSHOV HIERARCHY", "abstract": "An n-r.e. + set can be defined as the symmetric difference of n recursively enumerable + sets. The classes of these sets form a natural hierarchy which became a well-studied + topic in recursion theory. In a series of ground-breaking papers, Ershov generalized + this hierarchy to transfinite levels based on Kleene\u2019s notations of ordinals + and this work lead to a fruitful study of these sets and their many-one and + Turing degrees. The Ershov hierarchy is a natural measure of complexity of + the sets below the halting problem. In this paper, we survey the early work + by Ershov and others on this hierarchy and present the most fundamental results. + We also provide some pointers to concurrent work in the field.", "venue": + "", "year": 2009, "referenceCount": 37, "citationCount": 14, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "2009-12-01", "journal": {"name": "", "pages": "300-321", "volume": ""}, "authors": + [{"authorId": "1699450", "name": "F. Stephan"}, {"authorId": "2109409462", + "name": "Yue Yang"}, {"authorId": "2804470", "name": "Liang Yu"}]}, {"paperId": + "4507c730687c4244de4ea945537cef4649c0d52b", "externalIds": {"MAG": "2158157333", + "DOI": "10.1127/0935-1221/2001/0013-0453", "CorpusId": 130971940}, "corpusId": + 130971940, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4507c730687c4244de4ea945537cef4649c0d52b", + "title": "Eutectic crystallization in the undercooled Orthoclase-Quartz-H2O + system: experiments and simulations", "abstract": "Textures formed during + crystallization of the eutectic composition in the system Orthoclase-Quartz-H2O + at 500 MPa and 50, 100, and 200\u00b0C undercooling have been studied experimentally + and simulated using a two- dimensional Ising model. The experiments performed + at 50\u00b0C undercooling did not produce complex, interesting tex- tures + but only very rare, isolated K-feldspar and quartz crystals. At 100\u00b0C + undercooling the most common texture is a fine-grained, submicrometre to micrometre-scale, + spherulitic quartz-K-feldspar intergrowth; set within this inter- growth are + larger individual crystals of quartz or K-feldspar. Experiments performed + at 200\u00b0C undercooling are remarkable for the occurrence of micrometre-scale + graphic textures and millimetre scale spherulitic textures, charac- terized + by quartz-K-feldspar intergrowths in the core and dominated by K-feldspar + at the rims. Simulations of crys- tal growth, performed to complement and + to interpret the experimental products, investigated what combination of growth + (G) and diffusion (D) conditions can give rise to the crystal shapes and textures + found in the experiments. These conditions correspond to growth rates between + ~ 1 x 10-10 and 5 x 10-9 m s-1 and diffusion coefficients between 10-17 m2 + s-1 in the melt phase and 10-8 m2 s-1 in the fluid phase. The simulations, + despite their limitations, provide tex- tures similar to the experimental + ones. In particular, simulations produced a quartz-K-feldspar intergrowth + when G = D and singular, large quartz and K-feldspar crystals when G < D. + These changes in the G:D ratio, in the experi- ments and in natural rocks, + are attributed to a change in the growth of the crystal from a silicate melt + to an aqueous fluid. The most interesting results of this study are that highly + undercooled melts of a simplified pegmatite composi- tion produce textures + remarkably similar to natural pegmatites and that simulations provide a powerful + tool to under- stand what processes cause these textures in experimental run + products and natural rocks.", "venue": "", "year": 2001, "referenceCount": + 28, "citationCount": 64, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": + [{"category": "Materials Science", "source": "external"}, {"category": "Geology", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2001-05-01", + "journal": {"name": "European Journal of Mineralogy", "pages": "453-466", + "volume": "13"}, "authors": [{"authorId": "48929437", "name": "D. Baker"}, + {"authorId": "2049875249", "name": "A. Freda"}]}, {"paperId": "33c6d18f5b23840c040d4d009e07347b5774abda", + "externalIds": {"MAG": "2156678509", "DOI": "10.1007/S11097-009-9124-8", "CorpusId": + 15593064}, "corpusId": 15593064, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/33c6d18f5b23840c040d4d009e07347b5774abda", + "title": "Thought translation, tennis and Turing tests in the vegetative state", + "abstract": null, "venue": "", "year": 2009, "referenceCount": 44, "citationCount": + 19, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.springer.com/content/pdf/10.1007%2Fs11097-009-9124-8.pdf", + "status": "HYBRID"}, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": + "Psychology", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2009-03-10", + "journal": {"name": "Phenomenology and the Cognitive Sciences", "pages": "361-370", + "volume": "8"}, "authors": [{"authorId": "2822070", "name": "J. Stins"}, {"authorId": + "32092273", "name": "Steven Laureys"}]}, {"paperId": "2e22c09a60a5c5521c4f0f51c9c1ba7f537ccea7", + "externalIds": {"MAG": "2333100130", "DOI": "10.1103/PHYSREVE.87.022908", + "CorpusId": 16606540, "PubMed": "23496592"}, "corpusId": 16606540, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/2e22c09a60a5c5521c4f0f51c9c1ba7f537ccea7", + "title": "Homoclinic snaking near a codimension-two Turing-Hopf bifurcation + point in the Brusselator model.", "abstract": "Spatiotemporal Turing-Hopf + pinning solutions near the codimension-two Turing-Hopf point of the one-dimensional + Brusselator model are studied. Both the Turing and Hopf bifurcations are supercritical + and stable. The pinning solutions exhibit coexistence of stationary stripes + of near critical wavelength and time-periodic oscillations near the characteristic + Hopf frequency. Such solutions of this nonvariational problem are in contrast + to the stationary pinning solutions found in the subcritical Turing regime + for the variational Swift-Hohenberg equations, characterized by a spatially + periodic pattern embedded in a spatially homogeneous background state. Numerical + continuation was used to solve periodic boundary value problems in time for + the Fourier amplitudes of the spatiotemporal Turing-Hopf pinning solutions. + The solution branches are organized in a series of saddle-node bifurcations + similar to the known snaking structures of stationary pinning solutions. We + find two intertwined pairs of such branches, one with a defect in the middle + of the striped region, and one without. Solutions on one branch of one pair + differ from those on the other branch by a \u03c0 phase shift in the spatially + periodic region, i.e., locations of local minima of solutions on one branch + correspond to locations of maxima of solutions on the other branch. These + branches are connected to branches exhibiting collapsed snaking behavior, + where the snaking region collapses to almost a single value in the bifurcation + parameter. Solutions along various parts of the branches are described in + detail. Time dependent depinning dynamics outside the saddle nodes are illustrated, + and a time scale for the depinning transitions is numerically established. + Wavelength variation within the snaking region is discussed, and reasons for + the variation are given in the context of amplitude equations. Finally, we + compare the pinning region to the Maxwell line found numerically by time evolving + the amplitude equations.", "venue": "Physical review. E, Statistical, nonlinear, + and soft matter physics", "year": 2013, "referenceCount": 13, "citationCount": + 15, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://link.aps.org/accepted/10.1103/PhysRevE.87.022908", "status": + "HYBRID"}, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2013-02-14", "journal": {"name": "Physical review. E, Statistical, nonlinear, and soft matter physics", - "pages": "\n 026215\n ", "volume": "85 2 Pt 2"}, "authors": - [{"authorId": "1896425", "name": "Anne J. Catll\u00e1"}, {"authorId": "2057835560", - "name": "Amelia McNamara"}, {"authorId": "1949686", "name": "C. Topaz"}]}, - {"paperId": "460c9596121966070176e23bc276b3485741f1e9", "externalIds": {"MAG": - "1526125701", "DOI": "10.5772/53336", "CorpusId": 82884160}, "url": "https://www.semanticscholar.org/paper/460c9596121966070176e23bc276b3485741f1e9", - "title": "Mesenchymal Stem Cells from Extra-Embryonic Tissues for Tissue Engineering - \u2013 Regeneration of the Peripheral Nerve", "abstract": "in than is centrifuged - is pellet resuspended ture It possible to obtain MSCs in culture from 52 out - of 60 thawed", "venue": "", "year": 2013, "referenceCount": 143, "citationCount": - 18, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "2013-03-27", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "8671062", "name": "Andrea Gartner"}, {"authorId": "145765932", - "name": "T. Pereira"}, {"authorId": "115528268", "name": "R. Gomes"}, {"authorId": - "31502610", "name": "A. L. Lu\u00eds"}, {"authorId": "7870920", "name": "M. - Fran\u00e7a"}, {"authorId": "3580366", "name": "S. Geuna"}, {"authorId": "2073031192", - "name": "P. Armada-da-Silva"}, {"authorId": "4173873", "name": "A. Maur\u00edcio"}]}, - {"paperId": "b43d2a7e779e93e10b9effe14a9892a329d832f0", "externalIds": {"MAG": - "2132117882", "DOI": "10.1002/anie.200802339", "CorpusId": 34462201, "PubMed": - "18756573"}, "url": "https://www.semanticscholar.org/paper/b43d2a7e779e93e10b9effe14a9892a329d832f0", + "pages": "\n 022908\n ", "volume": "87 2"}, "authors": [{"authorId": + "144342608", "name": "J. Tzou"}, {"authorId": "2140176355", "name": "Y.-P. + Ma"}, {"authorId": "143705457", "name": "A. Bayliss"}, {"authorId": "1767738", + "name": "B. Matkowsky"}, {"authorId": "2216988", "name": "V. Volpert"}]}, + {"paperId": "2a984d5cdeb020f4239ef158af7a35987e9b30cd", "externalIds": {"ArXiv": + "1104.3421", "MAG": "1631934516", "DBLP": "journals/corr/abs-1104-3421", "DOI": + "10.1007/s11023-011-9262-y", "CorpusId": 7297787}, "corpusId": 7297787, "publicationVenue": + {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", "name": "Minds and Machines", + "type": "journal", "alternate_names": ["Mind Mach"], "issn": "0924-6495", + "url": "https://www.springer.com/computer/ai/journal/11023", "alternate_urls": + ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/2a984d5cdeb020f4239ef158af7a35987e9b30cd", + "title": "Empirical Encounters with Computational Irreducibility and Unpredictability", + "abstract": null, "venue": "Minds and Machines", "year": 2011, "referenceCount": + 31, "citationCount": 24, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1104.3421", "status": "GREEN"}, + "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2011-04-18", "journal": + {"name": "Minds and Machines", "pages": "149-165", "volume": "22"}, "authors": + [{"authorId": "66445647", "name": "H. Zenil"}, {"authorId": "1389866422", + "name": "F. Soler-Toscano"}, {"authorId": "1748961", "name": "J. Joosten"}]}, + {"paperId": "0079d1ecc85eddf3c91758ec341ab8b67ba4f85a", "externalIds": {"MAG": + "2080263276", "DBLP": "conf/focs/KarpM67", "DOI": "10.1109/FOCS.1967.27", + "CorpusId": 45656285}, "corpusId": 45656285, "publicationVenue": {"id": "98af7d9d-37d6-49f4-b260-a15295f441a5", + "name": "Scandinavian Workshop on Algorithm Theory", "type": "conference", + "alternate_names": ["Scand Workshop Algorithm Theory", "SWAT"]}, "url": "https://www.semanticscholar.org/paper/0079d1ecc85eddf3c91758ec341ab8b67ba4f85a", + "title": "Parallel Program Schemata: A Mathematical Model for Parallel Computation", + "abstract": "In this paper we report some results of a study on the range + of possible structure of programming languages. The main emphasis is on the + range of graphical (\"topological\" or flowchart) and syntactic structure. + For the sake of simplicity and precision we rather severely limit the \"semantic + structure\" of the languages--we restrict ourselves to command (instruction) + languages for Turing machines. As we show, this apparently strong limitation + imposes very little restriction on the graphical and syntactic structure. + The bulk of the paper consists of the presentation of six Turing machine languages. + These languages serve to illustrate the range of possible structure and, more + important, they allow us to establish the range of a number of structural + parameters. All the languages are universal in the sense that in each one + we can program every computable function. However, they differ greatly in + syntax, graphical structure, ease of compilation (assembly), and in the type + of machine, if any, which can operate directly in the language. In brief, + we present languages with finite-state, context-free and more complex syntax; + languages with \"conventional\" graphical structure, with block structure + and only one transfer per block, with only nested transfers (nested loops), + with transfers only to the immediately neighboring instructions, and with + only one transfer per program.", "venue": "Scandinavian Workshop on Algorithm + Theory", "year": 1967, "referenceCount": 6, "citationCount": 41, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "1967-10-18", + "journal": {"pages": "55-61"}, "authors": [{"authorId": "47546648", "name": + "R. Karp"}, {"authorId": "1400120462", "name": "Raymond E. Miller"}]}, {"paperId": + "bdee397b729e09955f96d3f93a8fc4ccf9a38de6", "externalIds": {"MAG": "2964117658", + "ArXiv": "1711.02787", "DBLP": "journals/ijbc/AnJ18", "DOI": "10.1142/S0218127418501080", + "CorpusId": 53290277}, "corpusId": 53290277, "publicationVenue": {"id": "f3358047-5fa1-4315-9473-4bb4c19cb756", + "name": "International Journal of Bifurcation and Chaos in Applied Sciences + and Engineering", "type": "journal", "alternate_names": ["Int J Bifurc Chaos", + "Int J Bifurc Chaos Appl Sci Eng", "International Journal of Bifurcation and + Chaos"], "issn": "0218-1274", "url": "http://www.worldscinet.com/ijbc/ijbc.shtml", + "alternate_urls": ["http://www.worldscinet.com/ijbc/mkt/archive.shtml"]}, + "url": "https://www.semanticscholar.org/paper/bdee397b729e09955f96d3f93a8fc4ccf9a38de6", + "title": "Turing-Hopf Bifurcation and Spatio-Temporal Patterns of a Ratio-Dependent + Holling-Tanner Model with Diffusion", "abstract": "In this paper, the dynamics + of a diffusive ratio-dependent Holling\u2013Tanner model subject to Neumann + boundary conditions is considered. We derive the conditions for the existence + of Hopf, Turing, Turing\u2013Hopf, Turing\u2013Turing, Hopf-double-Turing + and triple-Turing bifurcations at the unique positive equilibrium. Furthermore, + we study the detailed dynamics in the neighborhood of the Turing\u2013Hopf + bifurcation by using the normal form method. Our results show that the Turing\u2013Hopf + bifurcation can give rise to the formation of the temporal and spatio-temporal + patterns. In particular, we theoretically prove the existence of the spatially + inhomogeneous periodic and quasi-periodic solutions, which can be used to + explain the phenomenon of spatio-temporal resonance of the populations. Finally, + the numerical simulations are given to illustrate the analytical results.", + "venue": "International Journal of Bifurcation and Chaos in Applied Sciences + and Engineering", "year": 2017, "referenceCount": 41, "citationCount": 8, + "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": {"url": + "http://arxiv.org/pdf/1711.02787", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2017-11-08", "journal": {"name": "Int. J. Bifurc. Chaos", + "pages": "1850108:1-1850108:22", "volume": "28"}, "authors": [{"authorId": + "1521749343", "name": "Qi An"}, {"authorId": "144382267", "name": "Weihua + Jiang"}]}, {"paperId": "8558bdd72db6eb9e38452b62c00082a4467df805", "externalIds": + {"ArXiv": "1307.6236", "MAG": "1525936709", "DOI": "10.1088/1361-6544/aaa5dc", + "CorpusId": 118308682}, "corpusId": 118308682, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/8558bdd72db6eb9e38452b62c00082a4467df805", + "title": "Dynamical spike solutions in a nonlocal model of pattern formation", + "abstract": "Coupling a reaction-diffusion equation with ordinary differential + equa- tions (ODE) may lead to diffusion-driven instability (DDI) which, in + contrast to the classical reaction-diffusion models, causes destabilization + of both, constant solutions and Turing patterns. Using a shadow-type limit + of a reaction-diffusion-ODE model, we show that in such cases the instability + driven by nonlocal terms (a counterpart of DDI) may lead to formation of unbounded + spike patterns.", "venue": "", "year": 2013, "referenceCount": 49, "citationCount": + 33, "influentialCitationCount": 3, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1307.6236.pdf", "status": "GREEN"}, "fieldsOfStudy": + ["Physics", "Mathematics"], "s2FieldsOfStudy": [{"category": "Physics", "source": + "external"}, {"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2013-07-23", "journal": {"name": "Nonlinearity", "pages": "1757 - 1781", + "volume": "31"}, "authors": [{"authorId": "1389565398", "name": "A. Marciniak-Czochra"}, + {"authorId": "103539569", "name": "Steffen H\u00e4rting"}, {"authorId": "101468044", + "name": "G. Karch"}, {"authorId": "2118679527", "name": "Kanako Suzuki"}]}, + {"paperId": "0a4f9a9e2bef5763ea71e2abcb2df10ae405cb6d", "externalIds": {"DBLP": + "journals/amc/PengZ16", "MAG": "2195992720", "DOI": "10.1016/j.amc.2015.11.067", + "CorpusId": 29405115}, "corpusId": 29405115, "publicationVenue": {"id": "e593a63a-bfb7-45ac-aa27-5c320ac7a952", + "name": "Applied Mathematics and Computation", "type": "journal", "alternate_names": + ["Appl Math Comput"], "issn": "0096-3003", "url": "http://www.sciencedirect.com/science/journal/00963003", + "alternate_urls": ["https://www.sciencedirect.com/journal/applied-mathematics-and-computation"]}, + "url": "https://www.semanticscholar.org/paper/0a4f9a9e2bef5763ea71e2abcb2df10ae405cb6d", + "title": "Turing instability and pattern induced by cross-diffusion in a predator-prey + system with Allee effect", "abstract": null, "venue": "Applied Mathematics + and Computation", "year": 2016, "referenceCount": 53, "citationCount": 46, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2016-02-15", "journal": {"name": "Appl. + Math. Comput.", "pages": "1-12", "volume": "275"}, "authors": [{"authorId": + "2814217", "name": "Yahong Peng"}, {"authorId": "1742870", "name": "Tonghua + Zhang"}]}, {"paperId": "ad99decd59d6cbb79ec5945fdbe52ba0b86093ad", "externalIds": + {"MAG": "2120761283", "DOI": "10.1146/ANNUREV.PH.54.030192.003155", "CorpusId": + 13155331, "PubMed": "1562185"}, "corpusId": 13155331, "publicationVenue": + {"id": "eedc6e61-e846-485a-a273-0cc8bb06d7d3", "name": "Annual Review of Physiology", + "type": "journal", "alternate_names": ["Annu Rev Physiol"], "issn": "0066-4278", + "url": "https://www.annualreviews.org/journal/physiol", "alternate_urls": + ["https://www.annualreviews.org/loi/physiol", "http://physiol.annualreviews.org/", + "http://arjournals.annualreviews.org/loi/physiol"]}, "url": "https://www.semanticscholar.org/paper/ad99decd59d6cbb79ec5945fdbe52ba0b86093ad", + "title": "Natural freeze tolerance in ectothermic vertebrates.", "abstract": + "Amphibians and reptiles living in seasonally cold regions of the earth face + several challenges to their continued survival. These include short summer + seasons for the development of eggs and juveniles, long periods of fasting + when food supplies are interrupted by winter, and months of cold exposure + at environmental temperatures often well below the freezing point (FP) of + their body fluids (21, 41, 64). This review focuses on one strategy of winter + cold hardiness: freeze tolerance. A number of terrestrially-hibernating reptiles + and amphibians have developed the ability to endure the freezing of extracellular + body fluids and can revive after days or weeks spent with as much as 65% of + their total body water locked in ice (41, 52, 61). All ectothermic vertebrates + living in seasonally cold regions of the earth seek the shelter of thennally-buffered, + relatively wann hibernacula. For most species, hibernation sites underwater + or deep underground position the an\u00ad imals to spend the winter without + fear of freezing (21, 41, 64). Various species, however, hibernate at sites + that are less well insulated; for example, several species of frogs hibernate + on the forest floor. Here, coverings of leaf litter and snow insulate animals + from the most extreme winter air tempera\u00ad tures, but extended periods + of subzero exposure, sometimes as low as -8\u00b0C, may occur (32, 35, 36). + Species hibernating in such sites need additional", "venue": "Annual Review + of Physiology", "year": 1992, "referenceCount": 38, "citationCount": 226, + "influentialCitationCount": 12, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": [{"category": + "Biology", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Environmental Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": null, "journal": {"name": + "Annual review of physiology", "pages": "\n 619-37\n ", "volume": + "54"}, "authors": [{"authorId": "1759136", "name": "K. Storey"}, {"authorId": + "2456270", "name": "J. M. Storey"}]}, {"paperId": "b81d409833ea5078be770286408f2952898e962b", + "externalIds": {"DBLP": "conf/aaaifs/MuellerM08", "MAG": "1597305128", "CorpusId": + 7665803}, "corpusId": 7665803, "publicationVenue": {"id": "9af33c72-ae85-4a0a-b6af-5d65c4bb8176", + "name": "Biologically Inspired Cognitive Architectures", "type": "conference", + "alternate_names": ["BICA", "Biologically Inspired Cogn Archit"], "issn": + "2212-683X", "url": "https://www.journals.elsevier.com/biologically-inspired-cognitive-architectures/", + "alternate_urls": ["http://bicasociety.org/"]}, "url": "https://www.semanticscholar.org/paper/b81d409833ea5078be770286408f2952898e962b", + "title": "Adapting the Turing Test for Embodied Neurocognitive Evaluation + of Biologically-Inspired Cognitive Agents", "abstract": "The field of artificial + intelligence has long surpassed the notion of verbal intelligence envisioned + by Turing (1950). Consequently, the Turing Test is primarily viewed as a philosopher\u2019s + debate or a publicity stunt, and has little relevance to AI researchers. This + paper describes the motivation and design of a set of behavioral tests called + the Cognitive Decathlon, which were developed to be a useable version of an + embodied Turing Test that is relevant and achievable by state-of-the-art AI + algorithms in the next five years. We describe some of the background motivation + for developing this test, and then provide a detailed account of the tasks + that make up the Decathlon, and the types of results that should be expected.", + "venue": "Biologically Inspired Cognitive Architectures", "year": 2008, "referenceCount": + 36, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": null, "journal": {"pages": "117-126"}, "authors": [{"authorId": + "8780591", "name": "Shane T. Mueller"}, {"authorId": "3244450", "name": "B. + Minnery"}]}, {"paperId": "3e0e40509dc447a05cc9af14c57ad8c0fdcb7e21", "externalIds": + {"DBLP": "journals/sigact/HerlihyL08", "MAG": "2080922475", "DOI": "10.1145/1360443.1360458", + "CorpusId": 15047093}, "corpusId": 15047093, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/3e0e40509dc447a05cc9af14c57ad8c0fdcb7e21", + "title": "Distributed computing and the multicore revolution", "abstract": + "Changes in technology can have far-reaching effects on theory. For example, + while Turing''s work on computability predated the first electronic computers, + complexity theory flowered only after computers became a reality. After all, + an algorithm''s complexity may not matter much in a mathematics journal, but + matters quite a bit in a FORTRAN program. We argue that something similar + is going on with parallel and concurrent computation: after decades of being + respected but not taken seriously, research on multiprocessor algorithms and + data structures is going mainstream.", "venue": "SIGA", "year": 2008, "referenceCount": + 59, "citationCount": 49, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://link.springer.com/content/pdf/10.1007%2F978-3-540-92295-7_2.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2008-03-01", "journal": {"pages": "8"}, "authors": [{"authorId": + "1744502", "name": "M. Herlihy"}, {"authorId": "2182186", "name": "Victor + Luchangco"}]}, {"paperId": "0a669efdf738e01195efed1e6aa25461787c3afd", "externalIds": + {"MAG": "1977013020", "DOI": "10.1007/BF00281202", "CorpusId": 120254308}, + "corpusId": 120254308, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0a669efdf738e01195efed1e6aa25461787c3afd", + "title": "Initial-boundary value problems for linear hyperbolic partial differential + equations of the second order", "abstract": null, "venue": "", "year": 1962, + "referenceCount": 19, "citationCount": 48, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "Archive for Rational Mechanics and Analysis", "pages": + "361-400", "volume": "10"}, "authors": [{"authorId": "69560090", "name": "C. + Wilcox"}]}, {"paperId": "8679596268d3868b03a9d8e2e68267d6e34d67bf", "externalIds": + {"MAG": "2969579176", "DBLP": "journals/mima/FloridiTT09", "DOI": "10.1007/s11023-008-9130-6", + "CorpusId": 7888490}, "corpusId": 7888490, "publicationVenue": {"id": "76f182a2-ed15-4abe-add6-99f2dcd59171", + "name": "Minds and Machines", "type": "journal", "alternate_names": ["Mind + Mach"], "issn": "0924-6495", "url": "https://www.springer.com/computer/ai/journal/11023", + "alternate_urls": ["http://www.springer.com/computer/ai/journal/11023", "https://link.springer.com/journal/11023", + "https://www.springer.com/computer/ai/journal/11023/PSE"]}, "url": "https://www.semanticscholar.org/paper/8679596268d3868b03a9d8e2e68267d6e34d67bf", + "title": "Turing\u2019s Imitation Game: Still an Impossible Challenge for + All Machines and Some Judges\u2013\u2013An Evaluation of the 2008 Loebner + Contest", "abstract": null, "venue": "Minds and Machines", "year": 2008, "referenceCount": + 7, "citationCount": 75, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://philpapers.org/archive/FLOTIG.pdf", "status": + "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Psychology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-12-09", "journal": {"name": "Minds and Machines", "pages": "145-150", + "volume": "19"}, "authors": [{"authorId": "1982425", "name": "L. Floridi"}, + {"authorId": "2084659", "name": "M. Taddeo"}, {"authorId": "1840916", "name": + "M. Turilli"}]}, {"paperId": "82c7683e70049871120b2d664b8d8d4f39729e9f", "externalIds": + {"MAG": "2321076497", "DOI": "10.2307/2215430", "CorpusId": 147124035}, "corpusId": + 147124035, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/82c7683e70049871120b2d664b8d8d4f39729e9f", + "title": "The Computer Revolution in Philosophy: Philosophy, Science, and + Models of Mind", "abstract": "The book presented deep important connections + between Artificial Intelligence and Philosophy, based partly on an argument + that both philosophy and science are primarily concerned with identifying + and explaining possibilities contrary to a common view that science is primarily + concerned with laws. The book attempted to show in principle how the construction, + testing and debugging of complex computational models, explaining possibilities + in a new way, can illuminate a collection of deep philosophical problems, + e.g. about the nature of mind, the nature of representation, the nature of + mathematical discovery. However it did not claim that this could be done easily + or that the problems would be solved soon. 40 years later many of them have + still not been solved, including explaining how biological brains made possible + the deep mathematical discoveries made millennia ago, long before the development + of modern logic, often wrongly assumed to provide foundations for all of mathematics. + Later work on these ideas includes the author''s Meta-Morphogenesis project, + inspired by Alan Turing''s work: http://www.cs.bham.ac.uk/research/projects/cogaff/misc/meta-morphogenesis.html + \n \nOriginally published in 1978 by Harvester Press, this went out of print. + An electronic version was created from a scanned in copy and then extensively + edited with corrections, addtional text, and notes, available online as html + or pdf, intermittently updated. This pdf version was created on 2019/07/09.", + "venue": "", "year": 1982, "referenceCount": 72, "citationCount": 209, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "http://epapers.bham.ac.uk/3227/1/sloman%2Dcomp%2Drev%2Dphil.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": [{"category": + "Philosophy", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1982-03-01", + "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145788442", + "name": "A. Sloman"}]}, {"paperId": "b43d2a7e779e93e10b9effe14a9892a329d832f0", + "externalIds": {"MAG": "2132117882", "DOI": "10.1002/anie.200802339", "CorpusId": + 34462201, "PubMed": "18756573"}, "corpusId": 34462201, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b43d2a7e779e93e10b9effe14a9892a329d832f0", "title": "Diffusively coupled chemical oscillators in a microfluidic assembly.", "abstract": "From fireflies that synchronize their flashes with each other to heart muscles contracting and relaxing in unison, synchronized behavior @@ -52824,16 +59852,629 @@ interactions: through a microscope with illumination by light passed through a 510 nm interference filter.", "venue": "Angewandte Chemie", "year": 2008, "referenceCount": 15, "citationCount": 140, "influentialCitationCount": 2, "isOpenAccess": false, - "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": - "Materials Science", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2008-09-22", "journal": {"name": "Angewandte - Chemie", "pages": "\n 7753-5\n ", "volume": "47 40"}, "authors": - [{"authorId": "48343272", "name": "Masahiro Toiya"}, {"authorId": "2258489", - "name": "V. Vanag"}, {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": + "openAccessPdf": null, "fieldsOfStudy": ["Materials Science", "Medicine"], + "s2FieldsOfStudy": [{"category": "Materials Science", "source": "external"}, + {"category": "Medicine", "source": "external"}, {"category": "Physics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2008-09-22", "journal": {"name": "Angewandte Chemie", "pages": "\n 7753-5\n ", + "volume": "47 40"}, "authors": [{"authorId": "48343272", "name": "Masahiro + Toiya"}, {"authorId": "2258489", "name": "V. Vanag"}, {"authorId": "144854275", + "name": "I. Epstein"}]}, {"paperId": "b4e50ea553ae94e85a6fc61a8ca67cf3f25aa9c2", + "externalIds": {"MAG": "2140313431", "CorpusId": 96995181}, "corpusId": 96995181, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b4e50ea553ae94e85a6fc61a8ca67cf3f25aa9c2", + "title": "Assessment of Spatial Variation of Water Quality Parameters in the + Most Polluted Branch of the Anzali Wetland, Northern Iran", "abstract": "In + four consecutive seasons along 9 stations, water parameters such as TDs, pH, + temperature, Do, BoD, CoD, ToC, Tp, NH 4 + , TN and No 3 were determined on + the siahroud River southwest of the Caspian sea in northern Iran. The results + indicated higher TDs values in some parts of the river due to the agricul + ture and residential activities. The addition of ammonia fertilizers in the + paddy fields is one of the major causes for the higher NH 4 + in the downstream + sites. Total phosphorous (Tp) and total nitrogen (TN) levels in the river + were mainly in the organic forms. Factor analysis showed that agriculture + and urban activities were the major pollutant sources. Four zones were identified + by cluster analysis, suggesting local pollution sources or the accumulation + of pollution effects downstream.", "venue": "", "year": 2006, "referenceCount": + 7, "citationCount": 82, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Environmental + Science", "source": "s2-fos-model"}, {"category": "Agricultural And Food Sciences", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "Polish Journal of Environmental Studies", "volume": "15"}, + "authors": [{"authorId": "12291154", "name": "A. Charkhabi"}, {"authorId": + "3915824", "name": "M. Sakizadeh"}]}, {"paperId": "f597898b65e5b12e7801646b64d2c950dda4a41f", + "externalIds": {"MAG": "2030817436", "DOI": "10.1002/APP.21410", "CorpusId": + 51817431}, "corpusId": 51817431, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f597898b65e5b12e7801646b64d2c950dda4a41f", + "title": "Wood\u2010fiber/high\u2010density\u2010polyethylene composites: + Coupling agent performance", "abstract": "The coupling efficiency of seven + coupling agents in wood-polymer composites (WPC) was investi- gated in this + study. The improvement on the interfacial bonding strength, flexural modulus, + and other mechanical properties of the resultant wood fiber/high-density polyeth- + ylene (HDPE) composites was mainly related to the cou- pling agent type, function + groups, molecular weight, con- centration, and chain structure. As a coupling + agent, mal- eated polyethylene (MAPE) had a better performance in WPC than + oxidized polyethylene (OPE) and pure polyeth- ylene (PPE) because of its stronger + interfacial bonding. A combination of the acid number, molecular weight, and + concentration of coupling agents had a significant effect on the interfacial + bonding in WPC. The coupling agents with a high molecular weight, moderate + acid number, and low concentration level were preferred to improve interfacial + adhesion in WPC. The backbone structure of coupling agents also affected the + interfacial bonding strength. Com- pared with the untreated composites, modified + composites improved the interfacial bonding strength by 140% on max- imum + and the flexural storage modulus by 29%. According to the statistical analysis, + 226D and 100D were the best of the seven coupling agents. The coupling agent + performance was illustrated with the brush, switch, and amorphous struc- tures. + \u00a9 2005 Wiley Periodicals, Inc. J Appl Polym Sci 96: 93-102, 2005", "venue": + "", "year": 2005, "referenceCount": 16, "citationCount": 237, "influentialCitationCount": + 9, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2005-04-05", "journal": {"name": + "Journal of Applied Polymer Science", "pages": "93-102", "volume": "96"}, + "authors": [{"authorId": "11190748", "name": "J. Z. Lu"}, {"authorId": "3404317", + "name": "Qinglin Wu"}, {"authorId": "5062911", "name": "I. Negulescu"}]}, + {"paperId": "4510d043ce4e0487c712697765b0edebe335b6e1", "externalIds": {"MAG": + "2038093353", "DBLP": "journals/bsl/Mol06", "DOI": "10.2178/bsl/1146620062", + "CorpusId": 26514956}, "corpusId": 26514956, "publicationVenue": {"id": "2e016c78-9f89-4c7f-9072-c015f5de55eb", + "name": "Bulletin of Symbolic Logic", "type": "journal", "alternate_names": + ["Bull Symb Log", "The Bulletin of Symbolic Logic"], "issn": "1079-8986", + "url": "https://www.math.ucla.edu/~asl/bsltoc.htm", "alternate_urls": ["https://www.jstor.org/journal/bullsymblogi", + "http://journals.cambridge.org/BSL", "https://www.cambridge.org/core/journals/bulletin-of-symbolic-logic", + "http://journals.cambridge.org/action/displayJournal?jid=BSL"]}, "url": "https://www.semanticscholar.org/paper/4510d043ce4e0487c712697765b0edebe335b6e1", + "title": "Closing the Circle: An Analysis of Emil Post''s Early Work", "abstract": + "In 1931 Kurt Godel published his incompleteness results, and some years later + Church and Turing showed that the decision problem for certain systems of + symbolic logic has a negative solution. However, already in 1921 the young + logician Emil Post worked on similar problems which resulted in what he called + an \u201canticipation\u201d of these results. For several reasons though he + did not submit these results to a journal until 1941. This failure \u2018to + be the first\u2019, did not discourage him: his contributions to mathematical + logic and its foundations should not be underestimated. It is the purpose + of this article to show that an interest in the early work of Emil Post should + be motivated not only by this historical fact, but also by the fact that Post''s + approach and method differs substantially from those offered by Godel, Turing + and Church. In this paper it will be shown how this method evolved in his + early work and how it finally led him to his results.", "venue": "Bulletin + of Symbolic Logic", "year": 2006, "referenceCount": 20, "citationCount": 24, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2006-06-01", "journal": + {"name": "Bull. Symb. Log.", "pages": "267-289", "volume": "12"}, "authors": + [{"authorId": "152134130", "name": "L. D. Mol"}]}, {"paperId": "3a68f51e993059424a6d2b68afcfeaca0d1e0683", + "externalIds": {"MAG": "2051070652", "DOI": "10.1109/MAHC.1996.539923", "CorpusId": + 19638021}, "corpusId": 19638021, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/3a68f51e993059424a6d2b68afcfeaca0d1e0683", + "title": "Collected works of A.M. Turing - morphogenesis", "abstract": "PEGGY + KIDWELL, EDITOR The Reviews Department includes reviews of putrlications, + films, audio and video tapes, and exhibits relating to the history of computing. + Full-length studies of technical, economic, business, and institutional aspects + or other works of interest to Annals readers are briefly noted, with appropriate + bibliographic information. Colleagues are encouraged to recommend works they + wish to review and to suggest titles to the Reviews Editor.", "venue": "IEEE + Annals of the History of Computing", "year": 1996, "referenceCount": 0, "citationCount": + 15, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Art", "source": "s2-fos-model"}], + "publicationTypes": ["Review"], "publicationDate": "1996-10-01", "journal": + {"name": "IEEE Annals of the History of Computing", "pages": "69-", "volume": + "18"}, "authors": [{"authorId": "145324717", "name": "P. Kidwell"}]}, {"paperId": + "460c9596121966070176e23bc276b3485741f1e9", "externalIds": {"MAG": "1526125701", + "DOI": "10.5772/53336", "CorpusId": 82884160}, "corpusId": 82884160, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/460c9596121966070176e23bc276b3485741f1e9", + "title": "Mesenchymal Stem Cells from Extra-Embryonic Tissues for Tissue Engineering + \u2013 Regeneration of the Peripheral Nerve", "abstract": "in than is centrifuged + is pellet resuspended ture It possible to obtain MSCs in culture from 52 out + of 60 thawed", "venue": "", "year": 2013, "referenceCount": 143, "citationCount": + 18, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": [{"category": "Biology", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2013-03-27", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "8671062", "name": "Andrea Gartner"}, + {"authorId": "145765932", "name": "T. Pereira"}, {"authorId": "115528268", + "name": "R. Gomes"}, {"authorId": "31502610", "name": "A. L. Lu\u00eds"}, + {"authorId": "7870920", "name": "M. Fran\u00e7a"}, {"authorId": "3580366", + "name": "S. Geuna"}, {"authorId": "2073031192", "name": "P. Armada-da-Silva"}, + {"authorId": "4173873", "name": "A. Maur\u00edcio"}]}, {"paperId": "313d853c02667ba147a996eae8f286518c52498e", + "externalIds": {"MAG": "2003485639", "DOI": "10.1007/s00285-012-0589-7", "CorpusId": + 45972449, "PubMed": "23007599"}, "corpusId": 45972449, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/313d853c02667ba147a996eae8f286518c52498e", + "title": "Methods for diversity and overlap analysis in T-cell receptor populations", + "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2013, + "referenceCount": 43, "citationCount": 81, "influentialCitationCount": 7, + "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc3543521?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2013-12-01", "journal": {"name": "Journal + of Mathematical Biology", "pages": "1339-1368", "volume": "67"}, "authors": + [{"authorId": "1712667", "name": "G. Rempa\u0142a"}, {"authorId": "47645638", + "name": "M. Seweryn"}]}, {"paperId": "ecfd24b6a915463273972d22d969ec89cbbf2afe", + "externalIds": {"MAG": "1997385159", "DOI": "10.4236/SGRE.2011.22009", "CorpusId": + 55118152}, "corpusId": 55118152, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ecfd24b6a915463273972d22d969ec89cbbf2afe", + "title": "Polymer Electrolyte Membrane Fuel Cells (PEMFC) in Automotive Applications: + Environmental Relevance of the Manufacturing Stage", "abstract": "This study + presents a state of the art of several studies dealing with the environmental + impact assessment of fuel cell (FC) vehicles and the comparison with their + conventional fossil-fuelled counterparts, by means of the Life Cycle As-sessment + (LCA) methodology. Results declare that, depending on the systems characteristics, + there are numerous envi-ronmental advantages, but also some disadvantages + can be expected. In addition, the significance of the manufac-turing process + of the FC, more specifically the Polymer Electrolyte Membrane Fuel Cell (PEMFC) + type, in terms of environmental impact is presented. Finally, CIEMAT\u2019s + role in HYCHAIN European project, consisting of supporting early adopters + for hydrogen FCs in the transport sector, is highlighted", "venue": "", "year": + 2011, "referenceCount": 14, "citationCount": 49, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.scirp.org/journal/PaperDownload.aspx?paperID=4954", + "status": "GOLD"}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "Engineering", "source": + "s2-fos-model"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2011-05-19", "journal": {"name": + "Smart Grid and Renewable Energy", "pages": "68-74", "volume": "02"}, "authors": + [{"authorId": "6280534", "name": "Daniel Garra\u00edn"}, {"authorId": "4487317", + "name": "Y. Lech\u00f3n"}, {"authorId": "4747349", "name": "C. R\u00faa"}]}, + {"paperId": "1d6def3e43d2a74fd4a46d3b868c9d6babaa76d2", "externalIds": {"MAG": + "2048707733", "DBLP": "journals/logcom/FrolovKHKM12", "DOI": "10.1093/logcom/exq041", + "CorpusId": 7177523}, "corpusId": 7177523, "publicationVenue": {"id": "6832033a-c52f-4a30-a719-822a07bbd8fb", + "name": "Journal of Logic and Computation", "type": "journal", "alternate_names": + ["J Log Comput"], "issn": "0955-792X", "url": "https://academic.oup.com/logcom/issue", + "alternate_urls": ["http://logcom.oxfordjournals.org/"]}, "url": "https://www.semanticscholar.org/paper/1d6def3e43d2a74fd4a46d3b868c9d6babaa76d2", + "title": "Spectra of highn and non-lown degrees", "abstract": "We survey known + results on spectra of structures and on spectra of relations on computable + structures, asking when the set of all highn degrees can be such a spectrum, + and likewise for the set of non-lown degrees. We then repeat these questions + specifically for linear orders and for relations on the computable dense linear + order \u211a. New results include realizations of the set of non-lown Turing + degrees as the spectrum of a relation on \u211a for all n\u22651, and a realization + of the set of all non-lown Turing degrees as the spectrum of a linear order + whenever n\u22652. The state of current knowledge is summarized in a table + in the concluding section.", "venue": "Journal of Logic and Computation", + "year": 2012, "referenceCount": 31, "citationCount": 23, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle", "Review"], "publicationDate": "2012-08-01", "journal": + {"name": "J. Log. Comput.", "pages": "755-777", "volume": "22"}, "authors": + [{"authorId": "144222727", "name": "A. Frolov"}, {"authorId": "2935517", "name": + "I. Kalimullin"}, {"authorId": "3187833", "name": "V. Harizanov"}, {"authorId": + "2677453", "name": "O. Kudinov"}, {"authorId": "2110456077", "name": "Russell + G. Miller"}]}, {"paperId": "41f72a0ef74b1d2085015882761cad0f3284a6b4", "externalIds": + {"MAG": "1998375810", "DOI": "10.1007/s10910-012-0037-3", "CorpusId": 120307511}, + "corpusId": 120307511, "publicationVenue": {"id": "975bb332-a999-443a-9042-b0406c030a1f", + "name": "Journal of Mathematical Chemistry", "type": "journal", "alternate_names": + ["J Math Chem"], "issn": "0259-9791", "url": "https://link.springer.com/journal/10910"}, + "url": "https://www.semanticscholar.org/paper/41f72a0ef74b1d2085015882761cad0f3284a6b4", + "title": "Turing structures and stability for the 1-D Lengyel\u2013Epstein + system", "abstract": null, "venue": "Journal of Mathematical Chemistry", "year": + 2012, "referenceCount": 25, "citationCount": 16, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2012-07-07", "journal": {"name": "Journal of Mathematical + Chemistry", "pages": "2374-2396", "volume": "50"}, "authors": [{"authorId": + "31829502", "name": "M. Wei"}, {"authorId": "1962344306", "name": "Jianhua + Wu"}, {"authorId": "2334549", "name": "G. Guo"}]}, {"paperId": "1e2b8872ebf9a06265015757002d1bedec19e16e", + "externalIds": {"DBLP": "conf/infocom/LiGWTL09", "MAG": "2139573800", "DOI": + "10.1109/INFCOM.2009.5062153", "CorpusId": 2578759}, "corpusId": 2578759, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1e2b8872ebf9a06265015757002d1bedec19e16e", + "title": "FiConn: Using Backup Port for Server Interconnection in Data Centers", + "abstract": "The goal of data center networking is to interconnect a large + number of server machines with low equipment cost, high and balanced network + capacity, and robustness to link/server faults. It is well understood that, + the current practice where servers are connected by a tree hierarchy of network + switches cannot meet these requirements (8), (9). In this paper, we explore + a new server-interconnection struc- ture. We observe that the commodity server + machines used in today''s data centers usually come with two built-in Ethernet + ports, one for network connection and the other left for backup purpose. We + believe that, if both ports are actively used in network connections, we can + build a low-cost interconnection structure without the expensive higher-level + large switches. Our new network design, called FiConn, utilizes both ports + and only the low-end commodity switches to form a scalable and highly effective + structure. Although the server node degree is only two in this structure, + we have proven that FiConn is highly scalable to encompass hundreds of thousands + of servers with low diameter and high bisection width. The routing mechanism + in FiConn balances different levels of links. We have further developed a + low- overhead traffic-aware routing mechanism to improve effective link utilization + based on dynamic traffic state. Simulation results have demonstrated that + the routing mechanisms indeed achieve high networking throughput.", "venue": + "IEEE INFOCOM 2009", "year": 2009, "referenceCount": 24, "citationCount": + 226, "influentialCitationCount": 35, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2009-04-19", "journal": {"name": "IEEE INFOCOM 2009", "pages": "2276-2285"}, + "authors": [{"authorId": "49621119", "name": "Dan Li"}, {"authorId": "145207202", + "name": "Chuanxiong Guo"}, {"authorId": "46477225", "name": "Haitao Wu"}, + {"authorId": "144213664", "name": "Kun Tan"}, {"authorId": "2014352", "name": + "Songwu Lu"}]}, {"paperId": "59d9473f91d386176223fb8be06d9ba5f8fc9744", "externalIds": + {"DBLP": "journals/iacr/GoldbergPR21", "CorpusId": 237263398}, "corpusId": + 237263398, "publicationVenue": {"id": "166fd2b5-a928-4a98-a449-3b90935cc101", + "name": "IACR Cryptology ePrint Archive", "type": "journal", "alternate_names": + ["IACR Cryptol eprint Arch"], "url": "http://eprint.iacr.org/"}, "url": "https://www.semanticscholar.org/paper/59d9473f91d386176223fb8be06d9ba5f8fc9744", + "title": "Cairo - a Turing-complete STARK-friendly CPU architecture", "abstract": + "Proof systems allow one party to prove to another party that a certain statement + is true. Most existing practical proof systems require that the statement + will be represented in terms of polynomial equations over a finite field. + This makes the process of representing a statement that one wishes to prove + or verify rather complicated, as this process requires a new set of equations + for each statement. Various approaches to deal with this problem have been + proposed, see for example [1]. We present Cairo, a practically-efficient Turing-complete + STARK-friendly CPU architecture. We describe a single set of polynomial equations + for the statement that the execution of a program on this architecture is + valid. Given a statement one wishes to prove, Cairo allows writing a program + that describes that statement, instead of writing a set of polynomial equations.", + "venue": "IACR Cryptology ePrint Archive", "year": 2021, "referenceCount": + 18, "citationCount": 19, "influentialCitationCount": 4, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "IACR Cryptol. ePrint Arch.", "pages": "1063", "volume": + "2021"}, "authors": [{"authorId": "50165778", "name": "Lior Goldberg"}, {"authorId": + "26926233", "name": "S. Papini"}, {"authorId": "3366933", "name": "Michael + Riabzev"}]}, {"paperId": "cab33988243786d6b72ca8e15f1f75278e8fa0e2", "externalIds": + {"DBLP": "conf/chi/FidasVA11", "MAG": "2127241685", "DOI": "10.1145/1978942.1979325", + "CorpusId": 14648784}, "corpusId": 14648784, "publicationVenue": {"id": "b55b50b1-aae7-47a7-b042-8aecc930073d", + "name": "International Conference on Human Factors in Computing Systems", + "type": "conference", "alternate_names": ["CHI", "Int Conf Hum Factor Comput + Syst", "Human Factors in Computing Systems", "Conference on Human Interface", + "Conf Hum Interface", "Hum Factor Comput Syst"], "url": "http://www.acm.org/sigchi/"}, + "url": "https://www.semanticscholar.org/paper/cab33988243786d6b72ca8e15f1f75278e8fa0e2", + "title": "On the necessity of user-friendly CAPTCHA", "abstract": "A \"Completely + Automated Public Turing test to tell Computers and Humans Apart\" (CAPTCHA) + is a mechanism widely used nowadays for protection of web applications, interfaces, + and services from malicious users. A questionnaire-based survey combined with + a real usage scenario of a native-language CAPTCHA mechanism was conducted + in order to investigate several aspects that affect end-user perceptions related + to the quality of CAPTCHA. A total of 210 participants of age between 19 and + 64 participated during May and July 2010. The survey results validate the + common belief that CAPTCHAs are still difficult for humans to solve. They + also provide insights that can be applied to improve users'' experience on + interacting with CAPTCHA systems.", "venue": "International Conference on + Human Factors in Computing Systems", "year": 2011, "referenceCount": 15, "citationCount": + 83, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Book", + "Conference", "Review"], "publicationDate": "2011-05-07", "journal": {"name": + "Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"}, + "authors": [{"authorId": "1722667", "name": "C. Fidas"}, {"authorId": "2828551", + "name": "A. Voyiatzis"}, {"authorId": "1712961", "name": "N. Avouris"}]}, + {"paperId": "2bdd7a04cba8a354f783f81e84eb21cc8360caa6", "externalIds": {"DBLP": + "journals/siamcomp/Grandjean84", "MAG": "2007053458", "DOI": "10.1137/0213025", + "CorpusId": 34709666}, "corpusId": 34709666, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/2bdd7a04cba8a354f783f81e84eb21cc8360caa6", + "title": "The Spectra of First-Order Sentences and Computational Complexity", + "abstract": "The spectrum of a first-order sentence is the set of cardinalities + of its finite models. We refine the well-known equality between the class + of spectra and the class of sets (of positive integers) accepted by nondeterministic + Turing machines in polynomial time. Let $\\operatorname{Sp} (d\\forall )$ + denote the class of spectra of sentences with d universal quantifiers. For + any integer $d \\geqq 2$ and each set of positive integers, A, we obtain: + \\[ A \\in \\operatorname{NTIME} (n^d ) \\to A \\operatorname{Sp} (d\\forall + ) \\to A \\in \\operatorname{NTIME} (n^d (\\log n)^2 ). \\] Further the first + implication holds even if we use multidimensional nondeterministic Turing + machines. These results hold similarly for generalized spectra. As a consequence, + we obtain a simplified proof of a hierarchy result of P. Pudlak about (generalized) + spectra. We also prove that the set of primes is the spectrum of a certain + sentence with only one variable.", "venue": "SIAM journal on computing (Print)", + "year": 1984, "referenceCount": 0, "citationCount": 24, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1984-05-01", "journal": {"name": "SIAM J. Comput.", "pages": + "356-373", "volume": "13"}, "authors": [{"authorId": "2072550219", "name": + "E. Grandjean"}]}, {"paperId": "83bbbee121a58c720c9b974c364bc62088bb7a87", + "externalIds": {"MAG": "2922136954", "DBLP": "journals/ijbc/GuoSSLJ19", "DOI": + "10.1142/S0218127419500275", "CorpusId": 85542318}, "corpusId": 85542318, + "publicationVenue": {"id": "f3358047-5fa1-4315-9473-4bb4c19cb756", "name": + "International Journal of Bifurcation and Chaos in Applied Sciences and Engineering", + "type": "journal", "alternate_names": ["Int J Bifurc Chaos", "Int J Bifurc + Chaos Appl Sci Eng", "International Journal of Bifurcation and Chaos"], "issn": + "0218-1274", "url": "http://www.worldscinet.com/ijbc/ijbc.shtml", "alternate_urls": + ["http://www.worldscinet.com/ijbc/mkt/archive.shtml"]}, "url": "https://www.semanticscholar.org/paper/83bbbee121a58c720c9b974c364bc62088bb7a87", + "title": "Pattern Dynamics of an SIS Epidemic Model with Nonlocal Delay", + "abstract": "In this paper, we study an SIS epidemic model with nonlocal delay + based on reaction\u2013diffusion equation. The spatiotemporal distribution + of the model solution is studied in detail, and sufficient conditions for + the occurrence of the Turing pattern were obtained using the analysis of Turing + instability. It was found that the delay not only prohibited the spread of + infectious disease, but also had great effects on the spatial steady-state + patterns. More specifically, the spatial average density of the infected populations + will decrease, as well the width of the stripe pattern will increase as delay + increases. When the delay increases to a certain value, the stripe pattern + changes to the mixed pattern. The results in this work provide new theoretical + guidance for the prevention and treatment of infectious diseases.", "venue": + "International Journal of Bifurcation and Chaos in Applied Sciences and Engineering", + "year": 2019, "referenceCount": 24, "citationCount": 23, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-03-07", "journal": {"name": "Int. + J. Bifurc. Chaos", "pages": "1950027:1-1950027:12", "volume": "29"}, "authors": + [{"authorId": "4497326", "name": "Zun-Guang Guo"}, {"authorId": "8533698", + "name": "Lipeng Song"}, {"authorId": "47334108", "name": "Gui\u2010Quan Sun"}, + {"authorId": "2118036005", "name": "Can Li"}, {"authorId": "145752193", "name": + "Zhen Jin"}]}, {"paperId": "da938ead2a67d38b383a3f9a48bca56f1570ee09", "externalIds": + {"MAG": "1507778631", "DBLP": "conf/its/Wiemer-HastingsGHG98", "DOI": "10.1007/3-540-68716-5_39", + "CorpusId": 1362090}, "corpusId": 1362090, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/da938ead2a67d38b383a3f9a48bca56f1570ee09", + "title": "The Foundations and Architecture of Autotutor", "abstract": null, + "venue": "Intelligent Tutoring Systems", "year": 1998, "referenceCount": 29, + "citationCount": 81, "influentialCitationCount": 5, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1998-08-16", "journal": {"pages": "334-343"}, "authors": + [{"authorId": "1400286782", "name": "P. Wiemer-Hastings"}, {"authorId": "1769251", + "name": "A. Graesser"}, {"authorId": "31271775", "name": "D. Harter"}]}, {"paperId": + "8381d0ceea4ba1825e8c660cfd8817156340fb42", "externalIds": {"MAG": "2093810711", + "DOI": "10.1080/00207167708803124", "CorpusId": 62651601}, "corpusId": 62651601, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/8381d0ceea4ba1825e8c660cfd8817156340fb42", + "title": "Recursive turing machines", "abstract": "The Turing machine model + is extended to allow for recursive calls and the basic theory of these machines + is developed. The model is also used to study the following additional topics: + The time and storage needed to implement recursive algorithms by non-recursive + algorithms, the storage needed to implement non-deterministic algorithms by + deterministic algorithms, and the implementation of recursive algorithms by + means of stack machines. Some attention is given to time bounds but the emphasis + is on storage-bounded computations.", "venue": "", "year": 1977, "referenceCount": + 4, "citationCount": 9, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "International Journal of Computer Mathematics", + "pages": "3-31", "volume": "6"}, "authors": [{"authorId": "2859514", "name": + "W. Savitch"}]}, {"paperId": "133210fab3b96eeca64a92aeb56c167df1ca1b44", "externalIds": + {"MAG": "2046252924", "DOI": "10.1107/S0365110X61002199", "CorpusId": 97773425}, + "corpusId": 97773425, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/133210fab3b96eeca64a92aeb56c167df1ca1b44", + "title": "The magnetic anisotropy and electron distribution in succinimide", + "abstract": "B n to B3a computed by Grenville-Wells are 31\u20442 for ni trogen + and almost 6 for oxygen. I f anything, the electron densi ty sections indicate, + to us a t least, t ha t the anisotropy of the ni trogen a tom is greater than + tha t of the oxygen. Our analysis of our own (hOl) da ta indicates B n = 3.65 + and Bs8 = 1.68 for oxygen (at room temperature) . Our room tempera tu re (least + squares) results for B n differ little from those of Worsham, Levy & Peterson. + The B33 results, however, differ significantly. The Worsham, Levy & Peterson + results are consistently lower t h a n ours by as much as 50%. Our low tempera + tu re measurements are useful in this connection. The tempera ture factors + of all the a toms show a fair ly uniform decrease of about 50% between room + tempera tu re and 1 4 0 \u00b0C. In this t empera tu re range, the t empera + tu re factors are approximate ly proport ional to the absolute temperatures + . I t is difficult to reconcile these findings with those repor ted by Worsham, + Levy & Peterson. The decrease in our B33 terms between room tempera tu re + and --140 \u00b0C. was almost as large as the total room tempera ture values + relSorted by Worsham, Levy & Peterson for the ni trogen and carbon atoms, + and larger t han the value reported for the oxygen atom. The B~3 cross te + rm for the nitrogen a tom is very small and m a y be ignored. The causes of + these differences between the X r a y and the neut ron diffraction results + are not clear. I t is well known tha t computed '' t empera ture factors '' + are par t icular ly sensitive to the types of form factors assumed for the + a tom a t rest. I t m a y be t ha t the differences reflect errors in the + neutron, or the X-ray , atomic form factors. Possibly the three dimensional + neutron diffraction analysis of urea reported under way at the Oak Ridge Nat + ional Laboratories will clear up this point.", "venue": "", "year": 1961, + "referenceCount": 5, "citationCount": 46, "influentialCitationCount": 1, "isOpenAccess": + false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": + [{"category": "Chemistry", "source": "external"}, {"category": "Materials + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1961-07-10", "journal": {"name": "Acta Crystallographica", "pages": "720-724", + "volume": "14"}, "authors": [{"authorId": "48522699", "name": "R. Mason"}]}, + {"paperId": "c108cfade13108c9b468c28938b6bc8cd64fcd11", "externalIds": {"MAG": + "2310283649", "DOI": "10.11501/3157004", "CorpusId": 123406117}, "corpusId": + 123406117, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c108cfade13108c9b468c28938b6bc8cd64fcd11", + "title": "Three-Dimensional Alternating Turing Machines", "abstract": null, + "venue": "", "year": 1999, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "102366861", "name": "\u5742\u672c\u771e\u4eba"}]}, {"paperId": + "28c40b6668e8dc0b220f6708582742ecd879961d", "externalIds": {"MAG": "2157778403", + "DOI": "10.1177/036354658201000407", "CorpusId": 20960468, "PubMed": "7125044"}, + "corpusId": 20960468, "publicationVenue": {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", + "name": "American Journal of Sports Medicine", "type": "journal", "alternate_names": + ["Am J Sport Med"], "issn": "0363-5465", "url": "http://ajs.sagepub.com/", + "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, "url": "https://www.semanticscholar.org/paper/28c40b6668e8dc0b220f6708582742ecd879961d", + "title": "Subtrochanteric stress fractures in runners", "abstract": "Seven + college track team members with stress frac tures in the subtrochanteric area + of the femur were diagnosed using x-ray films and bone imaging. One, with + repeated negative x-ray films, was considered to have a stress reaction. Suspected + causes for this high incidence of subtrochanteric stress fractures include + a change in running surfaces and an exercise called bounding (repetitive jumps + with or without weights). The implementation of bone scanning and its useful + ness after failure of conservative treatment is empha sized. A discussion + of the continuum of stress reaction and the seven cases, diagnoses, treatments, + and re sults are presented.", "venue": "American Journal of Sports Medicine", + "year": 1982, "referenceCount": 17, "citationCount": 47, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], + "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1982-07-01", "journal": {"name": "The American Journal + of Sports Medicine", "pages": "228 - 232", "volume": "10"}, "authors": [{"authorId": + "145074575", "name": "J. Butler"}, {"authorId": "2107292289", "name": "S. + L. Brown"}, {"authorId": "46613847", "name": "B. Mcconnell"}]}, {"paperId": + "8399965d7006d70b8d3012e8d877ba1a14c9418c", "externalIds": {"MAG": "2041833185", + "DOI": "10.1110/PS.9.7.1395", "CorpusId": 36544351, "PubMed": "10933506"}, + "corpusId": 36544351, "publicationVenue": {"id": "4e516638-5c1d-4699-8d1b-3b48f0d48ddc", + "name": "Protein Science", "type": "journal", "alternate_names": ["Protein + Sci"], "issn": "0961-8368", "url": "http://www3.interscience.wiley.com/journal/121502357/", + "alternate_urls": ["http://www.proteinscience.org/", "https://onlinelibrary.wiley.com/journal/1469896X"]}, + "url": "https://www.semanticscholar.org/paper/8399965d7006d70b8d3012e8d877ba1a14c9418c", + "title": "Charge\u2013charge interactions influence the denatured state ensemble + and contribute to protein stability", "abstract": "Several recent studies + have shown that it is possible to increase protein stability by improving + electrostatic interactions among charged groups on the surface of the folded + protein. How\u2013ever, the stability increases are considerably smaller than + predicted by a simple Coulomb''s law calculation, and in some cases, a charge + reversal on the surface leads to a decrease in stability when an increase + was predicted. These results suggest that favorable charge\u2013charge interactions + are important in determining the dena\u2013tured state ensemble, and that + the free energy of the denatured state may be decreased more than that of + the native state by reversing the charge of a side chain. We suggest that + when the hydrophobic and hydrogen bonding interactions that stabilize the + folded state are disrupted, the unfolded polypeptide chain rearranges to com\u2013pact + conformations with favorable long\u2013range electrostatic inter\u2013actions. + These charge\u2013charge interactions in the denatured state will reduce the + net contribution of electrostatic interactions to protein stability and will + help determine the denatured state ensemble. To support this idea, we show + that the denatured state ensemble of ribonuclease Sa is considerably more + compact at pH 7 where fa\u2013vorable charge\u2013charge interactions are + possible than at pH 3, where unfavorable electrostatic repulsion among the + positive charges causes an expansion of the denatured state ensemble. Further + support is provided by studies of the ionic strength dependence of the sta\u2013bility + of charge\u2013reversal mutants of ribonuclease Sa. These results may have + important implications for the mechanism of protein folding.", "venue": "Protein + Science", "year": 2000, "referenceCount": 33, "citationCount": 211, "influentialCitationCount": + 3, "isOpenAccess": true, "openAccessPdf": {"url": "https://onlinelibrary.wiley.com/doi/pdfdirect/10.1110/ps.9.7.1395", + "status": "BRONZE"}, "fieldsOfStudy": ["Medicine", "Chemistry"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Chemistry", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": + {"name": "Protein Science", "volume": "9"}, "authors": [{"authorId": "14382993", + "name": "C. Nick Pace"}, {"authorId": "38391788", "name": "R. W. Alston"}, + {"authorId": "50687392", "name": "K. Shaw"}]}, {"paperId": "e8975aef2de26cd906ce05236f9ac3fc134e0847", + "externalIds": {"CorpusId": 9720989}, "corpusId": 9720989, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e8975aef2de26cd906ce05236f9ac3fc134e0847", + "title": "Dictionary of Scientific Biography XIII Universal Turing Machine + R", "abstract": "The implications of knowledge-base archetypes have been far-reaching + and pervasive [54, 54, 58, 59, 62, 68, 68, 70, 95, 99, 114, 114, 128, 129, + 148, 152, 168, 179, 188, 191]. In this paper, we verify the development of + SCSI disks, which embodies the typical principles of theory. Our focus in + this paper is not on whether evolutionary programming and write-back caches + are largely incompatible, but rather on proposing new metamorphic algorithms + (NyeCaterer).", "venue": "", "year": 2011, "referenceCount": 231, "citationCount": + 22, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, + "journal": null, "authors": []}, {"paperId": "b95ee423ed2357c25fa7db9a1d9359b60372a9e2", + "externalIds": {"CorpusId": 16599331}, "corpusId": 16599331, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/b95ee423ed2357c25fa7db9a1d9359b60372a9e2", + "title": "Rounding-off errors in matrix processes Quart Universal Turing Machine", + "abstract": "Many futurists would agree that, had it not been for the Internet, + the evaluation of IPv4 might never have occurred. After years of private research + into replication, we verify the emulation of interrupts. In order to fulfill + this intent, we explore a novel system for the evaluation of architecture + (Nicety), showing that the much-tauted replicated algorithm for the refinement + of A* search by Garcia et al. is Turing complete.", "venue": "", "year": 2011, + "referenceCount": 245, "citationCount": 19, "influentialCitationCount": 1, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "dd0c90a48d21fe38c4f1e66f1a34a5261ec339a7", "externalIds": {"DBLP": "conf/coco/MerkleS07", + "MAG": "2196265990", "DOI": "10.1109/CCC.2007.17", "CorpusId": 16920391}, + "corpusId": 16920391, "publicationVenue": {"id": "23f8fe4c-6537-4027-a334-6a5863115984", + "name": "Cybersecurity and Cyberforensics Conference", "type": "conference", + "alternate_names": ["Chin Control Conf", "Computational Complexity Conference", + "CCC", "Comput Complex Conf", "Cybersecur Cyberforensics Conf", "Conference + on Computational Complexity", "Computing Colombian Conference", "Conf Comput + Complex", "Comput Colomb Conf", "Chinese Control Conference"], "url": "http://computationalcomplexity.org/"}, + "url": "https://www.semanticscholar.org/paper/dd0c90a48d21fe38c4f1e66f1a34a5261ec339a7", + "title": "On C-Degrees, H-Degrees and T-Degrees", "abstract": "Following a + line of research that aims at relating the computation power and the initial + segment complexity of a set, the work presented here investigates into the + relations between Turing reducibility, defined in terms of computation power, + and C-reducibility and H-reducibility, defined in terms of the complexity + of initial segments. The global structures of all C-degrees and of all H-degrees + are rich and allows to embed the lattice of the powerset of the natural numbers + under inclusion. In particular, there are C-degrees, as well as H-degrees, + that are different from the least degree and are the meet of two other degrees, + whereas on the other hand there are pairs of sets that have a meet neither + in the C-degrees nor in the H-degrees; these results answer questions in a + survey by Nies and Miller. There are r.e. sets that form a minimal pair for + C-reducibility and Sigma2 0 sets that form a minimal pair for H-reducibility, + which answers questions by Downey and Hirschfeldt. Furthermore, the following + facts on the relation between C-degrees, H-degrees and Turing degrees hold. + Every C-degree contains at most one Turing degree and this bound is sharp + since there are C-degrees that do contain a Turing degree. For the comprising + class of complex sets, neither the C-degree nor the H-degree of such a set + can contain a Turing degree, in fact, the Turing degree of any complex set + contains infinitely many C-degrees. Similarly the Turing degree of any set + that computes the halting problem contains infinitely many H-degrees, while + the H-degree of any 2-random set R is never contained in the Turing degree + of R. By the latter, H-equivalence of Martin-Lof random sets does not imply + their Turing equivalence. The structure of the Cdegrees contained in the Turing + degree of a complex sets is rich and allows to embed any countable distributive + lattice; a corresponding statement is true for the structure of H-degrees + that are contained in the Turing degree of a set that computes the halting + problem.", "venue": "Cybersecurity and Cyberforensics Conference", "year": + 2007, "referenceCount": 31, "citationCount": 11, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", + "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": + "external"}, {"category": "Computer Science", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference", "Review"], "publicationDate": "2007-06-13", "journal": {"name": + "Twenty-Second Annual IEEE Conference on Computational Complexity (CCC''07)", + "pages": "60-69"}, "authors": [{"authorId": "1691379", "name": "W. Merkle"}, + {"authorId": "1699450", "name": "F. Stephan"}]}, {"paperId": "e28b5b611be04c2bc439581699f0fa701afd8499", + "externalIds": {"DBLP": "conf/aaai/ChenTW17", "MAG": "2604733145", "DOI": + "10.1609/aaai.v31i1.10564", "CorpusId": 15231223}, "corpusId": 15231223, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/e28b5b611be04c2bc439581699f0fa701afd8499", + "title": "Bounded Rationality of Restricted Turing Machines", "abstract": + "\n \n Bounded rationality aims to understand the effects of how limited rationality + affects decision-making. The traditional models in game theory and multiagent + system research, such as finite automata or unrestricted Turing machine, fall + short of capturing how intelligent agents make decision in realistic applications. + To address this problem, we model bounded rational agents as restricted Turing + machines: restrictions on running time and on storage space. We study our + model under the context of two-person repeated games. In the case where the + running time of Turing machines is restricted, we show that computing the + best response of a given strategy is much harder than the strategy itself. + In the case where the storage space of the Turing machines is restricted, + we show the best response of a space restricted strategy can not be implemented + by machines within the same size (up to a constant factor). Finally, we study + how these restrictions affect the set of Nash equilibria in infinitely repeated + games.We show restricting the agent\u2019s computational resources will give + rise to new Nash equilibria.\n \n", "venue": "AAAI", "year": 2015, "referenceCount": + 47, "citationCount": 13, "influentialCitationCount": 1, "isOpenAccess": true, + "openAccessPdf": {"url": "https://ojs.aaai.org/index.php/AAAI/article/download/10564/10423", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2015-05-04", "journal": {"pages": "1673-1674"}, + "authors": [{"authorId": "2184812", "name": "Lijie Chen"}, {"authorId": "34198278", + "name": "Pingzhong Tang"}, {"authorId": "2108693711", "name": "Ruosong Wang"}]}, + {"paperId": "30eb4d8f93b9f90bd9fd9c28459adaf05c1c3399", "externalIds": {"MAG": + "1966387903", "DOI": "10.1090/S0002-9939-1965-0181538-0", "CorpusId": 15309987}, + "corpusId": 15309987, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/30eb4d8f93b9f90bd9fd9c28459adaf05c1c3399", + "title": "Machine dependence of degrees of difficulty.", "abstract": "Machine + dependence of degree-of-difficulty relation for recursive functions, considering + Turing machine as programmed computer", "venue": "", "year": 1965, "referenceCount": + 12, "citationCount": 15, "influentialCitationCount": 3, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.ams.org/proc/1965-016-03/S0002-9939-1965-0181538-0/S0002-9939-1965-0181538-0.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1965-06-01", "journal": {"name": "", "pages": "442-447", "volume": "16"}, + "authors": [{"authorId": "1795076", "name": "M. Arbib"}, {"authorId": "143624243", + "name": "M. Blum"}]}, {"paperId": "bf78507cf2a18b3036d897fc0de419c3d55b39d3", + "externalIds": {"MAG": "2083847280", "DOI": "10.1016/J.NA.2009.10.034", "CorpusId": + 122601725}, "corpusId": 122601725, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/bf78507cf2a18b3036d897fc0de419c3d55b39d3", + "title": "Turing pattern of the Oregonator model", "abstract": null, "venue": + "", "year": 2010, "referenceCount": 15, "citationCount": 16, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2010-03-01", "journal": {"name": "Nonlinear Analysis-theory Methods & Applications", + "pages": "2337-2345", "volume": "72"}, "authors": [{"authorId": "145122505", + "name": "R. Peng"}, {"authorId": "1974052", "name": "Fuqin Sun"}]}, {"paperId": "8c0c9e7d54b395a3b45c67cc29b373077b48cddd", "externalIds": {"DBLP": "journals/cacm/Vardi17e", - "MAG": "2766293582", "DOI": "10.1145/3144590", "CorpusId": 2574403}, "url": - "https://www.semanticscholar.org/paper/8c0c9e7d54b395a3b45c67cc29b373077b48cddd", + "MAG": "2766293582", "DOI": "10.1145/3144590", "CorpusId": 2574403}, "corpusId": + 2574403, "publicationVenue": {"id": "4d9ce1c4-dc84-46b9-903e-e3751c00c7dd", + "name": "Communications of the ACM", "type": "journal", "alternate_names": + ["Commun ACM", "Communications of The ACM"], "issn": "0001-0782", "url": "http://www.acm.org/pubs/cacm/", + "alternate_urls": ["http://portal.acm.org/cacm", "http://www.acm.org/pubs/contents/journals/cacm/", + "https://cacm.acm.org/"]}, "url": "https://www.semanticscholar.org/paper/8c0c9e7d54b395a3b45c67cc29b373077b48cddd", "title": "Would Turing have won the Turing award?", "abstract": "I N 2017, WE celebrated 50 years of the ACM A.M. Turing Award, known simply as the Turing Award. The list of Turing Award winners (http://amturing.acm. org), starting @@ -52902,229 +60543,44 @@ interactions: code breaking. Would Turing have won the Turing Award? My answer is, he should have! Follow me on Facebook, Google+, and Twitter.", "venue": "Communications of the ACM", "year": 2017, "referenceCount": 0, "citationCount": 6, "influentialCitationCount": - 1, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1, "isOpenAccess": true, "openAccessPdf": {"url": "https://dl.acm.org/doi/pdf/10.1145/3144590", + "status": "BRONZE"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2017-10-24", "journal": {"name": "Communications of the ACM", "pages": "7 - 7", "volume": "60"}, "authors": [{"authorId": "9083969", - "name": "Moshe Y. Vardi"}]}, {"paperId": "72959890369acd49874fd5c8abd6d62d08e2a107", - "externalIds": {"MAG": "2761896474", "DOI": "10.1007/978-981-10-6544-6_31", - "CorpusId": 196024670}, "url": "https://www.semanticscholar.org/paper/72959890369acd49874fd5c8abd6d62d08e2a107", - "title": "A Survey of Design Techniques for Conversational Agents", "abstract": - null, "venue": "", "year": 2017, "referenceCount": 20, "citationCount": 82, - "influentialCitationCount": 5, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["Review"], "publicationDate": "2017-05-13", "journal": - {"name": "", "pages": "336-350", "volume": ""}, "authors": [{"authorId": "2118623082", - "name": "K. Ramesh"}, {"authorId": "150305466", "name": "Surya Ravishankaran"}, - {"authorId": null, "name": "Abhishek Joshi"}, {"authorId": "145171675", "name": - "K. Chandrasekaran"}]}, {"paperId": "58ca8a17a34bf47274efe8c4b00912cc4cb16489", - "externalIds": {"MAG": "2106216094", "DOI": "10.1080/02642069300000005", "CorpusId": - 154875175}, "url": "https://www.semanticscholar.org/paper/58ca8a17a34bf47274efe8c4b00912cc4cb16489", - "title": "Internationalisation in Service Companies", "abstract": "This article - presents a conceptual framework for analysing the internationalisation of - knowledge-intensive service companies. The framework has been developed as - a result of an empirical study of ten Scandinavian companies, representing - different types of service -for instance, insurance, consulting and security. - The internationalisation process is divided into four stages: prospecting, - introduction, consolidation and reorientation. One major implication of the - study is that internationalisation should not be viewed as mainly a question - of globalisation or adaptation to local business conditions, as is usually - assumed in the litera- ture. Instead it is the interplay between these two - major strategic orientations that determines the outcome of the inter- nationalisation - process, and companies need to learn how to balance the two successfully. - The empirical results and practical implications of the study are summarised - in a number of theses dealing with the overall guidance of the internationalisation - process.", "venue": "", "year": 1993, "referenceCount": 8, "citationCount": - 84, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", "source": "external"}, - {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": null, "journal": {"name": "Service Industries Journal", - "pages": "80-97", "volume": "13"}, "authors": [{"authorId": "3325228", "name": - "B. Edvardsson"}, {"authorId": "2464198", "name": "L. Edvinsson"}, {"authorId": - "40455265", "name": "H. Nystr\u00f6m"}]}, {"paperId": "e1797eced426d8f8f7a828e4b779a4eef3cc3824", - "externalIds": {"MAG": "2098009214", "DOI": "10.1016/J.PHYSD.2012.05.002", - "CorpusId": 46075411}, "url": "https://www.semanticscholar.org/paper/e1797eced426d8f8f7a828e4b779a4eef3cc3824", - "title": "The Turing bifurcation in network systems: Collective patterns and - single differentiated nodes", "abstract": null, "venue": "", "year": 2012, - "referenceCount": 20, "citationCount": 48, "influentialCitationCount": 2, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-08-15", - "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": "1351-1357", - "volume": "241"}, "authors": [{"authorId": "34223041", "name": "M. Wolfrum"}]}, - {"paperId": "0a669efdf738e01195efed1e6aa25461787c3afd", "externalIds": {"MAG": - "1977013020", "DOI": "10.1007/BF00281202", "CorpusId": 120254308}, "url": - "https://www.semanticscholar.org/paper/0a669efdf738e01195efed1e6aa25461787c3afd", - "title": "Initial-boundary value problems for linear hyperbolic partial differential - equations of the second order", "abstract": null, "venue": "", "year": 1962, - "referenceCount": 19, "citationCount": 48, "influentialCitationCount": 1, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "Archive for Rational Mechanics and Analysis", "pages": - "361-400", "volume": "10"}, "authors": [{"authorId": "69560090", "name": "C. - Wilcox"}]}, {"paperId": "b4e50ea553ae94e85a6fc61a8ca67cf3f25aa9c2", "externalIds": - {"MAG": "2140313431", "CorpusId": 96995181}, "url": "https://www.semanticscholar.org/paper/b4e50ea553ae94e85a6fc61a8ca67cf3f25aa9c2", - "title": "Assessment of Spatial Variation of Water Quality Parameters in the - Most Polluted Branch of the Anzali Wetland, Northern Iran", "abstract": "In - four consecutive seasons along 9 stations, water parameters such as TDs, pH, - temperature, Do, BoD, CoD, ToC, Tp, NH 4 + , TN and No 3 were determined on - the siahroud River southwest of the Caspian sea in northern Iran. The results - indicated higher TDs values in some parts of the river due to the agricul - ture and residential activities. The addition of ammonia fertilizers in the - paddy fields is one of the major causes for the higher NH 4 + in the downstream - sites. Total phosphorous (Tp) and total nitrogen (TN) levels in the river - were mainly in the organic forms. Factor analysis showed that agriculture - and urban activities were the major pollutant sources. Four zones were identified - by cluster analysis, suggesting local pollution sources or the accumulation - of pollution effects downstream.", "venue": "", "year": 2006, "referenceCount": - 7, "citationCount": 82, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}, - {"category": "Agricultural And Food Sciences", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "Polish - Journal of Environmental Studies", "volume": "15"}, "authors": [{"authorId": - "12291154", "name": "A. Charkhabi"}, {"authorId": "3915824", "name": "M. Sakizadeh"}]}, - {"paperId": "82c7683e70049871120b2d664b8d8d4f39729e9f", "externalIds": {"MAG": - "2321076497", "DOI": "10.2307/2215430", "CorpusId": 147124035}, "url": "https://www.semanticscholar.org/paper/82c7683e70049871120b2d664b8d8d4f39729e9f", - "title": "The Computer Revolution in Philosophy: Philosophy, Science, and - Models of Mind", "abstract": "The book presented deep important connections - between Artificial Intelligence and Philosophy, based partly on an argument - that both philosophy and science are primarily concerned with identifying - and explaining possibilities contrary to a common view that science is primarily - concerned with laws. The book attempted to show in principle how the construction, - testing and debugging of complex computational models, explaining possibilities - in a new way, can illuminate a collection of deep philosophical problems, - e.g. about the nature of mind, the nature of representation, the nature of - mathematical discovery. However it did not claim that this could be done easily - or that the problems would be solved soon. 40 years later many of them have - still not been solved, including explaining how biological brains made possible - the deep mathematical discoveries made millennia ago, long before the development - of modern logic, often wrongly assumed to provide foundations for all of mathematics. - Later work on these ideas includes the author''s Meta-Morphogenesis project, - inspired by Alan Turing''s work: http://www.cs.bham.ac.uk/research/projects/cogaff/misc/meta-morphogenesis.html - \n \nOriginally published in 1978 by Harvester Press, this went out of print. - An electronic version was created from a scanned in copy and then extensively - edited with corrections, addtional text, and notes, available online as html - or pdf, intermittently updated. This pdf version was created on 2019/07/09.", - "venue": "", "year": 1982, "referenceCount": 72, "citationCount": 209, "influentialCitationCount": - 4, "isOpenAccess": true, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy": - [{"category": "Philosophy", "source": "external"}, {"category": "Philosophy", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1982-03-01", - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "145788442", - "name": "A. Sloman"}]}, {"paperId": "a7493603b52f35a882eb0436e390c1bcfd3fc8fa", - "externalIds": {"MAG": "2117832080", "DOI": "10.1177/002199838101500305", - "CorpusId": 136779991}, "url": "https://www.semanticscholar.org/paper/a7493603b52f35a882eb0436e390c1bcfd3fc8fa", - "title": "Stresses in Adhesively Bonded Joints: A Closed-Form Solution", "abstract": - "In this paper the general plane strain problem of adhesively bonded struc - tures which consist of two different orthotropic adherends is considered. - Assuming that the thicknesses of the adherends are constant and are small - in relation to the lateral dimensions of the bonded region, the adherends - are treated as plates. Also, assuming that the thickness of the adhesive is - small compared to that of the adherends, the thickness variation of the stresses - in the adhesive layer is neglected. However, the transverse shear effects - in the adherends and the in-plane normal strain in the adhesive are taken - into ac count. The problem is reduced to a system of differential equations - for the adhesive stresses which is solved in closed form. A single lap joint - and a stif fened plate under various loading conditions are considered as - examples. To verify the basic trend of the solutions obtained from the plate - theory and to give some idea about the validity of the plate assumption itself, - a sample pro blem is solved by using the finite element method and by treating - the adherends and the adhesive as elastic continua. It is found that the plate - theory used in the analysis not only predicts the correct trend for the adhesive - stresses but also gives rather surprisingly accurate results. The solution - is ob tained by assuming linear stress-strain relations for the adhesive. - In the Ap pendix the problem is formulated by using a nonlinear material for - the adhesive and by following two different approaches.", "venue": "", "year": - 1980, "referenceCount": 20, "citationCount": 226, "influentialCitationCount": - 5, "isOpenAccess": true, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Engineering", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1980-08-01", "journal": {"name": "Journal of Composite Materials", "pages": - "249 - 271", "volume": "15"}, "authors": [{"authorId": "97781161", "name": - "F. Delale"}, {"authorId": "152610200", "name": "F. Erdogan"}, {"authorId": - "102778768", "name": "M. N. Ayd\u0131no\u011flu"}]}, {"paperId": "b81d409833ea5078be770286408f2952898e962b", - "externalIds": {"DBLP": "conf/aaaifs/MuellerM08", "MAG": "1597305128", "CorpusId": - 7665803}, "url": "https://www.semanticscholar.org/paper/b81d409833ea5078be770286408f2952898e962b", - "title": "Adapting the Turing Test for Embodied Neurocognitive Evaluation - of Biologically-Inspired Cognitive Agents", "abstract": "The field of artificial - intelligence has long surpassed the notion of verbal intelligence envisioned - by Turing (1950). Consequently, the Turing Test is primarily viewed as a philosopher\u2019s - debate or a publicity stunt, and has little relevance to AI researchers. This - paper describes the motivation and design of a set of behavioral tests called - the Cognitive Decathlon, which were developed to be a useable version of an - embodied Turing Test that is relevant and achievable by state-of-the-art AI - algorithms in the next five years. We describe some of the background motivation - for developing this test, and then provide a detailed account of the tasks - that make up the Decathlon, and the types of results that should be expected.", - "venue": "Biologically Inspired Cognitive Architectures", "year": 2008, "referenceCount": - 36, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - null, "journal": {"pages": "117-126"}, "authors": [{"authorId": "8780591", - "name": "Shane T. Mueller"}, {"authorId": "3244450", "name": "B. Minnery"}]}, - {"paperId": "4510d043ce4e0487c712697765b0edebe335b6e1", "externalIds": {"MAG": - "2038093353", "DBLP": "journals/bsl/Mol06", "DOI": "10.2178/bsl/1146620062", - "CorpusId": 26514956}, "url": "https://www.semanticscholar.org/paper/4510d043ce4e0487c712697765b0edebe335b6e1", - "title": "Closing the Circle: An Analysis of Emil Post''s Early Work", "abstract": - "In 1931 Kurt Godel published his incompleteness results, and some years later - Church and Turing showed that the decision problem for certain systems of - symbolic logic has a negative solution. However, already in 1921 the young - logician Emil Post worked on similar problems which resulted in what he called - an \u201canticipation\u201d of these results. For several reasons though he - did not submit these results to a journal until 1941. This failure \u2018to - be the first\u2019, did not discourage him: his contributions to mathematical - logic and its foundations should not be underestimated. It is the purpose - of this article to show that an interest in the early work of Emil Post should - be motivated not only by this historical fact, but also by the fact that Post''s - approach and method differs substantially from those offered by Godel, Turing - and Church. In this paper it will be shown how this method evolved in his - early work and how it finally led him to his results.", "venue": "Bulletin - of Symbolic Logic", "year": 2006, "referenceCount": 20, "citationCount": 24, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2006-06-01", "journal": {"name": "Bull. - Symb. Log.", "pages": "267-289", "volume": "12"}, "authors": [{"authorId": - "152134130", "name": "L. D. Mol"}]}, {"paperId": "dda1822872942f658b89e7e1c1ffe08c35e7b290", - "externalIds": {"DBLP": "journals/corr/abs-1709-08693", "MAG": "2759063673", - "ArXiv": "1709.08693", "CorpusId": 195346581}, "url": "https://www.semanticscholar.org/paper/dda1822872942f658b89e7e1c1ffe08c35e7b290", - "title": "Can you fool AI with adversarial examples on a visual Turing test?", - "abstract": "Deep learning has achieved impressive results in many areas of - Computer Vision and Natural Language Pro- cessing. Among others, Visual Question - Answering (VQA), also referred to a visual Turing test, is considered one - of the most compelling problems, and recent deep learning models have reported - significant progress in vision and language modeling. Although Artificial - Intelligence (AI) is getting closer to passing the visual Turing test, at - the same time the existence of adversarial examples to deep learning systems - may hinder the practical application of such systems. In this work, we conduct - the first extensive study on adversarial examples for VQA systems. In particular, - we focus on generating targeted adversarial examples for a VQA system while - the target is considered to be a question-answer pair. Our evaluation shows - that the success rate of whether a targeted adversarial example can be generated - is mostly dependent on the choice of the target question-answer pair, and - less on the choice of images to which the question refers. We also report - the language prior phenomenon of a VQA model, which can explain why targeted - adversarial examples are hard to generate for some question-answer targets. - We also demonstrate that a compositional VQA architecture is slightly more - resilient to adversarial attacks than a non-compositional one. Our study sheds - new light on how to build deep vision and language resilient models robust - against adversarial examples.", "venue": "ArXiv", "year": 2017, "referenceCount": - 69, "citationCount": 35, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2017-09-25", "journal": {"name": "ArXiv", "volume": "abs/1709.08693"}, "authors": - [{"authorId": "2108880352", "name": "Xiaojun Xu"}, {"authorId": "1425082935", - "name": "Xinyun Chen"}, {"authorId": "2118484320", "name": "Chang Liu"}, {"authorId": - "34721166", "name": "Anna Rohrbach"}, {"authorId": "1753210", "name": "Trevor - Darrell"}, {"authorId": "143711382", "name": "D. Song"}]}, {"paperId": "5e5db839d78530aec673eb273e2cc8971f485f2b", - "externalIds": {"MAG": "2951159125", "DBLP": "journals/corr/JansenM14", "ArXiv": - "1410.0855", "DOI": "10.1137/1.9781611973730.42", "CorpusId": 1381073}, "url": - "https://www.semanticscholar.org/paper/5e5db839d78530aec673eb273e2cc8971f485f2b", + "name": "Moshe Y. Vardi"}]}, {"paperId": "5409dc8fa1564b3381b765e2f5592e0338f8e765", + "externalIds": {"MAG": "617841776", "DOI": "10.5860/choice.50-0327", "CorpusId": + 118771753}, "corpusId": 118771753, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5409dc8fa1564b3381b765e2f5592e0338f8e765", + "title": "Goedel''s Way: Exploits into an undecidable world", "abstract": + "1. Goedel, Turing 2. Complexity, Randomness 3. A List of Problems and Weird + Spacetimes 4. The Halting Function and its Avatars 5. Entropy, P vs. NP 6. + Forays into Uncharted Landscapes Envoi: On Eternity and Beyond", "venue": + "", "year": 2011, "referenceCount": 0, "citationCount": 20, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": "2011-10-13", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "1756533", "name": "G. Chaitin"}, {"authorId": "88282231", "name": + "F. Doria"}, {"authorId": "83446915", "name": "N. Costa"}]}, {"paperId": "4af88046e544d20fe1eb79c87979420f4cb53db1", + "externalIds": {"MAG": "2042295707", "DOI": "10.1016/J.AIM.2010.06.024", "CorpusId": + 14977046}, "corpusId": 14977046, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4af88046e544d20fe1eb79c87979420f4cb53db1", + "title": "Extracting information is hard: A Turing degree of non-integral + effective Hausdorff dimension", "abstract": null, "venue": "", "year": 2011, + "referenceCount": 39, "citationCount": 46, "influentialCitationCount": 8, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2011-01-15", "journal": {"name": "Advances in Mathematics", "pages": "373-384", + "volume": "226"}, "authors": [{"authorId": "2116336200", "name": "Joseph S. + Miller"}]}, {"paperId": "5e5db839d78530aec673eb273e2cc8971f485f2b", "externalIds": + {"MAG": "2951159125", "DBLP": "journals/corr/JansenM14", "ArXiv": "1410.0855", + "DOI": "10.1137/1.9781611973730.42", "CorpusId": 1381073}, "corpusId": 1381073, + "publicationVenue": {"id": "5545566b-c0b8-418c-83a5-a986a4657572", "name": + "ACM-SIAM Symposium on Discrete Algorithms", "type": "conference", "alternate_names": + ["Symposium on Discrete Algorithms", "ACM-SIAM Symp Discret Algorithm", "Symp + Discret Algorithm", "SODA"], "url": "https://en.wikipedia.org/wiki/Symposium_on_Discrete_Algorithms"}, + "url": "https://www.semanticscholar.org/paper/5e5db839d78530aec673eb273e2cc8971f485f2b", "title": "Characterizing the easy-to-find subgraphs from the viewpoint of polynomial-time algorithms, kernels, and Turing kernels", "abstract": "We study two fundamental problems related to finding subgraphs: (1) given graphs @@ -53162,43 +60618,21 @@ interactions: many-one kernels, but show examples that this question is much more fragile than the characterization for Turing kernels.", "venue": "ACM-SIAM Symposium on Discrete Algorithms", "year": 2014, "referenceCount": 76, "citationCount": - 25, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": + 25, "influentialCitationCount": 2, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/1410.0855", "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2014-10-03", "journal": {"name": "ArXiv", "volume": "abs/1410.0855"}, "authors": [{"authorId": "1780259", "name": "B. Jansen"}, {"authorId": "145722890", "name": "D. Marx"}]}, {"paperId": - "4861701b00b0d2609dba39e7010017abd9174f93", "externalIds": {"MAG": "2324179631", - "DOI": "10.1142/9789814293020_0012", "CorpusId": 27084399}, "url": "https://www.semanticscholar.org/paper/4861701b00b0d2609dba39e7010017abd9174f93", - "title": "TURING DEGREES AND THE ERSHOV HIERARCHY", "abstract": "An n-r.e. - set can be defined as the symmetric difference of n recursively enumerable - sets. The classes of these sets form a natural hierarchy which became a well-studied - topic in recursion theory. In a series of ground-breaking papers, Ershov generalized - this hierarchy to transfinite levels based on Kleene\u2019s notations of ordinals - and this work lead to a fruitful study of these sets and their many-one and - Turing degrees. The Ershov hierarchy is a natural measure of complexity of - the sets below the halting problem. In this paper, we survey the early work - by Ershov and others on this hierarchy and present the most fundamental results. - We also provide some pointers to concurrent work in the field.", "venue": - "", "year": 2009, "referenceCount": 37, "citationCount": 14, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2009-12-01", - "journal": {"name": "", "pages": "300-321", "volume": ""}, "authors": [{"authorId": - "1699450", "name": "F. Stephan"}, {"authorId": "2109409462", "name": "Yue - Yang"}, {"authorId": "2804470", "name": "Liang Yu"}]}, {"paperId": "067d97b6d6cfca8b8a1f893367c62a5a0f3974f1", - "externalIds": {"MAG": "2293930388", "CorpusId": 61640713}, "url": "https://www.semanticscholar.org/paper/067d97b6d6cfca8b8a1f893367c62a5a0f3974f1", - "title": "The universal Turing machine (2nd ed.): a half-century survey", - "abstract": null, "venue": "", "year": 1995, "referenceCount": 0, "citationCount": - 24, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}], "publicationTypes": ["Review"], "publicationDate": - "1995-01-02", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "6259065", "name": "R. Herken"}]}, {"paperId": "2466de77dc63fed6d260297daee978e392942bd3", - "externalIds": {"MAG": "2050148247", "DOI": "10.1136/BMJ.286.6378.1614", "CorpusId": - 6011143, "PubMed": "6405910"}, "url": "https://www.semanticscholar.org/paper/2466de77dc63fed6d260297daee978e392942bd3", + "2466de77dc63fed6d260297daee978e392942bd3", "externalIds": {"MAG": "2050148247", + "DOI": "10.1136/BMJ.286.6378.1614", "CorpusId": 6011143, "PubMed": "6405910"}, + "corpusId": 6011143, "publicationVenue": {"id": "3048b449-a773-4256-9bb5-5e61fbb61e52", + "name": "British medical journal", "alternate_names": ["British Medical Journal", + "Br med j", "Br Med J"], "issn": "1759-2151", "alternate_issns": ["1106-5028", + "1222-5835", "1790-5249", "1106-4226"], "url": "https://www.bmj.com/", "alternate_urls": + ["http://www.bmj.ro/"]}, "url": "https://www.semanticscholar.org/paper/2466de77dc63fed6d260297daee978e392942bd3", "title": "Pneumocystis pneumonia and disseminated toxoplasmosis in a male homosexual.", "abstract": "isolated from stool, cerebrospinal fluid, blood, urine, or throat. The toxoplasma dye test titre 1/128. detecting a negative @@ -53206,146 +60640,200 @@ interactions: days'' treatment, some clinical his tempera- ture remained raised and intravenous co-trimoxazole was days (400 trimethoprim and 2000 sulphamethoxazole a day).", "venue": "British medical journal", "year": 1983, "referenceCount": 6, "citationCount": - 26, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}, {"category": "Biology", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "CaseReport"], - "publicationDate": "1983-05-21", "journal": {"name": "British Medical Journal - (Clinical research ed.)", "pages": "1614 - 1614", "volume": "286"}, "authors": - [{"authorId": "1984428", "name": "W. Gransden"}, {"authorId": "51006652", - "name": "P. M. Brown"}]}, {"paperId": "ccf5a452a24043d5d57bbd6b137c36da995750d0", + 26, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.bmj.com/content/286/6378/1614.1.full.pdf", "status": + "BRONZE"}, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}, + {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "CaseReport"], "publicationDate": "1983-05-21", "journal": {"name": "British + Medical Journal (Clinical research ed.)", "pages": "1614 - 1614", "volume": + "286"}, "authors": [{"authorId": "1984428", "name": "W. Gransden"}, {"authorId": + "51006652", "name": "P. M. Brown"}]}, {"paperId": "ccf5a452a24043d5d57bbd6b137c36da995750d0", "externalIds": {"DBLP": "journals/corr/abs-1711-07023", "ArXiv": "1711.07023", "MAG": "2769209754", "DOI": "10.1007/978-3-319-94821-8_15", "CorpusId": 5661962}, + "corpusId": 5661962, "publicationVenue": {"id": "1b356608-ca93-40d2-8553-8925a463dab9", + "name": "International Conference on Interactive Theorem Proving", "type": + "conference", "alternate_names": ["Interactive Theorem Proving", "Interact + Theorem Proving", "Int Conf Interact Theorem Proving", "ITP"], "url": "https://en.wikipedia.org/wiki/Interactive_Theorem_Proving_(conference)"}, "url": "https://www.semanticscholar.org/paper/ccf5a452a24043d5d57bbd6b137c36da995750d0", "title": "Verification of PCP-Related Computational Reductions in Coq", "abstract": null, "venue": "International Conference on Interactive Theorem Proving", "year": 2017, "referenceCount": 17, "citationCount": 26, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "http://arxiv.org/pdf/1711.07023", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2017-11-19", "journal": {"pages": "253-269"}, "authors": [{"authorId": "24034340", "name": "Y. Forster"}, {"authorId": "30188071", "name": "Edith Heiter"}, {"authorId": "1731120", "name": "G. Smolka"}]}, {"paperId": - "2fef1667e3a68f47e0000ebba795d710b742a8d2", "externalIds": {"ArXiv": "1401.0927", - "MAG": "2032486419", "DOI": "10.1063/1.4863298", "CorpusId": 42785100, "PubMed": - "24697375"}, "url": "https://www.semanticscholar.org/paper/2fef1667e3a68f47e0000ebba795d710b742a8d2", - "title": "Routes to spatiotemporal chaos in Kerr optical frequency combs.", - "abstract": "We investigate the various routes to spatiotemporal chaos in - Kerr optical frequency combs, obtained through pumping an ultra-high Q-factor - whispering-gallery mode resonator with a continuous-wave laser. The Lugiato-Lefever - model is used to build bifurcation diagrams with regards to the parameters - that are externally controllable, namely, the frequency and the power of the - pumping laser. We show that the spatiotemporal chaos emerging from Turing - patterns and solitons display distinctive dynamical features. Experimental - spectra of chaotic Kerr combs are also presented for both cases, in excellent - agreement with theoretical spectra.", "venue": "Chaos", "year": 2014, "referenceCount": - 12, "citationCount": 45, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2014-01-05", "journal": {"name": "Chaos", "pages": "\n 013113\n ", - "volume": "24 1"}, "authors": [{"authorId": "143662508", "name": "A. Coillet"}, - {"authorId": "5948493", "name": "Y. Chembo"}]}, {"paperId": "77553865c8dde5f8a28d4a0187925f42d170e637", - "externalIds": {"MAG": "1992313294", "DOI": "10.1090/S0025-5718-1974-0341881-2", - "CorpusId": 119855015}, "url": "https://www.semanticscholar.org/paper/77553865c8dde5f8a28d4a0187925f42d170e637", - "title": "The application of implicit Runge-Kutta and collection methods to - boundary-value problems", "abstract": "The solution of a nonlinear system - of first order differential equations with nonlinear boundary conditions by - implicit Runge-Kutta methods based on interpolatory quadrature formulae is - examined. An equivalence between implicit Runge-Kutta and collocation schemes - is established. It is shown that the difference equations obtained have a - unique solution in a neighbourhood of an isolated solution of the continuous - problem, that this solution can be computed by Newton iteration and that it - converges to the isolated solution. The order of convergence is equal to the - degree of precision of the related quadra- ture formula plus one. The efficient - implementation of the methods is discussed and numerical examples are given. - 1. Introduction. We investigate the application of certain implicit Runge- - Kutta methods (cf. Butcher (2)) to the numerical solution of nonlinear boundary- - value problems of the form", "venue": "", "year": 1974, "referenceCount": - 18, "citationCount": 82, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "1974-05-01", "journal": {"name": "Mathematics of - Computation", "pages": "449-464", "volume": "28"}, "authors": [{"authorId": - "145175596", "name": "R. Weiss"}]}, {"paperId": "5212acf9970972da512af91ddb9107ceffb9de77", - "externalIds": {"MAG": "109323320", "DBLP": "conf/cca/WeihrauchZ00", "DOI": - "10.1007/3-540-45335-0_22", "CorpusId": 46223636}, "url": "https://www.semanticscholar.org/paper/5212acf9970972da512af91ddb9107ceffb9de77", - "title": "Is the Linear Schr\u00f6dinger Propagator Turing Computable?", "abstract": - null, "venue": "International Conference on Computability and Complexity in - Analysis", "year": 2000, "referenceCount": 8, "citationCount": 13, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2000-09-17", "journal": {"pages": "369-377"}, "authors": [{"authorId": "1696520", - "name": "K. Weihrauch"}, {"authorId": "2778649", "name": "Ning Zhong"}]}, - {"paperId": "da938ead2a67d38b383a3f9a48bca56f1570ee09", "externalIds": {"MAG": - "1507778631", "DBLP": "conf/its/Wiemer-HastingsGHG98", "DOI": "10.1007/3-540-68716-5_39", - "CorpusId": 1362090}, "url": "https://www.semanticscholar.org/paper/da938ead2a67d38b383a3f9a48bca56f1570ee09", - "title": "The Foundations and Architecture of Autotutor", "abstract": null, - "venue": "Intelligent Tutoring Systems", "year": 1998, "referenceCount": 29, - "citationCount": 81, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1998-08-16", "journal": {"pages": "334-343"}, "authors": [{"authorId": "1400286782", - "name": "P. Wiemer-Hastings"}, {"authorId": "1769251", "name": "A. Graesser"}, - {"authorId": "31271775", "name": "D. Harter"}]}, {"paperId": "0093c8cc466bf426c09d75ec9f74dcf221bc3173", - "externalIds": {"MAG": "2035206170", "DBLP": "journals/iandc/Fischer67", "DOI": - "10.1016/S0019-9958(67)90433-0", "CorpusId": 2629286}, "url": "https://www.semanticscholar.org/paper/0093c8cc466bf426c09d75ec9f74dcf221bc3173", - "title": "Turing Machines with a Schedule to Keep", "abstract": null, "venue": - "Information and Control", "year": 1967, "referenceCount": 5, "citationCount": - 16, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1967-07-01", "journal": {"name": "Inf. - Control.", "pages": "138-146", "volume": "11"}, "authors": [{"authorId": "1691253", - "name": "P. C. Fischer"}]}, {"paperId": "5c7be6fc4dd8a2ab31d872d26a986e03227ae81a", - "externalIds": {"DBLP": "conf/sp/Brown91", "DOI": "10.1109/RISP.1991.130804", - "CorpusId": 26703868}, "url": "https://www.semanticscholar.org/paper/5c7be6fc4dd8a2ab31d872d26a986e03227ae81a", - "title": "The Turing Test and Non-Information Flow", "abstract": null, "venue": - "IEEE Symposium on Security and Privacy", "year": 1991, "referenceCount": - 0, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}], "publicationTypes": ["JournalArticle"], - "publicationDate": null, "journal": {"pages": "373-388"}, "authors": [{"authorId": - "2109449697", "name": "Randy Brown"}]}, {"paperId": "30eb4d8f93b9f90bd9fd9c28459adaf05c1c3399", - "externalIds": {"MAG": "1966387903", "DOI": "10.1090/S0002-9939-1965-0181538-0", - "CorpusId": 15309987}, "url": "https://www.semanticscholar.org/paper/30eb4d8f93b9f90bd9fd9c28459adaf05c1c3399", - "title": "Machine dependence of degrees of difficulty.", "abstract": "Machine - dependence of degree-of-difficulty relation for recursive functions, considering - Turing machine as programmed computer", "venue": "", "year": 1965, "referenceCount": - 12, "citationCount": 15, "influentialCitationCount": 3, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1965-06-01", "journal": {"name": - "", "pages": "442-447", "volume": "16"}, "authors": [{"authorId": "1795076", - "name": "M. Arbib"}, {"authorId": "143624243", "name": "M. Blum"}]}, {"paperId": - "f3bc5d0aad977f25b813ceb7da9a17fc5c2fc390", "externalIds": {"MAG": "2023723894", - "DBLP": "journals/siamads/CurtuE04", "DOI": "10.1137/030600503", "CorpusId": - 17012620}, "url": "https://www.semanticscholar.org/paper/f3bc5d0aad977f25b813ceb7da9a17fc5c2fc390", - "title": "Pattern Formation in a Network of Excitatory and Inhibitory Cells - with Adaptation", "abstract": "A bifurcation analysis of a simplified model - for excitatory and inhibitory dynamics is presented. Excitatory cells are - endowed with a slow negative feedback and inhibitory cells are assumed to - act instantly. This results in a generalization of the Hansel-Sompolinsky - model for orientation selectiv- ity. Normal forms are computed for the Turing-Hopf - instability, where a new class of solutions is found. The transition from - stationary patterns to traveling waves is analyzed by deriving the normal - form for a Takens-Bogdanov bifurcation. Comparisons between the normal forms - and numerical solutions of the full model are presented.", "venue": "SIAM - Journal on Applied Dynamical Systems", "year": 2004, "referenceCount": 27, - "citationCount": 47, "influentialCitationCount": 4, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": null, "journal": {"name": "SIAM J. - Appl. Dyn. Syst.", "pages": "191-231", "volume": "3"}, "authors": [{"authorId": - "1735974", "name": "R. Curtu"}, {"authorId": "2041115", "name": "B. Ermentrout"}]}, - {"paperId": "709492e5cb53175ecc09f16f2ee7b09ee78c1420", "externalIds": {"MAG": - "2285074506", "CorpusId": 155718289}, "url": "https://www.semanticscholar.org/paper/709492e5cb53175ecc09f16f2ee7b09ee78c1420", + "a567eace195096239120adf0b7c5f2d72df45a53", "externalIds": {"DBLP": "conf/isaac/BeigelFS03", + "MAG": "1501321263", "DOI": "10.1137/S0097539704441630", "CorpusId": 12432255}, + "corpusId": 12432255, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/a567eace195096239120adf0b7c5f2d72df45a53", + "title": "Infinitely-Often Autoreducible Sets", "abstract": "A set A is autoreducible + if one can compute, for all x, the value A(x) by querying A only at places + y \u00ac= x. Furthermore, A is infinitely-often autoreducible if, for infinitely + many x, the value A(x) can be computed by querying A only at places y \u00ac= + x. For all other x, the computation outputs a special symbol to signal that + the reduction is undefined. It is shown that for polynomial time Turing and + truth-table autoreducibility. there are sets A, B, C in EXP such that A is + not infinitely-often Turing autoreducible, B is Turing autoreducible but not + infinitely-often truth-table autoreducible, C is truth-table autoreducible + with g(n) + 1 queries but not infinitely-often Turing autoreducible with g(n) + queries. Here n is the length of the input, g is nondecreasing and there exists + a polynomial p such that p(n) bounds both, the computation time and the value, + of g at input of length n. Furthermore, connections between notions of infinitely-often + autoreducibility and notions of approximability are investigated. The Hausdorff-dimension + of the class of sets which are not infinitely-often autoreducible is shown + to be 1.", "venue": "SIAM journal on computing (Print)", "year": 2003, "referenceCount": + 40, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2003-12-15", "journal": + {"pages": "98-107"}, "authors": [{"authorId": "2516122", "name": "R. Beigel"}, + {"authorId": "1691447", "name": "L. Fortnow"}, {"authorId": "1699450", "name": + "F. Stephan"}]}, {"paperId": "510ff156834e92f0acb0c38a25f36cf15dc6eb64", "externalIds": + {"MAG": "1573617800", "DOI": "10.1088/1674-1056/20/7/074702", "CorpusId": + 117004325}, "corpusId": 117004325, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/510ff156834e92f0acb0c38a25f36cf15dc6eb64", + "title": "Turing pattern selection in a reaction-diffusion epidemic model", + "abstract": "We present Turing pattern selection in a reaction-diffusion epidemic + model under zero-flux boundary conditions. The value of this study is twofold. + First, it establishes the amplitude equations for the excited modes, which + determines the stability of amplitudes towards uniform and inhomogeneous perturbations. + Second, it illustrates all five categories of Turing patterns close to the + onset of Turing bifurcation via numerical simulations which indicates that + the model dynamics exhibits complex pattern replication: on increasing the + control parameter \u03bd, the sequence \"H0 hexagons \u2192 H0-hexagon-stripe + mixtures \u2192 stripes \u2192 H\u03c0-hexagon-stripe mixtures \u2192 H\u03c0 + hexagons\" is observed. This may enrich the pattern dynamics in a diffusive + epidemic model.", "venue": "", "year": 2011, "referenceCount": 56, "citationCount": + 11, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2011-07-15", "journal": {"name": + "Chinese Physics B", "pages": "074702", "volume": "20"}, "authors": [{"authorId": + "2100374034", "name": "\u738b\u73ae\u660e"}, {"authorId": "103352250", "name": + "\u5218\u539a\u4e1a"}, {"authorId": "2099060215", "name": "\u8521\u6c38\u4e3d"}, + {"authorId": "2096135607", "name": "\u674e\u9547\u6e05"}]}, {"paperId": "72959890369acd49874fd5c8abd6d62d08e2a107", + "externalIds": {"MAG": "2761896474", "DOI": "10.1007/978-981-10-6544-6_31", + "CorpusId": 196024670}, "corpusId": 196024670, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/72959890369acd49874fd5c8abd6d62d08e2a107", + "title": "A Survey of Design Techniques for Conversational Agents", "abstract": + null, "venue": "", "year": 2017, "referenceCount": 20, "citationCount": 82, + "influentialCitationCount": 5, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + Science", "source": "external"}, {"category": "Computer Science", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "2017-05-13", + "journal": {"name": "", "pages": "336-350", "volume": ""}, "authors": [{"authorId": + "2118623082", "name": "K. Ramesh"}, {"authorId": "150305466", "name": "Surya + Ravishankaran"}, {"authorId": null, "name": "Abhishek Joshi"}, {"authorId": + "145171675", "name": "K. Chandrasekaran"}]}, {"paperId": "ad7173ddd71cf62c1e2075b957425ff7a727fe86", + "externalIds": {"DBLP": "journals/ijhpca/GeistKP97", "MAG": "2571376244", + "DOI": "10.1177/109434209701100305", "CorpusId": 13892300}, "corpusId": 13892300, + "publicationVenue": {"id": "8ce575db-79d9-4601-83df-e1e96f6b4e3b", "name": + "The international journal of high performance computing applications", "type": + "journal", "alternate_names": ["int j high perform comput appl", "International + Journal of High Performance Computing Applications", "Int J High Perform Comput + Appl"], "issn": "1094-3420", "url": "http://www.sagepub.com/journals/Journal201339/title", + "alternate_urls": ["https://journals.sagepub.com/home/hpc"]}, "url": "https://www.semanticscholar.org/paper/ad7173ddd71cf62c1e2075b957425ff7a727fe86", + "title": "Cumulvs: Providing Fault Toler. Ance, Visualization, and Steer Ing + of Parallel Applications", "abstract": "The use of visualization and computational + steering can often assist scientists in analyzing large-scale scientific applications. + Fault tolerance to failures is of great impor tance when running on a distributed + system. However, the details of implementing these features are complex and + tedious, leaving many scientists with inadequate develop ment tools. CUMULVS + is a library that enables program mers to easily incorporate interactive visualization + and computational steering into existing parallel programs. Built on the PVM + virtual machine framework, CUMULVS is portable and interoperable with all + the computer archi tectures that PVM works with\u2014a growing list that now + stands at about 60 architectures. The CUMULVS library is divided into two + pieces: one for the application program and one for the possibly commercial, + visualization, and steering front end. Together, these two libraries encom + pass all the connection and data protocols needed to dynamically attach multiple, + independent viewer front ends to a running parallel application. Viewer programs + can also steer one or more user-defined parameters to \"close the loop\" for + computational experiments and analy ses. CUMULVS allows the programmer to + specify user- directed checkpoints for saving an important program state in + case of failures and also provides a mechanism to migrate tasks across heterogeneous + machine architec tures to achieve improved performance. Details of the CUMULVS + design goals and compromises as well as future directions are given.", "venue": + "The international journal of high performance computing applications", "year": + 1996, "referenceCount": 26, "citationCount": 216, "influentialCitationCount": + 13, "isOpenAccess": true, "openAccessPdf": {"url": "https://digital.library.unt.edu/ark:/67531/metadc689098/m2/1/high_res_d/376380.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1996-09-01", "journal": {"name": "International Journal + of High Performance Computing Applications", "pages": "224 - 235", "volume": + "11"}, "authors": [{"authorId": "144741680", "name": "A. Geist"}, {"authorId": + "1792233", "name": "J. Kohl"}, {"authorId": "2015999", "name": "P. Papadopoulos"}]}, + {"paperId": "7b44ab76e6979f6ffe6f0ec046a8e147282753b5", "externalIds": {"MAG": + "2478728891", "DOI": "10.1007/BFB0089200", "CorpusId": 45524397}, "corpusId": + 45524397, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/7b44ab76e6979f6ffe6f0ec046a8e147282753b5", + "title": "Mathematical Research Today and Tomorrow", "abstract": null, "venue": + "", "year": 1992, "referenceCount": 12, "citationCount": 16, "influentialCitationCount": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-540-47341-1%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "11996904", + "name": "C. Casacuberta"}, {"authorId": "98847781", "name": "M. Castellet"}]}, + {"paperId": "2251ee688e5993d9bdf08a9206eafccc54f68a72", "externalIds": {"DOI": + "10.2307/j.ctt9qh894.58", "CorpusId": 21401875, "PubMed": "10579131"}, "corpusId": + 21401875, "publicationVenue": {"id": "d3210173-6971-4d43-ab71-c723964230b6", + "name": "Journal of accident & emergency medicine", "type": "journal", "alternate_names": + ["J accid emerg med"], "issn": "1351-0622", "url": "https://emj.bmj.com/", + "alternate_urls": ["https://emj.bmj.com/content/by/year"]}, "url": "https://www.semanticscholar.org/paper/2251ee688e5993d9bdf08a9206eafccc54f68a72", + "title": "The millennium....", "abstract": "The American Sociologist examines + the history, current status, and future prospect of sociology as a profession + and discipline. The American Sociologist emphasizes new trends in the profession + and focuses on how sociologists have shaped or influenced social policy and + the intellectual is-sues of the age. It also publishes professional opinions, + special fea-tures, interviews, and review essays, with emphasis on the global + context of the sociological discipline. the role of the state following independence + in the economic development of the newly emerged states in Spanish America.", + "venue": "Journal of accident & emergency medicine", "year": 1999, "referenceCount": + 34, "citationCount": 46, "influentialCitationCount": 2, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Education", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle", "Review"], "publicationDate": null, + "journal": {"name": "Journal of accident & emergency medicine", "pages": "\n 3-4\n ", + "volume": "Suppl"}, "authors": [{"authorId": "120447693", "name": "A. Cash"}]}, + {"paperId": "f99b12cfff87b414d881d04a76bfa3cc37330e10", "externalIds": {"MAG": + "2080633801", "DOI": "10.1098/rsta.1995.0093", "CorpusId": 122450853}, "corpusId": + 122450853, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f99b12cfff87b414d881d04a76bfa3cc37330e10", + "title": "Nonlinear waves, patterns and spatio-temporal chaos in cellular + neural networks", "abstract": "Spatio-temporal pattern formation occurring + in discretely coupled nonlinear dynamical systems has been studied numerically. + In this paper, we review the possibilities of using arrays of discretely coupled + nonlinear electronic circuits to study these systems. Spiral wave initiation + and Turing pattern formation are some of the examples. Sidewall forcing of + Turing patterns is shown to be capable of driving the system into a perfect + spatial organization, namely, a rhombic pattern, where no defects occur. The + dynamics of the two layers supporting Turing and Hopf modes, respectively, + is analysed as a function of the coupling strength between them. The competition + between these two modes is shown to increase with the diffusion between layers. + As well, the coexistence of low- and high-dimensional spatio-temporal chaos + is shown to occur in one-dimensional arrays.", "venue": "Philosophical Transactions + of the Royal Society of London. Series A: Physical and Engineering Sciences", + "year": 1995, "referenceCount": 39, "citationCount": 15, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Physics", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": + "1995-10-16", "journal": {"name": "Philosophical Transactions of the Royal + Society of London. Series A: Physical and Engineering Sciences", "pages": + "101 - 113", "volume": "353"}, "authors": [{"authorId": "1399297796", "name": + "V. P\u00e9rez-Mu\u00f1uzuri"}, {"authorId": "9165742", "name": "A. P. Mu\u00f1uzuri"}, + {"authorId": "1403050470", "name": "M. G\u00f3mez-Gesteira"}, {"authorId": + "1422161402", "name": "V. P\u00e9rez-Villar"}, {"authorId": "2793014", "name": + "L. Pivka"}, {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "709492e5cb53175ecc09f16f2ee7b09ee78c1420", + "externalIds": {"MAG": "2285074506", "CorpusId": 155718289}, "corpusId": 155718289, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/709492e5cb53175ecc09f16f2ee7b09ee78c1420", "title": "Intersectoral Terms of Trade and Marketed Surplus of Agricultural Produce, 1951-52 to 1965-66", "abstract": "\ufeffDuring the period of the first three five-year Plans, all prices received and paid by agriculture show- @@ -53354,30 +60842,492 @@ interactions: and yet the consequent secular improvement in favour of agriatl- ture in the net barter terms of trade was marginal.", "venue": "", "year": 1969, "referenceCount": 0, "citationCount": 27, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1969-06-28", "journal": {"name": - "Economic and Political Weekly", "volume": "4"}, "authors": [{"authorId": - "123198444", "name": "B. Thamarajakshi"}]}, {"paperId": "3e0e40509dc447a05cc9af14c57ad8c0fdcb7e21", - "externalIds": {"DBLP": "journals/sigact/HerlihyL08", "MAG": "2080922475", - "DOI": "10.1145/1360443.1360458", "CorpusId": 15047093}, "url": "https://www.semanticscholar.org/paper/3e0e40509dc447a05cc9af14c57ad8c0fdcb7e21", - "title": "Distributed computing and the multicore revolution", "abstract": - "Changes in technology can have far-reaching effects on theory. For example, - while Turing''s work on computability predated the first electronic computers, - complexity theory flowered only after computers became a reality. After all, - an algorithm''s complexity may not matter much in a mathematics journal, but - matters quite a bit in a FORTRAN program. We argue that something similar - is going on with parallel and concurrent computation: after decades of being - respected but not taken seriously, research on multiprocessor algorithms and - data structures is going mainstream.", "venue": "SIGA", "year": 2008, "referenceCount": - 59, "citationCount": 49, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer + "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1969-06-28", + "journal": {"name": "Economic and Political Weekly", "volume": "4"}, "authors": + [{"authorId": "123198444", "name": "B. Thamarajakshi"}]}, {"paperId": "ea659c9e4f5cda1f88d5ba85ca18ba2744743c57", + "externalIds": {"DBLP": "journals/jolli/BringsjordCN00", "MAG": "1564959212", + "DOI": "10.1023/A:1008311207953", "CorpusId": 394659}, "corpusId": 394659, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/ea659c9e4f5cda1f88d5ba85ca18ba2744743c57", + "title": "Animals, Zombanimals, and the Total Turing Test", "abstract": null, + "venue": "J. Log. Lang. Inf.", "year": 2000, "referenceCount": 25, "citationCount": + 13, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Computer Science", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "2000-10-01", "journal": {"name": "Journal of Logic, Language and Information", + "pages": "397-418", "volume": "9"}, "authors": [{"authorId": "1797985", "name": + "S. Bringsjord"}, {"authorId": "2072028531", "name": "Clarke Caporale"}, {"authorId": + "12755969", "name": "R. Noel"}]}, {"paperId": "15fdb89104584edb00f93341bedf07def8a942d5", + "externalIds": {"MAG": "2192149141", "ArXiv": "1502.04135", "DOI": "10.1038/nature16059", + "CorpusId": 4451987, "PubMed": "26659181"}, "corpusId": 4451987, "publicationVenue": + {"id": "6c24a0a0-b07d-4d7b-a19b-fd09a3ed453a", "name": "Nature", "type": "journal", + "issn": "0028-0836", "url": "https://www.nature.com/", "alternate_urls": ["http://www.nature.com/nature/", + "https://www.nature.com/nature/", "http://www.nature.com/nature/archive/index.html"]}, + "url": "https://www.semanticscholar.org/paper/15fdb89104584edb00f93341bedf07def8a942d5", + "title": "Undecidability of the spectral gap", "abstract": null, "venue": + "Nature", "year": 2015, "referenceCount": 94, "citationCount": 222, "influentialCitationCount": + 11, "isOpenAccess": true, "openAccessPdf": {"url": "https://discovery.ucl.ac.uk/id/eprint/10140175/1/Cubitt_undecidability-of-the-spectral-gap.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Physics", "Mathematics", "Medicine"], + "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": + "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2015-02-13", "journal": {"name": "Nature", "pages": "207-211", + "volume": "528"}, "authors": [{"authorId": "2709707", "name": "T. Cubitt"}, + {"authorId": "1399658529", "name": "D. P\u00e9rez-Garc\u00eda"}, {"authorId": + "40341227", "name": "M. Wolf"}]}, {"paperId": "32cf0370d4a4742ee03b4a8b0951c80cf8221fbf", + "externalIds": {"MAG": "1970911622", "DOI": "10.1103/PHYSREVLETT.95.038303", + "CorpusId": 9131763, "PubMed": "16090777"}, "corpusId": 9131763, "publicationVenue": + {"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d", "name": "Physical Review Letters", + "type": "journal", "alternate_names": ["Phys Rev Lett"], "issn": "0031-9007", + "url": "https://journals.aps.org/prl/", "alternate_urls": ["http://journals.aps.org/prl/", + "http://prl.aps.org/"]}, "url": "https://www.semanticscholar.org/paper/32cf0370d4a4742ee03b4a8b0951c80cf8221fbf", + "title": "Segmented waves from a spatiotemporal transverse wave instability.", + "abstract": "We observe traveling waves emitted from Turing spots in the chlorine + dioxide-iodine-malonic acid reaction. The newborn waves are continuous, but + they break into segments as they propagate, and the propagation of these segments + ultimately gives rise to spatiotemporal chaos. We model the wave-breaking + process and the motion of the chaotic segments. We find stable segmented spirals + as well. We attribute the segmentation to an interaction between front rippling + via a transverse instability and front symmetry breaking by a fast-diffusing + inhibitor far from the codimension-2 Hopf-Turing bifurcation, and the chaos + to a secondary instability of the periodic segmentation.", "venue": "Physical + Review Letters", "year": 2005, "referenceCount": 43, "citationCount": 17, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Materials Science", "Medicine"], "s2FieldsOfStudy": [{"category": + "Materials Science", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2005-07-14", "journal": {"name": "Physical + review letters", "pages": "\n 038303\n ", "volume": "95 3"}, + "authors": [{"authorId": "2586119", "name": "L. Yang"}, {"authorId": "6742967", + "name": "I. Berenstein"}, {"authorId": "144854275", "name": "I. Epstein"}]}, + {"paperId": "6556bfd620596a3ad95f9fdc0726c3774d795403", "externalIds": {"MAG": + "2789322801", "DOI": "10.1007/978-3-319-72577-2_14", "CorpusId": 55705586}, + "corpusId": 55705586, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6556bfd620596a3ad95f9fdc0726c3774d795403", + "title": "Models in Search of Targets: Exploratory Modelling and the Case + of Turing Patterns", "abstract": null, "venue": "", "year": 2018, "referenceCount": + 43, "citationCount": 19, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "http://philsci-archive.pitt.edu/14521/1/Gelfert_Exploratory-Modeling-Turing-Patterns-PREPRINT.pdf", + "status": "GREEN"}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2018-03-27", "journal": {"name": "", "pages": "245-269", "volume": ""}, "authors": + [{"authorId": "3260405", "name": "Axel Gelfert"}]}, {"paperId": "2fef1667e3a68f47e0000ebba795d710b742a8d2", + "externalIds": {"ArXiv": "1401.0927", "MAG": "2032486419", "DOI": "10.1063/1.4863298", + "CorpusId": 42785100, "PubMed": "24697375"}, "corpusId": 42785100, "publicationVenue": + {"id": "30c0ded7-c8b4-473c-bbc0-f237234ac1a6", "name": "Chaos", "type": "journal", + "issn": "1054-1500", "url": "http://chaos.aip.org/", "alternate_urls": ["https://aip.scitation.org/journal/cha"]}, + "url": "https://www.semanticscholar.org/paper/2fef1667e3a68f47e0000ebba795d710b742a8d2", + "title": "Routes to spatiotemporal chaos in Kerr optical frequency combs.", + "abstract": "We investigate the various routes to spatiotemporal chaos in + Kerr optical frequency combs, obtained through pumping an ultra-high Q-factor + whispering-gallery mode resonator with a continuous-wave laser. The Lugiato-Lefever + model is used to build bifurcation diagrams with regards to the parameters + that are externally controllable, namely, the frequency and the power of the + pumping laser. We show that the spatiotemporal chaos emerging from Turing + patterns and solitons display distinctive dynamical features. Experimental + spectra of chaotic Kerr combs are also presented for both cases, in excellent + agreement with theoretical spectra.", "venue": "Chaos", "year": 2014, "referenceCount": + 12, "citationCount": 45, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1401.0927", "status": "GREEN"}, + "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": [{"category": + "Medicine", "source": "external"}, {"category": "Physics", "source": "external"}, + {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2014-01-05", "journal": {"name": "Chaos", "pages": "\n 013113\n ", + "volume": "24 1"}, "authors": [{"authorId": "143662508", "name": "A. Coillet"}, + {"authorId": "5948493", "name": "Y. Chembo"}]}, {"paperId": "d266aac357faca7444a9646591499b165aadca61", + "externalIds": {"MAG": "2007059989", "DBLP": "journals/isci/ItoIT88", "DOI": + "10.1016/0020-0255(88)90005-9", "CorpusId": 32461234}, "corpusId": 32461234, + "publicationVenue": {"id": "e46002a1-d7a6-4681-aae9-36bc3a6a1f93", "name": + "Information Sciences", "type": "journal", "alternate_names": ["Information + Scientist", "Inf Sci"], "issn": "0020-0255", "alternate_issns": ["0020-0263"], + "url": "http://www.sciencedirect.com/science/journal/00200255"}, "url": "https://www.semanticscholar.org/paper/d266aac357faca7444a9646591499b165aadca61", + "title": "A note on three-way two-dimensional alternating Turing machines", + "abstract": null, "venue": "Information Sciences", "year": 1988, "referenceCount": + 9, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://repository.kulib.kyoto-u.ac.jp/dspace/bitstream/2433/99960/1/0625-13.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Business", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + "1988-06-01", "journal": {"name": "Inf. Sci.", "pages": "1-22", "volume": + "45"}, "authors": [{"authorId": "1871564", "name": "A. Ito"}, {"authorId": + "1737209", "name": "Katsushi Inoue"}, {"authorId": "2339053", "name": "I. + Takanami"}]}, {"paperId": "84d7712de858d9a324e39c9a06007947cfb1bd2f", "externalIds": + {"ArXiv": "1205.5685", "MAG": "2006518037", "DOI": "10.1209/0295-5075/98/64001", + "CorpusId": 119077751}, "corpusId": 119077751, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/84d7712de858d9a324e39c9a06007947cfb1bd2f", + "title": "Turbulent patterns in wall-bounded flows: A Turing instability?", + "abstract": "In their way to/from turbulence, plane wall-bounded flows display + an interesting transitional regime where laminar and turbulent oblique bands + alternate, the origin of which is still mysterious. In line with Barkley''s + recent work about the pipe flow transition involving reaction-diffusion concepts, + we consider plane Couette flow in the same perspective and transform Waleffe''s + classical four-variable model of self-sustaining process into a reaction-diffusion + model. We show that, upon fulfillment of a condition on the relative diffusivities + of its variables, the featureless turbulent regime becomes unstable against + patterning as the result of a Turing instability. A reduced two-variable model + helps us to delineate the appropriate region of parameter space. An intrinsic + status is therefore given to the pattern''s wavelength for the first time. + Virtues and limitations of the model are discussed, calling for a microscopic + support of the phenomenological approach.", "venue": "", "year": 2012, "referenceCount": + 6, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "http://arxiv.org/pdf/1205.5685", "status": "GREEN"}, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-05-25", "journal": {"name": + "EPL (Europhysics Letters)", "pages": "64001", "volume": "98"}, "authors": + [{"authorId": "2417178", "name": "P. Manneville"}]}, {"paperId": "275a52e3bce9136993ad9b9657630c95a2d938ec", + "externalIds": {"MAG": "2530123397", "DOI": "10.1002/9781119237150", "CorpusId": + 125937329}, "corpusId": 125937329, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/275a52e3bce9136993ad9b9657630c95a2d938ec", + "title": "Statistical Implications of Turing''s Formula", "abstract": null, + "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": + 2, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes": + null, "publicationDate": "2016-11-21", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "2117992514", "name": "Zhiyi Zhang"}]}, {"paperId": + "0093c8cc466bf426c09d75ec9f74dcf221bc3173", "externalIds": {"MAG": "2035206170", + "DBLP": "journals/iandc/Fischer67", "DOI": "10.1016/S0019-9958(67)90433-0", + "CorpusId": 2629286}, "corpusId": 2629286, "publicationVenue": {"id": "feadd011-44f6-4649-bc71-8c9a604eee42", + "name": "Information and Control", "alternate_names": ["Inf Control"], "issn": + "0019-9958", "url": "https://www.sciencedirect.com/journal/information-and-control", + "alternate_urls": ["http://www.sciencedirect.com/science/journal/00199958", + "http://www.sciencedirect.com/science/journal/00199958/1/1"]}, "url": "https://www.semanticscholar.org/paper/0093c8cc466bf426c09d75ec9f74dcf221bc3173", + "title": "Turing Machines with a Schedule to Keep", "abstract": null, "venue": + "Information and Control", "year": 1967, "referenceCount": 5, "citationCount": + 16, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "2008-03-01", "journal": {"pages": "8"}, "authors": [{"authorId": "1744502", - "name": "M. Herlihy"}, {"authorId": "2182186", "name": "Victor Luchangco"}]}, - {"paperId": "c06c00a8ec6f755d3e6572fb1d61d0b361ecac69", "externalIds": {"DBLP": - "phd/us/Kadin88", "MAG": "646798825", "CorpusId": 118778526}, "url": "https://www.semanticscholar.org/paper/c06c00a8ec6f755d3e6572fb1d61d0b361ecac69", + "1967-07-01", "journal": {"name": "Inf. Control.", "pages": "138-146", "volume": + "11"}, "authors": [{"authorId": "1691253", "name": "P. C. Fischer"}]}, {"paperId": + "5c7be6fc4dd8a2ab31d872d26a986e03227ae81a", "externalIds": {"DBLP": "conf/sp/Brown91", + "DOI": "10.1109/RISP.1991.130804", "CorpusId": 26703868}, "corpusId": 26703868, + "publicationVenue": {"id": "29b9c461-963e-4d11-b2ab-92c182243942", "name": + "IEEE Symposium on Security and Privacy", "type": "conference", "alternate_names": + ["S&P", "IEEE Symp Secur Priv"], "url": "http://www.ieee-security.org/"}, + "url": "https://www.semanticscholar.org/paper/5c7be6fc4dd8a2ab31d872d26a986e03227ae81a", + "title": "The Turing Test and Non-Information Flow", "abstract": null, "venue": + "IEEE Symposium on Security and Privacy", "year": 1991, "referenceCount": + 0, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}], "publicationTypes": + ["JournalArticle"], "publicationDate": null, "journal": {"pages": "373-388"}, + "authors": [{"authorId": "2109449697", "name": "Randy Brown"}]}, {"paperId": + "c319af92127378e7ee64ec6a3e2e8752fe1421c7", "externalIds": {"MAG": "2251158365", + "DBLP": "conf/ijcai/SharmaVAB15", "CorpusId": 6307034}, "corpusId": 6307034, + "publicationVenue": {"id": "67f7f831-711a-43c8-8785-1e09005359b5", "name": + "International Joint Conference on Artificial Intelligence", "type": "conference", + "alternate_names": ["Int Jt Conf Artif Intell", "IJCAI"], "url": "http://www.ijcai.org/"}, + "url": "https://www.semanticscholar.org/paper/c319af92127378e7ee64ec6a3e2e8752fe1421c7", + "title": "Towards Addressing the Winograd Schema Challenge - Building and + Using a Semantic Parser and a Knowledge Hunting Module", "abstract": "Concerned + about the Turing test''s ability to correctly evaluate if a system exhibits + human-like intelligence, the Winograd Schema Challenge (WSC) has been proposed + as an alternative. A Winograd Schema consists of a sentence and a question. + The answers to the questions are intuitive for humans but are designed to + be difficult for machines, as they require various forms of commonsense knowledge + about the sentence. In this paper we demonstrate our progress towards addressing + the WSC. We present an approach that identifies the knowledge needed to answer + a challenge question, hunts down that knowledge from text repositories, and + then reasons with them to come up with the answer. In the process we develop + a semantic parser (www.kparser.org). We show that our approach works well + with respect to a subset of Winograd schemas.", "venue": "International Joint + Conference on Artificial Intelligence", "year": 2015, "referenceCount": 38, + "citationCount": 81, "influentialCitationCount": 14, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2015-07-25", "journal": {"pages": "1319-1325"}, + "authors": [{"authorId": "40532637", "name": "Arpit Sharma"}, {"authorId": + "40331081", "name": "N. Vo"}, {"authorId": "39744108", "name": "Somak Aditya"}, + {"authorId": "1760291", "name": "Chitta Baral"}]}, {"paperId": "795ed67d570eeb3e644aace59614bc99c54f4b05", + "externalIds": {"MAG": "581368566", "CorpusId": 190783647}, "corpusId": 190783647, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/795ed67d570eeb3e644aace59614bc99c54f4b05", + "title": "The culture of craft : status and future", "abstract": "Introduction: + the salon de refuse?, Peter Dormer. Part 1 The status of craft: the history + of craft, Paul Greenhalgh how strange the change from major to minor, T.A. + Heslop craft and art, culture and biology, Bruce Metcalf craft within a consuming + society, Gloria Hickey the progress of Captain Ludd, Paul Greenhalgh. Part + 2 The challenge of technology: patterns of making, Helen Rees craft and the + Turing test for practical thinking, Peter Dormer CAD/CAM and the British ceramic + industry, Neal French textiles and technology, Peter Dormer tornadoes, T-shirts + and technology, Jeremy Myerson. Part 3 Writing about the crafts: writing about + the crafts, Rosemary Hill writing about objects we don''t understand, Jonathan + Meuli the language and practical philosophy of craft, Peter Dormer.", "venue": + "", "year": 1997, "referenceCount": 0, "citationCount": 78, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], + "s2FieldsOfStudy": [{"category": "Art", "source": "external"}, {"category": + "Art", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "40278856", + "name": "P. Dormer"}]}, {"paperId": "0f7408a221840df6c42b2dfd8228739a6090ab28", + "externalIds": {"MAG": "2124892090", "DOI": "10.1109/PHYCMP.1992.615549", + "CorpusId": 61850869}, "corpusId": 61850869, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/0f7408a221840df6c42b2dfd8228739a6090ab28", + "title": "An Electroid Switching Model For Reversible Computer Architectures", + "abstract": "The study of logical reversibiiity in computation has led to + a proliferation of unconventional architectural proposals, from Brownian-motion + clockwork Turing machines to billiardball Computers. An architectural model + for reversible computers is proposed herein, that is significantly closer + to the switch-level models used in designing actual digital circuitry. This + ue''electroid (electronics-like) model facilitates the direct application + of the substantial body of ezisting digital design techniques to reversible + and dissipation-limited architectures.", "venue": "Workshop on Physics and + Computation", "year": 1992, "referenceCount": 16, "citationCount": 32, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1992-10-02", "journal": {"name": "Workshop on Physics + and Computation", "pages": "237-247"}, "authors": [{"authorId": "2107226704", + "name": "J. S. Hall"}]}, {"paperId": "95727328e579428796cd0d3fe5d727f2b0d34e57", + "externalIds": {"MAG": "2067232297", "DOI": "10.1016/J.PHYSD.2012.02.007", + "CorpusId": 123313161}, "corpusId": 123313161, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/95727328e579428796cd0d3fe5d727f2b0d34e57", + "title": "Localized Turing patterns in nonlinear optical cavities", "abstract": + null, "venue": "", "year": 2012, "referenceCount": 68, "citationCount": 16, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2012-05-15", "journal": {"name": + "Physica D: Nonlinear Phenomena", "pages": "939-946", "volume": "241"}, "authors": + [{"authorId": "6840000", "name": "G. Kozyreff"}]}, {"paperId": "f3bc5d0aad977f25b813ceb7da9a17fc5c2fc390", + "externalIds": {"MAG": "2023723894", "DBLP": "journals/siamads/CurtuE04", + "DOI": "10.1137/030600503", "CorpusId": 17012620}, "corpusId": 17012620, "publicationVenue": + {"id": "d35d93ad-8e2c-4482-a896-897ce5c326fa", "name": "SIAM Journal on Applied + Dynamical Systems", "type": "journal", "alternate_names": ["Siam Journal on + Applied Dynamical Systems", "Siam J Appl Dyn Syst", "SIAM J Appl Dyn Syst"], + "issn": "1536-0040", "url": "https://epubs.siam.org/journal/sjaday"}, "url": + "https://www.semanticscholar.org/paper/f3bc5d0aad977f25b813ceb7da9a17fc5c2fc390", + "title": "Pattern Formation in a Network of Excitatory and Inhibitory Cells + with Adaptation", "abstract": "A bifurcation analysis of a simplified model + for excitatory and inhibitory dynamics is presented. Excitatory cells are + endowed with a slow negative feedback and inhibitory cells are assumed to + act instantly. This results in a generalization of the Hansel-Sompolinsky + model for orientation selectiv- ity. Normal forms are computed for the Turing-Hopf + instability, where a new class of solutions is found. The transition from + stationary patterns to traveling waves is analyzed by deriving the normal + form for a Takens-Bogdanov bifurcation. Comparisons between the normal forms + and numerical solutions of the full model are presented.", "venue": "SIAM + Journal on Applied Dynamical Systems", "year": 2004, "referenceCount": 27, + "citationCount": 47, "influentialCitationCount": 4, "isOpenAccess": true, + "openAccessPdf": {"url": "https://epubs.siam.org/doi/pdf/10.1137/030600503", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], + "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": + "Computer Science", "source": "external"}, {"category": "Biology", "source": + "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "SIAM J. Appl. Dyn. Syst.", "pages": "191-231", + "volume": "3"}, "authors": [{"authorId": "1735974", "name": "R. Curtu"}, {"authorId": + "2041115", "name": "B. Ermentrout"}]}, {"paperId": "8c49acdf89ba042025c8e920ec2159653941b3ae", + "externalIds": {"MAG": "2054809938", "DOI": "10.1073/PNAS.60.1.258", "CorpusId": + 432041, "PubMed": "5241528"}, "corpusId": 432041, "publicationVenue": null, + "url": "https://www.semanticscholar.org/paper/8c49acdf89ba042025c8e920ec2159653941b3ae", + "title": "The generation of antihapten antibodies with electrophoretically + homogeneous L chains.", "abstract": "Fig. 1B). To satisfy the second condition, + known amounts of I''25-labeled pure rabbit anti-DNP Ab (made against DNP-BGG) + were diluted into normal rabbit serum and this mix- ture was then put through + the entire procedure. From these control experiments, the capacity of the + DNP-Sephadex for anti-DNP Ab was determined, and it was demon- strated that + if the absorbent capacity was not exceeded, more than 90% of the Ab in an + antiserum sample could be removed.", "venue": "Proceedings of the National + Academy of Sciences of the United States of America", "year": 1968, "referenceCount": + 5, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": true, + "openAccessPdf": {"url": "https://europepmc.org/articles/pmc539111?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Medicine", "Chemistry"], "s2FieldsOfStudy": + [{"category": "Medicine", "source": "external"}, {"category": "Chemistry", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1968-05-01", "journal": + {"name": "Proceedings of the National Academy of Sciences of the United States + of America", "pages": "258 - 264", "volume": "60"}, "authors": [{"authorId": + "2097111049", "name": "L. Brenneman"}, {"authorId": "145537259", "name": "S. + Singer"}]}, {"paperId": "35ec7a93555e9b5f712a950fa51de347ce28efa9", "externalIds": + {"MAG": "2046584535", "DOI": "10.1177/036354659602400217", "CorpusId": 29074088, + "PubMed": "8775123"}, "corpusId": 29074088, "publicationVenue": {"id": "8d9edd02-f22b-4aad-b661-18713eea6fd8", + "name": "American Journal of Sports Medicine", "type": "journal", "alternate_names": + ["Am J Sport Med"], "issn": "0363-5465", "url": "http://ajs.sagepub.com/", + "alternate_urls": ["https://journals.sagepub.com/home/ajs"]}, "url": "https://www.semanticscholar.org/paper/35ec7a93555e9b5f712a950fa51de347ce28efa9", + "title": "The Incidence and Distribution of Stress Fractures in Competitive + Track and Field Athletes", "abstract": "The incidence and distribution of + stress fractures were evaluated prospectively over 12 months in 53 female + and 58 male competitive track and field athletes (age range, 17 to 26 years). + Twenty athletes sustained 26 stress fractures for an overall incidence rate + of 21.1%. The incidence was 0.70 for the number of stress frac tures per 1000 + hours of training. No differences were observed between male and female rates + (P > 0.05). Twenty-six stress fractures composed 20% of the 130 musculoskeletal + injuries sustained during the study. Although there was no difference in stress + fracture incidence among athletes competing in different events (P > 0.05), + sprints, hurdles, and jumps were associated with a significantly greater number + of foot fractures; middle- and long-distance running were as sociated with + a greater number of long bone and pelvic fractures (P < 0.05). Overall, the + most common sites of bone injuries were the tibia with 12 injuries (46%), + followed by the navicular with 4 injuries (15%), and the fibula with 3 injuries + (12%). The high incidence of stress fractures in our study suggests that risk + factors in track and field athletes should be identified.", "venue": "American + Journal of Sports Medicine", "year": 1996, "referenceCount": 47, "citationCount": + 212, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Medicine", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1996-03-01", "journal": + {"name": "The American Journal of Sports Medicine", "pages": "211 - 217", + "volume": "24"}, "authors": [{"authorId": "5301131", "name": "K. Bennell"}, + {"authorId": "2067793210", "name": "S. A. Malcolm"}, {"authorId": "47449786", + "name": "S. A. Thomas"}, {"authorId": "33964300", "name": "J. Wark"}, {"authorId": + "46825558", "name": "P. Brukner"}]}, {"paperId": "b065a966e8fa3565766184a4938eeab7eca9c55b", + "externalIds": {"MAG": "2613912255", "DOI": "10.3354/MEPS07623", "CorpusId": + 53972473}, "corpusId": 53972473, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b065a966e8fa3565766184a4938eeab7eca9c55b", + "title": "Cold-water coral growth in relation to the hydrography of the Celtic + and Nordic European continental margin", "abstract": "Along the Atlantic European + continental margin, living cold-water coral reefs occur over a wide bathymetric + and hydrographical range. Focusing on 2 regions, the Celtic and the Norwe- + gian shelves, we found that cold-water coral reefs are limited to different + intermediate water masses. Measurements of the physical and geological properties + showed that parameters such as tempera- ture, salinity, dissolved oxygen content, + current intensities, and different substrates vary widely with- out specifically + impacting the distribution of living cold-water coral reefs. The habitat of + living reefs within the NE Atlantic comprises a temperature-salinity field, + with its lower boundary equivalent to the Intermediate Salinity Maximum (ISM). + The ISM on the Celtic margin is represented by Mediter- ranean Outflow Water + (MOW), but is replaced by Atlantic Water (AW) on the Norwegian margin. The + upper limit corresponds to water mass boundaries of Eastern North Atlantic + Water / MOW on the Celtic margin and Norwegian Coastal Water /AW on the Norwegian + margin. Our study shows that cold-water corals in the North Atlantic tolerate + a wide range of environmental conditions. However, our data indicate that + living cold-water coral reefs occur within the density envelope of sigma-theta + (\u03c3\u0398) = 27.35 to 27.65 kg m -3 , thus highlighting the importance + of physical boundary conditions for cold-water coral growth and distribution.", + "venue": "", "year": 2008, "referenceCount": 77, "citationCount": 210, "influentialCitationCount": + 28, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.int-res.com/articles/meps2008/371/m371p165.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Geology", "Biology"], "s2FieldsOfStudy": + [{"category": "Geology", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Environmental Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2008-11-19", "journal": {"name": + "Marine Ecology Progress Series", "pages": "165-176", "volume": "371"}, "authors": + [{"authorId": "90769808", "name": "W. Dullo"}, {"authorId": "2240379", "name": + "S. Fl\u00f6gel"}, {"authorId": "4360370", "name": "A. R\u00fcggeberg"}]}, + {"paperId": "43afea76775f90aba85ab40572f6939a30813efb", "externalIds": {"DBLP": + "journals/ndjfl/FokinaFK16", "MAG": "2209102811", "DOI": "10.1215/00294527-3322017", + "CorpusId": 32532893}, "corpusId": 32532893, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/43afea76775f90aba85ab40572f6939a30813efb", + "title": "Categoricity Spectra for Rigid Structures", "abstract": "For a computable + structure M , the categoricity spectrum is the set of all Turing degrees capable + of computing isomorphisms among arbitrary computable copies of M . If the + spectrum has a least degree, this degree is called the degree of categoricity + of M . In this paper we investigate spectra of categoricity for computable + rigid structures. In particular, we give examples of rigid structures without + degrees of categoricity.", "venue": "Notre Dame J. Formal Log.", "year": 2016, + "referenceCount": 10, "citationCount": 32, "influentialCitationCount": 0, + "isOpenAccess": true, "openAccessPdf": {"url": "https://projecteuclid.org/journals/notre-dame-journal-of-formal-logic/volume-57/issue-1/Categoricity-Spectra-for-Rigid-Structures/10.1215/00294527-3322017.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science", "Mathematics"], + "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, + {"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": + null, "journal": {"name": "Notre Dame J. Formal Log.", "pages": "45-57", "volume": + "57"}, "authors": [{"authorId": "3242657", "name": "E. Fokina"}, {"authorId": + "144222727", "name": "A. Frolov"}, {"authorId": "2935517", "name": "I. Kalimullin"}]}, + {"paperId": "a85a285457379e7e961526683677f446faa4a93a", "externalIds": {"DBLP": + "journals/siamcomp/KintalaF80", "MAG": "2021131202", "DOI": "10.1137/0209003", + "CorpusId": 41334737}, "corpusId": 41334737, "publicationVenue": {"id": "cc6c6e77-9540-46ef-9282-622b12e2d1d1", + "name": "SIAM journal on computing (Print)", "type": "journal", "alternate_names": + ["SIAM J Comput", "SIAM Journal on Computing", "SIAM j comput (print"], "issn": + "0097-5397", "url": "http://www.siam.org/journals/sicomp.php", "alternate_urls": + ["https://epubs.siam.org/journal/smjcat"]}, "url": "https://www.semanticscholar.org/paper/a85a285457379e7e961526683677f446faa4a93a", + "title": "Refining Nondeterminism in Relativized Polynomial-Time Bounded Computations", + "abstract": "Let $\\mathcal {P}_{g(n)} $ denote the class of languages acceptable + by polynomial-time bounded Turing machines making at most $g(n)$ nondeterministic + moves on inputs of length n. For any constructible $g(n)$,$\\mathcal {P} \\subseteq + \\mathcal {P}_{g(n)} \\subseteq \\mathcal {N}\\mathcal {P}$The classes $\\mathcal + {P}_{g(n)} $, for various $g(n)$ of the form $(\\log n)^k ,k \\geqq 1$, are + relativized and the relationships among those relativized classes are studied. + In particular, oracle sets are constructed which (1) make all the relativized + classes equal (this follows from Baker, Gill and Solovay (1975)); (2) make + all the classes associated with powers of $\\log n$ different; (3) for any + k, make all the classes below $(\\log n)^k $ different while the kth power + class is equal to relativized $\\mathcal {NP}$. Results regarding closure + of the $(\\log n)^k $ classes under complementation are also given.", "venue": + "SIAM journal on computing (Print)", "year": 1980, "referenceCount": 7, "citationCount": + 79, "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Computer + Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1980-02-01", "journal": + {"name": "SIAM J. Comput.", "pages": "46-53", "volume": "9"}, "authors": [{"authorId": + "1759332", "name": "C. Kintala"}, {"authorId": "1691253", "name": "P. C. Fischer"}]}, + {"paperId": "899f435c9aeb3f67f3d4779db84a594f7d1217ee", "externalIds": {"CorpusId": + 18072711}, "corpusId": 18072711, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/899f435c9aeb3f67f3d4779db84a594f7d1217ee", + "title": "THE 3-THEORY OF THE COMPUTABLY ENUMERABLE TURING DEGREES IS UNDECIDABLE", + "abstract": "We show the undecidability of the 3-theory of the partial order + of enumerable Turing degrees. 0. Introduction. Recursively enumerable (henceforth + called enumerable) sets arise naturally in many areas of mathematics, for + instance in the study of elementary theories, as solution sets of polynomials + or as the word problems of nitely generated subgroups of nitely presented + groups. Putting the enumerable sets into context with each other in various + ways yields structures whose study has for long been a mainstay of computability + theory. If the sets are related in the most elementary way, namely by inclusion, + one obtains a distributive lattice E with very complex algebraic properties. + Another way to compare sets is to look at the information content. Turing + reducibility is a very general, but the most widely accepted concept of relative + computability: a set X of natural numbers is Turing-reducible to Y ii the + answer to \\n 2 X?\" can be determined by a Turing machine computation which + can use answers to oracle questions \\y 2 Y ?\" during the computation. (For + more restricted notions of relative computability one would for instance place + a priori bounds on the lengths of computations or would limit the access to + the oracle.) The Turing degree of a set, i.e. its equivalence class under + the equivalence relation given by this preordering, measures the information + content of a set while stripping 1991 Mathematics Subject Classiication. 03D25,03D35.", + "venue": "", "year": 1998, "referenceCount": 13, "citationCount": 12, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "2102371842", "name": "NiesTheodore + A. SlamanDepartment"}]}, {"paperId": "4c95c7c2217c41ac13ae76fa296f46a7f76c25b5", + "externalIds": {"MAG": "2170404996", "DOI": "10.1002/POLB.20857", "CorpusId": + 1423334}, "corpusId": 1423334, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/4c95c7c2217c41ac13ae76fa296f46a7f76c25b5", + "title": "Mechanical properties of Nafion and titania/Nafion composite membranes + for polymer electrolyte membrane fuel cells", "abstract": "Measurements of + the mechanical and electrical properties of Nafion and Nafion/titania composite + membranes in constrained environments are reported. The elas- tic and plastic + deformation of Nafion-based materials decreases with both the tempera- ture + and water content. Nafion/titania composites have slightly higher elastic + moduli. The composite membranes exhibit less strain hardening than Nafion. + Composite mem- branes also show a reduction in the long-time creep of \ufffd + 40% in comparison with Nafion. Water uptake is faster in Nafion membranes + recast from solution in comparison with extruded Nafion. The addition of 3-20 + wt % titania particles has minimal effect on the rate of water uptake. Water + sorption by Nafion membranes generates a swelling pressure of \ufffd 0.55 + MPa in 125-lm membranes. The resistivity of Nafion increases when the mem- + brane is placed under a load. At 23 8C and 100% relative humidity, the resistivity + of Nafion increases by \ufffd 15% under an applied stress of 7.5 MPa. There + is a substantial hy- steresis in the membrane resistivity as a function of + the applied stress depending on whether the pressure is increasing or decreasing. + The results demonstrate how the dynamics of water uptake and loss from membranes + are dependent on physical con- straints, and these constraints can impact + fuel cell performance. V C 2006 Wiley Periodicals,", "venue": "", "year": + 2006, "referenceCount": 91, "citationCount": 218, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2006-08-15", "journal": {"name": + "Journal of Polymer Science Part B", "pages": "2327-2345", "volume": "44"}, + "authors": [{"authorId": "122038827", "name": "M. Satterfield"}, {"authorId": + "4515357", "name": "P. Majsztrik"}, {"authorId": "2072863366", "name": "H. + Ota"}, {"authorId": "11461452", "name": "J. Benziger"}, {"authorId": "6593982", + "name": "A. Bocarsly"}]}, {"paperId": "9fb38c850c47af13ec10144b7fa32dbc13a1ccd0", + "externalIds": {"MAG": "2464153967", "CorpusId": 59095692}, "corpusId": 59095692, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9fb38c850c47af13ec10144b7fa32dbc13a1ccd0", + "title": "Deux machines de Turing universelles \u00e0 au plus deux instructions + gauches", "abstract": "On construit une machine de Turing universelle sur + l''alphabet {0, 1} dont le programme contient exactement deux instructions + de mouvement gauche et une machine de Turing universelle sur l''alphabet {0, + 1, 2} dont le programme contient une unique instruction de mouvement gauche", + "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "pages": "1395-1400", "volume": "320"}, "authors": [{"authorId": + "2072467297", "name": "M. Margenstern"}, {"authorId": "67152907", "name": + "L. Pavlotska\u00efa"}]}, {"paperId": "c06c00a8ec6f755d3e6572fb1d61d0b361ecac69", + "externalIds": {"DBLP": "phd/us/Kadin88", "MAG": "646798825", "CorpusId": + 118778526}, "corpusId": 118778526, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c06c00a8ec6f755d3e6572fb1d61d0b361ecac69", "title": "Restricted Turing Reducibilities & the Structure of the Polynomial Time Hierarchy", "abstract": "The polynomial time many-one and Turing reducibilities, Karp and Cook reducibilities respectively, play a major role in computational @@ -53416,207 +61366,549 @@ interactions: related to the structure of the BH and to the issue of how deterministic polynomial time algorithms can access the information from NP oracles.", "venue": "", "year": 1988, "referenceCount": 0, "citationCount": 19, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "1988-06-01", "journal": {"name": "", "volume": ""}, + "authors": [{"authorId": "30743227", "name": "Jim Kadin"}]}, {"paperId": "c2d45e441c56b386108084da30afd35243f2a4d0", + "externalIds": {"MAG": "1524213922", "DOI": "10.5860/choice.43-2163", "CorpusId": + 60747050}, "corpusId": 60747050, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c2d45e441c56b386108084da30afd35243f2a4d0", + "title": "Alan Turing''s automatic computing engine : the master codebreaker''s + struggle to build the modern computer", "abstract": "Foreword Introduction + PART I: THE NATIONAL PHYSICAL LABORATORY AND THE ACE PROJECT A Century of + Measurement and Computation at the National Physical Laboratory, 1900-2000 + The Creation of the NPL Mathematics Division The Origins and Development of + the ACE Project The Pilot ACE at the National Physical Laboratory PART II: + TURING AND THE HISTORY OF COMPUTING The ACE and the Shaping of British Computing + Computer Architecture and the ACE Computers Turing and the Computer From Turing + Machine to \"Electronic Brain\" PART III: THE ACE COMPUTERS The Pilot ACE + Instruction Format Programming the Pilot ACE The Pilot ACE: from Concept to + Reality The DEUCE-a User''s View Applications of the Pilot ACE and the DEUCE + The ACE Test Assembly, the Pilot ACE, the Big ACE, and the Bendix G15 The + ACE Simulator and the Cybernetic Model The Pilot Model and the Big ACE on + the Web PART IV: ELECTRONICS How Valves Work Recollections of Early Vacuum + Tube Circuits Circuit Design of the Pilot ACE and the Big ACE PART V: TECHNICAL + REPORTS AND LECTURES ON THE ACE AND THE PILOT ACE, 1945-1951 Proposed Electronic + Calculator (1945) Notes on Memory (1945) The Turing-Wilkinson Lecture Series + (1946-1947) The State of the Art in Electronic Digital Computing in Britain + and the United States (1947)", "venue": "", "year": 2005, "referenceCount": + 0, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1988-06-01", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "30743227", "name": "Jim Kadin"}]}, {"paperId": "a567eace195096239120adf0b7c5f2d72df45a53", - "externalIds": {"DBLP": "conf/isaac/BeigelFS03", "MAG": "1501321263", "DOI": - "10.1137/S0097539704441630", "CorpusId": 12432255}, "url": "https://www.semanticscholar.org/paper/a567eace195096239120adf0b7c5f2d72df45a53", - "title": "Infinitely-Often Autoreducible Sets", "abstract": "A set A is autoreducible - if one can compute, for all x, the value A(x) by querying A only at places - y \u00ac= x. Furthermore, A is infinitely-often autoreducible if, for infinitely - many x, the value A(x) can be computed by querying A only at places y \u00ac= - x. For all other x, the computation outputs a special symbol to signal that - the reduction is undefined. It is shown that for polynomial time Turing and - truth-table autoreducibility. there are sets A, B, C in EXP such that A is - not infinitely-often Turing autoreducible, B is Turing autoreducible but not - infinitely-often truth-table autoreducible, C is truth-table autoreducible - with g(n) + 1 queries but not infinitely-often Turing autoreducible with g(n) - queries. Here n is the length of the input, g is nondecreasing and there exists - a polynomial p such that p(n) bounds both, the computation time and the value, - of g at input of length n. Furthermore, connections between notions of infinitely-often - autoreducibility and notions of approximability are investigated. The Hausdorff-dimension - of the class of sets which are not infinitely-often autoreducible is shown - to be 1.", "venue": "SIAM journal on computing (Print)", "year": 2003, "referenceCount": - 40, "citationCount": 16, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2003-12-15", "journal": {"pages": "98-107"}, "authors": - [{"authorId": "2516122", "name": "R. Beigel"}, {"authorId": "1691447", "name": - "L. Fortnow"}, {"authorId": "1699450", "name": "F. Stephan"}]}, {"paperId": - "f3636578f73f6fefa73fb6f6d73cda43a9b0ef04", "externalIds": {"MAG": "1545719867", - "DOI": "10.1007/978-3-322-84035-6", "CorpusId": 58822909}, "url": "https://www.semanticscholar.org/paper/f3636578f73f6fefa73fb6f6d73cda43a9b0ef04", + null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "118975427", + "name": "J. Copeland"}]}, {"paperId": "f831b80c00586d29bda35bb94f4fffb926de37b1", + "externalIds": {"MAG": "2116010227", "DOI": "10.1146/ANNUREV.PY.09.090171.001345", + "CorpusId": 86575097}, "corpusId": 86575097, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/f831b80c00586d29bda35bb94f4fffb926de37b1", + "title": "Interactions Between Nematodes and Fungi in Disease Complexes", + "abstract": "Nature does not work with pure cultures. I suspect that many + plant diseases are influenced by associated organisms to a much more profound + degree than we have yet realized, not only as to inhibition but also as to + acceleration of the process. It may be that a number of diseases require an + association of organisms for their occurrence and cannot be produced by infection + of one organism alone. Pure cul\u00ad tures we must, however, continue to + use as a basis for the known mixtures and as controls on the activity of the + mixtures. Research with mixtures of microorganisms will not furnish an excuse + for any less care than with pure cultures in excluding organisms foreign to + the mixtures. Work with mixtures, however, will not make the already complex + problems of plant pathology as a whole any easier or less complex but it may + throw much light on certain relationships which will never be discovered by + the use of pure cultures of single organisms (23).", "venue": "", "year": + 1971, "referenceCount": 7, "citationCount": 211, "influentialCitationCount": + 6, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Medicine", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "1971-09-01", "journal": {"name": "Annual Review of Phytopathology", "pages": + "253-274", "volume": "9"}, "authors": [{"authorId": "144172581", "name": "N. + Powell"}]}, {"paperId": "9603f988ee3d096c6a892b6d325781236e5e2b28", "externalIds": + {"DBLP": "journals/mima/Cleland01", "MAG": "1589227155", "DOI": "10.1023/A:1011251504223", + "CorpusId": 43358211}, "corpusId": 43358211, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/9603f988ee3d096c6a892b6d325781236e5e2b28", + "title": "Recipes, Algorithms, and Programs", "abstract": null, "venue": "Minds + and Machines", "year": 2001, "referenceCount": 10, "citationCount": 21, "influentialCitationCount": + 3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2001-05-01", "journal": + {"name": "Minds and Machines", "pages": "219-237", "volume": "11"}, "authors": + [{"authorId": "32624486", "name": "Carol E. Cleland"}]}, {"paperId": "26bb46a641085b82b85fd0d3eec378c87519ed83", + "externalIds": {"MAG": "2099086772", "DOI": "10.1105/tpc.9.7.1109", "CorpusId": + 15257568, "PubMed": "9254933"}, "corpusId": 15257568, "publicationVenue": + {"id": "b7024fc9-ebcc-4403-8da1-d0d1f6f6fb24", "name": "The Plant Cell", "type": + "journal", "alternate_names": ["Plant Cell"], "issn": "1040-4651", "url": + "https://www.jstor.org/journal/plantcell", "alternate_urls": ["http://www.plantcell.org/", + "http://www.jstor.org/journals/10404651.html"]}, "url": "https://www.semanticscholar.org/paper/26bb46a641085b82b85fd0d3eec378c87519ed83", + "title": "Epidermal cell fate and patterning in leaves.", "abstract": "that + ma- ture differentiated cells are distributed in a characteristic pattern. + One of the simplest possible patterns in tissues is that in which a minimum + distance is maintained between dif- ferentiated cells in a two-dimensional + sheet of cells (Wolpert, 1971). Such a pattern could be created by several + different mechanisms. For example, the initial positioning of precur- sor + cells could be random within a field of equally compe- tent cells, with adjacent + cells subsequently prevented from assuming the precursor cell fate by lateral + inhibition. Alter- natively, a prepatterning could exist so that the selection + or placement of the precursor cells is nonrandom. Regardless of how precursor + cells are placed, the production of new cells from a precursor cell can also + contribute to the final spacing pattern (Sachs, 1978). Although the molecular + inter- actions guiding patterning are known for such model sys- tems as epidermal + bristle formation in Drosophila (Ghysen et al., 1993), little is known about + the nature of the intercellular signaling that establishes cell patterning + in plants (see Clark, 1997; Kerstetter and Hake, 1997; Laux and Jurgens, 1997; + McLean et al., 1997; Poethig, 1997; and Schiefelbein et al., 1997, in this + issue, for further discussion). The epidermis of plant leaves provides an + excellent", "venue": "The Plant Cell", "year": 1997, "referenceCount": 67, + "citationCount": 211, "influentialCitationCount": 9, "isOpenAccess": true, + "openAccessPdf": {"url": "http://www.plantcell.org/content/9/7/1109.full.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": + [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": + "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": + ["Review", "JournalArticle"], "publicationDate": "1997-07-01", "journal": + {"name": "The Plant cell", "pages": "1109 - 1120", "volume": "9"}, "authors": + [{"authorId": "37152652", "name": "J. Larkin"}, {"authorId": "39552018", "name": + "M. D. Marks"}, {"authorId": "48268842", "name": "J. Nadeau"}, {"authorId": + "30124994", "name": "F. Sack"}]}, {"paperId": "4ecc537aa8e3df7150c539dfbc14556aab2b9434", + "externalIds": {"MAG": "1968373540", "DOI": "10.1007/S00285-007-0071-0", "CorpusId": + 24567801, "PubMed": "17530255"}, "corpusId": 24567801, "publicationVenue": + {"id": "b63919f2-2979-428b-95ba-53029f49a7df", "name": "Journal of Mathematical + Biology", "type": "journal", "alternate_names": ["J Math Biology"], "issn": + "0303-6812", "url": "http://www.springer.com/math/biology/journal/285", "alternate_urls": + ["https://www.springer.com/mathematics/mathematical+biology/journal/285", + "https://link.springer.com/journal/285", "http://www.springer.com/mathematics/mathematical+biology/journal/285"]}, + "url": "https://www.semanticscholar.org/paper/4ecc537aa8e3df7150c539dfbc14556aab2b9434", + "title": "Soliton behaviour in a bistable reaction diffusion model", "abstract": + null, "venue": "Journal of Mathematical Biology", "year": 2007, "referenceCount": + 15, "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Medicine", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "2007-02-15", "journal": + {"name": "Journal of Mathematical Biology", "pages": "797-813", "volume": + "54"}, "authors": [{"authorId": "70988914", "name": "C. Varea"}, {"authorId": + "146499011", "name": "D. Hern\u00e1ndez"}, {"authorId": "37747895", "name": + "R. Barrio"}]}, {"paperId": "f3636578f73f6fefa73fb6f6d73cda43a9b0ef04", "externalIds": + {"MAG": "1545719867", "DOI": "10.1007/978-3-322-84035-6", "CorpusId": 58822909}, + "corpusId": 58822909, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f3636578f73f6fefa73fb6f6d73cda43a9b0ef04", "title": "Optimization Theory and Applications", "abstract": null, "venue": "", "year": 1984, "referenceCount": 0, "citationCount": 40, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 2, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm%3A978-3-322-84035-6%2F1", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "80996530", - "name": "J. Werner"}]}, {"paperId": "dd0c90a48d21fe38c4f1e66f1a34a5261ec339a7", - "externalIds": {"DBLP": "conf/coco/MerkleS07", "MAG": "2196265990", "DOI": - "10.1109/CCC.2007.17", "CorpusId": 16920391}, "url": "https://www.semanticscholar.org/paper/dd0c90a48d21fe38c4f1e66f1a34a5261ec339a7", - "title": "On C-Degrees, H-Degrees and T-Degrees", "abstract": "Following a - line of research that aims at relating the computation power and the initial - segment complexity of a set, the work presented here investigates into the - relations between Turing reducibility, defined in terms of computation power, - and C-reducibility and H-reducibility, defined in terms of the complexity - of initial segments. The global structures of all C-degrees and of all H-degrees - are rich and allows to embed the lattice of the powerset of the natural numbers - under inclusion. In particular, there are C-degrees, as well as H-degrees, - that are different from the least degree and are the meet of two other degrees, - whereas on the other hand there are pairs of sets that have a meet neither - in the C-degrees nor in the H-degrees; these results answer questions in a - survey by Nies and Miller. There are r.e. sets that form a minimal pair for - C-reducibility and Sigma2 0 sets that form a minimal pair for H-reducibility, - which answers questions by Downey and Hirschfeldt. Furthermore, the following - facts on the relation between C-degrees, H-degrees and Turing degrees hold. - Every C-degree contains at most one Turing degree and this bound is sharp - since there are C-degrees that do contain a Turing degree. For the comprising - class of complex sets, neither the C-degree nor the H-degree of such a set - can contain a Turing degree, in fact, the Turing degree of any complex set - contains infinitely many C-degrees. Similarly the Turing degree of any set - that computes the halting problem contains infinitely many H-degrees, while - the H-degree of any 2-random set R is never contained in the Turing degree - of R. By the latter, H-equivalence of Martin-Lof random sets does not imply - their Turing equivalence. The structure of the Cdegrees contained in the Turing - degree of a complex sets is rich and allows to embed any countable distributive - lattice; a corresponding statement is true for the structure of H-degrees - that are contained in the Turing degree of a set that computes the halting - problem.", "venue": "Cybersecurity and Cyberforensics Conference", "year": - 2007, "referenceCount": 31, "citationCount": 11, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics", "Computer Science"], - "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": - "Computer Science", "source": "external"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference", - "Review"], "publicationDate": "2007-06-13", "journal": {"name": "Twenty-Second - Annual IEEE Conference on Computational Complexity (CCC''07)", "pages": "60-69"}, - "authors": [{"authorId": "1691379", "name": "W. Merkle"}, {"authorId": "1699450", - "name": "F. Stephan"}]}, {"paperId": "84d7712de858d9a324e39c9a06007947cfb1bd2f", - "externalIds": {"ArXiv": "1205.5685", "MAG": "2006518037", "DOI": "10.1209/0295-5075/98/64001", - "CorpusId": 119077751}, "url": "https://www.semanticscholar.org/paper/84d7712de858d9a324e39c9a06007947cfb1bd2f", - "title": "Turbulent patterns in wall-bounded flows: A Turing instability?", - "abstract": "In their way to/from turbulence, plane wall-bounded flows display - an interesting transitional regime where laminar and turbulent oblique bands - alternate, the origin of which is still mysterious. In line with Barkley''s - recent work about the pipe flow transition involving reaction-diffusion concepts, - we consider plane Couette flow in the same perspective and transform Waleffe''s - classical four-variable model of self-sustaining process into a reaction-diffusion - model. We show that, upon fulfillment of a condition on the relative diffusivities - of its variables, the featureless turbulent regime becomes unstable against - patterning as the result of a Turing instability. A reduced two-variable model - helps us to delineate the appropriate region of parameter space. An intrinsic - status is therefore given to the pattern''s wavelength for the first time. - Virtues and limitations of the model are discussed, calling for a microscopic - support of the phenomenological approach.", "venue": "", "year": 2012, "referenceCount": - 6, "citationCount": 19, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2012-05-25", "journal": {"name": - "EPL (Europhysics Letters)", "pages": "64001", "volume": "98"}, "authors": - [{"authorId": "2417178", "name": "P. Manneville"}]}, {"paperId": "275a52e3bce9136993ad9b9657630c95a2d938ec", - "externalIds": {"MAG": "2530123397", "DOI": "10.1002/9781119237150", "CorpusId": - 125937329}, "url": "https://www.semanticscholar.org/paper/275a52e3bce9136993ad9b9657630c95a2d938ec", - "title": "Statistical Implications of Turing''s Formula", "abstract": null, - "venue": "", "year": 2016, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}], "publicationTypes": null, - "publicationDate": "2016-11-21", "journal": {"name": "", "volume": ""}, "authors": - [{"authorId": "2117992514", "name": "Zhiyi Zhang"}]}, {"paperId": "dae4edfe5b09747bdd9c5bb864ba851623fcac06", - "externalIds": {"MAG": "111581077", "DOI": "10.1007/978-4-431-65958-7_3", - "CorpusId": 59749668}, "url": "https://www.semanticscholar.org/paper/dae4edfe5b09747bdd9c5bb864ba851623fcac06", + "name": "J. Werner"}]}, {"paperId": "7eb77f56ea3609820627c90036e4c7651dff4bda", + "externalIds": {"DBLP": "journals/trob/SongG18", "MAG": "2790223694", "DOI": + "10.1109/TRO.2017.2780259", "CorpusId": 4953256}, "corpusId": 4953256, "publicationVenue": + {"id": "2aa2a52c-3e35-4bed-8edf-5dc99550883a", "name": "IEEE Transactions + on robotics", "type": "journal", "alternate_names": ["IEEE Trans robot", "IEEE + Trans Robot", "IEEE Transactions on Robotics"], "issn": "1552-3098", "url": + "http://ieeexplore.ieee.org/servlet/opac?punumber=8860", "alternate_urls": + ["https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8860"]}, "url": + "https://www.semanticscholar.org/paper/7eb77f56ea3609820627c90036e4c7651dff4bda", + "title": "$\\varepsilon ^{\\star }$: An Online Coverage Path Planning Algorithm", + "abstract": "This paper presents an algorithm called $\\varepsilon ^{\\star }$ , + for online coverage path planning of unknown environment. The algorithm is + built upon the concept of an Exploratory Turing Machine (ETM), which acts + as a supervisor to the autonomous vehicle to guide it with adaptive navigation + commands. The ETM generates a coverage path online using Multiscale Adaptive + Potential Surfaces (MAPS), which are hierarchically structured and dynamically + updated based on sensor information. The $\\varepsilon + ^{\\star }$-algorithm is computationally efficient, + guarantees complete coverage, and does not suffer from the local extrema problem. + Its performance is validated by 1) high-fidelity simulations on Player/Stage + and 2) actual experiments in a laboratory setting on autonomous vehicles.", + "venue": "IEEE Transactions on robotics", "year": 2018, "referenceCount": + 27, "citationCount": 45, "influentialCitationCount": 1, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2018-02-08", "journal": {"name": "IEEE Transactions on + Robotics", "pages": "526-533", "volume": "34"}, "authors": [{"authorId": "2735332", + "name": "Junnan Song"}, {"authorId": "2118927378", "name": "Shalabh Gupta"}]}, + {"paperId": "dae4edfe5b09747bdd9c5bb864ba851623fcac06", "externalIds": {"MAG": + "111581077", "DOI": "10.1007/978-4-431-65958-7_3", "CorpusId": 59749668}, + "corpusId": 59749668, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/dae4edfe5b09747bdd9c5bb864ba851623fcac06", "title": "Alan Turing and \u201cThe Chemical Basis of Morphogenesis\u201d", "abstract": null, "venue": "", "year": 2003, "referenceCount": 22, "citationCount": - 8, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": {"name": "", - "pages": "33-44", "volume": ""}, "authors": [{"authorId": "5586275", "name": - "V. Nanjundiah"}]}, {"paperId": "4ecc537aa8e3df7150c539dfbc14556aab2b9434", - "externalIds": {"MAG": "1968373540", "DOI": "10.1007/S00285-007-0071-0", "CorpusId": - 24567801, "PubMed": "17530255"}, "url": "https://www.semanticscholar.org/paper/4ecc537aa8e3df7150c539dfbc14556aab2b9434", - "title": "Soliton behaviour in a bistable reaction diffusion model", "abstract": - null, "venue": "Journal of Mathematical Biology", "year": 2007, "referenceCount": - 15, "citationCount": 22, "influentialCitationCount": 1, "isOpenAccess": false, - "fieldsOfStudy": ["Mathematics", "Medicine"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2007-02-15", "journal": {"name": "Journal of Mathematical - Biology", "pages": "797-813", "volume": "54"}, "authors": [{"authorId": "70988914", - "name": "C. Varea"}, {"authorId": "146499011", "name": "D. Hern\u00e1ndez"}, - {"authorId": "37747895", "name": "R. Barrio"}]}, {"paperId": "7b44ab76e6979f6ffe6f0ec046a8e147282753b5", - "externalIds": {"MAG": "2478728891", "DOI": "10.1007/BFB0089200", "CorpusId": - 45524397}, "url": "https://www.semanticscholar.org/paper/7b44ab76e6979f6ffe6f0ec046a8e147282753b5", - "title": "Mathematical Research Today and Tomorrow", "abstract": null, "venue": - "", "year": 1992, "referenceCount": 12, "citationCount": 16, "influentialCitationCount": - 2, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 8, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}, {"category": "Philosophy", "source": + "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": + {"name": "", "pages": "33-44", "volume": ""}, "authors": [{"authorId": "5586275", + "name": "V. Nanjundiah"}]}, {"paperId": "067d97b6d6cfca8b8a1f893367c62a5a0f3974f1", + "externalIds": {"MAG": "2293930388", "CorpusId": 61640713}, "corpusId": 61640713, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/067d97b6d6cfca8b8a1f893367c62a5a0f3974f1", + "title": "The universal Turing machine (2nd ed.): a half-century survey", + "abstract": null, "venue": "", "year": 1995, "referenceCount": 0, "citationCount": + 24, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["Review"], + "publicationDate": "1995-01-02", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "6259065", "name": "R. Herken"}]}, {"paperId": "a250fc3050027849692e262d374457d92d3bb36c", + "externalIds": {"MAG": "2539931802", "DBLP": "conf/focs/Fischer63", "DOI": + "10.1109/SWCT.1963.10", "CorpusId": 206585336}, "corpusId": 206585336, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/a250fc3050027849692e262d374457d92d3bb36c", + "title": "On computability by certain classes of restricted Turing machines", + "abstract": "The theory of abstract machines has been well developed for the + finite automaton [RS] and the Turing machine [D]. More recently, machines + intermediate in computing power between the above two classes of machines + have been investigated. These machines have some form of unbounded memory, + thus giving them more potential computing ability than the finite automata, + but the access to the unbounded memory is restricted in some way so that they + do not have the full power of a Turing machine. The two forms of restricted + unbounded memory we shall consider here are the counter and the pushdown store.", + "venue": "SWCT", "year": 1963, "referenceCount": 5, "citationCount": 15, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], + "publicationTypes": ["JournalArticle"], "publicationDate": "1963-10-28", "journal": + {"pages": "23-32"}, "authors": [{"authorId": "1691253", "name": "P. C. Fischer"}]}, + {"paperId": "20c2cc2abbb1ac9b8f5d58332468dcce6faf0179", "externalIds": {"MAG": + "593628944", "CorpusId": 117809290}, "corpusId": 117809290, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/20c2cc2abbb1ac9b8f5d58332468dcce6faf0179", + "title": "Quantum Computing Devices: Principles, Designs, and Analysis", "abstract": + "Preface FOUNDATIONS OF QUANTUM INFORMATICS Spins: The Stern-Gerlach experiment + and spin filter EPR, Bell''s inequalities, and hidden variables The Landauer + principle QUANTUM COMPUTATION AND QUANTUM SYSTEMS Turing machines and binary + logic gates Quantum mechanical systems Hilbert spaces Complex finite dimensional + Hilbert Spaces Quantum Turing machines Universality of elementary quantum + gates Quantum algorithms Quantum adder and multiplier Quantum error correction + codes Lasers: a heuristic introduction Quantum computing devices and requirements + TWO-LEVEL ATOMS AND CAVITY QED Two-level atoms Quantization of the electromagnetic + field Cavity QED Cavity QED for the quantum phase gate Quantum eraser Quantum + disentanglement eraser IMPERFECT QUANTUM OPERATIONS Fidelity Density matrices + Time evolution of density matrices Examples of master equations Fidelity calculations + ION TRAPS Introduction Ion qubits Summary of ion preparation Coherence Quantum + gates Large scale confined-ion quantum computer Trap architecture and performance + Teleportation of coherent information Experimental DFS logic gates Quantum + error correction by ion traps Summary of ion quantum computation QUANTUM LOGIC + USING COLD, CONFINED ATOMS Introduction Atom trapping and detection Atom interactions + with external fields Atom trapping Qubits and gates Controlled two-qubit gates + Coherence properties of atom gates Assessment QUANTUM DOTS QUANTUM COMPUTING + GATES Introduction Electrons in quantum dots microcavity Coupled electron + spins Biexciton in a single quantum dot Conclusions LINEAR OPTICS COMPUTERS + Classical electrodynamics - Classical computers Quantum electrodynamics - + Quantum computers Teleportation Summary and outlook SUPERCONDUCTING QUANTUM + COMPUTING DEVICES Introduction Superconductivity More on Cooper pairs and + Josephson junctions Superconducting circuits: classical Superconducting circuits: + quantum Quantum gates Measurement NMR QUANTUM COMPUTING Nuclear magnetic resonance + Basic technology with NMR Solid state NMR Shor''s algorithm and its experimental + realization Quantum algorithm for lattice-gas systems Conclusion Appendix + A: The Fock-Darwin States Appendix B: Evaluation of the exchange energy Appendix + C: Transformation of quantum states: SU(2) and SO(3) Appendix D: The Homeomorphism + from SU(2) to SO(3)", "venue": "", "year": 2006, "referenceCount": 0, "citationCount": + 61, "influentialCitationCount": 4, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2006-09-18", "journal": {"name": + "", "volume": ""}, "authors": [{"authorId": "114376263", "name": "B. Englert"}, + {"authorId": "14255752", "name": "B. Rohwedder"}, {"authorId": "33260240", + "name": "M. Scully"}, {"authorId": "2116717926", "name": "Goong Chen"}]}, + {"paperId": "41fde410ece270dfeff67873f28ae7f61e99a283", "externalIds": {"DBLP": + "conf/coordination/BusiGZ97", "MAG": "1503984881", "DOI": "10.1007/3-540-63383-9_82", + "CorpusId": 17519724}, "corpusId": 17519724, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/41fde410ece270dfeff67873f28ae7f61e99a283", + "title": "Three Semantics of the Output Operation for Generative Communication", + "abstract": null, "venue": "COORDINATION", "year": 1997, "referenceCount": + 21, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - null, "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "11996904", - "name": "C. Casacuberta"}, {"authorId": "98847781", "name": "M. Castellet"}]}, - {"paperId": "9603f988ee3d096c6a892b6d325781236e5e2b28", "externalIds": {"DBLP": - "journals/mima/Cleland01", "MAG": "1589227155", "DOI": "10.1023/A:1011251504223", - "CorpusId": 43358211}, "url": "https://www.semanticscholar.org/paper/9603f988ee3d096c6a892b6d325781236e5e2b28", - "title": "Recipes, Algorithms, and Programs", "abstract": null, "venue": "Minds - and Machines", "year": 2001, "referenceCount": 10, "citationCount": 21, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1997-09-01", "journal": {"pages": "205-219"}, "authors": + [{"authorId": "1789091", "name": "N. Busi"}, {"authorId": "1743074", "name": + "R. Gorrieri"}, {"authorId": "1777352", "name": "G. Zavattaro"}]}]} + + ' + headers: + Access-Control-Allow-Origin: + - '*' + Connection: + - keep-alive + Content-Length: + - '199238' + Content-Type: + - application/json + Date: + - Tue, 03 Jan 2023 20:53:25 GMT + Via: + - 1.1 632fca25fb23eb290b1185f0792b2a5e.cloudfront.net (CloudFront) + X-Amz-Cf-Id: + - II80V0UedC5pDgCFi8mXPdnBOC3tyqu7YeFBECY5pvfz8r4QEHdV7g== + X-Amz-Cf-Pop: + - GRU3-P1 + X-Cache: + - Miss from cloudfront + x-amz-apigw-id: + - eLxW4G3ivHcFfPw= + x-amzn-Remapped-Connection: + - keep-alive + x-amzn-Remapped-Content-Length: + - '199238' + x-amzn-Remapped-Date: + - Tue, 03 Jan 2023 20:53:25 GMT + x-amzn-Remapped-Server: + - gunicorn + x-amzn-RequestId: + - e20f093d-219b-4fec-90cd-5733ab51c3dc + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + User-Agent: + - python-requests/2.28.1 + method: GET + uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,corpusId,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,openAccessPdf,paperId,publicationDate,publicationTypes,publicationVenue,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2600&limit=100 + response: + body: + string: '{"total": 65730, "offset": 2600, "next": 2700, "data": [{"paperId": + "067d97b6d6cfca8b8a1f893367c62a5a0f3974f1", "externalIds": {"MAG": "2293930388", + "CorpusId": 61640713}, "corpusId": 61640713, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/067d97b6d6cfca8b8a1f893367c62a5a0f3974f1", + "title": "The universal Turing machine (2nd ed.): a half-century survey", + "abstract": null, "venue": "", "year": 1995, "referenceCount": 0, "citationCount": + 24, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": + "Computer Science", "source": "external"}], "publicationTypes": ["Review"], + "publicationDate": "1995-01-02", "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "6259065", "name": "R. Herken"}]}, {"paperId": "41fde410ece270dfeff67873f28ae7f61e99a283", + "externalIds": {"DBLP": "conf/coordination/BusiGZ97", "MAG": "1503984881", + "DOI": "10.1007/3-540-63383-9_82", "CorpusId": 17519724}, "corpusId": 17519724, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/41fde410ece270dfeff67873f28ae7f61e99a283", + "title": "Three Semantics of the Output Operation for Generative Communication", + "abstract": null, "venue": "COORDINATION", "year": 1997, "referenceCount": + 21, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2001-05-01", "journal": {"name": "Minds and Machines", - "pages": "219-237", "volume": "11"}, "authors": [{"authorId": "32624486", - "name": "Carol E. Cleland"}]}, {"paperId": "9fb38c850c47af13ec10144b7fa32dbc13a1ccd0", - "externalIds": {"MAG": "2464153967", "CorpusId": 59095692}, "url": "https://www.semanticscholar.org/paper/9fb38c850c47af13ec10144b7fa32dbc13a1ccd0", - "title": "Deux machines de Turing universelles \u00e0 au plus deux instructions - gauches", "abstract": "On construit une machine de Turing universelle sur - l''alphabet {0, 1} dont le programme contient exactement deux instructions - de mouvement gauche et une machine de Turing universelle sur l''alphabet {0, - 1, 2} dont le programme contient une unique instruction de mouvement gauche", - "venue": "", "year": 1995, "referenceCount": 0, "citationCount": 12, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "pages": "1395-1400", - "volume": "320"}, "authors": [{"authorId": "2072467297", "name": "M. Margenstern"}, - {"authorId": "67152907", "name": "L. Pavlotska\u00efa"}]}, {"paperId": "d266aac357faca7444a9646591499b165aadca61", - "externalIds": {"MAG": "2007059989", "DBLP": "journals/isci/ItoIT88", "DOI": - "10.1016/0020-0255(88)90005-9", "CorpusId": 32461234}, "url": "https://www.semanticscholar.org/paper/d266aac357faca7444a9646591499b165aadca61", - "title": "A note on three-way two-dimensional alternating Turing machines", - "abstract": null, "venue": "Information Sciences", "year": 1988, "referenceCount": - 9, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Business", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "1988-06-01", "journal": {"name": "Inf. - Sci.", "pages": "1-22", "volume": "45"}, "authors": [{"authorId": "1871564", - "name": "A. Ito"}, {"authorId": "1737209", "name": "Katsushi Inoue"}, {"authorId": - "2339053", "name": "I. Takanami"}]}, {"paperId": "95727328e579428796cd0d3fe5d727f2b0d34e57", - "externalIds": {"MAG": "2067232297", "DOI": "10.1016/J.PHYSD.2012.02.007", - "CorpusId": 123313161}, "url": "https://www.semanticscholar.org/paper/95727328e579428796cd0d3fe5d727f2b0d34e57", - "title": "Localized Turing patterns in nonlinear optical cavities", "abstract": - null, "venue": "", "year": 2012, "referenceCount": 68, "citationCount": 16, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], + "publicationDate": "1997-09-01", "journal": {"pages": "205-219"}, "authors": + [{"authorId": "1789091", "name": "N. Busi"}, {"authorId": "1743074", "name": + "R. Gorrieri"}, {"authorId": "1777352", "name": "G. Zavattaro"}]}, {"paperId": + "189655463a0f811a7e67bda71e5d82aa52d8f515", "externalIds": {"CorpusId": 15806331}, + "corpusId": 15806331, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/189655463a0f811a7e67bda71e5d82aa52d8f515", + "title": "A QUARTERLY REVIEW OF PSYCHOLOGY AND PHILOSOPHY Universal Turing + Machine", "abstract": "Peer-to-peer modalities and evolutionary programming + have garnered limited interest from both cryptographers and electrical engineers + in the last several years. Given the current status of signed technology, + electrical engineers urgently desire the refinement of simulated annealing, + which embodies the key principles of complexity theory. Our focus in this + paper is not on whether symmetric encryption [54], [58], [59], [62], [62], + [68], [70], [95], [95], [99], [114], [148], [152], [168], [179], [179], [179], + [188], [188], [191] can be made stable, client-server, and perfect, but rather + on describing a solution for evolutionary programming (Senor).", "venue": + "", "year": 2011, "referenceCount": 250, "citationCount": 22, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + ["Review"], "publicationDate": null, "journal": null, "authors": []}, {"paperId": + "505089663ba7a69fa89e219457c3dedf12d6d410", "externalIds": {"DBLP": "books/daglib/0040378", + "MAG": "2291353394", "DOI": "10.1515/9783110275643", "CorpusId": 10142692}, + "corpusId": 10142692, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/505089663ba7a69fa89e219457c3dedf12d6d410", + "title": "Recursion Theory - Computational Aspects of Definability", "abstract": + "This monograph presents recursion theory from a generalized and largely global + point of view. A major theme is the study of the structures of degrees arising + from two key notions of reducibility, the Turing degrees and the hyperdegrees, + using ideas and techniques beyond those of classical recursion theory. These + include structure theory, hyperarithmetic determinacy and rigidity, basis + theorems, independence results on Turing degrees, as well as applications + to higher randomness.", "venue": "de Gruyter series in logic and its applications", + "year": 2015, "referenceCount": 63, "citationCount": 14, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": "2015-08-17", "journal": {"pages": "I-XIII, 1-306", + "volume": "8"}, "authors": [{"authorId": "34580700", "name": "C. Chong"}, + {"authorId": "2804470", "name": "Liang Yu"}]}, {"paperId": "e1797eced426d8f8f7a828e4b779a4eef3cc3824", + "externalIds": {"MAG": "2098009214", "DOI": "10.1016/J.PHYSD.2012.05.002", + "CorpusId": 46075411}, "corpusId": 46075411, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/e1797eced426d8f8f7a828e4b779a4eef3cc3824", + "title": "The Turing bifurcation in network systems: Collective patterns and + single differentiated nodes", "abstract": null, "venue": "", "year": 2012, + "referenceCount": 20, "citationCount": 48, "influentialCitationCount": 2, + "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2012-05-15", "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": - "939-946", "volume": "241"}, "authors": [{"authorId": "6840000", "name": "G. - Kozyreff"}]}, {"paperId": "5409dc8fa1564b3381b765e2f5592e0338f8e765", "externalIds": - {"MAG": "617841776", "DOI": "10.5860/choice.50-0327", "CorpusId": 118771753}, - "url": "https://www.semanticscholar.org/paper/5409dc8fa1564b3381b765e2f5592e0338f8e765", - "title": "Goedel''s Way: Exploits into an undecidable world", "abstract": - "1. Goedel, Turing 2. Complexity, Randomness 3. A List of Problems and Weird - Spacetimes 4. The Halting Function and its Avatars 5. Entropy, P vs. NP 6. - Forays into Uncharted Landscapes Envoi: On Eternity and Beyond", "venue": - "", "year": 2011, "referenceCount": 0, "citationCount": 20, "influentialCitationCount": - 2, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2011-10-13", "journal": {"name": "", "volume": ""}, "authors": [{"authorId": - "1756533", "name": "G. Chaitin"}, {"authorId": "88282231", "name": "F. Doria"}, - {"authorId": "83446915", "name": "N. Costa"}]}, {"paperId": "67a2952f8437defdee65bf8ae6bb8865d53cdc1c", + "2012-08-15", "journal": {"name": "Physica D: Nonlinear Phenomena", "pages": + "1351-1357", "volume": "241"}, "authors": [{"authorId": "34223041", "name": + "M. Wolfrum"}]}, {"paperId": "ba2791bc0ad1cd43f7a5ce33a0ac45b2dc901ca1", "externalIds": + {"ArXiv": "1008.0737", "MAG": "2001645902", "DOI": "10.1073/pnas.162369099", + "CorpusId": 6987977, "PubMed": "12186973"}, "corpusId": 6987977, "publicationVenue": + {"id": "bb95bf2e-8383-4748-bf9d-d6906d091085", "name": "Proceedings of the + National Academy of Sciences of the United States of America", "type": "journal", + "alternate_names": ["Proc National Acad Sci u s Am"], "issn": "0027-8424", + "url": "https://www.jstor.org/journal/procnatiacadscie", "alternate_urls": + ["https://www.pnas.org/", "http://www.jstor.org/journals/00278424.html", "http://www.pnas.org/"]}, + "url": "https://www.semanticscholar.org/paper/ba2791bc0ad1cd43f7a5ce33a0ac45b2dc901ca1", + "title": "Protein\u2013DNA computation by stochastic assembly cascade", "abstract": + "The assembly of RecA on single-stranded DNA is measured and interpreted as + a stochastic finite-state machine that is able to discriminate fine differences + between sequences, a basic computational operation. RecA filaments efficiently + scan DNA sequence through a cascade of random nucleation and disassembly events + that is mechanistically similar to the dynamic instability of microtubules. + This iterative cascade is a multistage kinetic proofreading process that amplifies + minute differences, even a single base change. Our measurements suggest that + this stochastic Turing-like machine can compute certain integral transforms.", + "venue": "Proceedings of the National Academy of Sciences of the United States + of America", "year": 2002, "referenceCount": 34, "citationCount": 44, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://europepmc.org/articles/pmc129313?pdf=render", + "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Physics", "Biology", + "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, + {"category": "Physics", "source": "external"}, {"category": "Biology", "source": + "external"}, {"category": "Medicine", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "2002-08-19", "journal": {"name": "Proceedings of the National + Academy of Sciences of the United States of America", "pages": "11589 - 11592", + "volume": "99"}, "authors": [{"authorId": "1404926731", "name": "R. Bar-Ziv"}, + {"authorId": "1953377", "name": "T. Tlusty"}, {"authorId": "3366192", "name": + "A. Libchaber"}]}, {"paperId": "709492e5cb53175ecc09f16f2ee7b09ee78c1420", + "externalIds": {"MAG": "2285074506", "CorpusId": 155718289}, "corpusId": 155718289, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/709492e5cb53175ecc09f16f2ee7b09ee78c1420", + "title": "Intersectoral Terms of Trade and Marketed Surplus of Agricultural + Produce, 1951-52 to 1965-66", "abstract": "\ufeffDuring the period of the + first three five-year Plans, all prices received and paid by agriculture show- + ed an upward trend, though at differential rates. In general, prices received + by agriculture rose at a faster annual rate than those paid by agriculture, + and yet the consequent secular improvement in favour of agriatl- ture in the + net barter terms of trade was marginal.", "venue": "", "year": 1969, "referenceCount": + 0, "citationCount": 27, "influentialCitationCount": 3, "isOpenAccess": false, + "openAccessPdf": null, "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": + [{"category": "Economics", "source": "external"}, {"category": "Economics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1969-06-28", + "journal": {"name": "Economic and Political Weekly", "volume": "4"}, "authors": + [{"authorId": "123198444", "name": "B. Thamarajakshi"}]}, {"paperId": "df996b59c2e737dad42db0ab964b5c73df753e6a", + "externalIds": {"CorpusId": 18935097}, "corpusId": 18935097, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/df996b59c2e737dad42db0ab964b5c73df753e6a", + "title": "Evolving Neural Turing Machines!", "abstract": "Instead of training + a Neural Turing Machine (NTM) with gradient descent [1], in this work NTMs + are trained through an evolutionary algorithm. Preliminary results suggest + that this setup can greatly simplify the neural model, generalizes better, + and does not require accessing the entire memory content at each time-step. + We show preliminary results on a simple copy and T-Maze learning task.", "venue": + "", "year": 2015, "referenceCount": 7, "citationCount": 9, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "s2-fos-model"}, {"category": + "Psychology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + null, "journal": null, "authors": [{"authorId": "3439774", "name": "R. Greve"}, + {"authorId": "1886166", "name": "E. Jacobsen"}]}, {"paperId": "09160fa7c5caa1f8c25099c4225a442382122efa", + "externalIds": {"MAG": "2184454547", "CorpusId": 138103053}, "corpusId": 138103053, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09160fa7c5caa1f8c25099c4225a442382122efa", + "title": "Towards nanostructuring with femtosecond laser pulses", "abstract": + "Detailed investigations of the possibilities for using femtosecond lasers + for the nanostructuring of metal layers and transparent materials are reported. + The aim is to develop a simple laser-based technology for fabricating two- + and three- dimensional nanostructures with structure sizes on the order of + several hundred nanometers. This is required for many ap- plications in photonics, + for the fabrication of photonic crys- tals and microoptical devices, for data + storage, displays, etc. Measurements of thermionic electron emission from + metal tar- gets, which provide valuable information on the dynamics of femtosecond + laser ablation, are discussed. Sub-wavelength mi- crostructuring of metals + is performed and the minimum struc- ture size that can be fabricated in transparent + materials is identified. Two-photon polymerization of hybrid polymers is demonstrated + as a promising femtosecond laser-based nanofab- rication technology.", "venue": + "", "year": 2003, "referenceCount": 0, "citationCount": 79, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Materials + Science"], "s2FieldsOfStudy": [{"category": "Materials Science", "source": + "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": + null, "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "93288835", "name": "L. Hannover"}]}, {"paperId": "09a5fb96d91dcd2bfda8f0a96e686882cbdffc90", + "externalIds": {"MAG": "2110300836", "CorpusId": 14262165}, "corpusId": 14262165, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/09a5fb96d91dcd2bfda8f0a96e686882cbdffc90", + "title": "Logical openness in cognitive models", "abstract": "It is here proposed + an analysis of symbolic and sub-symbolic models for studying cognitive processes, + centered on emergence and logical openness notions. The Theory of logical + openness connects the Physics of system/environment relationships to the system + informational structure. In this theory, cognitive models can be ordered according + to a hierarchy of complexity depending on their logical openness degree, and + their descriptive limits are correlated to Godel-Turing Theorems on formal + systems. The symbolic models with low logical openness describe cognition + by means of semantics which fix the system/environment relationship (cognition + in vitro), while the sub-symbolic ones with high logical openness tends to + seize its evolutive dynamics (cognition in vivo). An observer is defined as + a system with high logical openness. In conclusion, the characteristic processes + of intrinsic emergence typical of \u201cbio-logic\u201d - emerging of new + codes-require an alternative model to Turing-computation, the natural or bio-morphic + computation, whose essential features we are going here to outline.", "venue": + "", "year": 2008, "referenceCount": 33, "citationCount": 23, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": + "external"}, {"category": "Philosophy", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, + "publicationDate": null, "journal": {"name": "", "volume": ""}, "authors": + [{"authorId": "1720202", "name": "I. Licata"}]}, {"paperId": "15e83518381024ddccd31c01bff404dc13bcde76", + "externalIds": {"DBLP": "journals/ijhpca/CorteseB95", "MAG": "2004134826", + "DOI": "10.1177/109434209500900302", "CorpusId": 11379675}, "corpusId": 11379675, + "publicationVenue": {"id": "8ce575db-79d9-4601-83df-e1e96f6b4e3b", "name": + "The international journal of high performance computing applications", "type": + "journal", "alternate_names": ["int j high perform comput appl", "International + Journal of High Performance Computing Applications", "Int J High Perform Comput + Appl"], "issn": "1094-3420", "url": "http://www.sagepub.com/journals/Journal201339/title", + "alternate_urls": ["https://journals.sagepub.com/home/hpc"]}, "url": "https://www.semanticscholar.org/paper/15e83518381024ddccd31c01bff404dc13bcde76", + "title": "High Performance Spectral Simulation of Turbulent Flows in Massively + Parallel Machines With Distributed Memory", "abstract": "Here we have demonstrated + the possibility of very high performance in the implementation of a global + spectral methodology on a massively parallel architec ture with distributed + memory. Spectral simulations of channel flow and thermal convection in a three-dimen + sional Cartesian geometry have yielded a very high performance\u2014up to + 26 Gflops/s on a 512-node CM5. In general, implementation of spectral methodology + in parallel processors with distributed memory requires nonlocal interprocessor + data transfer that is not re stricted to being between nearest neighbors. + In spite of their increased communication overhead, better per formance is + possible in global methodologies owing to their dense matrix operations and + organized data com munication. In this paper we outline a general method ology + for the data-parallel implementation of spectral methods on massively parallel + machines with distrib uted memory. Following the steps presented here, very + high performance can be obtained on a wide vari ety of massively parallel + architectures.", "venue": "The international journal of high performance computing + applications", "year": 1995, "referenceCount": 32, "citationCount": 79, "influentialCitationCount": + 4, "isOpenAccess": true, "openAccessPdf": {"url": "https://www.ideals.illinois.edu/items/120339/bitstreams/394292/stream", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + [{"category": "Computer Science", "source": "external"}, {"category": "Computer + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], + "publicationDate": "1995-09-01", "journal": {"name": "International Journal + of High Performance Computing Applications", "pages": "187 - 204", "volume": + "9"}, "authors": [{"authorId": "48911677", "name": "T. Cortese"}, {"authorId": + "145012048", "name": "S. Balachandar"}]}, {"paperId": "e985d303d8b9ceb3ae7579e4578acc99ea4b7d41", + "externalIds": {"MAG": "2185292506", "DOI": "10.1111/1467-8322.12209", "CorpusId": + 146407334}, "corpusId": 146407334, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e985d303d8b9ceb3ae7579e4578acc99ea4b7d41", + "title": "Alan Turing: Artificial intelligence as human self\u2010knowledge", + "abstract": "This article explores the life and ideas of Alan Turing (1912\u20131954), + commonly known as the father of artificial intelligence (AI), and highlights + the process whereby the human self is reconceptualized in the development + of Turing''s ideas of machine intelligence. I will further illustrate how + this process of self-reconceptualization \u2013 composed of the pursuit, adaptation + and transformation of self-knowledge \u2013 is closely related to contemporary + digital life. In doing so, I wish to reveal the ways in which Turing''s underlying + self-transforming agenda of AI can contribute to our understanding of the + human self, for AI, as I will argue, leads to questions of existence and existential + anxieties.", "venue": "", "year": 2015, "referenceCount": 4, "citationCount": + 11, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": + null, "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", + "source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": "2015-12-01", "journal": {"name": + "Anthropology Today", "pages": "3-7", "volume": "31"}, "authors": [{"authorId": + "2100624475", "name": "T. Guo"}]}, {"paperId": "305e1623a3f28b2c83b57b8cbb0ba30f90e39207", + "externalIds": {"MAG": "632760068", "DOI": "10.1007/978-1-4613-3057-8", "CorpusId": + 106727403}, "corpusId": 106727403, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/305e1623a3f28b2c83b57b8cbb0ba30f90e39207", + "title": "Phase Transitions in Surface Films", "abstract": null, "venue": + "", "year": 1980, "referenceCount": 0, "citationCount": 202, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "https://link.springer.com/content/pdf/bfm:978-1-4613-3057-8/1?pdf=chapter%20toc", + "status": "GREEN"}, "fieldsOfStudy": ["Engineering"], "s2FieldsOfStudy": [{"category": + "Engineering", "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], + "publicationTypes": null, "publicationDate": null, "journal": {"name": "", + "volume": ""}, "authors": [{"authorId": "73472014", "name": "J. G. Dash"}, + {"authorId": "7917572", "name": "J. Ruvalds"}]}, {"paperId": "67a2952f8437defdee65bf8ae6bb8865d53cdc1c", "externalIds": {"MAG": "2071846104", "DOI": "10.1090/S0273-0979-1989-15750-9", - "CorpusId": 7758571}, "url": "https://www.semanticscholar.org/paper/67a2952f8437defdee65bf8ae6bb8865d53cdc1c", + "CorpusId": 7758571}, "corpusId": 7758571, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/67a2952f8437defdee65bf8ae6bb8865d53cdc1c", "title": "On a theory of computation and complexity over the real numbers: $NP$- completeness, recursive functions and universal machines", "abstract": "We present a model for computation over the reals or an arbitrary (ordered) @@ -53750,245 +62042,64 @@ interactions: theory of complex dynamical systems. We present them in some detail. EXAMPLE 1. Consider a complex polynomial map g : C \u2014\u2022 C. This map g will be considered as a", "venue": "", "year": 1989, "referenceCount": 59, "citationCount": - 1136, "influentialCitationCount": 82, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["Review"], "publicationDate": "1989-07-01", "journal": {"name": "Bulletin - of the American Mathematical Society", "pages": "1-46", "volume": "21"}, "authors": - [{"authorId": "40642563", "name": "L. Blum"}, {"authorId": "2331317", "name": - "M. Shub"}, {"authorId": "34911188", "name": "S. Smale"}]}, {"paperId": "5eeacf420b3f8484541ce9ea583006fa1fabc3bd", - "externalIds": {"MAG": "2490199397", "DOI": "10.1007/978-3-642-88162-6_6", - "CorpusId": 124156132}, "url": "https://www.semanticscholar.org/paper/5eeacf420b3f8484541ce9ea583006fa1fabc3bd", - "title": "Turing-Maschinen und zuf\u00e4llige 0\u20131-Folgen", "abstract": - null, "venue": "", "year": 1970, "referenceCount": 6, "citationCount": 14, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Physics"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}], "publicationTypes": - null, "publicationDate": null, "journal": {"name": "", "pages": "141-167", - "volume": ""}, "authors": [{"authorId": "2072651909", "name": "K. Jacobs"}]}, - {"paperId": "8399965d7006d70b8d3012e8d877ba1a14c9418c", "externalIds": {"MAG": - "2041833185", "DOI": "10.1110/PS.9.7.1395", "CorpusId": 36544351, "PubMed": - "10933506"}, "url": "https://www.semanticscholar.org/paper/8399965d7006d70b8d3012e8d877ba1a14c9418c", - "title": "Charge\u2013charge interactions influence the denatured state ensemble - and contribute to protein stability", "abstract": "Several recent studies - have shown that it is possible to increase protein stability by improving - electrostatic interactions among charged groups on the surface of the folded - protein. How\u2013ever, the stability increases are considerably smaller than - predicted by a simple Coulomb''s law calculation, and in some cases, a charge - reversal on the surface leads to a decrease in stability when an increase - was predicted. These results suggest that favorable charge\u2013charge interactions - are important in determining the dena\u2013tured state ensemble, and that - the free energy of the denatured state may be decreased more than that of - the native state by reversing the charge of a side chain. We suggest that - when the hydrophobic and hydrogen bonding interactions that stabilize the - folded state are disrupted, the unfolded polypeptide chain rearranges to com\u2013pact - conformations with favorable long\u2013range electrostatic inter\u2013actions. - These charge\u2013charge interactions in the denatured state will reduce the - net contribution of electrostatic interactions to protein stability and will - help determine the denatured state ensemble. To support this idea, we show - that the denatured state ensemble of ribonuclease Sa is considerably more - compact at pH 7 where fa\u2013vorable charge\u2013charge interactions are - possible than at pH 3, where unfavorable electrostatic repulsion among the - positive charges causes an expansion of the denatured state ensemble. Further - support is provided by studies of the ionic strength dependence of the sta\u2013bility - of charge\u2013reversal mutants of ribonuclease Sa. These results may have - important implications for the mechanism of protein folding.", "venue": "Protein - Science", "year": 2000, "referenceCount": 33, "citationCount": 211, "influentialCitationCount": - 3, "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Chemistry"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Chemistry", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Protein Science", "volume": "9"}, "authors": [{"authorId": "14382993", - "name": "C. Nick Pace"}, {"authorId": "38391788", "name": "R. W. Alston"}, - {"authorId": "50687392", "name": "K. Shaw"}]}, {"paperId": "510ff156834e92f0acb0c38a25f36cf15dc6eb64", - "externalIds": {"MAG": "1573617800", "DOI": "10.1088/1674-1056/20/7/074702", - "CorpusId": 117004325}, "url": "https://www.semanticscholar.org/paper/510ff156834e92f0acb0c38a25f36cf15dc6eb64", - "title": "Turing pattern selection in a reaction-diffusion epidemic model", - "abstract": "We present Turing pattern selection in a reaction-diffusion epidemic - model under zero-flux boundary conditions. The value of this study is twofold. - First, it establishes the amplitude equations for the excited modes, which - determines the stability of amplitudes towards uniform and inhomogeneous perturbations. - Second, it illustrates all five categories of Turing patterns close to the - onset of Turing bifurcation via numerical simulations which indicates that - the model dynamics exhibits complex pattern replication: on increasing the - control parameter \u03bd, the sequence \"H0 hexagons \u2192 H0-hexagon-stripe - mixtures \u2192 stripes \u2192 H\u03c0-hexagon-stripe mixtures \u2192 H\u03c0 - hexagons\" is observed. This may enrich the pattern dynamics in a diffusive - epidemic model.", "venue": "", "year": 2011, "referenceCount": 56, "citationCount": - 11, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2011-07-15", "journal": {"name": "Chinese Physics - B", "pages": "074702", "volume": "20"}, "authors": [{"authorId": "2100374034", - "name": "\u738b\u73ae\u660e"}, {"authorId": "103352250", "name": "\u5218\u539a\u4e1a"}, - {"authorId": "2099060215", "name": "\u8521\u6c38\u4e3d"}, {"authorId": "2096135607", - "name": "\u674e\u9547\u6e05"}]}, {"paperId": "df996b59c2e737dad42db0ab964b5c73df753e6a", - "externalIds": {"CorpusId": 18935097}, "url": "https://www.semanticscholar.org/paper/df996b59c2e737dad42db0ab964b5c73df753e6a", - "title": "Evolving Neural Turing Machines!", "abstract": "Instead of training - a Neural Turing Machine (NTM) with gradient descent [1], in this work NTMs - are trained through an evolutionary algorithm. Preliminary results suggest - that this setup can greatly simplify the neural model, generalizes better, - and does not require accessing the entire memory content at each time-step. - We show preliminary results on a simple copy and T-Maze learning task.", "venue": - "", "year": 2015, "referenceCount": 7, "citationCount": 9, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}, {"category": "Psychology", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "3439774", "name": "R. Greve"}, - {"authorId": "1886166", "name": "E. Jacobsen"}]}, {"paperId": "0735816e8740d2304a6238c3ce4b73c34b311458", - "externalIds": {"MAG": "2098723276", "DOI": "10.1177/1470595809335713", "CorpusId": - 145650385}, "url": "https://www.semanticscholar.org/paper/0735816e8740d2304a6238c3ce4b73c34b311458", - "title": "Editorial Cross Cultural Management in the Age of Globalization", - "abstract": "Globalization is reshaping our modes of thinking and ways of - behaving and foster-ing cultural change in societies. While some scholars - (cf. Harrison, 2006; Harrison and Huntington, 2000) may argue over a \u2018clash - of cultures\u2019, it seems just as relevant to focus on the ways in which - cultures may learn from each other, even inspire each other where the beauty - of cultural differences and cultur-al collisions is applauded (Fang, in press; - Soderberg and Holden, 2002). At the same time, some scholars argue that a - world cul-ture (Lechner and Boli, 2005) or global cul-ture (Arnett, 2002; - Bird and Stevens, 2003) is emerging and that it threatens the existence of - national cultures.This special section on \u2018Cross Cultural Management - in the Age of Globalization\u2019 aims at providing a forum to examine what - globalization means for cross cultural man-agement with a special focus on - the evolution of our understanding of national culture and cultural change. - We attempt to avoid a sim-plistic and sweeping \u2018either-or\u2019 debate - over convergence vs. divergence. Instead, we give importance to understanding - the paradoxi-cal and evolving conceptualizations of cul-tures and their implications - for cross cultural management theory and practice.To put the discussion into - perspective, it is useful to consider the changing trends in the cultural - research pantheon. In the 19th cen-tury, Sir Francis Galton first introduced - the problem of cultural group independence in his work on correlation. He - noted that cultural groups could not be considered truly independ-ent from - one another because the processes of cultural transfusion created relationships - that cannot be easily disentangled (Lindridge, 2005). Consequently, research - came to focus on cultures", "venue": "", "year": 2009, "referenceCount": 34, - "citationCount": 30, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", - "source": "external"}, {"category": "Sociology", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2009-07-30", "journal": {"name": - "International Journal of Cross Cultural Management", "pages": "139-143", - "volume": "9"}, "authors": [{"authorId": "72412642", "name": "A. Bird"}, {"authorId": - "144917621", "name": "T. Fang"}]}, {"paperId": "8c49acdf89ba042025c8e920ec2159653941b3ae", - "externalIds": {"MAG": "2054809938", "DOI": "10.1073/PNAS.60.1.258", "CorpusId": - 432041, "PubMed": "5241528"}, "url": "https://www.semanticscholar.org/paper/8c49acdf89ba042025c8e920ec2159653941b3ae", - "title": "The generation of antihapten antibodies with electrophoretically - homogeneous L chains.", "abstract": "Fig. 1B). To satisfy the second condition, - known amounts of I''25-labeled pure rabbit anti-DNP Ab (made against DNP-BGG) - were diluted into normal rabbit serum and this mix- ture was then put through - the entire procedure. From these control experiments, the capacity of the - DNP-Sephadex for anti-DNP Ab was determined, and it was demon- strated that - if the absorbent capacity was not exceeded, more than 90% of the Ab in an - antiserum sample could be removed.", "venue": "Proceedings of the National - Academy of Sciences of the United States of America", "year": 1968, "referenceCount": - 5, "citationCount": 33, "influentialCitationCount": 0, "isOpenAccess": true, - "fieldsOfStudy": ["Medicine", "Chemistry"], "s2FieldsOfStudy": [{"category": - "Medicine", "source": "external"}, {"category": "Chemistry", "source": "external"}, - {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1968-05-01", "journal": {"name": "Proceedings of the National - Academy of Sciences of the United States of America", "pages": "258 - 264", - "volume": "60"}, "authors": [{"authorId": "2097111049", "name": "L. Brenneman"}, - {"authorId": "145537259", "name": "S. Singer"}]}, {"paperId": "24f1be8074c0b32cec014739445621e71d4782a1", - "externalIds": {"MAG": "2009619481", "ArXiv": "1201.4063", "DOI": "10.1103/PhysRevLett.108.194101", - "CorpusId": 17906195, "PubMed": "23003043"}, "url": "https://www.semanticscholar.org/paper/24f1be8074c0b32cec014739445621e71d4782a1", - "title": "Hyperbolic chaos of Turing patterns.", "abstract": "We consider - time evolution of Turing patterns in an extended system governed by an equation - of the Swift-Hohenberg type, where due to an external periodic parameter modulation - longwave and shortwave patterns with length scales related as 1:3 emerge in - succession. We show theoretically and demonstrate numerically that the spatial - phases of the patterns, being observed stroboscopically, are governed by an - expanding circle map, so that the corresponding chaos of Turing patterns is - hyperbolic, associated with a strange attractor of the Smale-Williams solenoid - type. This chaos is shown to be robust with respect to variations of parameters - and boundary conditions.", "venue": "Physical review letters", "year": 2012, - "referenceCount": 25, "citationCount": 10, "influentialCitationCount": 0, - "isOpenAccess": true, "fieldsOfStudy": ["Medicine", "Physics"], "s2FieldsOfStudy": - [{"category": "Medicine", "source": "external"}, {"category": "Physics", "source": - "external"}, {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2012-01-19", "journal": {"name": "Physical - review letters", "pages": "\n 194101\n ", "volume": "108 19"}, - "authors": [{"authorId": "2849554", "name": "P. V. Kuptsov"}, {"authorId": - "34596490", "name": "S. Kuznetsov"}, {"authorId": "1731040", "name": "A. Pikovsky"}]}, - {"paperId": "ee68e4fd1d697f3cad5a3514630e7ddcc8431a23", "externalIds": {"ArXiv": - "math/0602439", "MAG": "2951015973", "DOI": "10.1090/S0002-9939-07-08871-5", - "CorpusId": 6754931}, "url": "https://www.semanticscholar.org/paper/ee68e4fd1d697f3cad5a3514630e7ddcc8431a23", - "title": "Turing incomparability in Scott sets", "abstract": "For every Scott - set F and every nonrecursive set X in F, there is a Y \u2208 F such that X - and Y are Turing incomparable.", "venue": "", "year": 2006, "referenceCount": - 31, "citationCount": 10, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "2006-02-20", "journal": {"name": - "", "pages": "3723-3731", "volume": "135"}, "authors": [{"authorId": "32390330", - "name": "A. Kucera"}, {"authorId": "2867082", "name": "T. Slaman"}]}, {"paperId": - "7c7c788cc1909f245d4beb3b1c0e417d207cd43d", "externalIds": {"MAG": "2593915840", - "DBLP": "journals/jcst/QuYZG17", "DOI": "10.1007/s11390-017-1721-3", "CorpusId": - 8212726}, "url": "https://www.semanticscholar.org/paper/7c7c788cc1909f245d4beb3b1c0e417d207cd43d", - "title": "Parallel Turing Machine, a Proposal", "abstract": null, "venue": - "Journal of Computer Science and Technology", "year": 2017, "referenceCount": - 49, "citationCount": 10, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Review"], "publicationDate": - "2017-03-13", "journal": {"name": "Journal of Computer Science and Technology", - "pages": "269-285", "volume": "32"}, "authors": [{"authorId": "1720773235", - "name": "Peng Qu"}, {"authorId": "2112649005", "name": "Jin Yan"}, {"authorId": - "7549706", "name": "Youhui Zhang"}, {"authorId": "50318619", "name": "G. Gao"}]}, - {"paperId": "a250fc3050027849692e262d374457d92d3bb36c", "externalIds": {"MAG": - "2539931802", "DBLP": "conf/focs/Fischer63", "DOI": "10.1109/SWCT.1963.10", - "CorpusId": 206585336}, "url": "https://www.semanticscholar.org/paper/a250fc3050027849692e262d374457d92d3bb36c", - "title": "On computability by certain classes of restricted Turing machines", - "abstract": "The theory of abstract machines has been well developed for the - finite automaton [RS] and the Turing machine [D]. More recently, machines - intermediate in computing power between the above two classes of machines - have been investigated. These machines have some form of unbounded memory, - thus giving them more potential computing ability than the finite automata, - but the access to the unbounded memory is restricted in some way so that they - do not have the full power of a Turing machine. The two forms of restricted - unbounded memory we shall consider here are the counter and the pushdown store.", - "venue": "SWCT", "year": 1963, "referenceCount": 5, "citationCount": 15, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + 1140, "influentialCitationCount": 83, "isOpenAccess": true, "openAccessPdf": + {"url": "https://www.ams.org/bull/1989-21-01/S0273-0979-1989-15750-9/S0273-0979-1989-15750-9.pdf", + "status": "GOLD"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Mathematics", "source": + "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": "1989-07-01", + "journal": {"name": "Bulletin of the American Mathematical Society", "pages": + "1-46", "volume": "21"}, "authors": [{"authorId": "40642563", "name": "L. + Blum"}, {"authorId": "2331317", "name": "M. Shub"}, {"authorId": "34911188", + "name": "S. Smale"}]}, {"paperId": "732a85f6631fbacd1de5d37b6fa62245f86408b6", + "externalIds": {"DBLP": "conf/acl/CanditoC14", "MAG": "2152166750", "ACL": + "P14-1070", "DOI": "10.3115/v1/P14-1070", "CorpusId": 12408112}, "corpusId": + 12408112, "publicationVenue": {"id": "1e33b3be-b2ab-46e9-96e8-d4eb4bad6e44", + "name": "Annual Meeting of the Association for Computational Linguistics", + "type": "conference", "alternate_names": ["Annu Meet Assoc Comput Linguistics", + "Meeting of the Association for Computational Linguistics", "ACL", "Meet Assoc + Comput Linguistics"], "url": "https://www.aclweb.org/anthology/venues/acl/"}, + "url": "https://www.semanticscholar.org/paper/732a85f6631fbacd1de5d37b6fa62245f86408b6", + "title": "Strategies for Contiguous Multiword Expression Analysis and Dependency + Parsing", "abstract": "In this paper, we investigate various strate- gies + to predict both syntactic dependency parsing and contiguous multiword expres- + sion (MWE) recognition, testing them on the dependency version of French Tree- + bank (Abeille and Barrier, 2004), as in- stantiated in the SPMRL Shared Task + (Seddah et al., 2013). Our work focuses on using an alternative representation + of syntactically regular MWEs, which cap- tures their syntactic internal structure. + We obtain a system with comparable perfor- mance to that of previous works + on this dataset, but which predicts both syntactic dependencies and the internal + structure of MWEs. This can be useful for capturing the various degrees of + semantic composi- tionality of MWEs.", "venue": "Annual Meeting of the Association + for Computational Linguistics", "year": 2014, "referenceCount": 32, "citationCount": + 46, "influentialCitationCount": 5, "isOpenAccess": true, "openAccessPdf": + {"url": "https://hal.inria.fr/hal-01022415/file/main_depmwe-flatreg.final.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1963-10-28", "journal": {"pages": "23-32"}, "authors": - [{"authorId": "1691253", "name": "P. C. Fischer"}]}, {"paperId": "81caabf38caaac03b64668eda5323616ae7b5ce9", - "externalIds": {"MAG": "2172194487", "DOI": "10.1002/mma.3275", "CorpusId": - 124993452}, "url": "https://www.semanticscholar.org/paper/81caabf38caaac03b64668eda5323616ae7b5ce9", - "title": "Bifurcation analysis of a diffusive predator\u2013prey system with - a herd behavior and quadratic mortality", "abstract": "In this paper, a diffusive - predator\u2013prey system, in which the prey species exhibits herd behavior - and the predator species with quadratic mortality, has been studied. The stability - of positive constant equilibrium, Hopf bifurcations, and diffusion\u2010driven - Turing instability are investigated under the Neumann boundary condition. - The explicit condition for the occurrence of the diffusion\u2010driven Turing - instability is derived, which is determined by the relationship of the diffusion - rates of two species. The formulas determining the direction and the stability - of Hopf bifurcations depending on the parameters of the system are derived. - Finally, numerical simulations are carried out to verify and extend the theoretical - results and show the existence of spatially homogeneous periodic solutions - and nonconstant steady states. Copyright \u00a9 2014 John Wiley & Sons, Ltd.", - "venue": "", "year": 2015, "referenceCount": 34, "citationCount": 23, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2015-09-30", - "journal": {"name": "Mathematical Methods in the Applied Sciences", "pages": - "2994 - 3006", "volume": "38"}, "authors": [{"authorId": "102820754", "name": - "Zhouli Xu"}, {"authorId": "1794550", "name": "Yongli Song"}]}, {"paperId": - "e8975aef2de26cd906ce05236f9ac3fc134e0847", "externalIds": {"CorpusId": 9720989}, - "url": "https://www.semanticscholar.org/paper/e8975aef2de26cd906ce05236f9ac3fc134e0847", - "title": "Dictionary of Scientific Biography XIII Universal Turing Machine - R", "abstract": "The implications of knowledge-base archetypes have been far-reaching - and pervasive [54, 54, 58, 59, 62, 68, 68, 70, 95, 99, 114, 114, 128, 129, - 148, 152, 168, 179, 188, 191]. In this paper, we verify the development of - SCSI disks, which embodies the typical principles of theory. Our focus in - this paper is not on whether evolutionary programming and write-back caches - are largely incompatible, but rather on proposing new metamorphic algorithms - (NyeCaterer).", "venue": "", "year": 2011, "referenceCount": 231, "citationCount": - 22, "influentialCitationCount": 0, "isOpenAccess": false, "fieldsOfStudy": - null, "s2FieldsOfStudy": [{"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": null, "journal": null, "authors": - []}, {"paperId": "4254a2f57220dd2ce842f9327a192ce324ebe2bd", "externalIds": - {"MAG": "2116808683", "DOI": "10.1080/02791072.1986.10472361", "CorpusId": - 28456312, "PubMed": "2880943"}, "url": "https://www.semanticscholar.org/paper/4254a2f57220dd2ce842f9327a192ce324ebe2bd", + Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2014-06-23", "journal": {"pages": "743-753"}, + "authors": [{"authorId": "2636107", "name": "Marie Candito"}, {"authorId": + "2614795", "name": "M. Constant"}]}, {"paperId": "536af3713d6b781a5690088394bb8bd8db8ddf14", + "externalIds": {"MAG": "2462712013", "DOI": "10.1007/BF02407219", "CorpusId": + 5089142, "PubMed": "2700955"}, "corpusId": 5089142, "publicationVenue": {"id": + "865fa141-642c-41fc-bb38-c52a9f485135", "name": "Dysphagia (New York. Print)", + "type": "journal", "alternate_names": ["Dysphagia", "Dysphagia (new York Print"], + "issn": "0179-051X", "url": "https://link.springer.com/journal/455"}, "url": + "https://www.semanticscholar.org/paper/536af3713d6b781a5690088394bb8bd8db8ddf14", + "title": "The physiology of swallowing", "abstract": null, "venue": "Dysphagia + (New York. Print)", "year": 2006, "referenceCount": 34, "citationCount": 217, + "influentialCitationCount": 18, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", + "source": "external"}, {"category": "Biology", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": null, + "journal": {"name": "Dysphagia", "pages": "171-178", "volume": "3"}, "authors": + [{"authorId": "7009948", "name": "W. dodds"}]}, {"paperId": "4254a2f57220dd2ce842f9327a192ce324ebe2bd", + "externalIds": {"MAG": "2116808683", "DOI": "10.1080/02791072.1986.10472361", + "CorpusId": 28456312, "PubMed": "2880943"}, "corpusId": 28456312, "publicationVenue": + {"id": "25dc26e3-ebc4-4c3c-a9bc-d51d63782e42", "name": "Journal of Psychoactive + Drugs", "type": "journal", "alternate_names": ["J Psychoact Drug"], "issn": + "0279-1072", "url": "http://www.informaworld.com/ujpd", "alternate_urls": + ["http://www.tandfonline.com/loi/ujpd20/", "http://www.hafci.org/journal/index.html", + "http://www.journalofpsychoactivedrugs.com/"]}, "url": "https://www.semanticscholar.org/paper/4254a2f57220dd2ce842f9327a192ce324ebe2bd", "title": "The background and chemistry of MDMA.", "abstract": "This article will present the factual material that up to 1972, MDMA was entered with the phenethylamine exists in the literature representing the results of laboraname. @@ -54006,730 +62117,186 @@ interactions: Cl iHlsNO2, and its structural formula is given in Figure S-MDMA (+) HCI 69558-32-3", "venue": "Journal of Psychoactive Drugs", "year": 1986, "referenceCount": 145, "citationCount": 215, "influentialCitationCount": 5, "isOpenAccess": - false, "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": - "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Chemistry", "source": "s2-fos-model"}], "publicationTypes": - ["Review", "JournalArticle"], "publicationDate": "1986-10-01", "journal": - {"name": "Journal of psychoactive drugs", "pages": "\n 291-304\n ", + false, "openAccessPdf": null, "fieldsOfStudy": ["Chemistry", "Medicine"], + "s2FieldsOfStudy": [{"category": "Chemistry", "source": "external"}, {"category": + "Medicine", "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], + "publicationTypes": ["Review", "JournalArticle"], "publicationDate": "1986-10-01", + "journal": {"name": "Journal of psychoactive drugs", "pages": "\n 291-304\n ", "volume": "18 4"}, "authors": [{"authorId": "6598913", "name": "A. Shulgin"}]}, - {"paperId": "189655463a0f811a7e67bda71e5d82aa52d8f515", "externalIds": {"CorpusId": - 15806331}, "url": "https://www.semanticscholar.org/paper/189655463a0f811a7e67bda71e5d82aa52d8f515", - "title": "A QUARTERLY REVIEW OF PSYCHOLOGY AND PHILOSOPHY Universal Turing - Machine", "abstract": "Peer-to-peer modalities and evolutionary programming - have garnered limited interest from both cryptographers and electrical engineers - in the last several years. Given the current status of signed technology, - electrical engineers urgently desire the refinement of simulated annealing, - which embodies the key principles of complexity theory. Our focus in this - paper is not on whether symmetric encryption [54], [58], [59], [62], [62], - [68], [70], [95], [95], [99], [114], [148], [152], [168], [179], [179], [179], - [188], [188], [191] can be made stable, client-server, and perfect, but rather - on describing a solution for evolutionary programming (Senor).", "venue": - "", "year": 2011, "referenceCount": 250, "citationCount": 22, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], - "publicationDate": null, "journal": null, "authors": []}, {"paperId": "732a85f6631fbacd1de5d37b6fa62245f86408b6", - "externalIds": {"DBLP": "conf/acl/CanditoC14", "MAG": "2152166750", "ACL": - "P14-1070", "DOI": "10.3115/v1/P14-1070", "CorpusId": 12408112}, "url": "https://www.semanticscholar.org/paper/732a85f6631fbacd1de5d37b6fa62245f86408b6", - "title": "Strategies for Contiguous Multiword Expression Analysis and Dependency - Parsing", "abstract": "In this paper, we investigate various strate- gies - to predict both syntactic dependency parsing and contiguous multiword expres- - sion (MWE) recognition, testing them on the dependency version of French Tree- - bank (Abeille and Barrier, 2004), as in- stantiated in the SPMRL Shared Task - (Seddah et al., 2013). Our work focuses on using an alternative representation - of syntactically regular MWEs, which cap- tures their syntactic internal structure. - We obtain a system with comparable perfor- mance to that of previous works - on this dataset, but which predicts both syntactic dependencies and the internal - structure of MWEs. This can be useful for capturing the various degrees of - semantic composi- tionality of MWEs.", "venue": "Annual Meeting of the Association - for Computational Linguistics", "year": 2014, "referenceCount": 32, "citationCount": - 46, "influentialCitationCount": 5, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2014-06-23", - "journal": {"pages": "743-753"}, "authors": [{"authorId": "2636107", "name": - "Marie Candito"}, {"authorId": "2614795", "name": "M. Constant"}]}, {"paperId": - "313d853c02667ba147a996eae8f286518c52498e", "externalIds": {"MAG": "2003485639", - "DOI": "10.1007/s00285-012-0589-7", "CorpusId": 45972449, "PubMed": "23007599"}, - "url": "https://www.semanticscholar.org/paper/313d853c02667ba147a996eae8f286518c52498e", - "title": "Methods for diversity and overlap analysis in T-cell receptor populations", - "abstract": null, "venue": "Journal of Mathematical Biology", "year": 2013, - "referenceCount": 43, "citationCount": 79, "influentialCitationCount": 6, - "isOpenAccess": true, "fieldsOfStudy": ["Biology", "Medicine"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "external"}, {"category": "Biology", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2013-12-01", "journal": {"name": "Journal - of Mathematical Biology", "pages": "1339-1368", "volume": "67"}, "authors": - [{"authorId": "1712667", "name": "G. Rempa\u0142a"}, {"authorId": "47645638", - "name": "M. Seweryn"}]}, {"paperId": "133210fab3b96eeca64a92aeb56c167df1ca1b44", - "externalIds": {"MAG": "2046252924", "DOI": "10.1107/S0365110X61002199", "CorpusId": - 97773425}, "url": "https://www.semanticscholar.org/paper/133210fab3b96eeca64a92aeb56c167df1ca1b44", - "title": "The magnetic anisotropy and electron distribution in succinimide", - "abstract": "B n to B3a computed by Grenville-Wells are 31\u20442 for ni trogen - and almost 6 for oxygen. I f anything, the electron densi ty sections indicate, - to us a t least, t ha t the anisotropy of the ni trogen a tom is greater than - tha t of the oxygen. Our analysis of our own (hOl) da ta indicates B n = 3.65 - and Bs8 = 1.68 for oxygen (at room temperature) . Our room tempera tu re (least - squares) results for B n differ little from those of Worsham, Levy & Peterson. - The B33 results, however, differ significantly. The Worsham, Levy & Peterson - results are consistently lower t h a n ours by as much as 50%. Our low tempera - tu re measurements are useful in this connection. The tempera ture factors - of all the a toms show a fair ly uniform decrease of about 50% between room - tempera tu re and 1 4 0 \u00b0C. In this t empera tu re range, the t empera - tu re factors are approximate ly proport ional to the absolute temperatures - . I t is difficult to reconcile these findings with those repor ted by Worsham, - Levy & Peterson. The decrease in our B33 terms between room tempera tu re - and --140 \u00b0C. was almost as large as the total room tempera ture values - relSorted by Worsham, Levy & Peterson for the ni trogen and carbon atoms, - and larger t han the value reported for the oxygen atom. The B~3 cross te - rm for the nitrogen a tom is very small and m a y be ignored. The causes of - these differences between the X r a y and the neut ron diffraction results - are not clear. I t is well known tha t computed '' t empera ture factors '' - are par t icular ly sensitive to the types of form factors assumed for the - a tom a t rest. I t m a y be t ha t the differences reflect errors in the - neutron, or the X-ray , atomic form factors. Possibly the three dimensional - neutron diffraction analysis of urea reported under way at the Oak Ridge Nat - ional Laboratories will clear up this point.", "venue": "", "year": 1961, - "referenceCount": 5, "citationCount": 46, "influentialCitationCount": 1, "isOpenAccess": - false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": [{"category": "Chemistry", - "source": "external"}, {"category": "Materials Science", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1961-07-10", "journal": {"name": - "Acta Crystallographica", "pages": "720-724", "volume": "14"}, "authors": - [{"authorId": "48522699", "name": "R. Mason"}]}, {"paperId": "966438e6221c1ccfb936442dfaabdeb2ce666113", - "externalIds": {"DBLP": "journals/logcom/DeolalikarHS05", "MAG": "2149708996", - "DOI": "10.1093/logcom/exi022", "CorpusId": 5505123}, "url": "https://www.semanticscholar.org/paper/966438e6221c1ccfb936442dfaabdeb2ce666113", - "title": "P != NP cap co-NP for Infinite Time Turing Machines", "abstract": - "Extending results of Schindler, Hamkins and Welch, we establish in the context - of infinite time Turing machines that P is properly contained in NP \u2229 - co-NP. For higher analogues of these classes, we exhibit positive and negative - results.", "venue": "Journal of Logic and Computation", "year": 2005, "referenceCount": - 10, "citationCount": 18, "influentialCitationCount": 2, "isOpenAccess": true, - "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "external"}, {"category": "Computer Science", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2005-10-01", "journal": {"name": "J. - Log. Comput.", "pages": "577-592", "volume": "15"}, "authors": [{"authorId": - "1768541", "name": "V. Deolalikar"}, {"authorId": "1755318", "name": "J. Hamkins"}, - {"authorId": "144459126", "name": "R. Schindler"}]}, {"paperId": "ea659c9e4f5cda1f88d5ba85ca18ba2744743c57", - "externalIds": {"DBLP": "journals/jolli/BringsjordCN00", "MAG": "1564959212", - "DOI": "10.1023/A:1008311207953", "CorpusId": 394659}, "url": "https://www.semanticscholar.org/paper/ea659c9e4f5cda1f88d5ba85ca18ba2744743c57", - "title": "Animals, Zombanimals, and the Total Turing Test", "abstract": null, - "venue": "J. Log. Lang. Inf.", "year": 2000, "referenceCount": 25, "citationCount": - 13, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", - "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2000-10-01", "journal": - {"name": "Journal of Logic, Language and Information", "pages": "397-418", - "volume": "9"}, "authors": [{"authorId": "1797985", "name": "S. Bringsjord"}, - {"authorId": "2072028531", "name": "Clarke Caporale"}, {"authorId": "12755969", - "name": "R. Noel"}]}, {"paperId": "32cf0370d4a4742ee03b4a8b0951c80cf8221fbf", - "externalIds": {"MAG": "1970911622", "DOI": "10.1103/PHYSREVLETT.95.038303", - "CorpusId": 9131763, "PubMed": "16090777"}, "url": "https://www.semanticscholar.org/paper/32cf0370d4a4742ee03b4a8b0951c80cf8221fbf", - "title": "Segmented waves from a spatiotemporal transverse wave instability.", - "abstract": "We observe traveling waves emitted from Turing spots in the chlorine - dioxide-iodine-malonic acid reaction. The newborn waves are continuous, but - they break into segments as they propagate, and the propagation of these segments - ultimately gives rise to spatiotemporal chaos. We model the wave-breaking - process and the motion of the chaotic segments. We find stable segmented spirals - as well. We attribute the segmentation to an interaction between front rippling - via a transverse instability and front symmetry breaking by a fast-diffusing - inhibitor far from the codimension-2 Hopf-Turing bifurcation, and the chaos - to a secondary instability of the periodic segmentation.", "venue": "Physical - Review Letters", "year": 2005, "referenceCount": 43, "citationCount": 17, - "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials - Science", "Medicine"], "s2FieldsOfStudy": [{"category": "Materials Science", - "source": "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2005-07-14", "journal": {"name": "Physical review letters", - "pages": "\n 038303\n ", "volume": "95 3"}, "authors": [{"authorId": - "2586119", "name": "L. Yang"}, {"authorId": "6742967", "name": "I. Berenstein"}, - {"authorId": "144854275", "name": "I. Epstein"}]}, {"paperId": "c319af92127378e7ee64ec6a3e2e8752fe1421c7", - "externalIds": {"MAG": "2251158365", "DBLP": "conf/ijcai/SharmaVAB15", "CorpusId": - 6307034}, "url": "https://www.semanticscholar.org/paper/c319af92127378e7ee64ec6a3e2e8752fe1421c7", - "title": "Towards Addressing the Winograd Schema Challenge - Building and - Using a Semantic Parser and a Knowledge Hunting Module", "abstract": "Concerned - about the Turing test''s ability to correctly evaluate if a system exhibits - human-like intelligence, the Winograd Schema Challenge (WSC) has been proposed - as an alternative. A Winograd Schema consists of a sentence and a question. - The answers to the questions are intuitive for humans but are designed to - be difficult for machines, as they require various forms of commonsense knowledge - about the sentence. In this paper we demonstrate our progress towards addressing - the WSC. We present an approach that identifies the knowledge needed to answer - a challenge question, hunts down that knowledge from text repositories, and - then reasons with them to come up with the answer. In the process we develop - a semantic parser (www.kparser.org). We show that our approach works well - with respect to a subset of Winograd schemas.", "venue": "International Joint - Conference on Artificial Intelligence", "year": 2015, "referenceCount": 38, - "citationCount": 81, "influentialCitationCount": 14, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": - "2015-07-25", "journal": {"pages": "1319-1325"}, "authors": [{"authorId": - "40532637", "name": "Arpit Sharma"}, {"authorId": "40331081", "name": "N. - Vo"}, {"authorId": "39744108", "name": "Somak Aditya"}, {"authorId": "1760291", - "name": "Chitta Baral"}]}, {"paperId": "e985d303d8b9ceb3ae7579e4578acc99ea4b7d41", - "externalIds": {"MAG": "2185292506", "DOI": "10.1111/1467-8322.12209", "CorpusId": - 146407334}, "url": "https://www.semanticscholar.org/paper/e985d303d8b9ceb3ae7579e4578acc99ea4b7d41", - "title": "Alan Turing: Artificial intelligence as human self\u2010knowledge", - "abstract": "This article explores the life and ideas of Alan Turing (1912\u20131954), - commonly known as the father of artificial intelligence (AI), and highlights - the process whereby the human self is reconceptualized in the development - of Turing''s ideas of machine intelligence. I will further illustrate how - this process of self-reconceptualization \u2013 composed of the pursuit, adaptation - and transformation of self-knowledge \u2013 is closely related to contemporary - digital life. In doing so, I wish to reveal the ways in which Turing''s underlying - self-transforming agenda of AI can contribute to our understanding of the - human self, for AI, as I will argue, leads to questions of existence and existential - anxieties.", "venue": "", "year": 2015, "referenceCount": 4, "citationCount": - 11, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Sociology"], "s2FieldsOfStudy": [{"category": "Sociology", "source": "external"}, - {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2015-12-01", "journal": {"name": "Anthropology Today", - "pages": "3-7", "volume": "31"}, "authors": [{"authorId": "2100624475", "name": - "T. Guo"}]}, {"paperId": "536af3713d6b781a5690088394bb8bd8db8ddf14", "externalIds": - {"MAG": "2462712013", "DOI": "10.1007/BF02407219", "CorpusId": 5089142, "PubMed": - "2700955"}, "url": "https://www.semanticscholar.org/paper/536af3713d6b781a5690088394bb8bd8db8ddf14", - "title": "The physiology of swallowing", "abstract": null, "venue": "Dysphagia - (New York. Print)", "year": 2006, "referenceCount": 34, "citationCount": 217, - "influentialCitationCount": 18, "isOpenAccess": false, "fieldsOfStudy": ["Medicine"], - "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["Review", "JournalArticle"], - "publicationDate": null, "journal": {"name": "Dysphagia", "pages": "171-178", - "volume": "3"}, "authors": [{"authorId": "7009948", "name": "W. dodds"}]}, - {"paperId": "c2d45e441c56b386108084da30afd35243f2a4d0", "externalIds": {"MAG": - "1524213922", "DOI": "10.5860/choice.43-2163", "CorpusId": 60747050}, "url": - "https://www.semanticscholar.org/paper/c2d45e441c56b386108084da30afd35243f2a4d0", - "title": "Alan Turing''s automatic computing engine : the master codebreaker''s - struggle to build the modern computer", "abstract": "Foreword Introduction - PART I: THE NATIONAL PHYSICAL LABORATORY AND THE ACE PROJECT A Century of - Measurement and Computation at the National Physical Laboratory, 1900-2000 - The Creation of the NPL Mathematics Division The Origins and Development of - the ACE Project The Pilot ACE at the National Physical Laboratory PART II: - TURING AND THE HISTORY OF COMPUTING The ACE and the Shaping of British Computing - Computer Architecture and the ACE Computers Turing and the Computer From Turing - Machine to \"Electronic Brain\" PART III: THE ACE COMPUTERS The Pilot ACE - Instruction Format Programming the Pilot ACE The Pilot ACE: from Concept to - Reality The DEUCE-a User''s View Applications of the Pilot ACE and the DEUCE - The ACE Test Assembly, the Pilot ACE, the Big ACE, and the Bendix G15 The - ACE Simulator and the Cybernetic Model The Pilot Model and the Big ACE on - the Web PART IV: ELECTRONICS How Valves Work Recollections of Early Vacuum - Tube Circuits Circuit Design of the Pilot ACE and the Big ACE PART V: TECHNICAL - REPORTS AND LECTURES ON THE ACE AND THE PILOT ACE, 1945-1951 Proposed Electronic - Calculator (1945) Notes on Memory (1945) The Turing-Wilkinson Lecture Series - (1946-1947) The State of the Art in Electronic Digital Computing in Britain - and the United States (1947)", "venue": "", "year": 2005, "referenceCount": - 0, "citationCount": 14, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "volume": ""}, "authors": [{"authorId": "118975427", "name": - "J. Copeland"}]}, {"paperId": "4af88046e544d20fe1eb79c87979420f4cb53db1", - "externalIds": {"MAG": "2042295707", "DOI": "10.1016/J.AIM.2010.06.024", "CorpusId": - 14977046}, "url": "https://www.semanticscholar.org/paper/4af88046e544d20fe1eb79c87979420f4cb53db1", - "title": "Extracting information is hard: A Turing degree of non-integral - effective Hausdorff dimension", "abstract": null, "venue": "", "year": 2011, - "referenceCount": 39, "citationCount": 46, "influentialCitationCount": 8, - "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2011-01-15", - "journal": {"name": "Advances in Mathematics", "pages": "373-384", "volume": - "226"}, "authors": [{"authorId": "2116336200", "name": "Joseph S. Miller"}]}, - {"paperId": "ce6a1bacf1e5eee2044f2cae122011a686e8c1dc", "externalIds": {"MAG": - "1990990734", "DOI": "10.2307/2161917", "CorpusId": 14077545}, "url": "https://www.semanticscholar.org/paper/ce6a1bacf1e5eee2044f2cae122011a686e8c1dc", - "title": "Every Low 2 Boolean Algebra has a Recursive Copy", "abstract": "The - degree of a structure sv is the Turing degree of its open diagram D(vl) , - coded as a subset of co. Implicit in the definition is a particular presentation - of the structure; the degree is not an isomorphism invariant. We prove that - if a Boolean algebra v has a copy of low 2 degree, then there is a recursive - Boolean algebra -7 which is isomorphic to v . This builds on work of Downey - and Jockusch, who proved the analogous result starting with a low 1 Boolean - algebra.", "venue": "", "year": 1995, "referenceCount": 9, "citationCount": - 46, "influentialCitationCount": 1, "isOpenAccess": false, "fieldsOfStudy": - ["Mathematics"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": - "Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, - "publicationDate": "1995-12-01", "journal": {"name": "", "pages": "3859", - "volume": "123"}, "authors": [{"authorId": "14902901", "name": "J. Thurber"}]}, - {"paperId": "eaa6ab13960946872236588fd89245b2d8b75769", "externalIds": {"DOI": - "10.1023/A:1024917721734", "CorpusId": 40731685, "PubMed": "5696619"}, "url": - "https://www.semanticscholar.org/paper/eaa6ab13960946872236588fd89245b2d8b75769", - "title": "International Union of Pure and Applied Chemistry [IUPAC]", "abstract": - null, "venue": "Russian Journal of Bioorganic Chemistry", "year": 2004, "referenceCount": - 12, "citationCount": 46, "influentialCitationCount": 4, "isOpenAccess": false, - "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", - "source": "external"}, {"category": "Chemistry", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": null, "journal": - {"name": "Russian Journal of Bioorganic Chemistry", "pages": "405-406", "volume": - "29"}, "authors": [{"authorId": "152163039", "name": "June"}]}, {"paperId": - "bb206ae0ec670764d7930d942c104bfa6ab5204f", "externalIds": {"DBLP": "conf/atva/RecaldeHS07", - "MAG": "2035930260", "DOI": "10.1142/S0129054110007222", "CorpusId": 1861660}, - "url": "https://www.semanticscholar.org/paper/bb206ae0ec670764d7930d942c104bfa6ab5204f", - "title": "Continuous Petri Nets: Expressive Power and Decidability Issues", - "abstract": "State explosion is a fundamental problem in the analysis and - synthesis of discrete event systems. Continuous Petri nets can be seen as - a relaxation of discrete models. The expected gains are twofold: improvements - in comlexity and in decidability. This paper concentrates on the study of - decidability issues. In the case of autonomous nets it is proved that properties - like reachability, liveness or deadlock-freeness remain decidable. When time - is introduced in the model (using an infinite server semantics) decidability - of these properties is lost, since continuous timed Petri nets are able to - simulate Turing machines.", "venue": "International Journal of Foundations - of Computer Science", "year": 2007, "referenceCount": 17, "citationCount": - 45, "influentialCitationCount": 2, "isOpenAccess": true, "fieldsOfStudy": - ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Mathematics", "source": "external"}, - {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2007-10-22", "journal": {"name": "Int. - J. Found. Comput. Sci.", "pages": "235-256", "volume": "21"}, "authors": [{"authorId": - "2329282", "name": "L. Recalde"}, {"authorId": "145294540", "name": "S. Haddad"}, - {"authorId": "3453347", "name": "M. Su\u00e1rez"}]}, {"paperId": "15fdb89104584edb00f93341bedf07def8a942d5", - "externalIds": {"MAG": "2192149141", "ArXiv": "1502.04135", "DOI": "10.1038/nature16059", - "CorpusId": 4451987, "PubMed": "26659181"}, "url": "https://www.semanticscholar.org/paper/15fdb89104584edb00f93341bedf07def8a942d5", - "title": "Undecidability of the spectral gap", "abstract": null, "venue": - "Nature", "year": 2015, "referenceCount": 94, "citationCount": 221, "influentialCitationCount": - 11, "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Mathematics", "Medicine"], - "s2FieldsOfStudy": [{"category": "Physics", "source": "external"}, {"category": - "Mathematics", "source": "external"}, {"category": "Medicine", "source": "external"}, - {"category": "Physics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2015-02-13", "journal": {"name": "Nature", "pages": "207-211", - "volume": "528"}, "authors": [{"authorId": "2709707", "name": "T. Cubitt"}, - {"authorId": "1399658529", "name": "D. P\u00e9rez-Garc\u00eda"}, {"authorId": - "40341227", "name": "M. Wolf"}]}, {"paperId": "ff5c277791d7f68e1781741cd6db4eefdac1b693", - "externalIds": {"MAG": "2107913293", "DOI": "10.1146/ANNUREV.MS.25.080195.002133", - "CorpusId": 97712004}, "url": "https://www.semanticscholar.org/paper/ff5c277791d7f68e1781741cd6db4eefdac1b693", - "title": "Epitaxy of Dissimilar Materials", "abstract": "Differences in crystal - structure, bonding, and materials properties play important roles in dissimilar - materials epitaxy. Emphasis is placed on how these differences affect the - growth of dissimilar materials heterostructures. Examples of the growth of - elemental metals and semi-metals (AI, Ag, Sb, Bi); metallic and semi-metal - compounds (transition-metal group III compounds with CsCI crystal structure, - rare-earth group V compounds with NaCl crystal structure, orthorhombic YbSb2, - Fe3AI''_xSix with BiF3 crystal structure); magnetic compounds (tetragonal - ,-MnAI, hexagonal \ufffd\u00ad MnAs); and insulators (rare-earth trifluorides - with tysonite crystal struc\u00ad ture, metal fluorides with the CaF2 crystal - structure) on compound semi\u00ad conductors are used to demonstrate the issues - involved. The use of tem\u00ad plate layers is crucial in controlling the - orientation and crystal quality of the epitaxial layers.", "venue": "", "year": - 1995, "referenceCount": 0, "citationCount": 76, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Chemistry"], "s2FieldsOfStudy": - [{"category": "Chemistry", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "1995-08-01", "journal": {"name": "Annual Review of Materials Science", "pages": - "389-415", "volume": "25"}, "authors": [{"authorId": "46526504", "name": "C. - Palmstr\u00f8m"}]}, {"paperId": "b4ed661c083bb06f71cd5fae2e31bd2f84777b01", - "externalIds": {"MAG": "1597898532", "DBLP": "conf/coco/FortnowM00", "DOI": - "10.1109/CCC.2000.856730", "CorpusId": 2129433}, "url": "https://www.semanticscholar.org/paper/b4ed661c083bb06f71cd5fae2e31bd2f84777b01", - "title": "Time-space tradeoffs for nondeterministic computation", "abstract": - "We show new tradeoffs for satisfiability and nondeterministic linear time. - Satisfiability cannot be solved on general purpose random-access Turing machines - in time n/sup 1.618/ and space n/sup o(1)/. This improves recent results of - Fortnow and of Lipton and Viglas. In general, for any constant a less than - the golden ratio, we prove that satisfiability cannot be solved in time n/sup - a/ and space n/sup /spl delta// for some positive constant b. Our techniques - allow us to establish this result for b< 1/2 (/spl alpha/+2/a(2)-a). We can - do better for a close to the golden ratio, for example, satisfiability cannot - be solved by a random-access Turing machine using n/sup 1.46/ time and n/sup - .11/ space. We also show tradeoffs for nondeterministic linear time computations - using sublinear space. For example, there exists a language computable in - nondeterministic linear time and n/sup 619/ space that cannot be computed - in deterministic n/sup 1.618/ time and n/sup o(1)/ space. Higher up the polynomial-time - hierarchy we can get better bounds. We show that linear-time /spl Sigma//sub - l/-computations require essentially n/sup l/ time on deterministic machines - that use only n/sup o(1)/ space. We also show new lower bounds on conondeterministic - versus nondeterministic computation.", "venue": "Proceedings 15th Annual IEEE - Conference on Computational Complexity", "year": 2000, "referenceCount": 15, - "citationCount": 39, "influentialCitationCount": 5, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle", "Conference"], "publicationDate": "2000-07-04", - "journal": {"name": "Proceedings 15th Annual IEEE Conference on Computational - Complexity", "pages": "2-13"}, "authors": [{"authorId": "1691447", "name": - "L. Fortnow"}, {"authorId": "1717488", "name": "D. Melkebeek"}]}, {"paperId": - "f99b12cfff87b414d881d04a76bfa3cc37330e10", "externalIds": {"MAG": "2080633801", - "DOI": "10.1098/rsta.1995.0093", "CorpusId": 122450853}, "url": "https://www.semanticscholar.org/paper/f99b12cfff87b414d881d04a76bfa3cc37330e10", - "title": "Nonlinear waves, patterns and spatio-temporal chaos in cellular - neural networks", "abstract": "Spatio-temporal pattern formation occurring - in discretely coupled nonlinear dynamical systems has been studied numerically. - In this paper, we review the possibilities of using arrays of discretely coupled - nonlinear electronic circuits to study these systems. Spiral wave initiation - and Turing pattern formation are some of the examples. Sidewall forcing of - Turing patterns is shown to be capable of driving the system into a perfect - spatial organization, namely, a rhombic pattern, where no defects occur. The - dynamics of the two layers supporting Turing and Hopf modes, respectively, - is analysed as a function of the coupling strength between them. The competition - between these two modes is shown to increase with the diffusion between layers. - As well, the coexistence of low- and high-dimensional spatio-temporal chaos - is shown to occur in one-dimensional arrays.", "venue": "Philosophical Transactions - of the Royal Society of London. Series A: Physical and Engineering Sciences", - "year": 1995, "referenceCount": 39, "citationCount": 15, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": - [{"category": "Mathematics", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate": - "1995-10-16", "journal": {"name": "Philosophical Transactions of the Royal - Society of London. Series A: Physical and Engineering Sciences", "pages": - "101 - 113", "volume": "353"}, "authors": [{"authorId": "1399297796", "name": - "V. P\u00e9rez-Mu\u00f1uzuri"}, {"authorId": "9165742", "name": "A. P. Mu\u00f1uzuri"}, - {"authorId": "1403050470", "name": "M. G\u00f3mez-Gesteira"}, {"authorId": - "1422161402", "name": "V. P\u00e9rez-Villar"}, {"authorId": "2793014", "name": - "L. Pivka"}, {"authorId": "144848684", "name": "L. Chua"}]}, {"paperId": "0f7408a221840df6c42b2dfd8228739a6090ab28", - "externalIds": {"MAG": "2124892090", "DOI": "10.1109/PHYCMP.1992.615549", - "CorpusId": 61850869}, "url": "https://www.semanticscholar.org/paper/0f7408a221840df6c42b2dfd8228739a6090ab28", - "title": "An Electroid Switching Model For Reversible Computer Architectures", - "abstract": "The study of logical reversibiiity in computation has led to - a proliferation of unconventional architectural proposals, from Brownian-motion - clockwork Turing machines to billiardball Computers. An architectural model - for reversible computers is proposed herein, that is significantly closer - to the switch-level models used in designing actual digital circuitry. This - ue''electroid (electronics-like) model facilitates the direct application - of the substantial body of ezisting digital design techniques to reversible - and dissipation-limited architectures.", "venue": "Workshop on Physics and - Computation", "year": 1992, "referenceCount": 16, "citationCount": 32, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Art", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1992-10-02", - "journal": {"name": "Workshop on Physics and Computation", "pages": "237-247"}, - "authors": [{"authorId": "2107226704", "name": "J. S. Hall"}]}, {"paperId": - "899f435c9aeb3f67f3d4779db84a594f7d1217ee", "externalIds": {"CorpusId": 18072711}, - "url": "https://www.semanticscholar.org/paper/899f435c9aeb3f67f3d4779db84a594f7d1217ee", - "title": "THE 3-THEORY OF THE COMPUTABLY ENUMERABLE TURING DEGREES IS UNDECIDABLE", - "abstract": "We show the undecidability of the 3-theory of the partial order - of enumerable Turing degrees. 0. Introduction. Recursively enumerable (henceforth - called enumerable) sets arise naturally in many areas of mathematics, for - instance in the study of elementary theories, as solution sets of polynomials - or as the word problems of nitely generated subgroups of nitely presented - groups. Putting the enumerable sets into context with each other in various - ways yields structures whose study has for long been a mainstay of computability - theory. If the sets are related in the most elementary way, namely by inclusion, - one obtains a distributive lattice E with very complex algebraic properties. - Another way to compare sets is to look at the information content. Turing - reducibility is a very general, but the most widely accepted concept of relative - computability: a set X of natural numbers is Turing-reducible to Y ii the - answer to \\n 2 X?\" can be determined by a Turing machine computation which - can use answers to oracle questions \\y 2 Y ?\" during the computation. (For - more restricted notions of relative computability one would for instance place - a priori bounds on the lengths of computations or would limit the access to - the oracle.) The Turing degree of a set, i.e. its equivalence class under - the equivalence relation given by this preordering, measures the information - content of a set while stripping 1991 Mathematics Subject Classiication. 03D25,03D35.", - "venue": "", "year": 1998, "referenceCount": 13, "citationCount": 12, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": - "Mathematics", "source": "s2-fos-model"}, {"category": "Computer Science", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": null, "authors": [{"authorId": "2102371842", "name": "NiesTheodore - A. SlamanDepartment"}]}, {"paperId": "4c95c7c2217c41ac13ae76fa296f46a7f76c25b5", - "externalIds": {"MAG": "2170404996", "DOI": "10.1002/POLB.20857", "CorpusId": - 1423334}, "url": "https://www.semanticscholar.org/paper/4c95c7c2217c41ac13ae76fa296f46a7f76c25b5", - "title": "Mechanical properties of Nafion and titania/Nafion composite membranes - for polymer electrolyte membrane fuel cells", "abstract": "Measurements of - the mechanical and electrical properties of Nafion and Nafion/titania composite - membranes in constrained environments are reported. The elas- tic and plastic - deformation of Nafion-based materials decreases with both the tempera- ture - and water content. Nafion/titania composites have slightly higher elastic - moduli. The composite membranes exhibit less strain hardening than Nafion. - Composite mem- branes also show a reduction in the long-time creep of \ufffd - 40% in comparison with Nafion. Water uptake is faster in Nafion membranes - recast from solution in comparison with extruded Nafion. The addition of 3-20 - wt % titania particles has minimal effect on the rate of water uptake. Water - sorption by Nafion membranes generates a swelling pressure of \ufffd 0.55 - MPa in 125-lm membranes. The resistivity of Nafion increases when the mem- - brane is placed under a load. At 23 8C and 100% relative humidity, the resistivity - of Nafion increases by \ufffd 15% under an applied stress of 7.5 MPa. There - is a substantial hy- steresis in the membrane resistivity as a function of - the applied stress depending on whether the pressure is increasing or decreasing. - The results demonstrate how the dynamics of water uptake and loss from membranes - are dependent on physical con- straints, and these constraints can impact - fuel cell performance. V C 2006 Wiley Periodicals,", "venue": "", "year": - 2006, "referenceCount": 91, "citationCount": 218, "influentialCitationCount": - 3, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Materials - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2006-08-15", "journal": {"name": "Journal of Polymer Science Part B", "pages": - "2327-2345", "volume": "44"}, "authors": [{"authorId": "122038827", "name": - "M. Satterfield"}, {"authorId": "4515357", "name": "P. Majsztrik"}, {"authorId": - "2072863366", "name": "H. Ota"}, {"authorId": "11461452", "name": "J. Benziger"}, - {"authorId": "6593982", "name": "A. Bocarsly"}]}, {"paperId": "f831b80c00586d29bda35bb94f4fffb926de37b1", - "externalIds": {"MAG": "2116010227", "DOI": "10.1146/ANNUREV.PY.09.090171.001345", - "CorpusId": 86575097}, "url": "https://www.semanticscholar.org/paper/f831b80c00586d29bda35bb94f4fffb926de37b1", - "title": "Interactions Between Nematodes and Fungi in Disease Complexes", - "abstract": "Nature does not work with pure cultures. I suspect that many - plant diseases are influenced by associated organisms to a much more profound - degree than we have yet realized, not only as to inhibition but also as to - acceleration of the process. It may be that a number of diseases require an - association of organisms for their occurrence and cannot be produced by infection - of one organism alone. Pure cul\u00ad tures we must, however, continue to - use as a basis for the known mixtures and as controls on the activity of the - mixtures. Research with mixtures of microorganisms will not furnish an excuse - for any less care than with pure cultures in excluding organisms foreign to - the mixtures. Work with mixtures, however, will not make the already complex - problems of plant pathology as a whole any easier or less complex but it may - throw much light on certain relationships which will never be discovered by - the use of pure cultures of single organisms (23).", "venue": "", "year": - 1971, "referenceCount": 7, "citationCount": 211, "influentialCitationCount": - 6, "isOpenAccess": false, "fieldsOfStudy": ["Biology"], "s2FieldsOfStudy": - [{"category": "Biology", "source": "external"}, {"category": "Medicine", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1971-09-01", - "journal": {"name": "Annual Review of Phytopathology", "pages": "253-274", - "volume": "9"}, "authors": [{"authorId": "144172581", "name": "N. Powell"}]}, - {"paperId": "033dd6cf61a6017e9aa9b46068d3c89082849cf3", "externalIds": {"MAG": - "2951976932", "ArXiv": "1612.03969", "DBLP": "conf/iclr/HenaffWSBL17", "CorpusId": - 11243593}, "url": "https://www.semanticscholar.org/paper/033dd6cf61a6017e9aa9b46068d3c89082849cf3", - "title": "Tracking the World State with Recurrent Entity Networks", "abstract": - "We introduce a new model, the Recurrent Entity Network (EntNet). It is equipped - with a dynamic long-term memory which allows it to maintain and update a representation - of the state of the world as it receives new data. For language understanding - tasks, it can reason on-the-fly as it reads text, not just when it is required - to answer a question or respond as is the case for a Memory Network (Sukhbaatar - et al., 2015). Like a Neural Turing Machine or Differentiable Neural Computer - (Graves et al., 2014; 2016) it maintains a fixed size memory and can learn - to perform location and content-based read and write operations. However, - unlike those models it has a simple parallel architecture in which several - memory locations can be updated simultaneously. The EntNet sets a new state-of-the-art - on the bAbI tasks, and is the first method to solve all the tasks in the 10k - training examples setting. We also demonstrate that it can solve a reasoning - task which requires a large number of supporting facts, which other methods - are not able to solve, and can generalize past its training horizon. It can - also be practically used on large scale datasets such as Children''s Book - Test, where it obtains competitive performance, reading the story in a single - pass.", "venue": "International Conference on Learning Representations", "year": - 2016, "referenceCount": 33, "citationCount": 207, "influentialCitationCount": - 37, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": + {"paperId": "c71f8b80dc1deec0cf36840f31018a4812a83381", "externalIds": {"MAG": + "2794150892", "ArXiv": "1803.07886", "CorpusId": 4003867}, "corpusId": 4003867, + "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c71f8b80dc1deec0cf36840f31018a4812a83381", + "title": "Beyond activator-inhibitor networks: the generalised Turing mechanism", + "abstract": "The Turing patterning mechanism is believed to underly the formation + of repetitive structures in development, such as zebrafish stripes and mammalian + digits, but it has proved difficult to isolate the specific biochemical species + responsible for pattern formation. Meanwhile, synthetic biologists have designed + Turing systems for implementation in cell colonies, but none have yet led + to visible patterns in the laboratory. In both cases, the relationship between + underlying chemistry and emergent biology remains mysterious. To help resolve + the mystery, this article asks the question: what kinds of biochemical systems + can generate Turing patterns? We find general conditions for Turing pattern + inception -- the ability to generate unstable patterns from random noise -- + which may lead to the ultimate formation of stable patterns, depending on + biochemical non-linearities. We find that a wide variety of systems can generate + stable Turing patterns, including several which are currently unknown, such + as two-species systems composed of two self-activators, and systems composed + of a short-range inhibitor and a long-range activator. We furthermore find + that systems which are widely believed to generate stable patterns may in + fact only generate unstable patterns, which ultimately converge to spatially-homogeneous + concentrations. Our results suggest that a much wider variety of systems than + is commonly believed could be responsible for observed patterns in development, + or could be good candidates for synthetic patterning networks.", "venue": + "", "year": 2018, "referenceCount": 30, "citationCount": 12, "influentialCitationCount": + 1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Biology"], + "s2FieldsOfStudy": [{"category": "Biology", "source": "external"}, {"category": + "Biology", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": + "2018-03-21", "journal": {"name": "arXiv: Molecular Networks", "volume": ""}, + "authors": [{"authorId": "2111046814", "name": "Stephen Smith"}, {"authorId": + "1939942", "name": "N. Dalchau"}]}, {"paperId": "5dfe10c4c7c6890bd6433fbda19ee5777a4b5829", + "externalIds": {"MAG": "1769438376", "DBLP": "conf/eurogp/BullP09", "DOI": + "10.1007/978-3-642-01181-8_4", "CorpusId": 8857191}, "corpusId": 8857191, + "publicationVenue": {"id": "e5560558-b286-4bd6-827c-5632278860f3", "name": + "European Conference on Genetic Programming", "type": "conference", "alternate_names": + ["EuroGP", "Eur Conf Genet Program"], "url": "http://www.genetic-programming.org/"}, + "url": "https://www.semanticscholar.org/paper/5dfe10c4c7c6890bd6433fbda19ee5777a4b5829", + "title": "On Dynamical Genetic Programming: Random Boolean Networks in Learning + Classifier Systems", "abstract": null, "venue": "European Conference on Genetic + Programming", "year": 2009, "referenceCount": 83, "citationCount": 17, "influentialCitationCount": + 0, "isOpenAccess": true, "openAccessPdf": {"url": "http://www.cems.uwe.ac.uk/lcsg/reports/uwelcsg08-005.pdf", + "status": "GREEN"}, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2016-11-04", "journal": {"name": "ArXiv", "volume": "abs/1612.03969"}, - "authors": [{"authorId": "39713408", "name": "Mikael Henaff"}, {"authorId": - "145183709", "name": "J. Weston"}, {"authorId": "3149531", "name": "Arthur - D. Szlam"}, {"authorId": "1713934", "name": "Antoine Bordes"}, {"authorId": - "1688882", "name": "Yann LeCun"}]}, {"paperId": "41fde410ece270dfeff67873f28ae7f61e99a283", - "externalIds": {"DBLP": "conf/coordination/BusiGZ97", "MAG": "1503984881", - "DOI": "10.1007/3-540-63383-9_82", "CorpusId": 17519724}, "url": "https://www.semanticscholar.org/paper/41fde410ece270dfeff67873f28ae7f61e99a283", - "title": "Three Semantics of the Output Operation for Generative Communication", - "abstract": null, "venue": "COORDINATION", "year": 1997, "referenceCount": - 21, "citationCount": 23, "influentialCitationCount": 0, "isOpenAccess": false, - "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer - Science", "source": "external"}, {"category": "Computer Science", "source": - "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": - "1997-09-01", "journal": {"pages": "205-219"}, "authors": [{"authorId": "1789091", - "name": "N. Busi"}, {"authorId": "1743074", "name": "R. Gorrieri"}, {"authorId": - "1777352", "name": "G. Zavattaro"}]}, {"paperId": "35ec7a93555e9b5f712a950fa51de347ce28efa9", - "externalIds": {"MAG": "2046584535", "DOI": "10.1177/036354659602400217", - "CorpusId": 29074088, "PubMed": "8775123"}, "url": "https://www.semanticscholar.org/paper/35ec7a93555e9b5f712a950fa51de347ce28efa9", - "title": "The Incidence and Distribution of Stress Fractures in Competitive - Track and Field Athletes", "abstract": "The incidence and distribution of - stress fractures were evaluated prospectively over 12 months in 53 female - and 58 male competitive track and field athletes (age range, 17 to 26 years). - Twenty athletes sustained 26 stress fractures for an overall incidence rate - of 21.1%. The incidence was 0.70 for the number of stress frac tures per 1000 - hours of training. No differences were observed between male and female rates - (P > 0.05). Twenty-six stress fractures composed 20% of the 130 musculoskeletal - injuries sustained during the study. Although there was no difference in stress - fracture incidence among athletes competing in different events (P > 0.05), - sprints, hurdles, and jumps were associated with a significantly greater number - of foot fractures; middle- and long-distance running were as sociated with - a greater number of long bone and pelvic fractures (P < 0.05). Overall, the - most common sites of bone injuries were the tibia with 12 injuries (46%), - followed by the navicular with 4 injuries (15%), and the fibula with 3 injuries - (12%). The high incidence of stress fractures in our study suggests that risk - factors in track and field athletes should be identified.", "venue": "American - Journal of Sports Medicine", "year": 1996, "referenceCount": 47, "citationCount": - 212, "influentialCitationCount": 4, "isOpenAccess": false, "fieldsOfStudy": - ["Medicine"], "s2FieldsOfStudy": [{"category": "Medicine", "source": "external"}, - {"category": "Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "1996-03-01", "journal": {"name": "The American Journal - of Sports Medicine", "pages": "211 - 217", "volume": "24"}, "authors": [{"authorId": - "5301131", "name": "K. Bennell"}, {"authorId": "2067793210", "name": "S. A. - Malcolm"}, {"authorId": "47449786", "name": "S. A. Thomas"}, {"authorId": - "33964300", "name": "J. Wark"}, {"authorId": "46825558", "name": "P. Brukner"}]}, - {"paperId": "505089663ba7a69fa89e219457c3dedf12d6d410", "externalIds": {"DBLP": - "books/daglib/0040378", "MAG": "2291353394", "DOI": "10.1515/9783110275643", - "CorpusId": 10142692}, "url": "https://www.semanticscholar.org/paper/505089663ba7a69fa89e219457c3dedf12d6d410", - "title": "Recursion Theory - Computational Aspects of Definability", "abstract": - "This monograph presents recursion theory from a generalized and largely global - point of view. A major theme is the study of the structures of degrees arising - from two key notions of reducibility, the Turing degrees and the hyperdegrees, - using ideas and techniques beyond those of classical recursion theory. These - include structure theory, hyperarithmetic determinacy and rigidity, basis - theorems, independence results on Turing degrees, as well as applications - to higher randomness.", "venue": "de Gruyter series in logic and its applications", - "year": 2015, "referenceCount": 63, "citationCount": 14, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Computer Science", "Mathematics"], - "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": - "2015-08-17", "journal": {"pages": "I-XIII, 1-306", "volume": "8"}, "authors": - [{"authorId": "34580700", "name": "C. Chong"}, {"authorId": "2804470", "name": - "Liang Yu"}]}, {"paperId": "ba2791bc0ad1cd43f7a5ce33a0ac45b2dc901ca1", "externalIds": - {"ArXiv": "1008.0737", "MAG": "2001645902", "DOI": "10.1073/pnas.162369099", - "CorpusId": 6987977, "PubMed": "12186973"}, "url": "https://www.semanticscholar.org/paper/ba2791bc0ad1cd43f7a5ce33a0ac45b2dc901ca1", - "title": "Protein\u2013DNA computation by stochastic assembly cascade", "abstract": - "The assembly of RecA on single-stranded DNA is measured and interpreted as - a stochastic finite-state machine that is able to discriminate fine differences - between sequences, a basic computational operation. RecA filaments efficiently - scan DNA sequence through a cascade of random nucleation and disassembly events - that is mechanistically similar to the dynamic instability of microtubules. - This iterative cascade is a multistage kinetic proofreading process that amplifies - minute differences, even a single base change. Our measurements suggest that - this stochastic Turing-like machine can compute certain integral transforms.", - "venue": "Proceedings of the National Academy of Sciences of the United States - of America", "year": 2002, "referenceCount": 34, "citationCount": 44, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Mathematics", "Physics", "Biology", - "Medicine"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, - {"category": "Physics", "source": "external"}, {"category": "Biology", "source": - "external"}, {"category": "Medicine", "source": "external"}, {"category": - "Biology", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2002-08-19", "journal": {"name": "Proceedings of the National - Academy of Sciences of the United States of America", "pages": "11589 - 11592", - "volume": "99"}, "authors": [{"authorId": "1404926731", "name": "R. Bar-Ziv"}, - {"authorId": "1953377", "name": "T. Tlusty"}, {"authorId": "3366192", "name": - "A. Libchaber"}]}, {"paperId": "09160fa7c5caa1f8c25099c4225a442382122efa", - "externalIds": {"MAG": "2184454547", "CorpusId": 138103053}, "url": "https://www.semanticscholar.org/paper/09160fa7c5caa1f8c25099c4225a442382122efa", - "title": "Towards nanostructuring with femtosecond laser pulses", "abstract": - "Detailed investigations of the possibilities for using femtosecond lasers - for the nanostructuring of metal layers and transparent materials are reported. - The aim is to develop a simple laser-based technology for fabricating two- - and three- dimensional nanostructures with structure sizes on the order of - several hundred nanometers. This is required for many ap- plications in photonics, - for the fabrication of photonic crys- tals and microoptical devices, for data - storage, displays, etc. Measurements of thermionic electron emission from - metal tar- gets, which provide valuable information on the dynamics of femtosecond - laser ablation, are discussed. Sub-wavelength mi- crostructuring of metals - is performed and the minimum struc- ture size that can be fabricated in transparent - materials is identified. Two-photon polymerization of hybrid polymers is demonstrated - as a promising femtosecond laser-based nanofab- rication technology.", "venue": - "", "year": 2003, "referenceCount": 0, "citationCount": 79, "influentialCitationCount": - 1, "isOpenAccess": false, "fieldsOfStudy": ["Materials Science"], "s2FieldsOfStudy": - [{"category": "Materials Science", "source": "external"}, {"category": "Physics", - "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, - "journal": {"name": "", "volume": ""}, "authors": [{"authorId": "93288835", - "name": "L. Hannover"}]}]} - - ' - headers: - Access-Control-Allow-Origin: - - '*' - Connection: - - keep-alive - Content-Length: - - '179962' - Content-Type: - - application/json - Date: - - Wed, 21 Dec 2022 04:43:58 GMT - Via: - - 1.1 78249d95c40ff7fa8ee7c73bfbe66904.cloudfront.net (CloudFront) - X-Amz-Cf-Id: - - jZW4zFgtFQk6iC2KS0YsSdNAo-SUK6Ntd-MlgfYz1V5CfS2hkI3fBg== - X-Amz-Cf-Pop: - - GRU3-P1 - X-Cache: - - Miss from cloudfront - x-amz-apigw-id: - - detKRGxJvHcFi-Q= - x-amzn-Remapped-Connection: - - keep-alive - x-amzn-Remapped-Content-Length: - - '179962' - x-amzn-Remapped-Date: - - Wed, 21 Dec 2022 04:43:58 GMT - x-amzn-Remapped-Server: - - gunicorn - x-amzn-RequestId: - - ce0d497f-b3a4-4c4a-96ef-53f86eea201e - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - User-Agent: - - python-requests/2.28.1 - method: GET - uri: https://api.semanticscholar.org/graph/v1/paper/search?query=turing&fields=abstract,authors,citationCount,externalIds,fieldsOfStudy,influentialCitationCount,isOpenAccess,journal,paperId,publicationDate,publicationTypes,referenceCount,s2FieldsOfStudy,title,url,venue,year&offset=2600&limit=100 - response: - body: - string: '{"total": 65539, "offset": 2600, "next": 2700, "data": [{"paperId": - "709492e5cb53175ecc09f16f2ee7b09ee78c1420", "externalIds": {"MAG": "2285074506", - "CorpusId": 155718289}, "url": "https://www.semanticscholar.org/paper/709492e5cb53175ecc09f16f2ee7b09ee78c1420", - "title": "Intersectoral Terms of Trade and Marketed Surplus of Agricultural - Produce, 1951-52 to 1965-66", "abstract": "\ufeffDuring the period of the - first three five-year Plans, all prices received and paid by agriculture show- - ed an upward trend, though at differential rates. In general, prices received - by agriculture rose at a faster annual rate than those paid by agriculture, - and yet the consequent secular improvement in favour of agriatl- ture in the - net barter terms of trade was marginal.", "venue": "", "year": 1969, "referenceCount": - 0, "citationCount": 27, "influentialCitationCount": 3, "isOpenAccess": false, - "fieldsOfStudy": ["Economics"], "s2FieldsOfStudy": [{"category": "Economics", - "source": "external"}, {"category": "Economics", "source": "s2-fos-model"}], - "publicationTypes": null, "publicationDate": "1969-06-28", "journal": {"name": - "Economic and Political Weekly", "volume": "4"}, "authors": [{"authorId": - "123198444", "name": "B. Thamarajakshi"}]}, {"paperId": "b46e7c877a92190282f834db517230baeb7409f8", - "externalIds": {"MAG": "1519294886", "DOI": "10.1007/978-1-4020-6710-5_7", - "CorpusId": 142922206}, "url": "https://www.semanticscholar.org/paper/b46e7c877a92190282f834db517230baeb7409f8", - "title": "Turing on the \u201cImitation Game\u201d", "abstract": null, "venue": - "", "year": 2009, "referenceCount": 2, "citationCount": 10, "influentialCitationCount": - 0, "isOpenAccess": false, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": - [{"category": "Psychology", "source": "external"}, {"category": "Art", "source": - "s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal": - {"name": "", "pages": "103-106", "volume": ""}, "authors": [{"authorId": "114531657", - "name": "Noam Chomsky"}]}, {"paperId": "b4820004452afa8a84b54948959082d63d34304f", + "publicationDate": "2009-04-10", "journal": {"pages": "37-48"}, "authors": + [{"authorId": "144925000", "name": "L. Bull"}, {"authorId": "2726367", "name": + "R. Preen"}]}, {"paperId": "5eeacf420b3f8484541ce9ea583006fa1fabc3bd", "externalIds": + {"MAG": "2490199397", "DOI": "10.1007/978-3-642-88162-6_6", "CorpusId": 124156132}, + "corpusId": 124156132, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/5eeacf420b3f8484541ce9ea583006fa1fabc3bd", + "title": "Turing-Maschinen und zuf\u00e4llige 0\u20131-Folgen", "abstract": + null, "venue": "", "year": 1970, "referenceCount": 6, "citationCount": 14, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Physics"], "s2FieldsOfStudy": [{"category": "Physics", + "source": "external"}], "publicationTypes": null, "publicationDate": null, + "journal": {"name": "", "pages": "141-167", "volume": ""}, "authors": [{"authorId": + "2072651909", "name": "K. Jacobs"}]}, {"paperId": "b4820004452afa8a84b54948959082d63d34304f", "externalIds": {"ArXiv": "1408.3158", "DBLP": "journals/bsl/Kjos-Hanssen03", "MAG": "1986869498", "DOI": "10.2178/bsl/1046288724", "CorpusId": 11744301}, - "url": "https://www.semanticscholar.org/paper/b4820004452afa8a84b54948959082d63d34304f", + "corpusId": 11744301, "publicationVenue": {"id": "2e016c78-9f89-4c7f-9072-c015f5de55eb", + "name": "Bulletin of Symbolic Logic", "type": "journal", "alternate_names": + ["Bull Symb Log", "The Bulletin of Symbolic Logic"], "issn": "1079-8986", + "url": "https://www.math.ucla.edu/~asl/bsltoc.htm", "alternate_urls": ["https://www.jstor.org/journal/bullsymblogi", + "http://journals.cambridge.org/BSL", "https://www.cambridge.org/core/journals/bulletin-of-symbolic-logic", + "http://journals.cambridge.org/action/displayJournal?jid=BSL"]}, "url": "https://www.semanticscholar.org/paper/b4820004452afa8a84b54948959082d63d34304f", "title": "Local Initial Segments of The Turing Degrees", "abstract": "Abstract Recent results on initial segments of the Turing degrees are presented, and some conjectures about initial segments that have implications for the existence of nontrivial automorphisms of the Turing degrees are indicated.", "venue": "Bulletin of Symbolic Logic", "year": 2003, "referenceCount": 35, "citationCount": - 10, "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": + 10, "influentialCitationCount": 0, "isOpenAccess": true, "openAccessPdf": + {"url": "http://arxiv.org/pdf/0901.3876v1.pdf", "status": "GREEN"}, "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category": "Computer Science", "source": "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "2003-03-01", "journal": {"name": "Bulletin of Symbolic Logic", "pages": "26 - 36", "volume": "9"}, "authors": [{"authorId": - "1401914011", "name": "B. Kjos-Hanssen"}]}, {"paperId": "e52fa1926da4f02b901793afd1d2103473cf19b9", - "externalIds": {"ArXiv": "0705.4077", "MAG": "2072381205", "DBLP": "conf/focs/AharonovGIK07", - "DOI": "10.1007/s00220-008-0710-3", "CorpusId": 1916001}, "url": "https://www.semanticscholar.org/paper/e52fa1926da4f02b901793afd1d2103473cf19b9", - "title": "The Power of Quantum Systems on a Line", "abstract": null, "venue": - "IEEE Annual Symposium on Foundations of Computer Science", "year": 2007, - "referenceCount": 62, "citationCount": 211, "influentialCitationCount": 15, - "isOpenAccess": true, "fieldsOfStudy": ["Physics", "Computer Science"], "s2FieldsOfStudy": - [{"category": "Physics", "source": "external"}, {"category": "Computer Science", - "source": "external"}, {"category": "Physics", "source": "s2-fos-model"}], - "publicationTypes": ["JournalArticle"], "publicationDate": "2007-05-28", "journal": - {"name": "Communications in Mathematical Physics", "pages": "41-65", "volume": - "287"}, "authors": [{"authorId": "3334068", "name": "D. Aharonov"}, {"authorId": - "1775192", "name": "D. Gottesman"}, {"authorId": "143631252", "name": "S. - Irani"}, {"authorId": "1705963", "name": "J. Kempe"}]}, {"paperId": "5dfe10c4c7c6890bd6433fbda19ee5777a4b5829", - "externalIds": {"MAG": "1769438376", "DBLP": "conf/eurogp/BullP09", "DOI": - "10.1007/978-3-642-01181-8_4", "CorpusId": 8857191}, "url": "https://www.semanticscholar.org/paper/5dfe10c4c7c6890bd6433fbda19ee5777a4b5829", - "title": "On Dynamical Genetic Programming: Random Boolean Networks in Learning - Classifier Systems", "abstract": null, "venue": "European Conference on Genetic - Programming", "year": 2009, "referenceCount": 83, "citationCount": 17, "influentialCitationCount": - 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": - [{"category": "Computer Science", "source": "external"}, {"category": "Computer - Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], - "publicationDate": "2009-04-10", "journal": {"pages": "37-48"}, "authors": - [{"authorId": "144925000", "name": "L. Bull"}, {"authorId": "2726367", "name": - "R. Preen"}]}, {"paperId": "d306a645c030434ff7b0200998afb36cf94ac7d2", "externalIds": - {"DBLP": "journals/algorithmica/ThomasseTV17", "MAG": "2248791588", "DOI": - "10.1007/s00453-015-0083-x", "CorpusId": 2796822}, "url": "https://www.semanticscholar.org/paper/d306a645c030434ff7b0200998afb36cf94ac7d2", - "title": "A Polynomial Turing-Kernel for Weighted Independent Set in Bull-Free - Graphs", "abstract": null, "venue": "Algorithmica", "year": 2014, "referenceCount": - 42, "citationCount": 36, "influentialCitationCount": 1, "isOpenAccess": true, - "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy": [{"category": - "Computer Science", "source": "external"}, {"category": "Mathematics", "source": - "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": - ["JournalArticle"], "publicationDate": "2014-06-25", "journal": {"name": "Algorithmica", - "pages": "619-641", "volume": "77"}, "authors": [{"authorId": "2332151", "name": - "St\u00e9phan Thomass\u00e9"}, {"authorId": "1745051", "name": "Nicolas Trotignon"}, - {"authorId": "1789071", "name": "K. Vuskovic"}]}, {"paperId": "fcaeed5a32a13efeaa40273b2c0410e1f97f8ac6", + "1401914011", "name": "B. Kjos-Hanssen"}]}, {"paperId": "ac859f22db4fc13897149915f83ff3e0143ad8b9", + "externalIds": {"DBLP": "journals/mcs/CaponeCLT19", "MAG": "2929453662", "DOI": + "10.1016/J.MATCOM.2019.03.010", "CorpusId": 131822854}, "corpusId": 131822854, + "publicationVenue": {"id": "9fb5b1b9-03d6-4b01-96db-b535900babb5", "name": + "Mathematics and Computers in Simulation", "type": "journal", "alternate_names": + ["Math Comput Simul"], "issn": "0378-4754", "url": "http://www.elsevier.com/wps/find/journaldescription.cws_home/505615/description#description", + "alternate_urls": ["https://www.journals.elsevier.com/mathematics-and-computers-in-simulation", + "http://www.sciencedirect.com/science/journal/03784754"]}, "url": "https://www.semanticscholar.org/paper/ac859f22db4fc13897149915f83ff3e0143ad8b9", + "title": "Turing patterns in a reaction-diffusion system modeling hunting + cooperation", "abstract": null, "venue": "Mathematics and Computers in Simulation", + "year": 2019, "referenceCount": 27, "citationCount": 22, "influentialCitationCount": + 0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer + Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science", + "source": "external"}, {"category": "Mathematics", "source": "external"}, + {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2019-11-01", "journal": {"name": "Math. + Comput. Simul.", "pages": "172-180", "volume": "165"}, "authors": [{"authorId": + "13106451", "name": "F. Capone"}, {"authorId": "36267596", "name": "M. Carfora"}, + {"authorId": "88492547", "name": "R. D. Luca"}, {"authorId": "40860254", "name": + "I. Torcicollo"}]}, {"paperId": "ee68e4fd1d697f3cad5a3514630e7ddcc8431a23", + "externalIds": {"ArXiv": "math/0602439", "MAG": "2951015973", "DOI": "10.1090/S0002-9939-07-08871-5", + "CorpusId": 6754931}, "corpusId": 6754931, "publicationVenue": null, "url": + "https://www.semanticscholar.org/paper/ee68e4fd1d697f3cad5a3514630e7ddcc8431a23", + "title": "Turing incomparability in Scott sets", "abstract": "For every Scott + set F and every nonrecursive set X in F, there is a Y \u2208 F such that X + and Y are Turing incomparable.", "venue": "", "year": 2006, "referenceCount": + 31, "citationCount": 10, "influentialCitationCount": 2, "isOpenAccess": true, + "openAccessPdf": {"url": "https://www.ams.org/proc/2007-135-11/S0002-9939-07-08871-5/S0002-9939-07-08871-5.pdf", + "status": "BRONZE"}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": + [{"category": "Mathematics", "source": "external"}, {"category": "Mathematics", + "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2006-02-20", + "journal": {"name": "", "pages": "3723-3731", "volume": "135"}, "authors": + [{"authorId": "32390330", "name": "A. Kucera"}, {"authorId": "2867082", "name": + "T. Slaman"}]}, {"paperId": "e06ba15967879f0af67a2dd8014fa1b99f086f9c", "externalIds": + {"MAG": "2056641735", "DOI": "10.1002/asia.200900439", "CorpusId": 20509952, + "PubMed": "20143371"}, "corpusId": 20509952, "publicationVenue": {"id": "090741c7-fe44-49b9-a729-da23291e59d0", + "name": "Chemistry - An Asian Journal", "type": "journal", "alternate_names": + ["Chem Asian J", "Chem Asian J", "Chemistry-an Asian Journal", "Chemistry. + Asian Journal"], "issn": "1861-471X", "url": "http://www3.interscience.wiley.com/journal/112140232/home", + "alternate_urls": ["http://www3.interscience.wiley.com/journal/112140232/home/2451_info.html", + "https://onlinelibrary.wiley.com/journal/1861471X", "http://www.wiley-vch.de/publish/dt/journals/alphabeticIndex/2451"]}, + "url": "https://www.semanticscholar.org/paper/e06ba15967879f0af67a2dd8014fa1b99f086f9c", + "title": "The site-selective molecular recognition of ternary architectures + by using supramolecular nanoporous networks at a liquid-solid interface.", + "abstract": "The supramolecular networks not only pro-vide cavities for the + inclusion of guest molecules, but canalso actively interact with guest molecules. + Coadsorbed spe-cies typically interact through van der Waals interactionsand + hydrogen bonds. The weak intermolecular interactionsbetween guest and host + species can affect assembly struc-tures, for instance, by causing variations + in the lattice geo-metries of the host frameworks.", "venue": "Chemistry - + An Asian Journal", "year": 2010, "referenceCount": 30, "citationCount": 26, + "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Chemistry", "Medicine"], "s2FieldsOfStudy": [{"category": + "Chemistry", "source": "external"}, {"category": "Medicine", "source": "external"}, + {"category": "Materials Science", "source": "s2-fos-model"}], "publicationTypes": + ["JournalArticle"], "publicationDate": "2010-04-01", "journal": {"name": "Chemistry, + an Asian journal", "pages": "\n 787-90\n ", "volume": "5 4"}, + "authors": [{"authorId": "11692920", "name": "Yongtao Shen"}, {"authorId": + "2145625420", "name": "Min Li"}, {"authorId": "2143377262", "name": "Yuanyuan + Guo"}, {"authorId": "144250476", "name": "K. Deng"}, {"authorId": "144897010", + "name": "Q. Zeng"}, {"authorId": "34578272", "name": "Chen Wang"}]}, {"paperId": + "f86fd05519bf8ed378fb6b718ad07e0a4efbe396", "externalIds": {"DBLP": "journals/jmlr/OhannessianD12", + "MAG": "2400725243", "CorpusId": 8501794}, "corpusId": 8501794, "publicationVenue": + {"id": "24b0721b-0592-414a-ac79-7271515aaab0", "name": "Annual Conference + Computational Learning Theory", "type": "conference", "alternate_names": ["Conf + Learn Theory", "COLT", "Conference on Learning Theory", "Annu Conf Comput + Learn Theory"], "url": "http://www.wikicfp.com/cfp/program?id=536"}, "url": + "https://www.semanticscholar.org/paper/f86fd05519bf8ed378fb6b718ad07e0a4efbe396", + "title": "Rare Probability Estimation under Regularly Varying Heavy Tails", + "abstract": "This paper studies the problem of estimating the probability + of symbols that have occurred very rarely, in samples drawn independently + from an unknown, possibly infinite, discrete distribution. In particular, + we study the multiplicative consistency of estimators, defined as the ratio + of the estimate to the true quantity converging to one. We first show that + the classical Good-Turing estimator is not universally consistent in this + sense, despite enjoying favorable additive properties. We then use Karamata\u2019s + theory of regular variation to prove that regularly varying heavy tails are + sufficient for consistency. At the core of this result is a multiplicative + concentration that we establish both by extending the McAllester-Ortiz additive + concentration for the missing mass to all rare probabilities and by exploiting + regular variation. We also derive a family of estimators which, in addition + to being consistent, address some of the shortcomings of the Good-Turing estimator. + For example, they perform smoothing implicitly and have the absolute discounting + structure of many heuristic algorithms. This also establishes a discrete parallel + to extreme value theory, and many of the techniques therein can be adapted + to the framework that we set forth.", "venue": "Annual Conference Computational + Learning Theory", "year": 2012, "referenceCount": 22, "citationCount": 37, + "influentialCitationCount": 6, "isOpenAccess": false, "openAccessPdf": null, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category": + "Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle", + "Conference"], "publicationDate": "2012-06-16", "journal": {"pages": "21.1-21.24"}, + "authors": [{"authorId": "3150499", "name": "Mesrob I. Ohannessian"}, {"authorId": + "1729606", "name": "M. Dahleh"}]}, {"paperId": "fcaeed5a32a13efeaa40273b2c0410e1f97f8ac6", "externalIds": {"DBLP": "journals/jacm/Karp67", "MAG": "2000920814", "DOI": - "10.1145/321406.321410", "CorpusId": 1138280}, "url": "https://www.semanticscholar.org/paper/fcaeed5a32a13efeaa40273b2c0410e1f97f8ac6", + "10.1145/321406.321410", "CorpusId": 1138280}, "corpusId": 1138280, "publicationVenue": + null, "url": "https://www.semanticscholar.org/paper/fcaeed5a32a13efeaa40273b2c0410e1f97f8ac6", "title": "Some Bounds on the Storage Requirements of Sequential Machines and Turing Machines", "abstract": "Any sequential machine M represents a function fM from input sequences to @@ -54747,160 +62314,98 @@ interactions: these and related results, lower bounds are obtained on the amount of work tape required online and offline Turing machines that compute nonrepresentable functions.", "venue": "JACM", "year": 1967, "referenceCount": 12, "citationCount": - 38, "influentialCitationCount": 6, "isOpenAccess": true, "fieldsOfStudy": - ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": "Mathematics", - "source": "external"}, {"category": "Computer Science", "source": "external"}, - {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": + 38, "influentialCitationCount": 6, "isOpenAccess": true, "openAccessPdf": + {"url": "https://dl.acm.org/doi/pdf/10.1145/321406.321410", "status": "BRONZE"}, + "fieldsOfStudy": ["Mathematics", "Computer Science"], "s2FieldsOfStudy": [{"category": + "Mathematics", "source": "external"}, {"category": "Computer Science", "source": + "external"}, {"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate": "1967-07-01", "journal": {"name": "J. ACM", "pages": "478-489", "volume": "14"}, "authors": [{"authorId": "47546648", - "name": "R. Karp"}]}, {"paperId": "22a80820ae0c08d20cfa4ffa1fe64edd194a9a75", - "externalIds": {"MAG": "2135376348", "DOI": "10.1098/rsfs.2012.0018", "CorpusId": - 1405995}, "url": "https://www.semanticscholar.org/paper/22a80820ae0c08d20cfa4ffa1fe64edd194a9a75", - "title": "The mathematics of nature at the Alan Turing centenary", "abstract": - "Alan Turing inhabited a very individual world between the abstract and the - concrete\u2014see Mrs Turing''s sketch of her son playing hockey in 1923 ([figure - 1][1]). His 1936 universal Turing machine detached computation from the actuality - of its physical host, and established a powerful computational", "venue": - "Interface Focus", "year": 2012, "referenceCount": 15, "citationCount": 9, - "influentialCitationCount": 0, "isOpenAccess": true, "fieldsOfStudy": ["Computer - Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": - "external"}, {"category": "Art", "source": "s2-fos-model"}], "publicationTypes": - null, "publicationDate": "2012-08-06", "journal": {"name": "Interface Focus", - "pages": "393 - 396", "volume": "2"}, "authors": [{"authorId": "98630872", - "name": "S. Cooper"}, {"authorId": "2339973", "name": "P. Maini"}]}, {"paperId": - "667028495c90e4202fd822aa992f8e76066e8732", "externalIds": {"DBLP": "journals/sigact/Goldschlager77", - "MAG": "1982347904", "DOI": "10.1145/1008354.1008356", "CorpusId": 17579878}, - "url": "https://www.semanticscholar.org/paper/667028495c90e4202fd822aa992f8e76066e8732", - "title": "The monotone and planar circuit value problems are log space complete - for P", "abstract": "Ladner [3] ]has shown that the circuit value problem - (CV) is log space complete for P, adding to the list of such problems found - by Cook [iJ and Jones and Laaser [2]. Ladner''s simulation of Turing mac]hines - by boolean circuits seems to require an \"adequate\" set of gates, such as - AND and NOT. We show that the same simulation is possible with monotone circuits - using AND and OR gates only. Theorem The monotone circuit value problem (MCV) - is log space complete for P. Proof Clearly MCV \u2022 P, and the construction - below shows that CV -